From xen-devel-bounces@lists.xenproject.org Tue Mar 01 01:19:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 01:19:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.280783.478837 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOrAH-0002By-BG; Tue, 01 Mar 2022 01:18:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 280783.478837; Tue, 01 Mar 2022 01:18:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOrAH-0002Br-7a; Tue, 01 Mar 2022 01:18:57 +0000
Received: by outflank-mailman (input) for mailman id 280783;
 Tue, 01 Mar 2022 01:18:55 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=JG9B=TM=oracle.com=dongli.zhang@srs-se1.protection.inumbo.net>)
 id 1nOrAE-0002Bk-Nt
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 01:18:55 +0000
Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com
 [205.220.165.32]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 8be197fd-98fd-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 02:18:51 +0100 (CET)
Received: from pps.filterd (m0246627.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 21SLkxb7009931; 
 Tue, 1 Mar 2022 01:18:25 GMT
Received: from userp3020.oracle.com (userp3020.oracle.com [156.151.31.79])
 by mx0b-00069f02.pphosted.com with ESMTP id 3eh14bsb68-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Tue, 01 Mar 2022 01:18:25 +0000
Received: from pps.filterd (userp3020.oracle.com [127.0.0.1])
 by userp3020.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 22111ICX172697;
 Tue, 1 Mar 2022 01:18:24 GMT
Received: from nam11-co1-obe.outbound.protection.outlook.com
 (mail-co1nam11lp2175.outbound.protection.outlook.com [104.47.56.175])
 by userp3020.oracle.com with ESMTP id 3efdnkq9m7-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Tue, 01 Mar 2022 01:18:24 +0000
Received: from BYAPR10MB2663.namprd10.prod.outlook.com (2603:10b6:a02:a9::20)
 by SA2PR10MB4668.namprd10.prod.outlook.com (2603:10b6:806:117::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.23; Tue, 1 Mar
 2022 01:18:21 +0000
Received: from BYAPR10MB2663.namprd10.prod.outlook.com
 ([fe80::a0d5:610d:bcf:9b47]) by BYAPR10MB2663.namprd10.prod.outlook.com
 ([fe80::a0d5:610d:bcf:9b47%4]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 01:18:21 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8be197fd-98fd-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=subject : to : cc :
 references : from : message-id : date : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=78X/H5zf90bXeuGJATSx0g0BM4dbFOBb56DOWNT6poM=;
 b=vj4y2GLKHWy81FJz36bhh/UVuVbTktjpQk/GipJ8030YUrPbDFFnXAuLkp81pFinaVA8
 QlfOVTf/8iJY0ifl0H4tjLlp1neLnYBIO8pWIWeAYks/xTuUFBNyU1D7RxjrvZLYdtP2
 FYfzlyLb5qjhUqu/vnZWt3Z+Q0tpMS9kmqt3R7QRXp3/6XTWKP2pvnAHbSaAVs1ql7KO
 rmb4jWKzCsutKEjRrSKmrvnx4Qgi5J7mDo/UcDio+2CEhlsLUyZUOSYohJQ7wz+qrh/B
 cdXq8IrkkR53wwE8D2ZpxgX62/0merFgqWHvliUMJL4nVecPpv5VxiIWXQu98+91dEW6 zQ== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=XXlyH51NZgdK5KZaemroAOne0FGq38YGpd+k1eZ0q13+3jHwkDU+vys24zSHMtHPXZYW/sRyq8xvODGm9aCxaf8zt9J++UlLXLKhHU3ZJLwq5Jp8zCuEuo5SPzaYareOSr4TePEPhLkRCuQA6NdUBvdQ8N65zqKWVyA2yynaH9pw21x6YafPn56CC+GPRDX/XJbz2aGfzI4kq2FUdCkElPCPYw35aUeXq49jgbE7x+BYb+G0pMmT3+l9SNflSt0o9jCvNU7G88Nw3kPQrgcf6Oj6jOl0hzgNO3p8RCDLPN1R+MjKxmHjH6sR3JwJ2eV/St/zLCNXyIF1BvHycpiihg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=78X/H5zf90bXeuGJATSx0g0BM4dbFOBb56DOWNT6poM=;
 b=OEaQyMXyU4aNN05K0kCc3JblpEEtw6wADCUdRail+gitWE8MzXqdo2IsYoPP1AA1K7cx+IrtU476KNXYhZubp0FzAzt147ZrhB2j2ZKWnsklJxgud3qhLcCZwwJP0XpzgDecT4VOVGmrvMP6q2BGymGvPHmbh09CNRF5DHS2un1LCOL8a35S2MkXLIhSimnFJj1AZM7NwVHYPdihUn/4ceAW+Ygi7vBmz2rrlTKMb3bkAF0R1UDYmpdc7EtmTnaD5cWw20MX7jIOaaWm5t0S3HwzJ6H05d6cnHmpHJYKJzKx34kZiGDXTWbZpZCuAQf3IXrZmLbRxnUUqBeGLzaWmg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=78X/H5zf90bXeuGJATSx0g0BM4dbFOBb56DOWNT6poM=;
 b=pOhkbwi7ujYP+dwVimCD9/W5xMVwO94nF0m/i148CgtBW/w5iqK7KblqoX9sMJW+aAM8uU1ZP+AdrKdGNAp8AtW1QJMgxcHq5AYO/lJGGzelvXG4bz2QCEM4DZ778hgVRt4y4s8Kasa9+G6NKdBjxGjVqocLFyHrdxLiosnASWE=
Subject: Re: [PATCH v3 0/1] xen: fix HVM kexec kernel panic
To: Boris Ostrovsky <boris.ostrovsky@oracle.com>,
        xen-devel@lists.xenproject.org, x86@kernel.org
Cc: linux-kernel@vger.kernel.org, jgross@suse.com, sstabellini@kernel.org,
        tglx@linutronix.de, mingo@redhat.com, bp@alien8.de,
        dave.hansen@linux.intel.com, hpa@zytor.com, joe.jin@oracle.com
References: <20220224215049.2845-1-dongli.zhang@oracle.com>
 <9de1059b-6b48-e2c8-60bc-f29b42b217f7@oracle.com>
 <36014dbd-e63c-cf49-dafd-2d7a8b84db5d@oracle.com>
 <8e3e4716-22e7-8684-394c-b5a457906975@oracle.com>
From: Dongli Zhang <dongli.zhang@oracle.com>
Message-ID: <a6d64481-cb70-d797-fafd-b827288f7e53@oracle.com>
Date: Mon, 28 Feb 2022 17:18:17 -0800
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
 Thunderbird/78.6.1
In-Reply-To: <8e3e4716-22e7-8684-394c-b5a457906975@oracle.com>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: SN4PR0501CA0065.namprd05.prod.outlook.com
 (2603:10b6:803:41::42) To BYAPR10MB2663.namprd10.prod.outlook.com
 (2603:10b6:a02:a9::20)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 218b4bb7-e483-4edd-36d2-08d9fb215fb2
X-MS-TrafficTypeDiagnostic: SA2PR10MB4668:EE_
X-Microsoft-Antispam-PRVS: 
	<SA2PR10MB46683B00FC468371E1EB612CF0029@SA2PR10MB4668.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	l2LTV73bT59bOkRP7wM/mfyHzFCM+XGfXNPI+epPYSs1qCf3jGmUUM8SVBsNJnd5CGOVuIqnXVFjzjE1Mm5FZOnuSxxTao8LLf16ZPFNkFRT0cLIm+bzXu2wC/vj5tC6BFbDQd79ssLX3KWO74xxJ+oHbqgarWkwSBAgS1xSPEqZWEdVgIc6T1hx0p10z2SlI7feyJGlOJvlUE5vL3i1duNTPPHNwUie/ey1eh8fvh/tChpIc/kjEmV9vNZ1Vjco79QZMOGOzzZUT9oqXHROyOjXN/PMTcAXdu916jgr0CL02ZNqHGe+Ydzbo3RcTiy7/q2X0cNIbX1KaG4O3zAiYoAHWMNB0+D8g6TEJr9sZ1UYK+L8E9J0smceOuHHPVAMsvft1N+OEkERzXsyghF3DuJrrMoOTP+Wc9EI0KG2bzzvfDi56bc/uHPjFJ/L6C2G8Ax2QJaiIQoRFV2COcwPYrcOrsKqw4Aj12XXk9K/yXeiRCo3y1oTL3AZ5MFqF6PM0vmRVuzInd8wdQiUizGx+G5gWSZgYU/WLKGhkF1QSxver6I5F5CcSFcNTmthfgYowUCfD8NcbN5VCn0U4zqCx1OY7MHdOYzh+akA6EPryRLOAQTfWO/1URRDcJqd5Vi9ENhdZzJGukDj6FedQXOrZ9Psc/2vkOQT+kVKHsfm5RiEmXuzsLtVkqIyfNgbiqa30aaUPXJfGHnwvcYCFeDpgySWpXsh5kwbz+N30ktuh68=
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR10MB2663.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(508600001)(6486002)(36756003)(53546011)(6506007)(316002)(6666004)(66476007)(4326008)(8936002)(66556008)(38100700002)(66946007)(6512007)(107886003)(186003)(31686004)(44832011)(7416002)(31696002)(86362001)(2616005)(2906002)(83380400001)(5660300002)(8676002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?bG1YRXNVNTdoMGlQS1Yvb3lsYTJnZEV1UXZHekFFT0lLYkdlekR5bEYxcjQ2?=
 =?utf-8?B?Y3pxTjVlci9zSS9qRkg1aUl4NW1rUUgycEpnSlVyRFJZMmFyNTY0SGxYd1ZI?=
 =?utf-8?B?dmdoMk5wL01kSFRUYVpyZ09iRkxwWVFtQXpRYm9tZTB4ck0xdVJucHJJQTQw?=
 =?utf-8?B?bXhFdVd1YW1DMVpuNW84RjFsQi9OVnpjR2NRSWhRUmZZNXVlSVptdm1ScWRa?=
 =?utf-8?B?VXNvRWlzdGdXeUR1Z3VqdmFmMzIzUWlFUDZ5eUovcFpPcFd6aWhOWXFnODRJ?=
 =?utf-8?B?UVBCbUVDRmlWclFNS0lXd1FsUSt0MlNPblViY1lNUURmRGdkZmRzSUR0K1dM?=
 =?utf-8?B?ZzcxamlJc01tQ3huWHRHUkhsY2dOQlVhWW04SU9IbDVUZE5oZUZmWlpZZnFZ?=
 =?utf-8?B?SWN6VkVYaCtZc3pDd3FnRVdTQXo4OEhKOGdZS3Z0R3cwRDBGczhXd0ZhQ0ps?=
 =?utf-8?B?SWpjM1QvUzRSNzB0alMwVlYwMk51R2s4NDJlZlZualRXVVBUQkZVVmgvdXZw?=
 =?utf-8?B?WHNGamlLWXRrSUR6YWdTdm5rZkR5a3B4OXdqTlA2blNRb0JrbjJBcFF2cUxQ?=
 =?utf-8?B?elY3UVJ5S2xXQ1pEZ3NlOHRFNmt0ZFp2UDJ4VVBlb1BzcVdHeDE4dGI2ZW05?=
 =?utf-8?B?TzRvMEdLZDNMK2FiZTdDRy8xMlVXbjQ2ZFVPZmVQSmZBVmNtVVhSUDg3akF5?=
 =?utf-8?B?ejRTd0JSdHBhQ0x1WklKa0MreEloa2QrUkl0Q01qdlc2RVhCcFVTaEF2akll?=
 =?utf-8?B?QnR4cFZOUmloS2lxdmVYNGs4K3pGWHZpbUgxNFl3dWVMZkxucVlDUzVqT08y?=
 =?utf-8?B?MGM4MHp5dHdib1kyWkZuazM5ZzJNakZpYzRtRlNtYy92OUJFMG1iY1lReGRY?=
 =?utf-8?B?VFJPMktUL054YWFuTS82VjZvM1V3QTNiUmptaXBhUXhBQ1REcmpmcm52VEJx?=
 =?utf-8?B?eGl3Q0VhMzJjSTRmd2djN1JYaE9CQk12cnBoOElNZTM1L0ZiM0pLc3I5TmM3?=
 =?utf-8?B?Rm9SaENlYVpwMTB5K29IT3VCYU9ZTDZxeHF3cUt2bit0eG9nTXlMblJ1QTZz?=
 =?utf-8?B?c0hjZHFsbTQ5UDJRbmNDRFdWSHowbG1FNXdkUEo2d1R4U3loRGhmeWxwdXl3?=
 =?utf-8?B?NGlSSUFscTZRZTJRZ29yQW43eHhLaVlNU1h4NnQwVjlEYkwrai9mbHVGRThM?=
 =?utf-8?B?WDBGRytGK3FUQWNTZUhpeVNQcXA3Y3doaEY3YmJPeUxYMHIwbU5OMThYV041?=
 =?utf-8?B?SDQxOHpzWXl2U2dDenpJcTE5bXpLOHJXQmt5ZnZsSUpZZXpxV3JEUHl6WUh2?=
 =?utf-8?B?U0Y0MWdBU3AxdU1GMUIxa1Nod2FXOUVrKzkrb1I3MGFGOFpEMXNjaG9SeVU3?=
 =?utf-8?B?TVVnaS9GcC9CQXJhMzZCdXU0N3VCQnUzNDNGM0ovL3ZsZEVLVWJoa1RFUytu?=
 =?utf-8?B?cGFsWERmNUdIa3FOUVB0U05TZ0ltaHlRUHgySElWT1ZHL3VBUmN6UUd4ZHAx?=
 =?utf-8?B?QmJwYjUzN1pvbEhMdHRXVkRsOVd5ZUxlOTlsUjJrdUF5N1pjVnJtNC8vSlRu?=
 =?utf-8?B?YWNCRzZRTVZRVEEvUkI4WDNXZEFmcVpkc21Xd0FXMC9JTG9WbmlnRXhBRUph?=
 =?utf-8?B?UXluMWE0amp1MjhlZnVwVVB3SWNIWXJuWGEyMnhWdmhrQk03V2ZCWXNYVDFW?=
 =?utf-8?B?TjAycU5mMEMzRzVpcjB1aytTSDJ4QUN0eXVlalhRL21RWGRlQWF2TlJPZ0Rm?=
 =?utf-8?B?czl5Ty9JR2ZIVE5KTnd4OTBWdHJHUFBJK1U5YnVrZFZ3SWhJSUlmdHRyQzlO?=
 =?utf-8?B?ckdIZ0I2OFhjOFgza0F1NzFsa2dEcEdHaUwxcE1wSW5mbmFySVA1SnhLWkI5?=
 =?utf-8?B?V254dWxDdUdSMWh1MFVjZUNFcXpJTVZ5K2hMZ0RMTFM0NjI3Yml1OFFaY01R?=
 =?utf-8?B?c0c1alN6Zk5FUzR6M3NoZjVRRGhNenhYU2J5MHRHdVZGWVFPT0pQcnVUSFh1?=
 =?utf-8?B?ZkQ5VmhuK3NOUm9uMGszYWlNQ21Mb2tVb3pVQU9hQjNlcFlCaDFsQXNhbkQz?=
 =?utf-8?B?ZmViSUZIZHNFYndhNjNqYkI3RFNjSGVPOGtvYUpHSzJxZ3dCUllXOExTeVpL?=
 =?utf-8?B?RlEyem5wZldxUmRYSDFMUGNiQmdoc2FjVlNUcU1LenhQRWxTRUw2NzNCWjZI?=
 =?utf-8?Q?oEaEdrV83vA78ICePxSs3fQfR5NfeuYYsZ/6JMzFVwgN?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 218b4bb7-e483-4edd-36d2-08d9fb215fb2
X-MS-Exchange-CrossTenant-AuthSource: BYAPR10MB2663.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 01:18:20.9830
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 6DCWVz1lP4ZFydBrgWksfL/fsd2QPZEOY8EUt4lo5olFCqF/JD3+NkRjnn1XPsg71A3Y9bxAzymihL7/mMu0/Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA2PR10MB4668
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10272 signatures=684655
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxlogscore=999 bulkscore=0
 adultscore=0 phishscore=0 spamscore=0 suspectscore=0 malwarescore=0
 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1
 engine=8.12.0-2201110000 definitions=main-2203010004
X-Proofpoint-GUID: o5g6Jbc0krjkzoho8xAWDaq4ZliYCjiN
X-Proofpoint-ORIG-GUID: o5g6Jbc0krjkzoho8xAWDaq4ZliYCjiN

Hi Boris,

On 2/28/22 12:45 PM, Boris Ostrovsky wrote:
> 
> 
> On 2/25/22 8:17 PM, Dongli Zhang wrote:
>> Hi Boris,
>>
>> On 2/25/22 2:39 PM, Boris Ostrovsky wrote:
>>>
>>> On 2/24/22 4:50 PM, Dongli Zhang wrote:
>>>> This is the v3 of the patch to fix xen kexec kernel panic issue when the
>>>> kexec is triggered on VCPU >= 32.
>>>>
>>>> PANIC: early exception 0x0e IP 10:ffffffffa96679b6 error 0 cr2 0x20
>>>> [    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted
>>>> 5.17.0-rc4xen-00054-gf71077a4d84b-dirty #1
>>>> [    0.000000] Hardware name: Xen HVM domU, BIOS 4.4.4OVM 12/15/2020
>>>> [    0.000000] RIP: 0010:pvclock_clocksource_read+0x6/0xb0
>>>> ... ...
>>>> [    0.000000] RSP: 0000:ffffffffaae03e10 EFLAGS: 00010082 ORIG_RAX:
>>>> 0000000000000000
>>>> [    0.000000] RAX: 0000000000000000 RBX: 0000000000010000 RCX:
>>>> 0000000000000002
>>>> [    0.000000] RDX: 0000000000000003 RSI: ffffffffaac37515 RDI:
>>>> 0000000000000020
>>>> [    0.000000] RBP: 0000000000011000 R08: 0000000000000000 R09:
>>>> 0000000000000001
>>>> [    0.000000] R10: ffffffffaae03df8 R11: ffffffffaae03c68 R12:
>>>> 0000000040000004
>>>> [    0.000000] R13: ffffffffaae03e50 R14: 0000000000000000 R15:
>>>> 0000000000000000
>>>> [    0.000000] FS:  0000000000000000(0000) GS:ffffffffab588000(0000)
>>>> knlGS:0000000000000000
>>>> [    0.000000] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
>>>> [    0.000000] CR2: 0000000000000020 CR3: 00000000ea410000 CR4:
>>>> 00000000000406a0
>>>> [    0.000000] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
>>>> 0000000000000000
>>>> [    0.000000] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:
>>>> 0000000000000400
>>>> [    0.000000] Call Trace:
>>>> [    0.000000]  <TASK>
>>>> [    0.000000]  ? xen_clocksource_read+0x24/0x40
>>>
>>>
>>> This is done to set xen_sched_clock_offset which I think will not be used for a
>>> while, until sched_clock is called (and the other two uses are for
>>> suspend/resume)
>>>
>>>
>>> Can we simply defer 'xen_sched_clock_offset = xen_clocksource_read();' until
>>> after all vcpu areas are properly set? Or are there other uses of
>>> xen_clocksource_read() before ?
>>>
>>
>> I have tested that below patch will panic kdump kernel.
>>
> 
> 
> 
> Oh well, so much for that then. Yes, sched_clock() is at least called from
> printk path.
> 
> 
> I guess we will have to go with v2 then, we don't want to start seeing time
> going back, even if only with older hypervisors. The only thing I might ask is
> that you roll the logic inside xen_hvm_init_time_ops(). Something like
> 
> 
> xen_hvm_init_time_ops()
> {
>     /*
>      * Wait until per_cpu(xen_vcpu, 0) is initialized which may happen
>      * later (e.g. when kdump kernel runs on >=MAX_VIRT_CPUS vcpu)
>      */
>     if (__this_cpu_read(xen_vcpu_nr(0)) == NULL)
>         return;
> 

I think you meant __this_cpu_read(xen_vcpu).

I will call xen_hvm_init_time_ops() at both places, and move the logic into
xen_hvm_init_time_ops().

Thank you very much!

Dongli Zhang


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 02:11:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 02:11:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.280792.478848 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOrz0-00082B-DR; Tue, 01 Mar 2022 02:11:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 280792.478848; Tue, 01 Mar 2022 02:11:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOrz0-000824-9S; Tue, 01 Mar 2022 02:11:22 +0000
Received: by outflank-mailman (input) for mailman id 280792;
 Tue, 01 Mar 2022 02:11:21 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=hqSu=TM=arm.com=Henry.Wang@srs-se1.protection.inumbo.net>)
 id 1nOryz-00081w-9y
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 02:11:21 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04on061d.outbound.protection.outlook.com
 [2a01:111:f400:fe0c::61d])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e13ab0c3-9904-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 03:11:20 +0100 (CET)
Received: from AS8PR05CA0024.eurprd05.prod.outlook.com (2603:10a6:20b:311::29)
 by AM0PR08MB4977.eurprd08.prod.outlook.com (2603:10a6:208:163::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.22; Tue, 1 Mar
 2022 02:11:15 +0000
Received: from VE1EUR03FT045.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:311:cafe::1d) by AS8PR05CA0024.outlook.office365.com
 (2603:10a6:20b:311::29) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26 via Frontend
 Transport; Tue, 1 Mar 2022 02:11:15 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT045.mail.protection.outlook.com (10.152.19.51) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Tue, 1 Mar 2022 02:11:14 +0000
Received: ("Tessian outbound 341d209a0e52:v113");
 Tue, 01 Mar 2022 02:11:14 +0000
Received: from e10361762603.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 CCC3FD07-384E-4587-84B1-5CA6A48FBC65.1; 
 Tue, 01 Mar 2022 02:11:03 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id e10361762603.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 01 Mar 2022 02:11:03 +0000
Received: from PA4PR08MB6253.eurprd08.prod.outlook.com (2603:10a6:102:e4::8)
 by AM6PR08MB3542.eurprd08.prod.outlook.com (2603:10a6:20b:4b::19) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Tue, 1 Mar
 2022 02:11:02 +0000
Received: from PA4PR08MB6253.eurprd08.prod.outlook.com
 ([fe80::41e8:ebec:d794:38aa]) by PA4PR08MB6253.eurprd08.prod.outlook.com
 ([fe80::41e8:ebec:d794:38aa%3]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 02:11:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e13ab0c3-9904-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=a1M0ztFQTIMrYG4qXh093u/gOQoSpWuTTq08M3JdIO4=;
 b=bQtm0we41TxzxY0PZBWRvBGmaQ5jQl9uJQ8C4QShxtoF1HamP6WkmupuVzFTqszKlv3hEQY0ckw/2rHb8cT9FMbOwkBN+TdgVb46IJxtJPt/kOyCGlwbJUq6mQKExlwxPZhn/aKUw/wcovIC3GLMKjctQ8qAK29n5Xxi26jMhuI=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=WVROYPzukAoSRBIqR/dsUYshNl/B7yIiq1fq0YbeTHut9zYfuYi8TaZVxFsTgBzndmLPXiRARKxswG4T3KOPmAbsCmMgNFYsZbZv4CuHtFgLj4tpfaEcA6NDRXQEUelmC3t/UlN7kIoZvNfMVx8SnKPfiDAWuguTIh4BpU8SJk8z1lxTjYpL4/i0YCPqgXKdyGWq9KQSEXk8RM8M4FrBJZ7mdHZtfWy5p0CBygy9hsv//HWdjcndDJSYw13Bk6gvhIP7uyCwmPGqzwaHv2xRT2P5+i3XGu0S9OVRcaNr9+2ZrfUGTA4DhyAeZGZ7uWtzgOzL2R5rSHn4clRluEOQoQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=a1M0ztFQTIMrYG4qXh093u/gOQoSpWuTTq08M3JdIO4=;
 b=C8SzN9ZEfFVTtOdOg0oaVxrM2c8D4WW5BCC+ozirU4QOQkjK3Cb3K3HZYRdYCbSiaYFFXDtLUWQOP7Z1I/5x58H5+lrMDo/diUvEhWy12r5aSLNImJtaBMsMJ7PQeKEpVmCxkRDoNnLuQ9aNv99vWJs25C4OBEu6gY4w0+oXgVeNSieubYmtYSlURt1Tb1soLlYX9Km8Ih1/UVfqmHRLcq8f/NnBI6elteuLtOBwnip87RcIVZy7yZfcEyOiG4gMLl5WXaHOos2bNZBbM0YaGn0LVxv57E1irQ0dwg1Sz+Fi6yvtahstcHq7l98W6eVpjHvvkfTQJYLOFZ9JbeV8vA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=a1M0ztFQTIMrYG4qXh093u/gOQoSpWuTTq08M3JdIO4=;
 b=bQtm0we41TxzxY0PZBWRvBGmaQ5jQl9uJQ8C4QShxtoF1HamP6WkmupuVzFTqszKlv3hEQY0ckw/2rHb8cT9FMbOwkBN+TdgVb46IJxtJPt/kOyCGlwbJUq6mQKExlwxPZhn/aKUw/wcovIC3GLMKjctQ8qAK29n5Xxi26jMhuI=
From: Henry Wang <Henry.Wang@arm.com>
To: Julien Grall <julien@xen.org>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>, "sstabellini@kernel.org"
	<sstabellini@kernel.org>
CC: Bertrand Marquis <Bertrand.Marquis@arm.com>, Wei Chen <Wei.Chen@arm.com>,
	Penny Zheng <Penny.Zheng@arm.com>
Subject: RE: [RFC PATCH 0/2] Introduce reserved Xenheap
Thread-Topic: [RFC PATCH 0/2] Introduce reserved Xenheap
Thread-Index: AQHYKR4hoR5C+vQhgEqBFutamuKD06yktMKAgAPYnoCAAMi0gIAAcnyQ
Date: Tue, 1 Mar 2022 02:11:00 +0000
Message-ID:
 <PA4PR08MB6253D51D60CC4078083D0AAC92029@PA4PR08MB6253.eurprd08.prod.outlook.com>
References: <20220224013023.50920-1-Henry.Wang@arm.com>
 <6269ec3d-039e-d68f-771d-c5e088631410@xen.org>
 <PA4PR08MB625324910ED4D40383191F9D92019@PA4PR08MB6253.eurprd08.prod.outlook.com>
 <48a0712c-eff8-dfc1-2136-59317f22321f@xen.org>
In-Reply-To: <48a0712c-eff8-dfc1-2136-59317f22321f@xen.org>
Accept-Language: zh-CN, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 246FB3B4631C3149BD9E89E7691D8904.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: a5b55eb6-df59-4d2f-e80e-08d9fb28c395
x-ms-traffictypediagnostic:
	AM6PR08MB3542:EE_|VE1EUR03FT045:EE_|AM0PR08MB4977:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR08MB49778E06D3B38931F56D4CF892029@AM0PR08MB4977.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PA4PR08MB6253.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(55016003)(71200400001)(33656002)(316002)(83380400001)(508600001)(38070700005)(86362001)(6506007)(7696005)(54906003)(110136005)(64756008)(66446008)(53546011)(76116006)(8676002)(66946007)(4326008)(66556008)(186003)(66476007)(26005)(9686003)(122000001)(38100700002)(2906002)(5660300002)(52536014)(8936002);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB3542
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT045.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	1c20fdce-515c-43ef-9527-08d9fb28bc17
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(82310400004)(4326008)(8676002)(2906002)(70586007)(33656002)(5660300002)(53546011)(6506007)(70206006)(8936002)(7696005)(52536014)(9686003)(36860700001)(86362001)(40460700003)(336012)(316002)(81166007)(110136005)(356005)(55016003)(26005)(47076005)(186003)(54906003)(508600001)(83380400001);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 02:11:14.6874
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: a5b55eb6-df59-4d2f-e80e-08d9fb28c395
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT045.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB4977

SGkgSnVsaWVuLA0KDQo+IC0tLS0tT3JpZ2luYWwgTWVzc2FnZS0tLS0tDQo+IEZyb206IEp1bGll
biBHcmFsbCA8anVsaWVuQHhlbi5vcmc+DQo+IE9uIDI4LzAyLzIwMjIgMDc6MTIsIEhlbnJ5IFdh
bmcgd3JvdGU6DQo+ID4gSGkgSnVsaWVuLA0KPiANCj4gSGkgSGVucnksDQo+IA0KPiA+PiAtLS0t
LU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0KPiA+PiBGcm9tOiBKdWxpZW4gR3JhbGwgPGp1bGllbkB4
ZW4ub3JnPg0KPiA+PiBIaSBIZW5yeSwNCj4gPj4NCj4gPj4gT24gMjQvMDIvMjAyMiAwMTozMCwg
SGVucnkgV2FuZyB3cm90ZToNCj4gPj4+IFRoZSByZXNlcnZlZCBYZW5oZWFwLCBvciBzdGF0aWNh
bGx5IGNvbmZpZ3VyZWQgWGVuaGVhcCwgcmVmZXJzIHRvIHBhcnRzDQo+ID4+PiBvZiBSQU0gcmVz
ZXJ2ZWQgaW4gdGhlIGJlZ2lubmluZyBmb3IgWGVuaGVhcC4gTGlrZSB0aGUgc3RhdGljIG1lbW9y
eQ0KPiA+Pj4gYWxsb2NhdGlvbiwgc3VjaCByZXNlcnZlZCBYZW5oZWFwIHJlZ2lvbnMgYXJlIHJl
c2VydmVkIGJ5IGNvbmZpZ3VyYXRpb24NCj4gPj4+IGluIHRoZSBkZXZpY2UgdHJlZSB1c2luZyBw
aHlzaWNhbCBhZGRyZXNzIHJhbmdlcy4NCj4gPj4NCj4gPj4gSW4gWGVuLCB3ZSBoYXZlIHRoZSBj
b25jZXB0IG9mIGRvbWhlYXAgYW5kIHhlbmhlYXAuIEZvciBBcm02NCBhbmQNCj4geDg2DQo+ID4+
IHRoZXkgd291bGQgYmUgdGhlIHNhbWUuIEJ1dCBmb3IgQXJtMzIsIHRoZXkgd291bGQgYmUgZGlm
ZmVyZW50OiB4ZW5oZWFwDQo+ID4+IGlzIGFsd2F5cyBtYXBwZWQgd2hlcmVhcyBkb21oZWFwIGlz
IHNlcGFyYXRlLg0KPiA+Pg0KPiA+PiBTa2ltbWluZyB0aHJvdWdoIHRoZSBzZXJpZXMsIEkgdGhp
bmsgeW91IHdhbnQgdG8gdXNlIHRoZSByZWdpb24gZm9yIGJvdGgNCj4gPj4gZG9taGVhcCBhbmQg
eGVuaGVhcC4gSXMgdGhhdCBjb3JyZWN0Pw0KPiA+DQo+ID4gWWVzIEkgdGhpbmsgdGhhdCB3b3Vs
ZCBiZSBjb3JyZWN0LCBmb3IgQXJtMzIsIGluc3RlYWQgb2YgdXNpbmcgdGhlIGZ1bGwNCj4gPiBg
cmFtX3BhZ2VzYCBhcyB0aGUgaW5pdGlhbCB2YWx1ZSBvZiBgaGVhcF9wYWdlc2AsIHdlIHdhbnQg
dG8gdXNlIHRoZQ0KPiA+IHJlZ2lvbiBzcGVjaWZpZWQgaW4gdGhlIGRldmljZSB0cmVlLiBCdXQg
d2UgYXJlIGNvbmZ1c2VkIGlmIHRoaXMgaXMgdGhlDQo+ID4gY29ycmVjdCAob3IgcHJlZmVycmVk
KSB3YXkgZm9yIEFybTMyLCBzbyBpbiB0aGlzIHNlcmllcyB3ZSBvbmx5DQo+ID4gaW1wbGVtZW50
ZWQgdGhlIHJlc2VydmVkIGhlYXAgZm9yIEFybTY0Lg0KPiANCj4gVGhhdCdzIGFuIGludGVyZXN0
aW5nIHBvaW50LiBXaGVuIEkgc2tpbW1lZCB0aHJvdWdoIHRoZSBzZXJpZXMgb24NCj4gRnJpZGF5
LCBteSBmaXJzdCB0aG91Z2h0IHdhcyB0aGF0IGZvciBhcm0zMiBpdCB3b3VsZCBiZSBvbmx5IHhl
bmhlYXAgKHNvDQo+IGFsbCB0aGUgcmVzdCBvZiBtZW1vcnkgaXMgZG9taGVhcCkuDQo+IA0KPiBI
b3dldmVyLCBYZW4gY2FuIGFsbG9jYXRlIG1lbW9yeSBmcm9tIGRvbWhlYXAgZm9yIGl0cyBvd24g
cHVycG9zZSAoZS5nLg0KPiB3ZSBkb24ndCBuZWVkIGNvbnRpZ3VvdXMgbWVtb3J5LCBvciBmb3Ig
cGFnZS10YWJsZXMpLg0KPiANCj4gSW4gYSBmdWxseSBzdGF0aWMgZW52aXJvbm1lbnQsIHRoZSBk
b21oZWFwIGFuZCB4ZW5oZWFwIGFyZSBib3RoIGdvaW5nIHRvDQo+IGJlIHF1aXRlIHNtYWxsLiBJ
dCB3b3VsZCBhbHNvIGJlIHNvbWV3aGF0IGRpZmZpY3VsdCBmb3IgYSB1c2VyIHRvIHNpemUNCj4g
aXQuIFNvIEkgdGhpbmssIGl0IHdvdWxkIGJlIGVhc2llciB0byB1c2UgdGhlIHJlZ2lvbiB5b3Ug
aW50cm9kdWNlIGZvcg0KPiBib3RoIGRvbWhlYXAgYW5kIHhlbmhlYXAuDQo+IA0KPiBTdGVmYW5v
LCBCZXJ0cmFuZCwgYW55IG9waW9uaW9ucz8NCj4gDQo+IE9uIGEgc2VwYXJhdGUgdG9waWMsIEkg
dGhpbmsgd2UgbmVlZCBzb21lIGRvY3VtZW50YXRpb24gZXhwbGFpbmluZyBob3cgYQ0KPiB1c2Vy
IGNhbiBzaXplIHRoZSB4ZW5oZWFwLiBIb3cgZGlkIHlvdSBmaWd1cmUgb3V0IGZvciB5b3VyIHNl
dHVwPw0KDQpOb3Qgc3VyZSBpZiBJIGZ1bGx5IHVuZGVyc3RhbmQgdGhlIHF1ZXN0aW9uLiBJIHdp
bGwgZXhwbGFpbiBpbiB0d28gcGFydHM6IEkgdGVzdGVkDQp0aGlzIHNlcmllcyBvbiBhIGRvbTBs
ZXNzIChzdGF0aWMgbWVtKSBzeXN0ZW0gb24gRlZQX0Jhc2UuDQooMSkgRm9yIGNvbmZpZ3VyaW5n
IHRoZSBzeXN0ZW0sIEkgZm9sbG93ZWQgdGhlIGRvY3VtZW50YXRpb24gSSBhZGRlZCBpbiB0aGUN
CmZpcnN0IHBhdGNoIGluIHRoaXMgc2VyaWVzIChkb2NzL21pc2MvYXJtL2RldmljZS10cmVlL2Jv
b3RpbmcudHh0KS4gVGhlIGlkZWEgaXMNCmFkZGluZyBzb21lIHN0YXRpYyBtZW0gcmVnaW9ucyB1
bmRlciB0aGUgY2hvc2VuIG5vZGUuDQoNCiAgICAgY2hvc2VuIHsNCisgICAgICAgICN4ZW4sc3Rh
dGljLW1lbS1hZGRyZXNzLWNlbGxzID0gPDB4Mj47DQorICAgICAgICAjeGVuLHN0YXRpYy1tZW0t
c2l6ZS1jZWxscyA9IDwweDI+Ow0KKyAgICAgICAgeGVuLHN0YXRpYy1tZW0gPSA8MHg4IDB4ODAw
MDAwMDAgMHgwIDB4MDAxMDAwMDAgMHg4IDB4OTAwMDAwMDAgMHgwIDB4MDgwMDAwMDA+Ow0KICAg
ICBbLi4uXQ0KICAgICB9DQoNCigyKSBGb3IgdmVyaWZ5aW5nIHRoaXMgc2VyaWVzLCB3aGF0IEkg
ZGlkIHdhcyBiYXNpY2FsbHkgcGxheWluZyB3aXRoIHRoZSByZWdpb24gc2l6ZQ0KYW5kIG51bWJl
ciBvZiB0aGUgcmVnaW9ucywgYWRkaW5nIHByaW50a3MgYW5kIGFsc28gc2VlIGlmIHRoZSBndWVz
dHMgY2FuIGJvb3QNCmFzIGV4cGVjdGVkIHdoZW4gSSBjaGFuZ2UgdGhlIHhlbmhlYXAgc2l6ZS4N
Cg0KPiANCj4gPj4NCj4gPj4gRnVydGhlbW9yZSwgbm93IHRoYXQgd2UgYXJlIGludHJvZHVjaW5n
IG1vcmUgc3RhdGljIHJlZ2lvbiwgaXQgd2lsbCBnZXQNCj4gPj4gZWFzaWVyIHRvIG92ZXJsYXAg
dGhlIHJlZ2lvbnMgYnkgbWlzdGFrZXMuIEkgdGhpbmsgd2Ugd2FudCB0byBoYXZlIHNvbWUNCj4g
Pj4gbG9naWMgaW4gWGVuIChvciBvdXRzaWRlKSB0byBlbnN1cmUgdGhhdCBub25lIG9mIHRoZW0g
b3ZlcmxhcHMuIERvIHlvdQ0KPiA+PiBoYXZlIGFueSBwbGFuIGZvciB0aGF0Pw0KPiA+DQo+ID4g
VG90YWxseSBhZ3JlZSB3aXRoIHRoaXMgaWRlYSwgYnV0IGJlZm9yZSB3ZSBhY3R1YWxseSBpbXBs
ZW1lbnQgdGhlIGNvZGUsDQo+ID4gd2Ugd291bGQgbGlrZSB0byBmaXJzdGx5IHNoYXJlIG91ciB0
aG91Z2h0cyBvbiB0aGlzOiBPbmUgb3B0aW9uIGNvdWxkIGJlIHRvDQo+ID4gYWRkIGRhdGEgc3Ry
dWN0dXJlcyB0byBub3RlcyBkb3duIHRoZXNlIHN0YXRpYyBtZW1vcnkgcmVnaW9ucyB3aGVuIHRo
ZQ0KPiA+IGRldmljZSB0cmVlIGlzIHBhcnNlZCwgYW5kIHRoZW4gd2UgY2FuIGNoZWNrIGlmIHRo
ZXkgYXJlIG92ZXJsYXBwZWQuDQo+IA0KPiBUaGlzIHNob3VsZCB3b3JrLg0KDQpBY2suDQoNCj4g
DQo+ID4gT3Zlcg0KPiA+IHRoZSBsb25nIHRlcm0gKGFuZCB0aGlzIGxvbmcgdGVybSBvcHRpb24g
aXMgY3VycmVudGx5IG5vdCBpbiBvdXIgcGxhbiksDQo+ID4gbWF5YmUgd2UgY2FuIGFkZCBzb21l
dGhpbmcgaW4gdGhlIFhlbiB0b29sc3RhY2sgZm9yIHRoaXMgdXNhZ2U/DQo+IA0KPiBXaGVuIEkg
cmVhZCAiWGVuIHRvb2xzdGFjayIsIEkgcmVhZCB0aGUgdG9vbHMgdGhhdCB3aWxsIHJ1biBpbiBk
b20wLiBJcw0KPiBpdCB3aGF0IHlvdSBtZWFudD8NCg0KTm9ub25vLCBzb3JyeSBmb3IgdGhlIG1p
c2xlYWRpbmcuIEkgbWVhbiBhIGJ1aWxkIHRpbWUgdG9vbCB0aGF0IGNhbiBydW4NCm9uIGhvc3Qg
KGJ1aWxkIG1hY2hpbmUpIHRvIGdlbmVyYXRlL2NvbmZpZ3VyZSB0aGUgWGVuIERUUyBmb3Igc3Rh
dGljDQphbGxvY2F0ZWQgbWVtb3J5LiBCdXQgbWF5YmUgdGhpcyB0b29sIGNhbiBiZSBwbGFjZWQg
aW4gWGVuIHRvb2wgb3IgaXQgY2FuDQpiZSBhIHNlcGFyYXRlIHRvb2wgdGhhdCBvdXQgb2YgWGVu
J3Mgc2NvcGUuDQoNCkFueXdheSwgdGhpcyBpcyBqdXN0IGFuIGlkZWEgYXMgd2UgZmluZCBpdCBp
cyBub3QgZWFzeSBmb3IgdXNlcnMgdG8gY29uZmlndXJlDQpzbyBtYW55IHN0YXRpYyBpdGVtcyBt
YW51YWxseS4NCg0KPiANCj4gPg0KPiA+IEFsc28sIEkgYW0gd29uZGVyaW5nIGlmIHRoZSBvdmVy
bGFwcGluZyBjaGVjayBsb2dpYyBzaG91bGQgYmUgaW50cm9kdWNlZA0KPiA+IGluIHRoaXMgc2Vy
aWVzLiBXRFlUPw0KPiANCj4gSSB3b3VsZCBkbyB0aGF0IGluIGEgc2VwYXJhdGUgc2VyaWVzLg0K
DQpBY2suDQoNCktpbmQgcmVnYXJkcywNCg0KSGVucnkNCg0KPiANCj4gQ2hlZXJzLA0KPiANCj4g
LS0NCj4gSnVsaWVuIEdyYWxsDQo=


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 02:23:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 02:23:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.280801.478859 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOsAy-0001FD-Gq; Tue, 01 Mar 2022 02:23:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 280801.478859; Tue, 01 Mar 2022 02:23:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOsAy-0001F6-Db; Tue, 01 Mar 2022 02:23:44 +0000
Received: by outflank-mailman (input) for mailman id 280801;
 Tue, 01 Mar 2022 02:23:42 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQ5=TM=arm.com=Wei.Chen@srs-se1.protection.inumbo.net>)
 id 1nOsAw-0001F0-In
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 02:23:42 +0000
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur02on0624.outbound.protection.outlook.com
 [2a01:111:f400:fe05::624])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 9b40ea7b-9906-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 03:23:40 +0100 (CET)
Received: from AM6P194CA0007.EURP194.PROD.OUTLOOK.COM (2603:10a6:209:90::20)
 by VE1PR08MB4943.eurprd08.prod.outlook.com (2603:10a6:803:115::27) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.25; Tue, 1 Mar
 2022 02:23:36 +0000
Received: from AM5EUR03FT056.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:90:cafe::64) by AM6P194CA0007.outlook.office365.com
 (2603:10a6:209:90::20) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.23 via Frontend
 Transport; Tue, 1 Mar 2022 02:23:35 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT056.mail.protection.outlook.com (10.152.17.224) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Tue, 1 Mar 2022 02:23:35 +0000
Received: ("Tessian outbound 31aeb3346a45:v113");
 Tue, 01 Mar 2022 02:23:35 +0000
Received: from 5388833892eb.3
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 1F910AAE-1F4F-4469-B130-AC55B6892B8C.1; 
 Tue, 01 Mar 2022 02:23:29 +0000
Received: from EUR03-VE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 5388833892eb.3
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 01 Mar 2022 02:23:29 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com (2603:10a6:102:2b9::9)
 by AS8PR08MB6792.eurprd08.prod.outlook.com (2603:10a6:20b:39b::13)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.22; Tue, 1 Mar
 2022 02:23:27 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa]) by PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa%4]) with mapi id 15.20.5017.026; Tue, 1 Mar 2022
 02:23:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9b40ea7b-9906-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=CTGQd/P50vO2uv8yJoK90CmmYZ3D80zXhuQbGwfKZBQ=;
 b=5ABs9MtgT0BiQH7piAaXijpw+6AUONrMapZjjPdbaIjWXUtIFmyYy5GVOtE9AiiBevEN7aLd+udzopk6x+CCcYdiNpDC4pqkdtt+Bdbb6WFvJXl9bfzIWPwTFQqLthi410v7ap9ym/lbNkEXYo6oCcxnUijib09FtGpsAr2bkzY=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=UzH4vME1n3ww2MMCtHNBK1VRy9mtoTjCekKk/6wVuu0GB9MAPdNiEqFALIVmT4TCPAMZkqsMb7PJjvKspad6jzq6r7U4lN/ZqwRvt+ekZk/Dr+bb9wF7huFWffQMWTnTHa3XjY84k0N9BzUScQ/xOtpuyhkhSXjNLYa7WmShrnhQgpSKAlv1Q1I8LQewbm8Nbp+yfpKziWL2tbkokIZGMX9+4QKqre48sbczWK39Z7GTJstb/l5JogQapWHteIOraT2X+wyKxHasJ0DoFjHfM8lWl9kEDE4VU00IwmXs4uY/XVWkAsxRrO725UxKA6jDo70UT6q9v27aKqQml/2UYQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=CTGQd/P50vO2uv8yJoK90CmmYZ3D80zXhuQbGwfKZBQ=;
 b=fLiUowsOaoBslgoTJNGNfJRNO/H8Ce1pneI6sKjcLPxyFMdz/OQzungzmX+ufdV3KhCZfAMPETYCCIzf+r5lwW3ajcUucE19E2QUCq+4gZd/X/mSIkss2yBMwKuaD4rhSwG/49hbwu8fAzqTU1sXHYJUZPhS81L+bgEY7taTFELV9NctKjjx+uBITO9ySFkbDa8pZIneCfh1XsOsPmm8htvW0CfQAiHwBAglVx6Pq0MrludGE+7oVI28w8eCnyeSjIotTIpVJbf0JyRRjfujDQXyGWzoAtVrBoYG5aF7+WbXAhB3hgGQNu4RgOeoD/umuZOet2h+oeawuREdUnJ9xQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=CTGQd/P50vO2uv8yJoK90CmmYZ3D80zXhuQbGwfKZBQ=;
 b=5ABs9MtgT0BiQH7piAaXijpw+6AUONrMapZjjPdbaIjWXUtIFmyYy5GVOtE9AiiBevEN7aLd+udzopk6x+CCcYdiNpDC4pqkdtt+Bdbb6WFvJXl9bfzIWPwTFQqLthi410v7ap9ym/lbNkEXYo6oCcxnUijib09FtGpsAr2bkzY=
From: Wei Chen <Wei.Chen@arm.com>
To: Henry Wang <Henry.Wang@arm.com>, Julien Grall <julien@xen.org>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	"sstabellini@kernel.org" <sstabellini@kernel.org>
CC: Bertrand Marquis <Bertrand.Marquis@arm.com>, Penny Zheng
	<Penny.Zheng@arm.com>
Subject: RE: [RFC PATCH 0/2] Introduce reserved Xenheap
Thread-Topic: [RFC PATCH 0/2] Introduce reserved Xenheap
Thread-Index: AQHYKR4hPwI7Daj3QEOqkq/IPeuzHKyktMKAgAPeNACAAMMegIAAeuAAgAABW5A=
Date: Tue, 1 Mar 2022 02:23:27 +0000
Message-ID:
 <PAXPR08MB742081C99F081F5D4E0A74779E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
References: <20220224013023.50920-1-Henry.Wang@arm.com>
 <6269ec3d-039e-d68f-771d-c5e088631410@xen.org>
 <PA4PR08MB625324910ED4D40383191F9D92019@PA4PR08MB6253.eurprd08.prod.outlook.com>
 <48a0712c-eff8-dfc1-2136-59317f22321f@xen.org>
 <PA4PR08MB6253D51D60CC4078083D0AAC92029@PA4PR08MB6253.eurprd08.prod.outlook.com>
In-Reply-To:
 <PA4PR08MB6253D51D60CC4078083D0AAC92029@PA4PR08MB6253.eurprd08.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: CF11C91518773143A1341BB17D76728D.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 1e427ce8-6566-417e-5405-08d9fb2a7d0c
x-ms-traffictypediagnostic:
	AS8PR08MB6792:EE_|AM5EUR03FT056:EE_|VE1PR08MB4943:EE_
X-Microsoft-Antispam-PRVS:
	<VE1PR08MB494343BA7BC482A2A6B3B4899E029@VE1PR08MB4943.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 et7x8vCIWWOGCbpNbQxcCTCMGVDrFy01rtTMrmUSoZAZCYYybEb5EQJhGaOvyqNgsATN+2JMd1uiwyBhVtoFTW0jGFp81E6N6kzW1fwvlsW+XoLw9kIzCpADNsK2ZnN3Izuz4kZ0U/yS4i13ZJFZtrdXXPeWozZoptIIUHvt6I/Y24D+7cPDZYCnhzt2o+EN/4A62t3+CPhuxhQFd2thqJlecQKuVUD6J7XmT34prGgIr10nFbhuUl80oelub/pY1iMCKsHwqgniHTSxxzK+yk3PZ+uqMfwpcA1FUIbe3Qagb9r4IWSDQeX3UMG8YjphILbNs+KwlwVXjz3Mjl2Lzevxoq9zam3GS+R3aYqCIuI5rtGwf0Y7oOUc3ihV5dIKoGOIt80M7yD+GKAoLgyBHR45NjPuvcnsuQr4hEEO21F5p/y7jOiXdSzxeBi3yqomIqP89fU44+jTezibnpfiFkZimCi1mrL/xGRD+qGWrDk8Ei7IXD0itxUreWqYGCfbzNyxD2xdpr/xY2Bcy+c9/LGpVVX9U6lxp7C8n9pC5z0B+sCbu+sX1Ee9Aj+V36zmzUDutRbm2JTv0FslFlh95muCSUCo6gYxQvNUeQb18yqS0LvmIjSBCo0VqPTif9MwTbKyYvTW7xPC1LruzbyH4Ez3yaaBOq6+ZzMR1LPyryMGxg/3F47S/Bp+pr8tLtR3POQ60JHxSwptAcfZBb8L+Q==
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAXPR08MB7420.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(71200400001)(52536014)(38100700002)(6506007)(53546011)(4326008)(9686003)(508600001)(83380400001)(55016003)(122000001)(54906003)(110136005)(7696005)(316002)(8936002)(86362001)(38070700005)(5660300002)(2906002)(33656002)(186003)(66476007)(66556008)(66946007)(64756008)(76116006)(66446008)(8676002);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR08MB6792
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT056.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	bbe948fe-504e-4953-0b26-08d9fb2a7815
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(356005)(86362001)(5660300002)(9686003)(81166007)(53546011)(55016003)(6506007)(336012)(4326008)(7696005)(26005)(8936002)(40460700003)(2906002)(83380400001)(8676002)(110136005)(47076005)(52536014)(54906003)(70586007)(70206006)(316002)(82310400004)(33656002)(186003)(508600001)(36860700001);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 02:23:35.4012
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 1e427ce8-6566-417e-5405-08d9fb2a7d0c
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT056.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR08MB4943
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From xen-devel-bounces@lists.xenproject.org Tue Mar 01 03:40:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 03:40:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.280808.478870 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOtMq-0000lz-47; Tue, 01 Mar 2022 03:40:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 280808.478870; Tue, 01 Mar 2022 03:40:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOtMp-0000ls-VW; Tue, 01 Mar 2022 03:40:03 +0000
Received: by outflank-mailman (input) for mailman id 280808;
 Tue, 01 Mar 2022 03:40:02 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nOtMo-0000WN-E4; Tue, 01 Mar 2022 03:40:02 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nOtMo-0003dv-Az; Tue, 01 Mar 2022 03:40:02 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nOtMn-00065l-Ne; Tue, 01 Mar 2022 03:40:01 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nOtMn-0005Zk-Mw; Tue, 01 Mar 2022 03:40:01 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=ysQq6W+ZO60PKvPrsbEBQQ30CRqdu/wzHNptwTwsfIk=; b=O46T5VoevAAq+B50rRVINr0ydG
	EBL+QtRV9ygGE8qZPLawZrbMAnooAsodVeMa2gyDExKlIj3QL0k5/NQZ/r98YdrrDMxja/5rMKkV4
	yfc7HMD8H4+IwOazEgPemXZEIEBMFfQip2MVrkNiIesBZs5NhkK5h9Xpx3+PKJLpl/iY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168258-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168258: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=6a890db161cd6d378bec3499a1e774db3f5a27a7
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 01 Mar 2022 03:40:01 +0000

flight 168258 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168258/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 6a890db161cd6d378bec3499a1e774db3f5a27a7
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    0 days
Testing same since   168258  2022-03-01 01:55:31 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 04:57:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 04:57:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.280824.478896 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOuZJ-0000WV-1M; Tue, 01 Mar 2022 04:57:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 280824.478896; Tue, 01 Mar 2022 04:57:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOuZI-0000WO-Ud; Tue, 01 Mar 2022 04:57:00 +0000
Received: by outflank-mailman (input) for mailman id 280824;
 Tue, 01 Mar 2022 04:57:00 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=JG9B=TM=oracle.com=dongli.zhang@srs-se1.protection.inumbo.net>)
 id 1nOuZH-0000W2-7D
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 04:57:00 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 03eb090a-991c-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 05:56:55 +0100 (CET)
Received: from pps.filterd (m0246631.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 2213QXoj024489; 
 Tue, 1 Mar 2022 04:56:35 GMT
Received: from userp3030.oracle.com (userp3030.oracle.com [156.151.31.80])
 by mx0b-00069f02.pphosted.com with ESMTP id 3ehbk983tc-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Tue, 01 Mar 2022 04:56:35 +0000
Received: from pps.filterd (userp3030.oracle.com [127.0.0.1])
 by userp3030.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 2214u05q089896;
 Tue, 1 Mar 2022 04:56:34 GMT
Received: from nam12-bn8-obe.outbound.protection.outlook.com
 (mail-bn8nam12lp2168.outbound.protection.outlook.com [104.47.55.168])
 by userp3030.oracle.com with ESMTP id 3ef9awgufy-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Tue, 01 Mar 2022 04:56:34 +0000
Received: from BYAPR10MB2663.namprd10.prod.outlook.com (2603:10b6:a02:a9::20)
 by BN6PR10MB1330.namprd10.prod.outlook.com (2603:10b6:404:43::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.22; Tue, 1 Mar
 2022 04:56:31 +0000
Received: from BYAPR10MB2663.namprd10.prod.outlook.com
 ([fe80::a0d5:610d:bcf:9b47]) by BYAPR10MB2663.namprd10.prod.outlook.com
 ([fe80::a0d5:610d:bcf:9b47%4]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 04:56:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 03eb090a-991c-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=subject : from : to :
 cc : references : message-id : date : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=LJao+ms5p15QT1W5aB9NeYZncCwkzWmTSSzyACuGHiI=;
 b=PbuXiGoZz8h1l3byel+CBWGfpLUPztic5h1Ib3lR5Wj+XDhXuBsLMgCVepj1aKKBxIHS
 NINGzlbXXPZ2kEljo4B4QW/CABfxwfYlTa0IlfgiWkbd8KXBPY85vQmcMMwm4jd3k98n
 XtuBKYpdWfvooHYxixPyCI+2Us7bQXFuH0J4KYHLVM0m+Xgcl2RHCMRt1aOqsS1tl2JV
 uVogqCQ3DvJq8M9YsWGW7sFC8IEpD23eI7uSQa+TW8KrQQtGd9GUkn228SBxqQ0AUX2N
 9LDb6OzkN7X4BPqVLikMwDEI1EdUznUrhXVBFUK37Vn5Fosz0MglDeP1gINj6ukR80XL +w== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=KRAzGOL40RX5LFXlESdGAPECtSZEJlvKqEPq4lsHkHDuLAEWCUD/JHNlojquJaEJdNpunIj01Jf4dy+hgNuHDi9fTZs/4CRFQIBgbvZRcY8bAaGkbIGtTE46KyvDqFQOXTCOCYYKQiwgXAZfhteZDxPw3gaT/V6yyQVIQgJUqBxtuHTZZmkF3Wpu4OtMKM9Sv26CoyZ3BCrKItu+Z3qOOl+RBUEjR7V/3PlH0QMhC2DEYkeTeU6aSUDQ/fhiHA18RhY2WJn/a6XW2tVGxqka+4OWwipEaEIDF9qxgpLjple4wCpcBjvgGUvuWNDsObpvyM8A5+zBkUOsRnIeRLLbGg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=LJao+ms5p15QT1W5aB9NeYZncCwkzWmTSSzyACuGHiI=;
 b=gUMUYIdZt/WdCjZArcvPOlc0yZsEF6rGo2JYfKf7GDmfPEfKsXdfKOjzz2otQk18l61nG0+RQMCqPozJ4jQ8f2angoA3BWQMxF7HGJd/dxqxRXCmOwGEyw9hlx0FmG4AVSVEuN7dpQ4BaxGnKejhyJpP9FkLdO1wvnwJBQNFAkVYngXJ2eLoN0puOdF9xDgN8Bp/TpY+QhQ4EE6pxCyIluKwtO7y7949ZfKcrl/7xrNI2keGZo5qHJJE9smMmOiFjld5AJJdK71SoMfl0kMqs5kmu8h2e/jaA0Y7KBZwbo4kilsHiNQSg8XOFPmtO7JLrpRbEx9LS0mEzqBlkZs+bQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=LJao+ms5p15QT1W5aB9NeYZncCwkzWmTSSzyACuGHiI=;
 b=RPn3rG3xw88Y2YBO5uUg9GcnrYYNNFkGHLfVB/Dluw+avIwX1zcfu3PxicM5gjKZi0uwa7TURxrYyc8DNFaMkJTJTWoWWob6FOsnt0cGXkkkx5i5GnD1Rrbbz67krKswikDUSfvD1395pbWtCI21ywIOo/EO07NFFXVAA9wVcA8=
Subject: Re: [PATCH v3 0/1] xen: fix HVM kexec kernel panic
From: Dongli Zhang <dongli.zhang@oracle.com>
To: Boris Ostrovsky <boris.ostrovsky@oracle.com>
Cc: linux-kernel@vger.kernel.org, jgross@suse.com, sstabellini@kernel.org,
        tglx@linutronix.de, mingo@redhat.com, bp@alien8.de,
        dave.hansen@linux.intel.com, hpa@zytor.com, joe.jin@oracle.com,
        xen-devel@lists.xenproject.org, x86@kernel.org
References: <20220224215049.2845-1-dongli.zhang@oracle.com>
 <9de1059b-6b48-e2c8-60bc-f29b42b217f7@oracle.com>
 <36014dbd-e63c-cf49-dafd-2d7a8b84db5d@oracle.com>
 <8e3e4716-22e7-8684-394c-b5a457906975@oracle.com>
 <a6d64481-cb70-d797-fafd-b827288f7e53@oracle.com>
Message-ID: <1a5a683d-17c8-9730-d2f5-745262430569@oracle.com>
Date: Mon, 28 Feb 2022 20:56:26 -0800
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
 Thunderbird/78.6.1
In-Reply-To: <a6d64481-cb70-d797-fafd-b827288f7e53@oracle.com>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: SN6PR05CA0006.namprd05.prod.outlook.com
 (2603:10b6:805:de::19) To BYAPR10MB2663.namprd10.prod.outlook.com
 (2603:10b6:a02:a9::20)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: b2b3718f-4061-48f6-351c-08d9fb3fda2e
X-MS-TrafficTypeDiagnostic: BN6PR10MB1330:EE_
X-Microsoft-Antispam-PRVS: 
	<BN6PR10MB1330272FB136104D25467F0AF0029@BN6PR10MB1330.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR10MB2663.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66476007)(5660300002)(4326008)(2906002)(6862004)(2616005)(66946007)(66556008)(8676002)(8936002)(44832011)(31696002)(7416002)(86362001)(36756003)(31686004)(38100700002)(316002)(186003)(83380400001)(6486002)(508600001)(37006003)(6636002)(53546011)(6506007)(6512007)(6666004)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?c2ZGUWplNUd6ZjBmM2VIb1JXb1NXVGNVSUwySG9ZTGdYc2l5MUZCVG5TWk9w?=
 =?utf-8?B?STA2Vm9tcFppK0N3d2Nud05xZ1dkbnhhTXZmQThOOWE2ckZjSFcyV2Qrc09Q?=
 =?utf-8?B?MEhYRDFYWmFxYmZNM3piNnVMK2ROL3lTWXlVMjZ0Wm9pTGRRSldIOXFQQ29v?=
 =?utf-8?B?L1hyMHZPcmg1SXJBaUtPTXJuRW5QcHc0TjFoZnNsV0swR2RWbVA2QlhPNXF0?=
 =?utf-8?B?Z29GeEpXRnhIY2ZOVG1zOE9Ecm1UUkp3TXgvTEQvdzBEWS95SDIxWmg4UTBk?=
 =?utf-8?B?Y3RKa0xBTGY4UzlTanZSV09uc1hDOUtkRisrTC9FL3psOFFkdi8rbW03OGNX?=
 =?utf-8?B?OG1JeVNiQytabDJNTGM2MjdFWGhFY25MZlFUSmZpbVRmdXZQRjRyYmF3NWJL?=
 =?utf-8?B?VG5LeDJ2cFV4WkhsaDdnd1V1RHg5eDdqRnV0S1lJVzNaNlJVeTNpelFtTERY?=
 =?utf-8?B?QlZLZHBlWFF1ekh4Q1pwR1Ixb0xlYS9YQ2JZcXVXU0pRZVUwWTBQV1hNSlZ1?=
 =?utf-8?B?UmFDRlRZR09BMUtyWUdkUk03OGVLRC9UODVJUXZOb2FhKzlwRFdwOHV0MkVE?=
 =?utf-8?B?a1VURWc2R1RWWjFhSTJQV1JyY2N4YXNzcGc0b3Q0RGJPZkFVVStiMXpRakNR?=
 =?utf-8?B?cXVySzU4QlBIU1crbmhaUGFmOVNVbVFlS3ByUEtEUlhZVGtGak1nRHZFK3Ra?=
 =?utf-8?B?UTVUM3pPZGFmOXp2YXBkNC9XWjRIaUkwRUZmUnhzYWlDb3FxSjErdjJSOVpp?=
 =?utf-8?B?aW45ZDZrNW90Y3U1c1ZoYzJWcVkyNkM5eUNkYnJKWDN6aVpMOXFqTk9tTjh3?=
 =?utf-8?B?NHJvcXEzU09JVkhURVdpMWoyekdGMmt2cXZ3MVhZNXZHNFI0OTMrUHVLeURE?=
 =?utf-8?B?Um1FUC9BTlJQQStOVWxLRDR2SkRRU2hpNU5FaGhkODhsaEpRZFhudndtUEhJ?=
 =?utf-8?B?dUF5aFZzYjNXYzMxMkpBYVFJWXlGbHg0YS8yci9OSkcvZk1YbVZvemtyRHE0?=
 =?utf-8?B?eUk2VkR6cC9XNjNXLzJaaGphMWQzT0RGUXZTYk1xVm0wSDIwemNZTlB6TlRl?=
 =?utf-8?B?LzNpREhTVkw1a0JsRGc1U1FIMUJyZVYwZWlxc2pkdk56UFJETEFOcmN6bVdu?=
 =?utf-8?B?RzhnT3JGNHl1VDd2WTcwOVdTRElIQ1FSd3pzVWo5ZWc3Uzk1Zi95bVZFdFNx?=
 =?utf-8?B?Zlo1T0JpSmNSZ2lnVWYwcDFUMVFOREpuV2RkdGVTeGFlYXVtTjlxcFBTQlo5?=
 =?utf-8?B?bUxUa0RsYk8xZVVuRE0rZFFqcm82dmZUYjVvMnUwWVRVSjJ4d1pkYlI4RTlo?=
 =?utf-8?B?WkFxUG5LTVhYNUxrVGgzSi9kOW9Zc3Z1WGFqWVZwZmNNcXBoVHlTdEF3NUp4?=
 =?utf-8?B?R0JpV3NqQnBVK2tvUEY0VkxlbWVtTHZyd3Y4WjYwazloZVh6dmVZdnB3NElo?=
 =?utf-8?B?MGhhbEM5QVNKNzBxdU1NSlRPZS9lVmNkaGRVeFM5SStFOUZKZDJISWUvaCtF?=
 =?utf-8?B?OFQwNzhjSzVnb29ZNExoRnFRS3FPallVQkFIWGphVEY1STVlU2g2aE9HSXpV?=
 =?utf-8?B?Z2JEUENYTXE0cTVmbElOai91TzRpV3gxNGV1bEFnTTNRbmZ3RFYzdXhOYkJD?=
 =?utf-8?B?L0JUWGM5cmVzZ3FCbDhlVFh6SlVwVHpyN1lMeVFJa1FHYzlwdHF0T2ZPVU9R?=
 =?utf-8?B?M3VKUkVwcEdEUFkvbTZDaFVIZmZVSjVidkxPWFNUWXMvelpYcUxFVytCVFVZ?=
 =?utf-8?B?OHBUTUtIcUtETnFDci9iWG1JUytKbkZjWWQ4em9LRlJEWnhDTzMzOGxnNkk5?=
 =?utf-8?B?OEtZMmxuV1dRVTAxOHpjVVlHVHJudTRXUmZRdzRQUmhjcnJLQnJUUUNQU2gv?=
 =?utf-8?B?R3I4cytMUXREbzlUNVp6bDIvZGdMT0xxSGxYL3ZKZFlPd0dQUFo4aEp6UUNB?=
 =?utf-8?B?eFl4ZTN1UHMxQ0R5Mnh0Unh3T2RFNmZsS0QzbEF2N1ZQR2RQMyt3U1MzRUNn?=
 =?utf-8?B?dTA1aTB0azkyTHB6Sk8xcTlaQ3U0TnNiZXN6QzdNVHl0NEl2ZjlGejJhc2Vt?=
 =?utf-8?B?NnZDYVVRKzA2dFRXZTRHTFdINlp6aVJubTMrMFE5NzgrWndzSVFNQlp0YnYz?=
 =?utf-8?B?S0Q0Snk1bG1aK01Jb0o1RHE4VFJCZWRWZXVRZjN6YXppUTVXZnJTZVptN1Va?=
 =?utf-8?Q?HTU38d7Sy7ye60KVUzVMQn3ZClOroy8mkY1yJWke0Qqc?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b2b3718f-4061-48f6-351c-08d9fb3fda2e
X-MS-Exchange-CrossTenant-AuthSource: BYAPR10MB2663.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 04:56:31.4577
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: SLixfZwBD75iN3cQKSuFDxkz1JO0Jz4EmgtE4Ezbo3yREhDVG9xWz8fAZAanNoKSwXbTJneJVFIf6mZ2JXaajw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR10MB1330
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10272 signatures=684655
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 bulkscore=0 malwarescore=0
 mlxscore=0 phishscore=0 suspectscore=0 adultscore=0 mlxlogscore=999
 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2201110000
 definitions=main-2203010022
X-Proofpoint-GUID: atJlFL40Xc3s-F2DQCPngG5HZCqmuX1l
X-Proofpoint-ORIG-GUID: atJlFL40Xc3s-F2DQCPngG5HZCqmuX1l

Hi Boris,

On 2/28/22 5:18 PM, Dongli Zhang wrote:
> Hi Boris,
> 
> On 2/28/22 12:45 PM, Boris Ostrovsky wrote:
>>
>>
>> On 2/25/22 8:17 PM, Dongli Zhang wrote:
>>> Hi Boris,
>>>
>>> On 2/25/22 2:39 PM, Boris Ostrovsky wrote:
>>>>
>>>> On 2/24/22 4:50 PM, Dongli Zhang wrote:
>>>>> This is the v3 of the patch to fix xen kexec kernel panic issue when the
>>>>> kexec is triggered on VCPU >= 32.
>>>>>
>>>>> PANIC: early exception 0x0e IP 10:ffffffffa96679b6 error 0 cr2 0x20
>>>>> [    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted
>>>>> 5.17.0-rc4xen-00054-gf71077a4d84b-dirty #1
>>>>> [    0.000000] Hardware name: Xen HVM domU, BIOS 4.4.4OVM 12/15/2020
>>>>> [    0.000000] RIP: 0010:pvclock_clocksource_read+0x6/0xb0
>>>>> ... ...
>>>>> [    0.000000] RSP: 0000:ffffffffaae03e10 EFLAGS: 00010082 ORIG_RAX:
>>>>> 0000000000000000
>>>>> [    0.000000] RAX: 0000000000000000 RBX: 0000000000010000 RCX:
>>>>> 0000000000000002
>>>>> [    0.000000] RDX: 0000000000000003 RSI: ffffffffaac37515 RDI:
>>>>> 0000000000000020
>>>>> [    0.000000] RBP: 0000000000011000 R08: 0000000000000000 R09:
>>>>> 0000000000000001
>>>>> [    0.000000] R10: ffffffffaae03df8 R11: ffffffffaae03c68 R12:
>>>>> 0000000040000004
>>>>> [    0.000000] R13: ffffffffaae03e50 R14: 0000000000000000 R15:
>>>>> 0000000000000000
>>>>> [    0.000000] FS:  0000000000000000(0000) GS:ffffffffab588000(0000)
>>>>> knlGS:0000000000000000
>>>>> [    0.000000] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
>>>>> [    0.000000] CR2: 0000000000000020 CR3: 00000000ea410000 CR4:
>>>>> 00000000000406a0
>>>>> [    0.000000] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
>>>>> 0000000000000000
>>>>> [    0.000000] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:
>>>>> 0000000000000400
>>>>> [    0.000000] Call Trace:
>>>>> [    0.000000]  <TASK>
>>>>> [    0.000000]  ? xen_clocksource_read+0x24/0x40
>>>>
>>>>
>>>> This is done to set xen_sched_clock_offset which I think will not be used for a
>>>> while, until sched_clock is called (and the other two uses are for
>>>> suspend/resume)
>>>>
>>>>
>>>> Can we simply defer 'xen_sched_clock_offset = xen_clocksource_read();' until
>>>> after all vcpu areas are properly set? Or are there other uses of
>>>> xen_clocksource_read() before ?
>>>>
>>>
>>> I have tested that below patch will panic kdump kernel.
>>>
>>
>>
>>
>> Oh well, so much for that then. Yes, sched_clock() is at least called from
>> printk path.
>>
>>
>> I guess we will have to go with v2 then, we don't want to start seeing time
>> going back, even if only with older hypervisors. The only thing I might ask is
>> that you roll the logic inside xen_hvm_init_time_ops(). Something like
>>
>>
>> xen_hvm_init_time_ops()
>> {
>>     /*
>>      * Wait until per_cpu(xen_vcpu, 0) is initialized which may happen
>>      * later (e.g. when kdump kernel runs on >=MAX_VIRT_CPUS vcpu)
>>      */
>>     if (__this_cpu_read(xen_vcpu_nr(0)) == NULL)
>>         return;
>>
> 
> I think you meant __this_cpu_read(xen_vcpu).
> 
> I will call xen_hvm_init_time_ops() at both places, and move the logic into
> xen_hvm_init_time_ops().
> 
> Thank you very much!
> 
> Dongli Zhang
> 


How about we do not move the logic into xen_hvm_init_time_ops()?

Suppose we move the logic into xen_hvm_init_time_ops() line 573, the line line
570 might be printed twice.


559 void __init xen_hvm_init_time_ops(void)
560 {
561         /*
562          * vector callback is needed otherwise we cannot receive interrupts
563          * on cpu > 0 and at this point we don't know how many cpus are
564          * available.
565          */
566         if (!xen_have_vector_callback)
567                 return;
568
569         if (!xen_feature(XENFEAT_hvm_safe_pvclock)) {
570                 pr_info("Xen doesn't support pvclock on HVM, disable pv timer");
571                 return;
572         }
573
574         xen_init_time_common();
575
576         x86_init.timers.setup_percpu_clockev = xen_time_init;
577         x86_cpuinit.setup_percpu_clockev = xen_hvm_setup_cpu_clockevents;
578
579         x86_platform.set_wallclock = xen_set_wallclock;
580 }

I feel the code looks better if we keep the logic at caller side. Would you mind
letting me know your feedback?

Thank you very much!

Dongli Zhang


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 05:27:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 05:27:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.280837.478918 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOv2j-0004R2-M3; Tue, 01 Mar 2022 05:27:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 280837.478918; Tue, 01 Mar 2022 05:27:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOv2j-0004Qv-Iy; Tue, 01 Mar 2022 05:27:25 +0000
Received: by outflank-mailman (input) for mailman id 280837;
 Tue, 01 Mar 2022 05:27:24 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nOv2i-0004Ql-85; Tue, 01 Mar 2022 05:27:24 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nOv2i-0005xS-3V; Tue, 01 Mar 2022 05:27:24 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nOv2h-0002rL-P6; Tue, 01 Mar 2022 05:27:23 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nOv2h-00053e-Od; Tue, 01 Mar 2022 05:27:23 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=3kE8N+j9reqVw4k6HFEVx6ZsdO2Pzy4RRPzb0qvMUoM=; b=XjFDtD6yURNI5R1nvfS98GXE8y
	vjSj9nTW8vbseuyaTOk8H8ivS4KysRPQhkOLcqM5vyDBLMTEmwxVDIvcGQzd0a30eTHFJqAZfXLo/
	T5MLpBmOjkDJgmhR2XSP5t4oruSmUtExDFDmQJDIakghcuuftdvLSuwnSTJTfgyhzTNM=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168262-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168262: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=497ac7b6d7f9750f48f137db244931a5728b1968
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 01 Mar 2022 05:27:23 +0000

flight 168262 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168262/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 497ac7b6d7f9750f48f137db244931a5728b1968
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    0 days
Failing since        168258  2022-03-01 01:55:31 Z    0 days    2 attempts
Testing same since   168262  2022-03-01 04:10:26 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 06:05:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 06:05:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.280850.478936 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOvcf-0000Po-OX; Tue, 01 Mar 2022 06:04:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 280850.478936; Tue, 01 Mar 2022 06:04:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOvcf-0000Ph-Kd; Tue, 01 Mar 2022 06:04:33 +0000
Received: by outflank-mailman (input) for mailman id 280850;
 Tue, 01 Mar 2022 06:04:32 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nOvce-0000PX-Ii; Tue, 01 Mar 2022 06:04:32 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nOvce-0006db-Fd; Tue, 01 Mar 2022 06:04:32 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nOvce-0004YH-1g; Tue, 01 Mar 2022 06:04:32 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nOvcd-0005vl-Vx; Tue, 01 Mar 2022 06:04:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=GUjq5DS0H8ZWN+GCgXzb0mB9+LP9ZuRWPeQ2YTKaPRU=; b=hFG4CwhkSrTqWgKYvYe1GcZCXo
	Re2JaFxsi0QkCkNEqeHHuU4lXjJ3Na3kChCQuri6XNCmJ/szcISY/2Y0PY6hBJAWOjk++Xpq4K5MX
	mORDrGWQqfRg5AkvbeJSMRFKWemdmUh+dIO6N3ukcdm3JuteVhgM2D06LCMjoF/2RXqw=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168256-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168256: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-freebsd12-amd64:guest-localmigrate/x10:fail:heisenbug
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=719fce7539cd3e186598e2aed36325fe892150cf
X-Osstest-Versions-That:
    linux=7e57714cd0ad2d5bb90e50b5096a0e671dec1ef3
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 01 Mar 2022 06:04:31 +0000

flight 168256 linux-linus real [real]
flight 168261 linux-linus real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168256/
http://logs.test-lab.xenproject.org/osstest/logs/168261/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-freebsd12-amd64 19 guest-localmigrate/x10 fail pass in 168261-retest

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168250
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168250
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168250
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168250
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168250
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168250
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168250
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168250
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass

version targeted for testing:
 linux                719fce7539cd3e186598e2aed36325fe892150cf
baseline version:
 linux                7e57714cd0ad2d5bb90e50b5096a0e671dec1ef3

Last test of basis   168250  2022-02-28 03:45:58 Z    1 days
Testing same since   168256  2022-02-28 21:11:14 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Adam Ford <aford173@gmail.com>
  Alyssa Ross <hi@alyssa.is>
  Andy Shevchenko <andriy.shevchenko@linux.intel.com>
  Anthoine Bourgeois <anthoine.bourgeois@gmail.com>
  Ard Biesheuvel <ardb@kernel.org>
  Arnd Bergmann <arnd@arndb.de>
  Brian Norris <briannorris@chromium.org>
  Christophe JAILLET <christophe.jaillet@wanadoo.fr>
  Claudiu Beznea <claudiu.beznea@microchip.com>
  Corentin Labbe <clabbe@baylibre.com>
  Dinh Nguyen <dinguyen@kernel.org>
  Frank Wunderlich <frank-w@public-files.de>
  Heiko Stuebner <heiko@sntech.de>
  Jakob Unterwurzacher <jakob.unterwurzacher@theobroma-systems.com>
  Jann Horn <jannh@google.com>
  Jason Wang <wangborong@cdjrlc.com>
  Jens Wiklander <jens.wiklander@linaro.org>
  Jiasheng Jiang <jiasheng@iscas.ac.cn>
  Krzysztof Kozlowski <krzysztof.kozlowski@canonical.com>
  Laurent Pinchart <laurent.pinchart@ideasonboard.com>
  Li Yang <leoyang.li@nxp.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Liviu Dudau <liviu.dudau@arm.com>
  Ludovic Desroches <ludovic.desroches@microchip.com>
  Michael Riesch <michael.riesch@wolfvision.net>
  Nicolas Ferre <nicolas.ferre@microchip.com>
  Peng Fan <peng.fan@nxp.com>
  Peter Geis <pgwipeout@gmail.com>
  Quentin Schulz <quentin.schulz@theobroma-systems.com>
  Rob Herring <robh@kernel.org>
  Robin Murphy <robin.murphy@arm.com>
  Sascha Hauer <s.hauer@pengutronix.de>
  Shawn Guo <shawnguo@kernel.org>
  Sudeep Holla <sudeep.holla@arm.com>
  Sunil V L <sunilvl@ventanamicro.com>
  Thierry Reding <treding@nvidia.com>
  Tony Lindgren <tony@atomide.com>
  Yang Yingliang <yangyingliang@huawei.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             fail    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   7e57714cd0ad..719fce7539cd  719fce7539cd3e186598e2aed36325fe892150cf -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 06:27:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 06:27:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.280865.478953 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOvyr-0003By-PK; Tue, 01 Mar 2022 06:27:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 280865.478953; Tue, 01 Mar 2022 06:27:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOvyr-0003Bo-MF; Tue, 01 Mar 2022 06:27:29 +0000
Received: by outflank-mailman (input) for mailman id 280865;
 Tue, 01 Mar 2022 06:27:28 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nOvyq-0003Bc-6T; Tue, 01 Mar 2022 06:27:28 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nOvyq-00070o-3q; Tue, 01 Mar 2022 06:27:28 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nOvyp-0005n9-RK; Tue, 01 Mar 2022 06:27:27 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nOvyp-0007fF-Qr; Tue, 01 Mar 2022 06:27:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=7VnbeE2zxxy6ly0ZJp/U+J/Xm0VyvoH4HWvXZbtUYX0=; b=29CUsWpMm1TaE293EPxEKd5EUa
	Qi1atBTDq/IRLdmh/2uzdacgd6CfGwVWKtim5inMI6MIXjTA8tv4CAPtfbm/ZUCsk1kyUoWexygOM
	eV9WSgRAf4b8euWkCYIoEsOkivlwm8iTTHHf+MOBuvS3OAfck5E44eED463hVaudnlqE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168267-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168267: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=497ac7b6d7f9750f48f137db244931a5728b1968
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 01 Mar 2022 06:27:27 +0000

flight 168267 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168267/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 497ac7b6d7f9750f48f137db244931a5728b1968
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    0 days
Failing since        168258  2022-03-01 01:55:31 Z    0 days    3 attempts
Testing same since   168262  2022-03-01 04:10:26 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 06:30:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 06:30:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.280876.478964 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOw1I-0003nC-8S; Tue, 01 Mar 2022 06:30:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 280876.478964; Tue, 01 Mar 2022 06:30:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOw1I-0003n5-4c; Tue, 01 Mar 2022 06:30:00 +0000
Received: by outflank-mailman (input) for mailman id 280876;
 Tue, 01 Mar 2022 06:29:58 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQ5=TM=arm.com=Wei.Chen@srs-se1.protection.inumbo.net>)
 id 1nOw1G-0003mx-Op
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 06:29:58 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04on0613.outbound.protection.outlook.com
 [2a01:111:f400:fe0d::613])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 02e5577f-9929-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 07:29:56 +0100 (CET)
Received: from DB7PR03CA0101.eurprd03.prod.outlook.com (2603:10a6:10:72::42)
 by AM8PR08MB6322.eurprd08.prod.outlook.com (2603:10a6:20b:361::14) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.22; Tue, 1 Mar
 2022 06:29:55 +0000
Received: from DB5EUR03FT064.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:72:cafe::46) by DB7PR03CA0101.outlook.office365.com
 (2603:10a6:10:72::42) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26 via Frontend
 Transport; Tue, 1 Mar 2022 06:29:55 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT064.mail.protection.outlook.com (10.152.21.199) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Tue, 1 Mar 2022 06:29:54 +0000
Received: ("Tessian outbound 1f399c739551:v113");
 Tue, 01 Mar 2022 06:29:54 +0000
Received: from 75cbe0c61b86.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 860FB1B7-6B12-4777-A6AE-3E08BE806D5C.1; 
 Tue, 01 Mar 2022 06:29:48 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 75cbe0c61b86.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 01 Mar 2022 06:29:48 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com (2603:10a6:102:2b9::9)
 by AM8PR08MB6611.eurprd08.prod.outlook.com (2603:10a6:20b:36b::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.24; Tue, 1 Mar
 2022 06:29:36 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa]) by PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa%4]) with mapi id 15.20.5017.026; Tue, 1 Mar 2022
 06:29:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 02e5577f-9929-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=569+K7VJtERt2TIYl+OHCZ9vzeGA5TWw0XVMsfKP690=;
 b=m5ixOASo2NsqKF5wrjjlVa9eoLG8c55zCzA1pxw9buASedo8dYVCQ6QVQaU4tPXLsXZXRzsN1/afAMDuwyqcO4MQ3N4qHhu70kq1yXcQ7M4+0L7mVLIRpWNKshIwPHYkjin00sLBKKzaPXSN2BTPAqhmAAa5y0/fEu48v9bXE58=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=fIcf+jGPgI4us+TiBWqTBxS2tFvAO4KkTAKgxhq8N1bo+6PIik9VdJNbatIWD7XgK00dF4ZqXaIokXRvODbSgWdJL/6SASGmERVwMwRJoQVxQXEOh7xO4KUV8w2micIBaQdur6WY3YjMgxATMExKLYVtugZL5haru3TOVNkUEMl0G19lvTyHfFMKi9L5cHpk8qTFM3mBgUioFLdDdglTq/6kEuByVFWe0ETd8Wd2YgdhBA+evwXT1bpfLVa9ufDTUqBu9TLz5s5iF90Z4ZEw26O5m8tB/55cemouKkCLn/ej6wF9tv4rZd33tbMv6ZGu+jEATjIMLlhGAmltDv7Vrw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=569+K7VJtERt2TIYl+OHCZ9vzeGA5TWw0XVMsfKP690=;
 b=eQUPs3Jw+uaaOtjrqGlcw8VjpbmtpPIcuXzKDzY1y/YoMbVkq9KJlFMZpQ+x/+/cJbnL5DFnshtd9d9YvBNu9VH4O99KFAV82AODrDSFCTLo7Z4MyTw3tzj7hVKD/51UK2hDI8unQfb8HeZSzTp2mcUCTWlyOAGobpxxph5fo4f2bYlERAyQYERM4i9F0JMvHT36NjbIOe+s5C820fR70oNRIfVwUlv9bQwNgqh6eXDskrFIkDoD2PlzTfvctinsIC5E+XIVEn+SB4fYrFhIqvIwLVXa8otfcHwRdEqA6WJjeQYb+zls8S0OQbo1IgBC2iN83GDoGkzBJkgKb5UCwg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=569+K7VJtERt2TIYl+OHCZ9vzeGA5TWw0XVMsfKP690=;
 b=m5ixOASo2NsqKF5wrjjlVa9eoLG8c55zCzA1pxw9buASedo8dYVCQ6QVQaU4tPXLsXZXRzsN1/afAMDuwyqcO4MQ3N4qHhu70kq1yXcQ7M4+0L7mVLIRpWNKshIwPHYkjin00sLBKKzaPXSN2BTPAqhmAAa5y0/fEu48v9bXE58=
From: Wei Chen <Wei.Chen@arm.com>
To: Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	Bertrand Marquis <Bertrand.Marquis@arm.com>, Penny Zheng
	<Penny.Zheng@arm.com>, Henry Wang <Henry.Wang@arm.com>, nd <nd@arm.com>
Subject: RE: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Topic: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Index: AdgpQxtXwh7LkfydTgiYk9bhMgU+ogAn0mUAABEK2UAAF1ylAACsO9Yw
Date: Tue, 1 Mar 2022 06:29:36 +0000
Message-ID:
 <PAXPR08MB74200F4B0B4EFFD5BE1A6E699E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
References:
 <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2202241606450.239973@ubuntu-linux-20-04-desktop>
 <AS1PR08MB74269923288B75097392BDD99E3E9@AS1PR08MB7426.eurprd08.prod.outlook.com>
 <4c558f8f-56d4-0445-32d4-169bc5d0a3bc@xen.org>
In-Reply-To: <4c558f8f-56d4-0445-32d4-169bc5d0a3bc@xen.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: AEAD95AB30517741B057DA32500378FD.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 86ebe9b8-4430-4631-d23d-08d9fb4ce63d
x-ms-traffictypediagnostic:
	AM8PR08MB6611:EE_|DB5EUR03FT064:EE_|AM8PR08MB6322:EE_
X-Microsoft-Antispam-PRVS:
	<AM8PR08MB6322C283C05710115BDEF5EC9E029@AM8PR08MB6322.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAXPR08MB7420.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(110136005)(52536014)(86362001)(55016003)(66446008)(8676002)(64756008)(33656002)(4326008)(186003)(26005)(66946007)(76116006)(66556008)(66476007)(83380400001)(316002)(6506007)(9686003)(122000001)(53546011)(7696005)(508600001)(38100700002)(8936002)(71200400001)(38070700005)(54906003)(5660300002)(2906002);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM8PR08MB6611
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT064.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	0589c3a8-88ab-4ab0-67df-08d9fb4cdb2f
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(54906003)(8676002)(70586007)(70206006)(316002)(110136005)(8936002)(508600001)(36860700001)(52536014)(40460700003)(4326008)(81166007)(7696005)(53546011)(9686003)(5660300002)(47076005)(2906002)(6506007)(356005)(33656002)(55016003)(336012)(82310400004)(83380400001)(86362001)(186003)(26005);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 06:29:54.8533
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 86ebe9b8-4430-4631-d23d-08d9fb4ce63d
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT064.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM8PR08MB6322
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From xen-devel-bounces@lists.xenproject.org Tue Mar 01 07:38:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 07:38:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.280891.478999 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOx4x-0003Ni-HJ; Tue, 01 Mar 2022 07:37:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 280891.478999; Tue, 01 Mar 2022 07:37:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOx4x-0003Nb-Dy; Tue, 01 Mar 2022 07:37:51 +0000
Received: by outflank-mailman (input) for mailman id 280891;
 Tue, 01 Mar 2022 07:37:50 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nOx4w-0003NR-Jb; Tue, 01 Mar 2022 07:37:50 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nOx4w-0008F5-GN; Tue, 01 Mar 2022 07:37:50 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nOx4w-0008Tq-AG; Tue, 01 Mar 2022 07:37:50 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nOx4w-0005D5-9n; Tue, 01 Mar 2022 07:37:50 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Message-Id:Subject:To;
	bh=cJFYca+8qQgwK28LMsYF5pBUqgNZoRvd9AkLD9JKL5Y=; b=ZS1pBwg1uL+VO/iXCP2NgRl8Zr
	DAePsWkfAGJOcCZ3CaK1UjgcwNrxuKRwxm0ygw2aggGf9x83ErbNdfWOljTJ1hggo6uHtehn+SO1I
	Q4FfjzDraqmt3FIBQR4+wAmTjWjvuswD0wrIgNknE7zV7iRrat/MSC1Y+CKlXVGS2V18=;
To: xen-devel@lists.xenproject.org
Subject: [ovmf bisection] complete build-amd64-xsm
Message-Id: <E1nOx4w-0005D5-9n@osstest.test-lab.xenproject.org>
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 01 Mar 2022 07:37:50 +0000

branch xen-unstable
xenbranch xen-unstable
job build-amd64-xsm
testid xen-build

Tree: ovmf https://github.com/tianocore/edk2.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: seabios git://xenbits.xen.org/osstest/seabios.git
Tree: xen git://xenbits.xen.org/xen.git

*** Found and reproduced problem changeset ***

  Bug is in tree:  ovmf https://github.com/tianocore/edk2.git
  Bug introduced:  d3febfd9ade35dc552df6b3607c2b15d26b82867
  Bug not present: 84338c0d498555f860a480693ee8647a1795fba3
  Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/168274/


  commit d3febfd9ade35dc552df6b3607c2b15d26b82867
  Author: Jason <yun.lou@intel.com>
  Date:   Mon Jan 10 21:46:27 2022 +0800
  
      MdePkg: Replace Opcode with the corresponding instructions.
      
      REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
      
      Replace Opcode with the corresponding instructions.
      The code changes have been verified with CompareBuild.py tool, which
      can be used to compare the results of two different EDK II builds to
      determine if they generate the same binaries.
      (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
      
      Signed-off-by: Jason Lou <yun.lou@intel.com>
      Cc: Michael D Kinney <michael.d.kinney@intel.com>
      Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
      Cc: Zhiguang Liu <zhiguang.liu@intel.com>


For bisection revision-tuple graph see:
   http://logs.test-lab.xenproject.org/osstest/results/bisect/ovmf/build-amd64-xsm.xen-build.html
Revision IDs in each graph node refer, respectively, to the Trees above.

----------------------------------------
Running cs-bisection-step --graph-out=/home/logs/results/bisect/ovmf/build-amd64-xsm.xen-build --summary-out=tmp/168274.bisection-summary --basis-template=168254 --blessings=real,real-bisect,real-retry ovmf build-amd64-xsm xen-build
Searching for failure / basis pass:
 168267 fail [host=himrod1] / 168254 [host=himrod2] 168249 [host=himrod2] 168232 ok.
Failure / basis pass flights: 168267 / 168232
(tree with no url: minios)
Tree: ovmf https://github.com/tianocore/edk2.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: seabios git://xenbits.xen.org/osstest/seabios.git
Tree: xen git://xenbits.xen.org/xen.git
Latest 497ac7b6d7f9750f48f137db244931a5728b1968 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
Basis pass 54cddc3ad4b3a317985ce5f491f9b1f31ab10dd8 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 9ba4c529985a1773852069889a5b53f2ed26c408
Generating revisions with ./adhoc-revtuple-generator  https://github.com/tianocore/edk2.git#54cddc3ad4b3a317985ce5f491f9b1f31ab10dd8-497ac7b6d7f9750f48f137db244931a5728b1968 git://xenbits.xen.org/qemu-xen-traditional.git#3d273dd05e51e5a1ffba3d98c7437ee84e8f8764-3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 git://xenbits.xen.org/qemu-xen.git#a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42-a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 git://xenbits.xen.org/osstest/seabios.git#829b0f1a7cda1bccdf44a379fb3a96e519a7e8\
 cd-829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd git://xenbits.xen.org/xen.git#9ba4c529985a1773852069889a5b53f2ed26c408-4388144c44c4dd9e9b7df97938ef08ffa85eec07
Loaded 10001 nodes in revision graph
Searching for test results:
 168232 pass 54cddc3ad4b3a317985ce5f491f9b1f31ab10dd8 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 9ba4c529985a1773852069889a5b53f2ed26c408
 168249 [host=himrod2]
 168254 [host=himrod2]
 168258 fail 6a890db161cd6d378bec3499a1e774db3f5a27a7 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168259 pass 54cddc3ad4b3a317985ce5f491f9b1f31ab10dd8 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 9ba4c529985a1773852069889a5b53f2ed26c408
 168260 fail 6a890db161cd6d378bec3499a1e774db3f5a27a7 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168263 pass 54cddc3ad4b3a317985ce5f491f9b1f31ab10dd8 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 1449f6873d7dd477ba110b415ca08a3c2553451e
 168265 pass de463163d9f6d3c5dc6b55ff35d1e5676e0e1b9f 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168262 fail 497ac7b6d7f9750f48f137db244931a5728b1968 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168266 pass 84338c0d498555f860a480693ee8647a1795fba3 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168268 fail 7bc8b1d9f412507d579f21ea9af56fced81e7827 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168267 fail 497ac7b6d7f9750f48f137db244931a5728b1968 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168269 fail d3febfd9ade35dc552df6b3607c2b15d26b82867 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168270 pass 84338c0d498555f860a480693ee8647a1795fba3 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168272 fail d3febfd9ade35dc552df6b3607c2b15d26b82867 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168273 pass 84338c0d498555f860a480693ee8647a1795fba3 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168274 fail d3febfd9ade35dc552df6b3607c2b15d26b82867 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
Searching for interesting versions
 Result found: flight 168232 (pass), for basis pass
 For basis failure, parent search stopping at 84338c0d498555f860a480693ee8647a1795fba3 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07, results HASH(0x55de963d98b0) HASH(0x55de963e9dc0) HASH(0x55de963ecb70) For basis failure, parent search stopping at de463163d9f6d3c5dc6b55ff35d1e5676e0e1b9f 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7\
 cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07, results HASH(0x55de963dd8c0) For basis failure, parent search stopping at 54cddc3ad4b3a317985ce5f491f9b1f31ab10dd8 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 1449f6873d7dd477ba110b415ca08a3c2553451e, results HASH(0x55de963ca7a8) For basis failure, parent search stopping at 54cddc3ad4b3a317985ce5f491f9b1f31ab10dd8 3d273dd05e51e5a1ffba3d98c7437ee\
 84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 9ba4c529985a1773852069889a5b53f2ed26c408, results HASH(0x55de963d2670) HASH(0x55de963d78a8) Result found: flight 168258 (fail), for basis failure (at ancestor ~5258)
 Repro found: flight 168259 (pass), for basis pass
 Repro found: flight 168262 (fail), for basis failure
 0 revisions at 84338c0d498555f860a480693ee8647a1795fba3 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
No revisions left to test, checking graph state.
 Result found: flight 168266 (pass), for last pass
 Result found: flight 168269 (fail), for first failure
 Repro found: flight 168270 (pass), for last pass
 Repro found: flight 168272 (fail), for first failure
 Repro found: flight 168273 (pass), for last pass
 Repro found: flight 168274 (fail), for first failure

*** Found and reproduced problem changeset ***

  Bug is in tree:  ovmf https://github.com/tianocore/edk2.git
  Bug introduced:  d3febfd9ade35dc552df6b3607c2b15d26b82867
  Bug not present: 84338c0d498555f860a480693ee8647a1795fba3
  Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/168274/


  commit d3febfd9ade35dc552df6b3607c2b15d26b82867
  Author: Jason <yun.lou@intel.com>
  Date:   Mon Jan 10 21:46:27 2022 +0800
  
      MdePkg: Replace Opcode with the corresponding instructions.
      
      REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
      
      Replace Opcode with the corresponding instructions.
      The code changes have been verified with CompareBuild.py tool, which
      can be used to compare the results of two different EDK II builds to
      determine if they generate the same binaries.
      (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
      
      Signed-off-by: Jason Lou <yun.lou@intel.com>
      Cc: Michael D Kinney <michael.d.kinney@intel.com>
      Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
      Cc: Zhiguang Liu <zhiguang.liu@intel.com>

Revision graph left in /home/logs/results/bisect/ovmf/build-amd64-xsm.xen-build.{dot,ps,png,html,svg}.
----------------------------------------
168274: tolerable ALL FAIL

flight 168274 ovmf real-bisect [real]
http://logs.test-lab.xenproject.org/osstest/logs/168274/

Failures :-/ but no regressions.

Tests which did not succeed,
including tests which could not be run:
 build-amd64-xsm               6 xen-build               fail baseline untested


jobs:
 build-amd64-xsm                                              fail    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 07:43:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 07:43:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.280905.479012 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOxA9-0004r2-Ag; Tue, 01 Mar 2022 07:43:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 280905.479012; Tue, 01 Mar 2022 07:43:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOxA9-0004qv-7U; Tue, 01 Mar 2022 07:43:13 +0000
Received: by outflank-mailman (input) for mailman id 280905;
 Tue, 01 Mar 2022 07:43:11 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nOxA7-0004qp-Sw
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 07:43:11 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 3df022c4-9933-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 08:43:10 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2113.outbound.protection.outlook.com [104.47.18.113]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-22-j-vCEuMeNjuw-6_NMlmtOA-1; Tue, 01 Mar 2022 08:43:09 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR04MB4900.eurprd04.prod.outlook.com (2603:10a6:208:c9::10)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.25; Tue, 1 Mar
 2022 07:43:08 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 07:43:08 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3df022c4-9933-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646120590;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=w5DX0udg4woY/xz8lzpN0tu8Ytb/rhBWFqUXG783oug=;
	b=hJOrupEBY80+m9q4DUwkS4oT91NOiY4DqeIF17XaRPU+eNmMIUgEG1ESEfsvVqFeaLkHaD
	zfx5FFelvMJOospqgMNcx/U/uTwX2VkkOWpBExq8cbKMlOSWkmkYzZHmcVyYq/eqPyt5Ac
	azIaU+Id+mmWS+kSimOmWFmunL31pQQ=
X-MC-Unique: j-vCEuMeNjuw-6_NMlmtOA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=DZUMm/tST9bd9eWlDck8VsycV/xbT6PPKlJvWvUPRZuKY2QPteJMeR9Pu15uperTJ+lxt1F4cafxgjEd9489RCDo9o3d91PKD1onc14WWVRshLF9XoCvvmrCwqrUx470R4QoRh2o6KQoN3jj2idzAXQYMLXqCz7nnaKYV7gVhBGAp9aqUCtaWUIFbrqHemqt+xtYaWZz4nRTTgIC6nL4zfBabHWrZkiDQe4Z/umtSvOW3+2qBN9opm8eQ5SQl9/3/YSwXR9hTktXYRLynIOhkdZgKA95J8Xw/0M3npbp94/movyPy26QNubCVfS6TT3EbvC5st/3gQTxT3wYvZB4ew==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=w5DX0udg4woY/xz8lzpN0tu8Ytb/rhBWFqUXG783oug=;
 b=aytmH14XCewHVyZnE5wvnbRDzWfurqgCQEZeCVvu1vLugg+ilkBvam5oAWAx9qG2pxFN5vhxAacOPLxgWhHEg/+fzsgEAFSHUFLYR98tLTnCevt4gUJL6iG7qib8dyBs9xYGNmqGKDF4zWmmB5tfziUiE+pkuGxgSNANfVku9o0rofaoApfOFo3UCtUpPTvQtqErkY1hdeXFKAtVjdfRSFz8EhPg/JRNvmki46FfwbX53tit/u34lBygUV7T07GGm0KDWnEK1BVUFKoUiJbGfPylk/H4wH2iVR8LpMtiJu1DCnKBPrxRh45vSIBiPjpN2g8VxUBcyiPALVX43aTJng==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <fc21f371-9eda-f2bf-677c-e1e25ee5084a@suse.com>
Date: Tue, 1 Mar 2022 08:43:06 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v2 2/2] vpci/msix: fix PBA accesses
Content-Language: en-US
To: Alex Olson <this.is.a0lson@gmail.com>
Cc: xen-devel@lists.xenproject.org, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?=
 <roger.pau@citrix.com>
References: <20220225153956.1078-1-roger.pau@citrix.com>
 <20220225153956.1078-3-roger.pau@citrix.com>
 <d8da3251985684ab9099ce95a8329a7e35535a7b.camel@gmail.com>
 <Yhn8rzRIC/TNiPv2@Air-de-Roger>
 <3986c91f62cb1bf3a042f669c40b900653f1ab51.camel@gmail.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <3986c91f62cb1bf3a042f669c40b900653f1ab51.camel@gmail.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P195CA0005.EURP195.PROD.OUTLOOK.COM
 (2603:10a6:209:81::18) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 9c81a05d-8e24-4ef7-cae7-08d9fb5720c8
X-MS-TrafficTypeDiagnostic: AM0PR04MB4900:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB49006B35FEC8CB205BCDC045B3029@AM0PR04MB4900.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6486002)(36756003)(53546011)(31696002)(2616005)(6506007)(86362001)(508600001)(26005)(186003)(66556008)(6916009)(8676002)(4326008)(66946007)(66476007)(38100700002)(5660300002)(31686004)(8936002)(6512007)(316002)(2906002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?ZnJqRXdoUFdLWHN5NTkway9KRGJoeHhFV3JESGhSZFRiQlNHdFVYT2gybGZn?=
 =?utf-8?B?b3BvZDc0RDZVN0pIckVQbmJTZG9scm82WnpJNzZ3aXVxeUtheFEzL0JMTG52?=
 =?utf-8?B?Qno2U2lLRGVQZXNVZ3VXQlJFdjd6aUdWUWNxNFdOMEFRVVdoS1dyODA4V0Rl?=
 =?utf-8?B?amM5OVNRMUwwaHNLbk5wdXlBQmhzYStzOE5DTDZ0TmZjMG5zZXB2T1Q5Uncr?=
 =?utf-8?B?RDdCcDNLcFI4L0tYa1FCOUV2QzZqQmRoeEdiZmxqK0prSEhmc1hKekx0eDBt?=
 =?utf-8?B?SWJvRFB4VWhjUmZQZnc0dlBJSldDQVBQN3ZjbVFSU1RBdWZTK2VuRmdRTGps?=
 =?utf-8?B?bjhiZU1XOC80UnE3M2lmdS9NN0tTcHBjemdJeENHZThwSTJ4RmdmMGROakFu?=
 =?utf-8?B?Sk1JOGNwN3g1VzdjSEw2cVhsQjZveUJJOEFIanBxcUxOK0NzdUlaUlRsS1ls?=
 =?utf-8?B?eG14UCt1d3pubHQvZHk3Znpka1plVzg1WlYzaWtlVUR1bXhiN3MrV25mMVlP?=
 =?utf-8?B?b2V1cFBmTVpDYW1OOUZOdXlLc1hkRTlrTzBycGtNaktrcCtEMGk2OUR1RVJa?=
 =?utf-8?B?YitlL0NmcFdHL05xTEQydU9UdUtQTi9Vd3prRWg5dlJjQS9vQTNDTVFxUmFH?=
 =?utf-8?B?Z01MRlpLOHgyQUdiZTRiYVZsZHRHS09lM053OUVvV3hrbmFuSlRVaHU5cUlO?=
 =?utf-8?B?dTIzUG43K25OZ0UwL1V2QWd2eUxtZFVWRUFmU2lDZHZwZTJLWjlHenRFMmdh?=
 =?utf-8?B?ZVVKSkZ3cmNrM0VzN1NyQTE5WXlURTZkNERkWGR0MkhlakI2eExJOUY4WFpC?=
 =?utf-8?B?elV6TFdTNjBnanh0RzdvdFArUUdDQzNRaTd5N2h0TFppa3ViUVJEcmxnMzNj?=
 =?utf-8?B?a0p0SkdLTWpUdUxsNDU0ekZQNG9uQWdJUUZlRVlIWTB1bEh6RlhRSzIxUFhx?=
 =?utf-8?B?Mmk1L2JzL1dRdkhXQmZpY0tYbktKRktzQkVEYzV0WU9oeDhvZGNabDFHN1ZJ?=
 =?utf-8?B?Und6N0VYaFZ5YUZIckthQ1pxeVE4SlJ3QTFRMXBraWJEOS9OSEpjeGFtakhx?=
 =?utf-8?B?VllqSDhwWFpkUW90SS9Oc2JkanRvbUxkaHZVR3F1WTNvMjB1N3BmWjR1b21X?=
 =?utf-8?B?ZzFMMTZKMGhyVlkySXErRWc3akdleVBlOGlQb0RqT0RDTjQ5UCs0MDhPc1pn?=
 =?utf-8?B?OUNjclZycU05MkhZeDFYZVdwNnZ6VlVHcFc0dDFKb1BJajI5Mzdja3FUMW42?=
 =?utf-8?B?UGQ1ME4vQ3pqTHlYalUyU3dnbnlKSnRDcmRXdzZoYU9FYmw1V1dlSVBYeTN6?=
 =?utf-8?B?ejBKOVJRdjVuZUlsdzBYYTJFZHRKbEFTOFJROVdodTdSY0d2dlFTbXV4bmEx?=
 =?utf-8?B?RFVHMHorblJXVkR6ZXczTVpZcytNODB0RDAwbWE5Mm1SOW9GbTh1V2hFMmRK?=
 =?utf-8?B?cmE0cU5ZSXJHU2lsZXlWN1hzM2JsQlFlWjJoZ1NkcTJxZTRSY1NMVWUzMUhk?=
 =?utf-8?B?T2lJYkwwRDhyMFBYRGNpUWxJTDhRNXE0RnhyNTR5Uk1BZzFORVdrWHdiWHdk?=
 =?utf-8?B?cHQyK3BseVBrc2NrUS9aZWJPOTJqNlFiZElXM2RQSVAvMU96YncxVks3dUt5?=
 =?utf-8?B?ZXdkMlpsZlJaS3pQMGhJeGtJQ3Y3R0c2Y1hTNVgvSUIyOVUxekdpcy9XU291?=
 =?utf-8?B?Wkx2NENDTUpUdUVlZ2Y2ZGNPcHkzV0dwWlcycS9acW43eEE4ZDlIdUZJd2ps?=
 =?utf-8?B?c3VHcVFPSHlyMVZFTmFqUk81MGpBZTdMSEdTQ2FyTUJ4YWFxRmYwdHoyb1Zm?=
 =?utf-8?B?bXplVGFjK3RMak12WVQzYWNVTm5GbW1YTzNVVCtGNVY5SDFya0FhN0tqWXV3?=
 =?utf-8?B?THpaVkhXU0NvR2lkSWN4UFJ2V2I5RlRSSHpITUJLZlBRYlY1K1crb1VvN2dY?=
 =?utf-8?B?T2lvQlZCaUVka3FWSlp3eFNHS3lvZnJKTWU1TjlEZHBaQ3E4Vi9UM3phR3dr?=
 =?utf-8?B?Sk1CUUhuTnpoTWd5Z1pLRHJtb0VuZW1CL3owMjV3YU5JYllWRUI3cm9TL2sy?=
 =?utf-8?B?cjJHU3FQd040UVdjZ2hCV0k4Z0VjWGtyNzF6U3NsNForVzEwMlBuZXh5V1hW?=
 =?utf-8?B?VEVCUWJtUTB5YTd4Z3pCVE9ON3EwQklRdXVKNFBLOFBwdWhUQnpBb2RaZmNq?=
 =?utf-8?Q?NdvruEjPNmaxPcxKVBAX3ag=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 9c81a05d-8e24-4ef7-cae7-08d9fb5720c8
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 07:43:08.1954
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: J9Jm2vABpuFPMWAfg7ecOsbIU871L5o9z8jYee2CxTDm8Fsuni7jSxYsvUXeH9B5u9Jk2NgoX+rxJHRdPHBIyA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB4900

On 28.02.2022 19:19, Alex Olson wrote:
> FYI, with this patch,  I was seeing  msix_read() and msix_write() being called
> during the driver's self-test on physical address 0xfbc01800, corresponding to
> the beginning of the PBA (lspci excerpt below):
> 
> 
> 02:00.0 System peripheral: Intel Corporation Xeon Processor D Family QuickData Technology Register DMA Channel 0
> ...
>         Region 0: Memory at fbc06000 (64-bit, non-prefetchable) [size=8K]
> ...
>         Capabilities: [ac] MSI-X: Enable+ Count=1 Masked-
>                 Vector table: BAR=0 offset=00001000
>                 PBA: BAR=0 offset=00001800
> ...
>         Kernel modules: ioatdma
> 
> 
> 
> The functions involved on the Linux kernel side are:
> 
> ioat_probe()
>  -> ioat3_dma_self_test()
>   -> ioat_dma_self_test()
>    -> ioat_free_chan_resources()
>     ->  ioat_reset_hw()
> 
> drivers/dma/ioat/dma.c:   ioat_reset_hw()
> ...
>     ioat_dma->msixpba = readq(ioat_dma->reg_base + 0x1800);
> ...
>     writeq(ioat_dma->msixpba, ioat_dma->reg_base + 0x1800);

Wow, a clear and apparently intentional violation of the PCI spec. There was
a workaround for a reset issue introduced by commit 8a52b9ff1154, which was
then revised by c997e30e7f65 to take the present shape. However, both commits
claim this only affects certain Atoms, albeit the latter less explicitly by
having "CB3.3" in the subject. Yet you're seeing this on a Xeon D ...

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 07:51:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 07:51:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.280912.479024 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOxIW-0006Ot-5D; Tue, 01 Mar 2022 07:51:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 280912.479024; Tue, 01 Mar 2022 07:51:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOxIW-0006Om-1u; Tue, 01 Mar 2022 07:51:52 +0000
Received: by outflank-mailman (input) for mailman id 280912;
 Tue, 01 Mar 2022 07:51:51 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQ5=TM=arm.com=Wei.Chen@srs-se1.protection.inumbo.net>)
 id 1nOxIV-0006Oe-EE
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 07:51:51 +0000
Received: from EUR01-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur01on0614.outbound.protection.outlook.com
 [2a01:111:f400:fe1e::614])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 72c21693-9934-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 08:51:48 +0100 (CET)
Received: from DB8PR06CA0023.eurprd06.prod.outlook.com (2603:10a6:10:100::36)
 by AM0PR08MB3668.eurprd08.prod.outlook.com (2603:10a6:208:d8::30)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.22; Tue, 1 Mar
 2022 07:51:45 +0000
Received: from DB5EUR03FT044.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:100:cafe::6e) by DB8PR06CA0023.outlook.office365.com
 (2603:10a6:10:100::36) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.22 via Frontend
 Transport; Tue, 1 Mar 2022 07:51:45 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT044.mail.protection.outlook.com (10.152.21.167) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Tue, 1 Mar 2022 07:51:45 +0000
Received: ("Tessian outbound 2877e54fe176:v113");
 Tue, 01 Mar 2022 07:51:45 +0000
Received: from 2aaf19191ac2.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 1D1EA542-7B9F-456D-8F5B-D1850E50406A.1; 
 Tue, 01 Mar 2022 07:51:40 +0000
Received: from EUR01-HE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 2aaf19191ac2.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 01 Mar 2022 07:51:40 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com (2603:10a6:102:2b9::9)
 by AM6PR08MB4915.eurprd08.prod.outlook.com (2603:10a6:20b:d1::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.22; Tue, 1 Mar
 2022 07:51:37 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa]) by PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa%4]) with mapi id 15.20.5017.026; Tue, 1 Mar 2022
 07:51:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 72c21693-9934-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=1k7x/cYgaPUySUmfzVK0xBj/MVX1hPGBYj1VLlHEIO8=;
 b=UOKl23gPV4ppJNLHBNdmq+OjxoRPRWVR1xsjt9XLfUZN7sKdTzqL3WGCLqHdLei6Q4V2Zmq/o/zsGe1yIp++wF+kiE8yK0cmPQRASebB7PcOI25HxnftbNUgbrAJtNs4YwG5nrZGOP4l69/BBA76FRu3vLitJppplBxD45k1CPU=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=gmETMUQjSewEEA3HEzGaebLeRPlYYga3eOFeeSJNJViVZ1fRQp6Z8vxK9qLWmXS71QA1FhIpzfxXeon0SI89IxJkKfXfN2V5WVPU8EiwcHI8pRLsxYfUMCPk/6anZBwpkPniSnAD2UaYujGK3FXaZLOeE0z5P9XS6NuNZYCNl2vN39mqg0U8eyWm86y+Nr3szsSwZV0yPY1X5S6gMLuQH06GfMvfQyfpLwtEMK+aP12E/kMOtmZs/JcU3FCyrfsvnc1WU+kmu3GaEw2zeoxuKHDd15eyXPlF8OVWY0Rxo28e2bvZcWpBOoHb5Z8a9T0cbKtYOkSL4qncQfy7fQ6wNg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=1k7x/cYgaPUySUmfzVK0xBj/MVX1hPGBYj1VLlHEIO8=;
 b=EKVSld7n4iAcV4902r7w9H9OpYkkLTxHfENE4bEMmk1qRXF6jWysvpRYLNUGWJsQUBtkQFa4aT5g8WlY29YUDvhXX0UcafJkxHavAavCiEpEF+S7yxQkbMvzRAFFuGk6RiEooxcrUGYEuXrZxhBqFz/T8mf1id0WUgskqJGwwoEJM2dTeCUOavJseqDMZnCEWDNS0apTn0jvp+pokY3DQV8RQuMYZ//D4ROekeyh4aT14ARDdPiWge4mpycbl4lpb7VEmHqJl+finDvVGQamZ19zaTVopUuyB075viDtfDebpaFWmA4dOeRPddTUWT/bTlCeUAotEPxWSqUCJKgW+Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=1k7x/cYgaPUySUmfzVK0xBj/MVX1hPGBYj1VLlHEIO8=;
 b=UOKl23gPV4ppJNLHBNdmq+OjxoRPRWVR1xsjt9XLfUZN7sKdTzqL3WGCLqHdLei6Q4V2Zmq/o/zsGe1yIp++wF+kiE8yK0cmPQRASebB7PcOI25HxnftbNUgbrAJtNs4YwG5nrZGOP4l69/BBA76FRu3vLitJppplBxD45k1CPU=
From: Wei Chen <Wei.Chen@arm.com>
To: Julien Grall <julien@xen.org>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>, Stefano Stabellini <sstabellini@kernel.org>
CC: Bertrand Marquis <Bertrand.Marquis@arm.com>, Penny Zheng
	<Penny.Zheng@arm.com>, Henry Wang <Henry.Wang@arm.com>, nd <nd@arm.com>
Subject: RE: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Topic: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Index: AdgpQxtXwh7LkfydTgiYk9bhMgU+ogBRt1sAAKse4VA=
Date: Tue, 1 Mar 2022 07:51:36 +0000
Message-ID:
 <PAXPR08MB7420BF1299A1577B98211C1A9E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
References:
 <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <04db7e8b-2f04-41d7-1deb-d8bda3625c04@xen.org>
In-Reply-To: <04db7e8b-2f04-41d7-1deb-d8bda3625c04@xen.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 20E8AC47A67ABE478EB4DE472D17A861.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 5ece9a0a-eb84-4f01-9ee6-08d9fb585536
x-ms-traffictypediagnostic:
	AM6PR08MB4915:EE_|DB5EUR03FT044:EE_|AM0PR08MB3668:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR08MB36687F211807ABD9F21ED08C9E029@AM0PR08MB3668.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAXPR08MB7420.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(83380400001)(186003)(26005)(9686003)(7696005)(6506007)(53546011)(71200400001)(508600001)(110136005)(54906003)(66446008)(55016003)(8676002)(76116006)(30864003)(5660300002)(8936002)(66476007)(64756008)(52536014)(4326008)(66946007)(2906002)(122000001)(66556008)(316002)(33656002)(86362001)(38070700005)(38100700002);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4915
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT044.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	edce8ab5-ac02-417d-723c-08d9fb585024
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(55016003)(36860700001)(8936002)(40460700003)(33656002)(52536014)(70206006)(70586007)(8676002)(4326008)(316002)(54906003)(53546011)(508600001)(86362001)(9686003)(6506007)(7696005)(110136005)(83380400001)(356005)(81166007)(336012)(26005)(186003)(5660300002)(2906002)(30864003)(82310400004)(47076005);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 07:51:45.4816
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 5ece9a0a-eb84-4f01-9ee6-08d9fb585536
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT044.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB3668
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From xen-devel-bounces@lists.xenproject.org Tue Mar 01 07:52:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 07:52:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.280913.479035 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOxIm-0006mT-I9; Tue, 01 Mar 2022 07:52:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 280913.479035; Tue, 01 Mar 2022 07:52:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOxIm-0006mM-DU; Tue, 01 Mar 2022 07:52:08 +0000
Received: by outflank-mailman (input) for mailman id 280913;
 Tue, 01 Mar 2022 07:52:07 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nOxIl-0006ld-8i
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 07:52:07 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 7d272ff7-9934-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 08:52:06 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2176.outbound.protection.outlook.com [104.47.17.176]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-3-htxtqibZOoq286GUjLQHMA-1; Tue, 01 Mar 2022 08:52:04 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by HE1PR04MB3291.eurprd04.prod.outlook.com (2603:10a6:7:18::31) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.25; Tue, 1 Mar
 2022 07:52:02 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 07:52:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 7d272ff7-9934-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646121125;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=VLudaqPC+mCohs93HfhPPRfaG0gLzOtM22zh6VYWIkg=;
	b=TMrZNbVeat9gfkvuId9PjB7xTZ9LRFJdrhLugCwcVq/R3Rj2m52L097GZ+vOIdtOKmj9uf
	gLFVmvH+BrLcFqbhuklurX8K72mBGQHuaYqLjlKU1tglkvrP2Us4mM+xyUdLpWt9WHxtvK
	5InHwgyhNW+Z+DEEkZcKH0bxF2rWxzk=
X-MC-Unique: htxtqibZOoq286GUjLQHMA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=AUwYcfMPFSPe5WxHopN9BPGSwUmi92vgdGAg3v3nBwbMNpIes2l3d5bdc1qRGJ279QLFXgW9tA+ZUnNF5kw48LxWZtKkeMb4034KeuGfhZZV/ggDdIqyXvYCCzibUumSjwulVM+E5W2jEeneqtwveKnFAMPzSbeWW//YjGky5a7+26sc4tHNa/D4sfDERGI6hxFyXJKYb3a8AyVf9aP+LBqUvrvzBJOYtN1uzbIviC/uIBfdjykjia1m43xN0zLvucClMxPtriWUabRNXR7Sehe/s38fRZIBankUHi5eFMhDLORPEi44H/wKKtrO7S3hcnm3O6pMkb1iQgNcTUKxvg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=tuidF6oeap9VolvoBduf0nkrdW2xCpxFD1bQiL7eRuY=;
 b=KtxbB3h9/dNccqlAN6W7ME9sL6yymQruaER2Fzs8H/09UGGfsap8tw9wE9ArIjgK9xK7fxb6orkDj6njClJt9UgmNilKoc7AfhpBczbIc4wmTDdpaVr6nVt16dsSKgcA/FeQe/2U6iRhyRRIjltRQp0JPXz1FDgCQr1NEIUerLgUSKWfdl8KcR9LquAZVMtfTuUQQw85y34xlxoDLHWI90il+BAYdcLLTl6Iyg0adTRRoz7Qw3mTxgp1vMf+hMhsIaoT2ro+ErXUZcBIyMSuDqxqleg1V0oS6p+/8imTl0zNviJKsAK8jcCfyaUiS8uiKYnpV5Ag36hE6MUFgb9hMA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <60bcd74d-5686-9813-e3a6-b28c15b66a22@suse.com>
Date: Tue, 1 Mar 2022 08:51:59 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v3 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: Jane Malalane <jane.malalane@citrix.com>, Wei Liu <wl@xen.org>,
 Anthony PERARD <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian <kevin.tian@intel.com>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <20220218172943.12182-1-jane.malalane@citrix.com>
 <20220218172943.12182-2-jane.malalane@citrix.com>
 <0a31970c-c0f8-c995-ce04-67523a4a830a@suse.com>
 <YhyrAyxhNtNWi7NY@Air-de-Roger>
 <9aff51c2-0e8c-685c-7bff-0ed7ff7347c7@suse.com>
 <Yhzr739VZdRLWnok@Air-de-Roger>
 <6b59e3ea-01ff-e26c-02d4-3b11594fd7f0@suse.com>
 <Yhz4yShnpcyq5IDM@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <Yhz4yShnpcyq5IDM@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM5PR0701CA0072.eurprd07.prod.outlook.com
 (2603:10a6:203:2::34) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 996a3506-f20d-4be0-a4cb-08d9fb585f0d
X-MS-TrafficTypeDiagnostic: HE1PR04MB3291:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<HE1PR04MB3291EBA3F5007D3B7695EC4AB3029@HE1PR04MB3291.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(4326008)(6486002)(2906002)(6506007)(6666004)(53546011)(508600001)(31686004)(38100700002)(36756003)(31696002)(86362001)(54906003)(8676002)(66556008)(66946007)(66476007)(6916009)(316002)(83380400001)(26005)(2616005)(186003)(6512007)(7416002)(5660300002)(8936002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?mtkle632iM2Px8QdpmpPaYQ8sEEVz5SxsCMG1rqh8vz2Lqi+lue9u52N+6+V?=
 =?us-ascii?Q?NisKF6LQOSBWXkVfB7+FAoNYyT1SI8IYZIhD5HUA7IePteBXTO8vuefJX05b?=
 =?us-ascii?Q?hkPs1tB371oj4PG1IYHGgkSI3DGVWShQ8DGrKGdxMViVNMDIO8QEax7hbetr?=
 =?us-ascii?Q?nf1kfD7x08I1D/048MSDBFZUKT4EA+n+uR7VBV8ABbeLd+bA5chNsmgXl6Hi?=
 =?us-ascii?Q?ahaXCNoMLaVHACYY1dHPFt1GUYf2TtxMucUEFgqme/eGWjp1jQ3BYYgtxJuT?=
 =?us-ascii?Q?shuq4AWKhO7gZ3l1xIj2NWpkCwUbJiKK0nokeVQUoOPTh4uJKchSzrh4bqI2?=
 =?us-ascii?Q?7QxBdjLcDXUnWV47qvlDPNC6Vt1NunzPr5X1l+FPJupDTMPGkDmCuAEP9vmI?=
 =?us-ascii?Q?sY1/VejCWqP5+AvRJDGk5mb2GWI+DAKlsVYRGuFhmTdwSt5jyDmoyojiIaeQ?=
 =?us-ascii?Q?96C3X3CBs0WTbePkmiVtRpjYdZtBW+O4XSq4YWQu/UMojDiUWlMtql9RKolv?=
 =?us-ascii?Q?Dg4Zek2dYfCWLCe/kTeCR8daSTIGNO71ITf4kOWso4hUDv9Jy2u77382WAUB?=
 =?us-ascii?Q?9FuAADpjeq36PZPaB+OQye+eQ0vCeulNdlUqrcVZ7CVfhNTGrIxdHPp0Yq2r?=
 =?us-ascii?Q?YtKn3HcRjrZaHzGJiY+XwMG255NyCw3frxHT7ym4vc1l9E4CL8Sqf2MQQRnW?=
 =?us-ascii?Q?BMY+APy0t48WJpI2HUBkth1ZxqWh0zMGBtbJ7Lofxx3uCBM0SBlFptNPVEMr?=
 =?us-ascii?Q?uwi7zoW/ktSC1i9WJhOXEACamIrgAszcuJJJZ7C3OZ+G3ONj9dCLnmliRYBZ?=
 =?us-ascii?Q?WiD5g+X/Xo2pWxzuHHszNaXJOU+xUaNToIqaiZvXVVWdHmE63EXL/Etayd5X?=
 =?us-ascii?Q?AoRh9Yj+p+Op6KNMn21CWGfh5eBJJMWGrO2UQvyrNfihc2TAAYsTAyk9eLvM?=
 =?us-ascii?Q?JImp7O7P5xs1k0wfStoBjbh+fRTwzbYClrSG/Fje9j9DkCK4D3MwBlDgQDoY?=
 =?us-ascii?Q?Qa1dLfzEQJMwF8K/6UzS/i3ji6SxqSsIaGAH8sqQ38MwCAEJdMPxkmlOpAzQ?=
 =?us-ascii?Q?5H3B8rcv082+XHmEOmqCbxDVu4G38moLXgibsXVRFCcLn5IjU6AyfOoZ7HEr?=
 =?us-ascii?Q?6B4HQlZYSDfn9rtKUccJLO1uVFjYvdNdAdQIr7gFOwpCs6LkSbJSK7fs5tCd?=
 =?us-ascii?Q?uWYpD1DQFFirfrAQtQlwGnwHxW2eJd+lLfVYFu1sx7lpQ4QXgKm7bmEICVIX?=
 =?us-ascii?Q?jVzZG7oL+bv77A/9ag9lqH7FPPtzl2gVViGJb/E0IKBkMsQtL0UBS0FkJyv8?=
 =?us-ascii?Q?Y4VWcn7wwSJ9Pl7eQk2clDWoeOOHgo9MWMz1Emqu4r6So75I10c5uuEwhwO5?=
 =?us-ascii?Q?SHFebXRVAF5lHutnDLifjYMXgFYUh7GKxrD9GPtrwLqW8oRXIMQyvJX9audL?=
 =?us-ascii?Q?iAdlggjxH7XC30sK8mexhScBnSqu78uK8AoZw7Z4CGKizaxyWtEoo8ljVzhO?=
 =?us-ascii?Q?DPLzA3jjIDNDxIORlFgkRwKli0PC6DSsXEuUZJno3LOnLuN7QSJs3DspzaPJ?=
 =?us-ascii?Q?9fui53bMqnlwO2zEovSwzFYRgeLmzWvcmkylzIGi2NdmTw/04RTdAX7xC+2I?=
 =?us-ascii?Q?m95hRciN5BFes7zIR31oFA4=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 996a3506-f20d-4be0-a4cb-08d9fb585f0d
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 07:52:02.1777
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: bLOmp4H0Pn3ZP2aUuQXOfanPW1NMfmXQRlPAh4t4A+UNvmc+VxjD+g2fyUsw1jgphzceyBHwl0IgDjjLM6Cjaw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR04MB3291

On 28.02.2022 17:31, Roger Pau Monn=C3=A9 wrote:
> On Mon, Feb 28, 2022 at 05:14:26PM +0100, Jan Beulich wrote:
>> On 28.02.2022 16:36, Roger Pau Monn=C3=A9 wrote:
>>> On Mon, Feb 28, 2022 at 02:11:04PM +0100, Jan Beulich wrote:
>>>> On 28.02.2022 11:59, Roger Pau Monn=C3=A9 wrote:
>>>>> On Thu, Feb 24, 2022 at 03:08:41PM +0100, Jan Beulich wrote:
>>>>>> On 18.02.2022 18:29, Jane Malalane wrote:
>>>>>>> Add XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_xapic and
>>>>>>> XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_x2apic to report accelerated xapic
>>>>>>> and x2apic, on x86 hardware.
>>>>>>> No such features are currently implemented on AMD hardware.
>>>>>>>
>>>>>>> For that purpose, also add an arch-specific "capabilities" paramete=
r
>>>>>>> to struct xen_sysctl_physinfo.
>>>>>>>
>>>>>>> Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
>>>>>>> Signed-off-by: Jane Malalane <jane.malalane@citrix.com>
>>>>>>> ---
>>>>>>> v3:
>>>>>>>  * Define XEN_SYSCTL_PHYSCAP_ARCH_MAX for ABI checking and actually
>>>>>>>    set arch_capbilities, via a call to c_bitmap_to_ocaml_list()
>>>>>>>  * Have assisted_x2apic_available only depend on
>>>>>>>    cpu_has_vmx_virtualize_x2apic_mode
>>>>>>
>>>>>> I understand this was the result from previous discussion, but this
>>>>>> needs justifying in the description. Not the least because it differ=
s
>>>>>> from when XEN_HVM_CPUID_X2APIC_VIRT would be set as well as from wha=
t
>>>>>> vmx_vlapic_msr_changed() does. The difference between those two is
>>>>>> probably intended (judging from a comment there), but the further
>>>>>> difference to what you add isn't obvious.
>>>>>>
>>>>>> Which raises another thought: If that hypervisor leaf was part of th=
e
>>>>>> HVM feature set, the tool stack could be able to obtain the wanted
>>>>>> information without altering sysctl (assuming the conditions to set
>>>>>> the respective bits were the same). And I would view it as generally
>>>>>> reasonable for there to be a way for tool stacks to know what
>>>>>> hypervisor leaves guests are going to get to see (at the maximum and
>>>>>> by default).
>>>>>
>>>>> I'm not sure using CPUID would be appropriate for this. Those fields
>>>>> are supposed to be used by a guest to decide whether it should prefer
>>>>> the x{2}APIC over PV alternatives for certain operations (ie: IPIs fo=
r
>>>>> example), but the level of control we can provide with the sysctl is
>>>>> more fine grained.
>>>>>
>>>>> The current proposal is limited to the exposure and control of the
>>>>> usage of APIC virtualization, but we could also expose availability
>>>>> and per-domain enablement of APIC register virtualization and posted
>>>>> interrupts.
>>>>
>>>> But then I would still like to avoid duplication of information
>>>> exposure and expose through the featureset what can be exposed there
>>>> and limit sysctl to what cannot be expressed otherwise.
>>>
>>> So you would rather prefer to expose this information in a synthetic
>>> CPUID leaf?
>>
>> Depends on what you mean by "synthetic leaf". We already have a leaf.
>> What I'm suggesting to consider to the give that hypervisor leaf a
>> representation in the featureset.
>=20
> Hm, but then we won't be able to expose more fine grained controls,
> ie: separate between basic APIC virtualization support, APIC register
> virtualization and interrupt virtualization. We would need to keep the
> meaning of XEN_HVM_CPUID_APIC_ACCESS_VIRT / XEN_HVM_CPUID_X2APIC_VIRT
> (and exposing more fine grained features to guests make no sense).

I did say before that once (if ever) finer grained controls are wanted,
a sysctl like suggested would indeed look to be the way to report the
capability. But we aren't at that point.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 07:54:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 07:54:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.280928.479046 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOxLF-0007eV-UV; Tue, 01 Mar 2022 07:54:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 280928.479046; Tue, 01 Mar 2022 07:54:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOxLF-0007eO-R8; Tue, 01 Mar 2022 07:54:41 +0000
Received: by outflank-mailman (input) for mailman id 280928;
 Tue, 01 Mar 2022 07:54:40 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nOxLD-0007eI-Uq
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 07:54:39 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id d832865a-9934-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 08:54:38 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2113.outbound.protection.outlook.com [104.47.17.113]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-19-uFMk8q9lMB-gREREpdHU8g-1; Tue, 01 Mar 2022 08:54:37 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR04MB5428.eurprd04.prod.outlook.com (2603:10a6:208:113::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.25; Tue, 1 Mar
 2022 07:54:35 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 07:54:35 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d832865a-9934-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646121278;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=tuferMufzsFXQYa+KiVEBJBP1Epvsmt/w+PiT8wjslI=;
	b=N/lHd41j2GTQG655ns94leGQXE2SAdpypYl3kokx3ZEprRmuDXFiXxj3rB0UMqmIe7adR+
	o+Vp9q6a+MMAbpElw5uSpiLVMbIXgqBnbb42VECjBaETuPG0WBRBurhoijua/HqW2fUG6s
	JI29t8ELNGR38FShcJ0m1h35KFceAiU=
X-MC-Unique: uFMk8q9lMB-gREREpdHU8g-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=nPBuhtADskuH12y8qsdJF4IAUCy6xUfswfKTDGXQALyOPOIjH5HbrBz6SYvbMtsO+i8jTexo9lqkwV/mAImSsCq+yxPcmkBiXHBRSOrJQ5/YyiwO4PyyUr5YVNb0ht8xX7FkhUcbvnbQreAHSdOk8MwJWTRbPwTshaewESIWnwc9aI0/t0rbSXh2/pIkZ1LI/ACvemscyRs00GsWCY3lY5Cs33g4UXkDi5X+fWhNrYQ/WHB6eHL4xdHmmzSBbOyv2oLJrNbThwDQ4/tmFRBfhf+gGzvUX7tju1I/slA1LhiQ/R1ugc/+cMS3ZkyCCaIU83Tb3PC+YL97St02cOs7Nw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=wgwG/7GAukzSMCZIXw062wDuDQ86sS0ae0m92b8+naw=;
 b=RZXVO53kvY+J07rQ1Lq2mTyNvPVHARpk/nkfb03gAeBYaGIDDrhYKmoBMY+6YMJq7213N4AEGFRjohi1NkWpMfDMS2jWWbpBn2XtMcHlXvTZROw07YEONRjwTCQ449636ZYUs/oJ9u+TpOOkNRE3PdqKPP1/tHGQVEauXRce9NlrFCZRREI1GEFy1K6/CP0b+DPe7ZITQOfb5UE4TUOPdTkJoEh0IU1RoatHCKp9zy34plZK+AX+39cqTOhdUcMAjFJnLQ/fid+ydxIIOqphArffhIB0Wi6i3kV7Tu8ZswCvordujU/J1ZNvDtsi8fVm7GRco68KOfaiEzS5izvpgw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <713a8237-6f50-c764-e572-b914cbfa1616@suse.com>
Date: Tue, 1 Mar 2022 08:54:32 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v3 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: Jane Malalane <jane.malalane@citrix.com>, Wei Liu <wl@xen.org>,
 Anthony PERARD <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Christian Lindig <christian.lindig@citrix.com>, David Scott
 <dave@recoil.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <20220218172943.12182-1-jane.malalane@citrix.com>
 <20220218172943.12182-3-jane.malalane@citrix.com>
 <b83773ec-c97a-7aea-e61a-c2e34b270816@suse.com>
 <Yhyv6Ui4ap1wOeNd@Air-de-Roger>
 <7ad79609-bd67-aa44-56e0-1070f3ee88f7@suse.com>
 <Yhzu4Nl2dY80KXss@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <Yhzu4Nl2dY80KXss@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6P194CA0044.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:209:84::21) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 6795d9d6-977c-49ca-d3d2-08d9fb58ba4e
X-MS-TrafficTypeDiagnostic: AM0PR04MB5428:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB542859162C5FF5FA2215B20EB3029@AM0PR04MB5428.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6506007)(6512007)(53546011)(508600001)(6916009)(6486002)(54906003)(31686004)(38100700002)(66556008)(66946007)(66476007)(2906002)(316002)(6666004)(83380400001)(86362001)(8676002)(26005)(186003)(4326008)(2616005)(7416002)(8936002)(31696002)(5660300002)(36756003)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?QOUpVH5Ok1O6vHBTXH9c9mO7ZGga4DV3jn2yWylUBPgpJAUTzJf6++A/h0ec?=
 =?us-ascii?Q?II4/3/F3jig54HwQbUAIPRVUMgovsBPs8pwBzsdSOMflhN5KRNIG0qnhu4rk?=
 =?us-ascii?Q?vmr6uAJ16nlFVnz7Bqu1kCbKV/EBAf9DykHvCEM1F2zQPaTiqIUzHzmY5PKt?=
 =?us-ascii?Q?JUJEZjMwbWyF0LE+a0Zq3bQGv1MQtGUGfNnr1s8sylSR1DxaJGXDhpXVX7qf?=
 =?us-ascii?Q?3Jx3FoopLDON39l/BgBPuJzx8YDsWdJerszMj8W1HEZjFNGgbAkH0axOhq9i?=
 =?us-ascii?Q?4tpJA4ChdGwu/OavWW7oS1xqg9YMZvpzVylB29htWdGURwC780MaWR0zCKPX?=
 =?us-ascii?Q?gyA6GqgwHoKLHtdqcNkE4+9UVhlCWfqTpt6/Tsir9vS3IBOjABnz0TEe0o9N?=
 =?us-ascii?Q?7uDC0BTgStkAZGULQLWP24ZBPonvK64h7Ixr2HoP2DpQxUO3b5UbLiw7/WAE?=
 =?us-ascii?Q?d/jvSQW4FwDcRlgupd8dAjOUXGh7Ib9sJwNQAySNri9q6NyCP0iP/4hV/Cqh?=
 =?us-ascii?Q?G2qCoq/K+3+yTLFmpodgXo+pjVPFNMKT+YwlNyQJaIyFwu+ZexwmAD7LOvDA?=
 =?us-ascii?Q?qQvj45fE+TDheGU1lBdxMo0Dfuyy4uizzNQFWokCcGtBtkntsr55t6p8NwjS?=
 =?us-ascii?Q?AkSO7hpzyBxTYSTvBmNiXqM7hRxnlIfE+nPuVAKAqm/W3n4DZmabphgKaGrG?=
 =?us-ascii?Q?h5n23dsRbzJtuJ3FkwOoCxSbkcjCWRq7yfxJT0Q6zsbf4d9sn0VstKfpupVI?=
 =?us-ascii?Q?WKHCDiyC7dgDUv8r1/HtTntA+3jKEk02i5lhOXwtS3puNDWz4JpGtuBjgSGr?=
 =?us-ascii?Q?HU+DXJvaOu/9m3eJkCSNnOHvfyZDwEJMtAMOraViMqHN2vpf381IwmHE1WMz?=
 =?us-ascii?Q?bjUVslR4ofvkKabkHLCdUfFfnEXCe1QoLFs6knA1zCpTUHNUKNRfSvY+OmsD?=
 =?us-ascii?Q?5KEyYAAbfnixewpFzVtpbYFImEJdYxy3goie7S20p9TGQn3DKtFblCe8Bw9k?=
 =?us-ascii?Q?jbvx6mKvXgYGlNLP7zUUynxcbMk3oGbXdsBocRenrWil39RYLA/zjoAC+4TG?=
 =?us-ascii?Q?kgsguO/NVbumyk6YwO2lmNLHfOIoTTcJRqcah4P1Z/cjk4sQgU+Z+FnrpCP/?=
 =?us-ascii?Q?BS82wKb7joci+7YQrUpOQc6S0tdeikrV89Jv+tAarg5WpCiJKBGAFE7nACSs?=
 =?us-ascii?Q?Rq/2iHnPd90nwqbLWyjFryrl/3xw/9j3LvnF82VpvOTD7e6IqaVlUv8aRoYH?=
 =?us-ascii?Q?cUuumURhDdJg/JiKS55BIkhX9Q9qF8va7kiYA/z0CSHZDrVUq7G2QaLx/uMP?=
 =?us-ascii?Q?vLPYtOIZi9EEk4k6Dp8UuIsjgRpQKi3QhKFIo/DjtBtzKH7Cb+SkCRymLAHA?=
 =?us-ascii?Q?4AiTZrxA3tC6FtpxjZG+LxOd0s+J/1EILvS1GwgyBTr/cSJVIc5PAuuLu7Nd?=
 =?us-ascii?Q?qh/iqRacZAWjPEwGoZueXb4LhB8BZUJO5CMCC4BSDig2IKCxu/F8+zk2QU2F?=
 =?us-ascii?Q?CFm7ZCMBM4R5jcoZyuGf7tDX4c9Xy0SP57wGmLVUJlsPW95/B9v8PANyD2GS?=
 =?us-ascii?Q?fD0qAw1xLoxVY0w4YEUa3FzHkSZEdpQyXA0m9yk2dL1aZusgIa6m69C3RQzH?=
 =?us-ascii?Q?MG1nycjRlMsheQcMT4UnWr0=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6795d9d6-977c-49ca-d3d2-08d9fb58ba4e
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 07:54:35.2776
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: bQoNrCx4bYe/UDjMPCGSDZduPorl3ahwTjMG8jSt+/bng3vHCw8Hu6WihlOyZRA5JFzcROyuEjj40aUJwt7fqA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB5428

On 28.02.2022 16:48, Roger Pau Monn=C3=A9 wrote:
> On Mon, Feb 28, 2022 at 02:14:26PM +0100, Jan Beulich wrote:
>> On 28.02.2022 12:20, Roger Pau Monn=C3=A9 wrote:
>>> On Thu, Feb 24, 2022 at 03:16:08PM +0100, Jan Beulich wrote:
>>>> On 18.02.2022 18:29, Jane Malalane wrote:
>>>>> --- a/xen/arch/x86/hvm/vmx/vmx.c
>>>>> +++ b/xen/arch/x86/hvm/vmx/vmx.c
>>>>> @@ -3333,15 +3333,15 @@ static void vmx_install_vlapic_mapping(struct=
 vcpu *v)
>>>>> =20
>>>>>  void vmx_vlapic_msr_changed(struct vcpu *v)
>>>>>  {
>>>>> -    int virtualize_x2apic_mode;
>>>>> +    bool virtualize_x2apic_mode;
>>>>>      struct vlapic *vlapic =3D vcpu_vlapic(v);
>>>>>      unsigned int msr;
>>>>> =20
>>>>>      virtualize_x2apic_mode =3D ( (cpu_has_vmx_apic_reg_virt ||
>>>>>                                  cpu_has_vmx_virtual_intr_delivery) &=
&
>>>>> -                               cpu_has_vmx_virtualize_x2apic_mode );
>>>>> +                               v->domain->arch.hvm.assisted_x2apic )=
;
>>>>
>>>> Following from my comment on patch 1, I'd expect this to become a simp=
le
>>>> assignment of v->domain->arch.hvm.assisted_x2apic (at which point the
>>>> local variable could go away), just like ...
>>>
>>> I think we want to keep assisted_x{2}apic mapped to
>>> SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES and
>>> SECONDARY_EXEC_VIRTUALIZE_X2APIC_MODE respectively, so that in the
>>> future we could add further controls for
>>> SECONDARY_EXEC_APIC_REGISTER_VIRT and interrupt delivery.
>>
>> If we want to be able to control more (most?) VMX sub-features, it
>> would seem to me as if this would better be modeled accordingly
>> right away. At that point there would likely need to be VMX and SVM
>> specific controls rather than general HVM ones.
>=20
> I would have to check the AMD interface for hardware APIC
> virtualization support, I'm not sure how different the control values
> are there.
>=20
>> Plus then it might
>> make sense to match bit assignments in our interface with that in
>> the VT-x spec.
>=20
> That could work for things in secondary_exec_control, but posted
> interrupts are controlled in pin based exec control, so we would need
> to expose two different fields? Not sure it's worth the extra effort
> to match bit positions with the spec (or maybe I'm not understanding
> this correctly).
>=20
> Are you suggesting a (VMX) generic interface where the hypervisor
> exposes the raw vmx_secondary_exec_control and possibly
> vmx_pin_based_exec_control and let the toolstack play with it, setting
> in the VMCS what it gets back from the toolstack?

Not necessarily all of them, but on a case by case basis. But _where_
a control bit would appear (if supported) would be well known up front.
This wouldn't be very different from VMX'es "supports the 1-setting of"
information provided via MSRs. The hypervisor would indicate which of
the bits can be controlled on a per-guest basis.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 08:00:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 08:00:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.280935.479057 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOxQM-0008P1-HZ; Tue, 01 Mar 2022 07:59:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 280935.479057; Tue, 01 Mar 2022 07:59:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOxQM-0008Ou-EP; Tue, 01 Mar 2022 07:59:58 +0000
Received: by outflank-mailman (input) for mailman id 280935;
 Tue, 01 Mar 2022 07:59:56 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nOxQK-0008Om-JX
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 07:59:56 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 94ccb4d3-9935-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 08:59:55 +0100 (CET)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2051.outbound.protection.outlook.com [104.47.14.51]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-24-uavKTY3TOYCWMSoI3YLkiw-1; Tue, 01 Mar 2022 08:59:54 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM5PR0402MB2820.eurprd04.prod.outlook.com (2603:10a6:203:97::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.24; Tue, 1 Mar
 2022 07:59:53 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 07:59:53 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 94ccb4d3-9935-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646121594;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=bmZljKsuipJZNrFyF0W6Vga6KwbGVTf3g9zbiLcGc2Q=;
	b=Ab1RZx17TP8keATLOnrx+M3lAP2h0KIdmVecOnmSNWca57Q7mqJkBzYR4OU43wm/yc5UOK
	nWPgpirLAx1TQ1+BP0geMtPVFywupOLRxVjmwFE4JjaStfWp1cZR4leZlXodnz9YAvxkpN
	tJuD4cRDqYfwePGaFzsGEHEJtgMBzWo=
X-MC-Unique: uavKTY3TOYCWMSoI3YLkiw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=lieZF3Dm9vzlwmrhF+63sDTj6vVWllum6zIu+/s+fMbj+MIIXZiTvCUWkjrB3DywqijDtHPTr4O3V8q4SoLEEt9b/IIFxneS9nGwIf2m+NGytsYIZY3CbasU9O09WpAA0AsQ+zkH4lGcdXNBJcyrLMqljdfxjA1PNy9G0qGtIbSztZubuQZzr1kPExIf9MQtXQzHuhIp7Xg2YHSOgHuqdK1xHTXSOIguNmPf4OWjMSpynGarkqjwuNvS9938hOg6HrObpL/Df1AeKZhT7IKN+UPX8k36POmNTbaEgN9YEHsHl0z8IWsrjW3SI0+N4dknjlxmN/FqWF7gyKIsTYUh7g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=bmZljKsuipJZNrFyF0W6Vga6KwbGVTf3g9zbiLcGc2Q=;
 b=JyISvSO8Q8/vSU3NIT8MMpgvxR1EbF+gkJDOfELotm4fd3lozKhaaxEQxq9cTrc6UYhGLs1QKebVRy2tr4HI2AlQ7NjBMtqTSnZLzhxK3P++sw5xcy5F4JfOoNXnTAcYSNB/a4g21lIykWEoxMzGnMVm1+exbsm2dYhq4mD/o7q6XTxIlz1WWDZMuqE083LxHLpHNGwAMCjfDDXwvI4zZV1WoX2tmSEI3OUR/yhwlwMGnEu6QjE+wUd2M54RTYulphTitogTGucmRaS2+tWduq1321hLo87xu+hVVvgO0xcs0nZmpZ+tZnhX3Kek3+dlw4OIFTViJFSPpRH8KWafbw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <d9ada15d-394d-ab15-76aa-9f5bb09f026c@suse.com>
Date: Tue, 1 Mar 2022 08:59:47 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] x86/spec-ctrl: Disable retpolines with CET-IBT
Content-Language: en-US
To: Andrew Cooper <andrew.cooper3@citrix.com>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Wei Liu <wl@xen.org>, Xen-devel <xen-devel@lists.xenproject.org>
References: <20220228225117.14327-1-andrew.cooper3@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220228225117.14327-1-andrew.cooper3@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR06CA0098.eurprd06.prod.outlook.com
 (2603:10a6:20b:465::13) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 76efe257-18ae-431f-7585-08d9fb5977a9
X-MS-TrafficTypeDiagnostic: AM5PR0402MB2820:EE_
X-Microsoft-Antispam-PRVS:
	<AM5PR0402MB282029314819444181D8C162B3029@AM5PR0402MB2820.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(8936002)(6486002)(31686004)(2906002)(38100700002)(5660300002)(53546011)(2616005)(6512007)(508600001)(6666004)(6506007)(4326008)(36756003)(186003)(26005)(66946007)(66476007)(66556008)(8676002)(316002)(86362001)(6916009)(31696002)(54906003)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?MmNHR3dGN2dPOXdmRUhyNlpRNTFOajRXcU54ZnV1L0xHUzMvUzV1MHpYZVI5?=
 =?utf-8?B?VnlWaGhtdm9zSlZ5N3BqWUNUMUhFNUtsL1NjZlo1NXVtN1RBWE1GVFhjWkpi?=
 =?utf-8?B?cUc4ZzhqWUtEdjVtdkZVN2hHN2hOakMvbDQxRmlubHg4d0FaK2VpeWxiamJ3?=
 =?utf-8?B?dnFYaDVGSnlQdDdqcUpZUUtwMmUya01oVE95U2s4cDVnUWZaVGIraWlXVFA5?=
 =?utf-8?B?YVdmTVB6WmN5WE5obU50dS8yaXNRbCtxdkEzK1lmVkNBa1dDdkVFWnQvN3Nj?=
 =?utf-8?B?dlNFSytvL3orMWVneVZpZnNWUWZFVDNpRGR1MzFuVEVnUTM5VTE3dkZWYjFY?=
 =?utf-8?B?bmRJVTdzUW44bldOQ05aQVFSVkRnczQzWi9MeStQTVNKekZQNjR1VnNzWDcy?=
 =?utf-8?B?NnpiMEZHRlVMSk1HUDJlSWNSMmNwaFYwb2VMNHlySU1Oc1RXWHgrSS9pMTlw?=
 =?utf-8?B?K25lYUQyYTV0RlNyc2h1dzBtSWNueW9GMmxQTVY1VW52WStLVGR6Y3RqYzNG?=
 =?utf-8?B?dFNiTEVJb0UyNGU1RTREeGRLN3hrQU0za1pnbXVvWVg0eCthTDZVMjhKTnhq?=
 =?utf-8?B?VWtsbGovNDlML0tZY2oraWJBVmJIMG1nNE14dG9nUnBFL1BnSk03c0tEcjBC?=
 =?utf-8?B?aDVGWGJPWHFjaEZOTnJFaFRYOURocjFJbUcxYVN2ZGMyVW9MV214UnYvMFBI?=
 =?utf-8?B?OFZUbEIxT3JJRTBMRlN0eVM0UitzVGhsVUdEbUFqZ1NtdlR0REJUTGZidjhY?=
 =?utf-8?B?Vyt6WU04RGtkbk53cVpFeGVSQ2h0b3hQcVV2K2txTWYwMkx3UmRyMWJGVUt2?=
 =?utf-8?B?NVQ5WHlvK2pmTFk3YWVXZEtJU2t3UEpDREVRaXZmU016NStYSnFJZmpXVlF0?=
 =?utf-8?B?OTROYTlLaWptYzVGb1ozd2FEUDdxR3JDRWlyMWFYS3o5ZDhFYnE1Qi9IaC9C?=
 =?utf-8?B?RHdjT3pwYW1BVTVsN21wNC8zOWhzSkxodFdnQWVuS1o3YXlIdEkrUk5PMXFL?=
 =?utf-8?B?MytVVSs3eC9DYktiY2gwb2REVDFESDVXRExsdE9jUGloYXdUR2w1R25xTzdj?=
 =?utf-8?B?VUVDQ2xDK1VldHB6cnNLMzhwOGtjZUZzM1BPMUlyUTA5bGtNdGIzbWpRenl4?=
 =?utf-8?B?NmFRb1gvaU84WmhCMTlTY2VpM2gxeDk4NmRXNVBINTAwblQvajY3NVd2NkxP?=
 =?utf-8?B?a2o2YnVuRExRYlBield5Sy9RVy84eUtGOUtaYkk0YkxSUGxteSs1SnhlV2tz?=
 =?utf-8?B?RDNTdzJTUks5YkJRY0JMNjlRa0xuOUlJREhpK21qcXAyRzcxeCtuNnNjc1NL?=
 =?utf-8?B?cTZqQlg3RjJGbGhBL2JRemFnZi9ta0R0cXVhSk9FNTJWN1BJSUVvZ2NsTnAx?=
 =?utf-8?B?bW1ZTi9leWtBRlZSOUIwL2dGRDBKTEhSVFJuSEhSYmYrSmt3dkNqbXZad0lH?=
 =?utf-8?B?Z1JpTEZWVS9vbzlIMFQ1Ui8zSjBydjExSjh5b2dGKzdaYm0xNEg2eXBVTHFJ?=
 =?utf-8?B?MFhpcVpwYzFVVUdvZU0yamdnUzV2cWE0d29iaUczUHM4dnUvYm4xM2pjVmdh?=
 =?utf-8?B?aWlSYXpNSzBWUjhLUkJUWmNpekRNb0MyUHJQalhMVmJYczJvZ2lIUVk3cW5Y?=
 =?utf-8?B?Z3hkWktoNjN2OHFrQk1qM2YvYzdQZm9QVzNhQk9XNFFtU0hyTGxiQm1qQnhF?=
 =?utf-8?B?dnlCQjQ3TzhSN2p5cXI0UGd6K3luVVRXWE1nbEc2aHY1eWIxTWhRZGdRcmRt?=
 =?utf-8?B?WmE5bmkwMi9XeU9KR1llMjlIMjZWUWVSUTBvUW11Y2JucHdKT0lwWU9qcEdG?=
 =?utf-8?B?WkxWTUZsOUx5MSsxNDg4ZkM4ZldQV3h1b3cyVzMyREVJQ3Q4dnR1RkhsQzlH?=
 =?utf-8?B?dm13ZXI3SWhQTGNjZ0QxMGtUNkN2aDlUNHQ0M3J4RGg0cHYyNUJQVHJPY2dz?=
 =?utf-8?B?akxnZ2RFQ0x5aVg2SU9OR3hoK2FtbytBcWJSMTAwNUc0MGNpY0dQdGdNSTlN?=
 =?utf-8?B?K1VaUUxHOWU0MGZWMG51MGRHMW4vUU55SnJzcWQxTFFBU0Rzak9vdmJrTENl?=
 =?utf-8?B?U2Rhd2NzSzJRWmxvRjFIVzQwai9qMVFERzBwNnp0R0kvVGhTRnYxakwzL21u?=
 =?utf-8?B?clVsUnM2MG5OVzF4ZTdqNVltMDJ3QkcrT1V1RkI0VkRQSlZKd2ZCZGpKVzBB?=
 =?utf-8?Q?b3T/lMA3/9JI6DfGviVokIc=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 76efe257-18ae-431f-7585-08d9fb5977a9
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 07:59:52.9609
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: PdQUAg8hIxFGj9tVYxPuUao+Qf4rqVWZnyEiZ8nYdCzsiySryX0+MHqoy9ctHgQB6ExQU+K4xEgQEZCKg9qA9A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0402MB2820

On 28.02.2022 23:51, Andrew Cooper wrote:
> CET-IBT depend on executing indirect branches for protections to apply.
> Extend the clobber for CET-SS to all of CET.
> 
> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>

Reviewed-by: Jan Beulich <jbeulich@suse.com>

> I can't decide if this wants a fixes tag or not.  If I'd remembered during the
> CET series, it would have been its own patch.

On this basis I'd say no Fixes: tag.

> --- a/xen/arch/x86/spec_ctrl.c
> +++ b/xen/arch/x86/spec_ctrl.c
> @@ -944,10 +944,11 @@ void __init init_speculation_mitigations(void)
>                       boot_cpu_has(X86_FEATURE_IBRS));
>  
>      /*
> -     * First, disable the use of retpolines if Xen is using shadow stacks, as
> -     * they are incompatible.
> +     * First, disable the use of retpolines if Xen is using CET.  Retpolines
> +     * are a ROP gadget so incompatbile with Shadow Stacks, while IBT depends
> +     * on executing indirect branches for the safety properties to apply.
>       */
> -    if ( cpu_has_xen_shstk &&
> +    if ( (read_cr4() & X86_CR4_CET) &&
>           (opt_thunk == THUNK_DEFAULT || opt_thunk == THUNK_RETPOLINE) )
>          thunk = THUNK_JMP;

Just for my own understanding: Why unconditionally THUNK_JMP and not possibly
THUNK_LFENCE?

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 08:01:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 08:01:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.280951.479068 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOxRX-0001wD-AZ; Tue, 01 Mar 2022 08:01:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 280951.479068; Tue, 01 Mar 2022 08:01:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOxRX-0001w6-78; Tue, 01 Mar 2022 08:01:11 +0000
Received: by outflank-mailman (input) for mailman id 280951;
 Tue, 01 Mar 2022 08:01:09 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nOxRV-0001vu-QH; Tue, 01 Mar 2022 08:01:09 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nOxRV-0000p5-OX; Tue, 01 Mar 2022 08:01:09 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nOxRV-0000iS-GL; Tue, 01 Mar 2022 08:01:09 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nOxRV-00007M-Fr; Tue, 01 Mar 2022 08:01:09 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=KaQ8qqfR1/en9rX2dPumlRLPpegRb8XBbFqaY1wFe1U=; b=iwztuSQpdc5EI69xYBl0bG7G6U
	X2HvSZQSvS0mb/uFusTWhb7B3q4gvoXMrqtDuKsXSMywi0TiQlPyqZy1TshphaNrs7sjX/JUmwkO2
	fh+vge+CslRDJjKi5QSthv0FSUwT4gwtViE65YJx53JfUmoTfFp9Ik1kZrvB94R96o7U=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168264-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168264: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=854ea58e4ee9dd5521bfb85df97f75381f617cb3
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 01 Mar 2022 08:01:09 +0000

flight 168264 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168264/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              854ea58e4ee9dd5521bfb85df97f75381f617cb3
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  599 days
Failing since        151818  2020-07-11 04:18:52 Z  598 days  580 attempts
Testing same since   168237  2022-02-26 04:19:42 Z    3 days    4 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 99017 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 08:24:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 08:24:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.280968.479085 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOxo3-0004a3-CR; Tue, 01 Mar 2022 08:24:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 280968.479085; Tue, 01 Mar 2022 08:24:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOxo3-0004Zw-7W; Tue, 01 Mar 2022 08:24:27 +0000
Received: by outflank-mailman (input) for mailman id 280968;
 Tue, 01 Mar 2022 08:24:26 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nOxo2-0004Zq-AK
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 08:24:26 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 00cd4a15-9939-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 09:24:25 +0100 (CET)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04lp2056.outbound.protection.outlook.com [104.47.12.56]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-24-ilgxC1XONL2EGnLxVdLN3Q-1; Tue, 01 Mar 2022 09:24:23 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB8PR04MB6475.eurprd04.prod.outlook.com (2603:10a6:10:103::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.25; Tue, 1 Mar
 2022 08:24:22 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 08:24:21 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 00cd4a15-9939-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646123064;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=9XJQN78ib1MVXdwfiKUllDBBg5cOZ43xtTpNhJqfgz8=;
	b=PgrUIglZmzqTHoy236Rd4OXQk2vGT5bWsHNgYdQIUUDC3F+LmbpvGbNVjf4/hOu7WJDfT3
	26lbZEc6Ck3cMBh3DCHbTaoR9HCF35/Oo3wL2k1rbeA74MAPaeFpktPJyIFuJLd0b1qe/Q
	GNTxFreoO1VtWpYrPXVvfU6+8csItcM=
X-MC-Unique: ilgxC1XONL2EGnLxVdLN3Q-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=UQTbS3IwUmDf7klkO5J9m2mCq5QSsiZzoYG+8m5zx9nzlB0UH+VndbGkbGRare+HQ/6jLraJwPt/bbwtm7UYImZxWtV6hESGSGXRLFV5Kc9blNm6MhbGsnGVVyKZ1whKHk7FIF63ah7oUdr9hAcARH7m9LjdpCYbpR4w6SbpdCWfCVdJQwL5Xs8w/3EhYrPMyES5j5pGOF62pa81TpSLMiqtAZB7uqF46N/BCAVdo/9wQTncyb9U+LGbqvATWAhLT1OvELSVS2F+TNYZjlUzIw6y/nif0Q/MHV9TRPUPUH3rYzyRSgrdbeIWhZyAqQQk6Sdt2J3RZmNiFZttuhKnPA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=9XJQN78ib1MVXdwfiKUllDBBg5cOZ43xtTpNhJqfgz8=;
 b=RilcchYAZLDZ6w5zkGzKcUW7XVN+AyuA2mwvhVC0wVLwiaWRv4+LnGGClVmoAvF8WV/i5C0pcljW+qBLTwsSRCejbwHgjQpkTqkaJD6hHMnJKj0T3ypmky4+yVWNAi2jJT9qTdbhwqMIc/pmHtCEvbMU2X+I3RSW+QF4Lb9wGND1kzE7/n+Cpd9NM3VC381OZM+YPwI2zf+ROUdzQE9ucTUL8nd7gR7QytYbjpsV4y3fGpI/QuP8f26oV0VRJXFQWo5ZLh2ERxnQG4rlZWaSRLoernxOcP4AaaVPq/fxQUhtGOuCOayjhptrFZegCZrXtbpypCyiEJzcecaxBftekA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <ac19413d-d5a0-4234-819a-fa99afc31592@suse.com>
Date: Tue, 1 Mar 2022 09:24:20 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
Subject: Kconfig: defaults for UNSUPPORTED
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: FR0P281CA0047.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:48::18) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: cb8b58fc-94a8-4a86-26ba-08d9fb5ce346
X-MS-TrafficTypeDiagnostic: DB8PR04MB6475:EE_
X-Microsoft-Antispam-PRVS:
	<DB8PR04MB64756C02E37604102AFDD373B3029@DB8PR04MB6475.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2906002)(6512007)(186003)(26005)(2616005)(6916009)(31696002)(316002)(86362001)(66946007)(4744005)(38100700002)(66556008)(8936002)(66476007)(8676002)(6486002)(5660300002)(31686004)(36756003)(6506007)(508600001)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?RVJlUlEyQWhkWmpCMklrcElaaGFobU9hakxJTk5JZnkyd1hxd3FkYytabTFP?=
 =?utf-8?B?U3dlV0FBbXdWWTNkZHV1NDM1aWlwclhYMFk1dWFGbFo0QVBlaDRyMmRyVGVD?=
 =?utf-8?B?NmxBbTRJTkwvV1N4ZitUanlJRHEzWkFER1RNelFQTmJlYjdyZXVDMnp3Sk13?=
 =?utf-8?B?KzZjeVhsOFlRVHVYam9GOHYrR0dFeUNYZEQ2bzZDbThOSUJUTGNnTmhzcUNT?=
 =?utf-8?B?OGkxZlhwSlZrTTYzVGNsMVRCV1luaHo0SUd6dzlWMHMrZUZHWmE4ajlLTXd0?=
 =?utf-8?B?QVZPNkdtbVpsRFBJd3dTMHFHb1htaXJFejB1U1Rob3gxd09jdUxCSUdxeTBP?=
 =?utf-8?B?b293bXRMVFpzQkVvV2Y2MGNadVluZWpGYVdWZUNVdFA0dkZ3K205T3pPM214?=
 =?utf-8?B?b243MWFteGV2VmFTRzJDNXl5Y3hBZGRkQkNYdlArYzlUVVkydFgwOEVnOVha?=
 =?utf-8?B?eUVhalpzTFRvVDJFeXFKL0J1YlBUd1ptVjA3Z2dHOEtMcWJjR20xVHF6YW5v?=
 =?utf-8?B?VENuVzFqVmxQT2N3eHZ6VDdXYW9hZE96Rld0YjhwZkp4QVB2d0VUNDNIdXhV?=
 =?utf-8?B?OHhIN2dYRUp3OVBWanJhQkgvMHAxRm1Na0xHS3Z0d1lxZkFYYlh0OHprcXQx?=
 =?utf-8?B?aWFzNWNqMSs3L2paQUV6UHdOM1YvMXRqaFZabVRRNDdTOERNbGd6Wm5IanZs?=
 =?utf-8?B?VENOS0RYYThENWJxZEZUSkFOZWVmNFg5RDhNRVZSL3lNOTRzUzc0RksvaWZ4?=
 =?utf-8?B?TDVsRisza0lacTQzOG9DbXpRNk5SRXp4ZXJNZ2pCWEVqOEZmSk1qL3Z6bUVz?=
 =?utf-8?B?UDF6N2taOXRWa0V6cU9pT0xSbVBncUg3QzRRRlRoaUV1bjVlTjdIWTVPckxJ?=
 =?utf-8?B?aUVKVnNZTGIycWwrV2pMQVhWaXppNldnK1huVDN0SURoV0RUcm1EclZsNVJy?=
 =?utf-8?B?Zjl2SE5rdEpCVFpMdGxKUEVmSVNhZFZxMUM1ZlpTZFpHQ3lWYmZNM2tmZENB?=
 =?utf-8?B?Nm5rSll5T1JRc1BiL0cwVUQ0VXE0MTc4V3Qrd0p2Y3BXaFlWbFJXVUFrRmJr?=
 =?utf-8?B?MzViWDloamlxc1lYdXN3cWdYZU5hbElWa2t5YkRHQ252L0RkcytCRXoxMGZm?=
 =?utf-8?B?bTAwMTJXeEswYzRXaVR6Z3hGaEMyeW5iK3JkVEN0SWgreFRNMFA2TmVKL3lI?=
 =?utf-8?B?a25leitua1NES3NyUWM4RU9WTGNQMDQwZzAyM0x6QTdaUEpKTCtHTzgrQlZ5?=
 =?utf-8?B?M2NpdmxycHp4bXVUN25NdzUySHEvbmo4Z0crQ0ZpK2RTTHg1dUdwL0s0OFFy?=
 =?utf-8?B?Z1pZMWovMGwxcG5WSjJ6SFJ1NlVxcHhrWXNQN0duaWxjLyt6SzlXK1ZrZFJU?=
 =?utf-8?B?NDBUR0FPaVVJM3FXVXRaaFZrTWlWSnJrSTM5TGZ0ZS91a3VSWEwxSTdDVCti?=
 =?utf-8?B?eFpCQ29OT2NHT2p5SjlmRkhKMWFGbUx1bEVJVkV0WndvRjRVZHJpQnFwZ2VP?=
 =?utf-8?B?SlNWd2xOVUczbzJKcEdYWTh4R0lZWXEwcGlWTmJwN21pVGRsSk1uMGtnbHdW?=
 =?utf-8?B?SlJnM0NCMGMyRWI4MjViVHdFMG51YndaUDlqaWNKNGl2ZlZzMlFWWFhCcDhK?=
 =?utf-8?B?aXJpWEUrRE5FS3oxS0hDcWlwclBsLzVmKzhPZzBlQ3J1dk95UWZVRklPS0Qz?=
 =?utf-8?B?Nzh1RjVZemtIUFQvdnZTTjJ5QjNpNTYzdWF3cUdWakE0SjFTcW9aY2Q1VnlL?=
 =?utf-8?B?UXBIOU5HZU1ZclQyd1pTOC9JbGxpdWlXM3Z0UjVFWkJsVThHaEpob0JQV1BH?=
 =?utf-8?B?bmdEd0YxeThvdUhxZjZ4RkdkSGhiano1bElzOWlRbDVCOTZ6M1RCZjk1TTk4?=
 =?utf-8?B?dnllTUNyQTZtZVNnbkozdHpvY1NyMHFkMmxhMklicVUzNzZLWnhveTJ0cEZ6?=
 =?utf-8?B?WjZjUkRtV3hCb0RuUTM5SjRaeTcrcENJWXZ2WGEwMitQakNEOTZZSmdpNXh3?=
 =?utf-8?B?UXhlQTI5ZTJZUzdqY2VncWlUR0xRRkpzbTQyWVZ3TGJjR1ZhQXRxeGlxOUVh?=
 =?utf-8?B?RzlNZGM5NXdRNmlMWHM2VU9sVDhhR1NhWmgwMTdMS2lMOUVwOUtYT00ySHlz?=
 =?utf-8?B?TksrMXY5WWFzV1drbHpyT2VUQmFKVWN4ak1tQTFRRTZ2VHAzczlYd1FpRHhL?=
 =?utf-8?Q?spKp/X679b/ccFwoq5q4AMs=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: cb8b58fc-94a8-4a86-26ba-08d9fb5ce346
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 08:24:21.9630
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: ZrsY3xnI1i67Z0ovQe++I7Hfysn8hcRDhzme8U8Lz0w5loyeruCbyY1j55I3P+49UWEMByzCaIHCcVfzzc2j8A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR04MB6475

Hello,

when commit d96e5e6c1214 added UNSUPPORTED, it left x86'es TBOOT
default untouched. This means we default-enable an unsupported
setting, which doesn't look to be what's generally wanted. I can
see defaulting to DEBUG as reasonable, and SCHED_NULL's defaulting
to enabled when PV_SHIM can imo also be justified (there it's
rather that UNSUPPORTED is inapplicable for the shim case, and the
adjustment was also done subsequent to the named commit).

Shouldn't we therefore have a rule of thumb that UNSUPPORTED
entries only ever have no "default" (implying "n") or default to
no more than DEBUG?

Thanks for opinions,
Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 08:28:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 08:28:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.280978.479101 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOxrp-0005La-Sh; Tue, 01 Mar 2022 08:28:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 280978.479101; Tue, 01 Mar 2022 08:28:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOxrp-0005LT-Pm; Tue, 01 Mar 2022 08:28:21 +0000
Received: by outflank-mailman (input) for mailman id 280978;
 Tue, 01 Mar 2022 08:28:20 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=TZGk=TM=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nOxro-0005LN-F4
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 08:28:20 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTP
 id 8c0f8799-9939-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 09:28:19 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id E68941042;
 Tue,  1 Mar 2022 00:28:17 -0800 (PST)
Received: from [10.57.5.142] (unknown [10.57.5.142])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 6A5B13F66F;
 Tue,  1 Mar 2022 00:28:16 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8c0f8799-9939-11ec-8539-5f4723681683
Subject: Re: [PATCH] xen/arm: Remove unused BOOT_RELOC_VIRT_START
To: Julien Grall <julien@xen.org>, xen-devel@lists.xenproject.org
Cc: Julien Grall <julien.grall@arm.com>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Julien Grall <jgrall@amazon.com>
References: <20220228100633.57593-1-julien@xen.org>
From: Michal Orzel <michal.orzel@arm.com>
Message-ID: <ca501104-4563-d9ca-ffb1-ca4fdb1dd084@arm.com>
Date: Tue, 1 Mar 2022 09:28:09 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.10.0
MIME-Version: 1.0
In-Reply-To: <20220228100633.57593-1-julien@xen.org>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 7bit

Hi Julien,

On 28.02.2022 11:06, Julien Grall wrote:
> From: Julien Grall <julien.grall@arm.com>
> 
> We stopped relocating Xen since commit f60658c6ae "xen/arm: Stop
> relocating Xen".
> 
> At the same time, update the memory layout description.
> 
> Signed-off-by: Julien Grall <julien.grall@arm.com>
> Signed-off-by: Julien Grall <jgrall@amazon.com>
Are these two entries needed? I'd say one is enough.
> ---

Apart from that:
Reviewed-by: Michal Orzel <michal.orzel@arm.com>

Cheers,
Michal


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 08:46:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 08:46:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.280988.479119 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOy9G-0007tW-GR; Tue, 01 Mar 2022 08:46:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 280988.479119; Tue, 01 Mar 2022 08:46:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOy9G-0007tP-Cn; Tue, 01 Mar 2022 08:46:22 +0000
Received: by outflank-mailman (input) for mailman id 280988;
 Tue, 01 Mar 2022 08:46:21 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nOy9E-0007tI-Tj
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 08:46:21 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 1000ebaa-993c-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 09:46:19 +0100 (CET)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur01lp2052.outbound.protection.outlook.com [104.47.2.52]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-14-_HzsyLxQPCi3Cmny5iMOww-2; Tue, 01 Mar 2022 09:46:17 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR04MB5424.eurprd04.prod.outlook.com (2603:10a6:803:d0::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.25; Tue, 1 Mar
 2022 08:46:15 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 08:46:15 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1000ebaa-993c-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646124378;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=0T2Dj9t3eq40h1Iz+f+/8zWi+R815wSe5e6l/W5S/+g=;
	b=dGVogbRfjFxTTMhPtzVSgW10wWJ4Xg0do8d9yWziR5jdzyk+zrZ0/hCDxfGJgQC96vpi5Z
	axF9VoyxQaPrZ85rGpasHr2Gtu/DLn8bgFOXSGUooDdNV+nhT1IGv5DG9UFfAG8e8Zb32p
	EdOFCvJF0Ctxty54jhmM9uuFHzg3lBI=
X-MC-Unique: _HzsyLxQPCi3Cmny5iMOww-2
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=OHiQOl9Xpdcx3zQUCtxZnPe1o0vrWqrcZfxiC++CGFH7dk18d9RU686Te2rnT/UGIoqvZLw/hWv/ROXGK4xP5VSODAsxX7lb84UxV4vT5efDGlPcb7E3ZvlBEaDKUN5kaa+uAIFxIGDoNrSNVLIL4hEGINUnMcZDQO2xjvWODEhreRv6JjCL1tEtxefx1Qv79OrmMbp5ALVK11xwsdCGXPL5MfLtibHUsYQFpxEG6mH62/hPOpl0fhA06g251ZqrmeQnoqUyUPFv3xUHjKTIdnjdOcre02TzyHMZCywQCQj4ucLhFr/xPQkviRRmAsyh2szWcyG2YNnosEgPTtJ+hQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=0T2Dj9t3eq40h1Iz+f+/8zWi+R815wSe5e6l/W5S/+g=;
 b=SurXWv+1bV5kSxfmGEEmwZ0EZXf10pRKdxFDOcvyUfmiGw8H8WU0n0tyBMThRTEbREtcbFmpd2s3VKemlGAZunkLa3ztn66ELXSj3dDNOckm3y1GD0MALLlpb1ZtqRFNvQCJQ9Jk6Jelg3HWQ9HjZZFrXR/ORRBXNtnOKShKIEs2g27LNR4J0LDaw9STpoOj7sRDq7dGeZQrHwSdSdb7fqvHlLCxN1NBJO/lsR0ubnKoAqodWDd/Z78moDOcqynlmglhqtrFDddhref1LBOqOKFDv9P4e7oBkKu0gElOHqpCctYwJ2u08GzEpZ/9Tmaiy9dp0zKOn4/NJaOIAfF1tg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <8597cd20-4d79-0f5f-8370-d2353e7116f7@suse.com>
Date: Tue, 1 Mar 2022 09:46:13 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v2.1 2/2] vpci/msix: fix PBA accesses
Content-Language: en-US
To: Roger Pau Monne <roger.pau@citrix.com>
Cc: Alex Olson <this.is.a0lson@gmail.com>, xen-devel@lists.xenproject.org
References: <d8da3251985684ab9099ce95a8329a7e35535a7b.camel@gmail.com>
 <20220226100554.2664-1-roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220226100554.2664-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR06CA0097.eurprd06.prod.outlook.com
 (2603:10a6:20b:465::23) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2f64deea-1204-4e80-44f1-08d9fb5ff243
X-MS-TrafficTypeDiagnostic: VI1PR04MB5424:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB542459E527620E9177E148DFB3029@VI1PR04MB5424.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66556008)(8936002)(38100700002)(66946007)(6506007)(508600001)(6486002)(5660300002)(8676002)(4326008)(66476007)(53546011)(31686004)(36756003)(83380400001)(6512007)(2906002)(86362001)(2616005)(6916009)(186003)(26005)(31696002)(316002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?NFlWVXlvN1BTR09IN3daam5RTG1vU252allvQnVlTDFtTXY2aHhWRGRhZTZs?=
 =?utf-8?B?TFdoUXdvZWMrRUZQam1HS3V1V25oTm8zWDBHRUxTTzdobENNNWVBaDVrZFdk?=
 =?utf-8?B?UWw5ZG1mVGRrcVJEcjkyNmJoclF6Rm5yQkpZS0VCWGNLanVMaGROOTRNSlBu?=
 =?utf-8?B?cktMY21TVkFjRUUzUGliQyt4WjJaMHB1Y21keFZBN01YdlNFWmtKeUR3cVNI?=
 =?utf-8?B?bkdSQjdCZVlHNGhObDRyYXo1L0JFczNIUE9PeTdpc0hvWERPdll5ZkkzUVNR?=
 =?utf-8?B?VzE4cjBvdGcvN21EYWxwNGRDdDIxWXlDZVIvdEdMQkxzSkhaUDhLR1BpaEhC?=
 =?utf-8?B?WlBMOWNESk40V2RQNnV2RzlkdlpUZU9TRDFxTTZxUzdWS2l5aXJzWDlZR0Zh?=
 =?utf-8?B?VEF2c1IzeE54NXRqRFhkM210VFl5WVNnbTVuQkphcDcvTW4za1pGbHlreVo2?=
 =?utf-8?B?VUgwMzZQcmhTMThLc1dxazhBR0lQSWgwaHA0R3pmYUNGaVB6V25PdUVvRDgv?=
 =?utf-8?B?UXZKckFsc0p6WmkwUERvL0xyT2lRSnRzZVdJZWtDVVhzaUtTaHV1cVc0NmpS?=
 =?utf-8?B?QmJIOVV6eG5admFKQk43cGY2U2Y3SisxV3FKMHdlRFloNmlJc2FTcHR1YStr?=
 =?utf-8?B?S3lzTjZ4OFowNklXL3F6UHdERHliTHJaeUVOaHF4STJpWTZQT1I3K1VqYTU1?=
 =?utf-8?B?VFprWis1M2k1UUVlcEZrc2ZSV05jWXBsM0VwRThGUVBPaU1Td1MzQldqTERV?=
 =?utf-8?B?elFIVnF2cnkxNGpHbEwvblEzaUFlS2hveTNXUUtKbmR3VGVYTlpxZDNTQ1VJ?=
 =?utf-8?B?Um5LejNQeG9KeGdLZkRpRHhIYkZkYlZQVlRGTXAra0hSNm1mZy9NMDdjWjN6?=
 =?utf-8?B?YlkzZEJJSEk0bllyRyszckNUclpFUlRpdVdhc2Q2MlorL0tFRlptVGZnYUc0?=
 =?utf-8?B?UDdNOTNZS3RIbWhoQUxhMjRDMFROWGovUmgvZFpRZkpyUEdPdm1mSXAwcW1D?=
 =?utf-8?B?Mk9hVEJ0bUc5NWdMS2hPdXNvVVFyakhjVHVDN29CcERtR3ExNHBYbzd3UzJN?=
 =?utf-8?B?OGhwUFRVa0VQa1ZGaVhKS09yMGJueDJyNVN0eVVqTlFKL1drRzFrS3lZN1lQ?=
 =?utf-8?B?ZmVna0kxVzdvRGZRcnIyVzVSVVhHbjZoOXdoaktSMVFLWkRpNGJvQmFaenJY?=
 =?utf-8?B?ZTM2SlJLc0g2d1FwVGdmTmhwcWpIaGFaYlNPSUR4U0NOMlV1dGh2MFkrblUx?=
 =?utf-8?B?TzNrVWVGdlJ3cXpENVk0MEJvdXdrbzJnM2U4MFYyK3VlNE04UGEzODBMS2xl?=
 =?utf-8?B?K1BScXlHUmpHUUkyKzU3NWk1clRMV1pDYm16d1lxbjllUmsxdlZNallXeEEz?=
 =?utf-8?B?QTJ0UnFRb2ZIL1lHbTk5clVHZ1JqZlFEMzc0NnJMU3lVOXo4VkVlQWl1em42?=
 =?utf-8?B?bHJRSGY2aGYvSUIxU2pUSmtHcGtjSTQvZi9tdGxDTjdSY09pNkhZUXFlbGE3?=
 =?utf-8?B?T2ZkMTB2VEczMDBqQU1NaGNmY1ZVRXBSNkdFY01Ha2RrS2RwV0hWVWM0QWJ2?=
 =?utf-8?B?WnVDM1p0cUgrbDZtRGVPOVFMWjc3U1BOZE16ZjYxRjE2THNXZk83dVpHYWdl?=
 =?utf-8?B?ZHFORWx1WmZBMjhpNjZ5UVNXdXdwY2JvTkhXK3NwRFUvcHJoVUhpWlhkVFBH?=
 =?utf-8?B?UTZMa3ZvdW1KWkJzUkpwdHdybkN2UTZuZ09WU1haM0hxcU1UcnpITHczNkhX?=
 =?utf-8?B?V2F0cDU5NkhOR2xWQkNUY2lQdVYrZUl5NzJ5M0ZWUHN0bGdDTkJhV0VwMm5y?=
 =?utf-8?B?b2w1YjduMUFrazViVEd0MkM2SGVKclhabEc3VFFMdjU4RUZOVmNsUXZvQ3l5?=
 =?utf-8?B?MklDZWVZOVlIR1QxZjRqSm9vZXl5WUh1Uk95KzVPa1BQRUdiY2tyZDRUUFRZ?=
 =?utf-8?B?MkIyOVRGN0p3eDdVUDhVZWZIZkMxMktNVU5VenZLMGhMdUJXajM0bmlFQXpE?=
 =?utf-8?B?bWNsdDZ6bjQwZG9aeTAxT2F4djNISDlWNUkvNjZPZlpRZ0I2b1R5UXRFS3pt?=
 =?utf-8?B?RHpicFJhMy9UY010b3B1UHI0VGJKVUFUTVBHeGpvd1pFKzZFRmpzVUEvNzdY?=
 =?utf-8?B?eDQrMi8xY3RiV3hBSGpkZEVWcHF4eWhERldNaW1sUDhWN1BZK3V0Myt6Y1hR?=
 =?utf-8?Q?Tjdf55sd5zLobh3GUEPM2EQ=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 2f64deea-1204-4e80-44f1-08d9fb5ff243
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 08:46:15.5533
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: kdhDQLFNcgQX4mlRryCXlqovjUkz5WcAh+QZWODcXyQkfL8zaac/3ZraW2sWQo2ISPhI8Yl9HnS6nRbT3c2cJw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB5424

On 26.02.2022 11:05, Roger Pau Monne wrote:
> --- a/xen/drivers/vpci/msix.c
> +++ b/xen/drivers/vpci/msix.c
> @@ -198,8 +198,13 @@ static int cf_check msix_read(
>      if ( !access_allowed(msix->pdev, addr, len) )
>          return X86EMUL_OKAY;
>  
> +    spin_lock(&msix->pdev->vpci->lock);
>      if ( VMSIX_ADDR_IN_RANGE(addr, msix->pdev->vpci, VPCI_MSIX_PBA) )
>      {
> +        struct vpci *vpci = msix->pdev->vpci;
> +        paddr_t base = vmsix_table_addr(vpci, VPCI_MSIX_PBA);
> +        unsigned int idx = addr - base;
> +
>          /*
>           * Access to PBA.
>           *
> @@ -207,25 +212,43 @@ static int cf_check msix_read(
>           * guest address space. If this changes the address will need to be
>           * translated.
>           */
> +
> +        if ( !msix->pba )
> +        {
> +            msix->pba = ioremap(base, vmsix_table_size(vpci, VPCI_MSIX_PBA));
> +            if ( !msix->pba )
> +            {
> +                /*
> +                 * If unable to map the PBA return all 1s (all pending): it's
> +                 * likely better to trigger spurious events than drop them.
> +                 */
> +                spin_unlock(&vpci->lock);
> +                gprintk(XENLOG_WARNING,
> +                        "%pp: unable to map MSI-X PBA, report all pending\n",
> +                        msix->pdev);
> +                return X86EMUL_OKAY;

Hmm, this may report more set bits than there are vectors. Which is
probably fine, but the comment may want adjusting a little to make
clear this is understood and meant to be that way.

> +           }
> +        }

Imo it would make sense to limit the locked region to around just this
check-and-map logic. There's no need for ...

>          switch ( len )
>          {
>          case 4:
> -            *data = readl(addr);
> +            *data = readl(msix->pba + idx);
>              break;
>  
>          case 8:
> -            *data = readq(addr);
> +            *data = readq(msix->pba + idx);
>              break;
>  
>          default:
>              ASSERT_UNREACHABLE();
>              break;
>          }
> +        spin_unlock(&vpci->lock);

... the actual access to happen under lock, as you remove the mapping
only when the device is being removed. I'm inclined to suggest making
a helper function, which does an unlocked check, then the ioremap(),
then takes the lock and re-checks whether the field's still NULL, and
either installs the mapping or (after unlocking) iounmap()s it.

> --- a/xen/include/xen/vpci.h
> +++ b/xen/include/xen/vpci.h
> @@ -127,6 +127,8 @@ struct vpci {
>          bool enabled         : 1;
>          /* Masked? */
>          bool masked          : 1;
> +        /* PBA map */
> +        void *pba;

Here (and elsewhere as/if applicable) you want to add __iomem, even
if this is merely for documentation purposes right now.

I think you did mention this elsewhere: Don't we also need to deal
with accesses to MMIO covered by the same BAR / page, but falling
outside of the MSI-X table and PBA?

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 08:55:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 08:55:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281000.479130 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOyIF-0000zI-Mz; Tue, 01 Mar 2022 08:55:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281000.479130; Tue, 01 Mar 2022 08:55:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOyIF-0000zB-Jy; Tue, 01 Mar 2022 08:55:39 +0000
Received: by outflank-mailman (input) for mailman id 281000;
 Tue, 01 Mar 2022 08:55:38 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nOyIE-0000z5-4W
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 08:55:38 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 5ca63873-993d-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 09:55:37 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2172.outbound.protection.outlook.com [104.47.17.172]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-28-GkYsPyKJPLiDnji0F45UfA-1; Tue, 01 Mar 2022 09:55:35 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR04MB4497.eurprd04.prod.outlook.com (2603:10a6:208:6a::28)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.13; Tue, 1 Mar
 2022 08:55:34 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 08:55:34 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5ca63873-993d-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646124936;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=R4Pgof5PQtcWSd4BB7sXGDJ55OaF2iH1mZ5hQRwpEXM=;
	b=JDo0k/1GgQ/RRlTMc3WTK0YJUZgMX3A18H1LL6MihmPZq6hcz7w/5PddItWxEuWk2rXiP1
	As8eZJgHBAmXHDqDvs2Y4qj8XheQRyub/Zg7cNa6lPXEQwHDdA9r8knmU2Qk2UunknOOiH
	sofWRTr6Qmiw3Ua6V2i/GnSNnoRuiDk=
X-MC-Unique: GkYsPyKJPLiDnji0F45UfA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=iNK6/qsgiRrauq2Y6QzhSDGroHWMsaDShh/4WHhmJTftwjQg+VcyselGr4chzFrKTrITOPNAOBh5KOA6eBLO9spdLO2DuaKQGyc93mbWpZehlN0XRvwyvk+1I0/KfHzHr3ZnTcT8iLI3znMRMcdBdMwydzgJG5mVBlXYD2SH9Yys0MS1fAyH9QFgjrxKLLsabAl4bOVxOziupkcnNizipChdZ/bILLMX3QTTVbeBr90zmeGtJRMMoYXoWp3fASzqbdTuklqbjVZNp6R1DZls0K2veo37Jh9VdTYR75LFIcUz+FSy8dofJLeecEsoLBLcSRE1ovF4RqI4me8I+pTTpQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=R4Pgof5PQtcWSd4BB7sXGDJ55OaF2iH1mZ5hQRwpEXM=;
 b=R0wA/rNv3JE1hdHynTKnclIunI6xu33m/bsTXln4doAjqHrCaqNJ+yV74aBgYqB4fT6PEGlDvY/JJFFR+McIVt/33OcxZRDqFFUIlJl/FwNquPb9bK5SEOCGwi1bTPJVPVgmnkk7aaSRv5uBoNb1Vilto1SAX/H/9BwPildEJESGxnvbOC8LqlULL2tmKiaCTq94a2kRsLC/l/0GYpdkg/ZVKlfgzYiqxe86zyXOfL5S5gLAhoH3swQ01SU0cNUGdV/NIVlDcFrBQnPoaGQ3skHMrSxIPUDecm8aphpgjdIBbQ3RJNO2SdoASXLZsawIJ9dWEthuWZTlf67tEqJtVA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <03851bd4-9202-385f-d991-c9720185c946@suse.com>
Date: Tue, 1 Mar 2022 09:55:32 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Content-Language: en-US
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH] x86: fold sections in final binaries
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM5PR0301CA0017.eurprd03.prod.outlook.com
 (2603:10a6:206:14::30) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 6ffda49a-0a09-4c43-b07d-08d9fb613f24
X-MS-TrafficTypeDiagnostic: AM0PR04MB4497:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB44977F26FECD306A482964ABB3029@AM0PR04MB4497.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2906002)(2616005)(26005)(186003)(8936002)(6506007)(6512007)(83380400001)(38100700002)(31686004)(36756003)(8676002)(4326008)(54906003)(66946007)(316002)(66556008)(66476007)(6916009)(6486002)(31696002)(508600001)(5660300002)(86362001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?ZVkwRnJBYXQ0Yit1UVNoYWU1RFNudjlHajRFa0V5eExHSDczWXNjZkMzSUJH?=
 =?utf-8?B?aDB6WFo1bFkvZUZVVS9TWUdvT0NMN05TV3hsN1ZMUjFTR2Z3eklqNEdNVE9u?=
 =?utf-8?B?Ym1sVUpnK29hVXJFQk5sd2M2eTNtOTRGMkdUNGpiQUMvdmcrZTAwSDYvS0Rs?=
 =?utf-8?B?SEVLMEU4ZzdjOTVEVGQrTmp5R2hUajRYam1IUERhdVhyUUNxbW92Zk5JUVJ3?=
 =?utf-8?B?cFg5NnZOSWw4R0JjSDVRdWVhNEhRUTRBN1FqdnZhbUV1eHJNNkZXR0dQaGVG?=
 =?utf-8?B?M01nU3pHSGNxTGVoakQ5VC9kWnJmaEJRWDA1OFBoWnpnUTZGSWhvRTdqU1pj?=
 =?utf-8?B?OUV2Zm5nRlNUMnloQytOZ01ndFhvemRiZlBjWFN6QmJ1Tk9Jbkx1ZTZHbGFJ?=
 =?utf-8?B?ci8wQ1UycEhCazJPclQwTi9uM1BFQm05TUJFeWNEWVZEcGpwRGhjR2xyTHhv?=
 =?utf-8?B?elZZSlJJZmhXWVNMWGpHOFh0d3lsTkY2OG9mUytyN0x3UTIraFpwVWZtanhs?=
 =?utf-8?B?V0FxbEdPbkVlQzBtMkdKUksraUFWVFJXZldjd2c5SlFNM0p1VGVVUDg0c2Vu?=
 =?utf-8?B?bGd0MytpbnNkb3pVWHRrckxlRkNqeCs2cExCak55TU1IeFpiZTR4U3VDM3F2?=
 =?utf-8?B?Zmtqb2FKYmdQQkhwS3pmUTZ0ZXZGbkRET2c1bGlZbkNjSTUzbXM1UE00MXhZ?=
 =?utf-8?B?aU93NndjNlJ3TklmeHo5YUxEc2YwV0QyRjU0ZGVDcU1QbTJXRmhab0lvclJS?=
 =?utf-8?B?WmpHRi9LTXV4NlQ1dlI5Wi81dUdPRVVtOGMrNHFNT0dqdHZMMHJFYm90RFZt?=
 =?utf-8?B?ZW9sWGRFWU5PZ09nWFhZdGlyRjNjQWJVU3RlbTZYZVBLU3ZUMzBwR0V2dG94?=
 =?utf-8?B?OTM2RmZoL25XNTYwRmovRTNFNGpaS3dMMXdPRVNpVHl2TFpvb21lSmV1bU5L?=
 =?utf-8?B?MWdhdlJVRXdnMWhjazJaWnAvYyszeitoQURXaUduSDBSazVWOGpMY084K3RT?=
 =?utf-8?B?dWZVSXA3TW42VmxKblJMazg0YjYvdHVVamQwbUJkOXc1L05vOG9vTlYwT3h2?=
 =?utf-8?B?bkI5UEQ0elhGY0NVRlgyVjVUc0lKMURhQTRnSXFHRHd1RDNuVUZ4Y2NFaWVK?=
 =?utf-8?B?UExXSmMyNXJiN0VnUEdjblBzMTNXa3EzcExmbEU3TWFscDR6V2d3VjkxcE1N?=
 =?utf-8?B?Um5yU28xcFhZVms1ZjJCWEZwYUNFeHY0Rlo5c2lBbEZ2SWFVekRjc05SSmhU?=
 =?utf-8?B?ZkswdURBS3BsVjhlZlcxb2g4V1NZVGhENTVwblR0SGlvZVlIMEdRQTVOOVE0?=
 =?utf-8?B?Y3ZuRTBBdW93T0V0YklZTHVvQXBjSlNqQWtqWXdDSjFZOHI5WXZMYnI0eGZ0?=
 =?utf-8?B?ajRuL3FPMHpOdXR3YjFQYWwxd3pqWUZtbWdqam5EWVF0UmdYOGx2cWVrZkpp?=
 =?utf-8?B?TWt5R0V5b2pGb29wSkRMN0xTdE9ieWhlRkw2bDBOeUc5WWlnV2V6andXTFFl?=
 =?utf-8?B?V2ViR1RURS9yRFVLT1B5VG9OcnMrbTRxQTB2R3I5ZHMzZWpuZ1NWaTBORE00?=
 =?utf-8?B?dlhMaFdrZzJsR1ZSWDdRNDUvV1V3ejJobU5lRXhsNVlvYnRVR3BvQWJ1eFR3?=
 =?utf-8?B?c0tBT1hndDg2K2M5WjRkZGI3Unc4NmVqdk1zZkFjZkpSb21lcy9POGZVdE1R?=
 =?utf-8?B?Tm0vM1pwcGV0WVdPUDJsODdod3BsWWVVQno3UFlFU2RoaUp4eGwrekdvV1Nw?=
 =?utf-8?B?M0VYYzBOM3RKUnNJc2NqL2xiSzl3bmRZbmI2TFBtaHQwQnNnekFGM2tLaDFE?=
 =?utf-8?B?VlJTdHk4cTE4SmI1QnJqNXhKN2lGbTIyK2VQMGNBaTdYdXZFb252OGNrV3A5?=
 =?utf-8?B?OHlhL2dXdU00ejV2SUNGUi81Mys4K0tKOXc5Sk9rNFU2RHREdGcvYmkxeE1I?=
 =?utf-8?B?blpDZ0VPdkd3VEhMVXpZSldubWwxVFBvSFY0L3p4bzNYNGx4RmRNS0lqY0Vw?=
 =?utf-8?B?QVJleFFVSU1KTnFxc1p1eml4NTdyNHRQRDBTNTVNSFhNZFVWZFJEbDdLb2RQ?=
 =?utf-8?B?cTJMc0J5SUx5cnNEanhVSTBTZm44WTZzS3ZiMTdWcTFReUFyNWZoRk5qTm1O?=
 =?utf-8?B?NUwwSElUcEF4MHhjT05sdUR2U2srMExMY2lidVkwK1JjSWJ4bDZxc2dXMlJh?=
 =?utf-8?Q?8ezBtu+8sgOCryHCOfpYBO0=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6ffda49a-0a09-4c43-b07d-08d9fb613f24
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 08:55:34.0498
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: iU0TLPfUXG+T9lUzjJ2USZqh07nuH4BnVElDs+PvKhY22QniC/JWJuKnj0F7L9Y2f8kJaqTOMyKy/72YIumKUg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB4497

Especially when linking a PE binary (xen.efi), standalone output
sections are expensive: Often the linker will align the subsequent one
on the section alignment boundary (2Mb) when the linker script doesn't
otherwise place it. (I haven't been able to derive from observed
behavior under what conditions it would not do so.)

With gcov enabled (and with gcc11) I'm observing enough sections that,
as of quite recently, the resulting image doesn't fit in 16Mb anymore,
failing the final ASSERT() in the linker script. (That assertion is
slated to go away, but that's a separate change.)

Any destructor related sections can be discarded, as we never "exit"
the hypervisor. This includes .text.exit, which is referenced from
.dtors.*. Constructor related sections need to all be taken care of, not
just those with historically used names: .ctors.* and .text.startup is
what gcc11 populates. While there re-arrange ordering / sorting to match
that used by the linker provided scripts.

Finally, for xen.efi only, also discard .note.gnu.*. These are
meaningless in a PE binary. Quite likely, while not meaningless there,
the section is also of no use in ELF, but keep it there for now.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
TBD: We also use CONSTRUCTORS for an unknown reason. Documentation for
     ld is quite clear that this is an a.out-only construct.
     Implementation doesn't look to fully match this for ELF, but I'd
     nevertheless be inclined to remove its use.

--- a/xen/arch/x86/xen.lds.S
+++ b/xen/arch/x86/xen.lds.S
@@ -194,6 +194,7 @@ SECTIONS
 #endif
        _sinittext = .;
        *(.init.text)
+       *(.text.startup)
        _einittext = .;
        /*
         * Here are the replacement instructions. The linker sticks them
@@ -258,9 +259,10 @@ SECTIONS
 
        . = ALIGN(8);
        __ctors_start = .;
-       *(.ctors)
+       *(SORT_BY_INIT_PRIORITY(.init_array.*))
+       *(SORT_BY_INIT_PRIORITY(.ctors.*))
        *(.init_array)
-       *(SORT(.init_array.*))
+       *(.ctors)
        __ctors_end = .;
   } PHDR(text)
 
@@ -404,16 +406,20 @@ SECTIONS
 
   /* Sections to be discarded */
   /DISCARD/ : {
+       *(.text.exit)
        *(.exit.text)
        *(.exit.data)
        *(.exitcall.exit)
        *(.discard)
        *(.discard.*)
        *(.eh_frame)
+       *(.dtors)
+       *(.dtors.*)
 #ifdef EFI
        *(.comment)
        *(.comment.*)
        *(.note.Xen)
+       *(.note.gnu.*)
 #endif
   }
 



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 08:58:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 08:58:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281008.479141 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOyL7-0001hB-4h; Tue, 01 Mar 2022 08:58:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281008.479141; Tue, 01 Mar 2022 08:58:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOyL7-0001h4-1d; Tue, 01 Mar 2022 08:58:37 +0000
Received: by outflank-mailman (input) for mailman id 281008;
 Tue, 01 Mar 2022 08:58:35 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nOyL5-0001gu-IZ
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 08:58:35 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id c6340794-993d-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 09:58:34 +0100 (CET)
Received: from EUR03-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur03lp2050.outbound.protection.outlook.com [104.47.10.50]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-10-ZA2Rdo9OP5qZtTan0tyZCA-1; Tue, 01 Mar 2022 09:58:32 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR04MB3232.eurprd04.prod.outlook.com (2603:10a6:802:8::32) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Tue, 1 Mar
 2022 08:58:30 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 08:58:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c6340794-993d-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646125113;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=ft3AVtcvWbuURUPNZKVThsgE7AXGBdHKxZGrm8f1zgk=;
	b=K2MQrowGe6Z1fr+txVI7g32Ex2VdiXSIGB6grnYnzNjYo47DqzcjhhT/S1/4/nV4iWSC3I
	WUtfP6MTfoHQxgh14baNNq6nM+QtQfN3IpscvtLOv3QxkOe6gMejhocByylFPOG+BN/YFm
	QzUYMewW0Bpj05a/y3CSuNoSeeBtGv4=
X-MC-Unique: ZA2Rdo9OP5qZtTan0tyZCA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=nlffrs5h6ZqgxVPq4NFD14z2h+xH8A0bJpz2H3wbi7lwPuP5yeoGYUJ4GUVDoaRmm4i1R+BPodBrWrDTwTon6efrwBHbvsw8bFiyiBVfQg4L6uH3yC/m1Xg6qaLOY0USkugAfr/OaFXFji/lrxTEKHIQSpoJAwguf4QhWuuEl4QTzwqLm0qDr81ARGmqnHJYsB7ZRMEN8LSiWcHbiqh7Eg3JW5dtlJvHZJyWPdyFhvpzO+UbJhUk+TZ47z0Q2B37OeztJsLoNN6/NDv78XeJs/GdYmIZsH/oXdUS2DxLHAru5kYy/OWA3i1dT+q+1nhE8uoxrrTQz02/2wNHKbIOng==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ft3AVtcvWbuURUPNZKVThsgE7AXGBdHKxZGrm8f1zgk=;
 b=CLPJBMJuGGteCMX4SAQQPFL0GLZ02zgrFWBLf0lGViGOR+6jU9Dyo7zgDans8fs1ALLFkcrWfe66D373FH561FnIwO0W5wyaoFX8SiOMPX0VYbpzTqQW+kZVBqAUMPcU5z49LyjimVO4I1na/pitVQZhMp6ZEPQfG8WZFAihVPeiBNsWPs4x4yrJybGp6j6b7GouD9mI1s3/2Np4f+KU53ONqna34nwz68cYxHS3ZX08IZpZg7wcXGeUS74uZEpnb8ed13n8ZFWVAg8gCfGXxHrqRlbpo9RHvXrwuaWjxCcga5FiVYft1NuZqIDAntyFyvyLUOTqHN1JyYhIFyW6jg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <1a4bef81-d29e-97ae-098b-d1e582e5af28@suse.com>
Date: Tue, 1 Mar 2022 09:58:28 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] x86: fold sections in final binaries
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: Julien Grall <julien@xen.org>, Stefano Stabellini
 <sstabellini@kernel.org>, Volodymyr Babchuk <volodymyr_babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <03851bd4-9202-385f-d991-c9720185c946@suse.com>
In-Reply-To: <03851bd4-9202-385f-d991-c9720185c946@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM5PR0201CA0011.eurprd02.prod.outlook.com
 (2603:10a6:203:3d::21) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2ff4e34c-82d1-41a5-1301-08d9fb61a884
X-MS-TrafficTypeDiagnostic: VI1PR04MB3232:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB3232D5A8609D459FDB879D65B3029@VI1PR04MB3232.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(4326008)(66476007)(66556008)(8676002)(38100700002)(2616005)(66946007)(186003)(26005)(6506007)(6512007)(53546011)(31696002)(83380400001)(508600001)(54906003)(6486002)(316002)(110136005)(86362001)(36756003)(5660300002)(2906002)(31686004)(8936002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?dXJWMTZIMDE1SndlUUdvTXdWUDdNb0hrajdKT3BlM2VvYkxhUXpTQ1hIazJC?=
 =?utf-8?B?U0Z3L2t1elZZZDcySENrRENaZmZURFdzbGR2cGY5NGdFcEREdWo3dFJyQVFa?=
 =?utf-8?B?WUo2V0pzdUc5dnpaNUYzcU5Nd0Q4UW1iRWluNnZNWUJOdHVlMW1UVlZVK2lp?=
 =?utf-8?B?ZVNHRHVRSWVwU1M1eko0czFBV2xDN1Z2MytVUUxOL24zMno4Sk5KWjZIUHd0?=
 =?utf-8?B?d004aTU1M3g0RkI0aTVkT0Iwa25wOUZHeFdzaXFVekhtQmNTNERkNlYwZ2ti?=
 =?utf-8?B?Yk41RExnVERSd1pTak9uU2M5V1BHUk92MHpNV1oxaVJWc05IYjFJQWN0Tk1I?=
 =?utf-8?B?U2tmRmdtdmhpeElVUUlCcUJJVE9XaHJpYi9LS1hOekxkeXVka2xPYjFOcUkx?=
 =?utf-8?B?NGZBa1MySTdYVFE2bVEwUEtuVXZZblRRL3BIZmQyVlhmbmUwaUxsbUd2VERU?=
 =?utf-8?B?RWtYYWZtcm5LOHI4VmU2WU1MTFdnbThmcEdNSWdLakZqWThBUkNzZkFER2hX?=
 =?utf-8?B?OFhieE85azRIblhWMlJSWVIrZi9tTFkyUHZCUUZsU3JYaVQrWTI3VW5Gay9E?=
 =?utf-8?B?MHJvdFFjc3Mxc253Y3V1TVpnR0J3MCtIdWE2R2hGMElCRWFkVXBSbVkyNlF4?=
 =?utf-8?B?Mlo4N05UcnlKTk5wSnluUUNJSnlycVdGZ2tTeVYxMU9Ha2NGNFFyZHhJY0tQ?=
 =?utf-8?B?bzg0cnpFUnhxTE85bGZRb2VMQnhvdjhKbXdpck9VQTczcnM3UmxmTFcyOWF3?=
 =?utf-8?B?ZGJTTXlKWWNoYlFpVUYvUFdleW1RbGM3aHRUbWluMHJ3M21VRDFxWjhWZWxa?=
 =?utf-8?B?N0M3cXAwUjE3YjlJQ1ordDRnR05CT0VDZkdneWovakx0UnZDUHMwRS9Ydnlp?=
 =?utf-8?B?aUs1RStFYmg5UnV0ZmIrb0FxS2ZTVk03N24rNXY4RlQyK2ZCU0ZkRlJXMGxU?=
 =?utf-8?B?WUNvRHVyTW9QaDdjVFh4TE5oMUo5VHNiSzcrbko1Q0VMV0xMb2hGa0VvTmpM?=
 =?utf-8?B?U1NzcVVmRW85enRqQW11b3dmSzVRSzBuL3FWV0U3bE94b3JWWk1Pd21vTEJJ?=
 =?utf-8?B?Vmx6TVg3Ulh6V3NtemQ1TktaMDFvQzY2a3RMbWhCNE9WVmxyMWVLSTFQcUFi?=
 =?utf-8?B?SityNGpnNzkxUHlBeERFcGloZThRbHlHSVE3TWhJTlVvcE5kVTRRbzNKczBn?=
 =?utf-8?B?b2FoMGpUYlI3L3JmSVpCajdSbW80NEVoaUlwaUR4UGx3ei9PeExBcENDTFlZ?=
 =?utf-8?B?UVExZ1NjQ3J3b2xHTzljNFVUZThjM0FaR1JYOXRrUHVQdWlnNFhuaFdOUExn?=
 =?utf-8?B?U0dCWEJhMUZnOUkwaEJQaFY5bWFILzBBTEJuWHdsTk0wT21FckpwYzhsdGtr?=
 =?utf-8?B?VDJZVTZ2ZFJUdWlmdnFqcmtQVVExdkdXZHBST0s0QVBZcjZvd0dmWWU3YWlV?=
 =?utf-8?B?VHlLOWY2VlpCbDd5TjhLL2c3M0FKTWVJSlh2eWE0TnNwbjVtNHYveEp0Yzdi?=
 =?utf-8?B?U0lJKzg4czQ0MUN0a05jVjlseG92VUxnQkdnVlJRbmk4T3dBSzVYVkpadWhu?=
 =?utf-8?B?QkhBeVlkQU94UHBVNi9ZZzdZOEtiTndFOGpOV2VWNlJtMVJqZHV4Z2VLZ01z?=
 =?utf-8?B?VE1vTFdKUmNVMk5wamYrdVVGUVI4ZDFzTmpteFBzYzFUNlBOamJTVkludmdF?=
 =?utf-8?B?Nm82ZS9uRXNvWGpXWWhYbW9mSVFrazJPQUVabkNFUW1kam9qYTR6b0RBdEZD?=
 =?utf-8?B?c05jWnFZL09kOFczbFdnT25MOWxiQ0VBcmJDWUh2T2VvQ0czalNEejZEaW1V?=
 =?utf-8?B?cnpjelFXeStMN3hRZGltMEN3RmJlQkJUNmIrVmJ0eXFuZzRjclRzSFZtYmVp?=
 =?utf-8?B?R1BQUGlVS2pvNDRucDhBZy9RcVZaUU00SGh0MHREbTZmd1NnQStPbDlEdjdm?=
 =?utf-8?B?ZWJiZ25KODc4OUlNNFd1aWNORENUMGJPR0RoSzFsdHRLYXVTMGxhWUthbXY4?=
 =?utf-8?B?UTdiTjluY2pXQkpad1BDTlNWRGpyaitUZFpJK1k0ZVdKYVRYcHd6dHQxNk1a?=
 =?utf-8?B?R2tNUldhcGNIdnA2cEpRdkxXMVBMaWJYM2tIbXpuSUdPNUovb2F1WDN4THNG?=
 =?utf-8?B?Y3R2clVBVU1hYXVYbWU4NnM4QUxjY2dxakxBZHVVT3JiVzJNZXRndDRTazVX?=
 =?utf-8?Q?mAbh7knCSvXZr4o9/t/yQMo=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 2ff4e34c-82d1-41a5-1301-08d9fb61a884
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 08:58:30.8200
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: skxtxGh7Vnb8vXk+hn6Bv6T8Tw9y4A/HG04B+DRJKvXmsz/xHw5G2W+HHpp/BI3GKocvtfj5ls6l3NHBIlTQ2w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB3232

On 01.03.2022 09:55, Jan Beulich wrote:
> Especially when linking a PE binary (xen.efi), standalone output
> sections are expensive: Often the linker will align the subsequent one
> on the section alignment boundary (2Mb) when the linker script doesn't
> otherwise place it. (I haven't been able to derive from observed
> behavior under what conditions it would not do so.)
> 
> With gcov enabled (and with gcc11) I'm observing enough sections that,
> as of quite recently, the resulting image doesn't fit in 16Mb anymore,
> failing the final ASSERT() in the linker script. (That assertion is
> slated to go away, but that's a separate change.)
> 
> Any destructor related sections can be discarded, as we never "exit"
> the hypervisor. This includes .text.exit, which is referenced from
> .dtors.*. Constructor related sections need to all be taken care of, not
> just those with historically used names: .ctors.* and .text.startup is
> what gcc11 populates. While there re-arrange ordering / sorting to match
> that used by the linker provided scripts.
> 
> Finally, for xen.efi only, also discard .note.gnu.*. These are
> meaningless in a PE binary. Quite likely, while not meaningless there,
> the section is also of no use in ELF, but keep it there for now.
> 
> Signed-off-by: Jan Beulich <jbeulich@suse.com>

Some of this will likely want mirroring to Arm as well, even if xen.efi
there isn't produced by the linker. Sections are better properly folded
even for ELF, and constructors not ending up in [__ctors_start,__ctors_end)
can surely not do any good.

Jan

> ---
> TBD: We also use CONSTRUCTORS for an unknown reason. Documentation for
>      ld is quite clear that this is an a.out-only construct.
>      Implementation doesn't look to fully match this for ELF, but I'd
>      nevertheless be inclined to remove its use.
> 
> --- a/xen/arch/x86/xen.lds.S
> +++ b/xen/arch/x86/xen.lds.S
> @@ -194,6 +194,7 @@ SECTIONS
>  #endif
>         _sinittext = .;
>         *(.init.text)
> +       *(.text.startup)
>         _einittext = .;
>         /*
>          * Here are the replacement instructions. The linker sticks them
> @@ -258,9 +259,10 @@ SECTIONS
>  
>         . = ALIGN(8);
>         __ctors_start = .;
> -       *(.ctors)
> +       *(SORT_BY_INIT_PRIORITY(.init_array.*))
> +       *(SORT_BY_INIT_PRIORITY(.ctors.*))
>         *(.init_array)
> -       *(SORT(.init_array.*))
> +       *(.ctors)
>         __ctors_end = .;
>    } PHDR(text)
>  
> @@ -404,16 +406,20 @@ SECTIONS
>  
>    /* Sections to be discarded */
>    /DISCARD/ : {
> +       *(.text.exit)
>         *(.exit.text)
>         *(.exit.data)
>         *(.exitcall.exit)
>         *(.discard)
>         *(.discard.*)
>         *(.eh_frame)
> +       *(.dtors)
> +       *(.dtors.*)
>  #ifdef EFI
>         *(.comment)
>         *(.comment.*)
>         *(.note.Xen)
> +       *(.note.gnu.*)
>  #endif
>    }
>  
> 
> 



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 09:07:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 09:07:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281017.479158 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOyTI-0003KD-2Q; Tue, 01 Mar 2022 09:07:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281017.479158; Tue, 01 Mar 2022 09:07:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOyTH-0003K6-Uj; Tue, 01 Mar 2022 09:07:03 +0000
Received: by outflank-mailman (input) for mailman id 281017;
 Tue, 01 Mar 2022 09:07:02 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nOyTG-0003Jk-2Z
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 09:07:02 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f452db46-993e-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 10:07:00 +0100 (CET)
Received: from EUR03-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur03lp2053.outbound.protection.outlook.com [104.47.10.53]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-36-LAZ0_ON-OZCYelWsRSRWWg-1; Tue, 01 Mar 2022 10:06:59 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM6PR04MB5815.eurprd04.prod.outlook.com (2603:10a6:20b:b0::29)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Tue, 1 Mar
 2022 09:06:58 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 09:06:58 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f452db46-993e-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646125620;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=hiU/P7w+AsXchWwmyxNqYBVb2zOqDmIi1c2BNpDN8n8=;
	b=Jb/Mi0yJBHdE/4/Tan0VgdAGmxdxKAZ4MDrIICoBoKG/Za7TcBmcc7l+UFfwCMS7zytQko
	CaUNb4tqQAgzfCwmtpf5OIw80XJn72ik23FBsG80h2CQxJoBuKmKTFrJZjcb85k9ymeunF
	kpgjjkqgPODOlfnVDoz5lKhaJONVD8E=
X-MC-Unique: LAZ0_ON-OZCYelWsRSRWWg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=lzVY3g7SNEC2FzJuBBHsADuFntmAl+NG2lZuOSXXJFW0T9pGOkwqJiy7twaeo6CXlg+cFYww6Sn2cUiAWBpo11S8IG+/O4SGevLyZ1c9CJVgTpQBBoAOQrkRN+EB5qSRr+PhPFh5okWHoPvBSrToDgPCyN25TaHRnFhQ4boDzZz82NUVMpYs2HNAL+nH8VOcVk4NalYnn3W+aPVlwHk4clLK7xvAvRSathU889/Ji3NXwbLrZDxZ87iCin3SXvzlDENK3B+8AcxHs+FTpD2Fpcv/xeYTUGmZSbdPmdKlG0yMzUfPVJvVHXh7VoK7H/Ec72rZTopsB1f0hD9mkAd0CQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=hiU/P7w+AsXchWwmyxNqYBVb2zOqDmIi1c2BNpDN8n8=;
 b=QaFnHckwi66g3bf7r3E/gEebp4DXxL+8OKsUG9kfN/+78iicLoa0PfP0kt8CQTz67GzeZ0p71805W7O4zUXy4gA+RaOxc6kyREvNECKqkqpapg0gh2m+AS59eSR0XqsZZ+fM5Ndvy3uuabKGx/68Eaxw1yTmGyybuNZrWzZ4/JEkhKhQINxTG07Kc5Ka8bLzmcWH8CmKOZ1zrY3QLjGzjnJxS+tJNy5r+tpDjLuwlafg4Qn111TrZVU4ysIF4iZR9p32TauJI6nNuCgbzOnbzvG1F65ptqsWm9n1vS7+RWtzh6ZIA/jXxY7U0oeWxfP53lp1zu6l/er98Et7u0HgmQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <2fffce8d-f462-a832-f323-87c93bcecf2a@suse.com>
Date: Tue, 1 Mar 2022 10:06:57 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH v2] docs: correct "gnttab=" documented default
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
Content-Language: en-US
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: FR3P281CA0038.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:4a::14) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 17585542-1bfe-4bf7-741a-08d9fb62d715
X-MS-TrafficTypeDiagnostic: AM6PR04MB5815:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB5815E419B25AC032120AC7A4B3029@AM6PR04MB5815.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2906002)(5660300002)(83380400001)(36756003)(86362001)(6512007)(6506007)(8936002)(31686004)(4326008)(2616005)(8676002)(6486002)(38100700002)(26005)(186003)(508600001)(31696002)(54906003)(66476007)(66556008)(66946007)(6916009)(316002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?MXZEUVRlMnFuYTR2blpuZWRUQ0Q5QTFGb2NjMG1lcTRuWUY4WXpqc2N0aFh6?=
 =?utf-8?B?c2JBQVhheS9CMnVQZFZndmUvaTZpZG5aMmNDeGNPekJTTmg3UzhiYUpSdWVF?=
 =?utf-8?B?OHo3SE56akRMd0gzYjF2MlMzTnhBNEdSVmNyTDJ0Z3Q5TGZBc3lXaWgrNXY0?=
 =?utf-8?B?enJ6VGJxaDFTaWRlMGRtd1ZlN0NLZkhjSCthMWJOdmVEY2VWRUhYZHRPMS9k?=
 =?utf-8?B?eDRDMFdiQXU2emlyWmErdmdaT25lVlVhRWMwb1NtWWQzRnRiNkE5N21kcWV3?=
 =?utf-8?B?MFA4aUJPVDdrdzBrdGpKVXpsdmZHRnl6UFdsSURtNEoxZWtETEp4Z2NRcUNX?=
 =?utf-8?B?aSt2eTJBcEFkdU5tRk5ISGxuK0pRUFVvTXF1WFRObnVsNlBlN3pobmZTbE5G?=
 =?utf-8?B?R3ZLSEUzNHZqY1NGSDF1TEpBejRXN1NNc1NZcTE1MTdIUG5xdWNxNk1reXVq?=
 =?utf-8?B?T0o1SGZmTStpanlZbzhRSmpxQmR6QW52OUY1T1ZNYmk2aTRLMjVBWWxGWTlz?=
 =?utf-8?B?cWRCa1c0YkhmTC9MaXZrNkpvSzVZL0VoMzZIandEcHJIQ1NISUdPMWRUMXk5?=
 =?utf-8?B?RmV6NGpaVXNtc09HSVIzQVFGZHdmeXNkbm5nS05ybWtEckhrYmxzQlIxWldn?=
 =?utf-8?B?VlJScmJxNHEwMEwrZWpsZ2gxVlZNN2o3eDBNK0YwbjBLRGtTdDlhOTZuajJZ?=
 =?utf-8?B?dWw2NVE3b05kZVdvaEJiNjBTdTZxYTd5alN2Tm1mRyt5cGRHME9MU1Q1Tm1m?=
 =?utf-8?B?K3BnUzZOUlduek9scHUvVFlFVG1XOFBBL1JmbDl1R1V4THFpNXNyNm5ocnZ5?=
 =?utf-8?B?UWpvUGJ5cnVNKzhZVUFCR2V1dlZ0Uy9xTy8yK1k3V0JOMmQxZHpnek5zODRx?=
 =?utf-8?B?MHpFUmZBd0dYYmw3bG15SEV1RmE5a1AwNG9obFBqUkwvdFNDT2NVS0FobVR6?=
 =?utf-8?B?RDhQUTFUSG1aY21EYUFtQW1sTUZnNnRvS1BVVzdWRU1hRzd2WUhTbTNnbE90?=
 =?utf-8?B?MXpsMFdtUUpTcDI1TDZEZE5uVXpPQUlMNlBMV2Q2UXpNTUJqbXhsdEZMNDJK?=
 =?utf-8?B?Sm0wZytEeWx2UzcwTlA2US9DNGNtcHFsYUx0ZmdmSWpTTzJYakhjNmdWSFg2?=
 =?utf-8?B?NkM5NXBiY0JTczN6eDRXVmtmZ0dpMmtEemFmVkNmaThDVkdmZlJlNW9QS3lI?=
 =?utf-8?B?SUVVaDh1ekYwcXh5aStnOWRrYXBITlF5NEpCT25qNk83YVFEYmdyYUlTQmEy?=
 =?utf-8?B?aHZpUEdoa1ppMkhaYkUxWC9XK0RZamhSUERwSEt1NEs2UXZxZkh4Um9kN1RE?=
 =?utf-8?B?ekFqbWpMZUZKOEJZRU9zOVFtWUpTSzh1M2ZOSzVZUnlJVno3d2tlaWcrTVl2?=
 =?utf-8?B?M1YrTTJHSllzTlZZUlUwdk5BMWtkWGVGeFNIdFdCUkNkRTE2L25mZEtZdHRJ?=
 =?utf-8?B?Ykx4U2s1Rm45Q2lWN2R2VkNDcHlOZ3FMWk10Q0RlUzgrSGxHNVozaHlWeHVh?=
 =?utf-8?B?d255c3RvbEpRYXkxZ0hQZmVHM1FyMHFnQ3lXa1kvZ09TSng1T1d5bGQwZlV5?=
 =?utf-8?B?d0hibzNHcS92bnloNFhRVHc2QjJ1ZWRNcFJDV2NCL3NHSkFSaUVFOS9nVnZF?=
 =?utf-8?B?TmFaQ1NZZTBiN1YzWGo2UXZCamNESGNicTJubVpocUNUQ2psaDZDZlZEaFJX?=
 =?utf-8?B?K1g0bHQ5VHViWGVUT1JGSnVMZGdtTU5aZkowSGFFMWJtN2EzOFEwSUZndHRo?=
 =?utf-8?B?VjU1eEh5TCs0K0Z2b0FLb2h2ejBxZ05mVmdIZlo2T1hXOHJqV20raStpVG1j?=
 =?utf-8?B?SERvOUh2LzljWUNyK0s2NzByYzJkV1BtNWxHOXc2OUtVbHRMTGNkY001NkxX?=
 =?utf-8?B?SHhLbjIwRVd2ZnVkcUh2NmcrWjBQVU55d3Bsb25NK2ZxNkpvMzEwUFQrMzdn?=
 =?utf-8?B?M0d5cFhtMHJ4bTV4Mzh5REc4c3MvVW1jNm14OFdFVUdlaWRnY2ZhUDQ0aDNn?=
 =?utf-8?B?YmZNSkQ5ZHVhM1AwTnhKVSs2Mno5Q3M3NnlCM0h1MFVSVE16SEtRWGxlS3o2?=
 =?utf-8?B?L2NOdzhqK3BkaXFkZVhSNWcreUJFTHRPa3puaVlIY1g0MW91MWM5ME53Ymts?=
 =?utf-8?B?RmY2N1dxTnRGVld1UlFwczJEeDJraC8rT1ovcHc3V1FnSk5KcmwvQ0xIYVJN?=
 =?utf-8?Q?8zjcIzLvZ+SBu2iZdQzJHAE=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 17585542-1bfe-4bf7-741a-08d9fb62d715
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 09:06:58.4447
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: s5UYzC5QHZtDyA+vvpWiVBN2/68kAmgZk2jmG770cj9+7hSfMmxOASTVZnoOtw3Uwj1HTjIBDxblFQyAMM8JsA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB5815

Defaults differ for Arm and x86, not the least because of v2 not even
being security supported on Arm.

Also drop a bogus sentence from gnttab_max_maptrack_frames, which was
presumably mistakenly cloned from gnttab_max_frames (albeit even there
what is being said is neither very precise nor very useful imo).

Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Julien Grall <jgrall@amazon.com>
---
v2: Split x86 PV and HVM.

--- a/docs/misc/xen-command-line.pandoc
+++ b/docs/misc/xen-command-line.pandoc
@@ -1177,7 +1177,9 @@ Specify which console gdbstub should use
 ### gnttab
 > `= List of [ max-ver:<integer>, transitive=<bool>, transfer=<bool> ]`
 
-> Default: `gnttab=max-ver:2,transitive,transfer`
+> Default (Arm): `gnttab=max-ver:1`
+> Default (x86,PV): `gnttab=max-ver:2,transitive,transfer`
+> Default (x86,HVM): `gnttab=max-ver:2,transitive`
 
 Control various aspects of the grant table behaviour available to guests.
 
@@ -1217,8 +1219,6 @@ Specify the maximum number of frames to
 maptrack array. This value is an upper boundary of the per-domain
 value settable via Xen tools.
 
-Dom0 is using this value for sizing its maptrack table.
-
 ### global-pages
     = <boolean>
 



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 09:08:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 09:08:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281027.479169 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOyUn-0003xh-H7; Tue, 01 Mar 2022 09:08:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281027.479169; Tue, 01 Mar 2022 09:08:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOyUn-0003xa-Dw; Tue, 01 Mar 2022 09:08:37 +0000
Received: by outflank-mailman (input) for mailman id 281027;
 Tue, 01 Mar 2022 09:08:37 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Qfhu=TM=citrix.com=prvs=052ba2b28=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nOyUm-0003xN-LJ
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 09:08:36 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 2b6a561a-993f-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 10:08:34 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2b6a561a-993f-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646125714;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=jtaHO/6yv8fud/lDlGDMwHCV2yhz0Ye4vvTfd/lzXac=;
  b=cc2zjPm+G/PpglAfgooTz/J12sjuXJX79TepyJeQt2HhaIQxpEyEowee
   fRvc+YSRGB0q9PPrxvinaFGF+FbqlkWQ5oBn/HDnnjWvbkajyMx6CHHwZ
   jqcbwJKNsmcAyOGAPIKcOt3WBmdOObPwNdknCtWBl8gLrS28sng/8M0FO
   c=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67485720
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:rUKaeqB5kOv34hVW/w3jw5YqxClBgxIJ4kV8jS/XYbTApD92hTMHx
 jccXG7Qbv+DYTb2eI8gYYm08UkDu5SGyIBkQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vh29Yx6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhO5
 d8XlqTzcj4MN5zoqdkUdiVFPgRhaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguw5K8bmJsUHs2xIxjDFF/c2B5vERs0m4PcGg2tg258URZ4yY
 eIEdjszQzvBPyRpN2UtWJES27izpFPGJmgwRFW9+vNsvjm7IBZK+KjgNp/Zd8KHQe1Rn12Ev
 STW8mLhGBYYOdeDjz2f/RqEmu/OhmX6Q8QbTLmj8fhCj1iax2hVAxoTPXO5q/Skjk+1W/pEN
 lcZvCEpqMAPGFeDF4enGUfi+Tjd40BaC4E4//AGBB+l9YfeuSWhRVM9azdwTO0bveoKWBEPy
 Qrc9z/2PgBHvLqQQHOb076bqzKuJCQYRVM/iT84oRgtuIe6/txq5v7bZpM6SfPu0IWpcd3l6
 23S9EADa6MvYdnnPklR1XTOmHqSq5fAVWbZDS2HDzv+vmuViGNIDrFECGQ3D94ddO51rXHb5
 RDofvRyCshUVflhcwTXHY0w8EmBvartDdElqQcH82Md3zqs4WW/Wotb/StzIkxkWu5dJ2O3O
 BCI518IvcYCVJdPUUORS9jqYyjN5fK9fekJq9iONoYeCnSPXFXvEN5Sib64gDm2zRlEfVAXM
 paHa8e8ZUv2+ow8pAdas9w1iOdxrghnnDu7bcmik3yPjOrPDFbIGOxtGAbfMYgEAFas/Vy9H
 yB3bJDRlX2ykYTWP0HqzGLkBQtSfChjWMuv8JQ/myzqClMOJVzNwsT5mNsJU4dkg75UhqHP+
 HS8UVVf013xmTvMLgDiV5ypQOqHsUpXxZ7jARERAA==
IronPort-HdrOrdr: A9a23:/bwf7Kj0kXKi9WQp0XAEYd+c+3BQXzZ13DAbv31ZSRFFG/FwyP
 rAoB1L73PJYWgqNU3I+ergBEGBKUmskqKdxbNhR4tKPTOWw1dASbsN0WKM+UyDJ8STzJ856U
 4kSdkCNDSSNykFsS+Z2njALz9I+rDum8rJ9ITjJjVWPHlXgslbnnhE422gYytLrWd9dP4E/M
 323Ls6m9PsQwVfUu2LQl0+G8TTrdzCk5zrJTYAGh4c8QGLyRel8qTzHRS01goXF2on+8ZozU
 H11yjCoomzufCyzRHRk0fV8pRtgdPkjv9OHtaFhMQ5IijlziyoeINicbufuy1dmpDm1H8a1P
 335zswNcV67H3cOkmzvBvWwgHllA0j7nfzoGXo9UfLkIjcfnYXGsBBjYVWfl/y8Ew7puxx16
 pNwiawq4dXJQmoplWw2/H4EzVR0makq3srluAey1ZFV5EFVbNXpYsDuGtIDZY7Gj7g4oxPKp
 giMCjl3ocZTbqmVQGZgoE2q+bcHkjbXy32CHTqg/blnAS/xxtCvgglLM92pAZ0yHtycegH2w
 3+CNUZqFh/dL5mUUtDPpZzfSKWMB27ffueChPlHbzYfJt3SU4l7aSHpYkI2A==
X-IronPort-AV: E=Sophos;i="5.90,145,1643691600"; 
   d="scan'208";a="67485720"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=GUU6ztCNxhRi+078GXNnr6PR/+2w0XUyxyHtKAJGvxKNopyvvILyuuMPTPdUqufTbY/ck4AGenarqoIoVwLldYRQa9bIfmEobWFA2E1hQSpUsluxqPQOlaP+gCDYxzY0CZvlIRDki1RSrZuDwk8wVpvNoKwVPOn8bEMjS1pFT++5kmtx3+3XD4iLlxx7G9nXVrWgG83KSp06j58AHrbN51sH9RCMlQQ6gQkEJeo56u7yg5iKfMKgYSI41V3tTpGaKdH039w94dl/oZQwmNyJe9JSTSM8MstxkbJKbHG3000MFR2xuhx9kR7iUDBXkiagOFA+5F6oTJ6lX2CxITesMQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=T8fnzI4GTrw9523cEd4RFODQB3qr1XuIkTA83vsrJqM=;
 b=mX/ADKwkK7oTvl7kA+1P7hqNr4g9BgbnbT+QCrgj0lzQtkniQWnCUYKyXLL+iPwY4yehkwDQpPESKpv9AWQlOLFTf0OuZX+Bvi6CuzvAG+41iMnDloD411hyu8Si5/GtAS3KdPA+ys59xT+ttaG3GgcymIzCcr+sUdQ2PoUGhto9dOqbShpromaSR81ljDB7ZZtCpfLlQnMn8hIS8rdvO16XeAJdLS3EozU6jZODEX1Xzau80j32wPk+mb0+yvkcl2qFjSo9UEEI1iFhlQWwsOJSNSGTVnla5wP3fb6Rpomxm2nS/0JAtgFAOjKy9rTe6kWN/EDbfbcEBMCaZH2vzQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=T8fnzI4GTrw9523cEd4RFODQB3qr1XuIkTA83vsrJqM=;
 b=QyFeJyc/mbZ/snlA617vD0ELUIMF/PnLKkfFdo2YFl3+lSMcS8b59PEZ9Ng+im1bZQEtWzPPC+G673oc6c0eIqbPlJOIdcHwuZq6W4xvpkPUHRj2J48XtzP5CIYz+cjjueWGtkKrahXMUQ1p8SBl/waZgTXdAUx66TTd4JOGT+A=
Date: Tue, 1 Mar 2022 10:08:19 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Alex Olson <this.is.a0lson@gmail.com>, <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v2.1 2/2] vpci/msix: fix PBA accesses
Message-ID: <Yh3igzWQQO+Nvf3+@Air-de-Roger>
References: <d8da3251985684ab9099ce95a8329a7e35535a7b.camel@gmail.com>
 <20220226100554.2664-1-roger.pau@citrix.com>
 <8597cd20-4d79-0f5f-8370-d2353e7116f7@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <8597cd20-4d79-0f5f-8370-d2353e7116f7@suse.com>
X-ClientProxiedBy: MR1P264CA0085.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:501:3f::16) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 1cf0202e-27d6-49f5-1019-08d9fb630aa6
X-MS-TrafficTypeDiagnostic: CH0PR03MB6099:EE_
X-Microsoft-Antispam-PRVS: <CH0PR03MB60999FF50709D88AD15E19618F029@CH0PR03MB6099.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(2906002)(966005)(66946007)(8676002)(6486002)(4326008)(508600001)(66476007)(66556008)(85182001)(8936002)(5660300002)(6666004)(9686003)(6916009)(53546011)(316002)(33716001)(6506007)(6512007)(186003)(38100700002)(83380400001)(82960400001)(26005)(86362001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?Q1VxbnJ4UzQxUmZLMkgwelEzcnZZYW9oNjlnNHM5ay9Pa1o2SzlHMjJaMUZo?=
 =?utf-8?B?aFIrcWJwYXVXRDIxZys5Y2JuS3dhbms4MXVHREFrQ2hhazYvSFNHV0VSWThI?=
 =?utf-8?B?VTJTL21qRmFJb0t0YzFBWHp2bjR5RzZSck53NTdnazBWMUtYOW00REthSU14?=
 =?utf-8?B?ZXRBZDBob3VZRG5OVU9xcXJ2TXcvdjh2a1lRbW43MW1Ob2x0SEFoTWNOUjl1?=
 =?utf-8?B?NDVSWHNpR2pYS1dEWm5oSFE5Q3hzWmFmUHYvMUxQRWxuVDROaTRQbXBvSTEy?=
 =?utf-8?B?SXVJRmNsdlZCVjVEY2xaN05POUFscVFscWtoY01ueVlLalpMSTFONGJMRW5k?=
 =?utf-8?B?M0FsYVNiL1pvZ2wvTEp1MlBMZEd4SmdZMDNPT3AreGtXcm1yUGRhWnlEQ0VF?=
 =?utf-8?B?WWdNZzA0S1lxaVUyVnVuakFIbUR0bTlIcUFoajNDSWdZdm1nNVA1aVBETjJG?=
 =?utf-8?B?S000Y2NlWWU4QWlnNThFbnhzdllmWUh4L2R3N094MHg4MEE1K3ovTlhnT1c3?=
 =?utf-8?B?WUphcXNIZGgrRXZJekdQTDZ5eUFBcXJlNS8rSDJFWHJSejNzYUxqcFpNMGVz?=
 =?utf-8?B?TXlQbHhGdi9IWUEvZGdRR0xMMkxSamdrLzVZSDBPM3laV3ZjUjB4TWc1Y25l?=
 =?utf-8?B?Z3RyVFl4NU14cTdicjdXRmdZYnJRYVZzSklLcEw2Nmtyb3ZEeXNrNHFNc05h?=
 =?utf-8?B?OHZ5VXdvSUc5bm5LUXpwR1o0ZjFBSVhKTzFjeDBVMzFGendiYWVtNzI5Q1Ex?=
 =?utf-8?B?VDN1SzVQK3JUalFtTi9ZU3RMenZIZFNaUE1wZjQrZ291QlFxZjRkUmRaTXB6?=
 =?utf-8?B?d2tOcTF0T3lQNURXNGtPOVFZQ3FIMldSUko0SkphMGtwdGRpbE5pTDNGY3d3?=
 =?utf-8?B?dUxpeWg5YS9WQnF1ZnRlWkNPRFFvY0czZEpVM3dPRzF3ZklsT04wdGV3NzJr?=
 =?utf-8?B?aWhPQ3N5aTFaaStYaXNHMDRHUG9CUkJMelBsR0Y2TzFkN1YxWWZRQjdwc2ls?=
 =?utf-8?B?RDN6VnpXSXdiejNESnl6Q2Nja0hJdGx1V04ycjRpakp4dktDMXNoNTJyOVB6?=
 =?utf-8?B?UlUzRUJwa1RjWCtveCtNZ1RhdDR4dmt2NTM2TVh6K3ZvSXBQUnZXQTVySGpt?=
 =?utf-8?B?bS9FR0tJNURGcXFVVnBUUzI1WWhLdmFqcG44OFRJZkVQYng5WFRvdzRxUmc1?=
 =?utf-8?B?VXlJVlhrMGNBSVdBRmdFN0ZJcUtBZDhpOXFCdFhJc0E0cFlmRzJTdUFyV3hP?=
 =?utf-8?B?Zm0zMDZRdnQyUllpQ2tNTjRYTGNjbDI4TGcyZGJaekhFN2ZPZkhvZzNjV0JL?=
 =?utf-8?B?bUtISjBhVnd4TVZRczNpWU5wUmFmWXdPeDVPTExsM1pTYllrdXliRUViODBj?=
 =?utf-8?B?WUZHWkx0dVlPMFFqMWRZbWZmMEdTR0FoSVM1TUV6MTlJeXE3TDFRQmpsSTNl?=
 =?utf-8?B?WEdaVDJHVmYxNFNLZ0NQSUltY2V0S0NKUUlST1VERUhZZWNuSGQ1eXRtWU1i?=
 =?utf-8?B?K3RXZ0VLS3NWV3ZSYzF3R1hqajg2eXNhKzhTT3R5NXE1SmNxaGxZUXc0alFa?=
 =?utf-8?B?c2xEaTcxdzVocnM2UE10THJOWDFzMnpUSGpsUm1heGVWaTRIbVZvaE5SNjVM?=
 =?utf-8?B?RjF6R0s1NEtpOWRGYmtleXBGZW5hREQrZSs5M0RLYkNXcU5USzNtcFVBWHYx?=
 =?utf-8?B?TVUwY1ZzZDRzSzV5Sk1sdXhncHNXRTJycmlhMHZPMEZDSTdUSlk5QjZWV25H?=
 =?utf-8?B?YkdKWXZDRENsREdUdEQrTkN2MHJwVmJ5RWFxdFJQajBqa0ZycWxOU1lvMzBK?=
 =?utf-8?B?K3dETzFBZWJnUlBMaStoNklVdU9abVVNWmhzTU1vUmU3UVpQYnMvTjNoSGxr?=
 =?utf-8?B?N0hyRGZFNXdmK3ZQRmRGbmtlK2ZycVpHQWpOV0YzVEJDeWVISUxvRXpYNXRH?=
 =?utf-8?B?R01nbWxSbDZuRjBHMlpLdzk2cGpmNm4zWjRXWDl5WlkreDBMandSc2NwMlh5?=
 =?utf-8?B?Z2l1andXVm8yU0gwajJmcEwzWEFaUVRWRnFhckx5RGxkb0Z1bWhwT0trTy84?=
 =?utf-8?B?YWlIb1Mrd0loZWN1T1lDcjBRa2JiMGxWaTBwZkQwQkpINk04RzhXSEdKRUho?=
 =?utf-8?B?V1Q1TVh0SEtPWi9OTFJmdkJ1QXRwVG5MMDdoUVhEd25MWVNnOHpDSEFLRGpj?=
 =?utf-8?Q?5+7IsfFB/dDkyquUY9++XxU=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 1cf0202e-27d6-49f5-1019-08d9fb630aa6
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 09:08:25.0656
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 0XsJ3V9DMn9wFtQTVfQ+cREKQku8NAtRrvyYz/HCXhWL9IStm5Uk5He693xLhYxZ4HqklJF7IEhT5wCwP9Egwg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH0PR03MB6099
X-OriginatorOrg: citrix.com

On Tue, Mar 01, 2022 at 09:46:13AM +0100, Jan Beulich wrote:
> On 26.02.2022 11:05, Roger Pau Monne wrote:
> > --- a/xen/drivers/vpci/msix.c
> > +++ b/xen/drivers/vpci/msix.c
> > @@ -198,8 +198,13 @@ static int cf_check msix_read(
> >      if ( !access_allowed(msix->pdev, addr, len) )
> >          return X86EMUL_OKAY;
> >  
> > +    spin_lock(&msix->pdev->vpci->lock);
> >      if ( VMSIX_ADDR_IN_RANGE(addr, msix->pdev->vpci, VPCI_MSIX_PBA) )
> >      {
> > +        struct vpci *vpci = msix->pdev->vpci;
> > +        paddr_t base = vmsix_table_addr(vpci, VPCI_MSIX_PBA);
> > +        unsigned int idx = addr - base;
> > +
> >          /*
> >           * Access to PBA.
> >           *
> > @@ -207,25 +212,43 @@ static int cf_check msix_read(
> >           * guest address space. If this changes the address will need to be
> >           * translated.
> >           */
> > +
> > +        if ( !msix->pba )
> > +        {
> > +            msix->pba = ioremap(base, vmsix_table_size(vpci, VPCI_MSIX_PBA));
> > +            if ( !msix->pba )
> > +            {
> > +                /*
> > +                 * If unable to map the PBA return all 1s (all pending): it's
> > +                 * likely better to trigger spurious events than drop them.
> > +                 */
> > +                spin_unlock(&vpci->lock);
> > +                gprintk(XENLOG_WARNING,
> > +                        "%pp: unable to map MSI-X PBA, report all pending\n",
> > +                        msix->pdev);
> > +                return X86EMUL_OKAY;
> 
> Hmm, this may report more set bits than there are vectors. Which is
> probably fine, but the comment may want adjusting a little to make
> clear this is understood and meant to be that way.

Yes, it could return more bits than vectors, but that area is also
part of the PBA (as the end is aligned to 8 bytes). I will adjust the
comment.

> > +           }
> > +        }
> 
> Imo it would make sense to limit the locked region to around just this
> check-and-map logic. There's no need for ...
> 
> >          switch ( len )
> >          {
> >          case 4:
> > -            *data = readl(addr);
> > +            *data = readl(msix->pba + idx);
> >              break;
> >  
> >          case 8:
> > -            *data = readq(addr);
> > +            *data = readq(msix->pba + idx);
> >              break;
> >  
> >          default:
> >              ASSERT_UNREACHABLE();
> >              break;
> >          }
> > +        spin_unlock(&vpci->lock);
> 
> ... the actual access to happen under lock, as you remove the mapping
> only when the device is being removed. I'm inclined to suggest making
> a helper function, which does an unlocked check, then the ioremap(),
> then takes the lock and re-checks whether the field's still NULL, and
> either installs the mapping or (after unlocking) iounmap()s it.

I'm fine with dropping the lock earlier, but I'm not sure there's much
point in placing this in a separate helper, as it's the mapping of at
most 2 pages (PBA is 2048 bytes in size, 64bit aligned).

I guess you are suggesting this in preparation for adding support to
access the non PBA area falling into the same page(s)?

> > --- a/xen/include/xen/vpci.h
> > +++ b/xen/include/xen/vpci.h
> > @@ -127,6 +127,8 @@ struct vpci {
> >          bool enabled         : 1;
> >          /* Masked? */
> >          bool masked          : 1;
> > +        /* PBA map */
> > +        void *pba;
> 
> Here (and elsewhere as/if applicable) you want to add __iomem, even
> if this is merely for documentation purposes right now.

Will add.

> I think you did mention this elsewhere: Don't we also need to deal
> with accesses to MMIO covered by the same BAR / page, but falling
> outside of the MSI-X table and PBA?

Yes, I did mention it in a reply to Alex:

https://lore.kernel.org/xen-devel/Yhj58BIIN2p4bYJ8@Air-de-Roger/

So far we seem to have gotten away without needing it, but I might as
well try to implement, shouldn't be too complicated.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 09:26:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 09:26:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281038.479194 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOymC-0006dH-7g; Tue, 01 Mar 2022 09:26:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281038.479194; Tue, 01 Mar 2022 09:26:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOymC-0006dA-3d; Tue, 01 Mar 2022 09:26:36 +0000
Received: by outflank-mailman (input) for mailman id 281038;
 Tue, 01 Mar 2022 09:26:35 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=qMbA=TM=dingwall.me.uk=james@srs-se1.protection.inumbo.net>)
 id 1nOymB-0006d4-03
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 09:26:35 +0000
Received: from smarthost01b.ixn.mail.zen.net.uk
 (smarthost01b.ixn.mail.zen.net.uk [212.23.1.21])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id adb1f189-9941-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 10:26:31 +0100 (CET)
Received: from [217.155.64.189] (helo=mail0.xen.dingwall.me.uk)
 by smarthost01b.ixn.mail.zen.net.uk with esmtpsa
 (TLS1.0:ECDHE_RSA_AES_256_CBC_SHA1:256) (Exim 4.90_1)
 (envelope-from <james@dingwall.me.uk>)
 id 1nOym6-0004XZ-Fu; Tue, 01 Mar 2022 09:26:30 +0000
Received: from localhost (localhost [IPv6:::1])
 by mail0.xen.dingwall.me.uk (Postfix) with ESMTP id 93C972EE61E;
 Tue,  1 Mar 2022 09:26:29 +0000 (GMT)
Received: from mail0.xen.dingwall.me.uk ([IPv6:::1])
 by localhost (mail0.xen.dingwall.me.uk [IPv6:::1]) (amavisd-new, port 10024)
 with ESMTP id q1W6nSALjIFN; Tue,  1 Mar 2022 09:26:29 +0000 (GMT)
Received: from ghoul.dingwall.me.uk (ghoul.dingwall.me.uk
 [IPv6:2a02:8010:698e:302::c0a8:1c8])
 by dingwall.me.uk (Postfix) with ESMTP id 7B8602EE61B;
 Tue,  1 Mar 2022 09:26:29 +0000 (GMT)
Received: by ghoul.dingwall.me.uk (Postfix, from userid 1000)
 id 76ECC982; Tue,  1 Mar 2022 09:26:29 +0000 (GMT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: adb1f189-9941-11ec-8539-5f4723681683
X-Virus-Scanned: Debian amavisd-new at dingwall.me.uk
Date: Tue, 1 Mar 2022 09:26:29 +0000
From: James Dingwall <james-xen@dingwall.me.uk>
To: Juergen Gross <jgross@suse.com>
Cc: xen-devel@lists.xenproject.org
Subject: Re: [RFC] kernel: xenfs parameter to hide deprecated files
Message-ID: <20220301092629.GA3180808@dingwall.me.uk>
References: <20220223180859.GA1412216@dingwall.me.uk>
 <d89c0991-b437-31c3-8432-281c3fa24c41@suse.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <d89c0991-b437-31c3-8432-281c3fa24c41@suse.com>
X-Originating-smarthost01b-IP: [217.155.64.189]
Feedback-ID: 217.155.64.189

Hi Juergen,

On Fri, Feb 25, 2022 at 03:09:05PM +0100, Juergen Gross wrote:
> On 23.02.22 19:08, James Dingwall wrote:
> > Hi,
> > 
> > I have been investigating a very intermittent issue we have with xenstore
> > access hanging.  Typically it seems to happen when all domains are stopped
> > prior to a system reboot.  xenstore is running in a stubdom and using the
> > hypervisor debug keys indicates the domain is still there.
> 
> Could it be dom0 shutdown handling is unloading some modules which are
> needed for Xenstore communication? E.g. xen-evtchn?
> 
> > 
> > I have come across some old list threads which suggested access via
> > /proc/xen/xenbus could cause problems but it seems patches went in to the
> > kernel for 4.10.  However to eliminate this entirely as a possibility
> > I came up with this kernel patch to hide deprecated entries in xenfs.
> 
> I don't see how this patch could help.
> 
> libxenstore is using /dev/xen/xenbus if it is available. So the only
> case where your patch would avoid accessing /proc/xen/xenbus would be
> if /dev/xen/xenbus isn't there. But this wouldn't make Xenstore more
> reactive, I guess. ;-)
> 
> > I found this old thread for a similar change where the entries were made
> > conditional on kernel config options instead of a module parameter but
> > this was never merged.
> > 
> > https://lkml.org/lkml/2015/11/30/761
> > 
> > If this would be a useful feature I would welcome feedback.
> 
> I'm not sure how helpful it is to let the user specify a boot parameter
> for hiding the files. It will probably not get used a lot.

Thank you for taking the time to look this over.  I did suspect it might
not be relevant for most people.  I'll keep it in our build for now to
see if we improve our xenstore stability.

Thank you also for your suggestions about why we might be having a xenstore
problem.  Next time we encounter that I'll check the status of the loaded
modules.

Regards,
James


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 09:35:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 09:35:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281047.479211 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOyub-000862-2s; Tue, 01 Mar 2022 09:35:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281047.479211; Tue, 01 Mar 2022 09:35:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOyua-00085v-WA; Tue, 01 Mar 2022 09:35:16 +0000
Received: by outflank-mailman (input) for mailman id 281047;
 Tue, 01 Mar 2022 09:35:15 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=qMbA=TM=dingwall.me.uk=james@srs-se1.protection.inumbo.net>)
 id 1nOyuZ-00085p-PA
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 09:35:15 +0000
Received: from smarthost01a.sbp.mail.zen.net.uk
 (smarthost01a.sbp.mail.zen.net.uk [212.23.1.1])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id e5d286bd-9942-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 10:35:14 +0100 (CET)
Received: from [217.155.64.189] (helo=mail0.xen.dingwall.me.uk)
 by smarthost01a.sbp.mail.zen.net.uk with esmtpsa
 (TLS1.0:ECDHE_RSA_AES_256_CBC_SHA1:256) (Exim 4.90_1)
 (envelope-from <james@dingwall.me.uk>)
 id 1nOyuY-00071n-54; Tue, 01 Mar 2022 09:35:14 +0000
Received: from localhost (localhost [IPv6:::1])
 by mail0.xen.dingwall.me.uk (Postfix) with ESMTP id 93F462EE67F;
 Tue,  1 Mar 2022 09:35:13 +0000 (GMT)
Received: from mail0.xen.dingwall.me.uk ([127.0.0.1])
 by localhost (mail0.xen.dingwall.me.uk [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id zaf6TsOvbNxP; Tue,  1 Mar 2022 09:35:13 +0000 (GMT)
Received: from ghoul.dingwall.me.uk (ghoul.dingwall.me.uk
 [IPv6:2a02:8010:698e:302::c0a8:1c8])
 by dingwall.me.uk (Postfix) with ESMTP id 739732EE67C;
 Tue,  1 Mar 2022 09:35:13 +0000 (GMT)
Received: by ghoul.dingwall.me.uk (Postfix, from userid 1000)
 id 5FCF42E; Tue,  1 Mar 2022 09:35:13 +0000 (GMT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e5d286bd-9942-11ec-8539-5f4723681683
X-Virus-Scanned: Debian amavisd-new at dingwall.me.uk
Date: Tue, 1 Mar 2022 09:35:13 +0000
From: James Dingwall <james-xen@dingwall.me.uk>
To: xen-devel@lists.xenproject.org
Cc: pdurrant@amazon.com
Subject: [PATCH] fix invalid frontend path for set_mtu
Message-ID: <20220301093513.GA3187840@dingwall.me.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
X-Originating-smarthost01a-IP: [217.155.64.189]
Feedback-ID: 217.155.64.189

Hi,

The set_mtu() function of xen-network-common.sh currently has this code:

        if [ ${type_if} = vif ]
        then
            local dev_=${dev#vif}
            local domid=${dev_%.*}
            local devid=${dev_#*.}

            local FRONTEND_PATH="/local/domain/$domid/device/vif/$devid"

            xenstore_write "$FRONTEND_PATH/mtu" ${mtu}
        fi

This works fine if the device has its default name but if the xen config
defines the vifname parameter the FRONTEND_PATH is incorrectly constructed.
Learn the frontend path by reading the appropriate value from the backend.

diff --git a/tools/hotplug/Linux/xen-network-common.sh b/tools/hotplug/Linux/xen-network-common.sh
index 02e2388600..cd98f0d486 100644
--- a/tools/hotplug/Linux/xen-network-common.sh
+++ b/tools/hotplug/Linux/xen-network-common.sh
@@ -163,11 +163,7 @@ set_mtu () {
 
         if [ ${type_if} = vif ]
         then
-            local dev_=${dev#vif}
-            local domid=${dev_%.*}
-            local devid=${dev_#*.}
-
-            local FRONTEND_PATH="/local/domain/$domid/device/vif/$devid"
+            local FRONTEND_PATH=$(xenstore_read "$XENBUS_PATH/frontend")
 
             xenstore_write "$FRONTEND_PATH/mtu" ${mtu}
         fi



Thanks,
James


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 09:57:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 09:57:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281056.479228 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOzFy-0002Nd-Uq; Tue, 01 Mar 2022 09:57:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281056.479228; Tue, 01 Mar 2022 09:57:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOzFy-0002NW-RP; Tue, 01 Mar 2022 09:57:22 +0000
Received: by outflank-mailman (input) for mailman id 281056;
 Tue, 01 Mar 2022 09:57:21 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nOzFx-0002NQ-QW
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 09:57:21 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nOzFx-0002v5-ED; Tue, 01 Mar 2022 09:57:21 +0000
Received: from 54-240-197-235.amazon.com ([54.240.197.235] helo=[192.168.6.66])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nOzFx-0002mG-7k; Tue, 01 Mar 2022 09:57:21 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=YVjhYH6kRAXW0WlGzpTvDmInUEioXLDF5vGnBFvgXbo=; b=XO3vnzYxXviPamMXcnHd/Y38U/
	Wfd5lIAiZ8pSBb/bJXFmPnJniuyW1zcXpytWoT4v3ABSBNO4kzMEAjqtIy2anWRP70IR3THvCHDvE
	0er3L1rvijAkGZx+vtOrFqNpR/PW9dGXvboDX+eIihqv0uUh5cVo57W2F/WRcT0GYQTw=;
Message-ID: <ff6c4f25-156b-c305-7e43-2cf63c784045@xen.org>
Date: Tue, 1 Mar 2022 09:57:19 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH] xen/arm: Remove unused BOOT_RELOC_VIRT_START
To: Michal Orzel <michal.orzel@arm.com>, xen-devel@lists.xenproject.org
Cc: Julien Grall <julien.grall@arm.com>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Julien Grall <jgrall@amazon.com>
References: <20220228100633.57593-1-julien@xen.org>
 <ca501104-4563-d9ca-ffb1-ca4fdb1dd084@arm.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <ca501104-4563-d9ca-ffb1-ca4fdb1dd084@arm.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

On 01/03/2022 08:28, Michal Orzel wrote:
> Hi Julien,

Hi Michal,

> On 28.02.2022 11:06, Julien Grall wrote:
>> From: Julien Grall <julien.grall@arm.com>
>>
>> We stopped relocating Xen since commit f60658c6ae "xen/arm: Stop
>> relocating Xen".
>>
>> At the same time, update the memory layout description.
>>
>> Signed-off-by: Julien Grall <julien.grall@arm.com>
>> Signed-off-by: Julien Grall <jgrall@amazon.com>
> Are these two entries needed? I'd say one is enough.
 From my understanding, it is necessary. The person is the same here but 
the companies are different.

So I should properly account that the work was originaly done while 
working for Arm (see [1]) and was updated while I was working for Amazon.

Even I didn't touch the patch, I still need to add a signed-off-by 
because of the DCO [2].

>> ---
> 
> Apart from that:
> Reviewed-by: Michal Orzel <michal.orzel@arm.com>

Cheers,

[1] 
https://xenbits.xen.org/gitweb/?p=people/julieng/xen-unstable.git;a=commit;h=dfa041f32ae2fef6132d40df7cbce93b6e385937
[2] https://developercertificate.org/

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 10:01:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 10:01:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281063.479238 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOzJV-0003qx-E7; Tue, 01 Mar 2022 10:01:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281063.479238; Tue, 01 Mar 2022 10:01:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOzJV-0003qq-B2; Tue, 01 Mar 2022 10:01:01 +0000
Received: by outflank-mailman (input) for mailman id 281063;
 Tue, 01 Mar 2022 10:00:59 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=TZGk=TM=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nOzJT-0003qh-R1
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 10:00:59 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTP
 id 7d8b62b9-9946-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 11:00:58 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 1C005ED1;
 Tue,  1 Mar 2022 02:00:57 -0800 (PST)
Received: from [10.57.5.142] (unknown [10.57.5.142])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id B55943F73D;
 Tue,  1 Mar 2022 02:00:55 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 7d8b62b9-9946-11ec-8539-5f4723681683
Subject: Re: [PATCH] xen/arm: Remove unused BOOT_RELOC_VIRT_START
To: Julien Grall <julien@xen.org>, xen-devel@lists.xenproject.org
Cc: Julien Grall <julien.grall@arm.com>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Julien Grall <jgrall@amazon.com>
References: <20220228100633.57593-1-julien@xen.org>
 <ca501104-4563-d9ca-ffb1-ca4fdb1dd084@arm.com>
 <ff6c4f25-156b-c305-7e43-2cf63c784045@xen.org>
From: Michal Orzel <michal.orzel@arm.com>
Message-ID: <c673f051-bbe2-debb-b1cc-b016483a998b@arm.com>
Date: Tue, 1 Mar 2022 11:00:47 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101
 Thunderbird/68.10.0
MIME-Version: 1.0
In-Reply-To: <ff6c4f25-156b-c305-7e43-2cf63c784045@xen.org>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 7bit

Hi Julien,

On 01.03.2022 10:57, Julien Grall wrote:
> On 01/03/2022 08:28, Michal Orzel wrote:
>> Hi Julien,
> 
> Hi Michal,
> 
>> On 28.02.2022 11:06, Julien Grall wrote:
>>> From: Julien Grall <julien.grall@arm.com>
>>>
>>> We stopped relocating Xen since commit f60658c6ae "xen/arm: Stop
>>> relocating Xen".
>>>
>>> At the same time, update the memory layout description.
>>>
>>> Signed-off-by: Julien Grall <julien.grall@arm.com>
>>> Signed-off-by: Julien Grall <jgrall@amazon.com>
>> Are these two entries needed? I'd say one is enough.
> From my understanding, it is necessary. The person is the same here but the companies are different.
> 
> So I should properly account that the work was originaly done while working for Arm (see [1]) and was updated while I was working for Amazon.
> 
> Even I didn't touch the patch, I still need to add a signed-off-by because of the DCO [2].
> 
Interesting. Thank you very much for the explanation.

>>> ---
>>
>> Apart from that:
>> Reviewed-by: Michal Orzel <michal.orzel@arm.com>
> 
> Cheers,
> 
> [1] https://xenbits.xen.org/gitweb/?p=people/julieng/xen-unstable.git;a=commit;h=dfa041f32ae2fef6132d40df7cbce93b6e385937
> [2] https://developercertificate.org/
> 

Cheers,
Michal


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 10:07:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 10:07:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281075.479255 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOzPG-0004iv-8y; Tue, 01 Mar 2022 10:06:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281075.479255; Tue, 01 Mar 2022 10:06:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOzPG-0004io-5w; Tue, 01 Mar 2022 10:06:58 +0000
Received: by outflank-mailman (input) for mailman id 281075;
 Tue, 01 Mar 2022 10:06:56 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nOzPE-0004ie-8H; Tue, 01 Mar 2022 10:06:56 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nOzPE-0003DD-2w; Tue, 01 Mar 2022 10:06:56 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nOzPD-0005GE-SQ; Tue, 01 Mar 2022 10:06:55 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nOzPD-0001AC-Rx; Tue, 01 Mar 2022 10:06:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=UKRALphRydTXNZs3sM5FA0vbQOlzyyfkqoLTDrIQONc=; b=QMdMEnVg4J/h/ExEvGdVcIqfT/
	UZhQEPls1mDOQSd5MC0k4adPW62d4w8FuI6gyGtwWtXa1WitLXgC+tFREIgBizJIuQMsA+rDjIW9y
	UIDhueIwZcwSRu5OOKvl9erVzm9NkOVdD2QMNxbnT8W27Y4M0eXqcXA1vjPBby+sHeug=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168271-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168271: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=497ac7b6d7f9750f48f137db244931a5728b1968
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 01 Mar 2022 10:06:55 +0000

flight 168271 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168271/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 497ac7b6d7f9750f48f137db244931a5728b1968
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    0 days
Failing since        168258  2022-03-01 01:55:31 Z    0 days    4 attempts
Testing same since   168262  2022-03-01 04:10:26 Z    0 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 10:13:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 10:13:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281086.479267 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOzVo-00068Y-1L; Tue, 01 Mar 2022 10:13:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281086.479267; Tue, 01 Mar 2022 10:13:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOzVn-00068Q-U1; Tue, 01 Mar 2022 10:13:43 +0000
Received: by outflank-mailman (input) for mailman id 281086;
 Tue, 01 Mar 2022 10:13:42 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nOzVm-00068D-PF; Tue, 01 Mar 2022 10:13:42 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nOzVm-0003Kc-Hn; Tue, 01 Mar 2022 10:13:42 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nOzVm-0005OW-6u; Tue, 01 Mar 2022 10:13:42 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nOzVm-0008Uj-6R; Tue, 01 Mar 2022 10:13:42 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=AOm0I99s6iKTwAV7Mm0P0sijJCVF0/D8vIfaDvLtwQs=; b=4u8DQ/G6YKzKMCyFj438jO3bqe
	ZMHRR/looRvmTZjmr3L9tzJkssQk85cB6DPeQGlEeeJZ6OIDUeBL7dWWMYJXRFuKSxBXtyNuIthj0
	Ewlqmqbx+G7zCPSS3emp7LTm1ovUsBu6XxXXbjmfTPpjX1/JSlpJWNA6c0ZS2f1DElqU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168257-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168257: tolerable FAIL
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=4388144c44c4dd9e9b7df97938ef08ffa85eec07
X-Osstest-Versions-That:
    xen=4388144c44c4dd9e9b7df97938ef08ffa85eec07
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 01 Mar 2022 10:13:42 +0000

flight 168257 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168257/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168253
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168253
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168253
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168253
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168253
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168253
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168253
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168253
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168253
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168253
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168253
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168253
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  4388144c44c4dd9e9b7df97938ef08ffa85eec07
baseline version:
 xen                  4388144c44c4dd9e9b7df97938ef08ffa85eec07

Last test of basis   168257  2022-03-01 01:53:09 Z    0 days
Testing same since                          (not found)         0 attempts

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Published tested tree is already up to date.



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 10:32:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 10:32:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281101.479284 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOznd-0000Qm-R6; Tue, 01 Mar 2022 10:32:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281101.479284; Tue, 01 Mar 2022 10:32:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nOznd-0000Qf-Mk; Tue, 01 Mar 2022 10:32:09 +0000
Received: by outflank-mailman (input) for mailman id 281101;
 Tue, 01 Mar 2022 10:32:08 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nOznc-0000QZ-CO
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 10:32:08 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d7986752-994a-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 11:32:06 +0100 (CET)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur02lp2057.outbound.protection.outlook.com [104.47.5.57]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-7-ZJ69LoXtNkiKWFRWjggTGQ-1; Tue, 01 Mar 2022 11:32:05 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM6PR04MB4392.eurprd04.prod.outlook.com (2603:10a6:20b:1c::30)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Tue, 1 Mar
 2022 10:32:03 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 10:32:03 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d7986752-994a-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646130726;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=s/S/93RDEUEGy29b4Zyofycj7JF6IGAg8eYAvK+Q9wc=;
	b=UVMUOgzzfdHt9RQt83AtBC4PX82Np6g7Po1T7SaxvhlC2If4G5LDrkv7medFnXmqLZ2Q+n
	ZbI8TWPUW2QnrOYswokzBKD4iBIuRJYq/eANu29mItsEGHnpLH6NaMLD1u3+ScBwVTgcwJ
	yjL/HAEJ2ModaRJ4jCye+GS+AQvnBgg=
X-MC-Unique: ZJ69LoXtNkiKWFRWjggTGQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Mn3YfJHhAx1oDEkNFSuJk1Nr1AOYLJOWrrjBg3Ij8kA/IOuLUd1oiH/PFru+HVOLwKOjOkbZUxxuvP/JHcMSyLRJbdgIpbQF8+0gPSyV+b5oiLIAOZ7hLTzmr0RgBTpIPXYwnQbV1gi46hc2PWWLzysDU4uhK6uW9wEG/L/aY8gmK66hJuN4wuqGt9d3YlVVfd9iw059FjXJxHbhbZBQ+DAt7y4uTknr6hVHD8jKtT6FVjl5Z6B0TdzFf9ipmcxRIl83b0ly3auaPWAVT0icsE/rb+nzEopQqk5ifT+FGUkCIKjCj88Myw+2vpd3Aryl8kdTnHdZ2I+7h8FdiZMsEA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=W0OvDogMLwRZTzxH9oWXV+jlOPVXgRUiv4aYpjtRNDw=;
 b=YS1flxjD8g8P3FBlXIjdfpcYviR9pYOwtP/6MuWNFMdHGX7i1FiHskNMu8WhR8MW5J7mRCfRGVT3pdXTaqbdrG+f2h93MI5KKdsKkvoac4EUjzGSCQSKjT13WrfuQdw8njeIOguwC+hdEPK+tWE61Qqij7iY7aLpcPmVgHAKpgusX5RnX7BMFfnxMeOh1BqpN2UCsLMouJra3vil7VizcI/pHLC8GEXgwBK4kFL1Qp6gZ7FV8KUgzket9yhloLS+KGfYOJ/GcUAOZfxy7jkaTKJV22jt55o28p60jV10j4m18fgQPxoITlTpUIDAY5oEr3/+uZJSUjAz+lygaxIRKw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <5e5ad6bf-8c58-745b-dc32-c906a1928329@suse.com>
Date: Tue, 1 Mar 2022 11:32:01 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v2.1 2/2] vpci/msix: fix PBA accesses
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: Alex Olson <this.is.a0lson@gmail.com>, xen-devel@lists.xenproject.org
References: <d8da3251985684ab9099ce95a8329a7e35535a7b.camel@gmail.com>
 <20220226100554.2664-1-roger.pau@citrix.com>
 <8597cd20-4d79-0f5f-8370-d2353e7116f7@suse.com>
 <Yh3igzWQQO+Nvf3+@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <Yh3igzWQQO+Nvf3+@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM5PR04CA0008.eurprd04.prod.outlook.com
 (2603:10a6:206:1::21) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: e594b93e-e5f8-459f-6edc-08d9fb6eb9ef
X-MS-TrafficTypeDiagnostic: AM6PR04MB4392:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB4392388D36678A8F3F7B6829B3029@AM6PR04MB4392.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(83380400001)(8676002)(4326008)(2616005)(2906002)(186003)(26005)(5660300002)(8936002)(31696002)(6916009)(31686004)(6506007)(6512007)(86362001)(6486002)(508600001)(53546011)(36756003)(66946007)(66476007)(66556008)(38100700002)(316002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?II6u1SchmHKJ70xprGA2o+AcrtCG5eH5aOr/90QV02d/OlvCc1Foi94OQLx9?=
 =?us-ascii?Q?ojeDGWdS7pLpOVTEhKb+nG1QaR/POwwsOg6oBEMOa12CFQC2eCaLyg5Z8wNv?=
 =?us-ascii?Q?64khgCwgdSE9hW0+1ihaPRXb7YESL95uXM+IMIxPBph0j2+JnpiQu9IqkXeF?=
 =?us-ascii?Q?TbaB2JNATsdpZdcIML/sj3kbq6Rr16FfVB+uAOCRyYC/Ducae3KTdUbPlsgR?=
 =?us-ascii?Q?JZf1r7piSxAR+Cy8zS9blD0P2M2CrftClaEfJWlCVHwk/uNvq18isgDxiSrO?=
 =?us-ascii?Q?AGSF0Z/Kvs1cBWhHOEcgvnmswmC+jwHPB4gBSH9nbjvQvdVAcES6s3gQygWj?=
 =?us-ascii?Q?cA9TmWY7eQ/lfAmwD1EOQ1hLKmqpK2RnBwUcVIoPpkrXxq8aGO7CmS8UE/Ch?=
 =?us-ascii?Q?XMxMzqlLGI7aeU70mLjoo//kxZ0hr80QMdyFshlUCf27nfYsMdUc2vxTfWcN?=
 =?us-ascii?Q?IdI8ZEvtT/kSk/irEouVuNCbNyhm7y1OjH+W0ceUCwOm+hc4mdgDXLMzpnko?=
 =?us-ascii?Q?wgn0oSKnSUZYD8A06RhrWgDphmUUjChU/qWgmZ4I92b9f9U9SejKlccF1xMf?=
 =?us-ascii?Q?fFFGGnhaFw5t9xyau1/UUfLvX4k2dlUPduhGWgAkb1snkyZwKdz4H89uw10l?=
 =?us-ascii?Q?a/5ycd5E7cvDqabu3CAb+h9LBjaUVcIcmDChg3IzsLrYHw5fS2s29RxNz5NJ?=
 =?us-ascii?Q?X19C7TVwVmUxfH8lK/YPX4tYK0MQJG44wbu4J7rk2c8Hd9ivFFP9ci6cF4sz?=
 =?us-ascii?Q?V1IT6TA0SX139q6Ox0uwY+ZfpBsSL7BDU9Pwl7Wf3YbrDMmpCvgL8weet+lV?=
 =?us-ascii?Q?In2Yvx/J5ZTdfqPCdjhpBxEu6/NT5x6AlKXESlhBQ5/yEAnPnqhkx83VaqCn?=
 =?us-ascii?Q?WaKYZ20dTdjp6MfTnew+c6mjyDoLFkMVs9vEB8sLUflFCME7vuJyGw7xdGSP?=
 =?us-ascii?Q?Wjz7Iqr4gSfA3WMbs+4t+fP+56KRoHM/gdGvFYuMwphUrSAsZPjMF6tUeLmC?=
 =?us-ascii?Q?7+pAAveXg6thQ/2+Dnof/Q2WgJ/gBJhmn+m8wXdBW/oJAypWrvfKaiKyugE4?=
 =?us-ascii?Q?yGsxPlvqUl1SasC3frH/a5DDBXp42iEjjyZKVuU5FhU2+TjMmzrWJKGEk96n?=
 =?us-ascii?Q?bByt+Q77B26wYWbrTGqUz9uMK1y+Z/ZJ99NYGzZDXxNZLvjnHVZ5acrGz6FG?=
 =?us-ascii?Q?naaqTwtgk1+5SWQLKaWkzZgOsiqgjBjOPHIND4Vkv2UKLGxt+mNW22u9nUi1?=
 =?us-ascii?Q?3dYpKzR6LcmKGK2uqV4KqklUh8MJ49GCtoCOC9tt4HyXTUUbjo+04d7KvTRr?=
 =?us-ascii?Q?Xa4jxgQKNQpPlsZTJMXZ9y+cZja/TDFuMoL35s8gqHPLmd6n6WBrOEUdkY0R?=
 =?us-ascii?Q?rfEWvEm6ItHPrOGAhIRU+Lpxl/+MNopLcjexWYK8UkGH42E/VBWtmqVB1S6t?=
 =?us-ascii?Q?TPJNzZ14kj8RIGT1GbxFBPkwWUOIqw7FNqHg7e1DC1DXdacc7Lpa9aRsvjh5?=
 =?us-ascii?Q?mrPi53pE5HbTn1HE5T7+w4WZuxhpkodVGpe14Grz8IiXkYWpfbjTmy7+a6FR?=
 =?us-ascii?Q?g1vUknnS+nfz0cBmXA9+BQB5sh0vp7M468vpaTNFnLRSrsp9mgHgBRCBhonQ?=
 =?us-ascii?Q?SCgQIJLWd3F39hRd/oZiiIg=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e594b93e-e5f8-459f-6edc-08d9fb6eb9ef
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 10:32:03.6586
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: CDOUMM95qyyugQXKXjz16lEksp1br0hqjoQf/3+1C2wk16wadq8n5me6gl+ibBH/BM0zLOAzG/+7ogpi97O5nQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB4392

On 01.03.2022 10:08, Roger Pau Monn=C3=A9 wrote:
> On Tue, Mar 01, 2022 at 09:46:13AM +0100, Jan Beulich wrote:
>> On 26.02.2022 11:05, Roger Pau Monne wrote:
>>> --- a/xen/drivers/vpci/msix.c
>>> +++ b/xen/drivers/vpci/msix.c
>>> @@ -198,8 +198,13 @@ static int cf_check msix_read(
>>>      if ( !access_allowed(msix->pdev, addr, len) )
>>>          return X86EMUL_OKAY;
>>> =20
>>> +    spin_lock(&msix->pdev->vpci->lock);
>>>      if ( VMSIX_ADDR_IN_RANGE(addr, msix->pdev->vpci, VPCI_MSIX_PBA) )
>>>      {
>>> +        struct vpci *vpci =3D msix->pdev->vpci;
>>> +        paddr_t base =3D vmsix_table_addr(vpci, VPCI_MSIX_PBA);
>>> +        unsigned int idx =3D addr - base;
>>> +
>>>          /*
>>>           * Access to PBA.
>>>           *
>>> @@ -207,25 +212,43 @@ static int cf_check msix_read(
>>>           * guest address space. If this changes the address will need =
to be
>>>           * translated.
>>>           */
>>> +
>>> +        if ( !msix->pba )
>>> +        {
>>> +            msix->pba =3D ioremap(base, vmsix_table_size(vpci, VPCI_MS=
IX_PBA));
>>> +            if ( !msix->pba )
>>> +            {
>>> +                /*
>>> +                 * If unable to map the PBA return all 1s (all pending=
): it's
>>> +                 * likely better to trigger spurious events than drop =
them.
>>> +                 */
>>> +                spin_unlock(&vpci->lock);
>>> +                gprintk(XENLOG_WARNING,
>>> +                        "%pp: unable to map MSI-X PBA, report all pend=
ing\n",
>>> +                        msix->pdev);
>>> +                return X86EMUL_OKAY;
>>
>> Hmm, this may report more set bits than there are vectors. Which is
>> probably fine, but the comment may want adjusting a little to make
>> clear this is understood and meant to be that way.
>=20
> Yes, it could return more bits than vectors, but that area is also
> part of the PBA (as the end is aligned to 8 bytes). I will adjust the
> comment.
>=20
>>> +           }
>>> +        }
>>
>> Imo it would make sense to limit the locked region to around just this
>> check-and-map logic. There's no need for ...
>>
>>>          switch ( len )
>>>          {
>>>          case 4:
>>> -            *data =3D readl(addr);
>>> +            *data =3D readl(msix->pba + idx);
>>>              break;
>>> =20
>>>          case 8:
>>> -            *data =3D readq(addr);
>>> +            *data =3D readq(msix->pba + idx);
>>>              break;
>>> =20
>>>          default:
>>>              ASSERT_UNREACHABLE();
>>>              break;
>>>          }
>>> +        spin_unlock(&vpci->lock);
>>
>> ... the actual access to happen under lock, as you remove the mapping
>> only when the device is being removed. I'm inclined to suggest making
>> a helper function, which does an unlocked check, then the ioremap(),
>> then takes the lock and re-checks whether the field's still NULL, and
>> either installs the mapping or (after unlocking) iounmap()s it.
>=20
> I'm fine with dropping the lock earlier, but I'm not sure there's much
> point in placing this in a separate helper, as it's the mapping of at
> most 2 pages (PBA is 2048 bytes in size, 64bit aligned).
>=20
> I guess you are suggesting this in preparation for adding support to
> access the non PBA area falling into the same page(s)?

Not just. The write path wants to use the same logic, and with it
becoming a little more involved I think it would be better to have it
in just one place.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 10:53:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 10:53:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281111.479306 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP08N-000344-2B; Tue, 01 Mar 2022 10:53:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281111.479306; Tue, 01 Mar 2022 10:53:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP08M-00033l-Ro; Tue, 01 Mar 2022 10:53:34 +0000
Received: by outflank-mailman (input) for mailman id 281111;
 Tue, 01 Mar 2022 10:53:33 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=AA0s=TM=bombadil.srs.infradead.org=BATV+e5026ef6e36407c4b08a+6764+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nP08L-00031b-9S
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 10:53:33 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d3f564ac-994d-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 11:53:30 +0100 (CET)
Received: from [2.53.44.23] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nP086-00GCwl-PS; Tue, 01 Mar 2022 10:53:19 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d3f564ac-994d-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=fpYq2gch6ejmPkcFKPjSyDr7OAs4OQSLe0uyAoUEPa0=; b=fPAUDOwUGnyXtx+hZA5zj2Ej4o
	HV9I6mYI0fayhovoE3oLXfq8qlMel6pFXXEc1mFWZvLXjhqfrbEyGhTBlOaKUDjaA5CMiNeYGJSlR
	GdeXeohIETuTXXnuIlqxqGPh/VMWo8hZjPyELE8feSOsKIkrkw8+qaC6yMhYVu17XpDc82M+q7Bjt
	P632yeVc6VELpePyjZp8VgOAEAH7yaxooKuzgDiHjXqCwex8uGIgNuXO8DeKOfVen/Dat6rNPrxN6
	ijjP0c7VtoQrVKhle4tTPRFAXwLIjwChLUwuVEdyRedzAx7rh05DpVyMdlXZjiKBQ/Hagn5ofY1Vr
	BAWrqPTg==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: [PATCH 01/12] dma-direct: use is_swiotlb_active in dma_direct_map_page
Date: Tue,  1 Mar 2022 12:53:00 +0200
Message-Id: <20220301105311.885699-2-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220301105311.885699-1-hch@lst.de>
References: <20220301105311.885699-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

Use the more specific is_swiotlb_active check instead of checking the
global swiotlb_force variable.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Reviewed-by: Anshuman Khandual <anshuman.khandual@arm.com>
---
 kernel/dma/direct.h | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/kernel/dma/direct.h b/kernel/dma/direct.h
index 4632b0f4f72eb..4dc16e08c7e1a 100644
--- a/kernel/dma/direct.h
+++ b/kernel/dma/direct.h
@@ -91,7 +91,7 @@ static inline dma_addr_t dma_direct_map_page(struct device *dev,
 		return swiotlb_map(dev, phys, size, dir, attrs);
 
 	if (unlikely(!dma_capable(dev, dma_addr, size, true))) {
-		if (swiotlb_force != SWIOTLB_NO_FORCE)
+		if (is_swiotlb_active(dev))
 			return swiotlb_map(dev, phys, size, dir, attrs);
 
 		dev_WARN_ONCE(dev, 1,
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 10:53:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 10:53:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281110.479301 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP08M-00031t-MS; Tue, 01 Mar 2022 10:53:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281110.479301; Tue, 01 Mar 2022 10:53:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP08M-00031m-Ir; Tue, 01 Mar 2022 10:53:34 +0000
Received: by outflank-mailman (input) for mailman id 281110;
 Tue, 01 Mar 2022 10:53:33 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=AA0s=TM=bombadil.srs.infradead.org=BATV+e5026ef6e36407c4b08a+6764+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nP08L-00031a-2h
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 10:53:33 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id d356a529-994d-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 11:53:30 +0100 (CET)
Received: from [2.53.44.23] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nP083-00GCvx-8y; Tue, 01 Mar 2022 10:53:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d356a529-994d-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:Message-Id:Date:Subject:Cc:To:From:Sender:Reply-To:Content-Type:
	Content-ID:Content-Description:In-Reply-To:References;
	bh=FLoPcwp8W110QTyBUFSAYe56vwqhsB+0w1jgowBLDrQ=; b=x4Ls4LGXlw3mqit2JgZ989HyZb
	T5qpKmQGteCGW5NyuTbuloRJzt7HhHDSWBkn6XMthvcPktTNRGiMhEjm3jNCxNFXallKVQH7jYfkV
	yMP1NQbMBXexGqNGRQAxlptnMjCU6iBaEsSYx496tSDH97RR6D0tylDgXaeXfMovaKcRHhD1mlnuz
	OQ2BdFcAyA097bBGDwCVXhJV6sp+r3vCa43JaFB+f/7FaiduK6PaxwT2gDQredky9tC0CHGWz/iGt
	MF2HppH9e3IKlAYjXSzy/Ts9RTiST6h6Fjh5rDDovAP92KH/7Uv2VhH/n7QVymPp/mWYAgqqJl+PH
	rhUuKZnQ==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: cleanup swiotlb initialization v4
Date: Tue,  1 Mar 2022 12:52:59 +0200
Message-Id: <20220301105311.885699-1-hch@lst.de>
X-Mailer: git-send-email 2.30.2
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

Hi all,

this series tries to clean up the swiotlb initialization, including
that of swiotlb-xen.  To get there is also removes the x86 iommu table
infrastructure that massively obsfucates the initialization path.

Git tree:

    git://git.infradead.org/users/hch/misc.git swiotlb-init-cleanup

Gitweb:

    http://git.infradead.org/users/hch/misc.git/shortlog/refs/heads/swiotlb-init-cleanup

Changes since v3:
 - fix a compilation issue on some powerpc configfs
 - fix and cleanup how forced bounce buffering is enabled for
   guest memory encryption

Changes since v2:
 - make ppc_swiotlb_flags actually work again
 - also force enable swiotlb for guest encrypted memory to cater
   to hyperv which doesn't set the host encrypted memory flag

Changes since v1:
 - skip IOMMU initialization on Xen PV kernels
 - various small whitespace / typo fixes

Diffstat:


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 10:53:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 10:53:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281113.479315 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP08N-0003CC-G2; Tue, 01 Mar 2022 10:53:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281113.479315; Tue, 01 Mar 2022 10:53:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP08N-00038H-4n; Tue, 01 Mar 2022 10:53:35 +0000
Received: by outflank-mailman (input) for mailman id 281113;
 Tue, 01 Mar 2022 10:53:34 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=AA0s=TM=bombadil.srs.infradead.org=BATV+e5026ef6e36407c4b08a+6764+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nP08M-00031a-MV
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 10:53:34 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id d658ee84-994d-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 11:53:34 +0100 (CET)
Received: from [2.53.44.23] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nP08A-00GCxm-Dw; Tue, 01 Mar 2022 10:53:23 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d658ee84-994d-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=8kkkqKTmx4an5HwtAkctrRmIlb8tNewwdnwFgQaeBs4=; b=jLl0j4bSOfVgHsr3MQ5Bv5W25W
	eBCL+ezlRGLhWYJUDEMLnfnY03XvNmRuJ3NVkaIN+j91e7hLR85KeZAUrre7FDsYIGG5LJVefqfFQ
	aBw4XS4clVWlj8OlW5+no9SoBD1TeUv7rQYDWrKf4OHZIcAUPacEQWejKAQpzWZV4sMB16ogBdJNd
	BYo+cef7t0HrzSLXHOj4597NsWHTixNewjzb8+eB6sepbzbOCAKRdiYjQ0SKHJwpHXjDNI+7jB/Nl
	V6d7NCk96h2kf6oMslvOoIEJGHn3fDqOVyBakQxgHeZAYF5ayU7+PWsZkl0kSLTP/USHzDRJXcvab
	v9YgSnow==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: [PATCH 02/12] swiotlb: make swiotlb_exit a no-op if SWIOTLB_FORCE is set
Date: Tue,  1 Mar 2022 12:53:01 +0200
Message-Id: <20220301105311.885699-3-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220301105311.885699-1-hch@lst.de>
References: <20220301105311.885699-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

If force bouncing is enabled we can't release the buffers.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Reviewed-by: Anshuman Khandual <anshuman.khandual@arm.com>
---
 kernel/dma/swiotlb.c | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c
index bfc56cb217059..64b390136f9ef 100644
--- a/kernel/dma/swiotlb.c
+++ b/kernel/dma/swiotlb.c
@@ -378,6 +378,9 @@ void __init swiotlb_exit(void)
 	unsigned long tbl_vaddr;
 	size_t tbl_size, slots_size;
 
+	if (swiotlb_force == SWIOTLB_FORCE)
+		return;
+
 	if (!mem->nslabs)
 		return;
 
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 10:53:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 10:53:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281112.479319 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP08N-0003Kk-Pn; Tue, 01 Mar 2022 10:53:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281112.479319; Tue, 01 Mar 2022 10:53:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP08N-0003Hr-I6; Tue, 01 Mar 2022 10:53:35 +0000
Received: by outflank-mailman (input) for mailman id 281112;
 Tue, 01 Mar 2022 10:53:34 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=BNgs=TM=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nP08M-00031b-Bk
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 10:53:34 +0000
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur02on0604.outbound.protection.outlook.com
 [2a01:111:f400:fe05::604])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d61b203e-994d-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 11:53:33 +0100 (CET)
Received: from AS8PR04CA0071.eurprd04.prod.outlook.com (2603:10a6:20b:313::16)
 by AM6PR08MB3672.eurprd08.prod.outlook.com (2603:10a6:20b:4d::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Tue, 1 Mar
 2022 10:53:28 +0000
Received: from AM5EUR03FT020.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:313:cafe::9d) by AS8PR04CA0071.outlook.office365.com
 (2603:10a6:20b:313::16) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4951.19 via Frontend
 Transport; Tue, 1 Mar 2022 10:53:28 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT020.mail.protection.outlook.com (10.152.16.116) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Tue, 1 Mar 2022 10:53:28 +0000
Received: ("Tessian outbound 341d209a0e52:v113");
 Tue, 01 Mar 2022 10:53:28 +0000
Received: from e98e151bf0fd.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 F551B79B-F530-48EF-A956-8F6A4B27ADB8.1; 
 Tue, 01 Mar 2022 10:53:21 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id e98e151bf0fd.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 01 Mar 2022 10:53:21 +0000
Received: from AM0PR08MB3778.eurprd08.prod.outlook.com (2603:10a6:208:104::24)
 by VI1PR08MB3373.eurprd08.prod.outlook.com (2603:10a6:803:7b::23)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.21; Tue, 1 Mar
 2022 10:53:18 +0000
Received: from AM0PR08MB3778.eurprd08.prod.outlook.com
 ([fe80::4dbb:4fed:bc86:1803]) by AM0PR08MB3778.eurprd08.prod.outlook.com
 ([fe80::4dbb:4fed:bc86:1803%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 10:53:18 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d61b203e-994d-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=/m8pPoRu+85TyGj2cdbwexvelzOLKeuK5zCSd90Jpfk=;
 b=cjHB3X7t32514IEUinVsAEUjHLvvLaXzT9aGljisMIQQbC09ETL0WA5bSAusAFDw34dGe8qVPSgTuw6skyCbb6zZymQD3eddURDL8JCL/JdV+J6hFkkk6DH6HAJ+9oJW2Ta+LM1u1+lzonTgMSRvKwPx954yBfOQR2lqDdJ1OSU=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: dcc9a82fe087dd1e
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Bjp/EKqdEGIniuhYycS+hk0JZ8TTc7JMMmYRh8wxnTgURdSRnwKYKFTDa5CTKDa/a4lFQ5s+/TAqR8zikIUtwwgJ7SWpL9ta/Yq3DJ7rDER47AWZLj+XXOQvud+SmPumlkckbwlwfy6J695XtQqINO83rA/mpUGOvfsh/mvWhdjJ7h9NldXBePx4+3UduRi5PPmUNUXCQ9cmcphGgnRZK30HCnrk0ekm4JhiYiPy9yn5oCilRgWyGG/sfNYg/A6PkguTAjgBw6SfH8aQmQr+vytWEJK4F32Bv3Z7irZdPVSe1dJnXj0X2TNe1kEi2XbiWZtX6u/TB6RyDb7hFjMLOA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=/m8pPoRu+85TyGj2cdbwexvelzOLKeuK5zCSd90Jpfk=;
 b=TI7CksXHbF9+atSPhahoBn8nfjfY3zMvqNgM25BYRt2VfvkpEinoJ12UfPUZTdf3ME49drJdtAFBZ1swaYUP3u3whtm1HBMDqMz5AwKIwUb1xUdPo2c32jEjdsJfKe/zawPl2tGfe0wa2LCyCnIS+PGz1cODTdJD5znjVHyM80Iq9V589t3+LIcvUie8iq/o9LlroQrT2G4xc9zD2dndqCvQq5S7Ew7AJMjsJtzGRiapTS/ubZ/hNmRCWoiGYVnXmjkBVPir0pTbNN0nmrTGgatlR9fjx9EDdFmdzTo+w7o9lHZHYN0EaxpjeBHv5/tcIivvn/WZ/BBugpkJAbwTVA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=/m8pPoRu+85TyGj2cdbwexvelzOLKeuK5zCSd90Jpfk=;
 b=cjHB3X7t32514IEUinVsAEUjHLvvLaXzT9aGljisMIQQbC09ETL0WA5bSAusAFDw34dGe8qVPSgTuw6skyCbb6zZymQD3eddURDL8JCL/JdV+J6hFkkk6DH6HAJ+9oJW2Ta+LM1u1+lzonTgMSRvKwPx954yBfOQR2lqDdJ1OSU=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Julien Grall <julien@xen.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Julien
 Grall <Julien.Grall@arm.com>, Stefano Stabellini <sstabellini@kernel.org>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, Julien Grall
	<jgrall@amazon.com>
Subject: Re: [PATCH] xen/arm: Remove unused BOOT_RELOC_VIRT_START
Thread-Topic: [PATCH] xen/arm: Remove unused BOOT_RELOC_VIRT_START
Thread-Index: AQHYLIrpIk7mbc8G60OD3FqJgTcvKayqXAeA
Date: Tue, 1 Mar 2022 10:53:18 +0000
Message-ID: <87B0168C-7020-4DB2-8FC9-F86ED999694C@arm.com>
References: <20220228100633.57593-1-julien@xen.org>
In-Reply-To: <20220228100633.57593-1-julien@xen.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: cac44cd4-cad2-4a51-78ac-08d9fb71b7bb
x-ms-traffictypediagnostic:
	VI1PR08MB3373:EE_|AM5EUR03FT020:EE_|AM6PR08MB3672:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR08MB36729B6DC175BEB8C2ED9E589D029@AM6PR08MB3672.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3778.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(38100700002)(38070700005)(36756003)(122000001)(33656002)(186003)(26005)(86362001)(2616005)(6916009)(54906003)(316002)(4326008)(76116006)(66476007)(66946007)(6506007)(66446008)(66556008)(6512007)(64756008)(53546011)(71200400001)(6486002)(508600001)(8676002)(2906002)(83380400001)(8936002)(5660300002)(91956017)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <E6DA39540E49EB488DA383D873A3059E@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB3373
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT020.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	a6d0a581-31e3-4643-c56d-08d9fb71b20a
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	nYwSQosoydZ7Ws/+a7977DYhwTfSAn3LFuR4HZ+hgmOkaP60bNRUzHMgVKpTGs03kwdlknDZnRxWbxkWn57SPTOu4DgauP6uO8lAmUzLZb/L+4otJBT7Mu2jcLR6iWXu6LXTr8t+zttZZDT3dQeFwlZOdp9T45t4UnZNZPb/7MsAEePyyR0o2YvlUXXZVHMlwiHbaxbPhPf1wfXBTMWDLH73nNi33hjj73jCDhE+5y/cW3KMt7fL/lT8zFbgTpivK3rw3ccaU8+o82u71qejyeNk3O6HeirJ8Te/fcOFV2AP2oBKrCu7vb3ClTKTJTBmJBGRbEkqWTwukvg5wAq1y3iXETl5GHPSDOyDpgNqkI0JPINIfOUJSMo8rVvnJkbi1huGBb8NcgWdG5ZB599jrBUWkx/hPXYkM1DwpiesASwUdEqcdTI+aao/rcDhezv7h7+f8ehxT56XLkKUTzvt/3jLKYtfZ0+aILoPdDl42aq8/KUv3SsHSvQEtCVbYrtIk3N+uVTiLTsFNHXa+3fGYJVYYxDXf98Qjye2/UEPt3Me3fHY4+4euB0QBwb0vTyEyrSzKiWkhkOWQleAtYAaEgu8W1f1zpBwlyI+/2s0ZdOG3a/eAonX3bhLICAtCyblgSuciL9WdpRKr9d79xQSqBnAxWsdmMEcTn4DehVk/1v7XMni1C5vnVJ9YDm+NaDm
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(6512007)(40460700003)(6862004)(4326008)(70586007)(5660300002)(70206006)(86362001)(8676002)(82310400004)(186003)(53546011)(26005)(6506007)(8936002)(336012)(33656002)(83380400001)(2616005)(6486002)(356005)(36860700001)(508600001)(54906003)(81166007)(2906002)(316002)(47076005)(36756003)(107886003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 10:53:28.1403
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: cac44cd4-cad2-4a51-78ac-08d9fb71b7bb
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT020.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB3672

Hi Julien,

> On 28 Feb 2022, at 10:06, Julien Grall <julien@xen.org> wrote:
>=20
> From: Julien Grall <julien.grall@arm.com>
>=20
> We stopped relocating Xen since commit f60658c6ae "xen/arm: Stop
> relocating Xen".
>=20
> At the same time, update the memory layout description.
>=20
> Signed-off-by: Julien Grall <julien.grall@arm.com>
> Signed-off-by: Julien Grall <jgrall@amazon.com>
Reviewed-by: Bertrand Marquis <bertrand.marquis@arm.com>

Cheers
Bertrand

> ---
> xen/arch/arm/include/asm/config.h | 4 +---
> xen/arch/arm/mm.c                 | 1 -
> 2 files changed, 1 insertion(+), 4 deletions(-)
>=20
> diff --git a/xen/arch/arm/include/asm/config.h b/xen/arch/arm/include/asm=
/config.h
> index 2aced0bc3b8b..b25c9d39bb32 100644
> --- a/xen/arch/arm/include/asm/config.h
> +++ b/xen/arch/arm/include/asm/config.h
> @@ -77,8 +77,7 @@
>  *   2M -   4M   Xen text, data, bss
>  *   4M -   6M   Fixmap: special-purpose 4K mapping slots
>  *   6M -  10M   Early boot mapping of FDT
> - *   10M - 12M   Early relocation address (used when relocating Xen)
> - *               and later for livepatch vmap (if compiled in)
> + *   10M - 12M   Livepatch vmap (if compiled in)
>  *
>  * ARM32 layout:
>  *   0  -  12M   <COMMON>
> @@ -115,7 +114,6 @@
> #define BOOT_FDT_SLOT_SIZE     MB(4)
> #define BOOT_FDT_VIRT_END      (BOOT_FDT_VIRT_START + BOOT_FDT_SLOT_SIZE)
>=20
> -#define BOOT_RELOC_VIRT_START  _AT(vaddr_t,0x00a00000)
> #ifdef CONFIG_LIVEPATCH
> #define LIVEPATCH_VMAP_START   _AT(vaddr_t,0x00a00000)
> #define LIVEPATCH_VMAP_END     (LIVEPATCH_VMAP_START + MB(2))
> diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
> index 515d0906f85b..8a17222109c6 100644
> --- a/xen/arch/arm/mm.c
> +++ b/xen/arch/arm/mm.c
> @@ -196,7 +196,6 @@ static void __init __maybe_unused build_assertions(vo=
id)
>     /* 2MB aligned regions */
>     BUILD_BUG_ON(XEN_VIRT_START & ~SECOND_MASK);
>     BUILD_BUG_ON(FIXMAP_ADDR(0) & ~SECOND_MASK);
> -    BUILD_BUG_ON(BOOT_RELOC_VIRT_START & ~SECOND_MASK);
>     /* 1GB aligned regions */
> #ifdef CONFIG_ARM_32
>     BUILD_BUG_ON(XENHEAP_VIRT_START & ~FIRST_MASK);
> --=20
> 2.32.0
>=20



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 10:53:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 10:53:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281114.479345 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP08T-0004Bo-A9; Tue, 01 Mar 2022 10:53:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281114.479345; Tue, 01 Mar 2022 10:53:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP08T-0004BZ-6E; Tue, 01 Mar 2022 10:53:41 +0000
Received: by outflank-mailman (input) for mailman id 281114;
 Tue, 01 Mar 2022 10:53:39 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=AA0s=TM=bombadil.srs.infradead.org=BATV+e5026ef6e36407c4b08a+6764+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nP08R-00031b-LO
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 10:53:39 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d93cb5de-994d-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 11:53:38 +0100 (CET)
Received: from [2.53.44.23] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nP08E-00GCz8-AM; Tue, 01 Mar 2022 10:53:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d93cb5de-994d-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=A0DzSvvS64HjAzE2XMQzk7Jm+OVlQzZUcMYFGVBmu7k=; b=QcD+g2bAZloPsGuAs2SY+vJGCg
	rv+HhE9TnpOXcyMAPOZmFzmHJl3jnx34GwZgZG24XzdnByIgzZE0CBoGWC/7y8jWksOx8gAtCOn9w
	11rWTBSZFsTEY3QtBt2TLy/IU42CsemUekEbmdXyZugiZYIdY8t5MdbczK7zOZAhEtqydZMqx5sND
	hsDOkqXxSuZewhVYVyUPaMNFMtlQZ49ELHfETbHcYFn+wOw0D3MB+68OD6L2VF4BZU1ECdsEL85tx
	gWcrQajjKEnfOC+GPfRpESVf2ppYJUrQeHGkSbSMThkO7AZAg3xYpOLUqRA52iZRlvoiif6wNe7SB
	Ir/ycXgw==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: [PATCH 03/12] swiotlb: simplify swiotlb_max_segment
Date: Tue,  1 Mar 2022 12:53:02 +0200
Message-Id: <20220301105311.885699-4-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220301105311.885699-1-hch@lst.de>
References: <20220301105311.885699-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

Remove the bogus Xen override that was usually larger than the actual
size and just calculate the value on demand.  Note that
swiotlb_max_segment still doesn't make sense as an interface and should
eventually be removed.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Reviewed-by: Anshuman Khandual <anshuman.khandual@arm.com>
---
 drivers/xen/swiotlb-xen.c |  2 --
 include/linux/swiotlb.h   |  1 -
 kernel/dma/swiotlb.c      | 20 +++-----------------
 3 files changed, 3 insertions(+), 20 deletions(-)

diff --git a/drivers/xen/swiotlb-xen.c b/drivers/xen/swiotlb-xen.c
index 47aebd98f52f5..485cd06ed39e7 100644
--- a/drivers/xen/swiotlb-xen.c
+++ b/drivers/xen/swiotlb-xen.c
@@ -202,7 +202,6 @@ int xen_swiotlb_init(void)
 	rc = swiotlb_late_init_with_tbl(start, nslabs);
 	if (rc)
 		return rc;
-	swiotlb_set_max_segment(PAGE_SIZE);
 	return 0;
 error:
 	if (nslabs > 1024 && repeat--) {
@@ -254,7 +253,6 @@ void __init xen_swiotlb_init_early(void)
 
 	if (swiotlb_init_with_tbl(start, nslabs, true))
 		panic("Cannot allocate SWIOTLB buffer");
-	swiotlb_set_max_segment(PAGE_SIZE);
 }
 #endif /* CONFIG_X86 */
 
diff --git a/include/linux/swiotlb.h b/include/linux/swiotlb.h
index f6c3638255d54..9fb3a568f0c51 100644
--- a/include/linux/swiotlb.h
+++ b/include/linux/swiotlb.h
@@ -164,7 +164,6 @@ static inline void swiotlb_adjust_size(unsigned long size)
 #endif /* CONFIG_SWIOTLB */
 
 extern void swiotlb_print_info(void);
-extern void swiotlb_set_max_segment(unsigned int);
 
 #ifdef CONFIG_DMA_RESTRICTED_POOL
 struct page *swiotlb_alloc(struct device *dev, size_t size);
diff --git a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c
index 64b390136f9ef..e31c235b5fd9e 100644
--- a/kernel/dma/swiotlb.c
+++ b/kernel/dma/swiotlb.c
@@ -75,12 +75,6 @@ struct io_tlb_mem io_tlb_default_mem;
 
 phys_addr_t swiotlb_unencrypted_base;
 
-/*
- * Max segment that we can provide which (if pages are contingous) will
- * not be bounced (unless SWIOTLB_FORCE is set).
- */
-static unsigned int max_segment;
-
 static unsigned long default_nslabs = IO_TLB_DEFAULT_SIZE >> IO_TLB_SHIFT;
 
 static int __init
@@ -104,18 +98,12 @@ early_param("swiotlb", setup_io_tlb_npages);
 
 unsigned int swiotlb_max_segment(void)
 {
-	return io_tlb_default_mem.nslabs ? max_segment : 0;
+	if (!io_tlb_default_mem.nslabs)
+		return 0;
+	return rounddown(io_tlb_default_mem.nslabs << IO_TLB_SHIFT, PAGE_SIZE);
 }
 EXPORT_SYMBOL_GPL(swiotlb_max_segment);
 
-void swiotlb_set_max_segment(unsigned int val)
-{
-	if (swiotlb_force == SWIOTLB_FORCE)
-		max_segment = 1;
-	else
-		max_segment = rounddown(val, PAGE_SIZE);
-}
-
 unsigned long swiotlb_size_or_default(void)
 {
 	return default_nslabs << IO_TLB_SHIFT;
@@ -267,7 +255,6 @@ int __init swiotlb_init_with_tbl(char *tlb, unsigned long nslabs, int verbose)
 
 	if (verbose)
 		swiotlb_print_info();
-	swiotlb_set_max_segment(mem->nslabs << IO_TLB_SHIFT);
 	return 0;
 }
 
@@ -368,7 +355,6 @@ swiotlb_late_init_with_tbl(char *tlb, unsigned long nslabs)
 	swiotlb_init_io_tlb_mem(mem, virt_to_phys(tlb), nslabs, true);
 
 	swiotlb_print_info();
-	swiotlb_set_max_segment(mem->nslabs << IO_TLB_SHIFT);
 	return 0;
 }
 
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 10:53:44 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 10:53:44 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281115.479356 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP08W-0004Xs-Jr; Tue, 01 Mar 2022 10:53:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281115.479356; Tue, 01 Mar 2022 10:53:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP08W-0004Xf-GI; Tue, 01 Mar 2022 10:53:44 +0000
Received: by outflank-mailman (input) for mailman id 281115;
 Tue, 01 Mar 2022 10:53:43 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=AA0s=TM=bombadil.srs.infradead.org=BATV+e5026ef6e36407c4b08a+6764+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nP08V-00031a-1n
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 10:53:43 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id db4274b8-994d-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 11:53:42 +0100 (CET)
Received: from [2.53.44.23] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nP08H-00GD0g-Sa; Tue, 01 Mar 2022 10:53:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: db4274b8-994d-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=F4csY1Wi5RcD4CgfgCj72ltp02xg/m2xFaHFXHqOV2U=; b=gUOyui1yxriv3hEEp272+80Q2F
	jOUBGJQGyIAeVliqSLArMsnw436LgJOzQQeLiq8Znfql2Jzag37nquPrG4dNyHN+wJZUIZ2FEmRzL
	VetzMUhB2WM68xOFhcY+0twrsScsxFZRaJt9+pmIRX6UcYn20suPG6XdsffIdmq5rXRvBHNeguSP6
	73Oo9X1RQUGpHCIZ8XhrqVixxc0FBrQmM8ahlSO4qbkUI47d8dhdpqpl9jgxT9jiZs3SXGePiT3FS
	QCl1IiCbPqW8OCmr4X8Yypy8l194Dn26SoA6d0HIiT/r1YIQZq+YYFI7NtNdVbJlD///I5zwGw4OC
	NqAx9Geg==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: [PATCH 04/12] swiotlb: rename swiotlb_late_init_with_default_size
Date: Tue,  1 Mar 2022 12:53:03 +0200
Message-Id: <20220301105311.885699-5-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220301105311.885699-1-hch@lst.de>
References: <20220301105311.885699-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

swiotlb_late_init_with_default_size is an overly verbose name that
doesn't even catch what the function is doing, given that the size is
not just a default but the actual requested size.

Rename it to swiotlb_init_late.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Reviewed-by: Anshuman Khandual <anshuman.khandual@arm.com>
---
 arch/x86/pci/sta2x11-fixup.c | 2 +-
 include/linux/swiotlb.h      | 2 +-
 kernel/dma/swiotlb.c         | 6 ++----
 3 files changed, 4 insertions(+), 6 deletions(-)

diff --git a/arch/x86/pci/sta2x11-fixup.c b/arch/x86/pci/sta2x11-fixup.c
index 101081ad64b6d..e0c039a75b2db 100644
--- a/arch/x86/pci/sta2x11-fixup.c
+++ b/arch/x86/pci/sta2x11-fixup.c
@@ -57,7 +57,7 @@ static void sta2x11_new_instance(struct pci_dev *pdev)
 		int size = STA2X11_SWIOTLB_SIZE;
 		/* First instance: register your own swiotlb area */
 		dev_info(&pdev->dev, "Using SWIOTLB (size %i)\n", size);
-		if (swiotlb_late_init_with_default_size(size))
+		if (swiotlb_init_late(size))
 			dev_emerg(&pdev->dev, "init swiotlb failed\n");
 	}
 	list_add(&instance->list, &sta2x11_instance_list);
diff --git a/include/linux/swiotlb.h b/include/linux/swiotlb.h
index 9fb3a568f0c51..b48b26bfa0edb 100644
--- a/include/linux/swiotlb.h
+++ b/include/linux/swiotlb.h
@@ -40,7 +40,7 @@ extern void swiotlb_init(int verbose);
 int swiotlb_init_with_tbl(char *tlb, unsigned long nslabs, int verbose);
 unsigned long swiotlb_size_or_default(void);
 extern int swiotlb_late_init_with_tbl(char *tlb, unsigned long nslabs);
-extern int swiotlb_late_init_with_default_size(size_t default_size);
+int swiotlb_init_late(size_t size);
 extern void __init swiotlb_update_mem_attributes(void);
 
 phys_addr_t swiotlb_tbl_map_single(struct device *hwdev, phys_addr_t phys,
diff --git a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c
index e31c235b5fd9e..0b1992c355f36 100644
--- a/kernel/dma/swiotlb.c
+++ b/kernel/dma/swiotlb.c
@@ -290,11 +290,9 @@ swiotlb_init(int verbose)
  * initialize the swiotlb later using the slab allocator if needed.
  * This should be just like above, but with some error catching.
  */
-int
-swiotlb_late_init_with_default_size(size_t default_size)
+int swiotlb_init_late(size_t size)
 {
-	unsigned long nslabs =
-		ALIGN(default_size >> IO_TLB_SHIFT, IO_TLB_SEGSIZE);
+	unsigned long nslabs = ALIGN(size >> IO_TLB_SHIFT, IO_TLB_SEGSIZE);
 	unsigned long bytes;
 	unsigned char *vstart = NULL;
 	unsigned int order;
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 10:53:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 10:53:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281116.479367 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP08Y-0004uK-Vf; Tue, 01 Mar 2022 10:53:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281116.479367; Tue, 01 Mar 2022 10:53:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP08Y-0004u5-QN; Tue, 01 Mar 2022 10:53:46 +0000
Received: by outflank-mailman (input) for mailman id 281116;
 Tue, 01 Mar 2022 10:53:45 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=AA0s=TM=bombadil.srs.infradead.org=BATV+e5026ef6e36407c4b08a+6764+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nP08W-00031a-VL
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 10:53:45 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id dc6d519c-994d-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 11:53:44 +0100 (CET)
Received: from [2.53.44.23] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nP08L-00GD2p-Cd; Tue, 01 Mar 2022 10:53:34 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: dc6d519c-994d-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=fw5CJGRWfS2qx4RLqYxqctHTinwQ2YN+lYk2/GZzFw8=; b=oQNBKGhMS01GkNaiykQiJM1eLd
	vRESuDJanvP54R4ITyrRLSUuGPOceoi6GtUCJmeVTcVbKIb6HTNWTn8kqxugSvDOVcDgZUsHy96pd
	dby66LZxGUvs/10nECjNWAMAguYvHKX/psdAJm7rWIlvynPLP9IcrWBmaDFf8HN+9J23CvC37TQaD
	sgY0/HEmNw6l5ck0Svp0ox8NUlX7Wa8dRG069/BR78zpB4VwRhg6mko9moUsppjv1oXN0aPQQse2j
	pJlWW5h93gf9TjjeUODJPDnwEXoacsoZV+pfZoJ6c/3jXpMoyweSQk7ch/UNQaDSu053oytWfCM3Q
	vHimhqeg==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: [PATCH 05/12] swiotlb: pass a gfp_mask argument to swiotlb_init_late
Date: Tue,  1 Mar 2022 12:53:04 +0200
Message-Id: <20220301105311.885699-6-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220301105311.885699-1-hch@lst.de>
References: <20220301105311.885699-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

Let the caller chose a zone to allocate from.  This will be used
later on by the xen-swiotlb initialization on arm.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Reviewed-by: Anshuman Khandual <anshuman.khandual@arm.com>
---
 arch/x86/pci/sta2x11-fixup.c | 2 +-
 include/linux/swiotlb.h      | 2 +-
 kernel/dma/swiotlb.c         | 4 ++--
 3 files changed, 4 insertions(+), 4 deletions(-)

diff --git a/arch/x86/pci/sta2x11-fixup.c b/arch/x86/pci/sta2x11-fixup.c
index e0c039a75b2db..c7e6faf59a861 100644
--- a/arch/x86/pci/sta2x11-fixup.c
+++ b/arch/x86/pci/sta2x11-fixup.c
@@ -57,7 +57,7 @@ static void sta2x11_new_instance(struct pci_dev *pdev)
 		int size = STA2X11_SWIOTLB_SIZE;
 		/* First instance: register your own swiotlb area */
 		dev_info(&pdev->dev, "Using SWIOTLB (size %i)\n", size);
-		if (swiotlb_init_late(size))
+		if (swiotlb_init_late(size, GFP_DMA))
 			dev_emerg(&pdev->dev, "init swiotlb failed\n");
 	}
 	list_add(&instance->list, &sta2x11_instance_list);
diff --git a/include/linux/swiotlb.h b/include/linux/swiotlb.h
index b48b26bfa0edb..1befd6b2ccf5e 100644
--- a/include/linux/swiotlb.h
+++ b/include/linux/swiotlb.h
@@ -40,7 +40,7 @@ extern void swiotlb_init(int verbose);
 int swiotlb_init_with_tbl(char *tlb, unsigned long nslabs, int verbose);
 unsigned long swiotlb_size_or_default(void);
 extern int swiotlb_late_init_with_tbl(char *tlb, unsigned long nslabs);
-int swiotlb_init_late(size_t size);
+int swiotlb_init_late(size_t size, gfp_t gfp_mask);
 extern void __init swiotlb_update_mem_attributes(void);
 
 phys_addr_t swiotlb_tbl_map_single(struct device *hwdev, phys_addr_t phys,
diff --git a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c
index 0b1992c355f36..9a38ea3a46e9f 100644
--- a/kernel/dma/swiotlb.c
+++ b/kernel/dma/swiotlb.c
@@ -290,7 +290,7 @@ swiotlb_init(int verbose)
  * initialize the swiotlb later using the slab allocator if needed.
  * This should be just like above, but with some error catching.
  */
-int swiotlb_init_late(size_t size)
+int swiotlb_init_late(size_t size, gfp_t gfp_mask)
 {
 	unsigned long nslabs = ALIGN(size >> IO_TLB_SHIFT, IO_TLB_SEGSIZE);
 	unsigned long bytes;
@@ -309,7 +309,7 @@ int swiotlb_init_late(size_t size)
 	bytes = nslabs << IO_TLB_SHIFT;
 
 	while ((SLABS_PER_PAGE << order) > IO_TLB_MIN_SLABS) {
-		vstart = (void *)__get_free_pages(GFP_DMA | __GFP_NOWARN,
+		vstart = (void *)__get_free_pages(gfp_mask | __GFP_NOWARN,
 						  order);
 		if (vstart)
 			break;
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 10:53:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 10:53:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281118.479377 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP08e-0005b1-DG; Tue, 01 Mar 2022 10:53:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281118.479377; Tue, 01 Mar 2022 10:53:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP08e-0005ag-94; Tue, 01 Mar 2022 10:53:52 +0000
Received: by outflank-mailman (input) for mailman id 281118;
 Tue, 01 Mar 2022 10:53:50 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=AA0s=TM=bombadil.srs.infradead.org=BATV+e5026ef6e36407c4b08a+6764+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nP08c-00031b-L4
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 10:53:50 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id dfcc905a-994d-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 11:53:49 +0100 (CET)
Received: from [2.53.44.23] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nP08O-00GD52-Sv; Tue, 01 Mar 2022 10:53:37 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: dfcc905a-994d-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=2LuLtS1efSBZ06JRKs3rwu/XDIHFFEkeBlwKrISdqYE=; b=d0GW7Tw12y7oHEGfOc2+6gvXWU
	gth40xP+Gz9285nWvmrnNehOfvBSMx2xt0QdApjuW42I7eWQpyyKL1pXI0s4WzqImgyuzcAb3j9jf
	+SISwsedK7cWJhFGHhjm5c7XuU8iQf1QTq0VDFeYk6ONhkhoWSgOm7iaWp5zedDcQjWUChB8dASDc
	/d0vPlBfgeQKsF5aXF9OIW8TwXU1Ixv68xdkCCkTrkwjXeTn7qylYSEif1BWWjiKHxYdVnXPCzfPN
	xdWlLnFGt6Y79j4yHp/oknbXTJhnyfXhZ8B9sm7KrK9dWl/oJA9n8pQJhROaLbLywWs6qg9KLS6Un
	cnAd3l4Q==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: [PATCH 06/12] MIPS/octeon: use swiotlb_init instead of open coding it
Date: Tue,  1 Mar 2022 12:53:05 +0200
Message-Id: <20220301105311.885699-7-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220301105311.885699-1-hch@lst.de>
References: <20220301105311.885699-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

Use the generic swiotlb initialization helper instead of open coding it.

Signed-off-by: Christoph Hellwig <hch@lst.de>
---
 arch/mips/cavium-octeon/dma-octeon.c | 15 ++-------------
 arch/mips/pci/pci-octeon.c           |  2 +-
 2 files changed, 3 insertions(+), 14 deletions(-)

diff --git a/arch/mips/cavium-octeon/dma-octeon.c b/arch/mips/cavium-octeon/dma-octeon.c
index df70308db0e69..fb7547e217263 100644
--- a/arch/mips/cavium-octeon/dma-octeon.c
+++ b/arch/mips/cavium-octeon/dma-octeon.c
@@ -186,15 +186,12 @@ phys_addr_t dma_to_phys(struct device *dev, dma_addr_t daddr)
 	return daddr;
 }
 
-char *octeon_swiotlb;
-
 void __init plat_swiotlb_setup(void)
 {
 	phys_addr_t start, end;
 	phys_addr_t max_addr;
 	phys_addr_t addr_size;
 	size_t swiotlbsize;
-	unsigned long swiotlb_nslabs;
 	u64 i;
 
 	max_addr = 0;
@@ -236,15 +233,7 @@ void __init plat_swiotlb_setup(void)
 	if (OCTEON_IS_OCTEON2() && max_addr >= 0x100000000ul)
 		swiotlbsize = 64 * (1<<20);
 #endif
-	swiotlb_nslabs = swiotlbsize >> IO_TLB_SHIFT;
-	swiotlb_nslabs = ALIGN(swiotlb_nslabs, IO_TLB_SEGSIZE);
-	swiotlbsize = swiotlb_nslabs << IO_TLB_SHIFT;
-
-	octeon_swiotlb = memblock_alloc_low(swiotlbsize, PAGE_SIZE);
-	if (!octeon_swiotlb)
-		panic("%s: Failed to allocate %zu bytes align=%lx\n",
-		      __func__, swiotlbsize, PAGE_SIZE);
 
-	if (swiotlb_init_with_tbl(octeon_swiotlb, swiotlb_nslabs, 1) == -ENOMEM)
-		panic("Cannot allocate SWIOTLB buffer");
+	swiotlb_adjust_size(swiotlbsize);
+	swiotlb_init(1);
 }
diff --git a/arch/mips/pci/pci-octeon.c b/arch/mips/pci/pci-octeon.c
index fc29b85cfa926..e457a18cbdc59 100644
--- a/arch/mips/pci/pci-octeon.c
+++ b/arch/mips/pci/pci-octeon.c
@@ -664,7 +664,7 @@ static int __init octeon_pci_setup(void)
 
 		/* BAR1 movable regions contiguous to cover the swiotlb */
 		octeon_bar1_pci_phys =
-			virt_to_phys(octeon_swiotlb) & ~((1ull << 22) - 1);
+			io_tlb_default_mem.start & ~((1ull << 22) - 1);
 
 		for (index = 0; index < 32; index++) {
 			union cvmx_pci_bar1_indexx bar1_index;
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 10:53:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 10:53:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281133.479389 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP08k-0006Z0-RW; Tue, 01 Mar 2022 10:53:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281133.479389; Tue, 01 Mar 2022 10:53:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP08k-0006YR-N0; Tue, 01 Mar 2022 10:53:58 +0000
Received: by outflank-mailman (input) for mailman id 281133;
 Tue, 01 Mar 2022 10:53:57 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=AA0s=TM=bombadil.srs.infradead.org=BATV+e5026ef6e36407c4b08a+6764+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nP08j-00031b-EO
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 10:53:57 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id e2bc49c5-994d-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 11:53:54 +0100 (CET)
Received: from [2.53.44.23] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nP08S-00GD8C-Fs; Tue, 01 Mar 2022 10:53:41 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e2bc49c5-994d-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=QlJEhdZKSp+/j7GU59vJCF8WhoQcKGKIb5D13FyS+IU=; b=r9rZYgz8+yDMzg+TVcNrIpR5jM
	tpFBvURKAlNTMslLzEdEkLEEJ9fLs4MRaNOfN9E69YqNxR8z2HX7ei4q+P610iYtMYDgXvufqmiLK
	1jGWVsTM/jGqBhe+jYhFkJmwqHq64UJMb4A0JtTyGOcgFr+bK0uFtZtly1qPLYrua8SdJRJUEi0B4
	sjWz+pmHz4QpImiIu7wPgspbQCa1F1EDWvDIoSW+BeYLTxafaCEJDgSg5TS5B6qD0NwS7EkZm2R/v
	b1gxYQ16GJk7WTficLfM/6Gh4ELwzw3sgTLdff5AaQP3ZRoEeuCi0ktLqzJNqSQimemdwbJyObBy7
	JbtGiYIw==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: [PATCH 07/12] x86: remove the IOMMU table infrastructure
Date: Tue,  1 Mar 2022 12:53:06 +0200
Message-Id: <20220301105311.885699-8-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220301105311.885699-1-hch@lst.de>
References: <20220301105311.885699-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

The IOMMU table tries to separate the different IOMMUs into different
backends, but actually requires various cross calls.

Rewrite the code to do the generic swiotlb/swiotlb-xen setup directly
in pci-dma.c and then just call into the IOMMU drivers.

Signed-off-by: Christoph Hellwig <hch@lst.de>
---
 arch/ia64/include/asm/iommu_table.h    |   7 --
 arch/x86/include/asm/dma-mapping.h     |   1 -
 arch/x86/include/asm/gart.h            |   5 +-
 arch/x86/include/asm/iommu.h           |   6 ++
 arch/x86/include/asm/iommu_table.h     | 102 -----------------------
 arch/x86/include/asm/swiotlb.h         |  30 -------
 arch/x86/include/asm/xen/swiotlb-xen.h |   2 -
 arch/x86/kernel/Makefile               |   2 -
 arch/x86/kernel/amd_gart_64.c          |   5 +-
 arch/x86/kernel/aperture_64.c          |  14 ++--
 arch/x86/kernel/pci-dma.c              | 107 ++++++++++++++++++++-----
 arch/x86/kernel/pci-iommu_table.c      |  77 ------------------
 arch/x86/kernel/pci-swiotlb.c          |  77 ------------------
 arch/x86/kernel/tboot.c                |   1 -
 arch/x86/kernel/vmlinux.lds.S          |  12 ---
 arch/x86/xen/Makefile                  |   2 -
 arch/x86/xen/pci-swiotlb-xen.c         |  96 ----------------------
 drivers/iommu/amd/init.c               |   6 --
 drivers/iommu/amd/iommu.c              |   5 +-
 drivers/iommu/intel/dmar.c             |   6 +-
 include/linux/dmar.h                   |   6 +-
 21 files changed, 110 insertions(+), 459 deletions(-)
 delete mode 100644 arch/ia64/include/asm/iommu_table.h
 delete mode 100644 arch/x86/include/asm/iommu_table.h
 delete mode 100644 arch/x86/include/asm/swiotlb.h
 delete mode 100644 arch/x86/kernel/pci-iommu_table.c
 delete mode 100644 arch/x86/kernel/pci-swiotlb.c
 delete mode 100644 arch/x86/xen/pci-swiotlb-xen.c

diff --git a/arch/ia64/include/asm/iommu_table.h b/arch/ia64/include/asm/iommu_table.h
deleted file mode 100644
index cc96116ac276a..0000000000000
--- a/arch/ia64/include/asm/iommu_table.h
+++ /dev/null
@@ -1,7 +0,0 @@
-/* SPDX-License-Identifier: GPL-2.0 */
-#ifndef _ASM_IA64_IOMMU_TABLE_H
-#define _ASM_IA64_IOMMU_TABLE_H
-
-#define IOMMU_INIT_POST(_detect)
-
-#endif /* _ASM_IA64_IOMMU_TABLE_H */
diff --git a/arch/x86/include/asm/dma-mapping.h b/arch/x86/include/asm/dma-mapping.h
index bb1654fe0ce74..256fd8115223d 100644
--- a/arch/x86/include/asm/dma-mapping.h
+++ b/arch/x86/include/asm/dma-mapping.h
@@ -9,7 +9,6 @@
 
 #include <linux/scatterlist.h>
 #include <asm/io.h>
-#include <asm/swiotlb.h>
 
 extern int iommu_merge;
 extern int panic_on_overflow;
diff --git a/arch/x86/include/asm/gart.h b/arch/x86/include/asm/gart.h
index 3185565743459..5af8088a10df6 100644
--- a/arch/x86/include/asm/gart.h
+++ b/arch/x86/include/asm/gart.h
@@ -38,7 +38,7 @@ extern int gart_iommu_aperture_disabled;
 extern void early_gart_iommu_check(void);
 extern int gart_iommu_init(void);
 extern void __init gart_parse_options(char *);
-extern int gart_iommu_hole_init(void);
+void gart_iommu_hole_init(void);
 
 #else
 #define gart_iommu_aperture            0
@@ -51,9 +51,8 @@ static inline void early_gart_iommu_check(void)
 static inline void gart_parse_options(char *options)
 {
 }
-static inline int gart_iommu_hole_init(void)
+static inline void gart_iommu_hole_init(void)
 {
-	return -ENODEV;
 }
 #endif
 
diff --git a/arch/x86/include/asm/iommu.h b/arch/x86/include/asm/iommu.h
index bf1ed2ddc74bd..dba89ed40d38d 100644
--- a/arch/x86/include/asm/iommu.h
+++ b/arch/x86/include/asm/iommu.h
@@ -9,6 +9,12 @@
 extern int force_iommu, no_iommu;
 extern int iommu_detected;
 
+#ifdef CONFIG_SWIOTLB
+extern bool x86_swiotlb_enable;
+#else
+#define x86_swiotlb_enable false
+#endif
+
 /* 10 seconds */
 #define DMAR_OPERATION_TIMEOUT ((cycles_t) tsc_khz*10*1000)
 
diff --git a/arch/x86/include/asm/iommu_table.h b/arch/x86/include/asm/iommu_table.h
deleted file mode 100644
index 1fb3fd1a83c25..0000000000000
--- a/arch/x86/include/asm/iommu_table.h
+++ /dev/null
@@ -1,102 +0,0 @@
-/* SPDX-License-Identifier: GPL-2.0 */
-#ifndef _ASM_X86_IOMMU_TABLE_H
-#define _ASM_X86_IOMMU_TABLE_H
-
-#include <asm/swiotlb.h>
-
-/*
- * History lesson:
- * The execution chain of IOMMUs in 2.6.36 looks as so:
- *
- *            [xen-swiotlb]
- *                 |
- *         +----[swiotlb *]--+
- *        /         |         \
- *       /          |          \
- *    [GART]     [Calgary]  [Intel VT-d]
- *     /
- *    /
- * [AMD-Vi]
- *
- * *: if SWIOTLB detected 'iommu=soft'/'swiotlb=force' it would skip
- * over the rest of IOMMUs and unconditionally initialize the SWIOTLB.
- * Also it would surreptitiously initialize set the swiotlb=1 if there were
- * more than 4GB and if the user did not pass in 'iommu=off'. The swiotlb
- * flag would be turned off by all IOMMUs except the Calgary one.
- *
- * The IOMMU_INIT* macros allow a similar tree (or more complex if desired)
- * to be built by defining who we depend on.
- *
- * And all that needs to be done is to use one of the macros in the IOMMU
- * and the pci-dma.c will take care of the rest.
- */
-
-struct iommu_table_entry {
-	initcall_t	detect;
-	initcall_t	depend;
-	void		(*early_init)(void); /* No memory allocate available. */
-	void		(*late_init)(void); /* Yes, can allocate memory. */
-#define IOMMU_FINISH_IF_DETECTED (1<<0)
-#define IOMMU_DETECTED		 (1<<1)
-	int		flags;
-};
-/*
- * Macro fills out an entry in the .iommu_table that is equivalent
- * to the fields that 'struct iommu_table_entry' has. The entries
- * that are put in the .iommu_table section are not put in any order
- * hence during boot-time we will have to resort them based on
- * dependency. */
-
-
-#define __IOMMU_INIT(_detect, _depend, _early_init, _late_init, _finish)\
-	static const struct iommu_table_entry				\
-		__iommu_entry_##_detect __used				\
-	__attribute__ ((unused, __section__(".iommu_table"),		\
-			aligned((sizeof(void *)))))	\
-	= {_detect, _depend, _early_init, _late_init,			\
-	   _finish ? IOMMU_FINISH_IF_DETECTED : 0}
-/*
- * The simplest IOMMU definition. Provide the detection routine
- * and it will be run after the SWIOTLB and the other IOMMUs
- * that utilize this macro. If the IOMMU is detected (ie, the
- * detect routine returns a positive value), the other IOMMUs
- * are also checked. You can use IOMMU_INIT_POST_FINISH if you prefer
- * to stop detecting the other IOMMUs after yours has been detected.
- */
-#define IOMMU_INIT_POST(_detect)					\
-	__IOMMU_INIT(_detect, pci_swiotlb_detect_4gb,  NULL, NULL, 0)
-
-#define IOMMU_INIT_POST_FINISH(detect)					\
-	__IOMMU_INIT(_detect, pci_swiotlb_detect_4gb,  NULL, NULL, 1)
-
-/*
- * A more sophisticated version of IOMMU_INIT. This variant requires:
- *  a). A detection routine function.
- *  b). The name of the detection routine we depend on to get called
- *      before us.
- *  c). The init routine which gets called if the detection routine
- *      returns a positive value from the pci_iommu_alloc. This means
- *      no presence of a memory allocator.
- *  d). Similar to the 'init', except that this gets called from pci_iommu_init
- *      where we do have a memory allocator.
- *
- * The standard IOMMU_INIT differs from the IOMMU_INIT_FINISH variant
- * in that the former will continue detecting other IOMMUs in the call
- * list after the detection routine returns a positive number, while the
- * latter will stop the execution chain upon first successful detection.
- * Both variants will still call the 'init' and 'late_init' functions if
- * they are set.
- */
-#define IOMMU_INIT_FINISH(_detect, _depend, _init, _late_init)		\
-	__IOMMU_INIT(_detect, _depend, _init, _late_init, 1)
-
-#define IOMMU_INIT(_detect, _depend, _init, _late_init)			\
-	__IOMMU_INIT(_detect, _depend, _init, _late_init, 0)
-
-void sort_iommu_table(struct iommu_table_entry *start,
-		      struct iommu_table_entry *finish);
-
-void check_iommu_entries(struct iommu_table_entry *start,
-			 struct iommu_table_entry *finish);
-
-#endif /* _ASM_X86_IOMMU_TABLE_H */
diff --git a/arch/x86/include/asm/swiotlb.h b/arch/x86/include/asm/swiotlb.h
deleted file mode 100644
index ff6c92eff035a..0000000000000
--- a/arch/x86/include/asm/swiotlb.h
+++ /dev/null
@@ -1,30 +0,0 @@
-/* SPDX-License-Identifier: GPL-2.0 */
-#ifndef _ASM_X86_SWIOTLB_H
-#define _ASM_X86_SWIOTLB_H
-
-#include <linux/swiotlb.h>
-
-#ifdef CONFIG_SWIOTLB
-extern int swiotlb;
-extern int __init pci_swiotlb_detect_override(void);
-extern int __init pci_swiotlb_detect_4gb(void);
-extern void __init pci_swiotlb_init(void);
-extern void __init pci_swiotlb_late_init(void);
-#else
-#define swiotlb 0
-static inline int pci_swiotlb_detect_override(void)
-{
-	return 0;
-}
-static inline int pci_swiotlb_detect_4gb(void)
-{
-	return 0;
-}
-static inline void pci_swiotlb_init(void)
-{
-}
-static inline void pci_swiotlb_late_init(void)
-{
-}
-#endif
-#endif /* _ASM_X86_SWIOTLB_H */
diff --git a/arch/x86/include/asm/xen/swiotlb-xen.h b/arch/x86/include/asm/xen/swiotlb-xen.h
index 66b4ddde77430..e5a90b42e4dde 100644
--- a/arch/x86/include/asm/xen/swiotlb-xen.h
+++ b/arch/x86/include/asm/xen/swiotlb-xen.h
@@ -3,10 +3,8 @@
 #define _ASM_X86_SWIOTLB_XEN_H
 
 #ifdef CONFIG_SWIOTLB_XEN
-extern int __init pci_xen_swiotlb_detect(void);
 extern int pci_xen_swiotlb_init_late(void);
 #else
-#define pci_xen_swiotlb_detect NULL
 static inline int pci_xen_swiotlb_init_late(void) { return -ENXIO; }
 #endif
 
diff --git a/arch/x86/kernel/Makefile b/arch/x86/kernel/Makefile
index 6aef9ee28a394..2851d4f0aa0d2 100644
--- a/arch/x86/kernel/Makefile
+++ b/arch/x86/kernel/Makefile
@@ -71,7 +71,6 @@ obj-y			+= bootflag.o e820.o
 obj-y			+= pci-dma.o quirks.o topology.o kdebugfs.o
 obj-y			+= alternative.o i8253.o hw_breakpoint.o
 obj-y			+= tsc.o tsc_msr.o io_delay.o rtc.o
-obj-y			+= pci-iommu_table.o
 obj-y			+= resource.o
 obj-y			+= irqflags.o
 obj-y			+= static_call.o
@@ -136,7 +135,6 @@ obj-$(CONFIG_PCSPKR_PLATFORM)	+= pcspeaker.o
 
 obj-$(CONFIG_X86_CHECK_BIOS_CORRUPTION) += check.o
 
-obj-$(CONFIG_SWIOTLB)			+= pci-swiotlb.o
 obj-$(CONFIG_OF)			+= devicetree.o
 obj-$(CONFIG_UPROBES)			+= uprobes.o
 
diff --git a/arch/x86/kernel/amd_gart_64.c b/arch/x86/kernel/amd_gart_64.c
index ed837383de5c8..194d54eed5376 100644
--- a/arch/x86/kernel/amd_gart_64.c
+++ b/arch/x86/kernel/amd_gart_64.c
@@ -38,11 +38,9 @@
 #include <asm/iommu.h>
 #include <asm/gart.h>
 #include <asm/set_memory.h>
-#include <asm/swiotlb.h>
 #include <asm/dma.h>
 #include <asm/amd_nb.h>
 #include <asm/x86_init.h>
-#include <asm/iommu_table.h>
 
 static unsigned long iommu_bus_base;	/* GART remapping area (physical) */
 static unsigned long iommu_size;	/* size of remapping area bytes */
@@ -808,7 +806,7 @@ int __init gart_iommu_init(void)
 	flush_gart();
 	dma_ops = &gart_dma_ops;
 	x86_platform.iommu_shutdown = gart_iommu_shutdown;
-	swiotlb = 0;
+	x86_swiotlb_enable = false;
 
 	return 0;
 }
@@ -842,4 +840,3 @@ void __init gart_parse_options(char *p)
 		}
 	}
 }
-IOMMU_INIT_POST(gart_iommu_hole_init);
diff --git a/arch/x86/kernel/aperture_64.c b/arch/x86/kernel/aperture_64.c
index af3ba08b684b5..7a5630d904b23 100644
--- a/arch/x86/kernel/aperture_64.c
+++ b/arch/x86/kernel/aperture_64.c
@@ -392,7 +392,7 @@ void __init early_gart_iommu_check(void)
 
 static int __initdata printed_gart_size_msg;
 
-int __init gart_iommu_hole_init(void)
+void __init gart_iommu_hole_init(void)
 {
 	u32 agp_aper_base = 0, agp_aper_order = 0;
 	u32 aper_size, aper_alloc = 0, aper_order = 0, last_aper_order = 0;
@@ -401,11 +401,11 @@ int __init gart_iommu_hole_init(void)
 	int i, node;
 
 	if (!amd_gart_present())
-		return -ENODEV;
+		return;
 
 	if (gart_iommu_aperture_disabled || !fix_aperture ||
 	    !early_pci_allowed())
-		return -ENODEV;
+		return;
 
 	pr_info("Checking aperture...\n");
 
@@ -491,10 +491,8 @@ int __init gart_iommu_hole_init(void)
 			 * and fixed up the northbridge
 			 */
 			exclude_from_core(last_aper_base, last_aper_order);
-
-			return 1;
 		}
-		return 0;
+		return;
 	}
 
 	if (!fallback_aper_force) {
@@ -527,7 +525,7 @@ int __init gart_iommu_hole_init(void)
 			panic("Not enough memory for aperture");
 		}
 	} else {
-		return 0;
+		return;
 	}
 
 	/*
@@ -561,6 +559,4 @@ int __init gart_iommu_hole_init(void)
 	}
 
 	set_up_gart_resume(aper_order, aper_alloc);
-
-	return 1;
 }
diff --git a/arch/x86/kernel/pci-dma.c b/arch/x86/kernel/pci-dma.c
index de234e7a8962e..2ac0ef9c2fb76 100644
--- a/arch/x86/kernel/pci-dma.c
+++ b/arch/x86/kernel/pci-dma.c
@@ -7,13 +7,16 @@
 #include <linux/memblock.h>
 #include <linux/gfp.h>
 #include <linux/pci.h>
+#include <linux/amd-iommu.h>
 
 #include <asm/proto.h>
 #include <asm/dma.h>
 #include <asm/iommu.h>
 #include <asm/gart.h>
 #include <asm/x86_init.h>
-#include <asm/iommu_table.h>
+
+#include <xen/xen.h>
+#include <xen/swiotlb-xen.h>
 
 static bool disable_dac_quirk __read_mostly;
 
@@ -34,24 +37,83 @@ int no_iommu __read_mostly;
 /* Set this to 1 if there is a HW IOMMU in the system */
 int iommu_detected __read_mostly = 0;
 
-extern struct iommu_table_entry __iommu_table[], __iommu_table_end[];
+#ifdef CONFIG_SWIOTLB
+bool x86_swiotlb_enable;
+
+static void __init pci_swiotlb_detect(void)
+{
+	/* don't initialize swiotlb if iommu=off (no_iommu=1) */
+	if (!no_iommu && max_possible_pfn > MAX_DMA32_PFN)
+		x86_swiotlb_enable = true;
+
+	/*
+	 * Set swiotlb to 1 so that bounce buffers are allocated and used for
+	 * devices that can't support DMA to encrypted memory.
+	 */
+	if (cc_platform_has(CC_ATTR_HOST_MEM_ENCRYPT))
+		x86_swiotlb_enable = true;
+
+	if (swiotlb_force == SWIOTLB_FORCE)
+		x86_swiotlb_enable = true;
+}
+#else
+static inline void __init pci_swiotlb_detect(void)
+{
+}
+#endif /* CONFIG_SWIOTLB */
+
+#ifdef CONFIG_SWIOTLB_XEN
+static bool xen_swiotlb;
+
+static void __init pci_xen_swiotlb_init(void)
+{
+	if (!xen_initial_domain() && !x86_swiotlb_enable &&
+	    swiotlb_force != SWIOTLB_FORCE)
+		return;
+	x86_swiotlb_enable = false;
+	xen_swiotlb = true;
+	xen_swiotlb_init_early();
+	dma_ops = &xen_swiotlb_dma_ops;
+	if (IS_ENABLED(CONFIG_PCI))
+		pci_request_acs();
+}
+
+int pci_xen_swiotlb_init_late(void)
+{
+	int rc;
+
+	if (xen_swiotlb)
+		return 0;
+
+	rc = xen_swiotlb_init();
+	if (rc)
+		return rc;
+
+	/* XXX: this switches the dma ops under live devices! */
+	dma_ops = &xen_swiotlb_dma_ops;
+	if (IS_ENABLED(CONFIG_PCI))
+		pci_request_acs();
+	return 0;
+}
+EXPORT_SYMBOL_GPL(pci_xen_swiotlb_init_late);
+#else
+static inline void __init pci_xen_swiotlb_init(void)
+{
+}
+#endif /* CONFIG_SWIOTLB_XEN */
 
 void __init pci_iommu_alloc(void)
 {
-	struct iommu_table_entry *p;
-
-	sort_iommu_table(__iommu_table, __iommu_table_end);
-	check_iommu_entries(__iommu_table, __iommu_table_end);
-
-	for (p = __iommu_table; p < __iommu_table_end; p++) {
-		if (p && p->detect && p->detect() > 0) {
-			p->flags |= IOMMU_DETECTED;
-			if (p->early_init)
-				p->early_init();
-			if (p->flags & IOMMU_FINISH_IF_DETECTED)
-				break;
-		}
+	if (xen_pv_domain()) {
+		pci_xen_swiotlb_init();
+		return;
 	}
+	pci_swiotlb_detect();
+	gart_iommu_hole_init();
+	amd_iommu_detect();
+	detect_intel_iommu();
+	if (x86_swiotlb_enable)
+		swiotlb_init(0);
 }
 
 /*
@@ -102,7 +164,7 @@ static __init int iommu_setup(char *p)
 		}
 #ifdef CONFIG_SWIOTLB
 		if (!strncmp(p, "soft", 4))
-			swiotlb = 1;
+			x86_swiotlb_enable = 1;
 #endif
 		if (!strncmp(p, "pt", 2))
 			iommu_set_default_passthrough(true);
@@ -121,14 +183,17 @@ early_param("iommu", iommu_setup);
 
 static int __init pci_iommu_init(void)
 {
-	struct iommu_table_entry *p;
-
 	x86_init.iommu.iommu_init();
 
-	for (p = __iommu_table; p < __iommu_table_end; p++) {
-		if (p && (p->flags & IOMMU_DETECTED) && p->late_init)
-			p->late_init();
+#ifdef CONFIG_SWIOTLB
+	/* An IOMMU turned us off. */
+	if (x86_swiotlb_enable) {
+		pr_info("PCI-DMA: Using software bounce buffering for IO (SWIOTLB)\n");
+		swiotlb_print_info();
+	} else {
+		swiotlb_exit();
 	}
+#endif
 
 	return 0;
 }
diff --git a/arch/x86/kernel/pci-iommu_table.c b/arch/x86/kernel/pci-iommu_table.c
deleted file mode 100644
index 42e92ec62973b..0000000000000
--- a/arch/x86/kernel/pci-iommu_table.c
+++ /dev/null
@@ -1,77 +0,0 @@
-// SPDX-License-Identifier: GPL-2.0
-#include <linux/dma-mapping.h>
-#include <asm/iommu_table.h>
-#include <linux/string.h>
-#include <linux/kallsyms.h>
-
-static struct iommu_table_entry * __init
-find_dependents_of(struct iommu_table_entry *start,
-		   struct iommu_table_entry *finish,
-		   struct iommu_table_entry *q)
-{
-	struct iommu_table_entry *p;
-
-	if (!q)
-		return NULL;
-
-	for (p = start; p < finish; p++)
-		if (p->detect == q->depend)
-			return p;
-
-	return NULL;
-}
-
-
-void __init sort_iommu_table(struct iommu_table_entry *start,
-			     struct iommu_table_entry *finish) {
-
-	struct iommu_table_entry *p, *q, tmp;
-
-	for (p = start; p < finish; p++) {
-again:
-		q = find_dependents_of(start, finish, p);
-		/* We are bit sneaky here. We use the memory address to figure
-		 * out if the node we depend on is past our point, if so, swap.
-		 */
-		if (q > p) {
-			tmp = *p;
-			memmove(p, q, sizeof(*p));
-			*q = tmp;
-			goto again;
-		}
-	}
-
-}
-
-#ifdef DEBUG
-void __init check_iommu_entries(struct iommu_table_entry *start,
-				struct iommu_table_entry *finish)
-{
-	struct iommu_table_entry *p, *q, *x;
-
-	/* Simple cyclic dependency checker. */
-	for (p = start; p < finish; p++) {
-		q = find_dependents_of(start, finish, p);
-		x = find_dependents_of(start, finish, q);
-		if (p == x) {
-			printk(KERN_ERR "CYCLIC DEPENDENCY FOUND! %pS depends on %pS and vice-versa. BREAKING IT.\n",
-			       p->detect, q->detect);
-			/* Heavy handed way..*/
-			x->depend = NULL;
-		}
-	}
-
-	for (p = start; p < finish; p++) {
-		q = find_dependents_of(p, finish, p);
-		if (q && q > p) {
-			printk(KERN_ERR "EXECUTION ORDER INVALID! %pS should be called before %pS!\n",
-			       p->detect, q->detect);
-		}
-	}
-}
-#else
-void __init check_iommu_entries(struct iommu_table_entry *start,
-				       struct iommu_table_entry *finish)
-{
-}
-#endif
diff --git a/arch/x86/kernel/pci-swiotlb.c b/arch/x86/kernel/pci-swiotlb.c
deleted file mode 100644
index 814ab46a0dada..0000000000000
--- a/arch/x86/kernel/pci-swiotlb.c
+++ /dev/null
@@ -1,77 +0,0 @@
-// SPDX-License-Identifier: GPL-2.0
-
-#include <linux/pci.h>
-#include <linux/cache.h>
-#include <linux/init.h>
-#include <linux/swiotlb.h>
-#include <linux/memblock.h>
-#include <linux/dma-direct.h>
-#include <linux/cc_platform.h>
-
-#include <asm/iommu.h>
-#include <asm/swiotlb.h>
-#include <asm/dma.h>
-#include <asm/xen/swiotlb-xen.h>
-#include <asm/iommu_table.h>
-
-int swiotlb __read_mostly;
-
-/*
- * pci_swiotlb_detect_override - set swiotlb to 1 if necessary
- *
- * This returns non-zero if we are forced to use swiotlb (by the boot
- * option).
- */
-int __init pci_swiotlb_detect_override(void)
-{
-	if (swiotlb_force == SWIOTLB_FORCE)
-		swiotlb = 1;
-
-	return swiotlb;
-}
-IOMMU_INIT_FINISH(pci_swiotlb_detect_override,
-		  pci_xen_swiotlb_detect,
-		  pci_swiotlb_init,
-		  pci_swiotlb_late_init);
-
-/*
- * If 4GB or more detected (and iommu=off not set) or if SME is active
- * then set swiotlb to 1 and return 1.
- */
-int __init pci_swiotlb_detect_4gb(void)
-{
-	/* don't initialize swiotlb if iommu=off (no_iommu=1) */
-	if (!no_iommu && max_possible_pfn > MAX_DMA32_PFN)
-		swiotlb = 1;
-
-	/*
-	 * Set swiotlb to 1 so that bounce buffers are allocated and used for
-	 * devices that can't support DMA to encrypted memory.
-	 */
-	if (cc_platform_has(CC_ATTR_HOST_MEM_ENCRYPT))
-		swiotlb = 1;
-
-	return swiotlb;
-}
-IOMMU_INIT(pci_swiotlb_detect_4gb,
-	   pci_swiotlb_detect_override,
-	   pci_swiotlb_init,
-	   pci_swiotlb_late_init);
-
-void __init pci_swiotlb_init(void)
-{
-	if (swiotlb)
-		swiotlb_init(0);
-}
-
-void __init pci_swiotlb_late_init(void)
-{
-	/* An IOMMU turned us off. */
-	if (!swiotlb)
-		swiotlb_exit();
-	else {
-		printk(KERN_INFO "PCI-DMA: "
-		       "Using software bounce buffering for IO (SWIOTLB)\n");
-		swiotlb_print_info();
-	}
-}
diff --git a/arch/x86/kernel/tboot.c b/arch/x86/kernel/tboot.c
index f9af561c3cd4f..0c1154a1c4032 100644
--- a/arch/x86/kernel/tboot.c
+++ b/arch/x86/kernel/tboot.c
@@ -24,7 +24,6 @@
 #include <asm/processor.h>
 #include <asm/bootparam.h>
 #include <asm/pgalloc.h>
-#include <asm/swiotlb.h>
 #include <asm/fixmap.h>
 #include <asm/proto.h>
 #include <asm/setup.h>
diff --git a/arch/x86/kernel/vmlinux.lds.S b/arch/x86/kernel/vmlinux.lds.S
index 27f830345b6f0..bbe910c15b293 100644
--- a/arch/x86/kernel/vmlinux.lds.S
+++ b/arch/x86/kernel/vmlinux.lds.S
@@ -306,18 +306,6 @@ SECTIONS
 		*(.altinstr_replacement)
 	}
 
-	/*
-	 * struct iommu_table_entry entries are injected in this section.
-	 * It is an array of IOMMUs which during run time gets sorted depending
-	 * on its dependency order. After rootfs_initcall is complete
-	 * this section can be safely removed.
-	 */
-	.iommu_table : AT(ADDR(.iommu_table) - LOAD_OFFSET) {
-		__iommu_table = .;
-		*(.iommu_table)
-		__iommu_table_end = .;
-	}
-
 	. = ALIGN(8);
 	.apicdrivers : AT(ADDR(.apicdrivers) - LOAD_OFFSET) {
 		__apicdrivers = .;
diff --git a/arch/x86/xen/Makefile b/arch/x86/xen/Makefile
index 4953260e281c3..3c5b52fbe4a7f 100644
--- a/arch/x86/xen/Makefile
+++ b/arch/x86/xen/Makefile
@@ -47,6 +47,4 @@ obj-$(CONFIG_XEN_DEBUG_FS)	+= debugfs.o
 
 obj-$(CONFIG_XEN_PV_DOM0)	+= vga.o
 
-obj-$(CONFIG_SWIOTLB_XEN)	+= pci-swiotlb-xen.o
-
 obj-$(CONFIG_XEN_EFI)		+= efi.o
diff --git a/arch/x86/xen/pci-swiotlb-xen.c b/arch/x86/xen/pci-swiotlb-xen.c
deleted file mode 100644
index 46df59aeaa06a..0000000000000
--- a/arch/x86/xen/pci-swiotlb-xen.c
+++ /dev/null
@@ -1,96 +0,0 @@
-// SPDX-License-Identifier: GPL-2.0
-
-/* Glue code to lib/swiotlb-xen.c */
-
-#include <linux/dma-map-ops.h>
-#include <linux/pci.h>
-#include <xen/swiotlb-xen.h>
-
-#include <asm/xen/hypervisor.h>
-#include <xen/xen.h>
-#include <asm/iommu_table.h>
-
-
-#include <asm/xen/swiotlb-xen.h>
-#ifdef CONFIG_X86_64
-#include <asm/iommu.h>
-#include <asm/dma.h>
-#endif
-#include <linux/export.h>
-
-static int xen_swiotlb __read_mostly;
-
-/*
- * pci_xen_swiotlb_detect - set xen_swiotlb to 1 if necessary
- *
- * This returns non-zero if we are forced to use xen_swiotlb (by the boot
- * option).
- */
-int __init pci_xen_swiotlb_detect(void)
-{
-
-	if (!xen_pv_domain())
-		return 0;
-
-	/* If running as PV guest, either iommu=soft, or swiotlb=force will
-	 * activate this IOMMU. If running as PV privileged, activate it
-	 * irregardless.
-	 */
-	if (xen_initial_domain() || swiotlb || swiotlb_force == SWIOTLB_FORCE)
-		xen_swiotlb = 1;
-
-	/* If we are running under Xen, we MUST disable the native SWIOTLB.
-	 * Don't worry about swiotlb_force flag activating the native, as
-	 * the 'swiotlb' flag is the only one turning it on. */
-	swiotlb = 0;
-
-#ifdef CONFIG_X86_64
-	/* pci_swiotlb_detect_4gb turns on native SWIOTLB if no_iommu == 0
-	 * (so no iommu=X command line over-writes).
-	 * Considering that PV guests do not want the *native SWIOTLB* but
-	 * only Xen SWIOTLB it is not useful to us so set no_iommu=1 here.
-	 */
-	if (max_pfn > MAX_DMA32_PFN)
-		no_iommu = 1;
-#endif
-	return xen_swiotlb;
-}
-
-static void __init pci_xen_swiotlb_init(void)
-{
-	if (xen_swiotlb) {
-		xen_swiotlb_init_early();
-		dma_ops = &xen_swiotlb_dma_ops;
-
-#ifdef CONFIG_PCI
-		/* Make sure ACS will be enabled */
-		pci_request_acs();
-#endif
-	}
-}
-
-int pci_xen_swiotlb_init_late(void)
-{
-	int rc;
-
-	if (xen_swiotlb)
-		return 0;
-
-	rc = xen_swiotlb_init();
-	if (rc)
-		return rc;
-
-	dma_ops = &xen_swiotlb_dma_ops;
-#ifdef CONFIG_PCI
-	/* Make sure ACS will be enabled */
-	pci_request_acs();
-#endif
-
-	return 0;
-}
-EXPORT_SYMBOL_GPL(pci_xen_swiotlb_init_late);
-
-IOMMU_INIT_FINISH(pci_xen_swiotlb_detect,
-		  NULL,
-		  pci_xen_swiotlb_init,
-		  NULL);
diff --git a/drivers/iommu/amd/init.c b/drivers/iommu/amd/init.c
index b10fb52ea4428..721300cf90207 100644
--- a/drivers/iommu/amd/init.c
+++ b/drivers/iommu/amd/init.c
@@ -27,7 +27,6 @@
 #include <asm/apic.h>
 #include <asm/gart.h>
 #include <asm/x86_init.h>
-#include <asm/iommu_table.h>
 #include <asm/io_apic.h>
 #include <asm/irq_remapping.h>
 #include <asm/set_memory.h>
@@ -3237,11 +3236,6 @@ __setup("ivrs_ioapic",		parse_ivrs_ioapic);
 __setup("ivrs_hpet",		parse_ivrs_hpet);
 __setup("ivrs_acpihid",		parse_ivrs_acpihid);
 
-IOMMU_INIT_FINISH(amd_iommu_detect,
-		  gart_iommu_hole_init,
-		  NULL,
-		  NULL);
-
 bool amd_iommu_v2_supported(void)
 {
 	return amd_iommu_v2_present;
diff --git a/drivers/iommu/amd/iommu.c b/drivers/iommu/amd/iommu.c
index 461f1844ed1fb..541a7b8315a12 100644
--- a/drivers/iommu/amd/iommu.c
+++ b/drivers/iommu/amd/iommu.c
@@ -1834,7 +1834,10 @@ void amd_iommu_domain_update(struct protection_domain *domain)
 
 static void __init amd_iommu_init_dma_ops(void)
 {
-	swiotlb = (iommu_default_passthrough() || sme_me_mask) ? 1 : 0;
+	if (iommu_default_passthrough() || sme_me_mask)
+		x86_swiotlb_enable = true;
+	else
+		x86_swiotlb_enable = false;
 }
 
 int __init amd_iommu_init_api(void)
diff --git a/drivers/iommu/intel/dmar.c b/drivers/iommu/intel/dmar.c
index 915bff76fe965..29bee4b210c5b 100644
--- a/drivers/iommu/intel/dmar.c
+++ b/drivers/iommu/intel/dmar.c
@@ -30,7 +30,6 @@
 #include <linux/numa.h>
 #include <linux/limits.h>
 #include <asm/irq_remapping.h>
-#include <asm/iommu_table.h>
 #include <trace/events/intel_iommu.h>
 
 #include "../irq_remapping.h"
@@ -913,7 +912,7 @@ dmar_validate_one_drhd(struct acpi_dmar_header *entry, void *arg)
 	return 0;
 }
 
-int __init detect_intel_iommu(void)
+void __init detect_intel_iommu(void)
 {
 	int ret;
 	struct dmar_res_callback validate_drhd_cb = {
@@ -946,8 +945,6 @@ int __init detect_intel_iommu(void)
 		dmar_tbl = NULL;
 	}
 	up_write(&dmar_global_lock);
-
-	return ret ? ret : 1;
 }
 
 static void unmap_iommu(struct intel_iommu *iommu)
@@ -2165,7 +2162,6 @@ static int __init dmar_free_unused_resources(void)
 }
 
 late_initcall(dmar_free_unused_resources);
-IOMMU_INIT_POST(detect_intel_iommu);
 
 /*
  * DMAR Hotplug Support
diff --git a/include/linux/dmar.h b/include/linux/dmar.h
index 45e903d847335..cbd714a198a0a 100644
--- a/include/linux/dmar.h
+++ b/include/linux/dmar.h
@@ -121,7 +121,7 @@ extern int dmar_remove_dev_scope(struct dmar_pci_notify_info *info,
 				 u16 segment, struct dmar_dev_scope *devices,
 				 int count);
 /* Intel IOMMU detection */
-extern int detect_intel_iommu(void);
+void detect_intel_iommu(void);
 extern int enable_drhd_fault_handling(void);
 extern int dmar_device_add(acpi_handle handle);
 extern int dmar_device_remove(acpi_handle handle);
@@ -197,6 +197,10 @@ static inline bool dmar_platform_optin(void)
 	return false;
 }
 
+static inline void detect_intel_iommu(void)
+{
+}
+
 #endif /* CONFIG_DMAR_TABLE */
 
 struct irte {
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 10:54:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 10:54:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281138.479400 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP08n-0006xw-D5; Tue, 01 Mar 2022 10:54:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281138.479400; Tue, 01 Mar 2022 10:54:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP08n-0006xn-7J; Tue, 01 Mar 2022 10:54:01 +0000
Received: by outflank-mailman (input) for mailman id 281138;
 Tue, 01 Mar 2022 10:54:00 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=AA0s=TM=bombadil.srs.infradead.org=BATV+e5026ef6e36407c4b08a+6764+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nP08m-00031b-4L
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 10:54:00 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id e50187be-994d-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 11:53:58 +0100 (CET)
Received: from [2.53.44.23] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nP08W-00GDBz-Fe; Tue, 01 Mar 2022 10:53:45 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e50187be-994d-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=rn1lGNCzgBmJDwsQNrjsOcGImLW+b96q4xUCqvjdsk0=; b=TN8SI+uAq5DRfiCtROBmEeGw49
	N1XQdXveQdISlA9PJvr7k3fqXJ9w4L4fp4g84Sx/b6Q3/TPXM34VfI00X3WX9GkM9+xkrbM+bMDai
	q9KxADFlSGYuizADeUGr7l7Wyhi+6wixAUA9bogKi+S84VubiWeuiOuSLOIOO/u8edfzcJXIwkX9B
	e3uJEQDCxXwbkmyOMf0943q8r0jk1gsz1PxYQdXM0pTs2h2ZzikrlK1tJTrcsOuna2VNTBldJOC0d
	KROkdtCbvHpsPMH2KXKaD98Llv7rUxGn22RsjoJ2MNNq95XdrxGoyXdrHr9Mrkal37Bq7EXzIylMK
	Fz5RfWkA==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: [PATCH 08/12] x86: centralize setting SWIOTLB_FORCE when guest memory encryption is enabled
Date: Tue,  1 Mar 2022 12:53:07 +0200
Message-Id: <20220301105311.885699-9-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220301105311.885699-1-hch@lst.de>
References: <20220301105311.885699-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

Move enabling SWIOTLB_FORCE for guest memory encryption into common code.

Signed-off-by: Christoph Hellwig <hch@lst.de>
---
 arch/x86/kernel/cpu/mshyperv.c | 8 --------
 arch/x86/kernel/pci-dma.c      | 7 +++++++
 arch/x86/mm/mem_encrypt_amd.c  | 3 ---
 3 files changed, 7 insertions(+), 11 deletions(-)

diff --git a/arch/x86/kernel/cpu/mshyperv.c b/arch/x86/kernel/cpu/mshyperv.c
index 5a99f993e6392..568274917f1cd 100644
--- a/arch/x86/kernel/cpu/mshyperv.c
+++ b/arch/x86/kernel/cpu/mshyperv.c
@@ -336,14 +336,6 @@ static void __init ms_hyperv_init_platform(void)
 			swiotlb_unencrypted_base = ms_hyperv.shared_gpa_boundary;
 #endif
 		}
-
-#ifdef CONFIG_SWIOTLB
-		/*
-		 * Enable swiotlb force mode in Isolation VM to
-		 * use swiotlb bounce buffer for dma transaction.
-		 */
-		swiotlb_force = SWIOTLB_FORCE;
-#endif
 	}
 
 	if (hv_max_functions_eax >= HYPERV_CPUID_NESTED_FEATURES) {
diff --git a/arch/x86/kernel/pci-dma.c b/arch/x86/kernel/pci-dma.c
index 2ac0ef9c2fb76..7ab7002758396 100644
--- a/arch/x86/kernel/pci-dma.c
+++ b/arch/x86/kernel/pci-dma.c
@@ -53,6 +53,13 @@ static void __init pci_swiotlb_detect(void)
 	if (cc_platform_has(CC_ATTR_HOST_MEM_ENCRYPT))
 		x86_swiotlb_enable = true;
 
+	/*
+	 * Guest with guest memory encryption must always do I/O through a
+	 * bounce buffer as the hypervisor can't access arbitrary VM memory.
+	 */
+	if (cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT))
+		swiotlb_force = SWIOTLB_FORCE;
+
 	if (swiotlb_force == SWIOTLB_FORCE)
 		x86_swiotlb_enable = true;
 }
diff --git a/arch/x86/mm/mem_encrypt_amd.c b/arch/x86/mm/mem_encrypt_amd.c
index 2b2d018ea3450..a72942d569cf9 100644
--- a/arch/x86/mm/mem_encrypt_amd.c
+++ b/arch/x86/mm/mem_encrypt_amd.c
@@ -191,9 +191,6 @@ void __init sme_early_init(void)
 	/* Update the protection map with memory encryption mask */
 	for (i = 0; i < ARRAY_SIZE(protection_map); i++)
 		protection_map[i] = pgprot_encrypted(protection_map[i]);
-
-	if (cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT))
-		swiotlb_force = SWIOTLB_FORCE;
 }
 
 void __init sev_setup_arch(void)
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 10:56:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 10:56:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281170.479411 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP0Ay-0000Zq-RY; Tue, 01 Mar 2022 10:56:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281170.479411; Tue, 01 Mar 2022 10:56:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP0Ay-0000Zj-OM; Tue, 01 Mar 2022 10:56:16 +0000
Received: by outflank-mailman (input) for mailman id 281170;
 Tue, 01 Mar 2022 10:56:16 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=AA0s=TM=bombadil.srs.infradead.org=BATV+e5026ef6e36407c4b08a+6764+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nP090-00031b-Pw
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 10:54:14 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id edbcae2c-994d-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 11:54:13 +0100 (CET)
Received: from [2.53.44.23] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nP08m-00GDNp-DY; Tue, 01 Mar 2022 10:54:01 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: edbcae2c-994d-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=zCMW1Q+QCPXYuvBuEGOZUQKFwE9OwdLFtYhltvQ29K4=; b=IPppU23T/aMON7FLyMDFYzly4y
	SrIr5mKWZClafJa3/LlRCgHqXwAUqRrn8YOMeVLdYaruBDCwVZ+oeA1TCJP01OphckLh7aW/Xh4aE
	O+7A6N+iHQN61vqDHdCF4t6yTIgG5jpY3jGCH1A7IMaTqU+1RufnGYFZsg6ym2eXz6IbNS0Y3pwX8
	UlH5YaicUs22JThgD0p9wjbHWFTvpyx++4eAJRbNQD6+RIciCW6RIaOv3nY2Arz6MwdIPsNH7bmDb
	kXbZR8ThXJdmI6NGYJUBwyHX1Lh35aW0/peguiWu3/sXXcELyqiay0utedyq1KmsYI+SOZJb3UYfi
	1suKWqMQ==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: [PATCH 12/12] x86: remove cruft from <asm/dma-mapping.h>
Date: Tue,  1 Mar 2022 12:53:11 +0200
Message-Id: <20220301105311.885699-13-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220301105311.885699-1-hch@lst.de>
References: <20220301105311.885699-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

<asm/dma-mapping.h> gets pulled in by all drivers using the DMA API.
Remove x86 internal variables and unnecessary includes from it.

Signed-off-by: Christoph Hellwig <hch@lst.de>
---
 arch/x86/include/asm/dma-mapping.h | 11 -----------
 arch/x86/include/asm/iommu.h       |  2 ++
 2 files changed, 2 insertions(+), 11 deletions(-)

diff --git a/arch/x86/include/asm/dma-mapping.h b/arch/x86/include/asm/dma-mapping.h
index 256fd8115223d..1c66708e30623 100644
--- a/arch/x86/include/asm/dma-mapping.h
+++ b/arch/x86/include/asm/dma-mapping.h
@@ -2,17 +2,6 @@
 #ifndef _ASM_X86_DMA_MAPPING_H
 #define _ASM_X86_DMA_MAPPING_H
 
-/*
- * IOMMU interface. See Documentation/core-api/dma-api-howto.rst and
- * Documentation/core-api/dma-api.rst for documentation.
- */
-
-#include <linux/scatterlist.h>
-#include <asm/io.h>
-
-extern int iommu_merge;
-extern int panic_on_overflow;
-
 extern const struct dma_map_ops *dma_ops;
 
 static inline const struct dma_map_ops *get_arch_dma_ops(struct bus_type *bus)
diff --git a/arch/x86/include/asm/iommu.h b/arch/x86/include/asm/iommu.h
index dba89ed40d38d..0bef44d30a278 100644
--- a/arch/x86/include/asm/iommu.h
+++ b/arch/x86/include/asm/iommu.h
@@ -8,6 +8,8 @@
 
 extern int force_iommu, no_iommu;
 extern int iommu_detected;
+extern int iommu_merge;
+extern int panic_on_overflow;
 
 #ifdef CONFIG_SWIOTLB
 extern bool x86_swiotlb_enable;
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 10:56:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 10:56:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281171.479422 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP0B1-0000qh-3M; Tue, 01 Mar 2022 10:56:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281171.479422; Tue, 01 Mar 2022 10:56:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP0B0-0000qY-WF; Tue, 01 Mar 2022 10:56:19 +0000
Received: by outflank-mailman (input) for mailman id 281171;
 Tue, 01 Mar 2022 10:56:17 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=AA0s=TM=bombadil.srs.infradead.org=BATV+e5026ef6e36407c4b08a+6764+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nP090-00031b-BJ
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 10:54:14 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ed0b796b-994d-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 11:54:11 +0100 (CET)
Received: from [2.53.44.23] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nP08i-00GDLI-3y; Tue, 01 Mar 2022 10:53:56 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ed0b796b-994d-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=7CayTS9LrIpu0RxbQHu+iiiYCGwZaOhMRGYbZFEPab4=; b=PCnrvlAzWQMYA+/n1zcYMpR8CL
	zQPaxiWtxSrWukBZ1ZGpFn9V+ry6qDE2ajcJH645ZcVqLpf+cNzGvEZ05yIAA98K8rx8pdmXxHc/U
	KMmFWCrPbug0iZT6ybiU2/ZocXkyEBnqENiIWYLZL+1yZThUSEUFFjaSk4uFGLXe+jKadPn2pE39R
	JlZnYrjov5D4554i61roEmxjZENvDm+rto7S9AnU9d2VqeRcUZ/DPJnUoNDoKMVgFxCpByWFeAF0e
	msSCj2UdLMqlVzK1513TBBwG3INIa+yJERkjm9WY6g1Op6AvOLf9Y89dM2p/HaJrWO4YahhIR86CN
	gbro6lJg==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: [PATCH 11/12] swiotlb: merge swiotlb-xen initialization into swiotlb
Date: Tue,  1 Mar 2022 12:53:10 +0200
Message-Id: <20220301105311.885699-12-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220301105311.885699-1-hch@lst.de>
References: <20220301105311.885699-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

Allow to pass a remap argument to the swiotlb initialization functions
to handle the Xen/x86 remap case.  ARM/ARM64 never did any remapping
from xen_swiotlb_fixup, so we don't even need that quirk.

Signed-off-by: Christoph Hellwig <hch@lst.de>
---
 arch/arm/xen/mm.c               |  23 +++---
 arch/x86/include/asm/xen/page.h |   5 --
 arch/x86/kernel/pci-dma.c       |  19 +++--
 arch/x86/pci/sta2x11-fixup.c    |   2 +-
 drivers/xen/swiotlb-xen.c       | 128 +-------------------------------
 include/linux/swiotlb.h         |   7 +-
 include/xen/arm/page.h          |   1 -
 include/xen/swiotlb-xen.h       |   8 +-
 kernel/dma/swiotlb.c            | 120 +++++++++++++++---------------
 9 files changed, 96 insertions(+), 217 deletions(-)

diff --git a/arch/arm/xen/mm.c b/arch/arm/xen/mm.c
index a7e54a087b802..58b40f87617d3 100644
--- a/arch/arm/xen/mm.c
+++ b/arch/arm/xen/mm.c
@@ -23,22 +23,20 @@
 #include <asm/xen/hypercall.h>
 #include <asm/xen/interface.h>
 
-unsigned long xen_get_swiotlb_free_pages(unsigned int order)
+static gfp_t xen_swiotlb_gfp(void)
 {
 	phys_addr_t base;
-	gfp_t flags = __GFP_NOWARN|__GFP_KSWAPD_RECLAIM;
 	u64 i;
 
 	for_each_mem_range(i, &base, NULL) {
 		if (base < (phys_addr_t)0xffffffff) {
 			if (IS_ENABLED(CONFIG_ZONE_DMA32))
-				flags |= __GFP_DMA32;
-			else
-				flags |= __GFP_DMA;
-			break;
+				return __GFP_DMA32;
+			return __GFP_DMA;
 		}
 	}
-	return __get_free_pages(flags, order);
+
+	return GFP_KERNEL;
 }
 
 static bool hypercall_cflush = false;
@@ -143,10 +141,15 @@ static int __init xen_mm_init(void)
 	if (!xen_swiotlb_detect())
 		return 0;
 
-	rc = xen_swiotlb_init();
 	/* we can work with the default swiotlb */
-	if (rc < 0 && rc != -EEXIST)
-		return rc;
+	if (!io_tlb_default_mem.nslabs) {
+		if (!xen_initial_domain())
+			return -EINVAL;
+		rc = swiotlb_init_late(swiotlb_size_or_default(),
+				       xen_swiotlb_gfp(), NULL);
+		if (rc < 0)
+			return rc;
+	}
 
 	cflush.op = 0;
 	cflush.a.dev_bus_addr = 0;
diff --git a/arch/x86/include/asm/xen/page.h b/arch/x86/include/asm/xen/page.h
index e989bc2269f54..1fc67df500145 100644
--- a/arch/x86/include/asm/xen/page.h
+++ b/arch/x86/include/asm/xen/page.h
@@ -357,9 +357,4 @@ static inline bool xen_arch_need_swiotlb(struct device *dev,
 	return false;
 }
 
-static inline unsigned long xen_get_swiotlb_free_pages(unsigned int order)
-{
-	return __get_free_pages(__GFP_NOWARN, order);
-}
-
 #endif /* _ASM_X86_XEN_PAGE_H */
diff --git a/arch/x86/kernel/pci-dma.c b/arch/x86/kernel/pci-dma.c
index e0def4b1c3181..2f2c468acb955 100644
--- a/arch/x86/kernel/pci-dma.c
+++ b/arch/x86/kernel/pci-dma.c
@@ -71,15 +71,12 @@ static inline void __init pci_swiotlb_detect(void)
 #endif /* CONFIG_SWIOTLB */
 
 #ifdef CONFIG_SWIOTLB_XEN
-static bool xen_swiotlb;
-
 static void __init pci_xen_swiotlb_init(void)
 {
 	if (!xen_initial_domain() && !x86_swiotlb_enable)
 		return;
 	x86_swiotlb_enable = false;
-	xen_swiotlb = true;
-	xen_swiotlb_init_early();
+	swiotlb_init_remap(true, x86_swiotlb_flags, xen_swiotlb_fixup);
 	dma_ops = &xen_swiotlb_dma_ops;
 	if (IS_ENABLED(CONFIG_PCI))
 		pci_request_acs();
@@ -87,14 +84,16 @@ static void __init pci_xen_swiotlb_init(void)
 
 int pci_xen_swiotlb_init_late(void)
 {
-	int rc;
-
-	if (xen_swiotlb)
+	if (dma_ops == &xen_swiotlb_dma_ops)
 		return 0;
 
-	rc = xen_swiotlb_init();
-	if (rc)
-		return rc;
+	/* we can work with the default swiotlb */
+	if (!io_tlb_default_mem.nslabs) {
+		int rc = swiotlb_init_late(swiotlb_size_or_default(),
+					   GFP_KERNEL, xen_swiotlb_fixup);
+		if (rc < 0)
+			return rc;
+	}
 
 	/* XXX: this switches the dma ops under live devices! */
 	dma_ops = &xen_swiotlb_dma_ops;
diff --git a/arch/x86/pci/sta2x11-fixup.c b/arch/x86/pci/sta2x11-fixup.c
index c7e6faf59a861..7368afc039987 100644
--- a/arch/x86/pci/sta2x11-fixup.c
+++ b/arch/x86/pci/sta2x11-fixup.c
@@ -57,7 +57,7 @@ static void sta2x11_new_instance(struct pci_dev *pdev)
 		int size = STA2X11_SWIOTLB_SIZE;
 		/* First instance: register your own swiotlb area */
 		dev_info(&pdev->dev, "Using SWIOTLB (size %i)\n", size);
-		if (swiotlb_init_late(size, GFP_DMA))
+		if (swiotlb_init_late(size, GFP_DMA, NULL))
 			dev_emerg(&pdev->dev, "init swiotlb failed\n");
 	}
 	list_add(&instance->list, &sta2x11_instance_list);
diff --git a/drivers/xen/swiotlb-xen.c b/drivers/xen/swiotlb-xen.c
index c2da3eb4826e8..df8085b50df10 100644
--- a/drivers/xen/swiotlb-xen.c
+++ b/drivers/xen/swiotlb-xen.c
@@ -104,7 +104,7 @@ static int is_xen_swiotlb_buffer(struct device *dev, dma_addr_t dma_addr)
 	return 0;
 }
 
-static int xen_swiotlb_fixup(void *buf, unsigned long nslabs)
+int xen_swiotlb_fixup(void *buf, unsigned long nslabs)
 {
 	int rc;
 	unsigned int order = get_order(IO_TLB_SEGSIZE << IO_TLB_SHIFT);
@@ -130,132 +130,6 @@ static int xen_swiotlb_fixup(void *buf, unsigned long nslabs)
 	return 0;
 }
 
-enum xen_swiotlb_err {
-	XEN_SWIOTLB_UNKNOWN = 0,
-	XEN_SWIOTLB_ENOMEM,
-	XEN_SWIOTLB_EFIXUP
-};
-
-static const char *xen_swiotlb_error(enum xen_swiotlb_err err)
-{
-	switch (err) {
-	case XEN_SWIOTLB_ENOMEM:
-		return "Cannot allocate Xen-SWIOTLB buffer\n";
-	case XEN_SWIOTLB_EFIXUP:
-		return "Failed to get contiguous memory for DMA from Xen!\n"\
-		    "You either: don't have the permissions, do not have"\
-		    " enough free memory under 4GB, or the hypervisor memory"\
-		    " is too fragmented!";
-	default:
-		break;
-	}
-	return "";
-}
-
-int xen_swiotlb_init(void)
-{
-	enum xen_swiotlb_err m_ret = XEN_SWIOTLB_UNKNOWN;
-	unsigned long bytes = swiotlb_size_or_default();
-	unsigned long nslabs = bytes >> IO_TLB_SHIFT;
-	unsigned int order, repeat = 3;
-	int rc = -ENOMEM;
-	char *start;
-
-	if (io_tlb_default_mem.nslabs) {
-		pr_warn("swiotlb buffer already initialized\n");
-		return -EEXIST;
-	}
-
-retry:
-	m_ret = XEN_SWIOTLB_ENOMEM;
-	order = get_order(bytes);
-
-	/*
-	 * Get IO TLB memory from any location.
-	 */
-#define SLABS_PER_PAGE (1 << (PAGE_SHIFT - IO_TLB_SHIFT))
-#define IO_TLB_MIN_SLABS ((1<<20) >> IO_TLB_SHIFT)
-	while ((SLABS_PER_PAGE << order) > IO_TLB_MIN_SLABS) {
-		start = (void *)xen_get_swiotlb_free_pages(order);
-		if (start)
-			break;
-		order--;
-	}
-	if (!start)
-		goto exit;
-	if (order != get_order(bytes)) {
-		pr_warn("Warning: only able to allocate %ld MB for software IO TLB\n",
-			(PAGE_SIZE << order) >> 20);
-		nslabs = SLABS_PER_PAGE << order;
-		bytes = nslabs << IO_TLB_SHIFT;
-	}
-
-	/*
-	 * And replace that memory with pages under 4GB.
-	 */
-	rc = xen_swiotlb_fixup(start, nslabs);
-	if (rc) {
-		free_pages((unsigned long)start, order);
-		m_ret = XEN_SWIOTLB_EFIXUP;
-		goto error;
-	}
-	rc = swiotlb_late_init_with_tbl(start, nslabs);
-	if (rc)
-		return rc;
-	return 0;
-error:
-	if (nslabs > 1024 && repeat--) {
-		/* Min is 2MB */
-		nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
-		bytes = nslabs << IO_TLB_SHIFT;
-		pr_info("Lowering to %luMB\n", bytes >> 20);
-		goto retry;
-	}
-exit:
-	pr_err("%s (rc:%d)\n", xen_swiotlb_error(m_ret), rc);
-	return rc;
-}
-
-#ifdef CONFIG_X86
-void __init xen_swiotlb_init_early(void)
-{
-	unsigned long bytes = swiotlb_size_or_default();
-	unsigned long nslabs = bytes >> IO_TLB_SHIFT;
-	unsigned int repeat = 3;
-	char *start;
-	int rc;
-
-retry:
-	/*
-	 * Get IO TLB memory from any location.
-	 */
-	start = memblock_alloc(PAGE_ALIGN(bytes),
-			       IO_TLB_SEGSIZE << IO_TLB_SHIFT);
-	if (!start)
-		panic("%s: Failed to allocate %lu bytes\n",
-		      __func__, PAGE_ALIGN(bytes));
-
-	/*
-	 * And replace that memory with pages under 4GB.
-	 */
-	rc = xen_swiotlb_fixup(start, nslabs);
-	if (rc) {
-		memblock_free(start, PAGE_ALIGN(bytes));
-		if (nslabs > 1024 && repeat--) {
-			/* Min is 2MB */
-			nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
-			bytes = nslabs << IO_TLB_SHIFT;
-			pr_info("Lowering to %luMB\n", bytes >> 20);
-			goto retry;
-		}
-		panic("%s (rc:%d)", xen_swiotlb_error(XEN_SWIOTLB_EFIXUP), rc);
-	}
-
-	if (swiotlb_init_with_tbl(start, nslabs, SWIOTLB_VERBOSE))
-		panic("Cannot allocate SWIOTLB buffer");
-}
-#endif /* CONFIG_X86 */
-
 static void *
 xen_swiotlb_alloc_coherent(struct device *hwdev, size_t size,
 			   dma_addr_t *dma_handle, gfp_t flags,
diff --git a/include/linux/swiotlb.h b/include/linux/swiotlb.h
index ee655f2e4d28b..919cf82ed978e 100644
--- a/include/linux/swiotlb.h
+++ b/include/linux/swiotlb.h
@@ -34,10 +34,11 @@ struct scatterlist;
 /* default to 64MB */
 #define IO_TLB_DEFAULT_SIZE (64UL<<20)
 
-int swiotlb_init_with_tbl(char *tlb, unsigned long nslabs, unsigned int flags);
 unsigned long swiotlb_size_or_default(void);
-extern int swiotlb_late_init_with_tbl(char *tlb, unsigned long nslabs);
-int swiotlb_init_late(size_t size, gfp_t gfp_mask);
+int swiotlb_init_late(size_t size, gfp_t gfp_mask,
+		int (*remap)(void *tlb, unsigned long nslabs));
+void __init swiotlb_init_remap(bool addressing_limit, unsigned int flags,
+		int (*remap)(void *tlb, unsigned long nslabs));
 extern void __init swiotlb_update_mem_attributes(void);
 
 phys_addr_t swiotlb_tbl_map_single(struct device *hwdev, phys_addr_t phys,
diff --git a/include/xen/arm/page.h b/include/xen/arm/page.h
index ac1b654705631..7e199c6656b90 100644
--- a/include/xen/arm/page.h
+++ b/include/xen/arm/page.h
@@ -115,6 +115,5 @@ static inline bool set_phys_to_machine(unsigned long pfn, unsigned long mfn)
 bool xen_arch_need_swiotlb(struct device *dev,
 			   phys_addr_t phys,
 			   dma_addr_t dev_addr);
-unsigned long xen_get_swiotlb_free_pages(unsigned int order);
 
 #endif /* _ASM_ARM_XEN_PAGE_H */
diff --git a/include/xen/swiotlb-xen.h b/include/xen/swiotlb-xen.h
index b3e647f86e3e2..590ceb923f0c8 100644
--- a/include/xen/swiotlb-xen.h
+++ b/include/xen/swiotlb-xen.h
@@ -10,8 +10,12 @@ void xen_dma_sync_for_cpu(struct device *dev, dma_addr_t handle,
 void xen_dma_sync_for_device(struct device *dev, dma_addr_t handle,
 			     size_t size, enum dma_data_direction dir);
 
-int xen_swiotlb_init(void);
-void __init xen_swiotlb_init_early(void);
+#ifdef CONFIG_SWIOTLB_XEN
+int xen_swiotlb_fixup(void *buf, unsigned long nslabs);
+#else
+#define xen_swiotlb_fixup NULL
+#endif
+
 extern const struct dma_map_ops xen_swiotlb_dma_ops;
 
 #endif /* __LINUX_SWIOTLB_XEN_H */
diff --git a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c
index 77cf73dc20a78..128363dc9b5bb 100644
--- a/kernel/dma/swiotlb.c
+++ b/kernel/dma/swiotlb.c
@@ -234,40 +234,17 @@ static void swiotlb_init_io_tlb_mem(struct io_tlb_mem *mem, phys_addr_t start,
 	return;
 }
 
-int __init swiotlb_init_with_tbl(char *tlb, unsigned long nslabs,
-		unsigned int flags)
-{
-	struct io_tlb_mem *mem = &io_tlb_default_mem;
-	size_t alloc_size;
-
-	if (swiotlb_force_disable)
-		return 0;
-
-	/* protect against double initialization */
-	if (WARN_ON_ONCE(mem->nslabs))
-		return -ENOMEM;
-
-	alloc_size = PAGE_ALIGN(array_size(sizeof(*mem->slots), nslabs));
-	mem->slots = memblock_alloc(alloc_size, PAGE_SIZE);
-	if (!mem->slots)
-		panic("%s: Failed to allocate %zu bytes align=0x%lx\n",
-		      __func__, alloc_size, PAGE_SIZE);
-
-	swiotlb_init_io_tlb_mem(mem, __pa(tlb), nslabs, false);
-	mem->force_bounce = flags & SWIOTLB_FORCE;
-
-	if (flags & SWIOTLB_VERBOSE)
-		swiotlb_print_info();
-	return 0;
-}
-
 /*
  * Statically reserve bounce buffer space and initialize bounce buffer data
  * structures for the software IO TLB used to implement the DMA API.
  */
-void __init swiotlb_init(bool addressing_limit, unsigned int flags)
+void __init swiotlb_init_remap(bool addressing_limit, unsigned int flags,
+		int (*remap)(void *tlb, unsigned long nslabs))
 {
-	size_t bytes = PAGE_ALIGN(default_nslabs << IO_TLB_SHIFT);
+	struct io_tlb_mem *mem = &io_tlb_default_mem;
+	unsigned long nslabs = default_nslabs;
+	size_t alloc_size = PAGE_ALIGN(array_size(sizeof(*mem->slots), nslabs));
+	size_t bytes;
 	void *tlb;
 
 	if (!addressing_limit && !swiotlb_force_bounce)
@@ -275,23 +252,48 @@ void __init swiotlb_init(bool addressing_limit, unsigned int flags)
 	if (swiotlb_force_disable)
 		return;
 
+	/* protect against double initialization */
+	if (WARN_ON_ONCE(mem->nslabs))
+		return;
+
 	/*
 	 * By default allocate the bonuce buffer memory from low memory.
 	 */
+retry:
+	bytes = PAGE_ALIGN(default_nslabs << IO_TLB_SHIFT);
 	if (flags & SWIOTLB_ANY)
 		tlb = memblock_alloc(bytes, PAGE_SIZE);
 	else
 		tlb = memblock_alloc_low(bytes, PAGE_SIZE);
 	if (!tlb)
-		goto fail;
-	if (swiotlb_init_with_tbl(tlb, default_nslabs, flags))
-		goto fail_free_mem;
-	return;
+		panic("%s: failed to allocate tlb structure\n", __func__);
+
+	if (remap && remap(tlb, nslabs) < 0) {
+		memblock_free(tlb, PAGE_ALIGN(bytes));
+
+		/* Min is 2MB */
+		if (nslabs <= 1024)
+			panic("%s: Failed to remap %zu bytes\n",
+			      __func__, bytes);
+		nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
+		goto retry;
+	}
+
+	mem->slots = memblock_alloc(alloc_size, PAGE_SIZE);
+	if (!mem->slots)
+		panic("%s: Failed to allocate %zu bytes align=0x%lx\n",
+		      __func__, alloc_size, PAGE_SIZE);
 
-fail_free_mem:
-	memblock_free(tlb, bytes);
-fail:
-	pr_warn("Cannot allocate buffer");
+	swiotlb_init_io_tlb_mem(mem, __pa(tlb), default_nslabs, false);
+	mem->force_bounce = flags & SWIOTLB_FORCE;
+
+	if (flags & SWIOTLB_VERBOSE)
+		swiotlb_print_info();
+}
+
+void __init swiotlb_init(bool addressing_limit, unsigned int flags)
+{
+	return swiotlb_init_remap(addressing_limit, flags, NULL);
 }
 
 /*
@@ -299,8 +301,10 @@ void __init swiotlb_init(bool addressing_limit, unsigned int flags)
  * initialize the swiotlb later using the slab allocator if needed.
  * This should be just like above, but with some error catching.
  */
-int swiotlb_init_late(size_t size, gfp_t gfp_mask)
+int swiotlb_init_late(size_t size, gfp_t gfp_mask,
+		int (*remap)(void *tlb, unsigned long nslabs))
 {
+	struct io_tlb_mem *mem = &io_tlb_default_mem;
 	unsigned long nslabs = ALIGN(size >> IO_TLB_SHIFT, IO_TLB_SEGSIZE);
 	unsigned long bytes;
 	unsigned char *vstart = NULL;
@@ -310,9 +314,14 @@ int swiotlb_init_late(size_t size, gfp_t gfp_mask)
 	if (swiotlb_force_disable)
 		return 0;
 
+	/* protect against double initialization */
+	if (WARN_ON_ONCE(mem->nslabs))
+		return -ENOMEM;
+
 	/*
 	 * Get IO TLB memory from the low pages
 	 */
+retry:
 	order = get_order(nslabs << IO_TLB_SHIFT);
 	nslabs = SLABS_PER_PAGE << order;
 	bytes = nslabs << IO_TLB_SHIFT;
@@ -333,33 +342,28 @@ int swiotlb_init_late(size_t size, gfp_t gfp_mask)
 			(PAGE_SIZE << order) >> 20);
 		nslabs = SLABS_PER_PAGE << order;
 	}
-	rc = swiotlb_late_init_with_tbl(vstart, nslabs);
-	if (rc)
-		free_pages((unsigned long)vstart, order);
-
-	return rc;
-}
-
-int
-swiotlb_late_init_with_tbl(char *tlb, unsigned long nslabs)
-{
-	struct io_tlb_mem *mem = &io_tlb_default_mem;
-	unsigned long bytes = nslabs << IO_TLB_SHIFT;
 
-	if (swiotlb_force_disable)
-		return 0;
+	if (remap)
+		rc = remap(vstart, nslabs);
+	if (rc) {
+		free_pages((unsigned long)vstart, order);
 
-	/* protect against double initialization */
-	if (WARN_ON_ONCE(mem->nslabs))
-		return -ENOMEM;
+		/* Min is 2MB */
+		if (nslabs <= 1024)
+			return rc;
+		nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
+		goto retry;
+	}
 
 	mem->slots = (void *)__get_free_pages(GFP_KERNEL | __GFP_ZERO,
 		get_order(array_size(sizeof(*mem->slots), nslabs)));
-	if (!mem->slots)
+	if (!mem->slots) {
+		free_pages((unsigned long)vstart, order);
 		return -ENOMEM;
+	}
 
-	set_memory_decrypted((unsigned long)tlb, bytes >> PAGE_SHIFT);
-	swiotlb_init_io_tlb_mem(mem, virt_to_phys(tlb), nslabs, true);
+	set_memory_decrypted((unsigned long)vstart, bytes >> PAGE_SHIFT);
+	swiotlb_init_io_tlb_mem(mem, virt_to_phys(vstart), nslabs, true);
 
 	swiotlb_print_info();
 	return 0;
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 10:56:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 10:56:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281177.479433 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP0BH-0001Wh-BN; Tue, 01 Mar 2022 10:56:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281177.479433; Tue, 01 Mar 2022 10:56:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP0BH-0001WY-7o; Tue, 01 Mar 2022 10:56:35 +0000
Received: by outflank-mailman (input) for mailman id 281177;
 Tue, 01 Mar 2022 10:56:34 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=AA0s=TM=bombadil.srs.infradead.org=BATV+e5026ef6e36407c4b08a+6764+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nP08v-00031b-Ve
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 10:54:10 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id eb4a46bc-994d-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 11:54:09 +0100 (CET)
Received: from [2.53.44.23] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nP08e-00GDJD-Jc; Tue, 01 Mar 2022 10:53:53 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: eb4a46bc-994d-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=uIUvjX3splBhlaQqUgMhp+Ya0yKe0LcWUQ7okBzC2TY=; b=wcER0ODN4QJIKthFie+JZmR/Hy
	VdXf15NeqEWcQimAw7O9Mc2tWWNO381c3L9/sNOZ8czOQ9qgSykaLGehP4Pxw6bEXMjRsETCvcQfw
	a+JFsgZUT62YQcIlY13y/Gjs1OmUlGDLzRVSgleDuZDAa3bWnK7ZVhZGiMeC9jdkDy4XRXsgbE+eN
	R3o60tYwdvKUFIqfmPGh2z+vkPV8MMrAjLIt60roJ4r0p//uJxZxorz2JMMImLUiX8udsAtxR3SIe
	RvrO4/fZeloa2XdrSGHSl6A/DN7WiSOLfD58CF6z+LsUXEvmegPGFNgl/mGiYtsvg92XE4jHDjcGG
	7X4aBMTA==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: [PATCH 10/12] swiotlb: add a SWIOTLB_ANY flag to lift the low memory restriction
Date: Tue,  1 Mar 2022 12:53:09 +0200
Message-Id: <20220301105311.885699-11-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220301105311.885699-1-hch@lst.de>
References: <20220301105311.885699-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

Power SVM wants to allocate a swiotlb buffer that is not restricted to
low memory for the trusted hypervisor scheme.  Consolidate the support
for this into the swiotlb_init interface by adding a new flag.

Signed-off-by: Christoph Hellwig <hch@lst.de>
---
 arch/powerpc/include/asm/svm.h       |  4 ----
 arch/powerpc/include/asm/swiotlb.h   |  1 +
 arch/powerpc/kernel/dma-swiotlb.c    |  1 +
 arch/powerpc/mm/mem.c                |  5 +----
 arch/powerpc/platforms/pseries/svm.c | 26 +-------------------------
 include/linux/swiotlb.h              |  1 +
 kernel/dma/swiotlb.c                 |  9 +++++++--
 7 files changed, 12 insertions(+), 35 deletions(-)

diff --git a/arch/powerpc/include/asm/svm.h b/arch/powerpc/include/asm/svm.h
index 7546402d796af..85580b30aba48 100644
--- a/arch/powerpc/include/asm/svm.h
+++ b/arch/powerpc/include/asm/svm.h
@@ -15,8 +15,6 @@ static inline bool is_secure_guest(void)
 	return mfmsr() & MSR_S;
 }
 
-void __init svm_swiotlb_init(void);
-
 void dtl_cache_ctor(void *addr);
 #define get_dtl_cache_ctor()	(is_secure_guest() ? dtl_cache_ctor : NULL)
 
@@ -27,8 +25,6 @@ static inline bool is_secure_guest(void)
 	return false;
 }
 
-static inline void svm_swiotlb_init(void) {}
-
 #define get_dtl_cache_ctor() NULL
 
 #endif /* CONFIG_PPC_SVM */
diff --git a/arch/powerpc/include/asm/swiotlb.h b/arch/powerpc/include/asm/swiotlb.h
index 3c1a1cd161286..4203b5e0a88ed 100644
--- a/arch/powerpc/include/asm/swiotlb.h
+++ b/arch/powerpc/include/asm/swiotlb.h
@@ -9,6 +9,7 @@
 #include <linux/swiotlb.h>
 
 extern unsigned int ppc_swiotlb_enable;
+extern unsigned int ppc_swiotlb_flags;
 
 #ifdef CONFIG_SWIOTLB
 void swiotlb_detect_4g(void);
diff --git a/arch/powerpc/kernel/dma-swiotlb.c b/arch/powerpc/kernel/dma-swiotlb.c
index fc7816126a401..ba256c37bcc0f 100644
--- a/arch/powerpc/kernel/dma-swiotlb.c
+++ b/arch/powerpc/kernel/dma-swiotlb.c
@@ -10,6 +10,7 @@
 #include <asm/swiotlb.h>
 
 unsigned int ppc_swiotlb_enable;
+unsigned int ppc_swiotlb_flags;
 
 void __init swiotlb_detect_4g(void)
 {
diff --git a/arch/powerpc/mm/mem.c b/arch/powerpc/mm/mem.c
index e1519e2edc656..a4d65418c30a9 100644
--- a/arch/powerpc/mm/mem.c
+++ b/arch/powerpc/mm/mem.c
@@ -249,10 +249,7 @@ void __init mem_init(void)
 	 * back to to-down.
 	 */
 	memblock_set_bottom_up(true);
-	if (is_secure_guest())
-		svm_swiotlb_init();
-	else
-		swiotlb_init(ppc_swiotlb_enable, 0);
+	swiotlb_init(ppc_swiotlb_enable, ppc_swiotlb_flags);
 #endif
 
 	high_memory = (void *) __va(max_low_pfn * PAGE_SIZE);
diff --git a/arch/powerpc/platforms/pseries/svm.c b/arch/powerpc/platforms/pseries/svm.c
index c5228f4969eb2..3b4045d508ec8 100644
--- a/arch/powerpc/platforms/pseries/svm.c
+++ b/arch/powerpc/platforms/pseries/svm.c
@@ -28,7 +28,7 @@ static int __init init_svm(void)
 	 * need to use the SWIOTLB buffer for DMA even if dma_capable() says
 	 * otherwise.
 	 */
-	swiotlb_force = SWIOTLB_FORCE;
+	ppc_swiotlb_flags |= SWIOTLB_ANY | SWIOTLB_FORCE;
 
 	/* Share the SWIOTLB buffer with the host. */
 	swiotlb_update_mem_attributes();
@@ -37,30 +37,6 @@ static int __init init_svm(void)
 }
 machine_early_initcall(pseries, init_svm);
 
-/*
- * Initialize SWIOTLB. Essentially the same as swiotlb_init(), except that it
- * can allocate the buffer anywhere in memory. Since the hypervisor doesn't have
- * any addressing limitation, we don't need to allocate it in low addresses.
- */
-void __init svm_swiotlb_init(void)
-{
-	unsigned char *vstart;
-	unsigned long bytes, io_tlb_nslabs;
-
-	io_tlb_nslabs = (swiotlb_size_or_default() >> IO_TLB_SHIFT);
-	io_tlb_nslabs = ALIGN(io_tlb_nslabs, IO_TLB_SEGSIZE);
-
-	bytes = io_tlb_nslabs << IO_TLB_SHIFT;
-
-	vstart = memblock_alloc(PAGE_ALIGN(bytes), PAGE_SIZE);
-	if (vstart && !swiotlb_init_with_tbl(vstart, io_tlb_nslabs, false))
-		return;
-
-
-	memblock_free(vstart, PAGE_ALIGN(io_tlb_nslabs << IO_TLB_SHIFT));
-	panic("SVM: Cannot allocate SWIOTLB buffer");
-}
-
 int set_memory_encrypted(unsigned long addr, int numpages)
 {
 	if (!cc_platform_has(CC_ATTR_MEM_ENCRYPT))
diff --git a/include/linux/swiotlb.h b/include/linux/swiotlb.h
index dcecf953f7997..ee655f2e4d28b 100644
--- a/include/linux/swiotlb.h
+++ b/include/linux/swiotlb.h
@@ -15,6 +15,7 @@ struct scatterlist;
 
 #define SWIOTLB_VERBOSE	(1 << 0) /* verbose initialization */
 #define SWIOTLB_FORCE	(1 << 1) /* force bounce buffering */
+#define SWIOTLB_ANY	(1 << 2) /* allow any memory for the buffer */
 
 /*
  * Maximum allowable number of contiguous slabs to map,
diff --git a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c
index 1a40c71c4d51a..77cf73dc20a78 100644
--- a/kernel/dma/swiotlb.c
+++ b/kernel/dma/swiotlb.c
@@ -275,8 +275,13 @@ void __init swiotlb_init(bool addressing_limit, unsigned int flags)
 	if (swiotlb_force_disable)
 		return;
 
-	/* Get IO TLB memory from the low pages */
-	tlb = memblock_alloc_low(bytes, PAGE_SIZE);
+	/*
+	 * By default allocate the bonuce buffer memory from low memory.
+	 */
+	if (flags & SWIOTLB_ANY)
+		tlb = memblock_alloc(bytes, PAGE_SIZE);
+	else
+		tlb = memblock_alloc_low(bytes, PAGE_SIZE);
 	if (!tlb)
 		goto fail;
 	if (swiotlb_init_with_tbl(tlb, default_nslabs, flags))
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 10:56:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 10:56:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281188.479444 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP0BS-00029z-Qh; Tue, 01 Mar 2022 10:56:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281188.479444; Tue, 01 Mar 2022 10:56:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP0BS-00029j-MY; Tue, 01 Mar 2022 10:56:46 +0000
Received: by outflank-mailman (input) for mailman id 281188;
 Tue, 01 Mar 2022 10:56:45 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=AA0s=TM=bombadil.srs.infradead.org=BATV+e5026ef6e36407c4b08a+6764+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nP08r-00031b-O6
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 10:54:05 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id e83bc8dc-994d-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 11:54:04 +0100 (CET)
Received: from [2.53.44.23] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nP08a-00GDFK-PG; Tue, 01 Mar 2022 10:53:49 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e83bc8dc-994d-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=tv39sQgP2xcCr2eTxf5MnKYdYt65NXKD8YiezSmi0SY=; b=AEDmwyiGGA2iTFzY0+1I4wcvpz
	ikxKmDXpdOLqXxg5lLsFNsEJmX2CeSJPceloW3JG/BK3HNBLfPEMjOQmxtJVtmm8A5aGkPz6R+KDD
	WuUMKih85NvwMUSkikVPsaKhY1u4w7ty8o/kw3wYjJu2hRoH1/usg8JjE9CweCGDfmYNIk+WCBp25
	P95HJiLNr+peUUGnWqdF42IObZSihvydS8qt8s8MzwgJe8gg5jLK1YhLOmRn0wkhyz9sXaIxHIurw
	jB0I7a6oqFq79nps497Tqb0H83l3CMVOMPm53vIRa5Fawy/Cb+y4MBRlTwEcCzqCVzQKvGC0Ft4L2
	w7YgoLfQ==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: [PATCH 09/12] swiotlb: make the swiotlb_init interface more useful
Date: Tue,  1 Mar 2022 12:53:08 +0200
Message-Id: <20220301105311.885699-10-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220301105311.885699-1-hch@lst.de>
References: <20220301105311.885699-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

Pass a bool to pass if swiotlb needs to be enabled based on the
addressing needs and replace the verbose argument with a set of
flags, including one to force enable bounce buffering.

Note that this patch removes the possibility to force xen-swiotlb
use using swiotlb=force on the command line on x86 (arm and arm64
never supported that), but this interface will be restored shortly.

Signed-off-by: Christoph Hellwig <hch@lst.de>
---
 arch/arm/mm/init.c                     |  6 +----
 arch/arm64/mm/init.c                   |  6 +----
 arch/ia64/mm/init.c                    |  4 +--
 arch/mips/cavium-octeon/dma-octeon.c   |  2 +-
 arch/mips/loongson64/dma.c             |  2 +-
 arch/mips/sibyte/common/dma.c          |  2 +-
 arch/powerpc/mm/mem.c                  |  3 ++-
 arch/powerpc/platforms/pseries/setup.c |  3 ---
 arch/riscv/mm/init.c                   |  8 +-----
 arch/s390/mm/init.c                    |  3 +--
 arch/x86/kernel/pci-dma.c              | 15 ++++++-----
 drivers/xen/swiotlb-xen.c              |  4 +--
 include/linux/swiotlb.h                | 15 ++++++-----
 include/trace/events/swiotlb.h         | 29 ++++++++-------------
 kernel/dma/swiotlb.c                   | 35 ++++++++++++++------------
 15 files changed, 55 insertions(+), 82 deletions(-)

diff --git a/arch/arm/mm/init.c b/arch/arm/mm/init.c
index 6d0cb0f7bc54b..73f30d278b565 100644
--- a/arch/arm/mm/init.c
+++ b/arch/arm/mm/init.c
@@ -312,11 +312,7 @@ static void __init free_highpages(void)
 void __init mem_init(void)
 {
 #ifdef CONFIG_ARM_LPAE
-	if (swiotlb_force == SWIOTLB_FORCE ||
-	    max_pfn > arm_dma_pfn_limit)
-		swiotlb_init(1);
-	else
-		swiotlb_force = SWIOTLB_NO_FORCE;
+	swiotlb_init(max_pfn > arm_dma_pfn_limit, SWIOTLB_VERBOSE);
 #endif
 
 	set_max_mapnr(pfn_to_page(max_pfn) - mem_map);
diff --git a/arch/arm64/mm/init.c b/arch/arm64/mm/init.c
index db63cc885771a..52102adda3d28 100644
--- a/arch/arm64/mm/init.c
+++ b/arch/arm64/mm/init.c
@@ -373,11 +373,7 @@ void __init bootmem_init(void)
  */
 void __init mem_init(void)
 {
-	if (swiotlb_force == SWIOTLB_FORCE ||
-	    max_pfn > PFN_DOWN(arm64_dma_phys_limit))
-		swiotlb_init(1);
-	else if (!xen_swiotlb_detect())
-		swiotlb_force = SWIOTLB_NO_FORCE;
+	swiotlb_init(max_pfn > PFN_DOWN(arm64_dma_phys_limit), SWIOTLB_VERBOSE);
 
 	/* this will put all unused low memory onto the freelists */
 	memblock_free_all();
diff --git a/arch/ia64/mm/init.c b/arch/ia64/mm/init.c
index 5d165607bf354..3c3e15b22608f 100644
--- a/arch/ia64/mm/init.c
+++ b/arch/ia64/mm/init.c
@@ -437,9 +437,7 @@ mem_init (void)
 		if (iommu_detected)
 			break;
 #endif
-#ifdef CONFIG_SWIOTLB
-		swiotlb_init(1);
-#endif
+		swiotlb_init(true, SWIOTLB_VERBOSE);
 	} while (0);
 
 #ifdef CONFIG_FLATMEM
diff --git a/arch/mips/cavium-octeon/dma-octeon.c b/arch/mips/cavium-octeon/dma-octeon.c
index fb7547e217263..9fbba6a8fa4c5 100644
--- a/arch/mips/cavium-octeon/dma-octeon.c
+++ b/arch/mips/cavium-octeon/dma-octeon.c
@@ -235,5 +235,5 @@ void __init plat_swiotlb_setup(void)
 #endif
 
 	swiotlb_adjust_size(swiotlbsize);
-	swiotlb_init(1);
+	swiotlb_init(true, SWIOTLB_VERBOSE);
 }
diff --git a/arch/mips/loongson64/dma.c b/arch/mips/loongson64/dma.c
index 364f2f27c8723..8220a1bc0db64 100644
--- a/arch/mips/loongson64/dma.c
+++ b/arch/mips/loongson64/dma.c
@@ -24,5 +24,5 @@ phys_addr_t dma_to_phys(struct device *dev, dma_addr_t daddr)
 
 void __init plat_swiotlb_setup(void)
 {
-	swiotlb_init(1);
+	swiotlb_init(true, SWIOTLB_VERBOSE);
 }
diff --git a/arch/mips/sibyte/common/dma.c b/arch/mips/sibyte/common/dma.c
index eb47a94f3583e..c5c2c782aff68 100644
--- a/arch/mips/sibyte/common/dma.c
+++ b/arch/mips/sibyte/common/dma.c
@@ -10,5 +10,5 @@
 
 void __init plat_swiotlb_setup(void)
 {
-	swiotlb_init(1);
+	swiotlb_init(true, SWIOTLB_VERBOSE);
 }
diff --git a/arch/powerpc/mm/mem.c b/arch/powerpc/mm/mem.c
index 8e301cd8925b2..e1519e2edc656 100644
--- a/arch/powerpc/mm/mem.c
+++ b/arch/powerpc/mm/mem.c
@@ -17,6 +17,7 @@
 #include <linux/suspend.h>
 #include <linux/dma-direct.h>
 
+#include <asm/swiotlb.h>
 #include <asm/machdep.h>
 #include <asm/rtas.h>
 #include <asm/kasan.h>
@@ -251,7 +252,7 @@ void __init mem_init(void)
 	if (is_secure_guest())
 		svm_swiotlb_init();
 	else
-		swiotlb_init(0);
+		swiotlb_init(ppc_swiotlb_enable, 0);
 #endif
 
 	high_memory = (void *) __va(max_low_pfn * PAGE_SIZE);
diff --git a/arch/powerpc/platforms/pseries/setup.c b/arch/powerpc/platforms/pseries/setup.c
index 83a04d967a59f..45d637ab58261 100644
--- a/arch/powerpc/platforms/pseries/setup.c
+++ b/arch/powerpc/platforms/pseries/setup.c
@@ -838,9 +838,6 @@ static void __init pSeries_setup_arch(void)
 	}
 
 	ppc_md.pcibios_root_bridge_prepare = pseries_root_bridge_prepare;
-
-	if (swiotlb_force == SWIOTLB_FORCE)
-		ppc_swiotlb_enable = 1;
 }
 
 static void pseries_panic(char *str)
diff --git a/arch/riscv/mm/init.c b/arch/riscv/mm/init.c
index c27294128e182..6cdbb62672fe5 100644
--- a/arch/riscv/mm/init.c
+++ b/arch/riscv/mm/init.c
@@ -118,13 +118,7 @@ void __init mem_init(void)
 	BUG_ON(!mem_map);
 #endif /* CONFIG_FLATMEM */
 
-#ifdef CONFIG_SWIOTLB
-	if (swiotlb_force == SWIOTLB_FORCE ||
-	    max_pfn > PFN_DOWN(dma32_phys_limit))
-		swiotlb_init(1);
-	else
-		swiotlb_force = SWIOTLB_NO_FORCE;
-#endif
+	swiotlb_init(max_pfn > PFN_DOWN(dma32_phys_limit), SWIOTLB_VERBOSE);
 	high_memory = (void *)(__va(PFN_PHYS(max_low_pfn)));
 	memblock_free_all();
 
diff --git a/arch/s390/mm/init.c b/arch/s390/mm/init.c
index 86ffd0d51fd59..6fb6bf64326f9 100644
--- a/arch/s390/mm/init.c
+++ b/arch/s390/mm/init.c
@@ -185,8 +185,7 @@ static void pv_init(void)
 		return;
 
 	/* make sure bounce buffers are shared */
-	swiotlb_force = SWIOTLB_FORCE;
-	swiotlb_init(1);
+	swiotlb_init(true, SWIOTLB_FORCE | SWIOTLB_VERBOSE);
 	swiotlb_update_mem_attributes();
 }
 
diff --git a/arch/x86/kernel/pci-dma.c b/arch/x86/kernel/pci-dma.c
index 7ab7002758396..e0def4b1c3181 100644
--- a/arch/x86/kernel/pci-dma.c
+++ b/arch/x86/kernel/pci-dma.c
@@ -39,6 +39,7 @@ int iommu_detected __read_mostly = 0;
 
 #ifdef CONFIG_SWIOTLB
 bool x86_swiotlb_enable;
+static unsigned int x86_swiotlb_flags;
 
 static void __init pci_swiotlb_detect(void)
 {
@@ -57,16 +58,16 @@ static void __init pci_swiotlb_detect(void)
 	 * Guest with guest memory encryption must always do I/O through a
 	 * bounce buffer as the hypervisor can't access arbitrary VM memory.
 	 */
-	if (cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT))
-		swiotlb_force = SWIOTLB_FORCE;
-
-	if (swiotlb_force == SWIOTLB_FORCE)
+	if (cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT)) {
 		x86_swiotlb_enable = true;
+		x86_swiotlb_flags |= SWIOTLB_FORCE;
+	}
 }
 #else
 static inline void __init pci_swiotlb_detect(void)
 {
 }
+#define x86_swiotlb_flags 0
 #endif /* CONFIG_SWIOTLB */
 
 #ifdef CONFIG_SWIOTLB_XEN
@@ -74,8 +75,7 @@ static bool xen_swiotlb;
 
 static void __init pci_xen_swiotlb_init(void)
 {
-	if (!xen_initial_domain() && !x86_swiotlb_enable &&
-	    swiotlb_force != SWIOTLB_FORCE)
+	if (!xen_initial_domain() && !x86_swiotlb_enable)
 		return;
 	x86_swiotlb_enable = false;
 	xen_swiotlb = true;
@@ -119,8 +119,7 @@ void __init pci_iommu_alloc(void)
 	gart_iommu_hole_init();
 	amd_iommu_detect();
 	detect_intel_iommu();
-	if (x86_swiotlb_enable)
-		swiotlb_init(0);
+	swiotlb_init(x86_swiotlb_enable, x86_swiotlb_flags);
 }
 
 /*
diff --git a/drivers/xen/swiotlb-xen.c b/drivers/xen/swiotlb-xen.c
index 485cd06ed39e7..c2da3eb4826e8 100644
--- a/drivers/xen/swiotlb-xen.c
+++ b/drivers/xen/swiotlb-xen.c
@@ -251,7 +251,7 @@ void __init xen_swiotlb_init_early(void)
 		panic("%s (rc:%d)", xen_swiotlb_error(XEN_SWIOTLB_EFIXUP), rc);
 	}
 
-	if (swiotlb_init_with_tbl(start, nslabs, true))
+	if (swiotlb_init_with_tbl(start, nslabs, SWIOTLB_VERBOSE))
 		panic("Cannot allocate SWIOTLB buffer");
 }
 #endif /* CONFIG_X86 */
@@ -376,7 +376,7 @@ static dma_addr_t xen_swiotlb_map_page(struct device *dev, struct page *page,
 	/*
 	 * Oh well, have to allocate and map a bounce buffer.
 	 */
-	trace_swiotlb_bounced(dev, dev_addr, size, swiotlb_force);
+	trace_swiotlb_bounced(dev, dev_addr, size);
 
 	map = swiotlb_tbl_map_single(dev, phys, size, size, 0, dir, attrs);
 	if (map == (phys_addr_t)DMA_MAPPING_ERROR)
diff --git a/include/linux/swiotlb.h b/include/linux/swiotlb.h
index 1befd6b2ccf5e..dcecf953f7997 100644
--- a/include/linux/swiotlb.h
+++ b/include/linux/swiotlb.h
@@ -13,11 +13,8 @@ struct device;
 struct page;
 struct scatterlist;
 
-enum swiotlb_force {
-	SWIOTLB_NORMAL,		/* Default - depending on HW DMA mask etc. */
-	SWIOTLB_FORCE,		/* swiotlb=force */
-	SWIOTLB_NO_FORCE,	/* swiotlb=noforce */
-};
+#define SWIOTLB_VERBOSE	(1 << 0) /* verbose initialization */
+#define SWIOTLB_FORCE	(1 << 1) /* force bounce buffering */
 
 /*
  * Maximum allowable number of contiguous slabs to map,
@@ -36,8 +33,7 @@ enum swiotlb_force {
 /* default to 64MB */
 #define IO_TLB_DEFAULT_SIZE (64UL<<20)
 
-extern void swiotlb_init(int verbose);
-int swiotlb_init_with_tbl(char *tlb, unsigned long nslabs, int verbose);
+int swiotlb_init_with_tbl(char *tlb, unsigned long nslabs, unsigned int flags);
 unsigned long swiotlb_size_or_default(void);
 extern int swiotlb_late_init_with_tbl(char *tlb, unsigned long nslabs);
 int swiotlb_init_late(size_t size, gfp_t gfp_mask);
@@ -126,13 +122,16 @@ static inline bool is_swiotlb_force_bounce(struct device *dev)
 	return mem && mem->force_bounce;
 }
 
+void swiotlb_init(bool addressing_limited, unsigned int flags);
 void __init swiotlb_exit(void);
 unsigned int swiotlb_max_segment(void);
 size_t swiotlb_max_mapping_size(struct device *dev);
 bool is_swiotlb_active(struct device *dev);
 void __init swiotlb_adjust_size(unsigned long size);
 #else
-#define swiotlb_force SWIOTLB_NO_FORCE
+static inline void swiotlb_init(bool addressing_limited, unsigned int flags)
+{
+}
 static inline bool is_swiotlb_buffer(struct device *dev, phys_addr_t paddr)
 {
 	return false;
diff --git a/include/trace/events/swiotlb.h b/include/trace/events/swiotlb.h
index 705be43b71ab0..da05c9ebd224a 100644
--- a/include/trace/events/swiotlb.h
+++ b/include/trace/events/swiotlb.h
@@ -8,20 +8,15 @@
 #include <linux/tracepoint.h>
 
 TRACE_EVENT(swiotlb_bounced,
-
-	TP_PROTO(struct device *dev,
-		 dma_addr_t dev_addr,
-		 size_t size,
-		 enum swiotlb_force swiotlb_force),
-
-	TP_ARGS(dev, dev_addr, size, swiotlb_force),
+	TP_PROTO(struct device *dev, dma_addr_t dev_addr, size_t size),
+	TP_ARGS(dev, dev_addr, size),
 
 	TP_STRUCT__entry(
-		__string(	dev_name,	dev_name(dev)		)
-		__field(	u64,	dma_mask			)
-		__field(	dma_addr_t,	dev_addr		)
-		__field(	size_t,	size				)
-		__field(	enum swiotlb_force,	swiotlb_force	)
+		__string(dev_name, dev_name(dev))
+		__field(u64, dma_mask)
+		__field(dma_addr_t, dev_addr)
+		__field(size_t, size)
+		__field(bool, force)
 	),
 
 	TP_fast_assign(
@@ -29,19 +24,15 @@ TRACE_EVENT(swiotlb_bounced,
 		__entry->dma_mask = (dev->dma_mask ? *dev->dma_mask : 0);
 		__entry->dev_addr = dev_addr;
 		__entry->size = size;
-		__entry->swiotlb_force = swiotlb_force;
+		__entry->force = is_swiotlb_force_bounce(dev);
 	),
 
-	TP_printk("dev_name: %s dma_mask=%llx dev_addr=%llx "
-		"size=%zu %s",
+	TP_printk("dev_name: %s dma_mask=%llx dev_addr=%llx size=%zu %s",
 		__get_str(dev_name),
 		__entry->dma_mask,
 		(unsigned long long)__entry->dev_addr,
 		__entry->size,
-		__print_symbolic(__entry->swiotlb_force,
-			{ SWIOTLB_NORMAL,	"NORMAL" },
-			{ SWIOTLB_FORCE,	"FORCE" },
-			{ SWIOTLB_NO_FORCE,	"NO_FORCE" }))
+		__entry->force ? "FORCE" : "NORMAL")
 );
 
 #endif /*  _TRACE_SWIOTLB_H */
diff --git a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c
index 9a38ea3a46e9f..1a40c71c4d51a 100644
--- a/kernel/dma/swiotlb.c
+++ b/kernel/dma/swiotlb.c
@@ -69,7 +69,8 @@
 
 #define INVALID_PHYS_ADDR (~(phys_addr_t)0)
 
-enum swiotlb_force swiotlb_force;
+static bool swiotlb_force_bounce;
+static bool swiotlb_force_disable;
 
 struct io_tlb_mem io_tlb_default_mem;
 
@@ -88,9 +89,9 @@ setup_io_tlb_npages(char *str)
 	if (*str == ',')
 		++str;
 	if (!strcmp(str, "force"))
-		swiotlb_force = SWIOTLB_FORCE;
+		swiotlb_force_bounce = true;
 	else if (!strcmp(str, "noforce"))
-		swiotlb_force = SWIOTLB_NO_FORCE;
+		swiotlb_force_disable = true;
 
 	return 0;
 }
@@ -211,7 +212,7 @@ static void swiotlb_init_io_tlb_mem(struct io_tlb_mem *mem, phys_addr_t start,
 	mem->index = 0;
 	mem->late_alloc = late_alloc;
 
-	if (swiotlb_force == SWIOTLB_FORCE)
+	if (swiotlb_force_bounce)
 		mem->force_bounce = true;
 
 	spin_lock_init(&mem->lock);
@@ -233,12 +234,13 @@ static void swiotlb_init_io_tlb_mem(struct io_tlb_mem *mem, phys_addr_t start,
 	return;
 }
 
-int __init swiotlb_init_with_tbl(char *tlb, unsigned long nslabs, int verbose)
+int __init swiotlb_init_with_tbl(char *tlb, unsigned long nslabs,
+		unsigned int flags)
 {
 	struct io_tlb_mem *mem = &io_tlb_default_mem;
 	size_t alloc_size;
 
-	if (swiotlb_force == SWIOTLB_NO_FORCE)
+	if (swiotlb_force_disable)
 		return 0;
 
 	/* protect against double initialization */
@@ -252,8 +254,9 @@ int __init swiotlb_init_with_tbl(char *tlb, unsigned long nslabs, int verbose)
 		      __func__, alloc_size, PAGE_SIZE);
 
 	swiotlb_init_io_tlb_mem(mem, __pa(tlb), nslabs, false);
+	mem->force_bounce = flags & SWIOTLB_FORCE;
 
-	if (verbose)
+	if (flags & SWIOTLB_VERBOSE)
 		swiotlb_print_info();
 	return 0;
 }
@@ -262,20 +265,21 @@ int __init swiotlb_init_with_tbl(char *tlb, unsigned long nslabs, int verbose)
  * Statically reserve bounce buffer space and initialize bounce buffer data
  * structures for the software IO TLB used to implement the DMA API.
  */
-void  __init
-swiotlb_init(int verbose)
+void __init swiotlb_init(bool addressing_limit, unsigned int flags)
 {
 	size_t bytes = PAGE_ALIGN(default_nslabs << IO_TLB_SHIFT);
 	void *tlb;
 
-	if (swiotlb_force == SWIOTLB_NO_FORCE)
+	if (!addressing_limit && !swiotlb_force_bounce)
+		return;
+	if (swiotlb_force_disable)
 		return;
 
 	/* Get IO TLB memory from the low pages */
 	tlb = memblock_alloc_low(bytes, PAGE_SIZE);
 	if (!tlb)
 		goto fail;
-	if (swiotlb_init_with_tbl(tlb, default_nslabs, verbose))
+	if (swiotlb_init_with_tbl(tlb, default_nslabs, flags))
 		goto fail_free_mem;
 	return;
 
@@ -298,7 +302,7 @@ int swiotlb_init_late(size_t size, gfp_t gfp_mask)
 	unsigned int order;
 	int rc = 0;
 
-	if (swiotlb_force == SWIOTLB_NO_FORCE)
+	if (swiotlb_force_disable)
 		return 0;
 
 	/*
@@ -337,7 +341,7 @@ swiotlb_late_init_with_tbl(char *tlb, unsigned long nslabs)
 	struct io_tlb_mem *mem = &io_tlb_default_mem;
 	unsigned long bytes = nslabs << IO_TLB_SHIFT;
 
-	if (swiotlb_force == SWIOTLB_NO_FORCE)
+	if (swiotlb_force_disable)
 		return 0;
 
 	/* protect against double initialization */
@@ -362,7 +366,7 @@ void __init swiotlb_exit(void)
 	unsigned long tbl_vaddr;
 	size_t tbl_size, slots_size;
 
-	if (swiotlb_force == SWIOTLB_FORCE)
+	if (swiotlb_force_bounce)
 		return;
 
 	if (!mem->nslabs)
@@ -709,8 +713,7 @@ dma_addr_t swiotlb_map(struct device *dev, phys_addr_t paddr, size_t size,
 	phys_addr_t swiotlb_addr;
 	dma_addr_t dma_addr;
 
-	trace_swiotlb_bounced(dev, phys_to_dma(dev, paddr), size,
-			      swiotlb_force);
+	trace_swiotlb_bounced(dev, phys_to_dma(dev, paddr), size);
 
 	swiotlb_addr = swiotlb_tbl_map_single(dev, paddr, size, size, 0, dir,
 			attrs);
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 11:00:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 11:00:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281215.479455 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP0FJ-00042i-DN; Tue, 01 Mar 2022 11:00:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281215.479455; Tue, 01 Mar 2022 11:00:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP0FJ-00042b-AA; Tue, 01 Mar 2022 11:00:45 +0000
Received: by outflank-mailman (input) for mailman id 281215;
 Tue, 01 Mar 2022 11:00:44 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP0FI-00042R-HJ; Tue, 01 Mar 2022 11:00:44 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP0FI-0004aB-Em; Tue, 01 Mar 2022 11:00:44 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP0FI-0006Qp-85; Tue, 01 Mar 2022 11:00:44 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nP0FI-0003a7-7c; Tue, 01 Mar 2022 11:00:44 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=1tPSRtla2HNo/dMwWILBXhwXRqh2zbySNUV/S+vnH84=; b=OY5djjxYOpGibLn9kq2f7nch5f
	qTSCzeySpGVZBMybIlOMR8f2WgoJFaMdhBC4GfpqxnZQ/8bMCgJhVAqwQL4TMA7dO/RzJl1iAe6Ch
	tvc05dXUDvW6I8icGwCsQJzkerccJvPdjZZ/dokUN+Lyu55fFuAtnebDKwqX31gKaEso=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168285-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168285: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=497ac7b6d7f9750f48f137db244931a5728b1968
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 01 Mar 2022 11:00:44 +0000

flight 168285 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168285/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 497ac7b6d7f9750f48f137db244931a5728b1968
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    1 days
Failing since        168258  2022-03-01 01:55:31 Z    0 days    5 attempts
Testing same since   168262  2022-03-01 04:10:26 Z    0 days    4 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 11:04:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 11:04:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281226.479466 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP0JF-0004f5-VZ; Tue, 01 Mar 2022 11:04:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281226.479466; Tue, 01 Mar 2022 11:04:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP0JF-0004ey-Rq; Tue, 01 Mar 2022 11:04:49 +0000
Received: by outflank-mailman (input) for mailman id 281226;
 Tue, 01 Mar 2022 11:04:48 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP0JE-0004eo-TD; Tue, 01 Mar 2022 11:04:48 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP0JE-0004dl-Ra; Tue, 01 Mar 2022 11:04:48 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP0JE-0006XM-Hk; Tue, 01 Mar 2022 11:04:48 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nP0JE-0004kI-HH; Tue, 01 Mar 2022 11:04:48 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Message-Id:Subject:To;
	bh=l/adDxeD0dH0TRHRSZeSm8RyLGHP5BocljlgYl/tvA8=; b=Rho9+iEZzLbBgXH1mIypedGGrT
	IQkTA7+TlwafXwEwARy7hqQp1qDAFPA+xVv2e3ZfM3ywck3MxE6goULccHePMSAeZMjCkZZ81wPui
	zp1gX40w09zSZqp8f/S4RSkKBqwhA3EUGrJQhsbNOwzKP0DWNFTIisUCWccSDzOyly1Y=;
To: xen-devel@lists.xenproject.org
Subject: [ovmf bisection] complete build-amd64
Message-Id: <E1nP0JE-0004kI-HH@osstest.test-lab.xenproject.org>
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 01 Mar 2022 11:04:48 +0000

branch xen-unstable
xenbranch xen-unstable
job build-amd64
testid xen-build

Tree: ovmf https://github.com/tianocore/edk2.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: seabios git://xenbits.xen.org/osstest/seabios.git
Tree: xen git://xenbits.xen.org/xen.git

*** Found and reproduced problem changeset ***

  Bug is in tree:  ovmf https://github.com/tianocore/edk2.git
  Bug introduced:  d3febfd9ade35dc552df6b3607c2b15d26b82867
  Bug not present: 84338c0d498555f860a480693ee8647a1795fba3
  Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/168287/


  commit d3febfd9ade35dc552df6b3607c2b15d26b82867
  Author: Jason <yun.lou@intel.com>
  Date:   Mon Jan 10 21:46:27 2022 +0800
  
      MdePkg: Replace Opcode with the corresponding instructions.
      
      REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
      
      Replace Opcode with the corresponding instructions.
      The code changes have been verified with CompareBuild.py tool, which
      can be used to compare the results of two different EDK II builds to
      determine if they generate the same binaries.
      (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
      
      Signed-off-by: Jason Lou <yun.lou@intel.com>
      Cc: Michael D Kinney <michael.d.kinney@intel.com>
      Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
      Cc: Zhiguang Liu <zhiguang.liu@intel.com>


For bisection revision-tuple graph see:
   http://logs.test-lab.xenproject.org/osstest/results/bisect/ovmf/build-amd64.xen-build.html
Revision IDs in each graph node refer, respectively, to the Trees above.

----------------------------------------
Running cs-bisection-step --graph-out=/home/logs/results/bisect/ovmf/build-amd64.xen-build --summary-out=tmp/168287.bisection-summary --basis-template=168254 --blessings=real,real-bisect,real-retry ovmf build-amd64 xen-build
Searching for failure / basis pass:
 168285 fail [host=himrod1] / 168254 [host=himrod2] 168249 [host=himrod2] 168232 ok.
Failure / basis pass flights: 168285 / 168232
(tree with no url: minios)
Tree: ovmf https://github.com/tianocore/edk2.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: seabios git://xenbits.xen.org/osstest/seabios.git
Tree: xen git://xenbits.xen.org/xen.git
Latest 497ac7b6d7f9750f48f137db244931a5728b1968 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
Basis pass 54cddc3ad4b3a317985ce5f491f9b1f31ab10dd8 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 9ba4c529985a1773852069889a5b53f2ed26c408
Generating revisions with ./adhoc-revtuple-generator  https://github.com/tianocore/edk2.git#54cddc3ad4b3a317985ce5f491f9b1f31ab10dd8-497ac7b6d7f9750f48f137db244931a5728b1968 git://xenbits.xen.org/qemu-xen-traditional.git#3d273dd05e51e5a1ffba3d98c7437ee84e8f8764-3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 git://xenbits.xen.org/qemu-xen.git#a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42-a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 git://xenbits.xen.org/osstest/seabios.git#829b0f1a7cda1bccdf44a379fb3a96e519a7e8\
 cd-829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd git://xenbits.xen.org/xen.git#9ba4c529985a1773852069889a5b53f2ed26c408-4388144c44c4dd9e9b7df97938ef08ffa85eec07
Loaded 10001 nodes in revision graph
Searching for test results:
 168232 pass 54cddc3ad4b3a317985ce5f491f9b1f31ab10dd8 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 9ba4c529985a1773852069889a5b53f2ed26c408
 168249 [host=himrod2]
 168254 [host=himrod2]
 168258 fail 6a890db161cd6d378bec3499a1e774db3f5a27a7 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168262 fail 497ac7b6d7f9750f48f137db244931a5728b1968 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168267 fail 497ac7b6d7f9750f48f137db244931a5728b1968 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168275 pass 54cddc3ad4b3a317985ce5f491f9b1f31ab10dd8 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 9ba4c529985a1773852069889a5b53f2ed26c408
 168276 fail 497ac7b6d7f9750f48f137db244931a5728b1968 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168277 pass 54cddc3ad4b3a317985ce5f491f9b1f31ab10dd8 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 1449f6873d7dd477ba110b415ca08a3c2553451e
 168278 pass de463163d9f6d3c5dc6b55ff35d1e5676e0e1b9f 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168279 pass 84338c0d498555f860a480693ee8647a1795fba3 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168280 fail 7bc8b1d9f412507d579f21ea9af56fced81e7827 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168281 fail d3febfd9ade35dc552df6b3607c2b15d26b82867 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168282 pass 84338c0d498555f860a480693ee8647a1795fba3 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168271 fail 497ac7b6d7f9750f48f137db244931a5728b1968 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168284 fail d3febfd9ade35dc552df6b3607c2b15d26b82867 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168286 pass 84338c0d498555f860a480693ee8647a1795fba3 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168285 fail 497ac7b6d7f9750f48f137db244931a5728b1968 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168287 fail d3febfd9ade35dc552df6b3607c2b15d26b82867 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
Searching for interesting versions
 Result found: flight 168232 (pass), for basis pass
 For basis failure, parent search stopping at 84338c0d498555f860a480693ee8647a1795fba3 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07, results HASH(0x555f15b711c8) HASH(0x555f15b78d90) HASH(0x555f15b7d9c8) For basis failure, parent search stopping at de463163d9f6d3c5dc6b55ff35d1e5676e0e1b9f 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7\
 cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07, results HASH(0x555f15b6f1c0) For basis failure, parent search stopping at 54cddc3ad4b3a317985ce5f491f9b1f31ab10dd8 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 1449f6873d7dd477ba110b415ca08a3c2553451e, results HASH(0x555f15b6e8c0) For basis failure, parent search stopping at 54cddc3ad4b3a317985ce5f491f9b1f31ab10dd8 3d273dd05e51e5a1ffba3d98c7437ee\
 84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 9ba4c529985a1773852069889a5b53f2ed26c408, results HASH(0x555f15b5ff38) HASH(0x555f15b6a888) Result found: flight 168258 (fail), for basis failure (at ancestor ~5258)
 Repro found: flight 168275 (pass), for basis pass
 Repro found: flight 168276 (fail), for basis failure
 0 revisions at 84338c0d498555f860a480693ee8647a1795fba3 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
No revisions left to test, checking graph state.
 Result found: flight 168279 (pass), for last pass
 Result found: flight 168281 (fail), for first failure
 Repro found: flight 168282 (pass), for last pass
 Repro found: flight 168284 (fail), for first failure
 Repro found: flight 168286 (pass), for last pass
 Repro found: flight 168287 (fail), for first failure

*** Found and reproduced problem changeset ***

  Bug is in tree:  ovmf https://github.com/tianocore/edk2.git
  Bug introduced:  d3febfd9ade35dc552df6b3607c2b15d26b82867
  Bug not present: 84338c0d498555f860a480693ee8647a1795fba3
  Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/168287/


  commit d3febfd9ade35dc552df6b3607c2b15d26b82867
  Author: Jason <yun.lou@intel.com>
  Date:   Mon Jan 10 21:46:27 2022 +0800
  
      MdePkg: Replace Opcode with the corresponding instructions.
      
      REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
      
      Replace Opcode with the corresponding instructions.
      The code changes have been verified with CompareBuild.py tool, which
      can be used to compare the results of two different EDK II builds to
      determine if they generate the same binaries.
      (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
      
      Signed-off-by: Jason Lou <yun.lou@intel.com>
      Cc: Michael D Kinney <michael.d.kinney@intel.com>
      Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
      Cc: Zhiguang Liu <zhiguang.liu@intel.com>

Revision graph left in /home/logs/results/bisect/ovmf/build-amd64.xen-build.{dot,ps,png,html,svg}.
----------------------------------------
168287: tolerable ALL FAIL

flight 168287 ovmf real-bisect [real]
http://logs.test-lab.xenproject.org/osstest/logs/168287/

Failures :-/ but no regressions.

Tests which did not succeed,
including tests which could not be run:
 build-amd64                   6 xen-build               fail baseline untested


jobs:
 build-amd64                                                  fail    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 11:04:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 11:04:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281229.479476 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP0JO-0004yx-Bp; Tue, 01 Mar 2022 11:04:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281229.479476; Tue, 01 Mar 2022 11:04:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP0JO-0004yq-8j; Tue, 01 Mar 2022 11:04:58 +0000
Received: by outflank-mailman (input) for mailman id 281229;
 Tue, 01 Mar 2022 11:04:56 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nP0JM-0004xb-EC
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 11:04:56 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 6ce38020-994f-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 12:04:55 +0100 (CET)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur02lp2052.outbound.protection.outlook.com [104.47.4.52]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-39-Kxb7z4QqOLeCEz0IxItOeA-1; Tue, 01 Mar 2022 12:04:54 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PAXPR04MB8095.eurprd04.prod.outlook.com (2603:10a6:102:1c6::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Tue, 1 Mar
 2022 11:04:52 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 11:04:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6ce38020-994f-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646132694;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=XRCBJrGYHuXcM+y+uvLEjkirCD2EFtAu6W00DFjZ3Qk=;
	b=TUbTPjzQd7DSgQvC4VjOaDkIsxeZbpW4/ckXiAm0Hs2s5B0pEwdWrwXJaMj/WxTDMBMoAy
	KkRsI/wBvWtkOh8GRUDVP9JrQyc3pKjU6HdKeS/KsD4b75nPpSOBs3u0urZeCNF8Oq5yUs
	4DbzspLVnwJjJ6yGH8vLiTR0l8sq82A=
X-MC-Unique: Kxb7z4QqOLeCEz0IxItOeA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=QQivutYdrsDao/cXCJYj0xzU9uqphpwdvzyw7Rk580tP4/Lwjae1DOrvZ6lbrW39d/kah1JOgzBDdFNlXn+xByUMjzAEdArysqqs4j8jR14aG7X5PLoVVa9qgF4J3IAsmGe0EzOe7Ztcq9kPeuj8+gYc25jM8rPTamkbg595a9/BK2osRWgArNbod64V/oLnk7+di7kcpY9AgyINNuXs7p5yoD+l6+o5k/ZSovcwnct4dyZ2hxjpdhjrq2VR2a6KqgBMx9mYMdMCY3tThV7zl6HKOtydg2ZcpZRaPpaoNVXZOl7ErUdu6ZpcRsMEuZ3/IIJscx5+w7zInNQVCTvqhA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=XRCBJrGYHuXcM+y+uvLEjkirCD2EFtAu6W00DFjZ3Qk=;
 b=aFNelPHfz6BeSv/p1DGkw4NFzILwu9mlJZL66i4iZvUt5h1VWRGZAM+6TLOeRiB4PWVeO0K+k/6HUn65egh1VtOheAwXylT6S8mOBQm+gcEAjXMPJDHlgCIc0GAv/kNfZMJCTvmxpVejSOuywoKxGPW6YnPa1jvbc/4JRcSu2BgXuINNKWiZLtrQV8PxsXvAw0T/vyZQXjcLRYD/mTBFmH+Ot4rhjYLPdW9WkX05eBpFi3da7ddHi0D7bTV71LSQ39PyUX7dVLvowUgZjKg4299Dqe1TdLAFO8sowC792+0129F3MRNBgSl3kURYb8qP5bnejioRcTj+55CZHmuPmg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <77675e7f-2a7e-f517-4aba-e20774c8bfe5@suse.com>
Date: Tue, 1 Mar 2022 12:04:50 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Content-Language: en-US
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH 0/2] x86/time: CF-clobber annotations
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR06CA0276.eurprd06.prod.outlook.com
 (2603:10a6:20b:45a::34) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f6b32ab1-00d8-4c09-c005-08d9fb734f70
X-MS-TrafficTypeDiagnostic: PAXPR04MB8095:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB80959D4B1A63F0BDD2C4CA0CB3029@PAXPR04MB8095.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(5660300002)(558084003)(31696002)(86362001)(6512007)(66476007)(66556008)(8936002)(316002)(38100700002)(4326008)(6916009)(54906003)(66946007)(508600001)(6486002)(8676002)(2906002)(2616005)(186003)(31686004)(26005)(6506007)(36756003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?OE8xZXY2SEZGYnRQclhkblUzeGJjbVJhYlRnczljdDRtV0JQUHRlbHVURzRW?=
 =?utf-8?B?UnRNR1Vkc3hEVVVYSVhmcDhmS241elVqQ3B5ZmRzdlYrYUlORWJCRFJIRTV0?=
 =?utf-8?B?Z3Q5UHp6Kzl0SkVGc3phakVCMFRaMVhXdStNU0tQemh2ME9UVDhjdStOc3lY?=
 =?utf-8?B?S1JkV2lIU0ZKUC9RTzc3QjBWUUZPNWlsajVxc3lZQmJZd2p0bWZ5d21YZ213?=
 =?utf-8?B?bzI0ZmtwQ1FtekhNTXRpOExSYm9qdVNDUDh3cjVXK3BaUVdOSVc3S3lXQ2Z0?=
 =?utf-8?B?NDR6WjFPT3J3aUpNenhuZGpaNEZKU3RWWmNSa08rR3I2MHdUUmJVWjEyZWEy?=
 =?utf-8?B?OUZISFpzUTlWU2pEcHk0MFV3SkcxWkxhQm8zOGRoVUFSeTJkRUtIYlJ3V2hF?=
 =?utf-8?B?ZG9DK0pHM2diWWVibmczUnRYU2wrY0xBaXdoN0ZuSEtMenFsWGRTa3ErREsy?=
 =?utf-8?B?RXd5QTk3d25PSis5U1pLRHNuMEVGL1pEK1h3TVo1S0c0RXdBUzVrNHBGZXc2?=
 =?utf-8?B?QXBVTkVKT1ZxQklIOC9mVk1ORHc2dGVtaW5KSHpoTUlIN202ZlczWTNkeE9U?=
 =?utf-8?B?dUhkTG9XRlAzOUZxVzFqZjYrakhzL2FMNzdvbm9YWmtEUmw1dkUrdlp0eGgz?=
 =?utf-8?B?OVZoRDZyN1dlcVRVMlhIZ21TUlFFZ3I3SHFYLy85RFBObDhUbkpwT0Q5K1Ro?=
 =?utf-8?B?c2NLRDdjYlNvbG9samMrdjZTYlZ2UzhMWXllZ3gxYzhaTWZXbmxzN1NCb2Y5?=
 =?utf-8?B?a1pLc1liNDVhKzNma1VYZnFZWTNNeWk3S0NzVklDY1oxQSsxbU5kYzRTYzYx?=
 =?utf-8?B?WklDc1ZEbWxiLzBTT1krd0lMRTN1NEc5TlRBdVlnZFlSTG0xakQ2Q0lOc2lX?=
 =?utf-8?B?cG5PNkFPVzdHVGNycnQvenp2N0xyZ001dGVrYUVsUG5zaWh6cnBJVG5HNUN5?=
 =?utf-8?B?VHJWSzFFNmRuV1lYWU9yakxVQk1FVG45VXlFdnlLVUxsUkJYMU5nL2JRdXhQ?=
 =?utf-8?B?VXF5SWllQkxQQmNrSHlzNCtWN2lyUWpGN1g5YXBhdFk0Mi9CdmV2dGRVMFZO?=
 =?utf-8?B?TUxLWkFDenhsSnFZak85Wk9qdG1qZ09IVDg5ZENPSC9UcW1YZ2gvUzhidEhu?=
 =?utf-8?B?SHVyVkJWdDZuY2gxTXptb3FCYWRSRFE0MG95aHVjTFFML0JXS0ZRZlRMSFRL?=
 =?utf-8?B?L0cycnZCMFR2aGdlRFIveWVaRlhJWkg4Rzk5K1Z6NkMrSkh4cHI4aU4xR1ZO?=
 =?utf-8?B?TGpQNnBCOTBmL3hXRmdzM2c2R01CaGVkemxnRmtDMCt5eEdlZW5YSXV3Zlpn?=
 =?utf-8?B?b1VoYlRCTWplNFlWa0thQXdzOUZwdUtBSkNjWGcrUmpQSEFmbTRpRXRyUzRF?=
 =?utf-8?B?a1hYODR4N3VXZ1lINzA0WUp0TEhzRTUwMWFrRmJjNVQ5YS9BWnBnQnVPZmly?=
 =?utf-8?B?bTZHMFQ1UmdlVlRFNlJ3MEdjMk5wNDZSK1dOQjZOcFZDbksyNmttRDFFdVBr?=
 =?utf-8?B?bkU0enI2SUtnTzFmazBPY3gzcG1jTlYrNnJDZmtPRVRlOUY2ZnFEQU5oQktv?=
 =?utf-8?B?MUdzQXNzNnJhOWwzUjJJSE12enZabEFjSUJRdFlkNGc4Zngwc2dTcktzYitB?=
 =?utf-8?B?YjRjUzJCUmMrMVNiZjg0NHp0b0Vwa3R1NVZrby9QUXpjK2Z5QiszTXJOMGV2?=
 =?utf-8?B?VjA2cW5kbXJybk1sTjFQNjBsWDRNUkdmeDhOTHdrL0NHenlRejFwTGJ0dWl6?=
 =?utf-8?B?NGlPM29jVTl4UEw0YW5UblFzeTYrLytzQ1lsSGd3UzJFN2U0cWNLK1l5VWlE?=
 =?utf-8?B?SXgybll3T0ZkSm1tcFJoaktxbGVlSDBtMm9QaW5wTzJaeGcyQlVpUm90b0cr?=
 =?utf-8?B?SlUyZEN2ZmFmNVR3UXJJZWt0L01aeTFRVUxxM0JXa1dmRnE4Q3h5NUNqdWRp?=
 =?utf-8?B?cHdsT1ZJeXhoZ2xnWmJadE80Z3E4NmhKQjN5M2pKY1ltcHk4V3AvTWdNYTlm?=
 =?utf-8?B?WlU0eXI4Z0p3L3pFM3lNc1gxdE5hOUFjdFBITk1XcVkwajFZTUllTFVhRDRl?=
 =?utf-8?B?WXgwWDBIUzIzY1FKK1pjWkwvNkdmbUltVWdVeFdxUWs1M3N0eXF2Y21uTG92?=
 =?utf-8?B?ekVnbnRDMzJ5eFFHWGtGNkJNY0FHNWQzZ0RpdGo3UXRsMVg4cWF3cUhKa1lZ?=
 =?utf-8?Q?Rkkhlld0OAgxpajQzAr9KDU=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f6b32ab1-00d8-4c09-c005-08d9fb734f70
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 11:04:52.4892
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: WfgawCdk0TC29Bl55RYH0qom8y6sjTBBT7af1oDgCSDusigary3dW/+8VQtEzTdCON0F1MJ29/YPsQlqqBYGcQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB8095

1: use fake read_tsc()
2: add CF-clobber annotations

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 11:05:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 11:05:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281245.479491 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP0KH-0005sA-Pq; Tue, 01 Mar 2022 11:05:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281245.479491; Tue, 01 Mar 2022 11:05:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP0KH-0005s3-MR; Tue, 01 Mar 2022 11:05:53 +0000
Received: by outflank-mailman (input) for mailman id 281245;
 Tue, 01 Mar 2022 11:05:52 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nP0KG-0005rB-DZ
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 11:05:52 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 8e601d69-994f-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 12:05:51 +0100 (CET)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur02lp2059.outbound.protection.outlook.com [104.47.4.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-23-bIPFnNKYN3uSy7cJjYTBhA-2; Tue, 01 Mar 2022 12:05:49 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PAXPR04MB8095.eurprd04.prod.outlook.com (2603:10a6:102:1c6::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Tue, 1 Mar
 2022 11:05:49 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 11:05:49 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8e601d69-994f-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646132751;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=yVhh9raFqY1k1mmmz8RZiJfkzqL7jHEKprsJSfJ+qW8=;
	b=HLdOUkx+gebQi2TvLwqlywxBsKktvMc9Hv5XBYqScvWGUQ1Xxg8LlJ6feFTdd9yfucTuLL
	7u0r93VUqP88e9Mfwtm8nX08mjHoIxgM1KVEUeZThtDP5gpRnC75NLjWfQfX814LE6XCln
	pL3JUez3K6cCvowuK+9IxH71toaBa+M=
X-MC-Unique: bIPFnNKYN3uSy7cJjYTBhA-2
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ZRdmnOnjSJ2Uvo98Tm4jPYGnspuBqOptTwVzWy63A5oEvqHELWgEHrrBuhhH26TOBO5dYNO56E6XVoW1n+l4Ovkp93471Y7WgMtI2vlYfySZOk2oZiQSZtohFjNMvxZYUhXiTaGI9AeZ5EqQeowoAzhX5TAm8/eax3C0pq3QRPGULmBS2okUxcZD0/pFZjjCPUK54HnMkNF0ABwMqYsA4Gizai7yPoACVHYE2VpyCpwpsZXsAmlZn43Tg2EDeXgXhasKFQUl4x0J+HsKvSHLWHCpIuQC0HpTVdBf/Cu6cvubKZxMPEds8hlSWBbLmhIRWU5HsvUpJV8ULfQlsTwVDQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=yVhh9raFqY1k1mmmz8RZiJfkzqL7jHEKprsJSfJ+qW8=;
 b=jWCBziFs9DYO4cOpBFWd56R5GdRyQDRW0Ktv1A7qpK25XnhBlHOPKPbo6GKtL0giyHF6jjVmKngksQnWxvS+mOY1ocbO7j39TKlihvpQDs23SKJkW3RAFAW/gJORS4iW4umlQ+MDLF5yEjBvGOYWks+VoOEhIODaOJTPCssLnIqt8WZP3p/2q+/PLG8wnnnDZa84KvMwk7CDmTN3WfAehU7b72mZorgSxwAN8RZb9WsqDj2CRxydXwx7y3Bsrp4tjx3xc+z8Bafkc43K5oj5tbvxMs41pKid5EN/Sdf2iPQ2ZGuGTHwIZEssPeBrJicOg46O7yaDlCOeIbbMS1dNSw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <f4f0e92c-9586-e021-6ad5-718628f88fcd@suse.com>
Date: Tue, 1 Mar 2022 12:05:47 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: [PATCH 1/2] x86/time: use fake read_tsc()
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
References: <77675e7f-2a7e-f517-4aba-e20774c8bfe5@suse.com>
In-Reply-To: <77675e7f-2a7e-f517-4aba-e20774c8bfe5@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR06CA0272.eurprd06.prod.outlook.com
 (2603:10a6:20b:45a::10) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 69dc9f71-5cd7-4d6d-2022-08d9fb73710f
X-MS-TrafficTypeDiagnostic: PAXPR04MB8095:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB8095605EC301D4BA50096F56B3029@PAXPR04MB8095.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(5660300002)(31696002)(86362001)(6512007)(66476007)(66556008)(8936002)(83380400001)(316002)(38100700002)(4326008)(6916009)(54906003)(66946007)(508600001)(6486002)(8676002)(2906002)(2616005)(186003)(31686004)(26005)(6506007)(36756003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?OWk0WXdoV1pSdi9vNFFKNjF0a2xDYVFXKzVNQ1N2T0xWeDJIOWRVN0hPcXI2?=
 =?utf-8?B?OVBGWk96NnZ0cEQxS3k4K3ovb1Yxd3JrSDZnSWQrS2hQVFlydklXanAyNDdl?=
 =?utf-8?B?RVJkdDd3RHJKTmpiQ29jRlp0ZEdKeTF5M2RoTDlXU2IwRG54ZVNLazFMdkkr?=
 =?utf-8?B?NWZ6OVYrcUQyZjgvVmFFU1FRN3FMZFViVURiZC9rZkFEeGN4OXNBL2s2L1B0?=
 =?utf-8?B?VFlaYWp0YTN6aFhPdW5xQVBNRWZiWkxHOE1CMEpoUGE1RFJPeHIyN0RKSjZz?=
 =?utf-8?B?bGhrdjQrZmV6WThtcHQ2VHVGS2F3OHdrZ1gwYy9ZbGZkS2dXdmlQckFyWWlZ?=
 =?utf-8?B?SFNjNDFsMElhSTI0clZkRXdXSWJBdStTcjlFdWpKQ2hHRXg1WngyeVNNOFc4?=
 =?utf-8?B?ZVgxZjlaVkhQU3luUnp5R1VSWjN2eXFnQjhoMk9UL01odmF5eW1nRWl6N004?=
 =?utf-8?B?N296d3o5bFpXZWc2R0FNa1NrWVhMNThrNU5Vcnl3Y1JzOFg1a3ZMM2YzZlhJ?=
 =?utf-8?B?TU9zZVpGS1VMZUJlVWZFeHRPUjJDckMwaFBnMlplOXVCaFdkOGI1RjJ5SkZZ?=
 =?utf-8?B?U090MTlWdTNlSHpFNGg1ZmY5SDk0YTVFYXhkWUNCaXhTeWpmdWdwSjJsRy9p?=
 =?utf-8?B?S3M2c2UvV2FUeUk3V3RZMmc0eUkrSHdaQzZGaEcrTDNDNUo0QnJ1UXRibXV6?=
 =?utf-8?B?UE4rd1NyR3A2amNuZUxON3Z1dHJtUjZMY1A5dytjVkxVcC9zRzZwVmMxbmRt?=
 =?utf-8?B?ZG1LV3U1VHp1dDVQbnhjRFhJMHVaWFBrYTdCZG5TK01XcTZMTWxZdDJUUnBW?=
 =?utf-8?B?aTBySFhrS0tPWTNqZ0hTTHJsTWJsQ01iUERHYldjVFcwekpiM0ovcU1uOExv?=
 =?utf-8?B?ZGlOQm5OYVo3LzJIM05LeWtGN2ltMFhaL2hpVnFUVDlHQ1pkYW9TNVplWGhI?=
 =?utf-8?B?Q09RVWttUHdUckRTNlRQNXRJTzZldHBxbFIyNWRvZngyYkQ3MG1Yd2RzVjBB?=
 =?utf-8?B?M2ZsZ2l6TXVoR2pWR2cwUS9hcEtqSjR1MFlHSWpaMFQwNTNGVElJbVdhbEov?=
 =?utf-8?B?ZStHUWRGeHB0emRvUTNKRTU1dnhRNm9ZRHc5UFFMTDEyZnNJNDV3c3Yyc2F1?=
 =?utf-8?B?dTJJaWY0d2dXUCt5eGNSMi8vcDVjYmo1TFZic0ZJNElaWmpSMTlvTHRjZXFK?=
 =?utf-8?B?akdKM3l6eGMveDNrbVd3b2dvUzR4eExSNDhjaUlSbnBIUjV1elR0KzhaSnVB?=
 =?utf-8?B?U05JNWUvYjJPUDQ0OW8wRC83alZWb01QN1VMa1BTenh3M3A2S3Zsb1VURjZv?=
 =?utf-8?B?YlYySUlqMmk3ME93S21jU1M0SDVYNDdIaHR0eXdNejRzbkxGcndFeTBKZm9M?=
 =?utf-8?B?UnM4WTZBbFNYOExqV1BtV20vUVA0NnBxV3hYTGRicjhWUTZDR1BYZGZJWTU3?=
 =?utf-8?B?clJzQTdpOWtUcUJSaXZzU09ObHhRSVdWV2QrWTU1R2Izd1EycFFQZFJjeHda?=
 =?utf-8?B?TUR4cS9hdlBSelgzWmJXczNoS0p3bDc0TGZHV0ppVmFRR2JjYUJGNU9idGsy?=
 =?utf-8?B?a1NtaEFxZlRJaTBCM0FxSU0vOHhjSkNnTlpFY3Ezcll1cEV4M2ZMMTBhU3c0?=
 =?utf-8?B?dFZ3Vjdrd2Q2eUQ3cmpRaGl6TGhLSnBCQ1hCcHNWbnJydnNEb0kzY1pBV0xI?=
 =?utf-8?B?dHF0UWYvL0hQdngrU2QrWGlwRWp3RUNqc04xWFFvV25GUDdsQmpOTnV3b1JU?=
 =?utf-8?B?cmh5Um02NTFoVFN2Nisrbi9iRWJ4alYwdUpEWVZIWFVzRzcrRmlkSHc3Ympy?=
 =?utf-8?B?cmV3R3RybTl0ZmhjenRCckFpYmY4dCtYQllXckk3ZE03NnR2VXgybjdTQXdx?=
 =?utf-8?B?cmxpUWtEeUJUbkdoNm96d29lYVZjdkRveDVIVFJyNCt1QVBLTy92Sk1UN0lX?=
 =?utf-8?B?cXBGVWtrZWNMRGJxanhKbGVFY3Uxb2JxNXJnakNqWTNWcmw0MGFnaGUyYzZL?=
 =?utf-8?B?OVROM0Z0THNJa0ZxNUJBZEp4MVQ0d3U2MzNFNTZoanUvSGl1eFdKb2p6MExW?=
 =?utf-8?B?K2ptZkJZY2pRMFZpaXZpNXlGcituQTBoNTZSYU12UWtGZ1d0V3pCK0tyRUhw?=
 =?utf-8?B?VVJlZG5DR09oUUUwaDJsQzRVV1p2bFk2LzVWN2szVThBakdpd2NNOVdBKy9q?=
 =?utf-8?Q?97Bp5H8YQ2tStU3oeKBZw4U=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 69dc9f71-5cd7-4d6d-2022-08d9fb73710f
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 11:05:48.7825
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: CeUt1EXn8FJ9jcllL9zZFAqp9084DVoxGU2H/9W4iefjzdD4KnNnVp7T6BAKFeWZivSD9auPMGQE+xkmUzP0CA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB8095

Go a step further than bed9ae54df44 ("x86/time: switch platform timer
hooks to altcall") did and eliminate the "real" read_tsc() altogether:
It's not used except in pointer comparisons, and hence it looks overall
more safe to simply poison plt_tsc's read_counter hook.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
I wasn't really sure whether it would be better to use simply void * for
the type of the expression, resulting in an undesirable data -> function
pointer conversion, but making it impossible to mistakenly try and call
the (fake) function directly.

--- a/xen/arch/x86/time.c
+++ b/xen/arch/x86/time.c
@@ -585,10 +585,12 @@ static s64 __init cf_check init_tsc(stru
     return ret;
 }
 
-static uint64_t __init cf_check read_tsc(void)
-{
-    return rdtsc_ordered();
-}
+/*
+ * plt_tsc's read_counter hook is (and should not be) invoked via the struct
+ * field. To avoid carrying an unused, indirectly reachable function, poison
+ * the field with an easily identifiable non-canonical pointer.
+ */
+#define read_tsc ((uint64_t(*)(void))0x75C75C75C75C75C0ul)
 
 static struct platform_timesource __initdata plt_tsc =
 {



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 11:06:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 11:06:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281253.479502 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP0L1-0006dG-3g; Tue, 01 Mar 2022 11:06:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281253.479502; Tue, 01 Mar 2022 11:06:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP0L1-0006d5-0T; Tue, 01 Mar 2022 11:06:39 +0000
Received: by outflank-mailman (input) for mailman id 281253;
 Tue, 01 Mar 2022 11:06:38 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nP0L0-0006HM-4A
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 11:06:38 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a9c78dd7-994f-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 12:06:37 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2176.outbound.protection.outlook.com [104.47.17.176]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-30-64P3WOMhN2WodCFz9b4a_g-1; Tue, 01 Mar 2022 12:06:36 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PAXPR04MB8095.eurprd04.prod.outlook.com (2603:10a6:102:1c6::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Tue, 1 Mar
 2022 11:06:35 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 11:06:35 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a9c78dd7-994f-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646132797;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=7Hcjv5yq81hzSD4vfgXUo4NPyGvjN63yGcHqxJqVJiY=;
	b=BbRJWy+XxuD5k03LhPXhyTru08aIU04K7RjO8+8nvvgy6Z0NhqeYaxFLsJbh2jKYvKYH10
	+wATSF3+Omb6Lgg80+WME0Y7YcOB8CVquf5XdItemWVwWNNFBVS4tIg2Dg//LHcPs0N5Hx
	M/t/5/O/EpzazG1Wgu9AXYje52sQr0w=
X-MC-Unique: 64P3WOMhN2WodCFz9b4a_g-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=XoYDXQIh6HdPVxe+FEDuGpz8xMLiqZzSV6fkP+UPJ+Ok1/PTKfjN/ocImxVrNI9eImI0iPYxYfqs6V244N1FuhLmKvtBNjyfuFkBj+h5RzS9xl8tLwzyy5B6S+7PK3re+0aHd7zEayMDKbfLJr52h01abo1B7znC7bX0ZmASA4lD4aNGkC5IsLkUfhFcVhQokxVC1wQRkwUFzCEoWSQ1odXON4CbCjQ+W75FEC2fmDwMhgdSx9XajGOsddfWCyBs8d7yzCn6H8iZ/hl2f1DGk315+XoqQak7HmLfjCM2MKXesEdHEUq5R7Bba1XBUjaEgTSOW7Z64XvKstzP+cHUBA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=7Hcjv5yq81hzSD4vfgXUo4NPyGvjN63yGcHqxJqVJiY=;
 b=fuRvz87fIqhfNko060phsYx6S1OJVgl4BX08S8RPneS2gvQYhT+kGwL4C7RccNxdpYLfAqx9Xmpq3JjXMYmm5Zsm+svkIrnMlTDomYBOOoHu/Z1kgvav52AzenfHQXqf5MJpGtqIh0V8dryHw21PU7nVZiZn+9YydadRTJbvvVQoPJwyUD9+ss0h4nmp/DVxcXOlHv2Wa9hB0RmuUBIGbaPfZi2CxpkoCYdwaSoMh2k9Tb3+T1mWD3nFF6iVnMENCKVwkc6NIgNTpG2uy/K+SZIBxCs+qo3T7IhsPpdqLYzdX6edu50VxCJA/9J6JOEMrmf6hWMtpI0ZvOuxwbwGyQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <61bbf544-74ac-b698-425a-d1db80acab43@suse.com>
Date: Tue, 1 Mar 2022 12:06:33 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: [PATCH 2/2] x86/time: add CF-clobber annotations
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
References: <77675e7f-2a7e-f517-4aba-e20774c8bfe5@suse.com>
In-Reply-To: <77675e7f-2a7e-f517-4aba-e20774c8bfe5@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P194CA0024.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:209:90::37) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: a595ae01-3f95-4936-90b3-08d9fb738cb0
X-MS-TrafficTypeDiagnostic: PAXPR04MB8095:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB8095B43E39479F0F6ED6C34BB3029@PAXPR04MB8095.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(5660300002)(31696002)(86362001)(6512007)(66476007)(66556008)(8936002)(83380400001)(316002)(38100700002)(4326008)(6916009)(54906003)(66946007)(508600001)(6486002)(8676002)(2906002)(2616005)(186003)(31686004)(26005)(6506007)(36756003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?a2ZpcEIyWDR0Q3cyNVFqRUFnN2VtdVAyb2xLOG92a1hEVnI1SGpRYWhZK3pV?=
 =?utf-8?B?QUlwQTYvOWgwZkt1aktxZTU5U0JYVUpObUltUnRlSDJPaEkvWnh6bCtnUFVu?=
 =?utf-8?B?WCs1Nkd5TU9EeC9MSFJCY09DODBUNE03OTg0ZHZvTGZiODNDNnJwV3NKMytv?=
 =?utf-8?B?MGNxOUsrWlJ0bFRhTGN3ZTRudVJiSHhoVERtZ0paVGRuOGZPekZyaS80ajl1?=
 =?utf-8?B?akFTOFNwOUtldTg3bEJmZnVubk5aVE5LV0R5UEFDVzZMc2Vsc1cvM1pkN1Z6?=
 =?utf-8?B?blZMOTVsRVQ5Z2pLYlFlNFVXaXo2emJwSVhIVUEwOTdpODdhMHJDWk9qT082?=
 =?utf-8?B?bFVibDdPVVlSeVBSUUkyYnlvWDdybzRVRzNpRk1vajNRekRrNUlDdjlKc01y?=
 =?utf-8?B?bTJDT1FVTWxYa0huMVBFTHBJMnkwZ2liajlnVFR3T2ZHNzd5MjZpMVZDSTJP?=
 =?utf-8?B?SlJtN2xXREd1OENxVG9UeTFSL3I1SVhxWEFiakduZHFyMlhoUnZnQytSeG9v?=
 =?utf-8?B?RVdMN0ZxTXdZTzJWU2tXTW1pRjJLcnR1UEs2ZjFLVUE5V0oxVzBGYzdJMHFi?=
 =?utf-8?B?UWhYbko2T1U2NkJyMHRQamJrV0lsckRFcFZXNm1TMzRtSnVKOHg0ZE5DOWJM?=
 =?utf-8?B?Z0VoS1UzU3lORW5MMG80ZGNqQ0FGelhRUGVhWHBKaDF5ZEFOaXZ0T1lKOTA0?=
 =?utf-8?B?SkFmRERlQ0l1blFiYmRnVTJxUlJMSVVRWk93eGsxVU5ZZGRUbksxQTBXYmtj?=
 =?utf-8?B?UENJRndNM2pYVEg2OVl5NkRRc01PeFNlc1pNTll5ZXZSckVJWHpMRXAwckRL?=
 =?utf-8?B?cmV0c2J0cTFVZzl5WVo3MTU0WjdNKzNkdlUwWkltYlFVNm5HVVVzbEpFTkUy?=
 =?utf-8?B?Ull0NnV3eWNCYWxBS3ZYMURVL3VBTzYxUklFL2J3N2RrOWY2KzdVUHNIaXho?=
 =?utf-8?B?aWNxMkh2Q0J2MG1KNDVnVGtqSlZ6YzdsRlFvU3UrbXg1alZZSndLUnVMcUNi?=
 =?utf-8?B?THlVVk04Vk1Pa1d1NWhZc2lKTFZiNFNId09jRmEvOXMwL3VORzlvcVJQK2Zy?=
 =?utf-8?B?cnpjWHI5TGJiWWVNNzRIdFlGL1psME1GM1VHTXBPeTczZE9hZXVLREdJTEpn?=
 =?utf-8?B?V3hHbFlSaFNnWHQwQkVIeFdzRFZ3V0JpeDh3OEZIL0ZpNUV6SHVPeHJMaXVr?=
 =?utf-8?B?SzdBSGp1U1kxdUZ1dTBKVTRTTlRlR0RuUzhZU3hiNlNtdUVNb09lQk1KdDRh?=
 =?utf-8?B?ZGh6a212TUtQdmFyZlpwallsRUUrTHNBdUptSXV3eit6ZFB3Z0Z1dkhvN1Vp?=
 =?utf-8?B?SngxTHFmVHlMNWV2eDQ4clFTVlFOREdLWFJScTBSejdpQUtRYWFiYVMxckZE?=
 =?utf-8?B?QlVPMm0yeVd3U085am1oT1RhZ2VXeSt6Rld2TjA1enI3ZXB1a2xzaXRYYThH?=
 =?utf-8?B?OFl2VDM2VVQrNXk2aTdsZXlCdE9TcTdXTlkvREh5cDIrc2V1aXl0dUtwcUxq?=
 =?utf-8?B?SGFzN3dKT2F5ZDQxQlg4TzFEYjllamZKVWZrZDMrdnBOeEtRa3d1Z0ZjcVhm?=
 =?utf-8?B?QnAwOUk4WjNTUlVIWHhZVmRTU2ZpSjRJVlcxT3lFU25aR2p4Sk1ZYzFqcXJH?=
 =?utf-8?B?a0lnZ2VWTzdHT2Q4R0dvdkNWa1FKNWhmenZzZlI2akRONXFlMzNFSkFmVzFm?=
 =?utf-8?B?bzVoWjdobzgwK1RiK25TY1VxZDY0dmtpeU9iMTg2VjhER3NraUpXYUFJZHRO?=
 =?utf-8?B?Y05xSTBuNHlka0Q5OGMzTVhYYXVNTUtuTXFWWUxiWCs0dEt0b2RWOUdIby9p?=
 =?utf-8?B?UHVDVFlGZXcwZUJ5Mk1xMit1UlYvcS9jU1ZzdFFlM2pieVZtK2RpaDF1aEJr?=
 =?utf-8?B?UFQwUDhvcDBmQ0o0V3pLSTJleUF6SThrdWRPbXZ1ZWlBMmZNZ0NHSTJ3bjVC?=
 =?utf-8?B?ZERTc2pjZm1mNUZJeEtQdDBFeFJ1SzdtWXJXMStBeTZBTzlURXhWYWdKazJa?=
 =?utf-8?B?bVlKUGJ3RE1qODhsYUJESllKeFJPa2pvdzBNRWtpMmZVTzQzWU5ZY1p5OGhN?=
 =?utf-8?B?VGg0OXRPWXI0dE54Y00xQXB6N0RqMXV3ektYdUw2Q0JNcWkwWFVHQWk2Y25t?=
 =?utf-8?B?THdKUkNSek00em9GRmt0OUQwRjhwd2RxNlhtZGpaNGxENi9aTXVESWlxd1U2?=
 =?utf-8?Q?uQmSpnVlc+8M/FT9lw2Gy5Q=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a595ae01-3f95-4936-90b3-08d9fb738cb0
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 11:06:35.1078
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: pyRoRVU43jPHoeLfyRyqCSiFmtTG2dwJ+cSbAKveiE8YqwI7GAdfN7rTyp4qou2AcwMkYVpRdTlqDgtPtUdFbQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB8095

With bed9ae54df44 ("x86/time: switch platform timer hooks to altcall")
in place we can further arrange for ENDBR removal from the functions no
longer subject to indirect calls. Note that plt_tsc is left untouched,
for not holding any pointer eligible for ENDBR removal.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
I did consider converting most of the plt_* to const (plt_hpet and
plt_pmtimer cannot be converted), but this would entail quite a few
further changes.

--- a/xen/arch/x86/time.c
+++ b/xen/arch/x86/time.c
@@ -375,7 +375,7 @@ static void cf_check resume_pit(struct p
     outb(0, PIT_CH2);     /* MSB of count */
 }
 
-static struct platform_timesource __initdata plt_pit =
+static struct platform_timesource __initdata_cf_clobber plt_pit =
 {
     .id = "pit",
     .name = "PIT",
@@ -483,7 +483,7 @@ static void cf_check resume_hpet(struct
     hpet_resume(NULL);
 }
 
-static struct platform_timesource __initdata plt_hpet =
+static struct platform_timesource __initdata_cf_clobber plt_hpet =
 {
     .id = "hpet",
     .name = "HPET",
@@ -528,7 +528,7 @@ static s64 __init cf_check init_pmtimer(
     return adjust_elapsed(rdtsc_ordered() - start, elapsed, target);
 }
 
-static struct platform_timesource __initdata plt_pmtimer =
+static struct platform_timesource __initdata_cf_clobber plt_pmtimer =
 {
     .id = "acpi",
     .name = "ACPI PM Timer",
@@ -683,7 +683,7 @@ static void cf_check resume_xen_timer(st
     write_atomic(&xen_timer_last, 0);
 }
 
-static struct platform_timesource __initdata plt_xen_timer =
+static struct platform_timesource __initdata_cf_clobber plt_xen_timer =
 {
     .id = "xen",
     .name = "XEN PV CLOCK",
@@ -780,7 +780,7 @@ static uint64_t cf_check read_hyperv_tim
     return hv_scale_tsc(tsc, scale, offset);
 }
 
-static struct platform_timesource __initdata plt_hyperv_timer =
+static struct platform_timesource __initdata_cf_clobber plt_hyperv_timer =
 {
     .id = "hyperv",
     .name = "HYPER-V REFERENCE TSC",



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 11:36:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 11:36:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281263.479513 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP0nf-0001qY-Kh; Tue, 01 Mar 2022 11:36:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281263.479513; Tue, 01 Mar 2022 11:36:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP0nf-0001qR-HK; Tue, 01 Mar 2022 11:36:15 +0000
Received: by outflank-mailman (input) for mailman id 281263;
 Tue, 01 Mar 2022 11:36:14 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nP0ne-0001qL-8M
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 11:36:14 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id cbd7b545-9953-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 12:36:12 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2107.outbound.protection.outlook.com [104.47.17.107]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-20-mvBW0GLBNK2bXaF868IcLw-2; Tue, 01 Mar 2022 12:36:11 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PR3PR04MB7356.eurprd04.prod.outlook.com (2603:10a6:102:8d::10)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.25; Tue, 1 Mar
 2022 11:36:10 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 11:36:10 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cbd7b545-9953-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646134572;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=1CGuQnavDaQzxl8KQfCDTDU2TjGe6+yb2XeXhfdCsjI=;
	b=RxwI8dNwrcND+MjbPBnCnHH8qZBoeZ3B+bxeNHT3bUUI8kZc82Vj9Ymnd3EMhbmGOZAiqn
	ja/ilHw8hCClooNTURM0UcRVIFdK2BmhK4mAcImxZ79u15qJo3WPTZ1oR905JmyE34tDoA
	5euntlp97WylkkwKWcu8wc+f0skA5l8=
X-MC-Unique: mvBW0GLBNK2bXaF868IcLw-2
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=mzq7KSX76EZzT/aHLQyWd9FdkdzscqKe0mKOBFj60LCIJuxTcV9lM2o2VBmC+K6R60RNGcfL96KE7uwHsnRtcAsA3nk4GsttLpQcojB1BtLDz7uBuEGrBcqH5PPTZ3SLoAC9oKsI9KknBOs9WbZsBMfZE3a9IM6VwZPpM36RlqYb4n3wOCaxYDl+MuBfSq2iEa6SV3GstcsmtHto2kvk7oLHGfHb6XGFd4E0aMb0Fqofr2j31FFmGvYXlwZ4Vj7q2hA51k/b6jebM98uXcrnrPRGEsMzcs7zMeJq7Mjx1NGurdHRQeHo/Yv3fRINGX+NY7qehHobBf3H54Ww7YHcvQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=1CGuQnavDaQzxl8KQfCDTDU2TjGe6+yb2XeXhfdCsjI=;
 b=c4vXLvOfnq5ne9vobrOCKSGq3Ddsf7S1hR67isvr6sCti+GYjlRv8d0IyDnzuk3CJO+mdIBdjSXUXCFNaIkTOW+VfGjUABKtoDzDjuUWVU2+Vv0sCCzRUSnDgHZ0u4CvrXBZKKOMlfQK3j0XA6g57MGFV0Yhk354j+kWZE37uwUKBIS/XjlbJKB5L5zYNbELos2h4ETpxUIQw0TzDyg2mLpV3Tpiiwc9Q6eEoQvWRBA3KOuEJrqwD0ksDoyn7koo6gJIYsvyCA7866odkSo/QoQ8jbw0UPDKL0Je/3na10rnJglw3WcwK2ZPTATcq12l9i3fg67C5evUNPD5bPI59g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <0e3594ff-c637-46f2-bc95-7a26b5471b86@suse.com>
Date: Tue, 1 Mar 2022 12:36:08 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Content-Language: en-US
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH] x86/altcall: silence undue warning
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR0301CA0016.eurprd03.prod.outlook.com
 (2603:10a6:20b:468::34) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ac26bf4d-58be-45ce-2a90-08d9fb77aea7
X-MS-TrafficTypeDiagnostic: PR3PR04MB7356:EE_
X-Microsoft-Antispam-PRVS:
	<PR3PR04MB7356F27551DEFDDC5D713110B3029@PR3PR04MB7356.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	8dsD3V15LU1DxfhZFIAepuWGR+CsqKO36Smh00aAYJcQQs0nR0lQAvGJ1umOwXWhEICpdb+a2LO/heaVe0vgCzHh9lG/fbIiV/kIba8ZVxawUOocdYAItP1qu/xwtaa2zdPRluOOnUZoIaqR8VE7CpzTjXq6PuD1hZ8Db7Xutw/nuGfy34IezjYm4MrhcmqjKEXLhwnL2ChTFiUQmPpvawh+CjqWDTLab3DISEpAKa+LmsMAZaRK35HovxJjysf3rsmNKJboaie+oB6/Asyg7b5dDnIzmsHLnOFW+fvX5NAqoQDzZXEUrywjdq0wQBDuTwezaxpyMWrnC4Co3DZOGSQff4WS9r+8j640IXTXXObo/da47S824+HsAYcYfQj07JCL3vaE/xaLwNiSKQXW2hdzUHt1S6VLUcxaa/DBMyDMDE3Eon3ov5HBPPFcaXQfHVOCmPyWOUaB+h7TPL6Go1/nVpg2Up2fv2JJqmf+QZtoEYBWpnKU6xKOBL/NvZMszH3SlM879F7pnh6+Rwt5XxY0KRaFsiFw87/La7URs2hTcZvEE24jpyBF9/pc+auh21T7jsc1vgSa/A7KRGzeupp7KGTjIq2goPa7TJqaycStryxmGXkZwCHJ8I16h7ZRegLLEVlG7SzvxkI0VhIYWXH1QWH0lKtLbTtc7hvftQhC+MxycbwKb+XepGRDjPXqCpbTHXZMR8eXM5Av8kRRNx0jXq37OKw65uLZi4nYEmM=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(31696002)(8936002)(86362001)(6916009)(54906003)(4326008)(8676002)(6506007)(36756003)(66556008)(66946007)(66476007)(38100700002)(26005)(186003)(316002)(83380400001)(6512007)(5660300002)(2906002)(4744005)(2616005)(6486002)(508600001)(31686004)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?c20rc2p5a2FtRVZQSlBKMlBIU2tCVE41QWpvNHNtSWFvTWRabkdRQkZjWEVm?=
 =?utf-8?B?VStpL0xhcWFjbkRWNmk0OTE2bkozL1VqTE5MRkxNM3k2cFBJQ0tDdHoveDlF?=
 =?utf-8?B?b3hzN2xCeUV1dDdEOWMwWVhKNzhBazNPNk1Nb3hlaXpNcVJoc09MeVpBNUtq?=
 =?utf-8?B?MGFzTXpjNE8rOGFmVWErWnJtVGNwb3NzZXE4Q0trRnpZWTAxeVRXaFdTVm1N?=
 =?utf-8?B?bUN0b2VRZWdZK011dnlXY01IR3dqcjVIMGFvMFVPOG93dkd1REZOLytsak5Q?=
 =?utf-8?B?UDFSM1d6QkV6NU9aK1VHckRBS3hHYkNLOVFEY1IxenNXT1I5K2k3OStkVjQ4?=
 =?utf-8?B?N2tSN0xEU1dYb3IvOEtuY3paV0F0M3B0SnljYVBQVm1SYUNVVnpUeFBxWFY5?=
 =?utf-8?B?OXJoNG1CL2MzR2VFUUh1UkJjMHdTdUtOd25ubFBnQUtnOGdlT1l3TzlOTmF3?=
 =?utf-8?B?RVV2R0grUkkrTkdoV0tCcGp6K2l0R1ZMNGNvWUJDMDhjZnRjZm1qZEI2ency?=
 =?utf-8?B?eGw4eTY2Y1RmcnBPMDc2WjBFOEs5VnA2Wk0vb2psd2Q0SzBJRDlJZUV5S1RJ?=
 =?utf-8?B?WE9YMFovZ2tMRmZyeTR0YjNrVCtEVjVwN1ZEb1VYRjFPdXdrQTgxWWk0aUIv?=
 =?utf-8?B?UXovRkQ5K0lnam50Q2swZURXNGxQOE5vVHlUK0JRVmhXNXlTTjgybmJmV1h3?=
 =?utf-8?B?clVxMUdQQWtTVGJGZk84Nk9DdzlYTEFZZmN5cnlXblR3SXVQUGw2QTJuTXhm?=
 =?utf-8?B?NjVIUVNKT1gxMktRblhtZElEQU1iMEVzNkkxcFcwTkpRdHptNGRtNWxaYUd2?=
 =?utf-8?B?R0Y4MUxHbk9Db0lpa3F4K2dRQ29qWVBsRDkvTFZob1dVYzBsWGRnb29rR29O?=
 =?utf-8?B?ZEEwQm9EQ0tYdDgvWjNMZkVOOFVCcTN0VS8zTllEcGdnWjY0ZVlXajAzaHBX?=
 =?utf-8?B?Wm9OZ0IvQWV4UXR5eUVxck1odFRsdFdKR1ZJWm1oK09xV0tVRVBUOGtSRmtS?=
 =?utf-8?B?UmxrNHV2SUpwUzM0a1FmSklXa1p5NlkvU0NLVWJ0NmU3Ti9kKzAwNytvQUpC?=
 =?utf-8?B?UjRWc3daVUxHdnc5WlhTNmhURmlLZEx4aFVvdXh2UHBYWW1IOUNTY1lSa01Y?=
 =?utf-8?B?MzNDZExWMXRhWE9Td3RobVJpd2ZITDJNZ1pZdVFIeFp6SDROZ05oNVNYZUdz?=
 =?utf-8?B?MDUvQVJPYld0dUhhMVZoWGVqdVY2dUNiRVA1RllWME1DNnBoMEFUU1hrczli?=
 =?utf-8?B?YXEwNWxNbW51alpYa0tzNlcxbTNKTjF0RnJTT0VHZ1d4TlJaNDdCdnRBRGdU?=
 =?utf-8?B?VDFCN2RLcUpqYU5KRFJFd0ZjTlRGYk5UYS9ISENWZWlMaFFONnY2bmdYeHJT?=
 =?utf-8?B?aDVjdlp2OHZEYTlPcElkYkMvOElRTFpwR0tka1k1YVdmMlBMMWtCa3pZTmM0?=
 =?utf-8?B?cGM2U25CY0hjZEpJcEl0OTg2czNXZ0xIaHdTSDFmMXFCUDhIMjVLVmthWnhs?=
 =?utf-8?B?ZGNsOFduQXU3K2VRWnppTHBHYmJnNURIU0NjMFllMzE5QVNiVDQvSSt6YzBL?=
 =?utf-8?B?S1FNV2V6KzJFVml1ajhYSTdpT2I2c2dMUmlpc2pNa1JWVC9TVnJ5WmNDUW9m?=
 =?utf-8?B?ZFUwSnlVbUxIaU0yL0hZUm9KNFljYWZuSWN0RmNvV3dQOWJ3OVVtMFJDZHhz?=
 =?utf-8?B?SW1JMVJHREltOThPRytpNnVPSjNEdktac0s5bThYRDJTZk9wR1dHQVhuZVM1?=
 =?utf-8?B?a2VhRk5oeG5xY01HVXBEVHNHVXJkRnZ1QTlMUFJ4VXFiMGl0RkFQRkgzNVJn?=
 =?utf-8?B?VEtnOTBPMGZ6c3JrQnFNMWZueFJ5MWpXZmsvb0FkQW5MSE5EWWVSbHRZQUN4?=
 =?utf-8?B?Mk41YWQ2NHNXYVI4ZFgyZzBQbVV1VVZPZjJCY0tvYWg3ZnFNLy9YaWsvYVVz?=
 =?utf-8?B?Yk4yamxMTVRjSjB6c2Q5TS91NFNISlJBdHZ5ME80TXdyaGJvb2tGdC9OcTh5?=
 =?utf-8?B?anJPOVprdXQwcG1vb3I0MWtHaEZkWnhIR2xKR3BVdHM3YWRlSXp5ck5ZbDFN?=
 =?utf-8?B?Z0lUZGJOV3h2RDIvaENMRU9GTGEzN0FJdjN1N3pZQUtCaEJuSUNZMmVuNTBX?=
 =?utf-8?B?VG52UkhLVHNJTVFTOUxFTitmaXNGaHpHZHVZRGpERThGQ2NKejFacmg0WXlI?=
 =?utf-8?Q?hiQ+qoLN0a+rG/QvVrewyzQ=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ac26bf4d-58be-45ce-2a90-08d9fb77aea7
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 11:36:10.1069
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: ao0yPZqaURAYGtVxJp9EbwWDPv4fSel04260zMzAOYhLkNE8GNE+BsEGYFS5NYCQel5hx8y2zou0cqQAWofYkw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PR3PR04MB7356

Suitable compiler options are passed only when the actual feature
(XEN_IBT) is enabled, not when merely the compiler capability was found
to be available.

Fixes: 12e3410e071e ("x86/altcall: Check and optimise altcall targets")
Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
Furthermore, is "Optimised away ..." really appropriate in what
37ed5da851b8 ("x86/altcall: Optimise away endbr64 instruction where
possible") added? If this really was an optimization (rather than
hardening), shouldn't we purge ENDBR also when !cpu_has_xen_ibt, and
then ideally all of them? Whereas if this is mainly about hardening,
wouldn't the message better say "Purged" or "Clobbered"?

--- a/xen/arch/x86/alternative.c
+++ b/xen/arch/x86/alternative.c
@@ -295,7 +295,7 @@ static void init_or_livepatch _apply_alt
                      * marginal perf improvement which saves on instruction
                      * decode bandwidth.
                      */
-                    if ( IS_ENABLED(CONFIG_HAS_CC_CET_IBT) )
+                    if ( IS_ENABLED(CONFIG_XEN_IBT) )
                     {
                         if ( is_endbr64(dest) )
                             dest += ENDBR64_LEN;



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 11:39:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 11:39:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281270.479524 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP0qx-0002Yw-4N; Tue, 01 Mar 2022 11:39:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281270.479524; Tue, 01 Mar 2022 11:39:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP0qx-0002Yp-0h; Tue, 01 Mar 2022 11:39:39 +0000
Received: by outflank-mailman (input) for mailman id 281270;
 Tue, 01 Mar 2022 11:39:37 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=YI9j=TM=citrix.com=prvs=0520bb690=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nP0qv-0002Yj-8k
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 11:39:37 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 442caab8-9954-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 12:39:35 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 442caab8-9954-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646134775;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=YkxE1f2Bzj1X7jPJQvSSRXnaMkgU9fY9NDuKWHA4v4Q=;
  b=bTKZ3yI+yZzBIGXzF3yoKNzCsSAhSQEUJAu5K3w/9fheEaxj6wl1jCkm
   a/czv2c2VnYD2Bja9cTUuhRr1l3WnQwSqCe1W8YXqYLUDtgE9u4E9pIxb
   vL/QssAMNiq5Uba5ZVko5Q4PGINSizsGl4Z5B0M0F3rXA2GsFDiv/rv3u
   Y=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65208004
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:bn3jqa3mM61RMjrMjvbD5eJ3kn2cJEfYwER7XKvMYLTBsI5bp2QCz
 TNMDWrVbPjZMGP3fN93Pd6yoU4Du5XRmINlSApvpC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUw2IDga++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /1kuayBRF4XD5bMnc0ZSjBpOB1gY/F/reqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHCOo8Ft24m5jbeFfs8GrjIQrnQ5M8e1zA17ixLNaiDP
 ZJJMWIzBPjGS00RHGYlFY0PoOmhhCfHcxhT9nykl4NitgA/yyQuieOwYbI5YOeiQcRTg1bdp
 2uYo0znDRwAct+S0zyI9jSrnOCntSf6Xp8CUbi57uVCnlKe3CoQBQcQWF/9puO24mauVtQaJ
 0EK9y4Gqakp6FftXtT7Rwe/onOPolgbQdU4O/c94gCLjK/J+R6ZF0ANVDsHY9sj3OcyRDo3x
 hqAhdasBjF1trCRYXac7auP6zK0NzIcIWILaWkDVwRty93ippwjlgrEC9puDoaxj8bpAnf30
 TSDpjN4gK8c5eYX3aK84RXLjiyhorDNTxUp/UPMWX+/5Q53Y5Sqasqu5ESzxfJBKpuJC0GKv
 VAalMWEquMDF5eAkGqKWuplNLWo4euVdT3NmVN1AbE/+Dm3vX2uZ4Zd5Hd5PkgBGsIFfyL5J
 VXSoghPzJtSJ2exK65xbZi4B8kjwe7nD9uNfvTVaMdeJ4MqJVev4i5jfwiT0nrrnUxqlrswU
 b+ReMGoEDAeFIxjzTyrV6Ec16MmwmY1wma7bZn91BS61LOYIn2VQLEJLVKKRukj6eWPpwC92
 8pfMM6D0FNbXevyayLU4KYaKFxMJn8+bbjm+5J/deOZJAdiXmY7BJf5wbghU4h+g+JZm4/g/
 3a4X1JwzFvkmWaBLQSMd2AmZrTyW5p2sXM8O2orJ1nA83skZ5ym4OEAdp80Vb49/ednwLh/S
 PxtU8eHGPNnGj7W5zkGK57no+RKeAuumlimPiyrejEzcpdsAQvT9bfMfAT18zIVJjGqrsZ4q
 LqlvivAWoYKTQlmCMfQadqswkm3sHxbn/h9N2PCJcNSYwPr65RwLDLqje4fJNsFIhHOgDCd0
 m6r7Qww/LeX5dVvqZ+Q2P7C/9zB//ZC8lRyNmXr3LvvCxjh/m+KxZZpYc20Y26BbTahkEm9X
 tl9w/b5OfwBuV9FtYtgDrpmpZ4DC8vTS6xylVo9QiiSB7i/IvY5eyTdg5ET3kFY7uIB4WOLt
 lSzFs620FljEOfsCxYvKQUsdYxvPtlEy2CJvZzZzKgXjRKbHYZrs20PZ3FgawQHddOZ1b/JJ
 8974Kb6DCTl13IX3i6u1Hw8yoh1BiVov18bnp8bGpT3rQEg10tPZ5fRYgevvs3RM4oXbBVze
 2bF7EYnu1i67hCZG5bUPSKQtdexeLxU4EwapLP8Dw7hdiX5ag8fg0QKrGVfovV9xRRbyeNjU
 lWHxGUuTZhiCwxA3ZAZN0j1QlkpLETApiTZlgtY/EWEHhLAfjGccwUA1ROloRlxH5R0JWMAo
 tl1CQ/NDF7XQS0G9nBqCB499qe6FoQZG8+rsJnPIvlp1qISOFLNqqSveXAJu13gB8Ywj1fAv
 u5k4KB7bqiTCMLai/dT51WyvVjIdC25GQ==
IronPort-HdrOrdr: A9a23:fW7ZVautmpH1osJiNB1AaJrn7skC2IMji2hC6mlwRA09TyXGra
 +TdaUguSMc1gx9ZJh5o6H8BEGBKUmskKKceeEqTPiftXrdyReVxeZZnMXfKlzbamHDH4tmu5
 uIHJIOceEYYWIK7voSpTPIaerIo+P3sZxA592ut0uFJDsCA8oLjmdE40SgYzZLrWF9dMEE/f
 Gnl656Tk+bCBIqh7OAdx44tob41r/2vaOjRSRDKw8s6QGIgz/twqX9CQKk0hAXVC4K6as+8E
 De+jaJppmLgrWe8FvxxmXT55NZlJ/K0d1YHvGBjcATN3HFlhuoXoJ8QLeP1QpF491HqWxa0u
 UkkS1Qe/ib2EmhOV1dZiGdnTUI5QxerkMKD2Xo2EcL7/aJHA7SQPAx+r6xOiGplXbI+usMip
 6jlljpx6a+R3n77VXAzsmNWBdwmkWup30+1eYVknxESIMbLKRctIoF4SpuYdw99Q/Bmcka+d
 NVfYnhDTdtACenRmGcunMqzM2nX3w1EBvDSk8eutaN2zwTmHxi1UMXyMEWg39FrfsGOtR5zv
 WBNr4tmKBFT8cQY644DOAdQdGvAmiIRR7XKmqdLVnuCalCMXPQrJz85qkz+YiRCdY15Yp3nI
 6EXEJTtGY0dU6rAcqS3IdT+hSIW2m5VSSF8LAp23G4gMyKeFPGC1zwdLl1qbrSnxw2OLyvZ8
 qO
X-IronPort-AV: E=Sophos;i="5.90,145,1643691600"; 
   d="scan'208";a="65208004"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Rrjyn4HlQnEHcuIqGpcs28ooDKC34t9cILAgwXLCdmdfJpSTuFHzlcCkkfGGFyV1CTbcB3+bXYogyKiXIkXGT/peo5Ruqu2bXChvG29LUdpJose1gilGWZqS0ZLDxECaUWkQ8RaErEkbaMWdVpfVWAV+Tcx8zwnaDEE7kyCLGptCHg61BRltbpg2VRzpKeGtx5nhC3Vbpxb/s8OLOWYsJvUgOQcHBc5fvlYbtftx4AGmCZY+Ld21GnZNUwhoqVnsAPYDD7pjDeT7qpbZuW2z7V2dHhZeklYK9EtuDuu1CX/PXkl90i8Qyj8ANPIGT458qqfjgnlgA1iheabbBHy7qg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=YkxE1f2Bzj1X7jPJQvSSRXnaMkgU9fY9NDuKWHA4v4Q=;
 b=PN0XQDeHFqDPlEUM2KLVxdx6hxfe3b+6KiTEz/XrFrtWo5e1HmsInVdXUDTpQWeZ1LvUDhc31E7xFn6p2JPpi7b92tjBHryXabyvcdNFgd95377zUjORYqJyvo7gQhvava5IhRpHwbK1Pv0NACUMTzzPSWQno0TVtgVEo9yKMLdZRV6an+mRTHDgpYBALTAqB02KUSm8q4lH6wZ6q7ud/VbW9DSrDPn/leVuRiBadGkfj6mZvv5qfCy64yoeqoNGDVpgvhMFOQo00bx3gMWl5j6f6btmZ4ackCPGwt00Ovs85azCoKc1xL69cvdkJyHkH2lmx0xhAE3HTSoQK/cNbQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=YkxE1f2Bzj1X7jPJQvSSRXnaMkgU9fY9NDuKWHA4v4Q=;
 b=ikhNENNh/YG4IYUOOWYwB9BS6DStnY3cvmx+NVkB+LWJP6FsKhTYrvhH6hyWVoERAHMEzUt53/2Jj4qARu4cRjbGraKRnFSup3kQepXg6bDEOLs2SjQvH9iZybYfmrxq/3x6qLKHxM78e5N5BMPjdfutOjfDSkJDm15c2eucLGw=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Christoph Hellwig <hch@lst.de>, "iommu@lists.linux-foundation.org"
	<iommu@lists.linux-foundation.org>
CC: "x86@kernel.org" <x86@kernel.org>, Anshuman Khandual
	<anshuman.khandual@arm.com>, Tom Lendacky <thomas.lendacky@amd.com>, "Konrad
 Rzeszutek Wilk" <konrad.wilk@oracle.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>, "David
 Woodhouse" <dwmw2@infradead.org>, Lu Baolu <baolu.lu@linux.intel.com>, "Robin
 Murphy" <robin.murphy@arm.com>, "linux-arm-kernel@lists.infradead.org"
	<linux-arm-kernel@lists.infradead.org>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>, "linux-ia64@vger.kernel.org"
	<linux-ia64@vger.kernel.org>, "linux-mips@vger.kernel.org"
	<linux-mips@vger.kernel.org>, "linuxppc-dev@lists.ozlabs.org"
	<linuxppc-dev@lists.ozlabs.org>, "linux-riscv@lists.infradead.org"
	<linux-riscv@lists.infradead.org>, "linux-s390@vger.kernel.org"
	<linux-s390@vger.kernel.org>, "linux-hyperv@vger.kernel.org"
	<linux-hyperv@vger.kernel.org>, "tboot-devel@lists.sourceforge.net"
	<tboot-devel@lists.sourceforge.net>, "linux-pci@vger.kernel.org"
	<linux-pci@vger.kernel.org>
Subject: Re: [PATCH 08/12] x86: centralize setting SWIOTLB_FORCE when guest
 memory encryption is enabled
Thread-Topic: [PATCH 08/12] x86: centralize setting SWIOTLB_FORCE when guest
 memory encryption is enabled
Thread-Index: AQHYLVsO0esfCi4ktkCl+GWHal7mDKyqZ0+A
Date: Tue, 1 Mar 2022 11:39:29 +0000
Message-ID: <8e623a11-d809-4fab-401c-2ce609a9fc14@citrix.com>
References: <20220301105311.885699-1-hch@lst.de>
 <20220301105311.885699-9-hch@lst.de>
In-Reply-To: <20220301105311.885699-9-hch@lst.de>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: c374ea50-179c-4ab3-e28f-08d9fb7825f5
x-ms-traffictypediagnostic: BYAPR03MB4135:EE_
x-microsoft-antispam-prvs: <BYAPR03MB413527F2015C0D815369F9A1BA029@BYAPR03MB4135.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(508600001)(8936002)(4744005)(71200400001)(2616005)(6486002)(54906003)(8676002)(4326008)(91956017)(31686004)(66556008)(66446008)(64756008)(76116006)(66946007)(66476007)(36756003)(2906002)(7416002)(5660300002)(316002)(26005)(110136005)(38100700002)(82960400001)(83380400001)(53546011)(122000001)(6506007)(6512007)(38070700005)(31696002)(86362001)(186003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?V29KQUxGQ3Z1eE9uZzlEN1JXSHNJRUZxZEV1bU5PbDRnS3ZpckxTTTdJekpl?=
 =?utf-8?B?bTZHdmNGMWFmajdVd3dIajgxSjIwVmJ1bC9oZUtNSU1hVGppY3BSd2NVWHUy?=
 =?utf-8?B?RU9VOWE5VnJXM2dHaUFDdTJUMnpMZDBzdnJHYjBhV2VoT2hqZ0ZDbjdTN2Jv?=
 =?utf-8?B?aTdvci92ZHY3SXhNK0dmNTQvL2MzaTViYWN6bkJodStHcGJHVTBhV0xFcGZR?=
 =?utf-8?B?Zzl4SVpVajVKVkZ4ek0vaVRtZHovUms1bnQxT0UwVzRJc21wTEpiVzRzL3NC?=
 =?utf-8?B?clR4ckRTVWlZNDNaa0RQU3R3TmNJTjBEZE85em5JOVZFcU5NN3A0eFFpbmgz?=
 =?utf-8?B?Q2QvdTdjdmlvOXVPWG5OWjBJbDBsMmFTdTRybjI0S0ROakF6MlIxWnJNelFU?=
 =?utf-8?B?T3F0ZWdXRFI2V2R0amxwckVBTjB1WkliMmVCTVlTQW1DRHRmUVRCYTgxMStS?=
 =?utf-8?B?a3VBeU56dnBxUTF4UGtodEZHU09PMVNkc2ZGK2dyZkJCT2lKZ2xGOUJnRWRi?=
 =?utf-8?B?NmdsVHkwdDBUZGl4UFRXbGRuL2Y2T3k3ZXQ2UGllczZWdThPY1dObTRaSEg5?=
 =?utf-8?B?ZHIwbVJ5dFhOL0hZRnczbERnMFJjK1BWZktLamhVVkZuN1VmYUdpZnVOdnY1?=
 =?utf-8?B?ejByN01ITmdyMUZYZkRCVk9Lc3o4V3diSVJWWnNqL0xmUkh0WUorU3YrWFJZ?=
 =?utf-8?B?di85UGZHbHBVSENWai9NTlJOSFlzbEQ1NjNXeC9aRGhLZ1IvaWovMER0S3RR?=
 =?utf-8?B?amdLQ3hsMHpIWjhQMkZhUS9xNFNWK2tkb3JVMmZkSTI0WUU5a3dBd0pnRlds?=
 =?utf-8?B?SXBPUHpVZHV2Ym5zNUJDdkJwdUxRcDJKaTZ4RktUL2VDUFpGTkk0UFR6UFVZ?=
 =?utf-8?B?SXhycDVyVlRXQ1c0WTVhSVpHMkNsRE5YYjk3cDNWdUY2UUlGSDNBMHRUamRk?=
 =?utf-8?B?bFdEYUFnZmk5dUk2UWhjcUUxcTFTSEJDcE9ZdGFNbDNJQUFsdmVVaEJ1NnYx?=
 =?utf-8?B?TWU1THhRY2tNS3NSUWJDNkZrN3J6cEtVNCtMdno0ekhLTXVPSEdKUGlKTldq?=
 =?utf-8?B?SVN2YTF3b0lMRUZaRFBzMWlRdW1iZGYvdDlGK3NRb25Cek9FWXFab1dJUm9H?=
 =?utf-8?B?eFdwY1ZwWFpaQVg5UmR5cXJYbnZHbEpJUHAvRDRiYXorWXQ0aGs0dG5hVVhN?=
 =?utf-8?B?ekllUS9HbUxPaUoyYnY1ajAyUEV4WlJvaE51bXpXYkFiWjQ4MnBKN1E1Vzg1?=
 =?utf-8?B?TnRGY09ybWt3cUorR0ltbk1UR1haQkJFYUx2T2ZITzJxOFNFZEl2Y2IxT2x5?=
 =?utf-8?B?bWE2cjJwMFNJVEY1NGtqR01xSWM2TFlraUR1SjRMM0V5YkRSKzZxUjBsakp0?=
 =?utf-8?B?ajdycmovMzRYc3pncERnczUxTzlIUWZ2ZDNQWHU1dVNqNmVudDhnRVo3VmJo?=
 =?utf-8?B?OG5HdlcrSy9vNEpiSy9WVjk2YmRFZGpMZGNZS09mWXJ6TjlkYVRIWGJTRFdH?=
 =?utf-8?B?UFgycnZzZDI3WnExY0k0eHVnSVRpQ2FsQ0RaakRMWHNWeHRrTXBoam1NVzdx?=
 =?utf-8?B?ZjBGZE1mekw2RFBvd1R4dDBpeG5vemhlUDdyOWhIZHV3NHNSclVjOTRtcVFJ?=
 =?utf-8?B?MXRMQmsyelZudU5SaThBQnBTZ1R3Z0lUOVFVeDcyZjk5S21DS0hSZkE1MjZV?=
 =?utf-8?B?YTJja3htenErTEpLdmtTUVRqcWlJcHpocDFuWDFoS2lLdGZ0dzhRSU1IQ2Zp?=
 =?utf-8?B?aEJ1R1lJaHd0ZzZaeWZPK3o0b1FyNEQ0TXZUSGtyU25Ja0FWc28wRFJiRm9M?=
 =?utf-8?B?ZlRXS2drbXlLL3NQOEZKTzFnRXhnQ0Nqa1c4QkVsUmZZRlJxTjhmdzFPZVN0?=
 =?utf-8?B?cGVzOE5DRGw4cjhVbG11aWwvdER6UlllOHAxUStjNENaVWxhRndudmhvS1Vm?=
 =?utf-8?B?RS9iQnNYZzhqT2VWbDJZMkNqYjZxMUtOSWJVVmp4cENrTWllVWpuWXdybndx?=
 =?utf-8?B?anM3a1hsWWNvbXVldWlBUzVhU3ArRHZKMlcwYkRCQTFHV2NieGR6ZHlWZTQ2?=
 =?utf-8?B?NTFPQ3dENFd2alBJSG5ZUXJTVzNDd3k2Q2xUSHljMVE0cW40c1lVcW8wZlk2?=
 =?utf-8?B?Z1NBVzZGQndUUjNlRHBRdnpaTWJKdnB5TFduL202dm45bHdSMDJrdVU0NjlU?=
 =?utf-8?B?d0RBWmI4ZFFpdzZHVlp2UGtrZzdWNTh4OHRSc0xpV1MyajM0R3p6WTR2T05i?=
 =?utf-8?B?SDR6OHlqZjlEUVZVcTRxVy9oQW1RPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <B90F7ECC334C094D98FBB04318ADC72A@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c374ea50-179c-4ab3-e28f-08d9fb7825f5
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Mar 2022 11:39:29.9592
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: cn7CjesrcGKBpaPLehKxWy78J7QftlA2WxBhsLzq3mibgMd/ZVh1iPL1bNoyD8clO3N3VBw2CneavMhSmbRjE7aIiZ88WgnHvaEqDuwU2Sw=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB4135
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Tue Mar 01 11:43:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 11:43:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281279.479541 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP0ur-0003yc-Mu; Tue, 01 Mar 2022 11:43:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281279.479541; Tue, 01 Mar 2022 11:43:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP0ur-0003yV-JN; Tue, 01 Mar 2022 11:43:41 +0000
Received: by outflank-mailman (input) for mailman id 281279;
 Tue, 01 Mar 2022 11:43:40 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=tCvV=TM=lst.de=hch@srs-se1.protection.inumbo.net>)
 id 1nP0uq-0003yP-9S
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 11:43:40 +0000
Received: from verein.lst.de (verein.lst.de [213.95.11.211])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d6063504-9954-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 12:43:39 +0100 (CET)
Received: by verein.lst.de (Postfix, from userid 2407)
 id 5C51F68AFE; Tue,  1 Mar 2022 12:43:35 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d6063504-9954-11ec-8539-5f4723681683
Date: Tue, 1 Mar 2022 12:43:35 +0100
From: Christoph Hellwig <hch@lst.de>
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
Cc: Christoph Hellwig <hch@lst.de>,
	"iommu@lists.linux-foundation.org" <iommu@lists.linux-foundation.org>,
	"x86@kernel.org" <x86@kernel.org>,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	"linux-arm-kernel@lists.infradead.org" <linux-arm-kernel@lists.infradead.org>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	"linux-ia64@vger.kernel.org" <linux-ia64@vger.kernel.org>,
	"linux-mips@vger.kernel.org" <linux-mips@vger.kernel.org>,
	"linuxppc-dev@lists.ozlabs.org" <linuxppc-dev@lists.ozlabs.org>,
	"linux-riscv@lists.infradead.org" <linux-riscv@lists.infradead.org>,
	"linux-s390@vger.kernel.org" <linux-s390@vger.kernel.org>,
	"linux-hyperv@vger.kernel.org" <linux-hyperv@vger.kernel.org>,
	"tboot-devel@lists.sourceforge.net" <tboot-devel@lists.sourceforge.net>,
	"linux-pci@vger.kernel.org" <linux-pci@vger.kernel.org>
Subject: Re: [PATCH 08/12] x86: centralize setting SWIOTLB_FORCE when guest
 memory encryption is enabled
Message-ID: <20220301114335.GA2881@lst.de>
References: <20220301105311.885699-1-hch@lst.de> <20220301105311.885699-9-hch@lst.de> <8e623a11-d809-4fab-401c-2ce609a9fc14@citrix.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <8e623a11-d809-4fab-401c-2ce609a9fc14@citrix.com>
User-Agent: Mutt/1.5.17 (2007-11-01)

On Tue, Mar 01, 2022 at 11:39:29AM +0000, Andrew Cooper wrote:
> This isn't really "must".  The guest is perfectly capable of sharing
> memory with the hypervisor.
> 
> It's just that for now, bounce buffering is allegedly faster, and the
> simple way of getting it working.

Yeah, I guess you щould just share/unshare on demand.  But given that
this isn't implemented it is a must in the current kernel.  But if
you want a different wording suggest one and I'll put it in.


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 11:59:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 11:59:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281286.479552 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP19x-0005mN-1y; Tue, 01 Mar 2022 11:59:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281286.479552; Tue, 01 Mar 2022 11:59:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP19w-0005mG-VC; Tue, 01 Mar 2022 11:59:16 +0000
Received: by outflank-mailman (input) for mailman id 281286;
 Tue, 01 Mar 2022 11:59:15 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nP19v-0005mA-Ll
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 11:59:15 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 035966cc-9957-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 12:59:14 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2112.outbound.protection.outlook.com [104.47.17.112]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-7-cmQUEMhtN4i_4aw6HG3yoA-1; Tue, 01 Mar 2022 12:59:12 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB8PR04MB6364.eurprd04.prod.outlook.com (2603:10a6:10:10c::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.25; Tue, 1 Mar
 2022 11:59:11 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 11:59:11 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 035966cc-9957-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646135953;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=euxWGwpNFpXQayf1WVFqTvC95+comyZxg0/6MsdppYw=;
	b=TTcKVg7hyks0yn+5ZxFsoGAATtO8/Ljks057xnTnPqyUVhjDg+KTATff3WdfOpofNP390C
	V5h/K4k21HckdFLh8253tPNep59lHkuNFLBzrJEr9eSSy+TSPiZtpX96F1zWD0oy32qqMR
	1lp7xxB3tmO74r6CJWrAGbxfE1kNYbU=
X-MC-Unique: cmQUEMhtN4i_4aw6HG3yoA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=h/lJyp+tvL1+Jbk1hCI0A2FR/JKfRj7kCfyWsae94+/z+eeblDkKt2ovyDsGl8+40BU81ulfTyXNbMNO3MaY4VkdAghXtze/cEAg+EPmU4Bg25LSpN1VclQdlbguAfitPh+LvOMJ1OJW+G2tNlQmUtv0w8FTHIkxG3ANEkFD+26+7ZHw+9Be4rzgLHOnlYKE+tXNu2MKG7ImYJo1z1amQ2wWfkagj9X4O2kXu3rTaE5m1zWcZ8VBEb70f3TXkG4QSPNFg2ccR6EDqxZ7Dv4yI7zeVw+nlN3KmltLz5mhEOQeSUxLS4KTxZgZ67YXjSI+4E9KQkzH3FEf8CSvZYyjdA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=euxWGwpNFpXQayf1WVFqTvC95+comyZxg0/6MsdppYw=;
 b=MQ7O+YEthIfeHC1OI/UADKld26qo6JYGIpcMlcJbqQ5AFvanF/J+UtYIatSBuh5cLrRc4PojIjNthQoEJSYJOXvUviIhBArFeeNHel5d5bS7g0tGikzyLqT6b5RE1CbUXa6M7ZxDPwdVHBTKWw4eJ/psXQdJ6lD9iXBqFqb/pI0Sumq057pClpMOSKoV+g6cBjiq0J0G3hUX0dv+vX9knY1EiVx2zqT4VM6nO8BcCASdvVH7MB/uHki6lGnSi7fZofsnWxg/XogRe1ALyLyzxtw9CEDlZS68Coef6iv7OEcAgXRX4ppcCjmZrzMNLmNh2P+IWspgXVE3gCKCNPueeQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <2808e805-60a7-2f1e-0ff4-8da123c79afd@suse.com>
Date: Tue, 1 Mar 2022 12:59:09 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v2 3/7] x86/altcall: Optimise away endbr64 instruction
 where possible
Content-Language: en-US
To: Andrew Cooper <andrew.cooper3@citrix.com>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Wei Liu <wl@xen.org>, Xen-devel <xen-devel@lists.xenproject.org>
References: <20220214125632.24563-1-andrew.cooper3@citrix.com>
 <20220214125632.24563-4-andrew.cooper3@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220214125632.24563-4-andrew.cooper3@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8P251CA0009.EURP251.PROD.OUTLOOK.COM
 (2603:10a6:20b:2f2::34) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: eed71500-e4bb-4936-0b64-08d9fb7ae5dd
X-MS-TrafficTypeDiagnostic: DB8PR04MB6364:EE_
X-Microsoft-Antispam-PRVS:
	<DB8PR04MB6364729299960C907717CE98B3029@DB8PR04MB6364.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6506007)(2906002)(6512007)(38100700002)(4326008)(5660300002)(53546011)(6916009)(86362001)(83380400001)(26005)(186003)(316002)(2616005)(36756003)(66476007)(66946007)(54906003)(66556008)(8676002)(6486002)(31686004)(8936002)(31696002)(508600001)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?c0VmcGZDSFR0T3BFWmY2S0Q5YWZoQ2VlalZOVjVJeUFpbk8vUUdhVDdlTWRp?=
 =?utf-8?B?TEdKeDh5dkVKeXZtb1VjdUJEcnZZZzM1aXdTb1B4TUkxTHp6NWgzZzZ5Tkcz?=
 =?utf-8?B?a2wrZmFSaTdvVkNxMzM4THhkZzV4SlM3T2lKUk9QQUo0MW5jRFZXbHc2Nk9K?=
 =?utf-8?B?cEwzenVTNjMyVUgxNitzMVpXemZYaERGT3BFUzRod0ZzZjlJV0FxUnkrb0hl?=
 =?utf-8?B?NVV4TC8zSWw3QU9seCtIdDNNRE5CTUdRRTVrYnVhNkJqbmUydHhaTk03UXdP?=
 =?utf-8?B?bUVFbUxaSmQrdnZVTmI4UTNHbHkyeVRSQ2NLN3EybFg5NjBodjM3bXpHUUh2?=
 =?utf-8?B?Z1BSYTZwNXJSTkYyZ0djL0Q5N1MyUUxGYklHMTdvNUtUVGp6Mmt5dHpiZExp?=
 =?utf-8?B?dDFCR1F6SDV1NzV6WTZQQWc3a1JJSDhrMG5YdUNKa3dtSWlIdnhnUTdQcmM0?=
 =?utf-8?B?ek5YcUhZVlN3d1VRdUJUS1g0QWRONE03Qit1WTI3MzBGOFJXQjRFRFRvaklP?=
 =?utf-8?B?aVVQVmVqeXRwekdnbXpJa3NaM0lTenpHQXZPSnprZDF2QWpucis4b2R5SXNS?=
 =?utf-8?B?TkdOVHE3K1hiM2RTeEZkajlnbXZ6Qm45RTYrekpRMWd3d2Z0VjJSY0xha2pY?=
 =?utf-8?B?d1R0SHlrMnJieXBacjNSRjhhVXZsSTl4YVpPWlZvd25Gb2NTNFBIbmo1SnFX?=
 =?utf-8?B?TktpZnh0eWF2VC9DOS9PODB3M2xINlQyYjFmVkhLdXptME1LV0RwYSswV3Vl?=
 =?utf-8?B?VDlwa2JlbFVIMHZRQWhmbDVnOVp2eFc4Syt1WVNPVjhTSE5PbWYrZzVTSXhQ?=
 =?utf-8?B?N3RuNGpIeExWb3JTWm0xbG52cjd2eXJWdUMvY0xnaTJlRFRXWGljeFNYNXQ1?=
 =?utf-8?B?VTRIN3RFQVV4N1lZRTE0ejZ2d3FBeWpVMklhRG1rKzFyS2ljUTg3V0xZUTJV?=
 =?utf-8?B?WmtBa0F3TGxNOU90N09NUmw2RlBhL1JsZnhzWGNwR1FRS0Zpb2thTzRPdW1H?=
 =?utf-8?B?TEFQSzhpMERQa1JYeTdHdjQ3ZEZWNHhCamdGRUc5Z044NDJmNUJvVEczSFAz?=
 =?utf-8?B?b1V1V2VWOVFWeDhaTW9ITldoYWxweUp0eEowMnZYTW4vRDU2NEtnaVQrblc5?=
 =?utf-8?B?cXBjSVN1TG9YdjcraGJhQ1lpUkFjSG1YdjgvaEdLU1lma1piRmVPMEQyY0Z5?=
 =?utf-8?B?UkROV0NyaU1JNUNHc1F2VmNmQVhMa0JaTks3RURZSXpvTTRhRGZPV0lOMHI3?=
 =?utf-8?B?cW9qV2RPYTUwVFIyTVRYaExEbkMyS0dGNWlIczFISE9tUjdBa0xMY2hQYVhX?=
 =?utf-8?B?UnBtcmdYbWRYb0NYbW9lTk9hTUY0d0NyYzdRUmpETkR4OGFjR21LU1ZHalZy?=
 =?utf-8?B?djNHSmwycjFjRHJ6QVpIVjZTaE9QNVRodkUzMDlYWDJ0bytvN1I2L2pRVVVs?=
 =?utf-8?B?cWFJNGJPelhOSmNueFg5c1F6bS9rblRwVGMzYjQ4TXA4QUNqMm1XUVhQeVVU?=
 =?utf-8?B?SFBBdzd1UDVkVDlaQzNsUVVUZ3VweUFRbTR1d1hsaDBoZTlNcE00RFMrUEpD?=
 =?utf-8?B?VXVLRVRnZVRFNE9zbkVMU3hQMFVsQjZHNDRDZ2dSUjBEVTd4UGJJMnhBb3Bw?=
 =?utf-8?B?ZGN3aHc4THVTNHRUL0lVT0ZYaTFmaXZLdnJTTFNzemhmaWorR2hlTDkrMjhq?=
 =?utf-8?B?RnFTUjkvTTBPNmREdGIyNXRWRXlYZTdja2pXVmRuLzVPTHBBM3VNYUtPZkxP?=
 =?utf-8?B?MEMxN29SSUFqWTBJNGtMUzlHa2V0bFB1b2FhM3I3Yyt3WkRkQ2h1dklMTmlq?=
 =?utf-8?B?ci9LWTNuM2J0c3h5TjMvTThBcFBXcWQzZFFLcWQ0OGtCVnQ2QUw4dkdWMXZJ?=
 =?utf-8?B?MVpqaWlFZElWMUFnci9lZnlUQ2lBZS9Id2h1NmthdW9CalMvK0dPb1pHSWZS?=
 =?utf-8?B?RVhzMnk2Z2lKWmRGQy82d0l2cVV3VmQrTERRUnNxdmJOYzY1QS9YQktNYy9v?=
 =?utf-8?B?RWVDbWNXZFRoQ0FFRmVoaHdMS0RRY2pYelBNbHoyUmJ5dlhqRWx0YjVyOHYy?=
 =?utf-8?B?WXU2Y1Y4cCsxdFhNVWRhTThWOEVVRU1WeCsyZ0o5WW82WHc3WmhQYm9DV0Ja?=
 =?utf-8?B?MjEyOWRadE5BL0ZDVkdJT1hOTzJMWFdKK2t3MU1CVzE1MjRRSmVJQzlvYzJi?=
 =?utf-8?Q?9GgY9gbstvp/M+9/zLmp1TM=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: eed71500-e4bb-4936-0b64-08d9fb7ae5dd
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 11:59:11.2405
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 9LWfnp9o5A3JWhpLZ/OSKOZIDXE2o8sr4dEnYZ9hKeRcp8g/LuLlGsLbUWh1ALAVps3soozerWQOHhXSSZixZQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR04MB6364

On 14.02.2022 13:56, Andrew Cooper wrote:
> @@ -330,6 +333,41 @@ static void init_or_livepatch _apply_alternatives(struct alt_instr *start,
>          add_nops(buf + a->repl_len, total_len - a->repl_len);
>          text_poke(orig, buf, total_len);
>      }
> +
> +    /*
> +     * Clobber endbr64 instructions now that altcall has finished optimising
> +     * all indirect branches to direct ones.
> +     */
> +    if ( force && cpu_has_xen_ibt )

Btw, this is now also entered when the function is called from
apply_alternatives() (i.e. when livepatching), but ...

> +    {
> +        void *const *val;
> +        unsigned int clobbered = 0;
> +
> +        /*
> +         * This is some minor structure (ab)use.  We walk the entire contents
> +         * of .init.{ro,}data.cf_clobber as if it were an array of pointers.
> +         *
> +         * If the pointer points into .text, and at an endbr64 instruction,
> +         * nop out the endbr64.  This causes the pointer to no longer be a
> +         * legal indirect branch target under CET-IBT.  This is a
> +         * defence-in-depth measure, to reduce the options available to an
> +         * adversary who has managed to hijack a function pointer.
> +         */
> +        for ( val = __initdata_cf_clobber_start;
> +              val < __initdata_cf_clobber_end;

... this being main binary boundaries, no action would be taken on
the livepatch binary. Hence (also due to having been here before
during boot), all that I understand will happen ...

> +              val++ )
> +        {
> +            void *ptr = *val;
> +
> +            if ( !is_kernel_text(ptr) || !is_endbr64(ptr) )
> +                continue;
> +
> +            add_nops(ptr, 4);
> +            clobbered++;
> +        }
> +
> +        printk("altcall: Optimised away %u endbr64 instructions\n", clobbered);

... that this message be logged once per patch load (with a number
of 0). I think the enclosing if() wants to be amended by
"&& system_state < SYS_STATE_active". If you agree, I can easily
make a patch.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 12:11:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 12:11:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281299.479590 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP1M3-0000Rz-6d; Tue, 01 Mar 2022 12:11:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281299.479590; Tue, 01 Mar 2022 12:11:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP1M3-0000Qy-0H; Tue, 01 Mar 2022 12:11:47 +0000
Received: by outflank-mailman (input) for mailman id 281299;
 Tue, 01 Mar 2022 12:11:46 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=aWoc=TM=citrix.com=prvs=05201426e=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nP1M2-0008Ic-1O
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 12:11:46 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id c2e86dc5-9958-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 13:11:45 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c2e86dc5-9958-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646136705;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=fvTSRerL3DdcqoyCmQ0+MA1pOOEfGWViyWiS5fU/zLA=;
  b=DDPj4bNJOrtGiDYZ/b7sCSjeBTxOpm2IJGRZgcgmF4mBytOxIM7Cob3a
   8mb3punCkri7i9dFvYetSJyWmQgjL0OKFYaf6tN1/fEaGlEImuaPfTkR/
   0mPnnwe3JUBkVd0cWsdD8uPzIBfFS144PujVHM43kss3ZkGMZ9CyKdlP1
   8=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 65205238
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:hiHVhq1UC5XQPIzHrfbD5c9xkn2cJEfYwER7XKvMYLTBsI5bp2YEx
 2AfUGjUbvyIZWrxLd1xOd+//EkHuJCGnddiGVZspC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUw2IDja++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /0UrLC+eTsOJ5btwuY6fRZWGTFAJZNZreqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHiOp8fvXdxiynUF/88TbjIQrnQ5M8e1zA17ixLNaiDP
 ZJEM2E/BPjGSydpYQgQNaI8oLqhiHbycx0BpkKzvaVitgA/yyQuieOwYbI5YOeiXt5Jl0yVo
 mbH+WXRARwAMtGbjz2f/RqEjebVkST2cIkbDrG/+7hhh1j77nweDlgaWEW2pdG9i1WiQJRPJ
 koM4C0soKMuskuxQbHVQBmQsHOC+BkGVLJt//YSsV/XjPCOukDAWzZCHmUphMEaWNEeHCUG2
 G+1uMrSJGZtl5OaR3iNyK+qsmbnUcQKFlMqaSgBRAoDxtDspoAvkx7CJupe/L6JYs7dQm+pn
 W3TxMQqr/BK1JNQif3nlbzSq2/0/vD0ohgJChI7t45Pxidwf8abaoOh8jA3Bt4Qfd/CHjFtU
 JXp8vVyDdzi77nQzERho81XRdlFAspp1hWG2TaD+LF7qlyQF4aLJ9w43d2HDB4B3jw4UTHoe
 lTPngha+YVeOnCnBYcuPd7vU5txk/S5TI20PhwxUjaoSsIqHONg1HszDXN8Iki3yBR8+U3BE
 c3znTmQ4YYyVv08kWveqxY12r433CEurV4/trigpylLJYG2PSbPIZ9caQPmRrlgsMus/VWEm
 /4CZpDi40gOD4XDjtz/rNd7waYidiNgW/gbaqV/K4a+H+aRMDp5Wq+JnOh4INQNcmY8vr6gw
 0xRk3RwkDLX7UAr4y3QApy/QNsDhapCkE8=
IronPort-HdrOrdr: A9a23:HKz9f6k4paRf1XdCTpxvL7Q1lEbpDfIU3DAbv31ZSRFFG/Fxl6
 iV8sjzsiWE7gr5OUtQ4exoV5PhfZqxz/JICMwqTNKftWrdyQyVxeNZnOjfKlTbckWUnINgPO
 VbAsxD4bXLfCFHZK3BgTVQfexO/DD+ytHLudvj
X-IronPort-AV: E=Sophos;i="5.90,146,1643691600"; 
   d="scan'208";a="65205238"
From: Anthony PERARD <anthony.perard@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: <wl@xen.org>, <sstabellini@kernel.org>, <andrew.cooper3@citrix.com>,
	Anthony PERARD <anthony.perard@citrix.com>, Doug Goldstein
	<cardoe@cardoe.com>
Subject: [XEN PATCH 3/3] automation: check for generated files
Date: Tue, 1 Mar 2022 12:11:33 +0000
Message-ID: <20220301121133.19271-4-anthony.perard@citrix.com>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220301121133.19271-1-anthony.perard@citrix.com>
References: <20220301121133.19271-1-anthony.perard@citrix.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain

Try to find out whether genereted files that are commited needs to be
regenerated.

Signed-off-by: Anthony PERARD <anthony.perard@citrix.com>
---
 automation/gitlab-ci/test.yaml           | 10 +++++
 automation/scripts/check-generated-files | 55 ++++++++++++++++++++++++
 2 files changed, 65 insertions(+)
 create mode 100755 automation/scripts/check-generated-files

diff --git a/automation/gitlab-ci/test.yaml b/automation/gitlab-ci/test.yaml
index 56747fb335..a4b08c26ca 100644
--- a/automation/gitlab-ci/test.yaml
+++ b/automation/gitlab-ci/test.yaml
@@ -25,6 +25,16 @@ build-each-commit-gcc:
   tags:
     - x86_64
 
+build-check-generated-files-tools:
+  extends: .test-jobs-common
+  variables:
+    CONTAINER: debian:stable
+  script:
+    - automation/scripts/check-generated-files
+  needs: []
+  tags:
+    - x86_64
+
 qemu-alpine-arm64-gcc:
   extends: .test-jobs-common
   variables:
diff --git a/automation/scripts/check-generated-files b/automation/scripts/check-generated-files
new file mode 100755
index 0000000000..054ea3e025
--- /dev/null
+++ b/automation/scripts/check-generated-files
@@ -0,0 +1,55 @@
+#!/bin/bash
+
+# Check that generated files that are commited are actually up to date
+
+check_git_status() {
+    output="$(git status --porcelain --untracked-files=no)"
+    if [ -n "$output" ]; then
+        echo
+        echo "Files potentially needs to be regenerated:"
+        echo "$output"
+        return 1
+    fi
+}
+
+set -e
+set -x
+
+# Try to have recently changed files more recent than generated files if those haven't been regenerated.
+if [[ "$CI_COMMIT_BEFORE_SHA" && "$CI_COMMIT_BEFORE_SHA" != 0000000000000000000000000000000000000000 ]]; then
+    git switch --detach $CI_COMMIT_BEFORE_SHA
+    git switch --detach -
+fi
+
+# Lists of files that generate other commited files:
+touch tools/libs/light/*.idl
+
+
+# Regen autoconf files
+./autogen.sh
+
+# build up our configure options
+cfgargs=()
+
+# Disable non-tools subsystems
+cfgargs+=("--disable-xen")
+cfgargs+=("--disable-stubdom")
+cfgargs+=("--disable-docs")
+
+
+# Disable external trees
+cfgargs+=("--with-system-seabios=/bin/false")
+cfgargs+=("--with-system-qemu=/bin/false")
+cfgargs+=("--with-system-ipxe=/usr/lib/ipxe/ipxe.pxe")
+cfgargs+=("--disable-ovmf")
+cfgargs+=("--disable-pvshim")
+cfgargs+=("--disable-qemu-traditional")
+
+
+./configure --quiet "${cfgargs[@]}"
+make -s -j$(nproc) build-tools
+
+if ! check_git_status; then
+    git diff
+    exit 1
+fi
-- 
Anthony PERARD



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 12:11:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 12:11:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281296.479563 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP1Ly-0008Iv-B5; Tue, 01 Mar 2022 12:11:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281296.479563; Tue, 01 Mar 2022 12:11:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP1Ly-0008Io-7W; Tue, 01 Mar 2022 12:11:42 +0000
Received: by outflank-mailman (input) for mailman id 281296;
 Tue, 01 Mar 2022 12:11:41 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=aWoc=TM=citrix.com=prvs=05201426e=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nP1Lw-0008Ic-Uo
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 12:11:40 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id be63be4d-9958-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 13:11:39 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: be63be4d-9958-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646136699;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=AOGi+1fHNk/QNeSxzKelWiy0U7zrLKMb5/LRkXgzbOY=;
  b=JcVXfpMcUiFK0HwxKcFye7bpsppBhQ3iLKoSI6vY44kTj3q/XL4FPDX9
   CAvrqC605CyA3HcgYif6M/J/uNVXVY5AUecJmMJo2eav9/KhfczWGlaTF
   H+oZLIJnjC+akt/U3nT1utIPlLD45h16Lj5BGkkC93i/bPwpGPGZYxgw8
   A=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 65210546
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:ispNrqrhh24HIKV4f7H0lznPno9eBmIEZRIvgKrLsJaIsI4StFCzt
 garIBnXOKuKZGD8L90jad+/oxgCupXTnNUxGVA4ry03Qn5Bp5uZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 Yqq+aUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBD7KUuc0hTSlhKQonYfcb9qLWESWGmJnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVIxDfFDfEgUNbbTr/D/9Nw1zYsnMFeW/3ZY
 qL1bBIxMU6ZO0ATZD/7DrpghNe5n3j2XQd5j061l7oyyWfL4id+he2F3N39JYXRGJQ9clyjj
 nnd423zDxUeNdqe4TmI6HShgqnIhyyTcIkbDrG/+9ZhiUefwWFVAxoTPXOrrP/8hkOgVtZ3L
 00P5jFovaU07FasTNT2Q1u/unHslgEYc8pdFas98g7l90bPy1/HXC5eFGcHMYF48p9tLdA36
 rOXt+L2XR1GjKOlcEi2r+vO8D2vKBhIFEZXMEfoUjA5y9XkpYgyiDfGQdBiDLO5g7XJJN3g/
 9yZhHNg3utO1Kbnw43+pAma2Gz0+vAlWyZovl2/Y46z0u9uiGdJjaSM4EOT0/tPJZ3xorKp7
 CldwJj2AAzj4PiweM2xrAclQenBCxWtamS0bbtT838JrWzFF5mLJ9043d2GDB01WvvogBewC
 KMphStf5YVIIFyhZrJtboS6BqwClPa8S4y6Da6IN4MXM/CdkTNrGgk0PiZ8OEi3zSARfVwXY
 8/HIa5A815AYUiY8NZGb7hEiuJ6rszP7WjSWYr633yaPUm2PxaopUM+GALWNIgRtfrcyC2Mq
 oo3H5bamn13DbylCgGKoNF7ELz/BSVibXwAg5cMLbDrz8sPMDxJNsI9Npt6I901x/kOz7yQl
 px/M2cBoGfCabT8AV3iQhhehHnHB/6TcVpT0fQQAGuV
IronPort-HdrOrdr: A9a23:idZC86mo4H/rYRgXzZlyKbqYGyDpDfIm3DAbv31ZSRFFG/Fxl6
 iV88jzsiWE7Qr5OUtQ/uxoV5PgfZqxz/NICOoqTNWftWvd2FdARbsKheCJ/9SJIVybygc378
 ldmsZFZOEYdWIK7vrH3A==
X-IronPort-AV: E=Sophos;i="5.90,146,1643691600"; 
   d="scan'208";a="65210546"
From: Anthony PERARD <anthony.perard@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: <wl@xen.org>, <sstabellini@kernel.org>, <andrew.cooper3@citrix.com>,
	Anthony PERARD <anthony.perard@citrix.com>, Doug Goldstein
	<cardoe@cardoe.com>
Subject: [XEN PATCH 0/3] automation: auto-build container, check generated file
Date: Tue, 1 Mar 2022 12:11:30 +0000
Message-ID: <20220301121133.19271-1-anthony.perard@citrix.com>
X-Mailer: git-send-email 2.30.2
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain

Patch series available in this git branch:
https://xenbits.xen.org/git-http/people/aperard/xen-unstable.git br.gitlab-ci-build-container-v1

I wanted to automatically check that generated files that we have in our repo
are up-to-date, those are autoconf and *.gen.go files generataed from
libxl_types.idl. But this can only be check on debian stable. So new container,
and I look at building the new container from the CI.

The second patch depends on some changes to our GitLab runner:
    https://gitlab.com/xen-project/xen-gitlab-ci/-/merge_requests/15
I've already apply the changes to one runner, for testing.

The new debian:stable container is already published, but commiting the change
should rebuild it.

Thanks.

Anthony PERARD (3):
  automation: adding debian:stable container
  automation: automatically build debian:stable container
  automation: check for generated files

 .gitlab-ci.yml                            |  2 +
 automation/build/debian/stable.dockerfile | 53 ++++++++++++++++++++++
 automation/gitlab-ci/containers.yaml      | 22 +++++++++
 automation/gitlab-ci/test.yaml            | 10 +++++
 automation/scripts/check-generated-files  | 55 +++++++++++++++++++++++
 5 files changed, 142 insertions(+)
 create mode 100644 automation/build/debian/stable.dockerfile
 create mode 100644 automation/gitlab-ci/containers.yaml
 create mode 100755 automation/scripts/check-generated-files

-- 
Anthony PERARD



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 12:11:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 12:11:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281298.479585 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP1M2-0000Op-R3; Tue, 01 Mar 2022 12:11:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281298.479585; Tue, 01 Mar 2022 12:11:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP1M2-0000Og-NZ; Tue, 01 Mar 2022 12:11:46 +0000
Received: by outflank-mailman (input) for mailman id 281298;
 Tue, 01 Mar 2022 12:11:45 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=aWoc=TM=citrix.com=prvs=05201426e=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nP1M0-0008Ic-S6
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 12:11:44 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id c23443fd-9958-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 13:11:43 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c23443fd-9958-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646136703;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=cqtCddEDOMO9N2RINgp4gRg+BSZg2vJGBvVef7c4kfs=;
  b=fNkZWA8hX3vSDkdwh/BlOQpW2wKTSQyt1fQxzXDyatog/f8/OLp2B5VY
   A+9RzzYLWRAEI4pLsCQnnOHtlFOtZqYcfmYH/JSQcM9xsOC7e0JkQH+Pk
   65Q47jxU8o+q1YEaUFRxb7rG+iQ/VKvujtIByE1VZPfl1K18jQ01kQNxt
   Y=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 65205233
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:wkIlAqnuMJDzGyxqp31RZiHo5gydJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xJOWGuDbP+JZDb0Kdwjb46z/BtU7ZSHndBjSwRkqng1EiMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiW1rV4
 7senuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYbg10Dq7VxfYhVBgASC8uOu5i9oP/Li3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3s3d8zTbfHLA+TIrKWani7t5ExjYgwMtJGJ4yY
 uJHNGA3MU6bOHWjPH9JBJ8kmbewmkXlTDtWjECetPQ14XbqmVkZPL/Fb4OOJ43iqd9utl2Du
 mvM8mD9AxcbHN+S0zyI9jSrnOCntSjyQo4VGZWz/+Rmh1DVzWsWYDUGWF3+rfSnh0qWX9NEN
 1dS6icotbI19kGgUp/6RRLQiGGAlg4RXZxXCeJS1e2W4vOKuUDDXDFCF2MfLox93CMredA0/
 niDwuPqHGF9jLqUESmTprDXiT2OASdAeAfuehQ4ZQcC5tDipqQ6gRTOUstvHcaJszHlJd3j6
 2vU9XZj3t3/meZOjvzmpg6f31pAs7CUFlZd2+nBYo6yAuqVjqaBbpfg11XU5O0owG2xHgjY5
 yhsdyRzAYkz4XCxeM6lHb1l8FKBva/t3NjgbbhHRcFJG9OFoSPLQGyoyGsiTHqFy+5dEdMTX
 GfduBlK+LhYN2awYKl8buqZUpp2k/C/Toq5D6mNP7Kih6Sdkifdp0mCgmbKggjQfLUEy/lja
 f93j+72ZZrlNUiX5GXvHLpMuVPa7is/2XnSVfjGI+ePitKjiIquYe5dajOmN7lhhIvd+Vm92
 4sPZqOilkQEOMWjM3a/zGLmBQ1TRZTNLcut8JI/my/qClcOJVzN/NeKmeJxI9E+xv8N/goKl
 1nkMnJlJJPErSWvAW23hrpLMtsDgb4XQaoHABER
IronPort-HdrOrdr: A9a23:crhbyazxyZGY8tnSuOGhKrPwKr1zdoMgy1knxilNoRw8SKOlfq
 eV7ZMmPH7P+U8ssR4b+OxoVJPsfZqYz+8W3WBzB8bHYOCFgguVxehZhOOIqQEIWReOk9K1vZ
 0QFZSWY+efMbEVt6rHCXGDYrUd/OU=
X-IronPort-AV: E=Sophos;i="5.90,146,1643691600"; 
   d="scan'208";a="65205233"
From: Anthony PERARD <anthony.perard@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: <wl@xen.org>, <sstabellini@kernel.org>, <andrew.cooper3@citrix.com>,
	Anthony PERARD <anthony.perard@citrix.com>, Doug Goldstein
	<cardoe@cardoe.com>
Subject: [XEN PATCH 2/3] automation: automatically build debian:stable container
Date: Tue, 1 Mar 2022 12:11:32 +0000
Message-ID: <20220301121133.19271-3-anthony.perard@citrix.com>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220301121133.19271-1-anthony.perard@citrix.com>
References: <20220301121133.19271-1-anthony.perard@citrix.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain

Only run this on the staging branch, whenever the dockerfile changes.

Signed-off-by: Anthony PERARD <anthony.perard@citrix.com>
---
 .gitlab-ci.yml                       |  2 ++
 automation/gitlab-ci/containers.yaml | 22 ++++++++++++++++++++++
 2 files changed, 24 insertions(+)
 create mode 100644 automation/gitlab-ci/containers.yaml

diff --git a/.gitlab-ci.yml b/.gitlab-ci.yml
index c8bd7519d5..f934d3eff8 100644
--- a/.gitlab-ci.yml
+++ b/.gitlab-ci.yml
@@ -1,7 +1,9 @@
 stages:
+  - containers
   - build
   - test
 
 include:
+  - 'automation/gitlab-ci/containers.yaml'
   - 'automation/gitlab-ci/build.yaml'
   - 'automation/gitlab-ci/test.yaml'
diff --git a/automation/gitlab-ci/containers.yaml b/automation/gitlab-ci/containers.yaml
new file mode 100644
index 0000000000..2daf257f11
--- /dev/null
+++ b/automation/gitlab-ci/containers.yaml
@@ -0,0 +1,22 @@
+debian-stable-container:
+  stage: containers
+  image: docker:stable
+  variables:
+    BUILD_CONTAINER: debian/stable
+  tags:
+    - container-builder
+  only:
+    refs:
+      - staging
+    changes:
+      - automation/build/${BUILD_CONTAINER}.dockerfile
+  services:
+    - docker:dind
+  before_script:
+    - apk add make
+    - docker info
+    - docker login -u $CI_DEPLOY_USER -p $CI_DEPLOY_PASSWORD $CI_REGISTRY
+  script:
+    - make -C automation/build ${BUILD_CONTAINER} PUSH=1
+  after_script:
+    - docker logout
-- 
Anthony PERARD



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 12:11:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 12:11:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281297.479574 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP1M1-00007Y-Iz; Tue, 01 Mar 2022 12:11:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281297.479574; Tue, 01 Mar 2022 12:11:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP1M1-00007Q-FV; Tue, 01 Mar 2022 12:11:45 +0000
Received: by outflank-mailman (input) for mailman id 281297;
 Tue, 01 Mar 2022 12:11:43 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=aWoc=TM=citrix.com=prvs=05201426e=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nP1Lz-0008Ic-Qg
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 12:11:43 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id c025121f-9958-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 13:11:42 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c025121f-9958-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646136702;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=ud7MXxbX94bNlyXml0X8hASsYOPzgNU7AYPT+z5zGV8=;
  b=I3Gdhs8ShNjYbIy6U8g83SBnMvezC8+6bTLDMixNRZy6ORPug9067Rce
   mxMhD1wt8R8RIcLrCMA1Icbh33dEImuDCLJzbON9DlnZX5k+GRmUaXboT
   M+NBiKStoCRLortPe9CFmxrdQXEmIjVlWEE+6NuWBZD/4Bxj5UmTz0uDM
   M=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 65205231
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:FJ87bKBgtdeQkRVW/zXjw5YqxClBgxIJ4kV8jS/XYbTApD9302EPz
 2oeWGGDaPaJZjfxf90jaoS08EpSuJ7QxtJqQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vh29Yy6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhfm
 NgKpbq3ZD4tJ6KcoNg9dCRCGWZhaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguwqKtXrO4UO/Glt1zjDAd4tQIzZQrWM7thdtNs1rp4TR66DP
 ZFAAdZpRCjvXDhwKHkMM4Adhva2iFXkeixEuE3A8MLb5ECMlVcsgdABKuH9YceWTM9YmkKZo
 GPu/GnjBBwectuFxlKt+Xu2iujCtSjyQo4VGfuz8fsCqE2ewCkfBQMbUXO/oOKlkQiuVtRHM
 UsW9yEy668o+ySDUd3VTxC+5nmesXYht8F4SrNgrlvXk+yNvljfVjNsoiN9hMIOmp87AiwM0
 XKwm8rmVQRTkJqoU3ja6eLBxd+tAhQ9IWgHbC4CaAIK5dj/vY0+5i7yosZf/L2d1YOsR2ypq
 9yehG1n3uhI05ZXv0mu1Q2f21qRSo71ohnZD+k9dkas9UtHaYGsfOREAnCLvK8bfO51orRs1
 UXoevRyDshTVflhdwTXGY3h+Y1FAd7faFUwZnY1QvEcG8yFoSLLQGypyGgWyL1VGsgFYyT1R
 0TYpBlc4pReVFPzM/MpO93qVZhzlPGxfTgAahwyRoAVCnSWXFXalByCmGbKhzy9+KTSuftX1
 WinnTaEUi9BVPUPIMueTOYBy747rh3SNkuILa0XOy+PiOLEDFbMEO9tGALXMogRsfPVyC2Io
 o03H5bblH1ivBjWP3C/HXg7dgtRcxDWxPne9qRqSwJ0ClE+STF5VqSImutJlk4Mt/09q9okN
 0qVAidwoGcTT1WdQelWQhiPsI/SYKs=
IronPort-HdrOrdr: A9a23:x5wfiaGUJ/VBdCIfpLqE0MeALOsnbusQ8zAXP0AYc3Jom6uj5q
 aTdZUgpGfJYVkqOE3I9ertBEDEewK4yXcX2/h3AV7BZniEhILAFugLhuGO/9SjIVybygc079
 YYT0EUMrzN5DZB4voSmDPIceod/A==
X-IronPort-AV: E=Sophos;i="5.90,146,1643691600"; 
   d="scan'208";a="65205231"
From: Anthony PERARD <anthony.perard@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: <wl@xen.org>, <sstabellini@kernel.org>, <andrew.cooper3@citrix.com>,
	Anthony PERARD <anthony.perard@citrix.com>, Doug Goldstein
	<cardoe@cardoe.com>
Subject: [XEN PATCH 1/3] automation: adding debian:stable container
Date: Tue, 1 Mar 2022 12:11:31 +0000
Message-ID: <20220301121133.19271-2-anthony.perard@citrix.com>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220301121133.19271-1-anthony.perard@citrix.com>
References: <20220301121133.19271-1-anthony.perard@citrix.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain

This container will be used to check that generated source file in the
git repository are up to date.

Signed-off-by: Anthony PERARD <anthony.perard@citrix.com>
---
 automation/build/debian/stable.dockerfile | 53 +++++++++++++++++++++++
 1 file changed, 53 insertions(+)
 create mode 100644 automation/build/debian/stable.dockerfile

diff --git a/automation/build/debian/stable.dockerfile b/automation/build/debian/stable.dockerfile
new file mode 100644
index 0000000000..912c4a5345
--- /dev/null
+++ b/automation/build/debian/stable.dockerfile
@@ -0,0 +1,53 @@
+FROM debian:stable
+LABEL maintainer.name="The Xen Project" \
+      maintainer.email="xen-devel@lists.xenproject.org"
+
+RUN useradd -ms /bin/bash user
+ENV DEBIAN_FRONTEND=noninteractive
+
+# build depends
+RUN apt-get update && \
+    apt-get --quiet --yes install \
+        build-essential \
+        autoconf \
+        zlib1g-dev \
+        libncurses5-dev \
+        libssl-dev \
+        python3-dev \
+        xorg-dev \
+        uuid-dev \
+        libyajl-dev \
+        libaio-dev \
+        libglib2.0-dev \
+        clang \
+        libpixman-1-dev \
+        pkg-config \
+        flex \
+        bison \
+        # gettext for Xen < 4.13
+        gettext \
+        acpica-tools \
+        bin86 \
+        bcc \
+        liblzma-dev \
+        # libc6-dev-i386 for Xen < 4.15
+        libc6-dev-i386 \
+        libnl-3-dev \
+        ocaml-nox \
+        libfindlib-ocaml-dev \
+        markdown \
+        transfig \
+        pandoc \
+        checkpolicy \
+        wget \
+        git \
+        nasm \
+        gnupg \
+        golang \
+        && \
+        apt-get autoremove -y && \
+        apt-get clean && \
+        rm -rf /var/lib/apt/lists* /tmp/* /var/tmp/*
+
+USER user
+WORKDIR /build
-- 
Anthony PERARD



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 12:20:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 12:20:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281324.479606 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP1US-0003Ef-0r; Tue, 01 Mar 2022 12:20:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281324.479606; Tue, 01 Mar 2022 12:20:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP1UR-0003EY-Tv; Tue, 01 Mar 2022 12:20:27 +0000
Received: by outflank-mailman (input) for mailman id 281324;
 Tue, 01 Mar 2022 12:20:27 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=aWoc=TM=citrix.com=prvs=05201426e=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nP1UR-0003ES-33
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 12:20:27 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f88dc28b-9959-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 13:20:25 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f88dc28b-9959-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646137225;
  h=date:from:to:cc:subject:message-id:references:
   mime-version:in-reply-to;
  bh=K+M57JmbFWzBV5opLBEASvneUAOtiGXhgVOGDtf1NNA=;
  b=Q3GJsSOtmolKcaeNdVZZbufA9cf8LrkT0C+Cjp7I98yMGLGj0abaD/8B
   ylH+cDsUTRFwrfuiUTKtiJE/26fQ+nUtHObCurY8rLPfUnJW0jxUDS/7u
   2lBfWXij54Q/pVEiwADcZgS3UrdIwWDzjvpTQ3Zomm1igOzoivNCVmdlN
   c=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 65211002
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:PtWV0qOsMDyim+nvrR25l8FynXyQoLVcMsEvi/4bfWQNrUon0WRTy
 2QbC2GAPK6MZjGkeI0nb4m0pBsC6p+GzYc1Swto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi2tcw27BVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Z1
 sgQmoS/dgESPfP2xeIPCRtDQwxEFPgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALJc/3PIQZqzd4wCvQF/oOSpHfWaTao9Rf2V/cg+gQQKyHP
 pJBM1KDajzickZDJlhGGqg4ws2ap2f5IhZ0tVe88P9fD2/7k1UqjemF3MDuUseRWcxfk0Kcp
 2TH12f0GBcXMJqY0zXt2nmlnOPIkAvwUZgeE7D+/flv6HWDy2pWBBAIWF+TpfiillX4S99ZM
 1YT+Cclse417kPDZsb5dw21pjiDpBF0ZjZLO7RkskfXkPOSulvHQDhfJtJcVDA4nNErGBMy2
 WCPpNC3P2FpoueXUiKwzJ7B+FteJhMpBWMFYCYFSy4M7N/ivJw/g3rzczpzLEKmpoarQG+tm
 lhmuAB73uxO1pBTi81X6Hia22rEm3TfcuIiCuw7tEqB5xgxWoOqbpfABbPzvacZd9bxorVsU
 RE5dymiAAImUMnleM+lGrxl8FSVCxCtamW0bblHRcRJythV0yT/Fb28GRknTKuTDu4KeCXyf
 GjYsh5L6ZlYMROCNPErPdruUJp2lPG5RLwJs8w4iPIUOfCdkyfdoUlTibO4hTixwCDAb4llU
 XtkTSpcJSlDUvk2pNZHb+wczaUq1kgDKZD7HvjGI+Cc+ePGPha9EO5dWHPXN7xRxP7U8W39r
 ocEX+PXmko3bQELSnSOmWLlBQtRdiZT6FGfg5E/S9Nv1SI9QDBxU6KKmOh5E2Gn9owM/tr1E
 riGchcw4DLCabfvcG1mtlgLhGvTYKtC
IronPort-HdrOrdr: A9a23:yF1F5q7kR5GTYRhLYgPXwMjXdLJyesId70hD6qhwISY6TiW9rb
 HLoB17726QtN9/YhwdcLy7VJVoBEmskqKdgrNhX4tKPjOHhILAFugLhuHfKn/bak7DH4ZmpM
 FdmsNFaeEYY2IUsfrH
X-IronPort-AV: E=Sophos;i="5.90,146,1643691600"; 
   d="scan'208";a="65211002"
Date: Tue, 1 Mar 2022 12:20:20 +0000
From: Anthony PERARD <anthony.perard@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: <wl@xen.org>, <sstabellini@kernel.org>, <andrew.cooper3@citrix.com>, "Doug
 Goldstein" <cardoe@cardoe.com>
Subject: Re: [XEN PATCH 0/3] automation: auto-build container, check
 generated file
Message-ID: <Yh4PhEXI7RIc5tad@perard.uk.xensource.com>
References: <20220301121133.19271-1-anthony.perard@citrix.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <20220301121133.19271-1-anthony.perard@citrix.com>

On Tue, Mar 01, 2022 at 12:11:30PM +0000, Anthony PERARD wrote:
> Patch series available in this git branch:
> https://xenbits.xen.org/git-http/people/aperard/xen-unstable.git br.gitlab-ci-build-container-v1
> 
> I wanted to automatically check that generated files that we have in our repo
> are up-to-date, those are autoconf and *.gen.go files generataed from
> libxl_types.idl. But this can only be check on debian stable. So new container,
> and I look at building the new container from the CI.
> 
> The second patch depends on some changes to our GitLab runner:
>     https://gitlab.com/xen-project/xen-gitlab-ci/-/merge_requests/15
> I've already apply the changes to one runner, for testing.
> 
> The new debian:stable container is already published, but commiting the change
> should rebuild it.

Forgot to say that this series also depends on my previous one:
    [XEN PATCH 0/4] Some improvement for gitlab CI jobs
    <20220228145523.8954-1-anthony.perard@citrix.com>
(for the last patch)

-- 
Anthony PERARD


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 12:40:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 12:40:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281334.479635 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP1nz-00068p-7m; Tue, 01 Mar 2022 12:40:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281334.479635; Tue, 01 Mar 2022 12:40:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP1nz-00068i-1f; Tue, 01 Mar 2022 12:40:39 +0000
Received: by outflank-mailman (input) for mailman id 281334;
 Tue, 01 Mar 2022 12:40:37 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=kl2V=TM=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nP1nx-0005sl-8S
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 12:40:37 +0000
Received: from NAM10-MW2-obe.outbound.protection.outlook.com
 (mail-mw2nam10on20605.outbound.protection.outlook.com
 [2a01:111:f400:7e89::605])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c9aa9b9b-995c-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 13:40:35 +0100 (CET)
Received: from SN2PR01CA0023.prod.exchangelabs.com (2603:10b6:804:2::33) by
 MN2PR02MB5789.namprd02.prod.outlook.com (2603:10b6:208:11e::19) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.24; Tue, 1 Mar
 2022 12:40:30 +0000
Received: from SN1NAM02FT0008.eop-nam02.prod.protection.outlook.com
 (2603:10b6:804:2:cafe::8c) by SN2PR01CA0023.outlook.office365.com
 (2603:10b6:804:2::33) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.22 via Frontend
 Transport; Tue, 1 Mar 2022 12:40:30 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (149.199.80.198) by
 SN1NAM02FT0008.mail.protection.outlook.com (10.97.5.9) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5017.22 via Frontend Transport; Tue, 1 Mar 2022 12:40:29 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 1 Mar 2022 12:40:28 +0000
Received: from smtp.xilinx.com (172.21.105.198) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 1 Mar 2022 12:40:28 +0000
Received: from [10.108.8.223] (port=53852 helo=xcbayankuma41x.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nP1nn-0000Ui-E4; Tue, 01 Mar 2022 12:40:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c9aa9b9b-995c-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=JWkYG6IsxD98zWO/PTntRRXAGNpiCFZ5m2MTz+NczXGmqgmzXOmb61sCiRrsx0cgTu470mGSpoOIwgubL03DW4y6u004an2sMrxbGTtjN6vpSGOGKghc5HUcPsXHjxpTlLQgR8I2z0kqepG3CaymOOKqWNNJUh2VWQLWWzaFTMEcHz3AW8sLEFqNVopN5mAYsF7IOKdXG63G9wamzEelJzjeamlHnwjxRml+4tFcb+wpnSpdlyCgRiHeXBIPxEHugnzyCENLkNXA3TMIAOAEPdEGTYzmyElqPAOc4CLl1QFUs8spwwR58a2keUWc6a82+HctRy6bFGe/jQA72QdDoA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=+8o+9YqgUrb/hZmnZVc0UJwjMZa2ok5VdKErypv1CWA=;
 b=nIs4ZL9Y50uOtuGMr2h+UDusOmyID/I2rqNPrtLrHLyXZJ96AuZUjvhfekB+YE4uZ7Ggjxzjay/Rct/nstZ2OSBI4PcACqaxKVNxg63XV5e0/nLIsqNwvY7ob3A74z42F+z2yCuTctJJVTQiPChLFdMQLSOs7r5ONU69bAQ449lxIniQwKfBrgIFKjtWZfpLgBUVwV5Tpv0b/6+8r0bHHVxZto0BWHbGQd67MLP/23HyFe1/2+IUMCyD0OhIoS7apbnzEJ+f6yAFW7vpRTgnjFUojbH7u+Qlrb7UrXGkIl2qoNVDF/7ue7dlGfvm4dX9pFqy1GIGytv2hLO4T1MS+Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=+8o+9YqgUrb/hZmnZVc0UJwjMZa2ok5VdKErypv1CWA=;
 b=AjSpIuuuitsivCu0lnB85CBTJ3YjBzlY24BA4tIHK6murMzFDZ+CP5yP3OVerAk7zSNLzeg2goZbcB1M/CCKAEHcm9ZBoL8+ofG8QZd5tHHL6N0DDPkgqgHtvogeVrzibP+7f4xfE/eqzHEgQ/w9XSmOgIlrvDkAaWuIUsxjUYk=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch01.xlnx.xilinx.com;
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <stefanos@xilinx.com>, <julien@xen.org>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>, Ayan Kumar Halder
	<ayankuma@xilinx.com>
Subject: [XEN v9 1/4] xen/arm64: Decode ldr/str post increment operations
Date: Tue, 1 Mar 2022 12:40:19 +0000
Message-ID: <20220301124022.10168-2-ayankuma@xilinx.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220301124022.10168-1-ayankuma@xilinx.com>
References: <20220301124022.10168-1-ayankuma@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 6defbd93-9392-4130-6e1c-08d9fb80ab89
X-MS-TrafficTypeDiagnostic: MN2PR02MB5789:EE_
X-Microsoft-Antispam-PRVS:
	<MN2PR02MB5789204D5E0342FA94A33F62B2029@MN2PR02MB5789.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch01.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(26005)(54906003)(40460700003)(6916009)(6666004)(186003)(36756003)(356005)(7416002)(82310400004)(107886003)(2616005)(5660300002)(1076003)(316002)(508600001)(47076005)(7636003)(7696005)(83380400001)(2906002)(70586007)(8676002)(70206006)(336012)(426003)(8936002)(4326008)(36860700001)(9786002)(102446001);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 12:40:29.9276
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 6defbd93-9392-4130-6e1c-08d9fb80ab89
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch01.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	SN1NAM02FT0008.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR02MB5789

At the moment, Xen does not decode any of the arm64 instructions. This
means that when hsr_dabt.isv == 0, Xen cannot handle those instructions.
This will lead to Xen to abort the guests (from which those instructions
originate).

With this patch, Xen is able to decode ldr/str post indexing instructions.
These are a subset of instructions for which hsr_dabt.isv == 0.

The following instructions are now supported by Xen :-
1.      ldr     x2,    [x1],    #8
2.      ldr     w2,    [x1],    #-4
3.      ldr     x2,    [x1],    #-8
4.      ldr     w2,    [x1],    #4
5.      ldrh    w2,    [x1],    #2
6.      ldrb    w2,    [x1],    #1
7.      str     x2,    [x1],    #8
8.      str     w2,    [x1],    #-4
9.      strh    w2,    [x1],    #2
10.     strb    w2,    [x1],    #1

In the subsequent patch, decode_arm64() will get invoked when
hsr_dabt.isv == 0.

Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
---

Changelog :-

v2..v5 - Mentioned in the cover letter.

v6 - 1. Fixed the code style issues as mentioned in v5.

v7 - No change.

v8 - 1. Removed some un-necessary header files inclusion.
     2. Some style changes pointed out in v7.

v9 - 1. Rebased on top of the master.
     2. Renamed psr_mode_is_32bit to regs_mode_is_32bit.

 xen/arch/arm/decode.c           | 79 ++++++++++++++++++++++++++++++++-
 xen/arch/arm/decode.h           | 48 +++++++++++++++++---
 xen/arch/arm/include/asm/mmio.h |  4 ++
 xen/arch/arm/io.c               |  2 +-
 4 files changed, 124 insertions(+), 9 deletions(-)

diff --git a/xen/arch/arm/decode.c b/xen/arch/arm/decode.c
index 792c2e92a7..3add87e83a 100644
--- a/xen/arch/arm/decode.c
+++ b/xen/arch/arm/decode.c
@@ -84,6 +84,78 @@ bad_thumb2:
     return 1;
 }
 
+static int decode_arm64(register_t pc, mmio_info_t *info)
+{
+    union instr opcode = {0};
+    struct hsr_dabt *dabt = &info->dabt;
+    struct instr_details *dabt_instr = &info->dabt_instr;
+
+    if ( raw_copy_from_guest(&opcode.value, (void * __user)pc, sizeof (opcode)) )
+    {
+        gprintk(XENLOG_ERR, "Could not copy the instruction from PC\n");
+        return 1;
+    }
+
+    /*
+     * Refer Arm v8 ARM DDI 0487G.b, Page - C6-1107
+     * "Shared decode for all encodings" (under ldr immediate)
+     * If n == t && n != 31, then the return value is implementation defined
+     * (can be WBSUPPRESS, UNKNOWN, UNDEFINED or NOP). Thus, we do not support
+     * this. This holds true for ldrb/ldrh immediate as well.
+     *
+     * Also refer, Page - C6-1384, the above described behaviour is same for
+     * str immediate. This holds true for strb/strh immediate as well
+     */
+    if ( (opcode.ldr_str.rn == opcode.ldr_str.rt) && (opcode.ldr_str.rn != 31) )
+    {
+        gprintk(XENLOG_ERR, "Rn should not be equal to Rt except for r31\n");
+        goto bad_loadstore;
+    }
+
+    /* First, let's check for the fixed values */
+    if ( (opcode.value & POST_INDEX_FIXED_MASK) != POST_INDEX_FIXED_VALUE )
+    {
+        gprintk(XENLOG_ERR,
+                "Decoding instruction 0x%x is not supported\n", opcode.value);
+        goto bad_loadstore;
+    }
+
+    if ( opcode.ldr_str.v != 0 )
+    {
+        gprintk(XENLOG_ERR,
+                "ldr/str post indexing for vector types are not supported\n");
+        goto bad_loadstore;
+    }
+
+    /* Check for STR (immediate) */
+    if ( opcode.ldr_str.opc == 0 )
+        dabt->write = 1;
+    /* Check for LDR (immediate) */
+    else if ( opcode.ldr_str.opc == 1 )
+        dabt->write = 0;
+    else
+    {
+        gprintk(XENLOG_ERR,
+                "Decoding ldr/str post indexing is not supported for this variant\n");
+        goto bad_loadstore;
+    }
+
+    gprintk(XENLOG_INFO,
+            "opcode->ldr_str.rt = 0x%x, opcode->ldr_str.size = 0x%x, opcode->ldr_str.imm9 = %d\n",
+            opcode.ldr_str.rt, opcode.ldr_str.size, opcode.ldr_str.imm9);
+
+    update_dabt(dabt, opcode.ldr_str.rt, opcode.ldr_str.size, false);
+
+    dabt_instr->rn = opcode.ldr_str.rn;
+    dabt_instr->imm9 = opcode.ldr_str.imm9;
+
+    return 0;
+
+ bad_loadstore:
+    gprintk(XENLOG_ERR, "unhandled Arm instruction 0x%x\n", opcode.value);
+    return 1;
+}
+
 static int decode_thumb(register_t pc, struct hsr_dabt *dabt)
 {
     uint16_t instr;
@@ -150,10 +222,13 @@ bad_thumb:
     return 1;
 }
 
-int decode_instruction(const struct cpu_user_regs *regs, struct hsr_dabt *dabt)
+int decode_instruction(const struct cpu_user_regs *regs, mmio_info_t *info)
 {
     if ( is_32bit_domain(current->domain) && regs->cpsr & PSR_THUMB )
-        return decode_thumb(regs->pc, dabt);
+        return decode_thumb(regs->pc, &info->dabt);
+
+    if ( !regs_mode_is_32bit(regs) )
+        return decode_arm64(regs->pc, info);
 
     /* TODO: Handle ARM instruction */
     gprintk(XENLOG_ERR, "unhandled ARM instruction\n");
diff --git a/xen/arch/arm/decode.h b/xen/arch/arm/decode.h
index 4613763bdb..13db8ac968 100644
--- a/xen/arch/arm/decode.h
+++ b/xen/arch/arm/decode.h
@@ -23,19 +23,55 @@
 #include <asm/regs.h>
 #include <asm/processor.h>
 
-/**
+/*
+ * Refer to the ARMv8 ARM (DDI 0487G.b), Section C4.1.4 Loads and Stores
+ * Page 318 specifies the following bit pattern for
+ * "load/store register (immediate post-indexed)".
+ *
+ * 31 30 29  27 26 25  23   21 20              11   9         4       0
+ * ___________________________________________________________________
+ * |size|1 1 1 |V |0 0 |opc |0 |      imm9     |0 1 |  Rn     |  Rt   |
+ * |____|______|__|____|____|__|_______________|____|_________|_______|
+ */
+union instr {
+    uint32_t value;
+    struct {
+        unsigned int rt:5;     /* Rt register */
+        unsigned int rn:5;     /* Rn register */
+        unsigned int fixed1:2; /* value == 01b */
+        signed int imm9:9;     /* imm9 */
+        unsigned int fixed2:1; /* value == 0b */
+        unsigned int opc:2;    /* opc */
+        unsigned int fixed3:2; /* value == 00b */
+        unsigned int v:1;      /* vector */
+        unsigned int fixed4:3; /* value == 111b */
+        unsigned int size:2;   /* size */
+    } ldr_str;
+};
+
+#define POST_INDEX_FIXED_MASK   0x3B200C00
+#define POST_INDEX_FIXED_VALUE  0x38000400
+
+/*
  * Decode an instruction from pc
- * /!\ This function is not intended to fully decode an instruction. It
- * considers that the instruction is valid.
+ * /!\ This function is intended to decode an instruction. It considers that the
+ * instruction is valid.
  *
- * This function will get:
- *  - The transfer register
+ * In case of thumb mode, this function will get:
+ *  - The transfer register (ie Rt)
  *  - Sign bit
  *  - Size
+ *
+ * In case of arm64 mode, this function will get:
+ * - The transfer register (ie Rt)
+ * - The source register (ie Rn)
+ * - Size
+ * - Immediate offset
+ * - Read or write
  */
 
 int decode_instruction(const struct cpu_user_regs *regs,
-                       struct hsr_dabt *dabt);
+                       mmio_info_t *info);
 
 #endif /* __ARCH_ARM_DECODE_H_ */
 
diff --git a/xen/arch/arm/include/asm/mmio.h b/xen/arch/arm/include/asm/mmio.h
index 7ab873cb8f..3354d9c635 100644
--- a/xen/arch/arm/include/asm/mmio.h
+++ b/xen/arch/arm/include/asm/mmio.h
@@ -29,6 +29,10 @@
 typedef struct
 {
     struct hsr_dabt dabt;
+    struct instr_details {
+        unsigned long rn:5;
+        signed int imm9:9;
+    } dabt_instr;
     paddr_t gpa;
 } mmio_info_t;
 
diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
index 1a066f9ae5..fad103bdbd 100644
--- a/xen/arch/arm/io.c
+++ b/xen/arch/arm/io.c
@@ -141,7 +141,7 @@ enum io_state try_handle_mmio(struct cpu_user_regs *regs,
     {
         int rc;
 
-        rc = decode_instruction(regs, &info.dabt);
+        rc = decode_instruction(regs, &info);
         if ( rc )
         {
             gprintk(XENLOG_DEBUG, "Unable to decode instruction\n");
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 12:40:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 12:40:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281333.479624 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP1nx-0005t0-Qt; Tue, 01 Mar 2022 12:40:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281333.479624; Tue, 01 Mar 2022 12:40:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP1nx-0005st-N2; Tue, 01 Mar 2022 12:40:37 +0000
Received: by outflank-mailman (input) for mailman id 281333;
 Tue, 01 Mar 2022 12:40:36 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=kl2V=TM=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nP1nv-0005sf-S7
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 12:40:35 +0000
Received: from NAM04-MW2-obe.outbound.protection.outlook.com
 (mail-mw2nam08on20606.outbound.protection.outlook.com
 [2a01:111:f400:7e8c::606])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id c947ded3-995c-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 13:40:33 +0100 (CET)
Received: from SN6PR01CA0020.prod.exchangelabs.com (2603:10b6:805:b6::33) by
 BN6PR02MB2577.namprd02.prod.outlook.com (2603:10b6:404:58::15) with Microsoft
 SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22; Tue, 1 Mar 2022 12:40:27 +0000
Received: from SN1NAM02FT0021.eop-nam02.prod.protection.outlook.com
 (2603:10b6:805:b6:cafe::fd) by SN6PR01CA0020.outlook.office365.com
 (2603:10b6:805:b6::33) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.23 via Frontend
 Transport; Tue, 1 Mar 2022 12:40:27 +0000
Received: from xir-pvapexch02.xlnx.xilinx.com (149.199.80.198) by
 SN1NAM02FT0021.mail.protection.outlook.com (10.97.5.32) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5017.22 via Frontend Transport; Tue, 1 Mar 2022 12:40:26 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) by
 xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 1 Mar 2022 12:40:25 +0000
Received: from smtp.xilinx.com (172.21.105.198) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 1 Mar 2022 12:40:25 +0000
Received: from [10.108.8.223] (port=53852 helo=xcbayankuma41x.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nP1nl-0000Ui-3X; Tue, 01 Mar 2022 12:40:25 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c947ded3-995c-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=J+TZLWJ4YhOfNAvgCEacUVtsXGCUyeKiS/f+mMNPQIx9qhyXB+PTOaTqoOgCZREBbLfTd4ol7RCcgbqZoFxUtHDyIGtDigRuylnIbVcuMfLo4lERbiRkImpOw6JYGzGJUCiunBvYua6bnAjx2CgtZr7D8yFTKElnPcooznuED/KOWc5IoDQMB7QxAQWIryxi4HWjzYWxsWay1HQeYy5Od8dvHcbUYkKu2Zan387mFPR8/BohRGLJBIOvGaSumc+cB02N60bnCmHkcAfQaeT/nftLRaFX/30jt3ziXumTIWKo4kAOxupWGM17cqT8CSRV5mi9RE9kY8x+R0H5etXCpg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=s7JM5sSqmCS0X6wpG3eHNfOa7X8ZI8f0x0HeN9KJuhU=;
 b=Rtq9UaqBnh/YaqUI1tAziKyjyi+hXQjzws6cUZaEeCYKQ9g4nZwV2V5ZHa9FEvl9kkxXCJLn8jB3fJnO7k86nYdB42oAFl9SRHwneuIif7Lz6YpPOQyHJzHpDq3eYbjfyovgDVHDQWBoJkAfAORBBm54yhm6UTH6g6M0P75ltgCeUUFmJW7wutzWKgDN3v2e+4nZXb7xN2uzMxuBObGxJfAbjDEv+ocXomC0KUwMzEeokIFeueXElH4PonSA2CCwP0cWaqfmMnB+m9cuYd1wBkLGGeJaltiFJl4E6jVr9u4VY7RdzmFloVQLklbC21mOeBncqQ4CK/3IEnzcrC42sg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=s7JM5sSqmCS0X6wpG3eHNfOa7X8ZI8f0x0HeN9KJuhU=;
 b=Kt7WwKak+XY/VaDtv4TbOnnrm4wrkhdzf1idNJJGUdAqbOaNE9zdjtXknhhgMHFBNJmpCxCVbpyzMcsmSi4ah9V27PWB/hXUXnHLj3we+4MnZGBphjo8dtGsHc3nemEnYz2geuM4GBxJZ2tYKESwA/5PfcCAXg97mPx60rS/XIs=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch02.xlnx.xilinx.com;
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <stefanos@xilinx.com>, <julien@xen.org>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>, Ayan Kumar Halder
	<ayankuma@xilinx.com>
Subject: [XEN v9 0/4] xen/arm64: io: Decode ldr/str post-indexing instruction
Date: Tue, 1 Mar 2022 12:40:18 +0000
Message-ID: <20220301124022.10168-1-ayankuma@xilinx.com>
X-Mailer: git-send-email 2.17.1
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 83578c97-1964-4599-5bdd-08d9fb80a9c4
X-MS-TrafficTypeDiagnostic: BN6PR02MB2577:EE_
X-Microsoft-Antispam-PRVS:
	<BN6PR02MB2577FEE496933EAE2D7FA0CFB2029@BN6PR02MB2577.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	+P0iazNZpEJYmIPFUKfHMJNnQfrjDkEcEc1wKHwxu/YXS3TpqbvTR+FUAfS8RSVbo+0TvF6LqDv4TvqzG1W9bkzfhC1FuNigjHnRglqdb8ucWk5Jr6zgzxP/Pmt6+1b/OcwGqCwGYAS/UgjyyXUtIiaI08WVmke89oy1NnL/H6IvZ7fwQTSCZ8hmZNM8XX9pWagxwRVb4ckJgbqD95vAOES3DJid5XiboLB0CkbOQ+UI6NdiVD3SnVr00PhsZjwbj3uEnWqE77wBJaoLS92PsMOuWeGMyiRLJ9zpmB3afokNhnQgoaRSAa9HQ3e0/VyNxmwGwyesE8BANHXp5MC0n0jOOujWyhHmlGQvGOjeREhfvPXQ6peqch4aA2SFurPN2UDWGIFAur2so+e410TkQjecYjEtN0/AIIuSxQc8uDwGyGZSZV+IhHICifecmmbmSFzmnM0oo0ueID0bmdBZOiDGSxqLQUtYm5h01pGfi8Lvc3z5CQcBNMlsjot/PrHLLcP0alyDSDnYnFgZ6N38PPk4Ze50wi5lrVtVZk3B5JhtyILeHhtJpRuPlQlzMFU/ZryS/QinPJusHQMEedDHgHGj3fwJR+z99GK7j7ksSItyztgseoVNADmd+bqHHBWs/itH9wycNY61MObGcDVVgWVGMU8KKZPtGdb+Sl1Xu7VfSP2Qf62djsRUGCN077ZaizgJlcAKa96E5W6lfbKJ9Q==
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch02.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(70586007)(70206006)(6666004)(54906003)(8676002)(7696005)(508600001)(82310400004)(336012)(7636003)(356005)(186003)(6916009)(426003)(2616005)(47076005)(36860700001)(1076003)(107886003)(83380400001)(26005)(4326008)(5660300002)(8936002)(9786002)(7416002)(36756003)(2906002)(316002)(102446001)(473944003);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 12:40:26.9427
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 83578c97-1964-4599-5bdd-08d9fb80a9c4
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch02.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	SN1NAM02FT0021.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR02MB2577

Hi All,

The patch series introduces support to decode instructions by Xen when ISS is
invalid. Currently, when the guest executes post indexing ldr/str instructions
on emulated MMIO, these instructions are trapped into Xen as a data abort.
Xen reads hsr_dabt.isv == 0, so ISS is invalid. Therefore, it reads the faulting
instruction's opcode from guest's PC. It decodes and executes the instruction on
the emulated region.

While doing the patch, we found two bugs in the codebase. I have addressed them
in patches 3 and 4. These bugs were discussed with Julien on IRC chat. The
purpose of addressing these bugs (in this series) is that 1. We should not forget
about them. 2. To get clarity if our understanding is correct.

Ayan Kumar Halder (4):
  xen/arm64: Decode ldr/str post increment operations
  xen/arm64: io: Support instructions (for which ISS is not valid) on
    emulated MMIO region using MMIO/ioreq handler
  xen/arm64: io: Handle the abort due to access to stage1 translation
    table
  xen/arm64: io: Handle data abort due to cache maintenance instructions

 xen/arch/arm/arm32/traps.c        |  11 +++
 xen/arch/arm/arm64/traps.c        |  47 +++++++++++++
 xen/arch/arm/decode.c             |  80 ++++++++++++++++++++-
 xen/arch/arm/decode.h             |  48 +++++++++++--
 xen/arch/arm/include/asm/domain.h |   4 ++
 xen/arch/arm/include/asm/mmio.h   |  22 +++++-
 xen/arch/arm/include/asm/traps.h  |   2 +
 xen/arch/arm/io.c                 | 112 +++++++++++++++++++++---------
 xen/arch/arm/ioreq.c              |   7 +-
 xen/arch/arm/traps.c              |  93 ++++++++++++++++++++-----
 xen/arch/x86/include/asm/ioreq.h  |   3 +
 xen/include/xen/sched.h           |   2 +
 12 files changed, 369 insertions(+), 62 deletions(-)

Changelog :-
v2 - 1. Updated the rn register after reading from it. (Pointed by Julien,
        Stefano)
     2. Used a union to represent the instruction opcode (Suggestd by Bertrand)
     3. Fixed coding style issues (Pointed by Julien)
     4. In the previous patch, I was updating dabt->sign based on the signedness
        of imm9. This was incorrect. As mentioned in ARMv8 ARM  DDI 0487G.b,
        Page 3221, SSE indicates the signedness of the data item loaded. In our
        case, the data item loaded is always unsigned.

v3- 1. Handled all the variants of ldr/str (ie 64, 32, 16, 8 bit variants).
       Thus, I have removed the check for "instr->code.opc == 0" (Suggested by
       Andre)
    2. Handled the scenario when rn = SP, rt = XZR (Suggested by Jan, Andre)
    3. Added restriction for "rt != rn" (Suggested by Andre)
    4. Moved union ldr_str_instr_class {} to decode.h. This is the header included
       by io.c and decode.c (where the union is referred). (Suggested by Jan)
    5. Indentation and typo fixes (Suggested by Jan)

v4- 1. Fixed the patch as per Stefano's comments on v3. They are as follows :-
        1.1 Use macros to determine the fixed values in the instruction opcode
        1.2 Checked if instr != NULL
        1.3 Changed some data types and added #define ARM_64 for AArch64 specific
            code
        1.4 Moved post_increment_register() to decode.c so that the decoding
            logic is confined to a single file.
        1.5 Moved some checks from post_increment_register() to
            decode_loadstore_postindexing()
        1.6 Removed a duplicate check
    2. Updated the commit message as per Andre's comments.
    3. Changed the names of a label and some comments. *32bit* was erroneously
       mentioned in a label and comments in decode_loadstore_postindexing()
       although the function handled all variants of ldr/str post indexing.

v5- 1. Renamed decode_loadstore_postindexing() to decode_arm64(). The reason
       being this will be extended in future to support more instructions for
       which hsr_badt.isv = 0
    2. Introduce a function try_decode_instruction_invalid_iss() to determine
       if the instruction needs to be decoded before invoking decode_instruction().

       It checks :-
       2.1  dabt->s1ptw - Returns IO_UNHANDLED
       2.2  dabt->cache - Returns IO_IGNORED. (new enum instroduced to let the
            caller know that the instruction needs to be ignored by Xen. Thus
            the caller needs to increment the PC and return to the guest.

    3. Invoked try_decode_instruction_invalid_iss() from the following 2 places :-
        3.a - try_handle_mmio() - When we have determined that there is a valid
              mmio handler.
        3.b - try_fwd_ioserv()
        When ioserver completes the io request, the acknowledgement is sent via
        handle_ioserv(). Here, we need to increment the register. As there is no
        common data shared between try_fwd_ioserv() and handle_ioserv(), we need
        to decode the instruction again in handle_ioserv() to determine rn, imm9.

        (NOTE to Reviewers) - This does not feel correct. However, I could not
        think of a better approach. Please provide your inputs.

    4. Augumented struct hsr_dabt{} with struct hsr_dabt_instr_details{} to hold
       rn and imm9. This is passed to post_increment_register() to update rn.
    5. Other style changes as suggested in v4.

v6 - 1. Split the patch into three parts.

v7 - 1. Merged patch2 and patch3 into a single patch.

v8 - 1. Changes mentioned in the individual patches.

v9 - 1. Added patches 3 and 4 to address the bugs found in the existing codebase.
     2. Changes mentioned in the individual patches.

-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 12:40:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 12:40:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281337.479666 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP1o1-0006pu-BM; Tue, 01 Mar 2022 12:40:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281337.479666; Tue, 01 Mar 2022 12:40:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP1o1-0006o8-5x; Tue, 01 Mar 2022 12:40:41 +0000
Received: by outflank-mailman (input) for mailman id 281337;
 Tue, 01 Mar 2022 12:40:39 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=kl2V=TM=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nP1nz-0005sf-ER
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 12:40:39 +0000
Received: from NAM12-DM6-obe.outbound.protection.outlook.com
 (mail-dm6nam12on2060b.outbound.protection.outlook.com
 [2a01:111:f400:fe59::60b])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id cb8ae4f1-995c-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 13:40:38 +0100 (CET)
Received: from SN4PR0501CA0065.namprd05.prod.outlook.com
 (2603:10b6:803:41::42) by SA2PR02MB7595.namprd02.prod.outlook.com
 (2603:10b6:806:146::24) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.24; Tue, 1 Mar
 2022 12:40:35 +0000
Received: from SN1NAM02FT0034.eop-nam02.prod.protection.outlook.com
 (2603:10b6:803:41:cafe::26) by SN4PR0501CA0065.outlook.office365.com
 (2603:10b6:803:41::42) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.9 via Frontend
 Transport; Tue, 1 Mar 2022 12:40:35 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (149.199.80.198) by
 SN1NAM02FT0034.mail.protection.outlook.com (10.97.5.90) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5017.22 via Frontend Transport; Tue, 1 Mar 2022 12:40:35 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 1 Mar 2022 12:40:33 +0000
Received: from smtp.xilinx.com (172.21.105.198) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 1 Mar 2022 12:40:33 +0000
Received: from [10.108.8.223] (port=53852 helo=xcbayankuma41x.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nP1nt-0000Ui-HL; Tue, 01 Mar 2022 12:40:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cb8ae4f1-995c-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=QBvOPPiNoDnbGzOmbH3T4GREgxfOa85ijjKj9CEo9jmIYlk4NqUW8WSGNA/m0fU6jJKfEupNgW+jvMov6BMGOUhbhst/vU+i88+LUNkeDxh5FjCyonWV/EAFttSqOK3X+FO/wt6Gm7/bkkN5DI/si7faEZWHzWBkfT1uZzZkuxyDIEObuJpEjAlseZYezfzB+dGDha0lupIfUVG/Sk8927p942CH66DIzvKid4jmBS0lfy1jqtiU09KmbQcZqtEv50aUJ8epQGLvThVZdL4ZvpSmek5MMOG6gNo2aaX++kRk4fK92sjj9YieSRlrPNTgAKzmW6l/MuyY3kgLD7UtjA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=uK2cUyN9RFSxW7UNMQ2w1UgKi3QyK4ZDqHMa9YicuXc=;
 b=akzf4FL2nbMYuDrXnkR9SnsFVLduGBFgX0wm1MoKMOSMeLw6Hzx8wuMtx3Tf09sT3819/AM3coQ8n8P39aPUJ/uW6lp2JIgQnz9TaRxZPQuv5VdgZpNufw9HErybXexx1Lw6GrbNJvOcoG3B8wkXzR22Hv3uG/ArS49XlVyLvUSKJVP5neUvOUnQ133UTh2h/jyTYHwc52kILXiIVpCF2qhtU3L4R109gW6aV0wl3rXbLgIoPtpq7D8hqSldbfpZ9T84rqn7S8KpliRZrgjXAjtb4xyyqwNeGFYpcnW3EKzIorPrZzcc2xn+Pi243v5lX4tdqC70/9QnWulOhxssRw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=uK2cUyN9RFSxW7UNMQ2w1UgKi3QyK4ZDqHMa9YicuXc=;
 b=dPvGtKI9WPAbWoyyyCSs+KTyFQBd2odKMPnh852RvpsbzThUVjM1KWiAA95Yd7tGlKahc5aQ/ay/uY1cNctQjybOn7sK5RTZZpAYXoi3x3NjF64s73DODmVWenuj4o8GlvVbRZqgEf4vfKx96+FI7WtA0tQf1i+OAAyxYTy44kg=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch01.xlnx.xilinx.com;
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <stefanos@xilinx.com>, <julien@xen.org>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>, Ayan Kumar Halder
	<ayankuma@xilinx.com>
Subject: [XEN v9 4/4] xen/arm64: io: Handle data abort due to cache maintenance instructions
Date: Tue, 1 Mar 2022 12:40:22 +0000
Message-ID: <20220301124022.10168-5-ayankuma@xilinx.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220301124022.10168-1-ayankuma@xilinx.com>
References: <20220301124022.10168-1-ayankuma@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 085d2622-7828-4709-ca18-08d9fb80ae8f
X-MS-TrafficTypeDiagnostic: SA2PR02MB7595:EE_
X-Microsoft-Antispam-PRVS:
	<SA2PR02MB7595DAEF266E3F8BA2326957B2029@SA2PR02MB7595.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch01.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(316002)(1076003)(5660300002)(7416002)(40460700003)(8676002)(70586007)(70206006)(82310400004)(4326008)(2906002)(186003)(26005)(426003)(9786002)(107886003)(2616005)(36756003)(356005)(7636003)(7696005)(6666004)(8936002)(83380400001)(6916009)(508600001)(336012)(54906003)(36860700001)(47076005)(102446001);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 12:40:35.0024
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 085d2622-7828-4709-ca18-08d9fb80ae8f
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch01.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	SN1NAM02FT0034.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA2PR02MB7595

When the data abort is caused due to cache maintenance for an address,
there are two scenarios:-

1. Address belonging to a non emulated region - For this, Xen should
set the corresponding bit in the translation table entry to valid and
return to the guest to retry the instruction. This can happen sometimes
as Xen need to set the translation table entry to invalid. (for eg
'Break-Before-Make' sequence).

2. Address belongs to an emulated region - Xen should ignore the
instruction (ie increment the PC) and return to the guest.

We try to deal with scenario#1, by invoking check_p2m(). If this is
unsuccessful, then we assume scenario#2.

Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
---

Changelog:-

v1...v8 - NA

v9 - Extracted this change from "[XEN v7 2/2] xen/arm64: io: Support
instructions (for which ISS is not ..." into a separate patch of its
own. The reason being this addresses an existing bug in the codebase.

 xen/arch/arm/include/asm/mmio.h |  3 ++-
 xen/arch/arm/io.c               | 11 +++++++++++
 xen/arch/arm/traps.c            |  6 ++++++
 3 files changed, 19 insertions(+), 1 deletion(-)

diff --git a/xen/arch/arm/include/asm/mmio.h b/xen/arch/arm/include/asm/mmio.h
index ef2c57a2d5..75d362d5f5 100644
--- a/xen/arch/arm/include/asm/mmio.h
+++ b/xen/arch/arm/include/asm/mmio.h
@@ -34,7 +34,8 @@ enum instr_decode_state
      * Instruction is decoded successfully. It is a ldr/str post indexing
      * instruction.
      */
-    INSTR_LDR_STR_POSTINDEXING
+    INSTR_LDR_STR_POSTINDEXING,
+    INSTR_IGNORE                    /* Instruction is ignored */
 };
 
 typedef struct
diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
index ebcb8ed548..7e9dd4bb08 100644
--- a/xen/arch/arm/io.c
+++ b/xen/arch/arm/io.c
@@ -139,6 +139,17 @@ void try_decode_instruction(const struct cpu_user_regs *regs,
         return;
     }
 
+    /*
+     * When the data abort is caused due to cache maintenance, Xen should ignore
+     * this instruction as the cache maintenance was caused on an address belonging
+     * to the emulated region.
+     */
+    if ( info->dabt.cache )
+    {
+        info->dabt_instr.state = INSTR_IGNORE;
+        return;
+    }
+
     /*
      * Armv8 processor does not provide a valid syndrome for decoding some
      * instructions. So in order to process these instructions, Xen must
diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
index e491ca15d7..5879640b73 100644
--- a/xen/arch/arm/traps.c
+++ b/xen/arch/arm/traps.c
@@ -2011,6 +2011,12 @@ static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
 
         try_decode_instruction(regs, &info);
 
+        if ( info.dabt_instr.state == INSTR_IGNORE )
+        {
+            advance_pc(regs, hsr);
+            return;
+        }
+
         /*
          * If Xen could not decode the instruction or encountered an error
          * while decoding, then it should forward the abort to the guest.
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 12:40:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 12:40:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281335.479640 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP1nz-0006CB-II; Tue, 01 Mar 2022 12:40:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281335.479640; Tue, 01 Mar 2022 12:40:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP1nz-0006BL-Ak; Tue, 01 Mar 2022 12:40:39 +0000
Received: by outflank-mailman (input) for mailman id 281335;
 Tue, 01 Mar 2022 12:40:38 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=kl2V=TM=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nP1nx-0005sf-SP
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 12:40:37 +0000
Received: from NAM10-DM6-obe.outbound.protection.outlook.com
 (mail-dm6nam10on2060e.outbound.protection.outlook.com
 [2a01:111:f400:7e88::60e])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ca9644c5-995c-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 13:40:37 +0100 (CET)
Received: from SN2PR01CA0002.prod.exchangelabs.com (2603:10b6:804:2::12) by
 BY5PR02MB6740.namprd02.prod.outlook.com (2603:10b6:a03:202::21) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Tue, 1 Mar
 2022 12:40:32 +0000
Received: from SN1NAM02FT0008.eop-nam02.prod.protection.outlook.com
 (2603:10b6:804:2:cafe::bf) by SN2PR01CA0002.outlook.office365.com
 (2603:10b6:804:2::12) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Tue, 1 Mar 2022 12:40:32 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (149.199.80.198) by
 SN1NAM02FT0008.mail.protection.outlook.com (10.97.5.9) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5017.22 via Frontend Transport; Tue, 1 Mar 2022 12:40:32 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 1 Mar 2022 12:40:31 +0000
Received: from smtp.xilinx.com (172.21.105.198) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 1 Mar 2022 12:40:31 +0000
Received: from [10.108.8.223] (port=53852 helo=xcbayankuma41x.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nP1nr-0000Ui-3l; Tue, 01 Mar 2022 12:40:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ca9644c5-995c-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=gkgVaqNI0yTxHbJyJBQyLB0Ti7GigUfaOGqaFNxbXJQqGXeDMHdUTuSnF9Rpqq1e/TpoRNnCPMW+ZdcCvBCZxS+79eSpI95Sye9HSbNKP1pSS2prZ7z6Xru3mMznaMdHv1uA/IsOB1tzhTm9fwfPHUXqKcK+tcs9ByQ8x/8GCaIDpq6vXhNl9yn5KqzGjOnFHNvakh9WDLJqMbzMqgrpC8zY8z9S8oJbxR+BPiDlXeZ2ccP0pnH6FnYPsr9gsKOURFgBz/IckbzLGK2kcb5DOgU/BfnZe+XiQ9bNlPfrQjCyMdwUzHXGwvwtu3m3gk9zBNQSOaQGtBqOfk+2TZ+moQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=oHuuIqCSklM84YJbzg3sQCXYQhhgJ1Du7gvCW1yJRv4=;
 b=e1z1tssqiorsGvXd/sGa9IgseF+W/1oe9ZYUeQjE3gTSVIabo9w6T45rVxR5NCpcU55OgIlKPndf9M0VE6JOsmjJqQWd9DQw+/2riqhY5Bvh6pl6PtK/3pFxql9QNeQgp94iGaieVBuPk6FfyEqRfITvtk8Q9PNJ4E8E6iBu0ziWOn4STgI6oaq0MmpSczGNWwEV3Dw7oEnM0+PPokwfw35Rapg2pwXCe1zW/+3Gyt4/9JyEczer3a/5ZmeqnoGE+PpzRiuoCa5dNO8w5H//KLnns35Jul0XaMU9uYZu3T3hxcytQ2pCM1yiTQvPzR6uz7onUTmQC+zYxy1xOnyEuQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=oHuuIqCSklM84YJbzg3sQCXYQhhgJ1Du7gvCW1yJRv4=;
 b=FgZYvxMV4nXMWCXOnq81852QJs8j6L2WB4k57FMWUcG/G2VYfeB+FM6xdZDlIABD/lZjKSFov1Z+XNhX8O6PxApSCtqkyDsMfn+8zMt8ivg6g3v7W+F4XAOkahQoSyx6F9DJDOP7WCNWWXhO8F3nUMp15rdZFfkBXvzPwdrVYkU=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch01.xlnx.xilinx.com;
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <stefanos@xilinx.com>, <julien@xen.org>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>, Ayan Kumar Halder
	<ayankuma@xilinx.com>
Subject: [XEN v9 3/4] xen/arm64: io: Handle the abort due to access to stage1 translation table
Date: Tue, 1 Mar 2022 12:40:21 +0000
Message-ID: <20220301124022.10168-4-ayankuma@xilinx.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220301124022.10168-1-ayankuma@xilinx.com>
References: <20220301124022.10168-1-ayankuma@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 44db705b-959e-4b2f-582d-08d9fb80acde
X-MS-TrafficTypeDiagnostic: BY5PR02MB6740:EE_
X-Microsoft-Antispam-PRVS:
	<BY5PR02MB6740B1AF9A5A3ACA81042844B2029@BY5PR02MB6740.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch01.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(6916009)(54906003)(316002)(8936002)(8676002)(9786002)(4326008)(26005)(1076003)(107886003)(7416002)(36756003)(508600001)(6666004)(70206006)(70586007)(36860700001)(5660300002)(7696005)(356005)(7636003)(2616005)(82310400004)(336012)(47076005)(426003)(186003)(83380400001)(2906002)(102446001)(473944003);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 12:40:32.1618
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 44db705b-959e-4b2f-582d-08d9fb80acde
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch01.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	SN1NAM02FT0008.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR02MB6740

If the abort was caused due to access to stage1 translation table, Xen
will assume that the stage1 translation table is in the non MMIO region.
It will try to resolve the translation fault. If it succeeds, it will
return to the guest to retry the instruction. If not, then it means
that the table is in MMIO region which is not expected by Xen. Thus,
Xen will forward the abort to the guest.

Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
---

Changelog :-

v1..v8 - NA

v9 - 1. Extracted this change from "[XEN v8 2/2] xen/arm64: io: Support
instructions (for which ISS is not..." into a separate patch of its own.
The reason being this is an existing bug in the codebase.

 xen/arch/arm/io.c    | 11 +++++++++++
 xen/arch/arm/traps.c | 12 +++++++++++-
 2 files changed, 22 insertions(+), 1 deletion(-)

diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
index bea69ffb08..ebcb8ed548 100644
--- a/xen/arch/arm/io.c
+++ b/xen/arch/arm/io.c
@@ -128,6 +128,17 @@ void try_decode_instruction(const struct cpu_user_regs *regs,
         return;
     }
 
+    /*
+     * At this point, we know that the stage1 translation table is in the MMIO
+     * region. This is not expected by Xen and thus it forwards the abort to the
+     * guest.
+     */
+    if ( info->dabt.s1ptw )
+    {
+        info->dabt_instr.state = INSTR_ERROR;
+        return;
+    }
+
     /*
      * Armv8 processor does not provide a valid syndrome for decoding some
      * instructions. So in order to process these instructions, Xen must
diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
index 120c971b0f..e491ca15d7 100644
--- a/xen/arch/arm/traps.c
+++ b/xen/arch/arm/traps.c
@@ -1923,6 +1923,7 @@ static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
     bool is_data = (hsr.ec == HSR_EC_DATA_ABORT_LOWER_EL);
     mmio_info_t info;
     enum io_state state;
+    bool check_mmio_region = true;
 
     /*
      * If this bit has been set, it means that this stage-2 abort is caused
@@ -1987,7 +1988,16 @@ static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
          */
         if ( !is_data || !info.dabt.valid )
         {
-            if ( check_p2m(is_data, gpa) )
+            /*
+             * If the translation fault was caused due to access to stage 1
+             * translation table, then we try to set the translation table entry
+             * for page1 translation table (assuming that it is in the non mmio
+             * region).
+             */
+            if ( xabt.s1ptw )
+                check_mmio_region = false;
+
+            if ( check_p2m((is_data && check_mmio_region), gpa) )
                 return;
 
             /*
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 12:40:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 12:40:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281336.479645 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP1nz-0006Hs-R6; Tue, 01 Mar 2022 12:40:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281336.479645; Tue, 01 Mar 2022 12:40:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP1nz-0006FM-KO; Tue, 01 Mar 2022 12:40:39 +0000
Received: by outflank-mailman (input) for mailman id 281336;
 Tue, 01 Mar 2022 12:40:38 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=kl2V=TM=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nP1ny-0005sl-0t
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 12:40:38 +0000
Received: from NAM10-BN7-obe.outbound.protection.outlook.com
 (mail-bn7nam10on20619.outbound.protection.outlook.com
 [2a01:111:f400:7e8a::619])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c99c4667-995c-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 13:40:35 +0100 (CET)
Received: from SN2PR01CA0018.prod.exchangelabs.com (2603:10b6:804:2::28) by
 CO6PR02MB8740.namprd02.prod.outlook.com (2603:10b6:303:137::20) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.13; Tue, 1 Mar
 2022 12:40:31 +0000
Received: from SN1NAM02FT0008.eop-nam02.prod.protection.outlook.com
 (2603:10b6:804:2:cafe::5c) by SN2PR01CA0018.outlook.office365.com
 (2603:10b6:804:2::28) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Tue, 1 Mar 2022 12:40:31 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (149.199.80.198) by
 SN1NAM02FT0008.mail.protection.outlook.com (10.97.5.9) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5017.22 via Frontend Transport; Tue, 1 Mar 2022 12:40:31 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 1 Mar 2022 12:40:29 +0000
Received: from smtp.xilinx.com (172.21.105.198) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 1 Mar 2022 12:40:29 +0000
Received: from [10.108.8.223] (port=53852 helo=xcbayankuma41x.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nP1np-0000Ui-Kn; Tue, 01 Mar 2022 12:40:29 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c99c4667-995c-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Dnf2ucCp7HQSW8784E9FbEEtd1BklkSLuEqx+v77R5SJB0i3XfNm8k3DsNRNZKd2GqlTyId+dJGCXge1ZvaMw+/8M5PFfLoaQnC+vnGx1eEILLPqjUzTG57ZozmKdbqPUv07YbhTky6v0iOWEuSkGLPOWTGMoblXJdG5qpVqXtA/InJ/u/2+K+K5eCiiHK5QoNY0erajmp4cU0sgQxFRQ4nlf4d80dxuy4BriX/hDXIs2EO9m/CXx6RDlWvkQQ8GzAoNgzoYFCZpEWCXR/wKnbbX7PIh68jWSIcK/tGdY31hr8WEN4ZnioQpHpACEN44tMwfqN4co+zcLYJ3JG031A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Bhj1NX8FCoRo5gnmWG26pkZJvCkh97mFevBkM0EGpmA=;
 b=Feh0poPbLm2UzLO2lnEOPyLCMsehc6yVVDDoaEm1qkT+x4yvVGUh+Mo1nH6AjFgSRgBs0Nvw53BwoqIfKTZmXAY4eL8zBX/cCz2JSto5cIQqaOjRYBO/p5r9IuGaIpnhAhopqhyEzk8A80V32gkBhbVts25+6w4uCpQmv/qjXiW4xt/YtB2qgZZGjZJp2Tdwb/3HqZxUDZOLCwVA2f9wq4sHw/mY0xZpicj91UsiKsCq62SZJdzJJHfi/xsdceyrxP6pDfMf5lXKeyEpoq1WWJI0HlsKbxAYefCAoZ+aISff2sAV/hGEGQmreCEZCDGSmgb+oU4kZhjE39Z/Wtmqvg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Bhj1NX8FCoRo5gnmWG26pkZJvCkh97mFevBkM0EGpmA=;
 b=RmcDEf1nBumi+UTERObK3HTC/mkNyHmXDIVsp4f1WrnOLduUbpHsaEW2NCsP8Edd/56FCTjQt4wvLwb5eSIQTT+QItxcNGbbDDIV9g5VzQLyqFCJy43BQ7Y7ZfpcKOhNSdCUzGJAPREkPd1rN+GKWoS8QIM6xgf2UblNCiQnaCE=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch01.xlnx.xilinx.com;
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <stefanos@xilinx.com>, <julien@xen.org>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>, Ayan Kumar Halder
	<ayankuma@xilinx.com>
Subject: [XEN v9 2/4] xen/arm64: io: Support instructions (for which ISS is not valid) on emulated MMIO region using MMIO/ioreq handler
Date: Tue, 1 Mar 2022 12:40:20 +0000
Message-ID: <20220301124022.10168-3-ayankuma@xilinx.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220301124022.10168-1-ayankuma@xilinx.com>
References: <20220301124022.10168-1-ayankuma@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5aff75a4-4b86-4aa3-fdd7-08d9fb80ac5f
X-MS-TrafficTypeDiagnostic: CO6PR02MB8740:EE_
X-Microsoft-Antispam-PRVS:
	<CO6PR02MB874005E6C65A6F31BD3B78ACB2029@CO6PR02MB8740.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	b+hZrp6fQ+UscmT3sS9oUSOC42bmjJKZpZhAusJuUUg7kJ8WWelMVxPXNsPQbjEZojt4oKaQSwTNOcGmI/WZA7odax7SWdBGHHvCxTmnQs4/C0II5TZQugBtM3iNJ+R3MD/q8O+cikvIwk6dNSOyJ+u+lrFy9ciCHDS3rTQabT6uCmQhcWBjucWhOxlFJIyhyqlUVzwJF1e/ZajsVuJ1KkJiCSQXsSO5xGnPwudNYW/IdUd0a/OAwaW+Ct4BlHFTiXTcjcR59cKdBpYbDjg0mgOHoex492Ps0aq8r+P2EP8mDhhPokkrv6ylRvKK/FPcEC4PtmBpWI9qyudLAWbR1Wfe1oWTtXSSKwu4sAA8TkFNJw5Ody/NWAcjesj+FhvL2rBE2phB7IsYKvVT1eee/ZEFfJwGGyvK51CUa/0mNyqpv5We0i5eIqe+Bf4QuqLnSxtB0A3s2XOaNcgxzM9vL5xy/ksDQXBk0L0esIZkbOrg6jQrAKXBxzBk8K5bqlhpFnqlmpevkX5cNtdhSYuZMXefy8lzdyDr+JPjDx4aT1reYYqjIOWqCu5Xy0egKMt9WHTdLgUDMHcadhoZ5L1rpdY7eic8IUdyDGClIVnNHD0Ptz5GxbM+SuOj99swTsGoVHx5SabnjbpiXhWjhH8lRo/cMrMCQoqNVOMOmN2xzPEqIk0keKYSkMGiIqoS015b/oBeYaWFN0zLed126dLo1d2S4MTFPG0OaAvw7yz6db4=
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch01.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(7636003)(356005)(5660300002)(7696005)(47076005)(426003)(336012)(2906002)(186003)(83380400001)(2616005)(82310400004)(36860700001)(26005)(1076003)(316002)(8936002)(6916009)(54906003)(9786002)(4326008)(8676002)(508600001)(36756003)(70206006)(70586007)(6666004)(30864003)(40460700003)(7416002)(107886003)(102446001)(473944003);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 12:40:31.2400
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 5aff75a4-4b86-4aa3-fdd7-08d9fb80ac5f
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch01.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	SN1NAM02FT0008.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO6PR02MB8740

When an instruction is trapped in Xen due to translation fault, Xen
checks if the ISS is invalid (for data abort) or it is an instruction
abort. If so, Xen tries to resolve the translation fault using p2m page
tables. In case of data abort, Xen will try to map the mmio region to
the guest (ie tries to emulate the mmio region).

If the ISS is not valid and it is a data abort, then Xen tries to
decode the instruction. In case of ioreq, Xen  saves the decoding state,
rn and imm9 to vcpu_io. Whenever the vcpu handles the ioreq successfully,
it will read the decoding state to determine if the instruction decoded
was a ldr/str post indexing (ie INSTR_LDR_STR_POSTINDEXING). If so, it
uses these details to post increment rn.

In case of mmio handler, if the mmio operation was successful, then Xen
retrives the decoding state, rn and imm9. For state ==
INSTR_LDR_STR_POSTINDEXING, Xen will update rn.

If there is an error encountered while decoding/executing the instruction,
Xen will forward the abort to the guest.

Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
---

Changelog :-

v2..v5 - Mentioned in the cover letter.

v6 - 1. Mantained the decoding state of the instruction. This is used by the
caller to either abort the guest or retry or ignore or perform read/write on
the mmio region.

2. try_decode() invokes decoding for both aarch64 and thumb state. (Previously
it used to invoke decoding only for aarch64 state). Thus, it handles all the
checking of the registers before invoking any decoding of instruction.
try_decode_instruction_invalid_iss() has thus been removed.

3. Introduced a new field('enum instr_decode_state state') inside
'struct instr_details'. This holds the decoding state of the instruction.
This is later read by the post_increment_register() to determine if rn needs to
be incremented. Also, this is read by the callers of try_decode_instruction()
to determine if the instruction was valid or ignored or to be retried or
error or decoded successfully.

4. Also stored 'instr_details' inside 'struct ioreq'. This enables
arch_ioreq_complete_mmio() to invoke post_increment_register() without decoding
the instruction again.

5. Check hsr.dabt.valid in do_trap_stage2_abort_guest(). If it is not valid,
then decode the instruction. This ensures that try_handle_mmio() is invoked only
when the instruction is either valid or decoded successfully.

6. Inside do_trap_stage2_abort_guest(), if hsr.dabt.valid is not set, then
resolve the translation fault before trying to decode the instruction. If
translation fault is resolved, then return to the guest to execute the instruction
again.


v7 - 1. Moved the decoding instruction details ie instr_details from 'struct ioreq'
to 'struct vcpu_io'.

2. The instruction is decoded only when we get a data abort.

3. Replaced ASSERT_UNREACHABLE() with domain_crash(). The reason being asserts
can be disabled in some builds. In this scenario when the guest's cpsr is in an
erroneous state, Xen should crash the guest.

4. Introduced check_p2m() which invokes p2m_resolve_translation_fault() and
try_map_mmio() to resolve translation fault by configuring the page tables. This
gets invoked first if ISS is invalid and it is an instruction abort. If it is
a data abort and hsr.dabt.s1ptw is set or try_handle_mmio() returns IO_UNHANDLED,
then check_p2m() gets invoked again.


v8 - 1. Removed the handling of data abort when info->dabt.cache is set. This will
be implemented in a subsequent patch. (Not as part of this series)

2. When the data abort is due to access to stage 1 translation tables, Xen will
try to fix the mapping of the page table for the corresponding address. If this
returns an error, Xen will abort the guest. Else, it will ask the guest to retry
the instruction.

3. Changed v->io.info.dabt_instr from pointer to variable. The reason being that
arch_ioreq_complete_mmio() is called from leave_hypervisor_to_guest().
That is after do_trap_stage2_abort_guest()  has been invoked. So the original
variable will be no longer valid.

4. Some other style issues pointed out in v7.


v9 - 1. Ensure that "Erratum 766422" is handled only when ISS is valid.

2. Whenever Xen receives and instruction abort or data abort (with invalid ISS),
Xen should first try to resolve the p2m translation fault or see if it it needs
to map a MMIO region. If it succeeds, it should return to the guest to retry the
instruction.

3. Removed handling of "dabt.s1ptw == 1" aborts. This is addressed in patch3 as
it is an existing bug in codebase.

4. Various style issues pointed by Julien in v8.

 xen/arch/arm/arm32/traps.c        | 11 ++++
 xen/arch/arm/arm64/traps.c        | 47 ++++++++++++++++
 xen/arch/arm/decode.c             |  1 +
 xen/arch/arm/include/asm/domain.h |  4 ++
 xen/arch/arm/include/asm/mmio.h   | 17 +++++-
 xen/arch/arm/include/asm/traps.h  |  2 +
 xen/arch/arm/io.c                 | 90 +++++++++++++++++++------------
 xen/arch/arm/ioreq.c              |  7 ++-
 xen/arch/arm/traps.c              | 77 ++++++++++++++++++++------
 xen/arch/x86/include/asm/ioreq.h  |  3 ++
 xen/include/xen/sched.h           |  2 +
 11 files changed, 207 insertions(+), 54 deletions(-)

diff --git a/xen/arch/arm/arm32/traps.c b/xen/arch/arm/arm32/traps.c
index 9c9790a6d1..159e3cef8b 100644
--- a/xen/arch/arm/arm32/traps.c
+++ b/xen/arch/arm/arm32/traps.c
@@ -18,9 +18,11 @@
 
 #include <xen/lib.h>
 #include <xen/kernel.h>
+#include <xen/sched.h>
 
 #include <public/xen.h>
 
+#include <asm/mmio.h>
 #include <asm/processor.h>
 #include <asm/traps.h>
 
@@ -82,6 +84,15 @@ void do_trap_data_abort(struct cpu_user_regs *regs)
         do_unexpected_trap("Data Abort", regs);
 }
 
+void post_increment_register(const struct instr_details *instr)
+{
+    /*
+     * We have not implemented decoding of post indexing instructions for 32 bit.
+     * Thus, this should be unreachable.
+     */
+    domain_crash(current->domain);
+}
+
 /*
  * Local variables:
  * mode: C
diff --git a/xen/arch/arm/arm64/traps.c b/xen/arch/arm/arm64/traps.c
index 9113a15c7a..e18b6b2626 100644
--- a/xen/arch/arm/arm64/traps.c
+++ b/xen/arch/arm/arm64/traps.c
@@ -17,6 +17,7 @@
  */
 
 #include <xen/lib.h>
+#include <xen/sched.h>
 
 #include <asm/hsr.h>
 #include <asm/system.h>
@@ -44,6 +45,52 @@ void do_bad_mode(struct cpu_user_regs *regs, int reason)
     panic("bad mode\n");
 }
 
+void post_increment_register(const struct instr_details *instr)
+{
+    struct cpu_user_regs *regs = guest_cpu_user_regs();
+    register_t val = 0;
+
+    /* Currently, we handle only ldr/str post indexing instructions */
+    if ( instr->state != INSTR_LDR_STR_POSTINDEXING )
+        return;
+
+    /*
+     * Handle when rn = SP
+     * Refer ArmV8 ARM DDI 0487G.b, Page - D1-2463 "Stack pointer register
+     * selection"
+     * t = SP_EL0
+     * h = SP_ELx
+     * and M[3:0] (Page - C5-474 "When exception taken from AArch64 state:")
+     */
+    if (instr->rn == 31 )
+    {
+        if ( (regs->cpsr & PSR_MODE_MASK) == PSR_MODE_EL1h )
+            val = regs->sp_el1;
+        else if ( ((regs->cpsr & PSR_MODE_MASK) == PSR_MODE_EL1t) ||
+                    ((regs->cpsr & PSR_MODE_MASK) == PSR_MODE_EL0t) )
+            val = regs->sp_el0;
+        else
+        {
+            domain_crash(current->domain);
+            return;
+        }
+    }
+    else
+        val = get_user_reg(regs, instr->rn);
+
+    val += instr->imm9;
+
+    if ( instr->rn == 31 )
+    {
+        if ( (regs->cpsr & PSR_MODE_MASK) == PSR_MODE_EL1h )
+            regs->sp_el1 = val;
+        else
+            regs->sp_el0 = val;
+    }
+    else
+        set_user_reg(regs, instr->rn, val);
+}
+
 /*
  * Local variables:
  * mode: C
diff --git a/xen/arch/arm/decode.c b/xen/arch/arm/decode.c
index 3add87e83a..16ad0747bb 100644
--- a/xen/arch/arm/decode.c
+++ b/xen/arch/arm/decode.c
@@ -146,6 +146,7 @@ static int decode_arm64(register_t pc, mmio_info_t *info)
 
     update_dabt(dabt, opcode.ldr_str.rt, opcode.ldr_str.size, false);
 
+    dabt_instr->state = INSTR_LDR_STR_POSTINDEXING;
     dabt_instr->rn = opcode.ldr_str.rn;
     dabt_instr->imm9 = opcode.ldr_str.imm9;
 
diff --git a/xen/arch/arm/include/asm/domain.h b/xen/arch/arm/include/asm/domain.h
index c56f6e4398..ed63c2b6f9 100644
--- a/xen/arch/arm/include/asm/domain.h
+++ b/xen/arch/arm/include/asm/domain.h
@@ -281,6 +281,10 @@ static inline void arch_vcpu_block(struct vcpu *v) {}
 /* vPCI is not available on Arm */
 #define has_vpci(d)    ({ (void)(d); false; })
 
+struct arch_vcpu_io {
+    struct instr_details dabt_instr; /* when the instruction is decoded */
+};
+
 #endif /* __ASM_DOMAIN_H__ */
 
 /*
diff --git a/xen/arch/arm/include/asm/mmio.h b/xen/arch/arm/include/asm/mmio.h
index 3354d9c635..ef2c57a2d5 100644
--- a/xen/arch/arm/include/asm/mmio.h
+++ b/xen/arch/arm/include/asm/mmio.h
@@ -26,12 +26,24 @@
 
 #define MAX_IO_HANDLER  16
 
+enum instr_decode_state
+{
+    INSTR_ERROR,                    /* Error encountered while decoding instr */
+    INSTR_VALID,                    /* ISS is valid, so no need to decode */
+    /*
+     * Instruction is decoded successfully. It is a ldr/str post indexing
+     * instruction.
+     */
+    INSTR_LDR_STR_POSTINDEXING
+};
+
 typedef struct
 {
     struct hsr_dabt dabt;
     struct instr_details {
         unsigned long rn:5;
         signed int imm9:9;
+        enum instr_decode_state state;
     } dabt_instr;
     paddr_t gpa;
 } mmio_info_t;
@@ -69,14 +81,15 @@ struct vmmio {
 };
 
 enum io_state try_handle_mmio(struct cpu_user_regs *regs,
-                              const union hsr hsr,
-                              paddr_t gpa);
+                              mmio_info_t *info);
 void register_mmio_handler(struct domain *d,
                            const struct mmio_handler_ops *ops,
                            paddr_t addr, paddr_t size, void *priv);
 int domain_io_init(struct domain *d, int max_count);
 void domain_io_free(struct domain *d);
 
+void try_decode_instruction(const struct cpu_user_regs *regs,
+                            mmio_info_t *info);
 
 #endif  /* __ASM_ARM_MMIO_H__ */
 
diff --git a/xen/arch/arm/include/asm/traps.h b/xen/arch/arm/include/asm/traps.h
index 2ed2b85c6f..95c46ad391 100644
--- a/xen/arch/arm/include/asm/traps.h
+++ b/xen/arch/arm/include/asm/traps.h
@@ -109,6 +109,8 @@ static inline register_t sign_extend(const struct hsr_dabt dabt, register_t r)
     return r;
 }
 
+void post_increment_register(const struct instr_details *instr);
+
 #endif /* __ASM_ARM_TRAPS__ */
 /*
  * Local variables:
diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
index fad103bdbd..bea69ffb08 100644
--- a/xen/arch/arm/io.c
+++ b/xen/arch/arm/io.c
@@ -102,57 +102,79 @@ static const struct mmio_handler *find_mmio_handler(struct domain *d,
     return handler;
 }
 
+void try_decode_instruction(const struct cpu_user_regs *regs,
+                            mmio_info_t *info)
+{
+    int rc;
+
+    if ( info->dabt.valid )
+    {
+        info->dabt_instr.state = INSTR_VALID;
+
+        /*
+         * Erratum 766422: Thumb store translation fault to Hypervisor may
+         * not have correct HSR Rt value.
+         */
+        if ( check_workaround_766422() && (regs->cpsr & PSR_THUMB) &&
+             info->dabt.write )
+        {
+            rc = decode_instruction(regs, info);
+            if ( rc )
+            {
+                gprintk(XENLOG_DEBUG, "Unable to decode instruction\n");
+                info->dabt_instr.state = INSTR_ERROR;
+            }
+        }
+        return;
+    }
+
+    /*
+     * Armv8 processor does not provide a valid syndrome for decoding some
+     * instructions. So in order to process these instructions, Xen must
+     * decode them.
+     */
+    rc = decode_instruction(regs, info);
+    if ( rc )
+    {
+        gprintk(XENLOG_ERR, "Unable to decode instruction\n");
+        info->dabt_instr.state = INSTR_ERROR;
+    }
+}
+
 enum io_state try_handle_mmio(struct cpu_user_regs *regs,
-                              const union hsr hsr,
-                              paddr_t gpa)
+                              mmio_info_t *info)
 {
     struct vcpu *v = current;
     const struct mmio_handler *handler = NULL;
-    const struct hsr_dabt dabt = hsr.dabt;
-    mmio_info_t info = {
-        .gpa = gpa,
-        .dabt = dabt
-    };
+    int rc;
 
-    ASSERT(hsr.ec == HSR_EC_DATA_ABORT_LOWER_EL);
+    ASSERT(info->dabt.ec == HSR_EC_DATA_ABORT_LOWER_EL);
 
-    handler = find_mmio_handler(v->domain, info.gpa);
-    if ( !handler )
+    if ( !((info->dabt_instr.state == INSTR_VALID) || (info->dabt_instr.state == INSTR_LDR_STR_POSTINDEXING)) )
     {
-        int rc;
+        ASSERT_UNREACHABLE();
+        return IO_ABORT;
+    }
 
-        rc = try_fwd_ioserv(regs, v, &info);
+    handler = find_mmio_handler(v->domain, info->gpa);
+    if ( !handler )
+    {
+        rc = try_fwd_ioserv(regs, v, info);
         if ( rc == IO_HANDLED )
             return handle_ioserv(regs, v);
 
         return rc;
     }
 
-    /* All the instructions used on emulated MMIO region should be valid */
-    if ( !dabt.valid )
-        return IO_ABORT;
-
     /*
-     * Erratum 766422: Thumb store translation fault to Hypervisor may
-     * not have correct HSR Rt value.
+     * At this point, we know that the instruction is either valid or has been
+     * decoded successfully. Thus, Xen should be allowed to execute the
+     * instruction on the emulated MMIO region.
      */
-    if ( check_workaround_766422() && (regs->cpsr & PSR_THUMB) &&
-         dabt.write )
-    {
-        int rc;
-
-        rc = decode_instruction(regs, &info);
-        if ( rc )
-        {
-            gprintk(XENLOG_DEBUG, "Unable to decode instruction\n");
-            return IO_ABORT;
-        }
-    }
-
-    if ( info.dabt.write )
-        return handle_write(handler, v, &info);
+    if ( info->dabt.write )
+        return handle_write(handler, v, info);
     else
-        return handle_read(handler, v, &info);
+        return handle_read(handler, v, info);
 }
 
 void register_mmio_handler(struct domain *d,
diff --git a/xen/arch/arm/ioreq.c b/xen/arch/arm/ioreq.c
index 308650b400..58cd320b5a 100644
--- a/xen/arch/arm/ioreq.c
+++ b/xen/arch/arm/ioreq.c
@@ -47,6 +47,7 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
                              struct vcpu *v, mmio_info_t *info)
 {
     struct vcpu_io *vio = &v->io;
+    struct dabt_instr instr = info->dabt_instr;
     ioreq_t p = {
         .type = IOREQ_TYPE_COPY,
         .addr = info->gpa,
@@ -76,10 +77,10 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
     if ( !s )
         return IO_UNHANDLED;
 
-    if ( !info->dabt.valid )
-        return IO_ABORT;
+    ASSERT(dabt.valid);
 
     vio->req = p;
+    vio->info.dabt_instr = instr;
 
     rc = ioreq_send(s, &p, 0);
     if ( rc != IO_RETRY || v->domain->is_shutting_down )
@@ -95,6 +96,7 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
 bool arch_ioreq_complete_mmio(void)
 {
     struct vcpu *v = current;
+    struct instr_details dabt_instr = v->io.info.dabt_instr;
     struct cpu_user_regs *regs = guest_cpu_user_regs();
     const union hsr hsr = { .bits = regs->hsr };
 
@@ -106,6 +108,7 @@ bool arch_ioreq_complete_mmio(void)
 
     if ( handle_ioserv(regs, v) == IO_HANDLED )
     {
+        post_increment_register(&dabt_instr);
         advance_pc(regs, hsr);
         return true;
     }
diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
index 7a1b679b8c..120c971b0f 100644
--- a/xen/arch/arm/traps.c
+++ b/xen/arch/arm/traps.c
@@ -1893,6 +1893,21 @@ static bool try_map_mmio(gfn_t gfn)
     return !map_regions_p2mt(d, gfn, 1, mfn, p2m_mmio_direct_c);
 }
 
+static inline bool check_p2m(bool is_data, paddr_t gpa)
+{
+    /*
+     * First check if the translation fault can be resolved by the P2M subsystem.
+     * If that's the case nothing else to do.
+     */
+    if ( p2m_resolve_translation_fault(current->domain , gaddr_to_gfn(gpa)) )
+        return true;
+
+    if ( is_data && try_map_mmio(gaddr_to_gfn(gpa)) )
+        return true;
+
+    return false;
+}
+
 static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
                                        const union hsr hsr)
 {
@@ -1906,6 +1921,8 @@ static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
     paddr_t gpa;
     uint8_t fsc = xabt.fsc & ~FSC_LL_MASK;
     bool is_data = (hsr.ec == HSR_EC_DATA_ABORT_LOWER_EL);
+    mmio_info_t info;
+    enum io_state state;
 
     /*
      * If this bit has been set, it means that this stage-2 abort is caused
@@ -1959,21 +1976,52 @@ static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
         return;
     }
     case FSC_FLT_TRANS:
+    {
+        info.gpa = gpa;
+        info.dabt = hsr.dabt;
+
         /*
-         * Attempt first to emulate the MMIO as the data abort will
-         * likely happen in an emulated region.
-         *
-         * Note that emulated region cannot be executed
+         * Assumption :- Most of the times when we get a data abort and the ISS
+         * is invalid or an instruction abort, the underlying cause is that the
+         * page tables have not been set up correctly.
          */
-        if ( is_data )
+        if ( !is_data || !info.dabt.valid )
         {
-            enum io_state state = try_handle_mmio(regs, hsr, gpa);
+            if ( check_p2m(is_data, gpa) )
+                return;
 
-            switch ( state )
-            {
+            /*
+             * If the instruction abort could not be resolved by setting the
+             * appropriate bits in the translation table, then Xen should
+             * forward the abort to the guest.
+             */
+            if ( !is_data )
+                goto inject_abt;
+        }
+
+        try_decode_instruction(regs, &info);
+
+        /*
+         * If Xen could not decode the instruction or encountered an error
+         * while decoding, then it should forward the abort to the guest.
+         */
+        if ( info.dabt_instr.state == INSTR_ERROR )
+            goto inject_abt;
+
+        state = try_handle_mmio(regs, &info);
+
+        switch ( state )
+        {
             case IO_ABORT:
                 goto inject_abt;
             case IO_HANDLED:
+                /*
+                 * If the instruction was decoded and has executed successfully
+                 * on the MMIO region, then Xen should execute the next part of
+                 * the instruction. (for eg increment the rn if it is a
+                 * post-indexing instruction.
+                 */
+                post_increment_register(&info.dabt_instr);
                 advance_pc(regs, hsr);
                 return;
             case IO_RETRY:
@@ -1982,21 +2030,18 @@ static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
             case IO_UNHANDLED:
                 /* IO unhandled, try another way to handle it. */
                 break;
-            }
         }
 
         /*
-         * First check if the translation fault can be resolved by the
-         * P2M subsystem. If that's the case nothing else to do.
+         * If the instruction syndrome was invalid, then we already checked if
+         * this was due to a P2M fault. So no point to check again as the result
+         * will be the same.
          */
-        if ( p2m_resolve_translation_fault(current->domain,
-                                           gaddr_to_gfn(gpa)) )
-            return;
-
-        if ( is_data && try_map_mmio(gaddr_to_gfn(gpa)) )
+        if ( info.dabt.valid && check_p2m(is_data, gpa) )
             return;
 
         break;
+    }
     default:
         gprintk(XENLOG_WARNING,
                 "Unsupported FSC: HSR=%#"PRIregister" DFSC=%#x\n",
diff --git a/xen/arch/x86/include/asm/ioreq.h b/xen/arch/x86/include/asm/ioreq.h
index d06ce9a6ea..ecfe7f9fdb 100644
--- a/xen/arch/x86/include/asm/ioreq.h
+++ b/xen/arch/x86/include/asm/ioreq.h
@@ -26,6 +26,9 @@
 #include <asm/hvm/ioreq.h>
 #endif
 
+struct arch_vcpu_io {
+};
+
 #endif /* __ASM_X86_IOREQ_H__ */
 
 /*
diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
index 10ea969c7a..406d9bc610 100644
--- a/xen/include/xen/sched.h
+++ b/xen/include/xen/sched.h
@@ -160,6 +160,8 @@ struct vcpu_io {
     /* I/O request in flight to device model. */
     enum vio_completion  completion;
     ioreq_t              req;
+    /* Arch specific info pertaining to the io request */
+    struct arch_vcpu_io  info;
 };
 
 struct vcpu
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 12:48:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 12:48:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281374.479683 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP1vz-0000mj-54; Tue, 01 Mar 2022 12:48:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281374.479683; Tue, 01 Mar 2022 12:48:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP1vz-0000mc-20; Tue, 01 Mar 2022 12:48:55 +0000
Received: by outflank-mailman (input) for mailman id 281374;
 Tue, 01 Mar 2022 12:48:54 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=YI9j=TM=citrix.com=prvs=0520bb690=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nP1vy-0000mV-Cw
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 12:48:54 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f151a782-995d-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 13:48:52 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f151a782-995d-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646138932;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=oZo5lPjNxNbmBmBf/ntNRJMOZECLKTp51QAUaoMkA7w=;
  b=BE1oNPLzOAXC4FQvt0hfzGafNn6RG91RPVRV5zQjjywaEVKPGOc7UikW
   ecUBadhRvOkR8fnV5phvCuH0Nf9Mhn+SDkH234U20nQpVG8gtybBTaO+k
   WKc8whNp/QgXR3+qo7aXGlX2yx/CVWIxcOY6fbs83IRibzrgvJmGfxx7q
   w=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67500473
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:XDDEy6jaLPgcvHr3yA8SOiQfX161fRAKZh0ujC45NGQN5FlHY01je
 htvXGHUbPmCZGDzftx/a4+x8U9V7JeDn9A1QVY4+Sw2QS8b9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFvU4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YT15ML/0vfo3aQdFOCZQL7xn2uHNO2fq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bklhmwSvUErANRpfbTr+RzdRZwC0xloZFGvO2i
 88xN2UyNEycPEYn1lE/KNFvueKvhybFLDB8tFeou4Qq5kz0w1kkuFTqGIWMIYHbLSlPpW6Ho
 krW8mK/BQsVXPSPxDzA/n+yi+vnmSLgRJlUBLC+7uRtglCY2ioUEhJ+fVmxrOS9i0W+c8lCM
 EFS8S0rxZXe72TyEIO7BUfh5ifZ4FhMALK8DtHW9im3mqTG2yOHLFIaUxVGRs43le1oTyY1g
 wrhc8zSORRjt7icSHS4/7iSrC+vNSV9EVLudRPoXiNevYC9/dhbYgbnC486TfXr1oGd9STYn
 mjSxBXSkYn/miLiO0+T2VncywyhqZHSJuLezlWGBzn1hu+ViWPMWmBJ1bQ5xasYRGp6ZgPY1
 JThpyR4xLpWZX1qvHbQKNjh5Jnzu5643MT02DaD5aUJ+TW34GKEdotN+jx4L0oBGp9aJWGxP
 xSN5VoIvc470J6WgUlfOdnZ5yMCl/WIKDgYfqqMMoomjmZZLmdrAx2ClWbPhjuwwSDAYIk0O
 IuBcNbEMJrpIf8P8dZCfM9EieVD7nlnnQv7HMmnpzz6gev2TCPEEt8tbQrRBt3VGYvZ+W05B
 f4EbJDUo/ieOcWjChTqHXk7dghbfSBmXsmt86S6tIere2JbJY3oMNeIqZsJcI15haVF0ODO+
 3C2QEhDz1Tjw3bALG23hrpLNNsDgb4XQaoHABER
IronPort-HdrOrdr: A9a23:IQYcTqslujTT3DRjDmRJpbmI7skC2IMji2hC6mlwRA09TyXGra
 +TdaUguSMc1gx9ZJh5o6H8BEGBKUmskKKceeEqTPiftXrdyReVxeZZnMXfKlzbamHDH4tmu5
 uIHJIOceEYYWIK7voSpTPIaerIo+P3sZxA592ut0uFJDsCA8oLjmdE40SgYzZLrWF9dMEE/f
 Gnl656Tk+bCBIqh7OAdx44tob41r/2vaOjRSRDKw8s6QGIgz/twqX9CQKk0hAXVC4K6as+8E
 De+jaJppmLgrWe8FvxxmXT55NZlJ/K0d1YHvGBjcATN3HFlhuoXoJ8QLeP1QpF491HqWxa0u
 UkkS1Qe/ib2EmhOV1dZiGdnTUI5QxerkMKD2Xo2EcL7/aJHA7SQPAx+r6xOiGplXbI+usMip
 6jlljpx6a+R3n77VXAzsmNWBdwmkWup30+1eYVknxESIMbLKRctIoF4SpuYdw99Q/Bmcka+d
 NVfYnhDTdtACenRmGcunMqzM2nX3w1EBvDSk8eutaN2zwTmHxi1UMXyMEWg39FrfsGOtR5zv
 WBNr4tmKBFT8cQY644DOAdQdGvAmiIRR7XKmqdLVnuCalCMXPQrJz85qkz+YiRCdY15Yp3nI
 6EXEJTtGY0dU6rAcqS3IdT+hSIW2m5VSSF8LAp23G4gMyKeFPGC1zwdLl1qbrSnxw2OLyvZ8
 qO
X-IronPort-AV: E=Sophos;i="5.90,146,1643691600"; 
   d="scan'208";a="67500473"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Epf6X6V+N/txvJx/Qo2uGlRYz+ITXPduccgIYaH5Jz8GcdAQb5VFmoq7XxLJQEwOjydDpIv83KR/zoULwreMsjrjNToZhnv40Rpaubfhb/l/Ki7OpLUIJl8e5Q3W4DEwTSMVL3TzOPR/ZwjHmnYUMXcHp5OjHZoYWONE1gP0Kn9pAqVZyBMDbgZTeFRAftbKYvJ7bJPB7b5qXfYmmTANb/tMRo41/8FbwcfOlAfegsZAAzGGai4QfkSaWwr/qwk5MWn+peijSUO7uHatqdC18yvAb1JbrbpcIUHmT4aEBB9srVjlNngZrw5+v/nkqrjNrjuTscD3En6dLh4zroiaWA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=oZo5lPjNxNbmBmBf/ntNRJMOZECLKTp51QAUaoMkA7w=;
 b=m/zfsJZVl6rEsmD6FLFVc9lLdsYqU/mIzLXD3YAh+6dONFhYfeGV4g8JkqZ6B+zM0aIuxtRodZZ9Ie0N25+rxAQPMdWzMvgdoLRD0Gsj9L70v6MeQd3FWqzonEmts48Brsv1khDAKk/c6LgHWPIlV3Om2Ui3zbSiJi95iqlxBv5rgz+17wM/Wj2mgwE83zBJz6d5DpUpNtGBA/y2cDAmXeHYVvlHbbSJI7OZKNYeIgDmk14aQYUss4vkMKy4ZqO3YlzS9oSdMFd79mWUrK9tjjg4sKtUNleQZp+Q1rHrdaC+lMm2XsK2GAQwgr7ONMUadMyeNTV/f2aX3B/ZGYjuqg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=oZo5lPjNxNbmBmBf/ntNRJMOZECLKTp51QAUaoMkA7w=;
 b=tcpBtXvTTr1HgL/BBMAigmr1lFXiB8AuBd8jsSQUDoEfeki8WaoijRwKoSwvsbJ2SW9yCCNf0WlT9xHsOB8yvhjaqmxr+Bns0GjGmu/nPFxn5HRCU4n72LzWxKcjxNbKvoYWPsbJoFCe2HvTnuu6ynkfvOiYbxdtHGySbYmdjBU=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Wei Liu <wl@xen.org>, Roger Pau Monne <roger.pau@citrix.com>
Subject: Re: [PATCH] x86/altcall: silence undue warning
Thread-Topic: [PATCH] x86/altcall: silence undue warning
Thread-Index: AQHYLWCYr1nVwle0TEu9TqkN6fmfJ6yqeogA
Date: Tue, 1 Mar 2022 12:48:26 +0000
Message-ID: <40306bc7-f61c-d330-0ec7-d986e4711d88@citrix.com>
References: <0e3594ff-c637-46f2-bc95-7a26b5471b86@suse.com>
In-Reply-To: <0e3594ff-c637-46f2-bc95-7a26b5471b86@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 0d03efde-6d91-42ab-3f3d-08d9fb81c79c
x-ms-traffictypediagnostic: BN6PR03MB2945:EE_
x-microsoft-antispam-prvs: <BN6PR03MB29459742E53CD3A3D6D920A2BA029@BN6PR03MB2945.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(66446008)(66946007)(66476007)(91956017)(66556008)(64756008)(4326008)(83380400001)(8676002)(86362001)(76116006)(186003)(110136005)(6506007)(71200400001)(107886003)(2616005)(26005)(31686004)(36756003)(316002)(54906003)(6512007)(53546011)(508600001)(6486002)(8936002)(82960400001)(5660300002)(38100700002)(122000001)(38070700005)(31696002)(2906002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?RENiYTkzeW9VY3p6LzZpaE5UVmQxUXh0MkJxbmZqdTBiS1U3cDFuNzBqTGFU?=
 =?utf-8?B?YTZrZ2pacGdMKzRacnVKVXlzZUVPQjRWK0toOFJOZjIveVhyOU1sWHNFcjFM?=
 =?utf-8?B?alVYMUhJSG9Gamh0NVp6cnJaY3BXSk1laVR2V2EvQ1hsVmpEbXIzRDFFYUJn?=
 =?utf-8?B?dGFUTHB4U1kzSUVkUXB0RXNLaDUySWthenlicmQwN0Y0WVZBZWd0R3k1bEE1?=
 =?utf-8?B?WXB6UUdnaFVqTnF3WFVvV3RQZjBsZkNwM3lxMjhuYUNUMjQ1akVzNnhVcVNR?=
 =?utf-8?B?SzNCb3JlV3ZaSVRBaXE5bm5KbkdUa1JXcFJUM2t0OG1pSy94Ly9DQkZTaHRl?=
 =?utf-8?B?VzdnTy9BbDJRLzY4Y0JOQXJiZHY5N0RNZk9OV2VrUWhyUmo1aDk2bHAxTzFl?=
 =?utf-8?B?SmR0WkViNkpZQ1F1ZTdkbk9yYTJISHNVdTJ2QUZrd0N4MDhJdnhIVGs1ZmQx?=
 =?utf-8?B?T2NrSzVFbWl1OEltOVBnTXRBbEc2czRWaXlwOWdJS25sOTI4S3c4VVl0Q0wy?=
 =?utf-8?B?T0dvODFVYUFJUFppeWVOaTJLRzhwdWtiMk5rNlhUckhQZTdHMDhSdVd2NUZS?=
 =?utf-8?B?SVcwNGFZaVBDbTE1bHNCVjJLSzFmWWo0bzlGaXB6QXRKMGdJeDhKNzMvbU9Z?=
 =?utf-8?B?QWdNYlgxY2NZZnpDUmlPdmJVYmF6Qjd3b01ldGN4eHFnSGdiNmdiaHpwd1Qr?=
 =?utf-8?B?NDBBc0hVbVBkUUoxZ0NsOENRL0RFeVVXdkt2S1FvRURpTU9yaEtQblZXZmJI?=
 =?utf-8?B?YklFQ1pmNlhWdHBnVDBrVkV0Ukd0ajNMeXNranlYMU44R3NiWmlXSkI4b3E5?=
 =?utf-8?B?T1JDT0VWUGF5QWlxSkh2SnVrcVNiVEhPS0ROSXNtbTZpWFBST1dOU2pUVkZX?=
 =?utf-8?B?RlBTRXY0V3hMam0xcWEvcmI5anEyN2xoWlNZdVRkWGhlcitsR2xEYlVsMFFl?=
 =?utf-8?B?Q3Y4MjExQlltSEgrN0psQzhMS3B1TklndytnK2g0bkM4bkZyU3RvT1I0RDV2?=
 =?utf-8?B?OERIQ3YwQ2VjNjZvdnFIVXhxVldJcWQzNHJzdlVucWJZSy8yY2tkQTg2bUhI?=
 =?utf-8?B?Z3lRZWVvblBaY2FpUVRBS293M3UwSWNHNkYzTDRtTkViNWtpOG51YklqUXQ3?=
 =?utf-8?B?MnJJM1lvV2FlZGJ4TlBrak45bUhOWUJuSDhoNzErSFZBK1g0bk45enA2Znh0?=
 =?utf-8?B?Z3hVN1Q2Mmxwdjc3N3NJdUU5Y04reFE3cXpYb2xYSGtEMDY1YllScHpPeEUx?=
 =?utf-8?B?N0ZERjlIeVV1d212UXR1ak5FL05VbFpnS0lRWURkS2JVdU9xUzd0dWxSZUdt?=
 =?utf-8?B?bUlUTmh2NlJ1b2d3ZGxtUy96TWFtUmZEUCtYK2J3VUZKTE9MYmJyWU9qVTRh?=
 =?utf-8?B?M3NYR2ZJdWhRNEV2dnJJQ3F0YVdvV1dDMnZJZUh6RFhrOVhFcm81OXVmREQ1?=
 =?utf-8?B?UmNGRDMzb2tkZ0hYZHdQOFltakQveVJRR0c0UHU5eWY1SkZRU0VuNjVlckVQ?=
 =?utf-8?B?ano1MGxBcnVkOXhxT1Z6cldUOFVhbkppV3FCTDRseHVnKzNVVDdSWXFzWjha?=
 =?utf-8?B?Y3N5MzBNa2lvNmMzWWZraWlGM1c0bXVLQVFsZnhFZ1ZNWllSTThVWjllbnc5?=
 =?utf-8?B?Um1laVE4ZWxhbVprMHloRWt4QjMyRXdHcnlZOHVQS1FTWjdVVFpMcFIxNHVa?=
 =?utf-8?B?R3NpOVdmbG1iTjRUaWg1cmYrRzJzV3ZNVkQ4V3QzT3JNZ25tWm1HYW14NHJ3?=
 =?utf-8?B?a3ArTXNKWkNYUVkzeEhFeGJDVy9oS2lvZmFVMWxUb0NqUnlCNVhzZitqdXdm?=
 =?utf-8?B?OFNOWCt4ZDFQdnR6V1JLVnJjd0dicjVTUjh5amZKK1BFVUFXTG1PZkVkTTNU?=
 =?utf-8?B?Y2YxSVprUUdmUzZNWVRSVVFDSlpsQURBdWRsMG5nRkdsVjA0bXRRa0Yxbmlo?=
 =?utf-8?B?VnVubEtRRURGNi9SVERMUW8wZTVybVcwaFBGSnVOTDEwSElVZlVhS0dRcW1n?=
 =?utf-8?B?U1ZlMFVDNXhGdUVMSFkvOGdTMU44ZGZHVDlkWVZrL3loVyszQjRJOHFiVzgr?=
 =?utf-8?B?MzlxR21qbnN6WXIxeW5YYjYrQWdwVkp3Z2JVaGtBWVZGc2hmMFNUWk0yZkVM?=
 =?utf-8?B?MEU5Ykk2WERmUkw4NnA2M0NUSGRKVDExNDZSK1c5c1RZajhaaTNCTy9tdmFB?=
 =?utf-8?B?b3B1UFh0QTBKcTVpSmxaMEJtZmpTS2NFL1RwSGl3MnBmbEtqL3hFN1ZkcEdq?=
 =?utf-8?B?RndvYlJlMGkyd3BLRXFZV0dZczhBPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <A35A5795BEA18C48BF48A196F4CDB148@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0d03efde-6d91-42ab-3f3d-08d9fb81c79c
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Mar 2022 12:48:26.6957
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: k8Zd1Xv0gk2NVKV3gwsLOrw/cAbmegTIVp5Ir3n3j4R8OB0s4/z+Nn9jGnN+rGEaK17St+/23QpozquGJNqxbjwN//PwZyawZYU+7j6Eq5E=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR03MB2945
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Tue Mar 01 12:56:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 12:56:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281381.479694 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP234-0002Su-VC; Tue, 01 Mar 2022 12:56:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281381.479694; Tue, 01 Mar 2022 12:56:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP234-0002Sn-R8; Tue, 01 Mar 2022 12:56:14 +0000
Received: by outflank-mailman (input) for mailman id 281381;
 Tue, 01 Mar 2022 12:56:14 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQ5=TM=arm.com=Wei.Chen@srs-se1.protection.inumbo.net>)
 id 1nP233-0002SE-Mf
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 12:56:14 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on2061c.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::61c])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f6540aee-995e-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 13:56:08 +0100 (CET)
Received: from DBBPR09CA0018.eurprd09.prod.outlook.com (2603:10a6:10:c0::30)
 by PAXPR08MB7060.eurprd08.prod.outlook.com (2603:10a6:102:1df::16) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.25; Tue, 1 Mar
 2022 12:56:05 +0000
Received: from DB5EUR03FT016.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:c0:cafe::d9) by DBBPR09CA0018.outlook.office365.com
 (2603:10a6:10:c0::30) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.22 via Frontend
 Transport; Tue, 1 Mar 2022 12:56:05 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT016.mail.protection.outlook.com (10.152.20.141) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Tue, 1 Mar 2022 12:56:04 +0000
Received: ("Tessian outbound 741ca6c82739:v113");
 Tue, 01 Mar 2022 12:56:04 +0000
Received: from d81e6e463433.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 054DC2E8-B3C7-4C3E-A86C-84196CDFBB2E.1; 
 Tue, 01 Mar 2022 12:55:54 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id d81e6e463433.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 01 Mar 2022 12:55:54 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com (2603:10a6:102:2b9::9)
 by VI1PR0801MB1757.eurprd08.prod.outlook.com (2603:10a6:800:5a::23)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Tue, 1 Mar
 2022 12:55:51 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa]) by PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa%4]) with mapi id 15.20.5017.026; Tue, 1 Mar 2022
 12:55:50 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f6540aee-995e-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=qCdVBw5rxkZPLmnT0qaGwsnLpFP2EmcrHOrT1gbf+ZY=;
 b=WGREJ+3AVV8YsjEKdhIo6rUnJ1k+i+MVW0lkEwwiYy9oEnT+URPRv/61sLa8wyuViYTBR4YFp/hhAA2F2xJmfsAzRN8SX+XzZV+jRw+PN8VXKIb2YuAWKz22btt0R+/J30TYGuPkZTrW7UDcoBrJuMh/GdZJbBw2tU6ZDrw+Tg8=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=K93rsIQdhxqHbHOM/KFyYw4jVQuXwQNJ6fNv7gI7zHazXGO6qQm901NeyuNzheimLL69YCk51qIeg3JCjd5DSpHdrULNkV6Nr3SVTMCtE9fhk9ER8BNS3k1CfjSQ79MpgZyA8Yt0Fes0fPnn+oDnZUDH2iJeocsLSUxYHT+yBVpqM9mtZVshRohuJ8H0nCWqmgvbA+qnb+OcZbHoCiBhPAnxvs6utWXbq1w8c8GsURw8QlzYsRiD657DKwbBH5G68UIeFu7E1m/nzZtHfgMtwsNwcR7c08ovRGP3RjZCVk2spQWY9oAg/dQveClEgkZVXpCxDGF01XXRJqdtds3t+A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=qCdVBw5rxkZPLmnT0qaGwsnLpFP2EmcrHOrT1gbf+ZY=;
 b=lY50WP5QPTYo2Zl/RL0+TjvJqLhvMx38gSh7YJVaFtj/Ndq7ybnwajX+q3Q6FYeN1ki6TmWJIUrnzMq6Bw8vzFbItMGjKyfRqHts8cYIkNYVqujzT6ZmS7N1+Gp1e24ms6PUz1zve4RzxKeB23R8cymZWeTEoKuz9nODTPzqs0UBWU77SJwzv+zFinlIHcFTqiWHhp7hez+zvq5N9ScLSQZ3iEz1ozblE8+7BeB2eLG/6/LYMExgp1CPxraVBcwBSJmM0JpRwf23pKdupxz9doGzs8dW7/sciGzDVVO0qWATRsc2Oa6/82rsvnoaPWaAKBxT6JLaI+xsLfJXtGVBzw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=qCdVBw5rxkZPLmnT0qaGwsnLpFP2EmcrHOrT1gbf+ZY=;
 b=WGREJ+3AVV8YsjEKdhIo6rUnJ1k+i+MVW0lkEwwiYy9oEnT+URPRv/61sLa8wyuViYTBR4YFp/hhAA2F2xJmfsAzRN8SX+XzZV+jRw+PN8VXKIb2YuAWKz22btt0R+/J30TYGuPkZTrW7UDcoBrJuMh/GdZJbBw2tU6ZDrw+Tg8=
From: Wei Chen <Wei.Chen@arm.com>
To: Stefano Stabellini <sstabellini@kernel.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	"julien@xen.org" <julien@xen.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, Penny Zheng <Penny.Zheng@arm.com>, Henry Wang
	<Henry.Wang@arm.com>, nd <nd@arm.com>
Subject: RE: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Topic: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Index: AdgpQxtXwh7LkfydTgiYk9bhMgU+ogAn0mUAABEK2UAAHxozAACs/mTQ
Date: Tue, 1 Mar 2022 12:55:50 +0000
Message-ID:
 <PAXPR08MB742081D5E3C94801350C4A739E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
References:
 <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2202241606450.239973@ubuntu-linux-20-04-desktop>
 <AS1PR08MB74269923288B75097392BDD99E3E9@AS1PR08MB7426.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2202251214210.239973@ubuntu-linux-20-04-desktop>
In-Reply-To:
 <alpine.DEB.2.22.394.2202251214210.239973@ubuntu-linux-20-04-desktop>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: CD711C5D640AC04CBD5FB43C2F9DAF45.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 1621c405-a3cd-49bc-730b-08d9fb82d8ab
x-ms-traffictypediagnostic:
	VI1PR0801MB1757:EE_|DB5EUR03FT016:EE_|PAXPR08MB7060:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR08MB7060C598775ED6DF8EAA91769E029@PAXPR08MB7060.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAXPR08MB7420.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(966005)(8676002)(4326008)(71200400001)(53546011)(9686003)(122000001)(83380400001)(508600001)(55016003)(6916009)(54906003)(7696005)(8936002)(38100700002)(6506007)(86362001)(38070700005)(316002)(52536014)(5660300002)(2906002)(33656002)(26005)(186003)(30864003)(66476007)(66946007)(64756008)(76116006)(66556008)(66446008)(559001)(579004)(139555002);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB1757
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT016.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	29806ce1-af3e-4bd6-7b9b-08d9fb82d05c
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(336012)(356005)(8936002)(54906003)(316002)(36860700001)(81166007)(30864003)(2906002)(82310400004)(70586007)(9686003)(26005)(5660300002)(6862004)(8676002)(4326008)(70206006)(52536014)(40460700003)(47076005)(186003)(53546011)(7696005)(83380400001)(966005)(86362001)(6506007)(508600001)(55016003)(33656002)(139555002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 12:56:04.8986
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 1621c405-a3cd-49bc-730b-08d9fb82d8ab
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT016.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB7060
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From xen-devel-bounces@lists.xenproject.org Tue Mar 01 12:58:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 12:58:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281390.479705 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP24p-000382-FC; Tue, 01 Mar 2022 12:58:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281390.479705; Tue, 01 Mar 2022 12:58:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP24p-00037t-BV; Tue, 01 Mar 2022 12:58:03 +0000
Received: by outflank-mailman (input) for mailman id 281390;
 Tue, 01 Mar 2022 12:58:01 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP24n-00037h-RU; Tue, 01 Mar 2022 12:58:01 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP24n-0006je-OE; Tue, 01 Mar 2022 12:58:01 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP24n-0002pY-D7; Tue, 01 Mar 2022 12:58:01 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nP24n-00021f-Cd; Tue, 01 Mar 2022 12:58:01 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=VzN/AYgjCtV70HAm+LSlj4eh2AwFQHFPpTsmRNGgUGw=; b=ZxtG3FhpYpND+ELfoD5/5DI4rI
	pwf4Ur9oCm20Ldbf/0dJIgP4pbFcaUvx4gB9bVQwe/REAFzw+Nl7Wry0GCSEQ9GfG0GDcalhSR8g8
	KUzNNd6ROYXwWg8Dx4TN8gFY1N9Kex/KHlT1vXR09jx1WCO3IYDs8xSZb1kd6IMAEajQ=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168290-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168290: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=497ac7b6d7f9750f48f137db244931a5728b1968
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 01 Mar 2022 12:58:01 +0000

flight 168290 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168290/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 497ac7b6d7f9750f48f137db244931a5728b1968
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    1 days
Failing since        168258  2022-03-01 01:55:31 Z    0 days    6 attempts
Testing same since   168262  2022-03-01 04:10:26 Z    0 days    5 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 13:02:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 13:02:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281401.479716 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP29G-0004eO-2o; Tue, 01 Mar 2022 13:02:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281401.479716; Tue, 01 Mar 2022 13:02:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP29F-0004eH-Vw; Tue, 01 Mar 2022 13:02:37 +0000
Received: by outflank-mailman (input) for mailman id 281401;
 Tue, 01 Mar 2022 13:02:36 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP29E-0004e5-5z; Tue, 01 Mar 2022 13:02:36 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP29E-0006uc-5A; Tue, 01 Mar 2022 13:02:36 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP29D-00031r-SC; Tue, 01 Mar 2022 13:02:35 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nP29D-0003XR-Rl; Tue, 01 Mar 2022 13:02:35 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=TAyQlAjPQxvhjsHARJD4lqI3yWRE4Jw3kgZs3m8ZnI8=; b=0zug5ar3Rraqcrm87DWMnxuRe+
	WuRf18PubzUSa04bZqdcGEClA+XZOe8lf11CzfCEtl3ifoLDze91uj+piFKEKwze+AJ3T7Z+fj+si
	zo/0N6sKCUI/p5mY6dVGKGytVk0n1Gz427dVVh6+xXUYKJBTPBFfXWXVK20rmsNE3WKE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168283-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168283: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=e0a514d2f4b2fcb51835aa9a9b02653b491a61fc
X-Osstest-Versions-That:
    xen=4388144c44c4dd9e9b7df97938ef08ffa85eec07
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 01 Mar 2022 13:02:35 +0000

flight 168283 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168283/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  e0a514d2f4b2fcb51835aa9a9b02653b491a61fc
baseline version:
 xen                  4388144c44c4dd9e9b7df97938ef08ffa85eec07

Last test of basis   168246  2022-02-27 20:00:25 Z    1 days
Testing same since   168283  2022-03-01 10:00:26 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Jan Beulich <jbeulich@suse.com>
  Roger Pau Monné <roger.pau@citrix.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   4388144c44..e0a514d2f4  e0a514d2f4b2fcb51835aa9a9b02653b491a61fc -> smoke


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 13:07:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 13:07:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281413.479733 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP2E5-0005Y6-QB; Tue, 01 Mar 2022 13:07:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281413.479733; Tue, 01 Mar 2022 13:07:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP2E5-0005Xz-Ml; Tue, 01 Mar 2022 13:07:37 +0000
Received: by outflank-mailman (input) for mailman id 281413;
 Tue, 01 Mar 2022 13:07:37 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=YI9j=TM=citrix.com=prvs=0520bb690=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nP2E5-0005Xt-1r
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 13:07:37 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 8f00fcf1-9960-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 14:07:35 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8f00fcf1-9960-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646140055;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=YJ+fCSm8D5VU+uZHrw75Nj2/sezhnaA0OYiRp42QpAc=;
  b=d+nv+zz17gZ6rF7NQ4C+dtEXeB07MEk2eK4M9o3eh5B/zM839YRdiFbv
   N5KgDplrIgkndFhqoXzIP3aJtruJAcWeJJmNI3SZ3Uyu0H/3QS995VJcf
   BHq6/AqVLFknA0S5lwM0JzqGbxJaCJYzj9pttr5cnoLoiwaO/UHWhCTjD
   M=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 64656946
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:WFJ8Fa7UNWxHrQJ6/JVqugxRtCXHchMFZxGqfqrLsTDasY5as4F+v
 mRMXDyGaf3YMDGge993YISz/RtUv5/cy4RiSAdrrXsyHi5G8cbLO4+Ufxz6V8+wwmwvb67FA
 +E2MISowBUcFyeEzvuVGuG96yE6j8lkf5KkYAL+EnkZqTRMFWFw0XqPp8Zj2tQy2YPhWlvX0
 T/Pi5a31GGNimYc3l08s8pvmDs31BglkGpF1rCWTakjUG72zxH5PrpGTU2CByKQrr1vNvy7X
 47+IISRpQs1yfuP5uSNyd4XemVSKlLb0JPnZnB+A8BOiTAazsA+PzpS2FPxpi67hh3Q9+2dx
 umhurSNViczJ5bOm9gDVkFXExlYHpRJ3pr+dC3XXcy7lyUqclPpyvRqSko3IZcZ6qB8BmQmG
 f4wcW5XKErZ3qTvnez9GrIEascLdaEHOKs2vH16wC6fJvEhWZ3ZGI3B5MNC3Sd2jcdLdRrbT
 5RFN2cxPUieC/FJEgkyS5IPw8T1ulLiNARdj2yYhbp03FGGmWSd15CyaYGIK7RmX/59gUKwt
 m/AuWPjDXkyJNGZjDaI7H+oruvOhj/gHpIfEqWi8fxni0HVwXYcYDUUX1ampfiyimalRslSb
 UcT/0ITQbMarRLxCIOnBlvh/SDC7kV0t8ds//MS1R6t0LPv4QWlGG1cQT55Tv8fu+kTfGl/v
 rOWpO/BCTtqubyTbHuS8LaIsD+/URQowX8+iTwsFlVcvYS6yG0npleWF4s4Tvbp5jHgMWyom
 1i3QD4Ca6L/ZCLh/4Gy5hj5jj2lvfAlpSZlt1yMDgpJAu6UDbNJhrBEC3CGtZ6sz67DFzFtW
 UTofeDEtIji6rnXyUSwrB0lRu3B2hp8GGS0baRTN5cg7S+x3HWoYJpd5jpzTG8wbJpaIWCyP
 hOK4FoAjHO2AJdMRfUsC25WI553pZUM6Py/DqyEBjawSsIZmPC7ENFGOhfLgjGFfLkEmqAjI
 5aLGftA/l5BYZmLOAGeHr9HuZdyn3hW7TqKGfjTkkT2uZLDNSX9YepUbzOzghURsfrsTPP9q
 I0EaaNnCnx3DYXDX8Ug2dVLfABScCNiXsieRg4+XrfrHzeK0VoJUpf56bggZ5Zkj+JSkOLJ9
 Wu6QUhW1Bz0gnivFOlAQioLhG/HNXqnkU8GAA==
IronPort-HdrOrdr: A9a23:IRqloqBq022owpLlHegCsceALOsnbusQ8zAXPh9KJiC9I/b1qy
 nxppkmPEfP+UsssHFJo6HkBEEZKUmsuqKdkrNhQYtKOzOW9ldATbsSobcKpgePJ8SQzJ8l6U
 4NSdkcNDS0NykBsS+Y2nj4Lz9D+qj+zEnAv463pB0NLT2CKZsQlDuRYjzrSXGeLzM2YabRYa
 DsgPav0ADQHkj/AP7LZEUtbqzmnZnmhZjmaRkJC1oM8w+Vlw6l77b8Dlyxwgoeeykn+8ZjzU
 H11yjCoomzufCyzRHRk0XJ6Y5NpdfnwtxfQOSRl8kuLCn2gArAXvUjZ1TChkF2nAic0idvrD
 D+mWZmAy210QKWQoiBm2qp5+An6kd215at8y7BvZKpm72HeNtzMbs+uWseSGqC16NohqAN7E
 oAtVjpxqZ/HFfOmj/w6MPPUAwvnk2ooWA6mepWlHBHV5ACAYUh5rD30XklWavoJhiKoLzP0d
 MeeP309bJTaxeXfnrZtm5gzJilWWkyBA6PRgwHttaO2zZbkXhlxw9ArfZv00so5dY4Ud1J9u
 7EOqNnmPVHSdIXd7t0AKMETdGsAmLATBrQOCaZIEjhFqsAJ3XRwqSHqokd9aWvYtgF3ZEykJ
 POXBdRsnMzYVvnDYmU0JhC4nn2MROAtPTWu7ZjDrRCy8/BreDQQF6+oXgV4r6dn8k=
X-IronPort-AV: E=Sophos;i="5.90,146,1643691600"; 
   d="scan'208";a="64656946"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=dAB1IFVaTnaiACZUcTKt+5FQY4OkRFZEPSjfa+zGWJnIKNr8dcZLT/nNtt8hO2ht29YHIn9Mff6jNisLP5In9jZz7Qwg0nf/EYFMBkgw867/WHCGRvPoBD/iJ3Rs9VhBNPGw4VZ5mhm3iaxAjlLzyEKU7VS8iMGvoT21GM37R81VLfeUzPx5ddSW+4tG9Nxn2WumnCeQu22yJzcRB12aeOQJE4tPUGsvGoiUW+23gJAHXVcbS1JdicedhlXMpjgIUk2nG0F1NAT9VTj8d+kFcgff0X7+UJK9AqKBdY2yKfJS9zTelhvf2m6X3h/I0XIf2eOCGiN1l15RNW8EKxNkeQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=YJ+fCSm8D5VU+uZHrw75Nj2/sezhnaA0OYiRp42QpAc=;
 b=UQlZWqeR4O+iiK2t4iIcbgJQdWJPHbd5hfu2wtKWZ2q854+TTQjy2crAbU82ll+IHhdzUidMtbS/WNu9nbbfvyD/yXntZRPozsOSzjjZC7+fLWRw4d+iHK/JJfsAsOL0k0fPDu5k4yohU2MDhGUe3s7E96AXxYhEpE7Is5v2nmduTYuXe3KjLp8sBp72QeWiGQj6YlQPLhUa1M3YVvfcxjwsegIFYNn/PBz6WtsvkaH5Zzy7PdneSmcNvvGUWwwy3vxH+DJybSwVEaL8332JEpLpHh+kyyeeNNp2fVLIG59f7jA9hC8mFsJ9YpPM1TYQS6xAnQQUBt0r6YJbob4MMw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=YJ+fCSm8D5VU+uZHrw75Nj2/sezhnaA0OYiRp42QpAc=;
 b=ggd2z+8+SQEiNps4ecsF+2pNiRJEXJURGB4/rN+22+zopzmLWpPhPecolSYkmqStiAsD++6osPc+yjjSgE7Z7vBlGDm+PkaVRy+ghXDrxkXcvEKAfv1+tOkJhTlBZZhAlt8/8bdag0zkXLyaoJShbz8+r5BzDVkPtX7W8+kRjmI=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Wei Liu <wl@xen.org>, Roger Pau Monne <roger.pau@citrix.com>
Subject: Re: [PATCH 1/2] x86/time: use fake read_tsc()
Thread-Topic: [PATCH 1/2] x86/time: use fake read_tsc()
Thread-Index: AQHYLVxVKor9YtEUbkuWag9T3yUcNqyqf+CA
Date: Tue, 1 Mar 2022 13:07:27 +0000
Message-ID: <d1c3822e-bec1-d8ca-8954-a4942f5bb23c@citrix.com>
References: <77675e7f-2a7e-f517-4aba-e20774c8bfe5@suse.com>
 <f4f0e92c-9586-e021-6ad5-718628f88fcd@suse.com>
In-Reply-To: <f4f0e92c-9586-e021-6ad5-718628f88fcd@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: ab334437-0fd9-4bde-1b36-08d9fb846fdb
x-ms-traffictypediagnostic: BLAPR03MB5378:EE_
x-microsoft-antispam-prvs: <BLAPR03MB5378BBE4780529C428ECD4FABA029@BLAPR03MB5378.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(6486002)(31686004)(53546011)(54906003)(110136005)(6506007)(2616005)(122000001)(82960400001)(5660300002)(86362001)(316002)(8676002)(2906002)(38070700005)(26005)(64756008)(66446008)(66476007)(66556008)(38100700002)(66946007)(31696002)(4326008)(91956017)(71200400001)(76116006)(36756003)(508600001)(186003)(6512007)(8936002)(83380400001)(107886003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?SlpkY1lMTmsrRUZpcUpQRnFZVHRlb0YvR1pvRlBqYUd3TjJVdnBXWHdvYzBq?=
 =?utf-8?B?Z3dkbEcvMktIRjYrM3VuMkthS2dnRGs1amU3dFV5VnBXZUlnTXJzQ0Z0WTZu?=
 =?utf-8?B?Ulg4azVvQ3R3NWxOTTNkekU4bFJ5dEpyZVR6U0xkTUtsd3JMTmlvNm5jLzZO?=
 =?utf-8?B?OVJvRXNiSzJCeExHdGN0RUplL3FhekIrRnZpV2lKejRsOEVib0pMajFWU2Fk?=
 =?utf-8?B?SEgxOUVjQ1hSNFJnUW5KN3BIdjgzYml6bVoydGp3VVQwUytjRmZvQ2RteU5Z?=
 =?utf-8?B?elZZc2pnR3Q1dksraFM3RDlRWThDTlcwYnA5SitFV3hpQ0Q2TjF5dkxMQ2dO?=
 =?utf-8?B?NGVWdmxqTERqRkpRd0N1YXlHVTlwanM0VVZ1Wlp3RVJRSTg0SWNnQW1BNHJu?=
 =?utf-8?B?dCtzWjJFK2RiSVFWUWYzVHNTUUxQVzhVd0taZnVqM2RMUmdTUXRYV2NKL2lL?=
 =?utf-8?B?eHIzd3ZqdDFpVkFUelVGV2IwenErRWljSlppTWROTVY2SGh2SkxHVUFyNGds?=
 =?utf-8?B?Tmc4bEF1SHQ5L2o3WTRXKzFMVmpZMVM1K2lpQVpPSWFVR1BUOUNUUkZkbjJ3?=
 =?utf-8?B?bEhqUWlxZnREemYvdENMREcwbDh0b1E5TzZhY3pXQ2orbXdDVHpCTW1rKzBz?=
 =?utf-8?B?K3E2REs3Z2txVkt0OWw1QVIvMkNuVWwra2Uzb1VKdHNTWThkWmhZRGY4MWJn?=
 =?utf-8?B?aGxNditacWQxT20rRlVnc3p5TVZRQjFUc1ZUV0txV2oxMzFzNUg2SHM3NWpY?=
 =?utf-8?B?YVg1bzhFQm5UZXM2ak1MNFJ2aWI4c3lnSFpTTGcrYmVmWUNpNnFJbElRaklh?=
 =?utf-8?B?ZEhUZHFDRHFKVWk3SGV1bUpoa0FtMTRqdVdKR0FXU05aUFFzT1lDcWRzVURY?=
 =?utf-8?B?WjJiT3BKKzBrVXExVFBPaE9TNmtScy9XdnpDSnVPQ21jWlJoMk1la2pGZkpG?=
 =?utf-8?B?cGpsWk1UaDVkUW5HY1c2UHVJWWxpcG1MdW5ZVWpNd1lnRmduaWliTVVSdkxu?=
 =?utf-8?B?KzR3Z09mNE56dFRFVzk2RWZOYkFwSUpKRlB0bUUzdUtBMlJvMVF2ZVh0MXFq?=
 =?utf-8?B?dFRZV0x4Mlk5Ylg0TGN2d1VPdVFMSEhwcGEvMmZqQUQybHRBalNpK0krb3RR?=
 =?utf-8?B?d2hzYWs3RlI1L2xvQWRHampkbm9nSnhRTG5CbGJBMHBVVWQvTzNSTG1xTGlu?=
 =?utf-8?B?REE0Q2RzUTkyRUZqK1ZrSHVkc0NOR2JaaHVqbUxheUMzS0RwazZNbm1pSUZU?=
 =?utf-8?B?Q0tzUzgzV2MvTUtNKzNyKzI1bnc0cVRCdjArK3JUdGlmS3dMQWZjTE9STll5?=
 =?utf-8?B?cG1VUXhYblcxQ2FmSDNMVjE5Mnc5Ky96WU8reUdIUXhmR1R3ZUw4aXpvL2hq?=
 =?utf-8?B?bkdMKzNOam1WcW5WMHozbVM2VlI4Y0FLRzR5Uk5TU0d4L3ZlbjAzNDlRMnE1?=
 =?utf-8?B?bGZBR1R0R3d0YndpVWtFbmdiRTZvZlFRT1R3aTVBZlJMaHBmUGZyWDZaTW1w?=
 =?utf-8?B?OWJqc1FlMjhEOXV5T2Y1dXdZU0dtSExwLzhtbklyclNtaUNteHhHR05SSWFl?=
 =?utf-8?B?Q0RCYmM0dEl5UG16UEdJak9iQkk4L0huekJVU1JjZWh4VUc2bTRhSm84TXlu?=
 =?utf-8?B?bml6YiszRGdlNE05aTdWMXk2aUU3RURpZ1dRT2MxYVRXNWhKbVhMVHdFT3Z4?=
 =?utf-8?B?L3pWZXhuUFloaUw5SEtheDZJY0kzL0xqOFA2dFV6S1Q1MGJmcDZwZUpzUWdJ?=
 =?utf-8?B?YVVoemp3ZHpoNUptR3RQSnFMQnZ6Z0pUSDg3TXg5Y2VMcGpXaVV1OXRCRHUx?=
 =?utf-8?B?ZlZZdjNobFpLb0FFS2t0SzdkNFBtYTJwY0hDZ2RWS0NtZ3A0alBBb1hiUWEw?=
 =?utf-8?B?ck9DeFdVYXBLM1NYNmx3Y3hIVGRwdjdkMk5YN3g4alJJMGxiM0lmMDd4SG1S?=
 =?utf-8?B?U2hvNzFVUlpQd3haZ1RwT0lLRXRYWmVTc1pKN09tMDl2QjVheTBWc29pSEgv?=
 =?utf-8?B?MG4za3R2bjFBTEJDTUVkQmlHWllaQnZwZnM2TTkvRWgxRWhVZEhEWDRNUFps?=
 =?utf-8?B?S1oyd2hmdU9yQWt1MVdNaWFUZVR3WHVydDMzTVZVQVlIV2NVaWg3RnRPWlNa?=
 =?utf-8?B?Z3gyWTBWYks1dWpLS3FET3VGamo0TFpDVlc1cmRzWXlMUnZ0WWU1STNQTldC?=
 =?utf-8?B?NWtJSi9QdEZpSXRIWC9tOTRBOVhxZmQyUTJGN05oY2k3R2ljSW1oOVIzWWdG?=
 =?utf-8?B?YXJFek9VNlFNTjFJcHpvdG5RTW1RPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <6FC41E461015B94B866D74A8F7476A2D@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ab334437-0fd9-4bde-1b36-08d9fb846fdb
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Mar 2022 13:07:27.9739
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: E5Zx6hpdbQ0Te5Xmfr2Wz+FOZF6Co00ZG/p26Xf0Vl9aoHBiuGEmfLgX7n8FOk6TFbMktJAEcW8v7CWofJMrruFPvDAODV9zK6ChoOohjQI=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLAPR03MB5378
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Tue Mar 01 13:17:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 13:17:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281423.479744 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP2NU-0007Lk-Sn; Tue, 01 Mar 2022 13:17:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281423.479744; Tue, 01 Mar 2022 13:17:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP2NU-0007Ld-P0; Tue, 01 Mar 2022 13:17:20 +0000
Received: by outflank-mailman (input) for mailman id 281423;
 Tue, 01 Mar 2022 13:17:19 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nP2NT-0007LV-6v
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 13:17:19 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nP2NS-0007Pa-Tt; Tue, 01 Mar 2022 13:17:18 +0000
Received: from 54-240-197-235.amazon.com ([54.240.197.235] helo=[192.168.6.66])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nP2NS-0001le-O9; Tue, 01 Mar 2022 13:17:18 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=bLkgc3t5QqA0tYP1xFG/GpU6vNgDn3gbTj1IxLYQhl8=; b=VWOt4lCvLnfoLkCyu+U2+t0MFc
	f50rhrUNhKQeACaF+NQnMfUZYAfZpytHPPWoVD+X9CiAqSd47VfotXbt9POyEwIqYyT6kzQuTrKO4
	0dWElwn4UseyRjpSmo4EFeFGWT37Qytw77D216L4xiEkOad8CjgoLicNZzCB8BvlJ+8w=;
Message-ID: <7260f050-9022-4adf-618b-a8b271aca8c3@xen.org>
Date: Tue, 1 Mar 2022 13:17:16 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: Proposal for Porting Xen to Armv8-R64 - DraftA
To: Wei Chen <Wei.Chen@arm.com>, Stefano Stabellini <sstabellini@kernel.org>
Cc: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Bertrand Marquis <Bertrand.Marquis@arm.com>,
 Penny Zheng <Penny.Zheng@arm.com>, Henry Wang <Henry.Wang@arm.com>,
 nd <nd@arm.com>
References: <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2202241606450.239973@ubuntu-linux-20-04-desktop>
 <AS1PR08MB74269923288B75097392BDD99E3E9@AS1PR08MB7426.eurprd08.prod.outlook.com>
 <4c558f8f-56d4-0445-32d4-169bc5d0a3bc@xen.org>
 <PAXPR08MB74200F4B0B4EFFD5BE1A6E699E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <PAXPR08MB74200F4B0B4EFFD5BE1A6E699E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

On 01/03/2022 06:29, Wei Chen wrote:
> Hi Julien,

Hi,

>> -----Original Message-----
>> From: Julien Grall <julien@xen.org>
>> Sent: 2022年2月26日 4:12
>> To: Wei Chen <Wei.Chen@arm.com>; Stefano Stabellini
>> <sstabellini@kernel.org>
>> Cc: xen-devel@lists.xenproject.org; Bertrand Marquis
>> <Bertrand.Marquis@arm.com>; Penny Zheng <Penny.Zheng@arm.com>; Henry Wang
>> <Henry.Wang@arm.com>; nd <nd@arm.com>
>> Subject: Re: Proposal for Porting Xen to Armv8-R64 - DraftA
>>
>> Hi Wei,
>>
>> On 25/02/2022 10:48, Wei Chen wrote:
>>>>>       Armv8-R64 can support max to 256 MPU regions. But that's just
>>>> theoretical.
>>>>>       So we don't want to define `pr_t mpu_regions[256]`, this is a
>> memory
>>>> waste
>>>>>       in most of time. So we decided to let the user specify through a
>>>> Kconfig
>>>>>       option. `CONFIG_ARM_MPU_EL1_PROTECTION_REGIONS` default value can
>> be
>>>> `32`,
>>>>>       it's a typical implementation on Armv8-R64. Users will recompile
>> Xen
>>>> when
>>>>>       their platform changes. So when the MPU changes, respecifying the
>>>> MPU
>>>>>       protection regions number will not cause additional problems.
>>>>
>>>> I wonder if we could probe the number of MPU regions at runtime and
>>>> dynamically allocate the memory needed to store them in arch_vcpu.
>>>>
>>>
>>> We have considered to used a pr_t mpu_regions[0] in arch_vcpu. But it
>> seems
>>> we will encounter some static allocated arch_vcpu problems and sizeof
>> issue.
>>
>> Does it need to be embedded in arch_vcpu? If not, then we could allocate
>> memory outside and add a pointer in arch_vcpu.
>>
> 
> We had thought to use a pointer in arch_vcpu instead of embedding mpu_regions
> into arch_vcpu. But we noticed that arch_vcpu has a __cacheline_aligned
> attribute, this may be because of arch_vcpu will be used very frequently
> in some critical path. So if we use the pointer for mpu_regions, may cause
> some cache miss in these critical path, for example, in context_swtich.

 From my understanding, the idea behind ``cacheline_aligned`` is to 
avoid the struct vcpu to be shared with other datastructure. Otherwise 
you may end up to have two pCPUs to frequently write the same cacheline 
which is not ideal.

arch_vcpu should embbed anything that will be accessed often (e.g. 
entry/exit) to certain point. For instance, not everything related to 
the vGIC are embbed in the vCPU/Domain structure.

I am a bit split regarding the mpu_regions. If they are mainly used in 
the context_switch() then I would argue this is a premature optimization 
because the scheduling decision is probably going to take a lot more 
time than the context switch itself.

Note that for the P2M we already have that indirection because it is 
embbed in the struct domain.

This raises one question, why is the MPUs regions will be per-vCPU 
rather per domain?

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 13:18:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 13:18:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281429.479755 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP2Oj-0007uz-7l; Tue, 01 Mar 2022 13:18:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281429.479755; Tue, 01 Mar 2022 13:18:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP2Oj-0007us-2m; Tue, 01 Mar 2022 13:18:37 +0000
Received: by outflank-mailman (input) for mailman id 281429;
 Tue, 01 Mar 2022 13:18:36 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=YI9j=TM=citrix.com=prvs=0520bb690=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nP2Oi-0007ug-3L
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 13:18:36 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 17fd7b0c-9962-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 14:18:34 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 17fd7b0c-9962-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646140714;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=FNUCsQ/3JDb57Sl6fkwHLvMucRLmH2WJUthE75WdN54=;
  b=NjSg2bJcdA+wf6GJ6NJ3/qffOM489q0ADowz3wmCyHw6J5J7wvyOp9bk
   ePbdZztdncx0R/rV1riThrL/AAxTY+gqvS3k8xhZl/kmm5NAll+lUb2en
   CwRbKl7DQOaCO/nSLS9s/s4jEDLwZn11wxSX9XlTTqAfvGaVHLsgXQU9j
   Y=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65216691
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:quNuG63V3Ug/w92StfbD5c5xkn2cJEfYwER7XKvMYLTBsI5bp2MHm
 jMWXG/Saa2OZ2L0LYx3PNm38h8EvMOHyd5rTgFkpC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUw2IDja++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /1ilru9SgRxN5aSwukMfgVSAQdlZ51JreqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHCOo8Ft24m5jbeFfs8GrjIQrnQ5M8e1zA17ixLNaiDP
 ZNHN2s2BPjGSwYMOHsxC5QZp9zyrGjgUiVyqULM+ZNitgA/yyQuieOwYbI5YOeiWsF9jkue4
 GXc8AzREhwccdCS1zeB2natnfPU2zP2XpoIE7+1/eIsh0ecrkQRAhALUVqwodGil1WzHdlYL
 iQpFjEG9PZoshbxF5+kAkP+8CXsUgMgt8R4PM4d5QKOkqPvvVyUF0UYRCxnc4YWu5pjLdA17
 WOhk9TsDD1plbSaT3OB67uZxQ+P1TgpwXwqPnFdE1ZcizX3iMRq10+UEI4/eEKgpoCtQVnNL
 ya2QD/Sbln5peoCzO2F8F/OmFpATbCZH1dutm07so9Ihz6VhbJJhaT1sTA3Dt4ade51q2VtW
 lBew6ByC8hUUPmweNSlGrllIV1Qz6/t3MfgqVBuBYI90D+m5mSue4tdiBknehs3aplfJ2OwO
 RaC0e+02HO1FCHxBUOQS9jsY/nGMIC6TYi1PhwqRoAmjmdNmP+vo3g1OB/4M5HFm0kwi6AvU
 ap3gu73ZUv2/Z9PlWLsL89EiOdD7nlnmQv7GMCqpzz6gOH2TCPEFt843K6mM7lRAFWs+16Or
 b6y9qKiln1ibQEJSnKPoN5LcAtTdiBT6FKfg5U/S9Nv6zFOQQkJI/TQ3akga8pimaFUnf3P5
 XazRglTz1+XuJENAV/ihqxLAF83YatCkA==
IronPort-HdrOrdr: A9a23:OQJ0jamiaf2AxCJeJBWsCqRTQPTpDfOMimdD5ihNYBxZY6Wkfp
 +V8sjzhCWatN9OYh0dcIi7SdW9qXO1z+8Q3WGIVY3SEjUOy1HYU72KirGSggEIeheOudK1sJ
 0AT0EQMqyJMbEXt7eZ3OD8Kadc/DDlytHpuQ699QYXcegCUcgJhG0Vanf5LqQ1fng9OXNQLu
 vH2iMtnUvGRZ1jVLXDOpBzZZmkmzSkruOCXTc2QzocrCWehzKh77D3VzKC2A0Fbj9JybA+tU
 DYjg3Q/MyYwrKG4y6Z81WWw4VdmdPnxNcGLteLkNIpJjLljRvtTJh9WoeFoCs+rIiUmRQXeZ
 j30lId1vZImjTsl1KO0F3QMs7boW8TAkrZuBulaL3Y0JTErXwBepF8bMliA2XkAgIbzaBBOe
 Rwrj+kXtNsfGD9dG6W3am5azh60kWzunYsiugVkjhWVpYfcqZYqcgF8FpSC4poJlOx1GkLKp
 gnMCjn3occTbpaVQGvgkB/hNi3GngjFBaPRUYP/sSTzjhNhXh8i08V3tYWkHsM/I80D8As3Z
 WJDo140LVVCsMGZ6N0A+kMBcOxF2zWWBrJdGafO07uGq0LM2/E75T3/LI27ue3f4Fg9up+pL
 3RFFdD8WIicUPnDsODmJVN7xDWWW24GS/gz8lPjqIJ84EUhICbRxFrZGpe5vdI+c9vcPEzc8
 zDTK5rPw==
X-IronPort-AV: E=Sophos;i="5.90,146,1643691600"; 
   d="scan'208";a="65216691"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=h7oilectNqtwr/dToN49LEL3WxFctig1P3v8x0BEXw6i5zAM65ynwBwWLwpiNBwCRiNoOZUpo7i3J9Pu+aanLT8QzAmFUB+TKscGi6xOFVC5GY6EzGf2kwHAQbKk2LLEFO1TbzPY7Qr+CF7EnayXVQwKDEFD4OnDlitZSuOsL28whh2+AVurANR367pCj/XymYuz/vwZrl7JqUXqybmFlrYslcN/vXCxsI7NU+Csw9zV36G9yAG9+uEmL2gfmWr89Q7Clq5pWKe75ARBje2zBvClz3frVBmoTOmkv3eFa29bjBKQ++9bO8DG6hLXFuucXddHvktsDOx6qnxytNudtg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=FNUCsQ/3JDb57Sl6fkwHLvMucRLmH2WJUthE75WdN54=;
 b=WR1gMQx4NxDqrnz91k3mWBjdytfYzkR9ALHi5hTqEnyNMpV0ZyQ2UJF7kI4s+j+hhWczqeW4tAjUlAGWaCuSUsNADtPZcAWd/vQRxRmpUJ2o0OzBnhmlqJ14Y3a5uGITsL5d7crWPSGfXdZDaBHynyRYmBENbXG60Gtue0e/3Y4sRA2rSUdHmNvUsnuUFcweRUwuVLjOm12CjeWhR5as7nR8u9g/Bqg4nikJ9zQChEL2YsJ+Zr6wDCd5DIjeEkBhOgWVHLL0jgLeozx6BIG0IPecmCLKXMf4mUE+qOz7oXu6Pba3e/aUlUJ21kbkBHIYztXVuRsViqwOVPG6LA0wQQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=FNUCsQ/3JDb57Sl6fkwHLvMucRLmH2WJUthE75WdN54=;
 b=lY7FANjnqIjPAymBxjLxRZus9ZlNu/2R8WjsQD1+kj9/DdGWyYMpod+MbfgBgli2HzHW+KkmlcIiXVoBrW5+JLNdgrP13vtQkTO/E90phxErYiirdWROLBK0moFTdb+gYvGrK+gn70+51huVFd/5AvERepNSwNrW5E1hH0Hiy3g=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Wei Liu <wl@xen.org>, Roger Pau Monne <roger.pau@citrix.com>
Subject: Re: [PATCH 2/2] x86/time: add CF-clobber annotations
Thread-Topic: [PATCH 2/2] x86/time: add CF-clobber annotations
Thread-Index: AQHYLVxwam4XOlcoM0qksn/nZK0dPqyqgvIA
Date: Tue, 1 Mar 2022 13:18:26 +0000
Message-ID: <20185a89-0a2b-6bbd-5484-31b6582ed200@citrix.com>
References: <77675e7f-2a7e-f517-4aba-e20774c8bfe5@suse.com>
 <61bbf544-74ac-b698-425a-d1db80acab43@suse.com>
In-Reply-To: <61bbf544-74ac-b698-425a-d1db80acab43@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: e114ef2a-9688-4d25-577f-08d9fb85f893
x-ms-traffictypediagnostic: DM6PR03MB4841:EE_
x-microsoft-antispam-prvs: <DM6PR03MB4841E8A4C614A3E02FD5E2FEBA029@DM6PR03MB4841.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(36756003)(82960400001)(6486002)(2616005)(8936002)(53546011)(31686004)(83380400001)(508600001)(122000001)(71200400001)(110136005)(54906003)(6506007)(86362001)(6512007)(107886003)(316002)(5660300002)(31696002)(38070700005)(38100700002)(4744005)(186003)(26005)(66556008)(8676002)(64756008)(66476007)(66446008)(66946007)(91956017)(2906002)(76116006)(4326008)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?NGNBaVQzWXN3L3A2VG1lRWpvV1Z0NElJS3N2b2dmUEJicFZYRmZjWlRnVVc4?=
 =?utf-8?B?N2c3WitGbEVNZlJ3WExES3lKdkxKMm5weXhTZ3RXL2U1bXBKRmVQQ3Z3cEh4?=
 =?utf-8?B?Y0tBMExhUUZacnhBSm9PWVZodWVRMFJWL2RHL2FsM1FTWXhQa2t0YmRNRy9M?=
 =?utf-8?B?VXp3d3hQL0R1cThGUzYvZE11RWc3emtYM0QwNXpxWis1NWhPTitHSHdCZnRm?=
 =?utf-8?B?VnpYbkNmQ0YyM1diN3VSaFBvYVgwUHp6M2I3WUJCWit3RlU2T2FhcWJ4YVlp?=
 =?utf-8?B?dWJEaTF0TXEyNE42RTAxWmhLbks3SG51ZnQxclFPbXZGUjArV0tocnpVaXBK?=
 =?utf-8?B?b0cxMHl0TWJ6L2FOem9NU1dnVVB5N1cweVJRYmQ3eTN6anJCak42dmZkMHRN?=
 =?utf-8?B?bk1YTlpuYVNQWWNJYWo2Vk4wMUxSU3RUL0RqY2UycFJyR2NSSXMvd2l4VE0x?=
 =?utf-8?B?MnlwTVFKakNjWEJneGVicFlOZnIrazhJV0RIUlEwdzlEN1VKTFVhY3ZtUERH?=
 =?utf-8?B?NDlPM1F1d1FjSGFFODRValF4eWdqZmEvUXhQdlI4OTllY1Qyemxmdi9PRTVo?=
 =?utf-8?B?VkdEak5vNnJEMDF6aCtudWpuYk9GakFSQ0l1aGVUSjNLY3M1aTh2aHNzSnR5?=
 =?utf-8?B?UWVsdnIwZzVraWNMSUJUQUdZbXRrUHZTWWE0bHlaNUQyS2F2SDg4bFltc2xh?=
 =?utf-8?B?bDVDRTVmeWttUXc4WVdoRk43MHMvNmlkQlZVMzZ1S0xYbkx3cWFCay9FODRl?=
 =?utf-8?B?MXM1MFBHZ1pLMWpaNjh4UDI1MFgzZnVqRTd4UTgwOW43b045emFlWkNXZDdN?=
 =?utf-8?B?akk5S0ZEdGhNb2JRTmQ5cXZmdXV5d3A4aFR5YStHOHFiWGk0ZkZMWFVsUUR3?=
 =?utf-8?B?V2FkY0FHNnZhZjZqazNsNHp2bHpsV3FmV0R1cFI5ekEveDk3Z3JKUmNFSTJG?=
 =?utf-8?B?cFRvcGxNT2dMUTU1bUVxTGNaZUQzRGFMTEhKRW1WK3ZOY0I2UlplQjVjcDN4?=
 =?utf-8?B?Z093NGgvTFgxNmJ5V0NsalBaeUJWNGN0SUlsL2t5TWY2VFVSNTFTQlUwMUJK?=
 =?utf-8?B?RXJOajhjWWVYajF5QmZjZHNFNFZRWm5STHF1NjdXSVpsdnlIdmpPdmFGbVNW?=
 =?utf-8?B?YUIyRHR5azNHWVpmV09vU2t6dGJXWFhqTFc1NDBsTVRLQnVVOFZqZGlRMHBa?=
 =?utf-8?B?MWhqbnViR3JFeTdiQldERjJUZUZma2V1eGxLNUh2Q1IxOGl0QkpDblFqb1d2?=
 =?utf-8?B?TW52OVVPcHU0cVM0UHhsV1QwV1JQbGN0alBidmtyOTcyTVZyOWYvWmNOTkpl?=
 =?utf-8?B?UEtsR1d4VUM1S0lpVzlsNitLYzVPc0l2ak93Q2owRGphS2FMaXoxbTBrbDl5?=
 =?utf-8?B?WUhtS0ZXT0xkZmF3dGdpSW4xazFxRFI3Y2xIbCthMkZEZ28wQWc0Y3lZTXFq?=
 =?utf-8?B?Z2c1NlkzSEI0VFVHODBYTTl4N3I2M3lINjNWeGpXZWorSEFTNkd2QTE2M3hF?=
 =?utf-8?B?Zk9BYUR1TXd0NE9uQy94VG0rNjhvUGd2YzB0Uk9WSzZYRUZTNjM0Z29QM0Ni?=
 =?utf-8?B?TjI4RTg3ZzJhM0RrZDZYK1dia0prNktmQXNIZEpyQzBPWmFLZzVDSEZKTTFj?=
 =?utf-8?B?TEFiSHl4Ym0zUmFjS0NaSkVaV1Azc3RlcC9nVUZmQTROb0JGc2R3UCtpSXlU?=
 =?utf-8?B?UjN0cGdpbWhBUVVRa0tYU3Rucm9Pc21LWnlIV1k3YXY5UXR1SVh5aThvaWtN?=
 =?utf-8?B?R1YxcmdpR1phNG9hclAyem1SU0JPVzJLdWRkMVlqVk9JT1JySWRWeUZ3VGY3?=
 =?utf-8?B?dHdiOEkwYWpocDNpeWFFVU5PQUQ1M0oxdFpURUJnTWM2c09xMW5TOTRkMVBU?=
 =?utf-8?B?bjYxdy9RSmIrY3Q5L3VlQmVYalBPc0NxQUNMckMzTFZFcjNoRUg5MUUwUDRS?=
 =?utf-8?B?dVJKMDdsSzBkUmJzY3NaRnN6U0NyQUIxWmwzSzRDbklwNUcvSU9jc2VJTWc4?=
 =?utf-8?B?R2ZLK2pERGpiNlRjUWRGMXNiVTZBZllrMm80VHlnaWhRQTJucGNrWld3Rzlw?=
 =?utf-8?B?S0gzVzFjYlhtallMcm5DYkpwNC9jNHhiTW50TDBScnp2RVVFcVhDcGR5MnhC?=
 =?utf-8?B?Qm1oTEEydFc3MzI1bSt0Qyt0ZnRvdWJTY0sxK2Y2RHBaeThGYW96a2ltdk1B?=
 =?utf-8?B?eHZNSHdWZ3BIRnhMOFlybm9yRm5DejRBdmlQTnJwR3gvY21CaHMza1BiNHN0?=
 =?utf-8?B?UDZjOWgrc0lRYi9NSzhWZXdGTSt3PT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <2F720E199895F34CAA51EECC4B024B0D@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e114ef2a-9688-4d25-577f-08d9fb85f893
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Mar 2022 13:18:26.8638
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: JcfK3DAHQWmU+TlubSce8lIZOjVzU1iyEWQVeIK0MlQLLG4coE0zwOv0sgaFB3+JAyciyOjFdTQXCOyOmdW5ahxi3Yy7gLWPL3o4eVP/izI=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR03MB4841
X-OriginatorOrg: citrix.com
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=


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 13:30:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 13:30:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281437.479766 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP2a1-000259-7o; Tue, 01 Mar 2022 13:30:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281437.479766; Tue, 01 Mar 2022 13:30:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP2a1-000252-4X; Tue, 01 Mar 2022 13:30:17 +0000
Received: by outflank-mailman (input) for mailman id 281437;
 Tue, 01 Mar 2022 13:30:15 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=BNgs=TM=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nP2Zz-00024q-4a
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 13:30:15 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05on20631.outbound.protection.outlook.com
 [2a01:111:f400:7d00::631])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id b9a7caf5-9963-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 14:30:14 +0100 (CET)
Received: from AM7PR04CA0006.eurprd04.prod.outlook.com (2603:10a6:20b:110::16)
 by DB8PR08MB4571.eurprd08.prod.outlook.com (2603:10a6:10:ac::16) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.24; Tue, 1 Mar
 2022 13:30:11 +0000
Received: from VE1EUR03FT035.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:110:cafe::9d) by AM7PR04CA0006.outlook.office365.com
 (2603:10a6:20b:110::16) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26 via Frontend
 Transport; Tue, 1 Mar 2022 13:30:10 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT035.mail.protection.outlook.com (10.152.18.110) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Tue, 1 Mar 2022 13:30:10 +0000
Received: ("Tessian outbound 63bb5eb69ee8:v113");
 Tue, 01 Mar 2022 13:30:09 +0000
Received: from 9e6f22f12155.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 2BE4B18E-70EE-446E-9ED5-6BB98E40787A.1; 
 Tue, 01 Mar 2022 13:30:03 +0000
Received: from EUR03-DB5-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 9e6f22f12155.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 01 Mar 2022 13:30:03 +0000
Received: from AM0PR08MB3778.eurprd08.prod.outlook.com (2603:10a6:208:104::24)
 by PAXPR08MB7245.eurprd08.prod.outlook.com (2603:10a6:102:210::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Tue, 1 Mar
 2022 13:30:02 +0000
Received: from AM0PR08MB3778.eurprd08.prod.outlook.com
 ([fe80::4dbb:4fed:bc86:1803]) by AM0PR08MB3778.eurprd08.prod.outlook.com
 ([fe80::4dbb:4fed:bc86:1803%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 13:30:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b9a7caf5-9963-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=0QJG6lUHRRR5Bx3rjh8fSAN00goQWZPELfVy7v1+b2g=;
 b=UH6MZl/7vnBdf6aVCu16GgQjyT+zxKhJay8+ci9v0n4HwmQ/eQj5URgn/9VOxuHqwfE533HUeRAEn5r67Ebb/FzvuW4cKGGCYQ+amPJ39jBbGMtLbswX/2gTBDA78+DwKj8WeAxGhlgQwISAW4fvsBNCXW7DjYGINGTeZAJjVqs=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 700619e766453692
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=XfdY3iVlxJxOxz1M/69x0h5civqz40qpLF7kjNK/dFl7xl4TDGfpEFdQQJyd5JUeHqZrt4I2vcTMrEpkq6XbnI2ETeEaChxF4uowJrG3wLM136sQ95DsXIIooZ8O3LQEjjczPAZ3vRbAuhx9kO8BHCpEj0ingg2fRnucMEC/6kOx2xwNtytStxKQi4cZNs/DD1KymRdmcb0g2ph7owgw6JRLmApyeAa2ZnCX5eeu/68SSx/gFM6BKa3BQ5zXM0vfx4lN4ME1qhzFaMki+biIs3OCb0cc+X7JyKz+XLaFwPnhxZCEMtKuZxsTc0ii+42NAQ1jXHCcR13AQEmtk1S+UQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=0QJG6lUHRRR5Bx3rjh8fSAN00goQWZPELfVy7v1+b2g=;
 b=g/wBM+R9+ZkxQuGJKz3t0XsQmgoqtv4unBhXtsDFuYVQOCtT6PoYIc8d+lDKLs1R/nzGmeI1sP+jS0qsrIc/wJ+Vn6gWbyhPbOE/g2QIyHPtN1srAUWlASiXOB9kDsaVH8kJVRzbcVxVKG//j0N/haM1FhMSvxOb53tkC6vHEUN9eus6m+AiwytXFUoX+Zz2Ra4gwa76jjRJrnH65CS0+/0t1Akro21zwKFzNUS9xDjuGhzgsiZIv5t1UhqscMMue+o8Ic4JnvZCIFNLqyq84xpTf4qDpn23baGPnv5EXmyo1ASPSu1YpxqdjfVBbK053eO8obraiLlP8a8S4bpOJw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=0QJG6lUHRRR5Bx3rjh8fSAN00goQWZPELfVy7v1+b2g=;
 b=UH6MZl/7vnBdf6aVCu16GgQjyT+zxKhJay8+ci9v0n4HwmQ/eQj5URgn/9VOxuHqwfE533HUeRAEn5r67Ebb/FzvuW4cKGGCYQ+amPJ39jBbGMtLbswX/2gTBDA78+DwKj8WeAxGhlgQwISAW4fvsBNCXW7DjYGINGTeZAJjVqs=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Volodymyr Babchuk <volodymyr_babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
	=?iso-8859-1?Q?Roger_Pau_Monn=E9?= <roger.pau@citrix.com>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH] x86: fold sections in final binaries
Thread-Topic: [PATCH] x86: fold sections in final binaries
Thread-Index: AQHYLUowkdMxBaiHpEebmldzPiiqI6yqOnQAgABL34A=
Date: Tue, 1 Mar 2022 13:30:02 +0000
Message-ID: <915C7BBD-AD0C-42B8-8459-C3BFDCDC0A11@arm.com>
References: <03851bd4-9202-385f-d991-c9720185c946@suse.com>
 <1a4bef81-d29e-97ae-098b-d1e582e5af28@suse.com>
In-Reply-To: <1a4bef81-d29e-97ae-098b-d1e582e5af28@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 4ca02b7d-64c8-4a41-4abe-08d9fb879be1
x-ms-traffictypediagnostic:
	PAXPR08MB7245:EE_|VE1EUR03FT035:EE_|DB8PR08MB4571:EE_
X-Microsoft-Antispam-PRVS:
	<DB8PR08MB4571BD0B1CF594BD31F838369D029@DB8PR08MB4571.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3778.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(36756003)(122000001)(83380400001)(2906002)(38100700002)(6486002)(8936002)(5660300002)(6506007)(91956017)(64756008)(6512007)(76116006)(38070700005)(66946007)(66446008)(66476007)(66556008)(4326008)(8676002)(33656002)(316002)(26005)(186003)(2616005)(6916009)(54906003)(53546011)(86362001)(508600001)(71200400001)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <980D511F3F5AE34189FA3120E4E260AA@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB7245
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT035.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	bef005c9-bb6c-48a9-3569-08d9fb8796f6
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	Xt5I6Ik8BZ2ciksmoBn7YvBvBp6ZTO6QfMWlfcvHtCCqz4/wCqYl2NSdDlT3p+0TmmWQPpNpPV1ABD2EV1huX8TlHV6qt5jkaUW7xtPGmFRbgnIlEq7D8KIJ6BzmqXu48ypgsgw07SnXoW9u7Lu4d7VYYM9x6/ByR/P5/6AoThw6pKSxBUHdEzxur/asiTVJ5CtuXS628J7CC1zXC1SM1dotFcDSFHGgwZ0WlQj1nczjlRGHNcKAUT7xUcW65YV/aOXSC+uLLfB5QoBMlHmTf8bWjTpfBbzZJ41MAi8MHJ00wlwkkwRtGqdzEou2n4VkF9dIS5W5l5LmP7l6HwhZYwuPdi7oBd67tEHqIsMM1FYsiafNPENewzABBlabcsBt8+1Ym37+q9ywqzKfAw7Zx6yEx/MhDfYPpVFqAWbH4ZV1irIB1gNQt36JiHnkO8+PzviOsKVMIyDJZ9GI+uDakyCvW9mtJ2s27bFOHT6DtD+1J2NcK0nW/YQvc4qIl39wyMu7BZp8qwbYKFNi2lXwVi1YgTJupKeD2VFFJPAoI7sO/2JdTEM37NupR/udaf0ZdCNbCw21XiFSd6avEWduKkVyz1Cx3CQXnOlk6IVf67Z4JNOOQVZMGuaCsdHobQ/yJGzsS3goTPrvLSghSaEO9uMKRJxUxuSndfHyBQiIEKiQ16YnovFKyYWZSev2YZcw
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(36860700001)(8936002)(47076005)(5660300002)(2906002)(81166007)(356005)(82310400004)(40460700003)(6862004)(2616005)(6506007)(508600001)(8676002)(6512007)(53546011)(4326008)(316002)(70586007)(70206006)(54906003)(6486002)(336012)(33656002)(83380400001)(36756003)(26005)(186003)(86362001);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 13:30:10.2932
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 4ca02b7d-64c8-4a41-4abe-08d9fb879be1
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT035.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR08MB4571

Hi Jan,

> On 1 Mar 2022, at 08:58, Jan Beulich <jbeulich@suse.com> wrote:
>=20
> On 01.03.2022 09:55, Jan Beulich wrote:
>> Especially when linking a PE binary (xen.efi), standalone output
>> sections are expensive: Often the linker will align the subsequent one
>> on the section alignment boundary (2Mb) when the linker script doesn't
>> otherwise place it. (I haven't been able to derive from observed
>> behavior under what conditions it would not do so.)
>>=20
>> With gcov enabled (and with gcc11) I'm observing enough sections that,
>> as of quite recently, the resulting image doesn't fit in 16Mb anymore,
>> failing the final ASSERT() in the linker script. (That assertion is
>> slated to go away, but that's a separate change.)
>>=20
>> Any destructor related sections can be discarded, as we never "exit"
>> the hypervisor. This includes .text.exit, which is referenced from
>> .dtors.*. Constructor related sections need to all be taken care of, not
>> just those with historically used names: .ctors.* and .text.startup is
>> what gcc11 populates. While there re-arrange ordering / sorting to match
>> that used by the linker provided scripts.
>>=20
>> Finally, for xen.efi only, also discard .note.gnu.*. These are
>> meaningless in a PE binary. Quite likely, while not meaningless there,
>> the section is also of no use in ELF, but keep it there for now.
>>=20
>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>=20
> Some of this will likely want mirroring to Arm as well, even if xen.efi
> there isn't produced by the linker. Sections are better properly folded
> even for ELF, and constructors not ending up in [__ctors_start,__ctors_en=
d)
> can surely not do any good.

I fully agree with that and it would make sense to do both changes together=
 to
avoid differences between x86 and arm unless required.

Right now our discard section on arm is a lot shorter and I do not see why =
we
would need any of the sections that are discarded on x86.

As this needs testing and checking I do not think it makes sense for you to=
 do
that right now.
@Stefano and Julien: I am ok to create myself a task to sync with x86 in th=
e
 next weeks/months, what do you think ?

Cheers
Bertrand

>=20
> Jan
>=20
>> ---
>> TBD: We also use CONSTRUCTORS for an unknown reason. Documentation for
>>     ld is quite clear that this is an a.out-only construct.
>>     Implementation doesn't look to fully match this for ELF, but I'd
>>     nevertheless be inclined to remove its use.
>>=20
>> --- a/xen/arch/x86/xen.lds.S
>> +++ b/xen/arch/x86/xen.lds.S
>> @@ -194,6 +194,7 @@ SECTIONS
>> #endif
>>        _sinittext =3D .;
>>        *(.init.text)
>> +       *(.text.startup)
>>        _einittext =3D .;
>>        /*
>>         * Here are the replacement instructions. The linker sticks them
>> @@ -258,9 +259,10 @@ SECTIONS
>>=20
>>        . =3D ALIGN(8);
>>        __ctors_start =3D .;
>> -       *(.ctors)
>> +       *(SORT_BY_INIT_PRIORITY(.init_array.*))
>> +       *(SORT_BY_INIT_PRIORITY(.ctors.*))
>>        *(.init_array)
>> -       *(SORT(.init_array.*))
>> +       *(.ctors)
>>        __ctors_end =3D .;
>>   } PHDR(text)
>>=20
>> @@ -404,16 +406,20 @@ SECTIONS
>>=20
>>   /* Sections to be discarded */
>>   /DISCARD/ : {
>> +       *(.text.exit)
>>        *(.exit.text)
>>        *(.exit.data)
>>        *(.exitcall.exit)
>>        *(.discard)
>>        *(.discard.*)
>>        *(.eh_frame)
>> +       *(.dtors)
>> +       *(.dtors.*)
>> #ifdef EFI
>>        *(.comment)
>>        *(.comment.*)
>>        *(.note.Xen)
>> +       *(.note.gnu.*)
>> #endif
>>   }



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 13:34:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 13:34:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281446.479776 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP2du-0002kw-Su; Tue, 01 Mar 2022 13:34:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281446.479776; Tue, 01 Mar 2022 13:34:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP2du-0002kp-Pv; Tue, 01 Mar 2022 13:34:18 +0000
Received: by outflank-mailman (input) for mailman id 281446;
 Tue, 01 Mar 2022 13:34:18 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nP2du-0002kj-14
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 13:34:18 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4a3f27dc-9964-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 14:34:16 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2175.outbound.protection.outlook.com [104.47.17.175]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-29-mqzv5cn1N6yqZRKOEcfAzA-1; Tue, 01 Mar 2022 14:34:15 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM7PR04MB7061.eurprd04.prod.outlook.com (2603:10a6:20b:114::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Tue, 1 Mar
 2022 13:34:13 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 13:34:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4a3f27dc-9964-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646141656;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=p1AyWg0vwPItKSSz0+s8cP9t1+6GAd0LD25hIoGPo7w=;
	b=akQ5s24Lx7WYuerwDgFXC8daBDy117MiZCHWMeSviW5/uBYFSy9qnD++gN0LFcQWS1UUyU
	yOG8aChBZEjMmttXalWR0hXDlO7Dneunl+d1B2iavU0BmHPA86sx+WVVha2CLbqG3qCWHr
	04sRUXtHXcvz/43mQgAIDXjPjgLIs/o=
X-MC-Unique: mqzv5cn1N6yqZRKOEcfAzA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=aePV97E8tc2RxVczVqwKFVsApN1okvUpt5ID1HyAP3fZnav5d2mtpeQra7Xiu6E1K7gWERYZd5BHItcoM+B3dZXR7YCyO5HSyj4XgTn+ziepCfIsZ7QRSRy4dK+3f8JPEXJ5VeYF9io27+hl+kX2+uw/7dwufeB6CMkPZtq9kxlz6d3Half20mWab7RA7ejiwXKksXMp4SHqjRcUfgHQHBQJORZ8qBGZRTCAH7j4IjRYiLtwSe8myXMRa2K0Tqz9za10SO5AUK6ZJoVXzxIsmoFnGfq4SNMIXJUBZKKiOys6wpxceBjMiOqAoALI8VXLLZqk+3diULai+9u70B+f2A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=N4ApPAC8cZm8fRq41lmYjfGFw5DqEZ5qWgmha3HlxGo=;
 b=AF0IcW32fTSwzbd0Fj4Ap1i6CyEA7zgmtsdFotDIiiRNLMLMNmP8hkIpBW2IoS3myboOFIJGsULQcRkDVdOg10x2mrqK9lMeC4QeaV0yFHC5RHtijXsnJos0bHUXDnquW1Gn+pIan/ceum93Zmu/khuuojxu+/EoHEoVb5bwIEzRP4Hm2n1y1jBBVvhVJLs2Qmzc3PveHciBRdYiJ2EZA8tuDNKG78Z+N8xU1Fg3iaSyA/FBTHURdBCqB/7Q9mrt9V6nY0oaDmqrRcKT80BTHuLk8xjZLsCyxMJYhwdZlY6AazcuqS4IUPsbyZKrWt4qsNXLR8CKH7m73Lv4TGf1/w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <06452eab-653b-458a-048b-cc709151353a@suse.com>
Date: Tue, 1 Mar 2022 14:34:11 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] x86/altcall: silence undue warning
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: Wei Liu <wl@xen.org>, Roger Pau Monne <roger.pau@citrix.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <0e3594ff-c637-46f2-bc95-7a26b5471b86@suse.com>
 <40306bc7-f61c-d330-0ec7-d986e4711d88@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <40306bc7-f61c-d330-0ec7-d986e4711d88@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR06CA0070.eurprd06.prod.outlook.com
 (2603:10a6:20b:464::21) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f8294b98-c379-4f69-e660-08d9fb882ca4
X-MS-TrafficTypeDiagnostic: AM7PR04MB7061:EE_
X-Microsoft-Antispam-PRVS:
	<AM7PR04MB7061409972C2EC82B081D107B3029@AM7PR04MB7061.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(26005)(31696002)(53546011)(2616005)(186003)(6486002)(66946007)(66556008)(508600001)(6512007)(86362001)(6506007)(316002)(6916009)(54906003)(38100700002)(83380400001)(8936002)(5660300002)(36756003)(31686004)(8676002)(4326008)(66476007)(2906002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?QylmcOEI0Zjj+sYx1ZZFYAyMNEGS5XlWHysaySX5PDjx7ZOKWEMu6UQhdFSz?=
 =?us-ascii?Q?XI/9ryw3PpWZmcOYrakIayz4luWANZf5AAqcWl9GKyq32x21sNUrqOAF2Asn?=
 =?us-ascii?Q?s3JUOtKYPvvmBONYLplr9feUU08wOGO3a4IdRs7HE+yoepinKjQuDF1Bq5vN?=
 =?us-ascii?Q?ICy2CPHMj+ICCGo08V2q5j/iB2xL7ne1Cde/d5dEqk7vysQUswE60elRwhvW?=
 =?us-ascii?Q?bcdUvccHeWl00fhNuTJFhZHOx85YjWrmG1FZSm5JwfDrYx9y7BwIW63ILd81?=
 =?us-ascii?Q?WjuGUTF20bMIgt/XcAIDl4mxwjZwRRzeAIMdB8p/dKqkNqB9zAvL9i4L3mlx?=
 =?us-ascii?Q?LzgmTNjSbhzN/iOGvHoaE+eULT8bj0Xn8p3kwK6U2xADdkT3d+Gl520yYWrS?=
 =?us-ascii?Q?1kBc6JLecnGyLVJfQMbAHWzpEP5kQMQ+Zqkzvame0i1X1yMVFZPdxA9hnbbO?=
 =?us-ascii?Q?4BiE4DjhfgiZhVD8MnigKanvXuqVZ9L7eeCVx2nuCT2BQWQB2EC5QWQBrX/v?=
 =?us-ascii?Q?NxNKGXQHHqcrnMHF52rXa1nLhLoum9rxwH4lTYz1K1ywQEC/7DYsw0xwKRnq?=
 =?us-ascii?Q?1Cn/tyvNqt14iUF4Q6hOWFIie4wNqgICtWfd8/hyoGFMC8qdWNkZz2iaRpkL?=
 =?us-ascii?Q?WiSdpfc4u6k9jqKihNlOfv+OcujcwKor5N+NtFrjQU/MADvep+jU5fNUijzp?=
 =?us-ascii?Q?6kyUSJhNHW14v/RZGb43QhGr6OOjP8agYWuo07aahCwBNzoMi6AOxOQUP/ow?=
 =?us-ascii?Q?7VAVy1V0ct2OOAHWmpjy7AltPVz822e2UyyD7LcQ5KHFk06i3Y4spVePGrXA?=
 =?us-ascii?Q?7yYpQbGOBexwdayucnhE7QH7BRPkeEq7b71HTiTQU4LSyhPYp4LHWWCovTAT?=
 =?us-ascii?Q?kJVy81m4GuFov3blxHXBF1wZ9F3EA/PbhJFLenNjQphcAj9hAG8ut5+r9g3E?=
 =?us-ascii?Q?jdo1S1xiLoAzcGAttXXOzjeDbChnZQf9e2PO6Fnj3ANP1fxAR4ScBZlf39Cd?=
 =?us-ascii?Q?a9E3aVYmzPyArzbaIvPJsD2oqwIjLXunInvQeTTGIYSMrZVm8ddhihyo2L8M?=
 =?us-ascii?Q?KNKwztYagvnRk9Wbw/OXPmMtI1WaKmI6JoersDCK9Mje2YK6MNS2plWED9g2?=
 =?us-ascii?Q?INwOCVR2siZJek23gy2HrFVTLfnm7tUbuUGU/OVMXG4hrJ5xcr4N51MiX8qa?=
 =?us-ascii?Q?GxoMQHGrXQ7aIzw05RAwQVZw/7w394lLZY+Vm3IPDEogZv4b0p4kpBAu5Kju?=
 =?us-ascii?Q?kBHKY0AzOm23vKkyehLfNhChW1a2BfCqzC1t7QqL+YiXEemMIF8FwWFUkqoO?=
 =?us-ascii?Q?QA1VXHJa/bbdyE2uNnbGrDEAP6kdyu5rpJD09izTSCjECY1G9MFSHXus4/tW?=
 =?us-ascii?Q?FvkEKAa+PANNWjUoXzKPeC2bbY28ch41vaINorNP+YqiP87UTf9WnfX8Qd9W?=
 =?us-ascii?Q?I+7mg3MUf6wLIysFRtIDjObPYRCyT74inWeXPu42j6W5PZhMuMRl2RxNJ13o?=
 =?us-ascii?Q?8pw9TAusjO+ZrEYJDHOmcvgBL1hkhJ0t6xqwDvU+J4kptTzBV0Mf7mx2gf1U?=
 =?us-ascii?Q?vy6/owJp1PVIn1bmLEfKQ9LFipejKlnh8jI2CkdDKVr3zgacwJ/0FEoEfkFQ?=
 =?us-ascii?Q?RhwnVt72VmLA6TNJC3bVSs4=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f8294b98-c379-4f69-e660-08d9fb882ca4
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 13:34:13.4951
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: H40kgJ+gKrWehKTnylnE9EuK/lye1fRH+pc7PWUWzEKWEhHEvegjYG/MgN4HLDCv9GdvuftYYle2l4qJjibn/A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM7PR04MB7061

On 01.03.2022 13:48, Andrew Cooper wrote:
> On 01/03/2022 11:36, Jan Beulich wrote:
>> Suitable compiler options are passed only when the actual feature
>> (XEN_IBT) is enabled, not when merely the compiler capability was found
>> to be available.
>>
>> Fixes: 12e3410e071e ("x86/altcall: Check and optimise altcall targets")
>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>=20
> Hmm yes.=C2=A0 This is fallout from separating CONFIG_HAS_CC_CET_IBT and
> CONFIG_XEN_IBT.
>=20
> Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>

Thanks.

>> ---
>> Furthermore, is "Optimised away ..." really appropriate in what
>> 37ed5da851b8 ("x86/altcall: Optimise away endbr64 instruction where
>> possible") added? If this really was an optimization (rather than
>> hardening), shouldn't we purge ENDBR also when !cpu_has_xen_ibt, and
>> then ideally all of them? Whereas if this is mainly about hardening,
>> wouldn't the message better say "Purged" or "Clobbered"?
>=20
> I did have an RFC about this.=C2=A0 Turning ENDBR into NOP4 matters, on a
> CET-IBT-active system, to restrict the available options an attacker has
> when they have already managed to hijack a function pointer (i.e.
> already got a partial write gadget).
>=20
> From that point of view, it is hardening.

But then you don't say whether there's any optimization aspect here.
My question was really about the wording of that log message.

> The first version of this logic was trying to use UD1 in the same way as
> Linux does, to harden non-CET builds too, but that does depend on having
> objtool so all direct branches can have their targets updated to miss
> the UD1 instruction.

I think it would be possible (but likely cumbersome) to arrange for
this also without objtool.

> P.S. I'd still like to have "away %u of %u endbr64's".=C2=A0 It occurs to=
 me
> that now we have check-endbr64.sh, we could `wc -l` the $VALID file and
> re-link this back in, but then we couldn't check the final objects.

I was thinking about this wish of yours as well; I simply didn't know how
important you view it to have this information. Not being able to check
the final objects is not an issue: If the data is available after the 2nd
linking pass, contents of .text isn't going to change anymore. All
addresses are the same for the 2nd and 3rd linking passes. Hence if the
checking was inserted between these two passes, the value of interest
could be propagated suitably.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 13:34:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 13:34:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281448.479788 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP2eC-00039z-5y; Tue, 01 Mar 2022 13:34:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281448.479788; Tue, 01 Mar 2022 13:34:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP2eC-00039m-1x; Tue, 01 Mar 2022 13:34:36 +0000
Received: by outflank-mailman (input) for mailman id 281448;
 Tue, 01 Mar 2022 13:34:34 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=hqu5=TM=arm.com=Rahul.Singh@srs-se1.protection.inumbo.net>)
 id 1nP2eA-0002kj-Iy
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 13:34:34 +0000
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur02on062f.outbound.protection.outlook.com
 [2a01:111:f400:fe05::62f])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 53cf0a54-9964-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 14:34:33 +0100 (CET)
Received: from DB6PR0301CA0038.eurprd03.prod.outlook.com (2603:10a6:4:3e::48)
 by PAXPR08MB6621.eurprd08.prod.outlook.com (2603:10a6:102:dc::17)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.25; Tue, 1 Mar
 2022 13:34:29 +0000
Received: from DB5EUR03FT057.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:4:3e:cafe::98) by DB6PR0301CA0038.outlook.office365.com
 (2603:10a6:4:3e::48) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.25 via Frontend
 Transport; Tue, 1 Mar 2022 13:34:29 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT057.mail.protection.outlook.com (10.152.20.235) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Tue, 1 Mar 2022 13:34:29 +0000
Received: ("Tessian outbound 63bb5eb69ee8:v113");
 Tue, 01 Mar 2022 13:34:29 +0000
Received: from 04de89535d06.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 73D7EB47-4B57-4FD0-8C4E-D7860382F7C8.1; 
 Tue, 01 Mar 2022 13:34:23 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 04de89535d06.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 01 Mar 2022 13:34:23 +0000
Received: from AM5PR0801MB2020.eurprd08.prod.outlook.com
 (2603:10a6:203:4c::14) by AM6PR08MB4358.eurprd08.prod.outlook.com
 (2603:10a6:20b:b6::14) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.24; Tue, 1 Mar
 2022 13:34:21 +0000
Received: from AM5PR0801MB2020.eurprd08.prod.outlook.com
 ([fe80::253a:4d6c:61c9:af60]) by AM5PR0801MB2020.eurprd08.prod.outlook.com
 ([fe80::253a:4d6c:61c9:af60%10]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 13:34:21 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 53cf0a54-9964-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=hmgvc60Lh7JtbNghknVL20rXiMusarbxrZ8AuH8JKHE=;
 b=OGczUwGvCIAeL95yLZyKqfJH7mrgz2yFw9oEFcW4q99clIG7g3JMos2a/k9ir36eY/jO6LS3UtiOprv7EAA7HRGJdpOSGmRsyatEQStmw1Pw/JPuc1Wrw3D+ur6PXDo4noD/D6Ap13il7fu6z5sxxqxtHpeqG12qCnRYUAFCRDE=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: c10a95bd88a7f45c
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=K7XtmzoE/f7ZMVGKS+DEk+MV1vJpagBPYVxIazIGZHchrZhCo9Dx00/gNwuQsRCGmpUTJXo8YfFttP1Km4Qucum2IdjahgMoJIRGx+Dwz0CjQcw/3Gb/NGYeBycgj3w05GzEEYBkzX+T/ZrKqfWR5Kcewv6ban1+pPgzQR79Dgn9BLbIzhBkKn3Ij2QxQWKFiUJkOBsmm9aYXqxGMmRHA2dGqpMbAL2c1/rDFwZ92smEht4A2Omgdej7fchmc68teHpb2FjWSPJa8LX2xfUdA4BomeeGtLqDz+GHf7hnV1glt9O/41gAwtN2P7zFA2j7pdBe+LRzEDkk04hGGFYU5Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=hmgvc60Lh7JtbNghknVL20rXiMusarbxrZ8AuH8JKHE=;
 b=F25Q7tPRC2uOXhnsgoS7hb/iZADpm/wI6GBl+JbljNQEL5OC5JBZJGVS21YEK+ME4AYeCdlKyh0V9eHpG6hDESJBK6iJ4C+U/3gfRMf9b6ND39aPT2xcxP3Xg64FwSeTxp8by2jBCSw4Rzpw6AGSFReUgNUWEWn0kTO/FOsCzW7RCrwIxw99wN9Y6rNwChJLxuXeuako0wsU4GXf4vMWNAaDecqjKTmujAunGARleHuxcrHIqcieDN5KdpmFaUZda1WVAeSeZcdesfRK7CguqeN0WwmEVHsjYH2EXnGnLBuW8dOg0Jd1T1mH/y9H+c7N87g99TY0dDB0zl2g8Qq3LQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=hmgvc60Lh7JtbNghknVL20rXiMusarbxrZ8AuH8JKHE=;
 b=OGczUwGvCIAeL95yLZyKqfJH7mrgz2yFw9oEFcW4q99clIG7g3JMos2a/k9ir36eY/jO6LS3UtiOprv7EAA7HRGJdpOSGmRsyatEQStmw1Pw/JPuc1Wrw3D+ur6PXDo4noD/D6Ap13il7fu6z5sxxqxtHpeqG12qCnRYUAFCRDE=
From: Rahul Singh <Rahul.Singh@arm.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Bertrand Marquis <Bertrand.Marquis@arm.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, =?iso-8859-1?Q?Roger_Pau_Monn=E9?=
	<roger.pau@citrix.com>, Wei Liu <wl@xen.org>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v2 1/3] xen/vpci: msix: move x86 specific code to x86 file
Thread-Topic: [PATCH v2 1/3] xen/vpci: msix: move x86 specific code to x86
 file
Thread-Index: AQHYIoBoEZVl6/zkE0mK7dGMpvA2Zqyi2K6AgAfEbQA=
Date: Tue, 1 Mar 2022 13:34:21 +0000
Message-ID: <6BFB9B87-D8A1-442D-B4DC-18760C59D7BF@arm.com>
References: <cover.1644937405.git.rahul.singh@arm.com>
 <4d2a727ba218468e4f347dc12ca051a0534fe205.1644937405.git.rahul.singh@arm.com>
 <6e188f87-7e4c-00ee-dd0c-373d42acec34@suse.com>
In-Reply-To: <6e188f87-7e4c-00ee-dd0c-373d42acec34@suse.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 5865d4d0-cc34-4371-1a39-08d9fb883651
x-ms-traffictypediagnostic:
	AM6PR08MB4358:EE_|DB5EUR03FT057:EE_|PAXPR08MB6621:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR08MB662115AAB50C1B4FB30BC90AFC029@PAXPR08MB6621.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 OyK2OrzoQgCm5hcAPGB/R5k1aXXlVDI+WHT1GKFqyrU0wnkThYPU0jMlIW0rxfOUFB1gZjb8EifWnIujDRlT1bIY8rBHY8CELpHHdVQGjgUAEUe12lh2r7sKttWSViZ/dGHQdmvSatZezt7/zKR2TfrLYWFp0vy520NGo3EdsLey/uddSChNz2zllrXwjEaw3XlRv3gpnJu9XXv1TiDtOZ5KZd1KmJQ/t0iQGs6wxGRRlJrC58H1hWF7nGBZ6i0AwJX9aGpwg69iWkF/UN4QVPaskAu1CTXHPTQErwmSX+JxUucY2kvwP5OKgC9jrEzdfr4Nvaeu0P7DSAf7vMQcJe0GQGdcfi+SfLUakFjGyu6VlwGZfapJTAs+FKLsFh6mydKieiSm2s26Q08HhMpPyjJpxckvsZGtz2iKLKKvfECBOSjgmhZgyrW/UKbTcsmOEqG6onNfuHJEDU03BHkm8xU696e/QKs8WxKG9EJcMMGzL3PWmqT2IsM5kCmmkb8HQ59+RYcpxB9iWMSuA7tj3GTYOuW9ut2rG2k5T/NXcRFgaSjlIEkQGFJVJf8OSQMRXKsglElovkfu8XdMjA7CY+QqM0W5L9OLvp8fN5zn3nXNElOM9k99SYwKaFcK5/FWgqHRTvj2i80ssvk8EsMtiyAQhS7ANg7wgPcPdN+dMMb6cbdjeOhyY54GAQcQYnGLziq5Bkg/+CCRiSAKsANgDyti77zOVHsLf7GRvY8MGIQqHyfFkRn8QYZZr/TOyFY+
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM5PR0801MB2020.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(38100700002)(122000001)(83380400001)(5660300002)(6916009)(54906003)(66556008)(8676002)(4326008)(66476007)(66946007)(76116006)(66446008)(64756008)(8936002)(316002)(6486002)(2616005)(91956017)(26005)(186003)(71200400001)(508600001)(53546011)(6506007)(6512007)(33656002)(2906002)(36756003)(38070700005)(86362001)(45980500001)(309714004);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <0EDF91FBADF737418CE667B814D5C657@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4358
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT057.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	2990341d-51e6-44f7-1dca-08d9fb883183
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(86362001)(316002)(5660300002)(2616005)(6506007)(336012)(8936002)(82310400004)(70206006)(70586007)(2906002)(33656002)(26005)(186003)(4326008)(8676002)(36756003)(53546011)(356005)(81166007)(6486002)(83380400001)(508600001)(54906003)(36860700001)(6512007)(47076005)(40460700003)(6862004)(309714004);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 13:34:29.4954
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 5865d4d0-cc34-4371-1a39-08d9fb883651
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT057.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB6621

H Jan,

> On 24 Feb 2022, at 2:57 pm, Jan Beulich <jbeulich@suse.com> wrote:
>=20
> On 15.02.2022 16:25, Rahul Singh wrote:
>> vpci/msix.c file will be used for arm architecture when vpci msix
>> support will be added to ARM, but there is x86 specific code in this
>> file.
>>=20
>> Move x86 specific code to the x86/hvm/vmsi.c file to make sure common
>> code will be used for other architecture.
>=20
> Could you provide some criteria by which code is considered x86-specific
> (or not)? For example ...

Code moved to x86 file is based on criteria that either the code will be un=
usable or will be different=20
for ARM when MSIX  support will be introduce for ARM.
>=20
>> --- a/xen/arch/x86/hvm/vmsi.c
>> +++ b/xen/arch/x86/hvm/vmsi.c
>> @@ -925,4 +925,106 @@ int vpci_msix_arch_print(const struct vpci_msix *m=
six)
>>=20
>>     return 0;
>> }
>> +
>> +int vpci_make_msix_hole(const struct pci_dev *pdev)
>> +{
>> +    struct domain *d =3D pdev->domain;
>> +    unsigned int i;
>> +
>> +    if ( !pdev->vpci->msix )
>> +        return 0;
>> +
>> +    /* Make sure there's a hole for the MSIX table/PBA in the p2m. */
>> +    for ( i =3D 0; i < ARRAY_SIZE(pdev->vpci->msix->tables); i++ )
>> +    {
>> +        unsigned long start =3D PFN_DOWN(vmsix_table_addr(pdev->vpci, i=
));
>> +        unsigned long end =3D PFN_DOWN(vmsix_table_addr(pdev->vpci, i) =
+
>> +                                     vmsix_table_size(pdev->vpci, i) - =
1);
>> +
>> +        for ( ; start <=3D end; start++ )
>> +        {
>> +            p2m_type_t t;
>> +            mfn_t mfn =3D get_gfn_query(d, start, &t);
>> +
>> +            switch ( t )
>> +            {
>> +            case p2m_mmio_dm:
>> +            case p2m_invalid:
>> +                break;
>> +            case p2m_mmio_direct:
>> +                if ( mfn_x(mfn) =3D=3D start )
>> +                {
>> +                    clear_identity_p2m_entry(d, start);
>> +                    break;
>> +                }
>> +                /* fallthrough. */
>> +            default:
>> +                put_gfn(d, start);
>> +                gprintk(XENLOG_WARNING,
>> +                        "%pp: existing mapping (mfn: %" PRI_mfn
>> +                        "type: %d) at %#lx clobbers MSIX MMIO area\n",
>> +                        &pdev->sbdf, mfn_x(mfn), t, start);
>> +                return -EEXIST;
>> +            }
>> +            put_gfn(d, start);
>> +        }
>> +    }
>> +
>> +    return 0;
>> +}
>=20
> ... nothing in this function looks to be x86-specific, except maybe
> functions like clear_identity_p2m_entry() may not currently be available
> on Arm. But this doesn't make the code x86-specific.

I will maybe be wrong but what I understand from the code is that for x86=20
if there is no p2m entries setup for the region, accesses to them will be t=
rapped=20
into the hypervisor and can be handled by specific MMIO handler.

But for ARM when we are registering the MMIO handler we have to provide=20
the GPA also for the MMIO handler.=20

For ARM arch vpci_make_msix_hole() will be used to register the MMIO handle=
r=20
for the MSIX MMIO region.

int vpci_make_msix_hole(const struct pci_dev *pdev)
{
    struct vpci_msix *msix =3D pdev->vpci->msix;
    paddr_t addr,size;

   for ( int i =3D 0; msix && i < ARRAY_SIZE(msix->tables); i++ )
   {                                                                       =
   =20
       addr =3D vmsix_table_addr(pdev->vpci, i);              =20
       size =3D vmsix_table_size(pdev->vpci, i) - 1;                       =
                                                 =20
       register_mmio_handler(pdev->domain, &vpci_msi_mmio_handler,         =
   =20
                                              addr, size, NULL);           =
                    =20
    }                                                                      =
                                          =20
    return 0;                                                              =
    =20
}

Therefore in this case there is difference how ARM handle this case.
=20
>=20
>> +struct vpci_msix *vpci_msix_find(const struct domain *d, unsigned long =
addr)
>> +{
>> +    struct vpci_msix *msix;
>> +
>> +    list_for_each_entry ( msix, &d->arch.hvm.msix_tables, next )
>> +    {
>> +        const struct vpci_bar *bars =3D msix->pdev->vpci->header.bars;
>> +        unsigned int i;
>> +
>> +        for ( i =3D 0; i < ARRAY_SIZE(msix->tables); i++ )
>> +            if ( bars[msix->tables[i] & PCI_MSIX_BIRMASK].enabled &&
>> +                 VMSIX_ADDR_IN_RANGE(addr, msix->pdev->vpci, i) )
>> +                return msix;
>> +    }
>> +
>> +    return NULL;
>> +}
>=20
> Or take this one - I don't see anything x86-specific in here. The use
> of d->arch.hvm merely points out that there may be a field which now
> needs generalizing.

Yes, you are right here I can avoid this change if I will introduce=20
"struct list_head msix_tables"  in "d->arch.hvm" for ARM also.=20

>=20
>> +static int x86_msix_accept(struct vcpu *v, unsigned long addr)
>> +{
>> +    return !!vpci_msix_find(v->domain, addr);
>> +}
>> +
>> +static int x86_msix_write(struct vcpu *v, unsigned long addr, unsigned =
int len,
>> +                          unsigned long data)
>> +{
>> +    const struct domain *d =3D v->domain;
>> +    struct vpci_msix *msix =3D vpci_msix_find(d, addr);
>> +
>> +    return vpci_msix_write(msix, addr, len, data);
>> +}
>> +
>> +static int x86_msix_read(struct vcpu *v, unsigned long addr, unsigned i=
nt len,
>> +                         unsigned long *data)
>> +{
>> +    const struct domain *d =3D v->domain;
>> +    struct vpci_msix *msix =3D vpci_msix_find(d, addr);
>> +
>> +    return vpci_msix_read(msix, addr, len, data);
>> +}
>> +
>> +static const struct hvm_mmio_ops vpci_msix_table_ops =3D {
>> +    .check =3D x86_msix_accept,
>> +    .read =3D x86_msix_read,
>> +    .write =3D x86_msix_write,
>> +};
>=20
> I don't see the need to add x86_ prefixes to static functions while
> you're moving them. Provided any of this is really x86-specific in
> the first place.
>=20

Ok. Let me remove the x86_ prefixes in next version.  MMIO handler function=
s declaration is different=20
for ARM and X86 therefore I need to move this code to arch specific file.

>> +void vpci_msix_arch_register(struct vpci_msix *msix, struct domain *d)
>> +{
>> +    if ( list_empty(&d->arch.hvm.msix_tables) )
>> +        register_mmio_handler(d, &vpci_msix_table_ops);
>=20
> This is perhaps the only thing which I could see would better live
> in arch-specific code.
>=20
>> --- a/xen/arch/x86/msi.c
>> +++ b/xen/arch/x86/msi.c
>> @@ -20,10 +20,10 @@
>> #include <xen/iocap.h>
>> #include <xen/keyhandler.h>
>> #include <xen/pfn.h>
>> +#include <xen/msi.h>
>> #include <asm/io.h>
>> #include <asm/smp.h>
>> #include <asm/desc.h>
>> -#include <asm/msi.h>
>=20
> Just like you do here and elsewhere, ...
>=20
>> --- a/xen/drivers/passthrough/amd/iommu.h
>> +++ b/xen/drivers/passthrough/amd/iommu.h
>> @@ -26,6 +26,7 @@
>> #include <xen/tasklet.h>
>> #include <xen/sched.h>
>> #include <xen/domain_page.h>
>> +#include <xen/msi.h>
>>=20
>> #include <asm/msi.h>
>=20
> ... I think you want to remove this now redundant #include as well.

Ok.
>=20
>> --- a/xen/include/xen/msi.h
>> +++ b/xen/include/xen/msi.h
>> @@ -3,6 +3,34 @@
>>=20
>> #include <xen/pci.h>
>>=20
>> +#define msi_control_reg(base)       (base + PCI_MSI_FLAGS)
>> +#define msi_lower_address_reg(base) (base + PCI_MSI_ADDRESS_LO)
>> +#define msi_upper_address_reg(base) (base + PCI_MSI_ADDRESS_HI)
>> +#define msi_data_reg(base, is64bit) \
>> +	( (is64bit) ? (base) + PCI_MSI_DATA_64 : (base) + PCI_MSI_DATA_32 )
>> +#define msi_mask_bits_reg(base, is64bit) \
>> +	( (is64bit) ? (base) + PCI_MSI_MASK_BIT : (base) + PCI_MSI_MASK_BIT - =
4)
>> +#define msi_pending_bits_reg(base, is64bit) \
>> +	( (is64bit) ? (base) + PCI_MSI_MASK_BIT + 4 : (base) + PCI_MSI_MASK_BI=
T)
>> +#define msi_disable(control)        control &=3D ~PCI_MSI_FLAGS_ENABLE
>> +#define multi_msi_capable(control) \
>> +	(1 << ((control & PCI_MSI_FLAGS_QMASK) >> 1))
>> +#define multi_msi_enable(control, num) \
>> +	control |=3D (((fls(num) - 1) << 4) & PCI_MSI_FLAGS_QSIZE);
>> +#define is_64bit_address(control)   (!!(control & PCI_MSI_FLAGS_64BIT))
>> +#define is_mask_bit_support(control)    (!!(control & PCI_MSI_FLAGS_MAS=
KBIT))
>> +#define msi_enable(control, num) multi_msi_enable(control, num); \
>> +	control |=3D PCI_MSI_FLAGS_ENABLE
>> +
>> +#define msix_control_reg(base)      (base + PCI_MSIX_FLAGS)
>> +#define msix_table_offset_reg(base) (base + PCI_MSIX_TABLE)
>> +#define msix_pba_offset_reg(base)   (base + PCI_MSIX_PBA)
>> +#define msix_enable(control)        control |=3D PCI_MSIX_FLAGS_ENABLE
>> +#define msix_disable(control)       control &=3D ~PCI_MSIX_FLAGS_ENABLE
>> +#define msix_table_size(control)    ((control & PCI_MSIX_FLAGS_QSIZE)+1=
)
>> +#define msix_unmask(address)        (address & ~PCI_MSIX_VECTOR_BITMASK=
)
>> +#define msix_mask(address)          (address | PCI_MSIX_VECTOR_BITMASK)
>=20
> Why did you put these not ...
>=20
>> #ifdef CONFIG_HAS_PCI_MSI
>=20
> .. below here?

I will fix this in next version.

>=20
> Also the movement of these is quite the opposite of what the title
> says. IOW this likely wants to be a separate change.

Ok. Let me move this change in separate patch in next series.

Regards,
Rahul
>=20
> Jan
>=20



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 13:40:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 13:40:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281462.479799 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP2jg-000507-Tg; Tue, 01 Mar 2022 13:40:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281462.479799; Tue, 01 Mar 2022 13:40:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP2jg-000500-QN; Tue, 01 Mar 2022 13:40:16 +0000
Received: by outflank-mailman (input) for mailman id 281462;
 Tue, 01 Mar 2022 13:40:14 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=BNgs=TM=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nP2je-0004zu-SF
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 13:40:14 +0000
Received: from EUR01-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur01on0604.outbound.protection.outlook.com
 [2a01:111:f400:fe1f::604])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 1ee861eb-9965-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 14:40:14 +0100 (CET)
Received: from AM5PR0601CA0047.eurprd06.prod.outlook.com
 (2603:10a6:203:68::33) by AM4PR0802MB2324.eurprd08.prod.outlook.com
 (2603:10a6:200:5f::21) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.22; Tue, 1 Mar
 2022 13:40:00 +0000
Received: from AM5EUR03FT029.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:203:68:cafe::ca) by AM5PR0601CA0047.outlook.office365.com
 (2603:10a6:203:68::33) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.23 via Frontend
 Transport; Tue, 1 Mar 2022 13:40:00 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT029.mail.protection.outlook.com (10.152.16.150) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Tue, 1 Mar 2022 13:40:00 +0000
Received: ("Tessian outbound 1f399c739551:v113");
 Tue, 01 Mar 2022 13:39:59 +0000
Received: from f9ac703d02b1.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 34767BB8-C71B-4241-B039-0B7209675DD7.1; 
 Tue, 01 Mar 2022 13:39:49 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id f9ac703d02b1.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 01 Mar 2022 13:39:49 +0000
Received: from AM0PR08MB3778.eurprd08.prod.outlook.com (2603:10a6:208:104::24)
 by HE1PR0802MB2602.eurprd08.prod.outlook.com (2603:10a6:3:e2::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.25; Tue, 1 Mar
 2022 13:39:47 +0000
Received: from AM0PR08MB3778.eurprd08.prod.outlook.com
 ([fe80::4dbb:4fed:bc86:1803]) by AM0PR08MB3778.eurprd08.prod.outlook.com
 ([fe80::4dbb:4fed:bc86:1803%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 13:39:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1ee861eb-9965-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=o54D5Ouvu3ReLaYNHPl9bo5bDSn+jk5JPf3ZQyesVtY=;
 b=g0+WPbcV+TdBHnifaM0+LlHUVXpLvwfQ7firzUcZXNI1ZTgF4M6WoRiTFjB2hPwPeWaAvI/0JudEkD589e/kRbs7krc5bG7afHRVrUzt3iM17Gn1de1Qq6DZIVP4AOYKYCj5EBVCLDnsh/hBXdw56Y1C/IhGVtSTm5i9F+OALiI=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 1b7deb144c4fe53a
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ABEosmYa8BbLW6jRK6lmNDMU7CIcDm7/KFcHHPxarsNYWpWQP63GuSi5UQbCSlhVFH+HerwcOsjMbVR403rOKb2FszbdQmWG85fjLU2yvIct7WbEPh4PZbuHG5TDUEZLTYrLCwmRFZhFmgKXgbzg1+Zk8PI0/N2e84xrlE1SdfRzSszqbwVWQYVxB1WOVRERL5C8+rekwBhHppN/IoR//OqrpmRVv/yDFhuiUopbO4RIc3F0tgg+fH8rals8COSAea2BZdmX+IWbThYY8usPTxCdTNXM+NcU0hgcDAAb3yr6oDl+96+IlU9FrvDYO6L3YlHT/x+qxvOojXvApw6Feg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=o54D5Ouvu3ReLaYNHPl9bo5bDSn+jk5JPf3ZQyesVtY=;
 b=Ddc9PFm8nWOTXRQdhtXJaIOT31eqEktkKxZEgW5YWfexDQKZZE2TOpZRAAvEhiJOI5Oq+yLjkGBVbVxoLSGyDyfCTKgjHWTQgCF0oSyyGKukEywnH8bxDu3DjnkDZIwEAX6amNjrH0olf5mrbC6bQ1g/Dm4ItxxrwJZOr3w7qQ67k1YMp7QqY5UQGfbpnrFhpbrzmrbm9RzGUyhbpqBeoVk8vF7fBKcLciNmJYTIhKKXF1WNzGu1EC0O7VEUiAt6zX5+par/MC37x6qZTJOGpRJOm8oBklNU+v7XeFQzYL1aHElHT2LaY2OC3HASx4Mogu4rKt8gJzqcZbqpwn5HAQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=o54D5Ouvu3ReLaYNHPl9bo5bDSn+jk5JPf3ZQyesVtY=;
 b=g0+WPbcV+TdBHnifaM0+LlHUVXpLvwfQ7firzUcZXNI1ZTgF4M6WoRiTFjB2hPwPeWaAvI/0JudEkD589e/kRbs7krc5bG7afHRVrUzt3iM17Gn1de1Qq6DZIVP4AOYKYCj5EBVCLDnsh/hBXdw56Y1C/IhGVtSTm5i9F+OALiI=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Julien Grall <julien@xen.org>
CC: Henry Wang <Henry.Wang@arm.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>, "sstabellini@kernel.org"
	<sstabellini@kernel.org>, Wei Chen <Wei.Chen@arm.com>, Penny Zheng
	<Penny.Zheng@arm.com>
Subject: Re: [RFC PATCH 0/2] Introduce reserved Xenheap
Thread-Topic: [RFC PATCH 0/2] Introduce reserved Xenheap
Thread-Index: AQHYKR4hXoXrj++ew0mI1ZjbqpdQh6yktMKAgAPeNACAAMMegIABO0+A
Date: Tue, 1 Mar 2022 13:39:47 +0000
Message-ID: <316007B7-51BA-4820-8F6F-018BC6D3A077@arm.com>
References: <20220224013023.50920-1-Henry.Wang@arm.com>
 <6269ec3d-039e-d68f-771d-c5e088631410@xen.org>
 <PA4PR08MB625324910ED4D40383191F9D92019@PA4PR08MB6253.eurprd08.prod.outlook.com>
 <48a0712c-eff8-dfc1-2136-59317f22321f@xen.org>
In-Reply-To: <48a0712c-eff8-dfc1-2136-59317f22321f@xen.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 2d4d3b6c-cf5e-4402-0fdd-08d9fb88fb5b
x-ms-traffictypediagnostic:
	HE1PR0802MB2602:EE_|AM5EUR03FT029:EE_|AM4PR0802MB2324:EE_
X-Microsoft-Antispam-PRVS:
	<AM4PR0802MB232411F86D43328AABA917EC9D029@AM4PR0802MB2324.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3778.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(53546011)(6486002)(71200400001)(36756003)(6512007)(38100700002)(6506007)(122000001)(83380400001)(508600001)(6916009)(54906003)(8936002)(316002)(4326008)(86362001)(38070700005)(5660300002)(2616005)(2906002)(33656002)(26005)(186003)(66446008)(66476007)(66946007)(91956017)(64756008)(76116006)(66556008)(8676002)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <D659674B821CD24D8BD52527FAC072FD@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0802MB2602
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT029.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	c354b0de-36b8-48ed-e5a9-08d9fb88f3cd
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(336012)(186003)(26005)(81166007)(40460700003)(2616005)(83380400001)(47076005)(8936002)(33656002)(36756003)(5660300002)(2906002)(36860700001)(82310400004)(70206006)(70586007)(6512007)(6486002)(6506007)(53546011)(508600001)(356005)(54906003)(86362001)(8676002)(6862004)(4326008)(316002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 13:40:00.0183
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 2d4d3b6c-cf5e-4402-0fdd-08d9fb88fb5b
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT029.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR0802MB2324

Hi,

> On 28 Feb 2022, at 18:51, Julien Grall <julien@xen.org> wrote:
>=20
>=20
>=20
> On 28/02/2022 07:12, Henry Wang wrote:
>> Hi Julien,
>=20
> Hi Henry,
>=20
>>> -----Original Message-----
>>> From: Julien Grall <julien@xen.org>
>>> Sent: Saturday, February 26, 2022 4:09 AM
>>> To: Henry Wang <Henry.Wang@arm.com>; xen-devel@lists.xenproject.org;
>>> sstabellini@kernel.org
>>> Cc: Bertrand Marquis <Bertrand.Marquis@arm.com>; Wei Chen
>>> <Wei.Chen@arm.com>; Penny Zheng <Penny.Zheng@arm.com>
>>> Subject: Re: [RFC PATCH 0/2] Introduce reserved Xenheap
>>>=20
>>> Hi Henry,
>>>=20
>>> On 24/02/2022 01:30, Henry Wang wrote:
>>>> The reserved Xenheap, or statically configured Xenheap, refers to part=
s
>>>> of RAM reserved in the beginning for Xenheap. Like the static memory
>>>> allocation, such reserved Xenheap regions are reserved by configuratio=
n
>>>> in the device tree using physical address ranges.
>>>=20
>>> In Xen, we have the concept of domheap and xenheap. For Arm64 and x86
>>> they would be the same. But for Arm32, they would be different: xenheap
>>> is always mapped whereas domheap is separate.
>>>=20
>>> Skimming through the series, I think you want to use the region for bot=
h
>>> domheap and xenheap. Is that correct?
>> Yes I think that would be correct, for Arm32, instead of using the full
>> `ram_pages` as the initial value of `heap_pages`, we want to use the
>> region specified in the device tree. But we are confused if this is the
>> correct (or preferred) way for Arm32, so in this series we only
>> implemented the reserved heap for Arm64.
>=20
> That's an interesting point. When I skimmed through the series on Friday,=
 my first thought was that for arm32 it would be only xenheap (so
> all the rest of memory is domheap).
>=20
> However, Xen can allocate memory from domheap for its own purpose (e.g. w=
e don't need contiguous memory, or for page-tables).
>=20
> In a fully static environment, the domheap and xenheap are both going to =
be quite small. It would also be somewhat difficult for a user to size it. =
So I think, it would be easier to use the region you introduce for both dom=
heap and xenheap.
>=20
> Stefano, Bertrand, any opionions?

Only one region is easier to configure and I think in this case it will als=
o prevent lots of over allocation.
So in a full static case, having only one heap is a good strategy for now.

There might be some cases where someone would want to fully control the mem=
ory allocated by Xen per domain and in this case be able to size it for eac=
h guest (to make sure one guest cannot be impacted by an other at all).
But this is definitely something that could be done later, if needed.

Cheers
Bertrand

>=20
> On a separate topic, I think we need some documentation explaining how a =
user can size the xenheap. How did you figure out for your setup?
>=20
>>>=20
>>> Furthemore, now that we are introducing more static region, it will get
>>> easier to overlap the regions by mistakes. I think we want to have some
>>> logic in Xen (or outside) to ensure that none of them overlaps. Do you
>>> have any plan for that?
>> Totally agree with this idea, but before we actually implement the code,
>> we would like to firstly share our thoughts on this: One option could be=
 to
>> add data structures to notes down these static memory regions when the
>> device tree is parsed, and then we can check if they are overlapped.
>=20
> This should work.
>=20
>> Over
>> the long term (and this long term option is currently not in our plan),
>> maybe we can add something in the Xen toolstack for this usage?
>=20
> When I read "Xen toolstack", I read the tools that will run in dom0. Is i=
t what you meant?
>=20
>> Also, I am wondering if the overlapping check logic should be introduced
>> in this series. WDYT?
>=20
> I would do that in a separate series.
>=20
> Cheers,
>=20
> --=20
> Julien Grall



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 13:42:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 13:42:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281469.479810 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP2lc-0005a0-9g; Tue, 01 Mar 2022 13:42:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281469.479810; Tue, 01 Mar 2022 13:42:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP2lc-0005Zt-5H; Tue, 01 Mar 2022 13:42:16 +0000
Received: by outflank-mailman (input) for mailman id 281469;
 Tue, 01 Mar 2022 13:42:14 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=BNgs=TM=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nP2la-0005Zl-OA
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 13:42:14 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04on061f.outbound.protection.outlook.com
 [2a01:111:f400:fe0e::61f])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 66a805c0-9965-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 14:42:14 +0100 (CET)
Received: from DB6P18901CA0007.EURP189.PROD.OUTLOOK.COM (2603:10a6:4:16::17)
 by AM0PR08MB5460.eurprd08.prod.outlook.com (2603:10a6:208:187::20) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.21; Tue, 1 Mar
 2022 13:42:04 +0000
Received: from DB5EUR03FT024.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:4:16:cafe::bd) by DB6P18901CA0007.outlook.office365.com
 (2603:10a6:4:16::17) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.13 via Frontend
 Transport; Tue, 1 Mar 2022 13:42:04 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT024.mail.protection.outlook.com (10.152.20.67) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Tue, 1 Mar 2022 13:42:04 +0000
Received: ("Tessian outbound 741ca6c82739:v113");
 Tue, 01 Mar 2022 13:42:04 +0000
Received: from e39459335042.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 7498BAF1-A7B9-4C84-A273-F72C58736038.1; 
 Tue, 01 Mar 2022 13:41:53 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id e39459335042.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 01 Mar 2022 13:41:53 +0000
Received: from AM0PR08MB3778.eurprd08.prod.outlook.com (2603:10a6:208:104::24)
 by AM5PR0801MB1938.eurprd08.prod.outlook.com (2603:10a6:203:4a::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.22; Tue, 1 Mar
 2022 13:41:51 +0000
Received: from AM0PR08MB3778.eurprd08.prod.outlook.com
 ([fe80::4dbb:4fed:bc86:1803]) by AM0PR08MB3778.eurprd08.prod.outlook.com
 ([fe80::4dbb:4fed:bc86:1803%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 13:41:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 66a805c0-9965-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=l7+NjUtIl4PtuQwZtk4J6GpMswcXb9VYN05c0Y1IzzQ=;
 b=7FVaZbuiYq5Uml/8omSPN8vgoQcK81rdMR753/l+07uCQSn8MZYYi0mBQhNBB9bvGYCXYiSrZUTqd68uFEpENkbwnp0udHpSXxq5kobBKH/RjKXX1gfqGoIjeO504k/orltwyy9pqifZHg7GGKwK5LUOWFXxHxBrbZdXJso8eYo=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 434c5e17371c0bf4
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=gfvXUOfQB1FtJc2fD/wR4pcc9MW6xp3IG7SsL6tyzYFHbgWQE1kwvs3j4o/dNblp8SktFyEqGEeslTO+laAQzcXMX7/VZjL8NircxpYBosbuAJ0yB6DmODd8M5Hrm5nDwG4T4vWjjOE4NY+9DbCa5cbemHf6Dk++LMYSzEYba5RGAUDMorB0l3TS48CVYcUIj1iqFUloZR04mmM96I28kVSsoV0Jlg6PpANJ4arLcNRA7fIxwKaGPHaWtikK9/HtPpx08jx/w7zphn7E33STav4JTlF7F5dcJP8X5YjYjjHtxoCKUEzJmNCP+qpM9JCwm4IzAnG8VZ2UcG4hqE8Knw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=l7+NjUtIl4PtuQwZtk4J6GpMswcXb9VYN05c0Y1IzzQ=;
 b=jSx+lcmEn7bWLI76bG14n2JpdV14ThzaEO4ojm7vtH/TOT/N4zYES5GQLGRkeaXFco8y2q/GDI9HrRXT7hKgK2W+F3ZWg5p2oWLFAfxIidJEgMACKJmUUxrrMWyxOL8roAVzt1It75fzjtoB4inSXQhMFy2+z+oCasN/v2aARc1m0LW9WhYhQv155WV8isouPvDTyEkuhpQR4ocqZ1W/QohfuG36EOpS5SBylpi5+GejFGpPZ7RF4AbY2kXLoQxH18lZGUhb5N9RTRzFET1lMR4/GP7mcl4sHRxQOMBnzZj3PNeHKCoCWl7gHhH6P0SR0BMyJbWyvCfxUDfbY2j8Uw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=l7+NjUtIl4PtuQwZtk4J6GpMswcXb9VYN05c0Y1IzzQ=;
 b=7FVaZbuiYq5Uml/8omSPN8vgoQcK81rdMR753/l+07uCQSn8MZYYi0mBQhNBB9bvGYCXYiSrZUTqd68uFEpENkbwnp0udHpSXxq5kobBKH/RjKXX1gfqGoIjeO504k/orltwyy9pqifZHg7GGKwK5LUOWFXxHxBrbZdXJso8eYo=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Julien Grall <julien@xen.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Michal
 Orzel <Michal.Orzel@arm.com>, Julien Grall <jgrall@amazon.com>, Stefano
 Stabellini <sstabellini@kernel.org>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH v2] xen/arm32: head: Don't set r12 and update the
 documentation
Thread-Topic: [PATCH v2] xen/arm32: head: Don't set r12 and update the
 documentation
Thread-Index: AQHYLKgtSgsY3bUkq0KDQmgeSYVnA6yqiuQA
Date: Tue, 1 Mar 2022 13:41:51 +0000
Message-ID: <A1D67828-D79B-4EC4-820E-5253984A501A@arm.com>
References: <20220228133536.57004-1-julien@xen.org>
In-Reply-To: <20220228133536.57004-1-julien@xen.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: db0658ff-01ab-4a3e-8490-08d9fb894590
x-ms-traffictypediagnostic:
	AM5PR0801MB1938:EE_|DB5EUR03FT024:EE_|AM0PR08MB5460:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR08MB546084A01A2E99C2C71139F69D029@AM0PR08MB5460.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 urG9u9MkH6bk74nbenzEnNotWncfAi9iCIy31oe4G4nvFAc1Mtkf7fDKCG9EHVEa2j+HjvES654/TdJ/dtpbC/nlEF35S108/8+A0gksdZNagSKs6CBWZTLQqs2ySjx5fr4+sg2OOQE/MAhdfT6Ot27eqT60XyctY1i3eAiH2JGcZlE4kcq/TJqR1jOp8BJuzmsZNl7VyqfwjCHWtQ692w62VhiMmaAhmO+rq/vIuWvsSIrFC5rrzfmJ4asneOweOYAV2da8UAC2nEUqdnIpHB19gLHUofj1GbZHA+QrO9D2Woo768qpdffn8yZuFhlpjr888kvW898LheMBx2ov8a7LD5ZIJXspkj52iq6KtSGcG1T7vyDceMtaKiIuSeG6SSX+/1gwQ9GT1SihbEqjkcKdEm2MiDSaycHRJrPFpOZqsHEd47Y34z3gsClHTtLj7wh+IVhkEvyGeqj04tz7AWfritkFg0D1HB1msMdTV3J8ip5mB1AAFH2VU5/1lXSD8zPWX7R6z0dzXng8Mtyk5Fa87Vy2zg8vyxOt3mlfjONX/13lGS47MSKcQ8GZpHEhJrBjTbHxCFjx1a1fZ0FMF7yyFFf94Ei/UcRdtOouBoGyQHCL1y/BEkAU39drzpaCr6vEKXsz8DH2glWX4HqNXkFKwPQaXFBGDzoesmBShRX1bQAb8TeUVF5JQXyTOMJyzywfpz6axyxN7oq9XJCYvahK7Mu43ySw9D5tt8dIwMY=
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3778.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(53546011)(66446008)(64756008)(66946007)(66476007)(54906003)(66556008)(86362001)(5660300002)(508600001)(83380400001)(4326008)(8676002)(122000001)(71200400001)(38070700005)(6512007)(38100700002)(91956017)(76116006)(36756003)(33656002)(2906002)(316002)(6486002)(8936002)(15650500001)(6916009)(186003)(26005)(6506007)(2616005)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <466B31CA86310446BFEB74B70AFDD278@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0801MB1938
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT024.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	3ca181af-f5fa-467f-9ffa-08d9fb893db5
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(83380400001)(8676002)(6862004)(4326008)(86362001)(336012)(70586007)(70206006)(47076005)(186003)(6506007)(2616005)(107886003)(26005)(36756003)(316002)(54906003)(6512007)(53546011)(36860700001)(508600001)(40460700003)(33656002)(6486002)(8936002)(356005)(82310400004)(81166007)(15650500001)(5660300002)(2906002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 13:42:04.5751
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: db0658ff-01ab-4a3e-8490-08d9fb894590
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT024.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB5460

Hi Julien,

> On 28 Feb 2022, at 13:35, Julien Grall <julien@xen.org> wrote:
>=20
> From: Julien Grall <jgrall@amazon.com>
>=20
> Since commit 54c4ae18d158 ("xen/arm32: head: Rework and document
> launch()"), the boot code is setting r12 but not read it.
>=20
> So remove the two instructions setting r12 and update the documentation
> to show r12 has no specific purpose.
>=20
> Signed-off-by: Julien Grall <jgrall@amazon.com>
Reviewed-by: Bertrand Marquis <bertrand.marquis@arm.com>

Cheers
Bertrand

>=20
> ---
>    Changes in v2:
>        - Don't set r12.
> ---
> xen/arch/arm/arm32/head.S | 6 +-----
> 1 file changed, 1 insertion(+), 5 deletions(-)
>=20
> diff --git a/xen/arch/arm/arm32/head.S b/xen/arch/arm/arm32/head.S
> index 13cfc837d39c..7a906167efca 100644
> --- a/xen/arch/arm/arm32/head.S
> +++ b/xen/arch/arm/arm32/head.S
> @@ -79,7 +79,7 @@
>  *   r9  - paddr(start)
>  *   r10 - phys offset
>  *   r11 - UART address
> - *   r12 - is_secondary_cpu
> + *   r12 -
>  *   r13 - SP
>  *   r14 - LR
>  *   r15 - PC
> @@ -166,8 +166,6 @@ past_zImage:
> #endif
>         PRINT("- Boot CPU booting -\r\n")
>=20
> -        mov   r12, #0                /* r12 :=3D is_secondary_cpu */
> -
>         bl    check_cpu_mode
>         bl    cpu_init
>         bl    create_page_tables
> @@ -206,8 +204,6 @@ GLOBAL(init_secondary)
>         adr   r9, start              /* r9  :=3D paddr (start) */
>         sub   r10, r9, r0            /* r10 :=3D phys-offset */
>=20
> -        mov   r12, #1                /* r12 :=3D is_secondary_cpu */
> -
>         mrc   CP32(r1, MPIDR)
>         bic   r7, r1, #(~MPIDR_HWID_MASK) /* Mask out flags to get CPU ID=
 */
>=20
> --=20
> 2.32.0
>=20
>=20



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 13:43:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 13:43:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281475.479821 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP2mz-0006AB-LA; Tue, 01 Mar 2022 13:43:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281475.479821; Tue, 01 Mar 2022 13:43:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP2mz-0006A4-GZ; Tue, 01 Mar 2022 13:43:41 +0000
Received: by outflank-mailman (input) for mailman id 281475;
 Tue, 01 Mar 2022 13:43:40 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Qfhu=TM=citrix.com=prvs=052ba2b28=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nP2my-00069y-Cj
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 13:43:40 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 98772716-9965-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 14:43:38 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 98772716-9965-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646142218;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=9JZVEUfUgVGCzGZwPMO7/BrprmBcSVATClbrT3NVFJQ=;
  b=PE6A/Tu/rOH4bkqj+fd9l1cU9d8UL2PCwG9Jfa5sSIgwXFlztsn3sXNn
   iNcRggFmi5cPfJ30Tn6ou2AsQuorTeLr7Ok1PQNzElHGUrZB2beZE+nc+
   FCtFhaZbk8uPGrwkx61dDrOK6cwTXxJ+LwMERXbiOCj72OVdT9HcDPlVt
   c=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 64659634
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:/ofwJquaWf1FVU/KPHcCJuu69OfnVEBeMUV32f8akzHdYApBsoF/q
 tZmKT3UPqyJNDSmfdx3O4W0phhX7JXWzINgSgA+pCsxFXsa+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jV4
 IuoyyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi81GqDhodo9XyUBNCEhF/RlpIL3LCKW5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AO
 5REOGQ0MHwsZTVoH0dJLLUYgNyNmyGhWBB0+GqzmvAetj27IAtZj+G2bYu9lsaxbdpRtlaVo
 CTB5WuRKgEXMpmTxCSI9lqoh/TThmXrVYQKDrq6+/V2xlqJyQQ7ChcbSF+6qvmRkVOlVpRUL
 El8x8Y1hfFsrgrxFIC7BkDm5i7f1vIBZzZOO/Ee5Sy09IrY31++BjcuFx0dVewr7uZjEFTGy
 WS1t9/uADVutpicRnSc6qqYoFuOBMQFEYMRTXRaFFVYurEPtKl210uSFYg7TMZZm/WoQWmY/
 tyckMQpa1z/Z+Yv3r7zw13IiinESnPhHl9svVW/so5IA2pEiG+Zi26AtACzARVodt/xory9U
 J4swZD2AAcmV8zlqcB1aL9RdIxFHt7cWNEmvXZhHoM66xOm8GO5cIZb7VlWfRk1bJ5bImG1O
 RaK6Gu9AaO/2lPwNsebhKrrVqwXIVXIT4y5Bpg4kPIUCnSOSON31H43PhPBt4wcuEMtjbs+K
 f+mnTWEVh4n5VBc5GPuHY81iOZzrghnnD+7bc2rnnyPjOvFDFbIGOhtDbd7Rr1ghE9yiF6Oq
 Ig32grj40g3bdASlQGMqd9DdQ1RdCNjbX00wuQOHtO+zsNdMDhJI9fawK87epwjmKJQl+zS+
 Wq6VFMew1367UAr4y3TApy/QNsDhapCkE8=
IronPort-HdrOrdr: A9a23:jMbR/KrAUsyYLpu2z99fdxwaV5oleYIsimQD101hICG9E/b1qy
 nKpp8mPHDP5wr5NEtPpTnjAsm9qALnlKKdiLN5Vd3OYOCMghrKEGgN1/qG/xTQXwH46+5Bxe
 NBXsFFebnN5IFB/KTH3DU=
X-IronPort-AV: E=Sophos;i="5.90,146,1643691600"; 
   d="scan'208";a="64659634"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=K5vCUTK4EWu/UnquWQ3DFsn9FxKdTINpw/NZVoYMQQY4ueUXWCkSzJBBgt4noj6Wcxfu86v3oRY0LI+oRBEZn3qH+6u3P8fwYvPLe8Xczz4pbNDlvKGrW2DDPP5ipJUB6cpcew8xCMqGxksBT16OhMtt3nUmF7H0WFV2YlQTc1aBtWqKphdVkKupnPegr1wbRlFtIboAZ7hox1fHgyf3sAag4CSmGrVRZgDaoezWAXCNKMvt7GxMWnO2op6a+IF5RsnB2RKOxY+spO1utSzsfC46MQFESglCL42oo+XxSDQBGOuxpYYrCU5igWrONoE6b9RIKi0hrnUXhKTGhG9Icw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=o+SBL3Rf+ExGdrUo3Mmdpp8ZIwRGZZZeo7loAC7KyZI=;
 b=N9mueqtH94q+6VxnO44tWR1m/UVTE6lJsbv99Eog8RjS6NiKJajBwnHs65CEOYdQjsfnpq4qi3mduSruRJhVxuEfTxXcKrZu91Bh3OQ5l1AIgTNRigqpBfLoFh1EEEM006FPfYGthuMKnTYXS1ztEYhZsaXxHKLMGlFwmR0c7ZdPPzjJwoHHMWnbJORWLm6NQX0uHm5f1INsDYYH7DwOPAXYf8kop4J/+NjAKddlhbbyGvtqDdqODOR3OJwwefSEz8+CoygsGhf+L5X/79ileuJBYcEgWeWM8zplFQH7CNQOCVtXN//LOu7tI9EezVNOcJq6HCe51aRs27suqgseMw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=o+SBL3Rf+ExGdrUo3Mmdpp8ZIwRGZZZeo7loAC7KyZI=;
 b=Pn8bIl1j0R2dHJxK1QprR7646m1T/HwL8RSM8ldKlUVOjU3gsT9FpTk9cyWv4qNBmslcEnRFSaWVngxZTYAquEArEMetXJrQNsdaLBe7hB0OxCX5Nz6KGibwAtDynyo+pHmp9W784X5ZII0m26ItFLnLcUkya9j7Q+gU2Fq295g=
Date: Tue, 1 Mar 2022 14:43:25 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH] x86: fold sections in final binaries
Message-ID: <Yh4i/QPAggI3AVpC@Air-de-Roger>
References: <03851bd4-9202-385f-d991-c9720185c946@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <03851bd4-9202-385f-d991-c9720185c946@suse.com>
X-ClientProxiedBy: LO4P123CA0353.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:18d::16) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 02ff37b5-fa28-4d2a-eba6-08d9fb897967
X-MS-TrafficTypeDiagnostic: CO3PR03MB6759:EE_
X-Microsoft-Antispam-PRVS: <CO3PR03MB67596DEEB513D5719104DFB48F029@CO3PR03MB6759.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(6486002)(86362001)(66946007)(4326008)(85182001)(26005)(186003)(82960400001)(5660300002)(8676002)(66476007)(66556008)(8936002)(38100700002)(83380400001)(316002)(6916009)(54906003)(508600001)(6512007)(9686003)(2906002)(6506007)(6666004)(33716001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?UDJub3RNb2dJclhna3gwblRyNGN0Y3hURi85aW5zbEw2TzN4S3puRDMyWWpP?=
 =?utf-8?B?cGtBY1FQR0V1NVlOZkdpMzM2czV3WVRxaHlmUk00aER1c1VyV3JBdktpbXJF?=
 =?utf-8?B?ZElaVE5qRzhjcENva2R6bTY2UStBTDZaZERQcGNyR0RJSXlka0FycVozOG9a?=
 =?utf-8?B?SDZ5ZkI1S1E0d1NGaWNSenNDM05ULzBKWFlSd2NPUG1JbTlHZi93VHBUSi9l?=
 =?utf-8?B?ZVB1cElDZVY2NExKeStRbTRNTmc5L0hZKzVXTzA2Y3ZRR1RaYmtsd3l3S1Bl?=
 =?utf-8?B?b09XdXhRcEw3cHZqT3NFd2E2YXhrVThHc1FBazUzSjF3Q09CYzZqVU5EczBi?=
 =?utf-8?B?eWRGZkpPbGFCYlBWVitTT1QzTDIvdk5jSDFBWWo5SyswSGI0T2RiK2NjTVE0?=
 =?utf-8?B?SUNSUHR4UUVWRCs3dUxyZ0RLSnlScWEyMFcxRUd4RHd2dE05eFU5T3dXazFJ?=
 =?utf-8?B?MEo2NlBUbXd5Y3N1aHhBRXVSRzU5dkxJWDJhYXNWUCttRXVnU2RvVEpIVWF2?=
 =?utf-8?B?TlBlZ2Y2RHJQT3lPVkxhbk9rdXJHN1lwYWRLYkJ0ekIrOVhJM2FTejByaU5X?=
 =?utf-8?B?SWF1QlNOemFwdHJpQ0xxc0o2VzZydFdFcUdEazJqSWo0R285MWxub0dsZjZB?=
 =?utf-8?B?ZUo5QTV1UGliOTVSK2VMd0VwZ09VQ2JGZ0dpWWs4cmM0SnMya3NKTWpTMW1U?=
 =?utf-8?B?MkpldG5jNGRya1FQUUF5NlREOWtGMXhBdHJSQmJqa1V6OE95Ull2Z3hwNWxk?=
 =?utf-8?B?RGtBUUJaMlN5U2pYQ0JWMG9vNDNVVUlyWlVIRXV6V1RoYjM0VEVPUnAzV2Jy?=
 =?utf-8?B?WmJjRGhKNW5EOVNjamRtWUFLa3d3SFNZWlVYbndGeDBLR0R1TnJ1Rk1WYU5K?=
 =?utf-8?B?YnBPeU82eFlqdWE0ekx0UDgyQkd5Qi83bkFGWVZqQ3FmOG16L3NkSnJrakZo?=
 =?utf-8?B?T0xMUzI3Nnd5U1hTei9nZGtkK1puejVxVjZ3U3lqVjNMQVUvUzhxelN4QUx0?=
 =?utf-8?B?cWpVT0VEbWpLSjhVVjVFTUNEUFRZZGhWdUt2amJCQ0djZkhNZm5KWkx4UjBZ?=
 =?utf-8?B?OG9DalFqa0F4V0VpZ2toMUdLaTZRVmhaUCtaM3AySXhEYk15QTRwa1cyTTBj?=
 =?utf-8?B?aVhVb3I0SUlGRjV3TEpSZlREU1YzeDYwbUc3cUNLTVE4VDZqRlFnKzRqZzF2?=
 =?utf-8?B?VHN2RXp4aGdoaUw5emtIT3lTQm9QdjJLTERDMVdTb0RzK1ZCVUJtZ0FDWmZB?=
 =?utf-8?B?TjRCV3c0eEtlQzdZT1NZODQyTW1zc1dkMnZRWWNicWozemhlNU5WN1Y2dStr?=
 =?utf-8?B?ZG9ESTcxbjZMNlZud3FQcCtzaCtHbFBoeStZbXVGZVo0YVZMdEh5Vzl2NFVl?=
 =?utf-8?B?RjU1dmZFMmVYL09WLzc5bzJUQjh4YkRleXhWUktxNVdHY2h4OWhONjZXaWNy?=
 =?utf-8?B?S1Q5NjMrcHdFREZMQ0ZJUXA3Vld4VzMxQVF5dHA5ZkhlVnFCK2JRcURSYVhP?=
 =?utf-8?B?MXpIWHF1SmlNc1gxd1dWTERYd3JMM0NSN0I5RzRZYnE2Q2hCRTZKek1Gekx5?=
 =?utf-8?B?N1krOTlDUVBUMlZrckJvL3RJT0gxcjZXYlhPZDNkcDdYdXMvYkRxQlZ4eTZ0?=
 =?utf-8?B?Si9yck8rd0NPM0ROSlp3ZXQ5QWF2SnB6anVabDZnejVDRGIwU1ZsWWJkR09p?=
 =?utf-8?B?WVJCemtBcjZGRnhJWVRVcTZoN0tCajFJT1haa1IxTm5RYjhBNHc0NXY3Y01T?=
 =?utf-8?B?bXVjczlKZ1h2MDZvYmlZZ09UcklWc2NaYlo0dWZMSGtMd0hNbzJFYThpV3No?=
 =?utf-8?B?NjZDMC91bDA5RlR5Zkg4YStpc2lqTUJiK1NTeGlVWTFQVitmK2xsV2R5TmVh?=
 =?utf-8?B?T3gzZWx1SkJMMm5NcUxPUVRzQlA1a3JnSVBjODlwaGcxRWRGUEVtVG5qOU0r?=
 =?utf-8?B?WmpUL044T0s2L1hlbXNvM25OeUIvUGhPd08ycjZTL1p5NlJCWk1EZVRnYnlM?=
 =?utf-8?B?OUh4NnNzSjhJL0lFT3VnVmY0Uk5sK1poeEE3NUlIR09hNm9TdElwYVZKdXlI?=
 =?utf-8?B?aFFzWmg0by90VnRtWld5bTU3SmQyR3FscGZqU3JXTUQrZFpLMktNbThxVjNM?=
 =?utf-8?B?VkpxMWJHaUpHNGorbUM5TXF5ZHN3dUhIc2t4Q0FjSkhCMHlIWk43S2U3M3VJ?=
 =?utf-8?Q?YcgpffDAZVpuU9ZNn0lGD1Y=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 02ff37b5-fa28-4d2a-eba6-08d9fb897967
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 13:43:31.7924
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Xs6VNexOsjE+HJKGnDKBukALbdY8JtfcWpeIH2B219IExjRPedXMdrEGIBGXMnVrHk6sZG7e4/6ldSnekxNRKg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO3PR03MB6759
X-OriginatorOrg: citrix.com

On Tue, Mar 01, 2022 at 09:55:32AM +0100, Jan Beulich wrote:
> Especially when linking a PE binary (xen.efi), standalone output
> sections are expensive: Often the linker will align the subsequent one
> on the section alignment boundary (2Mb) when the linker script doesn't
> otherwise place it. (I haven't been able to derive from observed
> behavior under what conditions it would not do so.)
> 
> With gcov enabled (and with gcc11) I'm observing enough sections that,
> as of quite recently, the resulting image doesn't fit in 16Mb anymore,
> failing the final ASSERT() in the linker script. (That assertion is
> slated to go away, but that's a separate change.)
> 
> Any destructor related sections can be discarded, as we never "exit"
> the hypervisor. This includes .text.exit, which is referenced from
> .dtors.*. Constructor related sections need to all be taken care of, not
> just those with historically used names: .ctors.* and .text.startup is
> what gcc11 populates. While there re-arrange ordering / sorting to match
> that used by the linker provided scripts.
> 
> Finally, for xen.efi only, also discard .note.gnu.*. These are
> meaningless in a PE binary. Quite likely, while not meaningless there,
> the section is also of no use in ELF, but keep it there for now.

Should we also use --orphan-handling=warn as to recognize orphaned
sections and attempt place them? We have now detected this because of
the 16Mb limit, but if we remove that check that we could end up
carrying a non-trivial amount of 2Mb aligned unhandled regions.

> Signed-off-by: Jan Beulich <jbeulich@suse.com>
> ---
> TBD: We also use CONSTRUCTORS for an unknown reason. Documentation for
>      ld is quite clear that this is an a.out-only construct.

I've found some (old) documentation where it does also mention ECOFF
and XCOFF apart from a.out:

"When linking object file formats which do not support arbitrary
sections, such as ECOFF and XCOFF, the linker will automatically
recognize C++ global constructors and destructors by name. For these
object file formats, the CONSTRUCTORS command tells the linker where
this information should be placed."

I guess we can get rid of it.

The patch LGTM:

Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>

With the possible addition of --orphan-handling=warn.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 13:55:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 13:55:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281485.479832 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP2y8-0007tR-Ke; Tue, 01 Mar 2022 13:55:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281485.479832; Tue, 01 Mar 2022 13:55:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP2y8-0007tK-HW; Tue, 01 Mar 2022 13:55:12 +0000
Received: by outflank-mailman (input) for mailman id 281485;
 Tue, 01 Mar 2022 13:55:11 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nP2y7-0007tE-9h
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 13:55:11 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3522f487-9967-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 14:55:09 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2108.outbound.protection.outlook.com [104.47.17.108]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-24-g4GYUZhOO-2VLYetR-Y6fA-1; Tue, 01 Mar 2022 14:55:08 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR0402MB3714.eurprd04.prod.outlook.com (2603:10a6:208:f::13)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.25; Tue, 1 Mar
 2022 13:55:06 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 13:55:06 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3522f487-9967-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646142909;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=QJMu4YL5jAQhiUJ7KcDsX49vB3plU9GmSJbM8enSqx4=;
	b=iHXohUYMk5qr+MOBFrIl69WXdz++FZr0RN/SPCt/Wa7fX6mfPFrj9jdmOjkmtb5FrLnBhz
	N1omTy6O3U5qliezpgLgwf2srvZ5wwL5bxjgRE2GLOf76FpRUhjiiyS1CEd9arcqOH3sds
	Wh/9TwLImOQLGf+1QVGngdBamx1+EAM=
X-MC-Unique: g4GYUZhOO-2VLYetR-Y6fA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=YZU1seUnjKSy0/eEwLMOBtlemWGhU0vV/tNMnJXDWlyjY0JcYGULLCxQMul3ozReqMfl5YcGHXpmLtsKMBY5nbIUdbOT79VKto/UscRtj4DT+acLktmTCp5T4u4+WtwC4XF49i+csZEQvBMDtETcljY3YYW/H0Bj8EGF9WQll/4AJx7Uhs1KJ2kMJWtsLChf204RFdiBoSeP6Slt3rFQTjcXaEHm7AVBO7WQDo+lSIDuvyjds3+NCoMqq7wKJDeSvFHCOQ4UJFQVoY0mDw0JAZqFHjzyaH+sktIRLqbJbhvAactk6a/Ha32LJ//XpkRltUIeby5+LJpLhgKmxfs5fg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=QJMu4YL5jAQhiUJ7KcDsX49vB3plU9GmSJbM8enSqx4=;
 b=NGJKWjS6F/ROmPhoP7yDgPDt9szCBljPzJptFsStbpM8O25L81aeuOxJx5FaDHLlaOJB2N1nJF83vbs0TS6V9S+IMmPfE0M15gr/jXWFKqqst0mOOY0ClflM817rClV20YsBqyk7b0MV9Ev8VsIPfVtSYqIvr86y5l3NA48Lapv58CbVqJZooaLTz/i58gYITQrjDE/KywD8l1peYYRF18c5BUZ4inBv3OdQx6cgTVjABUovUE8ChIEZOLa4kv4gRce1wclYDjt0pe+CW6eGBnKA72HHoG+/8V4KMCGp//3vzFOnUSTbVewdeKuDVTFjZ3i5ubeVHb8jg0K7W9wnFw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <c11278f4-c902-0eb9-ac59-e27c0f2ba912@suse.com>
Date: Tue, 1 Mar 2022 14:55:04 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v2 1/3] xen/vpci: msix: move x86 specific code to x86 file
Content-Language: en-US
To: Rahul Singh <Rahul.Singh@arm.com>
Cc: Bertrand Marquis <Bertrand.Marquis@arm.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>, Wei Liu
 <wl@xen.org>, George Dunlap <george.dunlap@citrix.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <cover.1644937405.git.rahul.singh@arm.com>
 <4d2a727ba218468e4f347dc12ca051a0534fe205.1644937405.git.rahul.singh@arm.com>
 <6e188f87-7e4c-00ee-dd0c-373d42acec34@suse.com>
 <6BFB9B87-D8A1-442D-B4DC-18760C59D7BF@arm.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <6BFB9B87-D8A1-442D-B4DC-18760C59D7BF@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P194CA0091.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:209:8f::32) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: d3b8f420-77ae-432c-1125-08d9fb8b179f
X-MS-TrafficTypeDiagnostic: AM0PR0402MB3714:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR0402MB3714AD039D50CF653188D8B8B3029@AM0PR0402MB3714.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(508600001)(36756003)(54906003)(31696002)(6512007)(6916009)(6506007)(31686004)(8676002)(66946007)(66556008)(66476007)(83380400001)(4326008)(316002)(86362001)(53546011)(2906002)(8936002)(5660300002)(38100700002)(6486002)(2616005)(186003)(26005)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?U3hsMndZQ0ZCbjFrT1prK1lDQjdGTHBQMy9CZVpuWjZDZVhSTTNYZHQ0RGlW?=
 =?utf-8?B?bGRtMmQ5YzJpZEQ0eXdZN1diczZSdzBPOG5LVjdmSHdLQzgrY0d0bEhvUVA0?=
 =?utf-8?B?emxsVCsyaHZMbUFzMFpKOFliKy9naHdiY2pNT3J0eklsM1ZmMXFDSW1iYXFV?=
 =?utf-8?B?anp0WmlGaW1TenByNHpMM1ZqZ1dLUG9iY1JGTHd6SGFsa2c2aHpNT1U1OFFF?=
 =?utf-8?B?N3RFb0laenN3NytFZ3FoazNHaDY3WWw5QTg0UytEMkpXdzlkODkyOVZNNjNz?=
 =?utf-8?B?a1JPaE12RHdmQjJGS21NaklOQnBwc2F1TEJYcDFJYXl0SjROZmtYckhYcjly?=
 =?utf-8?B?b1pqakxPRzRpSkRtVUdZUTdUaE5oc2FKUVh0cVpuRGljZHZMUmx6UEdXMXRC?=
 =?utf-8?B?azRvWHd0anJYblo0N29wcWRvZmZHS1BxY0FVQ1E4YjVON2lMUFRqbDhMRnpP?=
 =?utf-8?B?TG1IM1NVamZobVlsenVVUnNaQksxVXlrZTE3dStOZnZ2MENnN2s1dzBHMkRx?=
 =?utf-8?B?VExHV2IySzA2TG9Nc05YbmVvOWRNY0NvSE1FYWc0UTc0ZjNOZWxOUzUwQVpQ?=
 =?utf-8?B?dzRkNmhyUnZXUWt0QXIyQW5WUndsbnlRSVZQeTJ0aHR1M2Z2b0w0L0ozSVdi?=
 =?utf-8?B?V0l2UW1QT2h3OU4yKzNqa2VvRytFZmMzSTQycytzY2hqekxsRklZTmJTaGNJ?=
 =?utf-8?B?VDQvWTBHVFpkc3BvSjZKN3N3bHh3clZ3VngvdU80SVFBNSs5NUdvYm5UcTMv?=
 =?utf-8?B?NlJnOGpINzlaZnUwTmxaNjUyQkRKWkxaYXhtOVR4Nk53SWNjazJaWU1SNVh1?=
 =?utf-8?B?SFFVbFY2YTlpdy9qczlSYTJKS1lrS21ONG9wTTVQTXpaSGs0YTN0NEJRc3NU?=
 =?utf-8?B?dWdVNlVsVU9mdUVGMmdQQjdzYnBlbktkVU84MUFhWUQxTjU1RHVUSjM4M0pi?=
 =?utf-8?B?QzJaR21tYXVpVnBobDhncVZaLzRISHRiOWZuM2tRWG5wdDB6T1VxRjBKOFA3?=
 =?utf-8?B?OEpDQ2gvOUVSUHpOYjFjem10R3BnbnRNQ0U1YnphUThkdmd1MXY3OExFaG9W?=
 =?utf-8?B?SDVlRWx4alhzaGJhVisxM1RWYzFEbVUvcVZ6RWp1WXhmVXl2b1hPY09uUnZZ?=
 =?utf-8?B?RUNNN2RTMjNobEw2UEFUSjFTY1pid1dRZFR3bTJxQU83VzA5MWJMdGR5aUNB?=
 =?utf-8?B?Q2NWak1kenpPYWJ1bjBBWXNLMThudlIyOFlaWExLc1ZxSmFlQWhMeENJU3hs?=
 =?utf-8?B?OUhtdW5HbXVGUmh4czd4dXd5TmFNM011ZDVXU3RGR2xjdTZkTGNZSVFjWmRN?=
 =?utf-8?B?dVRyU2ZjTERVcGRPaWtIalV3NzI0N1JadXRqUExYVTRhVnE0M0JLMlBGR1JN?=
 =?utf-8?B?eUdsNUkyYWFJekZETWk5WUY0RFpMT21TWHNMU0J0M0ZsMjJ4M3dhb3dCc2Js?=
 =?utf-8?B?dTcxdEVRNzJxY0V0dW9HQlFPK0pvaUpPOVNLWHIrSFMrdlRFcUVuZ2NrMmJ6?=
 =?utf-8?B?MkFtdnQ4QVhzYlU4bEtVOTh4QnFRTDh6K2l5WEtIWDRHNUJVZ0JIbzQrSE1j?=
 =?utf-8?B?VDBSNVZZMFp4K3ZneU1sM05WQzY2K3M1VGJ5Wm9vZGd0OWxnNFNzSGNmWk9W?=
 =?utf-8?B?ZDFKR2hrR1VwY0lSRG04U0NzOGRocFVIajZkai9aeCtPTEpFenJ3ZUR2V0Z3?=
 =?utf-8?B?emN6L2hUZC9sTm5GcTNabWhKdlc2Q0ZmVG9wdWJhdGs5STduL1FsbWpJOXlm?=
 =?utf-8?B?VHN2MXBxSy9Da2dPQmpyM1Z4U29aRUlCZk4vRUdEWUVRUVlFaXhPQ0Y0eG0v?=
 =?utf-8?B?V1hySTF3dlNzbFpoT3lLb1B1aDdlMU5sNFdjZlhCMkpHbTNjcVBFd3h2RVVG?=
 =?utf-8?B?OW9kTVVFSC93RFVlMzVWb0tCR1ZJbkZaVGI3d00vL1E0K2xNLzdQeHFPSmU1?=
 =?utf-8?B?eDN4cDRMS0JKc0E3NXR6N3paNGYyTFN4TE5UOG83anNNK0dVQ3Q4ay9tcGhF?=
 =?utf-8?B?VkFtZkdoMVR6a05XZTNDcnBxbytYWHd3V2xnVjZYb0xzSUU3OU5MWElkSGpv?=
 =?utf-8?B?STFvdWZ6MDFPWkV3SEhoQjlsa0pvTG51ZFZCTEtVSXVRdWdNRm1tam8wOVNF?=
 =?utf-8?B?c2FWYzFwZDJmZW83b0N0UWsxYUpMNHJWMkFyRHhuRDVxWjFvdGl5b0psaWs0?=
 =?utf-8?Q?Z0DlzFwXa6tPZrgW890ljXU=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d3b8f420-77ae-432c-1125-08d9fb8b179f
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 13:55:06.6680
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: +1dww6YaTWYp5b7hdbKRvacSO7SEx4EqA4ljq6N8RYDC6XQozc6UdhDIoz+w6AeG16vSScgbREpPOp2E6Up18Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR0402MB3714

On 01.03.2022 14:34, Rahul Singh wrote:
>> On 24 Feb 2022, at 2:57 pm, Jan Beulich <jbeulich@suse.com> wrote:
>>
>> On 15.02.2022 16:25, Rahul Singh wrote:
>>> vpci/msix.c file will be used for arm architecture when vpci msix
>>> support will be added to ARM, but there is x86 specific code in this
>>> file.
>>>
>>> Move x86 specific code to the x86/hvm/vmsi.c file to make sure common
>>> code will be used for other architecture.
>>
>> Could you provide some criteria by which code is considered x86-specific
>> (or not)? For example ...
> 
> Code moved to x86 file is based on criteria that either the code will be unusable or will be different 
> for ARM when MSIX  support will be introduce for ARM.

That's a very abstract statement, which you can't really derive any
judgement from. It'll be necessary to see in how far the code is
indeed different. After all PCI, MSI, and MSI-X are largely arch-
agnostic.

>>> --- a/xen/arch/x86/hvm/vmsi.c
>>> +++ b/xen/arch/x86/hvm/vmsi.c
>>> @@ -925,4 +925,106 @@ int vpci_msix_arch_print(const struct vpci_msix *msix)
>>>
>>>     return 0;
>>> }
>>> +
>>> +int vpci_make_msix_hole(const struct pci_dev *pdev)
>>> +{
>>> +    struct domain *d = pdev->domain;
>>> +    unsigned int i;
>>> +
>>> +    if ( !pdev->vpci->msix )
>>> +        return 0;
>>> +
>>> +    /* Make sure there's a hole for the MSIX table/PBA in the p2m. */
>>> +    for ( i = 0; i < ARRAY_SIZE(pdev->vpci->msix->tables); i++ )
>>> +    {
>>> +        unsigned long start = PFN_DOWN(vmsix_table_addr(pdev->vpci, i));
>>> +        unsigned long end = PFN_DOWN(vmsix_table_addr(pdev->vpci, i) +
>>> +                                     vmsix_table_size(pdev->vpci, i) - 1);
>>> +
>>> +        for ( ; start <= end; start++ )
>>> +        {
>>> +            p2m_type_t t;
>>> +            mfn_t mfn = get_gfn_query(d, start, &t);
>>> +
>>> +            switch ( t )
>>> +            {
>>> +            case p2m_mmio_dm:
>>> +            case p2m_invalid:
>>> +                break;
>>> +            case p2m_mmio_direct:
>>> +                if ( mfn_x(mfn) == start )
>>> +                {
>>> +                    clear_identity_p2m_entry(d, start);
>>> +                    break;
>>> +                }
>>> +                /* fallthrough. */
>>> +            default:
>>> +                put_gfn(d, start);
>>> +                gprintk(XENLOG_WARNING,
>>> +                        "%pp: existing mapping (mfn: %" PRI_mfn
>>> +                        "type: %d) at %#lx clobbers MSIX MMIO area\n",
>>> +                        &pdev->sbdf, mfn_x(mfn), t, start);
>>> +                return -EEXIST;
>>> +            }
>>> +            put_gfn(d, start);
>>> +        }
>>> +    }
>>> +
>>> +    return 0;
>>> +}
>>
>> ... nothing in this function looks to be x86-specific, except maybe
>> functions like clear_identity_p2m_entry() may not currently be available
>> on Arm. But this doesn't make the code x86-specific.
> 
> I will maybe be wrong but what I understand from the code is that for x86 
> if there is no p2m entries setup for the region, accesses to them will be trapped 
> into the hypervisor and can be handled by specific MMIO handler.
> 
> But for ARM when we are registering the MMIO handler we have to provide 
> the GPA also for the MMIO handler. 

Question is: Is this just an effect resulting from different implementation,
or an inherent requirement? In the former case, harmonizing things may be an
alternative option.

> For ARM arch vpci_make_msix_hole() will be used to register the MMIO handler 
> for the MSIX MMIO region.
> 
> int vpci_make_msix_hole(const struct pci_dev *pdev)
> {
>     struct vpci_msix *msix = pdev->vpci->msix;
>     paddr_t addr,size;
> 
>    for ( int i = 0; msix && i < ARRAY_SIZE(msix->tables); i++ )
>    {                                                                           
>        addr = vmsix_table_addr(pdev->vpci, i);               
>        size = vmsix_table_size(pdev->vpci, i) - 1;                                                                         
>        register_mmio_handler(pdev->domain, &vpci_msi_mmio_handler,             
>                                               addr, size, NULL);                                
>     }                                                                                                                 
>     return 0;                                                                   
> }
> 
> Therefore in this case there is difference how ARM handle this case.
>  
>>
>>> +struct vpci_msix *vpci_msix_find(const struct domain *d, unsigned long addr)
>>> +{
>>> +    struct vpci_msix *msix;
>>> +
>>> +    list_for_each_entry ( msix, &d->arch.hvm.msix_tables, next )
>>> +    {
>>> +        const struct vpci_bar *bars = msix->pdev->vpci->header.bars;
>>> +        unsigned int i;
>>> +
>>> +        for ( i = 0; i < ARRAY_SIZE(msix->tables); i++ )
>>> +            if ( bars[msix->tables[i] & PCI_MSIX_BIRMASK].enabled &&
>>> +                 VMSIX_ADDR_IN_RANGE(addr, msix->pdev->vpci, i) )
>>> +                return msix;
>>> +    }
>>> +
>>> +    return NULL;
>>> +}
>>
>> Or take this one - I don't see anything x86-specific in here. The use
>> of d->arch.hvm merely points out that there may be a field which now
>> needs generalizing.
> 
> Yes, you are right here I can avoid this change if I will introduce 
> "struct list_head msix_tables"  in "d->arch.hvm" for ARM also. 

Wait - if you pass in the guest address at registration time, you
shouldn't have a need for a "find" function.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 14:06:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 14:06:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281492.479843 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP39B-0001Kc-MN; Tue, 01 Mar 2022 14:06:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281492.479843; Tue, 01 Mar 2022 14:06:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP39B-0001KV-JB; Tue, 01 Mar 2022 14:06:37 +0000
Received: by outflank-mailman (input) for mailman id 281492;
 Tue, 01 Mar 2022 14:06:36 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nP39A-0001KP-1C
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 14:06:36 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id cd8b59cb-9968-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 15:06:34 +0100 (CET)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04lp2058.outbound.protection.outlook.com [104.47.12.58]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-41-DMjONFKaOcOvCB0lcOniTw-1; Tue, 01 Mar 2022 15:06:33 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM8PR04MB7427.eurprd04.prod.outlook.com (2603:10a6:20b:1d4::8)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Tue, 1 Mar
 2022 14:06:32 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 14:06:32 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cd8b59cb-9968-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646143594;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=NH789zOs3WNiySRoMVWAKpB8KEacNg1hBBr3qGOdNCo=;
	b=Zg+nJjrokMmhbtPzuWvNkJZLZPTcx2nwwTeiKYSEgsE+Qct/8AFbnbrE4BScRZyz6U+tu8
	5fHf73yW3cWNU/K88locRmXUbC4jjEkLHfsbyIGxofD01v4yQS8IAMgFgHIgcFlz0BMIa6
	ctd57sWJvHd2dzjNinseN3Mt50PlZvQ=
X-MC-Unique: DMjONFKaOcOvCB0lcOniTw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=a/xaQ/5fLvveAxVIaaUNTZk/7aIO8bb+YK/tm1JKY4D+0XkvX8aqYoPpYC/40vt8Dz8FwiAVqXlLgr7FbRC5XVpRKYbDRrv2fH50JHZWWYNcDCOESd87qCqY0A52hnPUtu8OcwzQbCMQ5nKGHtOGfWJgW5IZoA53Wk/JKGArtH1ztOcFcFnnSqUaiWAVHWQDvViR0PhinLRTVa/q0NnutR/IbzSANtHqS9U6fAfLx+tHjFh68Mtr3AEx85RbcRF/k2pje7IdO5//XInNfXgFMInJXn7NrzlnfZ5uTFS69MWmK/M7wMCyzCeRXvZFh9323x0zP2xhJ9MBXFZMs9U7jw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=hORdoKxuHhXm3Z9OxT65NOFrf0TCcz7XNSLSOaspVgQ=;
 b=hyRQ9KOszQLLT/nDhzeA6m+ACOvRL4rdiclDFPPKNmZQVFsDeZa8k8nFKF9X/1K3I1mHnRcoCstVYI/jw+z6lfpJlK1xSIHr3UucmfGF5X5ssv6X6UZ8I8yxAFiXFNafmRVHGE3rvcH93L0p4pYFyNi3fjqamAfuWKQxDDAJ3KCmrdmF9NmkSZHTFzEedxoCcAL7yxVMEOXr10I/LJedXK9GMujHZasJsnF7HdqWhm4aj07pHGOFmSFVIZIdVfkmPCFeyol7unN9JUgDNchmycdwm45L0u7/c/Z8XNI4K5yR2ddvbHFp3S+UmHCyjupTFzKn/haXqXxNwyk+SqATsg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <3ed7482b-c445-92f2-66df-a075f571bbf0@suse.com>
Date: Tue, 1 Mar 2022 15:06:30 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] x86: fold sections in final binaries
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
References: <03851bd4-9202-385f-d991-c9720185c946@suse.com>
 <Yh4i/QPAggI3AVpC@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <Yh4i/QPAggI3AVpC@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6PR10CA0065.EURPRD10.PROD.OUTLOOK.COM
 (2603:10a6:209:80::42) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 4e58866a-c092-403f-1275-08d9fb8cb02d
X-MS-TrafficTypeDiagnostic: AM8PR04MB7427:EE_
X-Microsoft-Antispam-PRVS:
	<AM8PR04MB742744614DABBD635F2A26E7B3029@AM8PR04MB7427.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	zz5ZdheiO4bdfx2D08LbkisQPCeqTA1KuBCH7SvsJA23zpR5qEwwAuDgqYgdWqQ6CIF/g0XaVMdbz8mC1tp7HZ9y/ivnkXguA3JDNCE/7P3dUBF8qGv3s9S3SSD3tPZZxCz8hLa3m5Dtoj9b/IlFqglEeR25SuA05ic593E/CbWZDqlISKduC1AkpRtzYza0G3Ruy74BL55dCFDXCcjiD5MxpFxXdCegdkB2PdURO3/kJEb0f44YJAW5dD8+9FWM+uh/JptDCfUOhzad9BaQ2K+Chnqgoh9IsFXv7+IYnSaFGt7TShAijINtgLERIh7REMDT8sEQ94kQ8fu/2lEM2jcltkxxKU5Hf3aeIGBKz6M0Jh/fwqQQojb7u52WXfiIfT8B7wxEdpemPNR/c14Rf7GGGb27nFZSng20Jp6P9lXKkcrQigc8HfIdE5qNO3jVjBFZy2TQYMR5w4mUuLnfWvkrXqIqLOetgZ52jfJmelY7SzTBitdDg+N2TThWHh4gBjhvNgRIe+tqp0J7sJPax0+i47ZLi8D8wvaibH9W5yqSgqgQsRt8vTMWNVc0KgoKWKzxIXWhpDFieiMRkWzX4cbLgewqZ3YHI9PU7PQTCvSzMKh7Xvui3xQFRzbQSgrQprLivCwdN4CitqW4oYe62W96MeFNo4V3kHSdjlaQC0rsdps2CFw8H9sWwMJjAkNjjTUEeZyyuQb9NewcWjNFVJ0rJnIHgEBrbwv9gAsyCvLL/rmwDS6B60zHtILCDu0d
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(36756003)(186003)(66476007)(66946007)(2906002)(83380400001)(26005)(2616005)(8676002)(508600001)(4326008)(6486002)(31696002)(5660300002)(8936002)(66556008)(31686004)(316002)(38100700002)(6916009)(53546011)(86362001)(6512007)(6506007)(54906003)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?22Q3oX6OFi1jR8xQT+J05ImjXG9E9E+8wRf6u17EtaS6z4Ck0PoQ3xwKaFxr?=
 =?us-ascii?Q?zhPMH7ZREhkrjHpbNwAUjm2b1HUy2jihA0l0C4HuAFoelI1l5xgXc2QwiqCE?=
 =?us-ascii?Q?knbtcfKqyqhMQ9siYOzmTAA5ByLPGRGe4qeKpHb2h9shWr10PYzGW+o3kqeo?=
 =?us-ascii?Q?PwSF0rXenzcA05SY++HpwipFOQ1KZKfUlqGcRc2z5+DvrgHNpQsoLNvvwCxI?=
 =?us-ascii?Q?WUp5efKOzKiMi9kMWL2TQDc3hea38R0mYO80/VsKrd3tf9+6pZp4rerABO9i?=
 =?us-ascii?Q?kcvNu/sUlI7Crh5xydXPF1guHYJGmVwve7DtmXZVNWoaXp0Lvn16T0gSr1qT?=
 =?us-ascii?Q?oYeFFX2Krbm+Z2LCZU7UbXTZzAX+tjSTAS8xh7su6GOfBtrqeWA5wOdB4dvd?=
 =?us-ascii?Q?MN8vmD1jmp1D2RhNRNBtf/OytSXw0IiYqRpgAH8ed/q21UUkfI8ziP/BSR9F?=
 =?us-ascii?Q?0bJ2XyXWDKeTObM66bkCwqAF+c3KbOBTEPvK6EniBaOxA6ig3GvUlk1PuiEd?=
 =?us-ascii?Q?DcMd7XrMd2gwMYmPtd1ejcPFrOx6BSCkTneTVexPpGEenLiEB9utVW9p2Gg8?=
 =?us-ascii?Q?5fpfp9ndhMHP5gPFONaVoheihtIZnSa6xeo8Q4nep9qhELtM4l2Pox8RHDQ1?=
 =?us-ascii?Q?G45s/YwWiELcOFjnoO/gLXQZQmnc5w8ZqIyH8xcrxwlcolAKb6pdLSvPCDug?=
 =?us-ascii?Q?dLPPOhFJCzuGxdqeBw1BH5WHvqd1TIlZfit0GwR7tXqDKgbosCpetV9u3FtT?=
 =?us-ascii?Q?hVeBOtReCDnZubtNHK05vCbv8IzGy5S2kdDGDYegmXqcFNigdpW+MXexSP3K?=
 =?us-ascii?Q?Afyutvi7ERRj54e0X/7cX9FuckgdBnlg73geLu+Wh367liMtAkPOl+HCOC8H?=
 =?us-ascii?Q?BfZgqXT2yWTtJmxtlMpbyreCdrFOBvpyAmpEVv2rA3orldGwn0lQCJX4z103?=
 =?us-ascii?Q?HWl77QN/XIxHxk58MlQnzWjOa8kRzS3+JMZJGYWqHnPzOEZO1UIfzrPfo9hm?=
 =?us-ascii?Q?5YyOXfDCPCT8/MKRjql1XdY2VvrdVdrVfOTB5biVZEy32SxKHqQm6NQ1ErXZ?=
 =?us-ascii?Q?s1LghgZlssDBQTVvEZ7dEL+C7RV6gIMBDmG88NKJqX4kn46w058Iff1EK6vE?=
 =?us-ascii?Q?XyARj6qJmHg3JSbRoKpxbpFEhVL5jYu12KHVvWqhRyYzmurGDebYfifjLPGs?=
 =?us-ascii?Q?hprVUTWKEBYw98e7s2VZFzDX/drZZL8xHe0VJZl/XDtjhVxqX0pg0gR/Y7dc?=
 =?us-ascii?Q?t7b8MK0hnYcOhhrUFi5kTwy5cN3178Q2e8+MorxxzOq/lgSmgGqHwGtdQBWD?=
 =?us-ascii?Q?QjuESRQRuS6kQIvltZhbbpP2fuBu5zJqNjQ7SY0h4CTH/gm95GPTZOFBOcyU?=
 =?us-ascii?Q?GHwRjx641mEaNmF07R4LwZjGavNYmDuZcLi9Yhgz8xlr6R9ERSHCnbXsyoyZ?=
 =?us-ascii?Q?jKyv7zgQk3XGH0SddoZXAJHurSKuPpHiyFmzYi/P+UbyNQpF2RnMrPRk08j0?=
 =?us-ascii?Q?GO7N1PhYBjRHh5KQmXkpta+QPhmBOGHSk7IhvUho3jqGADBqCud8QwOpx3Of?=
 =?us-ascii?Q?0K5eMWv7Ryfxaz0rJ0ay8y7CFUb+v/25rOHqcwXuqEpbnrmlLcNDbzpw9NQF?=
 =?us-ascii?Q?yhG/wFaAbUtxgy7xgC4OV+I=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4e58866a-c092-403f-1275-08d9fb8cb02d
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 14:06:32.0935
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: /yNnGiWXE5nNbB5c8Gq2ZeTEaEczB3PVFvsvXdHZ4MTzc1O/apis+RKlPH8ibQ2FU3SYv6MMlhsKuWIF+VQ0lA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM8PR04MB7427

On 01.03.2022 14:43, Roger Pau Monn=C3=A9 wrote:
> On Tue, Mar 01, 2022 at 09:55:32AM +0100, Jan Beulich wrote:
>> Especially when linking a PE binary (xen.efi), standalone output
>> sections are expensive: Often the linker will align the subsequent one
>> on the section alignment boundary (2Mb) when the linker script doesn't
>> otherwise place it. (I haven't been able to derive from observed
>> behavior under what conditions it would not do so.)
>>
>> With gcov enabled (and with gcc11) I'm observing enough sections that,
>> as of quite recently, the resulting image doesn't fit in 16Mb anymore,
>> failing the final ASSERT() in the linker script. (That assertion is
>> slated to go away, but that's a separate change.)
>>
>> Any destructor related sections can be discarded, as we never "exit"
>> the hypervisor. This includes .text.exit, which is referenced from
>> .dtors.*. Constructor related sections need to all be taken care of, not
>> just those with historically used names: .ctors.* and .text.startup is
>> what gcc11 populates. While there re-arrange ordering / sorting to match
>> that used by the linker provided scripts.
>>
>> Finally, for xen.efi only, also discard .note.gnu.*. These are
>> meaningless in a PE binary. Quite likely, while not meaningless there,
>> the section is also of no use in ELF, but keep it there for now.
>=20
> Should we also use --orphan-handling=3Dwarn as to recognize orphaned
> sections and attempt place them? We have now detected this because of
> the 16Mb limit, but if we remove that check that we could end up
> carrying a non-trivial amount of 2Mb aligned unhandled regions.

Yes, I guess we should use this option. See below.

>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>> ---
>> TBD: We also use CONSTRUCTORS for an unknown reason. Documentation for
>>      ld is quite clear that this is an a.out-only construct.
>=20
> I've found some (old) documentation where it does also mention ECOFF
> and XCOFF apart from a.out:
>=20
> "When linking object file formats which do not support arbitrary
> sections, such as ECOFF and XCOFF, the linker will automatically
> recognize C++ global constructors and destructors by name. For these
> object file formats, the CONSTRUCTORS command tells the linker where
> this information should be placed."
>=20
> I guess we can get rid of it.

I've taken note to make yet another patch.

> The patch LGTM:
>=20
> Reviewed-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>

Thanks.

> With the possible addition of --orphan-handling=3Dwarn.

As above: I agree we should make use of the option, but I don't think
this should be squashed in here. The option appeared in 2.26, so with
the current documented binutils baseline we'll need to probe for its
availability. I'd therefore prefer to make this a separate change,
and I've taken respective note as well.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 14:15:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 14:15:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281499.479854 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3HE-0002kN-HI; Tue, 01 Mar 2022 14:14:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281499.479854; Tue, 01 Mar 2022 14:14:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3HE-0002kG-EG; Tue, 01 Mar 2022 14:14:56 +0000
Received: by outflank-mailman (input) for mailman id 281499;
 Tue, 01 Mar 2022 14:14:54 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nP3HC-0002kA-Kv
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 14:14:54 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f6d56e0e-9969-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 15:14:53 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2172.outbound.protection.outlook.com [104.47.17.172]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-36-4xnKMn17MF-dxSx8Aeu0pg-1; Tue, 01 Mar 2022 15:14:52 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AS8PR04MB7528.eurprd04.prod.outlook.com (2603:10a6:20b:297::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.13; Tue, 1 Mar
 2022 14:14:50 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 14:14:50 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f6d56e0e-9969-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646144093;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=oq1ZRAhU9Q4MkkXTsjrRi/7LpPuPDcvU8/trqhc2rPU=;
	b=WzcMoyehqfEbmuVzO7gNdf7IXzCHl2jIMqk+b4B82VOSLHsQja4axQcMWqYsWmfeWeZ9kU
	7LeYChGVHvphJDkaD9H+I8twodgGs/XV6Kqwheq1cyymv4sbl7aMMN0MFcpXW7ZqgY9tGA
	vQaMPPIiHAvMJaWPN9v8fRmDPVduAy8=
X-MC-Unique: 4xnKMn17MF-dxSx8Aeu0pg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=j45khpdFn4pqgL/txI7zlEzW7ieekFMK7uP+Mps86VSAnZtiC2hXfmfX6p2qEzrUs0GMS8MyVG7L/xZ1b4x2VTxw5tTGav8F5JCvCZRG6CKEamFVrak/i1Z/MWkQonzXLU10LW1XmrbH87uI93C/XBY/wZWDxj87bPn2Z/9fpbGjJQrhCHkSBsOPQ4a3CxZKapjEMdv+BNBjw5W1Jdd3/ffJYf7e361f0jouuhcgHc7CBqol/TSWxIdfTo75mZwlLXXiCeXVYqh/c+lJGdKJIrEpRI1kIyNeL1TQ9JYLw7kbPX03QgihToPKCOBPAW3P+99SXueiRYEQnUzXdNPO5w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=P4Wui87pS9Nc396SWhM/waAHPk+Jt68Fa+FaWuQHLg4=;
 b=Ff/BU23uoxlqx4p+t6xDmdR8WIyom7ssOHW3EBNVN9RvOX3/UjFmMjXACALBc8mzBsOWgrM081Dcb3n7kc4/lGZ/PPEuuiYsBvNw0jnHu/LQKOg5QapVhgQBsHfmn9diUSrBJDGzxcfhqz5Ew9WZGnBWITiBW9VWN5WhFnBoJXBHJbMjDS27BuRQvaKw4h08wiJmILYUmfqkZ22nEfYJS+PGwuUA/gF7TZh/iXGVO9CBvXXqND8/a91iAbslAaMfTPb9GgaIf46meRLPr8dr6nber3OJWVwsj7bzRgxqnEnlIptXOChFvtBnH5ftBAvEo5BdeB5GDoXgOIIFq6fEXw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <2c3bb06d-e4f4-33d8-7972-71dc7d61c554@suse.com>
Date: Tue, 1 Mar 2022 15:14:48 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH 1/2] x86/time: use fake read_tsc()
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: Wei Liu <wl@xen.org>, Roger Pau Monne <roger.pau@citrix.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <77675e7f-2a7e-f517-4aba-e20774c8bfe5@suse.com>
 <f4f0e92c-9586-e021-6ad5-718628f88fcd@suse.com>
 <d1c3822e-bec1-d8ca-8954-a4942f5bb23c@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <d1c3822e-bec1-d8ca-8954-a4942f5bb23c@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6PR10CA0074.EURPRD10.PROD.OUTLOOK.COM
 (2603:10a6:209:8c::15) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 4fe9ec1c-fefb-47db-d550-08d9fb8dd8cf
X-MS-TrafficTypeDiagnostic: AS8PR04MB7528:EE_
X-Microsoft-Antispam-PRVS:
	<AS8PR04MB75286F427732CD12747FA75EB3029@AS8PR04MB7528.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6506007)(38100700002)(6512007)(5660300002)(53546011)(186003)(83380400001)(2616005)(26005)(2906002)(6916009)(316002)(8936002)(54906003)(4326008)(8676002)(31686004)(6486002)(66476007)(66556008)(508600001)(36756003)(66946007)(31696002)(86362001)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?jUb1hoNszGh839/Qmh399h883nJfIhbN8OeT+gXvtL/W2XGDaNQ+GNYwQ17r?=
 =?us-ascii?Q?gVcpIndhxaLGtJIlu+r1iE11Bo2+hNUIuq3nAB3ft6hzX6uWALsUEaJhVjHk?=
 =?us-ascii?Q?lkwBEHhdyc2FXT6CV9XK3ClYbkRyCujYZMDOhstD6HvZ4sm/+aUbDxLJKnxa?=
 =?us-ascii?Q?rhAgwWJIDm1Fus9rZy2tkbPC0L3Ptu/9dCCryPIPcl6YOSKUKpAR7ePObi4q?=
 =?us-ascii?Q?aNNxPH4OryuepZ+285mhc+KfaNBgB/sUfn0mnlRvskdJHUxIGjof6NvI95rq?=
 =?us-ascii?Q?s+wks9Jtu1zwOe/6jg9+8x4ZD2xQrT6CQ32bADsfu4b8Cz6imhEuFlv//Kr/?=
 =?us-ascii?Q?h96qQ20L5Kh3+dvQmTSfF9IkSAUFbwJ6/ViW+V/y7wPTRjc0Y5UYNm/cdO4P?=
 =?us-ascii?Q?4f1DNuITjTLDFODWw0w7W4ctYFFKopRTfc2CJu6kIYtU52DHLwydKYgwZnsM?=
 =?us-ascii?Q?FaVdp6JWUq0V2u9msL3UhR1B8ckpCogWKGjzdJE4drMY8HNsucbVcBRJT08/?=
 =?us-ascii?Q?5LXPlAmE+wZuqgR/EOH5PPgJIeddy4Zy0My1buZU8yspPzgbtMF9KRP3aWY9?=
 =?us-ascii?Q?ns1A+RyfNZB36EzVXt0LrfWYQ0cV6z3gmMaF1s6JN8XEy4WkXTk/8btLqCzY?=
 =?us-ascii?Q?jG3qL83Z1n3BEhXeQeBN5YI4qDQ4AxFe3NyMME1yglm5CVjEq+cx32P4tZvd?=
 =?us-ascii?Q?BmwdZVg4pkGi5Y6VAqM//HpXlTdRSNj9P+z/0aDJVGxe5sFv3/gM10rBIzhP?=
 =?us-ascii?Q?9/PJqWsGO6SsthpdXdpYwYgL8hQe2xpy7D0rC54/RYuNykjABOPYD2/qCzhg?=
 =?us-ascii?Q?aktppThtxXsGoG6JUo/ZWJDoKfjh5ggHnoeJKZX3KyeYkWm5JG35qCMO0i0d?=
 =?us-ascii?Q?zvWkqw2ZL0fTllqXybU0ua30BkKqYMWTbPjbOFpdw1IUCyooeW+gsfAsb+PR?=
 =?us-ascii?Q?NQtylRPgNcvWARfPvxwvFPlMJZtPfv3spR4v+lZSM5zS0u0Gg3g9tIkfq29C?=
 =?us-ascii?Q?h66fKXegG527gG1LY4+G4jjET9bYp3hP5zLfyXWsICtfF7kmxXI0XmJnYZxe?=
 =?us-ascii?Q?5GOHyMdQeu7LtNRLqK0CG3mW0Mm8pHvrwQjFSD6VQqatIgt9IVCnafpc3q5y?=
 =?us-ascii?Q?4ElpKOnss7qTW7/bLSRBDYh8WsTGZaHL99jl9WtF+uN7VurZAFIJUr5yArEV?=
 =?us-ascii?Q?YIqqJ7vM1+OYmgLe8PstFUR7gj/xkim+M8faXa30fj0BcV1NopZy/dOhO9qx?=
 =?us-ascii?Q?SGFyV72lD9PucF6W7PeKfgfWYLA/0bwxa91L04EpcEd0av9qqehhQ8tsyAoJ?=
 =?us-ascii?Q?igjvkZ/Q3c/fIyygbS28YuSnyEFiJABS7h9/gaFB0ST4zdICPtVyd4H/aLwE?=
 =?us-ascii?Q?FZ3+vjZ67gY36VS5aN9RAlMtjyPu2TtlZm4q84MM13/KMk6mfiNEvgfKWJ/k?=
 =?us-ascii?Q?JjG+ReWWDYLM2Ip5FngI9zh53aCDyzelteNvg8IkfDJPkf/sCcFKsROqz/Nj?=
 =?us-ascii?Q?5rZkDdz3Do23KJ4rOzhoqwBdpSK6/XtWzVSVnjWWij6vd48C1VNffVpzUBdI?=
 =?us-ascii?Q?52LdZiscIzmRqT9A40i2+OozrjKLIaC661XgfjvqyD9U6UDuIcnYSvjkbt2c?=
 =?us-ascii?Q?QDcxxP1cjHhm+pWuoj2aFas=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4fe9ec1c-fefb-47db-d550-08d9fb8dd8cf
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 14:14:50.7813
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: aSs0FFMuvs1copZg1b8OHSy/5bdvJVRZSRjgb1+zxhwYRcSTtDiqBRjiRQrvb9m1Ici26aJocilpCu0Xu+FZGQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR04MB7528

On 01.03.2022 14:07, Andrew Cooper wrote:
> On 01/03/2022 11:05, Jan Beulich wrote:
>> Go a step further than bed9ae54df44 ("x86/time: switch platform timer
>> hooks to altcall") did and eliminate the "real" read_tsc() altogether:
>> It's not used except in pointer comparisons, and hence it looks overall
>> more safe to simply poison plt_tsc's read_counter hook.
>>
>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>> ---
>> I wasn't really sure whether it would be better to use simply void * for
>> the type of the expression, resulting in an undesirable data -> function
>> pointer conversion, but making it impossible to mistakenly try and call
>> the (fake) function directly.
>>
>> --- a/xen/arch/x86/time.c
>> +++ b/xen/arch/x86/time.c
>> @@ -585,10 +585,12 @@ static s64 __init cf_check init_tsc(stru
>>      return ret;
>>  }
>> =20
>> -static uint64_t __init cf_check read_tsc(void)
>> -{
>> -    return rdtsc_ordered();
>> -}
>> +/*
>> + * plt_tsc's read_counter hook is (and should not be) invoked via the s=
truct
>=20
> Either "is not (and should not be)" or "is (and should) not be".

Oh, of course.

>> + * field. To avoid carrying an unused, indirectly reachable function, p=
oison
>> + * the field with an easily identifiable non-canonical pointer.
>> + */
>> +#define read_tsc ((uint64_t(*)(void))0x75C75C75C75C75C0ul)
>=20
> How about using ZERO_BLOCK_PTR?=C2=A0 The hex constant 0xBAD0... is more
> easily recognisable, and any poisoned pointer will do.

Well, I specifically wanted to _not_ re-use any of the constants we
already use.

> That said... what's wrong a plain NULL?=C2=A0 I can't see any need for a
> magic constant here.

Are you fancying an XSA for a call through NULL in PV guest context?

> Overall, I think this patch should be merged with the subsequent one,
> because in isolation it is slightly dubious.=C2=A0 read_tsc() is one of t=
he
> few functions which is of no interest to an attacker, architecturally
> (because it's just rdtsc) or speculatively (because it is dispatch
> serialising).

What code would appear to live at read_tsc()'s address at the time an
attacker can come into play is unknown, given it's __init.

> This change is only (AFAICT) to allow the use of cf_clobber later.

Not exactly. The subsequent patch specifically does not touch plt_tsc.
And if it did, it would have no effect with read_tsc() living in
.init.text.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 14:18:44 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 14:18:44 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281508.479864 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3Kk-0003cm-3U; Tue, 01 Mar 2022 14:18:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281508.479864; Tue, 01 Mar 2022 14:18:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3Kk-0003cf-0T; Tue, 01 Mar 2022 14:18:34 +0000
Received: by outflank-mailman (input) for mailman id 281508;
 Tue, 01 Mar 2022 14:18:32 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nP3Ki-0003cZ-FB
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 14:18:32 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 78687fc2-996a-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 15:18:31 +0100 (CET)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur01lp2059.outbound.protection.outlook.com [104.47.0.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-24-61HUAGoiPaarM2g6_TOSLg-1; Tue, 01 Mar 2022 15:18:29 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PA4PR04MB7936.eurprd04.prod.outlook.com (2603:10a6:102:c6::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Tue, 1 Mar
 2022 14:18:28 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 14:18:28 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 78687fc2-996a-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646144310;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=XvD4MMtvcaPKx23Cg8/gsE0qHf/waojcPXGHwdeZSik=;
	b=BcRxVv9Ea28e3fwyJZoda78rcxVVBvL0mrFUNv5A9MN9QVbM6+iN/+3bdfiIgfrrp3wXkO
	WprxFi5afaxE9C3Jcqlyp6AmglRV4xDiC/irXb+ozzqEzAP53RkQ2+ZSIFqfL+CJU2kNYx
	5Em8Li17MqxHbCMxg30uIbajRIFRplI=
X-MC-Unique: 61HUAGoiPaarM2g6_TOSLg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=fexer6soqBZV4SnTpz/iod5RtLEEaCH08Ouxsl4+7UAxFK+7/ta6y1H2edy+E6wvRJn0Lf2lujYtq4fJlW3HoZnZrgWkBHSHfWFwRINytL5rCaXZMWd7B8T7UK3BpjFLDLCLxj1SjvErK/zK/dRSJYus4Z2DUcIMgNxpO+iZ2nO6/PyGkriNZzjluOysDiUFvlvcKjOq0ak5ml7cegOnPE2xNlq72iVH02EDW+bHiDNgsNm/oOqtOrP3lpHd8ikrKdQJwg/8tDTqJFd0K/qxUYE1KGbe239afFt8M2nPQOK8aJriD4j5VGHsMsCcwZqxAEEbcPQbjsdvIAanFZrPtQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=XvD4MMtvcaPKx23Cg8/gsE0qHf/waojcPXGHwdeZSik=;
 b=NGdgHcKpD+5CqKlbHef9AbZh9bSLGI+vKC+91DcF/Njzs2jc+SYW+QAk3f2+uYiox7JEDemyTp7kWG7XTEvPO2wKE6jDTSo9YPnnJrXHrKO27HdvwWfi9GqU4oEG2F32/V/YBvOP/E4JhSanU/aBBNF0Qob0039MOYS9T/HSY9TlOGJgy6aohUbFK7kEJXOmO+O3ja7UvcwPZCrcfbe1uzDoTAG3LuKiO1cryWpzgoytivH/k8e/47F3OBbS7hG0fxBgZz9KcdBgUr5/NJmLMpexS0RlOw1mNSG0m3mToVa0U9+3vxS6g+fK9J8Iua32pQWb2/0Y12sm3w2lN4V/GA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <40ce913e-4388-2d2f-45e3-e725a927da92@suse.com>
Date: Tue, 1 Mar 2022 15:18:26 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH 2/2] x86/time: add CF-clobber annotations
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
Cc: Wei Liu <wl@xen.org>, Roger Pau Monne <roger.pau@citrix.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <77675e7f-2a7e-f517-4aba-e20774c8bfe5@suse.com>
 <61bbf544-74ac-b698-425a-d1db80acab43@suse.com>
 <20185a89-0a2b-6bbd-5484-31b6582ed200@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20185a89-0a2b-6bbd-5484-31b6582ed200@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR06CA0208.eurprd06.prod.outlook.com
 (2603:10a6:20b:45d::23) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 718cba1f-9da2-4f66-bfd1-08d9fb8e5b1f
X-MS-TrafficTypeDiagnostic: PA4PR04MB7936:EE_
X-Microsoft-Antispam-PRVS:
	<PA4PR04MB7936A09488C8D63B48D53C28B3029@PA4PR04MB7936.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(8676002)(66476007)(4326008)(66556008)(66946007)(6916009)(316002)(508600001)(54906003)(26005)(6486002)(86362001)(186003)(2616005)(83380400001)(38100700002)(31686004)(8936002)(5660300002)(2906002)(53546011)(36756003)(31696002)(6512007)(6506007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?bDBnVkRJUmpxMWtqekcrRDVER3kycTJlV1AyNGROcVVQWCtTditaOW90T3Rr?=
 =?utf-8?B?NjF6NExQeWRqdjNVelNmVHg2QW1Jb3hVT2FKNDR2a3RCRDNUMWl3UWF4V3pu?=
 =?utf-8?B?QXdzOG9FS3FZbFZWV2xhclRodDAxaVNyM2VsSUlvTHpuQmxRamZSRUlPVldv?=
 =?utf-8?B?S0VCZUtNOUxuZE45bDBvdjI3Tis3ZTRpK2pnM2ZCVkJpRUhWTU9JTEpuN3Nw?=
 =?utf-8?B?OXpKNUR3dTk4dnFxN0Znd3VCTWFSS0lkNUtQc0pjZ2hPSlNJd0FyMVJOWHdr?=
 =?utf-8?B?ZEZmR2NQaFpFRWZFeUE0bVNZSEt0MTFqZ09SK0QveURTNHBwRFZ1N0xMSU5r?=
 =?utf-8?B?V2VNcVRqbWN6bk5mRFBZYThldUZkS01INUZUZ1QweUs5MTJHWm5oVFNhWnR2?=
 =?utf-8?B?VlJ3Nlo4blNFZVROOHc5WUpHZlZBRElNN3Y2SlUzRDZiVlNHdWR2VTAvMThQ?=
 =?utf-8?B?WjNLZ2RlQlM4WTBVQ25tbVNOZzBzd29RcS9lWTRUL3hTc3VkZEo5OXhTeUNz?=
 =?utf-8?B?cjk0UUVVQnFtY09mQm5LdXB2ODlhYzNBRnhlTTA2cXFHS1JabmQxRCtHTHU3?=
 =?utf-8?B?MmtPRFMvUGZtMmJlOWg2OWJ0Rk8yem1oNHZ3TGpUeElsMnNUSXRGZkZiTU8z?=
 =?utf-8?B?aTAvWEJIWTJIMkhjVEJuclFNaXh2NXdUUks4UndhTnBxMk15c2Rjc0QvL1hx?=
 =?utf-8?B?MEFlU0ZvMHJxeFRVZTAycGRLRDZQV3loMnVjRWhlaXNTWFNKUlQ3dlhyNy9t?=
 =?utf-8?B?THdWQ2YzOGxUMWpxRXI3RHFHcTRBNjMwRkkzL3g2UVY5TFJwMm1IaWVvalUx?=
 =?utf-8?B?VUtkVlI1Z3VKdWdWU3J3SU1WeThnelpxV25Eb0hHcW9nRk5ZK1BzZ0J5dEx5?=
 =?utf-8?B?TkRMQ3VDYTNiTzNwNGIzamJSRVZlQUZzRStuZ3Ewa3lWUUxDNVNGRlhlZHQ4?=
 =?utf-8?B?Rmk5UjlLQ2NtZVlOS1c5SU5IcEIrNWRsR2RQc2M2N3J5NDVYNityeGIwdkl1?=
 =?utf-8?B?ckNsclpxeWdTUGZhbURaaHhCVVdFZy9VUXBjVENVL3M5WWIrcjZ1VENoWm1q?=
 =?utf-8?B?Vk52S25IZGpMeWtrZ1JQUE9Ycjc0K0t3eVNVU1REeU5JTHA2ZGNybzBJdzhl?=
 =?utf-8?B?RllZMGhYREV0end1amI1SExYdmJqNXRnbTRWeTdTcUtVRlEyZmQ3eXBVQ2sw?=
 =?utf-8?B?amZKSTlGWUdvSXJYTWFoWGFaSitVK0V2MEloMWRMT09JZ0sxTjkrS1hPVEpi?=
 =?utf-8?B?cmZQZk9CUkpIZ2JOMTdjYUFSTmN0WXhHSTNGcXF2VU5LT0VuTU5vM2tOZllG?=
 =?utf-8?B?MUNDdHlSd2NoMkU1ZWtEeGplV0FjRFhkQ1lCbkRVMU1VellKeTZ2K0dnL0Zy?=
 =?utf-8?B?djRpK1FaSzBZeUhiTUd3R1dia3NDVUJoU0I2OURpdlk3VHBjWDQwa3hkWFpN?=
 =?utf-8?B?bjJGZzg5M2IzQ1VDcDE2emN6M0NjNFRma2hFZFdLOG55WFJNQ3Nvbnh3VEx5?=
 =?utf-8?B?OWFSZWV3b2RDM1RrVG9PWDZIQkVjUmZyUkM1d0NBeVFIbittbEdlM3pHWlRm?=
 =?utf-8?B?QWY3TWI2VzUxR21iWHhuTmNvUWtkVnp4ZklXOEFiMEFsN3l5QTZreGNrTHdj?=
 =?utf-8?B?OGRhYUdEOGRsUWVkUDBFbzRRakkyY1JPV2dtTFRVZHFEOThCYmZkdytySjJJ?=
 =?utf-8?B?cnZJS3pKSDEzSHBWbVZjQVNWeGFwYkorRUgrcnpRTTJtRDgyUHVhM21OWWEr?=
 =?utf-8?B?NVFlVVB4MHVad3huakJHbnZvUnV2bGJYMTZVbjB5S3RIZktaSllqRnVrNnpq?=
 =?utf-8?B?RHFkSUFidStVd0xra2UrWEt3L25SMmJod2xPcEdQSTBtTnFVK2RhUnIxdnJr?=
 =?utf-8?B?NWMwNm5nV3hTUFp6eDhNenlvVU1WTWN3ZjhRMWNHZzNzR2VBNVZndXVmeTFo?=
 =?utf-8?B?ajFka2RSa1p4NXh1ZDhIRWR2bTI1NGswbjRWalk2dzlCK1V3M3RoMlI5QXhv?=
 =?utf-8?B?TDQ0cWZ4V0JuQXAxNEc4WldTSXBBdlRBTjJCYlZ3Y1lCbmR2VzNtQ1Z6UkVE?=
 =?utf-8?B?dmdBUjJoNWtzTmoyNzBpTGo0ek9abWpqWmFIekQ0c1ZhTkZIVXJEc01lUEpC?=
 =?utf-8?B?aU9BNk9odEFDVDRvM2txaDJnSUFkdWZMQ1hSaElBL2V2dzM4SERPU00wK2VV?=
 =?utf-8?Q?wYPBOtTTfMmx3rIgzmeeyAE=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 718cba1f-9da2-4f66-bfd1-08d9fb8e5b1f
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 14:18:28.3933
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: +34IuQ63i2WsKdYlv9Yw7zfu5QvXEOAe5qhf4FaTtnQm4G9tA3E9xdU9EVIps/KocYKTiGEWx3+wZltnkkdgog==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR04MB7936

On 01.03.2022 14:18, Andrew Cooper wrote:
> On 01/03/2022 11:06, Jan Beulich wrote:
>> With bed9ae54df44 ("x86/time: switch platform timer hooks to altcall")
>> in place we can further arrange for ENDBR removal from the functions no
>> longer subject to indirect calls. Note that plt_tsc is left untouched,
>> for not holding any pointer eligible for ENDBR removal.
> 
> I'd be tempted to include it, for consistency sake alone.
> 
> It is less likely to go wrong in the future if another hook is introduced.

Can do, sure.

>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
> 
> With the commit message, I'm not not certain if this is linked to the
> previous patch.
> 
> Overall it looks fine, but I'd like to get clarity on this point.

Converting read_tsc() was discussed (with Roger) earlier on, so I'd
view this as a separate change. As said in reply to your comments on
the 1st patch, how exactly read_tsc() looks like is orthogonal to
the changes here at least as long as it doesn't live in .text.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 14:20:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 14:20:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281514.479875 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3MM-0004yL-FC; Tue, 01 Mar 2022 14:20:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281514.479875; Tue, 01 Mar 2022 14:20:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3MM-0004yE-C4; Tue, 01 Mar 2022 14:20:14 +0000
Received: by outflank-mailman (input) for mailman id 281514;
 Tue, 01 Mar 2022 14:20:13 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Qfhu=TM=citrix.com=prvs=052ba2b28=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nP3MK-0004y3-QM
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 14:20:13 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id b274b7ab-996a-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 15:20:09 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b274b7ab-996a-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646144409;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=8Jdq0/ohAYWojsb1R/HhqNnDc9KaRrY0G3pRZ4N+EuU=;
  b=Y0NzSIqmgSkR5/Gix9CQ6fJn/fsqv+ktaIBQ1TVhoNjztNfg7mDYM3Sq
   f90asoKAkc3G1U92xbiUBl1ESo8pqKpUoBPHyxYUHYtFhuoBoc1sunwwl
   HVHl9iYpocyR/w5MFAKu198DYrEG5RFSxEbwCEcLIrVxFo54GUyhvRXuq
   A=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67510270
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:j5EnNa191U6k5JW3H/bD5WZxkn2cJEfYwER7XKvMYLTBsI5bp2BUy
 WMYCzzUb/mKYmf1eIskbduxo0sAvZTWzIRhSFNtpC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUw2IDja++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /1tmZGKQw4kBJTTxuEyUyJITzAhBadvreqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHxO4wSoDd4xCzxBvc6W5HTBa7N4Le02R9u2Z0XRayBP
 6L1bxJAMk/ufzhvYG4sM7QcwtynmnzyVxtX/Qf9Sa0fvDGIkV0ZPKLWGNDYYMCQTMNZ2EORv
 Hvb/n/RCwsfcteYzFKtzHWogePemDLhb6gbHra46/1CjUWawyoYDxh+fVmmp7+/g023WdNaI
 mQV/DYjqe4580nDZsnwWVi0rWCJujYYWsFMCKsq5QeV0K3W7g2FQG8eQVZpa9E4tclwWT0j0
 HeImc/kAXpkt7j9YW2Z3qeZq3W1Iyd9BW0IaDIATAAFy8L+u4x1hRXKJv5hH7SylcbdAizrz
 naBqy1Wr64IkccB2qG//FbGqzGhvJ7ESkgy/Aq/dmC46gJ0Yqa1aoru7kLUhcusN67AEAPH5
 iJd3ZHDsqZeVvlhiRBhXs0tMLyT7f+ICgTD31tAH6IxqyXyw3SKKNU4DC5FGG9lNcMNeDnMa
 UDVuB9M6JI7AEZGfZObcKrqVZ10kPGI+cDNE6mNM4EQOsQZmBqvoXk2DXN8yVwBh6TFfUsXH
 Z6AOfihAn8BYUiM5GrnHrxNuVPHK81X+I8yeXwZ50n/uVZ9TCTMIVvgDLdoRrphhE9jiF+Im
 +uzz+PQl31ivBTWO0E7C7I7I1EQNmQcDpvrscFRfePrClM4RD95VKSPnep4It0Nc0FpegHgp
 CrVtqhwkgeXuJE6AV/SNiALhE3HB/6TUk7XzQRzZA31ihDPkK6k7bsFdotfQFXU3LcL8BKAd
 NFcI5/oKq0WElzvom1BBbGg/N0KXEn63mqmYnv6CAXTirY9HmQlDPe/JVCxnMTPZwLq3fYDT
 0qIjVuKEcJeHF05VK47qpuHljuMgJTUo8orN2PgKdhPYkT8to9sLi36lPgsJM8Qbx7Ew1OnO
 8y+W3/0ecGlT1cJzeT0
IronPort-HdrOrdr: A9a23:1ua03ai+0IfjBWanRjikfxkJ2HBQXiAji2hC6mlwRA09TyX5ra
 2TdTogtSMc6QxhPE3I/OrrBEDuexzhHPJOj7X5Xo3SOTUO2lHYT72KhLGKq1Hd8kXFndK1vp
 0QEZSWZueQMbB75/yKnTVREbwbsaW6GHbDv5ag859vJzsaFZ2J921Ce2Gm+tUdfng8OXI+fq
 DsgPZvln6bVlk8SN+0PXUBV/irnaywqHq3CSR2fiLO8WO1/EuV1II=
X-IronPort-AV: E=Sophos;i="5.90,146,1643691600"; 
   d="scan'208";a="67510270"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=IYM/BMkHRdILa//7Qdal053mUihfcFApfsOWvDOLjrvBfBTxDzchSvarA6gEUwsREf+5hfU4gC7pjpwOxCL0HibdgmWhDVtlTn23sxTyDYRm1p+TZuQL43hzxHD5ruxWTrgOpq7bx3nIffIqX55Fd0KQmK3Ie7NyCrzk2IuEMlqdzFYK4Z9J35z0V9K7gd9DCib9mZtpEzQzjp/D9x/lZFIgqCfCe6BLkLlLxEoXLsDA6aT6Znodcgj789q1dkhmdZAQhrtSGbJn/kw685beXnudf5zVYMh8+O7tWWQ2SPHz5cnESWfKOHjiNu/9jpVSfmHhaK88a69BH6/NXZKpRw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=wOfGY3OP8edMG6TcG86RWFr89ImlVtGKDeGPiH+RVd4=;
 b=FxsfQQ5E5+x2t2cN9Y6rEi/oSS44O5rN6UKCeYQ+8GqUBsjLEKleSvkX4DrsDMK8v/+MYDqBtcet+YhB8m5UWvD/WiqPz3JcLoMEjHomCTck9cbGcmG8CtA7mFPPnnzYks588qW67TIc4R8en2ve6khuVaaUWNgJzabKzIS1v2sqyZhbWF8M18VjLpP3qS9co3bUDvP8DM+o0G/3x0z+k2j4ugcdanu7ioZxuzqyaoFu1BdfEFkh5gKzXd3h1Q3pmool5DfLQqqjcT45lhAahURvxSFxrFLb8stMsdiej95ykhtk/iN/G9SiJrW8WIiPOLwDGl3SUqmt8it6W5FWQg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=wOfGY3OP8edMG6TcG86RWFr89ImlVtGKDeGPiH+RVd4=;
 b=S07LLasSkxkLP5ui4WUv9OsTZxlA75thHRjE8eMGQXBsu8FrouL9lx1pFXH2rOLWBDBPV4m7zv68uYLFRTc3wiTxewSzV2++zgWPlnlz74H0A9yIX2ujGEfbaMKsr2X2jvKw0doK0Pw/ldxTdI2xgr46W1stqeewDtt3hVy5g/k=
Date: Tue, 1 Mar 2022 15:19:55 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Jane Malalane <jane.malalane@citrix.com>, Wei Liu <wl@xen.org>, Anthony
 PERARD <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, Andrew
 Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
	Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian
	<kevin.tian@intel.com>, Xen-devel <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v3 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Message-ID: <Yh4riyoA0BGgfAYi@Air-de-Roger>
References: <20220218172943.12182-1-jane.malalane@citrix.com>
 <20220218172943.12182-2-jane.malalane@citrix.com>
 <0a31970c-c0f8-c995-ce04-67523a4a830a@suse.com>
 <YhyrAyxhNtNWi7NY@Air-de-Roger>
 <9aff51c2-0e8c-685c-7bff-0ed7ff7347c7@suse.com>
 <Yhzr739VZdRLWnok@Air-de-Roger>
 <6b59e3ea-01ff-e26c-02d4-3b11594fd7f0@suse.com>
 <Yhz4yShnpcyq5IDM@Air-de-Roger>
 <60bcd74d-5686-9813-e3a6-b28c15b66a22@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <60bcd74d-5686-9813-e3a6-b28c15b66a22@suse.com>
X-ClientProxiedBy: LO2P265CA0297.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:a5::21) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 79d7c066-fa3f-441f-dd4c-08d9fb8e9261
X-MS-TrafficTypeDiagnostic: SJ0PR03MB5647:EE_
X-LD-Processed: 335836de-42ef-43a2-b145-348c2ee9ca5b,ExtAddr
X-Microsoft-Antispam-PRVS: <SJ0PR03MB56475DB695BF047BCDC6C3258F029@SJ0PR03MB5647.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(86362001)(8936002)(8676002)(4326008)(66556008)(66946007)(66476007)(33716001)(85182001)(2906002)(6486002)(508600001)(7416002)(316002)(5660300002)(6916009)(38100700002)(6666004)(53546011)(6506007)(82960400001)(83380400001)(9686003)(6512007)(54906003)(26005)(186003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?bTBRcDVvZHY1TjJ5c1JNUDNFM01ZNm1QUm4zZUdMZm9TS0NlK2x2VWErQ2cy?=
 =?utf-8?B?OHFHSlRMVUdCRjJHMjl1eUluczY2cEZFWWlueDVNRjhvc3dVejZzYjRWR3Bv?=
 =?utf-8?B?cExwQWNWWXdNT0ZJdkRJK3l3RU5RWE1MSWhUTVZlcU84djh1S2NoZkZ2WVMy?=
 =?utf-8?B?dk5aWUVRSlh0QWFScitieTU0Q3JLMy95ZlVKWExuQStZU2NMbFJ2MkFxS0N1?=
 =?utf-8?B?aVpqRnB2TWpVWTl0ME1PMDIvTU9PN0lJWU44RzJUc2Rpc2dHOW5LV3R4WU8z?=
 =?utf-8?B?TGExaXpJWkpUMXd5bnFCcWYva0pxRXZkd3k3U2ptQnFJeVQ1a1dCUW9QNEsz?=
 =?utf-8?B?OEUzWDE4NC8wZkk1VHFTVHRSSWNxa2QyYWhYbVdBZkpEemtOS1dGdFJsTUpH?=
 =?utf-8?B?MTQwTnRSakMzdUhYL1kzWlhVSXQ1aGxVUFJMTm5iMWwyNURXd3VoMW00OHpZ?=
 =?utf-8?B?QVoraHZtcTk3WWpmNUdUUlI2ZDdrSzdQMnVXYUYzSWRJNGlCeHR0d1l3NFFN?=
 =?utf-8?B?NHR3SlNtUHlLRWMzaUY5cXJFcW8razFObi9rUmZMeE9OQkZhSHVsd0JkYVhM?=
 =?utf-8?B?MmJzWmlLbGtZWVdEWTRNTC9UVGJNUGRBMmlMTTQwaDRhZUxlaitPMFoxZmxs?=
 =?utf-8?B?QndUaGZZV0YveDMvRk82TjVPeGU4NGlYZHFzRzdIQU5IVWFwZXhxQndrVzBS?=
 =?utf-8?B?VWYrcTkvK3dZNDk4MktIQWhoTzdDTXFaYUlpcHhRL2o5SUlTT2FiTEJHczEx?=
 =?utf-8?B?djRtRThLSGRyMTloQWlXaGlOYzF5dS9sWW1udURnRXZoTldWeEpCRFhoL2xI?=
 =?utf-8?B?Sm1Pb1JPTEIreU9nZzBIUGlpSDBVbW9DSkFRd3hhdlhiNThSSVp2THQxVGQw?=
 =?utf-8?B?K0lEZ1pKWkZlTzJ0c3k0QVo0SW5ObmxpMUR1cVQ3emFRbVdtK3lPWWtBcnNQ?=
 =?utf-8?B?N1NTNWdET0IzSVN5bXoxL0trZHFRaWN3ZEM0Q0t2TmhSYzNuakxNN3haZS9C?=
 =?utf-8?B?NElFVTRCMGw2NE11aFE2NS9LdW9wUzNZQ1VvUWF1eHR2Nm1MTzdldG9aQ2Vi?=
 =?utf-8?B?cmJhM2lLVUFaZzVqSlNpS3ZCT2dWQVlUSE9qT1JvWXlIRG9ibDJiM3BUdFho?=
 =?utf-8?B?UGsxMEhPK3AyL3lZMTFQRTRkK1M1aE1ISlQxRmNsdkgvcFpMZXFxQmVnR0ta?=
 =?utf-8?B?QWMzQXVwRGlJU3FoSWJsWlpyK2NuakVvdVc5cnVwNzZCbnRXRW1FTXhEeUkr?=
 =?utf-8?B?VXphRnllcitSdWxsa2pJWDFMQ1hCL3RHVVFLMXdzRzdIcmUyamsvYnFrVlJy?=
 =?utf-8?B?OXlPWGFXWFVPVlFOTmhJZTFZb2xIcUNpMmx5VnQyUHdqRXZML1BWU1NEZzhX?=
 =?utf-8?B?YmpFN1VNdkRCZURLeDFSYysvdVdhbTlwT05mTThFMXQ5LzFyUi8reTRFcXZY?=
 =?utf-8?B?VGp5YitKOFRMZThlQjlxRUk3SW1VaWVlYkhUbG9ESHU5Y2lEL2ZUUHhCakVQ?=
 =?utf-8?B?eE5za2c3WmJSRWN2UlFMOFF1REpZYzFmMlZvUlhkNUF5MmZsZjVQQktkS3Bx?=
 =?utf-8?B?NW1kWkNQRE1nYW5NMit6ZDNXU2ZkaVBGcHdYUzZVazRNdExmVmdUZndZR1dh?=
 =?utf-8?B?TUFUemVIZWNQU2tWdTZ1N2c3WGM5MTBodW1ZT2dYcXpiYW9kbFd4S0ZRaDM1?=
 =?utf-8?B?SWpUbno0d0RHTWs0M2VGaHlKT3h1eVRacVlLcERabzRmNGp5QlZNNXlwc1A0?=
 =?utf-8?B?a2RTeFlyaTA2UTA2czNUNGF0aVhTelFmNU1DSHJLSVhOWU92Z1RsYXdLNisw?=
 =?utf-8?B?eFhsRktTaUZDRTNpZ0ZYeFg1THBNL1l1bjV6TU1JTTk3THFWMDFQdXgyOXM4?=
 =?utf-8?B?SmFuNTRMTGRDK3Bld1NWTXdEK1VKYUVSY2pRZUhDbG05R0NweFc4Vmp3VlZC?=
 =?utf-8?B?aWdhNXBGYXpYc2VvditDbUh3bTVGd3BMYXZ3TVNFVVFXVzBPRGlPZHRINHg2?=
 =?utf-8?B?QUxRYWlEQkhQQ2V4M2xaR3ZDODc4K2lYaTFvTDFobE05Vm43bElGbnB6OHFk?=
 =?utf-8?B?Z0lwNXd2U3ZwV2g3MVVBR21pci9vZGRCa1ZoTSs0YXV5WjF4M2o2MHZkRHFi?=
 =?utf-8?B?dktvTmFqREdyM0ZrYUZJeGZhek5BclRaQitrVElkbzZ2WGUyRlkxN0hpY09s?=
 =?utf-8?Q?c93Fzw2HceOLw8g8S+0L0UU=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 79d7c066-fa3f-441f-dd4c-08d9fb8e9261
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 14:20:01.1025
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: cIZZei+yAVN/DSlWxCw2DnZFZHnwGIyfpLyEO1osUKKeEkcqbQ6+hLZuCZcXZrYlVQFtzGmvhW6ckK4xmgYDzg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR03MB5647
X-OriginatorOrg: citrix.com

On Tue, Mar 01, 2022 at 08:51:59AM +0100, Jan Beulich wrote:
> On 28.02.2022 17:31, Roger Pau Monné wrote:
> > On Mon, Feb 28, 2022 at 05:14:26PM +0100, Jan Beulich wrote:
> >> On 28.02.2022 16:36, Roger Pau Monné wrote:
> >>> On Mon, Feb 28, 2022 at 02:11:04PM +0100, Jan Beulich wrote:
> >>>> On 28.02.2022 11:59, Roger Pau Monné wrote:
> >>>>> On Thu, Feb 24, 2022 at 03:08:41PM +0100, Jan Beulich wrote:
> >>>>>> On 18.02.2022 18:29, Jane Malalane wrote:
> >>>>>>> Add XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_xapic and
> >>>>>>> XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_x2apic to report accelerated xapic
> >>>>>>> and x2apic, on x86 hardware.
> >>>>>>> No such features are currently implemented on AMD hardware.
> >>>>>>>
> >>>>>>> For that purpose, also add an arch-specific "capabilities" parameter
> >>>>>>> to struct xen_sysctl_physinfo.
> >>>>>>>
> >>>>>>> Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
> >>>>>>> Signed-off-by: Jane Malalane <jane.malalane@citrix.com>
> >>>>>>> ---
> >>>>>>> v3:
> >>>>>>>  * Define XEN_SYSCTL_PHYSCAP_ARCH_MAX for ABI checking and actually
> >>>>>>>    set arch_capbilities, via a call to c_bitmap_to_ocaml_list()
> >>>>>>>  * Have assisted_x2apic_available only depend on
> >>>>>>>    cpu_has_vmx_virtualize_x2apic_mode
> >>>>>>
> >>>>>> I understand this was the result from previous discussion, but this
> >>>>>> needs justifying in the description. Not the least because it differs
> >>>>>> from when XEN_HVM_CPUID_X2APIC_VIRT would be set as well as from what
> >>>>>> vmx_vlapic_msr_changed() does. The difference between those two is
> >>>>>> probably intended (judging from a comment there), but the further
> >>>>>> difference to what you add isn't obvious.
> >>>>>>
> >>>>>> Which raises another thought: If that hypervisor leaf was part of the
> >>>>>> HVM feature set, the tool stack could be able to obtain the wanted
> >>>>>> information without altering sysctl (assuming the conditions to set
> >>>>>> the respective bits were the same). And I would view it as generally
> >>>>>> reasonable for there to be a way for tool stacks to know what
> >>>>>> hypervisor leaves guests are going to get to see (at the maximum and
> >>>>>> by default).
> >>>>>
> >>>>> I'm not sure using CPUID would be appropriate for this. Those fields
> >>>>> are supposed to be used by a guest to decide whether it should prefer
> >>>>> the x{2}APIC over PV alternatives for certain operations (ie: IPIs for
> >>>>> example), but the level of control we can provide with the sysctl is
> >>>>> more fine grained.
> >>>>>
> >>>>> The current proposal is limited to the exposure and control of the
> >>>>> usage of APIC virtualization, but we could also expose availability
> >>>>> and per-domain enablement of APIC register virtualization and posted
> >>>>> interrupts.
> >>>>
> >>>> But then I would still like to avoid duplication of information
> >>>> exposure and expose through the featureset what can be exposed there
> >>>> and limit sysctl to what cannot be expressed otherwise.
> >>>
> >>> So you would rather prefer to expose this information in a synthetic
> >>> CPUID leaf?
> >>
> >> Depends on what you mean by "synthetic leaf". We already have a leaf.
> >> What I'm suggesting to consider to the give that hypervisor leaf a
> >> representation in the featureset.
> > 
> > Hm, but then we won't be able to expose more fine grained controls,
> > ie: separate between basic APIC virtualization support, APIC register
> > virtualization and interrupt virtualization. We would need to keep the
> > meaning of XEN_HVM_CPUID_APIC_ACCESS_VIRT / XEN_HVM_CPUID_X2APIC_VIRT
> > (and exposing more fine grained features to guests make no sense).
> 
> I did say before that once (if ever) finer grained controls are wanted,
> a sysctl like suggested would indeed look to be the way to report the
> capability. But we aren't at that point.

So we would expose everything in the 0x40000000 range, and caller
would figure out the position of the Xen leaves doing a signature
check until the Xen leaf is found?

Would we represent the max policy as having Viridian enabled (so Xen
leaves starting at 0x40000100)?

I would agree with this if the hypervisor leaves where already part of
the managed CPUID data, but the work required to expose the leaves in
the policy/featureset doesn't seem trivial. Making those leaves part
of the policy will likely be done at some point, and then we can
decide to drop the sysctl bits.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 14:21:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 14:21:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281521.479887 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3Nc-0005Yr-Qj; Tue, 01 Mar 2022 14:21:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281521.479887; Tue, 01 Mar 2022 14:21:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3Nc-0005Yk-NK; Tue, 01 Mar 2022 14:21:32 +0000
Received: by outflank-mailman (input) for mailman id 281521;
 Tue, 01 Mar 2022 14:21:31 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Qfhu=TM=citrix.com=prvs=052ba2b28=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nP3Nb-0005Ya-MF
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 14:21:31 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e22694af-996a-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 15:21:30 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e22694af-996a-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646144490;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=CFq7ucWFa/8Vfo2JLBh9/+mDVj4ToCSNMC7UOOXAgzU=;
  b=ASnO1m2KjLMNJJBgiiqpwg66xAtUvScqj2rVunc8tG2WtNdQfUANs94l
   Gr/5mlfiNtUiQFd2FZ8V6t7IOyoqGfupW7YCXpfdOWVcPFe2e7Q1+2/Er
   ZPbHhAlzavtCDJrvzPuwdPHWB7EVJtItdk/Ok8fisNacNJyrjwE0Qrmzs
   A=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67510505
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:QNHp46M++a9/+K/vrR20l8FynXyQoLVcMsEvi/4bfWQNrUol3mMGy
 zBMWDyOb6uKYmT8KNh/Pd/n9EICv5GByodrHgto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi2tcw27BVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Zl
 NFdq6TzWwgQNajDor4QdDN+SnovMvgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALNs7kMZlZonh95TrYEewnUdbIRKCiCdpwgmht35gTRau2i
 8wxamB+RxruRzp1NVYzL9EEjtau2yf5SmgNwL6SjfVuuDWCpOBr65DyNPLFd9rMQt9a9m6Iq
 2SD82nnDxUyMN2E1SHD4n+qnvXIny7wRMQVDrLQ3vxgjUCXx2cTIAYLTlb9qv684nNSQPoGd
 RZSoHB36/Fvqgr7FbERQiFUvlbYug4CY5lCHNQx7Q63kKfzySDAXTkLG2sphMMdiOc6Qjkj1
 1msltzvBCByvLD9dU9x5ot4vhvpZ3FLcDZqiTssCFJcvoK9+N1bYgfnE447eJNZmOEZDt0ZL
 9qiiCElz4segscQv0lQ1QCW2mn8znQlo+Nc2+k2Yo5Hxl4hDGJGT9bxgbQ+0RqmBNzBJrVml
 CJZ8/VyFMhUUfmweNWlGY3h5o2B6fefKyH7ilVyBZQn/DnF0yf9Id4Iv2ogeB4wa5dsldrVj
 Kn741g5CHh7ZibCUEOKS9jpV5RCIVbIT7wJqcw4nvIRO8MsJWdrDQllZFKK3nCFraTfufpXB
 HtvSu71VSxyIf0+lFKeHr5BuZd2lnFW7T6CHvjTkkX4uYdykVbIEN/pxnPVNbtnhE5FyS2Im
 +ti2zyikE0OALWjOXCMqeb+7zkidBAGOHw/kOQOHsarKQt6AmAxTfjXxLIqYYt+mKpJ0OzP+
 xmAtoVwkwCXaaHvQelSVk1eVQ==
IronPort-HdrOrdr: A9a23:WcndNaw4i4T3Tf2ptAUCKrPwIr1zdoMgy1knxilNoH1uHvBw8v
 rEoB1173DJYVoqNk3I++rhBEDwexLhHPdOiOF6UItKNzOW21dAQrsSiLfK8nnNHDD/6/4Y9Y
 oISdkbNDQoNykZsfrH
X-IronPort-AV: E=Sophos;i="5.90,146,1643691600"; 
   d="scan'208";a="67510505"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Zz8CpiKRMsJrNGSKa/QegXiqORufyKQcOX2q/5UVgaDW5TOMdjrwUxgNQVFHmiVt10ho6aVbtt4jE85J8N+SacxHU3SLQeWhRGrAK1DVgKLvtf/7/Xf8gteEHEDML7grUMtLqGY66xv3loo6ph7gJaHCPCK3rQ7UmJmFwwNdKVVECALCRek17YpQxzp8/BzSxwCM42BtLUf9Ag+NuisJtgGf/MW+bMbE5+ZHztYl+72VC2lAOtD/TpHcN5y7ERzZwGRk7ED2mosuyh/Dcf+cxhR85712wHZyN7YXkCvlWnrNsYLPkPMnHy1QApnOeE4EBrntw4Z4qUQQOq/B4JWB5g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=asEOo2hUVtkuimU0mOHJme/HCaJCwWp4xy/3Mmvsl/k=;
 b=eXBfnqHK66lXfcG5eRFXNdTtyQZ1XYDZWaHACh0O5+juSUqoNT2k+L8Jp+8cUcfSespLKF0Pv3E4qPQF4eMY3ab+a5358G4BSxoTpIyN8npyq2WJLx6wh8TmJoZkbHTbJMeBRH3GkwsKZqEQWI0Ua9xcAFXVPYCBqeU1s+Kz4BI6DYdD0i/OVRhCFE55R3CnEhgesu2xQ1ek2FUgYbx/ZewjBiYURj4r7ZPvJEq/O/vlXCj58fSMcz2+Yk9ALj4+sztUVpX6jp6isWHF0grqnEqHJAjR82Mq0m6IZO9XtZ4fEVjfQ052aHtytl1SsR7718lGgt6Hq4MqISWflvq64Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=asEOo2hUVtkuimU0mOHJme/HCaJCwWp4xy/3Mmvsl/k=;
 b=VT65dr7re9MNuPiWmCo6//KCqD4XePjaD+15ExQR6XEquqpu0H2oV99DdDttlJQ4rSA5nDA+dnuJ4s0f+56aSw9S+AcYIPXn0YUyn+aPDBLFmUGPgmESH4alS5t41m3FuyroNn9dAAn7gIIJH9tdPdBAz1DO37T4vynu9Y0Tylw=
Date: Tue, 1 Mar 2022 15:21:16 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Andrew
 Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH] x86: fold sections in final binaries
Message-ID: <Yh4r3FNL5Wfb0Rbm@Air-de-Roger>
References: <03851bd4-9202-385f-d991-c9720185c946@suse.com>
 <Yh4i/QPAggI3AVpC@Air-de-Roger>
 <3ed7482b-c445-92f2-66df-a075f571bbf0@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <3ed7482b-c445-92f2-66df-a075f571bbf0@suse.com>
X-ClientProxiedBy: LO3P123CA0006.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:ba::11) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: bf08fcfb-f0e8-48ea-d227-08d9fb8ec1e6
X-MS-TrafficTypeDiagnostic: BN7PR03MB4514:EE_
X-Microsoft-Antispam-PRVS: <BN7PR03MB4514FFBDACF352B05B7620128F029@BN7PR03MB4514.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(82960400001)(6506007)(316002)(33716001)(6916009)(6666004)(53546011)(8936002)(54906003)(86362001)(83380400001)(66556008)(66476007)(66946007)(8676002)(9686003)(6512007)(6486002)(508600001)(2906002)(26005)(186003)(5660300002)(38100700002)(85182001)(4326008);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?Z2NlQ2FnSDgrRUZrM00vLzkvalVsUUw2aEVzcU8vVm5CRVBjREMxTzFCaFdG?=
 =?utf-8?B?bTk1YW1oVkswY0IzN0Jad0NlTnBYVkYxN0J2M3puR0NCSHJ6NG1hMWdxK043?=
 =?utf-8?B?SENWRUd6aW5Ja3ltUUUzT3JaL3gzOU00NTA1QlJPQnJ6NHNBTW8rbGVRd2Jn?=
 =?utf-8?B?ZGJXUElobC9KeksrMEV3KzBtS0Q5QTBnZ3pVQTVVdExobVhidkxyYVdjTWFz?=
 =?utf-8?B?WTlDcVlpcVdyNmM3WW1nbll6YnZwcU0wL2VtTWcwYmVYWUsyUzJIdE8vekhG?=
 =?utf-8?B?bUFyN0xBV3NSQjUvc0prV081ODlRaVg2Q3A5bDFkZzVRT0o1Ujl2NHpLN3BL?=
 =?utf-8?B?SkRUNCtBZVl5OCtuNFp1dkdLT3ZXaUdadXU5Tk44ZE1WdHdzQ2lMK2tBRVpt?=
 =?utf-8?B?bnFEV0tXVWw4TmI1RmRCR2p1TVhvTVhJYXVuWkNpZjd1THo0dUNSVmhUaDcx?=
 =?utf-8?B?aEcyc2VpYmxWajdEL1FicmNya3BBTlNlMkJYc2FZUmlHSkVnR2pqWU9xWVky?=
 =?utf-8?B?S0Uvb3VVSVZKUU5yKzU4VW8vWUVadzlCTnFZclJZOHRuQmhpdTdxTFFFdm1X?=
 =?utf-8?B?N3c4NHVTMk1jUzA3V3ZIdFlqVkpmbmlsbUFuNW5JcURCVmp2S3MyQjhiMEtq?=
 =?utf-8?B?MDZxN3NISUVLZTQvSHRHblRuaEhHalBvWXBjczd6UUJDWGtjcW5vaEcwT3hx?=
 =?utf-8?B?bkEyRmxyWTVVQVRTRmxDTE9wUUxhZUEzbDBvdmtFVXRnMWFzcGJ4QzA0Yitw?=
 =?utf-8?B?K3l5VmJCRW05OGtWTlB0ZkpXTmhqVW5BSzN5Y1VPem96aitMV2E1V2ZjT2lW?=
 =?utf-8?B?ZnVPakk4RWluejNpR2YzYWRlRFBxZU1LejVnM0dJb0NxTmp1WEgrb01JSnU5?=
 =?utf-8?B?eC9BbkFiSDg0Rk1EbThKNEtXSzdKeG5ka3c2WGNpNHhwbzEvQlFHRW0wQURm?=
 =?utf-8?B?K011VURPRTN6L1U2YXdoYTJnUXhpVXIrV0VLWnhmTXdlSGJLVExSOW5lNkYy?=
 =?utf-8?B?NzNxL0JyREIwT1R0bUk5MlQ5R2VqbFpBemRqaFh6UjZUeXk1MkljYS9VejJv?=
 =?utf-8?B?WURIYkx1UUI0ODZjMW1YbVBaOTVsSTNrN0ZZbTFZVGRQYTNDU2xGZUtLZWtk?=
 =?utf-8?B?NTg2bWorSGJ2WHdUeGRtdFJGVHk0OCtOR1JnZGdlK05zc2I5NkxQdEEvYUs4?=
 =?utf-8?B?TWN4OWhDZFNrRVZNUE9SMW5RR1B0dmlQd1VZY3RsRFVuck0vZUFwU2g5dFA2?=
 =?utf-8?B?MUdvcHcwVTI3N3NPUVA5R2RKclFQU001MnJPTGpwRFNpWkFwM0Rtbk9DeGFC?=
 =?utf-8?B?Qk1Wd3grRzlOSk5QeGZTYWNnQ3ZnUFZudHVzbU1xeEVTYnk5UWtOdCthVnhq?=
 =?utf-8?B?eFZDMXhOWXlBVEhzMWFUZWZBQlIzK2pISXYvVGZkSjIzQ2xXWDRKcEpncU1o?=
 =?utf-8?B?S29LNVdLdzVaT0sweWJNQ0hzZ2hDSEtnK3l4Z0pkdHB0ZVFRRDMxc2ZsRmF0?=
 =?utf-8?B?UytoeU0zelZtRHF1eHJSckloamZ1YXhINkFlalVWTHNoRExFWmNId0dINWlN?=
 =?utf-8?B?MGUwaFV2WGZVVFEyQXc1a2tKbkxlM2lKdHV0L3p0NHVXRWZyY3F0aHJ2K0JT?=
 =?utf-8?B?ZVJQVEJ5QVViK21oTHE1ZmVjVjhxVjZWdHgwa1FJQmVsWDFpQlRBL3NMSERT?=
 =?utf-8?B?SUtvYXNzeTE1MUJZampTZUJncnlkdXFFM3VvRjVmZWRrcFJnWVM5ZXY1QWp6?=
 =?utf-8?B?bE9wUVVYQW54MGRUK01BOFQ3NlJLbTFZTWdpbWp4ckRuNTZTSnk5Q1J2ZmRt?=
 =?utf-8?B?NFNGVVFON205Z2NOaVJJZTcvalQrQkR5RzlramtrbzZaV0YyOHphbkZBL2lZ?=
 =?utf-8?B?eDN5WFBiNnhqODZKc25ZR2F3YkExYWNDdDdvVExvaW9JMU9oNWZsYVU1SE5r?=
 =?utf-8?B?d3hzWXBLNXd2aDlyNHpRekNmTVgvU1Radm9UNUQ5b0lnd0dTQUR2KzVXbkpU?=
 =?utf-8?B?T003NlVXMXQrQkM5NXRoVkxISlpqVzZEUXdjMS9ISDQxVnhtbk4rRW1zTTEx?=
 =?utf-8?B?UVhJakNoYXpkbjd6K0ZkMW5GZzlSVmZpV1diWEgxcERRbkQ4eDJzcVc4U08y?=
 =?utf-8?B?NnBlcWlCbUMwbXRJbmYyeUxqdHM2OWRCWWtCZmZVYnExQ0UrZW9ka0t4S1hL?=
 =?utf-8?Q?xfA+lP18cjH1NrwHvwIbplw=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: bf08fcfb-f0e8-48ea-d227-08d9fb8ec1e6
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 14:21:20.7943
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: OxtpW94KFm9ekU7MWLtbAOpP27QMD1VJrf6rvtcRLFV+6sMPtbnvsMU45+VSVfHj4gjZx3f+QW2B+dMcz3DANw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN7PR03MB4514
X-OriginatorOrg: citrix.com

On Tue, Mar 01, 2022 at 03:06:30PM +0100, Jan Beulich wrote:
> On 01.03.2022 14:43, Roger Pau Monné wrote:
> > On Tue, Mar 01, 2022 at 09:55:32AM +0100, Jan Beulich wrote:
> >> Especially when linking a PE binary (xen.efi), standalone output
> >> sections are expensive: Often the linker will align the subsequent one
> >> on the section alignment boundary (2Mb) when the linker script doesn't
> >> otherwise place it. (I haven't been able to derive from observed
> >> behavior under what conditions it would not do so.)
> >>
> >> With gcov enabled (and with gcc11) I'm observing enough sections that,
> >> as of quite recently, the resulting image doesn't fit in 16Mb anymore,
> >> failing the final ASSERT() in the linker script. (That assertion is
> >> slated to go away, but that's a separate change.)
> >>
> >> Any destructor related sections can be discarded, as we never "exit"
> >> the hypervisor. This includes .text.exit, which is referenced from
> >> .dtors.*. Constructor related sections need to all be taken care of, not
> >> just those with historically used names: .ctors.* and .text.startup is
> >> what gcc11 populates. While there re-arrange ordering / sorting to match
> >> that used by the linker provided scripts.
> >>
> >> Finally, for xen.efi only, also discard .note.gnu.*. These are
> >> meaningless in a PE binary. Quite likely, while not meaningless there,
> >> the section is also of no use in ELF, but keep it there for now.
> > 
> > Should we also use --orphan-handling=warn as to recognize orphaned
> > sections and attempt place them? We have now detected this because of
> > the 16Mb limit, but if we remove that check that we could end up
> > carrying a non-trivial amount of 2Mb aligned unhandled regions.
> 
> Yes, I guess we should use this option. See below.
> 
> >> Signed-off-by: Jan Beulich <jbeulich@suse.com>
> >> ---
> >> TBD: We also use CONSTRUCTORS for an unknown reason. Documentation for
> >>      ld is quite clear that this is an a.out-only construct.
> > 
> > I've found some (old) documentation where it does also mention ECOFF
> > and XCOFF apart from a.out:
> > 
> > "When linking object file formats which do not support arbitrary
> > sections, such as ECOFF and XCOFF, the linker will automatically
> > recognize C++ global constructors and destructors by name. For these
> > object file formats, the CONSTRUCTORS command tells the linker where
> > this information should be placed."
> > 
> > I guess we can get rid of it.
> 
> I've taken note to make yet another patch.
> 
> > The patch LGTM:
> > 
> > Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>
> 
> Thanks.
> 
> > With the possible addition of --orphan-handling=warn.
> 
> As above: I agree we should make use of the option, but I don't think
> this should be squashed in here. The option appeared in 2.26, so with
> the current documented binutils baseline we'll need to probe for its
> availability. I'd therefore prefer to make this a separate change,
> and I've taken respective note as well.

I didn't check when it first appeared. I'm fine with a separate
change.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 14:23:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 14:23:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281531.479899 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3Ph-0006Er-Ea; Tue, 01 Mar 2022 14:23:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281531.479899; Tue, 01 Mar 2022 14:23:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3Ph-0006Ek-8h; Tue, 01 Mar 2022 14:23:41 +0000
Received: by outflank-mailman (input) for mailman id 281531;
 Tue, 01 Mar 2022 14:23:39 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=YI9j=TM=citrix.com=prvs=0520bb690=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nP3Pf-0006Ee-6j
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 14:23:39 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2e397192-996b-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 15:23:37 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2e397192-996b-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646144617;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=4ObiUhpeQyuA1VDFdAzZ7biM4EWMeMxqTrJB4a4yTsA=;
  b=YJdzb6p8BuGKCIZibEhakwoJG9C/K/6jxM1Zai+iVXfa3oK5jn32i9cG
   CVQCMReDjICf5RobttQi9MGKb5EFIWPwiE9/qAnojp3C+lxjAMZjH1bCA
   97EbSbBjq0e1arIa+ICo75ygTPUBqBDr3L2uYhEGrSKt0ywbl+4EKzYWo
   Y=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65629216
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:bmHkfq+YLqfsyhZhVSpoDrUDnX6TJUtcMsCJ2f8bNWPcYEJGY0x3x
 moYCmrTPviJZWCge48naY6x908Cup/QzdcxG1Rt+S88E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oDgW1nlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCncysVyNqGbLroec6XjN3CHxmEaQF6IaSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFKoZtmtt0nfyCvE+TIqYa67L+cVZzHE7gcUm8fP2O
 ZdHM2s1NUqojxtnEHxQAZgVs9iRuyO4djRhr3CkvqMu/D2GpOB2+Oe0a4eEEjCQfu1Fk0Ddq
 m/Y8mDRBhABKMfZ2TeD6mirhOLEgWX8Qo16PKK83u5nhhuU3GN7IB8cWEa/oPK5olWjQN8ZI
 EsRkhfCtoBrqhbtFIOkGUTl/jjU5XbwRua8DcVq9B+piY3LxD+aIWUuYSUccPAv998PEGlCO
 kCyo/vlAjlmsbuwQH2b96uJoT7aBRX5PVPudgdfE1JbvoCLTJUby0uWE409SPLdYsjdRGmoq
 w1muhTSkFn6YSQj86ygtW7KjDu3znQiZl5kv16HNo5JA+4QWWJEW2BKwQWDhRqjBNzAJrVkg
 JTis5LGhAzpJcvQ/BFhuM1XQNmUCw+taVUwe2JHEZg77CiK8HW+Z41W6zwWDB43bphcJmS3P
 BaK4FI5CHpv0J2CN/Qfj2WZUZlC8EQdPY69CqC8giRmOPCdizNrDAkxPBXNjggBYWAnkL0lO
 IfzTCpfJS1yNEiT9xLvH711+eZynkgWnDqPLbimn0XP+efPPxa9FOZaWGZim8hktctoVi2Oq
 I0BXyZLoj0CONDDjt7/qtZCfQhXdiFgXfgbaaV/L4a+H+avI0l4Y9f5yrI9YY112aNTk+bD5
 HamXUFEjlH4gBX6xc+iNxiPtJuHsU5DkE8G
IronPort-HdrOrdr: A9a23:+vD6lqP9ksTr2sBcTuijsMiBIKoaSvp037B87TEIdfUzSL39qy
 nOpoV/6feX4Ax6ZJhEo7290ca7LU80maQb3WBzB8bBYOCFgguVxdpZnPLfKlTbckWUygc678
 ldmsNFeb7N5DZB7PoTT2ODYq0dKHXsytHOuQ9+pU0dKz1XVw==
X-IronPort-AV: E=Sophos;i="5.90,146,1643691600"; 
   d="scan'208";a="65629216"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=HNJhvVO02XFWh/WZepET+ULDebW+yJ23PkpJjXl0ib7t/9NgZbIrGDs5ulDdWAQy2ltFEoamPF3lRB9CdRi22bqKCuwms45vUeiSmk2FLKO9aUKQxifWaplI0RSgseEE+qEH0V2pKXUBxwHyKUztSlfJiHaWeV9dOXOTWmd1sWcLOEUFpvf6alvQ3ET6x2D2YFgsNtY0/IHdqMDe0r1gylqElSM5R8/0zadWilUz6Wo4/tF/Ja0tOdN/7h6cy9uKyESDrcR+92/1WIYDL4lLocwihtKVaFs0O5ASOoKUQjQd+zjLT34scmhgWAVrHmR1jJhvMQVPgTD2RCQBIyWG3A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=4ObiUhpeQyuA1VDFdAzZ7biM4EWMeMxqTrJB4a4yTsA=;
 b=GfHzAxsrgnyzMoTD1DHGmgptAq5PTVbQnpWfJ7rzLlcgaP/rmhDsfqxVhwZX19ULjKzqaoSsX1XIkGA91Umape0ot0UqDCXNZ/gMtsufCsW5EwtG5Pcc0VCwSPfzlwqyfHni6gJria939q0xdzzhmRzr2st1wz0IG5z0TADoLpvmA2nqyKwQKWSmGwZ9pyaH27h+GHgnmtTrtYCvD63vsh/V6wzn8gHDyUVbEFov1llKeNRBQ/ESBG0GQO39VL2MW1wTThLQOUWi67WDGcF2o6Kt/8+RPbTnlgSb9hCbcbHiN2orFrdhdas62dYe02TWM1oeh5egEf3HGvzoBMG5pg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=4ObiUhpeQyuA1VDFdAzZ7biM4EWMeMxqTrJB4a4yTsA=;
 b=Cr68EAANKizvDbmk4hCFJV3mvyyK9A+GoW7Cndzc4lA7iEu2tapy/OH+JSKqLMZi+qUhSMWRHScJBXiLtjahKZlwTc2vX0cjn1xBxqmb8yVwUE2L6xKHIvcSsGx5dGNKJQ6sFHaQx6GRwKE4QcPJm0nB/eqD2PlOy6dNftm84Rk=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Wei Liu <wl@xen.org>, Roger Pau Monne <roger.pau@citrix.com>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH] x86/altcall: silence undue warning
Thread-Topic: [PATCH] x86/altcall: silence undue warning
Thread-Index: AQHYLWCYr1nVwle0TEu9TqkN6fmfJ6yqeogAgAAMyICAAA3FAA==
Date: Tue, 1 Mar 2022 14:23:28 +0000
Message-ID: <6f005e15-eb81-c41c-7296-4929e85eae21@citrix.com>
References: <0e3594ff-c637-46f2-bc95-7a26b5471b86@suse.com>
 <40306bc7-f61c-d330-0ec7-d986e4711d88@citrix.com>
 <06452eab-653b-458a-048b-cc709151353a@suse.com>
In-Reply-To: <06452eab-653b-458a-048b-cc709151353a@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 1597012d-3964-4b9f-f7c0-08d9fb8f0e0b
x-ms-traffictypediagnostic: BN7PR03MB3745:EE_
x-microsoft-antispam-prvs: <BN7PR03MB3745319C6B9E782C709C0BC1BA029@BN7PR03MB3745.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(71200400001)(6486002)(508600001)(8676002)(5660300002)(36756003)(53546011)(6506007)(54906003)(6916009)(316002)(82960400001)(91956017)(122000001)(8936002)(64756008)(66446008)(66476007)(4326008)(76116006)(66556008)(38100700002)(66946007)(6512007)(186003)(38070700005)(31686004)(86362001)(31696002)(2906002)(2616005)(83380400001)(26005)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?QVp6anNpK1ZoRVZFQXNtZWNZZVFqa2hlS2g5SVdSQ3FqQTR2Y2NSYUhueC9V?=
 =?utf-8?B?ci83Mit4VGZxMnJxeGVpcDNwaEhBU2xZczVzRmlhS0o0UmIwcUcydC9uV203?=
 =?utf-8?B?bUhmeXphZnBybC9KOUJsclY4Z1plWjdaUm5QN2lMdmZXcTN2a2ZVWlJyYUsx?=
 =?utf-8?B?bHhGS29hLzgxTGlZSUY1TzVjN1ZLUWJkOXFGS0xxQ2dUajIydjgxWUZRcStn?=
 =?utf-8?B?NHMvSnJnOGtmRXFUTDI1dmppTkI2UlF0U2cremZMVHI0dDdBZysxWFFpMHpR?=
 =?utf-8?B?dnBlT2JCRUswOFF5VGdvS2F5SHZwNnhtYWhNMnFyLzNDYjdpRlh1blVFMERD?=
 =?utf-8?B?VlZCUzhUUjA4NnF1M1pMQThOZmxUZ0VtaGhQQlhGbkdrelc3Sk5NOFBnckdX?=
 =?utf-8?B?ajJvdjVXUDdaTk8yandCd3docW1OS2dXM3JTV3pYYk45UzVzRXh2bmNYR2Q2?=
 =?utf-8?B?ZnBIYmV2MGkzYzJKUFR0ZXdYOWFSZlBSc3lhRGZHNFNwZlQvOVR4ellSSHRy?=
 =?utf-8?B?N1NieTI0K3dpVXFYRUdpYWlENXlxQmFSN2U5Q1JaZ21LaytWL3hRV0FPWitj?=
 =?utf-8?B?UE1VUzBVZytKNEVneXpScTI0Q0VwTGxFMFRacSthUjJuRzNLb21hN0tSVjlm?=
 =?utf-8?B?RUZDVmxrTXI1NENvZXc1cnFITkt3cGFQOVlvODhlWHhSL2pjaGdwaitZM1Rh?=
 =?utf-8?B?MXkybi9jbmNyUWkwQXZzS016cDBNYlVPNW9ZQVdUdjN4VURzbDM5MDFFZ29F?=
 =?utf-8?B?ajZIeDZpY1BJTGpMNjNrOWJmMDFzVlVCdjBkTjRrazQ1ay9YQVdQbkE5UTk2?=
 =?utf-8?B?d2w2cms5S21LenYxZFI0ZERQSllGUUJlR0xKZVdUQlBpTUtiT290MW9YNUZj?=
 =?utf-8?B?c1ZEYVJTVEY0VkFaakJUODV4eFBVMDVmbGtvY0FRejZ6eDluRXUzNmYrWGVv?=
 =?utf-8?B?R3BwSGJmNXVXTGRwdTRHWUkzZkJzK1NDeTZkZUpRRnllOGwrUTN3d29mRVFZ?=
 =?utf-8?B?aEt6OU9GR0RxMWRtaSs0bVJxSExoRkdPNnp0dlZxU2RNcGo5TFoyd1dycU5q?=
 =?utf-8?B?MlhYZmplVWhkYk81YXFidnVzcWRSWmJpMW1KRDZob3pNbnNOYVM3Y1J2NHlY?=
 =?utf-8?B?czZ1NDloWmJFbXdjbmltMElqVGZ1Umh6QklKcnhrVm5vaG50YVpXcFNqVlRn?=
 =?utf-8?B?S3h3b2pSWWw5ZCs5NEhubkVNQ2grdVpOaU9zeVlwTnhJNmt5dDArU1l0SlZM?=
 =?utf-8?B?TVBQbXRSUUgwOGlJZURSQjJNNTlNVVE0Qy9XVGszb3BBcytxR2ZzaTkzMGJl?=
 =?utf-8?B?MDhJRjF2K3FnMHFnUmJJdjZJcUMwMFhyMW1VaW9vL3o0MnpIYkhEL1JvLzcr?=
 =?utf-8?B?aUtsbWkvM3FyeWx1NjNnQXFUMzJ2YzVMeExaM09FeVVmL0RCaFRYVmVZSHk0?=
 =?utf-8?B?dnR2KzROeWtxajNiMkZXQ2RRMHM4d3hTeWoxMkRadUJEOXUxSXRSTmdzamUw?=
 =?utf-8?B?K0dCZDIwUnpaTEZxUDRNay9lM2FCSnlZT0VsVTNPYko1UzR6WWlaS01xUU9J?=
 =?utf-8?B?L0d2WTdsVXZES2U1ZTRXSUIxeDBMSFlLaUVuNmgwVFB3bHZGbTBpYk5ieGZN?=
 =?utf-8?B?eDl1MWtXV0R3RmVqbk9OSkRpOEpwUnI5Tk12MXZtSmlTYjJxQnpib3gzdXE0?=
 =?utf-8?B?bGJQL3pQVnN3NTRjOHcxNTlmVGRCV3pkUkF6TGFOdnd3Q0t0dm1WYjFaVFBY?=
 =?utf-8?B?Mkl1blpVRDlEbC95Kys4V0JZOElrVVpPZ3NQMmpaWHU5Ym5lMUNVUmhxU3ow?=
 =?utf-8?B?bHg4WFpOdUhLdWhLRHVRNi84OWJYaU9OOFVwcmF1azJVT3FVL000MkFuTk10?=
 =?utf-8?B?ZGtpMFlhUlZTeXVSYlcrbGxSaEIxQlk3QU5vS1dWWUxWSFFoK1FnT3d1cjZE?=
 =?utf-8?B?SDJEVVpCRUEzZ0pNbVlkNllIdGdLMisxODRPWVBURjFjbHE4V0ZXbFd1VHRK?=
 =?utf-8?B?YlpnaGxZRU1rQVVHQ3BNOVBUOTRPaDR4akpQSW5RTFg5QkxQUVVTU3Zmc2xS?=
 =?utf-8?B?ajF5ZzUyZGhwZUhSUmp4MURkWFNIejlGWDJSTFdVRXFmZ3E5TUx0WUdBZEJV?=
 =?utf-8?B?ck1hODk3TU9zczI4UENWUm1xV0dzWGFISlNtQUVLYzUwTHFUMzhCbHpnZENZ?=
 =?utf-8?B?RDlIUHFBZWM0MmE3T2FjalZJYjVMaGtMYWx1M2dIRWFsbXRNcE8xcStxeUpS?=
 =?utf-8?B?RzZvdUFWMWx2SGs3bjR2anNmam13PT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <59F963B3DB1ED249ABCCDB5F30F0509D@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1597012d-3964-4b9f-f7c0-08d9fb8f0e0b
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Mar 2022 14:23:28.3258
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: c3teThOSoQ3SLo2G+EDlb/vazwhL9/cmC4FZWo1yw2+D3XksFMryW7UF/85D9g0ZXMM5D5mPLHJxL59/Anbe/pl6T3VpmUOF9LFtWuYVtUI=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN7PR03MB3745
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Tue Mar 01 14:24:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 14:24:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281537.479909 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3QT-0006mz-LT; Tue, 01 Mar 2022 14:24:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281537.479909; Tue, 01 Mar 2022 14:24:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3QT-0006ms-IQ; Tue, 01 Mar 2022 14:24:29 +0000
Received: by outflank-mailman (input) for mailman id 281537;
 Tue, 01 Mar 2022 14:24:28 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=YI9j=TM=citrix.com=prvs=0520bb690=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nP3QS-0006mi-AY
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 14:24:28 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4bc9197c-996b-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 15:24:26 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4bc9197c-996b-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646144666;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=xaici8cdAXimItpFNgulJa2mXejsU3sDY7hjdE8UlLQ=;
  b=QD4ZepsellU1xXKNCjnaDhoS5ZJipAalYPFYPnmv1p5thKy1OTnCPZuB
   lpsOfxq6LRNRvRaJ3fKPqMDSt5JZg9IhR/6OwFyHIMXVqTEGG6YMMvqMt
   KZiSbeoemyZgi1Gw/8J3RobF0blhv2lVTNssl5D7o4N2l/G9wHTd+nejQ
   w=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65629341
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:tQ7ICa6zI79f/CF9pXTGTwxRtCXHchMFZxGqfqrLsTDasY5as4F+v
 mEfDWrQbK2DMTHwKdt1Ot/n9E5V7ZLTnNZhQAY9rS5mHi5G8cbLO4+Ufxz6V8+wwmwvb67FA
 +E2MISowBUcFyeEzvuVGuG96yE6j8lkf5KkYAL+EnkZqTRMFWFw0XqPp8Zj2tQy2YPhWlvX0
 T/Pi5a31GGNimYc3l08s8pvmDs31BglkGpF1rCWTakjUG72zxH5PrpGTU2CByKQrr1vNvy7X
 47+IISRpQs1yfuP5uSNyd4XemVSKlLb0JPnZnB+A8BOiTAazsA+PzpS2FPxpi67hh3Q9+2dx
 umhurSZSAoAObfhg90vVjgfMyNiAohl/bjYdC3XXcy7lyUqclPpyvRqSko3IZcZ6qB8BmQmG
 f4wcW5XKErZ3qTvnez9GrIEascLdaEHOKs2vH16wC6fJvEhWZ3ZGI3B5MNC3Sd2jcdLdRrbT
 5REN2A+N0iZC/FJEgYYVqwskr33umTUYSdJuXSTj6YOsneGmWSd15CyaYGIK7RmX/59jkue4
 27L4Wn9KhUbL8CEjyqI9Gq2ge3Clj+9X5gdfJWn8tZ6jVvVwXYcYDUUX1ampfiyimalRslSb
 UcT/0ITQbMarRLxCIOnBlvh/SDC7kV0t8ds//MSwQCA463Ozh2gNG0lCR5DdOMDl8oxWml/v
 rOWpO/BCTtqubyTbHuS8LaIsD+/URQowX8+iTwsFlVcvYS6yG0npleWF4s4Tvbp5jHgMWyom
 1i3QD4Ca6L/ZCLh/4Gy5hj5jj2lvfAlpSZlt1yMDgpJAu6UDbNJhrBEC3CGtZ6sz67DFzFtW
 UTofeDEtIji6rnXyUSwrB0lRu3B2hp8GGS0baRTN5cg7S+x3HWoYJpd5jpzTG8wbJpaIWCyP
 hOK4FoAjHO2AJdMRfUsC25WI553pZUM6Py/DqyEBjawSsIZmPC7ENFGOhfLgjGFfLkEmqAjI
 5aLGftA/l5BYZmLOAGeHr9HuZdyn3hW7TqKGfjTkkT2uZLDNSX9YepUbzOzghURsfrsTPP9q
 I0EaaNnCnx3DYXDX8Ug2dVLfABScCNiXsieRg4+XrfrHzeK0VoJUpf56bggZ5Zkj+JSkOLJ9
 Wu6QUhW1Bz0gnivFOlAQioLhG/HNXqnkU8GAA==
IronPort-HdrOrdr: A9a23:2Qev1aijkG6JbpFT8WotB/UDB3BQXvMji2hC6mlwRA09TyXPrb
 HXoB19726RtN9xYgBEpTjjUJPrfZq4z/NICOYqUYtKMDOIhILKFvAB0WKB+V3d8nbFh5dgPM
 5bGsAUNDSXNzZHZK3BkWqF+rgboeVuX8qT9JzjJ9sGd3AMV0nAhT0JbDqmLg==
X-IronPort-AV: E=Sophos;i="5.90,146,1643691600"; 
   d="scan'208";a="65629341"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=PgqthP5GVfvcYFFXb0iWzUAT3RDKoD8Z2XNYajkVkXMpXffcZ2p0pcWNCjQGzFGCiyf24ceIYDOV/U3aaHo7ZVSq0rWml/7MecIew7H4ENz1mEDnUzKlmudlBs2DUVqg220/N4AsWmAUHKUaZp/JS8eiX6cgQIkgp4NcUgA8MGjhKGAa5tORZGZYApfYUm/ofZ6Wnl2fvWMAl7voAk3TIYeEZuzSBXTPRT6TX5xadT0aU/Xbbq3quROdaN8fzIMgIttE6yTclJTwpHsOEjzdtfq0xHFrQ9MKwGwTDBEughjc/ze74fFUW6pYJwktdMzF5pD+Kq75rfBGSEnmdT/wSQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=xaici8cdAXimItpFNgulJa2mXejsU3sDY7hjdE8UlLQ=;
 b=J4wbyKpoWThswLti/VQ/16UiPZPs8PZaKg1vT5ao1kp3uAwIDtX7QwJiDaAPEZF/kj8eOdP67HVWhuDi5yIgI05b/XiIeM4RRiHCu1J9XqQJmbTZy0cFV144YsYAmRFqCNL1WAyQoB2K4V3dGbajB5kjrSpgln7AN/oOwhsF87yGhTaB7lhZznfrSM2Vjo/JhvfgEWEs9Wm63BagbX56FFfblfwRGWNErG7+Cqt5r32GnQKX6WJab78rvW9ZdJvqNNBdCY2BaVArUzGvbLvyc54u22dt7N+hlrz7OvIEUvw72exSRODiB3bBFyMG4ToR58eBGZbvZDBMQ3G3r1vIkw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=xaici8cdAXimItpFNgulJa2mXejsU3sDY7hjdE8UlLQ=;
 b=HpzvPHOqNa4A3FPl6cxAcRSrdpocNJ3WctH8COgLszBn3n8LVTbgr3Z287cZNyXbI7Xc83EuO7U1/lehknpvmAsYwBX65MSjeZZ6SlpXNgW9W7w33lkB5JYVHBN75as86CJu78Wjiz8x2B4YHDL2NIdemJ+CMJw4cgKFF/XctLU=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Wei Liu <wl@xen.org>, Roger Pau Monne <roger.pau@citrix.com>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH 2/2] x86/time: add CF-clobber annotations
Thread-Topic: [PATCH 2/2] x86/time: add CF-clobber annotations
Thread-Index: AQHYLVxwam4XOlcoM0qksn/nZK0dPqyqgvIAgAAQwwCAAAGngA==
Date: Tue, 1 Mar 2022 14:24:21 +0000
Message-ID: <ae77b805-b513-7aa7-ece0-c3c7dbf662c1@citrix.com>
References: <77675e7f-2a7e-f517-4aba-e20774c8bfe5@suse.com>
 <61bbf544-74ac-b698-425a-d1db80acab43@suse.com>
 <20185a89-0a2b-6bbd-5484-31b6582ed200@citrix.com>
 <40ce913e-4388-2d2f-45e3-e725a927da92@suse.com>
In-Reply-To: <40ce913e-4388-2d2f-45e3-e725a927da92@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 80dcb7a7-b2a5-4b90-27f0-08d9fb8f2da0
x-ms-traffictypediagnostic: BN7PR03MB3745:EE_
x-microsoft-antispam-prvs: <BN7PR03MB37456EC85B1C9EF75E6DA0D2BA029@BN7PR03MB3745.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(71200400001)(6486002)(508600001)(8676002)(5660300002)(36756003)(53546011)(6506007)(54906003)(6916009)(316002)(82960400001)(91956017)(122000001)(8936002)(64756008)(66446008)(66476007)(4326008)(76116006)(66556008)(38100700002)(66946007)(6512007)(186003)(38070700005)(31686004)(86362001)(31696002)(2906002)(2616005)(83380400001)(26005)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?dWtaMklocGxqZFdZN05JZlczNHNib05COXRqNFQ3d3hXOFZ5WWh6NjBHMWkz?=
 =?utf-8?B?alVFU2tZaVZBdTFBUFMzR3plOTBNN1dYS1dQY0pSVVcycEVkQkovUjlad05T?=
 =?utf-8?B?dDMyQy9UNmJVK1NWb1orVDhqY1hDK0tMQ0REVDg5eDBIbUZiQURYYmowa1Fh?=
 =?utf-8?B?b0ZSQS95VmZ2eUVOM3IvbGFUN2dCc1JpTjREVXhrdmZTeW9MWXRkSGtPY1pM?=
 =?utf-8?B?R2M3OFlJZVdhKzB1S0QzQ3hXdm03clh3bkNGVSt6Z3Z3NDdJOFhBdDllOGo2?=
 =?utf-8?B?cTVXK21PcjlmbTlaVjcwOXNGTHBqenlsUWRYc1ZINFVnL1dFTUpMbGJJTXFX?=
 =?utf-8?B?dXZVOEViWnNNNHFUQlZFNW1VMnQ3MENUSEFKYmU5bG5jVnlzMkRLTVliVzEy?=
 =?utf-8?B?V3N3cmZrQ0grZlNISVpkZXdKK3k4b0hwaUcwRE9tUTRFbjJ5T2prb0xYeGRm?=
 =?utf-8?B?NTR2TXYrMVZCZ09HYUYzMDJjTng0VXBpMWM5Vks0cGxqdGhod2JDTmJ5NFAy?=
 =?utf-8?B?UFRyd2lsMGRhN2JtaDdQd1JNazNwUy9WMnpZNGV6aHVKSjd4WmpOc3lKQVBm?=
 =?utf-8?B?c3VRQUxTNzB5d0p2SmlJbXNwZHd3T3NPelhENEVLeVk0MlViRU1lUDV6OERH?=
 =?utf-8?B?T1BNNDg3N1orSldTbUFFUFZZa2NhOWhLcFFKdlNrU1ZBYmJKR1VjeVZ0S3J6?=
 =?utf-8?B?Zlg5bTkvVDBPdnIxS04rZjUvWFdxdElkT3VEM0RRZk5mY2xadXdVZ21jTU1Q?=
 =?utf-8?B?WS9pZzB0eThCTjIzMzFMTGpzbE9kSHRjUFR5VnBHNGxpM1hwZ3hUK3BrU0FF?=
 =?utf-8?B?WWRJeHhFZW51SVJRekFQa3cvSU50cW55MVF5Zm90UVhhL0h1VEkyWnN2aEJY?=
 =?utf-8?B?cXZQRjFya21nNTA0bnd0NEtmYXBtdEF2QXZQUWw4Y25DdVpNbWZpbW5ZTDZk?=
 =?utf-8?B?SmpoR3lBMlFuV0xlaW9mREtGNkQ1YTBzNDYyeng4alYzM0ZZcEt0VUNMRVhz?=
 =?utf-8?B?SDAvMVQrem40QUJ0QmkwaVA3dkJ5V1V3aTk3Ti9WRTRvRG9Ca1NmUFJLMTNH?=
 =?utf-8?B?bXNhUzRKWU5vbFRzU0VENkM2KzVUN1dnQlRnUUV4ZHRVTUxTWE1SSDhDejZt?=
 =?utf-8?B?SDFDT2hQQjVqYlZ0Mm5IOUhDMzN2SjFaRkxKYngwcXJHbnNNM1JpZExQMnZK?=
 =?utf-8?B?am5LS1BjY3BGKzRjaGszVlRSQm1lOFk5RkhIaU1nUjZZbG9XdmNjSkhjM0lw?=
 =?utf-8?B?ekdVUnVIdXZxYjZJSUR1WWJqWVBYS295aTg4Z09Hdjd0bk5UNVVvTUgzYU9P?=
 =?utf-8?B?TW1RQ2ViMGw1emNsWmlqTHdxdEJHRXMyWXl4MG50VVhLR0xVdmowcGpDSSti?=
 =?utf-8?B?MXltWXdIQXE4T2JVUW9OYlJQQ3M2ZHFEcTJTY1RkN3luakYydmxpWHF4ZTl3?=
 =?utf-8?B?cExER3cyS3B2cUFzNjludFFWeGNCRzN5MjZaMGpwdWVCcm5ycFZOb29FM0xI?=
 =?utf-8?B?ekhpSDNwQ1J4Tnk2NHFtcUZPT1BZTmRnRHVKRGJ5Ymt0cXNraHNTUEZ2d1JL?=
 =?utf-8?B?aEhlRGswR0VheHJlTGExMTYwSGJiaDZpMXZuemtLdkUzdS9IMzgvYkcrdkxX?=
 =?utf-8?B?R1RWamh6WVovdWVZdDVaT3BiRkNueTMwamFmK0x3RFNoY01mSTlONG1Lb3RY?=
 =?utf-8?B?SnZkR3VyNVovbVdRV2hRQTZZMmF5RjFzaDZRSk1IcjJyc2gwWEZINDh6WG1X?=
 =?utf-8?B?ajBDSS82dXo4dEkxcTBBdjFjR1NsUkFacTBDRjRPS0lTMmxGYkFrdnJvUWNO?=
 =?utf-8?B?V2xSS3lHc01pK3Y5bnBLSzE5TVorWEJCMi9HSEsrK2d2cTNBbE00NFBqaVg3?=
 =?utf-8?B?bVJpSDZTaFZ0cisxQTNhODRKUjNJYzkvNmxYZVFhS21CR3ZEaTRzZDdwOXBU?=
 =?utf-8?B?ckJCUkFXYXlQZ2N2N3hZdlhYbkZ4alp5TWJMbjAvWjVWNDJWVkovUzZDSzcy?=
 =?utf-8?B?WWFCeHlkQ05mQi9zNkEwS0V2TmJHTTJMdEhGejJnZU8raFkrVEJVbUw1Vk8r?=
 =?utf-8?B?TC9tSjJLLzNRM3phd1pLZjZ6ODEzQWFFekNWUlE4UDdvRWUzT3k0cy9vaWZG?=
 =?utf-8?B?MmJoRE9MQWptQ0twQ0d5YkJSNlBScGd0YUxNS2dzZ3pHWHdMeGNUTkJZamlK?=
 =?utf-8?B?V1JCWG5zNm9qQkJGaTBldlIwYUdSZjl6ZUNkcEYzcTE3L1lIMk1OMFgwRmJs?=
 =?utf-8?B?bnBpd0l6MHd3ZVNVNUJ4UXZIanJ3PT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <F163A10779CFCE40A0434A5B2CF8BEA1@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 80dcb7a7-b2a5-4b90-27f0-08d9fb8f2da0
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Mar 2022 14:24:21.3220
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: JzGguSLShiN9jBOvWi2w8vitgSPvh0LMb6yzaUJRTsdnOHtdSkez2Q3H9ZkCrXimxlEOF7eT8Ymz1SNDdLllAttk38HY729P90l+A+HTUX4=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN7PR03MB3745
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Tue Mar 01 14:35:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 14:35:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281545.479920 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3b0-0008Tu-M9; Tue, 01 Mar 2022 14:35:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281545.479920; Tue, 01 Mar 2022 14:35:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3b0-0008Tn-J6; Tue, 01 Mar 2022 14:35:22 +0000
Received: by outflank-mailman (input) for mailman id 281545;
 Tue, 01 Mar 2022 14:35:21 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=YI9j=TM=citrix.com=prvs=0520bb690=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nP3az-0008Tg-Ep
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 14:35:21 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id d1066318-996c-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 15:35:20 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d1066318-996c-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646145319;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=RIry1fOwgDOAhhdNZBm4dA+nFybFDJJ02i51Nkot6Mw=;
  b=SYSvDnzSAHisyHGZ9ap3QYX1jONDJBbN0U8QSBQH2WsEm1IlfG7xxafj
   Cm8TWIA/lXf9Hd/8dkiuRvmq6U49Mx0yGlMqxwCs0ozRCAvwBi48ENjCC
   Z0IqrLpfIuO+87Kve3bmvwdALtLsB7ANHliD19JHgqqm4MmW72QfStJ+M
   I=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65122601
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:6ZJvbaJxeUIXCfTXFE+RzJUlxSXFcZb7ZxGr2PjKsXjdYENS1DVTz
 GAeC2zTa/fYZ2ejct9/adnn/U4DsJWGz4cxSFBlqX01Q3x08seUXt7xwmUcns+xwm8vaGo9s
 q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUYYoAQgsA148IMsdoUg7wbRh2dYx2YLR7z6l4
 rseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3fMldG0DQUIhMdtNWc
 s6YpF2PEsE1yD92Yj+tuu6TnkTn2dc+NyDW4pZdc/DKbhSvOkXee0v0XRYRQR4/ttmHozx+4
 Mlxj5iCexVyAvHFveIZehcGIWZxBbITrdcrIVDn2SCS50jPcn+qyPRyFkAme4Yf/46bA0kXq
 6ZecmpUKEne2aTmm9pXScE17ignBODtMJkSpTdLyjbBAOx9aZvCX7/L9ZlT2zJYasVmQ6uHP
 ZBHMWMHgBLoOSUWKlhHN60Hl9yMnGOjQmcfpn/OnP9ii4TU5FMoi+W8WDbPQfSaSMMQkkuGq
 2bu+2XiHgpcJNGZ0SCC8H+nmqnIhyyTcJ0WPK218LhtmlL77m4ZBQASVFC7ieKkkUP4UNVaQ
 3H44QJ38/J0rhbyCICgAVvo+xZooyLwRfJML9c+2jOfkZaI6iOfAkEKEAwGZ+Q54ZpeqSMR6
 neFmNbgBDpKubKTSG6A+rr8kQ5eKRT5PkdZO3ZaEFJtD83L5dhq00mRFooL/Lud04WtcQwc1
 Qxmu8TXa187qccQn5u28lnc695HjsiYF1Vljuk7s4/M0++YWGJHT9HwgbQ4xawZRGp8crVnl
 CJc8yR5xLpTZaxhbATXHI0w8EiBvp5pygH0j191BIUG/D+w4XOldo04yGggeBkxbZ1aJWawO
 R67VeZtCHl7ZiDCgUhfOd/ZNijX5fK4SYSNug78NLKinaSdhCfYpXozNCZ8LkjmkVQ2kLFXB
 HtoWZ3EMJruMow+lGDeb75EidcDn3lirUuOFcGT50n2itK2OS/KIYrpxXPTN4jVGovf+16Lm
 zueXuPXoyhivBrWOXGGodZOdglRdRDWx/ne8qRqSwJKGSI/cEkJAP7N27IxPYtjmqVejODT+
 X+hHERfzTLCabfvc21mtlgLhGvTYKtC
IronPort-HdrOrdr: A9a23:lvUFNKwThFY8ND8YH9CJKrPxguskLtp133Aq2lEZdPULSKOlfp
 GV8MjziyWYtN9IYgBcpTiBUJPwJE81bfZOkMYs1MSZLXXbUQyTXc9fBOrZsnHd8kjFmNK1up
 0QCpSWZOeAbmSSyPyKmjVQcOxQgeVvkprY/ds2pk0FJWoBCsFdBkVCe32m+yVNNVJ77PECZf
 6hD7981lydkAMsH6OG7xc+Lor+juyOsKijTQ8NBhYh5gXLpyiv8qTGHx+R2Qpbey9TwJ85mF
 K10zDR1+GGibWW2xXc32jc49B9g9360OZOA8SKl4w8NijssAC1f45sMofy/wzd4dvfqmrCou
 O85yvIDP4DrE85uVvF5ycF7jOQlQrGLUWSkGNwz0GT+fARDwhKdPapzbgpDCcxrXBQ5u2UmZ
 g7r15w/fBsfGL9tTW46N7SWx5wkE2o5XIkjO4IlnRaFZATcblLsOUkjQho+bo7bWvHAbocYa
 FT5QDnlYJrWELfa2qcsnhkwdSqUHh2FhCaQlIassjQ1zRNhnh2w0YR2cRaxx47hd8AYogB4/
 6BPrVjlblIQMNTZaVhBP0ZSc/yDmDWWxrDPG+bPFyiHqAaPHDGrYLx/dwOlauXUY1NyIF3lI
 XKUVteu2J3c0XyCdeW1JkO6RzJSHXVZ0Wa9iif3ekPhlTRfsuYDcTYciFcryKJmYRrPvHm
X-IronPort-AV: E=Sophos;i="5.90,146,1643691600"; 
   d="scan'208";a="65122601"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Ud0D7KWKwR5HreP7O4N3VXBGd/tNEok3yj2fthRAwtl67+Fh9YMFcmVa1HSgy2wp+wPXrSy2IL3tgfAf/aifUCyLjCRZt97ghZHRPECqmzJVqdpNrSEsAd/bzfLEsrbxnFuWzAXT5otdJDFwBUHM7uvZIyK8WQoVISExkzoV3S1CwdYp+SX1fp5GAJ8DjKA8Ylf8wvEMRpC1qw6HlzXxjaEHOxj+ZY/hvfjqXInhOMpkl21Ly3LlwAxYirhGIgKF28qK3gFroWKFE/D3jKHGDieHv7jZJDlNtBu0rHhyAK0pwlYPcdWkQvjQPS2TlT6761/iGENKojlJi5JDtxCLSg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=RIry1fOwgDOAhhdNZBm4dA+nFybFDJJ02i51Nkot6Mw=;
 b=inQN0SYw0XGZ/EJ+uJwgnROxfWQNx5khB3N0e/wt/ClR335+lxZ+DFGYctOi8yFd8TLmo+LupS9QE0brkFiJhIT+HeUwvZF21VStFE/oSIrlZPyFyoCs7lnVWj3J8w0BJdsXw2Lhk8KVbR5oWkM5CwFhqQmX5tf5rSQsfk5ptNU8KHbY51NBAZPUI3hNATgDr7XXqdXBfAS2MyEj6t+Nf94YTdNQiLcZq3aOeuIqKPtqqyn5BdJr5sfyF8LAW2nm8y7a/MTW4Cd/O4L+FLREtsbS8+e0ZOTcIJozHtvkVibbfYhbyo+WW1+fW+c74flJvHSTq8kHE6HDUwjPd8iT8Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=RIry1fOwgDOAhhdNZBm4dA+nFybFDJJ02i51Nkot6Mw=;
 b=tJKkDYODkdKA3OgIBmNn76aJY3Vija9AaAFaw0h8yInYWPKn62zGlORpu5JVEYI8z/7UhGw1L3ol49SK9iukFRKlTR6zJVtWOWWz6TY54Qgo3g8zHVeohHSwKxh2uCLXfVbLR5INQGsqh882Yy8HSezWm2GD3J+pKk3AxPMsK/I=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Wei Liu <wl@xen.org>, Roger Pau Monne <roger.pau@citrix.com>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH 2/2] x86/time: add CF-clobber annotations
Thread-Topic: [PATCH 2/2] x86/time: add CF-clobber annotations
Thread-Index: AQHYLVxwam4XOlcoM0qksn/nZK0dPqyqgvIAgAAQwwCAAAGngIAAAwqA
Date: Tue, 1 Mar 2022 14:35:14 +0000
Message-ID: <bbc32813-74a2-f5c3-d616-e5fcdeffcd10@citrix.com>
References: <77675e7f-2a7e-f517-4aba-e20774c8bfe5@suse.com>
 <61bbf544-74ac-b698-425a-d1db80acab43@suse.com>
 <20185a89-0a2b-6bbd-5484-31b6582ed200@citrix.com>
 <40ce913e-4388-2d2f-45e3-e725a927da92@suse.com>
 <ae77b805-b513-7aa7-ece0-c3c7dbf662c1@citrix.com>
In-Reply-To: <ae77b805-b513-7aa7-ece0-c3c7dbf662c1@citrix.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: caf351aa-73e9-4045-22af-08d9fb90b2d8
x-ms-traffictypediagnostic: MW4PR03MB6458:EE_
x-microsoft-antispam-prvs: <MW4PR03MB64589CD27BAC44B6BB8EEB4FBA029@MW4PR03MB6458.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: IZ8lP/gkC+nzp44go3t55jDzTK1nt0qUd8e4l+SsApbmEqn6bLdCqg3pXqG/hMMXeTN4SIPaZHiHrrRn8bowdxbWslljP8JjKsxXxURMm10jpluVEbLuIuogyVwXlSkMEVWMcmw06tMLMj3CFCx8LB7vTOb/xchQ8QzcebQY3IGz1/9CWH+mfbyrH8MmQJXpC5XU4HcAs4ex/192F0P0RsYMtZTfB/dv438nnAY1c+OMH3MQRUM81Y8X7cAlwFpvQGR9JPpuh6onGDq3/H/pSYZI0fE8M2XvflwnkqSCliGwBr2v+bZKsq6xUga50JaEOjpo++XqYJRwEgT0CLr+csifUKuoCi9pNRfNk+2YOnIFBZC6mimXyVW7+T88CHld7pRp0ILCeQKdr3CETP3DWSjjq6IMJcFvzZD6zuqWfCUEdX/73TGXlbgco+Pgy6dfNqHzjWlD31aAn90KVj1Vox7q/JDS/h6LMlTWKIgcSiLkmNyQLb7TAEvdmxY8DNBFbeGby1wu/9yTeXYNexM9RajW2pRCEkg2/Q+jg/NaaABm5R/sd9Vg30PmNbF7N/StCBjefF+5E38Ku2cywEhWe6ask5FrQNBhM/G6vLe173wbPjI/eCS3VlmSa5mlB16QmzuU6Pfo7Wu7er8bux3pOzD38mFvugYzQZBkmOxxIbnm+VVMycuvymBTbnDm0tBWvKqVjFzFzE9bA/alrSMwhOUeEPs2NYy0f/O/hYfkHs6x0RPTI9CiPxv+vHh1oLPSPbtoexzBUSD72tuuPZ5xkA==
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(508600001)(38100700002)(2906002)(76116006)(71200400001)(26005)(5660300002)(8936002)(83380400001)(31686004)(186003)(6512007)(36756003)(2616005)(6506007)(53546011)(6916009)(54906003)(4326008)(8676002)(66556008)(66946007)(91956017)(66476007)(66446008)(64756008)(122000001)(38070700005)(86362001)(31696002)(6486002)(316002)(82960400001)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?Z3hBODZrSGdKYTFGZkZxaGE2M2c4eDZ4Rjl3S2hyd1NEbHZOdStXbDBBSEJV?=
 =?utf-8?B?UzQzSEJnOXhRZURUMVBjRTh6cXc1Zk1leER6dHY5cG9TMmJLZWNjalBDb01T?=
 =?utf-8?B?MkYyeVRCckFYT1IvTEVtWnA5M0w2anlYc2lQY3RwUG4zdFJkTFhVQlVjUkxX?=
 =?utf-8?B?SnU5dWFvdlhmWFV4SEhYOVA2cEpyajJQSmVUTUNVTHpUeWhlTTM1bVRmaWFq?=
 =?utf-8?B?ZllOUFNyQ3o2c3RGUStJWjZiU2lUT2N2WGVVZFVLUlNzdEM4L3pBcFF5UXha?=
 =?utf-8?B?eGw4OEcvTGdkVUVpaW4rNlpWTjdKZUgxcEM5MkNYL2pTUTVQc1VHeFJNemNF?=
 =?utf-8?B?ODVEUGd0TkRzMldXa0FXOVZTaWhEd1JoUlhiYkRzOW5FVzc2VmRkSXV6K2pU?=
 =?utf-8?B?OXlPUmx5eWVHbXlpVEcxcktnZGh4S0g3Q0MvcWtIYVV5dmF3SGcxY1lwS1E1?=
 =?utf-8?B?TWhpMVpueHp0bTg5ZVpNcnhmOE0wYmRGcFJ4NXVkZlh6Uk80eFpIakxGVGlo?=
 =?utf-8?B?eTVoa1BWOUI5VXcwYTQrc2N4ZEh6MkpuNVZDbnNkazNhaThTdm9IWUdoRkhx?=
 =?utf-8?B?OVZmSUkvWlkycjZ0ZW5WSzJ5THR0cHdiV2gwK1o2a3praXFRV2NIa2VYeXox?=
 =?utf-8?B?YWcyajl0aG0zREFqVkk2WXR0bFZCQ1V2KzRBcWtmR0Z0ajM2SDdFNTZJWmZl?=
 =?utf-8?B?Ris2R1kyYW1udnRseTR4UXZYN1VTT2txZzBNSVBIa0Fia1RhZEF2REVjb3Bo?=
 =?utf-8?B?TnNvUW45N2xaRzJpaHhkbmJiSEcrTCtIMzBlcXFSS3gySEtJMjBnTVVtRmFN?=
 =?utf-8?B?SnpDWCtlRmJ0UVRhSWtrMGdvRG5YWi9nRTByVkNvMldqWExmaE1KQzhIL2dH?=
 =?utf-8?B?TGNBQmF1OHI4V1VPQWRnNkQ0YlhFalI1MzVlY3ZWeWhYdVA0b09YdE5Ddnlv?=
 =?utf-8?B?UkNKSGMvZkFlenJKV2JMVHdkT0luRmd6TTFYVWNCLzZrVTFaMkZsS3F3VzNE?=
 =?utf-8?B?UUg1Sm43ZVRWSVVtdmt5ZmJQYTViZG5rb2sxQW9RYzlkTHFKYytveTdBWE96?=
 =?utf-8?B?Sy9PN3hGUUR1WTErOHNMdnFQTGZycWlGNllrTjhmSisza3pzNUR3MTJYQTBQ?=
 =?utf-8?B?dmhUeDUweDYzSVJjcWgrbFc1bUZhZkZ3Q3lETnZVYm1FZU1lZHYxMUM4ZGN6?=
 =?utf-8?B?WnJwaGRMdis5Y0VQZXAyaFdJQTJhT3k0RTlzVUVtTkMyQi9rWjNteFRUR3VE?=
 =?utf-8?B?U0xZZmxGWmlBVVNPL0o1ZGFPZXhOYVFvN0xRUlNLbVJobHc1MTVWcWtoL29K?=
 =?utf-8?B?RWNLbStwcElQUk9rN3g5MkE3Y0dkcFdCUHBZVW56MDFuNVA5eUNHd3NSVUEv?=
 =?utf-8?B?cnVxQkdrOVFKOHVUVElvSWFUWlF3QllDRlBuWk9DWGt5VGllK2czbVFsYm03?=
 =?utf-8?B?NkY1L2lKb0lzY0J3WEVTNTdub0RxN3VDUkU5aHVBZThRV2hsK1ZxTHo1dzl5?=
 =?utf-8?B?d0Z5b0hlV1ZYL21kNWpxYVlCMStSd3pyRU1NYVhhVjYwL3lSMktmUXFBTTJj?=
 =?utf-8?B?aHNJZ0VaOThtYzUzYk9oeGNhL0U3RUx1ZUdjNlFTRjhNYXB6V2R0bXBRWVNE?=
 =?utf-8?B?U2JsTisvNnplQnlOdUZxRjB4c3o2S0g0RTdFTEh2T09rVUdUamFsU0FuZDNK?=
 =?utf-8?B?Uk5hWU4vN09CaW9JS28vYi9wMGZVWDFmcmR6V0FsODZTb3luV2dPWnJocFFi?=
 =?utf-8?B?ZXpWWklVNk1DMkFyd0lzSDlxUTJsbDJFUGN0SGJQcVNtakR0TldGREZ0V2dk?=
 =?utf-8?B?NnRIaENydWUvbjMyNFFYL3ZUcnpOS2dLQ3FmelhMR1hNR1h2VlZ5elRVbVRa?=
 =?utf-8?B?WXVaS2hwWjBPS0tsbUdhTlFJQXMwaXZzTUVsbUpRcStHWGhZRGFWdG1ETUpq?=
 =?utf-8?B?MGNsV1dqTGU4M0RMTktXNXNpTGhLT25EdTNYMGY1TXVEVmk2VTVpWjBwc3I3?=
 =?utf-8?B?SytHS0RFbm9VUEZNYVdiSGxLRFNya3ZuaVp0RkZJT1RHbkF0dWlCb2s5MUVm?=
 =?utf-8?B?UkFLd1RHbVlqUnpaOHBUc29yNTV5RmJsWmlXVWIvY2p0ck1VanJWa3dGYlNI?=
 =?utf-8?B?OXR0MkJUVDcybjR0S04vVmM5UFlKeW91elBwT2d0RlBuamhDZ3I0Y1BscTlB?=
 =?utf-8?B?UFlMeTF0aEJFZDQrc3RNcldTbU05ektuL2xMS2UyYytpdGptUWZCd2Q3SXZj?=
 =?utf-8?B?a2JNNHl4QVRaeVNldkJ0M2VjaTJnPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <4E824280FC02FB4F842E6FA8106318B5@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: caf351aa-73e9-4045-22af-08d9fb90b2d8
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Mar 2022 14:35:14.2913
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: OcudNISJxXkB7A2HyM0KSabOTgLqaZ96zfIN4X9RCyef7juu9jkwnR8X/Jmm9y2Z3MxTK2OVyWDhXcDGusl4Lj0+YEYCsBJTHWd5hC54TBo=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW4PR03MB6458
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Tue Mar 01 14:39:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 14:39:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281554.479931 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3ek-0000tw-C5; Tue, 01 Mar 2022 14:39:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281554.479931; Tue, 01 Mar 2022 14:39:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3ek-0000tp-8l; Tue, 01 Mar 2022 14:39:14 +0000
Received: by outflank-mailman (input) for mailman id 281554;
 Tue, 01 Mar 2022 14:39:12 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=YI9j=TM=citrix.com=prvs=0520bb690=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nP3ei-0000tj-Gz
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 14:39:12 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 5ac5d9aa-996d-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 15:39:11 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5ac5d9aa-996d-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646145551;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=b3ie2UdnaGhAvEeedo3V4gsmdguE8rT330zB2Ok0ack=;
  b=Pd9SdvNWS4+IZLJU1Eji7R2MhQ3YhZU0Oi24WTungNGLJAEm/kWGbBO6
   KSrXtAqmODygQSek6UkRSUv9Ee/VXJcVcdRBz2OVNfWV3Ki87WZ6hcH40
   aZWxC3AjdoBo1b+DFhEzStlrQ7lsvvym8g/lvqhhoQ6g9v8P+k6egN0yi
   U=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65630726
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:qhmNxqLpf3TRDE6+FE+RzJUlxSXFcZb7ZxGr2PjKsXjdYENShTMDx
 2QaXW2FOv+CZDPxfdgnborn9hhT7JXUz4dkGQBlqX01Q3x08seUXt7xwmUcns+xwm8vaGo9s
 q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUYYoAQgsA148IMsdoUg7wbRh2dYx2YLR7z6l4
 rseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3fMldG0DQUIhMdtNWc
 s6YpF2PEsE1yD92Yj+tuu6TnkTn2dc+NyDW4pZdc/DKbhSvOkXee0v0XRYRQR4/ttmHozx+4
 NZ3mbzpUjoxBK3dv9kXckdkTBBXY5QTrdcrIVDn2SCS50jPcn+qyPRyFkAme4Yf/46bA0kXq
 6ZecmpUKEne2aTmm9pXScE17ignBODtMJkSpTdLyjbBAOx9aZvCX7/L9ZlT2zJYasVmQ6uAP
 JJGM2QHgBLoeS0Vak4ILs8HzOai3XmlWCZciF3Luv9ii4TU5FMoi+W8WDbPQfSaSMMQkkuGq
 2bu+2XiHgpcJNGZ0SCC8H+nmqnIhyyTcJ0WPK218LhtmlL77m4ZBQASVFC7ieKkkUP4UNVaQ
 3H44QJ38/J0rhbyCICgAVvo+xZooyLwRfJTKcEasRqw0pDU8iGkDElacmFwQYIf4ZpeqSMR6
 neFmNbgBDpKubKTSG6A+rr8kQ5eKRT5PkdZO3ZaEFJtD83L5dhq00mRFooL/Lud04WtcQwc1
 Qxmu8TXa187qccQn5u28lnc695HjsiYF1Vljuk7s4/M0++YWGJHT9HwgbQ4xawZRGp8crVnl
 CJc8yR5xLpTZaxhbATXHI0w8EiBvp5pygH0j191BIUG/D+w4XOldo04yGggeBkxbZ1aJWawO
 R67VeZtCHl7ZiDCgUhfOd/ZNijX5fK4SYSNug78NLKinaSdhCfYpXozNCZ8LkjmkVQ2kLFXB
 HtoWZ3EMJruMow+lGDeb75EidcDn3lirUuOFcGT50n2itK2OS/KIYrpxXPTN4jVGovf+16Lm
 zueXuPXoyhivBrWOXGGodZOdglRdRDWx/ne8qRqSwJKGSI/cEkJAP7N27IxPYtjmqVejODT+
 X+hHERfzTLCabfvcm1mtlgLhGvTYKtC
IronPort-HdrOrdr: A9a23:f5xLy67MDRuvAXIfvwPXwWaBI+orL9Y04lQ7vn2ZFiY7TiXIra
 yTdaoguCMc0AxhJU3Jmbi7Scy9qeu1z+873WBjB8bfYOCAghrnEGgC1/qv/9SEIUPDH4FmpN
 5dmsRFeb7N5B1B/LzHCWqDYpcdKbu8gdiVbI7lph8HJ2ALV0gj1XYDNu/yKDwseOAsP+tcKH
 Po3Lsgm9PWQwVxUi3UPAhmY8Hz4/nw0L72ax8PABAqrCOUiymz1bL8Gx+Emj8DTjJm294ZgC
 j4uj28wp/mn+Cwyxfa2WOWxY9RgsHdxtxKA9HJotQJKw/rlh2jaO1aKv6/VXEO0aOSAWQR4Z
 3xSiQbToNOArTqDyeISC7WqkzdOfAVmibfIBGj8CPeSIfCNU0H4oJ69Pxkm13imhAdVZhHod
 J2NyjyjesnMTrQ2Cv6/NTGTBdsiw69pmcji/caizhFXZIZc6I5l/1VwKp5KuZIIMvB0vFuLA
 CuNrCp2N9GNVeBK3zJtGhmx9KhGnw1AxedW0AH/siYySJfknx1x1YRgJV3pAZMyLstD51fo+
 jUOKVhk79DCscQcKJmHe8EBc+6EHbETx7AOH+bZV7nCKYEMXTQrIOf2sR+2Mi6PJgTiJcikp
 XIV11V8WY0ZkL1EMWLmIZG9xjcKV/NKwgFCvsukKSRloeMNoYDaxfzO2zGu/HQ1skiPg==
X-IronPort-AV: E=Sophos;i="5.90,146,1643691600"; 
   d="scan'208";a="65630726"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=FY1goSWaN1VXKrBdtDqTdE36jKjl6aXxJcNELr9cLA61tiKcAslyEgkCJd8oE9U9O/AVMfM+/rZRbVwvNAJNa38gQpEuknnp7bwd3CjGbtvI79uDNJkuEA0aCTcXcMS3RLxGbrAAR46Z9ZKGNMNRjlDexc8Rkpmjy0YNh6IXnCY/MUNdMYSNKlvhdgiMB2wTR4acu148t5RuiX5ExG/Z/J8q9blDFzCymXn+96THJiLBmYs3MRWX7BONmo5hdrjfvrimY/gVJ3bd2S0T/AFi0BsXoO1614mLuVnq7kLbsX4ISOKHZ3JULhkIShSO069Lz26jJj0wGU1ZMLzzKGXzwQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=b3ie2UdnaGhAvEeedo3V4gsmdguE8rT330zB2Ok0ack=;
 b=Af0pHpeUYtQ8Esxow0JJJj9+RflSvSwr2bZ9YF0dj0syYH1gSCWvsEHW5LsaAJ8SwmkCzuuVSIu5DfJOS1KjK0dQGIaKt/qF9fEFeQbktmDEznzNNELA7AqnnLiLpHCJdu2sfQKpGXtYGXBk72hY7vvaE+Pz/L1I1dZpBjVFent4dCmEJVBJgANVIs65HLykxJZ5D0UHC9VOT5uz5rdn368I9101OYhuqNwg43lwrzWfhofbuJnOSaHX6hUIVagK6IU8zf3npi7kNTr4oiYRzX6QNAodIcktAS58Hxg+Pm6FhG0F4uWmBWAVV6uSbxQ+Z1hKdS0uQ+fFMZqu21vx3g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=b3ie2UdnaGhAvEeedo3V4gsmdguE8rT330zB2Ok0ack=;
 b=Q76YW8dvEDJ8mmxvk8NZzmelJwwXKnYavWYUTGQuZ+UKvTWoAexMW7qLspuP2SLSUIvU8VOVWACOzdRAR39+VkyR1cVBGDfUPxy93HU44y7ikg/FGpjKCYumnXEaO+MgXc7cV7f5McdJiEUZqroJ+kFLtnlclHm+o3RJP3vz8oQ=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Wei Liu <wl@xen.org>, Roger Pau Monne <roger.pau@citrix.com>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH 1/2] x86/time: use fake read_tsc()
Thread-Topic: [PATCH 1/2] x86/time: use fake read_tsc()
Thread-Index: AQHYLVxVKor9YtEUbkuWag9T3yUcNqyqf+CAgAAS0gCAAAbHAA==
Date: Tue, 1 Mar 2022 14:39:05 +0000
Message-ID: <ea46555b-6ab3-620c-0937-401f6335b842@citrix.com>
References: <77675e7f-2a7e-f517-4aba-e20774c8bfe5@suse.com>
 <f4f0e92c-9586-e021-6ad5-718628f88fcd@suse.com>
 <d1c3822e-bec1-d8ca-8954-a4942f5bb23c@citrix.com>
 <2c3bb06d-e4f4-33d8-7972-71dc7d61c554@suse.com>
In-Reply-To: <2c3bb06d-e4f4-33d8-7972-71dc7d61c554@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b8fbfac8-3e4b-4ca1-62de-08d9fb913ca4
x-ms-traffictypediagnostic: BN6PR03MB2467:EE_
x-microsoft-antispam-prvs: <BN6PR03MB2467DDF4C4A4581034D1A71DBA029@BN6PR03MB2467.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(82960400001)(186003)(122000001)(26005)(38100700002)(38070700005)(36756003)(4744005)(6916009)(6512007)(31686004)(2906002)(66556008)(6486002)(66446008)(31696002)(8676002)(4326008)(64756008)(66946007)(53546011)(83380400001)(508600001)(91956017)(76116006)(2616005)(86362001)(54906003)(5660300002)(6506007)(71200400001)(316002)(8936002)(66476007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?dUc1UVFtaHIxQTRZcC9BOXM1bWgrZWtCa3pDR0xIZlhZeDcwZkd4dHVJYXlO?=
 =?utf-8?B?WE9nalBERzNVRUFOMDZCVFkzUjNKQy9EY20vZnFPY0ZIYXIrT1pCVGtSMmNY?=
 =?utf-8?B?akNNbUNYRTZ4aUlFSzBGUGdORFgwQ0pWZlpJaTlPMk5NS3FWVlh2a3ZKSzV3?=
 =?utf-8?B?ZVZZNUxXOFNiZmgxS3lGVEh0Y2YyS29oYVB0Y0xKdXBHYjJidjlCWENWZGt6?=
 =?utf-8?B?dDZ3SWNFaGRSSkxiMVNwWGZnNFVmTklQY0QzVE9hQXZvMGJUcFdQb3JXc05o?=
 =?utf-8?B?aGx0cWhQR1EzSWVJSktMRGRKdUsrbVRmcTFaN3ZuUEl4akdIR212TUhzdUpr?=
 =?utf-8?B?NEJRWVF2RlBkVWtxMTU1KzZCUENtMjJDNnBPNjQ3WGhka3RnR2l5aW1WdmZ3?=
 =?utf-8?B?c0tWYldQdlRpSzE3TGt4QXBHYnJKeWRqc0h6ZzRpMlhFSTV5K3BwVjZxajV0?=
 =?utf-8?B?ZENhK0pVT2ppVDR0bWpKWm81WUtIM1Z6YVJWMGw1eHpjYmErY0FOWGRnVHV2?=
 =?utf-8?B?YWNqUVdiTGUzZW92ejF5VTJJemVMNmJrMDFZYXJHai9xcC91ZmZ4Zi9RY3h1?=
 =?utf-8?B?WER0SWF4V2I0NXlYZjBGbE1kbTJQNVpsMzNkNkJ6YnoxeVlGekxDM3hkajJH?=
 =?utf-8?B?MzlkSWNRYkZ0SVF6ZFNCbVRNbFpiMVNtVFhxREJEaEtRSC9yM0NQd3RmZzdn?=
 =?utf-8?B?eW5xb1cvd0xIeTBZQWc0Qm9zY3k1NkdLa0t3anZlVjc5L1h3Q3ByTHJEV3B0?=
 =?utf-8?B?bFgvb2NhU3lWblc2bHhWZHJiV0NaZFFGeUlMZ1hTUFFFeVk3QkxOZ0JzckRX?=
 =?utf-8?B?YWJPa0pHRWltNXdkdWZuNm95cjc4NzAzRk0zRHV2K204clVYNzhubVRPV1FR?=
 =?utf-8?B?dVp6QXJYdkxNdjB6TVd2YjZIZDJOYStKUDBUSG5oMmkzOGpvRk9lYmFhODV0?=
 =?utf-8?B?Y3M5UnN6UW1ZTHI0bWtJOFJaMXJvYjc2cFFUcnhWeFk1azRyU2lNTG5wL2J6?=
 =?utf-8?B?UjZRY1lPU0Uybk5rR0hlODNHNFpkSkVwdzZGOXZSMTBFUDJDSlduUFE3Z0du?=
 =?utf-8?B?b0xoaTZ0MlBRdUIyUTMyS0d6V2VnMmoxckpoR3pRc09Pc1p1UEVuNlJHN2lB?=
 =?utf-8?B?RWhUdWpVeFN6cEd5UmtRclh1NVBDZGpaL3hQaXVtZVBmdjhranBCTlBIb2ZM?=
 =?utf-8?B?dU5VSk9Md0t5cENyUEFhekxUamJrMHVjcERKb09QR2ZJSlJHMzM4Ti83ZnhC?=
 =?utf-8?B?UmZSQ3pDMklWSXFsUkc3SjdXdWVlTFY3aUcrSEVyUkJJNWFmUmtpalFydnJJ?=
 =?utf-8?B?cElVSWlTdHdVUUxRODZJNEJidzR5QXJVeExCYy9WQWVlMUhKY0kxOG1SVXNT?=
 =?utf-8?B?Sy9qWlExM3g4dWR3RmtGQ3pRRFY2VmlWQ2V4VG5TUnNMQ2dFRTFjYW9GOGc0?=
 =?utf-8?B?RFVTSXZvbTBOdWFSSFlQbkxSQUlVMEtzekFEdkIzUEk4NXI5OGljVWRFc0xX?=
 =?utf-8?B?YnRYTlNkWjY0ZG1kSkdPT3llK1d4cnk1bllRekJpM2VLZWhYL0swL2E0dVVX?=
 =?utf-8?B?UTh4N2FGaTZ0UFp3NEdCc0RTaU1BTHEyWVR5dkFsSnFhbWRVUHF3eXVEbVow?=
 =?utf-8?B?YXRuOWkrRXlGcU9WeHUzcUVPVnlGVjNEeEFSYjdhMFg3N2lBanBNeklpK3o5?=
 =?utf-8?B?UWg0ZXQvZVJydjZJYnBjS3ZseldBR2NTREFXNnhWc3h2VFlGK0VJa3lBT3pr?=
 =?utf-8?B?SUhOcGorZTlRSmxqaEVFNTArRzR0Z24zSHdLSEkxajlRZkpiKzlxMDQ4QllQ?=
 =?utf-8?B?QURTV0pjMDFyRTRLSzVGVEFkVmk0WlBVRlp5aFhsNGkxZnY0dElzWllDK0Fk?=
 =?utf-8?B?bWF6cjE2MzBoeVhkeGlxZ1pGemIvejA3cEM3VGMxaU83TGRnb3VrN2c5SSt6?=
 =?utf-8?B?ZWozaVBab3M2VHEvV2h5cGVBR2NVN1JqKzV3ZVNobmVRa1VMU2hoeDJVbmNh?=
 =?utf-8?B?WWVweDdHT29ZODZNSlVLMzlvblRZNDFlcmZLMnBKZUZDN0FDVmJodDZ0YXB0?=
 =?utf-8?B?bGw3NEd3K3p3dXEvVlA0V1lMZUVjUmhJQWlta0p6USttRjFuaVB5ZWprRUhF?=
 =?utf-8?B?dUlCRDZjVHdVdmNYK0JCZ2dDSW5vU3hwNFdNajJkVUZqSW1WSDVMbmxVKy9r?=
 =?utf-8?B?blpoTmdweVBZVC8rK3g5N0hlenU0c3F6OTR3M3JVTHRjNkhuWFNyRWZNazlM?=
 =?utf-8?B?SE41NUpybDljbW9DQjg3K2t6RmRRPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <8D2398779606C241A6E866C697B2D6E0@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b8fbfac8-3e4b-4ca1-62de-08d9fb913ca4
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Mar 2022 14:39:05.4934
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: rFrlNSiqOK5yr0xZJoPeu/VAJ7KqKZ4GuEjTQgWCKo1FevH2zIkT0ibfG+wRZaqC7s7bNszx1zQ09Ks/sXJL+o22tA4lbBuuh3VPL1m3Hu4=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR03MB2467
X-OriginatorOrg: citrix.com

T24gMDEvMDMvMjAyMiAxNDoxNCwgSmFuIEJldWxpY2ggd3JvdGU6DQo+IE9uIDAxLjAzLjIwMjIg
MTQ6MDcsIEFuZHJldyBDb29wZXIgd3JvdGU6DQo+PiBPbiAwMS8wMy8yMDIyIDExOjA1LCBKYW4g
QmV1bGljaCB3cm90ZToNCj4+IFRoYXQgc2FpZC4uLiB3aGF0J3Mgd3JvbmcgYSBwbGFpbiBOVUxM
P8KgIEkgY2FuJ3Qgc2VlIGFueSBuZWVkIGZvciBhDQo+PiBtYWdpYyBjb25zdGFudCBoZXJlLg0K
PiBBcmUgeW91IGZhbmN5aW5nIGFuIFhTQSBmb3IgYSBjYWxsIHRocm91Z2ggTlVMTCBpbiBQViBn
dWVzdCBjb250ZXh0Pw0KDQpXaHkgZG8geW91IHRoaW5rIHRoYXQgYSByaXNrP8KgIE9ubHkgbm9u
LU5VTEwgZnVuY3Rpb24gcG9pbnRlcnMgYXJlDQpmb2xsb3dlZCwgYW5kIGFsdGNhbGwgcmVzb2x2
ZXMgc2FmZWx5IGlmIHRoZSBwb2ludGVyIGlzIHN0aWxsIE5VTEwuDQoNCkFuZCBvbiB0aGF0IHN1
YmplY3QsIGRvbid0IHdlIG5vdCBoaXQgdGhlIGFsdGNhbGwncyBCVUdfT04oKSBmb3INCmV4Y2Vl
ZGluZyBkaXNwMzI/DQoNCn5BbmRyZXcNCg==


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 14:40:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 14:40:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281559.479942 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3fq-0002EV-Mj; Tue, 01 Mar 2022 14:40:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281559.479942; Tue, 01 Mar 2022 14:40:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3fq-0002EO-JO; Tue, 01 Mar 2022 14:40:22 +0000
Received: by outflank-mailman (input) for mailman id 281559;
 Tue, 01 Mar 2022 14:40:21 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nP3fp-0002EE-3q
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 14:40:21 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 846a9d90-996d-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 15:40:19 +0100 (CET)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur03lp2057.outbound.protection.outlook.com [104.47.8.57]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-3-yx1oQ5sdNVCrWUFfaeoeIg-1; Tue, 01 Mar 2022 15:40:18 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB6PR0401MB2326.eurprd04.prod.outlook.com (2603:10a6:4:47::6) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.13; Tue, 1 Mar
 2022 14:40:15 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 14:40:14 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 846a9d90-996d-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646145619;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=1Tp6eeM+bJVVLPcsHvwb5t5ic8e0eWZrXvqaygMrey8=;
	b=AvAE7/fwGpSl62Mu6LqI88pasOlANnXRlUF1PQ5dOD8kc/aq5UMovoB/OpngquAbH44rHW
	+/ed2lA2N5y5IphCEnYTQejxraVnQQFZGVLRSHWnU1zd2Uonw809nUnxswqboAhU2B6fvY
	iImSzyIZuDH/ftHcd2vHDAtVf2MWUYA=
X-MC-Unique: yx1oQ5sdNVCrWUFfaeoeIg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=PifrZlDFm1nqTTnG4KOvyoQqRAdZddoIrTXMtyBL6/oF/LmJZZmOBoBPkry1J4pucAf67aJ1C88hGLou36bApoeqB/ybgm2Y9NDkzi6xOWMYfWovK8fPnyC/uVNYz5lMQAx+ieeGZ+hQ+JpZ1urDsSdhXlQYWDkIUW9AnnQlZdBdfx6n3q+ijS3Dme6Fl1dGrfSTfVBUcCbwgu0SIqA+qe7e2dZx8vFGRc/fMsxRY8BdMDtS1Y5OKsWLw+iVljfstwFbEjMWFfelZS50p8KC7LLlSRu7XbWCnU8NecvAE6o6WNd4ZRRNtTfvjaISEG7lJS5BTbgeawfs3vQ6R++ULg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=2+3+5dA28raY52aHpc7KzJ6+oTJvxhqJIrB8LChS1A4=;
 b=Hu2uPspnWOPGe/rT7iptNLr087gMN6DDHFtEJlvTsGkGsl4y/1a5iGfY1cCwuYofoWgVDS0Goj0YdEyrgDG/PH+nC9jIqi6hfTQUY+Se/2SoItlkNcm2zeCCnb5nGvdO0NMSUyXnrl7lwo0mPGfvjgI5bH1x3i2cYfw/uYObgQwwoPovjVnhLCa91gFnUE6mvsZJFyNerKmJu9jrShbhOHmqLnW5zB9ii8cBhQkjwendPUmbBLN8L2r0Ls8B+PhMOioujVq5banyyEAY5dYy5Iwev7FgARfpXDfqHO4KST7Qn0SeMWVG1UFejtHApaKHvqs0J/BFET9nfOZgQpPcgg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <152549ca-37b7-47f3-3b63-2d2ccf8070ad@suse.com>
Date: Tue, 1 Mar 2022 15:40:12 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v3 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: Jane Malalane <jane.malalane@citrix.com>, Wei Liu <wl@xen.org>,
 Anthony PERARD <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian <kevin.tian@intel.com>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <20220218172943.12182-1-jane.malalane@citrix.com>
 <20220218172943.12182-2-jane.malalane@citrix.com>
 <0a31970c-c0f8-c995-ce04-67523a4a830a@suse.com>
 <YhyrAyxhNtNWi7NY@Air-de-Roger>
 <9aff51c2-0e8c-685c-7bff-0ed7ff7347c7@suse.com>
 <Yhzr739VZdRLWnok@Air-de-Roger>
 <6b59e3ea-01ff-e26c-02d4-3b11594fd7f0@suse.com>
 <Yhz4yShnpcyq5IDM@Air-de-Roger>
 <60bcd74d-5686-9813-e3a6-b28c15b66a22@suse.com>
 <Yh4riyoA0BGgfAYi@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <Yh4riyoA0BGgfAYi@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6P195CA0017.EURP195.PROD.OUTLOOK.COM
 (2603:10a6:209:81::30) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ce4bde3d-a4f5-42c8-f726-08d9fb9165c5
X-MS-TrafficTypeDiagnostic: DB6PR0401MB2326:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<DB6PR0401MB232603A7624A10DBBDB93B62B3029@DB6PR0401MB2326.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	a3WiOBdWFr0uLAuJNl9A8Pz62mjFzfgBZsejDCpaRiHvnuNf+WB0lkMxhQOd1FdXx721HSxL4VeFdEFk+ofGnTplEnmx6G3VWPQYI2P33I1vtAnS2rrjwlvRrEFXz9NKN+I7up4Br3kZA6rQX12o3CvXkvFaoDkitT/6QS8//MNVGHcsZyZ9Cw5rJ+gYExYvpXu+hR2RmGk0qipjg6EbHBnxEBDV0TGreL4q/GH8c7J5AWjBfWgwu+zlPVEpFskmWOcuJYZW78NsYKZ/nWY8hNcAONS/N9mjsb6gSvYHF3z0FU0Z0YWYqaz/efNOo9t08ab//v88zaGRwN0ZvALQCCV83xbIMC7KV/vgrbrBApL6rjJqJhOIFJTf9IB9+cccYvf5smLK/c1w/1sZMjc2otGTpLIgGKIv4Io7+Vdum0ORpoxgN1JAmNkFDnxGzzwVXObVwtCI56udxR2x3eJmPNggQU+7Yur2bztHdiEYG55kxS9NqpwFAdV3lReFAJ+onHpLaYwkHaolKyf//rtzg2YA5awaHz6ugnNQhq9+ak12XeCtNER8243XK90XIylFSTvBSXWM3p/Dt+h+Zl1s1J9IORrWn9lJdOE3+xC2c1D6+mEgyjh3y5KS1q29197XGebUET9Gsw3ciMAOnHainJLfGo67/lhscPGrZ+I32ofV/CVklfTSBkh8UILcYacQRVY58n5Qc+d8p9vHdie0A+z79sH7ixN7o2Lb++YEsxI=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6506007)(38100700002)(6512007)(5660300002)(53546011)(186003)(83380400001)(2616005)(26005)(2906002)(6916009)(316002)(8936002)(54906003)(4326008)(8676002)(31686004)(6486002)(66476007)(66556008)(508600001)(36756003)(66946007)(31696002)(7416002)(86362001)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?4SViXnrNLyiz3pJwbf+gBmPlsdn4r3GO5WgPEO0FXbN+IA0eCiBwrE66KzK8?=
 =?us-ascii?Q?JLamUKY4GAzXuYaxk5HWbjL5qDewaflz5YTOiW2pcGUS9FnDdRlz0KLN65PI?=
 =?us-ascii?Q?otxtApY7Bmb+qzYw60F9Yav2082eC2K7Dr9b8u9atH61ADnD5lhJ2wInRN0d?=
 =?us-ascii?Q?oJ56cu5LIto0NcyChuiEne9BSzmrpgnb5lqJqet43sjWQWLw0kuhr8fdEgzO?=
 =?us-ascii?Q?vu8cWs0v3FCojbKNFxvW8xOZe+5OWrTpyRhjBumU+a72IVXFFI3TaLNh62Mh?=
 =?us-ascii?Q?T9Seu9DUyf1TcmnZ6BPwRgWOzANjcqVotDyne5jxC3t6OhoJ2xnoeqISOJf7?=
 =?us-ascii?Q?MHKepdscSgZX45skh131rVzUM0g8Hq5K4ctWmwEdHeyDIOP8MLShZXrv32bK?=
 =?us-ascii?Q?Mi++QIRuDC39LPNfypNzaoM746gDKfym86gk+Po6VJIeiZdLb/fRClBGZzog?=
 =?us-ascii?Q?D2Kvk7YdEwS/iUUGpgGYOJyIAO1CK08Dm5M3dyfz9oLjLZ0Vsz2FAhw6NPzc?=
 =?us-ascii?Q?zz8K/VKVJ1raxl6FnIbM7U7KXYnOUYP+FniRHr626eB3WXNgKYm2GYMkl5Bv?=
 =?us-ascii?Q?sZxIUZzlHW5VsVl1rB6Ij28TwB3++yI4fjuc50rL+blX7nV2UNDrNRdKDnP1?=
 =?us-ascii?Q?6c8rmP0y2ghG63NYx1fWhMIBwQ6TUq0W/D6NOH8s8H3RCvBwhTil1nPHnGlH?=
 =?us-ascii?Q?HMQcYRaSfAis+8nNzU0YUPIrcI3XGN54ZRL5wkhwyJd3tzgVJ1HSyeEzvMB+?=
 =?us-ascii?Q?c3CH2IZtWBav0zBNUHqw40eWCrCeuNitkG0d/Wss1obCU94auJGfxwon/Pnt?=
 =?us-ascii?Q?b6vtFJMjtzeQH8NywHVh9YEMSEQBHuvZsAUfRmDoP5E9Veh22G6axkcv19CX?=
 =?us-ascii?Q?+wifCqfrHoNGCGxQZP5dw4GI77dCPYbdEuj4vgtOANJ3nhmACIrBaylCJERQ?=
 =?us-ascii?Q?lf0tCBqNEWp27P4upFOxdLzLwQsyj5SUKEWanykVaEbw0Rg1y8ajdVIeP5XQ?=
 =?us-ascii?Q?29i6nHBc2hkE3NhLZk5dQDyN85UuXdn4+yDigOYlyDZkmNoCzMQ3QVjq6kFH?=
 =?us-ascii?Q?N/0KnIiyPwi7SNlmDqTrNJFaszNOnG3MG9cQmQH6YDd/5bzz3KwnnXrFrnK9?=
 =?us-ascii?Q?GB4Mr+8R6890+RYQsObxJ43jibV811bmNZDHyB33+B3mWVMf0ardEHDnY00s?=
 =?us-ascii?Q?NqOokRoNRqIpn7a5+TMzxmx4tLHJq5HuEbvWhzcNuue9isOvD+7b6O5DnDwd?=
 =?us-ascii?Q?k5OgvyPV3Sh0Cov147wa7EAIMsRkihIEHA6BZ/55DsdMl6eodX9IAaEDS36q?=
 =?us-ascii?Q?NNoM8z9B1pcv9zsxagsHFmPSkoRN474krEqOe6rajeoMmcRReKz5Xp9aSCEn?=
 =?us-ascii?Q?Kpmoc/Ms72BFhtEeOycoYGAmPvKvoncWvdM+xVaIzrzyw1fnbyVXUzmKJM4d?=
 =?us-ascii?Q?ZDzg+m7bquQbdtjzon8QzzqISWofF+/QOYJB0wVBKTvdzkIlGysZvIQS6wad?=
 =?us-ascii?Q?0HCkuXwJQhfXYM5haKg9+QxH43EbDgloVWKnRaHeys4VdDs9LYEldDDcGkGk?=
 =?us-ascii?Q?GNY+uddn8K+hzMMp9QGM13TEUVeudRd9ualvsQgQPWP4vpOoCNjZoKtSy2LF?=
 =?us-ascii?Q?TLAs02fFyGpKLjYKd4NCQ6A=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ce4bde3d-a4f5-42c8-f726-08d9fb9165c5
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 14:40:14.7813
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: O9Qdym0WiZwq4WWMfKBqiUjjI60brcYcnzntw7LVQKeHisDMpq8bP1vtCTRKlVtJ9webQPT4XFG0AsrYRdgiJA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0401MB2326

On 01.03.2022 15:19, Roger Pau Monn=C3=A9 wrote:
> On Tue, Mar 01, 2022 at 08:51:59AM +0100, Jan Beulich wrote:
>> On 28.02.2022 17:31, Roger Pau Monn=C3=A9 wrote:
>>> On Mon, Feb 28, 2022 at 05:14:26PM +0100, Jan Beulich wrote:
>>>> On 28.02.2022 16:36, Roger Pau Monn=C3=A9 wrote:
>>>>> On Mon, Feb 28, 2022 at 02:11:04PM +0100, Jan Beulich wrote:
>>>>>> On 28.02.2022 11:59, Roger Pau Monn=C3=A9 wrote:
>>>>>>> On Thu, Feb 24, 2022 at 03:08:41PM +0100, Jan Beulich wrote:
>>>>>>>> On 18.02.2022 18:29, Jane Malalane wrote:
>>>>>>>>> Add XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_xapic and
>>>>>>>>> XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_x2apic to report accelerated xap=
ic
>>>>>>>>> and x2apic, on x86 hardware.
>>>>>>>>> No such features are currently implemented on AMD hardware.
>>>>>>>>>
>>>>>>>>> For that purpose, also add an arch-specific "capabilities" parame=
ter
>>>>>>>>> to struct xen_sysctl_physinfo.
>>>>>>>>>
>>>>>>>>> Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
>>>>>>>>> Signed-off-by: Jane Malalane <jane.malalane@citrix.com>
>>>>>>>>> ---
>>>>>>>>> v3:
>>>>>>>>>  * Define XEN_SYSCTL_PHYSCAP_ARCH_MAX for ABI checking and actual=
ly
>>>>>>>>>    set arch_capbilities, via a call to c_bitmap_to_ocaml_list()
>>>>>>>>>  * Have assisted_x2apic_available only depend on
>>>>>>>>>    cpu_has_vmx_virtualize_x2apic_mode
>>>>>>>>
>>>>>>>> I understand this was the result from previous discussion, but thi=
s
>>>>>>>> needs justifying in the description. Not the least because it diff=
ers
>>>>>>>> from when XEN_HVM_CPUID_X2APIC_VIRT would be set as well as from w=
hat
>>>>>>>> vmx_vlapic_msr_changed() does. The difference between those two is
>>>>>>>> probably intended (judging from a comment there), but the further
>>>>>>>> difference to what you add isn't obvious.
>>>>>>>>
>>>>>>>> Which raises another thought: If that hypervisor leaf was part of =
the
>>>>>>>> HVM feature set, the tool stack could be able to obtain the wanted
>>>>>>>> information without altering sysctl (assuming the conditions to se=
t
>>>>>>>> the respective bits were the same). And I would view it as general=
ly
>>>>>>>> reasonable for there to be a way for tool stacks to know what
>>>>>>>> hypervisor leaves guests are going to get to see (at the maximum a=
nd
>>>>>>>> by default).
>>>>>>>
>>>>>>> I'm not sure using CPUID would be appropriate for this. Those field=
s
>>>>>>> are supposed to be used by a guest to decide whether it should pref=
er
>>>>>>> the x{2}APIC over PV alternatives for certain operations (ie: IPIs =
for
>>>>>>> example), but the level of control we can provide with the sysctl i=
s
>>>>>>> more fine grained.
>>>>>>>
>>>>>>> The current proposal is limited to the exposure and control of the
>>>>>>> usage of APIC virtualization, but we could also expose availability
>>>>>>> and per-domain enablement of APIC register virtualization and poste=
d
>>>>>>> interrupts.
>>>>>>
>>>>>> But then I would still like to avoid duplication of information
>>>>>> exposure and expose through the featureset what can be exposed there
>>>>>> and limit sysctl to what cannot be expressed otherwise.
>>>>>
>>>>> So you would rather prefer to expose this information in a synthetic
>>>>> CPUID leaf?
>>>>
>>>> Depends on what you mean by "synthetic leaf". We already have a leaf.
>>>> What I'm suggesting to consider to the give that hypervisor leaf a
>>>> representation in the featureset.
>>>
>>> Hm, but then we won't be able to expose more fine grained controls,
>>> ie: separate between basic APIC virtualization support, APIC register
>>> virtualization and interrupt virtualization. We would need to keep the
>>> meaning of XEN_HVM_CPUID_APIC_ACCESS_VIRT / XEN_HVM_CPUID_X2APIC_VIRT
>>> (and exposing more fine grained features to guests make no sense).
>>
>> I did say before that once (if ever) finer grained controls are wanted,
>> a sysctl like suggested would indeed look to be the way to report the
>> capability. But we aren't at that point.
>=20
> So we would expose everything in the 0x40000000 range, and caller
> would figure out the position of the Xen leaves doing a signature
> check until the Xen leaf is found?

The leaf number doesn't matter. The FEATURESET_* constants are part of
the ABI (just that the names we give them aren't in the public headers).
There would simply be a new FEATURESET_x4a.

> I would agree with this if the hypervisor leaves where already part of
> the managed CPUID data, but the work required to expose the leaves in
> the policy/featureset doesn't seem trivial. Making those leaves part
> of the policy will likely be done at some point, and then we can
> decide to drop the sysctl bits.

I may well be underestimating the amount of work involved. I wanted to
put this up as a possible alternative. Seeing that it's not liked, I'm
not going to insist to further pursue this.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 14:41:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 14:41:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281566.479952 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3gw-0002os-1P; Tue, 01 Mar 2022 14:41:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281566.479952; Tue, 01 Mar 2022 14:41:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3gv-0002ol-UP; Tue, 01 Mar 2022 14:41:29 +0000
Received: by outflank-mailman (input) for mailman id 281566;
 Tue, 01 Mar 2022 14:41:28 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=YI9j=TM=citrix.com=prvs=0520bb690=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nP3gt-0002mE-UB
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 14:41:28 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ab6e9db5-996d-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 15:41:26 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ab6e9db5-996d-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646145686;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=cYvcvTlc7QjuOAplFLIHIwXoyIbJYXN1vmW4gf/g2bc=;
  b=Py+xDWdEy8ti45laaARgU8exCWwG8zVqUm32PqUyhH22jlYNxe95Kt6d
   3YzuSw5xfuGc57hxLNdyxMLDJ43llOJILSsz5CU0aPeIq2MDn2qt/VRW3
   KRs8lBrZIrSbKyRCSrAeJKlIry2RnhhLkCLQl/mTQM8HulDZr8oFrUr6x
   o=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65224444
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:qIwR8K16Mt4cKl+dF/bD5c5xkn2cJEfYwER7XKvMYLTBsI5bpzQHz
 TdNCmiAaamIYzf1f991aozi9E9VsMWDn9FrHANrpC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUw2IDja++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /1xu76UdFkgPJaShcUhUCECPXljZrZ/reqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHCOo8Ft24m5jbeFfs8GrjIQrnQ5M8e1zA17ixLNaiDP
 ZBFNWYzBPjGSyxCHHgsDao/pcrymSmufTAD+WiNo4NitgA/yyQuieOwYbI5YOeiVchT20qVu
 G/C12D4GQ0BcsySzyKf9XChjfOJmjn0MKoNEJWo+/gsh0ecrkQRAhALUVqwodGil1WzHdlYL
 iQpFjEG9PZoshbxF5+kAkP+8CXsUgMgt8R4L+MYzDzTw6jvvRu4Oms8FBAZdYc9jZpjLdA17
 WOhk9TsDD1plbSaT3OB67uZxQ+P1TgpwXwqPnFdE1ZcizX3iMRq10+UEI4/eEKgpoCtQVnNL
 ya2QD/Sbln5peoCzO2F8F/OmFpATbCZH1dutm07so9Ihz6VhbJJhaT1sTA3Dt4ade51q2VtW
 lBew6ByC8hUUPmweNSlGrllIV1Qz6/t3MfgqVBuBYI90D+m5mSue4tdiBknehs3aplfJ2OwO
 RaC0e+02HO1FCHxBUOQS9jsY/nGMIC6TYi1PhwqRoAmjmdNmP+vo3g1OB/4M5HFm0kwi6AvU
 ap3gu73ZUv2/Z9PlWLsL89EiOdD7nlnmQv7GMCqpzz6gOH2TCPEFt843K6mM7lRAFWs+16Or
 b6y9qKiln1ibQEJSnKPoN5LcAtTdiBT6FKfg5U/S9Nv6zFOQQkJI/TQ3akga8pimaFUnf3P5
 XazRglTz1+XuJENAV7ihqxLAF83YatCkA==
IronPort-HdrOrdr: A9a23:q53S1qMSvcrII8BcT2/155DYdb4zR+YMi2TDiHofdfUFSKClfp
 6V8cjzjSWE9Qr4WBkb6LW90DHpewKSyXcH2/hsAV7EZniphILIFvAv0WKG+VPd8kLFh5dgPM
 tbAstD4ZjLfCJHZKXBkUiF+rQbsaG6GcmT7I+0pRYMcegpUdAa0+4QMHfBLqQcfngjOXNNLu
 v72iMxnUvGRZ14VLXYOlA1G8z44/HbnpPvZhALQzQ97hOVsD+u4LnmVzCFwxY3SVp0sPcf2F
 mAtza8yrSosvm9xBOZ/XTU9Y5qlNzozcYGLNCQi/ISNi7nhm+TFcdcsvy5zXIISdOUmRIXee
 r30lAd1gNImjXsl1SO0F7QMs/boW8TAjHZuAelaDDY0LPErXoBerR8bMRiA0HkAgMbzaFBOO
 gg5RPpi7NHSRzHhyjz/N7OSlVjkVe1u2MrlaoJg2VYSpZ2Us4bkWUzxjIdLH47JlOz1GnnKp
 gbMOjMoPJNNV+KZXHQuWdihNSqQ3QoBx+DBkwPoNac3TRalG1wixJw/r1Tol4QsJYmD5VU7e
 XNNapl0LlIU88NdKp4QOMMW9G+BGDBSQ/FdGiSPVPkHqcaPG+lke+83JwloOWxPJAYxpo7n5
 rMFFteqG4pYkrrTdaD2ZVamyq9NllVnQ6dvf22y6IJyIEUHoCbQhFrYGpe5vednw==
X-IronPort-AV: E=Sophos;i="5.90,146,1643691600"; 
   d="scan'208";a="65224444"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=FfgK09031yvhwFnIOkYdYvfK/I7IoMfxVxSlRsKCy96zx9/xFQXt98HzrTCcMOeZ1naDOwLrMARbZ1BH/xt0Lo/hi9ISkHvGG70doUBgOBaRgbEBePbESOggD1q3ecm96saycg2XI+hsgaHa+jqsuuZYQinfibUfOSskqdbgA9nAT04/swulkMdcRX+mDepL/4Vtig9bH8O/q034WqPf7uDChvIg4cFLWzDjfwuzTRHoAALRDLY9lnel5azW0h74HP9TB3tjW6Ru/ZQDJZiSJxWePxFY/6edXYX0cRKXwQq2KRlKU5c9GX5MnGpjHtLsGRX+cF4SyV605Y+PRszRxA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=cYvcvTlc7QjuOAplFLIHIwXoyIbJYXN1vmW4gf/g2bc=;
 b=agmSLJzK36lQbCJmCps+t/Tjn1dfh2BtCdK+co+rY/JGXuswbHXmee700g637Yi+WzGSeY7f0pMUpNJjqO1o0ZyCbUrTuWtHd6HMslmWWo8KCjRVx1S+s881of971Nd32bYUFIWFR4GXILugnHOUFiiZTQOoY7YxuC8li7KGj6kbUq5V3H4LOL30Vx9fNzEApkOgnmIJTfTREyXIqqhcEpvCM8/shRv/5pH/20CAi1Jq6/CYsKEHZtRgIq0G/ZpqprCEQTXqXehuLpkkKBKIee1NrsGiFjsTwIlzb3aXa8fVQtlszl9HWT/RDcgwYM8mc+jHNMxXumU/yruCrZh7/w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=cYvcvTlc7QjuOAplFLIHIwXoyIbJYXN1vmW4gf/g2bc=;
 b=du93A644cCVGlS4pN8zd7EsVN7VpHY71fZiVLKH8GkDAHafH1OfD/kwYR9pQVFLkAZgVM5mkd/rEEdoIuHv1egwtx3/OwvTgzuoz/wOTCt4AMWsdef+1NB7jHwD13af6qunuMTNSgqBuwVQKJBOucJ/Mbc49oYr5jJJTNwCwMAE=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Wei Liu <wl@xen.org>, Roger Pau Monne <roger.pau@citrix.com>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH 1/2] x86/time: use fake read_tsc()
Thread-Topic: [PATCH 1/2] x86/time: use fake read_tsc()
Thread-Index: AQHYLVxVKor9YtEUbkuWag9T3yUcNqyqf+CAgAAS0gCAAAbHAIAAAKIA
Date: Tue, 1 Mar 2022 14:41:20 +0000
Message-ID: <63fc645b-3a03-d14b-c4a7-d6a46dcb8190@citrix.com>
References: <77675e7f-2a7e-f517-4aba-e20774c8bfe5@suse.com>
 <f4f0e92c-9586-e021-6ad5-718628f88fcd@suse.com>
 <d1c3822e-bec1-d8ca-8954-a4942f5bb23c@citrix.com>
 <2c3bb06d-e4f4-33d8-7972-71dc7d61c554@suse.com>
 <ea46555b-6ab3-620c-0937-401f6335b842@citrix.com>
In-Reply-To: <ea46555b-6ab3-620c-0937-401f6335b842@citrix.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 57d00f6a-1840-42c0-407b-08d9fb918d39
x-ms-traffictypediagnostic: MWHPR03MB2528:EE_
x-microsoft-antispam-prvs: <MWHPR03MB252879928D66CB1740B3269BBA029@MWHPR03MB2528.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 18i/SdHIRGoJoMNkmpZbfRYQPlM6P4u4yX12dkPImTLrW/aMW+rGulZcnoMRuMUeSOvrgbVLil3HnNBh0W4t/XUxDk/uRlMVkir/AuZ1vByq1OYR3bIBhz0bwmY6mBCBO/wMgfqxds6kykedKgIHHW4bYeThkRZd9FBruNZM9phrHkqlo7BPybSkcIPBpithZU9bJ6lL0ZXTeGNZbQsGqvO9J2tu4UwUpTyvEwt5p7sjtp1+4+9oDo6ufJGu94rFe46BVAu73d3x3zJ22/1nKbx5kJXRCdBtbCqOhBVMqiHqtsHNelBTb+8UzbbLex0YWCuMgiU5XnVyf1d4mOYfq0zOtlr+64puX4MwHrBleYCd1dGi5YPam5gIzjUHlYtflvHEgHBeCNMeHdJhhzC2KwpdVrjhCAnfDF6gBl3Vc24AHNxq575sbkQFuKKx49gxXza1t26nxOPzRFaYdbOcDtC02cYtwFTEzgVzLy38nhWxhirzi6dEYpyd8jkzqYHc7PLQU5ZZlZBzuH+mjzBoItLHru1dFAKMJyhekYvMqpk4TpngLbg3kEMHbeqXqJTzdomOfNQEm1Y1+oDAslnRIDjBLf2VjLfaFTqb/iPlBGaY214PeILc2CBqXwuIwBtb87rwBdQpTnngX866CMbnYzOXKeRbh+z36ZxjpJhfxl6yAo1Ms9abKfB/ewxOxpGwxSI3THTRAl/i8kRhQdGGlY8EyoWwxiMN5VdnMbU4iMkk/jCuxQj9eAHdDIs4yC0c2uWAoCrsD2pJai5v5bNUrA==
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(82960400001)(122000001)(38100700002)(6512007)(6506007)(53546011)(2906002)(186003)(2616005)(26005)(83380400001)(71200400001)(316002)(8936002)(6916009)(54906003)(4326008)(6486002)(31686004)(8676002)(64756008)(66446008)(66476007)(36756003)(508600001)(91956017)(66946007)(66556008)(31696002)(4744005)(76116006)(5660300002)(86362001)(38070700005)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?bkVRU0dXN3lpTGNvWStlMENhRXZuNWtDemJhRjBGdTJxM1JMYTZ1R3VuZTlw?=
 =?utf-8?B?UDhVaSsrOHdabUtZbkFtbXlMWk5KbkM5YmcybitvZDc3dThXUVRsdTZkdmNX?=
 =?utf-8?B?TXNLYS9pOWpUdlpTOU5xdDcyRHhjT1IyWkt1QUtyczJ1L09veXVPUndZazQ2?=
 =?utf-8?B?RkdWa1BVVFVZcVVlQVZwRlFSckhxbG1GcmxWeXBhOFRkNVhoRlRYTEliSE9z?=
 =?utf-8?B?Slg4RnZFaE9xL3l6bUc0YkhyT0RLSTN1UnlWcXNBSG1lVlFTNlVQc3NyRXQv?=
 =?utf-8?B?L2hDbGkxTVkzbzcrb2pBNlkySnc2aE00OU9wRVp4YUpRWks3bzBETEpyVVdK?=
 =?utf-8?B?MERBZnBNRThqZzVwd2xTTFdvNkljNzlYQlFaL2ZINWlZenUxOFVhN1pxQ3p3?=
 =?utf-8?B?KzZqa3k4blV1M0hqSDhPNzZJWW9LRStNMXFSUmZZRFNWckRXWWVVSFBWK2tn?=
 =?utf-8?B?OFEzTlZpUkd1YWJHMkF4Q1VlS05TV1VPeHMxNGZhejhwTnFyT3JwZFI0STIw?=
 =?utf-8?B?cE1zYXpUTW1kaUVEZ3F3WkRncVlHdWMyWENZV2t5RFF1cldkdUI2OGlWeW5i?=
 =?utf-8?B?aXlpU21maUxESWpqVzlXUGZLUEpFeStDbEMvdkFmcmlIcHp0anZOaHdFWGdw?=
 =?utf-8?B?OS9tYjNoUDAya3JGL2Q4M3hiVGtyVjM4UlpZTmRoQVBVY245MmkrVHBOand4?=
 =?utf-8?B?V0RKOWRoaWZNZkFYY3VjZm9aOHhpNzNYeVV5WjZXQXZKdFI0MzlHYThrQnpB?=
 =?utf-8?B?cU4yTGV1MmFIOFZiVnVYbjVQcXFNZXFsSytlYnF6ZFN6dVhZblVNbUxEZ0xq?=
 =?utf-8?B?ekxJc0pJSlNwQXkyTXpOWU5lTEJWOGxLODBnOVc0blJaWHRCRDcrUXpPaXJU?=
 =?utf-8?B?SjdQOWZ6dmRrUnRseDU4eEhZTkNXS25uOVRwdHRxY3lzUVNYOHR4aEZxNmh2?=
 =?utf-8?B?M1RVUlYrb0NoekdVR05LNXZlanJocFcxV203QjYzcUtFRG02ZDgyQ1ZYV1gz?=
 =?utf-8?B?YUxScS82bHROc3ZRelB3dEVHdXpBU1VYcGNGMXJibTMxVS9RbGVuVzhaTnhy?=
 =?utf-8?B?Q2d3RFluQmNabDdvQ1dWK0xlZkxCUzlMdnQ1ZVNGRmwvUjEvYXVlQlFTMjM3?=
 =?utf-8?B?NmMrOGdOTWFqZVJOK0tqMTNtUzI2OVBENHNWWkUrbU9CMHhOQVA1YkEydmhq?=
 =?utf-8?B?ZmFZN0gwVWErVU1mME43TCtQbHJBZTZ2dFNzNVc5UDM2cGhpaXp6eE84a2wv?=
 =?utf-8?B?dEZiQVBZbE1OMEZEQXR6YnN3SDdBT29zdzNsQ0RDbityWXp2SldtRkhkN0pv?=
 =?utf-8?B?M3IxMG8zSkY4R05pUG53emxsZVpXRy9FcVNzVG5TM3ZGZGRGcWY0L2h5Qm5D?=
 =?utf-8?B?bUZFWlVpVFNMbFFMUG1pa1pzSjhCMGdVOG1ON1RnR3VkK2N0YWF5WG1OZElz?=
 =?utf-8?B?MUJPWUNoSXU3eFBGUnZFK2pjcUxLaS9aaU1Hc1BiNk0xM01NR3hJeWMwdy9h?=
 =?utf-8?B?dldUUUVQamJ0UUJaK1VTeitCZTF1RU0wcmtmbkNpR1VSYnM2YnZjOXFNNkVF?=
 =?utf-8?B?U21IanRCT3hKVWlqY2k1ZG1FUnVZckswR296cndPSnlNM1h2QzhMaFVGZDNp?=
 =?utf-8?B?cHZneEREVlJ0c3h4RUVtOFVaZG5hcHhvZzMvRTZ3M3ZOTGtDMHBvb2pqbTc4?=
 =?utf-8?B?OTRlSmZnOGRFcmsrTVRsS1Qrc0hMMkV3YjBMUzhlUVJtWHFWR2plTnRUd1pl?=
 =?utf-8?B?cWp0bUxGZHlKREFtUStoQ0o4RG0rMkRwbTVSemZ2ZldCU29qRW9PQmNpL0Uw?=
 =?utf-8?B?SmJZRlBRSm1oSzUrYW1zNVFiczVlMGRKeml3aUp3UzNpZEZFc2pWMFpTZ3cr?=
 =?utf-8?B?eHZjNW1vaVZzcHREOEhhUlYzTmhuUHhMMTBKc1RMWFpwbDZpQlpJTGtZdGls?=
 =?utf-8?B?a2NxRkdpRzJsYXlGejB5S2xZam9PbjFCbVFXclF2Z2RNVnhWZHlZaDdHMlh2?=
 =?utf-8?B?VTgwS1BWMC92dFc2cmk3YWZBTzJlOHBNc05XZHVBbkhIYW9sTWI4NHlIdzhH?=
 =?utf-8?B?ZENLTlBWdWhBcVpFcGg3cEhtNkJuY1FNUzVHTGJrdFJ0Y29XWGpEdjkwbG1q?=
 =?utf-8?B?OWRHZTRaZkQyVDgzNjk3QmZ2L29xSjJNRE5mNkR2Q09BUGdkWW1ydVpFblRp?=
 =?utf-8?B?RUp2NVg3ZHViZ1NBSE84T1R2VTN1MisvajBZZW9RNnd4NEtvKzRIVDBERzgw?=
 =?utf-8?B?bmp5dEFHN0FtMHp2K1drWnk4VWNBPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <2172C992CE5EB344B99C3951CFC09BAB@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 57d00f6a-1840-42c0-407b-08d9fb918d39
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Mar 2022 14:41:20.7180
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: mjE3z7Ki+lnoJP6k8mqeQNgPYqORRv13cBSM6eXX2wqNGgICzBr/I2c7PmAJqP/IdPl57nIy3Dtzzh3HwB59+xk0l/gb4icum4aV0IUnx14=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR03MB2528
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Tue Mar 01 14:44:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 14:44:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281576.479964 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3jK-0003Wn-IT; Tue, 01 Mar 2022 14:43:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281576.479964; Tue, 01 Mar 2022 14:43:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3jK-0003Wg-FM; Tue, 01 Mar 2022 14:43:58 +0000
Received: by outflank-mailman (input) for mailman id 281576;
 Tue, 01 Mar 2022 14:43:57 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nP3jJ-0003WX-OT
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 14:43:57 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 05e66ced-996e-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 15:43:56 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2113.outbound.protection.outlook.com [104.47.17.113]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-37-rD4iyPtWOT6clTKuJ1yfVQ-1; Tue, 01 Mar 2022 15:43:55 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR04MB6691.eurprd04.prod.outlook.com (2603:10a6:208:17a::24)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Tue, 1 Mar
 2022 14:43:53 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 14:43:53 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 05e66ced-996e-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646145836;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=vfYXY4Pa2JRczICtJYZAMBr1IkiD/j5RCEybgZF2ddY=;
	b=dN9UAj6xZmnXPWKqVYad5IIk+B6s6OvZzf8RhuVdQ5Fl78nRsh7mdnV0fYA6EKnqwMcWUG
	SN/V1Vy1ydGXd0HZVqn9on+lynabXSeZwHareoCK3oVJmHQd4Tr1kn0MtLpk6UG0qP7Hzh
	FQHNowcgzxJInjIPfBZjX8MUxVqypfQ=
X-MC-Unique: rD4iyPtWOT6clTKuJ1yfVQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=oJEXnXKAuhhoTk7WEQmKvlNUNhbiVab7yDNUaRcRXm/dkIff/eCFuh6l3VdyAhpJfsuhGMVCbFAWBQBOKiE7Cw02kM4H8k8ig+6xMuCm2X4DPpYIOLZ2mYhj/iotQ35xQ851RuR2Sci6YZBsiFjbYK7FmAlVY8pygCfesCE11i5OPqJN15Iwce2KKPKLzC+3Qh2ZdruGFBjVUAPta+WRuRUeJl7LK6G4jI329tBkVMDFRgjBt2Er5TBQcTLhTkuHMRsIw48CWJiM1YHU3Lvgort/TWq5JfxMXFm1cn80vKJoxMIbx9RIRDq7KuAdqFAnVU6k/x/oBM+4QrsZjZA8GQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=qwJzIZS51ymivE2MOwq4WJF7j8kjoWz9UHofoBY9E/o=;
 b=EwawHODIh2SfRzZcEd7OtH5ZC+JlpNpg3UrLFuZAJk12Bc2/pmy2PvsfLiDhDzqfa7vLyawDffGBSmsGUZvDbrKhP/3s7YGsmOa8lnRETdD/ExqjQnd8YQk1Zq/XLcJd0vDtu6Hx5B5lYUUlftdChK+qmjKuy8E4nrn94uOnax4e6sf7i+L4VZgxbyahYrEBeVkZ7rJZAz1dEzxxiAF+pyhMJHTJmQ9KjntZc8pRm2xi/2EkAfKbPPlOZAojyo3au/WoYsUwOP1D9dStsc/TBQQebHJye4PbXI4eZ+5I9Pqo7EeBvqiL95qlMN60IVf+wenKQvznDMykA6XGXvncwg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <2f30d30e-5e65-bd03-2975-b81e2eba60a7@suse.com>
Date: Tue, 1 Mar 2022 15:43:51 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH 1/2] x86/time: use fake read_tsc()
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: Wei Liu <wl@xen.org>, Roger Pau Monne <roger.pau@citrix.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <77675e7f-2a7e-f517-4aba-e20774c8bfe5@suse.com>
 <f4f0e92c-9586-e021-6ad5-718628f88fcd@suse.com>
 <d1c3822e-bec1-d8ca-8954-a4942f5bb23c@citrix.com>
 <2c3bb06d-e4f4-33d8-7972-71dc7d61c554@suse.com>
 <ea46555b-6ab3-620c-0937-401f6335b842@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <ea46555b-6ab3-620c-0937-401f6335b842@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS8PR04CA0029.eurprd04.prod.outlook.com
 (2603:10a6:20b:310::34) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 6aa21200-4fe0-4c76-0ba4-08d9fb91e7f2
X-MS-TrafficTypeDiagnostic: AM0PR04MB6691:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB6691858D92D4DF19E406BC0FB3029@AM0PR04MB6691.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66946007)(8676002)(8936002)(38100700002)(2906002)(36756003)(31686004)(66476007)(66556008)(4326008)(6512007)(5660300002)(4744005)(316002)(6486002)(2616005)(26005)(186003)(31696002)(6916009)(54906003)(83380400001)(86362001)(508600001)(53546011)(6506007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?jd4btnBgANNtO23KOyIeXX7LnOW7UrrYLUn2bWOuoc6d3cAQMqseu96aGbcC?=
 =?us-ascii?Q?qrwJR1++iTmKNsN2cJc1DfuusEnurWWPu0Vn7Ck5dlBtR2KDcsq1OTgdhTl4?=
 =?us-ascii?Q?C+XsPjGIYvmUwHYEwsTVPfFQS7fefdBOOkQ4JT0DtSwnh5CurdHXHZVr7kT+?=
 =?us-ascii?Q?NR57rMkngpSJQT+09Uzq4UcUeFqxPa3Y8/xl9zQ8ZyXQ0hZy/LtwFvcdMRTu?=
 =?us-ascii?Q?kWNvssZIbwrsOi41IlPk6x3nVPx5IJMM+nZ9AmqPsteRYhfPdZ6TSWY+rrH/?=
 =?us-ascii?Q?Z5Qrc1rLzWn0GWXxps5WvMl4bhR1S3P8SEK6IK6AAiipY1j5+B3hoMoClBpy?=
 =?us-ascii?Q?sn3tykjYK+1TJvDJAGDqmnY8Bandxv/e16DBsBxevmOmBdqfqE33Cp82vYxC?=
 =?us-ascii?Q?xRuQ1/2eSPr2JdiHVIsSrY7TrUFbT2kpklE16kosT4BuUlqZYIRvxsJLOVyh?=
 =?us-ascii?Q?b6NywYS3m47JOBT/XZompi7ZXAgUZUaQxbMzf2TfyJ+/mjZCGALgDPw6q8Ec?=
 =?us-ascii?Q?pPujUAlvT75cL00OrJu8UIsAjRAfhp+JoOVcHLC+vgctPgqHy6k+AMphgqcR?=
 =?us-ascii?Q?JSeIwqXFdzFOsQeSdUxdBO5OumZwhPjm8XlD9Pfa/tQ03KuKvLMXESaWHNKA?=
 =?us-ascii?Q?B7bJygxO5zIPIOcoJMwyZ0iGU0yMlrlB8fYlc+Uym8pPXKgrnIpzU+ncYmW1?=
 =?us-ascii?Q?1sesMTiUfgyYn7/Cu3uNZx34ubxnSp2zNKZwPUnv+ZQuTz1YAuEkmkvthIEV?=
 =?us-ascii?Q?+0Ss16mZMWGpEkgk1psX2guWrIc1/yAKulnzkUcUWDuTZbAKzbqSAeub8YDP?=
 =?us-ascii?Q?jpPxcMyuexfAgUbhVacbH/c6bnJW0/fUHzKI8F48KtPUKD7KJ5/H520JyPHR?=
 =?us-ascii?Q?H8WA5nbwQ9adldMWNA4e/CBkH8fracitHNrz6NPMLRZ78fL8zndCwr5ghE0b?=
 =?us-ascii?Q?rThpgNKj0VQkjc2ncZ27fjuxuDMgmH7gJhlAc4wLYDo3jBQcNMHW0pUO6mA5?=
 =?us-ascii?Q?rz31ezBs6v0aLyJ5g1Glk0lh0MCcSwggVIJzTApF/k8l5zzMw6BcLso3IJJQ?=
 =?us-ascii?Q?jFaBmcWOWqHZAuLJ9D0UjpX5HsxZ+6XDRI+MhchzWdwm6ShxmKAk2GnFfzie?=
 =?us-ascii?Q?aLNLuGSGvW2sMPsIoQZMaVqEhzb0CGEzMq9CSsXGe10qVxMxiRqDjhca3Bpz?=
 =?us-ascii?Q?db5ZCV8DhjR34PMIRILI0W9nP9DIL+viT1gZD98OV3i0oViE8iHlM3MU2De2?=
 =?us-ascii?Q?qDzOFz4TQRg2KfUWNwbx4TQ/GDeMAjUrvbBCocJyUyMAqkJIVYTVwdlByfxq?=
 =?us-ascii?Q?nvwQTFi5GEVSKBP6yEgS1O+ezXYzGqf1GSwzkuWOujezpcmpSlhejs3sVQt+?=
 =?us-ascii?Q?9nTpxFUgZsuyBEcmCzGT+zEAAt+73Z/sz7y7ijyhmTol6y2xSjeIvHKVYkPm?=
 =?us-ascii?Q?HbXVofB85lYPsfaR6Nj1JEfx80UNq7N8sBb9j3QvRMq9co8HCKFgcNwfWIfL?=
 =?us-ascii?Q?VvL9ZTni/b0Vihk1KmK3ilHhMZO91eGX5etsDIuSU3972UH7QW6vInXW+hNz?=
 =?us-ascii?Q?Gm5rNAPQY07vUDh8Q3qCEy9DNUBvZpV3DuFcK/yM18YDBz86ZbK2X0doEiaq?=
 =?us-ascii?Q?4CnrXyHAY5SZdwyWaoCPaUA=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6aa21200-4fe0-4c76-0ba4-08d9fb91e7f2
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 14:43:53.1740
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Gpljv+BOz/ZIdvuGYSEBKNWK3MUpNP0Qe2Q8c8QQJ6+Ib4TVfAqh2gOuiGxkVge6QSqgkk1SVVniFDfTxIYNVg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB6691

On 01.03.2022 15:39, Andrew Cooper wrote:
> On 01/03/2022 14:14, Jan Beulich wrote:
>> On 01.03.2022 14:07, Andrew Cooper wrote:
>>> On 01/03/2022 11:05, Jan Beulich wrote:
>>> That said... what's wrong a plain NULL?=C2=A0 I can't see any need for =
a
>>> magic constant here.
>> Are you fancying an XSA for a call through NULL in PV guest context?
>=20
> Why do you think that a risk?=C2=A0 Only non-NULL function pointers are
> followed, and altcall resolves safely if the pointer is still NULL.
>=20
> And on that subject, don't we not hit the altcall's BUG_ON() for
> exceeding disp32?

There's no altcall involved here. As said in earlier contexts, altcall
patching comes to early to cover plt_tsc use. Hence the only concern
is a non-altacll-ed use of the pointer.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 14:45:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 14:45:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281584.479975 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3kz-00048v-Tu; Tue, 01 Mar 2022 14:45:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281584.479975; Tue, 01 Mar 2022 14:45:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3kz-00048o-Qq; Tue, 01 Mar 2022 14:45:41 +0000
Received: by outflank-mailman (input) for mailman id 281584;
 Tue, 01 Mar 2022 14:45:40 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nP3ky-00048g-Ic
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 14:45:40 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 430805ff-996e-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 15:45:39 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2104.outbound.protection.outlook.com [104.47.17.104]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-23-jGdeFzw5PYee6YkSS9tEUw-1; Tue, 01 Mar 2022 15:45:38 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR04MB6691.eurprd04.prod.outlook.com (2603:10a6:208:17a::24)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Tue, 1 Mar
 2022 14:45:36 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 14:45:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 430805ff-996e-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646145939;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=DorVAtudWv5Of1f/b2H2VMdz9EpaBjaWcK6d1llyyy8=;
	b=AEIxSj7WsH3LIEYAGtPNpSCqz3IUQ7ScAR2uR+u1oXKoqTX0uZuqrGH05JO5zoqi9MZbF0
	EELMtn2fTP9jOr6F5nTci2j3NuY18OxLJ5OwSwllSeMSkbZ8rtnZgYktg36lzDdhbhHnAV
	q4isO9sJ5es69cl9CpW4UbKe7It+A9A=
X-MC-Unique: jGdeFzw5PYee6YkSS9tEUw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=enLtmbEmGZyacWRZr499XuTeJUA20AxWK+4EoUiEmUuaT5j60hHeXNTIQ5OP86SiKvJ4HzJe1FiiZEzHvwFwaYNwQx9/hkb+bBfuYkKs8vwGSh4LpdGaW874CnHZcxczLDI3oJQsdiyVVZ70I/V+/TM0shRMH+RjlGTUCspXtaCj+ynrUB87cqBOjBYVLx/ufaY2/szfOQJz4mIKQFNw22l3vlqPWsCHIp6zzXsAaukcXAxLFz8pC3sh7TsQvnI+PN5YfmTzj6D9WfxivN6J2CzKwcS+knTkO7zzCgaahMUHa9TSXRYVtk8Q+m5k/FHgLPh1N28WIpVd8riDBwU/FA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Y6W/DUj8P73Qa56qkRd4IJ/l2Yw34qOaIaEzNLwsejY=;
 b=kB79BYkuM8bVOZwvFZtr8ew7jw4gyUngCq9iBgs+n3lYmVrt2vmtUYiF0gIETg7IUPz7HuYs2N4mURYiQcLrV9F5Gs7RY0b27JOGD4et/+G46FRJ0/Yo4TGZyFUSv3iCCV/vtprEYaNmXGoZkc5DfN7MQuyvORNYhEtkR5UBMUYDEmx6cvxYWqkFA/OVkwn9YTvBA9mA8Eqbg62x3QR/RDpeUbNxXOxUrBj7lyirJ1FRt7QayrIz6QW+UjbMZnU0WDpbQFeflua10LXvt0XwG4xp8zt56YhEZPBk4gZs79xh/YdLi92jZDgV/AOOQ+BNoJEblljaUmfZCl85smUbtw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <99599e7f-c72f-7b20-d601-fc4fa99998a4@suse.com>
Date: Tue, 1 Mar 2022 15:45:34 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH 2/2] x86/time: add CF-clobber annotations
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: Wei Liu <wl@xen.org>, Roger Pau Monne <roger.pau@citrix.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <77675e7f-2a7e-f517-4aba-e20774c8bfe5@suse.com>
 <61bbf544-74ac-b698-425a-d1db80acab43@suse.com>
 <20185a89-0a2b-6bbd-5484-31b6582ed200@citrix.com>
 <40ce913e-4388-2d2f-45e3-e725a927da92@suse.com>
 <ae77b805-b513-7aa7-ece0-c3c7dbf662c1@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <ae77b805-b513-7aa7-ece0-c3c7dbf662c1@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6P193CA0114.EURP193.PROD.OUTLOOK.COM
 (2603:10a6:209:85::19) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 578fa8d5-341e-44eb-105f-08d9fb9225a9
X-MS-TrafficTypeDiagnostic: AM0PR04MB6691:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB66916D3C40FB99FF04630E23B3029@AM0PR04MB6691.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66946007)(8676002)(8936002)(38100700002)(2906002)(36756003)(31686004)(66476007)(66556008)(4326008)(6512007)(5660300002)(316002)(6486002)(2616005)(26005)(186003)(31696002)(6916009)(54906003)(83380400001)(86362001)(508600001)(53546011)(6506007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?p0glLugHsvTHFWgQ3vdzp/VMV2ah8gBYvXBqo0F1ghyKwtk5XBjb82oWPMm1?=
 =?us-ascii?Q?XRg4FWliXTrkPlYTJhzavSV72uVDLbs+ULg7wvovx+DGgV2ZlX/COw1Vy2v0?=
 =?us-ascii?Q?lI7Km2ouLSYBgqjcAxeimc2jyfpMl3iqwFWaAPNsjzH7pnViNQR2DWOWRoU4?=
 =?us-ascii?Q?Y1xzuKbjam3Xhu6Y7936L2l6OvYH+mx6yLam8qmW4GqiRcYBTNK3jNcUOq7T?=
 =?us-ascii?Q?7ifFt+iKVSeLKXaF2U3GnTAg5yXf+v8MnVG4aIgv2TSNn20RmVoXeGMuBCbT?=
 =?us-ascii?Q?O8bUrTLfLxeyvUeI95zICoUppuB0/TwpJsZmulSO3B1TZKKd1mxeb/WRDu9k?=
 =?us-ascii?Q?FjuNNeewXR//LE85KFn6Rj04j+WUiFB6ojPYJjK1SM+BIzQRv46oOtENgPcm?=
 =?us-ascii?Q?ByZWiuY+PrNHh1+vY+Mu8Y9SR4DXjP+t1g5DOmV/KmHTCrJQ6aNKX/PWx+GH?=
 =?us-ascii?Q?DaIp29JtYgUoqIqBn9izIyq/U0Dhw+PVtFzpasNs2O+iN0SLDkBWp4mA5dQ3?=
 =?us-ascii?Q?GCttNWwMBig23qnZ5Ft/dqa55YNNJKyq5rpeubdjyNC4FRgb+LbxfbBQRzpK?=
 =?us-ascii?Q?2gOtKHCw39wq01oF18FumfACwnZKO9TIGbjFcIvG8yoJMbIzOO0ibojhAiz5?=
 =?us-ascii?Q?0KC2SwxZukzgqg4B2Exeo2szXWlpvGU9Uu15SqDe9a65p+xm28d/4VXALVXt?=
 =?us-ascii?Q?eYD1tCmAm0r+BjN7XO4hbTYRm994EfhK32XHop5/KK1i7++zfD0i8lwEjKxg?=
 =?us-ascii?Q?Ri/l9BnM/18+5mpE/0XLszXmqxPmcthP3KIQ0/9UCwjVhNPrh6JuIJ7I41A3?=
 =?us-ascii?Q?p1sSd7kxrgynwFy2RfNTljvJegvyMjKbkqCZcU/vL5m+0QTX9tGei1gn416u?=
 =?us-ascii?Q?rFj+tRcBQnrug8Uxi6TJev92gX7e20XJjzxAVGSQP3JzF50DGdya2txp317+?=
 =?us-ascii?Q?c24I2mm8gSbNwf3OccYsaMEXBrF8kbbrGbFjIJyeeUzrbqJvN3jni0VDyKME?=
 =?us-ascii?Q?SkXhSYsg2IxmX4FOAgGSP8HzoOuyOi2KICDEaA/8ygNSEH5gbAcvP80a2sjT?=
 =?us-ascii?Q?WilrIp6n3/6D0ElExHzCVfj2hbeaWcPcZW7WnGDQuixYf/iaV+cKqvbmrK6x?=
 =?us-ascii?Q?sAxZLgrHbwaPlbbjNtm+k8tdcJd0qjIlLwvav9WwV751KrzkJOmX66eZ12Bb?=
 =?us-ascii?Q?Q3Yus38LJHVll20C4wxJr5aOTvWa9oxQ2OabO23OOFj94oxjG62zbKzASU9s?=
 =?us-ascii?Q?JCLdF8kPqCRoVyk3YzcSLAA0mh54LJi6fI25Baa5WrnoTMYdmKM7fyJvdrSt?=
 =?us-ascii?Q?EhFY9kOjxPicD3eZ+XfYYA2xyMGiY8EIiFD0qGmft0J6NjRVt7RU9rGhAXU5?=
 =?us-ascii?Q?TpppPp4LsP1rHA6jN1aN6e3HZ5vkSNprPP9Dc1B1ioFhER2sGV+CXeDMHNyp?=
 =?us-ascii?Q?KkjVaD5aoC1FtS3hS3UzqDxU6yCUMKEds2sWeB7ufwXN+S17xUN4GyQNfKbn?=
 =?us-ascii?Q?k3h+nKOCRG1Azo3w920MT9FVy6w6qDak08T7UzDVI6GrMO255ySiVCYtV4cQ?=
 =?us-ascii?Q?Qt3dTvzyAuMXlwKYIw14EkaYswTDK9SGu0xVAD8iTgLZGD7CupfURKWef2SQ?=
 =?us-ascii?Q?uUB6voh+ESlQENZ4v91X+38=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 578fa8d5-341e-44eb-105f-08d9fb9225a9
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 14:45:36.6519
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 1t9fL8dugMr1Y2HYL4nf2HuSSaMuJ/06tpOycvSvLb1nfFu8cS29WaLDBVVEAH4iX2K0TyhIZKJOc1QadFYjoQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB6691

On 01.03.2022 15:24, Andrew Cooper wrote:
> On 01/03/2022 14:18, Jan Beulich wrote:
>> On 01.03.2022 14:18, Andrew Cooper wrote:
>>> On 01/03/2022 11:06, Jan Beulich wrote:
>>>> With bed9ae54df44 ("x86/time: switch platform timer hooks to altcall")
>>>> in place we can further arrange for ENDBR removal from the functions n=
o
>>>> longer subject to indirect calls. Note that plt_tsc is left untouched,
>>>> for not holding any pointer eligible for ENDBR removal.
>>> I'd be tempted to include it, for consistency sake alone.
>>>
>>> It is less likely to go wrong in the future if another hook is introduc=
ed.
>> Can do, sure.
>>
>>>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>>> With the commit message, I'm not not certain if this is linked to the
>>> previous patch.
>>>
>>> Overall it looks fine, but I'd like to get clarity on this point.
>> Converting read_tsc() was discussed (with Roger) earlier on, so I'd
>> view this as a separate change. As said in reply to your comments on
>> the 1st patch, how exactly read_tsc() looks like is orthogonal to
>> the changes here at least as long as it doesn't live in .text.
>=20
> Ok.=C2=A0 Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>

Thanks. I'll take it this includes annotating plt_tsc as well, just
as a precautionary measure (and as you did suggest; still visible in
context above).

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 14:46:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 14:46:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281590.479986 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3m2-0004sf-7p; Tue, 01 Mar 2022 14:46:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281590.479986; Tue, 01 Mar 2022 14:46:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3m2-0004sY-41; Tue, 01 Mar 2022 14:46:46 +0000
Received: by outflank-mailman (input) for mailman id 281590;
 Tue, 01 Mar 2022 14:46:44 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=mX9w=TM=kernel.org=sj@srs-se1.protection.inumbo.net>)
 id 1nP3m0-0004sQ-Dh
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 14:46:44 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org
 [2604:1380:4641:c500::1])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 67bc262b-996e-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 15:46:43 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 41F3461602;
 Tue,  1 Mar 2022 14:46:40 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 140F8C340F0;
 Tue,  1 Mar 2022 14:46:39 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 67bc262b-996e-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646145999;
	bh=XuPfbJ5gyWV/sNDbzNt2QVmxD4bkkTRFvCQ8bl7OriU=;
	h=From:To:Cc:Subject:Date:From;
	b=K1iG7/KtxI8qmv6YXuSrkbTtoXNkYG7uLI00ux8Mcf5KqeJKyaZJT7hbh5iedi3TQ
	 dQU7yl7Gl+vmbbyoSH2DOPc7mXMkA7fkcZYAmTkDaGXUwdn39QDpMrxmVUn0OUpLiL
	 SUFPYvGqYxuiKALMvfeRGEPa8QWfqPDqLpd0F5MBoFtu/Jc9k93IjVRjJHSMsZh1LX
	 lZXknFTSjrfvvd2/ZEQWdtFPo/AeZ4LOGqIXMtn7HDrH5uixCv6Lsc2RRcqK4iFogc
	 C+DW5bWRvlySFZMxHRnZkX/+LrUBo6C6hBmeKxtN87LmIDiYmllCEUDlTaeo9uXBGU
	 CPnBn6e9oIkPw==
From: SeongJae Park <sj@kernel.org>
To: roger.pau@citrix.com,
	jgross@suse.com
Cc: mheyne@amazon.de,
	xen-devel@lists.xenproject.org,
	linux-kernel@vger.kernel.org,
	SeongJae Park <sj@kernel.org>
Subject: [PATCH] xen-blk{back,front}: Update contact points for buffer_squeeze_duration_ms and feature_persistent
Date: Tue,  1 Mar 2022 14:46:28 +0000
Message-Id: <20220301144628.2858-1-sj@kernel.org>
X-Mailer: git-send-email 2.17.1

SeongJae is currently listed as a contact point for some blk{back,front}
features, but he will not work for XEN for a while.  This commit
therefore updates the contact point to his colleague, Maximilian, who is
understanding the context and actively working with the features now.

Signed-off-by: SeongJae Park <sj@kernel.org>
Signed-off-by: Maximilian Heyne <mheyne@amazon.de>
---
 Documentation/ABI/testing/sysfs-driver-xen-blkback  | 4 ++--
 Documentation/ABI/testing/sysfs-driver-xen-blkfront | 2 +-
 2 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/Documentation/ABI/testing/sysfs-driver-xen-blkback b/Documentation/ABI/testing/sysfs-driver-xen-blkback
index a74dfe52dd76..7faf719af165 100644
--- a/Documentation/ABI/testing/sysfs-driver-xen-blkback
+++ b/Documentation/ABI/testing/sysfs-driver-xen-blkback
@@ -29,7 +29,7 @@ Description:
 What:           /sys/module/xen_blkback/parameters/buffer_squeeze_duration_ms
 Date:           December 2019
 KernelVersion:  5.6
-Contact:        SeongJae Park <sj@kernel.org>
+Contact:        Maximilian Heyne <mheyne@amazon.de>
 Description:
                 When memory pressure is reported to blkback this option
                 controls the duration in milliseconds that blkback will not
@@ -39,7 +39,7 @@ Description:
 What:           /sys/module/xen_blkback/parameters/feature_persistent
 Date:           September 2020
 KernelVersion:  5.10
-Contact:        SeongJae Park <sj@kernel.org>
+Contact:        Maximilian Heyne <mheyne@amazon.de>
 Description:
                 Whether to enable the persistent grants feature or not.  Note
                 that this option only takes effect on newly created backends.
diff --git a/Documentation/ABI/testing/sysfs-driver-xen-blkfront b/Documentation/ABI/testing/sysfs-driver-xen-blkfront
index 61fd173fabfe..7f646c58832e 100644
--- a/Documentation/ABI/testing/sysfs-driver-xen-blkfront
+++ b/Documentation/ABI/testing/sysfs-driver-xen-blkfront
@@ -12,7 +12,7 @@ Description:
 What:           /sys/module/xen_blkfront/parameters/feature_persistent
 Date:           September 2020
 KernelVersion:  5.10
-Contact:        SeongJae Park <sj@kernel.org>
+Contact:        Maximilian Heyne <mheyne@amazon.de>
 Description:
                 Whether to enable the persistent grants feature or not.  Note
                 that this option only takes effect on newly created frontends.
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 14:48:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 14:48:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281597.479997 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3nG-0005Tl-HF; Tue, 01 Mar 2022 14:48:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281597.479997; Tue, 01 Mar 2022 14:48:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3nG-0005Te-E9; Tue, 01 Mar 2022 14:48:02 +0000
Received: by outflank-mailman (input) for mailman id 281597;
 Tue, 01 Mar 2022 14:48:01 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nP3nF-0005TW-Ai
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 14:48:01 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 970bf319-996e-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 15:48:00 +0100 (CET)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2056.outbound.protection.outlook.com [104.47.14.56]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-31-ULVi9T2pN8Ce-Q3ftC1Pjg-1; Tue, 01 Mar 2022 15:47:59 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM5PR0401MB2610.eurprd04.prod.outlook.com (2603:10a6:203:3c::8)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Tue, 1 Mar
 2022 14:47:57 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 14:47:57 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 970bf319-996e-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646146080;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=UQ4jdTWxlZGApeChgMmKKjO8QRrHTIp03uBQQXZSq8M=;
	b=NLIgR1dK+cqWixTvpV60d9KnMvV7WhEyW91bfnCPj4CWb0jps4lu4nsecAFq5oEiKxM+gy
	qg9uQYnaPi3lysb+4XaeGgIjbwHLsYRGkIGlch6TZPb0feXhn/WKbPEGliodnTW2ReFHHR
	fte8V5RPaEL3Asyw4FPPgmlDV0wH2x8=
X-MC-Unique: ULVi9T2pN8Ce-Q3ftC1Pjg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=UrD9zzenl5+1NjBkiJMigWlPcPtH2MiG2GQSAym8C0ACz+MMFPCLtfYSTtWfqqXgHHwKrRswlJIFMumTCPZ+596Dzt1NSfBLuiAXUIYXCzeZf4u92e6cSO951KVHWAf97XHrkrmxW2guwQowEaaofC/uZufzgSsTEWVNe23z8nDGDdmB/u8LDWDZ4j+9HpEneMc+kWfqg1c2vbH3fBenWM0FBZs0G+niMxj7sx3wcB2Dk2xZIeAOnM4ksdqvOfMhVeMtKWmcI9pgjkn+1b/oLyr3EHdfm4yxK8Q0W8NtXHJepx+1c43Yja9PQi4OWvnWXHxwumzf6Dz2f6RvUUwbJg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=QGJRUDfOJhcjOsQNVB6rBpzXdwkRo0EE1W5f+8ArDks=;
 b=ZCfp8o0SoDZDokIcdHGiiLm/0cw3bgUwVuCTuh07715YQlT7me0s3xTsPGhRajnNEXHP7VSrKD6ejQbnryXtK46vqejvEqNy6lW0TAOK08aDy9TQWFOwlXDQJ77A4g2PPSqnb/wst3OMCtxbBipywChkmq90XJZJjnABpxnnCRJeqIq9+zzh97riLHkwKPn5HGX2ERufoIfBHvNDMFzdOJyXzSN7XShxBYcM0oigN950de2BsbX6VyB/15VpRw1zea25zfOnAyxM68H6Ut4JB1E0qkF4U7Eoub1j8YOqizkxB6XrB+GU/vRuIEhj54IMIau8MV1uvPyeHtaDUyUBvg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <ee9107c0-38aa-967d-ed12-e6b52c3fe31c@suse.com>
Date: Tue, 1 Mar 2022 15:47:55 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH 2/2] x86/time: add CF-clobber annotations
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: Wei Liu <wl@xen.org>, Roger Pau Monne <roger.pau@citrix.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <77675e7f-2a7e-f517-4aba-e20774c8bfe5@suse.com>
 <61bbf544-74ac-b698-425a-d1db80acab43@suse.com>
 <20185a89-0a2b-6bbd-5484-31b6582ed200@citrix.com>
 <40ce913e-4388-2d2f-45e3-e725a927da92@suse.com>
 <ae77b805-b513-7aa7-ece0-c3c7dbf662c1@citrix.com>
 <bbc32813-74a2-f5c3-d616-e5fcdeffcd10@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <bbc32813-74a2-f5c3-d616-e5fcdeffcd10@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9P194CA0004.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:20b:46d::32) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0eea43e0-1c9f-494b-675e-08d9fb927979
X-MS-TrafficTypeDiagnostic: AM5PR0401MB2610:EE_
X-Microsoft-Antispam-PRVS:
	<AM5PR0401MB26100E62C0211CCE9AAAE888B3029@AM5PR0401MB2610.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66556008)(36756003)(54906003)(8676002)(2616005)(316002)(66476007)(66946007)(8936002)(508600001)(31696002)(31686004)(6486002)(5660300002)(53546011)(6916009)(2906002)(6506007)(38100700002)(6512007)(83380400001)(86362001)(186003)(26005)(4326008)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?Fb96YWpMajcUrNnkioKcBPVnQziXJaZNgqsqK/grfDD3YqJ5BoYR7xRAeOkZ?=
 =?us-ascii?Q?AqUvKvW84gOzWrzGGEECTL761TT4FUuXozod+tQh1MHQE7Fk4X6/vM7LkfyE?=
 =?us-ascii?Q?Bgi3TuGsl2VmYbYT2NXvPgYnFZ+zhtXYER9Ev4jtg/8BKSK2n6wQK+2QEObX?=
 =?us-ascii?Q?9zC5dYzfN/83YcUQqtElbBjc6tYlFDNwD2Gt2ghVyPaRZsg9Z+LWgRXWqPQI?=
 =?us-ascii?Q?lJPLSlNtrKe7XlCXCIt7aGfYvAUwvAXqOZ3+fXEUlxEwze5XEq0rqqnuoVEF?=
 =?us-ascii?Q?6mPLUpOoE9k7R1X9ZxdregW38wX9lKXIAZbI6/DCuGP3+BomoaiSFBOVL+84?=
 =?us-ascii?Q?Y15KTKgExuIGImAwnYVK+fMZBbBbQrUnSN1ce7M++/MjWDicE4HJFMqmet+X?=
 =?us-ascii?Q?nPZtLJjfElYVcnL0W1zgUBfbPvl1YcNACPmEGK9zNZHP4Ub5rlAsiT2yF+/5?=
 =?us-ascii?Q?u0Tm487AnZ4dPdMTorCnuHws2XLgilhO0/jDMf5u6R5q92843TyTEnTEBCFp?=
 =?us-ascii?Q?OmfdRizxXTZ2sZ+Y+Vwt+JF5nDkSFLBcbyp/hCVxDO0dCXCBbXXLMqcBYPKZ?=
 =?us-ascii?Q?+PmOJsFAPJ9llvmXu4YxPFNkOIq0eIQUKzuwKl+sfPXIdv3QvaN9dRWojXNc?=
 =?us-ascii?Q?2Bt9h8LTLUrik8tvcKsHEzfSW2Aho3jia5tVXeyWn4BFQRVLo5uq9LoPqFCq?=
 =?us-ascii?Q?5xqKIaaGmQfQ9m7AHglJIf462HHOaT0ZNDYMYwsdBbVjaG0kO9gNHOzFHzvK?=
 =?us-ascii?Q?feOzB2UGYzr3OkDOm50Ux4+NrjvzznFB3lqQ7+k94Fdefl0CqYaIqnS1BNOv?=
 =?us-ascii?Q?UuMfaSB581973Ui/k6craKFbNH1CSDOnXou1VINkHUEKygRiyVScOxcY1Kwq?=
 =?us-ascii?Q?tMaVYWrZOGq6jpSul5U6EZyCigZAUxDn4k6sVG5XmdQuN+OHjcK9AHY/9xF4?=
 =?us-ascii?Q?i/nqHhnBlWwBkRmdndOvF32fS83hEWDQ7SJbWB8yg6vaXORvRhn7nCKPT7pt?=
 =?us-ascii?Q?n+onCQiAqQRlFFJCLxMegkrc383ooMEfHSrIEDVh/j6W4dILCInc940PHCVw?=
 =?us-ascii?Q?bUz5CmwUkam1C4uNfdec7Tyb+RDmWddZbqDnPNMwYzVsRvc/y329gDG7kxrJ?=
 =?us-ascii?Q?amFKCofWPbhRgVRn36O4/WsKxK3tO8Sa/S3cNrA9l6ZA7Aq/ia+wM/7DfY+f?=
 =?us-ascii?Q?mhNk9mJgd9WMJ5xcyHqt+e4bwywFAt8bKQg1wjSBIXfhsAThoe7VoEkcVIWG?=
 =?us-ascii?Q?wcR5tE4Q2+zcD341Sp245hDQsh0gI6T5Jg6cjvhbgXu1Rt/Junelgm3WtGle?=
 =?us-ascii?Q?VQBjysa3FtN82Nb0gQFT8Z1B+ZIlHwzaKtPk/Q0DWqKxyPn2uAj6zQkdIkOS?=
 =?us-ascii?Q?43da5afhIk81gQoYYTdvRYtG3nscNELFC3TGSPUX+zW5hRUxHJeItkfYk6n2?=
 =?us-ascii?Q?CjC3lAHs2rnwmI0wYWlJST8l8oUmC5+5cVhL0qkPEV9M3CTAGTO1CkS2UVSu?=
 =?us-ascii?Q?yXiB1DHF7yBbbyqDn3D0MEuEJT9DXjAnNGxYu6RClMxgrbpTmZ+pCNV/E5Wt?=
 =?us-ascii?Q?kLKTtTiRYXX0FtTjlaiewulHiRcYz7EOsyYW2l9CXHAnFjLK7EYKY/rGXIQg?=
 =?us-ascii?Q?v6qdq/otupLCPaarrIrCCvw=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0eea43e0-1c9f-494b-675e-08d9fb927979
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 14:47:57.2838
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: cw9TCyeTAn86tA9lArOtTqZcojEHby1m9EYi3zmjBBw3bF/Z2ci/QFiAl70WYMvPZMwwp86zBxFYrWo7xseeMQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0401MB2610

On 01.03.2022 15:35, Andrew Cooper wrote:
> On 01/03/2022 14:24, Andrew Cooper wrote:
>> On 01/03/2022 14:18, Jan Beulich wrote:
>>> On 01.03.2022 14:18, Andrew Cooper wrote:
>>>> On 01/03/2022 11:06, Jan Beulich wrote:
>>>>> With bed9ae54df44 ("x86/time: switch platform timer hooks to altcall"=
)
>>>>> in place we can further arrange for ENDBR removal from the functions =
no
>>>>> longer subject to indirect calls. Note that plt_tsc is left untouched=
,
>>>>> for not holding any pointer eligible for ENDBR removal.
>>>> I'd be tempted to include it, for consistency sake alone.
>>>>
>>>> It is less likely to go wrong in the future if another hook is introdu=
ced.
>>> Can do, sure.
>>>
>>>>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>>>> With the commit message, I'm not not certain if this is linked to the
>>>> previous patch.
>>>>
>>>> Overall it looks fine, but I'd like to get clarity on this point.
>>> Converting read_tsc() was discussed (with Roger) earlier on, so I'd
>>> view this as a separate change. As said in reply to your comments on
>>> the 1st patch, how exactly read_tsc() looks like is orthogonal to
>>> the changes here at least as long as it doesn't live in .text.
>> Ok.=C2=A0 Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
>=20
> Actually, you probably want to move plt_src into __ro_after_init along
> with this change.

I'd view this as an independent change. Perhaps it would make for a
better change if we went through and converted from __read_mostly for
a bunch of items all in one go.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 14:51:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 14:51:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281607.480008 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3qN-0006wk-3Y; Tue, 01 Mar 2022 14:51:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281607.480008; Tue, 01 Mar 2022 14:51:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3qN-0006wd-0Q; Tue, 01 Mar 2022 14:51:15 +0000
Received: by outflank-mailman (input) for mailman id 281607;
 Tue, 01 Mar 2022 14:51:14 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=YI9j=TM=citrix.com=prvs=0520bb690=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nP3qM-0006wX-BK
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 14:51:14 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 08bc40c6-996f-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 15:51:12 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 08bc40c6-996f-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646146272;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=FNt0PkLU/gHV1JfBMjBRBHU+/JETTyZQ8Znho2lLnTw=;
  b=ZC8xlPce1OgZolibSZuwwniMjMCnNcQ0NXnrFAnkEhcA42xMeuIKUSdc
   cuE0DtJJxO0a2XMcmAW287W6QNbgZ5f6CCT31fOPlGPpmOhnS596dkFh9
   YsAzWgT+tb4j+1CXHy9tMfbeBUoo1lhjdKndmlCgVSHoVGuQ5LKlMh/GK
   0=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65225268
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:zqjnoawIS4rT1CReRC56t+cqxirEfRIJ4+MujC+fZmUNrF6WrkUCx
 2NNDGHVPP3fMGXwe41zPt+390oC78XXy4BgTgVs+SAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2YHhWWthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 Nplls2we1g3J6L3vssiUyJ7FSpiOZBl0eqSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DFYUToHx/ixreCu4rW8vrSKTW/95Imjw3g6iiGN6AO
 pBDNGAxPHwsZTVpNRBHJ6Ma292Qg3LfTG1Bt1O1oJAetj27IAtZj+G2bYu9lsaxbdVYmAOUq
 3zL+0z9AwoGL5qPxDyd6HWui+TT2yThV+o6C7mQ5vNsxlqJyQQ7ChcbSF+6qvmRkVOlVpRUL
 El8x8Y1hfFsrgrxFIC7BkDm5i7f1vIBZzZOO85r6DPS1LPb2CC2OWg/bThKdNgbl+ZjEFTGy
 WS1t9/uADVutpicRnSc6qqYoFuOBMQFEYMRTXRaFFVYurEPtKl210uSFYg7TMZZm/WoQWmY/
 tyckMQpa1z/Z+Yv3r7zw13IiinESnPhHl9svVW/so5IA2pEiG+Zi26AtACzARVodt/xory9U
 J4swZD2AAcmV8zlqcB1aL9RdIxFHt7cWNEmvXZhHoM66xOm8GO5cIZb7VlWfRk1bJ5bImG1O
 RaK6Gu9AaO/2lPwNsebhKrrVqwXIVXIT4y5Bpg4kPIUCnSOSON31H43PhPBt4wcuEMtjbs+K
 f+mnTWEVh4n5VBc5GPuHY81iOZzrghnnD+7bc2rnnyPjOvFDFbIGOhtDbd7Rr1ghE9yiF6Oq
 Ig32grj40g3bdASlQGMqd9DdQ1RdCNjbX00wuQOHtO+zsNdMDhJI9fawK87epwjmKJQl+zS+
 Wq6VFMew1367UAr4y3QApy/QNsDhapCkE8=
IronPort-HdrOrdr: A9a23:iTNQxaFYq6Ck1KJppLqEEseALOsnbusQ8zAXPiBKJCC9vPb5qy
 nOpoV+6faQslwssR4b9uxoVJPvfZq+z+8R3WByB8bAYOCOggLBQL2KhbGI/9SKIVydygcy78
 Zdm6gVMqyMMbB55/yKnDVRxbwbsaa6GKPDv5ah8590JzsaDJ2Jd21Ce32m+ksdfnghObMJUK
 Cyy+BgvDSadXEefq2AdwM4t7iqnayzqHr+CyR2fyIa1A==
X-IronPort-AV: E=Sophos;i="5.90,146,1643691600"; 
   d="scan'208";a="65225268"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=O+M8pOkHIuhicArkjVoKOb4G4PdR2CLVqCC71geT86pMgvjNDl/OHmxRPU4xF2vSkODCV20HLSl01lAhuyWLqcRZp1XTxxJNwmslHbFUtf68l0TsV1rQ41oPH21t7128NZsyQFBqqg5hVz2BqStRVaMMVQDlyyTu+WXiDa7njqye1lcqBcWPj7vLBqRbxOJOpchw+5UBfxssaa8Ro3UovXPVS1Q9faLsVPr3wcnOea3FHP+jCGHxbGaPYoZv5soCJ/ADsDfWQ+n/NJklzhWvmEsxJ/hsMTOVrwOxJ7qLOOhv7v+k5sAjwtGVB+zDv+05+389oOsQD76yWUC1LDAauw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=FNt0PkLU/gHV1JfBMjBRBHU+/JETTyZQ8Znho2lLnTw=;
 b=jeemfDpWe+c7SOIPkznKYrPrJRCtGh/IV/7OsmI5f9WLvgN7m8pz3sZ0cO49yfnsmdyJ0E80Fp5hmsrTOVWMgR8bYkf3KwPIrJvQE/f4ofPS0/5ioxQBZIbC8PySQotpQwrrg/tWzr/PInG4yMoZCQD43q9rAdjOfnQ4IHlg5wX9o/jDQ9wWbyhAxlyfJnm5tUbS71690I2eyLXL6dWMzjsTyrUw1zFflZStd/eYNys5uNxWyhoeFTRUq3flbxJMl5ASOTceSaZ3ACiRScnvg0cf1FQJ8ISxLMEbM5vV9gV3E30sLSzCoSX8+AOF9ShcVPA/9kaCgAz/rfrn+2UwpQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=FNt0PkLU/gHV1JfBMjBRBHU+/JETTyZQ8Znho2lLnTw=;
 b=uSy7gkxdwR4uSxVZGaoaGMB8rhMV4uLuX8i7Tu1aEw2nWD46wWNsjJIpDg9/s6CPDx3EuaDGZpmv1g1eJQorRdA+0hG1fNZiOHxo7kVjA50P4oXfxUu2CS5dQKu9fW056JTLZrreDKNej6A4qPymuH80SxA5ClpZEziLTfT1gEA=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>, Xen-devel
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v2 3/7] x86/altcall: Optimise away endbr64 instruction
 where possible
Thread-Topic: [PATCH v2 3/7] x86/altcall: Optimise away endbr64 instruction
 where possible
Thread-Index: AQHYIaJdlBm1laP+30eCBtzXO5xQTKyqhD+AgAAwCwA=
Date: Tue, 1 Mar 2022 14:51:06 +0000
Message-ID: <eaa7f36f-f8b8-604a-9d97-6cadadbe6eb3@citrix.com>
References: <20220214125632.24563-1-andrew.cooper3@citrix.com>
 <20220214125632.24563-4-andrew.cooper3@citrix.com>
 <2808e805-60a7-2f1e-0ff4-8da123c79afd@suse.com>
In-Reply-To: <2808e805-60a7-2f1e-0ff4-8da123c79afd@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: d6c4709c-75e1-4ccb-c097-08d9fb92ea89
x-ms-traffictypediagnostic: BL1PR03MB6022:EE_
x-microsoft-antispam-prvs: <BL1PR03MB602235219B3AC18448B65B84BA029@BL1PR03MB6022.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(54906003)(6916009)(316002)(8936002)(31686004)(6486002)(64756008)(66446008)(66476007)(66556008)(4326008)(8676002)(2906002)(26005)(71200400001)(508600001)(31696002)(38070700005)(86362001)(91956017)(36756003)(66946007)(76116006)(5660300002)(6512007)(53546011)(82960400001)(6506007)(122000001)(38100700002)(2616005)(83380400001)(186003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?ekZyLzBvNDFZWlRoeVQ0Yno0UHpSNkkrRFVNN29oNVdzNWZKWDFCYWdzTUIw?=
 =?utf-8?B?ZWtBSFN0VFQwbDFqNkNvdWZhdWhzaEJZdXpZZDhNM1NNeWhYNTZaY3F2WDQv?=
 =?utf-8?B?YXp6SGNTTExRWVErZGUyRTdmMmJvcmRrUWhEc0FkbC92Q3hrdEtyOEhxcFVM?=
 =?utf-8?B?SnZ3MGVwSFN5cWtCRjlLYXFJNlpiYnorblVxTmhrT2RoOUJBTGZ0ZWRFSi8z?=
 =?utf-8?B?aWV0RGk1dVpaQi9KcC9NV1hZczBTSk9lRExJbWYvVnJvNXVwZzBxVUlhQkc3?=
 =?utf-8?B?WXBNbG9veWkvczFFZkVHL0NTdmpTLzUzdGx1cXp2ck1UMys2MlRJZW81NTNO?=
 =?utf-8?B?bDcxaHpWWDF3WDIwRVROUGtlYkoranFRY0Jxb0JFSGV3MGdoQmQ5alJrOGd4?=
 =?utf-8?B?dGxnTk1TcHBvSWt4Vk5GVmc4bld2ZnZMclpUQlQ3QVJvRGRVSXBpaTd0d2Jy?=
 =?utf-8?B?enc0aUxrd3FCNi8xcUtmTWQ0a28rUzB3K0hEZUowelhINk5pUGxCMnU2UE4r?=
 =?utf-8?B?VFMxaUJhUmZEM1FEUkxIUTNyZmo4NVFoYWJhZGlxdSsvTGhMT2JLeWVIYnRm?=
 =?utf-8?B?SzlpMndObW41STU1aXJIUGdRTlVMOXgweUZqVHVqSFRIeHoxNUNDaUc3amNn?=
 =?utf-8?B?NWtJSmliZVR3bUFnYkhrNkVjdUNSb1dtV0drY1pJL2hLU1pheFJQRVpZQnVu?=
 =?utf-8?B?YXpPYXBtWURHU2tTTSt2L1lBZiswNVRDQmYyUWVoYWtHUWE1bE9mMlRvN3JM?=
 =?utf-8?B?T09xaUQ2ZU9VZjJRcU8wVGZDWTNqS3ZZZzRJQWMrdkFsM0VMeFdsMmdDT0lj?=
 =?utf-8?B?VDhzek5NcmFNcUtKK0dMWkJ0eWt0cnROWUZoN2ZhY3dObTRyRnRZQVVsdWlP?=
 =?utf-8?B?UjFZd1h1NStPMFgrcWo4MytRaVpJcCsvaTMyaGFHRmRuOHB2VEg0eGNkVVFs?=
 =?utf-8?B?VHNBMTJUTlU5NzFza2dJUlp6c0paSC9tMmYwR21sbWdNeUpJR2ZaMXBpRCt3?=
 =?utf-8?B?Z29BZ0tocThLR1lJSno5bkU5aGl0ZEx6eDB6MmpTVzA1UnFlUG1FQ2pUNi93?=
 =?utf-8?B?eCs3Z2pMQklKR1NSQnJ1elhEaWMwUkFRc2VkamNsWnZTV0VzUW93dGRySFlN?=
 =?utf-8?B?bld6a2txOHhOWnlKQXJSSXNZeU9SN0JIMVI1cVlaRE5BOVN2bjI3RnA2dHNy?=
 =?utf-8?B?QlVPK0ZQQUEwUW9JL2daM3h3eExsNXlxSGo5eUNabUJwUDNXRkNPY3V5Zitp?=
 =?utf-8?B?WUMzdzlSUXNvc3hQMnhqa2dPb2IydmNUSWl6dXhEeHBBRngyVkxGdFhXTS9z?=
 =?utf-8?B?YVdUY3ZUaEpONE5BN0lzTSt6aFo5bFBRUDc1WVdUdDRZV2IrZDFENzA5bmY3?=
 =?utf-8?B?ZHBoT3l5Z0VySW9jODhsbDFqaUdzdEpZRU5RZDVqWUhpamNNUjBKMk9rNFVE?=
 =?utf-8?B?LzlmNW0zaVVEYlIrRlNld3Vwd0NuOWx1SDdvcTBwaFRzc2J5d0RLZEdjTk1i?=
 =?utf-8?B?N245dDZyUGNINmtybGtsQUt0VXFUdzc2dUg0WmdRbUpwSCtjRHpKRmtIbkFl?=
 =?utf-8?B?cHIvSlIyQjNBZWhNWCs2MDF2QWVibDhTU1RyeitOU2oxTXNLS2JMSzlVVjA3?=
 =?utf-8?B?WVBYMEdLVU5LY0F6OHZVY2hNcTROWEx3Q21HUmcxVHBaUnRUVVdXTTlQNWNS?=
 =?utf-8?B?Z01BcWhKanFhVjl4TmMzdDd4eGQyWG52ckRNWm9qR2ZkVjdDeXhVaEtVVXp1?=
 =?utf-8?B?YUZnVG9ETHdxcVByYUN5K3FVeWFMOGpidmFGaXhESVhwbjhtRXVhQXQ0MkMv?=
 =?utf-8?B?aXBnTTRmSk12UzA0VnZQdTQ2V1dDb08zZU45YmRna3pVN1lZWUhEYkhwVEhh?=
 =?utf-8?B?NGhmUllNTDR1UkZSNUl6QnB4L3VLZkZSSEIvZFUvZWdaQ0cyVThpNmdHb2hk?=
 =?utf-8?B?SHB0RkgvbCtkaGJsd2d3NncybG96eFgvM3k2OHlnNmV6cFJvbko2RDNsV1VT?=
 =?utf-8?B?YVM0bExsWGVaelhoeHh4ckZxQUs5OXVBb2p1ZVpnWWhpelZIVWpiYW01QVVZ?=
 =?utf-8?B?c240emxqYkFzdUMwS3VBL3JaTTRlWkJCaW9mOEdsN21WY1lrcWxYUFUweDBr?=
 =?utf-8?B?ckxZalJFazlmck53T21saEx0cXhWUHJnNUJ0WjV5Q2NyRFJjR3IyRHQvSWpo?=
 =?utf-8?B?NmhrS2cwV1NBTVFsOXdtdFF2RTNzYjVHdGM1S2R4VlBha2FYd2lPcUZTNElZ?=
 =?utf-8?B?eXBuTC81aXQ2ZFNvMzdMS0hObXFBPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <506250EC111C4841B7E3F1F545027EDF@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d6c4709c-75e1-4ccb-c097-08d9fb92ea89
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Mar 2022 14:51:06.7079
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: /0kAaBOdjgkPpkgb8zk9WCPGVmWKrV2GDhReK4xhWpCLB9mmmcF0P+zYJCtSqTPQuGGPmyfpb9ivQT9AIChn5qndvJ5NXgN6tOvvOzAiaBk=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL1PR03MB6022
X-OriginatorOrg: citrix.com

T24gMDEvMDMvMjAyMiAxMTo1OSwgSmFuIEJldWxpY2ggd3JvdGU6DQo+IE9uIDE0LjAyLjIwMjIg
MTM6NTYsIEFuZHJldyBDb29wZXIgd3JvdGU6DQo+PiBAQCAtMzMwLDYgKzMzMyw0MSBAQCBzdGF0
aWMgdm9pZCBpbml0X29yX2xpdmVwYXRjaCBfYXBwbHlfYWx0ZXJuYXRpdmVzKHN0cnVjdCBhbHRf
aW5zdHIgKnN0YXJ0LA0KPj4gICAgICAgICAgYWRkX25vcHMoYnVmICsgYS0+cmVwbF9sZW4sIHRv
dGFsX2xlbiAtIGEtPnJlcGxfbGVuKTsNCj4+ICAgICAgICAgIHRleHRfcG9rZShvcmlnLCBidWYs
IHRvdGFsX2xlbik7DQo+PiAgICAgIH0NCj4+ICsNCj4+ICsgICAgLyoNCj4+ICsgICAgICogQ2xv
YmJlciBlbmRicjY0IGluc3RydWN0aW9ucyBub3cgdGhhdCBhbHRjYWxsIGhhcyBmaW5pc2hlZCBv
cHRpbWlzaW5nDQo+PiArICAgICAqIGFsbCBpbmRpcmVjdCBicmFuY2hlcyB0byBkaXJlY3Qgb25l
cy4NCj4+ICsgICAgICovDQo+PiArICAgIGlmICggZm9yY2UgJiYgY3B1X2hhc194ZW5faWJ0ICkN
Cj4gQnR3LCB0aGlzIGlzIG5vdyBhbHNvIGVudGVyZWQgd2hlbiB0aGUgZnVuY3Rpb24gaXMgY2Fs
bGVkIGZyb20NCj4gYXBwbHlfYWx0ZXJuYXRpdmVzKCkgKGkuZS4gd2hlbiBsaXZlcGF0Y2hpbmcp
LCBidXQgLi4uDQo+DQo+PiArICAgIHsNCj4+ICsgICAgICAgIHZvaWQgKmNvbnN0ICp2YWw7DQo+
PiArICAgICAgICB1bnNpZ25lZCBpbnQgY2xvYmJlcmVkID0gMDsNCj4+ICsNCj4+ICsgICAgICAg
IC8qDQo+PiArICAgICAgICAgKiBUaGlzIGlzIHNvbWUgbWlub3Igc3RydWN0dXJlIChhYil1c2Uu
ICBXZSB3YWxrIHRoZSBlbnRpcmUgY29udGVudHMNCj4+ICsgICAgICAgICAqIG9mIC5pbml0Lnty
byx9ZGF0YS5jZl9jbG9iYmVyIGFzIGlmIGl0IHdlcmUgYW4gYXJyYXkgb2YgcG9pbnRlcnMuDQo+
PiArICAgICAgICAgKg0KPj4gKyAgICAgICAgICogSWYgdGhlIHBvaW50ZXIgcG9pbnRzIGludG8g
LnRleHQsIGFuZCBhdCBhbiBlbmRicjY0IGluc3RydWN0aW9uLA0KPj4gKyAgICAgICAgICogbm9w
IG91dCB0aGUgZW5kYnI2NC4gIFRoaXMgY2F1c2VzIHRoZSBwb2ludGVyIHRvIG5vIGxvbmdlciBi
ZSBhDQo+PiArICAgICAgICAgKiBsZWdhbCBpbmRpcmVjdCBicmFuY2ggdGFyZ2V0IHVuZGVyIENF
VC1JQlQuICBUaGlzIGlzIGENCj4+ICsgICAgICAgICAqIGRlZmVuY2UtaW4tZGVwdGggbWVhc3Vy
ZSwgdG8gcmVkdWNlIHRoZSBvcHRpb25zIGF2YWlsYWJsZSB0byBhbg0KPj4gKyAgICAgICAgICog
YWR2ZXJzYXJ5IHdobyBoYXMgbWFuYWdlZCB0byBoaWphY2sgYSBmdW5jdGlvbiBwb2ludGVyLg0K
Pj4gKyAgICAgICAgICovDQo+PiArICAgICAgICBmb3IgKCB2YWwgPSBfX2luaXRkYXRhX2NmX2Ns
b2JiZXJfc3RhcnQ7DQo+PiArICAgICAgICAgICAgICB2YWwgPCBfX2luaXRkYXRhX2NmX2Nsb2Ji
ZXJfZW5kOw0KPiAuLi4gdGhpcyBiZWluZyBtYWluIGJpbmFyeSBib3VuZGFyaWVzLCBubyBhY3Rp
b24gd291bGQgYmUgdGFrZW4gb24NCj4gdGhlIGxpdmVwYXRjaCBiaW5hcnkuIEhlbmNlIChhbHNv
IGR1ZSB0byBoYXZpbmcgYmVlbiBoZXJlIGJlZm9yZQ0KPiBkdXJpbmcgYm9vdCksIGFsbCB0aGF0
IEkgdW5kZXJzdGFuZCB3aWxsIGhhcHBlbiAuLi4NCj4NCj4+ICsgICAgICAgICAgICAgIHZhbCsr
ICkNCj4+ICsgICAgICAgIHsNCj4+ICsgICAgICAgICAgICB2b2lkICpwdHIgPSAqdmFsOw0KPj4g
Kw0KPj4gKyAgICAgICAgICAgIGlmICggIWlzX2tlcm5lbF90ZXh0KHB0cikgfHwgIWlzX2VuZGJy
NjQocHRyKSApDQo+PiArICAgICAgICAgICAgICAgIGNvbnRpbnVlOw0KPj4gKw0KPj4gKyAgICAg
ICAgICAgIGFkZF9ub3BzKHB0ciwgNCk7DQo+PiArICAgICAgICAgICAgY2xvYmJlcmVkKys7DQo+
PiArICAgICAgICB9DQo+PiArDQo+PiArICAgICAgICBwcmludGsoImFsdGNhbGw6IE9wdGltaXNl
ZCBhd2F5ICV1IGVuZGJyNjQgaW5zdHJ1Y3Rpb25zXG4iLCBjbG9iYmVyZWQpOw0KPiAuLi4gdGhh
dCB0aGlzIG1lc3NhZ2UgYmUgbG9nZ2VkIG9uY2UgcGVyIHBhdGNoIGxvYWQgKHdpdGggYSBudW1i
ZXINCj4gb2YgMCkuIEkgdGhpbmsgdGhlIGVuY2xvc2luZyBpZigpIHdhbnRzIHRvIGJlIGFtZW5k
ZWQgYnkNCj4gIiYmIHN5c3RlbV9zdGF0ZSA8IFNZU19TVEFURV9hY3RpdmUiLiBJZiB5b3UgYWdy
ZWUsIEkgY2FuIGVhc2lseQ0KPiBtYWtlIGEgcGF0Y2guDQoNCkhtbS7CoCBUaGVyZSBhcmUgb3Ro
ZXIgbGl2ZXBhdGNoaW5nIGZpeGVzIGdvaW5nIG9uLCBidXQgdGhleSdyZSBzdGFydGluZw0Kd2l0
aCBmaXhpbmcgdGhlIGJ1aWxkIHN5c3RlbSBicmVha2FnZS7CoCAoVGhlIG1ham9yIGxpdmVwYXRj
aGluZyBmaXggaXMNCnRvIGFkanVzdCBob3cgd2UgcGF0Y2ggYW4gb2xkIGZ1bmN0aW9uIHRoYXQg
aGFzIGFuIEVOREJSNjQgYXQgdGhlIHN0YXJ0LikNCg0KVGhhdCBzYWlkLCBhIGxpdmVwYXRjaCBu
ZWVkcyB0byBjb250YWluIGEgc2VjdGlvbiBlcXVpdmFsZW50IHRvDQpfX2luaXRkYXRhX2NmX2Ns
b2JiZXIsIHRvIGJlIHByb2Nlc3NlZCBkdXJpbmcgbG9hZCwgZGVwZW5kZW50IG9uDQpjcHVfaGFz
X3hlbl9pYnQuDQoNClBlcmhhcHMgdGhlIGJlc3Qgb3B0aW9uIGlzIHRvIGJyZWFrIHRoZSBjbG9i
YmVyIG91dCBpbnRvIGEgaGVscGVyIHRoYXQNCnRha2VzIGEgc3RhcnQvZW5kIHBhaXIgYW5kIHJl
dHVybnMgdGhlIG51bWJlciBjbG9iYmVyZWQuwqAgVGhhdCB3YXksIGl0DQpjYW4gYmUgcmV1c2Vk
IGJ5IHRoZSBsaXZlcGF0Y2ggbG9naWMsIGFuZCBpbmRlcGVuZGVudGx5IG9mIHRoaXMgcHJpbnRr
KCkuDQoNCn5BbmRyZXcNCg==


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 14:54:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 14:54:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281614.480018 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3tu-0007YJ-Jy; Tue, 01 Mar 2022 14:54:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281614.480018; Tue, 01 Mar 2022 14:54:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3tu-0007YC-Gj; Tue, 01 Mar 2022 14:54:54 +0000
Received: by outflank-mailman (input) for mailman id 281614;
 Tue, 01 Mar 2022 14:54:53 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nP3tt-0007Y6-RA
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 14:54:53 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 8cdf0156-996f-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 15:54:52 +0100 (CET)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04lp2056.outbound.protection.outlook.com [104.47.13.56]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-33-iUytBLa9P8e6U2MhzJ2smQ-1; Tue, 01 Mar 2022 15:54:51 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PA4PR04MB8064.eurprd04.prod.outlook.com (2603:10a6:102:cf::7) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.25; Tue, 1 Mar
 2022 14:54:49 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 14:54:49 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8cdf0156-996f-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646146492;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=JSzYXa+uvXP7Qbjc888Jb9bpDn0cbEJLg9c5rCWs+Xk=;
	b=Ml3b1ZKgvpEgZrVd05CowdUW6Cdz31MUORyT8b+JtMf4r7VVqsC2znh0Bgoeet77cdl/EF
	fklFJ0obAcnibaMuRH69P/RsgMlYH93EvXQ5adoRscJ0/AOiKFMD5Q15Wf4Y9zdo0nG6V7
	oxwLOYp0tGjuHJ2hgknA5b5JdQ9kaek=
X-MC-Unique: iUytBLa9P8e6U2MhzJ2smQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=chHom2qJAfCnO6VF5aT4EeqIgMOvUTCsQSgKmLA8EVw9OEMpNhmw/gGFAAx8JkW0BxrGtVn5KyXNyO74Lk4bFiTI9M73C2aFDa8Sqw0kPLB7i+iUTltvVtUNR8iwmqD6RBSkbqNzSnP8mItRSI2audaMJHvZEhe0JFezdaHlji+uYQyUijIFZaQl5jUdrPxCFT7GpcKw7irOyNZfUl+urkUe4SKIW8EYAK7QzP/bu3V52D2WPRyvT1lCKYaAAuQICwo8frSfassFq/ecw35bz5vlTkP9oYap3ccwzSnKl2gOK0wvC9CkOqv7D+4zJrcVv13sK4+wxaDmzBNvGUP30w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ijX2WpQj7tEuuyqNL6tA3cFiHwcdr+MngAW3Zh1Lo6s=;
 b=Ctb1JVmH062s3GGxyFe9/C8jA5EdSF4S3neFzar6AuV3ac1WDcNgZLdrQE1FfDCahBlyqUAsVepa5C/r+zv8CSt+EzPwyOsaujjTNt5x/WhFS0FrUUkwoicOpTzcs7t/q4fow+o2iSA8Adv6Va/g5pBsCqgX1s97E3EKvjq+dN9l3gbyhfQZLXpe6HG23iCH0WImh2+GYiAVTdLYkgKjdF3OSQ48ceWimwgnmjHPBGNGguNeTn1M46M1+CvQU31xxg6tYyWeVgTDHIT/QE+kSYRln9N7qpTTd1AcWmgeSXsZrXu82u9DS/2f+dbZ9XxgjTeyeKh+opxBn1+5T/E5lw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <6ee69f56-e37b-ee00-5705-231f8f300f5a@suse.com>
Date: Tue, 1 Mar 2022 15:54:47 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] x86/altcall: silence undue warning
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: Wei Liu <wl@xen.org>, Roger Pau Monne <roger.pau@citrix.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <0e3594ff-c637-46f2-bc95-7a26b5471b86@suse.com>
 <40306bc7-f61c-d330-0ec7-d986e4711d88@citrix.com>
 <06452eab-653b-458a-048b-cc709151353a@suse.com>
 <6f005e15-eb81-c41c-7296-4929e85eae21@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <6f005e15-eb81-c41c-7296-4929e85eae21@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR06CA0100.eurprd06.prod.outlook.com
 (2603:10a6:20b:465::11) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 7220b249-7756-47fd-ea1f-08d9fb936f5f
X-MS-TrafficTypeDiagnostic: PA4PR04MB8064:EE_
X-Microsoft-Antispam-PRVS:
	<PA4PR04MB8064E1D82F4BE31FE83BAAEAB3029@PA4PR04MB8064.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6512007)(53546011)(66476007)(66946007)(316002)(6506007)(66556008)(4326008)(2616005)(508600001)(8676002)(83380400001)(36756003)(86362001)(26005)(186003)(31686004)(6486002)(54906003)(6916009)(5660300002)(8936002)(2906002)(38100700002)(31696002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?7U7c98db4FZRy1M5qtW453tXCxoy64nP7JlGrQ/Osq24hIGeXdatTilf8oyk?=
 =?us-ascii?Q?/bdD0Q5rVnf/Pk8G/n8C1DDcRKdcpzM1/8JHm9H0Zqr11QPBwhk3GYV/955c?=
 =?us-ascii?Q?WUN2RDrMSW5DeZ33RddbmghsQCtq6mWMjnH2mKsNFHoh8+4DGtLDdgAqmF4V?=
 =?us-ascii?Q?f7lrg9xnryX4sjzxlbVk/1bPPaXwnSsRpLpqJZvEQAKQrrzNtFpGbIQJq3Gb?=
 =?us-ascii?Q?AWCML4h3RQXwoInPa+dDeYVclgGiflQyEJht8hBBfPJwzWkJVvX9IOKnmOcC?=
 =?us-ascii?Q?tGwwEdLtaTilYMxXTNiE2dBQ3J34T9Lr+kXgjrJLI2bz7eOYwZeWBxCi+Zki?=
 =?us-ascii?Q?tFJuncWTQgWkaj9wY7IiWH/ji1XZKLXqyd0pCE/ADaftU3J/vy8QEGCtINlc?=
 =?us-ascii?Q?lbvE9XFi4VniNfzTZjTkMWnlQdXsr1CkVLk6FWXhQ0DPJ5ayusiZ85QLnW3u?=
 =?us-ascii?Q?VbCnkUKC+4zNmBIsxBSePMfQHtgggsA2K8tF8nrt/gMwCGvRu1dVNTups2Dr?=
 =?us-ascii?Q?eMdzZItUvPOVIKe+v6cTsZDzzpFiNCFGRe477xipBFuwu7dZ8SoXhg9FMatD?=
 =?us-ascii?Q?BQKDhe4B1Hlb/+5KwzyN7pLtlUu1IoDjm5hW7NlR7Fy6fLfr71GWkn8zTzTt?=
 =?us-ascii?Q?aDKLpyhR7y23E+Ck1ycRT6BkBiDStU8JqS5mbnDvyrUCWeUcB0HOwnDRLAiG?=
 =?us-ascii?Q?rdjRviQpw83AavThYqXzJAKCdcHmtcWdUl6mg+8/8BKP6AF5qgRZ0e+acDAJ?=
 =?us-ascii?Q?O/dwlR9lLA1ru8DTbN/Ix1pkQ/pBgCR8L+96maEB3xhVw2fmxF2qyRwoNIvJ?=
 =?us-ascii?Q?luhb9EOWOOiOVE0BbVD9x5mCgg7SdbDSoqNKjilukoWtZ7CVYHdrB2ezYGcs?=
 =?us-ascii?Q?yMm2JFYvs0CeUWa9mH51HqYjOrPACONk1wynMoueVnSuf1eqLMAAHNU2igtH?=
 =?us-ascii?Q?2vBdkXAfR8xCRbhWnkp3Zv109acK6tUpWoc0ulwZBHqGutzD6Xsh1pKi6xcr?=
 =?us-ascii?Q?IMli8y3kwqHVk9x8bX6HWH8U7OvJx6ThbCBJcCAcnLylP0uBaFvU1wfn00Ec?=
 =?us-ascii?Q?q2Vv6XI/BBubDZFntj61F2sW4YXxIXZNQHogP9Ylx1TW522RAO1G7FYPv7fE?=
 =?us-ascii?Q?ls0yvMUTjk595Jls9PeZLBGDUeWtUJbtsBAUPLDyvZwIzQBKhjMXxIPMlj4E?=
 =?us-ascii?Q?SZ6tuecDFzmEjT3+hknTwSZUDMMWCt7BddrcBVcqIcQAkDORMkZRf9F0rhAa?=
 =?us-ascii?Q?W9DJWVtwfOOZcXgdxPOIrcgynarIetlK/d07BfjJUeCCO6WeihmjpoV8tC/K?=
 =?us-ascii?Q?Hoi2s27HINzsuigws193L4D/Ox9IF6IE+j+W5zezfJN2ggdbwCLY59TyrHEO?=
 =?us-ascii?Q?SPKGgkNxig/CBsPg8GMXxDLYG6gdhrck6ICk25ZKYBlz4B/W9FpYjHkKbi9c?=
 =?us-ascii?Q?Mt6ep7P5+3do0eQVqxiRGaWLc8Ufl36B58cJm/OCrOVJbK/fzV2tNcGQOO7X?=
 =?us-ascii?Q?d3u7mkWBJwn/RkHIYygeNdFDAcfhjmjQ3HRgPqR+2+b7Fh7XapFF/A6FB2Y6?=
 =?us-ascii?Q?Qimaycldt8jnDwTSwcpRPXZkyOs/EunBrE7H3Hcd6RvrzHDKiQavImizOt2s?=
 =?us-ascii?Q?GoN1wYqbG/MfdM0DweNHOJA=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7220b249-7756-47fd-ea1f-08d9fb936f5f
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 14:54:49.8363
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: KBcrWwbk3FOmmvMw4F16HLh8pWci165ACsXkqIwOt5cA93LUEjk7i+jfSmwY9wPHYNr3ykN2fQqY2hH1Qax4Ww==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR04MB8064

On 01.03.2022 15:23, Andrew Cooper wrote:
> On 01/03/2022 13:34, Jan Beulich wrote:
>> On 01.03.2022 13:48, Andrew Cooper wrote:
>>> On 01/03/2022 11:36, Jan Beulich wrote:
>>>> Suitable compiler options are passed only when the actual feature
>>>> (XEN_IBT) is enabled, not when merely the compiler capability was foun=
d
>>>> to be available.
>>>>
>>>> Fixes: 12e3410e071e ("x86/altcall: Check and optimise altcall targets"=
)
>>>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>>> Hmm yes.=C2=A0 This is fallout from separating CONFIG_HAS_CC_CET_IBT an=
d
>>> CONFIG_XEN_IBT.
>>>
>>> Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
>> Thanks.
>>
>>>> ---
>>>> Furthermore, is "Optimised away ..." really appropriate in what
>>>> 37ed5da851b8 ("x86/altcall: Optimise away endbr64 instruction where
>>>> possible") added? If this really was an optimization (rather than
>>>> hardening), shouldn't we purge ENDBR also when !cpu_has_xen_ibt, and
>>>> then ideally all of them? Whereas if this is mainly about hardening,
>>>> wouldn't the message better say "Purged" or "Clobbered"?
>>> I did have an RFC about this.=C2=A0 Turning ENDBR into NOP4 matters, on=
 a
>>> CET-IBT-active system, to restrict the available options an attacker ha=
s
>>> when they have already managed to hijack a function pointer (i.e.
>>> already got a partial write gadget).
>>>
>>> From that point of view, it is hardening.
>> But then you don't say whether there's any optimization aspect here.
>> My question was really about the wording of that log message.
>=20
> The optimisation aspect is direct branch target +4, because that is what
> saves on decode bandwidth.

But that's the other, entirely independent ENDBR-related piece of code in
the function. All we do in the loop ahead of emitting the message here is
"add_nops(ptr, ENDBR64_LEN)". There's no counting at all of how many
times we advance a call target by 4.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 14:57:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 14:57:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281623.480036 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3w5-0008NR-4J; Tue, 01 Mar 2022 14:57:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281623.480036; Tue, 01 Mar 2022 14:57:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3w5-0008NK-0P; Tue, 01 Mar 2022 14:57:09 +0000
Received: by outflank-mailman (input) for mailman id 281623;
 Tue, 01 Mar 2022 14:57:07 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=BNgs=TM=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nP3w3-0008My-4O
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 14:57:07 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04on0627.outbound.protection.outlook.com
 [2a01:111:f400:fe0e::627])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id dbe10499-996f-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 15:57:05 +0100 (CET)
Received: from AM6PR04CA0022.eurprd04.prod.outlook.com (2603:10a6:20b:92::35)
 by VE1PR08MB5615.eurprd08.prod.outlook.com (2603:10a6:800:1b3::23)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.22; Tue, 1 Mar
 2022 14:57:02 +0000
Received: from VE1EUR03FT043.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:92:cafe::8) by AM6PR04CA0022.outlook.office365.com
 (2603:10a6:20b:92::35) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.13 via Frontend
 Transport; Tue, 1 Mar 2022 14:57:02 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT043.mail.protection.outlook.com (10.152.19.122) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Tue, 1 Mar 2022 14:57:02 +0000
Received: ("Tessian outbound 826a6d8e58c3:v113");
 Tue, 01 Mar 2022 14:57:01 +0000
Received: from 2123dd14850d.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 CCA1B9B7-9360-4DD4-8B39-FD90FAD0D9AA.1; 
 Tue, 01 Mar 2022 14:56:55 +0000
Received: from EUR03-VE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 2123dd14850d.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 01 Mar 2022 14:56:55 +0000
Received: from AM0PR08MB3778.eurprd08.prod.outlook.com (2603:10a6:208:104::24)
 by HE1PR0801MB1675.eurprd08.prod.outlook.com (2603:10a6:3:87::7) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Tue, 1 Mar
 2022 14:56:52 +0000
Received: from AM0PR08MB3778.eurprd08.prod.outlook.com
 ([fe80::4dbb:4fed:bc86:1803]) by AM0PR08MB3778.eurprd08.prod.outlook.com
 ([fe80::4dbb:4fed:bc86:1803%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 14:56:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: dbe10499-996f-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=WMo1hLmk0qH/EB55HU7/OnIZLjY9f/TCFdkVU0IOvuU=;
 b=twf5ZRYA5mDhOu+ycKsmocpAf6+/wEhTlTS8QCppKFYLDnhVYABPoGdwkcc7ik1l5Z7qwJeN5bll08b09hhOaElbTKslKMJ/d37Gnl5IJvW/b17gU9cZcB5S0FxQrHM6TKeurZMfKIE1tpAqx7eC0KRB/qSrmPNgRjQ19u0S8qw=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: ac41b1ebd037f7db
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=dwZ8ToyfGnaSkHm+Ya4iI5RNUMkode7abK0XCsk+RnujlwBVsJ/B8fxMP2eH3Smr3SmVkrEhYxjA4GK9PISGC3yHWTUXoF0HsJlJ/SbicIT5zX33+1hXKtSNmQZ9UdoxDw7dZGPrNmfr9WR5tGqTmPjOTccWWGODc3hpwSnLMCn/bTIYEo4Y0W4ITvQZddXT2XoJowOxfKM5y6ugpvzMkWjTd3alHDaFOEoifLN+LMWApIsFaCwC7harSOXfxYMB9YPYlCYiPMdpfo3shit22Iqp7M/2B5NTdVnedELZ6G8bYgreNQ/8JhPzgoXsbj+D181y2mq42AkPv4z1ajjTqw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=WMo1hLmk0qH/EB55HU7/OnIZLjY9f/TCFdkVU0IOvuU=;
 b=f6c4cWZ7kxk3mouMoNBvNzMGgtpQn4+zrmqDa+sUYSF2PS01GpMdijtX9BvkqGAESDnxo75SVmPsMvrcEB/OJz01PY6O/qQuryya36syQy5TIV4GbvoVRzWqNJ8xVOFMYgNbE6N+VR26joadrCKJAllz+8u7L8mhTwHf/9yoi14nJ6bP2i9v+jSAUztqzaM/C30epm8oJL7DJJTdCYlEc7Pjr7122T/roOYn9nbFnUahcUrIZRtJ2AjIHZgGd26AgoSo4uNJjAWb+3KhN0wK5UhFcSgsBiYi2diqh/FHIkpofx0proXf7LklYHP9poq3R1f7o5JpN5HOcD6lSQSo1w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=WMo1hLmk0qH/EB55HU7/OnIZLjY9f/TCFdkVU0IOvuU=;
 b=twf5ZRYA5mDhOu+ycKsmocpAf6+/wEhTlTS8QCppKFYLDnhVYABPoGdwkcc7ik1l5Z7qwJeN5bll08b09hhOaElbTKslKMJ/d37Gnl5IJvW/b17gU9cZcB5S0FxQrHM6TKeurZMfKIE1tpAqx7eC0KRB/qSrmPNgRjQ19u0S8qw=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Julien Grall <julien@xen.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Julien
 Grall <jgrall@amazon.com>, Stefano Stabellini <sstabellini@kernel.org>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH] xen/arm64: head: Mark the end of subroutines with ENDPROC
 (take two)
Thread-Topic: [PATCH] xen/arm64: head: Mark the end of subroutines with
 ENDPROC (take two)
Thread-Index: AQHYLIsbZnt9ucibr0G+vW8JMwB0sqyqoBUA
Date: Tue, 1 Mar 2022 14:56:52 +0000
Message-ID: <A5C64930-A718-4F9B-99BE-F8389EE5722C@arm.com>
References: <20220228100805.60918-1-julien@xen.org>
In-Reply-To: <20220228100805.60918-1-julien@xen.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 6dfd0050-63a5-46a5-12ba-08d9fb93be5c
x-ms-traffictypediagnostic:
	HE1PR0801MB1675:EE_|VE1EUR03FT043:EE_|VE1PR08MB5615:EE_
X-Microsoft-Antispam-PRVS:
	<VE1PR08MB56155DBF0F7BF960685AE6109D029@VE1PR08MB5615.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3778.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(71200400001)(6486002)(33656002)(83380400001)(86362001)(508600001)(38070700005)(2616005)(6506007)(54906003)(6916009)(66446008)(53546011)(64756008)(4326008)(66556008)(76116006)(66946007)(8676002)(26005)(186003)(6512007)(91956017)(66476007)(316002)(38100700002)(2906002)(36756003)(122000001)(5660300002)(8936002)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <5D097B401A9A204E90868CD84E3D6C82@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0801MB1675
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT043.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	a357c5c3-f99f-47c6-df27-08d9fb93b8a7
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(316002)(5660300002)(2616005)(107886003)(6506007)(336012)(8936002)(86362001)(82310400004)(70206006)(70586007)(8676002)(2906002)(26005)(186003)(33656002)(4326008)(36756003)(356005)(81166007)(6486002)(53546011)(508600001)(83380400001)(54906003)(36860700001)(6512007)(47076005)(40460700003)(6862004);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 14:57:02.1027
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 6dfd0050-63a5-46a5-12ba-08d9fb93be5c
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT043.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR08MB5615

Hi Julien,

> On 28 Feb 2022, at 10:08, Julien Grall <julien@xen.org> wrote:
>=20
> From: Julien Grall <jgrall@amazon.com>
>=20
> Commit 13c03002c5df ("xen/arm64: head: Mark the end of subroutines
> with ENDPROC") intended to mark all the subroutines with ENDPROC.
>=20
> Unfortunately, I missed fail(), switch_ttbr() and init_uart(). Add
> ENDPROC for the benefits of static analysis tools and the reader.
>=20
> Signed-off-by: Julien Grall <jgrall@amazon.com>
Reviewed-by: Bertrand Marquis <bertrand.marquis@arm.com>

Cheers
Bertrand

> ---
> xen/arch/arm/arm64/head.S | 3 +++
> 1 file changed, 3 insertions(+)
>=20
> diff --git a/xen/arch/arm/arm64/head.S b/xen/arch/arm/arm64/head.S
> index 314b800b3f8e..66d862fc8137 100644
> --- a/xen/arch/arm/arm64/head.S
> +++ b/xen/arch/arm/arm64/head.S
> @@ -800,6 +800,7 @@ ENDPROC(launch)
> fail:   PRINT("- Boot failed -\r\n")
> 1:      wfe
>         b     1b
> +ENDPROC(fail)
>=20
> GLOBAL(_end_boot)
>=20
> @@ -830,6 +831,7 @@ ENTRY(switch_ttbr)
>         isb
>=20
>         ret
> +ENDPROC(switch_ttbr)
>=20
> #ifdef CONFIG_EARLY_PRINTK
> /*
> @@ -847,6 +849,7 @@ init_uart:
> #endif
>         PRINT("- UART enabled -\r\n")
>         ret
> +ENDPROC(init_uart)
>=20
> /* Print early debug messages.
>  * x0: Nul-terminated string to print.
> --=20
> 2.32.0
>=20



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 14:58:05 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 14:58:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281631.480047 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3wy-0000Yg-HO; Tue, 01 Mar 2022 14:58:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281631.480047; Tue, 01 Mar 2022 14:58:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3wy-0000YZ-DQ; Tue, 01 Mar 2022 14:58:04 +0000
Received: by outflank-mailman (input) for mailman id 281631;
 Tue, 01 Mar 2022 14:58:03 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=BNgs=TM=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nP3ww-0000Vt-VX
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 14:58:03 +0000
Received: from EUR02-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur02on061b.outbound.protection.outlook.com
 [2a01:111:f400:fe06::61b])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id fddccaf0-996f-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 15:58:02 +0100 (CET)
Received: from AM6P191CA0079.EURP191.PROD.OUTLOOK.COM (2603:10a6:209:8a::20)
 by AM0PR08MB3204.eurprd08.prod.outlook.com (2603:10a6:208:5d::33) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.24; Tue, 1 Mar
 2022 14:58:00 +0000
Received: from VE1EUR03FT053.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:8a:cafe::c9) by AM6P191CA0079.outlook.office365.com
 (2603:10a6:209:8a::20) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.13 via Frontend
 Transport; Tue, 1 Mar 2022 14:58:00 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT053.mail.protection.outlook.com (10.152.19.198) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Tue, 1 Mar 2022 14:58:00 +0000
Received: ("Tessian outbound 63bb5eb69ee8:v113");
 Tue, 01 Mar 2022 14:57:59 +0000
Received: from 1297990f98b1.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 969F2B92-8224-46A0-B9FE-990DA1FEE08D.1; 
 Tue, 01 Mar 2022 14:57:54 +0000
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 1297990f98b1.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 01 Mar 2022 14:57:54 +0000
Received: from AM0PR08MB3778.eurprd08.prod.outlook.com (2603:10a6:208:104::24)
 by PAXPR08MB7365.eurprd08.prod.outlook.com (2603:10a6:102:225::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Tue, 1 Mar
 2022 14:57:51 +0000
Received: from AM0PR08MB3778.eurprd08.prod.outlook.com
 ([fe80::4dbb:4fed:bc86:1803]) by AM0PR08MB3778.eurprd08.prod.outlook.com
 ([fe80::4dbb:4fed:bc86:1803%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 14:57:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fddccaf0-996f-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=F0o4CclDFBM/vYkNxNk52Pf4Zvl4PzYaQgACplhV06M=;
 b=Zzj2ZsxR7weHIcVZF98IIaEyyVwOl2Mu3DBNAeeMci/MRlxXscmd451tNvqPl4LYfocWeshRknhaOX09+oO8u2KAZ3YHyWKHtLImsNuzippgdor7KdgHiZHUcx4DRY+0HRhLfcwdO4QQ5VpAF8MKM/wDxWWVKE4ueHiv2KMT7hA=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 2e52b09017e24f9a
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=OgLcxz8yjKpe3EYkBQTvATaz/kA3ly6E/hNbIkO50uLrxjhlOutnIG+BDud5H1eD4cCpBMgrKLtcG8g5kgGUuB+LTkQl96FNY0DYL0XTGgEjWKzNrYOf5KgeAvGfVcmfktr3jHFFApjwPQNPO0yfbT4ZldbWB6otRch3YDw7MTW2VVsRbX4qx1gzNSVOElPWfBxdR4n9vdY73W6qwzr6vT3u0TIFCkpnJOQPT5L/DEUDKk32U840Pxm4hMqitdUiFe3ud+9PuRp5t7lGu8Fj/BjUaBjOKsgrHkFlbQ6gIwaRnbwZPzosZbdhD9gRZC9miiQYwPQfZ70mZ69bQ08LnA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=F0o4CclDFBM/vYkNxNk52Pf4Zvl4PzYaQgACplhV06M=;
 b=dxkHk8Iw+v00Y75gKIUNUsoaXVzIld7DmMqb7lqTs3Z8nxdn1gNGTbHI8L0HKhSAeRfu/Um/R//jm/f8QYg7HWhVy1fz+eeCJmy6dD5YxDkIWM/B5qqLNq+FWlih5yhjZvoC/E0Dl5mn7shyLK3U6M76HQe1BVCPMhISUYXzox0hFwuPeI90DUtwQvFiGPw8uBWIBR86C5ynBHM629vN39WlIP6DukJ6YKcRDDi17bpfUbkP2iVLwhRo6vMzwmdns0Fiz17MpSCIzhH2Y6hyvB0CAHudMIKJnmcaalOmOQUe+33dXpfLfI+hsSmm25P2SjdprrSFm4bmOXeOy6WStA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=F0o4CclDFBM/vYkNxNk52Pf4Zvl4PzYaQgACplhV06M=;
 b=Zzj2ZsxR7weHIcVZF98IIaEyyVwOl2Mu3DBNAeeMci/MRlxXscmd451tNvqPl4LYfocWeshRknhaOX09+oO8u2KAZ3YHyWKHtLImsNuzippgdor7KdgHiZHUcx4DRY+0HRhLfcwdO4QQ5VpAF8MKM/wDxWWVKE4ueHiv2KMT7hA=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Julien Grall <julien@xen.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Julien
 Grall <jgrall@amazon.com>, Stefano Stabellini <sstabellini@kernel.org>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH] xen/arm32: head: Mark the end of subroutines with ENDPROC
 (take two)
Thread-Topic: [PATCH] xen/arm32: head: Mark the end of subroutines with
 ENDPROC (take two)
Thread-Index: AQHYLIsQ1/MnnQEZyUi9t6TTCfZIq6yqoFuA
Date: Tue, 1 Mar 2022 14:57:51 +0000
Message-ID: <0A2ACFE7-5B4C-41F5-8B3C-AF49FE635487@arm.com>
References: <20220228100740.60332-1-julien@xen.org>
In-Reply-To: <20220228100740.60332-1-julien@xen.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 26747966-9bbe-45b2-d566-08d9fb93e0ee
x-ms-traffictypediagnostic:
	PAXPR08MB7365:EE_|VE1EUR03FT053:EE_|AM0PR08MB3204:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR08MB3204C70613D90B7815A4F9879D029@AM0PR08MB3204.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3778.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(122000001)(4326008)(8936002)(8676002)(5660300002)(38100700002)(6512007)(71200400001)(2906002)(6506007)(38070700005)(6486002)(53546011)(508600001)(36756003)(86362001)(64756008)(6916009)(54906003)(316002)(83380400001)(2616005)(26005)(186003)(66946007)(33656002)(91956017)(66446008)(76116006)(66556008)(66476007)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <67650794060AE844BD958BB54DAA5573@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB7365
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT053.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	eb82adbd-c87a-404c-fec7-08d9fb93dbd1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(6506007)(6512007)(53546011)(508600001)(6486002)(40460700003)(54906003)(81166007)(356005)(70586007)(70206006)(8676002)(47076005)(83380400001)(82310400004)(26005)(2906002)(107886003)(6862004)(186003)(336012)(4326008)(2616005)(8936002)(33656002)(5660300002)(36860700001)(316002)(86362001)(36756003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 14:58:00.0742
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 26747966-9bbe-45b2-d566-08d9fb93e0ee
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT053.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB3204

Hi Julien,

> On 28 Feb 2022, at 10:07, Julien Grall <julien@xen.org> wrote:
>=20
> From: Julien Grall <jgrall@amazon.com>
>=20
> Commit 2ac705a59ef5 ("xen/arm32: head: Mark the end of subroutines
> with ENDPROC") intended to mark all the subroutines with ENDPROC.
>=20
> Unfortunately, I missed fail(), switch_ttbr(), init_uart() and
> __lookup_processor_type(). Add ENDPROC for the benefits of
> static analysis tools and the reader.
>=20
> Signed-off-by: Julien Grall <jgrall@amazon.com>
Reviewed-by: Bertrand Marquis <bertrand.marquis@arm.com>

Cheers
Bertrand

> ---
> xen/arch/arm/arm32/head.S | 4 ++++
> 1 file changed, 4 insertions(+)
>=20
> diff --git a/xen/arch/arm/arm32/head.S b/xen/arch/arm/arm32/head.S
> index b1d209ea2842..13cfc837d39c 100644
> --- a/xen/arch/arm/arm32/head.S
> +++ b/xen/arch/arm/arm32/head.S
> @@ -661,6 +661,7 @@ ENDPROC(launch)
> fail:   PRINT("- Boot failed -\r\n")
> 1:      wfe
>         b     1b
> +ENDPROC(fail)
>=20
> GLOBAL(_end_boot)
>=20
> @@ -694,6 +695,7 @@ ENTRY(switch_ttbr)
>         isb
>=20
>         mov pc, lr
> +ENDPROC(switch_ttbr)
>=20
> #ifdef CONFIG_EARLY_PRINTK
> /*
> @@ -711,6 +713,7 @@ init_uart:
> #endif
>         PRINT("- UART enabled -\r\n")
>         mov   pc, lr
> +ENDPROC(init_uart)
>=20
> /*
>  * Print early debug messages.
> @@ -798,6 +801,7 @@ __lookup_processor_type:
>         mov   r1, #0
> 2:
>         mov   pc, lr
> +ENDPROC(__lookup_processor_type)
>=20
> /*
>  * Local variables:
> --=20
> 2.32.0
>=20



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 14:58:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 14:58:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281632.480058 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3x4-0000sP-PK; Tue, 01 Mar 2022 14:58:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281632.480058; Tue, 01 Mar 2022 14:58:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3x4-0000sI-ME; Tue, 01 Mar 2022 14:58:10 +0000
Received: by outflank-mailman (input) for mailman id 281632;
 Tue, 01 Mar 2022 14:58:09 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nfYH=TM=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nP3x3-0000rR-D1
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 14:58:09 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 0159fdd0-9970-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 15:58:08 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2105.outbound.protection.outlook.com [104.47.17.105]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-7-Ef4FgCsSNMCwDjXCLyMM1A-1; Tue, 01 Mar 2022 15:58:07 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR0401MB2431.eurprd04.prod.outlook.com (2603:10a6:800:2a::24)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.25; Tue, 1 Mar
 2022 14:58:04 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5017.027; Tue, 1 Mar 2022
 14:58:04 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0159fdd0-9970-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646146687;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=ztmfq5fITsOk3cRhkKnyEXijrKpo+rZWlcUJd0hVKZw=;
	b=U0Zc5qzxhgWMd+/zhR3cvI72kQbvQKVrxfdFyO0nWna9yKvfaV3iA8vs82J4m+VGQqB1xB
	eWqB5YDXBH9xpDLFRmW1tgRjCkpDIQej0iMeTbKMxupLK09P9NP5dbYgj9zN8HZXZ176zY
	t/QDUCunOzS2/oqupQab6CY8RQaZZgA=
X-MC-Unique: Ef4FgCsSNMCwDjXCLyMM1A-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=YrcMjknU0DDePEJoRvWfkRUV8Gc333BhnZf+xx5uonIqZLuLTRcdZuQqppZXpeU0oPeC3WU2A94Ozihzryij4ioujID4i5InZAedJkUyEstVUBe1ZNP8DFjjSFTedIct3+cN3fd+YCDToXA2PFOyZtbqAz0AdtkJnbgrMWxsWZRNfpf0CxGP8NB2j/xCRrCAHTWv1pu4AZ9wvMmGu8OF03kxbirrE/IA90d6fBNjORO2/ewlbG74DtjFHWB1So5ZS3mitekAO6eKW7//oZ47SVkMUYxzL0M6ZApGZiaOWOI1C1h80brW+cD8lFux/dP4GkT5ru42Azlw/5maGaUX6Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=am9EStbXSqHKqU0MT/hvArx+4c4Jvx/vCLeo3n2ngx0=;
 b=DwUqpbd6okEoR/EjzF0E17B9RKu/Hvx8GDwmVYdxiYqR6vci4M1DVJXgDSpTS2b7u4h3GSLcDK4AxfdMF0E60BR1pceKgWb2FsS2I+34T3tWU9PNJTx+J9r0WQ4as62axrk1IRCgAunXhtaIbCmDfPjKBcjwgfL66da1lWUyJlzseuHE/pfPBwOx9GmKd8HEvJjXwYsSABFT4PsfPpH6OP/mbcP2KChEZ3wZ7QMlO0NVD5LGWRLtaADqVhHHkYgHKJgkmuxFmdZbNqfavDPv10XThCrNEyuP9Mc3QXtpt1ZglVWL/KAsS/EN04ZSMBM3fIbD6tCshf8yN+Oepzsd1A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <bf6f400f-9901-aad4-77e6-56333992a76d@suse.com>
Date: Tue, 1 Mar 2022 15:58:02 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v2 3/7] x86/altcall: Optimise away endbr64 instruction
 where possible
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <20220214125632.24563-1-andrew.cooper3@citrix.com>
 <20220214125632.24563-4-andrew.cooper3@citrix.com>
 <2808e805-60a7-2f1e-0ff4-8da123c79afd@suse.com>
 <eaa7f36f-f8b8-604a-9d97-6cadadbe6eb3@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <eaa7f36f-f8b8-604a-9d97-6cadadbe6eb3@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9P194CA0017.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:20b:46d::33) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 96722ba8-581e-4301-b895-08d9fb93e35a
X-MS-TrafficTypeDiagnostic: VI1PR0401MB2431:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR0401MB2431230E255A430B9038B506B3029@VI1PR0401MB2431.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	AREPU62mRoOSOuId9LRNsn9FkoDTXHd1L7NBBX0hYEb2cY4S7v1bwUCRuId6+CApun9s6Cp+Hjzcj4F2XnttM/P6/BmZT4xKQhmwrYC9GeTnHsNBYe5EuS7lrx7JB7MBtq5tgCNGgWlwOIbPTyMmCk/8A7m3DzqbxLmVM6uYS6NReFiDSptD0ct1i4/d25lLiu8A8qb/NYrp6pgVcM7F9ihEFP+8d4e2hjI1pY7GAJGbkgAOvpsvBuni3S7qmysDmd5fh31D4jkzdITQE8ahstFpBIW2qm5fAHMtyYSFAg1T7qL3MJPXP12OuUn6UfwH+7Xw3pEWlfRyOaRRyEv2TphwGVIhrSlyoiXPgPJ6gLFnsGAckoicTYa4eKsER6rpzunNCj3XK5Q8R0qSbFa6YtWr7YZibfzYX8D5rryHWxs/Eei7ihYj4a9Mv0F0ofSd/Eldz3rCAkAA/0W4JZzdGFle7vvl/PNcGxhXl5JnWVhjywBUxV+3+2xu0FKRSUnwxqsit1p/UbEspt+q+ok9zFtTmE/MU+8IiKZerdgPsYvIErglnR7OGWzaaQN+DxtOSh2JGsBIYyQzt/nbNFmN3PEP1APLzrhNeHCq76hSstBQ6pOgn3RPxEqiI75hDQO/sItquyBbHx56oYckg/1vxTSnm3Q+2PAgcff46+ml7v1CR+1dznmSRcoadeARqv8VZyBlu/iuyAiO28x8Sd72zx15u+sJi74XG5S09GsIwxQ=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(53546011)(66946007)(66476007)(54906003)(66556008)(31686004)(86362001)(5660300002)(508600001)(83380400001)(4326008)(8676002)(6512007)(38100700002)(36756003)(31696002)(2906002)(316002)(6486002)(8936002)(6916009)(186003)(26005)(6506007)(2616005)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?m7hO/U7iKMtOAWX6+VR7lR0l8FT0sH2UYi7NQc4JkLZWFNXf8m5A7KrE3lag?=
 =?us-ascii?Q?zIwWABwzeMlp295/HEMynua6uSxL9yFjEuXXneX1NNAzgdTBg6ivrvqey2Qk?=
 =?us-ascii?Q?CsOu1/AZetBcBR/HgW6/nhoMFEwRB3xFWCuGBUrXXp/NwzRzhJdVYaPKO/hE?=
 =?us-ascii?Q?vPDhWoaeEhFN5nA0KQkf9jrRHPsqm52wgomxIgSjM7LNyK99HlJMvzcf3gpQ?=
 =?us-ascii?Q?u0LYKvPWFDW0lcfAo/paS9bfS/TjjdV9/A96MtkHqfnZExRSq3qP6BkCmf0C?=
 =?us-ascii?Q?bOUo0F8AuXI0xab9RZd8eV1TJcg0u1By+bhTWP45GpZQZNXP5oCDOya1S0Ki?=
 =?us-ascii?Q?AuGq79x+N9yRvzh9O9anQaekDLhUw13xz9ijWuhESNuH4YLrpIEVFaB5M1Ng?=
 =?us-ascii?Q?4kh7KBG4V1qpTBONXUWXQuYLcKq9+5DR3Cwvq4BK4Kb+pOICipxcYS6+TcAv?=
 =?us-ascii?Q?0+A1zr+RM2rqwuBSGlzbX/pEwuF2QCRJ2wp2QiiwWg/76RA45zeVJAxzy8e0?=
 =?us-ascii?Q?7aA9EknmKbvY2c5Mv52Yy8kNjjqNriEjQ/qxBnzzmMrH6wXixvhXJRCDcXiH?=
 =?us-ascii?Q?/Qs1FGVOAm3jBsNayObQT1qjYPfIIHcx3N5v5Mgh10hUXpNeJVu423VhIbKW?=
 =?us-ascii?Q?0JKqRUB/h2jdYyhthgKJm0c7uBU+EIJXzuLTslwN7nXxRYbZG5F9cd7uPHQq?=
 =?us-ascii?Q?PPVZQAxGkPw85NnOBwN8kANfvSuyeLjFGAKe1AtNz+6h7wS3St4aORxxbmUQ?=
 =?us-ascii?Q?Zc1lo+Sqb9/PPbgKZycytiCQ4bf34WvxL8gCZoEq+80A/j169zHE45/AxdMr?=
 =?us-ascii?Q?x/cKeEGVSDUZl6/6JpJg3Dm3QlCOiCMkh+/2d6M8R8FcbeVMcsdTHVtLyfGP?=
 =?us-ascii?Q?vKE2seoJ9/bbFbBkjqJ+GMpqtwxtgM5hL9aRMpJFwUV/q5M+Nz/dNz5SkiwJ?=
 =?us-ascii?Q?YOWPK2LC9RSj1Vt60KMXtmIPB5z+y+raN2EufwtzT4oP1OApUzZLjnUQJh+E?=
 =?us-ascii?Q?YeRiILDjATGOLKD5sKvUmTSl1VJmQ+M0E0Ba9oEiSokqQXNNZ9kDJlX30wxq?=
 =?us-ascii?Q?lAL3Vjbf807qCmisj88WuRUxRGodwQYnSxwtssYmyYg1wkjnL5A0u3GA/v7b?=
 =?us-ascii?Q?UYZUVMbfA44C7JALzc8SwoikFfR+jRzEZHLX1009qPXAXXzrIFJFxGh4PgSG?=
 =?us-ascii?Q?ir+XM05Lo8RRKBJw3c+GMxkC0Tnor07ElxtF/V9Ohm3/SItB/I+M+rWsxKTA?=
 =?us-ascii?Q?S3WYVjk9wC+Wp9El6RwP68dQZzl/+7mdW82oBO2oX/S5SZWwdse7lmQXr3O7?=
 =?us-ascii?Q?4SC6zxxJbM5vL3Orlt9MgfikEg2bKl6Yk1KNT6MF33u3UWmVB+DjdHRi6Wcl?=
 =?us-ascii?Q?jK99VT09Gz3vDj5IpBho8yLH/EL8gqmyJga441eLeAFd9DcpKdHsB4XGvxtR?=
 =?us-ascii?Q?lScim8Uvo+6bI2WU9fPuqRQ808lxoGmho3FibqnXrYvq0rPoWZyabvvD/I40?=
 =?us-ascii?Q?f2weCPCyi4as5tbLWyB+N33cDkxZbTGij/O518L1ixAL78vy5nOGpWMvuvDP?=
 =?us-ascii?Q?qptV+zDRSJvqT7Gm8kfZhKimY28GtNKXeXJE70d/oNzPsJ0T7LUtLXHFmA/h?=
 =?us-ascii?Q?ZGrIuLgDV1DqifGb0/vAxZw=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 96722ba8-581e-4301-b895-08d9fb93e35a
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 14:58:04.4492
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 1ud7AS495cBgQ5VBGPi3ANRk95yai57qL6rovlowViipB9kiq/g389eqZJ2GRGDxfQNfKnO5FpLnQVSk2nhf+Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0401MB2431

On 01.03.2022 15:51, Andrew Cooper wrote:
> On 01/03/2022 11:59, Jan Beulich wrote:
>> On 14.02.2022 13:56, Andrew Cooper wrote:
>>> @@ -330,6 +333,41 @@ static void init_or_livepatch _apply_alternatives(=
struct alt_instr *start,
>>>          add_nops(buf + a->repl_len, total_len - a->repl_len);
>>>          text_poke(orig, buf, total_len);
>>>      }
>>> +
>>> +    /*
>>> +     * Clobber endbr64 instructions now that altcall has finished opti=
mising
>>> +     * all indirect branches to direct ones.
>>> +     */
>>> +    if ( force && cpu_has_xen_ibt )
>> Btw, this is now also entered when the function is called from
>> apply_alternatives() (i.e. when livepatching), but ...
>>
>>> +    {
>>> +        void *const *val;
>>> +        unsigned int clobbered =3D 0;
>>> +
>>> +        /*
>>> +         * This is some minor structure (ab)use.  We walk the entire c=
ontents
>>> +         * of .init.{ro,}data.cf_clobber as if it were an array of poi=
nters.
>>> +         *
>>> +         * If the pointer points into .text, and at an endbr64 instruc=
tion,
>>> +         * nop out the endbr64.  This causes the pointer to no longer =
be a
>>> +         * legal indirect branch target under CET-IBT.  This is a
>>> +         * defence-in-depth measure, to reduce the options available t=
o an
>>> +         * adversary who has managed to hijack a function pointer.
>>> +         */
>>> +        for ( val =3D __initdata_cf_clobber_start;
>>> +              val < __initdata_cf_clobber_end;
>> ... this being main binary boundaries, no action would be taken on
>> the livepatch binary. Hence (also due to having been here before
>> during boot), all that I understand will happen ...
>>
>>> +              val++ )
>>> +        {
>>> +            void *ptr =3D *val;
>>> +
>>> +            if ( !is_kernel_text(ptr) || !is_endbr64(ptr) )
>>> +                continue;
>>> +
>>> +            add_nops(ptr, 4);
>>> +            clobbered++;
>>> +        }
>>> +
>>> +        printk("altcall: Optimised away %u endbr64 instructions\n", cl=
obbered);
>> ... that this message be logged once per patch load (with a number
>> of 0). I think the enclosing if() wants to be amended by
>> "&& system_state < SYS_STATE_active". If you agree, I can easily
>> make a patch.
>=20
> Hmm.=C2=A0 There are other livepatching fixes going on, but they're start=
ing
> with fixing the build system breakage.=C2=A0 (The major livepatching fix =
is
> to adjust how we patch an old function that has an ENDBR64 at the start.)
>=20
> That said, a livepatch needs to contain a section equivalent to
> __initdata_cf_clobber, to be processed during load, dependent on
> cpu_has_xen_ibt.

IOW you say altcall patching can occur in live patches? If so, then ...

> Perhaps the best option is to break the clobber out into a helper that
> takes a start/end pair and returns the number clobbered.=C2=A0 That way, =
it
> can be reused by the livepatch logic, and independently of this printk().

... yes, parametrizing would be necessary.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 14:58:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 14:58:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281644.480069 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3xh-0001fX-3M; Tue, 01 Mar 2022 14:58:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281644.480069; Tue, 01 Mar 2022 14:58:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP3xg-0001fQ-WE; Tue, 01 Mar 2022 14:58:49 +0000
Received: by outflank-mailman (input) for mailman id 281644;
 Tue, 01 Mar 2022 14:58:47 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=YI9j=TM=citrix.com=prvs=0520bb690=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nP3xf-0001ex-C0
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 14:58:47 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 1739bbe3-9970-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 15:58:46 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1739bbe3-9970-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646146726;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=j6G4UMWqA/hPTRe/kzbfqxxngv/FBfgFnY0TcfNZOQc=;
  b=TeGAwFe1AjKt95w7+wZAV3a7QksftBvnY5COtwo29G3nsb8+11u6mqg1
   8rM12bL+dhP9FrCTupfJd0YMdjVq2Uw2WJqKbr4Rq17wft5h6SULSY5gX
   VlZYPKvTq0xG+z5rToSAkBBizPhpXnSj7tGRojZ+RltOz0xqIL+urG7tV
   8=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65632347
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:0hIU6qAbg6/KTxVW/zTjw5YqxClBgxIJ4kV8jS/XYbTApDh30DUOx
 mIcW27XOaqNZzP2KIwnaYiy8BsBusTSyYNnQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vh29Yy6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhyy
 N4Uqs3uaz4KBfHRoucvYjgIQx1XaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguwKKsXxMZxZkXZn1TzDVt4tQIzZQrWM7thdtNs1rp4TQ62EP
 JZGAdZpRCvKPUF+OGgKNIkFsdmDhHynXB9Wp3vA8MLb5ECMlVcsgdABKuH9atGMAMlYgEucj
 mbH5HjiRAEXMsSFzjiI+W7qgfXA9QvkXKoCGbv+8eRl6HWRzGEODBwdVXOgvOK0zEW5Xrpix
 1c8o3R06/JorQryE4e7D0bQTGO4UgA0WNpbSvJrtiO06ZGI/jyaNFklHm59QYlz3CMpfgAC2
 liMltLvIDVgtryJVH6QnoupQSOO1Ts9djFbO3JdJecRy5y6+dxo0EqTJjp2OPPt1rXI9SfML
 ydmRcTUr5EaloY12qqy5jgraBr898GSHmbZCug6N19JDz+Vhqb4P+RECnCBtJ6sybp1qHHb5
 BDofODEsYgz4WmlznDlfQn0NOjBCwy5GDPdm0VzOJIq6i6g/XWuFagJvm0gfBgybJpdIGa4C
 KM2he+3zMUIVJdNRfUqC79d9uxwlfSwfTgbfqq8giVyjmhZK1bcoXAGib+41GHxikk8+ZzTy
 r/AGftA+U0yUPw9pBLvHr91+eZymkgWmDOCLbimnk/P+efPOxaopUItbQLmghYRt/jf/m04M
 r93aqO39vmoeLamM3mPrNVKdghiwLpSLcmelvG7v9Wre2JOMGogF+XQ0fUmfYlklL5SjeDG4
 je2XUow9bY1rSSvxdmiApy7VI7SYA==
IronPort-HdrOrdr: A9a23:Z7zTwKGoSyibvhI2pLqFSJHXdLJyesId70hD6qkvc3Jom52j+P
 xGws526fatskdsZJkh8erwXJVp2RvnhNBICPoqTMiftW7dySqVxeBZnMTfKljbehEWmdQtrZ
 uIH5IOauEYSGIK8PoSgzPIU+rIouP3i5xA7N22pxwGIGEaCJ2IrT0JcDpzencGHjWubqBJc6
 Z0k/A33gZIDk5nCPhTaEN1OtTrlpnurtbLcBQGDxko5E2lljWz8oP3FBCew1M3Ty5P6a1Kyx
 mHryXJooGY992rwB7V0GHeq75MnsH699dFDMuQzuAINzTXjBqybogJYczBgNl1mpDr1L8Zqq
 iKn/4SBbU015oXRBDtnfLZ4Xil7N/p0Q679bbXuwq5nSWzfkNFNyMIv/MpTvKe0Tt8gDg06t
 M544rS3aAnfS/ojWDz4cPFWAptkVfxqX0+kfQLh3gaSocGbqRNxLZvtn+9Pa1wVB4S0rpXW9
 WGzfusk8p+YBefdTTUr2NvyNujUjA6GQqHWFELvoiQ3yJNlH50wkMEzIhH901wuK4VWt1B/a
 DJI65onLZBQosfar98Hv4IRY+yBnbWSRzBPWqOKRDsFb0BOXjKt5nriY9Fqd2CadgN1t8/iZ
 7BWFRXuSo7fF/vE9SH2NlR/hXEUAyGLH3QIwFllu5EU5HHNc/W2He4OSITeuOb0oEiPvE=
X-IronPort-AV: E=Sophos;i="5.90,146,1643691600"; 
   d="scan'208";a="65632347"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=CrFlZPrzQvCrZ72GVgkAfE7Sxj2g0d0+GL9S5ISANXudc/x1AjJ9Z0AjcWeMp7qDb/0p6G1t5AHP4zOfz8Fw7/s1HCRbkzL96BniuA8EJfqgBYLjBFu1+fXiyKhI36RVHwwbEe3uRYqeHXLmP2Lgb4dd7r50K/fuJtmtRL14toBg90DdhtpD7GKEYOAGVTGzM6fT34byW82GzmkYd3KGU9VC3meTehUiFM4CsDRxDBBA6MwhzAzsoia9KJ68tvnwyRnnSwPHD1sPJFk68+S/H8W+vHdawOkSzTSPRdyFrvTT0z9+ataDkSRFyUeSNM+q2mQnRcSF+3sS7Jd++3ne6g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=j6G4UMWqA/hPTRe/kzbfqxxngv/FBfgFnY0TcfNZOQc=;
 b=CAEbbmKGp5iKZs/cR/CPQhFXM1ieDrY5wRtqZUoM7oeeN8UkThy2+eh0Mo8D2ZTflD6Z5yT8kDVTjIQEwxUV/6cdccbcq3STZ990sB1jkOHA+O5hsr2aOHbYgIGnyxY7ezb/2CuXnnsiwkalXOw2l4WHRX031PTag3O0D5k6BEnjCysVj5dcIZDhxn955B3yM9e0I/uQKGU3pkJdwu7P5LNRw761/uEF7nG9JKUFK58xjuD4oXY4Isj3kDQR/zd8tAHxw2KuPmLIQW+cvSYaWQP2ywQyf+uaz45iZ5IOuSPIg2xIFcm6hLJ1LmAflRx1y/KY5Ehy1043kfi+77N88g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=j6G4UMWqA/hPTRe/kzbfqxxngv/FBfgFnY0TcfNZOQc=;
 b=v1urMe3zog+GlIS+GwcD/9QE/ONM3j+ZCTjWxwxUS/aZ0kSnYnQdF4izWhgD7Dy7KRtNEO7L64XpAff2KESpDzcwi4mK1N/f2B8DeOj4y1gM1zdihWqGJmlamzxfsWXGc/wSeclVfOUVLL5gGVnJSU1YSdirvEZ4Vv5nmDq9WAw=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>, Xen-devel
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v2.2 8/7] x86/IOMMU: Use altcall, and
 __initconst_cf_clobber
Thread-Topic: [PATCH v2.2 8/7] x86/IOMMU: Use altcall, and
 __initconst_cf_clobber
Thread-Index: AQHYJ+IV6PtRJY8p5U2wBnUH9jKzdqyj8n0AgAa3aoA=
Date: Tue, 1 Mar 2022 14:58:40 +0000
Message-ID: <5fae516a-17c1-0ce4-c46e-909a83c0e273@citrix.com>
References: <20220214125632.24563-1-andrew.cooper3@citrix.com>
 <20220222114711.19209-1-andrew.cooper3@citrix.com>
 <e8b71b3a-55a0-31a2-b2ab-3b2470680709@suse.com>
In-Reply-To: <e8b71b3a-55a0-31a2-b2ab-3b2470680709@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 6da19933-1718-43b9-710f-08d9fb93f8e6
x-ms-traffictypediagnostic: SJ0PR03MB6875:EE_
x-microsoft-antispam-prvs: <SJ0PR03MB68757E4651D2CE921EF6C7FABA029@SJ0PR03MB6875.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(71200400001)(82960400001)(186003)(26005)(6512007)(6506007)(64756008)(66446008)(53546011)(2616005)(122000001)(36756003)(38100700002)(54906003)(66946007)(2906002)(5660300002)(66556008)(76116006)(38070700005)(8676002)(4326008)(6486002)(86362001)(8936002)(508600001)(91956017)(66476007)(31686004)(316002)(6916009)(31696002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?TEtnejUweUtheGtwQm5JYVlBTVJVK3ExR1lCZkNlRkc5eTVQeU5DaHRuMEI1?=
 =?utf-8?B?RzR5cDd3SGYvT3dSL0treDE0eTh6a2kzQU5BdzJaaUpTamhGL2dkZjhybmRZ?=
 =?utf-8?B?ck93M01NMm9HdEU0U3AyMVhtNjY5bWRYZVZGZWdPUzZ5c0MxT05FTE5aR0hD?=
 =?utf-8?B?UUJ3MVRCWWFyYW1UVmc4S3F6cS8wRmE5RE5VeDFGd2VodG9TR2c0RHlnL3V6?=
 =?utf-8?B?d1kyWnF4Zk4rbzNHemNDVzZ6RC9XRjVRNEVCR01rcXRFR1hydWxBT3lwdHZG?=
 =?utf-8?B?aVNES0hKOGFJWkl0MEc5QWt4azFJWnhWMnFMcTlIQURORFB5bWM1NVdGL21y?=
 =?utf-8?B?UW9qekpRK1hIei8zV3FiZ2dwRnZ6bzBmd0REUDY2RzNPWTJFS1I0aUphN0VE?=
 =?utf-8?B?Wm80dGpVTERMRGJ5R2pvZXI0Wk1MSWJPM1JycEsxOWs3blQyQjNmNzNiUWJR?=
 =?utf-8?B?UXZWNll3NE9HMzZQdURhaDRBdnhwSFRqeHFLdHdmd20rUFAxU3dHMWFoZm9v?=
 =?utf-8?B?NGFRUFlXQlZSdHFJTFB1aDFDMVo3MlFKYzJYelZvQnZjMkpIblZpQW1vQTY0?=
 =?utf-8?B?STd0Y2d2NXhXSzVHUkdxK0xXdFhrOGNJbVRSU3NTc0Vla2tkdkdYbXNTUjFG?=
 =?utf-8?B?VzAyMkZBQkw1V1F4b0dnMTZETWZUSFpodm5ibkxqKyt3UGJlc1Z3OHpiYzJa?=
 =?utf-8?B?a21LdEhRVHg3MVIvTklTZlZIZkVIZWswSjBYYXdnUDd2NzdDWVNYZjRDaDA1?=
 =?utf-8?B?OWpTeDdmcjhQTU5zeXdmUTBoUUtoOGpsK3V2Ulo2WWpaWXZXK3BlZ0VJV0lU?=
 =?utf-8?B?dzNnZTdqbVd6N2RqQ28wVGlEY3hKRnkwKzd4UXBOUVlWMURIbGloWDh1QnlH?=
 =?utf-8?B?cFJsNjViMjFCMUEyNnpuRFpkcUtoSHB0cWNuREtkWHgrVHV5N0lRbzN6VUk4?=
 =?utf-8?B?NkFOczRQSUJ6VjVJMEFxeGxGQnpVeWxPZUJyZUM2enFPV2VUUXlFc3JiNVJQ?=
 =?utf-8?B?Mis5QlhySVJ6Q0g2ZUdRTHFvRjJreW51NDUvOW9nbHhkeEVoektSbVB6RzZC?=
 =?utf-8?B?OVEwR2NPc0hFUEVhSUtPbWQvQkkyTHpTOUZXZzJIWEJIbGlPcFFBSzd6NXdM?=
 =?utf-8?B?bUd0ZWVyZHByN1R2a3hFVGZpRW1GZUQ1Z1VqYjZSWGtnR0xLL2hlV0JqV1BQ?=
 =?utf-8?B?UG9RbUp4MHh6YmZPYVRocnBFUGNsNFJpdHA3UGdTeHV1RER2eFVIVWdaTEtv?=
 =?utf-8?B?ZERwNDJSejZ1RzJOUElWNXczSzJ4Q01wbmFoYm95S3FocnNDNjhGZWdPLzlE?=
 =?utf-8?B?RHZiWThaZFRnaDJ6VGVPaCs0SmJqVHB1OSs5ZUFxRGpacHNibkoxM1lyTmhZ?=
 =?utf-8?B?azdsclBlRDluYVFRQ0t0V0VMb1NLU1ludExqa2tUb3BCOFFySmpXenZBOER4?=
 =?utf-8?B?SkNjdmZzY2JkZFZ1RDB5ZTd4SkxkSENMVUtVNFF6VUpxU3Q2blZHR3oxMWNo?=
 =?utf-8?B?TDE1aVV2SFNtK0lhUWo4K1VjUC8zb1orRzFmbVN1OTZZZnBSNUpsWXRUQkx4?=
 =?utf-8?B?REZmNkZUbUd4VzRETStveWVxeTRtd1paN3U3MWNtTmhpVU1aZGhZZklyQ1Y4?=
 =?utf-8?B?VkhzdVBrTTF1WElKd0doVmo3ZEVJSWhEMnByQnNoSURVMkQ2aHV5RmgvdkdR?=
 =?utf-8?B?bFVlQzdDTWlOaUdlcGRvOXRqYW00R004YTRmblFlaDBKZk9FZXFKSGpIWGZS?=
 =?utf-8?B?NXl0MHE3cHZ2NHUrL2FEMzdKeWVqR09ZSjU4UXo0Mmh1WGpqWFZMcFVmNWNF?=
 =?utf-8?B?Y1lsaDh2UnJ0UXZzekxSbEFVaFB2QUY3ZEY1a0p4ZmpldVRpNFdZUU5YL3lX?=
 =?utf-8?B?dzlMWDQ5THpMOVZwbS9yQTNXRGt6c0M4aitmQTE2SDN3R2dOR0pyODMyLzd4?=
 =?utf-8?B?Y1BGTTk3TW0xVjhiNVhiS2N4bmZDR3pWbUlJZlFYSi9hZG1nS1IvWFZBZng0?=
 =?utf-8?B?b1JFcHoxTEZJZkJxTVV5WitRK0RhVFlFWVM1aXgrTWdTcWUrMzJSQ3JvWWNM?=
 =?utf-8?B?ajBUdnQrcHRkeThEcXdwamE5aDkzUHdkQlNhVWYyZ0Vub3FBWDNpMmluN3NX?=
 =?utf-8?B?R0tVek8zMVh5bXNEQWoxMmJPb0cvY2Y0Y2h6eGE1WmswZzZsSFJSaFY5RWNG?=
 =?utf-8?B?QnAxTTE1Z2lZejdRK3R2TTVHVDU3QjdJeXAyb29oLytDdlAvWDJlRWRBV2ZO?=
 =?utf-8?B?bFJyR0lNaDNHdmJnMHJMY3dKdGhRPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <936D1C8243B1124E9AD37FD77DEE6455@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6da19933-1718-43b9-710f-08d9fb93f8e6
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Mar 2022 14:58:40.3158
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: sD8ST2X8DW6hjGzip51hN5w/76LGD8TQqs3ODwfkNVlzgx2MZLZd1IMxsdNr2QiTkPaown86e2RMZ2LY0deXeo74c904j+aWXL7eFhxRx8c=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR03MB6875
X-OriginatorOrg: citrix.com

T24gMjUvMDIvMjAyMiAwODoyNCwgSmFuIEJldWxpY2ggd3JvdGU6DQo+IE9uIDIyLjAyLjIwMjIg
MTI6NDcsIEFuZHJldyBDb29wZXIgd3JvdGU6DQo+PiAtLS0gYS94ZW4vZHJpdmVycy9wYXNzdGhy
b3VnaC9hbWQvcGNpX2FtZF9pb21tdS5jDQo+PiArKysgYi94ZW4vZHJpdmVycy9wYXNzdGhyb3Vn
aC9hbWQvcGNpX2FtZF9pb21tdS5jDQo+PiBAQCAtNjI4LDcgKzYyOCw3IEBAIHN0YXRpYyB2b2lk
IGNmX2NoZWNrIGFtZF9kdW1wX3BhZ2VfdGFibGVzKHN0cnVjdCBkb21haW4gKmQpDQo+PiAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgaGQtPmFyY2guYW1kLnBhZ2luZ19tb2RlLCAwLCAw
KTsNCj4+ICB9DQo+PiAgDQo+PiAtc3RhdGljIGNvbnN0IHN0cnVjdCBpb21tdV9vcHMgX19pbml0
Y29uc3RyZWwgX2lvbW11X29wcyA9IHsNCj4+ICtzdGF0aWMgY29uc3Qgc3RydWN0IGlvbW11X29w
cyBfX2luaXRjb25zdF9jZl9jbG9iYmVyIF9pb21tdV9vcHMgPSB7DQo+IEZvbGxvd2luZyBteSBp
bml0Y2FsbCByZWxhdGVkIHJlbWFyayBvbiB4ODYnZXMgdGltZS5jIEknbSBhZnJhaWQgSSBkb24n
dA0KPiBzZWUgaG93IHRoaXMgYW5kIC4uLg0KPg0KPj4gQEAgLTI3OTQsNyArMjc5Myw3IEBAIHN0
YXRpYyBpbnQgX19pbml0IGNmX2NoZWNrIGludGVsX2lvbW11X3F1YXJhbnRpbmVfaW5pdChzdHJ1
Y3QgZG9tYWluICpkKQ0KPj4gICAgICByZXR1cm4gcmM7DQo+PiAgfQ0KPj4gIA0KPj4gLXN0YXRp
YyBzdHJ1Y3QgaW9tbXVfb3BzIF9faW5pdGRhdGEgdnRkX29wcyA9IHsNCj4+ICtzdGF0aWMgY29u
c3Qgc3RydWN0IGlvbW11X29wcyBfX2luaXRjb25zdF9jZl9jbG9iYmVyIHZ0ZF9vcHMgPSB7DQo+
IC4uLiB0aGlzIGFjdHVhbGx5IHdvcmtzLiBCdXQgSSBndWVzcyBJIG11c3QgYmUgb3Zlcmxvb2tp
bmcgc29tZXRoaW5nLCBhcw0KPiBJJ20gc3VyZSB0aGF0IHlvdSBkaWQgdGVzdCB0aGUgY2hhbmdl
Lg0KPg0KPiBCb3RoIG9wcyBzdHJ1Y3R1cmVzIHJlZmVyZW5jZSBhIGZ1bmN0aW9uLCB0aHJvdWdo
IC5hZGp1c3RfaXJxX2FmZmluaXRpZXMsDQo+IHdoaWNoIGlzbid0IF9faW5pdCBidXQgd2hpY2gg
aXMgdXNlZCAoYmVzaWRlcyBoZXJlKSBmb3IgYW4gaW5pdGNhbGwuIFdpdGgNCj4gdGhlIEVOREJS
IHJlbW92ZWQgYnkgdGhlIHRpbWUgaW5pdGNhbGxzIGFyZSBydW4sIHRoZXNlIHNob3VsZCBjYXVz
ZSAjQ1AuDQoNClRoaXMgZG9lc24ndCBleHBsb2RlIGJlY2F1c2UgdGhlIGluZGlyZWN0IGNhbGxz
IGFyZSByZXNvbHZlZCB0byBkaXJlY3QNCmNhbGxzIGJlZm9yZSB0aGUgRU5EQlIncyBhcmUgY2xv
YmJlcmVkIHRvIE5PUDQuDQoNCkJ1dCBJIHJlYWxseSBkbyBuZWVkIHRvIHdyaXRlIGEgcHJvcGVy
IHNwaGlueCBkb2MgZXhwbGFpbmluZyBob3cgdGhpcw0Kd29ya3MgYW5kIHRoZSBzYWZldHkgY29u
c2lkZXJhdGlvbnMuDQoNCn5BbmRyZXcNCg==


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 15:54:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 15:54:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281657.480085 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP4ow-00009x-5K; Tue, 01 Mar 2022 15:53:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281657.480085; Tue, 01 Mar 2022 15:53:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP4ow-00009p-2J; Tue, 01 Mar 2022 15:53:50 +0000
Received: by outflank-mailman (input) for mailman id 281657;
 Tue, 01 Mar 2022 15:53:48 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP4ou-00009e-Gc; Tue, 01 Mar 2022 15:53:48 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP4ou-00027t-F5; Tue, 01 Mar 2022 15:53:48 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP4ou-00022E-58; Tue, 01 Mar 2022 15:53:48 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nP4ou-0001UU-4i; Tue, 01 Mar 2022 15:53:48 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=6EwxkTfBkuPZ2/ybwh9V2xGYugdwgp2od9n/oIelTuk=; b=znWI2ZHvWK8DjRjMp5IWCm2BES
	jAS0lJyrLRRcauCwTAn3Ht1a2CKDcTcSpf01WpE+PdRctTc3IiS+X35aao8OwnL1QuRHapwW4oTxt
	tK8qnkoCiJv9jpC+yYiEObBFetrMvg7Ml7SgJRHkm8E2ejyZ+nZ+1SDnMMW4tMttaTO4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168295-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168295: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=497ac7b6d7f9750f48f137db244931a5728b1968
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 01 Mar 2022 15:53:48 +0000

flight 168295 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168295/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 497ac7b6d7f9750f48f137db244931a5728b1968
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    1 days
Failing since        168258  2022-03-01 01:55:31 Z    0 days    7 attempts
Testing same since   168262  2022-03-01 04:10:26 Z    0 days    6 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 17:13:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 17:13:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281669.480097 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP63W-0001Pk-T4; Tue, 01 Mar 2022 17:12:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281669.480097; Tue, 01 Mar 2022 17:12:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP63W-0001Pd-QG; Tue, 01 Mar 2022 17:12:58 +0000
Received: by outflank-mailman (input) for mailman id 281669;
 Tue, 01 Mar 2022 17:12:57 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP63V-0001PR-SL; Tue, 01 Mar 2022 17:12:57 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP63V-0003z1-Ql; Tue, 01 Mar 2022 17:12:57 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP63V-0005my-HX; Tue, 01 Mar 2022 17:12:57 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nP63V-0005tz-H3; Tue, 01 Mar 2022 17:12:57 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=uFitI1AGJ/vKOeX/TiQFNPnEm/NSo320fsrIQv45SZE=; b=PimpQ0O91SfvNdksS5NpYOIEFP
	3PlmL3N5ia6K3QU2OSo/2sIF7+pie9HUbyZFXrNClbfQb+ipTqC8K33aP2z181J1iR0K/+AdjBoSJ
	xum2zgyjJVNOsHiaQaKYjGqHKIehPav4QJLuOxjvBfLEEtlWB+RoMZSJOHYtZPMdQ1gg=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168296-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168296: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=6e3f36387de566b09aa4145ea0e3bfe4814d68b4
X-Osstest-Versions-That:
    xen=e0a514d2f4b2fcb51835aa9a9b02653b491a61fc
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 01 Mar 2022 17:12:57 +0000

flight 168296 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168296/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  6e3f36387de566b09aa4145ea0e3bfe4814d68b4
baseline version:
 xen                  e0a514d2f4b2fcb51835aa9a9b02653b491a61fc

Last test of basis   168283  2022-03-01 10:00:26 Z    0 days
Testing same since   168296  2022-03-01 14:03:25 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   e0a514d2f4..6e3f36387d  6e3f36387de566b09aa4145ea0e3bfe4814d68b4 -> smoke


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 17:23:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 17:23:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281680.480107 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP6Db-000353-Sx; Tue, 01 Mar 2022 17:23:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281680.480107; Tue, 01 Mar 2022 17:23:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP6Db-00034w-PV; Tue, 01 Mar 2022 17:23:23 +0000
Received: by outflank-mailman (input) for mailman id 281680;
 Tue, 01 Mar 2022 17:23:22 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Oh7N=TM=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nP6Da-00034q-3E
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 17:23:22 +0000
Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com
 [205.220.165.32]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 495411d0-9984-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 18:23:20 +0100 (CET)
Received: from pps.filterd (m0246627.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 221Gb1kJ030734; 
 Tue, 1 Mar 2022 17:21:51 GMT
Received: from userp3020.oracle.com (userp3020.oracle.com [156.151.31.79])
 by mx0b-00069f02.pphosted.com with ESMTP id 3eh14buhn5-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Tue, 01 Mar 2022 17:21:51 +0000
Received: from pps.filterd (userp3020.oracle.com [127.0.0.1])
 by userp3020.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 221HBKKS133310;
 Tue, 1 Mar 2022 17:21:49 GMT
Received: from nam10-bn7-obe.outbound.protection.outlook.com
 (mail-bn7nam10lp2103.outbound.protection.outlook.com [104.47.70.103])
 by userp3020.oracle.com with ESMTP id 3efdnn67g1-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Tue, 01 Mar 2022 17:21:49 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
 by BYAPR10MB3735.namprd10.prod.outlook.com (2603:10b6:a03:11e::17)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.24; Tue, 1 Mar
 2022 17:21:46 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::6d20:6694:a16:56f7]) by BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::6d20:6694:a16:56f7%3]) with mapi id 15.20.5038.014; Tue, 1 Mar 2022
 17:21:46 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 495411d0-9984-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=2VvizOzOuPTAj7HuT3zbIn+GnTrob2/mtqBRbU1SXiU=;
 b=mzjnXb9BbJbkntKi2URx6woevpzghgDqWOrIuLecA2Onej+RPL3My9Ne0q68kzdDnVAu
 e0Bn6d78tqz7lKgMz+NOfkZbxNGx8d1GMIvfq2Z0AdaCkxnPFvoPcrZQo88amL9XIo2y
 iKmJNXLxGDIl8vbnSr2eOR1n7hiNxdDbP/dP9M0RzSt4j4B3I7aOxJ508Xbt0Gc9U/Wr
 8rbZQl3vvQlTQWMGkluEszYHXzgPy0riqwRf9I1M4SZtjIxwUMXGCejMHJkOyPWdxuea
 NRkT7mIWjGvyQddBOJuvPtTC50Y/TRNH4Cq7GEB3Z/gM4oRvPbhdNPgVLJQnYBUEgyLJ 3Q== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=atkh1ZJrWfbdwrvgrSPNlz9Y22EqE9Xtk8QNmDvI780heD4DgvqcBMinkeg2pDUluW7cvMODFTAOCZGVI6XrSChzWuiHg/krndycJ/ZdNieOCDPOG+7FmdQQy/PG8hn19mDw+cN1y9L2yfZ1RihHJohKuhOb4qppySIXHzygmoYQKtcStzVWqr0qCK79IOWS5cbkDDQo70ObGU8tXVHRFehxiZjf7i/bMmdbdB2YDO6EBGhLDBJVRAqNA6o2hrfxqyrgLJ75szun0qPY37hlTpfuYkJRZwaPdXXH5KYHfMPyoa8oh4eZ/kookUPJObntwdhhCLgpJHQM3H91d/FguA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=2VvizOzOuPTAj7HuT3zbIn+GnTrob2/mtqBRbU1SXiU=;
 b=KIkFMOK3jyF2xgzZwhp+lN1x3q7YNYX2StuQ7pgQIj2qn6dLBq22DjX2tcYFB6BJbRBTeTTVjlJIX8k4lO0YsIxiCzuUcx+tV6JCdBF2lYoxqZRtK0lpEE8ABJSO33gNV96OL1P914LJYQiliResKQ++EZa0AugulA2LZeiHEoWB8EbnGyju/lGHyGeMDeh9k9ceiMQGjOkGo6vcThXvbgnAW5EfLInTbeyQy4Qfvvr5+DxNF+IJh73XnLRPI8SyD4uhy3Wd73l1Lfsi3To2Nc2CoJaTmWtHHlerxLczBEfo4fGYXXbYtiALJJ1FrzZvHoMhiOrirR0RIddiM3DuGw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=2VvizOzOuPTAj7HuT3zbIn+GnTrob2/mtqBRbU1SXiU=;
 b=srxrjkWJ/7NzED2+Trk6grYZIeStN7H4GbSa13XBcFwXXIjgu/EfOFceOI0y6udgWlZE4jFlzu3f2pjJ2zcCOZSz7vTa/lDkac5RiaYz/3CPgTRnwPciJTTBg6ElKbMjR3YRSPlZeNPL5knJujrKJCjFnG9agr/bGA4P5BD8Su0=
Message-ID: <a60bf68f-51a5-70e6-e525-09a62cd6fb74@oracle.com>
Date: Tue, 1 Mar 2022 12:21:41 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH v3 0/1] xen: fix HVM kexec kernel panic
Content-Language: en-US
To: Dongli Zhang <dongli.zhang@oracle.com>
Cc: linux-kernel@vger.kernel.org, jgross@suse.com, sstabellini@kernel.org,
        tglx@linutronix.de, mingo@redhat.com, bp@alien8.de,
        dave.hansen@linux.intel.com, hpa@zytor.com, joe.jin@oracle.com,
        xen-devel@lists.xenproject.org, x86@kernel.org
References: <20220224215049.2845-1-dongli.zhang@oracle.com>
 <9de1059b-6b48-e2c8-60bc-f29b42b217f7@oracle.com>
 <36014dbd-e63c-cf49-dafd-2d7a8b84db5d@oracle.com>
 <8e3e4716-22e7-8684-394c-b5a457906975@oracle.com>
 <a6d64481-cb70-d797-fafd-b827288f7e53@oracle.com>
 <1a5a683d-17c8-9730-d2f5-745262430569@oracle.com>
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
In-Reply-To: <1a5a683d-17c8-9730-d2f5-745262430569@oracle.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: SA9P223CA0005.NAMP223.PROD.OUTLOOK.COM
 (2603:10b6:806:26::10) To BLAPR10MB5009.namprd10.prod.outlook.com
 (2603:10b6:208:321::10)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5dcbc3af-9376-4339-9145-08d9fba7f686
X-MS-TrafficTypeDiagnostic: BYAPR10MB3735:EE_
X-Microsoft-Antispam-PRVS: 
	<BYAPR10MB37354B1E5FE8460279FFC6718A029@BYAPR10MB3735.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	xYM04L6TQ8yMr/FSKYUWVCeRzxf6ipqyH4SYjBX52V8PFr8xhzZjo/yZ5oadRmM/IrZtDPBHGF0czqPNja0mietVHgwbdZlHkBtoif04dEQBOX5ljDfavnl750WIxQxPCMzOGYcacxN4D2Wy8KmycXT7FE2+SiR+nvtr91fNHW704DeKY15kkOz9n+KSWYoZv651KVz0ALoYxRxiQWC6y5ezU2vm7kpbHCJTYw3Mucfey3FPmYamEM9nZSnsy2967RWF7wRFFUV8I7M85kvuaKtPRQhgUpuOejIMz67VMTn6zJLcqYn7cTweF1qXb5yz7M+JdxjGfOEdKPUvLeghfAXyZeyLj53W1qoIyvciNjg3KvDUGmwj0oOKPqR7wBwdsgObZZjOv4saND7epzbPJk2X/KD75IDdlFsn7MzvY6tu6zIXRwxqba1Scspt5ZUnkrvbrl2/tC0C4X5k5ncHTsrX0Cl30doFjWy7ewZVrM/Q2RPb8PRs0s7Wx36UUUdRTeqA/5bffEK1kcnBWYeYtYSZjSiOm4o2yfd11JHzqDGojQ202alkLQO0LlCejQaB4GM2jOB80GkOF28X2yhr43B+uTVbrDwSdTjIXpkRmgufT7ItvYsBeYgZVe4j4jbM26eKI/e1MbzGZ5Zu0K9k1OE4KzaXiJCbkF/62OsePHsfy0Q/7qlxk7aQNUOrHqpE4q3QAxDl+6c4pf28O44hv1FyIWAvp8CHVfx8mzkyVe4=
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BLAPR10MB5009.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66476007)(6862004)(2906002)(31696002)(4326008)(66556008)(8676002)(86362001)(5660300002)(66946007)(36756003)(6486002)(508600001)(7416002)(8936002)(31686004)(44832011)(38100700002)(37006003)(83380400001)(53546011)(2616005)(316002)(6512007)(6666004)(6636002)(186003)(6506007)(26005)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?S01UR1FYUEJ4c1RtQjg0SWlzVXkrMjg4bVNjd0U4dy9mRGJnc2E3MEl4T0pI?=
 =?utf-8?B?RmlmSnhCM3grSEJUN3BlTWVkQ2JYVXl4bkNvRkRZaFdhV2sycWg4UUtCK1JX?=
 =?utf-8?B?emV5OGw1ZEw5bVRJaFRrY2ZZNGp6bFJKOTFRdUxmME1hbE9PU3N0VXdjaHVP?=
 =?utf-8?B?ZWhhdTUxcWdCWldwVTMrWE92ZExZc3ZvNWlSbndoTU8rWkJKYndxVmxvVnBF?=
 =?utf-8?B?VnhMWHRFUDYwUHdLRWhBYlBGc3UzOUlnc0RqZFk3NWZRZjlBcFF5WVhyb0pI?=
 =?utf-8?B?RGNSbWpVeGowcjRLTHdsTmdCczhPc2NtNmJ5TGdSbmpHaTZJQUlCZFZPdFFS?=
 =?utf-8?B?RHZtUnFnbFBYK3FEZXp0eDVacksyQndKU0t5eVhkdFU2TlJ0OFpCR0R2QWVE?=
 =?utf-8?B?TDJocDV3M2Q3Y2Q5SXFmVkJFU2k2bXNlWUdlQkZOVlQ4aDAwd0s3RVVWbnBz?=
 =?utf-8?B?M3p3eENGc054Q1FNb3A2MjAyZGd0ZEgvRW9lWDVGSkFWUDlwSHpZMENFSTdE?=
 =?utf-8?B?K3R6dzRRMk5mc3ZiUHFqV3NEUXB6VkczTnRDZkVXRlNhSVlRNHM0eXo4bDhI?=
 =?utf-8?B?YnhJMjFGRmFqa2RtMiszR1hCYmY3THFyMTZNaS9jWUlQSEkzeGlqdDJlbUtM?=
 =?utf-8?B?cFA3TGZLYnRwdFlDYUJRNk9mUzRzOTMxbkhycmdjMFByR096VE9iZk1rL1Ev?=
 =?utf-8?B?SEZ6Z1VXYnRIbkR0UGF4My9SNjRPbnFEbmI3SW1mdUsyWmc0RjRJa2c4Tk5L?=
 =?utf-8?B?RFhJMThNdG5YTlN2Y3dBVDZXZHBHQVFSQjZ6bTF2TEJaWUlLZlBNZldpWFox?=
 =?utf-8?B?V1IvQjJRazU5VTkzbnFlTjRIbHN3SC80blBkQjZXWStldm43QlNWcU1VZHVN?=
 =?utf-8?B?TTljTlRGWklvRTNta2FCdUJFOGl4dFlNSy9NN2piNHNmSDlBRWwzaXRtWENm?=
 =?utf-8?B?SVhGSGU5N3dzYXh4bExnM0hhMWtYNVlxdFFXVDN1WmJiSmhMaDlEempoV2Nm?=
 =?utf-8?B?QXRJalh1UURrdGYzVEJNdWxGOHp6NTVmdmc3Y2E4RSthOXk4OWQ4Zy9neXNN?=
 =?utf-8?B?M1R1TWdqdUlaSUFMVllhNCtlS2pmNENBNjJLUlVlMkRyZWhpWWdtcnlXSjBY?=
 =?utf-8?B?WHhtMEsrVURtL25hT2d0T1JTSTlPb09TbXNSNmRObVJnL0t3VTVLQ3VZbWVi?=
 =?utf-8?B?WGVFNGlBTzFhbnQ1TWFJVzB6eVp2WDc4K0FIdHdwOVlqYWtxSE0yWFNOTTc2?=
 =?utf-8?B?dFdDdldEeWMvanhOeSs3SU85RHVCaFlOc2V0UWNmaVFzTmU0dEJ6dFh6bHYv?=
 =?utf-8?B?NVp4WWM3NFIvU2JIMlI5NGcvSnMzaFhkVVRxRFBBRGRiemRzb2xVazVoUjRu?=
 =?utf-8?B?NGNad3FFYkduU1JhZHF0Mk9YZGlqRlV6ZU1idlpENVo3OSt1QXByYktpL2dX?=
 =?utf-8?B?WHpLRldlcFhJb2VjNjlrWFo5K3c1aG9LSUJrTmtQUW9idit1aUhtKyt2S2VF?=
 =?utf-8?B?c00xRjdLSXQ3UWJUR25ob1htMUo0SGJ4dFN5WHY2YmdtNXk5YzVya0V5L1A3?=
 =?utf-8?B?K0J6ZTg4bmw4NTduUGNDQ0N0N0Q0Z1JFZTAwSi9tOTdYVUdBclRBZ2RIZG1K?=
 =?utf-8?B?ZXNZRUNaTUlLclpQcHhrcVVBOG04TGxJNktOT21Hb0NLZitWRHQ3c3dSSVgw?=
 =?utf-8?B?aG1EZ0M0TndDTVVKMDBydmQxYkhMa3JUSmZHYjUyejljVkh4YUsvMFdGM3M1?=
 =?utf-8?B?cEJaaWNXaDJPbEMxUmIrdHord3NBTkhFa08vbUZPT2VhWXRUMVY5OEFTcDhM?=
 =?utf-8?B?RFZETHZ6TzhYdmxVM2hSTFQrcXVRT251TDdqSVQrYW5hZjlVZTVIMzhOOGtP?=
 =?utf-8?B?cUdwaWs5emFYZjVrNnllVk5kS0JnUDcyc0ErQW9YVWNDaDBXc0c1WWt0TGxV?=
 =?utf-8?B?Sk5SQkxSNlZXNkkyNHA2bjQ3eHJKa3hzSzhNMnZ2TmdWRytaektYY2JmaXJC?=
 =?utf-8?B?d0ZtTVpxQ0pvMXY4N3B0aVhCK1IrNUVGd0RKeTB0L0lXcmtQakNJSCtnaDJG?=
 =?utf-8?B?UE1TQnNRSGxOelFpV2ZyVHB5WkxsZ3YxMmpacnR0U2M1Wi9KYnFGQ0NrUmZZ?=
 =?utf-8?B?eHpiWkRCc2lJL3o0UzhvNUF3MkhBM011UVIwR1ZVYTVlMHc3ZDF4M2RjRTht?=
 =?utf-8?B?V0NWdUg4anhmNGhOWFFwcUo4UzBlQ29kNFZydjhEODk3dUJ4OFZTODV2YzZX?=
 =?utf-8?B?Z0h0M010eXVjMXNybXVZSjRjaFNnPT0=?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5dcbc3af-9376-4339-9145-08d9fba7f686
X-MS-Exchange-CrossTenant-AuthSource: BLAPR10MB5009.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 17:21:46.5009
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 6mQFtqQMEuKoGfp+IqX0ILB6SdYjABqFtiDGxc0ssjEItl0XKnEZzfrl5Yn1/PjIgIBUkXIbvVyGBMeWjQMw6OgrVE8L/leb29JZU0kTVFs=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR10MB3735
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10273 signatures=685966
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxlogscore=999 bulkscore=0
 adultscore=0 phishscore=0 spamscore=0 suspectscore=0 malwarescore=0
 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1
 engine=8.12.0-2201110000 definitions=main-2203010090
X-Proofpoint-GUID: xKoXMw0UF3TN4vlVI_TJUE4uNaFuIwYy
X-Proofpoint-ORIG-GUID: xKoXMw0UF3TN4vlVI_TJUE4uNaFuIwYy


On 2/28/22 11:56 PM, Dongli Zhang wrote:
> Hi Boris,
>
> On 2/28/22 5:18 PM, Dongli Zhang wrote:
>> Hi Boris,
>>
>> On 2/28/22 12:45 PM, Boris Ostrovsky wrote:
>>>
>>> On 2/25/22 8:17 PM, Dongli Zhang wrote:
>>>> Hi Boris,
>>>>
>>>> On 2/25/22 2:39 PM, Boris Ostrovsky wrote:
>>>>> On 2/24/22 4:50 PM, Dongli Zhang wrote:
>>>>>> This is the v3 of the patch to fix xen kexec kernel panic issue when the
>>>>>> kexec is triggered on VCPU >= 32.
>>>>>>
>>>>>> PANIC: early exception 0x0e IP 10:ffffffffa96679b6 error 0 cr2 0x20
>>>>>> [    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted
>>>>>> 5.17.0-rc4xen-00054-gf71077a4d84b-dirty #1
>>>>>> [    0.000000] Hardware name: Xen HVM domU, BIOS 4.4.4OVM 12/15/2020
>>>>>> [    0.000000] RIP: 0010:pvclock_clocksource_read+0x6/0xb0
>>>>>> ... ...
>>>>>> [    0.000000] RSP: 0000:ffffffffaae03e10 EFLAGS: 00010082 ORIG_RAX:
>>>>>> 0000000000000000
>>>>>> [    0.000000] RAX: 0000000000000000 RBX: 0000000000010000 RCX:
>>>>>> 0000000000000002
>>>>>> [    0.000000] RDX: 0000000000000003 RSI: ffffffffaac37515 RDI:
>>>>>> 0000000000000020
>>>>>> [    0.000000] RBP: 0000000000011000 R08: 0000000000000000 R09:
>>>>>> 0000000000000001
>>>>>> [    0.000000] R10: ffffffffaae03df8 R11: ffffffffaae03c68 R12:
>>>>>> 0000000040000004
>>>>>> [    0.000000] R13: ffffffffaae03e50 R14: 0000000000000000 R15:
>>>>>> 0000000000000000
>>>>>> [    0.000000] FS:  0000000000000000(0000) GS:ffffffffab588000(0000)
>>>>>> knlGS:0000000000000000
>>>>>> [    0.000000] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
>>>>>> [    0.000000] CR2: 0000000000000020 CR3: 00000000ea410000 CR4:
>>>>>> 00000000000406a0
>>>>>> [    0.000000] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
>>>>>> 0000000000000000
>>>>>> [    0.000000] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:
>>>>>> 0000000000000400
>>>>>> [    0.000000] Call Trace:
>>>>>> [    0.000000]  <TASK>
>>>>>> [    0.000000]  ? xen_clocksource_read+0x24/0x40
>>>>>
>>>>> This is done to set xen_sched_clock_offset which I think will not be used for a
>>>>> while, until sched_clock is called (and the other two uses are for
>>>>> suspend/resume)
>>>>>
>>>>>
>>>>> Can we simply defer 'xen_sched_clock_offset = xen_clocksource_read();' until
>>>>> after all vcpu areas are properly set? Or are there other uses of
>>>>> xen_clocksource_read() before ?
>>>>>
>>>> I have tested that below patch will panic kdump kernel.
>>>>
>>>
>>>
>>> Oh well, so much for that then. Yes, sched_clock() is at least called from
>>> printk path.
>>>
>>>
>>> I guess we will have to go with v2 then, we don't want to start seeing time
>>> going back, even if only with older hypervisors. The only thing I might ask is
>>> that you roll the logic inside xen_hvm_init_time_ops(). Something like
>>>
>>>
>>> xen_hvm_init_time_ops()
>>> {
>>>      /*
>>>       * Wait until per_cpu(xen_vcpu, 0) is initialized which may happen
>>>       * later (e.g. when kdump kernel runs on >=MAX_VIRT_CPUS vcpu)
>>>       */
>>>      if (__this_cpu_read(xen_vcpu_nr(0)) == NULL)
>>>          return;
>>>
>> I think you meant __this_cpu_read(xen_vcpu).
>>
>> I will call xen_hvm_init_time_ops() at both places, and move the logic into
>> xen_hvm_init_time_ops().
>>
>> Thank you very much!
>>
>> Dongli Zhang
>>
>
> How about we do not move the logic into xen_hvm_init_time_ops()?
>
> Suppose we move the logic into xen_hvm_init_time_ops() line 573, the line line
> 570 might be printed twice.


You would need to make sure the routine is executed only once so something like a local static variable would be needed.


>
>
> 559 void __init xen_hvm_init_time_ops(void)
> 560 {
> 561         /*
> 562          * vector callback is needed otherwise we cannot receive interrupts
> 563          * on cpu > 0 and at this point we don't know how many cpus are
> 564          * available.
> 565          */
> 566         if (!xen_have_vector_callback)
> 567                 return;
> 568
> 569         if (!xen_feature(XENFEAT_hvm_safe_pvclock)) {
> 570                 pr_info("Xen doesn't support pvclock on HVM, disable pv timer");
> 571                 return;
> 572         }
> 573
> 574         xen_init_time_common();
> 575
> 576         x86_init.timers.setup_percpu_clockev = xen_time_init;
> 577         x86_cpuinit.setup_percpu_clockev = xen_hvm_setup_cpu_clockevents;
> 578
> 579         x86_platform.set_wallclock = xen_set_wallclock;
> 580 }
>
> I feel the code looks better if we keep the logic at caller side. Would you mind
> letting me know your feedback?


My preference is to keep logic concentrated in one place whenever possible.


-boris



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 17:35:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 17:35:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281689.480119 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP6PV-0004s4-5v; Tue, 01 Mar 2022 17:35:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281689.480119; Tue, 01 Mar 2022 17:35:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP6PV-0004rx-2H; Tue, 01 Mar 2022 17:35:41 +0000
Received: by outflank-mailman (input) for mailman id 281689;
 Tue, 01 Mar 2022 17:35:40 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP6PU-0004rn-2d; Tue, 01 Mar 2022 17:35:40 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP6PT-0004Nd-RC; Tue, 01 Mar 2022 17:35:39 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP6PT-0006o4-H5; Tue, 01 Mar 2022 17:35:39 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nP6PT-0000Rl-Gd; Tue, 01 Mar 2022 17:35:39 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=HzFW7dPbtcsWBCEKi104ei/kdQqBIRXoPWIfJymmJnU=; b=BmXXDlio+bxwOmC9rl6r2D3CcY
	r1uFdeUWldQq8IjYuZ8xpHSwTL10Zvow1nrr/bKG3QyFapusm2qIOjCm4KYrb69p5Y8j3yGiVTpHU
	UcJ5bYOKaLBEoQ1h7ApyhxZVxwb29yifHi5DkM1XoSDZ9mR2v5BINJzd/DBht3iQC278=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168289-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168289: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-armhf-armhf-xl-rtds:guest-start.2:fail:allowable
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=a8d39f5b5ae899b1c872f128f82959158cfce048
X-Osstest-Versions-That:
    qemuu=00483d386901173e84c7965f9f0d678791a75e01
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 01 Mar 2022 17:35:39 +0000

flight 168289 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168289/

Failures :-/ but no regressions.

Regressions which are regarded as allowable (not blocking):
 test-armhf-armhf-xl-rtds     19 guest-start.2            fail REGR. vs. 168255

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168255
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168255
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168255
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168255
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168255
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168255
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168255
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168255
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 qemuu                a8d39f5b5ae899b1c872f128f82959158cfce048
baseline version:
 qemuu                00483d386901173e84c7965f9f0d678791a75e01

Last test of basis   168255  2022-02-28 17:08:25 Z    1 days
Testing same since   168289  2022-03-01 11:07:45 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Cédric Le Goater <clg@kaod.org>
  Joel Stanley <joel@jms.id.au>
  Peter Maydell <peter.maydell@linaro.org>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   00483d3869..a8d39f5b5a  a8d39f5b5ae899b1c872f128f82959158cfce048 -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 18:20:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 18:20:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281702.480135 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP76V-0002IN-NF; Tue, 01 Mar 2022 18:20:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281702.480135; Tue, 01 Mar 2022 18:20:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP76V-0002IG-JS; Tue, 01 Mar 2022 18:20:07 +0000
Received: by outflank-mailman (input) for mailman id 281702;
 Tue, 01 Mar 2022 18:20:06 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP76U-0002I6-F5; Tue, 01 Mar 2022 18:20:06 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP76U-0005Bd-Bh; Tue, 01 Mar 2022 18:20:06 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP76U-0000Tp-1h; Tue, 01 Mar 2022 18:20:06 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nP76U-0002fZ-1F; Tue, 01 Mar 2022 18:20:06 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=j0Kbs40vLLH/DCfYksNY1A5KGcSGiIMsiMYbFBppfx4=; b=VjjV7w/hpOVB6PkEkTJu4lZI2v
	OzDH3TAJ34oVovU7ZhXIMpUWRigp8iX61ZvbPyEHHFkjWNzH6Fb/jNrEZBZvf2VUI4cpObrb+pPDa
	48PXP0cHLsyiwI2qAiR06CtkzmBXf8ySfyulNC6w/m5qQdkrOphpzlEt843GV388jjwU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168299-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168299: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=497ac7b6d7f9750f48f137db244931a5728b1968
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 01 Mar 2022 18:20:06 +0000

flight 168299 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168299/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 497ac7b6d7f9750f48f137db244931a5728b1968
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    1 days
Failing since        168258  2022-03-01 01:55:31 Z    0 days    8 attempts
Testing same since   168262  2022-03-01 04:10:26 Z    0 days    7 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 18:21:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 18:21:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281712.480147 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP77j-0002uU-3L; Tue, 01 Mar 2022 18:21:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281712.480147; Tue, 01 Mar 2022 18:21:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP77j-0002uL-09; Tue, 01 Mar 2022 18:21:23 +0000
Received: by outflank-mailman (input) for mailman id 281712;
 Tue, 01 Mar 2022 18:21:21 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=V+QB=TM=oracle.com=konrad.wilk@srs-se1.protection.inumbo.net>)
 id 1nP77h-0002uD-BB
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 18:21:21 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 637fa19e-998c-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 19:21:19 +0100 (CET)
Received: from pps.filterd (m0246630.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 221GibBC021769; 
 Tue, 1 Mar 2022 18:20:30 GMT
Received: from aserp3030.oracle.com (aserp3030.oracle.com [141.146.126.71])
 by mx0b-00069f02.pphosted.com with ESMTP id 3ehdaysxfj-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Tue, 01 Mar 2022 18:20:29 +0000
Received: from pps.filterd (aserp3030.oracle.com [127.0.0.1])
 by aserp3030.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 221I1JQc108032;
 Tue, 1 Mar 2022 18:20:29 GMT
Received: from nam10-dm6-obe.outbound.protection.outlook.com
 (mail-dm6nam10lp2106.outbound.protection.outlook.com [104.47.58.106])
 by aserp3030.oracle.com with ESMTP id 3efa8ehhee-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Tue, 01 Mar 2022 18:20:28 +0000
Received: from BYAPR10MB2999.namprd10.prod.outlook.com (2603:10b6:a03:85::27)
 by BN6PR1001MB2145.namprd10.prod.outlook.com (2603:10b6:405:2d::38)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.24; Tue, 1 Mar
 2022 18:20:27 +0000
Received: from BYAPR10MB2999.namprd10.prod.outlook.com
 ([fe80::d06b:5108:1d72:ac6c]) by BYAPR10MB2999.namprd10.prod.outlook.com
 ([fe80::d06b:5108:1d72:ac6c%5]) with mapi id 15.20.5038.014; Tue, 1 Mar 2022
 18:20:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 637fa19e-998c-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=date : from : to : cc
 : subject : message-id : references : content-type : in-reply-to :
 mime-version; s=corp-2021-07-09;
 bh=uolvxQacXYmhg6H3oD0H5MVWhM/QphFrFeGOHREHM6k=;
 b=xt7vB76B1jEYqBcWNxIQQ4P9qzlf8BEunkxJ0fLEEPaSz2GzMKYukPUvMBfXI3ojVWsl
 lOL+Thi951bPUYwk6m9qcV4CHGuLip9WwL5L58eozoxuOXM18y9A/zWA3LI0fHjTovWI
 gZgYxH6RvBGo7qrC/dUpLXuydn0HnugZTz2trCH/MzOPmcE7cNfrTOruFizMG1vh2QBD
 VgvPK9SRD9s7p4TESSQ4S0gX+o1/cxEROfAwZJpgkroH9+lRyLkQbZZ+kMtgv8LN1Zn6
 vhChsxWRfg2NzTFWxQi+zNuCNFPg+9fqqfilEtL6nC2YgMV3289FOj/9/dEgYSr30kWb BA== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=RTEkQ3+VW0KrT7/MofZKpdMQUN7WPAk3KY0OKVReLptjXfFUjz4TuQPnLxJVvDyHU1vzmfsejbdWUWz8yDRg5Aau4gwceJBdr4x2Hb2AAUtJmfA7eeLHnH5HWvIoaWir+GQKlWo3QAz+X6hQP+T3090iV94KG0gKdLnb91kUaS+iP+XP92LyWc1BnDmOBAbZo/0FmyxtMOD+Buk2jKrsTEB08+1medsg82zY3m+r4SrTYRJpth/OCjchimLOS7VXsMqmbXBo5R2qO+jHpCrVpQZ3ZGXotDuCdl6ZXMEqvX8BRRvwHyOZtgbQT6m7gBE/Ox180bqdSNEJPj2qPF0nyA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=uolvxQacXYmhg6H3oD0H5MVWhM/QphFrFeGOHREHM6k=;
 b=ABUYj9cyWP8PCp2htP2NAZDrB/GO3uGXY6dKkHOdbPsf2gK99sCcHHyLLCkve+HYysqKYNyLXXlQo3bKdGNzN5nEcp40VIAR+KK1dPClJhay9/gqacJ7WwQgmGLNh0ulo1aoKzGirOmpJYYiFg8TKvYshXPQSH+lXlKp/zHJ5zgfjybFpm5rdtm+Fg5SoaI4Va30VtCH07mQQlrmWo6+WYNkJBWS5fIiI7pCnT6eWip0I8Q+nTR6C0dDI9t64JVkjY50PO+KDa6B8jtUwaftHqLhtC+JTVCxXot7f3PRu1bHkJ+d9GtFF+FVrNuMPvd5xl+eyXgeYMOU2jqALFCuBw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=uolvxQacXYmhg6H3oD0H5MVWhM/QphFrFeGOHREHM6k=;
 b=xDglO4tWOiUv9F1nbCfdc6cvuc1CJyDdCfLuhlBPhDzmv0RN6mggAgilvV4rXkjUKJ23vXFuxdwvaltsD9xaBkjbqw1OytzEN8W4o5SDe+MxtYofbojHgB4cgVvTfMQO+gJdygPTkeWeMjktRvL3FAETDPhX5jjMjQksbWnJ90A=
Date: Tue, 1 Mar 2022 13:20:22 -0500
From: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
To: Christoph Hellwig <hch@lst.de>
Cc: iommu@lists.linux-foundation.org, x86@kernel.org,
        Anshuman Khandual <anshuman.khandual@arm.com>,
        Stefano Stabellini <sstabellini@kernel.org>,
        Boris Ostrovsky <boris.ostrovsky@oracle.com>,
        Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
        David Woodhouse <dwmw2@infradead.org>,
        Lu Baolu <baolu.lu@linux.intel.com>,
        Robin Murphy <robin.murphy@arm.com>,
        linux-arm-kernel@lists.infradead.org, xen-devel@lists.xenproject.org,
        linux-ia64@vger.kernel.org, linux-mips@vger.kernel.org,
        linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org,
        linux-s390@vger.kernel.org, linux-hyperv@vger.kernel.org,
        tboot-devel@lists.sourceforge.net, linux-pci@vger.kernel.org
Subject: Re: [PATCH 07/11] x86: remove the IOMMU table infrastructure
Message-ID: <Yh5j5q5n/GyU0/1n@0xbeefdead.lan>
References: <20220227143055.335596-1-hch@lst.de>
 <20220227143055.335596-8-hch@lst.de>
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20220227143055.335596-8-hch@lst.de>
X-ClientProxiedBy: BL1P223CA0009.NAMP223.PROD.OUTLOOK.COM
 (2603:10b6:208:2c4::14) To BYAPR10MB2999.namprd10.prod.outlook.com
 (2603:10b6:a03:85::27)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: e9d924ff-f2f5-4ebb-efcb-08d9fbb028f3
X-MS-TrafficTypeDiagnostic: BN6PR1001MB2145:EE_
X-Microsoft-Antispam-PRVS: 
	<BN6PR1001MB2145D7E888BCDD1AEB014F7589029@BN6PR1001MB2145.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR10MB2999.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(26005)(6512007)(508600001)(7416002)(9686003)(8936002)(5660300002)(186003)(83380400001)(6486002)(4744005)(52116002)(86362001)(6916009)(54906003)(66946007)(2906002)(6506007)(38350700002)(316002)(6666004)(36756003)(66556008)(66476007)(38100700002)(4326008)(8676002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?us-ascii?Q?z7srtht3IKXb5mVU5m92ELUiYvGhBogF9JhMOfxwcCeBRFJHpeXs1zxPP9qt?=
 =?us-ascii?Q?AKL2LY9LVzBPhHu5V0T3WBj7Gay/MwLcXS2CAup+h2z4iR78ovr89+Dnm2Ld?=
 =?us-ascii?Q?UrUnj//6W3vo3QZODXSxJEtSpSiFj3SX9iKeZ2Exe2TfCDONWUjIMHQdUbSC?=
 =?us-ascii?Q?dPEMc7YiNoEZVAPrhazsupT/Mgkg9vNIZ4GkTTdt9st8obEOslwesXRwp7v+?=
 =?us-ascii?Q?Ae51MH9W767t9gcwRGjn26j9l53B0nLzZSNWdlssi6h5fxLbLiOxaB3frNfV?=
 =?us-ascii?Q?gI4rCv/p9VnifZ8HUkY5KJnEMSTvxKkCcXmlyTgFnOwcWg8i4I7Ltn5cSSks?=
 =?us-ascii?Q?UqFdUyUuQCF0z899mJzCuyF0AhB0iuChSaHyhxA8uJ2i7N7Tohqzu5zyqKpu?=
 =?us-ascii?Q?wkXzeu3MVB/q6xJqeg/UQq7G/5cedUN8Ul0FHKPeMYF3xSYo7QDheyaKbziU?=
 =?us-ascii?Q?Kg+2Yy2lnS5q7XKEbwoMQ7XfuN6yl24DijBSte6N5zJZ+BM9x7M4VEZBGhT4?=
 =?us-ascii?Q?UgJxbfnN+gW9kXlGXsOsEclVWmaimxjCsYrf96AqHDMGsIdqziU4LjNREDSQ?=
 =?us-ascii?Q?bDdGNMAJEY43lVSR2Go7P/p6vGcp4C5DKkTA/2Y51VdiTTueU3ig7AjXqGIK?=
 =?us-ascii?Q?V7xIDgg8eG9+ZClcis4Y+e36nBwNKqaattKL+GuEGvh1lOfRmg9b8hQwzeGS?=
 =?us-ascii?Q?UEJaQGUVW3gLBIsBQeBZoTVo0MnHXYMI6uVak39zNk0OVDNoP8MeM8uWX0sj?=
 =?us-ascii?Q?XBot+wVPWI6rE7d9MupXZI/FJKnPl38Z/mZpZrpB3FVHafMujOO7mCHZwO31?=
 =?us-ascii?Q?oOi3uegaXOeuvbNSc1vyxfFz0zL9k+WLv+qpZPme6mv9/mmDa/MsEkSQe9xs?=
 =?us-ascii?Q?wY26xnM5bKngOZ8YI8rYEHlKKR9etqCD7z+CMGbT4HOeefIY3ZuBu+4mkJvq?=
 =?us-ascii?Q?PoGymggFXNwaQzw7SGMhF9y/vmP/niCoftXhnsrxJXlSObDM0UgtWeLjXGGu?=
 =?us-ascii?Q?TxrqsnQRDWeifT/rwDUSR/daQgUfAbr9Jswki7o1NwLWjqTdUJUrz7fWudH5?=
 =?us-ascii?Q?ySYhZzJHVemfam4PwUMoR9wShPO5kxTCsjKl++PjVuyvlFccMOqyRb9Tpw28?=
 =?us-ascii?Q?JNbn/S1EidVmIVwnCNL1pwhoTpJ8Z1pKWXL1eG4FqCxghELuZogZL0KYtZj1?=
 =?us-ascii?Q?iZVzjNOBHGQpu6gcJPHNU6zPpOIB/UgA4bdWOcCcw7XjJMY85rAHJPRQjx3p?=
 =?us-ascii?Q?5DqKB1hOPvpeA49iESkLGGENz8Tm9fLZdC4lTfSvFp5qVZUKNdzROzZXbn3h?=
 =?us-ascii?Q?Sy24x3GYe5tXWTevh4dE1aL705aMggtxKCE6/kc839b/Q9srD3JI8m3z/Shs?=
 =?us-ascii?Q?H6f7P6hW8ImEvjOmxujqZ/aRcRYNLKZbBwZkUxjvguifoUoAJlcCWbVaodNG?=
 =?us-ascii?Q?fxyoJW+TFkNCs8BUaNnrKU4fFtQLCjG0qDJMC4EEj7L0EZ6pkd3f5b3Gl6/T?=
 =?us-ascii?Q?cZStqh8Gq5+ulKQSfHPFv9NK174GYE9vwRZoAMsFPs8Xo6Xgd9YIMAf66dOu?=
 =?us-ascii?Q?WGD6hHk/QMzfp01L9PiSN9oLXkFb6ujEJMAQyIlIgdhMMrtz/DYf8TCl7LFH?=
 =?us-ascii?Q?EWCj8xCGlCXK2x9JCfEVl3A=3D?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e9d924ff-f2f5-4ebb-efcb-08d9fbb028f3
X-MS-Exchange-CrossTenant-AuthSource: BYAPR10MB2999.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Mar 2022 18:20:27.1245
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: nHKZJHL5Fd9+ay+RKT4Mc3Poar9CEw1upWk5crVmkMULgkWOMgZ3NUaCBjzcs/Yl3WKLXUK8gxejnIBgqEkSDA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR1001MB2145
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10273 signatures=685966
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 adultscore=0 bulkscore=0 phishscore=0
 malwarescore=0 mlxscore=0 suspectscore=0 spamscore=0 mlxlogscore=999
 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2201110000
 definitions=main-2203010092
X-Proofpoint-GUID: Wj3Br-e4L6ngZnnKtFr824BC2zi0-dGS
X-Proofpoint-ORIG-GUID: Wj3Br-e4L6ngZnnKtFr824BC2zi0-dGS

> -#include <asm/swiotlb.h>
> -
> -/*
> - * History lesson:
> - * The execution chain of IOMMUs in 2.6.36 looks as so:
> - *
> - *            [xen-swiotlb]
> - *                 |
> - *         +----[swiotlb *]--+
> - *        /         |         \
> - *       /          |          \
> - *    [GART]     [Calgary]  [Intel VT-d]
> - *     /
> - *    /
> - * [AMD-Vi]

.. snip..
> - *
>  void __init pci_iommu_alloc(void)
>  {
> -	struct iommu_table_entry *p;
> -
> -	sort_iommu_table(__iommu_table, __iommu_table_end);
> -	check_iommu_entries(__iommu_table, __iommu_table_end);
> -
> -	for (p = __iommu_table; p < __iommu_table_end; p++) {
> -		if (p && p->detect && p->detect() > 0) {
> -			p->flags |= IOMMU_DETECTED;
> -			if (p->early_init)
> -				p->early_init();
> -			if (p->flags & IOMMU_FINISH_IF_DETECTED)
> -				break;
> -		}
> +	if (xen_pv_domain()) {
> +		pci_xen_swiotlb_init();
> +		return;
>  	}
> +	pci_swiotlb_detect_4gb();

I think you also need to check for IBM Calgary?

> +	gart_iommu_hole_init();
> +	amd_iommu_detect();
> +	detect_intel_iommu();
> +	if (x86_swiotlb_enable)
> +		swiotlb_init(0);


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 20:16:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 20:16:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281732.480189 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP8ua-0007Gv-2b; Tue, 01 Mar 2022 20:15:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281732.480189; Tue, 01 Mar 2022 20:15:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP8uZ-0007Go-Uz; Tue, 01 Mar 2022 20:15:55 +0000
Received: by outflank-mailman (input) for mailman id 281732;
 Tue, 01 Mar 2022 20:15:54 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=5KN6=TM=kernel.org=sashal@srs-se1.protection.inumbo.net>)
 id 1nP8uY-0007Gi-FH
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 20:15:54 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 642fa7a8-999c-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 21:15:52 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 2731A6173F;
 Tue,  1 Mar 2022 20:15:51 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 63E80C340EF;
 Tue,  1 Mar 2022 20:15:47 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 642fa7a8-999c-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646165750;
	bh=ktPF91zrjQqYukHJvi8JLaQ23mLJd5oC5eRxAgYO28Q=;
	h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
	b=ENjX7uzT/NGwUJDdsXSevrSMeGX1v91JOzh8isKuuoAK7dMaSpswr26O4CwbVUPzI
	 rBw6tZ5Mpii68ccEjrc4jju8oJq7kEqzPLjxscueDel2NZ4Xyt0h6EPHTmV1kF1kf+
	 6AXxVZmMJVJ0Q8GkVB7/mRcBd2HVCMKXQ18jZed9366rf3CbAsJ4+J2ObzHpY7IXhj
	 1sAMeyEEnw+J/iGYRPB5gegoipmoqY/dxxIVLejPMbT2qvwc7aPSd5JpE0khyrWWS+
	 JB5n5gVN9NPt/EUqVdsxIvpnWZ6JlFOFgiBNZpybd9A127/u5jQcmPM+qNKvQRMdwn
	 0jLF9mVVgKeZQ==
From: Sasha Levin <sashal@kernel.org>
To: linux-kernel@vger.kernel.org,
	stable@vger.kernel.org
Cc: =?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>,
	Paul Durrant <paul@xen.org>,
	Jakub Kicinski <kuba@kernel.org>,
	Sasha Levin <sashal@kernel.org>,
	wei.liu@kernel.org,
	davem@davemloft.net,
	xen-devel@lists.xenproject.org,
	netdev@vger.kernel.org
Subject: [PATCH AUTOSEL 5.16 21/28] Revert "xen-netback: remove 'hotplug-status' once it has served its purpose"
Date: Tue,  1 Mar 2022 15:13:26 -0500
Message-Id: <20220301201344.18191-21-sashal@kernel.org>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220301201344.18191-1-sashal@kernel.org>
References: <20220301201344.18191-1-sashal@kernel.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
X-stable: review
X-Patchwork-Hint: Ignore
Content-Transfer-Encoding: 8bit

From: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>

[ Upstream commit 0f4558ae91870692ce7f509c31c9d6ee721d8cdc ]

This reverts commit 1f2565780e9b7218cf92c7630130e82dcc0fe9c2.

The 'hotplug-status' node should not be removed as long as the vif
device remains configured. Otherwise the xen-netback would wait for
re-running the network script even if it was already called (in case of
the frontent re-connecting). But also, it _should_ be removed when the
vif device is destroyed (for example when unbinding the driver) -
otherwise hotplug script would not configure the device whenever it
re-appear.

Moving removal of the 'hotplug-status' node was a workaround for nothing
calling network script after xen-netback module is reloaded. But when
vif interface is re-created (on xen-netback unbind/bind for example),
the script should be called, regardless of who does that - currently
this case is not handled by the toolstack, and requires manual
script call. Keeping hotplug-status=connected to skip the call is wrong
and leads to not configured interface.

More discussion at
https://lore.kernel.org/xen-devel/afedd7cb-a291-e773-8b0d-4db9b291fa98@ipxe.org/T/#u

Signed-off-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
Reviewed-by: Paul Durrant <paul@xen.org>
Link: https://lore.kernel.org/r/20220222001817.2264967-1-marmarek@invisiblethingslab.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---
 drivers/net/xen-netback/xenbus.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/drivers/net/xen-netback/xenbus.c b/drivers/net/xen-netback/xenbus.c
index d24b7a7993aa0..3fad58d22155b 100644
--- a/drivers/net/xen-netback/xenbus.c
+++ b/drivers/net/xen-netback/xenbus.c
@@ -256,6 +256,7 @@ static void backend_disconnect(struct backend_info *be)
 		unsigned int queue_index;
 
 		xen_unregister_watchers(vif);
+		xenbus_rm(XBT_NIL, be->dev->nodename, "hotplug-status");
 #ifdef CONFIG_DEBUG_FS
 		xenvif_debugfs_delif(vif);
 #endif /* CONFIG_DEBUG_FS */
@@ -675,7 +676,6 @@ static void hotplug_status_changed(struct xenbus_watch *watch,
 
 		/* Not interested in this watch anymore. */
 		unregister_hotplug_status_watch(be);
-		xenbus_rm(XBT_NIL, be->dev->nodename, "hotplug-status");
 	}
 	kfree(str);
 }
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 20:16:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 20:16:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281733.480200 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP8ue-0007Wx-C5; Tue, 01 Mar 2022 20:16:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281733.480200; Tue, 01 Mar 2022 20:16:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP8ue-0007Wq-6n; Tue, 01 Mar 2022 20:16:00 +0000
Received: by outflank-mailman (input) for mailman id 281733;
 Tue, 01 Mar 2022 20:15:58 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=5KN6=TM=kernel.org=sashal@srs-se1.protection.inumbo.net>)
 id 1nP8uc-0007Gi-Gr
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 20:15:58 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 673f5079-999c-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 21:15:57 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 70AA561660;
 Tue,  1 Mar 2022 20:15:56 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 50981C36AE5;
 Tue,  1 Mar 2022 20:15:51 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 673f5079-999c-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646165755;
	bh=pw0Qj8vjosGWO4vo4tauge3HBJo809oseTBs39UMTuE=;
	h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
	b=Cf7WkDdcPErdbHz/jdnLHgVJNSLfl9pSkBiaMGC1lNYzB8h1v31LWuSWZSM+gMDj1
	 vmYEzRbTZ5khT8T3mmm4R9YpzmbkJItVqvSR9PPhV1RwxiX7tDfh61zykTOBx3FeCk
	 G5Fa6+VrzjanTRkm/ty/KssRR1q4C6bbOq1IGW5Ohzwfg2pl00bafpZas3pGzROlmu
	 wnvGVihkVDYJDAC7YInCZi5HuJhZzVsyNai389IcEotROQscbuOr415k3+9JEYctRg
	 SXZ4NmcV6mouTa3e9zJVPz6o6/qRq8kmmK/lG/XPmRtR4EobzkFmk6DlYAArX/Ocio
	 sboPtiqgsyl0w==
From: Sasha Levin <sashal@kernel.org>
To: linux-kernel@vger.kernel.org,
	stable@vger.kernel.org
Cc: =?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>,
	Paul Durrant <paul@xen.org>,
	Michael Brown <mbrown@fensystems.co.uk>,
	Jakub Kicinski <kuba@kernel.org>,
	Sasha Levin <sashal@kernel.org>,
	wei.liu@kernel.org,
	davem@davemloft.net,
	xen-devel@lists.xenproject.org,
	netdev@vger.kernel.org
Subject: [PATCH AUTOSEL 5.16 22/28] Revert "xen-netback: Check for hotplug-status existence before watching"
Date: Tue,  1 Mar 2022 15:13:27 -0500
Message-Id: <20220301201344.18191-22-sashal@kernel.org>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220301201344.18191-1-sashal@kernel.org>
References: <20220301201344.18191-1-sashal@kernel.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
X-stable: review
X-Patchwork-Hint: Ignore
Content-Transfer-Encoding: 8bit

From: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>

[ Upstream commit e8240addd0a3919e0fd7436416afe9aa6429c484 ]

This reverts commit 2afeec08ab5c86ae21952151f726bfe184f6b23d.

The reasoning in the commit was wrong - the code expected to setup the
watch even if 'hotplug-status' didn't exist. In fact, it relied on the
watch being fired the first time - to check if maybe 'hotplug-status' is
already set to 'connected'. Not registering a watch for non-existing
path (which is the case if hotplug script hasn't been executed yet),
made the backend not waiting for the hotplug script to execute. This in
turns, made the netfront think the interface is fully operational, while
in fact it was not (the vif interface on xen-netback side might not be
configured yet).

This was a workaround for 'hotplug-status' erroneously being removed.
But since that is reverted now, the workaround is not necessary either.

More discussion at
https://lore.kernel.org/xen-devel/afedd7cb-a291-e773-8b0d-4db9b291fa98@ipxe.org/T/#u

Signed-off-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
Reviewed-by: Paul Durrant <paul@xen.org>
Reviewed-by: Michael Brown <mbrown@fensystems.co.uk>
Link: https://lore.kernel.org/r/20220222001817.2264967-2-marmarek@invisiblethingslab.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---
 drivers/net/xen-netback/xenbus.c | 12 ++++--------
 1 file changed, 4 insertions(+), 8 deletions(-)

diff --git a/drivers/net/xen-netback/xenbus.c b/drivers/net/xen-netback/xenbus.c
index 3fad58d22155b..990360d75cb64 100644
--- a/drivers/net/xen-netback/xenbus.c
+++ b/drivers/net/xen-netback/xenbus.c
@@ -824,15 +824,11 @@ static void connect(struct backend_info *be)
 	xenvif_carrier_on(be->vif);
 
 	unregister_hotplug_status_watch(be);
-	if (xenbus_exists(XBT_NIL, dev->nodename, "hotplug-status")) {
-		err = xenbus_watch_pathfmt(dev, &be->hotplug_status_watch,
-					   NULL, hotplug_status_changed,
-					   "%s/%s", dev->nodename,
-					   "hotplug-status");
-		if (err)
-			goto err;
+	err = xenbus_watch_pathfmt(dev, &be->hotplug_status_watch, NULL,
+				   hotplug_status_changed,
+				   "%s/%s", dev->nodename, "hotplug-status");
+	if (!err)
 		be->have_hotplug_status_watch = 1;
-	}
 
 	netif_tx_wake_all_queues(be->vif->dev);
 
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 20:18:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 20:18:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281746.480211 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP8wc-0000Av-M3; Tue, 01 Mar 2022 20:18:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281746.480211; Tue, 01 Mar 2022 20:18:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP8wc-0000An-J8; Tue, 01 Mar 2022 20:18:02 +0000
Received: by outflank-mailman (input) for mailman id 281746;
 Tue, 01 Mar 2022 20:18:01 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=5KN6=TM=kernel.org=sashal@srs-se1.protection.inumbo.net>)
 id 1nP8wb-0000Ah-0Y
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 20:18:01 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org
 [2604:1380:4641:c500::1])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id af626cfe-999c-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 21:17:59 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 7FAA761774;
 Tue,  1 Mar 2022 20:17:57 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 162F8C340EE;
 Tue,  1 Mar 2022 20:17:53 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: af626cfe-999c-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646165877;
	bh=ktPF91zrjQqYukHJvi8JLaQ23mLJd5oC5eRxAgYO28Q=;
	h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
	b=CP935D0wG5TwqsAcWuYjMySe/Jun2DWqSzaCQpAZu0fpL95jZmJwxywMTaSTbzVRj
	 tqdqJRY31l4U+DpDkPXL31nCmw1SRYPIuqRAFM5ozaYf421VoKGBuv6TfZmgSin8a6
	 5OEHS2ZvR8EygJKIjBCJfxL9x2ziqIjXvdIIVQANhpEyvdt+OgnWGIDUjov9y859ZE
	 ErJQJ8vzXDNWph7LKktEK95Xnr1uek4AMdb9Ek+xFw51QwyJJy3T8v+ZhzMjKH0g6A
	 KxBiZPlsYg6+R6vWbAciBo6oUt3KinACWwH+hApxukht0vyb+y2FiK7FG8YevVDCvY
	 qR+zcYu4R3WuQ==
From: Sasha Levin <sashal@kernel.org>
To: linux-kernel@vger.kernel.org,
	stable@vger.kernel.org
Cc: =?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>,
	Paul Durrant <paul@xen.org>,
	Jakub Kicinski <kuba@kernel.org>,
	Sasha Levin <sashal@kernel.org>,
	wei.liu@kernel.org,
	davem@davemloft.net,
	xen-devel@lists.xenproject.org,
	netdev@vger.kernel.org
Subject: [PATCH AUTOSEL 5.15 17/23] Revert "xen-netback: remove 'hotplug-status' once it has served its purpose"
Date: Tue,  1 Mar 2022 15:16:16 -0500
Message-Id: <20220301201629.18547-17-sashal@kernel.org>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220301201629.18547-1-sashal@kernel.org>
References: <20220301201629.18547-1-sashal@kernel.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
X-stable: review
X-Patchwork-Hint: Ignore
Content-Transfer-Encoding: 8bit

From: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>

[ Upstream commit 0f4558ae91870692ce7f509c31c9d6ee721d8cdc ]

This reverts commit 1f2565780e9b7218cf92c7630130e82dcc0fe9c2.

The 'hotplug-status' node should not be removed as long as the vif
device remains configured. Otherwise the xen-netback would wait for
re-running the network script even if it was already called (in case of
the frontent re-connecting). But also, it _should_ be removed when the
vif device is destroyed (for example when unbinding the driver) -
otherwise hotplug script would not configure the device whenever it
re-appear.

Moving removal of the 'hotplug-status' node was a workaround for nothing
calling network script after xen-netback module is reloaded. But when
vif interface is re-created (on xen-netback unbind/bind for example),
the script should be called, regardless of who does that - currently
this case is not handled by the toolstack, and requires manual
script call. Keeping hotplug-status=connected to skip the call is wrong
and leads to not configured interface.

More discussion at
https://lore.kernel.org/xen-devel/afedd7cb-a291-e773-8b0d-4db9b291fa98@ipxe.org/T/#u

Signed-off-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
Reviewed-by: Paul Durrant <paul@xen.org>
Link: https://lore.kernel.org/r/20220222001817.2264967-1-marmarek@invisiblethingslab.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---
 drivers/net/xen-netback/xenbus.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/drivers/net/xen-netback/xenbus.c b/drivers/net/xen-netback/xenbus.c
index d24b7a7993aa0..3fad58d22155b 100644
--- a/drivers/net/xen-netback/xenbus.c
+++ b/drivers/net/xen-netback/xenbus.c
@@ -256,6 +256,7 @@ static void backend_disconnect(struct backend_info *be)
 		unsigned int queue_index;
 
 		xen_unregister_watchers(vif);
+		xenbus_rm(XBT_NIL, be->dev->nodename, "hotplug-status");
 #ifdef CONFIG_DEBUG_FS
 		xenvif_debugfs_delif(vif);
 #endif /* CONFIG_DEBUG_FS */
@@ -675,7 +676,6 @@ static void hotplug_status_changed(struct xenbus_watch *watch,
 
 		/* Not interested in this watch anymore. */
 		unregister_hotplug_status_watch(be);
-		xenbus_rm(XBT_NIL, be->dev->nodename, "hotplug-status");
 	}
 	kfree(str);
 }
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 20:18:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 20:18:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281747.480222 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP8wg-0000T4-UQ; Tue, 01 Mar 2022 20:18:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281747.480222; Tue, 01 Mar 2022 20:18:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP8wg-0000Sv-Qf; Tue, 01 Mar 2022 20:18:06 +0000
Received: by outflank-mailman (input) for mailman id 281747;
 Tue, 01 Mar 2022 20:18:05 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=5KN6=TM=kernel.org=sashal@srs-se1.protection.inumbo.net>)
 id 1nP8wf-0000Rt-K1
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 20:18:05 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b318ceb9-999c-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 21:18:04 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 11242B81D40;
 Tue,  1 Mar 2022 20:18:03 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2002FC340EE;
 Tue,  1 Mar 2022 20:17:57 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b318ceb9-999c-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646165882;
	bh=pw0Qj8vjosGWO4vo4tauge3HBJo809oseTBs39UMTuE=;
	h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
	b=KHAGf/B8QH90/Ba7i60IjQtmaoPSJVbHFBwhp2w6ftD1c1EkxmOoUXSG+bEaI5VbX
	 9nfaSFQe/npJ1IBPaZXzzedJ4azBajOXIXyO0SY0rxqvPv0Y6nC0fBkRb1/wlszNNT
	 HE7NbmdetzuGRDqlQH5ckDe1KuD+/hOUTuIr7RbcyIJJPddnebzABJLI5PsRdayNFH
	 O+q8Hwg1u/EALhXpegotjJMzmzVjgVqh9UfQ0ouBNmArfx1VHMCDn24j4YGRLT+s5j
	 h0ezFxAV96V+6LvtnQB0L/2OVJMMGQDo/CcfVkyU456jvMFJ6QQD2nNhTUFhx5L8pK
	 Y3b9fiLoD6c6g==
From: Sasha Levin <sashal@kernel.org>
To: linux-kernel@vger.kernel.org,
	stable@vger.kernel.org
Cc: =?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>,
	Paul Durrant <paul@xen.org>,
	Michael Brown <mbrown@fensystems.co.uk>,
	Jakub Kicinski <kuba@kernel.org>,
	Sasha Levin <sashal@kernel.org>,
	wei.liu@kernel.org,
	davem@davemloft.net,
	xen-devel@lists.xenproject.org,
	netdev@vger.kernel.org
Subject: [PATCH AUTOSEL 5.15 18/23] Revert "xen-netback: Check for hotplug-status existence before watching"
Date: Tue,  1 Mar 2022 15:16:17 -0500
Message-Id: <20220301201629.18547-18-sashal@kernel.org>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220301201629.18547-1-sashal@kernel.org>
References: <20220301201629.18547-1-sashal@kernel.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
X-stable: review
X-Patchwork-Hint: Ignore
Content-Transfer-Encoding: 8bit

From: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>

[ Upstream commit e8240addd0a3919e0fd7436416afe9aa6429c484 ]

This reverts commit 2afeec08ab5c86ae21952151f726bfe184f6b23d.

The reasoning in the commit was wrong - the code expected to setup the
watch even if 'hotplug-status' didn't exist. In fact, it relied on the
watch being fired the first time - to check if maybe 'hotplug-status' is
already set to 'connected'. Not registering a watch for non-existing
path (which is the case if hotplug script hasn't been executed yet),
made the backend not waiting for the hotplug script to execute. This in
turns, made the netfront think the interface is fully operational, while
in fact it was not (the vif interface on xen-netback side might not be
configured yet).

This was a workaround for 'hotplug-status' erroneously being removed.
But since that is reverted now, the workaround is not necessary either.

More discussion at
https://lore.kernel.org/xen-devel/afedd7cb-a291-e773-8b0d-4db9b291fa98@ipxe.org/T/#u

Signed-off-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
Reviewed-by: Paul Durrant <paul@xen.org>
Reviewed-by: Michael Brown <mbrown@fensystems.co.uk>
Link: https://lore.kernel.org/r/20220222001817.2264967-2-marmarek@invisiblethingslab.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---
 drivers/net/xen-netback/xenbus.c | 12 ++++--------
 1 file changed, 4 insertions(+), 8 deletions(-)

diff --git a/drivers/net/xen-netback/xenbus.c b/drivers/net/xen-netback/xenbus.c
index 3fad58d22155b..990360d75cb64 100644
--- a/drivers/net/xen-netback/xenbus.c
+++ b/drivers/net/xen-netback/xenbus.c
@@ -824,15 +824,11 @@ static void connect(struct backend_info *be)
 	xenvif_carrier_on(be->vif);
 
 	unregister_hotplug_status_watch(be);
-	if (xenbus_exists(XBT_NIL, dev->nodename, "hotplug-status")) {
-		err = xenbus_watch_pathfmt(dev, &be->hotplug_status_watch,
-					   NULL, hotplug_status_changed,
-					   "%s/%s", dev->nodename,
-					   "hotplug-status");
-		if (err)
-			goto err;
+	err = xenbus_watch_pathfmt(dev, &be->hotplug_status_watch, NULL,
+				   hotplug_status_changed,
+				   "%s/%s", dev->nodename, "hotplug-status");
+	if (!err)
 		be->have_hotplug_status_watch = 1;
-	}
 
 	netif_tx_wake_all_queues(be->vif->dev);
 
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 20:19:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 20:19:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281758.480233 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP8xs-0001Kj-AV; Tue, 01 Mar 2022 20:19:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281758.480233; Tue, 01 Mar 2022 20:19:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP8xs-0001Kc-6U; Tue, 01 Mar 2022 20:19:20 +0000
Received: by outflank-mailman (input) for mailman id 281758;
 Tue, 01 Mar 2022 20:19:19 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=5KN6=TM=kernel.org=sashal@srs-se1.protection.inumbo.net>)
 id 1nP8xr-0001KS-Ka
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 20:19:19 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id df790003-999c-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 21:19:18 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 31D7EB81D44;
 Tue,  1 Mar 2022 20:19:18 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id A399BC36AE5;
 Tue,  1 Mar 2022 20:19:14 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: df790003-999c-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646165957;
	bh=C+wyaY36ujuCY8gfIRQFdcYKiGxUSMFKCf8hXyx+qjE=;
	h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
	b=EozefPWiZWzcsW72npT0g2LHJhq4gIduBf6TcxikRU9VRRuAmTxr6ng6Lg+9MeOw2
	 IIwJZTsRuEB8ECqzd9DPiKAEen8bh6oQJ6KK+4BCNnr94DPgukC1YB+VpoMmDurooC
	 Hg/4LGLC9i0nTTE8ddQ/VyY1giiAvg0h893Mv+F6v+wAnZ+Fj1NUNGqmxrt7h1dqXH
	 QM0hCRtQ/Vs1rnELkF3B5q6w4LPRHJSIOjuxOcawLhXjJfbFJd4wO53gt+BiS2//G2
	 0MrutcmGKq7vdMSkJRq31vZhYWtvpEqEBiCIZYbYj84WNF137UiwNfwrp/NnaknUSt
	 8OZoBc00rjCwA==
From: Sasha Levin <sashal@kernel.org>
To: linux-kernel@vger.kernel.org,
	stable@vger.kernel.org
Cc: =?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>,
	Paul Durrant <paul@xen.org>,
	Jakub Kicinski <kuba@kernel.org>,
	Sasha Levin <sashal@kernel.org>,
	wei.liu@kernel.org,
	davem@davemloft.net,
	xen-devel@lists.xenproject.org,
	netdev@vger.kernel.org
Subject: [PATCH AUTOSEL 5.10 09/14] Revert "xen-netback: remove 'hotplug-status' once it has served its purpose"
Date: Tue,  1 Mar 2022 15:18:21 -0500
Message-Id: <20220301201833.18841-9-sashal@kernel.org>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220301201833.18841-1-sashal@kernel.org>
References: <20220301201833.18841-1-sashal@kernel.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
X-stable: review
X-Patchwork-Hint: Ignore
Content-Transfer-Encoding: 8bit

From: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>

[ Upstream commit 0f4558ae91870692ce7f509c31c9d6ee721d8cdc ]

This reverts commit 1f2565780e9b7218cf92c7630130e82dcc0fe9c2.

The 'hotplug-status' node should not be removed as long as the vif
device remains configured. Otherwise the xen-netback would wait for
re-running the network script even if it was already called (in case of
the frontent re-connecting). But also, it _should_ be removed when the
vif device is destroyed (for example when unbinding the driver) -
otherwise hotplug script would not configure the device whenever it
re-appear.

Moving removal of the 'hotplug-status' node was a workaround for nothing
calling network script after xen-netback module is reloaded. But when
vif interface is re-created (on xen-netback unbind/bind for example),
the script should be called, regardless of who does that - currently
this case is not handled by the toolstack, and requires manual
script call. Keeping hotplug-status=connected to skip the call is wrong
and leads to not configured interface.

More discussion at
https://lore.kernel.org/xen-devel/afedd7cb-a291-e773-8b0d-4db9b291fa98@ipxe.org/T/#u

Signed-off-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
Reviewed-by: Paul Durrant <paul@xen.org>
Link: https://lore.kernel.org/r/20220222001817.2264967-1-marmarek@invisiblethingslab.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---
 drivers/net/xen-netback/xenbus.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/drivers/net/xen-netback/xenbus.c b/drivers/net/xen-netback/xenbus.c
index 94d19158efc18..7acf3940dc1ff 100644
--- a/drivers/net/xen-netback/xenbus.c
+++ b/drivers/net/xen-netback/xenbus.c
@@ -256,6 +256,7 @@ static void backend_disconnect(struct backend_info *be)
 		unsigned int queue_index;
 
 		xen_unregister_watchers(vif);
+		xenbus_rm(XBT_NIL, be->dev->nodename, "hotplug-status");
 #ifdef CONFIG_DEBUG_FS
 		xenvif_debugfs_delif(vif);
 #endif /* CONFIG_DEBUG_FS */
@@ -675,7 +676,6 @@ static void hotplug_status_changed(struct xenbus_watch *watch,
 
 		/* Not interested in this watch anymore. */
 		unregister_hotplug_status_watch(be);
-		xenbus_rm(XBT_NIL, be->dev->nodename, "hotplug-status");
 	}
 	kfree(str);
 }
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 20:19:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 20:19:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281759.480243 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP8xx-0001d3-Hn; Tue, 01 Mar 2022 20:19:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281759.480243; Tue, 01 Mar 2022 20:19:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP8xx-0001cu-EU; Tue, 01 Mar 2022 20:19:25 +0000
Received: by outflank-mailman (input) for mailman id 281759;
 Tue, 01 Mar 2022 20:19:24 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=5KN6=TM=kernel.org=sashal@srs-se1.protection.inumbo.net>)
 id 1nP8xw-0001KS-MW
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 20:19:24 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e29ce3ea-999c-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 21:19:23 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 869A3B81D44;
 Tue,  1 Mar 2022 20:19:23 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9DB16C340EF;
 Tue,  1 Mar 2022 20:19:18 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e29ce3ea-999c-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646165962;
	bh=7DIF98D9Nnh9j9zlHtj60xMVnXJSxq5drnls3enId7I=;
	h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
	b=q/yuKn7h60nZhLIMp+ysAX9albRDhJGb7Vfd6BY0uF4QIz527d8RssvhIwX/3FAwv
	 JGsCDIfODWbBylPwQjXkmZY1tYWC2a8SXZZzjH0ALOcL01bnSDucKVInn5ldZ6/TlG
	 lubn8tz/6EN8gv5SmwnXy0xq98q4g4t0Y5MndcAagKDL5gye6tR8VAmE48XTmROB/B
	 8pAmG9dVuyKxL9wHbt2oO9gQG06U9uH+N1sW9XKUIQLJHZYTKyZbiX/YLsxbcDdFIU
	 kB5JmUhnK2jAx3iT5CSFqsIpmowM39nm3rq55NV9TPOglr6K5VkKAumP5PwqqYWbY3
	 2CuHsHB3uuc4w==
From: Sasha Levin <sashal@kernel.org>
To: linux-kernel@vger.kernel.org,
	stable@vger.kernel.org
Cc: =?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>,
	Paul Durrant <paul@xen.org>,
	Michael Brown <mbrown@fensystems.co.uk>,
	Jakub Kicinski <kuba@kernel.org>,
	Sasha Levin <sashal@kernel.org>,
	wei.liu@kernel.org,
	davem@davemloft.net,
	xen-devel@lists.xenproject.org,
	netdev@vger.kernel.org
Subject: [PATCH AUTOSEL 5.10 10/14] Revert "xen-netback: Check for hotplug-status existence before watching"
Date: Tue,  1 Mar 2022 15:18:22 -0500
Message-Id: <20220301201833.18841-10-sashal@kernel.org>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220301201833.18841-1-sashal@kernel.org>
References: <20220301201833.18841-1-sashal@kernel.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
X-stable: review
X-Patchwork-Hint: Ignore
Content-Transfer-Encoding: 8bit

From: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>

[ Upstream commit e8240addd0a3919e0fd7436416afe9aa6429c484 ]

This reverts commit 2afeec08ab5c86ae21952151f726bfe184f6b23d.

The reasoning in the commit was wrong - the code expected to setup the
watch even if 'hotplug-status' didn't exist. In fact, it relied on the
watch being fired the first time - to check if maybe 'hotplug-status' is
already set to 'connected'. Not registering a watch for non-existing
path (which is the case if hotplug script hasn't been executed yet),
made the backend not waiting for the hotplug script to execute. This in
turns, made the netfront think the interface is fully operational, while
in fact it was not (the vif interface on xen-netback side might not be
configured yet).

This was a workaround for 'hotplug-status' erroneously being removed.
But since that is reverted now, the workaround is not necessary either.

More discussion at
https://lore.kernel.org/xen-devel/afedd7cb-a291-e773-8b0d-4db9b291fa98@ipxe.org/T/#u

Signed-off-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
Reviewed-by: Paul Durrant <paul@xen.org>
Reviewed-by: Michael Brown <mbrown@fensystems.co.uk>
Link: https://lore.kernel.org/r/20220222001817.2264967-2-marmarek@invisiblethingslab.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---
 drivers/net/xen-netback/xenbus.c | 12 ++++--------
 1 file changed, 4 insertions(+), 8 deletions(-)

diff --git a/drivers/net/xen-netback/xenbus.c b/drivers/net/xen-netback/xenbus.c
index 7acf3940dc1ff..ca261e0fc9c9b 100644
--- a/drivers/net/xen-netback/xenbus.c
+++ b/drivers/net/xen-netback/xenbus.c
@@ -824,15 +824,11 @@ static void connect(struct backend_info *be)
 	xenvif_carrier_on(be->vif);
 
 	unregister_hotplug_status_watch(be);
-	if (xenbus_exists(XBT_NIL, dev->nodename, "hotplug-status")) {
-		err = xenbus_watch_pathfmt(dev, &be->hotplug_status_watch,
-					   NULL, hotplug_status_changed,
-					   "%s/%s", dev->nodename,
-					   "hotplug-status");
-		if (err)
-			goto err;
+	err = xenbus_watch_pathfmt(dev, &be->hotplug_status_watch, NULL,
+				   hotplug_status_changed,
+				   "%s/%s", dev->nodename, "hotplug-status");
+	if (!err)
 		be->have_hotplug_status_watch = 1;
-	}
 
 	netif_tx_wake_all_queues(be->vif->dev);
 
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 20:20:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 20:20:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281774.480255 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP8yw-0003Lj-0z; Tue, 01 Mar 2022 20:20:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281774.480255; Tue, 01 Mar 2022 20:20:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP8yv-0003Lc-Tk; Tue, 01 Mar 2022 20:20:25 +0000
Received: by outflank-mailman (input) for mailman id 281774;
 Tue, 01 Mar 2022 20:20:24 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=5KN6=TM=kernel.org=sashal@srs-se1.protection.inumbo.net>)
 id 1nP8yu-0002IQ-Jx
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 20:20:24 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org
 [2604:1380:4601:e00::1])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 0632fe39-999d-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 21:20:23 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 40D85B81D46;
 Tue,  1 Mar 2022 20:20:23 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id A31AFC340F5;
 Tue,  1 Mar 2022 20:20:18 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0632fe39-999d-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646166021;
	bh=Wi+OIq1ClSsfZD7h1ZbTDCrIa5Mqda+wcBv7b7g77bI=;
	h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
	b=kgxYo73PO8Ze9qgfeSOCjUgy81g0+DVhIbxosiV5i5kwWwNkSyl+xEeSaSr6jiS4V
	 v06NWaW8H6llUU85wmjlmh0xQVFgabU2pnqJYZoZzvXDBZVnHq9lRVQaaA1TQ5Foxq
	 T2kLaxd0LPjDs71KDi/zOSr+gNYAuumLmmEZSic9TurSvcAgP5BrhaVSXgBGv0ZSBv
	 fAdcUsQncq9MzfCNTr6WpkFhfvfQ2PwQieQtH0g712j4PSKG4IYFFCuZ9dk3uWKzh0
	 8UvIZllb6jgv6RAiBYLNyU6T+fsuORs8WD1qkj6B+eWoICEEGyHQJQk1/x6i4aSJZ3
	 fhOLcaTsbvy/g==
From: Sasha Levin <sashal@kernel.org>
To: linux-kernel@vger.kernel.org,
	stable@vger.kernel.org
Cc: =?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>,
	Paul Durrant <paul@xen.org>,
	Jakub Kicinski <kuba@kernel.org>,
	Sasha Levin <sashal@kernel.org>,
	wei.liu@kernel.org,
	davem@davemloft.net,
	xen-devel@lists.xenproject.org,
	netdev@vger.kernel.org
Subject: [PATCH AUTOSEL 5.4 06/11] Revert "xen-netback: remove 'hotplug-status' once it has served its purpose"
Date: Tue,  1 Mar 2022 15:19:39 -0500
Message-Id: <20220301201951.19066-6-sashal@kernel.org>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220301201951.19066-1-sashal@kernel.org>
References: <20220301201951.19066-1-sashal@kernel.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
X-stable: review
X-Patchwork-Hint: Ignore
Content-Transfer-Encoding: 8bit

From: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>

[ Upstream commit 0f4558ae91870692ce7f509c31c9d6ee721d8cdc ]

This reverts commit 1f2565780e9b7218cf92c7630130e82dcc0fe9c2.

The 'hotplug-status' node should not be removed as long as the vif
device remains configured. Otherwise the xen-netback would wait for
re-running the network script even if it was already called (in case of
the frontent re-connecting). But also, it _should_ be removed when the
vif device is destroyed (for example when unbinding the driver) -
otherwise hotplug script would not configure the device whenever it
re-appear.

Moving removal of the 'hotplug-status' node was a workaround for nothing
calling network script after xen-netback module is reloaded. But when
vif interface is re-created (on xen-netback unbind/bind for example),
the script should be called, regardless of who does that - currently
this case is not handled by the toolstack, and requires manual
script call. Keeping hotplug-status=connected to skip the call is wrong
and leads to not configured interface.

More discussion at
https://lore.kernel.org/xen-devel/afedd7cb-a291-e773-8b0d-4db9b291fa98@ipxe.org/T/#u

Signed-off-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
Reviewed-by: Paul Durrant <paul@xen.org>
Link: https://lore.kernel.org/r/20220222001817.2264967-1-marmarek@invisiblethingslab.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---
 drivers/net/xen-netback/xenbus.c | 1 +
 1 file changed, 1 insertion(+)

diff --git a/drivers/net/xen-netback/xenbus.c b/drivers/net/xen-netback/xenbus.c
index 416305e6d0932..0fe0fbd83ce4a 100644
--- a/drivers/net/xen-netback/xenbus.c
+++ b/drivers/net/xen-netback/xenbus.c
@@ -435,6 +435,7 @@ static void backend_disconnect(struct backend_info *be)
 		unsigned int queue_index;
 
 		xen_unregister_watchers(vif);
+		xenbus_rm(XBT_NIL, be->dev->nodename, "hotplug-status");
 #ifdef CONFIG_DEBUG_FS
 		xenvif_debugfs_delif(vif);
 #endif /* CONFIG_DEBUG_FS */
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 20:20:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 20:20:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281775.480266 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP8z1-0003e2-9N; Tue, 01 Mar 2022 20:20:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281775.480266; Tue, 01 Mar 2022 20:20:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP8z1-0003dr-5a; Tue, 01 Mar 2022 20:20:31 +0000
Received: by outflank-mailman (input) for mailman id 281775;
 Tue, 01 Mar 2022 20:20:30 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=5KN6=TM=kernel.org=sashal@srs-se1.protection.inumbo.net>)
 id 1nP8yz-0002Zx-RX
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 20:20:29 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 08ead2f9-999d-11ec-8eba-a37418f5ba1a;
 Tue, 01 Mar 2022 21:20:28 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id AA9FA608C3;
 Tue,  1 Mar 2022 20:20:27 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 31139C340EE;
 Tue,  1 Mar 2022 20:20:22 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 08ead2f9-999d-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646166027;
	bh=MqtP/Imy0BEHmQw5F9Yule8qbJc9LXHaH82WdVKlA3U=;
	h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
	b=AV42EJSjOhTmeVKKhVLjdOnh8Slcmij3nIWpwPZ2NsS3J0XcTCBGZS0LP8+ifjUWg
	 nKWqoooqIK1UkYbLPqMfI8gv1hxqHvDmL34dHrv/m8Jenq7F74euyCI/qtHva5/T80
	 1qZgg4pOxhDilR2NtOifq4VhRRKws+b9pLznnkGjz627dCaT7QK2bMZy6crrexPI7L
	 0o3+OZccQ0+taKe38SItG6sE7qsCUcXnbwE0AwNr0hUOk7OAAyUMDBWf40X6t9wQT3
	 mm6EqIuL/1sg3JXsUdAcc1rLzG0JZPmKVuA3zf+qyG/ubqJgkLA6EAN9kCZ6FSuvM6
	 x4j/QFagaSsZA==
From: Sasha Levin <sashal@kernel.org>
To: linux-kernel@vger.kernel.org,
	stable@vger.kernel.org
Cc: =?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>,
	Paul Durrant <paul@xen.org>,
	Michael Brown <mbrown@fensystems.co.uk>,
	Jakub Kicinski <kuba@kernel.org>,
	Sasha Levin <sashal@kernel.org>,
	wei.liu@kernel.org,
	davem@davemloft.net,
	xen-devel@lists.xenproject.org,
	netdev@vger.kernel.org
Subject: [PATCH AUTOSEL 5.4 07/11] Revert "xen-netback: Check for hotplug-status existence before watching"
Date: Tue,  1 Mar 2022 15:19:40 -0500
Message-Id: <20220301201951.19066-7-sashal@kernel.org>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220301201951.19066-1-sashal@kernel.org>
References: <20220301201951.19066-1-sashal@kernel.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
X-stable: review
X-Patchwork-Hint: Ignore
Content-Transfer-Encoding: 8bit

From: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>

[ Upstream commit e8240addd0a3919e0fd7436416afe9aa6429c484 ]

This reverts commit 2afeec08ab5c86ae21952151f726bfe184f6b23d.

The reasoning in the commit was wrong - the code expected to setup the
watch even if 'hotplug-status' didn't exist. In fact, it relied on the
watch being fired the first time - to check if maybe 'hotplug-status' is
already set to 'connected'. Not registering a watch for non-existing
path (which is the case if hotplug script hasn't been executed yet),
made the backend not waiting for the hotplug script to execute. This in
turns, made the netfront think the interface is fully operational, while
in fact it was not (the vif interface on xen-netback side might not be
configured yet).

This was a workaround for 'hotplug-status' erroneously being removed.
But since that is reverted now, the workaround is not necessary either.

More discussion at
https://lore.kernel.org/xen-devel/afedd7cb-a291-e773-8b0d-4db9b291fa98@ipxe.org/T/#u

Signed-off-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
Reviewed-by: Paul Durrant <paul@xen.org>
Reviewed-by: Michael Brown <mbrown@fensystems.co.uk>
Link: https://lore.kernel.org/r/20220222001817.2264967-2-marmarek@invisiblethingslab.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---
 drivers/net/xen-netback/xenbus.c | 12 ++++--------
 1 file changed, 4 insertions(+), 8 deletions(-)

diff --git a/drivers/net/xen-netback/xenbus.c b/drivers/net/xen-netback/xenbus.c
index 0fe0fbd83ce4a..44e353dd2ba19 100644
--- a/drivers/net/xen-netback/xenbus.c
+++ b/drivers/net/xen-netback/xenbus.c
@@ -980,15 +980,11 @@ static void connect(struct backend_info *be)
 	xenvif_carrier_on(be->vif);
 
 	unregister_hotplug_status_watch(be);
-	if (xenbus_exists(XBT_NIL, dev->nodename, "hotplug-status")) {
-		err = xenbus_watch_pathfmt(dev, &be->hotplug_status_watch,
-					   NULL, hotplug_status_changed,
-					   "%s/%s", dev->nodename,
-					   "hotplug-status");
-		if (err)
-			goto err;
+	err = xenbus_watch_pathfmt(dev, &be->hotplug_status_watch, NULL,
+				   hotplug_status_changed,
+				   "%s/%s", dev->nodename, "hotplug-status");
+	if (!err)
 		be->have_hotplug_status_watch = 1;
-	}
 
 	netif_tx_wake_all_queues(be->vif->dev);
 
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 20:22:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 20:22:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281788.480277 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP90Q-0004X8-LQ; Tue, 01 Mar 2022 20:21:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281788.480277; Tue, 01 Mar 2022 20:21:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP90Q-0004X1-Hy; Tue, 01 Mar 2022 20:21:58 +0000
Received: by outflank-mailman (input) for mailman id 281788;
 Tue, 01 Mar 2022 20:21:57 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=5KN6=TM=kernel.org=sashal@srs-se1.protection.inumbo.net>)
 id 1nP90P-0004Wo-C2
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 20:21:57 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org
 [2604:1380:4641:c500::1])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3d1d3d79-999d-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 21:21:56 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 500F560C0F;
 Tue,  1 Mar 2022 20:21:55 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id BC3DCC340EE;
 Tue,  1 Mar 2022 20:21:50 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3d1d3d79-999d-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646166115;
	bh=zTG1k1vysBnYvsVHPSxToBqW0AedjF15Tk77ur3IC8M=;
	h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
	b=NXWxrs91iiNL4csa+LB1zuUldsIkUxBfVL2N46Yk9n1/H+IFjjffgd15bP9hOwevi
	 Fsm/pFGqZ3AhQNxpp6HeXf8F4nEC8+kZE+alyvTUEPDsNlelEIbnzTP9SIdvexF6J2
	 BD4oBSk9kwTS1Gfdd15ZVWU+j+bsKZ6Yjg40nfO7q6gmGDsGC4BLbBqWduAeV3E0+k
	 gKbFl7FAZ1NDJMvSh+MLQiRf+o8GOvnPtFu+27XBgUncQWR7HFu/CPb6BUMi6opBlB
	 fp5ls3wSkUunemzmqy+217Xe9PtHGnEZu6EFtxN61tyyj4KvyZtcTdv/qS9A3FxvBq
	 4fClfvX9G8i/A==
From: Sasha Levin <sashal@kernel.org>
To: linux-kernel@vger.kernel.org,
	stable@vger.kernel.org
Cc: =?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>,
	Paul Durrant <paul@xen.org>,
	Jakub Kicinski <kuba@kernel.org>,
	Sasha Levin <sashal@kernel.org>,
	wei.liu@kernel.org,
	davem@davemloft.net,
	xen-devel@lists.xenproject.org,
	netdev@vger.kernel.org
Subject: [PATCH AUTOSEL 4.14 4/7] Revert "xen-netback: remove 'hotplug-status' once it has served its purpose"
Date: Tue,  1 Mar 2022 15:21:25 -0500
Message-Id: <20220301202131.19318-4-sashal@kernel.org>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220301202131.19318-1-sashal@kernel.org>
References: <20220301202131.19318-1-sashal@kernel.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
X-stable: review
X-Patchwork-Hint: Ignore
Content-Transfer-Encoding: 8bit

From: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>

[ Upstream commit 0f4558ae91870692ce7f509c31c9d6ee721d8cdc ]

This reverts commit 1f2565780e9b7218cf92c7630130e82dcc0fe9c2.

The 'hotplug-status' node should not be removed as long as the vif
device remains configured. Otherwise the xen-netback would wait for
re-running the network script even if it was already called (in case of
the frontent re-connecting). But also, it _should_ be removed when the
vif device is destroyed (for example when unbinding the driver) -
otherwise hotplug script would not configure the device whenever it
re-appear.

Moving removal of the 'hotplug-status' node was a workaround for nothing
calling network script after xen-netback module is reloaded. But when
vif interface is re-created (on xen-netback unbind/bind for example),
the script should be called, regardless of who does that - currently
this case is not handled by the toolstack, and requires manual
script call. Keeping hotplug-status=connected to skip the call is wrong
and leads to not configured interface.

More discussion at
https://lore.kernel.org/xen-devel/afedd7cb-a291-e773-8b0d-4db9b291fa98@ipxe.org/T/#u

Signed-off-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
Reviewed-by: Paul Durrant <paul@xen.org>
Link: https://lore.kernel.org/r/20220222001817.2264967-1-marmarek@invisiblethingslab.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---
 drivers/net/xen-netback/xenbus.c | 1 +
 1 file changed, 1 insertion(+)

diff --git a/drivers/net/xen-netback/xenbus.c b/drivers/net/xen-netback/xenbus.c
index 9092b55e087f1..df2e1ec9e6248 100644
--- a/drivers/net/xen-netback/xenbus.c
+++ b/drivers/net/xen-netback/xenbus.c
@@ -499,6 +499,7 @@ static void backend_disconnect(struct backend_info *be)
 		unsigned int queue_index;
 
 		xen_unregister_watchers(vif);
+		xenbus_rm(XBT_NIL, be->dev->nodename, "hotplug-status");
 #ifdef CONFIG_DEBUG_FS
 		xenvif_debugfs_delif(vif);
 #endif /* CONFIG_DEBUG_FS */
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 20:22:05 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 20:22:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281789.480287 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP90W-0004py-Sq; Tue, 01 Mar 2022 20:22:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281789.480287; Tue, 01 Mar 2022 20:22:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP90W-0004pr-Pf; Tue, 01 Mar 2022 20:22:04 +0000
Received: by outflank-mailman (input) for mailman id 281789;
 Tue, 01 Mar 2022 20:22:03 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=5KN6=TM=kernel.org=sashal@srs-se1.protection.inumbo.net>)
 id 1nP90V-0004Wo-KL
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 20:22:03 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org
 [2604:1380:4601:e00::1])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 41570f00-999d-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 21:22:02 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 3BFC4B81D4B;
 Tue,  1 Mar 2022 20:22:02 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 1B0EDC340EF;
 Tue,  1 Mar 2022 20:21:55 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 41570f00-999d-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646166120;
	bh=g61cHQ8vevn8Jy3lrP7L3VNjPI8mTGSu5fcUfjBYktw=;
	h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
	b=CnQthTY3r8PBTDrko7bpjfFH814462sjThYoiWbMi92vEHzp1CRQIN1+nriL09ica
	 Ipa9PsogrQ9LmjOVsPNr4p3STr2ZwM8S5nxbRBM4zGLcJl/4TWpHckvL32jilku10A
	 YX+HxW5DAYfsgcVqORUG1hO2FwTYVf4H9WxdWZbG0YhOIpBEv/pxffXCVmX7ZETR/u
	 +vgvzj31u60dDMnckNDlnTi3S6hirdYTRGhm1GU2+5yztRGBbleCVrT65rRA2rTbtE
	 TxKPbJ5UdHTEQ/n0ZXGu6WNk37ylbEOgSMSIyUPXCbcasCD91lWbKbmtBh5lHZJMxU
	 S1oCJQSdJoETg==
From: Sasha Levin <sashal@kernel.org>
To: linux-kernel@vger.kernel.org,
	stable@vger.kernel.org
Cc: =?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>,
	Paul Durrant <paul@xen.org>,
	Michael Brown <mbrown@fensystems.co.uk>,
	Jakub Kicinski <kuba@kernel.org>,
	Sasha Levin <sashal@kernel.org>,
	wei.liu@kernel.org,
	davem@davemloft.net,
	xen-devel@lists.xenproject.org,
	netdev@vger.kernel.org
Subject: [PATCH AUTOSEL 4.14 5/7] Revert "xen-netback: Check for hotplug-status existence before watching"
Date: Tue,  1 Mar 2022 15:21:26 -0500
Message-Id: <20220301202131.19318-5-sashal@kernel.org>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220301202131.19318-1-sashal@kernel.org>
References: <20220301202131.19318-1-sashal@kernel.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
X-stable: review
X-Patchwork-Hint: Ignore
Content-Transfer-Encoding: 8bit

From: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>

[ Upstream commit e8240addd0a3919e0fd7436416afe9aa6429c484 ]

This reverts commit 2afeec08ab5c86ae21952151f726bfe184f6b23d.

The reasoning in the commit was wrong - the code expected to setup the
watch even if 'hotplug-status' didn't exist. In fact, it relied on the
watch being fired the first time - to check if maybe 'hotplug-status' is
already set to 'connected'. Not registering a watch for non-existing
path (which is the case if hotplug script hasn't been executed yet),
made the backend not waiting for the hotplug script to execute. This in
turns, made the netfront think the interface is fully operational, while
in fact it was not (the vif interface on xen-netback side might not be
configured yet).

This was a workaround for 'hotplug-status' erroneously being removed.
But since that is reverted now, the workaround is not necessary either.

More discussion at
https://lore.kernel.org/xen-devel/afedd7cb-a291-e773-8b0d-4db9b291fa98@ipxe.org/T/#u

Signed-off-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
Reviewed-by: Paul Durrant <paul@xen.org>
Reviewed-by: Michael Brown <mbrown@fensystems.co.uk>
Link: https://lore.kernel.org/r/20220222001817.2264967-2-marmarek@invisiblethingslab.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---
 drivers/net/xen-netback/xenbus.c | 12 ++++--------
 1 file changed, 4 insertions(+), 8 deletions(-)

diff --git a/drivers/net/xen-netback/xenbus.c b/drivers/net/xen-netback/xenbus.c
index df2e1ec9e6248..37b662f0eebca 100644
--- a/drivers/net/xen-netback/xenbus.c
+++ b/drivers/net/xen-netback/xenbus.c
@@ -1044,15 +1044,11 @@ static void connect(struct backend_info *be)
 	xenvif_carrier_on(be->vif);
 
 	unregister_hotplug_status_watch(be);
-	if (xenbus_exists(XBT_NIL, dev->nodename, "hotplug-status")) {
-		err = xenbus_watch_pathfmt(dev, &be->hotplug_status_watch,
-					   NULL, hotplug_status_changed,
-					   "%s/%s", dev->nodename,
-					   "hotplug-status");
-		if (err)
-			goto err;
+	err = xenbus_watch_pathfmt(dev, &be->hotplug_status_watch, NULL,
+				   hotplug_status_changed,
+				   "%s/%s", dev->nodename, "hotplug-status");
+	if (!err)
 		be->have_hotplug_status_watch = 1;
-	}
 
 	netif_tx_wake_all_queues(be->vif->dev);
 
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 20:22:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 20:22:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281801.480298 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP916-0005fW-4j; Tue, 01 Mar 2022 20:22:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281801.480298; Tue, 01 Mar 2022 20:22:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP916-0005fP-1n; Tue, 01 Mar 2022 20:22:40 +0000
Received: by outflank-mailman (input) for mailman id 281801;
 Tue, 01 Mar 2022 20:22:38 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=5KN6=TM=kernel.org=sashal@srs-se1.protection.inumbo.net>)
 id 1nP914-0004Wo-QS
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 20:22:38 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 55d41463-999d-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 21:22:37 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id B972E60C1A;
 Tue,  1 Mar 2022 20:22:36 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2111DC340EF;
 Tue,  1 Mar 2022 20:22:31 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 55d41463-999d-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646166156;
	bh=aPLnTDcN5Cogu7sSosopTtKGWxetddHlbwS/+ePDwqU=;
	h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
	b=h+UeU/zpRmHfhaCMfuhxF+u1Vz65yCguVXd6YqWMqQ9EwnBIAdimJOSMbh1mAA2Ms
	 84ZxX16WllwqYrGoHC6mgt0OLiTn4sqHEj8N0+1nlzOhG/c3wqsRz1iZN43zEJNX6C
	 fOf4Cb2jJVVdUET9zwIB+H3zmJA7Caz4tE2pUgkXtzGXRkSGea/bqMf+C+8c3pO6ic
	 URTUFe4V1gScGuoQ3D0Ekcj6AqUmhMRCtUvNeQ2y1vxYvRG7Kh5ET4Xm1PesL/gEUo
	 3Q0KWJJ2kRi0inmOpZ6BpBCsXbyHVleS9ScuehEAQi26couDLVPeTg2unOF1F5DL2M
	 wOb7icT5FLxrA==
From: Sasha Levin <sashal@kernel.org>
To: linux-kernel@vger.kernel.org,
	stable@vger.kernel.org
Cc: =?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>,
	Paul Durrant <paul@xen.org>,
	Michael Brown <mbrown@fensystems.co.uk>,
	Jakub Kicinski <kuba@kernel.org>,
	Sasha Levin <sashal@kernel.org>,
	wei.liu@kernel.org,
	davem@davemloft.net,
	xen-devel@lists.xenproject.org,
	netdev@vger.kernel.org
Subject: [PATCH AUTOSEL 4.9 4/6] Revert "xen-netback: Check for hotplug-status existence before watching"
Date: Tue,  1 Mar 2022 15:22:08 -0500
Message-Id: <20220301202212.19419-4-sashal@kernel.org>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220301202212.19419-1-sashal@kernel.org>
References: <20220301202212.19419-1-sashal@kernel.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
X-stable: review
X-Patchwork-Hint: Ignore
Content-Transfer-Encoding: 8bit

From: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>

[ Upstream commit e8240addd0a3919e0fd7436416afe9aa6429c484 ]

This reverts commit 2afeec08ab5c86ae21952151f726bfe184f6b23d.

The reasoning in the commit was wrong - the code expected to setup the
watch even if 'hotplug-status' didn't exist. In fact, it relied on the
watch being fired the first time - to check if maybe 'hotplug-status' is
already set to 'connected'. Not registering a watch for non-existing
path (which is the case if hotplug script hasn't been executed yet),
made the backend not waiting for the hotplug script to execute. This in
turns, made the netfront think the interface is fully operational, while
in fact it was not (the vif interface on xen-netback side might not be
configured yet).

This was a workaround for 'hotplug-status' erroneously being removed.
But since that is reverted now, the workaround is not necessary either.

More discussion at
https://lore.kernel.org/xen-devel/afedd7cb-a291-e773-8b0d-4db9b291fa98@ipxe.org/T/#u

Signed-off-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
Reviewed-by: Paul Durrant <paul@xen.org>
Reviewed-by: Michael Brown <mbrown@fensystems.co.uk>
Link: https://lore.kernel.org/r/20220222001817.2264967-2-marmarek@invisiblethingslab.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---
 drivers/net/xen-netback/xenbus.c | 12 ++++--------
 1 file changed, 4 insertions(+), 8 deletions(-)

diff --git a/drivers/net/xen-netback/xenbus.c b/drivers/net/xen-netback/xenbus.c
index e6646c8a7bdbb..78788402edd8b 100644
--- a/drivers/net/xen-netback/xenbus.c
+++ b/drivers/net/xen-netback/xenbus.c
@@ -1040,15 +1040,11 @@ static void connect(struct backend_info *be)
 	xenvif_carrier_on(be->vif);
 
 	unregister_hotplug_status_watch(be);
-	if (xenbus_exists(XBT_NIL, dev->nodename, "hotplug-status")) {
-		err = xenbus_watch_pathfmt(dev, &be->hotplug_status_watch,
-					   NULL, hotplug_status_changed,
-					   "%s/%s", dev->nodename,
-					   "hotplug-status");
-		if (err)
-			goto err;
+	err = xenbus_watch_pathfmt(dev, &be->hotplug_status_watch, NULL,
+				   hotplug_status_changed,
+				   "%s/%s", dev->nodename, "hotplug-status");
+	if (!err)
 		be->have_hotplug_status_watch = 1;
-	}
 
 	netif_tx_wake_all_queues(be->vif->dev);
 
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 20:26:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 20:26:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281812.480315 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP94Z-0006j7-2R; Tue, 01 Mar 2022 20:26:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281812.480315; Tue, 01 Mar 2022 20:26:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP94Y-0006h3-UT; Tue, 01 Mar 2022 20:26:14 +0000
Received: by outflank-mailman (input) for mailman id 281812;
 Tue, 01 Mar 2022 20:26:13 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=5KN6=TM=kernel.org=sashal@srs-se1.protection.inumbo.net>)
 id 1nP8zo-0002IQ-VS
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 20:21:21 +0000
Received: from sin.source.kernel.org (sin.source.kernel.org
 [2604:1380:40e1:4800::1])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 26ce0ae7-999d-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 21:21:19 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by sin.source.kernel.org (Postfix) with ESMTPS id 3CF8ECE1EC9;
 Tue,  1 Mar 2022 20:21:17 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id B8B30C340F1;
 Tue,  1 Mar 2022 20:21:12 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 26ce0ae7-999d-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646166076;
	bh=2Vzk2YwMAxcJNg8Rm+jvnFFtDs7ThSFhX2BqVrZ51qo=;
	h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
	b=s6tBqiNjjpaShVM2/hLDqSkz66ePssOER49OmyquP39Tq6m2BI2YapFbHlwUFzxCi
	 kn1fd2AEx/TEPMsuXdS+/pCmJ2yci+YGf4XMddrcLm4lq/k8hOTs7Xv3nthX1Kl4t1
	 7Lq59r4cr0r8w9YqP32gIE66aeYSUcJe5st8M3MY2q4PVkWd2FhU6WNmtBnwZh4Nbm
	 G4duiclmwVtLv0SKoj99DjRM5h+Cuv8wwoPS2PvlEMW8efRhJa/SN50yLNluv0+VbH
	 yAxayxO1mwWx7Ff+FxCAZHwZEd/0gLmOsSC0vPn0x1AFtKB7+6pOgocyhoNAYpbbgo
	 uBiPKjFuD/4Zw==
From: Sasha Levin <sashal@kernel.org>
To: linux-kernel@vger.kernel.org,
	stable@vger.kernel.org
Cc: =?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>,
	Paul Durrant <paul@xen.org>,
	Michael Brown <mbrown@fensystems.co.uk>,
	Jakub Kicinski <kuba@kernel.org>,
	Sasha Levin <sashal@kernel.org>,
	wei.liu@kernel.org,
	davem@davemloft.net,
	xen-devel@lists.xenproject.org,
	netdev@vger.kernel.org
Subject: [PATCH AUTOSEL 4.19 5/7] Revert "xen-netback: Check for hotplug-status existence before watching"
Date: Tue,  1 Mar 2022 15:20:43 -0500
Message-Id: <20220301202046.19220-5-sashal@kernel.org>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220301202046.19220-1-sashal@kernel.org>
References: <20220301202046.19220-1-sashal@kernel.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
X-stable: review
X-Patchwork-Hint: Ignore
Content-Transfer-Encoding: 8bit

From: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>

[ Upstream commit e8240addd0a3919e0fd7436416afe9aa6429c484 ]

This reverts commit 2afeec08ab5c86ae21952151f726bfe184f6b23d.

The reasoning in the commit was wrong - the code expected to setup the
watch even if 'hotplug-status' didn't exist. In fact, it relied on the
watch being fired the first time - to check if maybe 'hotplug-status' is
already set to 'connected'. Not registering a watch for non-existing
path (which is the case if hotplug script hasn't been executed yet),
made the backend not waiting for the hotplug script to execute. This in
turns, made the netfront think the interface is fully operational, while
in fact it was not (the vif interface on xen-netback side might not be
configured yet).

This was a workaround for 'hotplug-status' erroneously being removed.
But since that is reverted now, the workaround is not necessary either.

More discussion at
https://lore.kernel.org/xen-devel/afedd7cb-a291-e773-8b0d-4db9b291fa98@ipxe.org/T/#u

Signed-off-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
Reviewed-by: Paul Durrant <paul@xen.org>
Reviewed-by: Michael Brown <mbrown@fensystems.co.uk>
Link: https://lore.kernel.org/r/20220222001817.2264967-2-marmarek@invisiblethingslab.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---
 drivers/net/xen-netback/xenbus.c | 12 ++++--------
 1 file changed, 4 insertions(+), 8 deletions(-)

diff --git a/drivers/net/xen-netback/xenbus.c b/drivers/net/xen-netback/xenbus.c
index 6b678ab0a31f7..6d7fb0a956452 100644
--- a/drivers/net/xen-netback/xenbus.c
+++ b/drivers/net/xen-netback/xenbus.c
@@ -1044,15 +1044,11 @@ static void connect(struct backend_info *be)
 	xenvif_carrier_on(be->vif);
 
 	unregister_hotplug_status_watch(be);
-	if (xenbus_exists(XBT_NIL, dev->nodename, "hotplug-status")) {
-		err = xenbus_watch_pathfmt(dev, &be->hotplug_status_watch,
-					   NULL, hotplug_status_changed,
-					   "%s/%s", dev->nodename,
-					   "hotplug-status");
-		if (err)
-			goto err;
+	err = xenbus_watch_pathfmt(dev, &be->hotplug_status_watch, NULL,
+				   hotplug_status_changed,
+				   "%s/%s", dev->nodename, "hotplug-status");
+	if (!err)
 		be->have_hotplug_status_watch = 1;
-	}
 
 	netif_tx_wake_all_queues(be->vif->dev);
 
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 20:26:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 20:26:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281811.480309 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP94Y-0006bi-KM; Tue, 01 Mar 2022 20:26:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281811.480309; Tue, 01 Mar 2022 20:26:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP94Y-0006bb-H3; Tue, 01 Mar 2022 20:26:14 +0000
Received: by outflank-mailman (input) for mailman id 281811;
 Tue, 01 Mar 2022 20:26:13 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=5KN6=TM=kernel.org=sashal@srs-se1.protection.inumbo.net>)
 id 1nP8zi-0002IQ-6K
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 20:21:14 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 234fcbdb-999d-11ec-8539-5f4723681683;
 Tue, 01 Mar 2022 21:21:13 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id EC85260C1B;
 Tue,  1 Mar 2022 20:21:11 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 6C7C9C340F1;
 Tue,  1 Mar 2022 20:21:08 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 234fcbdb-999d-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646166071;
	bh=RvXug01H9kluAEqabwUZGjwgNYTE/wBoZUtVrQZmwb0=;
	h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
	b=pd2p17hyUgQUU8QgN9hPriWSLOlFECl0x2q1QPw6jCtHIl6QkOS93cUHecaz9knO1
	 Z4sVFWwam78nkZAtUOx8LMY7RYKs3yqO4hS8Ue6pzZnrjZEwfuvDkLO92eCAm32bzM
	 k+mNS5ehK8gvKeh5kj+SkZFDS/OfXKU6376Uqmcteo4+4yDkacFv5IV7Xu+sOuU6KJ
	 K7qkomWjjXA9nDVn1pY4DwWCjyOuZt/qPpd5rapMMsyHIT9BALyeODRW+sBN4rK57/
	 n2onTDHJFuFvAmYG5H0ItQZ8U0ixVAx4LyiJpk3lv/n4eLoKhmPp4GAqAQxGmcNwYy
	 AliO66PVrC0qQ==
From: Sasha Levin <sashal@kernel.org>
To: linux-kernel@vger.kernel.org,
	stable@vger.kernel.org
Cc: =?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>,
	Paul Durrant <paul@xen.org>,
	Jakub Kicinski <kuba@kernel.org>,
	Sasha Levin <sashal@kernel.org>,
	wei.liu@kernel.org,
	davem@davemloft.net,
	xen-devel@lists.xenproject.org,
	netdev@vger.kernel.org
Subject: [PATCH AUTOSEL 4.19 4/7] Revert "xen-netback: remove 'hotplug-status' once it has served its purpose"
Date: Tue,  1 Mar 2022 15:20:42 -0500
Message-Id: <20220301202046.19220-4-sashal@kernel.org>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220301202046.19220-1-sashal@kernel.org>
References: <20220301202046.19220-1-sashal@kernel.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
X-stable: review
X-Patchwork-Hint: Ignore
Content-Transfer-Encoding: 8bit

From: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>

[ Upstream commit 0f4558ae91870692ce7f509c31c9d6ee721d8cdc ]

This reverts commit 1f2565780e9b7218cf92c7630130e82dcc0fe9c2.

The 'hotplug-status' node should not be removed as long as the vif
device remains configured. Otherwise the xen-netback would wait for
re-running the network script even if it was already called (in case of
the frontent re-connecting). But also, it _should_ be removed when the
vif device is destroyed (for example when unbinding the driver) -
otherwise hotplug script would not configure the device whenever it
re-appear.

Moving removal of the 'hotplug-status' node was a workaround for nothing
calling network script after xen-netback module is reloaded. But when
vif interface is re-created (on xen-netback unbind/bind for example),
the script should be called, regardless of who does that - currently
this case is not handled by the toolstack, and requires manual
script call. Keeping hotplug-status=connected to skip the call is wrong
and leads to not configured interface.

More discussion at
https://lore.kernel.org/xen-devel/afedd7cb-a291-e773-8b0d-4db9b291fa98@ipxe.org/T/#u

Signed-off-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
Reviewed-by: Paul Durrant <paul@xen.org>
Link: https://lore.kernel.org/r/20220222001817.2264967-1-marmarek@invisiblethingslab.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---
 drivers/net/xen-netback/xenbus.c | 1 +
 1 file changed, 1 insertion(+)

diff --git a/drivers/net/xen-netback/xenbus.c b/drivers/net/xen-netback/xenbus.c
index 78c56149559ce..6b678ab0a31f7 100644
--- a/drivers/net/xen-netback/xenbus.c
+++ b/drivers/net/xen-netback/xenbus.c
@@ -499,6 +499,7 @@ static void backend_disconnect(struct backend_info *be)
 		unsigned int queue_index;
 
 		xen_unregister_watchers(vif);
+		xenbus_rm(XBT_NIL, be->dev->nodename, "hotplug-status");
 #ifdef CONFIG_DEBUG_FS
 		xenvif_debugfs_delif(vif);
 #endif /* CONFIG_DEBUG_FS */
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 01 21:23:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 21:23:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281827.480331 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP9xg-0005l5-DT; Tue, 01 Mar 2022 21:23:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281827.480331; Tue, 01 Mar 2022 21:23:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nP9xg-0005ky-A0; Tue, 01 Mar 2022 21:23:12 +0000
Received: by outflank-mailman (input) for mailman id 281827;
 Tue, 01 Mar 2022 21:23:11 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP9xf-0005kW-1u; Tue, 01 Mar 2022 21:23:11 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP9xf-00008m-08; Tue, 01 Mar 2022 21:23:11 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nP9xe-0001wv-Pk; Tue, 01 Mar 2022 21:23:10 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nP9xe-0005VQ-PI; Tue, 01 Mar 2022 21:23:10 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=fgQDROt0gPaCDg9H/kNou+7c4bbuhY63FEKFNOM8sqw=; b=zgwSR6D03FXqeBC2THMp6KgeUC
	W7kaiua3sG//44E3kHgz9nj3+b2hSvKbkVYonA0tG3pEaltaIFATEJiAFjN2+j9KirtqZa4Hruz6i
	yKD3K9iVB+HAsz1e3ctBtvxZrmzn2g02r7ZzYUpf3jEILd/H1p7ExRJ7ytPLYPlnE9PY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168303-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168303: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=497ac7b6d7f9750f48f137db244931a5728b1968
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 01 Mar 2022 21:23:10 +0000

flight 168303 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168303/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 497ac7b6d7f9750f48f137db244931a5728b1968
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    1 days
Failing since        168258  2022-03-01 01:55:31 Z    0 days    9 attempts
Testing same since   168262  2022-03-01 04:10:26 Z    0 days    8 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 23:22:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 23:22:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281844.480357 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPBog-0002m0-V6; Tue, 01 Mar 2022 23:22:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281844.480357; Tue, 01 Mar 2022 23:22:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPBog-0002lt-RT; Tue, 01 Mar 2022 23:22:02 +0000
Received: by outflank-mailman (input) for mailman id 281844;
 Tue, 01 Mar 2022 23:22:01 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPBof-0002ld-LH; Tue, 01 Mar 2022 23:22:01 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPBof-0002Fo-HD; Tue, 01 Mar 2022 23:22:01 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPBof-0000eT-3R; Tue, 01 Mar 2022 23:22:01 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPBof-0004fQ-2y; Tue, 01 Mar 2022 23:22:01 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=s/s9/34Q0ZpDzkx2q2EH2snsBqv4LphHRmlebOkeNo4=; b=pVTbfVgvTseIIGxrlhQv5oSfrb
	+Muc4r4eAZUKTrhHlv2jaVJvBQbx0i8HBCE1yTWAhUjTuvuON85PUBr5aRce1tmC7Uzl0hxGvjDAb
	bM2ef+HVFWgDNi8zsXcUnk4fkFOAchbOon5LOC8dlJj55IvfRhPNkQTwaWlYIkh4OgAs=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168294-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168294: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=e0a514d2f4b2fcb51835aa9a9b02653b491a61fc
X-Osstest-Versions-That:
    xen=4388144c44c4dd9e9b7df97938ef08ffa85eec07
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 01 Mar 2022 23:22:01 +0000

flight 168294 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168294/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168257
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168257
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168257
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168257
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168257
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168257
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168257
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168257
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168257
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168257
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168257
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168257
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  e0a514d2f4b2fcb51835aa9a9b02653b491a61fc
baseline version:
 xen                  4388144c44c4dd9e9b7df97938ef08ffa85eec07

Last test of basis   168257  2022-03-01 01:53:09 Z    0 days
Testing same since   168294  2022-03-01 13:07:32 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Jan Beulich <jbeulich@suse.com>
  Roger Pau Monné <roger.pau@citrix.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   4388144c44..e0a514d2f4  e0a514d2f4b2fcb51835aa9a9b02653b491a61fc -> master


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 23:32:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 23:32:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281859.480377 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPByq-0004bi-4q; Tue, 01 Mar 2022 23:32:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281859.480377; Tue, 01 Mar 2022 23:32:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPByq-0004bb-1J; Tue, 01 Mar 2022 23:32:32 +0000
Received: by outflank-mailman (input) for mailman id 281859;
 Tue, 01 Mar 2022 23:32:30 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fFui=TM=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nPByo-0004bV-Ll
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 23:32:30 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id db66cf26-99b7-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 00:32:28 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 417D0B81E9E;
 Tue,  1 Mar 2022 23:32:27 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 75C45C340EE;
 Tue,  1 Mar 2022 23:32:25 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: db66cf26-99b7-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646177545;
	bh=+SA82CamGfLPzzHxYpYuzMUaSa0MxSu4P4PwkY7jH04=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=O3DOvQLN4pclMrpiNvqv9YCAeO8vne6fd42TCWCLuB6T2Ku51vp5155oGPV5ArOAM
	 3ph2RkU69+9eBqb61zhhKNIH3saV7/6OiXRIiQO7PNDJLEkFt5bwkrttHwEuXcb69/
	 Pq+sQL2nth4xala1hM40dGSAWskVi6ODTteSvxn0DQGfR4KAxtEkAdSF2uFA3p+6AA
	 5GiXMRyRGcZinxXrPip8ysfNNDV2FMw6dG7Dioqssx8KiRv+g5Wn8VppmPdz589aS2
	 F5H6lNoZyPSeTdmBq5rCrHgnGrN1xH97bt7U7oHKdEYX9Rvd67VsLxPBInFRoUvMBg
	 FyZ85Q6SykJPA==
Date: Tue, 1 Mar 2022 15:32:18 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Wei Chen <Wei.Chen@arm.com>
cc: Henry Wang <Henry.Wang@arm.com>, Julien Grall <julien@xen.org>, 
    "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, 
    "sstabellini@kernel.org" <sstabellini@kernel.org>, 
    Bertrand Marquis <Bertrand.Marquis@arm.com>, 
    Penny Zheng <Penny.Zheng@arm.com>
Subject: RE: [RFC PATCH 0/2] Introduce reserved Xenheap
In-Reply-To: <PAXPR08MB742081C99F081F5D4E0A74779E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
Message-ID: <alpine.DEB.2.22.394.2203011452140.3261@ubuntu-linux-20-04-desktop>
References: <20220224013023.50920-1-Henry.Wang@arm.com> <6269ec3d-039e-d68f-771d-c5e088631410@xen.org> <PA4PR08MB625324910ED4D40383191F9D92019@PA4PR08MB6253.eurprd08.prod.outlook.com> <48a0712c-eff8-dfc1-2136-59317f22321f@xen.org>
 <PA4PR08MB6253D51D60CC4078083D0AAC92029@PA4PR08MB6253.eurprd08.prod.outlook.com> <PAXPR08MB742081C99F081F5D4E0A74779E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Tue, 1 Mar 2022, Wei Chen wrote:
> > Hi Julien,
> > 
> > > -----Original Message-----
> > > From: Julien Grall <julien@xen.org>
> > > On 28/02/2022 07:12, Henry Wang wrote:
> > > > Hi Julien,
> > >
> > > Hi Henry,
> > >
> > > >> -----Original Message-----
> > > >> From: Julien Grall <julien@xen.org>
> > > >> Hi Henry,
> > > >>
> > > >> On 24/02/2022 01:30, Henry Wang wrote:
> > > >>> The reserved Xenheap, or statically configured Xenheap, refers to
> > parts
> > > >>> of RAM reserved in the beginning for Xenheap. Like the static memory
> > > >>> allocation, such reserved Xenheap regions are reserved by
> > configuration
> > > >>> in the device tree using physical address ranges.
> > > >>
> > > >> In Xen, we have the concept of domheap and xenheap. For Arm64 and
> > > x86
> > > >> they would be the same. But for Arm32, they would be different:
> > xenheap
> > > >> is always mapped whereas domheap is separate.
> > > >>
> > > >> Skimming through the series, I think you want to use the region for
> > both
> > > >> domheap and xenheap. Is that correct?
> > > >
> > > > Yes I think that would be correct, for Arm32, instead of using the
> > full
> > > > `ram_pages` as the initial value of `heap_pages`, we want to use the
> > > > region specified in the device tree. But we are confused if this is
> > the
> > > > correct (or preferred) way for Arm32, so in this series we only
> > > > implemented the reserved heap for Arm64.
> > >
> > > That's an interesting point. When I skimmed through the series on
> > > Friday, my first thought was that for arm32 it would be only xenheap (so
> > > all the rest of memory is domheap).
> > >
> > > However, Xen can allocate memory from domheap for its own purpose (e.g.
> > > we don't need contiguous memory, or for page-tables).
> > >
> > > In a fully static environment, the domheap and xenheap are both going to
> > > be quite small. It would also be somewhat difficult for a user to size
> > > it. So I think, it would be easier to use the region you introduce for
> > > both domheap and xenheap.
> > >
> > > Stefano, Bertrand, any opionions?
> > >
> > > On a separate topic, I think we need some documentation explaining how a
> > > user can size the xenheap. How did you figure out for your setup?
> > 
> > Not sure if I fully understand the question. I will explain in two parts:
> > I tested
> > this series on a dom0less (static mem) system on FVP_Base.
> > (1) For configuring the system, I followed the documentation I added in
> > the
> > first patch in this series (docs/misc/arm/device-tree/booting.txt). The
> > idea is
> > adding some static mem regions under the chosen node.
> > 
> >      chosen {
> > +        #xen,static-mem-address-cells = <0x2>;
> > +        #xen,static-mem-size-cells = <0x2>;
> > +        xen,static-mem = <0x8 0x80000000 0x0 0x00100000 0x8 0x90000000
> > 0x0 0x08000000>;
> >      [...]
> >      }
> > 
> > (2) For verifying this series, what I did was basically playing with the
> > region size
> > and number of the regions, adding printks and also see if the guests can
> > boot
> > as expected when I change the xenheap size.
> > 
> > >
> > > >>
> > > >> Furthemore, now that we are introducing more static region, it will
> > get
> > > >> easier to overlap the regions by mistakes. I think we want to have
> > some
> > > >> logic in Xen (or outside) to ensure that none of them overlaps. Do
> > you
> > > >> have any plan for that?
> > > >
> > > > Totally agree with this idea, but before we actually implement the
> > code,
> > > > we would like to firstly share our thoughts on this: One option could
> > be to
> > > > add data structures to notes down these static memory regions when the
> > > > device tree is parsed, and then we can check if they are overlapped.
> > >
> > > This should work.
> > 
> > Ack.
> > 
> > >
> > > > Over
> > > > the long term (and this long term option is currently not in our plan),
> > > > maybe we can add something in the Xen toolstack for this usage?
> > >
> > > When I read "Xen toolstack", I read the tools that will run in dom0. Is
> > > it what you meant?
> > 
> > Nonono, sorry for the misleading. I mean a build time tool that can run
> > on host (build machine) to generate/configure the Xen DTS for static
> > allocated memory. But maybe this tool can be placed in Xen tool or it can
> > be a separate tool that out of Xen's scope.
> > 
> > Anyway, this is just an idea as we find it is not easy for users to
> > configure
> > so many static items manually.
> 
> Not only for this one. As v8R64 support code also includes lots of static
> allocated items, it will also encounter this user configuration issue.
> So this would be a long term consideration. We can discuss this topic
> after Xen V8R64 support code upstream work be done.
> 
> And this tool does not necessarily need to be provided by the community.
> Vendors that want to use Xen also can do it. IMO, it would be better if
> community could provide it. Anyway let's defer this topic : ) 

Yes, I agree with you that it would be best if this tool was provided by
the community. I'll continue the conversation on the Armv8-R64 thread.


From xen-devel-bounces@lists.xenproject.org Tue Mar 01 23:39:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 01 Mar 2022 23:39:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281866.480388 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPC5E-0005UD-QT; Tue, 01 Mar 2022 23:39:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281866.480388; Tue, 01 Mar 2022 23:39:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPC5E-0005U5-NH; Tue, 01 Mar 2022 23:39:08 +0000
Received: by outflank-mailman (input) for mailman id 281866;
 Tue, 01 Mar 2022 23:39:06 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fFui=TM=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nPC5C-0005Tz-LQ
 for xen-devel@lists.xenproject.org; Tue, 01 Mar 2022 23:39:06 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c67c8ccf-99b8-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 00:39:02 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 7C988B81E9D;
 Tue,  1 Mar 2022 23:39:01 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8AE21C340EE;
 Tue,  1 Mar 2022 23:38:59 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c67c8ccf-99b8-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646177940;
	bh=a2y6xAFIOwCSjNYbPnSQHd9gSgww/81hSTr9siF2xhM=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=mjU+egZsXUNWk+KWaUHasjtpGCGb09OXqlPk5qt1FNDJ02cYF9LHo1wtZdeccd43x
	 lFCWj4Z+N0HVsokoxSXQmdYsmgNXGZx3zfXtQKkVxRYL6rFLdaIaFGftUQhTW+3rjY
	 mzDQxGXIaHro1yiKDpd2f1BshphCCkTIXsVr2mMwLM8jOTMF/+KKVBlnbEfw61HecN
	 y+GHBux85NrcFA97a5nqbIPS24n3/oJiEpocZU15EiPWxxXsAQjs/lU+ludlPps1MX
	 rlENSdDMvWi7Nl593JNwZg3Z2FVS4vB7y0CGh1rU47GoZiZ7vMMNUgWHwojFQeTlmG
	 f0X76oF1dauDw==
Date: Tue, 1 Mar 2022 15:38:58 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Wei Chen <Wei.Chen@arm.com>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, 
    "julien@xen.org" <julien@xen.org>, 
    Bertrand Marquis <Bertrand.Marquis@arm.com>, 
    Penny Zheng <Penny.Zheng@arm.com>, Henry Wang <Henry.Wang@arm.com>, 
    nd <nd@arm.com>
Subject: RE: Proposal for Porting Xen to Armv8-R64 - DraftA
In-Reply-To: <PAXPR08MB742081D5E3C94801350C4A739E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
Message-ID: <alpine.DEB.2.22.394.2203011455500.3261@ubuntu-linux-20-04-desktop>
References: <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com> <alpine.DEB.2.22.394.2202241606450.239973@ubuntu-linux-20-04-desktop> <AS1PR08MB74269923288B75097392BDD99E3E9@AS1PR08MB7426.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2202251214210.239973@ubuntu-linux-20-04-desktop> <PAXPR08MB742081D5E3C94801350C4A739E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: multipart/mixed; BOUNDARY="8323329-1877311929-1646175755=:3261"
Content-ID: <alpine.DEB.2.22.394.2203011505530.3261@ubuntu-linux-20-04-desktop>

  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--8323329-1877311929-1646175755=:3261
Content-Type: text/plain; CHARSET=UTF-8
Content-Transfer-Encoding: 8BIT
Content-ID: <alpine.DEB.2.22.394.2203011505531.3261@ubuntu-linux-20-04-desktop>

On Tue, 1 Mar 2022, Wei Chen wrote:
> > On Fri, 25 Feb 2022, Wei Chen wrote:
> > > > Hi Wei,
> > > >
> > > > This is extremely exciting, thanks for the very nice summary!
> > > >
> > > >
> > > > On Thu, 24 Feb 2022, Wei Chen wrote:
> > > > > # Proposal for Porting Xen to Armv8-R64
> > > > >
> > > > > This proposal will introduce the PoC work of porting Xen to Armv8-
> > R64,
> > > > > which includes:
> > > > > - The changes of current Xen capability, like Xen build system,
> > memory
> > > > >   management, domain management, vCPU context switch.
> > > > > - The expanded Xen capability, like static-allocation and direct-map.
> > > > >
> > > > > ***Notes:***
> > > > > 1. ***This proposal only covers the work of porting Xen to Armv8-
> > R64***
> > > > >    ***single CPU. Xen SMP support on Armv8-R64 relates to Armv8-R***
> > > > >    ***Trusted-Frimware (TF-R). This is an external dependency,***
> > > > >    ***so we think the discussion of Xen SMP support on Armv8-R64***
> > > > >    ***should be started when single-CPU support is complete.***
> > > > > 2. ***This proposal will not touch xen-tools. In current stage,***
> > > > >    ***Xen on Armv8-R64 only support dom0less, all guests should***
> > > > >    ***be booted from device tree.***
> > > > >
> > > > > ## 1. Essential Background
> > > > >
> > > > > ### 1.1. Armv8-R64 Profile
> > > > > The Armv-R architecture profile was designed to support use cases
> > that
> > > > > have a high sensitivity to deterministic execution. (e.g. Fuel
> > Injection,
> > > > > Brake control, Drive trains, Motor control etc)
> > > > >
> > > > > Arm announced Armv8-R in 2013, it is the latest generation Arm
> > > > architecture
> > > > > targeted at the Real-time profile. It introduces virtualization at
> > the
> > > > highest
> > > > > security level while retaining the Protected Memory System
> > Architecture
> > > > (PMSA)
> > > > > based on a Memory Protection Unit (MPU). In 2020, Arm announced
> > Cortex-
> > > > R82,
> > > > > which is the first Arm 64-bit Cortex-R processor based on Armv8-R64.
> > > > >
> > > > > - The latest Armv8-R64 document can be found here:
> > > > >   [Arm Architecture Reference Manual Supplement - Armv8, for Armv8-R
> > > > AArch64 architecture
> > > > profile](https://developer.arm.com/documentation/ddi0600/latest/).
> > > > >
> > > > > - Armv-R Architecture progression:
> > > > >   Armv7-R -> Armv8-R AArch32 -> Armv8 AArch64
> > > > >   The following figure is a simple comparison of "R" processors
> > based on
> > > > >   different Armv-R Architectures.
> > > > >   ![image](https://drive.google.com/uc?export=view&id=1nE5RAXaX8zY2K
> > PZ8i
> > > > mBpbvIr2eqBguEB)
> > > > >
> > > > > - The Armv8-R architecture evolved additional features on top of
> > Armv7-R:
> > > > >     - An exception model that is compatible with the Armv8-A model
> > > > >     - Virtualization with support for guest operating systems
> > > > >         - PMSA virtualization using MPUs In EL2.
> > > > > - The new features of Armv8-R64 architecture
> > > > >     - Adds support for the 64-bit A64 instruction set, previously
> > Armv8-
> > > > R
> > > > >       only supported A32.
> > > > >     - Supports up to 48-bit physical addressing, previously up to
> > 32-bit
> > > > >       addressing was supported.
> > > > >     - Optional Arm Neon technology and Advanced SIMD
> > > > >     - Supports three Exception Levels (ELs)
> > > > >         - Secure EL2 - The Highest Privilege, MPU only, for firmware,
> > > > hypervisor
> > > > >         - Secure EL1 - RichOS (MMU) or RTOS (MPU)
> > > > >         - Secure EL0 - Application Workloads
> > > > >     - Optionally supports Virtual Memory System Architecture at S-
> > EL1/S-
> > > > EL0.
> > > > >       This means it's possible to run rich OS kernels - like Linux -
> > > > either
> > > > >       bare-metal or as a guest.
> > > > > - Differences with the Armv8-A AArch64 architecture
> > > > >     - Supports only a single Security state - Secure. There is not
> > Non-
> > > > Secure
> > > > >       execution state supported.
> > > > >     - EL3 is not supported, EL2 is mandatory. This means secure EL2
> > is
> > > > the
> > > > >       highest EL.
> > > > >     - Supports the A64 ISA instruction
> > > > >         - With a small set of well-defined differences
> > > > >     - Provides a PMSA (Protected Memory System Architecture) based
> > > > >       virtualization model.
> > > > >         - As opposed to Armv8-A AArch64's VMSA based Virtualization
> > > > >         - Can support address bits up to 52 if FEAT_LPA is enabled,
> > > > >           otherwise 48 bits.
> > > > >         - Determines the access permissions and memory attributes of
> > > > >           the target PA.
> > > > >         - Can implement PMSAv8-64 at EL1 and EL2
> > > > >             - Address translation flat-maps the VA to the PA for EL2
> > > > Stage 1.
> > > > >             - Address translation flat-maps the VA to the PA for EL1
> > > > Stage 1.
> > > > >             - Address translation flat-maps the IPA to the PA for
> > EL1
> > > > Stage 2.
> > > > >     - PMSA in EL1 & EL2 is configurable, VMSA in EL1 is configurable.
> > > > >
> > > > > ### 1.2. Xen Challenges with PMSA Virtualization
> > > > > Xen is PMSA unaware Type-1 Hypervisor, it will need modifications to
> > run
> > > > > with an MPU and host multiple guest OSes.
> > > > >
> > > > > - No MMU at EL2:
> > > > >     - No EL2 Stage 1 address translation
> > > > >         - Xen provides fixed ARM64 virtual memory layout as basis of
> > EL2
> > > > >           stage 1 address translation, which is not applicable on
> > MPU
> > > > system,
> > > > >           where there is no virtual addressing. As a result, any
> > > > operation
> > > > >           involving transition from PA to VA, like ioremap, needs
> > > > modification
> > > > >           on MPU system.
> > > > >     - Xen's run-time addresses are the same as the link time
> > addresses.
> > > > >         - Enable PIC (position-independent code) on a real-time
> > target
> > > > >           processor probably very rare.
> > > > >     - Xen will need to use the EL2 MPU memory region descriptors to
> > > > manage
> > > > >       access permissions and attributes for accesses made by VMs at
> > > > EL1/0.
> > > > >         - Xen currently relies on MMU EL1 stage 2 table to manage
> > these
> > > > >           accesses.
> > > > > - No MMU Stage 2 translation at EL1:
> > > > >     - A guest doesn't have an independent guest physical address
> > space
> > > > >     - A guest can not reuse the current Intermediate Physical
> > Address
> > > > >       memory layout
> > > > >     - A guest uses physical addresses to access memory and devices
> > > > >     - The MPU at EL2 manages EL1 stage 2 access permissions and
> > > > attributes
> > > > > - There are a limited number of MPU protection regions at both EL2
> > and
> > > > EL1:
> > > > >     - Architecturally, the maximum number of protection regions is
> > 256,
> > > > >       typical implementations have 32.
> > > > >     - By contrast, Xen does not need to consider the number of page
> > > > table
> > > > >       entries in theory when using MMU.
> > > > > - The MPU protection regions at EL2 need to be shared between the
> > > > hypervisor
> > > > >   and the guest stage 2.
> > > > >     - Requires careful consideration - may impact feature 'fullness'
> > of
> > > > both
> > > > >       the hypervisor and the guest
> > > > >     - By contrast, when using MMU, Xen has standalone P2M table for
> > > > guest
> > > > >       stage 2 accesses.
> > > > >
> > > > > ## 2. Proposed changes of Xen
> > > > > ### **2.1. Changes of build system:**
> > > > >
> > > > > - ***Introduce new Kconfig options for Armv8-R64***:
> > > > >   Unlike Armv8-A, because lack of MMU support on Armv8-R64, we may
> > not
> > > > >   expect one Xen binary to run on all machines. Xen images are not
> > > > common
> > > > >   across Armv8-R64 platforms. Xen must be re-built for different
> > Armv8-
> > > > R64
> > > > >   platforms. Because these platforms may have different memory
> > layout
> > > > and
> > > > >   link address.
> > > > >     - `ARM64_V8R`:
> > > > >       This option enables Armv8-R profile for Arm64. Enabling this
> > > > option
> > > > >       results in selecting MPU. This Kconfig option is used to gate
> > some
> > > > >       Armv8-R64 specific code except MPU code, like some code for
> > Armv8-
> > > > R64
> > > > >       only system ID registers access.
> > > > >
> > > > >     - `ARM_MPU`
> > > > >       This option enables MPU on ARMv8-R architecture. Enabling this
> > > > option
> > > > >       results in disabling MMU. This Kconfig option is used to gate
> > some
> > > > >       ARM_MPU specific code. Once when this Kconfig option has been
> > > > enabled,
> > > > >       the MMU relate code will not be built for Armv8-R64. The
> > reason
> > > > why
> > > > >       not depends on runtime detection to select MMU or MPU is that,
> > we
> > > > don't
> > > > >       think we can use one image for both Armv8-R64 and Armv8-A64.
> > > > Another
> > > > >       reason that we separate MPU and V8R in provision to allow to
> > > > support MPU
> > > > >       on 32bit Arm one day.
> > > > >
> > > > >     - `XEN_START_ADDRESS`
> > > > >       This option allows to set the custom address at which Xen will
> > be
> > > > >       linked. This address must be aligned to a page size. Xen's
> > run-
> > > > time
> > > > >       addresses are the same as the link time addresses. Different
> > > > platforms
> > > > >       may have differnt memory layout. This Kconfig option provides
> > > > users
> > > > >       the ability to select proper link addresses for their boards.
> > > > >       ***Notes: Fixed link address means the Xen binary could not
> > be***
> > > > >       ***relocated by EFI loader. So in current stage, Xen could
> > not***
> > > > >       ***be launched as an EFI application on Armv8-R64.***
> > > > >
> > > > >     - `ARM_MPU_NORMAL_MEMORY_START` and `ARM_MPU_NORMAL_MEMORY_END`
> > > > >       `ARM_MPU_DEVICE_MEMORY_START` and `ARM_MPU_DEVICE_MEMORY_END`
> > > > >       These Kconfig options allow to set memory regions for Xen code,
> > > > data
> > > > >       and device memory. Before parsing memory information from
> > device
> > > > tree,
> > > > >       Xen will use the values that stored in these options to setup
> > > > boot-time
> > > > >       MPU configuration. Why we need a boot-time MPU configuration?
> > > > >       1. More deterministic: Arm MPU supports background regions,
> > > > >          if we don't configure the MPU regions and don't enable MPU.
> > > > >          We can enable MPU background regions. But that means all
> > RAM
> > > > >          is RWX. Random values in RAM or maliciously embedded data
> > can
> > > > >          be exploited. Using these Kconfig options allow users to
> > have
> > > > >          a deterministic RAM area to execute code.
> > > > >       2. More compatible: On some Armv8-R64 platforms, if the MPU is
> > > > >          disabled, the `dc zva` instruction will make the system
> > halt.
> > > > >          And this instruction will be embedded in some built-in
> > > > functions,
> > > > >          like `memory set`. If we use `-ddont_use_dc` to rebuild GCC,
> > > > >          the built-in functions will not contain `dc zva`. However,
> > it
> > > > is
> > > > >          obviously unlikely that we will be able to recompile all
> > GCC
> > > > >          for ARMv8-R64.
> > > > >       3. One optional idea:
> > > > >           We can map `XEN_START_ADDRESS` to `XEN_START_ADDRESS +
> > 2MB` or
> > > > >           `XEN_START_ADDRESS` to `XEN_START_ADDRESS + image_end` for
> > > > >           MPU normal memory. It's enough to support Xen run in boot
> > time.
> > > >
> > > > I can imagine that we need to have a different Xen build for each
> > > > ARMv8-R platform. Do you envision that XEN_START_ADDRESS and
> > > > ARM_MPU_*_MEMORY_START/END are preconfigured based on the platform
> > > > choice at build time? I don't think we want a user to provide all of
> > > > those addresses by hand, right?
> > >
> > > Yes, this is in our TODO list. We want to reuse current arm/platforms
> > and
> > > Kconfig menu for Armv8-R.
> > 
> > OK, good
> > 
> > 
> > > > The next question is whether we could automatically generate
> > > > XEN_START_ADDRESS and ARM_MPU_*_MEMORY_START/END based on the platform
> > > > device tree at build time (at build time, not runtime). That would
> > > > make things a lot easier and it is also aligned with the way Zephyr
> > and
> > > > other RTOSes and baremetal apps work.
> > >
> > > It's a considerable option. But here we may encounter some problems need
> > > to be solved first:
> > > 1. Does CONFIG_DTB must be selected by default on Armv8-R? Without
> > firmware
> > >    or bootloader (like u-boot), we have to build DTB into Xen binary.
> > 
> > CONFIG_DTB should trigger runtime support for device tree, while here we
> > are talking about build time support for device tree. It is very
> > different.
> > 
> > Just to make an example, the whole build-time device tree could be
> > scanned by Makefiles and other scripts, leading to C header files
> > generations, but no code in Xen to parse device tree at all.
> > 
> > DTB ---> Makefiles/scripts ---> .h files ---> Makefiles/scripts ---> xen
> > 
> 
> Yes, this is feasible.
> 
> > 
> > I am not saying this is the best way to do it, I am only pointing out
> > that build-time device tree does not imply run-time device tree. Also,
> > it doesn't imply a DTB built-in the Xen binary (although that is also an
> > option).
> > 
> 
> I agree.
> 
> > The way many baremetal OSes and RTOSes work is that they take a DTB as
> > input to the build *only*. From the DTB, the build-time make system
> > generates #defines and header files that are imported in C.
> > 
> > The resulting RTOS binary doesn't need support for DTB, because all the
> > right addresses have already been provided as #define by the Make
> > system.
> > 
> > I don't think we need to go to the extreme of removing DTB support from
> > Xen on ARMv8-R. I am only saying that if we add build-time device tree
> > support it would make it easier to support multiple boards without
> > having to have platform files in Xen for each of them, and we can do
> > that without any impact on runtime device tree parsing.
> > 
> 
> As V8R's use cases maybe mainly focus on some real-time/critical scenarios,
> this may be a better method than platform files. We don't need to maintain
> the platform related definitions header files. Xen also can skip the some
> platform information parsing in boot time. This will increase the boot speed
> of Xen in real-time/critical scenarios.

+1


> > >    This
> > >    can guarantee build-time DTB is the same as runtime DTB. But
> > eventually,
> > >    we will have firmware and bootloader before Xen launch (as Arm EBBR's
> > >    requirement). In this case, we may not build DTB into Xen image. And
> > >    we can't guarantee build-time DTB is the same as runtime DTB.
> > 
> > As mentioned, if we have a build-time DTB we might not need a run-time
> > DTB. Secondly, I think it is entirely reasonable to expect that the
> > build-time DTB and the run-time DTB are the same.
> > 
> 
> Yes, if we implement in this way, we should describe it in limitation
> of v8r Xen.
> 
> > It is the same problem with platform files: we have to assume that the
> > information in the platform files matches the runtime DTB.
> > 
> 
> indeed.
> 
> > 
> > > 2. If build-time DTB is the same as runtime DTB, how can we determine
> > >    the XEN_START_ADDRESS in DTB describe memory range? Should we always
> > >    limit Xen to boot from lowest address? Or will we introduce some new
> > >    DT property to specify the Xen start address? I think this DT
> > property
> > >    also can solve above question#1.
> > 
> > The loading address should be automatically chosen by the build scripts.
> > We can do that now with ImageBuilder [1]: it selects a 2MB-aligned
> > address for each binary to load, one by one starting from a 2MB offset
> > from start of memory.
> > 
> > [1] https://gitlab.com/ViryaOS/imagebuilder/-/blob/master/scripts/uboot-
> > script-gen#L390
> > 
> > So the build scripts can select XEN_START_ADDRESS based on the
> > memory node information on the build-time device tree. And there should
> > be no need to add XEN_START_ADDRESS to the runtime device tree.
> > 
> 
> This is fine if there are no explicit restrictions on the platform.
> Some platform may reserve some memory area for something like firmware,
> But I think it's OK, in the worst case, we can hide this area from
> build DTB.
> 
> > 
> > > > The device tree can be given as input to the build system, and the
> > > > Makefiles would take care of generating XEN_START_ADDRESS and
> > > > ARM_MPU_*_MEMORY_START/END based on /memory and other interesting
> > nodes.
> > > >
> > >
> > > If we can solve above questions, yes, device tree is a good idea for
> > > XEN_START_ADDRESS. For ARM_MPU_NORMAL_MEMORY_*, we can get them from
> > > memory nodes, but for ARM_MPU_DEVICE_MEMORY_*, they are not easy for
> > > us to scan all devices' nodes. And it's very tricky, if the memory
> > > regions are interleaved. So in our current RFC code, we select to use
> > > the optional idea:
> > > We map `XEN_START_ADDRESS` to `XEN_START_ADDRESS + 2MB` for MPU normal
> > memory.
> > > But we use mpu,device-memory-section in DT for MPU device memory.
> > 
> > Keep in mind that we are talking about build-time scripts: it doesn't
> > matter if they are slow. We can scan the build-time dtb as many time as
> > needed and generate ARM_MPU_DEVICE_MEMORY_* as appropriate. It might
> > make "make xen" slower but runtime will be unaffected.
> > 
> > So, I don't think this is a problem.
> > 
> 
> OK.
> 
> > 
> > > > > - ***Define new system registers for compilers***:
> > > > >   Armv8-R64 is based on Armv8.4. That means we will use some Armv8.4
> > > > >   specific system registers. As Armv8-R64 only have secure state, so
> > > > >   at least, `VSTCR_EL2` and `VSCTLR_EL2` will be used for Xen. And
> > the
> > > > >   first GCC version that supports Armv8.4 is GCC 8.1. In addition to
> > > > >   these, PMSA of Armv8-R64 introduced lots of MPU related system
> > > > registers:
> > > > >   `PRBAR_ELx`, `PRBARx_ELx`, `PRLAR_ELx`, `PRLARx_ELx`, `PRENR_ELx`
> > and
> > > > >   `MPUIR_ELx`. But the first GCC version to support these system
> > > > registers
> > > > >   is GCC 11. So we have two ways to make compilers to work properly
> > with
> > > > >   these system registers.
> > > > >   1. Bump GCC version to GCC 11.
> > > > >      The pros of this method is that, we don't need to encode these
> > > > >      system registers in macros by ourselves. But the cons are that,
> > > > >      we have to update Makefiles to support GCC 11 for Armv8-R64.
> > > > >      1.1. Check the GCC version 11 for Armv8-R64.
> > > > >      1.2. Add march=armv8r to CFLAGS for Armv8-R64.
> > > > >      1.3. Solve the confliction of march=armv8r and mcpu=generic
> > > > >     These changes will affect common Makefiles, not only Arm
> > Makefiles.
> > > > >     And GCC 11 is new, lots of toolchains and Distro haven't
> > supported
> > > > it.
> > > > >
> > > > >   2. Encode new system registers in macros ***(preferred)***
> > > > >         ```
> > > > >         /* Virtualization Secure Translation Control Register */
> > > > >         #define VSTCR_EL2  S3_4_C2_C6_2
> > > > >         /* Virtualization System Control Register */
> > > > >         #define VSCTLR_EL2 S3_4_C2_C0_0
> > > > >         /* EL1 MPU Protection Region Base Address Register encode */
> > > > >         #define PRBAR_EL1  S3_0_C6_C8_0
> > > > >         ...
> > > > >         /* EL2 MPU Protection Region Base Address Register encode */
> > > > >         #define PRBAR_EL2  S3_4_C6_C8_0
> > > > >         ...
> > > > >         ```
> > > > >      If we encode all above system registers, we don't need to bump
> > GCC
> > > > >      version. And the common CFLAGS Xen is using still can be
> > applied to
> > > > >      Armv8-R64. We don't need to modify Makefiles to add specific
> > CFLAGS.
> > > >
> > > > I think that's fine and we did something similar with the original
> > ARMv7-A
> > > > port if I remember correctly.
> > > >
> > > >
> > > > > ### **2.2. Changes of the initialization process**
> > > > > In general, we still expect Armv8-R64 and Armv8-A64 to have a
> > consistent
> > > > > initialization process. In addition to some architecture differences,
> > > > there
> > > > > is no more than reusable code that we will distinguish through
> > > > CONFIG_ARM_MPU
> > > > > or CONFIG_ARM64_V8R. We want most of the initialization code to be
> > > > reusable
> > > > > between Armv8-R64 and Armv8-A64.
> > > >
> > > > +1
> > > >
> > > >
> > > > > - We will reuse the original head.s and setup.c of Arm. But replace
> > the
> > > > >   MMU and page table operations in these files with configuration
> > > > operations
> > > > >   for MPU and MPU regions.
> > > > >
> > > > > - We provide a boot-time MPU configuration. This MPU configuration
> > will
> > > > >   support Xen to finish its initialization. And this boot-time MPU
> > > > >   configuration will record the memory regions that will be parsed
> > from
> > > > >   device tree.
> > > > >
> > > > >   In the end of Xen initialization, we will use a runtime MPU
> > > > configuration
> > > > >   to replace boot-time MPU configuration. The runtime MPU
> > configuration
> > > > will
> > > > >   merge and reorder memory regions to save more MPU regions for
> > guests.
> > > > >   ![img](https://drive.google.com/uc?export=view&id=1wTFyK2XfU3lTlH1
> > PqRD
> > > > oacQVTwUtWIGU)
> > > > >
> > > > > - Defer system unpausing domain.
> > > > >   When Xen initialization is about to end, Xen unpause guests
> > created
> > > > >   during initialization. But this will cause some issues. The
> > unpause
> > > > >   action occurs before free_init_memory, however the runtime MPU
> > > > configuration
> > > > >   is built after free_init_memory.
> > > > >
> > > > >   So if the unpaused guests start executing the context switch at
> > this
> > > > >   point, then its MPU context will base on the boot-time MPU
> > > > configuration.
> > > > >   Probably it will be inconsistent with runtime MPU configuration,
> > this
> > > > >   will cause unexpected problems (This may not happen in a single
> > core
> > > > >   system, but on SMP systems, this problem is foreseeable, so we
> > hope to
> > > > >   solve it at the beginning).
> > > > >
> > > > > ### **2.3. Changes to reduce memory fragmentation**
> > > > >
> > > > > In general, memory in Xen system can be classified to 4 classes:
> > > > > `image sections`, `heap sections`, `guest RAM`, `boot modules (guest
> > > > Kernel,
> > > > > initrd and dtb)`
> > > > >
> > > > > Currently, Xen doesn't have any restriction for users how to
> > allocate
> > > > > memory for different classes. That means users can place boot
> > modules
> > > > > anywhere, can reserve Xen heap memory anywhere and can allocate
> > guest
> > > > > memory anywhere.
> > > > >
> > > > > In a VMSA system, this would not be too much of a problem, since the
> > > > > MMU can manage memory at a granularity of 4KB after all. But in a
> > > > > PMSA system, this will be a big problem. On Armv8-R64, the max MPU
> > > > > protection regions number has been limited to 256. But in typical
> > > > > processor implementations, few processors will design more than 32
> > > > > MPU protection regions. Add in the fact that Xen shares MPU
> > protection
> > > > > regions with guest's EL1 Stage 2. It becomes even more important
> > > > > to properly plan the use of MPU protection regions.
> > > > >
> > > > > - An ideal of memory usage layout restriction:
> > > > > ![img](https://drive.google.com/uc?export=view&id=1kirOL0Tx2aAypTtd3
> > kXAt
> > > > d75XtrngcnW)
> > > > > 1. Reserve proper MPU regions for Xen image (code, rodata and data +
> > > > bss).
> > > > > 2. Reserve one MPU region for boot modules.
> > > > >    That means the placement of all boot modules, include guest
> > kernel,
> > > > >    initrd and dtb, will be limited to this MPU region protected area.
> > > > > 3. Reserve one or more MPU regions for Xen heap.
> > > > >    On Armv8-R64, the guest memory is predefined in device tree, it
> > will
> > > > >    not be allocated from heap. Unlike Armv8-A64, we will not move
> > all
> > > > >    free memory to heap. We want Xen heap is dertermistic too, so Xen
> > on
> > > > >    Armv8-R64 also rely on Xen static heap feature. The memory for
> > Xen
> > > > >    heap will be defined in tree too. Considering that physical
> > memory
> > > > >    can also be discontinuous, one or more MPU protection regions
> > needs
> > > > >    to be reserved for Xen HEAP.
> > > > > 4. If we name above used MPU protection regions PART_A, and name
> > left
> > > > >    MPU protection regions PART_B:
> > > > >    4.1. In hypervisor context, Xen will map left RAM and devices to
> > > > PART_B.
> > > > >         This will give Xen the ability to access whole memory.
> > > > >    4.2. In guest context, Xen will create EL1 stage 2 mapping in
> > PART_B.
> > > > >         In this case, Xen just need to update PART_B in context
> > switch,
> > > > >         but keep PART_A as fixed.
> > > >
> > > > I think that the memory layout and restrictions that you wrote above
> > > > make sense. I have some comments on the way they are represented in
> > > > device tree, but that's different.
> > > >
> > > >
> > > > > ***Notes: Static allocation will be mandatory on MPU based
> > systems***
> > > > >
> > > > > **A sample device tree of memory layout restriction**:
> > > > > ```
> > > > > chosen {
> > > > >     ...
> > > > >     /*
> > > > >      * Define a section to place boot modules,
> > > > >      * all boot modules must be placed in this section.
> > > > >      */
> > > > >     mpu,boot-module-section = <0x10000000 0x10000000>;
> > > > >     /*
> > > > >      * Define a section to cover all guest RAM. All guest RAM must
> > be
> > > > located
> > > > >      * within this section. The pros is that, in best case, we can
> > only
> > > > have
> > > > >      * one MPU protection region to map all guest RAM for Xen.
> > > > >      */
> > > > >     mpu,guest-memory-section = <0x20000000 0x30000000>;
> > > > >     /*
> > > > >      * Define a memory section that can cover all device memory that
> > > > >      * will be used in Xen.
> > > > >      */
> > > > >     mpu,device-memory-section = <0x80000000 0x7ffff000>;
> > > > >     /* Define a section for Xen heap */
> > > > >     xen,static-mem = <0x50000000 0x20000000>;
> > > >
> > > > As mentioned above, I understand the need for these sections, but why
> > do
> > > > we need to describe them in device tree at all? Could Xen select them
> > by
> > > > itself during boot?
> > >
> > > I think without some inputs, Xen could not do this or will do it in some
> > > assumption. For example, assume the first the boot-module-section
> > determined
> > > by lowest address and highest address of all modules. And the same for
> > > guest-memory-section, calculated from all guest allocated memory regions.
> > 
> > Right, I think that the mpu,boot-module-section should be generated by a
> > set of scripts like ImageBuilder. Something with a list of all the
> > binaries that need to be loaded and also the DTB at build-time.
> > Something like ImageBuilder would have the ability to add
> > "mpu,boot-module-section" to device tree automatically and automatically
> > choose a good address for it.
> > 
> > As an example, today ImageBuilder takes as input a config file like the
> > following:
> > 
> > ---
> > MEMORY_START="0x0"
> > MEMORY_END="0x80000000"
> > 
> > DEVICE_TREE="4.16-2022.1/mpsoc.dtb"
> > XEN="4.16-2022.1/xen"
> > DOM0_KERNEL="4.16-2022.1/Image-dom0-5.16"
> > DOM0_RAMDISK="4.16-2022.1/xen-rootfs.cpio.gz"
> > 
> > NUM_DOMUS=1
> > DOMU_KERNEL[0]="4.16-2022.1/Image-domU"
> > DOMU_RAMDISK[0]="4.16-2022.1/initrd.cpio"
> > DOMU_PASSTHROUGH_DTB[0]="4.16-2022.1/passthrough-example-sram.dtb"
> > ---
> > 
> > And generates a U-Boot boot.scr script with:
> > - load addresses for each binary
> > - commands to edit the DTB to add those addresses to device tree (e.g.
> >   dom0less kernels addresses)
> > 
> > ImageBuilder can also modify the DTB at build time instead (instead of
> > doing it from boot.scr.) See FDTEDIT.
> > 
> > I am not saying we should use ImageBuilder, but it sounds like we need
> > something similar.
> > 
> > 
> 
> Yes, exactly. I have comment on Henry's stack heap RFC to said we need
> a similar tool. Now, here it is : )

Ahah yes :-)

Initially I wrote ImageBuilder because people kept sending me emails to
ask me for help with dom0less and almost always it was an address
loading error.

I would be happy to turn ImageBuilder into something useful for ARMv8-R
as well and add more maintainers from ARM and other companies.


> > > > If not, and considering that we have to generate
> > > > ARM_MPU_*_MEMORY_START/END anyway at build time, would it make sense
> > to
> > > > also generate mpu,guest-memory-section, xen,static-mem, etc. at build
> > > > time rather than passing it via device tree to Xen at runtime?
> > > >
> > >
> > > Did you mean we still add these information in device tree, but for
> > build
> > > time only. In runtime we don't parse them?
> > 
> > Yes, something like that, but see below.
> > 
> > 
> > > > What's the value of doing ARM_MPU_*_MEMORY_START/END at build time and
> > > > everything else at runtime?
> > >
> > > ARM_MPU_*_MEMORY_START/END is defined by platform. But other things are
> > > users customized. They can change their usage without rebuild the image.
> > 
> > Good point.
> > 
> > We don't want to have to rebuild Xen if the user updated a guest kernel,
> > resulting in a larger boot-module-section.
> > 
> > So I think it makes sense that "mpu,boot-module-section" is generated by
> > the scripts (e.g. ImageBuilder) at build time, and Xen reads the
> > property at boot from the runtime device tree.
> > 
> > I think we need to divide the information into two groups:
> > 
> > 
> > # Group1: board info
> > 
> > This information is platform specific and it is not meant to change
> > depending on the VM configuration. Ideally, we build Xen for a platform
> > once, then we can use the same Xen binary together with any combination
> > of dom0/domU kernels and ramdisks.
> > 
> > This kind of information doesn't need to be exposed to the runtime
> > device tree. But we can still use a build-time device tree to generate
> > the addresses if it is convenient.
> > 
> > XEN_START_ADDRESS, ARM_MPU_DEVICE_MEMORY_*, and ARM_MPU_NORMAL_MEMORY_*
> > seem to be part of this group.
> > 
> 
> Yes.
> 
> > 
> > # Group2: boot configuration
> > 
> > This information is about the specific set of binaries and VMs that we
> > need to boot. It is conceptually similar to the dom0less device tree
> > nodes that we already have. If we change one of the VM binaries, we
> > likely have to refresh the information here.
> > 
> > "mpu,boot-module-section" probably belongs to this group (unless we find
> > a way to define "mpu,boot-module-section" generically so that we don't
> > need to change it any time the set of boot modules change.)
> > 
> > 
> 
> I agree.
> 
> > > > It looks like we are forced to have the sections definitions at build
> > > > time because we need them before we can parse device tree. In that
> > case,
> > > > we might as well define all the sections at build time.
> > > >
> > > > But I think it would be even better if Xen could automatically choose
> > > > xen,static-mem, mpu,guest-memory-section, etc. on its own based on the
> > > > regular device tree information (/memory, /amba, etc.), without any
> > need
> > > > for explicitly describing each range with these new properties.
> > > >
> > >
> > > for mpu,guest-memory-section, with the limitations: no other usage
> > between
> > > different guest' memory nodes, this is OK. But for xen,static-mem (heap),
> > > we just want everything on a MPU system is dertermistic. But, of course
> > Xen
> > > can select left memory for heap without static-mem.
> > 
> > It is good that you think they can be chosen by Xen.
> > 
> > Differently from "boot-module-section", which has to do with the boot
> > modules selected by the user for a specific execution,
> > guest-memory-section and static-mem are Xen specific memory
> > policies/allocations.
> > 
> > A user wouldn't know how to fill them in. And I worry that even a script
> 
> But users should know it, because static-mem for guest must be allocated
> in this range. And users take the responsibility to set the DomU's
> static allocate memory ranges.

Let me premise that my goal is to avoid having many users reporting
errors to xen-devel and xen-users when actually it is just a wrong
choice of addresses.

I think we need to make a distinction between addresses for the boot
modules, e.g. addresses where to load xen, the dom0/U kernel, dom0/U
ramdisk in memory at boot time, and VM static memory addresses.

The boot modules addresses are particularly difficult to fill in because
they are many and a small update in one of the modules could invalidate
all the other addresses. This is why I ended up writing ImageBuilder.
Since them, I received several emails from users thanking me for
ImageBuilder :-)

The static VM memory addresses (xen,static-mem) should be a bit easier
to fill in correctly. They are meant to be chosen once, and it shouldn't
happen that an update on a kernel forces the user to change all the VM
static memory addresses. Also, I know that some users actually want to
be able to choose the domU addresses by hand because they have specific
needs. So it is good that we can let the user choose the addresses if
they want to.

With all of that said, I do think that many users won't have an opinion
on the VM static memory addresses and won't know how to choose them.
It would be error prone to let them try to fill them in by hand. So I
was already planning on adding support to ImageBuilder to automatically
generate xen,static-mem for dom0less domains.


Going back to this specific discussion about boot-module-section: I can
see now that, given xen,static-mem is chosen by ImageBuilder (or
similar) and not Xen, then it makes sense to have ImageBuilder (or
similar) also generate boot-module-section.



> > like ImageBuilder wouldn't be the best place to pick these values --
> > they seem too "important" to leave to a script.
> > 
> > But it seems possible to choose the values in Xen:
> > - Xen knows ARM_MPU_NORMAL_MEMORY_* because it was defined at build time
> > - Xen reads boot-module-section from device tree
> > 
> > It should be possible at this point for Xen to pick the best values for
> > guest-memory-section and static-mem based on the memory available.
> > 
> 
> How Xen to pick? Does it mean in static allocation DomU DT node, we just
> need a size, but don't require a start address for static-mem?

Yes the idea was that the user would only provide the size (e.g.
DOMU_STATIC_MEM[1]=1024) and the addresses would be automatically
calculated. But I didn't mean to change the existing xen,static-mem
device tree bindings. So it is best if the xen,static-mem addresses
generation is done by ImageBuilder (or similar tool) instead of Xen.

Sorry for the confusion!


> > > > >     domU1 {
> > > > >         ...
> > > > >         #xen,static-mem-address-cells = <0x01>;
> > > > >         #xen,static-mem-size-cells = <0x01>;
> > > > >         /* Statically allocated guest memory, within mpu,guest-
> > memory-
> > > > section */
> > > > >         xen,static-mem = <0x30000000 0x1f000000>;
> > > > >
> > > > >         module@11000000 {
> > > > >             compatible = "multiboot,kernel\0multiboot,module";
> > > > >             /* Boot module address, within mpu,boot-module-section
> > */
> > > > >             reg = <0x11000000 0x3000000>;
> > > > >             ...
> > > > >         };
> > > > >
> > > > >         module@10FF0000 {
> > > > >                 compatible = "multiboot,device-
> > tree\0multiboot,module";
> > > > >                 /* Boot module address, within mpu,boot-module-
> > section
> > > > */
> > > > >                 reg = <0x10ff0000 0x10000>;
> > > > >                 ...
> > > > >         };
> > > > >     };
> > > > > };
> > > > > ```
--8323329-1877311929-1646175755=:3261--


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 00:25:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 00:25:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281875.480399 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPCnc-0003Qr-T7; Wed, 02 Mar 2022 00:25:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281875.480399; Wed, 02 Mar 2022 00:25:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPCnc-0003Qk-QA; Wed, 02 Mar 2022 00:25:00 +0000
Received: by outflank-mailman (input) for mailman id 281875;
 Wed, 02 Mar 2022 00:24:59 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPCnb-0003Qa-By; Wed, 02 Mar 2022 00:24:59 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPCnb-0003vC-9S; Wed, 02 Mar 2022 00:24:59 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPCna-0003ej-VK; Wed, 02 Mar 2022 00:24:59 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPCna-0001YS-RR; Wed, 02 Mar 2022 00:24:58 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=DWcNlXO5cdDRXdKVB8o9BAHAzbr0g1U6ZUk8zk+LEJc=; b=JUw0BJAWbDCj6UN+VY3zsmmE+K
	60zd/EGS9wgsMmgpNqaL244giZFwvF94CR3fyn/D25iIXzT0OoJr+Pb7Od0tjx5eXYJWmn+u+SbeZ
	KRh3Uwo2iuwauLL7sEzuc13fHd+hWo0A5AttA1r9DZBHXV/Z0r4idI90jeTR9sXwsRIw=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168308-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168308: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=497ac7b6d7f9750f48f137db244931a5728b1968
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 02 Mar 2022 00:24:58 +0000

flight 168308 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168308/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 497ac7b6d7f9750f48f137db244931a5728b1968
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    1 days
Failing since        168258  2022-03-01 01:55:31 Z    0 days   10 attempts
Testing same since   168262  2022-03-01 04:10:26 Z    0 days    9 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 00:46:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 00:46:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281888.480416 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPD7z-0006Db-OP; Wed, 02 Mar 2022 00:46:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281888.480416; Wed, 02 Mar 2022 00:46:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPD7z-0006DU-LB; Wed, 02 Mar 2022 00:46:03 +0000
Received: by outflank-mailman (input) for mailman id 281888;
 Wed, 02 Mar 2022 00:46:03 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPD7z-0006DK-6a; Wed, 02 Mar 2022 00:46:03 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPD7z-0004Hw-4s; Wed, 02 Mar 2022 00:46:03 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPD7y-0004ec-Ue; Wed, 02 Mar 2022 00:46:02 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPD7y-0005vJ-U7; Wed, 02 Mar 2022 00:46:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=UEP/pFQKm4YoioPfHMNyx6W1gGO8IZ4VvRRxjJX6Frs=; b=FWRHgVU7280iBB8d0k1Szor3mH
	iypdPNVaGxni0pIEfP4yEnO/hiaIDzhXp/50Y9mtI+vGB5XWEuoOFqz7K2RTsU50tHD12Qs9us76j
	vCiQf3YhUQGgTvh8P69TTW2EdY9zt6UCwcyShNF1Ls2FwNMDI7oUA6Swf0JHHsHowiPw=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168305-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168305: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=0c18fb76323bfb13615b6f13c98767face2d8097
X-Osstest-Versions-That:
    xen=6e3f36387de566b09aa4145ea0e3bfe4814d68b4
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 02 Mar 2022 00:46:02 +0000

flight 168305 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168305/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  0c18fb76323bfb13615b6f13c98767face2d8097
baseline version:
 xen                  6e3f36387de566b09aa4145ea0e3bfe4814d68b4

Last test of basis   168296  2022-03-01 14:03:25 Z    0 days
Testing same since   168305  2022-03-01 20:01:41 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Julien Grall <jgrall@amazon.com>
  Julien Grall <julien.grall@arm.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   6e3f36387d..0c18fb7632  0c18fb76323bfb13615b6f13c98767face2d8097 -> smoke


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 01:17:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 01:17:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281899.480427 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPDci-0006Af-BB; Wed, 02 Mar 2022 01:17:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281899.480427; Wed, 02 Mar 2022 01:17:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPDci-0006AY-6w; Wed, 02 Mar 2022 01:17:48 +0000
Received: by outflank-mailman (input) for mailman id 281899;
 Wed, 02 Mar 2022 01:17:47 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPDch-0006AO-DJ; Wed, 02 Mar 2022 01:17:47 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPDch-0000Dg-8T; Wed, 02 Mar 2022 01:17:47 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPDcg-0005kL-QH; Wed, 02 Mar 2022 01:17:46 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPDcg-0006Im-Pn; Wed, 02 Mar 2022 01:17:46 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=yjyJK1PrzYGecq6CgYc2OLageYUfWoW0auj7hMMF7RM=; b=QIE/Fx1xU3mdo4T59muJJn2Agm
	5gYujPd1hI7HqVAbo9xGAqKXFrp3c3qfRtOayh2aSv8eDavKIyXEArzHFexmCc+qBRjobvW5MOsss
	FSdZUH6q6zBniPJL3i0nVLe8/pBEke0W1/0x8M3Ovomx8srnCGmkoT3+tZSatgr6E1qk=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168312-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168312: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=497ac7b6d7f9750f48f137db244931a5728b1968
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 02 Mar 2022 01:17:46 +0000

flight 168312 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168312/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 497ac7b6d7f9750f48f137db244931a5728b1968
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    1 days
Failing since        168258  2022-03-01 01:55:31 Z    0 days   11 attempts
Testing same since   168262  2022-03-01 04:10:26 Z    0 days   10 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 02:49:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 02:49:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281910.480438 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPF3W-0008R2-3n; Wed, 02 Mar 2022 02:49:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281910.480438; Wed, 02 Mar 2022 02:49:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPF3V-0008Qu-Ub; Wed, 02 Mar 2022 02:49:33 +0000
Received: by outflank-mailman (input) for mailman id 281910;
 Wed, 02 Mar 2022 02:49:32 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPF3U-0008Qk-7Q; Wed, 02 Mar 2022 02:49:32 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPF3U-00029p-46; Wed, 02 Mar 2022 02:49:32 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPF3T-0001WF-Q9; Wed, 02 Mar 2022 02:49:31 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPF3K-0001Mt-Jy; Wed, 02 Mar 2022 02:49:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Z7jZaQcnJb5IuuoaG1khQGdMVWhxhEie6s1u3EAomwc=; b=iQdGIvFE/2j4cmUQ9AvVl8Wt/M
	lk7vZIjjbzIwS3Z4A2WjtfbUSFtXR4YQpTJQ8adl4wrA2LSVejtwI2QM7ET9R2DKaWlRt5walmcNI
	vvwV5kGEOzU+PcoGMTkp5OmexrbItVtN51X4CoFTGfWLK3QdW3KZ+onqWeKylzFYHePI=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168314-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168314: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=497ac7b6d7f9750f48f137db244931a5728b1968
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 02 Mar 2022 02:49:22 +0000

flight 168314 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168314/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 497ac7b6d7f9750f48f137db244931a5728b1968
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    1 days
Failing since        168258  2022-03-01 01:55:31 Z    1 days   12 attempts
Testing same since   168262  2022-03-01 04:10:26 Z    0 days   11 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 02:56:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 02:56:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281925.480455 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPF9g-0001X1-VH; Wed, 02 Mar 2022 02:55:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281925.480455; Wed, 02 Mar 2022 02:55:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPF9g-0001Wu-S1; Wed, 02 Mar 2022 02:55:56 +0000
Received: by outflank-mailman (input) for mailman id 281925;
 Wed, 02 Mar 2022 02:55:56 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=6wI2=TN=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nPF9g-0001Wo-Ao
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 02:55:56 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 45bd9cdd-99d4-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 03:55:53 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id B8666B81D71;
 Wed,  2 Mar 2022 02:55:50 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5CC18C340EE;
 Wed,  2 Mar 2022 02:55:48 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 45bd9cdd-99d4-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646189749;
	bh=+9ELN9vs62ISIoM03rj0HMh2JUdciOzBOCDhQI6QFPc=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=Yz8AyEKVJasXFNiZ8rmTZeX76EMZyQ9CVYri7P9h7/S6WH9S/TTWf9kmuC58xl0bP
	 mus56AWm7bIQY4S0dK37bXzdJOBeuDInue9pq0+mJyGOgcGtQIEnZx+s+LXo23HRDZ
	 /PEi9o40pO8LM0kcvJs9PBB1dZRgZszDafnAf7iGlSdzQZcvH2k+svZKIJTdAs+/KZ
	 hXm39T9r/qhKfL/Pz2mDOxaOXNjAFXBV3zv0efwV5hO5pCIVKQk+xft7XixOHGVUnB
	 ZdypAI3gDK0oWKrimsGXDtsXlzWMDbUxd3xqxDtM+7nBlpjzO31ACN1Qpfy1nPC0WO
	 6tKIbg7mY2UFw==
Date: Tue, 1 Mar 2022 18:55:47 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Christoph Hellwig <hch@lst.de>
cc: iommu@lists.linux-foundation.org, x86@kernel.org, 
    Anshuman Khandual <anshuman.khandual@arm.com>, 
    Tom Lendacky <thomas.lendacky@amd.com>, 
    Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>, 
    Stefano Stabellini <sstabellini@kernel.org>, 
    Boris Ostrovsky <boris.ostrovsky@oracle.com>, 
    Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>, 
    David Woodhouse <dwmw2@infradead.org>, Lu Baolu <baolu.lu@linux.intel.com>, 
    Robin Murphy <robin.murphy@arm.com>, linux-arm-kernel@lists.infradead.org, 
    xen-devel@lists.xenproject.org, linux-ia64@vger.kernel.org, 
    linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, 
    linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org, 
    linux-hyperv@vger.kernel.org, tboot-devel@lists.sourceforge.net, 
    linux-pci@vger.kernel.org
Subject: Re: [PATCH 11/12] swiotlb: merge swiotlb-xen initialization into
 swiotlb
In-Reply-To: <20220301105311.885699-12-hch@lst.de>
Message-ID: <alpine.DEB.2.22.394.2203011720150.3261@ubuntu-linux-20-04-desktop>
References: <20220301105311.885699-1-hch@lst.de> <20220301105311.885699-12-hch@lst.de>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Tue, 1 Mar 2022, Christoph Hellwig wrote:
> Allow to pass a remap argument to the swiotlb initialization functions
> to handle the Xen/x86 remap case.  ARM/ARM64 never did any remapping
> from xen_swiotlb_fixup, so we don't even need that quirk.
> 
> Signed-off-by: Christoph Hellwig <hch@lst.de>
> ---
>  arch/arm/xen/mm.c               |  23 +++---
>  arch/x86/include/asm/xen/page.h |   5 --
>  arch/x86/kernel/pci-dma.c       |  19 +++--
>  arch/x86/pci/sta2x11-fixup.c    |   2 +-
>  drivers/xen/swiotlb-xen.c       | 128 +-------------------------------
>  include/linux/swiotlb.h         |   7 +-
>  include/xen/arm/page.h          |   1 -
>  include/xen/swiotlb-xen.h       |   8 +-
>  kernel/dma/swiotlb.c            | 120 +++++++++++++++---------------
>  9 files changed, 96 insertions(+), 217 deletions(-)
> 
> diff --git a/arch/arm/xen/mm.c b/arch/arm/xen/mm.c
> index a7e54a087b802..58b40f87617d3 100644
> --- a/arch/arm/xen/mm.c
> +++ b/arch/arm/xen/mm.c
> @@ -23,22 +23,20 @@
>  #include <asm/xen/hypercall.h>
>  #include <asm/xen/interface.h>
>  
> -unsigned long xen_get_swiotlb_free_pages(unsigned int order)
> +static gfp_t xen_swiotlb_gfp(void)
>  {
>  	phys_addr_t base;
> -	gfp_t flags = __GFP_NOWARN|__GFP_KSWAPD_RECLAIM;
>  	u64 i;
>  
>  	for_each_mem_range(i, &base, NULL) {
>  		if (base < (phys_addr_t)0xffffffff) {
>  			if (IS_ENABLED(CONFIG_ZONE_DMA32))
> -				flags |= __GFP_DMA32;
> -			else
> -				flags |= __GFP_DMA;
> -			break;
> +				return __GFP_DMA32;
> +			return __GFP_DMA;
>  		}
>  	}
> -	return __get_free_pages(flags, order);
> +
> +	return GFP_KERNEL;
>  }

Unrelated to this specific patch series: now that I think about it, if
io_tlb_default_mem.nslabs is already allocated by the time xen_mm_init
is called, wouldn't we potentially have an issue with the GFP flags used
for the earlier allocation (e.g. GFP_DMA32 not used)? Maybe something
for another day.


>  static bool hypercall_cflush = false;
> @@ -143,10 +141,15 @@ static int __init xen_mm_init(void)
>  	if (!xen_swiotlb_detect())
>  		return 0;
>  
> -	rc = xen_swiotlb_init();
>  	/* we can work with the default swiotlb */
> -	if (rc < 0 && rc != -EEXIST)
> -		return rc;
> +	if (!io_tlb_default_mem.nslabs) {
> +		if (!xen_initial_domain())
> +			return -EINVAL;

I don't think we need this xen_initial_domain() check. It is all
already sorted out by the xen_swiotlb_detect() check above.

Aside from that the rest looks OK. Also, you can add my:

Tested-by: Stefano Stabellini <sstabellini@kernel.org>


> +		rc = swiotlb_init_late(swiotlb_size_or_default(),
> +				       xen_swiotlb_gfp(), NULL);
> +		if (rc < 0)
> +			return rc;
> +	}
>  
>  	cflush.op = 0;
>  	cflush.a.dev_bus_addr = 0;
> diff --git a/arch/x86/include/asm/xen/page.h b/arch/x86/include/asm/xen/page.h
> index e989bc2269f54..1fc67df500145 100644
> --- a/arch/x86/include/asm/xen/page.h
> +++ b/arch/x86/include/asm/xen/page.h
> @@ -357,9 +357,4 @@ static inline bool xen_arch_need_swiotlb(struct device *dev,
>  	return false;
>  }
>  
> -static inline unsigned long xen_get_swiotlb_free_pages(unsigned int order)
> -{
> -	return __get_free_pages(__GFP_NOWARN, order);
> -}
> -
>  #endif /* _ASM_X86_XEN_PAGE_H */
> diff --git a/arch/x86/kernel/pci-dma.c b/arch/x86/kernel/pci-dma.c
> index e0def4b1c3181..2f2c468acb955 100644
> --- a/arch/x86/kernel/pci-dma.c
> +++ b/arch/x86/kernel/pci-dma.c
> @@ -71,15 +71,12 @@ static inline void __init pci_swiotlb_detect(void)
>  #endif /* CONFIG_SWIOTLB */
>  
>  #ifdef CONFIG_SWIOTLB_XEN
> -static bool xen_swiotlb;
> -
>  static void __init pci_xen_swiotlb_init(void)
>  {
>  	if (!xen_initial_domain() && !x86_swiotlb_enable)
>  		return;
>  	x86_swiotlb_enable = false;
> -	xen_swiotlb = true;
> -	xen_swiotlb_init_early();
> +	swiotlb_init_remap(true, x86_swiotlb_flags, xen_swiotlb_fixup);
>  	dma_ops = &xen_swiotlb_dma_ops;
>  	if (IS_ENABLED(CONFIG_PCI))
>  		pci_request_acs();
> @@ -87,14 +84,16 @@ static void __init pci_xen_swiotlb_init(void)
>  
>  int pci_xen_swiotlb_init_late(void)
>  {
> -	int rc;
> -
> -	if (xen_swiotlb)
> +	if (dma_ops == &xen_swiotlb_dma_ops)
>  		return 0;
>  
> -	rc = xen_swiotlb_init();
> -	if (rc)
> -		return rc;
> +	/* we can work with the default swiotlb */
> +	if (!io_tlb_default_mem.nslabs) {
> +		int rc = swiotlb_init_late(swiotlb_size_or_default(),
> +					   GFP_KERNEL, xen_swiotlb_fixup);
> +		if (rc < 0)
> +			return rc;
> +	}
>  
>  	/* XXX: this switches the dma ops under live devices! */
>  	dma_ops = &xen_swiotlb_dma_ops;
> diff --git a/drivers/xen/swiotlb-xen.c b/drivers/xen/swiotlb-xen.c
> index c2da3eb4826e8..df8085b50df10 100644
> --- a/drivers/xen/swiotlb-xen.c
> +++ b/drivers/xen/swiotlb-xen.c
> @@ -104,7 +104,7 @@ static int is_xen_swiotlb_buffer(struct device *dev, dma_addr_t dma_addr)
>  	return 0;
>  }
>  
> -static int xen_swiotlb_fixup(void *buf, unsigned long nslabs)
> +int xen_swiotlb_fixup(void *buf, unsigned long nslabs)
>  {
>  	int rc;
>  	unsigned int order = get_order(IO_TLB_SEGSIZE << IO_TLB_SHIFT);
> @@ -130,132 +130,6 @@ static int xen_swiotlb_fixup(void *buf, unsigned long nslabs)
>  	return 0;
>  }
>  
> -enum xen_swiotlb_err {
> -	XEN_SWIOTLB_UNKNOWN = 0,
> -	XEN_SWIOTLB_ENOMEM,
> -	XEN_SWIOTLB_EFIXUP
> -};
> -
> -static const char *xen_swiotlb_error(enum xen_swiotlb_err err)
> -{
> -	switch (err) {
> -	case XEN_SWIOTLB_ENOMEM:
> -		return "Cannot allocate Xen-SWIOTLB buffer\n";
> -	case XEN_SWIOTLB_EFIXUP:
> -		return "Failed to get contiguous memory for DMA from Xen!\n"\
> -		    "You either: don't have the permissions, do not have"\
> -		    " enough free memory under 4GB, or the hypervisor memory"\
> -		    " is too fragmented!";
> -	default:
> -		break;
> -	}
> -	return "";
> -}
> -
> -int xen_swiotlb_init(void)
> -{
> -	enum xen_swiotlb_err m_ret = XEN_SWIOTLB_UNKNOWN;
> -	unsigned long bytes = swiotlb_size_or_default();
> -	unsigned long nslabs = bytes >> IO_TLB_SHIFT;
> -	unsigned int order, repeat = 3;
> -	int rc = -ENOMEM;
> -	char *start;
> -
> -	if (io_tlb_default_mem.nslabs) {
> -		pr_warn("swiotlb buffer already initialized\n");
> -		return -EEXIST;
> -	}
> -
> -retry:
> -	m_ret = XEN_SWIOTLB_ENOMEM;
> -	order = get_order(bytes);
> -
> -	/*
> -	 * Get IO TLB memory from any location.
> -	 */
> -#define SLABS_PER_PAGE (1 << (PAGE_SHIFT - IO_TLB_SHIFT))
> -#define IO_TLB_MIN_SLABS ((1<<20) >> IO_TLB_SHIFT)
> -	while ((SLABS_PER_PAGE << order) > IO_TLB_MIN_SLABS) {
> -		start = (void *)xen_get_swiotlb_free_pages(order);
> -		if (start)
> -			break;
> -		order--;
> -	}
> -	if (!start)
> -		goto exit;
> -	if (order != get_order(bytes)) {
> -		pr_warn("Warning: only able to allocate %ld MB for software IO TLB\n",
> -			(PAGE_SIZE << order) >> 20);
> -		nslabs = SLABS_PER_PAGE << order;
> -		bytes = nslabs << IO_TLB_SHIFT;
> -	}
> -
> -	/*
> -	 * And replace that memory with pages under 4GB.
> -	 */
> -	rc = xen_swiotlb_fixup(start, nslabs);
> -	if (rc) {
> -		free_pages((unsigned long)start, order);
> -		m_ret = XEN_SWIOTLB_EFIXUP;
> -		goto error;
> -	}
> -	rc = swiotlb_late_init_with_tbl(start, nslabs);
> -	if (rc)
> -		return rc;
> -	return 0;
> -error:
> -	if (nslabs > 1024 && repeat--) {
> -		/* Min is 2MB */
> -		nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
> -		bytes = nslabs << IO_TLB_SHIFT;
> -		pr_info("Lowering to %luMB\n", bytes >> 20);
> -		goto retry;
> -	}
> -exit:
> -	pr_err("%s (rc:%d)\n", xen_swiotlb_error(m_ret), rc);
> -	return rc;
> -}
> -
> -#ifdef CONFIG_X86
> -void __init xen_swiotlb_init_early(void)
> -{
> -	unsigned long bytes = swiotlb_size_or_default();
> -	unsigned long nslabs = bytes >> IO_TLB_SHIFT;
> -	unsigned int repeat = 3;
> -	char *start;
> -	int rc;
> -
> -retry:
> -	/*
> -	 * Get IO TLB memory from any location.
> -	 */
> -	start = memblock_alloc(PAGE_ALIGN(bytes),
> -			       IO_TLB_SEGSIZE << IO_TLB_SHIFT);
> -	if (!start)
> -		panic("%s: Failed to allocate %lu bytes\n",
> -		      __func__, PAGE_ALIGN(bytes));
> -
> -	/*
> -	 * And replace that memory with pages under 4GB.
> -	 */
> -	rc = xen_swiotlb_fixup(start, nslabs);
> -	if (rc) {
> -		memblock_free(start, PAGE_ALIGN(bytes));
> -		if (nslabs > 1024 && repeat--) {
> -			/* Min is 2MB */
> -			nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
> -			bytes = nslabs << IO_TLB_SHIFT;
> -			pr_info("Lowering to %luMB\n", bytes >> 20);
> -			goto retry;
> -		}
> -		panic("%s (rc:%d)", xen_swiotlb_error(XEN_SWIOTLB_EFIXUP), rc);
> -	}
> -
> -	if (swiotlb_init_with_tbl(start, nslabs, SWIOTLB_VERBOSE))
> -		panic("Cannot allocate SWIOTLB buffer");
> -}
> -#endif /* CONFIG_X86 */
> -
>  static void *
>  xen_swiotlb_alloc_coherent(struct device *hwdev, size_t size,
>  			   dma_addr_t *dma_handle, gfp_t flags,
> diff --git a/include/linux/swiotlb.h b/include/linux/swiotlb.h
> index ee655f2e4d28b..919cf82ed978e 100644
> --- a/include/linux/swiotlb.h
> +++ b/include/linux/swiotlb.h
> @@ -34,10 +34,11 @@ struct scatterlist;
>  /* default to 64MB */
>  #define IO_TLB_DEFAULT_SIZE (64UL<<20)
>  
> -int swiotlb_init_with_tbl(char *tlb, unsigned long nslabs, unsigned int flags);
>  unsigned long swiotlb_size_or_default(void);
> -extern int swiotlb_late_init_with_tbl(char *tlb, unsigned long nslabs);
> -int swiotlb_init_late(size_t size, gfp_t gfp_mask);
> +int swiotlb_init_late(size_t size, gfp_t gfp_mask,
> +		int (*remap)(void *tlb, unsigned long nslabs));
> +void __init swiotlb_init_remap(bool addressing_limit, unsigned int flags,
> +		int (*remap)(void *tlb, unsigned long nslabs));
>  extern void __init swiotlb_update_mem_attributes(void);
>  
>  phys_addr_t swiotlb_tbl_map_single(struct device *hwdev, phys_addr_t phys,
> diff --git a/include/xen/arm/page.h b/include/xen/arm/page.h
> index ac1b654705631..7e199c6656b90 100644
> --- a/include/xen/arm/page.h
> +++ b/include/xen/arm/page.h
> @@ -115,6 +115,5 @@ static inline bool set_phys_to_machine(unsigned long pfn, unsigned long mfn)
>  bool xen_arch_need_swiotlb(struct device *dev,
>  			   phys_addr_t phys,
>  			   dma_addr_t dev_addr);
> -unsigned long xen_get_swiotlb_free_pages(unsigned int order);
>  #endif /* _ASM_ARM_XEN_PAGE_H */
> diff --git a/include/xen/swiotlb-xen.h b/include/xen/swiotlb-xen.h
> index b3e647f86e3e2..590ceb923f0c8 100644
> --- a/include/xen/swiotlb-xen.h
> +++ b/include/xen/swiotlb-xen.h
> @@ -10,8 +10,12 @@ void xen_dma_sync_for_cpu(struct device *dev, dma_addr_t handle,
>  void xen_dma_sync_for_device(struct device *dev, dma_addr_t handle,
>  			     size_t size, enum dma_data_direction dir);
>  
> -int xen_swiotlb_init(void);
> -void __init xen_swiotlb_init_early(void);
> +#ifdef CONFIG_SWIOTLB_XEN
> +int xen_swiotlb_fixup(void *buf, unsigned long nslabs);
> +#else
> +#define xen_swiotlb_fixup NULL
> +#endif
> +
>  extern const struct dma_map_ops xen_swiotlb_dma_ops;
>  
>  #endif /* __LINUX_SWIOTLB_XEN_H */
> diff --git a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c
> index 77cf73dc20a78..128363dc9b5bb 100644
> --- a/kernel/dma/swiotlb.c
> +++ b/kernel/dma/swiotlb.c
> @@ -234,40 +234,17 @@ static void swiotlb_init_io_tlb_mem(struct io_tlb_mem *mem, phys_addr_t start,
>  	return;
>  }
>  
> -int __init swiotlb_init_with_tbl(char *tlb, unsigned long nslabs,
> -		unsigned int flags)
> -{
> -	struct io_tlb_mem *mem = &io_tlb_default_mem;
> -	size_t alloc_size;
> -
> -	if (swiotlb_force_disable)
> -		return 0;
> -
> -	/* protect against double initialization */
> -	if (WARN_ON_ONCE(mem->nslabs))
> -		return -ENOMEM;
> -
> -	alloc_size = PAGE_ALIGN(array_size(sizeof(*mem->slots), nslabs));
> -	mem->slots = memblock_alloc(alloc_size, PAGE_SIZE);
> -	if (!mem->slots)
> -		panic("%s: Failed to allocate %zu bytes align=0x%lx\n",
> -		      __func__, alloc_size, PAGE_SIZE);
> -
> -	swiotlb_init_io_tlb_mem(mem, __pa(tlb), nslabs, false);
> -	mem->force_bounce = flags & SWIOTLB_FORCE;
> -
> -	if (flags & SWIOTLB_VERBOSE)
> -		swiotlb_print_info();
> -	return 0;
> -}
> -
>  /*
>   * Statically reserve bounce buffer space and initialize bounce buffer data
>   * structures for the software IO TLB used to implement the DMA API.
>   */
> -void __init swiotlb_init(bool addressing_limit, unsigned int flags)
> +void __init swiotlb_init_remap(bool addressing_limit, unsigned int flags,
> +		int (*remap)(void *tlb, unsigned long nslabs))
>  {
> -	size_t bytes = PAGE_ALIGN(default_nslabs << IO_TLB_SHIFT);
> +	struct io_tlb_mem *mem = &io_tlb_default_mem;
> +	unsigned long nslabs = default_nslabs;
> +	size_t alloc_size = PAGE_ALIGN(array_size(sizeof(*mem->slots), nslabs));
> +	size_t bytes;
>  	void *tlb;
>  
>  	if (!addressing_limit && !swiotlb_force_bounce)
> @@ -275,23 +252,48 @@ void __init swiotlb_init(bool addressing_limit, unsigned int flags)
>  	if (swiotlb_force_disable)
>  		return;
>  
> +	/* protect against double initialization */
> +	if (WARN_ON_ONCE(mem->nslabs))
> +		return;
> +
>  	/*
>  	 * By default allocate the bonuce buffer memory from low memory.
>  	 */
> +retry:
> +	bytes = PAGE_ALIGN(default_nslabs << IO_TLB_SHIFT);
>  	if (flags & SWIOTLB_ANY)
>  		tlb = memblock_alloc(bytes, PAGE_SIZE);
>  	else
>  		tlb = memblock_alloc_low(bytes, PAGE_SIZE);
>  	if (!tlb)
> -		goto fail;
> -	if (swiotlb_init_with_tbl(tlb, default_nslabs, flags))
> -		goto fail_free_mem;
> -	return;
> +		panic("%s: failed to allocate tlb structure\n", __func__);
> +
> +	if (remap && remap(tlb, nslabs) < 0) {
> +		memblock_free(tlb, PAGE_ALIGN(bytes));
> +
> +		/* Min is 2MB */
> +		if (nslabs <= 1024)
> +			panic("%s: Failed to remap %zu bytes\n",
> +			      __func__, bytes);
> +		nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
> +		goto retry;
> +	}
> +
> +	mem->slots = memblock_alloc(alloc_size, PAGE_SIZE);
> +	if (!mem->slots)
> +		panic("%s: Failed to allocate %zu bytes align=0x%lx\n",
> +		      __func__, alloc_size, PAGE_SIZE);
>  
> -fail_free_mem:
> -	memblock_free(tlb, bytes);
> -fail:
> -	pr_warn("Cannot allocate buffer");
> +	swiotlb_init_io_tlb_mem(mem, __pa(tlb), default_nslabs, false);
> +	mem->force_bounce = flags & SWIOTLB_FORCE;
> +
> +	if (flags & SWIOTLB_VERBOSE)
> +		swiotlb_print_info();
> +}
> +
> +void __init swiotlb_init(bool addressing_limit, unsigned int flags)
> +{
> +	return swiotlb_init_remap(addressing_limit, flags, NULL);
>  }
>  
>  /*
> @@ -299,8 +301,10 @@ void __init swiotlb_init(bool addressing_limit, unsigned int flags)
>   * initialize the swiotlb later using the slab allocator if needed.
>   * This should be just like above, but with some error catching.
>   */
> -int swiotlb_init_late(size_t size, gfp_t gfp_mask)
> +int swiotlb_init_late(size_t size, gfp_t gfp_mask,
> +		int (*remap)(void *tlb, unsigned long nslabs))
>  {
> +	struct io_tlb_mem *mem = &io_tlb_default_mem;
>  	unsigned long nslabs = ALIGN(size >> IO_TLB_SHIFT, IO_TLB_SEGSIZE);
>  	unsigned long bytes;
>  	unsigned char *vstart = NULL;
> @@ -310,9 +314,14 @@ int swiotlb_init_late(size_t size, gfp_t gfp_mask)
>  	if (swiotlb_force_disable)
>  		return 0;
>  
> +	/* protect against double initialization */
> +	if (WARN_ON_ONCE(mem->nslabs))
> +		return -ENOMEM;
> +
>  	/*
>  	 * Get IO TLB memory from the low pages
>  	 */
> +retry:
>  	order = get_order(nslabs << IO_TLB_SHIFT);
>  	nslabs = SLABS_PER_PAGE << order;
>  	bytes = nslabs << IO_TLB_SHIFT;
> @@ -333,33 +342,28 @@ int swiotlb_init_late(size_t size, gfp_t gfp_mask)
>  			(PAGE_SIZE << order) >> 20);
>  		nslabs = SLABS_PER_PAGE << order;
>  	}
> -	rc = swiotlb_late_init_with_tbl(vstart, nslabs);
> -	if (rc)
> -		free_pages((unsigned long)vstart, order);
> -
> -	return rc;
> -}
> -
> -int
> -swiotlb_late_init_with_tbl(char *tlb, unsigned long nslabs)
> -{
> -	struct io_tlb_mem *mem = &io_tlb_default_mem;
> -	unsigned long bytes = nslabs << IO_TLB_SHIFT;
>  
> -	if (swiotlb_force_disable)
> -		return 0;
> +	if (remap)
> +		rc = remap(vstart, nslabs);
> +	if (rc) {
> +		free_pages((unsigned long)vstart, order);
>  
> -	/* protect against double initialization */
> -	if (WARN_ON_ONCE(mem->nslabs))
> -		return -ENOMEM;
> +		/* Min is 2MB */
> +		if (nslabs <= 1024)
> +			return rc;
> +		nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
> +		goto retry;
> +	}
>  
>  	mem->slots = (void *)__get_free_pages(GFP_KERNEL | __GFP_ZERO,
>  		get_order(array_size(sizeof(*mem->slots), nslabs)));
> -	if (!mem->slots)
> +	if (!mem->slots) {
> +		free_pages((unsigned long)vstart, order);
>  		return -ENOMEM;
> +	}
>  
> -	set_memory_decrypted((unsigned long)tlb, bytes >> PAGE_SHIFT);
> -	swiotlb_init_io_tlb_mem(mem, virt_to_phys(tlb), nslabs, true);
> +	set_memory_decrypted((unsigned long)vstart, bytes >> PAGE_SHIFT);
> +	swiotlb_init_io_tlb_mem(mem, virt_to_phys(vstart), nslabs, true);
>  
>  	swiotlb_print_info();
>  	return 0;
> -- 
> 2.30.2
> 
> 
> _______________________________________________
> linux-arm-kernel mailing list
> linux-arm-kernel@lists.infradead.org
> http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
> 


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 03:44:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 03:44:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281934.480472 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPFuq-0007XI-Qn; Wed, 02 Mar 2022 03:44:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281934.480472; Wed, 02 Mar 2022 03:44:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPFuq-0007XB-MY; Wed, 02 Mar 2022 03:44:40 +0000
Received: by outflank-mailman (input) for mailman id 281934;
 Wed, 02 Mar 2022 03:44:39 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPFup-0007X1-BP; Wed, 02 Mar 2022 03:44:39 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPFup-00034k-97; Wed, 02 Mar 2022 03:44:39 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPFuo-0004K0-UD; Wed, 02 Mar 2022 03:44:38 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPFuo-0001Kd-Tj; Wed, 02 Mar 2022 03:44:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=LRIPitsiaZb/8HvvMizl8c8S/IMPfIbNpuVq5PGoVZs=; b=oSCmvwE1yUNQbVw+vx0L1OX8m8
	Jy9WPWqpSpwookcOjJ6f6eBpsWqZJbsXz2DNnh2/fJJw31xlGqv2C2PxFvoXvzM0KdzI7mygTmG7l
	Df9DyuLyqvIEjFnLrC0KdpJE9VggBXe35dn0r2dt2rj3PCJ9DL5w9222VLjOSflKOjAE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168316-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168316: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=dc39554d58af4a50b50eca1f57c49415a12b0c98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 02 Mar 2022 03:44:38 +0000

flight 168316 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168316/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 dc39554d58af4a50b50eca1f57c49415a12b0c98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    1 days
Failing since        168258  2022-03-01 01:55:31 Z    1 days   13 attempts
Testing same since   168316  2022-03-02 02:50:20 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit dc39554d58af4a50b50eca1f57c49415a12b0c98
Author: Xiaolu.Jiang <xiaolu.jiang@intel.com>
Date:   Tue Feb 22 22:14:05 2022 +0800

    edk2/MdeModulePkg/Debuglib: Add Standalone MM support
    
    https://bugzilla.tianocore.org/show_bug.cgi?id=3844
    
    This change added Standalone MM instance of DebugLib.
    
    Reviewd-by: Jian J Wang <jian.j.wang@intel.com>
    Reviewd-by: Liming Gao <gaoliming@byosoft.com.cn>
    
    Signed-off-by: Xiaolu.Jiang <xiaolu.jiang@intel.com>

commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 05:24:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 05:24:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281950.480489 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPHTU-0002iu-Gv; Wed, 02 Mar 2022 05:24:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281950.480489; Wed, 02 Mar 2022 05:24:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPHTU-0002in-DL; Wed, 02 Mar 2022 05:24:32 +0000
Received: by outflank-mailman (input) for mailman id 281950;
 Wed, 02 Mar 2022 05:24:31 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPHTT-0002id-L3; Wed, 02 Mar 2022 05:24:31 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPHTT-0005FB-JI; Wed, 02 Mar 2022 05:24:31 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPHTT-0001O0-2w; Wed, 02 Mar 2022 05:24:31 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPHTT-000132-2N; Wed, 02 Mar 2022 05:24:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=5qRvCfzIcMDNCnEYrFU/GRKlxVG38hIAur9AUSdc6t0=; b=JKOV/iGrExkmZy4Ic8q7fiINzF
	27fNFxJhLyJMi9ueu+201ZAzllU33WmwN+r9yyCqwGO/ZuYmOSpFCtZ1NqIN+NQLRFXwyAtcb45S+
	0/fqLmzXip+7zUEqxPX2UXCT77pMZVQkZcn48HJai5dadSbPlKNS8PaZ3ZgjZMl0Oda0=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168313-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168313: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=faecea18d252f97c6ad41f0f457566ff2c125b8d
X-Osstest-Versions-That:
    xen=0c18fb76323bfb13615b6f13c98767face2d8097
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 02 Mar 2022 05:24:31 +0000

flight 168313 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168313/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  faecea18d252f97c6ad41f0f457566ff2c125b8d
baseline version:
 xen                  0c18fb76323bfb13615b6f13c98767face2d8097

Last test of basis   168305  2022-03-01 20:01:41 Z    0 days
Testing same since   168313  2022-03-02 01:00:26 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Julien Grall <jgrall@amazon.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   0c18fb7632..faecea18d2  faecea18d252f97c6ad41f0f457566ff2c125b8d -> smoke


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 06:19:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 06:19:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281966.480512 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPIL0-0000iU-PR; Wed, 02 Mar 2022 06:19:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281966.480512; Wed, 02 Mar 2022 06:19:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPIL0-0000iN-LG; Wed, 02 Mar 2022 06:19:50 +0000
Received: by outflank-mailman (input) for mailman id 281966;
 Wed, 02 Mar 2022 06:19:49 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPIKz-0000iD-T3; Wed, 02 Mar 2022 06:19:49 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPIKz-0006EQ-O5; Wed, 02 Mar 2022 06:19:49 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPIKz-0004Gs-BB; Wed, 02 Mar 2022 06:19:49 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPIKz-00053d-9b; Wed, 02 Mar 2022 06:19:49 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=rVOWcl2q8aVzShaskv0CIcGJPtiCCrsoEwn+e9FFkCQ=; b=iEzYg/8Xm6KYjIkwflQoNFj0el
	snsmauLxW+m3k/Ay0ww6mGTqq/c5RI2pY+IJoZ7qydq1wFnBxd6vJXa4UYdVvfT6EmRtdvcpbeb3d
	MqiFwxQhhWrqbwvoRUNRZMMVl4VIuSJUvlLttg8IHkgNv7kj1nismj0rOYbNHC63iemk=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168306-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168306: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl-qemut-debianhvm-amd64:debian-hvm-install:fail:heisenbug
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=575115360652e9920cc56a028a286ebe9bf82694
X-Osstest-Versions-That:
    linux=719fce7539cd3e186598e2aed36325fe892150cf
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 02 Mar 2022 06:19:49 +0000

flight 168306 linux-linus real [real]
flight 168322 linux-linus real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168306/
http://logs.test-lab.xenproject.org/osstest/logs/168322/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-qemut-debianhvm-amd64 12 debian-hvm-install fail pass in 168322-retest

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168256
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168256
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168256
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168256
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168256
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168256
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168256
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168256
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass

version targeted for testing:
 linux                575115360652e9920cc56a028a286ebe9bf82694
baseline version:
 linux                719fce7539cd3e186598e2aed36325fe892150cf

Last test of basis   168256  2022-02-28 21:11:14 Z    1 days
Testing same since   168306  2022-03-01 20:09:49 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  John Paul Adrian Glaubitz <glaubitz@physik.fu-berlin.de>
  Kees Cook <keescook@chromium.org>
  Linus Torvalds <torvalds@linux-foundation.org>
  matoro <matoro_mailinglist_kernel@matoro.tk>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    fail    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   719fce7539cd..575115360652  575115360652e9920cc56a028a286ebe9bf82694 -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 06:43:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 06:43:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281977.480523 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPIhn-0004GM-MA; Wed, 02 Mar 2022 06:43:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281977.480523; Wed, 02 Mar 2022 06:43:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPIhn-0004GF-IH; Wed, 02 Mar 2022 06:43:23 +0000
Received: by outflank-mailman (input) for mailman id 281977;
 Wed, 02 Mar 2022 06:43:22 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=d1LL=TN=arm.com=Wei.Chen@srs-se1.protection.inumbo.net>)
 id 1nPIhm-0004G6-JN
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 06:43:22 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05on20631.outbound.protection.outlook.com
 [2a01:111:f400:7e1a::631])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 0b7c6f8d-99f4-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 07:43:19 +0100 (CET)
Received: from DB6PR0501CA0025.eurprd05.prod.outlook.com (2603:10a6:4:67::11)
 by HE1PR0801MB1769.eurprd08.prod.outlook.com (2603:10a6:3:7f::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.13; Wed, 2 Mar
 2022 06:43:16 +0000
Received: from DB5EUR03FT045.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:4:67:cafe::31) by DB6PR0501CA0025.outlook.office365.com
 (2603:10a6:4:67::11) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.13 via Frontend
 Transport; Wed, 2 Mar 2022 06:43:15 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT045.mail.protection.outlook.com (10.152.21.164) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Wed, 2 Mar 2022 06:43:15 +0000
Received: ("Tessian outbound 31aeb3346a45:v113");
 Wed, 02 Mar 2022 06:43:15 +0000
Received: from ef8bdd70029a.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 DAC707AD-D9F0-4A1F-A313-F4E4AAD9E3ED.1; 
 Wed, 02 Mar 2022 06:43:09 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id ef8bdd70029a.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Wed, 02 Mar 2022 06:43:09 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com (2603:10a6:102:2b9::9)
 by PAXPR08MB7123.eurprd08.prod.outlook.com (2603:10a6:102:206::24)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.22; Wed, 2 Mar
 2022 06:43:07 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa]) by PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa%4]) with mapi id 15.20.5038.014; Wed, 2 Mar 2022
 06:43:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0b7c6f8d-99f4-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=d99pwRro3QOML7H0OZ9ZmZKoZLCKgq75MfxSO1ypTIc=;
 b=bMIbnnA/1iEuqO9RMl0klONqFIBUcQQvexJOa4B5JytKliIBff2aJYs+SP/Jeh9RLMUhdA344ylZlkhv4ABHIPMkhCrm/FBr54dFAzMkaauKShNciKyNfjbgy6GL3+JPwXmlFTX/QJglUYr+vmDscP/b5mRalMm6FGUel8DINCM=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=mJ31Zr5tlO4GjpLCRY0MG43XWDBc5Rm+yZ7qYHTzAbtGG3Sx+s40oroxIYC5B/NcvBBopuIGEEBYCrMEs9q0ATwQ9PWavK5B+uTePAqLY9qHdM+vcdJPfchxhJodnN7MfRelV35oz9H0XG2BpmaMy/iqbgcDZSAE0iXn+JVQ7Uf0IT1AHxALK6aFC3GJVpO2UmRR2N3xVm90O6lYAurX3dqZ4CZ9yFCo/63xI7GtFx2l3zG49yqfAaOUpS8A1CdNIRYtiTaMH5wnQRR3g+CArYm2lU/7jeVtVRw3KrwYS4PXJ0TP726zdU05dnf3oGcRTcltTU6wzqFIr3n602kWIg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=d99pwRro3QOML7H0OZ9ZmZKoZLCKgq75MfxSO1ypTIc=;
 b=Taa62mw1uAvC6djQ5JTvbH6wAGy4uIZyptOkjVWs1Q7OFds+NwX1ZMp1PaH/aRVpcnKG0oDm/VuHnkMtT/iUiNYCoz9qZ/fpwmUy4sFNXlhUVITm9edbGut+cj5PnOZ3AhCF2sk80KfyCDNo2CN+vYvpFPWZfJ9M0ctGzzdc/dnKIltB1HtjIsXuO8x74lEXXnHQ4URjBZhsOBzY992j+TWbSyktZ3P/xoiegyrUsZN+Efn7I6nazeCSpxba8BzLxjM16efZZr5VqPlPoOMbe75fRzqpA1jc0JIMUmfTrjHi+34leS/wzgw6FCQKaVHe9HcmM602XMltf7q+/rMrXA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=d99pwRro3QOML7H0OZ9ZmZKoZLCKgq75MfxSO1ypTIc=;
 b=bMIbnnA/1iEuqO9RMl0klONqFIBUcQQvexJOa4B5JytKliIBff2aJYs+SP/Jeh9RLMUhdA344ylZlkhv4ABHIPMkhCrm/FBr54dFAzMkaauKShNciKyNfjbgy6GL3+JPwXmlFTX/QJglUYr+vmDscP/b5mRalMm6FGUel8DINCM=
From: Wei Chen <Wei.Chen@arm.com>
To: Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	Bertrand Marquis <Bertrand.Marquis@arm.com>, Penny Zheng
	<Penny.Zheng@arm.com>, Henry Wang <Henry.Wang@arm.com>, nd <nd@arm.com>
Subject: RE: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Topic: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Index:
 AdgpQxtXwh7LkfydTgiYk9bhMgU+ogAn0mUAABEK2UAAF1ylAACsO9YwAA5uZgAAI3g7sA==
Date: Wed, 2 Mar 2022 06:43:06 +0000
Message-ID:
 <PAXPR08MB7420B367FFEB4FD3A7C88EB79E039@PAXPR08MB7420.eurprd08.prod.outlook.com>
References:
 <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2202241606450.239973@ubuntu-linux-20-04-desktop>
 <AS1PR08MB74269923288B75097392BDD99E3E9@AS1PR08MB7426.eurprd08.prod.outlook.com>
 <4c558f8f-56d4-0445-32d4-169bc5d0a3bc@xen.org>
 <PAXPR08MB74200F4B0B4EFFD5BE1A6E699E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <7260f050-9022-4adf-618b-a8b271aca8c3@xen.org>
In-Reply-To: <7260f050-9022-4adf-618b-a8b271aca8c3@xen.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 32B2944F5526F64A92C3528439773948.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 2842dfa8-c121-4c6d-1408-08d9fc17edf5
x-ms-traffictypediagnostic:
	PAXPR08MB7123:EE_|DB5EUR03FT045:EE_|HE1PR0801MB1769:EE_
X-Microsoft-Antispam-PRVS:
	<HE1PR0801MB1769A881ED925A4960DBBDB09E039@HE1PR0801MB1769.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 KiXgAiG9pXI4YVQjM4OCmkUhKHIdWTlZfwlfQwpJRKDe2bwXdn0fv19FWWGQyv5IQ4zbnL51Rkf81BWIGBSrJt/0PWQrHdT//Z4M3Pguuk4OuEfQw0WSqO82lsR9F3Y72RcAt0I+ZllskTNC6E25gn3zI5fpRvVtbOI5EfdtyBh0QaBAcG5vyVEoNOzJZwXGVXsaSNOZCSkVcAMfMusEu1xjpY4ZirNEJD17OgV3B37flaxnTkUjpbIFoAgQNfWZcyTPzu10XwzZDrunMfjuktFG/TvPILRbnZ7RVUbtT4cfPSuOeY/2w0oFoEn64+miuCOf0l5taKTJAnBtUIZhZf94Qp2lUv8gn/MyrNTI7JPUUtSLvtjT1YE8e5Z0FHBxdd+29U93tEhfmFDLbWLANTpMH99KsAfy0dwKMtgQmYQPUgu+a6aSQVEIbZ1C/p7yr9bo3pDJl0l9ugxnq80Tf3zB+/ii8lK4X9yejGWnL3vp+fCxY9h6g2ibzuiiGT3977DCNQk8/GagnrVmTLDJuwJF5CG5k4FXSa3oK8OecX6NBygiz8yZQBBJ7faSFFPnkrNXX+c2WR2DtHt9Rn820zZyQy6L9wzoWIrJ8XXSa3sdUl4iFnBIJY0AXpWtPRT928zSKiJnxXPwRtIz1EoYTY/2S5ovH5Oe4V/WetX/eWc/Fc/LYTLN0PwUwYZeyGzdFwXQBQoq2WOTTt93cU0Apw==
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAXPR08MB7420.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(54906003)(8936002)(5660300002)(110136005)(186003)(26005)(52536014)(66476007)(66556008)(64756008)(76116006)(66946007)(71200400001)(33656002)(508600001)(66446008)(122000001)(38070700005)(6506007)(53546011)(7696005)(38100700002)(55016003)(4326008)(316002)(8676002)(2906002)(83380400001)(9686003)(86362001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB7123
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT045.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	3932a1f5-edf3-4c9f-3da7-08d9fc17e8fa
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(110136005)(316002)(8936002)(52536014)(4326008)(8676002)(5660300002)(2906002)(26005)(54906003)(40460700003)(86362001)(508600001)(70206006)(70586007)(36860700001)(55016003)(9686003)(7696005)(53546011)(356005)(81166007)(6506007)(33656002)(82310400004)(336012)(47076005)(83380400001)(186003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 06:43:15.6344
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 2842dfa8-c121-4c6d-1408-08d9fc17edf5
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT045.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0801MB1769
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From xen-devel-bounces@lists.xenproject.org Wed Mar 02 07:14:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 07:14:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281986.480534 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPJBa-0008Du-4d; Wed, 02 Mar 2022 07:14:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281986.480534; Wed, 02 Mar 2022 07:14:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPJBa-0008Dn-1S; Wed, 02 Mar 2022 07:14:10 +0000
Received: by outflank-mailman (input) for mailman id 281986;
 Wed, 02 Mar 2022 07:14:08 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=d1LL=TN=arm.com=Wei.Chen@srs-se1.protection.inumbo.net>)
 id 1nPJBY-0008Df-9M
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 07:14:08 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on2060b.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::60b])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 57400dca-99f8-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 08:14:04 +0100 (CET)
Received: from AS9PR0301CA0049.eurprd03.prod.outlook.com
 (2603:10a6:20b:469::24) by DB6PR0801MB2086.eurprd08.prod.outlook.com
 (2603:10a6:4:7a::11) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Wed, 2 Mar
 2022 07:14:01 +0000
Received: from VE1EUR03FT029.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:469:cafe::f8) by AS9PR0301CA0049.outlook.office365.com
 (2603:10a6:20b:469::24) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.13 via Frontend
 Transport; Wed, 2 Mar 2022 07:14:00 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT029.mail.protection.outlook.com (10.152.18.107) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Wed, 2 Mar 2022 07:14:00 +0000
Received: ("Tessian outbound 341d209a0e52:v113");
 Wed, 02 Mar 2022 07:13:59 +0000
Received: from 14b013f39f5a.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 0F37C026-B26F-4748-A949-738663332DE7.1; 
 Wed, 02 Mar 2022 07:13:49 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 14b013f39f5a.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Wed, 02 Mar 2022 07:13:49 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com (2603:10a6:102:2b9::9)
 by AM6PR08MB4949.eurprd08.prod.outlook.com (2603:10a6:20b:ee::25)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.25; Wed, 2 Mar
 2022 07:13:45 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa]) by PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa%4]) with mapi id 15.20.5038.014; Wed, 2 Mar 2022
 07:13:45 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 57400dca-99f8-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=R+GuZmXQOOI8FRMFGhDAIngXggNyEjE1zTaEpblgAj0=;
 b=0w0MjTtEREJP039zHyU72VBnEJgQnVqUT6laA6twpvzVGf/0tDBcOl1XXfwdHNNI9OjXfXQSH1UuaL3sxe8roy4JETLpSVFBVgi5ITk1aHCOHxTkE4ITrGFzvo+AOrAmtVtvP/1v4zeAZaX/h6t+E1Sju8KU0Dr81jioXiZ+wP4=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=mNZzB6Lu6XRaki0XJDDP50FPR7nA93VkQlTwt4JlDYX/V8FEqIEMX2Z7QVzHUQ8l/l8rIGX8nn1ctY/Q4e7kArCuV/JCrvk0wxstutNKWx2gQSoQXfePlRd7KCNu7OPNfqv2A5LvQGgi5wBLBLzM6B9TGZWSmxuHYahWKMzzs4fNXX3a7TJ79Ax9qLzLx1Ebqk7rFWFfidnex3zlf7rCXFCLU8ePkrXfmAOTCtTbU4NtelhkHdaZtfmWKL2T7FAX7+VjRBXy9QTfOIZnqwpWtq4Tcfbf4fYgxlKnlsHgwodoWKy1Vfl9RS4pzJnvgeNl7kK3gatRFQ6iCuYwi1n4HQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=R+GuZmXQOOI8FRMFGhDAIngXggNyEjE1zTaEpblgAj0=;
 b=gu1ugyg4MKMlxeDPzD3CBejuojtlK2gpz3krNtnxY9xuDtFvMmHhcKgtCQt9A6mE0bWn71XeJQhfMQM3wBt9xOohlMgbRm4tXzAkFarJ71bfy+gDS+8vXqU334rjtJTOj7Z+O623hJhiI/93Y0rTAqc0fuEY6Xguabo6BYdL2y8YCijAG8y1DuQ6Jj3WDT2aIIUq4Xcm7jjK9++097cdG17nrNkDoYltAYcaeRqWFihIFslxrN+SfE2stzN/S7efcfL76KnVqkmVX89tlyMBay/tfuHPWM/bUcqPPTf2L8nw5+w803AOdkMRLsf3wg0Il4zbB2NQOzh35m9jNirkbw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=R+GuZmXQOOI8FRMFGhDAIngXggNyEjE1zTaEpblgAj0=;
 b=0w0MjTtEREJP039zHyU72VBnEJgQnVqUT6laA6twpvzVGf/0tDBcOl1XXfwdHNNI9OjXfXQSH1UuaL3sxe8roy4JETLpSVFBVgi5ITk1aHCOHxTkE4ITrGFzvo+AOrAmtVtvP/1v4zeAZaX/h6t+E1Sju8KU0Dr81jioXiZ+wP4=
From: Wei Chen <Wei.Chen@arm.com>
To: Stefano Stabellini <sstabellini@kernel.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	"julien@xen.org" <julien@xen.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, Penny Zheng <Penny.Zheng@arm.com>, Henry Wang
	<Henry.Wang@arm.com>, nd <nd@arm.com>
Subject: RE: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Topic: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Index:
 AdgpQxtXwh7LkfydTgiYk9bhMgU+ogAn0mUAABEK2UAAHxozAACs/mTQABukuQAADud+gA==
Date: Wed, 2 Mar 2022 07:13:44 +0000
Message-ID:
 <PAXPR08MB74201779FC92E734A5107B769E039@PAXPR08MB7420.eurprd08.prod.outlook.com>
References:
 <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2202241606450.239973@ubuntu-linux-20-04-desktop>
 <AS1PR08MB74269923288B75097392BDD99E3E9@AS1PR08MB7426.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2202251214210.239973@ubuntu-linux-20-04-desktop>
 <PAXPR08MB742081D5E3C94801350C4A739E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2203011455500.3261@ubuntu-linux-20-04-desktop>
In-Reply-To:
 <alpine.DEB.2.22.394.2203011455500.3261@ubuntu-linux-20-04-desktop>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 25CFC8A70C8CA143B8947340CFB2DDD0.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: a964d035-844f-4a53-7d0c-08d9fc1c398b
x-ms-traffictypediagnostic:
	AM6PR08MB4949:EE_|VE1EUR03FT029:EE_|DB6PR0801MB2086:EE_
X-Microsoft-Antispam-PRVS:
	<DB6PR0801MB20860D36FC13F83C264E785B9E039@DB6PR0801MB2086.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAXPR08MB7420.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(26005)(86362001)(38100700002)(9686003)(53546011)(6506007)(83380400001)(186003)(71200400001)(7696005)(38070700005)(122000001)(8936002)(30864003)(4326008)(5660300002)(66476007)(8676002)(64756008)(76116006)(66556008)(66446008)(66946007)(33656002)(55016003)(2906002)(6916009)(54906003)(508600001)(966005)(316002)(52536014)(559001)(579004)(139555002);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4949
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT029.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	7b895621-a288-417d-1c15-08d9fc1c305a
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(8936002)(36860700001)(336012)(186003)(26005)(54906003)(316002)(82310400004)(9686003)(33656002)(7696005)(53546011)(6506007)(70586007)(70206006)(30864003)(52536014)(4326008)(6862004)(5660300002)(8676002)(508600001)(40460700003)(81166007)(55016003)(86362001)(47076005)(966005)(83380400001)(356005)(2906002)(579004)(139555002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 07:14:00.2956
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: a964d035-844f-4a53-7d0c-08d9fc1c398b
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT029.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0801MB2086
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From xen-devel-bounces@lists.xenproject.org Wed Mar 02 07:22:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 07:22:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.281995.480545 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPJJB-0001WH-3O; Wed, 02 Mar 2022 07:22:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 281995.480545; Wed, 02 Mar 2022 07:22:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPJJB-0001WA-0I; Wed, 02 Mar 2022 07:22:01 +0000
Received: by outflank-mailman (input) for mailman id 281995;
 Wed, 02 Mar 2022 07:21:59 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=n2xK=TN=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nPJJ8-0001W3-S3
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 07:21:59 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05on2062a.outbound.protection.outlook.com
 [2a01:111:f400:7e1a::62a])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 70df1c7b-99f9-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 08:21:56 +0100 (CET)
Received: from AM6PR10CA0082.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:209:8c::23)
 by DBBPR08MB4710.eurprd08.prod.outlook.com (2603:10a6:10:f3::23) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Wed, 2 Mar
 2022 07:21:53 +0000
Received: from VE1EUR03FT022.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:8c:cafe::55) by AM6PR10CA0082.outlook.office365.com
 (2603:10a6:209:8c::23) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Wed, 2 Mar 2022 07:21:53 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT022.mail.protection.outlook.com (10.152.18.64) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Wed, 2 Mar 2022 07:21:52 +0000
Received: ("Tessian outbound 826a6d8e58c3:v113");
 Wed, 02 Mar 2022 07:21:52 +0000
Received: from d1d4b9c45f5d.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 A294619C-7D67-443A-AF6F-6AE5ED5F9717.1; 
 Wed, 02 Mar 2022 07:21:51 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id d1d4b9c45f5d.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Wed, 02 Mar 2022 07:21:51 +0000
Received: from DU2PR08MB7325.eurprd08.prod.outlook.com (2603:10a6:10:2e4::7)
 by HE1PR0802MB2474.eurprd08.prod.outlook.com (2603:10a6:3:e2::10) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Wed, 2 Mar
 2022 07:21:39 +0000
Received: from DU2PR08MB7325.eurprd08.prod.outlook.com
 ([fe80::b84f:d66b:13a7:245]) by DU2PR08MB7325.eurprd08.prod.outlook.com
 ([fe80::b84f:d66b:13a7:245%7]) with mapi id 15.20.5017.027; Wed, 2 Mar 2022
 07:21:39 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 70df1c7b-99f9-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Tw+q6GjRMtOYcdH4Q4SF3TG4OIRNlxJCmmtJJHK5DlA=;
 b=J4zE/Gs+1UlIu8Z/FbynXE/wQpIDU/ZNS2GiZ6ETkat8dA8pBtx/3or7EHg8vh4q6cX6KgckFi07JwH1jE4lq4QqNFsYNBz32yXdJllHxNwJHSyZtRa0SV9p+lXUJE/e9QqFC420/6e6ZWjLwkSToJ9HbHBtCCytZUCWVQ8WLaw=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 6dccadcbce57e4f2
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=bhLVn0mVZwjEOUW2c0SFsjfd8fUjKEXKB9JkU8ST7HDhl0j8gwBC2GbDTFNKacesh+A9sGpyL4iZNtD0nWmGRbkCsrRnXiaFyKdrpCbX529K12lPooeqh3gmdgiczB09WGuDpv+JTTNGdK3VKONXjvPKYb+02RDTfS75ZxAbwTYswE3BvIHgFq7AzHiobsEjVZ4yjP1ILJ/u2lRzIrOMlxVZwS7LW5vpEp7MG5OeyR/C9LnoHY9ZH45hZZHxUmW+lmadZQrJDMyTLN7j96UGrUQYiBAmUQ2x/fHykMJaNHufYIcJ/OMBQNajA9izgLOsRizcLLIGCBVzK9Es5RzdoA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Tw+q6GjRMtOYcdH4Q4SF3TG4OIRNlxJCmmtJJHK5DlA=;
 b=MvG6UdvAAeAcFm9U01pa/DJK9fbuNfODtkBBlp/2ObXVXsTaVaJeRA+A+M9+TLmEJHKlgklkZjY3dYG3ZfB6xsRYj+7nWrVliSG7KfauuYxg3H9LBbd2JqfBA3CL9WIJHRbU30GTkobkjKXv4Gu6uhWt2UWEUSwAiZ3VBcAyaGUnADKWitx8MITRek1q37lwVf3cWCxIDjm5AA69FgXUcQas5BoYjr/yULxLHOrdXgbQaaudnAM6hBW0EYttSk+dHXpb6waoOC7H/H2ghsM9mnqwrqWaM6iBBn9APa3QAM54U5rf+B99srjKWRKtfCg8P+5TrlIW+Jk6z3O3idfRVQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Tw+q6GjRMtOYcdH4Q4SF3TG4OIRNlxJCmmtJJHK5DlA=;
 b=J4zE/Gs+1UlIu8Z/FbynXE/wQpIDU/ZNS2GiZ6ETkat8dA8pBtx/3or7EHg8vh4q6cX6KgckFi07JwH1jE4lq4QqNFsYNBz32yXdJllHxNwJHSyZtRa0SV9p+lXUJE/e9QqFC420/6e6ZWjLwkSToJ9HbHBtCCytZUCWVQ8WLaw=
From: Penny Zheng <Penny.Zheng@arm.com>
To: Wei Chen <Wei.Chen@arm.com>, Julien Grall <julien@xen.org>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Stefano
 Stabellini <sstabellini@kernel.org>
CC: Bertrand Marquis <Bertrand.Marquis@arm.com>, Henry Wang
	<Henry.Wang@arm.com>, nd <nd@arm.com>
Subject: RE: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Topic: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Index: AdgpQxtXwh7LkfydTgiYk9bhMgU+ogBRt1sAAKse4VAAMaCKcA==
Date: Wed, 2 Mar 2022 07:21:39 +0000
Message-ID:
 <DU2PR08MB73257F1F8FFB2BF8F3384F66F7039@DU2PR08MB7325.eurprd08.prod.outlook.com>
References:
 <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <04db7e8b-2f04-41d7-1deb-d8bda3625c04@xen.org>
 <PAXPR08MB7420BF1299A1577B98211C1A9E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
In-Reply-To:
 <PAXPR08MB7420BF1299A1577B98211C1A9E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: a6ec88ea-47ec-4d5a-1f49-08d9fc1d531e
x-ms-traffictypediagnostic:
	HE1PR0802MB2474:EE_|VE1EUR03FT022:EE_|DBBPR08MB4710:EE_
X-Microsoft-Antispam-PRVS:
	<DBBPR08MB4710C236F4F5AC30029FFA51F7039@DBBPR08MB4710.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 xMC1Vs7/N7OuM5Uc4+NTD6JxWsjR4uX/BDTfZdzGBbegCuIORxDLbNMsDbGprJMtmo7xQBNR/MdKsu5t9OOoUfufLcWpYqV7Pu4QsOUlXR22JMEMeYjPcBsYdysmIAkAGWKBXnYq+PFIGTSMd1TmZDy5A8TqJiaSUaTegX00OlpcxDHHGPHIsNK9f1E036cT11M5eJxuBw9wOFUGNUwfZTTp1d6AyVvCWC1aYISBB/QzpQdEAC6i4SRW3QiMrR2WIUWYTbsNO11ZaeAr8LQvXTzioIPV+GIJTZWv/mWKA9lqKPl4Qzjlx3CvzUl9pMwSLn+zFIvJGQ1Td/gMg0VMl6lvWv/0E3Hag0ZXMPuNMwFEqC27UZGgo7mSGmdPJ2lGVDTMIbP7FIbFCvZgGUg9oVFfdlHhNJjAMcHWSAgKh0ceZxD7pDNUKMZF38yvXplyeEiHjHQyg27C+Rh6EUYipIZB0YuHmRKwelh7KeEoBr6CX+rUahxNT8npA+lhKsTmQQ+LJtWfVLjf46WsOuaqNdePS3uzGXe/r0FqXLGeDRfpuVS0I8VU51ArJKdAFLtzRzhI5D56bWi7HdbYo5EU24cSbnhKc6k438h5jwOOab3ni6utp43drVomX5EAQ+qYbpHl0Vf7RXgxoDjSK2InWh3NBcFLxuVuiLRYHlRKenIi/t8Vxs5Twc280/kQeQBAGxQcpKXs+/8xVJ3y/5Jqjnmno9VRhjRENHsz5RyChQxmCduemQ62Dugq0b+RegUyV0AlzWfmSXYK7Q39pJnM4g==
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR08MB7325.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(83380400001)(54906003)(110136005)(8936002)(4326008)(71200400001)(76116006)(316002)(66946007)(66556008)(66476007)(66446008)(64756008)(55016003)(33656002)(86362001)(8676002)(52536014)(26005)(186003)(9686003)(38100700002)(30864003)(38070700005)(5660300002)(508600001)(6506007)(7696005)(53546011)(2906002)(122000001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0802MB2474
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT022.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	459cfe3b-188c-4858-ef5f-08d9fc1d4b38
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	Ls/ivsYFzY/cU4Tw8lkcFvgmzSQC9JLf5oMk7e9vH2kztCBgIPNlk3XJCZhV0qJaROeOSUlh/wtz5eOxJzTFjNHAf0NCCgAFm3b2KUCoKe1nsJ0rNZVRXOUf9WVt7rn/62e0yTzD9voWnWWDOg5yrvHosAfZS0lxhXOXLDS/e0p3Th8VGb6rLqtsyv9ekFGzloe7la4BLpIj+PngWMJPZ03Q9cSb8DAQE72ubnWIAwOTXFyU9ragSAOnLoaxLKOeEIMadO8yE//kUM42iKTM1x091vCNc7LeDVLdzrX5TaP5S+eWOFw2k2sxK1p54vhBGexvhDW+CYG+FSZgCveCr9ezDU1m0emH6VDLASXC5wyPwkmyQFB0/EICDhIRMPeSNh+dEOeYOky0L153slFikmqF8ELL3THU/WuGoMqtsuYeP1CRmtEnz5j6OJbyMidxerIpJky2ovmaW/avDU0zfDB4E5BiTwRik0ohBD1jihQbUxN3XjfzBx8A6nB348GAHScNcvoQuI8p6m4u9kwpNHbyiatiQxiL9ustM9t1DuM63EaK5TKwlYQBGGARFZb7FzqlZG//weh/cWXRSjE7/KQC99hCUIektVWRkMBJNU/joCe0hsDM7sDuUhIfNFtT25m6ZV2c0WsaHl/5Ru12I3KVF/0k97XSmEZTYKFRh8fpg95G9hVRJJnWbL5jSQ3ih4kqrYJcl1N1cZW/qEujzP6qI4+3ZFlHffWQzxmBCM7Lu0szcxgsmxR2EHFMxH4cEpqLtuWd/IlqdUsazbPUMg==
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(26005)(336012)(9686003)(356005)(81166007)(86362001)(33656002)(186003)(83380400001)(316002)(110136005)(30864003)(2906002)(54906003)(82310400004)(5660300002)(4326008)(36860700001)(55016003)(508600001)(6506007)(8676002)(70206006)(52536014)(47076005)(7696005)(8936002)(70586007)(40460700003)(53546011);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 07:21:52.6963
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: a6ec88ea-47ec-4d5a-1f49-08d9fc1d531e
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT022.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB4710
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From xen-devel-bounces@lists.xenproject.org Wed Mar 02 07:36:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 07:36:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282004.480555 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPJX2-0003WW-Ew; Wed, 02 Mar 2022 07:36:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282004.480555; Wed, 02 Mar 2022 07:36:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPJX2-0003WP-Bc; Wed, 02 Mar 2022 07:36:20 +0000
Received: by outflank-mailman (input) for mailman id 282004;
 Wed, 02 Mar 2022 07:36:19 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPJX1-0003WF-0h; Wed, 02 Mar 2022 07:36:19 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPJX0-0007Xa-TN; Wed, 02 Mar 2022 07:36:18 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPJX0-00006h-9Q; Wed, 02 Mar 2022 07:36:18 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPJX0-0007k3-7N; Wed, 02 Mar 2022 07:36:18 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=5w0k3nOm44d1NslJDqQUF63MfGVwOFgxhiwXLZV9x88=; b=3Q9YnopX2VHyFqz6R3Dzfl/hZJ
	CAe5CLFHK0jlxFfiGf6r01ysAyf9wQCN8IhbeuRVQKxXvUyiwY1kursDjUIBd029SvxdE3IWSmg9+
	6G5ZuY2ciJpUMCUSEgVrXZh+R/OiYCTD71HbiqDQ7VS8hIZRLe0QgispT67t3Veout9c=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168300-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168300: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-amd64-amd64-dom0pvh-xl-intel:guest-localmigrate:fail:heisenbug
    qemu-mainline:test-armhf-armhf-xl-rtds:guest-start:fail:allowable
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=99c53410bc9d50e556f565b0960673cccb566452
X-Osstest-Versions-That:
    qemuu=a8d39f5b5ae899b1c872f128f82959158cfce048
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 02 Mar 2022 07:36:18 +0000

flight 168300 qemu-mainline real [real]
flight 168325 qemu-mainline real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168300/
http://logs.test-lab.xenproject.org/osstest/logs/168325/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-dom0pvh-xl-intel 18 guest-localmigrate fail pass in 168325-retest

Regressions which are regarded as allowable (not blocking):
 test-armhf-armhf-xl-rtds     14 guest-start              fail REGR. vs. 168289

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168289
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168289
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168289
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168289
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168289
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168289
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168289
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168289
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 qemuu                99c53410bc9d50e556f565b0960673cccb566452
baseline version:
 qemuu                a8d39f5b5ae899b1c872f128f82959158cfce048

Last test of basis   168289  2022-03-01 11:07:45 Z    0 days
Testing same since   168300  2022-03-01 17:39:30 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  David Miller <dmiller423@gmail.com>
  Fabian Holler <fabian.holler@simplesurance.de>
  Greg Kurz <groug@kaod.org>
  Halil Pasic <pasic@linux.ibm.com>
  John Snow <jsnow@redhat.com>
  Markus Armbruster <armbru@redhat.com>
  Nico Boehr <nrb@linux.ibm.com>
  Peter Maydell <peter.maydell@linaro.org>
  Thomas Huth <thuth@redhat.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            fail    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   a8d39f5b5a..99c53410bc  99c53410bc9d50e556f565b0960673cccb566452 -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 08:08:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 08:08:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282024.480567 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPK1Z-0007yz-6Z; Wed, 02 Mar 2022 08:07:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282024.480567; Wed, 02 Mar 2022 08:07:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPK1Z-0007ys-38; Wed, 02 Mar 2022 08:07:53 +0000
Received: by outflank-mailman (input) for mailman id 282024;
 Wed, 02 Mar 2022 08:07:52 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=rYeN=TN=lst.de=hch@srs-se1.protection.inumbo.net>)
 id 1nPK1X-0007ym-Vb
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 08:07:51 +0000
Received: from verein.lst.de (verein.lst.de [213.95.11.211])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id da8fb3f7-99ff-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 09:07:50 +0100 (CET)
Received: by verein.lst.de (Postfix, from userid 2407)
 id F380B68AFE; Wed,  2 Mar 2022 09:07:46 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: da8fb3f7-99ff-11ec-8539-5f4723681683
Date: Wed, 2 Mar 2022 09:07:46 +0100
From: Christoph Hellwig <hch@lst.de>
To: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Cc: Christoph Hellwig <hch@lst.de>, iommu@lists.linux-foundation.org,
	x86@kernel.org, Anshuman Khandual <anshuman.khandual@arm.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org, linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org, tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: Re: [PATCH 07/11] x86: remove the IOMMU table infrastructure
Message-ID: <20220302080746.GA23075@lst.de>
References: <20220227143055.335596-1-hch@lst.de> <20220227143055.335596-8-hch@lst.de> <Yh5j5q5n/GyU0/1n@0xbeefdead.lan>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <Yh5j5q5n/GyU0/1n@0xbeefdead.lan>
User-Agent: Mutt/1.5.17 (2007-11-01)

On Tue, Mar 01, 2022 at 01:20:22PM -0500, Konrad Rzeszutek Wilk wrote:
> I think you also need to check for IBM Calgary?

The IBM Calgary IOMMU support is long gone.


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 08:10:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 08:10:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282030.480578 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPK4O-0000vu-Kj; Wed, 02 Mar 2022 08:10:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282030.480578; Wed, 02 Mar 2022 08:10:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPK4O-0000vn-HR; Wed, 02 Mar 2022 08:10:48 +0000
Received: by outflank-mailman (input) for mailman id 282030;
 Wed, 02 Mar 2022 08:10:47 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=cGAx=TN=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPK4N-0000vh-CI
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 08:10:47 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4297d0a7-9a00-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 09:10:45 +0100 (CET)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04lp2059.outbound.protection.outlook.com [104.47.13.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-39-dneQYi25NdGpaypgy7WPXg-1; Wed, 02 Mar 2022 09:10:43 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB8PR04MB6444.eurprd04.prod.outlook.com (2603:10a6:10:102::20)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Wed, 2 Mar
 2022 08:10:42 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Wed, 2 Mar 2022
 08:10:42 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4297d0a7-9a00-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646208644;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=YxYYx4qSTYeI5IcFW5GReI7x1E1NMhFusMjW6vzmXSE=;
	b=KJnnCFr06QfgHbtHtfkuxgsrmtf4Za5kLnY578XpdrxljA+Csq3jkiHHNCJcHglXaNhoK4
	LUIjiI4YKKL/4tdmaRmDpVLTKEK77jPRxUg0AakAE95GxxNuvVOoCpUuQgxQYcRn1NiMhe
	4h4CrPXDvzRz9JSq3Sa/Wdk9bQMhiD4=
X-MC-Unique: dneQYi25NdGpaypgy7WPXg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=KHpnm1KTGSWq6AYPuy9F9SMhI+NwGszJpXpVoyOjNZISkvQsdK4l6goM4JFp5hcj4Tkx8hj7CXiTBZuN78SjUCD6tbrAE1/sZPGNiygXkCC6BRYvWvi1GZxIk1JnyO8LFXvrxEQBGkv5YKV78qtzrfQEQAkZzesmm7QtkkHlEN+EqZHkfJhhUtt1Hwax7sCBP93grNBAR/ajWX1HFUX2TUy+zOi8/zePdWD/nfzJPQgk1VZToGdqxEZiHlPO17AsbRqNhhf/JkppvePAUiYMibFAarornrBfBorY1a0PcmCCyI3KhWV2IJg1dscAMZPp1cP//xUF22DKQk2PcEl5JQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=YxYYx4qSTYeI5IcFW5GReI7x1E1NMhFusMjW6vzmXSE=;
 b=XpIxGTpTJ5o0GSrVeThD4+7625JzfxmPcN/MmYiLLiB04nkZPa/yf/qOzJSRfh0H/suWttE/bQJBIUu8N8T3slD2Lk7kepui8FPZwCnQ+dNUtjQ3wEpAXhSd84S13EUTNM6syTUmdvZk1IeARyXjnXKc9AbKqublK7+B/jAbv4AWXJzcl0zvp3Y6u/CqeXoOn1qjG7jVo6YfvbjXO3bBbICQMGRt4kKuv/yOmbb76zXDKdRmryBL/ldKdKsT9SKVhV3hAdysxXrzZDpaDE9KyvJj06guXCWaFDtNZnKaQXiNHY0YDJ0yf3mpJ8yiS6CIhONz6BuA9OA8tpGlONatLA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <60f3c942-3822-87dd-df6e-8b64ed4d17c4@suse.com>
Date: Wed, 2 Mar 2022 09:10:40 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v2.2 8/7] x86/IOMMU: Use altcall, and
 __initconst_cf_clobber
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
Cc: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <20220214125632.24563-1-andrew.cooper3@citrix.com>
 <20220222114711.19209-1-andrew.cooper3@citrix.com>
 <e8b71b3a-55a0-31a2-b2ab-3b2470680709@suse.com>
 <5fae516a-17c1-0ce4-c46e-909a83c0e273@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <5fae516a-17c1-0ce4-c46e-909a83c0e273@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6PR04CA0037.eurprd04.prod.outlook.com
 (2603:10a6:20b:f0::14) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 1ff42c47-9d7e-4d48-0f90-08d9fc2424f1
X-MS-TrafficTypeDiagnostic: DB8PR04MB6444:EE_
X-Microsoft-Antispam-PRVS:
	<DB8PR04MB64443F2EC0087BE0978364C5B3039@DB8PR04MB6444.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(38100700002)(86362001)(66476007)(66556008)(8676002)(66946007)(36756003)(5660300002)(4326008)(316002)(6916009)(54906003)(31686004)(2906002)(8936002)(2616005)(186003)(26005)(53546011)(31696002)(83380400001)(508600001)(6486002)(6512007)(6506007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?enMwMDNyNkFRd1NWSUlpK1RaZkkwWFE2Z01reVFPYjBCUUFBcWxzbEdVVVM4?=
 =?utf-8?B?SGkrZlNBejlJSmtlTjBwdEVVTjlSbjY3bytsL2pDWDVDc1BmQWdTTXAzUFhY?=
 =?utf-8?B?N3pwem15MHE2djJiVis5YmY3dDN2eDQ3cmlMdEtreHNHczdNemJjQWs0S2w2?=
 =?utf-8?B?cVRORWdqRDVqWW95ekt0ZmpHd0RyeE9sWVRpVHFkQmZJMHVoVklnOWJPK21l?=
 =?utf-8?B?RE1zTXovcVEzTDF4bWdVSEl0VktpYWgrdk9aNnJ5QVRaNTg4WGdRdmJUaEZT?=
 =?utf-8?B?NkxNTDJjZFlyR0RHU2R6cGZkbkZFSURQeFBHdVlGczJXaDd4b0ZZYVNHVHR2?=
 =?utf-8?B?R3pwaUNacngyTjZORnhDa0tKNDhYUUNrUHJaWjdlRmVhdTltZDFYT09BNmls?=
 =?utf-8?B?M3FQNlRPcDZKakZVVlJ6NVVtaHYrNC9MNUF1UVZTeFMrT3JsK0FnSDM3TkNp?=
 =?utf-8?B?dy84NnFpQjVMdnFha2lLRDQxS0IrMk1SYzIrYkJDMWdkdTREa0JpNlhTQ00y?=
 =?utf-8?B?aU1oU1lETXhKMWd1VXpXSEFqdmpxdHJ5VzduV1VIYUlYQnEzUkdVQlpoR1lZ?=
 =?utf-8?B?TVA1ZkVyNVNBaWxsTTliWnhMV08xWFFGSi8rY0hzL1Vhb0FSb1FwL1MxVE95?=
 =?utf-8?B?U1ZkUmdYSU9aWGJyWjhMUnRaL1NaNWZsMkx5ZVNUV1l4U05hRFJjUkxFY2Jo?=
 =?utf-8?B?ZnNtcXA4c3pQV1h3S0tmSkY5dlJyK0taeVlZRGJKWFg5RHVhWCt3OGNKOGVJ?=
 =?utf-8?B?UWdjeGREUWlqakQ0VFczNnZkT3NDZFhVYnNzcFVmblRZaEc5emZqRlpwZnBW?=
 =?utf-8?B?Wko5RXR1TTZSR3kxMkYveGtxQWlQSnZpOVlQbFRZbjEwZ01iOHN4NkwzTjNL?=
 =?utf-8?B?ZzU0V2ozblNGbExGdy9yb2RjVzdrZGNFWjM5T3UwTmdXbFZQUkJWVmNyeEM2?=
 =?utf-8?B?UWtvTHBKeEJyQWRtM0V2ejV4U1JucVBkMmIrQVVSVXBCRUd2RVhsMXFGczB0?=
 =?utf-8?B?TWx6UFdpRzdCSjNJRkRadU04b3VleGd4blhXU0dvU3F3djUrdkxuS3B1cXRh?=
 =?utf-8?B?aldhQXJjMmJIS2paaWZPUW04cFR6clJ2ZnJzbmNxY2djS1ZaVlU0dytocWs4?=
 =?utf-8?B?M0ZRSm1vOEVZR1U4Tlk3WkpPV1ZQakhrNzQzRDRFT2tEZ21mblNpYlo3bEYv?=
 =?utf-8?B?bDNzcndFNlFvdGRmbGhSMTRkUDk4eTJSMVhldmZ3MlJjVGpMMFA0VEtIY1l1?=
 =?utf-8?B?bHRlTkJva2IycGlTQ2x3TXR5Wm4vMkxZRDlVK2g1c3dCa0duTmwyYTZuZVdX?=
 =?utf-8?B?TGNPL1Yrc2pxZGhHQUpWa2E1RENxbWFoNzNJZlgvSlNkOXAyenIzOFZSQ1ho?=
 =?utf-8?B?Z0Zmb3RGNkYxMjkyRjJvQjhDQlFESFk1T25Bd3hUVVZYUVh4TmJNL2oxaU9r?=
 =?utf-8?B?cFg5RFl3UGNVSHpoTS9Ed1B2Y0t2YTArcERqM1lOeDFoTnJSZDdadFE3Z014?=
 =?utf-8?B?K1FaMXpwUU4vbmdOMjIzTW1xYTh3S3NrV3FEK2dCcUM5ajVvM05Gak1hdms3?=
 =?utf-8?B?TzMrU2ZBd25tYVpzcWh5aTJHaVhmT2tXa0l6NE9SWFY5SHhOeUloKzhaZ0Fn?=
 =?utf-8?B?Zkc2V1ppK0VERURNWDBadFR5Q1VBelFzc3dFeUZDNXhpYXBhYXJ4RTVzck1Z?=
 =?utf-8?B?bC85cFczb2RSWC9Qekh6c1htQ3BJc1pvcXpldjBuZGN6OExXODJaeVVYY1Ba?=
 =?utf-8?B?TlF1VjJsU0NMbFowdjZVMXd5OGJJY3hYZFZRQTI0amNUckJvNktGR1BBYm9G?=
 =?utf-8?B?Z1JscTVWZ08rL2lRdWRQVzhaMmZQaks0OGlPemRrYXdGZHNlMkNoN3BkOGxv?=
 =?utf-8?B?UFExUVNKRm9RSFZDeFo0NWh4OVMrb0JnYmJWS0U4TE9LS01JM1JtQWQxbm4x?=
 =?utf-8?B?SmJkckFOdjlCZVd4UC9UeGtVWlFieTh4a1V3UWlNeFdrcTRLZVdkWGZMODQ5?=
 =?utf-8?B?T3YvWFExamlxTDcyN0ZZUWNoeHBoYndPNUY0NWhpeVNYcmVqRkFLMnZSVEFS?=
 =?utf-8?B?SlBkaVYrSi9xSysxVDc1MjJ2a25ja0h1ZVR6cjBnK2p3aVlzWTNOdTF5MzJp?=
 =?utf-8?B?MlBVY0VRbjgyN2lEUlkxakxjT0lhQU5BcmE0YzVkdFJTUXNGbi9pZjlMZGhS?=
 =?utf-8?Q?InD/gLOuK0IBvKBpnMB0Saw=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1ff42c47-9d7e-4d48-0f90-08d9fc2424f1
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 08:10:42.1873
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: FN91kbL4ZCZlkafdZJYiNuY6IdhF4nlOoeVYJRroazkymhm2HyVXq2ZX0cW2PqbJEDQg5Yn3nnY8Ine2/Ac0cQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR04MB6444

On 01.03.2022 15:58, Andrew Cooper wrote:
> On 25/02/2022 08:24, Jan Beulich wrote:
>> On 22.02.2022 12:47, Andrew Cooper wrote:
>>> --- a/xen/drivers/passthrough/amd/pci_amd_iommu.c
>>> +++ b/xen/drivers/passthrough/amd/pci_amd_iommu.c
>>> @@ -628,7 +628,7 @@ static void cf_check amd_dump_page_tables(struct domain *d)
>>>                                hd->arch.amd.paging_mode, 0, 0);
>>>  }
>>>  
>>> -static const struct iommu_ops __initconstrel _iommu_ops = {
>>> +static const struct iommu_ops __initconst_cf_clobber _iommu_ops = {
>> Following my initcall related remark on x86'es time.c I'm afraid I don't
>> see how this and ...
>>
>>> @@ -2794,7 +2793,7 @@ static int __init cf_check intel_iommu_quarantine_init(struct domain *d)
>>>      return rc;
>>>  }
>>>  
>>> -static struct iommu_ops __initdata vtd_ops = {
>>> +static const struct iommu_ops __initconst_cf_clobber vtd_ops = {
>> ... this actually works. But I guess I must be overlooking something, as
>> I'm sure that you did test the change.
>>
>> Both ops structures reference a function, through .adjust_irq_affinities,
>> which isn't __init but which is used (besides here) for an initcall. With
>> the ENDBR removed by the time initcalls are run, these should cause #CP.
> 
> This doesn't explode because the indirect calls are resolved to direct
> calls before the ENDBR's are clobbered to NOP4.

I'm afraid I don't understand: The problematic call is in do_initcalls():

    for ( call = __presmp_initcall_end; call < __initcall_end; call++ )
        (*call)();

I don't see how this could be converted to a direct call.

Afaics only pre-SMP initcalls are safe in this regard: do_presmp_initcalls()
is called immediately ahead of alternative_branches().

Isn't this (previously?) working related to your "x86/spec-ctrl: Disable
retpolines with CET-IBT"? With full retpoline, there wouldn't be an
indirect branch, but RET. But with JMP or LFENCE thunks this ought to
fault (already before depending on thunk selection, but unconditionally
now that your change was committed), I would think.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 08:15:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 08:15:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282040.480588 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPK8c-0001dm-B3; Wed, 02 Mar 2022 08:15:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282040.480588; Wed, 02 Mar 2022 08:15:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPK8c-0001df-7d; Wed, 02 Mar 2022 08:15:10 +0000
Received: by outflank-mailman (input) for mailman id 282040;
 Wed, 02 Mar 2022 08:15:09 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=rYeN=TN=lst.de=hch@srs-se1.protection.inumbo.net>)
 id 1nPK8b-0001dZ-JU
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 08:15:09 +0000
Received: from verein.lst.de (verein.lst.de [213.95.11.211])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id df9e52f2-9a00-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 09:15:08 +0100 (CET)
Received: by verein.lst.de (Postfix, from userid 2407)
 id 527A368BEB; Wed,  2 Mar 2022 09:15:01 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: df9e52f2-9a00-11ec-8539-5f4723681683
Date: Wed, 2 Mar 2022 09:15:00 +0100
From: Christoph Hellwig <hch@lst.de>
To: Stefano Stabellini <sstabellini@kernel.org>
Cc: Christoph Hellwig <hch@lst.de>, iommu@lists.linux-foundation.org,
	x86@kernel.org, Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org, linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org, tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: Re: [PATCH 11/12] swiotlb: merge swiotlb-xen initialization into
 swiotlb
Message-ID: <20220302081500.GB23075@lst.de>
References: <20220301105311.885699-1-hch@lst.de> <20220301105311.885699-12-hch@lst.de> <alpine.DEB.2.22.394.2203011720150.3261@ubuntu-linux-20-04-desktop>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <alpine.DEB.2.22.394.2203011720150.3261@ubuntu-linux-20-04-desktop>
User-Agent: Mutt/1.5.17 (2007-11-01)

On Tue, Mar 01, 2022 at 06:55:47PM -0800, Stefano Stabellini wrote:
> Unrelated to this specific patch series: now that I think about it, if
> io_tlb_default_mem.nslabs is already allocated by the time xen_mm_init
> is called, wouldn't we potentially have an issue with the GFP flags used
> for the earlier allocation (e.g. GFP_DMA32 not used)? Maybe something
> for another day.

swiotlb_init allocates low memory from meblock, which is roughly
equivalent to GFP_DMA allocations, so we'll be fine.

> > @@ -143,10 +141,15 @@ static int __init xen_mm_init(void)
> >  	if (!xen_swiotlb_detect())
> >  		return 0;
> >  
> > -	rc = xen_swiotlb_init();
> >  	/* we can work with the default swiotlb */
> > -	if (rc < 0 && rc != -EEXIST)
> > -		return rc;
> > +	if (!io_tlb_default_mem.nslabs) {
> > +		if (!xen_initial_domain())
> > +			return -EINVAL;
> 
> I don't think we need this xen_initial_domain() check. It is all
> already sorted out by the xen_swiotlb_detect() check above.

Is it?

static inline int xen_swiotlb_detect(void)
{
	if (!xen_domain())
		return 0;
	if (xen_feature(XENFEAT_direct_mapped))
		return 1;
	/* legacy case */
	if (!xen_feature(XENFEAT_not_direct_mapped) && xen_initial_domain())
		return 1;
	return 0;
}

I think I'd keep it as-is for now, as my planned next step would be to
fold xen-swiotlb into swiotlb entirely.


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 08:30:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 08:30:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282048.480602 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPKNV-0004Mf-NF; Wed, 02 Mar 2022 08:30:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282048.480602; Wed, 02 Mar 2022 08:30:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPKNV-0004MY-KE; Wed, 02 Mar 2022 08:30:33 +0000
Received: by outflank-mailman (input) for mailman id 282048;
 Wed, 02 Mar 2022 08:30:32 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPKNU-0004MN-34; Wed, 02 Mar 2022 08:30:32 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPKNT-0000Zw-W3; Wed, 02 Mar 2022 08:30:31 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPKNT-0003Bd-KW; Wed, 02 Mar 2022 08:30:31 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPKNT-0000pI-I4; Wed, 02 Mar 2022 08:30:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Cn7cXvYD0PUPe49CMJjCvLPKTdDgAlMschvZ58nB5Cc=; b=N6+MoqAe5M7POOyYeedzvp287q
	ZnPhG278hLbDkpndbIKsCseoxJyR88Y47gyC9mk0Gw2pUemf9nUIQBmaq5Yct2k6GHitV7zLBHiTj
	Ho3PtvL16/Ld41Zi01kagGA41QWiEmdWzNDH1fvExDvP4+ErNFAlF1EL8nSU2Y6DcBNs=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168315-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [seabios test] 168315: tolerable FAIL - PUSHED
X-Osstest-Failures:
    seabios:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    seabios:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    seabios:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    seabios:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    seabios:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    seabios:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    seabios:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    seabios=d239552ce7220e448ae81f41515138f7b9e3c4db
X-Osstest-Versions-That:
    seabios=829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 02 Mar 2022 08:30:31 +0000

flight 168315 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168315/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168003
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168003
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168003
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168003
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168003
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass

version targeted for testing:
 seabios              d239552ce7220e448ae81f41515138f7b9e3c4db
baseline version:
 seabios              829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd

Last test of basis   168003  2022-02-03 23:10:24 Z   26 days
Testing same since   168315  2022-03-02 02:40:13 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Kevin O'Connor <kevin@koconnor.net>

jobs:
 build-amd64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/osstest/seabios.git
   829b0f1..d239552  d239552ce7220e448ae81f41515138f7b9e3c4db -> xen-tested-master


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 08:37:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 08:37:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282064.480634 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPKUT-0005V5-OU; Wed, 02 Mar 2022 08:37:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282064.480634; Wed, 02 Mar 2022 08:37:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPKUT-0005Uy-LM; Wed, 02 Mar 2022 08:37:45 +0000
Received: by outflank-mailman (input) for mailman id 282064;
 Wed, 02 Mar 2022 08:37:44 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPKUS-0005Uo-HR; Wed, 02 Mar 2022 08:37:44 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPKUS-0000h0-DV; Wed, 02 Mar 2022 08:37:44 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPKUR-0003pr-Vp; Wed, 02 Mar 2022 08:37:44 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPKUR-0000AU-VI; Wed, 02 Mar 2022 08:37:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=UdAtQmwwfM/qcqwA4DuvAIDLJ1REP3HlDUzQObH1dj0=; b=vU+Teysct1cIPI+6dtSjL7cq5t
	bKRjXrQCuDXhrnFT/IKf0c7YHWlA47yJr3R4ZO8o7OnxUo5b1Y+v9PhptsWAchboOmw3UMs6/asjT
	/3GKhL6GuJd69MUJkwAlhwkcpBdyp0gZCKn3YEroc6jcqlrhZ27o0VeIvwUqESTmrmCU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168310-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168310: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=6e3f36387de566b09aa4145ea0e3bfe4814d68b4
X-Osstest-Versions-That:
    xen=e0a514d2f4b2fcb51835aa9a9b02653b491a61fc
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 02 Mar 2022 08:37:43 +0000

flight 168310 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168310/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168294
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168294
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168294
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168294
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168294
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168294
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168294
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168294
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168294
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168294
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168294
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168294
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  6e3f36387de566b09aa4145ea0e3bfe4814d68b4
baseline version:
 xen                  e0a514d2f4b2fcb51835aa9a9b02653b491a61fc

Last test of basis   168294  2022-03-01 13:07:32 Z    0 days
Testing same since   168310  2022-03-01 23:38:41 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   e0a514d2f4..6e3f36387d  6e3f36387de566b09aa4145ea0e3bfe4814d68b4 -> master


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 08:38:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 08:38:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282074.480645 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPKUs-00062B-70; Wed, 02 Mar 2022 08:38:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282074.480645; Wed, 02 Mar 2022 08:38:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPKUs-000622-3t; Wed, 02 Mar 2022 08:38:10 +0000
Received: by outflank-mailman (input) for mailman id 282074;
 Wed, 02 Mar 2022 08:38:09 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPKUr-00061h-2s; Wed, 02 Mar 2022 08:38:09 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPKUr-0000hM-1H; Wed, 02 Mar 2022 08:38:09 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPKUq-0003rw-NH; Wed, 02 Mar 2022 08:38:08 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPKUq-00018I-Mo; Wed, 02 Mar 2022 08:38:08 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Q5BKYTF7sphgyzvyeCixbjbmJ4SpN5g9twrnbhDUwQk=; b=1Zhe/dKVJvc/gYcoLSe0NmX9dK
	Jw9TZdMhYniQhIjrvTNYkfIqqwePFclw7Kbh91iA7BATYi80yqxOR9LPCKYMh1cQn0/f7UVFdaJTJ
	LsWGlKdYKqdnmcn43ipiKvxS275p+/l7Xz8ZO2g5Dx0Sir/D8/oiwhpqUcAUUWdgyZu4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168320-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168320: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=dc39554d58af4a50b50eca1f57c49415a12b0c98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 02 Mar 2022 08:38:08 +0000

flight 168320 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168320/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 dc39554d58af4a50b50eca1f57c49415a12b0c98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    1 days
Failing since        168258  2022-03-01 01:55:31 Z    1 days   14 attempts
Testing same since   168316  2022-03-02 02:50:20 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit dc39554d58af4a50b50eca1f57c49415a12b0c98
Author: Xiaolu.Jiang <xiaolu.jiang@intel.com>
Date:   Tue Feb 22 22:14:05 2022 +0800

    edk2/MdeModulePkg/Debuglib: Add Standalone MM support
    
    https://bugzilla.tianocore.org/show_bug.cgi?id=3844
    
    This change added Standalone MM instance of DebugLib.
    
    Reviewd-by: Jian J Wang <jian.j.wang@intel.com>
    Reviewd-by: Liming Gao <gaoliming@byosoft.com.cn>
    
    Signed-off-by: Xiaolu.Jiang <xiaolu.jiang@intel.com>

commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 08:39:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 08:39:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282086.480656 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPKVy-0006jA-Iu; Wed, 02 Mar 2022 08:39:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282086.480656; Wed, 02 Mar 2022 08:39:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPKVy-0006j3-Fc; Wed, 02 Mar 2022 08:39:18 +0000
Received: by outflank-mailman (input) for mailman id 282086;
 Wed, 02 Mar 2022 08:39:17 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPKVx-0006ir-DZ; Wed, 02 Mar 2022 08:39:17 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPKVx-0000it-C5; Wed, 02 Mar 2022 08:39:17 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPKVw-0003xx-Rw; Wed, 02 Mar 2022 08:39:16 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPKVw-0003QI-RL; Wed, 02 Mar 2022 08:39:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=lbBKoW0UA528ZK7ykpL0N6umpy3Jcdy9zefl3Zfnp+M=; b=h4soAt6PFvNnOspIM0sOsBBt0n
	dR3z5LmGwED8LygzBADs35Pybfj1LJ6w04l3D0mlidRFxrIVZYQby8JTxUp1z7NV9v5Ft1MgiK/og
	NdlrFLueCK2jDzv1W7KKoz+f7D/pYpPJgFp5yPE+f+Rd1SzVPAHvyPmuKQ/SUYpbP1gE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168321-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168321: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=44ea7749f82c093a3387b94d1e40a5fe48609244
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 02 Mar 2022 08:39:16 +0000

flight 168321 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168321/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              44ea7749f82c093a3387b94d1e40a5fe48609244
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  600 days
Failing since        151818  2020-07-11 04:18:52 Z  599 days  581 attempts
Testing same since   168321  2022-03-02 04:18:56 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 99143 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 08:51:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 08:51:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282099.480667 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPKhE-0000p2-NU; Wed, 02 Mar 2022 08:50:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282099.480667; Wed, 02 Mar 2022 08:50:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPKhE-0000ov-KJ; Wed, 02 Mar 2022 08:50:56 +0000
Received: by outflank-mailman (input) for mailman id 282099;
 Wed, 02 Mar 2022 08:50:55 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=cGAx=TN=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPKhD-0000op-NO
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 08:50:55 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id de36c30c-9a05-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 09:50:54 +0100 (CET)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur02lp2050.outbound.protection.outlook.com [104.47.4.50]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-12-G16L7S_qOj-x9ubuqs-uAA-1; Wed, 02 Mar 2022 09:50:53 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR04MB7085.eurprd04.prod.outlook.com (2603:10a6:800:122::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.24; Wed, 2 Mar
 2022 08:50:52 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Wed, 2 Mar 2022
 08:50:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: de36c30c-9a05-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646211054;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=ph1jqQjQ+iHkLFanw2O34MPA/R256UiuFBkCKVgbnfg=;
	b=B/q7hmiuNqWlChFN3KqqTztC13xUv3dmhX4JJAQdOtD98Sjb2RcITja0edTx0Bh6+KBbtx
	p/6QB9vY1ZqSI8wCK7eDM1zmEijTDNBRxF3D2xNValIWaSaozTsNDNFv91CkX8m0R2l9Go
	VBXGceFQ/RsACAyH09YsjkzBPoNjXlg=
X-MC-Unique: G16L7S_qOj-x9ubuqs-uAA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=CJ0kvufu/B5fFzDYMrIdIha2ItQosEjTSwhJlSpoAZ3z52dwJX1QF3TmKaR6F9gNcA9hn0sn+z8YX1EY1t67lNANVvqA58+xSQJl4W8GRy5wRksNcBZJX7pZc6xtI2YwEwuy/DAws4XR+dYnCjZCqX1zcD8eTMTyTl01d5s7TjVH59a4ppharV1vLKOlfKt80fCZoC+zboXXg5q5JQmrCEYxMUtGO5NRUFFwMoKNWBXHVry1yKcfDbuiEVKUc8TW9s9zP41hPKYDuUQaMgGlCjZpc0/IhvGtZvPmDlxUP4ICO28grPTsz9as5MpwKZwNhqu7CALbkmp3vAg4BWR72g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ph1jqQjQ+iHkLFanw2O34MPA/R256UiuFBkCKVgbnfg=;
 b=IdkADF/tK290uX/mEwXJZrjmXZRRGW1w4wG2ZU8uqLVE7me4Nyb/n2w3wSB2cCTs5D9wvkX0v3RVJq/uPc8QkHrIqupLXXSbvs6ThM/PpdQdidd1EArUYNgxuwG0IUcrsBgWxySoqVLy7aNC3fCNHW92uud2DF89wBJmcMoO27YU5j8ibP67sK9atCQjmdQNngUrXD2gQr4UjfSfvsh435/ibeP5OpEMK12t045OmVcgVczd6w2PbqJX8Mj9kF7CeNTa+si6suYse4e21Pns5l/GBiTDWJ92zwHVMdunwDi8LUyyaXzlIUGw3aaV3UpPo6FN7GqvsWBHURkb3IcXMg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <4726b683-3739-f96d-ff74-45894865a6e0@suse.com>
Date: Wed, 2 Mar 2022 09:50:50 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] x86: fold sections in final binaries
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
References: <03851bd4-9202-385f-d991-c9720185c946@suse.com>
In-Reply-To: <03851bd4-9202-385f-d991-c9720185c946@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: FR3P281CA0057.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:4b::8) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 259644de-1d6a-4ae0-b80a-08d9fc29c195
X-MS-TrafficTypeDiagnostic: VI1PR04MB7085:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB70851AEE0C34286D82C13C9FB3039@VI1PR04MB7085.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(53546011)(6506007)(6512007)(6486002)(31696002)(8936002)(316002)(6916009)(508600001)(54906003)(83380400001)(86362001)(5660300002)(31686004)(2906002)(38100700002)(2616005)(66556008)(66476007)(26005)(4326008)(8676002)(66946007)(36756003)(186003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?T0xoaE9wdWh0RzEvUndkUFZ3disrS2ExZ1U3NUhqMWxKMkkvSWJYalhHbDJO?=
 =?utf-8?B?dW9QMmFONm9nVG5xNlNhNUNtU01WNzV6bzdRb25vVXowRXFqRnhzdFJzODVN?=
 =?utf-8?B?MXFqaXBnd1QwcXdKb0xBWnR3b3Q5b2tIcm4rL01EWHJ5eVRBUFRZWEJGcjZE?=
 =?utf-8?B?Z0VEUHA3SG9jODJwY2xFNjJvLzVGbEJvMytRd1BVeFVoWFk3cTFjR2gzeHBX?=
 =?utf-8?B?T3BmN1pEbktmUzBSSzZGMkxGaFZXZWNlOVpCenMxalVBdGZ5S1dsbE1HMTRh?=
 =?utf-8?B?dnV5cG9BcGtjWDhVRDNPaEx5NXpCc0tGbEZkZHFlWnhoMWpmWVdxdDV2dCtS?=
 =?utf-8?B?U3dwNGVFOWNPZWJWQUlUZ1YwL3NlM1RuL3RRRjVFdmR5c3o5RjJ3YUxEWVhn?=
 =?utf-8?B?YkVhQzdQLzdLU0NGbGZqSW0vTDJvM2VUTEpyd3ZqVXF0dE5nWDRBeGZ3aEtt?=
 =?utf-8?B?V1o0QTJQVVRtS1gvSUxTcHM1Z1F4YTQ0UzM0K2s4TmNybStFajJGREhDZGNT?=
 =?utf-8?B?MmlsajJRRkRET3pJL0ppTDhlVGRCNnVMUHVNMEZUMW4zYnBWekNsazJ5TkNs?=
 =?utf-8?B?eE5BMkFkNWFHbGZYQXNVZjRBVVBaMXlvSmx5UVFnZEc3Y2RsNEIybnIrMWVR?=
 =?utf-8?B?Zm1ZSnZBRmIrcXR3eFUyL3p5L1h3TnNTaHQrZnllUXhsRUdhdVpQbndlMU9x?=
 =?utf-8?B?eit6dXhuc1gxSkZBMVdwYlRoQ1VHTElIYXh4NFRYRFFoMWYrNjd2bStmRUtD?=
 =?utf-8?B?ODJnMGdEUlhFVlByZCtoZWNPRzZVVXFGTGJPWm9lUGtiYm1YQzhUendoRVlh?=
 =?utf-8?B?NHJEL0RsSjNlVE5qVTNyUHN6T25pczRURENhNFJCUzB0NjRsczNheCsrSWZy?=
 =?utf-8?B?MCt4R0JLV0ZYeURmaFpZcXRjRy8yTGErZDF1dHdNTC9TZ05Sc082blhGZU9q?=
 =?utf-8?B?ekU0S1FzRnFzT3FSNGZLUjgrNjg5bHd3UGZOOFJlL2NCNWMzMlpNSmczN0tG?=
 =?utf-8?B?ciszbjhOZ3BUUHlnc2RWM1pjQUp6b3h6T2FuK01WUEF3ZWYvWndsa3lCYmJM?=
 =?utf-8?B?K2RYVHp4ZVVrdGVrZ2lqbHlhSjBVZVdpaDVGRStPbHdGcDBxSFlHYkZmUTJm?=
 =?utf-8?B?Yk9UTHRLN3BSZTY4Sm05OHE4YXJhWlVRelN5ZkFpWTdVSXViL2ZEaGYyMWpY?=
 =?utf-8?B?VTEvd3RjdEwvQUkreVpsbFVaR0VPMEw3Uk9qTGZISW9JZ3pocFVEZlEwUDNI?=
 =?utf-8?B?dERTUnU1RHN4cjBuelZTRk1jTFNoUHZBMUxTK3ZHTEZEYjNJOXE5ZTVWSGZq?=
 =?utf-8?B?WGtmUllIc1N0T1JyL2Ixd2hNenNSc3pJTk9FZmgzSTRNdmloWmQwZmJyaWYv?=
 =?utf-8?B?YmNkSnhMYUoybUplYTI2ejNsaUc3b3RjM2hzYUZWaUs1eENyalk5cWtSU2tz?=
 =?utf-8?B?N3lUSlNxZUh3NVZNQ0RxeUU2WXdNalFtclhDVTJiT2VFQVlRR2h5T1RWVHpk?=
 =?utf-8?B?djFIbE5YUmNaTUxVV0pSRUF5djM0R1V3akZFVndxSkh2a0ZVMXZ2TEFRUGxv?=
 =?utf-8?B?VkpJK25qT0pXbmJwMHkwNzVJTkdXakhnNDI2dEk3QllLeGhiYkl3b0N0TkxW?=
 =?utf-8?B?dEtJWk9JRXRKd3picHRBR2VnYTFlL1Y3QkdEUEFCM2NoSUU3L0ZjemdqdmxK?=
 =?utf-8?B?amp2MytvTzA1K2h3OWRoNjdranAxa1NlbWZNWk5vczZIVkdYQ3g2TEdPUzY1?=
 =?utf-8?B?djBMbUVWcWZGQ2hNcFR4d2RpVUtrWDJkSWtuR2pEZVI4VUNXQklVS29JN2RW?=
 =?utf-8?B?YTJpczRIZjhjblVTbmZnQWZOUmltckhsZzUxTTB0cFdWeGxDUE5rYmI2QXdj?=
 =?utf-8?B?aEMwSEh1cW5oUEhiWGwxVnNMejZzZVVWeDE5aUxPQ1lQL1JjeVB1aDZXN2xJ?=
 =?utf-8?B?dDVWR3lIbDU3ekNpVjYydTFMelRFcmZ6Y3BGZ0ZrTWp4eVFpZDJoakpjeHpz?=
 =?utf-8?B?eE82Sy80MjNlc2htczUxaHptRUdtcGN1aW1nKzVBdTAxcDVPb090OW4wa3FZ?=
 =?utf-8?B?VUswQ2V6dDJlSVg2cnVRaUNRcENHSFYvNkh6U2pSRnVxbXRWVHVzSGIxdmI2?=
 =?utf-8?B?NkVSeGVWYXVVb1pqcnNNdjk5ZzI3cUYzMHNsZm1OL0JDOFRMdy9JZDJkZUVY?=
 =?utf-8?Q?8TsQMuHynNNflhC3Igp+q04=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 259644de-1d6a-4ae0-b80a-08d9fc29c195
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 08:50:52.3965
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: EIbffbWcUgh0wbNQEJ2rTBKrORwBun6ACGMrSTNH9qkmqTJ4QcuFW/MpMXwBThC+ZajkYNeiSQnd8lVvYbuLKg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB7085

On 01.03.2022 09:55, Jan Beulich wrote:
> --- a/xen/arch/x86/xen.lds.S
> +++ b/xen/arch/x86/xen.lds.S
> @@ -194,6 +194,7 @@ SECTIONS
>  #endif
>         _sinittext = .;
>         *(.init.text)
> +       *(.text.startup)
>         _einittext = .;
>         /*
>          * Here are the replacement instructions. The linker sticks them
> @@ -258,9 +259,10 @@ SECTIONS
>  
>         . = ALIGN(8);
>         __ctors_start = .;
> -       *(.ctors)
> +       *(SORT_BY_INIT_PRIORITY(.init_array.*))
> +       *(SORT_BY_INIT_PRIORITY(.ctors.*))
>         *(.init_array)
> -       *(SORT(.init_array.*))
> +       *(.ctors)
>         __ctors_end = .;
>    } PHDR(text)

While I did commit the change with Roger's R-b, on the basis that it's not
going to make things worse, I don't think what we have here and what we do
in init_constructors() is quite right: For one .init_array and .ctors are
supposed to be processed in, respectively, opposite order - the former
forwards, the latter backwards. See e.g. gcc's libgcc/gbl-ctors.h. And
then both variants also shouldn't be intermixed; we ought to expect only
one of the two kinds, and aiui for now it's always going to be .ctors.

The processing in wrong order looks to not be a problem in the builds I
can check, as there's only ever a single priority used. But we're at risk
of this breaking down the road ...

Finally, if we consider .init_array might appear, we ought to also
discard (rather than leaving orphaned) .fini_array.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 09:02:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 09:02:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282110.480684 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPKsM-0002e9-0F; Wed, 02 Mar 2022 09:02:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282110.480684; Wed, 02 Mar 2022 09:02:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPKsL-0002e2-TI; Wed, 02 Mar 2022 09:02:25 +0000
Received: by outflank-mailman (input) for mailman id 282110;
 Wed, 02 Mar 2022 09:02:24 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=6jXW=TN=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nPKsK-0002dw-AV
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 09:02:24 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id 789055a9-9a07-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 10:02:22 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 74D4B1396;
 Wed,  2 Mar 2022 01:02:21 -0800 (PST)
Received: from e129167.arm.com (unknown [10.57.71.82])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 1FB6D3F66F;
 Wed,  2 Mar 2022 01:02:19 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 789055a9-9a07-11ec-8eba-a37418f5ba1a
From: Michal Orzel <michal.orzel@arm.com>
To: xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH] xen/arm: gic: Introduce GIC_PRI_{IRQ/IPI}_ALL
Date: Wed,  2 Mar 2022 10:02:12 +0100
Message-Id: <20220302090212.115922-1-michal.orzel@arm.com>
X-Mailer: git-send-email 2.25.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Introduce macros GIC_PRI_IRQ_ALL and GIC_PRI_IPI_ALL to be used in all
the places where we want to set default priority for all the offsets
in interrupt priority register. This will improve readability and
allow to get rid of introducing variables just to store this value.

Take the opportunity to mark GIC_PRI_{IRQ/IPI} as unsigned values
to suppress static analyzer warnings as they are used in expressions
exceeding integer range (shifting into signed bit). Modify also other
priority related macros to be coherent.

Signed-off-by: Michal Orzel <michal.orzel@arm.com>
---
 xen/arch/arm/gic-v2.c          | 12 +++---------
 xen/arch/arm/gic-v3.c          | 16 +++-------------
 xen/arch/arm/include/asm/gic.h | 12 ++++++++----
 3 files changed, 14 insertions(+), 26 deletions(-)

diff --git a/xen/arch/arm/gic-v2.c b/xen/arch/arm/gic-v2.c
index b2adc8ec9a..2cc2f6bc18 100644
--- a/xen/arch/arm/gic-v2.c
+++ b/xen/arch/arm/gic-v2.c
@@ -373,9 +373,7 @@ static void __init gicv2_dist_init(void)
 
     /* Default priority for global interrupts */
     for ( i = 32; i < nr_lines; i += 4 )
-        writel_gicd(GIC_PRI_IRQ << 24 | GIC_PRI_IRQ << 16 |
-                    GIC_PRI_IRQ << 8 | GIC_PRI_IRQ,
-                    GICD_IPRIORITYR + (i / 4) * 4);
+        writel_gicd(GIC_PRI_IRQ_ALL, GICD_IPRIORITYR + (i / 4) * 4);
 
     /* Disable all global interrupts */
     for ( i = 32; i < nr_lines; i += 32 )
@@ -403,15 +401,11 @@ static void gicv2_cpu_init(void)
 
     /* Set SGI priorities */
     for ( i = 0; i < 16; i += 4 )
-        writel_gicd(GIC_PRI_IPI << 24 | GIC_PRI_IPI << 16 |
-                    GIC_PRI_IPI << 8 | GIC_PRI_IPI,
-                    GICD_IPRIORITYR + (i / 4) * 4);
+        writel_gicd(GIC_PRI_IPI_ALL, GICD_IPRIORITYR + (i / 4) * 4);
 
     /* Set PPI priorities */
     for ( i = 16; i < 32; i += 4 )
-        writel_gicd(GIC_PRI_IRQ << 24 | GIC_PRI_IRQ << 16 |
-                    GIC_PRI_IRQ << 8 | GIC_PRI_IRQ,
-                    GICD_IPRIORITYR + (i / 4) * 4);
+        writel_gicd(GIC_PRI_IRQ_ALL, GICD_IPRIORITYR + (i / 4) * 4);
 
     /* Local settings: interface controller */
     /* Don't mask by priority */
diff --git a/xen/arch/arm/gic-v3.c b/xen/arch/arm/gic-v3.c
index 9a3a175ad7..3c472ed768 100644
--- a/xen/arch/arm/gic-v3.c
+++ b/xen/arch/arm/gic-v3.c
@@ -594,7 +594,6 @@ static void gicv3_set_irq_priority(struct irq_desc *desc,
 static void __init gicv3_dist_init(void)
 {
     uint32_t type;
-    uint32_t priority;
     uint64_t affinity;
     unsigned int nr_lines;
     int i;
@@ -621,11 +620,7 @@ static void __init gicv3_dist_init(void)
 
     /* Default priority for global interrupts */
     for ( i = NR_GIC_LOCAL_IRQS; i < nr_lines; i += 4 )
-    {
-        priority = (GIC_PRI_IRQ << 24 | GIC_PRI_IRQ << 16 |
-                    GIC_PRI_IRQ << 8 | GIC_PRI_IRQ);
-        writel_relaxed(priority, GICD + GICD_IPRIORITYR + (i / 4) * 4);
-    }
+        writel_relaxed(GIC_PRI_IRQ_ALL, GICD + GICD_IPRIORITYR + (i / 4) * 4);
 
     /* Disable/deactivate all global interrupts */
     for ( i = NR_GIC_LOCAL_IRQS; i < nr_lines; i += 32 )
@@ -806,7 +801,6 @@ static int __init gicv3_populate_rdist(void)
 static int gicv3_cpu_init(void)
 {
     int i, ret;
-    uint32_t priority;
 
     /* Register ourselves with the rest of the world */
     if ( gicv3_populate_rdist() )
@@ -826,16 +820,12 @@ static int gicv3_cpu_init(void)
     }
 
     /* Set priority on PPI and SGI interrupts */
-    priority = (GIC_PRI_IPI << 24 | GIC_PRI_IPI << 16 | GIC_PRI_IPI << 8 |
-                GIC_PRI_IPI);
     for (i = 0; i < NR_GIC_SGI; i += 4)
-        writel_relaxed(priority,
+        writel_relaxed(GIC_PRI_IPI_ALL,
                 GICD_RDIST_SGI_BASE + GICR_IPRIORITYR0 + (i / 4) * 4);
 
-    priority = (GIC_PRI_IRQ << 24 | GIC_PRI_IRQ << 16 | GIC_PRI_IRQ << 8 |
-                GIC_PRI_IRQ);
     for (i = NR_GIC_SGI; i < NR_GIC_LOCAL_IRQS; i += 4)
-        writel_relaxed(priority,
+        writel_relaxed(GIC_PRI_IRQ_ALL,
                 GICD_RDIST_SGI_BASE + GICR_IPRIORITYR0 + (i / 4) * 4);
 
     /*
diff --git a/xen/arch/arm/include/asm/gic.h b/xen/arch/arm/include/asm/gic.h
index c7f0c343d1..69ceac36b1 100644
--- a/xen/arch/arm/include/asm/gic.h
+++ b/xen/arch/arm/include/asm/gic.h
@@ -143,10 +143,14 @@
  *
  * A GIC must support a mimimum of 16 priority levels.
  */
-#define GIC_PRI_LOWEST     0xf0
-#define GIC_PRI_IRQ        0xa0
-#define GIC_PRI_IPI        0x90 /* IPIs must preempt normal interrupts */
-#define GIC_PRI_HIGHEST    0x80 /* Higher priorities belong to Secure-World */
+#define GIC_PRI_LOWEST     0xf0U
+#define GIC_PRI_IRQ        0xa0U
+#define GIC_PRI_IRQ_ALL    ((GIC_PRI_IRQ << 24) | (GIC_PRI_IRQ << 16) |\
+                            (GIC_PRI_IRQ << 8) | GIC_PRI_IRQ)
+#define GIC_PRI_IPI        0x90U /* IPIs must preempt normal interrupts */
+#define GIC_PRI_IPI_ALL    ((GIC_PRI_IPI << 24) | (GIC_PRI_IPI << 16) |\
+                            (GIC_PRI_IPI << 8) | GIC_PRI_IPI)
+#define GIC_PRI_HIGHEST    0x80U /* Higher priorities belong to Secure-World */
 #define GIC_PRI_TO_GUEST(pri) (pri >> 3) /* GICH_LR and GICH_VMCR only support
                                             5 bits for guest irq priority */
 
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 09:19:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 09:19:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282117.480697 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPL8t-0004gj-JI; Wed, 02 Mar 2022 09:19:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282117.480697; Wed, 02 Mar 2022 09:19:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPL8t-0004gc-GK; Wed, 02 Mar 2022 09:19:31 +0000
Received: by outflank-mailman (input) for mailman id 282117;
 Wed, 02 Mar 2022 09:18:39 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=K0dg=TN=gmail.com=matorola@srs-se1.protection.inumbo.net>)
 id 1nPL83-0004eI-Kf
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 09:18:39 +0000
Received: from mail-ej1-x636.google.com (mail-ej1-x636.google.com
 [2a00:1450:4864:20::636])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id be961074-9a09-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 10:18:38 +0100 (CET)
Received: by mail-ej1-x636.google.com with SMTP id kt27so2410887ejb.0
 for <xen-devel@lists.xenproject.org>; Wed, 02 Mar 2022 01:18:38 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: be961074-9a09-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=4LuLQynsRS5ZDdiypHmCRhWOSK0fPQgMoxmBubsA8FA=;
        b=YwA2Tp9/WRHVf+AhpCscraLQ5YZMBIbTnjRD9qXALixvArniZHwws+D5eKFYJ4w9RG
         r5YPECm/lP0oAUKfe9WRJhv6+FML2S+XIXHKeVDBXWzTRzpq8V5VyDtMBBLt+RgC4uif
         rGbJjiYJ+RaebcdTWE+lgavU2sjB3KE2oYMSI2g0SnLEMM8BFRLk6tjS00Xev2qK5BZV
         5Ssf9EZ0tsmaxYSBGN+JYRBhKcBJnRtyUIj9fj+nmKF1+vj7CNwKABPlCEiIkg4HqhVl
         prjve+Nrt6ySEZf00Hzlz9gQ4nrt4ykYynGeggVTPypi2WOB4Q0/x8pbTwKWJmRWzNiw
         F8UA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=4LuLQynsRS5ZDdiypHmCRhWOSK0fPQgMoxmBubsA8FA=;
        b=GFGvPjlOUFn81xPWkrRxENldqejC22oH5+Nut87e/EZM2cQ0YsLtjDGTvdjVW7VIlA
         +k354Ma2Vtia76dtDDjJnchsF3YNj0mts1dm/rrKnpNsuAas/8NvK4xpJf42v5kVSFp9
         dTWYaSJEjKk0SosP9UzQglDrV17xHDGMX30XHC8k/mAMnbNxCmSigXR+G/2v93lUj5JE
         vlW4zFJMO1TBXk44rXBn29OP8TIlGrGZ5xGtPG1W0oOWQZxAZ3mrtHBz370BHxiplWvG
         IKYkXLmHy0VGo2fz+3JNS/mYwaX1WHVQ6Fu5sGmX+jyzb/yCUhhUlni4MwwB+NX3phsr
         BTvw==
X-Gm-Message-State: AOAM532F5s+U+InXC7jogGwIoQIEDEFtezY5Msr3gVYTVxuaM1Y22bwn
	CYNbWXxf+R1cWYg+r6Wf1dDJDOeNMa8UyZPgRzY=
X-Google-Smtp-Source: ABdhPJxefZcxfzkkMgbjOK8FTIKDUrSjhwIhlbq76ukZRP/HPSQoF7TsleylqvSIE+LRhSKcwrjAT6lGtFvgDJjKhNk=
X-Received: by 2002:a17:906:9f06:b0:6ce:36da:8247 with SMTP id
 fy6-20020a1709069f0600b006ce36da8247mr21813101ejc.651.1646212718008; Wed, 02
 Mar 2022 01:18:38 -0800 (PST)
MIME-Version: 1.0
References: <20220227143055.335596-1-hch@lst.de> <20220227143055.335596-8-hch@lst.de>
In-Reply-To: <20220227143055.335596-8-hch@lst.de>
From: Anatoly Pugachev <matorola@gmail.com>
Date: Wed, 2 Mar 2022 12:18:26 +0300
Message-ID: <CADxRZqxrjp4erFNorH+XqubZWLRNjw2E14z7vOW537no1eKnhw@mail.gmail.com>
Subject: Re: [PATCH 07/11] x86: remove the IOMMU table infrastructure
To: Christoph Hellwig <hch@lst.de>
Cc: iommu@lists.linux-foundation.org, x86@kernel.org, 
	Anshuman Khandual <anshuman.khandual@arm.com>, Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>, 
	Stefano Stabellini <sstabellini@kernel.org>, Boris Ostrovsky <boris.ostrovsky@oracle.com>, 
	Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>, David Woodhouse <dwmw2@infradead.org>, 
	Lu Baolu <baolu.lu@linux.intel.com>, Robin Murphy <robin.murphy@arm.com>, 
	linux-arm-kernel@lists.infradead.org, xen-devel@lists.xenproject.org, 
	linux-ia64@vger.kernel.org, linux-mips@vger.kernel.org, 
	linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org, 
	linux-s390 <linux-s390@vger.kernel.org>, linux-hyperv@vger.kernel.org, 
	tboot-devel@lists.sourceforge.net, linux-pci@vger.kernel.org
Content-Type: text/plain; charset="UTF-8"

On Sun, Feb 27, 2022 at 7:31 PM Christoph Hellwig <hch@lst.de> wrote:
>
> The IOMMU table tries to separate the different IOMMUs into different
> backends, but actually requires various cross calls.
>
> Rewrite the code to do the generic swiotlb/swiotlb-xen setup directly
> in pci-dma.c and then just call into the IOMMU drivers.
...
> --- a/arch/x86/include/asm/iommu_table.h
> +++ /dev/null
> @@ -1,102 +0,0 @@
> -/* SPDX-License-Identifier: GPL-2.0 */
> -#ifndef _ASM_X86_IOMMU_TABLE_H
> -#define _ASM_X86_IOMMU_TABLE_H
> -
> -#include <asm/swiotlb.h>
> -
> -/*
> - * History lesson:
> - * The execution chain of IOMMUs in 2.6.36 looks as so:
> - *
> - *            [xen-swiotlb]
> - *                 |
> - *         +----[swiotlb *]--+
> - *        /         |         \
> - *       /          |          \
> - *    [GART]     [Calgary]  [Intel VT-d]
> - *     /
> - *    /
> - * [AMD-Vi]
> - *
> - * *: if SWIOTLB detected 'iommu=soft'/'swiotlb=force' it would skip
> - * over the rest of IOMMUs and unconditionally initialize the SWIOTLB.
> - * Also it would surreptitiously initialize set the swiotlb=1 if there were
> - * more than 4GB and if the user did not pass in 'iommu=off'. The swiotlb
> - * flag would be turned off by all IOMMUs except the Calgary one.
> - *
> - * The IOMMU_INIT* macros allow a similar tree (or more complex if desired)
> - * to be built by defining who we depend on.
> - *
> - * And all that needs to be done is to use one of the macros in the IOMMU
> - * and the pci-dma.c will take care of the rest.
> - */

Christoph,

Is it possible to keep documentation comments in source files? Or are
they completely irrelevant now?

Thanks.


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 09:22:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 09:22:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282126.480709 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPLBS-00062W-2b; Wed, 02 Mar 2022 09:22:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282126.480709; Wed, 02 Mar 2022 09:22:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPLBR-00062P-VS; Wed, 02 Mar 2022 09:22:09 +0000
Received: by outflank-mailman (input) for mailman id 282126;
 Wed, 02 Mar 2022 09:22:09 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=rYeN=TN=lst.de=hch@srs-se1.protection.inumbo.net>)
 id 1nPLBR-00062H-5W
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 09:22:09 +0000
Received: from verein.lst.de (verein.lst.de [213.95.11.211])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 3b4681cf-9a0a-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 10:22:08 +0100 (CET)
Received: by verein.lst.de (Postfix, from userid 2407)
 id 745BC68AFE; Wed,  2 Mar 2022 10:22:04 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3b4681cf-9a0a-11ec-8eba-a37418f5ba1a
Date: Wed, 2 Mar 2022 10:22:04 +0100
From: Christoph Hellwig <hch@lst.de>
To: Anatoly Pugachev <matorola@gmail.com>
Cc: Christoph Hellwig <hch@lst.de>, iommu@lists.linux-foundation.org,
	x86@kernel.org, Anshuman Khandual <anshuman.khandual@arm.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org, linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390 <linux-s390@vger.kernel.org>,
	linux-hyperv@vger.kernel.org, tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: Re: [PATCH 07/11] x86: remove the IOMMU table infrastructure
Message-ID: <20220302092204.GA24139@lst.de>
References: <20220227143055.335596-1-hch@lst.de> <20220227143055.335596-8-hch@lst.de> <CADxRZqxrjp4erFNorH+XqubZWLRNjw2E14z7vOW537no1eKnhw@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <CADxRZqxrjp4erFNorH+XqubZWLRNjw2E14z7vOW537no1eKnhw@mail.gmail.com>
User-Agent: Mutt/1.5.17 (2007-11-01)

On Wed, Mar 02, 2022 at 12:18:26PM +0300, Anatoly Pugachev wrote:
> Is it possible to keep documentation comments in source files? Or are
> they completely irrelevant now?

That ones you quoted are very much irrelevant now.  And the behaviour
of the swiotlb disabling will have to change (this patchset is a bit
of a preparation for now) as we now use per-device dma_ops and the
dma-iommu can dip into the swiotlb pool for untrusted devices.  In
practive we'll basically have to always initialize the swiotlb buffer
now.


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 09:40:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 09:40:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282133.480719 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPLTU-0000Rd-L4; Wed, 02 Mar 2022 09:40:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282133.480719; Wed, 02 Mar 2022 09:40:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPLTU-0000RW-Hw; Wed, 02 Mar 2022 09:40:48 +0000
Received: by outflank-mailman (input) for mailman id 282133;
 Wed, 02 Mar 2022 09:40:47 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nPLTT-0000RQ-3Z
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 09:40:47 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nPLTS-0001oO-Q3; Wed, 02 Mar 2022 09:40:46 +0000
Received: from 54-240-197-224.amazon.com ([54.240.197.224]
 helo=[192.168.10.166]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nPLTS-0006xZ-JJ; Wed, 02 Mar 2022 09:40:46 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=DworUVLnm+WsZhrtNGRNQBJu4kjIywM//Yy1Ai7wovs=; b=rnsLdRfCzpB0irb1GZ+hIGGzIv
	+u3u+uC5CJ+1i1R7B/odSzkaYFeeFwKnNC5aNMwMrKoX0CuS4+sHiSjQNMRLLLdb1Re6c4p5+RcMP
	CRSRNMnX1UEBnwPVEC/GhGQZ7zwngBHnQsIw0++kZ/o73hdVtPruecKTdBWVu9AnfwnY=;
Message-ID: <2243c7f9-b0c7-83be-9ac0-5538436e4d6c@xen.org>
Date: Wed, 2 Mar 2022 09:40:44 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH] xen/arm: gic: Introduce GIC_PRI_{IRQ/IPI}_ALL
To: Michal Orzel <michal.orzel@arm.com>, xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
References: <20220302090212.115922-1-michal.orzel@arm.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220302090212.115922-1-michal.orzel@arm.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Michal,

On 02/03/2022 09:02, Michal Orzel wrote:
> Introduce macros GIC_PRI_IRQ_ALL and GIC_PRI_IPI_ALL to be used in all
> the places where we want to set default priority for all the offsets
> in interrupt priority register. This will improve readability and
> allow to get rid of introducing variables just to store this value.
> 
> Take the opportunity to mark GIC_PRI_{IRQ/IPI} as unsigned values
> to suppress static analyzer warnings as they are used in expressions
> exceeding integer range (shifting into signed bit). Modify also other
> priority related macros to be coherent.
> 
> Signed-off-by: Michal Orzel <michal.orzel@arm.com>
> ---
>   xen/arch/arm/gic-v2.c          | 12 +++---------
>   xen/arch/arm/gic-v3.c          | 16 +++-------------
>   xen/arch/arm/include/asm/gic.h | 12 ++++++++----
>   3 files changed, 14 insertions(+), 26 deletions(-)
> 
> diff --git a/xen/arch/arm/gic-v2.c b/xen/arch/arm/gic-v2.c
> index b2adc8ec9a..2cc2f6bc18 100644
> --- a/xen/arch/arm/gic-v2.c
> +++ b/xen/arch/arm/gic-v2.c
> @@ -373,9 +373,7 @@ static void __init gicv2_dist_init(void)
>   
>       /* Default priority for global interrupts */
>       for ( i = 32; i < nr_lines; i += 4 )
> -        writel_gicd(GIC_PRI_IRQ << 24 | GIC_PRI_IRQ << 16 |
> -                    GIC_PRI_IRQ << 8 | GIC_PRI_IRQ,
> -                    GICD_IPRIORITYR + (i / 4) * 4);
> +        writel_gicd(GIC_PRI_IRQ_ALL, GICD_IPRIORITYR + (i / 4) * 4);
>   
>       /* Disable all global interrupts */
>       for ( i = 32; i < nr_lines; i += 32 )
> @@ -403,15 +401,11 @@ static void gicv2_cpu_init(void)
>   
>       /* Set SGI priorities */
>       for ( i = 0; i < 16; i += 4 )
> -        writel_gicd(GIC_PRI_IPI << 24 | GIC_PRI_IPI << 16 |
> -                    GIC_PRI_IPI << 8 | GIC_PRI_IPI,
> -                    GICD_IPRIORITYR + (i / 4) * 4);
> +        writel_gicd(GIC_PRI_IPI_ALL, GICD_IPRIORITYR + (i / 4) * 4);
>   
>       /* Set PPI priorities */
>       for ( i = 16; i < 32; i += 4 )
> -        writel_gicd(GIC_PRI_IRQ << 24 | GIC_PRI_IRQ << 16 |
> -                    GIC_PRI_IRQ << 8 | GIC_PRI_IRQ,
> -                    GICD_IPRIORITYR + (i / 4) * 4);
> +        writel_gicd(GIC_PRI_IRQ_ALL, GICD_IPRIORITYR + (i / 4) * 4);
>   
>       /* Local settings: interface controller */
>       /* Don't mask by priority */
> diff --git a/xen/arch/arm/gic-v3.c b/xen/arch/arm/gic-v3.c
> index 9a3a175ad7..3c472ed768 100644
> --- a/xen/arch/arm/gic-v3.c
> +++ b/xen/arch/arm/gic-v3.c
> @@ -594,7 +594,6 @@ static void gicv3_set_irq_priority(struct irq_desc *desc,
>   static void __init gicv3_dist_init(void)
>   {
>       uint32_t type;
> -    uint32_t priority;
>       uint64_t affinity;
>       unsigned int nr_lines;
>       int i;
> @@ -621,11 +620,7 @@ static void __init gicv3_dist_init(void)
>   
>       /* Default priority for global interrupts */
>       for ( i = NR_GIC_LOCAL_IRQS; i < nr_lines; i += 4 )
> -    {
> -        priority = (GIC_PRI_IRQ << 24 | GIC_PRI_IRQ << 16 |
> -                    GIC_PRI_IRQ << 8 | GIC_PRI_IRQ);
> -        writel_relaxed(priority, GICD + GICD_IPRIORITYR + (i / 4) * 4);
> -    }
> +        writel_relaxed(GIC_PRI_IRQ_ALL, GICD + GICD_IPRIORITYR + (i / 4) * 4);
>   
>       /* Disable/deactivate all global interrupts */
>       for ( i = NR_GIC_LOCAL_IRQS; i < nr_lines; i += 32 )
> @@ -806,7 +801,6 @@ static int __init gicv3_populate_rdist(void)
>   static int gicv3_cpu_init(void)
>   {
>       int i, ret;
> -    uint32_t priority;
>   
>       /* Register ourselves with the rest of the world */
>       if ( gicv3_populate_rdist() )
> @@ -826,16 +820,12 @@ static int gicv3_cpu_init(void)
>       }
>   
>       /* Set priority on PPI and SGI interrupts */
> -    priority = (GIC_PRI_IPI << 24 | GIC_PRI_IPI << 16 | GIC_PRI_IPI << 8 |
> -                GIC_PRI_IPI);
>       for (i = 0; i < NR_GIC_SGI; i += 4)
> -        writel_relaxed(priority,
> +        writel_relaxed(GIC_PRI_IPI_ALL,
>                   GICD_RDIST_SGI_BASE + GICR_IPRIORITYR0 + (i / 4) * 4);
>   
> -    priority = (GIC_PRI_IRQ << 24 | GIC_PRI_IRQ << 16 | GIC_PRI_IRQ << 8 |
> -                GIC_PRI_IRQ);
>       for (i = NR_GIC_SGI; i < NR_GIC_LOCAL_IRQS; i += 4)
> -        writel_relaxed(priority,
> +        writel_relaxed(GIC_PRI_IRQ_ALL,
>                   GICD_RDIST_SGI_BASE + GICR_IPRIORITYR0 + (i / 4) * 4);
>   
>       /*
> diff --git a/xen/arch/arm/include/asm/gic.h b/xen/arch/arm/include/asm/gic.h
> index c7f0c343d1..69ceac36b1 100644
> --- a/xen/arch/arm/include/asm/gic.h
> +++ b/xen/arch/arm/include/asm/gic.h
> @@ -143,10 +143,14 @@
>    *
>    * A GIC must support a mimimum of 16 priority levels.
>    */
> -#define GIC_PRI_LOWEST     0xf0
> -#define GIC_PRI_IRQ        0xa0
> -#define GIC_PRI_IPI        0x90 /* IPIs must preempt normal interrupts */
> -#define GIC_PRI_HIGHEST    0x80 /* Higher priorities belong to Secure-World */
> +#define GIC_PRI_LOWEST     0xf0U
> +#define GIC_PRI_IRQ        0xa0U
> +#define GIC_PRI_IRQ_ALL    ((GIC_PRI_IRQ << 24) | (GIC_PRI_IRQ << 16) |\
> +                            (GIC_PRI_IRQ << 8) | GIC_PRI_IRQ)
> +#define GIC_PRI_IPI        0x90U /* IPIs must preempt normal interrupts */
> +#define GIC_PRI_IPI_ALL    ((GIC_PRI_IPI << 24) | (GIC_PRI_IPI << 16) |\
> +                            (GIC_PRI_IPI << 8) | GIC_PRI_IPI)
This is matter of taste. I think it would read better to keep 
GIC_PRI_{LOWEST, IRQ, IPI, HIGHEST} defined together and then define 
*_ALL separately.

> +#define GIC_PRI_HIGHEST    0x80U /* Higher priorities belong to Secure-World */

NIT: While you are there, I would suggest to add a newline here. So we 
separate priority definitions from handy helpers.

>   #define GIC_PRI_TO_GUEST(pri) (pri >> 3) /* GICH_LR and GICH_VMCR only support
>                                               5 bits for guest irq priority */

Other than that. The patch itself looks good to me. So:

Acked-by: Julien Grall <jgrall@amazon.com>

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 09:46:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 09:46:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282142.480737 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPLYZ-00017a-Bq; Wed, 02 Mar 2022 09:46:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282142.480737; Wed, 02 Mar 2022 09:46:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPLYZ-00017T-7g; Wed, 02 Mar 2022 09:46:03 +0000
Received: by outflank-mailman (input) for mailman id 282142;
 Wed, 02 Mar 2022 09:46:01 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=6jXW=TN=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nPLYX-00017N-Ho
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 09:46:01 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTP
 id 90d100f5-9a0d-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 10:45:59 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 29DCD1042;
 Wed,  2 Mar 2022 01:45:59 -0800 (PST)
Received: from [10.57.71.82] (unknown [10.57.71.82])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id E0FF93F66F;
 Wed,  2 Mar 2022 01:45:57 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 90d100f5-9a0d-11ec-8539-5f4723681683
Message-ID: <8ee87286-6e35-ddb7-9216-b663f3290570@arm.com>
Date: Wed, 2 Mar 2022 10:45:49 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [PATCH] xen/arm: gic: Introduce GIC_PRI_{IRQ/IPI}_ALL
Content-Language: en-US
To: Julien Grall <julien@xen.org>, xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
References: <20220302090212.115922-1-michal.orzel@arm.com>
 <2243c7f9-b0c7-83be-9ac0-5538436e4d6c@xen.org>
From: Michal Orzel <michal.orzel@arm.com>
In-Reply-To: <2243c7f9-b0c7-83be-9ac0-5538436e4d6c@xen.org>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

Hi Julien,

On 3/2/22 10:40, Julien Grall wrote:
> Hi Michal,
> 
> On 02/03/2022 09:02, Michal Orzel wrote:
>> Introduce macros GIC_PRI_IRQ_ALL and GIC_PRI_IPI_ALL to be used in all
>> the places where we want to set default priority for all the offsets
>> in interrupt priority register. This will improve readability and
>> allow to get rid of introducing variables just to store this value.
>>
>> Take the opportunity to mark GIC_PRI_{IRQ/IPI} as unsigned values
>> to suppress static analyzer warnings as they are used in expressions
>> exceeding integer range (shifting into signed bit). Modify also other
>> priority related macros to be coherent.
>>
>> Signed-off-by: Michal Orzel <michal.orzel@arm.com>
>> ---
>>   xen/arch/arm/gic-v2.c          | 12 +++---------
>>   xen/arch/arm/gic-v3.c          | 16 +++-------------
>>   xen/arch/arm/include/asm/gic.h | 12 ++++++++----
>>   3 files changed, 14 insertions(+), 26 deletions(-)
>>
>> diff --git a/xen/arch/arm/gic-v2.c b/xen/arch/arm/gic-v2.c
>> index b2adc8ec9a..2cc2f6bc18 100644
>> --- a/xen/arch/arm/gic-v2.c
>> +++ b/xen/arch/arm/gic-v2.c
>> @@ -373,9 +373,7 @@ static void __init gicv2_dist_init(void)
>>         /* Default priority for global interrupts */
>>       for ( i = 32; i < nr_lines; i += 4 )
>> -        writel_gicd(GIC_PRI_IRQ << 24 | GIC_PRI_IRQ << 16 |
>> -                    GIC_PRI_IRQ << 8 | GIC_PRI_IRQ,
>> -                    GICD_IPRIORITYR + (i / 4) * 4);
>> +        writel_gicd(GIC_PRI_IRQ_ALL, GICD_IPRIORITYR + (i / 4) * 4);
>>         /* Disable all global interrupts */
>>       for ( i = 32; i < nr_lines; i += 32 )
>> @@ -403,15 +401,11 @@ static void gicv2_cpu_init(void)
>>         /* Set SGI priorities */
>>       for ( i = 0; i < 16; i += 4 )
>> -        writel_gicd(GIC_PRI_IPI << 24 | GIC_PRI_IPI << 16 |
>> -                    GIC_PRI_IPI << 8 | GIC_PRI_IPI,
>> -                    GICD_IPRIORITYR + (i / 4) * 4);
>> +        writel_gicd(GIC_PRI_IPI_ALL, GICD_IPRIORITYR + (i / 4) * 4);
>>         /* Set PPI priorities */
>>       for ( i = 16; i < 32; i += 4 )
>> -        writel_gicd(GIC_PRI_IRQ << 24 | GIC_PRI_IRQ << 16 |
>> -                    GIC_PRI_IRQ << 8 | GIC_PRI_IRQ,
>> -                    GICD_IPRIORITYR + (i / 4) * 4);
>> +        writel_gicd(GIC_PRI_IRQ_ALL, GICD_IPRIORITYR + (i / 4) * 4);
>>         /* Local settings: interface controller */
>>       /* Don't mask by priority */
>> diff --git a/xen/arch/arm/gic-v3.c b/xen/arch/arm/gic-v3.c
>> index 9a3a175ad7..3c472ed768 100644
>> --- a/xen/arch/arm/gic-v3.c
>> +++ b/xen/arch/arm/gic-v3.c
>> @@ -594,7 +594,6 @@ static void gicv3_set_irq_priority(struct irq_desc *desc,
>>   static void __init gicv3_dist_init(void)
>>   {
>>       uint32_t type;
>> -    uint32_t priority;
>>       uint64_t affinity;
>>       unsigned int nr_lines;
>>       int i;
>> @@ -621,11 +620,7 @@ static void __init gicv3_dist_init(void)
>>         /* Default priority for global interrupts */
>>       for ( i = NR_GIC_LOCAL_IRQS; i < nr_lines; i += 4 )
>> -    {
>> -        priority = (GIC_PRI_IRQ << 24 | GIC_PRI_IRQ << 16 |
>> -                    GIC_PRI_IRQ << 8 | GIC_PRI_IRQ);
>> -        writel_relaxed(priority, GICD + GICD_IPRIORITYR + (i / 4) * 4);
>> -    }
>> +        writel_relaxed(GIC_PRI_IRQ_ALL, GICD + GICD_IPRIORITYR + (i / 4) * 4);
>>         /* Disable/deactivate all global interrupts */
>>       for ( i = NR_GIC_LOCAL_IRQS; i < nr_lines; i += 32 )
>> @@ -806,7 +801,6 @@ static int __init gicv3_populate_rdist(void)
>>   static int gicv3_cpu_init(void)
>>   {
>>       int i, ret;
>> -    uint32_t priority;
>>         /* Register ourselves with the rest of the world */
>>       if ( gicv3_populate_rdist() )
>> @@ -826,16 +820,12 @@ static int gicv3_cpu_init(void)
>>       }
>>         /* Set priority on PPI and SGI interrupts */
>> -    priority = (GIC_PRI_IPI << 24 | GIC_PRI_IPI << 16 | GIC_PRI_IPI << 8 |
>> -                GIC_PRI_IPI);
>>       for (i = 0; i < NR_GIC_SGI; i += 4)
>> -        writel_relaxed(priority,
>> +        writel_relaxed(GIC_PRI_IPI_ALL,
>>                   GICD_RDIST_SGI_BASE + GICR_IPRIORITYR0 + (i / 4) * 4);
>>   -    priority = (GIC_PRI_IRQ << 24 | GIC_PRI_IRQ << 16 | GIC_PRI_IRQ << 8 |
>> -                GIC_PRI_IRQ);
>>       for (i = NR_GIC_SGI; i < NR_GIC_LOCAL_IRQS; i += 4)
>> -        writel_relaxed(priority,
>> +        writel_relaxed(GIC_PRI_IRQ_ALL,
>>                   GICD_RDIST_SGI_BASE + GICR_IPRIORITYR0 + (i / 4) * 4);
>>         /*
>> diff --git a/xen/arch/arm/include/asm/gic.h b/xen/arch/arm/include/asm/gic.h
>> index c7f0c343d1..69ceac36b1 100644
>> --- a/xen/arch/arm/include/asm/gic.h
>> +++ b/xen/arch/arm/include/asm/gic.h
>> @@ -143,10 +143,14 @@
>>    *
>>    * A GIC must support a mimimum of 16 priority levels.
>>    */
>> -#define GIC_PRI_LOWEST     0xf0
>> -#define GIC_PRI_IRQ        0xa0
>> -#define GIC_PRI_IPI        0x90 /* IPIs must preempt normal interrupts */
>> -#define GIC_PRI_HIGHEST    0x80 /* Higher priorities belong to Secure-World */
>> +#define GIC_PRI_LOWEST     0xf0U
>> +#define GIC_PRI_IRQ        0xa0U
>> +#define GIC_PRI_IRQ_ALL    ((GIC_PRI_IRQ << 24) | (GIC_PRI_IRQ << 16) |\
>> +                            (GIC_PRI_IRQ << 8) | GIC_PRI_IRQ)
>> +#define GIC_PRI_IPI        0x90U /* IPIs must preempt normal interrupts */
>> +#define GIC_PRI_IPI_ALL    ((GIC_PRI_IPI << 24) | (GIC_PRI_IPI << 16) |\
>> +                            (GIC_PRI_IPI << 8) | GIC_PRI_IPI)
> This is matter of taste. I think it would read better to keep GIC_PRI_{LOWEST, IRQ, IPI, HIGHEST} defined together and then define *_ALL separately.
> 
Ok, I will do this in v2.
>> +#define GIC_PRI_HIGHEST    0x80U /* Higher priorities belong to Secure-World */
> 
> NIT: While you are there, I would suggest to add a newline here. So we separate priority definitions from handy helpers.
> 
Ok.
>>   #define GIC_PRI_TO_GUEST(pri) (pri >> 3) /* GICH_LR and GICH_VMCR only support
>>                                               5 bits for guest irq priority */
> 
> Other than that. The patch itself looks good to me. So:
> 
> Acked-by: Julien Grall <jgrall@amazon.com>
> 
> Cheers,
> 

Cheers,
Michal


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 09:59:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 09:59:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282151.480747 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPLlW-00039v-MD; Wed, 02 Mar 2022 09:59:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282151.480747; Wed, 02 Mar 2022 09:59:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPLlW-00039o-JI; Wed, 02 Mar 2022 09:59:26 +0000
Received: by outflank-mailman (input) for mailman id 282151;
 Wed, 02 Mar 2022 09:59:25 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=6jXW=TN=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nPLlV-00039i-2m
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 09:59:25 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id 6f87a080-9a0f-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 10:59:23 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 5F4E2139F;
 Wed,  2 Mar 2022 01:59:22 -0800 (PST)
Received: from e129167.arm.com (unknown [10.57.71.82])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 9A09B3F66F;
 Wed,  2 Mar 2022 01:59:20 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6f87a080-9a0f-11ec-8eba-a37418f5ba1a
From: Michal Orzel <michal.orzel@arm.com>
To: xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Julien Grall <jgrall@amazon.com>
Subject: [PATCH v2] xen/arm: gic: Introduce GIC_PRI_{IRQ/IPI}_ALL
Date: Wed,  2 Mar 2022 10:59:11 +0100
Message-Id: <20220302095911.161259-1-michal.orzel@arm.com>
X-Mailer: git-send-email 2.25.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Introduce macros GIC_PRI_IRQ_ALL and GIC_PRI_IPI_ALL to be used in all
the places where we want to set default priority for all the offsets
in interrupt priority register. This will improve readability and
allow to get rid of introducing variables just to store this value.

Take the opportunity to mark GIC_PRI_{IRQ/IPI} as unsigned values
to suppress static analyzer warnings as they are used in expressions
exceeding integer range (shifting into signed bit). Modify also other
priority related macros to be coherent.

Signed-off-by: Michal Orzel <michal.orzel@arm.com>
Acked-by: Julien Grall <jgrall@amazon.com>
---
Changes since v1:
-separate priority definitions from handy helpers
---
 xen/arch/arm/gic-v2.c          | 12 +++---------
 xen/arch/arm/gic-v3.c          | 16 +++-------------
 xen/arch/arm/include/asm/gic.h | 13 +++++++++----
 3 files changed, 15 insertions(+), 26 deletions(-)

diff --git a/xen/arch/arm/gic-v2.c b/xen/arch/arm/gic-v2.c
index b2adc8ec9a..2cc2f6bc18 100644
--- a/xen/arch/arm/gic-v2.c
+++ b/xen/arch/arm/gic-v2.c
@@ -373,9 +373,7 @@ static void __init gicv2_dist_init(void)
 
     /* Default priority for global interrupts */
     for ( i = 32; i < nr_lines; i += 4 )
-        writel_gicd(GIC_PRI_IRQ << 24 | GIC_PRI_IRQ << 16 |
-                    GIC_PRI_IRQ << 8 | GIC_PRI_IRQ,
-                    GICD_IPRIORITYR + (i / 4) * 4);
+        writel_gicd(GIC_PRI_IRQ_ALL, GICD_IPRIORITYR + (i / 4) * 4);
 
     /* Disable all global interrupts */
     for ( i = 32; i < nr_lines; i += 32 )
@@ -403,15 +401,11 @@ static void gicv2_cpu_init(void)
 
     /* Set SGI priorities */
     for ( i = 0; i < 16; i += 4 )
-        writel_gicd(GIC_PRI_IPI << 24 | GIC_PRI_IPI << 16 |
-                    GIC_PRI_IPI << 8 | GIC_PRI_IPI,
-                    GICD_IPRIORITYR + (i / 4) * 4);
+        writel_gicd(GIC_PRI_IPI_ALL, GICD_IPRIORITYR + (i / 4) * 4);
 
     /* Set PPI priorities */
     for ( i = 16; i < 32; i += 4 )
-        writel_gicd(GIC_PRI_IRQ << 24 | GIC_PRI_IRQ << 16 |
-                    GIC_PRI_IRQ << 8 | GIC_PRI_IRQ,
-                    GICD_IPRIORITYR + (i / 4) * 4);
+        writel_gicd(GIC_PRI_IRQ_ALL, GICD_IPRIORITYR + (i / 4) * 4);
 
     /* Local settings: interface controller */
     /* Don't mask by priority */
diff --git a/xen/arch/arm/gic-v3.c b/xen/arch/arm/gic-v3.c
index 9a3a175ad7..3c472ed768 100644
--- a/xen/arch/arm/gic-v3.c
+++ b/xen/arch/arm/gic-v3.c
@@ -594,7 +594,6 @@ static void gicv3_set_irq_priority(struct irq_desc *desc,
 static void __init gicv3_dist_init(void)
 {
     uint32_t type;
-    uint32_t priority;
     uint64_t affinity;
     unsigned int nr_lines;
     int i;
@@ -621,11 +620,7 @@ static void __init gicv3_dist_init(void)
 
     /* Default priority for global interrupts */
     for ( i = NR_GIC_LOCAL_IRQS; i < nr_lines; i += 4 )
-    {
-        priority = (GIC_PRI_IRQ << 24 | GIC_PRI_IRQ << 16 |
-                    GIC_PRI_IRQ << 8 | GIC_PRI_IRQ);
-        writel_relaxed(priority, GICD + GICD_IPRIORITYR + (i / 4) * 4);
-    }
+        writel_relaxed(GIC_PRI_IRQ_ALL, GICD + GICD_IPRIORITYR + (i / 4) * 4);
 
     /* Disable/deactivate all global interrupts */
     for ( i = NR_GIC_LOCAL_IRQS; i < nr_lines; i += 32 )
@@ -806,7 +801,6 @@ static int __init gicv3_populate_rdist(void)
 static int gicv3_cpu_init(void)
 {
     int i, ret;
-    uint32_t priority;
 
     /* Register ourselves with the rest of the world */
     if ( gicv3_populate_rdist() )
@@ -826,16 +820,12 @@ static int gicv3_cpu_init(void)
     }
 
     /* Set priority on PPI and SGI interrupts */
-    priority = (GIC_PRI_IPI << 24 | GIC_PRI_IPI << 16 | GIC_PRI_IPI << 8 |
-                GIC_PRI_IPI);
     for (i = 0; i < NR_GIC_SGI; i += 4)
-        writel_relaxed(priority,
+        writel_relaxed(GIC_PRI_IPI_ALL,
                 GICD_RDIST_SGI_BASE + GICR_IPRIORITYR0 + (i / 4) * 4);
 
-    priority = (GIC_PRI_IRQ << 24 | GIC_PRI_IRQ << 16 | GIC_PRI_IRQ << 8 |
-                GIC_PRI_IRQ);
     for (i = NR_GIC_SGI; i < NR_GIC_LOCAL_IRQS; i += 4)
-        writel_relaxed(priority,
+        writel_relaxed(GIC_PRI_IRQ_ALL,
                 GICD_RDIST_SGI_BASE + GICR_IPRIORITYR0 + (i / 4) * 4);
 
     /*
diff --git a/xen/arch/arm/include/asm/gic.h b/xen/arch/arm/include/asm/gic.h
index c7f0c343d1..b3c6c67933 100644
--- a/xen/arch/arm/include/asm/gic.h
+++ b/xen/arch/arm/include/asm/gic.h
@@ -143,10 +143,15 @@
  *
  * A GIC must support a mimimum of 16 priority levels.
  */
-#define GIC_PRI_LOWEST     0xf0
-#define GIC_PRI_IRQ        0xa0
-#define GIC_PRI_IPI        0x90 /* IPIs must preempt normal interrupts */
-#define GIC_PRI_HIGHEST    0x80 /* Higher priorities belong to Secure-World */
+#define GIC_PRI_LOWEST     0xf0U
+#define GIC_PRI_IRQ        0xa0U
+#define GIC_PRI_IPI        0x90U /* IPIs must preempt normal interrupts */
+#define GIC_PRI_HIGHEST    0x80U /* Higher priorities belong to Secure-World */
+#define GIC_PRI_IRQ_ALL    ((GIC_PRI_IRQ << 24) | (GIC_PRI_IRQ << 16) |\
+                            (GIC_PRI_IRQ << 8) | GIC_PRI_IRQ)
+#define GIC_PRI_IPI_ALL    ((GIC_PRI_IPI << 24) | (GIC_PRI_IPI << 16) |\
+                            (GIC_PRI_IPI << 8) | GIC_PRI_IPI)
+
 #define GIC_PRI_TO_GUEST(pri) (pri >> 3) /* GICH_LR and GICH_VMCR only support
                                             5 bits for guest irq priority */
 
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 10:13:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 10:13:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282158.480759 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPLyb-0005ik-UE; Wed, 02 Mar 2022 10:12:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282158.480759; Wed, 02 Mar 2022 10:12:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPLyb-0005id-Qo; Wed, 02 Mar 2022 10:12:57 +0000
Received: by outflank-mailman (input) for mailman id 282158;
 Wed, 02 Mar 2022 10:12:56 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5HSw=TN=citrix.com=prvs=05368ea7b=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nPLya-0005iX-Ks
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 10:12:56 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 5232b3ad-9a11-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 11:12:54 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5232b3ad-9a11-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646215974;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=KShpUDFeDNO7NDkerg4z+iS5J1YnB7SYSH43894WEo4=;
  b=Olxy2OD5EDpyefGdqwVuYziXWnyUgmiNmjgRqMajjh8UFRIoublLwcQC
   FR2guR4SUJst7OYohpi3wvOeetKOJO8b4VAv7JfvVr7PA2TUvIBqoAr/x
   j4dEJpjJYPMTkbxG8h8bgh5EjCU/ckRaifYM0ISipFfaO8T2JdWxQ2ZCt
   4=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 64740714
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:cBgmYqNJ6RddtijvrR24l8FynXyQoLVcMsEvi/4bfWQNrUom0TRTn
 GUfXW2DOfmJZmf1fd92bYnj8R8PvMDWn4BhSAto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi2tQw27BVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Z6
 o535cC+RzkVZIbjh8A7dxVfL3sgMvgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALBc/nJo4A/FpnyinUF60OSpHfWaTao9Rf2V/cg+gQQamCP
 5VANVKDajycej93Cg89M64vwuCxr13fazpxjwis8P9fD2/7k1UqjemF3MDuUsyHQ4BZk1iVo
 krC/n/lGVcKOdqH0z2H/3mwwOjVkkvTR4Y6BLC+sPlwjzW7xGYeFRkXXluTuuSihwi1XNc3F
 qAP0nNw9+5orhXtF4SjGU3jyJKZgvICc/gLKb1m5g+z9vD/zBm9IEwISQIbNtNz4afaWgcW/
 lOOmtroAxlmv7uUVW+R+9+okN+iBcQGBTRcPHFZFGPp9/Gm+dhu1UyXEr6PBYbo1oWdJN3m/
 9ydQMHSbZ03hNVD6ai09Euvb9mE9smQFV5dCuk6swuYAuJFiGyNOtTABbvzt68owGOlor+p5
 iJsdy+2tr1mMH11vHbRKNjh5Znwjxp/DBXSgER0A74q/Cm39niocOh4uW8ieh43ap5VJ2a4O
 ic/XD+9ArcJZhNGioctPuqM5zkCl/C8RbwJqNiOBjaxXnSBXFDep3w/DaJh92vsjFItgckC1
 WSzKq6R4YIhIf0/llKeHr5FuZdyn3xW7T6DFPjTkkX8uZLDNSH9dFvwGAbXBgzPxPjf+1u9H
 hc2H5bi9iizp8WlOniHqdNIdAtSRZX5bLivw/Fqmie4ClMOMEkqCuPLwKNnfIpgnq9PkfzP8
 G37UUhdoGcTT1WeQelWQhiPsI/SYKs=
IronPort-HdrOrdr: A9a23:BufCV6AT2g61TAblHegMsceALOsnbusQ8zAXPh9KJyC9I/b2qy
 nxppgmPEfP+UossHFJo6HlBEEZKUmsu6KdkrNhQotKOzOW+VdATbsSorcKpgeAJ8SQzJ8k6U
 4NSdkdNDS0NykGsS+Y2nj5Lz9D+qj9zEnAv463pB0BLXAIV0gj1XYCNu/yKDwteOAsP+tfKH
 Po3Ls/m9PWQwVwUi3UPAhhY8Hz4/nw0L72ax8PABAqrCOUiymz1bL8Gx+Emj8DTjJm294ZgC
 v4uj28wp/mn+Cwyxfa2WOWxY9RgsHdxtxKA9HJotQJKw/rlh2jaO1aKv+/VXEO0aSSAWQR4Z
 7xSiQbToJOArTqDziISC7Wqk3dOfAVmiffIBGj8CDeSIfCNUwH4oJ69PNkm13imhcdVZhHod
 F2NyjyjesmMTrQ2Cv6/NTGTBdsiw69pmcji/caizhFXZIZc6I5l/1UwKp5KuZJIMvB0vFtLA
 CuNrCq2N9GNVeBK3zJtGhmx9KhGnw1AxedW0AH/siYySJfknx1x1YRgJV3pAZNyLstD51fo+
 jUOKVhk79DCscQcKJmHe8EBc+6EHbETx7AOH+bZV7nCKYEMXTQrIOf2sR52Mi6PJgTiJcikp
 XIV11V8WY0ZkL1EMWLmIZG9xjcKV/NFAgFCvsukaSRloeMMYYDaxfzOmzGu/HQ18kiPg==
X-IronPort-AV: E=Sophos;i="5.90,148,1643691600"; 
   d="scan'208";a="64740714"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=feUIOFZZOYllMcP8kQO0pJchqjnMXh1QD6b1l4fLjAJYJ6Uh2TSbySRkG4Oawoitgmh8E42ZRqT3hDnBtOUCTqaw271nfH3RAMYIIK5Wi3U/XRDRGpO8Ul1PVj2jxTh1Jtk2DkTMtx7RS4mrpuzS0K7AguXf97gnID6YrA0EKZvYZs9XQdJU+Hns1y13siDiCmcNUAuln3Pu1vd5hoUm0bDeIu8hlj3h8IsdnKxg7+f/s0CINd7Y2cL0nooLgzZ/bfBR8n/YYTaEcMWRtixBSL8x2JFwW2e+akMdPCuOUhA8TXIaORzWFDnsguOPybFzO6XWn7Gx5rBcjWjN6GER9w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=KShpUDFeDNO7NDkerg4z+iS5J1YnB7SYSH43894WEo4=;
 b=ksVc2mEyuF2uRKC/i9aRiQXxlA1VN/w3uaRAIsir+RYDmLF12g76zmNbWon3uESUy7iQp4HuoYAVbdJirOkQmGygyIkKtshL1vuS8rJx8Q7nu6chLg2RZX9oSj0xWxOcq/+XS0/TyfyzmuZMuxxsFMhWro7o4qcDeazO1hJ9RP2Gv1sd7ZFVGQM8XoObJTOSN6Orht6MB0KZPR2hRP7+AvB+Fsrw5JOaUO8NzPQ4CQrsSuh6oXFUhf6ig57qNRUhQwxiTMi/D0rbWy1iZMbAzc8kqPBAayajudOAI6CBFJeuDfbZ89yHNZllGpp8CgWktRearyMpGBeAw2S5+9myzA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=KShpUDFeDNO7NDkerg4z+iS5J1YnB7SYSH43894WEo4=;
 b=lnVXKnwMm8QBFDoF+y9h+zsohRKIXvN8GAENuH6kGynHuKkf13h0Y0m3Qh/I/a1RydTJKSpNnsz3Ao0J9EjGEmncGirncdAQaP6G+oIQAAvNHJ6wN/HT9UjbRDfXhDpndBrwID2ffLDvpPkhY6PghbcVbnTQF7zKeeiEW4fqmuE=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>, Xen-devel
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v2.2 8/7] x86/IOMMU: Use altcall, and
 __initconst_cf_clobber
Thread-Topic: [PATCH v2.2 8/7] x86/IOMMU: Use altcall, and
 __initconst_cf_clobber
Thread-Index: AQHYJ+IV6PtRJY8p5U2wBnUH9jKzdqyj8n0AgAa3aoCAASBXAIAAIhyA
Date: Wed, 2 Mar 2022 10:12:45 +0000
Message-ID: <e41848a6-9aaa-f0d3-0c81-2e0e4e96a6a4@citrix.com>
References: <20220214125632.24563-1-andrew.cooper3@citrix.com>
 <20220222114711.19209-1-andrew.cooper3@citrix.com>
 <e8b71b3a-55a0-31a2-b2ab-3b2470680709@suse.com>
 <5fae516a-17c1-0ce4-c46e-909a83c0e273@citrix.com>
 <60f3c942-3822-87dd-df6e-8b64ed4d17c4@suse.com>
In-Reply-To: <60f3c942-3822-87dd-df6e-8b64ed4d17c4@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 77f4eecc-774e-4f7f-a884-08d9fc353263
x-ms-traffictypediagnostic: BYAPR03MB3813:EE_
x-microsoft-antispam-prvs: <BYAPR03MB381323391EF9C41FFA79A4A0BA039@BYAPR03MB3813.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: mKF1N7NkrnkWl0W52NB6IOqPV6YO3DsnWUaqunhugCsEKPxWJzvvxyWbOimTll8P3dDruFHl9NGZ1jG1YVLfh+dTLiwkB2fky7gHAZ53NiQKgYNbkrRsz2/Vdf3oRUpfpY2ya2r4vqSRQN3HspVyT3xOR4k+aaAQPoDnDp9xK+ggdukf6/XK+qZG7VlGUOyOZJzxXXofa0bqR7mWzhoehz7pD9qNpHElGNfosMJu4/6XOGozlaWZpO2UkQTC6LYAUTd2Y2AD9JvNoDtbox833Q2XxZN2BPk1opy5Kkb0wzw/91l+3BLGngn6FBPjEs4L2lvOXPQxWyFgZ2AxjF47Iqd3LLi16PMJmV1AmSv1cPdwej2OFQ29slVRD34ne/VktNAWl9u6R+QpxkBhxbzN5SEq+X5383/NabvZI5VEvJe/ETV8j226xj6nXgRRhF4FTkvFzt4ka63sTSArzyyPM9K/Z3vrqszpz8Ls3bLxwi50iOpgBENNHdTBshFET+5KLn8vbQreWzP87TyZ5nu2gVQm0o8ckeja7DhDv0WnQbVob5DirIDPt1c1/oTIiV4mqc2s2u/AEFaPTQm8jCnyjwjhfSsAfWDHNK13Lu32KrmwwZO/RGV1njyhYIDI7FQDIHvw5FR8fl8QuPj+R1xkQGmYN5gyPP+unMjFyxGXvKFml3CmE1QDdxrDhH2w0ZG7UPr0VYn1r5os5Pu6sOcmtdUKkoPCjB+ZOwaNFDh3WQH33LsmTWtkW7vrM8WDkz/gdblFNu53l9lRoQBn7xnF2A==
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(54906003)(76116006)(186003)(8936002)(31686004)(91956017)(66946007)(6916009)(64756008)(8676002)(316002)(66476007)(2616005)(86362001)(66556008)(66446008)(26005)(82960400001)(36756003)(6512007)(53546011)(2906002)(31696002)(122000001)(38100700002)(6486002)(5660300002)(4326008)(71200400001)(38070700005)(6506007)(83380400001)(508600001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?Z1pLV0lKYUZWY0xFMElGTzIrWVJ6YnRhVUxlRmlDUHdRNHRrUC9rVWVrU2Fo?=
 =?utf-8?B?SDdCemNTNjRGS2xpWkNGcVNSNWJkK1I5R1JzN0hlczNEMU96VExlMDZXcERB?=
 =?utf-8?B?Q3BrSnBaMEkxWVM2SG1lRkdEWFI1SUVBdjdPMUV1S1RwS04wd3VvNW5TbFo5?=
 =?utf-8?B?aUkvOE40MHNBV1ROS0UxdGhxY2gySlZHakh5bVNSOWkxR08zenR1NFBvVkR3?=
 =?utf-8?B?MDNGTnlISjF6a0M3RWFwcGc2NlBaSDkwK0xWd1NtQndWVFZ2bG42NUZWQXo0?=
 =?utf-8?B?UGdvSTJxUlJrcWtMbWNtN3hwUk5EVW5MUmsxK2s5akovNlR4N2c3Si9LcC9i?=
 =?utf-8?B?ZGYrekdIYnNpZis1dkdBWkQ2M2krWkRYelA3U1BCd055MXRDcGlwRm5HNkpT?=
 =?utf-8?B?L3VKZWFWdWpsOEtCK3h2S1ZMaytjRUxiVzY4NlBZU01reG1RU21QY0g1OG1Y?=
 =?utf-8?B?K1krdEhtamYwWlRTRnU1K2c2Um9Ea1hFYk9CWmtVaFlnNFZNZmVEZFU3eG13?=
 =?utf-8?B?V1dIUW1TV3NrR2Q2Z2F6cDFjVk0yREJiOFk3aFpPUGh6d3BJekMwQzc0dVAw?=
 =?utf-8?B?ZEpaaE8wWmthcWozZ0ExalM1Z0Y4NGJtUFNHUHBIb2lyRVhORldEdy9nTmFM?=
 =?utf-8?B?V0wrTDJQa3cwZjZpR0ZZamU2TEkyMXZMb3cxNVpTRURsQ3hPWmNJSFpYaTJC?=
 =?utf-8?B?eDB1QnpMYVRVcURLanZtSm9mcGFvR0xvalJHbExWVUFDNDFPeFd2ZGY5RU5K?=
 =?utf-8?B?cjJuOWRRQ2l0MmswZXRnaG9WN1A5ZFI4bHlvS2FBeWpId0xnWDM1YThTVjkv?=
 =?utf-8?B?eW8xVzdtVE0xOTRoRDNaZXhJeks1S3p2STRDTGtidS9Jdi9yV1BjM3JFaEFN?=
 =?utf-8?B?UDV1a3ZUeTRzTEo1NkRZRWZVR3ExSUdsY0NzUDhQMHNvdXZPam1BM1BraFdM?=
 =?utf-8?B?aHpXV3lPeVZZTHJwbEs1Vk9zL2tWaDlraU1hZGhBQWJ0Y2FYdzZSTWlkcUtS?=
 =?utf-8?B?MW9rYnhxUjlJaWVVUkNJdGhpK3N1NHRyTmR5YXphRmRRV0hrbTdBbFR2UjNL?=
 =?utf-8?B?bUhyVktMYjliL0NPSjhpK2JGTmFDcmplNFMzTVZieHgxV0pXWWRqTko4V3Ny?=
 =?utf-8?B?OFpqUyszVUhYRXpJQ3QxWk9rdDBrZTlrUDZVcWg4YXdYRUVCQ1VqYXlwNzRN?=
 =?utf-8?B?Z0ltY1FpWHBZSktPSnhMS1ZJTXNJcmNpaTF3WFRieWxZZ2JzNlJlYysxWmc0?=
 =?utf-8?B?L3gyRHE0eVE0a0Jwd1Z6L0MwdUlXNkRhS3M0WGVnaHA0bVExemY3RVVzdzIz?=
 =?utf-8?B?MnBod2VyaGpWQjZsQWEySjRHNk5FMVFCMlVSZGJyMkhlV3UxNGRZTUhPTFpZ?=
 =?utf-8?B?QW9HWE1odGhHYWpxeDk0ZW8yMWhZVmd0dWgwMExtalZLUVZ0KzJLM0t2dG52?=
 =?utf-8?B?ZmJrY296VzZWMXFRNU1wWHFYTThHRDRmTHlhNGR5d3QxbHFWNWtFNFFRM0Zr?=
 =?utf-8?B?WU15RzFBOEtGZDdsYU1pdTFpMHliL1BReCtHZFFQdkxvY2tIOThzOFRIdklr?=
 =?utf-8?B?UkhKTG1BQjdHSi9oaFJLYmYvSE80Z1RKUWoxWVpTVmhHemhUQmNCYUZxUGd2?=
 =?utf-8?B?TVU5UEhCdE5JVFdLWFBCMWVMZldjeG1yeVhoQWNlaFdvdWFTb0VvdTlXNnR0?=
 =?utf-8?B?UEJHaHluQkk3ZG9WeTUzTmJ1K2hUQmZDQnNpODNlTW9yV3IvckV5YnVMU1k2?=
 =?utf-8?B?a2RTaEEvYW1CUDZYNldMWWJZenhlbkhpeU1sUWsvTHlQTTNxYXY0amhjbUNm?=
 =?utf-8?B?T2dHeWJhZHJDbTBEVXpaMVRSVWRBNXBVOXEybm5zaWxnMFFxeEVsSHJLcDc5?=
 =?utf-8?B?amhHYjlXd1JIaHhPdWMvNDZqcWNrdjhYMzNxMGNpS0E4Vzd6ejJENm5udmF1?=
 =?utf-8?B?ajExNUk3WWphbURBZ2JWV3d5c3QzWURtbXNPNDNXSENOZStNbFo2YVFWUnd3?=
 =?utf-8?B?NmxCcGlPVlF2NFQ4VWQ0czV0Y1ZTRGxsd09lSi9mdTk2Ly9GektkVnk4VEdN?=
 =?utf-8?B?b09MVnBSKzg0cEkrRER3bFZ0V1BxNmdLdFcyc0RmVUZvZlE4VGZGaHBNTmkv?=
 =?utf-8?B?b3hwb1VuanRmZElhSStqZmdhTlJHRG43SCswWW5PeUNFU2xFNDdtbWdPOHg3?=
 =?utf-8?B?ZzUzQW9qc09CZWZxdXZYOUIyVXRMY0VUZks3WXFyQU5VVGdLYmxBM09aMHhv?=
 =?utf-8?B?MHdPcTczb2tlYUdSV0lhZEhvV2xBPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <4F5A7A79D5E24F4286B04841F4144DB5@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 77f4eecc-774e-4f7f-a884-08d9fc353263
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Mar 2022 10:12:45.7400
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ucXagEDUjHnz81FjuwX4PEGV3CqW7cX913e0LUeCy8SviAWl6Ox4mQ/Imib1zB7GP4D9i9YxEKrXuiqX+URu4je+YzjUSAuoxw2K7BTyPhI=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB3813
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Wed Mar 02 10:25:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 10:25:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282165.480770 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPMAH-0007RC-2T; Wed, 02 Mar 2022 10:25:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282165.480770; Wed, 02 Mar 2022 10:25:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPMAG-0007R5-Tt; Wed, 02 Mar 2022 10:25:00 +0000
Received: by outflank-mailman (input) for mailman id 282165;
 Wed, 02 Mar 2022 10:24:58 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nPMAE-0007Qy-SV
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 10:24:58 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nPMAE-0002k9-F7; Wed, 02 Mar 2022 10:24:58 +0000
Received: from 54-240-197-224.amazon.com ([54.240.197.224]
 helo=[192.168.10.166]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nPMAE-0001tM-9S; Wed, 02 Mar 2022 10:24:58 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=4uvfLopOFXXpP9IPakmYMMfm7KZs0MhHhWTR090+4PY=; b=t1uqdmYuEq/lslnZigPZmri9E6
	RAV/Qo4NQjyBjeCHVoA059EDu3ro28VecxJxkUUsOd51ROQnJUS/0yR9LN46PPPe05WSXPmAHSOoa
	Va1Zh2/Nuw/bAuD6Qj/D6D3hpti9HFzLTog/RP6lIVfnSKdJDGUbOpdtixAsLss0L2uo=;
Message-ID: <5eb5fe51-9ef7-affe-06e1-b15da512a76c@xen.org>
Date: Wed, 2 Mar 2022 10:24:56 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: Proposal for Porting Xen to Armv8-R64 - DraftA
To: Wei Chen <Wei.Chen@arm.com>, Stefano Stabellini <sstabellini@kernel.org>
Cc: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Bertrand Marquis <Bertrand.Marquis@arm.com>,
 Penny Zheng <Penny.Zheng@arm.com>, Henry Wang <Henry.Wang@arm.com>,
 nd <nd@arm.com>
References: <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2202241606450.239973@ubuntu-linux-20-04-desktop>
 <AS1PR08MB74269923288B75097392BDD99E3E9@AS1PR08MB7426.eurprd08.prod.outlook.com>
 <4c558f8f-56d4-0445-32d4-169bc5d0a3bc@xen.org>
 <PAXPR08MB74200F4B0B4EFFD5BE1A6E699E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <7260f050-9022-4adf-618b-a8b271aca8c3@xen.org>
 <PAXPR08MB7420B367FFEB4FD3A7C88EB79E039@PAXPR08MB7420.eurprd08.prod.outlook.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <PAXPR08MB7420B367FFEB4FD3A7C88EB79E039@PAXPR08MB7420.eurprd08.prod.outlook.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi Wei,

On 02/03/2022 06:43, Wei Chen wrote:
>> -----Original Message-----
>> From: Julien Grall <julien@xen.org>
>> Sent: 2022年3月1日 21:17
>> To: Wei Chen <Wei.Chen@arm.com>; Stefano Stabellini
>> <sstabellini@kernel.org>
>> Cc: xen-devel@lists.xenproject.org; Bertrand Marquis
>> <Bertrand.Marquis@arm.com>; Penny Zheng <Penny.Zheng@arm.com>; Henry Wang
>> <Henry.Wang@arm.com>; nd <nd@arm.com>
>> Subject: Re: Proposal for Porting Xen to Armv8-R64 - DraftA
>>
>> On 01/03/2022 06:29, Wei Chen wrote:
>>> Hi Julien,
>>
>> Hi,
>>
>>>> -----Original Message-----
>>>> From: Julien Grall <julien@xen.org>
>>>> Sent: 2022年2月26日 4:12
>>>> To: Wei Chen <Wei.Chen@arm.com>; Stefano Stabellini
>>>> <sstabellini@kernel.org>
>>>> Cc: xen-devel@lists.xenproject.org; Bertrand Marquis
>>>> <Bertrand.Marquis@arm.com>; Penny Zheng <Penny.Zheng@arm.com>; Henry
>> Wang
>>>> <Henry.Wang@arm.com>; nd <nd@arm.com>
>>>> Subject: Re: Proposal for Porting Xen to Armv8-R64 - DraftA
>>>>
>>>> Hi Wei,
>>>>
>>>> On 25/02/2022 10:48, Wei Chen wrote:
>>>>>>>        Armv8-R64 can support max to 256 MPU regions. But that's just
>>>>>> theoretical.
>>>>>>>        So we don't want to define `pr_t mpu_regions[256]`, this is a
>>>> memory
>>>>>> waste
>>>>>>>        in most of time. So we decided to let the user specify through
>> a
>>>>>> Kconfig
>>>>>>>        option. `CONFIG_ARM_MPU_EL1_PROTECTION_REGIONS` default value
>> can
>>>> be
>>>>>> `32`,
>>>>>>>        it's a typical implementation on Armv8-R64. Users will
>> recompile
>>>> Xen
>>>>>> when
>>>>>>>        their platform changes. So when the MPU changes, respecifying
>> the
>>>>>> MPU
>>>>>>>        protection regions number will not cause additional problems.
>>>>>>
>>>>>> I wonder if we could probe the number of MPU regions at runtime and
>>>>>> dynamically allocate the memory needed to store them in arch_vcpu.
>>>>>>
>>>>>
>>>>> We have considered to used a pr_t mpu_regions[0] in arch_vcpu. But it
>>>> seems
>>>>> we will encounter some static allocated arch_vcpu problems and sizeof
>>>> issue.
>>>>
>>>> Does it need to be embedded in arch_vcpu? If not, then we could
>> allocate
>>>> memory outside and add a pointer in arch_vcpu.
>>>>
>>>
>>> We had thought to use a pointer in arch_vcpu instead of embedding
>> mpu_regions
>>> into arch_vcpu. But we noticed that arch_vcpu has a __cacheline_aligned
>>> attribute, this may be because of arch_vcpu will be used very frequently
>>> in some critical path. So if we use the pointer for mpu_regions, may
>> cause
>>> some cache miss in these critical path, for example, in context_swtich.
>>
>>   From my understanding, the idea behind ``cacheline_aligned`` is to
>> avoid the struct vcpu to be shared with other datastructure. Otherwise
>> you may end up to have two pCPUs to frequently write the same cacheline
>> which is not ideal.
>>
>> arch_vcpu should embbed anything that will be accessed often (e.g.
>> entry/exit) to certain point. For instance, not everything related to
>> the vGIC are embbed in the vCPU/Domain structure.
>>
>> I am a bit split regarding the mpu_regions. If they are mainly used in
>> the context_switch() then I would argue this is a premature optimization
>> because the scheduling decision is probably going to take a lot more
>> time than the context switch itself.
> 
> mpu_regions in arch_vcpu are used to save guest's EL1 MPU context. So, yes,
> they are mainly used in context_switch. In terms of the number of registers,
> it will save/restore more work than the original V8A. And on V8R we also need
> to keep most of the original V8A save/restore work. So it will take longer
> than the original V8A context_switch. And I think this is due to architecture's
> difference. So it's impossible for us not to save/restore EL1 MPU region
> registers in context_switch. And we have done some optimization for EL1 MPU
> save/restore:
> 1. Assembly code for EL1 MPU context_switch

This discussion reminds me when KVM decided to rewrite their context 
switch from assembly to C. The outcome was the compiler is able to do a 
better job than us when it comes to optimizing.

With a C version, we could also share the save/restore code with 32-bit 
and it is easier to read/maintain.

So I would suggest to run some numbers to check if it really worth 
implementing the MPU save/restore in assembly.

> 2. Use real MPU regions number instead of CONFIG_ARM_MPU_EL1_PROTECTION_REGIONS
>     in context_switch. CONFIG_ARM_MPU_EL1_PROTECTION_REGIONS is defined the Max
>     supported EL1 MPU regions for this Xen image. All platforms that implement
>     EL1 MPU regions in this range can work well with this Xen Image. But if the
>     implemented EL1 MPU region number exceeds CONFIG_ARM_MPU_EL1_PROTECTION_REGIONS,
>     this Xen image could not work well on this platform.

This sounds similar to the GICv3. The number of LRs depends on the 
hardware. See how we dealt with it in gicv3_save_lrs().

>    
>>
>> Note that for the P2M we already have that indirection because it is
>> embbed in the struct domain.
> 
> It's different with V8A P2M case. In V8A context_switch we just need to
> save/restore VTTBR, we don't need to do P2M table walk. But on V8R, we
> need to access valid mpu_regions for save/restore.

The save/restore for the P2M is a bit more complicated than simply 
save/restore the VTTBR. But yes, I agree the code for the MPU will 
likely be more complicated.

> 
>>
>> This raises one question, why is the MPUs regions will be per-vCPU
>> rather per domain?
>>
> 
> Because there is a EL1 MPU component for each pCPU. We can't assume guest
> to use the same EL1 MPU configuration for all vCPU.

Ah. Sorry, I thought you were referring to whatever Xen will use to 
prevent the guest accessing outside of its designated region.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 10:28:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 10:28:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282174.480781 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPMDS-0008O9-K0; Wed, 02 Mar 2022 10:28:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282174.480781; Wed, 02 Mar 2022 10:28:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPMDS-0008O2-Go; Wed, 02 Mar 2022 10:28:18 +0000
Received: by outflank-mailman (input) for mailman id 282174;
 Wed, 02 Mar 2022 10:28:17 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPMDR-0008Ns-OK; Wed, 02 Mar 2022 10:28:17 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPMDR-0002oW-Jw; Wed, 02 Mar 2022 10:28:17 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPMDR-00083N-9m; Wed, 02 Mar 2022 10:28:17 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPMDR-0005WM-9I; Wed, 02 Mar 2022 10:28:17 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=kyjf7Cxxrs3a4Eo224DHZ09y++qDmbO5WamKgM2RasA=; b=u08Up/KWWsHaeNIZhHqDz0MWY4
	z5dzVxocK5enEH50OQEzdwc1SBi7MPzxrQI6ppISnpRewuJzzZpvHRnnkZZudokkdOzDkMc3lFPWw
	3B6jwvDQUpGq9VrAB+t6lJg7zpD3KTyKu6kfUthjuq/acJUyAbRtisewc340YmX+PjMg=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168329-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168329: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=dc39554d58af4a50b50eca1f57c49415a12b0c98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 02 Mar 2022 10:28:17 +0000

flight 168329 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168329/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 dc39554d58af4a50b50eca1f57c49415a12b0c98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    1 days
Failing since        168258  2022-03-01 01:55:31 Z    1 days   15 attempts
Testing same since   168316  2022-03-02 02:50:20 Z    0 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit dc39554d58af4a50b50eca1f57c49415a12b0c98
Author: Xiaolu.Jiang <xiaolu.jiang@intel.com>
Date:   Tue Feb 22 22:14:05 2022 +0800

    edk2/MdeModulePkg/Debuglib: Add Standalone MM support
    
    https://bugzilla.tianocore.org/show_bug.cgi?id=3844
    
    This change added Standalone MM instance of DebugLib.
    
    Reviewd-by: Jian J Wang <jian.j.wang@intel.com>
    Reviewd-by: Liming Gao <gaoliming@byosoft.com.cn>
    
    Signed-off-by: Xiaolu.Jiang <xiaolu.jiang@intel.com>

commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 10:34:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 10:34:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282185.480792 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPMJn-0001Nt-Bz; Wed, 02 Mar 2022 10:34:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282185.480792; Wed, 02 Mar 2022 10:34:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPMJn-0001Nm-8M; Wed, 02 Mar 2022 10:34:51 +0000
Received: by outflank-mailman (input) for mailman id 282185;
 Wed, 02 Mar 2022 10:34:50 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=cGAx=TN=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPMJm-0001Ng-Ae
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 10:34:50 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6282b247-9a14-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 11:34:48 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2110.outbound.protection.outlook.com [104.47.17.110]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-40-conUHcwJOCa4Df_h8YlQlQ-1; Wed, 02 Mar 2022 11:34:47 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB7PR04MB4299.eurprd04.prod.outlook.com (2603:10a6:5:23::21) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Wed, 2 Mar
 2022 10:34:46 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Wed, 2 Mar 2022
 10:34:46 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6282b247-9a14-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646217288;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=dmtRXkNm8o6QvTiZB5cYk8DL7WcNj2rLA6YWCfutXt4=;
	b=Mc4R7d1W1+kzuXOBqBddO16lqDLs2OgCTnFNnj1EMycI6J/HGUblURHNL0owB1i8Q/wgLp
	mVGhB+KDuUKLJR6Q+dRwRxqKUIkgUuqG59JcW1zmo4wvtLm0D7k0GDaAG0ufVc0yHiQb+B
	JsbF+awrhKjz/ui5ThSic36otHigOEc=
X-MC-Unique: conUHcwJOCa4Df_h8YlQlQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=G0FZlPMbRNXySYYnbPD68a19cNjPiFKYwnq43HTwSENA11ZcQ5BU7i90ouFQuN5LoKmqj7tF1pkFAtqbjeBTRkVAbJs9n687yc3iL+JofhTBUW0vFNVzawJFtPHO/hu3bc7tPKY6MVvL2zmDnaBWJqAvE53kNkrGLRe96Fg0p617PYsgEEYzL5JIMSNk2RWxTw8uAYdu/rzsv7f51IFsdjCCXVA2WhI9sosenLAClXHtpyoHmY0jRKRSD4Yj+dkAKIIjlhBEpF29DLPoy6DPaCHgW+M7z3qNwxgdvbB4a0wTE/SvSDBfjZTnRkcnXo7jHk9+oPvMpTUfexLLxcb1sQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=0Lf0OBWBxnjnxgVBYGzhfgzUzdicXERsBIsCzj8mHTw=;
 b=Wh0irMgyVHkj7m0gD6TL9G/OR98alJx0H/im0u9IdcBKx8jSEqJwSrk3JlIKLc5+1YredQYADVoShEFmSOhJB7KhhYr6/FJRISVMsj8QUU/tL96iTk6dsCbxuwV5kxultVLR7oldJbXWPfhbIrShQAy4d4+4dYPM2BKdWjWRyi/K3KxvQio/RYi8+yKYCx74vPcSkyr2Hi9eOQCZ/jp3A/oQThU7SjW8/wlzXKr61Qw57kPEdPyvCayQdPHAe8wQOqpHUavORjl7aBf6iHXCjd/05ThmCAO9cXGeI7RRvQObUt9keK33DKTPmhtnln02QaZfsEFyEE9Rjc+8W4EcAg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <67ff91f4-e5fe-47d5-fdb8-9a302beb6e2a@suse.com>
Date: Wed, 2 Mar 2022 11:34:44 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v2.2 8/7] x86/IOMMU: Use altcall, and
 __initconst_cf_clobber
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <20220214125632.24563-1-andrew.cooper3@citrix.com>
 <20220222114711.19209-1-andrew.cooper3@citrix.com>
 <e8b71b3a-55a0-31a2-b2ab-3b2470680709@suse.com>
 <5fae516a-17c1-0ce4-c46e-909a83c0e273@citrix.com>
 <60f3c942-3822-87dd-df6e-8b64ed4d17c4@suse.com>
 <e41848a6-9aaa-f0d3-0c81-2e0e4e96a6a4@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <e41848a6-9aaa-f0d3-0c81-2e0e4e96a6a4@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6P193CA0124.EURP193.PROD.OUTLOOK.COM
 (2603:10a6:209:85::29) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: b58e2113-41c5-4442-a05e-08d9fc384541
X-MS-TrafficTypeDiagnostic: DB7PR04MB4299:EE_
X-Microsoft-Antispam-PRVS:
	<DB7PR04MB429952EEB37EF5C692996CACB3039@DB7PR04MB4299.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6916009)(508600001)(5660300002)(26005)(6486002)(86362001)(31696002)(54906003)(2906002)(36756003)(38100700002)(8936002)(2616005)(4326008)(8676002)(66946007)(66476007)(66556008)(186003)(83380400001)(53546011)(6506007)(6512007)(316002)(31686004)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?biXtyQKcZEQXs4+eImQ9jidNE2OmBpTMPQJLwe6PvlaLrSMcey3SpRd9FQUd?=
 =?us-ascii?Q?punwx0sRMT+YqzcZ6hcL36gTjWJODtHT1P+upW2rKRFS8QxpAB3acLC9ZtA8?=
 =?us-ascii?Q?BNUiv9WbtJDaVlCsjqSTra0k2241AZzqxwX5J5Yq8KoO2wqFBpFIMYRVEKkI?=
 =?us-ascii?Q?588YknxqrpqU5jM8BvO05E/gIPstlFRE14EXR+oG9tjDjABcow8ADlwJq9Ob?=
 =?us-ascii?Q?uFZISc4NNtT7MYm3T8y3uKauUJjqdQv6blhn5ZMnNRfsa3KxcZ/WHrTzYz73?=
 =?us-ascii?Q?WvPNzR0MADrIzIP76y0fo2F5/uax/uJtKI+q0q11r7MbSwrwkne1mIrwaWNr?=
 =?us-ascii?Q?P5kyINlEfIcmwHkD+CRXOccV07nrdGBLx2QxTxNczRxgzLuli6qqhFHOtnMm?=
 =?us-ascii?Q?izp+QzFrMf/4isJ3WlClIFgxdz3CbqhJlBRZ7+LeTRNbTtH4O4ZwIGfSArY3?=
 =?us-ascii?Q?0dVNsl8lAN+D6kfaP/3Oy7vBh4m7/Sfqn7NvFbnWS2XYIEN9q+yXeNynCGzR?=
 =?us-ascii?Q?VQWOpb+9LY+WKh7scY9Q0XRylGXx3R3/O9AG0L/rYPf7dq008ptMCWvCBLh0?=
 =?us-ascii?Q?w7frA9D6DTvfmARqCCARmxYXAD+yjgOHueGR4vOzGnID2Z7qjw+sLHIZpF9b?=
 =?us-ascii?Q?1p1sdDgtKGDXObu/FNQzv6aNY3i+hzdN/0pDtvS5cUKpIhKZf4Ic3wMNCQit?=
 =?us-ascii?Q?tv6Yd2bLokPb17kkprWTi31QZZjK4T9aWiZQWLRQaPMUZT/JIiuMVLAiCgQk?=
 =?us-ascii?Q?rcv3MkcVJYY+bbEp+tSLRikFxqur5fLCKtl38qXZa9QpW1OQx/ZhMXEEFr+p?=
 =?us-ascii?Q?dzWULiyrG2GerCgJzolA83U4WzjYCNIv/+9d9NcR1DAiiMT4izn4OzRQuTM8?=
 =?us-ascii?Q?r0XAhtDr519bp/sXRoAuOQ4WUERCU/kwALPrwofP95rYMNJRUauvLfODpeZs?=
 =?us-ascii?Q?fCmy/+a95v8DD//yHjeHKniO5JvTjshJA60YnSfYiVV6SWRdw9qwDaX/EfHl?=
 =?us-ascii?Q?OjTfO/zdMhP9Sa5TQuLjejOwseB81CYUBNT8rgVZ+SgW90xqVwRZuqWxHvN0?=
 =?us-ascii?Q?D4hNSNoLc7HHELW5bPwAj8R/ntTRcmwDnGgE6qJBtBlABRduTPQl3pkHH5Rc?=
 =?us-ascii?Q?JwVR8Ua/M+RtMeLRfumrxYvrFOfGVVw/iWsOuZFafzCJZ2AYNo8P0XDR9tDG?=
 =?us-ascii?Q?DDuZocFqH74uCvbTVHsMdUdUmHdlNhEuiSpK3Cndlwa01lmwibjXWv66LW+/?=
 =?us-ascii?Q?gfD9D1qxsMAvkP7kI8ou0fbomHWYfuY3XtrOyA411Qd1t8LrCo3NLmbyuHHZ?=
 =?us-ascii?Q?hpEddPvph7+XvmIvccb8q1/3IcbzU/hzDOVb0mkvsF3FrIgqhhor64RrR1pm?=
 =?us-ascii?Q?/0VeXnoPr2nFSfWB//qACxmlP3wzbTg8gUnpIq9DSS+yIG3Xgcd/o/2J+lxL?=
 =?us-ascii?Q?8nW6ilvNrCUm7q7XOL3GMjnk5pJEMC+rrc2aqfTq+LfE0YERIx0/YFw/nBlR?=
 =?us-ascii?Q?3RGAOxnq9pOccSeO9Z0IcWqio5EjWQ/z7tAlqb+vrAp+CkxlpChsHeWj9YHZ?=
 =?us-ascii?Q?1WzkfxSi/ii/2K4rCAbAf3dXN6/lJB3jRh7sTziBQszpdykejgfA7fGZKHSR?=
 =?us-ascii?Q?FIsg1yciZS1U2ypVmw+CLVA=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b58e2113-41c5-4442-a05e-08d9fc384541
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 10:34:46.2276
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 5H/Y5hMAnz++Hc9G6rlrZwfwb3H9+CGIVCvIBDadSDorA8KRfn9TnsjECcSZfqaEjGGIpv84kqTw6jsbEAnw2A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR04MB4299

On 02.03.2022 11:12, Andrew Cooper wrote:
> On 02/03/2022 08:10, Jan Beulich wrote:
>> On 01.03.2022 15:58, Andrew Cooper wrote:
>>> On 25/02/2022 08:24, Jan Beulich wrote:
>>>> On 22.02.2022 12:47, Andrew Cooper wrote:
>>>>> --- a/xen/drivers/passthrough/amd/pci_amd_iommu.c
>>>>> +++ b/xen/drivers/passthrough/amd/pci_amd_iommu.c
>>>>> @@ -628,7 +628,7 @@ static void cf_check amd_dump_page_tables(struct =
domain *d)
>>>>>                                hd->arch.amd.paging_mode, 0, 0);
>>>>>  }
>>>>> =20
>>>>> -static const struct iommu_ops __initconstrel _iommu_ops =3D {
>>>>> +static const struct iommu_ops __initconst_cf_clobber _iommu_ops =3D =
{
>>>> Following my initcall related remark on x86'es time.c I'm afraid I don=
't
>>>> see how this and ...
>>>>
>>>>> @@ -2794,7 +2793,7 @@ static int __init cf_check intel_iommu_quaranti=
ne_init(struct domain *d)
>>>>>      return rc;
>>>>>  }
>>>>> =20
>>>>> -static struct iommu_ops __initdata vtd_ops =3D {
>>>>> +static const struct iommu_ops __initconst_cf_clobber vtd_ops =3D {
>>>> ... this actually works. But I guess I must be overlooking something, =
as
>>>> I'm sure that you did test the change.
>>>>
>>>> Both ops structures reference a function, through .adjust_irq_affiniti=
es,
>>>> which isn't __init but which is used (besides here) for an initcall. W=
ith
>>>> the ENDBR removed by the time initcalls are run, these should cause #C=
P.
>>> This doesn't explode because the indirect calls are resolved to direct
>>> calls before the ENDBR's are clobbered to NOP4.
>> I'm afraid I don't understand: The problematic call is in do_initcalls()=
:
>>
>>     for ( call =3D __presmp_initcall_end; call < __initcall_end; call++ =
)
>>         (*call)();
>>
>> I don't see how this could be converted to a direct call.
>=20
> Oh.=C2=A0 iov_adjust_irq_affinities()'s double use is hiding here.
>=20
> The safety rule for cf_clobber is that there must not be any
> non-alt-called callers.=C2=A0 We need to fix it:
>=20
> diff --git a/xen/drivers/passthrough/amd/iommu_init.c
> b/xen/drivers/passthrough/amd/iommu_init.c
> index 657c7f619a51..b1af5085efda 100644
> --- a/xen/drivers/passthrough/amd/iommu_init.c
> +++ b/xen/drivers/passthrough/amd/iommu_init.c
> @@ -831,7 +831,12 @@ int cf_check iov_adjust_irq_affinities(void)
> =C2=A0
> =C2=A0=C2=A0=C2=A0=C2=A0 return 0;
> =C2=A0}
> -__initcall(iov_adjust_irq_affinities);
> +
> +int cf_check __init initcall_iov_adjust_irq_affinities(void)
> +{
> +=C2=A0=C2=A0=C2=A0 return iommu_call(&iommu_ops, adjust_irq_affinities);
> +}
> +__initcall(initcall_iov_adjust_irq_affinities);
> =C2=A0
> =C2=A0/*
> =C2=A0 * Family15h Model 10h-1fh erratum 746 (IOMMU Logging May Stall
> Translations)
>=20
>=20
>> Afaics only pre-SMP initcalls are safe in this regard: do_presmp_initcal=
ls()
>> is called immediately ahead of alternative_branches().
>>
>> Isn't this (previously?) working related to your "x86/spec-ctrl: Disable
>> retpolines with CET-IBT"?
>=20
> No.=C2=A0 It's because AMD CPUs don't have CET-IBT at this juncture, and =
will
> never encounter a faulting situation.

I'm still lost. An exactly matching construct exists in VT-d code (and
my initial comment also was on VT-d). The AMD one is actually a clone
of that much older one. The initcall really wants to move to vendor
independent code, but I'd still like to understand why no fault was
ever observed.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 12:00:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 12:00:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282196.480809 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPNeW-0003um-Rk; Wed, 02 Mar 2022 12:00:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282196.480809; Wed, 02 Mar 2022 12:00:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPNeW-0003uf-Ol; Wed, 02 Mar 2022 12:00:20 +0000
Received: by outflank-mailman (input) for mailman id 282196;
 Wed, 02 Mar 2022 12:00:19 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nPNeV-0003uT-Lu
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 12:00:19 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nPNeV-0004SV-HR; Wed, 02 Mar 2022 12:00:19 +0000
Received: from 54-240-197-232.amazon.com ([54.240.197.232]
 helo=[192.168.10.166]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nPNeV-0000K5-7o; Wed, 02 Mar 2022 12:00:19 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=YAS5UOQ8z3rEa1UpoVW7pu31r+dIUJh8yplNI6smjvg=; b=FREl4boX0BKuoZcSfqt7S71fre
	kBRjOFt9FJQ53MGR+XSBUxFafLRDv8ZhMtDqFtVd1Wu9nbF8wrBI2R6FVcCvUXAmeLJXGDXo/Bu9I
	gGQvGtnaQx8MT7l2UYXmWVIOuGr9/AgDERrG7ApQ/Rcl6tKA5FDHuhoTY8IlnQ2qDQzA=;
Message-ID: <1f0bba54-158b-d171-6f99-0c29e0547f8a@xen.org>
Date: Wed, 2 Mar 2022 12:00:17 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: Proposal for Porting Xen to Armv8-R64 - DraftA
To: Wei Chen <Wei.Chen@arm.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Stefano Stabellini <sstabellini@kernel.org>
Cc: Bertrand Marquis <Bertrand.Marquis@arm.com>,
 Penny Zheng <Penny.Zheng@arm.com>, Henry Wang <Henry.Wang@arm.com>,
 nd <nd@arm.com>
References: <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <04db7e8b-2f04-41d7-1deb-d8bda3625c04@xen.org>
 <PAXPR08MB7420BF1299A1577B98211C1A9E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <PAXPR08MB7420BF1299A1577B98211C1A9E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit



On 01/03/2022 07:51, Wei Chen wrote:
> Hi Julien,

Hi Wei,

>> -----Original Message-----
>> From: Julien Grall <julien@xen.org>
>> Sent: 2022年2月26日 4:55
>> To: Wei Chen <Wei.Chen@arm.com>; xen-devel@lists.xenproject.org; Stefano
>> Stabellini <sstabellini@kernel.org>
>> Cc: Bertrand Marquis <Bertrand.Marquis@arm.com>; Penny Zheng
>> <Penny.Zheng@arm.com>; Henry Wang <Henry.Wang@arm.com>; nd <nd@arm.com>
>> Subject: Re: Proposal for Porting Xen to Armv8-R64 - DraftA
>>> ### 1.2. Xen Challenges with PMSA Virtualization
>>> Xen is PMSA unaware Type-1 Hypervisor, it will need modifications to run
>>> with an MPU and host multiple guest OSes.
>>>
>>> - No MMU at EL2:
>>>       - No EL2 Stage 1 address translation
>>>           - Xen provides fixed ARM64 virtual memory layout as basis of
>> EL2
>>>             stage 1 address translation, which is not applicable on MPU
>> system,
>>>             where there is no virtual addressing. As a result, any
>> operation
>>>             involving transition from PA to VA, like ioremap, needs
>> modification
>>>             on MPU system.
>>>       - Xen's run-time addresses are the same as the link time addresses.
>>>           - Enable PIC (position-independent code) on a real-time target
>>>             processor probably very rare.
>>
>> Aside the assembly boot code and UEFI stub, Xen already runs at the same
>> address as it was linked.
>>
> 
> But the difference is that, base on MMU, we can use the same link address
> for all platforms. But on MPU system, we can't do it in the same way.

I agree that we currently use the same link address for all the 
platforms. But this is also a problem when using MMU because EL2 has a 
single TTBR.

At the moment we are switching page-tables with the MMU which is not 
safe. Instead we need to turn out the MMU off, switch page-tables and 
then turn on the MMU. This means we need to have an identity mapping of 
Xen in the page-tables. Assuming Xen is not relocated, the identity 
mapping may clash with Xen (or the rest of the virtual address map).

My initial idea was to enable PIC and update the relocation at boot 
time. But this is a bit cumbersome to do. So now I am looking to have a 
semi-dynamic virtual layout and find some place to relocate part of Xen 
to use for CPU bring-up.

Anyway, my point is we possibly could look at PIC if that could allow 
generic Xen image.

>>>       - Xen will need to use the EL2 MPU memory region descriptors to
>> manage
>>>         access permissions and attributes for accesses made by VMs at
>> EL1/0.
>>>           - Xen currently relies on MMU EL1 stage 2 table to manage these
>>>             accesses.
>>> - No MMU Stage 2 translation at EL1:
>>>       - A guest doesn't have an independent guest physical address space
>>>       - A guest can not reuse the current Intermediate Physical Address
>>>         memory layout
>>>       - A guest uses physical addresses to access memory and devices
>>>       - The MPU at EL2 manages EL1 stage 2 access permissions and
>> attributes
>>> - There are a limited number of MPU protection regions at both EL2 and
>> EL1:
>>>       - Architecturally, the maximum number of protection regions is 256,
>>>         typical implementations have 32.
>>>       - By contrast, Xen does not need to consider the number of page
>> table
>>>         entries in theory when using MMU.
>>> - The MPU protection regions at EL2 need to be shared between the
>> hypervisor
>>>     and the guest stage 2.
>>>       - Requires careful consideration - may impact feature 'fullness' of
>> both
>>>         the hypervisor and the guest
>>>       - By contrast, when using MMU, Xen has standalone P2M table for
>> guest
>>>         stage 2 accesses.
>>
>> [...]
>>
>>> - ***Define new system registers for compilers***:
>>>     Armv8-R64 is based on Armv8.4. That means we will use some Armv8.4
>>>     specific system registers. As Armv8-R64 only have secure state, so
>>>     at least, `VSTCR_EL2` and `VSCTLR_EL2` will be used for Xen. And the
>>>     first GCC version that supports Armv8.4 is GCC 8.1. In addition to
>>>     these, PMSA of Armv8-R64 introduced lots of MPU related system
>> registers:
>>>     `PRBAR_ELx`, `PRBARx_ELx`, `PRLAR_ELx`, `PRLARx_ELx`, `PRENR_ELx` and
>>>     `MPUIR_ELx`. But the first GCC version to support these system
>> registers
>>>     is GCC 11. So we have two ways to make compilers to work properly
>> with
>>>     these system registers.
>>>     1. Bump GCC version to GCC 11.
>>>        The pros of this method is that, we don't need to encode these
>>>        system registers in macros by ourselves. But the cons are that,
>>>        we have to update Makefiles to support GCC 11 for Armv8-R64.
>>>        1.1. Check the GCC version 11 for Armv8-R64.
>>>        1.2. Add march=armv8r to CFLAGS for Armv8-R64.
>>>        1.3. Solve the confliction of march=armv8r and mcpu=generic
>>>       These changes will affect common Makefiles, not only Arm Makefiles.
>>>       And GCC 11 is new, lots of toolchains and Distro haven't supported
>> it.
>>
>> I agree that forcing to use GCC11 is not a good idea. But I am not sure
>> to understand the problem with the -march=.... Ultimately, shouldn't we
>> aim to build Xen ARMv8-R with -march=armv8r?
>>
> 
> Actually, we had done, but we reverted it from RFC patch series. The reason
> has been listed above. But that is not the major reason. The main reason
> is that:
> Armv8-R AArch64 supports the A64 ISA instruction set with some modifications:
> Redefines DMB, DSB, and adds an DFB. But actually, the encodings of DMB and
> DSB are still the same with A64. And DFB is a alias of DSB #12.
> 
> In this case, we don't think we need a new arch flag to generate new
> instructions for Armv8-R. And we have discussed with Arm kernel guys, they
> will not update the build system to build Linux that will be running on
> Armv8-R64 EL1 either.

Good to know that the kernel folks plan to do the same. Thanks for the 
explanation!

> 
> 
>> [...]
>>
>>> ### **2.2. Changes of the initialization process**
>>> In general, we still expect Armv8-R64 and Armv8-A64 to have a consistent
>>> initialization process. In addition to some architecture differences,
>> there
>>> is no more than reusable code that we will distinguish through
>> CONFIG_ARM_MPU
>>> or CONFIG_ARM64_V8R. We want most of the initialization code to be
>> reusable
>>> between Armv8-R64 and Armv8-A64.
>>>
>>> - We will reuse the original head.s and setup.c of Arm. But replace the
>>>     MMU and page table operations in these files with configuration
>> operations
>>>     for MPU and MPU regions.
>>>
>>> - We provide a boot-time MPU configuration. This MPU configuration will
>>>     support Xen to finish its initialization. And this boot-time MPU
>>>     configuration will record the memory regions that will be parsed from
>>>     device tree.
>>>
>>>     In the end of Xen initialization, we will use a runtime MPU
>> configuration
>>>     to replace boot-time MPU configuration. The runtime MPU configuration
>> will
>>>     merge and reorder memory regions to save more MPU regions for guests.
>>>     ![img](https://drive.google.com/uc?export=view&id=1wTFyK2XfU3lTlH1PqR
>> DoacQVTwUtWIGU)
>>>
>>> - Defer system unpausing domain.
>>>     When Xen initialization is about to end, Xen unpause guests created
>>>     during initialization. But this will cause some issues. The unpause
>>>     action occurs before free_init_memory, however the runtime MPU
>> configuration
>>>     is built after free_init_memory.
>>
>> I was half expecting that free_init_memory() would not be called for Xen
>> Armv8R.
>>
> 
> We had called free_init_memory for Xen Armv8R, but it doesn't really mean
> much. As we have static heap, so we don't reclaim init memory to heap. And
> this reclaimed memory could not be used by Xen data and bss either. But
> from the security perspective, free_init_memory will drop the Xen init
> code & data, this will reduce the code an attacker can exploit.
IIUC, zero-ing the region (or something) similar will be sufficient 
here. IOW, you don't necessarily need to remove the mappings.

>>>
>>>     So if the unpaused guests start executing the context switch at this
>>>     point, then its MPU context will base on the boot-time MPU
>> configuration.
>>
>> Can you explain why you want to switch the MPU configuration that late?
>>
> 
> In the boot stage, Xen is the only user of MPU. It may add some memory
> nodes or device memory to MPU regions for temporary usage. After free
> init memory, we want to reclaim these MPU regions to give more MPU regions
> can be used for guests. Also we will do some merge and reorder work. This
> work can make MPU regions to be easier managed in guest context switch.

Do you have any example of such regions?
> 
>>>     Probably it will be inconsistent with runtime MPU configuration, this
>>>     will cause unexpected problems (This may not happen in a single core
>>>     system, but on SMP systems, this problem is foreseeable, so we hope
>> to
>>>     solve it at the beginning).
>>
>> [...]
>>
>>> ### **2.4. Changes of memory management**
>>> Xen is coupled with VMSA, in order to port Xen to Armv8-R64, we have to
>>> decouple Xen from VMSA. And give Xen the ability to manage memory in
>> PMSA.
>>>
>>> 1. ***Use buddy allocator to manage physical pages for PMSA***
>>>      From the view of physical page, PMSA and VMSA don't have any
>> difference.
>>>      So we can reuse buddy allocator on Armv8-R64 to manage physical
>> pages.
>>>      The difference is that, in VMSA, Xen will map allocated pages to
>> virtual
>>>      addresses. But in PMSA, Xen just convert the pages to physical
>> address.
>>>
>>> 2. ***Can not use virtual address for memory management***
>>>      As Armv8-R64 only has PMSA in EL2, Xen loses the ability of using
>> virtual
>>>      address to manage memory. This brings some problems, some virtual
>> address
>>>      based features could not work well on Armv8-R64, like `FIXMAP`,
>> `vmap/vumap`,
>>>      `ioremap` and `alternative`.
>>>
>>>      But the functions or macros of these features are used in lots of
>> common
>>>      code. So it's not good to use `#ifdef CONFIG_ARM_MPU` to gate relate
>> code
>>>      everywhere. In this case, we propose to use stub helpers to make the
>> changes
>>>      transparently to common code.
>>>      1. For `FIXMAP`, we will use `0` in `FIXMAP_ADDR` for all fixmap
>> operations.
>>>         This will return physical address directly of fixmapped item.
>>>      2. For `vmap/vumap`, we will use some empty inline stub helpers:
>>>           ```
>>>           static inline void vm_init_type(...) {}
>>>           static inline void *__vmap(...)
>>>           {
>>>               return NULL;
>>>           }
>>>           static inline void vunmap(const void *va) {}
>>>           static inline void *vmalloc(size_t size)
>>>           {
>>>               return NULL;
>>>           }
>>>           static inline void *vmalloc_xen(size_t size)
>>>           {
>>>               return NULL;
>>>           }
>>>           static inline void vfree(void *va) {}
>>>           ```
>>>
>>>      3. For `ioremap`, it depends on `vmap`. As we have make `vmap` to
>> always
>>>         return `NULL`, they could not work well on Armv8-R64 without
>> changes.
>>>         `ioremap` will return input address directly.
>>>           ```
>>>           static inline void *ioremap_attr(...)
>>>           {
>>>               /* We don't have the ability to change input PA cache
>> attributes */
>> OOI, who will set them?
> 
> Some callers that want to change a memory's attribute will set them. Something like
> ioremap_nocache. I am not sure is this what you had asked : )

I am a bit confused. If ioremap_nocache() can change the attribute, then 
why would ioremap_attr() not be able to do it?

> 
>>
>>>               if ( CACHE_ATTR_need_change )
>>>                   return NULL;
>>>               return (void *)pa;
>>>           }
>>>           static inline void __iomem *ioremap_nocache(...)
>>>           {
>>>               return ioremap_attr(start, len, PAGE_HYPERVISOR_NOCACHE);
>>>           }
>>>           static inline void __iomem *ioremap_cache(...)
>>>           {
>>>               return ioremap_attr(start, len, PAGE_HYPERVISOR);
>>>           }
>>>           static inline void __iomem *ioremap_wc(...)
>>>           {
>>>               return ioremap_attr(start, len, PAGE_HYPERVISOR_WC);
>>>           }
>>>           void *ioremap(...)
>>>           {
>>>               return ioremap_attr(pa, len, PAGE_HYPERVISOR_NOCACHE);
>>>           }
>>>
>>>           ```
>>>       4. For `alternative`, it depends on `vmap` too.
>>
>> The only reason we depend on vmap() is because the map the sections
>> *text read-only and we enforce WnX. For VMSA, it would be possible to
>> avoid vmap() with some rework. I don't know for PMSA.
>>
> 
> For PMSA, we still enforce WnX. For your use case, I assume it's alternative.
> It still may have some possibility to avoid vmap(). But there may be some
> security issues. We had thought to disable MPU -> update xen text -> enable
> MPU to copy VMSA alternative's behavior. The problem with this, however,
> is that at some point, all memory is RWX. There maybe some security risk. > But because it's in init stage, it probably doesn't matter as much as 
I thought.

For boot code, we need to ensure the code is compliant to the Arm Arm. 
Other than that, it is OK to have the memory RWX for a short period of time.

In fact, when we originally boot Xen, we don't enforce WnX. We will 
start to enforce when initializing the memory. But there are no blocker 
to delay it (other than writing the code :)).

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 12:06:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 12:06:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282205.480821 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPNk6-0004c6-Gi; Wed, 02 Mar 2022 12:06:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282205.480821; Wed, 02 Mar 2022 12:06:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPNk6-0004bz-Bi; Wed, 02 Mar 2022 12:06:06 +0000
Received: by outflank-mailman (input) for mailman id 282205;
 Wed, 02 Mar 2022 12:06:04 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nPNk4-0004br-5V
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 12:06:04 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nPNk3-0004YF-UH; Wed, 02 Mar 2022 12:06:03 +0000
Received: from 54-240-197-224.amazon.com ([54.240.197.224]
 helo=[192.168.10.166]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nPNk3-0000nK-Ob; Wed, 02 Mar 2022 12:06:03 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=EZTvUrI4SHfZq+qVhAYlWXuSyOijr38hSdYkgsbLe2Y=; b=xRm3kzE2FzQrxrYg4xtUcV/yqb
	BPA1JqbzqAqjBVDkx02v0dY/4AqDhnSNeAPf4APksTLNyH7K+0RpH4coTGAhI3ghiPbmLhVT6avUX
	sRnZvCzS8y7X5KfNuqKkDcsigK4VRddwHghLP2ZsU9q20zR4k0gBi8aVUKeFFx2YXq5Y=;
Message-ID: <8b24027f-b659-098b-6faa-3591621fa0a1@xen.org>
Date: Wed, 2 Mar 2022 12:06:01 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: Proposal for Porting Xen to Armv8-R64 - DraftA
To: Penny Zheng <Penny.Zheng@arm.com>, Wei Chen <Wei.Chen@arm.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Stefano Stabellini <sstabellini@kernel.org>
Cc: Bertrand Marquis <Bertrand.Marquis@arm.com>,
 Henry Wang <Henry.Wang@arm.com>, nd <nd@arm.com>
References: <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <04db7e8b-2f04-41d7-1deb-d8bda3625c04@xen.org>
 <PAXPR08MB7420BF1299A1577B98211C1A9E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <DU2PR08MB73257F1F8FFB2BF8F3384F66F7039@DU2PR08MB7325.eurprd08.prod.outlook.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <DU2PR08MB73257F1F8FFB2BF8F3384F66F7039@DU2PR08MB7325.eurprd08.prod.outlook.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit



On 02/03/2022 07:21, Penny Zheng wrote:
> Hi julien

Hi Penny,

>>>>
>>>>     So if the unpaused guests start executing the context switch at this
>>>>     point, then its MPU context will base on the boot-time MPU
>>> configuration.
>>>
>>> Can you explain why you want to switch the MPU configuration that late?
>>>
>>
> 
> It is more related to the implementation.
> 
> In the boot stage, we allocate MPU regions in sequence until the max.
> Since a few MPU region will get removed along the way, it leaves hole there.
> Such like when heap is ready, fdt will be reallocated in the heap, which means the
> MPU region for device tree is in no need. And also in free_init_memory, although we
> do not give back init memory to the heap, we will also destroy according MPU
> regions to make them inaccessible.
> Without ordering, we need a bitmap to record such information.
> 
> In context switch, the memory layout is quite different for guest mode and
> hypervisor mode. When switching to guest mode, only guest RAM, emulated/passthrough
> devices, etc could be seen, but in hypervisor mode, all guests RAM and device memory
> shall be seen. And without reordering, we need to iterate all MPU regions to find
> according regions to disable during runtime context switch, that's definitely a overhead.
> 
> So we propose an ordering at the tail of the boot time, to put all fixed MPU region
> in the head, like xen text/data, etc, and put all flexible ones at tail, like device memory,
> guests RAM.
> Then later in context switch,  we could easily just disable ones from tail and inserts new
> ones in the tail.

Thank you for the clarification. This makes sense to me. I would suggest 
to update the proposal to reflect this decision.

>> For PMSA, we still enforce WnX. For your use case, I assume it's alternative.
>> It still may have some possibility to avoid vmap(). But there may be some
>> security issues. We had thought to disable MPU -> update xen text -> enable
>> MPU to copy VMSA alternative's behavior. The problem with this, however,
>> is that at some point, all memory is RWX. There maybe some security risk.
>> But because it's in init stage, it probably doesn't matter as much as I thought.
>>
> 
> In MMU system, we use vmap() to change requested xen text codes(a few lines) temporarily
> to RW to apply the alternative codes, the granularity for it could be 4KB.
> 
> But on MPU system, we give the whole XEN text code a MPU region, so otherwise we disable
> the whole MPU to make it happen, which leads to a little risk for running c codes where MPU
> disabled, or all text memory becoming RWX at this alternative time.

See my answer to Wei. So long the code is compliant with the Arm Arm, it 
would be acceptable to have boot code running with RWX for a short 
period of time.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 13:16:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 13:16:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282215.480840 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPOq0-0004zu-Ro; Wed, 02 Mar 2022 13:16:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282215.480840; Wed, 02 Mar 2022 13:16:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPOq0-0004zn-O0; Wed, 02 Mar 2022 13:16:16 +0000
Received: by outflank-mailman (input) for mailman id 282215;
 Wed, 02 Mar 2022 13:16:15 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=9gnM=TN=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nPOpy-0004zh-I2
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 13:16:15 +0000
Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com
 [205.220.165.32]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ed745b61-9a2a-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 14:16:11 +0100 (CET)
Received: from pps.filterd (m0246629.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 222CTDQM017661; 
 Wed, 2 Mar 2022 13:15:15 GMT
Received: from userp3030.oracle.com (userp3030.oracle.com [156.151.31.80])
 by mx0b-00069f02.pphosted.com with ESMTP id 3eh15anmgj-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Wed, 02 Mar 2022 13:15:14 +0000
Received: from pps.filterd (userp3030.oracle.com [127.0.0.1])
 by userp3030.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 222Cq3wi138590;
 Wed, 2 Mar 2022 13:15:13 GMT
Received: from nam10-dm6-obe.outbound.protection.outlook.com
 (mail-dm6nam10lp2102.outbound.protection.outlook.com [104.47.58.102])
 by userp3030.oracle.com with ESMTP id 3ef9b0vcbr-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Wed, 02 Mar 2022 13:15:13 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
 by SJ0PR10MB5533.namprd10.prod.outlook.com (2603:10b6:a03:3f7::24)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Wed, 2 Mar
 2022 13:15:10 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::6d20:6694:a16:56f7]) by BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::6d20:6694:a16:56f7%3]) with mapi id 15.20.5038.015; Wed, 2 Mar 2022
 13:15:10 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ed745b61-9a2a-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=+H8jEbxRAjH5LJGh19NFnoJv1mnvS0Fd8stoMxTA0w0=;
 b=sGVPTxIXrSbagJ6ynSSDe816afmmTUjiMiZbnKewSSIpJkSoge6xG7EHhHCPgSidbgpG
 vy9fLOYAgrIbJlZ3WThbY1UyLw86tr1NTwwQLU/Q6GjO/6jXhqTH2Kk2QEAWSPWZc7pr
 DYAxABYfQCSLm9dGK5z+vOyKao+ColXnRe/UK1m7SVW5y1IwfBa1C8uzi4ohVaRmNQaD
 CEMNz8tJ1tpqvReQOy1MQbD8DBrk5UIw68/+c+i2mQOYkO0EcMh83nN2Ka2Joys2rDmU
 IsHaqAW1Z4liia9hOoIRI8ScirCJ9XYd5PcFmZUhfN8u0pPRmKUUgno+cCLigFz2k/yB GQ== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=kgHvmPUaOKjmTgFDRNyH2JK/nxIxKkD4elHWKwQzktzYLmilMNAijcf33DQQKQboEe07+iBVmL1MGbCLbJZlx3aZXjtbwmFKEoACvzg8YbahcPIE7FxRitBNV+KiWD34U7mYc5clIeXbd9rWfC8ESwhp9s9lbwKIrf8Y6OJ6IRXs566pG2Lsm5mhhsSCpLnEhUTD5vE/5IHLNdArFBlxN097/VAVLhnsR7wqfanCDgr8hU1dlCaZfeJIgOn06RHOqqoct/IJ89PUSA+7xbHF5NIgjdRJU3eyJzapVGbiI9ZIWp3almvhuQy5CTVIPO7S0IhGeFwMYTlKkaaCd0TcNA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=+H8jEbxRAjH5LJGh19NFnoJv1mnvS0Fd8stoMxTA0w0=;
 b=YamrgLVX9B/qDq9QzF6II8wlZNthJKbW5iq53COtqYiKrf0HrhczdS3GUOwEHGNuw1wuUXG09BDIRYnB+Rx+5/RfiVASEFCd0JFbNPnPDJtHTEkZzT9fdnQHIUKTA86ouTSqUS7MxVFXQrpCMcUOLCujcX/uKEAbYbZ8fNrtZpUAzVKBXSmcCZNzPoqZelLCVA6se8VX7b0y8Y95bZz+ycb3+82QmPMqtQoTtOdrAI39CoABSuXcfLpcDBW9Ojbiovsz5qyACOrqLkmrWEscr+0V2slJMTUWMb/1R1gdfDs89mwQYFyJO4WY74wYO5ARLaztGM8UpRhz0zvBwWYMJw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=+H8jEbxRAjH5LJGh19NFnoJv1mnvS0Fd8stoMxTA0w0=;
 b=xWpNRvFCMKQ+b7r+RN5bpz74Dv63CfBbIf5apoeBrlba9WYOtJvPEmZt911JQ/HoMTtAaZamyB/xb5VID0ghzq7PaGjs4cx1ivaDw6RjirQaH8PPg6U1qBuygmIv0TK/8eMScWB9rcnmB4/nQAEbGkhtkaGRvmlhTgOQwjmHveE=
Message-ID: <ca748512-12bb-7d75-13f1-8d5ec9703e26@oracle.com>
Date: Wed, 2 Mar 2022 08:15:03 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH 11/12] swiotlb: merge swiotlb-xen initialization into
 swiotlb
Content-Language: en-US
To: Stefano Stabellini <sstabellini@kernel.org>,
        Christoph Hellwig <hch@lst.de>
Cc: iommu@lists.linux-foundation.org, x86@kernel.org,
        Anshuman Khandual <anshuman.khandual@arm.com>,
        Tom Lendacky <thomas.lendacky@amd.com>,
        Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
        Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
        David Woodhouse <dwmw2@infradead.org>,
        Lu Baolu <baolu.lu@linux.intel.com>,
        Robin Murphy <robin.murphy@arm.com>,
        linux-arm-kernel@lists.infradead.org, xen-devel@lists.xenproject.org,
        linux-ia64@vger.kernel.org, linux-mips@vger.kernel.org,
        linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org,
        linux-s390@vger.kernel.org, linux-hyperv@vger.kernel.org,
        tboot-devel@lists.sourceforge.net, linux-pci@vger.kernel.org
References: <20220301105311.885699-1-hch@lst.de>
 <20220301105311.885699-12-hch@lst.de>
 <alpine.DEB.2.22.394.2203011720150.3261@ubuntu-linux-20-04-desktop>
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
In-Reply-To: <alpine.DEB.2.22.394.2203011720150.3261@ubuntu-linux-20-04-desktop>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: BY5PR03CA0004.namprd03.prod.outlook.com
 (2603:10b6:a03:1e0::14) To BLAPR10MB5009.namprd10.prod.outlook.com
 (2603:10b6:208:321::10)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 57f1c317-ff3a-4cac-829f-08d9fc4eadcf
X-MS-TrafficTypeDiagnostic: SJ0PR10MB5533:EE_
X-Microsoft-Antispam-PRVS: 
	<SJ0PR10MB55333F6B5F5D9371D60982E78A039@SJ0PR10MB5533.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	4KJwB9SxCqeLlNQ1Y5kvptorXPIyjzEcwrSw5cMQq4WMGQJNjONg5U4YwqywH3QNElFsQyzE9fDKUvmAFN9eU9jHUA09tJ03eaOHSVl8fLNVzzvhsHDfrk+Xz3sR1h+HGXY7EGF2FS/kILknpvbJavcAcm0nh1qQPE2x/vR/bK8/JlJTPfmDN5FA41H1UBElCjyklbo47P9mqTmvsf2/hZHdelU/U54wobNjybfIYwGOg2BTmP6L9TbRgk6lVBA6cPciiQURffcd0BfHVUIjRwl0TVykSnQ4SKortEMCHF/zt20qc4HUImJQmHhESafU7+m22MUWi3xdzmE2lu9tAl2rtsd6qEPf/JOdO537yBgqeImvORAOz4c0wP23wFtJID/9GR7oGbEPpmDba0G8ulotrUaFlaxvbU4CP8zoOsS74WsUfxYZL1xtNV8g3T4WcXEDz7Fd7MinctXAi8zLZMT5dKQlub7eZoUyqeqXiQJJN+XoVJWG/9zXONQEi544F4OJQFgRtrrckNdgSMcmM+kQH9vSb819Vxw7Q3I86ljT3ZBGezuYvE0zIKvjGdCCLp4CDtBVuy2wRH01e19ig5eQmgH8JHco5Kow6kb6x2+dS6lIJcK1yq6SDCA6crwtD5RnEKTQ9gC+c33149RAVdmASQLiimsze/lwtVAUzn4GUOah0nDN9AoH2Aj5iEt9pVIAB1qD8mkLf39IQt/CioRbyUd9Gf9FVpiCD272Ipk=
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BLAPR10MB5009.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(26005)(186003)(110136005)(6512007)(53546011)(2906002)(6506007)(2616005)(86362001)(38100700002)(31696002)(54906003)(6666004)(44832011)(4744005)(4326008)(5660300002)(31686004)(8936002)(508600001)(36756003)(6486002)(66556008)(66946007)(66476007)(316002)(7416002)(8676002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?Vk03Vk5LOC9NN29RTmV1SStZYWVzYlVVWlhEQ2loT1ZKQmhJZzRRYW42SlUr?=
 =?utf-8?B?elAzemVjcjJrMS9qN3ZwQ0o1bzhKTUM3a0hoVDZHL0x2c25yQ3g0cXFxeVhl?=
 =?utf-8?B?c0NSWHlrTkh6NUY2MWNmSFlKOEtqSUNuMENzcnA3QkdlYi9ydjJpazk1SGxW?=
 =?utf-8?B?dlFKQkYxUW9jRmVhMU9CRHlVaXQ4MG9hZ2pVbWZwQjdNTERBTWNzSTFkbjVX?=
 =?utf-8?B?bk1rTTZBOEwrb01HUjhWUThTUC9SMjVJalNXblFWUmZzSlBpbHZJVnpLNHFM?=
 =?utf-8?B?bWJpWkVYNnl1Mkp0cmozUlBrQUhlQnNjTFFrMXJzZHo0ZU1BSkhCTVpjTGFN?=
 =?utf-8?B?ZFZRN25QaGFWZGVTeG5vVjJ4TVc4dmtyR0d2eXdLTXd6TDRtNHliN0dwbFBG?=
 =?utf-8?B?d2pKTnczRlQrV0NRMSt1Q1dySjI3SzZMK21pOUJVUG5SL1IrVkc4NCtmdFBC?=
 =?utf-8?B?TnBsMzFqZFh5K25xTUx0RW9NSmhrK1N2RDh0L282a2VNYzdYWnJtZFA2RzJL?=
 =?utf-8?B?K2hFWklHZURBMEdhMkVuWEw0ZFFyMUhqL2JRMzcwNzY2SlJ5VnBDcG5QeC9x?=
 =?utf-8?B?ZjFnRmY0dWUzZ0RmRk5XTUhnTW1yNWh3RERvUUw2TWRQc0NuaTFFdTJnclYz?=
 =?utf-8?B?Slo5WXNreWFaa1ZHM3RjOE5WWEFreVJMRzI5NTNlQTZRTEhISElMSEdRWnBa?=
 =?utf-8?B?dG9kN1NtcVVqaDJOUFcwNXVNS1pXOVZrTC9SZjBuMVJXVjBtMXZ2Nm5GcFZa?=
 =?utf-8?B?Z3RSb24zSTYzbm1UcjFWcW9wWlpxVWx6b3lxbUhvdE1SVkIxNnpjU29PS25D?=
 =?utf-8?B?d0VKdmlEOWRCTitQbVRXZ3FMTGxNQTZPTlJFOU10RndzelFnV011UStBbTJ6?=
 =?utf-8?B?bHErWEh6VlZMUFJRWnV2QnBwc2pJTmZsWHNLdWxiNUFuV2w4UHZxQkFIOEpS?=
 =?utf-8?B?aW1WODBsd1pGRis2bUd1R1RZTy95b2hrUktmais2eUNXS3BpSUh0aW5MWkFK?=
 =?utf-8?B?K0svR2xpMzNvdTN0RnVFdDE4bFRSNXpPTDdUODlDVXBaaGdFaWV5aXdPTWVE?=
 =?utf-8?B?Vkk4NzlsdG5PU05MVnN1T2pnZnJJaU1QeVFYT01DTTBBT3hqQW5KaWpQQ0pX?=
 =?utf-8?B?M2kyNzczdEk0QTVIK0pkK25JZnp5Tjc1QWo4SHhQeU93QnFLR3kyQVpqN3Uv?=
 =?utf-8?B?N1RQbTluYWVXcWhLK0JEWHo0UStoSmtOdTJlMnFkM01sbDAwdFYxSFdVQTRo?=
 =?utf-8?B?MkcreEFJbFZmNjRUdWhRTVFyTjA3aFR3Z1FkZ3dRcDh3L2VyUlRUZ2ZFYWtv?=
 =?utf-8?B?RmxiRU02bTRPMzI0V2R0RVorU0VhOGVZY1E1K2twWXlIdTFXeFZ5RFowbEZm?=
 =?utf-8?B?dTZnUC9XTFdHUUNBbTdEaUowYmJzSXBEZ20vSWVHdnhqWWIyOFZ5WFZFeDhs?=
 =?utf-8?B?NXFueXdWUGdkRzFxblRjK01nb3FOYnl0K0VMVGpUYkVRclNrM29zc3Y4eE16?=
 =?utf-8?B?YjNJKzBxTTZQa2ZDMWlyMEVzejVqaEhuQTBBVnVVZ0VVdmJJdXJqTmwvem9P?=
 =?utf-8?B?Wk83YVl2QmJYZk9YTVZWY2NlV0l0YThCd09Wb1ZYVlR5MjhaRytKcWlnUDNF?=
 =?utf-8?B?eHAyays0TC9TVm1Pa2FUdTZMaXNJS2FSSnhpYmFrbjlzaWNlQjVPWkoxdEto?=
 =?utf-8?B?b0RSRElHRnBCTlRydURXamJ0TTZzajI4OGRrc0FySStPVnRMUEtRdkRNVUIv?=
 =?utf-8?B?OWQvK1ZnNDRFVXEwdy9vRFFIb04xeU9RS2YrZUVZRWNSSFZSN1h4RVdHamli?=
 =?utf-8?B?cUkwQkxaeGUxT0g4Y3NyNDM2RkJsYTdHbEZ0d3lXUkgySkdMRC94YzhRT1A1?=
 =?utf-8?B?YWNuVHRTbWhOcjdIUmExckxtdnlIUmpZTmJGWTdjYnJVR3czMGp5ZE9qdlgw?=
 =?utf-8?B?YTV2d0EybXA2MWhTbHFlMDhvWCtOR1ZaV29tN2NuRXo3LzBlYUsvams5dUU0?=
 =?utf-8?B?Y3hUblIxeDN0cGlKaW9XY3ZUd0VNZmh3NTRoMUJkY29tTHZPTzNsbEh3OUpM?=
 =?utf-8?B?MUtERHBla3ZnNjdlWit0K0VzSjJUM3NUNkpwTndXVXA0K3ArNVdESWFnU1BW?=
 =?utf-8?B?Z1J0T0QvQll0OXFNa091cWo5cmkwQlFCaHBrYTVBSWlvZXZ0UldodnNtMlB5?=
 =?utf-8?B?bm16bUorTE9zbWxjOEpjYWdGWTZSUm5yc25nK2dnUHEyb2lpMGN1RGdqUUdT?=
 =?utf-8?B?SEdyWHl2Y2NqN0kyT0U3T1lKcXFRPT0=?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 57f1c317-ff3a-4cac-829f-08d9fc4eadcf
X-MS-Exchange-CrossTenant-AuthSource: BLAPR10MB5009.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 13:15:10.5529
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: i9IIOBKc6c6QhVKe/5bkfbkaWQSPhPm6GmdCCxj3k9wSiUgOSXNzz6y0YmKoKAg4JLcdXQJpLOfjRQSt7BY9UBTEuprmMHXnOSm3nRiKsCA=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR10MB5533
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10273 signatures=685966
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 bulkscore=0 malwarescore=0
 mlxscore=0 phishscore=0 suspectscore=0 adultscore=0 mlxlogscore=939
 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2201110000
 definitions=main-2203020056
X-Proofpoint-ORIG-GUID: G0FxjF5OpEILlkZGoBX3aG3B-oBasDld
X-Proofpoint-GUID: G0FxjF5OpEILlkZGoBX3aG3B-oBasDld



On 3/1/22 9:55 PM, Stefano Stabellini wrote:
> On Tue, 1 Mar 2022, Christoph Hellwig wrote:
>> Allow to pass a remap argument to the swiotlb initialization functions
>> to handle the Xen/x86 remap case.  ARM/ARM64 never did any remapping
>> from xen_swiotlb_fixup, so we don't even need that quirk.
>>

> Aside from that the rest looks OK. Also, you can add my:
> 
> Tested-by: Stefano Stabellini <sstabellini@kernel.org>


Not for me, I fail to boot with

[   52.202000] bnxt_en 0000:31:00.0: swiotlb buffer is full (sz: 256 bytes), total 0 (slots), used 0 (slots)

(this is iscsi root so I need the NIC).


I bisected it to "x86: remove the IOMMU table infrastructure" but haven't actually looked at the code yet.


-boris


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 13:18:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 13:18:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282224.480851 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPOsV-0005eJ-Ce; Wed, 02 Mar 2022 13:18:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282224.480851; Wed, 02 Mar 2022 13:18:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPOsV-0005eC-9V; Wed, 02 Mar 2022 13:18:51 +0000
Received: by outflank-mailman (input) for mailman id 282224;
 Wed, 02 Mar 2022 13:18:50 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=9gnM=TN=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nPOsU-0005e0-4Q
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 13:18:50 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4b422ab8-9a2b-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 14:18:48 +0100 (CET)
Received: from pps.filterd (m0246631.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 222CSxWF018990; 
 Wed, 2 Mar 2022 13:18:03 GMT
Received: from userp3020.oracle.com (userp3020.oracle.com [156.151.31.79])
 by mx0b-00069f02.pphosted.com with ESMTP id 3ehbk9caq2-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Wed, 02 Mar 2022 13:18:03 +0000
Received: from pps.filterd (userp3020.oracle.com [127.0.0.1])
 by userp3020.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 222DFgBL188140;
 Wed, 2 Mar 2022 13:18:02 GMT
Received: from nam10-mw2-obe.outbound.protection.outlook.com
 (mail-mw2nam10lp2100.outbound.protection.outlook.com [104.47.55.100])
 by userp3020.oracle.com with ESMTP id 3efdnq830r-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Wed, 02 Mar 2022 13:18:01 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
 by SJ0PR10MB4638.namprd10.prod.outlook.com (2603:10b6:a03:2d8::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Wed, 2 Mar
 2022 13:17:58 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::6d20:6694:a16:56f7]) by BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::6d20:6694:a16:56f7%3]) with mapi id 15.20.5038.015; Wed, 2 Mar 2022
 13:17:58 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4b422ab8-9a2b-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : from : to : cc : references : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=h5AZWSbOc0KTtdyh9+8qxRvai+pDBFNH4HZ/HB6BAL8=;
 b=KUOkXno7EkApM+0MHqwg6YyVzbCFkMbXsXDKyf+Naqjirx33GLBEo6wxDrjZZOOg1oju
 9htM+YCJ3eRng9MJHRxpeyBkoiZTl3aniVdrIk/OoEYBaQ+YonxY2PTtWIrmxED6moO5
 jpvkkwlgJtm+ZMZzzxgF+tlBKtT+ee621OLcQUbxjlSnevSXRQ9+dkgw12tA9rgcZz3/
 GLJch7DX6s3rADXLrcG6akxTsqPDJs/jKpaDeOzTCRb/dLU9rkCQ1jgAhkvYZNBBv51K
 h90WaBvLAHqhRQYxacK1aypIrTdqsE+F5+mRVKXi+yPC74AbkbOfsGdhIjoM9A/IMSdd 0A== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=IqAhL5bqplMBWx1mtMp+PbbkOInJYc9I0Mu6ioVV0Rb11tGzAAmQt4tOOdBrtFfVXdNdvN0cndLJHXYlmOpdce72qRgfSkX9OFWpv3fbaDcE7EjjOqalzGWezrevkEj6jEdA+nFuyumWvEag7w2iiopuGaUzHVuHE/gonC14vOTi12uvT+SrmGIeInDBn8zlwQUXgZ3dfGdk4pH34jBDmmV6Xah0kxC//zUA9peoECc68ze4zGXCFgWsPPYRdgTsb8G6Krf6fEVFArsbzMaueHBcbZQT7AUa3W9trUj5LlJp+VSWheX1A4UzGR7SN9lojaTEg2uC9FN7NqzC8gYSUA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=h5AZWSbOc0KTtdyh9+8qxRvai+pDBFNH4HZ/HB6BAL8=;
 b=isWTqH+pDWOyRcp9oL1Q4s017qgkkEdl5k5h5h5y/N+DwjuwNTCbCrnHsi/4aQPGJBWCFsijuwBy2BQZx48TLJOgYtMDRQeDevRTAwN9N4MX5SzlLlABdXDI6j9Q7GwUR7pq0SYkFTOZJpAl1HWBqkqz+Y6D8+TlnfCIcfoMgi2dSjQ3KY+qG8y5ZMBYXBPLRsLhHT59rLOnnlfo5AwD3HOCwQ6DeAItv64sJIHMAQ829dkuheLcqscauwgkNcSGPCS99e1OI1z9LyXhTVDrNxs9Qb7P8eOKMJh5C91ho2HgbXVtd6pIYUGVDfx4DT3oyIWAY21ipEY/9nVJU3FEaA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=h5AZWSbOc0KTtdyh9+8qxRvai+pDBFNH4HZ/HB6BAL8=;
 b=PJjdzF9TjGobAabBfiYblK9ud/IR5xmGXzkTg/BKBXtFsh6cBFVybzGFBNzOOElhYNORP4YctGBcO7xXTQr2h+YAIN61DqVqYSlAGz1AozPZERD95kfaFkam0CK5Mm3BqvliUIYmDCeZqASw/20BYw/iKpGsglFqsjRb9X62hgY=
Message-ID: <c291ca70-18cd-8512-0691-8ceaf3009804@oracle.com>
Date: Wed, 2 Mar 2022 08:17:52 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH 11/12] swiotlb: merge swiotlb-xen initialization into
 swiotlb
Content-Language: en-US
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
To: Stefano Stabellini <sstabellini@kernel.org>,
        Christoph Hellwig <hch@lst.de>
Cc: iommu@lists.linux-foundation.org, x86@kernel.org,
        Anshuman Khandual <anshuman.khandual@arm.com>,
        Tom Lendacky <thomas.lendacky@amd.com>,
        Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
        Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
        David Woodhouse <dwmw2@infradead.org>,
        Lu Baolu <baolu.lu@linux.intel.com>,
        Robin Murphy <robin.murphy@arm.com>,
        linux-arm-kernel@lists.infradead.org, xen-devel@lists.xenproject.org,
        linux-ia64@vger.kernel.org, linux-mips@vger.kernel.org,
        linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org,
        linux-s390@vger.kernel.org, linux-hyperv@vger.kernel.org,
        tboot-devel@lists.sourceforge.net, linux-pci@vger.kernel.org
References: <20220301105311.885699-1-hch@lst.de>
 <20220301105311.885699-12-hch@lst.de>
 <alpine.DEB.2.22.394.2203011720150.3261@ubuntu-linux-20-04-desktop>
 <ca748512-12bb-7d75-13f1-8d5ec9703e26@oracle.com>
In-Reply-To: <ca748512-12bb-7d75-13f1-8d5ec9703e26@oracle.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: SN4PR0701CA0008.namprd07.prod.outlook.com
 (2603:10b6:803:28::18) To BLAPR10MB5009.namprd10.prod.outlook.com
 (2603:10b6:208:321::10)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: e4932796-e73f-4ab3-a65a-08d9fc4f121a
X-MS-TrafficTypeDiagnostic: SJ0PR10MB4638:EE_
X-Microsoft-Antispam-PRVS: 
	<SJ0PR10MB4638BB9851E883CEEFF34C628A039@SJ0PR10MB4638.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BLAPR10MB5009.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(26005)(186003)(4744005)(2616005)(44832011)(36756003)(8936002)(31686004)(6512007)(316002)(6666004)(6506007)(66556008)(8676002)(66946007)(38100700002)(5660300002)(7416002)(2906002)(66476007)(4326008)(53546011)(508600001)(86362001)(31696002)(6486002)(54906003)(110136005)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?NldFRjlua0Nya1NYZHg4WGpPMTVOcHVZWHlDQ1NSQjlqRVlYUzZJbVdiaWFV?=
 =?utf-8?B?Ujk2UjNmangwUm9rbWFtWlkzeU5JMlZLMW9oRGtsTE1rZkhBZzFYTXFjRXJh?=
 =?utf-8?B?VkJPc0RUeFlpY2R3Q005aldIU3g1QzdUUS9XWnRvVUJtcFc5RFh4SlRqdFVS?=
 =?utf-8?B?Q2FUbCtiRXg2ZTFaUEZ0S1BaeFZKeUdOdHRyY3FOVXJUM3ZxckUyMzE4Ymhp?=
 =?utf-8?B?SmJlY2RMOXJZdGdseFFtNEk1b3dsWTRPRHl2UnVLZktEaTdsK2Fmb1M1LzFk?=
 =?utf-8?B?QmJub3crMFgvUGFaZWFBc2RhSm9qVU9MRUZId2JQUzF0V2toclpPMkM1SlIx?=
 =?utf-8?B?bkRac1lJZDAyT1J6UEcvMTArYWtHUWt0M0FiZTRNWEo3WnZ5V3EyNUtDaDZv?=
 =?utf-8?B?QWY1dkpDK1hkc2lWWTY4N2dLM2tudzlvK3lSRUd0MWVEKzVkREVCTllNaHBm?=
 =?utf-8?B?YmNaN1RQM3M2Tk52aE1Hb1ZhWHd1VGo4aDZLZGU3amRRZ05UcnhmR0xCZ05M?=
 =?utf-8?B?MmU4eGdPS2NXcmpJQ3I5V2lpQ2lFWU1qSHVkZHorcTQ4amIrdFVpUGlXWklI?=
 =?utf-8?B?MVF4THBZanljWUFZUmRqWVNFcHk5ODVweEFXTHpGQk1yaGRvcmNaN2Y3dG1n?=
 =?utf-8?B?SGN2cWtEWGNHS0VBMGYrYUV4Vjd4WmFxOTltK1BWa2s2dnU3MEpla3VBTzhB?=
 =?utf-8?B?OGJOSnQwYUYxZmpIenZzdEVSdGZoWXJmR3d0c0ZTVEJXa2VyMUFOYW1JRDI2?=
 =?utf-8?B?bi9ySmhSZENOL0M5NnhIN0IyNmpXMFpXVUJubDZvem0zL2oxZzQyd1owVmlK?=
 =?utf-8?B?ajBsUEtpSW5CLzU0OUVXcWRFVHhiakpMSlFmbG9QWTg3M3RBTXNzRUI5RUQ5?=
 =?utf-8?B?ejlnU3pGcUpVUUdjeU1IZGY2R3JoMU5saEZqTi9aNUZDZDdoQXNuMkVHVkpw?=
 =?utf-8?B?bXUxazRya0FRWUZQem9CdEpVVWQwdTViM00xSzZ3WXNtT3VjQVpwRUhuOW85?=
 =?utf-8?B?V0Z2ZHRlUlBmNEJjcmx5NDJBVFQ3dkw0czBQdXdqWm9idHpzSW81WTdOQU9s?=
 =?utf-8?B?NXVEVmxGTmkvdTZuU2N6MkxmUkd1YmhGTHoxMmo5ZXROd0tYNWoyOFA1SHNE?=
 =?utf-8?B?djlndExlWGxoM2dKNnROcVVrZWV5UmVDK0t3dzk3VmlseUtsNEJTOFk4WGo1?=
 =?utf-8?B?V0VGblJXbk1lUU9VeWFpOFpUVDRhazFMTS9wK2x2UWNydlJqRnZ6VCtFb0dY?=
 =?utf-8?B?TmpPU1NMVEpmaE9qSUc1SXFNTXQyMlRNb1RncXAyTm5acGxSZ3NpaVYrZkcz?=
 =?utf-8?B?aGdtYmRFZkViRmdNNll3UWtlWkZrSWFTcWMyOVBBc3VXeTk0eFlyZWVzZ1Uw?=
 =?utf-8?B?ZzRFMCtkVFF3RnBmWG9XN1VIUEV2MWwrTHBjeUF2TXZQcWx1Qy9DSTBUS2l2?=
 =?utf-8?B?cjVWcjNUamMzNXVyNlV0dlNKbmVTTWwyL0daa28xemVTMTFCU0IyUkxjdzcx?=
 =?utf-8?B?elczeWJDMjRGanQ4dTFua05pMXhxTGwyTkVMUzYzZ1JhbVFqeXdVNjdjS3ox?=
 =?utf-8?B?anpacUx1TUMvOFp4KzFxQW5RL1pwL2lGRW93OTJIQ0RUSlZ3REUzc0dTdTZp?=
 =?utf-8?B?NEdraTVxVHp5UXJ4NzYvMG12OUw1cXY1VC9RbVZzc2ErSzVqcTQzcUJXdlJl?=
 =?utf-8?B?ZW5rcnBVT25PdWxPbURjci9kK3JzR0hRTks1RmlEZFdtSjI3dWg5Vlg1TS9z?=
 =?utf-8?B?V3JtOWJKWVNxc0pJQjB6a1ZtU1RMNUt5UzhyYVhGYU02SUo0U1J6a2ZrMjBO?=
 =?utf-8?B?QnNxRGpiTWJzTFQ2emFpR1Y5Z0NhWlpoYWY1dkd5QTFhZXdXOThNcHhicXpw?=
 =?utf-8?B?a2Zsa1I5a1pjcFVEMUhLWHlvRFhZU2U1SW1qcGEwbVhDWUpmR0xFL1YyZE1k?=
 =?utf-8?B?MFY3Z2RxU2w4VUdvMFVlclRIcWpleEVhMXBNNmlzNklza2kwRjZXdmZSZnVa?=
 =?utf-8?B?ZHRHSVZEZjFaMnBoK21mKzgvV3Z4VWJ6ZWRySUMxbUVuUUNDdU0rWTJ0R20w?=
 =?utf-8?B?QzNBaFRuQzRnZ0xSVm9jMGJ1VWZGTXVDbzFWWTA3bUllUnVQYURnd2xGaVAr?=
 =?utf-8?B?b2k0SDZFS0M2SEU1MUNGM1VrczNnUzhvanJ2bUMyWTBJWVFLY3ppdDBmUkRa?=
 =?utf-8?B?L3lHaE1WTjdldlh2b0wxNVU1NTVpcXlkb1g5UkM4bFJXRDVjRUNMeXFnZkhO?=
 =?utf-8?B?emQzUzlrVDBDNmZHamRRODhwMmZBPT0=?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e4932796-e73f-4ab3-a65a-08d9fc4f121a
X-MS-Exchange-CrossTenant-AuthSource: BLAPR10MB5009.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 13:17:58.7382
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Z/beoJh8t1PlWcUcQHqx6za+Kw9gl95udqHLb6qqo0jVoSqA4a35HPHMzUWroiGeh7iird5EjViww4xis1bb7qO+56SROha4g+ITOwXkKGU=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR10MB4638
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10273 signatures=685966
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxlogscore=922 bulkscore=0
 adultscore=0 phishscore=0 spamscore=0 suspectscore=0 malwarescore=0
 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1
 engine=8.12.0-2201110000 definitions=main-2203020057
X-Proofpoint-GUID: BfdmuvdJ22S9UkowXG8e1KsBx8SAEAHX
X-Proofpoint-ORIG-GUID: BfdmuvdJ22S9UkowXG8e1KsBx8SAEAHX


On 3/2/22 8:15 AM, Boris Ostrovsky wrote:
>
>
> On 3/1/22 9:55 PM, Stefano Stabellini wrote:
>> On Tue, 1 Mar 2022, Christoph Hellwig wrote:
>>> Allow to pass a remap argument to the swiotlb initialization functions
>>> to handle the Xen/x86 remap case.  ARM/ARM64 never did any remapping
>>> from xen_swiotlb_fixup, so we don't even need that quirk.
>>>
>
>> Aside from that the rest looks OK. Also, you can add my:
>>
>> Tested-by: Stefano Stabellini <sstabellini@kernel.org>
>
>
> Not for me, I fail to boot with
>
> [   52.202000] bnxt_en 0000:31:00.0: swiotlb buffer is full (sz: 256 bytes), total 0 (slots), used 0 (slots)
>
> (this is iscsi root so I need the NIC).
>
>
> I bisected it to "x86: remove the IOMMU table infrastructure" but haven't actually looked at the code yet.
>

Again, this is as dom0. Baremetal is fine.


-boris



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 13:26:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 13:26:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282231.480862 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPOzX-00075S-4Z; Wed, 02 Mar 2022 13:26:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282231.480862; Wed, 02 Mar 2022 13:26:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPOzX-00075L-1C; Wed, 02 Mar 2022 13:26:07 +0000
Received: by outflank-mailman (input) for mailman id 282231;
 Wed, 02 Mar 2022 13:26:05 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPOzV-00075B-Og; Wed, 02 Mar 2022 13:26:05 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPOzV-00064f-Gj; Wed, 02 Mar 2022 13:26:05 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPOzV-0007JK-2r; Wed, 02 Mar 2022 13:26:05 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPOzV-0005xM-2Q; Wed, 02 Mar 2022 13:26:05 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=NRnjWD4FlKhxeorf+fbFPvRqvt/g0AkcX1EHSNCNcTc=; b=yRXPyUXqF5q+1XUo2dadydSjla
	zofrkJrJi78ohwGJ8Jol9hq0FCjS57nVEx0PqV85z/totryDJPvabwjZzYXpw8pugeXisO33cro4T
	wDHVOnK0NcW9+nYMF/S8rmX91tV3b/ZnJWTJENA1p7MiFljzmRXA4m2QwYgpAOfBqwwc=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168331-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168331: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=4b7fd8153ddfe95d6d427ff241abb6fdf37e027b
X-Osstest-Versions-That:
    xen=faecea18d252f97c6ad41f0f457566ff2c125b8d
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 02 Mar 2022 13:26:05 +0000

flight 168331 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168331/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  4b7fd8153ddfe95d6d427ff241abb6fdf37e027b
baseline version:
 xen                  faecea18d252f97c6ad41f0f457566ff2c125b8d

Last test of basis   168313  2022-03-02 01:00:26 Z    0 days
Testing same since   168331  2022-03-02 09:00:26 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Jan Beulich <jbeulich@suse.com>
  Juergen Gross <jgross@suse.com>
  Julien Grall <jgrall@amazon.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   faecea18d2..4b7fd8153d  4b7fd8153ddfe95d6d427ff241abb6fdf37e027b -> smoke


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 13:39:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 13:39:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282242.480872 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPPCO-0000gj-CJ; Wed, 02 Mar 2022 13:39:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282242.480872; Wed, 02 Mar 2022 13:39:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPPCO-0000gc-99; Wed, 02 Mar 2022 13:39:24 +0000
Received: by outflank-mailman (input) for mailman id 282242;
 Wed, 02 Mar 2022 13:39:23 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5HSw=TN=citrix.com=prvs=05368ea7b=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nPPCN-0000gG-1o
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 13:39:23 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 294580f1-9a2e-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 14:39:21 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 294580f1-9a2e-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646228360;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=bPa0UYqeoFtBIxCTPcVqZ7v/KbpZ7TJn1HxTyYytDYk=;
  b=F2JP5LwaW8tVQi+wdsIGI0lEO97i54cjXq35VCPERlDZQYPMRayDjYNI
   FlOk6/T5ts1N2jarW0K09Pq+qhb133QnKVoalV8J+EXV9Uos495v73Lwy
   Ne7I9Qsl+2wlNH9qGNey+ux4Y6KmTIbyVJstCNSZLFxMkv/EE6z4h4HyF
   g=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65212065
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:lJMfjKlJScLPLGxtcpid4W7o5gycJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xJNDGuAaPnfN2vxetB2aI/koUNS65eEyIMxTgtvpHg3QyMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiW1nV4
 rsenuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYGSAELrP0o+UnDBBZIj9TOp8eyuXcPi3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3k3ds1zzGS90hRojOWf7i7t5ExjYgwMtJGJ4yY
 uJHNGA2NkyePnWjPH87GI4gtsr13kPNbmR3lXCFoI8cv07MmVkZPL/Fb4OOJ43iqd9utlaVo
 CfK8nr0BjkeNceD0nyV/3S0nOjNkCjnHoUIG9WQ6fpCkFCVgGsJB3U+V1G2vP24gU6WQM9EJ
 gof/S9GkEQp3BX1FJ+nBUT++SPa+E5HMzZNLwEkwFGq57rK2z2YPDcNTw9fRdsU7P1sXiN/g
 zdlgOjVLTBotbSUT1eU+bGVsS6+NEApEIMSWcMXZVBbuoe++enfmjqKF48+S/Dt0rUZDBmtm
 2jikcQou1kEYSfnPY2f9EuPvT+jr4OhouUdtlSOBTLNAu+UieeYi22UBbrzsK4owGWxFADpU
 J04dy62trpm4XalznHlfQn1NOv1j8tpyRWF6bKVI7Ev9i6251modp1K7Td1KS9Ba5hYJ2a3O
 BeC51oAvve/2UdGi4ctOepd7OxwkMDd+SnNDKiIPrKinLArHON4wM2eTRHJhD28+KTduao+J
 Y2aYa6R4YUyUsxaIM6Nb75Fi9cDn3lmrUuKHMyT50n3gNK2OS/OIZ9YYQTmUwzMxP7dyOkj2
 40EbJXiJtQ2eLCWXxQ7BqZIdQFadSVgXMuuwyGVH8baSjdb9KgaI6a56ZsqepB/nrQTkeHN/
 3qnXVRfxka5jnrCQThmoFg6AF8zdf6TdU4GABE=
IronPort-HdrOrdr: A9a23:LWbXw60LZ8UVUdc0MhpZpAqjBRxyeYIsimQD101hICG9Lfb2qy
 n+ppgmPEHP5Qr5AEtQ5OxpOMG7MBbhHQYc2/hfAV7QZnibhILOFvAt0WKC+UytJ8SazIBgPM
 hbAtFD4bHLfDtHZIPBkXOF+rUbsZi6GcKT9J/jJh5WJGkAAcAB0+46MHfhLqQffngcOXNTLu
 v52iMznUvHRZ1hVLXdOpBqZZmgm/T70LbdJTIWDR8u7weDyRmy7qThLhSe1hACFxtS3LYL6w
 H+4kzEz5Tml8v+5g7X1mfV4ZgTssDm0MF/CMuFjdVQAinwizyveJ9qV9S5zXMISaCUmRQXee
 v30lMd1vdImjTsl6aO0F3QMjzboXMTArnZuAalaDXY0JTErXkBerV8bMpiA2XkAgwbzYtBOe
 twrhKkX9A8N2KwoA3to9fPTB1kjUyyvD4rlvMSlWVWVc8EZKZWtpF3xjIfLH4sJlOy1GkcKp
 gnMCgc3ocjTXqKK3TC+mV/yt2lWXo+Wh+AX0gZo8SQlzxbhmpwwUcUzNEW2i5ozuNxd7BUo+
 Dfdqh4nrBHScEbKap7GecaWMOyTmjAWwjFPm6eKUnuUKsHJ3XOoZjq56hd3pDhRLUYiJ8p3J
 jRWlJRsmA/P0roFM2VxZVOtgvARW2sNA6dvP22J6IJzYEUaICbQxFrEmpe4PdIi89vd/HmZw
 ==
X-IronPort-AV: E=Sophos;i="5.90,149,1643691600"; 
   d="scan'208";a="65212065"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=h3uLcszBbSjFkyR5CVafnaka/jBECvbi3HyOjCHydtJJuj4PbhpZyhRQ8757Gtes7vidKgJkwSl1N87NbR3KggSjyHqvqtMGEdbFcag73WLGaN72QG4vsS9LcjcNQwDg7Ka4LEvd8PoMmbXqA/1qsW5G7xpanLUuiBkZrQbkjqhvsx3cjNyzUxjcI7kLPzJqDv3vB0J2w8vjSHZvcB2fxPK+i4t4/wT2v4Twg7GdiKkEFk+GnbsIKvrz/2T+Snk8BWSIBuMA0ii59z4DgEF09cv+5jVKtgWQ/kTXa2KpmzrYWmefAeK0QHweZnKwYM6edcuxMZ9YavFYHbXQJYV/1Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=bPa0UYqeoFtBIxCTPcVqZ7v/KbpZ7TJn1HxTyYytDYk=;
 b=QRwcfv91xtirrKrhpFBl/x+S+C6aypRImiOOTAORrcOPV8T8CvAKGuJv005ii+4wSp0oh6/+sLigdLPQLUMwjGqYVI560jZZDO6hn5IziTQXI+/dGorBW1SPDt8hAktI1qJ0F5sXPCzhm6sHD2K1exDeli0ZgOG9cVDSBzGvfIFliyAvn1mnoxhkn3PhOLvZAQxq9prp7m8WfJGjO8qkZONDIQ1lSWtSC588VuaToJaPXh6TIBjMkajuUIQ21R2eHy94P92mZZsAlIZBjl3iQQWxwMlalak6BYQ3/8PlGZuN+Igm1L52/LPU14YVP/7OMzpUqzAhDfQix9y9fRz6vA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=bPa0UYqeoFtBIxCTPcVqZ7v/KbpZ7TJn1HxTyYytDYk=;
 b=sK82Ruq2gd2MmJlN6+IZLtCnBKRvDsFl+YtZOOlNdLkcdhPOxEgridHyr8Xl3r5cy5We4xMKvqDfzvLLaeoMZ3HQkeoArMj6EfGk4oxhz7RBKrTVXC8f+k3vx4rEgLya/BKQ8oaJ8YAs/fswYuz5aMKgONtg8pn8Cey4I1WK8y8=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>, Xen-devel
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v2.2 8/7] x86/IOMMU: Use altcall, and
 __initconst_cf_clobber
Thread-Topic: [PATCH v2.2 8/7] x86/IOMMU: Use altcall, and
 __initconst_cf_clobber
Thread-Index: AQHYJ+IV6PtRJY8p5U2wBnUH9jKzdqyj8n0AgAa3aoCAASBXAIAAIhyAgAAGJQCAADOGgA==
Date: Wed, 2 Mar 2022 13:39:09 +0000
Message-ID: <15868475-0702-c884-143f-366b9d79a255@citrix.com>
References: <20220214125632.24563-1-andrew.cooper3@citrix.com>
 <20220222114711.19209-1-andrew.cooper3@citrix.com>
 <e8b71b3a-55a0-31a2-b2ab-3b2470680709@suse.com>
 <5fae516a-17c1-0ce4-c46e-909a83c0e273@citrix.com>
 <60f3c942-3822-87dd-df6e-8b64ed4d17c4@suse.com>
 <e41848a6-9aaa-f0d3-0c81-2e0e4e96a6a4@citrix.com>
 <67ff91f4-e5fe-47d5-fdb8-9a302beb6e2a@suse.com>
In-Reply-To: <67ff91f4-e5fe-47d5-fdb8-9a302beb6e2a@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 78d1ccc5-e438-46ea-a916-08d9fc5207c7
x-ms-traffictypediagnostic: CO2PR03MB2341:EE_
x-microsoft-antispam-prvs: <CO2PR03MB234199E62C5BD8CEA23E8317BA039@CO2PR03MB2341.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(38100700002)(2906002)(6512007)(83380400001)(82960400001)(122000001)(6506007)(53546011)(186003)(2616005)(26005)(6916009)(54906003)(316002)(8936002)(71200400001)(4326008)(31686004)(8676002)(6486002)(64756008)(66446008)(66476007)(508600001)(36756003)(91956017)(66946007)(66556008)(76116006)(31696002)(86362001)(38070700005)(5660300002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?MU5GLy9vYXBZaGNGZU5pQ3ZDKzdDRmNxR2prMERPc08zY0ZGQVl2WnFQTzZB?=
 =?utf-8?B?ZFNOZ0JPVVpGQ21RMjlvbUZPYjVQazBGQ2xlbE1EYm1NQ2FjdGFlTklKK0Z6?=
 =?utf-8?B?WGhRK0tid1lSQ2FNMVh5VHQ3Zmg0cm0rOTN6ZFpNd29tSURyM2l3U090VVhv?=
 =?utf-8?B?cjU1TzdDVzNvazRLY0NtTHpWWmMyZW5LL1o2ZG9NSzlpb2VNUkxIY2dVUDlw?=
 =?utf-8?B?ZWM2NUxQeDQzcHFPUE5yV09FZFo0a1hGOUdwWisrRlUrUmZ2Um5PM3ZoNXo2?=
 =?utf-8?B?UkpPREZ5dnd1VUpaOVJocVNyZzZjSWVUQU4rdmRtVHAybVl3d0xTcFJmanhC?=
 =?utf-8?B?MFJpWGVZcldFRnkxZG9QMWVzN0RnVDNmNXJaSlh4N3IycFkzVWFrWm02d0RZ?=
 =?utf-8?B?amkwSzdmZWNrU0hxSXRwdFBvZTFObjNka1lGMUhGdDVuYldGQld0dE5Tei8z?=
 =?utf-8?B?aVhtSnRKREtYRmVnSVBEbnN0bUZzTzdDT005Z0l4L3dQSUhxb1VoalllbEF1?=
 =?utf-8?B?UkVSNytiTUQzZHlEODU1YlpvQlFOZHUvNFJUekdSa3pRQmtNc2pZbHE4YmF1?=
 =?utf-8?B?VHV2T0x3ZWJWVWs1cXJtVXlIenJybEtRckxOaGJiSUs0a1hwQ21mNXhQTDkv?=
 =?utf-8?B?Q2hCMW10b0JBWWtTR1hwRTZkd3JNM01ic0lKMFJaTmJTd3o0bFlCdDBRQ3NN?=
 =?utf-8?B?RnI1cHVNZWNJQ3NXaVVLazkwVllZeW1EaGVSWnYrV0RrSGN1NjM5QjVFekZx?=
 =?utf-8?B?OG83NFN6Z2REWTVjVUZhMWR1NW9CS1BxQ3hvN09zTVY0UEdsWlhDNnBHaHIw?=
 =?utf-8?B?cVNVYUdid1VRVWZjTW1YMy9PNHRDSXcvOEdwM0NrMDhGNyt4enhsZ0FzcFV4?=
 =?utf-8?B?N3V1ZjZQMzdNSEJ6ZEJlMnVBdXZsM3NVc1o3Z3BjYnRwRHhRbHRIQTI4ZHZ2?=
 =?utf-8?B?R2lZM0dJWFdLc1A4OHFDbXE3L1Y5ZllGRXExWTBxSHlIcUJjQXVnNEhuM1Zz?=
 =?utf-8?B?QlV1eVl1SG1RRDY4WXd0KzlNbThrWnllVW5HRDNVQ2dpY0NIRXhqYS9Gd3dz?=
 =?utf-8?B?cU9uNjIxVUlpZTZNQWVjWmxyZzdIdkZPQzMvcVdEZG1EZUlnZ0lHYWVValQ3?=
 =?utf-8?B?YzNBUkt0LzNnRmZpOVhGSW5nZkhJV0I0RnRVSEtVNFlndjBWUlROOC8zYXh0?=
 =?utf-8?B?d2hNY3hRTHpMdElCTzBvUFZJYkhmQlUzK2dORVRtTTRQSWtNZyt4R3pRU0pa?=
 =?utf-8?B?NVpjNnY3RUgzbDVkaWVnNmxPeFBLRWZqTGx4bHlHbkE2Q3NlU0QrRGNQMUpC?=
 =?utf-8?B?UHl0R2Z3cGNpVnBVNFdmY3NxRDdhZ2Nrcm9SZDBmS1VzS00zU08ydUsvUXZL?=
 =?utf-8?B?QkhCYXNXYUF4b2dYdVBSdjRGZVkrTVZtSXVrcitOYlJIcVU4dXZxK3lFTVFF?=
 =?utf-8?B?YzRXVmYwOFBnRnVYc3ZNRXVvVjN4bk1sdW90ZnNyYi9OVDZSNGJHRU83NlJZ?=
 =?utf-8?B?VjVFVWZzMUlVSWxCQlpndFBZbURFTXNRcUtDS2g5Rys5N1VwUjBGOVVNZDcw?=
 =?utf-8?B?dm40L1JxZXN1SzJzRU1SQjhTOW10NVdNc0dLT1BHNVZjQW5ubFR6YVp5U2du?=
 =?utf-8?B?Umg2VnZLUGpVZWh3SEg2dXRnckNFbks5dG9Va1cyeDVLYnVibFNzdjdWWUUv?=
 =?utf-8?B?RjNXdy82dUtlOGZLTEZNcFFJenM3anYzT1FjKzF6U3RneDdXUmFmWDNFblUr?=
 =?utf-8?B?YlZaRXFXYWM4cUs5OG1SekxOcWhaYjREQVAvbG9GRnZsOHNheVRUZkZPOTdN?=
 =?utf-8?B?MnZQUVRPRmtnbUUxc2JpVUNZdmZiZDcrVkVXeGI4dWdzSVVMQzM4MUR4WmZE?=
 =?utf-8?B?K0hRQUFqVWNGUUt1bFAyL09QeW0vckpCUlhzSjVTSnFnRmk5NFo3UW5EZFZE?=
 =?utf-8?B?Mm9ZenliWFJOSlZUTGFBdVJ1N2l5U3l0UjdITU9NVkt3TW5MT2NLZTU0dDYv?=
 =?utf-8?B?VkIxM0szZU9zMnkvK3hUcTBramJ4dWc3NThKa1R5WSs0TE9lWXZtWkEvRHVk?=
 =?utf-8?B?WHlKdGwxTlpjZE1QeFZNUDBOaGFDMEU0R2xDSFlqR1J5U3VGOWFPMEV6UVR6?=
 =?utf-8?B?Q3Z2QVNCdzlXM2E0Sk4xTzFwdEtDTitYYnUvSGlCRHRtNTRUbGt6WEJ2cGU1?=
 =?utf-8?B?azJ4UkVqKzh6TXBhM2J5RHhkSEVwZ2FhSlRhWkI1a1pYVHc2cWhyWnpqc2w0?=
 =?utf-8?B?SExBSDRZeXdNYk5rTFhsUFUzU3pBPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <F0F10CEE52BB3D489D67A5712FD0C744@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 78d1ccc5-e438-46ea-a916-08d9fc5207c7
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Mar 2022 13:39:09.6429
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 1afsKz8bcvosRs2VjI40Tpl+owxZGCzHGhIHMStO8FGtrbZ5lyvkep+CNJEDVHayrZoU+E4ZMVI/BoLyCLTXlv8VyZar0vh6WK+pvPDgTa8=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO2PR03MB2341
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Wed Mar 02 13:45:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 13:45:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282251.480884 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPPHp-00028y-2x; Wed, 02 Mar 2022 13:45:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282251.480884; Wed, 02 Mar 2022 13:45:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPPHo-00028r-Vy; Wed, 02 Mar 2022 13:45:00 +0000
Received: by outflank-mailman (input) for mailman id 282251;
 Wed, 02 Mar 2022 13:45:00 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LB9Y=TN=citrix.com=prvs=0530a50c4=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nPPHn-00028l-Vo
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 13:45:00 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f23861b8-9a2e-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 14:44:58 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f23861b8-9a2e-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646228697;
  h=from:to:cc:subject:date:message-id:
   content-transfer-encoding:mime-version;
  bh=yy95bZc1mafoynhoap3Dua9XOm5rukrDtL8/9mucZuA=;
  b=N0la9Poldn8bJMGAisj9ekpt6wT1pOPLPDuHumrdp0b54uIXhyAUBSHy
   kSJt1Q7SfWrz9fpSZJ0Y/tvcSYoeAv+opxMNXe6/qE8y0xfxHEjkDjgBP
   03yvKGbzL+Vi5IvhbGELfca6GSWtHu3SXPfqjvIx5nyj4PswKHxips+uU
   E=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67611185
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:GHsVbq+YRLaz+LUzroUQDrUDdH6TJUtcMsCJ2f8bNWPcYEJGY0x3z
 TBNXTzVOqvcYTGjLdsgbdzj9UpTsMDQxtRmHAA5qi88E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oDjW1jlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCna6cYCcPb63HoroidkZAThgvH7RZ1LCSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFJkYtXx6iynQEN4tQIzZQrWM7thdtNs1rp4RQ6+HP
 ppEAdZpREX9ah91Z2saMrkRgeKOuiKjcB5f72vA8MLb5ECMlVcsgdABKuH9ZdiiVchT2EGCq
 Qru9WnjHgsTMtDZzDOf62+tncfGhya9U4UXfJWG8fptjEyW13YkIhQcXlumotG0kke7HdlYL
 iQ84TEypKI/8EiqSNjVXBCipnOA+BkGVLJ4A+A8rQ2A1KfQywKYHXQfCC5MbsQ8s807TiBs0
 UWG9/vrDzFytLyeSVqG66yZ6zi1PEA9L3IGZCICZRsI5Z/kuo5bs/7UZo89Sujv1ISzQGyuh
 WDRxMQju1kNpfwn/oWdrFDMuWyTg8fREzdkxBzIcm3wu2uVe7WZT4Cv7FHa69NJI4CYUkSNs
 RA4piSO0AwdJcrTzXLQGY3hCJnsvq/Ya2OE3TaDCrF8r2zFxpK1QWxHDNiSzm9NO91MRzLma
 VS7Veh5tM4KZyvCgUOajuuM5yUWIUrISIyNuhP8NIMmjn1NmOmvpnsGiam4hT2FraTUuftjU
 ap3iO71ZZrgNYxpzSCtW8AW2qIxyyY1yAv7HM6nkU35ieLPOifEE9/p1WdiiMhjtstoRy2Pr
 r5i2zaikU0DAIUSnAGNmWLsEbz6BSdiXs2nwyCmXuWCPhBnCAkc5wz5mtscl3het/0NzI/gp
 yjlMmcBkQaXrSCXeG2iNyE4AJuyDMkXkJ7OFXF1Vbpe8yN4OtjHAWZ2X8ZfQITLA8Q4la8kF
 6ReIp7YahmNIxyekwkggVDGhNUKXDyghB6UPjrjZz46fpV6QBfO9MOidQzqnBTixALu3Sfii
 9VMDj/mfKc=
IronPort-HdrOrdr: A9a23:D3HCQq+sJJCldMirI2Juk+Fldb1zdoMgy1knxilNoENuH/Bwxv
 rFoB1E73TJYW4qKQodcdDpAtjifZquz+8O3WBxB8buYOCCggeVxe5ZnOzfKlHbehEWs9QtrZ
 uIEJIOROEYb2IK6/oSiTPQe7lP/DDEytHQuQ609QYOcegeUdAF0+4PMHf/LqQZfml7LKt8MK
 DZyttMpjKmd3hSRN+8HGM5U+/KoMCOvI76YDYdbiRXpjWmvHeN0vrXAhKY1hARX3dk2rE561
 XIlAT/++GKr+y78BnBzGXehq4m2ecJi+EzRPBkuPJlaAkEuTzYIbiJnIfy+Azdldvfq2rCVu
 O85CvIcf4DrU85NVvF3CcFkzOQrArGrUWShmNwyEGT3/AQSF8BerV8rJMcfR3D50U6utZglK
 pNwmKCrpJSSQjNhSLn+rHzJllXf+WP0AgfeMMo/gpiuLElGfZsRE0kjTZoOYZFGDi/5JEsEe
 FoAs2Z7PFKcUmCZ3ScumV02tSjUnk6Ax/DGyE5y4ao+ikTmGo8w1oTxcQZkHtF/JUhS4Nc7+
 CBNqhzjrlBQsIfcKo4DuYcRsm8DHDLXHv3QSmvCEWiELtCN2PGqpbx7rlw7Oa2eIYQxJ93g5
 jFWEMwjx9ER6svM7z74HRmyGG8fIzmZ0Wd9ih33ekLhoHB
X-IronPort-AV: E=Sophos;i="5.90,149,1643691600"; 
   d="scan'208";a="67611185"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=mDqVfh6oljSx4eBGR10x6EWxja3KSGkv7qSLPWofeJed+WEbd6/c86cDvFwQ16HbtPK40sxI2cYZ/q7W6gSWdn95gKgUQI6nJzYqoRpNgQvKajCsNeYztR/3VzUwrfTI7aDuX2pv1swyAtqbOzRcaNOz+5DaB9Guvp+gEDBlwsD9KTO8c5Y2tFObGu3+pzt/TdePvvRzxvsPKyNzmwh5V9CB2odqIVee/VlTWIb9wPi2P1/c8hWTVNxucdX51r9iqu0+54hmeG1axbBb6qUj+GNsAWY79NT0ptgFvDfSddM47tAD1pWO2gPtxoCtsyGkGoGcY1vkncnRovFmAk1Qzg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=/GuEWfnh7t7WFYhXPlf7lXrB2XILSCmjAhkM/Liht00=;
 b=F/ERbX3jh3zH9e1ytbr4hAE0/yl0/q5QrJM9F9SVmNPMjPwnEpUlQ7wJVfbZmEywpLmcSNcZMdfSMwkl4TBWPuFRCdrhWrY1A77nkUtALPameFBvUuQ0yMV/1Mb46IYNn8Daol54wBejKDplA14EQsXnU2ixoZfbtrb7mIWfM46E92F0vAzQfUxYkWw/UkWjTmkril+rZ2iVpYPVEvTVv+BuKXn3OTdvLmposYNZvW59XrYsJ3/hfj5ypZcFrshggcichC2xB8H8LnBBmc+Z9uIczZ1xP7GiFbocb/XD6lyy5W06qZHGoLnnRuc9iTX5Fvwpq9QnDVOYaGE6DytKnQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=/GuEWfnh7t7WFYhXPlf7lXrB2XILSCmjAhkM/Liht00=;
 b=SeXgBtTSt8lN6ChEZBGu89htEsjNMe8xX/7VkkvFUz7sT2ZXHyplfrLNtXxazGQXtnba2LI0/lroB4f8sfoQYmwPpZVmpG+TRyVGT0u7vhwswDqA6VwIxVJEE9xBIuEpPvRz2DHi4ckKpvCVunNNTMNf/J4HFrHcfS0Dlp3qdec=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, Jan
 Beulich <jbeulich@suse.com>, Julien Grall <julien@xen.org>, Stefano
 Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH] livepatch: set -f{function,data}-sections compiler option
Date: Wed,  2 Mar 2022 14:44:25 +0100
Message-ID: <20220302134425.38465-1-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO2P265CA0089.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:8::29) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5ac78c45-a56f-4859-078d-08d9fc52d3a9
X-MS-TrafficTypeDiagnostic: CY1PR03MB2251:EE_
X-Microsoft-Antispam-PRVS: <CY1PR03MB22514BF054972619943CFEE88F039@CY1PR03MB2251.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(6512007)(82960400001)(26005)(6486002)(508600001)(6916009)(54906003)(316002)(38100700002)(4326008)(86362001)(6666004)(66556008)(66946007)(36756003)(6506007)(66476007)(5660300002)(2906002)(8936002)(8676002)(83380400001)(1076003)(2616005)(186003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?WmJKREErSzhCaFVxbzAwRWRXSGRGWlhSNmIydDZVWFNLWU5pUzh6cmxQK2oy?=
 =?utf-8?B?Z3JoUzJ1amZvNlZoWE9aWmwyVHo5cmxKalduczJST2dtR1ZWWTJKU1dwaC8x?=
 =?utf-8?B?YnY2VmxQbzlWc29kTWJoazhUUzViODRZOUwxYkowSDlMZVVvYXpvOFprbjll?=
 =?utf-8?B?UVRUZzdHZjRuSGxxWGVIbW9vUkZETmFYUWpVLzVuWkEwUUx5VW15Ny9KZTZ2?=
 =?utf-8?B?eTU0QTdyTGRraDNJa3hZZjZqQWtROURjaVM1TGFCUVVYcWRWTlI0QzJpeHBU?=
 =?utf-8?B?aGVUaVVlam9jbjNEMUJKVnEvQmNnWWFGbDNGUzF5SW1TQ3BIN0JtaFIxZktv?=
 =?utf-8?B?Vm9nZEVwUVh0akV5endmVkxHaUI0S2h6a1o5Vm5JbWpJa1diaFIvRGpmQUhw?=
 =?utf-8?B?OXVER1BzZ2Y0SENkKzRFVFFNU2VyYS94bnRRcmlCcEpSRU1JUU1yM2xJSTVq?=
 =?utf-8?B?aVZyOTQ2d20xZ0pCYlVYc1hBRTV5dFdrQ1FId0pNc2grcTIzcURpRVRRQ3hh?=
 =?utf-8?B?Nk44bWlUN3FVS20rN29heFJCdWZTVkVWS1B3UllYYVZaU0FZVUhtZFBUbTdH?=
 =?utf-8?B?OHYyKzJJTVNPZ2pKbGk2amdLOG45ZHRJTGV2Z1plcVNYSGhmTGR1Zml4Nmov?=
 =?utf-8?B?dzJPaXg2MktRUDJMREV0MndEc21BVnNld3hZSk43S1RPeGN2YzAzbGVNOXlI?=
 =?utf-8?B?MTNvWnFlSHIvWDcxdmVQSFpVVE9PejBpS0REYjlJa1dyRFdmVmdjMHpPNTFM?=
 =?utf-8?B?NDdUZDZHazIwUlRxZklKUWhLVWxiNUNLOTZZL2d6djNTZ21vQ2FkSmJ2bHRO?=
 =?utf-8?B?RkhxSmdtZHZkRkczNEd0aVNsTEp6aHE2K0hoRHhMTzhuMWtvdE4rTmRFQVJ6?=
 =?utf-8?B?SlhSL0Joa3d5SnR0YURBZ3JWZ0V4M0FaRGFheW5RNThvSW1ESnlUQzRuUldp?=
 =?utf-8?B?VlZzWXZjU1AwQktNeGxLS1NyTGpob01kdHlWYUNlSGRpVmVBRlFFM0JRTW5i?=
 =?utf-8?B?dWtQbHQrdEM2Tm1UdW1rRjVQZ3FFYngzR2FlUGRzdldvNWpLc1BOUllwdnkw?=
 =?utf-8?B?OW8rOFRSOTNQa0hYVXZDejdZeGpiYWZJK1NRTUNxVzJpaUlCYUdWOHhxTC8x?=
 =?utf-8?B?MytoT0NmYi93N1BUSlRvZEpYSjRrSmF1WTJlZ1V5OHkrQmVjdTR3OGwvVURM?=
 =?utf-8?B?MC9KbzFZVndVdjlBQ0Z4SHpCU3g3dG13T25rWTFCaTJJd084ZGdPa0ZLeXoz?=
 =?utf-8?B?R2ZQZVFXV2NmdHZGZStJRyt5T0dsRHJOY2UvL25zbWR4OTdYK1hPVVFDVzFH?=
 =?utf-8?B?RGxQMkdxWUFqTU9zVUhLeGRXbUZXbkRabGdSZEJHTVRnYmZhZ05JaVFQYW9D?=
 =?utf-8?B?eFV2cXBXNE9PQkM3Y25xd2lLOG03ejJZaTM1ayt2cWFKc0c3STBiclJRckZ4?=
 =?utf-8?B?Ukd4L1FNK1hqRE5mcnRzbUNHVGhyWWU3UjV4dklTN0ZUVEN6ZmxHME9rcjZx?=
 =?utf-8?B?V0ZFNnRjNUM5eWtLTDhXMnVFNXB4V3hydm4xMjJQRTVuNEF6Q2tmWHM4WWli?=
 =?utf-8?B?UVdXK210U0ZUTGhUVThnRVRxd25KREdSQ3FQZlY4SGQ4REYwVFpDcWxsVEJt?=
 =?utf-8?B?WWk1d01qM3NrTjd0U3RoZU5mV3d0ck5TaGhKNU1BRGVvekR5RndaRlYweXR5?=
 =?utf-8?B?V0xRMzZRL2VtWjhYcGdNNmhZeFRWdXRxNHU0L1IzNnhGZkh4QXQ0OHZ1MzF1?=
 =?utf-8?B?OE9RTE9vTk5SdkZxbk5nWEFWY3Z5UjFYWGtjdEF1cytaZGVKUXlHSEpxb3RP?=
 =?utf-8?B?eGVLR2thNkQxaFdKTStZQjkrUUloRDd1M2tTTFVqWDBzUEdRTWRpZldKNTdl?=
 =?utf-8?B?M2NiRE1teDYrYUhGYy9hbTh3Wk9JaGljMTF2T0Y0VlRxTjlIZWlHYklBb2E0?=
 =?utf-8?B?RjhSbWM0MWRCMGZzQk9GQWtubDZhNzVBMjZIc3FiRG0rZ29oRGhuL0l1OUsy?=
 =?utf-8?B?UWluKzZXT0FtQjJBT0ZaUzVxNzZyb282eTFJcDd4WmRIRmU0ZDAwNmxOcnd0?=
 =?utf-8?B?V2FaQ0c3RlpCZ1J0UXByODk2Q0dqNUxyTjEzeUdZV2p4L1NnL21YQ3ZtVkpm?=
 =?utf-8?B?TkN3cXJXcmJVRG1LZHpMMnN1L0tsdS9HRmt1bHE2VmVYeVFyS1NYOGttV0Uz?=
 =?utf-8?Q?X349z9KpTHpU1zGx5OsMm08=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 5ac78c45-a56f-4859-078d-08d9fc52d3a9
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 13:44:51.9942
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: w0oqgrGbcNrhugkfQU61iI3m81yFT09p0vKS0W6ukPbDZHYRjLka9R0nUhGr70TI0SrqiDh285P5cDcfmMj9kg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY1PR03MB2251
X-OriginatorOrg: citrix.com

If livepatching support is enabled build the hypervisor with
-f{function,data}-sections compiler options, which is required by the
livepatching tools to detect changes and create livepatches.

This shouldn't result in any functional change on the hypervisor
binary image, but does however require some changes in the linker
script in order to handle that each function and data item will now be
placed into its own section in object files. As a result add catch-all
for .text, .data and .bss in order to merge each individual item
section into the final image.

The main difference will be that .text.startup will end up being part
of .text rather than .init, and thus won't be freed. Such section only
seems to appear when using -Os, which not the default for debug or
production binaries.

The benefit of having CONFIG_LIVEPATCH enable those compiler options
is that the livepatch build tools no longer need to fiddle with the
build system in order to enable them. Note the current livepatch tools
are broken after the recent build changes due to the way they
attempt to set  -f{function,data}-sections.

Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
 xen/Makefile           | 4 ++++
 xen/arch/arm/xen.lds.S | 9 +++++++++
 xen/arch/x86/xen.lds.S | 9 +++++++++
 xen/common/Kconfig     | 4 +++-
 4 files changed, 25 insertions(+), 1 deletion(-)

diff --git a/xen/Makefile b/xen/Makefile
index ed4891daf1..bf14a9bdd2 100644
--- a/xen/Makefile
+++ b/xen/Makefile
@@ -269,6 +269,10 @@ else
 CFLAGS += -fomit-frame-pointer
 endif
 
+ifeq ($(CONFIG_LIVEPATCH),y)
+CFLAGS += -ffunction-sections -fdata-sections
+endif
+
 CFLAGS += -nostdinc -fno-builtin -fno-common
 CFLAGS += -Werror -Wredundant-decls -Wno-pointer-arith
 $(call cc-option-add,CFLAGS,CC,-Wvla)
diff --git a/xen/arch/arm/xen.lds.S b/xen/arch/arm/xen.lds.S
index 08016948ab..1c7c7d5469 100644
--- a/xen/arch/arm/xen.lds.S
+++ b/xen/arch/arm/xen.lds.S
@@ -33,6 +33,9 @@ SECTIONS
        *(.text)
        *(.text.cold)
        *(.text.unlikely)
+#ifdef CONFIG_LIVEPATCH
+       *(.text.*)
+#endif
        *(.fixup)
        *(.gnu.warning)
        _etext = .;             /* End of text section */
@@ -96,6 +99,9 @@ SECTIONS
 
        *(.data.rel)
        *(.data.rel.*)
+#ifdef CONFIG_LIVEPATCH
+       *(.data.*)
+#endif
        CONSTRUCTORS
   } :text
 
@@ -208,6 +214,9 @@ SECTIONS
        . = ALIGN(SMP_CACHE_BYTES);
        __per_cpu_data_end = .;
        *(.bss)
+#ifdef CONFIG_LIVEPATCH
+       *(.bss.*)
+#endif
        . = ALIGN(POINTER_ALIGN);
        __bss_end = .;
   } :text
diff --git a/xen/arch/x86/xen.lds.S b/xen/arch/x86/xen.lds.S
index 83def6541e..81bb608151 100644
--- a/xen/arch/x86/xen.lds.S
+++ b/xen/arch/x86/xen.lds.S
@@ -88,6 +88,9 @@ SECTIONS
 
        *(.text.cold)
        *(.text.unlikely)
+#ifdef CONFIG_LIVEPATCH
+       *(.text.*)
+#endif
        *(.fixup)
        *(.gnu.warning)
        _etext = .;             /* End of text section */
@@ -292,6 +295,9 @@ SECTIONS
        *(.data)
        *(.data.rel)
        *(.data.rel.*)
+#ifdef CONFIG_LIVEPATCH
+       *(.data.*)
+#endif
        CONSTRUCTORS
   } PHDR(text)
 
@@ -308,6 +314,9 @@ SECTIONS
        . = ALIGN(SMP_CACHE_BYTES);
        __per_cpu_data_end = .;
        *(.bss)
+#ifdef CONFIG_LIVEPATCH
+       *(.bss.*)
+#endif
        . = ALIGN(POINTER_ALIGN);
        __bss_end = .;
   } PHDR(text)
diff --git a/xen/common/Kconfig b/xen/common/Kconfig
index 6443943889..2423d9f490 100644
--- a/xen/common/Kconfig
+++ b/xen/common/Kconfig
@@ -353,7 +353,9 @@ config CRYPTO
 config LIVEPATCH
 	bool "Live patching support"
 	default X86
-	depends on "$(XEN_HAS_BUILD_ID)" = "y"
+	depends on "$(XEN_HAS_BUILD_ID)" = "y" && \
+	           $(cc-option,-ffunction-sections) && \
+	           $(cc-option,-fdata-sections)
 	---help---
 	  Allows a running Xen hypervisor to be dynamically patched using
 	  binary patches without rebooting. This is primarily used to binarily
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 14:15:44 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 14:15:44 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282259.480894 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPPlR-0006Ha-Db; Wed, 02 Mar 2022 14:15:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282259.480894; Wed, 02 Mar 2022 14:15:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPPlR-0006HT-AU; Wed, 02 Mar 2022 14:15:37 +0000
Received: by outflank-mailman (input) for mailman id 282259;
 Wed, 02 Mar 2022 14:15:35 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=cGAx=TN=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPPlP-0006HN-Rs
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 14:15:35 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 39856e33-9a33-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 15:15:34 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2176.outbound.protection.outlook.com [104.47.17.176]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-5-G3801V12MoG403ruI3k6uA-1; Wed, 02 Mar 2022 15:15:33 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB9PR04MB8187.eurprd04.prod.outlook.com (2603:10a6:10:24a::13)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Wed, 2 Mar
 2022 14:15:32 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Wed, 2 Mar 2022
 14:15:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 39856e33-9a33-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646230534;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=kex8qq4jf+Lazih0UJdwgvdNdQX3ZI+g+eEJI7hKduo=;
	b=gGQKCj5Z6TKwoiDGDtxQXyTq2ugo9hE66nFjJz0SyzQtTLZK9OGoBIwrDiga6ieufCRXUn
	uRNGB4U1IgUzN5VvLNgUIy7J0QEyaPkGR0FIgS5O6Cy/JqT/4ibX3ny0vIH4EBKwD7hX3n
	ERvWuBHW7SwOJF6X6PO1fI2F9W+e0UI=
X-MC-Unique: G3801V12MoG403ruI3k6uA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=jdlmRpwW61ferpDxv3cwIJ+p7UnEpaxmEe0S9s81QN1Xrlf3HdPZ2FMaMKMEWNH5O5bkXtasBvXf6APMuWnKpsHZNno8N2v13pkl9Wl5Z9bPElmQD2DOoWrbAXn/CndPPvyfVU5SLwo+gbQvC4Lc4tSvFnwca3GrfpBbvnMLh1iDbC7pWeB663iazJGe8s7MYFp/p07iiopuOPcgvFhnvPGJccasVkRDSKpFn1Tf/NDIAr8HUpDmrLJqwnZJwZl4WUqtvah70a+PdL8M9JRc19feJwDFL5J7YvosdDF5BDbwf6qGBsaPkIb+SKN2RCC8VEHop/3E96zaoId+U09WLw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=kex8qq4jf+Lazih0UJdwgvdNdQX3ZI+g+eEJI7hKduo=;
 b=mib305QBesE5Q6zjzC7C80gl5Z1OMSKmyvRNhidq53DUovemvPpzpaHfTy2+N5Smp3qWYRobFhGErJKutekOX+V8zs/6VTEyeQ2+ynCr6Lzo0zS4t3wN+qv4fBN72hMt1rPdA0Os4eK21B5lY6reL10MVtLin46/aySiKUixQncf/sAifR39Z0G5bXOCdE0h2ld2rt4LinlZP84YInmcjQ78PfTj3fgcuU1zzEmYpdnS6HWEvwJQieq6BWNUO3+bDbzSjNmY2s/iruB3vi5OC+t6r6LKejW/rPupdVoG9Ezn7MarSN6cGoiM/tCZ0l2IKR7y+32XyhKu7rQLiFemUQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <1791edb8-030f-1009-c392-ce793baace5a@suse.com>
Date: Wed, 2 Mar 2022 15:15:29 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Content-Language: en-US
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH] x86: drop use of CONSTRUCTORS from linker script
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR0301CA0024.eurprd03.prod.outlook.com
 (2603:10a6:20b:468::31) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 8daa964b-8785-4d87-e31b-08d9fc571c27
X-MS-TrafficTypeDiagnostic: DB9PR04MB8187:EE_
X-Microsoft-Antispam-PRVS:
	<DB9PR04MB8187DB94F6C5AD75F08B589EB3039@DB9PR04MB8187.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(4326008)(6916009)(5660300002)(508600001)(2906002)(6506007)(6512007)(38100700002)(66476007)(66556008)(66946007)(31696002)(86362001)(8676002)(54906003)(36756003)(8936002)(4744005)(26005)(186003)(2616005)(31686004)(316002)(6486002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?cmdOelc0WlJXWUhXQmhmN3h4YWxtd3JWMWV6MjhqeUZDYW4wY01MVzErekxR?=
 =?utf-8?B?bDQzV1h6bGY5Z0FWUTBiSThGOHAwQzRhYUxHK09JK295ZHVKQ3BJTXZiM0lH?=
 =?utf-8?B?QXBsOC9nT2RXa0U1cXppN2xKdmRIYzEvZm43N3p2QXUvelQyMU94N0w0L3Jo?=
 =?utf-8?B?ZlpIRWhqMzdCQnNXV3RJMURtQmFZbFFra3M2QWFRblJRUlZMdUhrNCtoRjhO?=
 =?utf-8?B?TVZNUWFMYzJTZVNkMjA1S2o5WEFlMXZ6MWpiV3ZCK3VVL3gvRWVIRVpBUVlu?=
 =?utf-8?B?MzgwTmZLSk5OMXpZd21HeHllWUNUa3FqUzFpS1JveHJIOFQ0dHN0Y1M2R0lE?=
 =?utf-8?B?N1A1R1pHQVNhdFI0VERWQ09qd2VKM0MyaWpCcEtQYWVPdmRFN3ZxWGFNckh2?=
 =?utf-8?B?MC9IR0c2c09ZeEYzWkhuVWEvbVNQRFd0clJBZlRJQWtjbTF3M1c0VDhQTnl0?=
 =?utf-8?B?V05SMklmbyt1Tnp4OUVpVDhiZVlITFBzbmFGOU1UOW9lejF3aW52eGsyMUtC?=
 =?utf-8?B?S1VCdi9CYzBWYXVUS3NRaGVjdXdOaC9QcjUrckN1TVplSEVOenNTa0RsL29L?=
 =?utf-8?B?TFZrNHVtNFRQWmVzTzhnMGlKY0RDRm14NHdpMEl0aEdHaTlWMitTVTNvTzR2?=
 =?utf-8?B?TnR6Q3ZyL01ST0paZjVsN01nSmdONXRYQ3hUTHIvRGNPMzJ1ajZLUnc1UTVH?=
 =?utf-8?B?MzJMQkxLNGJPaXVjanl1Q0ZyRGR6aFdtanNKckp0Wi9XQzM2bnZUVDVJb0xV?=
 =?utf-8?B?UFMxMVlkUWgwQW0rc2Z1cFE1QjVPZFVwQ0JzdjFBRFAwK0JGS2FUMnIwYW1V?=
 =?utf-8?B?N2o5cW9kUGppRlk3V2VqbUEwcklXMTVkcnY5QnJsOEVoa3YwOUxhVjdoZjB6?=
 =?utf-8?B?K1dyeXN5OFNqSEROSFp0ME9zczdtZW4rclFOSFdoR2czdWdxVXFBMW5CcVJx?=
 =?utf-8?B?aDByRCt6OU5aeXU1c2FGVGZ1eFBUUEdaSVFMa2laNmdxd1Q3QkI3NHBHc0kz?=
 =?utf-8?B?d3pncTFyamluRUxxRnFpUkVDdUV3VGdzYnJYQlBMY0hicFd5Ky9jWGV1bU5o?=
 =?utf-8?B?V2NralFBSDRPQ1pLWjBrTWtnK01DU2dvQiszWExlQVZkVGNHOXovcUtFQlR5?=
 =?utf-8?B?NWJXb0FUcFRacjNxTStRcmRzM3JVVEFabTJrQ2VZZGpIMUc4VzRMWmJsTEN3?=
 =?utf-8?B?UHk1SEFOaldzM0hMTWdNRXNOTGdrRnJybkU4UlV2eDRoUE15SU8xaUVtYXpB?=
 =?utf-8?B?dnh5endsdE80d3NXYS9LQ0pzS0ZZMUtQZzBMZnR0NDZwMmhnZ2R2dGlsTmtQ?=
 =?utf-8?B?U2NQNDNteGVEZmFQOHFqeHU1N096SDhkM003Qy9PWTUvNGltRUJHcmFCN2Vi?=
 =?utf-8?B?d2d3Y2UwZzFoc1NOTUlTZDJFTWhHSWVodXNUWTdwMjFNWlVBUExpQ1VwL1R3?=
 =?utf-8?B?b240UlFZNldSdFRtdDZlUXFJQWpNT3ZMWUN3dWE2b05PV0V5NGdibnJBODQx?=
 =?utf-8?B?SDFRQnpSQTRLeUl1Smhob1NFYmR4OGtlLzd5U3EvNjRENWxlTXhjWnBmL1B3?=
 =?utf-8?B?UXpJTXowbDFNTmdVU1JpWnFmdXllS05sekdKcU9CS3dUVlB3WldwQXRTLy9t?=
 =?utf-8?B?U0h5YkFIa1RFUU1mNW9jbFBiQ3pzUlBRWGIwVlhWM2h5dEFoenlNY0M4c3Ba?=
 =?utf-8?B?SjlrR29KR0JpWUYwdzBGN2VUWGVaNDY0alR2d3plMng0QzhkanlaYUdzc2Ja?=
 =?utf-8?B?cWR3VUtkd2RCOFhZV1FRVktubENJQlNrbkIranZIY2FYbERleDRnOTNHQlpz?=
 =?utf-8?B?SlVqaFp4UGFRK29VV25wSWdmYVpyZEFYVFNhN0s4WVpOcTNYVjMrakYrZzBv?=
 =?utf-8?B?UW5SdTVITzVGMzVteHZYWFVYSHcvMXB6RnVsS3JneFExMEJDdnlRVGo5ZDBm?=
 =?utf-8?B?TG1zUUE0OXMySUdPMGJ3SGpVQ0dqdkduVE1sNHZ1cTFzV0tBY1pCenBFc01N?=
 =?utf-8?B?Ujgrd3pzdy9LMDVzRzI1VTVYaGt1SndnMDZQNzloeVN2aS9DdmVBcG1NQWVK?=
 =?utf-8?B?RHdSV1U3WU5aUm0yUFhNek0vaG5GTk9TMmQzV3l6bE9UWWpjVFQ4am5iTWZq?=
 =?utf-8?B?dWlUcURXZmtMRkw3dVdicEliak9INnU5ZnN1b2RLZnhsMWNQc3RqcTJzeEVo?=
 =?utf-8?Q?jU4Sf2/84P/7PRbMcDJNh4o=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8daa964b-8785-4d87-e31b-08d9fc571c27
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 14:15:31.8428
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: AyiMN36iK/9p08eBRJyiGrYeKSTYRhkeWFmCEQYup6Pbj7FTQATPOTz9W6wlX69lD1yioZZpenvwXc01pH9XHw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR04MB8187

Current binutils document this for use by a.out only. Plus we deal with
.ctors and alike sections elsewhere in the script anyway.

Signed-off-by: Jan Beulich <jbeulich@suse.com>

--- a/xen/arch/x86/xen.lds.S
+++ b/xen/arch/x86/xen.lds.S
@@ -292,7 +292,6 @@ SECTIONS
        *(.data)
        *(.data.rel)
        *(.data.rel.*)
-       CONSTRUCTORS
   } PHDR(text)
 
   DECL_SECTION(.bss) {



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 14:19:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 14:19:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282267.480909 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPPpR-0007BI-1k; Wed, 02 Mar 2022 14:19:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282267.480909; Wed, 02 Mar 2022 14:19:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPPpQ-0007BB-TK; Wed, 02 Mar 2022 14:19:44 +0000
Received: by outflank-mailman (input) for mailman id 282267;
 Wed, 02 Mar 2022 14:19:43 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=cGAx=TN=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPPpO-0007Az-SN
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 14:19:43 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id cc37cc6f-9a33-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 15:19:40 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2111.outbound.protection.outlook.com [104.47.17.111]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-41-oPQJonF3NW-Iuaxebzt89Q-1; Wed, 02 Mar 2022 15:19:39 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DBAPR04MB7317.eurprd04.prod.outlook.com (2603:10a6:10:1b3::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Wed, 2 Mar
 2022 14:19:36 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Wed, 2 Mar 2022
 14:19:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cc37cc6f-9a33-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646230780;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=kelBkq07elBsYoool1T4WiBB6X/D8ea/mBgL1h/Su9k=;
	b=g3g/zGhVgO9rYDhyDS6UbOIHkDULNetPcO9cwYgPrklHljO/Oke24LXvSB+EPlvlIn8Bgv
	xqBMTq8eWqxbCjA4+PBH5TiWZH8znoa6r8ZC6V5l0DQPFzDNwgokNdVaxv+vX1M+zaZoMq
	COZUTibnPXPSVMff7GyAQN+lL4ACm30=
X-MC-Unique: oPQJonF3NW-Iuaxebzt89Q-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=I9wzWLkUF+zHlg2L8XHA86sUirSPvl1VYHJfFn18ivZ3XgOJnON0Axk5VZJeiwkQOWNuBWYHfZtwhn33xrptTr+QSgcaxefWrocvox0RHnKqQHrKempjmFxAX4gNrf+jjNn14CgV8vNe+3JgLdwMSanygCA908eyYgZSzd4sId+0IzqnLQJPa8t068xbyljnc6Iw3sSzGesPSl67oCMJ0b3Lhj6mfYhMvmL2QvxuIYDRqzhiOawH/X19/u5YQOqOMVaIckLZTJT2WEoKNSjtYCpEL5XCAyuoUY3f5bG/oXjlCSxs7zZzsBdEk0sxsnYu57fHn1mjq7CAovLd3iIF7w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Chofcp21Zt4lwYIAQLwleWr03SoVKieQ1Dr41FdW3rY=;
 b=IRKPwUcHuzm9MfLJ7PCXlGsjqxT8jGAxmycoexCaGxaSQkMPGu5Ge4PgQIZOIAAtnbEC8CmxkLnI3C0TunpeirsT3blcnD5ZSCRKkpXagsQLY4bl6hXOpQn7D99jyHHaBhjwXzX/hTZI9R2+UphgKhcr+CKdHKGm0hThBA8DAYWU6X2TW8a5co2FSDX/suBoKvYzlUWgMdiB7krXBh8XVjqGQsHOQ2e7Hd1A5Cq4t2opYEao6Ns3SoHo7h+VVLxZHIyQtVi2JFdfu7OpDToIjKlY+5fLZXXqOWgxAM6vgnU2vB274NyefiYOz9Ny3K5TIlRf07njkR224LaIkwMvbg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <5c374fd3-017d-3c40-4ded-25a3b1c978a6@suse.com>
Date: Wed, 2 Mar 2022 15:19:35 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Content-Language: en-US
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH] x86/build: use --orphan-handling linker option if available
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR04CA0075.eurprd04.prod.outlook.com
 (2603:10a6:20b:48b::24) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: a84bb868-6893-4d55-c649-08d9fc57ae34
X-MS-TrafficTypeDiagnostic: DBAPR04MB7317:EE_
X-Microsoft-Antispam-PRVS:
	<DBAPR04MB731719CFBE0A01A0845F3FC1B3039@DBAPR04MB7317.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(36756003)(54906003)(8676002)(66476007)(66946007)(316002)(2616005)(966005)(66556008)(8936002)(31696002)(508600001)(4326008)(31686004)(6486002)(2906002)(6506007)(5660300002)(6916009)(38100700002)(6512007)(83380400001)(86362001)(186003)(26005)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?To4REdV5EGtXAKvVaymZ05dRjeDyJNpM2BIpoi/0G+6aAzC1TwKNx5TuH7sg?=
 =?us-ascii?Q?9XH5C9p7Qf8CtuKIBQPdcMyqC1jEpbvf+0Jv2sxTba2DSdSel0TnKA7xJ9i1?=
 =?us-ascii?Q?Se82wnf+jPYx/AVK3DTmJG5cU7ztiYEuJYVPZXMOi4j5NIPzIHu4Fpn7wDss?=
 =?us-ascii?Q?GJLP4FR84MZOyTmHOIHyrI4DzWk4bRGQJKxPLmmL5Oabwr7ZP06APy7CPraH?=
 =?us-ascii?Q?1xrwt4BfeQmQXLc01VlFSUS0DTTnQWbz7Wx+Nt9qjqQc2EMXPuhzi+Kv1oBo?=
 =?us-ascii?Q?oZUn172SsbZOqIUFwU9Q2Z8x3WHgICyy1j4WqyWP5BPAP/WHNoPj7F3u7c41?=
 =?us-ascii?Q?KbV6y0BqR8CT+Eul0TtgHzPFokn+dYZwFDQ2rgyn6KAvzD3Y87PZFmOgXcYb?=
 =?us-ascii?Q?QMiw5ksWmsX4+72lgI1lLdaDSb71Nh8k2lGkY6/qMCOy1goRy+lTiZrRC7hI?=
 =?us-ascii?Q?aoFi5ncJyMyaVFsirNuDWNdQ1I/VEjP9+6KGPhBMD51OaOldZeuQImboFFwK?=
 =?us-ascii?Q?qzYoWBJzLrvhVQ/YSZshIgHcm1OQep4NE2J3T8AYalfQ4Nsy7goWSg+SYbJ7?=
 =?us-ascii?Q?6e5QPDWMxevrmhk0G3XQmQ2Q0H8HnZpcaQk+jaDQHIAQfMmzXTkm12hi8F8z?=
 =?us-ascii?Q?cIX2tOiAMuhSLLpFDXG1puZpSrAf0T+gjMYpboZPw4TrqA7kletYMR0cV83r?=
 =?us-ascii?Q?3131H0UQkfZ8iL4hZc9qNcCrgM+BAJDj4Uxl8zNaG2Z/oIIFGxVIBGu+AS9i?=
 =?us-ascii?Q?940BgfWIWp/Xe8zVQu76pwrxyT+0nW3mbRri/xQXvHUWAZaSbS4nVHo1DADR?=
 =?us-ascii?Q?uzn9KXvqq1nmAwt4aGUhT5nmMs9trE9Gw0xYEqDbUvlM+Ddwe3Dwgkf/Ez5e?=
 =?us-ascii?Q?tAL/rQ0SyAFHrre0TV/+KlN/Z1hkkG0wkYIHEiPZ41VP2oX/t1RVaO2vLjeF?=
 =?us-ascii?Q?iZF3oBqdBgSpPyotefi9uqMMfDZGZW8YLUXC6UcQTuyX9tUxSkuNe0PsslA/?=
 =?us-ascii?Q?9quw3SzH+w/ZzUIVlcl7jLyOI6U4y4IUk1pN1zPTRUpfBcI3xS7uS6Hjym5y?=
 =?us-ascii?Q?rZaywNHi7ogoGLXvdrD0BuLlYySGxh95fhpTBzWjZggEJhOSfqDPx1aOS3/D?=
 =?us-ascii?Q?HJaQgKRjxdIxdHcFw9Nm8z7Uw42+hPa+AsA0vDY98Jf9yX2WiYclPN29q1Ht?=
 =?us-ascii?Q?schwLo321o93nd8j1QHej49XfTND8NQPsykSbT7XQBk/+WS9LCQhQky/+PYc?=
 =?us-ascii?Q?JaKrdq6nnWLQRUnPTR+75oJnlCJbqrLgsZerVCq+bVfkaLOJEhvmcbOkvTeW?=
 =?us-ascii?Q?e8h73UnEajRWfzI1SiA+gAdbWcZWewjzSC0RaFqP3CQrzxIb4FXXs+NYwIww?=
 =?us-ascii?Q?DeeNn3Ir6Xp1k6GqrNXk+pfoYOpXxUrhNKxILMOPNYEtGsTaspBTAT0wHLOb?=
 =?us-ascii?Q?p8E8rWMGRGPtltM1UDqrtpdjTxbRK7EXt3Z37sg7FfRWZqLru10jdwynAdvy?=
 =?us-ascii?Q?6NSJyL1dKAsIa0x1ePOm2gZIwGKrhF+4IlU5nIw/yilQQCnSj4zyQ08CEwse?=
 =?us-ascii?Q?Vky/GQFnC5Z7djGE/7z9GfZ0w0k8WPihznNu4zws3bmv3rbPe/bPsrFz+dxy?=
 =?us-ascii?Q?MPFvs9JQ7DVWl0U/5iFnlh8=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a84bb868-6893-4d55-c649-08d9fc57ae34
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 14:19:36.5778
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: +nzK4bHKYmd1cqt/6d0NEKq5BfZrLEJJu+E5O1c4KExPcZ9M1i6VbTJcyzhechZ3SAmSIKW9mO/SLmkLJr5Ygg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBAPR04MB7317

As was e.g. making necessary 4b7fd8153ddf ("x86: fold sections in final
binaries"), arbitrary sections appearing without our linker script
placing them explicitly can be a problem. Have the linker make us aware
of such sections, so we would know that the script needs adjusting.

To deal with the resulting warnings:
- Retain .note.* explicitly for ELF, and discard all of them (except the
  earlier consumed .note.gnu.build-id) for PE/COFF.
- Have explicit statements for .got, .plt, and alike and add assertions
  that they're empty. No output sections will be created for these as
  long as they remain empty (or else the assertions would cause early
  failure anyway).
- Collect all .rela.* into a single section, with again an assertion
  added for the resulting section to be empty.
- Extend the enumerating of .debug_* to ELF. Note that for Clang adding
  of .debug_macinfo is necessary. Amend this by its Dwarf5 counterpart,
  .debug_macro, then as well (albeit more may need adding for full
  coverage).

Suggested-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>
Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
I would have wanted to make this generic (by putting it in
xen/Makefile), but the option cannot be added to LDFLAGS, or else
there'll be a flood of warnings with $(LD) -r. (Besides, adding to
LDFLAGS would mean use of the option on every linker pass rather than
just the last one.)

Retaining of .note in xen-syms is under question. Plus if we want to
retain all notes, the question is whether they wouldn't better go into
.init.rodata. But .note.gnu.build-id shouldn't move there, and when
notes are discontiguous all intermediate space will also be assigned to
the NOTE segment, thus making the contents useless for tools going just
by program headers.

Newer Clang may require yet more .debug_* to be added. I've only played
with versions 5 and 7 so far.

Unless we would finally drop all mentioning of Stabs sections, we may
want to extend to there what is done for Dwarf here (allowing the EFI
conditional around the section to also go away).

See also https://sourceware.org/pipermail/binutils/2022-March/119922.html.

--- a/xen/arch/x86/Makefile
+++ b/xen/arch/x86/Makefile
@@ -120,6 +120,8 @@ syms-warn-dup-y :=3D --warn-dup
 syms-warn-dup-$(CONFIG_SUPPRESS_DUPLICATE_SYMBOL_WARNINGS) :=3D
 syms-warn-dup-$(CONFIG_ENFORCE_UNIQUE_SYMBOLS) :=3D --error-dup
=20
+orphan-handling-$(call ld-option,--orphan-handling=3Dwarn) +=3D --orphan-h=
andling=3Dwarn
+
 $(TARGET): TMP =3D $(@D)/.$(@F).elf32
 $(TARGET): $(TARGET)-syms $(efi-y) $(obj)/boot/mkelf32
 	$(obj)/boot/mkelf32 $(notes_phdrs) $(TARGET)-syms $(TMP) $(XEN_IMG_OFFSET=
) \
@@ -146,7 +148,7 @@ $(TARGET)-syms: $(BASEDIR)/prelink.o $(o
 		>$(@D)/.$(@F).1.S
 	$(MAKE) $(build)=3D$(@D) $(@D)/.$(@F).1.o
 	$(LD) $(XEN_LDFLAGS) -T $(obj)/xen.lds -N $< $(build_id_linker) \
-	    $(@D)/.$(@F).1.o -o $@
+	    $(orphan-handling-y) $(@D)/.$(@F).1.o -o $@
 	$(NM) -pa --format=3Dsysv $(@D)/$(@F) \
 		| $(BASEDIR)/tools/symbols --all-symbols --xensyms --sysv --sort \
 		>$(@D)/$(@F).map
@@ -220,7 +222,7 @@ endif
 		| $(BASEDIR)/tools/symbols $(all_symbols) --sysv --sort >$(@D)/.$(@F).1s=
.S
 	$(MAKE) $(build)=3D$(@D) .$(@F).1r.o .$(@F).1s.o
 	$(LD) $(call EFI_LDFLAGS,$(VIRT_BASE)) -T $(obj)/efi.lds -N $< \
-	                $(@D)/.$(@F).1r.o $(@D)/.$(@F).1s.o $(note_file_option) -=
o $@
+	      $(@D)/.$(@F).1r.o $(@D)/.$(@F).1s.o $(orphan-handling-y) $(note_fil=
e_option) -o $@
 	$(NM) -pa --format=3Dsysv $(@D)/$(@F) \
 		| $(BASEDIR)/tools/symbols --all-symbols --xensyms --sysv --sort >$(@D)/=
$(@F).map
 	rm -f $(@D)/.$(@F).[0-9]* $(@D)/..$(@F).[0-9]*
--- a/xen/arch/x86/xen.lds.S
+++ b/xen/arch/x86/xen.lds.S
@@ -12,6 +12,12 @@
 #undef __XEN_VIRT_START
 #define __XEN_VIRT_START __image_base__
 #define DECL_SECTION(x) x :
+/*
+ * Use the NOLOAD directive, despite currently ignored by ld for PE output=
, in
+ * order to record that we'd prefer these sections to not be loaded into m=
emory.
+ */
+#define DECL_DEBUG(x, a) #x ALIGN(a) (NOLOAD) : { *(x) }
+#define DECL_DEBUG2(x, y, a) #x ALIGN(a) (NOLOAD) : { *(x) *(y) }
=20
 ENTRY(efi_start)
=20
@@ -19,6 +25,8 @@ ENTRY(efi_start)
=20
 #define FORMAT "elf64-x86-64"
 #define DECL_SECTION(x) #x : AT(ADDR(#x) - __XEN_VIRT_START)
+#define DECL_DEBUG(x, a) #x 0 (NOLOAD) : { *(x) }
+#define DECL_DEBUG2(x, y, a) #x 0 (NOLOAD) : { *(x) *(y) }
=20
 ENTRY(start_pa)
=20
@@ -179,6 +187,13 @@ SECTIONS
 #endif
 #endif
=20
+#ifndef EFI
+  /* Retain these just for the purpose of possible analysis tools. */
+  DECL_SECTION(.note) {
+       *(.note.*)
+  } PHDR(note) PHDR(text)
+#endif
+
   _erodata =3D .;
=20
   . =3D ALIGN(SECTION_ALIGN);
@@ -266,6 +281,32 @@ SECTIONS
        __ctors_end =3D .;
   } PHDR(text)
=20
+#ifndef EFI
+  /*
+   * With --orphan-sections=3Dwarn (or =3Derror) we need to handle certain=
 linker
+   * generated sections. These are all expected to be empty; respective
+   * ASSERT()s can be found towards the end of this file.
+   */
+  DECL_SECTION(.got) {
+       *(.got)
+  } PHDR(text)
+  DECL_SECTION(.got.plt) {
+       *(.got.plt)
+  } PHDR(text)
+  DECL_SECTION(.igot.plt) {
+       *(.igot.plt)
+  } PHDR(text)
+  DECL_SECTION(.iplt) {
+       *(.iplt)
+  } PHDR(text)
+  DECL_SECTION(.plt) {
+       *(.plt)
+  } PHDR(text)
+  DECL_SECTION(.rela) {
+       *(.rela.*)
+  } PHDR(text)
+#endif
+
   . =3D ALIGN(SECTION_ALIGN);
   __init_end =3D .;
   __2M_init_end =3D .;
@@ -321,71 +362,6 @@ SECTIONS
     *(.reloc)
     __base_relocs_end =3D .;
   }
-  /*
-   * Explicitly list debug section for the PE output so that they don't en=
d
-   * up at VA 0 which is below image base and thus invalid. Also use the
-   * NOLOAD directive, despite currently ignored by ld for PE output, in
-   * order to record that we'd prefer these sections to not be loaded into
-   * memory.
-   *
-   * Note that we're past _end here, so if these sections get loaded they'=
ll
-   * be discarded at runtime anyway.
-   */
-  .debug_abbrev ALIGN(1) (NOLOAD) : {
-     *(.debug_abbrev)
-  }
-  .debug_info ALIGN(1) (NOLOAD) : {
-    *(.debug_info)
-    *(.gnu.linkonce.wi.*)
-  }
-  .debug_types ALIGN(1) (NOLOAD) : {
-    *(.debug_types)
-  }
-  .debug_str ALIGN(1) (NOLOAD) : {
-    *(.debug_str)
-  }
-  .debug_line ALIGN(1) (NOLOAD) : {
-    *(.debug_line)
-    *(.debug_line.*)
-  }
-  .debug_line_str ALIGN(1) (NOLOAD) : {
-    *(.debug_line_str)
-  }
-  .debug_names ALIGN(4) (NOLOAD) : {
-    *(.debug_names)
-  }
-  .debug_frame ALIGN(4) (NOLOAD) : {
-    *(.debug_frame)
-  }
-  .debug_loc ALIGN(1) (NOLOAD) : {
-    *(.debug_loc)
-  }
-  .debug_loclists ALIGN(4) (NOLOAD) : {
-    *(.debug_loclists)
-  }
-  .debug_ranges ALIGN(8) (NOLOAD) : {
-    *(.debug_ranges)
-  }
-  .debug_rnglists ALIGN(4) (NOLOAD) : {
-    *(.debug_rnglists)
-  }
-  .debug_addr ALIGN(8) (NOLOAD) : {
-    *(.debug_addr)
-  }
-  .debug_aranges ALIGN(1) (NOLOAD) : {
-    *(.debug_aranges)
-  }
-  .debug_pubnames ALIGN(1) (NOLOAD) : {
-    *(.debug_pubnames)
-  }
-  .debug_pubtypes ALIGN(1) (NOLOAD) : {
-    *(.debug_pubtypes)
-  }
-  /* Trick the linker into setting the image size to no less than 16Mb. */
-  __image_end__ =3D .;
-  .pad ALIGN(__section_alignment__) : {
-    . =3D __image_end__ < __image_base__ + MB(16) ? ALIGN(MB(16)) : .;
-  }
 #elif defined(XEN_BUILD_EFI)
   /*
    * Due to the way EFI support is currently implemented, these two symbol=
s
@@ -400,6 +376,42 @@ SECTIONS
   efi =3D .;
 #endif
=20
+  /*
+   * Explicitly list debug sections, first of all to avoid these sections =
being
+   * viewed as "orphan" by the linker.
+   *
+   * For the PE output this is further necessary so that they don't end up=
 at
+   * VA 0, which is below image base and thus invalid. Note that we're pas=
t
+   * _end here, so if these sections get loaded they'll be discarded at ru=
ntime
+   * anyway.
+   */
+  DECL_DEBUG(.debug_abbrev, 1)
+  DECL_DEBUG2(.debug_info, .gnu.linkonce.wi.*, 1)
+  DECL_DEBUG(.debug_types, 1)
+  DECL_DEBUG(.debug_str, 1)
+  DECL_DEBUG2(.debug_line, .debug_line.*, 1)
+  DECL_DEBUG(.debug_line_str, 1)
+  DECL_DEBUG(.debug_names, 4)
+  DECL_DEBUG(.debug_frame, 4)
+  DECL_DEBUG(.debug_loc, 1)
+  DECL_DEBUG(.debug_loclists, 4)
+  DECL_DEBUG(.debug_macinfo, 1)
+  DECL_DEBUG(.debug_macro, 1)
+  DECL_DEBUG(.debug_ranges, 8)
+  DECL_DEBUG(.debug_rnglists, 4)
+  DECL_DEBUG(.debug_addr, 8)
+  DECL_DEBUG(.debug_aranges, 1)
+  DECL_DEBUG(.debug_pubnames, 1)
+  DECL_DEBUG(.debug_pubtypes, 1)
+
+#ifdef EFI
+  /* Trick the linker into setting the image size to no less than 16Mb. */
+  __image_end__ =3D .;
+  .pad ALIGN(__section_alignment__) : {
+    . =3D __image_end__ < __image_base__ + MB(16) ? ALIGN(MB(16)) : .;
+  }
+#endif
+
 #ifdef CONFIG_HYPERV_GUEST
   hv_hcall_page =3D ABSOLUTE(HV_HCALL_PAGE - XEN_VIRT_START + __XEN_VIRT_S=
TART);
 #endif
@@ -418,8 +430,7 @@ SECTIONS
 #ifdef EFI
        *(.comment)
        *(.comment.*)
-       *(.note.Xen)
-       *(.note.gnu.*)
+       *(.note.*)
 #endif
   }
=20
@@ -465,6 +476,15 @@ ASSERT(IS_ALIGNED(trampoline_end,   4),
 ASSERT(IS_ALIGNED(__bss_start,      8), "__bss_start misaligned")
 ASSERT(IS_ALIGNED(__bss_end,        8), "__bss_end misaligned")
=20
+#ifndef EFI
+ASSERT(!SIZEOF(.got),      ".got non-empty")
+ASSERT(!SIZEOF(.got.plt),  ".got.plt non-empty")
+ASSERT(!SIZEOF(.igot.plt), ".igot.plt non-empty")
+ASSERT(!SIZEOF(.iplt),     ".iplt non-empty")
+ASSERT(!SIZEOF(.plt),      ".plt non-empty")
+ASSERT(!SIZEOF(.rela),     "leftover relocations")
+#endif
+
 ASSERT((trampoline_end - trampoline_start) < TRAMPOLINE_SPACE - MBI_SPACE_=
MIN,
     "not enough room for trampoline and mbi data")
 ASSERT((wakeup_stack - wakeup_stack_start) >=3D WAKEUP_STACK_MIN,



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 14:29:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 14:29:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282279.480945 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPPyN-00012K-Km; Wed, 02 Mar 2022 14:28:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282279.480945; Wed, 02 Mar 2022 14:28:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPPyN-000122-GE; Wed, 02 Mar 2022 14:28:59 +0000
Received: by outflank-mailman (input) for mailman id 282279;
 Wed, 02 Mar 2022 14:28:58 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LB9Y=TN=citrix.com=prvs=0530a50c4=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nPPyM-0000Xm-3E
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 14:28:58 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 1807c870-9a35-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 15:28:57 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1807c870-9a35-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646231337;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:content-transfer-encoding:mime-version;
  bh=+2Ei8EBR9EXf62Akrk8b2opcb3IwuX8/9v9H3NAEkMw=;
  b=WI7WAmhK6GtvoM5e5DvoTWKt2tcUAKshQh0CQQ2XX0Sz6bb+QRgZLUkd
   LyL3230EwEzCRClrTMszUUXuxrlqMIZN33j7kda91o1ycvA+TBoh7i5i+
   TeY2f/Mr4ivTZWyZjdUxJRcVrlHa7GVid6xlT0S31aYg16tFH8l5AcRwe
   I=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65302964
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:5zgw/asgTawbLPKrt6yY5HsbuufnVJZeMUV32f8akzHdYApBsoF/q
 tZmKW+OOP7ZajOgeNB+a4izo0IHuMOAzYRmSVBqqC01Hykb+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jV4
 4upyyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi8GBZ/3gsoFeSBSAiguL614x+bgMHKw5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AO
 pFBM2sxMHwsZTVLZngMC5sxnNyxpX7/WmEJtAK/tYsotj27IAtZj+G2bYu9lsaxbcdImkeVo
 ErW8mK/BQsVXPSFzjWI6DS0j/LnliLnQpgTBPuz8fsCqFGUy2YeDDUfUFKppv//hkPWc8JSL
 QkY9zQjqYA29Ve3VZ/tUhugunmGsxUAHd1KHIUS6waL0KPYpRmYAmssSSRIY9gr8sQxQFQXO
 kShxo2zQ2Y16fvMFCzbpuz8QS6O1TY9AlQwXjUqVSE86cjq8JMzsC2WacdpH/vg5jHqIg3Yz
 zePpSk4orwci88Xyqm2lWz6byKQSovhFVBsuFiONo6xxkYgPdP+OdT0gbTOxasYdO6kok+9U
 G/ociR0xMQHFtmzmSOEW43h95n5tq/eYFUwbbOCdqTNFghBGVb+Jei8AxkkfS+F1/ronxezO
 ic/XisLufdu0IOCN/MfXm5II51CIVLcPdrkTOvISdFFf4J8cgSKlAk3OxLOhj61yBlyyPBlU
 Xt+TSpKJSxAYUiA5GDrL9rxLJdxnnxurY8tbcqTI+ubPUq2OyfOFOZt3KqmZeEl9qKUyDg5A
 P4EX/ZmPy53CbWkCgGOqNZ7BQlTcRATWMCnw+QKJ7XrClc3Rwkc5wr5nOpJl3pNxP8OyI8lP
 xiVBydl9bYIrSafeFXSNys6M+uHsFQWhStTABHA9G2AghALSY2u8L0eZ90we7wm//Zk1vl6U
 78OfMDoPxiFYm2vF+g1BXUlkLFfSQ==
IronPort-HdrOrdr: A9a23:niDfga5jbz13fQLliAPXwSqBI+orL9Y04lQ7vn2ZFiY7TiXIra
 yTdaoguCMc6AxxZJkh8erwXJVoJkmsiaKdgLNhQItKOTOJhILGFvAF0WKP+UyDJ8S6zJ8n6U
 4CSdkONDSTNykCsS+S2mDReLxBsbq6GeKT9J3jJh9WPH9XgspbnmBE42igYyhLrF4sP+tHKH
 PQ3LsOmxOQPVAsKuirDHgMWObO4/XNiZLdeBYDQzoq8hOHgz+E4KPzV0Hw5GZVbxp/hZMZtU
 TVmQ3w4auu99m91x/nzmfWq7BbgsHoxNdvDNGFzuIVNjLvoAC1Y5kJYczIgBkF5MWUrHo6mt
 jFpBkte+x19nPqZ2mw5SDg3gHxuQxenEPK+Bu9uz/OsMb5TDU1B45qnoRCaCbU7EImoZVVzL
 9L93jxjesZMTrw2ADGo/TYXRBjkUS55VA4l/QIsnBZWYwCLJdMsI0k+l9PGptoJlO31GkeKp
 guMCjg3ocXTbvDBEqp/VWHgebcE0jbJy32DHTr4aeuonprdHMQ9Tpt+CVQpAZEyHsHceg22w
 31CNUZqFhwdL5lUUsEPpZ4fSKWMB26ffueChPaHbzYfJt3Tk4l7aSHpIkI2A==
X-IronPort-AV: E=Sophos;i="5.90,149,1643691600"; 
   d="scan'208";a="65302964"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=PPV0nWT7i7y75krwemeZicgBtQF1mEe3PWNQglr/q/FJ1fsnJhtaJfsUvSah2mvRnfHHUIVxZQqznZ8zU3jTlPGWpCgb9vhuYhyDl8NMpDQuVdg6HiUJycoMh/jMPP0EnBm+FmSJ1iVyPpVrer7bp2CiHjr3iSQjs7c6OGrxg7UmxwlKmCnHcjGlR0v5gjbhe+eHrHpV74yST1y7wqgFr6Gph9n2KZb9mr3ePRT8ARXzVVVUqrQ+AvyEuXkhgwnHaAchSII0wplUgkeIwpDn/C+0FVkihwK81imopDHsgleCVm09DruV4dDJ9yWu4OU44AEBF7X3maJXnMcSsul13Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=UVs0N4lrLYXtidMdZMljGcSKcwUkd/vbtt8k48wXfUA=;
 b=oKUI65qG/dP+o/mz5NhWujjQ9uJwLtAtyErfytgAC+TWjuW4KaD5ZYeCCfMFIhhREJNLEMSrQfawQ0WdxYbXFh+NnsOVtVubTyOmFvDwopX/H2LGqXPjCQSgyG3XmH9rzhrMAuIQgJVXRLw8g6xBE/nWefQkzklzwrIHvzfHn+ZvDVHJ8WUAQYoNCarlbJRG519VHt7+Aqa0sYVN8GuOEwiCcDfUEZIT4yqaMuht3VPfFs42tmS+d4kJLSPsRijdSc7sgVLu34stnnHSp6KIRQ2KIxzcbk6s3VrY82GXqeGbj8QjDRTq9RXfhxZyfUw/kDlclrscP6m2eJFcV8F+wQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=UVs0N4lrLYXtidMdZMljGcSKcwUkd/vbtt8k48wXfUA=;
 b=ij3Y8I/ggRgq8NQSGNeGQK1s9zrOK5FDDgD+rKr3OqYlR4ISSADi18H24SQzngr76kgd6W49RXX9JdASnBi+YH+OOz77MS5QL8gArS4fgFq5FeC1UdRXexTSpGYQ2YFx4imtcM7vgooKtSZ12rh7ASF+XplkdiPrxL6ty2daP9E=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: <ross.lagerwall@citrix.com>, <konrad.wilk@oracle.com>, <doebel@amazon.de>,
	<julien@xen.org>, <Andrew.Cooper3@citrix.com>, Roger Pau Monne
	<roger.pau@citrix.com>, =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?=
	<roger.pau@citrrix.com>
Subject: [PATCH 2/4] livepatch: improve rune for fetching of Build ID
Date: Wed,  2 Mar 2022 15:27:09 +0100
Message-ID: <20220302142711.38953-3-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220302142711.38953-1-roger.pau@citrix.com>
References: <20220302142711.38953-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO2P265CA0027.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:61::15) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2e0fd313-af34-4a09-514a-08d9fc58fa85
X-MS-TrafficTypeDiagnostic: BN6PR03MB3330:EE_
X-Microsoft-Antispam-PRVS: <BN6PR03MB333009CE79B58F65FACD3EF08F039@BN6PR03MB3330.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: GHxr/jeYeXBVgkmZf2KqO+MKOrRLQaY2KLg7oSCQjiuRN2PLPcZyItshcg0OSn0C7ppDBfGSUWvkTAHChc4/byvM/8tZJOjdJeMUn/ObVJno0io2NnG2GZATJpLIlW/j7a06/hSvcY1EK50PcmsV5Ky23iJmws5iJKDdsMPGdNxgT5YMvXUeP5K1yq4gG210TCCdpjIdFSr7SD271AqbWQ5J03lwUCusydoiEDg82u5qQffXecu9WeG6olrQIov+66dLVR/pgTuQrBh1nfUdeIWyF6DI3MAmct0tBqgRWKLMrhrV24KRcBF8NrebbBYl/C6Ckh5P/9V2slEuBizuSSxPFsThncjD79GK6fmdkts+j5pjj2nsCQ8JfUuxkvj+N+EQuRAfJN8K+dqcfZrt1V1YyQqbUPGmMx0XceMCaRzcXX+jvctHJl/KvHjt9/mcbCg/aXXLp86q72/BUPsWKojhlQ1N127QReXskXbngiUAFM/7r5AviRxmTSUROUw71Y6rPN+P8rMZm5zgZ+P2kW64Wu3CDgth9n5Mb30E6C0Jz9txXajKC/y24yB0EoqbkZ7m/dYxKlZgUZSvEUtnF+eIVdKESofFLAUR4JHjO/Yf8OuRGXt9YYi6MH/kLlB/Z6kX7tgmhNlWuFnNqHRNoQ==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(6506007)(6512007)(6666004)(38100700002)(66476007)(66556008)(86362001)(66946007)(508600001)(54906003)(316002)(6916009)(4744005)(82960400001)(5660300002)(6486002)(8936002)(8676002)(36756003)(2906002)(83380400001)(26005)(186003)(2616005)(1076003)(4326008);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?VElsWkJDbmp1WHRZMlZES3h0WG5yd3RBb0VBb1h4OG5TZmpkck0yOVkydnNL?=
 =?utf-8?B?TG02K0ZvSEZ5QW9qNXpVbzg0U0dOUndZSGR3YlZSeElpOWR0WGhkcFhhcTlx?=
 =?utf-8?B?UXV5WllobFFPTk5nbytNTnJQV1NsZzUzZ2c4S1pnbUVOMTVSUWFzZVNPN2k5?=
 =?utf-8?B?NlZoMTVaeXA2SE5ZUmhkRldDWXZxVUJrSFkzQjVCUjJ0ZFJhSDM5dncrMFZW?=
 =?utf-8?B?NlVMemdMcFNmZXBNV0lTSzRJYVZKVmlqdXVKa3VuWWxoNUdTYzZuaDFCSmFs?=
 =?utf-8?B?SVIxMS9tSUpOUWw4R2pRa1lmenJJR0RJN3pHcjJKU1A1bDVkMnRtKzBuL3F5?=
 =?utf-8?B?VlhPa1ZDQWsvTTBpM3kwYXRzN09iOUNDemZMa1BOSkFWTnF3clkvZzEwUkZk?=
 =?utf-8?B?ZWQ1SEhQUEZFbG1nT2VBZGJYN3dGeW5TZlQydStnT3MvOU8wVDQ4WUEvMzVE?=
 =?utf-8?B?cTZjNlY1NExpeERmeWZrVVllRk1EYVBmaTZ6WTZsNFhMNVUxc1VYWWV6eTZN?=
 =?utf-8?B?YWcxbUtESENmWkxQeFVlTGJRcWlHVGV5bXN1bHl4Z0RlTTRQMzNNTVJyTjYx?=
 =?utf-8?B?VzZiTHVvNGVZaStRQnkvSkVWQStBVmlyVXdsY3VDSGpuaytYcFpkT3FzNkR2?=
 =?utf-8?B?YU1icHFCYTJPTzBOU3VwU0RJMG1Qb2RLK3JnaGhjNVNUS0ZYcDVxVE9CS1hu?=
 =?utf-8?B?MWloQUhMMTJYcFV0blFLdis5aFBNdkFEam82UmRsRDlsSlZ6R25yQTNTZk1l?=
 =?utf-8?B?d2FLa1Nzc281ZW1aOWM2cFF0aEI4UWY0TmVQdVR4U1F6UkdpNFFPRDhLV0p6?=
 =?utf-8?B?ckRkT0tsdnNXL3FBVGI2NTd0d3JTVnBhTXpFRlVUa29weTlRRHYybkh5TXk5?=
 =?utf-8?B?L3c2OUhPU2tERC9paE84UEFFZytYK3hQbklIbGp4YVJkeHFyVVNyTGhqWVEy?=
 =?utf-8?B?bGpMN3U2Rnc1NlBWRFFBaVdrOWZGK2tRcHNtM1lEWXNSbm9pdnI2TDJIdWhT?=
 =?utf-8?B?VTBlOVVNVWJubTFLNHBMOGhZR2NNcTlJTDMycFduWTRTSFg1bllmT21lZzU4?=
 =?utf-8?B?SzlZOUlNYnpKdjR1TGNtNlZFVGM3SHVTQm9kVUpTK3RxczQyZVZFa3hqV1pB?=
 =?utf-8?B?eVZBaGQ3ZkY4WkFNKzdxNGJMWjllY1lncmZoUUVnSVdqdmhZeWRhYS9HYWNK?=
 =?utf-8?B?elN5Y3JsZ0NITll0SFhHRXRHMWxhQ202QkE0MVZJdTFwZytDZWJtNjQ3OGdl?=
 =?utf-8?B?WmJaVURGVmFVYUFBekQvZndFTUE2ZTJwRVJhdlNRQWtubk9tZXdESWh0UGdD?=
 =?utf-8?B?REFweDVOQmszakRFL3ZaY21hbXpvaGRUUnVUMTg1WDBUZEszckZBVUhmdVA5?=
 =?utf-8?B?T2RFTFhzaERXR0ErODJsN3NtaGkzbzV0MnJFRXFlb3dmeGlGSStWSyswKzlY?=
 =?utf-8?B?a3IybWN1M1hyM2ZJemliTHBJNUJ2aEkrRmhKeGg5MDRSVHZkU3ZidlVXYkw5?=
 =?utf-8?B?N2NZUE9EdUNwK3pGTzNPdXJINzlveUc0SHJKa0JnL2JtZ0Y2L3JiaUJCNVps?=
 =?utf-8?B?citlWjAzRFlFRnFRanprTnRoRHhHdWltUHJzc010NWFvTnpLYmhuMVpabE9F?=
 =?utf-8?B?QW1zUUFNNFJsMmJYTTlqTy94dldLOFpUOTVFK0t6enVnUFdoRWhFaVpKeDlP?=
 =?utf-8?B?cE1HTDV3cjcraWV6T2Q1NUVSWGZ6TkR5V25VUUc2UzZtcSswVzZWMDJ6VTNi?=
 =?utf-8?B?cG0zSTRISWlpVlg0dVdZUDhUNW1UcURJaVlHTzA0K3BBZG5MeHJlTUVHUlhB?=
 =?utf-8?B?TXk5ODFUMThkOEE4VXYvTmsxbzBnUkw4TlRoRk5UM09BQ1g2cUNkVzRsSFRV?=
 =?utf-8?B?eDdYMjdVVmtDR2d3VEFMVlNXdW9vNGxMQzRhNXB6QVlLbU1UTlZLZ1E0TU5T?=
 =?utf-8?B?a0IzdVlEWGxGeC9TUTQ1UjNyQk42RTN0ZkM5MzNzT3E0RG9rZkJjTk5kRVlo?=
 =?utf-8?B?RURscUVqL3VNVE5ROERPQ2NqOU9tMnJsQUdSOG1NQjlJREdqNUdDcGF0bTVE?=
 =?utf-8?B?QjlMZW51NnpSVk5zSHNBUFFGbmVJMHZwTU03ZFVIeVhoUlUwNUtUTExIMFFs?=
 =?utf-8?B?NWxXNnZxVkQ5cTMvQUg1M1BMc1FYelhLcEZtTk9mbnZEdVBudmNIK1krNFRu?=
 =?utf-8?Q?oprTZ5Go66GW/lgWyfWWSo8=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 2e0fd313-af34-4a09-514a-08d9fc58fa85
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 14:28:54.1092
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: QaSaXaRePQGkcG0cwoIQKEJyGsOB7kqo+W2a6RYpSzDq/xsBLtnRsQTeQsqaz/D2BKwGO6dTYj62YzPgWl4g7w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR03MB3330
X-OriginatorOrg: citrix.com

The current one is broken with my version of readelf and returns
'NT_GNU_BUILD_ID'.

Signed-off-by: Roger Pau Monné <roger.pau@citrrix.com>
---
 README.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/README.md b/README.md
index b48a3df..948a7de 100644
--- a/README.md
+++ b/README.md
@@ -16,7 +16,7 @@ $ cp -r ~/src/xen ~/src/xenbuild
 $ cd ~/src/xen/xen
 $ make nconfig # Make sure to set CONFIG_LIVEPATCH=y
 $ make
-$ BUILDID=$(readelf -Wn xen-syms | awk '/Build ID:/ {print $3}')
+$ BUILDID=$(readelf -Wn xen-syms | sed -n -e 's/^.*Build ID: //p')
 ```
 
 Next, build a live patch, using a patch and the source, build ID, and
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 14:29:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 14:29:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282278.480927 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPPyM-0000aK-DS; Wed, 02 Mar 2022 14:28:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282278.480927; Wed, 02 Mar 2022 14:28:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPPyM-0000a1-8D; Wed, 02 Mar 2022 14:28:58 +0000
Received: by outflank-mailman (input) for mailman id 282278;
 Wed, 02 Mar 2022 14:28:57 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LB9Y=TN=citrix.com=prvs=0530a50c4=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nPPyL-0000Xm-AX
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 14:28:57 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 165621bb-9a35-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 15:28:55 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 165621bb-9a35-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646231335;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:content-transfer-encoding:mime-version;
  bh=Uv6+k4P+pq/NsyHUUBb3gegl0iO3HUiZOvNvr/hkT1s=;
  b=EmHrMjtiumErP4dK43Z+n6EJpc8p5ropFmAmL/NLxaIZnhAz2bYK8vct
   dBElmz9ZkyeoyBfiYLLFdv0YcpIyzH2ABetqNf5+FXpRhyb+5cmLKqWxg
   JCwEeYVEkabeMqQBba0uVLxHk21/86f8uL3hZeZCWr19QOfD75Vm90bUt
   k=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65302961
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:pxiJ26oHSCjSw/44ffkVUe3SPfdeBmIzZRIvgKrLsJaIsI4StFCzt
 garIBnVO/aJY2SkKNB+Po229B5XvMfRyNNiTQRlriBnEC5H8ZuZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 Ymq+KUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBHJfjv9hNWglhOR5aGvVU+bbpGHKurpnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVI1zbWAOxgWZnea67L+cVZzHE7gcUm8fP2O
 ZdCMWA+Mk2ojxtnGg8qCasZge2RpFLbSzhYmmi7u7Y8/D2GpOB2+Oe0a4eEEjCQfu1ZmUuSq
 2bu9mHwEBYcctCSoRKH73ati+nnjS79HoUIG9WQ5vNsxVGe2GEXIBkXTkeg5+m0jFakXNBSI
 FBS/TAhxYAx80qxR9W7QBy8o1aDpBcXX9cWGOo/gDxh0YKNvVzfXDJdCGccNpp276faWADGy
 HerpfzOOWxmoIS/dla6rqWVpB2LMzkKeDpqiTA/cSMJ5NzqoYcWhx3JT8p+HKPdsuAZCQ0c0
 BjR8nFg2ux7YdojkvzioAuZ227ESo3hE1Ztjjg7SF5J+e+QiGSNQ4WzoWbW4v9bRGpyZgnQ5
 SNU8yRyAQ1nMH1sqMBvaLhVdF1Kz6zcWNE5vbKJN8N7n9hK0yT+Fb28GBkkeC9U3j8sIFcFm
 nP7twJL/4N0N3C3d6JxaI/ZI510kfa5S4y9B66NP4Amjn1NmOmvpnsGiam4hT2FraTRuftnZ
 cfznTiEVx729piLPBLpHrxAgNfHNwg1xH/JRICT8vhU+eH2WZJhcp9caAHmRrlgtMus+VyJm
 /4CZ5ri40gOC4XWP3iImbP/2HhXdBDX87it8JcJHgNCSyI7cFwc5wj5mutwK9Q4xP0Ozo8lP
 BiVAydl9bY2vlWeQS2iYXF/crL/G5F5qHMwJys3Oli0nXMkZO6SAG03LfPboZFPGDRf8MNJ
IronPort-HdrOrdr: A9a23:ok4bvKgwAR1gvhTT75pcEoxmgnBQXzh13DAbv31ZSRFFG/FwyP
 rAoB1L73PJYWgqNU3I+ergBEGBKUmskaKdhrNhQYtKPTOWxVdASbsN0WKM+UyHJ8STzJ8+6U
 4kSdkENDSSNykKsS+Z2njALz9I+rDum8rJ9ITjJjVWPHtXgslbnnlE422gYypLrWd9dP8E/M
 323Ls5m9PsQwVeUu2LQl0+G8TTrdzCk5zrJTYAGh4c8QGLyRel8qTzHRS01goXF2on+8ZpzU
 H11yjCoomzufCyzRHRk0fV8pRtgdPkjv9OHtaFhMQ5IijlziyoeINicbufuy1dmpDl1H8a1P
 335zswNcV67H3cOkmzvBvWwgHllA0j7nfzoGXo9kfLkIjcfnYXGsBBjYVWfl/y8Ew7puxx16
 pNwiawq4dXJQmoplWz2/H4EzVR0makq3srluAey1ZFV5EFVbNXpYsDuGtIDZY7Gj7g4oxPKp
 gjMCjl3ocWTbqmVQGYgoE2q+bcHUjbXy32D3Tqg/blnQS/xxtCvgklLM92pAZ1yHtycegA2w
 3+CNUaqFh/dL5nUUtDPpZyfSLOMB20ffvtChPlHb21LtBPB5ryw6SHlYndotvaPKA18A==
X-IronPort-AV: E=Sophos;i="5.90,149,1643691600"; 
   d="scan'208";a="65302961"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=DoLDk55JAlb6DWt9Lc5jdbn3zekeMF3gnDdYE+ZZOrHyGWK1iWOpSo9By1jCvobYNTdMyncHxT5nt7YUumwfmwycwLR6mxE3PDx08neO2IAgGwJnGAA+MWJLBf+LUMLgYbGLEuEDyyg5e23s80/Uim7Qd4oGmBYD9+pgNCQExxkHs9Aup1wB1TRJCM71Sbe27ZdSeS8Hdk1SuuM4ghTscB7y1E/H9Zr1oFahTrA7Domf6W+rcswPH9SWQprt3b5VjQe/B61oK3/oamDKhIngQy0DOb48uq0hrVePBEXSLFt+FwqvuI2PWRGLYV6/t1D3693blDfKKvpZv5gQ7aM6hQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=mXqJC3FYz1zgAzycpIM3RwRbyRXV+eqnGOl8ZN4IR7w=;
 b=mtXokVnSmQlbFSWEnVeVR/wd9R/tRfpI9LGLDEOAEZq7+qrRMNhBPT1YNoI8n7tFmmpw9IDluxazPAk/8Ezynl0v20RSzTws1w4lfrC7DgiyHRids5tqNY8sbRHsxAExtMPQSpXy+xDFB67sadcDl0DoF4F5bh8q4awGpOAbV5xYGGbwvEDqlFUKNCyChoeageLfhnEt5zYBoFgclJsUZxWWtW4iICyzV4na1MuSahAu/1n27I/rKFJBAqq9irtJXCcBGg9uN2RB5RswHQfQpKV6uP5CBOUIRl5Tqk2PvM5WHhAZ6a+c56v9WQ0FrGqYIi76Fjf5oCTZWKICtAAUAA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=mXqJC3FYz1zgAzycpIM3RwRbyRXV+eqnGOl8ZN4IR7w=;
 b=m7J2xEqvcnJb4RgQu2GQBgGEnY4hZ0sCLtqjRXwuCKhzrXBo/MqrvvmGK5d0kzsDzBwKyar0vI3zMQAD08pt6RWBtnSZkcT29XCTeV4WoDyeLKRD1aOCXub8lIfmFIgxzNOid8SBr485TaDjB/tv18OyTmoP3VC9PEnbqvIa0+Y=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: <ross.lagerwall@citrix.com>, <konrad.wilk@oracle.com>, <doebel@amazon.de>,
	<julien@xen.org>, <Andrew.Cooper3@citrix.com>, Roger Pau Monne
	<roger.pau@citrix.com>
Subject: [PATCH 1/4] livepatch: update readme to mention --xen-depends
Date: Wed,  2 Mar 2022 15:27:08 +0100
Message-ID: <20220302142711.38953-2-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220302142711.38953-1-roger.pau@citrix.com>
References: <20220302142711.38953-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO2P265CA0125.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:9f::17) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f516a324-02bf-45bd-1132-08d9fc58f815
X-MS-TrafficTypeDiagnostic: BN6PR03MB3330:EE_
X-Microsoft-Antispam-PRVS: <BN6PR03MB3330BD763E6B12BB13A4A35C8F039@BN6PR03MB3330.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(6506007)(6512007)(6666004)(38100700002)(66476007)(66556008)(86362001)(66946007)(508600001)(316002)(6916009)(4744005)(82960400001)(5660300002)(6486002)(8936002)(8676002)(36756003)(2906002)(83380400001)(26005)(186003)(2616005)(1076003)(107886003)(4326008);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?MVBYb2g3SlU5L3BpYXl5M09DemJvRjd6aG9yRGdLaFVmMGNpMUF5WnB6Q25R?=
 =?utf-8?B?VldxN21SQ2RFRzFyTHpNbmt2U2UvZFlGYlBMQmhNdDdYV3ozbmdxNXFVZGtv?=
 =?utf-8?B?cWE4SDY3amVmbmJmMzNyeEpRZWZXWjE5d2RCN1ZkMnM3aC9zQ0wvWE45aXhs?=
 =?utf-8?B?Snk1QktCQlE5eDY4S0xWVjdkUVdFVnh5bm90UlRmMXZKQ0VSSW9haEhTdExK?=
 =?utf-8?B?YTVHOWxFajFtM1EvR2VwT01acUo4WDVKRUNCZmpLcmRaQVF3Yy92QVE2Y2JZ?=
 =?utf-8?B?R0RaRVhZSnhHTXV1U045eTducnV0VUxoNlJUSzhQN1NxeldqdDZHUVN1TEtY?=
 =?utf-8?B?WHNSVlJmNTNRWGhoRm5kYXJKcU9EWW13bk5WR0E0Q1R2ekJqRmtzeDE2dHM5?=
 =?utf-8?B?WW54c2lxWDN3R1Y2ai9RTkVyZjZCN0VrSE9Ia3MxM1prM2ZDMm90ckJMR0lL?=
 =?utf-8?B?OGgzTzAxR21Ebm9sYzFRUDRVSThVK2NyMnNXMUpOVkZGajVONTZxVUdzZi9N?=
 =?utf-8?B?aHVadUpIYVY5WEVHWVJPUTl3bStlcTBVUXBXY3oyb05Md0lZTVM2ZSs0K2pJ?=
 =?utf-8?B?VS81aUY1RHA1WldtTTJ2SG5lWE5DdkIxeVhMY1huNlcwS0Z4T0xseDYyYmZh?=
 =?utf-8?B?clcwd2xpbzRVaktEdTUxQlk4STh1R1Nsam5KZjdieWcveFlJbC9ycDRtNzVx?=
 =?utf-8?B?QXZTcVVqWGdUUWhSa3VsS25FaWtTbHB3ZmMzR2ZabzJML2tsRHcwUzI5b1kw?=
 =?utf-8?B?WmxZeWwwVnBLNnI5TmpjN2tERXlvK2dmcWM2SXg5cks2dU81R1Y2VENRMU5E?=
 =?utf-8?B?cUtzZmNLckFmdDF3S1EwemVjVU55UlkrT2dzNmRMMzJzSUZCeVlNTlp4MUxX?=
 =?utf-8?B?ZjlqYm90NnI1RGtuVVF0VU5xL09lWEFOcTdMZ1huNC9nZ0NvaGJGNXgzVE5P?=
 =?utf-8?B?VDFFbkUvWGFvait4R2FFRytJcUNzdndpNURuYnFNckQzMnVhRUN3b0hFai81?=
 =?utf-8?B?SXAxSVNWNXR5T0J3ZXNnSHNibWNhMytZNCtBajl6b3FFRVZKbitHb2ExdGlw?=
 =?utf-8?B?OWhOZmdFM09GWHI3cFZQUTFBaVYzaUpKNWd0RW5ZUy9reDJyL1J0Vjk1RTBY?=
 =?utf-8?B?c2VlaTkzYkQ5YXRzdnBpS2NaMkQxNDQ0UlJDRDd2eERvdnYvenoxUFhmOUl0?=
 =?utf-8?B?OHZqeWo4QmQyVEJUK1FaYTlzcTNVc2kxYUdWYkROWWoxZWJFSTRqNGJrYkpw?=
 =?utf-8?B?WHFxMUQ2b0JFOThBUXNtdzRpaG9JL29sSGFsQWwzQjdGY3BZczlaNmtLeng1?=
 =?utf-8?B?VWkvRVNDVFNla2ord0phOGtLWXNhUVRrekIyUWVDYUtMVWFyK0RYUGRESi9m?=
 =?utf-8?B?bnNlczd5V1BTWGszbUxJdHc1bmlaNUM1SWRCQk43enhDNUIwNUE3Ym9HMGVP?=
 =?utf-8?B?TDRBa0J2VFNzaklGVi9nYlBkUkZGbldEL1lWOXdmcDVoRlBDWW9yQmNESnhq?=
 =?utf-8?B?MEwzb1AvVENKQUpGS0ppY0FhTlA3ODI2WWVTUkorNGlDTkhLcm1LaWh6ZzJE?=
 =?utf-8?B?OE5rUW9pQ1VXb2pGbGJnQzR3M3FoaUpIUHRwdTNodytlZStSK2ZZaGxDbjVs?=
 =?utf-8?B?SlhkZ25jclFmUmM1UmhqeGt0eFRuVFk5c1FjdHdYUGdhUEpFeHg5UnVwV3VH?=
 =?utf-8?B?d2FJL2x1MjlXSldoL09DbzJPQStnQTlKOEVpaHhEYTAyWWxPb1JxamtZam9U?=
 =?utf-8?B?ZTQzT0xiZkFMaTRVRXo0VmpjSHR0YUMwMXdiWG1sbFhud1RLMlV2L0NYekVv?=
 =?utf-8?B?blJubkh4Ky81Rzd6V1VpbGk5V3piallZaTNrWUU2ZVA4MXpsb1F6QXBwbEtu?=
 =?utf-8?B?RkNmdHRoYkttS1Myc1VENnRsQ2Q4UXd5NmNqb2ZnYzFkSXVZamZ4SWYzSGpx?=
 =?utf-8?B?TlZUY3JVUzJtM3Q5MEJ3VjBHa3ZBS0FqTDUzYkNxK0h5Zi91cU84Njg3VXNN?=
 =?utf-8?B?bEh0QkcycVhOSnh4aU1ZYkJmYko1a0FLaHQ5ZjByNjI1d0NocngzTllPeFNi?=
 =?utf-8?B?VGNiNWlwMW1UZHYwbFY2WEEvWnZCOW9XSG1jL3F1UmNFSE5NbWJLRnU5eHg5?=
 =?utf-8?B?SCtIQXh2cHhHZWJoZnZGMXJ4QUZld1hQanI3U0JpaTdSQWFEV21YQ0YxaXhZ?=
 =?utf-8?Q?V29x7qL8cpwjQJW2VqXuj48=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: f516a324-02bf-45bd-1132-08d9fc58f815
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 14:28:50.0280
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: U3N4Gy76DFa2vPVCOKFgb94DZ1fA8UEVonjjLzsIxcT4oJV8Byu68/sDv7nW6Ae+p3jG/uPk+5QNyHsadNoHjw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR03MB3330
X-OriginatorOrg: citrix.com

Fixes: b19df7b2c05e ('livepatch-build: Embed hypervisor build id into every hotpatch')
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
 README.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/README.md b/README.md
index 653c624..b48a3df 100644
--- a/README.md
+++ b/README.md
@@ -24,7 +24,7 @@ Next, build a live patch, using a patch and the source, build ID, and
 ```
 $ cd ~/src/livepatch-build
 $ ./livepatch-build -s ~/src/xenbuild -p ~/src/xsa.patch -o out \
-    -c ~/src/xen/xen/.config --depends $BUILDID
+    -c ~/src/xen/xen/.config --depends $BUILDID --xen-depends $BUILDID
 Building LivePatch patch: xsa
 
 Xen directory: /home/ross/src/xenbuild
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 14:29:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 14:29:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282277.480923 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPPyM-0000Xz-3w; Wed, 02 Mar 2022 14:28:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282277.480923; Wed, 02 Mar 2022 14:28:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPPyM-0000Xs-0r; Wed, 02 Mar 2022 14:28:58 +0000
Received: by outflank-mailman (input) for mailman id 282277;
 Wed, 02 Mar 2022 14:28:56 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LB9Y=TN=citrix.com=prvs=0530a50c4=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nPPyK-0000Xg-MB
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 14:28:56 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 15aed13b-9a35-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 15:28:54 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 15aed13b-9a35-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646231334;
  h=from:to:cc:subject:date:message-id:
   content-transfer-encoding:mime-version;
  bh=oUjLpSae5zo/rJzrNaBLQzS2gfvNUYVpZIh8bPCADF8=;
  b=aPJ1IO9h3p7OmhT019148ss9hVRSjISYULYiFo1V9GPmMnZeYU0FTldL
   smMh70mB1Dq2r7DyrZcGVyn/ZGZi1JMXEXjD4EHtF5ZXsleAqqnKIiGnk
   lpO8/ZvP/aLL7gbja8daQSOKcmPb0R+Lrxm/DJ+sNLa/xiQLX1Q5xcIN6
   M=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65714247
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:uVv3Yq69RJWBwSQ/0wBzIwxRtBPHchMFZxGqfqrLsTDasY5as4F+v
 mdLW22AbPqMamOned8nOYu39khXvsTcydFnTQVq+38xHi5G8cbLO4+Ufxz6V8+wwmwvb67FA
 +E2MISowBUcFyeEzvuVGuG96yE6j8lkf5KkYAL+EnkZqTRMFWFw0XqPp8Zj2tQy2YPhWVvW0
 T/Pi5a31GGNimYc3l08s8pvmDs31BglkGpF1rCWTakjUG72zxH5PrpGTU2CByKQrr1vNvy7X
 47+IISRpQs1yfuP5uSNyd4XemVSKlLb0JPnZnB+A8BOiTAazsA+PzpS2FPxpi67hh3Q9+2dx
 umhurTreAoLearOyNgnEAtRCyZQPo5ryp7+dC3XXcy7lyUqclPpyvRqSko3IZcZ6qB8BmQmG
 f4wcW5XKErZ3qTvnez9GrIEascLdaEHOKsFvX5t13fBBOsOSpHfWaTao9Rf2V/cg+gQQKmHO
 5BFNlKDajzuQUNGN3EvU6lunb2EmFrhdW0FgVaa8P9fD2/7k1UqjemF3MDuUtCNSM9Ymm6Ro
 2vU+GK/DhxyHN6CzTuI9Fq8i+mJmjn0MKoCGbv9+vN0jVm7wm0IFAZQRVa9ueO+iEO1R5RYM
 UN80ikpq7I7+Aq0T93+dxqiqXWAs1gXXN84LgEhwFjTkOyOuV/fXzVaCG4aADA7iCMobWcb2
 33OmNG5OQYsorSNTlye1ZqmjArnbED5MlQ+TSMDSAIE5fzqr4cykg/DQ75fLUKlsjHmMWqum
 m7X9UDSk51W1JdWjPvjoTgrlhrx/sChc+Ij2unAsotJBCtdbZXtWYGn4EOzAR1ofNfAFQnpU
 JTpdqGjAAEy4XOlyXTlrAYlRujBCxO53Nv02wQH834JrWnFxpJbVdoMiAyS3W8wWir+RRfnY
 VXIpSRa74JJMX2hYMdfOtztVZ10lfCxS420DJg4i+aihLArLmdrGwk0OCatM53FyhBwwcnTx
 7/BGSpTMZrqIfs+l2fnLwvs+bQq2jo/1QvuqWPTlHyaPU6lTCfNE98taQLWBshgtf/siFiFo
 r53aprRoz0CAbKWX8Ui2dNKRbz8BSNgXs6eRg0+XrPrHzeK70l6U66Bme56Itc990mX/8+Rl
 kyAtoZj4AOXrVXMKBmQa2Alb7XqXJ1lqmk8MzBqNlGts0XPq671hEvDX/PbpYUaydE=
IronPort-HdrOrdr: A9a23:oBv5HanJBnuSB5yg3Po9j9roWNDpDfPEimdD5ihNYBxZY6Wkfp
 +V8sjzhCWatN9OYh0dcLC7WJVpQRvnhPlICO4qTMqftWjdyRGVxeRZjLcKrAeQYhEWmtQtsJ
 uIEJIOduEYb2IK9foSiTPQe71LrajlgcKVbI/lvghQpGpRGsddBmlCe2Km+hocfng7OXN1Lu
 vU2uN34x6bPVgHZMWyAXcIG8DFut3wjZrjJToLHQQu5gWihS6hrOeSKWnS4j4uFxd0hZsy+2
 nMlAL0oo2lrvGA0xfZk0ve9Y5fltfNwsZKQOaMls8WADPxjRvAXvUoZ5Sy+BQO5M2/4lcjl9
 fB5z8mIsRI8nvUOlq4pBP8sjOQpAoG2jvH8xu1kHHjqcv2SHYREMxan79UdRPf9g4JoMx8+L
 gj5RPUi7NnSTf72Ajt7dnBUB9n0mCup2A5rOIVh3tDFaMDdb5qq5AF9k89KuZMIMvD0vFoLA
 BSNrCc2B4PGmnqL0wx/1MfiuBEZ05DUStvGSM5y4+oOzs/pgEN86JX/r1cop46zuNMd3B13Z
 W0Dk1WrsA8ciZvV9MHOA4ge7rBNoWfe2O7DIqtSW6XZp3vfUi97qLK3A==
X-IronPort-AV: E=Sophos;i="5.90,149,1643691600"; 
   d="scan'208";a="65714247"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=DeUq6W7+m62zRoHKL5cEGLvOedvpfMYqZ4QfwfAW0moIjfJfKEIIL4kCIMypnSQiDmREi7K3EM/YXHjPvjaNMl/5UeVr5k9HkBQjRDX9Tb2EIbZNzw24qNxIlut+zcV2dCjkipCm7KiBl3zDqRj94o0mc+SrvtW7i9c/zGVP4KmtW74nP6OX0OIW/+K6XdzonK9GjfM7GLQlGXeWPpyjViaZR8bt7FrxaEjTcAjH0Y2B44ioVwlO5HQLmM9bMSFHt0+tRG5TaF+17r5JMjbPCJwNtMS3PXLsWBMdzrwHFAzf6XHneXHvtbhh4g4LY/eP8FpkrKuWilfE3BCmZLO16A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=SzzMi113fMsllfdXNK2EhtX/Jo9shAWDFTXPcifYdio=;
 b=RFjIJ4MMj31R+G+H7UlQq1a4BVPwtIRud/yxRHFG3Bx7ww3A8+I495GwRxSe9xyFPv2UFve3sA8q5EYyFTXIXzMh5Bv9lhUqBa398QxcFniTRwLt+5I7+0AMgg5eszuWkmVAZ36kRghal6jiuDSifMWCubQtUz+eSUeM8vtI9AFGodKJlQrtTwJBxrFLCld3VzGJWr/0IU0bE2XDpl60E2m+NhBPCd2f3ONczHKxqETvq3XA/VRm3va9LBiTEt6N+L/MwHpGLZcL4mLcr2KIzPRQ/Jaf8jmnENcLszhnjGiSNR58nyVwm7Ku+fX0awL52TKpV/ZoYJ+ok1wuYsONhQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=SzzMi113fMsllfdXNK2EhtX/Jo9shAWDFTXPcifYdio=;
 b=DVfzCUgo0+B+YKaAPPRH8RiqCaYKNHZ3SoZuASGp7G7d1l0TAuWvaW+B2WLn+/Jcjq8K0lu8hXRTQ7jZgxNX+QH52nxruKvTs2AVnyr594ChSp3bS//OYl48POAhD/ZrC0NUYzAV/JZtNpGO07+EmMZMCTOjsi+0b1nqWqfEkRk=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: <ross.lagerwall@citrix.com>, <konrad.wilk@oracle.com>, <doebel@amazon.de>,
	<julien@xen.org>, <Andrew.Cooper3@citrix.com>, Roger Pau Monne
	<roger.pau@citrix.com>
Subject: [PATCH 0/4] livepatch: fixes for patch generation
Date: Wed,  2 Mar 2022 15:27:07 +0100
Message-ID: <20220302142711.38953-1-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LNXP265CA0086.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:76::26) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: e1af40ed-e038-41cb-0959-08d9fc58f4f6
X-MS-TrafficTypeDiagnostic: MWHPR03MB3279:EE_
X-Microsoft-Antispam-PRVS: <MWHPR03MB3279D323136693B3F53A7B818F039@MWHPR03MB3279.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(4326008)(86362001)(66556008)(66946007)(8936002)(8676002)(66476007)(1076003)(107886003)(4744005)(83380400001)(5660300002)(186003)(26005)(38100700002)(82960400001)(6486002)(966005)(2906002)(2616005)(6512007)(6666004)(6506007)(6916009)(36756003)(508600001)(316002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?VFZNV0tnYzVYNkpmdE9sRU1ZTmVaYjdsM2pGOEpibWsySnlFSXovT0d1Ynh0?=
 =?utf-8?B?eVlvRDBzelZnS2lmczAwNUJBdVYrVXlMNlRlM1BjbFZYdytzcE5KOE9aR0R4?=
 =?utf-8?B?NVNwYkVmWnlNQUo5QllMVWtidy9pTEo0K09nUFBadzZTd3BJcWo3MXBadUla?=
 =?utf-8?B?UlhMb1Z6emlGczV2VUhudy9FcUpWb2hxbkdoNTc4azZBYWtaWGVrV3YrUUll?=
 =?utf-8?B?YVB3WkpHa0RsdnpQRE1iNFNXeDlVZTJ2dFlqenhoOEhrMEQ1OXB6V2syVFlv?=
 =?utf-8?B?SXhsQTFybyt6dXNSdW04WVBoS2xRSDJqK240UkU4NUEvY2RtdWFvL1R4VFNk?=
 =?utf-8?B?ZGFISkd1MVJMdWF3OU5oczRtSjdjRGVzbnNWYXk2d0hFYlU2cUQ5TmIrdThi?=
 =?utf-8?B?ZVg2TFNUWGlNTGZpOElFN0RiV3RCYlZGTHZ1Tk13Q0ExK1cwa1dadC8zcGJW?=
 =?utf-8?B?SCt6WnpIQkxibWhmeE1ORUpycmFFWFplQm1Hd1MzL0JLazV6MHA1enM0NUo3?=
 =?utf-8?B?cDZtRHZZOGtjajVDRHVxay9DejlsR2tTRUx1SWR5ZlJFQzVQK0l2OThzQ1dB?=
 =?utf-8?B?N29GcW1tWFZqVTFhYkZreWg1SllMY2hpUVRFclFCQkk3ZnpKOHZZWGVnV0J4?=
 =?utf-8?B?UEU4TWJGN2hCU0FlRytRT3VoK2YyVE5oazltbkVWbytWMXoyeC9ZaDFMSkFn?=
 =?utf-8?B?ZEJaQ3J3d2x2SWRoQzVzb2R0YXZEbHFDeXNrdlZta3p3RE5UbS9FeGpzZXFt?=
 =?utf-8?B?OVBmMmd4WUIyR0loalh1V25VbmR2OVlNWGd6VEJGUDVzUUl2ZEUvWWZOWGZr?=
 =?utf-8?B?SXFlVnBia3ViQmJESHBTMnFqMUE2aUZZQkl4dnptRjd1SEdPWmpEeUtycG9w?=
 =?utf-8?B?TTh1cjh6WjhnM0JrNXpteGIzN013bWpOVUovTzVhWWx1RFZQNENRdEZLY0h3?=
 =?utf-8?B?S3JPdHh5UFViMGpQZWtkakZGQU84L2h3QmlPRVBUVUpxUXQ5R3hMTUtWajBE?=
 =?utf-8?B?YUhNdWl3Y3VWR1FQUTNnamxpUG5wZ2JIcW9KZ05pbCtHSkc2a2h2T25nTnc1?=
 =?utf-8?B?T1VUSTRrN2FlTkxpL005UW1nM1NUanhMWlNrcnhyL3AyZngrSTNwOGhVN1R6?=
 =?utf-8?B?MkJCM2NaSFVEQjZlUTJkZ2pkU2lEODMrU0piNzBlSHZ4V1ZUQXpWaDE5N21L?=
 =?utf-8?B?cjFHd0ZUMXQyaXFmbmFKWUtjM0JRNkJWUnM0NXNEaUl1TVQ4VEdzSDB0S0Nt?=
 =?utf-8?B?N1NaV3Qwb014S2RtZnNFL0N1dHNEcko2WGliQkkvOUhvV2FuNzMvbE1raXdl?=
 =?utf-8?B?Y1psaktpbDJ4MCsvVzVISFFKK21WWHBjOVU1TUFpN1p4UTN0aXY2RktEUnEx?=
 =?utf-8?B?Yi9UaUtndW8vK3hneXNBV0FNd1FudVhkem5QUU5MRmJ4S0xlR0dZcUpyVGJy?=
 =?utf-8?B?WU1ZQk81Ky9wUSt0MjBqck1xRktCTTFMNS96Um5jOHR5QUdyTU0zTVFvbzhG?=
 =?utf-8?B?R0gxWFhad0QxWmNzRHRVSWVMT04vWjRIU3hmTHFwRWg5YW1VVDJEenZvdkND?=
 =?utf-8?B?NVZTL1hxcGV2MHB2Nk1nTFNNNHV5TWlWeTlQOG5hRFN6R0M4VURhbk5MWE9M?=
 =?utf-8?B?b0Jwc0RlVTdhTVdTWnlXVDlQa2Q3aDhrbjJLRVA0eEkxdGNEaTg3OE9WSXFm?=
 =?utf-8?B?T3IzREVxR3Bvc3dodHowdnBTTnIvS2dBbE5RTjc5dnI3ZnlmcEFCUzNFdzU5?=
 =?utf-8?B?cHJ4S0FCcGhWclB5OXM5OXpFbnhpaHBxenQ0MHFIS3BIZkRrT0tOMkFzTWFS?=
 =?utf-8?B?a0t3UUdSdWJiNERhazE5ZWFCRkgyMmFnL0lxRC9IK0R0SWs4Z3BacTRIcGVj?=
 =?utf-8?B?ZklUZlA1cTZvS1JmZVh3S3F6R2lyQlFLcjdpUFZMTUR4ZVZJdmNyaitNd3Rn?=
 =?utf-8?B?YlFBYzlWTWdObk50T05ZNEwzQXVpTlp5RWFUVW41VFgySTU5UlRWUzUxUlh2?=
 =?utf-8?B?VlFhNElwM1VKOHdmRUlTUUg0S3JVNFB1SUQ2cjBDOWp0cGJjTlFpODY0d3pU?=
 =?utf-8?B?QVYxbVZtU3B4cFk2WlpYYnQyWVBjSnJRUEtvTmdMR215VEFHUVhyem1QeTZB?=
 =?utf-8?B?clNRQVRlNFVZNVZyU2EvbFdhZklreEZTdFYxZ3FHZkNjbE9Gc0h3cGxZbVdq?=
 =?utf-8?Q?S1Ml1suK+gVqVtXEX6vyKh4=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: e1af40ed-e038-41cb-0959-08d9fc58f4f6
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 14:28:44.7816
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: sQqJGtJwAlNtOcZGPE/EDsycRwDllzU5qET8ProphhYM+9QE79dTNhUoRCdFiEffTA9/eH99YbiXJSjSB7NVSw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR03MB3279
X-OriginatorOrg: citrix.com

Hello,

THe following series contains the minimum set of fixes require to get
the livepatch tools to work again with current Xen version.

Note the last patch depends on:

https://lore.kernel.org/xen-devel/20220302134425.38465-1-roger.pau@citrix.com/T/#u

If that's not considered acceptable a different way to add
-f{function,data}-sections will need to be discussed.

Thanks, Roger.

Roger Pau Monne (4):
  livepatch: update readme to mention --xen-depends
  livepatch: improve rune for fetching of Build ID
  livepatch: do the initial build using CROSS_COMPILE
  livepatch: differentiate between old and new build systems

 README.md       |  4 ++--
 livepatch-build | 25 ++++++++++++++++---------
 2 files changed, 18 insertions(+), 11 deletions(-)

-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 14:29:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 14:29:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282280.480956 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPPyc-0001f3-2i; Wed, 02 Mar 2022 14:29:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282280.480956; Wed, 02 Mar 2022 14:29:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPPyb-0001eu-V1; Wed, 02 Mar 2022 14:29:13 +0000
Received: by outflank-mailman (input) for mailman id 282280;
 Wed, 02 Mar 2022 14:29:12 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LB9Y=TN=citrix.com=prvs=0530a50c4=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nPPyZ-0000Xg-WC
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 14:29:12 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 1f7b23bb-9a35-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 15:29:10 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1f7b23bb-9a35-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646231350;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:content-transfer-encoding:mime-version;
  bh=vvgWKbFjweSwkWyBIVjjASKWnZeI8HuMMPIGjeUSkdE=;
  b=TloQHp67806FwFFWCBveOXgvAJQR/hSBOOn7RLSGhCm9thEhPrSh+jnv
   S5UfWgOM2XaJX5eLFiN0h4M1O9XG5LqoZMN/PuA5plaEp7ivxvqXIKNQr
   w989gdAhHNuNE4auT4Jisg0Ah2rGqWdcD09ZkOwk9jXoS51drLuNXMzPL
   8=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65219557
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:VB5y/q0IUXyr+BAHrvbD5fhxkn2cJEfYwER7XKvMYLTBsI5bpzYCn
 2NNDWHUPfuNY2Hyfo1zYdzn80tVupTdzdQ3TQRppC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUw24Dia++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /1HhYCMTV52Apblu8UYEABdGCZ1YrFJreqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHxO4wSoDd4xCzxBvc6W5HTBa7N4Le02R9u25oXTKuDO
 KL1bxJMTjflehB/am4MEaIZrvbx2nDwdTZx/Qf9Sa0fvDGIkV0ZPKLWGNbSd9aHQe1cm0+Ko
 WSA82mRKhMHMN2SzxKV/3TqgfXA9QvrVYRXGLCm+/pChFyI2ndVGBAQTUG8o/Sylgi5Qd03A
 08T/DAnoe4t9UioZt7nVha8rTiPuRt0ZjZLO7RkskfXkPOSulvHQDhfJtJcVDA4nMUGWQAuj
 wC1pPrKJDksqbieTnnC6rjB+FteJhMpBWMFYCYFSy4M7N/ivJw/g3rzczpzLEKmpoarQG+tm
 lhmuAB73uxO1pBTi81X6Hia22rEm3TfcuIiCuw7tEqB5xgxWoOqbpfABbPzvacZd9bxorVsU
 RE5dymiAAImUMnleM+lGrxl8FSVCxCtame0bblHRcRJythV0yT/Fb28GRknTKuTDu4KeCXyf
 GjYsh5L6ZlYMROCNPErPdvvU5x7k/GxT7wJs8w4iPIUOPCdkyfdoUlTibO4hTixwCDAb4llU
 XtkTSpcJSlDUvk2pNZHb+wczaUq1kgDKZD7HvjGI+Cc+ePGPha9EO5dWHPXN7xRxP7U8W39r
 ocEX+PXmko3bQELSnSOmWLlBQtRdiZT6FGfg5E/S9Nv1SI9QDBxU6KKmOh5E2Gn9owM/tr1E
 riGchYw4HL0hGHdKBXMbXZmabj1Wo14o259NispVWtEEVB6CWpzxM/zr6cKQIQ=
IronPort-HdrOrdr: A9a23:G/RbcaHb+j4qO0NcpLqFCpHXdLJyesId70hD6qkvc3Nom52j+/
 xGws536faVslcssHFJo6HlBEDmewKhyXcV2/htAV7GZmfbUQSTXedfBOfZsl/d8mjFh5VgPM
 RbAtlD4b/LfCFHZK/BiWHSebZQo+VvsprY/9s2p00dMz2CAJsQiDuRZDzrd3GfE2J9dOUE/d
 enl4J6jgvlXU5SQtWwB3EDUeSGj9rXlKj+aRpDIxI88gGBgR6h9ba/SnGjr10jegIK5Y1n3X
 nOkgT/6Knmm/anyiXE32uWy5hNgtPuxvZKGcTJoMkILTfHjBquee1aKva/lQFwhNvqxEchkd
 HKrRtlF8Nv60nJdmXwmhfp0xmI6kdY11bSjXujxVfzq83wQzw3T+Bbg5hCTxff4008+Plhza
 NixQuixtVqJCKFuB64y8nDVhlsmEbxi2Eli/Qvg3tWVpZbQKNNrLYY4FheHP47bW7HAbgcYa
 hT5fznlbZrmQvwVQGbgoAv+q3gYp0LJGbJfqBY0fblkQS/nxhCvj8lLYIk7zI9HakGOup5Dt
 T/Q9RVfY51P70rhNpGdZ88qOuMexrwqEH3QSuvyWqOLtBzB5uKke+y3IkI
X-IronPort-AV: E=Sophos;i="5.90,149,1643691600"; 
   d="scan'208";a="65219557"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=N7Vr0xe4o12UfpVQba+JI38TboFa2i/hR+M8r2Gppz8QrUuvoEK69T+sFmrZHNjY9t2fxjtn9U9gTRHLmDyYzV3uVKxa322wPS5bBocIe+ZgNdkqxjrlU7vIYi3/bEVFiU/HkhvyLH6sZXcFoZ/P0OfN0mC+SZjhCej7bgcBt2+7s8gGJA4QOU4QfiiZm5gIh1rUez5iyESc+VFLKJkNRiI+Il4FJbgLwhkR6ew1LkuzdOdq03YW4NZTg16XSMcMLh6ZpYl/GBM+UgbInVtqLmm2RgL/5QemJxXIUK1eqp8tLRwZM9sBQCuglek2HmTolFXd7mCbfJA9Bk30qGVmFA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=C6+tPn3Vtw/33Pu7XLEt/wmcadDGaOE9Qo6ldxTFLMU=;
 b=KMH6IhoQv7iETFGZ50psbSW6ZOu16x2MgyazNFB53MxDszlSE6b8pVMxFsMrOCFvfkx8WKf8MrMJm0gjEu/cQ6PAB17kfglhYbqwiwUnWijsywbH5bsIWcr6ztXb6kjj+Wou2TqxFcAskUwf03l+4oW366TvtXvYX2H1CDaTPK1yJWz3YI5vP/wxQRhOkAp7m8+WeAW2oyuIskGgS2lRhsHg5nk4stajvB4jQlvKtiKuMhRu3Taa6gE5dAqdgBhEkxPWvR0xV2oW2/dg0CNF+cyCpG9OpNa6cJX1qf5hepH1xNo9OE4FDSv/x0o1Q0biFVoIRybtY5bru8RzBwYarA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=C6+tPn3Vtw/33Pu7XLEt/wmcadDGaOE9Qo6ldxTFLMU=;
 b=gma+6fRBGnqAl0A/XmKPzaMFqm12DwqacJ7Yb+34C9t1mQ1Y2UBz5SEB9D82lvpU2FMYCZu6WF2c9lWCPWmkE0ovZ4IpMGK7wRqwpS1Z98dC190IxBKhaFMmF5VAKpbpdGE3ZhtsdXvBmv19SDJ5e+NqnajPfmCdFPgyl3dlYWc=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: <ross.lagerwall@citrix.com>, <konrad.wilk@oracle.com>, <doebel@amazon.de>,
	<julien@xen.org>, <Andrew.Cooper3@citrix.com>, Roger Pau Monne
	<roger.pau@citrix.com>
Subject: [PATCH 3/4] livepatch: do the initial build using CROSS_COMPILE
Date: Wed,  2 Mar 2022 15:27:10 +0100
Message-ID: <20220302142711.38953-4-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220302142711.38953-1-roger.pau@citrix.com>
References: <20220302142711.38953-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LNXP265CA0033.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:5c::21) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 7747fad1-8cbd-4cb2-77f1-08d9fc58fe52
X-MS-TrafficTypeDiagnostic: BY5PR03MB5111:EE_
X-Microsoft-Antispam-PRVS: <BY5PR03MB5111F8AD04FE717B26B423B28F039@BY5PR03MB5111.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(38100700002)(2906002)(6512007)(6506007)(82960400001)(83380400001)(186003)(2616005)(26005)(107886003)(6486002)(1076003)(36756003)(508600001)(4326008)(6916009)(316002)(86362001)(8936002)(8676002)(66476007)(66946007)(66556008)(6666004)(5660300002)(4744005);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?bHNFdUhBekRkeHlqeDFiTVcyNHBXaFdtOG1Ra1NrYndVclVtelF2eExLWEVQ?=
 =?utf-8?B?QXI2bXA1TC9PaUZzYUlhSGlwcndzalpRNUh2Qm9FdVBFZnhpeDd4aWRaMXhi?=
 =?utf-8?B?cFFISmpkM21DZW5tbWxUdlZDQ2VVQlN2SGg2YnNMek1TKzlvekVNOXJucitH?=
 =?utf-8?B?anNTMFlMME1zRGlDZ3NVMXdLSGZZVzI3ZjFLMmtuNVhoWkx5S2l1RjVaSnVx?=
 =?utf-8?B?RWczREZubXp3VUJyVlZqMk13MmdsRnJlZENqYU1oc0xUQ2haekE0MzZST1Rx?=
 =?utf-8?B?N3dSWkpSdFlXc2Z1THNpM0x4UXdRcU9FVkFQbTc5V3Y5RTllUmRIYXgvS3pv?=
 =?utf-8?B?cHV4YlkxOVVyemlXb3FnbVpxQkRpOHBLbWZ6MytXMkZKWG1NWUhONFJFREVC?=
 =?utf-8?B?c1JpV3FPMkpER2FiQVlMMGEvQ2h3c1MyVkt2Qi9YYkFiYTRxQ3hFQkliUVpJ?=
 =?utf-8?B?K1oySEhNc1M3S0ZOcDhJM3J3ZTVxam5ZOElib2pITVp2cy9LNzhjNUtETFNP?=
 =?utf-8?B?MkEzQlVKall2RUFTZjQ0NVdYalZkMDllTjg5dG10amxNOVNZc1pXTWQ2MGdo?=
 =?utf-8?B?R1UzQ24wMG4yVS9zcEsxOG9FTzFHdEszU3hWUTVpZnF3NlhkQ05kaGMzZ0Jn?=
 =?utf-8?B?QUdkTWFzUEhCRkJtVU9DYllNRTFPa0FuTUlUS0QrL0g5OFFLMlFFeUdodUtu?=
 =?utf-8?B?cGhUQmJuWmlWV0k0SWMwbHJkWmY2eVZLdXhZYkxUKzFrL0NMOHJ4dUNyem03?=
 =?utf-8?B?VVlEOHpwbkZ5UFRCRzJzSjgxYTBYcml4d3dxQ0YybEw3TldwbU5YZlNOcC8r?=
 =?utf-8?B?dnRnMUQrNzlVTkNEODA5K1VVQTFDUUpRQzBLMzdOL1RWcHhLQ3ZnYUpNUXl3?=
 =?utf-8?B?cGZodzdqVkVFbHc4bk02aFFUL1pEMHRocGJUVGVQWlpDMWN3YVhwOG1iYy9p?=
 =?utf-8?B?czVrb2toR2hheVpSY0VxajdVNFhZSENzMFZ0bTl5bEc1T1g0RytwdDRiVWRH?=
 =?utf-8?B?cEdEc1dFSlp3Q0VQNkZQMEhvandzUmExd0Njd1hXNmZqUkZkMkNyRHk5ZHZM?=
 =?utf-8?B?c01XRjEvRWpDbkY4TDVndkFGRjJyeXVwOUV2TVFGMm9ndVBDMmZiOUkyM2JJ?=
 =?utf-8?B?RWN0eTU1QnhhSE8rR2M5K1J5T0RiSVllUU0zY1Zaa250Z2gyU1hvYUN4aWRm?=
 =?utf-8?B?MVd0ZGU2UDhoSHNVZWNFMmJXdmEzbmpCU1N3UituTXRwOTVQYjJCaEg1Tjhy?=
 =?utf-8?B?WnN0OVdpbDIrMlFobFp5VSt1WGdydGVEN3BWYWNHMEFQVWRvN3l6SWxvMkl3?=
 =?utf-8?B?ODV5OFRJd0l1RVNGYk5TazdzY1I2UEZ0bk5ackF5Z2hmNk81RnJid1lVMTdu?=
 =?utf-8?B?cFluQU43bTNFT2g3VWtZSEhLMUduU3c1YnZGUzd4RVlaUWRUUk9vSkJSOURt?=
 =?utf-8?B?NHhtUk1BSlUzZ1BMRElNeXJOS25zbm0wZDZ0bXQxOUhIU000VGYrdTdQWU9i?=
 =?utf-8?B?ZzRlazVDdSt6UTlxZzcyVUFScWNUZ2pKRE9lOEc1Y0hvYWxzSFBuRUlMdytN?=
 =?utf-8?B?bVpHemRIaVdwUW03bXhIaFdSMTRBdnhMY0I4dSs2ZGVVbTJxYm1yL0pDSjBG?=
 =?utf-8?B?eEwvUzJRMFNiK1Vua0puQzJEWUwrV25SZDg3TWl1QjVSclc5b2JyUGhpZXFv?=
 =?utf-8?B?eXJyRkU4ZTFLSnphUDZQSmJjNEp6ZW5seTZZUWI1aklaSkptMDVSZVN3Mkd0?=
 =?utf-8?B?L2F5dlRUTGJzNk1YNkpEQ0xjV1VZTlM2YklZWSt3K3VBOWQzWWpUNUZzRkxE?=
 =?utf-8?B?V2lSazRsNzlCaXIyQm5SR0MwZDA5emFxMVpaK1NRRGtJTitTQUhBejdDeGpF?=
 =?utf-8?B?VEFrbnRYUDhROVEvdUdWSld0TkxLRGxnQTNlZTM1dDMzVHIrSks5c1gxQTFD?=
 =?utf-8?B?M0ZtME9zRWFmVVRlNzl4STRSS0w2ZWdMV2hhREhoZG9vemhVK2NQblZaRVlu?=
 =?utf-8?B?NURZRnZKV3VKaGtiWEZ0eVBGZVpCa1pubmVJdXJHTmxaM1VQY0ZkOEZSa1ZT?=
 =?utf-8?B?L05mNlduZkROMUhEb2F3MEtzM3JiMlVPNk95enNqODk3N0FRbSt5Z1lYbFE0?=
 =?utf-8?B?YVRVc0R2akhRUVFWMGIvMStlMUR0N2ZtVm9QdjloMllTbFlsRjNxc2hUalVz?=
 =?utf-8?Q?H9WpTxDGgaY1GJ4uvxQ4Rhw=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 7747fad1-8cbd-4cb2-77f1-08d9fc58fe52
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 14:29:00.5649
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: ziIp2zxFGKWMBLwuSvzJ42amWF8rK6Osd/fcZFTBC/CmPg2CpAFubxWdzm6cDRg9vq9nRkY6zF3jSYH5NGuArQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR03MB5111
X-OriginatorOrg: citrix.com

Setting it afterwards for further builds will cause the build logic to
detect a change and thus force a rebuild of all sources.

Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
 livepatch-build | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/livepatch-build b/livepatch-build
index e1715ea..38a92be 100755
--- a/livepatch-build
+++ b/livepatch-build
@@ -92,7 +92,6 @@ function build_special()
     cd "${SRCDIR}" || die
 
     # Capture .o files from the patched build
-    export CROSS_COMPILE="${TOOLSDIR}/livepatch-gcc "
     export LIVEPATCH_BUILD_DIR="$(pwd)/"
     export LIVEPATCH_CAPTURE_DIR="$OUTPUT/${name}"
     mkdir -p "$LIVEPATCH_CAPTURE_DIR"
@@ -408,6 +407,8 @@ if [ "${SKIP}" != "build" ]; then
         XEN_DEBUG="debug=$XEN_DEBUG"
     fi
 
+    export CROSS_COMPILE="${TOOLSDIR}/livepatch-gcc "
+
     echo "Perform full initial build with ${CPUS} CPU(s)..."
     build_full
 
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 14:29:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 14:29:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282300.480967 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPPyv-0002VN-Cv; Wed, 02 Mar 2022 14:29:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282300.480967; Wed, 02 Mar 2022 14:29:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPPyv-0002VG-9O; Wed, 02 Mar 2022 14:29:33 +0000
Received: by outflank-mailman (input) for mailman id 282300;
 Wed, 02 Mar 2022 14:29:32 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LB9Y=TN=citrix.com=prvs=0530a50c4=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nPPyu-0000Xm-Aw
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 14:29:32 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 2b7d3436-9a35-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 15:29:31 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2b7d3436-9a35-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646231371;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:content-transfer-encoding:mime-version;
  bh=F212JEjE8ExwUhiwnl1J2kabdh8N5NeS+VZ3pk+r8zo=;
  b=bLlF2pyyxeLHpuqIPZWdGIi24F0wDHdE/8hfv+LwYQDgpYVgcP4SxSzL
   /eH+Qx4FJe8lAhr1uLlJcDK8n+mFRO/Khub5rO5OhbHxNWDQhRCrhn2g0
   7XAraAYhrbM+uJFij1kd1A669twZ+lU13i84pEjGqJYLi8swUy8QYdHT0
   E=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65714265
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:lj14xKvZPaFo725k3SNvI1tLtOfnVHxeMUV32f8akzHdYApBsoF/q
 tZmKWqEParbMGL0KNB3bti/pEoGuJ/Uz4A1Sgc4/y4zRCMU+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jV4
 4upyyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi8UJo7Cp8lFDyVfFjhTM4Rl5bzEHnaW5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AO
 pVANWAxMXwsZTV3GWgnV7sdtdyti1PvKx9AqleR/ZIOtj27IAtZj+G2bYu9lsaxbclSk0yVo
 krP+m3rBRdcONH34TiY9nOhgMffkCW9X5gdfJWo+/gvjFCNy2g7DBwNSUD9sfS/klS5Wd9UN
 woT4CVGhas18laiQp/iXhm7iHmetxUYVpxbFOhS1e2W4vOKuUDDXDFCF2MfLox93CMredA0/
 mKRvN3WKGQzjLqQUF+T35SJrjCNNwFAeAfuehQ4ZQcC5tDipqQ6gRTOUstvHcaJszHlJd3j6
 2vU9XZj3t3/meZOjvzmpg6f31pAs7CUFlZd2+nBYo6yAuqVjqaBbpfg11XU5O0owG2xHgjY5
 yhsdyRzAYkz4XCxeM6lHb1l8FKBva/t3NjgbbhHRcNJG9OFoSPLQGyoyGsiTHqFy+5dEdMTX
 GfduBlK+LhYN2awYKl8buqZUpp2k/G+TYy0CKmFNLKih6SdkifdpkmCgmbKggjQfLUEy/lja
 f93j+72ZZrlNUiX5GXvHLpMuVPa7is/2XnSVfjGI+ePitKjiIquYe5dajOmN7lhhIvd+Vm92
 4sPZqOilkQEOMWjM3a/zGLmBQ1TRZTNLcut8JI/my/qClcOJVzN/NeKmeJxI9E+xv8N/goKl
 1nkMnJlJJPErSSvAS2Ba2x5aaOpWpB6rHkhOjcrM0ru0H8mCbtDJo9GLPPboZFPGDRf8MNJ
IronPort-HdrOrdr: A9a23:mFplOaFAi9Ew1VsBpLqFDJHXdLJyesId70hD6qkvc3Jom52j+P
 xGws526faVslYssHFJo6HmBEDmewKiyXcV2/hsAV7GZmjbUQSTXfhfBOfZsljd8mjFh5RgPM
 RbAthD4b/LfCBHZK/BiWHSebtQo6jkzEnrv5ai854Ed3AaV0gK1XYeNu/0KDwTeOEQbqBJaq
 Z0q/A37AaISDAyVICWF3MFV+/Mq5nik4/nWwcPA1oC5BOVhT2lxbbmG1zAty1uHg9n8PMHyy
 zoggb57qKsv7WSzQLd7Xba69BzlMH6wtVOKcSQgow+KynqiCyveIN9Mofy9gwdkaWK0hIHgd
 PMqxAvM4Ba7G7QRHi8pV/X1wzpwF8Vmgnf4G7dpUGmjd3yRTo8BcYEr5leaAHl500pu8w5+L
 5X3kqC3qAnQy/orWDY3ZzlRhtqnk27rT4JiugIlUFSVoMYdft4sZEfxkVIC50NdRiKp7zPKN
 MeTP002cwmMm9zNxvizytSKZ2XLzgO9y69Mwk/Upf/6UkSoJh7p3Fos/D30E1wsK7VcKM0ld
 gsAp4Y542mcfVmGJ6VfN1xOvdfKla9CC4kY1jiaWgOKsk8SgbwQtjMkfII2N0=
X-IronPort-AV: E=Sophos;i="5.90,149,1643691600"; 
   d="scan'208";a="65714265"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=TRW+ahLuRH0wQAbwrnfdTFFqYrpkmDWxASA2uB825eLaCdboj3tQsJmd0QoxdVUCaIX3xK19RcvTdETXJJFDR1et7+tUiBs28sV0FIijI3oWRkkHSmDIsnkUtUwiK/VKQYDvxAIS/jYTLmPeTR5SyKewh8t3qjrtFwYmdrJ1aq0JCv5yO2nQkF8BW1LZHCTOJatHYXvoHv+sXesoyamWY8ZPyR6Tt2Bj8Wh8F3dCBr4fV+/QiKCbwKE8Dz1SZreuhwBJAh1QPGF2iwgTUNkjGf5OKU5AG1eufnWXjRCYJe5g10DTr2LSeI5gdgPZdeSt9RXzsUlUUKkL9sUjNUDmUg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Ju2JmzDTMXMnNqshHl/210cGfKHE694TMbi1tFP55XY=;
 b=NyB64aYXGKLnKkx+C2kzmiRtLDNJ4ii1w9rKRK5mQchD2wEVoZ6WhaMtBPumvbE5fh0aR8gOPwilNjT70qvvict84fhPm3Lkgcalqd4ZM4SfrLqVTMoodcPUZaIwrmSNSGsQqM9yxpPiEjbBZqrRq/p3wVAcRNS3xaPiHLahKVArB9GBWlZlEwM6WcjahNYCa+qpWeZ7xHth6VrftRAuuaWpJQTVHs5Tcp6O/7JvFbmOjfyHLNxcP6PnMpuZyUX7zCRtWIBn9T1qR0T0ZwW/Zceva7n5rh5XHGcxPXmIbrh4ofZHb0mMCQSObxQBBHpP+tOR8iNn0CNTv2boqxeaVA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Ju2JmzDTMXMnNqshHl/210cGfKHE694TMbi1tFP55XY=;
 b=QNc2Q0GbP7TEKhy4HBRVKhpZYkQy/0SeXUgFcDwbE5C4mt73DxyIqKrCzcdB4EniEnoYpsgNa3bbZvYxv667L/aTmw3TiHLWyhjfSlAo2PJoLiKQEEeqOuvgXHZbB83PlIq2kGI9HYH6UKp7a10j9dkanVb5E4fLMKjMn59wswo=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: <ross.lagerwall@citrix.com>, <konrad.wilk@oracle.com>, <doebel@amazon.de>,
	<julien@xen.org>, <Andrew.Cooper3@citrix.com>, Roger Pau Monne
	<roger.pau@citrix.com>
Subject: [PATCH 4/4] livepatch: differentiate between old and new build systems
Date: Wed,  2 Mar 2022 15:27:11 +0100
Message-ID: <20220302142711.38953-5-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220302142711.38953-1-roger.pau@citrix.com>
References: <20220302142711.38953-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO2P123CA0086.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:138::19) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2ca53acc-a8a0-4fc0-4ac5-08d9fc590189
X-MS-TrafficTypeDiagnostic: BY5PR03MB5111:EE_
X-Microsoft-Antispam-PRVS: <BY5PR03MB5111343C3129ACCA0B47ADB28F039@BY5PR03MB5111.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(38100700002)(2906002)(6512007)(6506007)(82960400001)(83380400001)(186003)(2616005)(26005)(107886003)(6486002)(1076003)(36756003)(508600001)(4326008)(6916009)(316002)(86362001)(8936002)(8676002)(66476007)(66946007)(66556008)(6666004)(5660300002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?SVN0RE8xRndyWFpuQkhNUXA4V3FwcVFxTFh4cm9xVHZaa2Q2WWVhSm1HQ3ll?=
 =?utf-8?B?aUJ2UnV3blBjVk9hM2JNbEF0QXpibkl6OURjcGtzNG9adUtEbXRmcFh5MytD?=
 =?utf-8?B?bEo5bmpIZW0ybEpFajJPeUFoVFBKVE9HbDJXdUtvODlIbFg1RXluRVpYcnVN?=
 =?utf-8?B?UmZGTWVwQ1N2VGcyNkltMXhEaUJPV2VsTnRVck1NTFprTXhYU0oyY0ZML2tm?=
 =?utf-8?B?UjFVZUZwL1dKNUdPNVpMS0g1YmlpVVUxNytudk1LL2cxYkFvZEZUbmd3dmJO?=
 =?utf-8?B?TURFQmpma3VTSUx6di9IZWpVWjNwamQvZU9RMmgweGZlTERtc005UHJNZ2V1?=
 =?utf-8?B?MEV2NUlwRVZ6dmQ4VkdIdkNVRFNmdWtleEE4c0oyVitSa3M0Rk54OGFKK3Zn?=
 =?utf-8?B?ZUR6VGJKZTJ5OXBtOWkweC9sT2FoQWtuVG04RTZkVEFFbHhuWTRoQUZ5MG56?=
 =?utf-8?B?QTg1dDg3K3ZRcUZ1Z3hwMGVjZkZFOUZaaDQ1enlmblU2ZFdFMzZaVGhYRUR5?=
 =?utf-8?B?djZmdTk5OVM3NWhsdmk5U2hkcjVZSmhJS2ZTSmw4cVA5ZDJuRXJZUFlvTzJa?=
 =?utf-8?B?UU9TUzdoVE5LT25Dc1VlcTlDZGNwTWhaWllTYlIwZWxKcnNPekNReFgvQWM2?=
 =?utf-8?B?SlJ5cGFtKy9rZnFZVytXTWt0dTdpOHJNNDl0OUtHbjJtcW5jWnROcnIwcmJi?=
 =?utf-8?B?ditqcHNwaHlZUVZvVmxtSUgvdUl6RTNLUkthSFptYkE1aVdBUGU2cDlIaE1G?=
 =?utf-8?B?M2ZxT0hVcU1SZkw3ZGdpSmJvZnhXOTZGUW9zbEJhTmtKdjNGbFpoWllSYzd6?=
 =?utf-8?B?MlVIRStmWjh0Nm5XVkVnWVNaSnZ1d21pU3U2VFBweEdVM0VscFpRYXhuVE9v?=
 =?utf-8?B?T0VFclBvdmFXZXlJYjQvT2Z6dnBxNFEvUjJsTlBzUXovK3E2WVRaRDQ0VnM0?=
 =?utf-8?B?QnpPdUlBUm1Nb1lqQnJMbmQ5SEJiTmVnYTMxakZUS29kcnhqYU4yazhCMU53?=
 =?utf-8?B?SFFtSm9UZS84VkpaczhxdjJuTVBoU2FQaXRHdGdXZ2RkQ2ZGeE1vT0NwcXRi?=
 =?utf-8?B?a2VqSndKaG9MSmZvRDZ4ei92Qk5RVlpFZ2VybEZwNTBmSUU2L2dMa1JENXRY?=
 =?utf-8?B?YzNUMEFjVDRhTEVZS2NYT2poTmRQbXRMN2V0UGZQU29XQUg2U21BdTFYcGw4?=
 =?utf-8?B?ZG5nUVcvMkdRaEF3M2RBRWpIcE9sUjJZc1R1YjBiV2pEYWxUMVg0SmdndzVy?=
 =?utf-8?B?VjU2cFZudnhpRXJpTmFneG5VdHNvTndudmEwZEU5bDkrWG5Wc0tlUXdNUHY1?=
 =?utf-8?B?M1dwcGFEVHZvcnhGV1B0UkdteUdwc3lyMisxcnQ4Wkx6cU0yTWhLQitPc3NB?=
 =?utf-8?B?eXMyRVJvRWNCK0dFNjIvMlR5d0dRSFQzSEs0Qy9nWUp0V3BLcEFwbnQ4YURG?=
 =?utf-8?B?bWRVcGRpMXRHblRzTGhtYnYwQWgzaFhUU3p1R1A3eFJlaW0zMVQ2ejhrOC9D?=
 =?utf-8?B?Ny81aHRMSFRGc3ZaZFRBMEgrWXh5T1ZYdXo1Yy93cWgrTGI0Y0tuZmt2MW1y?=
 =?utf-8?B?cGVwL2R4TDlpR2xzYkg2KzdNN3podG16VUMvLzNLdlI1MmlZeTEyZnJLOFhL?=
 =?utf-8?B?QjJicHU1UEY2WGcxL29CbkVncytkTE9TYmpZWTFPQ3lTMC9VNkFUMXV3Z2ts?=
 =?utf-8?B?SC9DTUNrS0IwWFBzbFh3d1VlSGVnck5BMUN5dm42SUVOYkliUlpiTjJKZHRW?=
 =?utf-8?B?bTBWRUpDb2Q1NU0vL0M3OFRnbHczeXhKU3RMY1E4QUJJNmNFSHJEQm5OM0ZU?=
 =?utf-8?B?bnZMcjVnYWRJb2xuZ20zUUJoVHlucVJOU2ZMb3cyanhNOHd5YktObzRYMXlX?=
 =?utf-8?B?a0F0VzM3UWIrL0NlTmoyVVozbWw2RDZkcE5Xc3VuU2pUMmVKb2xJNGdIU09I?=
 =?utf-8?B?YWRIQWN3dHdHVkVQa3hiZUI2Wnl2VEJ1ZWpYOG02RmIxZmh6R0svQkRSU2RO?=
 =?utf-8?B?MldBaUlOQXRham9UOTRISXFSeHVrVTBQdXgxWXJSbng0eUhyQkt6MzZRaHJq?=
 =?utf-8?B?YlVFMjNseitndXhLUktNdFNXZVRQcWE4TnpiQ3RJcDZxaE5jOXgrK29USGts?=
 =?utf-8?B?QTdjQUd3eW9KNzd5cGxQWm1tZFp6WEcveFo4SEVLY1RwOTM1OHNaZVZLNDEr?=
 =?utf-8?Q?+Rvq3IVCIylmN2BvQEWKOBc=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 2ca53acc-a8a0-4fc0-4ac5-08d9fc590189
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 14:29:07.0533
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: LjS7dSGqpEwBJn5id195MVJBByNLwPl0f7nY7yYVWw/v3RytnRUYeFkwdgcs2iox0+xhgM1wiPyjdVgocipsfQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR03MB5111
X-OriginatorOrg: citrix.com

Do not attempt to modify the build system if CFLAGS are not set in
Rules.mk, and instead rely on CONFIG_LIVEPATCH already setting
-f{function,data}-sections.

Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
This depends on getting the patch to add -f{function,data}-sections
when using CONFIG_LIVEPATCH accepted.
---
 livepatch-build | 22 ++++++++++++++--------
 1 file changed, 14 insertions(+), 8 deletions(-)

diff --git a/livepatch-build b/livepatch-build
index 38a92be..656cdac 100755
--- a/livepatch-build
+++ b/livepatch-build
@@ -98,14 +98,20 @@ function build_special()
 
     # Build with special GCC flags
     cd "${SRCDIR}/xen" || die
-    sed -i 's/CFLAGS += -nostdinc/CFLAGS += -nostdinc -ffunction-sections -fdata-sections/' Rules.mk
-    cp -p arch/x86/Makefile arch/x86/Makefile.bak
-    sed -i 's/--section-alignment=0x200000/--section-alignment=0x1000/' arch/x86/Makefile
-    # Restore timestamps to prevent spurious rebuilding
-    touch --reference=arch/x86/Makefile.bak arch/x86/Makefile
-    make "-j$CPUS" $XEN_DEBUG &> "${OUTPUT}/build_${name}_compile.log" || die
-    sed -i 's/CFLAGS += -nostdinc -ffunction-sections -fdata-sections/CFLAGS += -nostdinc/' Rules.mk
-    mv -f arch/x86/Makefile.bak arch/x86/Makefile
+    if grep -q 'nostdinc' Rules.mk; then
+         # Support for old build system, attempt to set -f{function,data}-sections and rebuild
+        sed -i 's/CFLAGS += -nostdinc/CFLAGS += -nostdinc -ffunction-sections -fdata-sections/' Rules.mk
+        cp -p arch/x86/Makefile arch/x86/Makefile.bak
+        sed -i 's/--section-alignment=0x200000/--section-alignment=0x1000/' arch/x86/Makefile
+        # Restore timestamps to prevent spurious rebuilding
+        touch --reference=arch/x86/Makefile.bak arch/x86/Makefile
+        make "-j$CPUS" $XEN_DEBUG &> "${OUTPUT}/build_${name}_compile.log" || die
+        sed -i 's/CFLAGS += -nostdinc -ffunction-sections -fdata-sections/CFLAGS += -nostdinc/' Rules.mk
+        mv -f arch/x86/Makefile.bak arch/x86/Makefile
+    else
+        # -f{function,data}-sections set by CONFIG_LIVEPATCH
+        make "-j$CPUS" $XEN_DEBUG &> "${OUTPUT}/build_${name}_compile.log" || die
+    fi
 
     unset LIVEPATCH_BUILD_DIR
     unset LIVEPATCH_CAPTURE_DIR
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 14:41:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 14:41:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282314.480978 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPQAT-0005T6-Hr; Wed, 02 Mar 2022 14:41:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282314.480978; Wed, 02 Mar 2022 14:41:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPQAT-0005Sz-Du; Wed, 02 Mar 2022 14:41:29 +0000
Received: by outflank-mailman (input) for mailman id 282314;
 Wed, 02 Mar 2022 14:41:28 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=cGAx=TN=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPQAR-0005Ss-V5
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 14:41:27 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d6e23165-9a36-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 15:41:26 +0100 (CET)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04lp2058.outbound.protection.outlook.com [104.47.12.58]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-11-_sxWMuvmMQ6j6E66vToC5w-1; Wed, 02 Mar 2022 15:41:25 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM4PR0401MB2276.eurprd04.prod.outlook.com (2603:10a6:200:54::19)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Wed, 2 Mar
 2022 14:41:24 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Wed, 2 Mar 2022
 14:41:23 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d6e23165-9a36-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646232086;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=DqA8OqD+yUMC7m6+AcDWe9b9RNpI0QXmhWjntsHZNcY=;
	b=FNw2VU+M3LY1tuDt48SO51EYIP1SQ0/4Xdo4Pj/hfHdQk57J8WkNwbISldzjpsO9yfZl76
	1KeF5vLGFL6MrbG4gvIOiZfw7GhU9h7j0hMQ/YW37FieibYZ2mA1fihv2SfcabXEMq1Utn
	qDtb6ERaYHoB4TdYHfyyx4Jx9qns7BA=
X-MC-Unique: _sxWMuvmMQ6j6E66vToC5w-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=V6Zef21ViGf5i1vijMjg9LFhQE1M5ad7tE1NTMdoQxzeJZgdaTB8ERXDUSJR7I20izIeTIt3cD/BRCtudrAbdMaouMraN1cfN4DQ4yaS6xfvmhwa7929gSjd95HAGr74anE6NtKd+ptqvnlcgQDY32NrvYAzUHP9kq3xqKlKahBkAYXvojGJ6XuszXq/XUxJi28sHKO+39dhuWFQZqtLtVUSvhE14h6F73RzqcSOOr0MWJtaUjTXRZxe2x1S/oGiTA+grUIEBMGKSp4Q+KbuGYJwBJnOcSq8SUDEq/ELHno98mU/LmAuMxUfY7otnHbB8g+VWTrFZX/zPcDcPQfswg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=DqA8OqD+yUMC7m6+AcDWe9b9RNpI0QXmhWjntsHZNcY=;
 b=FBLCUEenjy46GfC9ARouQaYPo9p8gYe06rzV6rk7l567Db6E/ridFixGiRdFrrbaV20lkcORctE03HnEGiCcP9vxEuaVGbg2qqxn7Xj3T+4bEZl6KMm83aeBUOsRA6NC/PBossvqDOtfeZFdj7bYDtxWafDYMzeJ9y/pPMxNmTzMxSiepOqXE59D4XBm5KpL++7H1L1NVc4Fd7ze+NoyVU9og8nMWpdxNJz+zBxBVQg0PoAH4/wSgWD/XAnClYQCwRgbvyVV6FBDggYHb7rzdRDfdMa2aIMRvxNwVLNRbCvU9H7BNph5tN5zsLKyS/12Y2D46P+miI08ROxbxBCbPQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <f67e599d-4dfc-c98e-75ee-8510237cd527@suse.com>
Date: Wed, 2 Mar 2022 15:41:21 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] livepatch: set -f{function,data}-sections compiler option
Content-Language: en-US
To: Roger Pau Monne <roger.pau@citrix.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 xen-devel@lists.xenproject.org
References: <20220302134425.38465-1-roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220302134425.38465-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P191CA0058.EURP191.PROD.OUTLOOK.COM
 (2603:10a6:209:7f::35) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: cb73a5f8-6ff3-4cbe-2f2c-08d9fc5ab952
X-MS-TrafficTypeDiagnostic: AM4PR0401MB2276:EE_
X-Microsoft-Antispam-PRVS:
	<AM4PR0401MB22769289A635B1753D6AD6BEB3039@AM4PR0401MB2276.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66556008)(66476007)(508600001)(38100700002)(66946007)(2616005)(316002)(6916009)(86362001)(31686004)(6486002)(54906003)(6512007)(6506007)(8676002)(186003)(53546011)(26005)(2906002)(5660300002)(8936002)(83380400001)(31696002)(36756003)(4326008)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?SnJVWmtIdW9QZWtMK2JUYnpWQk9UQi9sd3dDckRLd01Va2hjMEx1RG5ZSUV1?=
 =?utf-8?B?anJpSUs0NEFIeUl2eWlONkZmcG9aV3V4Um1DVTlqRE1ZSmx1dElyTjQrdUhy?=
 =?utf-8?B?WXpXSVZOSHdtME5hV2ZDVThma250OXRCQm5Qak1OaE1mbFhKamw4VXQvamhM?=
 =?utf-8?B?NXJjZnIzMFBZa3k4VTh5b1VxaFd4NHRucjgvYlFrZHNxKzlwL3Q5eHN5WGJX?=
 =?utf-8?B?V2VYRE9LYzNmT205akttQmplNjFuYUF4UjlaNEM3OUtBbEtaNTdXSk9OZUNS?=
 =?utf-8?B?dlkwSFpCRlZYZXphZFo5VHdQZDJ2Y1JEMndscnA2UXJnWDhkQ1hVZWk5NGFZ?=
 =?utf-8?B?WGVsdk9UckJ4UnF6WnBIZVR1eGhlU25iV0JvbE1MZkg4YUxDTzBqNlNNOTR0?=
 =?utf-8?B?cWpES3lXOUdHcFIrYUFOTUxCVFJybDJBSmY4eG14ZHAyNEYrL3dhUWhnQ1Yw?=
 =?utf-8?B?U2NoaE5EaFpZN252ZmIvT0g0M0hoZGorTnc1RitNUU5qdlRGckF1bEF4VFl1?=
 =?utf-8?B?L1FyUVhSZUU1SFJyMUd2K3I0TExZR0Nta0EvVVMyOWI1MmtwN1VBZHIwM1Ew?=
 =?utf-8?B?cU5LUFZtNWlrcjJOdnlrZGVtSVR4WHRNMDJSVVd1cEM4T3BOZmEvNG9WVGFn?=
 =?utf-8?B?ME9wNjVuNlliUlhtcWhoSEdHblJleFlhYW1FdlhSZndxTzRvR0w3ZmdvKy9N?=
 =?utf-8?B?RlVBWEdocGY5dHVGNDBwRzFPOWFLTTVnSjBZL2J5T1FPU0RYcytMdmVxc081?=
 =?utf-8?B?cGIvaWF5R0czUkxwSTZsVzU1Z2gzUXhYNTdDVXI0NnE2Z2ZxZWdMUjNJZnFt?=
 =?utf-8?B?bzN3TVdYUkQ0d0tLbzdEUGRRV2g4VTJPYmRCKzAzUFRsVDVkZWt1T0pEd0oz?=
 =?utf-8?B?YnEwT2VDODlmY0Y5c3VsVDJSRWFwRFBjaFgwaUdBOXpoMXcwVE9sY1dxaVgy?=
 =?utf-8?B?eWNoa3R6WStLTk96Q1VCMkF3Y3JLeTZRNFpjZmpBSytQUjlCeUJPZWJlWEZu?=
 =?utf-8?B?eEpORzc4QUtHVjdGN0lkd3F6VkZSMjI1MHp5b2QwalRkem1kNTJlNzZaZS9Q?=
 =?utf-8?B?S29naEVGRFRKNHFDejZXNlQ3ekJyUmsrcGJISVZtWHRlSXNoYVVwdXU4TWR6?=
 =?utf-8?B?QklFeS9LWFpKS3lRaGhuVnlDK0dzLzJGQmhRR3RQczlENVBadlVuWUw1alFN?=
 =?utf-8?B?Y2RtWTlrbUJZSm40YUx2VElhczZsbEg1aUVsWEZFMS9MUXE0cHZPOTViUkVY?=
 =?utf-8?B?ZXJmRmwwcGZFNGpjOGw5emNteXV4QnR6VnQ0VjdzRjJ1SWpqQjhBeUhxZTln?=
 =?utf-8?B?THJuVHlVNFV4cHcyYWtPNVovUE04c0NIRXVxQVVNbnF3S1BQd3phNTh1S3h2?=
 =?utf-8?B?UnQ2QTBkTDVXZDNwUW1sYTNHMHE4N2RmK2U4bmVnU0d2eG5EUTNWU2RETWY0?=
 =?utf-8?B?MWN4UEZSajFlTXljc1dpNlZuODVMeGQyNE1rRzFlYTM2ckZRNi94M2FIdkYz?=
 =?utf-8?B?YjRPVmVLQVJENHJIeXlqaU0ya0J6ejBYNU9EbWtSTE5jMHVWeW0yOUxjbW9T?=
 =?utf-8?B?c04rcytsUDdHZE1uTlRBRkJkeGFZQ3RlR3V2VUxQOG1PV1FoeTFPVWZhc3Ew?=
 =?utf-8?B?bWVYMXdzMkRDOS9Tak9EeXdPSUpwVHYrdDR6OEgrUUp5SmV3OU1ralNGVFpI?=
 =?utf-8?B?Y3B4OXVNVEE2VUxlZFUrdjBMQzlBdVc5ODFmZEtZMCtMV0JydmdHOXY3RU1M?=
 =?utf-8?B?UUxTQnZybU9OT0lNWWZ1RnN0SkNCcmJBS3BZTVRDcFpobUlTSzZRcTg5MGh3?=
 =?utf-8?B?NlJtYTNHbjFsYkN4NXlpTXBRRXRDS24zR2crS1JBdTZabUdhdXVBaEhnTEtY?=
 =?utf-8?B?UURjWENHSTZNZllSSHdPeHhTQk1JOExqbzJ1b2Vlb3cxNjk2Y2czS2Vza2F0?=
 =?utf-8?B?dWJTa3BMU3N0OE5RcVVNQTExZC9PL1Y5Q2k5am8rQ3VaT1loTmJVNjRmaHZH?=
 =?utf-8?B?bC9HNUJTOFhOZG5VUy9NWWQ1Q0tLaVY5NEt0WFk2T0hySjdkY0Q4UmYvRWpo?=
 =?utf-8?B?angvOHU2Wi85a1FxSktscStjOXNLeVN5M3NSSGZQYTdGdjExSm1VZWM3bTVZ?=
 =?utf-8?B?a0tvV09JMHN4cFl1MC9DTzBTSFBKai9jd2F5MWxtMnRQaTEzU094WStTelF1?=
 =?utf-8?Q?OIioETKt8hMJOtllfXbRSpA=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: cb73a5f8-6ff3-4cbe-2f2c-08d9fc5ab952
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 14:41:23.7469
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: DQTxq3nTEeTNcBLVe1CxTW3FlWzX7AfkLm+hgqyCuLuH/Hvz4sZoO7ZvlIUIDJ8JOZIyDGPHtd9kT1y6CLBdCw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR0401MB2276

On 02.03.2022 14:44, Roger Pau Monne wrote:
> If livepatching support is enabled build the hypervisor with
> -f{function,data}-sections compiler options, which is required by the
> livepatching tools to detect changes and create livepatches.
> 
> This shouldn't result in any functional change on the hypervisor
> binary image, but does however require some changes in the linker
> script in order to handle that each function and data item will now be
> placed into its own section in object files. As a result add catch-all
> for .text, .data and .bss in order to merge each individual item
> section into the final image.
> 
> The main difference will be that .text.startup will end up being part
> of .text rather than .init, and thus won't be freed. Such section only
> seems to appear when using -Os, which not the default for debug or
> production binaries.

That's too optimistic a statement imo. I've observed it appear with -Os,
but looking at gcc's gcc/varasm.c:default_function_section() there's
ample room for this appearing for other reasons. Also you don't mention
.text.exit, which will no longer be discarded.

> --- a/xen/Makefile
> +++ b/xen/Makefile
> @@ -269,6 +269,10 @@ else
>  CFLAGS += -fomit-frame-pointer
>  endif
>  
> +ifeq ($(CONFIG_LIVEPATCH),y)
> +CFLAGS += -ffunction-sections -fdata-sections
> +endif

Perhaps

CFLAGS-$(CONFIG_LIVEPATCH) += -ffunction-sections -fdata-sections

?

> --- a/xen/arch/x86/xen.lds.S
> +++ b/xen/arch/x86/xen.lds.S
> @@ -88,6 +88,9 @@ SECTIONS
>  
>         *(.text.cold)
>         *(.text.unlikely)
> +#ifdef CONFIG_LIVEPATCH
> +       *(.text.*)
> +#endif

This coming after the "cold" and "unlikely" special sections and
ahead of .fixup isn't very nice. Also from looking at the linker
scripts ld supplies I'm getting the impression that there could/
would then also be e.g. .text.cold.* and .text.unlikely.* which
you'd want to separate.

We may want to put the entry point in a special .text.head, put
that first, and then follow ld in putting cold/unlikely stuff ahead
of main .text.

For the reason given in the description I can see why a conditional
is warranted here. But ...

> @@ -292,6 +295,9 @@ SECTIONS
>         *(.data)
>         *(.data.rel)
>         *(.data.rel.*)
> +#ifdef CONFIG_LIVEPATCH
> +       *(.data.*)
> +#endif
>         CONSTRUCTORS
>    } PHDR(text)
>  
> @@ -308,6 +314,9 @@ SECTIONS
>         . = ALIGN(SMP_CACHE_BYTES);
>         __per_cpu_data_end = .;
>         *(.bss)
> +#ifdef CONFIG_LIVEPATCH
> +       *(.bss.*)
> +#endif

... are these two really in need of being conditional?

> --- a/xen/common/Kconfig
> +++ b/xen/common/Kconfig
> @@ -353,7 +353,9 @@ config CRYPTO
>  config LIVEPATCH
>  	bool "Live patching support"
>  	default X86
> -	depends on "$(XEN_HAS_BUILD_ID)" = "y"
> +	depends on "$(XEN_HAS_BUILD_ID)" = "y" && \
> +	           $(cc-option,-ffunction-sections) && \
> +	           $(cc-option,-fdata-sections)

Is this for certain Clang versions? Gcc has been supporting this in
4.1.x already (didn't check when it was introduced).

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 14:47:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 14:47:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282323.480988 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPQG1-0006Sh-8r; Wed, 02 Mar 2022 14:47:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282323.480988; Wed, 02 Mar 2022 14:47:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPQG1-0006Sa-5j; Wed, 02 Mar 2022 14:47:13 +0000
Received: by outflank-mailman (input) for mailman id 282323;
 Wed, 02 Mar 2022 14:47:11 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LB9Y=TN=citrix.com=prvs=0530a50c4=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nPQFz-0006ST-5W
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 14:47:11 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a25b5400-9a37-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 15:47:09 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a25b5400-9a37-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646232429;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=l2fKHUNR8w4EvUvmQuOSeXQW0vDZjPSA79xur+RTt3Y=;
  b=DP96mbs74YCjZdUO/xFd1RdsqfYwbEo/r9vJAx/d14zVRjactkzbaXyC
   CV1SArjQ/Jf9eja113F6EGktlLrkbM9zRC41GYyHIgEp7Ez0vrVGO0enY
   ATFLV4Wa1kzdfebKjjM4ddfgenjoLtsSU6OWKdngBy3pCx9HI8liK7QEO
   s=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65312074
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:7K5+9arGMsgph6PDNydovq9TJdJeBmIOZRIvgKrLsJaIsI4StFCzt
 garIBmEaPqMZWv3fNh3PYzi8kxU75bWmoJlSAY+rng2RH8R9puZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 Ymq+KUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBNbDRlbsjfVphGHt6HrF+2JPgAlG/rpnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVI1zbWAOxgWZnea67L+cVZzHE7gcUm8fP2O
 ZdCMGA3M0iojxtnH3UsDJ55p72R31rbcTRFj3TWpLc52j2GpOB2+Oe0a4eEEjCQfu1Kmm6Iq
 2SA+H72ajkKOdraxTeb/3aEgu7UgTi9SI8UDKe/9PNhnBuU3GN7IB8cWEa/oPK5olWjQN8ZI
 EsRkhfCtoBrqhbtFIOkGUTl/jjU5XbwRua8DcUx9RyAlZT6oD+SXGwnUgZhRPsFnc8pEGlCO
 kCyo/vlAjlmsbuwQH2b96uJoT7aBRX5PVPudgdfE1JbvoCLTJUby0uWE409SPLdYsjdRGmoq
 w1muhTSkFn6YSQj86ygtW7KjDu3znQiZl5kv16HNo5JA+4QWWJEW2BKwQWDhRqjBNzAJrVkg
 JTis5LEhAzpJcvQ/BFhuM1XQNmUCw+taVUwe2JHEZg77CiK8HW+Z41W6zwWDB43bphdJ2exM
 RGK6Fk5CHpv0J2CN/Ufj2WZUZlC8EQdPY69CqC8giRmOPCdizNrDAkxPBXNjggBYWAnkL0lO
 IfzTCpfJS1yNEiT9xLvH711+eZynkgWnDqPLbimn0XP+efPPxa9FOZaWGZim8hktctoVi2Oq
 I0BXyZLoj0CONDDjt7/qtZCfQhXdiFgXfgbaaV/L4a+H+avI0l4Y9f5yrI9YY112aNTk+bD5
 HamXUFEjlH4gBX6xc+iMxiPtJuHsU5DkE8G
IronPort-HdrOrdr: A9a23:MJgfz6hXZqpj2Chx/Rk5afc70nBQXzh13DAbv31ZSRFFG/FwyP
 rAoB1L73PJYWgqNU3I+ergBEGBKUmskqKdxbNhR4tKOzOWxVdATbsSlrcKpgePJ8SQzJ8+6U
 4NSdkaNDS0NykHsS+Y2njILz9D+qj/zEnAv463pB0MPGJXguNbnn9E426gYzNLrWJ9dPwE/f
 Snl656T23KQwVpUi33PAhMY8Hz4/nw0L72ax8PABAqrCGIkDOT8bb/VzyVxA0XXT9jyaortT
 GtqX2y2oyT99WAjjPM3W7a6Jpb3PPn19t4HcSJzuwYMC/lhAqEbJloH5eCoDc2iuey70tCqq
 iGnz4Qe+BIr1/BdGC8phXgnyHmzTYV8nfnjWSVhHPyyPaJMw4SOo5kv8Z0YxHZ400vsJVXy6
 RQxV+UsJJREFfpgDn9z8KgbWAkqmOE5V4Z1cIDhX1WVoUTLJVLq5YEwU9TGJAcWArn9YEcFv
 V0Bs203ocbTbqjVQGZgoBT+q3tYpxqdS32AXTq+/blngS+pUoJgXfxn6ck7zU9HJFUcegx2w
 2LCNUsqFh0dL5kUUtMPpZwfSKJMB2+ffvtChPlHb21LtBPB5ryw6SHlYndotvaPKA18A==
X-IronPort-AV: E=Sophos;i="5.90,149,1643691600"; 
   d="scan'208";a="65312074"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=TF2wBY0YcSyqQijF9ta4EpDlIrF1BbULCFYzXcZbq2M9puj6CByAh2xZWglTbyRHx/fgeoGqB8NM/XWEjHz0qQ81rmnD+jTmC3Z9ztgqcez/TXt5By8IO2vk7oWtqQ6BsoHOsZ6LQX4qaT4DJ+wcHeTB/BBEA9LrkgeZpCfuFWqyPs+f7PpKmlYJT/Sp/MISRBNkpVRpeVKCw01NiAlLa8PcZplvCLpzBuo1UI/x54AA1UvqAUAATIOqaHd1QXlZ8YVaVMBvrg9l3EGNR3oydFJHKF5LS+pp0whKyCjKolXHkM749/UGWKRpm7TxNaZaYinCl/J8iCiRJVHRN/w89g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Uc4rH5d68sevqwCU4eAMHZW/2LzR/VzyyWf5hgoFskk=;
 b=SlO82EZUJgvgANfIzO5T5as6j/X8Md2Kv64SmwxBMzHUj2EBaj/zOjI0miRFhnyzfvBWfPWkWVWqBoV0R47AZnBmHFBIdqDtIJaE0ul0zREhcxrwGqCTqPLtMyZCK90mX3k7eiXB8EnCI5Fu0zG3QKd8UM7DJbDJyreyiotyYqWFdKgrSXaBuZB5p182LKCUxP0YnG7a5JFCt5Mx82HxU5LBkf8PZJlhXohiIxYkKx9/kEUAN4J7UfEjwBhI7ALU/Nt6o7UdQN5rh5aYewV/jDrnlWxE0NV016nFHb+jSS6KxhL3Iqj5XqJV/Xa42Plh1eBSJiOLPfOxSJX/qMELFg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Uc4rH5d68sevqwCU4eAMHZW/2LzR/VzyyWf5hgoFskk=;
 b=pq8iZ1C+WUkk/Ihq67HQGLKpvlBVfvVGkSiL4P/Ko7+iU6xKMNn/DyrQvtER3YjPpSNUHXSAYZR453DDYuedtxreeSncw+34PA/DFozm/IMgDeCr1zQmK9UlPUplx9WrBzj0e3wmu3/cpyLDlDdh0T/8Aa8xrztwQDiPoPe2LIU=
Date: Wed, 2 Mar 2022 15:46:56 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Andrew
 Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH] x86: drop use of CONSTRUCTORS from linker script
Message-ID: <Yh+DYGHtPHA/3qVH@Air-de-Roger>
References: <1791edb8-030f-1009-c392-ce793baace5a@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <1791edb8-030f-1009-c392-ce793baace5a@suse.com>
X-ClientProxiedBy: LO4P123CA0219.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:1a6::8) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f51223b7-429d-4e3c-67a9-08d9fc5b82b4
X-MS-TrafficTypeDiagnostic: BN7PR03MB3586:EE_
X-Microsoft-Antispam-PRVS: <BN7PR03MB3586618E5D15B841FEB359F18F039@BN7PR03MB3586.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(38100700002)(2906002)(6512007)(9686003)(82960400001)(6506007)(33716001)(186003)(26005)(6916009)(54906003)(316002)(8936002)(4326008)(8676002)(6486002)(66476007)(85182001)(508600001)(66946007)(66556008)(6666004)(4744005)(86362001)(5660300002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?U2Q3UjdpODcySyt5RWN1NXNkemovWE9pWUFOTUE5TVFmYk0xazFwL0ZRaEtB?=
 =?utf-8?B?NUFxQ0FmTzNJbGRrdDh6bmRLd3V2MFY3VzY0cWNMb3NHMmpMYmExU0VXRnJQ?=
 =?utf-8?B?TDFzUk9RNjdqTXpRaEVlUm9QOXBWdVhaTDVlT2p3OE4rT0xvbytWMzZZdkxm?=
 =?utf-8?B?U0JDd21UR1pvbEY0Y1kvMVNOR2cxUElQZklMZUg4bk9UbXhlTmFVUnRuVU5s?=
 =?utf-8?B?QXh0Y3lSZkJnZk5UWDhKTjRTN2dxeHBEUHgrM0gxQWtVVk94K2tXNjBMeU5G?=
 =?utf-8?B?aW5IWUMwWWRJaG1SZWR1c2dEWTFDalpHMTU3dlRwNENhRHptZ2xSWVFlSGw3?=
 =?utf-8?B?U2U2K1VINTY5SWwzYzRWeDkzUXRJY2VBRGNDbkZTTWZiTVFPN1Z4TnRHNnNG?=
 =?utf-8?B?MW1uN2RKa25iVE94dG56WXcvWmg0SGpkSnVvUytCQ2VjS1ByWTJkeDRxY3BL?=
 =?utf-8?B?YlJJOWJnUmZpZm1MWU0rWUkyWFIwMTF6L0EyTkxFTFM1Q0JlclpnanJjOURE?=
 =?utf-8?B?LzY0eGZVUWhNOFdWSUlWTi9hYTM1dTZnc3l4MS9yZEg5UTdJcEltVG9oNTFD?=
 =?utf-8?B?SGpxOUV1SnUybG1WaWIxdVBiRCtqb2FnNUNwdWlLMXlFbjh5Q1B1cmZobTln?=
 =?utf-8?B?cmZlOHNNWjBaUWZsaGJ5UXU0Z2lTVWlZWU1tUXZKUmtHZjIvMHFzSTJRci9M?=
 =?utf-8?B?TlRZc1hrMFZKelE2QllEMnYyaDM1UUZFZUd0S3VVVmNaZ2VkT0oydDcvdWI4?=
 =?utf-8?B?RWROQTFqN05RVmV4aVl2eFpPTWdMbituSVZ6NXBQZkJHQm1ZMDM3Y2tiQVB2?=
 =?utf-8?B?Z2JxTnI1bmRVS1Q3TURVVlZBbTVDZFJsa0VXWVVzUVlpZ01kQ0l6SzhjNjly?=
 =?utf-8?B?MW5MZ1RjaFoyMXZFUFozTU5naTlIOEtFWFVnVUtOYjJ4MWdOS210QzJyTjV1?=
 =?utf-8?B?WmZKVEtqVzQ5ZVRRL2RSZlFyVnFiVXJ2LytGU1c3RmtOdnBrZCtoRWsxQXZH?=
 =?utf-8?B?ajR5OHpPTjJqRW1ST1FUbkVHWnRLZ2dTR2FFNzZhcnhZZVJmMWJuNGhKSTZh?=
 =?utf-8?B?L3BBRHcrYnZBTi91OEE4bmNjbytqNmpCNlFLd0FDK2N0dUoxSUp3OGo4c2Yr?=
 =?utf-8?B?QjhFVWFPTkN2UFdodHNuVzBtRFVXbm1LYlpIOUw3c1gvNGJ6MEpGTEk3RTdv?=
 =?utf-8?B?SEVDMWtEWmFCU3ZuMnBuTmswZXVvQjBPV2pKQTFyL2Q4TFQ2UzJDY2lIT2tz?=
 =?utf-8?B?RlowQUpSU0xSMVNlOUV4OEN6Vm9ObnNxMHNTYU95ckNOUW1xQVFVSHR0Z2JC?=
 =?utf-8?B?S2FmOTAzT0dHelFERzlFbVZzRnZRbWJUUm9BZzNvR0JhM2lMVTRvR1pwQm94?=
 =?utf-8?B?MWtxMkh4cHFOcTZhamJVaVFRRUNCQ3k1SFZGSkZYcDBLV2pGdWhsempKT2JQ?=
 =?utf-8?B?UFhNbzBUaEVCMHdKSE0zd2JMNEVBYU1CMnBzaE5ISkFtYkd0MWh1TFBXQnR0?=
 =?utf-8?B?NHl4d0h0MC9uOWxVYVFIU0wwWitLNnpaQzU0YjV4K0dyaFNKcERNcTkvVzhn?=
 =?utf-8?B?cTZpS1VXN0pUOWNramh3Q0NRTjhNSTBkNnpLZFpMU1l2U0lUN2hWUEVVbTQv?=
 =?utf-8?B?cGV2TVVRUXdJS3h3QlhMYWQ3VzBlY2lxZTZ4M2lVSDNMU3ZWOGdUcVlRNWpE?=
 =?utf-8?B?UGthTFRMZ09xdUFiUnBNSitYb1hiazlUbDhDK01wc2l2VlJwTmVwS2cxL1VM?=
 =?utf-8?B?T0E1alNSRG5tb3B0TVNKcFN5SWIvUnE1eGtiVGFPMzdqOEJVQkpGRGNLeWVt?=
 =?utf-8?B?OWpRd0ljS0drWVlBQlUrd3FWY2lIQTdFRXk2QXRFZFlIb2xhV2QxRGZGRFBR?=
 =?utf-8?B?M1ZBVjlib01Jd0h0SEJqajlpRUZmUlJKWkFsQzVXM0padFRCcnArNnRRL0V4?=
 =?utf-8?B?RjBvcjllWUFRMkVHOW5qbHZ5YTVwQWlzZHQ0d1N2QWhJcmFINUJ3TUNzUzE4?=
 =?utf-8?B?c2g4UkdlbGVtS08wblpzUFgxNmRING95eUllYzJnTkZ5QzB2R1NMQmZDUkpp?=
 =?utf-8?B?R05qV1VzZUpuZmU4Syt0RVEvYzNqSlBXZWhkRzdlNHRMUHIybWFxbGx0eXRw?=
 =?utf-8?B?Smo1dmx1bXBqeDEzZVB2NVRSNERRbWg4aWEyVE9VVGEyVUZucW5UZWxMUm0y?=
 =?utf-8?Q?xL8oYMuVx8n9xkTDMDvDub0=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: f51223b7-429d-4e3c-67a9-08d9fc5b82b4
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 14:47:01.5813
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: kQ9w+R8qRrUFEEjV+hNlisAhho7FbV+bCWSVwm/okFpcwIqkXAyJ5qeUsfNt85/YRC+GedoqJGvFvr//OldpmA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN7PR03MB3586
X-OriginatorOrg: citrix.com

On Wed, Mar 02, 2022 at 03:15:29PM +0100, Jan Beulich wrote:
> Current binutils document this for use by a.out only. Plus we deal with
> .ctors and alike sections elsewhere in the script anyway.
> 
> Signed-off-by: Jan Beulich <jbeulich@suse.com>

Acked-by: Roger Pau Monné <roger.pau@citrix.com>

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 15:01:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 15:01:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282330.480999 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPQU3-0000bB-He; Wed, 02 Mar 2022 15:01:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282330.480999; Wed, 02 Mar 2022 15:01:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPQU3-0000b4-Ec; Wed, 02 Mar 2022 15:01:43 +0000
Received: by outflank-mailman (input) for mailman id 282330;
 Wed, 02 Mar 2022 15:01:41 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=alt7=TN=citrix.com=prvs=053475f8d=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nPQU1-0000as-Dt
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 15:01:41 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a9127ac9-9a39-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 16:01:40 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a9127ac9-9a39-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646233300;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=5KcxhijTDRSq6JWWwTlcwnD9VXMmCwU9rJErCFz1CI0=;
  b=W+laNnovRASbArDK1Bs7v0xAxuXdbNgp99kM8mVKhkgHDcRAR08/nF7K
   /gZvohof0Qn3k8EeHaVxg0DOD5OOVzNWpXAA/DHn0nPiAeVahlEJPJkdp
   b3iR8D2+asqZGqNzY61YIuNCXRmBrKYygRhBjjB0xCCVCcUS6WGZjNHWq
   Y=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 64766513
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:nkfro6+Ww23y4RDBtJTEDrUD5H6TJUtcMsCJ2f8bNWPcYEJGY0x3y
 zBOXG6Ba/vZN2fwfY12O42yoENT78LVmoJhHQZl+yw8E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oDjW1jlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCna2bSEQuIrPgpLgYTyFDOS1gbZdUo5aSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFKEWvHwm6DjdBPIvR53rSKTW/95Imjw3g6iiGN6AO
 5VHN2c2N3wsZTUVOmU6Us4guduUjyjSVRdXtHvPpu04tj27IAtZj+G2bYu9lsaxbdVYmAOUq
 3zL+0z9AwoGL5qPxDyd6HWui+TT2yThV+ov+KaQr6AwxgfJnypKVUNQBQDTTeSFZlCWavlea
 EsI5AYS8a0uzFeBQsetZQ/jiSvR1vIDYOZ4H+o/4QCL76Pb5QeFG2QJJgJ8hMwaWNweHmJzi
 ALQ9z/9LXk26eDOFyrBnluBhW7qYUAowXk+iTjopOfvy/3qu8kNgx3GVb6P+4bl34SuSVkcL
 91nxRXSZon/b+ZWj81XHnid2lpAQ6QlqCZvvG07uUr/s2tEiHaNPdDA1LQixa8owHylZleAp
 mMYvMOV8foDC5qA/ATUHrlTRe/xv6fbaWyG6bKKI3XH3273k5JEVdoNiAyS2W8zappUEdMXS
 BW7VfxtCG97YyLxMP4fj3OZAMU216nwfekJpdiPBueilqNZLVfdlAk3PBb49zm0zCAEzPFuU
 b/GIJ3EJStLVsxaIM+eGr51PUkDnXtlmws+hPnTknya7FZpTCXNGOddbQDXNbhRAWHtiFy9z
 uuz/vCik313ONASqAGMmWLPBTjm9UQGOK0=
IronPort-HdrOrdr: A9a23:48gkAK7sq8gn1GfzDwPXwMTXdLJyesId70hD6qhwISY6TiX+rb
 HIoB17726RtN9/YhEdcLy7VJVoIkmskKKdg7NhXotKNTOO0ADDQb2KhbGSpQEIcBeeygcy78
 hdmtBFeb/NMWQ=
X-IronPort-AV: E=Sophos;i="5.90,149,1643691600"; 
   d="scan'208";a="64766513"
From: Jane Malalane <jane.malalane@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Jane Malalane <jane.malalane@citrix.com>
Subject: [PATCH v4 0/2] xen: Report and use hardware APIC virtualization capabilities
Date: Wed, 2 Mar 2022 15:00:54 +0000
Message-ID: <20220302150056.14381-1-jane.malalane@citrix.com>
X-Mailer: git-send-email 2.11.0
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

Jane Malalane (2):
  xen+tools: Report Interrupt Controller Virtualization capabilities on
    x86
  x86/xen: Allow per-domain usage of hardware virtualized APIC

 docs/man/xl.cfg.5.pod.in                | 19 ++++++++++++++++
 docs/man/xl.conf.5.pod.in               | 12 ++++++++++
 tools/golang/xenlight/helpers.gen.go    | 16 +++++++++++++
 tools/golang/xenlight/types.gen.go      |  4 ++++
 tools/include/libxl.h                   | 14 ++++++++++++
 tools/libs/light/libxl.c                |  3 +++
 tools/libs/light/libxl_arch.h           |  9 ++++++--
 tools/libs/light/libxl_arm.c            | 12 ++++++++--
 tools/libs/light/libxl_create.c         | 22 ++++++++++--------
 tools/libs/light/libxl_types.idl        |  4 ++++
 tools/libs/light/libxl_x86.c            | 39 ++++++++++++++++++++++++++++++--
 tools/ocaml/libs/xc/xenctrl.ml          |  7 ++++++
 tools/ocaml/libs/xc/xenctrl.mli         |  7 ++++++
 tools/ocaml/libs/xc/xenctrl_stubs.c     | 16 +++++++++----
 tools/xl/xl.c                           |  8 +++++++
 tools/xl/xl.h                           |  2 ++
 tools/xl/xl_info.c                      |  6 +++--
 tools/xl/xl_parse.c                     | 16 +++++++++++++
 xen/arch/x86/domain.c                   | 28 ++++++++++++++++++++++-
 xen/arch/x86/hvm/vmx/vmcs.c             | 14 ++++++++++++
 xen/arch/x86/hvm/vmx/vmx.c              | 40 +++++++++++++--------------------
 xen/arch/x86/include/asm/domain.h       |  3 +++
 xen/arch/x86/include/asm/hvm/domain.h   |  6 +++++
 xen/arch/x86/include/asm/hvm/vmx/vmcs.h |  3 +++
 xen/arch/x86/sysctl.c                   |  7 ++++++
 xen/arch/x86/traps.c                    |  6 ++---
 xen/include/public/arch-x86/xen.h       |  2 ++
 xen/include/public/sysctl.h             | 11 ++++++++-
 28 files changed, 285 insertions(+), 51 deletions(-)

-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 15:01:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 15:01:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282332.481022 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPQU5-000174-8D; Wed, 02 Mar 2022 15:01:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282332.481022; Wed, 02 Mar 2022 15:01:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPQU5-00016x-4N; Wed, 02 Mar 2022 15:01:45 +0000
Received: by outflank-mailman (input) for mailman id 282332;
 Wed, 02 Mar 2022 15:01:44 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=alt7=TN=citrix.com=prvs=053475f8d=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nPQU3-0000ay-JO
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 15:01:43 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a8f740e1-9a39-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 16:01:39 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a8f740e1-9a39-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646233300;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=dLkO0tmIaYPJe2fT+HcfrZyx5zmyRYHHcDp5UxV8Npg=;
  b=MUv2czl9OJdRPGmqBhVtjZpVA75eE7EeZqpLgCsfq/lE94Fs+xUG12hA
   ivQST79t3gJSycOiTPphjJ4xouzvLyt/vj2ORXZb27hEICxyyhhPAKqSC
   yC9ZsRWQgYTG8MkNuu8DG1RJfi/2l6lW2+fz+KIDfQHepg5SecDEc3dhL
   I=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 67621795
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:LYTCGaIO2qMHdqnxFE+RM5UlxSXFcZb7ZxGr2PjKsXjdYENS0jYGn
 2EYCm7UPPbYYGPyKd8lO4S0/R5XvpLczd9mGwNlqX01Q3x08seUXt7xwmUcns+xwm8vaGo9s
 q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUYYoAQgsA148IMsdoUg7wbRh2dYy2YPR7z6l4
 rseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3fMldG0DQUIhMdtNWc
 s6YpF2PEsE1yD92Yj+tuu6TnkTn2dc+NyDW4pZdc/DKbhSvOkXee0v0XRYRQR4/ttmHozx+4
 Nxhk8C/aFYiBL/rg79HeQNYPT9nJqITrdcrIVDn2SCS50jPcn+qyPRyFkAme4Yf/46bA0kXq
 6ZecmpUKEne2aTmm9pXScE17ignBOviOo5Zn3hkxDXQC/sOSpHfWaTao9Rf2V/cg+gQQqiEP
 pVINFKDajzPSj5dORAWJ6sDxsiYjXXSdj1ToUi88P9fD2/7k1UqjemF3MDuUseRWcxfk0Kcp
 2TH12f0GBcXMJqY0zXt2nCxgu7CmwvrVYRUE6e3ntZUh1mUyn0WGQchf1KxqvmkiWazQ9tab
 UcT/0IGoaEs+WSxQ9L6Xhn+p2SL1jYeVMBXCPYS8xyWx+zf5APxLngJSHtNZcIrsOcyRCc2z
 RmZktXxHzttvbaJD3WH+d+8sjeaKSUTa2gYakcsTwEI/t3iq4EblQ/UQ5BoF6vdszHuMWium
 XbQ9nF43uhNy55Qv0mmwbzZqzuAgMTGb18+3BfwRTn/xBl5SpC8fIP9vDA38s18BIqeS1CAu
 l0NlM6f8P0CAPmxqcCdfAkeNOr3vqjYaVUwlXYqRsB8rGr1pxZPaKgNuGkWGat/DioTldYFi
 mf3sBgZ2pJcNWDCgURfM9PoUJRCIUQN+L3YuhHogjhmP8AZmOyvpngGiausM4bFyhJEfUYXY
 8rzTCpUJSxGYZmLNRLvLwvn7Zclxzol2UTYTo3hwhKs3NK2PSDJF+5baAPfMLlotstoRTk5F
 f4FbaNmLD0FDYXDjtT/q9ZPfTjm01BhbXwJlyCnXrHaeVc3cI3QI/TQ3akga+RYc1d9zY/1E
 oWGchYAkjLX3CSfQS3TMywLQO6/DP5X8CNgVQRxbAnA5pTWSdv2hEvpX8BsJudPGS0K5aMcc
 sTpjO3bWqUfEmmcom9FBXQ/xaQ7HCmWacu1F3LNSFACk1RIHl2hFgPMFuc3yBQzMw==
IronPort-HdrOrdr: A9a23:NFLOf6NsO3zrIMBcTvmjsMiBIKoaSvp037Eqv3oedfUzSL3gqy
 nOpoV86faaslYssR0b9exofZPwJE80lqQFhrX5X43SPzUO0VHAROoJgLcKgQeQfxEWntQtrZ
 uIGJIeNDSfNzdHZL7BkWuFL+o=
X-IronPort-AV: E=Sophos;i="5.90,149,1643691600"; 
   d="scan'208";a="67621795"
From: Jane Malalane <jane.malalane@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Jane Malalane <jane.malalane@citrix.com>, Wei Liu <wl@xen.org>, "Anthony
 PERARD" <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien Grall
	<julien@xen.org>, "Stefano Stabellini" <sstabellini@kernel.org>, Christian
 Lindig <christian.lindig@citrix.com>, David Scott <dave@recoil.org>,
	"Volodymyr Babchuk" <Volodymyr_Babchuk@epam.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>
Subject: [PATCH v4 2/2] x86/xen: Allow per-domain usage of hardware virtualized APIC
Date: Wed, 2 Mar 2022 15:00:56 +0000
Message-ID: <20220302150056.14381-3-jane.malalane@citrix.com>
X-Mailer: git-send-email 2.11.0
In-Reply-To: <20220302150056.14381-1-jane.malalane@citrix.com>
References: <20220302150056.14381-1-jane.malalane@citrix.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

Introduce a new per-domain creation x86 specific flag to
select whether hardware assisted virtualization should be used for
x{2}APIC.

A per-domain option is added to xl in order to select the usage of
x{2}APIC hardware assisted vitualization, as well as a global
configuration option.

Having all APIC interaction exit to Xen for emulation is slow and can
induce much overhead. Hardware can speed up x{2}APIC by decoding the
APIC access and providing a VM exit with a more specific exit reason
than a regular EPT fault or by altogether avoiding a VM exit.

On the other hand, being able to disable x{2}APIC hardware assisted
vitualization can be useful for testing and debugging purposes.

Note:

- vmx_install_vlapic_mapping doesn't require modifications regardless
  of whether the guest has "Virtualize APIC accesses" enabled or not,
  i.e., setting the the APIC_ACCESS_ADDR VMCS field is fine so long as
  virtualize_apic_accesses is supported by the CPU.

- XEN_HVM_CPUID_XAPIC_VIRT will now also depend on HW supporting
  virtualize_apic_accesses but this addition has no effect since
  apic_reg_virt support, which is currently a requirement for setting
  this CPUID bit, without virtualize_apic_accesses has no effect on
  xAPIC accesses anyway.

Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Jane Malalane <jane.malalane@citrix.com>
---
CC: Wei Liu <wl@xen.org>
CC: Anthony PERARD <anthony.perard@citrix.com>
CC: Juergen Gross <jgross@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>
CC: George Dunlap <george.dunlap@citrix.com>
CC: Jan Beulich <jbeulich@suse.com>
CC: Julien Grall <julien@xen.org>
CC: Stefano Stabellini <sstabellini@kernel.org>
CC: Christian Lindig <christian.lindig@citrix.com>
CC: David Scott <dave@recoil.org>
CC: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
CC: "Roger Pau Monné" <roger.pau@citrix.com>

v4:
 * Add has_assisted_x{2}apic macros and use them where appropriate
 * Replace CPU checks with per-domain assisted_x{2}apic control
   options in vmx_vlapic_msr_changed() and cpuid_hypervisor_leaves(),
   following edits to assisted_x{2}apic_available definitions in
   patch 1
   Note: new assisted_x{2}apic_available definitions make later
   cpu_has_vmx_apic_reg_virt and cpu_has_vmx_virtual_intr_delivery
   checks redundant in vmx_vlapic_msr_changed()

v3:
 * Change info in xl.cfg to better express reality and fix
   capitalization of x{2}apic
 * Move "physinfo" variable definition to the beggining of
   libxl__domain_build_info_setdefault()
 * Reposition brackets in if statement to match libxl coding style
 * Shorten logic in libxl__arch_domain_build_info_setdefault()
 * Correct dprintk message in arch_sanitise_domain_config()
 * Make appropriate changes in vmx_vlapic_msr_changed() and
   cpuid_hypervisor_leaves() for amended "assisted_x2apic" bit
 * Remove unneeded parantheses

v2:
 * Add a LIBXL_HAVE_ASSISTED_APIC macro
 * Pass xcpyshinfo as a pointer in libxl__arch_get_physinfo
 * Add a return statement in now "int"
   libxl__arch_domain_build_info_setdefault()
 * Preserve libxl__arch_domain_build_info_setdefault 's location in
   libxl_create.c
 * Correct x{2}apic default setting logic in
   libxl__arch_domain_prepare_config()
 * Correct logic for parsing assisted_x{2}apic host/guest options in
   xl_parse.c and initialize them to -1 in xl.c
 * Use guest options directly in vmx_vlapic_msr_changed
 * Fix indentation of bool assisted_x{2}apic in struct hvm_domain
 * Add a change in xenctrl_stubs.c to pass xenctrl ABI checks
---
 docs/man/xl.cfg.5.pod.in                | 19 ++++++++++++++++
 docs/man/xl.conf.5.pod.in               | 12 ++++++++++
 tools/golang/xenlight/helpers.gen.go    | 12 ++++++++++
 tools/golang/xenlight/types.gen.go      |  2 ++
 tools/include/libxl.h                   |  7 ++++++
 tools/libs/light/libxl_arch.h           |  5 +++--
 tools/libs/light/libxl_arm.c            |  7 ++++--
 tools/libs/light/libxl_create.c         | 22 +++++++++++--------
 tools/libs/light/libxl_types.idl        |  2 ++
 tools/libs/light/libxl_x86.c            | 28 +++++++++++++++++++++--
 tools/ocaml/libs/xc/xenctrl.ml          |  2 ++
 tools/ocaml/libs/xc/xenctrl.mli         |  2 ++
 tools/ocaml/libs/xc/xenctrl_stubs.c     |  2 +-
 tools/xl/xl.c                           |  8 +++++++
 tools/xl/xl.h                           |  2 ++
 tools/xl/xl_parse.c                     | 16 ++++++++++++++
 xen/arch/x86/domain.c                   | 28 ++++++++++++++++++++++-
 xen/arch/x86/hvm/vmx/vmcs.c             |  4 ++++
 xen/arch/x86/hvm/vmx/vmx.c              | 39 +++++++++++++--------------------
 xen/arch/x86/include/asm/hvm/domain.h   |  6 +++++
 xen/arch/x86/include/asm/hvm/vmx/vmcs.h |  3 +++
 xen/arch/x86/traps.c                    |  6 ++---
 xen/include/public/arch-x86/xen.h       |  2 ++
 23 files changed, 191 insertions(+), 45 deletions(-)

diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in
index b98d161398..dcca564a23 100644
--- a/docs/man/xl.cfg.5.pod.in
+++ b/docs/man/xl.cfg.5.pod.in
@@ -1862,6 +1862,25 @@ firmware tables when using certain older guest Operating
 Systems. These tables have been superseded by newer constructs within
 the ACPI tables.
 
+=item B<assisted_xapic=BOOLEAN>
+
+B<(x86 only)> Enables or disables hardware assisted virtualization for
+xAPIC. With this option enabled, a memory-mapped APIC access will be
+decoded by hardware and either issue a more specific VM exit than just
+an EPT fault, or altogether avoid a VM exit. Notice full
+virtualization for xAPIC can only be achieved if hardware supports
+“APIC-register virtualization” and “virtual-interrupt delivery”. The
+default is settable via L<xl.conf(5)>.
+
+=item B<assisted_x2apic=BOOLEAN>
+
+B<(x86 only)> Enables or disables hardware assisted virtualization for
+x2APIC. With this option enabled, an MSR-Based APIC access will
+either issue a VM exit or altogether avoid one. Notice full
+virtualization for x2APIC can only be achieved if hardware supports
+“APIC-register virtualization” and “virtual-interrupt delivery”. The
+default is settable via L<xl.conf(5)>.
+
 =item B<nx=BOOLEAN>
 
 B<(x86 only)> Hides or exposes the No-eXecute capability. This allows a guest
diff --git a/docs/man/xl.conf.5.pod.in b/docs/man/xl.conf.5.pod.in
index df20c08137..95d136d1ea 100644
--- a/docs/man/xl.conf.5.pod.in
+++ b/docs/man/xl.conf.5.pod.in
@@ -107,6 +107,18 @@ Sets the default value for the C<max_grant_version> domain config value.
 
 Default: maximum grant version supported by the hypervisor.
 
+=item B<assisted_xapic=BOOLEAN>
+
+If enabled, domains will use xAPIC hardware assisted virtualization by default.
+
+Default: enabled if supported.
+
+=item B<assisted_x2apic=BOOLEAN>
+
+If enabled, domains will use x2APIC hardware assisted virtualization by default.
+
+Default: enabled if supported.
+
 =item B<vif.default.script="PATH">
 
 Configures the default hotplug script used by virtual network devices.
diff --git a/tools/golang/xenlight/helpers.gen.go b/tools/golang/xenlight/helpers.gen.go
index dd4e6c9f14..dece545ee0 100644
--- a/tools/golang/xenlight/helpers.gen.go
+++ b/tools/golang/xenlight/helpers.gen.go
@@ -1120,6 +1120,12 @@ x.ArchArm.Vuart = VuartType(xc.arch_arm.vuart)
 if err := x.ArchX86.MsrRelaxed.fromC(&xc.arch_x86.msr_relaxed);err != nil {
 return fmt.Errorf("converting field ArchX86.MsrRelaxed: %v", err)
 }
+if err := x.ArchX86.AssistedXapic.fromC(&xc.arch_x86.assisted_xapic);err != nil {
+return fmt.Errorf("converting field ArchX86.AssistedXapic: %v", err)
+}
+if err := x.ArchX86.AssistedX2Apic.fromC(&xc.arch_x86.assisted_x2apic);err != nil {
+return fmt.Errorf("converting field ArchX86.AssistedX2Apic: %v", err)
+}
 x.Altp2M = Altp2MMode(xc.altp2m)
 x.VmtraceBufKb = int(xc.vmtrace_buf_kb)
 if err := x.Vpmu.fromC(&xc.vpmu);err != nil {
@@ -1605,6 +1611,12 @@ xc.arch_arm.vuart = C.libxl_vuart_type(x.ArchArm.Vuart)
 if err := x.ArchX86.MsrRelaxed.toC(&xc.arch_x86.msr_relaxed); err != nil {
 return fmt.Errorf("converting field ArchX86.MsrRelaxed: %v", err)
 }
+if err := x.ArchX86.AssistedXapic.toC(&xc.arch_x86.assisted_xapic); err != nil {
+return fmt.Errorf("converting field ArchX86.AssistedXapic: %v", err)
+}
+if err := x.ArchX86.AssistedX2Apic.toC(&xc.arch_x86.assisted_x2apic); err != nil {
+return fmt.Errorf("converting field ArchX86.AssistedX2Apic: %v", err)
+}
 xc.altp2m = C.libxl_altp2m_mode(x.Altp2M)
 xc.vmtrace_buf_kb = C.int(x.VmtraceBufKb)
 if err := x.Vpmu.toC(&xc.vpmu); err != nil {
diff --git a/tools/golang/xenlight/types.gen.go b/tools/golang/xenlight/types.gen.go
index 87be46c745..253c9ad93d 100644
--- a/tools/golang/xenlight/types.gen.go
+++ b/tools/golang/xenlight/types.gen.go
@@ -520,6 +520,8 @@ Vuart VuartType
 }
 ArchX86 struct {
 MsrRelaxed Defbool
+AssistedXapic Defbool
+AssistedX2Apic Defbool
 }
 Altp2M Altp2MMode
 VmtraceBufKb int
diff --git a/tools/include/libxl.h b/tools/include/libxl.h
index 94e6355822..cdcccd6d01 100644
--- a/tools/include/libxl.h
+++ b/tools/include/libxl.h
@@ -535,6 +535,13 @@
 #define LIBXL_HAVE_PHYSINFO_ASSISTED_APIC 1
 
 /*
+ * LIBXL_HAVE_ASSISTED_APIC indicates that libxl_domain_build_info has
+ * assisted_xapic and assisted_x2apic fields for enabling hardware
+ * assisted virtualization for x{2}apic per domain.
+ */
+#define LIBXL_HAVE_ASSISTED_APIC 1
+
+/*
  * libxl ABI compatibility
  *
  * The only guarantee which libxl makes regarding ABI compatibility
diff --git a/tools/libs/light/libxl_arch.h b/tools/libs/light/libxl_arch.h
index 207ceac6a1..03b89929e6 100644
--- a/tools/libs/light/libxl_arch.h
+++ b/tools/libs/light/libxl_arch.h
@@ -71,8 +71,9 @@ void libxl__arch_domain_create_info_setdefault(libxl__gc *gc,
                                                libxl_domain_create_info *c_info);
 
 _hidden
-void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
-                                              libxl_domain_build_info *b_info);
+int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
+                                             libxl_domain_build_info *b_info,
+                                             const libxl_physinfo *physinfo);
 
 _hidden
 int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
diff --git a/tools/libs/light/libxl_arm.c b/tools/libs/light/libxl_arm.c
index 39fdca1b49..ba5b8f433f 100644
--- a/tools/libs/light/libxl_arm.c
+++ b/tools/libs/light/libxl_arm.c
@@ -1384,8 +1384,9 @@ void libxl__arch_domain_create_info_setdefault(libxl__gc *gc,
     }
 }
 
-void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
-                                              libxl_domain_build_info *b_info)
+int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
+                                             libxl_domain_build_info *b_info,
+                                             const libxl_physinfo *physinfo)
 {
     /* ACPI is disabled by default */
     libxl_defbool_setdefault(&b_info->acpi, false);
@@ -1399,6 +1400,8 @@ void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
     memset(&b_info->u, '\0', sizeof(b_info->u));
     b_info->type = LIBXL_DOMAIN_TYPE_INVALID;
     libxl_domain_build_info_init_type(b_info, LIBXL_DOMAIN_TYPE_PVH);
+
+    return 0;
 }
 
 int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
diff --git a/tools/libs/light/libxl_create.c b/tools/libs/light/libxl_create.c
index 15ed021f41..88d08d7277 100644
--- a/tools/libs/light/libxl_create.c
+++ b/tools/libs/light/libxl_create.c
@@ -75,6 +75,7 @@ int libxl__domain_build_info_setdefault(libxl__gc *gc,
                                         libxl_domain_build_info *b_info)
 {
     int i, rc;
+    libxl_physinfo info;
 
     if (b_info->type != LIBXL_DOMAIN_TYPE_HVM &&
         b_info->type != LIBXL_DOMAIN_TYPE_PV &&
@@ -264,7 +265,18 @@ int libxl__domain_build_info_setdefault(libxl__gc *gc,
     if (!b_info->event_channels)
         b_info->event_channels = 1023;
 
-    libxl__arch_domain_build_info_setdefault(gc, b_info);
+    rc = libxl_get_physinfo(CTX, &info);
+    if (rc) {
+        LOG(ERROR, "failed to get hypervisor info");
+        return rc;
+    }
+
+    rc = libxl__arch_domain_build_info_setdefault(gc, b_info, &info);
+    if (rc) {
+        LOG(ERROR, "unable to set domain arch build info defaults");
+        return rc;
+    }
+
     libxl_defbool_setdefault(&b_info->dm_restrict, false);
 
     if (b_info->iommu_memkb == LIBXL_MEMKB_DEFAULT)
@@ -457,14 +469,6 @@ int libxl__domain_build_info_setdefault(libxl__gc *gc,
     }
 
     if (b_info->max_grant_version == LIBXL_MAX_GRANT_DEFAULT) {
-        libxl_physinfo info;
-
-        rc = libxl_get_physinfo(CTX, &info);
-        if (rc) {
-            LOG(ERROR, "failed to get hypervisor info");
-            return rc;
-        }
-
         if (info.cap_gnttab_v2)
             b_info->max_grant_version = 2;
         else if (info.cap_gnttab_v1)
diff --git a/tools/libs/light/libxl_types.idl b/tools/libs/light/libxl_types.idl
index 42ac6c357b..db5eb0a0b3 100644
--- a/tools/libs/light/libxl_types.idl
+++ b/tools/libs/light/libxl_types.idl
@@ -648,6 +648,8 @@ libxl_domain_build_info = Struct("domain_build_info",[
                                ("vuart", libxl_vuart_type),
                               ])),
     ("arch_x86", Struct(None, [("msr_relaxed", libxl_defbool),
+                               ("assisted_xapic", libxl_defbool),
+                               ("assisted_x2apic", libxl_defbool),
                               ])),
     # Alternate p2m is not bound to any architecture or guest type, as it is
     # supported by x86 HVM and ARM support is planned.
diff --git a/tools/libs/light/libxl_x86.c b/tools/libs/light/libxl_x86.c
index e0a06ecfe3..c377d13b19 100644
--- a/tools/libs/light/libxl_x86.c
+++ b/tools/libs/light/libxl_x86.c
@@ -23,6 +23,14 @@ int libxl__arch_domain_prepare_config(libxl__gc *gc,
     if (libxl_defbool_val(d_config->b_info.arch_x86.msr_relaxed))
         config->arch.misc_flags |= XEN_X86_MSR_RELAXED;
 
+    if (d_config->c_info.type != LIBXL_DOMAIN_TYPE_PV)
+    {
+        if (libxl_defbool_val(d_config->b_info.arch_x86.assisted_xapic))
+            config->arch.misc_flags |= XEN_X86_ASSISTED_XAPIC;
+
+        if (libxl_defbool_val(d_config->b_info.arch_x86.assisted_x2apic))
+            config->arch.misc_flags |= XEN_X86_ASSISTED_X2APIC;
+    }
     return 0;
 }
 
@@ -819,11 +827,27 @@ void libxl__arch_domain_create_info_setdefault(libxl__gc *gc,
 {
 }
 
-void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
-                                              libxl_domain_build_info *b_info)
+int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
+                                             libxl_domain_build_info *b_info,
+                                             const libxl_physinfo *physinfo)
 {
     libxl_defbool_setdefault(&b_info->acpi, true);
     libxl_defbool_setdefault(&b_info->arch_x86.msr_relaxed, false);
+
+    if (b_info->type != LIBXL_DOMAIN_TYPE_PV) {
+        libxl_defbool_setdefault(&b_info->arch_x86.assisted_xapic,
+                             physinfo->cap_assisted_xapic);
+        libxl_defbool_setdefault(&b_info->arch_x86.assisted_x2apic,
+                             physinfo->cap_assisted_x2apic);
+    }
+
+    else if (!libxl_defbool_is_default(b_info->arch_x86.assisted_xapic) ||
+             !libxl_defbool_is_default(b_info->arch_x86.assisted_x2apic)) {
+        LOG(ERROR, "Interrupt Controller Virtualization not supported for PV");
+        return ERROR_INVAL;
+    }
+
+    return 0;
 }
 
 int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
diff --git a/tools/ocaml/libs/xc/xenctrl.ml b/tools/ocaml/libs/xc/xenctrl.ml
index 21783d3622..672a11ceb6 100644
--- a/tools/ocaml/libs/xc/xenctrl.ml
+++ b/tools/ocaml/libs/xc/xenctrl.ml
@@ -50,6 +50,8 @@ type x86_arch_emulation_flags =
 
 type x86_arch_misc_flags =
 	| X86_MSR_RELAXED
+	| X86_ASSISTED_XAPIC
+	| X86_ASSISTED_X2APIC
 
 type xen_x86_arch_domainconfig =
 {
diff --git a/tools/ocaml/libs/xc/xenctrl.mli b/tools/ocaml/libs/xc/xenctrl.mli
index af6ba3d1a0..f9a6aa3a0f 100644
--- a/tools/ocaml/libs/xc/xenctrl.mli
+++ b/tools/ocaml/libs/xc/xenctrl.mli
@@ -44,6 +44,8 @@ type x86_arch_emulation_flags =
 
 type x86_arch_misc_flags =
   | X86_MSR_RELAXED
+  | X86_ASSISTED_XAPIC
+  | X86_ASSISTED_X2APIC
 
 type xen_x86_arch_domainconfig = {
   emulation_flags: x86_arch_emulation_flags list;
diff --git a/tools/ocaml/libs/xc/xenctrl_stubs.c b/tools/ocaml/libs/xc/xenctrl_stubs.c
index e0d49b18d2..ecfc7125d5 100644
--- a/tools/ocaml/libs/xc/xenctrl_stubs.c
+++ b/tools/ocaml/libs/xc/xenctrl_stubs.c
@@ -239,7 +239,7 @@ CAMLprim value stub_xc_domain_create(value xch, value wanted_domid, value config
 
 		cfg.arch.misc_flags = ocaml_list_to_c_bitmap
 			/* ! x86_arch_misc_flags X86_ none */
-			/* ! XEN_X86_ XEN_X86_MSR_RELAXED all */
+			/* ! XEN_X86_ XEN_X86_ASSISTED_X2APIC max */
 			(VAL_MISC_FLAGS);
 
 #undef VAL_MISC_FLAGS
diff --git a/tools/xl/xl.c b/tools/xl/xl.c
index 2d1ec18ea3..31eb223309 100644
--- a/tools/xl/xl.c
+++ b/tools/xl/xl.c
@@ -57,6 +57,8 @@ int max_grant_frames = -1;
 int max_maptrack_frames = -1;
 int max_grant_version = LIBXL_MAX_GRANT_DEFAULT;
 libxl_domid domid_policy = INVALID_DOMID;
+int assisted_xapic = -1;
+int assisted_x2apic = -1;
 
 xentoollog_level minmsglevel = minmsglevel_default;
 
@@ -201,6 +203,12 @@ static void parse_global_config(const char *configfile,
     if (!xlu_cfg_get_long (config, "claim_mode", &l, 0))
         claim_mode = l;
 
+    if (!xlu_cfg_get_long (config, "assisted_xapic", &l, 0))
+        assisted_xapic = l;
+
+    if (!xlu_cfg_get_long (config, "assisted_x2apic", &l, 0))
+        assisted_x2apic = l;
+
     xlu_cfg_replace_string (config, "remus.default.netbufscript",
         &default_remus_netbufscript, 0);
     xlu_cfg_replace_string (config, "colo.default.proxyscript",
diff --git a/tools/xl/xl.h b/tools/xl/xl.h
index c5c4bedbdd..528deb3feb 100644
--- a/tools/xl/xl.h
+++ b/tools/xl/xl.h
@@ -286,6 +286,8 @@ extern libxl_bitmap global_vm_affinity_mask;
 extern libxl_bitmap global_hvm_affinity_mask;
 extern libxl_bitmap global_pv_affinity_mask;
 extern libxl_domid domid_policy;
+extern int assisted_xapic;
+extern int assisted_x2apic;
 
 enum output_format {
     OUTPUT_FORMAT_JSON,
diff --git a/tools/xl/xl_parse.c b/tools/xl/xl_parse.c
index 117fcdcb2b..0ab9b145fe 100644
--- a/tools/xl/xl_parse.c
+++ b/tools/xl/xl_parse.c
@@ -1681,6 +1681,22 @@ void parse_config_data(const char *config_source,
         xlu_cfg_get_defbool(config, "vpt_align", &b_info->u.hvm.vpt_align, 0);
         xlu_cfg_get_defbool(config, "apic", &b_info->apic, 0);
 
+        e = xlu_cfg_get_long(config, "assisted_xapic", &l , 0);
+        if ((e == ESRCH && assisted_xapic != -1)) /* use global default if present */
+            libxl_defbool_set(&b_info->arch_x86.assisted_xapic, assisted_xapic);
+        else if (!e)
+            libxl_defbool_set(&b_info->arch_x86.assisted_xapic, l);
+        else
+            exit(1);
+
+        e = xlu_cfg_get_long(config, "assisted_x2apic", &l, 0);
+        if ((e == ESRCH && assisted_x2apic != -1)) /* use global default if present */
+            libxl_defbool_set(&b_info->arch_x86.assisted_x2apic, assisted_x2apic);
+        else if (!e)
+            libxl_defbool_set(&b_info->arch_x86.assisted_x2apic, l);
+        else
+            exit(1);
+
         switch (xlu_cfg_get_list(config, "viridian",
                                  &viridian, &num_viridian, 1))
         {
diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c
index a5048ed654..bcca0dc900 100644
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -619,6 +619,8 @@ int arch_sanitise_domain_config(struct xen_domctl_createdomain *config)
     bool hvm = config->flags & XEN_DOMCTL_CDF_hvm;
     bool hap = config->flags & XEN_DOMCTL_CDF_hap;
     bool nested_virt = config->flags & XEN_DOMCTL_CDF_nested_virt;
+    bool assisted_xapic = config->arch.misc_flags & XEN_X86_ASSISTED_XAPIC;
+    bool assisted_x2apic = config->arch.misc_flags & XEN_X86_ASSISTED_X2APIC;
     unsigned int max_vcpus;
 
     if ( hvm ? !hvm_enabled : !IS_ENABLED(CONFIG_PV) )
@@ -685,13 +687,31 @@ int arch_sanitise_domain_config(struct xen_domctl_createdomain *config)
         }
     }
 
-    if ( config->arch.misc_flags & ~XEN_X86_MSR_RELAXED )
+    if ( config->arch.misc_flags & ~(XEN_X86_MSR_RELAXED |
+                                     XEN_X86_ASSISTED_XAPIC |
+                                     XEN_X86_ASSISTED_X2APIC) )
     {
         dprintk(XENLOG_INFO, "Invalid arch misc flags %#x\n",
                 config->arch.misc_flags);
         return -EINVAL;
     }
 
+    if ( (assisted_xapic || assisted_x2apic) && !hvm )
+    {
+        dprintk(XENLOG_INFO,
+                "Interrupt Controller Virtualization not supported for PV\n");
+        return -EINVAL;
+    }
+
+    if ( (assisted_xapic && !assisted_xapic_available) ||
+         (assisted_x2apic && !assisted_x2apic_available) )
+    {
+        dprintk(XENLOG_INFO,
+                "Hardware assisted x%sAPIC requested but not available\n",
+                assisted_xapic && !assisted_xapic_available ? "" : "2");
+        return -EINVAL;
+    }
+
     return 0;
 }
 
@@ -864,6 +884,12 @@ int arch_domain_create(struct domain *d,
 
     d->arch.msr_relaxed = config->arch.misc_flags & XEN_X86_MSR_RELAXED;
 
+    d->arch.hvm.assisted_xapic =
+        config->arch.misc_flags & XEN_X86_ASSISTED_XAPIC;
+
+    d->arch.hvm.assisted_x2apic =
+        config->arch.misc_flags & XEN_X86_ASSISTED_X2APIC;
+
     return 0;
 
  fail:
diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
index 6f1fec49b9..e8cb7792dc 100644
--- a/xen/arch/x86/hvm/vmx/vmcs.c
+++ b/xen/arch/x86/hvm/vmx/vmcs.c
@@ -1158,6 +1158,10 @@ static int construct_vmcs(struct vcpu *v)
         __vmwrite(PLE_WINDOW, ple_window);
     }
 
+    if ( !has_assisted_xapic(v->domain) )
+        v->arch.hvm.vmx.secondary_exec_control &=
+            ~SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES;
+
     if ( cpu_has_vmx_secondary_exec_control )
         __vmwrite(SECONDARY_VM_EXEC_CONTROL,
                   v->arch.hvm.vmx.secondary_exec_control);
diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
index c075370f64..73c7ae1e84 100644
--- a/xen/arch/x86/hvm/vmx/vmx.c
+++ b/xen/arch/x86/hvm/vmx/vmx.c
@@ -3344,16 +3344,11 @@ static void vmx_install_vlapic_mapping(struct vcpu *v)
 
 void vmx_vlapic_msr_changed(struct vcpu *v)
 {
-    int virtualize_x2apic_mode;
     struct vlapic *vlapic = vcpu_vlapic(v);
     unsigned int msr;
 
-    virtualize_x2apic_mode = ( (cpu_has_vmx_apic_reg_virt ||
-                                cpu_has_vmx_virtual_intr_delivery) &&
-                               cpu_has_vmx_virtualize_x2apic_mode );
-
-    if ( !cpu_has_vmx_virtualize_apic_accesses &&
-         !virtualize_x2apic_mode )
+    if ( !has_assisted_xapic(v->domain) &&
+         !has_assisted_x2apic(v->domain) )
         return;
 
     vmx_vmcs_enter(v);
@@ -3363,28 +3358,24 @@ void vmx_vlapic_msr_changed(struct vcpu *v)
     if ( !vlapic_hw_disabled(vlapic) &&
          (vlapic_base_address(vlapic) == APIC_DEFAULT_PHYS_BASE) )
     {
-        if ( virtualize_x2apic_mode && vlapic_x2apic_mode(vlapic) )
+        if ( has_assisted_x2apic(v->domain) && vlapic_x2apic_mode(vlapic) )
         {
             v->arch.hvm.vmx.secondary_exec_control |=
                 SECONDARY_EXEC_VIRTUALIZE_X2APIC_MODE;
-            if ( cpu_has_vmx_apic_reg_virt )
-            {
-                for ( msr = MSR_X2APIC_FIRST;
-                      msr <= MSR_X2APIC_FIRST + 0xff; msr++ )
-                    vmx_clear_msr_intercept(v, msr, VMX_MSR_R);
 
-                vmx_set_msr_intercept(v, MSR_X2APIC_PPR, VMX_MSR_R);
-                vmx_set_msr_intercept(v, MSR_X2APIC_TMICT, VMX_MSR_R);
-                vmx_set_msr_intercept(v, MSR_X2APIC_TMCCT, VMX_MSR_R);
-            }
-            if ( cpu_has_vmx_virtual_intr_delivery )
-            {
-                vmx_clear_msr_intercept(v, MSR_X2APIC_TPR, VMX_MSR_W);
-                vmx_clear_msr_intercept(v, MSR_X2APIC_EOI, VMX_MSR_W);
-                vmx_clear_msr_intercept(v, MSR_X2APIC_SELF, VMX_MSR_W);
-            }
+            for ( msr = MSR_X2APIC_FIRST;
+                  msr <= MSR_X2APIC_FIRST + 0xff; msr++ )
+                vmx_clear_msr_intercept(v, msr, VMX_MSR_R);
+
+            vmx_set_msr_intercept(v, MSR_X2APIC_PPR, VMX_MSR_R);
+            vmx_set_msr_intercept(v, MSR_X2APIC_TMICT, VMX_MSR_R);
+            vmx_set_msr_intercept(v, MSR_X2APIC_TMCCT, VMX_MSR_R);
+
+            vmx_clear_msr_intercept(v, MSR_X2APIC_TPR, VMX_MSR_W);
+            vmx_clear_msr_intercept(v, MSR_X2APIC_EOI, VMX_MSR_W);
+            vmx_clear_msr_intercept(v, MSR_X2APIC_SELF, VMX_MSR_W);
         }
-        else
+        else if ( has_assisted_xapic(v->domain) )
             v->arch.hvm.vmx.secondary_exec_control |=
                 SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES;
     }
diff --git a/xen/arch/x86/include/asm/hvm/domain.h b/xen/arch/x86/include/asm/hvm/domain.h
index 698455444e..92bf53483c 100644
--- a/xen/arch/x86/include/asm/hvm/domain.h
+++ b/xen/arch/x86/include/asm/hvm/domain.h
@@ -117,6 +117,12 @@ struct hvm_domain {
 
     bool                   is_s3_suspended;
 
+    /* xAPIC hardware assisted virtualization. */
+    bool                   assisted_xapic;
+
+    /* x2APIC hardware assisted virtualization. */
+    bool                   assisted_x2apic;
+
     /* hypervisor intercepted msix table */
     struct list_head       msixtbl_list;
 
diff --git a/xen/arch/x86/include/asm/hvm/vmx/vmcs.h b/xen/arch/x86/include/asm/hvm/vmx/vmcs.h
index 9119aa8536..5b7d662ed7 100644
--- a/xen/arch/x86/include/asm/hvm/vmx/vmcs.h
+++ b/xen/arch/x86/include/asm/hvm/vmx/vmcs.h
@@ -220,6 +220,9 @@ void vmx_vmcs_reload(struct vcpu *v);
 #define CPU_BASED_ACTIVATE_SECONDARY_CONTROLS 0x80000000
 extern u32 vmx_cpu_based_exec_control;
 
+#define has_assisted_xapic(d)   ((d)->arch.hvm.assisted_xapic)
+#define has_assisted_x2apic(d)  ((d)->arch.hvm.assisted_x2apic)
+
 #define PIN_BASED_EXT_INTR_MASK         0x00000001
 #define PIN_BASED_NMI_EXITING           0x00000008
 #define PIN_BASED_VIRTUAL_NMIS          0x00000020
diff --git a/xen/arch/x86/traps.c b/xen/arch/x86/traps.c
index a2278d9499..577c1a3b21 100644
--- a/xen/arch/x86/traps.c
+++ b/xen/arch/x86/traps.c
@@ -1121,7 +1121,7 @@ void cpuid_hypervisor_leaves(const struct vcpu *v, uint32_t leaf,
         if ( !is_hvm_domain(d) || subleaf != 0 )
             break;
 
-        if ( cpu_has_vmx_apic_reg_virt )
+        if ( has_assisted_xapic(d) )
             res->a |= XEN_HVM_CPUID_APIC_ACCESS_VIRT;
 
         /*
@@ -1130,9 +1130,7 @@ void cpuid_hypervisor_leaves(const struct vcpu *v, uint32_t leaf,
          * and wrmsr in the guest will run without VMEXITs (see
          * vmx_vlapic_msr_changed()).
          */
-        if ( cpu_has_vmx_virtualize_x2apic_mode &&
-             cpu_has_vmx_apic_reg_virt &&
-             cpu_has_vmx_virtual_intr_delivery )
+        if ( has_assisted_x2apic(d) )
             res->a |= XEN_HVM_CPUID_X2APIC_VIRT;
 
         /*
diff --git a/xen/include/public/arch-x86/xen.h b/xen/include/public/arch-x86/xen.h
index 7acd94c8eb..9da32c6239 100644
--- a/xen/include/public/arch-x86/xen.h
+++ b/xen/include/public/arch-x86/xen.h
@@ -317,6 +317,8 @@ struct xen_arch_domainconfig {
  * doesn't allow the guest to read or write to the underlying MSR.
  */
 #define XEN_X86_MSR_RELAXED (1u << 0)
+#define XEN_X86_ASSISTED_XAPIC (1u << 1)
+#define XEN_X86_ASSISTED_X2APIC (1u << 2)
     uint32_t misc_flags;
 };
 
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 15:01:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 15:01:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282331.481005 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPQU3-0000ek-RT; Wed, 02 Mar 2022 15:01:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282331.481005; Wed, 02 Mar 2022 15:01:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPQU3-0000dW-M1; Wed, 02 Mar 2022 15:01:43 +0000
Received: by outflank-mailman (input) for mailman id 282331;
 Wed, 02 Mar 2022 15:01:43 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=alt7=TN=citrix.com=prvs=053475f8d=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nPQU2-0000as-O5
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 15:01:42 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a9f09c2e-9a39-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 16:01:41 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a9f09c2e-9a39-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646233301;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=eOsDeAg0hCgIMJz4xzrvECZpxvwHo6VnrvDHVT6JGB0=;
  b=cQrN0+hZicbHzG+/8IrlD49Ib60Y21ToyuGL5fcwgGdHGX8DB3xVQFuf
   JCgsic26KaP90BySVPZaRUwHE3zGOAErkwZ760KEvHFQf8O7TrkSN2h0V
   R92LveXeXSG/BQWN2z2yYCpmDsuguIreASqUL0VotxZ6f7HydDyaQ6E3p
   A=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 64766525
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:vwMIyq5MPwgW0n+I3Kz9NgxRtKDHchMFZxGqfqrLsTDasY5as4F+v
 jFNDWyDbv3famCnKIx1a9uw8B4DvpPQy4QwHFBprXxmHi5G8cbLO4+Ufxz6V8+wwmwvb67FA
 +E2MISowBUcFyeEzvuVGuG96yE6j8lkf5KkYAL+EnkZqTRMFWFw0XqPp8Zj2tQy2YPhWVvW0
 T/Pi5a31GGNimYc3l08s8pvmDs31BglkGpF1rCWTakjUG72zxH5PrpGTU2CByKQrr1vNvy7X
 47+IISRpQs1yfuP5uSNyd4XemVSKlLb0JPnZnB+A8BOiTAazsA+PzpS2FPxpi67hh3Q9+2dx
 umhurSLaCE2MqySmd0RUkhfSiokJupr073+dC3XXcy7lyUqclPpyvRqSko3IZcZ6qB8BmQmG
 f4wcW5XKErZ3qTvnez9GrIEascLdaEHOKs9s3dtixTQCf8iSJbOa67L+cVZzHE7gcUm8fP2O
 ZZGN2QyNkmojxtnOVAGUJkMuOiUpV7UTRd+s2yzi5gx7D2GpOB2+Oe0a4eEEjCQfu1rmUKfq
 nPD7n7OKBgQP9yCyhKI6nupwOTImEvTQ5kOHbe18vprhly7xWEJDhASE1yhrpGRgEOkR8hWL
 UBS/yM0tLUz72SiVNy7VBq9yFaHswAdXZxMEuQ8wACL1qfQpQ2eAwAsTCNHLtovt8Y0RDkj/
 l6Pg97tQzdotdW9S32H8ayPhSivIiVTJmgHDQcUQA1A79T9rYUbihPUUs0lAKOzlsfyGzz73
 3aNtidWr7cZgNMP1q671UvamD/qrZ/MJiY3+wHWU2SN/g5/Iom/aOSA9lzz/ftGaoGDQTG8U
 GMswpbEqrpUVNfUyXLLEL5l8KyVC+itCxz6nlJuQZgY+zX8/CeoJ5sXzRp8HRI8WiobQgPBb
 EjWsAJXwZZcOnq2cKN6C76M59QWIbvIToq8CK2NBjZaSt0oLVLconkyDaKF9z21yCARfbcD1
 YB3mCpGJVITEuxZwTW/XI/xOpd7l3lllQs/qX0WpilLMIZyhlbIEd/p03PUN4jVCZ9oRi2Pq
 b6z0OPQln1ivBXWOHW/zGLqBQliwYIHLZ73sddLUeWIPxBrHmosY9eIn+9/ItI9x/ULz7aSl
 p1YZqO+4ACl7ZEgAV/XAk2PlZu1BcovxZ7FFXZE0amUN4gLPt/0sfZ3m2ofdrg77u1zpcOYv
 NFeE/hs9s9nE2ydkxxENMGVhNU7KHyD2FLfVwL4MWNXV8MxGGT0FirMI1KHGN8mVXHs66PTY
 tSIi2vmfHb0b186XZaONan2lAvZULp0sLsaYnYk6+J7IC3EmLWG4QSu5hPrC6ng8Sn++wY=
IronPort-HdrOrdr: A9a23:k3GAkq7iR7zinbCWsgPXwPDXdLJyesId70hD6qhwISY6TiX+rb
 HWoB17726TtN9/YhEdcLy7VJVoBEmskKKdgrNhWotKPjOW21dARbsKheCJrgEIWReOktK1vZ
 0QC5SWY+eQMbEVt6nHCXGDYrQd/OU=
X-IronPort-AV: E=Sophos;i="5.90,149,1643691600"; 
   d="scan'208";a="64766525"
From: Jane Malalane <jane.malalane@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Jane Malalane <jane.malalane@citrix.com>, Wei Liu <wl@xen.org>, "Anthony
 PERARD" <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien Grall
	<julien@xen.org>, "Stefano Stabellini" <sstabellini@kernel.org>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian
	<kevin.tian@intel.com>, =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?=
	<roger.pau@citrix.com>
Subject: [PATCH v4 1/2] xen+tools: Report Interrupt Controller Virtualization capabilities on x86
Date: Wed, 2 Mar 2022 15:00:55 +0000
Message-ID: <20220302150056.14381-2-jane.malalane@citrix.com>
X-Mailer: git-send-email 2.11.0
In-Reply-To: <20220302150056.14381-1-jane.malalane@citrix.com>
References: <20220302150056.14381-1-jane.malalane@citrix.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

Add XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_xapic and
XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_x2apic to report accelerated xapic
and x2apic, on x86 hardware.
No such features are currently implemented on AMD hardware.

For that purpose, also add an arch-specific "capabilities" parameter
to struct xen_sysctl_physinfo.

Note that this interface is intended to be compatible with AMD so that
AVIC support can be introduced in a future patch. Unlike Intel that
has multiple controls for APIC Virtualization, AMD has one global
'AVIC Enable' control bit, so fine-graining of APIC virtualization
control cannot be done on a common interface. Therefore, for xAPIC HW
assisted virtualization support to be reported, HW must support
virtualize_apic_accesses as well as apic_reg_virt. For x2APIC HW
assisted virtualization reporting, virtualize_x2apic_mode must be
supported alongside apic_reg_virt and virtual_intr_delivery.

Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Jane Malalane <jane.malalane@citrix.com>
---
CC: Wei Liu <wl@xen.org>
CC: Anthony PERARD <anthony.perard@citrix.com>
CC: Juergen Gross <jgross@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>
CC: George Dunlap <george.dunlap@citrix.com>
CC: Jan Beulich <jbeulich@suse.com>
CC: Julien Grall <julien@xen.org>
CC: Stefano Stabellini <sstabellini@kernel.org>
CC: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
CC: Bertrand Marquis <bertrand.marquis@arm.com>
CC: Jun Nakajima <jun.nakajima@intel.com>
CC: Kevin Tian <kevin.tian@intel.com>
CC: "Roger Pau Monné" <roger.pau@citrix.com>

v4:
 * Fallback to the original v2/v1 conditions for setting
   assisted_xapic_available and assisted_x2apic_available so that in
   the future APIC virtualization can be exposed on AMD hardware
   since fine-graining of "AVIC" is not supported, i.e., AMD solely
   uses "AVIC Enable". This also means that sysctl mimics what's
   exposed in CPUID.

v3:
 * Define XEN_SYSCTL_PHYSCAP_ARCH_MAX for ABI checking and actually
   set "arch_capbilities", via a call to c_bitmap_to_ocaml_list()
 * Have assisted_x2apic_available only depend on
   cpu_has_vmx_virtualize_x2apic_mode

v2:
 * Use one macro LIBXL_HAVE_PHYSINFO_ASSISTED_APIC instead of two
 * Pass xcpyshinfo as a pointer in libxl__arch_get_physinfo
 * Set assisted_x{2}apic_available to be conditional upon "bsp" and
   annotate it with __ro_after_init
 * Change XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_X{2}APIC to
   _X86_ASSISTED_X{2}APIC
 * Keep XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X{2}APIC contained within
   sysctl.h
 * Fix padding introduced in struct xen_sysctl_physinfo and bump
   XEN_SYSCTL_INTERFACE_VERSION
---
 tools/golang/xenlight/helpers.gen.go |  4 ++++
 tools/golang/xenlight/types.gen.go   |  2 ++
 tools/include/libxl.h                |  7 +++++++
 tools/libs/light/libxl.c             |  3 +++
 tools/libs/light/libxl_arch.h        |  4 ++++
 tools/libs/light/libxl_arm.c         |  5 +++++
 tools/libs/light/libxl_types.idl     |  2 ++
 tools/libs/light/libxl_x86.c         | 11 +++++++++++
 tools/ocaml/libs/xc/xenctrl.ml       |  5 +++++
 tools/ocaml/libs/xc/xenctrl.mli      |  5 +++++
 tools/ocaml/libs/xc/xenctrl_stubs.c  | 14 +++++++++++---
 tools/xl/xl_info.c                   |  6 ++++--
 xen/arch/x86/hvm/vmx/vmcs.c          | 10 ++++++++++
 xen/arch/x86/include/asm/domain.h    |  3 +++
 xen/arch/x86/sysctl.c                |  7 +++++++
 xen/include/public/sysctl.h          | 11 ++++++++++-
 16 files changed, 93 insertions(+), 6 deletions(-)

diff --git a/tools/golang/xenlight/helpers.gen.go b/tools/golang/xenlight/helpers.gen.go
index b746ff1081..dd4e6c9f14 100644
--- a/tools/golang/xenlight/helpers.gen.go
+++ b/tools/golang/xenlight/helpers.gen.go
@@ -3373,6 +3373,8 @@ x.CapVmtrace = bool(xc.cap_vmtrace)
 x.CapVpmu = bool(xc.cap_vpmu)
 x.CapGnttabV1 = bool(xc.cap_gnttab_v1)
 x.CapGnttabV2 = bool(xc.cap_gnttab_v2)
+x.CapAssistedXapic = bool(xc.cap_assisted_xapic)
+x.CapAssistedX2Apic = bool(xc.cap_assisted_x2apic)
 
  return nil}
 
@@ -3407,6 +3409,8 @@ xc.cap_vmtrace = C.bool(x.CapVmtrace)
 xc.cap_vpmu = C.bool(x.CapVpmu)
 xc.cap_gnttab_v1 = C.bool(x.CapGnttabV1)
 xc.cap_gnttab_v2 = C.bool(x.CapGnttabV2)
+xc.cap_assisted_xapic = C.bool(x.CapAssistedXapic)
+xc.cap_assisted_x2apic = C.bool(x.CapAssistedX2Apic)
 
  return nil
  }
diff --git a/tools/golang/xenlight/types.gen.go b/tools/golang/xenlight/types.gen.go
index b1e84d5258..87be46c745 100644
--- a/tools/golang/xenlight/types.gen.go
+++ b/tools/golang/xenlight/types.gen.go
@@ -1014,6 +1014,8 @@ CapVmtrace bool
 CapVpmu bool
 CapGnttabV1 bool
 CapGnttabV2 bool
+CapAssistedXapic bool
+CapAssistedX2Apic bool
 }
 
 type Connectorinfo struct {
diff --git a/tools/include/libxl.h b/tools/include/libxl.h
index 51a9b6cfac..94e6355822 100644
--- a/tools/include/libxl.h
+++ b/tools/include/libxl.h
@@ -528,6 +528,13 @@
 #define LIBXL_HAVE_MAX_GRANT_VERSION 1
 
 /*
+ * LIBXL_HAVE_PHYSINFO_ASSISTED_APIC indicates that libxl_physinfo has
+ * cap_assisted_xapic and cap_assisted_x2apic fields, which indicates
+ * the availability of x{2}APIC hardware assisted virtualization.
+ */
+#define LIBXL_HAVE_PHYSINFO_ASSISTED_APIC 1
+
+/*
  * libxl ABI compatibility
  *
  * The only guarantee which libxl makes regarding ABI compatibility
diff --git a/tools/libs/light/libxl.c b/tools/libs/light/libxl.c
index a0bf7d186f..6d699951e2 100644
--- a/tools/libs/light/libxl.c
+++ b/tools/libs/light/libxl.c
@@ -15,6 +15,7 @@
 #include "libxl_osdeps.h"
 
 #include "libxl_internal.h"
+#include "libxl_arch.h"
 
 int libxl_ctx_alloc(libxl_ctx **pctx, int version,
                     unsigned flags, xentoollog_logger * lg)
@@ -410,6 +411,8 @@ int libxl_get_physinfo(libxl_ctx *ctx, libxl_physinfo *physinfo)
     physinfo->cap_gnttab_v2 =
         !!(xcphysinfo.capabilities & XEN_SYSCTL_PHYSCAP_gnttab_v2);
 
+    libxl__arch_get_physinfo(physinfo, &xcphysinfo);
+
     GC_FREE;
     return 0;
 }
diff --git a/tools/libs/light/libxl_arch.h b/tools/libs/light/libxl_arch.h
index 1522ecb97f..207ceac6a1 100644
--- a/tools/libs/light/libxl_arch.h
+++ b/tools/libs/light/libxl_arch.h
@@ -86,6 +86,10 @@ int libxl__arch_extra_memory(libxl__gc *gc,
                              uint64_t *out);
 
 _hidden
+void libxl__arch_get_physinfo(libxl_physinfo *physinfo,
+                              const xc_physinfo_t *xcphysinfo);
+
+_hidden
 void libxl__arch_update_domain_config(libxl__gc *gc,
                                       libxl_domain_config *dst,
                                       const libxl_domain_config *src);
diff --git a/tools/libs/light/libxl_arm.c b/tools/libs/light/libxl_arm.c
index eef1de0939..39fdca1b49 100644
--- a/tools/libs/light/libxl_arm.c
+++ b/tools/libs/light/libxl_arm.c
@@ -1431,6 +1431,11 @@ int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
     return rc;
 }
 
+void libxl__arch_get_physinfo(libxl_physinfo *physinfo,
+                              const xc_physinfo_t *xcphysinfo)
+{
+}
+
 void libxl__arch_update_domain_config(libxl__gc *gc,
                                       libxl_domain_config *dst,
                                       const libxl_domain_config *src)
diff --git a/tools/libs/light/libxl_types.idl b/tools/libs/light/libxl_types.idl
index 2a42da2f7d..42ac6c357b 100644
--- a/tools/libs/light/libxl_types.idl
+++ b/tools/libs/light/libxl_types.idl
@@ -1068,6 +1068,8 @@ libxl_physinfo = Struct("physinfo", [
     ("cap_vpmu", bool),
     ("cap_gnttab_v1", bool),
     ("cap_gnttab_v2", bool),
+    ("cap_assisted_xapic", bool),
+    ("cap_assisted_x2apic", bool),
     ], dir=DIR_OUT)
 
 libxl_connectorinfo = Struct("connectorinfo", [
diff --git a/tools/libs/light/libxl_x86.c b/tools/libs/light/libxl_x86.c
index 1feadebb18..e0a06ecfe3 100644
--- a/tools/libs/light/libxl_x86.c
+++ b/tools/libs/light/libxl_x86.c
@@ -866,6 +866,17 @@ int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
     return rc;
 }
 
+void libxl__arch_get_physinfo(libxl_physinfo *physinfo,
+                              const xc_physinfo_t *xcphysinfo)
+{
+    physinfo->cap_assisted_xapic =
+        !!(xcphysinfo->arch_capabilities &
+           XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC);
+    physinfo->cap_assisted_x2apic =
+        !!(xcphysinfo->arch_capabilities &
+           XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC);
+}
+
 void libxl__arch_update_domain_config(libxl__gc *gc,
                                       libxl_domain_config *dst,
                                       const libxl_domain_config *src)
diff --git a/tools/ocaml/libs/xc/xenctrl.ml b/tools/ocaml/libs/xc/xenctrl.ml
index 7503031d8f..21783d3622 100644
--- a/tools/ocaml/libs/xc/xenctrl.ml
+++ b/tools/ocaml/libs/xc/xenctrl.ml
@@ -127,6 +127,10 @@ type physinfo_cap_flag =
 	| CAP_Gnttab_v1
 	| CAP_Gnttab_v2
 
+type physinfo_arch_cap_flag =
+	| CAP_X86_ASSISTED_XAPIC
+	| CAP_X86_ASSISTED_X2APIC
+
 type physinfo =
 {
 	threads_per_core : int;
@@ -139,6 +143,7 @@ type physinfo =
 	scrub_pages      : nativeint;
 	(* XXX hw_cap *)
 	capabilities     : physinfo_cap_flag list;
+	arch_capabilities : physinfo_arch_cap_flag list;
 	max_nr_cpus      : int;
 }
 
diff --git a/tools/ocaml/libs/xc/xenctrl.mli b/tools/ocaml/libs/xc/xenctrl.mli
index d1d9c9247a..af6ba3d1a0 100644
--- a/tools/ocaml/libs/xc/xenctrl.mli
+++ b/tools/ocaml/libs/xc/xenctrl.mli
@@ -112,6 +112,10 @@ type physinfo_cap_flag =
   | CAP_Gnttab_v1
   | CAP_Gnttab_v2
 
+type physinfo_arch_cap_flag =
+  | CAP_X86_ASSISTED_XAPIC
+  | CAP_X86_ASSISTED_X2APIC
+
 type physinfo = {
   threads_per_core : int;
   cores_per_socket : int;
@@ -122,6 +126,7 @@ type physinfo = {
   free_pages       : nativeint;
   scrub_pages      : nativeint;
   capabilities     : physinfo_cap_flag list;
+  arch_capabilities : physinfo_arch_cap_flag list;
   max_nr_cpus      : int; (** compile-time max possible number of nr_cpus *)
 }
 type version = { major : int; minor : int; extra : string; }
diff --git a/tools/ocaml/libs/xc/xenctrl_stubs.c b/tools/ocaml/libs/xc/xenctrl_stubs.c
index 5b4fe72c8d..e0d49b18d2 100644
--- a/tools/ocaml/libs/xc/xenctrl_stubs.c
+++ b/tools/ocaml/libs/xc/xenctrl_stubs.c
@@ -712,7 +712,7 @@ CAMLprim value stub_xc_send_debug_keys(value xch, value keys)
 CAMLprim value stub_xc_physinfo(value xch)
 {
 	CAMLparam1(xch);
-	CAMLlocal2(physinfo, cap_list);
+	CAMLlocal3(physinfo, cap_list, arch_cap_list);
 	xc_physinfo_t c_physinfo;
 	int r;
 
@@ -730,8 +730,15 @@ CAMLprim value stub_xc_physinfo(value xch)
 		/* ! physinfo_cap_flag CAP_ lc */
 		/* ! XEN_SYSCTL_PHYSCAP_ XEN_SYSCTL_PHYSCAP_MAX max */
 		(c_physinfo.capabilities);
+	/*
+	 * arch_capabilities: physinfo_arch_cap_flag list;
+	 */
+	arch_cap_list = c_bitmap_to_ocaml_list
+		/* ! physinfo_arch_cap_flag CAP_ none */
+		/* ! XEN_SYSCTL_PHYSCAP_ XEN_SYSCTL_PHYSCAP_X86_MAX max */
+		(c_physinfo.arch_capabilities);
 
-	physinfo = caml_alloc_tuple(10);
+	physinfo = caml_alloc_tuple(11);
 	Store_field(physinfo, 0, Val_int(c_physinfo.threads_per_core));
 	Store_field(physinfo, 1, Val_int(c_physinfo.cores_per_socket));
 	Store_field(physinfo, 2, Val_int(c_physinfo.nr_cpus));
@@ -741,7 +748,8 @@ CAMLprim value stub_xc_physinfo(value xch)
 	Store_field(physinfo, 6, caml_copy_nativeint(c_physinfo.free_pages));
 	Store_field(physinfo, 7, caml_copy_nativeint(c_physinfo.scrub_pages));
 	Store_field(physinfo, 8, cap_list);
-	Store_field(physinfo, 9, Val_int(c_physinfo.max_cpu_id + 1));
+	Store_field(physinfo, 9, arch_cap_list);
+	Store_field(physinfo, 10, Val_int(c_physinfo.max_cpu_id + 1));
 
 	CAMLreturn(physinfo);
 }
diff --git a/tools/xl/xl_info.c b/tools/xl/xl_info.c
index 712b7638b0..3205270754 100644
--- a/tools/xl/xl_info.c
+++ b/tools/xl/xl_info.c
@@ -210,7 +210,7 @@ static void output_physinfo(void)
          info.hw_cap[4], info.hw_cap[5], info.hw_cap[6], info.hw_cap[7]
         );
 
-    maybe_printf("virt_caps              :%s%s%s%s%s%s%s%s%s%s%s\n",
+    maybe_printf("virt_caps              :%s%s%s%s%s%s%s%s%s%s%s%s%s\n",
          info.cap_pv ? " pv" : "",
          info.cap_hvm ? " hvm" : "",
          info.cap_hvm && info.cap_hvm_directio ? " hvm_directio" : "",
@@ -221,7 +221,9 @@ static void output_physinfo(void)
          info.cap_vmtrace ? " vmtrace" : "",
          info.cap_vpmu ? " vpmu" : "",
          info.cap_gnttab_v1 ? " gnttab-v1" : "",
-         info.cap_gnttab_v2 ? " gnttab-v2" : ""
+         info.cap_gnttab_v2 ? " gnttab-v2" : "",
+         info.cap_assisted_xapic ? " assisted_xapic" : "",
+         info.cap_assisted_x2apic ? " assisted_x2apic" : ""
         );
 
     vinfo = libxl_get_version_info(ctx);
diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
index e1e1fa14e6..6f1fec49b9 100644
--- a/xen/arch/x86/hvm/vmx/vmcs.c
+++ b/xen/arch/x86/hvm/vmx/vmcs.c
@@ -343,6 +343,16 @@ static int vmx_init_vmcs_config(bool bsp)
             MSR_IA32_VMX_PROCBASED_CTLS2, &mismatch);
     }
 
+    /* Check whether hardware supports accelerated xapic and x2apic. */
+    if ( bsp )
+    {
+        assisted_xapic_available = (cpu_has_vmx_virtualize_apic_accesses &&
+                                    cpu_has_vmx_apic_reg_virt);
+        assisted_x2apic_available = (cpu_has_vmx_virtualize_x2apic_mode &&
+                                     cpu_has_vmx_apic_reg_virt &&
+                                     cpu_has_vmx_virtual_intr_delivery);
+    }
+
     /* The IA32_VMX_EPT_VPID_CAP MSR exists only when EPT or VPID available */
     if ( _vmx_secondary_exec_control & (SECONDARY_EXEC_ENABLE_EPT |
                                         SECONDARY_EXEC_ENABLE_VPID) )
diff --git a/xen/arch/x86/include/asm/domain.h b/xen/arch/x86/include/asm/domain.h
index e62e109598..72431df26d 100644
--- a/xen/arch/x86/include/asm/domain.h
+++ b/xen/arch/x86/include/asm/domain.h
@@ -756,6 +756,9 @@ static inline void pv_inject_sw_interrupt(unsigned int vector)
                       : is_pv_32bit_domain(d) ? PV32_VM_ASSIST_MASK \
                                               : PV64_VM_ASSIST_MASK)
 
+extern bool assisted_xapic_available;
+extern bool assisted_x2apic_available;
+
 #endif /* __ASM_DOMAIN_H__ */
 
 /*
diff --git a/xen/arch/x86/sysctl.c b/xen/arch/x86/sysctl.c
index f82abc2488..ad95c86aef 100644
--- a/xen/arch/x86/sysctl.c
+++ b/xen/arch/x86/sysctl.c
@@ -69,6 +69,9 @@ struct l3_cache_info {
     unsigned long size;
 };
 
+bool __ro_after_init assisted_xapic_available;
+bool __ro_after_init assisted_x2apic_available;
+
 static void cf_check l3_cache_get(void *arg)
 {
     struct cpuid4_info info;
@@ -135,6 +138,10 @@ void arch_do_physinfo(struct xen_sysctl_physinfo *pi)
         pi->capabilities |= XEN_SYSCTL_PHYSCAP_hap;
     if ( IS_ENABLED(CONFIG_SHADOW_PAGING) )
         pi->capabilities |= XEN_SYSCTL_PHYSCAP_shadow;
+    if ( assisted_xapic_available )
+        pi->arch_capabilities |= XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC;
+    if ( assisted_x2apic_available )
+        pi->arch_capabilities |= XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC;
 }
 
 long arch_do_sysctl(
diff --git a/xen/include/public/sysctl.h b/xen/include/public/sysctl.h
index 55252e97f2..7fe05be0c9 100644
--- a/xen/include/public/sysctl.h
+++ b/xen/include/public/sysctl.h
@@ -35,7 +35,7 @@
 #include "domctl.h"
 #include "physdev.h"
 
-#define XEN_SYSCTL_INTERFACE_VERSION 0x00000014
+#define XEN_SYSCTL_INTERFACE_VERSION 0x00000015
 
 /*
  * Read console content from Xen buffer ring.
@@ -111,6 +111,13 @@ struct xen_sysctl_tbuf_op {
 /* Max XEN_SYSCTL_PHYSCAP_* constant.  Used for ABI checking. */
 #define XEN_SYSCTL_PHYSCAP_MAX XEN_SYSCTL_PHYSCAP_gnttab_v2
 
+/* The platform supports x{2}apic hardware assisted emulation. */
+#define XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC  (1u << 0)
+#define XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC (1u << 1)
+
+/* Max XEN_SYSCTL_PHYSCAP_X86__* constant. Used for ABI checking. */
+#define XEN_SYSCTL_PHYSCAP_X86_MAX XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC
+
 struct xen_sysctl_physinfo {
     uint32_t threads_per_core;
     uint32_t cores_per_socket;
@@ -120,6 +127,8 @@ struct xen_sysctl_physinfo {
     uint32_t max_node_id; /* Largest possible node ID on this host */
     uint32_t cpu_khz;
     uint32_t capabilities;/* XEN_SYSCTL_PHYSCAP_??? */
+    uint32_t arch_capabilities;/* XEN_SYSCTL_PHYSCAP_X86{ARM}_??? */
+    uint32_t pad;
     uint64_aligned_t total_pages;
     uint64_aligned_t free_pages;
     uint64_aligned_t scrub_pages;
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 15:33:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 15:33:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282355.481033 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPQya-0005wc-UE; Wed, 02 Mar 2022 15:33:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282355.481033; Wed, 02 Mar 2022 15:33:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPQya-0005wV-RD; Wed, 02 Mar 2022 15:33:16 +0000
Received: by outflank-mailman (input) for mailman id 282355;
 Wed, 02 Mar 2022 15:33:15 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=sydv=TN=amazon.de=prvs=053930d30=doebel@srs-se1.protection.inumbo.net>)
 id 1nPQyX-0005wP-Qr
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 15:33:15 +0000
Received: from smtp-fw-2101.amazon.com (smtp-fw-2101.amazon.com [72.21.196.25])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 10bdcd0e-9a3e-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 16:33:11 +0100 (CET)
Received: from iad12-co-svc-p1-lb1-vlan2.amazon.com (HELO
 email-inbound-relay-iad-1e-98691110.us-east-1.amazon.com) ([10.43.8.2])
 by smtp-border-fw-2101.iad2.amazon.com with ESMTP; 02 Mar 2022 15:32:58 +0000
Received: from EX13D03EUC004.ant.amazon.com
 (iad12-ws-svc-p26-lb9-vlan3.iad.amazon.com [10.40.163.38])
 by email-inbound-relay-iad-1e-98691110.us-east-1.amazon.com (Postfix) with
 ESMTPS id 12D2C852FD; Wed,  2 Mar 2022 15:32:56 +0000 (UTC)
Received: from EX13D03EUC002.ant.amazon.com (10.43.164.60) by
 EX13D03EUC004.ant.amazon.com (10.43.164.33) with Microsoft SMTP Server (TLS)
 id 15.0.1497.28; Wed, 2 Mar 2022 15:32:56 +0000
Received: from EX13D03EUC002.ant.amazon.com ([10.43.164.60]) by
 EX13D03EUC002.ant.amazon.com ([10.43.164.60]) with mapi id 15.00.1497.028;
 Wed, 2 Mar 2022 15:32:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 10bdcd0e-9a3e-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646235192; x=1677771192;
  h=from:to:cc:date:message-id:references:in-reply-to:
   content-id:mime-version:content-transfer-encoding:subject;
  bh=roP0bwPivzOGjJjDU7tKd3dkm1SoTU4LrZ3IvYjnY38=;
  b=heVug5jcnjX4VDHtg5+ScqSD+wSiKPWwvYOh4IaKtXSzEakwQCm9UD6u
   hgK+NlLqmElAbUlo7sDmhGSorRVb47Nc7K+lgqIHAhMtiGOn4xXm7s70B
   HNycSmZIFZt1Pdn1K+dRKdu6NkYjr3zScMv4lD6VGFC3m3uKVSFca4OQ2
   Q=;
X-IronPort-AV: E=Sophos;i="5.90,149,1643673600"; 
   d="scan'208";a="177884295"
Subject: Re: [PATCH 1/4] livepatch: update readme to mention --xen-depends
Thread-Topic: [PATCH 1/4] livepatch: update readme to mention --xen-depends
From: "Doebel, Bjoern" <doebel@amazon.de>
To: Roger Pau Monne <roger.pau@citrix.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: "ross.lagerwall@citrix.com" <ross.lagerwall@citrix.com>,
	"konrad.wilk@oracle.com" <konrad.wilk@oracle.com>, "julien@xen.org"
	<julien@xen.org>, "Andrew.Cooper3@citrix.com" <Andrew.Cooper3@citrix.com>
Thread-Index: AQHYLkHpkyqw0otv8UqarS2xkvT+RKysSdKA
Date: Wed, 2 Mar 2022 15:32:55 +0000
Message-ID: <1C97765C-3A3A-4FB5-9242-1F9DB3E9DDF6@amazon.com>
References: <20220302142711.38953-1-roger.pau@citrix.com>
 <20220302142711.38953-2-roger.pau@citrix.com>
In-Reply-To: <20220302142711.38953-2-roger.pau@citrix.com>
Accept-Language: en-US, de-DE
Content-Language: en-GB
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.43.164.30]
Content-Type: text/plain; charset="utf-8"
Content-ID: <2A601BFA200C02489496C652D79A876D@amazon.com>
MIME-Version: 1.0
Precedence: Bulk
Content-Transfer-Encoding: base64

ICAgIEZpeGVzOiBiMTlkZjdiMmMwNWUgKCdsaXZlcGF0Y2gtYnVpbGQ6IEVtYmVkIGh5cGVydmlz
b3IgYnVpbGQgaWQgaW50byBldmVyeSBob3RwYXRjaCcpDQogICAgU2lnbmVkLW9mZi1ieTogUm9n
ZXIgUGF1IE1vbm7DqSA8cm9nZXIucGF1QGNpdHJpeC5jb20+DQogICAgLS0tDQogICAgIFJFQURN
RS5tZCB8IDIgKy0NCiAgICAgMSBmaWxlIGNoYW5nZWQsIDEgaW5zZXJ0aW9uKCspLCAxIGRlbGV0
aW9uKC0pDQoNCiAgICBkaWZmIC0tZ2l0IGEvUkVBRE1FLm1kIGIvUkVBRE1FLm1kDQogICAgaW5k
ZXggNjUzYzYyNC4uYjQ4YTNkZiAxMDA2NDQNCiAgICAtLS0gYS9SRUFETUUubWQNCiAgICArKysg
Yi9SRUFETUUubWQNCiAgICBAQCAtMjQsNyArMjQsNyBAQCBOZXh0LCBidWlsZCBhIGxpdmUgcGF0
Y2gsIHVzaW5nIGEgcGF0Y2ggYW5kIHRoZSBzb3VyY2UsIGJ1aWxkIElELCBhbmQNCiAgICAgYGBg
DQogICAgICQgY2Qgfi9zcmMvbGl2ZXBhdGNoLWJ1aWxkDQogICAgICQgLi9saXZlcGF0Y2gtYnVp
bGQgLXMgfi9zcmMveGVuYnVpbGQgLXAgfi9zcmMveHNhLnBhdGNoIC1vIG91dCBcDQogICAgLSAg
ICAtYyB+L3NyYy94ZW4veGVuLy5jb25maWcgLS1kZXBlbmRzICRCVUlMRElEDQogICAgKyAgICAt
YyB+L3NyYy94ZW4veGVuLy5jb25maWcgLS1kZXBlbmRzICRCVUlMRElEIC0teGVuLWRlcGVuZHMg
JEJVSUxESUQNCiAgICAgQnVpbGRpbmcgTGl2ZVBhdGNoIHBhdGNoOiB4c2ENCg0KDQpSZXZpZXdl
ZC1ieTogQmpvZXJuIERvZWJlbCA8ZG9lYmVsQGFtYXpvbi5kZT4NCg0KCgoKQW1hem9uIERldmVs
b3BtZW50IENlbnRlciBHZXJtYW55IEdtYkgKS3JhdXNlbnN0ci4gMzgKMTAxMTcgQmVybGluCkdl
c2NoYWVmdHNmdWVocnVuZzogQ2hyaXN0aWFuIFNjaGxhZWdlciwgSm9uYXRoYW4gV2Vpc3MKRWlu
Z2V0cmFnZW4gYW0gQW10c2dlcmljaHQgQ2hhcmxvdHRlbmJ1cmcgdW50ZXIgSFJCIDE0OTE3MyBC
ClNpdHo6IEJlcmxpbgpVc3QtSUQ6IERFIDI4OSAyMzcgODc5CgoK



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 15:33:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 15:33:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282360.481043 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPQzB-0006PL-6F; Wed, 02 Mar 2022 15:33:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282360.481043; Wed, 02 Mar 2022 15:33:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPQzB-0006PE-3K; Wed, 02 Mar 2022 15:33:53 +0000
Received: by outflank-mailman (input) for mailman id 282360;
 Wed, 02 Mar 2022 15:33:52 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=sydv=TN=amazon.de=prvs=053930d30=doebel@srs-se1.protection.inumbo.net>)
 id 1nPQz9-0006Ox-VV
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 15:33:51 +0000
Received: from smtp-fw-6002.amazon.com (smtp-fw-6002.amazon.com [52.95.49.90])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 27be76b3-9a3e-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 16:33:49 +0100 (CET)
Received: from iad12-co-svc-p1-lb1-vlan2.amazon.com (HELO
 email-inbound-relay-iad-1a-b27d4a00.us-east-1.amazon.com) ([10.43.8.2])
 by smtp-border-fw-6002.iad6.amazon.com with ESMTP; 02 Mar 2022 15:33:38 +0000
Received: from EX13D03EUC002.ant.amazon.com
 (iad12-ws-svc-p26-lb9-vlan3.iad.amazon.com [10.40.163.38])
 by email-inbound-relay-iad-1a-b27d4a00.us-east-1.amazon.com (Postfix) with
 ESMTPS id DC28D810B9; Wed,  2 Mar 2022 15:33:36 +0000 (UTC)
Received: from EX13D03EUC002.ant.amazon.com (10.43.164.60) by
 EX13D03EUC002.ant.amazon.com (10.43.164.60) with Microsoft SMTP Server (TLS)
 id 15.0.1497.28; Wed, 2 Mar 2022 15:33:35 +0000
Received: from EX13D03EUC002.ant.amazon.com ([10.43.164.60]) by
 EX13D03EUC002.ant.amazon.com ([10.43.164.60]) with mapi id 15.00.1497.028;
 Wed, 2 Mar 2022 15:33:35 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 27be76b3-9a3e-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646235230; x=1677771230;
  h=from:to:cc:date:message-id:references:in-reply-to:
   content-id:mime-version:content-transfer-encoding:subject;
  bh=ibqaci7WSd3i0zZKWuTdO5RE4KcOfudQ884kPSuzPf4=;
  b=A8CYEy2GJvtzKBfHQBx01TiBQgWhNPuzkeLMUx/9FpGavsffTVMu4xKI
   5C4mAzEIy88rKQ7QeNtr7S/AMAICGZgW4YQgbhnhA5KA4LjDGvkLafmSr
   l4KiBEjRP/yOgGsJtqtwI7cV7w0dTfC9lefai61Kl0RatUGbkRnBN1n/d
   A=;
X-IronPort-AV: E=Sophos;i="5.90,149,1643673600"; 
   d="scan'208";a="181121017"
Subject: Re: [PATCH 2/4] livepatch: improve rune for fetching of Build ID
Thread-Topic: [PATCH 2/4] livepatch: improve rune for fetching of Build ID
From: "Doebel, Bjoern" <doebel@amazon.de>
To: Roger Pau Monne <roger.pau@citrix.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: "ross.lagerwall@citrix.com" <ross.lagerwall@citrix.com>,
	"konrad.wilk@oracle.com" <konrad.wilk@oracle.com>, "julien@xen.org"
	<julien@xen.org>, "Andrew.Cooper3@citrix.com" <Andrew.Cooper3@citrix.com>,
	=?utf-8?B?Um9nZXIgUGF1IE1vbm7DqQ==?= <roger.pau@citrrix.com>
Thread-Index: AQHYLkHj9LWrV4sIVU2Vyf7rjRMtcqysSgEA
Date: Wed, 2 Mar 2022 15:33:34 +0000
Message-ID: <041F8844-D0C8-448B-9126-F5B3EADD2B8C@amazon.com>
References: <20220302142711.38953-1-roger.pau@citrix.com>
 <20220302142711.38953-3-roger.pau@citrix.com>
In-Reply-To: <20220302142711.38953-3-roger.pau@citrix.com>
Accept-Language: en-US, de-DE
Content-Language: en-GB
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.43.164.30]
Content-Type: text/plain; charset="utf-8"
Content-ID: <4671759490103F4D9F65A9763A6AB787@amazon.com>
MIME-Version: 1.0
Precedence: Bulk
Content-Transfer-Encoding: base64
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==



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 15:35:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 15:35:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282367.481055 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPR0X-00077C-Hg; Wed, 02 Mar 2022 15:35:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282367.481055; Wed, 02 Mar 2022 15:35:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPR0X-000775-E5; Wed, 02 Mar 2022 15:35:17 +0000
Received: by outflank-mailman (input) for mailman id 282367;
 Wed, 02 Mar 2022 15:35:16 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5HSw=TN=citrix.com=prvs=05368ea7b=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nPR0W-00076x-OS
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 15:35:16 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 595688dc-9a3e-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 16:35:14 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 595688dc-9a3e-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646235315;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=pj0Y4LdJ1nEakHOg/9BV7BcLzHgHTL9R/Sw4x3+t2Oc=;
  b=GFjzjMgaozgG0Dj4ACkrLR9MqQZ298W+fiHE7AoCN1x3x8rnsu6RdlBA
   bKgJ+QTFZfCxkM+DBf8anNssrNVAaz0nZTGjMcNX8VUMd1j+ImZaE+vkU
   vzIxeNQpVo8528EB3AP/tZ3ttlLUh++VOVoetA7RdOKnwUv4NVmArVD8Q
   A=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65309310
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:2lUqXK2VKNMJsfZ2N/bD5SBxkn2cJEfYwER7XKvMYLTBsI5bpzAGn
 WQfD2qOPviLZGeheth2bou3/UsFvMLTn9JlTAA5pC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUw24Dia++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /1Su4K5bBUyLJHs27sfYjJZOWZsEZNvreqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHCOo8Ft24m5jbeFfs8GrjIQrnQ5M8e1zA17ixLNaiDP
 JJIMmM3BPjGS15RIUk1Jo8vpf6PiHbUWBFzrl6Ir5NitgA/yyQuieOwYbI5YOeiWsF9jkue4
 GXc8AzRCBwAKMaWzzbD93u2n/LOhgvyQodUH7q9ntZUh1mUyn0WGQchf1KxqvmkiWazQ9tab
 UcT/0IGtrMu/UamSt38WRyQo3OeuBMYHd1KHIUS+AyLj6bZ/QudLmwFVSJaLswrstcsQj4n3
 UPPmMnmbRRturCITXOW9p+PsCi/fyMSKAcqZzIATAYDy8nupsc0lB2nczp4OPfr1JuvQ2i2m
 m3U6nhl71kOsSIV/7q141nikSm+mriKEQwEzQT9GXCJ0CosMeZJeLeUwVTc6P9BKqOQQV+Ao
 GUIlqCi0QweMX2evHfTGbtQRdlF897AaWSB2gA3Q/HN4hzwoybLQGxG3N1pyK6F2O4gcCShX
 kLcsBg5CHR7bCrzNv8fj25c5q0XIUnc+TbNC6i8gjlmOMEZmOq7EMdGPxT4M4fFyhVErE3HE
 c3HGftA9F5DYUid8BK4Rv0GzZggzT0kyGXYSPjTlkr7j+PAPCbEF+5UajNii9zVCove+m05F
 P4FaqO3J+h3CrWiMkE7D6ZJRbz1EZTLLc+v8JEGHgJyCgFnBHsgG5fsLUAJIORYc1Buvr6Qp
 BmVAxYAoHKm3CGvAVjaOxhLNeK0Nb4i/C1TAMDZFQvxs5TVSd30t/l3mlpeVeRPydGPOtYvF
 6hVI5jbW68XItkFkhxEBaTAQEVZXE3DrSqFPja/YSh5eJhlRgfT/cTjcBep/y4LZhdbf+Nny
 1F8/ms3maY+ejk=
IronPort-HdrOrdr: A9a23:/sc4PqoDnyJrcuCp5PqMXlUaV5uFL9V00zEX/kB9WHVpm5Oj+P
 xGzc526farslsssSkb6K290KnpewK4yXbsibNhcotKLzOWxFdAS7sSo7cKogeQVxEWk9Qy6U
 4OSdkGNDSdNykYsS++2njDLz9C+qjHzEnLv5an854Fd2gDAMsAjzuRSDzraXGeLDM2XqbRf6
 Dsgvav0gDQH0j/Gf7LYUXtMdKzxeHjpdbDW1orFhQn4A6BgXeD87jhCSWV2R8YTndm3aoi2X
 KtqX242oyT99WAjjPM3W7a6Jpb3PH7zMFYOcCKgs8Jbh3xlweTYph7UbHqhkF3nAjv0idprD
 D/mWZlAy1B0QKXQohzm2qq5+DU6kdq15Yl8y7AvZKsm72geNtwMbs/uWsQSGqm16NnhqAn7E
 sD5RPoi3IcZymw7RjV9pzGUQpnmVGzpmdnmekPj2ZHWY9bc7NJq5cDlXklW6voMRiKobzPKt
 MeRP00JcwmBW+yfjTcpC1i0dasVnM8ElOPRVUDoNWc13xTkGpix0UVycQDljNYnahNBqVs9q
 DBKOBlhbtORsgZYeZ0A/oAW9K+DijITQjXOGyfLFz7HOUMOm7LqZTw/LIpjdvaMqAg3d83gt
 DMQVlYvWk9dwbnDtCPxoRC9lTXTGC0TV3Wu7djDlhCy8rBrZbQQF++oQoV4ridSt0kc7jmZ8
 o=
X-IronPort-AV: E=Sophos;i="5.90,149,1643691600"; 
   d="scan'208";a="65309310"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=m7SqQJ/IhdlTEbCiPW6YEjLlArtZTldka9r/o0eo/wiIf3mdlkp5lpFBYlovVZI2UmNvLsIqEzY7UZYXvVkWF4ea1Q1iFWNKWHM9c8T6wpUkvQSgG9PN+FBCzx7Rh1OLui7yCJ+ALk94QdYNcUxZ5VaQV3psOsyrURy5BSEVmEFo9sumxJiIZG3k5QYlGmYFXZjn+/DApwwItdaK2mTaUO7SDj25NOJP/BD/lZ6AqL+In6mKMf8TxZQs/kG5YYONNZMMQhdv/04lksE+9KhEW4cAqW7k3Rm590twGN1GkxD6jlsvgmj8lRfywerpbmzPA3sBsp9uXcdRm4wBnDHfdA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=pj0Y4LdJ1nEakHOg/9BV7BcLzHgHTL9R/Sw4x3+t2Oc=;
 b=jpjfIpzZjHBd1D0lCM50vBPi5TLt3x2uQbMFSIxEtbrX5Ue7BIuYY9x7AHFyFpYBi7uHv6Zw8u1W+I2+bzKu1Y1TAwEivHlvpmIYbbYcbpRfyFo+JzdNg3TvR15wZAz4ih4ye2GKt9bFORVB9ZZfct8Ra8zyaXRcCKe4qNgJlsKg3usZqbQZPFTjuC6jWDQGciiOS6716drSPyc9MDh4vap4uyzeVNca12tt/cjQEjrX8IQIP67axMsPWtUHatGpWpmzq0g/AP291gP9A0xIfwjAYTskDeldt83Nli72OH1J28AzNmDq4Mh0GAplpaM0pCdYVx5JS6XXw+U9/lqG+Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=pj0Y4LdJ1nEakHOg/9BV7BcLzHgHTL9R/Sw4x3+t2Oc=;
 b=T4xtgktQcgBT06+f66Ps+Do+eA9CYZx54FtgIXOs0U24EmTHprhwYuwPtxc+lSiAiQMxhbHpiDewjXNaLo3ZqphFA/VlHQWvrYxvOv3Bpwe5FRUa2XXcgJNhJeoIe4KYQlN04gY1iAJwInmHLjejLOo6En6mUyrQw+05o3SnIYw=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Roger Pau Monne <roger.pau@citrix.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: George Dunlap <George.Dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>, "Volodymyr
 Babchuk" <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH] livepatch: set -f{function,data}-sections compiler option
Thread-Topic: [PATCH] livepatch: set -f{function,data}-sections compiler
 option
Thread-Index: AQHYLjuyHNmMpGp0pEK3C688krS2saysObiA
Date: Wed, 2 Mar 2022 15:35:07 +0000
Message-ID: <b2381496-4dc5-5051-2bf5-9d164041c9c8@citrix.com>
References: <20220302134425.38465-1-roger.pau@citrix.com>
In-Reply-To: <20220302134425.38465-1-roger.pau@citrix.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 23290885-31a7-4fdd-c282-08d9fc623b13
x-ms-traffictypediagnostic: CH0PR03MB5954:EE_
x-microsoft-antispam-prvs: <CH0PR03MB5954E186BBA944DFA02B15EEBA039@CH0PR03MB5954.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(186003)(26005)(38070700005)(110136005)(6512007)(53546011)(2906002)(6506007)(2616005)(86362001)(38100700002)(31696002)(82960400001)(122000001)(54906003)(71200400001)(4744005)(5660300002)(4326008)(31686004)(91956017)(8936002)(508600001)(64756008)(6486002)(66556008)(66446008)(66946007)(66476007)(36756003)(316002)(76116006)(8676002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?WWFhMlA0NG5RcnZYNE5zaXpWSzZWTXcyMHZidzFic05ya3RaMG1Ca24xQk5r?=
 =?utf-8?B?YzdsSHZaK3Myc01nZ0loSVJxZENhZHo1TDJkYURaRWFQOHM2TmM3YXg0MkxX?=
 =?utf-8?B?enhONUpVWDllM3JJYVdzN3crazExTTc5eHRXcURUTUtEWDFHdENaNTY1ckFs?=
 =?utf-8?B?OW9XcllsTm5BSEhnYURPTU5abFNqL25pclVkUStXdlh0RFE2ak9pS3RBQm9D?=
 =?utf-8?B?VkQvVDNJaTNiRkx2TWdHSWU1cEp2UDk2dE5DSEUrT2xVUTAxUUxhZFBzZWY5?=
 =?utf-8?B?ZHRtZmRTbER1czRSSjZ2QWg2bXVMRzdrc0UxeTRndlUxYXlRZCt6Z1YvTHlR?=
 =?utf-8?B?L3pNTU5oT0t0WjZ5cmRueklvRmR4OE96K2QvWDArRkxUSkRXdzNyM1p0eFdi?=
 =?utf-8?B?djZhL1liYW1WUzNYWThMcmNsQmpIUUNsenB5K1o0eVB2TCtLNEMxTXFibzFw?=
 =?utf-8?B?WTlzRTNBbFZZSEhCTW9nemU3Q2JhWEpQUEdIM0RKWm5mUERKK1RONG8wL3Rh?=
 =?utf-8?B?TjIrUlRZVVViWDhNT2xJZ2xWdElLUkZlUUhKNzVtNWhVUmVaU1ZhdDVkb0pD?=
 =?utf-8?B?SUxFdktEUnU4RjZTRjlWK0QxNHJhL1lzVDNnYndOT1Z0Z1MvVnRZMlB4TWRa?=
 =?utf-8?B?VEhMMXU4SDdBZ1ZDT1JqUjF5cHZyOUlHMzJ2ZGpwdVcxYWlsSStSZ3lxakQ4?=
 =?utf-8?B?bDBtb25uc1dSeVZrZVd1OWgzc1IzWmNuRXNaTkFaeXJ0c29oUmRiZ3IxUU5z?=
 =?utf-8?B?b1VUakl0RjUzVFJRbmJqSmVZS3NKNllQU3dhVEV5U050TVVmc0tESVlxRnVr?=
 =?utf-8?B?cVRZREhIVTVSM0w2dFBnU3RUdWE0UkVHVWFwbVBqS0FXK0NGaHcweFMzaURU?=
 =?utf-8?B?aUNHQzdpbytrTkQrN2VxSFRhclY3dHNRNDluRUl2S21jWEdOVG1jbWVHTFV3?=
 =?utf-8?B?VmZzWGNpTHB2eFNCRFFsUnhOL09DZjFxb3NXaTcyRUR3MjVGYXU5VFMwaEJx?=
 =?utf-8?B?NXc0QU5kUldzV2VGTDRaNzB5NDdXd2RFSFUxOXNnUjBCejh0SDdNZHA4YjNM?=
 =?utf-8?B?V3RlODNVQXhVc3BaVHQxRzhaTyszWTZTSTBQUi9HVlNFVG1YYUpyaDRrbitz?=
 =?utf-8?B?WGJhbzJicDl4NnZ2bEtmdjZMcHBUK2VXa2ZScVJpT1FpdS9QRitmOGcwQ1Zq?=
 =?utf-8?B?MDQ2U3FnQjVUb3RqS1VvbGpIcklqZDNRU0VSVVB6MlpYYVR0OTBpK2o4d20y?=
 =?utf-8?B?QnBMeFd0cnAvTW1zbVN2Y0MyaDBST0c3dkx4ZnFVNTJZRDFkdG8zMCtnVXBW?=
 =?utf-8?B?Qys4ZnI2V211cmFRa3RNMVllV3M2RzZkWWc4Tlh1SnpUNlN3TC9XWk4xYnVR?=
 =?utf-8?B?WG41LzFVa2ZZTi8xSGdQaisrT09pZDV6eEtIR2RzM0lFcnpidGVFZ0ZGYTY2?=
 =?utf-8?B?eGRqcE5MeHNxSXZkY1gxdm9xdEs4aUF5ZXJTbXR2STFkM05ZTmpWZmUxNTFC?=
 =?utf-8?B?eFJoZ096Q2wzNlIxZStOQjZla0xTK1JLWWsvSmFFb1F0aTZRUW4xajNCeU9n?=
 =?utf-8?B?TUR0d3E5aHhTMXY0Z0NYWmpwbEljcUEvci9tcmJ0Q0hOZllTQU1FN1ZLVkNl?=
 =?utf-8?B?NGZSSFFma1JVVU4vU1Q1Z2FGZXgvQnJlakYxbUJzZDF0aDJZVEM4ZlNWcWpM?=
 =?utf-8?B?Q1FqUnpjTGk3QzVEdFRzYkhHcjZ0ZWJaTnpOdFdBYk1JVDZJR3djUm5IMS9L?=
 =?utf-8?B?NFl5bzRPMWQyZDZuaHYvMG1tUXpnVVhSK1JDSW5zL3ZBZTRrN1BxWVNLdCsx?=
 =?utf-8?B?MTJDNEZIRFhpTG0rRDU5Y2xKRGtyVEIrVjFwc3QyRVcxQjNLVHNwT2ZUb2w0?=
 =?utf-8?B?aHJOempQYlEvMitxUDBiaW8rM3ZnWEZJRlJ0UzdiSHZJZkNwR2cyempWMGoy?=
 =?utf-8?B?ZHIxZ1FnMTZkSmRjN2Z0V1lIZXMvcTRyb3N1TWg1R3VsTUh1bFFBUjZ1R283?=
 =?utf-8?B?YStpcFNOSk1JQ3dRS1QrWTA2K2I5cUhCODVYRm8rczlianovOEEzUkMrNE9N?=
 =?utf-8?B?VTY4elA4YThuQWx6Ty9DdzVCQ3JueFpkM3RpM0ZaZXZzalZjUlRsdkhlMVJC?=
 =?utf-8?B?WEs3S1BaZmp2T1d0WFRrSU1vSVArNzYvK2NRTC9RLzJRVEFJZ3pNNWY2MzJ2?=
 =?utf-8?B?c1hLUktibkxKOUFNRHd2YVhDdnNKazhId1lTYzlrR3BFbnJBZ2dZQXpUY1Bj?=
 =?utf-8?B?VkZSTzZxSVBKbXVpU1RvMkZCSnVBPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <72454B80150A934AA0FD3674976F1FA8@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 23290885-31a7-4fdd-c282-08d9fc623b13
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Mar 2022 15:35:07.6687
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 9EkGWP3uaTMdPEDeTMHrqQO+9E2FCA7Mq1Zpdx+CPWCLwL7AP6nDZ1DQbZwcIohFWm/UcqxlMKlVa6SDj/yMVfe9Ue+N8HZ/2f8kCVrfD6E=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH0PR03MB5954
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Wed Mar 02 15:41:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 15:41:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282376.481065 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPR6o-0000Pg-7V; Wed, 02 Mar 2022 15:41:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282376.481065; Wed, 02 Mar 2022 15:41:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPR6o-0000PZ-4R; Wed, 02 Mar 2022 15:41:46 +0000
Received: by outflank-mailman (input) for mailman id 282376;
 Wed, 02 Mar 2022 15:41:45 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=sydv=TN=amazon.de=prvs=053930d30=doebel@srs-se1.protection.inumbo.net>)
 id 1nPR6n-0000PT-5I
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 15:41:45 +0000
Received: from smtp-fw-2101.amazon.com (smtp-fw-2101.amazon.com [72.21.196.25])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4264face-9a3f-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 16:41:44 +0100 (CET)
Received: from iad12-co-svc-p1-lb1-vlan2.amazon.com (HELO
 email-inbound-relay-pdx-2c-7d0c7241.us-west-2.amazon.com) ([10.43.8.2])
 by smtp-border-fw-2101.iad2.amazon.com with ESMTP; 02 Mar 2022 15:41:42 +0000
Received: from EX13D03EUC002.ant.amazon.com
 (pdx1-ws-svc-p6-lb9-vlan3.pdx.amazon.com [10.236.137.198])
 by email-inbound-relay-pdx-2c-7d0c7241.us-west-2.amazon.com (Postfix) with
 ESMTPS id 527CF41870; Wed,  2 Mar 2022 15:41:39 +0000 (UTC)
Received: from [10.85.98.33] (10.43.164.197) by EX13D03EUC002.ant.amazon.com
 (10.43.164.60) with Microsoft SMTP Server (TLS) id 15.0.1497.28; Wed, 2 Mar
 2022 15:41:37 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4264face-9a3f-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646235704; x=1677771704;
  h=message-id:date:mime-version:to:cc:references:from:
   in-reply-to:content-transfer-encoding:subject;
  bh=1uk/DSu/NPJuNzMKyaxe3cqibXXxR+rj5TpFZV0/LKE=;
  b=RZbTI3aWoEVH6BBuKyh2aI2g6WJUjMSzo5yOru7yUUBsEIjsdVLWcDGt
   fF5IprU50/kSQwB7v1xgiDnY360VZ+pohUPTEG8tqCQwZiLVTnOoZodQM
   bmpKWG9EWptkg6Zy5JqDWCiT0/vLp8VynTdhdtbpzhwzxQfzAmWlHT5zE
   k=;
X-IronPort-AV: E=Sophos;i="5.90,149,1643673600"; 
   d="scan'208";a="177887057"
Subject: Re: [PATCH 4/4] livepatch: differentiate between old and new build systems
Message-ID: <459241b5-d412-d2e3-0f23-6094db87535a@amazon.de>
Date: Wed, 2 Mar 2022 16:41:36 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.5.1
Content-Language: en-US
To: Roger Pau Monne <roger.pau@citrix.com>, <xen-devel@lists.xenproject.org>
CC: <ross.lagerwall@citrix.com>, <konrad.wilk@oracle.com>, <julien@xen.org>,
	<Andrew.Cooper3@citrix.com>
References: <20220302142711.38953-1-roger.pau@citrix.com>
 <20220302142711.38953-5-roger.pau@citrix.com>
From: "Doebel, Bjoern" <doebel@amazon.de>
In-Reply-To: <20220302142711.38953-5-roger.pau@citrix.com>
X-Originating-IP: [10.43.164.197]
X-ClientProxiedBy: EX13D02EUC004.ant.amazon.com (10.43.164.117) To
 EX13D03EUC002.ant.amazon.com (10.43.164.60)
Precedence: Bulk
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: base64

T24gMDIuMDMuMjIgMTU6MjcsIFJvZ2VyIFBhdSBNb25uZSB3cm90ZToKPiBDQVVUSU9OOiBUaGlz
IGVtYWlsIG9yaWdpbmF0ZWQgZnJvbSBvdXRzaWRlIG9mIHRoZSBvcmdhbml6YXRpb24uIERvIG5v
dCBjbGljayBsaW5rcyBvciBvcGVuIGF0dGFjaG1lbnRzIHVubGVzcyB5b3UgY2FuIGNvbmZpcm0g
dGhlIHNlbmRlciBhbmQga25vdyB0aGUgY29udGVudCBpcyBzYWZlLgo+IAo+IAo+IAo+IERvIG5v
dCBhdHRlbXB0IHRvIG1vZGlmeSB0aGUgYnVpbGQgc3lzdGVtIGlmIENGTEFHUyBhcmUgbm90IHNl
dCBpbgo+IFJ1bGVzLm1rLCBhbmQgaW5zdGVhZCByZWx5IG9uIENPTkZJR19MSVZFUEFUQ0ggYWxy
ZWFkeSBzZXR0aW5nCj4gLWZ7ZnVuY3Rpb24sZGF0YX0tc2VjdGlvbnMuCj4gCj4gU2lnbmVkLW9m
Zi1ieTogUm9nZXIgUGF1IE1vbm7DqSA8cm9nZXIucGF1QGNpdHJpeC5jb20+Cj4gLS0tCj4gVGhp
cyBkZXBlbmRzIG9uIGdldHRpbmcgdGhlIHBhdGNoIHRvIGFkZCAtZntmdW5jdGlvbixkYXRhfS1z
ZWN0aW9ucwo+IHdoZW4gdXNpbmcgQ09ORklHX0xJVkVQQVRDSCBhY2NlcHRlZC4KPiAtLS0KPiAg
IGxpdmVwYXRjaC1idWlsZCB8IDIyICsrKysrKysrKysrKysrLS0tLS0tLS0KPiAgIDEgZmlsZSBj
aGFuZ2VkLCAxNCBpbnNlcnRpb25zKCspLCA4IGRlbGV0aW9ucygtKQo+IAo+IGRpZmYgLS1naXQg
YS9saXZlcGF0Y2gtYnVpbGQgYi9saXZlcGF0Y2gtYnVpbGQKPiBpbmRleCAzOGE5MmJlLi42NTZj
ZGFjIDEwMDc1NQo+IC0tLSBhL2xpdmVwYXRjaC1idWlsZAo+ICsrKyBiL2xpdmVwYXRjaC1idWls
ZAo+IEBAIC05OCwxNCArOTgsMjAgQEAgZnVuY3Rpb24gYnVpbGRfc3BlY2lhbCgpCj4gCj4gICAg
ICAgIyBCdWlsZCB3aXRoIHNwZWNpYWwgR0NDIGZsYWdzCj4gICAgICAgY2QgIiR7U1JDRElSfS94
ZW4iIHx8IGRpZQo+IC0gICAgc2VkIC1pICdzL0NGTEFHUyArPSAtbm9zdGRpbmMvQ0ZMQUdTICs9
IC1ub3N0ZGluYyAtZmZ1bmN0aW9uLXNlY3Rpb25zIC1mZGF0YS1zZWN0aW9ucy8nIFJ1bGVzLm1r
Cj4gLSAgICBjcCAtcCBhcmNoL3g4Ni9NYWtlZmlsZSBhcmNoL3g4Ni9NYWtlZmlsZS5iYWsKPiAt
ICAgIHNlZCAtaSAncy8tLXNlY3Rpb24tYWxpZ25tZW50PTB4MjAwMDAwLy0tc2VjdGlvbi1hbGln
bm1lbnQ9MHgxMDAwLycgYXJjaC94ODYvTWFrZWZpbGUKPiAtICAgICMgUmVzdG9yZSB0aW1lc3Rh
bXBzIHRvIHByZXZlbnQgc3B1cmlvdXMgcmVidWlsZGluZwo+IC0gICAgdG91Y2ggLS1yZWZlcmVu
Y2U9YXJjaC94ODYvTWFrZWZpbGUuYmFrIGFyY2gveDg2L01ha2VmaWxlCj4gLSAgICBtYWtlICIt
aiRDUFVTIiAkWEVOX0RFQlVHICY+ICIke09VVFBVVH0vYnVpbGRfJHtuYW1lfV9jb21waWxlLmxv
ZyIgfHwgZGllCj4gLSAgICBzZWQgLWkgJ3MvQ0ZMQUdTICs9IC1ub3N0ZGluYyAtZmZ1bmN0aW9u
LXNlY3Rpb25zIC1mZGF0YS1zZWN0aW9ucy9DRkxBR1MgKz0gLW5vc3RkaW5jLycgUnVsZXMubWsK
PiAtICAgIG12IC1mIGFyY2gveDg2L01ha2VmaWxlLmJhayBhcmNoL3g4Ni9NYWtlZmlsZQo+ICsg
ICAgaWYgZ3JlcCAtcSAnbm9zdGRpbmMnIFJ1bGVzLm1rOyB0aGVuCgpUaGlzIG1lYW5zIHdlIGFy
ZSBzdGlsbCBicmVha2luZyBsaXZlcGF0Y2ggYnVpbGRzIGZvciBhbGwgWGVuIHZlcnNpb25zIApi
ZXR3ZWVuIHlvdXIgcmVjZW50IHBhdGNoIGFuZCB0aGUgb3JpZ2luYWwgcGF0Y2ggdGhhdCBtb3Zl
ZCBDRkxBR1MgdG8gCnhlbi9NYWtlZmlsZSAoY29tbWl0IDI3NDBkOTZlZmRkMzAwOWY4YWRiNDBh
YWNkYmNmMDVjZmU4ZDFiYmIsIEZyaSBBcHIgCjI0IDE0OjU3OjEwIDIwMjAgKzAyMDApLgoKSXMg
dGhpcyBhY2NlcHRhYmxlPyAoSSBtZWFuLCBubyBvbmUgc2VlbXMgdG8gaGF2ZSBub3RpY2VkLi4u
KQoKPiArICAgICAgICAgIyBTdXBwb3J0IGZvciBvbGQgYnVpbGQgc3lzdGVtLCBhdHRlbXB0IHRv
IHNldCAtZntmdW5jdGlvbixkYXRhfS1zZWN0aW9ucyBhbmQgcmVidWlsZAo+ICsgICAgICAgIHNl
ZCAtaSAncy9DRkxBR1MgKz0gLW5vc3RkaW5jL0NGTEFHUyArPSAtbm9zdGRpbmMgLWZmdW5jdGlv
bi1zZWN0aW9ucyAtZmRhdGEtc2VjdGlvbnMvJyBSdWxlcy5tawo+ICsgICAgICAgIGNwIC1wIGFy
Y2gveDg2L01ha2VmaWxlIGFyY2gveDg2L01ha2VmaWxlLmJhawo+ICsgICAgICAgIHNlZCAtaSAn
cy8tLXNlY3Rpb24tYWxpZ25tZW50PTB4MjAwMDAwLy0tc2VjdGlvbi1hbGlnbm1lbnQ9MHgxMDAw
LycgYXJjaC94ODYvTWFrZWZpbGUKPiArICAgICAgICAjIFJlc3RvcmUgdGltZXN0YW1wcyB0byBw
cmV2ZW50IHNwdXJpb3VzIHJlYnVpbGRpbmcKPiArICAgICAgICB0b3VjaCAtLXJlZmVyZW5jZT1h
cmNoL3g4Ni9NYWtlZmlsZS5iYWsgYXJjaC94ODYvTWFrZWZpbGUKPiArICAgICAgICBtYWtlICIt
aiRDUFVTIiAkWEVOX0RFQlVHICY+ICIke09VVFBVVH0vYnVpbGRfJHtuYW1lfV9jb21waWxlLmxv
ZyIgfHwgZGllCj4gKyAgICAgICAgc2VkIC1pICdzL0NGTEFHUyArPSAtbm9zdGRpbmMgLWZmdW5j
dGlvbi1zZWN0aW9ucyAtZmRhdGEtc2VjdGlvbnMvQ0ZMQUdTICs9IC1ub3N0ZGluYy8nIFJ1bGVz
Lm1rCj4gKyAgICAgICAgbXYgLWYgYXJjaC94ODYvTWFrZWZpbGUuYmFrIGFyY2gveDg2L01ha2Vm
aWxlCj4gKyAgICBlbHNlCj4gKyAgICAgICAgIyAtZntmdW5jdGlvbixkYXRhfS1zZWN0aW9ucyBz
ZXQgYnkgQ09ORklHX0xJVkVQQVRDSAo+ICsgICAgICAgIG1ha2UgIi1qJENQVVMiICRYRU5fREVC
VUcgJj4gIiR7T1VUUFVUfS9idWlsZF8ke25hbWV9X2NvbXBpbGUubG9nIiB8fCBkaWUKPiArICAg
IGZpCj4gCj4gICAgICAgdW5zZXQgTElWRVBBVENIX0JVSUxEX0RJUgo+ICAgICAgIHVuc2V0IExJ
VkVQQVRDSF9DQVBUVVJFX0RJUgoKQmpvZXJuCgoKCkFtYXpvbiBEZXZlbG9wbWVudCBDZW50ZXIg
R2VybWFueSBHbWJICktyYXVzZW5zdHIuIDM4CjEwMTE3IEJlcmxpbgpHZXNjaGFlZnRzZnVlaHJ1
bmc6IENocmlzdGlhbiBTY2hsYWVnZXIsIEpvbmF0aGFuIFdlaXNzCkVpbmdldHJhZ2VuIGFtIEFt
dHNnZXJpY2h0IENoYXJsb3R0ZW5idXJnIHVudGVyIEhSQiAxNDkxNzMgQgpTaXR6OiBCZXJsaW4K
VXN0LUlEOiBERSAyODkgMjM3IDg3OQoKCg==



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 15:47:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 15:47:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282385.481077 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPRC7-0001Qh-Um; Wed, 02 Mar 2022 15:47:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282385.481077; Wed, 02 Mar 2022 15:47:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPRC7-0001Qa-RU; Wed, 02 Mar 2022 15:47:15 +0000
Received: by outflank-mailman (input) for mailman id 282385;
 Wed, 02 Mar 2022 15:47:14 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LB9Y=TN=citrix.com=prvs=0530a50c4=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nPRC6-0001QU-Dz
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 15:47:14 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 0615fc1c-9a40-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 16:47:12 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0615fc1c-9a40-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646236033;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=eWoL7UDnr+ihWShPPBPohlYN5Bdv4KC6XwMw/0KfhW4=;
  b=OTbRdJNRordlgdoQRdNrt3uMey6RdsZAdb7tv5JpN1jAbRT5pxv29RzL
   U2A+JldKtV9Qugpxk3foqTKrEl5ET3nS+0XQHs0OfmVf+ypCNOhSFIkux
   r1oSQ7zVAI+UdXbO1/yfiB3tgSKOaXPvL0C8Y3i8pmO9b8bchJtuapw+I
   U=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67627776
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:4fp476vUfLCwsjqhOvP3UxnaPOfnVKJeMUV32f8akzHdYApBsoF/q
 tZmKWCDP66NZmL0L9x2aN628U1VupDRzIBnGgNtpXw0EiwT+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jV4
 4upyyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi8FHrbov88PVyVFGntwfpIX1o3KIV2W5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AO
 JRDNmUwMnwsZTVOJ2VOOYw7g9zyqVj+Kw9ktE6xnoUetj27IAtZj+G2bYu9lsaxbc9YhFqCr
 2TKuWHwGAgHNce3wCCAtHmrg4fnoyT/X44DEayiwdRjilaT2287BQUfUB2wpvzRol6zXZdTJ
 lIZ/gIqrLMu7wq7Q9/lRRq6rXWY+BkGVLJ4DOkS+AyLjK3O7G6xBGIJUzpAY9wOr9ItSHoh0
 Vrht9H0AT1itpWFRHTb8a2bxRupIjQcJ2IGYS4CTCMG7sPlrYV1iQjAJuuPC4bs0IezQ2uph
 WnX8m5u3N3/kPLnyY2X3UvjpBm+oqTUR1Q7pTqGcFCo7iZQMdvNi5OT1XDX6vNJLYC8R1aHv
 WQZl8X20N3iHa1hhwTWHrxTQejBC+KtdWSF3AUxR8VJGyGFpib7Fb289g2SM6uA3iwsXTbyK
 HHetgpKjHO4FCv7NPQnC25d5ilD8EQBKTgHfq2MBjatSsIoHONiwM2ITRTKt4wKuBJx+ZzTw
 b/BLa6R4Y8yUMyLNgaeSeYHyqMMzSsj327VTp2T5035jeTHOibNGOlcYQHmggUFAEWs+l+9H
 zF3bZbi9vmieLemPnm/HXA7dzjm0kTX9bip8pcKJ4Zv0yJtGX07Cu+5/F/SU9cNokihrc+Rp
 ivVchYBkDLX3CSbQS3XOiELQO6+Bv5X8CNkVRHAyH71ghDPl670t/xBH3b2FJF6nNFeIQlcF
 KFUK53dWa0UElwqOV01NPHAkWCrTzzy7SqmNCu5ejkvOZlmQg3C4Nj/eQXzsiIJC0KKWQEW+
 dVMCiuzrUI/ejlf
IronPort-HdrOrdr: A9a23:MHZ7TavR6tTR/bbOMn3acnrp7skCmoMji2hC6mlwRA09TyXGra
 +TdaUguSMc1gx9ZJhBo7G90KnpewK6yXdQ2/hqAV7CZnichILMFu9fBOTZsl/d8kHFh4tgPO
 JbAtVD4b7LfCZHZKTBkXCF+r8bqbHtmsDY5ts2jU0dNT2CA5sQkDuRYTzrdHGeKjM2YabQQ/
 Gnl7Z6TnebCD0qR/X+IkNAc/nIptXNmp6jSRkaByQ/4A3LqT+z8rb1HzWRwx9bClp0sPwf2F
 mAtza8yrSosvm9xBOZ/2jP765OkN+k7tdYHsSDhuUcNz2poAe1Y4ZKXaGEoVkO0amSwWdvtO
 OJjwYrPsx15X+UVmapoSH10w2l6zoq42+K8y7tvVLT5ejCAB4qActIgoxUNjHD7VA7gd162K
 VXm0qEqpt+F3r77WjAzumNcysvulu/oHIkn+JWpWdYS5EiZLhYqpFa1F9JEa0HADnx5OkcYa
 RT5fnnlbhrmG6hHjHkVjEF+q3tYp1zJGbNfqE6gL3b79AM90oJjHfxx6Qk7wI9HdwGOtt5Dt
 //Q9RVfYF1P74rhJ1GdZQ8qOuMexvwqEH3QRSvyWqOLtB0B5uKke+z3IkI
X-IronPort-AV: E=Sophos;i="5.90,149,1643691600"; 
   d="scan'208";a="67627776"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=mF9FOsK0xUCvHfsMQVgfsaPZso9/WzbZRHGTB+Ta58SKhtg28NRQ6ZY9fFa0n9btDZ1DN3AO/KYnFUO4zMQ/TpbYSOe14vzuIzR9it9ElAhUWrIL19ki8xJjX3/aBHOW4z2z/8LuEYBfg/uD01OwWjHWz/ZTlAc0/9kf/PgiqkhQPZh7s/nkK7kQWNn2rTvAjJoUpjVrMRJx49E5xElM19rPm1QGJYsRDB4AfJr1zfSWW0JZIiXwukXEjbOv4LWYd+BEXNTJRjSMo9s1PqzIlgO7xFzfqszud/Spo4/dmx33LfOB7eD0fwiAEMKbvMxVVCemhxq5XvJdTjM89cr8hw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=iXEjprna9Jcvu5WW2tEEXwGRoTegWZp6yiwvPEdU6Uw=;
 b=AjTn6PXVxRylaOObRJ73zk64z/mqjYSXgYkQWTd/BIoFBUcSfY44RSSB0HyqEANeJUcE2sz7g2iT270fwACuvsM6laxBA3IE7Gg52exlPLTe56KWDpkclgAnsgfoqSzWNCrqWpWZG7XSDqVPiTR6yswDj8goOw8VBCJnRmh2PQf8KPht6B+SUc0SkasPtj4pb4EKRk6L1V/cHnMcKp5t3kWXtbJTMqZVZ9pJYSz8QJ3VZaacjZYaw4M2qu1CUxfJtZTqLoTnsGyoVIVedvJuyJ7D3Urhi1JleHWZNGZHiYJDen30hYLVsCwfMnbhc0LF61uVF1TAtiRe9+0Atv6Qsw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=iXEjprna9Jcvu5WW2tEEXwGRoTegWZp6yiwvPEdU6Uw=;
 b=SmgHrNdp6aECngpBf0wvcGfrDoL3kC8i4jTkr6lltZWnod83vBtkzAZ3JhCM70ktN7BC75tB4ZOsAkaufECWkeEJ7yQj8GD+mD/EPEGo0G3/PAydXJcatf0YA1ynRDOKhUTlVmWJr+r/oUN5UVjD5uNRS6kp0vYESWaYqsoKQkU=
Date: Wed, 2 Mar 2022 16:46:56 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH] livepatch: set -f{function,data}-sections compiler option
Message-ID: <Yh+RcFLjrtLk/ixx@Air-de-Roger>
References: <20220302134425.38465-1-roger.pau@citrix.com>
 <f67e599d-4dfc-c98e-75ee-8510237cd527@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <f67e599d-4dfc-c98e-75ee-8510237cd527@suse.com>
X-ClientProxiedBy: LO4P265CA0073.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:2bd::6) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: aaaafc78-43fd-422b-b748-08d9fc63e4b8
X-MS-TrafficTypeDiagnostic: SN6PR03MB4032:EE_
X-Microsoft-Antispam-PRVS: <SN6PR03MB40323E91C90E668B6B69C1BA8F039@SN6PR03MB4032.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(8676002)(66476007)(5660300002)(2906002)(66946007)(66556008)(8936002)(26005)(186003)(85182001)(83380400001)(6486002)(508600001)(6916009)(54906003)(6512007)(9686003)(82960400001)(33716001)(53546011)(38100700002)(4326008)(86362001)(6666004)(316002)(6506007);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?WnE0SHJZc1NxWjhLRXowT3NEdzVOZ1k0bmZ6TmwrYVZJUjhxeDB6S0h4Rm5i?=
 =?utf-8?B?anZCWWxEKzNyLzFwYWgvZ0MzaUwyallwN21vcFBFSy91ZEx4TVBsSm9CWlhw?=
 =?utf-8?B?dEZXa2MvSWVaUHV3Q04xaE1MeitmTW5ZWE1DR3RtaGVsS2Z1dlB0aEZKQ1kz?=
 =?utf-8?B?ZDdEQnpkaUxVUFh6VHBoT0dPdUhrdmZqUndjcHloNnhzMndNSXhzRWdzWkQ5?=
 =?utf-8?B?K3ZPWjZLdVpENFROeUY3L3A5emxpMHBTQVJ2c2pNeGZ2VGtKLzJvTi9qOExD?=
 =?utf-8?B?THhUREZWckUrc1huRDJvQU9ZK2xyUUJqdHAwK2VxaVdocjVOU3VSRngrSnlR?=
 =?utf-8?B?M3FXVWI4SjFPNXFRN3R0ZkE4eStrdWxWL0NDNUMycE8wZDc4a0RkUU1pS1Vl?=
 =?utf-8?B?czRPK24rcFhLY2pwVVFxSU0zRGgxR3dZMHU1TkdQcHJsVisrR0ttSE1EYjJz?=
 =?utf-8?B?TFhCeEJZaENHTy93ZzIwNlhWeFMrNmpEY1JsNS8yUVg0VnpDVmhjTXhaOGIx?=
 =?utf-8?B?VHhSSEduMzA2NTdBMm5CYmpoT1hNbjVQdnMyc0t4d1lEeGRmK1ltaWdob2VS?=
 =?utf-8?B?WTVDTXpZZTdIMGRyNTVETFgvWnJJQWRONE9LaUlUdFRsYUtQbXpuREVGa2F2?=
 =?utf-8?B?RWlxejlKR2FOdTREYkdHc0d2cENzOENIOE5uZFFpdEFWQlZ3WjN0U0EwRlZt?=
 =?utf-8?B?OUlYZitMNDZCdWNSR1JET1lEaTFGb1A4cDR5ZzdxV1IrZzg2UTYzQlM4Q1Mx?=
 =?utf-8?B?ZmlFektocU8wRFVmQlpsZXNOVkVLT21ZUWZldmMxcHRUZml5RTdWUUVEYTN5?=
 =?utf-8?B?cEtPOENpNCtMOVd0bEgwZDBMTWhKK3g1dHVSSE5zWXdXTFpsS3hONVRreG0y?=
 =?utf-8?B?NjVCTE14RkU1MmJHd0x6NDdHeHRUMUFQeTJLMlpacmdrSmxvSUt1YVlwSzNK?=
 =?utf-8?B?RzZuU25JRFRycjdCS2J2QWd0M21RaTBTV2k1WG5PcU9GUmpKd0RQclpoVXl6?=
 =?utf-8?B?S3BrTWNROERrWE1TYnN2RCtlMkRaODQyUXlLY2FUR2RYQUJEU2pyT2RTUWc0?=
 =?utf-8?B?R1FGaENQblN1Z0JjOVFaa2FHYjZnUXJHTGdpVjFKR0k3YitRem8vOXdrcVA4?=
 =?utf-8?B?NEI0WDNRVXVtcGE5TXlZRzl0SHBEQ21adDJUM2pVdTJXeDJwMHY4R1Z0WEtX?=
 =?utf-8?B?LzJPTFZYZUlpNWphcUkrVmRHYkVkZnMxc2daTVd3NmMyMndxNXRoWENRVmJ6?=
 =?utf-8?B?R2dNSFdqOWFvd1lOWGcvLzVYRGZXSVQrTHZSdkpwLzJ4QkNYUEs0Yzc5Q3V3?=
 =?utf-8?B?czdFNGVmV1JPaHdSd1BNQnlZRTRkaVZ1RFVDYS8yekwwbVdReUtYSWs3ZnNR?=
 =?utf-8?B?ZXFzU0pXR2dhSGhHRHRKbHFPVUd1QlQ4cm4rYnV0eVZRdWM2TG81a1dTSDM0?=
 =?utf-8?B?aURjTzBKTEpLQ08vd2N5ZGJlakxhQjAzOUxVQWtINGo1SDdHWlRpRDVyWXdT?=
 =?utf-8?B?QU5UR3NNU1VZbVY1Wklzc2I5SEx4S3I5dUt6QU1WSE9HaDFiRWJMN204MlJn?=
 =?utf-8?B?VzFoeWlnLzhPTFN1UVg3Q1Bmb1p1QmhDdmlpbjl4cy9aNFJzTmpUNVZpVzhF?=
 =?utf-8?B?cndJQlBrVmpad1ZFdEtVbHdQRXVPKy95V0xZeU5WSmx6UkJWdkVTeHJpV1dT?=
 =?utf-8?B?TGFvVmlVU0hkRnZUZndVQTBiTkM5RlBYRlBwWGRyUzBJZzdhS3NVUU9iVG4y?=
 =?utf-8?B?NmJoQUQ3ODFDMmw0Tkxrek5PSVVBNkJSOUdWdTJGU1JIK1dZQ1pBZnMxa2tt?=
 =?utf-8?B?cjQrMzFuWitObHBXbHlSZVNNaml1bmc3R28xZEpqSVU1enBVa3VOUzRGUW9D?=
 =?utf-8?B?bHdzMjFqc2NyOWhRb3JObnljNFRZWTJ3Q0crNjczV1ZjWUlrRExFUGg1dmgx?=
 =?utf-8?B?Q2tDRGhOcHM3QjRoa201YkgxbDl0OXZYMFJvNU5QVXdORE5BcUlnQ2ZjbGVO?=
 =?utf-8?B?Rnl3bjJoUG54Q2ppakh2WTdxc3Q5OGs0OUlGQkJsZ2RGcTNYRTZMZHpPY29D?=
 =?utf-8?B?Rlhqd1JHaGV6aUFkbHBHUG11VVdBVzZwUmZua1dHVzFQZk1LUFlObWp3N3dw?=
 =?utf-8?B?WTlKeXNWYjJ2aGZmd0hjeHBjYU44YlVadjlBaU90eDJuWCt3UmZtcnA1TFdM?=
 =?utf-8?Q?8Qr9cVz1T5rYWRs87ip/DsE=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: aaaafc78-43fd-422b-b748-08d9fc63e4b8
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 15:47:02.0158
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: gdDqZvfxT1jZBKV4kSNl2E0/ZO4Qseb3ooAEAcXsGRORoVGlv/Uia6Ard8RMOIWhWLt/wX9Vl4GjyDzDeV0rUQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR03MB4032
X-OriginatorOrg: citrix.com

On Wed, Mar 02, 2022 at 03:41:21PM +0100, Jan Beulich wrote:
> On 02.03.2022 14:44, Roger Pau Monne wrote:
> > If livepatching support is enabled build the hypervisor with
> > -f{function,data}-sections compiler options, which is required by the
> > livepatching tools to detect changes and create livepatches.
> > 
> > This shouldn't result in any functional change on the hypervisor
> > binary image, but does however require some changes in the linker
> > script in order to handle that each function and data item will now be
> > placed into its own section in object files. As a result add catch-all
> > for .text, .data and .bss in order to merge each individual item
> > section into the final image.
> > 
> > The main difference will be that .text.startup will end up being part
> > of .text rather than .init, and thus won't be freed. Such section only
> > seems to appear when using -Os, which not the default for debug or
> > production binaries.
> 
> That's too optimistic a statement imo. I've observed it appear with -Os,
> but looking at gcc's gcc/varasm.c:default_function_section() there's
> ample room for this appearing for other reasons. Also you don't mention
> .text.exit, which will no longer be discarded.
> 
> > --- a/xen/Makefile
> > +++ b/xen/Makefile
> > @@ -269,6 +269,10 @@ else
> >  CFLAGS += -fomit-frame-pointer
> >  endif
> >  
> > +ifeq ($(CONFIG_LIVEPATCH),y)
> > +CFLAGS += -ffunction-sections -fdata-sections
> > +endif
> 
> Perhaps
> 
> CFLAGS-$(CONFIG_LIVEPATCH) += -ffunction-sections -fdata-sections
> 
> ?

Sure.

> > --- a/xen/arch/x86/xen.lds.S
> > +++ b/xen/arch/x86/xen.lds.S
> > @@ -88,6 +88,9 @@ SECTIONS
> >  
> >         *(.text.cold)
> >         *(.text.unlikely)
> > +#ifdef CONFIG_LIVEPATCH
> > +       *(.text.*)
> > +#endif
> 
> This coming after the "cold" and "unlikely" special sections and
> ahead of .fixup isn't very nice. Also from looking at the linker
> scripts ld supplies I'm getting the impression that there could/
> would then also be e.g. .text.cold.* and .text.unlikely.* which
> you'd want to separate.
> 
> We may want to put the entry point in a special .text.head, put
> that first, and then follow ld in putting cold/unlikely stuff ahead
> of main .text.

I can give that a try.

> For the reason given in the description I can see why a conditional
> is warranted here. But ...
> 
> > @@ -292,6 +295,9 @@ SECTIONS
> >         *(.data)
> >         *(.data.rel)
> >         *(.data.rel.*)
> > +#ifdef CONFIG_LIVEPATCH
> > +       *(.data.*)
> > +#endif
> >         CONSTRUCTORS
> >    } PHDR(text)
> >  
> > @@ -308,6 +314,9 @@ SECTIONS
> >         . = ALIGN(SMP_CACHE_BYTES);
> >         __per_cpu_data_end = .;
> >         *(.bss)
> > +#ifdef CONFIG_LIVEPATCH
> > +       *(.bss.*)
> > +#endif
> 
> ... are these two really in need of being conditional?

Will drop if you agree. I didn't want to risk introducing unwanted
changes in the !CONFIG_LIVEPATCH case.

> > --- a/xen/common/Kconfig
> > +++ b/xen/common/Kconfig
> > @@ -353,7 +353,9 @@ config CRYPTO
> >  config LIVEPATCH
> >  	bool "Live patching support"
> >  	default X86
> > -	depends on "$(XEN_HAS_BUILD_ID)" = "y"
> > +	depends on "$(XEN_HAS_BUILD_ID)" = "y" && \
> > +	           $(cc-option,-ffunction-sections) && \
> > +	           $(cc-option,-fdata-sections)
> 
> Is this for certain Clang versions? Gcc has been supporting this in
> 4.1.x already (didn't check when it was introduced).

I've checked clang and it seems to be prevent in at least Clang 5,
which is likely enough?

I've added the check just to be on the safe side.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 15:48:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 15:48:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282391.481088 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPRD2-0001z6-8u; Wed, 02 Mar 2022 15:48:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282391.481088; Wed, 02 Mar 2022 15:48:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPRD2-0001y6-5W; Wed, 02 Mar 2022 15:48:12 +0000
Received: by outflank-mailman (input) for mailman id 282391;
 Wed, 02 Mar 2022 15:48:11 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPRD1-0001xf-Qj; Wed, 02 Mar 2022 15:48:11 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPRD1-0002vB-Mn; Wed, 02 Mar 2022 15:48:11 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPRD1-000704-4l; Wed, 02 Mar 2022 15:48:11 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPRD1-0001LL-4L; Wed, 02 Mar 2022 15:48:11 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=mZb0C0Yzcc6M4DD7GPLHhcSUVwbiBgGU9Qrq8NJMZGU=; b=woPvMkMMbHYMp1NJuKsRtypIIH
	j19vYQfrREoO3QtnqdQ7zwrRWz15pOGq7K9X6ifXKVMCOyzkUMjDVLeW8zoOREYJyLKgHuj/2d/r8
	wDosQFsdMAxbfLxUIXd3woKLSV+M2yLKNyF2ZSj4Zcxyx4DvnMCEB1k3JE3+Q2X3XeIs=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168326-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168326: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-freebsd11-amd64:guest-start/freebsd.repeat:fail:heisenbug
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=fb184c4af9b9f4563e7a126219389986a71d5b5b
X-Osstest-Versions-That:
    linux=575115360652e9920cc56a028a286ebe9bf82694
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 02 Mar 2022 15:48:11 +0000

flight 168326 linux-linus real [real]
flight 168338 linux-linus real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168326/
http://logs.test-lab.xenproject.org/osstest/logs/168338/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-freebsd11-amd64 21 guest-start/freebsd.repeat fail pass in 168338-retest

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168306
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168306
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168306
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168306
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168306
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168306
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168306
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168306
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass

version targeted for testing:
 linux                fb184c4af9b9f4563e7a126219389986a71d5b5b
baseline version:
 linux                575115360652e9920cc56a028a286ebe9bf82694

Last test of basis   168306  2022-03-01 20:09:49 Z    0 days
Testing same since   168326  2022-03-02 06:22:48 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Lai Jiangshan <jiangshanlai@gmail.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Marc Zyngier <maz@kernel.org>
  Mark Brown <broonie@kernel.org>
  Oliver Upton <oupton@google.com>
  Paolo Bonzini <pbonzini@redhat.com>
  Ricardo Koller <ricarkol@google.com>
  Sean Christopherson <seanjc@google.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             fail    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   575115360652..fb184c4af9b9  fb184c4af9b9f4563e7a126219389986a71d5b5b -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 15:51:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 15:51:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282404.481098 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPRGO-0003TF-UY; Wed, 02 Mar 2022 15:51:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282404.481098; Wed, 02 Mar 2022 15:51:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPRGO-0003T8-RP; Wed, 02 Mar 2022 15:51:40 +0000
Received: by outflank-mailman (input) for mailman id 282404;
 Wed, 02 Mar 2022 15:51:39 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LB9Y=TN=citrix.com=prvs=0530a50c4=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nPRGN-0003T1-81
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 15:51:39 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a3fed988-9a40-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 16:51:37 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a3fed988-9a40-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646236297;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=/YOCe5K3tQIXUPWQ1qMihfC3Au6yPpUOdn+IZy8nftQ=;
  b=Zw/7aCffPIgEJuEDyhMvdF8JtqDNtpw9vx9S305YbdZolF+MFFIJVx6p
   UwSjmpElC3ejQJpqkwyeRgog0JONAo/SXoF7Xi34mGWecGeYstDW0np8M
   CYkOFetRCRDHcyrjFIbhElF6BhdDptGbiUMKdffYvG5sAOoZ17jT8F8uy
   g=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 64772009
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:CdZL5qKna0rAAFe0FE+R+pUlxSXFcZb7ZxGr2PjKsXjdYENS0GEBn
 2NLDDvUbKuONDemf4gjOdjkoU1UsZ+BztBmHQNlqX01Q3x08seUXt7xwmUcns+xwm8vaGo9s
 q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUYYoAQgsA148IMsdoUg7wbRh2dYy2YPR7z6l4
 rseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3fMldG0DQUIhMdtNWc
 s6YpF2PEsE1yD92Yj+tuu6TnkTn2dc+NyDW4pZdc/DKbhSvOkXee0v0XRYRQR4/ttmHozx+4
 Md0vrC9VSw7Bb3Nl9sESCt/PgNAPJQTrdcrIVDn2SCS50jPcn+qyPRyFkAme4Yf/46bA0kXq
 6ZecmpUKEne2aTmm9pXScE17ignBNPsM44F/Glp0BnSDOo8QICFSKLPjTNd9Gls2Z8URa6PD
 yYfQSEzYAyHIABpBmg8N80R3/vxg1/kaTIN/Tp5ooJoujOOnWSdyoPFM93TYNWGA9pUmkWwo
 XjP9GD0RBodMbS3yyeB83+qrv/Cm2X8Qo16PLG/+/RnhHWaw2UBDxtQWVbTiem0jAuyVsxSL
 2QQ+zEytu4i+UqzVN7/Uhak5nmesXYht8F4SrNgrlvXk+yNvljfVjNsoiN9hMIOpvY9aTE2/
 U2yj9LmOiV0gpq4a0ycz+LBxd+tAhQ9IWgHbC4CaAIK5dj/vY0+5i7yosZf/L2d1YOsR2ypq
 9yehG1n3uhI05ZXv0mu1Q2f21qRSo71ohnZD+k9dkas9UtHaYGsfOREAnCLvK8bfO51orRs1
 UXoevRyDshTVflhdwTXGY3h+Y1FAd7falUwZnY1QvEcG8yFoSLLQGypyGgWyL1VGsgFYyT1R
 0TYpBlc4pReVFPzM/MpOtzpU5V0lPm6fTgAahwyRoAUCnSWXFXalByCmGbKhzy9+KTSuftX1
 WinnTaEUi9BVPUPIMueTOYBy747rh3SNkuILa0XOy+PiOLEDFbMEO9tGALXMogRsfPVyC2Io
 o03H5bblH1ivBjWP3C/HXg7dgtRcxDWxPne9qRqSwJ0ClE+STF5VqSImutJlk4Mt/09q9okN
 0qVAydw4FH+mWfGOUONbHViY6noRpFxsTQwOilEALpi8yVLjVqHhEvHS6YKQA==
IronPort-HdrOrdr: A9a23:yh+3Fav2Fve8YyUn2nYyJQUC7skDWNV00zEX/kB9WHVpm5Sj5q
 STdYcgpHjJYVcqKQsdcL+7WJVoLUmwyXcx2/h1AV7AZniahILLFvAA0WKK+VSJcEfDH6xmpM
 VdmsNFZ+EYeGIasS+M2meF+rgbrOVvu5rY49s2h00dND2Dfclbnn9E4yigYzZLeDU=
X-IronPort-AV: E=Sophos;i="5.90,149,1643691600"; 
   d="scan'208";a="64772009"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=M6xHYHx/g3ewSPetgZBV9FMuMwvaSUG8PON+ltxmPypusIeiq+fly8gkKYT2YUur5R/4GoSLj5gCTCDT4S4oL0YGOj8Qcy+8FZothtnLRc8I2ZH/7GZiWk2AHwQ0K53Gf1q6gVj1WzGTDKunnijta7jWi8fiQNcEfnsb8j2YWy3uHUvSzHY2Ex+yBtOVd4qDsKMB4DyHkbJjKfAaJdKheu+e3G7fKAEhXPsTqLo5OLG6jMmS2juBl95nsEupWbTWYH3y2eQa9ye1e96VSkME2ArbMd6/Md4aIBTKttZ0QeTxh5Tu6ccWg1bOmvTJv2uv469sb6681+NwzEJbEZO36w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=tp7BP6YDX7sYiHsbnawkPE+zGuVmcllsQOjveyqMa0o=;
 b=OvIfXr7ckNPIByUqtrqveMg/UUOezTSE/2CmCzHr1WPshxC6g32uXANl8GidgFQhNo9Snn180IDTfpTyc1zCgCeQAjk+3CutRTDE8Jn/y/21okobe0NtGDPq0S7ayd/ScNYpi9KYctqF/P4Ompxgb4Ti5Zay1JqMp8kopUkqDeo90BDk2ofo+z9coJCBLpPyTEMAMNTrlGhJaiy+IMH2aq/1ZlHzjvsNrDTf5h9ae2XfiSYiWbxlrNS9y7uSVF614q7d8vpLfZeREdpYpEvvK3UhXfYXzxxL2YM9+osmO//4xLd8P/t3mLbjCQQx7iv+Hb27cTFfsSuhDSsR5sfPRQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=tp7BP6YDX7sYiHsbnawkPE+zGuVmcllsQOjveyqMa0o=;
 b=QPuRQoiGwtIBV1ItBzusaCifrBFVUda5RfWnD4g1T2fAA5S1CkLjxYKx5RhcBjAOgfWeFEWObqrF5Na7vGuBTBAGQe5WtuV1vOuoF2Hn0Ld0fHBasST1aA7tbku715YfKtQFUiT3aQXZHFidy1NlEwet45uodiaOtnBgmrHRpfo=
Date: Wed, 2 Mar 2022 16:51:29 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: "Doebel, Bjoern" <doebel@amazon.de>
CC: <xen-devel@lists.xenproject.org>, <ross.lagerwall@citrix.com>,
	<konrad.wilk@oracle.com>, <julien@xen.org>, <Andrew.Cooper3@citrix.com>
Subject: Re: [PATCH 4/4] livepatch: differentiate between old and new build
 systems
Message-ID: <Yh+SgYboLD1u8U0Q@Air-de-Roger>
References: <20220302142711.38953-1-roger.pau@citrix.com>
 <20220302142711.38953-5-roger.pau@citrix.com>
 <459241b5-d412-d2e3-0f23-6094db87535a@amazon.de>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <459241b5-d412-d2e3-0f23-6094db87535a@amazon.de>
X-ClientProxiedBy: LO4P123CA0311.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:197::10) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 4af408f1-ac5f-49f0-7c88-08d9fc648655
X-MS-TrafficTypeDiagnostic: SA1PR03MB6451:EE_
X-Microsoft-Antispam-PRVS: <SA1PR03MB64516D2FDEA972DB4F1156918F039@SA1PR03MB6451.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(82960400001)(6506007)(6666004)(53546011)(186003)(26005)(107886003)(83380400001)(9686003)(6512007)(33716001)(85182001)(86362001)(66476007)(66946007)(66556008)(8936002)(8676002)(4326008)(5660300002)(38100700002)(316002)(6916009)(2906002)(6486002)(508600001)(67856001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?QXJoOWJqNHo3R3dPb2cwbm9wcS9rUE10TGU2UmtoY2pJY0paZ1lRVCt1c0Vw?=
 =?utf-8?B?bGlUTWdLMTJEWWtZZjZoc2dFUU5jYmMyQjZVZCtZS1kxYVVSaEFYYytHSEtU?=
 =?utf-8?B?aVh0cTZTTENOL3VCTzhOVWRDVDN4VzJRSHN5NEEyMUlXTHZQbjltckphZjQ4?=
 =?utf-8?B?QUc4TDhobGVIZ0YrTXdJSGl6ZFZuRVlQTXl6L2hvblUxZUFDdkxDcE1YamND?=
 =?utf-8?B?WnpCbHlMbDQ2YXdRY3pkMllMZ0tkMHdkM2d3VWN4dFd4R0U1MkJJOWZWY09S?=
 =?utf-8?B?M3pwbm5rNTBaQzdvVDhJVXljVHBZVTd2QTdFeHMyaTBNSGxpaklrMXFrKzQ1?=
 =?utf-8?B?VzE1VG1VUUxTY2d0UW1NMkMrMDVGZDZmSkxUZm1jQnVzeEVvQlBOUTJpQ0k1?=
 =?utf-8?B?TGptVlg3aWxvSG0rdWdSMkhPRHdzeHVya2ozS2hOMlZEWmRZb1o5Y2RTVVdK?=
 =?utf-8?B?MmlXdWFSTzhCamdxVU1TVSswalc1VllpdXFCVlh4K05hSWFaWTBITW5XU2Zr?=
 =?utf-8?B?RHBMTTVmY3htc2l5WUVpVjluWGNRM0Z1WjRYbVF6Qnc3SVlNdFhLRDFubStz?=
 =?utf-8?B?Sk14YVpweXc1Y2dkUUdIQ3NYY3JXMFBzcVBrS3lnVnpsS3ZwTEpxdVYrdVo1?=
 =?utf-8?B?ckx0dU4wUFpzMHREN2ZVNkFFUFZOMDNBZk5jcERyQ1RraW1EUEpEeTF2eHVP?=
 =?utf-8?B?ajZGNkJkTzY0ZVFmVTVVRmEwY2VyVTdSbnV5K1B4RTBlYStrQU04YklmUEFo?=
 =?utf-8?B?cGFYTXlMVTRCSS9VMFdRUmw2UU56bTRMaUNLOWR4dk5DL1NtL2VjaFVTdXF5?=
 =?utf-8?B?U1N2ZWdyR3daQlVhK25yMVozSWRxb3ZFSFNEWDJLWGxMOTl4bG9lYWljNVBw?=
 =?utf-8?B?QnA5bXMzVkYrUkFkdUl2YWxPci93TFl0R3hoNFZHLzhrQVhFVGUxZ1B3ZXZZ?=
 =?utf-8?B?b3pPNmJsSllRMW1IQzd5d3ZHcnYxSTRudm96M2hmMVkwcmpWYzI0RGF0TzUy?=
 =?utf-8?B?VlYvUXEzL0VabjlzMmZvUURod0ZrRnZRelo4NDEzWXVMRld3TGZ6RHViUXBu?=
 =?utf-8?B?ZG1LUVkzZ1p6RTQ2QmxtOWMxU252b2o2RWJIeElGalNseUtxUmQyS1FLRzdo?=
 =?utf-8?B?WUNBczdJWG9DaTVMNDlRU0dNNlo5RG02WTdRTGxBbEJMQ0hLRXR0MG5Ycld6?=
 =?utf-8?B?Q01kMkg3OXlKNDExN2FtK3UyeHFBZUtoeXNWTVNRMGIzckdWamhwN1RMeE5V?=
 =?utf-8?B?cEE2U2kvckNhOGttVktHK2Q2RnpXNDRIaU82bllCQnBvT1hKYnhud2FLMWJp?=
 =?utf-8?B?NW5tS2Rxb25lUlEvb1ZUcGZGckUrZUIwNUpIcEdTVkJXRnYvOFcyNjZNUEdq?=
 =?utf-8?B?bTdzRDhrUzYxb3NPbDZGSmVDRW02Rkt6T2NzZlRDamk3QmtFdDRxR29MVm5O?=
 =?utf-8?B?M1hHOWY2UXVid25qdU9vcERSNUtlWGh6N1BpZlczUVhOMU1UNmZPVC9tVTUv?=
 =?utf-8?B?Z2prejBZRGFMNXBTbnBmL05qRUhuQzR4dUlnVVdNeDRtcTZ5L0lhZDNrNWtC?=
 =?utf-8?B?ejBzNnpaMHhnVUFoRDZDb05USmVRWE51Mmk4L3pGWmdTM3luRnFaYTVCRjF6?=
 =?utf-8?B?dTYzTVZXcFdFK2M5a05VcldTTmxWelRxMHN5d1pVM1N4OFhUUWlDTHJoUi9B?=
 =?utf-8?B?eld5ZlZKcXhsenAvRVIrejZEUk9HbHNjRWRqQjNuMlIzM1JnS2t0aXdKeVp5?=
 =?utf-8?B?ZG5qOFlOczUxZm8rWmtOZWlaVWI2VkhxcUY5Ulc4VFhGN2tIREdvZHVsYlNL?=
 =?utf-8?B?YnlTbm5rSDZ1Y29XYXAzOURaaFhlb3JYWkdWc2g0Z3F1RDl3QVJqWmlab3NQ?=
 =?utf-8?B?T0x0bFM1NGp1T0NkNUpXS3YveTZsUDBvYUx3SnhacXIxVHNWMjJiMEhKRStT?=
 =?utf-8?B?Q1Q5elA3QVZvNHNMc3RXN3N0WWV4QnhRRmx6bmJYQ0owd3NpQkRienRSWk0w?=
 =?utf-8?B?R1VBVTBVOXhRc2JIc0IwcEVsL1lCamdFVXVwcVYzVTc2UDZhT0lLdHp0WjV4?=
 =?utf-8?B?cU1kZ3E2WlRiQjdWaG9RZ0EwZk5yakVSRFc3Nk9MQWpCN25pcVBQQzZ0c0Mz?=
 =?utf-8?B?Z3pJZ3p1Vk9DdWJmd2pZV2pwVXhZc0dIQWVXbDQ0anhWQWtyVVVaYjJtZzlV?=
 =?utf-8?Q?y0feLbD2FEo8yDGM0ymp1fg=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 4af408f1-ac5f-49f0-7c88-08d9fc648655
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 15:51:33.2501
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: latmaGpQ2V01dB+qWsXKBi0StrcArP0Lmc8rb2RTblbUwVICkmwMtKehN9zHeTiCYNXjmhDA7eEfk2ALX7h69A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR03MB6451
X-OriginatorOrg: citrix.com

On Wed, Mar 02, 2022 at 04:41:36PM +0100, Doebel, Bjoern wrote:
> On 02.03.22 15:27, Roger Pau Monne wrote:
> > CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you can confirm the sender and know the content is safe.
> > 
> > 
> > 
> > Do not attempt to modify the build system if CFLAGS are not set in
> > Rules.mk, and instead rely on CONFIG_LIVEPATCH already setting
> > -f{function,data}-sections.
> > 
> > Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
> > ---
> > This depends on getting the patch to add -f{function,data}-sections
> > when using CONFIG_LIVEPATCH accepted.
> > ---
> >   livepatch-build | 22 ++++++++++++++--------
> >   1 file changed, 14 insertions(+), 8 deletions(-)
> > 
> > diff --git a/livepatch-build b/livepatch-build
> > index 38a92be..656cdac 100755
> > --- a/livepatch-build
> > +++ b/livepatch-build
> > @@ -98,14 +98,20 @@ function build_special()
> > 
> >       # Build with special GCC flags
> >       cd "${SRCDIR}/xen" || die
> > -    sed -i 's/CFLAGS += -nostdinc/CFLAGS += -nostdinc -ffunction-sections -fdata-sections/' Rules.mk
> > -    cp -p arch/x86/Makefile arch/x86/Makefile.bak
> > -    sed -i 's/--section-alignment=0x200000/--section-alignment=0x1000/' arch/x86/Makefile
> > -    # Restore timestamps to prevent spurious rebuilding
> > -    touch --reference=arch/x86/Makefile.bak arch/x86/Makefile
> > -    make "-j$CPUS" $XEN_DEBUG &> "${OUTPUT}/build_${name}_compile.log" || die
> > -    sed -i 's/CFLAGS += -nostdinc -ffunction-sections -fdata-sections/CFLAGS += -nostdinc/' Rules.mk
> > -    mv -f arch/x86/Makefile.bak arch/x86/Makefile
> > +    if grep -q 'nostdinc' Rules.mk; then
> 
> This means we are still breaking livepatch builds for all Xen versions
> between your recent patch and the original patch that moved CFLAGS to
> xen/Makefile (commit 2740d96efdd3009f8adb40aacdbcf05cfe8d1bbb, Fri Apr 24
> 14:57:10 2020 +0200).
> 
> Is this acceptable? (I mean, no one seems to have noticed...)

I've also wondered. I think a reasonable approach would be for
interested parties (ie: using livepatch) to backport the commit that
sets -f{function,data}-sections in their Xen build for that broken
window.

I think we could also consider it as a candidate for backport to
stable branches, but that won't fix versions we have already
shipped.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 15:56:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 15:56:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282412.481110 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPRKc-000474-HP; Wed, 02 Mar 2022 15:56:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282412.481110; Wed, 02 Mar 2022 15:56:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPRKc-00046x-Co; Wed, 02 Mar 2022 15:56:02 +0000
Received: by outflank-mailman (input) for mailman id 282412;
 Wed, 02 Mar 2022 15:56:01 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5HSw=TN=citrix.com=prvs=05368ea7b=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nPRKb-00046r-8k
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 15:56:01 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4008e297-9a41-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 16:55:59 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4008e297-9a41-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646236559;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=Gm3wwbiISZCoda9GpT6wD0gAiqyct7+qGSdyQx3eVUg=;
  b=RQFEJFVofQRFlVYVF2xB7lwGQ4l9ZcSE7TwZzZRJiDsjCQYN6yYi0AvK
   GnsC7vfowaQnnKPp/bgBb35GJE5NUUNwvKp3ZdjYw8fBbM/siKqwqt5gE
   oYubYZgpdunFCxO1OCjyq0O0Pjtmx5+aUdG9OTBNxMqkwuVVbJLRBqcbQ
   I=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65722028
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:J49Ftak+o6RZWqQ31iZ468Do5gy3JkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xIeW2jSOayPYjHzfIhzb4Sw8R9Qu8PXnYRhTFQ4qCozESMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiW1nV4
 rsenuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYaCYyJerT3+4nWUcHCgtdDKRL/4bpCC3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3k3ds1zzGS90hRojOWf7i7t5ExjYgwMtJGJ4yY
 uJHNGU1NkyaM3WjPH9GF5sVgLulj0Cvah17qVW1lfRovTTqmVkZPL/Fb4OOJ43iqd9utkWfo
 HjP8yLmAxUZHNuFwDGB/zSngeqntSHmXIMfEpWo+/gsh0ecrkQfDxAcWF+TqPywmEm4Hd5SQ
 2QE9yxroaUs+UiDStjmQwb+sHOCpgQbWddbD6s98g7l90bPy1/HXC5eFGcHMYF48p9tLdA36
 rOXt/LIHicor/qfc3jDqa6+jgK7NC8sA0ZXMEfoUjA5y9XkpYgyiDfGQdBiDLO5g7XJJN3g/
 9yZhHNg3utO1Kbnw43+pAma2Gz0+vAlWyZovl2/Y46z0u9uiGdJjaSM4EOT0/tPJZ3xorKp7
 CldwJj2AAzj4PiweM2xrAclQenBCxWtamS0bbtT838JrW7FF5mLJ9043d2GDB01WvvogBewC
 KMphStf5YVIIFyhZrJtboS6BqwClPa8S427DqiFMIMfOPCdkTNrGgk0PyZ8OEi3zSARfVwXY
 8/HIa5A815AYUiY8NZGb7hEiuJ6rszP7WjSWYr633yaPUm2PxaopUM+GALWNIgRtfrcyC2Mq
 oo3H5bamn13DbylCgGKoNF7ELz/BSVibXwAg5cMLbDrz8sPMDxJNsI9Npt6I901x/kOz7yQl
 px/M2cBoGfCabT8AVziQlhoaa/1XIY5qnQ+PCc2Ok2v1WRlaoGqhJrzvbNtFVX73ISPFcJJc
 sQ=
IronPort-HdrOrdr: A9a23:VtZ3SahU3BvWWBsbYOZL4QAmcHBQXt4ji2hC6mlwRA09TyX+rb
 HIoB17726RtN91YhodcL+7VJVoLUmyyXcX2+ks1NWZMjUO0VHAROsO0WKI+VzdMhy72ulB1b
 pxN4hSYeeAaGSSVPyKgzVQxexQouW6zA==
X-IronPort-AV: E=Sophos;i="5.90,149,1643691600"; 
   d="scan'208";a="65722028"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=QzxeH899AWirUGWS7X1tM+Krki4chAzLD9DGKACu/jkgU19aMeIQyt8qixU4yzd2wVEFmvACAY/fhYz9SSqX4a9jJZyVHjaibn52O3iz8iseW09H5A5tEg4mtnA2eD5RxBA1Jc0pGbyWAX2VK6sQqfNYEN1GWQbIk9aGzbaPr/sx5M5H3Y1wOaiU59rps9zaAekXkb7efQ3RDmIgV6+mEtm2oIgwnqH7hER5Kp3T7dG/J68lKkl7ZyvYyxrac74UpiTmWtsa9Mx3F7bojWsNGJryDnhtUks7rhsDk+7R3tqhzjz8h1hA6iq2SzBYdgZ/RxBVWgMH6Gek7/XMuMezLA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Gm3wwbiISZCoda9GpT6wD0gAiqyct7+qGSdyQx3eVUg=;
 b=P/YTuCX8I5CvBJt1fV1lNs/eT9Z8e7FU03+TPMdVlcgfYSezFnNrh/ixOI58qSmqS0j4Jn/r7Vk+Vbx81ycdcWyP+PHrsGM1wYKG8muSY/qYg3ZkRvob4aDLdiHQvxcKpO8hqMvUPPtkhwL3eGsMHzqVfm8vLfTgu9kqRxlVSv8IUXVpw/8GGZg1Yp9WaJ3c1zXCs6Ww2EA47lSOvp1d/3lOl5PnYu6hrmne81Wx3ClXRjTJ0On5JY+ALmJgFbCbxJaSi2ySES0h6sq8PdNoXnym3WR5iC+N1wzlK/dCBNGTLQ+3sjMqUTGLTV+mpBeeAb3RQONRUR12lSdS5q1sjg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Gm3wwbiISZCoda9GpT6wD0gAiqyct7+qGSdyQx3eVUg=;
 b=aEqI+IypFQW77w7rpdHJKq+Nmk/CclTT+YQBu91oD6NF3n3y4bktzUYx6x4O5M1wm44s2YRIQn8ArruheGivdV3SgYAR2k4oBtdHOhdXZiK5IUVaz3NSYL0VJ07uHwgtJn4i6qW9Cp9WoFbyZHxUMx0iEO0Y/Ua6j2r9irX7agE=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: "Doebel, Bjoern" <doebel@amazon.de>, Roger Pau Monne
	<roger.pau@citrix.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Ross Lagerwall <ross.lagerwall@citrix.com>, "konrad.wilk@oracle.com"
	<konrad.wilk@oracle.com>, "julien@xen.org" <julien@xen.org>
Subject: Re: [PATCH 4/4] livepatch: differentiate between old and new build
 systems
Thread-Topic: [PATCH 4/4] livepatch: differentiate between old and new build
 systems
Thread-Index: AQHYLkHgSrb/iAL0mEi291/GjB3zE6ysO3wAgAAD/YA=
Date: Wed, 2 Mar 2022 15:55:54 +0000
Message-ID: <437bce05-a3c4-8177-0a58-fb9ead961231@citrix.com>
References: <20220302142711.38953-1-roger.pau@citrix.com>
 <20220302142711.38953-5-roger.pau@citrix.com>
 <459241b5-d412-d2e3-0f23-6094db87535a@amazon.de>
In-Reply-To: <459241b5-d412-d2e3-0f23-6094db87535a@amazon.de>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 6b408463-e6a1-4d49-3a9f-08d9fc652214
x-ms-traffictypediagnostic: CY1PR03MB2250:EE_
x-microsoft-antispam-prvs: <CY1PR03MB22500EF3610A9754E7F4CD3EBA039@CY1PR03MB2250.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(86362001)(36756003)(2616005)(71200400001)(6512007)(31696002)(4326008)(31686004)(2906002)(6486002)(508600001)(5660300002)(83380400001)(26005)(8936002)(186003)(316002)(54906003)(122000001)(6506007)(8676002)(38100700002)(110136005)(91956017)(82960400001)(66476007)(64756008)(38070700005)(66946007)(66556008)(66446008)(53546011)(76116006)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?LzR0c1lVZUtBRTl0bEhNVkF2MTUwWWttZ1BiRHRvSGVzSGRsT1Z2N0lrWitp?=
 =?utf-8?B?Q01vem1ZR2Z3cE1CUUkzMXdCdTdvS0tVc0VmWTZwYTBEQmd4Q0lmMmF6Wk9C?=
 =?utf-8?B?YTlKbEhpbzc1SDNUSEw5ZmJsbmdndEZoSGdyOWY0cXJybXBrM25Cc09EbTVC?=
 =?utf-8?B?NlpNcFJkSWpITXlzUkZKTUJSUnNiTmFNOGprQ2pFaWtpeEE1Y0l4V1J6dnJG?=
 =?utf-8?B?QlE0MENOVVBReDErTjA2UmVZaVhaVUw4NGIyWHR6a2M3aHhwUjYvMnVqZERm?=
 =?utf-8?B?OGJ3bllaS2N4Z0t2V29JYmpRaXB2bWU1KzhtMEw0WjdLVjBmZk5wdUZjbWpI?=
 =?utf-8?B?dWdtbFMwQ1E1YkJSOVg2N0NPY282RW0wbXVOd3phQlZhOVVqVTlJY1MxQlVJ?=
 =?utf-8?B?NHpIUkJtYnF1RHJXQWh2a3drYzFuS3ZLYm5WRkU5UmVYYTFsMkU4VnY3N24z?=
 =?utf-8?B?RVBjODRRaGpoU3YrYzVJOE1BQ3VEV1VweC9UWHpNNTJHNCtVc2NLUVdTVi9I?=
 =?utf-8?B?R092Ylo5V0ZHbHpiUTdMemRlaE9FeG82RVdVTURNM2pzYXA3aFNiNFY1L0hx?=
 =?utf-8?B?djVFVzlvWmg3VXB3OWFaazhINkRtQ2hEcEVjU2o5ZE1zNmorNU1aYTk1K2Rz?=
 =?utf-8?B?cFIrZThzOFg0SnU2c0J5akU1RWk1M01LeGZHK25jZm1lUmd4TXc2OG1NNC84?=
 =?utf-8?B?bG5TVVA1ekRtWSsvVU1JcXl1dzdLRXhGcytFQkpBVFg3RFE0TGlROWVoVDJW?=
 =?utf-8?B?NGVacmllUDN1OVBzTHpIZW51am1WNXBzSXkwK2tnVTJrazlsQzU0N2pHRzdE?=
 =?utf-8?B?eGpoam4rQkJHTlVkZi9BN21VclhRZFJpQWxMOFdtcFR5NWhGbFpIdUtuQmRO?=
 =?utf-8?B?aE5WS3g3c0tNbkV1M09CVlZMUmFQZGRRRlVVMlRNY292Uk9lZ1BzWGNvYlJO?=
 =?utf-8?B?Y2lOcjkvN3lYUlVPckFtT2lpb3Q4RDUzc3BMaGFjRnBIVStHMmc3cEFwQUJw?=
 =?utf-8?B?RHZ5UWR0WmxMM3VXSjA5dkl6SzdnOXFmUGNoYWRocERDd2hTNjBFcFhBT1Mz?=
 =?utf-8?B?ZERSQm94UjdlbWcxTWUxVENKTVZwR3I5VGdnWjBVZTZQRW4vdXNhdHRyRlRo?=
 =?utf-8?B?Vm5vRjFyaU1ZMGxiMlR3azErY2V5a0J1aFRYMmdkUVlmTHJKcEZGUjhrcjJC?=
 =?utf-8?B?ZE9pMFhOK2E1T0hMOUczRkttZHFCVzllVnY5Q1dXZUxOK05Jc3A4OTR2bStm?=
 =?utf-8?B?TUxqNlJZdWNCRXZHaEJORWU0a25FR1BoL0NSSHBwNUY5QWxkUk1HcjlXcHF3?=
 =?utf-8?B?NW1hZEZ2RS9HK092SHo0YlhOdTFXUmkxZTNNMUs5R2RRcXZZMnhYaUJYWEQx?=
 =?utf-8?B?N0FBcWpBdzI1Nnc1dGtTOTBlV3IzOU9HblZZUWJ0VDlTWU8xcjBBWmg0ME9D?=
 =?utf-8?B?ZFpKU2txZy9tRWxmYnlSUDZ6VmZTUld6TGJnWnFuMml3MGxRRHhwT0xqMGJX?=
 =?utf-8?B?eFVvUEhYVW1abUp1Z0hCdmZmWEVyOEUrZUNxNkFDcFp6Z0FkM04yL3Q2SXRE?=
 =?utf-8?B?MlU0Mkx1MGNudkswUnA2SjJUcm92ZEhVeVRZN0RxcmRaQ3ltT0Z1WStXYkFF?=
 =?utf-8?B?Yjk0OTd3SkNVOHAyZmsxODJwdWFrZzVPazBlVzgrdElDRHQxamxTVWtNVW10?=
 =?utf-8?B?eGRwQlNwKysyUXUvUWFCSEk5OGtWb0pYdmtDclJObVl5Mi95NmdRT1AxVDhw?=
 =?utf-8?B?dmdXRHBxREhYR2NYTlNEWEpEMzNLRnp6aysxWnBnbDExbWR4S1lRMmtJMEhv?=
 =?utf-8?B?Mk1ZcXJ6amZyTU03anJpcGlwKzA0UTBTcWEwN1dVZUpVM0plY1ZoZVVXLzVx?=
 =?utf-8?B?V0pXWld0VmF1MTBvY0RIWkFKYzBvR0dGbHNlSzE5dHNPbitaZk96dGxJT1Ax?=
 =?utf-8?B?cHpYMVAwZFRMbUtlMmhXUFJaQTA1V2xqWVVhNUtaUWVGOW9LQWErdlhjVGJV?=
 =?utf-8?B?VnZDRmo4MFpSVGw1eDdJSHorZ2czRHRJMFE2L282QzJ6M1NvMERCUjdNY0NH?=
 =?utf-8?B?S2RmMk8yZ0J2b0s1VGprZHJmN1A5NnNkWE5pcWpjSmoySExCWENSejVrR25S?=
 =?utf-8?B?SmQ0TDRMZCt0ZTg5UG9QaHRMS1gyU0kzYlBjM0VKVXROREs4WmJjRDROS1Nv?=
 =?utf-8?B?L3Izb0FUR0ZTU2hLNFU2aTV3eFZFdHB0QndOMHZFYkFZckN5Nk82Mi9VdEd3?=
 =?utf-8?B?ZS9VQTc0SlpaOVMydmVvbDdnWXZBPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <7FA05D7961391E40BE4D827D9A6940E7@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6b408463-e6a1-4d49-3a9f-08d9fc652214
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Mar 2022 15:55:54.2033
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: RNJXyqCR5Q7gRET4OW8nDmfiz6/eSP7drB2DTj367GPnTGdMYVsKc3KdxfMgulP2RtePwp2k0P1dQPOoEpxGI+rUlfg2X2KDyg2BfEhLJjI=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY1PR03MB2250
X-OriginatorOrg: citrix.com

T24gMDIvMDMvMjAyMiAxNTo0MSwgRG9lYmVsLCBCam9lcm4gd3JvdGU6DQo+IE9uIDAyLjAzLjIy
IDE1OjI3LCBSb2dlciBQYXUgTW9ubmUgd3JvdGU6DQo+PiBDQVVUSU9OOiBUaGlzIGVtYWlsIG9y
aWdpbmF0ZWQgZnJvbSBvdXRzaWRlIG9mIHRoZSBvcmdhbml6YXRpb24uIERvDQo+PiBub3QgY2xp
Y2sgbGlua3Mgb3Igb3BlbiBhdHRhY2htZW50cyB1bmxlc3MgeW91IGNhbiBjb25maXJtIHRoZSBz
ZW5kZXINCj4+IGFuZCBrbm93IHRoZSBjb250ZW50IGlzIHNhZmUuDQo+Pg0KPj4NCj4+DQo+PiBE
byBub3QgYXR0ZW1wdCB0byBtb2RpZnkgdGhlIGJ1aWxkIHN5c3RlbSBpZiBDRkxBR1MgYXJlIG5v
dCBzZXQgaW4NCj4+IFJ1bGVzLm1rLCBhbmQgaW5zdGVhZCByZWx5IG9uIENPTkZJR19MSVZFUEFU
Q0ggYWxyZWFkeSBzZXR0aW5nDQo+PiAtZntmdW5jdGlvbixkYXRhfS1zZWN0aW9ucy4NCj4+DQo+
PiBTaWduZWQtb2ZmLWJ5OiBSb2dlciBQYXUgTW9ubsOpIDxyb2dlci5wYXVAY2l0cml4LmNvbT4N
Cj4+IC0tLQ0KPj4gVGhpcyBkZXBlbmRzIG9uIGdldHRpbmcgdGhlIHBhdGNoIHRvIGFkZCAtZntm
dW5jdGlvbixkYXRhfS1zZWN0aW9ucw0KPj4gd2hlbiB1c2luZyBDT05GSUdfTElWRVBBVENIIGFj
Y2VwdGVkLg0KPj4gLS0tDQo+PiDCoCBsaXZlcGF0Y2gtYnVpbGQgfCAyMiArKysrKysrKysrKysr
Ky0tLS0tLS0tDQo+PiDCoCAxIGZpbGUgY2hhbmdlZCwgMTQgaW5zZXJ0aW9ucygrKSwgOCBkZWxl
dGlvbnMoLSkNCj4+DQo+PiBkaWZmIC0tZ2l0IGEvbGl2ZXBhdGNoLWJ1aWxkIGIvbGl2ZXBhdGNo
LWJ1aWxkDQo+PiBpbmRleCAzOGE5MmJlLi42NTZjZGFjIDEwMDc1NQ0KPj4gLS0tIGEvbGl2ZXBh
dGNoLWJ1aWxkDQo+PiArKysgYi9saXZlcGF0Y2gtYnVpbGQNCj4+IEBAIC05OCwxNCArOTgsMjAg
QEAgZnVuY3Rpb24gYnVpbGRfc3BlY2lhbCgpDQo+Pg0KPj4gwqDCoMKgwqDCoCAjIEJ1aWxkIHdp
dGggc3BlY2lhbCBHQ0MgZmxhZ3MNCj4+IMKgwqDCoMKgwqAgY2QgIiR7U1JDRElSfS94ZW4iIHx8
IGRpZQ0KPj4gLcKgwqDCoCBzZWQgLWkgJ3MvQ0ZMQUdTICs9IC1ub3N0ZGluYy9DRkxBR1MgKz0g
LW5vc3RkaW5jDQo+PiAtZmZ1bmN0aW9uLXNlY3Rpb25zIC1mZGF0YS1zZWN0aW9ucy8nIFJ1bGVz
Lm1rDQo+PiAtwqDCoMKgIGNwIC1wIGFyY2gveDg2L01ha2VmaWxlIGFyY2gveDg2L01ha2VmaWxl
LmJhaw0KPj4gLcKgwqDCoCBzZWQgLWkNCj4+ICdzLy0tc2VjdGlvbi1hbGlnbm1lbnQ9MHgyMDAw
MDAvLS1zZWN0aW9uLWFsaWdubWVudD0weDEwMDAvJw0KPj4gYXJjaC94ODYvTWFrZWZpbGUNCj4+
IC3CoMKgwqAgIyBSZXN0b3JlIHRpbWVzdGFtcHMgdG8gcHJldmVudCBzcHVyaW91cyByZWJ1aWxk
aW5nDQo+PiAtwqDCoMKgIHRvdWNoIC0tcmVmZXJlbmNlPWFyY2gveDg2L01ha2VmaWxlLmJhayBh
cmNoL3g4Ni9NYWtlZmlsZQ0KPj4gLcKgwqDCoCBtYWtlICItaiRDUFVTIiAkWEVOX0RFQlVHICY+
DQo+PiAiJHtPVVRQVVR9L2J1aWxkXyR7bmFtZX1fY29tcGlsZS5sb2ciIHx8IGRpZQ0KPj4gLcKg
wqDCoCBzZWQgLWkgJ3MvQ0ZMQUdTICs9IC1ub3N0ZGluYyAtZmZ1bmN0aW9uLXNlY3Rpb25zDQo+
PiAtZmRhdGEtc2VjdGlvbnMvQ0ZMQUdTICs9IC1ub3N0ZGluYy8nIFJ1bGVzLm1rDQo+PiAtwqDC
oMKgIG12IC1mIGFyY2gveDg2L01ha2VmaWxlLmJhayBhcmNoL3g4Ni9NYWtlZmlsZQ0KPj4gK8Kg
wqDCoCBpZiBncmVwIC1xICdub3N0ZGluYycgUnVsZXMubWs7IHRoZW4NCj4NCj4gVGhpcyBtZWFu
cyB3ZSBhcmUgc3RpbGwgYnJlYWtpbmcgbGl2ZXBhdGNoIGJ1aWxkcyBmb3IgYWxsIFhlbiB2ZXJz
aW9ucw0KPiBiZXR3ZWVuIHlvdXIgcmVjZW50IHBhdGNoIGFuZCB0aGUgb3JpZ2luYWwgcGF0Y2gg
dGhhdCBtb3ZlZCBDRkxBR1MgdG8NCj4geGVuL01ha2VmaWxlIChjb21taXQgMjc0MGQ5NmVmZGQz
MDA5ZjhhZGI0MGFhY2RiY2YwNWNmZThkMWJiYiwgRnJpIEFwcg0KPiAyNCAxNDo1NzoxMCAyMDIw
ICswMjAwKS4NCj4NCj4gSXMgdGhpcyBhY2NlcHRhYmxlPyAoSSBtZWFuLCBubyBvbmUgc2VlbXMg
dG8gaGF2ZSBub3RpY2VkLi4uKQ0KDQpTbyB5ZWFoIC0gbm90IHB1dHRpbmcgdGhpcyBpbnRvIE9T
U1Rlc3QgaGFzIGhhZCBleGFjdGx5IHRoZSBmb3JzZWVuIG91dGNvbWUuDQoNClRoZSBzdGVwcyBu
b3cgYXJlIHRvIHVuYnJlYWsgaXQgYnkgd2hhdGV2ZXIgbWVhbnMgYXJlIG5lY2Vzc2FyeSwgdGhl
bg0KZ2V0IENJIGluIHBsYWNlIHNvIHdlIGNhbid0IHJlZ3Jlc3MgaXQgYWdhaW4uDQoNClRoZSB0
aXAgb2YgbGl2ZXBhdGNoLWJ1aWxkLXRvb2xzIHNob3VsZCB3b3JrIHdpdGggYWxsIHZlcnNpb25z
IG9mIFhlbi7CoA0KSWYgdGhpcyBtZWFucyB3ZSBuZWVkIHRvIGJhY2twb3J0IGZpeGVzIGludG8g
dGhlIHN0YWdpbmctKiBicmFuY2hlcywNCnRoZW4gc28gYmUgaXQuDQoNClRoZSBkb3duc3RyZWFt
IHVzZXJzIG9mIGxpdmVwYXRjaGluZyBoYXZlIHBhdGNocXVldWVzIGFueXdheSwgYW5kIHRoZXNl
DQpicmVha2FnZXMgYXJlIG5vdCB0aGUga2luZCBvZiB0aGluZyB3aGljaCBjb3VsZCBzbGlwIHRo
b3VnaCBldmVuIGEgdG9rZW4NCnRlc3RpbmcgYXR0ZW1wdC4NCg0KQXMgZmFyIGFzIHRoaXMgaXNz
dWUgZ29lcywgSSBzdWdnZXN0IHRoYXQgd2UgZG8gd2hhdCB3ZSBjYW4gdG8gYXZvaWQNCmxpdmVw
YXRjaC1idWlsZC10b29scyBuZWVkaW5nIHRvIGRvIHN1cmdlcnkgbGlrZSB0aGF0IG9uIHRoZSBi
dWlsZA0Kc3lzdGVtLCB0aGVuIGJhY2twb3J0IGl0IGV2ZXJ5d2hlcmUuwqAgVGhlIGFib3ZlIGlz
IHRoZSBraW5kIG9mIGZyYWdpbGl0eQ0Kd2hpY2ggcmVhbGx5IHNob3VsZG4ndCBleGlzdCA6LS8N
Cg0KfkFuZHJldw0K


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 16:09:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 16:09:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282419.481121 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPRXS-0006lL-Mf; Wed, 02 Mar 2022 16:09:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282419.481121; Wed, 02 Mar 2022 16:09:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPRXS-0006lE-JW; Wed, 02 Mar 2022 16:09:18 +0000
Received: by outflank-mailman (input) for mailman id 282419;
 Wed, 02 Mar 2022 16:09:17 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=cGAx=TN=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPRXR-0006l8-9W
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 16:09:17 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 1bbc13ee-9a43-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 17:09:16 +0100 (CET)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur02lp2055.outbound.protection.outlook.com [104.47.4.55]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-26-bdrnTJ4eNVi5eUKVwytlsw-1; Wed, 02 Mar 2022 17:09:14 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by HE1PR04MB3227.eurprd04.prod.outlook.com (2603:10a6:7:1a::16) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.25; Wed, 2 Mar
 2022 16:09:13 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Wed, 2 Mar 2022
 16:09:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1bbc13ee-9a43-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646237355;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=XZykFcKb3JJr/peGJH2wR36sZrRVU6Oip/yrt7jtnrY=;
	b=mIA1cfK9pydb06x9GP3jhtrMQXZKRGc7TN4odwywUvfXfAzyqI90nxkXprszkvHItFKL+h
	4ODN86zrchK4DNmmHR9vnar/8GR4eVIaHKTc7YdGyL8cdOpX6lN3HXriIjbOENbyAhUcpc
	tUc3QZyKpnXnW0rLXOcaJEkei5xjfpU=
X-MC-Unique: bdrnTJ4eNVi5eUKVwytlsw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=K+M2QGEZNvDXOpaKo48VUMruwLMnbvjcsTeBGxME5jB6RtsMOaj2IQNwpDO5IPJd5kctnFNFGAYfcLBbvD5/cB0jabuVJ1JRP0dweGcMi+1CofFLPYY5Xl6EvYEEUi5wfKfArs4a4Nbg1SfuToNaA4lJpGmug0GAbs1KzvHeKyEVAYTXtRWzeiQKY5Islfx1RsYuq5APQrJglUIkpJNEEusH3ERDOv5eHMo6+brxbfOoGsP87rhk6TT4Ee5Apk3jPo9Ez8qDrGEbr8Za+wpV4SZcQr24CQ2YlJsxF5aPtoJK0Rpyy3ji50rD8/C9Ee91ySoUuInb7/DThNlKBFGcJQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=nQNCvubhZW4ZvndGWUbmmG7haHcJKGdcAU+Z1OTWR0Y=;
 b=JoMRap4r6vFzodH4aIj1WmkBAc4riS4mIjdt2idAFkC41u3uaJQ5WzjHwAPLyuYpujDKF0/g9ax65Gmh6wCSY+eNeBPpsFxhdvnEQiV26cD+E1hx5CaZVllFE2vnCgjaEkyZ/Cu7fdQbBWMuWATXCcgMpKmZbNfUM1enrhhy5EwlQ9PITIkU0a5Y2Ddm8TEybWGkMJsWqvm/t1cju7cC/rEM8UoU6F5UQKonNyEZRrr7+uFIOg2MxYsWz5Ummd9zq3/SUjq+mtba0xsmo49z/NKvTcLWf8gNWZk6XtO5n5vSVibD1f8aghKUeIXbqA5T2A5DB3mE3y9+G3a3/sOfSg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <4636a0d9-a96f-fa7b-3e08-595420b506e4@suse.com>
Date: Wed, 2 Mar 2022 17:09:10 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] livepatch: set -f{function,data}-sections compiler option
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 xen-devel@lists.xenproject.org
References: <20220302134425.38465-1-roger.pau@citrix.com>
 <f67e599d-4dfc-c98e-75ee-8510237cd527@suse.com>
 <Yh+RcFLjrtLk/ixx@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <Yh+RcFLjrtLk/ixx@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR06CA0324.eurprd06.prod.outlook.com
 (2603:10a6:20b:45b::13) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 3099834e-dbbb-49ae-4125-08d9fc66fe1d
X-MS-TrafficTypeDiagnostic: HE1PR04MB3227:EE_
X-Microsoft-Antispam-PRVS:
	<HE1PR04MB3227F854B5553DAEB0B18CC6B3039@HE1PR04MB3227.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6486002)(316002)(38100700002)(6916009)(31696002)(66556008)(66946007)(8676002)(31686004)(508600001)(4326008)(6506007)(36756003)(66476007)(8936002)(5660300002)(54906003)(186003)(2906002)(26005)(6512007)(53546011)(86362001)(83380400001)(2616005)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?MdpqXoxW7KHBik7GEcyBA/mSnfbRK6lzJR564v5Cb0AlaMLUgV8Xetl1u0o5?=
 =?us-ascii?Q?ZSpKRxbwU1MYpCCt+v2Id+JA/ADIrLYGBEMDC9nfuTBNKhcG4v7bvxmzo9Cm?=
 =?us-ascii?Q?3A2eHgjtgWH7IhhBYu4rBScO/7OQTa6AzrAUEWCgszBBP00QfPwUHdD2j7S+?=
 =?us-ascii?Q?Uy3JjAZ5O8ZlwF4PPgrt+mCAcJP3ZuVXgZJ4yVs6GWh5gmotEEUcqKygkjtx?=
 =?us-ascii?Q?H9/kNbm2Ux14DN9+MtVCpdqpl30MnMwm8AsGxxqgCUp5vflkSSJ0roP8QOGF?=
 =?us-ascii?Q?/wH90UVRmkxJ+ISOnpHTehG8TO0Z+wb96JCknWErCdN8LCIl7Xlr+vyaS6+i?=
 =?us-ascii?Q?8R06OStv3ZCxTGjtGIH8L6eYNCcDc/R2hGCbV7obr8Oe8ODJsVewggTZqKy2?=
 =?us-ascii?Q?EYXAOyMAIAOSQrcq4Pyr9k5hbqNf0lNowgd37fVvN8AcPSk80WXx7okN+Qvn?=
 =?us-ascii?Q?EJ3j76/A7+LoBs4XISmLBUyri3Q0BCBD0LGRJ6L1hgXBEm8ZNMWLggZN8Ukc?=
 =?us-ascii?Q?rN27s6unKl0+cxjSreUeP6gKlbF4mJCHYxVcWwY3S9WFG8QOUHZ75g3oV0LR?=
 =?us-ascii?Q?8DmsHDtgqks9KQKtaYTZYCO5rQYGh7rLdMQyfpVo/wyWXJjqT5bx7Cb177O4?=
 =?us-ascii?Q?+kP+pmWhDivgaz+yViY/6SUCXtnPoLlgTvyrkDx/5P4UtB+iXVhvR8lHzQge?=
 =?us-ascii?Q?0qdkmaIAbAdhPxFB27+ZQ60mc4xWu0rTxag/Ji+5aqw1aNOrPDzbhMrSrYpu?=
 =?us-ascii?Q?M5Xaar9YpAI5D2NokEaFgqVrQ/2/PVtD/lQcvSTfUwjGuYiUr3uCjQR1zopb?=
 =?us-ascii?Q?kUu+xBHPLlRc2eV5dKjWIHIwRjr12+sypHWamq/EwLLoV3r3WNJE2S9IHlvD?=
 =?us-ascii?Q?kvfqowoI+FsHaQaXsAUROmooKV/DLina9Aw7G72X6b7HWytM8jrdebhOxKEt?=
 =?us-ascii?Q?7T2yksaH4u7OYLSlI/Hz/l8/dnVhUrI7X8BOeXJ3iAuIBCm43C7jABtX2roJ?=
 =?us-ascii?Q?mfhr1UKV+sPOvuijjJZy+sK62gB2sY9Jp7oqpbBTCnuGhcGH7scG1pnqGCkx?=
 =?us-ascii?Q?HYScL9rnl2I54QauUicd3w+hg7UBRH/QQLm+0gDSHPdj1NtHQVxPUHMLmtX3?=
 =?us-ascii?Q?VFav7UFKwwvdHcGYHCvhDzQPaUCkTam3ikm/mfqpM0laeYm5iQd+ecEDTwu9?=
 =?us-ascii?Q?lYfKgGtmPxJczbBp23mKCKWr5Mh55oIOiDunlgWghHflypV4yBYP0rNZUvVR?=
 =?us-ascii?Q?NurtRF/CueoX9kvQYleOcZ08iVfbhmqV6EpW3fBeqpB15CbMEryeYPXX7Kzu?=
 =?us-ascii?Q?EzEsViNfzeIEjLuJuIll7aoRqSIy3kiANtwoKKKy5eWIpYxNKYhLBYAOFw8G?=
 =?us-ascii?Q?o+smwJGJT2bh1Qz2Xa35D/GPkN+9vsgjcmV4lzl2b7GwRCpiAdoeuQfI1of8?=
 =?us-ascii?Q?jcoms6ekVg6upPaExYA17y57uzHjI12+SAoVmAE6IRLDRnZXZ5O7wtRyadpp?=
 =?us-ascii?Q?nIf2w/0OOTEXXLLaWOLrn6+yVw437ORf+lr9ZZ1ygEeLaYVFnwXtY+xAK7i4?=
 =?us-ascii?Q?syahhLHhf9MpSsVhIBc+CAmAjftsrZq9J2pI/VkUijtAHrqVeZRiDmWJ3Vfh?=
 =?us-ascii?Q?HtA+g4Uf16/5auVArBbxKXo=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3099834e-dbbb-49ae-4125-08d9fc66fe1d
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 16:09:13.1548
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: IJo/4ihmM9itFufNunTi5YXq5YXgMhwqOjeVUk1QK4EQ6nmkHAw/2sldAeWWa4XjTYNki7em5BNe53ECZd3GyQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR04MB3227

On 02.03.2022 16:46, Roger Pau Monn=C3=A9 wrote:
> On Wed, Mar 02, 2022 at 03:41:21PM +0100, Jan Beulich wrote:
>> On 02.03.2022 14:44, Roger Pau Monne wrote:
>>> @@ -292,6 +295,9 @@ SECTIONS
>>>         *(.data)
>>>         *(.data.rel)
>>>         *(.data.rel.*)
>>> +#ifdef CONFIG_LIVEPATCH
>>> +       *(.data.*)
>>> +#endif
>>>         CONSTRUCTORS
>>>    } PHDR(text)
>>> =20
>>> @@ -308,6 +314,9 @@ SECTIONS
>>>         . =3D ALIGN(SMP_CACHE_BYTES);
>>>         __per_cpu_data_end =3D .;
>>>         *(.bss)
>>> +#ifdef CONFIG_LIVEPATCH
>>> +       *(.bss.*)
>>> +#endif
>>
>> ... are these two really in need of being conditional?
>=20
> Will drop if you agree. I didn't want to risk introducing unwanted
> changes in the !CONFIG_LIVEPATCH case.

The only "unwanted" change I can imagine here would be that we place a
section which the linker would otherwise need to guess how to place,
for being "orphan".

>>> --- a/xen/common/Kconfig
>>> +++ b/xen/common/Kconfig
>>> @@ -353,7 +353,9 @@ config CRYPTO
>>>  config LIVEPATCH
>>>  	bool "Live patching support"
>>>  	default X86
>>> -	depends on "$(XEN_HAS_BUILD_ID)" =3D "y"
>>> +	depends on "$(XEN_HAS_BUILD_ID)" =3D "y" && \
>>> +	           $(cc-option,-ffunction-sections) && \
>>> +	           $(cc-option,-fdata-sections)
>>
>> Is this for certain Clang versions? Gcc has been supporting this in
>> 4.1.x already (didn't check when it was introduced).
>=20
> I've checked clang and it seems to be prevent in at least Clang 5,
> which is likely enough?

Clang5 accepts the options fine here. But that wouldn't be enough,
./README says "Clang/LLVM 3.5 or later".

> I've added the check just to be on the safe side.

Well, yes, if you're unsure and the old version can't be checked,
then perhaps indeed better to probe.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 16:10:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 16:10:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282427.481132 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPRYY-00089O-3c; Wed, 02 Mar 2022 16:10:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282427.481132; Wed, 02 Mar 2022 16:10:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPRYY-00089H-0f; Wed, 02 Mar 2022 16:10:26 +0000
Received: by outflank-mailman (input) for mailman id 282427;
 Wed, 02 Mar 2022 16:10:25 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPRYX-000895-Bm; Wed, 02 Mar 2022 16:10:25 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPRYX-0003rB-7u; Wed, 02 Mar 2022 16:10:25 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPRYW-0007s3-It; Wed, 02 Mar 2022 16:10:24 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPRYW-0005Ik-IT; Wed, 02 Mar 2022 16:10:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=LwTUqoXhP+QOP8Ddl72kDkzS3WZIW9AJ33lUOc17XfA=; b=UKDV4Of9AP9rWoHu49eLLp9ahD
	/R9PohZjRDFSaJyQ1GJyAhn7SwhglVieXAMndaw/HbCwrQlD27m/2IRIwAGzqe2Z3yBuFJubOQyx5
	mnQVnGGzrLfVlIcSlOmuhT9YsEUjTigkMftA7/qr/qGL8EcdTfvTAC+0BJOq0iDnZNiw=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168333-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168333: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=dc39554d58af4a50b50eca1f57c49415a12b0c98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 02 Mar 2022 16:10:24 +0000

flight 168333 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168333/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 dc39554d58af4a50b50eca1f57c49415a12b0c98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    2 days
Failing since        168258  2022-03-01 01:55:31 Z    1 days   16 attempts
Testing same since   168316  2022-03-02 02:50:20 Z    0 days    4 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit dc39554d58af4a50b50eca1f57c49415a12b0c98
Author: Xiaolu.Jiang <xiaolu.jiang@intel.com>
Date:   Tue Feb 22 22:14:05 2022 +0800

    edk2/MdeModulePkg/Debuglib: Add Standalone MM support
    
    https://bugzilla.tianocore.org/show_bug.cgi?id=3844
    
    This change added Standalone MM instance of DebugLib.
    
    Reviewd-by: Jian J Wang <jian.j.wang@intel.com>
    Reviewd-by: Liming Gao <gaoliming@byosoft.com.cn>
    
    Signed-off-by: Xiaolu.Jiang <xiaolu.jiang@intel.com>

commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 16:13:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 16:13:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282439.481142 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPRb9-0000My-Id; Wed, 02 Mar 2022 16:13:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282439.481142; Wed, 02 Mar 2022 16:13:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPRb9-0000Mr-FW; Wed, 02 Mar 2022 16:13:07 +0000
Received: by outflank-mailman (input) for mailman id 282439;
 Wed, 02 Mar 2022 16:13:06 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=cGAx=TN=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPRb8-0000Ml-Kr
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 16:13:06 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a45dfb53-9a43-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 17:13:05 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2104.outbound.protection.outlook.com [104.47.18.104]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-16-JtyBaiPVO9-E1eUDdsuP0g-1; Wed, 02 Mar 2022 17:13:04 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR04MB5713.eurprd04.prod.outlook.com (2603:10a6:208:125::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Wed, 2 Mar
 2022 16:13:02 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Wed, 2 Mar 2022
 16:13:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a45dfb53-9a43-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646237585;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=cqoLkMoWyHeuz/lWQmvZFCNhfMIrDkR3sLW0gFYsbNo=;
	b=ZDbe13pb7cbEw8PT5u3NbhvWG+HGf5Ma096yVgQTI5nLvI5oQgqJnNNFL2rz6HiBhX6g5B
	LIg5bWmI2VcJBkSTUVVfY3WgomtOdi2gPKEiLwxBhrfIpNsB75xYZf2ataFI1jrlnJUroj
	XMAKJ5+THyHv9H0r/wx0HH2jngSaPR0=
X-MC-Unique: JtyBaiPVO9-E1eUDdsuP0g-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=E2UGXSyUYanDtn+lR8+rfwf0f6d08nvCmC66zvmQvoNkyyombixfmE83I8aWw52AJgaHGNxs4zqmyWQo1zIgHBZNAJwUfrrLZNpO3Gb0SCfWot7kkJgVg6v3sf8ShMGk0F3AhFJR+waFi6ZCZfnxoXH0d2++ulXyaNjzYJJ+NWpCjXmTIItF/JvfvMrVY7x/zShhGYmmwVzX0dLlYrtgTY9/EK9+TqqQzRwdR+IE1T3e9ROWj2SS0iadeKCtsThUaEj0ztfJjyZE+c9/lwKd06XPY38YzQ89uDhoLvv72VHMOY+0DN5a4d1Ta9XeFPVZdKt6eXYzsSe55ps1vJmGog==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=cqoLkMoWyHeuz/lWQmvZFCNhfMIrDkR3sLW0gFYsbNo=;
 b=nCxYQMnkKA+yv9jZYmlVjyvd09db2mAQY+g7p5Pjf+gq0MAEEMIHvIkPqfJsT42PfswCFEfO8rHWq/bqqceEcgj/uBdaaD0J5g+oJa5P5Roa3lnGvHAsmJdWUPeqhcEAZ60gqQjnEplwUYlknKP62ozhke5zB87tYWFLa8s3n1HoBlJC4mhvKsWXYIz27olgd0e481gBAzTg4NewocLhjJHBJsaJTvEO8S0KkOnJ1RnD70+nVU5xEPFraIKZ36ani/8BM8/xe9xRQJvvNZio0G8ViWFN6CSOA8nI59Uu4YKDSAEyUH43m+qnS0xHZDNF6JQKF2RLnPsC9o42OROiIw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <c6188a3b-7ea1-48b0-c17e-9cd6ee645db8@suse.com>
Date: Wed, 2 Mar 2022 17:13:00 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] livepatch: set -f{function,data}-sections compiler option
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: Roger Pau Monne <roger.pau@citrix.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 xen-devel@lists.xenproject.org
References: <20220302134425.38465-1-roger.pau@citrix.com>
 <f67e599d-4dfc-c98e-75ee-8510237cd527@suse.com>
In-Reply-To: <f67e599d-4dfc-c98e-75ee-8510237cd527@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM5PR0602CA0018.eurprd06.prod.outlook.com
 (2603:10a6:203:a3::28) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: d8023d84-6795-449a-0dde-08d9fc6786da
X-MS-TrafficTypeDiagnostic: AM0PR04MB5713:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB5713E0B6B97F16EF19793585B3039@AM0PR04MB5713.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(36756003)(31686004)(8936002)(31696002)(66476007)(66556008)(66946007)(8676002)(4326008)(6916009)(54906003)(316002)(53546011)(508600001)(86362001)(6486002)(6512007)(6506007)(2616005)(26005)(186003)(38100700002)(4744005)(5660300002)(2906002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?M0o4ZkczRFU0dWVOTzRRZ1pJaDZ3NW4xS1J3RlRrbVpCVFltRHBGdWQyOXBj?=
 =?utf-8?B?NFdVYXJaeU9NcnVkWFNKOHlPMHhPMUV1elRWM2dsVzJUdHA4ei80RjArOUFI?=
 =?utf-8?B?cXN3SnE4T3k2Zkt0K1VKTm84c2Q2eFJ3U3lzL3NtV2xrdU9iWlRjRmlwcE5S?=
 =?utf-8?B?disvRmFPSHo4dHJUaVd4ZXFoajJReC9ydDZXYzRWMW5tdTRvL1E1RlI0aXYw?=
 =?utf-8?B?UUVsK0liaXdQMHpLOEF1Qkk5bkx4S2d3Q2R0czluR0ZmTnlGbkNkZ1FPeFFt?=
 =?utf-8?B?UmRFbEg2RnJUR1BUa0wvU0dVckNPZkJySzcrZEI4OTh6SytWa0JaTnl6N3c3?=
 =?utf-8?B?YWdOVThYeVZPVktzeENKREh6eEFYYnE0MjU5L1hobUliY3BvTjJGT3hlNjFr?=
 =?utf-8?B?d0NZalYvY1lDMUJ1bnUvSTlJa254VVJBYyt5VnpUVjNMRDlGcFhkblJIQzI3?=
 =?utf-8?B?YWRMUDJpY2RhN09KdjJxMmRUa2hZMCs5RGhJd3g3aGxXRDBJMHg0K25XRUFo?=
 =?utf-8?B?eXhIdkV0TXJUVDM3YkJvaDZXTkgxMGV4WWxZY0hGcTZydC96bmRUQmJWdURk?=
 =?utf-8?B?Uk1rZXBncGtKL3dRZHNyZVkvZTFvUUlPNDI4bXJhcE5mdEprcVVWalNVWlBW?=
 =?utf-8?B?VUNEVzN4eHEzc3dJcE93eTAxNlRNOGUvMVl0dnJ4Y3doTjQ4bVFhUDkzakFw?=
 =?utf-8?B?YldFOXQ1b05DcGhYYXdRVmhQZExuSlF3QXBjTHNzM09JUUtjTXJQK2dBbmxC?=
 =?utf-8?B?T0dpR2hyWDh1UEcvSWxGRU0wc29kR0NXL0VDM1F3NnZrWWRJOGYyaEU5SXIv?=
 =?utf-8?B?MWJXS1ZZUEl5RlU0bnJWcjJFZUxtVkVZNDVhdlUxbGI1L2VVUjFhcmh2Q1c3?=
 =?utf-8?B?blpvTmszazhybzFhNlhlYUhuTTZIa0N6cS94VEJsUlBFYjRGV25kb2dweWRF?=
 =?utf-8?B?U3czRXNjaTBYbXlzRlN4UDJvVFJibzFZYTYyMUZEUlY4L2piaHIvQlFvMytC?=
 =?utf-8?B?R09XU3ovYThlcTJOaDJVZXFQZTVGTkdRTUZlbzc1NDlOQ3E4ZW9pdEJmdlVm?=
 =?utf-8?B?Y3NMR2kxRmJtR2FWUjFvRWFHc1J3WG9Yc1hWYzQxRHl4Y01CN1l6S2VXaVRw?=
 =?utf-8?B?bzAxOVNET0ZPbWtQbC9MNXF3Q0ZuSUc3a0pERXZ3TEg4bU11WjVPV0puYXUv?=
 =?utf-8?B?d3hmVmRsNmcxNnJJV0ZteDJrTEpDZDEyOWhORDJ6anRES0QyMlV6UXk5TTZE?=
 =?utf-8?B?TW9lYXBzWlUvbFo5Z2JSL3NZS1pyRkxvYThMWG9jQUZBeWQwVkNjdVh5eWo1?=
 =?utf-8?B?dHN1Q21aT3lFZlYyQzdyUzYzMVhCbFR5QnAvYWNmcVFwaWkwTHN5RS9CdWlh?=
 =?utf-8?B?TU1vR3BtOXUwWW1VMmhnNTJXVEZDNXdVQWdtaGRJNThacnd5TVUzczc3Vmxz?=
 =?utf-8?B?Y3oyOEdPRUxzZVUzMVZxeVAwaU5kalBmK1JQZWRPSmVvNWRDYUdzTDM5OUFY?=
 =?utf-8?B?bERuMWRnY0pjSHdKTVBhUXRKTlB6a0R4UmdrUHZHakt0OEI0NVZSd3ZCM3Zz?=
 =?utf-8?B?TWZkdW10ZzZVNFBUa0g4VXgwQjR5djV2QmxSM0hIOFJKQk1QcGMwUFNiblF6?=
 =?utf-8?B?M1FjcDU3QXlob0t3blk0Yi91bEJpbUdiZ3lWU3hMVFJadm9pZTM0Y2hzM2N4?=
 =?utf-8?B?enQzTDFEelFoVEhWU2p0dVFYNzVEbEhoVHE0NzM2RUx3a3FheFVoMHluVGpG?=
 =?utf-8?B?NFp1NExMdWc3ZzhCN0hVSHpVYUthT3l2SFdQdmxhNXI0Q1dUUkxaakY4a0xZ?=
 =?utf-8?B?TjR4dDZyMWpMZVVoQ3NHU3NEUWdNTkxWUzFoeHhTYnY0cE5xZlRpVVdnZkdW?=
 =?utf-8?B?ZlhoNkVJaEs0bEhJRyswbTl1dzhTT203M2RKc0JUbm1UUmFjbFRFRnFrMjBa?=
 =?utf-8?B?MXU4eHNTbnI0c1NUc1g2YXovQWZOa3FrSkVnYXpOdXVxM0hhNkJERTlaMDhR?=
 =?utf-8?B?MGRTdXFXRFlLWFBlcGc0U2lQTVJIT3JGOXFyQk1IQTJJQStmYUhicnhtSmVu?=
 =?utf-8?B?Nk4yRGN5d0NjNVJQblBVSnhNOGVIUmV2N2RIZGFPTTRscjdRalVuUTZLWlpn?=
 =?utf-8?B?MHJBUVlFM05ZakdHeG5xS3dpRmQ1MDNHUUNwL2ZzVHZHaTFBR01RT3l0bVRB?=
 =?utf-8?Q?1FITbm7T1sWjgDXK0qyiDw0=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d8023d84-6795-449a-0dde-08d9fc6786da
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 16:13:02.5154
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 3DIpVxkL/k+YmMUU7N+8LhFQ9OzhlPwYH/2BE33Pui/+dT/0DD4+Re6MljIAXxqdcb/IOI7TyP9he6p5isSKdQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB5713

On 02.03.2022 15:41, Jan Beulich wrote:
> On 02.03.2022 14:44, Roger Pau Monne wrote:
>> --- a/xen/arch/x86/xen.lds.S
>> +++ b/xen/arch/x86/xen.lds.S
>> @@ -88,6 +88,9 @@ SECTIONS
>>  
>>         *(.text.cold)
>>         *(.text.unlikely)
>> +#ifdef CONFIG_LIVEPATCH
>> +       *(.text.*)
>> +#endif
> 
> This coming after the "cold" and "unlikely" special sections and
> ahead of .fixup isn't very nice. Also from looking at the linker
> scripts ld supplies I'm getting the impression that there could/
> would then also be e.g. .text.cold.* and .text.unlikely.* which
> you'd want to separate.

Thinking about it, with -ffunction-sections startup code cannot
reasonably be placed in .text.startup, or else there would be
confusion with code originating from a function named startup().
But of course .text.startup.* is similarly difficult to arrange
for not ending up in the output's main .text, so adding
.text.startup.* and .text.exit.* later in the script wouldn't
gain us anything.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 16:14:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 16:14:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282444.481154 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPRbz-0000wX-SX; Wed, 02 Mar 2022 16:13:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282444.481154; Wed, 02 Mar 2022 16:13:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPRbz-0000wQ-PU; Wed, 02 Mar 2022 16:13:59 +0000
Received: by outflank-mailman (input) for mailman id 282444;
 Wed, 02 Mar 2022 16:13:58 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LB9Y=TN=citrix.com=prvs=0530a50c4=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nPRbx-0000pX-U0
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 16:13:58 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id c230ad94-9a43-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 17:13:56 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c230ad94-9a43-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646237636;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=GH9/GwB4NZ0RyLKXE7KDqf7hyTsMOnpNMm3LMLELNFA=;
  b=NpJCKCnJMSy0EX0gUQc+j/jHqTR18Kh8Yta6RyYHDNXOe+I60xWYI9ty
   9ElRvMiNuG4yITsuQsW+E1McgTOgImapu6i3zrKLGs9MjYWZFLgFg3bFJ
   ckGN7FpTpCI2zq0kAzm91KU3Qj4rfyGAF2hk7nACjrZDjBDXyKPoxgrr3
   Y=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65313117
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:s5E2Naq3QR7CbfZFGE9m/rPX1IleBmLsZRIvgKrLsJaIsI4StFCzt
 garIBmEP/vYYGf1KownPIrkpE4EsMDcz9ZmQQRlpH9kQioU9ZuZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 Ymq+KUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBEYbth/UhShdiIjxlevV8353GGEa4rpnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVI1zbWAOxgWZnea67L+cVZzHE7gcUm8fP2O
 ZdCMGE2NUuojxtnAQhMV5QlveKSwTrmWWN39wmMgKsQ7D2GpOB2+Oe0a4eEEjCQfu1Kmm6Iq
 2SA+H72ajkQOcaD0zOD/jSpj/XWgCLgcIsIEfuz8fsCqGOUwmsfGRgHT2yRqPOyilO9c99HI
 klS8S0rxYAp71CiRNT5Wxy+oVaHswQaVt4WFPc1gCmdx6yR7wuHC2wsSj9adMdgpMIwXSYt1
 FKCg5XuHzMHmL+fRG+Z97yUhSivIiVTJmgHDQcGUA8E7t/LsIw1yBXVQb5e/LWd14OvX2uqm
 nbT8XZ41+57YdM3O7uT0nvmnCOQv5bzfxMuoV3teUCk1z1+e9vwD2C30mTz4fFFJYefa1COu
 nkYhsSThNwz4YGxeD+lG7tUQuzwjxqRGHiF2AM0QcF9n9i40yP7JehtDCdCyFCF2yruURvge
 wfttAxY//e/11P6PPYsM+pd5ynHpJUM9OgJtNiJNrKigbArLWdrGR2Cg2bKhQgBd2B2zMkC1
 W+zK5rEMJrjIf0PIMCKb+kcy6Q34Ss12HneQ5v2pzz+j+bAPSDNEeZbaQrUBgzc0E9iiF+Pm
 zq4H5HXoyizrcWkOnWHmWLtBQpiwYcH6WDe9JUMK7/rzvtOE2A9Ef7BqY7NiKQ+95m5Ytzgp
 ynnMmcBkQKXrSSedW2iNyAyAJuyDM0XhS9qYkQR0aOAhiFLjXCHt/xEKfPavNAPqYRe8BKDZ
 6JdKpXYX68WEWyvFvZ0RcCVkbGOvS+D3GqmFyGkfCI+b9hnQQnI8cXjZQzh6G8FCS/fiCf0i
 +TIOt/zKXbbezlfMQ==
IronPort-HdrOrdr: A9a23:dl74rKtpKYIfjwwlfWlzSkFp7skDSNV00zEX/kB9WHVpm6uj5q
 eTdZUgpHvJYVkqKRMdcLy7WJVoIkm8yXcW2/h2AV7KZmCP0gbFEGgL1/qa/9SKIVyaygcy79
 YCT0FWMqyJMbAk5vyQ3ODDKbgdKXO8gduVbJzloEtQcQ==
X-IronPort-AV: E=Sophos;i="5.90,149,1643691600"; 
   d="scan'208";a="65313117"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=CjyFURgjNEZMcitvdr0/FYITJagHIy+U7ACbsLsoi9pfAbv01Mrk+v9C9s1NfMAzaDeYrmpOv8Oz4Pv/UXMlSuBv1oEVxD0iteEs3yWb74r3hIQ2D616oPropgETvBw3X7zT6wRCcU3WUF4EKsLspDIEHm+gsNq4CRxPE6v0OlE7jKO5FclB01iQ8IFMFDshQj1Ge5bvqKDBasnIKTbetXFAhaCKc9/zoZmViJ9h97byrFFK8oNfsN3xBVkkFLo0RMYrdbdW8wE+ljfDypo1bMNk3EMQcvqtriDM7/N3MLMRUKvcskvTUy/+SiT95Ut//O9otXu3mAtM8+ov119iQA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=2hervgjJMGhuzaYXWXwQM/fbWQrktTuhnNCgLrvmR/E=;
 b=CrtzXVfbug4RA17Np0p5jM+H2R56soQtIsrU8vio+ThhQdnGw5SmMEGCz9JSDXjCDb1+qmY+s6A+tZu5BMT8HA9kY1ql/nRZRyiuZ4fX4tH/cadGyqisC4z5nO5MqusBFcsfnEgjpC8AduGRvhOd9cAtxobH9t2nqZLCLcqK4K7VH4leWkc1XdE4kQ2eeBk77+DtVylBQbqTu84fInspWmBaXTCy62LcSLXTNZ12ZeZetOX5cxgtgXiI59+UF0O9/WrYU/dWMSa02mriVHs8S94DpEoNyShP5SSDCWY/5E2/tW8zp+eWBee+UhoO0D/3Hbih9uVegICGszn3XAq/Zg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=2hervgjJMGhuzaYXWXwQM/fbWQrktTuhnNCgLrvmR/E=;
 b=BazZVYo+xCRZ315ezuvm6QdvzbVZLVH4mb5mXjJmiqHSMNCy9bXNlM5jGxOQBS1FEs3CrG1L0pkq+oO50qsOqhmm1sNpenoPvhxW2VwL8REOB0uos/goAdQ08tlcKNif70tSIAXKyxlt2uus4yYIs54syDiIfrPlP+dOYsH8cEA=
Date: Wed, 2 Mar 2022 17:13:46 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, George
 Dunlap <George.Dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien
 Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, Wei Liu
	<wl@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH] livepatch: set -f{function,data}-sections compiler option
Message-ID: <Yh+Xuu2ssTu7UuO9@Air-de-Roger>
References: <20220302134425.38465-1-roger.pau@citrix.com>
 <b2381496-4dc5-5051-2bf5-9d164041c9c8@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <b2381496-4dc5-5051-2bf5-9d164041c9c8@citrix.com>
X-ClientProxiedBy: LO2P123CA0091.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:139::6) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 467357b8-378e-4832-5ff1-08d9fc67a3d0
X-MS-TrafficTypeDiagnostic: SJ0PR03MB6357:EE_
X-Microsoft-Antispam-PRVS: <SJ0PR03MB63577BDD4EC0C2E3D65972E78F039@SJ0PR03MB6357.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(54906003)(85182001)(38100700002)(82960400001)(6486002)(6512007)(9686003)(6506007)(86362001)(26005)(186003)(66946007)(316002)(53546011)(33716001)(66476007)(5660300002)(4326008)(6862004)(8676002)(2906002)(6666004)(508600001)(8936002)(66556008)(6636002)(67856001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?ZzJkaysxcEFBVTZwTVA3WE50bU1PUHprL1JDNXJQSHNiMUEwbWFkSzY4dHdH?=
 =?utf-8?B?a3dyTUJwUXFpeGNtVHoyRDFkakNja05pclRMKzFoWXJINlFUZ2xXYlc2TWtR?=
 =?utf-8?B?NHRZN3VraHQvSWhHTXlIbUZkQ3BlVHN0eTJHZDZsSjg1dUFNZnlGQjN6bGND?=
 =?utf-8?B?Wm5hUktaaVVXNDAxS1QyVll0RDE0TzcyZlNUbFJFOGw2RkNsQXQ1ZGJMSkNo?=
 =?utf-8?B?VWhwNlJGU21Gc1pqL0hZdVZkUkN3Nm8vOVk2dS9tU1dQR2pHZjJ6eGhaMHdN?=
 =?utf-8?B?UmcrUFhkM2hLTDY1SlFtbEZ2VjJjdXVNZnJWa3p4Z0lrYjRuUXl4NXl5YUpG?=
 =?utf-8?B?cDVwZ2xVMVpFcFhVbDdXY1hGMHAwZUxIaXd5UWZOakptWStqdHNiT0ovcGZp?=
 =?utf-8?B?MEFENzBNbmM0NXpJNzVvNFBETmZTdE03aUdZL1FLMEhQYlRwUVQ0d2tXQTM0?=
 =?utf-8?B?OWxMMVMvdlJHYUxaMERvVU9EMnZRK3VjRnVETVhmcjk1bU1ZTTcyS0pUd3ZX?=
 =?utf-8?B?VUMzMTJpc2N0Z1ZBek1vc3VMVEU4ajFHZFZuZlBTVG9pWXg3RHpBWU1mYmZa?=
 =?utf-8?B?Tmx3SWQ1VHpDdGtadHpJRVRhZWpuZEpDMzNzUTNoc0NOcUlYUUNFYnFqMVcw?=
 =?utf-8?B?bHZ6SDBvSzdBK1EzYzA0U3lzbUtMdm5pT3RHaVlaKzJhTWpJUVBqak4wYkVT?=
 =?utf-8?B?OGtteDVwYUZubHU1U1RGOEJnYWc3Z2xySGwxU2RndEcrQmJ2LzFIODdYdU5V?=
 =?utf-8?B?aUFqK0MrdGN4dThxcktWZ1JoVExmNHlyT0JvejIzdzl5NWlqbERJTG1qdzJW?=
 =?utf-8?B?NjZCek9GczRuS0FzeHNSc0JPZUpiRXZkdmsyYUhUdnIvUExieFM4YmU3UUxE?=
 =?utf-8?B?YzhnWkltOFFxaGNXTzF4cUdYc2xhNHIwK0FBVEhVZC9KRlVGeUM4MVZqU3gy?=
 =?utf-8?B?clNlU01tazhOWDZmQmlYT1lBUjkrSDB0SkxRdDNyWlF5K1JrcHlTTGc1LzdC?=
 =?utf-8?B?RzFrMHJhaFd0djl3a2hWVWNKQ2tmY3EzRnd1OFY4UDF3aHdRMndaZzJObGVN?=
 =?utf-8?B?bU51aUZkWTRMNHIwS3J5N0cxditleitmbUZrMXVGYmgzNGZXMjRLSWErcjlF?=
 =?utf-8?B?bGhJV1hxTEFuOS9NMGpsRDBTb3cwZ3NQVW1PNWFEOTMrYVdMUTlLSlhHaVk2?=
 =?utf-8?B?UXFwY1hkNTlpOHVQSzZoYzk0QllEb3FXSjc0VHNpL1dmRUQreHZKTkJKanBZ?=
 =?utf-8?B?TUlnQVJwSENGV1VNK3RYM29ZclpESS9XemtIaHhIM0VWa0FhQnZhWlk5MmxB?=
 =?utf-8?B?NVpxUFUrOGdzWGNFSW1sa1NReXF1WWVpV0VIbHVZS04vUk9VYXVjVlZsTnJu?=
 =?utf-8?B?RS9sblFGNkdabVNJUGR2OEpRa2N3NEcwWU5Vb3JCQmRWUWNZWlBSb1d0OXkv?=
 =?utf-8?B?S1hCTTNzMHRKVHVFWXR5ZFFnZjRFNERwR0tYZk51ZE52ZHVtdFVmWTBMbWNP?=
 =?utf-8?B?K3NPN1VuOEtrNTNrNzk3R3E4UWJPZFhTNlFkbWtxbG5Ia2NKZEQvUit1NnBC?=
 =?utf-8?B?a2Zzd1VWYVdaL2lKQmtxTTVVZnNveWFIbzFDYlZ5N0lKYUg1Wkt1NGdTbS9Y?=
 =?utf-8?B?em1YbjZGSzNsWnB5WkFKbHd2MU05T2taa2JyeHVOZDdwZU9kRHlsZFpxL3Vq?=
 =?utf-8?B?aWFZUGhGYXR0UVRYbXNlaTA1STQ5NFZEdGVDeXNQSlk1OHQxMThPdUlOalA5?=
 =?utf-8?B?NWlqRjVtcWVNY3JlK1NkVFJqNzRSbzFmM0h6MUlrTTJmemVuVUNvZ1ZLYkZx?=
 =?utf-8?B?b0RaU2ZhUVVFd2YvK0IyQURKd3RmZzhpM2Z3RksvMmkza05tZitNVDl0STJz?=
 =?utf-8?B?d2JVR0Z3N2JVNm91QmVzclNZVXJIVDlMSVRNaEtUQSs5NGlnSHFEaXhEZWt0?=
 =?utf-8?B?c3djNDlhQ2xZMnREZjNyajdubnMvUVpvZ1Q2azcyLzg2NWppR0NwRU5zdGdw?=
 =?utf-8?B?NUdwaHl3UVVTaEZLYzNKZEE1YWR0ZVliVzhCVGppL3hlRkxxb1ZDMGNHN2Ri?=
 =?utf-8?B?cEJzMXdDQU1UL1FZWE5ST3ltSWRHNnJ5MFQ1UHlvb1J1blB0b005Mzl3N1d2?=
 =?utf-8?B?NjFQcjhzTW1hL0F3a0VYQzRST0tRazhnVE9FamRmL0ZaYnRvTEFRTmJUcmtk?=
 =?utf-8?Q?4cieLkiPJv0haMjA/8Uj8gk=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 467357b8-378e-4832-5ff1-08d9fc67a3d0
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 16:13:51.1371
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: GUKq7iVU3v7nPSqMJEzT7oE5Hp+MajKDi4vQ/HUwT754IBinxEsIwfJS/oLqW1a9TG9NoIOLWqJx1Tk0olIcMQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR03MB6357
X-OriginatorOrg: citrix.com

On Wed, Mar 02, 2022 at 03:35:07PM +0000, Andrew Cooper wrote:
> On 02/03/2022 13:44, Roger Pau Monne wrote:
> > diff --git a/xen/common/Kconfig b/xen/common/Kconfig
> > index 6443943889..2423d9f490 100644
> > --- a/xen/common/Kconfig
> > +++ b/xen/common/Kconfig
> > @@ -353,7 +353,9 @@ config CRYPTO
> >  config LIVEPATCH
> >  	bool "Live patching support"
> >  	default X86
> > -	depends on "$(XEN_HAS_BUILD_ID)" = "y"
> > +	depends on "$(XEN_HAS_BUILD_ID)" = "y" && \
> > +	           $(cc-option,-ffunction-sections) && \
> > +	           $(cc-option,-fdata-sections)
> 
> cc-option can take multiple, so just $(cc-option,-ffunction-sections
> -fdata-sections)
> 
> However, we in practice want these in combination with $(LD)
> --gc-sections anyway although that wants to be separately configurable.
> 
> Therefore, we probably want something like:
> 
> config FUNC_SECTIONS
>     bool
> 
> config LIVEPATCH
>     selects FUNC_SECTIONS
> 
> or so, so in the future we can add "config LD_GC_SECTIONS" which also
> selects FUNC_SECTIONS.
> 
> Thoughts?

Do we want separate options for ffunction-sections and fdata-sections
options, or is FUNC_SECTIONS supposed to cover them both?

I assume you are fine with Jan's suggestion to not check for the
option presence, since it should be in all supported versions.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 16:21:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 16:21:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282455.481165 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPRjB-0002V3-Pl; Wed, 02 Mar 2022 16:21:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282455.481165; Wed, 02 Mar 2022 16:21:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPRjB-0002Uw-M6; Wed, 02 Mar 2022 16:21:25 +0000
Received: by outflank-mailman (input) for mailman id 282455;
 Wed, 02 Mar 2022 16:21:24 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LB9Y=TN=citrix.com=prvs=0530a50c4=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nPRjA-0002Ua-LN
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 16:21:24 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id cc0670af-9a44-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 17:21:22 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cc0670af-9a44-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646238082;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=ujXqZwAfA+8GTDK8Ti/0+OUd7Q1Au1G+zo9WP3I37rI=;
  b=CH6/rmHd/WhJX2T2jA88ikR5V0hBimdu+yUGLh48FRoLNqkWAittdj+L
   Y2+Lkx1A4kgoC9/Fuo4AZ3a90fURcpoWkl7ZNnZQs6oJELxuyimRES9q+
   osamUX7x1ZjN4v8haTSlWDSmhWoaJBDuthoYc9ND6j0BTwgTsSdJT20uP
   M=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65321239
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:zFcgoa/aCYBQXn1Dem0IDrUDdH6TJUtcMsCJ2f8bNWPcYEJGY0x3m
 GZNDG7QOv7ZMDSjLd0nb9++9k0A78SDzdEySANqqCs8E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oDjW1jlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnbC1CiIYFI/oo946fEQHFXt/PoZn6KCSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFJkYtXx6iynQEN4tQIzZQrWM7thdtNs1rp4TRqyHP
 ZFIAdZpRC3COxxjCGgnMtUBs/yarCbieTtitU3A8MLb5ECMlVcsgdABKuH9cNGQWd9cmEreo
 2vc5nn4GTkTLtnZwj2AmlqSgevIkTL+SZglPrSy/f53g3We3mUWThYRUDOTsfS/z0KzRd9bA
 0gV4TY167g/8lSxSdvwVAH+p2SL1jYDX/JAHut87xuCooLW6QuEAmkPThZadccr8sQxQFQC1
 EKNnt7vLSxitvuSU3313qyPsTq4NCwRLGkDTSwJVw0I55/kuo5bs/7UZo89Sujv1ISzQGyuh
 WDRxMQju1kNpeIOlICK13LjuAiLicWWSFQ05S72Tn3wu2uVe7WZT4Cv7FHa69NJI4CYUkSNs
 RA4piSO0AwdJcrTzXLQGY3hCJnsvq/Ya2OE3TaDCrF8r2zFxpK1QWxHDNiSzm9NO91MRzLma
 VS7Veh5tM4KZyvCgUOajuuM5yUWIUrISIyNuhP8NIMmjn1NmOmvpnsGiam4hT2FraTUuftjU
 ap3iO71ZZrgNYxpzSCtW8AW2qIxyyY1yAv7HM6nkU35ieLPOifEE9/p1WdiiMhjtstoRy2Pr
 r5i2zaikU0DAIUSnAGNmWLsEbz6BSdiXs2nwyCmXuWCPhBnCAkc5wz5mtscl3het/0NzI/gp
 yjlMmcBkQaXrSCXeG2iNyE4AJuyDMkXkJ7OFXF1Vbpe8yN4OtjHAWZ2X8ZfQITLA8Q4la8kF
 6ReIp7YahmNIxyekwkggVDGhNUKXDyghB6UPjrjZz46fpV6QBfO9MOidQzqnBTixALr3Sfii
 9VMDj/mfKc=
IronPort-HdrOrdr: A9a23:7wGUea2bc3lglMzVZJdGUQqjBVByeYIsimQD101hICG9Lfb2qy
 n+ppgmPEHP5Qr5OEtApTiBUJPwJk800aQFm7X5Wo3SITUO2VHYV72KiLGN/9SOIVydygcw79
 YET0E6MqyNMbEYt7eK3ODbKadY/DDvysnB7o2/vhRQpENRGtldBm9Ce3im+yZNNW977PQCZf
 6hDp0tnUveRZ1bVLXyOlA1G8z44/HbnpPvZhALQzYh9Qm1lDutrJr3CQKR0BsyWy5Ghe5Kyx
 mOryXJooGY992rwB7V0GHeq7xQhdva09NGQOiBkNIcJDnAghuhIK5hR7qBljYop/zH0idgrP
 D85zMbe+hj4XLYeW+45TPrxgnbyT4rr0TvzFeJ6EGT1vDRdXYfMY5slIhZehzW5w4Lp9dnyp
 9G2Gqfqt5+EQ7AtD6V3amGazha0m6P5VYym+8aiHJSFaEEbqVKkIAZ9ERJVL8dASPB7pw9Gu
 UGNrCR2B9vSyLaU5nlhBgu/DT1NU5DXStuA3Jy9/B96gIm0kyQlCAjtY4idnRpzuNId3AL3Z
 WADk1SrsA8ciYnV9MMOA4/e7rENoXse2O7DIvAGyWvKEk4U0i93qIfpo9FoN2XRA==
X-IronPort-AV: E=Sophos;i="5.90,149,1643691600"; 
   d="scan'208";a="65321239"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=i5SttxiP6IjiZ4p/Gzh6mG8YawtIWJNO0V0haso10zw79lHgE3Ia9j9+X8mKcCa9FIc7XY0LrrMS6eK6L3Eg0M10ZOmw5PZna1ezzSdHQVfsMWMbHVaXqiMpVnkxB9jjapSwaQZqQ0BfFnKpwZzvv2whPD/Lwn0AUiyU/irjSPIcktnaQVwXWekCxcZgim52up/223OEkZlx2m/I8u5KskkNn3lHrsqUoawpYOZQ1YXQvegPvEnfIfnANn9cWOds7qbLmeGF6SJ7RLpKbwvYqKG/jr5lx6kSvWh7F9o2HvHgUCTs8Dc8UXuxCVFpENpCs1wiJwoE6mW0PDBkDjBrWQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=pZpyGQ8H+L7AQnCTzm0R4LjWbwQk+nOrsSEUT6rC4ds=;
 b=OYXuBW85MqzgqKtTY4rA1JNDotF0b0sk7O5bwkas1j+XsZPPMpNwNnc+iBnhyvdLUeLOuxvP8qN+LfqFwJGBCbaIDPXL0zUlaFjRhqjYJuMhXxYGxI8692AxaO3xTO/lnzCTWRKK+10ZytBPWjHsKdPq7+gDcs1FZ69GA+nTnFJjlhSVS5pPyLWegK17tJF2Lj1BGfcqgDKRXFMBjIJKVV7ZBMRV7Zd+W6i3267uvWJ4CTxhmYQFnok8F00Ih9eZtW0h7F1kihhTtJYWgqQO5hUJ/7Qb0T9FWRNJX/eoWQRxR2tyryGAF028CHUnmrPP9fNcmdXVwNWuNNWqaFbPSA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=pZpyGQ8H+L7AQnCTzm0R4LjWbwQk+nOrsSEUT6rC4ds=;
 b=dbfe7Vv+sjOL7zVbk3rjw6mplaothXYGM7XxUJF6OHZVAzp17JZbWUSheVdwljeyzBvDQlxU9gYcztNVHaPLYb8dgtfYapRRJS717IqSGI1qpWNMzYOh50l/2+c7StNjjnzy6CZMf6wH0l/OJ7xot6cI0NldwoTyydMDFYO0SpE=
Date: Wed, 2 Mar 2022 17:20:49 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH] livepatch: set -f{function,data}-sections compiler option
Message-ID: <Yh+ZYbl6lKR008Yt@Air-de-Roger>
References: <20220302134425.38465-1-roger.pau@citrix.com>
 <f67e599d-4dfc-c98e-75ee-8510237cd527@suse.com>
 <Yh+RcFLjrtLk/ixx@Air-de-Roger>
 <4636a0d9-a96f-fa7b-3e08-595420b506e4@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <4636a0d9-a96f-fa7b-3e08-595420b506e4@suse.com>
X-ClientProxiedBy: LO4P265CA0052.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:2ac::15) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0fe3fcc4-15e0-46f1-2d2a-08d9fc689f80
X-MS-TrafficTypeDiagnostic: DM5PR03MB2940:EE_
X-Microsoft-Antispam-PRVS: <DM5PR03MB2940BD0FB4663C140375590A8F039@DM5PR03MB2940.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: U7S41yYkfx7xlNDZkN/pFmyn/FzfIWVUnMnlIcGlUdFSS1g/VIUNjgDRgaennV2YSBIwmAjyjX61tGNOJ36WroyGPoogvfR/bhPeRrdDHWh2CXd2nIIlvadoU92PNpvIKglqZiv31+QzKoRVj+hqqK+AeZKWJB2I5NaXHbyWrMoi7k6tCaILg4HIPWXnhfl2LBPk8ILzcHbbiM9kKRUGgJPMM1ongZ3Y8yDGhBMtZNhDGDJd0Wbxhp7sDE3+RUQzmCowokHD7OdM9KM6sLsc73uqqLpr5Wa5Uhr2Jk6WwGl6f1wVd7cLRfjr++xNxfRSeiN/O7eMiQBANjVsejHLD6OzvUy54L4GSPJEwqQ2IxA5CTs80CgvNKAXWFHzXh5p7qt5ZkNeTyu1G3ezil7kRfjrj8hRS867TsovVmXAQ+Tw8gOZ8o/87y6gOsVJ9x6WC93LvP9blRo3am0GAdOjnMPcVXUTzn7TqNCFQRDFC65EfVPpblQnxqQYq0uIghMl4iOCNe1HAkpOZyJVBBLjPoHRblyXnxSxMqakDQskUbcaqxVMUoqnRIXpopz93dxDJSNKnesKj3lc11FkvUfz+NAtff9LjJ+tDN0WsUmrTyz6VmNaewQQODHiFBmx41U1a0Q0GrLtpO7VJqBAA9EutvYlCc89dVtxi4N7+k8UAvCFAxghnMlHVrZzVUkfEYqgL8667w1eQhD/Wa5FzrXylg==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(86362001)(8936002)(8676002)(4326008)(66476007)(66946007)(66556008)(33716001)(85182001)(2906002)(6486002)(508600001)(6916009)(5660300002)(38100700002)(316002)(6666004)(6506007)(53546011)(82960400001)(83380400001)(9686003)(6512007)(54906003)(26005)(186003)(67856001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?OWRSSXpzQ2RpMGRhZllmVGRGWHhkeW5EVVhDNmhpUEViM1BZbEVBbTFQTmZr?=
 =?utf-8?B?OVIzUXJMRGNxUGoyc3RxeENacCtxNlRaZTJRWlRVN1RMK0NQRGVSdDNjdE1K?=
 =?utf-8?B?MnlrUjBPTktWM2xDN3QyN1hPL2cwQTkvd1l1RkhVVnhUNTFhdXVJQ2dJdU1Y?=
 =?utf-8?B?Z2E1NFllUzI0MjBPWUsvUGdXbW54U2F5ZWtCVVIzZ0dIYVFCaS9LVU80U2wz?=
 =?utf-8?B?VW1WQWk5dnZEcmtJaFJFL3grZS8wZ2txWEpDNGdoWUpNYVNTeXQ4UFZmVEVQ?=
 =?utf-8?B?SnNIdEpEUHBJVm5FblhPRy9QMjVKZk5OcFV5SzdYc2w4Y1JTaHhYSXZRWHhx?=
 =?utf-8?B?WWtQYzZMb1pXc0ZvTmhKQlRrMnpGZkk4VWY5eFBNRUQ4b1VnSGdMV1hWZkVI?=
 =?utf-8?B?WjZNN3VqQWQ1NUsydTFpKzJ3TzAwSVJDTllqUWFhRGt1c09IT2M1NDNsb091?=
 =?utf-8?B?aTZ2dUpVdGdtdzVKNkZhbVhwT0Y5Slo1eGFSVHgwc0FoU1pDZjV3ZWFFa3gw?=
 =?utf-8?B?aTVqTWJraVUrbHNRYWxqOUFRZmdHSGJrMno0U1JHc2dBS0R6dEQzSVcrTWEx?=
 =?utf-8?B?a0p2V0RCRUgvazhLdVVwalBBdFM5RUpnSUdJaVlJaWptY0gvZ3FSVEVaYnZq?=
 =?utf-8?B?WTZiQUNOQk4ydG5vK3c2Wk1DQmNXN0J4RHM4WDdPNCtvdzZFTkdvTk02ZUln?=
 =?utf-8?B?RWRhVWJlTXdhS3JpLzcyL0NnbEtJZ0JsMDVpRm5kTUM1YXdtbjd5MWdlRnNQ?=
 =?utf-8?B?cTZ2L1ZodTJqYzBhN2dBLzA2eFN4YnI3bmRVdEY4djhOc1hNZGtncU9sY3FO?=
 =?utf-8?B?MDBxaGZsbjcxZVZTOGdRbXB5MXZ2WjdFSS9Sc1lOdHhpdytjaEhyeEpmSHYy?=
 =?utf-8?B?QzhYY29VZUNyaEVPUGJHSytOSmJaRzF1aytMMnVUUVhtYkN5Sm1TTWEvM1hE?=
 =?utf-8?B?UFFqTFptNHY2YU8vQUMzQTYvK0lCY0hhM3dabnd5QXdybWtiSWd1MXpzVmJN?=
 =?utf-8?B?cFA1aGd5RnVTV0pWb25rN2hITHUrYktZV2NJVlFZN0RmdGhaaUlFRnhkenlw?=
 =?utf-8?B?aHkyRDhRakw2cUIxbStrb0dGWkYrZ0swS0dTOFE0VFhpWVJSSHBCL0lmbmJ0?=
 =?utf-8?B?TWpiWWVkZ3d5NENwT3FZNGxNOEw0bUVybUZTdnhYVzJWY25tTHhVVTJtSTY3?=
 =?utf-8?B?SXRjbGIyWkhIMlBzaklNbWRvZmRENUkwYkZFVERWeGw5bkoxR2xRU1FTQkln?=
 =?utf-8?B?WEhjWjRLZGJER1NtNUFKMnFNbmpVTWdCQ3dBMDF4ZzZaR25UZFlBL0hReDll?=
 =?utf-8?B?MUg1SitFRUdKTDFjZjB1dWpsMEVGZVdrMkM1MXprYXJLdk45blY2ekVwWW5C?=
 =?utf-8?B?Nk1SR3Z0Y01NSGtOcVU0SEF2aEQrdGcrVy9pMXZReHBDVUJDdnNkWmVONUFz?=
 =?utf-8?B?bG5kNVl1bk9lYWxvcWFzSXdyYXl6cG1SLzRvcjJqL1luUVd0aVNBYktyamRY?=
 =?utf-8?B?bW9GZHVvVTdCZ1I4bmRPeDVIZlk3YWFoU20va2RUdWhSZFdOcUptU1ZqQnpv?=
 =?utf-8?B?Z1dMb0tKazRnckoxWStvUnJwdUlCdFBGYWVZZktScUgxM3ZlVXgrTkJMOHFq?=
 =?utf-8?B?L1lKS0lzSTFXWUppQmRNWE82dEVuMmtjcEJReHR5b2hTRnBPaTJqTDhSSFYv?=
 =?utf-8?B?VkcxcCtOYy9jT0FmOXlnb2c5dHBsUWVmR1pPc1VndnBqNUo2REo4OFl6cW5o?=
 =?utf-8?B?TTNpOHljWFpRRzQ0Wm4zYkt3c1BzY3BVdDZKaW01TVNMZTZLYitBQjI5dGZu?=
 =?utf-8?B?Q3ZHelJFbi8zVW5DcE1RWDYrVzlZai82UnFVcHRNbFVteER4NkxJZlBYODd4?=
 =?utf-8?B?NTZEUGtpSGZudk5OeUM2OFdsUGlMODltY2RWTlFxRmxrVWNaNW52a1R5Y0VI?=
 =?utf-8?B?Nk9QV3ZFN2NjOFFNR3ZWa3VoYTVHVTVzOTZwUC9CeFRMUWNuaEthVjNCWGVP?=
 =?utf-8?B?cElleGhMaXVIU05uMjhnYmQzVnA3N3hHRTFKdWw1cC9GSTBIWU55MVJzaExx?=
 =?utf-8?B?cmx1cUZIbk5odkdGMWx6RzBnRlRZUFN4bDdObFRQeTdXd1o0K2R0dTBjNHJQ?=
 =?utf-8?B?ZHAzdUllTGM4blBVa1BJZGMycHdsN2d1T0lsYW45V2QzaWZqMkVabm9LdXFC?=
 =?utf-8?Q?6f4iTIGgb7tLJaBNeJyBSj8=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 0fe3fcc4-15e0-46f1-2d2a-08d9fc689f80
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 16:20:53.4286
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 6iijZYmnzvfvN7xeb5Upx72ycujhQBkMzE+Fv79CFvNWG1vX33rik7BMTg/gNGzygkSn0D/Mm1F2RWX01YB5qw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR03MB2940
X-OriginatorOrg: citrix.com

On Wed, Mar 02, 2022 at 05:09:10PM +0100, Jan Beulich wrote:
> On 02.03.2022 16:46, Roger Pau Monné wrote:
> > On Wed, Mar 02, 2022 at 03:41:21PM +0100, Jan Beulich wrote:
> >> On 02.03.2022 14:44, Roger Pau Monne wrote:
> >>> @@ -292,6 +295,9 @@ SECTIONS
> >>>         *(.data)
> >>>         *(.data.rel)
> >>>         *(.data.rel.*)
> >>> +#ifdef CONFIG_LIVEPATCH
> >>> +       *(.data.*)
> >>> +#endif
> >>>         CONSTRUCTORS
> >>>    } PHDR(text)
> >>>  
> >>> @@ -308,6 +314,9 @@ SECTIONS
> >>>         . = ALIGN(SMP_CACHE_BYTES);
> >>>         __per_cpu_data_end = .;
> >>>         *(.bss)
> >>> +#ifdef CONFIG_LIVEPATCH
> >>> +       *(.bss.*)
> >>> +#endif
> >>
> >> ... are these two really in need of being conditional?
> > 
> > Will drop if you agree. I didn't want to risk introducing unwanted
> > changes in the !CONFIG_LIVEPATCH case.
> 
> The only "unwanted" change I can imagine here would be that we place a
> section which the linker would otherwise need to guess how to place,
> for being "orphan".
> 
> >>> --- a/xen/common/Kconfig
> >>> +++ b/xen/common/Kconfig
> >>> @@ -353,7 +353,9 @@ config CRYPTO
> >>>  config LIVEPATCH
> >>>  	bool "Live patching support"
> >>>  	default X86
> >>> -	depends on "$(XEN_HAS_BUILD_ID)" = "y"
> >>> +	depends on "$(XEN_HAS_BUILD_ID)" = "y" && \
> >>> +	           $(cc-option,-ffunction-sections) && \
> >>> +	           $(cc-option,-fdata-sections)
> >>
> >> Is this for certain Clang versions? Gcc has been supporting this in
> >> 4.1.x already (didn't check when it was introduced).
> > 
> > I've checked clang and it seems to be prevent in at least Clang 5,
> > which is likely enough?
> 
> Clang5 accepts the options fine here. But that wouldn't be enough,
> ./README says "Clang/LLVM 3.5 or later".
> 
> > I've added the check just to be on the safe side.
> 
> Well, yes, if you're unsure and the old version can't be checked,
> then perhaps indeed better to probe.

OK, so I've managed to probe clang 3.5.0 and it does support
-f{function,data}-sections so we can drop the check.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 16:24:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 16:24:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282462.481176 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPRmM-00036a-80; Wed, 02 Mar 2022 16:24:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282462.481176; Wed, 02 Mar 2022 16:24:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPRmM-00036T-4n; Wed, 02 Mar 2022 16:24:42 +0000
Received: by outflank-mailman (input) for mailman id 282462;
 Wed, 02 Mar 2022 16:24:41 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=sydv=TN=amazon.de=prvs=053930d30=doebel@srs-se1.protection.inumbo.net>)
 id 1nPRmK-00036N-Op
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 16:24:41 +0000
Received: from smtp-fw-9102.amazon.com (smtp-fw-9102.amazon.com
 [207.171.184.29]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 40887a91-9a45-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 17:24:38 +0100 (CET)
Received: from pdx4-co-svc-p1-lb2-vlan3.amazon.com (HELO
 email-inbound-relay-iad-1a-2d7489a4.us-east-1.amazon.com) ([10.25.36.214])
 by smtp-border-fw-9102.sea19.amazon.com with ESMTP; 02 Mar 2022 16:24:23 +0000
Received: from EX13D03EUC002.ant.amazon.com
 (iad12-ws-svc-p26-lb9-vlan2.iad.amazon.com [10.40.163.34])
 by email-inbound-relay-iad-1a-2d7489a4.us-east-1.amazon.com (Postfix) with
 ESMTPS id 7BB7C81640; Wed,  2 Mar 2022 16:24:20 +0000 (UTC)
Received: from [10.85.98.33] (10.43.166.127) by EX13D03EUC002.ant.amazon.com
 (10.43.164.60) with Microsoft SMTP Server (TLS) id 15.0.1497.28; Wed, 2 Mar
 2022 16:24:18 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 40887a91-9a45-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646238279; x=1677774279;
  h=message-id:date:mime-version:subject:to:cc:references:
   from:in-reply-to:content-transfer-encoding;
  bh=/RXTr240dq8/dXMZX9Q5X7Ekf4Q0aMl1fc6FKE5Dphg=;
  b=EaTbCgBKwA5LV/moJaIAoZSt+Yf0D+zCvsrzsUCFZ0QGC5Pml/OQVRxb
   RDHD81uWrvetuUYW+A2wY2CifWLmaJfgQ2XIv7mdGz/rmb0Cmj6UzQ5Pi
   Dw++xuWvoyg6/yWKNPNHw7vvAJcXWQg45uR3M95nLeUqopEk/ANwWnszp
   g=;
X-IronPort-AV: E=Sophos;i="5.90,149,1643673600"; 
   d="scan'208";a="198951410"
Message-ID: <667db455-737b-47c9-bc4b-5729687b384f@amazon.de>
Date: Wed, 2 Mar 2022 17:24:17 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH 3/4] livepatch: do the initial build using CROSS_COMPILE
Content-Language: en-US
To: Roger Pau Monne <roger.pau@citrix.com>, <xen-devel@lists.xenproject.org>
CC: <ross.lagerwall@citrix.com>, <konrad.wilk@oracle.com>, <julien@xen.org>,
	<Andrew.Cooper3@citrix.com>
References: <20220302142711.38953-1-roger.pau@citrix.com>
 <20220302142711.38953-4-roger.pau@citrix.com>
From: "Doebel, Bjoern" <doebel@amazon.de>
In-Reply-To: <20220302142711.38953-4-roger.pau@citrix.com>
X-Originating-IP: [10.43.166.127]
X-ClientProxiedBy: EX13D45EUC001.ant.amazon.com (10.43.164.107) To
 EX13D03EUC002.ant.amazon.com (10.43.164.60)
Precedence: Bulk
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: base64
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From xen-devel-bounces@lists.xenproject.org Wed Mar 02 16:25:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 16:25:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282468.481186 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPRnV-0003he-HR; Wed, 02 Mar 2022 16:25:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282468.481186; Wed, 02 Mar 2022 16:25:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPRnV-0003hX-EY; Wed, 02 Mar 2022 16:25:53 +0000
Received: by outflank-mailman (input) for mailman id 282468;
 Wed, 02 Mar 2022 16:25:52 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=sydv=TN=amazon.de=prvs=053930d30=doebel@srs-se1.protection.inumbo.net>)
 id 1nPRnU-0003hN-0S
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 16:25:52 +0000
Received: from smtp-fw-9103.amazon.com (smtp-fw-9103.amazon.com
 [207.171.188.200]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6b785e72-9a45-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 17:25:50 +0100 (CET)
Received: from pdx4-co-svc-p1-lb2-vlan2.amazon.com (HELO
 email-inbound-relay-iad-1a-1ac2810f.us-east-1.amazon.com) ([10.25.36.210])
 by smtp-border-fw-9103.sea19.amazon.com with ESMTP; 02 Mar 2022 16:25:21 +0000
Received: from EX13D03EUC002.ant.amazon.com
 (iad12-ws-svc-p26-lb9-vlan3.iad.amazon.com [10.40.163.38])
 by email-inbound-relay-iad-1a-1ac2810f.us-east-1.amazon.com (Postfix) with
 ESMTPS id 1CD6181313; Wed,  2 Mar 2022 16:25:19 +0000 (UTC)
Received: from [10.85.98.33] (10.43.166.127) by EX13D03EUC002.ant.amazon.com
 (10.43.164.60) with Microsoft SMTP Server (TLS) id 15.0.1497.28; Wed, 2 Mar
 2022 16:25:18 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6b785e72-9a45-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646238350; x=1677774350;
  h=message-id:date:mime-version:to:cc:references:from:
   in-reply-to:content-transfer-encoding:subject;
  bh=IShwUKZBNS2hmzlTxIY7r401dk03n4mPa9d2S0msMZc=;
  b=ZGYXXs5BBwWyrRP+qrCLHGpjkMia4OHv3sT6unA5kRmxAF2r4zdkFbwH
   SiywB8Qx1EUJo7GO45pvZNzFCqnk8Cb9+ZDzrofjLGf78x3jYsj4j5Jdz
   S0L3mtOKAo2EqcH+3rrJhrLCwetoyoHVrFOowlZdf4GUXWgDAvbxzISm7
   Q=;
X-IronPort-AV: E=Sophos;i="5.90,149,1643673600"; 
   d="scan'208";a="996183590"
Subject: Re: [PATCH 4/4] livepatch: differentiate between old and new build systems
Message-ID: <b9724d0c-d8bc-5142-5fa5-59376d20445b@amazon.de>
Date: Wed, 2 Mar 2022 17:25:17 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Content-Language: en-US
To: Roger Pau Monne <roger.pau@citrix.com>, <xen-devel@lists.xenproject.org>
CC: <ross.lagerwall@citrix.com>, <konrad.wilk@oracle.com>, <julien@xen.org>,
	<Andrew.Cooper3@citrix.com>
References: <20220302142711.38953-1-roger.pau@citrix.com>
 <20220302142711.38953-5-roger.pau@citrix.com>
From: "Doebel, Bjoern" <doebel@amazon.de>
In-Reply-To: <20220302142711.38953-5-roger.pau@citrix.com>
X-Originating-IP: [10.43.166.127]
X-ClientProxiedBy: EX13D51EUC001.ant.amazon.com (10.43.164.111) To
 EX13D03EUC002.ant.amazon.com (10.43.164.60)
Precedence: Bulk
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: base64
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=



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 16:42:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 16:42:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282484.481215 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPS36-0007B5-D5; Wed, 02 Mar 2022 16:42:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282484.481215; Wed, 02 Mar 2022 16:42:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPS36-0007Ax-8t; Wed, 02 Mar 2022 16:42:00 +0000
Received: by outflank-mailman (input) for mailman id 282484;
 Wed, 02 Mar 2022 16:41:57 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=s4+D=TN=oracle.com=dongli.zhang@srs-se1.protection.inumbo.net>)
 id 1nPS33-0006uy-5E
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 16:41:57 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ab1d5ade-9a47-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 17:41:55 +0100 (CET)
Received: from pps.filterd (m0246630.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 222EqFaW002562; 
 Wed, 2 Mar 2022 16:41:38 GMT
Received: from userp3030.oracle.com (userp3030.oracle.com [156.151.31.80])
 by mx0b-00069f02.pphosted.com with ESMTP id 3ehdayvpj0-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Wed, 02 Mar 2022 16:41:37 +0000
Received: from pps.filterd (userp3030.oracle.com [127.0.0.1])
 by userp3030.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 222GM3eM163335;
 Wed, 2 Mar 2022 16:41:36 GMT
Received: from nam02-dm3-obe.outbound.protection.outlook.com
 (mail-dm3nam07lp2040.outbound.protection.outlook.com [104.47.56.40])
 by userp3030.oracle.com with ESMTP id 3ef9b18d4v-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Wed, 02 Mar 2022 16:41:35 +0000
Received: from BYAPR10MB2663.namprd10.prod.outlook.com (2603:10b6:a02:a9::20)
 by MWHPR1001MB2144.namprd10.prod.outlook.com (2603:10b6:301:2b::32)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.22; Wed, 2 Mar
 2022 16:41:33 +0000
Received: from BYAPR10MB2663.namprd10.prod.outlook.com
 ([fe80::a0d5:610d:bcf:9b47]) by BYAPR10MB2663.namprd10.prod.outlook.com
 ([fe80::a0d5:610d:bcf:9b47%4]) with mapi id 15.20.5017.027; Wed, 2 Mar 2022
 16:41:32 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ab1d5ade-9a47-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc :
 subject : date : message-id : content-type : mime-version;
 s=corp-2021-07-09; bh=JFdbPhdDPlCnQK0SS45U+jf4D54W/mP1h4d1i5XCiso=;
 b=l00W2czR5wnYc9ncNjUd9Pz1aWoXlXZr4kRBper4U7vCsZWzEttMguUob9UbftbbERfV
 ZQjT11RTnkpVIJpyD7SzR12YAuhDAyYWOQJmTCdpOWRsKSNfDbWiopF13k9PRDBF2NOV
 MgyVxiHVGpQ7qigbgHRVoBIljrDFtKgxu+EXG0ZPKcCK0kS0DAKJ1BHwDKwymPS6cRmP
 dkml3yl4nrCAUPizJlXhbaAvTpRL8IpR+Aff13fK/trPmxWDtn46icRXtwa8hLiLhGyE
 YGTyM8WN8ls6x7X8ONpPc40VTgvdYc2U5504XHbzSjOW2coRFzPx2msZOsiOJ1v9ZpVV EQ== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=fsyudh48df6LQOGMRHAjNgml41B7eUX8m51hWVCv9q3K9L931Kh3QSyGwEZavglJe//2DbTZGUedc9KEqPJT0TOe9jnXv+2YDHD82vjHmlMzbA5N/9SqPOZE/upVaXGoJz4EVfRYbJWL29A8buJn5vLjx8u0G7wu7mb874GQgWsYkI6jf+lci6zdoNL76e2+4b+I43P5GbuTloNS3qygXDtdJ79/ag6o7yr8tcBpx6zBHs8EEuy5F6eEw6UT6C1NU+VEerTRB/qX5HtKU/p+mdytQW1q1x2Or3p2mOzT/lYM0a/T4uH+AB738qpe8PM6d/YVJ76mODU4IBbO2uOU7Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=JFdbPhdDPlCnQK0SS45U+jf4D54W/mP1h4d1i5XCiso=;
 b=FOv5okjTRxrqLshJ5XLt3eMonAp6rQs7lXXXjyBlRbVdoWGIXhIAm/lHMHZCHq00dyOMKU75a4YE3yimksVxDsOacyFhDh+1wjzgtYeRuC8SyIcQhb7hRzpUrXbeju55pNe9cjxExVq97cQLRRwmLg9RABCy53aLUFz7DD10lc+BAWyId6Qb9ew6IdszR+tikU86JdR4Rw+6cIVFCknYg0XOZm3MAo9DW3l8kv31IdNbyTOOeR6+/sJSuH+Q7r5i6fQm4wubn1fhLnVVvNz7fnC4v+MinSZTshxlW+JWIdfx0A5gEsVUt5Ha/eSQQg7/YafhIi9Z/yb04v0xGJvwCQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=JFdbPhdDPlCnQK0SS45U+jf4D54W/mP1h4d1i5XCiso=;
 b=JUABIpk19itXwjdpv+Fy6EtcFTtO7M8cW5k7VYefpo4jZDeDMwazEEGdSVPxizWOkEcb7tcb5VcBfA0I/BtTjE+pWIrsTX3LcNeQ0ObxZK5CO+TAyT61Y9wPfHO31Xqw/Z8KnahcsSfXYN7TCGjILOkRWdQaYd24QjglhhfcjZM=
From: Dongli Zhang <dongli.zhang@oracle.com>
To: xen-devel@lists.xenproject.org, x86@kernel.org
Cc: linux-kernel@vger.kernel.org, boris.ostrovsky@oracle.com, jgross@suse.com,
        sstabellini@kernel.org, tglx@linutronix.de, mingo@redhat.com,
        bp@alien8.de, dave.hansen@linux.intel.com, joe.jin@oracle.com
Subject: [PATCH v4 0/2] xen: fix HVM kexec kernel panic
Date: Wed,  2 Mar 2022 08:40:30 -0800
Message-Id: <20220302164032.14569-1-dongli.zhang@oracle.com>
X-Mailer: git-send-email 2.17.1
Content-Type: text/plain
X-ClientProxiedBy: BYAPR21CA0019.namprd21.prod.outlook.com
 (2603:10b6:a03:114::29) To BYAPR10MB2663.namprd10.prod.outlook.com
 (2603:10b6:a02:a9::20)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 9f6f9cf3-e299-4c77-f530-08d9fc6b8245
X-MS-TrafficTypeDiagnostic: MWHPR1001MB2144:EE_
X-Microsoft-Antispam-PRVS: 
	<MWHPR1001MB21440856A215068C5903B66CF0039@MWHPR1001MB2144.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR10MB2663.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(83380400001)(66556008)(36756003)(2906002)(44832011)(5660300002)(38100700002)(107886003)(6486002)(38350700002)(966005)(86362001)(508600001)(8936002)(1076003)(186003)(316002)(26005)(6512007)(6506007)(66946007)(8676002)(52116002)(66476007)(4326008)(2616005);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?us-ascii?Q?lHfiFVwIpOfWVnOLp++aqrzKojSKhWU9PBhlaEpeMdpLQDmmMHgO7kpIyH09?=
 =?us-ascii?Q?bkcDcrTFZfecrxCzel9vJOtNDFgdflfflNDU+sz3hAH8WQuGkOzW2XfxXCDh?=
 =?us-ascii?Q?rXRlCRjOYtKvHxloEkubA7KK3xOx8KJjVCRHtdTtfDWJW82IQ/P7sPHBwp89?=
 =?us-ascii?Q?PGKUxJIlH8Zdaf6K9Bwenf5Rt4plizNpRr9J9+ZQervmbueVkOzLtZbNOf5u?=
 =?us-ascii?Q?JfSt3o2UMVwTvXQ77fUvj3oKO3A9htrGaFUwS+xwugWXyMHZpPfHi0hz1beE?=
 =?us-ascii?Q?AbipwOxx+4iYdoGx20PtOLwHqERwsZtgHdjP5oPcnmbLBbO4fNmEeMylZEEC?=
 =?us-ascii?Q?rxGTPXat9C/r4zJ9eA6EqEF09lK7Ae6lQsu8pKrMQW0ykDuVA3AbJimhFfyk?=
 =?us-ascii?Q?dqqdv8t8Kl8m4UI1AibZiZBU2Ikc76W+h6B1b56AeS9WqUooM8IzbzUwWvKs?=
 =?us-ascii?Q?FeZ7Ct1CXZpohOMJkINuWjftJTQdn/BQ3RusaisJL63uYW0QWRIzYrg21sLv?=
 =?us-ascii?Q?NlXYZA5vi+MvQ97aKpjadrJCPTJdoOwDP1feOmr5T+Kw2T2IWJZgbqX6rPgk?=
 =?us-ascii?Q?gysoT/YURmc2C9TrUmjQdhZVhEdhLXHMEDPqa+cLHJ3h1JRxIlTQiJBD2f/I?=
 =?us-ascii?Q?eqIOZhPUsumPlPHQxCCHZyJL5qQV2w10fDQo0McDVGFhOEMMAk8eAz/9m5bZ?=
 =?us-ascii?Q?tLIuWeKzVPRWXDspKR1e6xOFs31fXlreVSHTjTiP/tzr8OAnKp5mDcTytUAb?=
 =?us-ascii?Q?10EM9gwx5TSjiZNF3dgDejAJsFow6/tFTnWNaxMMCwAR+RquId+OeJt/1mNv?=
 =?us-ascii?Q?1x3nFxxwL6Q0oYDpPrXA8OlF4dQS+xd/VWpYHezbwYpat5qZuPHtdTCORRur?=
 =?us-ascii?Q?Of7dTofsV4W0edXt1L4kACdPkl6bjp6uV+GJDgZBwaVImPMRml9uqNGQxSX6?=
 =?us-ascii?Q?Kxf/6YWVn4X6whXcVhK0WqGz4WqtnBJaeKVoqzXIUqQpWqC9EP9UuZSZHhjP?=
 =?us-ascii?Q?vhYcU/foYRrT0TTO/bjRXgKvh7/1l6IN+ifb4BdhJMLqgbX5jnNp5y8AE51j?=
 =?us-ascii?Q?lJBpGFqYlo8nsQoCcTukcxMWfLO0Wx7b4yYQkvXZAiHxLUYuLCUlbzM1NSLH?=
 =?us-ascii?Q?mOOkWYKWWxLROV4P3O5xpWjJEUPFQTFOCSXMJhPSCsbRtWcXm/0p0bZQB1PL?=
 =?us-ascii?Q?tWEcr58uMgswcaJpmXGvj9Rc+rAEuSggLyHCPtp7s2cjLwSUPP8rG7EvxMl+?=
 =?us-ascii?Q?NRb2OHW72/jHAmLmjkLwdhgQs0Ojl+vHvhhi4B42hVoa/g/6APA21aQUNLhp?=
 =?us-ascii?Q?N5256UZMOluewH6COVtSIYSKy8mpuD6qCxcJVSoYkM7yEN6bU22+wkFBbti7?=
 =?us-ascii?Q?p3b0S3saiv+x2TLrzu/5arqDGoDHH5ln6s0qWJpzPH1NuG+3dWT1B8pvHreB?=
 =?us-ascii?Q?g4NGQKY5Jh+J65pZizMOX96JxGJopehZX+mJVsnSb2cJCaha0q2MkvKzNLiJ?=
 =?us-ascii?Q?yE2c5iHLHnB/LdUOYoD1dIV0cXjSNf99qzrT4C4nIZjz2TzCk+7Od8Edyr1O?=
 =?us-ascii?Q?X6Wjra+9CGn5tBLJpm3Ah/rWYVydNeXq7CK7caYfLetJ4PEHiGvJwGQeuOn+?=
 =?us-ascii?Q?kf8Ied06QBgQItJ7bThZg/g=3D?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 9f6f9cf3-e299-4c77-f530-08d9fc6b8245
X-MS-Exchange-CrossTenant-AuthSource: BYAPR10MB2663.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 16:41:32.8990
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: SKOZdcl3103R+IM5Y/Xtux7FgltL7Z+mXnoZtzIbYIBTpk+mD9OaM+5CNxx8glN6iUhyk7F/bdSsQ8Hq0WHGcQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR1001MB2144
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10274 signatures=686787
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 bulkscore=0 malwarescore=0
 mlxscore=0 phishscore=0 suspectscore=0 adultscore=0 mlxlogscore=884
 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2201110000
 definitions=main-2203020073
X-Proofpoint-GUID: xXDSAq_1d6cwUWbM5pPTW0sa8aJxUnex
X-Proofpoint-ORIG-GUID: xXDSAq_1d6cwUWbM5pPTW0sa8aJxUnex

This is the v4 of the patch to fix xen kexec kernel panic issue when the
kexec is triggered on VCPU >= 32.

PANIC: early exception 0x0e IP 10:ffffffffa96679b6 error 0 cr2 0x20
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 5.17.0-rc4xen-00054-gf71077a4d84b-dirty #1
... ...
[    0.000000] RIP: 0010:pvclock_clocksource_read+0x6/0xb0
... ...
[    0.000000] RSP: 0000:ffffffffaae03e10 EFLAGS: 00010082 ORIG_RAX: 0000000000000000
[    0.000000] RAX: 0000000000000000 RBX: 0000000000010000 RCX: 0000000000000002
[    0.000000] RDX: 0000000000000003 RSI: ffffffffaac37515 RDI: 0000000000000020
[    0.000000] RBP: 0000000000011000 R08: 0000000000000000 R09: 0000000000000001
[    0.000000] R10: ffffffffaae03df8 R11: ffffffffaae03c68 R12: 0000000040000004
[    0.000000] R13: ffffffffaae03e50 R14: 0000000000000000 R15: 0000000000000000
[    0.000000] FS:  0000000000000000(0000) GS:ffffffffab588000(0000) knlGS:0000000000000000
[    0.000000] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    0.000000] CR2: 0000000000000020 CR3: 00000000ea410000 CR4: 00000000000406a0
[    0.000000] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[    0.000000] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[    0.000000] Call Trace:
[    0.000000]  <TASK>
[    0.000000]  ? xen_clocksource_read+0x24/0x40
[    0.000000]  ? xen_init_time_common+0x5/0x49
[    0.000000]  ? xen_hvm_init_time_ops+0x23/0x45
[    0.000000]  ? xen_hvm_guest_init+0x221/0x25c
[    0.000000]  ? 0xffffffffa9600000
[    0.000000]  ? setup_arch+0x440/0xbd6
[    0.000000]  ? start_kernel+0x6c/0x695
[    0.000000]  ? secondary_startup_64_no_verify+0xd5/0xdb
[    0.000000]  </TASK>


Changed since v1:
  - Add commit message to explain why xen_hvm_init_time_ops() is delayed
    for any vcpus. (Suggested by Boris Ostrovsky)
  - Add a comment in xen_hvm_smp_prepare_boot_cpu() referencing the related
    code in xen_hvm_guest_init(). (suggested by Juergen Gross)
Changed since v2:
  - Delay for all VCPUs. (Suggested by Boris Ostrovsky)
  - Add commit message that why PVM is not supported by this patch
  - Test if kexec/kdump works with mainline xen (HVM and PVM)
Changed since v3:
  - Re-use v2 but move the login into xen_hvm_init_time_ops() (Suggested
    by Boris Ostrovsky) 


I have tested with HVM VM on both old xen and mainline xen.

About the mainline xen, the 'soft_reset' works after I reset d->creation_reset
as suggested by Jan Beulich.

https://lore.kernel.org/all/d3814109-f4ba-9edb-1575-ab94faaeba08@suse.com/


Thank you very much!

Dongli Zhang




From xen-devel-bounces@lists.xenproject.org Wed Mar 02 16:42:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 16:42:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282483.481203 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPS34-0006vG-0a; Wed, 02 Mar 2022 16:41:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282483.481203; Wed, 02 Mar 2022 16:41:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPS33-0006v9-Tu; Wed, 02 Mar 2022 16:41:57 +0000
Received: by outflank-mailman (input) for mailman id 282483;
 Wed, 02 Mar 2022 16:41:56 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=s4+D=TN=oracle.com=dongli.zhang@srs-se1.protection.inumbo.net>)
 id 1nPS31-0006uy-SM
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 16:41:56 +0000
Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com
 [205.220.165.32]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a94a1cd7-9a47-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 17:41:53 +0100 (CET)
Received: from pps.filterd (m0246627.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 222EqN0j005345; 
 Wed, 2 Mar 2022 16:41:38 GMT
Received: from userp3030.oracle.com (userp3030.oracle.com [156.151.31.80])
 by mx0b-00069f02.pphosted.com with ESMTP id 3eh14bxe2c-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Wed, 02 Mar 2022 16:41:38 +0000
Received: from pps.filterd (userp3030.oracle.com [127.0.0.1])
 by userp3030.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 222GM3eO163335;
 Wed, 2 Mar 2022 16:41:37 GMT
Received: from nam02-dm3-obe.outbound.protection.outlook.com
 (mail-dm3nam07lp2040.outbound.protection.outlook.com [104.47.56.40])
 by userp3030.oracle.com with ESMTP id 3ef9b18d4v-2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Wed, 02 Mar 2022 16:41:37 +0000
Received: from BYAPR10MB2663.namprd10.prod.outlook.com (2603:10b6:a02:a9::20)
 by MWHPR1001MB2144.namprd10.prod.outlook.com (2603:10b6:301:2b::32)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.22; Wed, 2 Mar
 2022 16:41:34 +0000
Received: from BYAPR10MB2663.namprd10.prod.outlook.com
 ([fe80::a0d5:610d:bcf:9b47]) by BYAPR10MB2663.namprd10.prod.outlook.com
 ([fe80::a0d5:610d:bcf:9b47%4]) with mapi id 15.20.5017.027; Wed, 2 Mar 2022
 16:41:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a94a1cd7-9a47-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc :
 subject : date : message-id : in-reply-to : references : content-type :
 mime-version; s=corp-2021-07-09;
 bh=NLQhFdDbco3Q7cD64mKoFgRLbwwsjMsi9EPxf+xOeIU=;
 b=I3SFkg9PLeyuuNe0xp5w7RO5vlTDIbeoeYTrn+gPlNCByBEOBEktUrbAbV/WKSjShAum
 1Uc62fXb8x8H0EJeSaHi7Jjj0nfYqkhTl0nzJLajIygaWkGB5Sq0g09TxG9A/5kq3res
 li/VJSBpPlsQYrPcMFFT7mLnotEOeUhXQ0u/pz0CyPRQYX1qxLVlv5Sx1S8CbbIRVmmf
 nNGDRiEz7jbnpw34Pon7MQ2tq1wcQyDxSy9ULb0vTnc+XIbpBMUvu4nRMB/BB8erf1rl
 Uy/j+6BSpLub7XzZjirfVNoTKgksyxOdr3EtcWdwIpTZWFmzCHR+56rh5KQJcIbw68KC Aw== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=D//FRXBpoeZGoDH7GlMR2v+ZnbKbfRnVvleWRNeGTUdg/RKmpqSrhrDlCvQaNKyZKzUNzwL0ZnrARIBRumkSWIoBTXP7nJ6/htvKRsv4ke3I5jN8uHVtUts8njQJ4UbbitOwiP097oSaDHDwEu8vHHnQtPYl1lFvUochaQk2HcuNxv5P2G94HqjeYs88GrdKtIaHPfu3cZTaAHU6K3Ljv7eVfWooui/AQayCA4Y1SbFUMKn+HT2zaC4ldotszHa+OWyFQt1bSZwJuz1Tt4RsfhsI6kvGEh3/wzEjbEnKgdLVSbC9HZ5k05TXHhbhXolo/pkPokoUSTtq7ny3u/ZLaA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=NLQhFdDbco3Q7cD64mKoFgRLbwwsjMsi9EPxf+xOeIU=;
 b=ZLejBnI3k8TcrSOOqG6QrkWmlpFQU6qtCRsDk0Jz11fwgXC0nuYWYow4ryvVhi4zKtORShkKO3OWTvt4+l8z+ZWIB++GMOcihhLfQyWp98j30DvgFM/+JbkURcc+8d1t2sijH2XbHLcwK4uX61KrVGwoiKi5PaWlNGIKEFm/MqM9Js288lM+K/bcYY+HmTX2DOBkZm+TXFXalIdfO23BEEDQmxwSfXNypyqfQc1ocPSXOHQCsA7TASfHlcEPxMj7Lm+PDJBv2/r7xPnsYqtQfrcXi6cNXXg8Du1Fu8g3obtKCEfHM0q6gviEo5YsFtUjK9DsWxYuKiv2coLk7i/dEQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=NLQhFdDbco3Q7cD64mKoFgRLbwwsjMsi9EPxf+xOeIU=;
 b=B4ahnZvHX78AknjNaklHE9TJT0Rpfr90yKbe/0vkDcedGZu3n8LrRc1KpcnyI+TyX2JFZFl5iYLclg2Bu9EOHMgXEB5UbNYSUn3ex/7dhL8sv+7t0lFNLgl20Y/gliNXNx6S1hIxm6D1deaTNwJxhvLDEH3Fw+9HbtoVlD5pO/8=
From: Dongli Zhang <dongli.zhang@oracle.com>
To: xen-devel@lists.xenproject.org, x86@kernel.org
Cc: linux-kernel@vger.kernel.org, boris.ostrovsky@oracle.com, jgross@suse.com,
        sstabellini@kernel.org, tglx@linutronix.de, mingo@redhat.com,
        bp@alien8.de, dave.hansen@linux.intel.com, joe.jin@oracle.com
Subject: [PATCH v4 1/2] x86/xen/time: fix indentation issue
Date: Wed,  2 Mar 2022 08:40:31 -0800
Message-Id: <20220302164032.14569-2-dongli.zhang@oracle.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220302164032.14569-1-dongli.zhang@oracle.com>
References: <20220302164032.14569-1-dongli.zhang@oracle.com>
Content-Type: text/plain
X-ClientProxiedBy: BYAPR21CA0019.namprd21.prod.outlook.com
 (2603:10b6:a03:114::29) To BYAPR10MB2663.namprd10.prod.outlook.com
 (2603:10b6:a02:a9::20)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 1b9d917c-880d-4ecc-8cf0-08d9fc6b82a0
X-MS-TrafficTypeDiagnostic: MWHPR1001MB2144:EE_
X-Microsoft-Antispam-PRVS: 
	<MWHPR1001MB2144B071033710CA6D6BF8B2F0039@MWHPR1001MB2144.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR10MB2663.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(83380400001)(66556008)(36756003)(4744005)(2906002)(44832011)(5660300002)(38100700002)(107886003)(6486002)(38350700002)(86362001)(508600001)(8936002)(1076003)(186003)(316002)(26005)(6512007)(6506007)(66946007)(8676002)(52116002)(66476007)(4326008)(2616005);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?us-ascii?Q?vKJCryAhZW3FKQFev2LQFqrIPC+QtMGFsOWVlSPJUXBAP7O+m95iX76HZ4aE?=
 =?us-ascii?Q?c4OlSNA6mim5h0L44N+CCSHX4SvY+urV7xmsaQOhkZVy9zijuhESdgMfRsXl?=
 =?us-ascii?Q?Mdxf6idSZTG6NO+ujf7Ca8GcSMbHUI74QnxPyLXPfWHFTpTNEoV8e43DKV70?=
 =?us-ascii?Q?xPm8APAH9Qm51No8zBtP/VBibNnr2Ec1TMHWzCmEtawUqrIvFWmuV84EVVjk?=
 =?us-ascii?Q?PIj7F50M1r+LuKx9ydUoG3AuKFqgqzYRQz3BdFFRnHgCZF683DrzwPEdZ1pq?=
 =?us-ascii?Q?ZgZjfgeQHpDlRr+3LfTb2JZNUZ2IITSlCCo2tVYyI3pSuapnD4jyFvo20Q2S?=
 =?us-ascii?Q?oSq2iscBKnDV8o4Poe7XQUzOEgYaPQr1yAuj71jee8sFBmSYaxPVEKrFaMn+?=
 =?us-ascii?Q?qJYyCLBFZ8WmnjmnCWuQ2jfcXF0NNjn+51AjiV19ghBcwz9mIXaoStAIMi3C?=
 =?us-ascii?Q?+YhvuqlurEzExMoatda1qG8Df5GtvbYvgaoTQnx4v13snuh7wZNmuH5qcwPh?=
 =?us-ascii?Q?43+SjjAbB+fnnjQDTB8FLiHcobx9tgrILQN6SfMwocm0SSxv7nvNSaA1ogf8?=
 =?us-ascii?Q?IBgTwqakggICggsSWkUK/4fs1KatSRPIXS2rkcTMDUlFbWlZ8Q46ZG9eF3kl?=
 =?us-ascii?Q?69ecuxOSxb+DXGNzQUPtQBj1TqcU9mO92i8DRrReiKlMwu8tXlDpxIYMdJhQ?=
 =?us-ascii?Q?qYsg51TTeYJoexLeHJIPJTlB4WE19Sl1wzwAqenIAFBMP7pag/ySSMge18z3?=
 =?us-ascii?Q?BnUlUoXT4Vi98l11GTw1rKNKONMykpixMssadvUUIJLzh0jLq0Jqs+mw9Wry?=
 =?us-ascii?Q?rtEMQPI+DIcuKd++JCAjZF6xohjlNqO0STJT17VneGiNyLvdeeptvXrTfqC7?=
 =?us-ascii?Q?a6pkY2ftwin7sfemDhNbAsNKfB6254kPv2CHLfKLCb7X+9NOgTewwxwKVGiQ?=
 =?us-ascii?Q?2RAwtESY9OgeXS1K4UWx5OI6C2agYY+gFzq81DxEz2bCm7OaLY4WD46oi0su?=
 =?us-ascii?Q?k2Q9DE22EzZ/kotTa9hm/igtPQtvcGrbDhShOkoZzd1PzMqrhmywikhiDUeQ?=
 =?us-ascii?Q?FCBnl6N/OL96VKTR7snImx7iooMMk0qEqLar7sN24FPKlPNz05wxWvFvdRS/?=
 =?us-ascii?Q?OeXVTdoqmBjmNlCTWUp26MH1iwrHk5PuW9aNR3vOKz/H7WxbH4L6QPQeSe+v?=
 =?us-ascii?Q?ZcxUYTPV81dcX/0msyIhKxN+H8y3y/N45ymYCNgoXMLPLtttA72baGOI95gw?=
 =?us-ascii?Q?Iv3jw/+Cl5Gb9Wbx9ziDhWmwPPlSq4rH6R2rzvbftdBC2dwOTKcHpoHdQOLv?=
 =?us-ascii?Q?vHJzrqumlA8vRdFmFsCJHx1HQuiQiHBGn8ztMOObWsK2N3rTVIsRctKeOFTu?=
 =?us-ascii?Q?t1aSuQOLdoGlgMbmIqToFiw9gOKvrCLunEAOieBeF6tFEBow0tdr9GApUL12?=
 =?us-ascii?Q?G4bFHRXbjNBNvgQgkvZwaE2z1qgzGQwWzukj8Tx5HS99EXjc32ePlVU3efIP?=
 =?us-ascii?Q?Ya8zC6IIOYcWb5BZEWAJKT2lL+ORhL3VvRa2NXSyo3YC7c1aoBXwVxr4uYNH?=
 =?us-ascii?Q?eqmkey9vuSy2sJcnI+NqgvHGiLuf/Qg4MqMwonWc94Rr02mZ9Q3vztxTetd/?=
 =?us-ascii?Q?b/bOoxExoMTaACZRBblJ76M=3D?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1b9d917c-880d-4ecc-8cf0-08d9fc6b82a0
X-MS-Exchange-CrossTenant-AuthSource: BYAPR10MB2663.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 16:41:33.3989
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: a7tealzHKi2/Y4MUQ6jZSpoZBmB2kqqrTwCwXcX8MgfQpHBReBLJlAyfYrSQnPkRWlifeiHXD2sb2wnxJegnpQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR1001MB2144
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10274 signatures=686787
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 bulkscore=0 malwarescore=0
 mlxscore=0 phishscore=0 suspectscore=0 adultscore=0 mlxlogscore=999
 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2201110000
 definitions=main-2203020073
X-Proofpoint-GUID: xPsxU6gPkrmz3Wlg0gwV9WTg5hs2wqHP
X-Proofpoint-ORIG-GUID: xPsxU6gPkrmz3Wlg0gwV9WTg5hs2wqHP

No functional change.

Signed-off-by: Dongli Zhang <dongli.zhang@oracle.com>
---
 arch/x86/xen/time.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/arch/x86/xen/time.c b/arch/x86/xen/time.c
index d9c945ee1100..55b3407358a9 100644
--- a/arch/x86/xen/time.c
+++ b/arch/x86/xen/time.c
@@ -45,7 +45,7 @@ static unsigned long xen_tsc_khz(void)
 
 static u64 xen_clocksource_read(void)
 {
-        struct pvclock_vcpu_time_info *src;
+	struct pvclock_vcpu_time_info *src;
 	u64 ret;
 
 	preempt_disable_notrace();
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 16:42:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 16:42:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282497.481225 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPS3z-00082C-M2; Wed, 02 Mar 2022 16:42:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282497.481225; Wed, 02 Mar 2022 16:42:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPS3z-000825-J5; Wed, 02 Mar 2022 16:42:55 +0000
Received: by outflank-mailman (input) for mailman id 282497;
 Wed, 02 Mar 2022 16:42:54 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=s4+D=TN=oracle.com=dongli.zhang@srs-se1.protection.inumbo.net>)
 id 1nPS3y-00081z-66
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 16:42:54 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id cd72a3d4-9a47-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 17:42:53 +0100 (CET)
Received: from pps.filterd (m0246631.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 222Eq6mO010129; 
 Wed, 2 Mar 2022 16:41:39 GMT
Received: from userp3030.oracle.com (userp3030.oracle.com [156.151.31.80])
 by mx0b-00069f02.pphosted.com with ESMTP id 3ehbk9cwys-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Wed, 02 Mar 2022 16:41:38 +0000
Received: from pps.filterd (userp3030.oracle.com [127.0.0.1])
 by userp3030.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 222GM3eP163335;
 Wed, 2 Mar 2022 16:41:37 GMT
Received: from nam02-dm3-obe.outbound.protection.outlook.com
 (mail-dm3nam07lp2040.outbound.protection.outlook.com [104.47.56.40])
 by userp3030.oracle.com with ESMTP id 3ef9b18d4v-3
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Wed, 02 Mar 2022 16:41:37 +0000
Received: from BYAPR10MB2663.namprd10.prod.outlook.com (2603:10b6:a02:a9::20)
 by MWHPR1001MB2144.namprd10.prod.outlook.com (2603:10b6:301:2b::32)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.22; Wed, 2 Mar
 2022 16:41:34 +0000
Received: from BYAPR10MB2663.namprd10.prod.outlook.com
 ([fe80::a0d5:610d:bcf:9b47]) by BYAPR10MB2663.namprd10.prod.outlook.com
 ([fe80::a0d5:610d:bcf:9b47%4]) with mapi id 15.20.5017.027; Wed, 2 Mar 2022
 16:41:34 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cd72a3d4-9a47-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc :
 subject : date : message-id : in-reply-to : references : content-type :
 mime-version; s=corp-2021-07-09;
 bh=lg9XKOy6opyS7UrsVBPxdV8zBBRDaWAGpVrxi52azCg=;
 b=00BS+lc8ZMiwhpP2fb0nb3d23jpNDzyk7ONwLFmIITJ1y5fv3V9oqYIIej9nogJnM0AC
 FwWfPaGgUxqgrBCKGIWPbmutZwSa4xzPqqrMlQLQY0V7+J8RdxKjaGrsCdHLt3HuzYDD
 AOxkka/U9/P3YbWKW3O25fpNTsFjmJsvCjcIwaELlOrMMz5rSdilfSE3KikNi2aUKZQ7
 OKpFL5SfWe1Mg5ZI1dC6RMSwT6BRLxxhCbyDutP9bWeiP1Pboz7r3liocWaUgcjylba3
 9oZW13HIznpD4k2dNv5GAchaMXyr0CXpyqnBxVeT91h9fMf2ys0RPRaSzoPAlOdgx4Fu 7g== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=MItzig8dWH9dnsScU1iZAdeug144LM7aW/IP4SUsLyF+MVzbqjWtvMc7HVWgtYxRjLG5r+Qg1x+wXVEwoE1ncIx8fmSMpJj9EOFX764PZCZ1/1pskytPRV4lxjlx/cEtlDM9fQx3mhGfFiIZBylVIlNMMOcpQ2GH0v5GJvANq+V4EQ9v9qdJ5hdUbG5g/Rc1bhfcC2aaTq/houPecpCOjV4yw3X3ZCdDeZWZlu1bIWfm90rftzW47ijhDjt+DnP5e6rSm2CXIQNza200oFDBqUiaMOwxT1iVIsO3giPV7od8iwtu+i7R6OoMTcRK/G4E90rhuelEfr5jPExsvmX5ww==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=lg9XKOy6opyS7UrsVBPxdV8zBBRDaWAGpVrxi52azCg=;
 b=lqjd5CcCsoFb6NgayGM2l5P4+N8CjHdVjA2b54akAC3PfXYo94jIByx2VTLqmk/wK33Ian03Gws4tOEFqTraQlOvnbpUTXebaJg6E/os6z+nQuzKecOkHgzF0a6vuWDLli+gteYJNvlhKjp5CqNfWXUubA8ndzHw+r15FaYBXR1gOr/3BwmFZUaMTj5SuewQtkHW8F4VbfqF8PCiQXSqpajbF3FYRCI8A5KxviTUDVNZNbnl4NxCWwoCOFajK1FmO1k4xhHd6p3M4w3/oLvedZ/Emj4ul3Up7rMqlrFozi60Y5h06h7D8ZPjqJYJlt+ajtGPF4FsvnonfhXwjwZiZw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=lg9XKOy6opyS7UrsVBPxdV8zBBRDaWAGpVrxi52azCg=;
 b=Phq7eGknBjDCXWbVofHPUZ/QGKXTZNhyct0qFmqI2mbMWkGSNieOB9b9CPP8t+KIIRvyQqYXzv4HcbYeOYWoJMQjvD/faRU4i6S2rfmlfa61j0K1acpwVTEQ7VIUSeA++3v+BYzbcyIvmHZ0yIG2SvKgyMKMvBIag0rD2BrHTVg=
From: Dongli Zhang <dongli.zhang@oracle.com>
To: xen-devel@lists.xenproject.org, x86@kernel.org
Cc: linux-kernel@vger.kernel.org, boris.ostrovsky@oracle.com, jgross@suse.com,
        sstabellini@kernel.org, tglx@linutronix.de, mingo@redhat.com,
        bp@alien8.de, dave.hansen@linux.intel.com, joe.jin@oracle.com
Subject: [PATCH v4 2/2] xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32
Date: Wed,  2 Mar 2022 08:40:32 -0800
Message-Id: <20220302164032.14569-3-dongli.zhang@oracle.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220302164032.14569-1-dongli.zhang@oracle.com>
References: <20220302164032.14569-1-dongli.zhang@oracle.com>
Content-Type: text/plain
X-ClientProxiedBy: BYAPR21CA0019.namprd21.prod.outlook.com
 (2603:10b6:a03:114::29) To BYAPR10MB2663.namprd10.prod.outlook.com
 (2603:10b6:a02:a9::20)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: e6c7a851-a288-4101-9d60-08d9fc6b82d2
X-MS-TrafficTypeDiagnostic: MWHPR1001MB2144:EE_
X-Microsoft-Antispam-PRVS: 
	<MWHPR1001MB2144933E92981062FCEDE954F0039@MWHPR1001MB2144.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR10MB2663.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(83380400001)(66556008)(36756003)(2906002)(44832011)(5660300002)(38100700002)(107886003)(6486002)(38350700002)(86362001)(508600001)(8936002)(1076003)(186003)(316002)(26005)(6512007)(6506007)(66946007)(8676002)(52116002)(66476007)(4326008)(2616005);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?us-ascii?Q?dOP///kj3fAaOgnhY7LTb31y6qH/A3m0+YO1aKOod7OIRuieNNMitZODQ1yt?=
 =?us-ascii?Q?YO3IIzFOb610lRl3MBrE0UOBPCldK70iQVIDa5Bv46yQLnHflde/6n/3zwsR?=
 =?us-ascii?Q?DKD3xO40OsUfFPh+AWWakQHqS31RB/pmn/cFAfGHQFPhglofbq+GUzqIHpXc?=
 =?us-ascii?Q?pFmRbWSN+0ngplFtuTqnEAymp3X0Sp2IhC+xksSJ4xHLRMTOiJDsdIUKlNWg?=
 =?us-ascii?Q?yY/qopm4Dafr8ODhvCl8iQKk/Cgh6QvQz2StFSRTps4vzwoRtQNg4RSKetQM?=
 =?us-ascii?Q?7U2bRK3RnTlOHmBQG9OxdHgZVBPA6If9HjDotySzIy/JZkugchpwDr261hqI?=
 =?us-ascii?Q?KYz7OnWQ2L63Qo3ybV0hL5MKqXv/0ZbwT7un8hdKRdkyMEoDiMgUwbZdzsw6?=
 =?us-ascii?Q?5IRrhrUqYYKq5FvGrFFC9tpcVy5xiKX8ROTxE5WTG56uUQjEsjtzl4oZhynx?=
 =?us-ascii?Q?LYcg0G57VAzxF8WNzA0tOvg7i49pzOWI6ox7X21JiIyieJnoOtZGI5Vkiv/R?=
 =?us-ascii?Q?Exrju77OGuXPLRlqaGD7qlAmNdVHk9OmhDHur2FuXYnM8uIE1iawhsCSHAXO?=
 =?us-ascii?Q?+e2V/88i1VrFm5A0z747bqRTIkHqCBJis8mbLdhg+UejCSmcR8hW3o0b+6qz?=
 =?us-ascii?Q?8TOyI9caH/qLZA3yZneykNz9vo82v89ts7XOFMy5yk2jVcB6lXFQL0+NUCNW?=
 =?us-ascii?Q?4zUIbXAKcsgDIl5cE/hMVm0EHNL90pypnigBJ+klUBI/ZreoCJkM6w1lWxc3?=
 =?us-ascii?Q?UvTYTWiIPzgkLyVqp0T3teVzzTiKFMr5xnS6RPX4JBRzBM0+v/oHxrU4KG68?=
 =?us-ascii?Q?fg3zzW9PWkMOn4te9uEIuIKhwAfVqT2UyjYpj3Pt0y9BoqfWkIH5thmoNURl?=
 =?us-ascii?Q?dC6e46xLYMQ2jkYnsicYSBBWdw5J59zmyYyDjI1HynLCDrxb155Nm54qInr2?=
 =?us-ascii?Q?qYSkisxfHLueFRFswiOH1e902e/cIO7cup1YmzmQNJ/CC1yO+QuJDnKV+4/r?=
 =?us-ascii?Q?pbyjBAUtlOV15kfFKE35OPCJHc8km2GGQTlnxftoXXTPa/3iwVsq6aJSVnC4?=
 =?us-ascii?Q?QVg32erY6n6dR11RTp6yGoP2hkLe0hT7EZQHQ+qiI0Fj46VJOc+81J5HUD4x?=
 =?us-ascii?Q?UTRIi/Z2+lClX/xaWy+xkZk5otKRmi4S29+JZNXMLCrt2SL66TzbtwcHl3qS?=
 =?us-ascii?Q?kyDxoS5+RlSnpYmz4JmBQveJDas4QvtFIO3rQY9UDKlpSskNm24PtTRSn1Un?=
 =?us-ascii?Q?aTXV7MB48g0yRCw2aNctyn+zVEuz+PrMH/sjTTY7FKbb8XuZD7Rd8Qc8mOoC?=
 =?us-ascii?Q?oOswq4T3o675mv+iU34C1RBvlpbTuNYD0vtW1ONpdvYZQ/KP96qLrnCaKWp6?=
 =?us-ascii?Q?TqWNK6Js9PfvyoEyqYMIUrqeJW9ta3Ukg3i/UHCBjLPT7KULX/7b7sHNUmg4?=
 =?us-ascii?Q?/RYVV1rg44rqpk9pctMvJqBbGPgiqKFdAv3/GNTnPf1kAflxq3wZjDz7juLL?=
 =?us-ascii?Q?GZ3EAbUGzg29ya/IeZfmOzIdONq+2VewlDaQKinHgKKrecVIzOP/3C1CaqUe?=
 =?us-ascii?Q?X06WRAy0MdPrOgWFla2wuR/l72yQE2zvjktcCdZWYSAxWrkyVf/CZI0E0jQi?=
 =?us-ascii?Q?Quxs3Zl5CmZZaQRkXe9gZ80=3D?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e6c7a851-a288-4101-9d60-08d9fc6b82d2
X-MS-Exchange-CrossTenant-AuthSource: BYAPR10MB2663.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Mar 2022 16:41:33.7114
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: +1TgDRK4ve3mXHKXq/401zlsOIroDpALX/dfar9kXhL/HxH9/6/IK3CgJgUpVd9areO02m/3TYxAvtB4nlsExg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR1001MB2144
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10274 signatures=686787
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 bulkscore=0 malwarescore=0
 mlxscore=0 phishscore=0 suspectscore=0 adultscore=0 mlxlogscore=999
 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2201110000
 definitions=main-2203020073
X-Proofpoint-GUID: qkEPK_YnsbroMSihPPrq00FLhgwsaZjL
X-Proofpoint-ORIG-GUID: qkEPK_YnsbroMSihPPrq00FLhgwsaZjL

The sched_clock() can be used very early since commit 857baa87b642
("sched/clock: Enable sched clock early"). In addition, with commit
38669ba205d1 ("x86/xen/time: Output xen sched_clock time from 0"), kdump
kernel in Xen HVM guest may panic at very early stage when accessing
&__this_cpu_read(xen_vcpu)->time as in below:

setup_arch()
 -> init_hypervisor_platform()
     -> x86_init.hyper.init_platform = xen_hvm_guest_init()
         -> xen_hvm_init_time_ops()
             -> xen_clocksource_read()
                 -> src = &__this_cpu_read(xen_vcpu)->time;

This is because Xen HVM supports at most MAX_VIRT_CPUS=32 'vcpu_info'
embedded inside 'shared_info' during early stage until xen_vcpu_setup() is
used to allocate/relocate 'vcpu_info' for boot cpu at arbitrary address.

However, when Xen HVM guest panic on vcpu >= 32, since
xen_vcpu_info_reset(0) would set per_cpu(xen_vcpu, cpu) = NULL when
vcpu >= 32, xen_clocksource_read() on vcpu >= 32 would panic.

This patch calls xen_hvm_init_time_ops() again later in
xen_hvm_smp_prepare_boot_cpu() after the 'vcpu_info' for boot vcpu is
registered when the boot vcpu is >= 32.

This issue can be reproduced on purpose via below command at the guest
side when kdump/kexec is enabled:

"taskset -c 33 echo c > /proc/sysrq-trigger"

The bugfix for PVM is not implemented due to the lack of testing
environment.

Cc: Joe Jin <joe.jin@oracle.com>
Signed-off-by: Dongli Zhang <dongli.zhang@oracle.com>
---
Changed since v1:
  - Add commit message to explain why xen_hvm_init_time_ops() is delayed
    for any vcpus. (Suggested by Boris Ostrovsky)
  - Add a comment in xen_hvm_smp_prepare_boot_cpu() referencing the related
    code in xen_hvm_guest_init(). (suggested by Juergen Gross)
Changed since v2:
  - Delay for all VCPUs. (Suggested by Boris Ostrovsky)
  - Add commit message that why PVM is not supported by this patch
  - Test if kexec/kdump works with mainline xen (HVM and PVM)
Changed since v3:
  - Re-use v2 but move the login into xen_hvm_init_time_ops() (Suggested
    by Boris Ostrovsky)

 arch/x86/xen/smp_hvm.c |  6 ++++++
 arch/x86/xen/time.c    | 25 ++++++++++++++++++++++++-
 2 files changed, 30 insertions(+), 1 deletion(-)

diff --git a/arch/x86/xen/smp_hvm.c b/arch/x86/xen/smp_hvm.c
index 6ff3c887e0b9..b70afdff419c 100644
--- a/arch/x86/xen/smp_hvm.c
+++ b/arch/x86/xen/smp_hvm.c
@@ -19,6 +19,12 @@ static void __init xen_hvm_smp_prepare_boot_cpu(void)
 	 */
 	xen_vcpu_setup(0);
 
+	/*
+	 * Called again in case the kernel boots on vcpu >= MAX_VIRT_CPUS.
+	 * Refer to comments in xen_hvm_init_time_ops().
+	 */
+	xen_hvm_init_time_ops();
+
 	/*
 	 * The alternative logic (which patches the unlock/lock) runs before
 	 * the smp bootup up code is activated. Hence we need to set this up
diff --git a/arch/x86/xen/time.c b/arch/x86/xen/time.c
index 55b3407358a9..dcf292cc859e 100644
--- a/arch/x86/xen/time.c
+++ b/arch/x86/xen/time.c
@@ -558,16 +558,36 @@ static void xen_hvm_setup_cpu_clockevents(void)
 
 void __init xen_hvm_init_time_ops(void)
 {
+	static bool hvm_time_initialized;
+
+	if (hvm_time_initialized)
+		return;
+
 	/*
 	 * vector callback is needed otherwise we cannot receive interrupts
 	 * on cpu > 0 and at this point we don't know how many cpus are
 	 * available.
 	 */
 	if (!xen_have_vector_callback)
-		return;
+		goto exit;
 
 	if (!xen_feature(XENFEAT_hvm_safe_pvclock)) {
 		pr_info("Xen doesn't support pvclock on HVM, disable pv timer");
+		goto exit;
+	}
+
+	/*
+	 * Only MAX_VIRT_CPUS 'vcpu_info' are embedded inside 'shared_info'.
+	 * The __this_cpu_read(xen_vcpu) is still NULL when Xen HVM guest
+	 * boots on vcpu >= MAX_VIRT_CPUS (e.g., kexec), To access
+	 * __this_cpu_read(xen_vcpu) via xen_clocksource_read() will panic.
+	 *
+	 * The xen_hvm_init_time_ops() should be called again later after
+	 * __this_cpu_read(xen_vcpu) is available.
+	 */
+	if (!__this_cpu_read(xen_vcpu)) {
+		pr_info("Delay xen_init_time_common() as kernel is running on vcpu=%d\n",
+			xen_vcpu_nr(0));
 		return;
 	}
 
@@ -577,6 +597,9 @@ void __init xen_hvm_init_time_ops(void)
 	x86_cpuinit.setup_percpu_clockev = xen_hvm_setup_cpu_clockevents;
 
 	x86_platform.set_wallclock = xen_set_wallclock;
+
+exit:
+	hvm_time_initialized = true;
 }
 #endif
 
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 17:27:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 17:27:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282511.481243 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPSlH-0005ZS-7E; Wed, 02 Mar 2022 17:27:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282511.481243; Wed, 02 Mar 2022 17:27:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPSlH-0005ZL-42; Wed, 02 Mar 2022 17:27:39 +0000
Received: by outflank-mailman (input) for mailman id 282511;
 Wed, 02 Mar 2022 17:27:38 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Pfyc=TN=gmail.com=this.is.a0lson@srs-se1.protection.inumbo.net>)
 id 1nPSlF-0005ZF-Ve
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 17:27:38 +0000
Received: from mail-qk1-x732.google.com (mail-qk1-x732.google.com
 [2607:f8b0:4864:20::732])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 0d50143b-9a4e-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 18:27:37 +0100 (CET)
Received: by mail-qk1-x732.google.com with SMTP id c7so1854202qka.7
 for <xen-devel@lists.xenproject.org>; Wed, 02 Mar 2022 09:27:36 -0800 (PST)
Received: from development (c-73-166-253-254.hsd1.tx.comcast.net.
 [73.166.253.254]) by smtp.gmail.com with ESMTPSA id
 s7-20020a05622a018700b002dfed15c9edsm10771985qtw.74.2022.03.02.09.27.34
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Wed, 02 Mar 2022 09:27:35 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0d50143b-9a4e-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=message-id:subject:from:to:cc:date:user-agent:mime-version
         :content-transfer-encoding;
        bh=dOu3W6e1lek9NwlGWMLe7xTNjeA/SvvKHqYQ9IVp8XI=;
        b=HM6LFXYfHo8XVEcJFPXRhorVFo29a9DE5gnPfOFbcJI+eo7KG4MUeGOXoxQeK7yUX1
         eb+Y5LcX2CtoqnxlXbkc4s53O/E9ksNse34HEY7qJVKvc0C03YPLg8X603b4d0QXHBFt
         lH+fnWeyVJP7YCHj26Ha+oy7sDhMxDlKXm/i0fRCvMnElrNga1eV+pvK+gKQK2iXsk9A
         87p8MWIfuJmqRaGLMv8rl3LULtsShACZPc/kJ88XHr/He+bS4NbEZx7E/bshI+Uplwju
         l1+v1bd/a0ah4HGAg6irP/aT2tevRlyEG0eszzvalcxeBNFz5TtBm43fOEZlwIhEA8Aj
         MIZA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:message-id:subject:from:to:cc:date:user-agent
         :mime-version:content-transfer-encoding;
        bh=dOu3W6e1lek9NwlGWMLe7xTNjeA/SvvKHqYQ9IVp8XI=;
        b=PEU9k+eQTlYDt2t9l+RRw9mkjK1zO9uF5BYyfBl2LYEWDGS/Tche2nu3u1uQ+gV8oY
         tksNDiSwXJ+9l0bcszCXYsppqMNO09mTPifBf6JVqrKIFicZXj3PpB2s7wZtehOI8c/C
         mtnX/pGGxLgqn4cbLU1pgay3Q5xd6dmGECAqBAs1UBqCX/FtQ3sPMQLPsM0Uhvrl1j3Z
         kH8+Q+7cwymXOlMtRF/eholtct81eWehWyLDHG9QxUftBGeGkI31mvGC/PNqhmlMAHwQ
         csDRm/gkSpR9OL7wtLo0qhEeH8QBL6CZ2Yl/yM74IsOsxPzoo6Ow1cO/0ew5nwiKKDAO
         KJVA==
X-Gm-Message-State: AOAM532ig5KMDOTD+5RkKAox5Truz3Djlgbj9URZsvHST8XldBmwAVWw
	j8dMoe1BwsTZRWwKzr+NRQ4GKl/haN4Mkw==
X-Google-Smtp-Source: ABdhPJwxOg+54g5Insc2YbzwC8vhdiweJDDX7i1NDm4rut/DNJkC+dsUslLc8zBHw7l+Ai9pnBCaag==
X-Received: by 2002:a37:80b:0:b0:508:b7e5:e47e with SMTP id 11-20020a37080b000000b00508b7e5e47emr17061461qki.80.1646242055670;
        Wed, 02 Mar 2022 09:27:35 -0800 (PST)
Message-ID: <7c85d28831f3f30fb61bb359a23f570c34b4d31a.camel@gmail.com>
Subject: PIRQ handling and PVH dom0?
From: Alex Olson <this.is.a0lson@gmail.com>
To: xen-devel@lists.xenproject.org
Cc: Roger Pau Monne <roger.pau@citrix.com>
Date: Wed, 02 Mar 2022 11:27:33 -0600
Content-Type: text/plain; charset="UTF-8"
User-Agent: Evolution 3.36.5-0ubuntu1 
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit

I further attempted to see how far PVH dom0 can get but had a general question regarding what is not yet implemented... 

With an initial version of Roger's recent "vpci/msix: fix PBA access" patches and after refreshing his earlier 2018 patchset "vpci: add support for SR-IOV capability" regarding SR-IOV support for PVH dom0, I was able to get both physical functions and virtual functions of an SR-IOV network card to operate correctly in PVH dom0.

However, it looks like any PCI-passthrough for HVM domUs with PVH dom0 is not yet implemented. I see the "PHYSDEVOP_map_pirq" call fails since the "emulation_flags" for dom0 do not include "XEN_X86_EMU_USE_PIRQ"...

	libxl: error: libxl_pci.c:1461:pci_add_dm_done: Domain 1:xc_physdev_map_pirq irq=17 (error=-1): Function not implemented                                                                                                                                                                                                                                                                                                         
	libxl: error: libxl_pci.c:1781:device_pci_add_done: Domain 1:libxl__device_pci_add failed for PCI device 0:5:0.1 (rc -3)                                                                                                                                                                                                                                                                                                         
	libxl: error: libxl_create.c:1895:domcreate_attach_devices: Domain 1:unable to add pci devices                                              


What is PVH dom0 missing at a conceptual level for PCI passthrough to domUs?  I naively assumed that an HVM domU guest wouldn't care much whether dom0 was PV or PVH in terms of passthrough device IRQ handling...

Thanks

-Alex



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 17:46:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 17:46:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282520.481254 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPT3X-00007a-Tk; Wed, 02 Mar 2022 17:46:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282520.481254; Wed, 02 Mar 2022 17:46:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPT3X-00007S-Pk; Wed, 02 Mar 2022 17:46:31 +0000
Received: by outflank-mailman (input) for mailman id 282520;
 Wed, 02 Mar 2022 17:46:31 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPT3X-00007F-7g; Wed, 02 Mar 2022 17:46:31 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPT3X-0005X7-3m; Wed, 02 Mar 2022 17:46:31 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPT3W-0004gf-NI; Wed, 02 Mar 2022 17:46:30 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPT3W-0001Vj-Mo; Wed, 02 Mar 2022 17:46:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=B3Dz/NDkwzx3W/ImFuw8spFgXSs0PUy3VWZTGdsdKU8=; b=o5h4k3Mnt4lksrGOvh/dqwZ59A
	f1jvmjqInC7RGzf6akRlweGEdybTnzORwnzos07RnOS3rVpKBdyCzZhSz0DrCybQBXFYAq9Skqy9+
	w8p/JAnBVIFEDBqXKSOIPrHLQy1sf0DExcR6GqRVw0VomqdrF2k6OrynMTsluiRbL4Ms=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168327-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168327: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=09591fcf6eb3157ab9c50a9fbbef5f8a567fb49f
X-Osstest-Versions-That:
    qemuu=99c53410bc9d50e556f565b0960673cccb566452
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 02 Mar 2022 17:46:30 +0000

flight 168327 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168327/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168300
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168300
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168300
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168300
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168300
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168300
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168300
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168300
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 qemuu                09591fcf6eb3157ab9c50a9fbbef5f8a567fb49f
baseline version:
 qemuu                99c53410bc9d50e556f565b0960673cccb566452

Last test of basis   168300  2022-03-01 17:39:30 Z    1 days
Testing same since   168327  2022-03-02 07:38:29 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Keith Packard <keithp@keithp.com>
  Luc Michel <lmichel@kalray.eu>
  Peter Maydell <peter.maydell@linaro.org>
  Richard Henderson <richard.henderson@linaro.org>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   99c53410bc..09591fcf6e  09591fcf6eb3157ab9c50a9fbbef5f8a567fb49f -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 17:49:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 17:49:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282531.481265 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPT6m-0000lP-DW; Wed, 02 Mar 2022 17:49:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282531.481265; Wed, 02 Mar 2022 17:49:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPT6m-0000lI-9a; Wed, 02 Mar 2022 17:49:52 +0000
Received: by outflank-mailman (input) for mailman id 282531;
 Wed, 02 Mar 2022 17:49:50 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5HSw=TN=citrix.com=prvs=05368ea7b=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nPT6k-0000lC-NN
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 17:49:50 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2672eac7-9a51-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 18:49:48 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2672eac7-9a51-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646243388;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=jV+HGttWRMg/h9om4MtM6jMgMtGYDbiSm1WHHdoSZ5E=;
  b=JHhB3CG+nyUZyf/HxVL+Txfnj9j8YBoMwjY8oBRXmg/V3cRFO/KdYPwh
   wRznVj5s1UTgbzXZdp4b0cc/IQnQDQPtiAX651zOnMtqDwUMmw69kqXIM
   TU9mASRAAEYbfm/8TPqxIvpQ67GgqOFKxU3VxQxE63r+55UYnT5LclBGt
   I=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65731401
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:NRy+MauTIJm4bto1RnNrUb8PDufnVEBeMUV32f8akzHdYApBsoF/q
 tZmKTzQM62OYmSgLt9/OYq38x4Hv8DTzd9lTFY5qiFjRnlB+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jV4
 4upyyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi8HMZTLuMQ2fSV4KCBkep8bypGeGT+g5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvllJyz3DAOlgapfEW6jQvvdT3Ssqh9AIFvHbD
 yYcQWQyM0+ZP0UWUrsRIIwRk+uKp3XiSCxFklTLq4E86mXv5QMkhdABN/KKI4fXFK25hH2wt
 m/Aumj0HBweHNie0iaetGKhgPfVmiH2U55UE6e3ntZ2gFyIgG0IThROUUC8p9G2j0e/X5RUL
 El8x8Y1hfFsrgrxFIC7BkDm5i7f1vIBZzZOO8M10Qat6oH63yaiB3JDfGNzRoUe89BjEFTGy
 WS1t9/uADVutpicRnSc6qqYoFuOBMQFEYMRTXRaFFVYurEPtKl210uSFYg7TMZZm/WoQWmY/
 tyckMQpa1z/Z+Yv3r7zw13IiinESnPhHl9svVW/so5IA2pEiG+Zi26AtACzARVodt/xory9U
 J4swZL2AAcmV8zlqcB1aL9RdIxFHt7cWNEmvXZhHoM66xOm8GO5cIZb7VlWfRk1bJ9aIWe4P
 haC42u9AaO/2lPwN8ebhKrrVqwXIVXIT4y5Bpg4kPIUCnSOSON31H43PhPBt4wcuEMtjbs+K
 f+mnTWEVh4n5VBc5GPuHY81iOZzrghnnD+7bc2rnnyPjOvFDFbIGOhtDbd7Rr1ghE9yiF6Oq
 Ig32grj40g3bdASlQGMqd9DdQ1RdCNjbX00wuQOHtO+zsNdMDhJI9fawK87epwjmKJQl+zS+
 Wq6VFMew1367UAr4y3VApy/QNsDhapCkE8=
IronPort-HdrOrdr: A9a23:Det6j6vM5lwIRdFCyHMEVZ5O7skC1oMji2hC6mlwRA09TyXGra
 6TdaUguiMc1gx8ZJh5o6H9BEGBKUmskaKceeEqTPmftXrdyRSVxeZZnMrfKlzbamLDH4tmtJ
 uIHJIOcOEYYWIK7/oSpTPIburIo+P3sJxA592utEuFJDsCA8oLgmcJaTpzUHcGPjWubaBJTq
 Z0jfA3wAZIDE5nF/hTcUN1OdQryee78a7OUFojPVoK+QOOhTSn5PrRCB6DxCoTVDtJ3PML7X
 XFuxaR3NThj9iLjjvnk0PD5ZVfn9XsjvFZAtaXt8QTIjLwzi61eYVaXaGYtjxdmpDs1L9qqq
 iIn/4TBbU115rjRBDynfIr4Xi47N8a0Q6n9bZfuwq6nSW2fkNgNyMLv/MmTvKQ0TtQgDg76t
 MX44vRjeslMfuL9h6Nl+TgRlVkkFG5rmEllvNWh3tDUZEGYLsUtoAH+lhJea1wVh4SxbpXWN
 WGNvusr8q+sGnqGEzxry1q2pihT34zFhCJTgwLvdGUySFfmDR8w1EDzMISk38c/NZlIqM0q9
 jsI+BtjvVDX8UWZaVyCKMIRta2EHXERVbJPHiJKVrqGakbMzbGqoLx4r8y+Oa2EaZ4gacaid
 DEShdVpGQyc0XhBYmH24BK6AnERCGnUTHk2qhlltFEU33HNczW2AG4OSUTepGb0oci6+XgKo
 KOBK4=
X-IronPort-AV: E=Sophos;i="5.90,149,1643691600"; 
   d="scan'208";a="65731401"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=BxWHlRa4/0ZxsI2LKm/aSXIPLjtfc9m/FG7Xu8YxFJw1MqgIkf4FN2X8zBBk/NAerPqSBIrKhI2C6zdb3SzS65wqNj4K7op4F3WqVV0NbiS3k3pIBZRkgKg9rxVCxErCrUqaiP8syU6iIQHdzrw2efNAzfv/k15Z23bJA19Su12zvdltt4IdphjmomHoi634NY+WgjEYc8an4VmGC2+BFt8n0tOwVc9bhpUPxK3PNlh/hH6ZUFgt76XGoGY5ibQPB/sIcqa5l7SUGJt5ee2EJh4/uqXkixPjCutJCdZcD45GpqCFvhxgWcMA+Zay/kUDTos8sXnZ3IS4ND3Us3OJeA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=jV+HGttWRMg/h9om4MtM6jMgMtGYDbiSm1WHHdoSZ5E=;
 b=Ghkx1yYj2RHQpLvU+Cl1SyF9AsJW2ZnMWBHTjfo1cBsK85PLJLV+AK1emB+p2DorGC5pBCd9DL1xzwrbiEg7FAK0PAKoqTikd1Yq0Sp92zIqe8AMGK7854PPYFxxck0OFEv/J4jUV1B/FkSzAsGrD0oegSliUKz/vllY1xMmX65QUXf7LL1awyTfrkonRt1JPA2KbhEMYC4STpbxyNmdz+FQNC7+TOURJ2HbbNsNsigWc2Vviq4xClt0Rqe4xOhlyATyiaMW64Q2wmZ3Zt+zmxSNk0OyCI0fpuL0Dc1PCydcu/zYEvouFcxjgFX0T/Xc3N2y6sbKTKTMXzxj8JkFsQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=jV+HGttWRMg/h9om4MtM6jMgMtGYDbiSm1WHHdoSZ5E=;
 b=taQvnmJUKxgqS+t1/py4Yjp4IOeSkZzIhq+vKhPiPzFZDHdY5eU+KUlGj+uKA8ONpi+03DD/jGfp7cWuzlGODob3M+kduQSug3j48fwxtlo5I8XTTTaZrVI0duBqfZBrY3L7cGwlqydaHEFeGR58/NQDlWMwlurqr74LaO/V3y4=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Alex Olson <this.is.a0lson@gmail.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>
Subject: Re: PIRQ handling and PVH dom0?
Thread-Topic: PIRQ handling and PVH dom0?
Thread-Index: AQHYLlrY/dua2GHNF0yeezsM7bCSAKysXvKA
Date: Wed, 2 Mar 2022 17:49:14 +0000
Message-ID: <6ad3e3f9-0d3d-4223-0951-0f8ee7fa4b8b@citrix.com>
References: <7c85d28831f3f30fb61bb359a23f570c34b4d31a.camel@gmail.com>
In-Reply-To: <7c85d28831f3f30fb61bb359a23f570c34b4d31a.camel@gmail.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: c0ddbe0d-7167-43fb-3b1f-08d9fc74f74d
x-ms-traffictypediagnostic: MWHPR03MB3005:EE_
x-microsoft-antispam-prvs: <MWHPR03MB300545442B1ECF9F906673F6BA039@MWHPR03MB3005.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(71200400001)(38100700002)(8936002)(86362001)(31686004)(53546011)(2616005)(316002)(6512007)(6506007)(26005)(186003)(110136005)(83380400001)(107886003)(8676002)(66556008)(4326008)(66446008)(122000001)(66476007)(64756008)(31696002)(2906002)(508600001)(91956017)(82960400001)(66946007)(76116006)(6486002)(5660300002)(36756003)(38070700005)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?RkpwbGFDNVZHVWNvZHdjM1duK0FVTVhrODJBSlVxMVNTZUdoaDNUQm5oVVE2?=
 =?utf-8?B?N1Frd29oUy9iUG8wckRnYTRPYkZWMU1rWk8rUjJuTWNPTXdROW5qM1pFbVJT?=
 =?utf-8?B?SVlOV1U1TDJjeFVOT1dxTkdTT2xCQndQNnptTE1zUGx0b3lQSWRiU3Y5eENG?=
 =?utf-8?B?R20rMVNkcHRMejMrd2FGb2dydlJ1SlRvNzNsRVhsNkhrRUc3SUJ4c2d0aGpy?=
 =?utf-8?B?ZnNFZzJqZEtxbVhZc2x5cEl2Z2pnZXV6UnBZQ0RTZkNRS0tPRW9MMFhoWURP?=
 =?utf-8?B?NzZTYnlwQS8vdzc0SmJJWVFuRHpoSVhYWHpxR1NjbGlWUWxXRHJEM3Fmb0RO?=
 =?utf-8?B?TVBVRjNySmlzK2ZCY3h3Z0dxOE45K1gxVHhYYUd2OG4xaGU0NWxSait2bzg5?=
 =?utf-8?B?QVlEWGNKTEY0QjZ5NlllcmNLdFcwOE1oRkJUcDNMbWg3MzlXMUpxalNMVFlk?=
 =?utf-8?B?angwdzlLbmlPRjZLbWJjR01ubzJkaHZQT09lQzhDYndvNTZ2UHo0N0xnODZT?=
 =?utf-8?B?QjN3VUp3OHFBby8rQ1Z4dnRXaGFVeDNMKy9FTW9hai81b3NsZG92bUxXVTBa?=
 =?utf-8?B?TXQ4YytoaG00TnVKUm5xOEFubUpkbVVyZ0YvTWhxT0NkUFd4c1ZYSmRUUFV6?=
 =?utf-8?B?YWhNYXUxbEkraVJPNm5kMnFGdmJoYUNIcUFMNXp5aGhYTzYxTldwY3hRbW4x?=
 =?utf-8?B?b2U1NTIwb2hjT0YzSldhVkFOcDJ6S0psQ25GN25PMHUvNjZQMDN5aUFnZFc5?=
 =?utf-8?B?dFd0b3d6Nk5VeXdVMElLM09UQVZFK3hIUzBRaERoaDh1b1h5RnQ2c1FVK0M1?=
 =?utf-8?B?bVlGTVgxUm9SbjRoZWtKREhKazFORDB4cllxWW56NVYrR0U0R2tnVW1DNGEx?=
 =?utf-8?B?QkVuOHd3ejd3dUVBZlI4OWdPT3dDRVgwbGFhSG9rMjJUampZbWJPeHNtS0Nr?=
 =?utf-8?B?aFQ5ams5cHlCMHBQQnJXcHIvN0pPR2NYZWZ4UFA2SGxQZnFFdFlvTGd4UFcw?=
 =?utf-8?B?WkpVckx0OUdyU1BVclhMR1RyS0FKeFdoVmxxeWpaUlJkRUxIWWVhdTQ0KzZR?=
 =?utf-8?B?YW4wVm1DSzBoV3gxaEtNWkdFTU80bDc5YmFkNmQ0VkxYZG8ya3JvUXpSczBn?=
 =?utf-8?B?YkxLLzgvU09UZ3JCV3ZMUDFXc3dIYjJFT1B1cWxtOUREYk5sZGg3bU9WTXhL?=
 =?utf-8?B?SHZZWnl2THhCYS94cHk0WGw4ZVA5cUZ4ak9RdzgyNWVlVVl5WjFsd3liOXJ5?=
 =?utf-8?B?bnZOZzFWK0x6SlV3SkxnS3RWdkt1YjB5T0NKTk9BR3RENHljQTI1dnJzZ20w?=
 =?utf-8?B?Z1VnVmFWbjFtcSttVnVyYVR1T2tjUzdkc2RQR0MwZTZ5a0JPTXFPYm03dnIw?=
 =?utf-8?B?bVdNeWhnSjVGYUo0bGE0bGVrT0FuWmZRb2xkWEdIMEk5NGszbGZwbjRzamxo?=
 =?utf-8?B?Q0FDelloNy9aVFNPeTgySkVIMkpXaUxZSEJ3ODRnd3Z6VWtLZTRQKy9uVTJV?=
 =?utf-8?B?WlZLUXpkbkdhdlNzelNMbEJIeC9PT3A4OEI2eG4vQ1d0TWUyQjhRMzgvNXpS?=
 =?utf-8?B?WnluM1V2bmFUblhzNEZXTFFYS1ovWnYzY1c1NGRqeUIyZW1qamNjN0FWLzdo?=
 =?utf-8?B?cmNWMDR0SFVtblRFbUo2cHE5OTJ0UDJOVTYyemNiMU5wTkZXdXJYYkpxdmNZ?=
 =?utf-8?B?VHVzUG5wK1o0TTJiSDZJQmkzM1BBRDZMZ2VXQ1dzRWdWSFJ4ZThHT09ZUVhG?=
 =?utf-8?B?S3E4cTdXM3ZHR2pLb2RMc0JBVU1LRXFUOHhSaVJReCsxSmZ4bHZvZUVyeWV0?=
 =?utf-8?B?K1lnQld3TityS0o3cXBnR3czRGpVdXFGQmhnQ1R6em9RRHRvUTlXUTJtVDNV?=
 =?utf-8?B?RDVJRzRkYjd0S1MyU1F4aVA4YTlNMWtZMk91WlllRWM5d2haMG12Zm51dVdn?=
 =?utf-8?B?Z3ZwcUdqaVBlY2M0Y3RNQ0F1VUxmR1lsZUFkYzNrOFBzY3UxSFg5S2NKVEl3?=
 =?utf-8?B?OGhrd3VTYWx5djF5ME9JMUJrVEpHdXQ5UzJ1RzgvRFNaTGxmVW90RWN3ZVBt?=
 =?utf-8?B?U0xnMDF2Vlpsa29qNktXcHRWSzg2NTRhVnJmR0hEeUlvZlpDczRBTTdidWQ5?=
 =?utf-8?B?cVFQcThNYmoweGVyeWpGS3FOd0p4Mllwbk5LeFF4RTNRNkZHdHZMYWRLaEgv?=
 =?utf-8?B?elo3eHY1T1ZyOXVUM0xFUVhUMXJXNGkrNXhJOXhXRkJ2dFV6bHQ2eGVkT2ty?=
 =?utf-8?B?dzF5M0ZrTEZUZERYMXVpdENPQjF3PT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <C006F8F0DEC7584B964565EFDF8552D9@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c0ddbe0d-7167-43fb-3b1f-08d9fc74f74d
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Mar 2022 17:49:14.4294
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: OuO71YkAHWUMnmzqVljyxVdGR8C0oOJ/CPmH1Jnx2K7LNFlO/yitRnoEKUos+3NItDCxfR5yuEFEXZQkB8SaXeA4bF0LGjpGDSmuJkuiIDU=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR03MB3005
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Wed Mar 02 17:57:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 17:57:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282540.481276 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPTDp-0002bf-9s; Wed, 02 Mar 2022 17:57:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282540.481276; Wed, 02 Mar 2022 17:57:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPTDp-0002bY-6G; Wed, 02 Mar 2022 17:57:09 +0000
Received: by outflank-mailman (input) for mailman id 282540;
 Wed, 02 Mar 2022 17:57:07 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPTDn-0002bO-Kz; Wed, 02 Mar 2022 17:57:07 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPTDn-0005iy-Gm; Wed, 02 Mar 2022 17:57:07 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPTDn-00053K-1J; Wed, 02 Mar 2022 17:57:07 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPTDn-0001Ap-0q; Wed, 02 Mar 2022 17:57:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=c4sAMBuntjUDi+b3WJkQS82H5Wb2b2cKZzGK8bUjVzA=; b=PM/n5UmHvIUoTRSE2CkUWPVdjM
	6wOaFLMJE6h+PRP3V4xrRHa1AEzs0oiH00I4vMs6yQhd1JnfFHYnSe9EA7W4hmpGLRkZfABjVQfqa
	PcN6N+mB7MwRp4uunS/ySnqIkxNCjSQVUiKzeiCb4T2FzyT62X7DwTEWGqFplqWQ09Xs=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168340-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168340: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=dc39554d58af4a50b50eca1f57c49415a12b0c98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 02 Mar 2022 17:57:07 +0000

flight 168340 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168340/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 dc39554d58af4a50b50eca1f57c49415a12b0c98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    2 days
Failing since        168258  2022-03-01 01:55:31 Z    1 days   17 attempts
Testing same since   168316  2022-03-02 02:50:20 Z    0 days    5 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit dc39554d58af4a50b50eca1f57c49415a12b0c98
Author: Xiaolu.Jiang <xiaolu.jiang@intel.com>
Date:   Tue Feb 22 22:14:05 2022 +0800

    edk2/MdeModulePkg/Debuglib: Add Standalone MM support
    
    https://bugzilla.tianocore.org/show_bug.cgi?id=3844
    
    This change added Standalone MM instance of DebugLib.
    
    Reviewd-by: Jian J Wang <jian.j.wang@intel.com>
    Reviewd-by: Liming Gao <gaoliming@byosoft.com.cn>
    
    Signed-off-by: Xiaolu.Jiang <xiaolu.jiang@intel.com>

commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 19:58:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 19:58:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282553.481292 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPV6Y-0000ix-UN; Wed, 02 Mar 2022 19:57:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282553.481292; Wed, 02 Mar 2022 19:57:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPV6Y-0000iq-RR; Wed, 02 Mar 2022 19:57:46 +0000
Received: by outflank-mailman (input) for mailman id 282553;
 Wed, 02 Mar 2022 19:57:44 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5HSw=TN=citrix.com=prvs=05368ea7b=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nPV6W-0000ik-DE
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 19:57:44 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 03933411-9a63-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 20:57:41 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 03933411-9a63-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646251061;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=5HBJfX/YI4/vonTzojph5TRBFlUVz4e8zsRbbwbPR6Q=;
  b=U8EPnKQKGarEYwcrbdx7rwza2nEa6n1lkmf7dC+woBt301O2SXmT73hD
   iwWlfa7A7IUhPOkCmk1qU3E43o8AY9YwZeCXlMa2lSsTD97k1bXcDhVNg
   aGmxXb55CuX/9+BqdryiBKwv9f2rIKT5Ws7H2aMQ/kCBKdZpRQpOptZ/G
   4=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 64794685
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:LF8u6K4sr3evZ9a//ldKsAxRtCXHchMFZxGqfqrLsTDasY5as4F+v
 moeWz2BOquKYTb3eYpzao7g804Oup+AzNRjQVNrr31jHi5G8cbLO4+Ufxz6V8+wwmwvb67FA
 +E2MISowBUcFyeEzvuVGuG96yE6j8lkf5KkYAL+EnkZqTRMFWFw0XqPp8Zj2tQy2YPhWVvR0
 T/Pi5a31GGNimYc3l08s8pvmDs31BglkGpF1rCWTakjUG72zxH5PrpGTU2CByKQrr1vNvy7X
 47+IISRpQs1yfuP5uSNyd4XemVSKlLb0JPnZnB+A8BOiTAazsA+PzpS2FPxpi67hh3Q9+2dx
 umhurShTT8xP7/Uod0MCUdFCnh0PJxcoK3IdC3XXcy7lyUqclPpyvRqSko3IZcZ6qB8BmQmG
 f4wcW5XKErZ3qTvnez9GrIEascLdaEHOKs2vH16wC6fJvEhWZ3ZGI3B5MNC3Sd2jcdLdRrbT
 5RFNmszMkSdC/FJEkYaN64/ntuDv3/YdjxkkBWQnYgY22eGmWSd15CyaYGIK7RmX/59jkue4
 27L4Wn9KhUbL8CEjyqI9Gq2ge3Clj+9X5gdfJWn8tZ6jVvVwXYcYDUUX1ampfiyimalRslSb
 UcT/0ITQbMarRLxCIOnBlvh/SDC7kV0t8ds//MS+QW10qvG+z+gFzJaUycYYt0XrpckSml/v
 rOWpO/BCTtqubyTbHuS8LaIsD+/URQowX8+iTwsFlVcvYS6yG0npleWF4s4Tvbp5jHgMWyom
 1i3QD4Ca6L/ZCLh/4Gy5hj5jj2lvfAlpSZlt1yMDgpJAu6UDbNJhrBEC3CGtZ6sz67DFzFtW
 UTofeDEtoji6rnXyUSwrB0lRu3B2hp8GGS0baRTN5cg7S+x3HWoYJpd5jpzTG8wbJpaIGGxO
 B6N4FILjHO2AJdMRfUtC25WI553pZUM6Py/DqyEBjawSsIZmPC7ENFGOhfLgjGFfLkEmqAjI
 5aLGftA/l5BYZmLOAGeHr9HuZdyn3hW7TqKGfjTkkT2uZLDNSX9YepUbzOzghURsfrsTPP9q
 I0EaaNnCnx3DYXDX8Ug2dVLfABScCNiXsieRg4+XrfrHzeK0VoJUpf56bggZ5Zkj+JSkOLJ9
 Wu6QUhW1Bz0gnivFOlAQikLhG/HNXqnkU8GAA==
IronPort-HdrOrdr: A9a23:15tRM6Dycq/OoBLlHegCsceALOsnbusQ8zAXPh9KJiC9I/b1qy
 nxppkmPEfP+UsssHFJo6HkBEEZKUmsuqKdkrNhQYtKOzOW9ldATbsSobcKpgePJ8SQzJ8l6U
 4NSdkcNDS0NykBsS+Y2nj4Lz9D+qj+zEnAv463pB0NLT2CKZsQlDuRYjzrSXGeLzM2YabRYa
 DsgPav0ADQHkj/AP7LZEUtbqzmnZnmhZjmaRkJC1oM8w+Vlw6l77b8Dlyxwgoeeykn+8ZjzU
 H11yjCoomzufCyzRHRk0XJ6Y5NpdfnwtxfQOSRl8kuLCn2gArAXvUjZ1TChkF2nAic0idvrD
 D+mWZmAy210QKWQoiBm2qp5+An6kd215at8y7BvZKpm72HeNtzMbs+uWseSGqC16NohqAN7E
 oAtVjpxqZ/HFfOmj/w6MPPUAwvnk2ooWA6mepWlHBHV5ACAYUh5rD30XklWavoJhiKoLzP0d
 MeeP309bJTaxeXfnrZtm5gzJilWWkyBA6PRgwHttaO2zZbkXhlxw9ArfZv00so5dY4Ud1J9u
 7EOqNnmPVHSdIXd7t0AKMETdGsAmLATBrQOCaZIEjhFqsAJ3XRwqSHqokd9aWvYtgF3ZEykJ
 POXBdRsnMzYVvnDYmU0JhC4nn2MROAtPTWu7ZjDrRCy8/BreDQQF6+oXgV4r6dn8k=
X-IronPort-AV: E=Sophos;i="5.90,150,1643691600"; 
   d="scan'208";a="64794685"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=FqFFYSfXJ2RTFFVgjwgPt8jHwTEc+YJHxlV+YLRCITtiq8FngBgcrRAa74KvN8R7CSWTVDhC8AtPcjRy4HWA/SPMhy01a08uer/jeD2ck5MNRm0cFDBwJ4vOfRnqcdneHgur0BNAd+aUk7ZcUqztgF7s9xSX+BeiTdQs+wWdyWg+CT3x5LxMV1qg3yhLXpXTjVAbN20qmq/RHMqCHkPWDAezQmHCD974RA6Do/lJ6ng2BN6fM/lNTr0NbbqhV4ygCDeoGWOqYcv5UXugtPFHUJmw5HOH+WiODirwymHSugG4GWYHnUHQvgckXYQnTYv36kC93pGBi2qIMjDKvrWcyw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=5HBJfX/YI4/vonTzojph5TRBFlUVz4e8zsRbbwbPR6Q=;
 b=oXRRmP6McKywJlMhD1HWcRlhxhAPHe3HygErfK8AgC7yK+gn4JQFhnDaz5IgY4Vb9Yv0Rlfsk9v3yfbDx6vIncRVoWnKqK2mhSuiQz098vSMZM5Sm/0/K3MAamdFfyYQVXZtVHpJ1rBwQduwCWTgzIhxNPzFwaVf2927ilW9QsT6x+W+brw8ptzH26GVhpXkxDAMW0N7pWf1sEG5yXRO/7iwscClXFc4U/WVK1ni6RhnY/Ppw1/qGrsjqC5QabkLALlv3V+LghZGSA4PkH6+vT654LrDyGSt/WrLw3KrposUlveKHzjlYdWMi4LWYHX+hDHPrrk+5KprrkHpFdoYcg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=5HBJfX/YI4/vonTzojph5TRBFlUVz4e8zsRbbwbPR6Q=;
 b=Opxd6GWn4Zauuge8NiY0Ri7jv/sifdaAeB1ZPAo+GvjgMTp05u+fTLTuguL+fV+ImH4pj5O3bii8YDcZdeSpOBjt1yu6qiY49tUdqYa5qwrq9ayXPg67u5Gkh0JYKR5tm+8klLsKTsd8Hey9Y3un9isPoPky4bhgviq0bCWVtsA=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>, Xen-devel
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v2.2 8/7] x86/IOMMU: Use altcall, and
 __initconst_cf_clobber
Thread-Topic: [PATCH v2.2 8/7] x86/IOMMU: Use altcall, and
 __initconst_cf_clobber
Thread-Index: AQHYJ+IV6PtRJY8p5U2wBnUH9jKzdqyj8n0AgAa3aoCAASBXAIAAIhyAgAAGJQCAADOGgIAAabgA
Date: Wed, 2 Mar 2022 19:57:33 +0000
Message-ID: <160eb824-fc30-6d0c-a03f-dda2951aa930@citrix.com>
References: <20220214125632.24563-1-andrew.cooper3@citrix.com>
 <20220222114711.19209-1-andrew.cooper3@citrix.com>
 <e8b71b3a-55a0-31a2-b2ab-3b2470680709@suse.com>
 <5fae516a-17c1-0ce4-c46e-909a83c0e273@citrix.com>
 <60f3c942-3822-87dd-df6e-8b64ed4d17c4@suse.com>
 <e41848a6-9aaa-f0d3-0c81-2e0e4e96a6a4@citrix.com>
 <67ff91f4-e5fe-47d5-fdb8-9a302beb6e2a@suse.com>
 <15868475-0702-c884-143f-366b9d79a255@citrix.com>
In-Reply-To: <15868475-0702-c884-143f-366b9d79a255@citrix.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 4364fbb7-6541-4156-38cc-08d9fc86e460
x-ms-traffictypediagnostic: BN6PR03MB3202:EE_
x-microsoft-antispam-prvs: <BN6PR03MB3202B3294D9BD01AE253A041BA039@BN6PR03MB3202.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(36756003)(316002)(82960400001)(122000001)(31686004)(2906002)(8936002)(38100700002)(5660300002)(83380400001)(2616005)(508600001)(38070700005)(6486002)(4326008)(91956017)(66556008)(26005)(6506007)(186003)(31696002)(76116006)(8676002)(86362001)(71200400001)(6512007)(6916009)(53546011)(54906003)(66476007)(66446008)(64756008)(66946007)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?U1pCdFMyWkdZNXp6dk1RREZVOG9UOUFtbkZNaTFYYXJzSEVpanoycDNLWE1q?=
 =?utf-8?B?WlM1UUpmaThtK3M5KzRFZExod2N3VXVpTnZWMjU4cHJPZFoxRHpDUUlmQ21M?=
 =?utf-8?B?cHBvaUhZbHcrc0IxRHRkaG5hakRlNUJTNzdMYjFuVEFqSlNuSFh6aHVxREtu?=
 =?utf-8?B?S3l6bnd3eGVGSnF2Ym9vVzYrUE1KWG1wY3ZpRGV5dEYyakg4VjJLZG5MSFFI?=
 =?utf-8?B?ODQvYTVQM1gzTHFzOGNsV012OERYaklGRU1JKysrdHJQRHBZRFNsVkovaklC?=
 =?utf-8?B?WmFybTYybmRSREYrc08yaitRRkNPVjB0YWFSZTRJdEpocDI4QlNPMktnZ0N6?=
 =?utf-8?B?ODcxcjhzTWZNeW9Zdjk5ZE91cElvMEZIb0xsQlZEY0hyeVBQUC9JZDBOWWYy?=
 =?utf-8?B?WDJPOVpaMGp1bFdTV2NoYW1tUGdrZGl1OVpvVVdDayswTWxWMWZ5WGhyWUgx?=
 =?utf-8?B?cTZiRWNHZjRabkJ4ZmxKeWZua1lFbHF5M0IzYUVRaGFQSjRnZ2gzbXJJR3F1?=
 =?utf-8?B?bjFkUXZSMUdkd0FqbDN6bjNYM1JRSDAxUG82WkpmYWRZMmxJaWlKMThwK3dR?=
 =?utf-8?B?QjNUc2tMM2pMd0NTTW1EVGMrbnJ2Mnd3TUt3YjF5Mjk3RkpMeE5JTVVHNkU3?=
 =?utf-8?B?bURDMzVNZ0pqYnVBSnNNMzh2b0lHby8xcDZwekhmbTdNZ2tYZGU3SWVvK01M?=
 =?utf-8?B?Z1FtTDIybU9Pb1VGeHVqMHlGbVltajRWS0tSRnhvbnBkUnNTeU9SZHd4eU54?=
 =?utf-8?B?blUzSzVIaFpSUmNMdVROS0ZySlVJdHZFcFBKZHBjaEQyT1dUK3YwdnFCQVpW?=
 =?utf-8?B?ZmVCdU1lcytMalp3R1F4VzU1SDZ1bmc5ZEJMY3JzLzdqNjdXSEc1bmNzaHFV?=
 =?utf-8?B?TUp0VGVaQWpLWHRZSWVrcVhicWdVRE5Vbk1WRzJwT001aUZldlJOU0RXdHp5?=
 =?utf-8?B?azZsQWhpc2had1hFV2FaZWg3REd1VGUzU1kzRkkxalBvaHIxOUJWM1VBZEs2?=
 =?utf-8?B?a2J0THBKVjdxLzNENWprT3JIMGVRamtSVkF5RkJHOGd6Q1FzYmFRSi83MkFN?=
 =?utf-8?B?bUJIby9yU2wwQ2E5RFZDbkY0UVgweU5wVTUraExvTTlNem5GdUdDWlM5cVB6?=
 =?utf-8?B?TWlCR2NVdlF0ZXBuaUxOeG9CMm51UERKTmhPRnNwYXFJYlZEOThXREo5WkRy?=
 =?utf-8?B?RGlVVW9kenIvMmdYeVBJeFg0R1JteGFiRXQzYjdsR1ROVjBkRWxCaWo4UE84?=
 =?utf-8?B?Mi80Q3l3NFNZUVdRVkRIb29uZDFvc2duL0tvUXk1NmVoZ2FkdWl3K0hFdDJt?=
 =?utf-8?B?RnRPL00yNFlyaklhaHE0ditJK0swMTJXUVNaRGJvdGhlWWRvYXJPUGZvZVln?=
 =?utf-8?B?VlJvejZnM2QvVFFZZERZYWpqeGFHV2hlV2JvODE4QjJ6a3RoVnhGZzN3dFpU?=
 =?utf-8?B?V1MxWGc1VE9wamo3TTVzZFdwNFdveERtWXl3WmQxMG5xUDNUeXFjaVBiajY2?=
 =?utf-8?B?RzRzYXBlYkprbEs3WnBPbXIzd2FaMUgrRHhLZVZHclNkRkk0TmtoVE1sMTV2?=
 =?utf-8?B?OWl0UjVOZ0ZlOHhaRHUxRi9rY0NJYmNLVkFkQ1c1b0UvalhUaW51aGZTRERx?=
 =?utf-8?B?Z1ptOHI0UGF1YU50RTZvNXBRc290a0RVWkdFKzVMZC9wSFpTLzV0ZitRSWJl?=
 =?utf-8?B?UVh6WWxjYVA4aHZzcVNac3NoQUFJUFd6b093SDJoRnpjMW4vSDBYUGRtOTI1?=
 =?utf-8?B?MnRDbm1qbDIvVHU4a2t6c0JzbFVuSGtnZUlTRVg3WW11c3dyNktobkEwMVJS?=
 =?utf-8?B?dVgxQzBadWdnTVljZHVXY1dETVkvc1dYQlFoK01BU3dHZkxDcHlDTmNlb3Vi?=
 =?utf-8?B?K3l2TzlCRDZIczNPRVFZQkl3Q0J6VWtaQ2VmRFd0S2laRVhTNUg4K2FYWUR4?=
 =?utf-8?B?TkNZd0xDbFhDb3VlRnJRT2dkMlljMkhra3dLOUlLZzJ0T1gxK0wyZUNXMVRJ?=
 =?utf-8?B?YzhTOGRBcHVnOHpTN0NFZ2dGdnppNndGN2E5TmQ3bEE1Yk1zRXhWNjQraEpS?=
 =?utf-8?B?TFZDdXcyL08zR1BEOS95bGM4cnJUL3crMjRiVVNBS254aTY4eDdVRElzdlF0?=
 =?utf-8?B?dnZ5WlBtWEd0SmxwTDBSV1VwZVFreUtVSzlGc1ZLOVJOL3JldjJuUEJhRjJK?=
 =?utf-8?B?Z210ak1GRWtiWXFYbWhPUFV1dzV6QnBSbElNeDZNQm1LWFhsTmVURFV4U3pq?=
 =?utf-8?B?eVRpWnBHczhEa1hoemVlbFN0RUp3PT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <93236820C34A00458C8CE349781DBEF8@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4364fbb7-6541-4156-38cc-08d9fc86e460
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Mar 2022 19:57:33.4933
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 21L8zkkc+Cf35Pk0XDZn5k66TfmzKfNr8B2DEu8y9AdkGaJ+ibnaTnvDBq5yNHIPYanYMcmsLYet3EfYQgGUUT5SjT/Xp0Sn+fwQUf1k2Kc=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR03MB3202
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Wed Mar 02 20:49:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 20:49:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282564.481320 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPVun-0007Vs-QF; Wed, 02 Mar 2022 20:49:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282564.481320; Wed, 02 Mar 2022 20:49:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPVun-0007Vl-MK; Wed, 02 Mar 2022 20:49:41 +0000
Received: by outflank-mailman (input) for mailman id 282564;
 Wed, 02 Mar 2022 20:49:40 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPVum-0007Vb-MF; Wed, 02 Mar 2022 20:49:40 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPVum-0001hS-HD; Wed, 02 Mar 2022 20:49:40 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPVum-0006dF-3U; Wed, 02 Mar 2022 20:49:40 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPVum-0008GK-2g; Wed, 02 Mar 2022 20:49:40 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=CHeAOHiM6z01wVb9qfdSSzRpi4XmBbF7nRrn/m18pEA=; b=gRqLYLMjpiNu42GO7YEiHl+Xwq
	5tcX/DAFlZO/tgesagRY89X1AvwF/IIMvAobhs5qoc05et4hdEs+a3SOYPs4HUoCKoU+0UnLUblTh
	WvdIaxgJMkXpsdVFTYTHyHOWJc5EWr0P4dCq+2siEVCqaYwr+PhdRoyfXp8NsG7YpAqo=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168328-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168328: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:guest-start/debianhvm.repeat:fail:heisenbug
    xen-unstable:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:allowable
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=faecea18d252f97c6ad41f0f457566ff2c125b8d
X-Osstest-Versions-That:
    xen=6e3f36387de566b09aa4145ea0e3bfe4814d68b4
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 02 Mar 2022 20:49:40 +0000

flight 168328 xen-unstable real [real]
flight 168345 xen-unstable real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168328/
http://logs.test-lab.xenproject.org/osstest/logs/168345/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 14 guest-start/debianhvm.repeat fail pass in 168345-retest

Regressions which are regarded as allowable (not blocking):
 test-armhf-armhf-xl-rtds    18 guest-start/debian.repeat fail REGR. vs. 168310

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168310
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168310
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168310
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168310
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168310
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168310
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168310
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168310
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168310
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168310
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168310
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168310
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  faecea18d252f97c6ad41f0f457566ff2c125b8d
baseline version:
 xen                  6e3f36387de566b09aa4145ea0e3bfe4814d68b4

Last test of basis   168310  2022-03-01 23:38:41 Z    0 days
Testing same since   168328  2022-03-02 08:41:59 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Julien Grall <jgrall@amazon.com>
  Julien Grall <julien.grall@arm.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        fail    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   6e3f36387d..faecea18d2  faecea18d252f97c6ad41f0f457566ff2c125b8d -> master


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 22:10:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 22:10:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282586.481348 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPXAz-0001r3-E4; Wed, 02 Mar 2022 22:10:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282586.481348; Wed, 02 Mar 2022 22:10:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPXAz-0001qw-Ax; Wed, 02 Mar 2022 22:10:29 +0000
Received: by outflank-mailman (input) for mailman id 282586;
 Wed, 02 Mar 2022 22:10:28 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5HSw=TN=citrix.com=prvs=05368ea7b=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nPXAy-0001qX-Ol
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 22:10:28 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 8f5572a2-9a75-11ec-8eba-a37418f5ba1a;
 Wed, 02 Mar 2022 23:10:26 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8f5572a2-9a75-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646259026;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=tnU5OZzouBn4AHcK0NyTMJDBZStBopfGXyfAs2tmiog=;
  b=OUTdXBGKaGN7BI8QVdC3SFeAIfPbttct5BA09yeFA1J7z1fv+zU8uhlP
   weZ4C2koiOzupg+BHHNKKb1XutmjfY06zprTRO/QzXXAbzZf3LzmgqraT
   gEfmj0velXjdTRvQrLABsKnx5tpLG3wEIsZRtJYqGZ47WPzSe68dSpbbY
   A=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 65749612
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:vknyQ6O+x1hxyVjvrR2il8FynXyQoLVcMsEvi/4bfWQNrUongjRTy
 jQWCjiCaK6IYWWmKNt0YISy8EhQuMTQn9ZhGwto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi2tQw3bBVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Z+
 Ox3sbKNeD8TffPXhOhBbRwFTT9UIvgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALBc/nJo4A/FpnyinUF60OSpHfWaTao9Rf2V/cg+gQQKmCN
 pRAM1KDajz6ewYMZ1EIAq4YlfmKrGjRQhtE9Aqs8P9fD2/7k1UqjemF3MDuUsOObdVYmACfv
 G2u10bTDwweNdef4SGY6X/qjejK9QvrVYRXGLCm+/pChFyI2ndVGBAQTUG8o/Sylgi5Qd03F
 qAP0nNw9+5orhXtF4SjGU3jyJKZgvICc+ppKekU1TC18OmK+BqVWlYBE2BfQsNz4afaWgcW/
 lOOmtroAxlmv7uUVW+R+9+okN+iBcQGBTRcPHFZFGPp9/Gm+dhu1UyXEr6PBYbo1oWdJN3m/
 9ydQMHSbZ03hNVD6ai09Euvb9mE9smQFV5dCuk6swuYAuJFiGyNOtTABbvzt68owGOlor+p5
 iJsdy+2tr1mMH11vHbRKNjh5Znwjxp/DBXSgER0A74q/Cm39niocOh4uW8ieh01bJpVImC0O
 Sc/XD+9ArcJZhNGioctPuqM5zkCl/C8RbwJqNiOBjaxXnSBXFDep3w/DaJh92vsjFItgckC1
 WSzKq6R4YIhIf0/llKeHr5FuZdyn3xW7T6DFPjTkkX8uZLDNSH9dFvwGAbXBgzPxPjf+1u9H
 hc2H5bi9iizp8WlOniHqdNIdAtSRZX5bLivw/Fqmie4ClIOMAkc5zX5m+tJl1BN90iNqtr1w
 w==
IronPort-HdrOrdr: A9a23:OrKnj67gQx2x6VzUHgPXwMTXdLJyesId70hD6qhwISY6TiX+rb
 HIoB17726RtN9/YhEdcLy7VJVoIkmskKKdg7NhXotKNTOO0ADDQb2KhbGSpQEIcBeeygcy78
 hdmtBFeb/NMWQ=
X-IronPort-AV: E=Sophos;i="5.90,150,1643691600"; 
   d="scan'208";a="65749612"
From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Jan Beulich
	<JBeulich@suse.com>, =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?=
	<roger.pau@citrix.com>, Wei Liu <wl@xen.org>
Subject: [PATCH] xen/CET: Fix __initconst_cf_clobber
Date: Wed, 2 Mar 2022 22:10:05 +0000
Message-ID: <20220302221005.16636-1-andrew.cooper3@citrix.com>
X-Mailer: git-send-email 2.11.0
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

The linker script collecting .init.rodata.* ahead of .init.rodata.cf_clobber
accidentally causes __initconst_cf_clobber to be a no-op.

Rearrange the linker script to unbreak this.

The IOMMU adjust_irq_affinities() hooks currently violate the safety
requirement for being cf_clobber, by also being __initcall().

Consolidate to a single initcall using iommu_call() (satisfying the cf_clobber
safety requirement), and also removes the dubious property that we'd call into
both vendors IOMMU drivers on boot, relying on the for_each_*() loops to be
empty for safety.

With this fixed, an all-enabled build of Xen has 1681 endbr64's (1918
including .init.text) with 382 (23%) being clobbered during boot.

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
---
CC: Jan Beulich <JBeulich@suse.com>
CC: Roger Pau Monné <roger.pau@citrix.com>
CC: Wei Liu <wl@xen.org>

I was unsure whether to go common or x86 spefific IOMMU code, so went with the
conservative option.  The final hunk can trivially move if preferred.
---
 xen/arch/x86/xen.lds.S                   | 12 ++++++------
 xen/drivers/passthrough/amd/iommu_init.c |  1 -
 xen/drivers/passthrough/vtd/iommu.c      |  1 -
 xen/drivers/passthrough/x86/iommu.c      |  6 ++++++
 4 files changed, 12 insertions(+), 8 deletions(-)

diff --git a/xen/arch/x86/xen.lds.S b/xen/arch/x86/xen.lds.S
index 83def6541ebd..b15e5b67e4a4 100644
--- a/xen/arch/x86/xen.lds.S
+++ b/xen/arch/x86/xen.lds.S
@@ -210,6 +210,12 @@ SECTIONS
   DECL_SECTION(.init.data) {
 #endif
 
+       . = ALIGN(POINTER_ALIGN);
+       __initdata_cf_clobber_start = .;
+       *(.init.data.cf_clobber)
+       *(.init.rodata.cf_clobber)
+       __initdata_cf_clobber_end = .;
+
        *(.init.rodata)
        *(.init.rodata.*)
 
@@ -224,12 +230,6 @@ SECTIONS
        *(.initcall1.init)
        __initcall_end = .;
 
-       . = ALIGN(POINTER_ALIGN);
-       __initdata_cf_clobber_start = .;
-       *(.init.data.cf_clobber)
-       *(.init.rodata.cf_clobber)
-       __initdata_cf_clobber_end = .;
-
        *(.init.data)
        *(.init.data.rel)
        *(.init.data.rel.*)
diff --git a/xen/drivers/passthrough/amd/iommu_init.c b/xen/drivers/passthrough/amd/iommu_init.c
index 657c7f619a51..2e5bffa732e7 100644
--- a/xen/drivers/passthrough/amd/iommu_init.c
+++ b/xen/drivers/passthrough/amd/iommu_init.c
@@ -831,7 +831,6 @@ int cf_check iov_adjust_irq_affinities(void)
 
     return 0;
 }
-__initcall(iov_adjust_irq_affinities);
 
 /*
  * Family15h Model 10h-1fh erratum 746 (IOMMU Logging May Stall Translations)
diff --git a/xen/drivers/passthrough/vtd/iommu.c b/xen/drivers/passthrough/vtd/iommu.c
index 6a65ba1d8271..f70d51580657 100644
--- a/xen/drivers/passthrough/vtd/iommu.c
+++ b/xen/drivers/passthrough/vtd/iommu.c
@@ -2119,7 +2119,6 @@ static int cf_check adjust_vtd_irq_affinities(void)
 
     return 0;
 }
-__initcall(adjust_vtd_irq_affinities);
 
 static int __must_check init_vtd_hw(bool resume)
 {
diff --git a/xen/drivers/passthrough/x86/iommu.c b/xen/drivers/passthrough/x86/iommu.c
index 58a422fb5f88..6ef580215bc2 100644
--- a/xen/drivers/passthrough/x86/iommu.c
+++ b/xen/drivers/passthrough/x86/iommu.c
@@ -462,6 +462,12 @@ bool arch_iommu_use_permitted(const struct domain *d)
             likely(!p2m_get_hostp2m(d)->global_logdirty));
 }
 
+static int cf_check __init adjust_irq_affinities(void)
+{
+    return iommu_call(&iommu_ops, adjust_irq_affinities);
+}
+__initcall(adjust_irq_affinities);
+
 /*
  * Local variables:
  * mode: C
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 22:12:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 22:12:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282592.481359 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPXCe-0002Pg-Oq; Wed, 02 Mar 2022 22:12:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282592.481359; Wed, 02 Mar 2022 22:12:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPXCe-0002PY-Lw; Wed, 02 Mar 2022 22:12:12 +0000
Received: by outflank-mailman (input) for mailman id 282592;
 Wed, 02 Mar 2022 22:12:11 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5HSw=TN=citrix.com=prvs=05368ea7b=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nPXCd-0002PM-Ni
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 22:12:11 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id cd87aa3f-9a75-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 23:12:10 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cd87aa3f-9a75-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646259130;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=5eGfzPlndsyxVp6HYgFFniaJdsIB1nKCNPpAEM/imv0=;
  b=Qc9RMl+65nu9EfkNVKXs7N2We27q13FvofBUuEXqkJQmqgWdbqETrR5s
   qxPaP/rOXVFH2luXahyBzWzfelw10pQk9P540YJBSau5rkcRATwLi19DK
   V0aR+tuoYniszNn8CdG6vBmEG0e9CJBcneDu8TR1xKgXsoATgjFOfYckd
   4=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 65749704
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:VCx5+a+r0u8JpVNxPNI7DrUDhH6TJUtcMsCJ2f8bNWPcYEJGY0x3n
 2QcXW7Qb/3fZzCke4t+PI+w/UpU7Z7Xy9ZiGVRvpXw8E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oDjW1/lV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnaeJTRwKYabIo9gyY0l6Ti9cL5RixIaSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFKoZtmtt0nfyCvE+TIqYa67L+cVZzHE7gcUm8fP2O
 ZdGNWswNEiojxtnIXxNMdEgguKRh1rRbxRSsAyJibsw7D2GpOB2+Oe0a4eEEjCQfu1Kmm6Iq
 2SA+H72ajk4HtGCzTuO8lq3m/TC2yj8Xeo6BLC+s/JnnlCX7mgSEwENE0u2p+GjjUyzUM4ZL
 FYbkhfCtoBrqhbtFIOkGUTl/jjU5XbwRua8DcUB0QWW6fXf5z2lKVhUbGNPSs4fkPMPEGlCO
 kCyo/vlAjlmsbuwQH2b96uJoT7aBRX5PVPudgdfE1JbvoCLTJUby0uWE409SPLdYsjdRGmoq
 w1muhTSkFn6YSQj86ygtW7KjDu3znQiZl5kv16HNo5JA+4QWWJEW2BKwQWDhRqjBNzAJrVkg
 JTis5LEhAzpJcvQ/BFhuM1XQNmUCw+taVUwe2JHEZg77CiK8HW+Z41W6zwWDB43bpheJWG1M
 RSM5Fo5CHpv0J2CN/Ufj2WZUZlC8EQdPY69CqC8giRmOPCdizNrDAkxPBXNjggBYWAnkL0lO
 IfzTCpfJS1yNEiT9xLvH711+eZynkgWnDqPLbimn0XP+efPPxa9FOZaWGZim8hktctoVi2Oq
 I0BXyZLoj0CONDDjt7/qtZCfQhXdiFgXfgbaaV/L4a+H+avI0l5Y9e5/F/rU9UNc3h9/gsQw
 kyAZw==
IronPort-HdrOrdr: A9a23:A3qI5KNZ1gn/68BcTsWjsMiBIKoaSvp037BN7TEXdfU1SL39qy
 nKpp8mPHDP5Ar5NEtOpTniAsm9qBHnm6KdiLN5Vd3OYOCMggqVBbAnwYz+wyDxXw3Sn9QtsJ
 uIqpIOa+EY22IK7/rH3A==
X-IronPort-AV: E=Sophos;i="5.90,150,1643691600"; 
   d="scan'208";a="65749704"
From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Jan Beulich
	<JBeulich@suse.com>, =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?=
	<roger.pau@citrix.com>, Wei Liu <wl@xen.org>
Subject: [PATCH] x86/cmdline: Interpret 'vpmu' as a positive boolean
Date: Wed, 2 Mar 2022 22:11:57 +0000
Message-ID: <20220302221157.17246-1-andrew.cooper3@citrix.com>
X-Mailer: git-send-email 2.11.0
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

This makes it behave slightly more like a regular boolean option.

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
---
CC: Jan Beulich <JBeulich@suse.com>
CC: Roger Pau Monné <roger.pau@citrix.com>
CC: Wei Liu <wl@xen.org>

Slightly RFC, because there is no easy way of making the opposite "normal
boolean" case work for no-vpmu.
---
 xen/arch/x86/cpu/vpmu.c | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/xen/arch/x86/cpu/vpmu.c b/xen/arch/x86/cpu/vpmu.c
index 4fedc7c57012..501d4f0af94e 100644
--- a/xen/arch/x86/cpu/vpmu.c
+++ b/xen/arch/x86/cpu/vpmu.c
@@ -66,7 +66,9 @@ static int __init cf_check parse_vpmu_params(const char *s)
         if ( !ss )
             ss = strchr(s, '\0');
 
-        if ( (val = parse_bool(s, ss)) >= 0 )
+        if ( s == ss )
+            opt_vpmu_enabled = true;
+        else if ( (val = parse_bool(s, ss)) >= 0 )
         {
             opt_vpmu_enabled = val;
             if ( !val )
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Wed Mar 02 22:55:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 22:55:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282602.481371 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPXsH-0007vo-7J; Wed, 02 Mar 2022 22:55:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282602.481371; Wed, 02 Mar 2022 22:55:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPXsH-0007vh-3X; Wed, 02 Mar 2022 22:55:13 +0000
Received: by outflank-mailman (input) for mailman id 282602;
 Wed, 02 Mar 2022 22:55:11 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPXsF-0007vS-8p; Wed, 02 Mar 2022 22:55:11 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPXsF-0003p4-5E; Wed, 02 Mar 2022 22:55:11 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPXsE-0004BU-O0; Wed, 02 Mar 2022 22:55:10 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPXsE-0001vZ-Na; Wed, 02 Mar 2022 22:55:10 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=GnHVIMZBMDZf32W09tBha3IcH3MWPapPhaQXkggP2Zk=; b=kGJxlqfVe53nI/KAhWmI09Yx2n
	UEjezoZyJkhxCS1nYBPwrPmPfV09nrL9kS2mxR40YeEZJCutVF7/vSJO2x1QP0t/ACoo9bXxy4y05
	mI/s+lYFUP3cWgphgcwVcgKyo7MCcCLNQZEvO45gMcjys/yIE8XHlNitIaGGwnVr4t/M=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168344-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168344: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=dc39554d58af4a50b50eca1f57c49415a12b0c98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 02 Mar 2022 22:55:10 +0000

flight 168344 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168344/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 dc39554d58af4a50b50eca1f57c49415a12b0c98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    2 days
Failing since        168258  2022-03-01 01:55:31 Z    1 days   18 attempts
Testing same since   168316  2022-03-02 02:50:20 Z    0 days    6 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit dc39554d58af4a50b50eca1f57c49415a12b0c98
Author: Xiaolu.Jiang <xiaolu.jiang@intel.com>
Date:   Tue Feb 22 22:14:05 2022 +0800

    edk2/MdeModulePkg/Debuglib: Add Standalone MM support
    
    https://bugzilla.tianocore.org/show_bug.cgi?id=3844
    
    This change added Standalone MM instance of DebugLib.
    
    Reviewd-by: Jian J Wang <jian.j.wang@intel.com>
    Reviewd-by: Liming Gao <gaoliming@byosoft.com.cn>
    
    Signed-off-by: Xiaolu.Jiang <xiaolu.jiang@intel.com>

commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Wed Mar 02 22:55:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 02 Mar 2022 22:55:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282610.481382 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPXsr-0008Qi-Gl; Wed, 02 Mar 2022 22:55:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282610.481382; Wed, 02 Mar 2022 22:55:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPXsr-0008QZ-DL; Wed, 02 Mar 2022 22:55:49 +0000
Received: by outflank-mailman (input) for mailman id 282610;
 Wed, 02 Mar 2022 22:55:48 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=6wI2=TN=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nPXsq-0008P6-I1
 for xen-devel@lists.xenproject.org; Wed, 02 Mar 2022 22:55:48 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org
 [2604:1380:4601:e00::1])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id e4ef41db-9a7b-11ec-8539-5f4723681683;
 Wed, 02 Mar 2022 23:55:46 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 9BAEFB82285;
 Wed,  2 Mar 2022 22:55:44 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 09738C004E1;
 Wed,  2 Mar 2022 22:55:42 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e4ef41db-9a7b-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646261743;
	bh=eGkVgzszDtV57fApPBexl0TVZ6WfXQmp/zCtiK77G5w=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=J14599mDBY6SiAecIHYOPw+47kA1RD3vf61XWWDduDghgViWRsCH5LCJT9klF6nWM
	 20xTyw20PC9hgjfpGrd02+fhJy+Brw5Tp4HsD1NVZwdTbrPg7Elb+018j1OtRv8gui
	 Sq15JI/SX44J6Xi+ON5mKXlavVCpKmZ+/4JPtuJg9KJy83SFyNm0iatezO7AbYD2jU
	 qU7f+QJvVy303DmGLlJ2cAQxPoRxZ1733TwA9Mx0sy675VEp5Z06KAOlLjoIj/4cSg
	 t4YL3fxEcItHzjdX19tUwV+0KskdEA3SDKZoMAO/0c/j7v22ZqBNki13ufEEIb5hpk
	 JvL8wMmRM1NMQ==
Date: Wed, 2 Mar 2022 14:55:42 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Wei Chen <Wei.Chen@arm.com>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, 
    "julien@xen.org" <julien@xen.org>, 
    Bertrand Marquis <Bertrand.Marquis@arm.com>, 
    Penny Zheng <Penny.Zheng@arm.com>, Henry Wang <Henry.Wang@arm.com>, 
    nd <nd@arm.com>
Subject: RE: Proposal for Porting Xen to Armv8-R64 - DraftA
In-Reply-To: <PAXPR08MB74201779FC92E734A5107B769E039@PAXPR08MB7420.eurprd08.prod.outlook.com>
Message-ID: <alpine.DEB.2.22.394.2203021454090.3261@ubuntu-linux-20-04-desktop>
References: <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com> <alpine.DEB.2.22.394.2202241606450.239973@ubuntu-linux-20-04-desktop> <AS1PR08MB74269923288B75097392BDD99E3E9@AS1PR08MB7426.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2202251214210.239973@ubuntu-linux-20-04-desktop> <PAXPR08MB742081D5E3C94801350C4A739E029@PAXPR08MB7420.eurprd08.prod.outlook.com> <alpine.DEB.2.22.394.2203011455500.3261@ubuntu-linux-20-04-desktop>
 <PAXPR08MB74201779FC92E734A5107B769E039@PAXPR08MB7420.eurprd08.prod.outlook.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="8323329-615912675-1646261743=:3261"

  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--8323329-615912675-1646261743=:3261
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8BIT

On Wed, 2 Mar 2022, Wei Chen wrote:
> > > > > > If not, and considering that we have to generate
> > > > > > ARM_MPU_*_MEMORY_START/END anyway at build time, would it make
> > sense
> > > > to
> > > > > > also generate mpu,guest-memory-section, xen,static-mem, etc. at
> > build
> > > > > > time rather than passing it via device tree to Xen at runtime?
> > > > > >
> > > > >
> > > > > Did you mean we still add these information in device tree, but for
> > > > build
> > > > > time only. In runtime we don't parse them?
> > > >
> > > > Yes, something like that, but see below.
> > > >
> > > >
> > > > > > What's the value of doing ARM_MPU_*_MEMORY_START/END at build time
> > and
> > > > > > everything else at runtime?
> > > > >
> > > > > ARM_MPU_*_MEMORY_START/END is defined by platform. But other things
> > are
> > > > > users customized. They can change their usage without rebuild the
> > image.
> > > >
> > > > Good point.
> > > >
> > > > We don't want to have to rebuild Xen if the user updated a guest
> > kernel,
> > > > resulting in a larger boot-module-section.
> > > >
> > > > So I think it makes sense that "mpu,boot-module-section" is generated
> > by
> > > > the scripts (e.g. ImageBuilder) at build time, and Xen reads the
> > > > property at boot from the runtime device tree.
> > > >
> > > > I think we need to divide the information into two groups:
> > > >
> > > >
> > > > # Group1: board info
> > > >
> > > > This information is platform specific and it is not meant to change
> > > > depending on the VM configuration. Ideally, we build Xen for a
> > platform
> > > > once, then we can use the same Xen binary together with any
> > combination
> > > > of dom0/domU kernels and ramdisks.
> > > >
> > > > This kind of information doesn't need to be exposed to the runtime
> > > > device tree. But we can still use a build-time device tree to generate
> > > > the addresses if it is convenient.
> > > >
> > > > XEN_START_ADDRESS, ARM_MPU_DEVICE_MEMORY_*, and
> > ARM_MPU_NORMAL_MEMORY_*
> > > > seem to be part of this group.
> > > >
> > >
> > > Yes.
> > >
> > > >
> > > > # Group2: boot configuration
> > > >
> > > > This information is about the specific set of binaries and VMs that we
> > > > need to boot. It is conceptually similar to the dom0less device tree
> > > > nodes that we already have. If we change one of the VM binaries, we
> > > > likely have to refresh the information here.
> > > >
> > > > "mpu,boot-module-section" probably belongs to this group (unless we
> > find
> > > > a way to define "mpu,boot-module-section" generically so that we don't
> > > > need to change it any time the set of boot modules change.)
> > > >
> > > >
> > >
> > > I agree.
> > >
> > > > > > It looks like we are forced to have the sections definitions at
> > build
> > > > > > time because we need them before we can parse device tree. In that
> > > > case,
> > > > > > we might as well define all the sections at build time.
> > > > > >
> > > > > > But I think it would be even better if Xen could automatically
> > choose
> > > > > > xen,static-mem, mpu,guest-memory-section, etc. on its own based on
> > the
> > > > > > regular device tree information (/memory, /amba, etc.), without
> > any
> > > > need
> > > > > > for explicitly describing each range with these new properties.
> > > > > >
> > > > >
> > > > > for mpu,guest-memory-section, with the limitations: no other usage
> > > > between
> > > > > different guest' memory nodes, this is OK. But for xen,static-mem
> > (heap),
> > > > > we just want everything on a MPU system is dertermistic. But, of
> > course
> > > > Xen
> > > > > can select left memory for heap without static-mem.
> > > >
> > > > It is good that you think they can be chosen by Xen.
> > > >
> > > > Differently from "boot-module-section", which has to do with the boot
> > > > modules selected by the user for a specific execution,
> > > > guest-memory-section and static-mem are Xen specific memory
> > > > policies/allocations.
> > > >
> > > > A user wouldn't know how to fill them in. And I worry that even a
> > script
> > >
> > > But users should know it, because static-mem for guest must be allocated
> > > in this range. And users take the responsibility to set the DomU's
> > > static allocate memory ranges.
> > 
> > Let me premise that my goal is to avoid having many users reporting
> > errors to xen-devel and xen-users when actually it is just a wrong
> > choice of addresses.
> > 
> > I think we need to make a distinction between addresses for the boot
> > modules, e.g. addresses where to load xen, the dom0/U kernel, dom0/U
> > ramdisk in memory at boot time, and VM static memory addresses.
> > 
> > The boot modules addresses are particularly difficult to fill in because
> > they are many and a small update in one of the modules could invalidate
> > all the other addresses. This is why I ended up writing ImageBuilder.
> > Since them, I received several emails from users thanking me for
> > ImageBuilder :-)
> > 
> 
> Thanks +999 😊
> 
> 
> > The static VM memory addresses (xen,static-mem) should be a bit easier
> > to fill in correctly. They are meant to be chosen once, and it shouldn't
> > happen that an update on a kernel forces the user to change all the VM
> > static memory addresses. Also, I know that some users actually want to
> > be able to choose the domU addresses by hand because they have specific
> > needs. So it is good that we can let the user choose the addresses if
> > they want to.
> > 
> 
> Yes.
> 
> > With all of that said, I do think that many users won't have an opinion
> > on the VM static memory addresses and won't know how to choose them.
> > It would be error prone to let them try to fill them in by hand. So I
> > was already planning on adding support to ImageBuilder to automatically
> > generate xen,static-mem for dom0less domains.
> > 
> 
> Let me make sure that's what you said: Users give an VM memory size to
> ImageBuilder, and ImageBuilder will generate xen,static-mem = <start, size>.
> For specific VM, ImageBuilder also can accept start and size as inputs?
> 
> Do I understand this correctly?

Yes, exactly

 
> > Going back to this specific discussion about boot-module-section: I can
> > see now that, given xen,static-mem is chosen by ImageBuilder (or
> 
> By hand : )
> 
> > similar) and not Xen, then it makes sense to have ImageBuilder (or
> > similar) also generate boot-module-section.
> > 
> 
> If my above understanding is right, then yes.

Yes, I think we are on the same page
 
 
> > > > like ImageBuilder wouldn't be the best place to pick these values --
> > > > they seem too "important" to leave to a script.
> > > >
> > > > But it seems possible to choose the values in Xen:
> > > > - Xen knows ARM_MPU_NORMAL_MEMORY_* because it was defined at build
> > time
> > > > - Xen reads boot-module-section from device tree
> > > >
> > > > It should be possible at this point for Xen to pick the best values
> > for
> > > > guest-memory-section and static-mem based on the memory available.
> > > >
> > >
> > > How Xen to pick? Does it mean in static allocation DomU DT node, we just
> > > need a size, but don't require a start address for static-mem?
> > 
> > Yes the idea was that the user would only provide the size (e.g.
> > DOMU_STATIC_MEM[1]=1024) and the addresses would be automatically
> > calculated. But I didn't mean to change the existing xen,static-mem
> > device tree bindings. So it is best if the xen,static-mem addresses
> > generation is done by ImageBuilder (or similar tool) instead of Xen.
> > 
> 
> If we still keep the option for user to specify the start and size
> parameters for VM memory, because it maybe very important for a
> deterministic system (fully static system), I agree with you.
> 
> And in current static-allocation, I think Xen doesn't generate
> xen,static-mem addresses, all by hands...

Yeah 


> > Sorry for the confusion!
> > 
> 
> NP ; )

--8323329-615912675-1646261743=:3261--


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 00:21:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 00:21:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282625.481399 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPZDY-0003nn-6N; Thu, 03 Mar 2022 00:21:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282625.481399; Thu, 03 Mar 2022 00:21:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPZDY-0003ng-2B; Thu, 03 Mar 2022 00:21:16 +0000
Received: by outflank-mailman (input) for mailman id 282625;
 Thu, 03 Mar 2022 00:21:14 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ibyA=TO=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nPZDV-0003na-Nb
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 00:21:14 +0000
Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com
 [205.220.165.32]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d2c6ac0e-9a87-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 01:21:10 +0100 (CET)
Received: from pps.filterd (m0246627.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 222LxCpl028857; 
 Thu, 3 Mar 2022 00:20:48 GMT
Received: from aserp3030.oracle.com (aserp3030.oracle.com [141.146.126.71])
 by mx0b-00069f02.pphosted.com with ESMTP id 3eh14bye8g-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Thu, 03 Mar 2022 00:20:47 +0000
Received: from pps.filterd (aserp3030.oracle.com [127.0.0.1])
 by aserp3030.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 2230FK8p058469;
 Thu, 3 Mar 2022 00:20:46 GMT
Received: from nam11-co1-obe.outbound.protection.outlook.com
 (mail-co1nam11lp2168.outbound.protection.outlook.com [104.47.56.168])
 by aserp3030.oracle.com with ESMTP id 3efa8h1t10-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Thu, 03 Mar 2022 00:20:46 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
 by BY5PR10MB4225.namprd10.prod.outlook.com (2603:10b6:a03:20f::24)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.22; Thu, 3 Mar
 2022 00:20:44 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::6d20:6694:a16:56f7]) by BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::6d20:6694:a16:56f7%3]) with mapi id 15.20.5038.015; Thu, 3 Mar 2022
 00:20:44 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d2c6ac0e-9a87-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=NFC70BiF9kXdxPXApLojElkpvB7Fub06OPV7fhkw2GY=;
 b=K45CXekakFKaF401RaG4CbLTQpA60u6PELkQLEaW767pqGE40YDE6AbmPCQaEZwzVD/Z
 hrOuG1GeXWsD2Hngkv3AiGbxkESdLaW1gDdixQIW0vCE7wAplW3G7LU3p4G1B6W0Y3s0
 dbOWTnkQVuUX8FOs0q3lPM8H+EYgynidgicBneRlg0b/zjyYZKitUvLTSTWJRVFQc0vQ
 P3Z8wa7vexGOyGKt5ug/MocKI7hanZ9Zx72gzL55hQmD8NsLX7hmRJ9vIlCuot1IAh0e
 SxIMSvNYDSAMTUsK8rYJ8wyLtoue0Y0WCI9aH/fZ6w0xLXJZxL5WAd4jBd03TMcO0r9p NA== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ATJ3mRXWSVjXLKWkiYE0eHj8cr5Mfn0UHMNuEDQHph/uhaxJnbh+LZaxt5OrsQOAh6iVU4htyU1103jmeWAKeKsfjb8Bn4ZUP7T4AiWbeihfKZJIoji1k2SVVZmiq4uvGtBIHr0iHeoQVR3lwx13nNMyQJGyqcQcjxQCjZj6LUxXDeNhJdvtCQwHUCD/hwuPMCp7oVkeF37tuVrYl5bNCc/sj9BwNCsIrz9RW6ZTyLdTFMiXaNk6IZT5O1oE/FlouvzrNeAnxiq68gz1dW3a0flQ04RcN4g4yS13kBJEbD/DTSa/6feYO5Bs9hV/iKZ6DUZ6CAISSZnvHCrYzJLQqQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=NFC70BiF9kXdxPXApLojElkpvB7Fub06OPV7fhkw2GY=;
 b=KmC7IVTs1y2qALM9OwiyU0q/qYdMtaiWCkM6VzA5BqIdC2+7RBm65/pVGp0hi/RM9Py2DZbhJTZClJraQTfVlzx7xmQnBWT8QXoA17daAJoBTzUdj0C2mfLztIf3sbXlH5zL6YrF7EocgDEcr0QX4Fg+d0N/9vCzdYmmGauQRsrH1Cd4B16+fSB9DCjELs0QsKofI5MQgBqvwfcNLKtvYTvDMRYENFr5hFFFXiaDD+3wmeF9TnGnIrnQba+Ut2TBrdxLHLritZtbhWdZER0sOK14Vy0duqYj2ZlwWrLfskGOelfIOSAdze9GbpebCx87MKdtEkhCeiT1BRExXdoKhw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=NFC70BiF9kXdxPXApLojElkpvB7Fub06OPV7fhkw2GY=;
 b=XgxL1hUkMet8KLa8aUaI8NFOoajUKw67wxe+XJrdk4YeCm0+b4C+1gdL6XJnB6bRS5iNDw5i3owM2RnvItEUdNgzB5QayPd6gPzhSLoF5EZwgR0OOV5U52BeqyOgpS4s+LL0Iu34soGWR1rHQGwoF3WDyc2ll95riiyoAUmWyf4=
Message-ID: <bacae45c-9f8e-456b-1036-7f68e1e4374d@oracle.com>
Date: Wed, 2 Mar 2022 19:20:38 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH v4 2/2] xen: delay xen_hvm_init_time_ops() if kdump is
 boot on vcpu>=32
Content-Language: en-US
To: Dongli Zhang <dongli.zhang@oracle.com>, xen-devel@lists.xenproject.org,
        x86@kernel.org
Cc: linux-kernel@vger.kernel.org, jgross@suse.com, sstabellini@kernel.org,
        tglx@linutronix.de, mingo@redhat.com, bp@alien8.de,
        dave.hansen@linux.intel.com, joe.jin@oracle.com
References: <20220302164032.14569-1-dongli.zhang@oracle.com>
 <20220302164032.14569-3-dongli.zhang@oracle.com>
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
In-Reply-To: <20220302164032.14569-3-dongli.zhang@oracle.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: SN2PR01CA0047.prod.exchangelabs.com (2603:10b6:800::15) To
 BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: d98bc3ed-e527-4c71-c59a-08d9fcaba80f
X-MS-TrafficTypeDiagnostic: BY5PR10MB4225:EE_
X-Microsoft-Antispam-PRVS: 
	<BY5PR10MB42254103A80B75C67CFD4F028A049@BY5PR10MB4225.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BLAPR10MB5009.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6666004)(36756003)(66476007)(66556008)(31686004)(31696002)(53546011)(26005)(186003)(8676002)(508600001)(2616005)(6512007)(6506007)(86362001)(6486002)(38100700002)(316002)(83380400001)(66946007)(44832011)(8936002)(107886003)(2906002)(5660300002)(4326008)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?NkE5UVRaQ0lqdjY4VVE0K3pVeXVtZDM3dkhWQ3VzR1E3cU9Xb1RCWHpaendn?=
 =?utf-8?B?cS9mYmtwdHFTSmtnK2NNbUN4ZzhEbDRtNGM3R1NrUWFPUUtRU2dhR3JSWTlL?=
 =?utf-8?B?Y2RrYTR5WURabm1wbVlVUGZteU1rQkxYQzBudGROdUJaU243L3BBUGhrQkdD?=
 =?utf-8?B?R0t0czIvaWV6VkVPZzBQVVZ6MkRQbVZhUTVHNU9lVlpNWHlnZ3FpV0wwR2RC?=
 =?utf-8?B?TzFTNXFQcU1BOHhZc0JRbHUyMjZkakg4a3g0anNHWGVxNDE2S01VS20yOUEy?=
 =?utf-8?B?VWh3UVo4R1BaeHdlSTJkR3dwV1pmb09CUHlEaFhlcmcxQjhtOHZLaytkYmVt?=
 =?utf-8?B?TTA3NEFCZHUvRWxtWW54MmRRa0FuYWZXTmdKVWJvZ3JmNkwxSjR2ZU1MQTc4?=
 =?utf-8?B?dmt2UlVKSUdBdENvdjJGZk5TeFFQWG16RGtqSEdPUmU0ZHhGSHd3STVrNXE2?=
 =?utf-8?B?TG1FeW93aUFuellHdE9IMk15SHVWY2k1Q3RYR3pMT2gxc3huNlVqK0JWZDNX?=
 =?utf-8?B?MHhqSmtEU1BCbVlXbithUVNCTjFJS1pFZHFLdnFVSm1oSXpUOFdLaVQ5RDl0?=
 =?utf-8?B?bFV0aVFpWFI1OG1Ka0VmVEpBSTFCaXZpcWEvcEI0OHlJblh1bHZpMzBsNXFQ?=
 =?utf-8?B?a1QrRnUzOWhJWUhCdmhvTkliZG0zU1dXVFhzVFVFWnhGZnhSNEp6TS9QQkdu?=
 =?utf-8?B?V1NxejhxYTA1ZC9SbDlITXV2MEluZVdnMjhod09YRnY3N3NZR3d0R3h3a1BG?=
 =?utf-8?B?S0pndTk2WmUraGdNaUJQY0QwTmMvUEJQUE1kek9jS2F2NEdlTEtlMkd3c2hr?=
 =?utf-8?B?V3B1VE42NjB3MStYT0h4dGlNMTdBaDVBdiszQ0pqR1lRdFliaFQ4TThXUTZB?=
 =?utf-8?B?R1BtZDlFY1R4SkRMQ1NQcTNRVHFuSnZLbC93REF3QWlvbExMUGZNWHk5WGlD?=
 =?utf-8?B?a3JKRHZRRXpBTUlaa014eTB0ZGVuc2x3TkRyYm9paXJ3c0VaTkpYTmZEbGh2?=
 =?utf-8?B?N2Q1bnpyWGRESnV0cFphb21zcTdJZnB6Y3FNd1IzMmM3Z3poaTAwRVVPWi9t?=
 =?utf-8?B?bDZXWkdKTGx3bjZpUlI4Q0pLNy9mVEY5c0VPcXpHRHRGMDczME9qcFRYdTJz?=
 =?utf-8?B?ZmlLMVB1cndGUGVmTjk1dDhvZVdsMU53dTA3bjBYOFFDYVJHSWhaYkZFcXVT?=
 =?utf-8?B?T2x3ZXU4dnBqSmE4MlZ2MzE3T2tPak1nc1JwbkFvWHBVeElUcWVLOEY2VzVS?=
 =?utf-8?B?V04ySWJodHFVQm5HU1AvWEZlblMzdzB6OFRxOHpjeWpaYzROZXB5cE04eTJz?=
 =?utf-8?B?cW92aW45Vnd4WVpCZUlEdytWY0ZmeGMwdXBua2Q5MjQzc3BKVXBwQ3d3c1Y1?=
 =?utf-8?B?cmJSdUNUR2w0ZHp6a2xxRVVJcm5YbFBkMkQxS1BFTG9NWXZNR0RqZUtNampz?=
 =?utf-8?B?Vk9OajhoSHNyb1ZqTzZFNThibksvSEFZMkZaWjB6bUZVL3RlcnhxdWpsTE9S?=
 =?utf-8?B?UkozcGhXY0crWWdHWmQ2Zy95S3pFNnN4eC9xcGxFRmJldU8rbDhtd0FQWGZj?=
 =?utf-8?B?UU5ySFRpQTJrQUluamN6bkRyc2tMNVFkVmZuYXh5OUlDaVJNbVpkVEhBMDRn?=
 =?utf-8?B?V09yT0llaTFVNXFRN1dYSWc2RDgyeCtIemVFYTZGa3AyWGllMVpheERqR0o5?=
 =?utf-8?B?T1dzRG83QkNXYTIrWklaQVRoVHRGRlJWNm5ySkh4QThFanZwNnhhaUE1bmd5?=
 =?utf-8?B?TSsvRCtBalVhdjBUK1R4Z3l5VkJ3dkJuYWJoajhyWThndDFqVVcvMjdtUkl6?=
 =?utf-8?B?MzF6cGEyc2pva0lpdzlPdHIvdHhLeldZU1I2SlgyZWg0bEpiYmIzdzZzSjN1?=
 =?utf-8?B?TXcwbW5xcW9ScldpTFdzbjBTMkxuRTk4RjVaZFFWcTRFVFlXa0NCSi9hQjBq?=
 =?utf-8?B?ckFxVHR1empkelBOMXFFbnNpcjhsZUZ3d0NHYW8xeGhYbTZvQmVSNVV2ZXhp?=
 =?utf-8?B?clUwYmlOTWFNajdPNnc4bmxGa3o0QmNLSmU1QXUrdVptd0g1eDhJbTBscHp5?=
 =?utf-8?B?YkNjNUxlUk40RkIvZlhUbVpYVWN5eVFXOXkrbFZZTWpxSFltYWRxSGpsUmRv?=
 =?utf-8?B?KzVxZDBpYU55cS83eE5IeVpmcWVqeWdmL2NJb2hzRE10RmptbVVOMi9weGRz?=
 =?utf-8?B?YkZaaysrblE1MHdnSnRXN1pNUFhidHNZbndhcDJZb3cvRFBNc0MycTdyNzhH?=
 =?utf-8?B?Z1crYnNJU3FkYzdZUWk2UDUxK2dRPT0=?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d98bc3ed-e527-4c71-c59a-08d9fcaba80f
X-MS-Exchange-CrossTenant-AuthSource: BLAPR10MB5009.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 00:20:43.9942
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: hWCjmova3d4zTuCrrEKG9VfCssDqhkx5x71FMioIHZ7XFIkbbTh4yFrpnuIfbLWAIwsae42I+G9YMOQctCniaHeGLkY+FDjuRgWxIfhCgY8=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR10MB4225
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10274 signatures=686787
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 adultscore=0 bulkscore=0 phishscore=0
 malwarescore=0 mlxscore=0 suspectscore=0 spamscore=0 mlxlogscore=999
 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2201110000
 definitions=main-2203030000
X-Proofpoint-GUID: AqtJ6_hgO6k6EjG8lvbXH9wk7Kf5d7O5
X-Proofpoint-ORIG-GUID: AqtJ6_hgO6k6EjG8lvbXH9wk7Kf5d7O5


On 3/2/22 11:40 AM, Dongli Zhang wrote:
>   void __init xen_hvm_init_time_ops(void)
>   {
> +	static bool hvm_time_initialized;
> +
> +	if (hvm_time_initialized)
> +		return;
> +
>   	/*
>   	 * vector callback is needed otherwise we cannot receive interrupts
>   	 * on cpu > 0 and at this point we don't know how many cpus are
>   	 * available.
>   	 */
>   	if (!xen_have_vector_callback)
> -		return;
> +		goto exit;


Why not just return? Do we expect the value of xen_have_vector_callback to change?


-boris


>   
>   	if (!xen_feature(XENFEAT_hvm_safe_pvclock)) {
>   		pr_info("Xen doesn't support pvclock on HVM, disable pv timer");
> +		goto exit;
> +	}
> +
> +	/*
> +	 * Only MAX_VIRT_CPUS 'vcpu_info' are embedded inside 'shared_info'.
> +	 * The __this_cpu_read(xen_vcpu) is still NULL when Xen HVM guest
> +	 * boots on vcpu >= MAX_VIRT_CPUS (e.g., kexec), To access
> +	 * __this_cpu_read(xen_vcpu) via xen_clocksource_read() will panic.
> +	 *
> +	 * The xen_hvm_init_time_ops() should be called again later after
> +	 * __this_cpu_read(xen_vcpu) is available.
> +	 */
> +	if (!__this_cpu_read(xen_vcpu)) {
> +		pr_info("Delay xen_init_time_common() as kernel is running on vcpu=%d\n",
> +			xen_vcpu_nr(0));
>   		return;
>   	}
>   
> @@ -577,6 +597,9 @@ void __init xen_hvm_init_time_ops(void)
>   	x86_cpuinit.setup_percpu_clockev = xen_hvm_setup_cpu_clockevents;
>   
>   	x86_platform.set_wallclock = xen_set_wallclock;
> +
> +exit:
> +	hvm_time_initialized = true;
>   }
>   #endif
>   


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 00:33:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 00:33:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282632.481410 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPZPO-0005c5-9M; Thu, 03 Mar 2022 00:33:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282632.481410; Thu, 03 Mar 2022 00:33:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPZPO-0005bi-6E; Thu, 03 Mar 2022 00:33:30 +0000
Received: by outflank-mailman (input) for mailman id 282632;
 Thu, 03 Mar 2022 00:33:28 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=7Xx6=TO=oracle.com=dongli.zhang@srs-se1.protection.inumbo.net>)
 id 1nPZPM-0005bc-O1
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 00:33:28 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 8a0a64ee-9a89-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 01:33:26 +0100 (CET)
Received: from pps.filterd (m0246631.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 222Lx0Qb009253; 
 Thu, 3 Mar 2022 00:32:00 GMT
Received: from userp3030.oracle.com (userp3030.oracle.com [156.151.31.80])
 by mx0b-00069f02.pphosted.com with ESMTP id 3ehbk9e0aa-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Thu, 03 Mar 2022 00:32:00 +0000
Received: from pps.filterd (userp3030.oracle.com [127.0.0.1])
 by userp3030.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 2230GIU7113107;
 Thu, 3 Mar 2022 00:31:59 GMT
Received: from nam10-bn7-obe.outbound.protection.outlook.com
 (mail-bn7nam10lp2102.outbound.protection.outlook.com [104.47.70.102])
 by userp3030.oracle.com with ESMTP id 3ef9b21s9t-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Thu, 03 Mar 2022 00:31:59 +0000
Received: from BYAPR10MB2663.namprd10.prod.outlook.com (2603:10b6:a02:a9::20)
 by CY4PR10MB1541.namprd10.prod.outlook.com (2603:10b6:903:26::19)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 00:31:56 +0000
Received: from BYAPR10MB2663.namprd10.prod.outlook.com
 ([fe80::a0d5:610d:bcf:9b47]) by BYAPR10MB2663.namprd10.prod.outlook.com
 ([fe80::a0d5:610d:bcf:9b47%4]) with mapi id 15.20.5017.027; Thu, 3 Mar 2022
 00:31:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8a0a64ee-9a89-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=subject : to : cc :
 references : from : message-id : date : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=bneHbRqEhwaWmn2AAsUC2F8vjj3KwmMr1Ijt7yZsINQ=;
 b=FetpJ9d07hxgnA+7F4yr8oABtIhJqjjksV6Lh+lXgd6YiomAScZiVurJCOE3sXctgCmG
 5Eo+UwoCAxIRFyO8KoovtleBVQInlOcHXsCXmox4Q5MijkHHfE06KEcvUW+wgd9UCQ0j
 hjrlv+Gd2DPtV2EqpB37p1oFvB1x+04+9Jd8HRUa8meqx0O6bw7uD5gy7vjb0gO4M8nf
 9/QmN/vjyyqOdov0YMOiWrm99lycVzlpmXgzjrFiRISRXPmfOzjKbQRa3vDppKT/Eve/
 +ObTnODEhD7BzlODwnZ3jAzh2bXvJbyrbvSSmcdxbQS4HvnVVSPBEKIpEvFFGicTIjrC Iw== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=HLqG/wDT5iomSPucBdOhILRPILaKr5nrt2vLmSewKISyMXEWV7oBLTKs8F3OZCJ7HdOWzaWyay2JyzfRx8Ny4zneDM/SXKblhV6ZcsLNOJa9CRrGG+/1jww3DaiXk/PqEIO7QsJ7qmtBmtqyqup7EXf1wtcEmhdKBk9qjv20oNaM3u7yAzCQQ/gmIoBbPs22+7QV4Em/TTEtvAmBWvNqMdArocGZhPz8JIUUHEXcjMrBluFnbDnvxVcG9PpGMOQuC7ULTOT9HccutruKtBl16ynaLyPDnafSvpa0hNYdjknooAIxt02RhaZe8H/LZwA/E4hTun8yiBrl3ETbs64f/g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=bneHbRqEhwaWmn2AAsUC2F8vjj3KwmMr1Ijt7yZsINQ=;
 b=NqVNdp1gaAotCL86aPA6a2uVfIU3V0G0T2dYVFTePGrFw4gpER+nGzOSNUE682V0pSMzpKYNioLOFX7o+0ASlJXK1MpxktARR968wQk7NMPViBaulUrPxlUflDJIncWueqI3XUL3DxCJy2AbU5ONC48P5weKOu9R/T1Myuh/Eu7fotzD8Iptu4nPXsXDdyChClntHonNmkhnO5K6q5mqYvEdEmtEstS+9ZVjzuZmrKx+CSjcby+2taslybxfoXttauqa5vBdUJi0sr+DPmd5Qg2B+3WjUBBfqsEucSCbvdsX0oXmf7ap5vxJqfTkMLO5moopBXwLSj1BILfZ3PZnmw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=bneHbRqEhwaWmn2AAsUC2F8vjj3KwmMr1Ijt7yZsINQ=;
 b=eVkvMu5dyUuehXSjeonzSb1e4g8W6mjyzbmJaaj/3yXet+UPxXkG/uEWtKQfCgVt3/YUfYOR0/kuVwmMu32LtZvtjLupVmhAp2Bc+wzL2JfZJdRHe5bFpFq+hstqXEh0g9Pt0hPqyrrgglGMYFdcCkA3wY8C+Oyz/lXZ+mYVnkA=
Subject: Re: [PATCH v4 2/2] xen: delay xen_hvm_init_time_ops() if kdump is
 boot on vcpu>=32
To: Boris Ostrovsky <boris.ostrovsky@oracle.com>,
        xen-devel@lists.xenproject.org, x86@kernel.org
Cc: linux-kernel@vger.kernel.org, jgross@suse.com, sstabellini@kernel.org,
        tglx@linutronix.de, mingo@redhat.com, bp@alien8.de,
        dave.hansen@linux.intel.com, joe.jin@oracle.com
References: <20220302164032.14569-1-dongli.zhang@oracle.com>
 <20220302164032.14569-3-dongli.zhang@oracle.com>
 <bacae45c-9f8e-456b-1036-7f68e1e4374d@oracle.com>
From: Dongli Zhang <dongli.zhang@oracle.com>
Message-ID: <0ac50fb6-0aca-e61a-1f38-8badbc8c967a@oracle.com>
Date: Wed, 2 Mar 2022 16:31:51 -0800
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
 Thunderbird/78.6.1
In-Reply-To: <bacae45c-9f8e-456b-1036-7f68e1e4374d@oracle.com>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: DS7PR03CA0206.namprd03.prod.outlook.com
 (2603:10b6:5:3b6::31) To BYAPR10MB2663.namprd10.prod.outlook.com
 (2603:10b6:a02:a9::20)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: a167a91b-32cd-475f-c16e-08d9fcad3855
X-MS-TrafficTypeDiagnostic: CY4PR10MB1541:EE_
X-Microsoft-Antispam-PRVS: 
	<CY4PR10MB15414B7A19106D114E265186F0049@CY4PR10MB1541.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	y3myXNqkmDa9+8lYQHagGpjMPUYOE+7DKM2aHMH3H8nGkYyK8PYHp2SYW24l1gYJIQLiWVh87zSMpEs+rdUzEl/q/rDXCbDKCzhmW7fv/8ZzJY0P8jQoqMczDHDdXdp0OjKoDKA3+7n2PmjgyTN91TBGN+BRfxeVzwR5z/uwiOzsae8yA/pJSOQtowI64e2rIMCXFbc2rcrwY0pS/F6wiUTehZI7Y0hzHDU/AyRqi7uiZPCdFFZVDVEWm7Mu4i5uZaQNmjW+hWhJYrsOMxrTY8ok1nt7zMqke46kGj88mu64Hr4mgqzv2uoNYsC9Lc88e3UBgxe+6JXHizSx4BUic2wqfdThAyeWyGiZAQ8v2TJPBfiL+g82UjxfBKk/ltnnchpZhnkpb6XCkRk8YQQvD7pbOhHQ29DToQId9IsXaTeDIjyfXAAEpD48RFwg3L+AriC7c+9Z0zhl+MeFf7N8O/M5jrsQn01WitAkwqEFUVn3XuXrmIfzwtWOSRXeaftBb/F9TprbbzPrRWNW03QsFu3CGpZuxxtXas4Gu4LyeEMNbv4uF8n//OY7LpDTFO+dErlg+0xu5q3K417jv7PaAxKCetNy7OIYYeE6MG8glHL+icZzoU7ZA+KicCV1FWLq6iRuYz5SiV+k3mYQ/LGD6I1n9+dPikX6IehQh5AVkNxZhSzUCANyzoB/wUdxfb5XYOCaLTkmI7ZZEE0arUxEJ8StwDAQgvaTrWZAX39rGI8=
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR10MB2663.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6666004)(2906002)(6512007)(38100700002)(53546011)(316002)(86362001)(6506007)(4326008)(8676002)(66556008)(66476007)(66946007)(44832011)(6486002)(5660300002)(31696002)(508600001)(8936002)(83380400001)(186003)(36756003)(2616005)(31686004)(107886003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?RzdZdGh6b2dIUGk0L2EyZmI2RHJmZHAzTE1nQ2RXRFoxMlgvbEFIeFF4R1hV?=
 =?utf-8?B?RzFTaHNLOE1xNlRXUHQyaG9wSmNjWDk5MDZRaWhCSElvVHZpbzRlaUpyNkFS?=
 =?utf-8?B?MFZQMHFKWXd2SjlvU1FoaWVQZGJMVS9KWVNpT3BDSnFOVlFEUEM4UmhZYml5?=
 =?utf-8?B?MzF4N0JHNzUybEd5TnVEc0RwY01IOHdscEZHWFBYTkd0cUQ3TFAvMGtzVC82?=
 =?utf-8?B?MHQ0ZzRITVhsckEveDRCRi9QejduZFlzeFpGVVA3aHNHYWRPTzd1QXlyT1hR?=
 =?utf-8?B?S1NPS2ovYWswRG1LZXVmNHNUVG5SUTBrQWNzNHd0SWNQMWk2S2hrNFhnMEpC?=
 =?utf-8?B?cVpSWW9UYXdTOGgrdkQ4U3NLTkNKY3JEYUdoYnpJWXVjMklEZ0VzV0xwY2xa?=
 =?utf-8?B?Sk9xNm9NdzJjWWIwb0JJREx3WTFsNjNLaTVvU3dxREczRkNBT00xZ2lLd3Bj?=
 =?utf-8?B?TDlrdmNtcDZuUjZmWUlKbkNtZmtzODA5c0czSnRRMzRBN2VOdmRiTFJ1SWNW?=
 =?utf-8?B?UTkzNVhMYm8rSlhhK3VFbllMNmwwTENhZzBTR2s3MDdmQlJqMURCaWpBeWpV?=
 =?utf-8?B?dzM2ZUpMNnNvTy9CU2hPS1hEaXp0ZzlaaXgvaHg3bXJYa3pZTWtlZkwraHlI?=
 =?utf-8?B?QXdsbjR0YXB0aHZ6YVJnSjZuVW55bzVoYms5T29nVkRXa1BNMExDZm5MeU41?=
 =?utf-8?B?UDhNSmxwR1luVTVsbmVsYldyT21VTllwb2VLQmZndUViOHZkOWRZWHZ3ZWFm?=
 =?utf-8?B?NW5hOG11cDIvdk04SkJqMk9vRUFGZ2RkRjJ3M3FOVVNBQjN6NFVQdGdnUGRN?=
 =?utf-8?B?eG5qTHAzNXN5dkl3c0k1aGpISDE1OXprSGpJZExxNW5OS3dpSXNQVmJQa1hr?=
 =?utf-8?B?SjRIRzJKRGQ3ZWRNeXFCa0s3ZG1oQWhOeTlHUlZTU3BMbVR1MWN5V1FNakxZ?=
 =?utf-8?B?QVBtclVMdVExWVJHcXA5TDhrbUVsRzhHOHdPMGVobVA0MllUcm96WThPWEJa?=
 =?utf-8?B?UnEwVUFoc3hSM2dMSFd0cHNKWU1odjJxRlJic0dGWXpneDBkeXpEODBKVU1W?=
 =?utf-8?B?YnlzcjlFVXZiRnVNRlROeW1nRHIydk9UUXNRdHRTN3BPZlpvR1gwdUxxMWIx?=
 =?utf-8?B?alBMNkRiWVEvU0dLYzRIMlhTelg4aVpxbFN5Nys3WGYzUWdyc2x5Q2ZCek1J?=
 =?utf-8?B?TFdmRjdocXVnZDlnRjI3aEFSZndpdmtVdUhITk9NZUVPL0xieE5ka0ExdVZt?=
 =?utf-8?B?cUpiQnk2dldxZUFta055Tkc2emVyS2FZMUEwWG9meXFjeC92WG52UnZlYlQw?=
 =?utf-8?B?RlhvbDhPcklJeGQ1dWRIdGNUZ2VMb3Y4bGNPVit0aGxMbVkzbEkvMXowa01Y?=
 =?utf-8?B?NmltN1hnb1JIcGJzaEVTSEIvUlVxVTM3VExwaVk5VEkzbFIydnowMTdKNjN2?=
 =?utf-8?B?V3Y5Wk9pOG9FWUdRT0F1MDlvUjJ1dmZSZTV4c1gxcHB1bG9JTU1NaTNRRGFm?=
 =?utf-8?B?NldIOUFtK2s2M0YxZHdWZkxxQ001ZHhtMXhKTWFHYzBYYm0rVHNESytEanZu?=
 =?utf-8?B?YTU5Ny9tOTBiRzFtbDVrMHdYWTgzMzZ3YjFwMmN2UElWZExxdUhHWldWSG5r?=
 =?utf-8?B?dHFYL1pqakxremVkVEV4OUR1N3FFSDYwYTFvQlprMUhFZVhBbHByejNMUi9M?=
 =?utf-8?B?dG1wWjBMYWlMU0QvbzhJamRJOG1yM1JlSlJ0VUgxa0NMaUdTeFFDYVBYWXVB?=
 =?utf-8?B?U0JTdm5kM3ppdmJOQWk4OG9EY1hBM0Y1MkkxYTJJbWNyZjhUdmxCQ0pwdTZR?=
 =?utf-8?B?SUJTOU9oWStHZk9lSEd1Zk5Cd3FxU3lwcGxIN202anZQVlhjQzhici90Rk1j?=
 =?utf-8?B?bDI0aUxtRUlDc1BhNFIwc004dHVEVklOMjF0VTQ3T250NEhLeUFYYk5nK2Nn?=
 =?utf-8?B?VkhHUENKRXJDYm90MUR5dks2TnZMZTM2UHkvMG03ZXN5M2ZmVDdUTk55SjZh?=
 =?utf-8?B?cUNtSkJEaGNSa0IwTzBLbWRpYXZ5ejB6czlHRkdhOTFwSnY2aU1QeFIwY2ZJ?=
 =?utf-8?B?MkhFdWhyVDJUem5hR09sZWV2ZFFqNDBNV1lNanlGTktOTzVrRkZnbm5PQXRD?=
 =?utf-8?B?ell1aVM5UTJPeVVSYmVqUU82aEtQL25zNXFJWWM1OFo1SXhxZ2pRMSticy8w?=
 =?utf-8?Q?lACELUOc5FlO9udYys3e6+8eEfvlEtF2MTrj7ego1HRl?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a167a91b-32cd-475f-c16e-08d9fcad3855
X-MS-Exchange-CrossTenant-AuthSource: BYAPR10MB2663.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 00:31:55.7759
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 82ogWqIU52jMnOI++7J/NYkGd8BouS7un0/Ay/OEGZzh5QmfGmqFpmS5iKp2gEOwEua1OrCR5qHoC7eJl+drSw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR10MB1541
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10274 signatures=686787
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 bulkscore=0 malwarescore=0
 mlxscore=0 phishscore=0 suspectscore=0 adultscore=0 mlxlogscore=999
 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2201110000
 definitions=main-2203030000
X-Proofpoint-GUID: 7Mx52FzyCmKMcO_eKudYMl6iPTCprjHJ
X-Proofpoint-ORIG-GUID: 7Mx52FzyCmKMcO_eKudYMl6iPTCprjHJ

Hi Boris,

On 3/2/22 4:20 PM, Boris Ostrovsky wrote:
> 
> On 3/2/22 11:40 AM, Dongli Zhang wrote:
>>   void __init xen_hvm_init_time_ops(void)
>>   {
>> +    static bool hvm_time_initialized;
>> +
>> +    if (hvm_time_initialized)
>> +        return;
>> +
>>       /*
>>        * vector callback is needed otherwise we cannot receive interrupts
>>        * on cpu > 0 and at this point we don't know how many cpus are
>>        * available.
>>        */
>>       if (!xen_have_vector_callback)
>> -        return;
>> +        goto exit;
> 
> 
> Why not just return? Do we expect the value of xen_have_vector_callback to change?

I just want to keep above sync with ....

> 
> 
> -boris
> 
> 
>>         if (!xen_feature(XENFEAT_hvm_safe_pvclock)) {
>>           pr_info("Xen doesn't support pvclock on HVM, disable pv timer");
>> +        goto exit;
>> +    }

... here.

That is, I want the main logic of xen_hvm_init_time_ops() to run for at most
once. Both of above two if statements will "go to exit".

Thank you very much!

Dongli Zhang

>> +
>> +    /*
>> +     * Only MAX_VIRT_CPUS 'vcpu_info' are embedded inside 'shared_info'.
>> +     * The __this_cpu_read(xen_vcpu) is still NULL when Xen HVM guest
>> +     * boots on vcpu >= MAX_VIRT_CPUS (e.g., kexec), To access
>> +     * __this_cpu_read(xen_vcpu) via xen_clocksource_read() will panic.
>> +     *
>> +     * The xen_hvm_init_time_ops() should be called again later after
>> +     * __this_cpu_read(xen_vcpu) is available.
>> +     */
>> +    if (!__this_cpu_read(xen_vcpu)) {
>> +        pr_info("Delay xen_init_time_common() as kernel is running on
>> vcpu=%d\n",
>> +            xen_vcpu_nr(0));
>>           return;
>>       }
>>   @@ -577,6 +597,9 @@ void __init xen_hvm_init_time_ops(void)
>>       x86_cpuinit.setup_percpu_clockev = xen_hvm_setup_cpu_clockevents;
>>         x86_platform.set_wallclock = xen_set_wallclock;
>> +
>> +exit:
>> +    hvm_time_initialized = true;
>>   }
>>   #endif
>>   


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 00:40:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 00:40:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282639.481421 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPZWW-0007OP-0p; Thu, 03 Mar 2022 00:40:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282639.481421; Thu, 03 Mar 2022 00:40:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPZWV-0007OI-TU; Thu, 03 Mar 2022 00:40:51 +0000
Received: by outflank-mailman (input) for mailman id 282639;
 Thu, 03 Mar 2022 00:40:51 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=++p5=TO=citrix.com=prvs=054f29298=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nPZWV-0007OC-1T
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 00:40:51 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 910642e1-9a8a-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 01:40:48 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 910642e1-9a8a-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646268048;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=3wDk5sjgceGIpGYWpd8sSIy5+b30C+/+xACaZX5XfAo=;
  b=UOqxcTXsRdtc3RiOXdQxbP+xjLGGWxeI7NeuthA+KYLVxn3ujrlQeRaY
   0y/hv6XTZHqxZ3Ba3Q9bl6SRBjR7DsOgIlt9VHNqpCKudx+02RZDNvZIR
   fAezV6LvZSp7m9cohGzTXgGCYe+zVJF3ArJCRnhgc7gbp6HRAChb66eJ6
   8=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 65355541
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:etSnw6CDt5MBOxVW/wrjw5YqxClBgxIJ4kV8jS/XYbTApGsn0zRSy
 zBOWmyGaaqCMWL2eot0PYXi8UxX657cx4U3QQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vh2NY06TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPh1z
 vBilLmLSjwbEbfLisRAaBZdNTtXaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguwKKsXxMZxZkXZn1TzDVt4tQIzZQrWM7thdtNs1rp4TRquDO
 pZAAdZpRCqbUjBMZBAdMb8zmuyHoCWmcSRYjU3A8MLb5ECMlVcsgdABKuH9eNOQQt5Otl2Fv
 W+A9GP8ajkWOtWQxjuC9nOEnfLUkGXwX4d6PJ+S++NugVaT7ncOExBQXly+ydGph0j7V99BJ
 kg8/is1sbN05EGtVsP6XRCzvDiDpBF0c8VUO/037keK0KW83uqCLjFaFHgbMoVg7ZJoA2xxv
 rOUoz/3LThplZK0bEmezYW7tzSgGXUuImokfwZRGGPp/OLfiI00ixvOSPNqH6i0ksD5FFnM/
 tyakMQtr+5N1JBWjs1X6XiC2mvx/caREmbZ8y2KBjrN0+9vWGKyi2VEA3D/5O0IEouWR0LpU
 JMsy5nHt7Bm4X1geUWwrAQx8FOBuq7t3N702wcH83wdG9KFoSTLkWd4umwWGauRGpxYEQIFm
 WeK0e+r2LddPWGxcYh8aJ+rBsIhwMDITIq5CKqIMIYfOccsLWdrGR2Cg2bKhQgBd2B2zMkC1
 WqzK57wXR7294w9pNZJewvt+eBynX1vrY8ibZv60w6mwdKjiI29Et843K+1Rrlhtsus+VyNm
 /4Gbpfi40gPAYXWP3iMmaZOfA9iEJTOLc2vwyChXrXYeVQO9aBII6K5/I7NjKQ+x/UFzrqTp
 yrlMqKaoXKm7UD6xcyxQigLQNvSsVxX9BrX4QRE0Y6U5kUe
IronPort-HdrOrdr: A9a23:ZD9e1qrazpyTbYVHTa/HV0oaV5oleYIsimQD101hICG8cqSj9v
 xG+85rsyMc6QxhP03I9urwW5VoLUmyyXcX2/h0AV7BZniFhILAFugLhuGOrwEIcxeOj9K1vp
 0BT0ERMrPN5CBB/KPH3DU=
X-IronPort-AV: E=Sophos;i="5.90,150,1643691600"; 
   d="scan'208";a="65355541"
From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Jan Beulich
	<JBeulich@suse.com>, =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?=
	<roger.pau@citrix.com>, Wei Liu <wl@xen.org>, Juergen Gross
	<jgross@suse.com>, Dario Faggioli <dfaggioli@suse.com>
Subject: [PATCH RFC] xen/sched: Optimise when only one scheduler is compiled in
Date: Thu, 3 Mar 2022 00:40:15 +0000
Message-ID: <20220303004015.17688-1-andrew.cooper3@citrix.com>
X-Mailer: git-send-email 2.11.0
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

When only one scheduler is compiled in, function pointers can be optimised to
direct calls, and the hooks hardened against controlflow hijacking.

RFC for several reasons.

1) There's an almost beautiful way of not introducing MAYBE_SCHED() and hiding
   the magic in REGISTER_SCHEDULER(), except it falls over
   https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91765 which has no comment or
   resolution at all.

2) A different alternative which almost works is to remove the indirection in
   .data.schedulers, but the singleton scheduler object can't be both there
   and in .init.rodata.cf_clobber.

3) I can't think of a way of build time check to enforce that new schedulers
   get added to the preprocessor magic.

And the blocker:
4) This isn't compatible with how sched_idle_ops get used for granularity > 1.

Suggestions very welcome.

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
---
CC: Jan Beulich <JBeulich@suse.com>
CC: Roger Pau Monné <roger.pau@citrix.com>
CC: Wei Liu <wl@xen.org>
CC: Juergen Gross <jgross@suse.com>
CC: Dario Faggioli <dfaggioli@suse.com>
---
 xen/common/sched/arinc653.c |  2 +-
 xen/common/sched/core.c     |  4 +-
 xen/common/sched/credit.c   |  2 +-
 xen/common/sched/credit2.c  |  2 +-
 xen/common/sched/null.c     |  2 +-
 xen/common/sched/private.h  | 91 ++++++++++++++++++++++++++++++++-------------
 xen/common/sched/rt.c       |  2 +-
 7 files changed, 72 insertions(+), 33 deletions(-)

diff --git a/xen/common/sched/arinc653.c b/xen/common/sched/arinc653.c
index a82c0d7314a1..73738b007e7d 100644
--- a/xen/common/sched/arinc653.c
+++ b/xen/common/sched/arinc653.c
@@ -694,7 +694,7 @@ a653sched_adjust_global(const struct scheduler *ops,
  * callback functions.
  * The symbol must be visible to the rest of Xen at link time.
  */
-static const struct scheduler sched_arinc653_def = {
+const struct scheduler MAYBE_SCHED(sched_arinc653_def) = {
     .name           = "ARINC 653 Scheduler",
     .opt_name       = "arinc653",
     .sched_id       = XEN_SCHEDULER_ARINC653,
diff --git a/xen/common/sched/core.c b/xen/common/sched/core.c
index 19ab67818106..020a5741ca31 100644
--- a/xen/common/sched/core.c
+++ b/xen/common/sched/core.c
@@ -2263,7 +2263,7 @@ static struct sched_unit *do_schedule(struct sched_unit *prev, s_time_t now,
     struct sched_unit *next;
 
     /* get policy-specific decision on scheduling... */
-    sched->do_schedule(sched, prev, now, sched_tasklet_check(cpu));
+    sched_vcall(sched, do_schedule, sched, prev, now, sched_tasklet_check(cpu));
 
     next = prev->next_task;
 
@@ -2975,7 +2975,7 @@ void __init scheduler_init(void)
 
 #undef sched_test_func
 
-        if ( schedulers[i]->global_init && schedulers[i]->global_init() < 0 )
+        if ( sched_global_init(schedulers[i]) < 0 )
         {
             printk("scheduler %s failed initialization, dropped\n",
                    schedulers[i]->opt_name);
diff --git a/xen/common/sched/credit.c b/xen/common/sched/credit.c
index 4d3bd8cba6fc..8b85e9617fc0 100644
--- a/xen/common/sched/credit.c
+++ b/xen/common/sched/credit.c
@@ -2230,7 +2230,7 @@ csched_deinit(struct scheduler *ops)
     }
 }
 
-static const struct scheduler sched_credit_def = {
+const struct scheduler MAYBE_SCHED(sched_credit_def) = {
     .name           = "SMP Credit Scheduler",
     .opt_name       = "credit",
     .sched_id       = XEN_SCHEDULER_CREDIT,
diff --git a/xen/common/sched/credit2.c b/xen/common/sched/credit2.c
index 0e3f89e5378e..fda3812d7ac1 100644
--- a/xen/common/sched/credit2.c
+++ b/xen/common/sched/credit2.c
@@ -4199,7 +4199,7 @@ csched2_deinit(struct scheduler *ops)
     xfree(prv);
 }
 
-static const struct scheduler sched_credit2_def = {
+const struct scheduler MAYBE_SCHED(sched_credit2_def) = {
     .name           = "SMP Credit Scheduler rev2",
     .opt_name       = "credit2",
     .sched_id       = XEN_SCHEDULER_CREDIT2,
diff --git a/xen/common/sched/null.c b/xen/common/sched/null.c
index 65a0a6c5312d..907a8ae1ca50 100644
--- a/xen/common/sched/null.c
+++ b/xen/common/sched/null.c
@@ -1025,7 +1025,7 @@ static void cf_check null_dump(const struct scheduler *ops)
     spin_unlock_irqrestore(&prv->lock, flags);
 }
 
-static const struct scheduler sched_null_def = {
+const struct scheduler MAYBE_SCHED(sched_null_def) = {
     .name           = "null Scheduler",
     .opt_name       = "null",
     .sched_id       = XEN_SCHEDULER_NULL,
diff --git a/xen/common/sched/private.h b/xen/common/sched/private.h
index a870320146ef..f3ba0101ecc7 100644
--- a/xen/common/sched/private.h
+++ b/xen/common/sched/private.h
@@ -271,6 +271,33 @@ static inline spinlock_t *pcpu_schedule_trylock(unsigned int cpu)
     return NULL;
 }
 
+#if 1 ==                                                                \
+    defined(CONFIG_SCHED_CREDIT) + defined(CONFIG_SCHED_CREDIT2) +      \
+    defined(CONFIG_SCHED_RTDS) + defined(CONFIG_SCHED_ARINC653) +       \
+    defined(CONFIG_SCHED_NULL)
+
+extern const struct scheduler sched_ops;
+#define MAYBE_SCHED(x) __initdata_cf_clobber sched_ops
+#define REGISTER_SCHEDULER(x) static const struct scheduler *x##_entry \
+  __used_section(".data.schedulers") = &sched_ops;
+
+#define sched_call(s, fn, ...) \
+    alternative_call(sched_ops.fn, ##__VA_ARGS__)
+
+#define sched_vcall(s, fn, ...) \
+    alternative_vcall(sched_ops.fn, ##__VA_ARGS__)
+
+#else
+
+#define MAYBE_SCHED(x) static x
+#define REGISTER_SCHEDULER(x) static const struct scheduler *x##_entry \
+  __used_section(".data.schedulers") = &x;
+
+#define sched_call(s, fn, ...)  (s)->fn(__VA_ARGS__)
+#define sched_vcall(s, fn, ...) (s)->fn(__VA_ARGS__)
+
+#endif
+
 struct scheduler {
     const char *name;       /* full name for this scheduler      */
     const char *opt_name;   /* option name for this scheduler    */
@@ -333,39 +360,48 @@ struct scheduler {
     void         (*dump_cpu_state) (const struct scheduler *, int);
 };
 
+static inline int sched_global_init(const struct scheduler *s)
+{
+    if ( s->global_init )
+        return sched_call(s, global_init);
+    return 0;
+}
+
 static inline int sched_init(struct scheduler *s)
 {
-    return s->init(s);
+    return sched_call(s, init, s);
 }
 
 static inline void sched_deinit(struct scheduler *s)
 {
-    s->deinit(s);
+    sched_vcall(s, deinit, s);
 }
 
 static inline spinlock_t *sched_switch_sched(struct scheduler *s,
                                              unsigned int cpu,
                                              void *pdata, void *vdata)
 {
-    return s->switch_sched(s, cpu, pdata, vdata);
+    return sched_call(s, switch_sched, s, cpu, pdata, vdata);
 }
 
 static inline void sched_dump_settings(const struct scheduler *s)
 {
     if ( s->dump_settings )
-        s->dump_settings(s);
+        sched_vcall(s, dump_settings, s);
 }
 
 static inline void sched_dump_cpu_state(const struct scheduler *s, int cpu)
 {
     if ( s->dump_cpu_state )
-        s->dump_cpu_state(s, cpu);
+        sched_vcall(s, dump_cpu_state, s, cpu);
 }
 
 static inline void *sched_alloc_domdata(const struct scheduler *s,
                                         struct domain *d)
 {
-    return s->alloc_domdata ? s->alloc_domdata(s, d) : NULL;
+    if ( s->alloc_domdata )
+        return sched_call(s, alloc_domdata, s, d);
+    return NULL;
 }
 
 static inline void sched_free_domdata(const struct scheduler *s,
@@ -373,12 +409,14 @@ static inline void sched_free_domdata(const struct scheduler *s,
 {
     ASSERT(s->free_domdata || !data);
     if ( s->free_domdata )
-        s->free_domdata(s, data);
+        sched_vcall(s, free_domdata, s, data);
 }
 
 static inline void *sched_alloc_pdata(const struct scheduler *s, int cpu)
 {
-    return s->alloc_pdata ? s->alloc_pdata(s, cpu) : NULL;
+    if ( s->alloc_pdata )
+        return sched_call(s, alloc_pdata, s, cpu);
+    return NULL;
 }
 
 static inline void sched_free_pdata(const struct scheduler *s, void *data,
@@ -386,74 +424,74 @@ static inline void sched_free_pdata(const struct scheduler *s, void *data,
 {
     ASSERT(s->free_pdata || !data);
     if ( s->free_pdata )
-        s->free_pdata(s, data, cpu);
+        sched_vcall(s, free_pdata, s, data, cpu);
 }
 
 static inline void sched_deinit_pdata(const struct scheduler *s, void *data,
                                       int cpu)
 {
     if ( s->deinit_pdata )
-        s->deinit_pdata(s, data, cpu);
+        sched_vcall(s, deinit_pdata, s, data, cpu);
 }
 
 static inline void *sched_alloc_udata(const struct scheduler *s,
                                       struct sched_unit *unit, void *dom_data)
 {
-    return s->alloc_udata(s, unit, dom_data);
+    return sched_call(s, alloc_udata, s, unit, dom_data);
 }
 
 static inline void sched_free_udata(const struct scheduler *s, void *data)
 {
-    s->free_udata(s, data);
+    sched_vcall(s, free_udata, s, data);
 }
 
 static inline void sched_insert_unit(const struct scheduler *s,
                                      struct sched_unit *unit)
 {
     if ( s->insert_unit )
-        s->insert_unit(s, unit);
+        sched_vcall(s, insert_unit, s, unit);
 }
 
 static inline void sched_remove_unit(const struct scheduler *s,
                                      struct sched_unit *unit)
 {
     if ( s->remove_unit )
-        s->remove_unit(s, unit);
+        sched_vcall(s, remove_unit, s, unit);
 }
 
 static inline void sched_sleep(const struct scheduler *s,
                                struct sched_unit *unit)
 {
     if ( s->sleep )
-        s->sleep(s, unit);
+        sched_vcall(s, sleep, s, unit);
 }
 
 static inline void sched_wake(const struct scheduler *s,
                               struct sched_unit *unit)
 {
     if ( s->wake )
-        s->wake(s, unit);
+        sched_vcall(s, wake, s, unit);
 }
 
 static inline void sched_yield(const struct scheduler *s,
                                struct sched_unit *unit)
 {
     if ( s->yield )
-        s->yield(s, unit);
+        sched_vcall(s, yield, s, unit);
 }
 
 static inline void sched_context_saved(const struct scheduler *s,
                                        struct sched_unit *unit)
 {
     if ( s->context_saved )
-        s->context_saved(s, unit);
+        sched_vcall(s, context_saved, s, unit);
 }
 
 static inline void sched_migrate(const struct scheduler *s,
                                  struct sched_unit *unit, unsigned int cpu)
 {
     if ( s->migrate )
-        s->migrate(s, unit, cpu);
+        sched_vcall(s, migrate, s, unit, cpu);
     else
         sched_set_res(unit, get_sched_res(cpu));
 }
@@ -461,7 +499,7 @@ static inline void sched_migrate(const struct scheduler *s,
 static inline struct sched_resource *sched_pick_resource(
     const struct scheduler *s, const struct sched_unit *unit)
 {
-    return s->pick_resource(s, unit);
+    return sched_call(s, pick_resource, s, unit);
 }
 
 static inline void sched_adjust_affinity(const struct scheduler *s,
@@ -470,19 +508,23 @@ static inline void sched_adjust_affinity(const struct scheduler *s,
                                          const cpumask_t *soft)
 {
     if ( s->adjust_affinity )
-        s->adjust_affinity(s, unit, hard, soft);
+        sched_vcall(s, adjust_affinity, s, unit, hard, soft);
 }
 
 static inline int sched_adjust_dom(const struct scheduler *s, struct domain *d,
                                    struct xen_domctl_scheduler_op *op)
 {
-    return s->adjust ? s->adjust(s, d, op) : 0;
+    if ( s->adjust )
+        return sched_call(s, adjust, s, d, op);
+    return 0;
 }
 
 static inline int sched_adjust_cpupool(const struct scheduler *s,
                                        struct xen_sysctl_scheduler_op *op)
 {
-    return s->adjust_global ? s->adjust_global(s, op) : 0;
+    if ( s->adjust_global )
+        return sched_call(s, adjust_global, s, op);
+    return 0;
 }
 
 static inline void sched_unit_pause_nosync(const struct sched_unit *unit)
@@ -501,9 +543,6 @@ static inline void sched_unit_unpause(const struct sched_unit *unit)
         vcpu_unpause(v);
 }
 
-#define REGISTER_SCHEDULER(x) static const struct scheduler *x##_entry \
-  __used_section(".data.schedulers") = &x;
-
 struct cpupool
 {
     unsigned int     cpupool_id;
diff --git a/xen/common/sched/rt.c b/xen/common/sched/rt.c
index d6de25531b3c..9b42852b2de5 100644
--- a/xen/common/sched/rt.c
+++ b/xen/common/sched/rt.c
@@ -1529,7 +1529,7 @@ static void cf_check repl_timer_handler(void *data)
     spin_unlock_irq(&prv->lock);
 }
 
-static const struct scheduler sched_rtds_def = {
+const struct scheduler MAYBE_SCHED(sched_rtds_def) = {
     .name           = "SMP RTDS Scheduler",
     .opt_name       = "rtds",
     .sched_id       = XEN_SCHEDULER_RTDS,
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 01:06:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 01:06:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282648.481432 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPZum-00047M-6O; Thu, 03 Mar 2022 01:05:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282648.481432; Thu, 03 Mar 2022 01:05:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPZul-00046v-Uf; Thu, 03 Mar 2022 01:05:55 +0000
Received: by outflank-mailman (input) for mailman id 282648;
 Thu, 03 Mar 2022 01:05:54 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=HbtR=TO=arm.com=Wei.Chen@srs-se1.protection.inumbo.net>)
 id 1nPZuk-00046p-DL
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 01:05:54 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05on20631.outbound.protection.outlook.com
 [2a01:111:f400:7e1a::631])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 11377db3-9a8e-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 02:05:51 +0100 (CET)
Received: from AS9PR04CA0045.eurprd04.prod.outlook.com (2603:10a6:20b:46a::15)
 by AM6PR08MB4023.eurprd08.prod.outlook.com (2603:10a6:20b:a6::11)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Thu, 3 Mar
 2022 01:05:49 +0000
Received: from VE1EUR03FT012.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:46a:cafe::2e) by AS9PR04CA0045.outlook.office365.com
 (2603:10a6:20b:46a::15) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Thu, 3 Mar 2022 01:05:48 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT012.mail.protection.outlook.com (10.152.18.211) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Thu, 3 Mar 2022 01:05:48 +0000
Received: ("Tessian outbound 63bb5eb69ee8:v113");
 Thu, 03 Mar 2022 01:05:48 +0000
Received: from 88c9726fdbe2.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 9875AD53-326C-4885-980F-8AF02F8EFAA1.1; 
 Thu, 03 Mar 2022 01:05:42 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 88c9726fdbe2.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 03 Mar 2022 01:05:42 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com (2603:10a6:102:2b9::9)
 by AM0PR08MB4339.eurprd08.prod.outlook.com (2603:10a6:208:142::10)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 01:05:40 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa]) by PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa%4]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 01:05:39 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 11377db3-9a8e-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=7RTWfZctXhAoa06mMdMsSAwm5WCA7tHVDO1sXwXRxRo=;
 b=eVJoRjvFp1ebH5VodMZbV/HsjzT2cFjIYZvqUgPsh8udpTHVBj0JDujHMzrFza7+okmCQ/CMbdxO1eb60x5LmzWyA6N7H20jX+jcMnoBdwfp+1u1DCYQYR3YhMD0/LUtNiYrVUR5ER+pXYJy9VqXxoMPfd9W5Z+f0Vdka7vj7Hs=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=L7GQwkWNRKumhGvPk4YbZ0ELjyrwd/wxmQimaRGXhSQnrr+uvbWQWFSBIWaBcpaubkNq6o84X6uKo87DpC1fCUPOpQuKSlUW/56OOkjGPa+KcOpLOIgO3YuyXQ97asGaer4FM/XDKmliVteMVGQHett0xLP+J+w/Lh/HY482ZI6wPpc2tRSWiJwvMKgo9ssprlsiCR7A8HNcVqvDW2SxTk6uPvoxNFRSzMXRHkQ8qnLiopSeFiTVArHE6eJBhN0fQycE4P939lzGtaBSzZAtN5qQwaJjkWqAd4YCrAOe8EZe5cH4D/wE5ayTLXF2XFtX9RO4fd8p6TGsbnE8U5oivw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=7RTWfZctXhAoa06mMdMsSAwm5WCA7tHVDO1sXwXRxRo=;
 b=nNgByuHo/QuJtgDbVfALyinqSHBbWy14p89NBi2P8ody7kIqBRWXloNEZGpNJxnjImWxd7DiwhFPbbL70Qbv/cnSz/ayAEChUfwCnusM2YRjMTZgEQwBhps85I3EDv58ne5vJPnvfAFksEzJOfwHY0Sknfj7LsYzy2K2WJceXd8agos2o+2/s/ryHHr5n4yaQHZJ+ojs2cfT5pMJ+evET65j0+TYvSgDJvaeju982MwUIegsG/zAjNZwBW+//61VxNbl4thuxg5YMboHCZpYhiwj4iH2npyLVLAFxOzCuMwX9NTJnidAnskbY/x+FJHcZsGdc2J3islbXmfd9eUrnw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=7RTWfZctXhAoa06mMdMsSAwm5WCA7tHVDO1sXwXRxRo=;
 b=eVJoRjvFp1ebH5VodMZbV/HsjzT2cFjIYZvqUgPsh8udpTHVBj0JDujHMzrFza7+okmCQ/CMbdxO1eb60x5LmzWyA6N7H20jX+jcMnoBdwfp+1u1DCYQYR3YhMD0/LUtNiYrVUR5ER+pXYJy9VqXxoMPfd9W5Z+f0Vdka7vj7Hs=
From: Wei Chen <Wei.Chen@arm.com>
To: Stefano Stabellini <sstabellini@kernel.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	"julien@xen.org" <julien@xen.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, Penny Zheng <Penny.Zheng@arm.com>, Henry Wang
	<Henry.Wang@arm.com>, nd <nd@arm.com>
Subject: RE: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Topic: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Index:
 AdgpQxtXwh7LkfydTgiYk9bhMgU+ogAn0mUAABEK2UAAHxozAACs/mTQABukuQAADud+gAAh4EYAAARjx9A=
Date: Thu, 3 Mar 2022 01:05:38 +0000
Message-ID:
 <PAXPR08MB742017360AAF65AC2CCB1DF49E049@PAXPR08MB7420.eurprd08.prod.outlook.com>
References:
 <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2202241606450.239973@ubuntu-linux-20-04-desktop>
 <AS1PR08MB74269923288B75097392BDD99E3E9@AS1PR08MB7426.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2202251214210.239973@ubuntu-linux-20-04-desktop>
 <PAXPR08MB742081D5E3C94801350C4A739E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2203011455500.3261@ubuntu-linux-20-04-desktop>
 <PAXPR08MB74201779FC92E734A5107B769E039@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2203021454090.3261@ubuntu-linux-20-04-desktop>
In-Reply-To:
 <alpine.DEB.2.22.394.2203021454090.3261@ubuntu-linux-20-04-desktop>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 5F30937351ED27478F2F62DFDCB73C5F.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 7e829b67-e16c-464c-9c0a-08d9fcb1f42a
x-ms-traffictypediagnostic:
	AM0PR08MB4339:EE_|VE1EUR03FT012:EE_|AM6PR08MB4023:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR08MB402355108A154FBE0DDC08019E049@AM6PR08MB4023.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAXPR08MB7420.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(8936002)(52536014)(5660300002)(38100700002)(186003)(122000001)(4326008)(55016003)(8676002)(2906002)(66946007)(76116006)(66476007)(66556008)(66446008)(64756008)(26005)(53546011)(6506007)(7696005)(83380400001)(316002)(38070700005)(86362001)(6916009)(54906003)(71200400001)(9686003)(33656002)(508600001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB4339
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT012.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	9e3c3d70-6073-41f8-31a6-08d9fcb1eef8
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(53546011)(9686003)(356005)(81166007)(336012)(7696005)(6506007)(47076005)(36860700001)(2906002)(40460700003)(186003)(33656002)(26005)(82310400004)(5660300002)(70206006)(70586007)(52536014)(8676002)(4326008)(6862004)(86362001)(55016003)(508600001)(8936002)(83380400001)(54906003)(316002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 01:05:48.4073
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 7e829b67-e16c-464c-9c0a-08d9fcb1f42a
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT012.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4023

SGkgU3RlZmFubywNCg0KPiAtLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0KPiBGcm9tOiBTdGVm
YW5vIFN0YWJlbGxpbmkgPHNzdGFiZWxsaW5pQGtlcm5lbC5vcmc+DQo+IFNlbnQ6IDIwMjLlubQz
5pyIM+aXpSA2OjU2DQo+IFRvOiBXZWkgQ2hlbiA8V2VpLkNoZW5AYXJtLmNvbT4NCj4gQ2M6IFN0
ZWZhbm8gU3RhYmVsbGluaSA8c3N0YWJlbGxpbmlAa2VybmVsLm9yZz47IHhlbi0NCj4gZGV2ZWxA
bGlzdHMueGVucHJvamVjdC5vcmc7IGp1bGllbkB4ZW4ub3JnOyBCZXJ0cmFuZCBNYXJxdWlzDQo+
IDxCZXJ0cmFuZC5NYXJxdWlzQGFybS5jb20+OyBQZW5ueSBaaGVuZyA8UGVubnkuWmhlbmdAYXJt
LmNvbT47IEhlbnJ5IFdhbmcNCj4gPEhlbnJ5LldhbmdAYXJtLmNvbT47IG5kIDxuZEBhcm0uY29t
Pg0KPiBTdWJqZWN0OiBSRTogUHJvcG9zYWwgZm9yIFBvcnRpbmcgWGVuIHRvIEFybXY4LVI2NCAt
IERyYWZ0QQ0KPiANCj4gT24gV2VkLCAyIE1hciAyMDIyLCBXZWkgQ2hlbiB3cm90ZToNCj4gPiA+
ID4gPiA+ID4gSWYgbm90LCBhbmQgY29uc2lkZXJpbmcgdGhhdCB3ZSBoYXZlIHRvIGdlbmVyYXRl
DQo+ID4gPiA+ID4gPiA+IEFSTV9NUFVfKl9NRU1PUllfU1RBUlQvRU5EIGFueXdheSBhdCBidWls
ZCB0aW1lLCB3b3VsZCBpdCBtYWtlDQo+ID4gPiBzZW5zZQ0KPiA+ID4gPiA+IHRvDQo+ID4gPiA+
ID4gPiA+IGFsc28gZ2VuZXJhdGUgbXB1LGd1ZXN0LW1lbW9yeS1zZWN0aW9uLCB4ZW4sc3RhdGlj
LW1lbSwgZXRjLg0KPiBhdA0KPiA+ID4gYnVpbGQNCj4gPiA+ID4gPiA+ID4gdGltZSByYXRoZXIg
dGhhbiBwYXNzaW5nIGl0IHZpYSBkZXZpY2UgdHJlZSB0byBYZW4gYXQgcnVudGltZT8NCj4gPiA+
ID4gPiA+ID4NCj4gPiA+ID4gPiA+DQo+ID4gPiA+ID4gPiBEaWQgeW91IG1lYW4gd2Ugc3RpbGwg
YWRkIHRoZXNlIGluZm9ybWF0aW9uIGluIGRldmljZSB0cmVlLCBidXQNCj4gZm9yDQo+ID4gPiA+
ID4gYnVpbGQNCj4gPiA+ID4gPiA+IHRpbWUgb25seS4gSW4gcnVudGltZSB3ZSBkb24ndCBwYXJz
ZSB0aGVtPw0KPiA+ID4gPiA+DQo+ID4gPiA+ID4gWWVzLCBzb21ldGhpbmcgbGlrZSB0aGF0LCBi
dXQgc2VlIGJlbG93Lg0KPiA+ID4gPiA+DQo+ID4gPiA+ID4NCj4gPiA+ID4gPiA+ID4gV2hhdCdz
IHRoZSB2YWx1ZSBvZiBkb2luZyBBUk1fTVBVXypfTUVNT1JZX1NUQVJUL0VORCBhdCBidWlsZA0K
PiB0aW1lDQo+ID4gPiBhbmQNCj4gPiA+ID4gPiA+ID4gZXZlcnl0aGluZyBlbHNlIGF0IHJ1bnRp
bWU/DQo+ID4gPiA+ID4gPg0KPiA+ID4gPiA+ID4gQVJNX01QVV8qX01FTU9SWV9TVEFSVC9FTkQg
aXMgZGVmaW5lZCBieSBwbGF0Zm9ybS4gQnV0IG90aGVyDQo+IHRoaW5ncw0KPiA+ID4gYXJlDQo+
ID4gPiA+ID4gPiB1c2VycyBjdXN0b21pemVkLiBUaGV5IGNhbiBjaGFuZ2UgdGhlaXIgdXNhZ2Ug
d2l0aG91dCByZWJ1aWxkDQo+IHRoZQ0KPiA+ID4gaW1hZ2UuDQo+ID4gPiA+ID4NCj4gPiA+ID4g
PiBHb29kIHBvaW50Lg0KPiA+ID4gPiA+DQo+ID4gPiA+ID4gV2UgZG9uJ3Qgd2FudCB0byBoYXZl
IHRvIHJlYnVpbGQgWGVuIGlmIHRoZSB1c2VyIHVwZGF0ZWQgYSBndWVzdA0KPiA+ID4ga2VybmVs
LA0KPiA+ID4gPiA+IHJlc3VsdGluZyBpbiBhIGxhcmdlciBib290LW1vZHVsZS1zZWN0aW9uLg0K
PiA+ID4gPiA+DQo+ID4gPiA+ID4gU28gSSB0aGluayBpdCBtYWtlcyBzZW5zZSB0aGF0ICJtcHUs
Ym9vdC1tb2R1bGUtc2VjdGlvbiIgaXMNCj4gZ2VuZXJhdGVkDQo+ID4gPiBieQ0KPiA+ID4gPiA+
IHRoZSBzY3JpcHRzIChlLmcuIEltYWdlQnVpbGRlcikgYXQgYnVpbGQgdGltZSwgYW5kIFhlbiBy
ZWFkcyB0aGUNCj4gPiA+ID4gPiBwcm9wZXJ0eSBhdCBib290IGZyb20gdGhlIHJ1bnRpbWUgZGV2
aWNlIHRyZWUuDQo+ID4gPiA+ID4NCj4gPiA+ID4gPiBJIHRoaW5rIHdlIG5lZWQgdG8gZGl2aWRl
IHRoZSBpbmZvcm1hdGlvbiBpbnRvIHR3byBncm91cHM6DQo+ID4gPiA+ID4NCj4gPiA+ID4gPg0K
PiA+ID4gPiA+ICMgR3JvdXAxOiBib2FyZCBpbmZvDQo+ID4gPiA+ID4NCj4gPiA+ID4gPiBUaGlz
IGluZm9ybWF0aW9uIGlzIHBsYXRmb3JtIHNwZWNpZmljIGFuZCBpdCBpcyBub3QgbWVhbnQgdG8N
Cj4gY2hhbmdlDQo+ID4gPiA+ID4gZGVwZW5kaW5nIG9uIHRoZSBWTSBjb25maWd1cmF0aW9uLiBJ
ZGVhbGx5LCB3ZSBidWlsZCBYZW4gZm9yIGENCj4gPiA+IHBsYXRmb3JtDQo+ID4gPiA+ID4gb25j
ZSwgdGhlbiB3ZSBjYW4gdXNlIHRoZSBzYW1lIFhlbiBiaW5hcnkgdG9nZXRoZXIgd2l0aCBhbnkN
Cj4gPiA+IGNvbWJpbmF0aW9uDQo+ID4gPiA+ID4gb2YgZG9tMC9kb21VIGtlcm5lbHMgYW5kIHJh
bWRpc2tzLg0KPiA+ID4gPiA+DQo+ID4gPiA+ID4gVGhpcyBraW5kIG9mIGluZm9ybWF0aW9uIGRv
ZXNuJ3QgbmVlZCB0byBiZSBleHBvc2VkIHRvIHRoZSBydW50aW1lDQo+ID4gPiA+ID4gZGV2aWNl
IHRyZWUuIEJ1dCB3ZSBjYW4gc3RpbGwgdXNlIGEgYnVpbGQtdGltZSBkZXZpY2UgdHJlZSB0bw0K
PiBnZW5lcmF0ZQ0KPiA+ID4gPiA+IHRoZSBhZGRyZXNzZXMgaWYgaXQgaXMgY29udmVuaWVudC4N
Cj4gPiA+ID4gPg0KPiA+ID4gPiA+IFhFTl9TVEFSVF9BRERSRVNTLCBBUk1fTVBVX0RFVklDRV9N
RU1PUllfKiwgYW5kDQo+ID4gPiBBUk1fTVBVX05PUk1BTF9NRU1PUllfKg0KPiA+ID4gPiA+IHNl
ZW0gdG8gYmUgcGFydCBvZiB0aGlzIGdyb3VwLg0KPiA+ID4gPiA+DQo+ID4gPiA+DQo+ID4gPiA+
IFllcy4NCj4gPiA+ID4NCj4gPiA+ID4gPg0KPiA+ID4gPiA+ICMgR3JvdXAyOiBib290IGNvbmZp
Z3VyYXRpb24NCj4gPiA+ID4gPg0KPiA+ID4gPiA+IFRoaXMgaW5mb3JtYXRpb24gaXMgYWJvdXQg
dGhlIHNwZWNpZmljIHNldCBvZiBiaW5hcmllcyBhbmQgVk1zDQo+IHRoYXQgd2UNCj4gPiA+ID4g
PiBuZWVkIHRvIGJvb3QuIEl0IGlzIGNvbmNlcHR1YWxseSBzaW1pbGFyIHRvIHRoZSBkb20wbGVz
cyBkZXZpY2UNCj4gdHJlZQ0KPiA+ID4gPiA+IG5vZGVzIHRoYXQgd2UgYWxyZWFkeSBoYXZlLiBJ
ZiB3ZSBjaGFuZ2Ugb25lIG9mIHRoZSBWTSBiaW5hcmllcywNCj4gd2UNCj4gPiA+ID4gPiBsaWtl
bHkgaGF2ZSB0byByZWZyZXNoIHRoZSBpbmZvcm1hdGlvbiBoZXJlLg0KPiA+ID4gPiA+DQo+ID4g
PiA+ID4gIm1wdSxib290LW1vZHVsZS1zZWN0aW9uIiBwcm9iYWJseSBiZWxvbmdzIHRvIHRoaXMg
Z3JvdXAgKHVubGVzcw0KPiB3ZQ0KPiA+ID4gZmluZA0KPiA+ID4gPiA+IGEgd2F5IHRvIGRlZmlu
ZSAibXB1LGJvb3QtbW9kdWxlLXNlY3Rpb24iIGdlbmVyaWNhbGx5IHNvIHRoYXQgd2UNCj4gZG9u
J3QNCj4gPiA+ID4gPiBuZWVkIHRvIGNoYW5nZSBpdCBhbnkgdGltZSB0aGUgc2V0IG9mIGJvb3Qg
bW9kdWxlcyBjaGFuZ2UuKQ0KPiA+ID4gPiA+DQo+ID4gPiA+ID4NCj4gPiA+ID4NCj4gPiA+ID4g
SSBhZ3JlZS4NCj4gPiA+ID4NCj4gPiA+ID4gPiA+ID4gSXQgbG9va3MgbGlrZSB3ZSBhcmUgZm9y
Y2VkIHRvIGhhdmUgdGhlIHNlY3Rpb25zIGRlZmluaXRpb25zDQo+IGF0DQo+ID4gPiBidWlsZA0K
PiA+ID4gPiA+ID4gPiB0aW1lIGJlY2F1c2Ugd2UgbmVlZCB0aGVtIGJlZm9yZSB3ZSBjYW4gcGFy
c2UgZGV2aWNlIHRyZWUuIEluDQo+IHRoYXQNCj4gPiA+ID4gPiBjYXNlLA0KPiA+ID4gPiA+ID4g
PiB3ZSBtaWdodCBhcyB3ZWxsIGRlZmluZSBhbGwgdGhlIHNlY3Rpb25zIGF0IGJ1aWxkIHRpbWUu
DQo+ID4gPiA+ID4gPiA+DQo+ID4gPiA+ID4gPiA+IEJ1dCBJIHRoaW5rIGl0IHdvdWxkIGJlIGV2
ZW4gYmV0dGVyIGlmIFhlbiBjb3VsZCBhdXRvbWF0aWNhbGx5DQo+ID4gPiBjaG9vc2UNCj4gPiA+
ID4gPiA+ID4geGVuLHN0YXRpYy1tZW0sIG1wdSxndWVzdC1tZW1vcnktc2VjdGlvbiwgZXRjLiBv
biBpdHMgb3duDQo+IGJhc2VkIG9uDQo+ID4gPiB0aGUNCj4gPiA+ID4gPiA+ID4gcmVndWxhciBk
ZXZpY2UgdHJlZSBpbmZvcm1hdGlvbiAoL21lbW9yeSwgL2FtYmEsIGV0Yy4pLA0KPiB3aXRob3V0
DQo+ID4gPiBhbnkNCj4gPiA+ID4gPiBuZWVkDQo+ID4gPiA+ID4gPiA+IGZvciBleHBsaWNpdGx5
IGRlc2NyaWJpbmcgZWFjaCByYW5nZSB3aXRoIHRoZXNlIG5ldyBwcm9wZXJ0aWVzLg0KPiA+ID4g
PiA+ID4gPg0KPiA+ID4gPiA+ID4NCj4gPiA+ID4gPiA+IGZvciBtcHUsZ3Vlc3QtbWVtb3J5LXNl
Y3Rpb24sIHdpdGggdGhlIGxpbWl0YXRpb25zOiBubyBvdGhlcg0KPiB1c2FnZQ0KPiA+ID4gPiA+
IGJldHdlZW4NCj4gPiA+ID4gPiA+IGRpZmZlcmVudCBndWVzdCcgbWVtb3J5IG5vZGVzLCB0aGlz
IGlzIE9LLiBCdXQgZm9yIHhlbixzdGF0aWMtDQo+IG1lbQ0KPiA+ID4gKGhlYXApLA0KPiA+ID4g
PiA+ID4gd2UganVzdCB3YW50IGV2ZXJ5dGhpbmcgb24gYSBNUFUgc3lzdGVtIGlzIGRlcnRlcm1p
c3RpYy4gQnV0LCBvZg0KPiA+ID4gY291cnNlDQo+ID4gPiA+ID4gWGVuDQo+ID4gPiA+ID4gPiBj
YW4gc2VsZWN0IGxlZnQgbWVtb3J5IGZvciBoZWFwIHdpdGhvdXQgc3RhdGljLW1lbS4NCj4gPiA+
ID4gPg0KPiA+ID4gPiA+IEl0IGlzIGdvb2QgdGhhdCB5b3UgdGhpbmsgdGhleSBjYW4gYmUgY2hv
c2VuIGJ5IFhlbi4NCj4gPiA+ID4gPg0KPiA+ID4gPiA+IERpZmZlcmVudGx5IGZyb20gImJvb3Qt
bW9kdWxlLXNlY3Rpb24iLCB3aGljaCBoYXMgdG8gZG8gd2l0aCB0aGUNCj4gYm9vdA0KPiA+ID4g
PiA+IG1vZHVsZXMgc2VsZWN0ZWQgYnkgdGhlIHVzZXIgZm9yIGEgc3BlY2lmaWMgZXhlY3V0aW9u
LA0KPiA+ID4gPiA+IGd1ZXN0LW1lbW9yeS1zZWN0aW9uIGFuZCBzdGF0aWMtbWVtIGFyZSBYZW4g
c3BlY2lmaWMgbWVtb3J5DQo+ID4gPiA+ID4gcG9saWNpZXMvYWxsb2NhdGlvbnMuDQo+ID4gPiA+
ID4NCj4gPiA+ID4gPiBBIHVzZXIgd291bGRuJ3Qga25vdyBob3cgdG8gZmlsbCB0aGVtIGluLiBB
bmQgSSB3b3JyeSB0aGF0IGV2ZW4gYQ0KPiA+ID4gc2NyaXB0DQo+ID4gPiA+DQo+ID4gPiA+IEJ1
dCB1c2VycyBzaG91bGQga25vdyBpdCwgYmVjYXVzZSBzdGF0aWMtbWVtIGZvciBndWVzdCBtdXN0
IGJlDQo+IGFsbG9jYXRlZA0KPiA+ID4gPiBpbiB0aGlzIHJhbmdlLiBBbmQgdXNlcnMgdGFrZSB0
aGUgcmVzcG9uc2liaWxpdHkgdG8gc2V0IHRoZSBEb21VJ3MNCj4gPiA+ID4gc3RhdGljIGFsbG9j
YXRlIG1lbW9yeSByYW5nZXMuDQo+ID4gPg0KPiA+ID4gTGV0IG1lIHByZW1pc2UgdGhhdCBteSBn
b2FsIGlzIHRvIGF2b2lkIGhhdmluZyBtYW55IHVzZXJzIHJlcG9ydGluZw0KPiA+ID4gZXJyb3Jz
IHRvIHhlbi1kZXZlbCBhbmQgeGVuLXVzZXJzIHdoZW4gYWN0dWFsbHkgaXQgaXMganVzdCBhIHdy
b25nDQo+ID4gPiBjaG9pY2Ugb2YgYWRkcmVzc2VzLg0KPiA+ID4NCj4gPiA+IEkgdGhpbmsgd2Ug
bmVlZCB0byBtYWtlIGEgZGlzdGluY3Rpb24gYmV0d2VlbiBhZGRyZXNzZXMgZm9yIHRoZSBib290
DQo+ID4gPiBtb2R1bGVzLCBlLmcuIGFkZHJlc3NlcyB3aGVyZSB0byBsb2FkIHhlbiwgdGhlIGRv
bTAvVSBrZXJuZWwsIGRvbTAvVQ0KPiA+ID4gcmFtZGlzayBpbiBtZW1vcnkgYXQgYm9vdCB0aW1l
LCBhbmQgVk0gc3RhdGljIG1lbW9yeSBhZGRyZXNzZXMuDQo+ID4gPg0KPiA+ID4gVGhlIGJvb3Qg
bW9kdWxlcyBhZGRyZXNzZXMgYXJlIHBhcnRpY3VsYXJseSBkaWZmaWN1bHQgdG8gZmlsbCBpbg0K
PiBiZWNhdXNlDQo+ID4gPiB0aGV5IGFyZSBtYW55IGFuZCBhIHNtYWxsIHVwZGF0ZSBpbiBvbmUg
b2YgdGhlIG1vZHVsZXMgY291bGQNCj4gaW52YWxpZGF0ZQ0KPiA+ID4gYWxsIHRoZSBvdGhlciBh
ZGRyZXNzZXMuIFRoaXMgaXMgd2h5IEkgZW5kZWQgdXAgd3JpdGluZyBJbWFnZUJ1aWxkZXIuDQo+
ID4gPiBTaW5jZSB0aGVtLCBJIHJlY2VpdmVkIHNldmVyYWwgZW1haWxzIGZyb20gdXNlcnMgdGhh
bmtpbmcgbWUgZm9yDQo+ID4gPiBJbWFnZUJ1aWxkZXIgOi0pDQo+ID4gPg0KPiA+DQo+ID4gVGhh
bmtzICs5OTkg8J+Yig0KPiA+DQo+ID4NCj4gPiA+IFRoZSBzdGF0aWMgVk0gbWVtb3J5IGFkZHJl
c3NlcyAoeGVuLHN0YXRpYy1tZW0pIHNob3VsZCBiZSBhIGJpdCBlYXNpZXINCj4gPiA+IHRvIGZp
bGwgaW4gY29ycmVjdGx5LiBUaGV5IGFyZSBtZWFudCB0byBiZSBjaG9zZW4gb25jZSwgYW5kIGl0
DQo+IHNob3VsZG4ndA0KPiA+ID4gaGFwcGVuIHRoYXQgYW4gdXBkYXRlIG9uIGEga2VybmVsIGZv
cmNlcyB0aGUgdXNlciB0byBjaGFuZ2UgYWxsIHRoZSBWTQ0KPiA+ID4gc3RhdGljIG1lbW9yeSBh
ZGRyZXNzZXMuIEFsc28sIEkga25vdyB0aGF0IHNvbWUgdXNlcnMgYWN0dWFsbHkgd2FudCB0bw0K
PiA+ID4gYmUgYWJsZSB0byBjaG9vc2UgdGhlIGRvbVUgYWRkcmVzc2VzIGJ5IGhhbmQgYmVjYXVz
ZSB0aGV5IGhhdmUNCj4gc3BlY2lmaWMNCj4gPiA+IG5lZWRzLiBTbyBpdCBpcyBnb29kIHRoYXQg
d2UgY2FuIGxldCB0aGUgdXNlciBjaG9vc2UgdGhlIGFkZHJlc3NlcyBpZg0KPiA+ID4gdGhleSB3
YW50IHRvLg0KPiA+ID4NCj4gPg0KPiA+IFllcy4NCj4gPg0KPiA+ID4gV2l0aCBhbGwgb2YgdGhh
dCBzYWlkLCBJIGRvIHRoaW5rIHRoYXQgbWFueSB1c2VycyB3b24ndCBoYXZlIGFuDQo+IG9waW5p
b24NCj4gPiA+IG9uIHRoZSBWTSBzdGF0aWMgbWVtb3J5IGFkZHJlc3NlcyBhbmQgd29uJ3Qga25v
dyBob3cgdG8gY2hvb3NlIHRoZW0uDQo+ID4gPiBJdCB3b3VsZCBiZSBlcnJvciBwcm9uZSB0byBs
ZXQgdGhlbSB0cnkgdG8gZmlsbCB0aGVtIGluIGJ5IGhhbmQuIFNvIEkNCj4gPiA+IHdhcyBhbHJl
YWR5IHBsYW5uaW5nIG9uIGFkZGluZyBzdXBwb3J0IHRvIEltYWdlQnVpbGRlciB0bw0KPiBhdXRv
bWF0aWNhbGx5DQo+ID4gPiBnZW5lcmF0ZSB4ZW4sc3RhdGljLW1lbSBmb3IgZG9tMGxlc3MgZG9t
YWlucy4NCj4gPiA+DQo+ID4NCj4gPiBMZXQgbWUgbWFrZSBzdXJlIHRoYXQncyB3aGF0IHlvdSBz
YWlkOiBVc2VycyBnaXZlIGFuIFZNIG1lbW9yeSBzaXplIHRvDQo+ID4gSW1hZ2VCdWlsZGVyLCBh
bmQgSW1hZ2VCdWlsZGVyIHdpbGwgZ2VuZXJhdGUgeGVuLHN0YXRpYy1tZW0gPSA8c3RhcnQsDQo+
IHNpemU+Lg0KPiA+IEZvciBzcGVjaWZpYyBWTSwgSW1hZ2VCdWlsZGVyIGFsc28gY2FuIGFjY2Vw
dCBzdGFydCBhbmQgc2l6ZSBhcyBpbnB1dHM/DQo+ID4NCj4gPiBEbyBJIHVuZGVyc3RhbmQgdGhp
cyBjb3JyZWN0bHk/DQo+IA0KPiBZZXMsIGV4YWN0bHkNCj4gDQo+IA0KPiA+ID4gR29pbmcgYmFj
ayB0byB0aGlzIHNwZWNpZmljIGRpc2N1c3Npb24gYWJvdXQgYm9vdC1tb2R1bGUtc2VjdGlvbjog
SQ0KPiBjYW4NCj4gPiA+IHNlZSBub3cgdGhhdCwgZ2l2ZW4geGVuLHN0YXRpYy1tZW0gaXMgY2hv
c2VuIGJ5IEltYWdlQnVpbGRlciAob3INCj4gPg0KPiA+IEJ5IGhhbmQgOiApDQo+ID4NCj4gPiA+
IHNpbWlsYXIpIGFuZCBub3QgWGVuLCB0aGVuIGl0IG1ha2VzIHNlbnNlIHRvIGhhdmUgSW1hZ2VC
dWlsZGVyIChvcg0KPiA+ID4gc2ltaWxhcikgYWxzbyBnZW5lcmF0ZSBib290LW1vZHVsZS1zZWN0
aW9uLg0KPiA+ID4NCj4gPg0KPiA+IElmIG15IGFib3ZlIHVuZGVyc3RhbmRpbmcgaXMgcmlnaHQs
IHRoZW4geWVzLg0KPiANCj4gWWVzLCBJIHRoaW5rIHdlIGFyZSBvbiB0aGUgc2FtZSBwYWdlDQo+
IA0KPiANCj4gPiA+ID4gPiBsaWtlIEltYWdlQnVpbGRlciB3b3VsZG4ndCBiZSB0aGUgYmVzdCBw
bGFjZSB0byBwaWNrIHRoZXNlIHZhbHVlcw0KPiAtLQ0KPiA+ID4gPiA+IHRoZXkgc2VlbSB0b28g
ImltcG9ydGFudCIgdG8gbGVhdmUgdG8gYSBzY3JpcHQuDQo+ID4gPiA+ID4NCj4gPiA+ID4gPiBC
dXQgaXQgc2VlbXMgcG9zc2libGUgdG8gY2hvb3NlIHRoZSB2YWx1ZXMgaW4gWGVuOg0KPiA+ID4g
PiA+IC0gWGVuIGtub3dzIEFSTV9NUFVfTk9STUFMX01FTU9SWV8qIGJlY2F1c2UgaXQgd2FzIGRl
ZmluZWQgYXQNCj4gYnVpbGQNCj4gPiA+IHRpbWUNCj4gPiA+ID4gPiAtIFhlbiByZWFkcyBib290
LW1vZHVsZS1zZWN0aW9uIGZyb20gZGV2aWNlIHRyZWUNCj4gPiA+ID4gPg0KPiA+ID4gPiA+IEl0
IHNob3VsZCBiZSBwb3NzaWJsZSBhdCB0aGlzIHBvaW50IGZvciBYZW4gdG8gcGljayB0aGUgYmVz
dA0KPiB2YWx1ZXMNCj4gPiA+IGZvcg0KPiA+ID4gPiA+IGd1ZXN0LW1lbW9yeS1zZWN0aW9uIGFu
ZCBzdGF0aWMtbWVtIGJhc2VkIG9uIHRoZSBtZW1vcnkgYXZhaWxhYmxlLg0KPiA+ID4gPiA+DQo+
ID4gPiA+DQo+ID4gPiA+IEhvdyBYZW4gdG8gcGljaz8gRG9lcyBpdCBtZWFuIGluIHN0YXRpYyBh
bGxvY2F0aW9uIERvbVUgRFQgbm9kZSwgd2UNCj4ganVzdA0KPiA+ID4gPiBuZWVkIGEgc2l6ZSwg
YnV0IGRvbid0IHJlcXVpcmUgYSBzdGFydCBhZGRyZXNzIGZvciBzdGF0aWMtbWVtPw0KPiA+ID4N
Cj4gPiA+IFllcyB0aGUgaWRlYSB3YXMgdGhhdCB0aGUgdXNlciB3b3VsZCBvbmx5IHByb3ZpZGUg
dGhlIHNpemUgKGUuZy4NCj4gPiA+IERPTVVfU1RBVElDX01FTVsxXT0xMDI0KSBhbmQgdGhlIGFk
ZHJlc3NlcyB3b3VsZCBiZSBhdXRvbWF0aWNhbGx5DQo+ID4gPiBjYWxjdWxhdGVkLiBCdXQgSSBk
aWRuJ3QgbWVhbiB0byBjaGFuZ2UgdGhlIGV4aXN0aW5nIHhlbixzdGF0aWMtbWVtDQo+ID4gPiBk
ZXZpY2UgdHJlZSBiaW5kaW5ncy4gU28gaXQgaXMgYmVzdCBpZiB0aGUgeGVuLHN0YXRpYy1tZW0g
YWRkcmVzc2VzDQo+ID4gPiBnZW5lcmF0aW9uIGlzIGRvbmUgYnkgSW1hZ2VCdWlsZGVyIChvciBz
aW1pbGFyIHRvb2wpIGluc3RlYWQgb2YgWGVuLg0KPiA+ID4NCj4gPg0KPiA+IElmIHdlIHN0aWxs
IGtlZXAgdGhlIG9wdGlvbiBmb3IgdXNlciB0byBzcGVjaWZ5IHRoZSBzdGFydCBhbmQgc2l6ZQ0K
PiA+IHBhcmFtZXRlcnMgZm9yIFZNIG1lbW9yeSwgYmVjYXVzZSBpdCBtYXliZSB2ZXJ5IGltcG9y
dGFudCBmb3IgYQ0KPiA+IGRldGVybWluaXN0aWMgc3lzdGVtIChmdWxseSBzdGF0aWMgc3lzdGVt
KSwgSSBhZ3JlZSB3aXRoIHlvdS4NCj4gPg0KPiA+IEFuZCBpbiBjdXJyZW50IHN0YXRpYy1hbGxv
Y2F0aW9uLCBJIHRoaW5rIFhlbiBkb2Vzbid0IGdlbmVyYXRlDQo+ID4geGVuLHN0YXRpYy1tZW0g
YWRkcmVzc2VzLCBhbGwgYnkgaGFuZHMuLi4NCj4gDQo+IFllYWgNCj4gDQo+IA0KDQpJIHdpbGwg
dXBkYXRlIG15IHByb3Bvc2FsIHRvIGNvdmVyIG91ciBhYm92ZSBkaXNjdXNzaW9uLCBidXQgSSBm
b3Jnb3Qgb25lDQp0aGluZy4gQXMgdGhlIHBsYXRmb3JtIGhlYWRlciBmaWxlcyB3aWxsIGJlIGdl
bmVyYXRlZCBmcm9tIERUUywgZG9lcyBpdA0KbWVhbiB3ZSBoYXZlIHRvIG1haW50YWluIHBsYXRm
b3JtIGR0cyBmaWxlcyBpbiBYZW4gbGlrZSB3aGF0IFplcGh5ciBoYXMNCmRvbmU/IEFuZCBkbyB5
b3UgaGF2ZSBzb21lIGlkZWEgdG8gaW50ZWdyYXRlIHRoZSAiSW1hZ2VCdWlsZGVyIj8gTWFrZSBp
dA0KYXMgYSBzdWJtb2R1bGUgb2YgWGVuIG9yIGludGVncmF0ZSB0byB4ZW4tdG9vbHM/DQoNCg0K
PiA+ID4gU29ycnkgZm9yIHRoZSBjb25mdXNpb24hDQo+ID4gPg0KPiA+DQo+ID4gTlAgOyApDQo=


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 01:25:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 01:25:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282655.481443 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPaDX-00076b-Ls; Thu, 03 Mar 2022 01:25:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282655.481443; Thu, 03 Mar 2022 01:25:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPaDX-00076U-If; Thu, 03 Mar 2022 01:25:19 +0000
Received: by outflank-mailman (input) for mailman id 282655;
 Thu, 03 Mar 2022 01:25:17 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=tUyt=TO=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nPaDV-00076O-Pv
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 01:25:17 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c6fbc765-9a90-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 02:25:14 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 7F309B82358;
 Thu,  3 Mar 2022 01:25:13 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2074AC340F2;
 Thu,  3 Mar 2022 01:25:11 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c6fbc765-9a90-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646270712;
	bh=OIWkR7Zp9BS5KcWgPGvH+7lGxsauASKPDzT5dWHRzcg=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=fyTcnY079RGVSWj1/bqnWf9UBPrXZmiZ32cJHGCuHKFrvhhlGSoeO8XnjyAULGbxy
	 xuEeYIRqhVQfty7l070VwdiiUBm+vhQMOyp1/UPCRCwJW1H8chwVFdTWSqF8JxQ7i6
	 pmngu4i/qw99iSRs7nF8V/KUQPfZMnX0OhdBfoyB3K0uXmVGkSCue1VhFC37hRyoHl
	 lqT9JrJPLf0sbQoGpagSmC+bBJdDfAOOQZXY1qQ2kFojarLkPJJigndyp3UGVx/CEp
	 1XnqlJ8dDyOAxVpGwUR+l8DwgqcaHVrJmCy/f+O96VijhpAG5o/2FbsTqBKQIZTLrT
	 qEo+TADXZ7B8A==
Date: Wed, 2 Mar 2022 17:25:10 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Christoph Hellwig <hch@lst.de>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    iommu@lists.linux-foundation.org, x86@kernel.org, 
    Anshuman Khandual <anshuman.khandual@arm.com>, 
    Tom Lendacky <thomas.lendacky@amd.com>, 
    Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>, 
    Boris Ostrovsky <boris.ostrovsky@oracle.com>, 
    Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>, 
    David Woodhouse <dwmw2@infradead.org>, Lu Baolu <baolu.lu@linux.intel.com>, 
    Robin Murphy <robin.murphy@arm.com>, linux-arm-kernel@lists.infradead.org, 
    xen-devel@lists.xenproject.org, linux-ia64@vger.kernel.org, 
    linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, 
    linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org, 
    linux-hyperv@vger.kernel.org, tboot-devel@lists.sourceforge.net, 
    linux-pci@vger.kernel.org
Subject: Re: [PATCH 11/12] swiotlb: merge swiotlb-xen initialization into
 swiotlb
In-Reply-To: <20220302081500.GB23075@lst.de>
Message-ID: <alpine.DEB.2.22.394.2203021709470.3261@ubuntu-linux-20-04-desktop>
References: <20220301105311.885699-1-hch@lst.de> <20220301105311.885699-12-hch@lst.de> <alpine.DEB.2.22.394.2203011720150.3261@ubuntu-linux-20-04-desktop> <20220302081500.GB23075@lst.de>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Wed, 2 Mar 2022, Christoph Hellwig wrote:
> On Tue, Mar 01, 2022 at 06:55:47PM -0800, Stefano Stabellini wrote:
> > Unrelated to this specific patch series: now that I think about it, if
> > io_tlb_default_mem.nslabs is already allocated by the time xen_mm_init
> > is called, wouldn't we potentially have an issue with the GFP flags used
> > for the earlier allocation (e.g. GFP_DMA32 not used)? Maybe something
> > for another day.
> 
> swiotlb_init allocates low memory from meblock, which is roughly
> equivalent to GFP_DMA allocations, so we'll be fine.
> 
> > > @@ -143,10 +141,15 @@ static int __init xen_mm_init(void)
> > >  	if (!xen_swiotlb_detect())
> > >  		return 0;
> > >  
> > > -	rc = xen_swiotlb_init();
> > >  	/* we can work with the default swiotlb */
> > > -	if (rc < 0 && rc != -EEXIST)
> > > -		return rc;
> > > +	if (!io_tlb_default_mem.nslabs) {
> > > +		if (!xen_initial_domain())
> > > +			return -EINVAL;
> > 
> > I don't think we need this xen_initial_domain() check. It is all
> > already sorted out by the xen_swiotlb_detect() check above.
> 
> Is it?
> 
> static inline int xen_swiotlb_detect(void)
> {
> 	if (!xen_domain())
> 		return 0;
> 	if (xen_feature(XENFEAT_direct_mapped))
> 		return 1;
> 	/* legacy case */
> 	if (!xen_feature(XENFEAT_not_direct_mapped) && xen_initial_domain())
> 		return 1;
> 	return 0;
> }

It used to be that we had a

  if (!xen_initial_domain())
      return -EINVAL;

check in the initialization of swiotlb-xen on ARM. Then we replaced it
with the more sophisticated xen_swiotlb_detect().

The reason is that swiotlb-xen on ARM relies on Dom0 being 1:1 mapped
(guest physical addresses == physical addresses). Recent changes in Xen
allowed also DomUs to be 1:1 mapped. Changes still under discussion will
allow Dom0 not to be 1:1 mapped.

So, before all the Xen-side changes, knowing what was going to happen, I
introduced a clearer interface: XENFEAT_direct_mapped and
XENFEAT_not_direct_mapped tell us whether the guest (Linux) is 1:1
mapped or not. If it is 1:1 mapped then Linux can take advantage of
swiotlb-xen. Now xen_swiotlb_detect() returns true if Linux is 1:1
mapped.

Then of course there is the legacy case. That's taken care of by:

 	if (!xen_feature(XENFEAT_not_direct_mapped) && xen_initial_domain())
 		return 1;

The intention is to say that if
XENFEAT_direct_mapped/XENFEAT_not_direct_mapped are not present, then
use xen_initial_domain() like we did before.

So if xen_swiotlb_detect() returns true we know that Linux is either
dom0 (xen_initial_domain() == true) or we have very good reasons to
think we should initialize swiotlb-xen anyway
(xen_feature(XENFEAT_direct_mapped) == true).


> I think I'd keep it as-is for now, as my planned next step would be to
> fold xen-swiotlb into swiotlb entirely.

Thinking more about it we actually need to drop the xen_initial_domain()
check otherwise some cases won't be functional (Dom0 not 1:1 mapped, or
DomU 1:1 mapped).


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 01:36:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 01:36:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282664.481455 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPaO4-0000dm-UG; Thu, 03 Mar 2022 01:36:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282664.481455; Thu, 03 Mar 2022 01:36:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPaO4-0000d9-NV; Thu, 03 Mar 2022 01:36:12 +0000
Received: by outflank-mailman (input) for mailman id 282664;
 Thu, 03 Mar 2022 01:36:11 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=HbtR=TO=arm.com=Wei.Chen@srs-se1.protection.inumbo.net>)
 id 1nPaO3-0000XN-A2
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 01:36:11 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04on062d.outbound.protection.outlook.com
 [2a01:111:f400:fe0c::62d])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 49475f57-9a92-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 02:36:02 +0100 (CET)
Received: from DB6PR0802CA0035.eurprd08.prod.outlook.com (2603:10a6:4:a3::21)
 by VI1PR0802MB2221.eurprd08.prod.outlook.com (2603:10a6:800:9a::10)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.25; Thu, 3 Mar
 2022 01:36:00 +0000
Received: from DB5EUR03FT029.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:4:a3:cafe::5c) by DB6PR0802CA0035.outlook.office365.com
 (2603:10a6:4:a3::21) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4823.21 via Frontend
 Transport; Thu, 3 Mar 2022 01:36:00 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT029.mail.protection.outlook.com (10.152.20.131) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Thu, 3 Mar 2022 01:35:59 +0000
Received: ("Tessian outbound 63bb5eb69ee8:v113");
 Thu, 03 Mar 2022 01:35:59 +0000
Received: from 0ab8b9c61e81.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 74C92DCE-74BC-408E-8456-B35EB1F17433.1; 
 Thu, 03 Mar 2022 01:35:54 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 0ab8b9c61e81.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 03 Mar 2022 01:35:54 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com (2603:10a6:102:2b9::9)
 by AM6PR08MB3575.eurprd08.prod.outlook.com (2603:10a6:20b:48::19)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.13; Thu, 3 Mar
 2022 01:35:51 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa]) by PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa%4]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 01:35:50 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 49475f57-9a92-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=RcsEOKu715kcgR7lt6oNR1CEjCILmSXWRmq1U6wvokQ=;
 b=vUDphmIicYpI3lDYXdJSJ+fgsCuN9wpuLldTt4RP3IIUcT5k+3CAUmFaJYtnDfdj0mJfAgyw4eaiuN0N4Ue+gZRBj8hIBOZs5uG62OS7sza9iehY7/IID6dhjEEBnO5HNyo+O41p7ps2pThLzQJaa9R/9bnL1neS5JcfPA+6OL4=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=SfjgsUR573a7ReE5gDJI5M84e4hQsotJL407fSh/54LmM1GCtW0aIxQ9dsMkwRfepDCs5fzt0DxUPwLNQjRJ6egIMtPlHVF4SjW9bM8AMLTVRgJM1Vr58LmLpp12/+0kEYI0xd4zIefe431xUcfvE6/V0dkw6te6Y9ySdWSxmesEb76j5xBZF2ScQ1223LNHeuAgV0pqGhfn8SQnuLNnUnqJRZZaTnq4Q/9JZQaVDh3y2/rMP987Uhks7rp3cXxx4yfC0Oz9qEEeR6LmTPUKgPfnIlquUPFh+cjCdpvNGDfbkHBPBsckLk81QoQC1oIpup7a2TGofwGoTjasTgK8yQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=RcsEOKu715kcgR7lt6oNR1CEjCILmSXWRmq1U6wvokQ=;
 b=bFc0FcRj885C8ktvpZFb2KcVS57dAq3qFhuk2cCWcQpsyQriNyTEltnle0m23YThuj50PzTBrXWrbMYVCELep8ty4t5+HBy6FZsV3UinDnghIhLna0USPcaUNnbgubKO6NFIsHZqO9F/TrVD/BAeEcFkC41psltMHLZhZbs0q6QWcV6HIklqG00NM7iO3H8mcZGcGdrvBMrGxKUFgNy9ZTIg3hGrdtuv0b/k4PDUZ8W8d3lTKsDU9jYZ/R9m1W9JDH0iD2Zk7EXngflT2UJ8IrZrPuANJGxCjzSsF36ztsCPx/3j8WxC71StTZ9xUcBVk9SZRIaCG8rNPRYfy0FH5A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=RcsEOKu715kcgR7lt6oNR1CEjCILmSXWRmq1U6wvokQ=;
 b=vUDphmIicYpI3lDYXdJSJ+fgsCuN9wpuLldTt4RP3IIUcT5k+3CAUmFaJYtnDfdj0mJfAgyw4eaiuN0N4Ue+gZRBj8hIBOZs5uG62OS7sza9iehY7/IID6dhjEEBnO5HNyo+O41p7ps2pThLzQJaa9R/9bnL1neS5JcfPA+6OL4=
From: Wei Chen <Wei.Chen@arm.com>
To: Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	Bertrand Marquis <Bertrand.Marquis@arm.com>, Penny Zheng
	<Penny.Zheng@arm.com>, Henry Wang <Henry.Wang@arm.com>, nd <nd@arm.com>
Subject: RE: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Topic: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Index:
 AdgpQxtXwh7LkfydTgiYk9bhMgU+ogAn0mUAABEK2UAAF1ylAACsO9YwAA5uZgAAI3g7sAAIzZgAAB9QTKA=
Date: Thu, 3 Mar 2022 01:35:50 +0000
Message-ID:
 <PAXPR08MB7420836458E512FE375B8F199E049@PAXPR08MB7420.eurprd08.prod.outlook.com>
References:
 <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2202241606450.239973@ubuntu-linux-20-04-desktop>
 <AS1PR08MB74269923288B75097392BDD99E3E9@AS1PR08MB7426.eurprd08.prod.outlook.com>
 <4c558f8f-56d4-0445-32d4-169bc5d0a3bc@xen.org>
 <PAXPR08MB74200F4B0B4EFFD5BE1A6E699E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <7260f050-9022-4adf-618b-a8b271aca8c3@xen.org>
 <PAXPR08MB7420B367FFEB4FD3A7C88EB79E039@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <5eb5fe51-9ef7-affe-06e1-b15da512a76c@xen.org>
In-Reply-To: <5eb5fe51-9ef7-affe-06e1-b15da512a76c@xen.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 6E58D46329831C48A482985C7259F316.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 0f9ad8ba-9e7a-4af1-57a4-08d9fcb62bcb
x-ms-traffictypediagnostic:
	AM6PR08MB3575:EE_|DB5EUR03FT029:EE_|VI1PR0802MB2221:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR0802MB2221B2BEC3F5FA6D18FD6AB89E049@VI1PR0802MB2221.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAXPR08MB7420.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(6506007)(38100700002)(5660300002)(86362001)(9686003)(2906002)(7696005)(122000001)(53546011)(83380400001)(186003)(33656002)(54906003)(26005)(55016003)(110136005)(8936002)(316002)(71200400001)(64756008)(4326008)(8676002)(52536014)(66446008)(66476007)(66556008)(508600001)(76116006)(66946007)(38070700005);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB3575
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT029.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	565a5345-eb47-46c5-6365-08d9fcb62668
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(70586007)(70206006)(316002)(81166007)(55016003)(36860700001)(2906002)(47076005)(8676002)(4326008)(40460700003)(82310400004)(52536014)(8936002)(33656002)(186003)(508600001)(336012)(53546011)(26005)(356005)(5660300002)(6506007)(7696005)(86362001)(9686003)(83380400001)(110136005)(54906003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 01:35:59.8473
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 0f9ad8ba-9e7a-4af1-57a4-08d9fcb62bcb
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT029.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0802MB2221
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From xen-devel-bounces@lists.xenproject.org Thu Mar 03 02:03:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 02:03:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282671.481466 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPaol-0005B9-2s; Thu, 03 Mar 2022 02:03:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282671.481466; Thu, 03 Mar 2022 02:03:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPaok-0005B2-Sq; Thu, 03 Mar 2022 02:03:46 +0000
Received: by outflank-mailman (input) for mailman id 282671;
 Thu, 03 Mar 2022 02:03:45 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=tUyt=TO=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nPaoj-0005Av-0L
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 02:03:45 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 264c4724-9a96-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 03:03:42 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 95872615AF;
 Thu,  3 Mar 2022 02:03:41 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8CC70C004E1;
 Thu,  3 Mar 2022 02:03:40 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 264c4724-9a96-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646273021;
	bh=T1iP5fE/2UNwxXMXrlhOXhv48Tublx8Glo1H8C+/fxY=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=TRdpd7hG75g3jtq27BF+i8NNtOe2Tgx0icL7b47/KesPC8Eom3YhNeq8So8/kzCfQ
	 52i3cbUJRPF/IuYb5A9c2jGhZeJKKeYgn5nHkgBGoOd86H9dYuBc0ahc25yuIitfg8
	 UAppCiT5H8ubZ5izb6lY4z4n/w2MveZuNjlaF85BJ8Pgu800eOT2YJDa0PuerT1YRA
	 tPYD0lE0tuhpAmix3m2jinwYgh5bascA4TYIUhFEmJIHAwPmDKL1GgD6aoDdh8b57K
	 cnvbbIUWL1r58PzIMWUA51I/OB7m9tRyN1wcR4fWI3XAugy+auGMZ4CExrZHuSpMVK
	 heqaAKUCk+7ow==
Date: Wed, 2 Mar 2022 18:03:39 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Wei Chen <Wei.Chen@arm.com>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, 
    "julien@xen.org" <julien@xen.org>, 
    Bertrand Marquis <Bertrand.Marquis@arm.com>, 
    Penny Zheng <Penny.Zheng@arm.com>, Henry Wang <Henry.Wang@arm.com>, 
    nd <nd@arm.com>, George.Dunlap@citrix.com
Subject: RE: Proposal for Porting Xen to Armv8-R64 - DraftA
In-Reply-To: <PAXPR08MB742017360AAF65AC2CCB1DF49E049@PAXPR08MB7420.eurprd08.prod.outlook.com>
Message-ID: <alpine.DEB.2.22.394.2203021751222.3261@ubuntu-linux-20-04-desktop>
References: <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com> <alpine.DEB.2.22.394.2202241606450.239973@ubuntu-linux-20-04-desktop> <AS1PR08MB74269923288B75097392BDD99E3E9@AS1PR08MB7426.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2202251214210.239973@ubuntu-linux-20-04-desktop> <PAXPR08MB742081D5E3C94801350C4A739E029@PAXPR08MB7420.eurprd08.prod.outlook.com> <alpine.DEB.2.22.394.2203011455500.3261@ubuntu-linux-20-04-desktop>
 <PAXPR08MB74201779FC92E734A5107B769E039@PAXPR08MB7420.eurprd08.prod.outlook.com> <alpine.DEB.2.22.394.2203021454090.3261@ubuntu-linux-20-04-desktop> <PAXPR08MB742017360AAF65AC2CCB1DF49E049@PAXPR08MB7420.eurprd08.prod.outlook.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: multipart/mixed; BOUNDARY="8323329-15056552-1646272522=:3261"
Content-ID: <alpine.DEB.2.22.394.2203021755370.3261@ubuntu-linux-20-04-desktop>

  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--8323329-15056552-1646272522=:3261
Content-Type: text/plain; CHARSET=UTF-8
Content-Transfer-Encoding: 8BIT
Content-ID: <alpine.DEB.2.22.394.2203021755371.3261@ubuntu-linux-20-04-desktop>

On Thu, 3 Mar 2022, Wei Chen wrote:
> > On Wed, 2 Mar 2022, Wei Chen wrote:
> > > > > > > > If not, and considering that we have to generate
> > > > > > > > ARM_MPU_*_MEMORY_START/END anyway at build time, would it make
> > > > sense
> > > > > > to
> > > > > > > > also generate mpu,guest-memory-section, xen,static-mem, etc.
> > at
> > > > build
> > > > > > > > time rather than passing it via device tree to Xen at runtime?
> > > > > > > >
> > > > > > >
> > > > > > > Did you mean we still add these information in device tree, but
> > for
> > > > > > build
> > > > > > > time only. In runtime we don't parse them?
> > > > > >
> > > > > > Yes, something like that, but see below.
> > > > > >
> > > > > >
> > > > > > > > What's the value of doing ARM_MPU_*_MEMORY_START/END at build
> > time
> > > > and
> > > > > > > > everything else at runtime?
> > > > > > >
> > > > > > > ARM_MPU_*_MEMORY_START/END is defined by platform. But other
> > things
> > > > are
> > > > > > > users customized. They can change their usage without rebuild
> > the
> > > > image.
> > > > > >
> > > > > > Good point.
> > > > > >
> > > > > > We don't want to have to rebuild Xen if the user updated a guest
> > > > kernel,
> > > > > > resulting in a larger boot-module-section.
> > > > > >
> > > > > > So I think it makes sense that "mpu,boot-module-section" is
> > generated
> > > > by
> > > > > > the scripts (e.g. ImageBuilder) at build time, and Xen reads the
> > > > > > property at boot from the runtime device tree.
> > > > > >
> > > > > > I think we need to divide the information into two groups:
> > > > > >
> > > > > >
> > > > > > # Group1: board info
> > > > > >
> > > > > > This information is platform specific and it is not meant to
> > change
> > > > > > depending on the VM configuration. Ideally, we build Xen for a
> > > > platform
> > > > > > once, then we can use the same Xen binary together with any
> > > > combination
> > > > > > of dom0/domU kernels and ramdisks.
> > > > > >
> > > > > > This kind of information doesn't need to be exposed to the runtime
> > > > > > device tree. But we can still use a build-time device tree to
> > generate
> > > > > > the addresses if it is convenient.
> > > > > >
> > > > > > XEN_START_ADDRESS, ARM_MPU_DEVICE_MEMORY_*, and
> > > > ARM_MPU_NORMAL_MEMORY_*
> > > > > > seem to be part of this group.
> > > > > >
> > > > >
> > > > > Yes.
> > > > >
> > > > > >
> > > > > > # Group2: boot configuration
> > > > > >
> > > > > > This information is about the specific set of binaries and VMs
> > that we
> > > > > > need to boot. It is conceptually similar to the dom0less device
> > tree
> > > > > > nodes that we already have. If we change one of the VM binaries,
> > we
> > > > > > likely have to refresh the information here.
> > > > > >
> > > > > > "mpu,boot-module-section" probably belongs to this group (unless
> > we
> > > > find
> > > > > > a way to define "mpu,boot-module-section" generically so that we
> > don't
> > > > > > need to change it any time the set of boot modules change.)
> > > > > >
> > > > > >
> > > > >
> > > > > I agree.
> > > > >
> > > > > > > > It looks like we are forced to have the sections definitions
> > at
> > > > build
> > > > > > > > time because we need them before we can parse device tree. In
> > that
> > > > > > case,
> > > > > > > > we might as well define all the sections at build time.
> > > > > > > >
> > > > > > > > But I think it would be even better if Xen could automatically
> > > > choose
> > > > > > > > xen,static-mem, mpu,guest-memory-section, etc. on its own
> > based on
> > > > the
> > > > > > > > regular device tree information (/memory, /amba, etc.),
> > without
> > > > any
> > > > > > need
> > > > > > > > for explicitly describing each range with these new properties.
> > > > > > > >
> > > > > > >
> > > > > > > for mpu,guest-memory-section, with the limitations: no other
> > usage
> > > > > > between
> > > > > > > different guest' memory nodes, this is OK. But for xen,static-
> > mem
> > > > (heap),
> > > > > > > we just want everything on a MPU system is dertermistic. But, of
> > > > course
> > > > > > Xen
> > > > > > > can select left memory for heap without static-mem.
> > > > > >
> > > > > > It is good that you think they can be chosen by Xen.
> > > > > >
> > > > > > Differently from "boot-module-section", which has to do with the
> > boot
> > > > > > modules selected by the user for a specific execution,
> > > > > > guest-memory-section and static-mem are Xen specific memory
> > > > > > policies/allocations.
> > > > > >
> > > > > > A user wouldn't know how to fill them in. And I worry that even a
> > > > script
> > > > >
> > > > > But users should know it, because static-mem for guest must be
> > allocated
> > > > > in this range. And users take the responsibility to set the DomU's
> > > > > static allocate memory ranges.
> > > >
> > > > Let me premise that my goal is to avoid having many users reporting
> > > > errors to xen-devel and xen-users when actually it is just a wrong
> > > > choice of addresses.
> > > >
> > > > I think we need to make a distinction between addresses for the boot
> > > > modules, e.g. addresses where to load xen, the dom0/U kernel, dom0/U
> > > > ramdisk in memory at boot time, and VM static memory addresses.
> > > >
> > > > The boot modules addresses are particularly difficult to fill in
> > because
> > > > they are many and a small update in one of the modules could
> > invalidate
> > > > all the other addresses. This is why I ended up writing ImageBuilder.
> > > > Since them, I received several emails from users thanking me for
> > > > ImageBuilder :-)
> > > >
> > >
> > > Thanks +999 😊
> > >
> > >
> > > > The static VM memory addresses (xen,static-mem) should be a bit easier
> > > > to fill in correctly. They are meant to be chosen once, and it
> > shouldn't
> > > > happen that an update on a kernel forces the user to change all the VM
> > > > static memory addresses. Also, I know that some users actually want to
> > > > be able to choose the domU addresses by hand because they have
> > specific
> > > > needs. So it is good that we can let the user choose the addresses if
> > > > they want to.
> > > >
> > >
> > > Yes.
> > >
> > > > With all of that said, I do think that many users won't have an
> > opinion
> > > > on the VM static memory addresses and won't know how to choose them.
> > > > It would be error prone to let them try to fill them in by hand. So I
> > > > was already planning on adding support to ImageBuilder to
> > automatically
> > > > generate xen,static-mem for dom0less domains.
> > > >
> > >
> > > Let me make sure that's what you said: Users give an VM memory size to
> > > ImageBuilder, and ImageBuilder will generate xen,static-mem = <start,
> > size>.
> > > For specific VM, ImageBuilder also can accept start and size as inputs?
> > >
> > > Do I understand this correctly?
> > 
> > Yes, exactly
> > 
> > 
> > > > Going back to this specific discussion about boot-module-section: I
> > can
> > > > see now that, given xen,static-mem is chosen by ImageBuilder (or
> > >
> > > By hand : )
> > >
> > > > similar) and not Xen, then it makes sense to have ImageBuilder (or
> > > > similar) also generate boot-module-section.
> > > >
> > >
> > > If my above understanding is right, then yes.
> > 
> > Yes, I think we are on the same page
> > 
> > 
> > > > > > like ImageBuilder wouldn't be the best place to pick these values
> > --
> > > > > > they seem too "important" to leave to a script.
> > > > > >
> > > > > > But it seems possible to choose the values in Xen:
> > > > > > - Xen knows ARM_MPU_NORMAL_MEMORY_* because it was defined at
> > build
> > > > time
> > > > > > - Xen reads boot-module-section from device tree
> > > > > >
> > > > > > It should be possible at this point for Xen to pick the best
> > values
> > > > for
> > > > > > guest-memory-section and static-mem based on the memory available.
> > > > > >
> > > > >
> > > > > How Xen to pick? Does it mean in static allocation DomU DT node, we
> > just
> > > > > need a size, but don't require a start address for static-mem?
> > > >
> > > > Yes the idea was that the user would only provide the size (e.g.
> > > > DOMU_STATIC_MEM[1]=1024) and the addresses would be automatically
> > > > calculated. But I didn't mean to change the existing xen,static-mem
> > > > device tree bindings. So it is best if the xen,static-mem addresses
> > > > generation is done by ImageBuilder (or similar tool) instead of Xen.
> > > >
> > >
> > > If we still keep the option for user to specify the start and size
> > > parameters for VM memory, because it maybe very important for a
> > > deterministic system (fully static system), I agree with you.
> > >
> > > And in current static-allocation, I think Xen doesn't generate
> > > xen,static-mem addresses, all by hands...
> > 
> > Yeah
> > 
> 
> I will update my proposal to cover our above discussion, but I forgot one
> thing. As the platform header files will be generated from DTS, does it
> mean we have to maintain platform dts files in Xen like what Zephyr has
> done?

I would prefer not to have to maintain platform dts files in Xen like
Zephyr is doing. Ideally, the user should be able to take any
spec-compliant device tree file and use it. I would say: let's start
without adding the dts files to Xen (we might have one under docs/ but
just as an example.) We can add them later if the need arise.


> And do you have some idea to integrate the "ImageBuilder"? Make it
> as a submodule of Xen or integrate to xen-tools?

I think it would be best if ImageBuilder was kept as a separate
repository because there should be no strong ties between ImageBuilder
versions and Xen versions. It is more convenient to handle it in a
separate repository, especially as Yocto and other build systems might
clone ImageBuilder during the build to generate boot.scr (it is already
the case).

That said, it might be good to make it more "official" but moving it to
Xen Project. I can talk to George about creating
http://xenbits.xen.org/git-http/imagebuilder.git or
https://gitlab.com/xen-project/imagebuilder.
--8323329-15056552-1646272522=:3261--


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 02:06:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 02:06:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282680.481475 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nParo-0006Ew-Hf; Thu, 03 Mar 2022 02:06:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282680.481475; Thu, 03 Mar 2022 02:06:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nParo-0006Ep-EN; Thu, 03 Mar 2022 02:06:56 +0000
Received: by outflank-mailman (input) for mailman id 282680;
 Thu, 03 Mar 2022 02:06:55 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=HbtR=TO=arm.com=Wei.Chen@srs-se1.protection.inumbo.net>)
 id 1nParn-0006Ej-1H
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 02:06:55 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on20607.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::607])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 9789d680-9a96-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 03:06:52 +0100 (CET)
Received: from AM6PR0202CA0056.eurprd02.prod.outlook.com
 (2603:10a6:20b:3a::33) by AM6PR08MB3878.eurprd08.prod.outlook.com
 (2603:10a6:20b:8b::27) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.25; Thu, 3 Mar
 2022 02:06:44 +0000
Received: from VE1EUR03FT037.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:3a:cafe::55) by AM6PR0202CA0056.outlook.office365.com
 (2603:10a6:20b:3a::33) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Thu, 3 Mar 2022 02:06:44 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT037.mail.protection.outlook.com (10.152.19.70) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Thu, 3 Mar 2022 02:06:44 +0000
Received: ("Tessian outbound 2877e54fe176:v113");
 Thu, 03 Mar 2022 02:06:43 +0000
Received: from 8463b0d2cdb5.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 BAD1F1D2-1DBF-4D84-9E63-B27451E9578F.1; 
 Thu, 03 Mar 2022 02:06:37 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 8463b0d2cdb5.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 03 Mar 2022 02:06:37 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com (2603:10a6:102:2b9::9)
 by VI1PR08MB3631.eurprd08.prod.outlook.com (2603:10a6:803:85::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 02:06:34 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa]) by PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa%4]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 02:06:34 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9789d680-9a96-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=L7ass8AaR0DkOrMmIHcWf+VyphZU8Uk/3h5xCdKMKm8=;
 b=Q7IfOYZoysPcDYVI9iuXzL6C/t7qIrDIljLhCCHW3yBlqM+E1AxWQ0ognGt+WerurvX+N1Ws6f2pckwcaGIbslgKbdUdERlORWouMrFn6dTxvWGmyr35RqqT9vxONe5E4I4VLsXUoFS9OgEb5PrZbap3T47adFHKW7P0aOwq6a8=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=SShghBuVA7PHHvVOpVRlEluvhSiX/D4bTUj/tT83DvO3yfwVAHnBW2UKGvYl3SJOjecycz5s01IK8xKBgxComN+W2LUuF88fhptkuxNoGBTiAwtdIVCg/gBOMso5DlavfWt2pfDJXh2io+deJaDxgKBTjcQnL3EnJ5gV55DTjm6gu//Ejoz4jYOACd/e8Plosx4xDz2ei9nlfx7k33F13XlHKKMsmiZe820n9a3qu6oBs5fxISq0DGrWEW2WkOqGAdRn6g3BhKR2Xgm6EN6qQzAH0WGXtzk/m6qw6ur2glZDip7JIFLOJesp9ARpQPm+sPsp8D/Za9erQgB/HTr4bw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=L7ass8AaR0DkOrMmIHcWf+VyphZU8Uk/3h5xCdKMKm8=;
 b=R7n8irmGIaKkyxXbIxORi8fUw6Quot/O0wDPxDbxar6cW9jXtjsR5x8JgNbQxDsIXTys2V11tf8f532hje9z6KO/5R7CPRS43PdEEUfM8jvIAL46XC/OUyWYk9wjMZbiYxALPd88SKjEbewJBOMFKzkiWbmKBK7LG7f9WqagMGRbsbj7a0Mufye3LMjkUuevlWQ305dGgupaKd6ixkRTguzjikFXckSyNsqsSzhECljePy3vD8Fg1jiy6vVzVvK7QcvzDPEFYgdaWyian0RFR/Tc7CSx0YD69cseQpBj6irg/g+wA+cKa83hjolH66SD+03f7uCd5Xa9eoWWSdA+Pg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=L7ass8AaR0DkOrMmIHcWf+VyphZU8Uk/3h5xCdKMKm8=;
 b=Q7IfOYZoysPcDYVI9iuXzL6C/t7qIrDIljLhCCHW3yBlqM+E1AxWQ0ognGt+WerurvX+N1Ws6f2pckwcaGIbslgKbdUdERlORWouMrFn6dTxvWGmyr35RqqT9vxONe5E4I4VLsXUoFS9OgEb5PrZbap3T47adFHKW7P0aOwq6a8=
From: Wei Chen <Wei.Chen@arm.com>
To: Julien Grall <julien@xen.org>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>, Stefano Stabellini <sstabellini@kernel.org>
CC: Bertrand Marquis <Bertrand.Marquis@arm.com>, Penny Zheng
	<Penny.Zheng@arm.com>, Henry Wang <Henry.Wang@arm.com>, nd <nd@arm.com>
Subject: RE: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Topic: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Index: AdgpQxtXwh7LkfydTgiYk9bhMgU+ogBRt1sAAKse4VAAPag1gAAckyvA
Date: Thu, 3 Mar 2022 02:06:34 +0000
Message-ID:
 <PAXPR08MB742067028155B11528C5CCA39E049@PAXPR08MB7420.eurprd08.prod.outlook.com>
References:
 <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <04db7e8b-2f04-41d7-1deb-d8bda3625c04@xen.org>
 <PAXPR08MB7420BF1299A1577B98211C1A9E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <1f0bba54-158b-d171-6f99-0c29e0547f8a@xen.org>
In-Reply-To: <1f0bba54-158b-d171-6f99-0c29e0547f8a@xen.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: A65CE69BD1303548811D0CC54A01930D.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: d30ea2b8-8f56-4253-b22b-08d9fcba7727
x-ms-traffictypediagnostic:
	VI1PR08MB3631:EE_|VE1EUR03FT037:EE_|AM6PR08MB3878:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR08MB38786CD77D9569AFB2FFEB429E049@AM6PR08MB3878.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAXPR08MB7420.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(122000001)(5660300002)(7696005)(86362001)(9686003)(8936002)(110136005)(316002)(54906003)(33656002)(6506007)(66476007)(30864003)(52536014)(53546011)(55016003)(76116006)(83380400001)(8676002)(64756008)(4326008)(66556008)(66446008)(66946007)(38100700002)(508600001)(26005)(186003)(2906002)(71200400001)(38070700005);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB3631
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT037.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	aa40c1d1-bbc0-4c01-c2d7-08d9fcba7147
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(336012)(33656002)(26005)(81166007)(356005)(9686003)(86362001)(53546011)(5660300002)(186003)(83380400001)(316002)(54906003)(30864003)(2906002)(110136005)(82310400004)(36860700001)(55016003)(4326008)(508600001)(6506007)(70206006)(8676002)(52536014)(47076005)(7696005)(8936002)(40460700003)(70586007);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 02:06:44.1450
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: d30ea2b8-8f56-4253-b22b-08d9fcba7727
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT037.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB3878
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From xen-devel-bounces@lists.xenproject.org Thu Mar 03 02:11:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 02:11:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282688.481486 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPawb-0007gb-7U; Thu, 03 Mar 2022 02:11:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282688.481486; Thu, 03 Mar 2022 02:11:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPawb-0007gU-4Z; Thu, 03 Mar 2022 02:11:53 +0000
Received: by outflank-mailman (input) for mailman id 282688;
 Thu, 03 Mar 2022 02:11:51 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ibyA=TO=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nPawZ-0007gO-Jw
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 02:11:51 +0000
Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com
 [205.220.165.32]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 47f312d1-9a97-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 03:11:49 +0100 (CET)
Received: from pps.filterd (m0246617.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 222LxL1H013834; 
 Thu, 3 Mar 2022 02:11:33 GMT
Received: from aserp3030.oracle.com (aserp3030.oracle.com [141.146.126.71])
 by mx0b-00069f02.pphosted.com with ESMTP id 3eh1k47jgu-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Thu, 03 Mar 2022 02:11:33 +0000
Received: from pps.filterd (aserp3030.oracle.com [127.0.0.1])
 by aserp3030.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 2231jMFU057160;
 Thu, 3 Mar 2022 02:11:32 GMT
Received: from nam12-mw2-obe.outbound.protection.outlook.com
 (mail-mw2nam12lp2043.outbound.protection.outlook.com [104.47.66.43])
 by aserp3030.oracle.com with ESMTP id 3efa8h5mmv-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Thu, 03 Mar 2022 02:11:32 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
 by MN2PR10MB3360.namprd10.prod.outlook.com (2603:10b6:208:130::30)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Thu, 3 Mar
 2022 02:11:29 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::6d20:6694:a16:56f7]) by BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::6d20:6694:a16:56f7%3]) with mapi id 15.20.5038.015; Thu, 3 Mar 2022
 02:11:29 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 47f312d1-9a97-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=7Cp9J//bQQUjc+F/H7wFhBgQLPh2oU3W65xAyFcURaU=;
 b=Tu3/mKpao5BDA9dIpCyC/haDg0nMNtXb21F0b59geZeEQRmzKlJfpE0pSy+uimAyzpz3
 qB48g9p03/2Tc7oyfD5ZMYhe/T+poQjlPsb/oGoI7uQB/9KfhJ7B9HeJYX9etn4rI0y4
 NLzTpqVSqhNOTHrWyW5vwBgF3pMtIecDxWa/2ipFeI9fK0oUsSeCmcUqUrgJbDyKZG31
 mb5D4UMeb7IGSm9OWhR3YCUszufQ3Qeu5+AQ1sBoXz0q7CQaewQjPneBjcvzmP1enF45
 3qlFfJKbZVKbM3jZTGHeFmkqq55ahhH+pYd8TEmEUM5RAtuso2bp5TACrlAE0XbnkVDv Ng== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=kE0kR4lmsVCKea8ALDlasw9bh7yJ+1TVg2rKUt8AUKGpfCQPROSU/85PPyeXFnUymcQT1+xoj/3vNgmfwUwh8RshEW0zXcClxcKUmljA3u2/ai+NMcuqt1o5CNteh7OO4XKCOFXgGoN3LVtwfs3tALC0u3Iny4MwY0ieCggz7ibJYQ4NeLnV5NVxL0rcWUeaWMBm++SwI+DAtUENIW62D2CscunPZW5yhEHWP0IRxS2J25N9qP/IY7OEbI+Oeii0dSk162tPhzpk4JJKUTD3KFg4qPj5vBOieK92rACS80ufgFAp8pFfzr4Qb4TGNIyYQlWr76dasJHKBfQxXyoLaw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=7Cp9J//bQQUjc+F/H7wFhBgQLPh2oU3W65xAyFcURaU=;
 b=EePiwM2cYi467hhCc4Tr3739HmniYUrYerZO4b+iUQO8s2SVyYnANS3GUMxcHDpeDxDMC4gTttD9e7ybK1X35iZlHUHbUyRaBvcbz/Bq/yD3TJHf7kfcYrVLk7dJgGFWx0g9mWYuC5H4gSGcr696ucOtseDsxMfCa54APcEROLtjhbbVEjJgG+UbRCDE+FIJRX3BLWaEgPLfVITkJTWq6ZjW8NJ7nMA+dnGTrXpUsxs7v8/6lwCM76N1+yzKI5wWVBqVJK4DOJKoOPzjoBHcpACKIewo2FNXn13kWeESlWeJ92C7DW3ISGDs/X2pWQdLKlXT99MlLB5GilKyqZfP4g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=7Cp9J//bQQUjc+F/H7wFhBgQLPh2oU3W65xAyFcURaU=;
 b=OlNZsbifN9GNqFbo7IqmM62ZmkIZdyuQfbAfIT3zjfRs9nfaTwpO+0i1T+g/OF6c82xpBZ51g9TQIlBQv4ZW9vFbj3Fansw60a+QJv6Hn7K9tliFjPXtNUBWqvYFW90pz4utkbyMIUENjqqR1DN4yxzeChmku/Xn1ivdM9om7Ww=
Message-ID: <272a69ec-4cc8-f282-8499-88b24b61f130@oracle.com>
Date: Wed, 2 Mar 2022 21:11:24 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH v4 2/2] xen: delay xen_hvm_init_time_ops() if kdump is
 boot on vcpu>=32
Content-Language: en-US
To: Dongli Zhang <dongli.zhang@oracle.com>, xen-devel@lists.xenproject.org,
        x86@kernel.org
Cc: linux-kernel@vger.kernel.org, jgross@suse.com, sstabellini@kernel.org,
        tglx@linutronix.de, mingo@redhat.com, bp@alien8.de,
        dave.hansen@linux.intel.com, joe.jin@oracle.com
References: <20220302164032.14569-1-dongli.zhang@oracle.com>
 <20220302164032.14569-3-dongli.zhang@oracle.com>
 <bacae45c-9f8e-456b-1036-7f68e1e4374d@oracle.com>
 <0ac50fb6-0aca-e61a-1f38-8badbc8c967a@oracle.com>
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
In-Reply-To: <0ac50fb6-0aca-e61a-1f38-8badbc8c967a@oracle.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: BYAPR05CA0106.namprd05.prod.outlook.com
 (2603:10b6:a03:e0::47) To BLAPR10MB5009.namprd10.prod.outlook.com
 (2603:10b6:208:321::10)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 77bca3cd-1fc9-401d-842f-08d9fcbb2124
X-MS-TrafficTypeDiagnostic: MN2PR10MB3360:EE_
X-Microsoft-Antispam-PRVS: 
	<MN2PR10MB3360F6B4187F05F38BC139FC8A049@MN2PR10MB3360.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BLAPR10MB5009.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6486002)(6666004)(38100700002)(36756003)(6506007)(6512007)(31686004)(4326008)(508600001)(83380400001)(53546011)(44832011)(316002)(8936002)(86362001)(5660300002)(2616005)(107886003)(2906002)(26005)(66946007)(186003)(66556008)(66476007)(31696002)(8676002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?YWdhcUVjU2k1c2pvWHp5bjJoRklMUCs0Ni9JQmVGS2tWT2NGV3NlbnhjT1RE?=
 =?utf-8?B?SG5wVEIxTkRRc1MwMlhXVHBYUWdYdnRCUkM0VmtjeEF2ZzRUc2szYTFGM3ht?=
 =?utf-8?B?ZWRWRW8xRTZZMDJIdGdwRnhtN1BqMHpDMzFmN01yNFNPZ0htYnZqM3M1WnRh?=
 =?utf-8?B?RkdoYmYvdnpON0J3WStDUEhFYWJ2U2pYRTF6dWh6MndQcnVYRGtLSzRJZDhk?=
 =?utf-8?B?QXR3MzhtZnY1M3FBR3lKdGEzQ0pZV1Jkc0dGS1lGdW13TzFGNzFBVkl5WXl0?=
 =?utf-8?B?WnBzY3E0eS8zV0JlTnNmYjZQQlN3OW1RYW15QU9Ubmd3ZE5xZDNyWndTeEdV?=
 =?utf-8?B?LzEydGZCQVVzcyticlJ1Q0tkemxBSlBrcWNEQys5bncvZ2hDL3YrTU5JMTlG?=
 =?utf-8?B?Ris3aHA0OTd2V0JCZG5zc3dDNlJZQ0pRVWVOVlQ1WnNBRmdNVHlsV3FOMmJr?=
 =?utf-8?B?V29rKy9Qd2FSSG9ZZ0RHTXIyNHlTeUkweW83aGp6eUt6NjBCZ1E1ZUFDYjll?=
 =?utf-8?B?RG5PNGtoMWJmVHp2TTV0Wmc4SGp4eTJEakc1VFdlWUswN0pUWWxEejJZazBr?=
 =?utf-8?B?aC9UNnBSc2dFTjVld2l0OWRNQXNCSmd1YnNCMWVHanJuYXpKUkRObkcwWStv?=
 =?utf-8?B?a1FmT09oOGtPYWZubjZyZGd1SDQ2THRkMWszZStSajNuWWNYYjlTRTVVUTI4?=
 =?utf-8?B?dGVVZVJmUzZFQ1JxQTZqcG5Hb2UvWFdGb2dWTEFBRXVEVnZvaHB6UTllMnhx?=
 =?utf-8?B?RTYvc0FsMzc0OU5KUnQxcDFhUW9pMXpKVm1PeEYrN05LQnFVOFRTU0JvOGxC?=
 =?utf-8?B?ZmRMalFGMXIxRFUzanN1TTZBSnBpTUJjbGowOHpzZnB0ZnFLSGlmeEs4cVp1?=
 =?utf-8?B?WkFMaXdZR1VhV0hDdTAyT29Va0YwTkpHc3FIY0t4RVZLenA5Z0ZKVERhZ1dq?=
 =?utf-8?B?V2UvNVBlYWl0UlVnbVVLNStyWkVvck5GQUV3dHJUTGt1Yms0TEh6aGZRVlor?=
 =?utf-8?B?MnNRS3B6bzVCZ1o2ZGdVYlBCdzBkUk4xSEEwQ3VnU08yU0pDb2JrUmNGVU5M?=
 =?utf-8?B?MVVadkFGcldaR25aaEJnMzAvMjhUTFBOQ09PYnA2bzB3UWNZKy96R2FGeVpq?=
 =?utf-8?B?MTRrcEdsWGNzeEJtWllGUUl0V0xuZ3lFYUJGd3J1L3gzOGthNVBpWHhYZm02?=
 =?utf-8?B?Q1BoR2N1WWsweFc5T1NVek0yMWFpSHpKL2l3RFBxRE52ZWZkMFY4YjdsYjUw?=
 =?utf-8?B?TGJDMnB0M3cxQi9CQ0lneWJHdlo0ZjFlSDAzU1BhY210c1F5MTN6QVhyYjky?=
 =?utf-8?B?Sk9pcE4rM3FOcmZpSEdqejk1NUFXYUszS2t4SFRKN2xwbHdzNHlWSzRoMlV3?=
 =?utf-8?B?dUFpbFE3ckhrQ1VsL01oNVdlMXNtUWViSWJVVzNzTWZnWmdYN2VKRU0wQVBs?=
 =?utf-8?B?VUFnZHc0bHh6Z0tMUDJSRjhvckUwTjQ1Q1FhVHpVQ0Z5QTRVcnMzS040d3Vq?=
 =?utf-8?B?WXdTZlR4UVpOSUNtOHlBWGdLUTdBRitaSEx4WXNSbWNLblZncUJ2bmhpcFAw?=
 =?utf-8?B?WHF4blluNjRZOU1Xa1RNSlEzTThncGQzek1EeERhWkF5RUg1WUE1YTRZVGp6?=
 =?utf-8?B?RGVreWwyTGIwUjdsam5XM1pmZkY3eG55d3hBZnVpejFwYXV3WEJIbm9zWWJP?=
 =?utf-8?B?dHdZM0IrM1VSNWlONWplR1NSU3MxNHltUFpvU0RFc2F1L1dzWHo0V1JWWXFO?=
 =?utf-8?B?TmJVYUtVYjRTMlB5WkVzZlQ0bytTYmhxa3VGREJ1MlE5OWVFVGVwZ1dUZ0lk?=
 =?utf-8?B?TzVzbVZqN0d1MXVQWmxOZ1p0cVJjdXBkczlhRm9zd2l1c0MyMmllZm4xN2RL?=
 =?utf-8?B?WkFmYWhCZ29jRVd1eS80cXljeERzMzlSUGxlRksyQU90emFkRnBOL2tudTJU?=
 =?utf-8?B?SzIzaEdSMnVURG5lL2IvV25VMW5qVGRLTmVsTDNrYXR4NmcvdGVtNTVoZC80?=
 =?utf-8?B?bVRyRWFvQnpZZk82amsrd2VnU3ZIUFdQUjZkOW93UjZselpnZmcrTlQxSWU0?=
 =?utf-8?B?YzFZUmtXbkgzVUZHZUtXZ0hxOHF0MzZnRzByK3JMYU5kalRLMm1qNmVNeitY?=
 =?utf-8?B?a1A3dHRNWWx1ZmFaNCtIL0pyUEVObXpwUnMrZ3RlUTRLK3ZaQ3VlR01KYnlu?=
 =?utf-8?B?VmVmbmQzNDNGd3BrVytpaVIrM0FrdU5hOWRES3ZiY0djL0YvT282d2cyOW8z?=
 =?utf-8?Q?3syYcK7kTc2R05D0bAp+fFSqYBOLw87GV/PDt1rOZc=3D?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 77bca3cd-1fc9-401d-842f-08d9fcbb2124
X-MS-Exchange-CrossTenant-AuthSource: BLAPR10MB5009.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 02:11:29.6492
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: U0rI+WAK6xuLOk0GDXL9fWju2Y7G1Ur7TCVRYgCYWv0xvrobka8FDblNFf5QYMtVeD4M8beVJC602mJZCCcuBfQp7LLpbf3JnTYl6Pa96EY=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR10MB3360
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10274 signatures=686787
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 adultscore=0 bulkscore=0 phishscore=0
 malwarescore=0 mlxscore=0 suspectscore=0 spamscore=0 mlxlogscore=999
 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2201110000
 definitions=main-2203030007
X-Proofpoint-ORIG-GUID: DttzqhjGrek8svkoc2W8lyuqerD0Kmc1
X-Proofpoint-GUID: DttzqhjGrek8svkoc2W8lyuqerD0Kmc1


On 3/2/22 7:31 PM, Dongli Zhang wrote:
> Hi Boris,
>
> On 3/2/22 4:20 PM, Boris Ostrovsky wrote:
>> On 3/2/22 11:40 AM, Dongli Zhang wrote:
>>>    void __init xen_hvm_init_time_ops(void)
>>>    {
>>> +    static bool hvm_time_initialized;
>>> +
>>> +    if (hvm_time_initialized)
>>> +        return;
>>> +
>>>        /*
>>>         * vector callback is needed otherwise we cannot receive interrupts
>>>         * on cpu > 0 and at this point we don't know how many cpus are
>>>         * available.
>>>         */
>>>        if (!xen_have_vector_callback)
>>> -        return;
>>> +        goto exit;
>>
>> Why not just return? Do we expect the value of xen_have_vector_callback to change?
> I just want to keep above sync with ....
>
>>
>> -boris
>>
>>
>>>          if (!xen_feature(XENFEAT_hvm_safe_pvclock)) {
>>>            pr_info("Xen doesn't support pvclock on HVM, disable pv timer");
>>> +        goto exit;
>>> +    }
> ... here.
>
> That is, I want the main logic of xen_hvm_init_time_ops() to run for at most
> once. Both of above two if statements will "go to exit".


I didn't notice this actually.


I think both of them should return early, there is no reason to set hvm_time_initialized to true when, in fact, we have not initialized anything. And to avoid printing the warning twice we can just replace it with pr_info_once().


I can fix it up when committing so no need to resend. So unless you disagree


Reviewed-by: Boris Ostrovsky <boris.ostrovsky@oracle.com>


> Thank you very much!
>
> Dongli Zhang
>
>>> +
>>> +    /*
>>> +     * Only MAX_VIRT_CPUS 'vcpu_info' are embedded inside 'shared_info'.
>>> +     * The __this_cpu_read(xen_vcpu) is still NULL when Xen HVM guest
>>> +     * boots on vcpu >= MAX_VIRT_CPUS (e.g., kexec), To access
>>> +     * __this_cpu_read(xen_vcpu) via xen_clocksource_read() will panic.
>>> +     *
>>> +     * The xen_hvm_init_time_ops() should be called again later after
>>> +     * __this_cpu_read(xen_vcpu) is available.
>>> +     */
>>> +    if (!__this_cpu_read(xen_vcpu)) {
>>> +        pr_info("Delay xen_init_time_common() as kernel is running on
>>> vcpu=%d\n",
>>> +            xen_vcpu_nr(0));
>>>            return;
>>>        }
>>>    @@ -577,6 +597,9 @@ void __init xen_hvm_init_time_ops(void)
>>>        x86_cpuinit.setup_percpu_clockev = xen_hvm_setup_cpu_clockevents;
>>>          x86_platform.set_wallclock = xen_set_wallclock;
>>> +
>>> +exit:
>>> +    hvm_time_initialized = true;
>>>    }
>>>    #endif
>>>    


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 02:12:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 02:12:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282694.481498 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPaxU-0008Ek-I9; Thu, 03 Mar 2022 02:12:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282694.481498; Thu, 03 Mar 2022 02:12:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPaxU-0008Ed-Eh; Thu, 03 Mar 2022 02:12:48 +0000
Received: by outflank-mailman (input) for mailman id 282694;
 Thu, 03 Mar 2022 02:12:47 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=HbtR=TO=arm.com=Wei.Chen@srs-se1.protection.inumbo.net>)
 id 1nPaxT-0008EP-ES
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 02:12:47 +0000
Received: from EUR03-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur03on062d.outbound.protection.outlook.com
 [2a01:111:f400:fe09::62d])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 69bdf03b-9a97-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 03:12:45 +0100 (CET)
Received: from AM6P193CA0128.EURP193.PROD.OUTLOOK.COM (2603:10a6:209:85::33)
 by VI1PR08MB2799.eurprd08.prod.outlook.com (2603:10a6:802:19::20) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 02:12:30 +0000
Received: from VE1EUR03FT023.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:85:cafe::11) by AM6P193CA0128.outlook.office365.com
 (2603:10a6:209:85::33) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Thu, 3 Mar 2022 02:12:30 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT023.mail.protection.outlook.com (10.152.18.133) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Thu, 3 Mar 2022 02:12:29 +0000
Received: ("Tessian outbound 1f399c739551:v113");
 Thu, 03 Mar 2022 02:12:28 +0000
Received: from ec8e0ad5cd7e.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 25B6611A-C7F6-4CAE-8669-1212A4B22BB3.1; 
 Thu, 03 Mar 2022 02:12:22 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id ec8e0ad5cd7e.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 03 Mar 2022 02:12:22 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com (2603:10a6:102:2b9::9)
 by DB9PR08MB7006.eurprd08.prod.outlook.com (2603:10a6:10:2c7::11)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 02:12:20 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa]) by PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa%4]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 02:12:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 69bdf03b-9a97-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=uIf3DprJ7pAAnylsAjvRp7di/U2IiOMoLYRiDUKBxMY=;
 b=1ZMe/umpJEF1CsIDC8gfEiP0kilfxGmjTY4l+gKHbPozGhUuqos7K8GCFZ09TYcarkJl/fPkaZEVdkw8gSv3pkIAO8sLbb2FGCT2DNMFPOUyrcSoaiR5MsWrn8iKegKGS5MZy01EfUM+zA/ynQmVo4CoAGPGYe9t1lhj8p6Cg2w=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=FXAUcx0KwgHqps/OaslhDqJtkH0QtHIsDwUrao3sk97kiBTkY+Q/EQh516QzmXlWXibGfHf5hkqrM5EHC0QvlNVqlqaG4SI3jx9g72pC/myN40r0xm8xpbbEDQ8/u5bOH2DwmBMEg6Jnr83vgRM7nKy1ajfHe9eZGFysT1hdogL31Oo4HFEnxVssSxlXYaTUVqapb0F+fk9XzclzwIii1uKd8aNsdMOxysdxxfoR7EacaoDCMjzajrwkbwopUrMB0v5XRqd9bI3RUemjRWAr91nj0na9KnKj65gLN/AWIRGa+ZOYb5WXu7YKCQiwLu4V3z730SrTwK+WjsEiFN5nPA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=uIf3DprJ7pAAnylsAjvRp7di/U2IiOMoLYRiDUKBxMY=;
 b=W/n5InJzJAaGsevCicPdmCOaiOy9huhz5KOSsie9YG84FW74BfOff5tA708PBl87AWei5lfAkQeiAlpizKc59OxyFPg7tiXJSsgH7M9/b+gzCfFed9ygf+DhoZl5My9QVDr9SOyCYqPrYK/1W57s0gbAds+xC5hg+aGjKUS3pDAhL+YlfHNuuaabsNosZ1fEaKJDZcoKIcTg0+ak3/x1OEuIUegHmLdIbEjCRF6WZrMR4plSxQzrpLhCwnX1F/xV0GK5uwzzhGxAfHAPAqUd4kANMiRm1kpX2iN8EuEXBmp80ZoCEiQ+GZqKKd/06WUgKLvjRMYzlaxKdgEzidm7zw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=uIf3DprJ7pAAnylsAjvRp7di/U2IiOMoLYRiDUKBxMY=;
 b=1ZMe/umpJEF1CsIDC8gfEiP0kilfxGmjTY4l+gKHbPozGhUuqos7K8GCFZ09TYcarkJl/fPkaZEVdkw8gSv3pkIAO8sLbb2FGCT2DNMFPOUyrcSoaiR5MsWrn8iKegKGS5MZy01EfUM+zA/ynQmVo4CoAGPGYe9t1lhj8p6Cg2w=
From: Wei Chen <Wei.Chen@arm.com>
To: Stefano Stabellini <sstabellini@kernel.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	"julien@xen.org" <julien@xen.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, Penny Zheng <Penny.Zheng@arm.com>, Henry Wang
	<Henry.Wang@arm.com>, nd <nd@arm.com>, "George.Dunlap@citrix.com"
	<George.Dunlap@citrix.com>
Subject: RE: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Topic: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Index:
 AdgpQxtXwh7LkfydTgiYk9bhMgU+ogAn0mUAABEK2UAAHxozAACs/mTQABukuQAADud+gAAh4EYAAARjx9AAAiyhgAAAI+eQ
Date: Thu, 3 Mar 2022 02:12:19 +0000
Message-ID:
 <PAXPR08MB74201359DCAD8467EFDE24969E049@PAXPR08MB7420.eurprd08.prod.outlook.com>
References:
 <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2202241606450.239973@ubuntu-linux-20-04-desktop>
 <AS1PR08MB74269923288B75097392BDD99E3E9@AS1PR08MB7426.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2202251214210.239973@ubuntu-linux-20-04-desktop>
 <PAXPR08MB742081D5E3C94801350C4A739E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2203011455500.3261@ubuntu-linux-20-04-desktop>
 <PAXPR08MB74201779FC92E734A5107B769E039@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2203021454090.3261@ubuntu-linux-20-04-desktop>
 <PAXPR08MB742017360AAF65AC2CCB1DF49E049@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2203021751222.3261@ubuntu-linux-20-04-desktop>
In-Reply-To:
 <alpine.DEB.2.22.394.2203021751222.3261@ubuntu-linux-20-04-desktop>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: B81200423215694F95CEC5FA6F335A6A.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 06bff5a4-147d-46e6-400e-08d9fcbb44bc
x-ms-traffictypediagnostic:
	DB9PR08MB7006:EE_|VE1EUR03FT023:EE_|VI1PR08MB2799:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR08MB27999CA371F9F66B71B802499E049@VI1PR08MB2799.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAXPR08MB7420.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(8936002)(38070700005)(5660300002)(66946007)(4326008)(76116006)(508600001)(30864003)(966005)(52536014)(7696005)(186003)(26005)(33656002)(38100700002)(122000001)(64756008)(8676002)(66476007)(66446008)(6506007)(2906002)(55016003)(66556008)(53546011)(9686003)(71200400001)(316002)(6916009)(86362001)(54906003)(83380400001)(139555002);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR08MB7006
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT023.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	dec5d061-a3ff-4e2c-4757-08d9fcbb3f5e
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(6862004)(8676002)(33656002)(4326008)(36860700001)(966005)(81166007)(70206006)(2906002)(82310400004)(70586007)(53546011)(356005)(6506007)(7696005)(9686003)(107886003)(52536014)(508600001)(83380400001)(336012)(8936002)(86362001)(54906003)(30864003)(26005)(186003)(5660300002)(40460700003)(316002)(47076005)(55016003)(139555002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 02:12:29.0501
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 06bff5a4-147d-46e6-400e-08d9fcbb44bc
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT023.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB2799
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From xen-devel-bounces@lists.xenproject.org Thu Mar 03 02:13:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 02:13:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282703.481509 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPayA-0000RG-Vw; Thu, 03 Mar 2022 02:13:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282703.481509; Thu, 03 Mar 2022 02:13:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPayA-0000R9-SZ; Thu, 03 Mar 2022 02:13:30 +0000
Received: by outflank-mailman (input) for mailman id 282703;
 Thu, 03 Mar 2022 02:13:29 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPay9-0000Qv-2d; Thu, 03 Mar 2022 02:13:29 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPay8-0001Ry-WA; Thu, 03 Mar 2022 02:13:29 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPay8-00050C-EJ; Thu, 03 Mar 2022 02:13:28 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPay8-00022s-C3; Thu, 03 Mar 2022 02:13:28 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=wpUMiwfdr2+KuIUORRAEzpjtpbYCXBafGJxpKRWJGHU=; b=Cm65CCfWgOXbm0abKIPI4C/WJ4
	Djh2rrbIFLhqWLFAG399Kb2TAqlDfzaYCr4XEicSUAIuCQ9yW99JBJtiOt2tlII1njw9mMCiOtB38
	e7K6dJBTOK+3EtdihVvFMISOKsZGM1EAHhZbdVudktVAsqkg06j4GdN9sAR/ZLc8WT98=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168334-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-5.4 test] 168334: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-5.4:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:debian-hvm-install:fail:heisenbug
    linux-5.4:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:allowable
    linux-5.4:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=866ae42cf4788c8b18de6bda0a522362702861d7
X-Osstest-Versions-That:
    linux=b6e8856b8a5f7fb8b2fc10636aa05cffed1781b9
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 03 Mar 2022 02:13:28 +0000

flight 168334 linux-5.4 real [real]
flight 168353 linux-5.4 real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168334/
http://logs.test-lab.xenproject.org/osstest/logs/168353/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm 12 debian-hvm-install fail pass in 168353-retest

Regressions which are regarded as allowable (not blocking):
 test-armhf-armhf-xl-rtds    18 guest-start/debian.repeat fail REGR. vs. 168206

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168206
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168206
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168206
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168206
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168206
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168206
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168206
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168206
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168206
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168206
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168206
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168206
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass

version targeted for testing:
 linux                866ae42cf4788c8b18de6bda0a522362702861d7
baseline version:
 linux                b6e8856b8a5f7fb8b2fc10636aa05cffed1781b9

Last test of basis   168206  2022-02-23 11:14:00 Z    7 days
Testing same since   168334  2022-03-02 11:11:31 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Al Viro <viro@zeniv.linux.org.uk>
  Alessandro B Maurici <abmaurici@gmail.com>
  Alex Deucher <alexander.deucher@amd.com>
  Alexey Bayduraev <alexey.v.bayduraev@linux.intel.com>
  Ariel Levkovich <lariel@nvidia.com>
  Arnaldo Carvalho de Melo <acme@redhat.com>
  Baokun Li <libaokun1@huawei.com>
  Bart Van Assche <bvanassche@acm.org>
  Brian Geffon <bgeffon@google.com>
  Carel Si <beibei.si@intel.com>
  ChenXiaoSong <chenxiaosong2@huawei.com>
  Christoph Hellwig <hch@lst.de>
  Christophe JAILLET <christophe.jaillet@wanadoo.fr>
  Christophe Leroy <christophe.leroy@csgroup.eu>
  Cosmin Tanislav <cosmin.tanislav@analog.com>
  Cosmin Tanislav <demonsingur@gmail.com>
  Daehwan Jung <dh10.jung@samsung.com>
  Damien Le Moal <damien.lemoal@opensource.wdc.com>
  Dan Carpenter <dan.carpenter@oracle.com>
  Daniel Borkmann <daniel@iogearbox.net>
  Daniel Bristot de Oliveira <bristot@kernel.org>
  Daniel Starke <daniel.starke@siemens.com>
  daniel.starke@siemens.com <daniel.starke@siemens.com>
  Daniele Palmas <dnlplm@gmail.com>
  dann frazier <dann.frazier@canonical.com>
  Dave Hansen <dave.hansen@linux.intel.com>
  David S. Miller <davem@davemloft.net>
  Dmytro Bagrii <dimich.dmb@gmail.com>
  Eric Dumazet <edumazet@google.com>
  Evan Quan <evan.quan@amd.com>
  Felix Maurer <fmaurer@redhat.com>
  Florian Fainelli <f.fainelli@gmail.com>
  Florian Westphal <fw@strlen.de>
  Gal Pressman <gal@nvidia.com>
  Greg Kroah-Hartman <gregkh@linuxfoundation.org>
  Guenter Roeck <linux@roeck-us.net>
  Hans de Goede <hdegoede@redhat.com>
  Heiner Kallweit <hkallweit1@gmail.com>
  Helge Deller <deller@gmx.de>
  Hongyu Xie <xiehongyu1@kylinos.cn>
  Jakub Kicinski <kuba@kernel.org>
  Jason Gunthorpe <jgg@nvidia.com>
  Jason Wang <jasowang@redhat.com>
  Jens Wiklander <jens.wiklander@linaro.org>
  Jiri Olsa <jolsa@kernel.org>
  Johan Hovold <johan@kernel.org>
  John Fastabend <john.fastabend@gmail.com>
  Jon Hunter <jonathanh@nvidia.com>
  Jonathan Cameron <Jonathan.Cameron@huawei.com>
  Karol Herbst <kherbst@redhat.com>
  Laibin Qiu <qiulaibin@huawei.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Linus Walleij <linus.walleij@linaro.org>
  Linux Kernel Functional Testing <lkft@linaro.org>
  Maor Gottlieb <maorg@nvidia.com>
  Marc Zyngier <maz@kernel.org>
  Marek Szyprowski <m.szyprowski@samsung.com>
  Mark Brown <broonie@kernel.org>
  Mathias Nyman <mathias.nyman@linux.intel.com>
  Maxime Ripard <maxime@cerno.tech>
  Miaohe Lin <linmiaohe@huawei.com>
  Miaoqian Lin <linmq006@gmail.com>
  Mike Rapoport <rppt@linux.ibm.com>
  Oliver Neukum <oneukum@suse.com>
  Pablo Neira Ayuso <pablo@netfilter.org>
  Paul Blakey <paulb@nvidia.com>
  Puma Hsu <pumahsu@google.com>
  Saeed Mahameed <saeedm@nvidia.com>
  Sasha Levin <sashal@kernel.org>
  Sebastian Andrzej Siewior <bigeasy@linutronix.de>
  Sergey Shtylyov <s.shtylyov@omp.ru>
  Shuah Khan <skhan@linuxfoundation.org>
  Siarhei Volkau <lis8215@gmail.com>
  Simon Horman <simon.horman@corigine.com>
  Slade Watkins <slade@sladewatkins.com>
  Slark Xiao <slark_xiao@163.com>
  Stefano Garzarella <sgarzare@redhat.com>
  Stephen Boyd <sboyd@kernel.org>
  Steven Rostedt (Google) <rostedt@goodmis.org>
  Sudip Mukherjee <sudip.mukherjee@codethink.co.uk>
  Szymon Heidrich <szymon.heidrich@gmail.com>
  Tao Liu <thomas.liu@ucloud.cn>
  Tejun Heo <tj@kernel.org>
  Waiman Long <longman@redhat.com>
  Willis Kung <williskung@google.com>
  Xiaoke Wang <xkernel.wang@foxmail.com>
  Xin Long <lucien.xin@gmail.com>
  Yonghong Song <yhs@fb.com>
  Zhang Qiao <zhangqiao22@huawei.com>
  Zhou Qingyang <zhou1615@umn.edu>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 fail    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   b6e8856b8a5f..866ae42cf478  866ae42cf4788c8b18de6bda0a522362702861d7 -> tested/linux-5.4


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 02:15:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 02:15:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282715.481520 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPb0T-00019S-Dt; Thu, 03 Mar 2022 02:15:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282715.481520; Thu, 03 Mar 2022 02:15:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPb0T-00019L-Au; Thu, 03 Mar 2022 02:15:53 +0000
Received: by outflank-mailman (input) for mailman id 282715;
 Thu, 03 Mar 2022 02:15:52 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=tUyt=TO=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nPb0R-00019F-VB
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 02:15:52 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org
 [2604:1380:4641:c500::1])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d68a1c65-9a97-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 03:15:50 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id A17F961633;
 Thu,  3 Mar 2022 02:15:46 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 94134C004E1;
 Thu,  3 Mar 2022 02:15:45 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d68a1c65-9a97-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646273746;
	bh=GGYDsx7d7bMm8qAaVR61BYim2Ltllkah0XdFKmQRotM=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=tLA9k2CVLSFEW94D8J7G6RKmNhL39bextTr8GzUeqiFczISoJ+gHbeCD5CTrjzsdC
	 sDrzcFeKI5tMJJ0BOQi1apOiT/Iv8ogySL5P+lMkTPLfNZ8A7mkhXSAWhz4BOSygVa
	 8++LrqXkgLyI9tS3DgghD8JCrvTjiwYdTCYfuqUAFCRn57UtMTGAQn5IKdzriOhX6Y
	 CMkzazpYvENEQT/9FRDTQGI+wN5MDp7ZjaCQo4BNAA9fZZ38OJ8L0IOCLVV3ewuTOQ
	 hu3JXsxs6swEdFhmwCK5R/8WKU9+ZO0vme3YrCItVhLh2jUSrc2Q0bvCoAulRyrBqi
	 arPWUMTdqQniA==
Date: Wed, 2 Mar 2022 18:15:44 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Wei Chen <Wei.Chen@arm.com>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, 
    "julien@xen.org" <julien@xen.org>, 
    Bertrand Marquis <Bertrand.Marquis@arm.com>, 
    Penny Zheng <Penny.Zheng@arm.com>, Henry Wang <Henry.Wang@arm.com>, 
    nd <nd@arm.com>, "George.Dunlap@citrix.com" <George.Dunlap@citrix.com>
Subject: RE: Proposal for Porting Xen to Armv8-R64 - DraftA
In-Reply-To: <PAXPR08MB74201359DCAD8467EFDE24969E049@PAXPR08MB7420.eurprd08.prod.outlook.com>
Message-ID: <alpine.DEB.2.22.394.2203021813460.3261@ubuntu-linux-20-04-desktop>
References: <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com> <alpine.DEB.2.22.394.2202241606450.239973@ubuntu-linux-20-04-desktop> <AS1PR08MB74269923288B75097392BDD99E3E9@AS1PR08MB7426.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2202251214210.239973@ubuntu-linux-20-04-desktop> <PAXPR08MB742081D5E3C94801350C4A739E029@PAXPR08MB7420.eurprd08.prod.outlook.com> <alpine.DEB.2.22.394.2203011455500.3261@ubuntu-linux-20-04-desktop>
 <PAXPR08MB74201779FC92E734A5107B769E039@PAXPR08MB7420.eurprd08.prod.outlook.com> <alpine.DEB.2.22.394.2203021454090.3261@ubuntu-linux-20-04-desktop> <PAXPR08MB742017360AAF65AC2CCB1DF49E049@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2203021751222.3261@ubuntu-linux-20-04-desktop> <PAXPR08MB74201359DCAD8467EFDE24969E049@PAXPR08MB7420.eurprd08.prod.outlook.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="8323329-832106708-1646273746=:3261"

  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--8323329-832106708-1646273746=:3261
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8BIT

On Thu, 3 Mar 2022, Wei Chen wrote:
> > On Thu, 3 Mar 2022, Wei Chen wrote:
> > > > On Wed, 2 Mar 2022, Wei Chen wrote:
> > > > > > > > > > If not, and considering that we have to generate
> > > > > > > > > > ARM_MPU_*_MEMORY_START/END anyway at build time, would it
> > make
> > > > > > sense
> > > > > > > > to
> > > > > > > > > > also generate mpu,guest-memory-section, xen,static-mem,
> > etc.
> > > > at
> > > > > > build
> > > > > > > > > > time rather than passing it via device tree to Xen at
> > runtime?
> > > > > > > > > >
> > > > > > > > >
> > > > > > > > > Did you mean we still add these information in device tree,
> > but
> > > > for
> > > > > > > > build
> > > > > > > > > time only. In runtime we don't parse them?
> > > > > > > >
> > > > > > > > Yes, something like that, but see below.
> > > > > > > >
> > > > > > > >
> > > > > > > > > > What's the value of doing ARM_MPU_*_MEMORY_START/END at
> > build
> > > > time
> > > > > > and
> > > > > > > > > > everything else at runtime?
> > > > > > > > >
> > > > > > > > > ARM_MPU_*_MEMORY_START/END is defined by platform. But other
> > > > things
> > > > > > are
> > > > > > > > > users customized. They can change their usage without
> > rebuild
> > > > the
> > > > > > image.
> > > > > > > >
> > > > > > > > Good point.
> > > > > > > >
> > > > > > > > We don't want to have to rebuild Xen if the user updated a
> > guest
> > > > > > kernel,
> > > > > > > > resulting in a larger boot-module-section.
> > > > > > > >
> > > > > > > > So I think it makes sense that "mpu,boot-module-section" is
> > > > generated
> > > > > > by
> > > > > > > > the scripts (e.g. ImageBuilder) at build time, and Xen reads
> > the
> > > > > > > > property at boot from the runtime device tree.
> > > > > > > >
> > > > > > > > I think we need to divide the information into two groups:
> > > > > > > >
> > > > > > > >
> > > > > > > > # Group1: board info
> > > > > > > >
> > > > > > > > This information is platform specific and it is not meant to
> > > > change
> > > > > > > > depending on the VM configuration. Ideally, we build Xen for a
> > > > > > platform
> > > > > > > > once, then we can use the same Xen binary together with any
> > > > > > combination
> > > > > > > > of dom0/domU kernels and ramdisks.
> > > > > > > >
> > > > > > > > This kind of information doesn't need to be exposed to the
> > runtime
> > > > > > > > device tree. But we can still use a build-time device tree to
> > > > generate
> > > > > > > > the addresses if it is convenient.
> > > > > > > >
> > > > > > > > XEN_START_ADDRESS, ARM_MPU_DEVICE_MEMORY_*, and
> > > > > > ARM_MPU_NORMAL_MEMORY_*
> > > > > > > > seem to be part of this group.
> > > > > > > >
> > > > > > >
> > > > > > > Yes.
> > > > > > >
> > > > > > > >
> > > > > > > > # Group2: boot configuration
> > > > > > > >
> > > > > > > > This information is about the specific set of binaries and VMs
> > > > that we
> > > > > > > > need to boot. It is conceptually similar to the dom0less
> > device
> > > > tree
> > > > > > > > nodes that we already have. If we change one of the VM
> > binaries,
> > > > we
> > > > > > > > likely have to refresh the information here.
> > > > > > > >
> > > > > > > > "mpu,boot-module-section" probably belongs to this group
> > (unless
> > > > we
> > > > > > find
> > > > > > > > a way to define "mpu,boot-module-section" generically so that
> > we
> > > > don't
> > > > > > > > need to change it any time the set of boot modules change.)
> > > > > > > >
> > > > > > > >
> > > > > > >
> > > > > > > I agree.
> > > > > > >
> > > > > > > > > > It looks like we are forced to have the sections
> > definitions
> > > > at
> > > > > > build
> > > > > > > > > > time because we need them before we can parse device tree.
> > In
> > > > that
> > > > > > > > case,
> > > > > > > > > > we might as well define all the sections at build time.
> > > > > > > > > >
> > > > > > > > > > But I think it would be even better if Xen could
> > automatically
> > > > > > choose
> > > > > > > > > > xen,static-mem, mpu,guest-memory-section, etc. on its own
> > > > based on
> > > > > > the
> > > > > > > > > > regular device tree information (/memory, /amba, etc.),
> > > > without
> > > > > > any
> > > > > > > > need
> > > > > > > > > > for explicitly describing each range with these new
> > properties.
> > > > > > > > > >
> > > > > > > > >
> > > > > > > > > for mpu,guest-memory-section, with the limitations: no other
> > > > usage
> > > > > > > > between
> > > > > > > > > different guest' memory nodes, this is OK. But for
> > xen,static-
> > > > mem
> > > > > > (heap),
> > > > > > > > > we just want everything on a MPU system is dertermistic. But,
> > of
> > > > > > course
> > > > > > > > Xen
> > > > > > > > > can select left memory for heap without static-mem.
> > > > > > > >
> > > > > > > > It is good that you think they can be chosen by Xen.
> > > > > > > >
> > > > > > > > Differently from "boot-module-section", which has to do with
> > the
> > > > boot
> > > > > > > > modules selected by the user for a specific execution,
> > > > > > > > guest-memory-section and static-mem are Xen specific memory
> > > > > > > > policies/allocations.
> > > > > > > >
> > > > > > > > A user wouldn't know how to fill them in. And I worry that
> > even a
> > > > > > script
> > > > > > >
> > > > > > > But users should know it, because static-mem for guest must be
> > > > allocated
> > > > > > > in this range. And users take the responsibility to set the
> > DomU's
> > > > > > > static allocate memory ranges.
> > > > > >
> > > > > > Let me premise that my goal is to avoid having many users
> > reporting
> > > > > > errors to xen-devel and xen-users when actually it is just a wrong
> > > > > > choice of addresses.
> > > > > >
> > > > > > I think we need to make a distinction between addresses for the
> > boot
> > > > > > modules, e.g. addresses where to load xen, the dom0/U kernel,
> > dom0/U
> > > > > > ramdisk in memory at boot time, and VM static memory addresses.
> > > > > >
> > > > > > The boot modules addresses are particularly difficult to fill in
> > > > because
> > > > > > they are many and a small update in one of the modules could
> > > > invalidate
> > > > > > all the other addresses. This is why I ended up writing
> > ImageBuilder.
> > > > > > Since them, I received several emails from users thanking me for
> > > > > > ImageBuilder :-)
> > > > > >
> > > > >
> > > > > Thanks +999 😊
> > > > >
> > > > >
> > > > > > The static VM memory addresses (xen,static-mem) should be a bit
> > easier
> > > > > > to fill in correctly. They are meant to be chosen once, and it
> > > > shouldn't
> > > > > > happen that an update on a kernel forces the user to change all
> > the VM
> > > > > > static memory addresses. Also, I know that some users actually
> > want to
> > > > > > be able to choose the domU addresses by hand because they have
> > > > specific
> > > > > > needs. So it is good that we can let the user choose the addresses
> > if
> > > > > > they want to.
> > > > > >
> > > > >
> > > > > Yes.
> > > > >
> > > > > > With all of that said, I do think that many users won't have an
> > > > opinion
> > > > > > on the VM static memory addresses and won't know how to choose
> > them.
> > > > > > It would be error prone to let them try to fill them in by hand.
> > So I
> > > > > > was already planning on adding support to ImageBuilder to
> > > > automatically
> > > > > > generate xen,static-mem for dom0less domains.
> > > > > >
> > > > >
> > > > > Let me make sure that's what you said: Users give an VM memory size
> > to
> > > > > ImageBuilder, and ImageBuilder will generate xen,static-mem = <start,
> > > > size>.
> > > > > For specific VM, ImageBuilder also can accept start and size as
> > inputs?
> > > > >
> > > > > Do I understand this correctly?
> > > >
> > > > Yes, exactly
> > > >
> > > >
> > > > > > Going back to this specific discussion about boot-module-section:
> > I
> > > > can
> > > > > > see now that, given xen,static-mem is chosen by ImageBuilder (or
> > > > >
> > > > > By hand : )
> > > > >
> > > > > > similar) and not Xen, then it makes sense to have ImageBuilder (or
> > > > > > similar) also generate boot-module-section.
> > > > > >
> > > > >
> > > > > If my above understanding is right, then yes.
> > > >
> > > > Yes, I think we are on the same page
> > > >
> > > >
> > > > > > > > like ImageBuilder wouldn't be the best place to pick these
> > values
> > > > --
> > > > > > > > they seem too "important" to leave to a script.
> > > > > > > >
> > > > > > > > But it seems possible to choose the values in Xen:
> > > > > > > > - Xen knows ARM_MPU_NORMAL_MEMORY_* because it was defined at
> > > > build
> > > > > > time
> > > > > > > > - Xen reads boot-module-section from device tree
> > > > > > > >
> > > > > > > > It should be possible at this point for Xen to pick the best
> > > > values
> > > > > > for
> > > > > > > > guest-memory-section and static-mem based on the memory
> > available.
> > > > > > > >
> > > > > > >
> > > > > > > How Xen to pick? Does it mean in static allocation DomU DT node,
> > we
> > > > just
> > > > > > > need a size, but don't require a start address for static-mem?
> > > > > >
> > > > > > Yes the idea was that the user would only provide the size (e.g.
> > > > > > DOMU_STATIC_MEM[1]=1024) and the addresses would be automatically
> > > > > > calculated. But I didn't mean to change the existing xen,static-
> > mem
> > > > > > device tree bindings. So it is best if the xen,static-mem
> > addresses
> > > > > > generation is done by ImageBuilder (or similar tool) instead of
> > Xen.
> > > > > >
> > > > >
> > > > > If we still keep the option for user to specify the start and size
> > > > > parameters for VM memory, because it maybe very important for a
> > > > > deterministic system (fully static system), I agree with you.
> > > > >
> > > > > And in current static-allocation, I think Xen doesn't generate
> > > > > xen,static-mem addresses, all by hands...
> > > >
> > > > Yeah
> > > >
> > >
> > > I will update my proposal to cover our above discussion, but I forgot
> > one
> > > thing. As the platform header files will be generated from DTS, does it
> > > mean we have to maintain platform dts files in Xen like what Zephyr has
> > > done?
> > 
> > I would prefer not to have to maintain platform dts files in Xen like
> > Zephyr is doing. Ideally, the user should be able to take any
> > spec-compliant device tree file and use it. I would say: let's start
> > without adding the dts files to Xen (we might have one under docs/ but
> > just as an example.) We can add them later if the need arise.
> > 
> 
> But without any default dts, that means we can't start to build Xen for
> v8R? It seems in this case, we need Makefile to print some message to
> tell users to specific his/her dts path.
 
Yes, exactly.



> > > And do you have some idea to integrate the "ImageBuilder"? Make it
> > > as a submodule of Xen or integrate to xen-tools?
> > 
> > I think it would be best if ImageBuilder was kept as a separate
> > repository because there should be no strong ties between ImageBuilder
> > versions and Xen versions. It is more convenient to handle it in a
> > separate repository, especially as Yocto and other build systems might
> > clone ImageBuilder during the build to generate boot.scr (it is already
> > the case).
> > 
> > That said, it might be good to make it more "official" but moving it to
> > Xen Project. I can talk to George about creating
> > http://xenbits.xen.org/git-http/imagebuilder.git or
> > https://gitlab.com/xen-project/imagebuilder.
> 
> That's good : )
--8323329-832106708-1646273746=:3261--


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 03:08:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 03:08:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282725.481531 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPbpa-0008JX-Ks; Thu, 03 Mar 2022 03:08:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282725.481531; Thu, 03 Mar 2022 03:08:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPbpa-0008JQ-Hb; Thu, 03 Mar 2022 03:08:42 +0000
Received: by outflank-mailman (input) for mailman id 282725;
 Thu, 03 Mar 2022 03:08:41 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=7Xx6=TO=oracle.com=dongli.zhang@srs-se1.protection.inumbo.net>)
 id 1nPbpZ-0008JK-7f
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 03:08:41 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 37a20954-9a9f-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 04:08:39 +0100 (CET)
Received: from pps.filterd (m0246632.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 222LxKVP003862; 
 Thu, 3 Mar 2022 03:08:19 GMT
Received: from userp3030.oracle.com (userp3030.oracle.com [156.151.31.80])
 by mx0b-00069f02.pphosted.com with ESMTP id 3ehh2enhec-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Thu, 03 Mar 2022 03:08:18 +0000
Received: from pps.filterd (userp3030.oracle.com [127.0.0.1])
 by userp3030.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 2233644T090987;
 Thu, 3 Mar 2022 03:08:17 GMT
Received: from nam11-bn8-obe.outbound.protection.outlook.com
 (mail-bn8nam11lp2171.outbound.protection.outlook.com [104.47.58.171])
 by userp3030.oracle.com with ESMTP id 3ef9b295es-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Thu, 03 Mar 2022 03:08:17 +0000
Received: from BYAPR10MB2663.namprd10.prod.outlook.com (2603:10b6:a02:a9::20)
 by BLAPR10MB5266.namprd10.prod.outlook.com (2603:10b6:208:331::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 03:08:15 +0000
Received: from BYAPR10MB2663.namprd10.prod.outlook.com
 ([fe80::a0d5:610d:bcf:9b47]) by BYAPR10MB2663.namprd10.prod.outlook.com
 ([fe80::a0d5:610d:bcf:9b47%4]) with mapi id 15.20.5017.027; Thu, 3 Mar 2022
 03:08:15 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 37a20954-9a9f-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=subject : to : cc :
 references : from : message-id : date : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=0JKAGs3MiNxef5GYhfLD8+bmnlGOpcQDgUTuRCZOkVk=;
 b=XusE4418O5AjnPl6RSRLx2MWuuij592HiHb0iB2zb8omhfXULsQ++1b/tnnrVEgSjlFJ
 rQhiLFbQvT8Dw5+BHPnrxCHwZDC8FbKGHr9RSh/Dy/YdANXn8yCduaL1R6Af9+1FGJB+
 qNOEww3XYNkH9nLKIBSTDesrhcpnI4M6jBTvzHsGFhxaUtNAysZ+lKwyh/GkTqcEnJXF
 wobT+uo/a9U2JcTvtbA0eZsG8yuenAEKI95EIQSxqxbfAr3c10s7Qu6BcU1WJV7dso93
 8Z5C77qYPPtPWL5ZTwGb4N9pIP7G9iR+UxEIpsO+3yU0RpENe23gPNXZtcBLxL1/xkSV vw== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=dQUfFNJgq+r4bL4YenYyxXOEwMsqlAX83ZK052o1N+lKF8WbxUAA/5OXcZUx7kLxrfGiUQmrKDeOLrAgeZskPGEXnG7Dtz0Px4qRCdGNCHqmEMOay0QQKeIKzIAHjyR4CwyMCeZXf5off2/aClgYrIlvh63V3c2gvymFynXtnMlBVrlGJzw1LlmkueMUEnXDNd4Jn4V82cChJ1fdoGSkboHyyvdM8NVO9wRNxvbwD70kLohaIWnla59uT/aHsgEzQ5TMSozjkY5zQthi+ZxwuubTJeNovYFWlFkJbmLXqIoNaYJedZy7yqkbb1NR4V7okmv1CDD1iakNnrtH+nVZvA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=0JKAGs3MiNxef5GYhfLD8+bmnlGOpcQDgUTuRCZOkVk=;
 b=g9vZ60U9ynTe6fB6dYOjiy59KGaPYx3vJB2sgsBQpVKkXKfYv67Yjf7jJG7DxRU9jvKsAM7FAQqmLDEMVIFKqo29mi6OLKT1rYr3vFAw2aeWS+zXz3WaHQ6DSQqyiiD4TxjsS3ZT6Va6XqcU5yDHg8R00jXIlGI1jLY4HgXG5FJ2eoQq1lqXp+seRkLIpirMesi7SUl6BllLD9ozfrkTNbwC7C78+NVRUU1Qr1j6UrMtDzhPr6Gn9laMpnBn49+0ZWLohzPu3r6uOQW67J1w5A82bIs3mg4dsVaAKbQzOqPR8qKPQg5H6xQlqbUtYD+Obs/ZsOESbTZKDi1sy7KPkA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=0JKAGs3MiNxef5GYhfLD8+bmnlGOpcQDgUTuRCZOkVk=;
 b=VyxphKp39ENkdx0Ia7xDhDBo1KfP/Z849Ltmzom8tn+QM5oadxPwXLSo+Q0Ye9v4k3/1y2qzhYuz1A1YvWXm+mCrN4WiZCXGHLSqltsM8a8wdcfIbUtPmeILokxs6Az/eusvWxyhWgqkjBuIZxqQlhMjyDZAyeaGchTqjL8GxfY=
Subject: Re: [PATCH v4 2/2] xen: delay xen_hvm_init_time_ops() if kdump is
 boot on vcpu>=32
To: Boris Ostrovsky <boris.ostrovsky@oracle.com>,
        xen-devel@lists.xenproject.org, x86@kernel.org
Cc: linux-kernel@vger.kernel.org, jgross@suse.com, sstabellini@kernel.org,
        tglx@linutronix.de, mingo@redhat.com, bp@alien8.de,
        dave.hansen@linux.intel.com, joe.jin@oracle.com
References: <20220302164032.14569-1-dongli.zhang@oracle.com>
 <20220302164032.14569-3-dongli.zhang@oracle.com>
 <bacae45c-9f8e-456b-1036-7f68e1e4374d@oracle.com>
 <0ac50fb6-0aca-e61a-1f38-8badbc8c967a@oracle.com>
 <272a69ec-4cc8-f282-8499-88b24b61f130@oracle.com>
From: Dongli Zhang <dongli.zhang@oracle.com>
Message-ID: <a40326c0-bdad-da76-9271-61bd8f3fa436@oracle.com>
Date: Wed, 2 Mar 2022 19:08:11 -0800
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
 Thunderbird/78.6.1
In-Reply-To: <272a69ec-4cc8-f282-8499-88b24b61f130@oracle.com>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: DS7PR03CA0349.namprd03.prod.outlook.com
 (2603:10b6:8:55::24) To BYAPR10MB2663.namprd10.prod.outlook.com
 (2603:10b6:a02:a9::20)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0dd4993f-b93a-4d1d-c0a3-08d9fcc30f2b
X-MS-TrafficTypeDiagnostic: BLAPR10MB5266:EE_
X-Microsoft-Antispam-PRVS: 
	<BLAPR10MB5266F505CD7D0F753BEEF1ECF0049@BLAPR10MB5266.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	qXXVbXnt1iqnTFIJaF6PAe1n1Sluxi1QDWvw4OXG4mW4sV1zO0xNARs0SRI2MD5TDnVoIegdET/t3LfyI1M+s+EMBd1PbCn/CBXu7UJCFH1upYtjRhwfUl1tSAQItRW2G7fb/yygM+X1sjz1/6BKT2HYnFVjy3hvCHXlTCbhmxQNL14M+YNXP8aYzdISXMVazoB7OI8L3+i6K15OWQVNBw1ycU3M/GVlDNe45wlGHbLgfmiFqkYzeUVlsgwjZ4N3Jm37/ta72AduAZVk1ajYLbc82XeFK+5ohCGq7tS9vFcrWZgNmVpkYW/Y890ByiLtfOC3kthZ8iz+sllBI7BvfAxVhIsUzDV5io5wI7FQ0Ed27LNPDHqRYK35XTO7WMhppaklYGSXfdQEY771QjOTSvq0mIDaFw0AGWa/Uh6TItW38a5vmEHM8aW+1hE3ShGRRrg5jbMt2g23oo5ePwPhxZTiR0UtWaIDN1f6YUnU9vYnHPKMdVz0Mj2glViY/Ti/Qpa+V7mPxbmNurq1XGdCcMHUeOnPnCpRlz5PB4VX2/yjoB97Y+AH2NFLrPJZaQEM5yp7vG/wSPpaznQWV52uKaz8qui44C/lxqD9eivnjXGGXy9rb+RXiNWhyPhy4A/0ZlMdEd2GxhIp3H9LH5DFIQnzMrK+quKG4JrZdNWlv+R/2sFTOOHRWfaPNtjGvAj3FZ2QD8FfxyDNg0pjYIaGreeEbgO+jN8z/kh7mzJvQSQ=
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR10MB2663.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2906002)(38100700002)(5660300002)(6512007)(86362001)(6506007)(53546011)(186003)(83380400001)(2616005)(316002)(8936002)(8676002)(4326008)(31686004)(6486002)(66476007)(66556008)(107886003)(508600001)(36756003)(6666004)(66946007)(44832011)(31696002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?TjhTYVlZQkZVYS9pZjlGdWdtT3R2V01XUm5YQkFNZEVQTGhaMHNEcG1DMC9w?=
 =?utf-8?B?TkFONm1qenVRWHFSNXRmZWsrWElZRW9BamlRM0NSNHQ0eGRkZmlkaEQ5S01I?=
 =?utf-8?B?RTY4QzFWUktzdXJhYnJ0YmNyVlUrdHpVWXdTZkFZQnk3ZXBES3VTM3dvc3JL?=
 =?utf-8?B?ck82aWM4Y1lSejEyUDFNSmpkZHdvWjl1OC8wOGlpcHk0Y1lJZEpXUkhmc1c5?=
 =?utf-8?B?Tk9lYUdFWnlkWnUyazBsRW9Ua1YxSlFFQ1k1dW9laWZQV0RTa0xJaE1wR3ND?=
 =?utf-8?B?Qjk0cTlxQVlLenNhekVCdUhFbWdnNGxKdk9oa0svaHFsUnNSc2dvYWdDRFJV?=
 =?utf-8?B?TmhGSjhzNWVJTzl4TWRRYmVwNXVpcjZMaTh1bEkzbGVTS1NLS0dzajdhNGpl?=
 =?utf-8?B?Um55TDkrYlJybDJwWDlRelZQTDBZNXJOUnZGVXo4cnFRdnJBMEN4OGZUSEsv?=
 =?utf-8?B?b1pwTEM0c3ZLNWp5cTUxZ0FIdmZQVVZ3QWVYZ0RkemVhVWVhQ2IxREJkc3JF?=
 =?utf-8?B?YXpxTUYyWldQK2twUU8yOCtzNHRlRXJCdVp0U2NVaTlVcW1reGh5M0g5eWxQ?=
 =?utf-8?B?dS9kV21FVk0vTGlxajMzNmQvUkVrMFdmNlZvdDJEVW01SHkvenRFa09uODRx?=
 =?utf-8?B?Q2VsYVEvSkppcFJ1WWFoT1pRZVZHeHBPbk56VkU1NUVZSmQ0enB0VVZPQlF5?=
 =?utf-8?B?OHozV05DNnNoWDMwdWluZG1WVm5qejZOZjRtc3ZXVDVhdURUaG9UVFlrVDdn?=
 =?utf-8?B?WWdiVHFobzMwSDc3Q2F3ZTJENEM2ZlhmZS9UOThrZmJkdy8vT0pEdWNTcmx5?=
 =?utf-8?B?aWxLOFp0VHdRUjZYUm42cHVXVFRKdVRXRVI2UnpHWE55UEcxZHY1YkpsYkdq?=
 =?utf-8?B?U1BwTDRDQXVNVTJQcndaekZ5Ri9IWWJISHpycjA1S0Zac240MXorL0pGeGlS?=
 =?utf-8?B?bTBHdmlCc2V1SmdNUXZ6WTZGcjNWNFl0YVRyaWtsYWY2SWh6ZGpaTmF5cEUy?=
 =?utf-8?B?UW5MSDh4WmlyRENlMjBpai84N1lHZ2lzV2x4NE5ZSDRoODVHTmdKWElRNlZI?=
 =?utf-8?B?UTFrWXBZa0ZlU1c0R1ZhSEU0K1pVblFBSFhsb1VJbkZmWDBYRUlheXRDVmEw?=
 =?utf-8?B?TDVXWHFwSXlDMHRmWEs5SW5FdnhFY3FOUmdTbE1QUzlUQ3hTdU15NlB2Mytt?=
 =?utf-8?B?YVNZSHRzcll3ZjEyMGFKMkttdE5ycG9iTlhnRGF4VUJXaVdPeEJpSHUwLzZL?=
 =?utf-8?B?azJCOTB4OG9KMlpZelFzTGxPS2RreDVwcTVwRmVhSzJWUW5uWWFLNE84QTA3?=
 =?utf-8?B?QnUrdXNEY1NuMmhsdmVwWFhNUnNERnFJeFB2N2k4NXU2WUpaQjBDN1AzSjVR?=
 =?utf-8?B?b2xNY3pueGdXMi9Nb1ExVzRhd2FqazQ1akc3SUhjcXRjaFBLbjhKZmZienhv?=
 =?utf-8?B?YVkwOTVRaFVZOEVsZkJjd0lETk0raE1YR1BYNVhybmNERjY4NDdBY00xOXFQ?=
 =?utf-8?B?SUtDWkVNSXRXMTlsZ3UxOGdmRkYzTmF1OUdxbVBpOGtHdnc1UUhXMnpzclZv?=
 =?utf-8?B?UVZ2Q0hocGVJZkI0TUFzaHIwZll3eEJPNmppNHE4VmwrV1FUVmgySWtyV01H?=
 =?utf-8?B?TS9MVERpR0M4K2pTSGVMNm5DaFcrdlRZWUxZSklMUkV0MHo3cUZLeGFFTzJr?=
 =?utf-8?B?RmRnQTYxTUxVVFVFUHI2RUl5V3NxU0s3VkdqdGpXZTZjS2llWmdRVzVsa1hW?=
 =?utf-8?B?RTg5R3hDWlVMb2ZUTnAwUWJhOS93YXg5azFuQmNVaGgrTDhRUllZeDhCSWFB?=
 =?utf-8?B?c1piTHVSY0VidDNsTWF2aVB2UWJzRDNQMjRhWWJKblRwc0JkZjZNamlPQlBH?=
 =?utf-8?B?dXNwcVM5bTNJLzlaS0xoeXBnTWV3REdiMjkxdFB4SzNoZmExOGtBTzJBMXZk?=
 =?utf-8?B?alJ2Zk5kMnJ2ZzYxYllvT3g5VlA5K2tkL0pycytvc0E2Z0ZCMUdRM3VMckRE?=
 =?utf-8?B?cWllSHhGRWEwN3NpS2VIS1lSQVpIQ3ZabmwwcEQ0TmhnUWlkemoyd29DL1A2?=
 =?utf-8?B?dGFBK2JoMU5VWS9DYlNpdW9wMWR5Yk5sb0RtK3FxdCtybVdjcENOV3o4R0VD?=
 =?utf-8?B?TUViTmMyVk5FMnRlYnB0eTRCdk8wSDJzUHdWRVRES2NqbDJlYmZsV1ZGWHEz?=
 =?utf-8?Q?YLJSMCbGyYczwRnpZ8ylwURsCrwqL6OsQjO+/o2YL32K?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0dd4993f-b93a-4d1d-c0a3-08d9fcc30f2b
X-MS-Exchange-CrossTenant-AuthSource: BYAPR10MB2663.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 03:08:15.4389
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: zbpf01CTvl83xg083UnYxM6arfRYKrx/snxv6Nq2+2pJtSJbsbV6Z9CIR4JcbdivwxSBRavh9pbg3xoZ6Et2Tg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLAPR10MB5266
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10274 signatures=686787
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 bulkscore=0 malwarescore=0
 mlxscore=0 phishscore=0 suspectscore=0 adultscore=0 mlxlogscore=999
 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2201110000
 definitions=main-2203030012
X-Proofpoint-ORIG-GUID: RB8ru-RFzQv-fnzFJG3-adb2CHHvpdIW
X-Proofpoint-GUID: RB8ru-RFzQv-fnzFJG3-adb2CHHvpdIW

Hi Boris,

On 3/2/22 6:11 PM, Boris Ostrovsky wrote:
> 
> On 3/2/22 7:31 PM, Dongli Zhang wrote:
>> Hi Boris,
>>
>> On 3/2/22 4:20 PM, Boris Ostrovsky wrote:
>>> On 3/2/22 11:40 AM, Dongli Zhang wrote:
>>>>    void __init xen_hvm_init_time_ops(void)
>>>>    {
>>>> +    static bool hvm_time_initialized;
>>>> +
>>>> +    if (hvm_time_initialized)
>>>> +        return;
>>>> +
>>>>        /*
>>>>         * vector callback is needed otherwise we cannot receive interrupts
>>>>         * on cpu > 0 and at this point we don't know how many cpus are
>>>>         * available.
>>>>         */
>>>>        if (!xen_have_vector_callback)
>>>> -        return;
>>>> +        goto exit;
>>>
>>> Why not just return? Do we expect the value of xen_have_vector_callback to
>>> change?
>> I just want to keep above sync with ....
>>
>>>
>>> -boris
>>>
>>>
>>>>          if (!xen_feature(XENFEAT_hvm_safe_pvclock)) {
>>>>            pr_info("Xen doesn't support pvclock on HVM, disable pv timer");
>>>> +        goto exit;
>>>> +    }
>> ... here.
>>
>> That is, I want the main logic of xen_hvm_init_time_ops() to run for at most
>> once. Both of above two if statements will "go to exit".
> 
> 
> I didn't notice this actually.
> 
> 
> I think both of them should return early, there is no reason to set
> hvm_time_initialized to true when, in fact, we have not initialized anything.
> And to avoid printing the warning twice we can just replace it with pr_info_once().
> 
> 
> I can fix it up when committing so no need to resend. So unless you disagree

Thank you very much for fixing it during committing.

Dongli Zhang


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 03:54:44 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 03:54:44 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282733.481541 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPcY0-0006Ae-0R; Thu, 03 Mar 2022 03:54:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282733.481541; Thu, 03 Mar 2022 03:54:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPcXz-0006AX-Tp; Thu, 03 Mar 2022 03:54:35 +0000
Received: by outflank-mailman (input) for mailman id 282733;
 Thu, 03 Mar 2022 03:54:35 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=IHsd=TO=gmail.com=jiangshanlai@srs-se1.protection.inumbo.net>)
 id 1nPcXy-0006AR-SR
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 03:54:35 +0000
Received: from mail-pj1-x102e.google.com (mail-pj1-x102e.google.com
 [2607:f8b0:4864:20::102e])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a174f243-9aa5-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 04:54:32 +0100 (CET)
Received: by mail-pj1-x102e.google.com with SMTP id
 k5-20020a17090a3cc500b001befa0d3102so2383137pjd.1
 for <xen-devel@lists.xenproject.org>; Wed, 02 Mar 2022 19:54:31 -0800 (PST)
Received: from localhost ([47.251.4.198]) by smtp.gmail.com with ESMTPSA id
 mu1-20020a17090b388100b001bedddf2000sm537800pjb.14.2022.03.02.19.54.29
 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128);
 Wed, 02 Mar 2022 19:54:30 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a174f243-9aa5-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:in-reply-to:references
         :mime-version:content-transfer-encoding;
        bh=V2/ej5DrRdUXhbTtL7As/s+7H+Hg/qh6D0nKyde9b4I=;
        b=Cf6C+jFzvaQJqp+87aHDyXKn1AnopM3mxsZXXVve5nRwKAHyoEW6RWZ82BxB1/MpAs
         YBeLSbTIABdPihhCBaQaZsH8HO4BpyuxMiloaRGq75Q5JXATrMsGuFrephWtRRSjs0d0
         AP8Ob0+dxLcisk1yC6u47FptP4V+sB38bpPne1a+RruGrkn+5HAvkGofli4prSWlKBOk
         VY/TjCZNnz8fjIVkgNqx9yrwJT2Df9mWqoPIpIhEMtK4vr/RX1QVkozI+4TLCweH6z0C
         6S5+8I7OuILJGTyjV4G8zHIXKeFnGVL+oaiF5ViG74XDU5C/o5tq6C3NiluQPvx+9TjH
         10+Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to
         :references:mime-version:content-transfer-encoding;
        bh=V2/ej5DrRdUXhbTtL7As/s+7H+Hg/qh6D0nKyde9b4I=;
        b=c6uSIUARr3PpdfesYws6uJOnwhLcFMuoNilyjTXivDvypdhrCR33Ij+NUTwpfPPC5b
         7I7X1oiNnRD2D0JDmZb8Dme7KqBQkALJZZwSWHUOXv+Kc1qAXiuVCkEY64HJ2NR6idMO
         ZRT/qb4pWq9MTVfdNsHQsypIfMfTchX9TV4Ug0fyRPOIQWkLzeS77R/7IY/nw48RLKDe
         v1k7KOt3jdFpf+fG54px2orCFdd60iInDoC/zJLOlxbBKGOOzTqlDdPC8DA8pQTp7JyO
         lChztkutO+nu84eQx+4XV9ieAFnxigXfpKdEUoBqxoggpcuB+sdHpHYlYfQfizJU8Kd6
         pUrQ==
X-Gm-Message-State: AOAM531Av+6dgPTD9G0JidMbxfXIfIRVZ0Pa7gYr+JWlbzh4NZXR/9v4
	cCVo99Pzt6slsGlyImMvMik=
X-Google-Smtp-Source: ABdhPJwMqYGzS+07MgSD+XrJLZC6tb4GmJcD1c0Voe27uz+8Clqe4zPHlwkCb0iXztvSKqT4uzsfvw==
X-Received: by 2002:a17:902:e945:b0:14e:b8d9:aa07 with SMTP id b5-20020a170902e94500b0014eb8d9aa07mr33517195pll.163.1646279670545;
        Wed, 02 Mar 2022 19:54:30 -0800 (PST)
From: Lai Jiangshan <jiangshanlai@gmail.com>
To: linux-kernel@vger.kernel.org
Cc: x86@kernel.org,
	Lai Jiangshan <jiangshan.ljs@antgroup.com>,
	xen-devel@lists.xenproject.org,
	Andy Lutomirski <luto@kernel.org>,
	Thomas Gleixner <tglx@linutronix.de>,
	Ingo Molnar <mingo@redhat.com>,
	Borislav Petkov <bp@alien8.de>,
	Dave Hansen <dave.hansen@linux.intel.com>,
	"H. Peter Anvin" <hpa@zytor.com>
Subject: [PATCH V2 5/7] x86/entry: Don't call error_entry for XENPV
Date: Thu,  3 Mar 2022 11:54:32 +0800
Message-Id: <20220303035434.20471-6-jiangshanlai@gmail.com>
X-Mailer: git-send-email 2.19.1.6.gb485710b
In-Reply-To: <20220303035434.20471-1-jiangshanlai@gmail.com>
References: <20220303035434.20471-1-jiangshanlai@gmail.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Lai Jiangshan <jiangshan.ljs@antgroup.com>

When in XENPV, it is already in the task stack, and it can't fault
for native_iret() nor native_load_gs_index() since XENPV uses its own
pvops for iret and load_gs_index().  And it doesn't need to switch CR3.
So there is no reason to call error_entry() in XENPV.

Cc: xen-devel@lists.xenproject.org
Signed-off-by: Lai Jiangshan <jiangshan.ljs@antgroup.com>
---
 arch/x86/entry/entry_64.S | 13 +++++++++++--
 1 file changed, 11 insertions(+), 2 deletions(-)

diff --git a/arch/x86/entry/entry_64.S b/arch/x86/entry/entry_64.S
index 630bf8164a09..adc9f7619d1b 100644
--- a/arch/x86/entry/entry_64.S
+++ b/arch/x86/entry/entry_64.S
@@ -325,8 +325,17 @@ SYM_CODE_END(ret_from_fork)
 	PUSH_AND_CLEAR_REGS
 	ENCODE_FRAME_POINTER
 
-	call	error_entry
-	movq	%rax, %rsp			/* switch stack settled by sync_regs() */
+	/*
+	 * Call error_entry and switch stack settled by sync_regs().
+	 *
+	 * When in XENPV, it is already in the task stack, and it can't fault
+	 * for native_iret() nor native_load_gs_index() since XENPV uses its
+	 * own pvops for iret and load_gs_index().  And it doesn't need to
+	 * switch CR3.  So it can skip invoking error_entry().
+	 */
+	ALTERNATIVE "call error_entry; movq %rax, %rsp", \
+		"", X86_FEATURE_XENPV
+
 	ENCODE_FRAME_POINTER
 	UNWIND_HINT_REGS
 
-- 
2.19.1.6.gb485710b



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 03:54:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 03:54:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282734.481552 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPcYE-0006Uf-8P; Thu, 03 Mar 2022 03:54:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282734.481552; Thu, 03 Mar 2022 03:54:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPcYE-0006UY-5I; Thu, 03 Mar 2022 03:54:50 +0000
Received: by outflank-mailman (input) for mailman id 282734;
 Thu, 03 Mar 2022 03:54:49 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=IHsd=TO=gmail.com=jiangshanlai@srs-se1.protection.inumbo.net>)
 id 1nPcYD-0006U6-Ej
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 03:54:49 +0000
Received: from mail-pg1-x52e.google.com (mail-pg1-x52e.google.com
 [2607:f8b0:4864:20::52e])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ab1d001e-9aa5-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 04:54:48 +0100 (CET)
Received: by mail-pg1-x52e.google.com with SMTP id w37so3419279pga.7
 for <xen-devel@lists.xenproject.org>; Wed, 02 Mar 2022 19:54:48 -0800 (PST)
Received: from localhost ([47.251.4.198]) by smtp.gmail.com with ESMTPSA id
 u9-20020a17090a450900b001b9b5ca299esm6563740pjg.54.2022.03.02.19.54.45
 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128);
 Wed, 02 Mar 2022 19:54:46 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ab1d001e-9aa5-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:in-reply-to:references
         :mime-version:content-transfer-encoding;
        bh=AOa0Ei1g6e4VlPBDw15RL007lSMOSrMvUzhJPGj9XAI=;
        b=eCXzMPrvm0QclKJ/8ESlhGV7ol/xxd0jxpeS+MvgphVnb3ojFQ+gK3KpzVzxxo+qxL
         bSwolL7L4dDMj29c6jcEc1th4JLA9CD7t1+M9csTffdIwf8P2wU9ny44rUGuPNQniOI1
         pnMvB/X0OUgGWfcOq34wjA3TelHnDUsNdSgJySjD8a/FFtMMAYcsRWDohcAX9uOVozdE
         QrdI+LUylMbE4ZX7ar5lagHtuezvvHoHZ3nhwbj9fTS2Y5BS9QJyh0TX3yGTc18iUKBh
         5WIINkssRb+sUqfobVqg4UU1pYTHt8iJmT0HEoIu94SMlrTbnDDdR9kGa4WLB7noP1qy
         HDTA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to
         :references:mime-version:content-transfer-encoding;
        bh=AOa0Ei1g6e4VlPBDw15RL007lSMOSrMvUzhJPGj9XAI=;
        b=hSLXxBw3Rpd9h9BO89ImV38vboK6TS0UPI+K87bMh/U5BHTA/JPfv0Cit9dxCeh3qz
         3t6IsX9krF6bxLMB61r4z09rHkgvxjVyt0rR971U1qx63tOyHjI1v9/3v9qXhgyuBOlr
         nARkMqLmdCk18O2E/o4QUpf04Eymi5GxBmM9Ft2k5bRCPs7swd0qnt2kVUez+Uriyh/C
         /SBj6JvTHEa1N9YHZ9cYzWhpDseapARrrIX/4Etcz49j0bEWA8OG6UICySXHriOClEQG
         CpuOlwibxOQJQxkob6YYxuYSbbz2wrxgw3zWHvMLgR/zJcdi41XHkuquyYRDW9Svyp9o
         kbIw==
X-Gm-Message-State: AOAM532yhGiS2hFJev2kcpBfJ0XopBFi8TmT2x47ReBo5DXy0Y3SYwQd
	Sb/iF13Xk36JwXjeSei4Skc=
X-Google-Smtp-Source: ABdhPJwuPPW+OW04xR5tRD6ZiwBqHBvxNWZMWDjet+tD/wstzrZ9p5WcmL5uWKiurXsOsVmlNtqIuQ==
X-Received: by 2002:a63:6b42:0:b0:37c:4e5c:a903 with SMTP id g63-20020a636b42000000b0037c4e5ca903mr2183734pgc.463.1646279686726;
        Wed, 02 Mar 2022 19:54:46 -0800 (PST)
From: Lai Jiangshan <jiangshanlai@gmail.com>
To: linux-kernel@vger.kernel.org
Cc: x86@kernel.org,
	Lai Jiangshan <jiangshan.ljs@antgroup.com>,
	xen-devel@lists.xenproject.org,
	Andy Lutomirski <luto@kernel.org>,
	Thomas Gleixner <tglx@linutronix.de>,
	Ingo Molnar <mingo@redhat.com>,
	Borislav Petkov <bp@alien8.de>,
	Dave Hansen <dave.hansen@linux.intel.com>,
	"H. Peter Anvin" <hpa@zytor.com>,
	Juergen Gross <jgross@suse.com>,
	"Peter Zijlstra (Intel)" <peterz@infradead.org>,
	"Kirill A. Shutemov" <kirill@shutemov.name>
Subject: [PATCH V2 7/7] x86/entry: Convert SWAPGS to swapgs and remove the definition of SWAPGS
Date: Thu,  3 Mar 2022 11:54:34 +0800
Message-Id: <20220303035434.20471-8-jiangshanlai@gmail.com>
X-Mailer: git-send-email 2.19.1.6.gb485710b
In-Reply-To: <20220303035434.20471-1-jiangshanlai@gmail.com>
References: <20220303035434.20471-1-jiangshanlai@gmail.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Lai Jiangshan <jiangshan.ljs@antgroup.com>

XENPV doesn't use swapgs_restore_regs_and_return_to_usermode(),
error_entry() and entry_SYSENTER_compat(), so the PV-awared SWAPGS in
them can be changed to swapgs.  There is no user of the SWAPGS anymore
after this change.

The INTERRUPT_RETURN in swapgs_restore_regs_and_return_to_usermode()
is also converted.

Cc: xen-devel@lists.xenproject.org
Reviewed-by: Juergen Gross <jgross@suse.com>
Signed-off-by: Lai Jiangshan <jiangshan.ljs@antgroup.com>
---
 arch/x86/entry/entry_64.S        | 10 +++++-----
 arch/x86/entry/entry_64_compat.S |  2 +-
 arch/x86/include/asm/irqflags.h  |  2 --
 3 files changed, 6 insertions(+), 8 deletions(-)

diff --git a/arch/x86/entry/entry_64.S b/arch/x86/entry/entry_64.S
index 88b61f310289..d9c885400034 100644
--- a/arch/x86/entry/entry_64.S
+++ b/arch/x86/entry/entry_64.S
@@ -644,8 +644,8 @@ SYM_INNER_LABEL(swapgs_restore_regs_and_return_to_usermode, SYM_L_GLOBAL)
 
 	/* Restore RDI. */
 	popq	%rdi
-	SWAPGS
-	INTERRUPT_RETURN
+	swapgs
+	jmp	native_iret
 
 
 SYM_INNER_LABEL(restore_regs_and_return_to_kernel, SYM_L_GLOBAL)
@@ -1007,7 +1007,7 @@ SYM_CODE_START_LOCAL(error_entry)
 	 * We entered from user mode or we're pretending to have entered
 	 * from user mode due to an IRET fault.
 	 */
-	SWAPGS
+	swapgs
 	FENCE_SWAPGS_USER_ENTRY
 	/* We have user CR3.  Change to kernel CR3. */
 	SWITCH_TO_KERNEL_CR3 scratch_reg=%rax
@@ -1039,7 +1039,7 @@ SYM_CODE_START_LOCAL(error_entry)
 	 * gsbase and proceed.  We'll fix up the exception and land in
 	 * .Lgs_change's error handler with kernel gsbase.
 	 */
-	SWAPGS
+	swapgs
 
 	/*
 	 * Issue an LFENCE to prevent GS speculation, regardless of whether it is a
@@ -1060,7 +1060,7 @@ SYM_CODE_START_LOCAL(error_entry)
 	 * We came from an IRET to user mode, so we have user
 	 * gsbase and CR3.  Switch to kernel gsbase and CR3:
 	 */
-	SWAPGS
+	swapgs
 	FENCE_SWAPGS_USER_ENTRY
 	SWITCH_TO_KERNEL_CR3 scratch_reg=%rax
 
diff --git a/arch/x86/entry/entry_64_compat.S b/arch/x86/entry/entry_64_compat.S
index a4fcea0cab14..72e017c3941f 100644
--- a/arch/x86/entry/entry_64_compat.S
+++ b/arch/x86/entry/entry_64_compat.S
@@ -49,7 +49,7 @@
 SYM_CODE_START(entry_SYSENTER_compat)
 	UNWIND_HINT_EMPTY
 	/* Interrupts are off on entry. */
-	SWAPGS
+	swapgs
 
 	pushq	%rax
 	SWITCH_TO_KERNEL_CR3 scratch_reg=%rax
diff --git a/arch/x86/include/asm/irqflags.h b/arch/x86/include/asm/irqflags.h
index 87761396e8cc..ac2e4cc47210 100644
--- a/arch/x86/include/asm/irqflags.h
+++ b/arch/x86/include/asm/irqflags.h
@@ -140,13 +140,11 @@ static __always_inline void arch_local_irq_restore(unsigned long flags)
 #else
 #ifdef CONFIG_X86_64
 #ifdef CONFIG_XEN_PV
-#define SWAPGS	ALTERNATIVE "swapgs", "", X86_FEATURE_XENPV
 #define INTERRUPT_RETURN						\
 	ANNOTATE_RETPOLINE_SAFE;					\
 	ALTERNATIVE_TERNARY("jmp *paravirt_iret(%rip);",		\
 		X86_FEATURE_XENPV, "jmp xen_iret;", "jmp native_iret;")
 #else
-#define SWAPGS	swapgs
 #define INTERRUPT_RETURN	jmp native_iret
 #endif
 #endif
-- 
2.19.1.6.gb485710b



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 05:17:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 05:17:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282747.481563 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPdpa-0001Hm-1b; Thu, 03 Mar 2022 05:16:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282747.481563; Thu, 03 Mar 2022 05:16:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPdpZ-0001Hf-Ut; Thu, 03 Mar 2022 05:16:49 +0000
Received: by outflank-mailman (input) for mailman id 282747;
 Thu, 03 Mar 2022 05:16:49 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPdpZ-0001HV-2I; Thu, 03 Mar 2022 05:16:49 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPdpY-00052g-VP; Thu, 03 Mar 2022 05:16:48 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPdpY-000691-Dv; Thu, 03 Mar 2022 05:16:48 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPdpY-0004Ex-DT; Thu, 03 Mar 2022 05:16:48 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=xOt5Qr8jQ+5agXz6uouZ9ARHPeVRPS39qMZZxcyFn5k=; b=yhWYXUBWvhbs5/Q1GJ7oys9AZQ
	Y57La6f9/gj11uUwL2b8ApQw6HD4QXqH0AwIN70KT8wu/KKvgmXY9MCKipSh1UQg6XUOqMy+BySU7
	IfZ/pHtS8i7wS0WQ1pckSQvP+AemiW2SbFHKIY5ecRMOgZZAOQUX0tjiVgMeVpgm3L7c=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168346-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168346: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=92ebf5f91b4dd5156886d2509202be0fb4230dfd
X-Osstest-Versions-That:
    linux=fb184c4af9b9f4563e7a126219389986a71d5b5b
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 03 Mar 2022 05:16:48 +0000

flight 168346 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168346/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168326
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168326
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168326
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168326
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168326
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168326
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168326
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168326
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass

version targeted for testing:
 linux                92ebf5f91b4dd5156886d2509202be0fb4230dfd
baseline version:
 linux                fb184c4af9b9f4563e7a126219389986a71d5b5b

Last test of basis   168326  2022-03-02 06:22:48 Z    0 days
Testing same since   168346  2022-03-02 20:40:06 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Dave Jiang <dave.jiang@intel.com>
  Gao Xiang <hsiangkao@linux.alibaba.com>
  Gustavo A. R. Silva <gustavoars@kernel.org>
  Jerry Dai <jerry.dai@intel.com>
  Jon Mason <jdmason@kudzu.us>
  Linus Torvalds <torvalds@linux-foundation.org>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   fb184c4af9b9..92ebf5f91b4d  92ebf5f91b4dd5156886d2509202be0fb4230dfd -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 05:25:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 05:25:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282760.481575 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPdyD-0002nU-2N; Thu, 03 Mar 2022 05:25:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282760.481575; Thu, 03 Mar 2022 05:25:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPdyC-0002nN-VT; Thu, 03 Mar 2022 05:25:44 +0000
Received: by outflank-mailman (input) for mailman id 282760;
 Thu, 03 Mar 2022 05:25:43 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPdyB-0002nD-Ak; Thu, 03 Mar 2022 05:25:43 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPdyB-0005BT-8I; Thu, 03 Mar 2022 05:25:43 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPdyA-0006s3-QN; Thu, 03 Mar 2022 05:25:42 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPdyA-0003QB-Pw; Thu, 03 Mar 2022 05:25:42 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=L3mk3bcaFDESHTmfalqOEWL1uoASix9TIjK6Sx8He7Y=; b=V5Q0QvV2qwSCT8cgO/AagiowmY
	6OJjrllX6zlIlbB+JfO/4fHkYKYvJQXV7d6BHSt51cQY1p/HK/uBmAvL6/M5hPPiniJYGhm0PF1KZ
	eVPKWMHq6VCiPoVreUhLOt1YTLCkVLQiYSS+Q0dKAlk+eNw6LHdCpRCaBOn0KPaVBr+0=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168343-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168343: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=64ada298b98a51eb2512607f6e6180cb330c47b1
X-Osstest-Versions-That:
    qemuu=09591fcf6eb3157ab9c50a9fbbef5f8a567fb49f
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 03 Mar 2022 05:25:42 +0000

flight 168343 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168343/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168327
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168327
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168327
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168327
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168327
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168327
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168327
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168327
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 qemuu                64ada298b98a51eb2512607f6e6180cb330c47b1
baseline version:
 qemuu                09591fcf6eb3157ab9c50a9fbbef5f8a567fb49f

Last test of basis   168327  2022-03-02 07:38:29 Z    0 days
Testing same since   168343  2022-03-02 18:07:05 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Alex Bennée <alex.bennee@linaro.org>
  Bernhard Beschow <shentey@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Le Goater <clg@kaod.org>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Greg Kurz <groug@kaod.org>
  Kyle Evans <kevans@FreeBSD.org>
  Leandro Lupori <leandro.lupori@eldorado.org.br>
  Lucas Coutinho <lucas.coutinho@eldorado.org.br>
  Lucas Mateus Castro (alqotel) <lucas.araujo@eldorado.org.br>
  Lucas Mateus Castro (alqotel) <lucas.castro@eldorado.org.br>
  Luis Pires <luis.pires@eldorado.org.br>
  Matheus Ferst <matheus.ferst@eldorado.org.br>
  Peter Maydell <peter.maydell@linaro.org>
  Richard Henderson <richard.henderson@linaro.org>
  Stacey Son <sson@FreeBSD.org>
  Thomas Huth <thuth@redhat.com>
  Víctor Colombo <victor.colombo@eldorado.org.br>
  Warner Losh <imp@bsdimp.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   09591fcf6e..64ada298b9  64ada298b98a51eb2512607f6e6180cb330c47b1 -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 06:01:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 06:01:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282772.481586 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPeWp-0008Sg-Ox; Thu, 03 Mar 2022 06:01:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282772.481586; Thu, 03 Mar 2022 06:01:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPeWp-0008SZ-Lc; Thu, 03 Mar 2022 06:01:31 +0000
Received: by outflank-mailman (input) for mailman id 282772;
 Thu, 03 Mar 2022 06:01:29 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPeWn-0008SP-In; Thu, 03 Mar 2022 06:01:29 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPeWn-0005qM-GP; Thu, 03 Mar 2022 06:01:29 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPeWn-0000vk-5i; Thu, 03 Mar 2022 06:01:29 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPeWn-0004qO-5F; Thu, 03 Mar 2022 06:01:29 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=uSkNyaFzJKrNSdYw0/UghRP7gq5ZnusPuuLfapNlxLk=; b=BOSPmrPKqiYiJ40xsZsyxZt/50
	ZgKugjBc24LVNCCx7lS54Q4GVHzZ4rQaqWn2FylUQ0I7kPl4sHndaaSaiDoYs6/n81L78FBHXKRLP
	iAna9RtwhF1tD6C9q0lCT7/+/AZ4Y1FZ4jY72ZYGksidW/80nnMhtYx0W5x8M1T4RpD8=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168352-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168352: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=dc39554d58af4a50b50eca1f57c49415a12b0c98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 03 Mar 2022 06:01:29 +0000

flight 168352 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168352/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 dc39554d58af4a50b50eca1f57c49415a12b0c98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    2 days
Failing since        168258  2022-03-01 01:55:31 Z    2 days   19 attempts
Testing same since   168316  2022-03-02 02:50:20 Z    1 days    7 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit dc39554d58af4a50b50eca1f57c49415a12b0c98
Author: Xiaolu.Jiang <xiaolu.jiang@intel.com>
Date:   Tue Feb 22 22:14:05 2022 +0800

    edk2/MdeModulePkg/Debuglib: Add Standalone MM support
    
    https://bugzilla.tianocore.org/show_bug.cgi?id=3844
    
    This change added Standalone MM instance of DebugLib.
    
    Reviewd-by: Jian J Wang <jian.j.wang@intel.com>
    Reviewd-by: Liming Gao <gaoliming@byosoft.com.cn>
    
    Signed-off-by: Xiaolu.Jiang <xiaolu.jiang@intel.com>

commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 07:35:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 07:35:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282789.481603 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPfzi-0003Zg-Rn; Thu, 03 Mar 2022 07:35:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282789.481603; Thu, 03 Mar 2022 07:35:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPfzi-0003ZZ-Oh; Thu, 03 Mar 2022 07:35:26 +0000
Received: by outflank-mailman (input) for mailman id 282789;
 Thu, 03 Mar 2022 07:35:25 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPfzh-0003ZT-Df
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 07:35:25 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 7b42c798-9ac4-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 08:35:24 +0100 (CET)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04lp2056.outbound.protection.outlook.com [104.47.13.56]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-17-7nupT1WJOrij8C13BCW-EQ-1; Thu, 03 Mar 2022 08:35:19 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR0402MB3860.eurprd04.prod.outlook.com (2603:10a6:208:7::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Thu, 3 Mar
 2022 07:35:18 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 07:35:18 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 7b42c798-9ac4-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646292921;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=VbeiCm2e1x/yLymCk0s7vQDaAs+AoczwFGivaOIU1IU=;
	b=iTqj0Cg9Xm/NIX0gbutHYIqBsHBklP09JFiEqvD3xKWToKvoXeBJP/NkZr3WYCtiSJNgzI
	L0jdrbY701ETvLhIjSJqhHuY46kGIHWTW5KtvUDEf/qbbchzw8KIvS/lYEAS5VbCB0Q78U
	kCblEAz6bUrgBApukkxguEW+lVKYkDQ=
X-MC-Unique: 7nupT1WJOrij8C13BCW-EQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=h6w8Par4tztUlh96tKk6ol+FFWGwBnLuTZi5zoDZd87i2RwnJY1gWTWE8ycpGGLf7APgzM6yWgyXJfrhFHpI6ML+oqqgKzzhOSOwpEiQXLO5s4W9P8ZwQLz51RuK1TFufjG37uHpHLNM8bbcFqw5V9R5XBL3Mv/cMT5YQFoXgP0LeYwx0G6Jv15SqIlob9xuKO+ROINPumWuiI7WaxsCggRqfVtZKqAyhztCfb4+4zLi2TMbDFbmxUXhq3TAai4gjRgxz/KBVcsOI87ZD6DLwh8zEHPAwJkA7qCVKdNZCdDgnwafS8dDcIxUb70Azb2QpP9f+nIsRBNY0lrs0MD/Ww==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=VbeiCm2e1x/yLymCk0s7vQDaAs+AoczwFGivaOIU1IU=;
 b=UlN563YoiJnCDWyE0YDlk01gARZvvr34BgxhUBNzidipWWHBfCwqmf07jw2V0GoW5uV2QL6xg100TW0wjEj/wzjXQjxaWuL1ACyuGjyjEhEvp656WHLBbwqNeePzvhhBHH/usaY6H06B4jb/OsHtwcgqFCpODdUR1khRaA1uHJeDL9yxOy3//09ivYcnZNbRyPgdOWTFEKHpyHlg4b5Md7aXbJlrfbA7kvmZ7hkSIbtgsOjoI+pO3KXhKBHYzN8ZOKFPMmsxQzOiuRSRzEtL/bOhl01FxhiLKnI8JAVUjih3LjjIvuaWGcq3cVSA6ajk4o79vc/pVyIQ729VHtopww==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <8eb7d30e-32de-fdee-43c9-3500fb10e6ee@suse.com>
Date: Thu, 3 Mar 2022 08:35:16 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] xen/CET: Fix __initconst_cf_clobber
Content-Language: en-US
To: Andrew Cooper <andrew.cooper3@citrix.com>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Wei Liu <wl@xen.org>, Xen-devel <xen-devel@lists.xenproject.org>
References: <20220302221005.16636-1-andrew.cooper3@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220302221005.16636-1-andrew.cooper3@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6PR0202CA0055.eurprd02.prod.outlook.com
 (2603:10a6:20b:3a::32) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0e652828-cdcf-4ef4-9602-08d9fce85d53
X-MS-TrafficTypeDiagnostic: AM0PR0402MB3860:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR0402MB386011F40C31B0992580FDCFB3049@AM0PR0402MB3860.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(5660300002)(8936002)(31696002)(2906002)(86362001)(38100700002)(8676002)(4326008)(66556008)(66476007)(26005)(186003)(66946007)(6506007)(316002)(6512007)(2616005)(53546011)(36756003)(54906003)(6916009)(508600001)(31686004)(6486002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?TzN0dzFBNkU2K2t0cVN1VG1jVmRSWllKbk1sekhQaW9KazFCZGpWYkRNNlk1?=
 =?utf-8?B?cllxYndVRFg5WnpHTk00c051U25sRXpjT3V2Ri9FckFWclFWZFFkRVNmRlgr?=
 =?utf-8?B?N0MzRkNxNExOcGFHSWVKaW4vbHErYTRVT0R0ZEpvSGtvNFp0MkRzRkI0SHdS?=
 =?utf-8?B?ekc0OHFKREhveWtzN0gvNmU2RHM0VVJZOFZRZkVtMW41dm4zN0I3VmZlL05I?=
 =?utf-8?B?ZFRZQngzaVFSTUM0WGpuRElHT28wblhWeWRPcHRlN2h4K25BZ285aVBNMUly?=
 =?utf-8?B?c0NsdEJwcEZQWlZUYmQ2WHdxM01qeU9EVFd1aHNYckl3T0Ruc0gzVklhdnh4?=
 =?utf-8?B?eEt4TXVkdXlYelBZK3JWamFGOXROdHFqbkE4MllJOXJhelNWc0o5WGRCd2xD?=
 =?utf-8?B?YkphWGRPeXk4SmI4bzVvY2o4SHFTbWVCNGhEM1hMN2hWeWl0ZmhIbmF5ZGdk?=
 =?utf-8?B?bG5pbXJYZzRVL05CT0dvZm1oRDg1ZUI0d3FXK3VtZEdlVHEwS2VTQnRMUENJ?=
 =?utf-8?B?MGRZUkNnK2NPakc2bXJzN1Q3S2RBbzJDbENnc2FVVVpoL3AwQ3QyWjhndnVW?=
 =?utf-8?B?RnlNeXNmT21RVXVwUVVrZ0Vyb01nWWxKT3QyYXMwcXNnOXlTS0hFWWVaZlpi?=
 =?utf-8?B?Nll4dU1MSTdkYWhQWThsVzMvb0NzQjYyZjdiL0tFRkNCcFhlU1lyQnFTOVZ3?=
 =?utf-8?B?TnA5c3Z3SnllZWxaQ2FhdDhKYm1ob1psSmpjdXJGaW9seUZTcS9sVk9rV3Bx?=
 =?utf-8?B?VHFzcldqbnR5Mk4wQkNHQnJlUE5PUGZqbGdsY3JCTU1SZ1pqcDNkbE8yYzQy?=
 =?utf-8?B?dEhOSXlBNGkwMXNkejFyeFJVMXY2ZU5iYkNodysrR09MRnJVNEtsck5LTVpj?=
 =?utf-8?B?VzRleW94Q1FmVDJPcWVidzZYU2J2NEthaTl0VnJUQ2ZyRjhHMnRndmJOdysr?=
 =?utf-8?B?ZjE0RG01dVM4d0YycWlDNDNQRDNOWHpzYnNTZisycFF2SEozby9PTEU0djhP?=
 =?utf-8?B?YnRka0hOWW1YWnVDYTd2WVlUUFZ3eGRwR0tZK29SM3RPZDV1YnEyZFdMZUxv?=
 =?utf-8?B?YVIvc3dwYWtuOEFTcER5a2xQMUc0YlR5bEtkWjF4c2JKOHBjL2ExYmpLdkwx?=
 =?utf-8?B?dlZZUFVTUTlnYnU5NGtlb1VOcVlFWElNZ2FtUFJ5WDdoUU5lVmV5ckYzMHJj?=
 =?utf-8?B?dlpqTE9aakI0V0RZN3VDdzBEYWpXdVRqUmQ5V2VDbGZ2YS9mRjJ3SjBoS0FI?=
 =?utf-8?B?b0RUankzTHFyd052VVdKNUxGQ0xNcW5JeDlmMWJaZ1ZJenhPSnFFVXhXTThV?=
 =?utf-8?B?MUVBQ0h5SFNUci9jaURNenhYNHFwYU9uQkxTc0MxNDI2QUR5bHNzNmQ4R3Jm?=
 =?utf-8?B?cWNNZjI5K25KYllyZmNDMVZlSHhqMzIrZWhFOEJna2xaVDVOVlkzd04wQXJw?=
 =?utf-8?B?UlRMYVl6ak5BanpWWlZBd3E5eFNoaE05Mk5STXhsc1R6TkpxTVRsWlZEVDFC?=
 =?utf-8?B?dzV6SlFTeUVUMnhjTzByaG1STUh3Z1lJczRxNERBalRFTWRRenVtY1pRMU1D?=
 =?utf-8?B?TWNZTlkyRzV6ZzZHcXRoWG43YnFoQU1vNmVEWlQ1V2FKWE13NU5UcWtvNVB5?=
 =?utf-8?B?OXU3MSswczV2bnY1c1NBdkhtSE9aT1V2Q1lrdjBnZHVybm43MUNkU0h4REs3?=
 =?utf-8?B?d2pzUWF4RUljVEZCZ3RrdVgrMkUwRzUxNU1VQ3h2WkVFcEVCN2FxU0c2NnBt?=
 =?utf-8?B?dVhBRGtpdk5US0xyN2ZDSlFmcFhTckY3ZjJSNXNBRUtNOWxhKzhLdm84WTdo?=
 =?utf-8?B?U3FhZ1UxcnF6bUZmMEF2RVNSaS9pVGpXdlVkVnpJb0VDcll2QjA3VFhLRDJo?=
 =?utf-8?B?TWRLSkFnYWNQQllzN2czMERhNGhxZnk3NURnc0E5U20veS8xNWlIdFRZSmFN?=
 =?utf-8?B?ZjNWTHhlQzhuNEQ1RlNkSjJRTndQd3dBMG54cE9sMU5uR21FTUtteW9aLzBO?=
 =?utf-8?B?amNVMnRNcU1URHJoZkdzTk5GeEZ4cW9jd1U0c0dOa3NvNjBoZGdMRjAxS0Rn?=
 =?utf-8?B?cVVWR1dmYjR2OCswODhZTEtOcGJpNDlIOHJvZFpENzgvRXBGVmkxb1hoQmpz?=
 =?utf-8?B?VzdESkZPRmlLTUNtODFHenNGRmQ1VmJMeWwyQm8rRWo4MThFNDBGNDd5NGll?=
 =?utf-8?Q?Ay2RYIclpLDQBO37I+OBda0=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0e652828-cdcf-4ef4-9602-08d9fce85d53
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 07:35:18.0506
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: QjRwahwClgnZR6410qIx7iQFaVn6NOsEdhWB0bBOG2fRGb7bSMOcd8XM5b7cZhuY977cQv6DYpL/B4bsoK9tcw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR0402MB3860

On 02.03.2022 23:10, Andrew Cooper wrote:
> The linker script collecting .init.rodata.* ahead of .init.rodata.cf_clobber
> accidentally causes __initconst_cf_clobber to be a no-op.
> 
> Rearrange the linker script to unbreak this.
> 
> The IOMMU adjust_irq_affinities() hooks currently violate the safety
> requirement for being cf_clobber, by also being __initcall().
> 
> Consolidate to a single initcall using iommu_call() (satisfying the cf_clobber
> safety requirement), and also removes the dubious property that we'd call into
> both vendors IOMMU drivers on boot, relying on the for_each_*() loops to be
> empty for safety.
> 
> With this fixed, an all-enabled build of Xen has 1681 endbr64's (1918
> including .init.text) with 382 (23%) being clobbered during boot.
> 
> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>

This will do for the immediate purpose, so:
Reviewed-by: Jan Beulich <jbeulich@suse.com>

> I was unsure whether to go common or x86 spefific IOMMU code, so went with the
> conservative option.  The final hunk can trivially move if preferred.

The hook is x86-specific, so the wrapper should be too (and the existing
inline wrapper also is).

> --- a/xen/arch/x86/xen.lds.S
> +++ b/xen/arch/x86/xen.lds.S
> @@ -210,6 +210,12 @@ SECTIONS
>    DECL_SECTION(.init.data) {
>  #endif
>  
> +       . = ALIGN(POINTER_ALIGN);
> +       __initdata_cf_clobber_start = .;
> +       *(.init.data.cf_clobber)
> +       *(.init.rodata.cf_clobber)
> +       __initdata_cf_clobber_end = .;
> +
>         *(.init.rodata)
>         *(.init.rodata.*)

I wonder if this shouldn't really be two sections. Live-patching will
need to supply two ranges to apply_alternatives() anyway (one for each
section, unless you want to start requiring to pass a linker script to
"$(LD) -r" when generating live patches, just to fold the two sections),
so in the core hypervisor we may want to follow suit.

> --- a/xen/drivers/passthrough/x86/iommu.c
> +++ b/xen/drivers/passthrough/x86/iommu.c
> @@ -462,6 +462,12 @@ bool arch_iommu_use_permitted(const struct domain *d)
>              likely(!p2m_get_hostp2m(d)->global_logdirty));
>  }
>  
> +static int cf_check __init adjust_irq_affinities(void)
> +{
> +    return iommu_call(&iommu_ops, adjust_irq_affinities);
> +}
> +__initcall(adjust_irq_affinities);

I assume it is intentional that you didn't re-use the inline wrapper,
to avoid its (then non-__init) instantiation to stay with an ENDBR.
Yet then you could at least _call_ that wrapper here, instead of open-
coding it. And I further think the iommu_enabled checks should move out
of the vendor functions, plus the hook also has no need anymore to have
a return type of int. I guess I'll make a follow-on patch if you don't
want to fold this in here.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 07:44:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 07:44:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282796.481613 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPg8D-0005LL-Mn; Thu, 03 Mar 2022 07:44:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282796.481613; Thu, 03 Mar 2022 07:44:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPg8D-0005LE-Jn; Thu, 03 Mar 2022 07:44:13 +0000
Received: by outflank-mailman (input) for mailman id 282796;
 Thu, 03 Mar 2022 07:44:12 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPg8B-0005L8-V3
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 07:44:11 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b66066de-9ac5-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 08:44:10 +0100 (CET)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2057.outbound.protection.outlook.com [104.47.14.57]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-15-KPeLBl7DPn-pAsEc1wTLJQ-1; Thu, 03 Mar 2022 08:44:08 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR04MB4207.eurprd04.prod.outlook.com (2603:10a6:803:3d::32)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 07:44:08 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 07:44:08 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b66066de-9ac5-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646293450;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=8jC6mGHn2Ad2BGiJFLUZjUmDowOsvazMP52tFaHd/OY=;
	b=IKnNeAnCAcLtroDzvLWxLV1pgBoLhGE4FPLswEH7L2xs3X40mjEP+QeMaMXLoJbJmqiUUF
	/OZuxmp01pMwsBPmv7+FwFbirtSJ3PkFbbPZbUv4Kdae15LFdTVx4VRlf7vSw0zExyIiKO
	T/1KyBDY3nXtLU3kxw6gtJUdhd1jbas=
X-MC-Unique: KPeLBl7DPn-pAsEc1wTLJQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=O++pxZVD18kVLigntuum7ViPVR+tfhWPJXMUlNuxu3OTaT6GHAfCvYQ2btrIYjDvTWEOmfK708WoDQWRif0xghMVaQ7N1EPVir4H40VrYTP6PrSfIKWjKg9eoB5XEyvEZoENlPQhmd/3LSHk0vCOUDqfakF4GWPK5m/08p/okpt+QInPGJ7m7lwJFHaWj0/GaIb0wUDrfYmDFr48Bh7nlTzsS37kmXIvVWFX/OPpi7FCT5GKDWxyMl4btSNlBJZNXYrOfZLo7u4UdSETKGIWzfwmvcrR/4ZRZ7v5u0ihVX4LiTwLTA9tbUu8QkB/Pl8LI1aMj6b/u3FcUdn8HzsDzw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=8jC6mGHn2Ad2BGiJFLUZjUmDowOsvazMP52tFaHd/OY=;
 b=a/yTGpCd/+hsIy/lL5lslSpFO0NwEDkY4mFa+xLr7ZHPBMwxhfwk+egKNF27R9iFBszHDJrZ12zmFsVn6sCayXIhoxdvCZ3g1Pt6fHp9RRVEk9wGBpVm1Btz1STovJWkunag0qfNBUctUMKOtqFoIzxtImjoctm18uwczgH+OBD6AIsTxXsKp6bLFFrN6oTYK2tehOF2Uakp7TuzyuknT3TgcOznNH4jtrVxNV07QYPbCJYIYdSekDnfzVU6Y77oBU2oD676dtkkqNubgQWsdqvnhv9USqUOxLNEYoO2bSDXHl8W+kp98i2K1WSrrxdWuV3uMiEuBKsVtBJAOH5Tmg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <6ffbc025-758e-bb7e-4e87-0b6b9e1bc2e5@suse.com>
Date: Thu, 3 Mar 2022 08:44:05 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] x86/cmdline: Interpret 'vpmu' as a positive boolean
Content-Language: en-US
To: Andrew Cooper <andrew.cooper3@citrix.com>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Wei Liu <wl@xen.org>, Xen-devel <xen-devel@lists.xenproject.org>
References: <20220302221157.17246-1-andrew.cooper3@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220302221157.17246-1-andrew.cooper3@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6PR0202CA0068.eurprd02.prod.outlook.com
 (2603:10a6:20b:3a::45) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 4b6e1a75-036d-4a20-db66-08d9fce99908
X-MS-TrafficTypeDiagnostic: VI1PR04MB4207:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB4207EDC3A595FB9CFEBC455BB3049@VI1PR04MB4207.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6486002)(4326008)(31696002)(6666004)(36756003)(86362001)(53546011)(4744005)(54906003)(31686004)(26005)(186003)(6916009)(6506007)(316002)(8936002)(38100700002)(66946007)(66556008)(66476007)(2906002)(8676002)(5660300002)(6512007)(2616005)(508600001)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?eTN1VjRveFJwaVAyc3Y5OE0yTWU1ZEQ0V0tiWFRoNTl3WlpDYm1XaTFQZWlu?=
 =?utf-8?B?ckdIUk9LL2VpVnFwZmp3STRjK2MzUURaV2JSbldUTEdNM2RtWXhmYTlrSG5a?=
 =?utf-8?B?a3FYQ0RyU3ZHUjBJV0h2cE1FNHUwYjJIMTYrTm5DQjhQWFFHeHoyeUtCWEZj?=
 =?utf-8?B?UWptdWxzWXdwRlZOOVdZUFVUTXplMEsrdmthNnpadVJaNjdWTUpuOU92MWJM?=
 =?utf-8?B?UStWaVA4aFlka1FWL3FTOWt0WENYWVRvbmR5aTZVY0c1cmJoa1NRZ0dlY3Ur?=
 =?utf-8?B?c3FySEY0Ykx4aUFCOTZ2Nml3MUFPNHozK3pvK3RZQ1FmZWRzaWxiV2FxQzZX?=
 =?utf-8?B?ZWl5SDdaOHN3NDNiNUZ5MVN2VHZ5cXdRUmQyU0pFU2NwWkw2WkRaQ1krSnJy?=
 =?utf-8?B?bTJQYStZT0E5cUdCNldZL0dmR0NNdmQvSEd5dGRSQmpwcFBONEZwNTNYc3Vt?=
 =?utf-8?B?UUYxVFVIL2xWL3MyTnRNQUFmWTRhc0ZzQko0QUQ4SDdvSEw5WGZJdldDbm40?=
 =?utf-8?B?bnBhaDdLYVU0R3BobGJTN3FVZUs2OTBZUkk5cTNUdTg4WGhmOStZVmNBc3N1?=
 =?utf-8?B?eDJOeGN1Y0Y4WEd6bnhKUCtLbFpXVVE0SlRmUGY2NlBmYndJMlRHVGp0bjZi?=
 =?utf-8?B?bGZjOFdpaXI3c3NGOUwwaFVlR3drcEZ4L2VTZU5wczRkN2M5Z0UySTk4Qktj?=
 =?utf-8?B?aHc4UXhLRlZKOEhtV1pOTU5PNk9OcER5RDM5em5YSlFUZ2M0eVNCTTlzVzhB?=
 =?utf-8?B?REJTbmVQcDZqYVpXa0IyQTZzbTlOVk1oQ01LendINUdaa3I1WFk1QWdDTXlE?=
 =?utf-8?B?ai9EMGxkaS95aWJscEdmZDlwekpEVXBDMTNjYXl5LzBaMm9zV3ZZdlVCNlZQ?=
 =?utf-8?B?VHArTEwvYjBaYkxxOXR2MlBGeUtlUVZralFJMnlySkxHa3BZRU9naFNJdVlN?=
 =?utf-8?B?cCtnSlduQjAzLzM4RnNyZWJNQUdqbTFnMFQzZG52ckk5d1hRTUc4WXdsWlVq?=
 =?utf-8?B?RUsyOTFGeVRzRG1NN1c4VmN5Mk0zWEFnbjFpVnZwT2NzN0F2VWxZcUpJcHRr?=
 =?utf-8?B?a2JXdysxU0JUSk1JWFhjZHE4SmE1ajV3YUozQWgrMXdQUzVhOStsNVBOektO?=
 =?utf-8?B?emY1aTU3dzhERHdDRmZqdHdyQ3JlZHhhSnowZ29HN0dxTmFTQXl6WVNQbmph?=
 =?utf-8?B?ZFc5NlpjUHhHdWYxRkVWQ2ZleXFWTVlxNVIyQldZZGpiRjZ6dXMyWmM5Uk9k?=
 =?utf-8?B?RG5lUitLdy9TaE9XR3F3VW5oVVhtS1VYUUZId3c1bkNkUFV4UncvTkdFb2Rz?=
 =?utf-8?B?SHA0cFYwQUNtS0ZyZFlzcjRUTEpkRmRPVDR6WS8rY1NyVjVlZzlCZ1RWM2Ey?=
 =?utf-8?B?T3JieFk0di9VcnZBUU9mS3FjTUsvRnpmWUJIazRDWmg1amZlb0hiQjkvVUxz?=
 =?utf-8?B?QWloaXRUT3I5UGcxWjZYbjJzSXhIMzFRWUE5bE1BUzNSZXB2ZEhqbVFBaHpZ?=
 =?utf-8?B?WnRNTGlmWUVvMVJacnR4ZEtOM09KTlJKRG1mblg4ZnhFSUx3b2hxOG1ndWxx?=
 =?utf-8?B?MC8ySTZ1MU1yeUtWS0NzYno2dWpveWtXUDIwdFgzQVdGS0ZTcVNXcE55N3V3?=
 =?utf-8?B?RGxRUjVKSytMUWZXYndNeTFQOWxJdUpOYlo1aWdkOW5QVVBHT0lFeWRtS1VZ?=
 =?utf-8?B?US94YmlaSFI2d0FPTVh4Ny9RelB4dzJBQWdHNmtDS3hzTW9TTzhUaWp4ZHdS?=
 =?utf-8?B?MWV0b2k3ckc0RHNURkJJTVVTamYwWG5IU1hOakc1YlUrKzJ1WWZkdW9Lbzl3?=
 =?utf-8?B?NUFkSnpZNWNkKzVxZVFzZ1BzRUU1bjVzTWxaUmhsdnRDb2JpeGRDU0x0RUxP?=
 =?utf-8?B?TFVkR3UyY2xPM1g1c3Vzbk0xczc3T0VOcVZmK1E4SVhMZjRqS3llUW93ZFZM?=
 =?utf-8?B?OWYwS3BzZnQ1UnRQbVVXVzUwTnA1VTVmSUR5RUROT0dwenE2eHpqMi9DTG55?=
 =?utf-8?B?SnAxZ3V2N0lpWkdvVGM5RWU3bUxNREY2eDBoV2hacXFHWHBsRVR0TzMwSGZl?=
 =?utf-8?B?OFhRZk4zL0hhbmdDQm8xZEZ6c2g4L0cxSWZuUXROczROaExQMUQ0eW9FN3Rr?=
 =?utf-8?B?TDZYWXVHVytXK29sVHJPQWtFUnFheXZheEpHK3UwdlZRYkVZK2NiUzBlS0kx?=
 =?utf-8?Q?lWmMWNSGDBeYm4i1SuD4rLs=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4b6e1a75-036d-4a20-db66-08d9fce99908
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 07:44:07.9865
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Z9oyrF3YVWpox2XOu2fu/N4g9ihw3MKPZYBPiP5wo/8iQeVzj+lu1kGG6EypjMFR7WTdMvJMewfsO+k6qzDhAQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB4207

On 02.03.2022 23:11, Andrew Cooper wrote:
> This makes it behave slightly more like a regular boolean option.
> 
> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>

Reviewed-by: Jan Beulich <jbeulich@suse.com>

> Slightly RFC, because there is no easy way of making the opposite "normal
> boolean" case work for no-vpmu.

There's nothing to do to make this work afaict: Generic command line
handling converts "no-<option>" to "<option>=no" for custom params.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 08:02:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 08:02:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282813.481625 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPgPk-0008Pn-LG; Thu, 03 Mar 2022 08:02:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282813.481625; Thu, 03 Mar 2022 08:02:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPgPk-0008Pg-I4; Thu, 03 Mar 2022 08:02:20 +0000
Received: by outflank-mailman (input) for mailman id 282813;
 Thu, 03 Mar 2022 08:02:19 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=AhVD=TO=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nPgPj-0008Pa-KN
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 08:02:19 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3eb33222-9ac8-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 09:02:18 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 867DA1F37E;
 Thu,  3 Mar 2022 08:02:17 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 5F6F5132C1;
 Thu,  3 Mar 2022 08:02:17 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id PQakFQl2IGLrQQAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 03 Mar 2022 08:02:17 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3eb33222-9ac8-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646294537; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=arZstT6hCOBBaIX/lDq+R0r527Gi0dsNOT+iD7/dAfA=;
	b=AT2SaNP9vD27s+IvmUVi0sMajjfylvY47WnUHA+y++y0Sx5VT+QHR+lvD9ald4l5pSmc+R
	QEGTmmfKoG3aD+ejoP8UUpuUox1d/C85S9sHnSIhXzka6/S6tNB4rj3Jkxz/BtNb0x4wAI
	G4AABQFUw3+/r4Wj26f0O0DcI+fOdtQ=
Message-ID: <0b497cb4-a5d5-c853-aa17-c3b06e1395d3@suse.com>
Date: Thu, 3 Mar 2022 09:02:16 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [XEN PATCH v2 11/29] tools/xenstore: Cleanup makefile
Content-Language: en-US
To: Anthony PERARD <anthony.perard@citrix.com>, xen-devel@lists.xenproject.org
Cc: Wei Liu <wl@xen.org>, Julien Grall <julien@xen.org>
References: <20220225151321.44126-1-anthony.perard@citrix.com>
 <20220225151321.44126-12-anthony.perard@citrix.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <20220225151321.44126-12-anthony.perard@citrix.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------4Fy8NGlIsdmQyLxbu8jfH2Dh"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------4Fy8NGlIsdmQyLxbu8jfH2Dh
Content-Type: multipart/mixed; boundary="------------MBt0d0w3XJlBoKyvChNU2iQw";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Anthony PERARD <anthony.perard@citrix.com>, xen-devel@lists.xenproject.org
Cc: Wei Liu <wl@xen.org>, Julien Grall <julien@xen.org>
Message-ID: <0b497cb4-a5d5-c853-aa17-c3b06e1395d3@suse.com>
Subject: Re: [XEN PATCH v2 11/29] tools/xenstore: Cleanup makefile
References: <20220225151321.44126-1-anthony.perard@citrix.com>
 <20220225151321.44126-12-anthony.perard@citrix.com>
In-Reply-To: <20220225151321.44126-12-anthony.perard@citrix.com>

--------------MBt0d0w3XJlBoKyvChNU2iQw
Content-Type: multipart/mixed; boundary="------------yjND3TdLOvO29g27iRduXv90"

--------------yjND3TdLOvO29g27iRduXv90
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------yjND3TdLOvO29g27iRduXv90
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------yjND3TdLOvO29g27iRduXv90--

--------------MBt0d0w3XJlBoKyvChNU2iQw--

--------------4Fy8NGlIsdmQyLxbu8jfH2Dh
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIgdggFAwAAAAAACgkQsN6d1ii/Ey+W
6wf/SzkZB9XMZvG+c9rT/vCIDJsWGWaFfHv4JRPLFqYNqOq0sMXxEXFNtITCI5iIGeAuRc959Sb9
RRwXkNKaVN+KnfnTHBRa51bq1tKUR/LoruyucmAj6v1Wyl5P0HE7dgbTkjT9Ipz0lE6dwJDwOeqI
tJGxpjKlSjydqpFoCYTtR5wEFcTSBt51pWWqtbhXgmUolQWWOwXhpcMorsjBy5h+G3rDpB/oAC6g
Bohpvt0fx0oFtniv4f62z4dxGxLOfQ4M0sy3+hKo/FJdQ5ngdj2wOZEyt7QKpX6/3g/m/h5HZNow
L/rxQRmP9JncRkevV57zoGMD0ZxPZpRQZOZoBUxnqg==
=qlrZ
-----END PGP SIGNATURE-----

--------------4Fy8NGlIsdmQyLxbu8jfH2Dh--


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 08:06:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 08:06:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282823.481636 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPgU4-0000oB-AF; Thu, 03 Mar 2022 08:06:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282823.481636; Thu, 03 Mar 2022 08:06:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPgU4-0000o4-78; Thu, 03 Mar 2022 08:06:48 +0000
Received: by outflank-mailman (input) for mailman id 282823;
 Thu, 03 Mar 2022 08:06:46 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=AhVD=TO=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nPgU2-0000ny-Qj
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 08:06:46 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id de3e3a47-9ac8-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 09:06:45 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 5C029210DF;
 Thu,  3 Mar 2022 08:06:45 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 1FBB713AB4;
 Thu,  3 Mar 2022 08:06:45 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id yVIXBhV3IGLgQwAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 03 Mar 2022 08:06:45 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: de3e3a47-9ac8-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646294805; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=AambmpxdM/iL9lgtyuNFYQga9hIejxEiHVfigduHDhs=;
	b=UHKp+jG4MmrIJa9H1jdLoSKWdiYNek8t12XSorR6j57tsSxU31nuvn8rghm7mliTNV4zhU
	jN1y1+ZFrB9oC/ysN9bq5WcItQXGEiv8Bczsnz95g9iKW6ct0HVk9yYVDhypcGRisTqLfu
	TtPlnV370y+zXZisJ4kuXFL1IksLXkk=
Message-ID: <4265c2e9-8201-fa72-a4c2-e3c25474492e@suse.com>
Date: Thu, 3 Mar 2022 09:06:44 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [XEN PATCH v2 15/29] libs: Remove need for *installlocal targets
Content-Language: en-US
To: Anthony PERARD <anthony.perard@citrix.com>, xen-devel@lists.xenproject.org
Cc: Wei Liu <wl@xen.org>
References: <20220225151321.44126-1-anthony.perard@citrix.com>
 <20220225151321.44126-16-anthony.perard@citrix.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <20220225151321.44126-16-anthony.perard@citrix.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------PS0SvvxE3nGgQNe2nIs6zaxC"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------PS0SvvxE3nGgQNe2nIs6zaxC
Content-Type: multipart/mixed; boundary="------------8aFzvnx9dQpdhJ4a4s7yczgP";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Anthony PERARD <anthony.perard@citrix.com>, xen-devel@lists.xenproject.org
Cc: Wei Liu <wl@xen.org>
Message-ID: <4265c2e9-8201-fa72-a4c2-e3c25474492e@suse.com>
Subject: Re: [XEN PATCH v2 15/29] libs: Remove need for *installlocal targets
References: <20220225151321.44126-1-anthony.perard@citrix.com>
 <20220225151321.44126-16-anthony.perard@citrix.com>
In-Reply-To: <20220225151321.44126-16-anthony.perard@citrix.com>

--------------8aFzvnx9dQpdhJ4a4s7yczgP
Content-Type: multipart/mixed; boundary="------------me89StkLAuPVQz0W7Bnrew8U"

--------------me89StkLAuPVQz0W7Bnrew8U
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

T24gMjUuMDIuMjIgMTY6MTMsIEFudGhvbnkgUEVSQVJEIHdyb3RlOg0KPiBUaGVyZSBpcyBu
byBuZWVkIGZvciBhbiBleHRyYSAiaW5zdGFsbGxvY2FsIiB0YXJnZXQsIHdlIGNhbiB1c2UN
Cj4gZG91YmxlLWNvbG9uIHJ1bGVzIGluc3RlYWQuDQo+IA0KPiAiaW5zdGFsbC1oZWFkZXJz
IiBpbiAibGlicy9zdG9yZSIgd2FzIGludHJvZHVjZWQgZm9yIHRoZSBzYW1lIHJlYXNvbg0K
PiB0aGF0ICJpbnN0YWxsbG9jYWwiIGV4aXN0LCBzbyBpdCBpcyByZXBsYWNlZCBhcyB3ZWxs
Lg0KPiANCj4gU2lnbmVkLW9mZi1ieTogQW50aG9ueSBQRVJBUkQgPGFudGhvbnkucGVyYXJk
QGNpdHJpeC5jb20+DQoNClJldmlld2VkLWJ5OiBKdWVyZ2VuIEdyb3NzIDxqZ3Jvc3NAc3Vz
ZS5jb20+DQoNCg0KSnVlcmdlbg0K
--------------me89StkLAuPVQz0W7Bnrew8U
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------me89StkLAuPVQz0W7Bnrew8U--

--------------8aFzvnx9dQpdhJ4a4s7yczgP--

--------------PS0SvvxE3nGgQNe2nIs6zaxC
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIgdxQFAwAAAAAACgkQsN6d1ii/Ey/r
1wf/ReGcVSvLj2xgfKzSiGP/pX9M+soWE9Qb3ulNzYV1ov17sbBDzT+2VcR+2+Hn2cWGGM1WtJ30
x3EMLbkcZWB2U5/vzLOHBtk2UWdJxJWjpuBaZr4LAu6qt5n4OPiSDmrUk4PnO91VP7lxfiddwlMG
bOdMWMagvqs2ruu6LtpD99QsCK+ewsTiT7SdXn3DR+ZXZMFUNQB5huF9KEDQi6QwzIuFdYqKW8Px
vtPq2r8GPS1p1c7sup6QICMHi81ti58rQOcLgCi2TTCyJlmv8EzP/AnxHIK47npGovuEj4wLNPGI
dXG3J2LvJEenwFunoSwTct7vBaioLP5tXqQvlbrJYg==
=minQ
-----END PGP SIGNATURE-----

--------------PS0SvvxE3nGgQNe2nIs6zaxC--


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 08:21:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 08:21:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282831.481646 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPgie-0003CJ-LU; Thu, 03 Mar 2022 08:21:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282831.481646; Thu, 03 Mar 2022 08:21:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPgie-0003CC-IS; Thu, 03 Mar 2022 08:21:52 +0000
Received: by outflank-mailman (input) for mailman id 282831;
 Thu, 03 Mar 2022 08:21:51 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=AhVD=TO=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nPgid-0003C6-A7
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 08:21:51 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f7378fee-9aca-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 09:21:46 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 9B7161F37E;
 Thu,  3 Mar 2022 08:21:49 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 75778139BD;
 Thu,  3 Mar 2022 08:21:49 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id zfpIG516IGKrSQAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 03 Mar 2022 08:21:49 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f7378fee-9aca-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646295709; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=BIP6gJlg5ZyEg4u9q3agdpQs7E30pfnlSGNfIv2rcps=;
	b=klgStRnCiB0yWvobB4qKluHLJvsLiD7l/azIpGUnOxeoSS0P3D2zC7yrkz9iM3Kj8bPHnU
	ogVmmU7Mq46m4cpXEoKl7xYapMtteEYT80QkdXInBRwP3BEufb/J1kIhyW4Kl72b3A7ApH
	IjZDBoP/BjttqcDArbyzx0j65R+PiXg=
Message-ID: <d5770e63-7d63-427d-1ca6-02982b5fa00e@suse.com>
Date: Thu, 3 Mar 2022 09:21:48 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [XEN PATCH v2 16/29] libs,tools/include: Clean "clean" targets
Content-Language: en-US
To: Anthony PERARD <anthony.perard@citrix.com>, xen-devel@lists.xenproject.org
Cc: Wei Liu <wl@xen.org>
References: <20220225151321.44126-1-anthony.perard@citrix.com>
 <20220225151321.44126-17-anthony.perard@citrix.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <20220225151321.44126-17-anthony.perard@citrix.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------rwO6BFSiuJQIG4ABLwRmB1d2"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------rwO6BFSiuJQIG4ABLwRmB1d2
Content-Type: multipart/mixed; boundary="------------xIiKVEYHTXj6U6EO0s5ykKSv";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Anthony PERARD <anthony.perard@citrix.com>, xen-devel@lists.xenproject.org
Cc: Wei Liu <wl@xen.org>
Message-ID: <d5770e63-7d63-427d-1ca6-02982b5fa00e@suse.com>
Subject: Re: [XEN PATCH v2 16/29] libs,tools/include: Clean "clean" targets
References: <20220225151321.44126-1-anthony.perard@citrix.com>
 <20220225151321.44126-17-anthony.perard@citrix.com>
In-Reply-To: <20220225151321.44126-17-anthony.perard@citrix.com>

--------------xIiKVEYHTXj6U6EO0s5ykKSv
Content-Type: multipart/mixed; boundary="------------1TCurnouaVHkOGlhtr0SCBU2"

--------------1TCurnouaVHkOGlhtr0SCBU2
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------1TCurnouaVHkOGlhtr0SCBU2
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------1TCurnouaVHkOGlhtr0SCBU2--

--------------xIiKVEYHTXj6U6EO0s5ykKSv--

--------------rwO6BFSiuJQIG4ABLwRmB1d2
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIgepwFAwAAAAAACgkQsN6d1ii/Ey/c
2AgAhM/hXJsBbHHSwWcgyP5DFkV0BO5x1z9PVSDwI/4oleE+N+mQ//f3/01ftQRDcVXjklTGv+rr
DoERetWKsZrLMiA1uLhXRKsaq5BjnYgF6TxagW/FI+f/6jIOyoDjaQEJNr9HN/1WfTrw7c6+7gpV
0jYolDMEuCElbJueVrquJcPNhIANH5wxUb/NLH7rbaFtXiUIJmLDuyGE0H6anzQwtzIuq9Lki3Z5
mAq6X/fTWbpSJXci4/iWxdtJDfV+UMK2LF15A3Tp5v2+JbIbgc+Yiy53fogySVxjb0ZD/6xqR+yD
5eh2dd1z14MKp+y7G4Zbi511VVtIgNloKJExi6+bNw==
=rPlR
-----END PGP SIGNATURE-----

--------------rwO6BFSiuJQIG4ABLwRmB1d2--


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 08:24:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 08:24:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282839.481658 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPgl1-0003ne-3e; Thu, 03 Mar 2022 08:24:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282839.481658; Thu, 03 Mar 2022 08:24:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPgl0-0003nX-WF; Thu, 03 Mar 2022 08:24:19 +0000
Received: by outflank-mailman (input) for mailman id 282839;
 Thu, 03 Mar 2022 08:24:18 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPgl0-0003nR-Iz
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 08:24:18 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4f1d4238-9acb-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 09:24:14 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2110.outbound.protection.outlook.com [104.47.18.110]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-32-5CkdrwX1PQ2kiMmxly25oQ-1; Thu, 03 Mar 2022 09:24:16 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR0401MB2368.eurprd04.prod.outlook.com (2603:10a6:800:29::25)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.22; Thu, 3 Mar
 2022 08:24:14 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 08:24:14 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4f1d4238-9acb-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646295857;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=6AU69iuTQOnoOEvUGyViPRsMi+Wh140ZpZc3DakmUaI=;
	b=B0Qj/YM0RTwstaXLhpSJAkCcLZwjX25bDLQfVPDU0AkcdGyOwtWeqKIUPh+TUru3xFKf5q
	gFvOza66lhJxVkdIJ8VKbMhaWrdo0LijjMgwU7dNdQtmymtvz/PAXzFePnhLFyENjg6YiG
	JT49VQcy01Mscd38PthjQ9u0NHWYAk8=
X-MC-Unique: 5CkdrwX1PQ2kiMmxly25oQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=l7WjK3U8df+aE1diap8m9XBP8ssbnEc8mrp7ra83YSfyNUVoRLBgQ4gqA4YWVB519Cvfv8SFJLF1ecw5C/S0j9gJj+F0uSm7sDOjl9D55WrPSS0TdTzrAM/90scMvtd9PHFRzKsu7apbh1DmQ8JGTwY/5z79MADXnqvOwBP8OQ1cif2ewR6Zc9ArG0ZpbyODtVd6FQjfFYd7VSUg0GNMu+tjk70EmOZKOCoWlL3e4BenDRkd1/JEkS6V4YfEpLXTVfevmXTP74sXJH2K4Q1vpdTqN5gKMRAO94ssr8OeN6FO4VpRMpOe3rfAE/7V6mFufYJ0s/4oB7y6u3/YjiPWiA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=6AU69iuTQOnoOEvUGyViPRsMi+Wh140ZpZc3DakmUaI=;
 b=QPc46aVVuMqxETgDo/XVA4OuVO07OqEPs3KWGpKnAHw7ci7Ekt8DnJT1R1zwf9FFCD0OovoqUBnMQ/ChS0hqNmnGIGjuRvx1vouuZSC5SYc2OhJxbV2t59fKmXBdS1psvePUt0nVwXWpN1Jqek8FJPAYTu2CmS33WhQmndQkvBIcUnhJxHhxpeqIzRwgWnmCm4nb/c9l5AU6m4qOFxzU8YoEkD0+++TxGrbS6I6PmzCxhAZ5g2rhBxuPovRRvaVmejjAdqBtenu2vgev6fROJaLp+c2Y+KyBlrpsnzehxXHdJxIJjk+gB+vcUeCrvP+rCNDNLFM3gYat1UIjg9lPfg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <71b32db2-6591-bc94-4421-2dc13de7fdd0@suse.com>
Date: Thu, 3 Mar 2022 09:24:12 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH RFC] xen/sched: Optimise when only one scheduler is
 compiled in
Content-Language: en-US
To: Andrew Cooper <andrew.cooper3@citrix.com>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Wei Liu <wl@xen.org>, Juergen Gross <jgross@suse.com>,
 Dario Faggioli <dfaggioli@suse.com>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <20220303004015.17688-1-andrew.cooper3@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220303004015.17688-1-andrew.cooper3@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM5P194CA0021.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:203:8f::31) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: dbe3f4d7-bb1a-4410-65f9-08d9fcef3390
X-MS-TrafficTypeDiagnostic: VI1PR0401MB2368:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<VI1PR0401MB23689D4ED62F79E6FB18F890B3049@VI1PR0401MB2368.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	aEed7KqOVRqaYMRKJ5Nt4h8c20GkIWgWM/dDQSWsmEE6RaHE85Z0rLdi8Gs8RjzTzlP1gO4viNBOaRFNzwDqXUd4WHKEi5BOuERSi2hdLLXJZsELbCUAE7XGO9J5b2oAG/EgyH12YSZfDyitRY2dcnRPIficytGqTHQAJzdwRSqTc6C8TgNExgQy2rYTZowCBFX3nVzsN5KCy1zIiOS8l308XNiPXzT0yBmWWS7wVOuAe4yfMrsP/IOSkKvP+ncOjFIooMlDexEiThBGO9a8rmGmYAt68ttr2Y0lwt/82SUKMcbrAFyR1eI6uO6TbZiGUjgJLJqANdjPfpMsdgsV2ksSeNCFuG1lFNot0LNWnQ6ZYxvOVlG97MUle9YqBLfN4hbcbMm3Mk8h267OhfKFXm40VdV0axnrFooS92s8Xiwx9EBhggUlQed97bxIxAThbILHCV3d+mBfeBNVRwhZWWW6uf2beagOrt+wO/UYt9bHBkYwUDZosIwjLU5JYjNMKwWiZGCcS7FruViscseFzGzb34ZJUGMBLd5AZFkcKbzo+rtCjYJZYIXMXINCtQXnh2EJSm9svGbGSFRgKDDcZ2sXQsZotCWcrHDVg85fxpdlr4mTLFIZ+uBXkg2X8zlEky6LgdO4yaOj7Y6WFiz0jdbPgcL1FDFklmqLANeQfN60gmFPOceNB9G2iyXli4rZLRpTlYCT+eu36ajn4o8FUAcl+JThqEhJViZqQ4J+oEun1CH3qfj+6/LLV4UQhZg3Ats7muJMsuDAjclp5+XrKQTjIjpqN9gmQnF46CSwxymAORzwqydnbr+PJuCXpVnP
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(8936002)(66556008)(83380400001)(38100700002)(66946007)(6506007)(508600001)(5660300002)(6486002)(966005)(8676002)(66476007)(4326008)(53546011)(36756003)(31686004)(54906003)(2906002)(6512007)(2616005)(6916009)(186003)(26005)(31696002)(86362001)(316002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?N1ZncHlwNmlJb3ZyQmpUOWVpNXE0dmhRaCtncHluWVBwZGhONENCakc0bUM3?=
 =?utf-8?B?Nkd2S3kxNFdFcXZHNlBKMmtPNnBiRG9MZW1PcGNOdGp1aGIzUmxLa29ONHJE?=
 =?utf-8?B?dDZZbFpZY1FIK2lUdi9LZktzV1cvNmRrYko2QjNRSVBDa09CcVF6YnBzckdy?=
 =?utf-8?B?N3FKSGFsR3BmSFhHK1FDejRoU00rbFh1S1JTcVVNQXJvdVVzbEVvY2FUUnZI?=
 =?utf-8?B?WE1jRjlncTlUUHFYTVkraHF1ZGhqQW9FMnJxaW5HVVNIOUZmUi9UQ3FDNHJE?=
 =?utf-8?B?R2Mwd1V6MHB3ellWZWlTbU10eGpHd01tRzRzT2pjM29MUnIvbkpkSVhVb0Uy?=
 =?utf-8?B?Z0ZSamZTSW9pSVVpS0JRSjhDcE12ZnM4OU1ES2h0Y0ZpYTJ1RnpKSTFYaFBm?=
 =?utf-8?B?THpjcmJaQ3ZLVHBacnNybEtuYjQ5Zm5NN0VPcFB4dkplaEh1UnBIRVVwdEdq?=
 =?utf-8?B?MXdsYnlaMG1lR3VXWFFveHY5bURVOGZod2FucDZNc3l3V0I1T2lMTGN2bHZK?=
 =?utf-8?B?UlZOU2NoTDVTMkx4TmExS0p2N1doRVh1Z0RPcTFHZU1yd3VZRTFHbGhqeFhq?=
 =?utf-8?B?NmRoRElob2NpN3hrWFdNNkxYTS9ObFh6dnc0cXBYVFZoRUJuZnFjL2dEcXE4?=
 =?utf-8?B?elhid2MxNEg2TTdXSlNVWkRlWlQzNXRrYzI5V0FWbWdyZXNaK1VYVEpuNEwv?=
 =?utf-8?B?TmRHbUtkQ1BQOGo1Yy9HL3Y2ZjJuLzNaWXBZUDNISWhHTnhiOWdnb1FEbTNa?=
 =?utf-8?B?NW9WS0JLbVlSQk9Tay9FenArMjdxenZYdE1aby9zaTNpMEZ4aWFRUGhrdkZr?=
 =?utf-8?B?Z1ZpMkxkWFFpVTA1SnVyOXlhVlA1aWtOaGJ5R1QzRkd6Y3RiT1RsempIQ3hq?=
 =?utf-8?B?OWJnejIyMWxLcWlseFRFaWhTekJ2R01CRE52WGMwRXRvRHN5TEZRR1M2UXRq?=
 =?utf-8?B?UFBVeWswUHpWeDVMUUZPVmp6VHhYNXVWa25qOEtuem1qQ1pzR1lCUnZBc2Va?=
 =?utf-8?B?Y0Vydk12SExWVTdXN0R2SmQrN1JENk9CNzY0NUVQcWFIWnFHS04rSENOVDl0?=
 =?utf-8?B?N28vMGxqL3VFdjZIWThZOU9yUll5Sm5MVWxwY053UTZUK2JycVp6dm41RU9l?=
 =?utf-8?B?ZVhUZnhJV01uTElzNmJ5QTdBRTFWVURmSkdWdkU4aUJ2Z1M1S1hNT1pJR1FR?=
 =?utf-8?B?QXFBcmVzclNic0dUYnZSZ2R3aVRYVVkwVFpyYnJQNGRPekorcjVkUTk4V0ZE?=
 =?utf-8?B?a1YzdVlGd09LM1BVQTNJMVdrL1pZS2Uwa2Y0bmVaQlNRUEp2a3JlSklPOXdG?=
 =?utf-8?B?Rkg0ZkdQY1EzL0M2S3laeDcrSjZkOGJQN2RESVFyZ3hVSk9UZVBsUHZJTDNS?=
 =?utf-8?B?OXB1NkFvUHVPUTJaMFpaMXFzNkFYVkFXYTUvdGd2QWRwSWxySTVuQ1pBWUZv?=
 =?utf-8?B?ejJ3STNKL3R1OUsvWGFKT1NsZFE0NDJyaS9VU0R0ZDlBMk5KZ0lEQUYySlEy?=
 =?utf-8?B?KytoelFTZ0tXN3Q5ZjQ5b2g5emtWR2ZueTRWWlk4N3F4N3ljNlJhQjJqNVg0?=
 =?utf-8?B?Y2xsVWV6aUIzMHJCUzJYeFIyVm55T2pVQVR6bWxwdkZIMllXTnYrdVg0Zmlq?=
 =?utf-8?B?WUgreEFLdndxQWRzU3VSaEh3aE8vem81Mzk5aGJ4K3d1ZEY1eENjS1ZwZGc3?=
 =?utf-8?B?OUVZRHZ3OTR2SjNwSWxGUnhQdWVZSTdNRW1xOWhyNmRXUDBVNHlNUjltcjdT?=
 =?utf-8?B?aGE3TWJKOVUyV0tYSXJuRmhDVW5LVEVDSXVWYTRFZUpyZ0hqSWVWQ0tOZjhH?=
 =?utf-8?B?QWpWM3dFRzBqQXR1VWhCSWRVTzVsbzYvUzRPaVhiWVcrWTFSMVVadWMyVUdu?=
 =?utf-8?B?YU5WaklIUEdvRVVudXJZd0g5MUJTaDYrd1VrbUh1dDhueTdQVkszYWFVYXJ4?=
 =?utf-8?B?Ym1tN3dub0Jna1pWOWk0eGlvbTNnM3c0MEFKS2pwRDRlb1c2VE1yUGEzQ0pD?=
 =?utf-8?B?Zm4rUWEyTUFZN1VYbHFEVDlaa2ZTUGgwZy9nSHhjRnRQVW82NVZjNm1FMUoz?=
 =?utf-8?B?aDl5K0xZNTNMS1kzSUVaY2t6SVVON1o5bGdmNDZMZk5KcjlRMnFzcnYvdW1n?=
 =?utf-8?B?cG14ZUh0aWxDM3NKOHV5alE1QUwvb3JRQzhibHZHamo4TFNWV0dFbTBsOCth?=
 =?utf-8?Q?yJeJjzJLrpV0khUamARZa1s=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: dbe3f4d7-bb1a-4410-65f9-08d9fcef3390
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 08:24:14.3995
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 18uTlN7MjfEV4GWRQiUJ1fR7kUFlI1mrz4siZ4QyCS7lPV3TAuLGW+BVgX3/A8m/nYc51HVFSa7nwqfAjbN5vQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0401MB2368

On 03.03.2022 01:40, Andrew Cooper wrote:
> When only one scheduler is compiled in, function pointers can be optimised to
> direct calls, and the hooks hardened against controlflow hijacking.
> 
> RFC for several reasons.
> 
> 1) There's an almost beautiful way of not introducing MAYBE_SCHED() and hiding
>    the magic in REGISTER_SCHEDULER(), except it falls over
>    https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91765 which has no comment or
>    resolution at all.
> 
> 2) A different alternative which almost works is to remove the indirection in
>    .data.schedulers, but the singleton scheduler object can't be both there
>    and in .init.rodata.cf_clobber.

Couldn't we name the section differently when there's just one member,
placing that section inside __initdata_cf_clobber_{start,end} in the
linker script?

> 3) I can't think of a way of build time check to enforce that new schedulers
>    get added to the preprocessor magic.

An assertion in the linker script, checking that .data.schedulers has a
single entry when the sched_ops symbol exists? This may involve a
PROVIDE(sched_ops = 0) as there doesn't look to be a way to probe for
symbol defined-ness in expressions.

> And the blocker:
> 4) This isn't compatible with how sched_idle_ops get used for granularity > 1.

Special case it just like we special case plt_tsc in x86/time.c?

> --- a/xen/common/sched/private.h
> +++ b/xen/common/sched/private.h
> @@ -271,6 +271,33 @@ static inline spinlock_t *pcpu_schedule_trylock(unsigned int cpu)
>      return NULL;
>  }
>  
> +#if 1 ==                                                                \
> +    defined(CONFIG_SCHED_CREDIT) + defined(CONFIG_SCHED_CREDIT2) +      \
> +    defined(CONFIG_SCHED_RTDS) + defined(CONFIG_SCHED_ARINC653) +       \
> +    defined(CONFIG_SCHED_NULL)
> +
> +extern const struct scheduler sched_ops;
> +#define MAYBE_SCHED(x) __initdata_cf_clobber sched_ops

__initconst_cf_clobber, seeing that all use sites also use const?

> @@ -333,39 +360,48 @@ struct scheduler {
>      void         (*dump_cpu_state) (const struct scheduler *, int);
>  };
>  
> +static inline int sched_global_init(const struct scheduler *s)
> +{
> +    if ( s->global_init )
> +        return sched_call(s, global_init);
> +    return 0;
> +}

Is it really a good idea to expose this here when it's supposed to be
used from core.c only, and even there in just a single place?

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 08:33:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 08:33:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282848.481668 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPguF-0005R5-57; Thu, 03 Mar 2022 08:33:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282848.481668; Thu, 03 Mar 2022 08:33:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPguF-0005Qy-2E; Thu, 03 Mar 2022 08:33:51 +0000
Received: by outflank-mailman (input) for mailman id 282848;
 Thu, 03 Mar 2022 08:33:50 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=AhVD=TO=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nPguE-0005Qo-58
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 08:33:50 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a5857eb4-9acc-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 09:33:48 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 1D0731F381;
 Thu,  3 Mar 2022 08:33:48 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id E3928139BD;
 Thu,  3 Mar 2022 08:33:47 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id icI0Nmt9IGIdTgAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 03 Mar 2022 08:33:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a5857eb4-9acc-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646296428; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=YUKGJfs0EvBYUjC7tfioxcddtexeJOZCeh42/Z2L458=;
	b=F51A8HuHjKwQ2IGmUMDVEf2Mz6qz4fr63tC9Y19LAQB29qfpOLQr9viRqBn7jk/AktiTxf
	tbnL0GhH9StdmVAbWQobBPWGiyFfe9MllTxzm1iISVWmUxDuB80jlvMu2ac49Z0MOwuCLu
	sdkId35DqZIb79yQxc7SgpZh1MgtXM0=
Message-ID: <4270d03c-50a9-b1aa-dc2e-53e998153a6b@suse.com>
Date: Thu, 3 Mar 2022 09:33:47 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [PATCH RFC] xen/sched: Optimise when only one scheduler is
 compiled in
Content-Language: en-US
To: Andrew Cooper <andrew.cooper3@citrix.com>,
 Xen-devel <xen-devel@lists.xenproject.org>
Cc: Jan Beulich <JBeulich@suse.com>, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?=
 <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
 Dario Faggioli <dfaggioli@suse.com>
References: <20220303004015.17688-1-andrew.cooper3@citrix.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <20220303004015.17688-1-andrew.cooper3@citrix.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------GY0iOlkfCj5hpHZ3UPAhwCGH"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------GY0iOlkfCj5hpHZ3UPAhwCGH
Content-Type: multipart/mixed; boundary="------------8x6d9n40t4efqE43aOy37GAo";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Andrew Cooper <andrew.cooper3@citrix.com>,
 Xen-devel <xen-devel@lists.xenproject.org>
Cc: Jan Beulich <JBeulich@suse.com>, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?=
 <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
 Dario Faggioli <dfaggioli@suse.com>
Message-ID: <4270d03c-50a9-b1aa-dc2e-53e998153a6b@suse.com>
Subject: Re: [PATCH RFC] xen/sched: Optimise when only one scheduler is
 compiled in
References: <20220303004015.17688-1-andrew.cooper3@citrix.com>
In-Reply-To: <20220303004015.17688-1-andrew.cooper3@citrix.com>

--------------8x6d9n40t4efqE43aOy37GAo
Content-Type: multipart/mixed; boundary="------------20mGi2E6RGIm6zeZHk0XsRee"

--------------20mGi2E6RGIm6zeZHk0XsRee
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

T24gMDMuMDMuMjIgMDE6NDAsIEFuZHJldyBDb29wZXIgd3JvdGU6DQo+IFdoZW4gb25seSBv
bmUgc2NoZWR1bGVyIGlzIGNvbXBpbGVkIGluLCBmdW5jdGlvbiBwb2ludGVycyBjYW4gYmUg
b3B0aW1pc2VkIHRvDQo+IGRpcmVjdCBjYWxscywgYW5kIHRoZSBob29rcyBoYXJkZW5lZCBh
Z2FpbnN0IGNvbnRyb2xmbG93IGhpamFja2luZy4NCj4gDQo+IFJGQyBmb3Igc2V2ZXJhbCBy
ZWFzb25zLg0KPiANCj4gMSkgVGhlcmUncyBhbiBhbG1vc3QgYmVhdXRpZnVsIHdheSBvZiBu
b3QgaW50cm9kdWNpbmcgTUFZQkVfU0NIRUQoKSBhbmQgaGlkaW5nDQo+ICAgICB0aGUgbWFn
aWMgaW4gUkVHSVNURVJfU0NIRURVTEVSKCksIGV4Y2VwdCBpdCBmYWxscyBvdmVyDQo+ICAg
ICBodHRwczovL2djYy5nbnUub3JnL2J1Z3ppbGxhL3Nob3dfYnVnLmNnaT9pZD05MTc2NSB3
aGljaCBoYXMgbm8gY29tbWVudCBvcg0KPiAgICAgcmVzb2x1dGlvbiBhdCBhbGwuDQo+IA0K
PiAyKSBBIGRpZmZlcmVudCBhbHRlcm5hdGl2ZSB3aGljaCBhbG1vc3Qgd29ya3MgaXMgdG8g
cmVtb3ZlIHRoZSBpbmRpcmVjdGlvbiBpbg0KPiAgICAgLmRhdGEuc2NoZWR1bGVycywgYnV0
IHRoZSBzaW5nbGV0b24gc2NoZWR1bGVyIG9iamVjdCBjYW4ndCBiZSBib3RoIHRoZXJlDQo+
ICAgICBhbmQgaW4gLmluaXQucm9kYXRhLmNmX2Nsb2JiZXIuDQo+IA0KPiAzKSBJIGNhbid0
IHRoaW5rIG9mIGEgd2F5IG9mIGJ1aWxkIHRpbWUgY2hlY2sgdG8gZW5mb3JjZSB0aGF0IG5l
dyBzY2hlZHVsZXJzDQo+ICAgICBnZXQgYWRkZWQgdG8gdGhlIHByZXByb2Nlc3NvciBtYWdp
Yy4NCj4gDQo+IEFuZCB0aGUgYmxvY2tlcjoNCj4gNCkgVGhpcyBpc24ndCBjb21wYXRpYmxl
IHdpdGggaG93IHNjaGVkX2lkbGVfb3BzIGdldCB1c2VkIGZvciBncmFudWxhcml0eSA+IDEu
DQo+IA0KPiBTdWdnZXN0aW9ucyB2ZXJ5IHdlbGNvbWUuDQoNCkRpZCB5b3UgY29uc2lkZXIg
dG8gZ2VuZXJhdGUgdGhlIG5lZWRlZCBjb2RlIGR5bmFtaWNhbGx5IGluc3RlYWQ/DQoNCkkg
Z3Vlc3MgdGhpcyBjb3VsZCBldmVuIGJlIGV4dGVuZGVkIHRvIGF2b2lkIGZ1bmN0aW9uIHBv
aW50ZXJzDQpjb21wbGV0ZWx5IHVzaW5nIHRoZSBzYW1lIHRlY2huaXF1ZSBhcyBpbiBteSBo
eXBlcmNhbGwgc2VyaWVzLg0KDQpJbiBvcmRlciB0byBhdm9pZCB0aGUgbmVlZCBmb3IgYSBj
ZW50cmFsIHRhYmxlIHRoZSBwZXItc2NoZWR1bGVyDQpob29rcyBjb3VsZCB1c2Ugc3RhbmRh
cmQgbmFtZXMgKGFzIG1vc3Qgb2YgdGhlbSBkbyBhbHJlYWR5KS4NCg0KSSB0aGluayBJIGNv
dWxkIGNvbWUgdXAgd2l0aCBhIHBhdGNoIGluIGEgZmV3IGhvdXJzIGlmIHlvdSBsaWtlDQp0
aGF0IGFwcHJvYWNoLg0KDQoNCkp1ZXJnZW4NCg==
--------------20mGi2E6RGIm6zeZHk0XsRee
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------20mGi2E6RGIm6zeZHk0XsRee--

--------------8x6d9n40t4efqE43aOy37GAo--

--------------GY0iOlkfCj5hpHZ3UPAhwCGH
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIgfWsFAwAAAAAACgkQsN6d1ii/Ey+k
gQgAjefk8/MwHvw2O5bp8Z/e3itJitYJbeFR+74ABvJR11HdL+un4jardgetFYaX1c4k7u2zQRoR
l3jT3XEejVX6htEPy9NmmylETm6jyvttIND5AjpfzZZRDgs8Z4GHBhUZAIpd44s7VBeFIz/izhpi
9ZgsqBWzVDrCSlGyPmfBehXrwB+9tOfA7kZBW1cBu1FXKCi9nxeiFXPCT54b3SfMxL+GGlZS4twA
E9nL4e0Axp3OPLBK2OwWkBMI7NLsVrx7n6ctZ1v8PCgMRIf1LS3xsMHT/NLqEpERpKCV3kW2sccG
WhbGjew64SQKb5KELMT7cOH15HgCACaW3Gax3/tkdg==
=Dvnk
-----END PGP SIGNATURE-----

--------------GY0iOlkfCj5hpHZ3UPAhwCGH--


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 09:15:44 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 09:15:44 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282859.481686 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPhYa-0001fq-HL; Thu, 03 Mar 2022 09:15:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282859.481686; Thu, 03 Mar 2022 09:15:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPhYa-0001fj-Dv; Thu, 03 Mar 2022 09:15:32 +0000
Received: by outflank-mailman (input) for mailman id 282859;
 Thu, 03 Mar 2022 09:15:30 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nPhYY-0001fd-Pv
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 09:15:30 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nPhYY-0001Ck-IO; Thu, 03 Mar 2022 09:15:30 +0000
Received: from gw1.octic.net ([81.187.162.82] helo=[10.0.1.193])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nPhYY-0000NK-Az; Thu, 03 Mar 2022 09:15:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=VmHKFRwwZlFDN0vrDp/zGMEMHRmiUBB3siuNUwo8XHY=; b=5lJLzwxbXLt6CjZmQNwSrxFQ3P
	2D/AMQf6lYrs0g3TJzisN1eZa4tghyXCJYLIUTAV/I13hIVcn6NNtciaY8kQevHqct68c3yR6755U
	WKKcqyW8t/+gvZK6kHpn0JeDwN1APdWC26x7yb7/YIisRV3Tufv4YoTlJgs1SqyZoXcw=;
Message-ID: <4058b2c7-4c46-bdb1-017d-69a934989071@xen.org>
Date: Thu, 3 Mar 2022 09:15:27 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: Proposal for Porting Xen to Armv8-R64 - DraftA
To: Wei Chen <Wei.Chen@arm.com>, Stefano Stabellini <sstabellini@kernel.org>
Cc: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Bertrand Marquis <Bertrand.Marquis@arm.com>,
 Penny Zheng <Penny.Zheng@arm.com>, Henry Wang <Henry.Wang@arm.com>,
 nd <nd@arm.com>
References: <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2202241606450.239973@ubuntu-linux-20-04-desktop>
 <AS1PR08MB74269923288B75097392BDD99E3E9@AS1PR08MB7426.eurprd08.prod.outlook.com>
 <4c558f8f-56d4-0445-32d4-169bc5d0a3bc@xen.org>
 <PAXPR08MB74200F4B0B4EFFD5BE1A6E699E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <7260f050-9022-4adf-618b-a8b271aca8c3@xen.org>
 <PAXPR08MB7420B367FFEB4FD3A7C88EB79E039@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <5eb5fe51-9ef7-affe-06e1-b15da512a76c@xen.org>
 <PAXPR08MB7420836458E512FE375B8F199E049@PAXPR08MB7420.eurprd08.prod.outlook.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <PAXPR08MB7420836458E512FE375B8F199E049@PAXPR08MB7420.eurprd08.prod.outlook.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Wei,

On 03/03/2022 01:35, Wei Chen wrote:
>>> 1. Assembly code for EL1 MPU context_switch
>>
>> This discussion reminds me when KVM decided to rewrite their context
>> switch from assembly to C. The outcome was the compiler is able to do a
>> better job than us when it comes to optimizing.
>>
>> With a C version, we could also share the save/restore code with 32-bit
>> and it is easier to read/maintain.
>>
>> So I would suggest to run some numbers to check if it really worth
>> implementing the MPU save/restore in assembly.
>>
> 
> It's interesting to hear KVM guys have similar discussion. Yes, if the
> gains of assembly code is not very obvious, then reusing the code for 32-bit
> would be more important. As our current platform (FVP) could not do very
> precise performance measurement. I want to keep current assembly code there,
> when we have a platform that can do such measurement we can have a thread
> to discuss it.

I briefly looked at the code, the assembly version is not going to be 
trivial to review and we don't know yet whether it has an advantage. So 
I would say this should be the inverse here.

We want the C version first until we can prove the assembly version is 
better.

My gut feeling is we will not need the assembly version.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 09:19:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 09:19:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282866.481696 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPhcE-0002P2-0U; Thu, 03 Mar 2022 09:19:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282866.481696; Thu, 03 Mar 2022 09:19:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPhcD-0002Ov-To; Thu, 03 Mar 2022 09:19:17 +0000
Received: by outflank-mailman (input) for mailman id 282866;
 Thu, 03 Mar 2022 09:19:16 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPhcC-0002Ol-0b; Thu, 03 Mar 2022 09:19:16 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPhcB-0001GI-VB; Thu, 03 Mar 2022 09:19:15 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPhcB-0002u7-IE; Thu, 03 Mar 2022 09:19:15 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPhcB-0002Wn-Hk; Thu, 03 Mar 2022 09:19:15 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=vRlinkdPgoYAzygFv9HBVM5USPl9XYODDWv1KZ7FgL4=; b=LYwRIkj+BDV2LuZIEXLEB35+zI
	SvaerirPRLnp610WZpd9EDRvPOF1FkUKYZzillKnvyHZrWuAAbjZP5VVybbXHXtY430qmOJZ6SA2G
	Qn+P6ae0oxIbQLnr0boUMuZUSeXxr9dwj0XPK8XxOOeSnUJj8EvybrqPUTxoDC9WQ57E=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168354-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168354: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=823a62ec8aac4fb75e6e281164f3eb56ae47597c
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 03 Mar 2022 09:19:15 +0000

flight 168354 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168354/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              823a62ec8aac4fb75e6e281164f3eb56ae47597c
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  601 days
Failing since        151818  2020-07-11 04:18:52 Z  600 days  582 attempts
Testing same since   168354  2022-03-03 04:21:44 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 99180 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 09:49:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 09:49:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282879.481708 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPi5o-0006CA-KX; Thu, 03 Mar 2022 09:49:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282879.481708; Thu, 03 Mar 2022 09:49:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPi5o-0006C3-Gq; Thu, 03 Mar 2022 09:49:52 +0000
Received: by outflank-mailman (input) for mailman id 282879;
 Thu, 03 Mar 2022 09:49:51 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPi5n-0006Bx-NA
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 09:49:51 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 44be1e15-9ad7-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 10:49:50 +0100 (CET)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04lp2056.outbound.protection.outlook.com [104.47.12.56]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-9-dEzZTFGSMk6CXB0S8ssZhg-1; Thu, 03 Mar 2022 10:49:49 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR0402MB2735.eurprd04.prod.outlook.com (2603:10a6:800:b5::17)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.25; Thu, 3 Mar
 2022 09:49:47 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 09:49:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 44be1e15-9ad7-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646300990;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=wxTlvrQrCrtfuzAef8q/M8aAHiBadKfLWySl/j0JE7c=;
	b=PtTywdLDu7G7ZJwzSj00A0mj6+NtdYeXpmmZS8Y1KoRjhkQNbacI0OOlKilyPYHGIi417C
	sbeXmQhu9CAUDLrVJ0YpaVoE3CybIO21/+vqiT99evT2D37cHqBEGMo/ULE9DVMTZQeQqG
	Zzu71bMGeylPxV1MijbRG2TZz3u1Wo8=
X-MC-Unique: dEzZTFGSMk6CXB0S8ssZhg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=gYrGgKPI/fpkYm6TT4aeqb9QGWVk4/kN7ygU8nyYlO3ORP2SrOjG63hGuWF82CHoOSJpHTgqcfAh4+j59+jcIWo0JehsTm0Yg9iLk1NmxCA1GZpahZnlycmUYp28W3aUyQ12qeXyTpdK61W66yII0aJb7oD/dHEbkAb+E6UtPmE1Jeib87CjKIO/XS0ufSiiGiHD+9tFb3v8p8TlBs6sorNpnOZE8gXUXMtKguOSsxdMq7DP+1tKGOVsKImi6J2OgbP8JIBMLWte5vULOdAk0gEFw4MWYnRawGn8ufN319N4tJ4xtaCo3vbmw0iT/gqDD4U4kKPSmbhMVVcAHJfyPA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=wxTlvrQrCrtfuzAef8q/M8aAHiBadKfLWySl/j0JE7c=;
 b=kqVYZ/nwebh+jxxhhaA19Q2LJGt/guekUdQNQoLymAM+iWaW/QiuxunEu+PZ0Y9B5/25TBD+wsdEbYgKcKe9fzoa8rliCKIeyXu8qfmo0ifBhc6YbMBzomaPEHtDoDxTgOFQkH8t4xqAWe9YGlDxiVyYlsLV9aPLXE4TN0Cqo8+idnWB0x53Am5sJRDB2oZ/3DywBkw5A6+9vm8HQRY9Q8XnV8uA4Ba0Un+jSXw+rUGNHyALYawtK5g4yCtZnvquIFZHUQ7u2DG2EiKzhw5ZTAXE+XHiTz5F3Jr16Z7spywjluWQMRuDxMfoBjj/cgSPmhyXtDuFK9uy8CYVNTD0WQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <fae0a082-8b39-9bd1-0ed3-35a660d704e8@suse.com>
Date: Thu, 3 Mar 2022 10:49:45 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Content-Language: en-US
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Lukasz Hawrylko <lukasz.hawrylko@linux.intel.com>,
 Daniel Smith <dpsmith@apertussolutions.com>,
 =?UTF-8?Q?Mateusz_M=c3=b3wka?= <mateusz.mowka@intel.com>
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH] x86/tboot: adjust Kconfig default
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6PR0202CA0060.eurprd02.prod.outlook.com
 (2603:10a6:20b:3a::37) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: d19d83cc-57f6-4e52-3eb7-08d9fcfb2726
X-MS-TrafficTypeDiagnostic: VI1PR0402MB2735:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR0402MB2735234C7C20805C95099F7EB3049@VI1PR0402MB2735.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(38100700002)(8936002)(2616005)(4744005)(36756003)(5660300002)(6512007)(83380400001)(186003)(2906002)(6916009)(26005)(6486002)(508600001)(66556008)(66476007)(8676002)(4326008)(31686004)(31696002)(316002)(6506007)(54906003)(66946007)(86362001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?dTBXRVNzMUp4cDJnaEdRM3NsY2JBQVY4OEhORk1wcHEwK2hLdjlzNHdQTGZC?=
 =?utf-8?B?QWI3WDdRRDcvSXkybkFrbWdDTVRsdjY0SGkxWm5uTWxzeFU2U245UTJtMHNT?=
 =?utf-8?B?K3NhaG9ENmxuV2d6SDFRQXhjZG50MU1DRi9DZUozcDUyRjJoWXRjQUhDWnRl?=
 =?utf-8?B?cmVFSWkrbm42QlU2VHNkeW9PNUlSL1AvdHBMbzVQUFdDS0NLQTNlbURMUWw5?=
 =?utf-8?B?NDNGdW9NSjQvYWppR2hhQ21JU25pYkFRdm04V29id29vNlZJd1F1THhGTTFs?=
 =?utf-8?B?dVVKbWJYeFd3NjdjbVkwdE9ta1N5Sk96RmtuSUtHekFsb1A5YlNJeDNVcXNH?=
 =?utf-8?B?SnE2L0JrM2V3U01EWW9pWGhybWZhZlQ3MzR6OVdsbUlaUUtwc1lCY2s3V3Ns?=
 =?utf-8?B?Tk5MZUEycmpDZTYybG1RaUo4R0RkU1RyTVA4Ui9oMWpLbzFMekNReEtkVnp5?=
 =?utf-8?B?ckZSZUh1ekpJMElXRmlQWWhQYnU3VWJJblRSd01vT0doSm95a0NCVkF3VXNw?=
 =?utf-8?B?cWRPM0hyRkdqanRnZS9kQVV4ejg4TjNmRGVlSVJ6QXEwdW15NFNQZHJhakg3?=
 =?utf-8?B?QnlNODVRclFiUG5pNDEzbXgyclV2REVSaTFsbG8rUXB0V3BBcnhPSS9WUFRr?=
 =?utf-8?B?dGgxWFozMzBCcVExNG9UOEZCdlZkUmRxQ1ZQWjc4UjFiV2hMQm4vUlNxT2pp?=
 =?utf-8?B?ZlE2SVJHcWpncEYzNFZYRzFMdlVXYUVZMjE2RnpnTWF1ZjEwRTBvUHltMmVq?=
 =?utf-8?B?Y0haV1dtOXBhK2QyMTZONDJCRk5ZV3JXQlVIemhXcVdmV2FuNWdjN0xqcFd6?=
 =?utf-8?B?Q2xDOHUzbEc4YjlOaVR0SWdFMWF4ODQ3VHdoVUpKblFCQlNpRkkvNktoUDRl?=
 =?utf-8?B?bk8xSGxmUjdza0V5bkJmTWVTV0p2MWhKNU1UQm5qRGVmYWJLcGpmTEp2anNp?=
 =?utf-8?B?aGpjUGNQcW51T2E5ZFRjcHdKdXhsd1JzeHR5TUdPY3M5d3NTQVJjMVpQRjVk?=
 =?utf-8?B?ajNtZjIwMDZjKzZUVk5UVTl4QzhCVmQxckI1anVhRnBBUnFBaTBPWTZIZktI?=
 =?utf-8?B?NEpOSWVpMERPYTBodjhyV0N2aDJ1ZVJxTWRKaktKMzRGdzluR3BFRGlNRjFv?=
 =?utf-8?B?cjY0Z3ZJWC94Z1NaUFlKOS8zcm9MYUV2eTBlaE1qbkt2VUlQc1lJNlBrZnFl?=
 =?utf-8?B?WWlEcE0zZWFUcDVWNlJDa0p2Z1ZxUWhnNWJIVTZNUEtDMkdKT2VEakZzb2Ny?=
 =?utf-8?B?V1FzUmI1UWthRFpNODNTcStsa1pGdlg0NzJXNVFvZVErMWxCQVIyZmRSdXVa?=
 =?utf-8?B?NTdaTUppRngvbXZseFl1WjVPMkRTbkNuZW82YmJ0cks1SlFpVmFlUXExSlBm?=
 =?utf-8?B?L25zR2k2OFdvdVQza2NXMHhya2YxWWllbEhocU1uZjI5TExpbDBKOE1RQ0Rx?=
 =?utf-8?B?NG1oQnd2dmlTOEY3Vnc2dnEwR3RyNHZTeWdnL3JrRXlJUVJXZGFDV2xlZGkz?=
 =?utf-8?B?SEFqRlo4ZDljMWl3T0VvSkxsVlFkTGx1SzVUWU9SZXRTaTlrSlhjZzhhYUdp?=
 =?utf-8?B?OUZZeDhKcktLcFdTQ3lPU3NwTm41R2Y4WldhaXVtOVZUUEFTdGpzZkNaSk4r?=
 =?utf-8?B?WlFLTU1WVnBHMWxWZ1h1S3dDZm9kK015aGlELzNNYXU1ZkFtZ3NvRm5Ed0JN?=
 =?utf-8?B?eXZVTUFiOFRBbGZLMjZvWjgydXVNd2RUMTdzWEhnd1Z5bWF0dDdkMUlPeXlI?=
 =?utf-8?B?NExsZDB4djJ0c0Ywb0xqTDZkUzB3ZVF4Rm1JcEs0QmpFbXpyTXBObTRIU2gx?=
 =?utf-8?B?WFdKM0xXcEtKS281TFp3TWtFcEppNm90UWtUa1Z5ekpjczMzTW9zaGtkcEtG?=
 =?utf-8?B?VUEzTmt5bjR5Uy9YWkVhdHFLOWlReVZDd2RQR21SZ0N0Tjk2U0NXTll4OURZ?=
 =?utf-8?B?cUdkUkRtc0ROQ1FNQUdsZjBwK3dVQ3graHVBVEdTNDBYUFVTaTVRNUc5VFlt?=
 =?utf-8?B?akRxTW55MDFqVDJlM3BLTVV5LzQ3VU9FVjgwclA5cm1LNklxMXRWSGNsWXVY?=
 =?utf-8?B?YmJZUUJPeW1rSzBFbGVVUHJ0Rnc5Sk1vOGFQVlpQYUJqUmFWVnc4U3RTVWtC?=
 =?utf-8?B?T3J4VHUvQjcwa0JOUmZQWmRrT1NZLzJ5c0xpQTJpd1hmZnFwQXAxVU5OUHkr?=
 =?utf-8?Q?45TYQDzVy8RJBBcLtoGDhm0=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d19d83cc-57f6-4e52-3eb7-08d9fcfb2726
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 09:49:47.6100
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: dzZSjaepR4fdZsbyXyt6+tPbUE/yTzktDKQmjYin1gNStcgUjsXNOqe/fgh+rwA2s0wVajyV/qt18PqjXCD1eA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0402MB2735

We shouldn't include unsupported code by default, with not even a means
for its building to be disabled. Convert the dependency from merely
affecting the prompt's visibility to a real one.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
We could of course go further and make the default also account for
DEBUG, as is done elsewhere.

--- a/xen/arch/x86/Kconfig
+++ b/xen/arch/x86/Kconfig
@@ -193,14 +193,15 @@ config HVM_FEP
 	  If unsure, say N.
 
 config TBOOT
-	bool "Xen tboot support (UNSUPPORTED)" if UNSUPPORTED
-	default y if !PV_SHIM_EXCLUSIVE
+	bool "Xen tboot support (UNSUPPORTED)"
+	depends on UNSUPPORTED
+	default !PV_SHIM_EXCLUSIVE
 	select CRYPTO
 	---help---
 	  Allows support for Trusted Boot using the Intel(R) Trusted Execution
 	  Technology (TXT)
 
-	  If unsure, say Y.
+	  If unsure, stay with the default.
 
 choice
 	prompt "Alignment of Xen image"



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:03:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:03:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282886.481719 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiJG-0000Aq-Su; Thu, 03 Mar 2022 10:03:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282886.481719; Thu, 03 Mar 2022 10:03:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiJG-0000Aj-O3; Thu, 03 Mar 2022 10:03:46 +0000
Received: by outflank-mailman (input) for mailman id 282886;
 Thu, 03 Mar 2022 10:03:45 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPiJF-0000Ac-Am
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:03:45 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 35185231-9ad9-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 11:03:43 +0100 (CET)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04lp2055.outbound.protection.outlook.com [104.47.13.55]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-23-xFR8aIQLOmuOSteST94oFw-1; Thu, 03 Mar 2022 11:03:41 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB8PR04MB6347.eurprd04.prod.outlook.com (2603:10a6:10:107::13)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Thu, 3 Mar
 2022 10:03:39 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 10:03:39 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 35185231-9ad9-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646301823;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=fOFzU625NT/VL6UrChuv7E1SuzrdHI7R7/toSu/2RdY=;
	b=Cy3psdKguMUrAbxvZLNznYXNh56HRDbkDGERaHnuoeFWRWJz45R9t12hhQ2Mik/k5VF9WG
	yeMpMBztZ4nKXrbmHZ/DZmUfL4vxis9nKylitQ6cWkx6RRMCyy8ut3jjzHRLwAd033YCxz
	zL5kgs5Y2j8/BH9CmNC3viT2gwFUUWQ=
X-MC-Unique: xFR8aIQLOmuOSteST94oFw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=fzeQwuiUc6Q3TIaeGZdiOnmrosb2/3lNbD5GE5pdImIRdLOHpSfALjYo0DYeq4BZc3ZwJiNOUq/w5LmbAcO/tg/Uk3fy+XuPffAIlbELgNTVdUPUerf5ks2kTbFHiA0S75UviiJo6dPm/u5UP0JeCXUTjjQLTbTzzasnuwzQrNMCInAW7gEU+O6hUotwB1RsPWLn4X+OxNqAr2laPwpGj/SXUswyqQKwClIUtWgooT3YH3qtCfFpp6FAYAd5yP/2bPN9cHPeMHumIGZP7zu//TLkMx61hj54Q/RRcdqLapDh3D0Yi510BpCgjNdPRGw27M4kOnS/pfZumCRY+6FZpQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=fOFzU625NT/VL6UrChuv7E1SuzrdHI7R7/toSu/2RdY=;
 b=QU8g8Hh0PbSdJZrud8ObYtRERjWiVazF2p/Msgz3oin2dVchJvulne4i+xsM+RM0Ds1T0OCbun2XbYtZJEY3bBGzAumZgIT/VIV4HDvqipvZnxQdUNJFNwFJJkEzghFucixUD8NnxRsW7MaKwMUY4shTeCNRRQc+4tjUJgoyMeZRuJ8IyUPQ6kcEDGAEBjyLCTDGvNFL43TiuRo70cTrHqP8TmAosssAIJSu64kByok6Mk/66PoLifr7wKFQLavFHnHzdhWHJgaornSB6EJOiXTSfcGFNapYjcMftl6eHSvxvFLPwW0jlm4boFLGpnHAz84J4vOAISNRrPlPqbQ9og==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <c0d6eedc-6ea2-5445-117c-0ba623692d0f@suse.com>
Date: Thu, 3 Mar 2022 11:03:37 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH v3 0/7] (mainly) xz imports from Linux
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
Content-Language: en-US
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR06CA0351.eurprd06.prod.outlook.com
 (2603:10a6:20b:466::17) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 67f833d4-30a5-4bf3-d972-08d9fcfd1736
X-MS-TrafficTypeDiagnostic: DB8PR04MB6347:EE_
X-Microsoft-Antispam-PRVS:
	<DB8PR04MB6347EC6BDAF220845AFCB0F4B3049@DB8PR04MB6347.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6512007)(6506007)(508600001)(6486002)(26005)(36756003)(31686004)(186003)(66476007)(66556008)(8676002)(54906003)(4326008)(66946007)(83380400001)(6916009)(316002)(2906002)(86362001)(31696002)(38100700002)(2616005)(5660300002)(8936002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?ekJjMDJMbnZrT0dqN29Hcm5SN0pmR2VPNWNHbGJkOTBnVlpXRktWTnNGV1lw?=
 =?utf-8?B?M2E5TWs3Yk1FS1U4Tjk4VVYzQXNSVXhmQjAxdjdNTVRUU1VoclIrQ3BMVHM3?=
 =?utf-8?B?WitSY01iUUZDVCtFZjEyay9hZ1g1L1g5YkF3SXUzTXJIY0FJdk12d3l5NXV3?=
 =?utf-8?B?aEh6WkViUDJYaC9xbEprYjJuRWVwYzc0WXVGcTN6a3JVMlF5L0JWeWhKcjNj?=
 =?utf-8?B?L2RpV2xaTGJ2SDg4bElQQVVsMzZFckNHWUFsRFU5VDlRbU5SS3Ria1Y0WWVV?=
 =?utf-8?B?amRTOURKYXlPeDViODdTOThJRXJla2lzV0V5VTRSdXU4S2Y4QXhlRUZvNVRs?=
 =?utf-8?B?Q1VQYW84ZHl1UDNXUHdweURLQnJNYkZBY3lGN3hGYjByUVI2Ty9zMytPdFFY?=
 =?utf-8?B?ZzE3ekhBNHQvZ1Q1ekRISzgrbkdIMWJKdEU0UjhPM3gxOXV3MENMdEtmWlhj?=
 =?utf-8?B?ZXJybUJOblNjNUM3VkM1QlFEQjJ6Q2VJS293Uk82bnA0Q3hvQ2NSTzVTNUJ1?=
 =?utf-8?B?dDdDaCtmL3dSdVc0SVdraWxkaGs4TmhUVEFHOVBySnVrbWlZUFpMWVFOejdL?=
 =?utf-8?B?YS8wOGovbzlPT0dGKy9vc1NZUVFsdklVT3MyUUJISkpWY05LY1h6QVRheXIy?=
 =?utf-8?B?ODhTSjZRdmJ2OXV0RUdJenl2ZktLV2IzZU1rcC9uVXhsT3RhY1N5eTQyc3Iw?=
 =?utf-8?B?bXJRaVRlbEoxdnErdDVXYkFtK0VuR0lncWduNHNMd004SjN5TFN6Y1FlYndD?=
 =?utf-8?B?VlVtdXo2NjF1QTl6UHN4aUNkalRRVk1XSFA5T2pobldNNzgvY3pnZVY5d2VX?=
 =?utf-8?B?aUsrb092NUhRUkx4NWZYZWFSak96aFQyR3NPOEtQVk9CaGpqYVFOYmR3MXhO?=
 =?utf-8?B?Y3RkRjdQQmhzREZWR3RtSmwwWjhSRU40enpOV1Y3OFNHMkxHK1p2dkwvWDdj?=
 =?utf-8?B?ckhURno0L3d0UHhjbzQzYUpEOWZnUlZlSE82TmxrY2FLNm5jYUF4UGJDdENY?=
 =?utf-8?B?cTIvazRIQ2hvNWU5cy8yR0tGbEY0dE1wd250WGlJUkRNU09ha3VwQnVCODZx?=
 =?utf-8?B?WVg0OUhZTjZQTVNKdjk2SkNSMDl3a3hlREloT1ByeElMdExRMk0yV2pOZzBu?=
 =?utf-8?B?UzBWZk9yR1VNOHpQNWpWYU5seVVoNWJmUC9xSVF6bEI4aTFOK1FZb3dYMUhx?=
 =?utf-8?B?WEY0SGpKeVdRMUZYSFY3L1QzUWI0K0R1a3ZqRU10dGpRUWpoUUQrUUJadUhV?=
 =?utf-8?B?bVFEK21FaHU4QVFiem05QjZLSmpWSXQ0ZUl3QWtNdWE1blNjT1NLK2c4L3pQ?=
 =?utf-8?B?cVNvK0FVSDJvVFJ6ZlFRV0RUQng1dDN2SzcxNUpHNXJGV1BaVGp0QUhiRmhm?=
 =?utf-8?B?NG1qYmM2eXkxKytFRFBBRTNUeFY5RHl4Tmh5dlhQM25kNEt3SG1tRnhVcFJK?=
 =?utf-8?B?U2N0VkFGTU54SzhoYU5UcmgwZWxmeUxDNGVPYXVXVytSQ1JyVEZvblcycFZO?=
 =?utf-8?B?OEZWU2hreEYya2dNR096QVF2UnEvRVFUMEVqbUFSSys3V3RDaU50dTl1QThQ?=
 =?utf-8?B?cXUvaC9HOTBMMVNCeW9SelFxYmFpSW15U01yQ0I5aEVjRUI1QXo1VWQycmRF?=
 =?utf-8?B?ZitYemQxT05OSVlNV2paeVRHYStLdkMyaU8yNWZCRytUZnFzb2ExU0lSTTRZ?=
 =?utf-8?B?N1NVQys4cUhFS21SZDg4b0c3dDNWMnVBY0tBN1FZUElFS3FjMVVpYllqVEcy?=
 =?utf-8?B?QkxKbWZsejlrOHVxSzdKOW0rbUhTSVBQU3RDZlh4OTQ3OWhGRUtNSTZEMWt3?=
 =?utf-8?B?ZE51dVVSZm8wbXRhM1Y3dG1ZZENoaWFNUXNxdlJCYlgzZk1NaVBCT1pBRExY?=
 =?utf-8?B?MzFtVmEzZUZ3Z0RwbDhQT1JmalloVWVQb28vejFYbnhvcFNUby9uSUo4WVR4?=
 =?utf-8?B?K3ZCcnlQVjhuaExBdk00SWp6dWVkeXpLUWw3VE1hT1E3SnRZSk1iUEdnRDdH?=
 =?utf-8?B?UEhzVThRcGhhOTdhVjV0WDVsS3dpcnBjdkVjdkFiK1VEeGtvL1VxNThrVUQw?=
 =?utf-8?B?SG9zSllRclZYNjRmMTcraTF5NlZtanRvRTJianE2dmpldzZKVEtkMDVGRGV2?=
 =?utf-8?B?aWw5U2ZIcHk3aW1icmNBTlE4RHFUNHdKUmltT2dkcHZtQU1odjRYT2dtYmhR?=
 =?utf-8?Q?+qTzSUIr6iNDncLn7f3/SeE=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 67f833d4-30a5-4bf3-d972-08d9fcfd1736
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 10:03:39.7750
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: GjglEyc6UV3h2HAw0WFp/ykxm2ysidpxJ19WxE0OsPjJREwnXEE2rJqzRFAfrmv/QnCjkCT4DxvS2yeeFOww3Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR04MB6347

While going through their 5.15.3 log I did notice two changes, which made
me go check what else we might be missing. The series here is the result.
Linux has also updated zstd, but that includes a pretty large change which
I'm not ready to deal with right now. Them moving closer to the upstream
zstd sources is certainly a good thing, so I suppose sooner or later we
will want to follow them in doing so.

The only change in v3 is the re-adding of some previously dropped S-o-b in
patches 2 and 3, to satisfy the rules newly established by 5e326b61693c.

As the series has R-b by Luca and as the (not) retaining of certain tags
was the only open issue in v1 and v2, I won't wait long until committing
this; perhaps just until after the weekend.

1: xz: add fall-through comments to a switch statement
2: xz: fix XZ_DYNALLOC to avoid useless memory reallocations
3: decompressors: fix spelling mistakes
4: xz: avoid overlapping memcpy() with invalid input with in-place decompression
5: xz: fix spelling in comments
6: xz: move s->lzma.len = 0 initialization to lzma_reset()
7: xz: validate the value before assigning it to an enum variable

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:04:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:04:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282891.481729 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiKN-0000jY-5n; Thu, 03 Mar 2022 10:04:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282891.481729; Thu, 03 Mar 2022 10:04:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiKN-0000jR-2P; Thu, 03 Mar 2022 10:04:55 +0000
Received: by outflank-mailman (input) for mailman id 282891;
 Thu, 03 Mar 2022 10:04:54 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPiKM-0000jF-0D
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:04:54 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 5e7c470d-9ad9-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 11:04:52 +0100 (CET)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur01lp2058.outbound.protection.outlook.com [104.47.0.58]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-38-gLdoUpSfN7SGC5FW8-VIYQ-1; Thu, 03 Mar 2022 11:04:51 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR04MB3311.eurprd04.prod.outlook.com (2603:10a6:802:f::22) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.25; Thu, 3 Mar
 2022 10:04:49 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 10:04:49 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5e7c470d-9ad9-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646301892;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=ScIjlcvytU8BXsKkAKsbjjW3FXOU4vzzSPWi7azT27I=;
	b=H/BzgMs0s60fsQdfPoItMZOqU+BCDol3tfI3qedUlT+pYHKpF/xXJSvNpuzApMBxb0CD4p
	UYtgVNAJTrS/tGurndyhmfQDV13td4AeyLCPIm8+WoVi721i91BSsMYgbbuBG080ErG1j7
	oStce6gINVaTRnoh3f+D4jLgkfmX41I=
X-MC-Unique: gLdoUpSfN7SGC5FW8-VIYQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=jn0Q6+kkh5PWhepSgu+HS3lFWwfdWbwtG5QlDuvUoXbGqgEBESTMYF/+tkbNXiGP+Oq2ofqIkdC7ko2QuTY/N9sEThX9bghQxV8/ixf8waT9exduw78Neg7e6zOl3iB0Li9ZGygzQvFWKlQj5T1h4zcUxxFuCQBOsPLkwBmOrmtWTvrWI/I/TOativZCkzdnMUMFebNgVcy1i4nubcB8h2KXOtNICUeaOnpibPPqKbTmlia12Y8SJWEt//gimgCOpAcyl2JJZzfoOcB6QDZvXzco/Nwn15TK7kqSfFJSVoXLdwACl16MN9x4LuC9vCR7kB3rSlI3MTTYUAf14FRQpw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ScIjlcvytU8BXsKkAKsbjjW3FXOU4vzzSPWi7azT27I=;
 b=aw+eaf66yAn9qWwR0ayJqyxim9wo36I3WODkuDYa5nnhQ4huSQx3mMIDOqJhu2pRrsVEJ3X5sTqfrzTIyi1/PCGXA6vs+5GX5MSwkYsBnQAI+JcwBHR7JYK6HjZpgWpnTXYe2NYeD1f00PCoZQCXqLnBkQgOtBruIhbRPbcHn+I8kPvLBFC2YJLJ/4VgZX+rAs0drY6XOO6If+evX4YkQWNre6G70GS1lXZWRrylriMW3iWNJcayghrS717JrwY6/EJJtPulL+PogfecCV/CFron6SW7HcICcpXiHjoAQ/zJq/iKjV62edPD4C4jSAniKAvTgqY86DILyc9aPzn14g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <f946cbd7-1d9c-a4b9-d938-bc1d13c9425b@suse.com>
Date: Thu, 3 Mar 2022 11:04:47 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: [PATCH v3 1/7] xz: add fall-through comments to a switch statement
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
References: <c0d6eedc-6ea2-5445-117c-0ba623692d0f@suse.com>
In-Reply-To: <c0d6eedc-6ea2-5445-117c-0ba623692d0f@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8PR07CA0037.eurprd07.prod.outlook.com
 (2603:10a6:20b:459::9) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 428027f1-c2b1-447d-2ff1-08d9fcfd40aa
X-MS-TrafficTypeDiagnostic: VI1PR04MB3311:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB33114B38BF3E6070CDA62E9FB3049@VI1PR04MB3311.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(83380400001)(38100700002)(5660300002)(6916009)(54906003)(66556008)(8676002)(4326008)(66476007)(66946007)(8936002)(316002)(6486002)(2616005)(186003)(26005)(508600001)(2906002)(6512007)(6506007)(31686004)(31696002)(36756003)(86362001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?Z2hIMnY4TmdSR0sxVzdOUm9uMFlXWkJCL0R1OHJSdmxGQmFRTDQ3TkxleEQ0?=
 =?utf-8?B?WEVyT0YyVjVXWWxuWDZFR1lGZ1UxWU0yN3ZFRzJCU2Q3VldnRTRET0QzMzZN?=
 =?utf-8?B?eHluNDBuV1NxVnZlNEcwdHY5ZGtWQzd4YVJzUVpXZTBrUzkrR1Z3S0JLaVBq?=
 =?utf-8?B?NFdXL085eW1xSTNTN2lBWXkzV1Jkdm9aeEZpNDgzNWZTcTVMa3ptclZDUmVn?=
 =?utf-8?B?NmlBU1hYc2NmOUo2MURPNUNlT2NxdTdXcUtzV290V2xQU0QwMXN6RTlibXpo?=
 =?utf-8?B?NW5aTVQ3RXA1a1F1UDhmKzRqOGdCTDlpVTB0WmFRUTVkbGN1YlMyVVZxK3k0?=
 =?utf-8?B?NS9sSUJ0S2ZpdThzWkFQeW1RME5tcC81bGpIZWljcTJ5S1FrR3dvSmpLRWEr?=
 =?utf-8?B?STBoY0lFWFZ6YytIckxVenVpMFNXdlFYdi9VcW5UQmt0TlVqbjR4dnVxTDJK?=
 =?utf-8?B?UmErTks1bXlxMCtFN0lBcXFtMFBSZlEwRktRQXQ4UWZFMDBkb0dxUXRtaTlL?=
 =?utf-8?B?NXlnWmxwRkNsSW04cHJaUUNkbE1XTzEwbFpJUWRsZGEyKzZaK1FuZjE1bko4?=
 =?utf-8?B?bW5ObEpnTjBobmpKWkhzeXdra1BHZFBUbkJSMlF6c2l3WkdKSmdxUXdDSjRq?=
 =?utf-8?B?eWNxSmY5bitwYU92OGFXZG4zWm1YcUlMZkhJRk9ISW9WcElncEZvOGRKQjc5?=
 =?utf-8?B?YlB0TjlwYy9VeVVSeG9WUjEvYnVHV1Q3TUdSKzBaU2ZFOW1Qc1hzb056aVhS?=
 =?utf-8?B?aG1xbk04TFYwSWt3ZUVvK3NCay9hL1F1TXExdnlTKzhsY0lkdmpzZmhxS2pS?=
 =?utf-8?B?SWc1WE9URzZoVTJSSUlHWVp6Rk5WMkdtR2JsOTRlU3pwWUJyMElWUWk3TVVy?=
 =?utf-8?B?dmZsQ3N3ZVN2enRJb3VaZTc2ZjN1WE5RSjhUM0QzVncxVEpXZWFhb3hlQzN6?=
 =?utf-8?B?NHVUQ0ozQ0xzOUlUZm85bHEzamFxZnFOUG5Fdlh1ZnQxWHhNVjlKRzVZdE8w?=
 =?utf-8?B?NHBBaHdTb1dhandIS0QvaDZDbTJ2VXNldVh6dkFZdHZwTUFveTIrazllUDVk?=
 =?utf-8?B?b3pJVlU5UEdsSlFXWWNxcnUrV0x5b0pmNjJiWk5uWk9HRnp1RFVhQ3hwdTFU?=
 =?utf-8?B?SEE4ZlhkbENUeUJGa0RDOGl4Tm1rRjZRTDFSU09Sc0xSWEt3MVdSVHVQaW1v?=
 =?utf-8?B?UDdyWWwvZTZEZU54RXZSYUV2NkJHdXlzci9UUlVMNlJ3RStoU2poS1VZMS81?=
 =?utf-8?B?TldidnU3K2RQSjVuRlFRUWVyYmxYN3M0eEhQUlI3K1RWWkl2OW1pYVY3Q0hW?=
 =?utf-8?B?MVZCUGlEZDF5SXR4aWRpUkw2RWdoMUt2TndlNUFPbURJd1V0SlJEd2xQYi80?=
 =?utf-8?B?WnZEeDVRUVY0TUo0R0FwOU5rSU9UeDFzeXNqSU0yVThKcitUMlQ4UU5VVGR4?=
 =?utf-8?B?UE9mcWhNVjVxcU5nN0dRZ0g3dnVoR0FDRnNmSHJoMFRzNzJMUUZMN3pRQkh1?=
 =?utf-8?B?b0FsVTNzNHFqWFNCZTlNUVdzL2V6Y3Y5NDVuREFYdjg4NEhNb092TjBJT3lm?=
 =?utf-8?B?bHBVWjNIZmVRL0MyR3ljUkVrb3RSZk5Hci9mN24wQitpc1E4VkxPWXVXWmUv?=
 =?utf-8?B?Z1BQTXJyNjIwSURGRTdwKzlaUExIZ2FHOHU1ckdMSndSVHNVN2VZelM1UHZ1?=
 =?utf-8?B?NHp0Z0xIbkVlQXlMNVNrK2RxWE8yZHZuaHNINVhwa2piblpNODNmTUdPdG4r?=
 =?utf-8?B?L2t0cHpnV1ZIZ1paYStKQzc2Wnd2L3lrSnN6Um1LaFlsVjVrdktZdmFxemNk?=
 =?utf-8?B?UXpxZVdGS0FFeHJMUkVQbkZxbXdGSUJEWktHTmhjS0l3ODlFVWZlUnA0bVIy?=
 =?utf-8?B?LzFtbGQ0R21PNHREd2NUUlk5ejF2Ylpza2w1d1hmbnhscDBvRTJ0VWZrNE4r?=
 =?utf-8?B?bFRRQlh6TlhTRFU4MDM3RUxaTjUrMnd5aHNGbzN3QVpSeEhxQTg3N05qRGlN?=
 =?utf-8?B?cFVFaC8wTFNLZlErTEk4bGlSWmx6VDJ4VkN0alNRSU9aUXBlV2ljUWxSVVJI?=
 =?utf-8?B?c09HWFR4d3dwTy9taDJEcEpSTEdxMURvbms2THV0NVp1NGd2cE1HUTdzd3My?=
 =?utf-8?B?czdtWk4xZVVocFFpcTEzN3pYU01uWXRMNlhLVjE0QkZVZ2p5amdOUzhweFd6?=
 =?utf-8?Q?CctRWwN/JsaQ4T1TQRs5T6U=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 428027f1-c2b1-447d-2ff1-08d9fcfd40aa
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 10:04:49.3643
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: WVgtC3j4Bm9DQSuNyLLd6HRNoBBJB4Q/oImdYbFNspCFb8Ee7uLxIrfs8ZwonqlLqpAWGg2SF5MMYPuDclIdkA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB3311

From: Lasse Collin <lasse.collin@tukaani.org>

It's good style. I was also told that GCC 7 is more strict and might
give a warning when such comments are missing.

Suggested-by: Andrei Borzenkov <arvidjaar@gmail.com>
Signed-off-by: Lasse Collin <lasse.collin@tukaani.org>
Signed-off-by: Jiri Kosina <jkosina@suse.cz>
[Linux commit: 5a244f48ecbbd03a11eb84819c5c599db81823ee]
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Luca Fancellu <luca.fancellu@arm.com>
---
Linux has meanwhile further moved to using the "fallthrough" pseudo-
keyword, but us doing so requires the tool stack to first make this
available for use in at least stubdom builds.
---
v2: Retain the other S-o-b, for lack of mailing list source of the
    original submission.

--- a/xen/common/xz/dec_stream.c
+++ b/xen/common/xz/dec_stream.c
@@ -583,6 +583,8 @@ static enum xz_ret __init dec_main(struc
 			if (ret != XZ_OK)
 				return ret;
 
+		/* Fall through */
+
 		case SEQ_BLOCK_START:
 			/* We need one byte of input to continue. */
 			if (b->in_pos == b->in_size)
@@ -606,6 +608,8 @@ static enum xz_ret __init dec_main(struc
 			s->temp.pos = 0;
 			s->sequence = SEQ_BLOCK_HEADER;
 
+		/* Fall through */
+
 		case SEQ_BLOCK_HEADER:
 			if (!fill_temp(s, b))
 				return XZ_OK;
@@ -616,6 +620,8 @@ static enum xz_ret __init dec_main(struc
 
 			s->sequence = SEQ_BLOCK_UNCOMPRESS;
 
+		/* Fall through */
+
 		case SEQ_BLOCK_UNCOMPRESS:
 			ret = dec_block(s, b);
 			if (ret != XZ_STREAM_END)
@@ -623,6 +629,8 @@ static enum xz_ret __init dec_main(struc
 
 			s->sequence = SEQ_BLOCK_PADDING;
 
+		/* Fall through */
+
 		case SEQ_BLOCK_PADDING:
 			/*
 			 * Size of Compressed Data + Block Padding
@@ -643,6 +651,8 @@ static enum xz_ret __init dec_main(struc
 
 			s->sequence = SEQ_BLOCK_CHECK;
 
+		/* Fall through */
+
 		case SEQ_BLOCK_CHECK:
 			if (s->check_type == XZ_CHECK_CRC32) {
 				ret = crc32_validate(s, b);
@@ -665,6 +675,8 @@ static enum xz_ret __init dec_main(struc
 
 			s->sequence = SEQ_INDEX_PADDING;
 
+		/* Fall through */
+
 		case SEQ_INDEX_PADDING:
 			while ((s->index.size + (b->in_pos - s->in_start))
 					& 3) {
@@ -687,6 +699,8 @@ static enum xz_ret __init dec_main(struc
 
 			s->sequence = SEQ_INDEX_CRC32;
 
+		/* Fall through */
+
 		case SEQ_INDEX_CRC32:
 			ret = crc32_validate(s, b);
 			if (ret != XZ_STREAM_END)
@@ -695,6 +709,8 @@ static enum xz_ret __init dec_main(struc
 			s->temp.size = STREAM_HEADER_SIZE;
 			s->sequence = SEQ_STREAM_FOOTER;
 
+		/* Fall through */
+
 		case SEQ_STREAM_FOOTER:
 			if (!fill_temp(s, b))
 				return XZ_OK;



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:05:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:05:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282898.481741 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiKr-0001M8-J5; Thu, 03 Mar 2022 10:05:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282898.481741; Thu, 03 Mar 2022 10:05:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiKr-0001M1-FV; Thu, 03 Mar 2022 10:05:25 +0000
Received: by outflank-mailman (input) for mailman id 282898;
 Thu, 03 Mar 2022 10:05:24 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPiKq-0001Ia-5B
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:05:24 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 70ae4b13-9ad9-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 11:05:23 +0100 (CET)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur01lp2056.outbound.protection.outlook.com [104.47.0.56]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-10-lVBXtSbMPgubX3W_YL5Jkw-1; Thu, 03 Mar 2022 11:05:22 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR04MB3311.eurprd04.prod.outlook.com (2603:10a6:802:f::22) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.25; Thu, 3 Mar
 2022 10:05:20 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 10:05:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 70ae4b13-9ad9-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646301923;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=A25zh5BjjDRbl+SbPOMZedHC8tdiYgioJS38R9kRtSE=;
	b=Ma7CvuTUnH1TWKgYSajr8Weznh8m23GDGeLmoHyvZJSSqF2B5sRhYPjJkP7srjBo6IjR69
	D5CF99rMzMT1ds2T8L70NpwR4/J8kjiF0/AZygZSUS8lbF9FISdHFDrnKS0+LG/DHjmCt4
	Utw6kDSOe2PJC8ottYqEtM5Ws0hz/Mg=
X-MC-Unique: lVBXtSbMPgubX3W_YL5Jkw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=BFbfilM322kOSYz/nQ7WXY94r11oTuVP/kEs0dxhSFUov+pxwEU9/v4Ov287wRfSX5j0pd5qu923K5ZlxjXN2l8KuuQrcfXMzHQ9dLQxEEMKmXX6cI3SfZc8Evg9McapynvozQu3144xxKioKZWGvI59983CaGdychJY9V4i8xYgoPe7/Oa1Lr8mtOzZ8yMtYwBcXF1sZbDCSN5GxHMhWjDC0vSHsBxXxFscvAgHJUstfcek2R7qC6UPrhXRg8dUSYc8n+aIn6UvbAy+HelGjFNrHEORCoQuI2C59w/zcXe/6ovby29ru+jJNgSGo3I0zF0F8vFYiopKHP4dubDZpg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=A25zh5BjjDRbl+SbPOMZedHC8tdiYgioJS38R9kRtSE=;
 b=JleOcDtZ6i8zfGK82DZSp/Kh+JZin+gliWqD4zGavMJ4e2uirvd6yRmJ/jSYFwakY4+rBDEmwE4t/A5U6zwsw381I09FgSZGqa0drxEVHLiA+2ourk8Q7dfTPD7U7C1A3Py85x9aiCFwEJxCkRfSE4m1YvBsOSAXtFbv909NvBO0Kkjv2bDTv79Ep/WSbiy/W+8ZHuJW5AP90mGMrG+ut1gssFu6b8fudE+R08H2TUysqUL+w1nMl+gk12PijS+UsWu6gCbEDvghpwyvXMZStkHxuhp3/L3MEUhzbjOPU5L/o/K2v0WO14U/+GrNrAe1lry4Rui+tjBXl1bipPXjNg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <96b6ce72-9c64-1ca7-56fb-63a30cd8591b@suse.com>
Date: Thu, 3 Mar 2022 11:05:17 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: [PATCH v3 2/7] xz: fix XZ_DYNALLOC to avoid useless memory
 reallocations
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
References: <c0d6eedc-6ea2-5445-117c-0ba623692d0f@suse.com>
In-Reply-To: <c0d6eedc-6ea2-5445-117c-0ba623692d0f@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8PR07CA0046.eurprd07.prod.outlook.com
 (2603:10a6:20b:459::18) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 9a39c6b9-221a-49c2-9392-08d9fcfd531a
X-MS-TrafficTypeDiagnostic: VI1PR04MB3311:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB331108ED422FE0D70D98ADDEB3049@VI1PR04MB3311.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(38100700002)(5660300002)(6916009)(54906003)(966005)(66556008)(8676002)(4326008)(66476007)(66946007)(8936002)(316002)(6486002)(2616005)(186003)(26005)(508600001)(2906002)(6512007)(6506007)(6666004)(31686004)(31696002)(36756003)(86362001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?clNGRXQwQkdzQ3VJa2lDb2pwcFozL1M0dTZVK0YzMUxKQmFQY0RsVk1iN29V?=
 =?utf-8?B?UGNwcVh2dUsrN0RSOElYb0h3SklQV1ZTQVhuQ2tIc2RpVkxwVWt2OWprMU1j?=
 =?utf-8?B?SDFZdlJWSHljeGlMbldIWUZoaWZsY0JrUnNKcXBDVERScXowUkVsQ2tUck5N?=
 =?utf-8?B?MW5XemRNZUtqNFU5MW94TUpEa2pXVmVqKzgrMytXSWI2M1h5anpwUGllZ2F4?=
 =?utf-8?B?ZzlESVJRSnR3YjR3cG8wRTFqa3YxekpaVldFZEF6c2ZKeTBpOXF3a0hrK1lz?=
 =?utf-8?B?ZXcrMWRNbW9IL0VyQ2pJQ1YzZG1rYndXVmxURnZPN1dUWGM4S09tZHVuVXY0?=
 =?utf-8?B?bGNBMGd4OXZiQnF6NS9TODdhTmZCUjF4dURtcllZK2laT1VpZTFvRkdpK25n?=
 =?utf-8?B?OEhWNjl4Wms5Mk83R2NaN2N2UlZWTnk2TkdwaGV2OW5rbDBZWncvSHhidzVG?=
 =?utf-8?B?clVHTktRUERkS2VtSHNFQXdzNFZ3QysxR0U3alA1L3NUbktwcFlSNWh4ZSt6?=
 =?utf-8?B?UTRHRW5zQ2h6YVRKSHJweFF6YXlBMDVvMFYyRXA0R2dHN2pqSTBmY0FaalNN?=
 =?utf-8?B?NkM1RXJHdUpOcnk1WDlHdit4R0wzUWxDMlNWZ2IxaktXREQxQlNpaUR0S2lF?=
 =?utf-8?B?Zit1VUlxOFZMbVpOd0Z1NUtiRFA2aXVjTDZyNlZFcHd5dzE0K2xsVnNMY2tK?=
 =?utf-8?B?bW11WnZ6dFp2U3IvcGFGWE5JNVRTTHNaaE5ERGRWSXhlUHRkSnFMSU9GSzRu?=
 =?utf-8?B?bGZPdU8wZ3U4WHV5UEN0OXBpZFRWQTljbFhWcUh0WXVqVGRXNUc3MVVkb3Np?=
 =?utf-8?B?TEswVEd5YkNtUW00cWxOclVySVlFaFFRWTZXZjFuNjd5UmxuL21HMjh5R1NU?=
 =?utf-8?B?cGtWMHlGQldlNlZyZUJvbVdHQUI5eTkvRXAzMWxEeU1xMFZ1NW9UVmxtalhq?=
 =?utf-8?B?SS9lZkJTWXlrT0tUN1pKQzV0cjgzL0JDQ3ZUTGJzODRWTjlWR0dRMGxwbDFZ?=
 =?utf-8?B?MTloRm1OeTdML0wxcmRnQ2p2SEthUnhjVHRVRUppTUZHdHJESE16YmY0U2Vt?=
 =?utf-8?B?bDB0TmVRN3Z5OEZxd2xJNmFzZUhKNXNqTS9kS3JkVVZjYjhQall3d1BoR1Vq?=
 =?utf-8?B?ZzQwYjFPRzUrWlhHRHI2a0xIckhNRjVHTTU0aUJqeVVYY3ZGMHBSU3RaYkRy?=
 =?utf-8?B?dUI0dXMvbGlYRm5iTERJSXVrMmVLcjRuZTU1YXpvY013ajFuZ2hLUi9BUWp2?=
 =?utf-8?B?RnhTQTh5OW82VGc0dmNKTkhOZHhpYkVxYlZ2SlVGVjJsZ1B3RXVsVGVxbWhp?=
 =?utf-8?B?VGd5djJ5eWZhZ0JsbzR1UUFUcUJJQlBJam5iY2pMbERFdGhGT1dxR2JVTndN?=
 =?utf-8?B?K3VaYzY2Y0cyc1VyQnJzTGxlODRNTEpqMW1RcmpzVUFzcjgwSkFmTGVKMDNC?=
 =?utf-8?B?RUZnOWs5bVEwbkpqdU51SHFndWJNQlpRcHJySUtrVVRpblkwaW9neXd1dUM4?=
 =?utf-8?B?U2FoS2R4NStXRzVvZ2wybm9VZERheVM1M3JtY3VkQmRxajJXakZ1WkQ3ZUN0?=
 =?utf-8?B?cmdydEJXdDJESnV4NkdpRlVaeWFhZEMxQlErNll3djZhWG9QZWE2Y2FlSEN4?=
 =?utf-8?B?cTBXdklIM1BzaStkckVsMU5MSTFVK0VwcE5ocThyWWVnYnRsNXlGdmhreXhj?=
 =?utf-8?B?TlRVUGZsbjBRRVc4SlIyVC92RXR6NVV6eDhEcmF6SXczMURnMGRCOEZKNHBW?=
 =?utf-8?B?MlhPNUJXTVFZbWxZbWs4aEY1K25HMUVOUFAwUjIxMzRXVENUM2VObkh1dXVV?=
 =?utf-8?B?K1Y2VjlrYTZJREIzYWZVcHNzQW1CUmI0M2NvSzJmS3BTVjlRbnNpc1RzSzV0?=
 =?utf-8?B?QnJkeUFGMzEzeG8xaklZSU1rVC9XMEFwZUsrTjMrM2FCaHVUWnZFbHo2L1lM?=
 =?utf-8?B?TnU5N3FOdzF3RFIxbEYwUDN4YnVGTisvb09Gb3BBVXorMEpEWnhGcGZha2xH?=
 =?utf-8?B?cU9IenV1amtmdStnTTE3OTJzM1o3RWk1NWVPZnlXSGlwZTdMVDBjQjhBNSt2?=
 =?utf-8?B?NkcwQzlHMjRlREIyeGFVTUJxVkNYL1pYbUhjb1BURkhSRHNWT0dHOHlvVVVI?=
 =?utf-8?B?SElzZUl3ejZORTJpMnFDUTNuQm54N1JOT0k1eFF1R2tzd01NNTN4VnFhdEcz?=
 =?utf-8?Q?mcCigTwdN61BHlimLIT23Ek=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 9a39c6b9-221a-49c2-9392-08d9fcfd531a
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 10:05:20.2530
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: r2pVIqO0g/cJMcHQCC8gGNWYht9VLAGr33eqv9lyKMBsgeHThgKnhYsrHq7Hw6/xnzFTlrm49uIuk3c2HkPSPQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB3311

From: Lasse Collin <lasse.collin@tukaani.org>

s->dict.allocated was initialized to 0 but never set after a successful
allocation, thus the code always thought that the dictionary buffer has
to be reallocated.

Link: http://lkml.kernel.org/r/20191104185107.3b6330df@tukaani.org
Reported-by: Yu Sun <yusun2@cisco.com>
Signed-off-by: Lasse Collin <lasse.collin@tukaani.org>
Acked-by: Daniel Walker <danielwa@cisco.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
[Linux commit: 8e20ba2e53fc6198cbfbcc700e9f884157052a8d]
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Luca Fancellu <luca.fancellu@arm.com>
---
v3: Retain all Linux side S-o-b, as per 5e326b61693c.

--- a/xen/common/xz/dec_lzma2.c
+++ b/xen/common/xz/dec_lzma2.c
@@ -1146,6 +1146,7 @@ XZ_EXTERN enum xz_ret __init xz_dec_lzma
 
 		if (DEC_IS_DYNALLOC(s->dict.mode)) {
 			if (s->dict.allocated < s->dict.size) {
+				s->dict.allocated = s->dict.size;
 				large_free(s->dict.buf);
 				s->dict.buf = large_malloc(s->dict.size);
 				if (s->dict.buf == NULL) {



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:05:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:05:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282905.481752 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiLJ-0001sY-Rd; Thu, 03 Mar 2022 10:05:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282905.481752; Thu, 03 Mar 2022 10:05:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiLJ-0001sP-OE; Thu, 03 Mar 2022 10:05:53 +0000
Received: by outflank-mailman (input) for mailman id 282905;
 Thu, 03 Mar 2022 10:05:52 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPiLI-0001Ia-CD
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:05:52 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 8011eb29-9ad9-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 11:05:49 +0100 (CET)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur01lp2057.outbound.protection.outlook.com [104.47.0.57]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-4-8CtoAN92OBCwP41myE49Rw-1; Thu, 03 Mar 2022 11:05:47 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR04MB3311.eurprd04.prod.outlook.com (2603:10a6:802:f::22) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.25; Thu, 3 Mar
 2022 10:05:46 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 10:05:46 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8011eb29-9ad9-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646301948;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=czqxhntDmPvVjF13ScNMIxw0RdrjFUc3x6QkChagSno=;
	b=Mgsg8p9rLiOMzE26mWS+WGjsPEjMJftPkkt1owSwN07Y5fhtTiu/KBL+TJRpx6PaGwiSFe
	txe7kKnE/Hj6WpcNbIaL/ZlIKVA3RggaTxAxHY45KonXWA9q9fEsdd704fpfh1Khm5Ud3X
	TsGLt8y5yQcTifFqL+j5Rk5xzI8RprE=
X-MC-Unique: 8CtoAN92OBCwP41myE49Rw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=mWgN3gEVs+Go2tXmB/MTgSsMTUWg4xmwH0Y1dFLeb/0AcRpKTpEbBiIFgkSx6tlR99FwjEOY0/8YJYORIu+xxoHyGrFzYF6uxdybCDbkdxewtHiviGYdPsgKCUfnDe5STk/FSnOM0LjI6z6A1ttLFQ3C4sMEe0bYqcXnb5fC3wd0nOZL1JbXSNCal8Q3FuDkTPA6zQIYjSbyqvfT9P4ZN5i1PPg+bRWePaTN/TnIVIKnauW73Yx+xZlMV3vYzpkVx2jOvsRi7kt22frpsN3bunqXFVeKGncCHS4s3GbdtT0MofiBL0C0EkpckGvy60G2mZSrc+YEHebP2RE1SFexXQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=czqxhntDmPvVjF13ScNMIxw0RdrjFUc3x6QkChagSno=;
 b=kOMm8N+JttOmqIzFUyB1KWcvLpkdRi1V77Z6TbZan5U/rBsZR/BZlmgqDj4uNOm+ZndTDoR1Z0xM7YDy/QDABtNriPMup6v0EYuwP0kOFUyIheGIGQdFBZZrcm4Jwft9hpm+DAItUv6uKcZl1N5yI2RGbjTFjuLHmivi+V4s5sjezRL5QpeqUhHNy2srhkXi9rlGLlUP7itCeoHt2C/f+SstAgGkXcdY0F+AgMDogylXSK7J87Xw9Bo12F8scNso79DzadgoZJ+FTk2SG7ln4el5jPDFKIUTcVsQU30ZKXMo5NKQpdIe1ugPpvwxHPIwm+72d1wY7QDUo4qfWEWkWA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <6f81b2aa-cd27-d83e-790d-b80c41619c11@suse.com>
Date: Thu, 3 Mar 2022 11:05:44 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: [PATCH v3 3/7] decompressors: fix spelling mistakes
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
References: <c0d6eedc-6ea2-5445-117c-0ba623692d0f@suse.com>
In-Reply-To: <c0d6eedc-6ea2-5445-117c-0ba623692d0f@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR06CA0354.eurprd06.prod.outlook.com
 (2603:10a6:20b:466::9) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: d4766f35-6c31-451f-3a1e-08d9fcfd6297
X-MS-TrafficTypeDiagnostic: VI1PR04MB3311:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB331102994E311619158A127DB3049@VI1PR04MB3311.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(83380400001)(38100700002)(5660300002)(6916009)(54906003)(966005)(66556008)(8676002)(4326008)(66476007)(66946007)(8936002)(316002)(6486002)(2616005)(186003)(26005)(508600001)(2906002)(6512007)(6506007)(31686004)(31696002)(36756003)(86362001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?UFFSRHgxeHZBS0lVRlhSOStvZ3E0N1lHRTQ5cU5UOVVFZDhySHdPdWxBQUFZ?=
 =?utf-8?B?T1ZhZmZhLzY4QzA4dEQ3V0VPVnArazFacE13SGo4TWR0VUdMMGkvbUFNUVJ2?=
 =?utf-8?B?TFNoeXlpK2haNW0xRmhHeUxpZ2xqYU0ySWU5MTBDTzlLYkFqTGE4M0VRRlE2?=
 =?utf-8?B?NEhPdG1hblpqbVFwcFNFSFlZa2lvMEhDK3FsQXkybFhaQkVReVpoUzdIc3pv?=
 =?utf-8?B?REIraHlISFZISTduOW1MSjBKN1lPaGZBNWhOY1VtQTJjT1lJV0VFSGtNVU5j?=
 =?utf-8?B?Y2NHeVpjWVN6S3RrYTFlVEhtRzZONUJObE9qUHJ5S0NYZkNtOUVBSURPMEdR?=
 =?utf-8?B?cjdEeXVYNm8yTVNRWmRLdjNnUmU1YU5TRUVqNklBSGU3cWFSeUYyVm4zTEl1?=
 =?utf-8?B?TVcvUmJlaWpjNU5MQWphZ3VnYUdjZHpNRVYrakVoSnZEbFEyQTBqNUxNZzQ0?=
 =?utf-8?B?eE9xSUVDVHpiaDZ5cFlhLzMwbEt6ZlpyUS9xY0xCd3BIdE5RZFdyanp5UFFs?=
 =?utf-8?B?SGFwTlgzNjhuSGVJWW5YckFWbis4amMrRlhKeGpnVjNJaERPQTlPaURQQnRw?=
 =?utf-8?B?M3FhTmpucFhWakc3ZHJDb2cwOEJvdVFaaHVuc2dsN3Z6MWt0VU5mcE5ITUNI?=
 =?utf-8?B?b21CTTVEY3RTRDJKeGk2UXdqcXFveDRnYUEyRWZZZDF5M2hMaDJZUEkzUDFD?=
 =?utf-8?B?MDRRMSswejM1TU5vSm9UVVBXQm9haytJeTRyWHY1SGR5ZGhtTVkxamc0eWs3?=
 =?utf-8?B?U0MwdTl1RFBNMkhqUUk3M2d3ZnF5ek5GUkNhYmM5Y3dSRmYrVjdyd2tlNHU4?=
 =?utf-8?B?K2V6Qi9WTWIwZ2U4UzdZTGErb1puM0hwK3NKTTl2QlZuOUtUR1I3S3RZbWsy?=
 =?utf-8?B?RXhMMitwdW5LYlVVTFdwZmtRT0Q1b21FazVyTTZhWUJoalNCRnhlTWRONndW?=
 =?utf-8?B?YUVzRTlWY2l0TTNUNXFETndHeHRuQXlKSzZaaVRacjJmV0Ivb3l4dTNqSzV5?=
 =?utf-8?B?Ym5zWUZWYVdHdjdTa2V1cGNJVGZFM0tNOEVDQVRidWlJcDRQajZ0Z1c1UHFB?=
 =?utf-8?B?Q3RTN01nWEZKZmNoWlhGb0pMWTZJQlNhU2ZtcGZPNTdSTlkxZmJqbnBYeHZh?=
 =?utf-8?B?Y2tqMC9tQkFDYWxVOGFUVW5HUG1hMlZpaktnV0h5UzFzYzRNaGIzQzdwOHBu?=
 =?utf-8?B?OE1rSURhRVk2bC8zVmROOVZ5NlZaWVZUQ25mOEhqN0EyczVRdjZkVXhIS1pw?=
 =?utf-8?B?YjRES1k3cnVsMllwVHRlUC9VNEdGS2M3b2QzMjhFbUdpQ2dJVlJCSlQ3WXRJ?=
 =?utf-8?B?c2xVU3JsdXQyaEV0S0RHNTJ4UlpiR1piWEJOYy9Id2lvbHc1RVNzUFNSa2hY?=
 =?utf-8?B?RGx4NGI0ZWVHRkl4bzdIejdQK3JMbWxsRC9TNkxTWEM4OVlDTE5SbDhrSy9m?=
 =?utf-8?B?b1MzWWJyMUxtNzkxOXl6MkFZaDQrS09xT0I2bDJzNTE5MlRkcGdxVGJCeWRK?=
 =?utf-8?B?NHBrSUNvN28vcldSLzZUclgzQUMwWWZOV2MwTVpJOHY5U3gyemxubFNIMkhn?=
 =?utf-8?B?MERMbzFCbTZnNW1XRzczRjRSS1dmVGZCVUgxZTdndkpuQWZHOWlxcTd5ZDlh?=
 =?utf-8?B?MXN3TnJ1OXlvUW1xL2JSTEV1V21HdDdKTkpTbWk3bFhscVNpclJPMkkyYlZn?=
 =?utf-8?B?VFRETmwxeFBad3ZIY0FVcmIraGxMNFN1SFpGWVRuOTJCMnkyczN3b3hmSU5W?=
 =?utf-8?B?NlphVEpyeURhT25PQjJteDFNMldWc3pZUUljN25xekpleVA5eXlVbVp6S09D?=
 =?utf-8?B?bHpOclB1M2ZNUGpsZW1uUG52QzJlSWtGZlpKaDRRZEVvM0lURXBqMzd3c0Fl?=
 =?utf-8?B?Q3pHZkZMNXFpRDEwRW9QeWN6RnlnODFIa2lVRU1rckJya2dYRlVRSGQzL213?=
 =?utf-8?B?d3hzZ1VKM2FMdXBzcGdLSk1Mb2tGL2tvYlpsZGdMTHNUR2RTeldHQnFnQzZJ?=
 =?utf-8?B?ZFdEOXBQekJGTkN0ajBuMWpDSi9DVTZkVWZRM21zdXhUaHpYNXdtMFNyS0xk?=
 =?utf-8?B?WW5DenpBc3RnZTN0VHFwU3hRK0FNTHNCZVVja05YRWRRNGFMV05Tck5BZStm?=
 =?utf-8?B?NGcwZUV6bW9SVkJJNmcvT2laRGVOdGRKZzQ4djg1VXBhZzNtRE1nTDBadjdm?=
 =?utf-8?Q?PYoweQctqqXg1CFq7i/kO/A=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d4766f35-6c31-451f-3a1e-08d9fcfd6297
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 10:05:46.2045
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: fOngXPT+0olejHMQW+UB/y9caSKV33OF4nOYTLQWBIPgee1jdbu4/rQLAC0TYVGVo3dhzQN7f6i8W1LaBJvOGA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB3311

From: Zhen Lei <thunder.leizhen@huawei.com>

Fix some spelling mistakes in comments:
sentinal ==> sentinel
compresed ==> compressed
immediatelly ==> immediately
dervied ==> derived
splitted ==> split
nore ==> not
independed ==> independent
asumed ==> assumed

Link: https://lkml.kernel.org/r/20210604085656.12257-1-thunder.leizhen@huawei.com
Signed-off-by: Zhen Lei <thunder.leizhen@huawei.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
[Linux commit: 05911c5d964956442d17fe21db239de5a1dace4a]
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Luca Fancellu <luca.fancellu@arm.com>
---
v3: Retain all Linux side S-o-b, as per 5e326b61693c.

--- a/xen/common/bunzip2.c
+++ b/xen/common/bunzip2.c
@@ -73,7 +73,7 @@
 
 /* This is what we know about each Huffman coding group */
 struct group_data {
-	/* We have an extra slot at the end of limit[] for a sentinal value. */
+	/* We have an extra slot at the end of limit[] for a sentinel value. */
 	int limit[MAX_HUFCODE_BITS+1];
 	int base[MAX_HUFCODE_BITS];
 	int permute[MAX_SYMBOLS];
@@ -326,7 +326,7 @@ static int __init get_next_block(struct
 			pp <<= 1;
 			base[i+1] = pp-(t += temp[i]);
 		}
-		limit[maxLen+1] = INT_MAX; /* Sentinal value for
+		limit[maxLen+1] = INT_MAX; /* Sentinel value for
 					    * reading next sym. */
 		limit[maxLen] = pp+temp[maxLen]-1;
 		base[minLen] = 0;
--- a/xen/common/unxz.c
+++ b/xen/common/unxz.c
@@ -23,7 +23,7 @@
  * uncompressible. Thus, we must look for worst-case expansion when the
  * compressor is encoding uncompressible data.
  *
- * The structure of the .xz file in case of a compresed kernel is as follows.
+ * The structure of the .xz file in case of a compressed kernel is as follows.
  * Sizes (as bytes) of the fields are in parenthesis.
  *
  *    Stream Header (12)
--- a/xen/common/unzstd.c
+++ b/xen/common/unzstd.c
@@ -16,7 +16,7 @@
  * uncompressible. Thus, we must look for worst-case expansion when the
  * compressor is encoding uncompressible data.
  *
- * The structure of the .zst file in case of a compresed kernel is as follows.
+ * The structure of the .zst file in case of a compressed kernel is as follows.
  * Maximum sizes (as bytes) of the fields are in parenthesis.
  *
  *    Frame Header: (18)
--- a/xen/common/xz/dec_bcj.c
+++ b/xen/common/xz/dec_bcj.c
@@ -422,7 +422,7 @@ XZ_EXTERN enum xz_ret __init xz_dec_bcj_
 
 	/*
 	 * Flush pending already filtered data to the output buffer. Return
-	 * immediatelly if we couldn't flush everything, or if the next
+	 * immediately if we couldn't flush everything, or if the next
 	 * filter in the chain had already returned XZ_STREAM_END.
 	 */
 	if (s->temp.filtered > 0) {
--- a/xen/common/xz/dec_lzma2.c
+++ b/xen/common/xz/dec_lzma2.c
@@ -147,8 +147,8 @@ struct lzma_dec {
 
 	/*
 	 * LZMA properties or related bit masks (number of literal
-	 * context bits, a mask dervied from the number of literal
-	 * position bits, and a mask dervied from the number
+	 * context bits, a mask derived from the number of literal
+	 * position bits, and a mask derived from the number
 	 * position bits)
 	 */
 	uint32_t lc;
@@ -484,7 +484,7 @@ static always_inline void rc_normalize(s
 }
 
 /*
- * Decode one bit. In some versions, this function has been splitted in three
+ * Decode one bit. In some versions, this function has been split in three
  * functions so that the compiler is supposed to be able to more easily avoid
  * an extra branch. In this particular version of the LZMA decoder, this
  * doesn't seem to be a good idea (tested with GCC 3.3.6, 3.4.6, and 4.3.3
@@ -761,7 +761,7 @@ static bool_t __init lzma_main(struct xz
 }
 
 /*
- * Reset the LZMA decoder and range decoder state. Dictionary is nore reset
+ * Reset the LZMA decoder and range decoder state. Dictionary is not reset
  * here, because LZMA state may be reset without resetting the dictionary.
  */
 static void __init lzma_reset(struct xz_dec_lzma2 *s)
--- a/xen/common/zstd/huf.h
+++ b/xen/common/zstd/huf.h
@@ -131,7 +131,7 @@ typedef enum {
 	HUF_repeat_none,  /**< Cannot use the previous table */
 	HUF_repeat_check, /**< Can use the previous table but it must be checked. Note : The previous table must have been constructed by HUF_compress{1,
 			     4}X_repeat */
-	HUF_repeat_valid  /**< Can use the previous table and it is asumed to be valid */
+	HUF_repeat_valid  /**< Can use the previous table and it is assumed to be valid */
 } HUF_repeat;
 /** HUF_compress4X_repeat() :
 *   Same as HUF_compress4X_wksp(), but considers using hufTable if *repeat != HUF_repeat_none.



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:06:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:06:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282908.481762 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiLX-0002Id-3g; Thu, 03 Mar 2022 10:06:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282908.481762; Thu, 03 Mar 2022 10:06:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiLX-0002IU-0g; Thu, 03 Mar 2022 10:06:07 +0000
Received: by outflank-mailman (input) for mailman id 282908;
 Thu, 03 Mar 2022 10:06:05 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=AhVD=TO=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nPiLV-0002Fn-Fb
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:06:05 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 890f2f87-9ad9-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 11:06:04 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id B878A1F37E;
 Thu,  3 Mar 2022 10:06:03 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 863E013AB4;
 Thu,  3 Mar 2022 10:06:03 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id u7KAHwuTIGJYeAAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 03 Mar 2022 10:06:03 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 890f2f87-9ad9-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646301963; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=d9sA8FZ/3AU04Q3EkU7cKWh/RgkHzu0ZzGjm8gE7l4c=;
	b=jZMMSm2jVtHQ171hehxddgtJimSsjFEjvH+YgEOIdQmK8kOTdUGSS4uCc6UNGTjzmSCswa
	krRaT76Kify9mISKtM/j2/kYhQTd+tW69JYm7fSr/CkiK+CM57fEhFStAENNqyw3P35Ioy
	ZfgsWxy0eHPpEoMuo0dMnbFSNjrNPbM=
Message-ID: <9da1c49d-2655-fc24-d422-5bc4edc491f9@suse.com>
Date: Thu, 3 Mar 2022 11:06:03 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [PATCH RFC] xen/sched: Optimise when only one scheduler is
 compiled in
Content-Language: en-US
From: Juergen Gross <jgross@suse.com>
To: Andrew Cooper <andrew.cooper3@citrix.com>,
 Xen-devel <xen-devel@lists.xenproject.org>
Cc: Jan Beulich <JBeulich@suse.com>, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?=
 <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
 Dario Faggioli <dfaggioli@suse.com>
References: <20220303004015.17688-1-andrew.cooper3@citrix.com>
 <4270d03c-50a9-b1aa-dc2e-53e998153a6b@suse.com>
In-Reply-To: <4270d03c-50a9-b1aa-dc2e-53e998153a6b@suse.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------Kc97eAYwoXPDVjBJ7oHo6bMw"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------Kc97eAYwoXPDVjBJ7oHo6bMw
Content-Type: multipart/mixed; boundary="------------0WPCTCtuG4z0dWr0L0c7ufIq";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Andrew Cooper <andrew.cooper3@citrix.com>,
 Xen-devel <xen-devel@lists.xenproject.org>
Cc: Jan Beulich <JBeulich@suse.com>, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?=
 <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
 Dario Faggioli <dfaggioli@suse.com>
Message-ID: <9da1c49d-2655-fc24-d422-5bc4edc491f9@suse.com>
Subject: Re: [PATCH RFC] xen/sched: Optimise when only one scheduler is
 compiled in
References: <20220303004015.17688-1-andrew.cooper3@citrix.com>
 <4270d03c-50a9-b1aa-dc2e-53e998153a6b@suse.com>
In-Reply-To: <4270d03c-50a9-b1aa-dc2e-53e998153a6b@suse.com>

--------------0WPCTCtuG4z0dWr0L0c7ufIq
Content-Type: multipart/mixed; boundary="------------850ZLIOXL9FQHkzO3Ns8352M"

--------------850ZLIOXL9FQHkzO3Ns8352M
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

T24gMDMuMDMuMjIgMDk6MzMsIEp1ZXJnZW4gR3Jvc3Mgd3JvdGU6DQo+IE9uIDAzLjAzLjIy
IDAxOjQwLCBBbmRyZXcgQ29vcGVyIHdyb3RlOg0KPj4gV2hlbiBvbmx5IG9uZSBzY2hlZHVs
ZXIgaXMgY29tcGlsZWQgaW4sIGZ1bmN0aW9uIHBvaW50ZXJzIGNhbiBiZSANCj4+IG9wdGlt
aXNlZCB0bw0KPj4gZGlyZWN0IGNhbGxzLCBhbmQgdGhlIGhvb2tzIGhhcmRlbmVkIGFnYWlu
c3QgY29udHJvbGZsb3cgaGlqYWNraW5nLg0KPj4NCj4+IFJGQyBmb3Igc2V2ZXJhbCByZWFz
b25zLg0KPj4NCj4+IDEpIFRoZXJlJ3MgYW4gYWxtb3N0IGJlYXV0aWZ1bCB3YXkgb2Ygbm90
IGludHJvZHVjaW5nIE1BWUJFX1NDSEVEKCkgDQo+PiBhbmQgaGlkaW5nDQo+PiDCoMKgwqAg
dGhlIG1hZ2ljIGluIFJFR0lTVEVSX1NDSEVEVUxFUigpLCBleGNlcHQgaXQgZmFsbHMgb3Zl
cg0KPj4gwqDCoMKgIGh0dHBzOi8vZ2NjLmdudS5vcmcvYnVnemlsbGEvc2hvd19idWcuY2dp
P2lkPTkxNzY1IHdoaWNoIGhhcyBubyANCj4+IGNvbW1lbnQgb3INCj4+IMKgwqDCoCByZXNv
bHV0aW9uIGF0IGFsbC4NCj4+DQo+PiAyKSBBIGRpZmZlcmVudCBhbHRlcm5hdGl2ZSB3aGlj
aCBhbG1vc3Qgd29ya3MgaXMgdG8gcmVtb3ZlIHRoZSANCj4+IGluZGlyZWN0aW9uIGluDQo+
PiDCoMKgwqAgLmRhdGEuc2NoZWR1bGVycywgYnV0IHRoZSBzaW5nbGV0b24gc2NoZWR1bGVy
IG9iamVjdCBjYW4ndCBiZSBib3RoIA0KPj4gdGhlcmUNCj4+IMKgwqDCoCBhbmQgaW4gLmlu
aXQucm9kYXRhLmNmX2Nsb2JiZXIuDQo+Pg0KPj4gMykgSSBjYW4ndCB0aGluayBvZiBhIHdh
eSBvZiBidWlsZCB0aW1lIGNoZWNrIHRvIGVuZm9yY2UgdGhhdCBuZXcgDQo+PiBzY2hlZHVs
ZXJzDQo+PiDCoMKgwqAgZ2V0IGFkZGVkIHRvIHRoZSBwcmVwcm9jZXNzb3IgbWFnaWMuDQo+
Pg0KPj4gQW5kIHRoZSBibG9ja2VyOg0KPj4gNCkgVGhpcyBpc24ndCBjb21wYXRpYmxlIHdp
dGggaG93IHNjaGVkX2lkbGVfb3BzIGdldCB1c2VkIGZvciANCj4+IGdyYW51bGFyaXR5ID4g
MS4NCj4+DQo+PiBTdWdnZXN0aW9ucyB2ZXJ5IHdlbGNvbWUuDQo+IA0KPiBEaWQgeW91IGNv
bnNpZGVyIHRvIGdlbmVyYXRlIHRoZSBuZWVkZWQgY29kZSBkeW5hbWljYWxseSBpbnN0ZWFk
Pw0KPiANCj4gSSBndWVzcyB0aGlzIGNvdWxkIGV2ZW4gYmUgZXh0ZW5kZWQgdG8gYXZvaWQg
ZnVuY3Rpb24gcG9pbnRlcnMNCj4gY29tcGxldGVseSB1c2luZyB0aGUgc2FtZSB0ZWNobmlx
dWUgYXMgaW4gbXkgaHlwZXJjYWxsIHNlcmllcy4NCj4gDQo+IEluIG9yZGVyIHRvIGF2b2lk
IHRoZSBuZWVkIGZvciBhIGNlbnRyYWwgdGFibGUgdGhlIHBlci1zY2hlZHVsZXINCj4gaG9v
a3MgY291bGQgdXNlIHN0YW5kYXJkIG5hbWVzIChhcyBtb3N0IG9mIHRoZW0gZG8gYWxyZWFk
eSkuDQo+IA0KPiBJIHRoaW5rIEkgY291bGQgY29tZSB1cCB3aXRoIGEgcGF0Y2ggaW4gYSBm
ZXcgaG91cnMgaWYgeW91IGxpa2UNCj4gdGhhdCBhcHByb2FjaC4NCg0KQlRXLCBpbiB0aGVv
cnkgdGhpcyBhcHByb2FjaCBjb3VsZCBiZSBnZW5lcmFsaXplZCBmb3Igb3RoZXIgZnVuY3Rp
b24NCnZlY3RvcnMgaW4gdGhlIGh5cGVydmlzb3IsIHRvbyAobWF5YmUgZXZlbiBhbGw/KS4N
Cg0KDQpKdWVyZ2VuDQo=
--------------850ZLIOXL9FQHkzO3Ns8352M
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----

xsBNBFOMcBYBCACgGjqjoGvbEouQZw/ToiBg9W98AlM2QHV+iNHsEs7kxWhKMjri
oyspZKOBycWxw3ie3j9uvg9EOB3aN4xiTv4qbnGiTr3oJhkB1gsb6ToJQZ8uxGq2
kaV2KL9650I1SJvedYm8Of8Zd621lSmoKOwlNClALZNew72NjJLEzTalU1OdT7/i
1TXkH09XSSI8mEQ/ouNcMvIJNwQpd369y9bfIhWUiVXEK7MlRgUG6MvIj6Y3Am/B
BLUVbDa4+gmzDC9ezlZkTZG2t14zWPvxXP3FAp2pkW0xqG7/377qptDmrk42GlSK
N4z76ELnLxussxc7I2hx18NUcbP8+uty4bMxABEBAAHNHEp1ZXJnZW4gR3Jvc3Mg
PGpnQHBmdXBmLm5ldD7CwHkEEwECACMFAlOMcBYCGwMHCwkIBwMCAQYVCAIJCgsE
FgIDAQIeAQIXgAAKCRCw3p3WKL8TL0KdB/93FcIZ3GCNwFU0u3EjNbNjmXBKDY4F
UGNQH2lvWAUy+dnyThpwdtF/jQ6j9RwE8VP0+NXcYpGJDWlNb9/JmYqLiX2Q3Tye
vpB0CA3dbBQp0OW0fgCetToGIQrg0MbD1C/sEOv8Mr4NAfbauXjZlvTj30H2jO0u
+6WGM6nHwbh2l5O8ZiHkH32iaSTfN7Eu5RnNVUJbvoPHZ8SlM4KWm8rG+lIkGurq
qu5gu8q8ZMKdsdGC4bBxdQKDKHEFExLJK/nRPFmAuGlId1E3fe10v5QL+qHI3EIP
tyfE7i9Hz6rVwi7lWKgh7pe0ZvatAudZ+JNIlBKptb64FaiIOAWDCx1SzR9KdWVy
Z2VuIEdyb3NzIDxqZ3Jvc3NAc3VzZS5jb20+wsB5BBMBAgAjBQJTjHCvAhsDBwsJ
CAcDAgEGFQgCCQoLBBYCAwECHgECF4AACgkQsN6d1ii/Ey/HmQf/RtI7kv5A2PS4
RF7HoZhPVPogNVbC4YA6lW7DrWf0teC0RR3MzXfy6pJ+7KLgkqMlrAbN/8Dvjoz7
8X+5vhH/rDLa9BuZQlhFmvcGtCF8eR0T1v0nC/nuAFVGy+67q2DH8As3KPu0344T
BDpAvr2uYM4tSqxK4DURx5INz4ZZ0WNFHcqsfvlGJALDeE0LhITTd9jLzdDad1pQ
SToCnLl6SBJZjDOX9QQcyUigZFtCXFst4dlsvddrxyqT1f17+2cFSdu7+ynLmXBK
7abQ3rwJY8SbRO2iRulogc5vr/RLMMlscDAiDkaFQWLoqHHOdfO9rURssHNN8WkM
nQfvUewRz80hSnVlcmdlbiBHcm9zcyA8amdyb3NzQG5vdmVsbC5jb20+wsB5BBMB
AgAjBQJTjHDXAhsDBwsJCAcDAgEGFQgCCQoLBBYCAwECHgECF4AACgkQsN6d1ii/
Ey8PUQf/ehmgCI9jB9hlgexLvgOtf7PJnFOXgMLdBQgBlVPO3/D9R8LtF9DBAFPN
hlrsfIG/SqICoRCqUcJ96Pn3P7UUinFG/I0ECGF4EvTE1jnDkfJZr6jrbjgyoZHi
w/4BNwSTL9rWASyLgqlA8u1mf+c2yUwcGhgkRAd1gOwungxcwzwqgljf0N51N5Jf
VRHRtyfwq/ge+YEkDGcTU6Y0sPOuj4Dyfm8fJzdfHNQsWq3PnczLVELStJNdapwP
OoE+lotufe3AM2vAEYJ9rTz3Cki4JFUsgLkHFqGZarrPGi1eyQcXeluldO3m91NK
/1xMI3/+8jbO0tsn1tqSEUGIJi7ox80eSnVlcmdlbiBHcm9zcyA8amdyb3NzQHN1
c2UuZGU+wsB5BBMBAgAjBQJTjHDrAhsDBwsJCAcDAgEGFQgCCQoLBBYCAwECHgEC
F4AACgkQsN6d1ii/Ey+LhQf9GL45eU5vOowA2u5N3g3OZUEBmDHVVbqMtzwlmNC4
k9Kx39r5s2vcFl4tXqW7g9/ViXYuiDXb0RfUpZiIUW89siKrkzmQ5dM7wRqzgJpJ
wK8Bn2MIxAKArekWpiCKvBOB/Cc+3EXE78XdlxLyOi/NrmSGRIov0karw2RzMNOu
5D+jLRZQd1Sv27AR+IP3I8U4aqnhLpwhK7MEy9oCILlgZ1QZe49kpcumcZKORmzB
TNh30FVKK1EvmV2xAKDoaEOgQB4iFQLhJCdP1I5aSgM5IVFdn7v5YgEYuJYx37Io
N1EblHI//x/e2AaIHpzK5h88NEawQsaNRpNSrcfbFmAg987ATQRTjHAWAQgAyzH6
AOODMBjgfWE9VeCgsrwH3exNAU32gLq2xvjpWnHIs98ndPUDpnoxWQugJ6MpMncr
0xSwFmHEgnSEjK/PAjppgmyc57BwKII3sV4on+gDVFJR6Y8ZRwgnBC5mVM6JjQ5x
Dk8WRXljExRfUX9pNhdE5eBOZJrDRoLUmmjDtKzWaDhIg/+1Hzz93X4fCQkNVbVF
LELU9bMaLPBG/x5q4iYZ2k2ex6d47YE1ZFdMm6YBYMOljGkZKwYde5ldM9mo45mm
we0icXKLkpEdIXKTZeKDO+Hdv1aqFuAcccTg9RXDQjmwhC3yEmrmcfl0+rPghO0I
v3OOImwTEe4co3c1mwARAQABwsBfBBgBAgAJBQJTjHAWAhsMAAoJELDendYovxMv
Q/gH/1ha96vm4P/L+bQpJwrZ/dneZcmEwTbe8YFsw2V/Buv6Z4Mysln3nQK5ZadD
534CF7TDVft7fC4tU4PONxF5D+/tvgkPfDAfF77zy2AH1vJzQ1fOU8lYFpZXTXIH
b+559UqvIB8AdgR3SAJGHHt4RKA0F7f5ipYBBrC6cyXJyyoprT10EMvU8VGiwXvT
yJz3fjoYsdFzpWPlJEBRMedCot60g5dmbdrZ5DWClAr0yau47zpWj3enf1tLWaqc
suylWsviuGjKGw7KHQd3bxALOknAp4dN3QwBYCKuZ7AddY9yjynVaD5X7nF9nO5B
jR/i1DG86lem3iBDXzXsZDn8R38=3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------850ZLIOXL9FQHkzO3Ns8352M--

--------------0WPCTCtuG4z0dWr0L0c7ufIq--

--------------Kc97eAYwoXPDVjBJ7oHo6bMw
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIgkwsFAwAAAAAACgkQsN6d1ii/Ey/y
lQf/aWWVkxTWj/NZ8JJ0EIEd+ncKGGrRp+YV9flmakPiTKnhhVa0ADw8BO1rTnLR93CsXD0c6MI0
0m0KyekdAqAI77MII9/NJOUGxePnhfODRZ6gefJ4BPN9AONJcnjXrY7ugDIab0DXch02uu9I/Iw0
xZZWGg8jgmR7ET4kPzdrOh6U7ZpCqv5w3lffE6a7B/P85eEpaUyPDvyy37d7gwZrxHDFc/kU6cF0
3urzYeBnG/4U6rhdgX80/57Utea01jFaJm8VGVxaVHzhZVajpCtBmhQ0Z8riTuAnmevtkx1s8f4/
pCHxiOXe8XxLkR736MJFegK31wG7LDlL5Z6mxOOkGQ==
=zPV9
-----END PGP SIGNATURE-----

--------------Kc97eAYwoXPDVjBJ7oHo6bMw--


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:06:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:06:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282911.481774 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiLi-0002wk-HG; Thu, 03 Mar 2022 10:06:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282911.481774; Thu, 03 Mar 2022 10:06:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiLi-0002wZ-DF; Thu, 03 Mar 2022 10:06:18 +0000
Received: by outflank-mailman (input) for mailman id 282911;
 Thu, 03 Mar 2022 10:06:16 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPiLg-0001Ia-Md
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:06:16 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 8ff7ac00-9ad9-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 11:06:15 +0100 (CET)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04lp2056.outbound.protection.outlook.com [104.47.13.56]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-6-Y0uCy6dQPaWPXR-MYMKb2Q-1; Thu, 03 Mar 2022 11:06:14 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DBAPR04MB7256.eurprd04.prod.outlook.com (2603:10a6:10:1a3::13)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 10:06:12 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 10:06:12 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8ff7ac00-9ad9-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646301975;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=dWQiEscHMitckPtyowVTpPJHsuAivRldTvGBRFOefis=;
	b=EWvubYFjPAFE3G12+Ya8iogmoE4A8iMhERuFpHP55DJ+Ad9CIhnL1uET6ixxclFnHG72Tu
	nyxa21ioGaFQhKOqUohwKtnCQDwzeUbMWLER7HvxZv2SVne6aOsq2oIN/er0wPHmyWXkts
	AI0UtCmukBZ+Y7ytRRwKfrJ/LQav4g0=
X-MC-Unique: Y0uCy6dQPaWPXR-MYMKb2Q-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=iZSHlQYFNNgv9wilX+mNqihXLn1O31wR1A0IuQjoNCjHM41bRt+md6SuVAggjT3Mhp5DC/sTQoU8NgqEkrbb59nH8mBBx6d2YO19lbT18vOTqmTtkgGI/o6ttMNk/s2T+Ix5Tek0rAxrjE5nGg76GcNEJOHMU/AHdkqEZJpO083BI5N2TUNtbN4LhsfQrsdIPJljiO65qthntZdD9UUBwwxipuVNc09+Nhzvmoc5+OY2CoSoLbAWC54nP98mruniZwaTXlpEPJvr43H2X+LAEPXW7PWAxHaVfOeJVc2+F/bAVFzFe3lQeAnp6/RtciYH2Ej0fi7AN9ST3596QzHPnA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=dWQiEscHMitckPtyowVTpPJHsuAivRldTvGBRFOefis=;
 b=TDUFvB2C+Os5lzooH53pJ66m4lpwWupxyLZtyb74dvcSAwtP6So5w9kESvI5G7lKnZQurhzR9wqlu7MEb6UssDHUod2aHllHny5u4xveFwyByBfL7cXmtDqhgCbp1g1tibZb4PnpuYd8Vb1qEWh2LVhFKH/coV5uy2xweFwJmBVKpkJPGvP8JmleAcdCz22ybtqb9nxJFe+AG5CxrdOImWZ9bcTuq29ab/GGdVdaDGtp4A2RTciS11U7rVEfpTBBFZVSQtShr60D9S8I2tRcVZXQrk50lacOcivybVyym+COjOJS6r7uCawJ8AJYDswOb38FE+aozhYcq9bZQSm/Rw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <eb2566b4-4515-8a17-dfc2-62e099de613d@suse.com>
Date: Thu, 3 Mar 2022 11:06:09 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: [PATCH v3 4/7] xz: avoid overlapping memcpy() with invalid input with
 in-place decompression
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
References: <c0d6eedc-6ea2-5445-117c-0ba623692d0f@suse.com>
In-Reply-To: <c0d6eedc-6ea2-5445-117c-0ba623692d0f@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P191CA0060.EURP191.PROD.OUTLOOK.COM
 (2603:10a6:209:7f::37) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 96213b40-a0e5-4bb5-9307-08d9fcfd7205
X-MS-TrafficTypeDiagnostic: DBAPR04MB7256:EE_
X-Microsoft-Antispam-PRVS:
	<DBAPR04MB725692EDFF23470895884366B3049@DBAPR04MB7256.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(186003)(5660300002)(26005)(8936002)(508600001)(54906003)(6512007)(6916009)(38100700002)(6506007)(6666004)(966005)(6486002)(86362001)(2616005)(66556008)(31696002)(4326008)(66476007)(8676002)(316002)(31686004)(2906002)(36756003)(66946007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?WlVoNmhGa2F3a3lzcWhXTjN6MU9HWlNMNU1WK0gyV0JXQ2k1L3ZHbWl5cW41?=
 =?utf-8?B?QkdyRjY5ZTBQT3RwR01Ta2JsYWxWTlZuYUh4VmJ6R0RkUnMrMWVVbmhFSURK?=
 =?utf-8?B?TUJoYjdXTk1IUXRtMXR6c0VMakkzNXFkMjNKWnlQU0JIS3lqMGRCNHdWN3lr?=
 =?utf-8?B?NVE2dUtGck85NWptNnFSNE1Ta2NqNmlJWGJjclVlMTlLY1hxZzk2blpWb0pT?=
 =?utf-8?B?dGxyQU52ZWhKdVpiKzdHWk1LS09ySndicVBXNWtrb3BJQnlObGhlayt5eERL?=
 =?utf-8?B?bkhQUU96WVpLU2FtdW1JUHRxVG5ybVg1YTZwcXhjTWwyR0Q4b3ZnSkNpSFFC?=
 =?utf-8?B?SzJDRTdEM082UC9yMmhnQ3VKTTdLZE1RUkkydXBSYWo0YVlyV1JKNUU3Y3Iy?=
 =?utf-8?B?TS82UkE5OG9aNDhYRVhickNhSldHUEl0OExicHdFWjV3dHM3NXdMSFlGazFt?=
 =?utf-8?B?TWVwQjl0eW4xZ2RMWHpjK3VzY25wZmN3NXNmZ3orUVowSmF5c0JzTGhraWJq?=
 =?utf-8?B?SFJDM08rUVEzRldVU2R3OVJTdU53S0lTb1lXd1loV1hxTi9TdVVtZENrb3Vv?=
 =?utf-8?B?bnlwclZUeW04ZUxUZ0V5THVSZnFkdlpZTVk1azhGclZncE9iOWRreVdoRDBh?=
 =?utf-8?B?S2t0OHcyUDRRaERweDM3L3JSWTZKVDZJaWp6RGNNUlhwMi8xcXl1ZUVNWXB4?=
 =?utf-8?B?UWRiWTQrYVdDTEJpb1FROE5GVVlYZS9TT2RQaStMaGlUTUtLRVlDSE80czBB?=
 =?utf-8?B?MlFDU045djYwd0xPcENXOUVWbDZCVGpnUDJUcFF4NUxMcHo4Z016Z1l2bkI1?=
 =?utf-8?B?emFabEllWHRXTEVqc0VPdmlRQlh0eDZsRmQ4SGFIT1ppNmlrRDFYMG9LVXJP?=
 =?utf-8?B?L3VsSWF2Uk9CVWxNRy9jbW5zZXcvckZpZklmZnhCNVJQeXBqQ0k4SHk4bXpZ?=
 =?utf-8?B?QUg5SEp1b3JybVJTSlJhT3JDbVdIcjZONmZlNC9PWlROYnNZclZrT0ZHZzVE?=
 =?utf-8?B?VE1vemcrS0IyazhqazhmZGl1V0hWL2E2OTNJOThuanFPRDUyYi9YUW5zc3BW?=
 =?utf-8?B?Z3ZyWG5jTnEzNVpvL3lMeGRPMm9qYStFRGx1aU0wOXBxSVhzeGJQdy9jRGZQ?=
 =?utf-8?B?TnNrVUxxb1RDZ2NTVTdrdjlHWHNMWXR6M2tFTkorUk5ZUi9XRlRjb1RLY3Az?=
 =?utf-8?B?RGF4NXVWSWF5YW15WkphYnpDc1BPUFoxOVMrMFhOSUtEK0FtRFcwaWVuQ3JZ?=
 =?utf-8?B?SlpWbjVwN1ZVUzI0YVlxUE9aQm1YaGNvSU8xZ0hwek50Y2RQZVhvWG1YWjdY?=
 =?utf-8?B?SUp4dXRNcGRqV09EczRXeFFVS2NRRWtaNmRSWUZmMjZDdEFCRlZ6dVZHY2kv?=
 =?utf-8?B?VER5LzR1dHlqWXZFYzBQNDdiWWJtd2ZNeXBEWkhHVEx2d0E4QXJJdFROMmRx?=
 =?utf-8?B?dkFHUlVIU3BzZFZiQnNwbmRrbmF6ZURULy9oY2FYYzVVR2VLWjJRamkyTlRG?=
 =?utf-8?B?VE1JdG51UDF2ZUVxdkdlQjNPRnV1RmpETzBBOUl4QzZRUEpBYWlmK1NqRlVw?=
 =?utf-8?B?dTQzSTZPS01iRHNVUDRxTnQwSHVyck9hMzBPMGxHbGdid2JOdm5ENktubXlK?=
 =?utf-8?B?NkUwcnpic3ozWGswaDFZRi9rdmI3NXZ4VkdyRW4wSDFCWVBuZ2JHWDdMb3lU?=
 =?utf-8?B?MmdmVTNDbm9sQ2xVS3NoRkFnUFluaTJiWUhTYUpGVDJHZjk0NXcxbHpnWmNX?=
 =?utf-8?B?TnNaM1ROamJHZFFKME1jekhtdERGZ0RFOGx3N3RnMG14eTdlczVta1dBdE4w?=
 =?utf-8?B?ZGY2ODY2Qmx2Uk13Q3lEYnVUSzlYYzN5QVArOFJIZkRTTXUyN0s2S1lSZlZH?=
 =?utf-8?B?bHJQUTFZN0dDYlVRZ2Z5Zk5rMGxsMmlMQTI4dE1aL2hGSDFyamFnMUcrMUxF?=
 =?utf-8?B?eHcxREpOa1lHbWdsS3o1TS9XVU1JamlrZ0hwOFJiejU0STBsRzVidW5QazYy?=
 =?utf-8?B?M2VsNG16eGNMYzJIQTFodC9EVjRIOW1MTllhMk52eHdiYTZWY2d6L0xnYnly?=
 =?utf-8?B?eE9EL2E5WWN1b0pxZDJyc0YrZVpxZU5HbXIzUnJYSDYzeEV4Z1BpVGxVWnZL?=
 =?utf-8?B?ZlUxbDZvQzdsVi90REJkVGVKNU4yVkNvZ0tLQkk4WkJpN2NRRFg0WFZkNDJo?=
 =?utf-8?Q?IoPPvXvQsl+kWXSb58tBRb4=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 96213b40-a0e5-4bb5-9307-08d9fcfd7205
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 10:06:12.2029
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: QUETtAAQP1SRkl8Y3f23rZCG+2FUSK+c1L1V3bMixyF+8fl64AvV2KXX3u34MkW8u5S6RH6j3GmMhWsi0FBkww==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBAPR04MB7256

From: Lasse Collin <lasse.collin@tukaani.org>

With valid files, the safety margin described in lib/decompress_unxz.c
ensures that these buffers cannot overlap. But if the uncompressed size
of the input is larger than the caller thought, which is possible when
the input file is invalid/corrupt, the buffers can overlap. Obviously
the result will then be garbage (and usually the decoder will return
an error too) but no other harm will happen when such an over-run occurs.

This change only affects uncompressed LZMA2 chunks and so this
should have no effect on performance.

Link: https://lore.kernel.org/r/20211010213145.17462-2-xiang@kernel.org
Signed-off-by: Lasse Collin <lasse.collin@tukaani.org>
Signed-off-by: Gao Xiang <hsiangkao@linux.alibaba.com>
[Linux commit: 83d3c4f22a36d005b55f44628f46cc0d319a75e8]
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Luca Fancellu <luca.fancellu@arm.com>
---
v2: Retain one more S-o-b.

--- a/xen/common/unxz.c
+++ b/xen/common/unxz.c
@@ -127,7 +127,7 @@
  * memeq and memzero are not used much and any remotely sane implementation
  * is fast enough. memcpy/memmove speed matters in multi-call mode, but
  * the kernel image is decompressed in single-call mode, in which only
- * memcpy speed can matter and only if there is a lot of uncompressible data
+ * memmove speed can matter and only if there is a lot of uncompressible data
  * (LZMA2 stores uncompressible chunks in uncompressed form). Thus, the
  * functions below should just be kept small; it's probably not worth
  * optimizing for speed.
--- a/xen/common/xz/dec_lzma2.c
+++ b/xen/common/xz/dec_lzma2.c
@@ -387,7 +387,14 @@ static void __init dict_uncompressed(str
 
 		*left -= copy_size;
 
-		memcpy(dict->buf + dict->pos, b->in + b->in_pos, copy_size);
+		/*
+		 * If doing in-place decompression in single-call mode and the
+		 * uncompressed size of the file is larger than the caller
+		 * thought (i.e. it is invalid input!), the buffers below may
+		 * overlap and cause undefined behavior with memcpy().
+		 * With valid inputs memcpy() would be fine here.
+		 */
+		memmove(dict->buf + dict->pos, b->in + b->in_pos, copy_size);
 		dict->pos += copy_size;
 
 		if (dict->full < dict->pos)
@@ -397,7 +404,11 @@ static void __init dict_uncompressed(str
 			if (dict->pos == dict->end)
 				dict->pos = 0;
 
-			memcpy(b->out + b->out_pos, b->in + b->in_pos,
+			/*
+			 * Like above but for multi-call mode: use memmove()
+			 * to avoid undefined behavior with invalid input.
+			 */
+			memmove(b->out + b->out_pos, b->in + b->in_pos,
 					copy_size);
 		}
 
@@ -421,6 +432,12 @@ static uint32_t __init dict_flush(struct
 		if (dict->pos == dict->end)
 			dict->pos = 0;
 
+		/*
+		 * These buffers cannot overlap even if doing in-place
+		 * decompression because in multi-call mode dict->buf
+		 * has been allocated by us in this file; it's not
+		 * provided by the caller like in single-call mode.
+		 */
 		memcpy(b->out + b->out_pos, dict->buf + dict->start,
 				copy_size);
 	}



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:06:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:06:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282920.481785 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiM2-0003hY-Rh; Thu, 03 Mar 2022 10:06:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282920.481785; Thu, 03 Mar 2022 10:06:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiM2-0003hR-NX; Thu, 03 Mar 2022 10:06:38 +0000
Received: by outflank-mailman (input) for mailman id 282920;
 Thu, 03 Mar 2022 10:06:37 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPiM1-0002Fn-02
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:06:37 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 9c358b94-9ad9-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 11:06:36 +0100 (CET)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04lp2052.outbound.protection.outlook.com [104.47.13.52]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-7-8DiBiTeRNsOnBDitWgBfww-1; Thu, 03 Mar 2022 11:06:35 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DBAPR04MB7256.eurprd04.prod.outlook.com (2603:10a6:10:1a3::13)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 10:06:33 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 10:06:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9c358b94-9ad9-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646301996;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=rp6zR0202WWrjoyuiwHgeOxRqJmRNX0SFCkPJp8UDMs=;
	b=BrGodMW3v/UOmA/pptgwpGHOr68hqPVxIDbSQakWDDPbCeUZF8fIfb6e2dDufz9KYUmOGZ
	84KgZ+aOaQBdBDDqY6sYAQw/70f8n6+tGBiEKTT9nvAEb5xvm8wlbsTYa9qsKqJl2uGCfO
	WSzeulrofHNuYANAOTZabUKELfB5Isk=
X-MC-Unique: 8DiBiTeRNsOnBDitWgBfww-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=bcbsGsINUwnjpexYhsB6kfOFZPzKjy/psg6sGui8MTOkVx/7Gggvc4/M3EJgjt+QbiiqVHUp7GGnTxJLVkEbw4+ilZDoG0mzn4ioj30T1HuePOixBBtkfgkGsQ+CekAar90cFKoLxe0pwlgg6loza1vMb9LFTKuSzlhDH3ljubjEfFuLR4sf46CSF/UU49kIfFyd40j+Jzl80/u69ktcrGYnPfsuMWmLj/XSx4qdlr4d02/YtkaleK6MsnN7nMgrRBh+KKM/SYDIm0a/0RnOQv8wWTaTbrgY4sxA2Lgcnj3qVEH5KsuKthMT0QEEC4CVIdvmF2Qi4lTh+/S2qSt/Ug==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=rp6zR0202WWrjoyuiwHgeOxRqJmRNX0SFCkPJp8UDMs=;
 b=UQkA7AkkHXvHbJd9bl9ftagDzlQ6qVK7IjRoUS16KzuCuSTtXhEHpvJmDim8zMjUK/Mfr6oFtpd2dIS/dm+T/6vcgQI1Mx+088/HlMolFZgb5rSol6AaN3pfvdB00tuT6fpHiFs9hx1nEDTyDJxZvM4VFK60NTP1h6aURFfjYXMjYTTacHKEwoU4dnhGsHbhBl8bP3QvM7XQXkHLqmO8hkyfUAWKby32nj89BgkFNegdJVStjcFoEnz3rx0sjaCTTJii7JEVry5BgTWGG75uSz/tM4+GsN5ALqRLkNmHMDarOP32dgX9aT24MsJBrqExKsMagoMzlwJCtIN15Ch0lw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <72cb83c2-ba5c-2ac0-a5eb-dc04f6b938b3@suse.com>
Date: Thu, 3 Mar 2022 11:06:31 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: [PATCH v3 5/7] xz: validate the value before assigning it to an enum
 variable
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
References: <c0d6eedc-6ea2-5445-117c-0ba623692d0f@suse.com>
In-Reply-To: <c0d6eedc-6ea2-5445-117c-0ba623692d0f@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P191CA0048.EURP191.PROD.OUTLOOK.COM
 (2603:10a6:209:7f::25) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 85888903-d64a-4979-dac7-08d9fcfd7ece
X-MS-TrafficTypeDiagnostic: DBAPR04MB7256:EE_
X-Microsoft-Antispam-PRVS:
	<DBAPR04MB72561D57267DF4F2F538726CB3049@DBAPR04MB7256.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(186003)(5660300002)(15650500001)(26005)(8936002)(508600001)(54906003)(6512007)(6916009)(38100700002)(6506007)(966005)(6486002)(86362001)(83380400001)(2616005)(66556008)(31696002)(4326008)(66476007)(8676002)(316002)(31686004)(2906002)(36756003)(66946007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?YWRjbmhPeTdpS1pOeDYvRFF1SHg5M0tuTkIvR1l6RkEzMTNnOFpzS0QxTGNT?=
 =?utf-8?B?Z3lpd29iSmZrR1IyMTVQTHhpOThYTEY5UElJelQzdGpEQU9IUjBPOWFlMnJR?=
 =?utf-8?B?THdlS1NDWTFJemR3RERtYUEwbS8yaU1zMGdwQXdwVnU2dGJMMTFYU2dJTXBM?=
 =?utf-8?B?am93STM1OVAzNmFIRzU4czY4ZnplRVVQb0JsUmJGZWZ4WmRlNmd6SjhKNTQ0?=
 =?utf-8?B?cTFMMkNJRWdRSUlOYXVnRVdha0xQNEhyWnJHOFowUHVDMU1JZWVQaEdoZGlp?=
 =?utf-8?B?V2ZRL1lZU3RWMjFaSm55Y1pmL014VXdlWkNkWE1OWlZEa3J4L0dzZXhrQ2FL?=
 =?utf-8?B?M1NiWnZXelY1MFkzQllxSHNTNERucHRpVko2bERjdW90TnlNU2ZrYWRPeUF0?=
 =?utf-8?B?ZHE3dzVzdE1IZkxUdmNqV2xWRWJZU1l3RE5NVUZTU0R2WEY5bEFHTHF0NHlQ?=
 =?utf-8?B?b3UvRnp2TnM2NGc1QzdMMHpOYmNSL2p6RlRaNVJSOWltR1U4Yk1jbURvdkxR?=
 =?utf-8?B?a1AweXB4d2lLOEYwUVE1RTZKRGh5QXEybzZtQUs2aE1XVW1GSkRaa0xHT292?=
 =?utf-8?B?YUhscnpwWmpNeDErWUxLMGZzN2doVnRoblpPZ1czcmFnZFlZRmpvS0liR2dS?=
 =?utf-8?B?V09PV0lqZE1xN3dMZngvMkpvR2M2WGZmeXZVSENsb3c0TDlsMGVDTG9mZDl1?=
 =?utf-8?B?UDM2dlhrU0UzZExUaURieXBaQWRrMjJyUklySGJ4N09EQnNWU2NaNlNyMDFF?=
 =?utf-8?B?UVE0SXlhVnBCenlzNVJHcDNLT0U2b0Zhd0ZscDhqeHpIdTlkUnlZcjlkb0ls?=
 =?utf-8?B?TUNuWkRKTk9VMk1GMlpqR1dxRXozU1l2Um1NbnU3VWFqdVFvNkdyMFRkdUtE?=
 =?utf-8?B?UmoxTTAvUEh4anR0eFA4Zm5IVW90Q05WajF1OUc5OUdtakNUbndTL1I2WENx?=
 =?utf-8?B?MmZXc0RKYlJBMVZZLytvMnNjZGFEb1I3TnN2NlV3eU1obklXS0tCMVQzVjRU?=
 =?utf-8?B?N014RUgxNUV5RjF3dm1JaVV4ZE9mYlhlWXEvLy9MNHdwa0NrUm1ORmN0RjBv?=
 =?utf-8?B?V1FIMnFZR1ZQT2VrN3NOUDVwc25LbnJQRlVaVzlSWUo3cGhJdFRtd2dycnRH?=
 =?utf-8?B?N2VpYWZKVUxBV0FtT25Md092enpFYlc1bXgzZUtrVElOZXVFTEJsbUpTeFhP?=
 =?utf-8?B?ZS9DRS9VYTQzdmtIVWo4bCtKd3g3US9mSnlHbXpoa0lUZUpWSUZPcEUvUGRU?=
 =?utf-8?B?bzZEZExWNWVCbjV0Y1I0ODRmSHdIa29EaDUxUHlKUUNWWmNqdm9PSWY1ZlBq?=
 =?utf-8?B?VDNwYWtpYjFvYUUyZ29ZUmFUNmthZCt6UjE4ZEhJTnVTUGNCcTdKS0F5Z3RK?=
 =?utf-8?B?ZEdmRzhoR0hnank3Y2p6bmFBdlZNS3VTZDZQLzI5NWkvWE1Xby9zVjNqZWlk?=
 =?utf-8?B?bXJUWlhtRStQN2dyelRWTDNqUVIvZzNkNVJPQ0pYYWY1SXgxVGkvaU1vc09T?=
 =?utf-8?B?ajJDK21wekxJNzkwZDRTQm1OS094bHJrMURUSUR0YUZCS1lPeE1BNHJWbUlq?=
 =?utf-8?B?bEtZcGtCbFVMVkFobmd5K0x5VW9IVTlxRldaLy9BYW1zQWhTbld6dXdybzE1?=
 =?utf-8?B?UE9paFEvQklCN3h4b2o0V2ZPN0hzcDQzSUx5OW5rK2NNWVRjRXNFSDRjL05U?=
 =?utf-8?B?clgxSlVEQnI5bEFOclc0UTVLcTFZWllSNm5RbEFES28vMnhyNGtNNWJJRDcw?=
 =?utf-8?B?Q0JoU1paTzJONmtjSm53aE5nZ0paWm9QQ0VHTnF2YzkzRFF1Rzl1ZDkwNGlL?=
 =?utf-8?B?SWZ4eDNIY0RCbE40U2dqY0l4UzgzNWJISXJNUzl1TWhzUHJtTklZTkFpSEUy?=
 =?utf-8?B?Smc4U0R4eURDdjROQ1BDQUpZM3NaSGpzQ1NwRWJpN3R5bE10RU5idjdCVEJQ?=
 =?utf-8?B?T3N6UEh2Qk9FSmxDbkRVWEpwVEpMeEh4c29rdUZ5RGtTNmF0aXlmUE5sUlk5?=
 =?utf-8?B?TEYxYnZ3ZjZZNmpHMzdTZ3hFZVFZUndxRzFXOUttWnI2ZmhuMXFvNTl0SUJl?=
 =?utf-8?B?WlRvUjBsWGR0aE1EN1hjRndwNGdMMzZ6cENab0VsT2tSL3NEQUV4c0xCS1l6?=
 =?utf-8?B?ejdzbmNyaUZHTDVnUDRlV3dmSXRWY2VzeG5DNVR4RVF5MDNKM251RW5zRlpY?=
 =?utf-8?Q?PcojXPz5ARD92/xhWmRdy2Y=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 85888903-d64a-4979-dac7-08d9fcfd7ece
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 10:06:33.5453
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 5s8C20y/V//BlaHDKEWpdM7EpW+IaiD20CrndJpEMeB9ADET1WVStfB9TTOoL/NhhqwXBl+mD8ZKCkb2Tvytlw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBAPR04MB7256

From: Lasse Collin <lasse.collin@tukaani.org>

This might matter, for example, if the underlying type of enum xz_check
was a signed char. In such a case the validation wouldn't have caught an
unsupported header. I don't know if this problem can occur in the kernel
on any arch but it's still good to fix it because some people might copy
the XZ code to their own projects from Linux instead of the upstream
XZ Embedded repository.

This change may increase the code size by a few bytes. An alternative
would have been to use an unsigned int instead of enum xz_check but
using an enumeration looks cleaner.

Link: https://lore.kernel.org/r/20211010213145.17462-3-xiang@kernel.org
Signed-off-by: Lasse Collin <lasse.collin@tukaani.org>
Signed-off-by: Gao Xiang <hsiangkao@linux.alibaba.com>
[Linux commit: 4f8d7abaa413c34da9d751289849dbfb7c977d05]
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Luca Fancellu <luca.fancellu@arm.com>
---
v2: Retain one more S-o-b.

--- a/xen/common/xz/dec_stream.c
+++ b/xen/common/xz/dec_stream.c
@@ -402,12 +402,12 @@ static enum xz_ret __init dec_stream_hea
 	 * we will accept other check types too, but then the check won't
 	 * be verified and a warning (XZ_UNSUPPORTED_CHECK) will be given.
 	 */
+	if (s->temp.buf[HEADER_MAGIC_SIZE + 1] > XZ_CHECK_MAX)
+		return XZ_OPTIONS_ERROR;
+
 	s->check_type = s->temp.buf[HEADER_MAGIC_SIZE + 1];
 
 #ifdef XZ_DEC_ANY_CHECK
-	if (s->check_type > XZ_CHECK_MAX)
-		return XZ_OPTIONS_ERROR;
-
 	if (s->check_type > XZ_CHECK_CRC32)
 		return XZ_UNSUPPORTED_CHECK;
 #else



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:07:05 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:07:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282928.481796 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiMT-0004N1-5i; Thu, 03 Mar 2022 10:07:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282928.481796; Thu, 03 Mar 2022 10:07:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiMT-0004Mu-1y; Thu, 03 Mar 2022 10:07:05 +0000
Received: by outflank-mailman (input) for mailman id 282928;
 Thu, 03 Mar 2022 10:07:03 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPiMR-0002Fn-NV
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:07:03 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ac268b65-9ad9-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 11:07:03 +0100 (CET)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur03lp2051.outbound.protection.outlook.com [104.47.9.51]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-11-x9RipL0rNwSbs3GBe4ORyw-1; Thu, 03 Mar 2022 11:07:01 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DBAPR04MB7256.eurprd04.prod.outlook.com (2603:10a6:10:1a3::13)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 10:07:00 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 10:07:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ac268b65-9ad9-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646302022;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=0H0YRL04KECEnhSZHc0txOpsgQMjHkGgxeFv8W2+jqE=;
	b=NuJbbU0IMlhvAsnZdTALkoe5HCXfygXXg02tKC5tkeFXfRPQOnca4QS32EFLYB7VB16noY
	vYwWkTFUy2l8NcuM4Xsvxy+xWflofx3krfx6NdX/EJ7/dVK5lO0BvZhkZ/fTCITtHiOow2
	30Kr4WBB3UAKssdnLT64DTQ/xV3EzGc=
X-MC-Unique: x9RipL0rNwSbs3GBe4ORyw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=j6SgIZsTvZXCcIpSDIrmBMtd5W6kDDHZ0YiUuDOFr5CntfUP41C28cqFxZ7QDTO1hPX32ojBvY1g1Y21aY1kADusU3S/oPorvP9kOwm5VItzNvN6UyLU6ZyuyvzVID93kbNp/Xo9PJQ0s062KEuG597o9U1+vj/OoOOKIvvRyqyk3nQYvXglMNcVcA4LViIERW2js14sKPbmE/accPYfzGMqGPkLqfr7ddJE9jW/acU164DcCXqw/wOEB1OUMhe8YGnL8IOkknM/0ILdxS1oXR2fIpOu8Hkeuvzz7WkaPxoil+cYkbf1rPj09WjcBraW6rt8/07o+VxQbv8oUz6mSQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=0H0YRL04KECEnhSZHc0txOpsgQMjHkGgxeFv8W2+jqE=;
 b=DjkSOgdZ9TDmZeuR6EdqyvLJ79AYTZSnUHFvXHWanLZV1a5ZdJNBGXrJqcfitEJQ5r68Ri14Ri3MFF9wDYjZEWOMq4KgiVaZ/LY4l4rJyIDLCEx4wXhZSswNnyuuhmapCTn1+9F9ynr46dOyUde+l8NvLW8aBUd1vUsCNE6/oQgsrV2eRZzkO/Qf5e7inHwfY82F06wEaMvBnoeQ8YRrxqsKoJyMB9dKP1uE7p+FNfLMl4oAO+wdHLAWGY6OrKtHDdwaoth/jK7Q4aWIvab572bq0Lv443z4trdOBfySvvU7bsrjEK1QJvFodBSqXc+0kR4tb463IwJyHFydFywboQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <4daa52f3-2fbe-c218-a8b8-a43c1b23f803@suse.com>
Date: Thu, 3 Mar 2022 11:06:58 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: [PATCH v3 6/7] xz: move s->lzma.len = 0 initialization to
 lzma_reset()
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
References: <c0d6eedc-6ea2-5445-117c-0ba623692d0f@suse.com>
In-Reply-To: <c0d6eedc-6ea2-5445-117c-0ba623692d0f@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P194CA0002.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:209:90::15) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2cf04b77-d9f3-4fd7-c9aa-08d9fcfd8eb6
X-MS-TrafficTypeDiagnostic: DBAPR04MB7256:EE_
X-Microsoft-Antispam-PRVS:
	<DBAPR04MB7256CC72AAADA1AC446AFD63B3049@DBAPR04MB7256.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(186003)(5660300002)(26005)(8936002)(508600001)(54906003)(6512007)(6916009)(38100700002)(6506007)(966005)(6486002)(86362001)(2616005)(66556008)(31696002)(4326008)(66476007)(8676002)(316002)(31686004)(2906002)(36756003)(66946007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?Zk1ybkFkakNiVlNGam8wRWVWdjJrK0pEOUpuSjFzMUlCV1I5TktUbFpPV2xj?=
 =?utf-8?B?ak13d3Z3STNkdzY2Z3RkYW1mSmNvTHEybktZdm4xTVlYeUZycXB3ZWRiY2Z4?=
 =?utf-8?B?MzJSVEdOMXFvU0tIZmNZWGFpWVFxSGJ5dXR3cXMyalc1c3FJb1U5TzJhYjdl?=
 =?utf-8?B?Y1c5eWFqT1d2anRpcGtSSHR1eDkwN01iTDBUdXJoS2pocU1vMVlkN0NpM2ZG?=
 =?utf-8?B?b0dWS1I3anV6ODBqZ1k4OVVqRTIxYkNEVGNiTUpWd2RLNDhvendabWd6em4x?=
 =?utf-8?B?QkpCcmpONDJ3d2lTMi8zTVNTZi9UYkNyN044bUJsNGJ1VmFCS1Y0aHFwNS8y?=
 =?utf-8?B?UUswSk5XNncvdzhsZyt1Smx3NG5IcFl1a2VuOUdJdWhEWnFBY2l3QWNjbUlM?=
 =?utf-8?B?cHhKbXJkQk9SeWZCeWhCSWdhUlRrS3RrNXQvblU3VTJNdEFZVVhPZmk5NmU1?=
 =?utf-8?B?b3FVMVNOOWt3NmRiczZ3T24xOEhBOEl1OFVSaE5IbjRIVVh1dkxPYmc1aktK?=
 =?utf-8?B?OFcrSDZmdEF3SVVxbXVHVm5QTVBNV3lCZkZDekxaN3d4a29tNGE3LzYrWHJ1?=
 =?utf-8?B?eE9weXNFdkVhNzRTRmdTazRZM3Z2cUxkYnVzOWV1SVdqSGdwZ3dYeTNrQjhN?=
 =?utf-8?B?dkJFSHE5dFowamgzYjF0aFFHbkwrb05MZjVDa3pHKzBSWWRKblpQeUVGamhE?=
 =?utf-8?B?V29Zc2pGcElZbnNNV1lEbFlWeWltaDNXbUNIYUJrV0laZEJ0M0IzVm5aMlVG?=
 =?utf-8?B?YkJ2emVIbEE3dE52NXJoV2VjOHR6Ykd1UDR4UmlSUHNHNG1IK0xjOVl4cHZt?=
 =?utf-8?B?OWdpaDBUZ1dUVGdjNWU5TDd2aVRiS3NXZUY1RWU2V1FoNFR4alg0cUtKdFZW?=
 =?utf-8?B?eU1UUGxNMThiMjRjQlkvb2F2czFWTElQajBDT3FHTVo4c1lFNUMwdktPR254?=
 =?utf-8?B?aVgvWERJM01NY3hlWlA2RHhKN1lOTUFXTGk3R1h5SjdyNWQzaUtPRkhkOTlY?=
 =?utf-8?B?ZlpsSjh5ZEFCV2RsOFhxVEgzbjYzS25JTDkwV1NtTGY0N002Nk5sS0tHOThx?=
 =?utf-8?B?UzQ1NVdNa1E5SUpkWndrUHZDaTFjS3VJMW95UnlKektFaUtCM0Z3WGtDU29P?=
 =?utf-8?B?ZUxlTUkvNWxMT0c1cG13eGZFWEh3ang4bGVDRXdZdHRTeER2aHN6WEwzQ0Iw?=
 =?utf-8?B?ZkRSUy93T3U1WEkwdUkxZk5PQmVFM2hiRUMzMVZZWXIyb2lIdnZjUkVwcnkv?=
 =?utf-8?B?Tms3cW5KUVllYW5HQUtuSUdJRnY3S25RemR4SnBtZWVxTWpjaXNCcExCZzV4?=
 =?utf-8?B?TWxoS1F5QnhyemN3di9iRUJ2Q0hUM0VyZTRoejNtZGJUWmw2OFoxdVp4a2lh?=
 =?utf-8?B?bHp5Zy8rNy95c0J4Mncya0tkbktsdEFBeEN5OHRJM0d1RnhzY2E4L2pqdHRk?=
 =?utf-8?B?Q1NzczZZM21XN1VDY2k4SE9DbngyTUE0NTlNdWMzemUrTVAyRHQyT3ZBSnBa?=
 =?utf-8?B?Sy9rcER3N1g0dU1lbitQQ1RtVGMvT1dUZUhJU0owNjlGdVI3eDh1Y01Tc2F5?=
 =?utf-8?B?SVYvb0ZVTVU0ek5jUldpOElDTWE2dzVaWFJBOVJWWVExc3NpaVgyemJrRHpL?=
 =?utf-8?B?VmFCRndISWVHS2ovYjdWQk1tM3RpWWl3d1dkUmdReDU3bEhQcHlqWjQya2VD?=
 =?utf-8?B?anNGNUY2cmVaaW80ekFBVEpZRmR1S2h6SjFmOGVzSU9qL3NKZkdWTnFKYnNt?=
 =?utf-8?B?SXhGRjRwb0Jmeis0RE1hb1llYzlOVGFWcGNDQXJrYkdBaTVpNC9JVDRLYmk5?=
 =?utf-8?B?bzVwZlExQW53djVRNHdNNS9xQVFjRWF1alpGNlIzU2sxblVBVUswNHJqOElp?=
 =?utf-8?B?eVBDUnlSenJvRXBTQThHdWM4SU9Hdm9UNUduek5XemVRdUtIYXl2dFhidm5S?=
 =?utf-8?B?ZTZyN0oySzVzcDFuaEpUc0FVK2t4Q2ZIVFM1aG5QQ2NRM2hPZUN0UjZ5ekRk?=
 =?utf-8?B?Y0tMS25UVXdJcHptYjFKcE5oc3piTnJtSEFPMExIaUlJaXdHanpyU3MvbXBU?=
 =?utf-8?B?N2R2R0d4ZXU4LzAzZkk2czVrT0JKM2NBMU9jaVB2TGhBejN0cy9KK1V5N21P?=
 =?utf-8?B?c3diMTFKenJBLytrNGFuMFFIeXFrMHpRaU9pWThEUjZxQko2bTNIQjltRkRx?=
 =?utf-8?Q?QhQot1DctxbE+n8InwI6Hrg=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 2cf04b77-d9f3-4fd7-c9aa-08d9fcfd8eb6
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 10:07:00.2467
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: gejgE7lqimsycoa2V9GYU63g0/EbFS/7GS/zAWm3JzH3I11wZBRJiGzH6agFx0RkbCL3lrslEIR5nQYMskdwOQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBAPR04MB7256

From: Lasse Collin <lasse.collin@tukaani.org>

It's a more logical place even if the resetting needs to be done
only once per LZMA2 stream (if lzma_reset() called in the middle
of an LZMA2 stream, .len will already be 0).

Link: https://lore.kernel.org/r/20211010213145.17462-4-xiang@kernel.org
Signed-off-by: Lasse Collin <lasse.collin@tukaani.org>
Signed-off-by: Gao Xiang <hsiangkao@linux.alibaba.com>
[Linux commit: a98a25408b0e9b0264abcc3dabfafd9ff2ea1046]
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Luca Fancellu <luca.fancellu@arm.com>
---
v2: Retain one more S-o-b.

--- a/xen/common/xz/dec_lzma2.c
+++ b/xen/common/xz/dec_lzma2.c
@@ -791,6 +791,7 @@ static void __init lzma_reset(struct xz_
 	s->lzma.rep1 = 0;
 	s->lzma.rep2 = 0;
 	s->lzma.rep3 = 0;
+	s->lzma.len = 0;
 
 	/*
 	 * All probabilities are initialized to the same value. This hack
@@ -1174,8 +1175,6 @@ XZ_EXTERN enum xz_ret __init xz_dec_lzma
 		}
 	}
 
-	s->lzma.len = 0;
-
 	s->lzma2.sequence = SEQ_CONTROL;
 	s->lzma2.need_dict_reset = true;
 



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:07:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:07:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282937.481807 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiMv-00054P-Iq; Thu, 03 Mar 2022 10:07:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282937.481807; Thu, 03 Mar 2022 10:07:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiMv-00054I-En; Thu, 03 Mar 2022 10:07:33 +0000
Received: by outflank-mailman (input) for mailman id 282937;
 Thu, 03 Mar 2022 10:07:32 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPiMu-00053r-0i
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:07:32 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id bcad49c7-9ad9-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 11:07:30 +0100 (CET)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur03lp2051.outbound.protection.outlook.com [104.47.9.51]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-2-lFUJprtaPsKH9rlJTkrhfg-1; Thu, 03 Mar 2022 11:07:29 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DBAPR04MB7256.eurprd04.prod.outlook.com (2603:10a6:10:1a3::13)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 10:07:28 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 10:07:28 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: bcad49c7-9ad9-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646302050;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=oa6iC2T5QUROEVeYq1WfshK6wYPb0g27s45ej1AfY/A=;
	b=ZKMcAs6C+kx+5r2oWgyiPVpAjySJVM8MYDqlziVb15vF6sY34jZXL/Y2j9dDvNVtS3+JSv
	eRHKb32y0JjWf4+xdqPhmCeRdf1qHjMLqMzdfYcbTYOVih8sDbZiRP+nnXmVYTOgpimc8x
	BcjhEDLzqsaIdzYfFDwSkdqHm4J91Ik=
X-MC-Unique: lFUJprtaPsKH9rlJTkrhfg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=JwH6BLAHiHFDQYzqP1Gsim6/Z5fIL+pCEF0bNJhQlqBzaaO/Bbjfar/nFwTPaLkiBSCTec20KnF5VB6AWpC3eNVbtliecg2pqqpy+WFgHCtAUp54F6Dnpw/kg6Ti2d+CJOE7QOp3O5/gjbuubDbC5JmkoDykKA5EZm4LQMcTjZWdScgwz+KAUbGKF8yFmT08QFt4NdyXa1HY/Zy6c4gKOtQB974emSO+QjF4mw4NXHelLir027PEDa15s5dLWnjz19FiW9WImbwg82bE7IL1pD92QFUUSKChcVcBPDgw3hu4WO+rcDchbOMdROom6Ol5brfI24/66b+xva3kGyu0PQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=oa6iC2T5QUROEVeYq1WfshK6wYPb0g27s45ej1AfY/A=;
 b=cC+jTSUI30HxG6k1gSUcIJIQK6xfpVcWNMB0RTbWKPcGhjavjDq4StIRZ15lneM+jlhcGW9NDJTC360DjdFt40oNq+i4jK1RvVmQ6I8yL7PlvAK3n0gIlxVXgMJzAnFWHdj2HYpMsS77Mgwz4K6HOKoM3wdlRqmISNiuq8h/MHONzcWfwpirKDjPBmv7aVNfGI91g2FAER1pLGk4CRHjY9RQop9rqapm98jAsEsnwnVYf3Zqfp5Ku5PUkmn8k3U3YoxAwxp04ZaOaEn/WGnOBoCfU3FLyqNi1FA7G40hQaUcYQDOh6Y+5BRB9AnePji6ics1/B2UBa2Yf0MXBPqR+w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <202440c9-f515-bde5-ea87-ca06a7f11dab@suse.com>
Date: Thu, 3 Mar 2022 11:07:25 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: [PATCH v3 7/7] xz: fix spelling in comments
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
References: <c0d6eedc-6ea2-5445-117c-0ba623692d0f@suse.com>
In-Reply-To: <c0d6eedc-6ea2-5445-117c-0ba623692d0f@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM7PR02CA0010.eurprd02.prod.outlook.com
 (2603:10a6:20b:100::20) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: facd8390-c249-4aa3-7189-08d9fcfd9f5d
X-MS-TrafficTypeDiagnostic: DBAPR04MB7256:EE_
X-Microsoft-Antispam-PRVS:
	<DBAPR04MB7256FD313BAB9FA233305C49B3049@DBAPR04MB7256.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(186003)(5660300002)(26005)(8936002)(508600001)(54906003)(6512007)(6916009)(38100700002)(6506007)(6666004)(966005)(6486002)(86362001)(2616005)(66556008)(31696002)(4326008)(66476007)(8676002)(316002)(31686004)(2906002)(36756003)(66946007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?cHRxOGR1RWtqQUhuYmhka3Q5cHduam1IU0ZwUjVmZHMrOFVxcWtNT2k5djF4?=
 =?utf-8?B?N2ZFdzR0TGZCZmo2VlNrNmJwekpXajVnMmRkaW1GdTlUYnJsTTM3eGduYVRi?=
 =?utf-8?B?UXJYcktFcFNZdEd2M1k5UW5YY09pcm93a2lnR283NzdvQXE5Rll6R0lxRHlF?=
 =?utf-8?B?V3R6MmZSTkJ5TDY0bDF6QS9ieCs5RmI1YVdONmpRTFdsZ0lTNnE1dEk0RmZD?=
 =?utf-8?B?V2F4WU1leHozMDgveUp0Znc5Y1VHZ3RwMTdPay9lVmZRSkpqQmhxQWREMlgz?=
 =?utf-8?B?WlVTS1RuZEhRNFY1bXk4cnRZVUlUM0NmQ0taUWpYVGVaUmcvV2QvWFhQT2JC?=
 =?utf-8?B?WCtmYmlsVi9IU3hpdmsyeXdBbkRxRm9sLzF2aTl0UDhJTGxZVitkbGtHRkNX?=
 =?utf-8?B?emp4RzlveXVOSFVVWWRDMzBqWmRwVGJJQUxUVmNJb0hYZ1l0YWh3eGsrcGtU?=
 =?utf-8?B?ZnRnN3pjVlZ5S1VZOVg1L2U4Qm56SXFlKzRrMW5GODB3RGg1S3lhb0xxY08r?=
 =?utf-8?B?QSt0bHYyaEVXSDcyZG0vR21VeUJoTElkT1RiTnV4NlBKRlJRK1dVZGlpS3lp?=
 =?utf-8?B?YVZ2VWd0alA2dEF0QmlSR2xFejFlTXM3UFJab05BY1NEQzF6OEJ4amhnVVJG?=
 =?utf-8?B?Um9PWGxRc0V0MHVhd2E4S1E2UnlFTnpQeWt3WGVFNHNQOUx2WXFBTU56SWF1?=
 =?utf-8?B?NDl5Mlk0TzJpMFIvak1QVURaOWgwNUZoSG91YzFDWlNSbXpRUW5HZFZEOG9N?=
 =?utf-8?B?MDJ5dXVTVXRaaDN6Y1R4WHl4andCSDdOQlNLWll0dk54by82czNDcXU0YXds?=
 =?utf-8?B?bDRNSXFrUUpta2txRVQrT1d1Y1RQd3pLZEp2Q2dFTThWdUh4aXBhNGhhcjlG?=
 =?utf-8?B?RlluN2ZpdjJYa1dnMk9sYzZPMjJaa3lSM1ZFVjdDWlRwZFE2MElpUUsxR3NP?=
 =?utf-8?B?YllqNnloSTdEblFOWjgvenM1TXBIWm9QY2I2aGxPS3F4RDRMc0dSaFA1eUJT?=
 =?utf-8?B?UWxCZGJuVFRSWHc3Vytjd2lNQnpVVnNjaFJTbDhqRkFSSVZSNEdaQ2JQWWdo?=
 =?utf-8?B?RUloNHE4TjZFbVFFY3BIa3c5dlpGYVdMYmhoNlUyWlRyTEJJMHorU0hwUHZQ?=
 =?utf-8?B?a2d2Y003cDZERkVDZ1FDb0ZhRXhkVWtLS3BjMy9XM2VDVUdjRndCM1IxNTg0?=
 =?utf-8?B?bTVFVkwwZ044U1hQdU1PZlM5NER4OWZrNldJekhxMXFyVndnUk5nc3B3WFFO?=
 =?utf-8?B?MVhYSk1BbFZQU1pud0Z2TDY4ekpPY3lmWjF1enYyczlQNE1aYk9KTnpJWnRk?=
 =?utf-8?B?M3F3bEtCeGR0cmdPYmJjemk0SWJWNEJPWVBSWEl0b3hXRmp0aEkyQmVRL3NZ?=
 =?utf-8?B?V1JnNmFqTHJtN0ZFZ3pqYlBXL0wxeW5LR25pSFh6VVZzVFdzRisrS1kxVG44?=
 =?utf-8?B?aE5MVU81YmREaXNQWThhNlVGT2tvcVFyWEMzdDBCaTQ2bWxhNFVvbVU4YkE1?=
 =?utf-8?B?U2FHOVVCQlpNVnlLbDhGbEttYUs0R3RTWjdqVVpWTDhoNFdOWDFIN1JSMmE2?=
 =?utf-8?B?bGlNZG0xdVhTQzZPeHNEaXdxNVdFZEQ0OXJPYTRoV0NSSFQrckgyS1lDbVl0?=
 =?utf-8?B?UmxWT2YyNVlXclRHR0p0VytIbUNnSXZ6ODl6eGVxMVlscjhGM3JRRDRBVG1u?=
 =?utf-8?B?ZU45MkJSeVo2azZPK2hKL2ljZ3lHZHdEZlhDcUNPUktQZ2RpM0pNVnlkWFlF?=
 =?utf-8?B?SWRCdzlQaWJoangzR1NJMW9CU0l3dFV0dWdGclMzcXU2cUVZWjVSZmNWZThN?=
 =?utf-8?B?RjRsRG9nRURQbkYzVHErZnoydmRKdHIyc20wWGF5dWN6WjYxaDhQZ29GWE4z?=
 =?utf-8?B?bll5WkcwYm5Va2NNTE01ZndNRUd1VlpBWHVMRWhDRytVYUtwK2JiaUx6aWhP?=
 =?utf-8?B?bUtFdzlsSVBoSmtzaXQ4bE5pZXE3aDdvRTBEdUMwWEtQaTlNaE8zWTRhOHMx?=
 =?utf-8?B?cDBJdysvN2EvdHF5R3F5MUtwS0Nvbis5SEtvME1yQTVDWFRFTncxWnhtRlA5?=
 =?utf-8?B?VjB4NSs1ajcweWlSNUxIN0xxR1JtT0NqUVBGRm5rRS9WcHJBWmlHN21UM1Jh?=
 =?utf-8?B?M3A0bytXbWNqclQ2QW5iL1FrQnZLaTFNYjBoeElBcEpHQkxqWjE1UlM4VFQv?=
 =?utf-8?Q?rtdbDdMKfgpAzf6ZhXAm7Qc=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: facd8390-c249-4aa3-7189-08d9fcfd9f5d
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 10:07:28.1356
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: azu/V+EkVKUi1oXpLJU16o44iV4V7mvqZLwdCiGKvbrvsWAWsIsybObzyHwNV3pOliMTU/b8vyWz2CE9jnR8+w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBAPR04MB7256

From: Lasse Collin <lasse.collin@tukaani.org>

uncompressible -> incompressible
non-splitted -> non-split

Link: https://lore.kernel.org/r/20211010213145.17462-6-xiang@kernel.org
Signed-off-by: Lasse Collin <lasse.collin@tukaani.org>
Signed-off-by: Gao Xiang <hsiangkao@linux.alibaba.com>
[Linux commit: 0a434e0a2c9f4395e4560aac22677ef25ab4afd9]
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Luca Fancellu <luca.fancellu@arm.com>
---
v2: Retain one more S-o-b.

--- a/xen/common/unxz.c
+++ b/xen/common/unxz.c
@@ -20,8 +20,8 @@
  *
  * The worst case for in-place decompression is that the beginning of
  * the file is compressed extremely well, and the rest of the file is
- * uncompressible. Thus, we must look for worst-case expansion when the
- * compressor is encoding uncompressible data.
+ * incompressible. Thus, we must look for worst-case expansion when the
+ * compressor is encoding incompressible data.
  *
  * The structure of the .xz file in case of a compressed kernel is as follows.
  * Sizes (as bytes) of the fields are in parenthesis.
@@ -58,7 +58,7 @@
  * uncompressed size of the payload is in practice never less than the
  * payload size itself. The LZMA2 format would allow uncompressed size
  * to be less than the payload size, but no sane compressor creates such
- * files. LZMA2 supports storing uncompressible data in uncompressed form,
+ * files. LZMA2 supports storing incompressible data in uncompressed form,
  * so there's never a need to create payloads whose uncompressed size is
  * smaller than the compressed size.
  *
@@ -127,8 +127,8 @@
  * memeq and memzero are not used much and any remotely sane implementation
  * is fast enough. memcpy/memmove speed matters in multi-call mode, but
  * the kernel image is decompressed in single-call mode, in which only
- * memmove speed can matter and only if there is a lot of uncompressible data
- * (LZMA2 stores uncompressible chunks in uncompressed form). Thus, the
+ * memmove speed can matter and only if there is a lot of incompressible data
+ * (LZMA2 stores incompressible chunks in uncompressed form). Thus, the
  * functions below should just be kept small; it's probably not worth
  * optimizing for speed.
  */
--- a/xen/common/xz/dec_lzma2.c
+++ b/xen/common/xz/dec_lzma2.c
@@ -505,7 +505,7 @@ static always_inline void rc_normalize(s
  * functions so that the compiler is supposed to be able to more easily avoid
  * an extra branch. In this particular version of the LZMA decoder, this
  * doesn't seem to be a good idea (tested with GCC 3.3.6, 3.4.6, and 4.3.3
- * on x86). Using a non-splitted version results in nicer looking code too.
+ * on x86). Using a non-split version results in nicer looking code too.
  *
  * NOTE: This must return an int. Do not make it return a bool or the speed
  * of the code generated by GCC 3.x decreases 10-15 %. (GCC 4.3 doesn't care,



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:13:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:13:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282951.481818 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiSd-0006e8-9D; Thu, 03 Mar 2022 10:13:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282951.481818; Thu, 03 Mar 2022 10:13:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiSd-0006e1-5y; Thu, 03 Mar 2022 10:13:27 +0000
Received: by outflank-mailman (input) for mailman id 282951;
 Thu, 03 Mar 2022 10:13:25 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPiSb-0006dv-DM
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:13:25 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 8f6b6d52-9ada-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 11:13:24 +0100 (CET)
Received: from EUR01-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur01lp2056.outbound.protection.outlook.com [104.47.1.56]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-6-XKdewn20NSaezgd0xnvhRg-1; Thu, 03 Mar 2022 11:13:22 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PAXPR04MB8781.eurprd04.prod.outlook.com (2603:10a6:102:20c::22)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Thu, 3 Mar
 2022 10:13:21 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 10:13:21 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8f6b6d52-9ada-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646302404;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=VR9a98SW9QQhm4ot3co1G/UWbbnwoswadNmfJgaDH10=;
	b=kUw6440AfV3y2u39gUyh+SQAQaYO0/thYjXY967WIujyjynzNJzhh9bfFy5bS7r9R7WFvE
	b/xRnEoCe3rCcBWoH8WNPJkeyAKH4eMPNPFgsHRVx0Y9b6jp/siZd7l5SvXtTju3Bsjiwg
	aPfwfnnBsQ5aLmhko1PAFch3QgKj0yo=
X-MC-Unique: XKdewn20NSaezgd0xnvhRg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Oc06tngyUXCqw1W5XCnwfQZoI68JcIbQIL48qHLZJ2UNKzXHs3nei0il56YppGffZ7aHpQnqB3aTGhk4fBTz/pUlIK6Z6OBXU0gSNiAo+hHkDXzrhIfwBFeInMqGH4q1XrrSqj+5avw+ThjZU6PXhr0aAXaC3oQlySii+I1HRCooJRw98axW/7OSHXzqyOo8xbj8dC7lIDpfWBHCg6xPNUNRozmSxjdiw7Uio2FH2PGdU9l1aExIS1Nsi1s5TsYJT64nIPLjUhcVTyUST0ulfErphc+v7lHDXYHbH/AbM75crMKwZovD2QptpwRpsikmbSnI6iUr93SlOTT74Wm+vw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=VR9a98SW9QQhm4ot3co1G/UWbbnwoswadNmfJgaDH10=;
 b=c9tifaSQSeTqXD3abFte43+K3QEOBgrDovjPcc9bNCjO0UT5H2sEXvaW3BAc8kFW3DrSEF+O5h10lZPtdfNXAzpd/GO9Nt0VPoavYh490k/vjVdZHwq6vUAJSa213z58rIwzJ06unOOqkkKSkubgjRtGI5GUxxsqc6axqQ0sFuwTNxKIbKixliL3w/CjGne8ZM1ub5YFm5Ao78daW/Akw2jBASApu/oJ4IXi0DpEazCNBx/++4mGFVBqlZnIuNSrbStMGLJEjEglLIy/9qB+PJlDHCTv/oIC/Q2dahpFU2Ibr2KIz1zz2n6g37YnvJlsDxXiBphQRSoeTX83Hunzyw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <7ebb1ecd-cbe3-406e-0dc7-4283c64717a1@suse.com>
Date: Thu, 3 Mar 2022 11:13:20 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v3 0/7] (mainly) xz imports from Linux
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
References: <c0d6eedc-6ea2-5445-117c-0ba623692d0f@suse.com>
In-Reply-To: <c0d6eedc-6ea2-5445-117c-0ba623692d0f@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: FR2P281CA0008.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:a::18) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0b792864-bb9b-4ec6-4e0f-08d9fcfe7204
X-MS-TrafficTypeDiagnostic: PAXPR04MB8781:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB87812E31C4D54DB6BBEA8E02B3049@PAXPR04MB8781.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(83380400001)(31686004)(5660300002)(2906002)(36756003)(2616005)(54906003)(26005)(53546011)(186003)(6506007)(6512007)(8936002)(66556008)(66476007)(316002)(38100700002)(31696002)(86362001)(508600001)(6486002)(66946007)(8676002)(4326008)(6916009)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?ZnpYVDZhM3k2VlQvdHRkSW84OVVUcEdYV3d5T3pwZXBjY2NkWks2Nk16aTFX?=
 =?utf-8?B?ekJXVzJ0aEdsVHhYYlBOUEtpSEVYU1phVDFQNVUyd0Q2SVVqcHgwbVAvTTFP?=
 =?utf-8?B?Mk9vem9jcmVLVzlPVzZFblAvMmhNYnl0cFdWOFNpNjdkWXFKTUt4MGo2V0dT?=
 =?utf-8?B?VXRTeDVHWnM0VklrblpuYzMyQ3ZhRDBYa3ErV05jdWRHK3NUL0EwSjNKYk9M?=
 =?utf-8?B?NXFoOGUzK0x1d2c1RGUxTE15SUxZUGtORWRQNWxMNG9Hd2VwZlZ5amhXVm52?=
 =?utf-8?B?dSs1WmpkZExQSWppbGFJbU5JZ3RISFRhTWZUQzNXamJXRUVLRCtpN2JLYTFj?=
 =?utf-8?B?bW1ybnc1SjdmNzlibU5XN0JMVTRYNktuTjJQM2ZUTEhhb3dTZjZmSkd1OUpD?=
 =?utf-8?B?VHk1RlA2NjcyU2VweFQzcC9VSDJvb2pQRVJTVkQ0enFVSGgrdEU3OEVpSGFt?=
 =?utf-8?B?NzJsVWdVU1Vxd0poT0pObER5cTZoaEM2N205bHBjdEtCRDBYL3Y5VGtlYXJn?=
 =?utf-8?B?WGtPS1F2OWkvN2x0K2VhVWJzbzRrRXZHWEpURFR4cXh5eXJsa3BKNHk2bVRQ?=
 =?utf-8?B?QXlBdnA2aStMS1gvUlVldkl5WEVCK3NaZDdQVTFCaS8veC83eDFHU3hrUXJB?=
 =?utf-8?B?WmU0cSsyRUlSQ1JBMFN6YUxlU2tsK0hJSWlvdmVESlZybmVidk9mNjJybWhs?=
 =?utf-8?B?ODBEa05rRDhkWjh4ZmxqTkd1SWI4bHNGNTdSWjZUTUErTTdZOTNRL2tFS1BO?=
 =?utf-8?B?Vk5EWnpTRzlnUjZQYzRHajlCcUs5c0Urc2dCRmpxeXlVRVdDdCt4SDhVZGIv?=
 =?utf-8?B?YkJIVnRGVDFzMTNzUlIzZVdlRC9MQTRldHFpdlZzYnhyQ1IvOEdXcXFyUmZF?=
 =?utf-8?B?TUh0blNVek50VEhWTW1TeXZaTUdaOHZWU0E5bW1hSGlFQkYvYitlSkEzS0Yr?=
 =?utf-8?B?NW1obXlaZjZ5dURSVzRRT3VFTkJKMUJUVDlaMllUVE9Tc3ZaM3p5QmlqQWhh?=
 =?utf-8?B?UnJ0OFpJME1pSERVWlJLRTc5SGh2cXB4VTlnVGJLdnN3NzJ1ZGd1YnhqckpE?=
 =?utf-8?B?Q1ZKYVNqNERqNnlkdmIyQTFNZjQvcFpiSWdxWjlSR1FJZXk2T2haNmVUTXdN?=
 =?utf-8?B?WUpNUE4wRTF5VWJTa0ZpdkRndXRocWtOZ1dVUFoyc2dZSjJ2MG5NbHFtMnZt?=
 =?utf-8?B?V1UwR2Nydk14YlJJdm9Nd1hCYjEwQlp5MkE0UTNla1lqdkpNNjdOalZReHZI?=
 =?utf-8?B?bDZ2TGxzM09lbllMTXh4UGY2YVA2eUdNMXR5b0ZpUEphRzFsRHBWWEM4RWtz?=
 =?utf-8?B?REVucjJQTzlOYmtYUEM3NUJ0Z0dOT1Jla2NuVVpBM056azlXYWFJdjdwd3h6?=
 =?utf-8?B?dlppUGZySHg3b0l4d0I4VFg2UWsxNEs4MXptWTdwVTN0a21zd21WWThyclp2?=
 =?utf-8?B?VDFXb08vUE1sVWNCQk16WkFRQVBDc2h6U1JSQmxmVnJpSHhtQ1J4dTJGQnNU?=
 =?utf-8?B?bGlneVJKTnZkZXorU0k5NlpLU0xZeW9ka21zR1lZR2hoR1VPQWx1SDUxK2gv?=
 =?utf-8?B?V1YyMjVpeGNxSXI5UFNuRkVzbnpEWHZKTTMwR2RKQ0RZNE5ZUkVvQ1ptdzlL?=
 =?utf-8?B?N1V5Q1hCTkJkSEliTlo1b1FFWTA4ZGxPVU8wWmliZnBYckJLMkpOUXFjdDU1?=
 =?utf-8?B?cFdvNWdhT2FiT2QyZnNVNTE4WHFQVldMZS9ERGQycjlNWmRIaFpGVWFYbjdJ?=
 =?utf-8?B?ZVB1UEZPdXlNWmFyZGhSNW16b0IxQmlKZFc2endNL1cvb3JzdklYRk9nK3pV?=
 =?utf-8?B?ZEUxSlQ4K1ZWdHRiam1ib1VvZWlJT3ZhQzZpTEgxb05pZUlOZDk1ZGRVengv?=
 =?utf-8?B?c3lmRnowT0UyM3RzM3h2SWdZWFpBUTBacEZJNXZHQnpmbi9WL0p5d201Znp0?=
 =?utf-8?B?UXBaekgzRUxySTVXVXIwclgyV3VIby9ldk9CbVR5WWJXdVA4aDFUSFZRbWE5?=
 =?utf-8?B?SnZTbjRYSktERGJPM1J0K1cxd3l2NUhmaTgxOWRjTmFNODU0dEg2UVpod1Vm?=
 =?utf-8?B?aDRCSTVOYVRKamJxL2thOGFDZm9TTWE4S3dBYTF4Rm5KNjNta1pkZ3U5L1pa?=
 =?utf-8?B?SzcyQnJzL2h2Qy8zakRnYk9Icy8vNmJoaUZpVG1HUXdGTlN0UG5NYi8va3pK?=
 =?utf-8?Q?dR6hs40UixObSp4VcbgTbgI=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0b792864-bb9b-4ec6-4e0f-08d9fcfe7204
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 10:13:21.5819
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: ocWy1NVK5PySaHDXsqe1+5YX+YgaeeauDD5g++K8lZph4PEEEW2gAnAGJvUdJgi04TtBVrl2eF1f3Hh2AWnI1Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB8781

On 03.03.2022 11:03, Jan Beulich wrote:
> While going through their 5.15.3 log I did notice two changes, which made
> me go check what else we might be missing. The series here is the result.
> Linux has also updated zstd, but that includes a pretty large change which
> I'm not ready to deal with right now. Them moving closer to the upstream
> zstd sources is certainly a good thing, so I suppose sooner or later we
> will want to follow them in doing so.
> 
> The only change in v3 is the re-adding of some previously dropped S-o-b in
> patches 2 and 3, to satisfy the rules newly established by 5e326b61693c.
> 
> As the series has R-b by Luca and as the (not) retaining of certain tags
> was the only open issue in v1 and v2, I won't wait long until committing
> this; perhaps just until after the weekend.

I did notice only when already in the process of sending that I should also
have converted to the new Origin: tag. I've done this locally, but won't
resend just for this.

Jan

> 1: xz: add fall-through comments to a switch statement
> 2: xz: fix XZ_DYNALLOC to avoid useless memory reallocations
> 3: decompressors: fix spelling mistakes
> 4: xz: avoid overlapping memcpy() with invalid input with in-place decompression
> 5: xz: fix spelling in comments
> 6: xz: move s->lzma.len = 0 initialization to lzma_reset()
> 7: xz: validate the value before assigning it to an enum variable
> 
> Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:14:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:14:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282956.481828 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiU3-0007E3-K4; Thu, 03 Mar 2022 10:14:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282956.481828; Thu, 03 Mar 2022 10:14:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiU3-0007Dw-Gm; Thu, 03 Mar 2022 10:14:55 +0000
Received: by outflank-mailman (input) for mailman id 282956;
 Thu, 03 Mar 2022 10:14:53 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=AhVD=TO=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nPiU1-0007Dg-S3
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:14:53 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c4324fc5-9ada-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 11:14:52 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 6E18221107;
 Thu,  3 Mar 2022 10:14:52 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 3DEDD13AB4;
 Thu,  3 Mar 2022 10:14:52 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id LhyrDRyVIGIlfAAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 03 Mar 2022 10:14:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c4324fc5-9ada-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646302492; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=VpO1IJuSqaeaIl4HygU4uDzL2FG7IDZY6MwPuuLq3pY=;
	b=Ywer96wwwEcL98fwgMhxZYOblo4iiDO1rj7XpeztxjNSnr1Fp8FFn8DuKYfZaOxfwBabZ5
	tHk4DjMBugGRZvKrV72Nms6FrIrmb0RX3/HFiDvBQfCSX+85hNT6cRs8f2/qaf74Qg/9hv
	0x3ZQRfpV0Q/uIxoN70Pr85g4xjPILM=
Message-ID: <78e6dc12-9406-743c-1fe2-4214483f08fb@suse.com>
Date: Thu, 3 Mar 2022 11:14:51 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
From: Juergen Gross <jgross@suse.com>
Subject: Re: [PATCH RFC] xen/sched: Optimise when only one scheduler is
 compiled in
To: Andrew Cooper <andrew.cooper3@citrix.com>,
 Xen-devel <xen-devel@lists.xenproject.org>
Cc: Jan Beulich <JBeulich@suse.com>, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?=
 <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
 Dario Faggioli <dfaggioli@suse.com>
References: <20220303004015.17688-1-andrew.cooper3@citrix.com>
 <4270d03c-50a9-b1aa-dc2e-53e998153a6b@suse.com>
Content-Language: en-US
In-Reply-To: <4270d03c-50a9-b1aa-dc2e-53e998153a6b@suse.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------AyfTCQzMqRiZJ8xFP3I4mzX0"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------AyfTCQzMqRiZJ8xFP3I4mzX0
Content-Type: multipart/mixed; boundary="------------ytyEUoryB00be5tkmFLDCE00";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Andrew Cooper <andrew.cooper3@citrix.com>,
 Xen-devel <xen-devel@lists.xenproject.org>
Cc: Jan Beulich <JBeulich@suse.com>, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?=
 <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
 Dario Faggioli <dfaggioli@suse.com>
Message-ID: <78e6dc12-9406-743c-1fe2-4214483f08fb@suse.com>
Subject: Re: [PATCH RFC] xen/sched: Optimise when only one scheduler is
 compiled in
References: <20220303004015.17688-1-andrew.cooper3@citrix.com>
 <4270d03c-50a9-b1aa-dc2e-53e998153a6b@suse.com>
In-Reply-To: <4270d03c-50a9-b1aa-dc2e-53e998153a6b@suse.com>

--------------ytyEUoryB00be5tkmFLDCE00
Content-Type: multipart/mixed; boundary="------------P9qcsc8G8IY1L1ksrmMhDAk1"

--------------P9qcsc8G8IY1L1ksrmMhDAk1
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------P9qcsc8G8IY1L1ksrmMhDAk1
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----


--------------P9qcsc8G8IY1L1ksrmMhDAk1--

--------------ytyEUoryB00be5tkmFLDCE00--

--------------AyfTCQzMqRiZJ8xFP3I4mzX0
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIglRsFAwAAAAAACgkQsN6d1ii/Ey+o
Pwf+IFqKLO3lkbNjhfebOsb+N8jbPYIFrQ9EVSkRCN1n7z6XaGim3F9T+DLU6xg/ds+TLVmr1iSf
8cRHIRo2XY72Dzfh4QBMv2lGVVTSx3uyBK0fg2pIdIrZX0Jw5VzL0FA/JnevpyYbVt88CTL3o0Z0
R2PFDZ4/Ls6sfXkTx/Xz5FKZAu3+Py5vXM/hIs7PiGAzyUsR7VVgYy6FZ7SBMjSttY29inv7aha4
5Bbc/9kRJsVzH/4wmu3Tela+2K1Xmp7BeYpimWZaQRg788KSL2ONtL8jx8mwQOKkahy46JQVhOVO
n7AMu1x4sBGqlY/F4Rfpmmz3P44TztKQb33jin0m9Q==
=osSv
-----END PGP SIGNATURE-----

--------------AyfTCQzMqRiZJ8xFP3I4mzX0--


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:29:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:29:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282976.481851 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiiQ-0000xc-DK; Thu, 03 Mar 2022 10:29:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282976.481851; Thu, 03 Mar 2022 10:29:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiiQ-0000xQ-A4; Thu, 03 Mar 2022 10:29:46 +0000
Received: by outflank-mailman (input) for mailman id 282976;
 Thu, 03 Mar 2022 10:29:45 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPiiP-0000wq-3u
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:29:45 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d224897b-9adc-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 11:29:35 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2106.outbound.protection.outlook.com [104.47.17.106]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-18-3vD6Q7IiMjKUUupLRfXDHw-1; Thu, 03 Mar 2022 11:29:42 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR04MB6273.eurprd04.prod.outlook.com (2603:10a6:208:137::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Thu, 3 Mar
 2022 10:29:40 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 10:29:40 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d224897b-9adc-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646303383;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=zxdVnvz+c2SHHYvOs6cmyghwHudMHQTNZOW7jSknUPM=;
	b=hxqWsJKmyRwlUrGUsnTYJhuydhuVp2XoKQUnEMtgNVupNbhNlTfL1Syh9StTude1u1ZbNy
	6gVUOWk4KC35bWm6Bool/mfZPyEdlYoC/dyyhFxIo7HOd/2CMjmsWVnNkMfrX/OYlqjTpb
	2DAYWwAWE2p8e36b1w0KNYDOcPK3c8k=
X-MC-Unique: 3vD6Q7IiMjKUUupLRfXDHw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=aotuCZfEtHOKbD+70g3fzEHLJBiBdwnlF9eEKSuZzUFWHd+bp4K78yCTh4LRg5XaGiYLt8q6nilI6b8mxWrRomBxh+EQYiyOmbKNVzytOSCvTygb+/CaRceL4a+Bk/k4QwTovktfIz1KlcIB/7b3Sgvm302iz5bHPmcLxUsFWWNY70G76zi02MZlxpfFszufGw6OQePtf3YRxHQ4tXPcZ0LIVAkLvdocdHIX99FP5V+FkrApjEEn9YpY4S09sGXUg32pDpsftVTo8OJPS36ish4WhBfCHD+oC41oZ/uxLPzry5TwzDdE0jlu3zC/TAyoncsP83/Dkchnw6K50/Xw0g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=zxdVnvz+c2SHHYvOs6cmyghwHudMHQTNZOW7jSknUPM=;
 b=KQSmOf1YV0Z7H1h1Sk8uaxI+MISwNwZfJaNkI2dtTaUWfgJlyIXHUrxkn4IQ4ZhNsvbKT7sJLWxpnclis6STw2r4rzHclXi5qQfiBA/595wfG6EPuZ9fSm3X62UusPn+YOQKqE2I+pSBdg2/OMgKNFoxetfPSZ3bRZpSqYLrGmKW18XctB2WHsqgmqOvMkzCS1n/GiiSgvL4Kw/TieK41OIEwWo5m+zTmNaQGBnGb0psu0UgMjFPRnkyyHezWOKnMOqSEwhcKAyK1e3JTbNQ9kHHKj4AMfHv8TYf8KdxCLIgGyBAo5KOT5yC0MeCSEHbjjpZ97qHthsJAqqhNujb3Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <2d0bed19-bf52-e934-0a5a-c424ff6e4db0@suse.com>
Date: Thu, 3 Mar 2022 11:29:36 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [XEN PATCH v9 23/30] build,x86: remove the need for build32.mk
Content-Language: en-US
To: Anthony PERARD <anthony.perard@citrix.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 xen-devel@lists.xenproject.org
References: <20220125110103.3527686-1-anthony.perard@citrix.com>
 <20220125110103.3527686-24-anthony.perard@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220125110103.3527686-24-anthony.perard@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8P189CA0009.EURP189.PROD.OUTLOOK.COM
 (2603:10a6:20b:31f::19) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: eefa64ba-25d8-4431-d0ce-08d9fd00b959
X-MS-TrafficTypeDiagnostic: AM0PR04MB6273:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB6273D6BCD858F930F52C4ADEB3049@AM0PR04MB6273.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(38100700002)(36756003)(26005)(86362001)(186003)(2616005)(6916009)(54906003)(316002)(4326008)(66946007)(66556008)(6506007)(6666004)(6512007)(66476007)(8676002)(53546011)(6486002)(508600001)(31696002)(31686004)(2906002)(8936002)(5660300002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?bUQzcTBTZjI0U1BPZUxKakZ1T3BBaXhOd21uQ2ZQc2oxNlVsRnB0TC9TSTFl?=
 =?utf-8?B?aGp4YTFXbUplTmwvK21WQUFlZWJRS0I5aDQxNFZIY2M5b013d2ZMelZ5TjhM?=
 =?utf-8?B?Ry9ib0JHOVRlVUpxTGI0M0VDcW45MndiZDg0MVdmVmFrM2czbkE5NEZjbUMz?=
 =?utf-8?B?VXhJbm1Sak5lU3ZuZzZpZ0EyWmluTGpVaThUY2s1T3dxZ2VUT1NDb1hrZ0lO?=
 =?utf-8?B?MXdNS3pNV2VDWDNpeDY2dUY0K1lnTmV3UGh6U09sbS8wVkZ0bzNCZjlLUVBx?=
 =?utf-8?B?UENXbHlGb254YTZHK215dFo5YllQWVExSGFzdnloWnREM0dHNHpqVnFnQk9u?=
 =?utf-8?B?dHVXb3lGVHBKelVBR0kwS2RtR2ZyTFNVckErR0t3QjlmNXJTdHE5cUZMOXZP?=
 =?utf-8?B?eVpOUkxpYTVJcHJVNVNjTEhTY3NVdFJMYmJadWtvcU1GTU9pa25Va00xZ3Q1?=
 =?utf-8?B?SkZNU1RRS3BZK2VvT0o2a0w4TjFQRlNFTFFoUTBmbHpCNDM3bkVRMkJQSVpo?=
 =?utf-8?B?dHNIQnRiQWlmNDgraTNpY3p6cTBIcHNLTlRUcnM3RFN6Vmx6Qi90Nzh6dFMx?=
 =?utf-8?B?TU5yOHdvb3ZRaGJvVUUzSTlQUGRKYjdrc0YxT3BpcXQvUWlDcTZ1SklqMS9E?=
 =?utf-8?B?dGlZY0w1WVA3V3o4ekdJa09iSHljTXB6MERSRXIwN05jd2tEY2FrRC9jT2Uz?=
 =?utf-8?B?TER6RVpyR3ZLaXpQWkRMOXBqNWVtOXFDWGpCRy82aURWVFEwVVExUm8zYXNh?=
 =?utf-8?B?YVhMNmVmb0hLTzdaRHlyTnlmSEZHSjdNYStUbllSdDhpa0QvWWJLVEtCTkFW?=
 =?utf-8?B?QjBJTk1jeUI0OXZiNzF4WUludXd4ZUd3bzRpbmpvR2lzV3ZqV2tRMURNdzBC?=
 =?utf-8?B?ZFNFQ00yMTM1SUFGQzdZMTd1MVg1c1htMDd4dWN6b1o2YTBlSGxuVUhYVkdm?=
 =?utf-8?B?U1FLUWxGL3EvbFl5VUZBNG1tL2VocmxQcGxEWU1KOUNaWGUzYU13OWJIc3Ju?=
 =?utf-8?B?YTBLaUpISy85R2c4MnJPSlVlTlEwbzFoWk5uUFh5WUxKR1QrZHYxYjZpbEM3?=
 =?utf-8?B?Q1dMVVlmZVVGT1pJSmZ2Vkg4VHAwRmpCNXU1MjNTL0pteEJHaUdXa0tGcHkr?=
 =?utf-8?B?bm9EN2g4Q2pIaTMzMWpseXdJaUxCQm00dWdTOGF2ME4velRCVmdBUHUyekRF?=
 =?utf-8?B?QVBrT1JyZUt6RmdGRzZGZEVra3BJRDNQMDA1VmRDOUloWkdEdVNTcGJXSTBv?=
 =?utf-8?B?QmNiL2dneS90N3ZPVmtiSjRDNEtDOHh2WG90b08zL1g1cHhZT3J1MGRKLytJ?=
 =?utf-8?B?RkpSaEhOM0VHTTAwNVQvUGdBUmZVWmI3YlQraWlYeTl5SU9zejRJLzJoa3Nl?=
 =?utf-8?B?aVQ1ODNiS09uZG00SGJMN09SSzlScndIdWVsOXByd1lBWFEzeUdTLzYxTUk3?=
 =?utf-8?B?ZDc0TTZURUc4RTRDTmlld0hPakJIb0dyZllGaXJCZjNZRlpEUG45VE9LOGp3?=
 =?utf-8?B?R3QzMTRGMzU3RDg0WXRHQm4vNWNObFlPZTVuWVVpRWtteFU4clVYZ2NwTmR5?=
 =?utf-8?B?Z2I5bW5WdE1LaGNOWWJXUEphSmIwN0dEZmlGcEJTTkw2ZUs3eXNMZzM5dCtC?=
 =?utf-8?B?NHd6bTEvek1kWllRTlNCalpkYUx2bTFMc2xhNVliT0lnaWNTMHlGa3R2allG?=
 =?utf-8?B?Q3h5M1hFYVZMNVUycjg2ZDRCbUlrOFA4dkxrTzAzd3JuendyMmlwUHloZStu?=
 =?utf-8?B?NWl0eTZlczJva3FmblUxaDFaVnFZdXRiZEU4SG1mUFVTM3lMMm9nWm1HQ2pu?=
 =?utf-8?B?WU5jWThpekJ5d1dnZ1pXeXpLdnlHN0xQMTBjeU5XWGVGbkpsS1p0VSsvdW56?=
 =?utf-8?B?Zk5VRXMzSW5SYjVaeWZyUEtlK3RoV2FLajBGZ3VIbHlkeXpXMUZTYWlRQXBz?=
 =?utf-8?B?bHNKU2FFRTRUMC9RN1pNbDVxYStKeXhZbGlVNkRYZlA2SmJqNjk0MFMzaGpL?=
 =?utf-8?B?c3lPMSs3QUQvb1Q0c2Q0bGZDeUFFcVVmRldHcjV3SVZhVk9TbWFIR1MrWWM5?=
 =?utf-8?B?YUNsK2JSN1MxQVM0SXhaeCt0aXBWVU5NMmdkTmQvdlNLbkI4WkkzY0srUmRv?=
 =?utf-8?B?TmQ0UU12Z0swQThHT2JsOHc0WlJxZGhocklrSHlsWjI4dXhLWlJ5cDJKeGZi?=
 =?utf-8?Q?hN1kwMSMBT1H/0+lG+Pebes=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: eefa64ba-25d8-4431-d0ce-08d9fd00b959
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 10:29:40.2540
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: VF38fihEMc5MYy9jU3vgDlhrb0wQKgSLhCArNsReESm93cGFmpKA2qIJN96fAwtSQkE3oPsaIXXcW25YNuao+Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB6273

On 25.01.2022 12:00, Anthony PERARD wrote:
> Rework "arch/x86/boot/Makefile" to allow it to build both file
> "cmdline.S" and "reloc.S" without "build32.mk".
> 
> These will now use the main rules for "%.o: %.c", and thus generate a
> dependency file. (We will not need to track the dependency manually
> anymore.)
> 
> But for that, we need to override the main CFLAGS to do a 32bit build.
> We introduce XEN_TREEWIDE_CFLAGS which can be reused in boot/Makefile,
> and avoid the need to reparse Config.mk with a different value for
> XEN_TARGET_ARCH. From this new $(XEN_TREEWIDE_CFLAGS), we only need to
> change -m64 to have the 32bit flags. Then those are applied only to
> "cmdline.o" and "reloc.o".
> 
> Specifically apply the rule "%.S: %.bin" to both cmdline.S and reloc.S
> to avoid make trying to regenerate other %.S files with it.
> 
> There is no change expected to the resulting "cmdline.S" and
> "reloc.S", only the *.o file changes as their symbol for FILE goes
> from "cmdline.c" to "arch/x86//cmdline.c". (No idea why "boot" is
> missing from the string.) (I've only check with GCC, not clang.)
> 
> Signed-off-by: Anthony PERARD <anthony.perard@citrix.com>

Reviewed-by: Jan Beulich <jbeulich@suse.com>
with one question, just to be sure I understand things right:

> --- a/xen/arch/x86/boot/Makefile
> +++ b/xen/arch/x86/boot/Makefile
> @@ -1,25 +1,42 @@
>  obj-bin-y += head.o
> +head-srcs := cmdline.S reloc.S
>  
> -DEFS_H_DEPS = $(abs_srctree)/$(src)/defs.h $(abs_srctree)/include/xen/stdbool.h
> +nocov-y += $(head-srcs:.S=.o)
> +noubsan-y += $(head-srcs:.S=.o)
> +targets += $(head-srcs:.S=.o)
>  
> -CMDLINE_DEPS = $(DEFS_H_DEPS) $(abs_srctree)/$(src)/video.h \
> -	       $(BASEDIR)/include/xen/kconfig.h \
> -	       $(BASEDIR)/include/generated/autoconf.h
> +head-srcs := $(addprefix $(obj)/, $(head-srcs))
>  
> -RELOC_DEPS = $(DEFS_H_DEPS) \
> -	     $(BASEDIR)/include/generated/autoconf.h \
> -	     $(BASEDIR)/include/xen/kconfig.h \
> -	     $(BASEDIR)/include/xen/multiboot.h \
> -	     $(BASEDIR)/include/xen/multiboot2.h \
> -	     $(BASEDIR)/include/xen/const.h \
> -	     $(BASEDIR)/include/public/arch-x86/hvm/start_info.h
> +$(obj)/head.o: $(head-srcs)
>  
> -$(obj)/head.o: $(obj)/cmdline.S $(obj)/reloc.S
> +CFLAGS_x86_32 := $(subst -m64,-m32 -march=i686,$(XEN_TREEWIDE_CFLAGS))
> +$(call cc-options-add,CFLAGS_x86_32,CC,$(EMBEDDED_EXTRA_CFLAGS))
> +CFLAGS_x86_32 += -Werror -fno-builtin -g0 -msoft-float
> +CFLAGS_x86_32 += -I$(srctree)/include
>  
> -$(obj)/cmdline.S: $(src)/cmdline.c $(CMDLINE_DEPS) $(src)/build32.lds
> -	$(MAKE) -f $(abs_srctree)/$(src)/build32.mk -C $(obj) $(@F) CMDLINE_DEPS="$(CMDLINE_DEPS)"
> +# override for 32bit binaries
> +$(head-srcs:.S=.o): CFLAGS_stack_boundary :=

You overriding CFLAGS_stack_boundary but not object_label_flags is
merely because the latter has no (unwanted) effect on the compilation?

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:29:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:29:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282975.481840 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiiD-0000dY-4P; Thu, 03 Mar 2022 10:29:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282975.481840; Thu, 03 Mar 2022 10:29:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiiD-0000dR-0E; Thu, 03 Mar 2022 10:29:33 +0000
Received: by outflank-mailman (input) for mailman id 282975;
 Thu, 03 Mar 2022 10:29:31 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=++p5=TO=citrix.com=prvs=054f29298=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nPiiA-0000dL-T0
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:29:31 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id cd683717-9adc-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 11:29:28 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cd683717-9adc-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646303369;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=ROQqiSTlb9OyluAuhgdY19GjFJI/EbkNuVhfA5yV2Pg=;
  b=Abs7pVA4FyUhzGzY+HmERldfP3RyyV04NPdUsyDTNMF4KO3s2+AT8ddt
   X6GtAtnIUtMpeiWX2Wi8tB5wueVEZEmWQID7MIf3VyBFNXttBgwro1FYX
   yHzfHkqACKXTccl3dTSHgFB+j873rbXmi9lxftpMfheeR9TE4f3sJT3Iy
   o=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65375535
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:7CfdOK4TvtSyYm0wwLQZdgxRtCXHchMFZxGqfqrLsTDasY5as4F+v
 mRLDW2AP62LN2L1L4snPdvk8E4BuMLUnNcwHVNvrCk3Hi5G8cbLO4+Ufxz6V8+wwmwvb67FA
 +E2MISowBUcFyeEzvuVGuG96yE6j8lkf5KkYAL+EnkZqTRMFWFw0XqPp8Zj2tQy2YPhWFvU0
 T/Pi5a31GGNimYc3l08s8pvmDs31BglkGpF1rCWTakjUG72zxH5PrpGTU2CByKQrr1vNvy7X
 47+IISRpQs1yfuP5uSNyd4XemVSKlLb0JPnZnB+A8BOiTAazsA+PzpS2FPxpi67hh3Q9+2dx
 umhurSQRjlwO4bDnd9EQkd0CgFxbYle+bjudC3XXcy7lyUqclPpyvRqSko3IZcZ6qB8BmQmG
 f4wcW5XKErZ3qTvnez9GrIEascLdaEHOKs2vH16wC6fJvEhWZ3ZGI3B5MNC3Sd2jcdLdRrbT
 5REMmUyMU+dC/FJElcqMZ5ine2mvyHyLyV1hWjNopoZ8lGGmWSd15CyaYGIK7RmX/59jkue4
 27L4Wn9KhUbL8CEjyqI9Gq2ge3Clj+9X5gdfJWn8tZ6jVvVwXYcYDUUX1ampfiyimalRslSb
 UcT/0ITQbMarRLxCIOnBlvh/SDC7kV0t8ds//MSyA6zk6//7AOiX3laYidhZ4wCrM4xbGl/v
 rOWpO/BCTtqubyTbHuS8LaIsD+/URQowX8+iTwsFlVcvYS6yG0npleWF4s4Tvbp5jHgMWyom
 1i3QD4Ca6L/ZCLh/4Gy5hj5jj2lvfAlpSZlt1yMDgpJAu6UDbNJhrBEC3CGtZ6sz67DFzFtW
 UTofeDEtoji6rnXyUSwrB0lRu3B2hp8GGS0baRTN5cg7S+x3HWoYJpd5jpzTG8wbJpaI2O3P
 B6I5l4IjHO2AJdMRfUtC25WI553pZUM6Py/DqyEBjawSsIZmPC7ENFGOhfLgjGFfLkEmqAjI
 5aLGftA/l5BYZmLOAGeHr9HuZdyn3hW7TqKGfjTkkT2uZLDNSX9YepUbzOzghURsfrsTPP9q
 I0EaaNnCnx3DYXDX8Ug2dVLfABScCNiXsieRg4+XrfrHzeK0VoJUpf56bggZ5Zkj+JSkOLJ9
 Wu6QUhW1Bz0gnivFOlAQikLhG/HNXqnkU8GAA==
IronPort-HdrOrdr: A9a23:Ok0Mq6pH1qhMmqOl886TCncaV5uFL9V00zEX/kB9WHVpm5Oj+P
 xGzc526farslsssSkb6K290KnpewK4yXbsibNhcotKLzOWxFdAS7sSo7cKogeQVxEWk9Qy6U
 4OSdkGNDSdNykYsS++2njDLz9C+qjHzEnLv5an854Fd2gDAMsAjzuRSDzraXGeLDM2XqbRf6
 Dsgvav0gDQH0j/Gf7LYUXtMdKzxeHjpdbDW1orFhQn4A6BgXeD87jhCSWV2R8YTndm3aoi2X
 KtqX242oyT99WAjjPM3W7a6Jpb3PH7zMFYOcCKgs8Jbh3xlweTYph7UbHqhkF3nAjv0idprD
 D/mWZlAy1B0QKXQohzm2qq5+DU6kdq15Yl8y7AvZKsm72geNtwMbs/uWsQSGqm16NnhqAn7E
 sD5RPoi3IcZymw7RjV9pzGUQpnmVGzpmdnmekPj2ZHWY9bc7NJq5cDlXklW6voMRiKobzPKt
 MeRP00JcwmBW+yfjTcpC1i0dasVnM8ElOPRVUDoNWc13xTkGpix0UVycQDljNYnahNBqVs9q
 DBKOBlhbtORsgZYeZ0A/oAW9K+DijITQjXOGyfLFz7HOUMOm7LqZTw/LIpjdvaMqAg3d83gt
 DMQVlYvWk9dwbnDtCPxoRC9lTXTGC0TV3Wu7djDlhCy8rBrZbQQF++oQoV4ridSt0kc7jmZ8
 o=
X-IronPort-AV: E=Sophos;i="5.90,151,1643691600"; 
   d="scan'208";a="65375535"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=OQ1zrheGl2/cyhgHcRAXrNxXJ9DmpZbOf9LDkMfoY7lZdod4Lz45YG+WFSV3YbGo17SNbXgy5ie6CS+Dpqd4qh7vaMQps/1D9KeHiwAf1sjSRenQSFkEpaduYgd6TsovVYD0dJHRdgS1uA1ueMD4/6hC6WEDaTA+sHutuXVUm9XE5VQTi3qH19YtggSeeR7uheA5/OwiUW/JXRtXk/HLuh/iArSkG+cFKv0fdF+ngo5cC+FyKH0K8isHcH7t8eCZlyJhM+T8hD7q7Mxhj/TD5U7l6nY0qC8UsrqUVnq44RfQKGgqUZaWQsWhTJQcER/evgqJsDxhjaGerGhBwse9mw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ROQqiSTlb9OyluAuhgdY19GjFJI/EbkNuVhfA5yV2Pg=;
 b=aXLOu1nkdJZ8HwAVXC0Th3DvvgSG0n847SF2sFzeCE5R6SzkZMUFT9zh9Ytb4q0Bp/rQnydiomS9PNP7FDWX3TY+Bvi5q8NjAijbMNj+TA3VB0vOz+yW9lLgSGUlEFcj1ZylD66aNw6aLazOT7nnQU0H1O4Wg+794Q7wK7PpEY/NXD6aY9Z6kQtNdj6M+7rwiViHKtSvwVBRhGpldI1TN2bmWepB3QT2BTBRvK2A/4Uhjg9KyTZ47tTHH9otBgpridA8skMJus9yH0tL6dY5BJXfuc68+yCFP/yGaet5XWhwF4wBw9hJywv3dI1Gzpl9rlD0FiSdgGhUJu/MTLM5pQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=ROQqiSTlb9OyluAuhgdY19GjFJI/EbkNuVhfA5yV2Pg=;
 b=ZVbyAqVcgZfF6+0XTa4EhnPh/C0EXb2gIbQCKURsdI/XdB5ebOulxKszY7lUyQrFPstfByRjcswthnqr5lA41zO+oMnAtakiDOGHScbHevXpny5fzfzSnPLTxkJ1fUE4WGoUv4LEvI7cNDWXF30YaQQNKjGKMmm6J8T1mUIZCmU=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>, Xen-devel
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH] xen/CET: Fix __initconst_cf_clobber
Thread-Topic: [PATCH] xen/CET: Fix __initconst_cf_clobber
Thread-Index: AQHYLoJgAXApmKaYwEKz6VCRfhdKvKytRW4AgAAwoAA=
Date: Thu, 3 Mar 2022 10:29:18 +0000
Message-ID: <36e72452-1ae2-93b3-c5ba-88707dfe47a5@citrix.com>
References: <20220302221005.16636-1-andrew.cooper3@citrix.com>
 <8eb7d30e-32de-fdee-43c9-3500fb10e6ee@suse.com>
In-Reply-To: <8eb7d30e-32de-fdee-43c9-3500fb10e6ee@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 5d9f39a5-3230-4e6b-635f-08d9fd00ac87
x-ms-traffictypediagnostic: PH0PR03MB6315:EE_
x-microsoft-antispam-prvs: <PH0PR03MB631533C7B0C678012E5D03BFBA049@PH0PR03MB6315.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(53546011)(86362001)(6916009)(31696002)(54906003)(316002)(38070700005)(71200400001)(6506007)(6486002)(6512007)(508600001)(2616005)(45080400002)(8936002)(5660300002)(2906002)(66556008)(91956017)(66446008)(26005)(64756008)(66946007)(76116006)(66476007)(38100700002)(186003)(31686004)(36756003)(122000001)(82960400001)(4326008)(8676002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?Z0hqM253bTlFUmhVZ2dZeldNR01SY09nTTJyZTRJVEhzQWh3Z2RRU2luWHJH?=
 =?utf-8?B?bSt2dXBLeElURVRZZ25hYklyZW0wMjlNVFo3RjJSQ0RaZXZXN1djZWUyTUk4?=
 =?utf-8?B?VXplUytWcG96eTRJVXg5eXNCRkUrTGJHL0JXcXA5WStwMnI5S3hXbEdwYkEy?=
 =?utf-8?B?NUp4QTlXV1VVcDE2ZUl0bllkMldqZXQ0WXRZWlNCRnBKelIyVk93Q3BZNzl6?=
 =?utf-8?B?Uks4eGtwMFM2ZWIyQWUxVGN1RWhkaC8rL2hncWFyZnNBU3RNN2hDR2E2ZWla?=
 =?utf-8?B?RXFDeFVQZm9CMVZoTFZDRjBhQ0w1RzdWcnI2NW45R0lmbWs3NnkxdElDazJV?=
 =?utf-8?B?S0NveFZDZmhVcysyeFk2RWFrcGl3aE5QN29EWXA0cnhsTzdib25pb09XenFu?=
 =?utf-8?B?R1NXL21LUHFMTVFXbUtGYm4vakhTSFJDcTlHSW5QNzZCbDB5ZzFKQ0NreHM3?=
 =?utf-8?B?S2dlYzZROHFzcFBHWjFDTi93c0dtWWw3VFREZDNjZUZjNElRcjNDMHZpRy9W?=
 =?utf-8?B?dFdZNHlOczNXTk9tM2VqRGVYd3JjK0Y5dkVWWDUwTXhBdjR4MC9aZDlaVjB0?=
 =?utf-8?B?RUlBaXcyUndpREpNWXlidEFkcml0TitpUnZIUWxLbDNYT3FGUmR4VWlZSEx5?=
 =?utf-8?B?Z2paMDh4T1NzTlpnMzBqaVM1YzZxUnludTFGMDIwKy8xWS9NUDlhNlZHOEhG?=
 =?utf-8?B?TDJPdFl6Um9yNzdrRVh2bWluMGxEU0JJVXZxek9lREVVaWtWdFJsdjdaMzdW?=
 =?utf-8?B?aG1vZEV2bHkvS1lmeUtubWZkNjU1K09IWjg4b3V1eFNTL29lTnloMSsvZjNL?=
 =?utf-8?B?WGl5SDRIZmVrRUlSb2V2K2VsNmpqNldVUS9NQ3Fob2hPNHpIL1luWjcreVpy?=
 =?utf-8?B?WXpzRU5ySGw0NHd3TFlPZHVmVDR3OWIveFA2dEhMSWNyQ0trRzlQc2tKSmVQ?=
 =?utf-8?B?c0NIUjNvRkQrbzVEL1FSaHUwOENGNjRuRHFvOTZsNzhuRmQySmRHSm5DRHdo?=
 =?utf-8?B?aDhibHp6TUl0dFQxbTloQyszSXg0cUlqSmZLT0dwTmwyWk9XbEE0cWg1K1cv?=
 =?utf-8?B?M1lkRjlLdVVyUGFGRVhVRUZpeUd2NTVvWUVidzh2UFA4NFBzVUF4L24wa0xO?=
 =?utf-8?B?MHkvUXgwYUNpdndWOHEwTFNUZXpISk5GL2ttSDYvZU9WbHorWkNlVzFMVGM5?=
 =?utf-8?B?WVZKMHZKTHlpVE94U1czMnBDWU5KZHdpUnhQbjk5MUtpTXBLV09qbFBNTnNJ?=
 =?utf-8?B?ZURWNndRVVh4U0FMaWxIMnlnRVZjR0t5UnRPeFlBWlQxRE9HaEV2ZURHdWJY?=
 =?utf-8?B?cHhRZTBBdUVLSzE0Z0dLd2J5QWNYaDcrb2N6MHNSelNDaFVOMmdFLzFHRTAz?=
 =?utf-8?B?bFFZTEpUUmdVVE8vNjEySmtCK2tqdW1CcjhiODhIK2VqaHdsL2xIdnVFTDZl?=
 =?utf-8?B?K2V5dDI2bGVIM1BuV2pHcGtNSnlaWXR2MEY0SFNGbmlqK0pDWkNxaHVMZlZZ?=
 =?utf-8?B?S0NXeS96QTNmNGc1SkVJa08xU0VqS09ZMVVCVmpxdTdHYXNYTmlGbmxLdGhF?=
 =?utf-8?B?NU1RQ3RSTFN0WmMvZHVFYWt4R3BubndOUjdOV3kzWnl3TUp6ckdPZlhsU05M?=
 =?utf-8?B?bEptaHZyTVZWa0MxMkhnVDA1TkpVcnBiWVVldSs5SlpxNTdxa3NsYkJtOXNu?=
 =?utf-8?B?S2pkcDU1VnlneE5UTTJ0dDBDQmJESHN6ZzNaL3ZGeWFGaEUrMzBmVjJ3RlJB?=
 =?utf-8?B?cU5CVUJhMWlaNGttSFBZcDQyR0NvWGlSMW9XMDFOS1RFVThvTE9zT3EyTi83?=
 =?utf-8?B?bVhsckU4TS9Rcm9uZGRYUENBRjBDc3haWEZSajlobVlZYTBZSUthUTBmY3Yv?=
 =?utf-8?B?ZDc2YlJxMzRmUmJzK1NwUkUzRkFWb1hCN3YrQTRmRzgydTVwYi9QcDY3WWlT?=
 =?utf-8?B?RDJRYUtrRXBEbFNTU2NGY2wwblBBNDJEWjNHb0d1RFNIam9HdFhXTmtrZU1v?=
 =?utf-8?B?aGhOSzdkUXFNY3BOV2d0dGhvYjhkeG02L2lHT1BBeUtzTGw5T2h6SmZ2UUhC?=
 =?utf-8?B?RDhXRFlHUXJ3Qi93eHpvWFMzb3YvVTRLZGdWZGdwWFBPRlFOeHhJQy91L1Jk?=
 =?utf-8?B?QXYvNE9MVVd5eWRDSEpzMzZsUE1qK2twc0Nsc21BSXhVWURlOVI0cE9DSSta?=
 =?utf-8?B?eTFYWUtYZENOSmUzVXF6Q0ZycENuamtiNjBjMGFob3REL3poUGZwZW1LcmVB?=
 =?utf-8?B?dGFSakFuRnhKUitMV3pHUmxKeHlnPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <2D9516F74857024E808A87FB5021D26B@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5d9f39a5-3230-4e6b-635f-08d9fd00ac87
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Mar 2022 10:29:18.4923
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 13G6Vu/X/fTgbA7J21XZiRDGYG2g7hH3BJZZm6eKFNspKo5nfJZ10z1fx7lhW6R1C6PEjy5rl7mVdiY9JTi6iOGJHG2G+vuOjswbD55ak/c=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR03MB6315
X-OriginatorOrg: citrix.com

T24gMDMvMDMvMjAyMiAwNzozNSwgSmFuIEJldWxpY2ggd3JvdGU6DQo+IE9uIDAyLjAzLjIwMjIg
MjM6MTAsIEFuZHJldyBDb29wZXIgd3JvdGU6DQo+PiBUaGUgbGlua2VyIHNjcmlwdCBjb2xsZWN0
aW5nIC5pbml0LnJvZGF0YS4qIGFoZWFkIG9mIC5pbml0LnJvZGF0YS5jZl9jbG9iYmVyDQo+PiBh
Y2NpZGVudGFsbHkgY2F1c2VzIF9faW5pdGNvbnN0X2NmX2Nsb2JiZXIgdG8gYmUgYSBuby1vcC4N
Cj4+DQo+PiBSZWFycmFuZ2UgdGhlIGxpbmtlciBzY3JpcHQgdG8gdW5icmVhayB0aGlzLg0KPj4N
Cj4+IFRoZSBJT01NVSBhZGp1c3RfaXJxX2FmZmluaXRpZXMoKSBob29rcyBjdXJyZW50bHkgdmlv
bGF0ZSB0aGUgc2FmZXR5DQo+PiByZXF1aXJlbWVudCBmb3IgYmVpbmcgY2ZfY2xvYmJlciwgYnkg
YWxzbyBiZWluZyBfX2luaXRjYWxsKCkuDQo+Pg0KPj4gQ29uc29saWRhdGUgdG8gYSBzaW5nbGUg
aW5pdGNhbGwgdXNpbmcgaW9tbXVfY2FsbCgpIChzYXRpc2Z5aW5nIHRoZSBjZl9jbG9iYmVyDQo+
PiBzYWZldHkgcmVxdWlyZW1lbnQpLCBhbmQgYWxzbyByZW1vdmVzIHRoZSBkdWJpb3VzIHByb3Bl
cnR5IHRoYXQgd2UnZCBjYWxsIGludG8NCj4+IGJvdGggdmVuZG9ycyBJT01NVSBkcml2ZXJzIG9u
IGJvb3QsIHJlbHlpbmcgb24gdGhlIGZvcl9lYWNoXyooKSBsb29wcyB0byBiZQ0KPj4gZW1wdHkg
Zm9yIHNhZmV0eS4NCj4+DQo+PiBXaXRoIHRoaXMgZml4ZWQsIGFuIGFsbC1lbmFibGVkIGJ1aWxk
IG9mIFhlbiBoYXMgMTY4MSBlbmRicjY0J3MgKDE5MTgNCj4+IGluY2x1ZGluZyAuaW5pdC50ZXh0
KSB3aXRoIDM4MiAoMjMlKSBiZWluZyBjbG9iYmVyZWQgZHVyaW5nIGJvb3QuDQo+Pg0KPj4gU2ln
bmVkLW9mZi1ieTogQW5kcmV3IENvb3BlciA8YW5kcmV3LmNvb3BlcjNAY2l0cml4LmNvbT4NCj4g
VGhpcyB3aWxsIGRvIGZvciB0aGUgaW1tZWRpYXRlIHB1cnBvc2UsIHNvOg0KPiBSZXZpZXdlZC1i
eTogSmFuIEJldWxpY2ggPGpiZXVsaWNoQHN1c2UuY29tPg0KDQpUaGFua3MuDQoNCj4+IC0tLSBh
L3hlbi9hcmNoL3g4Ni94ZW4ubGRzLlMNCj4+ICsrKyBiL3hlbi9hcmNoL3g4Ni94ZW4ubGRzLlMN
Cj4+IEBAIC0yMTAsNiArMjEwLDEyIEBAIFNFQ1RJT05TDQo+PiAgICBERUNMX1NFQ1RJT04oLmlu
aXQuZGF0YSkgew0KPj4gICNlbmRpZg0KPj4gIA0KPj4gKyAgICAgICAuID0gQUxJR04oUE9JTlRF
Ul9BTElHTik7DQo+PiArICAgICAgIF9faW5pdGRhdGFfY2ZfY2xvYmJlcl9zdGFydCA9IC47DQo+
PiArICAgICAgICooLmluaXQuZGF0YS5jZl9jbG9iYmVyKQ0KPj4gKyAgICAgICAqKC5pbml0LnJv
ZGF0YS5jZl9jbG9iYmVyKQ0KPj4gKyAgICAgICBfX2luaXRkYXRhX2NmX2Nsb2JiZXJfZW5kID0g
LjsNCj4+ICsNCj4+ICAgICAgICAgKiguaW5pdC5yb2RhdGEpDQo+PiAgICAgICAgICooLmluaXQu
cm9kYXRhLiopDQo+IEkgd29uZGVyIGlmIHRoaXMgc2hvdWxkbid0IHJlYWxseSBiZSB0d28gc2Vj
dGlvbnMuIExpdmUtcGF0Y2hpbmcgd2lsbA0KPiBuZWVkIHRvIHN1cHBseSB0d28gcmFuZ2VzIHRv
IGFwcGx5X2FsdGVybmF0aXZlcygpIGFueXdheSAob25lIGZvciBlYWNoDQo+IHNlY3Rpb24sIHVu
bGVzcyB5b3Ugd2FudCB0byBzdGFydCByZXF1aXJpbmcgdG8gcGFzcyBhIGxpbmtlciBzY3JpcHQg
dG8NCj4gIiQoTEQpIC1yIiB3aGVuIGdlbmVyYXRpbmcgbGl2ZSBwYXRjaGVzLCBqdXN0IHRvIGZv
bGQgdGhlIHR3byBzZWN0aW9ucyksDQo+IHNvIGluIHRoZSBjb3JlIGh5cGVydmlzb3Igd2UgbWF5
IHdhbnQgdG8gZm9sbG93IHN1aXQuDQoNCkkgZG9uJ3Qgc2VlIHdoeSBsaXZlcGF0Y2hlcyB3b3Vs
ZCBuZWVkIHR3byBzZWN0aW9ucyAtIHRoZXkncmUgbGlua2VkIGluDQphIHNpbWlsYXIgd2F5IHRv
IFhlbiBJSVJDLsKgIEVpdGhlciB3YXksIGlmIGNoYW5nZXMgYXJlIG5lZWRlZCwgdGhleQ0Kc2hv
dWxkIGJlIHBhcnQgb2YgdGhlIGxpdmVwYXRjaCB3b3JrLg0KDQo+PiAtLS0gYS94ZW4vZHJpdmVy
cy9wYXNzdGhyb3VnaC94ODYvaW9tbXUuYw0KPj4gKysrIGIveGVuL2RyaXZlcnMvcGFzc3Rocm91
Z2gveDg2L2lvbW11LmMNCj4+IEBAIC00NjIsNiArNDYyLDEyIEBAIGJvb2wgYXJjaF9pb21tdV91
c2VfcGVybWl0dGVkKGNvbnN0IHN0cnVjdCBkb21haW4gKmQpDQo+PiAgICAgICAgICAgICAgbGlr
ZWx5KCFwMm1fZ2V0X2hvc3RwMm0oZCktPmdsb2JhbF9sb2dkaXJ0eSkpOw0KPj4gIH0NCj4+ICAN
Cj4+ICtzdGF0aWMgaW50IGNmX2NoZWNrIF9faW5pdCBhZGp1c3RfaXJxX2FmZmluaXRpZXModm9p
ZCkNCj4+ICt7DQo+PiArICAgIHJldHVybiBpb21tdV9jYWxsKCZpb21tdV9vcHMsIGFkanVzdF9p
cnFfYWZmaW5pdGllcyk7DQo+PiArfQ0KPj4gK19faW5pdGNhbGwoYWRqdXN0X2lycV9hZmZpbml0
aWVzKTsNCj4gSSBhc3N1bWUgaXQgaXMgaW50ZW50aW9uYWwgdGhhdCB5b3UgZGlkbid0IHJlLXVz
ZSB0aGUgaW5saW5lIHdyYXBwZXIsDQo+IHRvIGF2b2lkIGl0cyAodGhlbiBub24tX19pbml0KSBp
bnN0YW50aWF0aW9uIHRvIHN0YXkgd2l0aCBhbiBFTkRCUi4NCj4gWWV0IHRoZW4geW91IGNvdWxk
IGF0IGxlYXN0IF9jYWxsXyB0aGF0IHdyYXBwZXIgaGVyZSwgaW5zdGVhZCBvZiBvcGVuLQ0KPiBj
b2RpbmcgaXQuDQoNCk5vIC0gdGhhdCB3YXMgdW5pbnRlbnRpb25hbC7CoCBJIG9ubHkgbWVyZ2Vk
IHRoZSBpbml0Y2FsbHMgbGF0ZSBkdXJpbmcNCmRldmVsb3BtZW50IGFuZCBmb3Jnb3QgdGhlIHdy
YXBwZXIuDQoNCkkndmUgYWRqdXN0ZWQgdG86DQoNCi3CoMKgwqAgcmV0dXJuIGlvbW11X2NhbGwo
JmlvbW11X29wcywgYWRqdXN0X2lycV9hZmZpbml0aWVzKTsNCivCoMKgwqAgcmV0dXJuIGlvbW11
X2FkanVzdF9pcnFfYWZmaW5pdGllcygpOw0KDQoNCj4gQW5kIEkgZnVydGhlciB0aGluayB0aGUg
aW9tbXVfZW5hYmxlZCBjaGVja3Mgc2hvdWxkIG1vdmUgb3V0DQo+IG9mIHRoZSB2ZW5kb3IgZnVu
Y3Rpb25zLCBwbHVzIHRoZSBob29rIGFsc28gaGFzIG5vIG5lZWQgYW55bW9yZSB0byBoYXZlDQo+
IGEgcmV0dXJuIHR5cGUgb2YgaW50LiBJIGd1ZXNzIEknbGwgbWFrZSBhIGZvbGxvdy1vbiBwYXRj
aCBpZiB5b3UgZG9uJ3QNCj4gd2FudCB0byBmb2xkIHRoaXMgaW4gaGVyZS4NCg0KWWVhaCwgSSdk
IHByZWZlciBub3QgdG8gZm9sZCBjbGVhbnVwIGludG8gdGhpcyBidWdmaXgsIGJ1dCB0aGVyZSBh
cmUNCmNlcnRhaW5seSBpbXByb3ZlbWVudHMgdG8gYmUgZG9uZS4NCg0KfkFuZHJldw0K


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:31:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:31:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282987.481862 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiju-0002YQ-Qq; Thu, 03 Mar 2022 10:31:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282987.481862; Thu, 03 Mar 2022 10:31:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiju-0002YJ-NR; Thu, 03 Mar 2022 10:31:18 +0000
Received: by outflank-mailman (input) for mailman id 282987;
 Thu, 03 Mar 2022 10:31:17 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=PW1S=TO=citrix.com=prvs=05474af58=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nPijt-0002Y7-E2
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:31:17 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 08758ee8-9add-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 11:31:07 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 08758ee8-9add-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646303476;
  h=from:to:cc:subject:date:message-id:
   content-transfer-encoding:mime-version;
  bh=u1nd5gvGbjy+WiLF63/Nct6n2DffloJttn3jhHYx47g=;
  b=PzVfJuMys6uu6+jsitZkprZqFN05eq/beZuSagCNPnaZmfsLwHwh5819
   0vxO5ZYOzSCNXPzd6WLJdxKdOZKeMwmNU9uZeo/wT5hEOlOtwWKRRnIfr
   Dv95rNk9w8WbDyOydjxcvzrNv8q1Gdj8E3akbUAI3LpPqTIU2PPuV0kEo
   s=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65375631
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:FssWb6tfSfitXYAfObh+uUxt0efnVGheMUV32f8akzHdYApBsoF/q
 tZmKTyBPK7bMGT9ctEjbYqxpk5S6p/VmtFhHlZr+3xjRi8V+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jV4
 ouryyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi8uJIDyyOJAQiJdPAxVB4NA6aCdAn+w5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AO
 pFGNGQ0NXwsZTVgMEYzVIARs9yYoWnadGYI826L/u0etj27IAtZj+G2bYu9lsaxbd5Ogk+Sq
 2bC/mL4KhIXLtqSzXyC6H3ErvDLtTP2XsQVDrLQ3vx3hFyewEQDBRtQUkG0ydGph0j7V99BJ
 kg8/is1sbN05EGtVsP6XRCzvDiDpBF0c9haHvA+6QqN4rHJ+AvfDW8BJgOtc/R/6pVwH2Zzk
 AbUwZW5XlSDrYF5V1qa7Jqq/TXvKBMQAkIpXwECXBRfwN7s9dRbYg30cv5vF6u8j9vQED72w
 iyXoCVWu4j/nfLnxI3gowmZ3mvESozhC1dsu16JBj7NAhZROdb9D7FE/2Q3+hqpwGyxalCa9
 EYJlMGFhAzlJcHczXfdKAnh8VzA2hpkDNE+qQM3d3XC3270k5JGQWy2yGskTKuOGpxZEQIFm
 GeJ5WtsCGZ7ZRNGl5NfbYOrENgNxqP9D9njXf28RoMQPsYrKFHbrXoxOBf4M4XRfK4Ey/tX1
 XCzK5vEMJrnIf4/kGreqxk1i9fHORzSNUuMHMumnnxLIJKVZWKPSKdtDbd9RrtR0U9wmy2Mq
 4w3H5LTk313CbSiCgGKod97BQ1bdhATWMGpw/G7g8bee2KK7kl6UKSPqV7gEqQ495loehDgp
 SnsChcFkwOk3RUq62yiMxheVV8mZr4mxVoTNi0wJ1e4nX8lZIek9qAEcJUrO7Ig8YReITRcF
 pHpp+3o7ixzdwn6
IronPort-HdrOrdr: A9a23:NfgrAK7QoW4d3fdejAPXwT6BI+orL9Y04lQ7vn2ZFiY7TiXIra
 yTdaoguCMc6AxxZJkh8erwXJVoJkmsj6KdgLNhRotKOTOJhILGFvAF0WKP+UyDJ8SczJ8j6U
 4DSdkGNDSYNzET5qybkWqF+r4bsaW6GcuT9IDjJhlWPGRXg/YK1XYFNu/XKDwBeCB2Qb4CUL
 aM7MtOoDStPVwRc8SAH3EAG8zOvcfCmp7KaQMPQ0dP0njHsRqYrJrBVzSI1BYXVD1ChZ8k7G
 j+igT8ooGuqeuyxBPw33Laq75WhNzi4N1eA9HksLldFhzcziKTIKhxUbyLuz445Mmp9VYRid
 HJ5ywtOsxigkmhC12dkF/I4U3NwTwu43jtxRuzmn34u/H0Qzo8Fo5omZ9ZWgGx0TtsgPhMlI
 Zwm06JvZteCh3N2A7n4cLTah1snk2o5VI/jO8oiWBFW4d2Us4akWUmxjIbLH48JlO11Gh+e9
 MeTf00pcwmOm9yVkqp8lWGm7eXLzQO9hTveDlxhiXa6UkUoJlD9Tpo+CUupAZ/yHsDceg12w
 29CNURqFhvdL5jUUsvPpZ3fSOIYla9Mi4kdljiY2jaKA==
X-IronPort-AV: E=Sophos;i="5.90,151,1643691600"; 
   d="scan'208";a="65375631"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=PI0VD1KwhMfC/8lT5nXQRvW0q9T9sQ8wuPPooLclMBLiwwGHRKjuorhTPw2o92kcXiT9XAQap6ouO29NFxdGMsAN9VOl7wOZy5D+UZzc2hT20cdK9hDsaMMfaPsQ0ken+NJWnwadJRyuRPHoy/N1SstijEqzYMyaoen3VVQ0ppldfTVNI8M4rLlem4DXlmi//Nbgi+Nx1Or28oy7Byql9/dUH55ketUkbF61asw0kHQ2r2j+PFE+Ve9IeEnzxqQFZTjZqVz36vtzQ3GCm28/jMhL8Njw9XEQnw8GJf+DtrlVlVhZK0T4pWYy3KrR0iGe01ZNo7QBX7MDmm3oJgQylQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=mGede6jiblrepqQgzTK2pMH5xd5so27Xbwf7i1RSg7o=;
 b=F0gblp88+cqX1EQDib10Od3Egmn1Q9YluJT8+b+4MqyBSc+4Gv8yLvKZuEWeaUnaMoi01j+kPHjRw4MSKGr5noOZkzpTFl9bQjF9u3DcaqJGmEQJZApECR2sgU6NceFwk78ewcSvRi3uCQlsmrdJVs4hoiAkzoi29cq0DJ/fDWEqKvGlGrfSSnPDV7hUTRRC6NPTcc8eV7tJRnXxuQ017eErXU3PLeZRmp8cbPZQsHtNIycwofTyVUqvmTetWoJEU6rFe7PNt77G7NcSzLKUzotCSpQ9Z4zgTP1bFaqTwaCioiZ871ISio7Nl+e4xD5Mk/wHUG1nfykPcy1oeJYrpQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=mGede6jiblrepqQgzTK2pMH5xd5so27Xbwf7i1RSg7o=;
 b=mPWLWt9fREZ0dQH6/UHTZtl7sUwblsx9iOPkOG3UFzeI5WcUg2q3NP7jx2mEwDr+TRhUzyy6yp7/WSUIyoI1gLait7VDSH4U+l1i4tzRrdjoJaF8uThRxfvVwjXOLZ8S1q62vVQ7eZmo4plhE9kh7wOr1+KK7yezT+idzWii6Wg=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, Jan
 Beulich <jbeulich@suse.com>, Julien Grall <julien@xen.org>, Stefano
 Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
Subject: [PATCH 0/3] x86/hvm: PIRQ related cleanup and a fix
Date: Thu,  3 Mar 2022 11:30:54 +0100
Message-ID: <20220303103057.49181-1-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO4P123CA0164.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:18a::7) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 80590738-c158-45ea-ebdd-08d9fd00eedd
X-MS-TrafficTypeDiagnostic: SN6PR03MB4464:EE_
X-Microsoft-Antispam-PRVS: <SN6PR03MB4464EF01191760DD3E4C6D458F049@SN6PR03MB4464.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: RRh/SU7gvOOaR6lS27aZvfX65jWGWG+CTBsCEVMugXQHPM3qLN0O6Oypz1gq1nvqhoS7olywKKHO5HMjmV9a46DpJcmOqkuWM+Eqk4Tr5R95F6Wv0lgwJ1jfy8m8Tk8R/rjQhaYDb74l28ABmAQj9pqKPDAWnuZzCaeZGlYZQDv+Yyl31bTFSIW5pPpJP2kN1usD/1uVwhOpcFo8TBL6HAlxM6usW0bPs4zIQNk0t5XDoLBdCEFFWdHO7a9lEv43k7ssZ6mYnPVVzBVfJ7hwv/uMrJ1h+PsB48ncwUGg7MeYXBkn5W69zbSAJelNiYsj9ThzJ1faWpBgobyoe7CuhxHq3SSoj2PUWuMpFJ665M4VyIyGWhydxVrT/bs5pEAFhhxkNojS73unh4VM2GKYVoIt6vTM7BA5bHrrRJPfxG8jMQJWwryexG+YTDptc5q6sEqvxMXH8oSzOFeYzlOEdlkSVyTGAmKZvlBhXfRjMJWshuluEcyBMYnv/32DxfYs8YCOpd9sJgzCYus1msf6QXx9UY83mdaGBon2vPOgiDXfYAvb5nRsX2HkstVKlghMgfWF0zurxJt+MudXG2nY5ej9yA6uu+DaZpzvFqNnDfKPIxI3VkMEIG443OCiDte6rAZ31qlpbcDGIKM9oWZU9Q==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(66556008)(66946007)(66476007)(8676002)(4326008)(86362001)(4744005)(8936002)(5660300002)(82960400001)(38100700002)(2906002)(26005)(186003)(1076003)(2616005)(6486002)(6506007)(6512007)(6666004)(508600001)(6916009)(54906003)(316002)(83380400001)(36756003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?akpYQm4wYTlLWGVGOFBXM3lnKy9YY0RnYjNhc2U1R1liL2dtOTYvMi9aN2Qv?=
 =?utf-8?B?QURNM0ZiZGRZemZQUkF0U2xNNGs1cFR2ZEtKang1UUVqYlhBMGRTY0xKWmFj?=
 =?utf-8?B?N2NheXUvWHBlbzBLRkROUHQzUG1Xa251ZlRWRm5IL2hmVUl0dXJUVFVtSFhj?=
 =?utf-8?B?K3BvQllWS2d6UkpHUllJTnFRcU00M1lWSlowR2V2dGpzSnA3Uk1telVwdWxW?=
 =?utf-8?B?UlhWM0I0cGxXbUJZZG5wYmJxQ2Flb3dqMGkwbFYwc1dCcUtBRUkwQzhVYy91?=
 =?utf-8?B?VW5Ncjd3RlVHaUEwMERvVDEyQUV4R3lpcWRjWmdkS2p1QzUwZG9DUElTM3FB?=
 =?utf-8?B?VGE4WDVSSlZVcnJ1TS9pVGVDeE53c1dBUkRvU0xXS3FoNUl0TlIzT0ZZbys0?=
 =?utf-8?B?bzF3ZUordnNEamF3ZDlWbDR3Z1JtbXNhclZjQlFrOVJocW1HU1RFekhmc1ND?=
 =?utf-8?B?Y2RqNWxWUXZNc2lKWGtnY3RPNFE5OGVVTTlCd3U3T0FTeUthYUtxdDZCSlpj?=
 =?utf-8?B?RUJLVE1NZk9HYVZONklUbTNTdExtNU1Cb2ZFZ3MzZmNWRmFrbEVWUzRUVEpm?=
 =?utf-8?B?Z1RBMWtyQmdEZWtBTk5UOW1kVy9lYndTVStodit2S1ZKc3JZVzMwVGM3VmtX?=
 =?utf-8?B?S3o5aFRTVXJ4QnowNjVBcWlLWHFzUmYxdWV1NGc5TzVTTndhZ1VvYXV1QlJR?=
 =?utf-8?B?eng5cU5TQWRXNjlMclFLcnIvRDhaSUI0UXlKUHVXb2RFMURXNWVXYWYrL3lC?=
 =?utf-8?B?d1JJTDY4SU1UVnd2ZEFkaXBKTmkxU2RraStDcldLZm5UeldBSTdHZE5oNGdM?=
 =?utf-8?B?QVFBWHVSWE90eXlKbkR0MDZMNTNWMkR3QW9zbDYxK3NjbWRSMVFENlk0VVVm?=
 =?utf-8?B?Sys1Q1EwbEtnc0lJTjBOaXJ2ZmtsTUtobDl5STJJMDljdGhiUlpramxGd3dQ?=
 =?utf-8?B?VGJySUZaWVpRbFp6U29kQm9wV1d4NXBGalJZWU50bkZTWGhUVVFCZkFralFP?=
 =?utf-8?B?bitsc3pRWnRQOXloWFdvYUJ6ZlM3MUtwYzY3NlhFcXhyTkxtb0w2bHFWYU52?=
 =?utf-8?B?WGlGVjRHRzRPa05PM3ordjFRaHJ5TnlYMzBrbSs2UGlmeUNQU0ZGOWZOeXB3?=
 =?utf-8?B?WEpONk10Y1NQRWlSL3daY0twT3JEeG9FUDNBZnhzOWZsdUFFZEZmZElNYVU3?=
 =?utf-8?B?dzBTNmdYK3dkMUVmZnNyL3U5RHBicEZ3WnJpUEN0Tm9pNDFwUm8zS2RBYmZr?=
 =?utf-8?B?eW5ma3hWNjhWNkxiQS9rcVNLeW0yRU55WlRSdGJ1b29GNzhzOEtDTnp1Mkd5?=
 =?utf-8?B?T1U3UW5wNkxGT0pMSmRzRFpQeTZnNStPMjIzUWZRMGJ2eTdRNkNveFYzY21S?=
 =?utf-8?B?ODB3Uyt5NTdQZ0lvdGM4Nzg1SitKSkd1SWRTRjJoL2VEZy9vclhFYzVqcTVU?=
 =?utf-8?B?MnIzQnIzVkg5ZU1DdzBkOGpHNUR6enFZdlozNndwZks1ZFNJZzllNWlXdk9R?=
 =?utf-8?B?MnhzVUhHUzM5WXRWakZOeGNXM1hwYnpwaktnYS9abkhQOUhmcldPczExNEZK?=
 =?utf-8?B?RHBmbzJPZW1FdTJoUG9nT25CUnMzWWs0R0pUSjAvNUVPUkZQWVZlN3lUdHEr?=
 =?utf-8?B?S1p0VkxTRlFCS0hLdWFVVVdicFdNejdqcUxMZUk3Z2s2aGM0UGJ5Qm5DN3RD?=
 =?utf-8?B?RXo1R1EwZ0k2QXc0aXpNMjgvdWV6Zmt2Sk1hM0ZyWjVadVZUdXJVaENKM0hw?=
 =?utf-8?B?cVlNSzZFaHNOZUNoREJGS3M5MFk2N2ZZS3BLYkdndVlhR2NYZHBPYU0wWURt?=
 =?utf-8?B?UXlaQ1RBdHZINzVSb3Q5YmNWM1o5bFI5OFFmWjUzNy9BbUVRS0ljTVd5cjVz?=
 =?utf-8?B?d3I5RlF3bUFiWE93eVlCQkN4NkZwNXYxckRheEF1cmtFeW1WQmU3T3lVQVRV?=
 =?utf-8?B?ODhFbjk1YUtpdldVT2REbkdLYnVFM0dDZXMyQmlaSXhVeWdCc2NUNC81WkNj?=
 =?utf-8?B?b3hZZ3JESmQ5ZXFNVFNWQndRNlVJMEpXREh6YjU3b2FzcTB3STVxQkRqdks1?=
 =?utf-8?B?M3FIM3pyQ08wckRKMDNzVnhNdzU5b0g4Q05kNE54L1ZHbnZOTVlkSlY3NjlE?=
 =?utf-8?B?aFQ0L2FJSUNKYWpuMnoreXpnVEs5eFR0RlgzamQ3aVRCTmJUc1FmVlBFaUlr?=
 =?utf-8?Q?gVDGW6j/FfjOYfxVGihU8Lc=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 80590738-c158-45ea-ebdd-08d9fd00eedd
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 10:31:10.1327
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 6YoMTeadX3yCuroUG8tv9sIiwdt50DuU2qJEOeURbdxuaCCFv89ptH9kWfNjxhScqaiC8u2y6/Huf2PoiUXMUQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR03MB4464
X-OriginatorOrg: citrix.com

Hello,

First two patches are cleanup related to the usage of PIRQs from HVM
guests, and shouldn't result in any functional change.

Patch 3 allows the usage of PHYSDEVOP_{un,}map_pirq for HVM control
domains even when lacking support to route PIRQs over event channels.
This is done in order to allow setup of device interrupts assigned to
different guests for passthrough support. Note that using passthrough
from a PVH dom0 with vPCI in a safe way will at least require proper
locking around PCI devices, and likely other fixes.

Roger Pau Monne (3):
  evtchn/hvm: do not allow binding PIRQs unless supported
  hvm/irq: tighten check in hvm_domain_use_pirq
  hvm/pirq: allow control domains usage of PHYSDEVOP_{un,}map_pirq

 xen/arch/x86/hvm/hypercall.c | 7 +++++++
 xen/arch/x86/hvm/irq.c       | 2 +-
 xen/common/event_channel.c   | 2 +-
 3 files changed, 9 insertions(+), 2 deletions(-)

-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:31:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:31:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282989.481873 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPijz-0002qe-9E; Thu, 03 Mar 2022 10:31:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282989.481873; Thu, 03 Mar 2022 10:31:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPijz-0002qT-4G; Thu, 03 Mar 2022 10:31:23 +0000
Received: by outflank-mailman (input) for mailman id 282989;
 Thu, 03 Mar 2022 10:31:22 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=PW1S=TO=citrix.com=prvs=05474af58=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nPijy-0002Y7-0r
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:31:22 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 0b0f3fb7-9add-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 11:31:12 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0b0f3fb7-9add-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646303480;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:content-transfer-encoding:mime-version;
  bh=j4w1mHcyoEPKLLf5z/FbIGVgRFeXPbopcH1SycomTrg=;
  b=XLXlOoBaLSMk7gIgP2Opt1/xpQA41D5QYSJzHK2sjQF+jG5CxSLiIyWT
   Z3mTjA0lYVI9AQLCb6nwMCcMxCAp0+TpaAjwRY0HN0T203ecS4YK+xIQG
   eWlvYZZlWhbuei5HuEjdHolalwX9vlXATMkBcWs+I6giCXGZypitu3FZ6
   U=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 64842697
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:4gsIPaNfR309yBXvrR2bl8FynXyQoLVcMsEvi/4bfWQNrUol3zBTy
 TNNWWnQbPqMajb3fdxyPYu18hgFu5OBzdJnSAto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi2tUw2LBVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Zk
 v8Ksp2TQwcVBpLgoM4vDxB4MDl3FPgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALNs7kMZlZonh95TrYEewnUdbIRKCiCdpwgmtg2poQTKm2i
 8wxKghzURXDYAJ0Og00EYxigNW5i1C8bGgNwL6SjfVuuDWCpOBr65D2K8bccNGOQcRTn26bq
 3jA8mC/BQsVXPSAzRKV/3TqgfXA9Qv5RYYTGbuQ5vNsxlqJyQQ7GBAQEFe2v/S9okq/QM5Eb
 VwZ/DI0qqo//1DtScPyNzW6qnOZuh8XW/JLDvY3rgqKz8LpDx2xXzZeCGQbMZp/6ZFwFWdCO
 kK1c83BXxYot7y2Q3Khzoi4lRmAZSE1DncLTHpRJeca2OXLrIY2hxPJa99sFq+pk9H4cQ3NL
 yC2QDsW3OtK05NSv0mv1RWe2m/3+MCVJuIgzliPBgqYAhVFiJlJjmBCwXzS9r5+IYmQVTFtV
 1BUypHFvIji4Xxg/RFhodnh/pn0v55p0xWG2DaD+qXNERz3oRZPmqgKvVlDyL9BaJpsRNMQS
 Ba7VfltzJFSJmC2SqR8fpi8Dc8npYC5S4i7DKyKMosVPcUoHONiwM2ITRTKt4wKuBJx+ZzTx
 L/BKZr8ZZrkIf4PIMWKqxc1juZwm3FWKZL7TpHn1RW3uYdyl1bOIYrpxGCmN7hjhIvd+V292
 48Ga6OilkUOOMWjM3K/2dNCcjg3wY0TWMmeRzp/LbXYfGKL2QgJVpfs/F/WU9c9zvQNy7yRp
 SnVt40x4AOXuEAr4D6iMxhLQLjuQYx+vTQ8OyktNkyvwH8tfcCk66J3Snf9VeBPGDBLpRKsc
 8Q4Rg==
IronPort-HdrOrdr: A9a23:JW54S6j3z5WFYSXHK3RSXe/9THBQXzh13DAbv31ZSRFFG/FwyP
 rAoB1L73PJYWgqNU3I+ergBEGBKUmskaKdhrNhQYtKPTOWxVdASbsN0WKM+UyHJ8STzJ8+6U
 4kSdkENDSSNykKsS+Z2njALz9I+rDum8rJ9ITjJjVWPHtXgslbnnlE422gYypLrWd9dP8E/M
 323Ls5m9PsQwVeUu2LQl0+G8TTrdzCk5zrJTYAGh4c8QGLyRel8qTzHRS01goXF2on+8ZpzU
 H11yjCoomzufCyzRHRk0fV8pRtgdPkjv9OHtaFhMQ5IijlziyoeINicbufuy1dmpDl1H8a1P
 335zswNcV67H3cOkmzvBvWwgHllA0j7nfzoGXo9kfLkIjcfnYXGsBBjYVWfl/y8Ew7puxx16
 pNwiawq4dXJQmoplWz2/H4EzVR0makq3srluAey1ZFV5EFVbNXpYsDuGtIDZY7Gj7g4oxPKp
 gjMCjl3ocWTbqmVQGYgoE2q+bcHUjbXy32D3Tqg/blnQS/xxtCvgklLM92pAZ1yHtycegA2w
 3+CNUaqFh/dL5nUUtDPpZyfSLOMB20ffvtChPlHb21LtBPB5ryw6SHlYndotvaPKA18A==
X-IronPort-AV: E=Sophos;i="5.90,151,1643691600"; 
   d="scan'208";a="64842697"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=BvbsshMeA32FOsDuLEdH8TdnLsT6voYgbc92js4/WoHCsfwFVsXLGn1T0HwP/jrvSVKKg5ZQUoL/4utZorcOCH2yjClmls1rrSdicLJPTUuyHAEIvdwnb8zPfaaRZ0tdpNuN+XSogU2dNpQk5627OaJLT9jg5aM/9XbismCx7Qmyzr1i9UwCkf0RZ2zfbKiBGpr+bP2R3a/PEqw9CcxqxlyvFyTXYp+WJha+KSWVgd8erKBTZkdIb+R5oau9Je7Sey093JW9Tp/M9R1YAUqzHO7yjKvbc/r6t8L4cX5r8tRL+T8FFHo9PPOxgoPC8mKhbal2kIZvZ2iVIOITw12dWA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=O6pl1w/5dSZ6eQnP2uJiXcsjx4tDubo9dhwsrhwqdHk=;
 b=luM2nQxTpwX96D3hNxm55iI4xnoWxe3nVnBOewqSgjSMecvccfwFb5GsW3GcMT7gdkPdghmyMOENPQ3moXQeLQBRy/MY/IncscvisK/aC5bDksdXkrOMJ/cOrTTW8l8zRyDIshFyMyISCuuONAK6bNt1RwkruX06CKQHvU46VFy2tT4CgRCwyFVC0vdy2Lw60yf1xX1AQ9rYTdVxxzbOsIovbN3uct7qwB+mFrticH/EfQMXwAS1j24BR8VyJaW++s6wPwxRlQl+YNZxxINQycup5SmO+aoLnwIpsAhW9OITWV39r383KVs4FoR2lIZU74teq+ZV8jmsTyDzBhyX9w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=O6pl1w/5dSZ6eQnP2uJiXcsjx4tDubo9dhwsrhwqdHk=;
 b=OIhItNfOaxeAC1vn6B2apHP0uAiieuFXrzgVGi9x+EAfwCCCcYsxK11K6dO2VZ62zSK33SmLH3zfeUGCWXHkBHC4KOvF5zA5BtJyLDRcM7kxYitX9yxTIASYQx4SgFO6Gqy9dfvogetTTv3RleCiNEMP2qLRTXkIqBjmTAtSCYc=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, Jan
 Beulich <jbeulich@suse.com>, Julien Grall <julien@xen.org>, Stefano
 Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
Subject: [PATCH 1/3] evtchn/hvm: do not allow binding PIRQs unless supported
Date: Thu,  3 Mar 2022 11:30:55 +0100
Message-ID: <20220303103057.49181-2-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220303103057.49181-1-roger.pau@citrix.com>
References: <20220303103057.49181-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO2P265CA0202.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:9e::22) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c0bc253a-840d-4dd2-0571-08d9fd00f240
X-MS-TrafficTypeDiagnostic: SN6PR03MB4464:EE_
X-Microsoft-Antispam-PRVS: <SN6PR03MB44644A90D5CC1A206C475FCF8F049@SN6PR03MB4464.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(66556008)(66946007)(66476007)(8676002)(4326008)(86362001)(4744005)(8936002)(5660300002)(82960400001)(38100700002)(2906002)(26005)(186003)(1076003)(2616005)(6486002)(6506007)(6512007)(6666004)(508600001)(6916009)(54906003)(316002)(36756003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?V1pxSHFocjVWaFhHY3RoNm1PNkxJRkZSNlBySlljME55WVk5M1ZVWERuY1FQ?=
 =?utf-8?B?a1g4OUEwWHppR2V5QUFaZnlsSmxHd1I4Z0cwZ0NKblUyMzQ4Nkp5MXlqVWQz?=
 =?utf-8?B?bFNxYW9ZZ0U2WmVTSjJRdEV0Q1k3UmttUkZJZ3RBd2RGQU9IaFpMNDNGT1VH?=
 =?utf-8?B?Q2xZeWRUUThOVzcwdmN4Y1ZiakxOVzFoOUtSZ1hMOW9BdXF1UkJjc1ZIZlVv?=
 =?utf-8?B?aXJ2T2NZMy9Wb0VKekQ0UW1Bb3NYVTlPSWpPS3UvUHJHWms4Vkd3K25iaGZD?=
 =?utf-8?B?aDRwZDRGdUlncWh0T255cFU3eWNQSmJnZnpKcDBQcU05OUlFVVZSd2NicFNq?=
 =?utf-8?B?ZzFpOU5BWm5xcUU2a05tZFdQYURyMGozaGx3UHRZeTFndkkzN1JNc1kxOVgw?=
 =?utf-8?B?N2l2cWtSSHp1Z1krZEp6b3FYV1UzZDRIYVNiQndYbEVmQkIwNXJ0RzU5d05R?=
 =?utf-8?B?OUtMZ2Zpa2J4MFBRZ1JCbzY5OWZ2Z3VQdXZYMUtMZmJDakRNdlpUVGVaTE5u?=
 =?utf-8?B?YTNTajFod1pJdXRpdDZSZE9SUGZQT01RcUJMdUp6NWZwMHA4OW9wa3RhWnZS?=
 =?utf-8?B?dENDQXBxUGVmY2ErdWlCRzVabkg2WkFyS3JENG02a2phUGluSUIyOE5oR1R5?=
 =?utf-8?B?WkxTcUdlR0dRN2gwNCszcjM3N1Z4TWs0ZXFBa2IzZ1Jmbjg2OGRFTkoxMW11?=
 =?utf-8?B?THBvbjdhRFFtWVF3b3hkYnpFQWd0WjRRRTJZR0oyZWdMKzlrMTYxVVpZSks2?=
 =?utf-8?B?QXNGN0xhZk4vRVNaODcxUkIxZ2R5RTcyeHVzcW90OWQzQlhKTlBMRU9IakNG?=
 =?utf-8?B?SGpocUVNaFJIcFRheGd1SnNWUkFLRUNlbUVNY0RKS2hWZkNIM3RyNytqS0Mr?=
 =?utf-8?B?a3Q0Q3lqYUpQVUhIV3dzZmN4eVdmS281bTBqMEF5cEErNDhYU3dHTGttRUd1?=
 =?utf-8?B?V0JzYmZlaGgvRCtiY3YyQjZ2YWJLcnhsd3hiWi81dzNsL3Z5MkpyU3VRb2RW?=
 =?utf-8?B?OWhPb21lMGRpMkhrYVF4L2JOSEtEN2QzSllCR1ZlWHNXNC9ETkU2ZEtrWkd3?=
 =?utf-8?B?cm9aYlRTNEo3cWhzNHdpU2JqdVVXWk41M2pQbUphZ1ZHMTE1Y2VPMUZoUTI5?=
 =?utf-8?B?ZHhEclE3MTNSbmpQNlJLZ1NSZndhT3VDM08zeGVKU0I5MjZtaGpKVFNVd3JS?=
 =?utf-8?B?aExaODJUN3Z3dUYxQ1R1dHZFMXJHbEU4SmRBMzAvU3NDNlZJM3o3aDFkbkpV?=
 =?utf-8?B?YjRCcGQwV3Y1RmQrRUw3R0x1ZEhrUThqcnh6SzB4N043VUZra2JmSmxNdjlu?=
 =?utf-8?B?NXQrQWk5MWdqcmp6WHA0bGNOQWFwWWw2Y0U0UnBsSjhES2JGamVDaWRZbS9F?=
 =?utf-8?B?akNGWW54aC9aQ3NJeHJFeWJ4VkN1UVBKMG9Xdjlqb2JFUVMybzFsdFNiTU05?=
 =?utf-8?B?dlpqZXpFMzRST1RCK0pVc2x4TExwd2ZZazdGTUFLREFuZjdOWmNPZkswZm1O?=
 =?utf-8?B?VjJCNGhkeWdkbkh5RUorSThUMXZSbG5lK2xnS1p6WG1BRkRvdUdSY3FFZTFm?=
 =?utf-8?B?WUtxRUxWWjZrVWFTYllqWXFJczZiclN1aVMxQnZuQ3pLL3JtS1lxUGR0aGVj?=
 =?utf-8?B?dVo3THhXTk90cTVteWdhaUpUMDlvSE9YUDRQZWVRT2YzRmU3MDVDVUMwOGZJ?=
 =?utf-8?B?VTMzb3lVWG5uNUJVMHJ6aTZJWHpRNHBRajNJdE5ra2ZPbGQ3VFMrNmV0K3B2?=
 =?utf-8?B?YUE3aU03N1JtRk84aCtaUlhrZitYUlhJb3FCV2pUWWczS1ZYMVQxWWwvQi82?=
 =?utf-8?B?TGJPU2w2ckxEblU3MDRiTnV6Vk55eDBpM3lYVXFmQlp6amRjZ20yVTZIc1JC?=
 =?utf-8?B?eExFRXRwbVc5a2lVVkFIVWUwRkQrZE5JVDRBMGVQWFNmY0x6dVZjRVZGUlkv?=
 =?utf-8?B?eWV0Zm9xNHhINHJtVFZpalUycm11S2tBUTNUaURpSUVaUGJXY3dSTkhoMHN6?=
 =?utf-8?B?aHpOQ0xKMWNrcVB0N3JYOXd2Q1d6YWhoSGdFdDJvYXE1aWxVRFNqa09WTXA2?=
 =?utf-8?B?UU9IRWVWaUVacnJ6dWJjaUhtN0VXMlZ2SlpHK3BLc2ZybUF0enowd0pHZklZ?=
 =?utf-8?B?QWJVWVNOUVJYSUNrMmZXOGw2b2JmeXd1dEhkdER1VEl3aFR5OElJSHJ1UmNt?=
 =?utf-8?Q?veAhJsy8HOWqFoiLapMDv8s=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: c0bc253a-840d-4dd2-0571-08d9fd00f240
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 10:31:15.6994
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: JL6gh1YGB8/ZLGkmbTlJYdfNWX6b3X2jvPkSI4shp5vhyaqoz7kVrufXHuczds685wEVrewMFMz6Le5VGFe1Cw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR03MB4464
X-OriginatorOrg: citrix.com

HVM (or PVH) domain not having PIRQ support won't be allowed to map PIRQs in
the first place, but would still be allowed usage of
EVTCHNOP_bind_pirq. Such hypercall won't have any practical effect on
the domain, as the event channels would never be bound to PIRQs.

Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
 xen/common/event_channel.c | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c
index ffb042a241..bc4985706a 100644
--- a/xen/common/event_channel.c
+++ b/xen/common/event_channel.c
@@ -556,6 +556,9 @@ static int evtchn_bind_pirq(evtchn_bind_pirq_t *bind)
     int            port = 0, rc;
     unsigned int   pirq = bind->pirq;
 
+    if ( is_hvm_domain(d) && !has_pirq(d) )
+        return -ENOSYS;
+
     if ( pirq >= d->nr_pirqs )
         return -EINVAL;
 
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:31:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:31:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282991.481884 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPik5-0003DX-Iy; Thu, 03 Mar 2022 10:31:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282991.481884; Thu, 03 Mar 2022 10:31:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPik5-0003DN-FB; Thu, 03 Mar 2022 10:31:29 +0000
Received: by outflank-mailman (input) for mailman id 282991;
 Thu, 03 Mar 2022 10:31:28 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=PW1S=TO=citrix.com=prvs=05474af58=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nPik4-0003Bk-5l
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:31:28 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 1369bc8e-9add-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 11:31:26 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1369bc8e-9add-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646303486;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:content-transfer-encoding:mime-version;
  bh=zp/O3+irhFt1NPeqnpO+/nDma/XFODeRS5LZWsgogwI=;
  b=HM9jUQzVP7L6Wt1X81H1TQk5pZWMRS5JvW9g+WzAosnFnQTiNa/2ZArq
   EqTr2FmIBsHdhIpLtuyer4lDDtXlCgKJK1cyRorq8Kf6Zuy26gY0Ky14T
   pGBUAanfEtmGcQPT+NPw1yltYrC6rKSmH6R3iFX1FOaBA4bNWdM6xTi3G
   w=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65783134
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:RCtgeKh7FPKeN0SRFq/KbIEaX161dhAKZh0ujC45NGQN5FlHY01je
 htvWDqDOqreNmqmc9l3b43j8UMG7J7Xnd4ySgRqrS1mFy4b9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFvW4
 YqaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YQ0KIrX0uspeahobP3pmIpEc2JTtI0Hq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bkmtnwjzDS+4vXLjIQrnQ5M8e1zA17ixLNaiDO
 JpCMGEzBPjGSxFLeXMbDMMHp/7r1lf+SB5lpG+z+YNitgA/yyQuieOwYbI5YOeiWsF9jkue4
 GXc8AzRABsXKdiewjqt6W+3i6nEmiaTcJIfEvi0++BnhHWXx3cPE1sGWF2ju/67h0WiHdVFJ
 CQpFjEG9PZoshbxF5+kAkP+8CXsUgMgt8R4Gc4m8Dmv5Ont4EW1XXAbcmRhQ/YkjZpjLdA17
 WOhk9TsDD1plbSaT3OB67uZxQ+P1TgpwXwqPnFdE1ZcizX3iMRq10+UEI4/eEKgpoCtQVnNL
 ya2QD/Sbln5peoCzO2F8F/OmFpATbCZH1dutm07so9Ihz6VhbJJhaT1sTA3Dt4ade51q2VtW
 lBewaByC8hUUPmweNSlGrllIV1Qz6/t3MfgqVBuBYI90D+m5mSue4tdiBknehs3aJpaJW6yP
 xKK0e+02HO1FCHwBUOQS9jsY/nGMIC6TYi1PhwqRoAmjmdNmP+vo3g1OB/4M5HFm0kwi6AvU
 ap3gu73ZUv2/Z9PlWLsL89EiOdD7nlnmQv7GMCqpzz6gOH2TCPEFt843K6mM7lRAFWs+16Or
 b6y9qKiln1ibQEJSnKPoN5LcAtTdiBT6FKfg5U/S9Nv6zFOQQkJI/TQ3akga8pimaFUnf3P5
 XazRglTz1+XuJENAV7ihqxLAF83YatCkA==
IronPort-HdrOrdr: A9a23:R5CTkK2IkuJ9mWxwSbs9rAqjBEgkLtp133Aq2lEZdPU0SKGlfg
 6V/MjztCWE7Ar5PUtLpTnuAsa9qB/nm6KdgrNhWItKPjOW21dARbsKheffKlXbcBEWndQtt5
 uIHZIeNDXxZ2IK8PoT4mODYqodKA/sytHWuQ/cpU0dMz2Dc8tbnmBE4p7wKDwMeOFBb6BJcq
 a01458iBeLX28YVci/DmltZZm4mzWa/KiWGCLvHnQcmXGzsQ8=
X-IronPort-AV: E=Sophos;i="5.90,151,1643691600"; 
   d="scan'208";a="65783134"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=LAzU1OLGrGbU02r+zkbGSmgmkO4IaPOqTm48b7ignoYZ9WUSbW4JtPbdNohyil3/Ca4scEL4c+R+WbRAU2/IOKKHTgckn1tlVccjuBgkuJUou9OJfCpgTuy0ywa0xHO10Cy0nq0UtGNvW2q4cCN28iyTnfB5h/ns81oEVrf8N5DxGCPzaranhOZGMDfZfLzwJkpyRRv+DZjJyLKiRwUswltwNvnvqWh2m1Yxpo9WFe+DkiGUefBvhEeBBVy1wVTufzBpVQEQPnX0ELf7hPvRfYw2SF7Lf3Enav+TPpaTi5WTdurk3dvTZviNjxHzdByMNuL6dk6c23kTemz87JitSw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=v3ryk5q8FKUxx6AOhcSeGFHahYVASbk58h3VZK2SFNM=;
 b=Rv2PMRcXhfviph68PBY0QfD9VhCyIsA8v+xlwnazRpw1+9ZTXPO9ObGdSCGeyF0TO5WEic7BgqxXYNb8X/EByQxe4UMXP2wW6+Idq4UJ1BgHeD/+/RHbJcsSA3B6TX1S4Dguq7rZlvz5Oen/JAc0FimyWq2gLP5Fgbp8w1mjqWKTwQ//c63cL/YZ0/FPIGUjThk5Y69pswBTperEeL8FrGW2e3+qROWp7/KIEdnvZprTDG55I6gBxJAkATYgEcu1hDNrsJljczLuFe/MbFUQZJ9CtXPLcI0wf5BeSNu+BfsZdAc+oBxMJH9UJNHa+wXApY4J42FW3PQ6+DZhuVLymg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=v3ryk5q8FKUxx6AOhcSeGFHahYVASbk58h3VZK2SFNM=;
 b=HcFahv03F3OQhK7/7B9fk2QHciWsx2lCojHIJIx4Dv9OB/erMfuSUJLF2PdOH70msHGY/Rn3XYR6hYaVGPIlJnvhRnrlS/H+yagmNcWqiXGelpidpDvL7sPyiuLGzbt81xfDOTe76Tjn40LeIZ2C29+ah1NuyoGUSdSunzM/F/w=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: [PATCH 2/3] hvm/irq: tighten check in hvm_domain_use_pirq
Date: Thu,  3 Mar 2022 11:30:56 +0100
Message-ID: <20220303103057.49181-3-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220303103057.49181-1-roger.pau@citrix.com>
References: <20220303103057.49181-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO2P265CA0186.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:a::30) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 7d902a93-6ceb-4873-254e-08d9fd00f54c
X-MS-TrafficTypeDiagnostic: SN6PR03MB4464:EE_
X-Microsoft-Antispam-PRVS: <SN6PR03MB4464C02A2E278AFF5C8946748F049@SN6PR03MB4464.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(66556008)(66946007)(66476007)(8676002)(4326008)(86362001)(4744005)(8936002)(5660300002)(82960400001)(38100700002)(2906002)(26005)(186003)(1076003)(2616005)(6486002)(6506007)(6512007)(6666004)(508600001)(6916009)(54906003)(316002)(83380400001)(36756003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?cFdmQ296TmxDWXAxbFBZSDEyTjFXM1p6anBvUER4Ly8yQUJSdExiRjhTWjAx?=
 =?utf-8?B?dis1RE5NTWJodGdzUzFuWm9KV1B0THJHaHhhd0ZyUTJGcUNJLzhkaFdMMWdW?=
 =?utf-8?B?aHVPSlVBcHZBOEFBdHpVK253MHJ1RUNOTzZkSzFsajJ5eTlDOFRLTStRWVRE?=
 =?utf-8?B?NkF6Q0Jvd2dnS1Y2ZzhhVUF2eFRRdkxXN0dPc0x0ckxwNXRxZG9hYkpvbFQ5?=
 =?utf-8?B?QllJbzdPZXBWWlRqMG9keGlWektzR1dtbGZyeUM4QVdRaU4yWDlwcFFzSk02?=
 =?utf-8?B?Q0x4TFcvM2JtQXlnVmM5Y0JOK2k1bW9sNGY4NGhKTW9zLzFORTM1V2txMkdu?=
 =?utf-8?B?NlNQQm5jMENQclNGOHhrUGxIY2pVdE1oVGYzRHFFeVpBTEM0ZUgvU2dDaGhX?=
 =?utf-8?B?akdCcTJDN2ZoMEhubXBTbEczN2prVFZsR0pXc1dpVlRNTStnRmxCRUIwOXYx?=
 =?utf-8?B?NDh2ZFNFRVZCQVdXbC8zSEhyUHkrRkZFQmgxRERiVEwwdjRVMWZFbUJwdlVr?=
 =?utf-8?B?RUtQd3ZBQUc4dUpvdDdnWTJzOERKcXpHL25tTXBBazB3dllXTCtsd295Qnls?=
 =?utf-8?B?UGFVSDQya3JpUi81aTdYdCs1NjZYQ1RKYm40R1FOemlITWF5d3k4S3VLT20w?=
 =?utf-8?B?N2ZrSWh2c1BhUWI4OTZwUnZXWkVLQkxGYTF4eER6NUNWcjloOFBOL1VYZTZk?=
 =?utf-8?B?S1lHRUJmM2RldWQvek85OWY1aFc5K2Fsc0JMcnk2Wk4wMW92bWowZy9idmc1?=
 =?utf-8?B?MjJTWk95VERvUk9qK3NHVWJQQjBaK1YvejY0eDFPT01MbGpqMjRnY0NMK3pU?=
 =?utf-8?B?dEJ1WEROcmg5QnpkVUlMc2xmbnl1bTF2ZUhQREJVWlFjdndUUjRFYzBTOTNI?=
 =?utf-8?B?MGZzT05JYVNIU3g2cC92WCtlKzF3U2dUSnhqcW1kMjNPMkN5cDlRSTA1a0lI?=
 =?utf-8?B?cWtoUDBvYVBwUkxoOXZ4Q0cyNjRaKzFEck9RYlNvV3NWNUQzT3lqM2tWRFRO?=
 =?utf-8?B?U3VwOTFNVEgzd1l1aDdZMHBiOElLaHRIZ3JUN3ZwSEJid1dqaTdyNy9BWXlN?=
 =?utf-8?B?b28yWmRsaG5ld2RsWG5wWks1TlVueUtaTVo1NkNWZWhFTGZCb3NjWFNKeGN0?=
 =?utf-8?B?VTJnNUlaeFlXYWUrQnB2bDRmaHBRV3ZSSlJWd1NwNFF4SHZZdXNlWTBMc3dx?=
 =?utf-8?B?Q0crMUlmSXROWnZOWlRhR0lWV1ZMWWFJamNKdkxubjZsMk9Gd05iTXNReDht?=
 =?utf-8?B?WkhGendCKzNSekozMDJHY2x0L2VyelFORjNCNkdtcVhRTVpvYjRWS1MxM3Z2?=
 =?utf-8?B?UTVRN1cxZlAwUDBaMkplSGlYR0NlLzJrSytMaEpzTUhBUnRHR3ZqWTlHRHQ5?=
 =?utf-8?B?SXNNYklsZzA1K1h0S3FVVG5ES1FJSzYzV2hRNU1hVEdZcUtHMnU3cENPcGRy?=
 =?utf-8?B?VmZPKzR6YmQ2UEkwTi9TL3JScXVuZi9QNC9PS2tRdkQ3Y05sQ3h5aHdOcTNP?=
 =?utf-8?B?K0w1QTZsSitmVzdIMWhmVTQ1N3ZQSFNBNlp3NmdmcVlRVTNtZ29VRGJMaVlQ?=
 =?utf-8?B?TUZOV2NNa0RIMlFjaHhsR1pNZ1o5dHF1N3gvUGlvckxYZnpia1IrNDE1bTVE?=
 =?utf-8?B?MVl0WExuc1VFR2drSk5pdTUraXZseCtYT1psSDVOVUxHeE5QRWJCMnFrbFM0?=
 =?utf-8?B?aU1pV0l6dXlVNThkTXNuRy9TRDNWWGtCR1A1VHE0QWN4YitIb0ZHM0RKOHZS?=
 =?utf-8?B?REpzUU5xcnFoNCs4ajRoNzVJMDBaVWYycGdha0NHRzNxcUwzN3ZUVHNrZXpp?=
 =?utf-8?B?NnY0d090dkVqekNKcGV4Z3UweVBtQUowdWF6NDRjRWJ4Q2xyYzR1MmdXeCtV?=
 =?utf-8?B?aUVHeWpSYi9CTmpINFpsQlVPZ2tuS1B3OTJuQVhESk1rdE0xUmJkc1V0NjlV?=
 =?utf-8?B?L2VOYnM4MVpjR3c3NkdYZ1YvTUJVRGZscFpXQm1zeThJaGt3Yk5YMjY2OGt3?=
 =?utf-8?B?Tm11R0crMGFvVk93QTE5TEdEYnYvKzdOVEYxczJHQVI4Qlp1MWNtbmVqRTdy?=
 =?utf-8?B?b25yQkp0UUptQWFxWnJwV1dQZnNjZ05GT0h6cGlxMGk5VjA3MVk2eGV2bkho?=
 =?utf-8?B?TUk0NFN3ZUFZV2h6SXJtNTVFQkZ4dWdmckxFell0U0YwREFIdWJtQk01emZ3?=
 =?utf-8?Q?mgZ8Dsyon1mgqKH0U5DclaU=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 7d902a93-6ceb-4873-254e-08d9fd00f54c
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 10:31:20.8121
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: SZdQjcYZIL1ZyviVvfT5MDCPUDMfxJKqdnGeMSmLnY6efb7tS08PAkMqrr5AEiNbBsQo6HFupxnwICa7jq7Vog==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR03MB4464
X-OriginatorOrg: citrix.com

hvm_domain_use_pirq checking whether the passed domain is an HVM
guests is pointless, as all calls originate from HVM only paths.
Instead check whether the domain has PIRQ support in order to avoid
further checks.

No functional change intended.

Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
 xen/arch/x86/hvm/irq.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/xen/arch/x86/hvm/irq.c b/xen/arch/x86/hvm/irq.c
index 5a7f39b54f..7c5dfd3c3a 100644
--- a/xen/arch/x86/hvm/irq.c
+++ b/xen/arch/x86/hvm/irq.c
@@ -30,7 +30,7 @@
 
 bool hvm_domain_use_pirq(const struct domain *d, const struct pirq *pirq)
 {
-    return is_hvm_domain(d) && pirq && pirq->arch.hvm.emuirq != IRQ_UNBOUND;
+    return has_pirq(d) && pirq && pirq->arch.hvm.emuirq != IRQ_UNBOUND;
 }
 
 /* Must be called with hvm_domain->irq_lock hold */
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:31:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:31:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.282992.481895 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPik8-0003YH-SQ; Thu, 03 Mar 2022 10:31:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 282992.481895; Thu, 03 Mar 2022 10:31:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPik8-0003Y2-NF; Thu, 03 Mar 2022 10:31:32 +0000
Received: by outflank-mailman (input) for mailman id 282992;
 Thu, 03 Mar 2022 10:31:31 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=PW1S=TO=citrix.com=prvs=05474af58=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nPik7-0003Bk-5v
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:31:31 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 165bcf86-9add-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 11:31:29 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 165bcf86-9add-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646303489;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:content-transfer-encoding:mime-version;
  bh=mRratOgkzBnDfVL65Q/q6CME3fnvGL4txg0FZdaWXe4=;
  b=F013AGF+gmXTifXtJbcegSLMmQe4ikfN1Kjs/v90XjG/hgNKoFIT+j31
   kQ10u2VXcwtHY0+iusOzvLzGhZNNJ3DOAF41XDsDndb7K8MSZcTf6Zotj
   j0FrrgXv7kgUbawAeX9ht2Cq8vSgJ0e/WU0TxkKLaiViZ2WA6eLn1PrmK
   0=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65783144
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:NE4+zq8zV1J7QPWF+NyrDrUDqH6TJUtcMsCJ2f8bNWPcYEJGY0x3z
 WpJXT3TbK3YNzamc950bYzl8EkCuZCHndQxGlBrpHg8E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oDiW1rlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnZCiTBwnFfz1o/Q6cSUBHgthfp9q5rCSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFJkYtXx6iynQEN4tQIzZQrWM7thdtNs1rp4TQqaFP
 pZFAdZpRDrKWDESAWsqMqgdkOiugXr6XTQBj13A8MLb5ECMlVcsgdABKuH9ZdiiVchT2EGCq
 Qru42T4GVcbL5qWkT6e9XSEierGnCe9U4UXfJWo+/gvjFCNy2g7DBwNSUD9sfS/klS5Wd9UN
 woT4CVGhao4+VGvT9L9dwalu3PCtRkZM+e8CMVjtlvLkPCNpV/EWC5UFVatdeDKquc6Vzkx2
 HTYpuj5Ih5T6bC/VjGv2qmb+Gba1TcuEUcOYioNTA0g6tbloZ0ugh+ncuuPAJJZnfWuR2iun
 mniQDwWwuxK0JVVj/nTEUXv3mr0zqUlWDLZ8ek+soiNygpiLLCoaIWzgbQwxaYRdd3JJrVtU
 ZVtpiR/0AzsJczV/MBuaL9UdF1M2xpjGGeG6bKIN8N8nwlBA1b5IehtDMhWfS+FyPosdz7ze
 1P0sghM/pJVN3bCRfYpP9zrV5p2nPO/SI2NuhXogjxmOMIZmOivpnwGWKJt9zq1zBhEfV8XY
 /93jvpA/V5FUP86nVJats8W0KMxxzBW+I8gbcuT8vhT6pLHPCT9Ye5caDOmN7llhIvZ8FS92
 4sObKOilkQAONASlwGKqOb/23hRdiNlbX03wuQKHtO+zv1OQzlwW6eMmup6I+SIXc19z4/1w
 510YWcBoHLXjnzbMwSaLHdlbbLkR5FkqnwneycrOD6VN7ILO+5DMI93m0MLQIQa
IronPort-HdrOrdr: A9a23:Z1FbtK8iIdkrfKz020luk+E6db1zdoMgy1knxilNoENuHfBwxv
 rDoB1E73LJYVYqOU3Jmbi7Sc29qBTnhOJICOgqTMqftWzd1ldAQ7sSi7cKrweQeREWs9Qtrp
 uIEJIOeeEYb2IK9PoSiTPQe71LoKjlzEnrv5al854Ed3AVV0gK1XYfNu/0KDwSeOEQbqBJa6
 Z0q/A37waISDAyVICWF3MFV+/Mq5nik4/nWwcPA1oC5BOVhT2lxbbmG1zAty1uGQ9n8PMHyy
 zoggb57qKsv7WSzQLd7Xba69BzlMH6wtVOKcSQgow+KynqiCyveIN9Mofy9wwdkaWK0hIHgd
 PMqxAvM4Ba7G7QRHi8pV/X1wzpwF8Vmgjf4G7dpUGmjd3yRTo8BcYEr5leaAHl500pu8w5+L
 5X3kqC3qAnQi/orWDY3ZzlRhtqnk27rT4JiugIlUFSVoMYdft4sZEfxkVIC50NdRiKpLzPKN
 MeTf002cwmMW9zNxvizypSKZ2XLzkO9y69MwY/Upf/6UkVoJh7p3FosPD30E1wsa7VcKM0lN
 gsAp4Y5I2mcfVmH56VfN1xOfdfKla9Ny4kY1jiaGgOKsk8SgfwQtjMkfEI2N0=
X-IronPort-AV: E=Sophos;i="5.90,151,1643691600"; 
   d="scan'208";a="65783144"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ZvwK6wCgl47O4ZB2XLNxdx9JFPlHy1IFkjp9jwBm0+U3+DWfhhr6VB39Q47S3klwd3mPn0E6FB20oz53JuUsSH0eD2yWqU4dS/JhsnxZ+pT5SlP+CgcCcwUJSOnAPc7kT6SuUrtyaPt1sJKKYK1MrhB14r6d4NxXUvQQaXqF+sHw79vL3y87hsKsPMQYuLHUhbiQi1OIVdmO7VZz9hmYFH3a3GPOGJ8oG4FjtaYl9I7DzOUXT6QTX70ORO5vgSYEUcKQQobBT/hPxE8lId92rsm4ybmgU8ZvHeojuPsH2jHqAAaznONp3HsG9zRVR3GwZrBpuCrqA0O1lY8lLiucBg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=vrDS53nrLLQmuLsxvZpPkLlor7GHN4Niyf5R3N6D0us=;
 b=ZAOSsL3/k3l1ERY4U5oB/bXhQEHzdIpxYZSdk7ULwgH7LGnQh5uOGM9nt+XcLXHHIuGK6MJUvbbQTCoOZ8Jpho96qpWMsMvxahA3c9YQkp8tUATIXvXtY3epBguvWi7h9kbCOsgkW5+wJbQNEBELV74VsEIf47gW2NjLUa8dKBaO0k95SwocCeVz6LZ3Rvi3T4WqTVkY9ItMuf1Of/DDMY5GizGHLujsm6G3nAuGRi/AdEOO/ydrwzI4Py/GqjZ7VQElA+NNC0jNH67C6WNOGBEWsC+kBHFas+UjrkwVOlNnNnrgj8LYg2XgrilT3ShZ9Rc+5iJT3EJDy+z8vNw4yg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=vrDS53nrLLQmuLsxvZpPkLlor7GHN4Niyf5R3N6D0us=;
 b=vAQqLyZ1ToV1Po65twx8+oUOEBeidXc9YlejWb+JzWt1vUZmgDah3Y7qfHLy76O5I/tn6u6ci/XJ3/SnHsJoo5LassHXsuNU9H3w6yKv1vNP8xZAXNrBb7C1d+8AVLbcVg3AwqRaS4WVzVk/wBK0EnO5SEm3T48Fmw5R1y9qrEw=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>, Alex Olson
	<this.is.a0lson@gmail.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>
Subject: [PATCH 3/3] hvm/pirq: allow control domains usage of PHYSDEVOP_{un,}map_pirq
Date: Thu,  3 Mar 2022 11:30:57 +0100
Message-ID: <20220303103057.49181-4-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220303103057.49181-1-roger.pau@citrix.com>
References: <20220303103057.49181-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO2P123CA0086.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:138::19) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5dadd1f2-682e-4a83-83df-08d9fd00f842
X-MS-TrafficTypeDiagnostic: SN6PR03MB4464:EE_
X-Microsoft-Antispam-PRVS: <SN6PR03MB4464496034337EB59AADE1C98F049@SN6PR03MB4464.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(66556008)(66946007)(66476007)(8676002)(4326008)(86362001)(8936002)(5660300002)(82960400001)(38100700002)(2906002)(26005)(186003)(1076003)(2616005)(6486002)(6506007)(6512007)(6666004)(508600001)(6916009)(54906003)(107886003)(316002)(83380400001)(36756003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?SVhacjU2UmprSmZWTitzUEFoNDV6TitIdlByNnphbnRjL1FxRzRHZlByOXRB?=
 =?utf-8?B?dzRNdDdpblJWaEtYancwUVF4YjNLdXlzL1EzaXhSZlBPQko4eFZxT3NMc3E3?=
 =?utf-8?B?T3lIWUhpNWVyalRBR0RrUHJyVXNuSnFiU2piQThhc2VuVmEwbUFNMDR5cFZi?=
 =?utf-8?B?RTF0MjRPRDYycURDdGliZ0x4aXZGc0R1dDdHeVFnZ0h5VmNmU3pXSnNCRzVU?=
 =?utf-8?B?V3kyNXJIOHJCNXBDL3pKVEFBUkNSQWxKUHVuL2l1SEVhNUJjamgxZzRoajl4?=
 =?utf-8?B?R2dQNTA5TXhZZTNUOWF1cmY3YnBUMmhHWFRHeitXNG1neHF2SW8zRjlNZDYw?=
 =?utf-8?B?UGFBZ2xrdXJyVDVydGtHM3NEdXdMa1hqMUg3N2FNSCtnMERMYTVTa2YwWGlV?=
 =?utf-8?B?OGRQdkF2MmluanVKdXJSc2FFM3NrVnp5c1ovNHZGQWo2Ny9DdEhWNUkvbFNT?=
 =?utf-8?B?RTdhSEltNTJuRlFSejlvWUtMdTU3Q1dLNEdqUHJ4eHowNUpXdWowYzBsd1Na?=
 =?utf-8?B?Y1FRUWdMWUo0b0FQTGRpajdTMGZQajVXV21JUmxrbitodER0TXZsNjZlb09z?=
 =?utf-8?B?QWMxUmR0Z1QzdzlCOWYrQTRsdWpuN3M2anB6V1duMmszSVZnWWlpS1dhUURP?=
 =?utf-8?B?Zmt2ak52VHhwWmZpbzZkZjBuTzNFZXRpeFFESVJOR0tENEQ4WlVpYk5rdTJD?=
 =?utf-8?B?MEEzbldZdUFOdVpOQ3FpOERpQmh6a0Q1Uy9JTjVqU2NIZCt6MDVsMWFYZmt0?=
 =?utf-8?B?STBkUHlVNko2UEROUmZiTzFGME94MDZTSStaL2tHTkY3aXRHQStjWEkxNWVW?=
 =?utf-8?B?UkU0UnJCN05aNCtzcUo2SWVqMk1GV3kya1I4eVlqWDV3ZE1FT0FrY0FMSlE5?=
 =?utf-8?B?T21SL01mdXcxenYwNzg0aUZKdWFmYlVaTVRheWUvNE5lWVpqSTY3UUcxbGJX?=
 =?utf-8?B?VmpINFFjVzJVNEYwSHl4MnlmTmNJb0JjOGd1a2c4THozSk9odld4b3ROMUVq?=
 =?utf-8?B?OTJwZWIrRnVCYXNWNkRYK2d6UFdwS0FFR2tJYnRTNHBxRnhMWVVpeXFadzU2?=
 =?utf-8?B?ZU1OTDVFU1dUU2dZTHhzTjFZNmtFR1dMTkVYZmF5N2thNnlyQ1cyc3BLRk43?=
 =?utf-8?B?Q05rWFVCVUxycCtwRHJ4alIwMjk4OGhDQkJ2M1JrSWZuS3htN3NKV29CYUNz?=
 =?utf-8?B?aFlRT2dRa2VZM0xpajhFQ3hTbmYreldVK0Y1MTloZEd3c3dpeVVSNXdDdlZj?=
 =?utf-8?B?U3lxWHd2VHE5M0NKNFVJNXkyK0U0cWRlT0V0MWV2RlBJc0s0Z1g5ajJKRks0?=
 =?utf-8?B?cnVJL25JWEtlV2FFT2d3K3FjcHpkdmlwNTBvQlY3MDMzYlRrbEc5eFp3NzlK?=
 =?utf-8?B?bHRZL1lNVlVtZ2h3bEd2VkExSVduQnZvVlhUb0xwd3I2NVpSS043dUMvK1hq?=
 =?utf-8?B?Rk4wY215a29MazhYRnpuYU0rb1hvY2V3QU5mTWlTYjd0LzBYUHBZOXRZUHI2?=
 =?utf-8?B?bjhXcktHTG1UNUE3SGdKN0U2cGloRFRNaUkxejNkS2UyaFZuK0s5KzZJSU1n?=
 =?utf-8?B?MFQ2blhmb1BvcHpqYXpqQjNlMFpsNy9Db1lZc29scTgwN3NYa28rTXlUZFNu?=
 =?utf-8?B?NU9MQ0NRbUZ4Zjl0V1lKQXRFQ0RKemRhVHd4MlR2NWptRlVMZ0MxcDNEY3o2?=
 =?utf-8?B?Sy9weWJRRjBwYmlpMEU2TU1EV3VGcWJrTGFBRVpDMS96U1MxT1FWdUJFaUd4?=
 =?utf-8?B?V2N4b0Z2NDNvTTFnS0JWM3RVZXJNQWZhc0FPWkRXSEFrV2xkeW1GZ2ZTeUd6?=
 =?utf-8?B?Y1NzWXJQNXFoeFFjMldOWVFkK2tXZnBhWHk0WDF6aGY5QTRWdUxPNnNvQWZR?=
 =?utf-8?B?TWJ3aTVwVU9wRzd3aEFUL2Eyb2x5YUFLZXJFeFNkUjl3ZS9RSTliMFlhQWpC?=
 =?utf-8?B?M1lsV1hFUDByM2pYbkF3cUhhN01sTlJYS1BXaC9FNC8wRlhYajNSTXc4aEla?=
 =?utf-8?B?UzBuN0h4VzhvMlhhZS9sNWMrVVRlWjFNSFdjM1VZOHBPVnNWSGNqb1QvcElw?=
 =?utf-8?B?OEJHaE84ajQvZG5PUVZveVVzTVFpYjZyaFhER09HY04wbkt2c0o1eHRFbTdw?=
 =?utf-8?B?Um1JeVhaSE9kODZtekNOY0Fna2FqRlR5Nk9ES1p5cENzdEFmU093UEcyd2Mz?=
 =?utf-8?Q?hMT1h4+8E965sHhw4FEypow=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 5dadd1f2-682e-4a83-83df-08d9fd00f842
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 10:31:25.8928
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: w2dEKg2fXNMKVhXtDje0QZds7NB37jiiL9Vqt4ay/qKOXzC0v0hlmW06/VLnjlc7fSwqsb56EZtAFi5S924ZEA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR03MB4464
X-OriginatorOrg: citrix.com

Control domains (including domains having control over a single other
guest) need access to PHYSDEVOP_{un,}map_pirq in order to setup
bindings of interrupts from devices assigned to the controlled guest.

As such relax the check for HVM based guests and allow the usage of
the hypercalls for any control domains. Note that further safety
checks will be performed in order to assert that the current domain
has the right permissions against the target of the hypercall.

Reported-by: Alex Olson <this.is.a0lson@gmail.com>
Reported-by: Andrew Cooper <Andrew.Cooper3@citrix.com>
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
 xen/arch/x86/hvm/hypercall.c | 7 +++++++
 1 file changed, 7 insertions(+)

diff --git a/xen/arch/x86/hvm/hypercall.c b/xen/arch/x86/hvm/hypercall.c
index 030243810e..9128e4d025 100644
--- a/xen/arch/x86/hvm/hypercall.c
+++ b/xen/arch/x86/hvm/hypercall.c
@@ -87,6 +87,13 @@ static long hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
     {
     case PHYSDEVOP_map_pirq:
     case PHYSDEVOP_unmap_pirq:
+        /*
+         * Control domain (and domains controlling others) need to use
+         * PHYSDEVOP_{un,}map_pirq in order to setup interrupts for passthrough
+         * devices on behalf of other guests.
+         */
+        if ( is_control_domain(currd) || currd->target )
+            break;
     case PHYSDEVOP_eoi:
     case PHYSDEVOP_irq_status_query:
     case PHYSDEVOP_get_free_pirq:
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:36:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:36:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283041.481924 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPioW-00066x-2F; Thu, 03 Mar 2022 10:36:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283041.481924; Thu, 03 Mar 2022 10:36:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPioV-00066q-Uu; Thu, 03 Mar 2022 10:36:03 +0000
Received: by outflank-mailman (input) for mailman id 283041;
 Thu, 03 Mar 2022 10:36:02 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPioU-00066Y-FU; Thu, 03 Mar 2022 10:36:02 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPioU-0002iN-DM; Thu, 03 Mar 2022 10:36:02 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPioT-0005tN-S3; Thu, 03 Mar 2022 10:36:01 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPioT-0005i6-Rd; Thu, 03 Mar 2022 10:36:01 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=jEP4hNZj2gEUB4+vsmxE/1CKbyutx5Qc8A7vZW0X0Fw=; b=WsrZwtDlNQ60KI3k4f2wJ2k3/P
	f3OQEO5eZbT/85M1SMSCP0nqsK8h8IEpPQkCThoyV8BOjGPxhIsYh93slD00ArF4N1zoyt60wbQ8d
	BKHGcay4uTTGJ0iXYAuE11V6ejbkbtMp9DiB2OPfjq6OJQ2JMuRi5qd1H/zMcAGhHQOs=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168356-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168356: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=b422b0fcf92dd4103dfc16d8d5f77fbec2d8c5b9
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 03 Mar 2022 10:36:01 +0000

flight 168356 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168356/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 b422b0fcf92dd4103dfc16d8d5f77fbec2d8c5b9
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    2 days
Failing since        168258  2022-03-01 01:55:31 Z    2 days   20 attempts
Testing same since   168356  2022-03-03 06:03:21 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit b422b0fcf92dd4103dfc16d8d5f77fbec2d8c5b9
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Tue Feb 22 11:29:23 2022 +0800

    EmulatorPkg/EmuGopDxe: Set ModeInfo after Open successfully
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2668
    
    WindowOpen will fail in some case. for example, without XServer.
    
    Shouldn't set ModeInfo in this case to avoid the caller use it
    incorrectly
    
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 906242343f7a654402f6f999d447aa9d29a8f4d4
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sun Feb 20 14:53:01 2022 +0800

    MdeModulePkg/GraphicsConsoleDxe: Check status to make sure no error
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2668
    
    SetMode will fail in some case. for example, without XServer.
    Should handle these case when SetMode fail.
    
    If we don't handle it, it will Segmentation fault.
    
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit dc39554d58af4a50b50eca1f57c49415a12b0c98
Author: Xiaolu.Jiang <xiaolu.jiang@intel.com>
Date:   Tue Feb 22 22:14:05 2022 +0800

    edk2/MdeModulePkg/Debuglib: Add Standalone MM support
    
    https://bugzilla.tianocore.org/show_bug.cgi?id=3844
    
    This change added Standalone MM instance of DebugLib.
    
    Reviewd-by: Jian J Wang <jian.j.wang@intel.com>
    Reviewd-by: Liming Gao <gaoliming@byosoft.com.cn>
    
    Signed-off-by: Xiaolu.Jiang <xiaolu.jiang@intel.com>

commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:37:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:37:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283054.481935 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPipg-0006rJ-F8; Thu, 03 Mar 2022 10:37:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283054.481935; Thu, 03 Mar 2022 10:37:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPipg-0006rC-B1; Thu, 03 Mar 2022 10:37:16 +0000
Received: by outflank-mailman (input) for mailman id 283054;
 Thu, 03 Mar 2022 10:37:14 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPipe-0006r1-PT
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:37:14 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e3411698-9add-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 11:37:13 +0100 (CET)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur02lp2056.outbound.protection.outlook.com [104.47.4.56]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-33-zlrstAdNNt2Ozab-kUeVMg-2; Thu, 03 Mar 2022 11:37:12 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM5PR0402MB2836.eurprd04.prod.outlook.com (2603:10a6:203:9c::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Thu, 3 Mar
 2022 10:37:10 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 10:37:10 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e3411698-9add-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646303833;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=8E3RCyIW0RgEyy9HViPcUuRfEwybAzF6dZQbN9GiutQ=;
	b=Sd32mRskojwSmvvbCYplbAL+Aa35NtI9WwTG+RooJ+nAKk2y5i5he8Y40+Csrd0E1r7tBR
	HL6yldyGPFt6nnEZBV+N8TCAWfg6Po1D3Lh8yF/e/xxlUYA9MCJV4YsdnHRMujLpotiZsI
	ZLod2jH5zdascAxLM38N74VOSMosvTE=
X-MC-Unique: zlrstAdNNt2Ozab-kUeVMg-2
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=huBjHBx/0wMZDUxV/GWEOSgz4BKn/qJDFEmQLZfHYHLa4A+wARSi8U3lULGG2tMHMwpw646pVx+O/QO/yibi+Wpjk289yPaW0vIzB6mS1wB8/lbATZA28NTTdh34ZNM5VhXxTOF5Z12YyraKcDLoMLswpnjKK5HE9PPDfrTIroOuSuCSrtkUfDoDC0lzVac/LDf0yHMCYe6+9If8MgWxuTsn8GSRqkZwmHlrnDjxdAMoGFF2awxI3hhhqlThLosASFptNJjhGkTqXkIdp3Mk0bEdMJGwyJaLlAPy7S+2UB3ifbhWDJbhaHh196M8uKtrg8kfU5PsilSSm4gMjBhuhw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=8E3RCyIW0RgEyy9HViPcUuRfEwybAzF6dZQbN9GiutQ=;
 b=HwEWkWra9DxPYwAMY+g81RKt+IQcd8pCVFJrG5cvAnR6mLCWdFuitJ3Su3rJxH8vQkJBtH7AQcvle6xSlNPUicmsyR79b4pBOV5+fPdyxy+jracvf7WiqUw8yowLvDke0TqzOFSozBRiadqAJ0/KkkNHveuWjOhtvPERkArXiVjXBA6jVr9Iw1Uoih6gh/aDbgzwL7EC4esYUaFeS//DkCARi8E0wlvpQOF5YvQmPGmkCs5jqYhj9sH3wtvYqY2fhMfyoYWhMyuQczf7/n3xfH4wgsY39JGzpFVDMfGZcVnrplLmm88VqS5zGBRCnSjZWnCC66IWefxX9ZV/Yms+vg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <3bde2fea-f3fd-3926-b98d-aa0afb549bf8@suse.com>
Date: Thu, 3 Mar 2022 11:37:08 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [XEN PATCH v9 24/30] build: grab common EFI source files in arch
 specific dir
Content-Language: en-US
To: Anthony PERARD <anthony.perard@citrix.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 xen-devel@lists.xenproject.org
References: <20220125110103.3527686-1-anthony.perard@citrix.com>
 <20220125110103.3527686-25-anthony.perard@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220125110103.3527686-25-anthony.perard@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR06CA0124.eurprd06.prod.outlook.com
 (2603:10a6:20b:467::33) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ac44fe53-e442-4d65-d252-08d9fd01c5a5
X-MS-TrafficTypeDiagnostic: AM5PR0402MB2836:EE_
X-Microsoft-Antispam-PRVS:
	<AM5PR0402MB28368DC2D5D976DFCECE9892B3049@AM5PR0402MB2836.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	hnD5FmRkrvp6eBssjkbhV23cKRbAoggKFEG0QqL7tJuHQiLf0fZGl6/qVpSnydYrTgxpVi3bR0hPx9cyaDVTyTCDSmZpCZ9g1EWN/mwalHu2NCM60UFb8J4gPpRsq9CI7RnToyCsfd77Q6NdTt2s/VJ4xuveboZo4/GDudCIHocT1FG59kqeIdPpwzTOeuNLhkf2Hj7FRXLk33H9rdohtmwC/juym2eK0+XGBBLuubv8TLfTv0lVdErdR0gNmYo8CQViz+I9cHpVRkjdkyyv4wE+62ecdIP4DwdVt9mFDhXEa2MBslraJrr8iHMYAjmKvCxD3Zr13jMtipvPor5V6WhC/tSwNor7T+SpwO5g1C0NmoF5kcvM1Y9Q+RiTOutWJkbULE6cIWfE2Np6ZqJTjhRIVR4M25kX9z0HJPRkgYVRUTG8VOLDkyaoqSCMGZzdNgV4Xm36xONcezu3RWwQlFcA5woftrmtx7G1v9vJw91Y+cb6zXi5Da2cMcG0hEiJocAm/q6fI+1Mtq+RBEKVVTWzk4bMx5txk+YCV2chEW4y9ssTWvrco8CuO1JU/58m7Zh9HAGehJY7Hlw9Z0zPzIw55jE+1DI9oBtXMG7RK6L/VSa+3dzTxuT/mXMKxXIKlP7sIeReA48uRBAYkPwF9vqcFaXMkaml/tI2fBvuHJk3j9SFMwN0MRtz0Pt7UW4lIYWkWNLxJagXuzoOQTNRg4uEu2j/HIrUGnrUD2C3GyM=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(53546011)(54906003)(6916009)(186003)(6506007)(6512007)(31686004)(5660300002)(36756003)(2616005)(508600001)(6486002)(2906002)(38100700002)(4326008)(66946007)(8676002)(66556008)(66476007)(26005)(8936002)(7416002)(316002)(86362001)(31696002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?SEVQV2F5Z21CRmM4dmdsM3U0N0tWUWFVUTdDUkJqY0hjNTNyU0h5VEdRemx2?=
 =?utf-8?B?enIwbEpxSkVwSC9heTU4eTQ5NDJIdExOMndlZ0JzT0Rpa1B0QWd5ZnNnNlVl?=
 =?utf-8?B?NjNnb3BTZE5xd0Y1WlFEL1BVb1EwbUJDcHlKRnl1c3Rkc0o5RjUxY3JwU0ZK?=
 =?utf-8?B?Z3BzdFk2TnJ3SkNNK3FYbnNSUTdJTGt0ZXROTVNGOTRYejBndDZLRUZaSklp?=
 =?utf-8?B?Z3hoU3Nkd0ZLY0p3YzcvaWxaMVhxOXM0dksyZ213NXpXMjZBQi9QVXFWUlYy?=
 =?utf-8?B?VzlSOVZtaWZxbVJhS1VSL1RVRVpVSVNTcFNSRkR4N3lQbmZKYTZzWW5Lc3Qx?=
 =?utf-8?B?azVVZlBnaWM0VkZGNUpaM3BBMzdTV3FCMG9UR1VTVm1MaUpFenBkdmFFa3dE?=
 =?utf-8?B?d0pkb3lhOWM1eFRYcjAyeS8rS2dCK2x3SU9TOVNFVDJFVDR3WDJmWHJESE9h?=
 =?utf-8?B?QVkxQldGK3gybnZobzBXSEhtVjdqaTBLL0Z4eXJ4ZjFvaUtYOURiMzVQeVp4?=
 =?utf-8?B?aWFBcVlhcXpBb0c3WjRiL095K1FtYTBubzZwZzJUNFhTSGx1dnNycTgxajRn?=
 =?utf-8?B?VEN6SGdtaVRXOWZGa3BhTjVTbncrTUF0R3VmS1VMS2tSOXJuR2dxVGVlYkVx?=
 =?utf-8?B?Vlg0emFEcUhkZk5rUlJYNG5KQklWdEY5OUwyN0JsSzJhT1ZRYWxHV2xBWVdB?=
 =?utf-8?B?OEsrZFVPbS83L2JUZ0M1aWxZRlRJVEtPNjV4R1BYVjRJQU9OeDJxV1JWU1NY?=
 =?utf-8?B?NGxNalJ3U0xkL0R4Ym9NNnF2QkFIbHBQYlk2ME93eUpzUzhjMmU1ZkZnVUJt?=
 =?utf-8?B?b3QzVDdSVFpKazM5QWthVkp2aElrYUlhbEwyQ0U5TDNEeTNrejFDMG5Wcjl5?=
 =?utf-8?B?VGtiaVNsVWpXNFM0RW1GMFVsZnBqZ1dseFkzQXErNE4wZUNjUnI0NFNWbzJF?=
 =?utf-8?B?d2J4d0ttcFQwZjVPalRiWWJYeHR3NXVqRnpSUnpxTG1XTlYvSXFVTGZhRWJy?=
 =?utf-8?B?RjFtMkFVUDNZeVkrQ3dmc3BqWGpjZTBLdVVuR1JkL29hTDBJeGNmTTRmaDYw?=
 =?utf-8?B?aTIvMmNVc24vOE5VaWNreWdjbnFId1JzNHVxQnVFT3l3Z3FBejVxVm43UTls?=
 =?utf-8?B?dEQ1OGQ3OG1NZEFkcFlkekVqT2hPdzZTLzFuQVo0OFFEVGJtM2pwNnFNNzRP?=
 =?utf-8?B?V2RTd3A3YSsrcXo1VTZzMjN0NndaYzNIU1ZZOWlkVjh1MDFpM1AwbllBWnYx?=
 =?utf-8?B?UkNrNkxRTmdWRjFCSnpjb1NWWG1WZUx3Ym8xVkQ2WEtJREFrU0ZDd3ZGa21N?=
 =?utf-8?B?dDZyUXc4bXdSR2x2MGZIZDViZHNMd0hXL2FrVnBINnFBUXBEcFV2MzNPancr?=
 =?utf-8?B?ODU1NVpKM1ZRY0R2MVNuWVd3d29NUnA0d1hWYUVIQ3c2d1hvYTRJRTJNalNi?=
 =?utf-8?B?UzBJb3ZPK1F6SWlPc1N3MnlVWUZRUlNNa2FSSXhoUlZ0UTk1REpqelpWQWVS?=
 =?utf-8?B?bERBQUdlQ2dZYVFkdk02cmVOOGx4cW1YclhCQUZMRUdjd01UdnBCSU14Nk9B?=
 =?utf-8?B?cnJ6N3FWOVdJTnFVQldqZ3gvL1paOTZJSm9rSTJ5SG13eTh1aEg3N28wcGM3?=
 =?utf-8?B?OERaS3kzVEI2Vm9jUXlrR1c4Z3FkVlhvcTRNMWZjTVZMb284SzNCcGdKWHh4?=
 =?utf-8?B?eXQrSXA4WUVSb0JnUGJ0R0xQNjl5ME8yWG9XTzR2RzNBUWNUcEc5Tyt2VWUr?=
 =?utf-8?B?eDc0cHY3ZTJlbFBaenZhZ0FHR1h1bUc2ZnJ0dXhWaUlSNG0rbHEyZnZuenFG?=
 =?utf-8?B?eHVCNEtrTmluUE5xL2FTK1N5SlAxcXVrNXFaY2p5TVpmdFZ2YzZ6SENXaExv?=
 =?utf-8?B?dlZiS1IzY1VjNWx2ZStvRXJtN1dIMzFXeWYyTjV1N2tyYjBzUW1TeUUxc0xi?=
 =?utf-8?B?akJKN0I0ZkhUTmRUZ1gzUU56UDZCUmJtd0RHajRxMDZtcWVCclRaeG9mQkFW?=
 =?utf-8?B?Rk8rcDhGODVtL0hZSng4NnM0TmVPL2lrZkFhVVhham1RTkZTZnFRdThaQm9B?=
 =?utf-8?B?QXlQUDhSVlFsT29UWTQ4WHdURnByelNhOWpZbWdmUnpKVmgxTFNiMzR2ajJu?=
 =?utf-8?B?eGlhT0ZUQUc0ODRxdGovQzlvN1hvTmVwNGYrVWdXQ3VNaWZjcU9abTFDUTFO?=
 =?utf-8?Q?PMEqWDFd966LeSfXboTxSqA=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ac44fe53-e442-4d65-d252-08d9fd01c5a5
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 10:37:10.4284
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: +wGmRaJSy+SyKNDb8xVSer2WZkRURJb4XRdP2TbcqwSQu3PT1Gw2ky8mZNEE3aQRicD1pwbIuscNlt/cnHcL/w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0402MB2836

On 25.01.2022 12:00, Anthony PERARD wrote:
> --- a/xen/arch/x86/Makefile
> +++ b/xen/arch/x86/Makefile
> @@ -77,8 +77,9 @@ obj-$(CONFIG_COMPAT) += x86_64/platform_hypercall.o
>  obj-y += sysctl.o
>  endif
>  
> -# Allows "clean" to descend into boot/
> +# Allows "clean" to descend
>  subdir- += boot
> +subdir- += efi

No similar addition is needed for Arm?

> --- /dev/null
> +++ b/xen/common/efi/efi-common.mk
> @@ -0,0 +1,15 @@
> +EFIOBJ-y := boot.init.o pe.init.o ebmalloc.o runtime.o
> +EFIOBJ-$(CONFIG_COMPAT) += compat.o
> +
> +CFLAGS-y += -fshort-wchar
> +CFLAGS-y += -iquote $(srctree)/common/efi
> +
> +# Part of the command line transforms $(obj) in to a relative reverted path.
> +# e.g.: It transforms "dir/foo/bar" into successively
> +#       "dir foo bar", ".. .. ..", "../../.."
> +$(obj)/%.c: $(srctree)/common/efi/%.c FORCE
> +	$(Q)ln -nfs $(subst $(space),/,$(patsubst %,..,$(subst /, ,$(obj))))/common/efi/$(<F) $@

What is the "reverted" about in the comment? Also (nit) I think you want
s/in to/into/.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:41:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:41:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283063.481946 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPito-0008Gr-13; Thu, 03 Mar 2022 10:41:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283063.481946; Thu, 03 Mar 2022 10:41:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPitn-0008Gk-T1; Thu, 03 Mar 2022 10:41:31 +0000
Received: by outflank-mailman (input) for mailman id 283063;
 Thu, 03 Mar 2022 10:41:31 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPitn-0008Ge-1U
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:41:31 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 7c2cd8bc-9ade-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 11:41:30 +0100 (CET)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur03lp2053.outbound.protection.outlook.com [104.47.9.53]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-34-JOI5RF6VPx6BHdy0hAaIGw-1; Thu, 03 Mar 2022 11:41:28 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR0402MB2783.eurprd04.prod.outlook.com (2603:10a6:800:ae::20)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Thu, 3 Mar
 2022 10:41:26 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 10:41:26 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 7c2cd8bc-9ade-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646304089;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=DYJVT3wzSyrUbROzTeEqtNq0FW5NMcpmiJ1XOZB20bM=;
	b=f0Q7f57gEOtVn5C7HYZDiS0Vj0cbznINVUP3GHdY4zi4GTx9/XaTsGSpftvNOmx5CakrKb
	qnBd+CUBWYO2br3zlFQEU9GvXlvEyxp9eCA0gVJJa4wj9oIxLPoDlIcJloKq1/tLrnHj/o
	ZP17gWC0ATlmuYRrlekY5HKzY6lc1KU=
X-MC-Unique: JOI5RF6VPx6BHdy0hAaIGw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=SMlIdcru6duqfH/UbH3LdgEa4tYbLz4Y0dlAfUEIi9fY32YM4V6vng2WIL+1UwrOfS7IAll9ISJ6fN6jV55+/f3nF/zXwZaliOJycZ87qJdsVXRh3VR3zpeZ6FSSRZphjCvwaILrylrDRxjkerH7NW712KlkIxSFRwg+g5XH+2qOIe1ETfNv34NnqizjvkZIX0pBMvHUiO4jCTL2BPkeCCaP7rJ+70yvsDr7d6WWNKcwPap0WJ8riOjG3AflWAUH7uoeIvJO/a2WgvA/tHUGwa/tWVdOwN9j2zAn+GWPC+tJ8gkBfusevbXXj6j8v2An8JJ3XBznBA+oTX1jroqxUQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ocrnWVGVJseQsq/tw8U64QEYWft8t5ClbHcEqgkCQsM=;
 b=g0ZaryL1wJjgoz3ozcI7TLjsUAMYAAYtmgRweK3H9Q0tixSav+J3UeJlJGbXOiYnjefVtVhsNBV0xT+7U4OCPLhbtkNI29LSxN8oItiPbsg0Af8KBxynXT46EarK4G/3EKcQglh6SavYqmj8EuyVOrYtLu6+jxbe33a3qGaOIP7xI8lm9BfnX9/0I9pcBVpGiP18czz28IdIsxhUgrOWdOtdpVqDUbqwJSkW7FNZ/B6EGUJwNObQukYA809Jo3a/6GDBTYx7qwGaWPDvQ/Oru7/mONXzUzaCWmyxEM03GBjVwFZ4tg+dIkv2qiyqVIhw5/8H395p//4dDAJoFh24Mg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <3caca736-fb83-93be-3217-d858dc9f9b56@suse.com>
Date: Thu, 3 Mar 2022 11:41:24 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] xen/CET: Fix __initconst_cf_clobber
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <20220302221005.16636-1-andrew.cooper3@citrix.com>
 <8eb7d30e-32de-fdee-43c9-3500fb10e6ee@suse.com>
 <36e72452-1ae2-93b3-c5ba-88707dfe47a5@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <36e72452-1ae2-93b3-c5ba-88707dfe47a5@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM5PR0601CA0032.eurprd06.prod.outlook.com
 (2603:10a6:203:68::18) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2e6ba05c-05a9-4821-15e1-08d9fd025e73
X-MS-TrafficTypeDiagnostic: VI1PR0402MB2783:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR0402MB27834F78C820E39C8C2ACF62B3049@VI1PR0402MB2783.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(31686004)(5660300002)(2906002)(36756003)(2616005)(54906003)(26005)(53546011)(186003)(6506007)(6512007)(8936002)(45080400002)(66556008)(66476007)(316002)(38100700002)(31696002)(86362001)(508600001)(6486002)(66946007)(8676002)(4326008)(6916009)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?Qp7eBwRFAqVtYlZhS8teAsj7ru0RBGCoFYn2KnF0fzCQy3gAiE9491qWjsx2?=
 =?us-ascii?Q?rsrS1SyWhqACpPcIX5q9RkIOyt/k7E/p2MyoGgFoHAhtWoOcGRzxr4sXyMC0?=
 =?us-ascii?Q?DRLJGulX/qXvehdikmpDgs6NyAAQwraun6XBDqnFONF6wUhwzU8xtMfc3SMb?=
 =?us-ascii?Q?r115lgeJlhQTuPUhvj1nBoVhBlR/EiH9TyzoepJWzYyWq+eBvj+zeNTWzWro?=
 =?us-ascii?Q?ICSUyNR2p0XUVVdyp9Pgi0bzixkQtYsC/bVLpU6SEx8wScPAmgVaT03tKpSj?=
 =?us-ascii?Q?QOrWWqw44P+zHvYLj/pwX4EqruqJ2R6u0T8uqqPWl0/LybkouH9v5AgJuY5h?=
 =?us-ascii?Q?kiOeNzWst2O4VO/ncNNc+26AtpQiq3YvTBURyDxS4pjToH+9vNxN7tGm1S+9?=
 =?us-ascii?Q?HO6rM2HSSLNT3jUt8ugG3+5m/axygfDGtJpZXRZvGUOgeF4ZOh9Q/aMkvcMk?=
 =?us-ascii?Q?dyDUZzouaomer94WqB/11DKrLUxLcrfhVTc34o2Ns/FhcoXTrFqTVL703+ZW?=
 =?us-ascii?Q?3pfBkIpsoY5vVsKcAPvRkltJ1HDBJDBwZGhXf8YXFcaqF4lcOnQwvbgfnsqS?=
 =?us-ascii?Q?znKAKekM9761NSMuTka5FiV8tHLscUGXORj141/ue0mKaYHE7FMhYKlaFgUw?=
 =?us-ascii?Q?cMgNxbLZabWSISdoShJeZIAosEZ0ZQRJ0mZsVGahpKet4OffCpjdd262lcs7?=
 =?us-ascii?Q?rfNq1sqhff+0+kWY16TAU6tyPM9PlouJN7pXRgRbzg8s3xg/iVopHxgswKnR?=
 =?us-ascii?Q?y8+B4lRg0Miy1Abyf5Sjt0xA9rzaiL0k3wZDX3DLrWAuU0L84g0z7FqJA6Mz?=
 =?us-ascii?Q?fF88gUB7BSXxHKDxx2BZ2ZwSd4NQbfn71Zh0J1fHyS6YYVbZWEE3V/abruE/?=
 =?us-ascii?Q?ISA3qd7jtsNZEEnuhEZjhhttMJkboF/nhmYLR38mP1AiWgpWsx/Ymjv2qWPX?=
 =?us-ascii?Q?hfkym0MBVYVGVRy3yHB5f/q7TFchMSHA7gdCryFIrMc/N6z4GuPRvBuhoHor?=
 =?us-ascii?Q?QJ11nn6/lP2tk3uPF1MwZq79rG3cX3vfu/xQ6B4keZaCXF0GHA921DN36VOB?=
 =?us-ascii?Q?lnkpl2XTwDpHzs17YABy1oH0rc/x8DuRQzKcTZiP/umYM0n3WgWTEl3yYFZT?=
 =?us-ascii?Q?fzajtEHrMbNPQlFBguXbP6yTThXSN9lZli7CNpKMBgO4EEBP0mFdi/amePlK?=
 =?us-ascii?Q?QXpbO2dLUAx8vGrOEsF17npK5911XIjyqKmo8DBsg3/dVcpFcgScFJHnqncs?=
 =?us-ascii?Q?+57bAMYsD5gN37rEZYPbk/Ep6ESj/G3Dw51CscUB1BkN9hv8o/pOW20i/UWT?=
 =?us-ascii?Q?NNLDKLIGrqYEN3gq5pL1baj/LW44quduLUNFBbFAc61iLosNFRJba77qJygh?=
 =?us-ascii?Q?DAdvR2kig/Nd6LPLtaMJJENzB18WS8+TgzmsQKEIvlDCyx5WhqbLR9D5QK1/?=
 =?us-ascii?Q?Uo9wr/w5AY4gBXoselcIZeVpUkiCC9C2MKTQN1phqQNlaEB1cy0ynOs+cy1e?=
 =?us-ascii?Q?FpHjdBQXvVl59U0/hX6IbJiiNzJQqZdwv82eO++G+M6YDMeDD+81mZBdDy+5?=
 =?us-ascii?Q?xsz1RtcD0LB9s8JeDrlOOC35CFeNg2exQJJrryDrgJwCtB5SwektqVj/JKYt?=
 =?us-ascii?Q?BobUZH6g4SmDfFK49t2kby4=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 2e6ba05c-05a9-4821-15e1-08d9fd025e73
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 10:41:26.8654
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: atpOh+lhfjBvLWZ4rms8nZxO1IbbRkNfFDlKeZYmsU+eNBFrWOh4NfvqVTsBzmM9/JfnVNbbE77SozNrNEKdMA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0402MB2783

On 03.03.2022 11:29, Andrew Cooper wrote:
> On 03/03/2022 07:35, Jan Beulich wrote:
>> On 02.03.2022 23:10, Andrew Cooper wrote:
>>> --- a/xen/arch/x86/xen.lds.S
>>> +++ b/xen/arch/x86/xen.lds.S
>>> @@ -210,6 +210,12 @@ SECTIONS
>>>    DECL_SECTION(.init.data) {
>>>  #endif
>>> =20
>>> +       . =3D ALIGN(POINTER_ALIGN);
>>> +       __initdata_cf_clobber_start =3D .;
>>> +       *(.init.data.cf_clobber)
>>> +       *(.init.rodata.cf_clobber)
>>> +       __initdata_cf_clobber_end =3D .;
>>> +
>>>         *(.init.rodata)
>>>         *(.init.rodata.*)
>> I wonder if this shouldn't really be two sections. Live-patching will
>> need to supply two ranges to apply_alternatives() anyway (one for each
>> section, unless you want to start requiring to pass a linker script to
>> "$(LD) -r" when generating live patches, just to fold the two sections),
>> so in the core hypervisor we may want to follow suit.
>=20
> I don't see why livepatches would need two sections - they're linked in
> a similar way to Xen IIRC.=C2=A0 Either way, if changes are needed, they
> should be part of the livepatch work.

Live patch objects being relocatable ones, their loading logic works with
section boundaries. Hence there'll be two sections of interest, the
boundaries of which are independent and hence need passing as separate
values.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:43:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:43:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283074.481957 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPivY-0000US-H3; Thu, 03 Mar 2022 10:43:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283074.481957; Thu, 03 Mar 2022 10:43:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPivY-0000UL-Dm; Thu, 03 Mar 2022 10:43:20 +0000
Received: by outflank-mailman (input) for mailman id 283074;
 Thu, 03 Mar 2022 10:43:19 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=HbtR=TO=arm.com=Wei.Chen@srs-se1.protection.inumbo.net>)
 id 1nPivW-0000UD-OC
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:43:19 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04on0607.outbound.protection.outlook.com
 [2a01:111:f400:fe0e::607])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id bb683356-9ade-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 11:43:16 +0100 (CET)
Received: from AM5PR0502CA0010.eurprd05.prod.outlook.com
 (2603:10a6:203:91::20) by AM6PR08MB3736.eurprd08.prod.outlook.com
 (2603:10a6:20b:87::12) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.24; Thu, 3 Mar
 2022 10:43:11 +0000
Received: from VE1EUR03FT045.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:203:91:cafe::c5) by AM5PR0502CA0010.outlook.office365.com
 (2603:10a6:203:91::20) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Thu, 3 Mar 2022 10:43:08 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT045.mail.protection.outlook.com (10.152.19.51) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Thu, 3 Mar 2022 10:43:08 +0000
Received: ("Tessian outbound 341d209a0e52:v113");
 Thu, 03 Mar 2022 10:43:07 +0000
Received: from 50e3d5e8ecfd.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 413D6BA5-77B6-4F5D-B47B-4E2FC46855DE.1; 
 Thu, 03 Mar 2022 10:43:02 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 50e3d5e8ecfd.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 03 Mar 2022 10:43:02 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com (2603:10a6:102:2b9::9)
 by AM0PR08MB5426.eurprd08.prod.outlook.com (2603:10a6:208:184::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.13; Thu, 3 Mar
 2022 10:43:00 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa]) by PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa%4]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 10:43:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: bb683356-9ade-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=HCD6Q6GpYs4ZMk7FNJRJdzfMT90uWPMZvbl4dWtBx3E=;
 b=rUHoETNTjVNdjVR8/ol3xUJC6VLUOvfl3RvTjOFydsRz1AhEQUeYG59AlbyRTx6UX+ZPAp7h0akoBH6+JTYpReHbJYKYbe6ZFQB6e+jyrjLgWs69mMfAadDg0H0WkFCxLdY/S5s196m6HzV1dLXuIrQ4DN7te3OD/O7Uo6bf42c=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=XfJ1bw76v1uUO8HYzHC4C2bC3I0mcm2OKZlqq6aZdN7uPMQiewalVTrQPIdyyF02duam6EP7rBFF85sD7m2zzCQl3kNSYwC/jAhlJgdHmfgZaz3YZtjuvgyfX10m1eDZh5e01WGgsX057enaRFdlYW+5ulPBJPt50QAl8soNaXhzn8qlG4acVDPCGvdtoKaqq8v07u4Ya4GhxbyfNV7eZyZ97kHZntAxI/8QL7Cee+LKA3I5S50qxiUunKL07HmrIj8ooJuniLja1Ct92gDurQaEqBVXXSsEZjYJHH3O5aRlniDDboqwa3RfT5hO6HmRy1r1S10vDIN7Hz+QSP867g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=HCD6Q6GpYs4ZMk7FNJRJdzfMT90uWPMZvbl4dWtBx3E=;
 b=j7xKwaCKHmxJ5tmC9ByScfN3398rdcVDINBT+37CrO/kYIOnWbw7DrtLCm2liLSNTODsDYKf49dIRJ1bgSLkZmgepe4IGUOEwO5o/e+dSR1u+IEwuClfmo+PBw8y+LzLaSP5fxAU3eoM7ECj0BBWmoWwkl8lQtyLnBJzQQLh9eMxgRsQrDMQwK2aHarcY6hOKa+RDsmFVT64W3FGOD5bjnleAxVsD5bZ5t8jDdVG0oMiGDBt2+PvpunP+6ESdDYkd5fGow83WtTTEtAUvFgqQt+Q8aAG6Y9rrq+WgdAWxmJ6KRAQQNPHAU8v9YXsETHERExVq/BF0U+YFGGh4BD8QA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=HCD6Q6GpYs4ZMk7FNJRJdzfMT90uWPMZvbl4dWtBx3E=;
 b=rUHoETNTjVNdjVR8/ol3xUJC6VLUOvfl3RvTjOFydsRz1AhEQUeYG59AlbyRTx6UX+ZPAp7h0akoBH6+JTYpReHbJYKYbe6ZFQB6e+jyrjLgWs69mMfAadDg0H0WkFCxLdY/S5s196m6HzV1dLXuIrQ4DN7te3OD/O7Uo6bf42c=
From: Wei Chen <Wei.Chen@arm.com>
To: Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	Bertrand Marquis <Bertrand.Marquis@arm.com>, Penny Zheng
	<Penny.Zheng@arm.com>, Henry Wang <Henry.Wang@arm.com>, nd <nd@arm.com>
Subject: RE: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Topic: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Index:
 AdgpQxtXwh7LkfydTgiYk9bhMgU+ogAn0mUAABEK2UAAF1ylAACsO9YwAA5uZgAAI3g7sAAIzZgAAB9QTKAAEI0UgAAC/Q2w
Date: Thu, 3 Mar 2022 10:43:00 +0000
Message-ID:
 <PAXPR08MB742076A5816B26569DBAEA429E049@PAXPR08MB7420.eurprd08.prod.outlook.com>
References:
 <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2202241606450.239973@ubuntu-linux-20-04-desktop>
 <AS1PR08MB74269923288B75097392BDD99E3E9@AS1PR08MB7426.eurprd08.prod.outlook.com>
 <4c558f8f-56d4-0445-32d4-169bc5d0a3bc@xen.org>
 <PAXPR08MB74200F4B0B4EFFD5BE1A6E699E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <7260f050-9022-4adf-618b-a8b271aca8c3@xen.org>
 <PAXPR08MB7420B367FFEB4FD3A7C88EB79E039@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <5eb5fe51-9ef7-affe-06e1-b15da512a76c@xen.org>
 <PAXPR08MB7420836458E512FE375B8F199E049@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <4058b2c7-4c46-bdb1-017d-69a934989071@xen.org>
In-Reply-To: <4058b2c7-4c46-bdb1-017d-69a934989071@xen.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: B1A6B33F65117443972F46E9BFAFEEFC.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: dc970619-1ab5-446d-76b0-08d9fd029b10
x-ms-traffictypediagnostic:
	AM0PR08MB5426:EE_|VE1EUR03FT045:EE_|AM6PR08MB3736:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR08MB37363F0A712F6EF6B04A7BA99E049@AM6PR08MB3736.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAXPR08MB7420.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(5660300002)(110136005)(71200400001)(8936002)(316002)(64756008)(66556008)(66446008)(66476007)(52536014)(4326008)(8676002)(2906002)(186003)(26005)(54906003)(38070700005)(86362001)(508600001)(66946007)(76116006)(55016003)(9686003)(7696005)(53546011)(6506007)(38100700002)(122000001)(33656002)(83380400001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB5426
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT045.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	45e8fbec-7e58-4ef6-7031-08d9fd02962f
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(508600001)(5660300002)(4326008)(316002)(55016003)(8936002)(47076005)(7696005)(70586007)(52536014)(53546011)(40460700003)(8676002)(6506007)(70206006)(86362001)(186003)(36860700001)(336012)(26005)(33656002)(81166007)(9686003)(356005)(82310400004)(83380400001)(2906002)(54906003)(110136005);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 10:43:08.1851
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: dc970619-1ab5-446d-76b0-08d9fd029b10
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT045.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB3736

SGkgSnVsaWVuLA0KDQo+IC0tLS0tT3JpZ2luYWwgTWVzc2FnZS0tLS0tDQo+IEZyb206IEp1bGll
biBHcmFsbCA8anVsaWVuQHhlbi5vcmc+DQo+IFNlbnQ6IDIwMjLlubQz5pyIM+aXpSAxNzoxNQ0K
PiBUbzogV2VpIENoZW4gPFdlaS5DaGVuQGFybS5jb20+OyBTdGVmYW5vIFN0YWJlbGxpbmkNCj4g
PHNzdGFiZWxsaW5pQGtlcm5lbC5vcmc+DQo+IENjOiB4ZW4tZGV2ZWxAbGlzdHMueGVucHJvamVj
dC5vcmc7IEJlcnRyYW5kIE1hcnF1aXMNCj4gPEJlcnRyYW5kLk1hcnF1aXNAYXJtLmNvbT47IFBl
bm55IFpoZW5nIDxQZW5ueS5aaGVuZ0Bhcm0uY29tPjsgSGVucnkgV2FuZw0KPiA8SGVucnkuV2Fu
Z0Bhcm0uY29tPjsgbmQgPG5kQGFybS5jb20+DQo+IFN1YmplY3Q6IFJlOiBQcm9wb3NhbCBmb3Ig
UG9ydGluZyBYZW4gdG8gQXJtdjgtUjY0IC0gRHJhZnRBDQo+IA0KPiBIaSBXZWksDQo+IA0KPiBP
biAwMy8wMy8yMDIyIDAxOjM1LCBXZWkgQ2hlbiB3cm90ZToNCj4gPj4+IDEuIEFzc2VtYmx5IGNv
ZGUgZm9yIEVMMSBNUFUgY29udGV4dF9zd2l0Y2gNCj4gPj4NCj4gPj4gVGhpcyBkaXNjdXNzaW9u
IHJlbWluZHMgbWUgd2hlbiBLVk0gZGVjaWRlZCB0byByZXdyaXRlIHRoZWlyIGNvbnRleHQNCj4g
Pj4gc3dpdGNoIGZyb20gYXNzZW1ibHkgdG8gQy4gVGhlIG91dGNvbWUgd2FzIHRoZSBjb21waWxl
ciBpcyBhYmxlIHRvIGRvIGENCj4gPj4gYmV0dGVyIGpvYiB0aGFuIHVzIHdoZW4gaXQgY29tZXMg
dG8gb3B0aW1pemluZy4NCj4gPj4NCj4gPj4gV2l0aCBhIEMgdmVyc2lvbiwgd2UgY291bGQgYWxz
byBzaGFyZSB0aGUgc2F2ZS9yZXN0b3JlIGNvZGUgd2l0aCAzMi1iaXQNCj4gPj4gYW5kIGl0IGlz
IGVhc2llciB0byByZWFkL21haW50YWluLg0KPiA+Pg0KPiA+PiBTbyBJIHdvdWxkIHN1Z2dlc3Qg
dG8gcnVuIHNvbWUgbnVtYmVycyB0byBjaGVjayBpZiBpdCByZWFsbHkgd29ydGgNCj4gPj4gaW1w
bGVtZW50aW5nIHRoZSBNUFUgc2F2ZS9yZXN0b3JlIGluIGFzc2VtYmx5Lg0KPiA+Pg0KPiA+DQo+
ID4gSXQncyBpbnRlcmVzdGluZyB0byBoZWFyIEtWTSBndXlzIGhhdmUgc2ltaWxhciBkaXNjdXNz
aW9uLiBZZXMsIGlmIHRoZQ0KPiA+IGdhaW5zIG9mIGFzc2VtYmx5IGNvZGUgaXMgbm90IHZlcnkg
b2J2aW91cywgdGhlbiByZXVzaW5nIHRoZSBjb2RlIGZvcg0KPiAzMi1iaXQNCj4gPiB3b3VsZCBi
ZSBtb3JlIGltcG9ydGFudC4gQXMgb3VyIGN1cnJlbnQgcGxhdGZvcm0gKEZWUCkgY291bGQgbm90
IGRvIHZlcnkNCj4gPiBwcmVjaXNlIHBlcmZvcm1hbmNlIG1lYXN1cmVtZW50LiBJIHdhbnQgdG8g
a2VlcCBjdXJyZW50IGFzc2VtYmx5IGNvZGUNCj4gdGhlcmUsDQo+ID4gd2hlbiB3ZSBoYXZlIGEg
cGxhdGZvcm0gdGhhdCBjYW4gZG8gc3VjaCBtZWFzdXJlbWVudCB3ZSBjYW4gaGF2ZSBhDQo+IHRo
cmVhZA0KPiA+IHRvIGRpc2N1c3MgaXQuDQo+IA0KPiBJIGJyaWVmbHkgbG9va2VkIGF0IHRoZSBj
b2RlLCB0aGUgYXNzZW1ibHkgdmVyc2lvbiBpcyBub3QgZ29pbmcgdG8gYmUNCj4gdHJpdmlhbCB0
byByZXZpZXcgYW5kIHdlIGRvbid0IGtub3cgeWV0IHdoZXRoZXIgaXQgaGFzIGFuIGFkdmFudGFn
ZS4gU28NCj4gSSB3b3VsZCBzYXkgdGhpcyBzaG91bGQgYmUgdGhlIGludmVyc2UgaGVyZS4NCj4g
DQo+IFdlIHdhbnQgdGhlIEMgdmVyc2lvbiBmaXJzdCB1bnRpbCB3ZSBjYW4gcHJvdmUgdGhlIGFz
c2VtYmx5IHZlcnNpb24gaXMNCj4gYmV0dGVyLg0KPiANCj4gTXkgZ3V0IGZlZWxpbmcgaXMgd2Ug
d2lsbCBub3QgbmVlZCB0aGUgYXNzZW1ibHkgdmVyc2lvbi4NCj4gDQoNCk9rLCB3ZSB3aWxsIHJv
bGxiYWNrIHRvIEMgdmVyc2lvbi4gQWZ0ZXIgd2Ugd2lsbCBmaW5pc2ggdGhlIG1lYXN1cmVtZW50
cywNCnRoZW4gd2Ugd2lsbCBkaXNjdXNzIGl0IGFnYWluIChpZiB0aGUgYXNzZW1ibHkgaGFzIGVu
b3VnaCBnYWluKS4NCg0KPiBDaGVlcnMsDQo+IA0KPiAtLQ0KPiBKdWxpZW4gR3JhbGwNCg==


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:44:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:44:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283080.481968 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiwB-00013j-QB; Thu, 03 Mar 2022 10:43:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283080.481968; Thu, 03 Mar 2022 10:43:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiwB-00013c-N6; Thu, 03 Mar 2022 10:43:59 +0000
Received: by outflank-mailman (input) for mailman id 283080;
 Thu, 03 Mar 2022 10:43:58 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=PW1S=TO=citrix.com=prvs=05474af58=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nPiwA-0000UD-BH
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:43:58 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d308c918-9ade-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 11:43:57 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d308c918-9ade-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646304236;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=LA/++7o8fP9kUZr0VkOJ744dr9ThRKsw46rD6JONXoE=;
  b=RUE1auUqWCytuUSCjFDPgRwIY3rgKuS/dCPhxOjXSl/R/8OpLDChS8Q0
   BJCYSK5lXRnhDkmhpSIuNI0cF/sYfbjWXMtZ5iG/CyJ97uJcSqkzrCk/l
   8TFPK2YnNfd6HtaOorOk+3wfZm+8g5sM65dWksv217q+D3nsffNpSOTGp
   8=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65299608
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:g73L2a3p8j1Ea35AyvbD5dhxkn2cJEfYwER7XKvMYLTBsI5bpzRRx
 2FJDWiFMviKYWTyct4iadni8k9QsZfRxtZkQFZvpC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUw2oDga++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /0VjrrvTg0WOpfN28FECD0HKiJvGYd/reqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHxO4wSoDd4xCzxBvc6W5HTBa7N4Le02R9u25ofTKiGN
 6L1bxJQZhnkQwJzKmwRGZElkM72mCLhYQBH/Qf9Sa0fvDGIkV0ZPKLWGMrYfJmGSNtYmm6cp
 3na5CLpDxcCLtudxDGZtHW2iYfngSP6Q8QTD/uxrvpxh1u7yWkaCRlQXly+ycRVkWbnBYgZc
 RZNvHNz8+5iryRHU+URQTXgm1jbuRQjX+BRUMhjsyXS86nFxyygUz1soiF6VPQqs8o/RDoP3
 1CPns/0CTEHjIB5WU5x5Z/P82rsZHF9wXsqIHZdEFBbu4WLTJQb00qXJuuPBpJZmTEc9dvY5
 zmR5BYziLwI5SLg//XqpAuX695AS3Wgc+LU2uk1dj/9hu+aTNT8D2BN1bQ9xawaRGp+ZgPc1
 EXoY+DEsIgz4WilzURhutklErCz/OqiOzbBm1NpFJRJ323zpyD5Id4MsWoheR4B3iM4ldnBO
 hW7VeR5vsI7AZdXRfUvP9LZ5zoCl8AM6ugJptiLN4ETM/CdhSeM/T10ZF744oweuBNErE3LA
 r/CKZzEJS9DUcxPlWPqL89Age5D7n1vngv7GMGkpylLJJLDPRZ5v59eawDQBg34hYvZyDjoH
 yF3bJPbm00CC7SlOkE6M+c7dDg3EJTyPrivw+R/fe+fOAt2XmYnDv7a27Q6fIJ52a9Sk4/1E
 ruVACe0FHKXaaX7FDi3
IronPort-HdrOrdr: A9a23:7qHh9q+Y8zXBUet8P3duk+E8db1zdoMgy1knxilNoENuHPBwxv
 rAoB1E73PJYVYqOE3Jmbi7Sc+9qFfnhONICO4qTMuftWjdyRGVxeRZjLcKrAeQfhEWmtQtsZ
 uINpIOd+EYbmIK/foSgjPIa+rIqePvmMvD6Ja8vhVQpENRGtpdBm9Ce3em+yZNNXB77PQCZf
 2hDp0tnUvfRZ1bVLXxOlA1G8z44/HbnpPvZhALQzYh9Qm1lDutrJr3CQKR0BsyWy5Ghe5Kyx
 mJryXJooGY992rwB7V0GHeq7xQhdva09NGQOiBkNIcJDnAghuhIK5hR7qBljYop/zH0idhrP
 D85zMbe+hj4XLYeW+45TPrxgnbyT4rr0TvzFeJ6EGT1/DRdXYfMY5slIhZehzW5w4Lp9dnyp
 9G2Gqfqt5+EQ7AtD6V3amHazha0m6P5VYym+8aiHJSFaEEbqVKkIAZ9ERJVL8dASPB7pw9Gu
 UGNrCS2B9vSyLbU5nlhBgt/DT1NU5DXCtuA3Jy9vB96gIm3UyQlCAjtYkidnRpzuNLd3AL3Z
 WBDk1SrsA9ciYnV9MPOA4/e7rDNoXse2OEDIvAGyWuKEk4U0i936Ifpo9Fo92XRA==
X-IronPort-AV: E=Sophos;i="5.90,151,1643691600"; 
   d="scan'208";a="65299608"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Uv0FF1bQ+r5wSa6hRtqO/wySPA6/aGvFPAItTrM1ORVYv47fz6uETFzmGd9dSgxvsApcCoiU8BMbTNqrVcNEOahMOpbvNXeRFWbF6DcjPee1Kgp80l6vRYe8mm1wDLTYeaRRUps0Zd4ba0TcthR7nPIJEtQ6IAHngi5CuIt+5VKSx1N7mF8CmJWL58LvrJpXhlgKqGnmiRT5638++ewLXXdTy/WafiGw5HeozVWb5AutU1xIaKckaql2vc1Z3hKQV4nK2+ETMUi8+Wo9BBV1up0r/A55RJ11airOzJ8SKltGo30TpSs/Zl98ySR2xFSSTvEIoibQa617UP1cVq+2VA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=UqWAYvfvGDjJAHRQH+uBn2KdGRf0bs5xU5VaKskiyI4=;
 b=Lbea8xShwn3Jo1lzi13vlPNe2XYMOXA/BJv3FrgoyOMkziFAZLAqBzwA271bq28hzS28/5IPi7NqoFH9B34oiHsGMf9z693Sm4HXxtlEaLiTShhpAi8s/927ZHifdF/j5lyzt8k9u02Ryu7C1Yldk7o7sS4uTTTN9rP4vAe+LuCOmD426/5YekT+8oTgIl9MiWj7i9ziGa0ljh0OAQ1asjxgrd5XalF01FHhHOOqPDYcXXtLFB62URuSKVwv2gx8IWhivi0fKwuj5boMzgiKqvetBG3Jz5wlMHLw8dZ2Z6iyFNjPzrnQ4t+cs25LH0eSwnPZWEl3oTxHqX8jv/Lnew==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=UqWAYvfvGDjJAHRQH+uBn2KdGRf0bs5xU5VaKskiyI4=;
 b=vpcTcIFXrLtNfgcKTN2Ufg8j6a1dypn4Nkfac5eGhYRJec8O1AYd8y/YTo/LZedmbxocAGw+xx4joLlqgqzlPJdiT6LfOaUFZjNUVTv8RC3FE2aQ7L0zqtOAOiuxDQT4OOE6+i1Ht5Dhw8UeM8zBj5BWh1SSBhk+bz82EvroFYw=
Date: Thu, 3 Mar 2022 11:43:37 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: Alex Olson <this.is.a0lson@gmail.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
Subject: Re: PIRQ handling and PVH dom0?
Message-ID: <YiCb2Tk+XxFnCIN5@Air-de-Roger>
References: <7c85d28831f3f30fb61bb359a23f570c34b4d31a.camel@gmail.com>
 <6ad3e3f9-0d3d-4223-0951-0f8ee7fa4b8b@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <6ad3e3f9-0d3d-4223-0951-0f8ee7fa4b8b@citrix.com>
X-ClientProxiedBy: LO4P123CA0091.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:191::6) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: a750087e-7c11-4617-995d-08d9fd02af5b
X-MS-TrafficTypeDiagnostic: CO1PR03MB5764:EE_
X-Microsoft-Antispam-PRVS: <CO1PR03MB57644CF05B5ADE9886C1350A8F049@CO1PR03MB5764.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(186003)(26005)(33716001)(966005)(6486002)(6636002)(316002)(82960400001)(53546011)(6506007)(2906002)(5660300002)(66556008)(66476007)(508600001)(85182001)(4326008)(54906003)(66946007)(6862004)(8676002)(38100700002)(86362001)(83380400001)(8936002)(9686003)(6666004)(6512007)(67856001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?c3lMWmQ5ajBMQkxnSGJDSmZ3cHEvM0J4cU0xUWx2RCtQK2dieC9MMWlSK0lV?=
 =?utf-8?B?T2E1bnVMZ3ZDbnlhcWNNakhpWmpTWmdjUVI4eDRoeEUxemlaakN2eU1pUUNN?=
 =?utf-8?B?bnIvSWlRS0xwRU9MNW5RMFpaQWZaNDRUSzNHS0x0ZE9TM3B0b1phTVcyS2xG?=
 =?utf-8?B?YXpNTXR1SmtJeVRhVE9wczNTUnVGNHJueWVkTFdaRlR1NzBBeGY2SHhVNDJ5?=
 =?utf-8?B?cnBsY3o2czdGNWRhWWFWYk5EWUVZYkZKVFNzQkFmckVhNzZOK0MxazloSnpi?=
 =?utf-8?B?U3o0R2NUOGdOQ1cra2hGNDRQZHFVWnFMUWROemxqV09zWjN6V2w4ZFpWbXdX?=
 =?utf-8?B?dWZSZnBzVUFaTThzSDZVaG44bTBTdS8zNHV0RjlFVWo5aU5tYU9ZeGN2bUxy?=
 =?utf-8?B?cXlmd2dVaWdkL3RrdVdvL3lJdkZ3OU9NdEl6QkY2K1JnVEFVZkR1S3VPK0Rn?=
 =?utf-8?B?cmNPYU5haVV1ZHR2Y3Q3RlJyOExlM2dnS05VT3NuMFdVZ2lsdXRxYjc4c01Y?=
 =?utf-8?B?NUYwaW14M0RBaWxJVGRkSHVkQjdEeWc1bnI3cER6ZmgrMlhMU3JzaW53bTdu?=
 =?utf-8?B?ME9qQjZBcHFMZi9kdWQrNVRINGVla3I1c0EzRitxUkNGTGpPY1pYaDRuTG1D?=
 =?utf-8?B?cnoxWHdocW1LY2lDdFJmclZ1TUpMcXJ5aDFHdXd1YytmUEpSS2xCVWx2d0w3?=
 =?utf-8?B?U3NHWUFXLzYyRktMempaU3M4MTEvUlptYXBwZ2xqZ3QwTzFCWUF3ZHBZbGxn?=
 =?utf-8?B?aEZCZzNoR2xvcXdKQnY3bTNtU3VDNi9kbWY0bEdjQjRpL3BkbFdJQXdJZ0pt?=
 =?utf-8?B?ZEIyTFRZL3IrV1QyeGZGUUcyZDkyZEFKZlp3Ukw1djQxQWRySkQ5UTcrenY5?=
 =?utf-8?B?MlJkNUE3UlBvaUpBNzZ6Zk1jUUZZdFRERTlycFNVN2REejZxS0xyQzZiL0cw?=
 =?utf-8?B?R3ExdC95SUt6TFVLUnhuVWZVbDZjcmg3NDUzWnU4UDVjRWZLaHROa0JIMlJY?=
 =?utf-8?B?ZjhnSUoyVldoSHFXT3g1SDUxQndDbHJhcVRrbzh0WVJXZlBKS1Y2V3cxMmNl?=
 =?utf-8?B?TzZxYXpKS1hEZ0JzWStjQWRPcUhUNE9XalFDQ2JWMmVsYXpXUnlEMWZyNnJB?=
 =?utf-8?B?amdWcFhZWUNjQjQzRlBwSGZ0dE5kVWpCZ05SSXRhL1ZRWTZVbEJlbE44MXJ2?=
 =?utf-8?B?NytocWVkS1FQaW5mbmNIUE1obDhFekhVYWFwMG5SKzRVaUptUnVTNW9PeDdZ?=
 =?utf-8?B?OHc5NnIvR0Z2ajdvcDdwcHhBZnBrN21OalllNy9xcWd6VEtxM0Q1eSt0Skpi?=
 =?utf-8?B?Z0ZNV2oyWU5NcDBlWGJDRy9tdDNDeEVlWDU1c3RiM1JMTSt1REtPWWZkRE42?=
 =?utf-8?B?d1o0OStEVDM4dHExdC9qSGxHUlVNb3pWSEJZTURPb1Z3VW5nN0hHczhVbGFT?=
 =?utf-8?B?OUpsWUVJdmJHbVdyMEVzZWR1MGVudjlXalJhaTJCMFJBVEJKaklhWEFvUGYr?=
 =?utf-8?B?QmExQk5ReUdBdFpxTU0xMURBMHd1VWhEQXpzSnd2c1N6Qk5SZlhTVEdOSVFq?=
 =?utf-8?B?a09McWJiVXYwMUlEV241Rmh1b3gwdGxzdVBBTG9hU1J2K0g3Qm1waGptcU9K?=
 =?utf-8?B?RTl4bHNabTRWSjY5emdCMjV1ekE0U3FDUVdPTXhoVjNPKzdqUitvWEFCdjR3?=
 =?utf-8?B?S3ZIb3VOSzZ2RldTMEdhSDA5czVRUG5ERFR4MGdBVHlwbEhtTHBFNEw0aWVh?=
 =?utf-8?B?Q3duVjlZcnN3bTBMSHdCRE1manlvZzhoakhoTitnaG5JdnFpRFRTTk1iMU83?=
 =?utf-8?B?ZisrOU4yQW4vRXEzWlpTbVNmVnVWWG5ybGErWVdQZEJuQ21oWVJkWEtubzE2?=
 =?utf-8?B?Y1E5dFoxSTFrTzBEemhLamdNdlQvK2tmc3hJNkQ1UTNCVzBwZURxT2E5UVk5?=
 =?utf-8?B?RExjTEpKaTgwZXpLNUQzbUNEVkgwcDlEcStHbXVQYWVJR25vdVRCU0xqMFZW?=
 =?utf-8?B?Ynh2c1Z5bVNvU3JWK1h3Y0t2OVJaSkk1VENtMDRILy92RUYvQW50cnl5ZG9E?=
 =?utf-8?B?eTVySkFkRlI1WjJsRFluaVkySGNOMjNEYTBVZ1RkVThGU3NyZFBxTUQ0OW9N?=
 =?utf-8?B?OWlKWlNDRkl4cHBGY21EcmZYSkl4c2pwODFVRVNtMzZ3YncrTkIvMEFhYmlr?=
 =?utf-8?Q?+CEEq2vcShdqrInHjmEy70Y=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: a750087e-7c11-4617-995d-08d9fd02af5b
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 10:43:42.6225
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 8gkjRnsogESoMyOv0jQhfQSJoABgfXZTmcPsHcLtvChDqp5Xpj64kgY2si065V3kyPZloC+RG3ga62/Yzn/uhg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR03MB5764
X-OriginatorOrg: citrix.com

On Wed, Mar 02, 2022 at 05:49:14PM +0000, Andrew Cooper wrote:
> On 02/03/2022 17:27, Alex Olson wrote:
> > I further attempted to see how far PVH dom0 can get but had a general question regarding what is not yet implemented... 
> >
> > With an initial version of Roger's recent "vpci/msix: fix PBA access" patches and after refreshing his earlier 2018 patchset "vpci: add support for SR-IOV capability" regarding SR-IOV support for PVH dom0, I was able to get both physical functions and virtual functions of an SR-IOV network card to operate correctly in PVH dom0.
> >
> > However, it looks like any PCI-passthrough for HVM domUs with PVH dom0 is not yet implemented. I see the "PHYSDEVOP_map_pirq" call fails since the "emulation_flags" for dom0 do not include "XEN_X86_EMU_USE_PIRQ"...
> >
> > 	libxl: error: libxl_pci.c:1461:pci_add_dm_done: Domain 1:xc_physdev_map_pirq irq=17 (error=-1): Function not implemented                                                                                                                                                                                                                                                                                                         
> > 	libxl: error: libxl_pci.c:1781:device_pci_add_done: Domain 1:libxl__device_pci_add failed for PCI device 0:5:0.1 (rc -3)                                                                                                                                                                                                                                                                                                         
> > 	libxl: error: libxl_create.c:1895:domcreate_attach_devices: Domain 1:unable to add pci devices                                              
> >
> >
> > What is PVH dom0 missing at a conceptual level for PCI passthrough to domUs?  I naively assumed that an HVM domU guest wouldn't care much whether dom0 was PV or PVH in terms of passthrough device IRQ handling...
> >
> > Thanks
> 
> Hmm.  xen/arch/x86/hvm/hypercall.c hvm_physdev_op() filters map/unmap
> pirq based on currd.
> 
> But this is buggy.  It should read the physdev_map_pirq_t parameter and
> look at the domid parameter.  What qemu here is doing is trying to map a
> pirq on behalf of the target domain, not on behalf of dom0.

Even doing the filtering based on the domid parameter would be wrong
given the current logic. PHYSDEVOP_{un,}map_pirq are used by both
domains that have physical interrupts routed over even channels and
domains that have interrupts delivered using the emulated interrupt
controllers.

I've posted a fix that should allow you to make further progress:

https://lore.kernel.org/xen-devel/20220303103057.49181-4-roger.pau@citrix.com/

It's likely more work will be needed, and it's unsafe to use until we
sort out the issue around locking for PCI devices when used by vPCI.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:44:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:44:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283085.481979 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiwd-0001aq-3T; Thu, 03 Mar 2022 10:44:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283085.481979; Thu, 03 Mar 2022 10:44:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiwd-0001aj-0D; Thu, 03 Mar 2022 10:44:27 +0000
Received: by outflank-mailman (input) for mailman id 283085;
 Thu, 03 Mar 2022 10:44:25 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPiwb-0001aM-CX
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:44:25 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e420bdb3-9ade-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 11:44:24 +0100 (CET)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2057.outbound.protection.outlook.com [104.47.14.57]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-3-fz-SpLJYO_WP5cn3q9lFlw-1; Thu, 03 Mar 2022 11:44:23 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB6PR04MB3222.eurprd04.prod.outlook.com (2603:10a6:6:6::18) with
 Microsoft
 SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.26; Thu, 3 Mar 2022 10:44:20 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 10:44:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e420bdb3-9ade-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646304264;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=D/cSr//zUySgh3p61hyWfGiVpohofSuaIl4HgD6Dgz0=;
	b=dpXkBs/7LUckjGm+Mo3g2HOk8zBFPMB6Z3gmhsa+xGTn9X73+NdSFAxMX5AOLYf33CNcIL
	+Vi4nC4dn6zKM6LpPJ4RqIBgDZduKJdV8YGXvxVs0dGPbr8BZeGZcjgijl/EysawCRT18j
	NVX8GI3FoMb87wYpMuLlTdbjThOT0TA=
X-MC-Unique: fz-SpLJYO_WP5cn3q9lFlw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=D3Umos+PP4yUudXzjiojxkaFsWDc/+UbR6HNpBReN40wYP2AdvGdEV5Eua/huz3ffAxGczAolNi7jQBURcAns7+XketKYgDi77uHdmvJPtUzzNlPPS3fTqOyxHP+53OYCBR+PrhIKCZCMgtXyYXkjfN6Bq3TwMm2TtCKh+x9iE7CU9QPPrPT4WTbTIs5Fzc19nIyVnW5ltTvnwt88wnjFEwiC0fx+5mFNUxyi3PjNUCrwD+8s4QeFsf70Y7owF7AloMhFCc8jRgNWnsWkzXcSQU6FV+gGfv7ChHSreCDPBYWTu7+SzHr2pxkxVEoa4ZBvKm4uqJnlWB0ahmMhnvD/w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=D/cSr//zUySgh3p61hyWfGiVpohofSuaIl4HgD6Dgz0=;
 b=f2odHtm7mQJUlUmeI3O/VjyghwpWLhCGC+K5Md+2Scy2pXOynNfp+W7r9x6D2gTA8b5qxPSA9HScW3XRfp4aNyubWenrD6wm6vXubylAP5rvjJCS9zw6BeSRuBBA1Dpa6vpDHHQPJ8vhur0jY9E6l17KXcftX2SZ1MQp+l5ufuLuyzbVj6b57YuuRaItyHAecz5qJpD6mDH7jv8U3qppzYlzVLNSOrdT3k2PvNO4bNwanlfY3Zm9fcIpprT+E1CJXs4gzih4dLwfwlDlJjw9QTo+5Jm1zXOK+zspctcSVgMBGaDRgL/dYm3JClLuPjJo0LgzIDsLpwzy/dslK1ihSg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <3dfc455f-68ef-77d2-8dbc-5f7a9f7f2364@suse.com>
Date: Thu, 3 Mar 2022 11:44:17 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [XEN PATCH v9 27/30] build: rework "headers*.chk" prerequisite in
 include/
Content-Language: en-US
To: Anthony PERARD <anthony.perard@citrix.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220125110103.3527686-1-anthony.perard@citrix.com>
 <20220125110103.3527686-28-anthony.perard@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220125110103.3527686-28-anthony.perard@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P195CA0043.EURP195.PROD.OUTLOOK.COM
 (2603:10a6:209:87::20) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: b513a206-60c2-4693-d1b9-08d9fd02c5be
X-MS-TrafficTypeDiagnostic: DB6PR04MB3222:EE_
X-Microsoft-Antispam-PRVS:
	<DB6PR04MB322236B71FF542F8F7F4F82AB3049@DB6PR04MB3222.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(36756003)(6916009)(38100700002)(66476007)(8676002)(66556008)(66946007)(54906003)(8936002)(4744005)(4326008)(5660300002)(86362001)(31686004)(31696002)(316002)(2906002)(2616005)(26005)(186003)(508600001)(6666004)(6486002)(53546011)(6512007)(6506007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?WlN2Q2swcGFCUERKUStlWUp3Ny9ZYU93TE9oQ01VSkxCSmw0eFZGS0dMZXBV?=
 =?utf-8?B?T2d4K3V1UjZ0SGpERWlHRlo2TkovL2lJQVZtaVNJVUxMYWZadS93aGJpWDdy?=
 =?utf-8?B?amhES0J2UlE0dW9oRVNHSlEvL3JMdW53aGRaTDFFVlJEUTBDbytqYmZOemJz?=
 =?utf-8?B?UjJBTVN4MHdrL043QnBBang5MUJjTGRBS2w2T1Y3YVZSQUVia2lQWEpxelp2?=
 =?utf-8?B?ekx3TGFxVWxFeDJaSjVxNVYwUEZVcXF1dlZJek1TSFp2NFMvdHdjQkxkTUxC?=
 =?utf-8?B?eHdVdjYwUUZlQVVvZXJRd2lIaThsK29walByQU9kd3A5THJKNFpiNk1IM3l5?=
 =?utf-8?B?U3FFb2VJb0JOd1p1MHZiQ09kU0ZJWFc1dXRZNG9ZWUFBZTlOaU5XaU1Xdm9H?=
 =?utf-8?B?TS9VT1pVQm5kYXpuWlc5Wlo5RkpOY2VteGJwYUNWdnlBM0g2eXdNUWwxMFRy?=
 =?utf-8?B?bFBqNjBWbENYLzBQVnBtU1U5OXdVaE5zcHlKQ05ET0ZNdDg1aS8zMUZCV3pZ?=
 =?utf-8?B?dTlDaCtURFRyMHYyOVFWZW44TVlNSUFSOG96eUdFSlRZcW5uSUJNZ0Q3eWIz?=
 =?utf-8?B?OXRiSWZtMGt3VkhpOEZ4cmZ1NW5OU2RqWTRVcnMyVUwwV24zUkRXNFJTMCtu?=
 =?utf-8?B?OUJhbW52czhuUDNTQlpJcmpGTnFaT1kxbU9DejZncTg1OFR3STF2MnJGWE90?=
 =?utf-8?B?NDFXNmpEWDZwQm5nRVdoNXZEUWF2aVdKMEFUQTZLQndsQ1VuTzBVZVk0Q1RH?=
 =?utf-8?B?R3V0THIzdHNFZHlBdkRNNHErMkMzSDJUeFBSZG8ySlFFMHN1NVhOaTZ0WXR5?=
 =?utf-8?B?OWdmK3g3Zi94eFNBVjByK3Ira2VSMXRFV3dEUEVKNWJOVExEV28yb3NmS0lN?=
 =?utf-8?B?Q0F1QklkbXFRYytxK2FLb3ZRM21qb3JETUJDdlRhN2dTL29OYnc0ams0ZTN0?=
 =?utf-8?B?Q2ZsTkZVc3FaMDZTcFBSNjQ0aU1XdUlLSjhDdnJMaGJLeVRjVG9lTDluaW1I?=
 =?utf-8?B?WFZwYkZVRHZhMUEzY09IemJMV1BYZEZ6NXVqRHpXQzRtMVdHcEYwZHlwUkdp?=
 =?utf-8?B?STQwM0ZCaHlaY21BV3dxaGJxWWlaM0IvN3M0R0hhZU4zRDZzdU1raGtLaXV3?=
 =?utf-8?B?RFpIYzArL05IN1E1bjh1cWxFUzNjbFZMNUpmaUJsOTIwZFRzQTgrMSsrSHlG?=
 =?utf-8?B?SE5DZ0RES0xzWWRXTTJFTkd4eUhvRmEwNjhaNjQvS1ZVTVRKNkphN2U3NlBK?=
 =?utf-8?B?U1hEQmxOd3MyZjBuaVcvUmhEK2d4S0lEcnJ2b3hmNWY0dWVFazVFd3ZnTmc4?=
 =?utf-8?B?eS8xdFpVeTh2QTZndC9VKzdoR2VHQ1VSelpmMjBTVmZrRmVBOVlQL3lieGRn?=
 =?utf-8?B?bng3SDNTRlVTaDhVN0FtUS9hcE8vOTdqc0xZQ2N5T2VGWCtLTjZaVGcvcVBY?=
 =?utf-8?B?NGdFM3NPeDZrT0dPY2NCWE51bFk0RjJ4dUJ1RWF6cUhHbFpPYU5pZXJhaHl1?=
 =?utf-8?B?OFdwZFdhcVJRQnNhVkpmb3Q3cVFwZ2hoejgxUGhhcDZ6VUFrWmt2WXpvbkhr?=
 =?utf-8?B?R1UzN2gvbFM3NkJGOXhPeWdhVGtXYTdSWW9aQ0hyN0xrazFpQlFFaVBRUTho?=
 =?utf-8?B?SHl5ODhSeVBVdHQ2bU1SQU81ck9mNk5KTUVFNFpzOXN0WkorRmQ4NUxRazlJ?=
 =?utf-8?B?bEh1MmVPL1JrTCsxNll0QklzZWFEcGhpMC96YW9zSWRkYy9BQkNTMkx3Ujhs?=
 =?utf-8?B?VU95R3JFM1F3RzN1dktneVRPYklIdEJ2OUdmNWVOd2UrekFvQmpXTVlhVkVD?=
 =?utf-8?B?RFRxbHFRTVdVc3VYVmRzQmZVd3JqMVE2aDhYYU9xcUVyU1Y5Wkk5QU8yenox?=
 =?utf-8?B?K1NLankyZEJCNlB2Vy9rZ3R2M0kyWEIvZFBMYTFEUmFqRmE0Zi9VNEtXT3pF?=
 =?utf-8?B?UitjQlRld2dLSzVqRHZSV0hkOWVTb0NVaFVkR2lsNUIvUERUSjRndzduL1ln?=
 =?utf-8?B?QXI3N3NwK0MvZ2RTb1hiQ3BtRjJHNVRxWksxa2M5dnRxRDcwbUh0dm10cEZn?=
 =?utf-8?B?Wk4ySFdSNm1XOURJSEptcnNONVIvalhXRHBxaGlDMU1rT1kxeXhPSG5MbkZP?=
 =?utf-8?B?K0V2bVhNR3FXdXV4bDR0ZU5NaTdIb0kra2V5RXArSk9UbG1pZloxdTcyc1M2?=
 =?utf-8?Q?GzWjeRcvPffFRrm718bMRTc=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b513a206-60c2-4693-d1b9-08d9fd02c5be
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 10:44:20.0577
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: SC0qCMCzslu6iaz9Ois8CtEYjxzTj+xNs/c+5QdRQd1uoSmqjchjNTg88o5sGAM5CImyqw8g5nwHXVsEnyOSqA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR04MB3222

On 25.01.2022 12:01, Anthony PERARD wrote:
> Listing public headers when out-of-tree build are involved becomes
> more annoying where every path to every headers needs to start with
> "$(srctree)/$(src)", or $(wildcard ) will not work. This means more
> repetition. ( "$(srcdir)" is a shortcut for "$(srctree)/$(src)" )
> 
> This patch attempt to reduce the amount of duplication and make better
> use of make's meta programming capability. The filters are now listed
> in a variable and don't have to repeat the path to the headers files
> as this is added later as needed.
> 
> Signed-off-by: Anthony PERARD <anthony.perard@citrix.com>

Acked-by: Jan Beulich <jbeulich@suse.com>



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:46:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:46:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283099.481995 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiyA-0002OQ-Ll; Thu, 03 Mar 2022 10:46:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283099.481995; Thu, 03 Mar 2022 10:46:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPiyA-0002OJ-Ia; Thu, 03 Mar 2022 10:46:02 +0000
Received: by outflank-mailman (input) for mailman id 283099;
 Thu, 03 Mar 2022 10:46:01 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=++p5=TO=citrix.com=prvs=054f29298=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nPiy9-0002OB-7h
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:46:01 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 1c3540aa-9adf-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 11:45:59 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1c3540aa-9adf-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646304359;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=KWu0hAmcLTlQGm/dUUSB0eIHCRr1dfI5IWrBk76qluY=;
  b=UWcsNiU7nUdl9znNsyv+0LWZjp4I4MEPU35DJvF03c42P7TqNskyOUCo
   UeluFJBDAa12M1G8Guy1c6w7pUPStSHYOgtnPUhO738fddDFGoaufnnUw
   AJDQYsablfhVLCBV0TYjY8ij/A+6BvVa0a2ZKawD1cysvzQj4+n2V8KT/
   k=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65783837
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:QeSQDqgZzA2Z4bwKsp0jbEMcX161VxAKZh0ujC45NGQN5FlHY01je
 htvWj3TMq3ZZGugfNgjOomz8kID7MLRmIUyTVFvqyEzFngb9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFvW4
 YqaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YVgCF7Xgg9YBaUkbEAJEPZN2/Y31Infq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bklhmwSvUErANRpfbTr+RzdRZwC0xloZFGvO2i
 88xN2cwPE+QOEIn1lE/LpwZnri323/GSB5jok2kt6QIvXTw01kkuFTqGIWMIYHbLSlPpW6Ho
 krW8mK/BQsVXPSDyTuetHO3wOaXmTj8XqodEbS58rhhh1j77nweDlgaWEW2pdG9i1WiQJRPJ
 koM4C0soKMuskuxQbHVXRe1vXqFtR40QMdLHqsx7wTl90bPy1/HXC5eFGcHMYF48p9tLdA36
 rOXt4zCLCRDq4+JcyLe9ZSurQ2CPBonLmBXMEfoUjA5y9XkpYgyiDfGQdBiDLO5g7XJJN3g/
 9yZhHNg3utO1Kbnw43+pAma2Gz0+vAlWyZovl2/Y46z0u9uiGdJjaSM4EOT0/tPJZ3xorKp7
 CldwJj2AAzj4PiweM2xrAclQenBCxWtamS0bbtT838JrW7FF5mLJ9043d2GDB01WvvogBewC
 KMphStf5YVIIFyhZrJtboS6BqwClPa8S465CKyFNYUTO/CdkTNrGgk0PyZ8OEi3zSARfVwXY
 8/HIa5A815AYUiY8NZGb7hEiuJ6rszP7WjSWYr633yaPUm2PxaopUM+GALWNIgRtfrcyC2Mq
 oo3H5bamn13DbylCgGKoNF7ELz/BSVibXwAg5cMLbDrz8sPMDxJNsI9Npt6I901x/kOz7yQl
 px/M2cBoGfCabT8AVziQlhoaa/1XIY5qnQ+PCc2Ok2v1WRlaoGqhJrzvbNtFVX73ISPFcJJc
 sQ=
IronPort-HdrOrdr: A9a23:G+dH3q2+B/JRPKnKxabo6gqjBRxyeYIsimQD101hICG9Lfb2qy
 n+ppgmPEHP5Qr5AEtQ5OxpOMG7MBbhHQYc2/hfAV7QZnibhILOFvAt0WKC+UytJ8SazIBgPM
 hbAtFD4bHLfDtHZIPBkXOF+rUbsZi6GcKT9J/jJh5WJGkAAcAB0+46MHfhLqQffngcOXNTLu
 v52iMznUvHRZ1hVLXdOpBqZZmgm/T70LbdJTIWDR8u7weDyRmy7qThLhSe1hACFxtS3LYL6w
 H+4kzEz5Tml8v+5g7X1mfV4ZgTssDm0MF/CMuFjdVQAinwizyveJ9qV9S5zXMISaCUmRQXee
 v30lMd1vdImjTsl6aO0F3QMjzboXMTArnZuAalaDXY0JTErXkBerV8bMpiA2XkAgwbzYtBOe
 twrhKkX9A8N2KwoA3to9fPTB1kjUyyvD4rlvMSlWVWVc8EZKZWtpF3xjIfLH4sJlOy1GkcKp
 gnMCgc3ocjTXqKK3TC+mV/yt2lWXo+Wh+AX0gZo8SQlzxbhmpwwUcUzNEW2i5ozuNxd7BUo+
 Dfdqh4nrBHScEbKap7GecaWMOyTmjAWwjFPm6eKUnuUKsHJ3XOoZjq56hd3pDhRLUYiJ8p3J
 jRWlJRsmA/P0roFM2VxZVOtgvARW2sNA6dvP22J6IJzYEUaICbQxFrEmpe4PdIi89vd/HmZw
 ==
X-IronPort-AV: E=Sophos;i="5.90,151,1643691600"; 
   d="scan'208";a="65783837"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=iWzoFE1S5xtpTMyIF0GyFrDGllyETpb0sVKj4rU1rS4mugq5/MGm7oCDHkh8czKgG41wihIa2HtDPRypJEWBjdiREJGhpGbi4dArqlxV2O1cmjCcfUzHdeH305zTNPsbBCe2A2RE0zV81i6ZvEpGfhdjZs9F1NsMI3l2wtACCRAPvOksrCJUT4LztrvLabkP2Ep/M0VuSCAb31U2pGUaFEYyk5Y+H1eZUSJhJgaUf0QTng0TBYYAz56K53axAAYxr9p1g4cwUtKah7phRnjpWzBXYSa06F3Q3DxQfYRtUJlUzkv4+ogVffp6gIMSbVu4W+Q5EhIfQXZDNwvyH0WhZA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=KWu0hAmcLTlQGm/dUUSB0eIHCRr1dfI5IWrBk76qluY=;
 b=jLVT8lLDuoRjUafzLQRqYyX3sIlNpIb8+6dynlEG4bRvL7i+zO5dSjAgsIw7W6BsJSe6NNxMx9ugWgbdnHz/K/QgMegyERQwAnf2vhfhiw4BfCmo50p1sR0rNMVobCzhccdmRRabRhH3z6piWS6pI/H2wHSyNVrMS0mhueMqI4vLca1K6mCYNhwZ30X4++35SPD37VkeRadvURg6p/8CvOY8hMR4uC5xatKoQ5Gb6eIRhnKWJVwJQmIxnvXPcDsrXb86fS7ZhuQKMAoZwdNE9BBtbcwSqbKi8mzYkHeAcJZcoHHBBwk/Km9iL3jQJjlpu60rh39t9LDHbty1+6yoxw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=KWu0hAmcLTlQGm/dUUSB0eIHCRr1dfI5IWrBk76qluY=;
 b=Zl5gNKssFdktqz7M5f6yB5brWpBd30zHBan92LgThtIdgqjFlS7epdk37vSLUsCC7kQ+Rjr6ItShZFyWGGIfEQqMYQ1kOmOOTLsuoQja1v4ENxVJhQbnMTmXZ1QsHX561efo7e5LjmxE4DzjmnKe1T4W8BJbrbbcjPVBTLf7MTs=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Roger Pau Monne <roger.pau@citrix.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Jan Beulich <jbeulich@suse.com>, Wei Liu <wl@xen.org>, Alex Olson
	<this.is.a0lson@gmail.com>
Subject: Re: [PATCH 3/3] hvm/pirq: allow control domains usage of
 PHYSDEVOP_{un,}map_pirq
Thread-Topic: [PATCH 3/3] hvm/pirq: allow control domains usage of
 PHYSDEVOP_{un,}map_pirq
Thread-Index: AQHYLunWut2cJ/LWfU2xlp5ijbCQIayteeMA
Date: Thu, 3 Mar 2022 10:45:54 +0000
Message-ID: <c1fafc74-d4d2-5fc5-db38-c75f076d8405@citrix.com>
References: <20220303103057.49181-1-roger.pau@citrix.com>
 <20220303103057.49181-4-roger.pau@citrix.com>
In-Reply-To: <20220303103057.49181-4-roger.pau@citrix.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 2306cd22-1a3a-410d-39d9-08d9fd02fe75
x-ms-traffictypediagnostic: DM6PR03MB3659:EE_
x-microsoft-antispam-prvs: <DM6PR03MB3659D39CA7A399DE9842B78ABA049@DM6PR03MB3659.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: e70SheLknPtV5xN048T2FIPCqg4LYD3hWOxJvxn3MNkVc7Mv4PzkZpNVoa7G10w/oWR3aZUYICuQxdbNECVaBLA8m/ov7iwlxc3z3OeMp6f/w6XLjo9EuouyvfHxTW/wXZSWY73U9RGcPOuV0QSghGWu+Qr3U6hgHWu61o6FwuL55zwJ4JeqsY94QvYIUqOXEN9QSwwy7Tq+0sAJlO5na7MJzm8lG4iD2I57/jmUgWq4vSlXsPEsFpEPzwrVcorA/RsAS0iEONkwSwDSv2Ikc2/8hEknFztdW7kpaeySyn4SJkn8KyF7/4Kq57itfj/PXyzorxEHv/VwNyE1U4Si1kSKcTMAzMIaDWO5/7FvKzq1U4dfLIju4V49GTop2L3bzn2RGHfMvkBB5IPLu+9X64dTQF/Q+iS/WqFTH+0rJoJubsjaiBtZZXelmit5CQGAt2n7TGFsdvR62nFVKreAMsP0SU+Z3GnizqaJosEOXEOVb4UWOqewu6XL1Iy3n2ChG7nX5dSfe4RYcrkVEDK2KOUxq/TsL0Lt8wprsUjHFBYibpx/eWSc6CRLUbuP1v3CNbPAIfp0HH32RsT3uq1OrQ4n1J1hYuglzSXDKDnklvH1WJauQjqiWki7IZtNpwkm3h6EqocG4byaBJt1S7DMvztQCMo8xtd7zy6RE5UpXuj4kJUfr3x6mrYXdzebL3XbxCf/6R7eP0wtt9Kt1tkfOY+FZ2YkOCLEoKXF50mqv3+AF0gmHWBP9k0WmytOyDDz81xpDr6TEjz6ElfFKlSErA==
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(5660300002)(38100700002)(71200400001)(2906002)(110136005)(83380400001)(36756003)(54906003)(26005)(186003)(53546011)(2616005)(6512007)(31686004)(8936002)(6506007)(38070700005)(316002)(508600001)(6486002)(8676002)(82960400001)(4326008)(86362001)(76116006)(66556008)(66446008)(66476007)(64756008)(122000001)(31696002)(91956017)(66946007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?d2hOY2xIeG1sRGpsN3RhK2p6ei9xRnN3MTlEcGtPOUZWL2tJUnBhbW1ydHZ0?=
 =?utf-8?B?N0ptYUMwQmQ0bDJtQmVKVzROVFNNMndLaGJHR1FqVU9odU9IL0VrbGhJcjNo?=
 =?utf-8?B?TmROSmVtazBnYlRNQlUxVm9LbkVGMGpXdWU5b1ZXYXhCdjFTZnhHYmxXYkdp?=
 =?utf-8?B?dkRtdkdGc2tiSFArRk96NGNFVWNCMC9kM3kwV3ZGdkZFMUZSWEt1OGRtczdR?=
 =?utf-8?B?L3hpb1U5eFo4T2laMlRSSEJFeGJZRGR0WUlNNHpWOWt2aVdiaEtrS3llWTZD?=
 =?utf-8?B?dldZcnhiK3BkMnk4SVBUbzhHVnh1SXFJWWVkZ2taVVVXMXE0U1F5T21vbEZr?=
 =?utf-8?B?YmxLZUpEU0phZGdUbWxkNUI4b01xbjZqeE0wZ0xMMXdMT0tyTGhZWTRRNzc3?=
 =?utf-8?B?dm5sQlpUdEFJSjgvODl4d0VFRXkwZlROdXlWMU15ekMwWTI0UjJ5NUlMeGQ3?=
 =?utf-8?B?YXNqRjJsRjk3OUFxam04TjFwZTcyMzRDY1NUVVo0RncvWU9Wb3R5eW14SkNS?=
 =?utf-8?B?aWhyMkNlTGZkRXRKUzZHS291NG5rbnQ2UE1TWHljSEhtaEhqeGhQd1FJa3lH?=
 =?utf-8?B?aGw3SGtCR1lRVHdOUnA2dHBPSTBaUTZIS2t3VzJ5L0VSdktqQTdDNWpOMWxX?=
 =?utf-8?B?RzBXekdraC9JM01DZHpRUG9pWVFDWEN5eXBBNU9UVHBQYS9xaVVHb2hmZWNz?=
 =?utf-8?B?TlFweG5Rdk9pbHhvNlBhY0hESmJoeUM1TlVkb3RON1M0cy9oWmJsRXF2Ty9W?=
 =?utf-8?B?MGpSUDgrOFY1VlhzNHYxK3pnOVY1UDVwR1hSQ2R2R1dzbys0YkhiakZIbzRH?=
 =?utf-8?B?TEp1SllrUzgycW9Tanl3R1pvRUcrVFRYNkV0TGkwTDh1Rk1SK0NwZXp2aGt2?=
 =?utf-8?B?UHg0RExFcGpMNnNLbGpmcURzL2tZVy9FdDBTRG9wWFJIVFQ2blJuWHE2cE5x?=
 =?utf-8?B?RnpJNGI5M3I3cnRRMHB5bHpDckdpcmNEdUpDMUM4eTJwR1BsZEFmNmpIZzlP?=
 =?utf-8?B?dFR3WGVINm9PR1FhSjJyMXZpNnFXaklXVjVkUkFZbFBaWXpYQUN0K3E5RnF3?=
 =?utf-8?B?WlYyOFM1d0VmRUxlc3BrRE54R1h0SENLbk9qVVBIMEQxWEZaQ3BSL2Z2c3FS?=
 =?utf-8?B?QXZhUUtYK0E5Vk4xR1Y5cHBpQXd2QzMzZ29KeWtNY3dPOHhwTnI1S1lEZmxw?=
 =?utf-8?B?Z3NJTkVqaVF0b2FZOVpvUkpOd0ZFYmwrWjlQdWlFL2NBR0szVUt4VVRDbnh3?=
 =?utf-8?B?UlRYWmJJdU1QUkFDUmdJUlJlUGZZN2ZkaWQ4VGVBRXBIN1F1SU1mSy9rMlB1?=
 =?utf-8?B?elBlYnVMaVRHS1VHYmpTUmdTa0lRdjJPdEZwaUhERGVQUVRCRnlPYTN1YnVM?=
 =?utf-8?B?KzZoZm5oOWFBSmI0TlFPWTVpU3Q3eklpVm9sbHRnWmpGQVBJVncvVkd5TmtZ?=
 =?utf-8?B?NGhoVXNqTkNRT3FsR2lZUUNJUWxobWdHalZKMjA0cWZUcTFnMlhWeGE3Z2Vq?=
 =?utf-8?B?bjVmZEJUSXIyRXFaK2NodzZDWHYxM0RaNnlISXBQaE5mRDFSTWxsYUNJbU45?=
 =?utf-8?B?SlBaMjdwYnpHTUhXRDlZTG8wV25XN1RjMWNPeTBsNVV4Qm5zYy9mZzVPSTNw?=
 =?utf-8?B?MXFIdndNaWxwSjZRZWtKais5OUpmdXE5VktqNDc2eGJEb0ZreGFiQlovblZD?=
 =?utf-8?B?Zm1lWlZualQzb2MveWJ2UmppaFh1cEkwMUlXeUNsSi9WYXlqbll4SjY4dkVG?=
 =?utf-8?B?SWFkQTNIZkNhaVhTWFloTmcwMDN3Y0JMVmVTekxrK01McGxaVkFTcjBNVHFW?=
 =?utf-8?B?QUIxUFVuNXZEMjVZclhYTENIUFBJL0VyYWFjcEJvdFRWSjRZQVpTdG9NQXYz?=
 =?utf-8?B?anlQUTcxMUlRUU9lS3p2SlpRSEl6alA1bkZKVzlxZm0yc3hKN3BDN3NtalQ5?=
 =?utf-8?B?d0dCRW0veXFQMVF5T2trN0lhZUphd1ZnM3ZoRmZRbzhuM2Q0blZFSGs1K1hv?=
 =?utf-8?B?S2F0L2VPZ1RNYnA1VkZiYzQ5MlBUMm5lbWw2ZmwvREVaWHg5cndsS1VZVCtu?=
 =?utf-8?B?SkY4RUhGemtpVlJ4ZkpYRzVWSFJmWWxSZnNwZDBzSGNQYWpNd3lpamMrZlhr?=
 =?utf-8?B?Z0s4UWVXeHVXOFlVRU1WUHowQXphQ2dLU0R6L1JteCtiRXhLdHdydE5jdjVZ?=
 =?utf-8?B?YTZlaDhzV1EvODVweStRWGFTWXdrQkg5S3NpbUROenBYcDVsbXNwYXVaSlJG?=
 =?utf-8?B?TkovdEpTK3BmOGM3Y1VIbGFuZzZnPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <C33EC2E95322FF4E91A0E530A662149A@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 2306cd22-1a3a-410d-39d9-08d9fd02fe75
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Mar 2022 10:45:54.9711
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: KejHbd5NvT52MF9XDi135bpfOKStlVG0f62akYr6l6RDih8diA4GopU+vlNF2cBttBehgDRqY5w9rSh1R9LH4BYZs6649yUw8FEKqyNWfG8=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR03MB3659
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:48:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:48:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283106.482007 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPj0p-0003FE-49; Thu, 03 Mar 2022 10:48:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283106.482007; Thu, 03 Mar 2022 10:48:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPj0p-0003F7-0S; Thu, 03 Mar 2022 10:48:47 +0000
Received: by outflank-mailman (input) for mailman id 283106;
 Thu, 03 Mar 2022 10:48:45 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=++p5=TO=citrix.com=prvs=054f29298=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nPj0n-0003Ez-SF
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:48:45 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 7e5c77b0-9adf-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 11:48:44 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 7e5c77b0-9adf-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646304524;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=OLKWxR3en0CGDa1SgIFF2e0D1MifvJO0mWnZVNHeRpQ=;
  b=LHJ/V6NSUj4bs6/BCWxmV68CFS5IBuNe6fOTiLaGyWDp+15FPr4qpak5
   SGkpllObV8QD/j8Bw51mgISwzsgL43lAQT9PIG6NHWfHNWih6uSNilaZg
   E324KMkm6hR5ZdT0GmhhNaJ3dvvrSxfaM6OT40rtQP39K5um1DQkkFzih
   s=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65383199
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:t7tOmqtLRZR7ZejaDh1FJiwdDufnVEpeMUV32f8akzHdYApBsoF/q
 tZmKW+GafrbZjOjKogka47l908Fu57Qz4Q3GQFu/i5nHitH+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jV4
 ouryyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi80G5Dexs8vWiBpSWIjOL9P6b3BDDuG5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvllJyz3DAOlgapfEW6jQvvdT3Ssqh9AIFvHbD
 yYcQWQyN0SbOkweUrsRIKhgg7u6v0D/SGxdkGOMpvMt5Hjx3gMkhdABN/KKI4fXFK25hH2wt
 m/Aumj0HBweHNie0iaetGKhgPfVmiH2U55UE6e3ntZ1hHWDy2pVDwcZPXO5q/Skjk+1W/pEN
 lcZvCEpqMAPGFeDF4enGUfi+Tjd40BaC4E4//AGBB+l14/p8ViyNGE9f2QCNdk0vd40QxFp7
 wrc9z/2PgBHvLqQQHOb076bqzKuJCQYRVM/iT84oRgtuIe6/txq5v7bZpM6SfPu0IWpcd3l6
 23S9EADa6MvYdnnPklR1XTOmHqSq5fAVWbZDS2HDzv+vmuViGNIDrFECGQ3D94ddO51rXHb5
 RDofvRyCshUV/lhcwTXHY0w8EmBvartDdElqQcH82Md3zqs4WW/Wotb/StzIkxkWu5dJ2O3O
 hON5VIKu8IKVJdPUUORS9jrYyjN5fK9fekJq9iONoYeCnSPXFXvEN5Sib64gDm2zRlEfVAXM
 paHa8e8ZUv2+ow8pAdas9w1iOdxrghnnDu7bcmik3yPjOrPDFbIGOxtGAbfMYgEAFas/Vy9H
 yB3bJDRlX2ykYTWP0HqzGLkBQtSfChjWMuv8JQ/myzqClMOJVzNwsT5mNsJU4dkg75UhqHP+
 HS8UVVf013xmTvMLgDiV5ypQOqzNXqjhRrX5RARAGs=
IronPort-HdrOrdr: A9a23:laEvhau9xT780kcPrGi/wvqt7skC1oMji2hC6mlwRA09TyXGra
 6TdaUguiMc1gx8ZJh5o6H9BEGBKUmskaKceeEqTPmftXrdyRSVxeZZnMrfKlzbamLDH4tmtJ
 uIHJIOcOEYYWIK7/oSpTPIburIo+P3sJxA592utEuFJDsCA8oLgmcJaTpzUHcGPjWubaBJTq
 Z0jfA3wAZIDE5nF/hTcUN1OdQryee78a7OUFojPVoK+QOOhTSn5PrRCB6DxCoTVDtJ3PML7X
 XFuxaR3NThj9iLjjvnk0PD5ZVfn9XsjvFZAtaXt8QTIjLwzi61eYVaXaGYtjxdmpDs1L9qqq
 iIn/4TBbU115rjRBDynfIr4Xi47N8a0Q6n9bZfuwq6nSW2fkNgNyMLv/MmTvKQ0TtQgDg76t
 MX44vRjeslMfuL9h6Nl+TgRlVkkFG5rmEllvNWh3tDUZEGYLsUtoAH+lhJea1wVh4SxbpXWN
 WGNvusr8q+sGnqGEzxry1q2pihT34zFhCJTgwLvdGUySFfmDR8w1EDzMISk38c/NZlIqM0q9
 jsI+BtjvVDX8UWZaVyCKMIRta2EHXERVbJPHiJKVrqGakbMzbGqoLx4r8y+Oa2EaZ4gacaid
 DEShdVpGQyc0XhBYmH24BK6AnERCGnUTHk2qhlltFEU33HNczW2AG4OSUTepGb0oci6+XgKo
 KOBK4=
X-IronPort-AV: E=Sophos;i="5.90,151,1643691600"; 
   d="scan'208";a="65383199"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=VZQdv7CONbkEKkHCk8iql6LBL2WLYXBpNjLeQF98Ugw171+oKk4M08HkIdwfDORMQEGJcZ9GPjQ4C9hiDzMTojkBdhh4WN7L5X62ADNsKvbRelamgGfYoy5ae0C97kGvBjs1MG0GKHwWY2Cassss+4h9U9q55isINoS6hNpnYO7N8eC+sufxdhate+vaPpv512ZnG6G6/Jk54eRPfAYOFH7OSGhK9SAYmop4o+X47F3gB6HFmbV6D5CSi925eFUzKP/hSKd7ZBWi8RIULAACeqZ4N4z7KdhkpPXINExzM7EoXnNjz34ypA+OMWRd/UV38eXbEdwk6sNqVpQBPdPylw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=OLKWxR3en0CGDa1SgIFF2e0D1MifvJO0mWnZVNHeRpQ=;
 b=A6zm7pxmTSIla9eXbUjNdz0bpgg9vVSvfhvFXNawtIVsnvHPprv2FMMcd3qffk3cRx80GrPS1CRboXEPf2OVOAAvGw7QE4getnV8r88QJNroV+5dbu72VWImCZ3Fj2x13Yo/l72lG3x/vXRWH6WQFKw3b3aHDzbUS6KAcn+CYWG+u2pO4B1//kFiCC23AcGf/6Tu89lA7zghwtYJAVh+xvTKBo0hMQe8NmXG0JNyLnJXiSY/tSsJsuxZePCpLHeIT7Ls5qSFSr1Ueoddrbv2lSmGYB6bJdYLtbq+V2wNn2O6TUH3Gj+KAgbkfSoR2iKSDJirQeyt4znfGADJ6KZxIw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=OLKWxR3en0CGDa1SgIFF2e0D1MifvJO0mWnZVNHeRpQ=;
 b=oO4xgF/iJbA0EnUiWB8wm1vHLt72ZfQnjcA2l8dbDRVrcl3hwg/NzsaOCBMnRrrXfDOmyj3HaIFIW8D8xfIWui9W2o239I9Ne9Izq2fDX/OO0C44++gjxY+IXJDUDswTpZgWPFDbqeppu6s36+ufpiJPCUsuDzH/dTb8J6ah+mo=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>, Xen-devel
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH] x86/cmdline: Interpret 'vpmu' as a positive boolean
Thread-Topic: [PATCH] x86/cmdline: Interpret 'vpmu' as a positive boolean
Thread-Index: AQHYLoKhjt6lbGTIskelwxGk8I14LqytR+SAgAAzewA=
Date: Thu, 3 Mar 2022 10:48:20 +0000
Message-ID: <bd6dda42-fc33-5958-31e7-741853c85c9b@citrix.com>
References: <20220302221157.17246-1-andrew.cooper3@citrix.com>
 <6ffbc025-758e-bb7e-4e87-0b6b9e1bc2e5@suse.com>
In-Reply-To: <6ffbc025-758e-bb7e-4e87-0b6b9e1bc2e5@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 971bb2a5-d7bb-4b53-7a6f-08d9fd03551c
x-ms-traffictypediagnostic: BY5PR03MB5031:EE_
x-microsoft-antispam-prvs: <BY5PR03MB5031F7F1C2F106C1186CDD12BA049@BY5PR03MB5031.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(82960400001)(122000001)(6512007)(66446008)(76116006)(71200400001)(6486002)(36756003)(91956017)(66476007)(66556008)(66946007)(64756008)(31686004)(508600001)(8936002)(8676002)(4326008)(4744005)(38070700005)(54906003)(6916009)(53546011)(31696002)(186003)(316002)(26005)(5660300002)(2906002)(38100700002)(86362001)(2616005)(6506007)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?b1RlMU5CUVVxcGk0b3l2UjZiWW9FNm5DWUkwZVVSQXBUMHRSOTJaT3pGd3hO?=
 =?utf-8?B?L1BjczFuTWY3emtWRnFmclVza0c0eGIyeW8waDdVVTlnV2RrYVQ4bGRDU3RS?=
 =?utf-8?B?SEtuU1Ezb1drc3FaVGlETktTUkdLdDFHKzVnbXhxVnFxdkkxcjl6cXFMYTNR?=
 =?utf-8?B?MCs0SVVQak5RRm9pR280MVNjRHd6VUUwTnp4OHNUeG1OWEplQXVEWmhXQ1pE?=
 =?utf-8?B?OUl4SVBPMHpGaTNNZzkzY2krRFpraG42MFpuWDNLTTl3U0ErYkprb1UvWTRQ?=
 =?utf-8?B?elBiL2IxbExwZXJTcURTQXcwZ1ZpV0R5RDV1bXZ1TFRiOXNrcWpPUGdVNE5Q?=
 =?utf-8?B?STg4b1Q4cGU5a2ZsZE5jLzd3YmN1VnljODM5TU5PeWZnUGRiZWtYRGZDK2VI?=
 =?utf-8?B?eVFnakR6dzlkVFNhU05IM0kvdFdNb3VmU2I0ZnpTTW0zTVNZQ0o2cmlteTBD?=
 =?utf-8?B?QjJuek5pL1RLaTVUWGVnOFN5di9BMHMrYnV4bjVaNWJ2NUJ0REJIRGJPcWYv?=
 =?utf-8?B?WUhtQ1RwQ29jQUhqNENaaC9iTU5XMUMyWFY5RmFvVUYyS00yb0RyaTBxaWxa?=
 =?utf-8?B?VWFKOWpJOVMzc3pDS2lKYkJaeFNkRzV5bDY0U0g3ZS9jSDBHNVVveitqS1d1?=
 =?utf-8?B?QUJMQzlqbFB0dk43NUI4SnpmNGNnL2FRbkJWRFBGWEZHdm1QR0xIeFkzdFYw?=
 =?utf-8?B?dmdaandYcDhaOTMxMWcwZ2F4OERqN214bXFPcmFIeDFVSmJuaUtVQ3REVzFl?=
 =?utf-8?B?TlFiSzNBbTZ5bnM2S0d3SDE2TzFRZG1uRUhzaGVGbWpNNkNkWlUxeG03SzZa?=
 =?utf-8?B?b1NsZDZaMzBxRTBnVnpWaXIxYkd4VThyRG15MHBvSmF4UTJ1WVRxNXY2ditq?=
 =?utf-8?B?YndlVE5OaEJXZm11R1U0Rm5od1dmV3gxYXNwQzF1Sm1mczlSZGY4RHUvNkRI?=
 =?utf-8?B?RVVyMjRBdldKdlJDTUE0VWJYenVnZWswTDFQVGlORDkvdG02dUh3T3VMNTNS?=
 =?utf-8?B?SW1MbnpVTnlmeXduRjdzS3ZicFdnVVRLanlhM0NkZGRIWCt2N2Vuc2lZSFJt?=
 =?utf-8?B?R1VFNlJFNDJHU3Jqbnd5NGdBNmhTZmorek50ZS91ai9oWWdweWdiMW9IMWlY?=
 =?utf-8?B?RjQ3d3RtTnh0N0FHM2tKUVR3VE1KcHRhT1FucmVic2V1QnUzNjRmOXcrQUlV?=
 =?utf-8?B?YlBlMXhhV0Q4a2djbHFMMzFqSWd6WU8xUHE3ckxCOW9qTmJxVnFmTzlMVGF6?=
 =?utf-8?B?dG1LWE1sbXV1TWtuc0VCUmdLUy9OczEyZUlDS0F1cURGdzBLQ0RhV1JDOXdJ?=
 =?utf-8?B?WFhGSGZwSTB5akFka1dGU0JvUnhlMlh2TWg4TTNpdy9VaHFPVDl5NGJGRHpa?=
 =?utf-8?B?ck9HWmoxK0dhQWV3VFlMQ2tRaFVKc2FVeDJVQm9zbk5XQ0tNQTdmN1c2OHA3?=
 =?utf-8?B?V2NDRGN1WFJpVU9uaWNOY2JydTBoN0lKakoyVlYwbzJQT3pnMFJuYnVuRHJJ?=
 =?utf-8?B?eVE3dWtVWlVrZHBGTjBYK3RXMDZkekVwUzNNSzRKYmgrNkhJQUV6UHkwZFI5?=
 =?utf-8?B?dDQ2VmUrOFRWKy9LNWZvRHdKeTE0eHFiS0F5Y0lTbUlESXpJa3FoazhJaTFZ?=
 =?utf-8?B?MG9zZ0VmNUFYMGpZaXg2aWtBRWtxaG5PamtxaEZTNUoxalFFS05ic29FYi9j?=
 =?utf-8?B?S0VlaGNOd1R5TU5wc29nQTZjK2F0OEE3dzFXUXhRV3BFWmM0Z29LNjY2Nzd0?=
 =?utf-8?B?N1h5U2hOOUFnMlV0SHN0YWdDSEVaTmRndk52N1B3YzF5UTVUWkZBaTNnR2hp?=
 =?utf-8?B?RlNKRmN5Wkh5SE5xVVU4Y3V4c0RJQWJGVEU4cEFFcjdTbVdGMFVHbEZCbDFD?=
 =?utf-8?B?cUNXT1B6VjVYdWY3Mk5Qb1VIR2c2aG10T1pCR1NmSG1UeDlMc1JBaitqdmRS?=
 =?utf-8?B?N3FNcGlZTm1BMmU5N1BRNEtTMFFrK2YyUk1kbDVSS0E5TWRGVDVacUQ3aEJk?=
 =?utf-8?B?S2tRRitzaStyY09iUjNDWEVLQ3V4YXJINmxBTEdlc1E2UjFpakpLWEJmbERM?=
 =?utf-8?B?Um4xRlA5TEFVWlBMSlZmcjVNVWJqNjZRWTEzNXJCcU1RNGMyWHR6TWZJbjdv?=
 =?utf-8?B?aG9SZlJPRWlTN00wcExHTi8zNjNVSDhJWTBqZHFXb2VELzdKN1BtdWh0V3RY?=
 =?utf-8?B?OVRCQ1pzSHBQcWN4VHkzSnVCRXJjRDVoUEpBTkNNdkgvUTQ1Y21GQjZMVzF5?=
 =?utf-8?B?eEFYRlYvRUJGejIzenFFdGg4WlhRPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <B85C04D3F65376489A6A0F04BAF6FFDE@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 971bb2a5-d7bb-4b53-7a6f-08d9fd03551c
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Mar 2022 10:48:20.3513
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ukZoz6nbFurHROdS4OyKUQXfbEs5FDkvPnfoGHc0KI8f+vgyPCsWjMEBcLjYvaT27SsRhtBkDrW98koaKUfd7JEKfZnkyxNAzuHJtm1wb1g=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR03MB5031
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:53:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:53:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283113.482018 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPj5Q-0004co-Mr; Thu, 03 Mar 2022 10:53:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283113.482018; Thu, 03 Mar 2022 10:53:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPj5Q-0004ch-J1; Thu, 03 Mar 2022 10:53:32 +0000
Received: by outflank-mailman (input) for mailman id 283113;
 Thu, 03 Mar 2022 10:53:31 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPj5P-0004cb-0o
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:53:31 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 290fc58a-9ae0-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 11:53:29 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2169.outbound.protection.outlook.com [104.47.17.169]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-13-TIiGH9RrOaqjdpN2MUggHA-1; Thu, 03 Mar 2022 11:53:28 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB6PR04MB3222.eurprd04.prod.outlook.com (2603:10a6:6:6::18) with
 Microsoft
 SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.26; Thu, 3 Mar 2022 10:53:27 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 10:53:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 290fc58a-9ae0-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646304809;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=kKs7L7BI8yKfprv/IaPIpHmgDddE8nqaz0aAd/uQNFM=;
	b=Q2A3NjwhzfrH8ixIQe/gOaRpTfWwzrIjK5EhmUFrhybMW7eNoAA1NUrM7RIL2I7SWUjhAC
	8e5chlj2iPAxu+kK4zKt8BhKMxIfaEcw0RAi5ck47X5QZFiYgRm4YH4+jVDjdDKXOFR9Fh
	qRSCTdGH8iQXVm14ZZ29kPS9Kd9XN2A=
X-MC-Unique: TIiGH9RrOaqjdpN2MUggHA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=UtQdsggWqF0VOh6SOblD6rzHAYX1Obk1/y3OKAUDE6JXXilPXx0Rh5lbPWzvR6H6PS/Z7arlSHe6VcPmi0kxTFfv7kUTGb0/EeXHVMHBiUouxZCBMyRX1Bu6lnS80I8wg9Fdts68j8B4evkU9aIqB+aXLDS9zSBhJEHNKwdxFmvHinNXklPgAilkUpwNdmeuKh6oSaj95lD2isnBvFw5JvTrlqk69A8cafK9Cip18Unr7a5GOwFS/26Aj3MleEp3pIXCSNWZ/VhFsjwflOFnjtzZWAVQsJJ8pyAvG6j+3IUkoScmqX3bFCcZhxVm/a04rrz+jiogFDjcWTTQHIehBA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=kKs7L7BI8yKfprv/IaPIpHmgDddE8nqaz0aAd/uQNFM=;
 b=EUWeFAdMALIoqyNh5x/+prMbR+Nh2vuI2zLKVBWsG/S9n8dEM2gzdamEJWF5C5p2jTfvcx0+92oFR5a4hgRB5YI1X9AWJ2uKgQU8X3bqSoQsu8sTDGDhfQyENsL4yScRB08ARrqPaVlPPW5VLYKes4lo7rPb4B4tZUqyT+vetcOFIKWjJH/GHEceFrImoncarQyjDS8+RnfRIXrPZ10VYDakrhAMGCCrB7vRgc2fkS+vaVGSdtDmH+nP+6EPUF1AVuGytc2QKRFEcsb+5cDHoSN65h81CtLeh5VvgygPccsgFP5JqMs65/cU+bL59MYUdr2LC5q9XVQWk0NxWN7K5g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <68c7236b-4cde-2425-bdc9-858169f95b1b@suse.com>
Date: Thu, 3 Mar 2022 11:53:24 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [XEN PATCH v9 28/30] build: specify source tree in include/ for
 prerequisite
Content-Language: en-US
To: Anthony PERARD <anthony.perard@citrix.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220125110103.3527686-1-anthony.perard@citrix.com>
 <20220125110103.3527686-29-anthony.perard@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220125110103.3527686-29-anthony.perard@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8P189CA0021.EURP189.PROD.OUTLOOK.COM
 (2603:10a6:20b:31f::25) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: cb61b0e9-4773-494d-dbb8-08d9fd040bb4
X-MS-TrafficTypeDiagnostic: DB6PR04MB3222:EE_
X-Microsoft-Antispam-PRVS:
	<DB6PR04MB3222BE0F24A2C68FD98D5660B3049@DB6PR04MB3222.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(316002)(2906002)(31696002)(186003)(2616005)(26005)(5660300002)(8936002)(4744005)(4326008)(31686004)(86362001)(6486002)(966005)(53546011)(6506007)(6512007)(6666004)(508600001)(6916009)(36756003)(66556008)(66946007)(8676002)(66476007)(54906003)(38100700002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?a3FnVE9VTjBwVHI0Zitwb2puKytnMm9BM1NoQm9RbUdWeENrYmxLYVYwZUVs?=
 =?utf-8?B?TUhUUzZLRHFrVlR2U0hzWHRFK2tlY2RSdUM4RWV5RXlqWlI2aDZqL29xZkYz?=
 =?utf-8?B?b2k1SHpFZ3FnTFA5TzJLVU50d1dOVklrcFR4WWZvM3ZMUTlING1reXBKMjE0?=
 =?utf-8?B?UklFTVR3ZGFuMGE2TE4xdGFVVjBzQWJtdVRQSjc3U0NNN3FKTzVhK1VhMTJn?=
 =?utf-8?B?cTIvTkJkT0VKSVFTeUJ1QldoV0NFUW1GUWFkMGhIZFVSVEJqeWhjVDBPT3Zm?=
 =?utf-8?B?OUZRejFBZGd5QVR5Qk9kUS8ycU4vRlZlNUNkWFI0R2ZkWnRXZHdSMElzT2Fv?=
 =?utf-8?B?dVZwb3F0ZmUzN2huMFV3QzEyZ0poemdKK2craEhYR25NVnpWMlE0RlRyR0lZ?=
 =?utf-8?B?d2ZJZzlRanFiRTIvSGxZOXpEVDY5K0ZEQkJkeTNSU3VSZDl0ajhtZFNPcFRJ?=
 =?utf-8?B?a010L0FSNUlzcmtVOTREZnpSbTZ6UVlzY0E4TDlSYzdzK2ZndHRicHJjWUwx?=
 =?utf-8?B?U1RzMTdXMlpUR1orRHg5QkhtSnVtNXVudTgrQW8vekxJRU5BaVluVU5JVU10?=
 =?utf-8?B?azVOTFNWRWN4WDQveUg0d2FJV2V3QWozbmxvWVllR28yeUNPOCtzNHloVnJ6?=
 =?utf-8?B?SFZOcjlLZDFaaWpNaThGZUV1TVZYZFVTem1Ub2hDUTI1RExVT2ozeW9WbVVh?=
 =?utf-8?B?NFNUc0Ryd2tNeHNNMEJEaGdXMnZFVVlKRlpMZWF5NzA0bWxNUFRMbStWRCtk?=
 =?utf-8?B?d1NQb2pwUmRnS3FyaUtrbm94SHB2OG82eVRxMU9uT1YvNHVmcUNuck9XcktF?=
 =?utf-8?B?ako2UUZFV3BLK0VxY29KTmYvSVhsWmJSYjNhNjRvU04xMTM2a0dFZ2ZsV05V?=
 =?utf-8?B?eFR3QlN5QkRxSXJLUG40SnlZcCtPd3ZqZmVWZE92aVc5eFJDdHdzY1RwQWQ3?=
 =?utf-8?B?Zkdna3VJbVJaS3V1M3lxek84dnUxTnE4dUJlMzE3cnh5OEZ3aTZvaGs5RFlj?=
 =?utf-8?B?Qy9rVm50UVp2YzZwSGhtdUJBL3lzNnlsR002elBPY2h2aWdSNVl3ZVk5eXRl?=
 =?utf-8?B?Ykd2ckNGYUFpckVWekRHd2xib3JSaFJUaXFpVUFqcFg2dmp2TzdBeW8rRHln?=
 =?utf-8?B?RDA1bjFNTjBMT3RFWnF3YXJDeWRMeWJxUURoY1hVdGdqckdMOVhyL3hwZS9p?=
 =?utf-8?B?MStBV1QyZC9lb2txTGFjNTZ5M2dvNU5QaEN5Q3BtSmI4THB6MW5CNi80Z2tT?=
 =?utf-8?B?Q1pQWjY0SHVnY3Z6a0Rpb0UvNkRSMmt3VHVKVUxVeERGbFRSemplVWJHenRC?=
 =?utf-8?B?SkQySmlBYVR5SWxiZDVtWmxnUGRzbzN4UklHZjJNV00ycEhxVGtIaFEvZUVW?=
 =?utf-8?B?aGptanhQZUtSOWZwbzZDbmJBdDdKdUZRMWNSRExPRXZPc2FYeTROQmhUclM0?=
 =?utf-8?B?VW9YZDcvdGFYdUN0djFCMDJLQ0FnY0k4L0x0TVlzYS94OTdHRHAzS1J1MW50?=
 =?utf-8?B?WUh6N3piTThWWmRFMDY5aFRyUXZkOWxRdWNiOHNHdkZHMys5c1ZuQ1JwL2lu?=
 =?utf-8?B?QytKdW8yY0NkQXBCbE94NHlaRWNKZCs2ak5uMXdZTE05NWh3R3ZNb0pCbHNj?=
 =?utf-8?B?OVFPaGlOMFVQUjBnTWlCbjFNZjVKYWphUEVEb09GcUFOQkcxTTcybEg3ekhx?=
 =?utf-8?B?NHd1UUhveUJVNzBTbjNObGV5YzZKcm5BR3VkNFRDM2NCbjEzR25MYVlOOWJ5?=
 =?utf-8?B?SWhJUTAzbWFwRStPcVRTSVJhMCtxRDZ0L2tNaGJONU1mNnZzaUFmWURUTXlY?=
 =?utf-8?B?bnI3UVowaUNFcUFMV2d4a1gxNFZjaStwSUdqNThPSU12SzkxVVZKZHVYcDEw?=
 =?utf-8?B?VVE1MGxDcnBMT0VReVRranJJYlJnT1piNFNmMTZHdndpYlprVEc0L2p4NTBN?=
 =?utf-8?B?QjNpNkR6SVptRlQxR3FoVXgzSlVnR3NkY3VGcDRNVVl5UWZvY0RWWVpNa3NW?=
 =?utf-8?B?NkZWTnp2ei9DSzhoQkY5TzRBSkQzWGJrdWZndlVrR3pETnRPaktOQkYvdHJ3?=
 =?utf-8?B?cnF4MDIwUFE1QzY4MHRNc3c4Z2VaOXFGc3gzRUdRK29WaS9DNDBtVU1VVlQ3?=
 =?utf-8?B?QjdJR015cUFxWGJpbjZZaVMxemVJOWlKL2l1Q0pjVzZyakZUZ1dNNFFuTWQ4?=
 =?utf-8?Q?AN4GviwkUTCQ9U0DbAFM4uQ=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: cb61b0e9-4773-494d-dbb8-08d9fd040bb4
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 10:53:26.9609
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: alW3BH7YJPtsnY2ZNy85NAJYZgnrLkGS4uF9VSa2othVGGtbEkJLe5unwoyaaEqLRs36PRShypZh+Y4YdtgsZw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR04MB3222

On 25.01.2022 12:01, Anthony PERARD wrote:
> When doing an out-of-tree build, and thus setting VPATH,
> GNU Make 3.81 on Ubuntu Trusty complains about Circular dependency of
> include/Makefile and include/xlat.lst and drop them. The build fails
> later due to headers malformed.
> 
> This might be due to bug #13529
>     "Incorrect circular dependancy"
>     https://savannah.gnu.org/bugs/?13529
> which was fixed in 3.82.
> 
> Signed-off-by: Anthony PERARD <anthony.perard@citrix.com>

Acked-by: Jan Beulich <jbeulich@suse.com>



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:57:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:57:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283122.482028 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPj96-0005KY-A1; Thu, 03 Mar 2022 10:57:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283122.482028; Thu, 03 Mar 2022 10:57:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPj96-0005KR-6z; Thu, 03 Mar 2022 10:57:20 +0000
Received: by outflank-mailman (input) for mailman id 283122;
 Thu, 03 Mar 2022 10:57:19 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=o95t=TO=lst.de=hch@srs-se1.protection.inumbo.net>)
 id 1nPj94-0005KL-VP
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:57:18 +0000
Received: from verein.lst.de (verein.lst.de [213.95.11.211])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b10cdc56-9ae0-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 11:57:17 +0100 (CET)
Received: by verein.lst.de (Postfix, from userid 2407)
 id C476A68AFE; Thu,  3 Mar 2022 11:57:14 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b10cdc56-9ae0-11ec-8eba-a37418f5ba1a
Date: Thu, 3 Mar 2022 11:57:14 +0100
From: Christoph Hellwig <hch@lst.de>
To: Boris Ostrovsky <boris.ostrovsky@oracle.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
	Christoph Hellwig <hch@lst.de>, iommu@lists.linux-foundation.org,
	x86@kernel.org, Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org, linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org, tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: Re: [PATCH 11/12] swiotlb: merge swiotlb-xen initialization into
 swiotlb
Message-ID: <20220303105714.GB15103@lst.de>
References: <20220301105311.885699-1-hch@lst.de> <20220301105311.885699-12-hch@lst.de> <alpine.DEB.2.22.394.2203011720150.3261@ubuntu-linux-20-04-desktop> <ca748512-12bb-7d75-13f1-8d5ec9703e26@oracle.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <ca748512-12bb-7d75-13f1-8d5ec9703e26@oracle.com>
User-Agent: Mutt/1.5.17 (2007-11-01)

On Wed, Mar 02, 2022 at 08:15:03AM -0500, Boris Ostrovsky wrote:
> Not for me, I fail to boot with
>
> [   52.202000] bnxt_en 0000:31:00.0: swiotlb buffer is full (sz: 256 bytes), total 0 (slots), used 0 (slots)
>
> (this is iscsi root so I need the NIC).
>
>
> I bisected it to "x86: remove the IOMMU table infrastructure" but haven't actually looked at the code yet.

Thanks. Looks like the sizing is going wrong.  Just to confirm, this is
dom0 on x86 and no special command line options?


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:59:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:59:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283128.482040 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjAr-0005x2-Op; Thu, 03 Mar 2022 10:59:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283128.482040; Thu, 03 Mar 2022 10:59:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjAr-0005wv-KX; Thu, 03 Mar 2022 10:59:09 +0000
Received: by outflank-mailman (input) for mailman id 283128;
 Thu, 03 Mar 2022 10:59:09 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPjAr-0005wn-0T
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:59:09 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f2c39bc3-9ae0-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 11:59:08 +0100 (CET)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2053.outbound.protection.outlook.com [104.47.14.53]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-18-kBdAAi68PJurWQDpkhuD4g-1; Thu, 03 Mar 2022 11:59:06 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM5PR0402MB2788.eurprd04.prod.outlook.com (2603:10a6:203:a1::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Thu, 3 Mar
 2022 10:59:05 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 10:59:05 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f2c39bc3-9ae0-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646305147;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=be6hoA96UNy0+pF0zqh5gh7Y5OFBByCQ7SvKnQMi2rA=;
	b=ngNvGPUQsjHYJvIgq18GtEmW6oFc/8+ACXS2coS+yL5gn7SCuIgSM0DD1/laGtpFJldVm3
	KHQcQZUSyjjaAds00NJBV9BX5oiS1DCvWAng7BP9ICfG/uHE6Blb/QQGu6mECrPMiRXDEQ
	okOCaQ9e630XhVdcs57/XeOx9gEqe3M=
X-MC-Unique: kBdAAi68PJurWQDpkhuD4g-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ZAbboif4A5vGbcNCC7+dF06L0/YXx4S1r4gIg38EWIeWcmnA6ym8082bueQDby1G0KNKfoGdT7trBRwjmKRmopsLL9bXpLNPwPyReQ/8+oiJi06FkANauvTx8Gxe0jLPHKNYAPik1xu4IR9TXJOwpYSujFLveSYCXxNu5vy0WU8GUD4c0ZBOQXXc8kkKrjPB28GkQ368gw2uaOKsQHG6FKrBpCSOSM3dppcugt3iNQ6g6niwWxK2PjXrKjrw5rrCHSW87hGSJck1oIQjEOwDh/KLlVoAjldwXn40xnbUBV1TwT8fTpnEdmlNun97ZFi7/177fmg9FmpVP476h6PPKA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Y1SV8yK9o9QiN0FlhArskaKNPMQh6eQ+kGmJnF2ekOs=;
 b=KQWLHrErhc2vWwVVASJNcMkHjoRsVWR5D8P+NMDp7kFblzxQLlA8ZNPnXr2pGw14hQuOX23UqmnBn2svHWAAH/ieeeH5D1PCma2J0SpR7OMkQhLvL49AKdsNMBBCH5jtaIMFB5D0lV+t1831bRgvDiPW7dLjqWK+YaC2nlZWAtceUvSwkia4P9aDDzi7fg3x5HqMWXzuKVuDi3cLqYnkJiYulV9jt1nsRfcvvlV757jJQCF7Z0jk68iiZwBKW637j7nHT8sCSnWJClr9lcOnLNzLER4qoBMxDGvOwZgNAt8sXiSht8A619mlDIX1ZY/NcXMcy6PGTldOvUqW1l1h2A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <9de235e1-70bb-9ad1-fb0f-c8c0f76ce765@suse.com>
Date: Thu, 3 Mar 2022 11:59:02 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH 3/3] hvm/pirq: allow control domains usage of
 PHYSDEVOP_{un,}map_pirq
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: Wei Liu <wl@xen.org>, Alex Olson <this.is.a0lson@gmail.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Roger Pau Monne <roger.pau@citrix.com>
References: <20220303103057.49181-1-roger.pau@citrix.com>
 <20220303103057.49181-4-roger.pau@citrix.com>
 <c1fafc74-d4d2-5fc5-db38-c75f076d8405@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <c1fafc74-d4d2-5fc5-db38-c75f076d8405@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS8P189CA0020.EURP189.PROD.OUTLOOK.COM
 (2603:10a6:20b:31f::8) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 1246f9de-c36e-45c8-2dd2-08d9fd04d540
X-MS-TrafficTypeDiagnostic: AM5PR0402MB2788:EE_
X-Microsoft-Antispam-PRVS:
	<AM5PR0402MB2788DA202B1E6CB2F47AAE1EB3049@AM5PR0402MB2788.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(53546011)(6666004)(54906003)(6916009)(186003)(6506007)(6512007)(31686004)(5660300002)(2616005)(36756003)(508600001)(6486002)(2906002)(83380400001)(38100700002)(4326008)(66946007)(8676002)(66556008)(66476007)(26005)(316002)(8936002)(86362001)(31696002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?nE858wumelsaIz2QsBFBgcXGRdSlcpVjwBNg198TjUNIzrcvu0GVb9q3EP9x?=
 =?us-ascii?Q?6kdQtAh7opJyJwJuGsCOelDzHxBmKSSUtHQv3dW5R+nJboPXByHgeNjBVO5n?=
 =?us-ascii?Q?udEIK5akBeBL0QFvpxP2mZQHTe+Kp+vknIUZwzPInNsIFhZGz0gu5GvJmL6A?=
 =?us-ascii?Q?ERIkImJ4U+AJBk+gXvvTAihbDLMlXJTrqJelCeav2vxZAq3HiDAVvwpU8BG9?=
 =?us-ascii?Q?ef1IPe3++0QjupNogpBHLIWl49B42gTzJ4d3lP18JQQLW4Mht7GAwP6K/I1Q?=
 =?us-ascii?Q?X5ydrx7ynFToC70AZvRFqE03kfHnPZxQQ9AjCzpzZadN/Nygo5sB8p1ybSNO?=
 =?us-ascii?Q?JbaiK0aPcQVTpEOYZ5dHl87atP9UnDpP5s65q0aMZPkPhJisY0Q6DgII5g08?=
 =?us-ascii?Q?5C4467FpQFUozO1EkmFCvC0lTYTkLh6REluDlyBtZRXCPgujAT2aLgoEcqdk?=
 =?us-ascii?Q?o667El4C2RmCKvw/zuJIqPrdCGNR6lDZ6dRcU1kE7lBhR+6gccje7VLTbFPr?=
 =?us-ascii?Q?/FVA0BliclsVrl7xmmEMnRR30vrEkx3vAKKNA91U2qcuBtbm+RpjWDcqbPVU?=
 =?us-ascii?Q?Y9QYW4xQHF8bHaQykyMnTxezPNYahlaGgNCRsP6hARuGxMvby/AEhLmNkY7M?=
 =?us-ascii?Q?lGaP40aXjDXpOV7OGZak3lSbEnQTRuaVge47YGmDwY6f3m0uxBsA+HPesQ1P?=
 =?us-ascii?Q?LHgpyqS+EJ5RTwXY5uc6Ah+UazcrhYYXAF2qhJe/9n1VLYcU64Ntx7XDDkBf?=
 =?us-ascii?Q?KsPCknM18LKS4UQFRLPO1vwEu7KBoF55IrA3/Xl9pSZm9Kx5QlqRYS1Hsg3B?=
 =?us-ascii?Q?i8naO68Y33Mbsp7i/UbKP1WY2kp5kbxGvI3Z/4mLKnhstLJNS8zJXqAKuCRe?=
 =?us-ascii?Q?DDPKNEeNgsqOQsW1dB3uFdcIMp/csyfDYy+I3eWl/CybmdppjyIhIaFLeB4g?=
 =?us-ascii?Q?QakiSv4IR8Rm+Wv2ahhyIRjkooaxOfzBDSE/ruiWWrVhavWsxY6sIltZaUSw?=
 =?us-ascii?Q?b3ytAd8vVc8ThF3b3+9kzYnocCHjY5AIaZYBgACQlTf6Ndle/HcYV727o1h8?=
 =?us-ascii?Q?K6ES5jsVYYdUH5oAZBLLly1jB4Qv5aqvbGdJzSyFIRS31TOIkrtcqvFZC6p8?=
 =?us-ascii?Q?qsG9oUxH2VA/4xNFx35cfvAK0p4s7rWUntDbUhZzWftYdxmqkX85P8Arytv8?=
 =?us-ascii?Q?6OIwMeipebCE3Qb8ns4v6MVO+qIqF2r5ndo0XAb8lhegdzssE2+LBCgJu6x4?=
 =?us-ascii?Q?2kmO4LWBGQKFR1CM0ek3QGFJB5e1mr+LC7zCW8UIa59YFbGjQmmVz73BxW4t?=
 =?us-ascii?Q?xYWJNl8vgtJ7mmgzrz870JqkoNyUZSjuUY0orcoGaQKy/nkO+v4UDhtD7hex?=
 =?us-ascii?Q?GnvnxYtssjP/Rb2VUansTCG4FVB+VAfanJvGCQmEEVAsKNx+EY2uEdYcQ7/z?=
 =?us-ascii?Q?DOWKmaevgtA6iHyxmKJaSoTjuO/zBa4Cu1Pue4fvUms4C/YFxhCginkz+sFD?=
 =?us-ascii?Q?HsaVXpLFlfm/qtuwxmbgfSPRQ9s0zVN0gxaOrt2V+ghMVkyVcHX3NqVFP0MY?=
 =?us-ascii?Q?hPrhV9qejcQ1ylNVhAoME6dPFSecmLi8x1HVhXBIWV9PD85z7BBwiGsvHIU7?=
 =?us-ascii?Q?9fe0gEMfY8g94w3PsEZMed4=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1246f9de-c36e-45c8-2dd2-08d9fd04d540
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 10:59:05.1272
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: +jY5xg/97vMP9UK399IvpVmgTcsx9nXmyfO+XE2J4JIPpkEe3Neu9o1xtRbctloYprmKxqkA+VufedlvTghveQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0402MB2788

On 03.03.2022 11:45, Andrew Cooper wrote:
> On 03/03/2022 10:30, Roger Pau Monne wrote:
>> --- a/xen/arch/x86/hvm/hypercall.c
>> +++ b/xen/arch/x86/hvm/hypercall.c
>> @@ -87,6 +87,13 @@ static long hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_=
PARAM(void) arg)
>>      {
>>      case PHYSDEVOP_map_pirq:
>>      case PHYSDEVOP_unmap_pirq:
>> +        /*
>> +         * Control domain (and domains controlling others) need to use
>> +         * PHYSDEVOP_{un,}map_pirq in order to setup interrupts for pas=
sthrough
>> +         * devices on behalf of other guests.
>> +         */
>> +        if ( is_control_domain(currd) || currd->target )
>> +            break;
>=20
> Hmm.=C2=A0 In a split control/hardware domain model, then qemu is in the
> hardware domain rather than the control domain.

Interesting. I would have expected it to be the other way around, with
qemu for domains with pass-through devices living in a stubdom.

Jan

>=C2=A0 I suspect this wants
> extending with || is_hardware_domain(currd).
>=20
> Also, the sentence about later safety checks really ought to be in this
> source comment too.
>=20
> ~Andrew



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 10:59:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 10:59:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283133.482050 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjBI-0006U6-Vn; Thu, 03 Mar 2022 10:59:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283133.482050; Thu, 03 Mar 2022 10:59:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjBI-0006Tz-Su; Thu, 03 Mar 2022 10:59:36 +0000
Received: by outflank-mailman (input) for mailman id 283133;
 Thu, 03 Mar 2022 10:59:36 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=o95t=TO=lst.de=hch@srs-se1.protection.inumbo.net>)
 id 1nPjBI-0005wn-5A
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 10:59:36 +0000
Received: from verein.lst.de (verein.lst.de [213.95.11.211])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 0305f56c-9ae1-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 11:59:35 +0100 (CET)
Received: by verein.lst.de (Postfix, from userid 2407)
 id DB58D68AFE; Thu,  3 Mar 2022 11:59:31 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0305f56c-9ae1-11ec-8eba-a37418f5ba1a
Date: Thu, 3 Mar 2022 11:59:31 +0100
From: Christoph Hellwig <hch@lst.de>
To: Stefano Stabellini <sstabellini@kernel.org>
Cc: Christoph Hellwig <hch@lst.de>, iommu@lists.linux-foundation.org,
	x86@kernel.org, Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org, linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org, tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: Re: [PATCH 11/12] swiotlb: merge swiotlb-xen initialization into
 swiotlb
Message-ID: <20220303105931.GA15137@lst.de>
References: <20220301105311.885699-1-hch@lst.de> <20220301105311.885699-12-hch@lst.de> <alpine.DEB.2.22.394.2203011720150.3261@ubuntu-linux-20-04-desktop> <20220302081500.GB23075@lst.de> <alpine.DEB.2.22.394.2203021709470.3261@ubuntu-linux-20-04-desktop>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <alpine.DEB.2.22.394.2203021709470.3261@ubuntu-linux-20-04-desktop>
User-Agent: Mutt/1.5.17 (2007-11-01)

On Wed, Mar 02, 2022 at 05:25:10PM -0800, Stefano Stabellini wrote:
> Thinking more about it we actually need to drop the xen_initial_domain()
> check otherwise some cases won't be functional (Dom0 not 1:1 mapped, or
> DomU 1:1 mapped).

Hmm, but that would be the case even before this series, right?


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 11:04:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 11:04:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283143.482062 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjFj-00084A-H3; Thu, 03 Mar 2022 11:04:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283143.482062; Thu, 03 Mar 2022 11:04:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjFj-000843-Dw; Thu, 03 Mar 2022 11:04:11 +0000
Received: by outflank-mailman (input) for mailman id 283143;
 Thu, 03 Mar 2022 11:04:09 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPjFh-00083x-Pm
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 11:04:09 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a5f935c3-9ae1-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 12:04:08 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2107.outbound.protection.outlook.com [104.47.18.107]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-27-M9Wxcii5MEOztNHGxsBUPA-1; Thu, 03 Mar 2022 12:04:07 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB6PR0401MB2455.eurprd04.prod.outlook.com (2603:10a6:4:35::19)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 11:04:06 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 11:04:06 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a5f935c3-9ae1-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646305448;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=XmXTFrWdUllm8g3MIt3VacA2yLRY1bdn6RwakbM8HDY=;
	b=KomkxVwgVsTXylplK+3cQxNJTNid2rqjUwrsvbG6jnyj0NinyhRPYB5/ZMT4NlfmQ0ojxB
	z7YoScx+Um9cLUTTJzGHGG3MSui/KX0rqKGDjdMThI6k6MDLDz9A08sHi7sBG1GhrpsWwt
	3zzMapOoGEGgoncgrpy5TIJ6LW8v+VM=
X-MC-Unique: M9Wxcii5MEOztNHGxsBUPA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Pg0nuAWBrv7vTrQRnlyvnSQXgOna1bc0LQ0fnJsNzjhLKUP0b8UTbRnDdGSQ7JtEJo3PY0v0Au3MLTS8lSAs/sBvi8aLLn2jnplPDgHm9BpT7LACHuq5kFQJBFXA6calnto6e8QIEVkjqZmiDjZVj69CAzKkzLjzC/rXcEurpA0ghRnYNHrH8YIGffmXyhwlqBt6rmX573j3Avm0FU3PYXjNCyaVFYpJAhx+1lmFjmvNTeBNu3A3ihOEO/Z0czSYQhdHUpmvByGJi4HCM1Tlar+4hfMfNqzpQrIvxkjaJnBj0vG8UVeGghlyNlETv6gQj2k+Tl2qyJGX6PjfZYcAJw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=FppL73j/xqsPUYy46Btn0R/6oKYrGNrgVQKpuFBJZkE=;
 b=nRXYRjMcYhajZobn7Xj067TmBjJeMEVabAobxmzsIzvblNu7+XeLYhasQ9VfR2pvJZZ6HH7l86kshsFoRyKAzJGQZDiVqiMKLIecMhBxsavphBT5NtVhDfMpB3ES3oA6aFStCsNHt+rVurU+q+5D2+ZdjRHmHPeb/3twLQ4935V5JREXbcP+7530mrAozm4OtPwFofALDuI4KiJj4gMwanNCrB6GX3NPodtfZ9LXsFtdTfydn763hvm7vQ3M42huZ7AloldH9lzFklNmCsOYFypd2ky/r4lgoJnsCXYA3FjY9NlTWyA8r2sINIwmUab3HGU7Yx9RmFeVl2jC0c/Omw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <3bbbe906-ca02-c748-23fe-7a98864cfb93@suse.com>
Date: Thu, 3 Mar 2022 12:04:04 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] x86/cmdline: Interpret 'vpmu' as a positive boolean
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <20220302221157.17246-1-andrew.cooper3@citrix.com>
 <6ffbc025-758e-bb7e-4e87-0b6b9e1bc2e5@suse.com>
 <bd6dda42-fc33-5958-31e7-741853c85c9b@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <bd6dda42-fc33-5958-31e7-741853c85c9b@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR06CA0051.eurprd06.prod.outlook.com
 (2603:10a6:20b:463::22) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c869a825-b81b-4a79-57af-08d9fd05889a
X-MS-TrafficTypeDiagnostic: DB6PR0401MB2455:EE_
X-Microsoft-Antispam-PRVS:
	<DB6PR0401MB2455A6459961EDC8E24FD37EB3049@DB6PR0401MB2455.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	k8pTFY7IuIQUDzB+K+LBQMbv7zeGO//PlLBcTf3AJ/RYlS8svxzJrSycNtzQChhwlYVZvFgiqGSuKq8cZaHe7x5uiHepjjxmMV7C5QCk8S5urUPx1YcloBo+HFsmyyI0W2fo+oWnf6ogj0r8w+Cl7VbPKoNN1ZDRNnVmSoJQi0Qtfiw8BluB088KCBhufM8YReGB8TKXh9UpPk6abjU+wHB/2J+h31T16pmDsNWjzOxdu9/G4ad4UPmoNYeinq2tAxxkHPRSf4F2uF2Inyvv7vk+1vafpNu13RVjd0JPNpxgL7DRSF+regm7iweR8cTwvfWcmWuU/4xSIE3a/nSjgFuI4lCunRPjn5Q6FTbWPyVjzL7N+s/Xtkdag2Ytn/n4p3hZyrSELIojBiZNy5nkRllsu+cJZBZdrzP5S4EsCpOv4f9yejAiPsVNY9yLMw7LE7IQKHPChnkLTqNgxgKMZJxXQR9n7moQomMV0fuLgVK/TeACPHd4kjw93dY0dKL44FfCY6nwP7W1u6RaS1wixOI2P1cHB6I4zb0Wcmo1mM8N8+DS80et3L27Q2xSJLUlMHM3QaafLVN8SDGbI2A6QBTXeFWYtovsyULJ5QLitvRYQUKV8QN5j6SJ7usnhCIsQ/kWJJNbT7cjXzoYOP3/4SULtyUHxkrEN+NCp0frkJbYjmqHnAg8pxDhRuh3XCKGF8igE5Kow0J/SbTvo5l3yu+z7c2DUXZ8I65KaA0Ox2A=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(31696002)(86362001)(316002)(6916009)(2906002)(83380400001)(36756003)(66556008)(66946007)(66476007)(54906003)(5660300002)(31686004)(4326008)(8676002)(8936002)(6486002)(6512007)(6506007)(53546011)(2616005)(186003)(26005)(508600001)(38100700002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?ikP2L9YHZCKvn/t0LZNMy+vYvBdyNTvlWKy4zMrvXgNEuKzFECEIZw2KfOqw?=
 =?us-ascii?Q?Upo5apIZJeJQRBXrokEQbT5CSL8DuA0hosGSiANsfT7IhwqkcgQpn9vIc4Az?=
 =?us-ascii?Q?eeilgrW3jgo/Bia6oRkyEICQvyd7d7PS7qyQ7M3ZJCrybiIetcUwacHm10yu?=
 =?us-ascii?Q?0h3Y5NhK9+WVwP/W2zO+FKIb3lACgeFFP+bQcD5e+BoCTheHo6a88Dbf8GOY?=
 =?us-ascii?Q?ZpeflPg7uacclZWsr+0LTIdVxBRvMwkY2a8LPpKvexhuX7Alvtw9Blug0NeW?=
 =?us-ascii?Q?p/kMz4DINxBsxMtrPOOJ1DxS9roX5QLZyBqMup1WEinpYixGdvBlc/S7jfwn?=
 =?us-ascii?Q?bQpIOM7Nw64he1mAiTDRzBNoXJSskubK2RhpdK8Y8+GTzFMlthiI2xaokXzj?=
 =?us-ascii?Q?uxzXPPj2h4tdT5goB6WwPdhEu86qDuW6CC4C8mWcw1OHFMbaI2Zb3l2uKqHZ?=
 =?us-ascii?Q?jGvG0bvh9cxojQZvSop8UMTRRFNyruc1qiBHS3ntHBwEiNWhNfgS3LxcQi0M?=
 =?us-ascii?Q?H1arXpvP84N0JECBFMmwz2PmCGPrqHy27CYu07HwR56xrD5JgMBnRvxdfEvY?=
 =?us-ascii?Q?jpveZWoYxxOZwl0v8tIG6uUjrqjlg725RPRExL6BEFy9KaRbXjo+o+u1BYcH?=
 =?us-ascii?Q?UEGOLrOaVAt2ZGuIWTy6dQmRQ/3qeWDW7/qSRT02cdVQ1dVBLkADYfwM48GE?=
 =?us-ascii?Q?UfDJv+SeVFz2QlBdLEyHTf3LgSb9BIKgq9MDgFUy0L4N2p9o/AZTESwRJzGe?=
 =?us-ascii?Q?zTR7GuPWEmzs5EX9oZrjWyYBX2941stShohNaRIEGrPt2JBiKgQAGDXfXp4W?=
 =?us-ascii?Q?WvhE4Hwy99WjMRkvc8/3VDkzH4/+OlY2p/omlHTUVVMgj/Ep/85Z2q7oKPyz?=
 =?us-ascii?Q?4SUSeCed7o6pUhGyAjJAq9yAx6duAvmbcreEn/sOuoOE8qLu88HGNzM29iBq?=
 =?us-ascii?Q?z1gvcx+jlrebbDQHp5yO5jrahuGM6+y4CkB9s34UEm0OrePuIS+SStrsYq2h?=
 =?us-ascii?Q?BtGc1dfM/McupILFXXbFrstfESfnfBoXB3eLKe6wW2ujLuu6XfOWydClHgO9?=
 =?us-ascii?Q?6YgrVsDhMySwPF0lOl4WUyaexMYlBxTBKczpipv6VxbNcV+bdnSEXwrIP07o?=
 =?us-ascii?Q?RtO0/4AH85UrM6hm5R71CHptRzoAvM4af4MbfAxwWUz3ckVbOSRG+8Xgqn/A?=
 =?us-ascii?Q?qVHnwAHc8OgRVgmPZdEUKJrabFIZGS/br2kEAROlh0Y6rv4/p6g0TnwWfUHf?=
 =?us-ascii?Q?hs/s637GvJCObzjItWH4F/jgWG/obJ7pUAi26d8lp3KFplBoxuU3gxw5vR+m?=
 =?us-ascii?Q?jP0aNagL3iIreHIHf2dPI7GgcL+JHfjPkCbwiX+pgP0m0JQbaAI1qAVrNyYS?=
 =?us-ascii?Q?9M6CanLAatCRdkG6zSffBg/CGxDQP4L9H8v5RaOVRK9+kk+y+s9y2Od2nbFW?=
 =?us-ascii?Q?GYW2Kbu+uFQKgopMrx39peiVM9W8yAFpqVXhwUo+jMnuUmtQwNvmtfO6L9l1?=
 =?us-ascii?Q?8AK+GYh5g89hUrkZi/Rj++plxpxA1Gd+bR81qP4hYs2lHKP9PH2DvZiMfwuD?=
 =?us-ascii?Q?AXhK4Evsn6xUAPuJXD50uPbrRfWG+dfPJ8jGXG9MbXU1iRui/Qog64Yh/tCb?=
 =?us-ascii?Q?6yuXBzVvbrZ4jZs3uJp0ciM=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c869a825-b81b-4a79-57af-08d9fd05889a
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 11:04:05.9834
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: d97+5oCHGo7t/ybGhennxmpB3ct1p5ysmxrAH4jsBeRmqNIhLQfMvq+yBTlSz3tHJ4BEUNN27DHRvhkOU0cYyg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0401MB2455

On 03.03.2022 11:48, Andrew Cooper wrote:
> On 03/03/2022 07:44, Jan Beulich wrote:
>> On 02.03.2022 23:11, Andrew Cooper wrote:
>>> This makes it behave slightly more like a regular boolean option.
>>>
>>> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
>> Reviewed-by: Jan Beulich <jbeulich@suse.com>
>>
>>> Slightly RFC, because there is no easy way of making the opposite "norm=
al
>>> boolean" case work for no-vpmu.
>> There's nothing to do to make this work afaict: Generic command line
>> handling converts "no-<option>" to "<option>=3Dno" for custom params.
>=20
> Oh - I'd forgotten that, in which case this patch actually wants to be
> simply:
>=20
> diff --git a/xen/common/kernel.c b/xen/common/kernel.c
> index adff2d2c77f3..2cea1da781ac 100644
> --- a/xen/common/kernel.c
> +++ b/xen/common/kernel.c
> @@ -162,6 +162,11 @@ static int parse_params(const char *cmdline, const
> struct kernel_param *start,
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 safe_strcpy(opt, "no");
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 optval =3D opt;
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0 }
> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0 else if ( !*optval )
> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0 {
> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 safe_strcpy(opt, "1");
> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 optval =3D opt;
> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0 }
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0 rctmp =3D param->par.func(optval);
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0 break;
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 =
case OPT_IGNORE:
>=20
> to turn "option\0" into "option=3D1", no?

Iirc extending this to the positive case was deliberately not done, for
the risk of breaking custom handlers not expecting the standard boolean
forms. We could likely go this route, but only after auditing all custom
handlers, I'm afraid.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 11:06:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 11:06:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283151.482073 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjI9-0000OX-TE; Thu, 03 Mar 2022 11:06:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283151.482073; Thu, 03 Mar 2022 11:06:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjI9-0000OQ-Pw; Thu, 03 Mar 2022 11:06:41 +0000
Received: by outflank-mailman (input) for mailman id 283151;
 Thu, 03 Mar 2022 11:06:40 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPjI8-0000OI-09
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 11:06:40 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ff8fe02b-9ae1-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 12:06:39 +0100 (CET)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2058.outbound.protection.outlook.com [104.47.14.58]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-32-v9GA_SjHPfCx6F4ABtZbsw-1; Thu, 03 Mar 2022 12:06:37 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB3PR0402MB3660.eurprd04.prod.outlook.com (2603:10a6:8:c::21) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Thu, 3 Mar
 2022 11:06:35 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 11:06:35 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ff8fe02b-9ae1-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646305598;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=tT9BHcrKds19YE+LvXeXhXPPBFmWvhX6Zmof90GvHzQ=;
	b=fLdq5P4vIgG+JZkEaT8KrHr4IlPu6y8aiMRWFpE6aGJcHmOyUD+9Yezp/83qpLcyROa2Fo
	+XFhZU14kaT9U/QDXdIfjWARBrK2geXTppjBOfwO1ACCje9NE/ewX/XvidHMLa5uriNEda
	KSy9P8qUV2idTy+RtU7aUmU/i82T7hY=
X-MC-Unique: v9GA_SjHPfCx6F4ABtZbsw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=hxyWRIu91EVtDnfFD51+gA3KlwwusHz+9XAtqOz0JaeouQRqIxM26YXwOiOnqUdE019C9fowM4obbFNVgoUA3POZ91s07WPBaKXiLk96PzFBaL81yV7ZSueUChhiDOpGTm4u4jkz7k1SlSZbeF257DESzb/dRCyL4uPEQPXQ2ja9pWKh6qX16m/sB64AvFg21e9vWwX4FIiV7U+ThS9sfjvXibQ7UP1UqDv4u8ZiCvN8mDwTxwHQpt+4ldBSJjb4dYdDiWag8FrYoc+bCKd/03aWKe79H3BJC+gqaetOcfb1PeLqg2ghVGt9vHXVsXEj/F1tUjuFkQFTGAqGPuNz6w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=tT9BHcrKds19YE+LvXeXhXPPBFmWvhX6Zmof90GvHzQ=;
 b=BxOBg7PKwNCwDyuzJaK+YKCCUXtj5oepmOLyEDbLZAzh8DUhHUq7E0L4oWGJ0Dsb5tuTh98qM2hJEfavHcqz1KmIC3oz6gkes8BueDWRLElX6cYP5zEdSFY+T0ycyr8wLrIbHElWLkcYOcM3Uo/lQxwpRwj6XCRgz+Jt1214zISiYzT5St8OhZdqF3BxmJBfxnAoVf1W5SiiB7szgWYTn4KQxwdc10jn114rpc09dLkkVN2ll8env2UiTNQ/+LJvbDRuhivFv6DTCJ2RUGemEIzzr76NSdR2AppyVn1rJHqnj2tqriczB61RqQrrfwklYPNGyRDoEioKpoJ0W7E+4A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <fa5f2f3e-5ad0-134e-e57c-5d115702f1f7@suse.com>
Date: Thu, 3 Mar 2022 12:06:33 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [XEN PATCH v9 29/30] build: shuffle main Makefile
Content-Language: en-US
To: Anthony PERARD <anthony.perard@citrix.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220125110103.3527686-1-anthony.perard@citrix.com>
 <20220125110103.3527686-30-anthony.perard@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220125110103.3527686-30-anthony.perard@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR0301CA0037.eurprd03.prod.outlook.com
 (2603:10a6:20b:469::22) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: bca96449-0d53-473c-309e-08d9fd05e1d6
X-MS-TrafficTypeDiagnostic: DB3PR0402MB3660:EE_
X-Microsoft-Antispam-PRVS:
	<DB3PR0402MB366057A6D190DDB047452AA1B3049@DB3PR0402MB3660.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(508600001)(6486002)(316002)(66556008)(66476007)(66946007)(31696002)(86362001)(4326008)(8676002)(2906002)(38100700002)(54906003)(6916009)(36756003)(5660300002)(4744005)(6512007)(31686004)(6506007)(8936002)(26005)(186003)(2616005)(53546011)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?dzFxdjZjSFUyb1BkQXZmL1BXSHp1RDJGMll4cllTcCtpYVA5WG9Cc0FWdHk5?=
 =?utf-8?B?Y2p2MXJvV1NNMS9GRHgrQ2o0eWJybzZQVFpjMG1kMmxybFFVajMyVTBPTnFP?=
 =?utf-8?B?K2V0MjZpVThmQkYybDlhZndZTWNNQmlyT0djY2VDeVpGcTZmQnhLSVpPaE15?=
 =?utf-8?B?MGFtUDl2K0w0OWVMeE1lTU9QMmltK0h2MTZheTBydHpJT3dab2JMVEJGNk1r?=
 =?utf-8?B?dEpFMlVIREg0cktCQ1p1S2pSVFd5NjFXWU0yZVpRVS9UODNnNEJjVHZrajR5?=
 =?utf-8?B?ZDloMDgySHBzWmlXTGxKeHFVenJaNU0wNzkzQUppOGU0M0x6RHlKeWRKMFE1?=
 =?utf-8?B?NDlDanM0MlRqQjZjVnBnWW4wV0t6cWtvTnFVSUpQNDBKTktjS29WdFlKeDFr?=
 =?utf-8?B?blFWYm9MVHNHaXVWQWJFVUJaWWdzNktQdEFkblhzUm1kSlJaRmROODZJWXor?=
 =?utf-8?B?TFQ2VlpDN2hIblEwYUNBYkI1S29HUi9WWVZWNkdKUEoxR3UxYkRqb0YxQTd1?=
 =?utf-8?B?cFlVVHE4dnE1SmJVRnZ5VWdsV3F0YUxWKzFGNzk1d3dsZVNKZlR0V2NKVE05?=
 =?utf-8?B?YXdZNUtQQTJGVFh3NVFUR2IySk5Da3BrZTdTM20rSC9GSEwvZmZBWFZ4QW01?=
 =?utf-8?B?MllhajZZYnZPazRhT2twOHkwY2tnem5TV1ZNZ0V6QmUweVplR1BUVm9FM2lG?=
 =?utf-8?B?SThDRndaa0VIcFlkTDNocHhQaWczcEN5Qy9yd1Z3Q0ZadUNZWXoxM3RVME9k?=
 =?utf-8?B?bEhxZkNqS3l6dEhxeVFzVFNoaGhTaE14c1dIR1hrWE9KNHR6dWwxNWloYitx?=
 =?utf-8?B?aUN2R3p5bVIrVTF5aFlsYWxMMGhJa1hob1h0bkZSUjd2VlFMektvdXAzK2l2?=
 =?utf-8?B?cE56SXNsT1FWWGlpUzRFWEc4bDlLWXRIN2NVYWQ0SzEzVDNHcG9EdXhwYWYz?=
 =?utf-8?B?MUNONG0xc0U0U0U2RUF0TFEwYkxoK3hwOEtCNkNjaXBGbzB6YTNmM0tKaU1x?=
 =?utf-8?B?dENrc0ZlZ1NzbXIxNnBma3gySlFyeUN4dmphd0JWMDJRRjYvRFQ2cm9GMEVT?=
 =?utf-8?B?a1ZqbDNwaTVYY2dWMHRhMi94UE11T2pibVNDbU1MV29vKzlMSW5rMWQ3SW9B?=
 =?utf-8?B?WWtTRU9uazBieWJDdUFkMGtFL0Z6cHNueHhJR3RiSmxPMGM0b0hIMXlFakhz?=
 =?utf-8?B?aWZ5M0IyVko1RTVJeTROWmdFSmNuMlFoNy9NVDZXMlRKeHNhcDNjN1ViUEhS?=
 =?utf-8?B?SFIyK09Pa0xKak51cnZZY0gwS2tXMGhjS2YyMzRhWFQyZFdhVlR3S1p5Z3Zl?=
 =?utf-8?B?NzFQWTRHbHBzdzNRMWhXZW54OWNQenU4RDZYQ2YyZ3h3S2w5VlQzVHk3Y0Rv?=
 =?utf-8?B?ZDVyREFnLzZHaDJwUFBySEJpbG5pZWhYNUFqTU5xRHVGME9xZ2NnTWI0S0w4?=
 =?utf-8?B?cXZDU2hRbUVwcFBMWmFnWThyQXFSWmVXcmZsNnZkdGVEZFhLd0tXT0NMYmhF?=
 =?utf-8?B?MlhTL21hOEM3MHZmUWlkaFhzOEw0ZlNLN2RnbXVKaWxEdVg5QUZMY2s3YW5U?=
 =?utf-8?B?QnZvRFRKS1hMeThnRkN3aEFPN1lNTDFieWpFUVgvMXg5TXo5VW40eHFQL2gr?=
 =?utf-8?B?WGJPRCtDUFFOdmdIS3NmamJib2tnQm1weU4xYVBJcHI2aEkxNEhvSDJlMGwv?=
 =?utf-8?B?YjMrbzJaYkpaeTd1VkpIUEY5WUZ2T0V2RDg3N1p6RnBGNzRjZnJIeUVhcUpN?=
 =?utf-8?B?OTgyRTFyYmZUYkdSeDkxSlg1c2RJVnBWZEc4eGpLOWFVa3pvR0dTSml3cTZ6?=
 =?utf-8?B?K0toamx4L0dPWHErek1oRi9VZDR4NTYxQU8wc2hDb2hyclk1WE94di94KzAw?=
 =?utf-8?B?aG90d09xWllrV3ozY2lyWk9EdldTT0o4cnZKeksrdWFiNzNWUURnZklzdGR2?=
 =?utf-8?B?U2l2L2lnd2JQSEF4K1dQTlRWTVV1YTV1WTRaMHpqeFp3VWxNbE5QVkFjUjRB?=
 =?utf-8?B?Vlc2MjdGN3ZYTm5raGQyRU1nV2oxMjhaSWpSbW5tNzdIQU9Gb0ZmYk9kZURh?=
 =?utf-8?B?ajZWV2xiWlRTVUhFR1cxY2o3M2RiYmdIUmR1S25wcHg4N2ZLR2N0M3VLVmtH?=
 =?utf-8?B?Um1veENLRkRaTlU3eTljckZHYTA3SUE5a0x3U3BnRTh1M3Q0QW5WMEVGSFdU?=
 =?utf-8?Q?cy4FMevBS/6mFVbDlr1V7cw=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: bca96449-0d53-473c-309e-08d9fd05e1d6
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 11:06:35.7397
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: ftz0hlqYQzrB+IoNm7hIp6qlOg2DYkTFDhHz35on1Z1tXIKKVie/bW/gGt/DdRc4VFZe8IN7TB5poWmhmP0SKg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB3PR0402MB3660

On 25.01.2022 12:01, Anthony PERARD wrote:
> Reorganize a bit the Makefile ahead of patch
> "build: adding out-of-tree support to the xen build"
> 
> We are going to want to calculate all the $(*srctree) and $(*objtree)
> once, when we can calculate them. This can happen within the
> "$(root-make-done)" guard, in an out-of-tree build scenario, so move
> those variable there.
> 
> $(XEN_ROOT) is going to depends on the value of $(abs_srctree) so
> needs to move as well. "Kbuild.include" also depends on $(srctree).
> 
> Next, "Config.mk" depends on $(XEN_ROOT) and $(TARGET_*ARCH) depends
> on "Config.mk" so those needs to move as well.
> 
> This should only be code movement without functional changes.
> 
> Signed-off-by: Anthony PERARD <anthony.perard@citrix.com>

Acked-by: Jan Beulich <jbeulich@suse.com>



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 11:15:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 11:15:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283161.482084 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjQn-0001xq-Tf; Thu, 03 Mar 2022 11:15:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283161.482084; Thu, 03 Mar 2022 11:15:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjQn-0001xj-PQ; Thu, 03 Mar 2022 11:15:37 +0000
Received: by outflank-mailman (input) for mailman id 283161;
 Thu, 03 Mar 2022 11:15:37 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=++p5=TO=citrix.com=prvs=054f29298=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nPjQm-0001xN-WB
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 11:15:37 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3e715569-9ae3-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 12:15:35 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3e715569-9ae3-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646306135;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=Odd7VUtRxTM1w/B3gktcj2B+VIG94zSwy4YhPfWEIQg=;
  b=YpamuuBjpXiOtS6vwZfjxnFSyzShjEUb/wfxiaYIlIud1MHz+GohZAXf
   iSxxJaLEz6C7BhGDI4uc1kibuhMS50H7o2JoOJx1oPl2+p0TNIIUh06cu
   fq5JOceYz8wHn2GqPUWF+v0IGxIWqyX4/QW/ED95uZs2eEg5PGiiHN//n
   g=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65785294
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:u7mdM6nFWYfvwlY2DDT4GXzo5gycJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xIcCDjQbqnZZGLyftEgOdu/8UJVu5DQyoQyTQBtrX8yFiMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiW1jV4
 7senuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYQycvYJHw36MkDRxlIQpxIo1gu4fJPi3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3k3ds1zzGS90hRojOWf7i7t5ExjYgwMtJGJ4yY
 uJHNGU/MU6RP3WjPH9IVYIHu+6lt0XbcgV6o1upuaYR6VfMmVkZPL/Fb4OOJ43iqd9utlaVo
 CfK8nr0BjkeNceD0nyV/3S0nOjNkCjnHoUIG9WQ6fpCkFCVgGsJB3U+V1G2vP24gU6WQM9EJ
 gof/S9GkEQp3BX1FJ+nBUT++SPa+E5HMzZNLwEkwAutzPTo30HePzYBcwxqZ8MGkowOSyN/g
 zdlgOjVLTBotbSUT1eU+bGVsS6+NEApEIMSWcMXZVBbuoe++enfmjqKF48+S/Dt0rUZDBmtm
 2jikcQou1kEYSfnPY2f9EuPvT+jr4OhouUdtlSOBTLNAu+UieeYi22UBbrzsK4owGWxFADpU
 J04dy62trpm4XalznHlfQn1NOv1j8tpyRWF6bKVI7Ev9i6251modp1K7Td1KS9Ba5hYJ2W1P
 hOC4lwMvfe/2UdGi4ctOepd7OxwkMDd+SnNDKiIPrKinLArHON4wM2eTRHJhD28+KTduao+J
 Y2aYa6R4YUyUsxaIM6Nb75Fi9cDn3lmrUuKHMyT50n3gNK2OS/OIZ9YYQTmUwzMxP7dyOkj2
 40EbJXiJtQ2eLCWXxQ7BqZIdQFadSVgXMuuwyGVH8baSjdb9KgaI6a56ZsqepB/nrQTkeHN/
 3qnXVRfxka5jnrCQThmoFg4AF8zdf6TdU4GABE=
IronPort-HdrOrdr: A9a23:cQUMZqwM1JNOcSTT1/qlKrPxguskLtp133Aq2lEZdPULSKOlfp
 GV8MjziyWYtN9IYgBcpTiBUJPwJE81bfZOkMYs1MSZLXXbUQyTXc9fBOrZsnHd8kjFmNK1up
 0QCpSWZOeAbmSSyPyKmjVQcOxQgeVvkprY/ds2pk0FJWoBCsFdBkVCe32m+yVNNVJ77PECZf
 6hD7981lydkAMsH6OG7xc+Lor+juyOsKijTQ8NBhYh5gXLpyiv8qTGHx+R2Qpbey9TwJ85mF
 K10zDR1+GGibWW2xXc32jc49B9g9360OZOA8SKl4w8NijssAC1f45sMofy/wzd4dvfqmrCou
 O85yvIDP4DrE85uVvF5ycF7jOQlQrGLUWSkGNwz0GT+fARDwhKdPapzbgpDCcxrXBQ5u2UmZ
 g7r15w/fBsfGL9tTW46N7SWx5wkE2o5XIkjO4IlnRaFZATcblLsOUkjQho+bo7bWvHAbocYa
 FT5QDnlYJrWELfa2qcsnhkwdSqUHh2FhCaQlIassjQ1zRNhnh2w0YR2cRaxx47hd8AYogB4/
 6BPrVjlblIQMNTZaVhBP0ZSc/yDmDWWxrDPG+bPFyiHqAaPHDGrYLx/dwOlauXUY1NyIF3lI
 XKUVteu2J3c0XyCdeW1JkO6RzJSHXVZ0Wa9iif3ekPhlTRfsuYDcTYciFcryKJmYRrPvHm
X-IronPort-AV: E=Sophos;i="5.90,151,1643691600"; 
   d="scan'208";a="65785294"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=X2BSj/dCSsf3ropUMFkW/oCu89gMDp6/kF6DXbEJhRXOfBfR6todrwGMv8vmjrOdYoWWLYUJ34+KPQ50+CmoLJJ93Yfdr5lv8d1CjDe9PxxxjWxvBCH1nXK4MN7wS6HvoZg5xAkIU4Lc2R8HI+npCv1Fd1SlFIrcApOJuY9WMYyY3i8SN2F5GTi+Yaqh21qJ3zIvfZsXld+ie/V85wK+6JySVFJdcEK+E4H0quF/JACyIAK8sg4o7dyog55JIpEnO3sWqFVVCL1TF5NGuG0wWuzZmsWtGYh1NDaYGMgJLqeMFpLx000ElZTZeUl3yFKVL8pve/vXPE8nKWXP4ofKLA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Odd7VUtRxTM1w/B3gktcj2B+VIG94zSwy4YhPfWEIQg=;
 b=KPlDtD2EL+2UO+psrxqUTjha+B5Ylbaf7TjXdbdef7Dm0AulJQcXBPHvRjBKZQ4/jGsYNJBlMlH2Xubw8q4qBTEf710g6MdlLQE913lO19oj+kyhmTzLkQITyVFqZGcyX0oB5SUA9brC3KgHqBqrq4HE5eLSSwAip9tj2jPwlWS1quNnlS+YQ83Hds5xZ0BKg6GLuNW7EKPhlMftUOUZ9wLUbuTCg5tFMaZvMzsr7toYzJkBANhu2+dqfVYRugYmiVUTOxdUPFcJixykdoBzGxzL75CAGLDxWI8MgUJHm2NAHLsYE2gkTDYzStjruI95AulvOpVQICdH1tnb4w1oyw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Odd7VUtRxTM1w/B3gktcj2B+VIG94zSwy4YhPfWEIQg=;
 b=aq1jlE7By5otg8Ajr9Jin5ZgJmfkWTN6TYc5HA5D/BCITrcs8denxkovpNgYC/Q60PFCO2MMwyHF3c8X52T2SjaHME64I1FXs0MNacUaU9OUjOkeMQqnH/+JUUuYLRqQqUJox/f9H6OlfSMtKS90zGZYecrL8K12iFOuje2Heko=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>, Xen-devel
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH] x86/cmdline: Interpret 'vpmu' as a positive boolean
Thread-Topic: [PATCH] x86/cmdline: Interpret 'vpmu' as a positive boolean
Thread-Index: AQHYLoKhjt6lbGTIskelwxGk8I14LqytR+SAgAAzewCAAARlAIAAAy+A
Date: Thu, 3 Mar 2022 11:15:27 +0000
Message-ID: <9377d616-e5ea-a3a5-0a90-e2ec81ca6fb8@citrix.com>
References: <20220302221157.17246-1-andrew.cooper3@citrix.com>
 <6ffbc025-758e-bb7e-4e87-0b6b9e1bc2e5@suse.com>
 <bd6dda42-fc33-5958-31e7-741853c85c9b@citrix.com>
 <3bbbe906-ca02-c748-23fe-7a98864cfb93@suse.com>
In-Reply-To: <3bbbe906-ca02-c748-23fe-7a98864cfb93@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 00e8cbf7-5ef6-49b1-4716-08d9fd071f00
x-ms-traffictypediagnostic: BYAPR03MB4341:EE_
x-microsoft-antispam-prvs: <BYAPR03MB4341D77DE7D8206462EE5304BA049@BYAPR03MB4341.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(38070700005)(5660300002)(86362001)(31696002)(82960400001)(316002)(6512007)(8676002)(64756008)(66476007)(66946007)(76116006)(66446008)(4326008)(91956017)(2906002)(186003)(26005)(66556008)(2616005)(38100700002)(8936002)(53546011)(36756003)(6506007)(6486002)(71200400001)(508600001)(122000001)(83380400001)(54906003)(6916009)(31686004)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?akU4eGJEY0NHN0Q4WldwYnlEdUVtRU5UKzhVZTRlcHJsdll3N2JrV09mUGR0?=
 =?utf-8?B?MWQ1SEZPWURaYXl5bC9xdTR2Q0NBQXdsdzJxQmhmemd0VWdRdVZMajFMWVFL?=
 =?utf-8?B?bHRKMVcrMGNtWFJUd1YrdGZKb1RPMG5zUHJkMFRZd2tmTC81RzhnUlJLd1Jp?=
 =?utf-8?B?UkVIaG5qcWs3NmZKazh5dUdRWnV6MndSSWtIS05XaVNoZ0tlV1R2L1Q2clNj?=
 =?utf-8?B?N2VRQm5VSnJQNUVKbVNrOGovd08zU1dscUhVMjdwS0lLY3JCUkZIZWVQdGx6?=
 =?utf-8?B?NEZJMGZQRjJ2QkYwSGdiY0RLWkREaVNub3JXMFdhcnU4YSs4WEV4blU0M1Ft?=
 =?utf-8?B?L1V4SzlRZTE4OFNRU3J2eHp3OFBTQnFyczJ6YWdjVXpTMDBJcHcyRTlaVmlR?=
 =?utf-8?B?NUg3MVhnRFk0S2xlTVFwZlJhVi9hcWZPSXV1SXJhS1M1VlA0SzM2d3R1WVpL?=
 =?utf-8?B?dVhUTElSRHJPdEdXSmFlSFFGbzVvbUp4ZGxLTnlXNVVkUEoxV1VkZm84N2h4?=
 =?utf-8?B?Mis5U0NvUWhkeUx5MTVsQjhab1hpckJSeWxUZUcrWXQ2RWIvMUovbEZLcm5I?=
 =?utf-8?B?MkwzUmp3RWU4ckdxdE9QM3VrVHpHMFpCQi9URXRIV2l0ak56SW9zaUpQazRJ?=
 =?utf-8?B?ZmNWc2VVcVl2a00xWHNNM1lzVDRKQ2w4c3E2R3dnZXc3SDdYM1dHL0c3Uldy?=
 =?utf-8?B?THZEVVFkdHBpeWhYSEpYS2VobDdNeWJYY1NnbEtVRzZaVlgwWW9MQ1RwdWVU?=
 =?utf-8?B?bFRMeDgreE5GbWQ5MlVjZVFYS3ZoR0ZwRkZaS2phMEl0aUlGTDU5NTgwUnYw?=
 =?utf-8?B?eDVZU3V4RVJzcE9raE1uWi9NYW9ITGxublYxZVlqNjVtZmZWOFFRYTc1SWdL?=
 =?utf-8?B?RVRZN2lYcEs5RWYwZVBFcmNLbTBRVzFpZkR5aXVHM1Q4cjlKUi9mZU1hNjcv?=
 =?utf-8?B?NENTMlJqRkJ3SzNGdGkwazdlVHVkTzA1a3FIUGtncDE4RjFMR1ZyUkJ5K29x?=
 =?utf-8?B?SEdQNDRuMXZwbFdScUV1eUpCTDRna1NFbElZL0NyRHM5cnNPb1I0WGtnS3d6?=
 =?utf-8?B?RHNtelh6NHhXUzduYytRU0diWGIyajc2UmhYRXRLYXQ5Y1lTYlkwNmFuMFZk?=
 =?utf-8?B?SXRuZkNwWjRpR2E3dGoyZ2hyVU9YL08rZ3BoSUVPMDhzYlRWb0dqY0dMaVA0?=
 =?utf-8?B?VElVQWw0SkMyUWF3UjFSMis4dFNRT2lIQWF2ZWQ0TUVWYXhud1ZOaGh6L2Vw?=
 =?utf-8?B?d3FZQ2p1MURoQngraHgvdnpwbi9EM0lvclhGak9aZStmNGFxNU4xV25DRDBm?=
 =?utf-8?B?RXRIcE0zU0VaczNXZEVFa2tsWTh2THhhMXlCZ3MrRE5tNFN3NGJ4MUhOL1hF?=
 =?utf-8?B?OXU4Tm5vY1BtZmY3YkJqSnRrUkVRNGRLZXRIZ1dXYnVEWXpkY29UVjA2VFhw?=
 =?utf-8?B?MHlRUE04Rkx5citWWGNFS1dPaGNrNWFpLy9EY21CcE93ZjlQb0NDdU1MSGFW?=
 =?utf-8?B?V21XTGR0MUxwS3ltaTRlWUJCd2RJTEUxYTQ5SVZyK2IrQzJVU1FLdU9VVmhz?=
 =?utf-8?B?dDBObUdDekJaMWpNaWpXNllKTng4c0JpbTl4d1ZhYWp6anhqMFJuRDlyVG93?=
 =?utf-8?B?M1JURXFwMnRteVFESm4vSnBZT1NnQjRIUjRidkVhRXpGMVVrMEQveHhOS0hV?=
 =?utf-8?B?OU9IcjZCTkI5cFhSdHRZN3NJcEYwSGtteTFjaEhLVkxoQWJpZkFDZE9Pekpj?=
 =?utf-8?B?dUVSd1RGT1FwZXFTbCt1REJqNHpEc1gzSko1TkJaZVpRVGZOY3ExZDd3K0Mv?=
 =?utf-8?B?UTErR2RsYTg4dzFidko4Ti9qY2hpdFBkOFgxbmhuUUNlTGhHSlNaaXpEcGZs?=
 =?utf-8?B?RjF4clBRbFI3TzYrLy9kZDdwcGJabWJQWFRha1F6OXMzaXBLclM1N2p0cnha?=
 =?utf-8?B?NFhja0RjNWlZYjhvaGp1bVFhbW00Qks5UFo5UzhIMzQ4bTcwc09yU0w0Q0tI?=
 =?utf-8?B?UmRSQmpMR0QzNFloSTBQNlF2QW1KVzZONG91dVVpWVREUUlLbWNmb1l4ZEtD?=
 =?utf-8?B?UlJ4c1VJVnc2aHJ4WnNnWktpdVVrcngxYk1SczRlVGFtcndIUHVTVU54QXpn?=
 =?utf-8?B?M1o2WElDSkFBQVpJa1BPK2psSy9nV3ZpTUVIckp5ajIrWHdMRmZyczRvcnBm?=
 =?utf-8?B?K09Vb0lsN2hKN1RGU3J1dmhzSzZyazZJdXgyYm1CaWJQUjZickpnQkx6SlV1?=
 =?utf-8?B?NWpaTFJoVWhYRnBML0RITzBDeWxRPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <4066AD38C7418C488CA1A9FF4F38E9E8@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 00e8cbf7-5ef6-49b1-4716-08d9fd071f00
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Mar 2022 11:15:27.5408
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: +A4WLVUAirCqxh6CpSzBfp6iXqFXM+G4yTHk+fuUnYhvZupBD93G4OLeyEO2a1NA/jdYjvPu8bbk11wvJsTnAKc5SpnaXVmGo4xGBiyE3ec=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB4341
X-OriginatorOrg: citrix.com
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=


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 11:16:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 11:16:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283165.482095 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjRH-0002Qe-4Z; Thu, 03 Mar 2022 11:16:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283165.482095; Thu, 03 Mar 2022 11:16:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjRH-0002QX-1Q; Thu, 03 Mar 2022 11:16:07 +0000
Received: by outflank-mailman (input) for mailman id 283165;
 Thu, 03 Mar 2022 11:16:06 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPjRG-0002QH-G5; Thu, 03 Mar 2022 11:16:06 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPjRG-0003Ug-DV; Thu, 03 Mar 2022 11:16:06 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPjRG-0006tC-5D; Thu, 03 Mar 2022 11:16:06 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPjRG-0006xv-4n; Thu, 03 Mar 2022 11:16:06 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=MrEoPtW+dBXBCRBPXsRWQ7t2N1OIHy6dy7zWfzOwiqE=; b=A9HOGAz5h3dkmrkM6JZByAbqsP
	DLzr06JhStq6YUIarBLD+eAfyt01E2aDc0PhC+AnnCHMCtDVlceByiIx1yLp3UB9K1Wnp0esAMtxW
	V37NnWRIUHeqiVWNk1pvaGIN9igNhdCO99yvnWNNc1k3Xl8dcVWBfgkaFIyktV/46IFs=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168359-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168359: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=589d51df260465e2561979b8a988e77b0f32a6e8
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 03 Mar 2022 11:16:06 +0000

flight 168359 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168359/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 589d51df260465e2561979b8a988e77b0f32a6e8
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    3 days
Failing since        168258  2022-03-01 01:55:31 Z    2 days   21 attempts
Testing same since   168359  2022-03-03 10:41:39 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 589d51df260465e2561979b8a988e77b0f32a6e8
Author: Sean Rhodes <sean@starlabs.systems>
Date:   Thu Feb 24 19:38:18 2022 +0800

    MdeModulePkg/Usb/Keyboard.c: Don't request protocol before setting
    
    No need to check the interface protocol then conditionally setting,
    just set it to BOOT_PROTOCOL and check for error.
    
    This is what Linux does for HID devices as some don't follow the USB spec.
    One example is the Aspeed BMC HID keyboard device, which adds a massive
    boot delay without this patch as it doesn't respond to
    'GetProtocolRequest'.
    
    Cc: Hao A Wu <hao.a.wu@intel.com>
    Cc: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Matt DeVillier <matt.devillier@gmail.com>
    Signed-off-by: Patrick Rudolph <patrick.rudolph@9elements.com>
    Signed-off-by: Sean Rhodes <sean@starlabs.systems>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit b422b0fcf92dd4103dfc16d8d5f77fbec2d8c5b9
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Tue Feb 22 11:29:23 2022 +0800

    EmulatorPkg/EmuGopDxe: Set ModeInfo after Open successfully
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2668
    
    WindowOpen will fail in some case. for example, without XServer.
    
    Shouldn't set ModeInfo in this case to avoid the caller use it
    incorrectly
    
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 906242343f7a654402f6f999d447aa9d29a8f4d4
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sun Feb 20 14:53:01 2022 +0800

    MdeModulePkg/GraphicsConsoleDxe: Check status to make sure no error
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2668
    
    SetMode will fail in some case. for example, without XServer.
    Should handle these case when SetMode fail.
    
    If we don't handle it, it will Segmentation fault.
    
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit dc39554d58af4a50b50eca1f57c49415a12b0c98
Author: Xiaolu.Jiang <xiaolu.jiang@intel.com>
Date:   Tue Feb 22 22:14:05 2022 +0800

    edk2/MdeModulePkg/Debuglib: Add Standalone MM support
    
    https://bugzilla.tianocore.org/show_bug.cgi?id=3844
    
    This change added Standalone MM instance of DebugLib.
    
    Reviewd-by: Jian J Wang <jian.j.wang@intel.com>
    Reviewd-by: Liming Gao <gaoliming@byosoft.com.cn>
    
    Signed-off-by: Xiaolu.Jiang <xiaolu.jiang@intel.com>

commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 11:20:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 11:20:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283180.482109 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjV0-0003Kc-Mt; Thu, 03 Mar 2022 11:19:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283180.482109; Thu, 03 Mar 2022 11:19:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjV0-0003KV-Jp; Thu, 03 Mar 2022 11:19:58 +0000
Received: by outflank-mailman (input) for mailman id 283180;
 Thu, 03 Mar 2022 11:19:58 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=PW1S=TO=citrix.com=prvs=05474af58=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nPjUz-0003KN-Rx
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 11:19:57 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d9e03b6f-9ae3-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 12:19:56 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d9e03b6f-9ae3-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646306396;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=drbi93nK861rTbgrTJORxuegnx+emM3WevbpqR4wFYw=;
  b=f1P2K4IMhNnNg//OvUD0KjNMleVn2ZAyf77FriI+ir2j9yGjKK+4nTo7
   NyLnlWGvw+ajF+atfEC9Ou1oVhNWJ7P+VIlkPMnDq6PD4dH7uMeuJnepd
   fvSLiZCWU4yM/c77aMXHlwbGry28qiY3sQj1oyTDpKZFK+ERrONh0NTcA
   M=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65384971
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:e8yKRK6/2xKSIzKolDCR7QxRtC7HchMFZxGqfqrLsTDasY5as4F+v
 mVNC2uBP/aMZ2qmftFya9zg8xwGsJKBmNZlTAQ9rS5hHi5G8cbLO4+Ufxz6V8+wwmwvb67FA
 +E2MISowBUcFyeEzvuVGuG96yE6j8lkf5KkYAL+EnkZqTRMFWFw0XqPp8Zj2tQy2YPhWFvX0
 T/Pi5a31GGNimYc3l08s8pvmDs31BglkGpF1rCWTakjUG72zxH5PrpGTU2CByKQrr1vNvy7X
 47+IISRpQs1yfuP5uSNyd4XemVSKlLb0JPnZnB+A8BOiTAazsA+PzpS2FPxpi67hh3Q9+2dx
 umhurS0FSQDfaD3ot1BDR1FLjxeG4dK5/jIdC3XXcy7lyUqclPpyvRqSko3IZcZ6qB8BmQmG
 f4wcW5XKErZ3qTvnez9GrIEascLdaEHOKsFvX5t13fBBOsOSpHfWaTao9Rf2V/cg+gQQK2OO
 5tGMFKDajyZMxdIZmsKA6sfgeeoq0P/VWN2j3e88P9fD2/7k1UqjemF3MDuUsOObdVYmACfv
 G2u13T0BFQWOcKSzRKB82mwnanfkCXjQoUQGbaksPlwjzW7xGYeFRkXXluTuuSihwi1XNc3F
 qAP0nNw9+5orhXtF4SjGU3jyJKZgvICc94MMMd55Tq38/aK5xukG0giZDJeL9Nz4afaWgcW/
 lOOmtroAxlmv7uUVW+R+9+okN+iBcQGBTRcPHFZFGPp9/Gm+dhu1UyXEr6PBYbo1oWdJN3m/
 9ydQMHSbZ03hNVD6ai09Euvb9mE9smQFV5dCuk6swuYAuJFiGyNOtTABbvzt68owGOlor+p5
 iJsdy+2tr1mMH11vHbRKNjh5Znwjxp/DBXSgER0A74q/Cm39niocOh4uW8ieh01bJpVImC0O
 Sc/XD+9ArcJZhNGioctPuqM5zkCl/C8RbwJqNiOBjaxXnSBXFDep3w/DaJh92vsjFItgckC1
 WSzKq6R4YIhIf0/llKeHr5FuZdyn3xW7T6DFPjTkkX8uZLDNSH9dFvwGAbXBgzPxPjf+1u9H
 hc2H5bi9iizp8WlOniHqdNIdAtSRZX5bLivw/Fqmie4ClMOMEkqCuPLwKNnfIpgnq9PkfzP8
 G37UUhdoGcTT1WeQelWQhiPsI/SYKs=
IronPort-HdrOrdr: A9a23:1UdiTKwxF67B8F96hSQSKrPxyOskLtp133Aq2lEZdPULSKKlfp
 GV88jziyWZtN9wYhEdcdDpAtjnfZr5z+8J3WB3B8bfYOCGghrTEGgG1+rfKlLbakjDH4JmpM
 Ndmu1FeaLN5DtB/LbHCWuDYq4dKbC8mcjC74qurAYOcegpUdAa0+4QMHfrLqQcfng+OXNWLu
 v62iIRzADQB0j/I/7LTUUtbqzmnZnmhZjmaRkJC1oO7xSPtyqh7PrfHwKD1hkTfjtTyfN6mF
 K13jDR1+GGibWW2xXc32jc49B/n8bg8MJKAIiphtIOIjvhpw60bMBKWqGEvhoyvOazgWxa2u
 XkklMFBYBe+nnRdma6rV/E3BTh6i8n7zvYxVqRkRLY0LrEbQN/L/AEqZNScxPf5UZllsp7yr
 h302WQsIcSJQ/cnQzmjuK4GS1Cpw6Rmz4PgOQTh3tQXc81c7lKt7ES+0tTDdMpAD/60oY6C+
 NjZfusq8q+SWnqL0wxg1Mfg+BFBh8Ib1W7qwk5y4CoOgFt7TFEJxBy/r1bop8CnKhNPKWsqd
 60dpiAr4s+PPP+XZgNd9vpfvHHf1AlYSi8eV56cm6XXJ3uBRr22urKCfMOlaaXRKA=
X-IronPort-AV: E=Sophos;i="5.90,151,1643691600"; 
   d="scan'208";a="65384971"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Rgoo3W2myrIL0DV8kWoTaj02VYSERln3ZQgV1OiL6tj1O/g6ZParKgVW0ZxUXHvPyPTbxoOf3xUYKNGq0vcQELuqEBN7erzncly/0kW1eREPypCrALO+UKAtZLiocs9rBoDpu9sSmztOQpn08xR4g8i2j3SsEkA63caUNj1F+oF4gBXy6rwW93R8GDosGFaW+DnigM68GdZcxK2Rj62mdDXEGUxeRz9xzJKDsEehyfyKpw35Pj6zExpratT/ikRtNb5BTI5LAfblHoi0MWxV4JoTdIrryp8IQE0cnopx6dyPfP7y/d4GqmomsSir7PAUMl9Hh5hPErwbWJMWl7k3vw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=WepmeitH0Fb/BuwuVEAZRJdYewyBtxQsOxi2a6KbIec=;
 b=NAObcfxcL4podAIVknhcxtKLfry/sp9ffdYUtdy1mlSwCHMSuc8kFTZPUyhGrahY73qA8jnmP0I5OhBDIWPEiWc/Q8iHkrqkRcnsh1+ITZ7GpAHCRpzWMmvd5KPvBYIpbfu7121CvKF+QGRNB4ojLMSStsXqO926eHZoT8yzske/8cYBgtvAlVP81GruVrpo/OaHM2Zfh5mtfrg5jsNg8M8Mibz1PyYBxhq4aUwNDqj96Fo890P0oEWm8dgNSSLofzbKQ5/4pgvGmau9vYxmUxmoTYPa9C2xxqy0ZUYf7DrQsA/XsxHXcoOB1UPoHRWddmHMUypibQGuqFbmpdgc5g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=WepmeitH0Fb/BuwuVEAZRJdYewyBtxQsOxi2a6KbIec=;
 b=KJ8c3zW6XfSRpWc66lKZw2fbdQd8fZlS7Le8fFV1xtyVmJ6UxtHusab00gW4uY0uIFWr34bVYU7x+F1na33cUDrLrFpphwqtDKTPrn5XZkxAW18MUfkwxb2gb4pNDQJA0x4Vuzo3lLt9gHPNeG5NFyuE+TJ7YfYmKn+OJj1Ewpk=
Date: Thu, 3 Mar 2022 12:19:45 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH] x86/build: use --orphan-handling linker option if
 available
Message-ID: <YiCkUebvg0gaBm4/@Air-de-Roger>
References: <5c374fd3-017d-3c40-4ded-25a3b1c978a6@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <5c374fd3-017d-3c40-4ded-25a3b1c978a6@suse.com>
X-ClientProxiedBy: LO2P123CA0088.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:138::21) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ccd89cfc-f0f3-496c-ca99-08d9fd07bb65
X-MS-TrafficTypeDiagnostic: BN6PR03MB2771:EE_
X-Microsoft-Antispam-PRVS: <BN6PR03MB2771DE0D818FF652C33B21118F049@BN6PR03MB2771.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(26005)(186003)(83380400001)(38100700002)(9686003)(6666004)(86362001)(6512007)(2906002)(8936002)(6506007)(5660300002)(85182001)(6486002)(33716001)(966005)(508600001)(6916009)(316002)(54906003)(82960400001)(66946007)(66556008)(66476007)(8676002)(4326008);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?M0c4d3ZIR3ZBYkNSaE1NWUdxSWxnTmphYndEYnhobWQyeU90UmFBTjhTc01Y?=
 =?utf-8?B?NTE2Q0w1UEE1K3d0ZnhINU96azN1VEpIaVFPOUFDQlM0R1dWaGxhc1JmQ3ZM?=
 =?utf-8?B?MG9CRGNyRU02bElNbDFhRUpPYXRtNnN1TGp4R0JmVFFUemhteDVLTVkzTEox?=
 =?utf-8?B?Q0JIcHkwcG1UYmdPZ1hLTjJ2NGZpOHY5UWJpV3dEMW5xZWlZbmRYNzQvTkt0?=
 =?utf-8?B?SlJPKzB2SnN0Vnpwd2dqOWpzY1FaU1k1ajU3b2l4NUhpZDZYaTJUT1AyTTcz?=
 =?utf-8?B?ekZubUdaU1AzVCtIeXJHQ1JDSmpPd1RXMk5Ob3NUN2xxN0piZ0hqMGVlT3Jk?=
 =?utf-8?B?WFVVckZYUkdkS0N4cll4SksrelJhbmxRWTVDOU1Qb0NVOVZJQXJWMzJ5U3pr?=
 =?utf-8?B?MWpDSkRPRFBiRHB2anZHZ3Y5SVVNbE01Z1k1V3RiMDJsaWZzcGJJb29ZY0gz?=
 =?utf-8?B?VnRHdUFZRXhhcVdIMWZ5blVrNzFPK1VseHRVUzQ0VWUyMzhNMlFYY1dOVzVY?=
 =?utf-8?B?NEdUS0FkM1dobnBuazdTUmY3R1VWd3hYajEvUWNYM3lYNWJBZTBvbWVyN0dP?=
 =?utf-8?B?T21SUDF0RFQybFZQeGxTUzRpTFdwOEQzdjg2aERray9LOFlsU2dmdFZ3Y0x4?=
 =?utf-8?B?cmorQUxoTm05dGlNVFFrYkdZQU5pT2ZpZmJacjh5MVRGdFJQajlsckxrYk1N?=
 =?utf-8?B?Y1RyRmhHUEgyU1hlT2pQblNZSmN2MHduc0doejVJajI0QWQ5ZjR0cERIZnli?=
 =?utf-8?B?YUZjRTN4ajFEN0kzN3h1RkdramxMZzhjN0l1eHNoaGlMdWEwOE9nUVoveXI4?=
 =?utf-8?B?cGtnSVRUaHVONGlkQnJBV1RoTG53VlFFRlVNRElvSy9kZmRsSkl1RFpIRy9B?=
 =?utf-8?B?RXZzSk9PRFByaWdjWG1zdTVBNXJxcXpmYVRmdi9ONkFCb2dLVlZoN0VtUW9x?=
 =?utf-8?B?OWZtWWJ2UXdoVTZFT0NWajY2L0hLMHM1M0E2dkVHREZQbkdFT1pPK2xUa05y?=
 =?utf-8?B?bCtuSmdNKzRmaDNFZXB1cmRHd2ZsS1VSNzM2cG4rbkdLSmdLUUppdkRneDU3?=
 =?utf-8?B?M2l2MjFJemQ1aDFpOEcwOGFSanZaOU44ckRhU1Y0bmQ1ZUx3MmJpekZNYVBu?=
 =?utf-8?B?RFVGT25nUVlBYk1NQ3cxb0xyYUI0YmZIR2J1V3NkdUxvQXhFbWgxY3NPbFFy?=
 =?utf-8?B?Zy83eXh2b2J1VU9sVlkwOTJuRjFkSkF6YzdOSXBSaUhDbjBvemRFWHpYRW1s?=
 =?utf-8?B?SDBoTW0rc2lQSm5FVFJocnA0cEcwTzRYcVZydnRzTEg3Z0w2SmNqY0gyVlBO?=
 =?utf-8?B?QVpGaGFlZ2pEY1BpMktmZEozMW96ODZCM1BVL0kxY2dSb1FvOGE0cU83TGcx?=
 =?utf-8?B?L1JFSDhBOWdUVlk2K2lrYTVWZzBMeE5abUlFdnM0QW1RajdaLzBWamJnOHI0?=
 =?utf-8?B?b1luT3NSbWtWZU1hSWd0aVRQaEJRVGEvNTY0dVhhSXh5aXV4dktCaERDSDk3?=
 =?utf-8?B?clRiQVMzb3lreEdSNy93K1kwTmZyODZRRWwzYlZBQVNsMXRZSnpSTUlrTmwv?=
 =?utf-8?B?TmZIM1FwWGd6eXRieUlaTVRWSUpGOTh0dmxzUWhVSTlLbnNHdjlTODdaTEsw?=
 =?utf-8?B?dWc2c0V2eGp6ODUwMU9Rci9GUVI0VHp2S2I2eHVHdHVQWFZhYzJzMHVxZE1y?=
 =?utf-8?B?aTZyTjFXcjVwTHhVbm9odVZKbmhFenVwemZXQzQ3WFRrQTNYTUdnaGpCS3o1?=
 =?utf-8?B?UHlvcHNFV3ExZnpvRGt1RjNURExYbWgzMk9GQktLdFFFM3ZxRVdGdnQzNnNk?=
 =?utf-8?B?SmZ2elROLzdkQXpFUkxHT2V2c09EVlF6MHNGTm9Uam56SldlcmtuclNqUXp2?=
 =?utf-8?B?b1JPcE5qb0kyZFd3UllaejdNOGdkMFJDcm8zL1NReGJ2RlJ1M3NxUVhVc1JU?=
 =?utf-8?B?Y3VCSkM1eFdZUzBPWjcrK0JGUDlDM0hPVmszUEg2UGd1QmRtS2lGSVRVenQ1?=
 =?utf-8?B?QVNiUnQrOC9tRjFoU1pLZURyRTQ4YytVN3cyMUJGOXhKWHFDc3FDcW9kcStV?=
 =?utf-8?B?TDNsZGEwNzJpL1FwYVBxWGFzK2ZNMzM3R0V2RDBSWGJGMTJLaGN5dFJnWWZm?=
 =?utf-8?B?ckpwQ0plSUFic3Faay9vYkZvTFhOUUtpaWFVOUVGVG9HM3RSMnZnU0R0MXJv?=
 =?utf-8?Q?+c/quCx/aBBaEYLnsk6QGyU=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: ccd89cfc-f0f3-496c-ca99-08d9fd07bb65
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 11:19:50.1494
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: FodY5AI1765IaiSAPw3ZLDFDHLHjncPtetMTbsd5nYVjC4JREen7PrBqrPebgCDa6tU36AXiOdv95GAvEqQSUg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR03MB2771
X-OriginatorOrg: citrix.com

On Wed, Mar 02, 2022 at 03:19:35PM +0100, Jan Beulich wrote:
> As was e.g. making necessary 4b7fd8153ddf ("x86: fold sections in final
> binaries"), arbitrary sections appearing without our linker script
> placing them explicitly can be a problem. Have the linker make us aware
> of such sections, so we would know that the script needs adjusting.
> 
> To deal with the resulting warnings:
> - Retain .note.* explicitly for ELF, and discard all of them (except the
>   earlier consumed .note.gnu.build-id) for PE/COFF.
> - Have explicit statements for .got, .plt, and alike and add assertions
>   that they're empty. No output sections will be created for these as
>   long as they remain empty (or else the assertions would cause early
>   failure anyway).
> - Collect all .rela.* into a single section, with again an assertion
>   added for the resulting section to be empty.
> - Extend the enumerating of .debug_* to ELF. Note that for Clang adding
>   of .debug_macinfo is necessary. Amend this by its Dwarf5 counterpart,
>   .debug_macro, then as well (albeit more may need adding for full
>   coverage).
> 
> Suggested-by: Roger Pau Monné <roger.pau@citrix.com>
> Signed-off-by: Jan Beulich <jbeulich@suse.com>
> ---
> I would have wanted to make this generic (by putting it in
> xen/Makefile), but the option cannot be added to LDFLAGS, or else
> there'll be a flood of warnings with $(LD) -r. (Besides, adding to
> LDFLAGS would mean use of the option on every linker pass rather than
> just the last one.)
> 
> Retaining of .note in xen-syms is under question. Plus if we want to
> retain all notes, the question is whether they wouldn't better go into
> .init.rodata. But .note.gnu.build-id shouldn't move there, and when
> notes are discontiguous all intermediate space will also be assigned to
> the NOTE segment, thus making the contents useless for tools going just
> by program headers.
> 
> Newer Clang may require yet more .debug_* to be added. I've only played
> with versions 5 and 7 so far.
> 
> Unless we would finally drop all mentioning of Stabs sections, we may
> want to extend to there what is done for Dwarf here (allowing the EFI
> conditional around the section to also go away).
> 
> See also https://sourceware.org/pipermail/binutils/2022-March/119922.html.

LLD 13.0.0 also warns about:

ld: warning: <internal>:(.symtab) is being placed in '.symtab'
ld: warning: <internal>:(.shstrtab) is being placed in '.shstrtab'
ld: warning: <internal>:(.strtab) is being placed in '.strtab'

So seeing your mail where you mention GNU ld not needing those, I
think we would need to add them anyway for LLVM ld.

> 
> --- a/xen/arch/x86/Makefile
> +++ b/xen/arch/x86/Makefile
> @@ -120,6 +120,8 @@ syms-warn-dup-y := --warn-dup
>  syms-warn-dup-$(CONFIG_SUPPRESS_DUPLICATE_SYMBOL_WARNINGS) :=
>  syms-warn-dup-$(CONFIG_ENFORCE_UNIQUE_SYMBOLS) := --error-dup
>  
> +orphan-handling-$(call ld-option,--orphan-handling=warn) += --orphan-handling=warn

Might be better to place in xen/Kconfig with the CC checks?

I'm also wondering whether we could add the flag here into XEN_LDFLAGS
and EFI_LDFLAGS, as those options are only used together with the
linker script in the targets on the Makefile.

>  $(TARGET): TMP = $(@D)/.$(@F).elf32
>  $(TARGET): $(TARGET)-syms $(efi-y) $(obj)/boot/mkelf32
>  	$(obj)/boot/mkelf32 $(notes_phdrs) $(TARGET)-syms $(TMP) $(XEN_IMG_OFFSET) \
> @@ -146,7 +148,7 @@ $(TARGET)-syms: $(BASEDIR)/prelink.o $(o
>  		>$(@D)/.$(@F).1.S
>  	$(MAKE) $(build)=$(@D) $(@D)/.$(@F).1.o
>  	$(LD) $(XEN_LDFLAGS) -T $(obj)/xen.lds -N $< $(build_id_linker) \
> -	    $(@D)/.$(@F).1.o -o $@
> +	    $(orphan-handling-y) $(@D)/.$(@F).1.o -o $@
>  	$(NM) -pa --format=sysv $(@D)/$(@F) \
>  		| $(BASEDIR)/tools/symbols --all-symbols --xensyms --sysv --sort \
>  		>$(@D)/$(@F).map
> @@ -220,7 +222,7 @@ endif
>  		| $(BASEDIR)/tools/symbols $(all_symbols) --sysv --sort >$(@D)/.$(@F).1s.S
>  	$(MAKE) $(build)=$(@D) .$(@F).1r.o .$(@F).1s.o
>  	$(LD) $(call EFI_LDFLAGS,$(VIRT_BASE)) -T $(obj)/efi.lds -N $< \
> -	                $(@D)/.$(@F).1r.o $(@D)/.$(@F).1s.o $(note_file_option) -o $@
> +	      $(@D)/.$(@F).1r.o $(@D)/.$(@F).1s.o $(orphan-handling-y) $(note_file_option) -o $@
>  	$(NM) -pa --format=sysv $(@D)/$(@F) \
>  		| $(BASEDIR)/tools/symbols --all-symbols --xensyms --sysv --sort >$(@D)/$(@F).map
>  	rm -f $(@D)/.$(@F).[0-9]* $(@D)/..$(@F).[0-9]*
> --- a/xen/arch/x86/xen.lds.S
> +++ b/xen/arch/x86/xen.lds.S
> @@ -12,6 +12,12 @@
>  #undef __XEN_VIRT_START
>  #define __XEN_VIRT_START __image_base__
>  #define DECL_SECTION(x) x :
> +/*
> + * Use the NOLOAD directive, despite currently ignored by ld for PE output, in

Would you mind adding GNU ld here to avoid confusion?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 11:37:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 11:37:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283191.482133 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjlh-0006EQ-E3; Thu, 03 Mar 2022 11:37:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283191.482133; Thu, 03 Mar 2022 11:37:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjlh-0006EJ-Az; Thu, 03 Mar 2022 11:37:13 +0000
Received: by outflank-mailman (input) for mailman id 283191;
 Thu, 03 Mar 2022 11:37:11 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPjlf-0005yA-AZ
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 11:37:11 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 43181560-9ae6-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 12:37:10 +0100 (CET)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur02lp2053.outbound.protection.outlook.com [104.47.5.53]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-36-B6R19pSgN5aOdcSxGGUpAA-1; Thu, 03 Mar 2022 12:37:08 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DBBPR04MB7883.eurprd04.prod.outlook.com (2603:10a6:10:1e9::23)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 11:37:06 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 11:37:06 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 43181560-9ae6-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646307430;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=mpjXLiGCFO/Mj+gth8FFwvGTmNeKigMGoIqY7FvfHGw=;
	b=ZQWT6JmN5CKCtmZ8kiVbTbqP0gJ22wiAD1Emx9q5/Wj5q9GYImaHofGRfybGp6w2YxrhuN
	tLb4u4tQEFwBCnwZJv2+uzD4qbzMd/mMbhBL8HkxImpdCDlh63UFPYUYNIVdgLWoDv32lC
	5vHfmKPOhdK4V6AuGZtMQlRKyhEdITs=
X-MC-Unique: B6R19pSgN5aOdcSxGGUpAA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=AAHtSrjSmR0W5jS1Go2bltfypzN7lghpKFpEwZY7vb4CsSLqY24+04LLFG6YulVGLNsAASfvle3RId3GQqIOUK4gPoPr2V04cAauzxRANp2WpHr9GKcFOtj3lZiwXZlWHPba0kpDDCtUcEQuVwE9PWL+XclOc3/VByOL8bwMeMU1rhLXpN6Wy6QNZYzow876Bm6ViVKhDdmJ3JkE8ew+J12bqIVUvkYoCuDy3a5UC6MJRWZRRXx9Ya1bOlKlKEcsJFHl08Dm3uuiOqGWavjzL8fYNzPGsOqeuU3TtBNgaeu51rfzVELnYwThmsHqX0YsRZAw4VYW+dvbJi5yiNrWUA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=mpjXLiGCFO/Mj+gth8FFwvGTmNeKigMGoIqY7FvfHGw=;
 b=KEPVTOcIohKm+z1rc78LBWq/Aib84suJUmdfPeFyl2ygOFeO3Zf1xTh4bHd5Q45IpqgTMnl5Z0Om42DjShW4kTOcNStMXkZVXDqIqBaZ0OKpKtjH5ALiO4YDx79rF5d/teVISctWUlDbx2tf8mD0QsFvV8yZljwaS9hA3gUuANyQH0GW4Z0nWkmzqUcG1eV5wdWCxZPleV0kjl+ZyizZ7l8gwlNdnyUzTkG/GKTJfPfPA9B7LszkExls6GacfHLbum5MCwfOfw/3sc1H/tV10sZUd1LSJo1UyliG37Ls6AJZeRmj2T5kf6YRQNgdkNzN9goRvAB7Dh+hYBq1rST1pQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <240602ab-412c-8607-ed6c-916cf37343f7@suse.com>
Date: Thu, 3 Mar 2022 12:37:03 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v4 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Content-Language: en-US
To: Jane Malalane <jane.malalane@citrix.com>
Cc: Wei Liu <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>,
 Juergen Gross <jgross@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian <kevin.tian@intel.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <20220302150056.14381-1-jane.malalane@citrix.com>
 <20220302150056.14381-2-jane.malalane@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220302150056.14381-2-jane.malalane@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR07CA0030.eurprd07.prod.outlook.com
 (2603:10a6:20b:46c::35) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 074d8917-258b-4904-6c21-08d9fd0a24de
X-MS-TrafficTypeDiagnostic: DBBPR04MB7883:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<DBBPR04MB7883551A2694E27C1F8D3606B3049@DBBPR04MB7883.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(316002)(7416002)(186003)(6916009)(26005)(54906003)(8936002)(2616005)(53546011)(508600001)(66476007)(66556008)(6512007)(6666004)(66946007)(6506007)(5660300002)(4326008)(8676002)(6486002)(31696002)(86362001)(83380400001)(31686004)(2906002)(38100700002)(36756003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?cG5lTkJxNWNwZHBzSDd1UXZrWnlaaVY5a2w2S3p2NW1OTnRQdGRKNUIvaVVh?=
 =?utf-8?B?Y1JzY1c1SEJxNGE4M0oxUUluTE91YThYc3ZIeU9ieFF6K1czUTFhNHFEM2tB?=
 =?utf-8?B?ekV0U3dJU0xVZGxhZ0FVYWJaMUNLNis4WU1UeTZXOVRqdmUyUDczNHZNdDBE?=
 =?utf-8?B?ejFoZnRvRXkxeDBhM09WMm1FTUZUOGRTTFJZWThmN1ZLeVdKVitCZkFqb3Fp?=
 =?utf-8?B?MzI4QjdqVnNBb3ovNUpRMGRId3ViQ3QvR3JxbHRuRjBPcjMxa3N5R1JSa2Rl?=
 =?utf-8?B?L1FQYlZHZEg5Q1diOTd5TXlqZktMM3FVdjNMRnRIQmh6TjRoR1RtTzZMS20v?=
 =?utf-8?B?WnhTVUdFQmxLSjZvRTlYcm9Ba3BGUFlpSmNwczNSN2RqNGpEYjkzWGtCajdU?=
 =?utf-8?B?OFczU3hNM1lCYTVORUZNTVpXRlVYNjZUSmQvdjZmTG41OHNXNmlTSWVxdDNi?=
 =?utf-8?B?bWppTkExZlBkU3RSQ0tLblZWaGpTYnBMYUpkZnJWUEJMR1JvWmx3ZXNISkZS?=
 =?utf-8?B?STl2QXJFMFJRTGljOGY2d0EwNFp0R2c2S2VaaG1VL1VZWTEwM2NZKzcxRTg2?=
 =?utf-8?B?L2Q4UVNQVnMvYno4bXlrSVNHcm1VcVBuVzNCcXdqTlM5eDlROUNYN2hCZFd0?=
 =?utf-8?B?ZHZLNWtFU2NJdDMzRnlkc2FuOUNkSExNR25xdjhtVmJYelJmT1JVV0tUTzIz?=
 =?utf-8?B?TUd4QmRFN3puNnhmS3pZNTcxY25Wdko5dEtsd3E3UEl4WjlZMnllYTlaMW01?=
 =?utf-8?B?T21ocVBsOFhYeHR6ZnR0OENzbjNHbjJQbTRxNy9ISkg2eHNrdytSMG1pN1U0?=
 =?utf-8?B?T0o1WUpTdHo0REdRMHpIMzdldmRoWGZORks5RVR4ek1HdkxUTXl1Q2tMQ294?=
 =?utf-8?B?VVRNNWVZeXZsNkZCS1ZIY0lsR25JL3R4NWNmK2VwYzBqelhsN2Zkd2ltWDQ0?=
 =?utf-8?B?eXFrbTNUMENMS2pOVXpmNnhLR2tvVlk4ZzV6L3ZaSGtlVEkreTdjZ1FsNEY2?=
 =?utf-8?B?R1BIR2JzUTY4U1dmbVhZOG11djU3M05oWWJ1TzFES2pVZ0piZnpyT0VCMGJ2?=
 =?utf-8?B?eU1CQzBQSDlLSUZPbHE3OWQ3cFkvUHdiK25PZnNHclBBdXEwV1h6blNmNnMx?=
 =?utf-8?B?emtLdXdKS1BJdUUzWER0Um9ab2w5WHV2K0g0M1FlMkIxdDdFeFAwNFRrdmsw?=
 =?utf-8?B?czZCVDc4LytmeDc0ZDdmQlFQS295ejNoSDQyczhOb2RyMlpMSWM5U2ZITEFn?=
 =?utf-8?B?UXNta29rdHpwcGJXLyt5MVZQUXJzRld0MDBBRkErQThQNTBtUkp4bnhkMzdl?=
 =?utf-8?B?OGZxR2l0dHBpMUY3SWZyd1FRL1hHQjkvKzNUU2xFSVVjUEVKeFEyQlZmblJT?=
 =?utf-8?B?M0w0VytCMVB4NjQ1U3BCNzNXVEZPNmpJMHNIQU9SKzVWb3NLenFwTGVGc0No?=
 =?utf-8?B?OGZxOFNsL2NFaDJzeXNYd09ycFh0d3dueU1GOXc3SkVUd1d1b3NTK3hORVli?=
 =?utf-8?B?UmJBOHZXTUVoYzd1elhIQ1BCcE1XckprQXE5RlFmT1FmdVA2S1VPbDZITE5P?=
 =?utf-8?B?RklPNTF3d2Z6dGNpTHI0UTZmbDBqdXQ3TUJTTmZHZEtJVFR3eHFlY0ZrWVds?=
 =?utf-8?B?N1AwcVZQalI4WXZaS3dYY2ZJeWt1RnV2RjZSRjNLem40Vi9UT0lkdUlNRjNi?=
 =?utf-8?B?Ymw1Rms5Tmh0TzZYS085RERiM29JVEwraW9ka25iWlpIZkRiZGZaeGN5WEky?=
 =?utf-8?B?VGRVTFlhMkp5RWZtRVkxbldxK3l5blJTdkxFYUQ1cW4xYmVNUEFZL1Y5aWg3?=
 =?utf-8?B?U21CU21qVWZOdWNHUytpYlhIUFZISzN6Q2VteWRFQ3RsNlEwRUtoMUhuNUM1?=
 =?utf-8?B?cmo3eWd2RnNraUtqYWI3YS91K2dXT2VwZ09kSUpwSDVObVVHZFcwbk1Ed2Rx?=
 =?utf-8?B?endyRGxiSStVWjdpTDZDbm1FMkE2YkJrNzdnTDRFRTdML2pEV2hSSEhOL1lx?=
 =?utf-8?B?bDEzUCtHQkk5WVpnd2o1NkdNVFk3WUI4SEI4cE1xZXFDVkk5NXRaa20vTlg0?=
 =?utf-8?B?Q3B3VUhJc2xEcTRlaUVEWUxOYWRsK1VHTnM4ektkT0grRkJaTUZmQURpVjlE?=
 =?utf-8?B?RUl6UHFraGFxMCthZ2tnbm0rcWwvQStTWFh6T29Tb2p3aFMxK1paL2dCUWxl?=
 =?utf-8?Q?YpAXRq5LLZP3f/IyJJWqaO0=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 074d8917-258b-4904-6c21-08d9fd0a24de
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 11:37:06.1723
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: adQLSEEQGVhmGZidb4LpFxJPMp931FfjPbY2jYgDR4sBS8oWk6CTbx42tImEMcnuJus6TYM2UzMF2OHmGa/sSg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR04MB7883

On 02.03.2022 16:00, Jane Malalane wrote:
> Add XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_xapic and
> XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_x2apic to report accelerated xapic
> and x2apic, on x86 hardware.
> No such features are currently implemented on AMD hardware.
> 
> For that purpose, also add an arch-specific "capabilities" parameter
> to struct xen_sysctl_physinfo.
> 
> Note that this interface is intended to be compatible with AMD so that
> AVIC support can be introduced in a future patch. Unlike Intel that
> has multiple controls for APIC Virtualization, AMD has one global
> 'AVIC Enable' control bit, so fine-graining of APIC virtualization
> control cannot be done on a common interface. Therefore, for xAPIC HW
> assisted virtualization support to be reported, HW must support
> virtualize_apic_accesses as well as apic_reg_virt.

Okay, here you now describe _what_ is being implemented, but I'm
afraid it still lacks justification (beyond making this re-usable for
AVIC, which imo can only be a secondary goal). You actually say ...

> For x2APIC HW
> assisted virtualization reporting, virtualize_x2apic_mode must be
> supported alongside apic_reg_virt and virtual_intr_delivery.
> 
> Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
> Signed-off-by: Jane Malalane <jane.malalane@citrix.com>
> 
> v4:
>  * Fallback to the original v2/v1 conditions for setting
>    assisted_xapic_available and assisted_x2apic_available so that in
>    the future APIC virtualization can be exposed on AMD hardware
>    since fine-graining of "AVIC" is not supported, i.e., AMD solely
>    uses "AVIC Enable". This also means that sysctl mimics what's
>    exposed in CPUID.

... more here: You claim similarity with CPUID. That's a possible route,
but we need to be clear that these CPUID flags are optimization hints
for the guest to use, while the new control is intended to be a functional
one. Hence it's not obvious that CPUID wants following, and not instead
the conditionals used in vmx_vlapic_msr_changed() (or yet something else).

What's worse though: What you say is true for x2APIC, but not for xAPIC.
Which effectively is in line with vmx_vlapic_msr_changed() and CPUID
handling also agreeing as far as x2APIC is concerned, but disagreeing on
the xAPIC side. I can only once again try to express that it may well be
that pre-existing code wants adjusting before actually making the changes
you're after.

> --- a/xen/arch/x86/hvm/vmx/vmcs.c
> +++ b/xen/arch/x86/hvm/vmx/vmcs.c
> @@ -343,6 +343,16 @@ static int vmx_init_vmcs_config(bool bsp)
>              MSR_IA32_VMX_PROCBASED_CTLS2, &mismatch);
>      }
>  
> +    /* Check whether hardware supports accelerated xapic and x2apic. */
> +    if ( bsp )
> +    {
> +        assisted_xapic_available = (cpu_has_vmx_virtualize_apic_accesses &&
> +                                    cpu_has_vmx_apic_reg_virt);
> +        assisted_x2apic_available = (cpu_has_vmx_virtualize_x2apic_mode &&
> +                                     cpu_has_vmx_apic_reg_virt &&
> +                                     cpu_has_vmx_virtual_intr_delivery);
> +    }

If the conditions were to stay as they are, I'd like to suggest pulling
out the cpu_has_vmx_apic_reg_virt into the enclosing if()'s condition.
Additionally I think the comment wants to contain a pointer to what this
wants to remain in sync with. That other side may then want to gain a
comment pointing back here.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 11:37:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 11:37:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283190.482122 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjlc-0005yN-6T; Thu, 03 Mar 2022 11:37:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283190.482122; Thu, 03 Mar 2022 11:37:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjlc-0005yG-3V; Thu, 03 Mar 2022 11:37:08 +0000
Received: by outflank-mailman (input) for mailman id 283190;
 Thu, 03 Mar 2022 11:37:06 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=++p5=TO=citrix.com=prvs=054f29298=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nPjla-0005yA-95
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 11:37:06 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3edfa3dc-9ae6-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 12:37:04 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3edfa3dc-9ae6-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646307424;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=Cb4xBVEjX3PXCqOsreeZ8uwWmIU3vSm1XAWXBXII8Xg=;
  b=TEPJLnOtMlXiSLDiOciUpEqNgQSBtKHthuiBdBdlO7GvG2pMziGOn6EW
   hVLhKZuPnotvu2EJsX/mRPf/9No2n60IYV9SF+aRi4zTJSX8s1c211qsE
   4G+SPn49Tu7BEXsdAZg/Hs4eAsGHi9O7YWQcgOoM9YphL5cxdEG11LEf3
   w=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67706522
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:9keCa6luhCUPutNbjeE6GCro5gxEJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xIWWj+CO/2LY2HxfIsjYIW18U8H7JDRx4RlHFBl/C43FCMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiW1jV4
 7senuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYYiAAIL/3kuckcFpJAjojYaJPp4CePi3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3k3ds1zzGS90hRojOWf7i7t5ExjYgwMtJGJ4yY
 uJHNmU3MkmaOXWjPH8YUqkCtaDrt0D4cgFVoW+np6EZ/nrcmVkZPL/Fb4OOJ43iqd9utl2Du
 mvM8mD9AxcbHN+S0zyI9jSrnOCntTz/cJIfEvu/7PECqF+Owm0eDjUGWF39puO24ma8Ud9CL
 00f+gI1sLM/skesS7HVTxC+5XKJoBMYc95RCPEhrhGAzLLO5ASUDXRCSSROAOHKr+dvG2Zsj
 AXQ2Yq0W3o/69V5VE5x6J+/ihqsKxMfLlYhJj4VVlZZ7NC8n9gs20enoslYLIa5idj8GDfVy
 j+MrTQji7h7sfPnx5lX7nic3Wvy+8Ghohodo1yOAzn7tl8RiJuNOtTwgWU3+8qsO2pworOpm
 HEf0/aT4+kVZX1mvHzcGb5ddF1FChvsDdE9vbKNN8R5n9hO0yT6FWy13N2YDB0zWirjUWW0C
 HI/QSsLuPdu0IKCNMebmb6ZBcUw1rTHHt/4TP3SZdcmSsEvKFHdoH8yNBXPgjmFfK0QfUcXY
 83znSGEVytyNEia5GDuG7d1PUEDnEjSOl8/tbiklk/6gNJylVaeSKsfMUvmUwzKxPjsnekhy
 P4Gb5Hi40wGCIXWO3CLmaZOfQFiBSVqXvje9p0IHtNv1yI7QQnN/deKmuh/E2Gk9owI/tr1E
 oaVARcJmAKi3iSccW1nqBlLMdvSYHq2llpiVQQENle0wXkzJ4Gp6aYUbZwserc7sudkyJZJo
 zMtIa1s3twnpuz7xgkg
IronPort-HdrOrdr: A9a23:iOGPlK97bleNiO3iVrZuk+F4db1zdoMgy1knxilNoENuHPBwxv
 rAoB1E73PJYW4qKQ0dcdDpAtjlfZtFnaQFr7X5To3SIzUO31HYbb2KjLGSjAEIfheeygcz79
 YZT0ETMqyTMbE+t7eG3ODaKadh/DDkytHSuQ629R4EJmsGC9AC0+46MHfgLqQffngdOXNTLu
 v62iMznUvYRZ1hVLXcOpBqZZmnm/T70LbdJTIWDR8u7weDyRmy7qThLhSe1hACFxtS3LYL6w
 H+4k/Ez5Tml8v+5g7X1mfV4ZgTssDm0MF/CMuFjdVQAinwizyveJ9qV9S5zXIISaCUmRMXee
 v30lAd1vdImjXsl6aO0ELQMjzboXITArnZuAelaDXY0JfErXkBerR8bMpiA2rkAgwbzYxBOe
 twrhGkX9A8N2KxoA3to9fPTB1kjUyyvD4rlvMSlWVWVc8EZKZWtpF3xjIeLH4sJlOz1GkcKp
 gkMCgc3ocgTXqKK3TC+mV/yt2lWXo+Wh+AX0gZo8SQlzxbhmpwwUcUzNEW2i5ozuNwd7BUo+
 Dfdqh4nrBHScEbKap7GecaWMOyTmjAWwjFPm6eKUnuUKsHJ3XOoZjq56hd3pDmRLUYiJ8p3J
 jRWlJRsmA/P0roFM2VxZVOtgvARW2sNA6dg/22J6IJzIEUaICbRBFrEmpe4fdIi89vdvHmZw
 ==
X-IronPort-AV: E=Sophos;i="5.90,151,1643691600"; 
   d="scan'208";a="67706522"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=fQ9rdvGp7DzgyZ/w7P+iFxaEALoB8206ayrlWpaUAN42TouYGPM5RtZkBXdePnaG67ud5f2JDexN+5ULgLeLqaZlFxbd7siHRCQRbjryBokFtCaguubV0YIc8Z1+D97aixGeY6Zh4oel/kDAvAUaVW1O6+elMzIdavLHtqd3fkOovpekNtRaga+q4xMep2wZpwQfYSWACMmqrdJW16JfpxcUEPa5p+KLJhVYKrM8cPTKOIe0gQWxsjBre7huknn6TTdR3fVOx+/P9l6vRmbmWva1woT85Vzn/8MI+X4NRteCcdBtdjcnJsIA21UVSM0MFr0osXtiel8b4q6wfTw/IA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Cb4xBVEjX3PXCqOsreeZ8uwWmIU3vSm1XAWXBXII8Xg=;
 b=HYl7f9ZqsQoBIeUoGKCiN8I79FxnWzCxhpX1P2aZf6ENnAY+O/M0AEPqifCvZbBgjGWQi508qebPjAxiKSdtyluKdc5II81SU6S+69KV/cR4nGKCQxZGD3PAdoebzHHOvf75KErumcam3JCBbNbPta8tCx6G+szyNI/X7fI5KJoUI5eWLpSuTwNcI+1GK8k1sQ41UUzBDn1tJUtkuYjOFWOeLwz4C5uoGEHnj9cReQ8Cy31VFLue4I2DwTsJclrSgwogQo9E4PG5NvPW7c1e63hAd3ENEDTUOfY6cOe7pM/LnnpC9l/Vf61advoeupA4cwsG4j3gVyuF54uGorP71g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Cb4xBVEjX3PXCqOsreeZ8uwWmIU3vSm1XAWXBXII8Xg=;
 b=rP42yJSsz579izwoT0kKHoiwA2s6Z+BUHRnl5RTPdZRj6xipLT9H1F5oo7V55WMJwzlLrIXCjvfdxQ6o/bWYZXn8nlTf/nq1gIjMuBUPg0Rij9gv92EWqxMP/B6z0mOCM8n0Cz8F5Aw3Qf9YSI/UjATwLrREezoYPhZfegKsa80=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: George Dunlap <George.Dunlap@citrix.com>, Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH v3 0/7] (mainly) xz imports from Linux
Thread-Topic: [PATCH v3 0/7] (mainly) xz imports from Linux
Thread-Index: AQHYLuX6wszWrKqmBUiPL23HmTWk46ytiCwA
Date: Thu, 3 Mar 2022 11:36:57 +0000
Message-ID: <d039233b-d9b3-1767-7fd9-dd65cbb9c537@citrix.com>
References: <c0d6eedc-6ea2-5445-117c-0ba623692d0f@suse.com>
In-Reply-To: <c0d6eedc-6ea2-5445-117c-0ba623692d0f@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: e35c3462-c8ec-4c7a-cc47-08d9fd0a1fc2
x-ms-traffictypediagnostic: SN6PR03MB3870:EE_
x-microsoft-antispam-prvs: <SN6PR03MB3870EA7D4F5113770906A18BBA049@SN6PR03MB3870.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(71200400001)(82960400001)(31696002)(6486002)(2616005)(186003)(508600001)(83380400001)(2906002)(53546011)(5660300002)(38070700005)(31686004)(122000001)(4326008)(66476007)(64756008)(6512007)(6506007)(91956017)(76116006)(66556008)(66946007)(66446008)(8676002)(316002)(38100700002)(110136005)(36756003)(54906003)(26005)(86362001)(4744005)(8936002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?cnNoMVNNWTJsOXUyZVVtSUxyK0F2RGc2czBkenlVMEZNR08vQUc0Z0hVcUhD?=
 =?utf-8?B?dzBZODB2RXcrQWxxdVZTV2hWY1RGb2hOVFRCYk1UWnNmZk5ScFUzSndIV29V?=
 =?utf-8?B?ZDNaYzEyRWtaaUEwb1FJNGtodnRpSnRORmhSc1lEdkZGTmxvYVpsYng0bTlV?=
 =?utf-8?B?VjRTZXhodlBqL2UvdDhHdUc4eDV6OTh2ZXdiYXAyNkFmSFI1a0c4L3NrQWR6?=
 =?utf-8?B?R09kOCtybkFyYWppeCt0R0NtNUZhbi9LU2h1M1hiL3VYT0hEME9KNktwdHZx?=
 =?utf-8?B?WjE3NUo1WGNOMlhuRHRMVUx6R2NoR0hKK3krQUc3dUt3R3l0bjNCUWJvK3lx?=
 =?utf-8?B?R3hURm1iMnBjWjl6YzZLMEZ4V3pPdlVFcWdiYjg5YnB6OEhkQWNFOEgwQTc0?=
 =?utf-8?B?TnZVMnByWGM4aDRyY3RXdm5nMGN1ME5OTWFZOVUrRmZBREw3MGVXOHBRZEVm?=
 =?utf-8?B?dy83Y1dSVGp5a0t5TjUxaEwwNzlzL1ZScEJjdFkxR2p5YUtlRklVVWtrZHRO?=
 =?utf-8?B?Z04zVFRjZWUyTTZwUXc3T1VpTlJtUHRBa1dDQXU1T0Rab0pwaWtPa2NERmVY?=
 =?utf-8?B?dVZ1cDEzNGhRVmdYQ3NSSU5US1BDQ1FnRytDQnNLWDVmMzFoSDdveW1ELzMv?=
 =?utf-8?B?dWp2Mm5nNWJuc2NXM3FIUW04Nk5YWWI1YkF5VVlGUndqNWpkZTJLZWVNODE5?=
 =?utf-8?B?cnc4VzVBb3puMkNaNTdNVW9rREs0TTJZeWZEODRDNG5mSmlVTVFSVFNRbjF5?=
 =?utf-8?B?eUlkRUJYbjcxODEvaU56ZlU1RWF2aGJYOHVsN0lCSEQvc2JLdjdFejVyNmtI?=
 =?utf-8?B?cXlPWHI1NXArcGxBUS9kZUVrajdzTTBtN1BnNGZjOEJ1c1RmTitMN0NUaDVJ?=
 =?utf-8?B?WmRmS2FiaU9KR3UxUUVyNFdhRGdUZmJFZHExWGNyeDU2Nk8wN2QwVUxvUkFL?=
 =?utf-8?B?bDFwV0tlUVY1QWFVYm5taFo2a1I1Ym5YVU5XeGdaZ2FxSXlGZitmLzBzREVm?=
 =?utf-8?B?bkpzWmM1SkFtcEo1ekdMdTRtcU1WZ3lhcjdadVNEaGZXSjIzTW5KckFzODVK?=
 =?utf-8?B?YSttbEMyUGVwTW5zWjdORFh3bGRDU2tSZ2MwZTB0bGZ3elpSMDBtVk9reUdG?=
 =?utf-8?B?WU1DTmNjd3d0SXBnd2l2aE9qdnFMcFora3FBckY2bDJPRUpaNDJUSG02Q0xu?=
 =?utf-8?B?Z2pBM2dBYzJzV24vakRyQzJjem0zU0luaWhKaEp2TUxzT0VvK1hlaVdRaGdj?=
 =?utf-8?B?d0JkWEVlTmRVbGF6Rm14anhRcVB0NUlhSXg1TkkyMG5CWXFRSW41U1ZTUXNT?=
 =?utf-8?B?U1RJSm1yVXg4K3F5d2V2RVJ4YnJxVk5mY3o2Ym5MT2ZhYk1tVDdDZ29WR0d5?=
 =?utf-8?B?NHd1RUxYWTFVT3ZGYjEwSTRzRkJvSEVCNVEvWWpSeEQ1ei90OHovajljVER1?=
 =?utf-8?B?bGZ2Q2prOTB0eHV2YVhDbjNmdmJwNU05c0pJMGhsb09rMGJJTnEwaStJYmpT?=
 =?utf-8?B?Q0ZEbFIxc3FOb2tXT1ZuTU45L1YrMGprbXNoVGVRR2h4VnNlbUNza3VoZ3U5?=
 =?utf-8?B?U1N2Sm1SZ3B6YjltV0JJWmF1QWNMcjNRMFNIWmtibFlJN3N1cHBVSnM3REVu?=
 =?utf-8?B?NGJGR2xtRHE5cmkycWNKUGJxVGJpRU9uL0ZpNG9IdFM4ekF4QmdaeXdSNTFR?=
 =?utf-8?B?b2pmcVpZZ0tBTDZLN0U5Q0lROEx1NUZlaWNpZGJmaVc2cVRaUFRQck9DMkJq?=
 =?utf-8?B?T1J6RUlkMmhxNzZYMzVmcFQwMmFKak9tZHFCdW1GRTRiWEp4cFN4aXllcXlW?=
 =?utf-8?B?cUhTMnJrWFFBNEVUM1ZCb0tSNzlUYnM4c2E5NWlDMDZHTExyajdzYmREV1VJ?=
 =?utf-8?B?Y3ltSkZWTHg1ZDNiZUJYYjNzUEhSdGVPVm5KNEVCalVxQXdzNGl2V2pCUTF4?=
 =?utf-8?B?WlV6RE1ZYitjMUh3dmNMdnpSejhFZWtBL2dnOGFhV1pmdFRzUUNsWGtpVmYy?=
 =?utf-8?B?Zm11ZHk2d3g3ckpRUnhxOXIrbGlGV1dKUHA2VEJ5aldmZWEzN3U3QU1raXYx?=
 =?utf-8?B?N2lwbFJjZ3FyNWlXMnp4d0tHNzdYMGtLZzJWN2w0N0lWd25pU3JoM0todVkr?=
 =?utf-8?B?Q1Ria0gwYXpldnVhU3gweVZVdndDVlZyUS9CZ0dOa3BhWHB0WTZvVjlQc002?=
 =?utf-8?B?aThpdENSd1pEUlpaUVk5bVdpb2RWYnFEQ2llZXB6cWNUWEZQc0Z4R2NDRE03?=
 =?utf-8?B?dTFQZU9ueEl6WWVIMkFFV2ZVZFFRPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <4B04C0B7C54ADC4C9FA263DFB26C13C4@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e35c3462-c8ec-4c7a-cc47-08d9fd0a1fc2
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Mar 2022 11:36:57.2121
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: KfqILr/wX6j2YL3T1Xrdrrg74c7j4IjMFaN33FzH8sDXOUi6hJodyGizObmWJZ3N0CvTtT9NGH4KHPMls201mSh9lu25nHJO3S8eBcmc7pk=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR03MB3870
X-OriginatorOrg: citrix.com
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==


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 11:40:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 11:40:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283206.482151 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjow-0007x5-1c; Thu, 03 Mar 2022 11:40:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283206.482151; Thu, 03 Mar 2022 11:40:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjov-0007wy-UR; Thu, 03 Mar 2022 11:40:33 +0000
Received: by outflank-mailman (input) for mailman id 283206;
 Thu, 03 Mar 2022 11:40:33 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=PW1S=TO=citrix.com=prvs=05474af58=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nPjov-0007ws-0g
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 11:40:33 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id b8d45f80-9ae6-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 12:40:29 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b8d45f80-9ae6-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646307631;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=GNhPh5zK22vTogp6ixb+4EDWyAIqgi7sVYcsNHSAfQw=;
  b=SDmgUH9maIXROMZi2U65EfQnJ8XvgEw/Ap9y9is16ln8jqfXNO/47FEf
   CUOvTp08UsLByMl48BXKIYYF3yzVI/p0trsu0F1q01rpsjL4ikX5Q+GTQ
   k+tjBdJuXxmYyNAVLA7sa4E7dbcXy3+jz5r9uHHOhRqv2cfi0x7TZq2IP
   Q=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65786655
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:QXf2YKoCKDXAjXAhr/xVt34YG05eBmIwZRIvgKrLsJaIsI4StFCzt
 garIBmGa6qNa2LzKt1yOY3n9B9XsZHRnNAyQFNv+31jEyIRopuZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 Yiq+aUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBPonRit1CbyljLzBkL7dB44TgGnS5rpnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVI1zbWAOxgWZnea67L+cVZzHE7gcUm8fP2O
 ZdGOWQxMUmojxtnG1oyVKAupceUtHzAdDF0rVSTgfA47D2GpOB2+Oe0a4eEEjCQfu1Kmm6Iq
 2SA+H72ajkGNN2EjzuetHv0gvTImwv0XYsTEPuz8fsCqE2ewCkfBQMbUXO/oOKlkQiuVtRHM
 UsW9yEy668o+ySDTNPwQhm5q36spQMHVpxbFOhS1e2W4vOKuUDDXDFCF2MfLox93CMredA0/
 l+tgsHQWgBfi4GEU2CH8ayvigi+PzdAeAfuehQ4ZQcC5tDipqQ6gRTOUstvHcaJszHlJd3j6
 2vU9XZj3t3/meZOjvzmpg6f31pAs7CUFlZd2+nBYo6yAuqVjqaBbpfg11XU5O0owG2xHgjY5
 yhsdyRzAYkz4XCxeM6lHb1l8FKBva/t3NjgbbhHRcNJG9OFoSPLQGyoyGsiTHqFy+5dEdMTX
 GfduBlK+LhYN2awYKl8buqZUpp2k/K8S4i0Da+JN7Kih6SdkifdpkmCgmbKggjQfLUEy/lja
 f93j+72ZZrlNUiX5GXvHLpMuVPa7is/2XnSVfjGI+ePitKjiIquYe5dajOmN7lhhIvd+Vm92
 4sPZqOilkQEOMWjM3a/zGLmBQ1TRZTNLcut8JI/my/qClcOJVzN/NeKmeJxI9E+xv8N/goKl
 1nkMnJlJJPErSSvAS2Ba2x5aaOpWpB6rHkhOjcrM0ru0H8mCbtDJo9EH3frVdHLLNBe8MM=
IronPort-HdrOrdr: A9a23:FXsjhKkY/MooGLsadyDyMViNtaHpDfPOimdD5ihNYBxZY6Wkfp
 +V88jzhCWZtN9OYhwdcLC7WZVpQRvnhPlICK0qTM2ftW7dyRaVxeBZnPDfKljbdREWmdQtt5
 uIH5IObeEYSGIK8foSgzPIYurIouP3iZxA7N22pxwGLXAIV0gj1XYANu/yKDwJeOAsP+teKH
 Pz3Lsim9L2Ek5nEfhTS0N1F9TrlpnurtbLcBQGDxko5E2nii6p0qfzF1y90g0FWz1C7L8++S
 yd+jaJrJmLgrWe8FvxxmXT55NZlJ/IzcZCPtWFjowwJi/3ggilSYx9U/mpvSwzosuo9FE2+e
 O86CsIDoBW0Tf8b2u1qRzi103J1ysv0WbrzRuijX7qsaXCNUUHIvsEobgcXgrS6kImst05+r
 lMxXilu51eCg6FtDjh5vDTPisa2XackD4Hq6o+nnZfWYwRZPt6tooE5n5YF58GAWbT9J0nKu
 9zF8vRjcwmPW9yV0qp/1WH/ebcHkjaRny9Mws/U42uonVrdUlCvgUlLJd1pAZDyHo/I6M0k9
 gsfJ4Y0Y2mdfVmHp6VNN1xMfdfNVa9My4kEFjiV2gPR5t3ck4klfbMkcAIDaeRCdg18Kc=
X-IronPort-AV: E=Sophos;i="5.90,151,1643691600"; 
   d="scan'208";a="65786655"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=P4BZ8X4aBCAJja7YkZrL3Z/yHqD0mc2ilLt/+tbQ/s7aGWVcP5wf/wJr+gilkgfoE+urZpVVaZUMaxuGYB7tB/ntvjp9q5ZSJ7nxYVyZt9nAcoBIfQMJmL1PRpmwcYoeKBPzoXVVN0M9NEobXh9X8Xt3mOUKPK9SWC5ojvuQxvX9LsjXAZhbLwFyEIJMl+fNpcM6tY26Gq+FS7KUQG27TDXTO7DpS6nEAbORKVo0KZmH1EkrggKiIbScbUK8pikobFcSG0WL5Pc5yDdZJMjnoj2qvCQdUbmfE+fyQ0AHvcpy1YktSrCASETux6aeDEtIgG54rY4QkaoF9t6fe0ZtHw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=L2afSRf0l93cyqrlcjf+nfY+cqdS316hWlfSvgjIrtY=;
 b=A5uN0HHyXjEjvQvXNju28cuxMsMcdPYDtlKW9nvN+tXcrRDc11PPdai5s2ugBS8n3QfOkmno7GIEu4tOg365maz8vOLNU0i03NP7vgXvBMGJxwTP1qWkttLXk1cbcPd9m4Vj+ididjHsOGyLyiKOhrNoRLL/nfBttm9zPqTm/diS4tvnClsqv8HNpqHyw+Oxjz66JgyzD3c3zD+6SIPIKnmdXWzD9gW2CHT7d/0em/xO4plO8L267b6k5/HaUVvI9n6/C3/uQEAeeM4INgn5XCkneOqRB6B1Cfu/WOhp8sIn4hJZ5236+FULOsei6yVyEYqopXHKxA94jvRKmgmq1w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=L2afSRf0l93cyqrlcjf+nfY+cqdS316hWlfSvgjIrtY=;
 b=URGmoHED12znbF7TeJgdXGL68eKLiq07azZqbeTRe3jkHB0l8IyTJkXhyePz3mctnE3WodG6pqUWd6QgDYjgPoeVmj6KjnwWVL0GIR535FPQxFEq4FJ5eWb6U/C0rTdDWyTEOhH2krrZVmi+hqQZe0aim+0r4tS1sB+O1u0Ss8o=
Date: Thu, 3 Mar 2022 12:40:21 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Jan
 Beulich <jbeulich@suse.com>, Wei Liu <wl@xen.org>, Alex Olson
	<this.is.a0lson@gmail.com>
Subject: Re: [PATCH 3/3] hvm/pirq: allow control domains usage of
 PHYSDEVOP_{un,}map_pirq
Message-ID: <YiCpJfnAskieK/p4@Air-de-Roger>
References: <20220303103057.49181-1-roger.pau@citrix.com>
 <20220303103057.49181-4-roger.pau@citrix.com>
 <c1fafc74-d4d2-5fc5-db38-c75f076d8405@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <c1fafc74-d4d2-5fc5-db38-c75f076d8405@citrix.com>
X-ClientProxiedBy: LO4P265CA0090.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:2bc::11) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f5ff5996-a67c-4290-2dc1-08d9fd0a9bff
X-MS-TrafficTypeDiagnostic: BY5PR03MB5000:EE_
X-Microsoft-Antispam-PRVS: <BY5PR03MB50006F7FA5BEDF21018D441D8F049@BY5PR03MB5000.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(66946007)(38100700002)(66556008)(66476007)(508600001)(4326008)(86362001)(8676002)(6862004)(6636002)(316002)(82960400001)(5660300002)(6486002)(33716001)(85182001)(8936002)(9686003)(186003)(26005)(83380400001)(6512007)(6666004)(2906002)(54906003)(6506007)(53546011);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?MEVocUlEbjBuZUlBZkhTUnFnTlV4SFk4ZStiSkxEQ2Q4UkplUlQzK2pxYlBL?=
 =?utf-8?B?MzR2WE5QMVE1T20yVzZiUHVwazZRaWlKcDQ0eUFrYkJpbFBTb1BIdS9TN2cv?=
 =?utf-8?B?NzRFRnZPcmMzUVlNV2F0Vmhya0orVkY5TzJVajk1VXV5TjNXRGVqdmYvQTFZ?=
 =?utf-8?B?RkNPYjltRzV6c3A0M1M1V1J6am1GdzR0aXpOQ1dqN20xTldUem1USys2cFli?=
 =?utf-8?B?bkhBL2pQblpaOExXQXo1bGlBc1BIV3dtSy9xV3F6QXVEazkxNTNSQUxoQnA2?=
 =?utf-8?B?MExDbmgyRXZkUGVPcGlkTkpVa2RYQ21HbVhxbHowb3JPMEYrWXJtU3NBckJS?=
 =?utf-8?B?RmIrRnVUbGNPN3JkdnBwdVBrdkNwbWF3b0o1N0I2WVNaOHVBOXFBQVFkN09r?=
 =?utf-8?B?VS9VV2QzaE1MenlSUVZsL1pXcTgrVWNwRERzdjl5SSs3MUp1UUhBZEg2RzFM?=
 =?utf-8?B?M3RETWdWT1dzMTE4OWZZSC9RRG8wU2lHMnpwQ0JXTmQ2VWF5ajB3OGdXaDZH?=
 =?utf-8?B?U0RVMmVTTzRHWTd1YnlsdHdUaG1HZTNzYzhnQmhIYmVMS1ZDMG8zU3o0MmZH?=
 =?utf-8?B?aUpJbzJ0U1ZTWFFqZnJRZngwREFqand5VERWYlQxS0RKM3FOTDdSZDZVazFK?=
 =?utf-8?B?Yk5OZ2IzazhBc0x4L0c5cmpvay8zakJhbHVDam4xZEZOQjNTMWV5SWp0WVFr?=
 =?utf-8?B?STVJcGhtazFwNnJ1ZVB6SGh5ajFlN01TR08wOUNiZFN1MURVcXN0TmJndTlU?=
 =?utf-8?B?K2xqU0toQnQyV09YTENwU21Kd2ZzcnZpM294Zjd3aTc2cWFzN0VQdzJ1T2g2?=
 =?utf-8?B?WFJoWUFEY3R6VW1XRUdkdXdtQm5rUUFKTm5pVHEvQ2VvUnhFL0RzZHYzdzFz?=
 =?utf-8?B?dm9GMmVSZmRUQTJLeisvMDJTUHF4cjhPenhWNHBaMzl2d3JkaitZYUdMaUI4?=
 =?utf-8?B?SG1HY21FTnJ0Z2RhOUpqRGpTWldNeUtoQTh2UG5QMnU3eE03L0JtSWVyWHNk?=
 =?utf-8?B?ZFpmbkpCaUE0NDJ4b2RxYWVzVnlibzFzN1p0YVI3VUk5aklEOTFFVkQydG82?=
 =?utf-8?B?ZjVWQTBBOVBINHZza1Y1T0hRbHNDVG5OM1BMTDJoMWRjcHdibFI3RjYvOGN4?=
 =?utf-8?B?TXAvdFRQQVkzNUJZZ2tXenBSNlRQQ1ZtTE5zeDFkbnRrUHdhOTFwQnNWY0Uw?=
 =?utf-8?B?RjVoMTRJK1lhZVIyNzNiRGNKOWpuTDM4KzZKQytLLzhNaUFHVDBabC9zeXFU?=
 =?utf-8?B?eHhqUmlGaTlXMGJpbktKYUw5REdmdFNWNmlrNVdRVGxwVzhyY1U0Zy95eEVP?=
 =?utf-8?B?bE1RZFA2M2NYQm1BM2VrWUJIZ05lelFCOXRXTE5PcFRDWVliVkhoeWZ3aHBU?=
 =?utf-8?B?M0xXdFg1dzVxK0FHVWJ0U01weW83ejVXRHlyelpEYmQ3WHM1K3FRWCsxMEs1?=
 =?utf-8?B?aERqYy83MEJFcHJSQVBUbDVDMU1YTHZ2N0JTU3F0T29qYUlrRzZlQ09YaEho?=
 =?utf-8?B?VnUzdWI5eHZIOHE2MDAzR09vYXZ1Z0p1SnVZMm1qYU1RVWNxcWNlWkw3bmw3?=
 =?utf-8?B?a1Z6Z1RzaGJYcVpBWnJSUGdsdUs5RUtKL2RNUE1udm02YTZuK2JoeDg2Rk5I?=
 =?utf-8?B?d1dzZERRa1AzaUR1NzNOOEFDRjJ0VnEwZEtlbmxmNFhBaFVQcG9hd21Pbkxs?=
 =?utf-8?B?M2hOYWlxdGVPbWQybmc5UHJIR2EwbzNLVW1hdzJvd3JWR0gxeFZ0a253MFp1?=
 =?utf-8?B?NnhIZmZOQ2NEMktFMzd5UG9pRkJuVDZPSDU2N3JJZWRQdm5iSi9LZGlaeDBt?=
 =?utf-8?B?WkpEOHQzQmwycjd3dzM3N1U2TVpYN2dIUVMyOU8wQXJ1cVNTeGVUME84ZXpm?=
 =?utf-8?B?Y3lRM083Zmk3QmhVNzk1QklUdWRISFZnUlpMM1VORmVVYTdmNEd0eU80NmxB?=
 =?utf-8?B?dkZHQ1RFNHpFNmNTSXBad1FiRTk1OHU2cTR2d1hkN2U0ZVBYbnpJT2hOVHVN?=
 =?utf-8?B?dGNmZUpiUjFHNmZVU00rK2ptQ252N2JQZ01uQjUrd2FJUW1TVWVHMVZYRlFn?=
 =?utf-8?B?YmRPZllKbFkrSWcwR0JvZzI1Qk4vSDVzWHF5ckdjOWVhdCtOZ0JSdmMzZkJs?=
 =?utf-8?B?amdlRno3MmVxTlNMKzRIS3Y0TjVOQXFhbjlkdlJoaG9XVHp0U3NnSllDcUYy?=
 =?utf-8?Q?pCf0qozXRQNYIaCQJKx21Zw=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: f5ff5996-a67c-4290-2dc1-08d9fd0a9bff
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 11:40:26.0983
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: PiEzWlbryt9AV/yTT43zooSmK6yMXd7BYGi1cI6SHTODLBh4WUOJC5MVgkOz3c2BAqRIvvN+aV+n+aYxAUv70Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR03MB5000
X-OriginatorOrg: citrix.com

On Thu, Mar 03, 2022 at 10:45:54AM +0000, Andrew Cooper wrote:
> On 03/03/2022 10:30, Roger Pau Monne wrote:
> > Control domains (including domains having control over a single other
> > guest) need access to PHYSDEVOP_{un,}map_pirq in order to setup
> > bindings of interrupts from devices assigned to the controlled guest.
> >
> > As such relax the check for HVM based guests and allow the usage of
> > the hypercalls for any control domains. Note that further safety
> > checks will be performed in order to assert that the current domain
> > has the right permissions against the target of the hypercall.
> >
> > Reported-by: Alex Olson <this.is.a0lson@gmail.com>
> > Reported-by: Andrew Cooper <Andrew.Cooper3@citrix.com>
> > Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
> > ---
> >  xen/arch/x86/hvm/hypercall.c | 7 +++++++
> >  1 file changed, 7 insertions(+)
> >
> > diff --git a/xen/arch/x86/hvm/hypercall.c b/xen/arch/x86/hvm/hypercall.c
> > index 030243810e..9128e4d025 100644
> > --- a/xen/arch/x86/hvm/hypercall.c
> > +++ b/xen/arch/x86/hvm/hypercall.c
> > @@ -87,6 +87,13 @@ static long hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
> >      {
> >      case PHYSDEVOP_map_pirq:
> >      case PHYSDEVOP_unmap_pirq:
> > +        /*
> > +         * Control domain (and domains controlling others) need to use
> > +         * PHYSDEVOP_{un,}map_pirq in order to setup interrupts for passthrough
> > +         * devices on behalf of other guests.
> > +         */
> > +        if ( is_control_domain(currd) || currd->target )
> > +            break;
> 
> Hmm.  In a split control/hardware domain model, then qemu is in the
> hardware domain rather than the control domain.  I suspect this wants
> extending with || is_hardware_domain(currd).

The binding of GSIs is exclusively done by the control domain because
those are static and known at domain creation.  The mapping and
binding of MSI interrupts is however done by QEMU at runtime, so it
needs extending to the hardware domain.

However just extending here won't be enough: we would also need to
modify xsm_default_action, as currently XSM_DM_PRIV will only be
allowed if src->target == target or is_control_domain(src).

diff --git a/xen/include/xsm/dummy.h b/xen/include/xsm/dummy.h
index 58afc1d589..ac40a24a22 100644
--- a/xen/include/xsm/dummy.h
+++ b/xen/include/xsm/dummy.h
@@ -88,7 +88,8 @@ static always_inline int xsm_default_action(
         }
         /* fall through */
     case XSM_DM_PRIV:
-        if ( target && evaluate_nospec(src->target == target) )
+        if ( is_hardware_domain(src) ||
+             (target && evaluate_nospec(src->target == target)) )
             return 0;
         /* fall through */
     case XSM_PRIV:

That would however also give the hardware domain access to XSM_TARGET
and XSM_XS_PRIV operations that where previously forbidden.

Or do we just require people with split control/hardware domain model
to also use a different XSM policy?

> Also, the sentence about later safety checks really ought to be in this
> source comment too.

Will add.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 11:40:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 11:40:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283208.482162 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjpD-0008Oe-E2; Thu, 03 Mar 2022 11:40:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283208.482162; Thu, 03 Mar 2022 11:40:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjpD-0008OX-AO; Thu, 03 Mar 2022 11:40:51 +0000
Received: by outflank-mailman (input) for mailman id 283208;
 Thu, 03 Mar 2022 11:40:50 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPjpC-0008N8-EG
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 11:40:50 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id c5b584c8-9ae6-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 12:40:49 +0100 (CET)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur02lp2059.outbound.protection.outlook.com [104.47.5.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-12-VXeXDVP7M7yKwUgixo-Pgg-1; Thu, 03 Mar 2022 12:40:48 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM6PR04MB6039.eurprd04.prod.outlook.com (2603:10a6:20b:73::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 11:40:45 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 11:40:45 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c5b584c8-9ae6-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646307649;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=LcZWY7UDM8wNsztSHagZP8wPYZ5XByk5xZOfPj019ao=;
	b=Ju9yYark4bCAtYGq0ZPIK+xGaJ3XsznEutFpqRSYZ0uo3mbGytHunjoU9oxYD7WT1Au15W
	DQ9VD9EIa2FsF02GKEbTbZrCtepL4iJCzYYO1raVHphM0TtI4p1o7ir4d0p2CntuOQd3iI
	lHcXA9m1a+zrHnAkLulAwKzvnraGZW4=
X-MC-Unique: VXeXDVP7M7yKwUgixo-Pgg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=lpPlnrL8Tnmj8cL1Osv4OYMzFlkqdwl+ZzUHUi6sS+pUQIsHYyByCMGrJ6A5lBlthOupp5AVjF3hWKbuwtrbujLLMC9S3h17wHTIYtYFKNhJlnjVCIrEnPB55CuhW8/DujbFJwJsdtkNrDgHPwmZlQMsOfQ0o+VxmzdrSe/dVNsCkJpJuiNd5Dd4P5E8cjfeG4qN2CQv2FkX0Aq/aG4DVFJJi9/aJHXwylyQyO9hATlguT5aaRQxhZ5nu4N8DFcTkSJjSyfcxnRXd1HS/rwsZGj8uDKls808k/LqHCxaZAIsRokD7wzw9/QhrNSlVFbVsaTDojo0XeiEViws+PUjOQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=SRw1SjXvQzn3T21RYtLxvIlmfYzmHraSIKOrgV2TF8s=;
 b=JEVwWI0OygkYoFJxQXestDsNghaHCFy8yeDLQUBP0sJsMZ0Vdx3rjsnTh1EguaHoG2PvV15Rf1fg51JgGO5dZCj0pLDsDAAo/9t0HGIYQMQ2O0PYsxOq1oL84CQyiNOG+V+VRoAhj88Gkdh83azkaYTeDq0jcJRxht01fXIE/o77nO+c36ZO3hw4n2AYCPYsxMmQUF5sWbv2hrYpXYyeYpMtfY9GtTqofNh8UIYMMcz3WVCpDAdWOFpIASra//KgQeqGm0DQsXjUPKaYKBIIqFPqqaLUFD6U02CoCOzE2yYc1NvmdgI4x3dQuKDafGdQA0SRce/3dRxDR70vLYr2sw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <46630b9e-0b88-f6e0-c240-29c0f7de94e1@suse.com>
Date: Thu, 3 Mar 2022 12:40:44 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] x86/cmdline: Interpret 'vpmu' as a positive boolean
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <20220302221157.17246-1-andrew.cooper3@citrix.com>
 <6ffbc025-758e-bb7e-4e87-0b6b9e1bc2e5@suse.com>
 <bd6dda42-fc33-5958-31e7-741853c85c9b@citrix.com>
 <3bbbe906-ca02-c748-23fe-7a98864cfb93@suse.com>
 <9377d616-e5ea-a3a5-0a90-e2ec81ca6fb8@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <9377d616-e5ea-a3a5-0a90-e2ec81ca6fb8@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM5PR04CA0011.eurprd04.prod.outlook.com
 (2603:10a6:206:1::24) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: fc05177a-1ada-4429-d8d1-08d9fd0aa7c6
X-MS-TrafficTypeDiagnostic: AM6PR04MB6039:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB6039EDBF42254F0B847FC0C6B3049@AM6PR04MB6039.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6512007)(53546011)(26005)(2906002)(36756003)(6506007)(186003)(83380400001)(31696002)(4326008)(8676002)(5660300002)(8936002)(66946007)(86362001)(2616005)(66476007)(66556008)(508600001)(38100700002)(54906003)(6486002)(6916009)(316002)(31686004)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?GioiGEAPxMMIQWYKk8HZHQhTN4gGaQh7VU8IXHpSfXSj1VRK8OOoCOQfDg6L?=
 =?us-ascii?Q?0eFvOo2nsibbqw36iZCExeoMbBxu7AbnQe4caVWJVFF4xQ6tgGFn5Cx2TReP?=
 =?us-ascii?Q?Of5qYzMDFhdmZoyNCBZfAH0ttUvGwpc6RUtu6BeJTvZ3GlJ6OGydrWYjWPpm?=
 =?us-ascii?Q?VYmtCVJCfQfArNo9AJ1KTvQ1LQik7Fv51e7G/6ZfaWRDL/plp57VM22/bkcu?=
 =?us-ascii?Q?GRduCk/DwGeQNL8JeY/6Cex8nqMBct139nhVEQndUg5whxsB/yoEW3L4ArDW?=
 =?us-ascii?Q?ho1XIX3Gytr4Gm/gmEID+AYPuTy7uvNvxU8vtQ8FIplAz/hs7YG5IQDiBora?=
 =?us-ascii?Q?r9PzWQX1v/A+pXkdtbPQ+/5ii43+6p85UGeiEsZbmTN6zOk6uu4u2MQALDNk?=
 =?us-ascii?Q?EzkLPPeGOG4neensXdwIHnri/XUdGqloh7kcdpGfS8NfKxpvsdtsid2hqlqz?=
 =?us-ascii?Q?gA7maNUuba1YFFLWxpYaqa3HbsVTRTpKemJbOcK2aItHPtvjb3sU/xSEGzwr?=
 =?us-ascii?Q?XO7AY0W8+Fj7ODxcJWPvCJlkA35GQrGKe/uFrv+FCYf4KHUuI8T6LsNYc+IA?=
 =?us-ascii?Q?m+lATsUXBNSGS12JzHP1iApYWQzteKnXE3dqJOcqC4v49MHnmZvnLZURePCb?=
 =?us-ascii?Q?eA9k7Cz+Wj3EJgvfPjgy5+NeWhl4qw4aBmCVyepp6hBqIuwmN2zUu8EZL05h?=
 =?us-ascii?Q?09XOi5y/sTSTS6YzTWU8bwAgcuI4/iTNRyHi5LMaKAMXJeqoSZA9G/PxZRVy?=
 =?us-ascii?Q?nKF/LgtL1RqU7GynZ73aTcNLTp7/NHQsvzZaLPTXtV95qoNu3nI8JbhCbOgO?=
 =?us-ascii?Q?V4RpBGwPJCihSBUd7zVXZuSXn7oD5SgeOfyVixHWrjl2buDswOQitlNIsjwV?=
 =?us-ascii?Q?kAtHSQ/Bbb+/cZOYFcmnvjdn7hMov8zaK1tONXtZFWzjoZHGkasAsiGViqYF?=
 =?us-ascii?Q?IhvW2oqcQvtE9Y/ulAlqhtdextxNbeQOKF2yUwmTiT/DkU9/6tyGgxruvdSC?=
 =?us-ascii?Q?Mwd+Uj6NU1F56hhfiDL2/qiJG3YhyaNhSq59JVe8NHfb9FEdl4dDFE1fKGOq?=
 =?us-ascii?Q?BWLGZfCVFfzyykKapwMWoCBJ+5ufdkSi07x8u1k2WyGpi/LYQTNSVtY3jpWl?=
 =?us-ascii?Q?Us7NoQDLU+e6RH/NzNs2Enkzx4Fi57xGA5Ga9+zXbldeYQzjYn2kY+WNKB3l?=
 =?us-ascii?Q?r+fQQjjMvP7RUgrRPI061Vr93pMbgHoF9pHc909EWkyMg2sDjHrNP+K+2C5l?=
 =?us-ascii?Q?sAh9Eq89z5jsIES8g4sYW/eBRbCaC5MuIYTZDGNuoEChH+2BqyFpvcqk176N?=
 =?us-ascii?Q?umlCb71aw7Z9jVDSlgRxrt86kwb4MNdkXee7LAZirFya4jPTSKlcTXJRdvyH?=
 =?us-ascii?Q?efGQgmKHdkx/8OqTrI2jph8h6usYu2eUhlZHtNVSFgd45kP5bjNQxCn+OMCO?=
 =?us-ascii?Q?CIYjLCYFUWohp9KRSpnVqTgm0oZSM7bRCRDzB/pU5oBYFviQaiYoezRmS77q?=
 =?us-ascii?Q?rDozTmYiRRDnRdHNxMbZfTytfnQT0UfDosi1Kk8k4akiklGXdlzVccUcF2Pd?=
 =?us-ascii?Q?xC2rRadF/qu9galkWE+zb39XwPQoW3+/3qP64qQqP13okkSewR4YDsLwt8OK?=
 =?us-ascii?Q?q9BZl80Fgzw5pU12YjrP4Bw=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: fc05177a-1ada-4429-d8d1-08d9fd0aa7c6
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 11:40:45.7368
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: WuAWJXT0h4/i9QSYOu8dj05bb9jqZMtBBixgBGNDWX7oRyQA6CFK9cYKtA7vWjaKSLzOU0c87AzYg42dlwoTOQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB6039

On 03.03.2022 12:15, Andrew Cooper wrote:
> On 03/03/2022 11:04, Jan Beulich wrote:
>> On 03.03.2022 11:48, Andrew Cooper wrote:
>>> On 03/03/2022 07:44, Jan Beulich wrote:
>>>> On 02.03.2022 23:11, Andrew Cooper wrote:
>>>>> This makes it behave slightly more like a regular boolean option.
>>>>>
>>>>> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
>>>> Reviewed-by: Jan Beulich <jbeulich@suse.com>
>>>>
>>>>> Slightly RFC, because there is no easy way of making the opposite "no=
rmal
>>>>> boolean" case work for no-vpmu.
>>>> There's nothing to do to make this work afaict: Generic command line
>>>> handling converts "no-<option>" to "<option>=3Dno" for custom params.
>>> Oh - I'd forgotten that, in which case this patch actually wants to be
>>> simply:
>>>
>>> diff --git a/xen/common/kernel.c b/xen/common/kernel.c
>>> index adff2d2c77f3..2cea1da781ac 100644
>>> --- a/xen/common/kernel.c
>>> +++ b/xen/common/kernel.c
>>> @@ -162,6 +162,11 @@ static int parse_params(const char *cmdline, const
>>> struct kernel_param *start,
>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 safe_strcpy(opt, "no");
>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 optval =3D opt;
>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0 }
>>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0 else if ( !*optval )
>>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0 {
>>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 safe_strcpy(opt, "1");
>>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 optval =3D opt;
>>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0 }
>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0 rctmp =3D param->par.func(optval);
>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0 break;
>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0 case OPT_IGNORE:
>>>
>>> to turn "option\0" into "option=3D1", no?
>> Iirc extending this to the positive case was deliberately not done, for
>> the risk of breaking custom handlers not expecting the standard boolean
>> forms. We could likely go this route, but only after auditing all custom
>> handlers, I'm afraid.
>=20
> Well - I've already audited them all once recently.=C2=A0 What's once mor=
e...

Of course if you did an audit (for this particular property) recently,
that's definitely enough. Feel free to apply my earlier provided R-b
also to this alternative change then.

Jan

> I'll have a go in due course; I'd definitely prefer to avoid special
> casing the positive boolean form in individual handlers.
>=20
> ~Andrew



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 11:43:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 11:43:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283222.482172 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjrU-0000li-R4; Thu, 03 Mar 2022 11:43:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283222.482172; Thu, 03 Mar 2022 11:43:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjrU-0000lb-O4; Thu, 03 Mar 2022 11:43:12 +0000
Received: by outflank-mailman (input) for mailman id 283222;
 Thu, 03 Mar 2022 11:43:10 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPjrS-0000lV-Sr
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 11:43:10 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 1802f362-9ae7-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 12:43:07 +0100 (CET)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur03lp2053.outbound.protection.outlook.com [104.47.9.53]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-39-aG7gw-8rPWCqcplm_4g50g-1; Thu, 03 Mar 2022 12:43:08 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR04MB4031.eurprd04.prod.outlook.com (2603:10a6:803:4c::28)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 11:43:07 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 11:43:06 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1802f362-9ae7-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646307789;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=wKzoZ4ikj8dUJsJtdG/imGrTBGfplO1pGS1yEi7i/WU=;
	b=eQIorU6rtSKpa2M4aY29k7As0E/ePsdkBwwjCsxqlf72ByJUc70HhwhLKVTVs+35XVZY+N
	kLGuyHDyzzmIhRew4NFulpOLrlLR6Ybf9dO6GN/iFqA0HR/R8wVl2eY7lZsjIoKREpwNed
	Sd5hmzE/K+mnJM//zEkvT/vTiNt1ePw=
X-MC-Unique: aG7gw-8rPWCqcplm_4g50g-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=GtN7/LetXhOAjee4DII3w1r39Xl9AM5t6POQxXWYjcIXVXLADm9pR/Y661Ss2G7PThKI6OC6ntZy+98iw77zwDFPjdeKWceNkBha3iDn+n3JtICNAeuPmRGr14Q7L1/VgKvZ0Kwx4+OsBRdL6V4Z973uCMdGYaN5htJvvuoVuTCUqcFHq4Oz8pwoW56ezty7WtuTC7Qji8epmsKJ3suM3wtDoEFusGVr7ahBPrpDIGStRg03ozAJLFP0ilkUJFWwveJxSDp6nZwcuVSS5c8PLtSol33HGjd6+6S7biU38wnlbkeaMy4zapamzV//u/SjyIrxJ4T6yi2XFoyT4jqwiw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=olDlsQ0qXoghAxpSEMDWh2NF/+smfYSez6y5C9Z3n2M=;
 b=Wsb8W7R4P363EzJelpeoaMgs0SweId6l+Tju3TnQn0u963LbqfFvSz4R1g3RP65EbOMoym/ECPLsf4ONe44rC08wl2cf8tvGWJ3hqWnuvS7D36OsjQtifU0jC4HKMlvVn2LvEIiUc5h4NRicwFOJWzeccS+Ev0sQlu7pbJrjyMvRsDhPEV5fRxRTT4IlsmnSdeQ7vPmiYU/0C6XqfHlNOJJSMdLB9IWg2XbglGOwXEdbPSkf0tnWC81ady2zi6ps+8Y9LrUVDDw4S2y6Jnmv6MAG8IU9/2KDCIDBv48XSx8BsVuBpXIckOOYU90mEVFLTMahJV4tnYDXsLiGsOnlbg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <3a65ef0e-9b95-af5e-946c-9cec45ceeec5@suse.com>
Date: Thu, 3 Mar 2022 12:43:03 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH 3/3] hvm/pirq: allow control domains usage of
 PHYSDEVOP_{un,}map_pirq
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Wei Liu <wl@xen.org>, Alex Olson <this.is.a0lson@gmail.com>,
 Andrew Cooper <Andrew.Cooper3@citrix.com>
References: <20220303103057.49181-1-roger.pau@citrix.com>
 <20220303103057.49181-4-roger.pau@citrix.com>
 <c1fafc74-d4d2-5fc5-db38-c75f076d8405@citrix.com>
 <YiCpJfnAskieK/p4@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YiCpJfnAskieK/p4@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS8PR07CA0023.eurprd07.prod.outlook.com
 (2603:10a6:20b:451::23) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 076b4aed-3c14-4c2a-b4b8-08d9fd0afbde
X-MS-TrafficTypeDiagnostic: VI1PR04MB4031:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB4031ECEB55283323BFF7E1EEB3049@VI1PR04MB4031.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(26005)(53546011)(2616005)(6506007)(6666004)(6512007)(36756003)(558084003)(2906002)(31686004)(8676002)(38100700002)(6486002)(8936002)(31696002)(86362001)(508600001)(54906003)(6916009)(66946007)(66556008)(66476007)(186003)(316002)(5660300002)(4326008)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?lqRLTzLon8ahDRnsT5aOuDGUFC2k914GkEsO+mGE7nmu4QVTKD7hD43DMG+W?=
 =?us-ascii?Q?1RlCs2q0U8PPVUyVvyWqAfyCxqWXYoT4ObMjMeQiiCKVytfuo7VghAFWpJSi?=
 =?us-ascii?Q?kG41xrKYZg8wB8g87GXEReW72k156mt5Xg0BGwDDz83lU1X/TD0qwVXI8PQ5?=
 =?us-ascii?Q?P0PJHFfUAgIJOcikHOZOeiCNx5rYrpZC+/ltvYoCKW6id3bbzm8Y/oBjx3sI?=
 =?us-ascii?Q?mMGKNyHDIdz10yilPJKWxn1Rrg8THDXuD4Got0Zj0DkG4EP1m10WtW6VLmRr?=
 =?us-ascii?Q?KS1wip9zsmZDO5D2zh3Zm+95P66lwdbhPMWRDqi0vYxwO4Drnh4SVsrtUr9O?=
 =?us-ascii?Q?A0Ef4guZyjiXL0/6XUSbdcCnF2J232rO9uufIau9w2gsuGBClxQElnZB7icw?=
 =?us-ascii?Q?cNeGHZlr9IDVy0CRtoEOzVd2DRYvGU5ltZFRc70nNoWWaJRclXYCgmbq/XBh?=
 =?us-ascii?Q?rcE5+zoPiwWsy6ZUGbg+wtHwMFTsp8BKC+MjVUgRuSbmzq3po+M7cBJ89KBF?=
 =?us-ascii?Q?LwO0lG1V99V3twAlCZOlctgoXq3vyatZsRijbFyJq2BhXwiyhkr9BSzoA9dt?=
 =?us-ascii?Q?kihU70J2Ezsfrw6HFtZM6s9TQH2UUmFyzqx1WVbWEYUr5wL4VFHfA8t58+wF?=
 =?us-ascii?Q?R9E/GvkOdYDc4hRSTFRWMW+iz/HYlQ+16MrLPdkAfzs5DHd7Uqpic1AzhBKG?=
 =?us-ascii?Q?eWKOn9pzNkeqNag7uBD6v4h+uON/YlsO3aHtQTYb16x4jxCgj2eMejCrJWuv?=
 =?us-ascii?Q?w4EKbY4dxCepiVG0K/t+lnUT4LiKVZiCjixZIMaFEvso5JVIL9jKJKLVZSps?=
 =?us-ascii?Q?EtsIoPTaGqO6ZPZGNdJSgR8bZ6O+rIgIc5G3E6P+4xHrKCWprqpEU1idnso1?=
 =?us-ascii?Q?/mO+DxIlGocYy1DH6u00mh1fvE3X7tP3t6z/7lsfbZSDcNAoQf3I7UtHl7VQ?=
 =?us-ascii?Q?iEFdmTrKEUlMsSsS2rBeRp+r0EEbhm+F4ZSe8lSAEBQII2yO9Tgz5VvwbsjF?=
 =?us-ascii?Q?XuDhgKd/Z7jNyqc2JuyJyb86tHtr4vVTq/7Z2rkdO7k8cY8qVBY5XpuejeF/?=
 =?us-ascii?Q?z3YPNaKqIeVPxo6VW6tAU2ZpvpIy3nme3wH2+45Jo9ZFawwfwdPJDv5g1aPX?=
 =?us-ascii?Q?e4V1BEuyu45pgVSZ3Ks/z4WOTNgtQq/HTxqKjXADh/6baKU66XtrLEmjzuwV?=
 =?us-ascii?Q?0TvQhRug/BmYSjBLkGVd67jr1ZMEAv5lUJNVkT1Mnd+GtgLV7t7rTlM8gTuQ?=
 =?us-ascii?Q?R7I9IXnUAWoxM7+vvtQUQCcYdeRRoeRGG82Rf6e85RIp8Co+oqeQDoiZ/fVk?=
 =?us-ascii?Q?o2jFAQhEsm0bktdFjiartrVbNtHZYFRsx1jtBKtxUCbIFgr2AeSR8Gho3G39?=
 =?us-ascii?Q?T2VJ6d0nYD2c9BQ2Fm2HKtxpnbl8CbktpYR0xUgEjV/Hzc4dLqBKuzjXprJe?=
 =?us-ascii?Q?p9okCF8knXLNoKvlbw5151Sh99CjTpbxxRMmMVfwEoRnPvrXQQ4KEVB4urlU?=
 =?us-ascii?Q?DuHdhPE7vAukQ0SWUZRxXCGPMRyp6xiDcNaOThWQxt0lNYn3sFnck8bKmKWs?=
 =?us-ascii?Q?wiIH0i1dc350ErIREML0XyIFw32yR3KOpmzdxrqRoSjUqK7xXfglg0lNIodZ?=
 =?us-ascii?Q?Gwg2IcXLO7LJ4UUh9VDPOu0=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 076b4aed-3c14-4c2a-b4b8-08d9fd0afbde
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 11:43:06.8531
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: X7KEdmMT+Vvrn9YMY+ENvGMrJ5EfqxXxieWZkemAPGiLACw+NR1dHdWJj6xGiEPdXCBvxeDnA9t85MLJIyJL4Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB4031

On 03.03.2022 12:40, Roger Pau Monn=C3=A9 wrote:
> Or do we just require people with split control/hardware domain model
> to also use a different XSM policy?

I've been under the impression that this is the intended model, yes.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 11:51:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 11:51:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283230.482187 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjz4-0002NB-LU; Thu, 03 Mar 2022 11:51:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283230.482187; Thu, 03 Mar 2022 11:51:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPjz4-0002N4-IU; Thu, 03 Mar 2022 11:51:02 +0000
Received: by outflank-mailman (input) for mailman id 283230;
 Thu, 03 Mar 2022 11:51:01 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=GC2d=TO=apertussolutions.com=dpsmith@srs-se1.protection.inumbo.net>)
 id 1nPjz2-0002My-Na
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 11:51:00 +0000
Received: from sender4-of-o51.zoho.com (sender4-of-o51.zoho.com
 [136.143.188.51]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 2ea29967-9ae8-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 12:50:56 +0100 (CET)
Received: from [10.10.1.173] (static-72-81-132-2.bltmmd.fios.verizon.net
 [72.81.132.2]) by mx.zohomail.com
 with SMTPS id 1646308246131700.8671073204542;
 Thu, 3 Mar 2022 03:50:46 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2ea29967-9ae8-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; t=1646308250; cv=none; 
	d=zohomail.com; s=zohoarc; 
	b=MeeCbcKzjaM0FR3yn8mr4Nut+EeM5sEQeZ7pQdu5HDNltHWWBQ6MduG9VGc/WJL4fopVYnHJd64P7fr39hq23K3/cnVjm6T54LghbVlJgmY2hScNUqZYtqEYlo1OUXad7o/Fd9fDFqU9IE7MW/SkeRa4xzv2XAoCIwhsJtB7uL0=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; 
	t=1646308250; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; 
	bh=u1ipkWFozDh9LOJ4TpEVmQcDvF1/FctYY95E7PwvFY4=; 
	b=ek7FS/yWcs3EnXpr1zCmxp2Q2+9eE4aTS4Tuq65BcyjqbXsvY7t8DMD1oS/7Ydl9pAy6KQzHHBvY5nTkvdjrur1oEPlrZz18oRXdUF0Y7DEUL9lgtveKWi4wQH7QjxlVDNZoEBsF2hTm1H+/9HwAfohKox2A0sTWQsJh0LskCBI=
ARC-Authentication-Results: i=1; mx.zohomail.com;
	dkim=pass  header.i=apertussolutions.com;
	spf=pass  smtp.mailfrom=dpsmith@apertussolutions.com;
	dmarc=pass header.from=<dpsmith@apertussolutions.com>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1646308250;
	s=zoho; d=apertussolutions.com; i=dpsmith@apertussolutions.com;
	h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From:In-Reply-To:Content-Type:Content-Transfer-Encoding;
	bh=u1ipkWFozDh9LOJ4TpEVmQcDvF1/FctYY95E7PwvFY4=;
	b=AD9Fu3LYZQgCVmtjQ6B3R8SlCHL2Kr2hKXlliiEVO2vLNjyrDeCzXTmbpaSOWuqI
	T1LvEeGZ2YhAlKSnh6AZinqsWDQ5JsFbA6Mvg7sSjNdYzJHsmpsehqGFKki/S39LdjA
	PtRYxvK0czGXzAXPjfFt1vcC842svXG7uvUi71Bs=
Message-ID: <18472660-3438-5c77-05c6-148b97bf4725@apertussolutions.com>
Date: Thu, 3 Mar 2022 06:50:05 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.0
Subject: Re: [PATCH] x86/tboot: adjust Kconfig default
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Lukasz Hawrylko <lukasz.hawrylko@linux.intel.com>,
 =?UTF-8?Q?Mateusz_M=c3=b3wka?= <mateusz.mowka@intel.com>
References: <fae0a082-8b39-9bd1-0ed3-35a660d704e8@suse.com>
From: "Daniel P. Smith" <dpsmith@apertussolutions.com>
In-Reply-To: <fae0a082-8b39-9bd1-0ed3-35a660d704e8@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-ZohoMailClient: External

On 3/3/22 04:49, Jan Beulich wrote:
> We shouldn't include unsupported code by default, with not even a means
> for its building to be disabled. Convert the dependency from merely
> affecting the prompt's visibility to a real one.
> 
> Signed-off-by: Jan Beulich <jbeulich@suse.com>
> ---
> We could of course go further and make the default also account for
> DEBUG, as is done elsewhere.

As in you would like to adjust the default based on whether DEBUG is on 
or not? I guess my question is what motivation is there to adjust this 
selection if DEBUG is enabled or disabled?

> --- a/xen/arch/x86/Kconfig
> +++ b/xen/arch/x86/Kconfig
> @@ -193,14 +193,15 @@ config HVM_FEP
>   	  If unsure, say N.
>   
>   config TBOOT
> -	bool "Xen tboot support (UNSUPPORTED)" if UNSUPPORTED
> -	default y if !PV_SHIM_EXCLUSIVE
> +	bool "Xen tboot support (UNSUPPORTED)"
> +	depends on UNSUPPORTED
> +	default !PV_SHIM_EXCLUSIVE
>   	select CRYPTO
>   	---help---
>   	  Allows support for Trusted Boot using the Intel(R) Trusted Execution
>   	  Technology (TXT)
>   
> -	  If unsure, say Y.
> +	  If unsure, stay with the default.
>   
>   choice
>   	prompt "Alignment of Xen image"
> 

Outside of the debug question, I think the proposed change is good.

Reviewed-by: Daniel P. Smith <dpsmith@apertussolutions.cm>


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 11:55:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 11:55:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283237.482198 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPk3Z-000310-8V; Thu, 03 Mar 2022 11:55:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283237.482198; Thu, 03 Mar 2022 11:55:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPk3Z-00030t-5Z; Thu, 03 Mar 2022 11:55:41 +0000
Received: by outflank-mailman (input) for mailman id 283237;
 Thu, 03 Mar 2022 11:55:40 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=GC2d=TO=apertussolutions.com=dpsmith@srs-se1.protection.inumbo.net>)
 id 1nPk3Y-00030n-Eh
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 11:55:40 +0000
Received: from sender4-of-o51.zoho.com (sender4-of-o51.zoho.com
 [136.143.188.51]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id d6e3779f-9ae8-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 12:55:39 +0100 (CET)
Received: from [10.10.1.173] (static-72-81-132-2.bltmmd.fios.verizon.net
 [72.81.132.2]) by mx.zohomail.com
 with SMTPS id 1646308527088435.7162000303083;
 Thu, 3 Mar 2022 03:55:27 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d6e3779f-9ae8-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; t=1646308529; cv=none; 
	d=zohomail.com; s=zohoarc; 
	b=KvTp8J00kbQhYuQvGlE1Z/ZfM3uLZ6EYX3PsRr1XNWWGOF8X2HKMsF30tOZD+EcMMJAIEH3NVub+j1vMrYiLJtF2O2u3E9bu1F0lYXKjZCZZf/Q8X+hpMoyG/dxctYlXAg9VJIF7wEwqJIDKy5IOZI/p/SxXWUG1anBNJ9OvF4A=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; 
	t=1646308529; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; 
	bh=bVxTogiblHHgRMkjL1zPZ9Zsmo3Slz+NqJrINZH0Htk=; 
	b=d5V0zzAhF5CVq/SOxesbFsla1myUXTbShtxZsLpPq7TJI18gQlUp1e3GbVNkkuuWYABhnfpKai097FSghOb+QYM0SOGZsvFCxih48p8mlGIAekCrytZy2cYd12zGIoNfO3J7G1eiIQQfjt5lIxdcim59AC97eG2S3IvQfrUXm5o=
ARC-Authentication-Results: i=1; mx.zohomail.com;
	dkim=pass  header.i=apertussolutions.com;
	spf=pass  smtp.mailfrom=dpsmith@apertussolutions.com;
	dmarc=pass header.from=<dpsmith@apertussolutions.com>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1646308529;
	s=zoho; d=apertussolutions.com; i=dpsmith@apertussolutions.com;
	h=Message-ID:Date:MIME-Version:Subject:From:To:Cc:References:In-Reply-To:Content-Type:Content-Transfer-Encoding;
	bh=bVxTogiblHHgRMkjL1zPZ9Zsmo3Slz+NqJrINZH0Htk=;
	b=lMKupOMw7wCs7nW/P+4CxybmNVcDCkYSop2KXrRrYDInpetmZ+Q2PdP5kZaZPmyS
	iLhoXChAYBtBwlnP12EiJD8pb4QGVDIoSBlE1WuXXBSeNQF2CLzOJGv38zXJ9s/i6vw
	N4ROmh2Jrdv85DBGspdlRqLoecl7sHfAmHxqbzzE=
Message-ID: <6388c214-58e9-ed2e-1447-2781d7a9ba99@apertussolutions.com>
Date: Thu, 3 Mar 2022 06:54:47 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.0
Subject: Re: [PATCH] x86/tboot: adjust Kconfig default
Content-Language: en-US
From: "Daniel P. Smith" <dpsmith@apertussolutions.com>
To: Jan Beulich <jbeulich@suse.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 =?UTF-8?Q?Mateusz_M=c3=b3wka?= <mateusz.mowka@intel.com>,
 =?UTF-8?B?xYF1a2FzeiBIYXdyecWCa28=?= <lukasz@hawrylko.pl>
References: <fae0a082-8b39-9bd1-0ed3-35a660d704e8@suse.com>
 <18472660-3438-5c77-05c6-148b97bf4725@apertussolutions.com>
In-Reply-To: <18472660-3438-5c77-05c6-148b97bf4725@apertussolutions.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-ZohoMailClient: External

Jan,

FYI, I just noticed that Lukasz old intel email was used for this patch. 
I assume your tree just hasn't picked up the patch with his new email 
address. Copying him now so he can see your patch.

v/r,
dps

On 3/3/22 06:50, Daniel P. Smith wrote:
> On 3/3/22 04:49, Jan Beulich wrote:
>> We shouldn't include unsupported code by default, with not even a means
>> for its building to be disabled. Convert the dependency from merely
>> affecting the prompt's visibility to a real one.
>>
>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>> ---
>> We could of course go further and make the default also account for
>> DEBUG, as is done elsewhere.
> 
> As in you would like to adjust the default based on whether DEBUG is on 
> or not? I guess my question is what motivation is there to adjust this 
> selection if DEBUG is enabled or disabled?
> 
>> --- a/xen/arch/x86/Kconfig
>> +++ b/xen/arch/x86/Kconfig
>> @@ -193,14 +193,15 @@ config HVM_FEP
>>         If unsure, say N.
>>   config TBOOT
>> -    bool "Xen tboot support (UNSUPPORTED)" if UNSUPPORTED
>> -    default y if !PV_SHIM_EXCLUSIVE
>> +    bool "Xen tboot support (UNSUPPORTED)"
>> +    depends on UNSUPPORTED
>> +    default !PV_SHIM_EXCLUSIVE
>>       select CRYPTO
>>       ---help---
>>         Allows support for Trusted Boot using the Intel(R) Trusted 
>> Execution
>>         Technology (TXT)
>> -      If unsure, say Y.
>> +      If unsure, stay with the default.
>>   choice
>>       prompt "Alignment of Xen image"
>>
> 
> Outside of the debug question, I think the proposed change is good.
> 
> Reviewed-by: Daniel P. Smith <dpsmith@apertussolutions.cm>


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 12:00:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 12:00:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283248.482215 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPk7x-0004g7-6h; Thu, 03 Mar 2022 12:00:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283248.482215; Thu, 03 Mar 2022 12:00:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPk7x-0004g0-3Y; Thu, 03 Mar 2022 12:00:13 +0000
Received: by outflank-mailman (input) for mailman id 283248;
 Thu, 03 Mar 2022 12:00:11 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPk7v-0004fl-Gr
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 12:00:11 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 798253d2-9ae9-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 13:00:10 +0100 (CET)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur03lp2054.outbound.protection.outlook.com [104.47.8.54]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-7-R2oUpeIbMUG_ErM0WkBsWQ-1; Thu, 03 Mar 2022 13:00:08 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM5PR0401MB2643.eurprd04.prod.outlook.com (2603:10a6:203:34::11)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Thu, 3 Mar
 2022 12:00:07 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 12:00:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 798253d2-9ae9-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646308809;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=RPCtJp6SsAfzXa1EA1nDQxtaENxARcwoIX5QSmtNeNw=;
	b=LWoYM7iprwqW7c4G0Anwwh9wg9bI2cMOhkndYVaX09klqepuPnBbCX3lPuPmZxc6Wdv42T
	z5S+yaW7Xc6gejQP32FTBeyZfUO+E75O/AhfIPdQiGmQrBvtZv6Tuj1649NxREEpxUxmB5
	Zl/09PWvlYHx7hX+YZR7+HW93o5kBWE=
X-MC-Unique: R2oUpeIbMUG_ErM0WkBsWQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=KoWUkZfdz00MVBQ+0bsUejQpLsOeZ5BWUMaWnibAU0wVSDXQq+uP4ODcd6pE8Kyoaicej6lRlEICy3U+kZ9EXkhg6Y2zuj8ZbWVS6Ltbokbczcmim+noKyuwUIRB0OxEDHemnzfplScGeu++eS57Ndtu/xB/avd92dD4d4ksY/1FtDHShvt0OM0Hu0OUN6kHfGNfES3q9FTxfTtFi0LmhaZ7G1L8u2yXpQiNZxJZxlDEBAfixE8pBnM3aBHVL5kYbZNN52iB89fMEhXT0MsBNm4XxokjXLtfT0SONJ9FhZpUJoUhfzAzoVZHtjuRPhPH8EvAXljJAvtzlxs2yvmmgQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=RPCtJp6SsAfzXa1EA1nDQxtaENxARcwoIX5QSmtNeNw=;
 b=MnljNddUwDbDqWaD0RT+ILYuelkB4yjrScs1PiDOx53yvryG+FfGOJV52E02P2fOlzs8yyC2DI5cZs5bdA6wMtwmWlz4mhuRdPyHbgM6on1HGeghsMeiS3xwTb7Gz6y6fVUGR5SCc5zBCME65FrROX6ws0FYUEqcFKjoYgtkn8aJn8hC+Szsyj9z8sKweoyF1wJMx2mYSX5Mixp2hzox46jyl21+y0aTLxKeCJ7mc/4cab2uUaBP+8ABR9v6PuFUeLDDOoJabdzCATOSLGxN+xwcOz+CjjZh0jj8PCX0shprHGaoVJx2UrQ8OBMie7zc9vTX+pX7iS6lXNOFZUfQEg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <9ac6d953-df29-3941-c5a1-89464cd0f27e@suse.com>
Date: Thu, 3 Mar 2022 13:00:05 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v4 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Content-Language: en-US
To: Jane Malalane <jane.malalane@citrix.com>
Cc: Wei Liu <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>,
 Juergen Gross <jgross@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Christian Lindig <christian.lindig@citrix.com>, David Scott
 <dave@recoil.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <20220302150056.14381-1-jane.malalane@citrix.com>
 <20220302150056.14381-3-jane.malalane@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220302150056.14381-3-jane.malalane@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: FR3P281CA0081.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:1f::11) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 503b4a64-fcd4-499b-f2e5-08d9fd0d5c18
X-MS-TrafficTypeDiagnostic: AM5PR0401MB2643:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<AM5PR0401MB2643DC31207210DBEA6AC8D3B3049@AM5PR0401MB2643.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(83380400001)(31686004)(5660300002)(2906002)(7416002)(36756003)(2616005)(54906003)(26005)(53546011)(186003)(6506007)(6512007)(8936002)(66556008)(66476007)(316002)(38100700002)(86362001)(31696002)(508600001)(6486002)(66946007)(8676002)(4326008)(6916009)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?aVFzRWhLd05TMG1ENzJOZFZxejhkOWhQNm1LUjZua0lLQjZXbWVxd0x2bG80?=
 =?utf-8?B?UXNoK2cweTQrV09wYzZHMisybkh1SlZTSHJHc2ljcXpKKzh1b2UxMWJUb3Zi?=
 =?utf-8?B?QmFUSnVkUTVTNjU2V0xPeTl1U01URkNQUndPNlQwSXZ5ZDhCUklqQy9XdmRU?=
 =?utf-8?B?UHVtTmNrOW5ic3dGTlVWS2RNaVI0SVd6bFFiRHFKemJabHpJNWIrQmpPOEFl?=
 =?utf-8?B?TnlzSlBsV1V2cURqQVJXMUNESUhGVWw2UGhPci9wVjluN3NycWZIdVdqZnl2?=
 =?utf-8?B?R2VLekhxNzNMcTVYMG9zUWtvZWJwVFV5UTd3TjNzaytKNVl0Tm4xOW1VTmxz?=
 =?utf-8?B?bzNFZEtvYjVudjQ3UDNBWmp3OW9QZ2RwaFQ3Z29EK2FWZ2pzczg1L05yUDRi?=
 =?utf-8?B?WFBrYkxkcjBwM2I3OEtyZU9vaUpMbDdUVmFnM3hsd2FjUm8vZmtLWmtlWEVu?=
 =?utf-8?B?WDZ3NmpwdVh2RzBUNkJHMEZwQ2lieElrTElSWmliUmJRRUZ0THpMZmh2cFk2?=
 =?utf-8?B?c0tkK3dzTGpJTG5WVk9HeENMbUJ1QWliTk91Ui85R3VOZlhGOUpKVXZMVVJL?=
 =?utf-8?B?eFFMTXB5c0tiWk42b3BKT2s1OXlQQjlKQmp6aE9FZlRQUzFObE0zUlhNUmtw?=
 =?utf-8?B?TEVxNk5UL1lneUxoV3ZZY0UxOHZOSnJncWhpamhrZWMzWHJKS2JueXFwenlC?=
 =?utf-8?B?RlZXcndmdDJqZUdxMnRmYTIvMlJUYjNFcjFNdW1ESUVrNkVsTS96VmZVSGFj?=
 =?utf-8?B?TlNkQlZZZ1FZZS9vOEJXQVY3R1Bpa2NvSS9INGlxZ2JncGZzeDBHS1NBMHhx?=
 =?utf-8?B?TzhIeU9SdWw0SkEybTNqVFlRNTVEaUkvcWN0SU5XTkFCL1M5a0Q4dEdyemVM?=
 =?utf-8?B?ZTllL3JBbEpsOWQ3NFQ5LytXcjY2aTh3Sk94aTdNZG9LZ2ZuR3hFUW1tTWY1?=
 =?utf-8?B?WlpjSlpjMWtFcTJDMVRoZUU5UW9jaHFlbXI3YTdhVEpPZUllWXVGdkFzNzgy?=
 =?utf-8?B?ZXJSSGxnOVFyUkRQdFk2VlRiY09XS0ZVVysybkhRWjFabnI1SVV4RzZXam5D?=
 =?utf-8?B?bytVUlA5ams3am9VUElkY3g3bUlDVzkvQlRQZ0lhR3hjSTNPZVloU1Z5ZXh0?=
 =?utf-8?B?VHBIQk0rdVNoQ3FsckFRVmovYjNSNUlrZVA4VVVpelA1MnlpZVpHemw3bldz?=
 =?utf-8?B?UXBxODdiekZOQW5GUEFDYnd6WDdEZjEwNmhMcExnYVZONml0UXYrRWJML2dj?=
 =?utf-8?B?MmhjNGxWS0d0SDZHY21yR0Uxak1mQU9jYjJJWXN3eENDR0hwZEZwYVRCcjFh?=
 =?utf-8?B?SFdXZ1N1SUF4UFFjRzZEUWt4a013S3lqK0ZjU1ZVNi9nejVuZlpPTE45cHg0?=
 =?utf-8?B?eTU3YXhRYVNSNEVYSVZ6MkNJWExrZTM0QjBjZm9SalNZMGIrSC8xK3pWSG0w?=
 =?utf-8?B?UjNZWHVLNklTRWpoOVFQT3Bwb1FPU3ZkNUprSXI2OTJkTzZzSUNZU0pXWExF?=
 =?utf-8?B?SmtFSzJQU0kyZ2hwMDhrMXlwekhkNEx6TEtEYTBUSm05VWU3ek9uSS9KSHpy?=
 =?utf-8?B?aGJhYjZtVWFYODlrWDZrdGV6QmdEN0VWVGZUTjVlZHhIOERRTDY0ZzJ5RmNh?=
 =?utf-8?B?KzBBTE1DbUVZWVh1V2J3UVhXUFJQRWViMDZQYk9KOTlpYlBaUkJRMkF3d2k1?=
 =?utf-8?B?dWpFR1hpTG8wQWVINXo2enB0UGRaVEVGbkNTOStycHZKdU1IUDN3a0tjTzRF?=
 =?utf-8?B?Mk5NdWdwcVNDaVNzUDRxZ0hJUkNhL0dZbzhVRGVWdlhsZkd5REQ2YklTUEds?=
 =?utf-8?B?MVlzdmlVZ3orT2pMZ2JvRHIraDRLZ1hIK3pQYzJmbkhqSkNLK3J5UmFzSTY3?=
 =?utf-8?B?YXFoRm5UOWwyRDJXamNVeWFUWXFQL1BuUE0xT3pSbi9ZOVN3aElDd0tJTkxo?=
 =?utf-8?B?ckNILzJVYk9CWS9wU1hGZXBhTmxlZ0xscGFQdWM2WmM5WnNzSlBpV09ram1x?=
 =?utf-8?B?dTlEZnV1VWtYOTNaTjdRSGJac0hHSitsaU8rZ3REZnpCdkxQU2s2LzZSUVhP?=
 =?utf-8?B?cUZOeFhNVVFROFNBcGY4ZjF6ZWxaT1MxOHhsa2d2TnMyZ3pvb0dUNllZVlBy?=
 =?utf-8?B?TTZHUUE4QWVnZE5aaGRVb015RG9wNzkyNmFNQnZsUnEzQTBRR0hUZHRFOHM1?=
 =?utf-8?Q?jBIPdt/XVgXeQ5KRWj+RtPc=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 503b4a64-fcd4-499b-f2e5-08d9fd0d5c18
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 12:00:07.2270
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 4A3n4tScMN0K1RERxRBygpL/ULtw5adHiCkvK0L8nIs3AJ8UhUW259Tklt2kuqrRfvA4VorUlREbEkDqReELWA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0401MB2643

On 02.03.2022 16:00, Jane Malalane wrote:
> --- a/xen/arch/x86/hvm/vmx/vmx.c
> +++ b/xen/arch/x86/hvm/vmx/vmx.c
> @@ -3344,16 +3344,11 @@ static void vmx_install_vlapic_mapping(struct vcpu *v)
>  
>  void vmx_vlapic_msr_changed(struct vcpu *v)
>  {
> -    int virtualize_x2apic_mode;
>      struct vlapic *vlapic = vcpu_vlapic(v);
>      unsigned int msr;
>  
> -    virtualize_x2apic_mode = ( (cpu_has_vmx_apic_reg_virt ||
> -                                cpu_has_vmx_virtual_intr_delivery) &&
> -                               cpu_has_vmx_virtualize_x2apic_mode );
> -
> -    if ( !cpu_has_vmx_virtualize_apic_accesses &&
> -         !virtualize_x2apic_mode )
> +    if ( !has_assisted_xapic(v->domain) &&
> +         !has_assisted_x2apic(v->domain) )
>          return;

This is not an equivalent replacement: The earlier condition was not the
AND of all three sub-features. This is the reason for ...

> @@ -3363,28 +3358,24 @@ void vmx_vlapic_msr_changed(struct vcpu *v)
>      if ( !vlapic_hw_disabled(vlapic) &&
>           (vlapic_base_address(vlapic) == APIC_DEFAULT_PHYS_BASE) )
>      {
> -        if ( virtualize_x2apic_mode && vlapic_x2apic_mode(vlapic) )
> +        if ( has_assisted_x2apic(v->domain) && vlapic_x2apic_mode(vlapic) )
>          {
>              v->arch.hvm.vmx.secondary_exec_control |=
>                  SECONDARY_EXEC_VIRTUALIZE_X2APIC_MODE;
> -            if ( cpu_has_vmx_apic_reg_virt )
> -            {
> -                for ( msr = MSR_X2APIC_FIRST;
> -                      msr <= MSR_X2APIC_FIRST + 0xff; msr++ )
> -                    vmx_clear_msr_intercept(v, msr, VMX_MSR_R);
>  
> -                vmx_set_msr_intercept(v, MSR_X2APIC_PPR, VMX_MSR_R);
> -                vmx_set_msr_intercept(v, MSR_X2APIC_TMICT, VMX_MSR_R);
> -                vmx_set_msr_intercept(v, MSR_X2APIC_TMCCT, VMX_MSR_R);
> -            }
> -            if ( cpu_has_vmx_virtual_intr_delivery )
> -            {
> -                vmx_clear_msr_intercept(v, MSR_X2APIC_TPR, VMX_MSR_W);
> -                vmx_clear_msr_intercept(v, MSR_X2APIC_EOI, VMX_MSR_W);
> -                vmx_clear_msr_intercept(v, MSR_X2APIC_SELF, VMX_MSR_W);
> -            }
> +            for ( msr = MSR_X2APIC_FIRST;
> +                  msr <= MSR_X2APIC_FIRST + 0xff; msr++ )
> +                vmx_clear_msr_intercept(v, msr, VMX_MSR_R);
> +
> +            vmx_set_msr_intercept(v, MSR_X2APIC_PPR, VMX_MSR_R);
> +            vmx_set_msr_intercept(v, MSR_X2APIC_TMICT, VMX_MSR_R);
> +            vmx_set_msr_intercept(v, MSR_X2APIC_TMCCT, VMX_MSR_R);
> +
> +            vmx_clear_msr_intercept(v, MSR_X2APIC_TPR, VMX_MSR_W);
> +            vmx_clear_msr_intercept(v, MSR_X2APIC_EOI, VMX_MSR_W);
> +            vmx_clear_msr_intercept(v, MSR_X2APIC_SELF, VMX_MSR_W);
>          }

... you wanting to make these adjustments, but at the same time it means
with certain feature combinations we would now intercept all x2APIC MSR
accesses when some don't need intercepting, which may slow things down
for guests.

Just to be clear - the main part of the discussion imo continues to be
needed on patch 1, to sort what dependencies on features we want where.
One that's clear, what's wanted here should be mostly straightforward.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 12:03:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 12:03:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283260.482226 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPkBR-0005Qe-MU; Thu, 03 Mar 2022 12:03:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283260.482226; Thu, 03 Mar 2022 12:03:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPkBR-0005QX-Io; Thu, 03 Mar 2022 12:03:49 +0000
Received: by outflank-mailman (input) for mailman id 283260;
 Thu, 03 Mar 2022 12:03:47 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPkBP-0005QO-F0
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 12:03:47 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id fa87021d-9ae9-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 13:03:46 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2104.outbound.protection.outlook.com [104.47.17.104]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-12-yszJ_8DxMVeGTkue4jdZMw-1; Thu, 03 Mar 2022 13:03:45 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM5PR0401MB2643.eurprd04.prod.outlook.com (2603:10a6:203:34::11)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Thu, 3 Mar
 2022 12:03:43 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 12:03:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fa87021d-9ae9-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646309026;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=f5c8wifocakWfoeiBYAtyleYLFOSYBjoeqa0zzoIY3k=;
	b=ePn50OvvmZBpTN/FSOFOjM6MySpNych72aF+HMaIR4qZCcLcFdQfF3ZTbYAMckm6k0/NGV
	x2OfLBXqswDrvZ9N1LV1HNLELwviYAFW0jW2UlE3S5YMFK2PCsQuFAjSIka7qFx3QBbS7/
	PNG3/snb7qHBI4+WBglvRFlGosQ4Zxs=
X-MC-Unique: yszJ_8DxMVeGTkue4jdZMw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=kdniJOAQa7kRTej4QRfoBGD+XtOLpx0CfRWoc7nWpdyeSOswbpJLc+frjZmrI1iCwn7yyLEV4oIp2mP74sQDaxVTb/obCmFXuqPAHlnXlcO9+TVE8VgQxml0aKUhEN2qpdSlsfpusaykedc+8Q7M4v5a2bnYhzSuHb23eWtCLNEOmSO/YGCZ/dmgAnfxMfpi+tRCYZVYMDNIEpjAPNgP+wLzSEohQJTCYyQx+C1u05JhinTQuNGHFZu8i8Oxxid1E4Jos43ZPvh9WC5eq5fEskdmpO2oM6G4COY8HYyE2B3Ak2/g00nJvr3vNDtZGB9rDLrqZvg9HKFzr9OiUGCRQA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=f5c8wifocakWfoeiBYAtyleYLFOSYBjoeqa0zzoIY3k=;
 b=IJoiUJl0o2N7rN4/jTzmvIZakSUy/lLibPyzW9uicy1M8eYXI2P/FA00OjqWi9MquSx2dOyO9f5d9me8H0zol3/1j0opqFS8ZZTJ7OZ0eG9BAW2XQvYflsKBOPz3xS5hm2uEZKlDklRNeUdvCfa7eBvEf1fGUFs5geLn9vSiADGAFt0sG3TuCt0FYhcK6RIuzGoFLrlD2s4z7HajFjG4OXIKmB7acZLZAfX13HqDm2eFVc6BTev7fVm8RRzo46XWuAukEUWRdY+qUxzEisBp3aCAVYa1LSyxRAkHbzlTunnEIQSCB0Z/r74U0pRrK7D3Uwr5vXJW38B84lIXUHDFgw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <9d57dc89-779b-aa91-519d-3e4cfc05ef94@suse.com>
Date: Thu, 3 Mar 2022 13:03:42 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] x86/tboot: adjust Kconfig default
Content-Language: en-US
To: "Daniel P. Smith" <dpsmith@apertussolutions.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 =?UTF-8?Q?Mateusz_M=c3=b3wka?= <mateusz.mowka@intel.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Lukasz Hawrylko <lukasz@hawrylko.pl>
References: <fae0a082-8b39-9bd1-0ed3-35a660d704e8@suse.com>
 <18472660-3438-5c77-05c6-148b97bf4725@apertussolutions.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <18472660-3438-5c77-05c6-148b97bf4725@apertussolutions.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM5P194CA0013.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:203:8f::23) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0d526078-55e9-4739-8cdb-08d9fd0ddd24
X-MS-TrafficTypeDiagnostic: AM5PR0401MB2643:EE_
X-Microsoft-Antispam-PRVS:
	<AM5PR0401MB2643B277B41C62CE98382542B3049@AM5PR0401MB2643.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(83380400001)(31686004)(5660300002)(2906002)(36756003)(2616005)(54906003)(26005)(53546011)(186003)(6506007)(6512007)(8936002)(66556008)(66476007)(316002)(38100700002)(86362001)(31696002)(508600001)(6486002)(66946007)(8676002)(4326008)(6916009)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?RDJtdXBpRzRiVFlLTlFBRWN0eGNWWnNjUHdHYkJ1N0E5WDdTUlZDYmxlNk90?=
 =?utf-8?B?OHd5c2hRMWdBSFp5OXZ0UjVDZWNubVVqdGlXWTNWSWpmUWZIeklsT0t6Y1JO?=
 =?utf-8?B?ZHBUdFVTdEU3MTBlbmpsdmdmYldxS2tncHh6dEhjZFI0YVhuODcrYmdUTlpt?=
 =?utf-8?B?ZlhYenhFQnNOQTJPSldCL3JMNU16TnlLNFlrKzNxZE1NRXZ4OFlYUmMrZ1p4?=
 =?utf-8?B?MWx6UHRwNHNTb1Q4TzRNM2QwaHFDSFl0UWhURTMxOVpNcldkczRyRWxHZDVE?=
 =?utf-8?B?RW1xSDhuUHBQK25Yd0tkbW9BUWNGemVaemVUb1JiL0QvTFR1Q2pJa25UUzM3?=
 =?utf-8?B?QW9meFBYK0NFSTV5by9jMG1EVVhwVmtkMDJ1M0RFZE5WM3JzSk5sUGk1d1Iz?=
 =?utf-8?B?QzlucWVsRkhpUHVWNWtNZGpxVzRaNUdhY0dhTlhFb1k2QVJxMTlsTkpReERj?=
 =?utf-8?B?MkFabzBwY0VXOS9xOFFEMGQzOHJLbjI4bUNQSmNoakNuNFRSUHNtVXV5ZkFB?=
 =?utf-8?B?R1VYd3VVNDVUZlpoeHBrOGVJRWErOWJQaDlNSnRGRUVQYVAycENYSjVqOE4z?=
 =?utf-8?B?Wjh3R3VYVHlOMVhSMDZvc0lLOS9NZTFlSDVBSnZzc0Judm1qcVNJU2Y1MG80?=
 =?utf-8?B?MExGWHM1V0RMdkN3S1dJd3NUT2hmVlZpL3Q5aUJEOVBtWG5wOXNCZ0J1NGlF?=
 =?utf-8?B?VStSMnQrT0dXRTVjY0kxSnZnb2NHVm5wampqV3VOam9ycUtid2ZNUE1Lbmxy?=
 =?utf-8?B?QnhUdk5jeGV1QXMyVXdzWjlxMnNpVVhldWZUMzJmb3ZKSzBQdTJWTm1wdG1K?=
 =?utf-8?B?VFJCTXAwdW9nSkE2NC8rSTVBZnRwU3A3Y2x5Zjl3d1pEQ1o4TjJQMDVMRFBK?=
 =?utf-8?B?T041T3d0VmJUTTY2dkxLSjdXczA0bFl2VlRGSDVtbldnaDZCVXhIN0FQbWNK?=
 =?utf-8?B?SWZUaTFnc1VoTXZoU2U1MjNaZ3RIVFVvaGtxNW1GcjNsU0ZXZTI1UjZ2SUpX?=
 =?utf-8?B?OWF2dktnSkxicmtyMFh6eG9HZG1QUWVQY0lxM2NqU0VocmN0UVZ5Q1U2TUdL?=
 =?utf-8?B?VmphWDBobTdIeUVYbzk1M3BoYWYzMnp4eWJnOWV4RVlTYmV3UmJVbE53ZkNt?=
 =?utf-8?B?aVhhUmJTNHcwMW56djJhdGhBQjFiMi9ySjdrN3JWQTE5N2dQd01leVg2aGlt?=
 =?utf-8?B?alBoWkRPb3NZTk5UQXg1MGk1L3FRUHpHb2hiZWN6NkhZODNvTnJmYUJ6enVx?=
 =?utf-8?B?eVoyWEdWTjhvTmFkczlIa3N0YS9hRDJtODBWM1JrTmpjUnAwTnJMREVlcmN4?=
 =?utf-8?B?SzQwTTZ4clkxTzNtb0hLS2VGUGMrT2FaUzAyNGsxcHpjSnZITk1qN2tVNjZU?=
 =?utf-8?B?U2NoeGF1WlRVaTkzRSs3VGNzQTdsTitpQ2dHcTNGSXY4SlVoM05ZUGlwZTQz?=
 =?utf-8?B?MGdZb3dsQ05PYVNpUVZpTUFDV0hlWUlNWkN3SmErUjhDemlsY1FaWEwweGta?=
 =?utf-8?B?VzVueTRaMVJDM05pRGVjK0xUc3ZUTFg2WHhGM2lYK2xGa0pmYVFYMmdIdUFp?=
 =?utf-8?B?STV1ai80VXpxUExVMS83U0ZJTkNWcUl6QWZkVWRrRWJzSjF0Zks4dWNJS0gw?=
 =?utf-8?B?WWE4WlpPb1hHNm13L0EwSHJIZ1VSQzZUbnhqcjZmMjF5MjltNW43UGxVK2VT?=
 =?utf-8?B?TUszVzFTd3U3UlpTclg0SFRoRmNINzhyaGkrUWtVR1VlaUFRUlVlM2FrdEUw?=
 =?utf-8?B?M2NuYmRwbWxxdEErTmxGd1YrbWZCWmYrODdWUTZZOXpoVytoeDc3aXlZZ0Ex?=
 =?utf-8?B?T3Q5V21ra1dXY1lMRE9URWNyZVpRWlVwQXFZbVlmSUhkMkNRYkdiam1ieWNm?=
 =?utf-8?B?MlE2NTBmckhOMldSZ051VTg4V1RHSFl5elZ5QzFRd01ocVJzZkFLU3JXTFdX?=
 =?utf-8?B?ZnRKd1hmZi8yTDEvdVF2bnlVU2Y0Zk9RT2FWRGtvWUREWFE4aktQOGpRTDF0?=
 =?utf-8?B?UWlVaEJZMDNvdXVBb2NNK0dRY3hvZnExaXZYZWhjSnpGRi9qVFo5S2ljSm5R?=
 =?utf-8?B?dS9JZzEzam44cUJ1VmNBRlRxWGdiNDRoZ2RLS3pQS1NRMlJmeDVTTU4yY1NP?=
 =?utf-8?B?VTlmZGFReVdQMjhRaGlWbmNTTGZTbG5tOUUycVZMSGZpL2tnV2lCWENoMnJI?=
 =?utf-8?Q?eZmil6DyEw9cBX6oxvNbzk4=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0d526078-55e9-4739-8cdb-08d9fd0ddd24
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 12:03:43.7604
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: kgZ/L9hvPTjgMphM0aI1L716PlD7Oq8yzYARKs+YOaghzUM56LrNXkOgNeY20gOi5clfvJ6Hv52GnGs4qQa2WQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0401MB2643

On 03.03.2022 12:50, Daniel P. Smith wrote:
> On 3/3/22 04:49, Jan Beulich wrote:
>> We shouldn't include unsupported code by default, with not even a means
>> for its building to be disabled. Convert the dependency from merely
>> affecting the prompt's visibility to a real one.
>>
>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>> ---
>> We could of course go further and make the default also account for
>> DEBUG, as is done elsewhere.
> 
> As in you would like to adjust the default based on whether DEBUG is on 
> or not? I guess my question is what motivation is there to adjust this 
> selection if DEBUG is enabled or disabled?

This is to have functionality enabled unless overridden in debug builds.

>> --- a/xen/arch/x86/Kconfig
>> +++ b/xen/arch/x86/Kconfig
>> @@ -193,14 +193,15 @@ config HVM_FEP
>>   	  If unsure, say N.
>>   
>>   config TBOOT
>> -	bool "Xen tboot support (UNSUPPORTED)" if UNSUPPORTED
>> -	default y if !PV_SHIM_EXCLUSIVE
>> +	bool "Xen tboot support (UNSUPPORTED)"
>> +	depends on UNSUPPORTED
>> +	default !PV_SHIM_EXCLUSIVE
>>   	select CRYPTO
>>   	---help---
>>   	  Allows support for Trusted Boot using the Intel(R) Trusted Execution
>>   	  Technology (TXT)
>>   
>> -	  If unsure, say Y.
>> +	  If unsure, stay with the default.
>>   
>>   choice
>>   	prompt "Alignment of Xen image"
>>
> 
> Outside of the debug question, I think the proposed change is good.
> 
> Reviewed-by: Daniel P. Smith <dpsmith@apertussolutions.cm>

Thanks. I guess there's an 'o' missing though in the email address?

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 12:17:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 12:17:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283270.482237 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPkOM-0007Do-Sk; Thu, 03 Mar 2022 12:17:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283270.482237; Thu, 03 Mar 2022 12:17:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPkOM-0007Dh-Og; Thu, 03 Mar 2022 12:17:10 +0000
Received: by outflank-mailman (input) for mailman id 283270;
 Thu, 03 Mar 2022 12:17:09 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPkOL-0007Db-DN
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 12:17:09 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d836becf-9aeb-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 13:17:08 +0100 (CET)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur01lp2055.outbound.protection.outlook.com [104.47.0.55]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-41-C0RjDyelMfGtV8M5CPIGOw-1; Thu, 03 Mar 2022 13:17:06 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AS8PR04MB9173.eurprd04.prod.outlook.com (2603:10a6:20b:448::8)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Thu, 3 Mar
 2022 12:17:05 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 12:17:05 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d836becf-9aeb-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646309827;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=rhUtLO+jIi6lI8Jwu27yMwgfMw9xisbltg5nPG0t2Tk=;
	b=Vxdj0mNDglw08pTBnLadsZLWGuyKmKYAB8MpvUt9g6deem5Egubm/W505GAJ3JYCH3HUSq
	B69eFMs24cZ0hsO33lb2VaBxbXpIWfQqClQOlAUsLUO4KHwS3z4jZNZ9jUu6FLz2FKLk2A
	6n7ZejurLsqI7ZvHFMWNY0I5DVqfb2o=
X-MC-Unique: C0RjDyelMfGtV8M5CPIGOw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=oU6TQ+nx/8O6fpykyW5V7DnBG+0CW//1pQBzsY/WGRvZnLVww4bN14IMBEps2Sof7HvpBsNF2fqjelZtSupJtaaCHWOro6PqFX7mwBrAvYqzgOsCk7GN6pnB8IHpfJP65tBjQCjStesonna+TcxeJ3rYREBwxDbQOcREZK2oV+Dy7zMPCdBf0fG2Wo3/6A0ubbyTizC1qqGh/YTkAxKLPH1A26IbTxw2iVX0+QoYmXy63SnXyZ3Q5NoUo3FJ+h6IDDwIhEQqTRlUd27OrxxdgQbJW3UOA/1kZ2NoGDs+HQTExwUC/r8YCkyKb48P/l+vFn+zF4VaA0yaTE/ew0D1Sg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Kpg+qEs2SiQQjLZCKkeTIbGZhyLgcWeiXXihgTuA21U=;
 b=Us14XNq2ym5ct19F7Jj+Z/0Ra2ANhLuV0ds87CLvwPUB5UDOoaSvjQhAwbk/TLWxg6YqVASOg4LRjSpUqefrImGYxJPXlgsalc0LY2bLT4K41V+sA20jFdNu3BGvb6DyZWVOR4rvVDDCmJmJ38oDyyPNsfpO0OUVau0BmI2xhat+r5mLVjBTAKJ1PFRmO6GzH0qrjA0ciz4wzpYr7ADIB+xvZg6v+LcAQAT2BdwADgy3+Nm52Gsaq4D5DYEYzJzZFIl95m+PJlr91uAdazeres1RLjahzrfLsu9HIFj2HTGZaHemJHWSv3wz87N9RKz7JbKtq2YPPLO58CUVCBnpgQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <3c335ca5-63e3-6389-cba5-b9047a4ce3b9@suse.com>
Date: Thu, 3 Mar 2022 13:17:03 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] x86/build: use --orphan-handling linker option if
 available
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
References: <5c374fd3-017d-3c40-4ded-25a3b1c978a6@suse.com>
 <YiCkUebvg0gaBm4/@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YiCkUebvg0gaBm4/@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR0301CA0038.eurprd03.prod.outlook.com
 (2603:10a6:20b:469::9) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 80f580d5-1d85-4281-4c4e-08d9fd0fbac0
X-MS-TrafficTypeDiagnostic: AS8PR04MB9173:EE_
X-Microsoft-Antispam-PRVS:
	<AS8PR04MB9173021296FA1266686CDA7AB3049@AS8PR04MB9173.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	8ZqSxGvJUqcP4aHsWS/5/hvh443ZUY6NiG1BXKAHHu5DY49WvcBhKLmAhbzg43Pk+lPch1lzJTKZfSXihJJSS9Kng2tTNbsv9bvy3v7pkxezKmtzZCeDp7RS2aSvKI5eww1gfHibQBhj23Rm8vhikSKxEnvzxdIQK4XxqTKOW4dWkvo7xAfl58REfPX5VwrsZkJB7qV37c+yE0apjhTDaooturQakPu+raKFC2439s2l+cDDVScS1MruHkhQ+kIiiCIVvLNf1NvZEdhNx5eOwfEdjAEGppep2tZhqDPorD4FEE68Df3mGA7o7innNfq8XO4Fu3c0BQ7NNq8KWofZok4SW1mWXb+r+y3+nteOIuPOiuJ7HB+jz6EoF4w5XzfyM3/5BilsyFKG80PpZvd1BaUByWlZ7gl8l4I4i04eIIvdig0eixtCIKfKVG/18AoeIJ75Tnr3QEiXM764P8MZPrg81MFceWHl6z1pIiKRT6F5fOMH1IfPYethabv8pAa2/7lTXVycPMBv/LnzL3+IjFTdvAgoUhQgYrwrV7s4FLm17yGli2A0L0ki6tN90DjSr7FdGn+shOy+Jrxv/0Ku2OSB+wEGYXm4LY188caK3qTkXnu9qxhnMX1FhACQP/mFsl4sz1iQb9Iw7oCgExt5r3qjsNBhpXmrX0982PqPtvZBUanDTJo77aKpTS3LHhSe4vsv8XmKXyIGjthRFfrsFtmoa4Sio39s7GH+zfTxKfgNFwUKGGCN7Xti6pRs+cx/xCbs4twUlbQXT76QrTh+g1t1gkhwGQ4mcoPniSf1qPXMBPjeucqnUlqoeGWDghHe
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(508600001)(6486002)(966005)(54906003)(316002)(6506007)(31696002)(86362001)(6916009)(83380400001)(6512007)(186003)(2616005)(53546011)(2906002)(31686004)(5660300002)(36756003)(8936002)(38100700002)(66556008)(66476007)(66946007)(4326008)(8676002)(26005)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?E6aEu5qln5+Jnotq4Ng0WTIwzdhRWHz2OVp8C2YhqZpaV3TyZELp84X3llA1?=
 =?us-ascii?Q?9X2ctrg/PYQUowg9JtUAXs3BMhG5D1yvugoCuuqrWJG6SQk38StPBAKA1WY6?=
 =?us-ascii?Q?y9dRPFo0PnIANU9b6Xj2cbWpl5TAM4765T+Af9/1JgllvpM+WDhvcnKudLfw?=
 =?us-ascii?Q?S6rsPsEANjzQ15ajxU60e8ahBXn+w3ewV2+iLLygOZb7gY4T0vog4HW7Pl87?=
 =?us-ascii?Q?B7qb5Ive+s7GiExvrP0aPafTYcziSz+te/9kodDUC5NXlX71J36SLTAOtLyr?=
 =?us-ascii?Q?3lc2Q1aGV5rpySd7PhoNPRd/NI4lOZAKft+5O76bIJuqQEd3u7C6lL6LbyxK?=
 =?us-ascii?Q?pKYbYZ3bF6gfSxe6MOr+/bjEA0GMpvQdLaeZicuOrL7xU1E/5jvTrZAs7TD5?=
 =?us-ascii?Q?6ay4ai74ASnqLXjs2ue1KwFIGw6mwMGtbh5jql7vXjtKYPxGKE8o0FUcI7Mh?=
 =?us-ascii?Q?8xTPHR8FyKHPLOzZ3BpLBaxPF5s34vqSxVBq9kw81oFVbLKlm8cnPZkDSpvv?=
 =?us-ascii?Q?0WMSTnYFkGtxnrglgBmcOxevJGmaEN28fMlpyOozud9+mBEffzsABvtgsUsZ?=
 =?us-ascii?Q?xJP/xIGQg8vIUPyg7Qa/VdiYOYC6Vebqe7PHtHYWZAVY6AxTti3ikl9NwetJ?=
 =?us-ascii?Q?mqnqnU7/qvG0qw9VrMuJ/AOJvXgkg84QB34zga/+V5TGOFZcIqgT94WYy2fv?=
 =?us-ascii?Q?CUvUUkHLpfZSGVYn+YEVNvNK/12KGzvBsIOWSgyh50aWVBOOzhwVEi7xzdbY?=
 =?us-ascii?Q?YfFSsebi+pZOI41kKsLYe7jp9rS+Rqp4c2oz9AcQuPcpcgsOSHkUnGI3EhBw?=
 =?us-ascii?Q?jKbzekUErbK+wZeuZhc4A9WnRXUN2rBvaUAgKCPRLWPa1Fhsp3dBwgRTOK7d?=
 =?us-ascii?Q?GX3mHIVlF0icWqOYvwxf+T+UunQxSqsB3Kx93qbmIezkUVxflNWO9UbEHZqw?=
 =?us-ascii?Q?FDScYi1MDjDqDllnDzwm9GYoBdtulQoCDWL2Nty79Ok0pZhdLDyy+pGLU7hm?=
 =?us-ascii?Q?DTY4whw4KqB1sM6YVzP4ZSLiH+cemUPdion4mNegUSaODX1Mn3XeG9Ej8Ubv?=
 =?us-ascii?Q?iqRd2+Qg0w3sD3M9dWz8PC1Bx2VkEUOBseKhykNIJRlYNpI14b2rscLev65j?=
 =?us-ascii?Q?z3pDaI78L+euk8a7Oe+Zx7hBuZWk4VVsiYGUbn/NwAEesRvC6iq/LFUAT/H0?=
 =?us-ascii?Q?HYC8KwhYWxud1BsDLb/CS8ccX6cewcr6zJL5ZAyAtix67VPnX2Y0bxs+z1Nj?=
 =?us-ascii?Q?b9N3+xHF7IQxej0Le1Gljt+YEBft1PXrGx3FEt/H5kjpxBBCz2UzGreDloUB?=
 =?us-ascii?Q?QoOvZQQwREKzsuQY3PB2I1LcY5tAhBAvHUcvTNHtBV7crjwy2x6+U5Cpn1F8?=
 =?us-ascii?Q?Q9hGZfAlJ+8biDjfRY5n/sdhZCnRWfEGgyjtz21PB/SP9oIjlZKzlUeswBn0?=
 =?us-ascii?Q?ksxMSo1yWcyAq6BDKSuvml0qbxjNhXoJUsFHyzPPsJ9YsMD2K49V6LWw5X3n?=
 =?us-ascii?Q?s1mCTfXkomauo7FzVsOM71nnBoHXZ1RNzHfGysHPcjz6io75xqKgcucBzXDk?=
 =?us-ascii?Q?8Anx0bz4TdhBzQgG7Q35emiE8G6xbmHi0ktHeGg8QEu4fZTeNIqM+bnBGTMR?=
 =?us-ascii?Q?uPSFcOeDOE7nU78p06evsHo=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 80f580d5-1d85-4281-4c4e-08d9fd0fbac0
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 12:17:05.0387
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 8AFex/jY/2/Xl/06ZGuO+5zTPpL0DX6Iqv3H5PORk37ta7mPb3YvqxzDxCPqzY+1YTsFwxeNbV14WeC4/L5ctw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR04MB9173

On 03.03.2022 12:19, Roger Pau Monn=C3=A9 wrote:
> On Wed, Mar 02, 2022 at 03:19:35PM +0100, Jan Beulich wrote:
>> As was e.g. making necessary 4b7fd8153ddf ("x86: fold sections in final
>> binaries"), arbitrary sections appearing without our linker script
>> placing them explicitly can be a problem. Have the linker make us aware
>> of such sections, so we would know that the script needs adjusting.
>>
>> To deal with the resulting warnings:
>> - Retain .note.* explicitly for ELF, and discard all of them (except the
>>   earlier consumed .note.gnu.build-id) for PE/COFF.
>> - Have explicit statements for .got, .plt, and alike and add assertions
>>   that they're empty. No output sections will be created for these as
>>   long as they remain empty (or else the assertions would cause early
>>   failure anyway).
>> - Collect all .rela.* into a single section, with again an assertion
>>   added for the resulting section to be empty.
>> - Extend the enumerating of .debug_* to ELF. Note that for Clang adding
>>   of .debug_macinfo is necessary. Amend this by its Dwarf5 counterpart,
>>   .debug_macro, then as well (albeit more may need adding for full
>>   coverage).
>>
>> Suggested-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>
>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>> ---
>> I would have wanted to make this generic (by putting it in
>> xen/Makefile), but the option cannot be added to LDFLAGS, or else
>> there'll be a flood of warnings with $(LD) -r. (Besides, adding to
>> LDFLAGS would mean use of the option on every linker pass rather than
>> just the last one.)
>>
>> Retaining of .note in xen-syms is under question. Plus if we want to
>> retain all notes, the question is whether they wouldn't better go into
>> .init.rodata. But .note.gnu.build-id shouldn't move there, and when
>> notes are discontiguous all intermediate space will also be assigned to
>> the NOTE segment, thus making the contents useless for tools going just
>> by program headers.
>>
>> Newer Clang may require yet more .debug_* to be added. I've only played
>> with versions 5 and 7 so far.
>>
>> Unless we would finally drop all mentioning of Stabs sections, we may
>> want to extend to there what is done for Dwarf here (allowing the EFI
>> conditional around the section to also go away).
>>
>> See also https://sourceware.org/pipermail/binutils/2022-March/119922.htm=
l.
>=20
> LLD 13.0.0 also warns about:
>=20
> ld: warning: <internal>:(.symtab) is being placed in '.symtab'
> ld: warning: <internal>:(.shstrtab) is being placed in '.shstrtab'
> ld: warning: <internal>:(.strtab) is being placed in '.strtab'
>=20
> So seeing your mail where you mention GNU ld not needing those, I
> think we would need to add them anyway for LLVM ld.

Hmm, that's ugly. How do I recognize LLVM ld? I can't simply use a
pre-processor conditional keying off of __clang__, as that used as the
compiler doesn't mean their ld is also in use (typically the case on
Linux). I also don't want to add these uniformly, for now knowing what
side effects their mentioning might have with GNU ld.

>> --- a/xen/arch/x86/Makefile
>> +++ b/xen/arch/x86/Makefile
>> @@ -120,6 +120,8 @@ syms-warn-dup-y :=3D --warn-dup
>>  syms-warn-dup-$(CONFIG_SUPPRESS_DUPLICATE_SYMBOL_WARNINGS) :=3D
>>  syms-warn-dup-$(CONFIG_ENFORCE_UNIQUE_SYMBOLS) :=3D --error-dup
>> =20
>> +orphan-handling-$(call ld-option,--orphan-handling=3Dwarn) +=3D --orpha=
n-handling=3Dwarn
>=20
> Might be better to place in xen/Kconfig with the CC checks?

Well. I've tried to stay away from complaining if people introduce
new tool chain capability checks in Kconfig. But I'm not going to
add any myself (unless things would become really inconsistent) up
and until we have actually properly discussed the upsides and
downsides of either model. Doing this via email (see the "Kconfig
vs tool chain capabilities" thread started in August 2020) has
proven to not lead anywhere. I'm really hoping that we can finally
sort this in Bukarest.

> I'm also wondering whether we could add the flag here into XEN_LDFLAGS
> and EFI_LDFLAGS, as those options are only used together with the
> linker script in the targets on the Makefile.

Not for XEN_LDFLAGS at least, and undesirable for EFI_LDFLAGS. See
the respective post-commit message remark.

>> --- a/xen/arch/x86/xen.lds.S
>> +++ b/xen/arch/x86/xen.lds.S
>> @@ -12,6 +12,12 @@
>>  #undef __XEN_VIRT_START
>>  #define __XEN_VIRT_START __image_base__
>>  #define DECL_SECTION(x) x :
>> +/*
>> + * Use the NOLOAD directive, despite currently ignored by ld for PE out=
put, in
>=20
> Would you mind adding GNU ld here to avoid confusion?

I've done so, but I'm not sure if implicitly you mean to say that
LLVM ld does honor the directive when linking xen.efi? If that
wasn't the case, it would rather seem misleading to have "GNU"
there. Unless e.g. LLVM ld can't link xen.efi at all ...

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 12:17:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 12:17:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283271.482248 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPkOb-0007Zi-AE; Thu, 03 Mar 2022 12:17:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283271.482248; Thu, 03 Mar 2022 12:17:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPkOb-0007Zb-5N; Thu, 03 Mar 2022 12:17:25 +0000
Received: by outflank-mailman (input) for mailman id 283271;
 Thu, 03 Mar 2022 12:17:24 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=GC2d=TO=apertussolutions.com=dpsmith@srs-se1.protection.inumbo.net>)
 id 1nPkOa-0007Yq-3M
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 12:17:24 +0000
Received: from sender4-of-o51.zoho.com (sender4-of-o51.zoho.com
 [136.143.188.51]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e01e5c4f-9aeb-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 13:17:22 +0100 (CET)
Received: from [10.10.1.173] (static-72-81-132-2.bltmmd.fios.verizon.net
 [72.81.132.2]) by mx.zohomail.com
 with SMTPS id 1646309833547340.5078068577825;
 Thu, 3 Mar 2022 04:17:13 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e01e5c4f-9aeb-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; t=1646309837; cv=none; 
	d=zohomail.com; s=zohoarc; 
	b=nJcynTWmSYZvAsiuxv4Ws2m7NzxTsleHFCtwdsF83dDh9Nfn+yoRH0zEe0L0AKqmu1N7eQ2JtIzTPKTqcK0K+IXWA2m8cOaNVn+iXVpIKkVtShoUtC7GG6eCYKjal0yw3pJtlNqbe5dzdkEfeoTgnBcG/t4bu8I6L7qkjzKq+wI=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; 
	t=1646309837; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; 
	bh=LfVRUPgOzLNuly24GA8zsUgw508K1tcvpB9AUvDWmkU=; 
	b=KDkSrAG5p5mD/JGANnIzE8CsRr6CVGbDoMV9fD0TQ+fcYCqz6WbQEWW0/acC8yAc60MlLVX8MKhH/xQ5AxFYCVen3F1zoEMBG/sGxz8GWaBm0K1Aj6Qh/oTGPCH/2sKtJjTYkMp/po27ESAtcrKAMkxSLL8ct7k2MHekByJPmUg=
ARC-Authentication-Results: i=1; mx.zohomail.com;
	dkim=pass  header.i=apertussolutions.com;
	spf=pass  smtp.mailfrom=dpsmith@apertussolutions.com;
	dmarc=pass header.from=<dpsmith@apertussolutions.com>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1646309837;
	s=zoho; d=apertussolutions.com; i=dpsmith@apertussolutions.com;
	h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From:In-Reply-To:Content-Type:Content-Transfer-Encoding;
	bh=LfVRUPgOzLNuly24GA8zsUgw508K1tcvpB9AUvDWmkU=;
	b=XSvQ2f2a1ExivFZndRLkBqF79iBpufkfP8+5If/J9gGomnAibaq+3PzRc8aN9yzG
	h3mtYH9n2BPJCHEDmgYy/fhscr/cKaWZ8LfWiYTPfBZxxpMNpkjg4W4PFz0T+f6fzXZ
	okFc9yPLYFv/8KzqOLjvjnRnleM8jXhm0HPzR9+s=
Message-ID: <b6a19025-ed0b-1698-b46f-0ff726254e96@apertussolutions.com>
Date: Thu, 3 Mar 2022 07:16:33 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.0
Subject: Re: [PATCH] x86/tboot: adjust Kconfig default
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 =?UTF-8?Q?Mateusz_M=c3=b3wka?= <mateusz.mowka@intel.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Lukasz Hawrylko <lukasz@hawrylko.pl>
References: <fae0a082-8b39-9bd1-0ed3-35a660d704e8@suse.com>
 <18472660-3438-5c77-05c6-148b97bf4725@apertussolutions.com>
 <9d57dc89-779b-aa91-519d-3e4cfc05ef94@suse.com>
From: "Daniel P. Smith" <dpsmith@apertussolutions.com>
In-Reply-To: <9d57dc89-779b-aa91-519d-3e4cfc05ef94@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-ZohoMailClient: External


On 3/3/22 07:03, Jan Beulich wrote:
> On 03.03.2022 12:50, Daniel P. Smith wrote:
>> On 3/3/22 04:49, Jan Beulich wrote:
>>> We shouldn't include unsupported code by default, with not even a means
>>> for its building to be disabled. Convert the dependency from merely
>>> affecting the prompt's visibility to a real one.
>>>
>>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>>> ---
>>> We could of course go further and make the default also account for
>>> DEBUG, as is done elsewhere.
>>
>> As in you would like to adjust the default based on whether DEBUG is on
>> or not? I guess my question is what motivation is there to adjust this
>> selection if DEBUG is enabled or disabled?
> 
> This is to have functionality enabled unless overridden in debug builds.

Maybe I am misunderstanding you. If I am wanting to debug either TXT or 
a configuration with TXT on and I adjust my config to turn on debug, 
then I would have to go turn TXT back on. Is that correct? If that is 
the correct understanding, honestly that concerns me because if that is 
being done for other config options, it would create the situation where 
turning on debug to track down an issue would result in a different 
configuration than the one I was experiencing the issue.

>>> --- a/xen/arch/x86/Kconfig
>>> +++ b/xen/arch/x86/Kconfig
>>> @@ -193,14 +193,15 @@ config HVM_FEP
>>>    	  If unsure, say N.
>>>    
>>>    config TBOOT
>>> -	bool "Xen tboot support (UNSUPPORTED)" if UNSUPPORTED
>>> -	default y if !PV_SHIM_EXCLUSIVE
>>> +	bool "Xen tboot support (UNSUPPORTED)"
>>> +	depends on UNSUPPORTED
>>> +	default !PV_SHIM_EXCLUSIVE
>>>    	select CRYPTO
>>>    	---help---
>>>    	  Allows support for Trusted Boot using the Intel(R) Trusted Execution
>>>    	  Technology (TXT)
>>>    
>>> -	  If unsure, say Y.
>>> +	  If unsure, stay with the default.
>>>    
>>>    choice
>>>    	prompt "Alignment of Xen image"
>>>
>>
>> Outside of the debug question, I think the proposed change is good.
>>
>> Reviewed-by: Daniel P. Smith <dpsmith@apertussolutions.cm>
> 
> Thanks. I guess there's an 'o' missing though in the email address?
Apologies for that, correct I missed the 'o' as I was typing it out.

v/r,
dps


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 12:24:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 12:24:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283286.482259 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPkVA-0000r3-0N; Thu, 03 Mar 2022 12:24:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283286.482259; Thu, 03 Mar 2022 12:24:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPkV9-0000qw-T9; Thu, 03 Mar 2022 12:24:11 +0000
Received: by outflank-mailman (input) for mailman id 283286;
 Thu, 03 Mar 2022 12:24:10 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPkV8-0000qq-FZ
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 12:24:10 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d3525e2f-9aec-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 13:24:09 +0100 (CET)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur01lp2052.outbound.protection.outlook.com [104.47.0.52]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-41-wECz8OxLNNSaZc7Pvfne0Q-1; Thu, 03 Mar 2022 13:24:08 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB7PR04MB5386.eurprd04.prod.outlook.com (2603:10a6:10:81::15) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 12:24:06 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 12:24:05 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d3525e2f-9aec-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646310248;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=YJoEDkTZkuyQsVzjxbobMx52E/VrmcDk4QS4gEuUAvg=;
	b=NnLv5Xnu5xF2di2HX5ZM42Al5P0mrkCQlLGZ0rMclKhxp8k2vRQ3BQXIEIJK8QKQ64QGiE
	+s0VQKVlxHGvQTZ4Rl2+RhPU1rQCqr0+mENpqBXYaOskZ7bO0DySnagSYogR8fvyYPb6u0
	rSdYMBMueBYYLvQ0VjrngbI7iuoPASI=
X-MC-Unique: wECz8OxLNNSaZc7Pvfne0Q-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=fyGeIaGUOvSRcyMQVyFMNJ8Lz+KtuT9IoD4Eh5EihNFlF+dfhzlYG/LZPTd3Zu73iuvQcl3EPGPB6SS9mI1d9SSPPvijL15P9MZgK1A9HioUnZyTK0Cc2pKdRZ8nAabG+78WZGLY46U6P7JrPxmtf4Hus6vOrEOAjIdp7GUojOs8mHlTBgYPcYaI8+NT9GkFnqlySY68V5L9oN9C2PeaL2966BEBTL+VFAnGT/FVZ1HVX5yXs4spVvWgjQmKo94V72A3pNvkFZX7kvvG7SUe1GUf1zqqs3la4zgQatRL3j9m7gsxI1atfzK9TFk26HfXFKggbO9Mgc3wvEh7TTCsFA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=YJoEDkTZkuyQsVzjxbobMx52E/VrmcDk4QS4gEuUAvg=;
 b=hLe5dcoRl959UehKLTzNuKfx/zjN5zZbGCdiaPT5pKpWZ1DmyDJCzTt+0LdvDkFFp/Yd2kaBhFunJUxYw0Nusr1hioNH4ILLXMDagCneBOdYU3M+Y8smWFza9zMP/Uc6jbVIdHUbtBHwek+nATkSF10iVW7/fmBc/vCG1c68wPoouKSH7KxycwK2hjJV+GhGUn0Ux+8gT/xK8MYonoMK4KnYL7dTUZsvx2ifdOJgWg38kYf0sFy+iVydJDlTE7HsM9+Gm2ctudMOQWyJD4uTBKsGg6h04uqerQKVa9exz/zBLD0RhVpA+tE7yJM2vBe5AUv14sKlCV6NWkElRhYpIg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <16546d42-900b-1548-fdff-79ba21716384@suse.com>
Date: Thu, 3 Mar 2022 13:24:03 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] x86/tboot: adjust Kconfig default
Content-Language: en-US
To: "Daniel P. Smith" <dpsmith@apertussolutions.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 =?UTF-8?Q?Mateusz_M=c3=b3wka?= <mateusz.mowka@intel.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Lukasz Hawrylko <lukasz@hawrylko.pl>
References: <fae0a082-8b39-9bd1-0ed3-35a660d704e8@suse.com>
 <18472660-3438-5c77-05c6-148b97bf4725@apertussolutions.com>
 <9d57dc89-779b-aa91-519d-3e4cfc05ef94@suse.com>
 <b6a19025-ed0b-1698-b46f-0ff726254e96@apertussolutions.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <b6a19025-ed0b-1698-b46f-0ff726254e96@apertussolutions.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6PR0502CA0049.eurprd05.prod.outlook.com
 (2603:10a6:20b:56::26) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2b2895d2-9605-4719-b82b-08d9fd10b598
X-MS-TrafficTypeDiagnostic: DB7PR04MB5386:EE_
X-Microsoft-Antispam-PRVS:
	<DB7PR04MB5386A77147C39E6015118CB6B3049@DB7PR04MB5386.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(86362001)(31696002)(6486002)(36756003)(2906002)(83380400001)(31686004)(38100700002)(508600001)(8936002)(54906003)(2616005)(316002)(186003)(26005)(6916009)(5660300002)(4326008)(6506007)(8676002)(6512007)(66946007)(66556008)(66476007)(53546011)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?SitSWFFyYktrV050UWFqQVJOQlFrbzRyT0JZbkZXWFVVY3BjNGNzREdIV3Zj?=
 =?utf-8?B?VnZPQ0hVT083WEFpc20zdFZzbDgydGFPYVRJTEhGQVJlN3c5V2pjdWozYWdo?=
 =?utf-8?B?cE9xNGgrcjdNVkI0SEhhZDRkSnozV280UHZERHFOL1J0TnBCU3dxY3E2KzZ6?=
 =?utf-8?B?MGhodjI2MmI0QXd2c1J5bHpHQmV4MU1DWlNIUTlSb0JwSUF4bzRMdlRhRkdC?=
 =?utf-8?B?azcrRU8vU0luVWZPdlRsQUdzNUhCSDdxb2xvMWZBcTkwMGcyZmpPUE1JZDNY?=
 =?utf-8?B?QWoyWW9PekFMV2JDRWp1WUVnQzVxZDRFWjhRM2x1MkRjTll6VDdveVV0c01O?=
 =?utf-8?B?SjBTY01mckNpU2xRemRCZ0dmdmlzZm9jNjJqSVU4QjI1TmZ3bWtKZkF3RzFv?=
 =?utf-8?B?eEdVZlBiQlAzUks3d29uOHNra2NMOUYxYjkwMkNKV2k4YnR5aUo5OUlJeTg4?=
 =?utf-8?B?TzBMVC9GUVV3L1ZQZUE2NGJ3QUZrQ2d5Q096Z2Uyc2RYeWVUOGlYUDllSUJK?=
 =?utf-8?B?ZWFlS3Zrc2NQRGQvY3FpNFFtUjBjT1pFTmF1T3pKWVBTc2ZZMmNjL2pIYjR5?=
 =?utf-8?B?TWZqSXBzSEZrUk94VGZhcTNzaE1jaUdDNkFNaUJUNWFhdkMzVzVZbnlGS0E4?=
 =?utf-8?B?bUVjU09tcTBTRHY4VCtYVGo3MHRkamwzV3k0YlFIZWg2ZStRbSttL09sekcy?=
 =?utf-8?B?N3RlWVc4M3RyemNhSnZMTFA1dWx3VWx6UlJLKy81OHpZaXRURlh4T3FCTEdy?=
 =?utf-8?B?dDdFSHh5QXBNQ3FZVytKUDJEczFiN3ByMWgzWGFLVDRPOHVacVNJUTBvY2w0?=
 =?utf-8?B?VldOK2Fvdk55eVUwaW5rUWxGNElmVjlrckcxNThYTWlQQ1ROckV0NVdTS3dP?=
 =?utf-8?B?d0lZRUM2OUZxUmFORVlrNExMUGp0V2lnV09HUlhlek95eHdCVkNTbllVenJG?=
 =?utf-8?B?dEJhdmNKdm5QSmhXZFlQUERsNWtibGhJVThIVFJWVDhWUEJkYmF1UzM4MzBt?=
 =?utf-8?B?ZkFCUmUzSGFuZFo4RWdLK0dtRFdmV3A4OEpWYkhUMWkwc293Wk0zQkxKem1K?=
 =?utf-8?B?T1c4bk9oNGNLMWRFcDIxUVNCTW5OMEVGakVTOFpWZUdMWTJaOVRVN2tIanNH?=
 =?utf-8?B?Ync1SXBPNFJ0QjkveitGU0pwcGQvcyszMkFjaWVXRlgxdGwwK3RINDhRVkwv?=
 =?utf-8?B?MGhlM0RxSGt3czQ5cmJ6N0RnSnJLRTV2SHUwK1J6a1J6Y05NQWN0NWFWazYv?=
 =?utf-8?B?RU4zUCtkTDJ6ZW56VFdiem1jd0ZxS2VESEJQdTFJK1N0NGUwNUZzeVdXMFUw?=
 =?utf-8?B?c3hNUkdoSnJTMi9oemVreE55cXNCc3VTQytpejVEMkUxWk80SWNCd2tQVU1X?=
 =?utf-8?B?MHFCRHdYTFh6L3dhWkVQOCtQbzlIMWNIQlgwMHpDOXdVanF0N1FjSXZ4THll?=
 =?utf-8?B?VkNKeTBVb2VwN0duWmozMTJLRktKYzNxNDJQYXpadm9ZWDh4S2VhdU5ud05D?=
 =?utf-8?B?a3hPeFBDVXI3ZkpmRVRsa1JzN0dYRENSU2xQc1YzT05zclBrTmhuczM5elBz?=
 =?utf-8?B?NUE5a1pGMVJoYytRc01HUXZrM3lGR24wSVdTMEh2enY4QTF5TjNoNFJQczF0?=
 =?utf-8?B?ZHoxTmtHejVsSFBXVll1eWpkcHRsRTN2Ni8yWGVFVTI4VVg2am1ocUtTak1m?=
 =?utf-8?B?b0d3bEJjU3RPSGYxUFlIU29XL0MrL0d2Yk5TUnR6dzVWY1B6MXFaQzRsakxB?=
 =?utf-8?B?OUdyVGlEOFIvL050QXY0eEhlR0tmYUhGelZqeVRvcmZZaFR5eVdhU1Q1b3N6?=
 =?utf-8?B?MnhzbEtnV0dDY0J4dlhpTTg3VEN4NWluTks4OWtCRW9TZnI1OUVmc0cxNGNm?=
 =?utf-8?B?emNWZlVrbHVYMWQ1MFRkUitzTitvTHoyc08xOE9lS1kyOEpodEdsWm9Ra0Jk?=
 =?utf-8?B?cTBzSWFHeWQ2V2pvdjgrekJjU3QxYi9TQUNNS3p0M1lJcHI0S3ViTjJRQVpp?=
 =?utf-8?B?OHFxOTJ5VktSUUE2dEdsRXVEeTVublZ4aWhCeE9xRVVTMEIvOEpiQ2poYXc3?=
 =?utf-8?B?QlEyUFViZ0ZzUEgzZGdya0VRTVBGRmIzM2JVT1ZqSHNrZWNsWFdxL1IraFF4?=
 =?utf-8?B?UXNPcWM3T1d0cnNDVHhnS0hybHczMTZDb3hzUUpjMG5EaHZIUFlnM2crdlQ2?=
 =?utf-8?Q?UMTKuKlZX4E/g2UIkn5bgNs=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 2b2895d2-9605-4719-b82b-08d9fd10b598
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 12:24:05.8718
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Ileclo9w435qRDtOD52/1KO4jE0Tp2TPNQLdvDbYf1YkhCZxtX9v7WwWkRRRO8ECJbBz1XJz8PS0fD4qbCKYAg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR04MB5386

On 03.03.2022 13:16, Daniel P. Smith wrote:
> 
> On 3/3/22 07:03, Jan Beulich wrote:
>> On 03.03.2022 12:50, Daniel P. Smith wrote:
>>> On 3/3/22 04:49, Jan Beulich wrote:
>>>> We shouldn't include unsupported code by default, with not even a means
>>>> for its building to be disabled. Convert the dependency from merely
>>>> affecting the prompt's visibility to a real one.
>>>>
>>>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>>>> ---
>>>> We could of course go further and make the default also account for
>>>> DEBUG, as is done elsewhere.
>>>
>>> As in you would like to adjust the default based on whether DEBUG is on
>>> or not? I guess my question is what motivation is there to adjust this
>>> selection if DEBUG is enabled or disabled?
>>
>> This is to have functionality enabled unless overridden in debug builds.
> 
> Maybe I am misunderstanding you. If I am wanting to debug either TXT or 
> a configuration with TXT on and I adjust my config to turn on debug, 
> then I would have to go turn TXT back on. Is that correct? If that is 
> the correct understanding, honestly that concerns me because if that is 
> being done for other config options, it would create the situation where 
> turning on debug to track down an issue would result in a different 
> configuration than the one I was experiencing the issue.

In the scenario that you describe (aiui), the default setting wouldn't
make a difference: If you alter an existing .config by turning on DEBUG,
the .config's existing TBOOT setting wouldn't change. Defaults matter
only for items which have no values recorded yet. Plus - I'm suggesting
to turn the option _on_ by default when DEBUG=y, not off.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 12:35:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 12:35:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283320.482288 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPkgK-0003Wn-FA; Thu, 03 Mar 2022 12:35:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283320.482288; Thu, 03 Mar 2022 12:35:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPkgK-0003Wg-C8; Thu, 03 Mar 2022 12:35:44 +0000
Received: by outflank-mailman (input) for mailman id 283320;
 Thu, 03 Mar 2022 12:35:43 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPkgJ-0003WW-Nu; Thu, 03 Mar 2022 12:35:43 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPkgJ-0004vL-KZ; Thu, 03 Mar 2022 12:35:43 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPkgJ-0000PV-Dh; Thu, 03 Mar 2022 12:35:43 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPkgJ-0005u0-DJ; Thu, 03 Mar 2022 12:35:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=f9zMJItiM5fk0Rr87Q+glx4AIw/65b2fB88FGgj4vA0=; b=DYSfoMcou/APTCO2VnVFsJ/pN9
	1UZbIExnqq3XGn+2vEO6HXrcX24E81quN7Q/nUldrbEKcvBlHeD3AzWhgEkpYMi/7dGEIebVtDs+J
	NcN+ErekkQQtbdGi7vxGtBoozv5hMdcioORvQN6OG8rtgo5ZZWDzTgZhY850oU09uEbk=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168364-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168364: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=589d51df260465e2561979b8a988e77b0f32a6e8
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 03 Mar 2022 12:35:43 +0000

flight 168364 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168364/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 589d51df260465e2561979b8a988e77b0f32a6e8
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    3 days
Failing since        168258  2022-03-01 01:55:31 Z    2 days   22 attempts
Testing same since   168359  2022-03-03 10:41:39 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 589d51df260465e2561979b8a988e77b0f32a6e8
Author: Sean Rhodes <sean@starlabs.systems>
Date:   Thu Feb 24 19:38:18 2022 +0800

    MdeModulePkg/Usb/Keyboard.c: Don't request protocol before setting
    
    No need to check the interface protocol then conditionally setting,
    just set it to BOOT_PROTOCOL and check for error.
    
    This is what Linux does for HID devices as some don't follow the USB spec.
    One example is the Aspeed BMC HID keyboard device, which adds a massive
    boot delay without this patch as it doesn't respond to
    'GetProtocolRequest'.
    
    Cc: Hao A Wu <hao.a.wu@intel.com>
    Cc: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Matt DeVillier <matt.devillier@gmail.com>
    Signed-off-by: Patrick Rudolph <patrick.rudolph@9elements.com>
    Signed-off-by: Sean Rhodes <sean@starlabs.systems>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit b422b0fcf92dd4103dfc16d8d5f77fbec2d8c5b9
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Tue Feb 22 11:29:23 2022 +0800

    EmulatorPkg/EmuGopDxe: Set ModeInfo after Open successfully
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2668
    
    WindowOpen will fail in some case. for example, without XServer.
    
    Shouldn't set ModeInfo in this case to avoid the caller use it
    incorrectly
    
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 906242343f7a654402f6f999d447aa9d29a8f4d4
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sun Feb 20 14:53:01 2022 +0800

    MdeModulePkg/GraphicsConsoleDxe: Check status to make sure no error
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2668
    
    SetMode will fail in some case. for example, without XServer.
    Should handle these case when SetMode fail.
    
    If we don't handle it, it will Segmentation fault.
    
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit dc39554d58af4a50b50eca1f57c49415a12b0c98
Author: Xiaolu.Jiang <xiaolu.jiang@intel.com>
Date:   Tue Feb 22 22:14:05 2022 +0800

    edk2/MdeModulePkg/Debuglib: Add Standalone MM support
    
    https://bugzilla.tianocore.org/show_bug.cgi?id=3844
    
    This change added Standalone MM instance of DebugLib.
    
    Reviewd-by: Jian J Wang <jian.j.wang@intel.com>
    Reviewd-by: Liming Gao <gaoliming@byosoft.com.cn>
    
    Signed-off-by: Xiaolu.Jiang <xiaolu.jiang@intel.com>

commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 12:36:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 12:36:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283332.482299 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPkhP-0004JG-Un; Thu, 03 Mar 2022 12:36:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283332.482299; Thu, 03 Mar 2022 12:36:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPkhP-0004J9-Qf; Thu, 03 Mar 2022 12:36:51 +0000
Received: by outflank-mailman (input) for mailman id 283332;
 Thu, 03 Mar 2022 12:36:51 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPkhP-0004Iz-2e
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 12:36:51 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 98c5c05f-9aee-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 13:36:50 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2107.outbound.protection.outlook.com [104.47.17.107]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-5-G8UCLFkdPl-LajVMbSjxGQ-1; Thu, 03 Mar 2022 13:36:48 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM8PR04MB7812.eurprd04.prod.outlook.com (2603:10a6:20b:245::13)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 12:36:47 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 12:36:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 98c5c05f-9aee-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646311009;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=T6cJPg584moZKtnWb8FtLePXUIaYX3/05kQWdyidkqs=;
	b=hlkftmFI8ATsS/eujKU7m1OjgXSr5rJ70ZHMJLsSXpqxV+9Z6rHuIxB9Iqqq4vGs7DmSne
	8wrsdIndVB32qkcxLkNNJit6XNh737NvXdwmyZ02ab81x8mTLqMvz7ojRirHGfSxNfiVoz
	vYKflOV5IH9V5ceOIH+KWOy/E8DdiP0=
X-MC-Unique: G8UCLFkdPl-LajVMbSjxGQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=klr5uTpWrCgnWXN7XYxXQzcMCb7s8du0G+JAUpn33UwqtzS7nh5qML/YG9a83tduPeRF/u+m7iVb3ee9quMtcwH22Y8MVaLCRtUqQAXIvY4YkXfgzMrtIq0vnHtuD0SEHWESvKa4PlwTfOlNaU/bn7mo1LEcxYCigF9RUQkobptgOIBRSxXXrEBp//ZGMqIqResnmGivd+slIyzIIrbGKakPCBoAG40mV2wUlfbOKYXS4CsHHGmsToIdmAVVC4GCGkNlshD1y7DHOopvIuoyKH1MCMAjF0ZK70uIKDw9V9tZ34uj15/8trEO0v6mtVJ1UqZB8YcwKA8jixD5qobjZg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=T6cJPg584moZKtnWb8FtLePXUIaYX3/05kQWdyidkqs=;
 b=WCBzQf1OheN6B2v1htVJOvH81wXkx0iGQ+956HykfyTiVRToBsOIGZF2dH1kpxZVvskA7iriPDjJtDJuUP7mePVl+ZXKJmYxBqdO7klr5Bge/+Kqew72wky8wQfQmuRkoBnhwtNAqo3DOWJcQkS5550aLQDHBM2i6PQ3/Cs9QWrTu42z64rOwNkLIaK761iEL6Hot9t7jeR4ETvpFQP0x7UBUJtw8haTY15GpZ6wVrUDJT33Tg80hNQVOWB6Oeb42GEqLMH8bzV25qDMyonv6GcuEsqFvFaTqct5MQOaejNTP4wjPLhvPqfwUW2OGfypSuwjE1KHnQenM//rzP+Vyw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <236dcb65-2ab6-7d1b-36b3-ed2d45c1398a@suse.com>
Date: Thu, 3 Mar 2022 13:36:45 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH 1/3] evtchn/hvm: do not allow binding PIRQs unless
 supported
Content-Language: en-US
To: Roger Pau Monne <roger.pau@citrix.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220303103057.49181-1-roger.pau@citrix.com>
 <20220303103057.49181-2-roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220303103057.49181-2-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: FR0P281CA0038.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:48::21) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: edad2be4-aa13-47c1-c4f0-08d9fd127b40
X-MS-TrafficTypeDiagnostic: AM8PR04MB7812:EE_
X-Microsoft-Antispam-PRVS:
	<AM8PR04MB78126CB49D50F4290D34F2FDB3049@AM8PR04MB7812.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(53546011)(31696002)(86362001)(54906003)(6916009)(316002)(6506007)(6486002)(6512007)(2616005)(508600001)(8936002)(4744005)(5660300002)(2906002)(26005)(66946007)(66476007)(66556008)(186003)(38100700002)(31686004)(36756003)(4326008)(8676002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?S3lBVS9vMFpYZURhZmlqMTdLWXFSenZieGpYdXZKOVF2VkltU25tam1mOHBx?=
 =?utf-8?B?RjdIeU9sVzd0QUZ1UHkxWGdaSTdXMjhsajBpTGhVRmtGdW5DWFNBRFhJU1ZI?=
 =?utf-8?B?RWk2U2xlY2VBR3ZuQWYreDJ3c1dZcDBlVC90aXJTYkdIVEd1V2pGblgvb29a?=
 =?utf-8?B?M092SjRJWjVmdDBZeHkyMjVQdTd6YnZWdGRudmhrblpVTFBHU1ZmUnhLdkVx?=
 =?utf-8?B?M2RNWXpNQWtyallvdHNWWGdwbnZmVHZKUWRjVnYzZEZpa2xyU2dKblIwZytQ?=
 =?utf-8?B?Y0VlcFdGaGpxQmNyV3ZBekQ2NUNvY2RRVW82djVNaC8zZEF2QTZDNGZEdHhH?=
 =?utf-8?B?b0lkcXE4dGczNXBFUTNaYUI2ODkrVFRrUjg1ZU9oVjRQb2RXU0pCczZoWkNw?=
 =?utf-8?B?RWt6M1Zlamo4OWVmWENvYVRobDRhRzF4Y2JYZDlqa1AyN29KcXc5VmZ4VUZh?=
 =?utf-8?B?bjRUT09UZ2xCd0pQSzE2RE01TWxXcFdXQkhaRE5JN3J0c2V5UkNVRFFMcXVQ?=
 =?utf-8?B?T0pmN3pxcFBqdFR2cXlycVp4eUh5TDdKM3V4dkxWRGx1M0xXZ0FPRmI1K212?=
 =?utf-8?B?blY5cHg2VGowbVVvcXJQa1FHMEpOY3J6MDA2R0IvdStUK2hsNDVVZDBRMi9h?=
 =?utf-8?B?K3pjanZ3Q0JrMEVFRHR1QjV0ZDNJYkZNOW1EclpSZ09pR3VEL0dXL2dnNWFp?=
 =?utf-8?B?TjRZZFVtcXpaQ2RSM2luOEt2eHhKTUNLSnFocW1qR2c1OVR3V05pR0RhcEFH?=
 =?utf-8?B?Mm94aG5RVjRodDNQK3dWUTJWaHU2UytlVDFOSVI4UUdRcjNjNGRHUWtJMVo3?=
 =?utf-8?B?Wk93WUdmUXZodEZ3T0FCd00rcDZ3ZDFtZGc3amJuQnJ3MHZQdm03UmFwVWRJ?=
 =?utf-8?B?bytrREppaENwd295SWpWaHp2MUpjU3I0aS90YlFscC9hT3N2bit3YUl2VFpX?=
 =?utf-8?B?RGhYakFDclV6d0NyQ1hoakc2aURQTUllSS84b1hvYVhKdjJMNC9sQ1Rtb3FO?=
 =?utf-8?B?QzBqREZweHJNT2thaTRwMVA3MVBoMlRQMnk4T284TVhwdlNub2RhcUc5MEZ1?=
 =?utf-8?B?R29YUnRXMTZ3Nk93WGtrUWFVTjhubTZzY1FTbG5NSXBlRTVTaEVCNU5NWFp1?=
 =?utf-8?B?UDVIVlJnSmVtaGpXNExWWUVkWFRFWVdsTy80TTJtQk1SMnN6Q1YvVVZYMFJ0?=
 =?utf-8?B?VFB4blVqaWdqUGhNVUtLcnUvZjFRd1dvTTE3eEYwcVR3K3o2ZEZtdkVkMWEz?=
 =?utf-8?B?SWpralBGTnNNeTVLcTJsTnN3dmtCaXFoSW8wbkJpTVdqMEd4Y05QclBXeFZG?=
 =?utf-8?B?VnllNjloNzZhRXRBU0tiUG4vU09icUhYS01DdU5NY2hTR1VSMEY5ZWZqNm94?=
 =?utf-8?B?bHVTWHU5QTFsVzgyRmI1bUtoYzZCQ1pkUmUwakJ6UFQxTXk4aFRZZ3RVa2dW?=
 =?utf-8?B?d1hJMFozQXZGdzlqS0JSTmJpdFVyYVBCY2pzY3dLdlNPaE9OeTJEcFkrTWNS?=
 =?utf-8?B?cUwvZnE3aUVSWXZKZlREVjhrbDNMMm5BSDh3SVlLbTM2TE5DWlV4eVIrQy9Q?=
 =?utf-8?B?S0VIVi8rcDdEN3Z1RzJPdEpkSlVoSmtsMlQrTllFblBoV2NGQlArbjFBWXRF?=
 =?utf-8?B?dGRJQlVSdkZYc3BJUVVJbnZKUUdLV2RjQW85YnQ2TkFuMThyUnk1MWtnN1JL?=
 =?utf-8?B?RzBEWFpNSWUydi9lR2RiSTJ4RVBuQytDTEt0c0xyeFlVaDVrN3UxbzluTzRo?=
 =?utf-8?B?R3BpNW82dDZqR1o5WUliQm42V3cvTVEzZHBIZm5EMTdhNFNEaTVJU2Zwcngr?=
 =?utf-8?B?Wkg5YXA0WVdjNVRWNnhaRU9IbXBMckcreStKaTVFV0JLTm1PcWNnVURvVWdW?=
 =?utf-8?B?bFkvYWxiN1BrNVVuOGtxNjMrRG5IbndWaXNMQmYrY0FOZTlHYUNQR3RFTElt?=
 =?utf-8?B?N0tRdHNWc1hrRFdaUnFWV3htdy92a0FRL2F5Vk14VTdGWnVYWUpXVlpCZloy?=
 =?utf-8?B?NjhYcUNDbnIyUzJCd3BXVnN2dmJWT2c3VHQzbXZmN3p1ZXBsKzlhSUZxVXZT?=
 =?utf-8?B?eUpVU2RqTFVEOHVxYnhWbVhoWGpReVM1SFF6NUpZS0JJbDRqSmlkU0R3WUsv?=
 =?utf-8?B?Ri8xaXYxWHN0Mld1ZFVQVXRuZnIvcGJNSWhRV1lRMjBmMHoyMlN6QVUvQ09W?=
 =?utf-8?Q?WyV6KbWsOj9Kx1Q/N6f+Uiw=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: edad2be4-aa13-47c1-c4f0-08d9fd127b40
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 12:36:46.9498
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 99PGVW4a/KnXxw/yDzN9N/56dL/GFo6Ih9DuRXzCBQxsAd76eD9q9bLSN9kDwP+c9qwNEB4H1pQtGnQc41uN2w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM8PR04MB7812

On 03.03.2022 11:30, Roger Pau Monne wrote:
> --- a/xen/common/event_channel.c
> +++ b/xen/common/event_channel.c
> @@ -556,6 +556,9 @@ static int evtchn_bind_pirq(evtchn_bind_pirq_t *bind)
>      int            port = 0, rc;
>      unsigned int   pirq = bind->pirq;
>  
> +    if ( is_hvm_domain(d) && !has_pirq(d) )

Arm doesn't have has_pirq(), so some further conditional will be needed,
or has_pirq() needs adding there.

Doesn't this want further accompanying with adjustments to the checks in
physdev_{,un}map_pirq()?

> +        return -ENOSYS;

-EOPNOTSUPP please.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 12:44:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 12:44:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283342.482310 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPkoi-0005kg-QL; Thu, 03 Mar 2022 12:44:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283342.482310; Thu, 03 Mar 2022 12:44:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPkoi-0005kZ-MP; Thu, 03 Mar 2022 12:44:24 +0000
Received: by outflank-mailman (input) for mailman id 283342;
 Thu, 03 Mar 2022 12:44:23 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPkoh-0005kT-4e
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 12:44:23 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a64459c0-9aef-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 13:44:22 +0100 (CET)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04lp2059.outbound.protection.outlook.com [104.47.12.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-8-WgUbfknAMNWpiCWTHgjzPA-1; Thu, 03 Mar 2022 13:44:20 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB7PR04MB3963.eurprd04.prod.outlook.com (2603:10a6:5:1c::17) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Thu, 3 Mar
 2022 12:44:18 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 12:44:18 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a64459c0-9aef-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646311461;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=PAkocuTVtpPDAQB+SGtsJSc/HtS0wVcXFf7Bg9SihhE=;
	b=U2mMZ3tnkB9ShxNlDBTsuf6M41Xvr+JZRJK+2BP3SBnShD2xRcK4BMvvYjRdKlq5Fm50bB
	Q6SWivfgDe+JB/3o5a7sW8GBAVY9n89A+sRuJCquYUejnB9hSCVxoulns7Wa+WAF3glWCc
	dYd+dC0/cbLwXRTkUrxVSoskfZSWKCQ=
X-MC-Unique: WgUbfknAMNWpiCWTHgjzPA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=kBgpjckCcRhCIU12yyJKpZ/Xtmz31CNKWkIsHS7bDe264/TcUanIskNvALVZCQnQW10Jjqini8K8bUnmu3nirGcspWsuNRoWeIIy3Vy95wXL6FRgJeYidTuklqCVEjo6kfoArZEK0FaoljJCAQRsgw70WWfTSU1Dr1VNUZ7Kyp+80PSJD9j/kJfmeDqH4euKLKPVbyu5dAw7eMYIW9wbSRUP+vcNLqvLn3MkCsfOdlg5+jdOPOMHCFOIyfPgYbLfvVGcku7Ecf6taCKC41bnpRDNAAbTg9Vw77LKeR6qJf6pgsoQ9N+cH6Jfbq6AT29OHFGSaA37sDDUEFZoXmLGMw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=PAkocuTVtpPDAQB+SGtsJSc/HtS0wVcXFf7Bg9SihhE=;
 b=bzTJdLB2aDBk6/RPZEKc6KshCAAuM0cKAVLEBuOJSxgYcd/3yAVOcx0Vnr70pMFn4XaBTmUgyxxldp67vedNvI2NV3SHlb8RASW+zjJDwCCQsdX0M+kh8vbAKPUd3/qvRS7rSB4kGwRQNqogZcp1T6/aa4+cD8lWQgqpXb09/iVT3Kww5p+2Zs8qmoYCbnoVGgAg3OlsS67EchwedbITtDefv96aE85K8wCQvG+OKWyz6XkC9gSYdlmR2LZLcMG27H3afQ2Bs1hDonrdUgmxv/qvW6DBxfWM96Br3KlG9MoO7mGp4AeTe0P/s9Q1dxRGoWMdeydHh50o9rTYTn0lzQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <b986f9c5-0783-7998-533c-f1d2eec4bef1@suse.com>
Date: Thu, 3 Mar 2022 13:44:16 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH 2/3] hvm/irq: tighten check in hvm_domain_use_pirq
Content-Language: en-US
To: Roger Pau Monne <roger.pau@citrix.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220303103057.49181-1-roger.pau@citrix.com>
 <20220303103057.49181-3-roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220303103057.49181-3-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6PR10CA0026.EURPRD10.PROD.OUTLOOK.COM
 (2603:10a6:209:89::39) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: db8f1197-68f2-4cba-e6eb-08d9fd138859
X-MS-TrafficTypeDiagnostic: DB7PR04MB3963:EE_
X-Microsoft-Antispam-PRVS:
	<DB7PR04MB396358095871714A007FDE91B3049@DB7PR04MB3963.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66946007)(54906003)(316002)(6916009)(8936002)(86362001)(2906002)(4744005)(31696002)(5660300002)(38100700002)(66476007)(66556008)(8676002)(4326008)(6506007)(53546011)(2616005)(6512007)(31686004)(186003)(26005)(83380400001)(36756003)(508600001)(6486002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?YXl0akJsdGFFRm44MGVxT2dkeHgwQnpaSDlFbDd3aXpPNTRyTTM2MGNsdUx4?=
 =?utf-8?B?WUx3d2VORTRVOTdkY3ZpMDdNY0dQSjMvY0xhTHFWczUwbXNtbFlCWGxmTkhE?=
 =?utf-8?B?Q0ZBZmdWMkcwVUhpbWdMUFhFTWtacGtrTldIdURkand5a2ZpbTYyR0ZIRmpR?=
 =?utf-8?B?RGIxZHQ5Tmd2anFUQ3Y4NTdwVFQ5WEJXWXpTcysvZXJoWXlka3MxMEYyanpR?=
 =?utf-8?B?L0ordC94OGt5bmV0VXY4SU15MVhjZ05hblpTM3NLV3FRdXpmMllLeDVIUXdj?=
 =?utf-8?B?N2tDOWVqVmRLc2xRQVlKOXBuTzBIQVdtMGF1bVRmaHNMZzlLSmM2SElTVWds?=
 =?utf-8?B?UzFUYVIwaDdqSWxTSWhYblVndTBoRzE4TWJzR2lRYkg1M3o5RnJIcTdiblAy?=
 =?utf-8?B?TFlXWVN2U0VPRHloVHRLbUJMR2Y4enhOL0RVMUhlU2d0Q2xmNlpJcnRCcnpK?=
 =?utf-8?B?RGd4MThyb1VqdFdVS3RWYkZBcVQ2R2I0aWQ1bHRRa2xWaGtFekp6aXNMdSs4?=
 =?utf-8?B?ZDFnSnV0cU5pUTcyeHBUaWFLdXdxVlVxQ1ZmSnBIUDAvNnFrNGZLT20yNFZl?=
 =?utf-8?B?WmRIWTlUK2RuMXpSdFZ4eHd6SkFQZG01Nkc2ZGs1cXVjT2RPUzRLWStRNHor?=
 =?utf-8?B?OTBic2ZzbHZMY1FLVEZ4SEdhM1EzTEVra3hWOUFSRjI3SWt0dUFjVG9uUG1C?=
 =?utf-8?B?SFZPdkJUeTZlZlEyVzkxOWhNNmdKY2F2aEFTMlVoTnRQZ2J1VlVaZ1BZTlph?=
 =?utf-8?B?TlpiTVhpN1hrdzFqVjFyRFNVM0FGT3lsLzM4QzVrUElmQjluT1BDVmxxWU9T?=
 =?utf-8?B?VjZmMTJRekh3YllWUGpkVU1vdi82TVBsZkJxU2hqVkJlbTkyZjduZlFhWUZB?=
 =?utf-8?B?eDBBUUQ0RWh3R01xUW8yOVF5RWE4NlpyaDgzTlBYOVFtYWdodmY3RndTZHpZ?=
 =?utf-8?B?M0huOGxNbjFxaUtLQ1lCRmdocFp6Qm10TTBselN2VUhIRkZDeCtyYSszbHp0?=
 =?utf-8?B?VDAzbTZzSnpkRlV4NWpzYkJnVXkySkRFQmtQelV4djZHaVdpZlVzL3Q2TUhy?=
 =?utf-8?B?ZUJldE9qZW85a0RGdEtteXdQSFRRcmozdWZoaWdFVTVGM1Vob0IxdjBWY01v?=
 =?utf-8?B?UFl2UmNHNUdkTGs5S2Nmd0Fxa0RsdllWMWtJejN5c0pMS1dzZDk0eVptL3V0?=
 =?utf-8?B?NXhSSi93b0xjWUNKcmJMa1FnRFJ3dk56WU0wUGYxS2p0OTVZb2lIbW44K2dz?=
 =?utf-8?B?MGxwWTZxQ3NKODhEdmRiYUdydE93azVYc3liR29qNzNXbExNZHg0MDdYWTZr?=
 =?utf-8?B?NHRTeVJDYUtiVFlzay9qbHRVaTF5S0ErYW9uSk5KNFRkcFFqbHE5NURIdFNO?=
 =?utf-8?B?M1FHUEhwaVZWb3N3N0M2RnBnRG9BdWFid3FNbUhDcDkzR1pQV0k5d1RqR1BH?=
 =?utf-8?B?eEdUWGFUR1ZNWlpoOFBNYks5S0lsVGkyengxcXB3eEYrTHBXTjNSckpyTU96?=
 =?utf-8?B?cklERGQxVXIxTllFZHBNeUJnU295WHpjMVEzd0ZOTEg5SmVtRHBoUTU5dDlN?=
 =?utf-8?B?NkFqbXhWRXdXQ1ZtaFRVMkVpdUlweHJlSnZUT1Z4V3ZreTRKZmRlVVAvM3lu?=
 =?utf-8?B?OHBoZTJFcUs0MDRudDZHTURERERDODBiNW5HYUZtbVlTcGVQZ29QNzZEWnJT?=
 =?utf-8?B?QTVhK3lZOUVhdFVIZ3d3SFRTTHJsdkd3alo3YVdLOTU3SWdmZ2I4bnF3WHFU?=
 =?utf-8?B?S0JxcWFXTTdTaUZTYnFBMDhRVWhZendTaVFtTEFRNjgwc3M4YUJ4RnI0am5C?=
 =?utf-8?B?aUVpZVBiMXZBZm8rRGxVWHBvZFZ0dXo1V29VTzlPdmtHdHE0c0x3ZzVNaU9y?=
 =?utf-8?B?a3BJTm5iYzJscUhuWXBFQktRNHUwN21yMHJ4dk9UTEwrNmVwbEJpS1dCVGJa?=
 =?utf-8?B?Q1NRVTh5dDJIbk96cjMvOHBOTVRFemVhYVA3U3RMWVlLZHQvSGkrTzlMWm9t?=
 =?utf-8?B?aXZ6MUJ3TGgrUU04c3RtVkR2K093UE5vTHhvUW9UMEV0c0VqeU9CQmJkOFFv?=
 =?utf-8?B?anpCeDhRc1VucWt1cWlYSS9vZ0ZybTcyRGdzNmZPNjB3TStiN1hkeHZabnZ4?=
 =?utf-8?B?VlIvYVpXZGR6VU81WVdtRVN3VHRYSVhiVGlManUxSjBVd3hQZ2pvaUxEeCtJ?=
 =?utf-8?Q?Xc0Dj+dAFQrf2B6w0gT+kRc=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: db8f1197-68f2-4cba-e6eb-08d9fd138859
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 12:44:18.4528
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: LpOfC0q6mBPe9ISBDhnTY4pSRhohKuij0fVBKPpuv0RHhTD0yXNNQkfoa/4SluAwZEdBZPL8ujcU11a7GvTKKQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR04MB3963

On 03.03.2022 11:30, Roger Pau Monne wrote:
> hvm_domain_use_pirq checking whether the passed domain is an HVM
> guests is pointless, as all calls originate from HVM only paths.
> Instead check whether the domain has PIRQ support in order to avoid
> further checks.

I agree with this, but I wonder ...

> --- a/xen/arch/x86/hvm/irq.c
> +++ b/xen/arch/x86/hvm/irq.c
> @@ -30,7 +30,7 @@
>  
>  bool hvm_domain_use_pirq(const struct domain *d, const struct pirq *pirq)
>  {
> -    return is_hvm_domain(d) && pirq && pirq->arch.hvm.emuirq != IRQ_UNBOUND;
> +    return has_pirq(d) && pirq && pirq->arch.hvm.emuirq != IRQ_UNBOUND;

... whether there can be a non-NULL pirq in the first place for a
!has_pirq() domain. Judging from e.g. hvm_inject_msi() it looks like
this might be possible, but perhaps wrongly so?

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 12:57:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 12:57:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283351.482327 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPl10-0007ZQ-Md; Thu, 03 Mar 2022 12:57:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283351.482327; Thu, 03 Mar 2022 12:57:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPl10-0007ZJ-JO; Thu, 03 Mar 2022 12:57:06 +0000
Received: by outflank-mailman (input) for mailman id 283351;
 Thu, 03 Mar 2022 12:57:05 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=GC2d=TO=apertussolutions.com=dpsmith@srs-se1.protection.inumbo.net>)
 id 1nPl0z-0007YT-8E
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 12:57:05 +0000
Received: from sender4-of-o51.zoho.com (sender4-of-o51.zoho.com
 [136.143.188.51]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 6b3d9583-9af1-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 13:57:03 +0100 (CET)
Received: from [10.10.1.138] (static-72-81-132-2.bltmmd.fios.verizon.net
 [72.81.132.2]) by mx.zohomail.com
 with SMTPS id 1646312218867337.83372915155417;
 Thu, 3 Mar 2022 04:56:58 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6b3d9583-9af1-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; t=1646312219; cv=none; 
	d=zohomail.com; s=zohoarc; 
	b=YIyRZQq18p7mhu2TBItYyIVcH/Hlr5DkY6PGQuguK7b6x1XXFHGD+FpYmZJtJMJ6loT0r17yc0K9159AhM1Z/z262OSPX1VFzCGIC0JZqJP44WNLd54yUFOxoWq6UvYN4hFRug07LqLqjwR16+7IHKAH4arrO6LZxc9R8z7+smI=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; 
	t=1646312219; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; 
	bh=llcIV0L3t6cl9WjAGfF7LnkKx2UBuRvJEAwApke09nQ=; 
	b=Oim7h6myhINUxd1AvaouCPJuCryRdGZOseMTuxcysSQD5hpCKocXb421D8SZxicvNTwrPpxqLmnIo46dQ+DAci6tqEaK0ArZWSrEReXi7KtWRmTPjnZWhybhWa71Ctl09z5sPLCehdZESNkkwbnzJ+4C68XLrxCz8CPvO8NJ06w=
ARC-Authentication-Results: i=1; mx.zohomail.com;
	dkim=pass  header.i=apertussolutions.com;
	spf=pass  smtp.mailfrom=dpsmith@apertussolutions.com;
	dmarc=pass header.from=<dpsmith@apertussolutions.com>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1646312219;
	s=zoho; d=apertussolutions.com; i=dpsmith@apertussolutions.com;
	h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From:In-Reply-To:Content-Type:Content-Transfer-Encoding;
	bh=llcIV0L3t6cl9WjAGfF7LnkKx2UBuRvJEAwApke09nQ=;
	b=dWdPjYa7saYxK6qyJjTJO2rInEmbGlMQZssG1ibVwY8qkxfka0+vhGP4BrxS1K7G
	Pbyg45Y5sA/+One0rkXfaJzDunETgOT0mjLUARlOYaYPXZo3zhlBcihMGYol1MZftuR
	uvFf9x4blyl7T5Cf1TA5/URd0fZhPaW50rSRD9VM=
Message-ID: <ae6f8279-c348-046d-1d3e-da851a5fcd20@apertussolutions.com>
Date: Thu, 3 Mar 2022 07:54:54 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [PATCH] x86/tboot: adjust Kconfig default
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 =?UTF-8?Q?Mateusz_M=c3=b3wka?= <mateusz.mowka@intel.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Lukasz Hawrylko <lukasz@hawrylko.pl>
References: <fae0a082-8b39-9bd1-0ed3-35a660d704e8@suse.com>
 <18472660-3438-5c77-05c6-148b97bf4725@apertussolutions.com>
 <9d57dc89-779b-aa91-519d-3e4cfc05ef94@suse.com>
 <b6a19025-ed0b-1698-b46f-0ff726254e96@apertussolutions.com>
 <16546d42-900b-1548-fdff-79ba21716384@suse.com>
From: "Daniel P. Smith" <dpsmith@apertussolutions.com>
In-Reply-To: <16546d42-900b-1548-fdff-79ba21716384@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ZohoMailClient: External

On 3/3/22 07:24, Jan Beulich wrote:
> On 03.03.2022 13:16, Daniel P. Smith wrote:
>>
>> On 3/3/22 07:03, Jan Beulich wrote:
>>> On 03.03.2022 12:50, Daniel P. Smith wrote:
>>>> On 3/3/22 04:49, Jan Beulich wrote:
>>>>> We shouldn't include unsupported code by default, with not even a means
>>>>> for its building to be disabled. Convert the dependency from merely
>>>>> affecting the prompt's visibility to a real one.
>>>>>
>>>>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>>>>> ---
>>>>> We could of course go further and make the default also account for
>>>>> DEBUG, as is done elsewhere.
>>>>
>>>> As in you would like to adjust the default based on whether DEBUG is on
>>>> or not? I guess my question is what motivation is there to adjust this
>>>> selection if DEBUG is enabled or disabled?
>>>
>>> This is to have functionality enabled unless overridden in debug builds.
>>
>> Maybe I am misunderstanding you. If I am wanting to debug either TXT or 
>> a configuration with TXT on and I adjust my config to turn on debug, 
>> then I would have to go turn TXT back on. Is that correct? If that is 
>> the correct understanding, honestly that concerns me because if that is 
>> being done for other config options, it would create the situation where 
>> turning on debug to track down an issue would result in a different 
>> configuration than the one I was experiencing the issue.
> 
> In the scenario that you describe (aiui), the default setting wouldn't
> make a difference: If you alter an existing .config by turning on DEBUG,
> the .config's existing TBOOT setting wouldn't change. Defaults matter
> only for items which have no values recorded yet. Plus - I'm suggesting
> to turn the option _on_ by default when DEBUG=y, not off.

Okay, I am following now. Apologies for taking so long. I think that
would be fine as TXT/tboot should be benign if enabled but tboot is not
used to start Xen.

v/r,
dps


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 13:15:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 13:15:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283362.482343 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPlIw-0001k3-Cc; Thu, 03 Mar 2022 13:15:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283362.482343; Thu, 03 Mar 2022 13:15:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPlIw-0001jw-9h; Thu, 03 Mar 2022 13:15:38 +0000
Received: by outflank-mailman (input) for mailman id 283362;
 Thu, 03 Mar 2022 13:15:37 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPlIv-0001jm-Sp; Thu, 03 Mar 2022 13:15:37 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPlIv-0005cX-Oq; Thu, 03 Mar 2022 13:15:37 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPlIv-0001PU-Ca; Thu, 03 Mar 2022 13:15:37 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPlIv-0006aM-C7; Thu, 03 Mar 2022 13:15:37 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=UxLz+pWk+nhP9MI0cG+UKXlCqaugxnquaOtKiFUgeGk=; b=m1PfJ6nT7O5WNtLaYhtqrHIzKe
	VeodfTB7+/+z1iSM1nN+ZZIduE04nC7mJz+LkBjKhib9LGcsl19z1PZmtWfOxQ7AMh82UILWQA4/R
	qFSFtO5xLDJaUdCMIHJwh0Ri8GDGTZyK/HDldstoNe9SPncjY5v8B85XpXKGGm+GSDiU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168349-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168349: regressions - FAIL
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:debian-hvm-install:fail:regression
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=4b7fd8153ddfe95d6d427ff241abb6fdf37e027b
X-Osstest-Versions-That:
    xen=faecea18d252f97c6ad41f0f457566ff2c125b8d
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 03 Mar 2022 13:15:37 +0000

flight 168349 xen-unstable real [real]
flight 168361 xen-unstable real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168349/
http://logs.test-lab.xenproject.org/osstest/logs/168361/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm 12 debian-hvm-install fail REGR. vs. 168328

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168328
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168328
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168328
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168328
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168328
 test-armhf-armhf-xl-rtds     18 guest-start/debian.repeat    fail  like 168328
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168328
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168328
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168328
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168328
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168328
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168328
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168328
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  4b7fd8153ddfe95d6d427ff241abb6fdf37e027b
baseline version:
 xen                  faecea18d252f97c6ad41f0f457566ff2c125b8d

Last test of basis   168328  2022-03-02 08:41:59 Z    1 days
Testing same since   168349  2022-03-02 21:07:18 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Jan Beulich <jbeulich@suse.com>
  Juergen Gross <jgross@suse.com>
  Julien Grall <jgrall@amazon.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 fail    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 4b7fd8153ddfe95d6d427ff241abb6fdf37e027b
Author: Jan Beulich <jbeulich@suse.com>
Date:   Wed Mar 2 09:29:55 2022 +0100

    x86: fold sections in final binaries
    
    Especially when linking a PE binary (xen.efi), standalone output
    sections are expensive: Often the linker will align the subsequent one
    on the section alignment boundary (2Mb) when the linker script doesn't
    otherwise place it. (I haven't been able to derive from observed
    behavior under what conditions it would not do so.)
    
    With gcov enabled (and with gcc11) I'm observing enough sections that,
    as of quite recently, the resulting image doesn't fit in 16Mb anymore,
    failing the final ASSERT() in the linker script. (That assertion is
    slated to go away, but that's a separate change.)
    
    Any destructor related sections can be discarded, as we never "exit"
    the hypervisor. This includes .text.exit, which is referenced from
    .dtors.*. Constructor related sections need to all be taken care of, not
    just those with historically used names: .ctors.* and .text.startup is
    what gcc11 populates. While there re-arrange ordering / sorting to match
    that used by the linker provided scripts.
    
    Finally, for xen.efi only, also discard .note.gnu.*. These are
    meaningless in a PE binary. Quite likely, while not meaningless there,
    the section is also of no use in ELF, but keep it there for now.
    
    Signed-off-by: Jan Beulich <jbeulich@suse.com>
    Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>

commit 97b80c7881b36ddb13e535d4e9af0eef2e7f24ec
Author: Jan Beulich <jbeulich@suse.com>
Date:   Wed Mar 2 09:28:51 2022 +0100

    x86/altcall: silence undue warning
    
    Suitable compiler options are passed only when the actual feature
    (XEN_IBT) is enabled, not when merely the compiler capability was found
    to be available.
    
    Fixes: 12e3410e071e ("x86/altcall: Check and optimise altcall targets")
    Signed-off-by: Jan Beulich <jbeulich@suse.com>
    Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>

commit da5827fff31c401132879130398a974a18befacb
Author: Jan Beulich <jbeulich@suse.com>
Date:   Wed Mar 2 09:28:06 2022 +0100

    docs: correct "gnttab=" documented default
    
    Defaults differ for Arm and x86, not the least because of v2 not even
    being security supported on Arm.
    
    Also drop a bogus sentence from gnttab_max_maptrack_frames, which was
    presumably mistakenly cloned from gnttab_max_frames (albeit even there
    what is being said is neither very precise nor very useful imo).
    
    Signed-off-by: Jan Beulich <jbeulich@suse.com>
    Acked-by: Julien Grall <jgrall@amazon.com>

commit 5e326b61693c0a4633fdc2bf8a896857a2733e90
Author: Juergen Gross <jgross@suse.com>
Date:   Wed Mar 2 09:27:19 2022 +0100

    docs: document patch rules
    
    Add a document to describe the rules for sending a proper patch.
    
    As it contains all the information already being present in
    docs/process/tags.pandoc remove that file.
    
    The "Reviewed-by:" and "Acked-by:" tags are expanded to allow an
    optional restriction of the tag.
    
    A new tag "Origin:" is added to tag patches taken from another project.
    
    Signed-off-by: Juergen Gross <jgross@suse.com>
    Acked-by: Jan Beulich <jbeulich@suse.com>
    Reviewed-by: Julien Grall <jgrall@amazon.com>
(qemu changes not included)


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 13:29:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 13:29:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283376.482357 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPlVq-0003bp-NY; Thu, 03 Mar 2022 13:28:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283376.482357; Thu, 03 Mar 2022 13:28:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPlVq-0003bi-KY; Thu, 03 Mar 2022 13:28:58 +0000
Received: by outflank-mailman (input) for mailman id 283376;
 Thu, 03 Mar 2022 13:28:57 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPlVp-0003bV-Cu; Thu, 03 Mar 2022 13:28:57 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPlVp-0005pc-BI; Thu, 03 Mar 2022 13:28:57 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPlVp-0001kK-2q; Thu, 03 Mar 2022 13:28:57 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPlVp-0003us-2Q; Thu, 03 Mar 2022 13:28:57 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=2lzWie4HPEO+f9nYCd1rM/9E7aQz87JvzSYBerpEL4I=; b=cX/0CD71hudayY2eTMFiGRxeVW
	jNQI7XLyk+kLX73cE2hRguhQ1T0I3HFIogZfsVz5Jh7NpWQRQN94S6FwuD/hp553uVEF2FkW9BX7g
	zkLXaCxR1k2Eg3LPRcndcWicfn2QBFDwqeZIcdUYh/BBbEV9cmLzO2Dg8DSEMTsAWDCo=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168366-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168366: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=589d51df260465e2561979b8a988e77b0f32a6e8
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 03 Mar 2022 13:28:57 +0000

flight 168366 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168366/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 589d51df260465e2561979b8a988e77b0f32a6e8
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    3 days
Failing since        168258  2022-03-01 01:55:31 Z    2 days   23 attempts
Testing same since   168359  2022-03-03 10:41:39 Z    0 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 589d51df260465e2561979b8a988e77b0f32a6e8
Author: Sean Rhodes <sean@starlabs.systems>
Date:   Thu Feb 24 19:38:18 2022 +0800

    MdeModulePkg/Usb/Keyboard.c: Don't request protocol before setting
    
    No need to check the interface protocol then conditionally setting,
    just set it to BOOT_PROTOCOL and check for error.
    
    This is what Linux does for HID devices as some don't follow the USB spec.
    One example is the Aspeed BMC HID keyboard device, which adds a massive
    boot delay without this patch as it doesn't respond to
    'GetProtocolRequest'.
    
    Cc: Hao A Wu <hao.a.wu@intel.com>
    Cc: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Matt DeVillier <matt.devillier@gmail.com>
    Signed-off-by: Patrick Rudolph <patrick.rudolph@9elements.com>
    Signed-off-by: Sean Rhodes <sean@starlabs.systems>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit b422b0fcf92dd4103dfc16d8d5f77fbec2d8c5b9
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Tue Feb 22 11:29:23 2022 +0800

    EmulatorPkg/EmuGopDxe: Set ModeInfo after Open successfully
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2668
    
    WindowOpen will fail in some case. for example, without XServer.
    
    Shouldn't set ModeInfo in this case to avoid the caller use it
    incorrectly
    
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 906242343f7a654402f6f999d447aa9d29a8f4d4
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sun Feb 20 14:53:01 2022 +0800

    MdeModulePkg/GraphicsConsoleDxe: Check status to make sure no error
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2668
    
    SetMode will fail in some case. for example, without XServer.
    Should handle these case when SetMode fail.
    
    If we don't handle it, it will Segmentation fault.
    
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit dc39554d58af4a50b50eca1f57c49415a12b0c98
Author: Xiaolu.Jiang <xiaolu.jiang@intel.com>
Date:   Tue Feb 22 22:14:05 2022 +0800

    edk2/MdeModulePkg/Debuglib: Add Standalone MM support
    
    https://bugzilla.tianocore.org/show_bug.cgi?id=3844
    
    This change added Standalone MM instance of DebugLib.
    
    Reviewd-by: Jian J Wang <jian.j.wang@intel.com>
    Reviewd-by: Liming Gao <gaoliming@byosoft.com.cn>
    
    Signed-off-by: Xiaolu.Jiang <xiaolu.jiang@intel.com>

commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 14:50:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 14:50:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283394.482391 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPmmP-0004uf-6a; Thu, 03 Mar 2022 14:50:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283394.482391; Thu, 03 Mar 2022 14:50:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPmmP-0004uY-3J; Thu, 03 Mar 2022 14:50:09 +0000
Received: by outflank-mailman (input) for mailman id 283394;
 Thu, 03 Mar 2022 14:50:08 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPmmO-0004uO-H7; Thu, 03 Mar 2022 14:50:08 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPmmO-0007FH-8m; Thu, 03 Mar 2022 14:50:08 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPmmO-0005aT-2T; Thu, 03 Mar 2022 14:50:08 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPmmO-0006Jg-1z; Thu, 03 Mar 2022 14:50:08 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=3I6jXd4/29Y+iJDwinulDNVWL0XeTv1INkBfljq7hM8=; b=CbWwE+KnzfDpER/5SFYZ1NF3ba
	q4uGp41jpyMyQpx45TuJc3EmXp3FczUzFO1pOrS9a82/3wrKGnpBf9JdBXzRUFdiRiGIb2sqpojBY
	ARHDz7H6QScklaE7TW7qd+4B6SFnXf2oADzNVzuNMOLp/+qyVUcbFaDk6COYHUzRqxTY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168372-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168372: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=589d51df260465e2561979b8a988e77b0f32a6e8
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 03 Mar 2022 14:50:08 +0000

flight 168372 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168372/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 589d51df260465e2561979b8a988e77b0f32a6e8
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    3 days
Failing since        168258  2022-03-01 01:55:31 Z    2 days   24 attempts
Testing same since   168359  2022-03-03 10:41:39 Z    0 days    4 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 589d51df260465e2561979b8a988e77b0f32a6e8
Author: Sean Rhodes <sean@starlabs.systems>
Date:   Thu Feb 24 19:38:18 2022 +0800

    MdeModulePkg/Usb/Keyboard.c: Don't request protocol before setting
    
    No need to check the interface protocol then conditionally setting,
    just set it to BOOT_PROTOCOL and check for error.
    
    This is what Linux does for HID devices as some don't follow the USB spec.
    One example is the Aspeed BMC HID keyboard device, which adds a massive
    boot delay without this patch as it doesn't respond to
    'GetProtocolRequest'.
    
    Cc: Hao A Wu <hao.a.wu@intel.com>
    Cc: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Matt DeVillier <matt.devillier@gmail.com>
    Signed-off-by: Patrick Rudolph <patrick.rudolph@9elements.com>
    Signed-off-by: Sean Rhodes <sean@starlabs.systems>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit b422b0fcf92dd4103dfc16d8d5f77fbec2d8c5b9
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Tue Feb 22 11:29:23 2022 +0800

    EmulatorPkg/EmuGopDxe: Set ModeInfo after Open successfully
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2668
    
    WindowOpen will fail in some case. for example, without XServer.
    
    Shouldn't set ModeInfo in this case to avoid the caller use it
    incorrectly
    
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 906242343f7a654402f6f999d447aa9d29a8f4d4
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sun Feb 20 14:53:01 2022 +0800

    MdeModulePkg/GraphicsConsoleDxe: Check status to make sure no error
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2668
    
    SetMode will fail in some case. for example, without XServer.
    Should handle these case when SetMode fail.
    
    If we don't handle it, it will Segmentation fault.
    
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit dc39554d58af4a50b50eca1f57c49415a12b0c98
Author: Xiaolu.Jiang <xiaolu.jiang@intel.com>
Date:   Tue Feb 22 22:14:05 2022 +0800

    edk2/MdeModulePkg/Debuglib: Add Standalone MM support
    
    https://bugzilla.tianocore.org/show_bug.cgi?id=3844
    
    This change added Standalone MM instance of DebugLib.
    
    Reviewd-by: Jian J Wang <jian.j.wang@intel.com>
    Reviewd-by: Liming Gao <gaoliming@byosoft.com.cn>
    
    Signed-off-by: Xiaolu.Jiang <xiaolu.jiang@intel.com>

commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 14:54:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 14:54:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283405.482402 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPmqg-0005XC-Ls; Thu, 03 Mar 2022 14:54:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283405.482402; Thu, 03 Mar 2022 14:54:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPmqg-0005X5-Hz; Thu, 03 Mar 2022 14:54:34 +0000
Received: by outflank-mailman (input) for mailman id 283405;
 Thu, 03 Mar 2022 14:54:33 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=GOOP=TO=santannapisa.it=Andrea.Stevanato@srs-se1.protection.inumbo.net>)
 id 1nPmqe-0005Wz-On
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 14:54:33 +0000
Received: from EUR01-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur01on0621.outbound.protection.outlook.com
 [2a01:111:f400:fe02::621])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d3bf0e45-9b01-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 15:54:30 +0100 (CET)
Received: from DB7PR03MB5002.eurprd03.prod.outlook.com (2603:10a6:10:74::22)
 by PR3PR03MB6634.eurprd03.prod.outlook.com (2603:10a6:102:7d::18) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 14:54:27 +0000
Received: from DB7PR03MB5002.eurprd03.prod.outlook.com
 ([fe80::746a:e27:47ff:3e90]) by DB7PR03MB5002.eurprd03.prod.outlook.com
 ([fe80::746a:e27:47ff:3e90%7]) with mapi id 15.20.5038.015; Thu, 3 Mar 2022
 14:54:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d3bf0e45-9b01-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=IwdSq4JHCRv6+PM5EDt3NHHrzbI4JnF1iItf4rCfyTPP/7AN3s6Y8+Pqg0USYbxjEhxydf7zYgB/4TCe9gaPAdcHf+xzwzlKdCR/JNx2yBnNIoAC+Bkw/gf0DKn0cyRbQGpZL6jwD44O0ZvRDxeWmBgz5wOgUGQ2MQtH+UvhhrUosGIitFw5kOBKhOX8/QLKAc+64NMlt2KC/gOfwLkHitdNYnVxNfEzxy1SRZ6NrtQq/QF3ZpVZv+buvgcNWgeO/jkXS3UMndLk/KE5lA+PQENoci+1P9jiETW5NlhUSimJoGTOK7SFur+RN7xVMmmotLDUUr4VGd2obHTpg1VU2g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=UunJEetloyMh7rCIYjzvirMbz13ExSe++WoIbmllPOQ=;
 b=h4CRLvECpyy7HN3+LXB+vQBkHzFr6FurryY97hzgPrVglXe+O7TwvMHeoyVSmt+FBKdBrKHcyASis71MlP7BDPYqZ5LpapbHLbEJTou8GRLtd5ExutZDO7hqIr+439KtUuj49D5nPTax88oXbOREriyIyJ00pIOe+f5/5M3jKlW7QFiIg4ASxn/SivFn0H84ysXqhneaWmXwHF0dE0nDoxgcheM2pSt9Gbk+cFRJM6UnC28oPzg92sl8lP/KpwKGL2TAoN1DFD7+Ac3cS9z3myQAiWEc3ktcWWn7qw8gHWzJee4E8bes296EjFZH7FdXY8XL5rbK129aqefSY8ol1w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=santannapisa.it; dmarc=pass action=none
 header.from=santannapisa.it; dkim=pass header.d=santannapisa.it; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=santannapisa.it;
 s=selector1;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=UunJEetloyMh7rCIYjzvirMbz13ExSe++WoIbmllPOQ=;
 b=KW1MFLuYY90fvAbC/m2AtCHQk5AikQJgfonn1uOqrS+bnsd0SG/Ehn0E4Pxdx32G+DLexFC4//c9ZJi1ZnXVoZ/JXjRUyhRpAU8Jyqgqkig4fO4O8U/hqT+JLWyyZYbjN8mVwMzcIgdsekO+rgKmNICZP1vmXu4WGJad1/YGRHc=
From: Andrea Stevanato <Andrea.Stevanato@santannapisa.it>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
CC: "roger.pau@citrix.com" <roger.pau@citrix.com>, "ian.jackson@eu.citrix.com"
	<ian.jackson@eu.citrix.com>, "wl@xen.org" <wl@xen.org>
Subject: Network driver domain broken
Thread-Topic: Network driver domain broken
Thread-Index: AQHYLw1qzygpamMN3EyejpXz6IEhzA==
Date: Thu, 3 Mar 2022 14:54:27 +0000
Message-ID:
 <DB7PR03MB50027EE92E11BFFF71AADC4598049@DB7PR03MB5002.eurprd03.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
suggested_attachment_session_id: eaa5c839-fc2d-33ff-55c0-aaead7f8ad6f
authentication-results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=santannapisa.it;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 1f0e5251-ab22-4f61-9f89-08d9fd25b6bf
x-ms-traffictypediagnostic: PR3PR03MB6634:EE_
x-microsoft-antispam-prvs:
 <PR3PR03MB66345B91E46157157B2DFA2D98049@PR3PR03MB6634.eurprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info:
 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
x-forefront-antispam-report:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DB7PR03MB5002.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(55016003)(86362001)(122000001)(508600001)(2906002)(83380400001)(38100700002)(71200400001)(8936002)(54906003)(786003)(91956017)(316002)(38070700005)(186003)(26005)(6916009)(3480700007)(76116006)(4326008)(5660300002)(64756008)(6506007)(30864003)(8676002)(52536014)(33656002)(9686003)(7696005)(66946007)(66476007)(66446008)(66556008)(579004);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0:
 =?iso-8859-1?Q?+42mLBsf68dHkTeoDkStaECs+1SC413FR6LkDKBZhhcDvIOaY6gByJ76jC?=
 =?iso-8859-1?Q?SSMVU/yY5IXPC8NEcq8RZDEx0XM+s/vj8lPNJFvWwfeVaTaGXAzpAjXSac?=
 =?iso-8859-1?Q?2S7YVCH9goMwOrcWtypsOuoemvZLxLohPJeAwbafsvQIAAdh7nVel9grNs?=
 =?iso-8859-1?Q?r6z7zvtoUQI3GrdnbuVWpwWrrn1uB/Rq0hPqP9yaWCmfLpwWU93iUe4aNi?=
 =?iso-8859-1?Q?H0UXJjacMzw00IDorMDUT7gmOkXYCnKwIpBUjDtnqfwn8E9soOwRSpsGQ1?=
 =?iso-8859-1?Q?EqC4ND7z55YSICRb+DGDj4f/xxk92+Yh1zonSO+bZOxyYFKA12UHJox46k?=
 =?iso-8859-1?Q?UZShUbHt0Fzy1no2h4bjoILI9ydO130LDo3dZ6780Q75f3WuhkdKmrc1Lz?=
 =?iso-8859-1?Q?3cMvXfijp2M9DJtoq5kLZJs+jASmD72Duo0nBII26y4x0af3DOm1ZVc7dp?=
 =?iso-8859-1?Q?Lq3SR+v2ADkzgzy6wmUq6mxU/KB7BWoZ5jGNX6DqvPNcTP+0PbYSql3MqM?=
 =?iso-8859-1?Q?BmelWsEuyfncR2CH53qZPcql3qLREOmvbyeQyPu7Xbr9TRhRbpouTnOsxP?=
 =?iso-8859-1?Q?2GTnwNzioT2Uh9xf+H4zQG30cA441WGOcyAlteF6PfZnurD0zYqUtiGZfW?=
 =?iso-8859-1?Q?1C8XJKBNUlYtm6a2ZuGQDAVKHOJDIAZ/AKKIHbPM0zO3iCogU/Rvm2xF1C?=
 =?iso-8859-1?Q?8ysSGICzHrYhZX1ZFcvaTZ/NGHP5eYuLfWabzxmf7QOS4XIEHMa79Lg9hZ?=
 =?iso-8859-1?Q?ouphRuxzu3SYeSxz/t97875/YhffgUmDEOHP5qkf4XrHuHftx1G0Sqh7/y?=
 =?iso-8859-1?Q?m2soCldmbDpJV1XfXoSuddEwn3UnT8CGIKBnuVRxZNQaQ+ghDYv2iS5c9H?=
 =?iso-8859-1?Q?HVekGnoGKgL/ocu/G4QW80I8iI0N6RfmzHam0Li33dc56FYb9OoIE12bB9?=
 =?iso-8859-1?Q?H65H3CsWLLUfvg8PhfW5IhRi1Yl+wUYMEiCHgkrcf/1tK7npEAacSZIGRa?=
 =?iso-8859-1?Q?pZJOgQGeovrUS+hPzSuTA97gITlb1TmlyFgfxlKm319m4GCZRQ7Br7/BrW?=
 =?iso-8859-1?Q?Zhy8tPM5gZ2REcsU6JlYzAZXGZuP3M4s2dxGUyHOHxcUP6bjDhvletwWY0?=
 =?iso-8859-1?Q?u9zybJO8pWIOmLB2931BBWlG/Gh+L1vFCxTau1Q8Pgg6p/kGGLis57SJC+?=
 =?iso-8859-1?Q?s9MaYHrOI2pjcqcWe/lucTo+J2FcrK/X9RH/U88Vm9X/cR1T+e3LiVCtEE?=
 =?iso-8859-1?Q?Eu2yxG9rZzmqI7T6MUWarLSA6SSVdSU4JpkonUPDTpqylGqdpghRA2NdjE?=
 =?iso-8859-1?Q?qjq7yiUHEHaAcpQl1fUkU4h3oBhTDAkme7eiEB7rhk+Is9Ty2iIWe3RANG?=
 =?iso-8859-1?Q?fRjsukGZbGHwUF245T9TYjnuMeujdoAj7ZIefbDXBg95APm7EAvqykV/eo?=
 =?iso-8859-1?Q?CrtdZY/9mr/ffreqvSQ0hznislDHPr1pCsTWPBt1hhXjtJK/jt8w9dag1b?=
 =?iso-8859-1?Q?UMbtAreHPrUVkkpGOWjZ/V1w2V3KS9FG2huIA9rFh7vRKVzoW0qDl2TrPJ?=
 =?iso-8859-1?Q?xZsH1uvl7wmaPGBaOF0HMMyn7kkXKJLDYEaowpWw1We4gF+bKp2liic7tl?=
 =?iso-8859-1?Q?WUr2NCjvuJOHbOj0aIj+QlLgrhvuhD7RNJxqWP3pKe+a1u2NebvAf7SVyb?=
 =?iso-8859-1?Q?Y6RtRHukOk2ngx6E2cR4lP1AtPFQ5EJwCEGfPkK412p4XdOWQGa5CgB7QY?=
 =?iso-8859-1?Q?noIXR3hswJIppPk/PKmfKlip529TBiBEslPLcnf6ZgZcUp?=
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: santannapisa.it
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DB7PR03MB5002.eurprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1f0e5251-ab22-4f61-9f89-08d9fd25b6bf
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Mar 2022 14:54:27.0795
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: d97360e3-138d-4b5f-956f-a646c364a01e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ypOusGcm2NEhGljRNeaHKA9xY2wdUsOY+BLh8PFCV40mMmQKRG0V4OP3g2jfqB6uuwoLGqlYeELa5HicmtsHRSeHgt1ecHpeay64l6JSv85/MdtwvACr4Npxgeq8nmQp
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PR3PR03MB6634

Hi all,=0A=
=0A=
according to the conversation that I had with royger, aa67b97ed34=A0 broke =
the driver domain support.=0A=
=0A=
What I'm trying to do is to setup networking between guests using driver do=
main. Therefore, the guest (driver) has been started with the following cfg=
.=0A=
=0A=
name =A0 =A0=3D "guest0"=0A=
=0A=
=0A=
kernel =A0=3D "/media/sd-mmcblk0p1/Image"=0A=
=0A=
=0A=
ramdisk =3D "/media/sd-mmcblk0p1/rootfs.cpio.gz"=0A=
=0A=
=0A=
extra =A0 =3D "console=3Dhvc0 rdinit=3D/sbin/init root=3D/dev/ram0"=0A=
=0A=
=0A=
memory =A0=3D 1024=0A=
=0A=
vcpus =A0 =3D 2=0A=
driver_domain =3D 1=0A=
=0A=
On guest0 I created the bridge, assigned a static IP and started the udhcpd=
 on xenbr0 interface.=0A=
While the second guest has been started with the following cfg:=0A=
=0A=
name =A0 =A0=3D "guest1"=0A=
=0A=
=0A=
kernel =A0=3D "/media/sd-mmcblk0p1/Image"=0A=
=0A=
=0A=
ramdisk =3D "/media/sd-mmcblk0p1/rootfs.cpio.gz"=0A=
=0A=
=0A=
extra =A0 =3D "console=3Dhvc0 rdinit=3D/sbin/init root=3D/dev/ram0"=0A=
=0A=
=0A=
memory =A0=3D 1024 vcpus =A0 =3D 2=0A=
vcpus =A0 =3D 2=0A=
vif =3D [ 'bridge=3Dxenbr0, backend=3Dguest0' ]=0A=
=0A=
Follows the result of strace xl devd:=0A=
=0A=
# strace xl devd=0A=
execve("/usr/sbin/xl", ["xl", "devd"], 0xffffdf0420c8 /* 13 vars */) =3D 0=
=0A=
brk(NULL)                               =3D 0xaaaaeaf3b000=0A=
faccessat(AT_FDCWD, "/etc/ld.so.preload", R_OK) =3D -1 ENOENT (No such file=
 or directory)=0A=
openat(AT_FDCWD, "/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) =3D 3=0A=
fstat(3, {st_mode=3DS_IFREG|0644, st_size=3D7840, ...}) =3D 0=0A=
mmap(NULL, 7840, PROT_READ, MAP_PRIVATE, 3, 0) =3D 0xffff9f45e000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/usr/lib/libxlutil.so.4.14", O_RDONLY|O_CLOEXEC) =3D 3=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\0200\0\0\0\0\0\0=
"..., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D68168, ...}) =3D 0=0A=
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
=3D 0xffff9f45c000=0A=
mmap(NULL, 131784, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =
=3D 0xffff9f410000=0A=
mprotect(0xffff9f41f000, 65536, PROT_NONE) =3D 0=0A=
mmap(0xffff9f42f000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_=
DENYWRITE, 3, 0xf000) =3D 0xffff9f42f000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/usr/lib/libxenlight.so.4.14", O_RDONLY|O_CLOEXEC) =3D 3=
=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0`\16\2\0\0\0\0\0"=
..., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D861848, ...}) =3D 0=0A=
mmap(NULL, 925752, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =
=3D 0xffff9f32d000=0A=
mprotect(0xffff9f3fa000, 61440, PROT_NONE) =3D 0=0A=
mmap(0xffff9f409000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP=
_DENYWRITE, 3, 0xcc000) =3D 0xffff9f409000=0A=
mmap(0xffff9f40f000, 56, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_AN=
ONYMOUS, -1, 0) =3D 0xffff9f40f000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/usr/lib/libxentoollog.so.1", O_RDONLY|O_CLOEXEC) =3D 3=
=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0P\r\0\0\0\0\0\0".=
.., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D10368, ...}) =3D 0=0A=
mmap(NULL, 73904, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =3D=
 0xffff9f31a000=0A=
mprotect(0xffff9f31c000, 61440, PROT_NONE) =3D 0=0A=
mmap(0xffff9f32b000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_=
DENYWRITE, 3, 0x1000) =3D 0xffff9f32b000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/usr/lib/libyajl.so.2", O_RDONLY|O_CLOEXEC) =3D 3=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\320\22\0\0\0\0\0=
\0"..., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D38728, ...}) =3D 0=0A=
mmap(NULL, 102416, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =
=3D 0xffff9f300000=0A=
mprotect(0xffff9f309000, 61440, PROT_NONE) =3D 0=0A=
mmap(0xffff9f318000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_=
DENYWRITE, 3, 0x8000) =3D 0xffff9f318000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/lib/libpthread.so.0", O_RDONLY|O_CLOEXEC) =3D 3=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\300j\0\0\0\0\0\0=
"..., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D113184, ...}) =3D 0=0A=
mmap(NULL, 192872, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =
=3D 0xffff9f2d0000=0A=
mprotect(0xffff9f2ea000, 65536, PROT_NONE) =3D 0=0A=
mmap(0xffff9f2fa000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_=
DENYWRITE, 3, 0x1a000) =3D 0xffff9f2fa000=0A=
mmap(0xffff9f2fc000, 12648, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP=
_ANONYMOUS, -1, 0) =3D 0xffff9f2fc000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/lib/libc.so.6", O_RDONLY|O_CLOEXEC) =3D 3=0A=
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\320I\2\0\0\0\0\0=
"..., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D1428872, ...}) =3D 0=0A=
mmap(NULL, 1502000, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =
=3D 0xffff9f161000=0A=
mprotect(0xffff9f2b8000, 61440, PROT_NONE) =3D 0=0A=
mmap(0xffff9f2c7000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP=
_DENYWRITE, 3, 0x156000) =3D 0xffff9f2c7000=0A=
mmap(0xffff9f2cd000, 11056, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP=
_ANONYMOUS, -1, 0) =3D 0xffff9f2cd000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/usr/lib/libxenevtchn.so.1", O_RDONLY|O_CLOEXEC) =3D 3=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0@\f\0\0\0\0\0\0".=
.., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D10240, ...}) =3D 0=0A=
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
=3D 0xffff9f45a000=0A=
mmap(NULL, 73856, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =3D=
 0xffff9f14e000=0A=
mprotect(0xffff9f150000, 61440, PROT_NONE) =3D 0=0A=
mmap(0xffff9f15f000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_=
DENYWRITE, 3, 0x1000) =3D 0xffff9f15f000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/usr/lib/libxenctrl.so.4.14", O_RDONLY|O_CLOEXEC) =3D 3=
=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0000\203\0\0\0\0\0=
\0"..., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D154752, ...}) =3D 0=0A=
mmap(NULL, 218504, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =
=3D 0xffff9f118000=0A=
mprotect(0xffff9f13d000, 61440, PROT_NONE) =3D 0=0A=
mmap(0xffff9f14c000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_=
DENYWRITE, 3, 0x24000) =3D 0xffff9f14c000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/usr/lib/libxenguest.so.4.14", O_RDONLY|O_CLOEXEC) =3D 3=
=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0PB\0\0\0\0\0\0"..=
., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D77248, ...}) =3D 0=0A=
mmap(NULL, 140880, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =
=3D 0xffff9f0f5000=0A=
mprotect(0xffff9f107000, 61440, PROT_NONE) =3D 0=0A=
mmap(0xffff9f116000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_=
DENYWRITE, 3, 0x11000) =3D 0xffff9f116000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/usr/lib/libxenhypfs.so.1", O_RDONLY|O_CLOEXEC) =3D 3=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\300\16\0\0\0\0\0=
\0"..., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D14432, ...}) =3D 0=0A=
mmap(NULL, 78048, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =3D=
 0xffff9f0e1000=0A=
mprotect(0xffff9f0e3000, 65536, PROT_NONE) =3D 0=0A=
mmap(0xffff9f0f3000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_=
DENYWRITE, 3, 0x2000) =3D 0xffff9f0f3000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/usr/lib/libxenstore.so.3.0", O_RDONLY|O_CLOEXEC) =3D 3=
=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0 $\0\0\0\0\0\0"..=
., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D31176, ...}) =3D 0=0A=
mmap(NULL, 107088, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =
=3D 0xffff9f0c6000=0A=
mprotect(0xffff9f0cc000, 65536, PROT_NONE) =3D 0=0A=
mmap(0xffff9f0dc000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_=
DENYWRITE, 3, 0x6000) =3D 0xffff9f0dc000=0A=
mmap(0xffff9f0de000, 8784, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_=
ANONYMOUS, -1, 0) =3D 0xffff9f0de000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) =3D 3=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0@\20\0\0\0\0\0\0"=
..., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D14296, ...}) =3D 0=0A=
mmap(NULL, 77920, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =3D=
 0xffff9f0b2000=0A=
mprotect(0xffff9f0b5000, 61440, PROT_NONE) =3D 0=0A=
mmap(0xffff9f0c4000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_=
DENYWRITE, 3, 0x2000) =3D 0xffff9f0c4000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/usr/lib/libxentoolcore.so.1", O_RDONLY|O_CLOEXEC) =3D 3=
=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0 \10\0\0\0\0\0\0"=
..., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D6104, ...}) =3D 0=0A=
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
=3D 0xffff9f458000=0A=
mmap(NULL, 69768, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =3D=
 0xffff9f0a0000=0A=
mprotect(0xffff9f0a1000, 61440, PROT_NONE) =3D 0=0A=
mmap(0xffff9f0b0000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_=
DENYWRITE, 3, 0) =3D 0xffff9f0b0000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/lib/libutil.so.1", O_RDONLY|O_CLOEXEC) =3D 3=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0`\21\0\0\0\0\0\0"=
..., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D14296, ...}) =3D 0=0A=
mmap(NULL, 77840, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =3D=
 0xffff9f08c000=0A=
mprotect(0xffff9f08e000, 65536, PROT_NONE) =3D 0=0A=
mmap(0xffff9f09e000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_=
DENYWRITE, 3, 0x2000) =3D 0xffff9f09e000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/lib/libuuid.so.1", O_RDONLY|O_CLOEXEC) =3D 3=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0000\30\0\0\0\0\0\=
0"..., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D30680, ...}) =3D 0=0A=
mmap(NULL, 94240, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =3D=
 0xffff9f074000=0A=
mprotect(0xffff9f07a000, 65536, PROT_NONE) =3D 0=0A=
mmap(0xffff9f08a000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_=
DENYWRITE, 3, 0x6000) =3D 0xffff9f08a000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/usr/lib/libnl-route-3.so.200", O_RDONLY|O_CLOEXEC) =3D 3=
=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\200\327\1\0\0\0\=
0\0"..., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D536688, ...}) =3D 0=0A=
mmap(NULL, 609024, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =
=3D 0xffff9efdf000=0A=
mprotect(0xffff9f05a000, 65536, PROT_NONE) =3D 0=0A=
mmap(0xffff9f06a000, 32768, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP=
_DENYWRITE, 3, 0x7b000) =3D 0xffff9f06a000=0A=
mmap(0xffff9f072000, 6912, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_=
ANONYMOUS, -1, 0) =3D 0xffff9f072000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/usr/lib/libnl-3.so.200", O_RDONLY|O_CLOEXEC) =3D 3=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\360\221\0\0\0\0\=
0\0"..., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D141304, ...}) =3D 0=0A=
mmap(NULL, 205192, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =
=3D 0xffff9efac000=0A=
mprotect(0xffff9efcd000, 61440, PROT_NONE) =3D 0=0A=
mmap(0xffff9efdc000, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP=
_DENYWRITE, 3, 0x20000) =3D 0xffff9efdc000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/lib/librt.so.1", O_RDONLY|O_CLOEXEC) =3D 3=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\0#\0\0\0\0\0\0".=
.., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D31032, ...}) =3D 0=0A=
mmap(NULL, 94568, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =3D=
 0xffff9ef94000=0A=
mprotect(0xffff9ef9b000, 61440, PROT_NONE) =3D 0=0A=
mmap(0xffff9efaa000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_=
DENYWRITE, 3, 0x6000) =3D 0xffff9efaa000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/usr/lib/libfdt.so.1", O_RDONLY|O_CLOEXEC) =3D 3=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0000#\0\0\0\0\0\0"=
..., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D38800, ...}) =3D 0=0A=
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
=3D 0xffff9f456000=0A=
mmap(NULL, 102416, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =
=3D 0xffff9ef7a000=0A=
mprotect(0xffff9ef83000, 61440, PROT_NONE) =3D 0=0A=
mmap(0xffff9ef92000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_=
DENYWRITE, 3, 0x8000) =3D 0xffff9ef92000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/usr/lib/libxengnttab.so.1", O_RDONLY|O_CLOEXEC) =3D 3=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0`\20\0\0\0\0\0\0"=
..., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D14368, ...}) =3D 0=0A=
mmap(NULL, 77984, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =3D=
 0xffff9ef66000=0A=
mprotect(0xffff9ef69000, 61440, PROT_NONE) =3D 0=0A=
mmap(0xffff9ef78000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_=
DENYWRITE, 3, 0x2000) =3D 0xffff9ef78000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/usr/lib/libxencall.so.1", O_RDONLY|O_CLOEXEC) =3D 3=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\320\17\0\0\0\0\0=
\0"..., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D14400, ...}) =3D 0=0A=
mmap(NULL, 78064, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =3D=
 0xffff9ef52000=0A=
mprotect(0xffff9ef55000, 61440, PROT_NONE) =3D 0=0A=
mmap(0xffff9ef64000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_=
DENYWRITE, 3, 0x2000) =3D 0xffff9ef64000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/usr/lib/libxenforeignmemory.so.1", O_RDONLY|O_CLOEXEC) =
=3D 3=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0000\16\0\0\0\0\0\=
0"..., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D14392, ...}) =3D 0=0A=
mmap(NULL, 78000, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =3D=
 0xffff9ef3e000=0A=
mprotect(0xffff9ef40000, 65536, PROT_NONE) =3D 0=0A=
mmap(0xffff9ef50000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_=
DENYWRITE, 3, 0x2000) =3D 0xffff9ef50000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/usr/lib/libxendevicemodel.so.1", O_RDONLY|O_CLOEXEC) =3D=
 3=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0`\23\0\0\0\0\0\0"=
..., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D14400, ...}) =3D 0=0A=
mmap(NULL, 78008, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =3D=
 0xffff9ef2a000=0A=
mprotect(0xffff9ef2d000, 61440, PROT_NONE) =3D 0=0A=
mmap(0xffff9ef3c000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_=
DENYWRITE, 3, 0x2000) =3D 0xffff9ef3c000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/usr/lib/libbz2.so.1", O_RDONLY|O_CLOEXEC) =3D 3=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\320\27\0\0\0\0\0=
\0"..., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D70472, ...}) =3D 0=0A=
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
=3D 0xffff9f454000=0A=
mmap(NULL, 134160, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =
=3D 0xffff9ef09000=0A=
mprotect(0xffff9ef19000, 61440, PROT_NONE) =3D 0=0A=
mmap(0xffff9ef28000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_=
DENYWRITE, 3, 0xf000) =3D 0xffff9ef28000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/usr/lib/liblzma.so.5", O_RDONLY|O_CLOEXEC) =3D 3=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\3403\0\0\0\0\0\0=
"..., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D153496, ...}) =3D 0=0A=
mmap(NULL, 217104, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =
=3D 0xffff9eed3000=0A=
mprotect(0xffff9eef7000, 65536, PROT_NONE) =3D 0=0A=
mmap(0xffff9ef07000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_=
DENYWRITE, 3, 0x24000) =3D 0xffff9ef07000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/usr/lib/liblzo2.so.2", O_RDONLY|O_CLOEXEC) =3D 3=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\320&\0\0\0\0\0\0=
"..., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D120648, ...}) =3D 0=0A=
mmap(NULL, 184336, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =
=3D 0xffff9eea5000=0A=
mprotect(0xffff9eec2000, 61440, PROT_NONE) =3D 0=0A=
mmap(0xffff9eed1000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_=
DENYWRITE, 3, 0x1c000) =3D 0xffff9eed1000=0A=
close(3)                                =3D 0=0A=
openat(AT_FDCWD, "/lib/libz.so.1", O_RDONLY|O_CLOEXEC) =3D 3=0A=
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\360%\0\0\0\0\0\0=
"..., 832) =3D 832=0A=
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D92056, ...}) =3D 0=0A=
mmap(NULL, 155664, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =
=3D 0xffff9ee7e000=0A=
mprotect(0xffff9ee93000, 65536, PROT_NONE) =3D 0=0A=
mmap(0xffff9eea3000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_=
DENYWRITE, 3, 0x15000) =3D 0xffff9eea3000=0A=
close(3)                                =3D 0=0A=
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
=3D 0xffff9ee7c000=0A=
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
=3D 0xffff9ee7a000=0A=
mprotect(0xffff9f2c7000, 12288, PROT_READ) =3D 0=0A=
mprotect(0xffff9eea3000, 4096, PROT_READ) =3D 0=0A=
mprotect(0xffff9eed1000, 4096, PROT_READ) =3D 0=0A=
mprotect(0xffff9f2fa000, 4096, PROT_READ) =3D 0=0A=
mprotect(0xffff9ef07000, 4096, PROT_READ) =3D 0=0A=
mprotect(0xffff9ef28000, 4096, PROT_READ) =3D 0=0A=
mprotect(0xffff9f32b000, 4096, PROT_READ) =3D 0=0A=
mprotect(0xffff9f0b0000, 4096, PROT_READ) =3D 0=0A=
mprotect(0xffff9ef64000, 4096, PROT_READ) =3D 0=0A=
mprotect(0xffff9ef3c000, 4096, PROT_READ) =3D 0=0A=
mprotect(0xffff9ef50000, 4096, PROT_READ) =3D 0=0A=
mprotect(0xffff9ef78000, 4096, PROT_READ) =3D 0=0A=
mprotect(0xffff9ef92000, 4096, PROT_READ) =3D 0=0A=
mprotect(0xffff9efaa000, 4096, PROT_READ) =3D 0=0A=
mprotect(0xffff9efdc000, 8192, PROT_READ) =3D 0=0A=
mprotect(0xffff9f06a000, 16384, PROT_READ) =3D 0=0A=
mprotect(0xffff9f08a000, 4096, PROT_READ) =3D 0=0A=
mprotect(0xffff9f09e000, 4096, PROT_READ) =3D 0=0A=
mprotect(0xffff9f0c4000, 4096, PROT_READ) =3D 0=0A=
mprotect(0xffff9f0dc000, 4096, PROT_READ) =3D 0=0A=
mprotect(0xffff9f0f3000, 4096, PROT_READ) =3D 0=0A=
mprotect(0xffff9f15f000, 4096, PROT_READ) =3D 0=0A=
mprotect(0xffff9f14c000, 4096, PROT_READ) =3D 0=0A=
mprotect(0xffff9f116000, 4096, PROT_READ) =3D 0=0A=
mprotect(0xffff9f318000, 4096, PROT_READ) =3D 0=0A=
mprotect(0xffff9f409000, 8192, PROT_READ) =3D 0=0A=
mprotect(0xffff9f42f000, 4096, PROT_READ) =3D 0=0A=
mprotect(0xaaaabaa10000, 4096, PROT_READ) =3D 0=0A=
mprotect(0xffff9f463000, 4096, PROT_READ) =3D 0=0A=
munmap(0xffff9f45e000, 7840)            =3D 0=0A=
set_tid_address(0xffff9ee7a0e0)         =3D 813=0A=
set_robust_list(0xffff9ee7a0f0, 24)     =3D 0=0A=
rt_sigaction(SIGRTMIN, {sa_handler=3D0xffff9f2d6570, sa_mask=3D[], sa_flags=
=3DSA_SIGINFO}, NULL, 8) =3D 0=0A=
rt_sigaction(SIGRT_1, {sa_handler=3D0xffff9f2d6630, sa_mask=3D[], sa_flags=
=3DSA_RESTART|SA_SIGINFO}, NULL, 8) =3D 0=0A=
rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) =3D 0=0A=
prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=3D8192*1024, rlim_max=3DRLIM64_I=
NFINITY}) =3D 0=0A=
brk(NULL)                               =3D 0xaaaaeaf3b000=0A=
brk(0xaaaaeaf5c000)                     =3D 0xaaaaeaf5c000=0A=
newfstatat(AT_FDCWD, "/etc/libnl/classid", {st_mode=3DS_IFREG|0644, st_size=
=3D1130, ...}, 0) =3D 0=0A=
openat(AT_FDCWD, "/etc/libnl/classid", O_RDONLY|O_CLOEXEC) =3D 3=0A=
fstat(3, {st_mode=3DS_IFREG|0644, st_size=3D1130, ...}) =3D 0=0A=
read(3, "################################"..., 4096) =3D 1130=0A=
read(3, "", 4096)                       =3D 0=0A=
close(3)                                =3D 0=0A=
ioctl(2, TCGETS, {B38400 opost isig icanon echo ...}) =3D 0=0A=
pipe2([3, 4], 0)                        =3D 0=0A=
fcntl(3, F_GETFL)                       =3D 0 (flags O_RDONLY)=0A=
fcntl(3, F_SETFL, O_RDONLY|O_NONBLOCK)  =3D 0=0A=
fcntl(4, F_GETFL)                       =3D 0x1 (flags O_WRONLY)=0A=
fcntl(4, F_SETFL, O_WRONLY|O_NONBLOCK)  =3D 0=0A=
openat(AT_FDCWD, "/dev/xen/privcmd", O_RDWR|O_CLOEXEC) =3D 5=0A=
openat(AT_FDCWD, "/dev/xen/hypercall", O_RDWR|O_CLOEXEC) =3D 6=0A=
openat(AT_FDCWD, "/dev/xen/privcmd", O_RDWR|O_CLOEXEC) =3D 7=0A=
ioctl(7, _IOC(_IOC_NONE, 0x50, 0xff, 0), 0) =3D -1 ENOTTY (Inappropriate io=
ctl for device)=0A=
openat(AT_FDCWD, "/dev/xen/privcmd", O_RDWR|O_CLOEXEC) =3D 8=0A=
openat(AT_FDCWD, "/dev/xen/hypercall", O_RDWR|O_CLOEXEC) =3D 9=0A=
openat(AT_FDCWD, "/dev/xen/privcmd", O_RDWR|O_CLOEXEC) =3D 10=0A=
ioctl(10, _IOC(_IOC_NONE, 0x50, 0x5, 0x10), 0xffffe6e417f0) =3D 0=0A=
newfstatat(AT_FDCWD, "/var/run/xenstored/socket", {st_mode=3DS_IFSOCK|0600,=
 st_size=3D0, ...}, 0) =3D 0=0A=
socket(AF_UNIX, SOCK_STREAM, 0)         =3D 11=0A=
fcntl(11, F_GETFD)                      =3D 0=0A=
fcntl(11, F_SETFD, FD_CLOEXEC)          =3D 0=0A=
connect(11, {sa_family=3DAF_UNIX, sun_path=3D"/var/run/xenstored/socket"}, =
110) =3D -1 ECONNREFUSED (Connection refused)=0A=
close(11)                               =3D 0=0A=
faccessat(AT_FDCWD, "/dev/xen/xenbus", F_OK) =3D 0=0A=
newfstatat(AT_FDCWD, "/dev/xen/xenbus", {st_mode=3DS_IFCHR|0600, st_rdev=3D=
makedev(0xa, 0x3e), ...}, 0) =3D 0=0A=
openat(AT_FDCWD, "/dev/xen/xenbus", O_RDWR) =3D 11=0A=
openat(AT_FDCWD, "/etc/xen/xl.conf", O_RDONLY) =3D 12=0A=
fstat(12, {st_mode=3DS_IFREG|0644, st_size=3D1602, ...}) =3D 0=0A=
fstat(12, {st_mode=3DS_IFREG|0644, st_size=3D1602, ...}) =3D 0=0A=
read(12, "## Global XL config file ##\n\n# S"..., 4096) =3D 1602=0A=
close(12)                               =3D 0=0A=
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41850) =3D 262158=0A=
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_SHARED, 6, 0) =3D 0xffff9f45f000=
=0A=
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41850) =3D 0=0A=
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41850) =3D 0=0A=
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41850) =3D 0=0A=
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41850) =3D 0=0A=
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41850) =3D 0=0A=
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41850) =3D 4096=0A=
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41850) =3D 0=0A=
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41820) =3D -1 EPERM (Oper=
ation not permitted)=0A=
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41b40) =3D -1 EPERM (Oper=
ation not permitted)=0A=
write(2, "libxl: ", 7libxl: )                  =3D 7=0A=
write(2, "error: ", 7error: )                  =3D 7=0A=
write(2, "libxl_utils.c:820:libxl_cpu_bitm"..., 87libxl_utils.c:820:libxl_c=
pu_bitmap_alloc: failed to retrieve the maximum number of cpus) =3D 87=0A=
write(2, "\n", 1=0A=
)                       =3D 1=0A=
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41b40) =3D -1 EPERM (Oper=
ation not permitted)=0A=
write(2, "libxl: ", 7libxl: )                  =3D 7=0A=
write(2, "error: ", 7error: )                  =3D 7=0A=
write(2, "libxl_utils.c:820:libxl_cpu_bitm"..., 87libxl_utils.c:820:libxl_c=
pu_bitmap_alloc: failed to retrieve the maximum number of cpus) =3D 87=0A=
write(2, "\n", 1=0A=
)                       =3D 1=0A=
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41b40) =3D -1 EPERM (Oper=
ation not permitted)=0A=
write(2, "libxl: ", 7libxl: )                  =3D 7=0A=
write(2, "error: ", 7error: )                  =3D 7=0A=
write(2, "libxl_utils.c:820:libxl_cpu_bitm"..., 87libxl_utils.c:820:libxl_c=
pu_bitmap_alloc: failed to retrieve the maximum number of cpus) =3D 87=0A=
write(2, "\n", 1=0A=
)                       =3D 1=0A=
clone(child_stack=3DNULL, flags=3DCLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|S=
IGCHLD, child_tidptr=3D0xffff9ee7a0e0) =3D 814=0A=
wait4(814, [{WIFEXITED(s) && WEXITSTATUS(s) =3D=3D 0}], 0, NULL) =3D 814=0A=
--- SIGCHLD {si_signo=3DSIGCHLD, si_code=3DCLD_EXITED, si_pid=3D814, si_uid=
=3D0, si_status=3D0, si_utime=3D2, si_stime=3D2} ---=0A=
close(6)                                =3D 0=0A=
close(5)                                =3D 0=0A=
munmap(0xffff9f45f000, 4096)            =3D 0=0A=
close(7)                                =3D 0=0A=
close(10)                               =3D 0=0A=
close(9)                                =3D 0=0A=
close(8)                                =3D 0=0A=
close(11)                               =3D 0=0A=
close(3)                                =3D 0=0A=
close(4)                                =3D 0=0A=
exit_group(0)                           =3D ?=0A=
+++ exited with 0 +++=0A=
=0A=
royger told me that it is a BUG and not an issue with my setup. Therefore h=
ere I am.=0A=
=0A=
Cheers,=0A=
Andrea=


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 15:02:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 15:02:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283414.482413 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPmyS-0007Dd-KZ; Thu, 03 Mar 2022 15:02:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283414.482413; Thu, 03 Mar 2022 15:02:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPmyS-0007DW-H3; Thu, 03 Mar 2022 15:02:36 +0000
Received: by outflank-mailman (input) for mailman id 283414;
 Thu, 03 Mar 2022 15:02:35 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPmyR-0007DM-Am; Thu, 03 Mar 2022 15:02:35 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPmyR-0007UK-7K; Thu, 03 Mar 2022 15:02:35 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPmyQ-0005xy-Tz; Thu, 03 Mar 2022 15:02:35 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPmyQ-0006F2-TX; Thu, 03 Mar 2022 15:02:34 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=IlCLpx/jsh88FOj5gPzLsC/V7pknPmJZxe9Kb3I8OlA=; b=MbyaJ7qZ5rVgD1VB6i8XafiG2t
	2b4OpDYOCYlX/FJFq7o3PdMuKCOi0M2qMp3b500FEMkfF1TxgrR5MCk75CturQRtubCW9FepekSXa
	K4RBZ8PEWSar8g4moQiRpS8jzWzOgro43KYvASU8Yfteyl4T+PlO29GOXsowCPnD/IQw=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168355-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168355: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=5859a2b1991101d6b978f3feb5325dad39421f29
X-Osstest-Versions-That:
    linux=92ebf5f91b4dd5156886d2509202be0fb4230dfd
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 03 Mar 2022 15:02:34 +0000

flight 168355 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168355/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168346
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168346
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168346
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168346
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168346
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168346
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168346
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168346
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                5859a2b1991101d6b978f3feb5325dad39421f29
baseline version:
 linux                92ebf5f91b4dd5156886d2509202be0fb4230dfd

Last test of basis   168346  2022-03-02 20:40:06 Z    0 days
Testing same since   168355  2022-03-03 05:19:36 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  "Eric W. Biederman" <ebiederm@xmission.com>
  Eric W. Biederman <ebiederm@xmission.com>
  Johannes Stezenbach <js@sig21.net>
  Julian Braha <julianbraha@gmail.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Randy Dunlap <rdunlap@infradead.org>
  Russell King (Oracle) <rmk+kernel@armlinux.org.uk>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   92ebf5f91b4d..5859a2b19911  5859a2b1991101d6b978f3feb5325dad39421f29 -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 15:10:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 15:10:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283432.482428 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPn5j-0000So-FJ; Thu, 03 Mar 2022 15:10:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283432.482428; Thu, 03 Mar 2022 15:10:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPn5j-0000Sh-CG; Thu, 03 Mar 2022 15:10:07 +0000
Received: by outflank-mailman (input) for mailman id 283432;
 Thu, 03 Mar 2022 15:10:05 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=PW1S=TO=citrix.com=prvs=05474af58=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nPn5h-0000Du-Gj
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 15:10:05 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ffbbf00a-9b03-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 16:10:03 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ffbbf00a-9b03-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646320203;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=9Pe6pzaygyrnnTsI35jSXGO2y4aX3uuMk+PfPRtQFRo=;
  b=QqzMrw4kZuciz0sTLk5cX7U8Lo2q2dHOK3UpdaJtv1qFHq0WBgkAar6B
   iJSByaAT+imkR482M44XvCljHsu81jI8XuFOEPuoN1Qj6mOxFLi5uTNg+
   gEZ99V63IX4rBpOkn6XCVMYT0T4miJJp+RT1aA/SZnbbrE2Y/wpcq0N3l
   E=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65395156
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:lIG+Fq+NZUC/5/pIshsMDrUDnX6TJUtcMsCJ2f8bNWPcYEJGY0x3n
 TAcWGHSPqqJZjegetwgOdzg804Gu5LXmoRnTgdory08E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oDiW1nlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnbjgGRckJ4rjorkmCQRVKQRhM/J5/qCSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFJkYtXx6iynQEN4tQIzZQrWM7thdtNs1rp4TRqeDP
 pdHAdZpRCjwPTtSKnk3MsodsNf3qFTCbh1opXvA8MLb5ECMlVcsgdABKuH9ZdiiVchT2EGCq
 Qru72n/Rx0XKtGb4T6E6W63wP/CmzvhX4AfH6H+8eRl6HWRzGEODBwdVXOgvOK0zEW5Xrpix
 1c8o3R06/JorQryE4e7D0bQTGO4UgA0f4oAA+Ajzy63l5GO/gujI3cKEQFHd4lz3CMpfgAC2
 liMltLvIDVgtryJVH6QnoupQSOO1Ts9djFbO3JdJecRy5y6+dxo0EqTJjp2OPPt1rXI9SfML
 ydmRcTUr5EaloY12qqy5jgraBr898GSHmbZCug6N19JDz+Vhqb4P+RECnCBtJ6sybp1qHHb5
 hDofODEsYgz4WmlznDlfQn0NOjBCwy5GDPdm0VzOJIq6i6g/XWuFagJvm0gfhs3bpdfJmKwC
 KM2he+3zMUJVJdNRfUqC79d9uxwlfSwfTgbfqq8giVyjmhZK1bcoXAGib+41GHxikk8+ZzTy
 r/AGftA+U0yUPw9pBLvHr91+eZymkgWnDqDLbimn0XP+efPPxa9FOZaWGZim8hktctoVi2Oq
 I0BXyZLoj0CONDDjt7/qtZCfQhXdiFgXfgbaaV/L4a+H+avI0l4Y9f5yrI9YY112aNTk+bD5
 HamXUFEjlH4gBX6xc+iMxiPtJuHsU5DkE8G
IronPort-HdrOrdr: A9a23:FdfipKCpYTe2d5nlHehOsceALOsnbusQ8zAXPh9KJiC9I/b1qy
 nxppkmPH/P6Qr4WBkb6Le90Y27MAnhHPlOkPQs1NaZLXLbUQ6TQr2KgrGSoQEIdxeOk9K1kJ
 0QD5SWa+eAfGSS7/yKmTVQeuxIqLLskNHKuQ6d9QYUcegDUdAf0+4TMHf8LqQZfngjOXJvf6
 Dsmfav6gDQMUg/X4CePD0oTuLDr9rEmNbPZgMHPQcu7E2rgSmz4LD3PhCE1lNGOgk/i4sKwC
 zgqUjU96+ju/a0xlv10HLS1Y1fnJ/ExsFYDMKBp8AJInHHixquZq5mR7qe1QpF692H2RIPqp
 3hsh0gN8N85zf4eXy0mwLk303a3DMn+xbZuCilqEqmhfa8aCMxCsJHi44cWADe8VAcsNZ117
 8O936FtrJMZCmw0xjV1pztbVVHh0C0qX0tnao4lHpES7YTb7dXsMg24F5VKpEdByj3gbpXXN
 WGNPuspcq+TGnqL0ww5gJUsZ+RtzUIb1q7q3E5y4KoO2M8pgE686MarPZv6kvouqhNDqWs3N
 60QZiApIs+PvP+UpgNdtvpYfHHfFAlEii8eV57HzzcZdQ60jT22trK3Ik=
X-IronPort-AV: E=Sophos;i="5.90,151,1643691600"; 
   d="scan'208";a="65395156"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=dlh6HZGMpH3FV7Oy2K1lcLMKEi+YyqjcOwC0+9N8XqzgKQLJTwwvpmV1DcaQLoAlxkOetmbuQq9etBpTnBN4mekuh5oQUZ9vYx8UIRGQYnvlFdtM/al1RQknJZbvh2xA/K84VjmYhAMbCnYdbf9801hsQuhXSFEaGhPeecq9WOZPKMKvvs0FqRqERxa/PlkQl9FtDBMAuOHxLTopIeAJ8+zp0fHUi2gI0gVUK8dkQ19nunL6i2rlBWUXrpcK1X3n1vJxvrH/6gymugtAFy8P1/pSM98FLFSZRxzgN6EGtABMjLYtWxaNflZkTM1z9uDUSnB8X/JWRGukzvVMRme9gw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=UqaQBEpyIqc9Ja+A48GISfACovbD0WUo0m4jHCbVC7k=;
 b=AALoqIt6zHwL645o+jnWKG+UOfyjgi8EvtDBQkFgb7DrxAKyKcPscLSGDrscX4RPEfsJYx/jA/C3B+c68vWNDvW2xuKFIE+xsa9sok8rbjqNBW6C9EL2+v9R8ScAAhRwrmyHkr1QIr1tSzVjaDJ6HfyJza1B+6LyuyFV4YraEvFfsoT68xa2lyKgc0+Ru0UpPkDnCCjCRYIdvnBJBDRVgxIiCiTeP8PHvOXDNMeryQ/GQ8/5HafftgAvMqFN+ekDbCBmaLhJ3PdudU2Irlq0wTOgGsZJd8nmbiqMUV/JSWyGpywDFPOuDHk71q3OHdUnb1WUQ8gEhBWEHp4Ulk8qYQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=UqaQBEpyIqc9Ja+A48GISfACovbD0WUo0m4jHCbVC7k=;
 b=RHtGq14sftk2iWk/ilano74MAJpgTQwW5x+omfLUyrNtOq7igd+HinvNJEzYLuB7Rlz7NoM+9yJDp+a1wG+nSrgSamzxM6ijx/Qa5FPq0BGdbUZ4VHNf0OU/c0oHpzaoqfFXporq6AwVCz9CWZx283r0Z+ohP/ssKCOc8KBrGBI=
Date: Thu, 3 Mar 2022 16:09:53 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Andrew
 Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH] x86/build: use --orphan-handling linker option if
 available
Message-ID: <YiDaQY1ToO8G2QYd@Air-de-Roger>
References: <5c374fd3-017d-3c40-4ded-25a3b1c978a6@suse.com>
 <YiCkUebvg0gaBm4/@Air-de-Roger>
 <3c335ca5-63e3-6389-cba5-b9047a4ce3b9@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <3c335ca5-63e3-6389-cba5-b9047a4ce3b9@suse.com>
X-ClientProxiedBy: LO4P265CA0076.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:2bd::11) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f7dddd68-d832-4cd2-8191-08d9fd27e1ae
X-MS-TrafficTypeDiagnostic: BN6PR03MB2563:EE_
X-Microsoft-Antispam-PRVS: <BN6PR03MB25634868C497502949EE03248F049@BN6PR03MB2563.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(83380400001)(6666004)(316002)(53546011)(85182001)(2906002)(186003)(54906003)(6916009)(26005)(33716001)(38100700002)(66556008)(66946007)(6512007)(66476007)(8676002)(9686003)(82960400001)(6506007)(4326008)(5660300002)(966005)(6486002)(86362001)(508600001)(8936002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?ZVgrSXZJSjQrbXgxbFkxRDl4L1ZEdXdpeGg0K3BNdmNncXE1VEprY01jM0Er?=
 =?utf-8?B?NjBmb2s2eW4vRlJnMVFKbURFRVc0NjVBUHFiZlc5aUxlenZ3SkJ0VmlydWZF?=
 =?utf-8?B?ZE92NW5zYU1GNHJjbzdIN1lCaHdpN0w1Q0RtU25kcFFFMmZmNFJ4V3NZRUxR?=
 =?utf-8?B?NUZQQ284WDUvZDFRcGhLdmt3YTNtMFJ6Ui94OHgzRTlObitqL3R1WHZLWHFk?=
 =?utf-8?B?NXZhdVZjQlM1d2ZNbzM5d0ZybHdmbEJ6RkcvYkpCdWVtU3VUMzlQcnFkUFdP?=
 =?utf-8?B?cG1TY1ZZRFNnZHpWTjJTSk1YLzRrVWlkUUZXeWhnME5Pb0RkbU42TG5xZ1Q3?=
 =?utf-8?B?MVAvM05hU2tabHY2Qm83ZHdQNTBWN2pvVXJzZVFleEJ0emxCUFpodlR6Z3pO?=
 =?utf-8?B?cW5UQnEybTF3MXBRRVRqTjdBajJsN0I5czA4ODFxeCttRTM3b1prM0F0MHRR?=
 =?utf-8?B?eWFOQkxFVjBab2ZicXdEQlBEaWFVbFBEQ09pNm5HWFFET0ZOZHJPV1cxSFBu?=
 =?utf-8?B?c1BBVkpwUEwyRUxUclJTcTY3Qkl0emlMUzQvTCtaWTFPTG4raVJzQlluSGFp?=
 =?utf-8?B?RzVxbTFZRSt2a0kyeFV1R0ZMdUErUUpDajFVeStPWElTRm01ckNlcEZHZ1Yr?=
 =?utf-8?B?U2Vuc3pLNWJpRzdPa3p6T2crZVJFcUdzVHdPcXZYUlBEaWZwKzUySmJYbjBw?=
 =?utf-8?B?Ty9wbUpYSmRhUTc5NjlESmt1Zi9tWitKM29ic3ZIa0gyNlgzbGN4UEM1cTRJ?=
 =?utf-8?B?d1c4VlhoTlBBanNSVkovOWF6SkpReXNtekMyanNNZlZWT1NkUWJ2VVkvZ0p4?=
 =?utf-8?B?bnlCZ0loajg1bk14ZFJHazA3b0ZuK0xMTjliM2ozMTdpbkZxbnRNUmRUYWpn?=
 =?utf-8?B?OEdpWGlRaEFrRGlsUVB4bHhmdUZVU3R0OHdmWmxPSTBzZ09VQS9JZ3dQa2pH?=
 =?utf-8?B?Wk9UcTVuemROVXJkWFpINHNLV0VnV0NTWVYxd0ZaV3BGemovdkxNR1hTZ29j?=
 =?utf-8?B?a1dmd3A3d09vcU5pYW5xdTNjcVl6bHg0MHl3M0hkYUNxRmlFaHQwUm16UGVo?=
 =?utf-8?B?VnRreTNPcTZoR3A0MnRYSElRS3ZLL3BUS1kxbHhOaG0vT2RFR1hMVkp6OUZu?=
 =?utf-8?B?eXhYK3JsL0N2NjhURVVJNEoyRmh4dWFRdmc4SUxScnZGWldFK3VXQm1vRzEy?=
 =?utf-8?B?QVVsT0xHNGEvMjZNUHVyandmT2tST2NrSmZXVzVqWlMvTXk4RnZhM3dTL1lU?=
 =?utf-8?B?WEQvVi80eGR3bVpmQ3EzbDNvbFgxSWhVanYvMVluVHYyWmRQbWgzY1pjSHRK?=
 =?utf-8?B?T05kaEJ6WnhRa0dHMDJEYllLbVdZcU0vSEcvM3RyOFJLRFNDejVoWkZYaDJp?=
 =?utf-8?B?U0xYSjkvTWZUYVFLL1ZacDZOd2VmUC80U3AvMm83TzhodlVjS2VtTmIzQTM5?=
 =?utf-8?B?WlBDSFdSQVgvc0x4aGlLT1ZwR0VRSHc1OEJXSEUrVlMxbjRrNVZYZmw5VDB3?=
 =?utf-8?B?SkxuZk4wbWt5RkZuWDZoaFUyT1EzTVhxUkx6SWxmKzdvMW1aamZiM0NMS2Fs?=
 =?utf-8?B?S0pqbGx1QzlqaDdiemw2cUFTbEh2ZEdUTzQzdkxucEt4ZnFYNXgvZHA2ODdO?=
 =?utf-8?B?TVpjcVA3bE9RMkhtbUpzb3ZFUGFoVmcxQ3B6Q2h1Z05aVmdMRWtOT2Nid29G?=
 =?utf-8?B?bGs3UFJVYVZBK0NnMVAwZS96eExTamtlN0liakRWRy9wdUhyOEFldHFyMm5m?=
 =?utf-8?B?RVN2cTJiYzlsMmltV2JvT0cvRDRHNTR1Lys3dDUzbXhCL2FvWTRDbnVmM0lP?=
 =?utf-8?B?N1d4bWM3VjhTYmM0R20zOUZWbEVhNUlRVVlScVJZTnVqTjNmOGhzU1RNZXlj?=
 =?utf-8?B?eHJ3YWVPQkdobEF5WVhkR3lOcFBZbDVaZXJON01sblpGeDA5RHQ4TTM4cGow?=
 =?utf-8?B?UFNJWWhVYUN6T0xLZU4rQWZzM2dNaHBuYUp2YzZpSG1JOWpTYzRlYllWOExP?=
 =?utf-8?B?Mlk2ZjI1NXdxcVVheG4xUDBOOVRXNWdZZWl4M3IxTkY5QlZBS21KUkRRNUtk?=
 =?utf-8?B?QkEvYUl2aFpBMHdPWklxM09NSzg5MWdtOWdxL3dGZ1dYY0pXMUxXMytOYUZJ?=
 =?utf-8?B?MXB2VVB4YnBhN1UrZ0E5eUIzd1ZXSzFRbUZOSzhYZWk5MlBudzNWVklJRFRP?=
 =?utf-8?Q?xVsD7Wqst8AAZVUMjiECWHQ=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: f7dddd68-d832-4cd2-8191-08d9fd27e1ae
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 15:09:58.3528
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: RwDxTKypMNVlKSruhK+Htiu06vaSlBw7K+AZq8739M6k98SwaZ33P3YWrdMvGS1YR29otpOcmr2Iq1URLeTS+w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR03MB2563
X-OriginatorOrg: citrix.com

On Thu, Mar 03, 2022 at 01:17:03PM +0100, Jan Beulich wrote:
> On 03.03.2022 12:19, Roger Pau Monné wrote:
> > On Wed, Mar 02, 2022 at 03:19:35PM +0100, Jan Beulich wrote:
> >> As was e.g. making necessary 4b7fd8153ddf ("x86: fold sections in final
> >> binaries"), arbitrary sections appearing without our linker script
> >> placing them explicitly can be a problem. Have the linker make us aware
> >> of such sections, so we would know that the script needs adjusting.
> >>
> >> To deal with the resulting warnings:
> >> - Retain .note.* explicitly for ELF, and discard all of them (except the
> >>   earlier consumed .note.gnu.build-id) for PE/COFF.
> >> - Have explicit statements for .got, .plt, and alike and add assertions
> >>   that they're empty. No output sections will be created for these as
> >>   long as they remain empty (or else the assertions would cause early
> >>   failure anyway).
> >> - Collect all .rela.* into a single section, with again an assertion
> >>   added for the resulting section to be empty.
> >> - Extend the enumerating of .debug_* to ELF. Note that for Clang adding
> >>   of .debug_macinfo is necessary. Amend this by its Dwarf5 counterpart,
> >>   .debug_macro, then as well (albeit more may need adding for full
> >>   coverage).
> >>
> >> Suggested-by: Roger Pau Monné <roger.pau@citrix.com>
> >> Signed-off-by: Jan Beulich <jbeulich@suse.com>
> >> ---
> >> I would have wanted to make this generic (by putting it in
> >> xen/Makefile), but the option cannot be added to LDFLAGS, or else
> >> there'll be a flood of warnings with $(LD) -r. (Besides, adding to
> >> LDFLAGS would mean use of the option on every linker pass rather than
> >> just the last one.)
> >>
> >> Retaining of .note in xen-syms is under question. Plus if we want to
> >> retain all notes, the question is whether they wouldn't better go into
> >> .init.rodata. But .note.gnu.build-id shouldn't move there, and when
> >> notes are discontiguous all intermediate space will also be assigned to
> >> the NOTE segment, thus making the contents useless for tools going just
> >> by program headers.
> >>
> >> Newer Clang may require yet more .debug_* to be added. I've only played
> >> with versions 5 and 7 so far.
> >>
> >> Unless we would finally drop all mentioning of Stabs sections, we may
> >> want to extend to there what is done for Dwarf here (allowing the EFI
> >> conditional around the section to also go away).
> >>
> >> See also https://sourceware.org/pipermail/binutils/2022-March/119922.html.
> > 
> > LLD 13.0.0 also warns about:
> > 
> > ld: warning: <internal>:(.symtab) is being placed in '.symtab'
> > ld: warning: <internal>:(.shstrtab) is being placed in '.shstrtab'
> > ld: warning: <internal>:(.strtab) is being placed in '.strtab'
> > 
> > So seeing your mail where you mention GNU ld not needing those, I
> > think we would need to add them anyway for LLVM ld.
> 
> Hmm, that's ugly. How do I recognize LLVM ld? I can't simply use a
> pre-processor conditional keying off of __clang__, as that used as the
> compiler doesn't mean their ld is also in use (typically the case on
> Linux).

Hard to tell, `ld -v` for LLD will typically contain '^LLD' I think,
but I don't really like matching on human readable output like this.

> I also don't want to add these uniformly, for now knowing what
> side effects their mentioning might have with GNU ld.

Wouldn't it be fine to just place them at the end, just like it's
done by default by ld?

Are you worried about not getting the proper type if mentioned in the
linker script?

> >> --- a/xen/arch/x86/Makefile
> >> +++ b/xen/arch/x86/Makefile
> >> @@ -120,6 +120,8 @@ syms-warn-dup-y := --warn-dup
> >>  syms-warn-dup-$(CONFIG_SUPPRESS_DUPLICATE_SYMBOL_WARNINGS) :=
> >>  syms-warn-dup-$(CONFIG_ENFORCE_UNIQUE_SYMBOLS) := --error-dup
> >>  
> >> +orphan-handling-$(call ld-option,--orphan-handling=warn) += --orphan-handling=warn
> > 
> > Might be better to place in xen/Kconfig with the CC checks?
> 
> Well. I've tried to stay away from complaining if people introduce
> new tool chain capability checks in Kconfig. But I'm not going to
> add any myself (unless things would become really inconsistent) up
> and until we have actually properly discussed the upsides and
> downsides of either model. Doing this via email (see the "Kconfig
> vs tool chain capabilities" thread started in August 2020) has
> proven to not lead anywhere. I'm really hoping that we can finally
> sort this in Bukarest.
> 
> > I'm also wondering whether we could add the flag here into XEN_LDFLAGS
> > and EFI_LDFLAGS, as those options are only used together with the
> > linker script in the targets on the Makefile.
> 
> Not for XEN_LDFLAGS at least, and undesirable for EFI_LDFLAGS. See
> the respective post-commit message remark.

But the calls to LD in order to generate $(TARGET)-syms do not use -r,
and are all using the linker script, so it should be fine to use
--orphan-handling=warn there?

Could we do something like:

$(TARGET)-syms: XEN_LDFLAGS += ...

And similar for $(TARGET).efi?

> >> --- a/xen/arch/x86/xen.lds.S
> >> +++ b/xen/arch/x86/xen.lds.S
> >> @@ -12,6 +12,12 @@
> >>  #undef __XEN_VIRT_START
> >>  #define __XEN_VIRT_START __image_base__
> >>  #define DECL_SECTION(x) x :
> >> +/*
> >> + * Use the NOLOAD directive, despite currently ignored by ld for PE output, in
> > 
> > Would you mind adding GNU ld here to avoid confusion?
> 
> I've done so, but I'm not sure if implicitly you mean to say that
> LLVM ld does honor the directive when linking xen.efi? If that
> wasn't the case, it would rather seem misleading to have "GNU"
> there. Unless e.g. LLVM ld can't link xen.efi at all ...

So the one installed by default on FreeBSD doesn't have support for the
i386pep target emulation built in. AFAICT the EFI loader on FreeBDS is
built using a pre-made PE header and assembled together using objcopy.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 15:18:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 15:18:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283442.482442 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPnDO-0001N8-FL; Thu, 03 Mar 2022 15:18:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283442.482442; Thu, 03 Mar 2022 15:18:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPnDO-0001N1-CK; Thu, 03 Mar 2022 15:18:02 +0000
Received: by outflank-mailman (input) for mailman id 283442;
 Thu, 03 Mar 2022 15:18:02 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ylIu=TO=citrix.com=prvs=0548df38f=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nPnDN-0001Mv-Vf
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 15:18:01 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 1bfcfce2-9b05-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 16:18:00 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1bfcfce2-9b05-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646320680;
  h=date:from:to:cc:subject:message-id:references:
   mime-version:in-reply-to;
  bh=AgntS+T/lzLvB/tG+MbQRKYvi2r5mV7YrzbckKO7chg=;
  b=S/8uDgxX8g/+mCqiXHmVRfQjVjKdCRNG0h2sS0Rf0DV7M94S0gG9pXxe
   Tn1Fa4LEPzthGaRHVvMy/S+b+44YB5DhaiWGGFQZceD+/51P5J2fa3mFr
   2nKezlMGpPuG5BzguiYQT+GywgJodJiUtBzYicnhlWUfO+MXRjRWm0vUP
   o=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 65323142
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:rjNpdqz8rMOo6G5XMS56t+fRxirEfRIJ4+MujC+fZmUNrF6WrkVSm
 2oZWT2Ba6mOY2emc4x2bYS38EIAuMKAnNJrTVBkrSAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2YPhWWthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 NplpL2ZdS41bvT2nekGXgZUGRMlE/EZ9+qSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DNYUDunZm3HfBAOwvW5zrSKTW/95Imjw3g6iiGN6AO
 pFDMmMzNnwsZTVTFXEbEZsvntyGoSDWMG1YoQ6YpPQotj27IAtZj+G2bYu9lsaxbdpRtlaVo
 CTB5WuRKh0VONGQ0zOt7mOnhuiJmzjyHo0VCtWQ+uZxhVyPxkQaEBAMSUaguv69l1K/XNREb
 UcT/0IGtrMu/UamSt38WRyQo3OeuBMYHd1KHIUS+AyLj6bZ/QudLmwFVSJaLswrstcsQj4n3
 UPPmMnmbRRturCITXOW9p+PsCi/fyMSKAcqZzIATAYDy8nupsc0lB2nczp4OPfr1JuvQ2i2m
 m3U6nhl71kOsSIV/7Sa1Gzun2L1nJ3EVQMq6g/lBUz5sQwsMeZJeLeUwVTc6P9BKqOQQV+Ao
 GUIlqCi0QweMX2evHfTGbtQRdlF897AaWSB2gA3Q/HN4hzwoybLQGxG3N1pyK6F2O4gcCShX
 kLcsBg5CHR7bCrzNv8fj25c5q0XIUnc+TbNC6i8gjlmOMEZmOq7EMdGPxT4M4fFyhVErE3HE
 c3HGftA9F5DYUid8BK4Rv0GzZggzT0kyGXYSPjTlkr7j+DCOiLEEuhYaTNii9zVCove+m05F
 P4FaqO3J+h3CrWiMkE7D6ZJRbz1EZTLLc+v8JEGHgJyCgFnBHsgG5fsLUAJIORYc1Buvr6Qp
 BmVAxYAoHKm3CGvAVzTOhhLNeO+Nb4i/ClTFXF9Yj6VN40LPN/HAFE3LMBsI9HKNYVLkJZJc
 hXyU57YU6QXF2+eoGx1gFuUhNUKSSlHTDmmZ0KNCAXTtbY8L+AV0rcIpjfSyRQ=
IronPort-HdrOrdr: A9a23:PZwpi69SXWOVCKgc2a5uk+AcI+orL9Y04lQ7vn2ZKSY5TiX4rb
 HKoB1/73XJYVkqN03I9ervBEDiewK/yXcW2+ks1N6ZNWGLhILBFupfBODZsl7d8kPFl9K01c
 1bAtJD4N+bNykGsS4tijPIb+rJw7O8gd+Vbf+19QYIcenzAZsQlzuQDGygYypLbTgDP7UVPr
 yG6PFKojKxEE5nFfhSVhE+Lo7+T8SgruOeXSI7
X-IronPort-AV: E=Sophos;i="5.90,151,1643691600"; 
   d="scan'208";a="65323142"
Date: Thu, 3 Mar 2022 15:17:54 +0000
From: Anthony PERARD <anthony.perard@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Jan Beulich <jbeulich@suse.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
	"Julien Grall" <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>, Roger Pau =?iso-8859-1?Q?Monn=E9?=
	<roger.pau@citrix.com>, Daniel De Graaf <dgdegra@tycho.nsa.gov>, "Daniel P.
 Smith" <dpsmith@apertussolutions.com>
Subject: Re: [XEN PATCH v9 26/30] build: replace $(BASEDIR) and use $(srctree)
Message-ID: <YiDcIj8LwI1/oWLv@perard.uk.xensource.com>
References: <20220125110103.3527686-1-anthony.perard@citrix.com>
 <20220125110103.3527686-27-anthony.perard@citrix.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <20220125110103.3527686-27-anthony.perard@citrix.com>

On Tue, Jan 25, 2022 at 11:00:59AM +0000, Anthony PERARD wrote:
> $(srctree) is a better description for the source directory than
> $(BASEDIR) that has been used for both source and build directory
> (which where the same).
> 
> This adds $(srctree) to a few path where make's VPATH=$(srctree) won't
> apply. And replace $(BASEDIR) by $(srctree).
> 
> Introduce "$(srcdir)" as a shortcut for "$(srctree)/$(src)" as the
> later is used often enough.
> 
> Signed-off-by: Anthony PERARD <anthony.perard@citrix.com>
> Acked-by: Jan Beulich <jbeulich@suse.com>

This patch is now missing two hunks due to recent changes in the tree:

diff --git a/xen/arch/x86/Makefile b/xen/arch/x86/Makefile
index 11ac0d5e28a4..1ab9db3424c2 100644
--- a/xen/arch/x86/Makefile
+++ b/xen/arch/x86/Makefile
@@ -153,7 +153,7 @@ $(TARGET)-syms: $(objtree)/prelink.o $(obj)/xen.lds
                >$(@D)/$(@F).map
        rm -f $(@D)/.$(@F).[0-9]* $(@D)/..$(@F).[0-9]*
 ifeq ($(CONFIG_XEN_IBT),y)
-       $(SHELL) $(BASEDIR)/tools/check-endbr.sh $@
+       $(SHELL) $(srctree)/tools/check-endbr.sh $@
 endif

 $(obj)/note.o: $(TARGET)-syms
@@ -226,7 +226,7 @@ endif
                | $(objtree)/tools/symbols --all-symbols --xensyms --sysv --sort >$(@D)/$(@F).map
        rm -f $(@D)/.$(@F).[0-9]* $(@D)/..$(@F).[0-9]*
 ifeq ($(CONFIG_XEN_IBT),y)
-       $(SHELL) $(BASEDIR)/tools/check-endbr.sh $@
+       $(SHELL) $(srctree)/tools/check-endbr.sh $@
 endif
 else
 $(TARGET).efi: FORCE

-- 
Anthony PERARD


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 15:29:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 15:29:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283449.482453 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPnOH-0002zI-H1; Thu, 03 Mar 2022 15:29:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283449.482453; Thu, 03 Mar 2022 15:29:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPnOH-0002zB-E1; Thu, 03 Mar 2022 15:29:17 +0000
Received: by outflank-mailman (input) for mailman id 283449;
 Thu, 03 Mar 2022 15:29:16 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Uwof=TO=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nPnOF-0002z5-TH
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 15:29:16 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on20616.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::616])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ae8c9605-9b06-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 16:29:14 +0100 (CET)
Received: from AM6PR10CA0059.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:209:80::36)
 by DB8PR08MB4076.eurprd08.prod.outlook.com (2603:10a6:10:b0::15) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Thu, 3 Mar
 2022 15:29:12 +0000
Received: from VE1EUR03FT058.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:80:cafe::37) by AM6PR10CA0059.outlook.office365.com
 (2603:10a6:209:80::36) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Thu, 3 Mar 2022 15:29:12 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT058.mail.protection.outlook.com (10.152.19.86) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Thu, 3 Mar 2022 15:29:12 +0000
Received: ("Tessian outbound 63bb5eb69ee8:v113");
 Thu, 03 Mar 2022 15:29:11 +0000
Received: from 44784216ffa6.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 977E7A4B-2273-4EBF-A794-B964D41AB26E.1; 
 Thu, 03 Mar 2022 15:29:05 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 44784216ffa6.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 03 Mar 2022 15:29:05 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com (2603:10a6:20b:85::25)
 by DBBPR08MB4904.eurprd08.prod.outlook.com (2603:10a6:10:f2::10) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.23; Thu, 3 Mar
 2022 15:29:01 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c84a:82d0:c7fd:fc7c]) by AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c84a:82d0:c7fd:fc7c%7]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 15:29:01 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ae8c9605-9b06-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=UPACNY/YM8vRwcBogPoDlodhILeMLXLUuKMzwdU0nhI=;
 b=KwFqBfFi607WquVIvjlxjNRFgGa2enYCvEXIcjVa59vNTpPusIf2QvagI/hWfjYZY4KjBltLIItOj+Vj2ibumjmJdl5C9CneY0YIZ3Q7AxK2hKZiTg6wFJHBuZCF3APJAWUhzmwdjwqMcVOvPOHC4IQl1XF5PxIV1jtjvjyHiGM=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 08792da1cc3ba224
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=oJX0D+d4ugGFFnxLFrweu7GFjiL+ZPEFOT00nwYLBO4L1S0j66x8sWKQ6sE2xqjXkR3Rplv8G6qGIU55bmtRVE96lXxJY8yNSgzpoR0VCcaBZ5+1aDW790iS+73kcA58LaZWnDWtUqLIuA7mJ8l+dnAP9yIL55zfvkhfzF4KiyM6Y/NFsoBC1yzs44cVdj8Q25gmy4FkLYZPxQz4DDL6mMtP6Z2z2tcVgMDi7Fxs2eP/1F5TXEBU8oPe5E4UxF/v0QtyWllCb0oy5BUdukJqSNw+QhCSLIAdmTHYQr060NKaSKu6pNSZU3qFFpMlBNSDbFnQCSb15Q0Mu/72UbHeWA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=UPACNY/YM8vRwcBogPoDlodhILeMLXLUuKMzwdU0nhI=;
 b=CvO1f/KKwDYapBmoRrbol12qRgtpetSP+JjfU85bI8aZN1T+id26485dzFPzTr/F92UybhtiLwkL5VYS7CQ91jcL9oLmzdA/YIY+cYoD01DsQ5ytl/90Q3/G5U2V85X1NUQiJ5Eq9m6bhhyN4HQ+OH5Mgf0a0J/JTod9NOlALkMcpRj4e28rUgZekh6AifXTIyqAxQqtvxaNeWVw0JZHKkEFkAcU9GTZafojCHUVhpeFUnD0k5PqZGFsZ49n+2SgVjJhwm3Hl3KNkXsyuoP2VY0POi7Vwbn2OYvx/XjoMB8pp/scsU5aetNqG9nozI4e26YdzC0QChCLitBfZmlgUg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=UPACNY/YM8vRwcBogPoDlodhILeMLXLUuKMzwdU0nhI=;
 b=KwFqBfFi607WquVIvjlxjNRFgGa2enYCvEXIcjVa59vNTpPusIf2QvagI/hWfjYZY4KjBltLIItOj+Vj2ibumjmJdl5C9CneY0YIZ3Q7AxK2hKZiTg6wFJHBuZCF3APJAWUhzmwdjwqMcVOvPOHC4IQl1XF5PxIV1jtjvjyHiGM=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Subject: Re: Kconfig: defaults for UNSUPPORTED
Thread-Topic: Kconfig: defaults for UNSUPPORTED
Thread-Index: AQHYLUXTrzQbHj+avkybd4n9OCZXjaytzEMA
Date: Thu, 3 Mar 2022 15:29:01 +0000
Message-ID: <CB788B25-A304-4675-909E-95426EF4189D@arm.com>
References: <ac19413d-d5a0-4234-819a-fa99afc31592@suse.com>
In-Reply-To: <ac19413d-d5a0-4234-819a-fa99afc31592@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: b0cf85a8-c581-48e2-e0cb-08d9fd2a9193
x-ms-traffictypediagnostic:
	DBBPR08MB4904:EE_|VE1EUR03FT058:EE_|DB8PR08MB4076:EE_
X-Microsoft-Antispam-PRVS:
	<DB8PR08MB40766B8D8DD64AB491B4D7B09D049@DB8PR08MB4076.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR08MB3784.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(38070700005)(38100700002)(2616005)(4744005)(6506007)(53546011)(2906002)(86362001)(6512007)(4326008)(316002)(8676002)(91956017)(66476007)(66446008)(66556008)(64756008)(122000001)(66946007)(76116006)(5660300002)(186003)(26005)(8936002)(6916009)(508600001)(33656002)(36756003)(6486002)(71200400001)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <DD30292D31AF5146A678DA7227F25C8C@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB4904
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT058.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	d9b7512d-33e9-4d73-12b8-08d9fd2a8b30
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(5660300002)(4744005)(508600001)(53546011)(33656002)(47076005)(6506007)(81166007)(356005)(6486002)(36756003)(6512007)(316002)(2616005)(36860700001)(86362001)(186003)(70206006)(70586007)(82310400004)(40460700003)(26005)(8676002)(6862004)(8936002)(336012)(2906002)(4326008);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 15:29:12.1424
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: b0cf85a8-c581-48e2-e0cb-08d9fd2a9193
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT058.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR08MB4076

Hi,

> On 1 Mar 2022, at 08:24, Jan Beulich <jbeulich@suse.com> wrote:
>=20
> Hello,
>=20
> when commit d96e5e6c1214 added UNSUPPORTED, it left x86'es TBOOT
> default untouched. This means we default-enable an unsupported
> setting, which doesn't look to be what's generally wanted. I can
> see defaulting to DEBUG as reasonable, and SCHED_NULL's defaulting
> to enabled when PV_SHIM can imo also be justified (there it's
> rather that UNSUPPORTED is inapplicable for the shim case, and the
> adjustment was also done subsequent to the named commit).
>=20
> Shouldn't we therefore have a rule of thumb that UNSUPPORTED
> entries only ever have no "default" (implying "n") or default to
> no more than DEBUG?

In general that would definitely make sense yes even though there might be
exceptions due to for example a dependency to an other unsupported paramete=
r.

I would definitely agree with this.

Cheers
Bertrand

>=20
> Thanks for opinions,
> Jan
>=20
>=20



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 15:31:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 15:31:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283456.482464 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPnQP-0004LO-U4; Thu, 03 Mar 2022 15:31:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283456.482464; Thu, 03 Mar 2022 15:31:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPnQP-0004LH-Qv; Thu, 03 Mar 2022 15:31:29 +0000
Received: by outflank-mailman (input) for mailman id 283456;
 Thu, 03 Mar 2022 15:31:28 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ylIu=TO=citrix.com=prvs=0548df38f=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nPnQO-0004L9-Tn
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 15:31:28 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id fcfc295c-9b06-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 16:31:27 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fcfc295c-9b06-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646321487;
  h=date:from:to:cc:subject:message-id:references:
   mime-version:in-reply-to;
  bh=UyTSuw+sR3tfyMe/Qualcrjci7L1aY4CZDh2HiALVkM=;
  b=IQ0Mv9SOP9Ft07qirgMLjbmhirhA0tlRjUTujouMdtJzr9pD4MtwEBVi
   QOFo0/9vtwxsibHxMq7BwmyzSfFGI++01/7oP64M68w5y9RxlZJbzKsTp
   H8hAHwd1PAn64gdA44Gdq5L0Q0RFRmQOSS3GLCasllhjgP0aFuwtuTPg7
   c=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 64867392
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:Ff0gS6+JxaQuGDBiQtz+DrUDq36TJUtcMsCJ2f8bNWPcYEJGY0x3y
 WseCm/UOK6JMGqgKNBybt++pEJS7cOHm9BgQQZs+ys8E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oDiW1nlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCncy0UQVuO5H2orw2DwB5GQxeEJBC1rCSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFIoZpnFnyyCfFfs8SIrPa67L+cVZzHE7gcUm8fP2O
 ZZJN2U0PU6ojxtnYXQsKaIxre2Tv1bcdjoHpFarqvtoyj2GpOB2+Oe0a4eEEjCQfu1Kmm6Iq
 2SA+H72ajkKOdraxTeb/3aEgu7UgTi9SI8UDKe/9PNhnBuU3GN7IAYNSVKxrP29i0i/c9FSM
 UoZ/mwpt6da3E6hQ8T5Xha4iGWZpRNaUN1Ve8U49QWMx6z88wufQG8eQVZ8hMcO7ZFsA2Zwj
 xnQwo2vVWcHXKCppWy1prOMr3S3BRIvdURefA4OYCso3t3Nr9Rm5v7QdepLHKmwh9zzPDj/x
 TGWsSQz74kuYd43O7aTpg6e3W/1znTdZktsv1iMADr5hu9sTNP9P+SVBU7nAeGsxWpzZn2Ip
 zA6lseX94ji5rndxXXWEI3h8FxEjstp0QEwY3YyR/HNFBz3ohZPmLy8Bhkkfi+F1e5eJFfUj
 Lf741852XOqFCLCgVVLS4ywEd826qPrCM7oUPvZBvIXPMQvLlPZoHA1OhPJt4wIrKTKuftlU
 Xt8WZzxZUv29Iw9lGbmLwvj+eVDKt8CKZP7GsmgkkXPPUu2b3+JU7YVWGZinchihJ5oVD79q
 o4FX+PTkk03eLSnPkH/qNdDRXhXfSlTLc2n8KR/K7/cSjeK7Ul8Upc9N5t6INc790mU/8+Vl
 kyAtrhwkwKu1SWaclzRMhiOqtrHBP5CkJ7yBgR0VX7A5pTpSd/HAHs3H3fvQYQayQ==
IronPort-HdrOrdr: A9a23:7tfy3KofGjYK10ZUPQlIbTQaV5oveYIsimQD101hICG9Ffbo8P
 xG/c5rsSMc7Qx7ZJhOo7y90cW7Lk80lqQU3WByB9mftWDd0QPDQb2KhrGC/xTQXwH46+5Bxe
 NBXsFFebjN5IFB/KXHCd+DYrQd/OU=
X-IronPort-AV: E=Sophos;i="5.90,151,1643691600"; 
   d="scan'208";a="64867392"
Date: Thu, 3 Mar 2022 15:31:22 +0000
From: Anthony PERARD <anthony.perard@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Roger Pau
 =?iso-8859-1?Q?Monn=E9?= <roger.pau@citrix.com>,
	<xen-devel@lists.xenproject.org>
Subject: Re: [XEN PATCH v9 23/30] build,x86: remove the need for build32.mk
Message-ID: <YiDfSm9yDmp1waJK@perard.uk.xensource.com>
References: <20220125110103.3527686-1-anthony.perard@citrix.com>
 <20220125110103.3527686-24-anthony.perard@citrix.com>
 <2d0bed19-bf52-e934-0a5a-c424ff6e4db0@suse.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <2d0bed19-bf52-e934-0a5a-c424ff6e4db0@suse.com>

On Thu, Mar 03, 2022 at 11:29:36AM +0100, Jan Beulich wrote:
> On 25.01.2022 12:00, Anthony PERARD wrote:
> > Rework "arch/x86/boot/Makefile" to allow it to build both file
> > "cmdline.S" and "reloc.S" without "build32.mk".
> > 
> > These will now use the main rules for "%.o: %.c", and thus generate a
> > dependency file. (We will not need to track the dependency manually
> > anymore.)
> > 
> > But for that, we need to override the main CFLAGS to do a 32bit build.
> > We introduce XEN_TREEWIDE_CFLAGS which can be reused in boot/Makefile,
> > and avoid the need to reparse Config.mk with a different value for
> > XEN_TARGET_ARCH. From this new $(XEN_TREEWIDE_CFLAGS), we only need to
> > change -m64 to have the 32bit flags. Then those are applied only to
> > "cmdline.o" and "reloc.o".
> > 
> > Specifically apply the rule "%.S: %.bin" to both cmdline.S and reloc.S
> > to avoid make trying to regenerate other %.S files with it.
> > 
> > There is no change expected to the resulting "cmdline.S" and
> > "reloc.S", only the *.o file changes as their symbol for FILE goes
> > from "cmdline.c" to "arch/x86//cmdline.c". (No idea why "boot" is
> > missing from the string.) (I've only check with GCC, not clang.)
> > 
> > Signed-off-by: Anthony PERARD <anthony.perard@citrix.com>
> 
> Reviewed-by: Jan Beulich <jbeulich@suse.com>
> with one question, just to be sure I understand things right:
> 
> > --- a/xen/arch/x86/boot/Makefile
> > +++ b/xen/arch/x86/boot/Makefile
> > @@ -1,25 +1,42 @@
> >  obj-bin-y += head.o
> > +head-srcs := cmdline.S reloc.S
> >  
> > -DEFS_H_DEPS = $(abs_srctree)/$(src)/defs.h $(abs_srctree)/include/xen/stdbool.h
> > +nocov-y += $(head-srcs:.S=.o)
> > +noubsan-y += $(head-srcs:.S=.o)
> > +targets += $(head-srcs:.S=.o)
> >  
> > -CMDLINE_DEPS = $(DEFS_H_DEPS) $(abs_srctree)/$(src)/video.h \
> > -	       $(BASEDIR)/include/xen/kconfig.h \
> > -	       $(BASEDIR)/include/generated/autoconf.h
> > +head-srcs := $(addprefix $(obj)/, $(head-srcs))
> >  
> > -RELOC_DEPS = $(DEFS_H_DEPS) \
> > -	     $(BASEDIR)/include/generated/autoconf.h \
> > -	     $(BASEDIR)/include/xen/kconfig.h \
> > -	     $(BASEDIR)/include/xen/multiboot.h \
> > -	     $(BASEDIR)/include/xen/multiboot2.h \
> > -	     $(BASEDIR)/include/xen/const.h \
> > -	     $(BASEDIR)/include/public/arch-x86/hvm/start_info.h
> > +$(obj)/head.o: $(head-srcs)
> >  
> > -$(obj)/head.o: $(obj)/cmdline.S $(obj)/reloc.S
> > +CFLAGS_x86_32 := $(subst -m64,-m32 -march=i686,$(XEN_TREEWIDE_CFLAGS))
> > +$(call cc-options-add,CFLAGS_x86_32,CC,$(EMBEDDED_EXTRA_CFLAGS))
> > +CFLAGS_x86_32 += -Werror -fno-builtin -g0 -msoft-float
> > +CFLAGS_x86_32 += -I$(srctree)/include
> >  
> > -$(obj)/cmdline.S: $(src)/cmdline.c $(CMDLINE_DEPS) $(src)/build32.lds
> > -	$(MAKE) -f $(abs_srctree)/$(src)/build32.mk -C $(obj) $(@F) CMDLINE_DEPS="$(CMDLINE_DEPS)"
> > +# override for 32bit binaries
> > +$(head-srcs:.S=.o): CFLAGS_stack_boundary :=
> 
> You overriding CFLAGS_stack_boundary but not object_label_flags is
> merely because the latter has no (unwanted) effect on the compilation?

Yes.

Thanks,

-- 
Anthony PERARD


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 15:32:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 15:32:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283462.482474 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPnRA-0004tl-6m; Thu, 03 Mar 2022 15:32:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283462.482474; Thu, 03 Mar 2022 15:32:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPnRA-0004tc-3f; Thu, 03 Mar 2022 15:32:16 +0000
Received: by outflank-mailman (input) for mailman id 283462;
 Thu, 03 Mar 2022 15:32:14 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Uwof=TO=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nPnR8-0004L9-Hp
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 15:32:14 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05on2060f.outbound.protection.outlook.com
 [2a01:111:f400:7e1a::60f])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 1980bfc8-9b07-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 16:32:14 +0100 (CET)
Received: from AS9PR05CA0038.eurprd05.prod.outlook.com (2603:10a6:20b:489::25)
 by PAXPR08MB7381.eurprd08.prod.outlook.com (2603:10a6:102:22b::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 15:32:11 +0000
Received: from AM5EUR03FT057.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:489:cafe::69) by AS9PR05CA0038.outlook.office365.com
 (2603:10a6:20b:489::25) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Thu, 3 Mar 2022 15:32:11 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT057.mail.protection.outlook.com (10.152.17.44) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Thu, 3 Mar 2022 15:32:10 +0000
Received: ("Tessian outbound 1f399c739551:v113");
 Thu, 03 Mar 2022 15:32:10 +0000
Received: from 7433e747225c.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 D649CA3C-611F-4A98-8F68-DAADD5677E6A.1; 
 Thu, 03 Mar 2022 15:32:03 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 7433e747225c.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 03 Mar 2022 15:32:03 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com (2603:10a6:20b:85::25)
 by DBBPR08MB4904.eurprd08.prod.outlook.com (2603:10a6:10:f2::10) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.23; Thu, 3 Mar
 2022 15:32:00 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c84a:82d0:c7fd:fc7c]) by AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c84a:82d0:c7fd:fc7c%7]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 15:32:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1980bfc8-9b07-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=l76gNqxQ+cyuvRF9gid7gNknHabccxBApiAem7IOqA4=;
 b=AgYGqSdTIVIQDpW8i8nrdKwAdOnVTOZRWV7zCt3QJy4DsUJ6CvET+7qTZwfkjtHIFhpj4eoFsX6uG2ZMKIAoIcpH93BYq1g+Pr7+Wxy8zdpVa26ABbawSbgVXn7ICMz5x12pPv+zJUSykH+omw0/201Nzlir3haxHuaXqaITc8s=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 92b28d371f2eb621
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Y7+qzeqN05IbQgXTQNbfDcMbcS5O5mYIKeS11Vh5sZq+N/ZWxkAjCCsyhiowqIGURDl2eDSD6VWL+0ukLJ53ZCz9i0yMTZmaNEEDkJMysFezXvCTLaLmX/K0iu9IAGOjEsEgpaPcPM0wwTrez0pblnwncpx/dpb1XdkpWDgLNUBUXDfsg1iN7QG2QuMd/UB73hRmYzd9zwR+t1TbVH3XqzIts6rbVVpmK9mqIc2XUK94sfVeSQr0pDwCxXZCW4OqPK+zlecZ5M6iG/1RyJniJQlDl45xbqVbOYG5cLAQTgUpjz8/0DouGU3P3got82QelWsi//B5jKjUAgza5qszVQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=l76gNqxQ+cyuvRF9gid7gNknHabccxBApiAem7IOqA4=;
 b=bvlwuUnhkvMNw3OcSdb+jkfaSrP6glw4Kfrn27A4KYPusu8qGR+AAsrzVUrUt9+mPUwhfpoTGAuvXffeaNIBohaYGD8PE7HnyJ0H7k6dTG1UGqjtkElwvYd45khWnDkksP/DvHgbs1baMCKbIHE4iWb9u4Z+qsvKnBgqzMJCkPJaSOstLy8LGKBylKlQhNRo0Wp2qEN3UTWyBFCmiLuhji6/q4S/auwbzHhr08Hha6Koz6EavhYtyke36ibSNtx6xxPN1CZGm+76rG4ZD/Wu0XZRxhyqNc0NRf9UN0CS+CR0aFYUIqnFGSJFIXfLTE9J4fEvhYtyauIBBVAv7TAMtQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=l76gNqxQ+cyuvRF9gid7gNknHabccxBApiAem7IOqA4=;
 b=AgYGqSdTIVIQDpW8i8nrdKwAdOnVTOZRWV7zCt3QJy4DsUJ6CvET+7qTZwfkjtHIFhpj4eoFsX6uG2ZMKIAoIcpH93BYq1g+Pr7+Wxy8zdpVa26ABbawSbgVXn7ICMz5x12pPv+zJUSykH+omw0/201Nzlir3haxHuaXqaITc8s=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Andrew
 Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
	Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>
Subject: Re: [PATCH] build: export potentially overridden tool chain
 components
Thread-Topic: [PATCH] build: export potentially overridden tool chain
 components
Thread-Index: AQHYLL39jNFocJHI00Sb4SF85xOtp6ytzimA
Date: Thu, 3 Mar 2022 15:32:00 +0000
Message-ID: <A821D7FD-F434-4BAE-AA3B-80E683E22727@arm.com>
References: <ff363631-bf5c-83a8-ccc4-15ddd1eb1d3c@suse.com>
In-Reply-To: <ff363631-bf5c-83a8-ccc4-15ddd1eb1d3c@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 3f0315ef-5e8e-4331-9a34-08d9fd2afc14
x-ms-traffictypediagnostic:
	DBBPR08MB4904:EE_|AM5EUR03FT057:EE_|PAXPR08MB7381:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR08MB73815D15375804C12B0010449D049@PAXPR08MB7381.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR08MB3784.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(38070700005)(38100700002)(2616005)(4744005)(6506007)(53546011)(2906002)(86362001)(6512007)(83380400001)(4326008)(316002)(8676002)(91956017)(66476007)(66446008)(66556008)(64756008)(122000001)(66946007)(76116006)(54906003)(5660300002)(186003)(26005)(8936002)(6916009)(508600001)(33656002)(36756003)(6486002)(71200400001)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <2E4CD9A6BC8BCB469671635A3F809FAF@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB4904
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT057.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	7ba545d1-aa68-4aab-d566-08d9fd2af5c5
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	4jmqvZhFSknatZMVV6f8LxyImFAVmUUSJqcwrAK3WWtBwkybacEedk8mSoUJwdDW6cZnAJE/1yNfVWFAm6eiLqqN7oRAIXDHxWGGsWpfVVcNfiQLxrqbVJxw/T2cOeqnk0qYMKdlPuu3yi1fnTeLXL/V4q36nmB3WjuiI9MoY37P+egUg8qnYQgct/m4d1h9j23z05azKNe2QJONpgWzYry9CZ81k07kLRY8xP+OVmG/O5BL4XtPY/UrhNwLBaQ4YdlmfC7DIakzBknsqP8R6x9/DFTLblRSlHor3QD+xLa5eJxIrxQ4LsKZqWcb3DdPG/R/QlnRHJ1up+K02tlVPP8pR3hVlKusmaOgUJY4sq7825ZaDqddmQ71uhZLkBjnosR/7gc05pndABtGTZzoDTr7B5C9xPNJ3Q0Q481DM9oL015OlebKS6iy2f/kjBqi9xw8oJDcASIRiBnCzKyIinDkf9mBC7efPpIJ3F9JkGX5iGUHIR5Oo7ug0GxenGBcO9isGn9Kp81/HEcz65JBMC970OVtK5vDp7WpZ4Q0JHHg/Ko2gY7SL3HEHRF/xLEfdcQ69LDZNACjWsZpJlHOfIcO9k04V0ZxoNWb3Fvj1KsDGxXDLP3txhHM7ggfqDm5lUhDrIROBZh/xTzAf6oHnvFX0m7JqSzmMhp8xlevCWvUJs+66LuqPHZL6rHH80SF
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(508600001)(86362001)(8676002)(6506007)(70586007)(70206006)(2616005)(81166007)(316002)(356005)(6486002)(54906003)(36756003)(336012)(26005)(36860700001)(186003)(6512007)(53546011)(82310400004)(2906002)(40460700003)(33656002)(5660300002)(8936002)(47076005)(83380400001)(6862004)(4326008);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 15:32:10.8829
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 3f0315ef-5e8e-4331-9a34-08d9fd2afc14
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT057.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB7381

Hi Jan,

> On 28 Feb 2022, at 16:11, Jan Beulich <jbeulich@suse.com> wrote:
>=20
> When overriding the tool chain via CROSS_COMPILE, the resulting
> components need to be made available to, in particular (but not limited
> to) the check-endbr.sh script. Note that we don't allow overriding
> ADDR2LINE yet; this would first require additions to some config/*.mk
> before it would make sense to export the resulting variable as well.
>=20
> The lack of NM exporting was apparently not a problem so far, but add it
> at this occasion as well - we're using the tool, after all.
>=20
> Fixes: 4d037425dccf ("x86: Build check for embedded endbr64 instructions"=
)
> Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Bertrand Marquis <bertrand.marquis@arm.com>

Cheers
Bertrand

>=20
> --- a/xen/Makefile
> +++ b/xen/Makefile
> @@ -55,7 +55,7 @@ export TARGET_ARCH     :=3D $(shell echo $
> # Allow someone to change their config file
> export KCONFIG_CONFIG ?=3D .config
>=20
> -export CC CXX LD
> +export CC CXX LD NM OBJCOPY OBJDUMP
>=20
> export TARGET :=3D xen
>=20
>=20
>=20



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 15:38:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 15:38:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283472.482486 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPnWz-0005oa-15; Thu, 03 Mar 2022 15:38:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283472.482486; Thu, 03 Mar 2022 15:38:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPnWy-0005oT-TD; Thu, 03 Mar 2022 15:38:16 +0000
Received: by outflank-mailman (input) for mailman id 283472;
 Thu, 03 Mar 2022 15:38:16 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=bD3B=TO=srcf.net=amc96@srs-se1.protection.inumbo.net>)
 id 1nPnWy-0005oN-IB
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 15:38:16 +0000
Received: from ppsw-41.csi.cam.ac.uk (ppsw-41.csi.cam.ac.uk [131.111.8.141])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f033d1ee-9b07-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 16:38:14 +0100 (CET)
Received: from hades.srcf.societies.cam.ac.uk ([131.111.179.67]:44996)
 by ppsw-41.csi.cam.ac.uk (ppsw.cam.ac.uk [131.111.8.139]:25)
 with esmtps (TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
 id 1nPnWs-0010K9-QR (Exim 4.95) (return-path <amc96@srcf.net>);
 Thu, 03 Mar 2022 15:38:10 +0000
Received: from [192.168.1.10] (host-92-12-45-187.as13285.net [92.12.45.187])
 (Authenticated sender: amc96)
 by hades.srcf.societies.cam.ac.uk (Postfix) with ESMTPSA id E56711FB21;
 Thu,  3 Mar 2022 15:38:09 +0000 (GMT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f033d1ee-9b07-11ec-8eba-a37418f5ba1a
X-Cam-AntiVirus: no malware found
X-Cam-ScannerInfo: https://help.uis.cam.ac.uk/email-scanner-virus
Message-ID: <e23e8804-8ee8-aba0-af6e-c5967f8611a7@srcf.net>
Date: Thu, 3 Mar 2022 15:38:09 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] build: export potentially overridden tool chain
 components
Content-Language: en-GB
To: Jan Beulich <jbeulich@suse.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
References: <ff363631-bf5c-83a8-ccc4-15ddd1eb1d3c@suse.com>
From: Andrew Cooper <amc96@srcf.net>
In-Reply-To: <ff363631-bf5c-83a8-ccc4-15ddd1eb1d3c@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

On 28/02/2022 16:11, Jan Beulich wrote:
> When overriding the tool chain via CROSS_COMPILE, the resulting
> components need to be made available to, in particular (but not limited
> to) the check-endbr.sh script. Note that we don't allow overriding
> ADDR2LINE yet; this would first require additions to some config/*.mk
> before it would make sense to export the resulting variable as well.
>
> The lack of NM exporting was apparently not a problem so far, but add it
> at this occasion as well - we're using the tool, after all.
>
> Fixes: 4d037425dccf ("x86: Build check for embedded endbr64 instructions")
> Signed-off-by: Jan Beulich <jbeulich@suse.com>

Acked-by: Andrew Cooper <andrew.cooper3@citrix.com>


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 15:41:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 15:41:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283479.482497 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPnaB-0007Bl-FK; Thu, 03 Mar 2022 15:41:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283479.482497; Thu, 03 Mar 2022 15:41:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPnaB-0007Be-CJ; Thu, 03 Mar 2022 15:41:35 +0000
Received: by outflank-mailman (input) for mailman id 283479;
 Thu, 03 Mar 2022 15:41:34 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ylIu=TO=citrix.com=prvs=0548df38f=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nPnaA-0007BY-11
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 15:41:34 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 654a6d86-9b08-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 16:41:32 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 654a6d86-9b08-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646322092;
  h=date:from:to:cc:subject:message-id:references:
   mime-version:in-reply-to;
  bh=xY/KKbt1ZFQSLEuxynuvlI+oXBQAH4lPJZi4p7ek0TQ=;
  b=eo3u8dNxUv3c0TmmV6/4q5kZxcpcZajg4yWDK0P/N4qnOtdlPPLVJbdR
   VZRMC998HGf1TXvqZPNlrQWen/RsqLFmaQcQFZUluVnWlAxxhbNeKrF/U
   sqKyCBfg2L1nFAgiAYfe1m/l8fZLQJ6SnJmhlcCWLlwf4H89XiVzJToY6
   Q=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 65406755
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:czCoa6jfUEqlTUeiEKHpHbd2X161gRAKZh0ujC45NGQN5FlHY01je
 htvUTyCa66CNmH3c4hzbYng80gCuZfXztFrTQBqriwyF3kb9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFvW4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YR8GE6vvlsteagFFCid9fp9+wq35LVHq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bknhm0THeC+dgWZ3ZSr/GzdRZwC0xloZFGvO2i
 88xN2czNEqfPkAn1lE/KY4ht+6Qt3LDazhJrEvKmukR4mrJ9VkkuFTqGIWMIYHbLSlPpW6mo
 WbB83X8EwstHtWVwjqY8VqhnubK2yj8Xeo6HrCi6uRjhlHVw2UJEQAXTnOyu/z/gUm7M/pPJ
 kpR9icwoKwa8E2wUsK7TxC+uGSDvBMXR5xXCeJSwB6J4rrZ5UCeHGdsZjxLZcEitcQ2bSc3z
 VLPlNTsbRRtrbmURHS15rqS6zSoNkA9NnQebCUJSQ8E5djLo4wpiB/LCNF5H8aIYsbdQG+qh
 WrQ9W5n2utV3ZVjO7iHEU7vmx2BoLvHYU0M/hjOWGHm3DtDdrCpTtn9gbTE1spoIIGcR1iHm
 XELncmC8ewDZa2weDyxrPYlR+/wuavcWNHIqRs2RsR6qWzxk5K2Vd0IuFlDyFFV3tHokNMDS
 Gvaoktv6ZBaJxNGhocnMtvqW6zGIUUNfOkJt8w4jPITOvCdlyfdpUmCgHJ8OUi3yiDAdollZ
 P+mnT6EVypyNEie5GPeqx0h+bEq3Dsi4mjYWIr2yR+quZLHOiLLE+tbbArVMb1ghE9hnOkz2
 4wFXydt408CONASnwGNqdJDRbz0BSJT6W/KRzx/KbfYf1sO9JAJAP7N27IxE7GJbIwO/tokC
 kqVAxcCoHKm3CWvAVzTNhhLMeq/Nb4i/SNTFXF9Zj6Ahil8CbtDGY9CLvPbi5F8r7c9pRO1J
 tFYE/i97gNnEWyWq2xANsCm9OSPtn2D3GqzAsZsWxBnF7YIeuAD0oaMktfHnMXWMheKiA==
IronPort-HdrOrdr: A9a23:IMJNXq3fluYrFFRgFvQECAqjBLAkLtp133Aq2lEZdPRUGvb4qy
 mLpoV96faUskd0ZJhOo7y90cW7Lk80sKQFh7X5Xo3SOTUO2lHYT72KhLGKq1aLdhEWtNQtt5
 uIG5IOceEYZmIbsS+V2meFL+o=
X-IronPort-AV: E=Sophos;i="5.90,151,1643691600"; 
   d="scan'208";a="65406755"
Date: Thu, 3 Mar 2022 15:41:25 +0000
From: Anthony PERARD <anthony.perard@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>, Bertrand Marquis <bertrand.marquis@arm.com>,
	Roger Pau =?iso-8859-1?Q?Monn=E9?= <roger.pau@citrix.com>,
	<xen-devel@lists.xenproject.org>
Subject: Re: [XEN PATCH v9 24/30] build: grab common EFI source files in arch
 specific dir
Message-ID: <YiDhpSZC1z/duG4q@perard.uk.xensource.com>
References: <20220125110103.3527686-1-anthony.perard@citrix.com>
 <20220125110103.3527686-25-anthony.perard@citrix.com>
 <3bde2fea-f3fd-3926-b98d-aa0afb549bf8@suse.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <3bde2fea-f3fd-3926-b98d-aa0afb549bf8@suse.com>

On Thu, Mar 03, 2022 at 11:37:08AM +0100, Jan Beulich wrote:
> On 25.01.2022 12:00, Anthony PERARD wrote:
> > --- a/xen/arch/x86/Makefile
> > +++ b/xen/arch/x86/Makefile
> > @@ -77,8 +77,9 @@ obj-$(CONFIG_COMPAT) += x86_64/platform_hypercall.o
> >  obj-y += sysctl.o
> >  endif
> >  
> > -# Allows "clean" to descend into boot/
> > +# Allows "clean" to descend
> >  subdir- += boot
> > +subdir- += efi
> 
> No similar addition is needed for Arm?

No, because Arm already have "obj-$(CONFIG_ARM_64) += efi/", which has
the same effect on clean.

Make clean doesn't use ${ALL_OBJS} to find out which directory to clean, so
adding "subdir-" is needed at the moment.

> > --- /dev/null
> > +++ b/xen/common/efi/efi-common.mk
> > @@ -0,0 +1,15 @@
> > +EFIOBJ-y := boot.init.o pe.init.o ebmalloc.o runtime.o
> > +EFIOBJ-$(CONFIG_COMPAT) += compat.o
> > +
> > +CFLAGS-y += -fshort-wchar
> > +CFLAGS-y += -iquote $(srctree)/common/efi
> > +
> > +# Part of the command line transforms $(obj) in to a relative reverted path.
> > +# e.g.: It transforms "dir/foo/bar" into successively
> > +#       "dir foo bar", ".. .. ..", "../../.."
> > +$(obj)/%.c: $(srctree)/common/efi/%.c FORCE
> > +	$(Q)ln -nfs $(subst $(space),/,$(patsubst %,..,$(subst /, ,$(obj))))/common/efi/$(<F) $@
> 
> What is the "reverted" about in the comment? Also (nit) I think you want
> s/in to/into/.

I've tried to described in the single word that the result is a relative
path that goes in the opposite direction to the original relative path.
Instead of going down, it goes up the hierarchy of directories.
Maybe "reversed" would be better? Do you have other suggestion?

Thanks,

-- 
Anthony PERARD


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 16:00:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 16:00:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283489.482514 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPnsF-0001sw-20; Thu, 03 Mar 2022 16:00:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283489.482514; Thu, 03 Mar 2022 16:00:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPnsE-0001sl-VG; Thu, 03 Mar 2022 16:00:14 +0000
Received: by outflank-mailman (input) for mailman id 283489;
 Thu, 03 Mar 2022 16:00:14 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ylIu=TO=citrix.com=prvs=0548df38f=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nPnsE-0001pi-4R
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 16:00:14 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 0059077b-9b0b-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 17:00:10 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0059077b-9b0b-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646323210;
  h=date:from:to:cc:subject:message-id:references:
   mime-version:in-reply-to;
  bh=Nrm8Mp+phKDtK0cF4inF5uREjViFJTG5FlJb3pZo8/E=;
  b=aic/ryvUQ8WkoU2qkhVAXjmDbZ3bg+xVvJUgf+na0OMaKSW0wtL0Z5YW
   0X7HE/5icahlTpRfeYU/zybGrwsjWFVvaoskOq6ARS75VMdendnzh+5DI
   gis/9GQAwcEmWQr/drU5x6M/b2GGVFQbCyaOphS7sJYghzF4CrW7TRUgT
   4=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 65327460
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:yCc+kaLvrPjYtzSeFE+R0JUlxSXFcZb7ZxGr2PjKsXjdYENShDYOz
 2NLWjvQaf7fajH0eo0iaYSxoxgOv5WBmIRhQANlqX01Q3x08seUXt7xwmUcns+xwm8vaGo9s
 q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUYYoAQgsA148IMsdoUg7wbRh2dYz2YLR7z6l4
 rseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3fMldG0DQUIhMdtNWc
 s6YpF2PEsE1yD92Yj+tuu6TnkTn2dc+NyDW4pZdc/DKbhSvOkXee0v0XRYRQR4/ttmHozx+4
 PNLn4SRTxkFB/Tzvb4wXDtfNR9HbLITrdcrIVDn2SCS50jPcn+qyPRyFkAme4Yf/46bA0kXq
 6ZecmpUKEne2aTmm9pXScE17ignBMDtIIMYvGAm1TzDBOwqaZvCX7/L9ZlT2zJYasVmQ6uFP
 ZVFN2IHgBLoXSJfFUUvJaAHgNyLoUvZSy9UsAiRuv9ii4TU5FMoi+W8WDbPQfSVQe1Fk0Deo
 XjJl0zpDxdfONGBxD6t9nO3mvSJjS79QJgVFrCz6rhtmlL77m4cEhoNTnOgvOK0zEW5Xrpix
 1c8o3R06/JorQryE4e7D0bQTGO4UgA0fdx6C8w89i20k5XxuSuWJG8icAcQd4lz3CMpfgAC2
 liMltLvIDVgtryJVH6QnoupQSOO1Ts9djFbO3JdJecRy5y6+dxo0EqTJjp2OPPt1rXI9SfML
 ydmRcTUr5EaloY12qqy5jgraBr898GSHmbZCug6N19JDz+Vhqb4P+RECnCBtJ6sybp1qHHb5
 hDofODEsYgz4WmlznDlfQn0NOjBCwy5GDPdm0VzOJIq6i6g/XWuFagJvm0gfhs3bpdfJmKwC
 KM2he+3zMUJVJdNRfUqC79d9uxwlfSwfTgbfqq8giVyjmhZK1bcoXAGib+41GHxikk8+ZzTy
 r/AGftA+U0yUPw9pBLvHr91+eZymkgWnDqDLbimn0XP+efPPxa9FOZaWGZim8hktctoVi2Oq
 I0BXyZLoj0CONDDjt7/qtZCfQhXdiFgXfgbaaV/L4a+H+avI0l5Y9e5/F/rU9ANc3h9/gsQw
 kyAZw==
IronPort-HdrOrdr: A9a23:Yeh4t6wP3sdKfCEc7DBkKrPxmuskLtp133Aq2lEZdPULSKGlfp
 GV9sjziyWetN9IYgBZpTnyAtj6fZq8z+8/3WB1B9uftWbdyQ+Vxe1ZjLcKhgeQYhEWldQtn5
 uIEZIOb+EYZGIS5amV3OD7KadH/DDtytHKuQ6q9QYJcegcUdAD0+4WMGamO3wzYDMDKYsyFZ
 Ka6MYCjSGnY24rYsOyAWRAd/TfpvXQ/aiWLSIuNloC0k2jnDmo4Ln1H1yzxREFSQ5Cxr8k7C
 zsjxH53KO+qPu2oyWsmFM7rq4m1ucJ+OEzRPBkufJlaQkETTzYJriJbofy/QzdZtvfrWrC3u
 O85yvIdP4DkU85NlvF3CcFnTOQnQrGokWStWOwkD/tp9f0Syk9DNcEjYVFcgHB405lp91k1r
 lXtljpwaZ/HFfOhyL4o9fBUBZrmk69rT4+nekaiGE3a/psVFZ9l/1qwKpuKuZ2IMs60vFWLM
 B+SMXHoPpGe1KTaH7U+mFp3dy3R3w2WhOLWFILtMCZ2yVf2CkR9TpR+OUP2nMbsJ4tQZhN4O
 rJdqxuibFVV8cTKaZwHv0IT8e7AnHEBRjMLGWRK1L6E7xvAQOFl7fnpLEuoO26cp0By5U/3J
 zHTVNDrGY3P1njDMWftac7hywlgF/NLwgF5vsumaSR4IeMO4YDGRfzOWwTrw==
X-IronPort-AV: E=Sophos;i="5.90,151,1643691600"; 
   d="scan'208";a="65327460"
Date: Thu, 3 Mar 2022 16:00:05 +0000
From: Anthony PERARD <anthony.perard@citrix.com>
To: Juergen Gross <jgross@suse.com>
CC: <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>
Subject: Re: [XEN PATCH v2 16/29] libs,tools/include: Clean "clean" targets
Message-ID: <YiDmBTEihSFCyty4@perard.uk.xensource.com>
References: <20220225151321.44126-1-anthony.perard@citrix.com>
 <20220225151321.44126-17-anthony.perard@citrix.com>
 <d5770e63-7d63-427d-1ca6-02982b5fa00e@suse.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <d5770e63-7d63-427d-1ca6-02982b5fa00e@suse.com>

On Thu, Mar 03, 2022 at 09:21:48AM +0100, Juergen Gross wrote:
> On 25.02.22 16:13, Anthony PERARD wrote:
> > diff --git a/tools/include/Makefile b/tools/include/Makefile
> > index d965987f55..3a03a0b0fa 100644
> > --- a/tools/include/Makefile
> > +++ b/tools/include/Makefile
> > @@ -82,6 +82,7 @@ uninstall:
> >   clean:
> >   	rm -rf xen xen-xsm acpi
> >   	$(MAKE) -C xen-foreign clean
> > +	rm -f _*.h
> 
> Use $(RM) instead? OTOH this could be done in a patch of its own
> switching all rm -f instances to $(RM).

This isn't really something that I think matter. Per GNU make's manual,
"rm" need to exist. Without it part of the build system could be broken.
Also setting $(RM) to something other than "rm -f" isn't going to work
well either. So whether we use $(RM) or `rm -f` shouldn't matter.

All of that to say that I'm not necessarily change one for the other. It
mostly depends on context.

Also, I might change those "clean:" rules later to collect files to
clean in a variable $(&CLEAN_FILES), when that will be possible.

> Reviewed-by: Juergen Gross <jgross@suse.com>

Thanks,

-- 
Anthony PERARD


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 16:01:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 16:01:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283493.482525 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPntE-0002RK-BT; Thu, 03 Mar 2022 16:01:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283493.482525; Thu, 03 Mar 2022 16:01:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPntE-0002RD-8H; Thu, 03 Mar 2022 16:01:16 +0000
Received: by outflank-mailman (input) for mailman id 283493;
 Thu, 03 Mar 2022 16:01:15 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPntC-0002IT-T1
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 16:01:15 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 26821bb2-9b0b-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 17:01:13 +0100 (CET)
Received: from EUR02-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur02lp2052.outbound.protection.outlook.com [104.47.6.52]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-8-ilkSwlCcNcKor__p8WefJQ-1; Thu, 03 Mar 2022 17:01:12 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PA4PR04MB8061.eurprd04.prod.outlook.com (2603:10a6:102:bb::13)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 16:01:10 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 16:01:10 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 26821bb2-9b0b-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646323273;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=lgMq9A/GB8C6EyR43l7HUYjyuXSS3p5LYTfsPgtZ/Fs=;
	b=FJMmF2TtElNq8q96ANzqNqy9UwF+Io186UcXVJl1QM13fqa+Fp2S1upbqkX9gtfYEwPiPZ
	FLz9MyR4l9Ii4ZC17r79Ar8ZGB2Lr8jPGZRxDvOvgkYaaueLL9Uq80N3kah5TYrQen50Vn
	Jvnah0xHs7xlYjb11ojvNyaL4QK1X5Q=
X-MC-Unique: ilkSwlCcNcKor__p8WefJQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=WdJmZtkXGlkG9vHndVcBlEAgNqajEZogLsClE5KI/cqH1ZZ70ncPvnVFMv30cpmmmVHvXn9xPxWOYU9xv8c3JC5+vpGzI93wc2PXRp8nVK2kjIczc0ZGBUBD+vnY9yyhdXUrGNQKwCoGaC1v9Z2ZFWfHm3LMJvFn/bo3mXwqUarpTd8j/GfjaFpWXOXjzftvVEgD/Dk9IJVkWITxMsdb1vYE/5xQ7RXyIritODiIUzfI/znGoE83GDuq6SzfmIOi2HKXPykafRbkST5npE8oyWpTRQm7+6ovLCsV0FPITbkjB1zC2tKJtwSCt9L0g/RgHbfaKdj9kZBW/dZrcjP/rA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=lgMq9A/GB8C6EyR43l7HUYjyuXSS3p5LYTfsPgtZ/Fs=;
 b=drUeUZ0cEa4wqiuT9HuTO8h4+Xjq44mwqKPINsXqlzg33QR4WgQzXZU61mYUx09g2d/i+o2mr76twOOWFv1Ts7WYHgjJfW4jcCgdLRIcsUc37e4w5gPlcWQGcWdjnZPIVop/fPXigl5J0uycSMNURMoXLOXEli16uDvl+tED0XNOgLACRkzvWYX92DGg76TOCJ4KicWtpYg2tWYmMFAxhXgWQtBza+rT3kKgAU6u2zFdXcuUDZTPx2dO9rHVq4rNOLrWGNDbKCKY2m54TSJyN3cn9Gr3+zYA7naMMPCdx33Q3Ec+YEo6qPryiE56bVDOE0+U/UJjwXdq9HPACqiaMQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <48c58217-30c6-790f-a058-49b887fc1355@suse.com>
Date: Thu, 3 Mar 2022 17:01:07 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [XEN PATCH v9 24/30] build: grab common EFI source files in arch
 specific dir
Content-Language: en-US
To: Anthony PERARD <anthony.perard@citrix.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 xen-devel@lists.xenproject.org
References: <20220125110103.3527686-1-anthony.perard@citrix.com>
 <20220125110103.3527686-25-anthony.perard@citrix.com>
 <3bde2fea-f3fd-3926-b98d-aa0afb549bf8@suse.com>
 <YiDhpSZC1z/duG4q@perard.uk.xensource.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YiDhpSZC1z/duG4q@perard.uk.xensource.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P191CA0102.EURP191.PROD.OUTLOOK.COM
 (2603:10a6:209:8a::43) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 9ae153f6-9631-49bf-8d38-08d9fd2f08e6
X-MS-TrafficTypeDiagnostic: PA4PR04MB8061:EE_
X-Microsoft-Antispam-PRVS:
	<PA4PR04MB806108EC6A5C6D70F29DD281B3049@PA4PR04MB8061.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(31696002)(4326008)(316002)(38100700002)(186003)(66476007)(66556008)(8676002)(2616005)(6916009)(5660300002)(26005)(508600001)(36756003)(6486002)(31686004)(6666004)(66946007)(86362001)(6506007)(6512007)(53546011)(8936002)(7416002)(54906003)(83380400001)(2906002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?b3FNamxleHUxZExCMXRpTjhEQ1BIcE9BQTN6eEtxdUJydTNlS0FNK1Z5S213?=
 =?utf-8?B?Z0xneU1LV20yeGVlMWlGUXVBOE1TMnlPcmEyUEFsVXdqWC9GakNnQkVxdVRH?=
 =?utf-8?B?aXFBNTYxeENLYzg3ZjNyanBvL2hva000OEpGWFZMRHVUZ0d0UVIvWUpRaU5u?=
 =?utf-8?B?R3NRazkyeUlkL1NiaTBWNnFhVXMxUHNUWWk3L1VqbVVkdkdUVTB3NmUyNlBM?=
 =?utf-8?B?dUlOSXduamdjekdLMzNWUmh1MDZ4SkxHcFFuSkNDam13bGxTRUhjMnRZQkFn?=
 =?utf-8?B?ZXVrZFp3WTZ6Rk0xK1Q0QjJnR1hCQjgwVzlKWURoeThNVVpib0twNUM1K0Qw?=
 =?utf-8?B?Y1RFbnAzNDFLM3Y0aVFmbVJvSHZFTHA3S3hrUTlLSnZMb0xqNTN0ajZNTTNP?=
 =?utf-8?B?dktBbWc3emR1OXprWk5IS3E3TUVrNExqSmxyZlRTL25mTXhhR2hxRlZhOXBv?=
 =?utf-8?B?dWtjZG9rYmV0NSs5a2ViTzlRbjdtVHdEb1lDWForN2NjbHBabHlacHA5d3lw?=
 =?utf-8?B?T1QxaTlDT3BzVnBjMGY2bExxTEYzT3E5TXR4ZDRkSUVlczVLTXhxbzVQUnB2?=
 =?utf-8?B?Nzc3T1VQTGhka2c3cVdnd3VocG5WTFZsdGRDV3JYR3EzbHZpc2ttaEJ0TU5O?=
 =?utf-8?B?ajVHNlFVSW9UQnphS1ZJRWV6U3RmVW1mM09tUXBuNU9RSVJPQ2hiR1lueVQ3?=
 =?utf-8?B?c3lOYTkzNitrVHN6VkpFY1hnMzUvb0NETmFqcDFEN3JaOERQVERSQ2pCdFRQ?=
 =?utf-8?B?Q0ZZTVF4bTJlWXpJbUlzelN1YzRhcmc2a0hzOUwzelVvS3I2dUVsVGhSQmV4?=
 =?utf-8?B?SjI1NlkwTUZkTkIxUkpUdDlNa0pkS2llYzhNZGxSeVZJdW1XMFYvL1hOelFV?=
 =?utf-8?B?MDhMdHlHSUJlVXRESENpQk9zT3htR0FPS1V4WUVPS01PendiQ1VuRWd0dkIr?=
 =?utf-8?B?MVJrV2w1SDFYYmk1Uk91MTB0c29qRGJyL3F1OTlmemRpU24xQ053M24vZjl1?=
 =?utf-8?B?czJveG1yZjNNckl1c1dJdDJlRzg1OXVjUDdiYk1OT3JRVVNOSEJtdHlVQ0x3?=
 =?utf-8?B?KytUcFEvQkMwcXpWRUNKaTBHUTc1TEMrZnZJbjVMclJLZExEdlREMHZyT0FN?=
 =?utf-8?B?M0sxNkJ0N2s1ZG1OTVJ0MTljdFVETHViSU81MTE2RTRPZ1c1dGtXQzhjbnRM?=
 =?utf-8?B?SGdGNjhmRWhwM1lrSnYyYmc1OVdrNE5VeUFoRnJGeU1CWUJtT1NSa0JUVGpQ?=
 =?utf-8?B?eitQM0p5dm95YWRxemtnNzBWZmM4NUMra0tkVlJsRm9mNFhsVGF2ZDRxVktw?=
 =?utf-8?B?SEdjZU4vV3FxQkp3cm5sZWc5SUpYUGE0RkdnWVZ2WEppVFdDV0ZoWG9FTThU?=
 =?utf-8?B?bC9aZitrSWFQYUswNm9vNU9LZ080Y3U2TWtGZG1GcFRJWG93VmxmTE9RTWJW?=
 =?utf-8?B?VUJWbWMxb3dQL1NkZEhNNXdmTnlDVTZNNS9idkNsaTArWXdJdkV3SER1cG9a?=
 =?utf-8?B?QVhMWndXMXlzNVpBZWZZT283b21iQUQxL1J2M09BcVNQcVBxZ2VING9HTFlW?=
 =?utf-8?B?WE9aSE13QmN4M09tZVhaeFE5YWh3QTB3SnI5VkkzMHduYmMrMzk1TXJpQXZD?=
 =?utf-8?B?c1B6cW14aUVSSmNjM3JqQU5KUE1mdFo4K29UUkxZb1p5RkpVRVY4aWdpWjhz?=
 =?utf-8?B?L1cyUDl4UWFWYjVGckFRaEUwVHQ5V1hWdTVqMkFaMW9jZ25KV1d1VjlvUzZr?=
 =?utf-8?B?V3JoLzRuQ2N2ZUxuR3JUYkxFRFRuM2RRT1hoVEhKRmhOTFRMelRQK1l5VjFl?=
 =?utf-8?B?QmRRN2J5K3UxekFpOVhhY3NaNmF5aE5wV1dTajB5UHc3TTAxaUFja2dPT0J4?=
 =?utf-8?B?MitQRk9uaTJkU3F0bFY1RVZLbktKaHlPdFFSSnIrWHBaSkg2NHV0MllXNmZv?=
 =?utf-8?B?dHdFekM4QkNwbGQ1MlFKQ1BNNkF0eDRjeitFeVdDN3hWejllN0NESkt2SW1D?=
 =?utf-8?B?eTNQZDVQMVlRdUJucHUwdGN0RTVNUThmS2pucmpoUUZ2ZFEzRFNUTnE0aEhM?=
 =?utf-8?B?QjhaNlNTMFhtRmZOaXltZUxsc1NpaTl0WDFVQ0pyeU5FTEFYQm9IejRBdEw4?=
 =?utf-8?B?OTVXcG1DTTVQMmY4QVk2Z2laQm5pd0V5ZGdHZlJCTkZac1RPZ2crd0xtcUhN?=
 =?utf-8?Q?gRpSshVkk1b3BC1Qe/a81sY=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 9ae153f6-9631-49bf-8d38-08d9fd2f08e6
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 16:01:10.7065
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: DwEbuM6DFHeIdsHSObgenvj8rTHcVKuZVoBZ0vzx9JqEeHpgIvOorbRReYpb0JeJdPuflIUKrroPpemc5tRZTw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR04MB8061

On 03.03.2022 16:41, Anthony PERARD wrote:
> On Thu, Mar 03, 2022 at 11:37:08AM +0100, Jan Beulich wrote:
>> On 25.01.2022 12:00, Anthony PERARD wrote:
>>> --- a/xen/arch/x86/Makefile
>>> +++ b/xen/arch/x86/Makefile
>>> @@ -77,8 +77,9 @@ obj-$(CONFIG_COMPAT) += x86_64/platform_hypercall.o
>>>  obj-y += sysctl.o
>>>  endif
>>>  
>>> -# Allows "clean" to descend into boot/
>>> +# Allows "clean" to descend
>>>  subdir- += boot
>>> +subdir- += efi
>>
>> No similar addition is needed for Arm?
> 
> No, because Arm already have "obj-$(CONFIG_ARM_64) += efi/", which has
> the same effect on clean.
> 
> Make clean doesn't use ${ALL_OBJS} to find out which directory to clean, so
> adding "subdir-" is needed at the moment.

Oh, I see.

>>> --- /dev/null
>>> +++ b/xen/common/efi/efi-common.mk
>>> @@ -0,0 +1,15 @@
>>> +EFIOBJ-y := boot.init.o pe.init.o ebmalloc.o runtime.o
>>> +EFIOBJ-$(CONFIG_COMPAT) += compat.o
>>> +
>>> +CFLAGS-y += -fshort-wchar
>>> +CFLAGS-y += -iquote $(srctree)/common/efi
>>> +
>>> +# Part of the command line transforms $(obj) in to a relative reverted path.
>>> +# e.g.: It transforms "dir/foo/bar" into successively
>>> +#       "dir foo bar", ".. .. ..", "../../.."
>>> +$(obj)/%.c: $(srctree)/common/efi/%.c FORCE
>>> +	$(Q)ln -nfs $(subst $(space),/,$(patsubst %,..,$(subst /, ,$(obj))))/common/efi/$(<F) $@
>>
>> What is the "reverted" about in the comment? Also (nit) I think you want
>> s/in to/into/.
> 
> I've tried to described in the single word that the result is a relative
> path that goes in the opposite direction to the original relative path.
> Instead of going down, it goes up the hierarchy of directories.
> Maybe "reversed" would be better? Do you have other suggestion?

I'd simply omit the word. In case you're fine with that, I'd be happy
to adjust while committing.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 16:01:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 16:01:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283495.482536 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPntP-0002mP-Jj; Thu, 03 Mar 2022 16:01:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283495.482536; Thu, 03 Mar 2022 16:01:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPntP-0002mI-GS; Thu, 03 Mar 2022 16:01:27 +0000
Received: by outflank-mailman (input) for mailman id 283495;
 Thu, 03 Mar 2022 16:01:26 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=GOOP=TO=santannapisa.it=Andrea.Stevanato@srs-se1.protection.inumbo.net>)
 id 1nPntN-0002kL-Hx
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 16:01:26 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04on0615.outbound.protection.outlook.com
 [2a01:111:f400:fe0d::615])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 2c43c77a-9b0b-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 17:01:23 +0100 (CET)
Received: from DB7PR03MB5002.eurprd03.prod.outlook.com (2603:10a6:10:74::22)
 by AM9PR03MB7962.eurprd03.prod.outlook.com (2603:10a6:20b:439::17) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Thu, 3 Mar
 2022 16:01:21 +0000
Received: from DB7PR03MB5002.eurprd03.prod.outlook.com
 ([fe80::746a:e27:47ff:3e90]) by DB7PR03MB5002.eurprd03.prod.outlook.com
 ([fe80::746a:e27:47ff:3e90%7]) with mapi id 15.20.5038.015; Thu, 3 Mar 2022
 16:01:21 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2c43c77a-9b0b-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=DFJBA9Cdq33bdC6BdrqPNr42SyrrSA/5nYM9bhhqUmzyq5JYgL8PIHai6rEQ6PwZmjUTgDkMmxx3yEdNieXAy1o8nY/zMQiqFNDKE2IemA2PDnWIb8enraYQPYqRsaP77d3clesbYLIw96dwQ7aCoqMp9AyQ3THSvUZQLI0xfyXqTJ5jcAi0ZLObVBvzOvG7enjAP891r9ZlZJxA/AwXFUrmBd2jnoxoUampjL5UP+OOjqDYunj35RMJgQ/JVDirI7svOXSdiETe9K/iyXfHMour4qsmbB+KnyoWGgKdCrEsAM8AwRbydkpk4ThWc0Zma0SISuMBWVH5/oEvNyxNZg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=JGpx62JPtQ9DYy9P5hgnvckWiXrXf0XqjWaJlNcsnhU=;
 b=eNH2ExUzA4i2ZuqULq/+QA+JIInEk+vY/GvWs2cuv27nc40/N+RNdKtqSD2dIif3tShezA2gvsaewKf6M28F2xXgmj5muYpFBpswGJUKBOqVCVqTh4YZw9rphfPUk/oi74aLXsOlSLSZ/8LuDYK+xhVCvcbQ5lV7fKi9opiX0fZarLFtUjPc1rr3GHHZDelkoepxp1fTpY9cW5EsucEwm7upcbbxr6n4acoY8Dmoa/0/2cThcIyOs2bIS2qLDgD0kE1PsyCJJ9RqphA5JB57489+vlRgFk1+OVKQZFhMuBD5G4yj7rw6PvZYahnKfpUsD+VlKur7OL/H8OBL9xmanA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=santannapisa.it; dmarc=pass action=none
 header.from=santannapisa.it; dkim=pass header.d=santannapisa.it; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=santannapisa.it;
 s=selector1;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=JGpx62JPtQ9DYy9P5hgnvckWiXrXf0XqjWaJlNcsnhU=;
 b=FYlFzIwWQhKGLiOmsU7HG7QR/ZLzcJAKy/L/goEm9nqYfBTYs7zBr+EgQEiYsXfUoVi+M16/sC4lUFUZwHI1QZnxHTFy+uAgMzi9AwuSjSTuRpi6M1OI3mb8x9fspfQeq0lvo84VGKPsKZtNo4ar5ldAzJPlJVUiPdD8KSSQxRM=
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=santannapisa.it;
Message-ID: <92827eec-b6e9-9c95-8f9e-fcf063d45090@santannapisa.it>
Date: Thu, 3 Mar 2022 17:01:23 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.4.0
Subject: Re: Network driver domain broken
Content-Language: en-US
From: Andrea Stevanato <andrea.stevanato@santannapisa.it>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: "roger.pau@citrix.com" <roger.pau@citrix.com>, "wl@xen.org" <wl@xen.org>,
 anthony.perard@citrix.com
References: <DB7PR03MB50027EE92E11BFFF71AADC4598049@DB7PR03MB5002.eurprd03.prod.outlook.com>
In-Reply-To: <DB7PR03MB50027EE92E11BFFF71AADC4598049@DB7PR03MB5002.eurprd03.prod.outlook.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: MR2P264CA0091.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:500:32::31) To DB7PR03MB5002.eurprd03.prod.outlook.com
 (2603:10a6:10:74::22)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2a67fbd2-2ecd-4eef-8f6c-08d9fd2f0f3a
X-MS-TrafficTypeDiagnostic: AM9PR03MB7962:EE_
X-Microsoft-Antispam-PRVS:
	<AM9PR03MB7962F2608CBCD16D41DDF62598049@AM9PR03MB7962.eurprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DB7PR03MB5002.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(66476007)(4326008)(8676002)(66556008)(66946007)(83380400001)(3480700007)(36756003)(31696002)(30864003)(53546011)(52116002)(2906002)(38350700002)(38100700002)(44832011)(8936002)(5660300002)(86362001)(26005)(186003)(31686004)(6506007)(6486002)(6512007)(786003)(316002)(6916009)(508600001)(54906003)(2616005)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?dGZwd1NYNktmazZBYTZzSXhjZUcyMzNERDBDSGczVHJpb3JHWVRvT0x6b21M?=
 =?utf-8?B?TGJrcVNoV3Q0SGtVZTV4dlpuMmxKNEsweWpxTkxzRC9vV3k2VkdWVVJoeGUr?=
 =?utf-8?B?TEhZV1lEemh1dERLS1ZyZkZ2dkZxbGIxSXNjL3JNRjhCWXV3Znc1Tm5zdGxI?=
 =?utf-8?B?M3RWdFBIT2JhQlNTNUw5dzI2cTBtQ1hFOVR2ZERMZG40djN2SlZ6QnduOWFm?=
 =?utf-8?B?aHMvT3F5ajNnRGZPNytjWFNPbzhwOFNMTVJVa2dENmVFOWxsbHpwN1NneFMv?=
 =?utf-8?B?SC9uREtGY1BTU2lpQVBld0hBenlET29DTjBsVVpKVS9NdTg3VDRIU2hIY2c1?=
 =?utf-8?B?aHBiL0hPV0wvdHIwNFUwZXNTYmxVL2xDRkM1SE84VXcwUU1mMlZ4d0NzYjBr?=
 =?utf-8?B?Y2RLQW96cmQ1eGpsTTU2Y3dYV09VZ0NwUVVlUDhZQ2FvSTFHc0REdGhDdmE4?=
 =?utf-8?B?YnJqVjV2aXdib2d4dU5LRWd6MXhGRTY4YXNuODN3dkJodjY1Nmh4NGhVMjRo?=
 =?utf-8?B?UWN3Wld1aVVmeC9BNXpNM3NvSXVQcTRaWE01bUJSNHJjOGhZa3dVYmU4UDk4?=
 =?utf-8?B?aU9qeDlxWUtJU3NIM1diNjJkWFpDSk1leVFFZDdaRlRqSFNnWmdWZHZuZ0No?=
 =?utf-8?B?T29aRk1xR3ROaktQVVYvYzFUZllxMVFFWm5sWUtMWFluOURFMmJsOHNReEN5?=
 =?utf-8?B?QnBIVGF0ZzdNRllBWldHSTVXbEp0NnRackV6Q1lhVE1PQWJOa0Q2a2xCaTdh?=
 =?utf-8?B?M2RVcVhZb2pkOVp1NVdHRXNrQWtHZkRMcnRVL1UzR2k0dkd1WkRBZCs0cFBP?=
 =?utf-8?B?QlUwcWdHRE81ejZ1bkdYcDFPdVhCMGt6VEdHbXM2amt5Rk5BNm9uRmhsb2RQ?=
 =?utf-8?B?RXJuN0hPTEZ3cnBTeXlaR3pXb2tJOFhOYlNSMDArTnlqYzVPQTFJUFFyNlg2?=
 =?utf-8?B?ODg3cUFZNURJcVNlWDVKNFJDTHMvalBUcUFOaXVZaitpc0UxZEhOREp4Rm9r?=
 =?utf-8?B?ajFvMHp4bE5DR1dTamg3SzFXcTFoYkpKbnhsbzRjRjVrSURzbTlheXJrNzVF?=
 =?utf-8?B?V243dHg3UGZNcHNXR2VDT0dERGtLYjk3WTlTdnM3enBVU01zemxpY1c0S0U3?=
 =?utf-8?B?UXdkWkN6aFVidEo5MEZ0MjBRdlJYZjROVlpsSWRFVTRHOHVnMHNMeEJoMWhE?=
 =?utf-8?B?cGZ3NUZTVmt1VHRnNklxaGFWRU5WQ3RncFN4ejgwbFZSWFAvNnpiNUNpSnhs?=
 =?utf-8?B?WFZsckVPS3pOaXI5MEhnZjN2RG5PSkY5SlBQRjZpNnlFOERndnZwV2R6Z3RG?=
 =?utf-8?B?SUpmbURZZ21IelB1VHN4OCsvTXdPQW8vMFM0cDVGWGx1ZXpEdC9IVGRZa0hL?=
 =?utf-8?B?YzJiQlFLWXgxUW1iTE9LSXNsc3V2NG5iT2FqSVA1TkZGL3ErT2QzOHBMZ1I0?=
 =?utf-8?B?SndxNkJ5NkZUai8vQXAzZ3dlM21tWFhWMjEwOGJRdDBBV2VYRGo4RFlPUDBX?=
 =?utf-8?B?RmRYUTRWNnpKTFlWOHVKVDJ6NmJvUHlQVUtNQytUUUJYejg5T2ZqNDdCR2FM?=
 =?utf-8?B?OWFCOG4yWDRyTEplR3Z1RUJSMXBhNjdTSW0vamh5OXFVdjNlMEwwR3JtcGIr?=
 =?utf-8?B?dzY1RWs1NWY4KzhUSmwzZzY4eSt2TkxBcFBLUm84UEJ1OEtuL3J4ZHZQb01S?=
 =?utf-8?B?SFBnYkwvTU05RFFrYkZMNzMrYzd4U2kwQmJyUERoZk9PMUtLbGxXcUNHTWxP?=
 =?utf-8?B?RTFvSjdGOVJUeCtGRzNpQmpWUHZKdjlqbWsyb000M2p3LzhhUHcwanRBUDdt?=
 =?utf-8?B?Z1ZrQkRYU2JGYS85aTROTFZNSm1rZytINHBLcnVKcjFuUjRNSytGbkcwQkpQ?=
 =?utf-8?B?Sll6MnE2dHJqbEFuMWRWa2c0Mi8wZGdOTVlreHhab2FMZFd5V2Zwc29MTlBi?=
 =?utf-8?B?d3Rub3Z3bGJsZFh1OVE3MHAxOHVvMUo5OGdiT1V6aFBoVkdMVHRIZjY2NDd3?=
 =?utf-8?B?Q2JPeVloV1k4TUZBNmR3YTBEK1hMLzRvUE9ydHRBc3Z6YUFxTjg2SS9UMWxZ?=
 =?utf-8?B?cmNHYmtySnlpUHBpaHdpVHNDb2xUUFVLRUxIOEh4QW1CVFJ3elBsd2xQdVYr?=
 =?utf-8?B?U1o3RGl6b2FWRXZkL3FYdXBDZS8xaWNKQUFkVnRCQ0pIZ05KRkc3SGRRZWd6?=
 =?utf-8?B?SDVNMi85b01aYzlKc1dMeXoybmM3YllQRzNueUFMZzFqOWFWUEwxWEo4SE9G?=
 =?utf-8?B?OHUzaURNNFlXejdZQ3dYakxnUXpUZHVPQnE4UThVSmV3TUtYT0E4M2cwOGZT?=
 =?utf-8?B?YWlkWlJVYmtjUEc3TG11aDJxcTVoV3JZVWZsUXZaM1VFWG5zYjNTZz09?=
X-OriginatorOrg: santannapisa.it
X-MS-Exchange-CrossTenant-Network-Message-Id: 2a67fbd2-2ecd-4eef-8f6c-08d9fd2f0f3a
X-MS-Exchange-CrossTenant-AuthSource: DB7PR03MB5002.eurprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 16:01:21.2921
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: d97360e3-138d-4b5f-956f-a646c364a01e
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Xjh5YPUN8hLJQluwaPLwxK0ec8qGUKYOhyh3KDBV40JE+HerzRmZ/yYo4DCLjK9FfBwH64GAz/XovUqpquYg2bdgbht0cSZFMeQhn1sy84QGVKUrcyrUplvf/MdG1PZs
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR03MB7962

On 03/03/2022 15:54, Andrea Stevanato wrote:
> Hi all,
> 
> according to the conversation that I had with royger, aa67b97ed34  broke the driver domain support.
> 
> What I'm trying to do is to setup networking between guests using driver domain. Therefore, the guest (driver) has been started with the following cfg.
> 
> name    = "guest0"
> kernel  = "/media/sd-mmcblk0p1/Image"
> ramdisk = "/media/sd-mmcblk0p1/rootfs.cpio.gz"
> extra   = "console=hvc0 rdinit=/sbin/init root=/dev/ram0"
> memory  = 1024 
> vcpus   = 2
> driver_domain = 1
> 
> On guest0 I created the bridge, assigned a static IP and started the udhcpd on xenbr0 interface.
> While the second guest has been started with the following cfg:
> 
> name    = "guest1"
> kernel  = "/media/sd-mmcblk0p1/Image"
> ramdisk = "/media/sd-mmcblk0p1/rootfs.cpio.gz"
> extra   = "console=hvc0 rdinit=/sbin/init root=/dev/ram0"
> memory  = 1024 vcpus   = 2
> vcpus   = 2
> vif = [ 'bridge=xenbr0, backend=guest0' ]
> 
> Follows the result of strace xl devd:
> 
> # strace xl devd
> execve("/usr/sbin/xl", ["xl", "devd"], 0xffffdf0420c8 /* 13 vars */) = 0
> brk(NULL)                               = 0xaaaaeaf3b000
> faccessat(AT_FDCWD, "/etc/ld.so.preload", R_OK) = -1 ENOENT (No such file or directory)
> openat(AT_FDCWD, "/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3
> fstat(3, {st_mode=S_IFREG|0644, st_size=7840, ...}) = 0
> mmap(NULL, 7840, PROT_READ, MAP_PRIVATE, 3, 0) = 0xffff9f45e000
> close(3)                                = 0
> openat(AT_FDCWD, "/usr/lib/libxlutil.so.4.14", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\0200\0\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=68168, ...}) = 0
> mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xffff9f45c000
> mmap(NULL, 131784, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f410000
> mprotect(0xffff9f41f000, 65536, PROT_NONE) = 0
> mmap(0xffff9f42f000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xf000) = 0xffff9f42f000
> close(3)                                = 0
> openat(AT_FDCWD, "/usr/lib/libxenlight.so.4.14", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0`\16\2\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=861848, ...}) = 0
> mmap(NULL, 925752, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f32d000
> mprotect(0xffff9f3fa000, 61440, PROT_NONE) = 0
> mmap(0xffff9f409000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xcc000) = 0xffff9f409000
> mmap(0xffff9f40f000, 56, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffff9f40f000
> close(3)                                = 0
> openat(AT_FDCWD, "/usr/lib/libxentoollog.so.1", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0P\r\0\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=10368, ...}) = 0
> mmap(NULL, 73904, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f31a000
> mprotect(0xffff9f31c000, 61440, PROT_NONE) = 0
> mmap(0xffff9f32b000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1000) = 0xffff9f32b000
> close(3)                                = 0
> openat(AT_FDCWD, "/usr/lib/libyajl.so.2", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\320\22\0\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=38728, ...}) = 0
> mmap(NULL, 102416, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f300000
> mprotect(0xffff9f309000, 61440, PROT_NONE) = 0
> mmap(0xffff9f318000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x8000) = 0xffff9f318000
> close(3)                                = 0
> openat(AT_FDCWD, "/lib/libpthread.so.0", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\300j\0\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=113184, ...}) = 0
> mmap(NULL, 192872, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f2d0000
> mprotect(0xffff9f2ea000, 65536, PROT_NONE) = 0
> mmap(0xffff9f2fa000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1a000) = 0xffff9f2fa000
> mmap(0xffff9f2fc000, 12648, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffff9f2fc000
> close(3)                                = 0
> openat(AT_FDCWD, "/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\320I\2\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=1428872, ...}) = 0
> mmap(NULL, 1502000, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f161000
> mprotect(0xffff9f2b8000, 61440, PROT_NONE) = 0
> mmap(0xffff9f2c7000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x156000) = 0xffff9f2c7000
> mmap(0xffff9f2cd000, 11056, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffff9f2cd000
> close(3)                                = 0
> openat(AT_FDCWD, "/usr/lib/libxenevtchn.so.1", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0@\f\0\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=10240, ...}) = 0
> mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xffff9f45a000
> mmap(NULL, 73856, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f14e000
> mprotect(0xffff9f150000, 61440, PROT_NONE) = 0
> mmap(0xffff9f15f000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1000) = 0xffff9f15f000
> close(3)                                = 0
> openat(AT_FDCWD, "/usr/lib/libxenctrl.so.4.14", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0000\203\0\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=154752, ...}) = 0
> mmap(NULL, 218504, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f118000
> mprotect(0xffff9f13d000, 61440, PROT_NONE) = 0
> mmap(0xffff9f14c000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x24000) = 0xffff9f14c000
> close(3)                                = 0
> openat(AT_FDCWD, "/usr/lib/libxenguest.so.4.14", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0PB\0\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=77248, ...}) = 0
> mmap(NULL, 140880, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f0f5000
> mprotect(0xffff9f107000, 61440, PROT_NONE) = 0
> mmap(0xffff9f116000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x11000) = 0xffff9f116000
> close(3)                                = 0
> openat(AT_FDCWD, "/usr/lib/libxenhypfs.so.1", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\300\16\0\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=14432, ...}) = 0
> mmap(NULL, 78048, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f0e1000
> mprotect(0xffff9f0e3000, 65536, PROT_NONE) = 0
> mmap(0xffff9f0f3000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff9f0f3000
> close(3)                                = 0
> openat(AT_FDCWD, "/usr/lib/libxenstore.so.3.0", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0 $\0\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=31176, ...}) = 0
> mmap(NULL, 107088, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f0c6000
> mprotect(0xffff9f0cc000, 65536, PROT_NONE) = 0
> mmap(0xffff9f0dc000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x6000) = 0xffff9f0dc000
> mmap(0xffff9f0de000, 8784, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffff9f0de000
> close(3)                                = 0
> openat(AT_FDCWD, "/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0@\20\0\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=14296, ...}) = 0
> mmap(NULL, 77920, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f0b2000
> mprotect(0xffff9f0b5000, 61440, PROT_NONE) = 0
> mmap(0xffff9f0c4000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff9f0c4000
> close(3)                                = 0
> openat(AT_FDCWD, "/usr/lib/libxentoolcore.so.1", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0 \10\0\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=6104, ...}) = 0
> mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xffff9f458000
> mmap(NULL, 69768, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f0a0000
> mprotect(0xffff9f0a1000, 61440, PROT_NONE) = 0
> mmap(0xffff9f0b0000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0) = 0xffff9f0b0000
> close(3)                                = 0
> openat(AT_FDCWD, "/lib/libutil.so.1", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0`\21\0\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=14296, ...}) = 0
> mmap(NULL, 77840, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f08c000
> mprotect(0xffff9f08e000, 65536, PROT_NONE) = 0
> mmap(0xffff9f09e000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff9f09e000
> close(3)                                = 0
> openat(AT_FDCWD, "/lib/libuuid.so.1", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0000\30\0\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=30680, ...}) = 0
> mmap(NULL, 94240, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f074000
> mprotect(0xffff9f07a000, 65536, PROT_NONE) = 0
> mmap(0xffff9f08a000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x6000) = 0xffff9f08a000
> close(3)                                = 0
> openat(AT_FDCWD, "/usr/lib/libnl-route-3.so.200", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\200\327\1\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=536688, ...}) = 0
> mmap(NULL, 609024, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9efdf000
> mprotect(0xffff9f05a000, 65536, PROT_NONE) = 0
> mmap(0xffff9f06a000, 32768, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x7b000) = 0xffff9f06a000
> mmap(0xffff9f072000, 6912, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffff9f072000
> close(3)                                = 0
> openat(AT_FDCWD, "/usr/lib/libnl-3.so.200", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\360\221\0\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=141304, ...}) = 0
> mmap(NULL, 205192, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9efac000
> mprotect(0xffff9efcd000, 61440, PROT_NONE) = 0
> mmap(0xffff9efdc000, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x20000) = 0xffff9efdc000
> close(3)                                = 0
> openat(AT_FDCWD, "/lib/librt.so.1", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\0#\0\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=31032, ...}) = 0
> mmap(NULL, 94568, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9ef94000
> mprotect(0xffff9ef9b000, 61440, PROT_NONE) = 0
> mmap(0xffff9efaa000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x6000) = 0xffff9efaa000
> close(3)                                = 0
> openat(AT_FDCWD, "/usr/lib/libfdt.so.1", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0000#\0\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=38800, ...}) = 0
> mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xffff9f456000
> mmap(NULL, 102416, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9ef7a000
> mprotect(0xffff9ef83000, 61440, PROT_NONE) = 0
> mmap(0xffff9ef92000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x8000) = 0xffff9ef92000
> close(3)                                = 0
> openat(AT_FDCWD, "/usr/lib/libxengnttab.so.1", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0`\20\0\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=14368, ...}) = 0
> mmap(NULL, 77984, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9ef66000
> mprotect(0xffff9ef69000, 61440, PROT_NONE) = 0
> mmap(0xffff9ef78000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff9ef78000
> close(3)                                = 0
> openat(AT_FDCWD, "/usr/lib/libxencall.so.1", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\320\17\0\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=14400, ...}) = 0
> mmap(NULL, 78064, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9ef52000
> mprotect(0xffff9ef55000, 61440, PROT_NONE) = 0
> mmap(0xffff9ef64000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff9ef64000
> close(3)                                = 0
> openat(AT_FDCWD, "/usr/lib/libxenforeignmemory.so.1", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0000\16\0\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=14392, ...}) = 0
> mmap(NULL, 78000, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9ef3e000
> mprotect(0xffff9ef40000, 65536, PROT_NONE) = 0
> mmap(0xffff9ef50000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff9ef50000
> close(3)                                = 0
> openat(AT_FDCWD, "/usr/lib/libxendevicemodel.so.1", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0`\23\0\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=14400, ...}) = 0
> mmap(NULL, 78008, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9ef2a000
> mprotect(0xffff9ef2d000, 61440, PROT_NONE) = 0
> mmap(0xffff9ef3c000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff9ef3c000
> close(3)                                = 0
> openat(AT_FDCWD, "/usr/lib/libbz2.so.1", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\320\27\0\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=70472, ...}) = 0
> mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xffff9f454000
> mmap(NULL, 134160, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9ef09000
> mprotect(0xffff9ef19000, 61440, PROT_NONE) = 0
> mmap(0xffff9ef28000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xf000) = 0xffff9ef28000
> close(3)                                = 0
> openat(AT_FDCWD, "/usr/lib/liblzma.so.5", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\3403\0\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=153496, ...}) = 0
> mmap(NULL, 217104, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9eed3000
> mprotect(0xffff9eef7000, 65536, PROT_NONE) = 0
> mmap(0xffff9ef07000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x24000) = 0xffff9ef07000
> close(3)                                = 0
> openat(AT_FDCWD, "/usr/lib/liblzo2.so.2", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\320&\0\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=120648, ...}) = 0
> mmap(NULL, 184336, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9eea5000
> mprotect(0xffff9eec2000, 61440, PROT_NONE) = 0
> mmap(0xffff9eed1000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1c000) = 0xffff9eed1000
> close(3)                                = 0
> openat(AT_FDCWD, "/lib/libz.so.1", O_RDONLY|O_CLOEXEC) = 3
> read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\360%\0\0\0\0\0\0"..., 832) = 832
> fstat(3, {st_mode=S_IFREG|0755, st_size=92056, ...}) = 0
> mmap(NULL, 155664, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9ee7e000
> mprotect(0xffff9ee93000, 65536, PROT_NONE) = 0
> mmap(0xffff9eea3000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x15000) = 0xffff9eea3000
> close(3)                                = 0
> mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xffff9ee7c000
> mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xffff9ee7a000
> mprotect(0xffff9f2c7000, 12288, PROT_READ) = 0
> mprotect(0xffff9eea3000, 4096, PROT_READ) = 0
> mprotect(0xffff9eed1000, 4096, PROT_READ) = 0
> mprotect(0xffff9f2fa000, 4096, PROT_READ) = 0
> mprotect(0xffff9ef07000, 4096, PROT_READ) = 0
> mprotect(0xffff9ef28000, 4096, PROT_READ) = 0
> mprotect(0xffff9f32b000, 4096, PROT_READ) = 0
> mprotect(0xffff9f0b0000, 4096, PROT_READ) = 0
> mprotect(0xffff9ef64000, 4096, PROT_READ) = 0
> mprotect(0xffff9ef3c000, 4096, PROT_READ) = 0
> mprotect(0xffff9ef50000, 4096, PROT_READ) = 0
> mprotect(0xffff9ef78000, 4096, PROT_READ) = 0
> mprotect(0xffff9ef92000, 4096, PROT_READ) = 0
> mprotect(0xffff9efaa000, 4096, PROT_READ) = 0
> mprotect(0xffff9efdc000, 8192, PROT_READ) = 0
> mprotect(0xffff9f06a000, 16384, PROT_READ) = 0
> mprotect(0xffff9f08a000, 4096, PROT_READ) = 0
> mprotect(0xffff9f09e000, 4096, PROT_READ) = 0
> mprotect(0xffff9f0c4000, 4096, PROT_READ) = 0
> mprotect(0xffff9f0dc000, 4096, PROT_READ) = 0
> mprotect(0xffff9f0f3000, 4096, PROT_READ) = 0
> mprotect(0xffff9f15f000, 4096, PROT_READ) = 0
> mprotect(0xffff9f14c000, 4096, PROT_READ) = 0
> mprotect(0xffff9f116000, 4096, PROT_READ) = 0
> mprotect(0xffff9f318000, 4096, PROT_READ) = 0
> mprotect(0xffff9f409000, 8192, PROT_READ) = 0
> mprotect(0xffff9f42f000, 4096, PROT_READ) = 0
> mprotect(0xaaaabaa10000, 4096, PROT_READ) = 0
> mprotect(0xffff9f463000, 4096, PROT_READ) = 0
> munmap(0xffff9f45e000, 7840)            = 0
> set_tid_address(0xffff9ee7a0e0)         = 813
> set_robust_list(0xffff9ee7a0f0, 24)     = 0
> rt_sigaction(SIGRTMIN, {sa_handler=0xffff9f2d6570, sa_mask=[], sa_flags=SA_SIGINFO}, NULL, 8) = 0
> rt_sigaction(SIGRT_1, {sa_handler=0xffff9f2d6630, sa_mask=[], sa_flags=SA_RESTART|SA_SIGINFO}, NULL, 8) = 0
> rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
> prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0
> brk(NULL)                               = 0xaaaaeaf3b000
> brk(0xaaaaeaf5c000)                     = 0xaaaaeaf5c000
> newfstatat(AT_FDCWD, "/etc/libnl/classid", {st_mode=S_IFREG|0644, st_size=1130, ...}, 0) = 0
> openat(AT_FDCWD, "/etc/libnl/classid", O_RDONLY|O_CLOEXEC) = 3
> fstat(3, {st_mode=S_IFREG|0644, st_size=1130, ...}) = 0
> read(3, "################################"..., 4096) = 1130
> read(3, "", 4096)                       = 0
> close(3)                                = 0
> ioctl(2, TCGETS, {B38400 opost isig icanon echo ...}) = 0
> pipe2([3, 4], 0)                        = 0
> fcntl(3, F_GETFL)                       = 0 (flags O_RDONLY)
> fcntl(3, F_SETFL, O_RDONLY|O_NONBLOCK)  = 0
> fcntl(4, F_GETFL)                       = 0x1 (flags O_WRONLY)
> fcntl(4, F_SETFL, O_WRONLY|O_NONBLOCK)  = 0
> openat(AT_FDCWD, "/dev/xen/privcmd", O_RDWR|O_CLOEXEC) = 5
> openat(AT_FDCWD, "/dev/xen/hypercall", O_RDWR|O_CLOEXEC) = 6
> openat(AT_FDCWD, "/dev/xen/privcmd", O_RDWR|O_CLOEXEC) = 7
> ioctl(7, _IOC(_IOC_NONE, 0x50, 0xff, 0), 0) = -1 ENOTTY (Inappropriate ioctl for device)
> openat(AT_FDCWD, "/dev/xen/privcmd", O_RDWR|O_CLOEXEC) = 8
> openat(AT_FDCWD, "/dev/xen/hypercall", O_RDWR|O_CLOEXEC) = 9
> openat(AT_FDCWD, "/dev/xen/privcmd", O_RDWR|O_CLOEXEC) = 10
> ioctl(10, _IOC(_IOC_NONE, 0x50, 0x5, 0x10), 0xffffe6e417f0) = 0
> newfstatat(AT_FDCWD, "/var/run/xenstored/socket", {st_mode=S_IFSOCK|0600, st_size=0, ...}, 0) = 0
> socket(AF_UNIX, SOCK_STREAM, 0)         = 11
> fcntl(11, F_GETFD)                      = 0
> fcntl(11, F_SETFD, FD_CLOEXEC)          = 0
> connect(11, {sa_family=AF_UNIX, sun_path="/var/run/xenstored/socket"}, 110) = -1 ECONNREFUSED (Connection refused)
> close(11)                               = 0
> faccessat(AT_FDCWD, "/dev/xen/xenbus", F_OK) = 0
> newfstatat(AT_FDCWD, "/dev/xen/xenbus", {st_mode=S_IFCHR|0600, st_rdev=makedev(0xa, 0x3e), ...}, 0) = 0
> openat(AT_FDCWD, "/dev/xen/xenbus", O_RDWR) = 11
> openat(AT_FDCWD, "/etc/xen/xl.conf", O_RDONLY) = 12
> fstat(12, {st_mode=S_IFREG|0644, st_size=1602, ...}) = 0
> fstat(12, {st_mode=S_IFREG|0644, st_size=1602, ...}) = 0
> read(12, "## Global XL config file ##\n\n# S"..., 4096) = 1602
> close(12)                               = 0
> ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41850) = 262158
> mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_SHARED, 6, 0) = 0xffff9f45f000
> ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41850) = 0
> ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41850) = 0
> ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41850) = 0
> ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41850) = 0
> ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41850) = 0
> ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41850) = 4096
> ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41850) = 0
> ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41820) = -1 EPERM (Operation not permitted)
> ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41b40) = -1 EPERM (Operation not permitted)
> write(2, "libxl: ", 7libxl: )                  = 7
> write(2, "error: ", 7error: )                  = 7
> write(2, "libxl_utils.c:820:libxl_cpu_bitm"..., 87libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve the maximum number of cpus) = 87
> write(2, "\n", 1
> )                       = 1
> ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41b40) = -1 EPERM (Operation not permitted)
> write(2, "libxl: ", 7libxl: )                  = 7
> write(2, "error: ", 7error: )                  = 7
> write(2, "libxl_utils.c:820:libxl_cpu_bitm"..., 87libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve the maximum number of cpus) = 87
> write(2, "\n", 1
> )                       = 1
> ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41b40) = -1 EPERM (Operation not permitted)
> write(2, "libxl: ", 7libxl: )                  = 7
> write(2, "error: ", 7error: )                  = 7
> write(2, "libxl_utils.c:820:libxl_cpu_bitm"..., 87libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve the maximum number of cpus) = 87
> write(2, "\n", 1
> )                       = 1
> clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0xffff9ee7a0e0) = 814
> wait4(814, [{WIFEXITED(s) && WEXITSTATUS(s) == 0}], 0, NULL) = 814
> --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=814, si_uid=0, si_status=0, si_utime=2, si_stime=2} ---
> close(6)                                = 0
> close(5)                                = 0
> munmap(0xffff9f45f000, 4096)            = 0
> close(7)                                = 0
> close(10)                               = 0
> close(9)                                = 0
> close(8)                                = 0
> close(11)                               = 0
> close(3)                                = 0
> close(4)                                = 0
> exit_group(0)                           = ?
> +++ exited with 0 +++
> 
> royger told me that it is a BUG and not an issue with my setup. Therefore here I am.
> 
> Cheers,
> Andrea


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 16:05:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 16:05:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283512.482547 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPnws-0003pH-7g; Thu, 03 Mar 2022 16:05:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283512.482547; Thu, 03 Mar 2022 16:05:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPnws-0003pA-4L; Thu, 03 Mar 2022 16:05:02 +0000
Received: by outflank-mailman (input) for mailman id 283512;
 Thu, 03 Mar 2022 16:05:01 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Uwof=TO=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nPnwr-0003oJ-3B
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 16:05:01 +0000
Received: from EUR01-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur01on0615.outbound.protection.outlook.com
 [2a01:111:f400:fe1e::615])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ad0213ae-9b0b-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 17:04:59 +0100 (CET)
Received: from DU2PR04CA0154.eurprd04.prod.outlook.com (2603:10a6:10:2b0::9)
 by VE1PR08MB5055.eurprd08.prod.outlook.com (2603:10a6:803:115::24) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 16:04:55 +0000
Received: from DB5EUR03FT031.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:2b0:cafe::e2) by DU2PR04CA0154.outlook.office365.com
 (2603:10a6:10:2b0::9) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.13 via Frontend
 Transport; Thu, 3 Mar 2022 16:04:55 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT031.mail.protection.outlook.com (10.152.20.142) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Thu, 3 Mar 2022 16:04:55 +0000
Received: ("Tessian outbound 826a6d8e58c3:v113");
 Thu, 03 Mar 2022 16:04:55 +0000
Received: from 499c46db6197.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 4D4F0479-7FEE-49D3-9605-D9CB4841E83D.1; 
 Thu, 03 Mar 2022 16:04:48 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 499c46db6197.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 03 Mar 2022 16:04:48 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com (2603:10a6:20b:85::25)
 by AM8PR08MB6417.eurprd08.prod.outlook.com (2603:10a6:20b:362::20)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Thu, 3 Mar
 2022 16:04:47 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c84a:82d0:c7fd:fc7c]) by AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c84a:82d0:c7fd:fc7c%7]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 16:04:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ad0213ae-9b0b-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=SlRr7aCU51z2Riu3PuDAKxN3VyMlDlI98DwNYn1Hphg=;
 b=KHVRxJNnFF0boFLYHtCPgTVZTC+NBqYRi5pe9IeMNoxF9S0t9KID0LyC+3s+8i3KrU6HQbqSRxeH8xEQGy5GR9PJuTcoGTPUAeRqBNQG/XTKSjH5QUWjmBpNeQsc4xm4aNCr4/YyCb6dQ+47sjYuhzCbNoH565qOsMVkm8S6Xtc=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 66d8bf977dbf74e7
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=OG9CHqGieim8v0Rbjd2niR55F5iUBZsQg6Ie+Wj7pjjRSE62Jm/PX/0j7ctRyxR9TgDtZJr51YhyW6bWflMSMgG5DUa0HQWvegPk3GVB2ZgKmo6kWs7w92Iy7o+k/YhhWnHByxfx9XHYU4Fxmyw7mbbEHuBfc8Jx6ttjIo2/bKoeg5TmODFcLKxYRAtSkI2LLGxmG1ro3kyCu6r21w3M649qLU76vG9l2eLZ38AMdQFes2WWyaNp0QHY4F5Qi4yJ71ny69mQTBBMxBlJ+jAAsFuCWO+G5aziUKTj9b/8fdH1vKBueZ4uGz6mSgd/p32xcbUk4ivbYvEfkjBaxWeEzA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=SlRr7aCU51z2Riu3PuDAKxN3VyMlDlI98DwNYn1Hphg=;
 b=l+D3k94QwEFpoAvXmytHlpzbYG/LrPOI3UDacogMR4JYFxkAHat4xWONsfk73qyVxlmCHvPXIGpfW8Va/ruLNFKEDUZOg9mjjPXLub4nS6NriQlEV2gUVRD1gnvoEdfYEgOOSeHgaWQPV78jt8vzOlECrt6jRE9x7v+FA4xaSA7fo6FKtEHTPzDPWDMQXGXVvDNc3LpG4suEpTd3nwFl3ZKh3dfY8ISvNscJs0PkL5pBhVrd50zjcmFGnVriXlHHMlqpjQz6T536kHOxDU7nnmX9MwviIcyBFf4/e2860pcHPE2QAJf8Wa5Ctx0v1y0QGKuLmrOzs3Aw5VFFMXvKrA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=SlRr7aCU51z2Riu3PuDAKxN3VyMlDlI98DwNYn1Hphg=;
 b=KHVRxJNnFF0boFLYHtCPgTVZTC+NBqYRi5pe9IeMNoxF9S0t9KID0LyC+3s+8i3KrU6HQbqSRxeH8xEQGy5GR9PJuTcoGTPUAeRqBNQG/XTKSjH5QUWjmBpNeQsc4xm4aNCr4/YyCb6dQ+47sjYuhzCbNoH565qOsMVkm8S6Xtc=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Julien Grall <julien@xen.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Julien
 Grall <jgrall@amazon.com>, Stefano Stabellini <sstabellini@kernel.org>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH] xen/arm: mm: Encode existing constraints of the memory
 layout
Thread-Topic: [PATCH] xen/arm: mm: Encode existing constraints of the memory
 layout
Thread-Index: AQHYLIr12CXCtSE8aUS3fUoiw1XVAayt17mA
Date: Thu, 3 Mar 2022 16:04:47 +0000
Message-ID: <B4CC57B1-4443-49A4-92FC-25165BEA14CB@arm.com>
References: <20220228100659.58089-1-julien@xen.org>
In-Reply-To: <20220228100659.58089-1-julien@xen.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: cf311fec-cbe0-4752-2ae6-08d9fd2f8ed1
x-ms-traffictypediagnostic:
	AM8PR08MB6417:EE_|DB5EUR03FT031:EE_|VE1PR08MB5055:EE_
X-Microsoft-Antispam-PRVS:
	<VE1PR08MB50559830ABF0E2E30EC998659D049@VE1PR08MB5055.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR08MB3784.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(186003)(122000001)(8936002)(38070700005)(2616005)(83380400001)(71200400001)(2906002)(36756003)(508600001)(26005)(33656002)(54906003)(91956017)(86362001)(6916009)(53546011)(6512007)(316002)(6506007)(64756008)(66476007)(76116006)(38100700002)(66446008)(5660300002)(66946007)(66556008)(6486002)(4326008)(8676002)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <4B8E64D723202543BA0A578D2D86E534@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM8PR08MB6417
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT031.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	f57906f7-cf32-40a3-ad0a-08d9fd2f8a88
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(316002)(107886003)(26005)(2616005)(36756003)(6512007)(186003)(40460700003)(8676002)(6506007)(2906002)(70206006)(5660300002)(70586007)(53546011)(47076005)(6862004)(336012)(4326008)(81166007)(356005)(36860700001)(8936002)(86362001)(508600001)(33656002)(6486002)(54906003)(83380400001)(82310400004);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 16:04:55.0842
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: cf311fec-cbe0-4752-2ae6-08d9fd2f8ed1
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT031.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR08MB5055
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From xen-devel-bounces@lists.xenproject.org Thu Mar 03 16:31:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 16:31:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283519.482557 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPoMX-0007VL-F2; Thu, 03 Mar 2022 16:31:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283519.482557; Thu, 03 Mar 2022 16:31:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPoMX-0007VE-Bb; Thu, 03 Mar 2022 16:31:33 +0000
Received: by outflank-mailman (input) for mailman id 283519;
 Thu, 03 Mar 2022 16:31:32 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=oyJZ=TO=arm.com=Rahul.Singh@srs-se1.protection.inumbo.net>)
 id 1nPoMW-0007V8-CC
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 16:31:32 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on2062d.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::62d])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6135716b-9b0f-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 17:31:30 +0100 (CET)
Received: from DB6PR0402CA0010.eurprd04.prod.outlook.com (2603:10a6:4:91::20)
 by AM8PR08MB5683.eurprd08.prod.outlook.com (2603:10a6:20b:1d1::19)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.13; Thu, 3 Mar
 2022 16:31:28 +0000
Received: from DB5EUR03FT060.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:4:91:cafe::50) by DB6PR0402CA0010.outlook.office365.com
 (2603:10a6:4:91::20) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Thu, 3 Mar 2022 16:31:28 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT060.mail.protection.outlook.com (10.152.21.231) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Thu, 3 Mar 2022 16:31:27 +0000
Received: ("Tessian outbound 741ca6c82739:v113");
 Thu, 03 Mar 2022 16:31:27 +0000
Received: from cdb49baf4c5b.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 13B39DBB-E3C0-4FB3-9F54-9EE7308CB405.1; 
 Thu, 03 Mar 2022 16:31:16 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id cdb49baf4c5b.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 03 Mar 2022 16:31:16 +0000
Received: from AM5PR0801MB2020.eurprd08.prod.outlook.com
 (2603:10a6:203:4c::14) by DB7PR08MB3465.eurprd08.prod.outlook.com
 (2603:10a6:10:50::13) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 16:31:13 +0000
Received: from AM5PR0801MB2020.eurprd08.prod.outlook.com
 ([fe80::253a:4d6c:61c9:af60]) by AM5PR0801MB2020.eurprd08.prod.outlook.com
 ([fe80::253a:4d6c:61c9:af60%10]) with mapi id 15.20.5017.027; Thu, 3 Mar 2022
 16:31:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6135716b-9b0f-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=9LirzQcj1S4dFkFOBZknkPK/63vMz0xS9z9/CFCWEnc=;
 b=mOXjH7dpkXPp1eRvmkgUMoHFs+bG0dEGvWzfIJx2/gwDuIAX7ZZ1I80LUK1cH8GGVyKHqylw5c7yTg/bPk2FE5a+lRKHEUZgSM7fOEIMR6+1TAlLvQ3qsTlg7fJkIqAcdJcNp6stOb5ZFY0ZDuWKzJAuy7KYKubLgJuOTbDioPI=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 76cda304d584db10
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=DTNYAJ0pdUlalX+fgh/cwdJRFy6F2wJEuXNhxp6fu4UZjne85EvPFCs3Hoznua1hT2yv3NkKahxFlbBPAbPYKA0vZ6IDjZy0ITeGa/ImlxFkSIF+oSBPAnmOOyJrwl0uPjTjzKUpXVC1CF6spZzNb+YzT4fF/0e3Sg35Bi0K5crkqYhqHxXoHFEL5RsPNsdpUqAKdkAw6OH5ssRNPs413iWQFMvBfmBD/pcEPQGBwnFJSlU8PmFVwmYuZaRLfSDDmaZn+vbQW+vdMajROFDHWwr1wwWQg0IvYrSjT0990g4CEUxP80Zu9ja3nrin6S19IhYcl7pBc046ZVlrkUO4hg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=9LirzQcj1S4dFkFOBZknkPK/63vMz0xS9z9/CFCWEnc=;
 b=Y8Z28a/cOj/jreBGK1JucvHF9sLQ8i489x1lkbvAQIwUtlCC4DTsXHhXlwofjwaRU7gynEKG6jBvNgRKUlzConXw9f97C7YR+f+oIEiTfsNSo0rbjw0xGSyNY8lIdgI+5qDRzN93oHi+nsh0z1OP3zUXgyt8ze4UOK3ErIMrKCGmL1wH+rcRl2XWHRxL5LykDvbxOAXubQ8P2DclZrw6B9SP+oOBnt6IesM0x7+HPS/D1y11AAeoqLgtu+n4uIWUD7yXKtNXEqJUlvgOFRr6oUHPatm7Kd189Yjom7bddW72GTc1j/p214cfGg5WKFe/w3Qrc/iU30jyoYUE1QrW6g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=9LirzQcj1S4dFkFOBZknkPK/63vMz0xS9z9/CFCWEnc=;
 b=mOXjH7dpkXPp1eRvmkgUMoHFs+bG0dEGvWzfIJx2/gwDuIAX7ZZ1I80LUK1cH8GGVyKHqylw5c7yTg/bPk2FE5a+lRKHEUZgSM7fOEIMR6+1TAlLvQ3qsTlg7fJkIqAcdJcNp6stOb5ZFY0ZDuWKzJAuy7KYKubLgJuOTbDioPI=
From: Rahul Singh <Rahul.Singh@arm.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Bertrand Marquis <Bertrand.Marquis@arm.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, =?utf-8?B?Um9nZXIgUGF1IE1vbm7DqQ==?=
	<roger.pau@citrix.com>, Wei Liu <wl@xen.org>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v2 1/3] xen/vpci: msix: move x86 specific code to x86 file
Thread-Topic: [PATCH v2 1/3] xen/vpci: msix: move x86 specific code to x86
 file
Thread-Index: AQHYIoBoEZVl6/zkE0mK7dGMpvA2Zqyi2K6AgAfEbQCAAAXLAIADUEkA
Date: Thu, 3 Mar 2022 16:31:12 +0000
Message-ID: <41F03A07-F8D6-423D-9E40-F4B89C611C87@arm.com>
References: <cover.1644937405.git.rahul.singh@arm.com>
 <4d2a727ba218468e4f347dc12ca051a0534fe205.1644937405.git.rahul.singh@arm.com>
 <6e188f87-7e4c-00ee-dd0c-373d42acec34@suse.com>
 <6BFB9B87-D8A1-442D-B4DC-18760C59D7BF@arm.com>
 <c11278f4-c902-0eb9-ac59-e27c0f2ba912@suse.com>
In-Reply-To: <c11278f4-c902-0eb9-ac59-e27c0f2ba912@suse.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 7aa6313d-4a3b-45ce-69d1-08d9fd33443f
x-ms-traffictypediagnostic:
	DB7PR08MB3465:EE_|DB5EUR03FT060:EE_|AM8PR08MB5683:EE_
X-Microsoft-Antispam-PRVS:
	<AM8PR08MB56838FB19391429866BBA257FC049@AM8PR08MB5683.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM5PR0801MB2020.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(71200400001)(38070700005)(508600001)(86362001)(8676002)(64756008)(66946007)(66446008)(76116006)(38100700002)(66556008)(66476007)(91956017)(2616005)(122000001)(316002)(6916009)(6486002)(54906003)(36756003)(6512007)(186003)(26005)(6506007)(53546011)(2906002)(33656002)(5660300002)(8936002)(83380400001)(4326008)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <746168A206CB7B4DB622FB58D7D3833B@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR08MB3465
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT060.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	25c816dd-4c8e-4125-c4fe-08d9fd333b64
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(5660300002)(316002)(8936002)(6486002)(4326008)(6862004)(8676002)(2906002)(26005)(54906003)(40460700003)(86362001)(186003)(36756003)(508600001)(70206006)(70586007)(6512007)(53546011)(6506007)(36860700001)(81166007)(356005)(2616005)(33656002)(82310400004)(336012)(47076005)(83380400001);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 16:31:27.9801
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 7aa6313d-4a3b-45ce-69d1-08d9fd33443f
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT060.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM8PR08MB5683
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From xen-devel-bounces@lists.xenproject.org Thu Mar 03 16:34:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 16:34:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283530.482574 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPoP4-0008Bl-37; Thu, 03 Mar 2022 16:34:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283530.482574; Thu, 03 Mar 2022 16:34:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPoP3-0008Be-W8; Thu, 03 Mar 2022 16:34:09 +0000
Received: by outflank-mailman (input) for mailman id 283530;
 Thu, 03 Mar 2022 16:34:08 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=PW1S=TO=citrix.com=prvs=05474af58=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nPoP1-0008BU-Su
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 16:34:08 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id bc557a27-9b0f-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 17:34:05 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: bc557a27-9b0f-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646325245;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=QnvtV8DRubUOa7NcXPut8nVMyW9NedWPW08QGkjX1X0=;
  b=cq6LdN47GdDPcsOxlRbM3gYh+4zLgO1yAVbzKMxRgZcw5a9RDlHZZmXK
   N8E2C5lIUza4UuAKwdcWKLl/9Fh6JmQ7JjvS3M2QOmPRhv+1HadKb3T+y
   x7S/XYNI9duF6XdUo9PSmmp+QbJZYA05ffVIpcbJt0CGcUW8muOUBZOrF
   M=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65811776
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:yxcIramzb/ERk6RvwixFp3Xo5gyjJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xJNXz3UPvaCZGDwLd4iO4vj9B4A6pPRzIdmT1A6qyk8HyMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiW1jV4
 7senuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYFFcXYPLvpMEkDhwECANQO5F2p6aEPi3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3oHZvwCufFf87aZvCX7/L9ZlT2zJYasVmQ6uOP
 pNGNmQHgBLoPFoQC3wyGZcCk6S1jGPxLBR5klmfnP9ii4TU5FMoi+W8WDbPQfSVQe1Fk0Deo
 XjJl0zpDxdfONGBxD6t9nO3mvSJjS79QJgVFrCz6rhtmlL77mUVBAcbXB2gvfSng0i3R9V3M
 EUS5iMoq6Eq9VeiCNjhNyBUu1bd4ERaAYAJVbRntkfdkcI4/jp1GEBZHgAfN/8akfZrQGAx9
 HGPo+O2HH9w5ej9pW2myp+Yqja7OC4wJGAEZDMZQQZt3+QPsL3fnTqUEI89TffdYsndXGipn
 mvU9HRWa6A70JZTv5hX62wrlN5FSnLhagcurjvaUWu+hu+STN70Ptf4gbQ3ABspEWp4crVjl
 CVc8yR9xLpXZX1oqMBraL9XdF1Oz6zYWAAweXY1Q/EcG82FohZPh7x47jBkP1tOOc0ZYzLva
 0K7kVoPuMEJYCX2PPQoPtvZ5yEWIU7IT46Nuhf8NIcmX3SMXFXfoHEGibC4hQgBb3TAYYlgY
 MzGIK5A/F4RCLh9zSreegvu+eRD+8zK/kuKHcqT503+idK2PSfJIZ9caQvmRr1pvcus/VSOm
 /4CZpTi9vmqeLCnCsUh2dVIdg5iwLlSLc2elvG7gcbYels2QDx6UqSJqV7jEqQ895loei7z1
 ijVcmdTyUblhG2BLgOPa3t5b6joU4o5pnU+VRHA937ys5T/Se5DNJsiSqY=
IronPort-HdrOrdr: A9a23:vBLZz6nq0Pw9MmcS3qD5z2Zn8N7pDfPOimdD5ihNYBxZY6Wkfp
 +V88jzhCWZtN9OYhwdcLC7WZVpQRvnhPlICK0qTM2ftW7dyRaVxeBZnPDfKljbdREWmdQtt5
 uIH5IObeEYSGIK8foSgzPIYurIouP3iZxA7N22pxwGLXAIV0gj1XYANu/yKDwJeOAsP+teKH
 Pz3Lsim9L2Ek5nEfhTS0N1F9TrlpnurtbLcBQGDxko5E2nii6p0qfzF1y90g0FWz1C7L8++S
 yd+jaJrJmLgrWe8FvxxmXT55NZlJ/IzcZCPtWFjowwJi/3ggilSYx9U/mpvSwzosuo9FE2+e
 O86CsIDoBW0Tf8b2u1qRzi103J1ysv0WbrzRuijX7qsaXCNUUHIvsEobgcXgrS6kImst05+r
 lMxXilu51eCg6FtDjh5vDTPisa2XackD4Hq6o+nnZfWYwRZPt6tooE5n5YF58GAWbT9J0nKu
 9zF8vRjcwmPW9yV0qp/1WH/ebcHkjaRny9Mws/U42uonVrdUlCvgUlLJd1pAZDyHo/I6M0k9
 gsfJ4Y0Y2mdfVmHp6VNN1xMfdfNVa9My4kEFjiV2gPR5t3ck4klfbMkcAIDaeRCdg18Kc=
X-IronPort-AV: E=Sophos;i="5.90,151,1643691600"; 
   d="scan'208";a="65811776"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=eOdrZ9w97y0PHLArlWmB+UGyFPFabfHKid6MwIkWkswJVcHCC5TDw0IGJnHVV/sjmC8VUlfE+XtGeIqWcuLozicgMZ4GZPoxpJ/iDLNZAKeNbqz/tSZO4/9uDXAVsGV9GLm6MrkF4KR6hFjRcO6/HsS0xFjqQ0xgWKfgCkLZLWyDk2RfCCOaxLQEmCqF9/THwJQsqs4GRzZCHpHuAllx23pOsdqxaYg9rpXBd/kZXaOA/RN1N1LQxiJCTpVNt+Q3nlE0OccoT0d60sTe0GN8EeQnZHCLiwV5/zviWZiTlJY8P20YesO6DSgbDUNtodJwk3RS4SoE4JudpJ/h8NuvHQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=qC0x8L4q/jiNyzHcXMYbkYQ7mVQLfACA/fbs40kDYY0=;
 b=Sh6eV21qoWFOsml+ewTpelzWd4B18tE0zjwmAM2XKVSNYE1kMZbL8yb6w4ZtDNfCh3/TQGigDc6tcldkTI4nmY4lwiLvrQV1FxS/j9m7C6rv73eLTGUTJKv+lW7UR6TSsuxdKorCmOzaAmavh2nrciEgzwsMWNOrw0QxhMABKjePrJJvMkRZjighko6c4BCBe+kKXNjanMQtWdaqrUJ6+cCwRulVmkaiAKrFH1wIiulgIjEmqAtJPBmLUGDxvYVrZOZwW/07iC1a4ecrxju8uzhDBBFF8RNFOfYgMXcDSqX+3P/YdZKew5w0nixP7xMZXoLo76dMHEjOVcEsSyWeqQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=qC0x8L4q/jiNyzHcXMYbkYQ7mVQLfACA/fbs40kDYY0=;
 b=Bqic8QmOmdpbyTpETsWJSBdMfdVPyPZdDNkdSYS9kGj9kPWZkIIRhnuSwkkfqJLSPwTTUdIuwfvJT0LqIext4ySR0U+KuQL+uADgAg03W5tDSM48LppARFp71hgcTARFX8PuG76heQlBpN8j05AZAA0Yq5LYJWruluv74bHx+EI=
Date: Thu, 3 Mar 2022 17:33:49 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Andrea Stevanato <andrea.stevanato@santannapisa.it>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	"wl@xen.org" <wl@xen.org>, <anthony.perard@citrix.com>
Subject: Re: Network driver domain broken
Message-ID: <YiDt7fX92n6Luc2l@Air-de-Roger>
References: <DB7PR03MB50027EE92E11BFFF71AADC4598049@DB7PR03MB5002.eurprd03.prod.outlook.com>
 <92827eec-b6e9-9c95-8f9e-fcf063d45090@santannapisa.it>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <92827eec-b6e9-9c95-8f9e-fcf063d45090@santannapisa.it>
X-ClientProxiedBy: LO4P123CA0300.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:196::17) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 8f733b72-03b1-4893-a177-08d9fd339ba7
X-MS-TrafficTypeDiagnostic: BYAPR03MB4037:EE_
X-Microsoft-Antispam-PRVS: <BYAPR03MB4037BF9815BD31F780358AD78F049@BYAPR03MB4037.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(6512007)(316002)(8936002)(30864003)(86362001)(54906003)(3480700007)(508600001)(33716001)(9686003)(6916009)(6506007)(85182001)(4326008)(38100700002)(5660300002)(6666004)(26005)(186003)(66946007)(66556008)(8676002)(82960400001)(66476007)(107886003)(83380400001)(53546011)(6486002)(2906002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?UWlBVmxOT2VsTk9BdXliQmlLMmFkeUlSdnZuN0V6SGtpdVpyZlJFYTgvYnk0?=
 =?utf-8?B?cFpRVUVER0N1TGp0Q0d3RVozc1Jya0dJMmlUY0VrbE1HM2hmWTUxRjYrS2ho?=
 =?utf-8?B?SU5Qd3lqZEVsUC9sbzFxWWZOeG9lSWNyZ21HT0xhdEpGOTl0eEhTS2thaTlZ?=
 =?utf-8?B?T3FXUkJVYitHMnZNOW5YQWwrQ0lWL25tVVBkdzhudTVBYWVVYktaTmhBb0RU?=
 =?utf-8?B?TW1lY0J6NmNpUEFiTWlzdzRiZFF2OFk3ZWp3SVhlNzBoNWdHeFBERlVFZ0ln?=
 =?utf-8?B?L2VqcDBKN0g0VWt5RWIraTB2VEZhSkE5L1FUNFBRRW9HeGkyRVlLaERCQ01T?=
 =?utf-8?B?Z0x6RHF4ZWJmbVBmSlZHSVo3dTlBSHZoMWRrKzBhU3VvVGpFcjhqd3hlUWJu?=
 =?utf-8?B?SnZFMy8wU2dzOGttUmFVYU4raEt1YkRCeU9pdEdZci9RSDJRcGNMQUxMT1ln?=
 =?utf-8?B?WU05SklodkpXUG5PUDdCTkYwYThtYmZVbXU0WjdwaEJkK0x2dURlQ0xtVTUy?=
 =?utf-8?B?ZWkvTU9wUjE2QVlnVmY5Rjh0TXRTSE5YNGwyWHhjUVdRWGZRMzBNbiswTWxn?=
 =?utf-8?B?QURCVnpOd3dndXg4bVJ4d00xUFNkaldmSTd4Y0pPNHJ6NkNXWkxBUnA1eDBS?=
 =?utf-8?B?NGdRZGJybXNISU1oWXVkT1JUcWk5OXlGNExqZitXZGo3aHQzaFFGSkNUNWxJ?=
 =?utf-8?B?NERZS1hoQXlrSExkRDVtV3FRUDhvVFo0Vmtrdmo2NFdNNDZ0TTl3Tktwb1NG?=
 =?utf-8?B?R0Z5YngwY2dHQjBJMVhLTU1iRFR1UkNiT3hpNFRJYTNCdk1TcFdtOGtvcFJZ?=
 =?utf-8?B?MFNrT0d6WHVyR3R1UGxRcnU2V0paWGtmZFFlZFA4UjlBNjNtbGJqTyt4Y2Ev?=
 =?utf-8?B?dDNHb1BuR1pKc2hnQUJBeWtLcytLWGswd2ljcjltU205MnFvZDloTXVOL2VU?=
 =?utf-8?B?Yk4rTHNudWVxTUhNL3VRWGk1K3NQUUp2M0x6WEFDaVBvaUZLTUlaZ2pKUlhV?=
 =?utf-8?B?Wm1weG13b2U4bjBFRTRmYy9oVFEyQVZHMk5kOG5LZXdwVWFCVFl3MFJPTzly?=
 =?utf-8?B?VWhnZFd5bmUzaklReHFZSENxdTh5ZjRPQkdJZzIvTnpUTWR1eldCb0pQaUtY?=
 =?utf-8?B?NjQ1L1o0NUFQWExTRU83TktwNWNIb083RitZcG5nTmVKTWg0R29mSkl6bFFm?=
 =?utf-8?B?ZUxpTEtZd25ESFJ1Z29YUTduMDE5YlR6NG9obDBFeUtJREpMZ0FRSTZvLy8w?=
 =?utf-8?B?bExSTGtMSnZkSzQ2Ni9RVkdhdzg3VFdUZ0dWWFVuN2ZlaU9meVJoZURtMk1N?=
 =?utf-8?B?MnJOZ0F0eTI5WS9ncHpDM0VrR3F6OVQ4c0ZVSmsvSHFCM01YejJLL0RZd1A5?=
 =?utf-8?B?WVJiUlI5TU8xalorYk5nS3gySHlZSUxuRGcyY0hCV21OQU5ZNFF1VzZ0WHE2?=
 =?utf-8?B?blBWUXRNQ0xwKzhjM3ZzY2JzdHZ5Sy9yNVNIdFlNcnVHYTR2NjJsc0RHbFNa?=
 =?utf-8?B?NFpYTkdtQ1VQMXZIUElOTEFKeHUrWnNFT0tUM2VkODk1amxCbStTSnBoMDhz?=
 =?utf-8?B?clpyOHN3QXYxc1gwaHI3NXhRMTQxUmtLVHBFUTZTeUpzQ3ViOEVqSjNadzFp?=
 =?utf-8?B?bzAzYlVCTHhNTnNSSmdmSmVVRXNSTGRFY3VHUnNTNmxyKzhrK2d3TGJyNXlI?=
 =?utf-8?B?aHF2angvY1VrRTdjbXJmdU5YTjJ3SUk3MWlBUUQvQ0svcmJRSGdjRUpKWjJH?=
 =?utf-8?B?NzdVckwzTVF3NTZCVE1xTENXLytITzRmUVJNbllHUXVpUEtKUThKYzBoUnhL?=
 =?utf-8?B?WEZzVDVQQzZsQmNobDVLMmtIVU93bVg4WGloNjVvZ1dKSkdGVkxJREJKQW4v?=
 =?utf-8?B?c3RMaEJxWlV2MHYzMVFodTRKSHgrYm84elZ6ZERaeDhrVi84NWt5dzNtdXRU?=
 =?utf-8?B?dnM1Q2hMZnVxUTUzWmtUSHVzbmFKcmdiY0wxZ0hPVGhHak9JTk12cmVqWXc0?=
 =?utf-8?B?YlBqNGpXS0J3T1lvdGNIbjk1WnBrMVdBYnlSdXhWWkN1WDJXSDBrLzVVT3Y4?=
 =?utf-8?B?bGNPSU9WQ01EYVBnWDVRa0EvdS95SHpEQVpULytNV2xiZkJCRmRUcHRlN2VM?=
 =?utf-8?B?TWhwbWNUb051dktxYmdtcE9kT0Z1V2NLckhxMVBRYkt6aEc5b0pvcFBram9y?=
 =?utf-8?Q?qlfle8YKA0MwYqTXUpuHvik=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 8f733b72-03b1-4893-a177-08d9fd339ba7
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 16:33:55.0012
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: i5RKwa7NJcsgq6RHOb2Yqp6pVNqxBBYA+/Fyult9ka6VwWNnApjNAfS2XTuCbeTcnWAVzN1Bn2ErCFGol52ZlA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB4037
X-OriginatorOrg: citrix.com

On Thu, Mar 03, 2022 at 05:01:23PM +0100, Andrea Stevanato wrote:
> On 03/03/2022 15:54, Andrea Stevanato wrote:
> > Hi all,
> > 
> > according to the conversation that I had with royger, aa67b97ed34  broke the driver domain support.
> > 
> > What I'm trying to do is to setup networking between guests using driver domain. Therefore, the guest (driver) has been started with the following cfg.
> > 
> > name    = "guest0"
> > kernel  = "/media/sd-mmcblk0p1/Image"
> > ramdisk = "/media/sd-mmcblk0p1/rootfs.cpio.gz"
> > extra   = "console=hvc0 rdinit=/sbin/init root=/dev/ram0"
> > memory  = 1024 vcpus   = 2
> > driver_domain = 1
> > 
> > On guest0 I created the bridge, assigned a static IP and started the udhcpd on xenbr0 interface.
> > While the second guest has been started with the following cfg:
> > 
> > name    = "guest1"
> > kernel  = "/media/sd-mmcblk0p1/Image"
> > ramdisk = "/media/sd-mmcblk0p1/rootfs.cpio.gz"
> > extra   = "console=hvc0 rdinit=/sbin/init root=/dev/ram0"
> > memory  = 1024 vcpus   = 2
> > vcpus   = 2
> > vif = [ 'bridge=xenbr0, backend=guest0' ]
> > 
> > Follows the result of strace xl devd:
> > 
> > # strace xl devd
> > execve("/usr/sbin/xl", ["xl", "devd"], 0xffffdf0420c8 /* 13 vars */) = 0
> > brk(NULL)                               = 0xaaaaeaf3b000
> > faccessat(AT_FDCWD, "/etc/ld.so.preload", R_OK) = -1 ENOENT (No such file or directory)
> > openat(AT_FDCWD, "/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3
> > fstat(3, {st_mode=S_IFREG|0644, st_size=7840, ...}) = 0
> > mmap(NULL, 7840, PROT_READ, MAP_PRIVATE, 3, 0) = 0xffff9f45e000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/usr/lib/libxlutil.so.4.14", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\0200\0\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=68168, ...}) = 0
> > mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xffff9f45c000
> > mmap(NULL, 131784, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f410000
> > mprotect(0xffff9f41f000, 65536, PROT_NONE) = 0
> > mmap(0xffff9f42f000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xf000) = 0xffff9f42f000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/usr/lib/libxenlight.so.4.14", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0`\16\2\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=861848, ...}) = 0
> > mmap(NULL, 925752, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f32d000
> > mprotect(0xffff9f3fa000, 61440, PROT_NONE) = 0
> > mmap(0xffff9f409000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xcc000) = 0xffff9f409000
> > mmap(0xffff9f40f000, 56, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffff9f40f000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/usr/lib/libxentoollog.so.1", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0P\r\0\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=10368, ...}) = 0
> > mmap(NULL, 73904, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f31a000
> > mprotect(0xffff9f31c000, 61440, PROT_NONE) = 0
> > mmap(0xffff9f32b000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1000) = 0xffff9f32b000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/usr/lib/libyajl.so.2", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\320\22\0\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=38728, ...}) = 0
> > mmap(NULL, 102416, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f300000
> > mprotect(0xffff9f309000, 61440, PROT_NONE) = 0
> > mmap(0xffff9f318000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x8000) = 0xffff9f318000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/lib/libpthread.so.0", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\300j\0\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=113184, ...}) = 0
> > mmap(NULL, 192872, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f2d0000
> > mprotect(0xffff9f2ea000, 65536, PROT_NONE) = 0
> > mmap(0xffff9f2fa000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1a000) = 0xffff9f2fa000
> > mmap(0xffff9f2fc000, 12648, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffff9f2fc000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\320I\2\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=1428872, ...}) = 0
> > mmap(NULL, 1502000, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f161000
> > mprotect(0xffff9f2b8000, 61440, PROT_NONE) = 0
> > mmap(0xffff9f2c7000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x156000) = 0xffff9f2c7000
> > mmap(0xffff9f2cd000, 11056, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffff9f2cd000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/usr/lib/libxenevtchn.so.1", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0@\f\0\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=10240, ...}) = 0
> > mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xffff9f45a000
> > mmap(NULL, 73856, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f14e000
> > mprotect(0xffff9f150000, 61440, PROT_NONE) = 0
> > mmap(0xffff9f15f000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1000) = 0xffff9f15f000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/usr/lib/libxenctrl.so.4.14", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0000\203\0\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=154752, ...}) = 0
> > mmap(NULL, 218504, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f118000
> > mprotect(0xffff9f13d000, 61440, PROT_NONE) = 0
> > mmap(0xffff9f14c000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x24000) = 0xffff9f14c000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/usr/lib/libxenguest.so.4.14", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0PB\0\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=77248, ...}) = 0
> > mmap(NULL, 140880, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f0f5000
> > mprotect(0xffff9f107000, 61440, PROT_NONE) = 0
> > mmap(0xffff9f116000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x11000) = 0xffff9f116000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/usr/lib/libxenhypfs.so.1", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\300\16\0\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=14432, ...}) = 0
> > mmap(NULL, 78048, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f0e1000
> > mprotect(0xffff9f0e3000, 65536, PROT_NONE) = 0
> > mmap(0xffff9f0f3000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff9f0f3000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/usr/lib/libxenstore.so.3.0", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0 $\0\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=31176, ...}) = 0
> > mmap(NULL, 107088, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f0c6000
> > mprotect(0xffff9f0cc000, 65536, PROT_NONE) = 0
> > mmap(0xffff9f0dc000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x6000) = 0xffff9f0dc000
> > mmap(0xffff9f0de000, 8784, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffff9f0de000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0@\20\0\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=14296, ...}) = 0
> > mmap(NULL, 77920, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f0b2000
> > mprotect(0xffff9f0b5000, 61440, PROT_NONE) = 0
> > mmap(0xffff9f0c4000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff9f0c4000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/usr/lib/libxentoolcore.so.1", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0 \10\0\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=6104, ...}) = 0
> > mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xffff9f458000
> > mmap(NULL, 69768, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f0a0000
> > mprotect(0xffff9f0a1000, 61440, PROT_NONE) = 0
> > mmap(0xffff9f0b0000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0) = 0xffff9f0b0000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/lib/libutil.so.1", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0`\21\0\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=14296, ...}) = 0
> > mmap(NULL, 77840, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f08c000
> > mprotect(0xffff9f08e000, 65536, PROT_NONE) = 0
> > mmap(0xffff9f09e000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff9f09e000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/lib/libuuid.so.1", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0000\30\0\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=30680, ...}) = 0
> > mmap(NULL, 94240, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9f074000
> > mprotect(0xffff9f07a000, 65536, PROT_NONE) = 0
> > mmap(0xffff9f08a000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x6000) = 0xffff9f08a000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/usr/lib/libnl-route-3.so.200", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\200\327\1\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=536688, ...}) = 0
> > mmap(NULL, 609024, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9efdf000
> > mprotect(0xffff9f05a000, 65536, PROT_NONE) = 0
> > mmap(0xffff9f06a000, 32768, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x7b000) = 0xffff9f06a000
> > mmap(0xffff9f072000, 6912, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffff9f072000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/usr/lib/libnl-3.so.200", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\360\221\0\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=141304, ...}) = 0
> > mmap(NULL, 205192, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9efac000
> > mprotect(0xffff9efcd000, 61440, PROT_NONE) = 0
> > mmap(0xffff9efdc000, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x20000) = 0xffff9efdc000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/lib/librt.so.1", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\0#\0\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=31032, ...}) = 0
> > mmap(NULL, 94568, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9ef94000
> > mprotect(0xffff9ef9b000, 61440, PROT_NONE) = 0
> > mmap(0xffff9efaa000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x6000) = 0xffff9efaa000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/usr/lib/libfdt.so.1", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0000#\0\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=38800, ...}) = 0
> > mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xffff9f456000
> > mmap(NULL, 102416, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9ef7a000
> > mprotect(0xffff9ef83000, 61440, PROT_NONE) = 0
> > mmap(0xffff9ef92000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x8000) = 0xffff9ef92000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/usr/lib/libxengnttab.so.1", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0`\20\0\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=14368, ...}) = 0
> > mmap(NULL, 77984, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9ef66000
> > mprotect(0xffff9ef69000, 61440, PROT_NONE) = 0
> > mmap(0xffff9ef78000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff9ef78000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/usr/lib/libxencall.so.1", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\320\17\0\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=14400, ...}) = 0
> > mmap(NULL, 78064, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9ef52000
> > mprotect(0xffff9ef55000, 61440, PROT_NONE) = 0
> > mmap(0xffff9ef64000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff9ef64000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/usr/lib/libxenforeignmemory.so.1", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0000\16\0\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=14392, ...}) = 0
> > mmap(NULL, 78000, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9ef3e000
> > mprotect(0xffff9ef40000, 65536, PROT_NONE) = 0
> > mmap(0xffff9ef50000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff9ef50000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/usr/lib/libxendevicemodel.so.1", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0`\23\0\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=14400, ...}) = 0
> > mmap(NULL, 78008, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9ef2a000
> > mprotect(0xffff9ef2d000, 61440, PROT_NONE) = 0
> > mmap(0xffff9ef3c000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff9ef3c000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/usr/lib/libbz2.so.1", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\320\27\0\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=70472, ...}) = 0
> > mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xffff9f454000
> > mmap(NULL, 134160, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9ef09000
> > mprotect(0xffff9ef19000, 61440, PROT_NONE) = 0
> > mmap(0xffff9ef28000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xf000) = 0xffff9ef28000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/usr/lib/liblzma.so.5", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\3403\0\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=153496, ...}) = 0
> > mmap(NULL, 217104, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9eed3000
> > mprotect(0xffff9eef7000, 65536, PROT_NONE) = 0
> > mmap(0xffff9ef07000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x24000) = 0xffff9ef07000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/usr/lib/liblzo2.so.2", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\320&\0\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=120648, ...}) = 0
> > mmap(NULL, 184336, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9eea5000
> > mprotect(0xffff9eec2000, 61440, PROT_NONE) = 0
> > mmap(0xffff9eed1000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1c000) = 0xffff9eed1000
> > close(3)                                = 0
> > openat(AT_FDCWD, "/lib/libz.so.1", O_RDONLY|O_CLOEXEC) = 3
> > read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\360%\0\0\0\0\0\0"..., 832) = 832
> > fstat(3, {st_mode=S_IFREG|0755, st_size=92056, ...}) = 0
> > mmap(NULL, 155664, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xffff9ee7e000
> > mprotect(0xffff9ee93000, 65536, PROT_NONE) = 0
> > mmap(0xffff9eea3000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x15000) = 0xffff9eea3000
> > close(3)                                = 0
> > mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xffff9ee7c000
> > mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xffff9ee7a000
> > mprotect(0xffff9f2c7000, 12288, PROT_READ) = 0
> > mprotect(0xffff9eea3000, 4096, PROT_READ) = 0
> > mprotect(0xffff9eed1000, 4096, PROT_READ) = 0
> > mprotect(0xffff9f2fa000, 4096, PROT_READ) = 0
> > mprotect(0xffff9ef07000, 4096, PROT_READ) = 0
> > mprotect(0xffff9ef28000, 4096, PROT_READ) = 0
> > mprotect(0xffff9f32b000, 4096, PROT_READ) = 0
> > mprotect(0xffff9f0b0000, 4096, PROT_READ) = 0
> > mprotect(0xffff9ef64000, 4096, PROT_READ) = 0
> > mprotect(0xffff9ef3c000, 4096, PROT_READ) = 0
> > mprotect(0xffff9ef50000, 4096, PROT_READ) = 0
> > mprotect(0xffff9ef78000, 4096, PROT_READ) = 0
> > mprotect(0xffff9ef92000, 4096, PROT_READ) = 0
> > mprotect(0xffff9efaa000, 4096, PROT_READ) = 0
> > mprotect(0xffff9efdc000, 8192, PROT_READ) = 0
> > mprotect(0xffff9f06a000, 16384, PROT_READ) = 0
> > mprotect(0xffff9f08a000, 4096, PROT_READ) = 0
> > mprotect(0xffff9f09e000, 4096, PROT_READ) = 0
> > mprotect(0xffff9f0c4000, 4096, PROT_READ) = 0
> > mprotect(0xffff9f0dc000, 4096, PROT_READ) = 0
> > mprotect(0xffff9f0f3000, 4096, PROT_READ) = 0
> > mprotect(0xffff9f15f000, 4096, PROT_READ) = 0
> > mprotect(0xffff9f14c000, 4096, PROT_READ) = 0
> > mprotect(0xffff9f116000, 4096, PROT_READ) = 0
> > mprotect(0xffff9f318000, 4096, PROT_READ) = 0
> > mprotect(0xffff9f409000, 8192, PROT_READ) = 0
> > mprotect(0xffff9f42f000, 4096, PROT_READ) = 0
> > mprotect(0xaaaabaa10000, 4096, PROT_READ) = 0
> > mprotect(0xffff9f463000, 4096, PROT_READ) = 0
> > munmap(0xffff9f45e000, 7840)            = 0
> > set_tid_address(0xffff9ee7a0e0)         = 813
> > set_robust_list(0xffff9ee7a0f0, 24)     = 0
> > rt_sigaction(SIGRTMIN, {sa_handler=0xffff9f2d6570, sa_mask=[], sa_flags=SA_SIGINFO}, NULL, 8) = 0
> > rt_sigaction(SIGRT_1, {sa_handler=0xffff9f2d6630, sa_mask=[], sa_flags=SA_RESTART|SA_SIGINFO}, NULL, 8) = 0
> > rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
> > prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0
> > brk(NULL)                               = 0xaaaaeaf3b000
> > brk(0xaaaaeaf5c000)                     = 0xaaaaeaf5c000
> > newfstatat(AT_FDCWD, "/etc/libnl/classid", {st_mode=S_IFREG|0644, st_size=1130, ...}, 0) = 0
> > openat(AT_FDCWD, "/etc/libnl/classid", O_RDONLY|O_CLOEXEC) = 3
> > fstat(3, {st_mode=S_IFREG|0644, st_size=1130, ...}) = 0
> > read(3, "################################"..., 4096) = 1130
> > read(3, "", 4096)                       = 0
> > close(3)                                = 0
> > ioctl(2, TCGETS, {B38400 opost isig icanon echo ...}) = 0
> > pipe2([3, 4], 0)                        = 0
> > fcntl(3, F_GETFL)                       = 0 (flags O_RDONLY)
> > fcntl(3, F_SETFL, O_RDONLY|O_NONBLOCK)  = 0
> > fcntl(4, F_GETFL)                       = 0x1 (flags O_WRONLY)
> > fcntl(4, F_SETFL, O_WRONLY|O_NONBLOCK)  = 0
> > openat(AT_FDCWD, "/dev/xen/privcmd", O_RDWR|O_CLOEXEC) = 5
> > openat(AT_FDCWD, "/dev/xen/hypercall", O_RDWR|O_CLOEXEC) = 6
> > openat(AT_FDCWD, "/dev/xen/privcmd", O_RDWR|O_CLOEXEC) = 7
> > ioctl(7, _IOC(_IOC_NONE, 0x50, 0xff, 0), 0) = -1 ENOTTY (Inappropriate ioctl for device)
> > openat(AT_FDCWD, "/dev/xen/privcmd", O_RDWR|O_CLOEXEC) = 8
> > openat(AT_FDCWD, "/dev/xen/hypercall", O_RDWR|O_CLOEXEC) = 9
> > openat(AT_FDCWD, "/dev/xen/privcmd", O_RDWR|O_CLOEXEC) = 10
> > ioctl(10, _IOC(_IOC_NONE, 0x50, 0x5, 0x10), 0xffffe6e417f0) = 0
> > newfstatat(AT_FDCWD, "/var/run/xenstored/socket", {st_mode=S_IFSOCK|0600, st_size=0, ...}, 0) = 0
> > socket(AF_UNIX, SOCK_STREAM, 0)         = 11
> > fcntl(11, F_GETFD)                      = 0
> > fcntl(11, F_SETFD, FD_CLOEXEC)          = 0
> > connect(11, {sa_family=AF_UNIX, sun_path="/var/run/xenstored/socket"}, 110) = -1 ECONNREFUSED (Connection refused)
> > close(11)                               = 0
> > faccessat(AT_FDCWD, "/dev/xen/xenbus", F_OK) = 0
> > newfstatat(AT_FDCWD, "/dev/xen/xenbus", {st_mode=S_IFCHR|0600, st_rdev=makedev(0xa, 0x3e), ...}, 0) = 0
> > openat(AT_FDCWD, "/dev/xen/xenbus", O_RDWR) = 11
> > openat(AT_FDCWD, "/etc/xen/xl.conf", O_RDONLY) = 12
> > fstat(12, {st_mode=S_IFREG|0644, st_size=1602, ...}) = 0
> > fstat(12, {st_mode=S_IFREG|0644, st_size=1602, ...}) = 0
> > read(12, "## Global XL config file ##\n\n# S"..., 4096) = 1602
> > close(12)                               = 0
> > ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41850) = 262158
> > mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_SHARED, 6, 0) = 0xffff9f45f000
> > ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41850) = 0
> > ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41850) = 0
> > ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41850) = 0
> > ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41850) = 0
> > ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41850) = 0
> > ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41850) = 4096
> > ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41850) = 0
> > ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41820) = -1 EPERM (Operation not permitted)
> > ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41b40) = -1 EPERM (Operation not permitted)
> > write(2, "libxl: ", 7libxl: )                  = 7
> > write(2, "error: ", 7error: )                  = 7
> > write(2, "libxl_utils.c:820:libxl_cpu_bitm"..., 87libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve the maximum number of cpus) = 87
> > write(2, "\n", 1
> > )                       = 1
> > ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41b40) = -1 EPERM (Operation not permitted)
> > write(2, "libxl: ", 7libxl: )                  = 7
> > write(2, "error: ", 7error: )                  = 7
> > write(2, "libxl_utils.c:820:libxl_cpu_bitm"..., 87libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve the maximum number of cpus) = 87
> > write(2, "\n", 1
> > )                       = 1
> > ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41b40) = -1 EPERM (Operation not permitted)
> > write(2, "libxl: ", 7libxl: )                  = 7
> > write(2, "error: ", 7error: )                  = 7
> > write(2, "libxl_utils.c:820:libxl_cpu_bitm"..., 87libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve the maximum number of cpus) = 87
> > write(2, "\n", 1
> > )                       = 1
> > clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0xffff9ee7a0e0) = 814
> > wait4(814, [{WIFEXITED(s) && WEXITSTATUS(s) == 0}], 0, NULL) = 814
> > --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=814, si_uid=0, si_status=0, si_utime=2, si_stime=2} ---
> > close(6)                                = 0
> > close(5)                                = 0
> > munmap(0xffff9f45f000, 4096)            = 0
> > close(7)                                = 0
> > close(10)                               = 0
> > close(9)                                = 0
> > close(8)                                = 0
> > close(11)                               = 0
> > close(3)                                = 0
> > close(4)                                = 0
> > exit_group(0)                           = ?
> > +++ exited with 0 +++
> > 
> > royger told me that it is a BUG and not an issue with my setup. Therefore here I am.

Just a bit more context: AFAICT the calls to libxl_cpu_bitmap_alloc in
parse_global_config will prevent xl from being usable on anything
different than the control domain (due to sysctl only available to
privileged domains). This is an issue for 'xl devd', as it won't
start anymore.

A plausible solution might be to avoid the calls to init the several
masks when the domain is not privileged, as those are only used for
domain creation or vPCU pinning related operations that are not
possible for a driver domain anyway.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 16:37:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 16:37:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283537.482586 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPoSc-0000dV-Ne; Thu, 03 Mar 2022 16:37:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283537.482586; Thu, 03 Mar 2022 16:37:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPoSc-0000dO-KI; Thu, 03 Mar 2022 16:37:50 +0000
Received: by outflank-mailman (input) for mailman id 283537;
 Thu, 03 Mar 2022 16:37:49 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=x0rc=TO=citrix.com=prvs=0543a3016=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nPoSb-0000dI-CW
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 16:37:49 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4174ee2d-9b10-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 17:37:47 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4174ee2d-9b10-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646325467;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=JrrrI241k8Wo7CKbJXvIeONuq03hVqv51NMo1BymAz4=;
  b=dl1gk6mb3R2qAL88HeFwnBzrwSpbqprOA+9r+uX4XHL50L8rEEjiAknQ
   txEE+DM73UZ/q5C1CerfVzoKOJGY7pzV7T7DaCY5X8PXqZpT5kjVX9Bep
   BCxbQ/nTK2K179K1djh9AvDMFlhyhRT+ArHWUiDJ3GdWsoTKHT96dEa1y
   I=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 64874675
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:1CheXa0uVj9VPGVx4fbD5W9xkn2cJEfYwER7XKvMYLTBsI5bp2YAz
 zYdXW2BbKzfZWOheNkjbN/ioxlTsZOGmoNiGQU+pC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUw2oDja++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /1xr529Dl80JJf2xrQwaBZmGgJRHpd/reqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHJNYUS/FRpyTjdBPAraZvCX7/L9ZlT2zJYasVmQ6qOO
 JZHNmcHgBLoSQcIalwpGawFx72Xr0mvQTZ58Fu0qv9ii4TU5FMoi+W8WDbPQfSASN9JhE+eq
 iTD9n7gHxABHNWFzHyO9XfErtHImST3SYcDDoqS//RhgECQ7mELARhQXly+ydG7l0j4XdtcI
 k4V/yMGrK4u+UjtRd74NzWorXjBshMCVt54F+wh9BrL2qfS+xyeBGUPUnhGctNOnMw7Wz0sk
 EOIltXBBDpzvbnTQnWYnp+LqRuiNC5TKnUNDQcGRwYY59jooKkokwnCCN1kFcadjNLvHirr6
 yuXtyV4jLIW5eYQzLmy913DhzOqp7DKQxQz6wGRWXiqhit7eYqkaoqA+VXdq/FaI+6kokKp5
 SZe3ZLEtaZXUM/LxHflrPgx8K+B2+yEPXqEnERVJcdx2g+ixXeAUqNq2WQrTKt2CfosdTjsa
 U7VnApe4p5PIXenBZNKj5KN59cClva5S4m8PhzARp8XO8UqKlfblM17TRPIhwjQfF4QfbbT0
 HtxWeKlFj4kBKtu11JarM9NgOZwlkjSKY4+LK0XLihLM5LDPBZ5qp9faTNii9zVCove+m05F
 P4FaqO3J+13CrGWX8Uu2dd7wao2BXY6H4vqjMdca/SOJAFrcEl4VaOPm+9/J90+wPkM/gstw
 p1bchUCoLYYrSeaQThml1g5MO+/NXqBhShT0dMQ0aaAhCF4PNfHAFY3fJorZ7g3nNGPPtYvJ
 8Tpj/6oW6wVIhyeomx1RcCk8ORKLU377SrTb3vNSGVuJPZIGl2WkuIIiyOyrUHi+ALs7pBgy
 1BhvyuGKac+q/NKV56HOKrylArq5RDwWotaBiP1HzWaQ221mKBCIC3tlP4nZcYKLBTI3DyB0
 AiKRxwfoIHwT0UdqrElWYjsQ1+VLtZD
IronPort-HdrOrdr: A9a23:hOnR2K9K8h/AjgWde95uk+F1db1zdoMgy1knxilNoENuHfBwxv
 rDoB1E73LJYW4qKQwdcdDpAtjkfZtFnaQFrrX5To3SIDUO31HYYr2KjLGSjwEIfheRygcz79
 YYT0ETMqySMbE+t7eB3ODaKadg/DDkytHRuQ629R4EJmsKC52IrT0JcTpzencGHzWubqBJcK
 Z0k/A3wQZIDk5nCfhTaEN1PdTrlpnurtbLcBQGDxko5E2lljWz8oP3FBCew1M3Ty5P6a1Kyx
 mEryXJooGY992rwB7V0GHeq75MnsH699dFDMuQzuAINzTXjBqybogJYczAgNl1mpDs1L8Zqq
 iJn/4SBbU115oXRBDynfLZ4Xik7N/p0Q669bbXuwq6nSWzfkNENyMIv/MmTvKe0Tt7gDg06t
 M740uJ85VQFh/OhyL7+pzBUAxrjFO9pT44nfcUlGE3a/pUVFb/l/1rwKp5KuZIIMvB0vFuLA
 CuNrCp2N9GNVeBK3zJtGhmx9KhGnw1AxedW0AH/siYySJfknx1x1YRgJV3pAZMyLstD51fo+
 jUOKVhk79DCscQcKJmHe8EBc+6EHbETx7AOH+bZV7nCKYEMXTQrIOf2sR+2Mi6PJgTiJcikp
 XIV11V8WY0ZkL1EMWLmIZG9xjcKV/NKwgFCvsukKSRloeMN4YDaxfzOGzGu/HQ0ckiPg==
X-IronPort-AV: E=Sophos;i="5.90,151,1643691600"; 
   d="scan'208";a="64874675"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=TWbOiKvGt5QnP1dmaIabT9F2+ILTJz9TgwZkpcPvuADZdXjlaHNtAICIbhG77QhxDFwzDVNO+teLM7Y0r/tV53oTOBEExMduH3q2WFSip76krOD882KJ3UW9foR2AH4jo3uc1BR0tIz2kieDHhmdrBvmG2TOg6/H38/Fn/kJ1l3oKQ0XzdPBLTrMScWbjqYLsKvyKPqPWIr/2LECiB1HYyvME/VlIqwMZAXjt202cn0U3YfhBF0x5gb4oWwP8EKy08Fi/11GsA5emiKIGeGQ/R2tOZFD29AwZ5uoTWjN8nGDuoCCojyKsymBL/U3Z3g12BK3A4aJSdcKBtKO8+SR1w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=JrrrI241k8Wo7CKbJXvIeONuq03hVqv51NMo1BymAz4=;
 b=O+hWio//x8UoVJ9z/zy+PXIMOY9xcA7rARAxFG+1Xk0L8bKaovcSuBe1K7PKaQ4fkbeg61UC8o5L2ywz4PVm/Ce3Tn3IYKUkJcvoNL7Az2b4XGXFCbvjMueMnXrzLHIZDd4D+jMArl8dISSXFGjWpSRTSX6kxSBkxplV2TQIrGKQlyER8yrq/RJdLUr+WuiAMS3L3Df+ei4g6YAJ/8bibGCTk83UB2s06f11kln/E5GHBA+MHSEp+c+yUVHj7uiVgTPdgnq9KegxqJyhORyDjW09DPL5p7zplILKLHqyCJrtIFflcEgjtbNsMtxlFZqK3wF+S09m+ljqs1Hm7cfacg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=JrrrI241k8Wo7CKbJXvIeONuq03hVqv51NMo1BymAz4=;
 b=gfu8vhX+hJxGZwJMoUugPp/nRd3VWQGNb+6jv+kyVR5x7kVj80et4SxXUDSHXxz919O/HuKEb8g0qXmGSCWgKld0ybAbhVj5TWj34+Uk9+5fwRgBJFU5KId20IkPHIvgdLLOtvsmwraDKOMWcZv908pi8Xa+EAkU2DTGjAcjEw4=
From: Jane Malalane <Jane.Malalane@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Wei Liu <wl@xen.org>, Anthony Perard <anthony.perard@citrix.com>, "Juergen
 Gross" <jgross@suse.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>, "George
 Dunlap" <George.Dunlap@citrix.com>, Julien Grall <julien@xen.org>, "Stefano
 Stabellini" <sstabellini@kernel.org>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>, Bertrand Marquis <bertrand.marquis@arm.com>,
	Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian <kevin.tian@intel.com>,
	Roger Pau Monne <roger.pau@citrix.com>, Xen-devel
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v4 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Thread-Topic: [PATCH v4 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Thread-Index: AQHYLkaMjdZBkrS3CkWZwGsOatNz36ytiXSAgABT+oA=
Date: Thu, 3 Mar 2022 16:37:43 +0000
Message-ID: <67296830-aa16-4231-69ba-f07d2b1a4b65@citrix.com>
References: <20220302150056.14381-1-jane.malalane@citrix.com>
 <20220302150056.14381-2-jane.malalane@citrix.com>
 <240602ab-412c-8607-ed6c-916cf37343f7@suse.com>
In-Reply-To: <240602ab-412c-8607-ed6c-916cf37343f7@suse.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: ea0eb93e-db34-4c1f-9d5a-08d9fd3423f5
x-ms-traffictypediagnostic: PH0PR03MB6429:EE_
x-ld-processed: 335836de-42ef-43a2-b145-348c2ee9ca5b,ExtAddr
x-microsoft-antispam-prvs: <PH0PR03MB6429517F0CEBF6C35755556A81049@PH0PR03MB6429.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM5PR03MB3386.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(31686004)(83380400001)(36756003)(4326008)(8676002)(91956017)(76116006)(8936002)(6512007)(64756008)(66556008)(66946007)(53546011)(55236004)(31696002)(316002)(66446008)(2906002)(66476007)(186003)(6506007)(26005)(2616005)(6916009)(54906003)(86362001)(38100700002)(71200400001)(6486002)(508600001)(122000001)(82960400001)(7416002)(5660300002)(38070700005)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?WFI0aW1mTG9mNDRXQy82V0daVTJwM1QyeWtmM0pYZnRPVzlzSXpMeFBmemNa?=
 =?utf-8?B?dFdKcnpkVGUwNzVXT1ZvMFZyZ2ptaG1BaHpBYUVMYldRUXRxWklWNVNwVGdW?=
 =?utf-8?B?Zkx0TXdKVUVxZEpUa2lOcHpWNDU0SEdXcFM5c0lNRHVsRlJMQlVva29XYnFX?=
 =?utf-8?B?SG8yR2tISVNUb0xkQ2ZVTFZ6QXFtZlF6LzJJYTZkeGhTYitJNlRjSCtWamF3?=
 =?utf-8?B?dU8rQm9kOHkrYk8vRkRhTlgvMWk1ZjI4UGJCdko5dXFTeHo2YVlGQkhVb0Zi?=
 =?utf-8?B?UDhoZENQTTBQY21rblhvbkhFTzRmV0JFdDUyZnJ0aUFhZlBvQXZzenJxSWhJ?=
 =?utf-8?B?Q3c3amdDOUpqMlU0V3hpbzNPR1JPbUYwN0pYQTg5TERBUXBMMUlodlpXUTBv?=
 =?utf-8?B?YU9UdFBoSVZRbWVEZkNHa3JCS0F2cm1KY2lvN0FXTTF4dnJ0RUVURDRzUmJW?=
 =?utf-8?B?ODJtbFJXcGRjU25tS0tPZ0NwTGNlQjJHNEYyS3ovTTNadTBiY05Id2tlekdE?=
 =?utf-8?B?ek16c0pMSlYvMGYwWUhrSGxNMmFTNi92YWFiQi9XdkZaSVZ1OFJqblQrZ1ow?=
 =?utf-8?B?RW1JQmVkTGJjUEFLb2ZGUUhpQ1NrVUFTakRQSTBWLzIyeEpYTDlvV05hVWx1?=
 =?utf-8?B?M0Q4MW5uQmVLZzBJc3kzZzdPeGc5SmhTeUJBWnZLUHZrOGhVNXc0Wk9neWhj?=
 =?utf-8?B?ckNYaXlpNVltTiszUVlFMFBvMEpyK1QyN2lOdmNNU28rUXVBclFQLzZ5V3gz?=
 =?utf-8?B?RDFqcFNmcVBvcDZrMlR1MlhRVjhIdlNwNDQwVitMSW9uQWJjK3NLSlczWjhu?=
 =?utf-8?B?S0NYWDZGd1hyRkE3Y1pMQ2F4S3hOSUVieDJiNnF4eE9FZ2Y0MHQzbmJaVjlL?=
 =?utf-8?B?TlFrUVJhN0pSaE9RY2RsK21TdWdJeVZSYmNYbUdlOEJSUkFlQWN4OGFvdEhS?=
 =?utf-8?B?M2N2VUZkK1Y1R3RocFRXb3NWdXI3RmpEVmpma3pXdlRCU005Z1k0Zm5jUzVV?=
 =?utf-8?B?RTVabVJ1ekphdXg0eGx1Y1NvMUhicms0ZnlRVXNvYTA1U1p0R1RxV1FYN0ts?=
 =?utf-8?B?S2VJL2pCUUdNK0FZZmNoT2pyVkVHQVBWSFlsZEVNUS90YTdDV0pkNFBBWlk5?=
 =?utf-8?B?eVo2WlJqY3ZHakRDNmJ6SVFMQkxqVkdEb255cFk0Yk9RMi9ZbHVXQzd0NGlo?=
 =?utf-8?B?YkxtaFl4RFJWS0JpZ2xjR3Y3RWRCTlp2Wk4wN3FtVXl6NkdtTEF5M3FreHd3?=
 =?utf-8?B?ZjcweWltV1dySXJsZmlVNm10SUJCUE1yQytCU0xJWjY0YW1BWDVJc1gzQTVj?=
 =?utf-8?B?OXdlVnplaVdybG9obmYzRnZtRGtWejFDOTg1REpkR0NVOXNFTm0zNmRJbngz?=
 =?utf-8?B?amhnbnpSNWNaclVObWhLV2h5Q3FBSC9BZmhHWThlQzVHbmZqZG5yNVk0cTFC?=
 =?utf-8?B?NldMWHR2eFZ1bGdQNVd4aHE0bFRNZU5JdG9yNWJYTHI3WmtGeEFMOFdJS0Ra?=
 =?utf-8?B?NmkvSWpFeFlVaC9ZamhpUjBicjliWXlCRnhjUVE3cWUzTHc0L2hKMG1RNUZ1?=
 =?utf-8?B?aHkzZUFqRSs4YnRORWNmR1JQcGdjYkw4M0MwTXFBblh0RDIvalZUUDVZQ09r?=
 =?utf-8?B?MTI3NFNId2tPUU1MMEc2dmFMMDJsQy9pOFJUZi84bWgyb2RNdWVyUGJCTU5m?=
 =?utf-8?B?OTM2TzlRNVlLdVZ2eDRnTjg4S0tNVnN0MEFlYkpoU3VaTWd4cE1KM24wYSs4?=
 =?utf-8?B?NDArOE9qT2tiLzVpMU5zMC9aV3pHL2NmVEtLWHpRQUU4S3NLdmlUckRteWpv?=
 =?utf-8?B?SVJtZVR3Tzl0eVo2a0J2eWRuUDNRU1FQN3ZUVWMwZDl4MzNWQS92d3JtSzBv?=
 =?utf-8?B?MCs3cnlxMDlBRUk1Y1ZKUDJXdFdmL3Z6RWdtcm5tWWFVMFh4U0pJU3pPMUs5?=
 =?utf-8?B?VjJVVkJKWThNUkN5dThPcXhoekhVQm10eUhnTFl0ZFJCMjBqYjBCWG1DaEQy?=
 =?utf-8?B?S1psT1Rxb1FFYkRONDB0b3B2RGpFQmpyU2JjVm04ZlpwSklVWnYyTzFVaFVQ?=
 =?utf-8?B?andvM2FYV0tOUktOWEFhb01ycWh3UWdnMjRVYUdLNERqS2ZYOWFETU1YS2h5?=
 =?utf-8?B?RGZVaHhhS2tnbElnU1B3NHJwOXFLZW54bUpzOWpjUWlDRERJek4rVEY3WnVu?=
 =?utf-8?B?eHRGNCszSXp2RlZLZFZydklOR1kvaVJBOGw1aDhzRHNyZU85ajVVNCtOZDRS?=
 =?utf-8?Q?FyloI7uY3AjiDDyGSYgxs6I5BZQLxpR9XV31fNIcvI=3D?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <890EAFE1E3BE754ABA12C001A22DBCEC@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM5PR03MB3386.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ea0eb93e-db34-4c1f-9d5a-08d9fd3423f5
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Mar 2022 16:37:43.1968
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: QMfyt/1eyudIzrGeAPecnP8YA+n1ht4RiLYj2vsGb0Wg2a4rIXLLDzg33KT2VgVO4ftxnph0cb+X/rDt4Sao9ZNy62c5X0Hc8EooZmyBk7A=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR03MB6429
X-OriginatorOrg: citrix.com
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==


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 16:39:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 16:39:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283546.482596 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPoUN-0001Ev-3t; Thu, 03 Mar 2022 16:39:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283546.482596; Thu, 03 Mar 2022 16:39:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPoUN-0001Eo-0s; Thu, 03 Mar 2022 16:39:39 +0000
Received: by outflank-mailman (input) for mailman id 283546;
 Thu, 03 Mar 2022 16:39:38 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=JYFF=TO=alpha.franken.de=tsbogend@srs-se1.protection.inumbo.net>)
 id 1nPoUM-0001Ei-1G
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 16:39:38 +0000
Received: from elvis.franken.de (elvis.franken.de [193.175.24.41])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id 831c5441-9b10-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 17:39:36 +0100 (CET)
Received: from uucp (helo=alpha)
 by elvis.franken.de with local-bsmtp (Exim 3.36 #1)
 id 1nPoU9-0008UX-00; Thu, 03 Mar 2022 17:39:25 +0100
Received: by alpha.franken.de (Postfix, from userid 1000)
 id 23B82C28F1; Thu,  3 Mar 2022 17:39:00 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 831c5441-9b10-11ec-8eba-a37418f5ba1a
Date: Thu, 3 Mar 2022 17:39:00 +0100
From: Thomas Bogendoerfer <tsbogend@alpha.franken.de>
To: Christoph Hellwig <hch@lst.de>
Cc: iommu@lists.linux-foundation.org, x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org, linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org, tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: Re: [PATCH 06/12] MIPS/octeon: use swiotlb_init instead of open
 coding it
Message-ID: <20220303163900.GA11971@alpha.franken.de>
References: <20220301105311.885699-1-hch@lst.de>
 <20220301105311.885699-7-hch@lst.de>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20220301105311.885699-7-hch@lst.de>
User-Agent: Mutt/1.10.1 (2018-07-13)

On Tue, Mar 01, 2022 at 12:53:05PM +0200, Christoph Hellwig wrote:
> Use the generic swiotlb initialization helper instead of open coding it.
> 
> Signed-off-by: Christoph Hellwig <hch@lst.de>
> ---
>  arch/mips/cavium-octeon/dma-octeon.c | 15 ++-------------
>  arch/mips/pci/pci-octeon.c           |  2 +-
>  2 files changed, 3 insertions(+), 14 deletions(-)

Acked-by: Thomas Bogendoerfer <tsbogend@alpha.franken.de>

-- 
Crap can work. Given enough thrust pigs will fly, but it's not necessarily a
good idea.                                                [ RFC1925, 2.3 ]


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 16:45:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 16:45:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283555.482613 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPoaI-0002hP-Sm; Thu, 03 Mar 2022 16:45:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283555.482613; Thu, 03 Mar 2022 16:45:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPoaI-0002hI-PH; Thu, 03 Mar 2022 16:45:46 +0000
Received: by outflank-mailman (input) for mailman id 283555;
 Thu, 03 Mar 2022 16:45:45 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=7nUi=TO=gmail.com=this.is.a0lson@srs-se1.protection.inumbo.net>)
 id 1nPoaH-0002hC-5l
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 16:45:45 +0000
Received: from mail-qv1-xf36.google.com (mail-qv1-xf36.google.com
 [2607:f8b0:4864:20::f36])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 5dfe4289-9b11-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 17:45:44 +0100 (CET)
Received: by mail-qv1-xf36.google.com with SMTP id f11so4563832qvz.4
 for <xen-devel@lists.xenproject.org>; Thu, 03 Mar 2022 08:45:44 -0800 (PST)
Received: from development (c-73-166-253-254.hsd1.tx.comcast.net.
 [73.166.253.254]) by smtp.gmail.com with ESMTPSA id
 o21-20020a05622a009500b002de9437a361sm1852806qtw.51.2022.03.03.08.45.42
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Thu, 03 Mar 2022 08:45:42 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5dfe4289-9b11-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=message-id:subject:from:to:cc:date:in-reply-to:references
         :user-agent:mime-version:content-transfer-encoding;
        bh=37OBnyCkhWCp8ML45vhmE8oVSuW97TvQCBK8N6+4i7c=;
        b=Ldf01gRB5JkaGduWI0dYefNBLt0mj7H2L0fRoc5v/eCbeUwXeb2zoMur01C4YXZtar
         3m3EIKSAGKSghxl3HBuTO9st5eSkGqeYuxsBVUj7DSOSgsQjuKW+9rVOmEbP5W0yuNRJ
         2oI4CXgRer4+G/E6d4UVWgu3y0pcwoPhzcPGaEV3fd0zz5Eb4xa5zWH4lxs0Z6jkTKov
         6Sfrci+qID8snshVv2srWDEy/hBIr8HPUFCd7sb0AB17LFMqpRkoC2vPsNGtnplamdt5
         ekqjR9WIvK7QCVdzlj/jhrrC9nrWIY1sM8PcEP24AYcryFhswMM1AbUa+Y2NPThbFp4s
         At8g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:message-id:subject:from:to:cc:date:in-reply-to
         :references:user-agent:mime-version:content-transfer-encoding;
        bh=37OBnyCkhWCp8ML45vhmE8oVSuW97TvQCBK8N6+4i7c=;
        b=N04LzySLHuAP/lwrUN1FMzhb2tOzFTbdQ579mTuq42J1KFBJcxTq3HK1LRINNFE8YD
         pCdkZ78MdjcFZNnwb9Tg4E6fmmNRpekMn09KnJYYMtEGXUwRF1ZLUkcRA8OHbJh5GXFR
         5K9sChqkpHQBjWm+Wfm3kAOrrT1vaFetE1lnfSQ7Me1GmUgSunh7lh4vKor48NXTp65C
         wTnFaJHh+8ovJpJZTlUlBdOcSUAwySFhmDF5U3tTP7jdiYWEalzux7cc5P0a+qiOlZ2f
         +mQX0WOnM7AaH+9+/ANHlfLJ94/QWrnyIs+xF8x1RngFy5IaGTVQbznKX6tH8Zmbx6fa
         tyTA==
X-Gm-Message-State: AOAM531XmaxYzSkaLx9Tw3t+xNDVtzTUraC4MFAlzqXBU3BnsGXf9+dX
	qbhUgkkwHwN/FhhsUatooB8=
X-Google-Smtp-Source: ABdhPJxOu74g5hnQC/7Gro8KuoTm8sdPnvuoW9W3L5mhVoOtqe55j4QbCvbgTlt1gsf7tznsdxRwyQ==
X-Received: by 2002:a05:6214:d64:b0:432:e2e4:bfa3 with SMTP id 4-20020a0562140d6400b00432e2e4bfa3mr18974948qvs.72.1646325943053;
        Thu, 03 Mar 2022 08:45:43 -0800 (PST)
Message-ID: <9a02db6a23b269fe774ad4a0bc4c662e5e4df37c.camel@gmail.com>
Subject: Re: [PATCH 3/3] hvm/pirq: allow control domains usage of
 PHYSDEVOP_{un,}map_pirq
From: Alex Olson <this.is.a0lson@gmail.com>
To: Roger Pau Monne <roger.pau@citrix.com>, xen-devel@lists.xenproject.org
Cc: Jan Beulich <jbeulich@suse.com>, Andrew Cooper
 <andrew.cooper3@citrix.com>,  Wei Liu <wl@xen.org>
Date: Thu, 03 Mar 2022 10:45:41 -0600
In-Reply-To: <20220303103057.49181-4-roger.pau@citrix.com>
References: <20220303103057.49181-1-roger.pau@citrix.com>
	 <20220303103057.49181-4-roger.pau@citrix.com>
Content-Type: text/plain; charset="UTF-8"
User-Agent: Evolution 3.36.5-0ubuntu1 
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Hi Roger,

Thanks for the patches.  In trying them out, I found some other PHYSDEVOP
commands that were being blocked by the "default" case and were being failed
with -ENOSYS... 

Would something like the change below make sense?  Or is defaulting to failure
incorrect?   (I saw denials for the "add" commands, and also added the
remove/release commands for symmetry).

With this change, I was able to achieve a functional virtual function passed
through to a HVM domain with PVH dom0.

Thanks

-Alex


diff --git a/xen/arch/x86/hvm/hypercall.c b/xen/arch/x86/hvm/hypercall.c
index b8becab475..6abaa626a3 100644
--- a/xen/arch/x86/hvm/hypercall.c
+++ b/xen/arch/x86/hvm/hypercall.c
@@ -84,6 +84,17 @@ static long hvm_physdev_op(int cmd,
XEN_GUEST_HANDLE_PARAM(void) arg)
 
     switch ( cmd )
     {
+
+    case PHYSDEVOP_manage_pci_add:
+    case PHYSDEVOP_manage_pci_remove:
+    case PHYSDEVOP_pci_device_add:
+    case PHYSDEVOP_pci_device_remove:
+    case PHYSDEVOP_manage_pci_add_ext:
+    case PHYSDEVOP_prepare_msix:
+    case PHYSDEVOP_release_msix:
+        if ( is_control_domain(currd) )
+            break;
+
     case PHYSDEVOP_map_pirq:
     case PHYSDEVOP_unmap_pirq:
         /*



On Thu, 2022-03-03 at 11:30 +0100, Roger Pau Monne wrote:
> Control domains (including domains having control over a single other
> guest) need access to PHYSDEVOP_{un,}map_pirq in order to setup
> bindings of interrupts from devices assigned to the controlled guest.
> 
> As such relax the check for HVM based guests and allow the usage of
> the hypercalls for any control domains. Note that further safety
> checks will be performed in order to assert that the current domain
> has the right permissions against the target of the hypercall.
> 
> Reported-by: Alex Olson <this.is.a0lson@gmail.com>
> Reported-by: Andrew Cooper <Andrew.Cooper3@citrix.com>
> Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
> ---
>  xen/arch/x86/hvm/hypercall.c | 7 +++++++
>  1 file changed, 7 insertions(+)
> 
> diff --git a/xen/arch/x86/hvm/hypercall.c b/xen/arch/x86/hvm/hypercall.c
> index 030243810e..9128e4d025 100644
> --- a/xen/arch/x86/hvm/hypercall.c
> +++ b/xen/arch/x86/hvm/hypercall.c
> @@ -87,6 +87,13 @@ static long hvm_physdev_op(int cmd,
> XEN_GUEST_HANDLE_PARAM(void) arg)
>      {
>      case PHYSDEVOP_map_pirq:
>      case PHYSDEVOP_unmap_pirq:
> +        /*
> +         * Control domain (and domains controlling others) need to use
> +         * PHYSDEVOP_{un,}map_pirq in order to setup interrupts for
> passthrough
> +         * devices on behalf of other guests.
> +         */
> +        if ( is_control_domain(currd) || currd->target )
> +            break;
>      case PHYSDEVOP_eoi:
>      case PHYSDEVOP_irq_status_query:
>      case PHYSDEVOP_get_free_pirq:



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 16:47:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 16:47:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283562.482625 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPocO-0003St-91; Thu, 03 Mar 2022 16:47:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283562.482625; Thu, 03 Mar 2022 16:47:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPocO-0003Sm-54; Thu, 03 Mar 2022 16:47:56 +0000
Received: by outflank-mailman (input) for mailman id 283562;
 Thu, 03 Mar 2022 16:47:54 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPocM-0003Sg-I3
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 16:47:54 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ab1ed16d-9b11-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 17:47:53 +0100 (CET)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur03lp2054.outbound.protection.outlook.com [104.47.8.54]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-16-oAuDd0A4NJiJnBLhHtnCog-1; Thu, 03 Mar 2022 17:47:51 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR0402MB3554.eurprd04.prod.outlook.com (2603:10a6:208:1e::20)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 16:47:50 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 16:47:50 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ab1ed16d-9b11-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646326072;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=1txL8oqdo3qklpwPLNQCZjr0HvUSAQAWmmZ2cmrh+mY=;
	b=N7bkmFFJPVYMOC2BT28sD9lCL2sn9MIKxLsxFf4YDqiYYaducJAR6M1Bw2xiT3WmzQ8+i9
	XrrHzjuU/mDquDNQg17Jg9Rc06HPdT7Prou6dHAudj0ungFwoRpfGxtazCXNrVuw6L8InF
	gQRq1yhhj+Ot8d4aNlBmzFF+Cv1+gxU=
X-MC-Unique: oAuDd0A4NJiJnBLhHtnCog-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ZNhaOyJYtTehCdrVHWHs1YyMVVoSUQpvdkFImboL7VxqgQxDatboNJoJEPhWcGsXSJwyyxBvb9QhsMYkH1m/xKhdCg2xah2WlY7Ukf1UtAsQMyKlUQKOvs7C288X7RM7mvIzpKWTIln6HGR3F3+YBsAoYGCI6UcQ/aH0E8J2kSPkUE3N6Uq5xaaFU4uWtJWBQiO5PyxzXfqpG02xtSb35/UuGgXaujPHWz2sHXjZO+/XS9RwkRFz/HtQLJUvVE37JvssSA2kNvBYoDgR7Xyja/V8FK5yz3wESFjQjWWteZfPR5XSGRhHsAfMPA93O6pjf4Y6c8rCCMNDp2jGkX6T3g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=1txL8oqdo3qklpwPLNQCZjr0HvUSAQAWmmZ2cmrh+mY=;
 b=lbaRJxofXdB92ixVMRPgsduLSm7G2ejqspiqk/bHj6VAw3T/4inbRJODGdN62ToF2dKEuk98JAiKgTasZQ5GvBhGrhFxcG0stxHGAH3g1n3I/IE4w5aYM/9ZM2q/f8Cxu8ySplRD/ZYHzJ7L1TL29TZDaszuNU217mXBP510IpAY3Ta05C3gnc0mDBLHwpaMWblwm/gtU/D/rAt2wxb2QiNTE/0SpvufmPsgE8UBBw4XlXQ5057RJPNLl9WXjRtTHEvnoxLCRLugxUXpCkF0xd6k2ZkzEnRerYKrsq7tLoglVzagcHTB5n4ErONb6WHiLnfxcTWcDuVUp54RRgYPLw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <c416bfc2-218a-e641-5fd7-505ea4f7a322@suse.com>
Date: Thu, 3 Mar 2022 17:47:48 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH 3/3] hvm/pirq: allow control domains usage of
 PHYSDEVOP_{un,}map_pirq
Content-Language: en-US
To: Alex Olson <this.is.a0lson@gmail.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 Roger Pau Monne <roger.pau@citrix.com>, xen-devel@lists.xenproject.org
References: <20220303103057.49181-1-roger.pau@citrix.com>
 <20220303103057.49181-4-roger.pau@citrix.com>
 <9a02db6a23b269fe774ad4a0bc4c662e5e4df37c.camel@gmail.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <9a02db6a23b269fe774ad4a0bc4c662e5e4df37c.camel@gmail.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR06CA0207.eurprd06.prod.outlook.com
 (2603:10a6:20b:45d::34) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 29bb0aae-ced9-4989-4b67-08d9fd358dae
X-MS-TrafficTypeDiagnostic: AM0PR0402MB3554:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR0402MB35545C462599531F483579D1B3049@AM0PR0402MB3554.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(86362001)(31696002)(8936002)(5660300002)(2906002)(38100700002)(316002)(4744005)(26005)(186003)(2616005)(54906003)(6916009)(508600001)(6506007)(6512007)(53546011)(6486002)(36756003)(66476007)(66556008)(66946007)(4326008)(8676002)(31686004)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?UHc2S3gxWEZPMThrTGhaWUhhcmowamRWTUdXRmk2YmZPc3lxd0YwMk81SWN5?=
 =?utf-8?B?T0tUNWtiQXFFa2dCRlNHanF0UndQTGdJdmdzWUxCTWhTR2hlN09LaEkxem1m?=
 =?utf-8?B?YXpwcDYyNTZrdnlRUW9wUG1QVWZucmZYd0xyMG1IWllKem96TFdWa1Q0K3NN?=
 =?utf-8?B?NzVJbFpCcmFxcWdUSi9rRGpCdVdDaENTbWhiUFNFTmx2Wk9mWWpmalA4S3pt?=
 =?utf-8?B?a3ZoUm1VK24xeXN6eVF1TldORmZITUxxeDJJenhoUkhkRFZkWnYzMFpDZHZ4?=
 =?utf-8?B?UUtiZHMyQTJhNmxuT1JyL29mdHBxdlZHUitEeVdJM0lsM1h2MXo2a2I3VHV0?=
 =?utf-8?B?YmVTRVJENDE4ZW9oNmp5aFUrNE5POUdhSlhMWFlDNUJBUWhhd2dPV0NMbFR0?=
 =?utf-8?B?dHNxODJjdVNqNVNXL21TQTVnWnBXdUIya0w1dTROSjVpdmsrWE9ERCtxNFpC?=
 =?utf-8?B?aGo2am9qKzJKaGFWSC9uSTE0YTEyeitKbVJRY0IzVTdwZnVLdzZ3cTlpKzB1?=
 =?utf-8?B?MXlDcGwwZmdsTmdLaVVKaS82L2lkMkQ3aE5pT085dmdsd25wQXY4b1BPbCsz?=
 =?utf-8?B?c3Rob0ZYZ3hBVDVqbHNiQjFoc0VOemJ2UG92aTZ4eU9qZ0RNUWJWSDJMUUFB?=
 =?utf-8?B?Nkt0VFAvdWRrN21KSk5XaU8rRFlaT090bE90M3NyTEtFbXV5dHZKbkJlVTBI?=
 =?utf-8?B?bFlIaXphRUZsOWwyVDZRVmFEb0RBTDAxM0hJbGo4N0lXb25sZ1NJWi9KVzdp?=
 =?utf-8?B?Qmg4REpWNG1hNDhFbmRTTHZka2V6S0JNd1ZzbVRaV01EYzdkWGdld0RrTXow?=
 =?utf-8?B?M0NITHE5ZE5TR29nVVAwYjZYTzRGNk00cXJ3VG1HV0duQWR3dkpYeUtsckFu?=
 =?utf-8?B?NmhBUmpGbzMrRkY0b0poSEZpTk9KcTdQWTY3enMxTXVhaGZVUU14WE9XcGlK?=
 =?utf-8?B?RE1Veld5bVkwRlFQQ0doNUQ3MkMwTG1NZnhzbGxnRGFFUDJwME5xdzlRdG5X?=
 =?utf-8?B?dnV6bFRqaG44ZUhpcnZrZGcwQUZSNjNzMWt1RnVWZmtPc2ljRWthOEQyTGZu?=
 =?utf-8?B?allzOHh4MGMwTlRuQmU4aEZ5ZEIrVkhyZkdMMGNydW55eFZBTHhFVkRSSk1h?=
 =?utf-8?B?SldSODRIamp6bmFmKzlYdThDR0JpYmVtQTBGenJ4V0k4RHphakRUQS8weDBv?=
 =?utf-8?B?NEh0VTUvRElCREJzbWVMTGxWTGFZRzBETFZ3czRIN3ByaTBZU2VwVmFGcURT?=
 =?utf-8?B?WDNBR0VGSUFVaFl4eENQaEVGditnbkhsWm9tWkVFSXEvUTZNcTFUNk5zRmpD?=
 =?utf-8?B?a09NbGhhRTd0QUxNRzZCUHptdjJ5STFiMU1KblcxbjBJci9KWE51VjcyUUNo?=
 =?utf-8?B?RUY5MzR6NFluc0dud1RLVHZYMWg2N09wLzFTZzAyenNmdnB1TkVNWDNiY3VS?=
 =?utf-8?B?bWc2cjZLbDBheEtBSUtXbGhHZXIzaGhTeG14cHlIcVliR1VzWDRRc2FmbVRs?=
 =?utf-8?B?aC9NcUF5N2JhWlFxSEhjZ2pVYlRqaiswNllJTDErZjZvVGdMdTY2RzBtRkhS?=
 =?utf-8?B?K2lYUkZ6ZUJvU0MxQ2ZzNDFUZ1RzdURCOTBjVlBwYmZ2eFA1RzNHVHhvTlpV?=
 =?utf-8?B?cmxBT2NEa3pIYmhlaENua3Jrdk9wRnBYRnQxS0dsVlBhQUhocnU2aDFrL1Jm?=
 =?utf-8?B?RHVMbm1lWGJRUVJ0YUF1akVKWEN6Wi83YVRRSU9FcG5qcVlIbUxmOEo0VGlB?=
 =?utf-8?B?cFJXSmhzdGxHYmRqbjR3ZW9BdUE2bk81ZWlHSWxwaEJWb3d3cHdwWE1YdUo5?=
 =?utf-8?B?RFlFUlJKVmNSQUxtZzhocld6MHU5TzNmbkIzdGM2eXA3dEpTR2FNcHpFU09j?=
 =?utf-8?B?NkdYclhDbWtKNjBVdDNQL2N6a29nUUJNL2FQa2QxZUdNU1FCb3JIeWc1bklQ?=
 =?utf-8?B?MnZnTXF0THVONTQyZ3IvclljTTcvc0NtYVh6bE1yelBoQzAyMjg0TWE2TzVo?=
 =?utf-8?B?c1BBVWVVYlAwZElSUEtCM1BNTEw3MlM1Vi9QVnpXVWYwK2ltRy9aR3hjU2ts?=
 =?utf-8?B?TDJvSitNaFE0UG5iS1hmemRwY2xMc0hrSG1RNnZYSjNjWUdDelhhMGt6eDM4?=
 =?utf-8?B?MTYwTk0yTkFFeDNjTzNsKzBCMTMxc0kzbHB6UWZiL3hsYklNekUyYlVnZS9o?=
 =?utf-8?Q?lJHnGiQpdtopDftJoMhdSVo=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 29bb0aae-ced9-4989-4b67-08d9fd358dae
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 16:47:50.3302
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Mlymvs5mwGyGV1u/HfaAw3bQyGZgOrobbenxL2jnS+Y9SGvur/XiW1kdVQDYjTlouzSbvhz0Ya+BFxrDGIItBw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR0402MB3554

On 03.03.2022 17:45, Alex Olson wrote:
> --- a/xen/arch/x86/hvm/hypercall.c
> +++ b/xen/arch/x86/hvm/hypercall.c
> @@ -84,6 +84,17 @@ static long hvm_physdev_op(int cmd,
> XEN_GUEST_HANDLE_PARAM(void) arg)
>  
>      switch ( cmd )
>      {
> +
> +    case PHYSDEVOP_manage_pci_add:
> +    case PHYSDEVOP_manage_pci_remove:
> +    case PHYSDEVOP_pci_device_add:
> +    case PHYSDEVOP_pci_device_remove:
> +    case PHYSDEVOP_manage_pci_add_ext:
> +    case PHYSDEVOP_prepare_msix:
> +    case PHYSDEVOP_release_msix:
> +        if ( is_control_domain(currd) )
> +            break;

These are all operations which I think are purposefully permitted to
be invoked by the hardware domain only. That's where all the devices
live when they're not passed through to guests.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 16:49:05 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 16:49:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283569.482635 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPodU-00045q-NP; Thu, 03 Mar 2022 16:49:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283569.482635; Thu, 03 Mar 2022 16:49:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPodU-00045j-KQ; Thu, 03 Mar 2022 16:49:04 +0000
Received: by outflank-mailman (input) for mailman id 283569;
 Thu, 03 Mar 2022 16:49:03 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPodT-00045S-8F
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 16:49:03 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id d44059bb-9b11-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 17:49:02 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2113.outbound.protection.outlook.com [104.47.18.113]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-22-LvB8DWDyNe6zW4TV46aA6A-1; Thu, 03 Mar 2022 17:49:00 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AS8PR04MB7525.eurprd04.prod.outlook.com (2603:10a6:20b:29b::11)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 16:48:59 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 16:48:59 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d44059bb-9b11-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646326141;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=jNG5t9DemTxExj0TLsZDFiC67KQQMJUNArdRlPUwPcY=;
	b=R4RtZPl6OHyWe6z9d9bWOtZ6l81Eo+8mJoQ/6A15Pg5h8Pufr9djWI88UC/8Jgui/jvBkA
	NtLz3qCcfp66tmfKgsdsQi/Pm5CklZcHt7nyunBq93QM3/En04szTYUF4qnYrhBDsGrCdB
	GdrBhvIAv1sZzzD+YYpXdS16i4QOHzc=
X-MC-Unique: LvB8DWDyNe6zW4TV46aA6A-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=HgQUW62nH+04KTFVEwDzjvTwvaHwVcLH2dFzv0GOxGsFGhFu5j8MzgUzsdYwMlC8Uutha6NmS41w9T984kD2r94bqL5bkSbWcsz6LsL1GHLHT6ZhpvEzqqPKfBQKxR4ALPq+F0MdstZUdgyjcqLS0JdbQmTn1PHnz/da+HeegVfy2JafFNKS4KV5UQftVKd25MIvQHHxvuF1oMxYwgzjNaiNeRyjofKBOnvV8SgYJht79T3oj+PZF48eq/9zNtfoA73amfjI68TmedACuDBYM+Qf+Rxb47Ei0KJfwkNjxPsPPZsW7b7nozWGgZgHPko+eM2eN2guYWryV+8eiJnjXA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=jNG5t9DemTxExj0TLsZDFiC67KQQMJUNArdRlPUwPcY=;
 b=f2vqq9QL1Gw7fLwvYpC8DUkXjYdVfYAk/HBiZdlaPj69cojM8FNgFoRZjJB9TaQrw/wbNTRMUIhCdQovVn1HHhhiQPLtXfewYfAhTUKyQlNtC5oxeMMvFry4nMhds8M5ZsvkNlXeG49T12AA0rf8rHRhcE30YTCV7lz1zDgxeXG0ySJY145/b504WAP8MuvQjKq79Es1Pvx3U6wXxs3XqIpBpBpjFc03Tadz+5Fnjdfna+5qxU8ZzYvs0MKAIhIX06duiDSjzBLapUR3MwrD/MOr8ZCF7EQXE794cpN7r1pN7MZC7bZnPNl9T+hcLBZ5X6DDP8B0B7UVKpvYzfIUuQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <832ca068-5316-b4eb-60ee-aeff009ef1cc@suse.com>
Date: Thu, 3 Mar 2022 17:48:56 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Content-Language: en-US
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH] x86emul/test: correct VRNDSCALES{S,D} entries in predicates
 test
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR05CA0012.eurprd05.prod.outlook.com
 (2603:10a6:20b:488::30) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: b07b117f-16c8-47d2-e817-08d9fd35b6bf
X-MS-TrafficTypeDiagnostic: AS8PR04MB7525:EE_
X-Microsoft-Antispam-PRVS:
	<AS8PR04MB7525AA82F1C00B93F45D764BB3049@AS8PR04MB7525.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(316002)(4744005)(186003)(6916009)(26005)(8936002)(54906003)(2616005)(66556008)(66476007)(66946007)(6512007)(6666004)(6506007)(4326008)(5660300002)(8676002)(508600001)(6486002)(31696002)(86362001)(31686004)(2906002)(38100700002)(36756003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?Zkx1endlQzFQWUZPSTFuSGFJTWNTdEc3MzNmQy9JYnptQ1h2N3dhZWZlWUo1?=
 =?utf-8?B?dW1NUlhSa3RHbnJiSktKY3VyMzVuODZuc28rOFlpVW9NOGI0WEFuamFPQXFD?=
 =?utf-8?B?Z1Z3aG4ydG1tT21YZURreHdnSWU3bGF6Z2psN2c2YTlHRmRHcjRWSkZZTEIv?=
 =?utf-8?B?THFQN1pzSXF3aXF0VDZ0NXA3UVlaQkt6WlBRc2lBeEtwRmZHdjBjcW16cmpH?=
 =?utf-8?B?alpnUUhTL2xlYkxHMUdQVCtsQmN2SXlmWnUvOEVEQlhicit1dkF2bW52YzBG?=
 =?utf-8?B?Rk10L0k5WTZrM2syRnhXcytpa0UvS3Y3UjdDUnV0bzlsb2ZBUTZFeFozYVlK?=
 =?utf-8?B?NjBnUjJaeTJwZW8veUVucnU2dk40enlQZnVaT3JpQjNNc2ZvazFsZnBGbzBT?=
 =?utf-8?B?ZkUyRjlXblpoNVpjNTcwWkdadFFwL0plMWhaTzh2RFQ5b20weW1PZWFsUnpN?=
 =?utf-8?B?SkpBcU8vY0dPZzdUUlg1VGVadTNRaEFaUTk0YndleHJCRlE3dXoyNjN5NTNX?=
 =?utf-8?B?dXdhNndYVkNISTRwbXJzMzVWcmZpUnJwb3V1M3ZwUnJ3MzNyM1V2Sk1wWjBW?=
 =?utf-8?B?N3BEQVlrSU9PbFZGL3dnbkNydGRYLytUMk5Gb1Q2Q1haNTdlRmNBdFlDdWc3?=
 =?utf-8?B?TVFuUU9CMklLQmRCZjd6bjh3ZytSWHRESEkxOFhsMlNmSWZ3NUFBMzcrb0l4?=
 =?utf-8?B?RzZDc0t6Ym8rWE56NDBvWUd6REg4WnZHQkJTRnJ2VGU1SHdLS1pQd0kvTjAx?=
 =?utf-8?B?RUM4SDhieWZoQ3lrZnNtd0RoTFAzVXhoUWdiNzVnS2h1alFoWlhyODhsWE5T?=
 =?utf-8?B?ajFtRVRzaTF0ZEc5OE4xdVhXRE4zL2hTSVhzUXZaSXpxbDFzaUQxaHlsU3NP?=
 =?utf-8?B?UUhHSC9MNkV6S1JKSVIrSEFtRGxRcXozNnNnakE0YWxkN2lkYk1OZVd2ZVhv?=
 =?utf-8?B?NTZudnczamdGZ0NZcy80OE1EcWhMc0hRc3QvR0M4ZTBJUDF2RnFSMjNXUEJJ?=
 =?utf-8?B?aDJCQ0hCZlRaa2VwV1BHSjhIWHAxSFVkRjg5eC9VeTlhQzFlWForcGhKR1Zh?=
 =?utf-8?B?ckRHMklkRE9lcTA2ZmpCZFFHYWRvaDFFTytXeWFiem5NWUdNeldQcUZDc05Q?=
 =?utf-8?B?RFh2L3I4djFtYUFzRTlENFVlaEkzM3dsWDd3aGVWdHVvdFBXZktRaFY4QVNM?=
 =?utf-8?B?NlJlbGdTYnB6T0pMM0NDakoxTCthSnFZbEJxelAyUXpJN3lZdmloTFJ4VGRE?=
 =?utf-8?B?TDFsYzZQc2QrZFhybndEU0dtRlRiRDFla1FkSGthdStublhXMy9lckdielVI?=
 =?utf-8?B?RXhJdnBLT1prV0gveFdVVTZ1aG5zaVJUbEtJcjdtb2poSmw2OTRaWHFYR0x2?=
 =?utf-8?B?S3QxdUJ2cTR0RXEzUG0vWHliSVdMZkdkTmFYM24xRHhlOVJwUXdhSTlGakFh?=
 =?utf-8?B?K2d6K3hhWVNRc09yNGN2SjhkRUY2SHE0Rlp2ZE95bWUyS3l0Y0FCdE81M1Zp?=
 =?utf-8?B?RzhhSEhtVFd0bk5LWHpjMFMweE4xTVIxK2pEMGdxbTRmRDdITzdyM3BrVVRI?=
 =?utf-8?B?VnY3QWQ5WWZRMHd1TER6QUJWUnBNWERRSFdjNXVrdEo1WnAzL09LTnllYVRY?=
 =?utf-8?B?TFFDdkRMUTU5Z29mRzVrL291MEJDVWYySmpFZjF6dkhYVXgwZTN1M3NFeHIr?=
 =?utf-8?B?cnFUbnBsU2kyZFJVbWlyV0lXVjUwZlExK1hXK0MzazMwRWI1L0wrczV6dlRy?=
 =?utf-8?B?a2lqYW9uNjNMWkd6eWJxazY2VEo0aXFQaXRubVJBNTlTa0MxU2I1bkEzQU1B?=
 =?utf-8?B?V2REYjRjdFBBemxaR1JwTUFHbS91bDJOaG1SbFlYb3pxNDQ2UDM3UnRvTVdO?=
 =?utf-8?B?ZkdKeGRXSnJzNTdoSWhQRmtVdXJ5TURZYi9XYzU4L3ZZNU1ZS0cyS2hkN3lH?=
 =?utf-8?B?N1ordDFOSHMyZDJ3WFJlVjBqR2VGQnNZME13cjA4U0JVQ01lUE0vUTBkTE14?=
 =?utf-8?B?eGdLLzhGRWRaa25xak1zVEZTQ2FWYWJOWHljalYyQzJydHdUZDhFcllSWGk1?=
 =?utf-8?B?UTVmNExzS0tSR2NlT29QV0t1ZStWSXd1cDRyYlpPcnVLRXhZczk0bGNNbTZq?=
 =?utf-8?B?YlVmSVF4S2Jwem1zU0tuLzRMK2JNYzBWbVJFbGtxNU15anJYU3dzUithaEhS?=
 =?utf-8?Q?A7J8Mu0cfEDA1F7SWdp/hlQ=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b07b117f-16c8-47d2-e817-08d9fd35b6bf
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 16:48:59.2166
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 6+nDxWeRw6XKiiSCEbDXFZ/Akh9tOft44PQzTZ+kQoNAx7rczGpmYjoriMXzvM45b0+4BEOQgb+HXRtu/sSl1Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR04MB7525

While benign (because only the decoder is exercised here, whereas a
wrong EVEX.W would cause an exception only during actual emulation),
let's still have correct information in the table entries.

Signed-off-by: Jan Beulich <jbeulich@suse.com>

--- a/tools/tests/x86_emulator/predicates.c
+++ b/tools/tests/x86_emulator/predicates.c
@@ -1974,8 +1974,8 @@ static const struct evex {
     { { 0x05 }, 3, T, R, pfx_66, W1, Ln }, /* vpermilpd */
     { { 0x08 }, 3, T, R, pfx_66, W0, Ln }, /* vrndscaleps */
     { { 0x09 }, 3, T, R, pfx_66, W1, Ln }, /* vrndscalepd */
-    { { 0x0a }, 3, T, R, pfx_66, WIG, LIG }, /* vrndscaless */
-    { { 0x0b }, 3, T, R, pfx_66, WIG, LIG }, /* vrndscalesd */
+    { { 0x0a }, 3, T, R, pfx_66, W0, LIG }, /* vrndscaless */
+    { { 0x0b }, 3, T, R, pfx_66, W1, LIG }, /* vrndscalesd */
     { { 0x0f }, 3, T, R, pfx_66, WIG, Ln }, /* vpalignr */
     { { 0x14 }, 3, T, W, pfx_66, WIG, L0 }, /* vpextrb */
     { { 0x15 }, 3, T, W, pfx_66, WIG, L0 }, /* vpextrw */



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 16:50:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 16:50:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283577.482647 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPoeY-0005Sp-3S; Thu, 03 Mar 2022 16:50:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283577.482647; Thu, 03 Mar 2022 16:50:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPoeX-0005Si-Ut; Thu, 03 Mar 2022 16:50:09 +0000
Received: by outflank-mailman (input) for mailman id 283577;
 Thu, 03 Mar 2022 16:50:08 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPoeW-0005SU-D9; Thu, 03 Mar 2022 16:50:08 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPoeW-0001fj-Ax; Thu, 03 Mar 2022 16:50:08 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPoeW-0001w4-0G; Thu, 03 Mar 2022 16:50:08 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPoeV-00037r-W2; Thu, 03 Mar 2022 16:50:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=hcgKUxrHOBPU6+7ZqJj7FZsyAIvEpY3zaKB3NUrAPEA=; b=f/41kXjV0J94tc3DvaTh7z+kHB
	4U1ewanHgSK/VjM8+NUSO860zKl6onBLJ9wcvMaIn0VFsEquid8ehwhtlTH1/LCgzyA19LSWo7/F5
	1Ezs9WYT8POtByI+WhR8X8Es/4GQy2hRwABGRlU4cHSPYCxMUIOybjam0rXFKnJBDjNI=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168377-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168377: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=589d51df260465e2561979b8a988e77b0f32a6e8
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 03 Mar 2022 16:50:07 +0000

flight 168377 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168377/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 589d51df260465e2561979b8a988e77b0f32a6e8
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    3 days
Failing since        168258  2022-03-01 01:55:31 Z    2 days   25 attempts
Testing same since   168359  2022-03-03 10:41:39 Z    0 days    5 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 589d51df260465e2561979b8a988e77b0f32a6e8
Author: Sean Rhodes <sean@starlabs.systems>
Date:   Thu Feb 24 19:38:18 2022 +0800

    MdeModulePkg/Usb/Keyboard.c: Don't request protocol before setting
    
    No need to check the interface protocol then conditionally setting,
    just set it to BOOT_PROTOCOL and check for error.
    
    This is what Linux does for HID devices as some don't follow the USB spec.
    One example is the Aspeed BMC HID keyboard device, which adds a massive
    boot delay without this patch as it doesn't respond to
    'GetProtocolRequest'.
    
    Cc: Hao A Wu <hao.a.wu@intel.com>
    Cc: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Matt DeVillier <matt.devillier@gmail.com>
    Signed-off-by: Patrick Rudolph <patrick.rudolph@9elements.com>
    Signed-off-by: Sean Rhodes <sean@starlabs.systems>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit b422b0fcf92dd4103dfc16d8d5f77fbec2d8c5b9
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Tue Feb 22 11:29:23 2022 +0800

    EmulatorPkg/EmuGopDxe: Set ModeInfo after Open successfully
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2668
    
    WindowOpen will fail in some case. for example, without XServer.
    
    Shouldn't set ModeInfo in this case to avoid the caller use it
    incorrectly
    
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 906242343f7a654402f6f999d447aa9d29a8f4d4
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sun Feb 20 14:53:01 2022 +0800

    MdeModulePkg/GraphicsConsoleDxe: Check status to make sure no error
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2668
    
    SetMode will fail in some case. for example, without XServer.
    Should handle these case when SetMode fail.
    
    If we don't handle it, it will Segmentation fault.
    
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit dc39554d58af4a50b50eca1f57c49415a12b0c98
Author: Xiaolu.Jiang <xiaolu.jiang@intel.com>
Date:   Tue Feb 22 22:14:05 2022 +0800

    edk2/MdeModulePkg/Debuglib: Add Standalone MM support
    
    https://bugzilla.tianocore.org/show_bug.cgi?id=3844
    
    This change added Standalone MM instance of DebugLib.
    
    Reviewd-by: Jian J Wang <jian.j.wang@intel.com>
    Reviewd-by: Liming Gao <gaoliming@byosoft.com.cn>
    
    Signed-off-by: Xiaolu.Jiang <xiaolu.jiang@intel.com>

commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 16:50:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 16:50:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283586.482658 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPofI-00061y-DH; Thu, 03 Mar 2022 16:50:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283586.482658; Thu, 03 Mar 2022 16:50:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPofI-00061r-9g; Thu, 03 Mar 2022 16:50:56 +0000
Received: by outflank-mailman (input) for mailman id 283586;
 Thu, 03 Mar 2022 16:50:55 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ylIu=TO=citrix.com=prvs=0548df38f=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nPofH-00060U-8Y
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 16:50:55 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 14c23540-9b12-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 17:50:53 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 14c23540-9b12-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646326253;
  h=date:from:to:cc:subject:message-id:references:
   mime-version:in-reply-to;
  bh=R0oR7tfIq/Z2IW5QUl+LxmBT8t6a9cgGfLm/JxvWPU8=;
  b=WQ2z0BnHfzrbvqu0e9bIjxw2A1LwaFrX/5dIlnbw8EmrSL/IfS6UxkpW
   kboZ18UkJEkz01uiNr/Oq7wDd4Nwr7A0+D1PTy+V/7NtgaVBNL+ALGScu
   GirxtVTdQcgKPWn/mhIgrODAfTgZiwForQoNtiXRiy6U73Uo7tZ2khkrP
   0=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 65814765
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:4wwrEq0dEMENhZ8B7/bD5TNxkn2cJEfYwER7XKvMYLTBsI5bp2cCy
 WZOXjiPO/yPMWfyft8kYISzo0lVv8DXmNZlQFZvpC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUw2oDja++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /1nibK2RERqPZTFxtgiaRl7Li8mBZVvreqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHiOp8fvXdxiynUF/88TbjIQrnQ5M8e1zA17ixLNaiDN
 5NFNmQyBPjGSw1tHhAvLqwhpr7y33/+TRtc9nyZlYNitgA/yyQuieOwYbI5YOeie8JRmUqJo
 3PcyE7wCBoaKd+3xCKM9zSngeqntSn2Qp4IHbu0sPtjmkSOx3c7AQcTE1C8pJGRmkO4Ht5SN
 UEQ0i4vtrQpslymSMHnWB+1q2LCuQQTM/JPF8Uq5QfLzbDbiy6bDGUZSj9KaPQ9qdQ7Azct0
 zehnc7tBDFpmK2YTzSa7Lj8hSipJSEfIGsGZCkFZQgI+d/upMc0lB2nczp4OPfr1JuvQ2i2m
 m3U6nhl71kOsSIV/4+H01bKwHGvn5GXcjEP5ibqUDqd1iosMeZJeLeUwVTc6P9BKqOQQV+Ao
 GUIlqCi0QweMX2evHfTGbtQRdlF897AaWSB2gA3Q/HN4hzwoybLQGxG3N1pyK6F2O4gcCShX
 kLcsBg5CHR7bCrzNv8fj25c5q0XIUnc+TbNC6i8gjlmOMEZmOq7EMdGPxT4M4fFyhVErE3HE
 c3HGftA9F5DYUid8BK4Rv0GzZggzT0kyGXYSPjTlkr7j+DCOiLEEuhYaTNii9zVCove+m05F
 P4FaqO3J+h3CrWiMkE7D6ZJRbz1EZTLLc+v8JEGHgJyCgFnBHsgG5fsLUAJIORYc1Buvr6Qp
 BmVAxYAoHKm3CGvAVzTOhhLNeO+Nb4i/ClTFXF9Yj6VN40LPN/HAFE3LMBsI9HKNYVLkJZJc
 hXyU57YU6QXF2+eoGx1gFuUhNUKSSlHTDmmZ0KNCAXTtbY7GGQlJveMktPTyRQz
IronPort-HdrOrdr: A9a23:Wgpd6qHuP3Jw+9w5pLqE6MeALOsnbusQ8zAXP0AYc3Jom+ij5q
 STdZUgpHrJYVkqNU3I9ertBEDEewK6yXcX2/hyAV7BZmnbUQKTRekIh7cKgQeQeBEWntQts5
 uIGJIeNDSfNzdHsfo=
X-IronPort-AV: E=Sophos;i="5.90,151,1643691600"; 
   d="scan'208";a="65814765"
Date: Thu, 3 Mar 2022 16:50:23 +0000
From: Anthony PERARD <anthony.perard@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>, Bertrand Marquis <bertrand.marquis@arm.com>,
	Roger Pau =?iso-8859-1?Q?Monn=E9?= <roger.pau@citrix.com>,
	<xen-devel@lists.xenproject.org>
Subject: Re: [XEN PATCH v9 24/30] build: grab common EFI source files in arch
 specific dir
Message-ID: <YiDxz2QcpzV7NGQ7@perard.uk.xensource.com>
References: <20220125110103.3527686-1-anthony.perard@citrix.com>
 <20220125110103.3527686-25-anthony.perard@citrix.com>
 <3bde2fea-f3fd-3926-b98d-aa0afb549bf8@suse.com>
 <YiDhpSZC1z/duG4q@perard.uk.xensource.com>
 <48c58217-30c6-790f-a058-49b887fc1355@suse.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <48c58217-30c6-790f-a058-49b887fc1355@suse.com>

On Thu, Mar 03, 2022 at 05:01:07PM +0100, Jan Beulich wrote:
> On 03.03.2022 16:41, Anthony PERARD wrote:
> > On Thu, Mar 03, 2022 at 11:37:08AM +0100, Jan Beulich wrote:
> >> On 25.01.2022 12:00, Anthony PERARD wrote:
> >>> +# Part of the command line transforms $(obj) in to a relative reverted path.
> >>> +# e.g.: It transforms "dir/foo/bar" into successively
> >>> +#       "dir foo bar", ".. .. ..", "../../.."
> >>> +$(obj)/%.c: $(srctree)/common/efi/%.c FORCE
> >>> +	$(Q)ln -nfs $(subst $(space),/,$(patsubst %,..,$(subst /, ,$(obj))))/common/efi/$(<F) $@
> >>
> >> What is the "reverted" about in the comment? Also (nit) I think you want
> >> s/in to/into/.
> > 
> > I've tried to described in the single word that the result is a relative
> > path that goes in the opposite direction to the original relative path.
> > Instead of going down, it goes up the hierarchy of directories.
> > Maybe "reversed" would be better? Do you have other suggestion?
> 
> I'd simply omit the word. In case you're fine with that, I'd be happy
> to adjust while committing.

I think that would sound kind of strange. $(obj) is already a relative
path. It would probably be better to just drop the end of the sentence
in that case. With the example showing what is happening, that would
probably be enough. The sentence would then be:

    # Part of the command line transforms $(obj).
    # e.g.: It transforms "dir/foo/bar" into successively
    #       "dir foo bar", ".. .. ..", "../../.."

-- 
Anthony PERARD


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 16:52:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 16:52:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283598.482669 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPogz-0006jl-U7; Thu, 03 Mar 2022 16:52:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283598.482669; Thu, 03 Mar 2022 16:52:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPogz-0006je-PN; Thu, 03 Mar 2022 16:52:41 +0000
Received: by outflank-mailman (input) for mailman id 283598;
 Thu, 03 Mar 2022 16:52:40 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPogy-0006jB-A8
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 16:52:40 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 55ac203b-9b12-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 17:52:39 +0100 (CET)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04lp2057.outbound.protection.outlook.com [104.47.12.57]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-25-sLipJf1UMlqP9gvV00RszQ-1; Thu, 03 Mar 2022 17:52:38 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PAXPR04MB8301.eurprd04.prod.outlook.com (2603:10a6:102:1c5::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 16:52:36 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 16:52:35 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 55ac203b-9b12-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646326359;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=4OzSYrdp3fBqB1KoY5uzmlBQiqHpklP3VyB2FmZXpoU=;
	b=T3uSlpe9SA+vD1DH4nIWNILlz1oza7LbUHJp7AKTV/8qtq0oT3Lc9DOKUscZDKEbQ9uULt
	IfOqmV2mgDMZ9y1ciFce8aJFmKiQ6rkoTIwMTLkZA4dOcF4hDVReoBw03LfMQmpKvFnwDE
	XnX0RTqKA/QHhEwRo+ynisLGzlxKiyM=
X-MC-Unique: sLipJf1UMlqP9gvV00RszQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=CRtG01uG31vONhKzAYaQxpVNhJtH8xE37lpLE7zT7q1wjpB6Rszd5FiwAqSjBGU76vD+U2je/HzzEyc1GZ/ypdKxzkhhzG/0rRGiDEHoKRi4OaHBp00/6PDkaHgCVcv3iaak7V0sCjALPxCHCAe5svoZxlRXpNa/Iulz45ppHHlYqPdKg7E1JwBqXYsfeAemSr5Th+YXaYA92IpvNtilmq1fyX1pwHJMPLvOR1veEiJ6nHU/BbwpV4amfHBOrJ5nyYs8kNy8mAnlGeQWM/oDWYlIzlQ4hQ6kWclmSlKripVoVwZpXSkRNpUt/d2zAPtU7N2+tEPGepHNuD062FhapA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=4OzSYrdp3fBqB1KoY5uzmlBQiqHpklP3VyB2FmZXpoU=;
 b=DZ2yN69J7YnmuzkiIlbSyLaxgRevlu/1dW/Xva+X/9auOPAn7Ox0lLXKV3NfriNNYeXLmbVv2gt9mMxvy1ck9k0eUD+iXC9LvXM6cRfEIYZbZ468W6xkOhu9xUGxb30eDM2RPIU/SpKDdmz8ZWGLbzyny29Jff2VVEwObY/F59xfD3ADdhgkmRFZEJg+JLFPFA5wgAKl0kI8cdPJzI+So6vbtMFrRU1sqIBrL58Q6jCHjI6vQsq/OP3J3gpiT95ohQ3BTN6treW52TfBURp4204tnO1gGYO2ATb4gZQS9/ZczjZVGuaABYT79oZ64ePcSnPozQ2R+57xKBNnWGDDCA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <33562be6-3ebc-1d97-10e3-f0066daa4a53@suse.com>
Date: Thu, 3 Mar 2022 17:52:34 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Content-Language: en-US
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH] x86emul: correct a few scalar insn comments
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR0301CA0044.eurprd03.prod.outlook.com
 (2603:10a6:20b:469::16) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: fe8493bc-95ae-45d2-718f-08d9fd3637d7
X-MS-TrafficTypeDiagnostic: PAXPR04MB8301:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB8301F22BE70F96B8B02EAB45B3049@PAXPR04MB8301.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	RaMUJ1XVy0v43+5d7li31DK+TMGF1Jaq0xV8UpCTkQqy/Xgy7l1dtmanqC34++0W9TFJLS94Sr91WFFq8ggZpLructg8iH2kW5DUCzVVVmBuT0UDxuKAR7iSweIXEoWETGX5BsvK1CapkBgfBktI0XMNXPWdxXx+CAHBBcbuOXsAo4PDe/IieXzLOR2uOJetGlKa7LqEEbyeSPADeQhP3vQ2V2CnlC/Z6cAcQcJG1O6/gcurWYXQk5Sa1FZc/+TIlTkRSRmwnpzB86T9sN9AU+PvNRB/LXJw8uHUas8fT/s4p9Q2PM0Q5Z6SRJR9Qbhj1KCgvyhcimE0UemvNgTqjaZazK623E+EmOiPY0Py6sBSXnxcFNxWhY0bR05u/vcaDOB8QGb6lmUDbj56KlqtikURgtDZBKfOybnQThx228D4nSNVvGVWDvBOzeb2FBhMP/T20NsBxZN2aW14SudpZfW4DJf6si3uXO5YGIENRXKkCPdNMMNccIHdeHJ02c8qb62FWzi00QIxUBEpsCRsitVUNmwbYG9B1PCo3lrmtl1Bp3lruvrBpQUf63Aq+PGv7X5QtO57tUtvZjP3nV2A9sVd+MUS/Z+DgHIm6+dgToA/9/FJhAPQvt+CUyoePJdwwxdbJgrS913Yh+6BRwvZQgjcj9Ruy46pimThCw7h+ToDk0mrSrZbPeKwfBqBf2gUDAEFe9BJttXi/fZkZghaDAdVyNvp4D5VYsSmwfNRSimVu/HgxbUgUscHBb5JNZ+y
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6916009)(2906002)(2616005)(36756003)(316002)(8936002)(86362001)(5660300002)(54906003)(186003)(38100700002)(26005)(31696002)(66946007)(66476007)(508600001)(66556008)(4326008)(8676002)(6486002)(6506007)(6512007)(31686004)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?Y095ZFoyUU5zV0U1QmlQVm12K2ZnbjNYNEtsbDVyQTVQR3p4bHYrRWxlaDJC?=
 =?utf-8?B?QW5GaVlCdDBLOFJPcElYWDNRdXdMUUlseTZOdWNjQ1psRGpaWWFib1NiYVp0?=
 =?utf-8?B?S1V5aGo4ZTRISnJQampwRWtIcjRXWVc1QUV5Y01RR3dUQmYxUHA0MmIwSFdH?=
 =?utf-8?B?M2psMmRxOE9SN1VKVWhEY3B4b2l1cDlYQy8ySkNpdWVHVHNQVnp0dmZ1d2VP?=
 =?utf-8?B?TXZpNXdPNmd0SFhEMDlZM0pNN0ozdjhIVXhFZzMxbElONFMwNjRrWGJtQlp0?=
 =?utf-8?B?ZVp6a0dJTmlibWloL05KR3pkTEZLakJGRnBseS9tc2R4ckg1SjMwa3NnZXhv?=
 =?utf-8?B?dzZwdnpXUEZXSitXZnJQeFRtVFV6RHQyakxCTDdleEtvQjNqRkhYeUNzWi9M?=
 =?utf-8?B?WmNFNkpSTzVqUHZTSEMrWmFGeXIzbFVwTk84YVp5RGU4NTNNa3pGSXVNcmdV?=
 =?utf-8?B?dDFmVUp2UWl1d0NnMExRT0grVkd0dzJRNGRXai9mTTJrbXNabklFbDBXWGRB?=
 =?utf-8?B?UU5FTzhMWnM4NE11NUlwUjdHV29TaksvVWF5dDdHeTMySUh5VmlmV2V5Sktv?=
 =?utf-8?B?aUFlU2RSY3BJNWtXRGJuOGdnWU5wTkIrbFZwN1FNZGZlWC9OQ2J6Z1hYSmdk?=
 =?utf-8?B?QUZjNFJSR25VRDlkWlBidmhFbXZFRjZ3NXY4dVFiSXJQK1UwZGRjb0xEeHMr?=
 =?utf-8?B?Y0ZxU2VWbGlibnRXY2FpSDdncDBXajc4Tkpuby93SWhObTZ3K05hYkFSZzd6?=
 =?utf-8?B?V243Y2Rad0U1aGNyUkl5cndmS2c5SEZrL0xLQmVabk55UlhUNVdJQjRVS09K?=
 =?utf-8?B?K1ZWVHc5K0JxWW5IMHhTUFg1TGRsQ0JqbTh5RzZ2MFZIM1RrL2J3RWE5Z3dz?=
 =?utf-8?B?Uy9Kd2Jhenh4Zk16ZDZWMDJoTjZhOVdsdjROSWlncmZEN2NpRkl3a09tZXlE?=
 =?utf-8?B?R1E3dGloVXZMd3UweDZWOVg4c2k4bUdGaFRpS0hQNWh5WkFPa1NSaXRyVlRB?=
 =?utf-8?B?NXZvaVFKQzJqVW9NRml6dFM1SzZYdjdWRmhEazRwd3VRamo0K3JtazBKYWNB?=
 =?utf-8?B?RytQZURVL3FldVFGZ0NYc2FEUU5GVnlwV2F6YWxyekM3TUJ1YndqQXhFdnRD?=
 =?utf-8?B?OUJoWkhMdktpRmNEUUtFaSs5cjEvTXY0V1VpZ3hrc0FRbjFFbWErVTgzK016?=
 =?utf-8?B?V1Q4RG95UWxNU0ttRTBIK1YvMnZZWXcwcHVrTGJkelJTTGN2cXhKUVI2clpJ?=
 =?utf-8?B?VW5ma3ZWNUNGSFVZeDdpcWo2RjQzcFRSam1IM0djSDB2d09aY3MvdmdSaUVv?=
 =?utf-8?B?T203b01mLzBpTUR5dUhVV0ZkYkhydlJCRm1WRW9HTURMZmJiaHBoYWhHZW1M?=
 =?utf-8?B?b3hBWkwrdWU3OTVnT1dWKzlITmtWTGtSSkdOeW5sWjZTYjM0QVVxRitHNllG?=
 =?utf-8?B?NTJ3QVg5NXMvVVJTY1M4emRubmpWM0xGWHJaU2pDNHFwMUNyaVFpOS9qTy9W?=
 =?utf-8?B?MHpTSkVMNWVRdm9JUmFObVlrcnhMWWhZa3dnYTV1K3NyYkE5OHVMdXlsSnFF?=
 =?utf-8?B?Q0YwdnllU0l2Nit2dFhzYnVRSUpoUWhZMkRJY3gyd3RQcjQxQ1MvUGtqNzdK?=
 =?utf-8?B?ekJkN0ZKbCtJS0lud1NNWUE0RTFVYXRKUTg0aUJWSm1ETTFsb1VCeDhiQU5N?=
 =?utf-8?B?bjJlRDdMampSTnV1UDQ3bHJZS0ZHK3lFZW4zaDd4eFhZNDc3cWt3Vm15ZEdk?=
 =?utf-8?B?VXJLenl6WktiMVh6SVlob2Z4aExmb3pkTU9la3U5Z0cwWjNQNTJwdHloSmwv?=
 =?utf-8?B?emRrMmhjY0JvYS85c0F1VCtmVVd0dnhCcmEyMWVHZXBaMGcyVmNNL3NRcFFG?=
 =?utf-8?B?OGRaTVFqZ0dnbjdRVSs5dmkrdUpRbXFnbGdOQkhvcGRDMk1nVzF4a1hyT3Ay?=
 =?utf-8?B?RGNXUFNta1FxSXp2KzdQVEZGaFl5MHdvR3VIWHpjaU5UNG9hZ3A5UVRvQ29Y?=
 =?utf-8?B?WjJwSndFWVI0eWRmYlNJeUZTNFAvQ093VUtRNlBFUlB6ZngreGxuSWVxZjE5?=
 =?utf-8?B?VEVWQnNjSHh0T0NBS1I4Ulc2Z3d2RjVPSTY4NGpENngzc09EWWVUd1ZiMUxp?=
 =?utf-8?B?MGJocCs4TGlzNlU2TE93ZEVUdjlHanAxbmlROE1oNGVPblZlZjlrVzk5a3Nk?=
 =?utf-8?Q?+aHHYtlkh8hA1M8/KNxxPpQ=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: fe8493bc-95ae-45d2-718f-08d9fd3637d7
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 16:52:35.7813
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: xiyDKxFajNdakwJfvdpob72ULV6cSE/7oqUOv/rp6DQRpbAD7FV8cenK3cC/Ap78wdEJUQZHqLxIK19aEvT82w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB8301

Truly scalar insns (i.e. not VBROADCASTS{S,D}) only every act on
%xmm<N>. Adjust comments accordingly.

Signed-off-by: Jan Beulich <jbeulich@suse.com>

--- a/xen/arch/x86/x86_emulate/x86_emulate.c
+++ b/xen/arch/x86/x86_emulate/x86_emulate.c
@@ -7608,8 +7608,8 @@ x86_emulate(
 #ifndef X86EMUL_NO_SIMD
     case X86EMUL_OPC_VEX_66(0x0f3a, 0x08): /* vroundps $imm8,{x,y}mm/mem,{x,y}mm */
     case X86EMUL_OPC_VEX_66(0x0f3a, 0x09): /* vroundpd $imm8,{x,y}mm/mem,{x,y}mm */
-    case X86EMUL_OPC_VEX_66(0x0f3a, 0x0a): /* vroundss $imm8,{x,y}mm/mem,{x,y}mm,{x,y}mm */
-    case X86EMUL_OPC_VEX_66(0x0f3a, 0x0b): /* vroundsd $imm8,{x,y}mm/mem,{x,y}mm,{x,y}mm */
+    case X86EMUL_OPC_VEX_66(0x0f3a, 0x0a): /* vroundss $imm8,xmm/mem,xmm,xmm */
+    case X86EMUL_OPC_VEX_66(0x0f3a, 0x0b): /* vroundsd $imm8,xmm/mem,xmm,xmm */
     case X86EMUL_OPC_VEX_66(0x0f3a, 0x0c): /* vblendps $imm8,{x,y}mm/mem,{x,y}mm,{x,y}mm */
     case X86EMUL_OPC_VEX_66(0x0f3a, 0x0d): /* vblendpd $imm8,{x,y}mm/mem,{x,y}mm,{x,y}mm */
     case X86EMUL_OPC_VEX_66(0x0f3a, 0x40): /* vdpps $imm8,{x,y}mm/mem,{x,y}mm,{x,y}mm */
@@ -10576,8 +10576,8 @@ x86_emulate(
         host_and_vcpu_must_have(sse4_1);
         goto simd_0f3a_common;
 
-    case X86EMUL_OPC_EVEX_66(0x0f3a, 0x0a): /* vrndscaless $imm8,[xyz]mm/mem,[xyz]mm,[xyz]mm{k} */
-    case X86EMUL_OPC_EVEX_66(0x0f3a, 0x0b): /* vrndscalesd $imm8,[xyz]mm/mem,[xyz]mm,[xyz]mm{k} */
+    case X86EMUL_OPC_EVEX_66(0x0f3a, 0x0a): /* vrndscaless $imm8,xmm/mem,xmm,xmm{k} */
+    case X86EMUL_OPC_EVEX_66(0x0f3a, 0x0b): /* vrndscalesd $imm8,xmm/mem,xmm,xmm{k} */
         generate_exception_if(ea.type != OP_REG && evex.brs, EXC_UD);
         /* fall through */
     case X86EMUL_OPC_EVEX_66(0x0f3a, 0x08): /* vrndscaleps $imm8,[xyz]mm/mem,[xyz]mm{k} */
@@ -11063,7 +11063,7 @@ x86_emulate(
         break;
 
     case X86EMUL_OPC_EVEX_66(0x0f3a, 0x66): /* vfpclassp{s,d} $imm8,[xyz]mm/mem,k{k} */
-    case X86EMUL_OPC_EVEX_66(0x0f3a, 0x67): /* vfpclasss{s,d} $imm8,[xyz]mm/mem,k{k} */
+    case X86EMUL_OPC_EVEX_66(0x0f3a, 0x67): /* vfpclasss{s,d} $imm8,xmm/mem,k{k} */
         host_and_vcpu_must_have(avx512dq);
         generate_exception_if(!evex.r || !evex.R || evex.z, EXC_UD);
         if ( !(b & 1) )



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 16:54:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 16:54:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283605.482680 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPoj5-0007LI-9q; Thu, 03 Mar 2022 16:54:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283605.482680; Thu, 03 Mar 2022 16:54:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPoj5-0007LB-6s; Thu, 03 Mar 2022 16:54:51 +0000
Received: by outflank-mailman (input) for mailman id 283605;
 Thu, 03 Mar 2022 16:54:50 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=NyQH=TO=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nPoj3-0007L4-VB
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 16:54:49 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a2f90470-9b12-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 17:54:49 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2113.outbound.protection.outlook.com [104.47.18.113]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-30-saU999qPNm2r2pxzOVrQ7g-1; Thu, 03 Mar 2022 17:54:47 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR04MB4397.eurprd04.prod.outlook.com (2603:10a6:803:74::31)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 3 Mar
 2022 16:54:46 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.014; Thu, 3 Mar 2022
 16:54:46 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a2f90470-9b12-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646326488;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=uy537r82tTzX1+NV/ybruwDcslf1cl8YysuhP0X/usI=;
	b=BiS9D+s5+96FF4kfDQGILBy4RLj3UvNKTPB5k5+VPFJJRa9uVoz9grJLBg9Ey6AU0Q3xkY
	fHbOhoJSAk2JxwGHz8UbRILwvtH/vjEkNmu4vxKHfWDSGM3Ifu3tQyz20J3HVJQhc0EyZz
	bSjrQ5sClZlb7unzKX+bG0TcefUJeKc=
X-MC-Unique: saU999qPNm2r2pxzOVrQ7g-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=C/rh9PXHh2l2MH9UOnHeLPzXA09WEfh+rWeKKY+aQPFZV5S04jhsOPtaA67635spVWjV+vI9Ix0GC5qmgkS+weciQcfpAhA8wsK0vEPzrRcRjUi0N6s/GBPts6V1KUN+Qr1SbY8m6wG/WyB2ulCp+1qYd+Pm9Z/leBDZ4mWlslmTQ0dv3O9+uI/ck5aeLTg+dnleAzosId1CXhs5nZ8mSPJKGbbCh7kLFXM1BnIuh9diB3A5FaSeyk79rCDkXTekdxvuLNU/pp3qYq88t4kq35MTVXB7pcya/+j5uV5orSOdesCC3hY9CZcwUAfPYCKeUb777Ez/5KPpwznKFC7FOg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=uy537r82tTzX1+NV/ybruwDcslf1cl8YysuhP0X/usI=;
 b=hSJZbMmCpbzUtAVaQA2roUVo1g8IlwXiHWrXQg6CXZT7ggFDYiT794lq8Zr5/1mOyehr3yxPxdw7kfK69SU96rnblqTgYgzi+yqVr1ObtRE18A/XCSMCEm1FYM55A8H3Oa874LVonF+SbjUcTw+AeZLqC6hbK84dYOmc9ySNVlMhUHV9oUfZmuRt4U5U5djOnyckTv+XAc2nwtFtc1Ja2nneme4UyS36cCWnaCR123J55cnuW1CE7xGy0cDs3p0sAbEGvxO0P363XOykGCKgd2LT028zwK+Qihi0bVkQeBryX+9gTlDP0YukqiOhZ1xT9UhKJXh6aY5HoCaNq5rEwg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <62510b9c-734e-35dc-8ae6-a780f978c811@suse.com>
Date: Thu, 3 Mar 2022 17:54:44 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [XEN PATCH v9 24/30] build: grab common EFI source files in arch
 specific dir
Content-Language: en-US
To: Anthony PERARD <anthony.perard@citrix.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 xen-devel@lists.xenproject.org
References: <20220125110103.3527686-1-anthony.perard@citrix.com>
 <20220125110103.3527686-25-anthony.perard@citrix.com>
 <3bde2fea-f3fd-3926-b98d-aa0afb549bf8@suse.com>
 <YiDhpSZC1z/duG4q@perard.uk.xensource.com>
 <48c58217-30c6-790f-a058-49b887fc1355@suse.com>
 <YiDxz2QcpzV7NGQ7@perard.uk.xensource.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YiDxz2QcpzV7NGQ7@perard.uk.xensource.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR04CA0041.eurprd04.prod.outlook.com
 (2603:10a6:20b:46a::30) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 94093f1d-2fc2-4b9a-9cce-08d9fd3685af
X-MS-TrafficTypeDiagnostic: VI1PR04MB4397:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB43978B7C59AD31E76CE34573B3049@VI1PR04MB4397.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2906002)(508600001)(6506007)(6512007)(6486002)(7416002)(2616005)(8936002)(26005)(186003)(38100700002)(36756003)(31686004)(86362001)(31696002)(53546011)(316002)(6916009)(5660300002)(54906003)(83380400001)(8676002)(66476007)(66556008)(66946007)(4326008)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?TUxTM2ZXcHJwanh6ajFwQzFQU2JRNzZuMTF4UVdMYzAzRFFvZjdBdUJleHRH?=
 =?utf-8?B?T2pkV1BxQThKb09WaFhlYXl4cTlFajg0bGtBV3pYa1NqOGQ2MVQyVFJhelU5?=
 =?utf-8?B?OC9VZzdGYXpidld4RlNiQXpZZ285bURHVzVIWGpWRVVDa1M4bEtXRkpSSkQ5?=
 =?utf-8?B?Q1FaNWtUQmZUZ09iTFhReGcrZ3RqeWdtUk5yOEFzTHc2UXhxc1pCNEhUcGVP?=
 =?utf-8?B?YWNMM0F2OWZiVnl5NVQ0SEZCdzZRUEk4NEhGWlRReVNteHVmeEJVbWcxR1hr?=
 =?utf-8?B?REs5ZFFDQzQwNk90TU8zdTNQSmlVNXBVZ016MFFNU1ZJY0dlRi9aUG9QTzBN?=
 =?utf-8?B?SkhuaTJuRUZzMStWOXRQVUQyK2hJTThELzM3UUtNSTZuOEEybzV0amdJSktw?=
 =?utf-8?B?VkJFem45NmRKc1NqMHdYY0hENlJqOGY1Y0pVQitsUlBsNUlRUmVuTzdDYWZ2?=
 =?utf-8?B?Sm0yOWM4dWp1SEVGeTJTeXlCUGRhN0hMWlF6SUwwSUdZZWtVRHg1bG43QTdW?=
 =?utf-8?B?UnVkNUdHc0JwalZWYXVnc1dsbDRPWWtETk5KVnl3TnBkWTdnVWkxWmxVdWlv?=
 =?utf-8?B?eTV3V25VOTl2QWlDRVUzVkZwa1ZGbHdiaWlDMUxCZjJ1TEFXWTFnT0dtQzJP?=
 =?utf-8?B?cW1CMWIwNXc2VVFoMUxJa2o4MXZCOHNXY0luejZ0cFAwN2R6TGxXaWJucFN4?=
 =?utf-8?B?aUpxOTVzZWhkdCsyemFoRG44Zm4yMG4raWdoZ2tQb0kzTlpzWVEzSWdtMVNE?=
 =?utf-8?B?NDJ5OHNpL2hicGsrME1SeEtQOU9QbE1YR2hqdXpIeEo2NTNHZUhZcHV2L1Y3?=
 =?utf-8?B?OXlhZ29HQUtzUHpUR0JPMXdvSFRTRUREeExBSnI5bmwwYmtPdkxENHlYanJ4?=
 =?utf-8?B?L3V0U1lGYTRibnh0a1pkNytaVS80WlN5VmFNdmg1THZEQ1dZKzM4YXJMWkdm?=
 =?utf-8?B?ckdrWXlLSHlPRHlCTDdKbWRnVGhxQkFUN0NIMVl3MFllaDRxdmpMOG1sdVBu?=
 =?utf-8?B?d2pJaFRxN2puRWw0OXplbkRYbmdRZ3RGeGtNZHFENXQ4WWlsWU9QUEJFVnZi?=
 =?utf-8?B?ZGJTVmpveWJSb2VRNldMRWsva09zLzV6MEdaclVBTFNZeHc5aDZaMHF4eml4?=
 =?utf-8?B?US9xZ2xjVWdPTW9zRE1BSnpZN3VqMFZzWno2akFyVlpCY0FKWk5WT1F6cEhR?=
 =?utf-8?B?VlV3NTMxeHZYSVNhQ0pYY2sra1BnRndiWGF1UC9XTWE4VTUxL2FrY1BxWUxP?=
 =?utf-8?B?OHY2bTF5b1ZsUjkrWmJZWFRoSXMyNUI4VEo0ckxCZE5OOHRDdCt0aXViUnIw?=
 =?utf-8?B?d2RndlgrK1FWMEs5OUdVZ0tBcjllQUJzdmlkbzg1WmFNK2pVOG92eGtHRi9v?=
 =?utf-8?B?b05TRC9YZC9Xd2dQUC80QWU2RDdqaFJTSVNEK3hndVVVZ3RuK2RKNmFWYUVK?=
 =?utf-8?B?M0lLWStENkNHSTRKSmd2bXFCQVVGN1VVNTRsQWdvcGhHaHZmR2c4bzNFQlRH?=
 =?utf-8?B?QlBjQW9JcXZmZzBid2ZYTGJIN1BzRFNMYWZLN2xJRThjYUhsSHVrUnRpWlRL?=
 =?utf-8?B?NWwzVTkwVUM2bXpPNnpoemxUMXA4dU9jc1l5K2hXUXY4b2NvMGJ5aWgzMGt2?=
 =?utf-8?B?blh5Q3huT0J5bTdPWjRhdWcyK2t4Z29YUXJTTlgwYUhBSDl0TTY2UG5waHZR?=
 =?utf-8?B?NldKRFhYTHhKUENoc2p6L2NWR3ZCM0Y3eHpkYTRSaUtXSVkzNEk0Z09qTDFK?=
 =?utf-8?B?OGxLNndlN1cwTzd3TWdRdHlLM1d1VzVkS2lHOHFkeXVyYjBTRis0MUZLVmhU?=
 =?utf-8?B?bUppbkxMTW5LaU0xN1Q4YU1kb3NKcmxCUGdqWFIwUVlnOEEzT0tWU3Vva0hs?=
 =?utf-8?B?TitlUzMxYmtKRlZUN3hhSk1EUnpLZThpa1FwWHpKTVlpNzUvUmdtSEQ1dzZF?=
 =?utf-8?B?Nm1qakE2a0RuNlNuNGs5eUVkR09CRTAyWEJUelFhU2U5NGtCWVkrczJWeVVH?=
 =?utf-8?B?TW1QS0RxZ1dReTgxVVJBWlRmSDlmcGFMM1dEOUI0TFlVRFJjZ1NoWE9DcWdF?=
 =?utf-8?B?OXZpN1VNcnpINExLWXp4UnFVZUdLdGt6U2tQL1ZqN1hnQzJBTnQ0UDI1S3Vh?=
 =?utf-8?B?b1oycENmaUg5UFd3dWN2MGF0cXVMekxrVlJKa0dEKytTZmt3NnA0Sk10YmF1?=
 =?utf-8?Q?F//0IQO3keItbxgG9wihztw=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 94093f1d-2fc2-4b9a-9cce-08d9fd3685af
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 16:54:46.3981
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: EQJh2wzg2x7lcd4rs7BAXpngzsly2deeoSMkJgHC//+kzY/n7CtBFH99Gce7Jtj++GeoZVY5vSd1DppePB1XoQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB4397

On 03.03.2022 17:50, Anthony PERARD wrote:
> On Thu, Mar 03, 2022 at 05:01:07PM +0100, Jan Beulich wrote:
>> On 03.03.2022 16:41, Anthony PERARD wrote:
>>> On Thu, Mar 03, 2022 at 11:37:08AM +0100, Jan Beulich wrote:
>>>> On 25.01.2022 12:00, Anthony PERARD wrote:
>>>>> +# Part of the command line transforms $(obj) in to a relative reverted path.
>>>>> +# e.g.: It transforms "dir/foo/bar" into successively
>>>>> +#       "dir foo bar", ".. .. ..", "../../.."
>>>>> +$(obj)/%.c: $(srctree)/common/efi/%.c FORCE
>>>>> +	$(Q)ln -nfs $(subst $(space),/,$(patsubst %,..,$(subst /, ,$(obj))))/common/efi/$(<F) $@
>>>>
>>>> What is the "reverted" about in the comment? Also (nit) I think you want
>>>> s/in to/into/.
>>>
>>> I've tried to described in the single word that the result is a relative
>>> path that goes in the opposite direction to the original relative path.
>>> Instead of going down, it goes up the hierarchy of directories.
>>> Maybe "reversed" would be better? Do you have other suggestion?
>>
>> I'd simply omit the word. In case you're fine with that, I'd be happy
>> to adjust while committing.
> 
> I think that would sound kind of strange. $(obj) is already a relative
> path. It would probably be better to just drop the end of the sentence
> in that case. With the example showing what is happening, that would
> probably be enough. The sentence would then be:
> 
>     # Part of the command line transforms $(obj).
>     # e.g.: It transforms "dir/foo/bar" into successively
>     #       "dir foo bar", ".. .. ..", "../../.."

Fine with me. Then:
Acked-by: Jan Beulich <jbeulich@suse.com>

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 17:14:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 17:14:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283612.482690 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPp1z-0001dr-Se; Thu, 03 Mar 2022 17:14:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283612.482690; Thu, 03 Mar 2022 17:14:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPp1z-0001dk-Pa; Thu, 03 Mar 2022 17:14:23 +0000
Received: by outflank-mailman (input) for mailman id 283612;
 Thu, 03 Mar 2022 17:14:23 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=7nUi=TO=gmail.com=this.is.a0lson@srs-se1.protection.inumbo.net>)
 id 1nPp1y-0001de-RG
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 17:14:22 +0000
Received: from mail-qk1-x72e.google.com (mail-qk1-x72e.google.com
 [2607:f8b0:4864:20::72e])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 5cca1409-9b15-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 18:14:20 +0100 (CET)
Received: by mail-qk1-x72e.google.com with SMTP id g24so4417970qkl.3
 for <xen-devel@lists.xenproject.org>; Thu, 03 Mar 2022 09:14:20 -0800 (PST)
Received: from development (c-73-166-253-254.hsd1.tx.comcast.net.
 [73.166.253.254]) by smtp.gmail.com with ESMTPSA id
 g2-20020a37e202000000b00607e264a208sm1284711qki.40.2022.03.03.09.14.17
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Thu, 03 Mar 2022 09:14:18 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5cca1409-9b15-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=message-id:subject:from:to:cc:date:in-reply-to:references
         :user-agent:mime-version:content-transfer-encoding;
        bh=r3j8kd/nS/vCxqwkAj6LyrvAJ8Ze30ZAvwyjGjkhz4k=;
        b=Tv8DKjIjWUzJeur6akOrdF5+rpQEOA4jMSOzpxSb9NO8QmAnlfBNG5FHEOHPHaYYU1
         n/UPi4FHfZYqlIrZZ3BWpQn0h8v6/SxzncVI9JdVusJLrTHcUb/ZoxG8Epkgu0phs+Cd
         jUMHPSNmoXDW8SbZOuCuDCnVOVy3P0v3ISArid9mGUWbEiPkSLA43Q0mwlYFBCsLmTug
         3v5zeWQgh/N4E8veWcgs9zzZguKxlAUQzCVUc4hALrbGXu/EynCZzSz6tlkzayexmtjm
         PUzA0yZuI9Sr+17ChpedrCdrdCkN/Pq+1mszYzQhF9GUBqyX+X19LNimhdnh4+aHTkOb
         aBRg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:message-id:subject:from:to:cc:date:in-reply-to
         :references:user-agent:mime-version:content-transfer-encoding;
        bh=r3j8kd/nS/vCxqwkAj6LyrvAJ8Ze30ZAvwyjGjkhz4k=;
        b=kI/VzU2iaD8HmEM2AkkLtqv2b8fAzX3tm9w9qJXjlu7+J+cNq9Nb+BjkFFyEinUx3C
         SmOESsqQrQyg3Psj+UhmS2kHlx/gvf3S0ddyYhSAhZ2pAXkP14KE3Mnr8X/GjOc7cVlK
         hUlo7iiQohFK0N5LltsSsJQv41U3bJqBKyl8wH/c61sglLATKnUy5v7v1Ck374laN/3i
         0wVLcoUF1lo8FlpMEUTv8ysm7zdZcCJJ69JkZwGnbvH4qLa3HR70SHC9kylLzvi+AuHQ
         rWOSeUznOXQBYa023v8Rpj7V7n5Utv6w5HT6cgmvgU10rm7wDsXuh5a8Acdz2BgUS9gA
         s3Cw==
X-Gm-Message-State: AOAM532XF5gBPsZBeAM7Pith2JVQjetoxIgC/QRePEhLMl3/46sHRFUr
	UO+CWZWzS+JFNmedYNiY9Nw=
X-Google-Smtp-Source: ABdhPJxdQhAkJhNcmGuazrt1a8B/mTDv0jCqfHaONZeVjuJuNkaE8OFK1RGe6rDm0hndINjQzL0vNw==
X-Received: by 2002:a37:9a4c:0:b0:47e:157b:a80c with SMTP id c73-20020a379a4c000000b0047e157ba80cmr152367qke.114.1646327659035;
        Thu, 03 Mar 2022 09:14:19 -0800 (PST)
Message-ID: <8a1fc9175a1227e8f7271face85e5a38671e0891.camel@gmail.com>
Subject: Re: [PATCH 3/3] hvm/pirq: allow control domains usage of
 PHYSDEVOP_{un,}map_pirq
From: Alex Olson <this.is.a0lson@gmail.com>
To: Jan Beulich <jbeulich@suse.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>, Roger
	Pau Monne <roger.pau@citrix.com>, xen-devel@lists.xenproject.org
Date: Thu, 03 Mar 2022 11:14:17 -0600
In-Reply-To: <c416bfc2-218a-e641-5fd7-505ea4f7a322@suse.com>
References: <20220303103057.49181-1-roger.pau@citrix.com>
	 <20220303103057.49181-4-roger.pau@citrix.com>
	 <9a02db6a23b269fe774ad4a0bc4c662e5e4df37c.camel@gmail.com>
	 <c416bfc2-218a-e641-5fd7-505ea4f7a322@suse.com>
Content-Type: text/plain; charset="UTF-8"
User-Agent: Evolution 3.36.5-0ubuntu1 
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit

I wasn't sure of the distinction between hardware domain and control domain for these commands, but they appear to be blocked at the moment when dom0 executes them, including a lot at boot.  Are you suggesting to use is_hardware_domain(currd) instead in my diff?    

Or should the hardware domain always be able to execute any physdev op command? (such as to bypass the switch statement entirely)


It looks like hvm_physdev_op() is the only real caller of do_physdev_op(), and  several other commands (besides the ones in the diff below) are also being blocked by the default case of hvm_physdev_op.

PHYSDEVOP_pirq_eoi_gmfn_v2
PHYSDEVOP_pirq_eoi_gmfn_v1
PHYSDEVOP_IRQ_UNMASK_NOTIFY // legacy?
PHYSDEVOP_apic_read
PHYSDEVOP_apic_write
PHYSDEVOP_alloc_irq_vector
PHYSDEVOP_set_iopl
PHYSDEVOP_set_iobitmap
PHYSDEVOP_restore_msi
PHYSDEVOP_restore_msi_ext
PHYSDEVOP_setup_gsi
PHYSDEVOP_get_free_pirq
PHYSDEVOP_dbgp_op

Thanks

-Alex

On Thu, 2022-03-03 at 17:47 +0100, Jan Beulich wrote:
> On 03.03.2022 17:45, Alex Olson wrote:
> > --- a/xen/arch/x86/hvm/hypercall.c
> > +++ b/xen/arch/x86/hvm/hypercall.c
> > @@ -84,6 +84,17 @@ static long hvm_physdev_op(int cmd,
> > XEN_GUEST_HANDLE_PARAM(void) arg)
> >  
> >      switch ( cmd )
> >      {
> > +
> > +    case PHYSDEVOP_manage_pci_add:
> > +    case PHYSDEVOP_manage_pci_remove:
> > +    case PHYSDEVOP_pci_device_add:
> > +    case PHYSDEVOP_pci_device_remove:
> > +    case PHYSDEVOP_manage_pci_add_ext:
> > +    case PHYSDEVOP_prepare_msix:
> > +    case PHYSDEVOP_release_msix:
> > +        if ( is_control_domain(currd) )
> > +            break;
> 
> These are all operations which I think are purposefully permitted to
> be invoked by the hardware domain only. That's where all the devices
> live when they're not passed through to guests.
> 
> Jan
> 



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 17:46:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 17:46:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283623.482707 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPpWu-0005b1-FZ; Thu, 03 Mar 2022 17:46:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283623.482707; Thu, 03 Mar 2022 17:46:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPpWu-0005au-CL; Thu, 03 Mar 2022 17:46:20 +0000
Received: by outflank-mailman (input) for mailman id 283623;
 Thu, 03 Mar 2022 17:46:19 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=++p5=TO=citrix.com=prvs=054f29298=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nPpWt-0005ao-Ag
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 17:46:19 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d2d42c10-9b19-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 18:46:17 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d2d42c10-9b19-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646329577;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=8NNA2/HnDrpSNL2kd9Xw+OQFNJHgTF2mg+aIJd9s4BI=;
  b=cb2PfiB5IAHN83WeLujtegpy4BPwT8P05thjOI/OffjStfcjIl70BPT9
   bGbgNUfX80RuW86YFdLR4FGFEOj3RPH2C9TSzt3f4//kzLv+/h9zkCa4P
   y4xAVn1I1IS2K88VVtNZ8FdB7rV/LjxJ1/yXj+NcjUJa+YM2vjjCx/QTS
   E=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65410882
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:FnQ5yap+UQUee0IKSt1+o7EtxdZeBmIDZRIvgKrLsJaIsI4StFCzt
 garIBmDO6mCZGbyedglaNu09R8GuJ6GmNcyQAZkqCgwHysV8ZuZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 Yiq+aUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBPfHp28MiTwlkCgpHHfMfwIbmGin8vpnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVI5DfVF/s5B7vERL3H/4Rw1zYsnMFeW/3ZY
 qL1bBIxMUiZO00fYD/7DroFnOaNvmL+bgFAh2+euqwO+nGI9RZYhe2F3N39JYXRGJQ9clyjj
 n3C13T0BFcdLtP34SqI9Degi/HCmQv/WZkOD/uo+/hymlqRy2cPThoMWjOTo/O0l0q/UNJ3M
 FEP92wlqq1ayaCwZoCjBVvi+ifC50NCHYoLewEn1O2T4qmIxkW+OXQUcidqUfx47fcPZAd7l
 VDcyrsFGgdTmLGSTHuc8JKdojWzJTUZIAc+WMMUcecWy4K9+d9u13ojWv4mSffo1YOtRVkc1
 hjX9HBWulkFsSIcO0xXF3jjiinkmJXGRxVdCu7/DjP8tVMRiGJIiuWVBbnnARRocd7xorqp5
 iFsdy2iAAYmV8vleMulGrhlIV1Rz6zZWAAweHY2d3Xbyxyj+mS4Yadb6yxkKUFiP64sIGG1P
 hWP518Av8AOZRNGiJObharrUazGKoC6SLzYug38NIISMvCdiifdlM2RWaJg9z+0yxV9+U3OE
 ZyabdytHR4n5VdPl1KLqxMm+eZznEgWnDqLLbiilkjP+ePHNBa9FOdUWHPTP7tRxP7V/23oH
 yN3apLiJ+N3C7alPEE6MOc7cDg3EJTMLcuu+pwPK7XaeVIO9aNII6a5/I7NsrdNxsx9vuzJ4
 mu8Sglfzl/+jmfAMgKEdjZob7aHYHq1hShnVcDwFT5EA0QeXLs=
IronPort-HdrOrdr: A9a23:RAgcva/g0bi2I1FDUDJuk+F2db1zdoMgy1knxilNoENuHfBwxv
 rDoB1E73LJYW4qKQwdcdDpAtjkfZtFnaQFrrX5To3SIDUO31HYYr2KjLGSjwEIfheRygcz79
 YYT0ETMqySMbE+t7eB3ODaKadg/DDkytHRuQ629R4EJmsKC52IrT0JcTpzencGHzWubqBJcK
 Z0k/A3wQZIDk5nCfhTaEN1PdTrlpnurtbLcBQGDxko5E2lljWz8oP3FBCew1M3Ty5P6a1Kyx
 mEryXJooGY992rwB7V0GHeq75MnsH699dFDMuQzuAINzTXjBqybogJYczAgNl1mpDs1L8Zqq
 iJn/4SBbU115oXRBDynfLZ4Xik7N/p0Q669bbXuwq6nSWzfkNENyMIv/MmTvKe0Tt7gDg06t
 M644rS3aAnfC/ojWDz4cPFWAptkVfxqX0+kfQLh3gaSocGbqRNxLZvt3+9Pa1wVR4S0rpXWN
 WGzfuskMp+YBefdTTUr2NvyNujUjA6GQqHWFELvoiQ3yJNlH50wkMEzIhH901wua4VWt1B/a
 DJI65onLZBQosfar98Hv4IRY+yBnbWSRzBPWqOKRDsFb0BOXjKt5nriY9Frt2CadgN1t8/iZ
 7BWFRXuSo7fF/vE9SH2NlR/hXEUAyGLELQIwFllu9EU5HHNcjW2He4OSMTeuOb0oAiPvE=
X-IronPort-AV: E=Sophos;i="5.90,151,1643691600"; 
   d="scan'208";a="65410882"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=nLFNJdP60SuDcRXqw9vXCUcb71gd9Nq8PiTC52r6VfSBtqyUEBCA8QCcoPu7VYUfcJ7iAxZloIfaAucKNfBZ4NtX/NhDJN8+2gce725F7eF06MT/Tvq9Ns/TO3gzHqdyWVDM5bnuv+aM0NuejN9wjQNQE2G/4OHB5FMZzUQCIzldbD1VxArxqoSlru1gTmuJ2FCKX6nA2IdkU9e45txAiOzY4VnpQzMcFS1hQ2qUDaVDUeoLsz/Zgg2AR8NQPrYBE7GwY7/peWYzu3L2rg5gNmcSl9+vrK6K981Sq4cIvb99uTlqi00+NHHsWuVa4qoK5XsMx5MM5e9iSte7I0ci2g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=8NNA2/HnDrpSNL2kd9Xw+OQFNJHgTF2mg+aIJd9s4BI=;
 b=UJk5g73RGPt8UMqbcTVxs8TCVkPcj8WsI8qvoHxlMVoCyxSqUi4BnuwE29yyF2ElMvvmvvJpM2Aip1ljg4eUKAi+/cjy3BcqiGWNB1Ne/hKeHQyBTMbCKoFjmSOe7Sktw7I8Hi0xX/SR5LmZe1v+z8NyTC1+liEdfqCDuRKUxVl+yFZA79j4oV2/kX1k2/qGHfTflVRnbAB4DvEir0tFINKWOhrE5p2O0ocDmqgclbT5udI4B4IW/TQzSreszUDInnYPk8OKyELUjZeIWY5WzduI48o67245m+kbZ2buUokNpJrZk5FbaEEgzAZV3QaFzEg6rTsKirBZ1cZ2gRPDcA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=8NNA2/HnDrpSNL2kd9Xw+OQFNJHgTF2mg+aIJd9s4BI=;
 b=hSrPdqPxYFsrI6qaUhqMem1r0jkPGy84Uwonfou+AQ6kD3x8et5nutRQ5Yx5HXSh1/lqTOB/b/81sot4GAsI55lm7wm7by01sBJbrS4s5kmcFkw+jVP1PqTUWCZumqfd55+7luKHdH51ua4yd9UIwtYOcfc4sTbaAuuAcoqM8mU=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Wei Liu <wl@xen.org>, Roger Pau Monne <roger.pau@citrix.com>
Subject: Re: [PATCH] x86emul: correct a few scalar insn comments
Thread-Topic: [PATCH] x86emul: correct a few scalar insn comments
Thread-Index: AQHYLx9NcKmJ2+QPIU6wbVv1gzF9Nqyt7twA
Date: Thu, 3 Mar 2022 17:46:05 +0000
Message-ID: <9a5fd411-3bca-6b14-3870-13a73e948499@citrix.com>
References: <33562be6-3ebc-1d97-10e3-f0066daa4a53@suse.com>
In-Reply-To: <33562be6-3ebc-1d97-10e3-f0066daa4a53@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: a5b0baf6-d20f-4c22-0225-08d9fd3db106
x-ms-traffictypediagnostic: BL1PR03MB6166:EE_
x-microsoft-antispam-prvs: <BL1PR03MB616603DE145D1AC0C1703605BA049@BL1PR03MB6166.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(54906003)(71200400001)(110136005)(53546011)(8936002)(38070700005)(2906002)(6512007)(508600001)(82960400001)(2616005)(316002)(38100700002)(122000001)(64756008)(66476007)(36756003)(66556008)(66946007)(66446008)(5660300002)(6486002)(91956017)(558084003)(26005)(76116006)(186003)(86362001)(31686004)(8676002)(31696002)(6506007)(4326008)(107886003)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?OTdXcCtpZ1NWZDJpMURjbzcrZXY5K2VIWVhhLzhpQWFRWlZuY1ljYm5ieFBm?=
 =?utf-8?B?Mmp2aktMbnhPaUZCLy9ENzR1RHM2YnR5RXAvM1VHK3JIcUQveFV1SzloUjZH?=
 =?utf-8?B?bmt2T0J4aWszVS9VbmZqYmthcTE4U1NNcWdZV2VsVW8vRGJDcDczQnM5Mmtr?=
 =?utf-8?B?T1A5MmtLTUt4TUFRbzdzUGFiQUp6SG9XbVZpSWp0U3VvcFZzR0twQjZFK1ZU?=
 =?utf-8?B?YlBiV0FzZ0daeUFvRnNZQmZsTlAyREpydnlpVlBpNWIrY3F3bGVtQStmb1Rn?=
 =?utf-8?B?TEt2M1EvWDFlK1BrQzRKeFBBK1FpckVwczhyR1BkUmdjTXh6ZWxIMW83U1M3?=
 =?utf-8?B?aEwzdXZVSkVmRkN2Y0ZGMjdiamJING1FeGVpOEx4SDFjeEtnQWtDZGdoMnNw?=
 =?utf-8?B?eVRMWkRVbDNMUWZjN0Q5RzVvYjZHaElnSkU5c05TUDNBd0pwcXk1cFpsbjZW?=
 =?utf-8?B?NDhhdDd2TDBNdG0rQzNBY1FjSHFxeTh0QlVGK1N1dm1JdEk4ZmxSazhOSmxW?=
 =?utf-8?B?SEt5cG4yaUw0QTJRQTdqRFZ2OHo2bWxSUC9xQVhTTjQza0xSVHZ6WU1ZSGgy?=
 =?utf-8?B?YlZabDFGelZWZDl5a2loVHdqd0J3VDF0RDR0R0JSZkdsRm9pQzB2LzlWOVp2?=
 =?utf-8?B?dWI0WWhLbUZGbGM2YXVnMTd3Qnp1YkZaS0dqejM5cTZDc1NyZkpLTFliZkli?=
 =?utf-8?B?cUxUb1dhZ0NsOHUwTExQc2ltTllZc0FNT1h1ZGFaNnBsTWlUblROSlo3Z2tn?=
 =?utf-8?B?eUsvc2RiQk5VL05LYXVsZmVjak5weWQ4VEgyVGg5am5HMFkvMEdVN3J2V3Vr?=
 =?utf-8?B?NVBEcVNNbzBkS0MxMkw4cXJVUkd3ejNQSnVkcHJoZDZjY1Yyc0pkUTNyOG1t?=
 =?utf-8?B?L2VPNjJqUmthcDB5M04vVUtlYUpYaC9GaUZzNjUzeDBudWRnaCtPSEdVL0ZU?=
 =?utf-8?B?bGRzakxhMzNvaks1bUFxUm5UNTlHZmxLakMxYjQ5VGV1YXdwVUs4NzJJUVhi?=
 =?utf-8?B?QTJJYVR3N2oyN1NUQUpyQkoyWFpaeWlIaWdrV204cittY3lTOHhUWHpCMWU1?=
 =?utf-8?B?cjJNR3kwdE9wRldNRkE3WDlmUUJYLzYyZmw2S08raHQ3Wm9oUGhvUTg4TWpE?=
 =?utf-8?B?cHR2UjZ4S1BUWGh6VDJzODVDS0NMRGRIVVgyaXpEZlVPYk5CZFVyT25Qdksr?=
 =?utf-8?B?dHBQUjJTczNIc3hETnVWc2xXK2M3bWl0MCtsMlM4S3dKWHloTkFrNGRveTVy?=
 =?utf-8?B?ZnNBeGdYVUlsNnVjVkhTYXNZdTcrajM1OTB2MGRQTEJ1d1RzWTJWU3E2ZUwy?=
 =?utf-8?B?eUh5bHNyZ2s0ZkxiTzhBenJTcjQzeEZKVDV5a3JGZm1qTys3cnc4YjYwV0FP?=
 =?utf-8?B?Wnk1RmdYcldTK3hNbCsycStmU0FLNTFpU040cTcvN2FISnpwNEVKSnNWVEQr?=
 =?utf-8?B?bmhLVFpJQkllL1BHUlpoUjQvSmtuNHhQUDdWWU1pWmVhVU1ONjdlb015Q1kx?=
 =?utf-8?B?YWZCSVVZc0NwWXVxUHg5VFRyNlc0eVVIbjBtWnp6MDlrYXFFMjhHSU9xcXFE?=
 =?utf-8?B?VGtHMElJWUFWbGkxYWFaaDlHMXQ2a1ZnYktFSzc0RVgxZTArenliMWZqWDNp?=
 =?utf-8?B?QU5jNG5ONHhOTTRWNm0xYkxMQ09UbGZSY1p0RFUvcTJLVWRXZmFUcnZZZWpV?=
 =?utf-8?B?WW5hSGc3dnRmRzNqdXh2b2RQZzV4WGNNeDNUYytrZmIzRytBTXVpWVFocUsw?=
 =?utf-8?B?dkpNZ2ZtSWVVRjJHbTRzTWk3aHcxcWhXd1RRVjNVaWhNaEhnWVU0bDFEOHlz?=
 =?utf-8?B?a2Z0UnZUbm9ua3JmK2Rwa0ROblZ2QzBGWUI3Vno3ZDhIZUsyTi9Qb0dWVy9w?=
 =?utf-8?B?RzVLQkFQRUhUcXBMY21NOTdzN2Y4Sk9UdXE4UjRyVG5qRHYvd2VxUU10TjRF?=
 =?utf-8?B?ZEVOc2tEQ211dnY4dGZaSDFYa256bUlHVmhKWkJQaUZGTUxXYWtvVnlsdUpz?=
 =?utf-8?B?TTVnYUxUa3llSnlSUkJ2bms5a2YxY0tuWElzMG5QZVVHOXZXcTN6SW9aSkNn?=
 =?utf-8?B?ekxWZ3pDcHQ1ZkorY0JvNnIzQ3lNTlZKaFZYaXVuVnhiaDRBbWhjRjczVDlC?=
 =?utf-8?B?cUZ0ZzlYT3VMNWo0OFBGU215dWllVjVlR2JkT2JUTDZvdms4bUFzRUJxMzFx?=
 =?utf-8?B?ZlJ1K1pId2xtLzBmLzlYanVsZU4ra0lXVDNMTnZRbFY1b1MySGRLSnNvVlcx?=
 =?utf-8?B?eXJ5bmt0Q2p6bE95Q0dtUUl6a0lnPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <CD368C0DDC5EE74497DC96A27D50918F@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a5b0baf6-d20f-4c22-0225-08d9fd3db106
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Mar 2022 17:46:05.3491
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: JQqZVX0W9njHzrlC7C5NLwvmsJ9vG5RP3AdSJXc//XLL3yAyYnTAEOijxnt+cf93c5wq9Ivu6Fi9wWysAN3KtHwgkftrzUUveC+AT+2DbsU=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL1PR03MB6166
X-OriginatorOrg: citrix.com

T24gMDMvMDMvMjAyMiAxNjo1MiwgSmFuIEJldWxpY2ggd3JvdGU6DQo+IFRydWx5IHNjYWxhciBp
bnNucyAoaS5lLiBub3QgVkJST0FEQ0FTVFN7UyxEfSkgb25seSBldmVyeSBhY3Qgb24NCj4gJXht
bTxOPi4gQWRqdXN0IGNvbW1lbnRzIGFjY29yZGluZ2x5Lg0KPg0KPiBTaWduZWQtb2ZmLWJ5OiBK
YW4gQmV1bGljaCA8amJldWxpY2hAc3VzZS5jb20+DQoNCkFja2VkLWJ5OiBBbmRyZXcgQ29vcGVy
IDxhbmRyZXcuY29vcGVyM0BjaXRyaXguY29tPg0K


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 17:46:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 17:46:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283629.482719 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPpXP-00067I-Rj; Thu, 03 Mar 2022 17:46:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283629.482719; Thu, 03 Mar 2022 17:46:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPpXP-00067B-Oo; Thu, 03 Mar 2022 17:46:51 +0000
Received: by outflank-mailman (input) for mailman id 283629;
 Thu, 03 Mar 2022 17:46:50 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=++p5=TO=citrix.com=prvs=054f29298=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nPpXN-0005ao-Ud
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 17:46:50 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id e5d025f3-9b19-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 18:46:48 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e5d025f3-9b19-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646329608;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=XibGu+aVXAa3CGuxBM08YOJYXeDisc8JWpDeRjKligo=;
  b=Rvc2K8zW6mXX0RTvPRo18dbHJhwYGJUwCTgdYB4DuwPfiGtCbEYe2NS7
   TiQDxycFxfHSSNCpECVfM1MFv74eG/zoYoBOW2x25SvMHoa+n11LCrH0X
   vr3qqMZTZzkdY8QssbsWyQZOIMTpcIjeUXJXPFd+JxEBFliOVNiiOUxGT
   c=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67746965
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:HEAitqoKm1BY76xG8/CpFofx77ReBmIAZRIvgKrLsJaIsI4StFCzt
 garIBnQOaqDZGP0KNBwboi3pEIGvZPdy99rSwNqqSBmEixEpZuZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 Yiq+aUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBP4Dcwr8USUhjASB3FPV+2ZznD3ilmJnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVI5DfVF/s5B7vERL3H/4Rw1zYsnMFeW/3ZY
 qL1bBIxM0ucPUwRZz/7DrocmcCEmmfjTAcDg3eegvcQ+zfL7RNIhe2F3N39JYXRGJQ9clyjj
 n3C13T0BFcdLtP34SqI9Degi/HCmQv/WZkOD/uo+/hymlqRy2cPThoMWjOTo/O0l0q/UNJ3M
 FEP92wlqq1ayaCwZoCjBVvi+ifC50NCHYoLewEn1O2T4qv581zCD3JVdSxAYfV+jO4VZRIqz
 HbcyrsFGgdTmLGSTHuc8JKdojWzJTUZIAc+WMMUcecWy4K9+d9u13ojWv4mSffo1YOtRVkc1
 hjX9HBWulkFsSIcO0xXF3jjiinkmJXGRxVdCu7/DjP8tVMRiGJIiuWVBbnnARRocd7xorqp5
 iFsdy2iAAYmV8vleMulGrhlIV1Rz6zZWAAweHY2d3Xbyxyj+mS4Yadb6yxkKUFiP64sIGG1P
 hWP518Av8AOZRNGiJObharrUazGKoC6SLzYug38NIISMvCdiifdlM2RWaJg9z+0yxV9+U3OE
 ZyabdytHR4n5VdPl1KLqxMm+eZznEgWnDqLLbiilkjP+ePHNBa9FOdUWHPTP7tRxP7V/23oH
 yN3apLiJ+N3C7alPEE6MOc7cDg3EJTMLcuu+pwPK7XaeVIO9aNII6a5/I7NsrdNxsx9vuzJ4
 mu8Sglfzl/+jmfAMgKEdjZob7aHYHq1hShT0fAEVbpw50UeXA==
IronPort-HdrOrdr: A9a23:Zja966Byde7zGtvlHegMsceALOsnbusQ8zAXPh9KJyC9I/b2qy
 nxppgmPEfP+UossHFJo6HlBEEZKUmsu6KdkrNhQotKOzOW+VdATbsSorcKpgeAJ8SQzJ8k6U
 4NSdkdNDS0NykGsS+Y2nj5Lz9D+qj9zEnAv463pB0BLXAIV0gj1XYCNu/yKDwteOAsP+tfKH
 Po3Ls/m9PWQwVwUi3UPAhhY8Hz4/nw0L72ax8PABAqrCOUiymz1bL8Gx+Emj8DTjJm294ZgC
 v4uj28wp/mn+Cwyxfa2WOWxY9RgsHdxtxKA9HJotQJKw/rlh2jaO1aKv+/VXEO0aSSAWQR4Z
 7xSiQbToJOArTqDziISC7Wqk3dOfAVmiffIBGj8CDeSIfCNUwH4oJ69PNkm13imhcdVZhHod
 F2NyjyjesmMTrQ2Cv6/NTGTBdsiw69pmcji/caizhFXZIZc6I5l/1UwKp5KuZJIMvB0vFtLA
 CuNrCq2N9GNVeBK3zJtGhmx9KhGnw1AxedW0AH/siYySJfknx1x1YRgJV3pAZNyLstD51fo+
 jUOKVhk79DCscQcKJmHe8EBc+6EHbETx7AOH+bZV7nCKYEMXTQrIOf2sR52Mi6PJgTiJcikp
 XIV11V8WY0ZkL1EMWLmIZG9xjcKV/NFAgFCvsukaSRloeMMYYDaxfzOmzGu/HQ18kiPg==
X-IronPort-AV: E=Sophos;i="5.90,151,1643691600"; 
   d="scan'208";a="67746965"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=R6WZZRXKLrjVTSmcYuJZRVy85ktsMHF37nZvanrR+8UJCq+1F8ampcOXsO+QUKxmiSJ0H+zBMkmqD3G5ZQ5S6wzlqDjA4W8QgKNWsvSjTydsrowYR4razWLZhjWRYMeoxHvBs/utI1Le8+G0IMduqAKM342H0WwzXp6HqWxqiXmJzlxt+oanUHkLzk5a89ie25Y6JDV5XpUJkCSdrkTW8Dy0U4D/r2O/ThnM2h3agZeVgZoKaW9F+820/9Bs2wfHPwmVZxFmRA/15gvGwGhUunjqvibPeo2S4leKXbyE6r3RpRA42a1zYQa6b1iWlN8UStCa/we3eHxZ/Dr2o5j3EQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=XibGu+aVXAa3CGuxBM08YOJYXeDisc8JWpDeRjKligo=;
 b=a4iVa0JeuFvxXiDYAN86u30I5cJzYAGOyVCtwL8Tz0YyeVYXhi6tJwC85J3zVRxZuNxIlCv/TKoNiXU0irUyzThG2i49n22tLHfR3MVrNuCmeSyyPfJ5gXVKCubXGh8T8zQNG96YlGmSbiXq9rmGKa/9Iv050gK33/aGgxvTeGwuipkooZXENDvyEt66ahYICeNtaAjas/MSvLsfEHN32m/G37aNMgwITBKVOKvxEKgbfSLCOiqMAOJlvuBqLApgpDiw/o6E5kpa8DVioXhUNcIg9xLmreG7Zf1pjlN12cbgldYtPJGQyhuxwQTjsN3sOH2TeeeU9O780zSMgj8oPA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=XibGu+aVXAa3CGuxBM08YOJYXeDisc8JWpDeRjKligo=;
 b=a8y/0zgBfaD4zrLuiPni05URgAQXxnfWj5a1gPbnwLK0cB9xBQZO67jHU+EFgvPneRlY0u1Wd9pV3Ua7wLUHcGqMjZU1mKP2BNKtsGTwSwu2coxHkv+e/AduLNVNU1FDNcwsU8JEoloTnT0YuUDztPPgUx+V/DJDcYUZ0V7nseU=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Wei Liu <wl@xen.org>, Roger Pau Monne <roger.pau@citrix.com>
Subject: Re: [PATCH] x86emul/test: correct VRNDSCALES{S,D} entries in
 predicates test
Thread-Topic: [PATCH] x86emul/test: correct VRNDSCALES{S,D} entries in
 predicates test
Thread-Index: AQHYLx8cMa+nj/uGO0ySb0ph57D/GKyt7wmA
Date: Thu, 3 Mar 2022 17:46:41 +0000
Message-ID: <a41cac82-c027-8e89-8d6f-96500cc08909@citrix.com>
References: <832ca068-5316-b4eb-60ee-aeff009ef1cc@suse.com>
In-Reply-To: <832ca068-5316-b4eb-60ee-aeff009ef1cc@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 9d908532-6ddb-4bd8-d7ee-08d9fd3dc68d
x-ms-traffictypediagnostic: BYAPR03MB3687:EE_
x-microsoft-antispam-prvs: <BYAPR03MB3687939A622379F018496A16BA049@BYAPR03MB3687.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(82960400001)(122000001)(26005)(186003)(107886003)(5660300002)(38100700002)(36756003)(558084003)(2906002)(31686004)(8936002)(66946007)(508600001)(91956017)(66556008)(31696002)(71200400001)(86362001)(6486002)(66476007)(6512007)(53546011)(2616005)(38070700005)(64756008)(66446008)(316002)(4326008)(8676002)(76116006)(54906003)(110136005)(6506007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?ejAxa2Y1c3BoYXZ1Tk1INmpLWGFZbjU1UXhuN1dCa3crNk5pdEU1S0ZhK2gy?=
 =?utf-8?B?RFZSREZ2OFpsbUhOaUtJdFlJYzU4V2poQldTZlJEUmFPMVdKV0hNZ2JjQkVX?=
 =?utf-8?B?YUZySEhoS1RlMllqcjY5Z2JvekhDODJScDBOcUIwQ3U2Z1ExVy9mWEFRMTUy?=
 =?utf-8?B?YVd5T280OFZBd2IwTU9DQW9wTTB6Yk92U1ZjT0kyVEl0Y3Q3QXpsTkFKZTdv?=
 =?utf-8?B?b1hCQllsVElhekFySXQ2cGQzSmZ2UWs0VkI2aWJCUGZDa2pMSm5keFdSUHNZ?=
 =?utf-8?B?UGY4NFVsc3BNRnlIUWVPVHVVTkNxRno5ZGQ5dGVIWGFTUytCblRZd0lpdXlG?=
 =?utf-8?B?MjdtdkkyRlV2MlBKRUpwOTBzVEJZWFhjVHRveEM0Ny9NUjZVSTBhQkF6L3po?=
 =?utf-8?B?cG5SVnpFT1RadWZUdnorWHlRZTZqWlY1MWluUThydmg4dmNLNlFKT1YwUWlq?=
 =?utf-8?B?K2xkWU1xejdKSzA1MjU3RjJrNk5VenRnTmN5VW9reGlXM3l3T0lxMWx4aVg0?=
 =?utf-8?B?aXlBTmJzdHYrK0dnK0ZhNTNzSnJ5ZURRUUlGSVdxMURmVFJJbUdPSjdIcEFT?=
 =?utf-8?B?RUVtRVNkYVgzeE80RG5acDllRXo0c2kwd1NKdjM0ZnpkRFcyYU9SSEtOQ3dK?=
 =?utf-8?B?emR3bEdHblNCRWlxczlBNE16Z0d6Q1RSOFNlWWZEMVltalJvc2FMcGVUTmRu?=
 =?utf-8?B?ZVNteGlsUmJXOUMydFJyb3Q5dlQzVGtXYkF2MWVMUFRjOERTQWFEc1NyQmRw?=
 =?utf-8?B?V2dNcS9DSHFsMjhWdCtsV2dTZVdYc1JVd0pseUFjajl3aUV2SkNiM1Z6VkV3?=
 =?utf-8?B?L0dFZWhpaEd1MXB4LzJFRHZQMW1EeHFKYUo1TUhlbzA1MnpFRHVYQWlUd0Y3?=
 =?utf-8?B?Y2RIR014VExxcmpvS2YxcU00WUY3OTVXcGZHaFdjNzRDbVJvY0NqZ0xXSWlr?=
 =?utf-8?B?ZEI0WjRWTUxWbFE3RU9zY1pDMDB4eDVoZUxNdkFpTWtNUzRhWHRUbjBFWjJY?=
 =?utf-8?B?N0phSHg3VlYrTTRCZUJHSzE4bmsyRWdqNldZZ0VZamllRUo0c3BCcTczbG5E?=
 =?utf-8?B?cWpKeWhkQTZQelA0UXRLYTJCckE4aktDdTA1aTQvNE4xL1hBVmNQUW8zVTBy?=
 =?utf-8?B?d095aStFbHRyMTVpVHBZVFRrME8rSkRMcXovaVBBT2lBS1RVNVpQY0UzZDJs?=
 =?utf-8?B?T01TMWZKb0xDRlZGdUphMTJ4MWRMc2xPdG5DSHZIaEgyVFJBdU9WVjVBUUV2?=
 =?utf-8?B?elNsL3JOMHIxZVpYejhqMGlTUjdUeC8rR0krNFhuOUpUQTdUTTBRVUF3R0cw?=
 =?utf-8?B?bElNTDc5Mm9SRTBkVmh0ek5XRFJXNnRGVDF6ZzE4ZXdCYXJGOXp0ZmlnQ1pS?=
 =?utf-8?B?OXV1UHJMY295dHFVZHVhNTJtRS9zTnBGeTJCZUFJVnk2aGI5WDdGYk1kOHpo?=
 =?utf-8?B?RE9XOHVXa1F5U3hET2ZsWmVuTkdNdGtGZzZxU2VwNGJHWGJ5OGppblRrSnh6?=
 =?utf-8?B?WXlvbW1tYTJWYVhOaTUxd1RrZlFKa0MySGMyTnNTMG4xNk90NEhtRFd6eEFC?=
 =?utf-8?B?cDllZTFJY2VGVGF1UmIwL3FibFVxclV0Y1ppUUt1dUhGUFhqVTQ5di9XTERC?=
 =?utf-8?B?eEhjRU9aYUdoNkt5dnpxKzh0ZkxETEorOExvSjdyT1VOWnVESWxndndycmpx?=
 =?utf-8?B?NGFBajdndFVGbHFPQzh1eDl6eUhCcHk4WitST21ESVk1aE5sa0JPT254Y2Zh?=
 =?utf-8?B?MFl2WGNNdTVObzB3cC9FWTlZQ2N6Tnh6YXl6aW1tRDE1dU1tcmhYcTA0aG12?=
 =?utf-8?B?MUEzZlZXYkdDOTVMM01mV1cvdlFGaVM1NWZQSDB0cDFZQXd1aWJDMVl0Q3lI?=
 =?utf-8?B?ek0xTWQ4b09sak1ybGRVNUc1Nm5LV0w2V0RXRkF0WEVUL29zb1EzbFl5VkQr?=
 =?utf-8?B?UXBxcm5Eb25SaTJOMVZwcXpQNmFEc1hCMHRNSndNeDQxRC9zNmNMeS9pcis3?=
 =?utf-8?B?Mkp0endKZi9NTzVjRTdXeGVyczJvbXVzUWV0R2M4T1FBdXUxNE8wald3b1Z2?=
 =?utf-8?B?NllKZXhGTDNmUWVIdnNKTEF4Z1l3QzdFRC9tV1dOUXZoTGVkVHNJUzZrMm1R?=
 =?utf-8?B?MXRDM29QbXJrdndZYjE5cjhaaW1ja1JLYXZGUHk5MlQ3VUxicFZQdVhLakhq?=
 =?utf-8?B?eHJVVGE0UGlCeUlvRkdJS3dNRUhVT1h0SDh3c0lKVlBZbGdTRXptZmxKWExN?=
 =?utf-8?B?NnFMZ0F4MFBGcjRuWHplZ2JMT2l3PT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <EEB767A101B55F4F90A399A4837759D9@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 9d908532-6ddb-4bd8-d7ee-08d9fd3dc68d
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Mar 2022 17:46:41.4715
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: KBueFHCEVI6cH8vEWRvFKJGRqEmjcL4L9WWHP7sR8vdlngb1K8xJJbALRGI/jXUxRuXGvum4dNWyQW88/KtbM5L44qwaPMj715ZoW6BGUfQ=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB3687
X-OriginatorOrg: citrix.com

T24gMDMvMDMvMjAyMiAxNjo0OCwgSmFuIEJldWxpY2ggd3JvdGU6DQo+IFdoaWxlIGJlbmlnbiAo
YmVjYXVzZSBvbmx5IHRoZSBkZWNvZGVyIGlzIGV4ZXJjaXNlZCBoZXJlLCB3aGVyZWFzIGENCj4g
d3JvbmcgRVZFWC5XIHdvdWxkIGNhdXNlIGFuIGV4Y2VwdGlvbiBvbmx5IGR1cmluZyBhY3R1YWwg
ZW11bGF0aW9uKSwNCj4gbGV0J3Mgc3RpbGwgaGF2ZSBjb3JyZWN0IGluZm9ybWF0aW9uIGluIHRo
ZSB0YWJsZSBlbnRyaWVzLg0KPg0KPiBTaWduZWQtb2ZmLWJ5OiBKYW4gQmV1bGljaCA8amJldWxp
Y2hAc3VzZS5jb20+DQoNCkFja2VkLWJ5OiBBbmRyZXcgQ29vcGVyIDxhbmRyZXcuY29vcGVyM0Bj
aXRyaXguY29tPg0K


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 18:08:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 18:08:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283640.482730 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPpsb-0000ab-MS; Thu, 03 Mar 2022 18:08:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283640.482730; Thu, 03 Mar 2022 18:08:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPpsb-0000aU-In; Thu, 03 Mar 2022 18:08:45 +0000
Received: by outflank-mailman (input) for mailman id 283640;
 Thu, 03 Mar 2022 18:08:44 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Qm5B=TO=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nPpsa-0000aO-H3
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 18:08:44 +0000
Received: from mail-lf1-x133.google.com (mail-lf1-x133.google.com
 [2a00:1450:4864:20::133])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f63a7844-9b1c-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 19:08:43 +0100 (CET)
Received: by mail-lf1-x133.google.com with SMTP id d23so9885698lfv.13
 for <xen-devel@lists.xenproject.org>; Thu, 03 Mar 2022 10:08:43 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f63a7844-9b1c-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc:content-transfer-encoding;
        bh=AV7uV4xMmN+TSgc8GU8aakHFWZOXbF9YXVjEQ7J9qWU=;
        b=j8KU9M8kWuio4g9Wejs9GOi+2nXp7j8le3aNllYW3cgnnQyLD2CLCZzgGM/vIuLD07
         0Fdb/ZvOvSE4uLwnYiRY1WmLx1s6N/zeiGCarkv9lq7mZ93JvBcqjcaVM9jahLhucWfL
         swlq8M8UbhrcTvbd+C1e6DXUj3RBsyxlJc0NeH9+gJJZnnDmaWHGYX/54tKtLynowCgd
         DXfwZKQ84KVJYQAyjoeA26t+HbxLqDKanlWG+9DGMepQNXYA2jAX/Y3g2ZE3UuBgN3AG
         4BVzveEROCgMOVasOAxiGjnn85u7pgyhaPpTRrwE/DUHyB6Cid5kv2SNWasOLcs2vWSu
         JSDA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc:content-transfer-encoding;
        bh=AV7uV4xMmN+TSgc8GU8aakHFWZOXbF9YXVjEQ7J9qWU=;
        b=K4jol6xYqSasFtBVSjCyCr3arvoteWlOLdkagXEi3EyTG+tIFDiFpC3by6ABBt+VZN
         bwnlLjY+uXoqibyfwkMx1PXKy1Q/xnPGVvl1C52G/eIKoQCUEwIyGQa13Xt7DLugwXy5
         YSKQYbisYWJT2H6NBCMhyoL6pCbd0x32NmvrC+3vdlWNzjsm0iXuTnwJXYseE6XOdK3p
         RYYXkrZK0o6F9KJ/TeZCALLMI38Q7FQHUf4G2M6tnFs6/wMNm027kFBKsfD1aUrTI97J
         TPMW3jNo00WYUObSLf6+mE5q9MR78luUUpxty6JYKOg2yVtPaSX/2Tc1wb83xnMzLuZe
         hc5w==
X-Gm-Message-State: AOAM531++ClthvU5fwyBzmjPv4ZAHnreuzrjvNa4sTcFGd/Jhgpib46b
	P3MA+bXSjv+6Fe/nIdyjGd58RLmscWNkf2WfkLQ=
X-Google-Smtp-Source: ABdhPJy6abb65hcirHEm+qBcOgNMNFA6FNvqjHGZCuQGVpk01qVoqWQgw1TeVXTls6L+XUBnBPeY7AYOt7WPv2PRJUE=
X-Received: by 2002:ac2:5234:0:b0:436:e6a8:edbb with SMTP id
 i20-20020ac25234000000b00436e6a8edbbmr21798334lfl.406.1646330922816; Thu, 03
 Mar 2022 10:08:42 -0800 (PST)
MIME-Version: 1.0
References: <DB7PR03MB50027EE92E11BFFF71AADC4598049@DB7PR03MB5002.eurprd03.prod.outlook.com>
 <92827eec-b6e9-9c95-8f9e-fcf063d45090@santannapisa.it> <YiDt7fX92n6Luc2l@Air-de-Roger>
In-Reply-To: <YiDt7fX92n6Luc2l@Air-de-Roger>
From: Jason Andryuk <jandryuk@gmail.com>
Date: Thu, 3 Mar 2022 13:08:31 -0500
Message-ID: <CAKf6xpsnmQG7-LXn5+Uz4mncWsN0EZ8wpagY8f8OydvZNb6g5A@mail.gmail.com>
Subject: Re: Network driver domain broken
To: =?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>
Cc: Andrea Stevanato <andrea.stevanato@santannapisa.it>, 
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "wl@xen.org" <wl@xen.org>, 
	Anthony PERARD <anthony.perard@citrix.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Thu, Mar 3, 2022 at 11:34 AM Roger Pau Monn=C3=A9 <roger.pau@citrix.com>=
 wrote:
>
> On Thu, Mar 03, 2022 at 05:01:23PM +0100, Andrea Stevanato wrote:
> > On 03/03/2022 15:54, Andrea Stevanato wrote:
> > > Hi all,
> > >
> > > according to the conversation that I had with royger, aa67b97ed34  br=
oke the driver domain support.
> > >
> > > What I'm trying to do is to setup networking between guests using dri=
ver domain. Therefore, the guest (driver) has been started with the followi=
ng cfg.
> > >
> > > name    =3D "guest0"
> > > kernel  =3D "/media/sd-mmcblk0p1/Image"
> > > ramdisk =3D "/media/sd-mmcblk0p1/rootfs.cpio.gz"
> > > extra   =3D "console=3Dhvc0 rdinit=3D/sbin/init root=3D/dev/ram0"
> > > memory  =3D 1024 vcpus   =3D 2
> > > driver_domain =3D 1
> > >
> > > On guest0 I created the bridge, assigned a static IP and started the =
udhcpd on xenbr0 interface.
> > > While the second guest has been started with the following cfg:
> > >
> > > name    =3D "guest1"
> > > kernel  =3D "/media/sd-mmcblk0p1/Image"
> > > ramdisk =3D "/media/sd-mmcblk0p1/rootfs.cpio.gz"
> > > extra   =3D "console=3Dhvc0 rdinit=3D/sbin/init root=3D/dev/ram0"
> > > memory  =3D 1024 vcpus   =3D 2
> > > vcpus   =3D 2
> > > vif =3D [ 'bridge=3Dxenbr0, backend=3Dguest0' ]
> > >
> > > Follows the result of strace xl devd:
> > >
> > > # strace xl devd
> > > execve("/usr/sbin/xl", ["xl", "devd"], 0xffffdf0420c8 /* 13 vars */) =
=3D 0

> > > ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41b40) =3D -1 EPERM=
 (Operation not permitted)
> > > write(2, "libxl: ", 7libxl: )                  =3D 7
> > > write(2, "error: ", 7error: )                  =3D 7
> > > write(2, "libxl_utils.c:820:libxl_cpu_bitm"..., 87libxl_utils.c:820:l=
ibxl_cpu_bitmap_alloc: failed to retrieve the maximum number of cpus) =3D 8=
7
> > > write(2, "\n", 1
> > > )                       =3D 1
> > > clone(child_stack=3DNULL, flags=3DCLONE_CHILD_CLEARTID|CLONE_CHILD_SE=
TTID|SIGCHLD, child_tidptr=3D0xffff9ee7a0e0) =3D 814
> > > wait4(814, [{WIFEXITED(s) && WEXITSTATUS(s) =3D=3D 0}], 0, NULL) =3D =
814
> > > --- SIGCHLD {si_signo=3DSIGCHLD, si_code=3DCLD_EXITED, si_pid=3D814, =
si_uid=3D0, si_status=3D0, si_utime=3D2, si_stime=3D2} ---

xl devd is daemonizing, but strace is only following the first
process.  Use `strace xl devd -F` to prevent the daemonizing (or
`strace -f xl devd` to follow children).

> > > close(6)                                =3D 0
> > > close(5)                                =3D 0
> > > munmap(0xffff9f45f000, 4096)            =3D 0
> > > close(7)                                =3D 0
> > > close(10)                               =3D 0
> > > close(9)                                =3D 0
> > > close(8)                                =3D 0
> > > close(11)                               =3D 0
> > > close(3)                                =3D 0
> > > close(4)                                =3D 0
> > > exit_group(0)                           =3D ?
> > > +++ exited with 0 +++
> > >
> > > royger told me that it is a BUG and not an issue with my setup. There=
fore here I am.
>
> Just a bit more context: AFAICT the calls to libxl_cpu_bitmap_alloc in
> parse_global_config will prevent xl from being usable on anything
> different than the control domain (due to sysctl only available to
> privileged domains). This is an issue for 'xl devd', as it won't
> start anymore.

These look non-fatal at first glance?

Regards,
Jason


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 18:10:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 18:10:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283647.482741 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPpuQ-0001xT-30; Thu, 03 Mar 2022 18:10:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283647.482741; Thu, 03 Mar 2022 18:10:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPpuP-0001xM-Vi; Thu, 03 Mar 2022 18:10:37 +0000
Received: by outflank-mailman (input) for mailman id 283647;
 Thu, 03 Mar 2022 18:10:37 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Qm5B=TO=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nPpuP-0001x5-2o
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 18:10:37 +0000
Received: from mail-lf1-x12d.google.com (mail-lf1-x12d.google.com
 [2a00:1450:4864:20::12d])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 3964a05b-9b1d-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 19:10:36 +0100 (CET)
Received: by mail-lf1-x12d.google.com with SMTP id j15so9895691lfe.11
 for <xen-devel@lists.xenproject.org>; Thu, 03 Mar 2022 10:10:36 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3964a05b-9b1d-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=1CqBs+YUxF44l3nieZcK8Q9lRd9kbywBwBSvMkAlOFo=;
        b=NTzW5I4+W9Il/Avwninx4chD/uORuqrK7rVqtechFDye8t9tbQcdHVTwhjZRDeUuVS
         WfVzCIpgH9XuHVRwwrpISRgjmhIAV8j47brbtj2me38y1vrBsF3EF2uIrmCHXSeVyQqy
         JOFP85DOhiw82s79UxUZqQtgqItVwMxaMS5p+8rMz5fLjWNKJCXWPUBQXLSAa8GUeJd5
         j9r9MQ8URBpk94AcLLWJNbtH/KeMYPKo2exDou2r4EuHr3UqwfGx9twdNt/DaOkvcrx/
         ZZw3/41BDrwQ76SBzTITtJrYXHTnVAnsecVHKfC+/M8xSEPTYC91LAWgfwFKyRb0GN2V
         +M5Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=1CqBs+YUxF44l3nieZcK8Q9lRd9kbywBwBSvMkAlOFo=;
        b=6aAbvlQPBBjRnS0eg1cC/CzIIxGB8pFJ5hUJTtlVVAIySU4dYTMeklQwZP77fbsQBr
         aqmUVGvgI/oQIZo2tXO3tUWGXIF3g/zaISJgDkdFky/w4Pe7ITIeyeCNHthUCVzR9koz
         rELDP91RITo8ITd/T4Jxh/SmW3EyK5wVRz3enk5GIpPS3NGnQc8g9XkNhNa0eRO1wLci
         cIR6b14ts74WYXssbSlfIKuQvkDjAxMWXub5+uuc498QhI0WpzRsD8K7nQwaB/5OesJ6
         QqyU+Z9KxjRru5ZDqaPpBC+EzMRPN9sd5yNsx7ohq9UPikG8/NUrk+3681ugmvhtr5Rx
         mgXw==
X-Gm-Message-State: AOAM533MEmThHQdpPSkbi2pO/H0hIYqJO4FVXEK1w1UXUeyXNyr3C90u
	KcrR1GJNduM4lwsi9kw8q/ipAWAiFjCB2AVrf9MK9oqe
X-Google-Smtp-Source: ABdhPJxh7hQ66xbUam3Bwpl4lZRI47OnC/HlWH4jvAikAas0UOlmRtyLDW0TKUjWPELtlDqEQAl85/uKfLyPUoX3w/o=
X-Received: by 2002:ac2:4855:0:b0:443:888e:5982 with SMTP id
 21-20020ac24855000000b00443888e5982mr21903031lfy.447.1646331035882; Thu, 03
 Mar 2022 10:10:35 -0800 (PST)
MIME-Version: 1.0
References: <osstest-168340-mainreport@xen.org>
In-Reply-To: <osstest-168340-mainreport@xen.org>
From: Jason Andryuk <jandryuk@gmail.com>
Date: Thu, 3 Mar 2022 13:10:24 -0500
Message-ID: <CAKf6xpuq7D8dUZz43CoH1-J_cK8TDyVFrUpM4V_AJycUZXfmkQ@mail.gmail.com>
Subject: Re: [ovmf test] 168340: regressions - FAIL
To: osstest service owner <osstest-admin@xenproject.org>
Cc: xen-devel <xen-devel@lists.xenproject.org>
Content-Type: text/plain; charset="UTF-8"

On Wed, Mar 2, 2022 at 12:57 PM osstest service owner
<osstest-admin@xenproject.org> wrote:
>
> flight 168340 ovmf real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/168340/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
>  build-amd64                   6 xen-build                fail REGR. vs. 168254
>  build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
>  build-i386                    6 xen-build                fail REGR. vs. 168254
>  build-i386-xsm                6 xen-build                fail REGR. vs. 168254
>

> commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
> Author: Jason <yun.lou@intel.com>
> Date:   Mon Jan 10 22:30:29 2022 +0800
>
>     BaseTools: Upgrade the version of NASM tool
>
>     REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
>
>     Upgrade the version of NASM tool to avoid compilation errors when
>     compiling NASM code change.

...

> commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
> Author: Jason <yun.lou@intel.com>
> Date:   Mon Jan 10 22:05:47 2022 +0800
>
>     MdePkg: Remove the macro definitions regarding Opcode.
>
>     REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
>
>     Remove the macro definitions regarding Opcode because new version of
>     NASM tool(e.g. v2.15.05) supports the corresponding instructions.
>     Note: This patch need to be merged after other NASM code change to avoid
>     compilation errors.

Looks like OVMF now expects NASM v2.15.05.

-Jason


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 18:53:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 18:53:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283682.482770 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPqZJ-0007nI-OC; Thu, 03 Mar 2022 18:52:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283682.482770; Thu, 03 Mar 2022 18:52:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPqZJ-0007nB-KV; Thu, 03 Mar 2022 18:52:53 +0000
Received: by outflank-mailman (input) for mailman id 283682;
 Thu, 03 Mar 2022 18:52:51 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPqZH-0007n1-FP; Thu, 03 Mar 2022 18:52:51 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPqZH-0003o7-Di; Thu, 03 Mar 2022 18:52:51 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPqZG-00005i-Vc; Thu, 03 Mar 2022 18:52:51 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPqZG-0007Gd-V8; Thu, 03 Mar 2022 18:52:50 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Htit0+xzXaWDziKQG3QNzZXGToLzlC7KTgJxYx5wADw=; b=6TeKWNsR8c/Xwoeb9bMQTxnaRZ
	QjL6sqU6ekqAjtMStugxf3xkhk+BfS68c3snd95x63FOHFPKw7hKm23v817FfZgaKSmxRvOUSgR6G
	2j+t7Pd7WEUvkDasv63PI2GztQhS3+BGzpn/vSfVRnzUHrnfo1bdThADMFjnNLtTj5jo=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168374-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168374: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=3e56754b08871ccceff856ff634731b9b9bccbbe
X-Osstest-Versions-That:
    xen=4b7fd8153ddfe95d6d427ff241abb6fdf37e027b
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 03 Mar 2022 18:52:50 +0000

flight 168374 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168374/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  3e56754b08871ccceff856ff634731b9b9bccbbe
baseline version:
 xen                  4b7fd8153ddfe95d6d427ff241abb6fdf37e027b

Last test of basis   168331  2022-03-02 09:00:26 Z    1 days
Testing same since   168374  2022-03-03 14:00:31 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   4b7fd8153d..3e56754b08  3e56754b08871ccceff856ff634731b9b9bccbbe -> smoke


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 19:08:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 19:08:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283693.482781 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPqnt-0001Ic-30; Thu, 03 Mar 2022 19:07:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283693.482781; Thu, 03 Mar 2022 19:07:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPqns-0001IV-V7; Thu, 03 Mar 2022 19:07:56 +0000
Received: by outflank-mailman (input) for mailman id 283693;
 Thu, 03 Mar 2022 19:07:56 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ibyA=TO=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nPqnr-0001IN-6P
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 19:07:56 +0000
Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com
 [205.220.165.32]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 392430b3-9b25-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 20:07:52 +0100 (CET)
Received: from pps.filterd (m0246627.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 223IOAVd031661; 
 Thu, 3 Mar 2022 19:06:58 GMT
Received: from userp3020.oracle.com (userp3020.oracle.com [156.151.31.79])
 by mx0b-00069f02.pphosted.com with ESMTP id 3eh14c1wwq-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Thu, 03 Mar 2022 19:06:58 +0000
Received: from pps.filterd (userp3020.oracle.com [127.0.0.1])
 by userp3020.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 223J1RPP123285;
 Thu, 3 Mar 2022 19:06:57 GMT
Received: from nam04-dm6-obe.outbound.protection.outlook.com
 (mail-dm6nam08lp2044.outbound.protection.outlook.com [104.47.73.44])
 by userp3020.oracle.com with ESMTP id 3efdnt9gt8-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Thu, 03 Mar 2022 19:06:57 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
 by BL0PR10MB2801.namprd10.prod.outlook.com (2603:10b6:208:74::11)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Thu, 3 Mar
 2022 19:06:55 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::6d20:6694:a16:56f7]) by BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::6d20:6694:a16:56f7%3]) with mapi id 15.20.5038.015; Thu, 3 Mar 2022
 19:06:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 392430b3-9b25-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=P8oNb7HfKhhqHimy8j5x9hz0CtdsioYwtGSC7OY68zo=;
 b=adzYkNLyJutENI9rww6Nyi4orTX2wSCUSnmxtFHplMRDUc0n3pMBPUyPDQnRLGLA7UPI
 r+AqHa/cvmj9fNEEugp12NsdDoU5cnU6AFWwjfLDzaNUz74TBDF4DtArLo7LItR13hBh
 6Y/N4FMMOIRPOIH7DoHjE1b6sNIVXD1S9XCIrSUuJvMiK4SsSGPja5LDAcT2/me78DIw
 3/S0vxkUWzwB8cThIr/rHRG0CnsiXpGKe3YvhqD0k/dLiSxhbgNmYLBNgHKYzyn9YC95
 X6UcpuvsBNLw/xSCajXjgCwzGAKpiG+pBfaS7z2hwBSfO7Il8UZ901vE0Q/kNugD8L9J yQ== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=K/DpUfdaXG1df0EIv4jmbU+ai9oEr5D2pSGUtVjZ+g9V9Jgc4JYDXKk3zqrGA2KLOXIxdMT/faMrN7EZFJFoKKe0GVUbrP0QMSryvA+29DkGWfcWg80z7INaD+muMc7i0P7p2fNE0loiMsdwqkm9bA1NoecmwKAr/+9hCPNZbEG14Ii5AZxyEabHZIL51ikWEY/dmhcxJXhv9QvJVPUwZ9t50B8r0qPrHmTF4LNyRCv6NqlxhoSNdLFxi9331SlWno/FUttinKq3ggkpvyxA3uJUjY8UFpMZGHEWkNTqpL+iXzo7kOYeUfP3oYshu3gltnyJytKsnStia1nHdFMGnQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=P8oNb7HfKhhqHimy8j5x9hz0CtdsioYwtGSC7OY68zo=;
 b=XDCJmReIClkImh3vIKD79uLIVF1B65WoTPDbq4yIgBSKk1nyReLI0KHAsaM8f+pRtqGMgUESlJ5Z+1L4DMcY51mJzoRtKhi1F9rWtEAjclRDZGj+G527hFqj8BW7dnHgwR6f8pN7TLPthlfJw4pmtJwSR+lwcd5QApu5ryYLKjrR5PGG40M4btaB5I171Qov67dGMBTn4OUziJ0cBlYo5qcPOnXHvKedxaeQB1NxMx8lVkWaoZCeQaD5B8KIufOZEy3R4YqA0DtoaHjziTFvHPOhVR5hbY2GAkl2+5iVRkmGT9FYOyvanZZYCo05jzoBDtcS3TwNWbsyq2c40OqyaQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=P8oNb7HfKhhqHimy8j5x9hz0CtdsioYwtGSC7OY68zo=;
 b=Af0i/ypcPBm8/2wgHg/C/xTlIyxa0CLiuTNWNLQDtrNRBGGi4BnRFwIm0DLZSaST7eFV3cILIjuwEoSqDIj/4GeNphY8uEfofCx+YVn7lT/mp/HeEdG6Dfb1mX0okGYT9mxmJAMGJwSYNnTYdxzhzE1lMYe5GBJ5VkrdMDjPK5U=
Message-ID: <588b2378-cac4-79cb-e520-a535422cd04f@oracle.com>
Date: Thu, 3 Mar 2022 14:06:45 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH 11/12] swiotlb: merge swiotlb-xen initialization into
 swiotlb
Content-Language: en-US
To: Christoph Hellwig <hch@lst.de>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
        iommu@lists.linux-foundation.org, x86@kernel.org,
        Anshuman Khandual <anshuman.khandual@arm.com>,
        Tom Lendacky <thomas.lendacky@amd.com>,
        Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
        Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
        David Woodhouse <dwmw2@infradead.org>,
        Lu Baolu <baolu.lu@linux.intel.com>,
        Robin Murphy <robin.murphy@arm.com>,
        linux-arm-kernel@lists.infradead.org, xen-devel@lists.xenproject.org,
        linux-ia64@vger.kernel.org, linux-mips@vger.kernel.org,
        linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org,
        linux-s390@vger.kernel.org, linux-hyperv@vger.kernel.org,
        tboot-devel@lists.sourceforge.net, linux-pci@vger.kernel.org
References: <20220301105311.885699-1-hch@lst.de>
 <20220301105311.885699-12-hch@lst.de>
 <alpine.DEB.2.22.394.2203011720150.3261@ubuntu-linux-20-04-desktop>
 <ca748512-12bb-7d75-13f1-8d5ec9703e26@oracle.com>
 <20220303105714.GB15103@lst.de>
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
In-Reply-To: <20220303105714.GB15103@lst.de>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: BYAPR02CA0048.namprd02.prod.outlook.com
 (2603:10b6:a03:54::25) To BLAPR10MB5009.namprd10.prod.outlook.com
 (2603:10b6:208:321::10)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 95efbe20-0874-42e5-dc4d-08d9fd48fb9a
X-MS-TrafficTypeDiagnostic: BL0PR10MB2801:EE_
X-Microsoft-Antispam-PRVS: 
	<BL0PR10MB2801D4987DE53ACEC6E93EF58A049@BL0PR10MB2801.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BLAPR10MB5009.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(36756003)(66476007)(38100700002)(2906002)(86362001)(31696002)(6486002)(26005)(186003)(2616005)(508600001)(53546011)(31686004)(6512007)(6506007)(6666004)(8676002)(6916009)(7416002)(44832011)(8936002)(4326008)(66556008)(5660300002)(83380400001)(316002)(66946007)(54906003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?UUVZclYwZlkwWURhWEIvUUZPMXhXa0d2bUhQY1d0Rk94em1tcnAySWhDZk5W?=
 =?utf-8?B?QXpxSzg2YWRuRkR5RFFSV2xCbTFhRlVVaFNRVDJ0ZCtGTGZycU5DK05zT0o1?=
 =?utf-8?B?S0JTZlhzcUV3dkJHWERBaXV5ek1xdmt1M2ZaZzV4YnZ0bGFMUVhiaFJQREM3?=
 =?utf-8?B?Y1lFR1YwbzR2dFE0a2o2U0RDUTR4ZjdsVkVsSkZGL1BiVmlCR1lNNlA0YVRF?=
 =?utf-8?B?VXpnci8weTdSNExVL2taY1IvdHZKazkzN0hEaW5mRTNUSFBZYmROM1h5SDVt?=
 =?utf-8?B?S1BSRkNSbEFQbnk0My9IenBCMFNQMTZVMjUyK2lINzdJVGduYWJqRXE1N1p6?=
 =?utf-8?B?d3RGMnZnVjZCbDhDUUtWRTBYRWhmQ1A1aEk5NEsvMXJHWjJtT2JvS3RVbmdD?=
 =?utf-8?B?QVNZU092c1BUODVITVRpSUJFWWczME13NWJ4Y1RnL2VGVjRSdi9PY3FzMHpv?=
 =?utf-8?B?dWRDZzFQQU9pemM2RXBIZU1wVFRjVmI1bjVMdmJGS0R0dE9RSUVSWW1qSHdB?=
 =?utf-8?B?Z2ozRHhKZnQySUxTWmhBVTExcnc2RUtNeksvNEEzYUZwN3Brc1BRdVFma3Yz?=
 =?utf-8?B?RVNRNkFYSEpLa3ZlZkhVQ3pDOHArakFUWnVMdUVIU2dkUHBLR3p4OWtiSkl4?=
 =?utf-8?B?cHZ0WGZzbDN2Sy9JNEpoQ2U0RkgrSmVmTkkwUjFrTnQyNVMrUUp3T2x3ZXB4?=
 =?utf-8?B?SUQ0UmpYbk1zU3ZJVGxwNTkxTmYvWm1kL0trZ2hWcVp6Vmt6cjduUk52dWlT?=
 =?utf-8?B?VmpldjllRmx1aHBTWnBLaWVHTnV6TGJtNWg1di9NSDAxbERuSkpCdXBYdjVu?=
 =?utf-8?B?bW5WZmlBUTJrSldISG9Jd2dUOUlhNG0wQ2NMK3d1azZ5NktYQ1ZEWlBWdjJo?=
 =?utf-8?B?NDJrOVBNclM4aVk3NUNMbVBUWVZLWWZZVkhaTWdUU3NVSmt4UHJJYnYvWkly?=
 =?utf-8?B?MVhKTytFRU0vV1BCTFZUQk0rVkFtNkVXNzR3VDR6cGh1VjdLMHZSOTRweVQx?=
 =?utf-8?B?MFBwbmdHRXA1QjE2bGphY1BHTW5lODBpZHdFZTFTVTRNV2ZqeEpQQytoY3JW?=
 =?utf-8?B?cUNFckRxZjdCZ2dkSWM5cmFkcWhVSVVObnhyS2dsdis2YUJxc0N2WTlRVmVN?=
 =?utf-8?B?aG1iL2ZxQmRPZE81OEEwV1lYZ1o5Z1RRZTg4enR3VmVNZ3RaNFNQYk5QN0lF?=
 =?utf-8?B?UG5DSkZmTjZxL0swSDZpWFNlYkwvZllIRUExWU9VczBGbWRKQ2NhYmlpazRa?=
 =?utf-8?B?WDh3aUFmaFNCd0JSQ0tiWEdJU3ZRK0RaRHd6a0ZnWWhMRzhKRnA2Q3lvWUJQ?=
 =?utf-8?B?K3h5TEJQMkpFaDc0bXJRUkNERzNncmxYbXRvVHZzWHJuOFlYUTU0ckNrcHZa?=
 =?utf-8?B?WGwzc1QvUXNsREx5MXRldTBuWU5yZVpFTnJVQjBxMHN4aVd1VXFSaDlTNVhK?=
 =?utf-8?B?ZWZxSm5aNlZIamc5S1JSdzk2WFVoOEYzK2VISEtTdEFUbDZLb2ZiSmlaQ0dO?=
 =?utf-8?B?cFBRK2J0RVFxWUNVb3ZvczJBU2FFYnN2SURCMVE4MENBck9VL0F6ZmJZRkF0?=
 =?utf-8?B?T0xOVWN5Y0F5VjNqNW52dkVqa3ZYUCtjWnJPbGF3YS9ta0Y1UjhEQUdiOHN0?=
 =?utf-8?B?YnQ5YUNHOHVKT2pKS09RZk1zSUhaeW9abkg1b0lQSFZOZDRnejNsNHRWUTJH?=
 =?utf-8?B?RzB0Wkw1Mk56cUZHUWVPQzVub2VnQ2VrMW5HcGF4WXJreHgvOWYrMC9SUmpU?=
 =?utf-8?B?SGtYa0k4V2FkVVlmcFhZS1N3Zlc1ZnhwdmQ5RUhqb2dhOEhxS3pJZHlweG9n?=
 =?utf-8?B?bDFVWGlyOHlzbDZ0a0ZpNnNVc1NuOFlpTk1LV3FxbU11TitVTzFXekRnMHg1?=
 =?utf-8?B?L21LWW1uZGlpR1QzU2F1a2gxdVdxM2xMRmtUeXg2MmVZZGw1aC9NSUxUZUxw?=
 =?utf-8?B?djByQlRyZ29HOEFNcnFhQmpxUVJpWVBSWWpsbTVYMStoWWZBd0w3aGp1QUV4?=
 =?utf-8?B?eldvZ2FCbEplcU44WUR3NEcxclp2ZStzVDVMMEE3aS9YMVRXVU5kNTZYR2pl?=
 =?utf-8?B?NTd1NVBMRjk0R1VKZ1p2emovUXlEYm11UDF1OGJkdnNrNFJJWVZLN0RFakV4?=
 =?utf-8?B?QmxBWmFvR1RkQU5QS1l3RmxCenFzVkhYVVhCTkJQTFBGZXJwZXBYTVcrTmd2?=
 =?utf-8?B?UUtVcFBpalhwdy9QbFdacFJwZ1hzQWMwUjBYQ0hBVG9GTUUxa1dOdUxJNVVa?=
 =?utf-8?Q?Y1spidh/YprpH/MPhXXiGsKEk9w5vPQSqwsgvAFAA4=3D?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 95efbe20-0874-42e5-dc4d-08d9fd48fb9a
X-MS-Exchange-CrossTenant-AuthSource: BLAPR10MB5009.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2022 19:06:55.1744
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: /wq2I55WnEWJzPzZPikwGFw10oNM0tIUpqPNREFNUHH8jHRWO+PrJOuABArjfVDgsu9vNK+tjpK11JT0YNvGlmHX1pLDJP/Rp0gfavEZV4o=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR10MB2801
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10275 signatures=686983
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxlogscore=999 bulkscore=0
 adultscore=0 phishscore=0 spamscore=0 suspectscore=0 malwarescore=0
 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1
 engine=8.12.0-2201110000 definitions=main-2203030086
X-Proofpoint-GUID: wMGNRfAWjzQls01j7dcE8rVGfqOA7VHH
X-Proofpoint-ORIG-GUID: wMGNRfAWjzQls01j7dcE8rVGfqOA7VHH


On 3/3/22 5:57 AM, Christoph Hellwig wrote:
> On Wed, Mar 02, 2022 at 08:15:03AM -0500, Boris Ostrovsky wrote:
>> Not for me, I fail to boot with
>>
>> [   52.202000] bnxt_en 0000:31:00.0: swiotlb buffer is full (sz: 256 bytes), total 0 (slots), used 0 (slots)
>>
>> (this is iscsi root so I need the NIC).
>>
>>
>> I bisected it to "x86: remove the IOMMU table infrastructure" but haven't actually looked at the code yet.
> Thanks. Looks like the sizing is going wrong.  Just to confirm, this is
> dom0 on x86 and no special command line options?


Right.


module2 /boot/vmlinuz-5.17.0-rc6swiotlb placeholder root=UUID=dbef1262-8c8a-43db-8055-7d9bec7bece0 ro crashkernel=auto LANG=en_US.UTF-8 rd.luks=0 rd.lvm=0 rd.md=0 rd.dm=0 netroot=iscsi:169.254.0.2:::1:iqn.2015-02.oracle.boot:uefi iscsi_param=node.session.timeo.replacement_timeout=6000 net.ifnames=1 nvme_core.shutdown_timeout=10 ipmi_si.tryacpi=0 ipmi_si.trydmi=0 ipmi_si.trydefaults=0 libiscsi.debug_libiscsi_eh=1  panic=20 nokaslr earlyprintk=xen console=hvc0 loglevel=8 4



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 19:51:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 19:51:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283702.482791 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPrU0-0006wN-F5; Thu, 03 Mar 2022 19:51:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283702.482791; Thu, 03 Mar 2022 19:51:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPrU0-0006wG-By; Thu, 03 Mar 2022 19:51:28 +0000
Received: by outflank-mailman (input) for mailman id 283702;
 Thu, 03 Mar 2022 19:51:27 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nPrTz-0006wA-JR
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 19:51:27 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nPrTz-0004or-Av; Thu, 03 Mar 2022 19:51:27 +0000
Received: from gw1.octic.net ([81.187.162.82] helo=[10.0.1.102])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nPrTz-0003OV-5R; Thu, 03 Mar 2022 19:51:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:Subject:
	From:References:Cc:To:MIME-Version:Date:Message-ID;
	bh=rC4HdGpY6qF32CtQhpopw67qgDTJI8DLQrD0drn/GZs=; b=T4P6JqHefBAmAcYQrvmlD45SZP
	+78c5KBJi/ir86pAor0WKKr0BMU3LzSXhaB1ORm9ApZgQ+m+e7ssbchYsdJ5fYAcxHBDwC5y3FCIB
	abGTtS+yzgOHyOvfLhJbPW9E0ZzFeWQ9BYklrdevyIgzOvUWmPyv1HiAEQ7i6kvxfN5o=;
Message-ID: <d860bbdb-c0ef-d4c4-51aa-b248a858e177@xen.org>
Date: Thu, 3 Mar 2022 19:51:25 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
To: Wei Chen <Wei.Chen@arm.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Stefano Stabellini <sstabellini@kernel.org>
Cc: Bertrand Marquis <Bertrand.Marquis@arm.com>,
 Penny Zheng <Penny.Zheng@arm.com>, Henry Wang <Henry.Wang@arm.com>,
 nd <nd@arm.com>
References: <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <04db7e8b-2f04-41d7-1deb-d8bda3625c04@xen.org>
 <PAXPR08MB7420BF1299A1577B98211C1A9E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <1f0bba54-158b-d171-6f99-0c29e0547f8a@xen.org>
 <PAXPR08MB742067028155B11528C5CCA39E049@PAXPR08MB7420.eurprd08.prod.outlook.com>
From: Julien Grall <julien@xen.org>
Subject: Re: Proposal for Porting Xen to Armv8-R64 - DraftA
In-Reply-To: <PAXPR08MB742067028155B11528C5CCA39E049@PAXPR08MB7420.eurprd08.prod.outlook.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi Wei,

On 03/03/2022 02:06, Wei Chen wrote:
>> -----Original Message-----
>> From: Julien Grall <julien@xen.org>
>> Sent: 2022年3月2日 20:00
>> To: Wei Chen <Wei.Chen@arm.com>; xen-devel@lists.xenproject.org; Stefano
>> Stabellini <sstabellini@kernel.org>
>> Cc: Bertrand Marquis <Bertrand.Marquis@arm.com>; Penny Zheng
>> <Penny.Zheng@arm.com>; Henry Wang <Henry.Wang@arm.com>; nd <nd@arm.com>
>> Subject: Re: Proposal for Porting Xen to Armv8-R64 - DraftA
>>
>>
>>
>> On 01/03/2022 07:51, Wei Chen wrote:
>>> Hi Julien,
>>
>> Hi Wei,
>>
>>>> -----Original Message-----
>>>> From: Julien Grall <julien@xen.org>
>>>> Sent: 2022年2月26日 4:55
>>>> To: Wei Chen <Wei.Chen@arm.com>; xen-devel@lists.xenproject.org;
>> Stefano
>>>> Stabellini <sstabellini@kernel.org>
>>>> Cc: Bertrand Marquis <Bertrand.Marquis@arm.com>; Penny Zheng
>>>> <Penny.Zheng@arm.com>; Henry Wang <Henry.Wang@arm.com>; nd <nd@arm.com>
>>>> Subject: Re: Proposal for Porting Xen to Armv8-R64 - DraftA
>>>>> ### 1.2. Xen Challenges with PMSA Virtualization
>>>>> Xen is PMSA unaware Type-1 Hypervisor, it will need modifications to
>> run
>>>>> with an MPU and host multiple guest OSes.
>>>>>
>>>>> - No MMU at EL2:
>>>>>        - No EL2 Stage 1 address translation
>>>>>            - Xen provides fixed ARM64 virtual memory layout as basis of
>>>> EL2
>>>>>              stage 1 address translation, which is not applicable on
>> MPU
>>>> system,
>>>>>              where there is no virtual addressing. As a result, any
>>>> operation
>>>>>              involving transition from PA to VA, like ioremap, needs
>>>> modification
>>>>>              on MPU system.
>>>>>        - Xen's run-time addresses are the same as the link time
>> addresses.
>>>>>            - Enable PIC (position-independent code) on a real-time
>> target
>>>>>              processor probably very rare.
>>>>
>>>> Aside the assembly boot code and UEFI stub, Xen already runs at the
>> same
>>>> address as it was linked.
>>>>
>>>
>>> But the difference is that, base on MMU, we can use the same link
>> address
>>> for all platforms. But on MPU system, we can't do it in the same way.
>>
>> I agree that we currently use the same link address for all the
>> platforms. But this is also a problem when using MMU because EL2 has a
>> single TTBR.
>>
>> At the moment we are switching page-tables with the MMU which is not
>> safe. Instead we need to turn out the MMU off, switch page-tables and
>> then turn on the MMU. This means we need to have an identity mapping of
>> Xen in the page-tables. Assuming Xen is not relocated, the identity
>> mapping may clash with Xen (or the rest of the virtual address map).
>>
> 
> Is this the same reason we create a dummy reloc section for EFI loader?

The relocations for the EFI loader are necessary because IIRC it is 
running with virt == phys.

But this brings to all sort of problem:

https://lore.kernel.org/all/20171221145521.29526-1-julien.grall@linaro.org/

[...]

>>>
>>> Some callers that want to change a memory's attribute will set them.
>> Something like
>>> ioremap_nocache. I am not sure is this what you had asked : )
>>
>> I am a bit confused. If ioremap_nocache() can change the attribute, then
>> why would ioremap_attr() not be able to do it?
>>
> 
> MMU based iorepmap_xxxx can use a new VA and new PTE to do this. But for
> MPU, we can't do it, except you change the whole MPU region's attribute.
> The reasons are:
> 1. For V8R PMSA, one physical address only be existed one MPU region.
> 2. There's not enough MPU regions for us to split one MPU region to
>     multiple MPU regions (changed pages region and unmodified pages regions).

Ok. I think we should at least check the attributes requested match the 
one in the MPU.

> 
>>>
>>>>
>>>>>                if ( CACHE_ATTR_need_change )
>>>>>                    return NULL;
>>>>>                return (void *)pa;
>>>>>            }
>>>>>            static inline void __iomem *ioremap_nocache(...)
>>>>>            {
>>>>>                return ioremap_attr(start, len, PAGE_HYPERVISOR_NOCACHE);
>>>>>            }
>>>>>            static inline void __iomem *ioremap_cache(...)
>>>>>            {
>>>>>                return ioremap_attr(start, len, PAGE_HYPERVISOR);
>>>>>            }
>>>>>            static inline void __iomem *ioremap_wc(...)
>>>>>            {
>>>>>                return ioremap_attr(start, len, PAGE_HYPERVISOR_WC);
>>>>>            }
>>>>>            void *ioremap(...)
>>>>>            {
>>>>>                return ioremap_attr(pa, len, PAGE_HYPERVISOR_NOCACHE);
>>>>>            }
>>>>>
>>>>>            ```
>>>>>        4. For `alternative`, it depends on `vmap` too.
>>>>
>>>> The only reason we depend on vmap() is because the map the sections
>>>> *text read-only and we enforce WnX. For VMSA, it would be possible to
>>>> avoid vmap() with some rework. I don't know for PMSA.
>>>>
>>>
>>> For PMSA, we still enforce WnX. For your use case, I assume it's
>> alternative.
>>> It still may have some possibility to avoid vmap(). But there may be
>> some
>>> security issues. We had thought to disable MPU -> update xen text ->
>> enable
>>> MPU to copy VMSA alternative's behavior. The problem with this, however,
>>> is that at some point, all memory is RWX. There maybe some security
>> risk. > But because it's in init stage, it probably doesn't matter as much
>> as
>> I thought.
>>
>> For boot code, we need to ensure the code is compliant to the Arm Arm.
>> Other than that, it is OK to have the memory RWX for a short period of
>> time.
>>
>> In fact, when we originally boot Xen, we don't enforce WnX. We will
>> start to enforce when initializing the memory. But there are no blocker
>> to delay it (other than writing the code :)).
> 
> Ah, ok, it seems we still can implement alternative on MPU system.
> I will update it in new version proposal, but place it in TODO, I don't
> want to include it before single CPU support be merged. Because current
> patch series is huge enough : )

That's fine with me. I am not expecting you to implement everything we 
discussed here from day 1! :)

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 19:54:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 19:54:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283709.482803 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPrWw-0007Y2-UU; Thu, 03 Mar 2022 19:54:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283709.482803; Thu, 03 Mar 2022 19:54:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPrWw-0007Xv-Rf; Thu, 03 Mar 2022 19:54:30 +0000
Received: by outflank-mailman (input) for mailman id 283709;
 Thu, 03 Mar 2022 19:54:29 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nPrWv-0007Xm-1d
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 19:54:29 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nPrWu-0004rL-Qd; Thu, 03 Mar 2022 19:54:28 +0000
Received: from home.octic.net ([81.187.162.82] helo=[10.0.1.102])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nPrWu-0003a3-Kc; Thu, 03 Mar 2022 19:54:28 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=W89jw3aPaZtbNNvF0t08YHwc6rQpENDhdTlLSZ7XM8o=; b=jw4xWKE4WNxGwfkSn8i5QpP10X
	LgRbzJ3xRrH0c9rkZPJ4T/pXoxrhwBwaWcIK/uCzIyCrSj8g0wRtnwKD+IzBdc4XbSrl0X1mdc+Ag
	m7iU1vRtRbJ2nq2Oozda7anloO2VlQmbzN2y131E00EPApipNrl6CBlVamM7CyviQkvI=;
Message-ID: <c1da7841-dbfe-69b0-2572-cf133040d7e0@xen.org>
Date: Thu, 3 Mar 2022 19:54:26 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH v2] xen/arm: gic: Introduce GIC_PRI_{IRQ/IPI}_ALL
To: Michal Orzel <michal.orzel@arm.com>, xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Julien Grall <jgrall@amazon.com>
References: <20220302095911.161259-1-michal.orzel@arm.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220302095911.161259-1-michal.orzel@arm.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 02/03/2022 09:59, Michal Orzel wrote:
> Introduce macros GIC_PRI_IRQ_ALL and GIC_PRI_IPI_ALL to be used in all
> the places where we want to set default priority for all the offsets
> in interrupt priority register. This will improve readability and
> allow to get rid of introducing variables just to store this value.
> 
> Take the opportunity to mark GIC_PRI_{IRQ/IPI} as unsigned values
> to suppress static analyzer warnings as they are used in expressions
> exceeding integer range (shifting into signed bit). Modify also other
> priority related macros to be coherent.
> 
> Signed-off-by: Michal Orzel <michal.orzel@arm.com>
> Acked-by: Julien Grall <jgrall@amazon.com>

I have committed the patch. Thanks!

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 19:58:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 19:58:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283717.482818 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPraz-0008QB-G8; Thu, 03 Mar 2022 19:58:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283717.482818; Thu, 03 Mar 2022 19:58:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPraz-0008Q4-DD; Thu, 03 Mar 2022 19:58:41 +0000
Received: by outflank-mailman (input) for mailman id 283717;
 Thu, 03 Mar 2022 19:58:40 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPray-0008Ps-08; Thu, 03 Mar 2022 19:58:40 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPrax-0004wY-S2; Thu, 03 Mar 2022 19:58:39 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPrax-0002ak-AK; Thu, 03 Mar 2022 19:58:39 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPrax-0005oz-9u; Thu, 03 Mar 2022 19:58:39 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Message-Id:Subject:To;
	bh=iqu1jRfZ+zSLX5klLS+l4RYKAblJMv3/oTNGacSJZiU=; b=ul0NYwwAUmNp0bwYKc9i0z+8KX
	XyCEwXNx3lWpBSvkcA7r7vPCpq6h8Hak+izxeV746YY2VhDMxW6JAZ9MDCAsv0bD3yWQ89v6iYIbe
	bgRDC5c5KpiORT6Oogg0uIn/7/OPYzIEH802yHqvX5TzVz8m04u+UGCBn8Qb8xHw5Zj8=;
To: xen-devel@lists.xenproject.org
Subject: [ovmf bisection] complete build-i386-xsm
Message-Id: <E1nPrax-0005oz-9u@osstest.test-lab.xenproject.org>
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 03 Mar 2022 19:58:39 +0000

branch xen-unstable
xenbranch xen-unstable
job build-i386-xsm
testid xen-build

Tree: ovmf https://github.com/tianocore/edk2.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: seabios git://xenbits.xen.org/osstest/seabios.git
Tree: xen git://xenbits.xen.org/xen.git

*** Found and reproduced problem changeset ***

  Bug is in tree:  ovmf https://github.com/tianocore/edk2.git
  Bug introduced:  d3febfd9ade35dc552df6b3607c2b15d26b82867
  Bug not present: 84338c0d498555f860a480693ee8647a1795fba3
  Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/168382/


  commit d3febfd9ade35dc552df6b3607c2b15d26b82867
  Author: Jason <yun.lou@intel.com>
  Date:   Mon Jan 10 21:46:27 2022 +0800
  
      MdePkg: Replace Opcode with the corresponding instructions.
      
      REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
      
      Replace Opcode with the corresponding instructions.
      The code changes have been verified with CompareBuild.py tool, which
      can be used to compare the results of two different EDK II builds to
      determine if they generate the same binaries.
      (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
      
      Signed-off-by: Jason Lou <yun.lou@intel.com>
      Cc: Michael D Kinney <michael.d.kinney@intel.com>
      Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
      Cc: Zhiguang Liu <zhiguang.liu@intel.com>


For bisection revision-tuple graph see:
   http://logs.test-lab.xenproject.org/osstest/results/bisect/ovmf/build-i386-xsm.xen-build.html
Revision IDs in each graph node refer, respectively, to the Trees above.

----------------------------------------
Running cs-bisection-step --graph-out=/home/logs/results/bisect/ovmf/build-i386-xsm.xen-build --summary-out=tmp/168382.bisection-summary --basis-template=168254 --blessings=real,real-bisect,real-retry ovmf build-i386-xsm xen-build
Searching for failure / basis pass:
 168377 fail [host=elbling0] / 168254 [host=albana0] 168249 [host=huxelrebe0] 168232 [host=huxelrebe0] 168185 [host=huxelrebe0] 168131 [host=albana0] 168127 [host=huxelrebe0] 168119 [host=albana0] 168115 [host=huxelrebe1] 168074 [host=huxelrebe0] 168048 [host=albana0] 168046 [host=huxelrebe0] 168043 [host=huxelrebe0] 168042 [host=chardonnay1] 168038 [host=huxelrebe0] 168017 [host=albana0] 167989 [host=huxelrebe1] 167980 [host=albana1] 167976 [host=huxelrebe0] 167956 [host=huxelrebe1] 167950 [hos\
 t=albana0] 167946 [host=fiano0] 167940 [host=albana0] 167933 [host=albana0] 167929 [host=huxelrebe1] 167919 [host=elbling1] 167907 [host=albana1] 167803 [host=huxelrebe0] 167775 [host=albana0] 167760 [host=fiano0] 167754 [host=albana0] 167729 [host=albana1] 167727 [host=huxelrebe0] 167689 [host=fiano0] 167685 [host=chardonnay1] 167651 [host=albana0] 167636 [host=fiano0] 167627 [host=albana0] 167601 [host=albana1] 167598 [host=huxelrebe0] 167559 [host=huxelrebe0] 167555 [host=huxelrebe0] 167552 [\
 host=albana0] 167535 [host=chardonnay1] 167527 [host=chardonnay1] 167522 [host=huxelrebe0] 167513 [host=albana1] 167487 [host=huxelrebe1] 167465 [host=albana1] 167463 [host=huxelrebe0] 167450 [host=fiano1] 167445 [host=chardonnay0] 167436 [host=pinot0] 167419 [host=huxelrebe1] 167414 [host=albana1] 167409 [host=albana0] 167394 [host=albana1] 167393 [host=albana1] 167392 [host=albana1] 167391 [host=albana1] 167379 [host=huxelrebe0] 167377 [host=huxelrebe1] 167239 [host=huxelrebe0] 167237 [host=al\
 bana0] 167231 [host=albana0] 167225 [host=albana0] 167122 [host=huxelrebe1] 167104 [host=albana0] 167081 [host=albana0] 166961 [host=albana0] 166951 [host=pinot0] 166949 [host=pinot0] 166826 [host=albana0] 166360 ok.
Failure / basis pass flights: 168377 / 166360
(tree with no url: minios)
Tree: ovmf https://github.com/tianocore/edk2.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: seabios git://xenbits.xen.org/osstest/seabios.git
Tree: xen git://xenbits.xen.org/xen.git
Latest 589d51df260465e2561979b8a988e77b0f32a6e8 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 d239552ce7220e448ae81f41515138f7b9e3c4db faecea18d252f97c6ad41f0f457566ff2c125b8d
Basis pass 4c7ce0d285bc7fd593718fd5dec02e136cbfad8e 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 b6e539830bf45e2d7a6bd86ddfdf003088b173b0 64f37cc530f144e53c190c9e8209a51b58fd5c43 be12fcca8b784e456df3adedbffe657d753c5ff9
Generating revisions with ./adhoc-revtuple-generator  https://github.com/tianocore/edk2.git#4c7ce0d285bc7fd593718fd5dec02e136cbfad8e-589d51df260465e2561979b8a988e77b0f32a6e8 git://xenbits.xen.org/qemu-xen-traditional.git#3d273dd05e51e5a1ffba3d98c7437ee84e8f8764-3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 git://xenbits.xen.org/qemu-xen.git#b6e539830bf45e2d7a6bd86ddfdf003088b173b0-a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 git://xenbits.xen.org/osstest/seabios.git#64f37cc530f144e53c190c9e8209a51b58fd5c\
 43-d239552ce7220e448ae81f41515138f7b9e3c4db git://xenbits.xen.org/xen.git#be12fcca8b784e456df3adedbffe657d753c5ff9-faecea18d252f97c6ad41f0f457566ff2c125b8d
>From git://cache:9419/git://xenbits.xen.org/xen
   4b7fd8153d..3e56754b08  smoke      -> origin/smoke
   3e56754b08..b692523faf  staging    -> origin/staging
Loaded 77186 nodes in revision graph
Searching for test results:
 167344 [host=huxelrebe0]
 167345 [host=huxelrebe0]
 167346 [host=huxelrebe0]
 167347 [host=huxelrebe0]
 167349 [host=huxelrebe1]
 167350 [host=huxelrebe0]
 167352 [host=huxelrebe1]
 167353 [host=huxelrebe0]
 167354 [host=huxelrebe0]
 167355 [host=huxelrebe1]
 167356 [host=huxelrebe1]
 167358 [host=huxelrebe1]
 167360 [host=huxelrebe0]
 167363 [host=huxelrebe0]
 167364 [host=huxelrebe0]
 167365 [host=huxelrebe0]
 167366 [host=huxelrebe0]
 167367 [host=huxelrebe0]
 167368 [host=huxelrebe0]
 167369 [host=huxelrebe0]
 167370 [host=huxelrebe1]
 167371 [host=huxelrebe1]
 167373 [host=huxelrebe1]
 167374 [host=huxelrebe1]
 167375 [host=huxelrebe1]
 167376 [host=huxelrebe1]
 167377 [host=huxelrebe1]
 167379 [host=huxelrebe0]
 167225 [host=albana0]
 167231 [host=albana0]
 167237 [host=albana0]
 167239 [host=huxelrebe0]
 167240 [host=huxelrebe0]
 167242 [host=huxelrebe1]
 167247 [host=huxelrebe1]
 167253 [host=huxelrebe0]
 167258 [host=huxelrebe0]
 167257 [host=huxelrebe1]
 167259 [host=huxelrebe0]
 167260 [host=huxelrebe0]
 167261 [host=huxelrebe0]
 167262 [host=huxelrebe0]
 167263 [host=huxelrebe0]
 167264 [host=huxelrebe0]
 167265 [host=huxelrebe0]
 167266 [host=huxelrebe0]
 167391 [host=albana1]
 167392 [host=albana1]
 167393 [host=albana1]
 167394 [host=albana1]
 167409 [host=albana0]
 167414 [host=albana1]
 167419 [host=huxelrebe1]
 167081 [host=albana0]
 167104 [host=albana0]
 167268 [host=huxelrebe0]
 167267 [host=huxelrebe0]
 167269 [host=huxelrebe0]
 167270 [host=huxelrebe0]
 167271 [host=huxelrebe0]
 167273 [host=huxelrebe0]
 167275 [host=huxelrebe1]
 167279 [host=huxelrebe0]
 167283 [host=huxelrebe0]
 167285 [host=huxelrebe0]
 167288 [host=huxelrebe0]
 167293 [host=huxelrebe1]
 167297 [host=huxelrebe1]
 167300 [host=huxelrebe1]
 167303 [host=huxelrebe1]
 167306 [host=huxelrebe1]
 167309 [host=huxelrebe0]
 167122 [host=huxelrebe1]
 166826 [host=albana0]
 167272 [host=huxelrebe0]
 167465 [host=albana1]
 167487 [host=huxelrebe1]
 167314 [host=huxelrebe0]
 167319 [host=huxelrebe1]
 167324 [host=huxelrebe1]
 167330 [host=huxelrebe1]
 167334 [host=huxelrebe1]
 167335 [host=huxelrebe1]
 167338 [host=huxelrebe1]
 167339 [host=huxelrebe1]
 167340 [host=huxelrebe0]
 167341 [host=huxelrebe0]
 167342 [host=huxelrebe0]
 166360 pass 4c7ce0d285bc7fd593718fd5dec02e136cbfad8e 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 b6e539830bf45e2d7a6bd86ddfdf003088b173b0 64f37cc530f144e53c190c9e8209a51b58fd5c43 be12fcca8b784e456df3adedbffe657d753c5ff9
 167436 [host=pinot0]
 167445 [host=chardonnay0]
 167450 [host=fiano1]
 167463 [host=huxelrebe0]
 166949 [host=pinot0]
 166951 [host=pinot0]
 166961 [host=albana0]
 167513 [host=albana1]
 167522 [host=huxelrebe0]
 167527 [host=chardonnay1]
 167535 [host=chardonnay1]
 167552 [host=albana0]
 167555 [host=huxelrebe0]
 167559 [host=huxelrebe0]
 167598 [host=huxelrebe0]
 167601 [host=albana1]
 167627 [host=albana0]
 167636 [host=fiano0]
 167651 [host=albana0]
 167685 [host=chardonnay1]
 167689 [host=fiano0]
 167727 [host=huxelrebe0]
 167729 [host=albana1]
 167754 [host=albana0]
 167760 [host=fiano0]
 167775 [host=albana0]
 167803 [host=huxelrebe0]
 167907 [host=albana1]
 167919 [host=elbling1]
 167929 [host=huxelrebe1]
 167933 [host=albana0]
 167940 [host=albana0]
 167946 [host=fiano0]
 167950 [host=albana0]
 167956 [host=huxelrebe1]
 167976 [host=huxelrebe0]
 167980 [host=albana1]
 167989 [host=huxelrebe1]
 168017 [host=albana0]
 168046 [host=huxelrebe0]
 168038 [host=huxelrebe0]
 168042 [host=chardonnay1]
 168043 [host=huxelrebe0]
 168048 [host=albana0]
 168074 [host=huxelrebe0]
 168115 [host=huxelrebe1]
 168119 [host=albana0]
 168127 [host=huxelrebe0]
 168131 [host=albana0]
 168185 [host=huxelrebe0]
 168232 [host=huxelrebe0]
 168249 [host=huxelrebe0]
 168254 [host=albana0]
 168258 [host=elbling1]
 168262 fail 497ac7b6d7f9750f48f137db244931a5728b1968 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168267 fail 497ac7b6d7f9750f48f137db244931a5728b1968 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168271 [host=elbling1]
 168285 [host=elbling1]
 168290 [host=elbling1]
 168295 [host=elbling1]
 168299 [host=elbling1]
 168303 fail 497ac7b6d7f9750f48f137db244931a5728b1968 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168308 [host=elbling1]
 168312 [host=elbling1]
 168314 fail 497ac7b6d7f9750f48f137db244931a5728b1968 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd e0a514d2f4b2fcb51835aa9a9b02653b491a61fc
 168316 fail irrelevant
 168320 fail irrelevant
 168329 [host=elbling1]
 168333 [host=elbling1]
 168340 fail irrelevant
 168362 pass b24306f15daa2ff8510b06702114724b33895d3c 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 991a06d71a73cae097a55e60f38c2ae38ef36e10
 168344 fail irrelevant
 168352 fail dc39554d58af4a50b50eca1f57c49415a12b0c98 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 d239552ce7220e448ae81f41515138f7b9e3c4db faecea18d252f97c6ad41f0f457566ff2c125b8d
 168351 pass 4c7ce0d285bc7fd593718fd5dec02e136cbfad8e 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 b6e539830bf45e2d7a6bd86ddfdf003088b173b0 64f37cc530f144e53c190c9e8209a51b58fd5c43 be12fcca8b784e456df3adedbffe657d753c5ff9
 168357 pass 5801910013757bd626f67ed77eea6c16a176eebf 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 6a62e0cb0dfe9cd28b70547dbea5caf76847c3a9 d05c67efd94f301b48bc486246161b05acaa8df2
 168356 fail b422b0fcf92dd4103dfc16d8d5f77fbec2d8c5b9 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 d239552ce7220e448ae81f41515138f7b9e3c4db faecea18d252f97c6ad41f0f457566ff2c125b8d
 168358 pass ee1f8262b83dd88b30091e6e81221ff299796099 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 b6e539830bf45e2d7a6bd86ddfdf003088b173b0 98dd53b99442ae15d78125b4453b1adc926e9ff3 8e3edefb880caeeaaf80123d5599139e8c2c9ecf
 168359 fail 589d51df260465e2561979b8a988e77b0f32a6e8 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 d239552ce7220e448ae81f41515138f7b9e3c4db faecea18d252f97c6ad41f0f457566ff2c125b8d
 168360 pass b360b0b589697da267f5d3a553e65635b91ebae2 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 10d33220f2363a21a52a394159118ab4ddaed50e
 168363 pass b24306f15daa2ff8510b06702114724b33895d3c 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd e826cf735171ad032901abdc4a1c46ecca401562
 168364 fail 589d51df260465e2561979b8a988e77b0f32a6e8 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 d239552ce7220e448ae81f41515138f7b9e3c4db faecea18d252f97c6ad41f0f457566ff2c125b8d
 168365 pass b24306f15daa2ff8510b06702114724b33895d3c 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 109980738e1449f5f281e5d6bfb5681eb9defea6
 168367 pass 54cddc3ad4b3a317985ce5f491f9b1f31ab10dd8 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd f7b7e2b9add53780e44e8f8c165c2281258ae367
 168366 fail 589d51df260465e2561979b8a988e77b0f32a6e8 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 d239552ce7220e448ae81f41515138f7b9e3c4db faecea18d252f97c6ad41f0f457566ff2c125b8d
 168368 pass b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168371 fail 7bc8b1d9f412507d579f21ea9af56fced81e7827 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168373 pass 84338c0d498555f860a480693ee8647a1795fba3 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168372 fail 589d51df260465e2561979b8a988e77b0f32a6e8 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 d239552ce7220e448ae81f41515138f7b9e3c4db faecea18d252f97c6ad41f0f457566ff2c125b8d
 168375 fail d3febfd9ade35dc552df6b3607c2b15d26b82867 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168378 pass 84338c0d498555f860a480693ee8647a1795fba3 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168379 fail d3febfd9ade35dc552df6b3607c2b15d26b82867 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168377 fail 589d51df260465e2561979b8a988e77b0f32a6e8 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 d239552ce7220e448ae81f41515138f7b9e3c4db faecea18d252f97c6ad41f0f457566ff2c125b8d
 168380 pass 84338c0d498555f860a480693ee8647a1795fba3 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
 168382 fail d3febfd9ade35dc552df6b3607c2b15d26b82867 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
Searching for interesting versions
 Result found: flight 166360 (pass), for basis pass
 For basis failure, parent search stopping at 84338c0d498555f860a480693ee8647a1795fba3 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07, results HASH(0x55577f747520) HASH(0x55577f707270) HASH(0x55577f731358) For basis failure, parent search stopping at b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7\
 cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07, results HASH(0x55577f71d138) For basis failure, parent search stopping at 54cddc3ad4b3a317985ce5f491f9b1f31ab10dd8 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd f7b7e2b9add53780e44e8f8c165c2281258ae367, results HASH(0x55577b0f44f8) For basis failure, parent search stopping at b24306f15daa2ff8510b06702114724b33895d3c 3d273dd05e51e5a1ffba3d98c7437ee\
 84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 109980738e1449f5f281e5d6bfb5681eb9defea6, results HASH(0x55577f73c8d0) For basis failure, parent search stopping at b24306f15daa2ff8510b06702114724b33895d3c 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd e826cf735171ad032901abdc4a1c46ecca401562, results HASH(0x55577f71d438) For basis failure, parent search stopping at b24306f15daa\
 2ff8510b06702114724b33895d3c 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 991a06d71a73cae097a55e60f38c2ae38ef36e10, results HASH(0x55577b0f5038) For basis failure, parent search stopping at b360b0b589697da267f5d3a553e65635b91ebae2 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 10d33220f2363a21a52a394159118ab4ddaed50e, results HASH(0x55577f74b14\
 0) Result found: flight 168262 (fail), for basis failure (at ancestor ~347)
 Repro found: flight 168351 (pass), for basis pass
 Repro found: flight 168359 (fail), for basis failure
 0 revisions at 84338c0d498555f860a480693ee8647a1795fba3 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 4388144c44c4dd9e9b7df97938ef08ffa85eec07
No revisions left to test, checking graph state.
 Result found: flight 168373 (pass), for last pass
 Result found: flight 168375 (fail), for first failure
 Repro found: flight 168378 (pass), for last pass
 Repro found: flight 168379 (fail), for first failure
 Repro found: flight 168380 (pass), for last pass
 Repro found: flight 168382 (fail), for first failure

*** Found and reproduced problem changeset ***

  Bug is in tree:  ovmf https://github.com/tianocore/edk2.git
  Bug introduced:  d3febfd9ade35dc552df6b3607c2b15d26b82867
  Bug not present: 84338c0d498555f860a480693ee8647a1795fba3
  Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/168382/


  commit d3febfd9ade35dc552df6b3607c2b15d26b82867
  Author: Jason <yun.lou@intel.com>
  Date:   Mon Jan 10 21:46:27 2022 +0800
  
      MdePkg: Replace Opcode with the corresponding instructions.
      
      REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
      
      Replace Opcode with the corresponding instructions.
      The code changes have been verified with CompareBuild.py tool, which
      can be used to compare the results of two different EDK II builds to
      determine if they generate the same binaries.
      (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
      
      Signed-off-by: Jason Lou <yun.lou@intel.com>
      Cc: Michael D Kinney <michael.d.kinney@intel.com>
      Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
      Cc: Zhiguang Liu <zhiguang.liu@intel.com>

neato: graph is too large for cairo-renderer bitmaps. Scaling by 0.673331 to fit
pnmtopng: 93 colors found
Revision graph left in /home/logs/results/bisect/ovmf/build-i386-xsm.xen-build.{dot,ps,png,html,svg}.
----------------------------------------
168382: tolerable ALL FAIL

flight 168382 ovmf real-bisect [real]
http://logs.test-lab.xenproject.org/osstest/logs/168382/

Failures :-/ but no regressions.

Tests which did not succeed,
including tests which could not be run:
 build-i386-xsm                6 xen-build               fail baseline untested


jobs:
 build-i386-xsm                                               fail    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary



From xen-devel-bounces@lists.xenproject.org Thu Mar 03 20:02:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 20:02:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283730.482829 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPreZ-0001Xz-6m; Thu, 03 Mar 2022 20:02:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283730.482829; Thu, 03 Mar 2022 20:02:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPreZ-0001Xs-3B; Thu, 03 Mar 2022 20:02:23 +0000
Received: by outflank-mailman (input) for mailman id 283730;
 Thu, 03 Mar 2022 20:02:21 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=++p5=TO=citrix.com=prvs=054f29298=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nPreX-0001Xm-Jt
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 20:02:21 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d3fe2441-9b2c-11ec-8539-5f4723681683;
 Thu, 03 Mar 2022 21:02:19 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d3fe2441-9b2c-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646337739;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=Urch2SAdWlJOjEgLahikV4ROS4eP8W7WNa29IKN8kIE=;
  b=ZhC30Bs7yb5kKBKZxW+QkApBOR/O0ajvkAgNa3Zk2fziRhsS4zcO5VvO
   I/1BxuhDghMqfwKo0clONShZN3FrBuilYU1BlPKm8uNdkvLiP3+6NDvLT
   PslD33d6lhu/GHwzx/p4RU30VtSSvKWUMtd3w/oVhdU2tDsf3RjlQigky
   8=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65422815
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:jtuP7awdPSDB+6trNL56t+cvxirEfRIJ4+MujC+fZmUNrF6WrkUEz
 WMcXGDQaP7ba2TzctgnOYu/9xxU65DTxoRrHlE5/CAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2YPhWGthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 NpliKa1ezgoYZDwv/00fwJ9Sg1VAIMaweqSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DFYUToHx/ixreCu4rW8vrSKTW/95Imjw3g6iiGN6AO
 pZDM2o2MXwsZTV1JgkeLpI/pNzwrXLTLm1K+FOPtYQOtj27IAtZj+G2bYu9lsaxbdpRtlaVo
 CTB5WuRKgEXMpmTxCSI9lqoh/TThmXrVYQKDrq6+/V2xlqJyQQ7ChcbSF+6qvmRkVOlVpRUL
 El8x8Y1hfFsrgrxFIC7BkDm5i7f1vIBZzZOO9AA7TOyy/Xp3yGAL0Qfa2dtQ+EI6PZjEFTGy
 WS1t9/uADVutpicRnSc6qqYoFuOBMQFEYMRTXRaFFVYurEPtKl210uSFYg7TMZZm/WoQWmY/
 tyckMQpa1z/Z+Yv3r7zw13IiinESnPhHl9svVW/so5IA2pEiG+Zi26AtACzARVodt/xory9U
 J4swZL2AAcmV8zlqcB1aL9RdIxFHt7cWNEmvXZhHoM66xOm8GO5cIZb7VlWfRk1bJxYJ2O4O
 xCO4Gu9AaO/2lPwN8ebhKrrVqwXIVXIT4y5Bpg4kPIUCnSOSON31H43PhPBt4wcuEMtjbs+K
 f+mnTWEVh4n5VBc5GPuHY81iOZzrghnnD+7bcmin3yPjOrPDFbIGOxtGAbfMYgEAFas/Vy9H
 yB3bJDRlX2ykYTWP0HqzGLkBQtSfChjWMuv8JQ/myzqClMOJVzNwsT5mNsJU4dkg75UhqHP+
 HS8UVVf013xmTvMLgDiV5ypQOiHsUpXxZ7jARERAA==
IronPort-HdrOrdr: A9a23:iv6UIazbDeuljpMd1Z0GKrPwKL1zdoMgy1knxilNoHtuA6ulfq
 GV7ZAmPHrP4wr5N0tNpTntAsa9qBDnlaKdg7N+AV7KZmCP0gaVxepZjLfK8nnNHDD/6/4Y9Y
 oISdkaNDQoNykYsS8t2njbL+od
X-IronPort-AV: E=Sophos;i="5.90,153,1643691600"; 
   d="scan'208";a="65422815"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=FJs+g+QI8Jd/uTy1c4QgzA3HxjXl/VRviPbWJuYhhPcYMmrNwiibGbHaNyozw+PgiPtdKEkFiTAU/M0NE9KEEYZ/21SAP1WJCkS3qTk7D3gfhSS8dEuOkXXl6VKo0mBTcJobzLYoVrvoMyj65WyNyCjk4kg6Lrs3q6xmt6MnYcrdTnZFj40nMuamYQu0KZBC1uynawtLpdYR/rinNpjWzgROVVmvTWAFI336OtlF1fE9pOlXm4vQyom1JeAMGe7qIGMO/7SoydzzAle3XyfY7Rq7MeMhbqc/LoegE3RWxScnMNw3bing0bsSTqhkx+nPXDw5VF5HIYf1qjtIZYFuZQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Urch2SAdWlJOjEgLahikV4ROS4eP8W7WNa29IKN8kIE=;
 b=i5PzIJ043IV6QKSy4b5lWeDj/0iFWvxV4xwBTGaw3ROC+Kmbbd3+BvvR/Rmy3lthw8zfyntZnTx6TPej2Dj0r504Jz0ycItdcmtADmxGqKbs3gtorQBqYTi4SoSktMm6f06J3l6Qq5ELhljE6EHOCx4e9PRvN4/yamoFL46ZSS4SMHFZykLpOWCWyNVZ0+HbGPDnmFCdctC+4vESvlL4N7u/izH+KCqgZORBf+/dnk9J1SxuTs7i+gUB+CLkPDlYpGlW1ILFonGkw2IrxamXLh6Vopjwk+RflJAnXQDODJ5P23NB4d3pXzGZ7yXS4YfDxTtyuIrY4oZevLUvQKVv1w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Urch2SAdWlJOjEgLahikV4ROS4eP8W7WNa29IKN8kIE=;
 b=mCyJtjiZ3Hi0ZkXHnWbpOef3eIEGNyNYSVyx3oissRZz059Mp3Pa2FyGj9ZGXiH3cjc9tXRXfzw6ITB6hjcOUYJ8ZbVbm/Lj3ogTu5VcSQkwO7DjQblXrLWqI8pk2XpS6oZ31Lg9IUxtdCGfqNkeE6Lh6to7NMD0Md5bhIDOYeM=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Wei Liu <wl@xen.org>, Roger Pau Monne <roger.pau@citrix.com>
Subject: [Regression] [PATCH] x86: fold sections in final binaries
Thread-Topic: [Regression] [PATCH] x86: fold sections in final binaries
Thread-Index: AQHYLUom+7MvssZr9kajAcxWuiy9JqyuGI0A
Date: Thu, 3 Mar 2022 20:02:10 +0000
Message-ID: <85b6a876-ac8c-051f-5b61-23c58b29c1dc@citrix.com>
References: <03851bd4-9202-385f-d991-c9720185c946@suse.com>
In-Reply-To: <03851bd4-9202-385f-d991-c9720185c946@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 57132d20-2fb7-4968-3137-08d9fd50b42d
x-ms-traffictypediagnostic: DM6PR03MB3564:EE_
x-microsoft-antispam-prvs: <DM6PR03MB35649209ED5DF674B8B3BD81BA049@DM6PR03MB3564.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: Y5EXbbOqbkjHerPdRyR/b1UfM9t8x8cNz1vOXzM1xJkCLsSv8N6gR67OSY4rlV68YabO/gh2KYCvlUhBMyteoEFS2hq47mNHefm3msUXATJJOJIC/jzxM/65TP0qeO/qo1gvDcxdFkgaxKXjhOD0vWCEfblH11PckNvLRK/cIT39GJjZzMmdQIxTPab2JiJ1XFWTBkXFUCg9E2/Vf8OeXX3hBZBa1AQFIPc98onOJH2NDZXeL1HVGrHTgkYKIB+6eEgcg2g0KBHCeHf+MZUUNHmV+k4R9xm+xTxSRIzup6CeCIOwLI0RiTAtrbbNTeO3UPslgUzvH2sIaj9jwaOdCvV5fR+LJklSQLYGhIl9Cj5MpKuIifGz90zD2Yj/ujMdHr1dav/Hao/yqIqhGLE9eyQBnV2+3qZifdrEN/4f7Z3DJzijikL4wVh4T3H5tsReQNY7cvV5KvAiN8t7442XVqyw7y527PrRF0mbc2Lxqi1dB1Bld5XZgRDmcfavmcplcHup9mhjb8r7bl8m6UnFGoz1uvwAOKJquxd9l+JWhqWhwCcgqbEvLQofAjTHaV/4CfdBBatki9LxZOWhT0ZWrXGXI2Uq4KXPuHXe4wobNFf+d7gG3IbtuTiqgcK80qFiCIOra9eEvvq48MyP1jACSRjRXm6CxLhR7w+9dc1CgNUsCHRHbQWNo0//9yQAYr2+O4jPZZhW2Iz5PmUUvkFjWjYyhe+2CB5AvhtVGHkwGfwaTIbnFpse8iQwx4xvAYp/z7qk7dJwnnzaT/E18L7L9OTfjxKy/npAbw/Gs9b+H3crSEegr/QM/dZYYCIzc4phjwJYiDSdj+o0lt5kIfQ3uSJqy6gfSZl/skPwRI6SDA4=
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(8676002)(4326008)(66476007)(53546011)(66446008)(64756008)(66946007)(66556008)(2906002)(71200400001)(76116006)(36756003)(6486002)(186003)(966005)(6506007)(508600001)(6512007)(91956017)(26005)(2616005)(107886003)(86362001)(54906003)(122000001)(110136005)(31696002)(316002)(83380400001)(82960400001)(5660300002)(31686004)(8936002)(38070700005)(38100700002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?dGtKYUl4bmxMaWY0bTQyUXBwdENOSE9DVVRqWEtRdEZ5SEN6TU1mNzNZM2Nw?=
 =?utf-8?B?cGlqQmtKWWE4STQycCtzOWd0OFFZd0FJWmZ3UVh2cEk2dFRTYlNoYjhXU0w1?=
 =?utf-8?B?cDR3WXJYR1RaUy9IWlUxZW54OW8zckozMlhvRWxqZ2oxT0RQNVBiS3kvLy9S?=
 =?utf-8?B?NHhoZWFkakxDR1FQaG1MV3h6QnJEMXNqbHd0RFJFVjVFSmlDa3FETkJFSkxk?=
 =?utf-8?B?ZlRGTUl3ZUpJdnpnOEU4OWo1WjJHZGpqbm5vTVhiNHFtcEt6MHZpMDBKcmJo?=
 =?utf-8?B?TWFDZ2c1ZXhwS1hZU3lnbklCblVLRzIvNnRGODY4UVA3cEVMc3JuK1lpaUtl?=
 =?utf-8?B?ZkxMQnM2STRjSytoQjVXd0NkVFoydlJubTExR1g5andyZk0vUk5FTVNnaXJO?=
 =?utf-8?B?d0oxWWtVZ1RDQUdsS2Rwano1Y1FsSTIvdU03WDJXMEFocXVuaHMvcGVxM3ZQ?=
 =?utf-8?B?WTVDKzZmV2RFQ1dMV2ZMcDB2RlJLMTc2ZHdtblllU0xHWlp6MW5vYnVOb09K?=
 =?utf-8?B?L2p6NmtLN3lEdTBWdFJaUlhmZnJmd1VGMEd3NDNZL2JnZnFOU0h0K083N3c5?=
 =?utf-8?B?eGlUK0xqaC96UnIvenRidnJiMUloMS9yVm1vNU1lQUlGeFBHb0hzZEMyTVhM?=
 =?utf-8?B?dUxrTng3YjZFQ040V2VrMkdWMmd2M0ZQL3dta3dmenF5NHhNQmlYUjBQV00v?=
 =?utf-8?B?UUhWZWJTaHBUdmFFb3pCVklsMGM4eU42Z2JFWHJwenRhKy9VU29tQ0szUXVR?=
 =?utf-8?B?TCtaaENyc3c5aGtkZWxlUlhhaVJnQURiNnlCUitiTTBTaTZUcXcxTFg5dFBS?=
 =?utf-8?B?c09xVVU3dS95V1l0TURjYXEyYk41Y1VWZUlrcUdEV1V5OTdhTmd0R1d5Z1kr?=
 =?utf-8?B?cVBQUFdyWWpUL0hLS08zSS90MHl6RTkzci94ZElmVGNiOFZyRFhURytDYzhy?=
 =?utf-8?B?RWszVVRzcFJJYXg1Z0t5aEdkOGJYdWJTd2tXdlZNYUdEcDlzWEpYejJzcGp2?=
 =?utf-8?B?dXJZOGZyOGNsNmhkT25FN2tQMy9qdDFKSVlsMStzL2xSQW5FazlPWGo4OHE1?=
 =?utf-8?B?Y003bnE2MEtOcnNhNDhLZHVWNGUrVnZWSVVoRk52TThzQjNxOGk2STRoOEZF?=
 =?utf-8?B?OHhxa1RHWFh4V2hmVzY0NEVrRTd1blEzeGp5QmVxeXdIZExDL3ZuaEdka3Jy?=
 =?utf-8?B?ZzRpZjZrNitSOTBjVnpXQUVhdk5Kd2szSVBhcHYzT2kxbmpVSVdML0JZT0FK?=
 =?utf-8?B?SXRMbzM3ZzZ0aXArdHAvakYwZmdzeloxSWFkM0N4WDdoMTVuZkZjbTFxak1W?=
 =?utf-8?B?SG1NUDIvZU85a2FpMmR0T05sNzRsQ2N6Umt3dTFBbFJZNk40TFlmNDFLMkJV?=
 =?utf-8?B?WTU5V2RNNVdvU3FUVGg0Q3plNG9ZL2piU3c1TnFZTkhTdGdqT3JjSnlyWXNI?=
 =?utf-8?B?dTdldDNyUW9YampEWldZOWlzTHVjclVlWVJ1M04yb2FIcngvL0FITnlicHJQ?=
 =?utf-8?B?UjJGRE9hbDhVb0lXNHpGQ0N0S3Jaa0JscWN0YWZ2Ym0ydWY4cTdqNGxDcCtQ?=
 =?utf-8?B?YjR4WnVBNGdCcllPYlJTTmxqNlhpa2taZ2pjc1hqTTZJYXROcnZRdU1Cc3Z3?=
 =?utf-8?B?ZllJeTVrMjZpcDVHSHUxdXFQVm1SVEJ2M041OUMwdWJpVHFEeG12RTNXNGI5?=
 =?utf-8?B?OE00WEZyS3NKbWFvd0ZaYTVkRjUzZFY5dzJyWGNIQmpjOWVOQlByT1AwSmYw?=
 =?utf-8?B?Y2dtMU12RU1IeVQ3V0xhMS90S0xoSHpZeTRNOVA4ZTBaWk5Bd1BNNjNkQ1pi?=
 =?utf-8?B?bEtJcVkwZGhrQWN0Q1RZUCtRdzJjWTFMR09UTW9RV2VVb1YzMlczZmNneEJm?=
 =?utf-8?B?Z3orZVM0U1ZTWFU5bzN1S0JCdU80aEZ3M0JpNHN3eW9xRVJ0Ym9JQnZEU2VV?=
 =?utf-8?B?TFdXdlNIY0NJWGZUQ3VRTk56My9odzJrVXJqUWVsa3Jjc0VWOGtiTU1WcW54?=
 =?utf-8?B?S3o5ZHpxMXoxQitmTVdjb0lyZkNYZDFmeCtxZjRWOXJlSlJJdU9zZkk0WFUw?=
 =?utf-8?B?M0N6NDFZR3dXWVpUY1Z5UjBBZXdhdW5RaDVPZEVCTTYrQmtLc3JjNndwTi9N?=
 =?utf-8?B?bVVxTFh6V1lVYlo2bENkSk11UzNacUkwNEE3UGFxZUpkSGtsQmlHMTdoMXhV?=
 =?utf-8?B?aThiUHN6Q2dEckxFN3NNVkw0TEVYaHJTdk92STFHN1hMa2Q1ZGtSdUI3eFJp?=
 =?utf-8?B?ZERycmR6QnBORWM4ZFlrNTJkRG1BPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <6EAEAEE5D6C5E84DBA09AD7C9CFDC52C@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 57132d20-2fb7-4968-3137-08d9fd50b42d
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Mar 2022 20:02:11.0301
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 7QDN8XVNKUbRkGqE8XKhPhnf8Q4CdJHIF+etL5L2b43hb1esArJpIOKJvp69K6ozZx/SJ72Q/0+YmzcOml3CDbLpP0CLnbwOBqJQ1EIP4l8=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR03MB3564
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Thu Mar 03 20:05:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 20:05:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283736.482839 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPrhI-0002B2-Jt; Thu, 03 Mar 2022 20:05:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283736.482839; Thu, 03 Mar 2022 20:05:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPrhI-0002Av-H0; Thu, 03 Mar 2022 20:05:12 +0000
Received: by outflank-mailman (input) for mailman id 283736;
 Thu, 03 Mar 2022 20:05:11 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nPrhH-0002Ap-Fl
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 20:05:11 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nPrhD-0005Aj-CL; Thu, 03 Mar 2022 20:05:07 +0000
Received: from home.octic.net ([81.187.162.82] helo=[10.0.1.102])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nPrhD-0004W1-6r; Thu, 03 Mar 2022 20:05:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:Subject:
	From:References:Cc:To:MIME-Version:Date:Message-ID;
	bh=z+df0/2OOWm7L2qgArxR2JZjrOAWg2HWJArVvtEGVtc=; b=mFhWXUirf00iLFDRL9ZIZoj4oI
	VIWMvLlvzgnxAUj65ltbvq2yZDXQEnLRrieP+Q4EO8AS97H1do7xlNHZBwCQBzmCzDfsslX87LXIa
	oRVVXeX70ap1htSnElVjU8BMfHrWpJmKNCBY0BzpXxmfWWB/CcUep7/Ofyx+mj5i9ErA=;
Message-ID: <4029db6a-3693-ce70-2f7e-7978284ceed9@xen.org>
Date: Thu, 3 Mar 2022 20:05:05 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
To: Bertrand Marquis <Bertrand.Marquis@arm.com>,
 Jan Beulich <jbeulich@suse.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Volodymyr Babchuk <volodymyr_babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <03851bd4-9202-385f-d991-c9720185c946@suse.com>
 <1a4bef81-d29e-97ae-098b-d1e582e5af28@suse.com>
 <915C7BBD-AD0C-42B8-8459-C3BFDCDC0A11@arm.com>
From: Julien Grall <julien@xen.org>
Subject: Re: [PATCH] x86: fold sections in final binaries
In-Reply-To: <915C7BBD-AD0C-42B8-8459-C3BFDCDC0A11@arm.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Bertrand,

On 01/03/2022 13:30, Bertrand Marquis wrote:
>> On 1 Mar 2022, at 08:58, Jan Beulich <jbeulich@suse.com> wrote:
>>
>> On 01.03.2022 09:55, Jan Beulich wrote:
>>> Especially when linking a PE binary (xen.efi), standalone output
>>> sections are expensive: Often the linker will align the subsequent one
>>> on the section alignment boundary (2Mb) when the linker script doesn't
>>> otherwise place it. (I haven't been able to derive from observed
>>> behavior under what conditions it would not do so.)
>>>
>>> With gcov enabled (and with gcc11) I'm observing enough sections that,
>>> as of quite recently, the resulting image doesn't fit in 16Mb anymore,
>>> failing the final ASSERT() in the linker script. (That assertion is
>>> slated to go away, but that's a separate change.)
>>>
>>> Any destructor related sections can be discarded, as we never "exit"
>>> the hypervisor. This includes .text.exit, which is referenced from
>>> .dtors.*. Constructor related sections need to all be taken care of, not
>>> just those with historically used names: .ctors.* and .text.startup is
>>> what gcc11 populates. While there re-arrange ordering / sorting to match
>>> that used by the linker provided scripts.
>>>
>>> Finally, for xen.efi only, also discard .note.gnu.*. These are
>>> meaningless in a PE binary. Quite likely, while not meaningless there,
>>> the section is also of no use in ELF, but keep it there for now.
>>>
>>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>>
>> Some of this will likely want mirroring to Arm as well, even if xen.efi
>> there isn't produced by the linker. Sections are better properly folded
>> even for ELF, and constructors not ending up in [__ctors_start,__ctors_end)
>> can surely not do any good.
> 
> I fully agree with that and it would make sense to do both changes together to
> avoid differences between x86 and arm unless required.
> 
> Right now our discard section on arm is a lot shorter and I do not see why we
> would need any of the sections that are discarded on x86.

Me neither.

> 
> As this needs testing and checking I do not think it makes sense for you to do
> that right now.
> @Stefano and Julien: I am ok to create myself a task to sync with x86 in the
>   next weeks/months, what do you think ?

I haven't looked in details the exact difference between two linker 
scripts. After the sync, I would expect to be mostly similar.

We also have the RISCv and possibly soon PowerPC. So, I would consider 
to consolidate the linker scripts if possible. This would help to keep 
them in sync.

Anyway, as discussed on IRC, let's start with updating the Arm linker 
scripts. We can then look at the differences.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 20:18:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 20:18:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283744.482850 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPruS-00042S-Qv; Thu, 03 Mar 2022 20:18:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283744.482850; Thu, 03 Mar 2022 20:18:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPruS-00042L-Nr; Thu, 03 Mar 2022 20:18:48 +0000
Received: by outflank-mailman (input) for mailman id 283744;
 Thu, 03 Mar 2022 20:18:47 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nPruR-00042C-4S
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 20:18:47 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nPruQ-0005PJ-S7; Thu, 03 Mar 2022 20:18:46 +0000
Received: from home.octic.net ([81.187.162.82] helo=[10.0.1.102])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nPruQ-0005iB-MQ; Thu, 03 Mar 2022 20:18:46 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=bY6CbEVQMHGGIqB8zVfBJbxcTWn6l8SqWGyYlgLb+pg=; b=lz/YZ2c5aViFsmIyK9Mb6SDavc
	73LXEZJv2wy9BNleAy8eA9f7jz7V+Xa2p+aWOs4VayaEsDb8tvbpGmqmoqMktd+yWYbEuKjg8UA1w
	Hnxz9gbAaM3rp3aDFEiDOMBN4vMcTEzNk1wcZ2Rmot/+YtlQfa7lpGckhVkDwTBjK73M=;
Message-ID: <df1de087-794c-a49e-2eb6-589a5b33daf5@xen.org>
Date: Thu, 3 Mar 2022 20:18:44 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH] xen/arm: mm: Encode existing constraints of the memory
 layout
To: Bertrand Marquis <Bertrand.Marquis@arm.com>
Cc: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Julien Grall <jgrall@amazon.com>, Stefano Stabellini
 <sstabellini@kernel.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
References: <20220228100659.58089-1-julien@xen.org>
 <B4CC57B1-4443-49A4-92FC-25165BEA14CB@arm.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <B4CC57B1-4443-49A4-92FC-25165BEA14CB@arm.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit



On 03/03/2022 16:04, Bertrand Marquis wrote:
> Hi Julien,

Hi Bertrand,

>> On 28 Feb 2022, at 10:06, Julien Grall <julien@xen.org> wrote:
>>
>> From: Julien Grall <jgrall@amazon.com>
>>
>> The boot code expects the regions XEN_VIRT_START, FIXMAP_ADDR(0),
>> BOOT_FDT_VIRT_START to use the same 0th (arm64 only) and 1st slot.
>>
>> Add some BUILD_BUG_ON() to confirm that. This is helpful if one wants
>> to re-order the memory layout.
> 
> Very good idea :-)

I actually hit this issue when trying to re-order the memory layout for 
testing a patch.

> 
>>
>> Signed-off-by: Julien Grall <jgrall@amazon.com>
> 
> Reviewed-by: Bertrand Marquis <bertrand.marquis@arm.com>
> 
> Just a small NIT after if you want to do it on commit...

I have update the comment and committed the patch.

Thanks!

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 21:33:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 21:33:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283753.482866 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPt4a-0004Wu-Fn; Thu, 03 Mar 2022 21:33:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283753.482866; Thu, 03 Mar 2022 21:33:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPt4a-0004Wn-Cp; Thu, 03 Mar 2022 21:33:20 +0000
Received: by outflank-mailman (input) for mailman id 283753;
 Thu, 03 Mar 2022 21:33:19 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPt4Y-0004Wd-Ut; Thu, 03 Mar 2022 21:33:18 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPt4Y-0006xp-Qf; Thu, 03 Mar 2022 21:33:18 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPt4Y-0006fC-Fa; Thu, 03 Mar 2022 21:33:18 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPt4Y-0007we-F9; Thu, 03 Mar 2022 21:33:18 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=HVqIBJsChvoUG5bD+qmg6UIbom0Ud4whjfxG0Ur8pS0=; b=6PHqp2dfTtUO79CU+V6yCqCGeN
	EyRHspPaCG+1SLnBMO1j1H4XeG/FuyZtaXa4cFEVnqexPqsrJNhmG/kkqraDdXvfc7191A/K4DQMt
	BS0J9elsM3vfu7jlbkNyBvpTbTQEk6BB8jxzBK4XuJTCHuZnAHwK5fq4qgZR/ZK6dvw4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168381-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168381: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=589d51df260465e2561979b8a988e77b0f32a6e8
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 03 Mar 2022 21:33:18 +0000

flight 168381 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168381/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 589d51df260465e2561979b8a988e77b0f32a6e8
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    3 days
Failing since        168258  2022-03-01 01:55:31 Z    2 days   26 attempts
Testing same since   168359  2022-03-03 10:41:39 Z    0 days    6 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 589d51df260465e2561979b8a988e77b0f32a6e8
Author: Sean Rhodes <sean@starlabs.systems>
Date:   Thu Feb 24 19:38:18 2022 +0800

    MdeModulePkg/Usb/Keyboard.c: Don't request protocol before setting
    
    No need to check the interface protocol then conditionally setting,
    just set it to BOOT_PROTOCOL and check for error.
    
    This is what Linux does for HID devices as some don't follow the USB spec.
    One example is the Aspeed BMC HID keyboard device, which adds a massive
    boot delay without this patch as it doesn't respond to
    'GetProtocolRequest'.
    
    Cc: Hao A Wu <hao.a.wu@intel.com>
    Cc: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Matt DeVillier <matt.devillier@gmail.com>
    Signed-off-by: Patrick Rudolph <patrick.rudolph@9elements.com>
    Signed-off-by: Sean Rhodes <sean@starlabs.systems>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit b422b0fcf92dd4103dfc16d8d5f77fbec2d8c5b9
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Tue Feb 22 11:29:23 2022 +0800

    EmulatorPkg/EmuGopDxe: Set ModeInfo after Open successfully
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2668
    
    WindowOpen will fail in some case. for example, without XServer.
    
    Shouldn't set ModeInfo in this case to avoid the caller use it
    incorrectly
    
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 906242343f7a654402f6f999d447aa9d29a8f4d4
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sun Feb 20 14:53:01 2022 +0800

    MdeModulePkg/GraphicsConsoleDxe: Check status to make sure no error
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2668
    
    SetMode will fail in some case. for example, without XServer.
    Should handle these case when SetMode fail.
    
    If we don't handle it, it will Segmentation fault.
    
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit dc39554d58af4a50b50eca1f57c49415a12b0c98
Author: Xiaolu.Jiang <xiaolu.jiang@intel.com>
Date:   Tue Feb 22 22:14:05 2022 +0800

    edk2/MdeModulePkg/Debuglib: Add Standalone MM support
    
    https://bugzilla.tianocore.org/show_bug.cgi?id=3844
    
    This change added Standalone MM instance of DebugLib.
    
    Reviewd-by: Jian J Wang <jian.j.wang@intel.com>
    Reviewd-by: Liming Gao <gaoliming@byosoft.com.cn>
    
    Signed-off-by: Xiaolu.Jiang <xiaolu.jiang@intel.com>

commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 22:48:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 22:48:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283768.482877 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPuFP-0004RX-1m; Thu, 03 Mar 2022 22:48:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283768.482877; Thu, 03 Mar 2022 22:48:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPuFO-0004RQ-UC; Thu, 03 Mar 2022 22:48:34 +0000
Received: by outflank-mailman (input) for mailman id 283768;
 Thu, 03 Mar 2022 22:48:34 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPuFN-0004RG-Uk; Thu, 03 Mar 2022 22:48:33 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPuFN-0008Pf-Sv; Thu, 03 Mar 2022 22:48:33 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPuFN-0003KP-BD; Thu, 03 Mar 2022 22:48:33 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPuFN-0001LV-Aj; Thu, 03 Mar 2022 22:48:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=dt0Ouk9jlxFDlEa34yiHpvY4VkssYJJM9zhqeCUkNpA=; b=QaYJqIoI0b52aDXfptFPu8NYBR
	zQ9x9Ts5GLLm9fVsQ1fGd0OrIoG5kI0C24p2eRtlthpfOLQbYw4XRKTQcQSP/gs5zzn7UUcKHe9p5
	cISMlk6TcCpyPV8DNTlW4N9gCg3Xv8pA9sNX81/Gt2gSuHQXdkaWgFV2Miog3Vqe952A=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168384-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168384: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=b692523fafb39f5f930e1e8a316f7b8cebc9f62a
X-Osstest-Versions-That:
    xen=3e56754b08871ccceff856ff634731b9b9bccbbe
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 03 Mar 2022 22:48:33 +0000

flight 168384 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168384/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  b692523fafb39f5f930e1e8a316f7b8cebc9f62a
baseline version:
 xen                  3e56754b08871ccceff856ff634731b9b9bccbbe

Last test of basis   168374  2022-03-03 14:00:31 Z    0 days
Testing same since   168384  2022-03-03 20:00:30 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Julien Grall <jgrall@amazon.com>
  Michal Orzel <michal.orzel@arm.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   3e56754b08..b692523faf  b692523fafb39f5f930e1e8a316f7b8cebc9f62a -> smoke


From xen-devel-bounces@lists.xenproject.org Thu Mar 03 22:49:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 03 Mar 2022 22:49:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283778.482888 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPuGN-0004zs-BS; Thu, 03 Mar 2022 22:49:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283778.482888; Thu, 03 Mar 2022 22:49:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPuGN-0004zj-8B; Thu, 03 Mar 2022 22:49:35 +0000
Received: by outflank-mailman (input) for mailman id 283778;
 Thu, 03 Mar 2022 22:49:34 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=tUyt=TO=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nPuGM-0004zV-2Z
 for xen-devel@lists.xenproject.org; Thu, 03 Mar 2022 22:49:34 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 3123fe05-9b44-11ec-8eba-a37418f5ba1a;
 Thu, 03 Mar 2022 23:49:32 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id EF430B826F7;
 Thu,  3 Mar 2022 22:49:31 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id BBF27C004E1;
 Thu,  3 Mar 2022 22:49:29 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3123fe05-9b44-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646347770;
	bh=8T7CokGxWBKJfPW1pG0VCMscny/1l39AXb6Fw4feFiI=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=mDE8XGmJRPXC3FhUExxfC/Tg8r8q5kqje46aVpKcSpgATjCrTOmm8dyL5+N0ARFUl
	 igEkDLka8/5AR112e4UmftTK6LTw6MIVEq72/1WbVxD/BN6jvq1CQNSmYNX2eOZkoM
	 C7Y6r4k/M1DH2K4tAUOZ5dfMEE8n9On9bbDAQYejM/m/pVednlfOiQ+0ILLxk+xuq6
	 0Hivc3idTv5Og15E95hL8KOwRNZ6gfWfd8YTyoWKgbowpFGJ7UwyLwEnr/Ub/zQ8kx
	 OW2VcyhCSn0JN1ypiUZLYah5Kofhllw9xygmCFN3oPTfqf6bSdXRFiDe95KnoglrOU
	 yMQm9xneH86Yg==
Date: Thu, 3 Mar 2022 14:49:29 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Christoph Hellwig <hch@lst.de>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    iommu@lists.linux-foundation.org, x86@kernel.org, 
    Anshuman Khandual <anshuman.khandual@arm.com>, 
    Tom Lendacky <thomas.lendacky@amd.com>, 
    Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>, 
    Boris Ostrovsky <boris.ostrovsky@oracle.com>, 
    Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>, 
    David Woodhouse <dwmw2@infradead.org>, Lu Baolu <baolu.lu@linux.intel.com>, 
    Robin Murphy <robin.murphy@arm.com>, linux-arm-kernel@lists.infradead.org, 
    xen-devel@lists.xenproject.org, linux-ia64@vger.kernel.org, 
    linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, 
    linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org, 
    linux-hyperv@vger.kernel.org, tboot-devel@lists.sourceforge.net, 
    linux-pci@vger.kernel.org
Subject: Re: [PATCH 11/12] swiotlb: merge swiotlb-xen initialization into
 swiotlb
In-Reply-To: <20220303105931.GA15137@lst.de>
Message-ID: <alpine.DEB.2.22.394.2203031447120.3261@ubuntu-linux-20-04-desktop>
References: <20220301105311.885699-1-hch@lst.de> <20220301105311.885699-12-hch@lst.de> <alpine.DEB.2.22.394.2203011720150.3261@ubuntu-linux-20-04-desktop> <20220302081500.GB23075@lst.de> <alpine.DEB.2.22.394.2203021709470.3261@ubuntu-linux-20-04-desktop>
 <20220303105931.GA15137@lst.de>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Thu, 3 Mar 2022, Christoph Hellwig wrote:
> On Wed, Mar 02, 2022 at 05:25:10PM -0800, Stefano Stabellini wrote:
> > Thinking more about it we actually need to drop the xen_initial_domain()
> > check otherwise some cases won't be functional (Dom0 not 1:1 mapped, or
> > DomU 1:1 mapped).
> 
> Hmm, but that would be the case even before this series, right?

Before this series we only have the xen_swiotlb_detect() check in
xen_mm_init, we don't have a second xen_initial_domain() check.

The issue is that this series is adding one more xen_initial_domain()
check in xen_mm_init.


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 00:42:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 00:42:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283813.482917 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPw1R-0002xp-7D; Fri, 04 Mar 2022 00:42:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283813.482917; Fri, 04 Mar 2022 00:42:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPw1R-0002xi-4D; Fri, 04 Mar 2022 00:42:17 +0000
Received: by outflank-mailman (input) for mailman id 283813;
 Fri, 04 Mar 2022 00:42:15 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=zYUj=TP=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nPw1P-0002xc-Kf
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 00:42:15 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org
 [2604:1380:4641:c500::1])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id edb9b855-9b53-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 01:42:13 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id E750E6177D;
 Fri,  4 Mar 2022 00:42:10 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 94612C004E1;
 Fri,  4 Mar 2022 00:42:09 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: edb9b855-9b53-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646354530;
	bh=91yd8BDbH9ezbrRLnR7yo0/bmHOaGueBHaLzLJzSdgo=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=rghmk1Wb9MgzLNnrY8VzADMm7yyxemMO4n7Y9FtkCV01xq5dNlCmTJuZs0iWQli0/
	 UoagOqKTrKq/QR6FSITyjRjF/v3972kHH9gqzTgpiq8/kkb8RHoxaenaZB167AnEBi
	 eLMz5hANts3sim9bX8rt84CP9gDNkQoS4tXv1Zi34iKNsWBzbF29tDsgIHhzE3fzBN
	 I/oO+2jx9YR6c5xy3k3uNV7tSE5VUmVO/v746yfSW5U/d8caFMlzcsuumjeONEaylx
	 uiK922Iy06Qj1Ha1+bFA7lZHVMc/dBHBbZZ3FhRJVGmTu4pkEIw/H7Dw8U5QRXlfgZ
	 P6/08jPwbtOqg==
Date: Thu, 3 Mar 2022 16:42:08 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
cc: xen-devel@lists.xenproject.org, sstabellini@kernel.org, 
    stefanos@xilinx.com, julien@xen.org, Volodymyr_Babchuk@epam.com, 
    bertrand.marquis@arm.com, andrew.cooper3@citrix.com, 
    george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org, 
    roger.pau@citrix.com, Ayan Kumar Halder <ayankuma@xilinx.com>
Subject: Re: [XEN v9 2/4] xen/arm64: io: Support instructions (for which ISS
 is not valid) on emulated MMIO region using MMIO/ioreq handler
In-Reply-To: <20220301124022.10168-3-ayankuma@xilinx.com>
Message-ID: <alpine.DEB.2.22.394.2203031637200.3261@ubuntu-linux-20-04-desktop>
References: <20220301124022.10168-1-ayankuma@xilinx.com> <20220301124022.10168-3-ayankuma@xilinx.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Tue, 1 Mar 2022, Ayan Kumar Halder wrote:
> When an instruction is trapped in Xen due to translation fault, Xen
> checks if the ISS is invalid (for data abort) or it is an instruction
> abort. If so, Xen tries to resolve the translation fault using p2m page
> tables. In case of data abort, Xen will try to map the mmio region to
> the guest (ie tries to emulate the mmio region).
> 
> If the ISS is not valid and it is a data abort, then Xen tries to
> decode the instruction. In case of ioreq, Xen  saves the decoding state,
> rn and imm9 to vcpu_io. Whenever the vcpu handles the ioreq successfully,
> it will read the decoding state to determine if the instruction decoded
> was a ldr/str post indexing (ie INSTR_LDR_STR_POSTINDEXING). If so, it
> uses these details to post increment rn.
> 
> In case of mmio handler, if the mmio operation was successful, then Xen
> retrives the decoding state, rn and imm9. For state ==
> INSTR_LDR_STR_POSTINDEXING, Xen will update rn.
> 
> If there is an error encountered while decoding/executing the instruction,
> Xen will forward the abort to the guest.
> 
> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
> ---
> 
> Changelog :-
> 
> v2..v5 - Mentioned in the cover letter.
> 
> v6 - 1. Mantained the decoding state of the instruction. This is used by the
> caller to either abort the guest or retry or ignore or perform read/write on
> the mmio region.
> 
> 2. try_decode() invokes decoding for both aarch64 and thumb state. (Previously
> it used to invoke decoding only for aarch64 state). Thus, it handles all the
> checking of the registers before invoking any decoding of instruction.
> try_decode_instruction_invalid_iss() has thus been removed.
> 
> 3. Introduced a new field('enum instr_decode_state state') inside
> 'struct instr_details'. This holds the decoding state of the instruction.
> This is later read by the post_increment_register() to determine if rn needs to
> be incremented. Also, this is read by the callers of try_decode_instruction()
> to determine if the instruction was valid or ignored or to be retried or
> error or decoded successfully.
> 
> 4. Also stored 'instr_details' inside 'struct ioreq'. This enables
> arch_ioreq_complete_mmio() to invoke post_increment_register() without decoding
> the instruction again.
> 
> 5. Check hsr.dabt.valid in do_trap_stage2_abort_guest(). If it is not valid,
> then decode the instruction. This ensures that try_handle_mmio() is invoked only
> when the instruction is either valid or decoded successfully.
> 
> 6. Inside do_trap_stage2_abort_guest(), if hsr.dabt.valid is not set, then
> resolve the translation fault before trying to decode the instruction. If
> translation fault is resolved, then return to the guest to execute the instruction
> again.
> 
> 
> v7 - 1. Moved the decoding instruction details ie instr_details from 'struct ioreq'
> to 'struct vcpu_io'.
> 
> 2. The instruction is decoded only when we get a data abort.
> 
> 3. Replaced ASSERT_UNREACHABLE() with domain_crash(). The reason being asserts
> can be disabled in some builds. In this scenario when the guest's cpsr is in an
> erroneous state, Xen should crash the guest.
> 
> 4. Introduced check_p2m() which invokes p2m_resolve_translation_fault() and
> try_map_mmio() to resolve translation fault by configuring the page tables. This
> gets invoked first if ISS is invalid and it is an instruction abort. If it is
> a data abort and hsr.dabt.s1ptw is set or try_handle_mmio() returns IO_UNHANDLED,
> then check_p2m() gets invoked again.
> 
> 
> v8 - 1. Removed the handling of data abort when info->dabt.cache is set. This will
> be implemented in a subsequent patch. (Not as part of this series)
> 
> 2. When the data abort is due to access to stage 1 translation tables, Xen will
> try to fix the mapping of the page table for the corresponding address. If this
> returns an error, Xen will abort the guest. Else, it will ask the guest to retry
> the instruction.
> 
> 3. Changed v->io.info.dabt_instr from pointer to variable. The reason being that
> arch_ioreq_complete_mmio() is called from leave_hypervisor_to_guest().
> That is after do_trap_stage2_abort_guest()  has been invoked. So the original
> variable will be no longer valid.
> 
> 4. Some other style issues pointed out in v7.
> 
> 
> v9 - 1. Ensure that "Erratum 766422" is handled only when ISS is valid.
> 
> 2. Whenever Xen receives and instruction abort or data abort (with invalid ISS),
> Xen should first try to resolve the p2m translation fault or see if it it needs
> to map a MMIO region. If it succeeds, it should return to the guest to retry the
> instruction.
> 
> 3. Removed handling of "dabt.s1ptw == 1" aborts. This is addressed in patch3 as
> it is an existing bug in codebase.
> 
> 4. Various style issues pointed by Julien in v8.
> 
>  xen/arch/arm/arm32/traps.c        | 11 ++++
>  xen/arch/arm/arm64/traps.c        | 47 ++++++++++++++++
>  xen/arch/arm/decode.c             |  1 +
>  xen/arch/arm/include/asm/domain.h |  4 ++
>  xen/arch/arm/include/asm/mmio.h   | 17 +++++-
>  xen/arch/arm/include/asm/traps.h  |  2 +
>  xen/arch/arm/io.c                 | 90 +++++++++++++++++++------------
>  xen/arch/arm/ioreq.c              |  7 ++-
>  xen/arch/arm/traps.c              | 77 ++++++++++++++++++++------
>  xen/arch/x86/include/asm/ioreq.h  |  3 ++
>  xen/include/xen/sched.h           |  2 +
>  11 files changed, 207 insertions(+), 54 deletions(-)
> 
> diff --git a/xen/arch/arm/arm32/traps.c b/xen/arch/arm/arm32/traps.c
> index 9c9790a6d1..159e3cef8b 100644
> --- a/xen/arch/arm/arm32/traps.c
> +++ b/xen/arch/arm/arm32/traps.c
> @@ -18,9 +18,11 @@
>  
>  #include <xen/lib.h>
>  #include <xen/kernel.h>
> +#include <xen/sched.h>
>  
>  #include <public/xen.h>
>  
> +#include <asm/mmio.h>
>  #include <asm/processor.h>
>  #include <asm/traps.h>
>  
> @@ -82,6 +84,15 @@ void do_trap_data_abort(struct cpu_user_regs *regs)
>          do_unexpected_trap("Data Abort", regs);
>  }
>  
> +void post_increment_register(const struct instr_details *instr)
> +{
> +    /*
> +     * We have not implemented decoding of post indexing instructions for 32 bit.
> +     * Thus, this should be unreachable.
> +     */
> +    domain_crash(current->domain);
> +}
> +
>  /*
>   * Local variables:
>   * mode: C
> diff --git a/xen/arch/arm/arm64/traps.c b/xen/arch/arm/arm64/traps.c
> index 9113a15c7a..e18b6b2626 100644
> --- a/xen/arch/arm/arm64/traps.c
> +++ b/xen/arch/arm/arm64/traps.c
> @@ -17,6 +17,7 @@
>   */
>  
>  #include <xen/lib.h>
> +#include <xen/sched.h>
>  
>  #include <asm/hsr.h>
>  #include <asm/system.h>
> @@ -44,6 +45,52 @@ void do_bad_mode(struct cpu_user_regs *regs, int reason)
>      panic("bad mode\n");
>  }
>  
> +void post_increment_register(const struct instr_details *instr)
> +{
> +    struct cpu_user_regs *regs = guest_cpu_user_regs();
> +    register_t val = 0;
> +
> +    /* Currently, we handle only ldr/str post indexing instructions */
> +    if ( instr->state != INSTR_LDR_STR_POSTINDEXING )
> +        return;
> +
> +    /*
> +     * Handle when rn = SP
> +     * Refer ArmV8 ARM DDI 0487G.b, Page - D1-2463 "Stack pointer register
> +     * selection"
> +     * t = SP_EL0
> +     * h = SP_ELx
> +     * and M[3:0] (Page - C5-474 "When exception taken from AArch64 state:")
> +     */
> +    if (instr->rn == 31 )
> +    {
> +        if ( (regs->cpsr & PSR_MODE_MASK) == PSR_MODE_EL1h )
> +            val = regs->sp_el1;
> +        else if ( ((regs->cpsr & PSR_MODE_MASK) == PSR_MODE_EL1t) ||
> +                    ((regs->cpsr & PSR_MODE_MASK) == PSR_MODE_EL0t) )
> +            val = regs->sp_el0;
> +        else
> +        {
> +            domain_crash(current->domain);
> +            return;
> +        }
> +    }
> +    else
> +        val = get_user_reg(regs, instr->rn);
> +
> +    val += instr->imm9;
> +
> +    if ( instr->rn == 31 )
> +    {
> +        if ( (regs->cpsr & PSR_MODE_MASK) == PSR_MODE_EL1h )
> +            regs->sp_el1 = val;
> +        else
> +            regs->sp_el0 = val;
> +    }
> +    else
> +        set_user_reg(regs, instr->rn, val);
> +}
> +
>  /*
>   * Local variables:
>   * mode: C
> diff --git a/xen/arch/arm/decode.c b/xen/arch/arm/decode.c
> index 3add87e83a..16ad0747bb 100644
> --- a/xen/arch/arm/decode.c
> +++ b/xen/arch/arm/decode.c
> @@ -146,6 +146,7 @@ static int decode_arm64(register_t pc, mmio_info_t *info)
>  
>      update_dabt(dabt, opcode.ldr_str.rt, opcode.ldr_str.size, false);
>  
> +    dabt_instr->state = INSTR_LDR_STR_POSTINDEXING;
>      dabt_instr->rn = opcode.ldr_str.rn;
>      dabt_instr->imm9 = opcode.ldr_str.imm9;
>  
> diff --git a/xen/arch/arm/include/asm/domain.h b/xen/arch/arm/include/asm/domain.h
> index c56f6e4398..ed63c2b6f9 100644
> --- a/xen/arch/arm/include/asm/domain.h
> +++ b/xen/arch/arm/include/asm/domain.h
> @@ -281,6 +281,10 @@ static inline void arch_vcpu_block(struct vcpu *v) {}
>  /* vPCI is not available on Arm */
>  #define has_vpci(d)    ({ (void)(d); false; })
>  
> +struct arch_vcpu_io {
> +    struct instr_details dabt_instr; /* when the instruction is decoded */
> +};
> +
>  #endif /* __ASM_DOMAIN_H__ */
>  
>  /*
> diff --git a/xen/arch/arm/include/asm/mmio.h b/xen/arch/arm/include/asm/mmio.h
> index 3354d9c635..ef2c57a2d5 100644
> --- a/xen/arch/arm/include/asm/mmio.h
> +++ b/xen/arch/arm/include/asm/mmio.h
> @@ -26,12 +26,24 @@
>  
>  #define MAX_IO_HANDLER  16
>  
> +enum instr_decode_state
> +{
> +    INSTR_ERROR,                    /* Error encountered while decoding instr */
> +    INSTR_VALID,                    /* ISS is valid, so no need to decode */
> +    /*
> +     * Instruction is decoded successfully. It is a ldr/str post indexing
> +     * instruction.
> +     */
> +    INSTR_LDR_STR_POSTINDEXING
> +};
> +
>  typedef struct
>  {
>      struct hsr_dabt dabt;
>      struct instr_details {
>          unsigned long rn:5;
>          signed int imm9:9;
> +        enum instr_decode_state state;
>      } dabt_instr;
>      paddr_t gpa;
>  } mmio_info_t;
> @@ -69,14 +81,15 @@ struct vmmio {
>  };
>  
>  enum io_state try_handle_mmio(struct cpu_user_regs *regs,
> -                              const union hsr hsr,
> -                              paddr_t gpa);
> +                              mmio_info_t *info);
>  void register_mmio_handler(struct domain *d,
>                             const struct mmio_handler_ops *ops,
>                             paddr_t addr, paddr_t size, void *priv);
>  int domain_io_init(struct domain *d, int max_count);
>  void domain_io_free(struct domain *d);
>  
> +void try_decode_instruction(const struct cpu_user_regs *regs,
> +                            mmio_info_t *info);
>  
>  #endif  /* __ASM_ARM_MMIO_H__ */
>  
> diff --git a/xen/arch/arm/include/asm/traps.h b/xen/arch/arm/include/asm/traps.h
> index 2ed2b85c6f..95c46ad391 100644
> --- a/xen/arch/arm/include/asm/traps.h
> +++ b/xen/arch/arm/include/asm/traps.h
> @@ -109,6 +109,8 @@ static inline register_t sign_extend(const struct hsr_dabt dabt, register_t r)
>      return r;
>  }
>  
> +void post_increment_register(const struct instr_details *instr);
> +
>  #endif /* __ASM_ARM_TRAPS__ */
>  /*
>   * Local variables:
> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
> index fad103bdbd..bea69ffb08 100644
> --- a/xen/arch/arm/io.c
> +++ b/xen/arch/arm/io.c
> @@ -102,57 +102,79 @@ static const struct mmio_handler *find_mmio_handler(struct domain *d,
>      return handler;
>  }
>  
> +void try_decode_instruction(const struct cpu_user_regs *regs,
> +                            mmio_info_t *info)
> +{
> +    int rc;
> +
> +    if ( info->dabt.valid )
> +    {
> +        info->dabt_instr.state = INSTR_VALID;
> +
> +        /*
> +         * Erratum 766422: Thumb store translation fault to Hypervisor may
> +         * not have correct HSR Rt value.
> +         */
> +        if ( check_workaround_766422() && (regs->cpsr & PSR_THUMB) &&
> +             info->dabt.write )
> +        {
> +            rc = decode_instruction(regs, info);
> +            if ( rc )
> +            {
> +                gprintk(XENLOG_DEBUG, "Unable to decode instruction\n");
> +                info->dabt_instr.state = INSTR_ERROR;
> +            }
> +        }
> +        return;
> +    }
> +
> +    /*
> +     * Armv8 processor does not provide a valid syndrome for decoding some
> +     * instructions. So in order to process these instructions, Xen must
> +     * decode them.
> +     */
> +    rc = decode_instruction(regs, info);
> +    if ( rc )
> +    {
> +        gprintk(XENLOG_ERR, "Unable to decode instruction\n");
> +        info->dabt_instr.state = INSTR_ERROR;
> +    }
> +}
> +
>  enum io_state try_handle_mmio(struct cpu_user_regs *regs,
> -                              const union hsr hsr,
> -                              paddr_t gpa)
> +                              mmio_info_t *info)
>  {
>      struct vcpu *v = current;
>      const struct mmio_handler *handler = NULL;
> -    const struct hsr_dabt dabt = hsr.dabt;
> -    mmio_info_t info = {
> -        .gpa = gpa,
> -        .dabt = dabt
> -    };
> +    int rc;
>  
> -    ASSERT(hsr.ec == HSR_EC_DATA_ABORT_LOWER_EL);
> +    ASSERT(info->dabt.ec == HSR_EC_DATA_ABORT_LOWER_EL);
>  
> -    handler = find_mmio_handler(v->domain, info.gpa);
> -    if ( !handler )
> +    if ( !((info->dabt_instr.state == INSTR_VALID) || (info->dabt_instr.state == INSTR_LDR_STR_POSTINDEXING)) )
>      {
> -        int rc;
> +        ASSERT_UNREACHABLE();
> +        return IO_ABORT;
> +    }
>  
> -        rc = try_fwd_ioserv(regs, v, &info);
> +    handler = find_mmio_handler(v->domain, info->gpa);
> +    if ( !handler )
> +    {
> +        rc = try_fwd_ioserv(regs, v, info);
>          if ( rc == IO_HANDLED )
>              return handle_ioserv(regs, v);
>  
>          return rc;
>      }
>  
> -    /* All the instructions used on emulated MMIO region should be valid */
> -    if ( !dabt.valid )
> -        return IO_ABORT;
> -
>      /*
> -     * Erratum 766422: Thumb store translation fault to Hypervisor may
> -     * not have correct HSR Rt value.
> +     * At this point, we know that the instruction is either valid or has been
> +     * decoded successfully. Thus, Xen should be allowed to execute the
> +     * instruction on the emulated MMIO region.
>       */
> -    if ( check_workaround_766422() && (regs->cpsr & PSR_THUMB) &&
> -         dabt.write )
> -    {
> -        int rc;
> -
> -        rc = decode_instruction(regs, &info);
> -        if ( rc )
> -        {
> -            gprintk(XENLOG_DEBUG, "Unable to decode instruction\n");
> -            return IO_ABORT;
> -        }
> -    }
> -
> -    if ( info.dabt.write )
> -        return handle_write(handler, v, &info);
> +    if ( info->dabt.write )
> +        return handle_write(handler, v, info);
>      else
> -        return handle_read(handler, v, &info);
> +        return handle_read(handler, v, info);
>  }
>  
>  void register_mmio_handler(struct domain *d,
> diff --git a/xen/arch/arm/ioreq.c b/xen/arch/arm/ioreq.c
> index 308650b400..58cd320b5a 100644
> --- a/xen/arch/arm/ioreq.c
> +++ b/xen/arch/arm/ioreq.c
> @@ -47,6 +47,7 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
>                               struct vcpu *v, mmio_info_t *info)
>  {
>      struct vcpu_io *vio = &v->io;
> +    struct dabt_instr instr = info->dabt_instr;
>      ioreq_t p = {
>          .type = IOREQ_TYPE_COPY,
>          .addr = info->gpa,
> @@ -76,10 +77,10 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
>      if ( !s )
>          return IO_UNHANDLED;
>  
> -    if ( !info->dabt.valid )
> -        return IO_ABORT;
> +    ASSERT(dabt.valid);

I cannot see where we set dabt.valid on successfully decoding the
instruction. It looks like we don't? If we don't, then here the ASSERT
would fail in case of postindexing instructions, right?

If we don't, then we should probably just get rid of this ASSERT: it is
not worth setting dabt.valid just so that this ASSERT would succeed.


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 00:42:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 00:42:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283814.482928 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPw1X-0003EW-GI; Fri, 04 Mar 2022 00:42:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283814.482928; Fri, 04 Mar 2022 00:42:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPw1X-0003EP-DC; Fri, 04 Mar 2022 00:42:23 +0000
Received: by outflank-mailman (input) for mailman id 283814;
 Fri, 04 Mar 2022 00:42:22 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=zYUj=TP=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nPw1W-0003DQ-5O
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 00:42:22 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f1f9fd18-9b53-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 01:42:19 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 332676177D;
 Fri,  4 Mar 2022 00:42:18 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id ED5E6C004E1;
 Fri,  4 Mar 2022 00:42:16 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f1f9fd18-9b53-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646354537;
	bh=ZDB08+ECB5jD9NpqXJNH0x0wvQ3wKp8H37yC1xF25rY=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=Y176NAlWeDZz0SVGObSgMZ4uwdRozdomBhO8EHbKaIEJsIxmtjzmBYqKH2NguSbqf
	 EJ754fbyFRBKHNRe4MD3NkIXL5RC0XrYvtVGbke9iBwKvIC/PwdPYrPNxmrisin3c3
	 QVwVYltcKatCnPUWNyrfC99VqqFeg7cVvatmuu/AACNf5R7EhDBexzdbxDzQPWvGtY
	 /YzDifGabMx5nt5jUQr0SFMqDcqpQmTTp/V279OP89N0O6zTiwBgg7pNEooEPz3+9b
	 BcSeUCliGg7+ecBCYJroDOJblQhdqQlUa9Ag1OTaORMahHko9HqR7sdMsc6Wx10Mf5
	 PBHkuL3xT5/lA==
Date: Thu, 3 Mar 2022 16:42:16 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
cc: xen-devel@lists.xenproject.org, sstabellini@kernel.org, 
    stefanos@xilinx.com, julien@xen.org, Volodymyr_Babchuk@epam.com, 
    bertrand.marquis@arm.com, andrew.cooper3@citrix.com, 
    george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org, 
    roger.pau@citrix.com, Ayan Kumar Halder <ayankuma@xilinx.com>
Subject: Re: [XEN v9 1/4] xen/arm64: Decode ldr/str post increment
 operations
In-Reply-To: <20220301124022.10168-2-ayankuma@xilinx.com>
Message-ID: <alpine.DEB.2.22.394.2203031626190.3261@ubuntu-linux-20-04-desktop>
References: <20220301124022.10168-1-ayankuma@xilinx.com> <20220301124022.10168-2-ayankuma@xilinx.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Tue, 1 Mar 2022, Ayan Kumar Halder wrote:
> At the moment, Xen does not decode any of the arm64 instructions. This
> means that when hsr_dabt.isv == 0, Xen cannot handle those instructions.
> This will lead to Xen to abort the guests (from which those instructions
> originate).
> 
> With this patch, Xen is able to decode ldr/str post indexing instructions.
> These are a subset of instructions for which hsr_dabt.isv == 0.
> 
> The following instructions are now supported by Xen :-
> 1.      ldr     x2,    [x1],    #8
> 2.      ldr     w2,    [x1],    #-4
> 3.      ldr     x2,    [x1],    #-8
> 4.      ldr     w2,    [x1],    #4
> 5.      ldrh    w2,    [x1],    #2
> 6.      ldrb    w2,    [x1],    #1
> 7.      str     x2,    [x1],    #8
> 8.      str     w2,    [x1],    #-4
> 9.      strh    w2,    [x1],    #2
> 10.     strb    w2,    [x1],    #1
> 
> In the subsequent patch, decode_arm64() will get invoked when
> hsr_dabt.isv == 0.
> 
> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>

Reviewed-by: Stefano Stabellini <sstabellini@kernel.org>


> ---
> 
> Changelog :-
> 
> v2..v5 - Mentioned in the cover letter.
> 
> v6 - 1. Fixed the code style issues as mentioned in v5.
> 
> v7 - No change.
> 
> v8 - 1. Removed some un-necessary header files inclusion.
>      2. Some style changes pointed out in v7.
> 
> v9 - 1. Rebased on top of the master.
>      2. Renamed psr_mode_is_32bit to regs_mode_is_32bit.
> 
>  xen/arch/arm/decode.c           | 79 ++++++++++++++++++++++++++++++++-
>  xen/arch/arm/decode.h           | 48 +++++++++++++++++---
>  xen/arch/arm/include/asm/mmio.h |  4 ++
>  xen/arch/arm/io.c               |  2 +-
>  4 files changed, 124 insertions(+), 9 deletions(-)
> 
> diff --git a/xen/arch/arm/decode.c b/xen/arch/arm/decode.c
> index 792c2e92a7..3add87e83a 100644
> --- a/xen/arch/arm/decode.c
> +++ b/xen/arch/arm/decode.c
> @@ -84,6 +84,78 @@ bad_thumb2:
>      return 1;
>  }
>  
> +static int decode_arm64(register_t pc, mmio_info_t *info)
> +{
> +    union instr opcode = {0};
> +    struct hsr_dabt *dabt = &info->dabt;
> +    struct instr_details *dabt_instr = &info->dabt_instr;
> +
> +    if ( raw_copy_from_guest(&opcode.value, (void * __user)pc, sizeof (opcode)) )
> +    {
> +        gprintk(XENLOG_ERR, "Could not copy the instruction from PC\n");
> +        return 1;
> +    }
> +
> +    /*
> +     * Refer Arm v8 ARM DDI 0487G.b, Page - C6-1107
> +     * "Shared decode for all encodings" (under ldr immediate)
> +     * If n == t && n != 31, then the return value is implementation defined
> +     * (can be WBSUPPRESS, UNKNOWN, UNDEFINED or NOP). Thus, we do not support
> +     * this. This holds true for ldrb/ldrh immediate as well.
> +     *
> +     * Also refer, Page - C6-1384, the above described behaviour is same for
> +     * str immediate. This holds true for strb/strh immediate as well
> +     */
> +    if ( (opcode.ldr_str.rn == opcode.ldr_str.rt) && (opcode.ldr_str.rn != 31) )
> +    {
> +        gprintk(XENLOG_ERR, "Rn should not be equal to Rt except for r31\n");
> +        goto bad_loadstore;
> +    }
> +
> +    /* First, let's check for the fixed values */
> +    if ( (opcode.value & POST_INDEX_FIXED_MASK) != POST_INDEX_FIXED_VALUE )
> +    {
> +        gprintk(XENLOG_ERR,
> +                "Decoding instruction 0x%x is not supported\n", opcode.value);
> +        goto bad_loadstore;
> +    }
> +
> +    if ( opcode.ldr_str.v != 0 )
> +    {
> +        gprintk(XENLOG_ERR,
> +                "ldr/str post indexing for vector types are not supported\n");
> +        goto bad_loadstore;
> +    }
> +
> +    /* Check for STR (immediate) */
> +    if ( opcode.ldr_str.opc == 0 )
> +        dabt->write = 1;
> +    /* Check for LDR (immediate) */
> +    else if ( opcode.ldr_str.opc == 1 )
> +        dabt->write = 0;
> +    else
> +    {
> +        gprintk(XENLOG_ERR,
> +                "Decoding ldr/str post indexing is not supported for this variant\n");
> +        goto bad_loadstore;
> +    }
> +
> +    gprintk(XENLOG_INFO,
> +            "opcode->ldr_str.rt = 0x%x, opcode->ldr_str.size = 0x%x, opcode->ldr_str.imm9 = %d\n",
> +            opcode.ldr_str.rt, opcode.ldr_str.size, opcode.ldr_str.imm9);
> +
> +    update_dabt(dabt, opcode.ldr_str.rt, opcode.ldr_str.size, false);
> +
> +    dabt_instr->rn = opcode.ldr_str.rn;
> +    dabt_instr->imm9 = opcode.ldr_str.imm9;
> +
> +    return 0;
> +
> + bad_loadstore:
> +    gprintk(XENLOG_ERR, "unhandled Arm instruction 0x%x\n", opcode.value);
> +    return 1;
> +}
> +
>  static int decode_thumb(register_t pc, struct hsr_dabt *dabt)
>  {
>      uint16_t instr;
> @@ -150,10 +222,13 @@ bad_thumb:
>      return 1;
>  }
>  
> -int decode_instruction(const struct cpu_user_regs *regs, struct hsr_dabt *dabt)
> +int decode_instruction(const struct cpu_user_regs *regs, mmio_info_t *info)
>  {
>      if ( is_32bit_domain(current->domain) && regs->cpsr & PSR_THUMB )
> -        return decode_thumb(regs->pc, dabt);
> +        return decode_thumb(regs->pc, &info->dabt);
> +
> +    if ( !regs_mode_is_32bit(regs) )
> +        return decode_arm64(regs->pc, info);
>  
>      /* TODO: Handle ARM instruction */
>      gprintk(XENLOG_ERR, "unhandled ARM instruction\n");
> diff --git a/xen/arch/arm/decode.h b/xen/arch/arm/decode.h
> index 4613763bdb..13db8ac968 100644
> --- a/xen/arch/arm/decode.h
> +++ b/xen/arch/arm/decode.h
> @@ -23,19 +23,55 @@
>  #include <asm/regs.h>
>  #include <asm/processor.h>
>  
> -/**
> +/*
> + * Refer to the ARMv8 ARM (DDI 0487G.b), Section C4.1.4 Loads and Stores
> + * Page 318 specifies the following bit pattern for
> + * "load/store register (immediate post-indexed)".
> + *
> + * 31 30 29  27 26 25  23   21 20              11   9         4       0
> + * ___________________________________________________________________
> + * |size|1 1 1 |V |0 0 |opc |0 |      imm9     |0 1 |  Rn     |  Rt   |
> + * |____|______|__|____|____|__|_______________|____|_________|_______|
> + */
> +union instr {
> +    uint32_t value;
> +    struct {
> +        unsigned int rt:5;     /* Rt register */
> +        unsigned int rn:5;     /* Rn register */
> +        unsigned int fixed1:2; /* value == 01b */
> +        signed int imm9:9;     /* imm9 */
> +        unsigned int fixed2:1; /* value == 0b */
> +        unsigned int opc:2;    /* opc */
> +        unsigned int fixed3:2; /* value == 00b */
> +        unsigned int v:1;      /* vector */
> +        unsigned int fixed4:3; /* value == 111b */
> +        unsigned int size:2;   /* size */
> +    } ldr_str;
> +};
> +
> +#define POST_INDEX_FIXED_MASK   0x3B200C00
> +#define POST_INDEX_FIXED_VALUE  0x38000400
> +
> +/*
>   * Decode an instruction from pc
> - * /!\ This function is not intended to fully decode an instruction. It
> - * considers that the instruction is valid.
> + * /!\ This function is intended to decode an instruction. It considers that the
> + * instruction is valid.
>   *
> - * This function will get:
> - *  - The transfer register
> + * In case of thumb mode, this function will get:
> + *  - The transfer register (ie Rt)
>   *  - Sign bit
>   *  - Size
> + *
> + * In case of arm64 mode, this function will get:
> + * - The transfer register (ie Rt)
> + * - The source register (ie Rn)
> + * - Size
> + * - Immediate offset
> + * - Read or write
>   */
>  
>  int decode_instruction(const struct cpu_user_regs *regs,
> -                       struct hsr_dabt *dabt);
> +                       mmio_info_t *info);
>  
>  #endif /* __ARCH_ARM_DECODE_H_ */
>  
> diff --git a/xen/arch/arm/include/asm/mmio.h b/xen/arch/arm/include/asm/mmio.h
> index 7ab873cb8f..3354d9c635 100644
> --- a/xen/arch/arm/include/asm/mmio.h
> +++ b/xen/arch/arm/include/asm/mmio.h
> @@ -29,6 +29,10 @@
>  typedef struct
>  {
>      struct hsr_dabt dabt;
> +    struct instr_details {
> +        unsigned long rn:5;
> +        signed int imm9:9;
> +    } dabt_instr;
>      paddr_t gpa;
>  } mmio_info_t;
>  
> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
> index 1a066f9ae5..fad103bdbd 100644
> --- a/xen/arch/arm/io.c
> +++ b/xen/arch/arm/io.c
> @@ -141,7 +141,7 @@ enum io_state try_handle_mmio(struct cpu_user_regs *regs,
>      {
>          int rc;
>  
> -        rc = decode_instruction(regs, &info.dabt);
> +        rc = decode_instruction(regs, &info);
>          if ( rc )
>          {
>              gprintk(XENLOG_DEBUG, "Unable to decode instruction\n");
> -- 
> 2.17.1
> 


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 01:01:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 01:01:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283830.482939 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPwK9-0000gC-89; Fri, 04 Mar 2022 01:01:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283830.482939; Fri, 04 Mar 2022 01:01:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPwK9-0000fK-4t; Fri, 04 Mar 2022 01:01:37 +0000
Received: by outflank-mailman (input) for mailman id 283830;
 Fri, 04 Mar 2022 01:01:36 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPwK7-0000Ax-US; Fri, 04 Mar 2022 01:01:35 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPwK7-00085H-Ro; Fri, 04 Mar 2022 01:01:35 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPwK7-0000Me-FS; Fri, 04 Mar 2022 01:01:35 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPwK7-0004pr-Ey; Fri, 04 Mar 2022 01:01:35 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=+GN5GPWHzguX1T9SguwzbhNlLMF5zEgP1oGxPLqe+yo=; b=HKz/Wu1pOYKWVFnGCk8Je40/wd
	AWC4X8eAYrmhw5/ZkVhelmcH9sYnMpA9RMNAshmQFeGJwrhN/ftXWA6i/Wj5CrXOfGBYIvkow0i7L
	Ut8KWfKiQx5Bcm35HhcaJYJ/AD6vpPknEs0EFkXoU/io3GR0ezVySAau+Rl/Y5ZMSH6E=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168385-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168385: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=589d51df260465e2561979b8a988e77b0f32a6e8
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 04 Mar 2022 01:01:35 +0000

flight 168385 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168385/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 589d51df260465e2561979b8a988e77b0f32a6e8
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    3 days
Failing since        168258  2022-03-01 01:55:31 Z    2 days   27 attempts
Testing same since   168359  2022-03-03 10:41:39 Z    0 days    7 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 589d51df260465e2561979b8a988e77b0f32a6e8
Author: Sean Rhodes <sean@starlabs.systems>
Date:   Thu Feb 24 19:38:18 2022 +0800

    MdeModulePkg/Usb/Keyboard.c: Don't request protocol before setting
    
    No need to check the interface protocol then conditionally setting,
    just set it to BOOT_PROTOCOL and check for error.
    
    This is what Linux does for HID devices as some don't follow the USB spec.
    One example is the Aspeed BMC HID keyboard device, which adds a massive
    boot delay without this patch as it doesn't respond to
    'GetProtocolRequest'.
    
    Cc: Hao A Wu <hao.a.wu@intel.com>
    Cc: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Matt DeVillier <matt.devillier@gmail.com>
    Signed-off-by: Patrick Rudolph <patrick.rudolph@9elements.com>
    Signed-off-by: Sean Rhodes <sean@starlabs.systems>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit b422b0fcf92dd4103dfc16d8d5f77fbec2d8c5b9
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Tue Feb 22 11:29:23 2022 +0800

    EmulatorPkg/EmuGopDxe: Set ModeInfo after Open successfully
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2668
    
    WindowOpen will fail in some case. for example, without XServer.
    
    Shouldn't set ModeInfo in this case to avoid the caller use it
    incorrectly
    
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 906242343f7a654402f6f999d447aa9d29a8f4d4
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sun Feb 20 14:53:01 2022 +0800

    MdeModulePkg/GraphicsConsoleDxe: Check status to make sure no error
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2668
    
    SetMode will fail in some case. for example, without XServer.
    Should handle these case when SetMode fail.
    
    If we don't handle it, it will Segmentation fault.
    
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit dc39554d58af4a50b50eca1f57c49415a12b0c98
Author: Xiaolu.Jiang <xiaolu.jiang@intel.com>
Date:   Tue Feb 22 22:14:05 2022 +0800

    edk2/MdeModulePkg/Debuglib: Add Standalone MM support
    
    https://bugzilla.tianocore.org/show_bug.cgi?id=3844
    
    This change added Standalone MM instance of DebugLib.
    
    Reviewd-by: Jian J Wang <jian.j.wang@intel.com>
    Reviewd-by: Liming Gao <gaoliming@byosoft.com.cn>
    
    Signed-off-by: Xiaolu.Jiang <xiaolu.jiang@intel.com>

commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 01:13:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 01:13:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283841.482950 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPwVW-0001a6-At; Fri, 04 Mar 2022 01:13:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283841.482950; Fri, 04 Mar 2022 01:13:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPwVW-0001Zz-7i; Fri, 04 Mar 2022 01:13:22 +0000
Received: by outflank-mailman (input) for mailman id 283841;
 Fri, 04 Mar 2022 01:13:20 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPwVU-0001Zp-TV; Fri, 04 Mar 2022 01:13:20 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPwVU-0004mH-Og; Fri, 04 Mar 2022 01:13:20 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPwVU-0000i4-8F; Fri, 04 Mar 2022 01:13:20 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPwVU-00084I-7o; Fri, 04 Mar 2022 01:13:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=BYXsDvSPVeqP20yHN8nHNQLDapTRBDYkF+IB4+djQGI=; b=Z55pJVTfICJGI1Er1mPFJO4GgK
	mP8EecCzio/XX9yorz5nPhBDGPqYIOfqIvB7RLCGbrwGtWVQDp4h1vMY9Nf4ekSVV9JqMcO2Ge0EN
	uuj9uPKNnMt0HOfW5iy+pgkH46ZC39xPn1LBl8dsYqrnN2GAvrmXJqovCqh0s9Vtdn1k=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168369-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168369: regressions - FAIL
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:debian-hvm-install:fail:regression
    xen-unstable:test-amd64-amd64-xl-credit2:guest-localmigrate/x10:fail:heisenbug
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=4b7fd8153ddfe95d6d427ff241abb6fdf37e027b
X-Osstest-Versions-That:
    xen=faecea18d252f97c6ad41f0f457566ff2c125b8d
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 04 Mar 2022 01:13:20 +0000

flight 168369 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168369/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm 12 debian-hvm-install fail REGR. vs. 168328

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-credit2  20 guest-localmigrate/x10     fail pass in 168349

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168328
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168328
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168328
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168328
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168328
 test-armhf-armhf-xl-rtds     18 guest-start/debian.repeat    fail  like 168328
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168328
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168328
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168328
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168328
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168328
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168328
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168328
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  4b7fd8153ddfe95d6d427ff241abb6fdf37e027b
baseline version:
 xen                  faecea18d252f97c6ad41f0f457566ff2c125b8d

Last test of basis   168328  2022-03-02 08:41:59 Z    1 days
Testing same since   168349  2022-03-02 21:07:18 Z    1 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Jan Beulich <jbeulich@suse.com>
  Juergen Gross <jgross@suse.com>
  Julien Grall <jgrall@amazon.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 fail    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  fail    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 4b7fd8153ddfe95d6d427ff241abb6fdf37e027b
Author: Jan Beulich <jbeulich@suse.com>
Date:   Wed Mar 2 09:29:55 2022 +0100

    x86: fold sections in final binaries
    
    Especially when linking a PE binary (xen.efi), standalone output
    sections are expensive: Often the linker will align the subsequent one
    on the section alignment boundary (2Mb) when the linker script doesn't
    otherwise place it. (I haven't been able to derive from observed
    behavior under what conditions it would not do so.)
    
    With gcov enabled (and with gcc11) I'm observing enough sections that,
    as of quite recently, the resulting image doesn't fit in 16Mb anymore,
    failing the final ASSERT() in the linker script. (That assertion is
    slated to go away, but that's a separate change.)
    
    Any destructor related sections can be discarded, as we never "exit"
    the hypervisor. This includes .text.exit, which is referenced from
    .dtors.*. Constructor related sections need to all be taken care of, not
    just those with historically used names: .ctors.* and .text.startup is
    what gcc11 populates. While there re-arrange ordering / sorting to match
    that used by the linker provided scripts.
    
    Finally, for xen.efi only, also discard .note.gnu.*. These are
    meaningless in a PE binary. Quite likely, while not meaningless there,
    the section is also of no use in ELF, but keep it there for now.
    
    Signed-off-by: Jan Beulich <jbeulich@suse.com>
    Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>

commit 97b80c7881b36ddb13e535d4e9af0eef2e7f24ec
Author: Jan Beulich <jbeulich@suse.com>
Date:   Wed Mar 2 09:28:51 2022 +0100

    x86/altcall: silence undue warning
    
    Suitable compiler options are passed only when the actual feature
    (XEN_IBT) is enabled, not when merely the compiler capability was found
    to be available.
    
    Fixes: 12e3410e071e ("x86/altcall: Check and optimise altcall targets")
    Signed-off-by: Jan Beulich <jbeulich@suse.com>
    Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>

commit da5827fff31c401132879130398a974a18befacb
Author: Jan Beulich <jbeulich@suse.com>
Date:   Wed Mar 2 09:28:06 2022 +0100

    docs: correct "gnttab=" documented default
    
    Defaults differ for Arm and x86, not the least because of v2 not even
    being security supported on Arm.
    
    Also drop a bogus sentence from gnttab_max_maptrack_frames, which was
    presumably mistakenly cloned from gnttab_max_frames (albeit even there
    what is being said is neither very precise nor very useful imo).
    
    Signed-off-by: Jan Beulich <jbeulich@suse.com>
    Acked-by: Julien Grall <jgrall@amazon.com>

commit 5e326b61693c0a4633fdc2bf8a896857a2733e90
Author: Juergen Gross <jgross@suse.com>
Date:   Wed Mar 2 09:27:19 2022 +0100

    docs: document patch rules
    
    Add a document to describe the rules for sending a proper patch.
    
    As it contains all the information already being present in
    docs/process/tags.pandoc remove that file.
    
    The "Reviewed-by:" and "Acked-by:" tags are expanded to allow an
    optional restriction of the tag.
    
    A new tag "Origin:" is added to tag patches taken from another project.
    
    Signed-off-by: Juergen Gross <jgross@suse.com>
    Acked-by: Jan Beulich <jbeulich@suse.com>
    Reviewed-by: Julien Grall <jgrall@amazon.com>
(qemu changes not included)


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 01:41:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 01:41:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283855.482961 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPwww-0005QV-MH; Fri, 04 Mar 2022 01:41:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283855.482961; Fri, 04 Mar 2022 01:41:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPwww-0005QN-Ih; Fri, 04 Mar 2022 01:41:42 +0000
Received: by outflank-mailman (input) for mailman id 283855;
 Fri, 04 Mar 2022 01:41:42 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPwww-0005QE-7d; Fri, 04 Mar 2022 01:41:42 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPwww-0005GU-4M; Fri, 04 Mar 2022 01:41:42 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPwwv-0001xF-Nd; Fri, 04 Mar 2022 01:41:41 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPwwv-0007sw-NA; Fri, 04 Mar 2022 01:41:41 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=+qMUt3MjZQnZhhF80fOU4yxDo9WCZK5BzkgfQ/33VQA=; b=BJCljkyJbY4tvyBPLehbmW5o8F
	WNqyc+/NiZMgF/qMpmNCmBrB+UmMe8iUbevscKu6Vp9RLXW20pYTGJQ5EVB8dMoW8ZG3RaXT/EFJB
	cLboIonwJJhPE8n5QPZrDtwd/5AIjXikZTgCfmo1wqkdVjE45KVcZKNZGMsCaxyavffg=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168387-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168387: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=589d51df260465e2561979b8a988e77b0f32a6e8
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 04 Mar 2022 01:41:41 +0000

flight 168387 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168387/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 589d51df260465e2561979b8a988e77b0f32a6e8
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    3 days
Failing since        168258  2022-03-01 01:55:31 Z    2 days   28 attempts
Testing same since   168359  2022-03-03 10:41:39 Z    0 days    8 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 589d51df260465e2561979b8a988e77b0f32a6e8
Author: Sean Rhodes <sean@starlabs.systems>
Date:   Thu Feb 24 19:38:18 2022 +0800

    MdeModulePkg/Usb/Keyboard.c: Don't request protocol before setting
    
    No need to check the interface protocol then conditionally setting,
    just set it to BOOT_PROTOCOL and check for error.
    
    This is what Linux does for HID devices as some don't follow the USB spec.
    One example is the Aspeed BMC HID keyboard device, which adds a massive
    boot delay without this patch as it doesn't respond to
    'GetProtocolRequest'.
    
    Cc: Hao A Wu <hao.a.wu@intel.com>
    Cc: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Matt DeVillier <matt.devillier@gmail.com>
    Signed-off-by: Patrick Rudolph <patrick.rudolph@9elements.com>
    Signed-off-by: Sean Rhodes <sean@starlabs.systems>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit b422b0fcf92dd4103dfc16d8d5f77fbec2d8c5b9
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Tue Feb 22 11:29:23 2022 +0800

    EmulatorPkg/EmuGopDxe: Set ModeInfo after Open successfully
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2668
    
    WindowOpen will fail in some case. for example, without XServer.
    
    Shouldn't set ModeInfo in this case to avoid the caller use it
    incorrectly
    
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 906242343f7a654402f6f999d447aa9d29a8f4d4
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sun Feb 20 14:53:01 2022 +0800

    MdeModulePkg/GraphicsConsoleDxe: Check status to make sure no error
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2668
    
    SetMode will fail in some case. for example, without XServer.
    Should handle these case when SetMode fail.
    
    If we don't handle it, it will Segmentation fault.
    
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit dc39554d58af4a50b50eca1f57c49415a12b0c98
Author: Xiaolu.Jiang <xiaolu.jiang@intel.com>
Date:   Tue Feb 22 22:14:05 2022 +0800

    edk2/MdeModulePkg/Debuglib: Add Standalone MM support
    
    https://bugzilla.tianocore.org/show_bug.cgi?id=3844
    
    This change added Standalone MM instance of DebugLib.
    
    Reviewd-by: Jian J Wang <jian.j.wang@intel.com>
    Reviewd-by: Liming Gao <gaoliming@byosoft.com.cn>
    
    Signed-off-by: Xiaolu.Jiang <xiaolu.jiang@intel.com>

commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 01:44:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 01:44:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283866.482971 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPwzF-00062k-3X; Fri, 04 Mar 2022 01:44:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283866.482971; Fri, 04 Mar 2022 01:44:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPwzF-00062d-0X; Fri, 04 Mar 2022 01:44:05 +0000
Received: by outflank-mailman (input) for mailman id 283866;
 Fri, 04 Mar 2022 01:44:03 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=zYUj=TP=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nPwzD-00062R-GA
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 01:44:03 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 90ccbd52-9b5c-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 02:44:01 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 5F5CCB82729;
 Fri,  4 Mar 2022 01:44:00 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 6E124C004E1;
 Fri,  4 Mar 2022 01:43:58 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 90ccbd52-9b5c-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646358239;
	bh=yFfMOcylX5G6E2SmWb+h8JOupVjYu1/lA08NYyz/9QE=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=h6cR1cgpp4fwRHIfdCwEjN5jy/rD5w233Iuqa9v5+wM0H1gXAW2jwwg7tjkqabPDp
	 n0B5PL67IU7DoDfJF2m5b+6TR6FaDwZ/DHl0Bxy+mxhBNwhL9VQVCT7XduPt3acZAz
	 zuFT2MVSFE3scHRT2ew4q1gDUBygnORKIxS62k962N0kQgOGVi2FerdnOoNq5H9Sa5
	 /CjxZRBlNG0SIUK8+uwZq2YJohdl2zgAXvNj6hm+M2Nc0qgnb28cotGPBets6wDLq1
	 ALvapGiWwQGFI8AdJYKWiiSN4ucQ3EWXxxGmXwZfXlqEbz1bNRx33avrBJYt5tpUMm
	 J1lWtUX/HKpBg==
Date: Thu, 3 Mar 2022 17:43:57 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
cc: xen-devel@lists.xenproject.org, sstabellini@kernel.org, 
    stefanos@xilinx.com, julien@xen.org, Volodymyr_Babchuk@epam.com, 
    bertrand.marquis@arm.com, andrew.cooper3@citrix.com, 
    george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org, 
    roger.pau@citrix.com, Ayan Kumar Halder <ayankuma@xilinx.com>
Subject: Re: [XEN v9 3/4] xen/arm64: io: Handle the abort due to access to
 stage1 translation table
In-Reply-To: <20220301124022.10168-4-ayankuma@xilinx.com>
Message-ID: <alpine.DEB.2.22.394.2203031736140.3261@ubuntu-linux-20-04-desktop>
References: <20220301124022.10168-1-ayankuma@xilinx.com> <20220301124022.10168-4-ayankuma@xilinx.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Tue, 1 Mar 2022, Ayan Kumar Halder wrote:
> If the abort was caused due to access to stage1 translation table, Xen
> will assume that the stage1 translation table is in the non MMIO region.
> It will try to resolve the translation fault. If it succeeds, it will
> return to the guest to retry the instruction. If not, then it means
> that the table is in MMIO region which is not expected by Xen. Thus,
> Xen will forward the abort to the guest.
> 
> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
> ---
> 
> Changelog :-
> 
> v1..v8 - NA
> 
> v9 - 1. Extracted this change from "[XEN v8 2/2] xen/arm64: io: Support
> instructions (for which ISS is not..." into a separate patch of its own.
> The reason being this is an existing bug in the codebase.
> 
>  xen/arch/arm/io.c    | 11 +++++++++++
>  xen/arch/arm/traps.c | 12 +++++++++++-
>  2 files changed, 22 insertions(+), 1 deletion(-)
> 
> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
> index bea69ffb08..ebcb8ed548 100644
> --- a/xen/arch/arm/io.c
> +++ b/xen/arch/arm/io.c
> @@ -128,6 +128,17 @@ void try_decode_instruction(const struct cpu_user_regs *regs,
>          return;
>      }
>  
> +    /*
> +     * At this point, we know that the stage1 translation table is in the MMIO
> +     * region. This is not expected by Xen and thus it forwards the abort to the
> +     * guest.
> +     */
> +    if ( info->dabt.s1ptw )
> +    {
> +        info->dabt_instr.state = INSTR_ERROR;
> +        return;
> +    }
> +
>      /*
>       * Armv8 processor does not provide a valid syndrome for decoding some
>       * instructions. So in order to process these instructions, Xen must
> diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
> index 120c971b0f..e491ca15d7 100644
> --- a/xen/arch/arm/traps.c
> +++ b/xen/arch/arm/traps.c
> @@ -1923,6 +1923,7 @@ static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
>      bool is_data = (hsr.ec == HSR_EC_DATA_ABORT_LOWER_EL);
>      mmio_info_t info;
>      enum io_state state;
> +    bool check_mmio_region = true;
>  
>      /*
>       * If this bit has been set, it means that this stage-2 abort is caused
> @@ -1987,7 +1988,16 @@ static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
>           */
>          if ( !is_data || !info.dabt.valid )
>          {
> -            if ( check_p2m(is_data, gpa) )
> +            /*
> +             * If the translation fault was caused due to access to stage 1
> +             * translation table, then we try to set the translation table entry
> +             * for page1 translation table (assuming that it is in the non mmio
                      ^ stage1

Do you mean to say maybe:

If the translation fault was caused by an access to stage 1 translation
table, then no need to change the stage 2 p2m.

?



> +             * region).
> +             */
> +            if ( xabt.s1ptw )
> +                check_mmio_region = false;
> +
> +            if ( check_p2m((is_data && check_mmio_region), gpa) )
>                  return;
>  
>              /*
> -- 
> 2.17.1
> 


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 01:44:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 01:44:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283868.482982 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPwzZ-0006T7-Bn; Fri, 04 Mar 2022 01:44:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283868.482982; Fri, 04 Mar 2022 01:44:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPwzZ-0006S7-8S; Fri, 04 Mar 2022 01:44:25 +0000
Received: by outflank-mailman (input) for mailman id 283868;
 Fri, 04 Mar 2022 01:44:24 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=zYUj=TP=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nPwzY-0006Qz-62
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 01:44:24 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 9c5dd2e7-9b5c-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 02:44:21 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id E210A61834;
 Fri,  4 Mar 2022 01:44:19 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id A873CC004E1;
 Fri,  4 Mar 2022 01:44:18 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9c5dd2e7-9b5c-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646358259;
	bh=hCMNUyzaAUdVodLem9QTKTwRgjSCd4NpJgNrmR8+qZo=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=IKVGsftGFSjWdA5FEcpGojFpiLEGnINXi+57ezYJlGQv4OJyvCMeSYkjPCC2MDoOQ
	 vxdaF/6xzZ+oT0sfWYrWmSwYyWFYO94QUZUCeDUiIySOSqSy5z4xCOv+Dqv/45TcrW
	 1eEqUqE2eunZe734Mzdurp6/Zvmc3IXhkF6a5wobU892PICDviy4BZhgQT4/l61ALE
	 qH8t8h89AXo2iClJ4osslwc9RQfddew3lkSOYlYf//Q1DYYfjuyU44t28h/qrQ50jL
	 ej4mWfuvlmcTUsXqPt8oNCaE5s4s6PBWlgRDAaudyNnweMuX3iLl0uPIuPswRKJJMi
	 bUx8JzVVNqXOg==
Date: Thu, 3 Mar 2022 17:44:17 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
cc: xen-devel@lists.xenproject.org, sstabellini@kernel.org, 
    stefanos@xilinx.com, julien@xen.org, Volodymyr_Babchuk@epam.com, 
    bertrand.marquis@arm.com, andrew.cooper3@citrix.com, 
    george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org, 
    roger.pau@citrix.com, Ayan Kumar Halder <ayankuma@xilinx.com>
Subject: Re: [XEN v9 4/4] xen/arm64: io: Handle data abort due to cache
 maintenance instructions
In-Reply-To: <20220301124022.10168-5-ayankuma@xilinx.com>
Message-ID: <alpine.DEB.2.22.394.2203031744100.3261@ubuntu-linux-20-04-desktop>
References: <20220301124022.10168-1-ayankuma@xilinx.com> <20220301124022.10168-5-ayankuma@xilinx.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Tue, 1 Mar 2022, Ayan Kumar Halder wrote:
> When the data abort is caused due to cache maintenance for an address,
> there are two scenarios:-
> 
> 1. Address belonging to a non emulated region - For this, Xen should
> set the corresponding bit in the translation table entry to valid and
> return to the guest to retry the instruction. This can happen sometimes
> as Xen need to set the translation table entry to invalid. (for eg
> 'Break-Before-Make' sequence).
> 
> 2. Address belongs to an emulated region - Xen should ignore the
> instruction (ie increment the PC) and return to the guest.
> 
> We try to deal with scenario#1, by invoking check_p2m(). If this is
> unsuccessful, then we assume scenario#2.
> 
> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>

Acked-by: Stefano Stabellini <sstabellini@kernel.org>


> ---
> 
> Changelog:-
> 
> v1...v8 - NA
> 
> v9 - Extracted this change from "[XEN v7 2/2] xen/arm64: io: Support
> instructions (for which ISS is not ..." into a separate patch of its
> own. The reason being this addresses an existing bug in the codebase.
> 
>  xen/arch/arm/include/asm/mmio.h |  3 ++-
>  xen/arch/arm/io.c               | 11 +++++++++++
>  xen/arch/arm/traps.c            |  6 ++++++
>  3 files changed, 19 insertions(+), 1 deletion(-)
> 
> diff --git a/xen/arch/arm/include/asm/mmio.h b/xen/arch/arm/include/asm/mmio.h
> index ef2c57a2d5..75d362d5f5 100644
> --- a/xen/arch/arm/include/asm/mmio.h
> +++ b/xen/arch/arm/include/asm/mmio.h
> @@ -34,7 +34,8 @@ enum instr_decode_state
>       * Instruction is decoded successfully. It is a ldr/str post indexing
>       * instruction.
>       */
> -    INSTR_LDR_STR_POSTINDEXING
> +    INSTR_LDR_STR_POSTINDEXING,
> +    INSTR_IGNORE                    /* Instruction is ignored */
>  };
>  
>  typedef struct
> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
> index ebcb8ed548..7e9dd4bb08 100644
> --- a/xen/arch/arm/io.c
> +++ b/xen/arch/arm/io.c
> @@ -139,6 +139,17 @@ void try_decode_instruction(const struct cpu_user_regs *regs,
>          return;
>      }
>  
> +    /*
> +     * When the data abort is caused due to cache maintenance, Xen should ignore
> +     * this instruction as the cache maintenance was caused on an address belonging
> +     * to the emulated region.
> +     */
> +    if ( info->dabt.cache )
> +    {
> +        info->dabt_instr.state = INSTR_IGNORE;
> +        return;
> +    }
> +
>      /*
>       * Armv8 processor does not provide a valid syndrome for decoding some
>       * instructions. So in order to process these instructions, Xen must
> diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
> index e491ca15d7..5879640b73 100644
> --- a/xen/arch/arm/traps.c
> +++ b/xen/arch/arm/traps.c
> @@ -2011,6 +2011,12 @@ static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
>  
>          try_decode_instruction(regs, &info);
>  
> +        if ( info.dabt_instr.state == INSTR_IGNORE )
> +        {
> +            advance_pc(regs, hsr);
> +            return;
> +        }
> +
>          /*
>           * If Xen could not decode the instruction or encountered an error
>           * while decoding, then it should forward the abort to the guest.
> -- 
> 2.17.1
> 


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 02:03:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 02:03:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283880.482993 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPxHm-0001II-Oi; Fri, 04 Mar 2022 02:03:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283880.482993; Fri, 04 Mar 2022 02:03:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPxHm-0001IB-Lh; Fri, 04 Mar 2022 02:03:14 +0000
Received: by outflank-mailman (input) for mailman id 283880;
 Fri, 04 Mar 2022 02:03:13 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPxHl-0001I1-Qg; Fri, 04 Mar 2022 02:03:13 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPxHl-00066i-OT; Fri, 04 Mar 2022 02:03:13 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPxHl-0002V0-Do; Fri, 04 Mar 2022 02:03:13 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPxHl-0003VS-DO; Fri, 04 Mar 2022 02:03:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=923x2r/T1GSUvFZv01ykZT/Qu5D8DvRIGgxVC2iMhAQ=; b=ha8JJOv9HxyGCImIB01myWarx+
	cyqYWSEA1i0P7fHKl5UzuAXvLwgUk6coTvqvK2t+6fMbSqUpm2CDe4eutheBoj9h2xsb9sgb6RyHf
	DfkSc3sWtPQX9YEgxK0wF+lzRFOBczHIyIHbWsxI/qgmddD7gRCDulUz3ZxsGHSSb8Bo=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168386-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168386: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=1f410b0c7455748021be4ede59e7a0c0a2ffb1c4
X-Osstest-Versions-That:
    xen=b692523fafb39f5f930e1e8a316f7b8cebc9f62a
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 04 Mar 2022 02:03:13 +0000

flight 168386 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168386/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  1f410b0c7455748021be4ede59e7a0c0a2ffb1c4
baseline version:
 xen                  b692523fafb39f5f930e1e8a316f7b8cebc9f62a

Last test of basis   168384  2022-03-03 20:00:30 Z    0 days
Testing same since   168386  2022-03-03 23:01:40 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Julien Grall <jgrall@amazon.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   b692523faf..1f410b0c74  1f410b0c7455748021be4ede59e7a0c0a2ffb1c4 -> smoke


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 02:49:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 02:49:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283893.483005 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPy0A-0006VO-DD; Fri, 04 Mar 2022 02:49:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283893.483005; Fri, 04 Mar 2022 02:49:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPy0A-0006VH-A1; Fri, 04 Mar 2022 02:49:06 +0000
Received: by outflank-mailman (input) for mailman id 283893;
 Fri, 04 Mar 2022 02:49:04 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPy08-0006V7-Rf; Fri, 04 Mar 2022 02:49:04 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPy08-0006t3-OL; Fri, 04 Mar 2022 02:49:04 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPy08-0003dN-Eb; Fri, 04 Mar 2022 02:49:04 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPy08-0003I7-E9; Fri, 04 Mar 2022 02:49:04 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Wepx4ylr2MniVqS5I3wRAR83QSDhiYWS0jO1XSrxFhw=; b=OYwNJSuf7d4FYuEs6kEhxkWk33
	ZbbwDXUNNZ92SqzIkWSOfngtCiAX1GrCJszFjKQwzWU1uRHRWHS0X36q1nGpo3e+8CmydYMvI7oJH
	h5PPhaC5VYxxX71RFtJeW65nRKMueNfHnbbMs4SmAS57QrvUFcyni9tWL51/enHQYHwM=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168376-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168376: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-amd64-amd64-xl-rtds:guest-localmigrate/x10:fail:allowable
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=36eae3a732a1f2aa81391e871ac0e9bb3233e7d7
X-Osstest-Versions-That:
    qemuu=64ada298b98a51eb2512607f6e6180cb330c47b1
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 04 Mar 2022 02:49:04 +0000

flight 168376 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168376/

Failures :-/ but no regressions.

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-rtds     20 guest-localmigrate/x10   fail REGR. vs. 168343

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168343
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168343
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168343
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168343
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168343
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168343
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168343
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168343
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 qemuu                36eae3a732a1f2aa81391e871ac0e9bb3233e7d7
baseline version:
 qemuu                64ada298b98a51eb2512607f6e6180cb330c47b1

Last test of basis   168343  2022-03-02 18:07:05 Z    1 days
Testing same since   168376  2022-03-03 15:08:22 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Dr. David Alan Gilbert <dgilbert@redhat.com>
  Fabian Ebner <f.ebner@proxmox.com>
  Hanna Reitz <hreitz@redhat.com>
  Jack Wang <jinpu.wang@ionos.com>
  Markus Armbruster <armbru@redhat.com>
  Peter Maydell <peter.maydell@linaro.org>
  Peter Xu <peterx@redhat.com>
  Stefan Reiter <s.reiter@proxmox.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     fail    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   64ada298b9..36eae3a732  36eae3a732a1f2aa81391e871ac0e9bb3233e7d7 -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 03:46:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 03:46:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283906.483016 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPyte-00057k-Ng; Fri, 04 Mar 2022 03:46:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283906.483016; Fri, 04 Mar 2022 03:46:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPyte-00057d-Kf; Fri, 04 Mar 2022 03:46:26 +0000
Received: by outflank-mailman (input) for mailman id 283906;
 Fri, 04 Mar 2022 03:46:26 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPytd-00057T-VL; Fri, 04 Mar 2022 03:46:25 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPytd-0007w0-S9; Fri, 04 Mar 2022 03:46:25 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPytc-0005eg-Kh; Fri, 04 Mar 2022 03:46:24 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPytc-0001zk-KB; Fri, 04 Mar 2022 03:46:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=SHW0Ryp2ePwRLztJRGCBfmirsdajZTuKroao3+nh/kQ=; b=GGvS9N1f7hUsudyiB2I29MiF/O
	fizybSJqRI32SinZbP5Dl4SrpJP6ulwjMaxD3S2MbywNl3I4vEiB5suJVBmNxXdy8nzxaT4Vx4MBm
	VhpNeQ4a9aZ9teRmdOAykryctkBwepKX6YW3yVmT3SKPFGJp4lGFnGMtsNbr0gCLOIfk=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168389-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168389: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=589d51df260465e2561979b8a988e77b0f32a6e8
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 04 Mar 2022 03:46:24 +0000

flight 168389 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168389/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 589d51df260465e2561979b8a988e77b0f32a6e8
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    3 days
Failing since        168258  2022-03-01 01:55:31 Z    3 days   29 attempts
Testing same since   168359  2022-03-03 10:41:39 Z    0 days    9 attempts

------------------------------------------------------------
People who touched revisions under test:
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 589d51df260465e2561979b8a988e77b0f32a6e8
Author: Sean Rhodes <sean@starlabs.systems>
Date:   Thu Feb 24 19:38:18 2022 +0800

    MdeModulePkg/Usb/Keyboard.c: Don't request protocol before setting
    
    No need to check the interface protocol then conditionally setting,
    just set it to BOOT_PROTOCOL and check for error.
    
    This is what Linux does for HID devices as some don't follow the USB spec.
    One example is the Aspeed BMC HID keyboard device, which adds a massive
    boot delay without this patch as it doesn't respond to
    'GetProtocolRequest'.
    
    Cc: Hao A Wu <hao.a.wu@intel.com>
    Cc: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Matt DeVillier <matt.devillier@gmail.com>
    Signed-off-by: Patrick Rudolph <patrick.rudolph@9elements.com>
    Signed-off-by: Sean Rhodes <sean@starlabs.systems>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit b422b0fcf92dd4103dfc16d8d5f77fbec2d8c5b9
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Tue Feb 22 11:29:23 2022 +0800

    EmulatorPkg/EmuGopDxe: Set ModeInfo after Open successfully
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2668
    
    WindowOpen will fail in some case. for example, without XServer.
    
    Shouldn't set ModeInfo in this case to avoid the caller use it
    incorrectly
    
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 906242343f7a654402f6f999d447aa9d29a8f4d4
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sun Feb 20 14:53:01 2022 +0800

    MdeModulePkg/GraphicsConsoleDxe: Check status to make sure no error
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=2668
    
    SetMode will fail in some case. for example, without XServer.
    Should handle these case when SetMode fail.
    
    If we don't handle it, it will Segmentation fault.
    
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit dc39554d58af4a50b50eca1f57c49415a12b0c98
Author: Xiaolu.Jiang <xiaolu.jiang@intel.com>
Date:   Tue Feb 22 22:14:05 2022 +0800

    edk2/MdeModulePkg/Debuglib: Add Standalone MM support
    
    https://bugzilla.tianocore.org/show_bug.cgi?id=3844
    
    This change added Standalone MM instance of DebugLib.
    
    Reviewd-by: Jian J Wang <jian.j.wang@intel.com>
    Reviewd-by: Liming Gao <gaoliming@byosoft.com.cn>
    
    Signed-off-by: Xiaolu.Jiang <xiaolu.jiang@intel.com>

commit 497ac7b6d7f9750f48f137db244931a5728b1968
Author: Guomin Jiang <guomin.jiang@intel.com>
Date:   Sat Jan 29 16:28:02 2022 +0800

    UefiPayloadPkg/PayloadLoaderPeim: Use INT64 as input parameter
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3818
    
    It will have some potential issue when memory larger than 2G because
    the high memory address will be fill with 0xFFFFFFFF when do the
    operation of INTN + INT64 but it is 32 bit normal data in fact.
    
    Should use same data type INT64 + INT64.
    
    V3:
    1. Use INT64 as input parameter because all date type is 64 bit
    V2:
    1. Force the data type to UINTN to avoid high dword be filled with
    0xFFFFFFFF
    2. Keep INTN because the offset may postive or negative.
    
    Reviewed-by: Guo Dong <guo.dong@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>

commit 6a890db161cd6d378bec3499a1e774db3f5a27a7
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:30:29 2022 +0800

    BaseTools: Upgrade the version of NASM tool
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Upgrade the version of NASM tool to avoid compilation errors when
    compiling NASM code change.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Bob Feng <bob.c.feng@intel.com>
    Cc: Liming Gao <gaoliming@byosoft.com.cn>
    Reviewed-by: Yuwei Chen <yuwei.chen@intel.com>

commit bbaa00dd01ed0df30e43a5a89fd2b0433d858b73
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:05:47 2022 +0800

    MdePkg: Remove the macro definitions regarding Opcode.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Remove the macro definitions regarding Opcode because new version of
    NASM tool(e.g. v2.15.05) supports the corresponding instructions.
    Note: This patch need to be merged after other NASM code change to avoid
    compilation errors.
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 2aa107c0aa2e1375651867c8df1b81ff64b67fce
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 22:01:18 2022 +0800

    UefiCpuPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Eric Dong <eric.dong@intel.com>
    Cc: Laszlo Ersek <lersek@redhat.com>
    Cc: Rahul Kumar <rahul1.kumar@intel.com>

commit 7bc8b1d9f412507d579f21ea9af56fced81e7827
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:52:52 2022 +0800

    SourceLevelDebugPkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Hao A Wu <hao.a.wu@intel.com>

commit d3febfd9ade35dc552df6b3607c2b15d26b82867
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:46:27 2022 +0800

    MdePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Cc: Michael D Kinney <michael.d.kinney@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
    Cc: Zhiguang Liu <zhiguang.liu@intel.com>

commit 84338c0d498555f860a480693ee8647a1795fba3
Author: Jason <yun.lou@intel.com>
Date:   Mon Jan 10 21:04:09 2022 +0800

    MdeModulePkg: Replace Opcode with the corresponding instructions.
    
    REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3790
    
    Replace Opcode with the corresponding instructions.
    The code changes have been verified with CompareBuild.py tool, which
    can be used to compare the results of two different EDK II builds to
    determine if they generate the same binaries.
    (tool link: https://github.com/mdkinney/edk2/tree/sandbox/CompareBuild)
    
    Signed-off-by: Jason Lou <yun.lou@intel.com>
    Reviewed-by: Ray Ni <ray.ni@intel.com>
    Cc: Dandan Bi <dandan.bi@intel.com>
    Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 04:31:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 04:31:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283919.483027 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPzbP-0002jX-AF; Fri, 04 Mar 2022 04:31:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283919.483027; Fri, 04 Mar 2022 04:31:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPzbP-0002jQ-7I; Fri, 04 Mar 2022 04:31:39 +0000
Received: by outflank-mailman (input) for mailman id 283919;
 Fri, 04 Mar 2022 04:31:38 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPzbO-0002jG-4Y; Fri, 04 Mar 2022 04:31:38 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPzbO-0000Xp-0c; Fri, 04 Mar 2022 04:31:38 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPzbN-0000Qt-P0; Fri, 04 Mar 2022 04:31:37 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPzbN-0003oG-OT; Fri, 04 Mar 2022 04:31:37 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Nszxk3DcjokJceqp5lEWXZIWtVen95j6195HrFvK+Bo=; b=A/ZNtMzjI1Hrxh9hQhFiPDnLKB
	VYBdWRfh2yDYIxI7rvfxBxG2a8LQz7cd+AARXPiRWtIyCnit22vWPC1oJMqCkiuk3Ifre/ldf+3sp
	6hUV9IlBeyCbWplGuP/gB7dQ33RixDk8AS/eR2yfMU0rkinO/iLYEA0iZMTojSJZ45BY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168383-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168383: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-armhf-armhf-xl-vhd:xen-boot:fail:heisenbug
    linux-linus:test-amd64-amd64-xl-xsm:guest-start/debian.repeat:fail:heisenbug
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=b949c21fc23ecaccef89582f251e6281cad1f81e
X-Osstest-Versions-That:
    linux=5859a2b1991101d6b978f3feb5325dad39421f29
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 04 Mar 2022 04:31:37 +0000

flight 168383 linux-linus real [real]
flight 168391 linux-linus real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168383/
http://logs.test-lab.xenproject.org/osstest/logs/168391/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-armhf-armhf-xl-vhd       8 xen-boot            fail pass in 168391-retest
 test-amd64-amd64-xl-xsm 22 guest-start/debian.repeat fail pass in 168391-retest

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-xl-vhd     14 migrate-support-check fail in 168391 never pass
 test-armhf-armhf-xl-vhd 15 saverestore-support-check fail in 168391 never pass
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168355
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168355
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168355
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168355
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168355
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168355
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168355
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168355
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 linux                b949c21fc23ecaccef89582f251e6281cad1f81e
baseline version:
 linux                5859a2b1991101d6b978f3feb5325dad39421f29

Last test of basis   168355  2022-03-03 05:19:36 Z    0 days
Testing same since   168383  2022-03-03 19:41:08 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Alex Elder <elder@linaro.org>
  Alexander Lobakin <alobakin@pm.me>
  Amit Cohen <amcohen@nvidia.com>
  Andy Shevchenko <andriy.shevchenko@linux.intel.com>
  Antony Antony <antony.antony@secunet.com>
  Ben Dooks <ben.dooks@codethink.co.uk>
  Brian Gix <brian.gix@intel.com>
  Casper Andersson <casper.casan@gmail.com>
  Christophe JAILLET <christophe.jaillet@wanadoo.fr>
  Chuanhong Guo <gch981213@gmail.com>
  Corinna Vinschen <vinschen@redhat.com>
  D. Wythe <alibuda@linux.alibaba.com>
  Daniel Borkmann <daniel@iogearbox.net>
  David S. Miller <davem@davemloft.net>
  Deren Wu <deren.wu@mediatek.com>
  Emmanuel Grumbach <emmanuel.grumbach@intel.com>
  Eric Dumazet <edumazet@google.com>
  Florian Westphal <fw@strlen.de>
  Golan Ben Ami <golan.ben.ami@intel.com>
  Ido Schimmel <idosch@nvidia.com>
  Ilya Lipnitskiy <ilya.lipnitskiy@gmail.com>
  j.nixdorf@avm.de <j.nixdorf@avm.de>
  Jacob Keller <jacob.e.keller@intel.com>
  Jakub Kicinski <kuba@kernel.org>
  Jakub Sitnicki <jakub@cloudflare.com>
  Jia-Ju Bai <baijiaju1990@gmail.com>
  Jiasheng Jiang <jiasheng@iscas.ac.cn>
  Jiri Bohac <jbohac@suse.cz>
  Joe Stringer <joe@cilium.io>
  Johannes Berg <johannes.berg@intel.com>
  Johannes Nixdorf <j.nixdorf@avm.de>
  John Fastabend <john.fastabend@gmail.com>
  Jonathan Lemon <jonathan.lemon@gmail.com>
  Kai-Heng Feng <kai.heng.feng@canonical.com>
  Karsten Graul <kgraul@linux.ibm.com>
  Konrad Jankowski <konrad0.jankowski@intel.com>
  Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com>
  lena wang <lena.wang@mediatek.com>
  Leon Romanovsky <leonro@nvidia.com>
  Lin Ma <linma@zju.edu.cn>
  Linus Torvalds <torvalds@linux-foundation.org>
  Luca Coelho <luciano.coelho@intel.com>
  Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
  Maciej Fijalkowski <maciej.fijalkowski@intel.com>
  Marc Kleine-Budde <mkl@pengutronix.de>
  Marcel Holtmann <marcel@holtmann.org>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Martin Habets <habetsm.xilinx@gmail.com>
  Mat Martineau <mathew.j.martineau@linux.intel.com>
  Mateusz Palczewski <mateusz.palczewski@intel.com>
  Maurice Baijens <maurice.baijens@ellips.com>
  Maxim Levitsky <mlevitsk@redhat.com>
  Miguel Ojeda <ojeda@kernel.org>
  Naama Meir <naamax.meir@linux.intel.com>
  Nicolas Escande <nico.escande@gmail.com>
  Niels Dossche <dossche.niels@gmail.com>
  Oleksandr Natalenko <oleksandr@redhat.com>
  Pablo Neira Ayuso <pablo@netfilter.org>
  Paolo Abeni <pabeni@redhat.com>
  Paul Blakey <paulb@nvidia.com>
  Paul Menzel <pmenzel@molgen.mpg.de> (Nokia N9 (MeeGo/Harmattan)
  Phani Burra <phani.r.burra@intel.com>
  Randy Dunlap <rdunlap@infradead.org>
  Remi Pommarel <repk@triplefau.lt>
  Richard Cochran <richardcochran@gmail.com>
  Rui Salvaterra <rsalvaterra@gmail.com>
  Sandeep Penigalapati <sandeep.penigalapati@intel.com>
  Sasha Neftin <sasha.neftin@intel.com>
  Sergio Paracuellos <sergio.paracuellos@gmail.com>
  Simon Wunderlich <sw@simonwunderlich.de>
  Slawomir Laba <slawomirx.laba@intel.com>
  Sreeramya Soratkal <quic_ssramya@quicinc.com>
  Steffen Klassert <steffen.klassert@secunet.com>
  Sukadev Bhattiprolu <sukadev@linux.ibm.com>
  Sven Eckelmann <sven@narfation.org>
  Thomas Bogendoerfer <tsbogend@alpha.franken.de>
  Tony Lu <tonylu@linux.alibaba.com>
  Tony Nguyen <anthony.l.nguyen@intel.com>
  Vincent Mailhol <mailhol.vincent@wanadoo.fr>
  Vincent Whitchurch <vincent.whitchurch@axis.com>
  Vladimir Oltean <vladimir.oltean@nxp.com>
  Wang Qing <wangqing@vivo.com>
  Yan Yan <evitayan@google.com>
  Zheyu Ma <zheyuma97@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      fail    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      fail    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   5859a2b19911..b949c21fc23e  b949c21fc23ecaccef89582f251e6281cad1f81e -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 04:45:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 04:45:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283930.483037 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPzoZ-0004Rw-Is; Fri, 04 Mar 2022 04:45:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283930.483037; Fri, 04 Mar 2022 04:45:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nPzoZ-0004Rp-Fh; Fri, 04 Mar 2022 04:45:15 +0000
Received: by outflank-mailman (input) for mailman id 283930;
 Fri, 04 Mar 2022 04:45:14 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPzoY-0004Rf-2b; Fri, 04 Mar 2022 04:45:14 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPzoY-0000nB-0s; Fri, 04 Mar 2022 04:45:14 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nPzoX-0000y2-J6; Fri, 04 Mar 2022 04:45:13 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nPzoX-0003B3-Ib; Fri, 04 Mar 2022 04:45:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=pMQBFwioVo8kH8qmmLrXDm1kLIH6sfmd4Y4yuOrOe4s=; b=YoMYdRmYJSBkG8K0/zshZwTu1l
	00c76aoIg8AUdQkScNwROk2oIxRKBVCFY6hVv4FoHmvyk3YKb6PIorUXTh0DYwai1flPWL/bELQ51
	QmnXajbVEAQMM+Y14vFuns3WdEFsE8OZhH1KQGq6JZ67Zr6F2wH8pzzpcCZ8iTTijmVs=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168392-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168392: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=b83d0a6438f24ba3c6234d9b7593be6f2246ec1e
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 04 Mar 2022 04:45:13 +0000

flight 168392 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168392/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 b83d0a6438f24ba3c6234d9b7593be6f2246ec1e
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    3 days
Failing since        168258  2022-03-01 01:55:31 Z    3 days   30 attempts
Testing same since   168392  2022-03-04 04:10:32 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 327 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 05:21:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 05:21:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283941.483048 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ0NM-0001Cc-8t; Fri, 04 Mar 2022 05:21:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283941.483048; Fri, 04 Mar 2022 05:21:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ0NM-0001CV-5r; Fri, 04 Mar 2022 05:21:12 +0000
Received: by outflank-mailman (input) for mailman id 283941;
 Fri, 04 Mar 2022 05:21:11 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=ruaT=TP=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nQ0NK-0001CP-V5
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 05:21:11 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e37e3f58-9b7a-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 06:21:07 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 4EFC12170E;
 Fri,  4 Mar 2022 05:21:04 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 1D44313AF7;
 Fri,  4 Mar 2022 05:21:04 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id HxLeBcChIWIZKgAAMHmgww
 (envelope-from <jgross@suse.com>); Fri, 04 Mar 2022 05:21:04 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e37e3f58-9b7a-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646371264; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=CKiBUYpUT/XIz0h4TgOUh/BFD1RRJU7WTVIHpfeGu/I=;
	b=aAVLjP7SKX5suERk9VF2th4gNlV0f8nTquDwUeiuqOHS0k6PnFojzpbCbU/TXsAmogOHan
	Zccm3tQNhodKX9tmKBKiO55mgHGOAg9Evt2UYuX1G5Xx9P7psP4NrqLIMFD5M6B9tjIcwy
	X/Nh7sUU1SHlfg7QWHx1uYagGpfr+bo=
Message-ID: <d66cd168-4bca-f5da-38d9-7bef45f31ef4@suse.com>
Date: Fri, 4 Mar 2022 06:21:03 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Content-Language: en-US
To: Andrew Cooper <andrew.cooper3@citrix.com>,
 Xen-devel <xen-devel@lists.xenproject.org>
Cc: Jan Beulich <JBeulich@suse.com>, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?=
 <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
 Dario Faggioli <dfaggioli@suse.com>
References: <20220303004015.17688-1-andrew.cooper3@citrix.com>
From: Juergen Gross <jgross@suse.com>
Subject: Re: [PATCH RFC] xen/sched: Optimise when only one scheduler is
 compiled in
In-Reply-To: <20220303004015.17688-1-andrew.cooper3@citrix.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------YfBeDjsowkWQAX52ZYDXnuyR"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------YfBeDjsowkWQAX52ZYDXnuyR
Content-Type: multipart/mixed; boundary="------------CB3ra5FvZUZ65MTcgpK2B63A";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Andrew Cooper <andrew.cooper3@citrix.com>,
 Xen-devel <xen-devel@lists.xenproject.org>
Cc: Jan Beulich <JBeulich@suse.com>, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?=
 <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
 Dario Faggioli <dfaggioli@suse.com>
Message-ID: <d66cd168-4bca-f5da-38d9-7bef45f31ef4@suse.com>
Subject: Re: [PATCH RFC] xen/sched: Optimise when only one scheduler is
 compiled in
References: <20220303004015.17688-1-andrew.cooper3@citrix.com>
In-Reply-To: <20220303004015.17688-1-andrew.cooper3@citrix.com>

--------------CB3ra5FvZUZ65MTcgpK2B63A
Content-Type: multipart/mixed; boundary="------------ZXC0J5JRmcrj00OcjXTE080q"

--------------ZXC0J5JRmcrj00OcjXTE080q
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------ZXC0J5JRmcrj00OcjXTE080q
Content-Type: text/x-patch; charset=UTF-8;
 name="0001-xen-sched-generate-code-for-calling-scheduler-callba.patch"
Content-Disposition: attachment;
 filename*0="0001-xen-sched-generate-code-for-calling-scheduler-callba.pa";
 filename*1="tch"
Content-Transfer-Encoding: base64
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--------------ZXC0J5JRmcrj00OcjXTE080q
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----

xsBNBFOMcBYBCACgGjqjoGvbEouQZw/ToiBg9W98AlM2QHV+iNHsEs7kxWhKMjri
oyspZKOBycWxw3ie3j9uvg9EOB3aN4xiTv4qbnGiTr3oJhkB1gsb6ToJQZ8uxGq2
kaV2KL9650I1SJvedYm8Of8Zd621lSmoKOwlNClALZNew72NjJLEzTalU1OdT7/i
1TXkH09XSSI8mEQ/ouNcMvIJNwQpd369y9bfIhWUiVXEK7MlRgUG6MvIj6Y3Am/B
BLUVbDa4+gmzDC9ezlZkTZG2t14zWPvxXP3FAp2pkW0xqG7/377qptDmrk42GlSK
N4z76ELnLxussxc7I2hx18NUcbP8+uty4bMxABEBAAHNHEp1ZXJnZW4gR3Jvc3Mg
PGpnQHBmdXBmLm5ldD7CwHkEEwECACMFAlOMcBYCGwMHCwkIBwMCAQYVCAIJCgsE
FgIDAQIeAQIXgAAKCRCw3p3WKL8TL0KdB/93FcIZ3GCNwFU0u3EjNbNjmXBKDY4F
UGNQH2lvWAUy+dnyThpwdtF/jQ6j9RwE8VP0+NXcYpGJDWlNb9/JmYqLiX2Q3Tye
vpB0CA3dbBQp0OW0fgCetToGIQrg0MbD1C/sEOv8Mr4NAfbauXjZlvTj30H2jO0u
+6WGM6nHwbh2l5O8ZiHkH32iaSTfN7Eu5RnNVUJbvoPHZ8SlM4KWm8rG+lIkGurq
qu5gu8q8ZMKdsdGC4bBxdQKDKHEFExLJK/nRPFmAuGlId1E3fe10v5QL+qHI3EIP
tyfE7i9Hz6rVwi7lWKgh7pe0ZvatAudZ+JNIlBKptb64FaiIOAWDCx1SzR9KdWVy
Z2VuIEdyb3NzIDxqZ3Jvc3NAc3VzZS5jb20+wsB5BBMBAgAjBQJTjHCvAhsDBwsJ
CAcDAgEGFQgCCQoLBBYCAwECHgECF4AACgkQsN6d1ii/Ey/HmQf/RtI7kv5A2PS4
RF7HoZhPVPogNVbC4YA6lW7DrWf0teC0RR3MzXfy6pJ+7KLgkqMlrAbN/8Dvjoz7
8X+5vhH/rDLa9BuZQlhFmvcGtCF8eR0T1v0nC/nuAFVGy+67q2DH8As3KPu0344T
BDpAvr2uYM4tSqxK4DURx5INz4ZZ0WNFHcqsfvlGJALDeE0LhITTd9jLzdDad1pQ
SToCnLl6SBJZjDOX9QQcyUigZFtCXFst4dlsvddrxyqT1f17+2cFSdu7+ynLmXBK
7abQ3rwJY8SbRO2iRulogc5vr/RLMMlscDAiDkaFQWLoqHHOdfO9rURssHNN8WkM
nQfvUewRz80hSnVlcmdlbiBHcm9zcyA8amdyb3NzQG5vdmVsbC5jb20+wsB5BBMB
AgAjBQJTjHDXAhsDBwsJCAcDAgEGFQgCCQoLBBYCAwECHgECF4AACgkQsN6d1ii/
Ey8PUQf/ehmgCI9jB9hlgexLvgOtf7PJnFOXgMLdBQgBlVPO3/D9R8LtF9DBAFPN
hlrsfIG/SqICoRCqUcJ96Pn3P7UUinFG/I0ECGF4EvTE1jnDkfJZr6jrbjgyoZHi
w/4BNwSTL9rWASyLgqlA8u1mf+c2yUwcGhgkRAd1gOwungxcwzwqgljf0N51N5Jf
VRHRtyfwq/ge+YEkDGcTU6Y0sPOuj4Dyfm8fJzdfHNQsWq3PnczLVELStJNdapwP
OoE+lotufe3AM2vAEYJ9rTz3Cki4JFUsgLkHFqGZarrPGi1eyQcXeluldO3m91NK
/1xMI3/+8jbO0tsn1tqSEUGIJi7ox80eSnVlcmdlbiBHcm9zcyA8amdyb3NzQHN1
c2UuZGU+wsB5BBMBAgAjBQJTjHDrAhsDBwsJCAcDAgEGFQgCCQoLBBYCAwECHgEC
F4AACgkQsN6d1ii/Ey+LhQf9GL45eU5vOowA2u5N3g3OZUEBmDHVVbqMtzwlmNC4
k9Kx39r5s2vcFl4tXqW7g9/ViXYuiDXb0RfUpZiIUW89siKrkzmQ5dM7wRqzgJpJ
wK8Bn2MIxAKArekWpiCKvBOB/Cc+3EXE78XdlxLyOi/NrmSGRIov0karw2RzMNOu
5D+jLRZQd1Sv27AR+IP3I8U4aqnhLpwhK7MEy9oCILlgZ1QZe49kpcumcZKORmzB
TNh30FVKK1EvmV2xAKDoaEOgQB4iFQLhJCdP1I5aSgM5IVFdn7v5YgEYuJYx37Io
N1EblHI//x/e2AaIHpzK5h88NEawQsaNRpNSrcfbFmAg987ATQRTjHAWAQgAyzH6
AOODMBjgfWE9VeCgsrwH3exNAU32gLq2xvjpWnHIs98ndPUDpnoxWQugJ6MpMncr
0xSwFmHEgnSEjK/PAjppgmyc57BwKII3sV4on+gDVFJR6Y8ZRwgnBC5mVM6JjQ5x
Dk8WRXljExRfUX9pNhdE5eBOZJrDRoLUmmjDtKzWaDhIg/+1Hzz93X4fCQkNVbVF
LELU9bMaLPBG/x5q4iYZ2k2ex6d47YE1ZFdMm6YBYMOljGkZKwYde5ldM9mo45mm
we0icXKLkpEdIXKTZeKDO+Hdv1aqFuAcccTg9RXDQjmwhC3yEmrmcfl0+rPghO0I
v3OOImwTEe4co3c1mwARAQABwsBfBBgBAgAJBQJTjHAWAhsMAAoJELDendYovxMv
Q/gH/1ha96vm4P/L+bQpJwrZ/dneZcmEwTbe8YFsw2V/Buv6Z4Mysln3nQK5ZadD
534CF7TDVft7fC4tU4PONxF5D+/tvgkPfDAfF77zy2AH1vJzQ1fOU8lYFpZXTXIH
b+559UqvIB8AdgR3SAJGHHt4RKA0F7f5ipYBBrC6cyXJyyoprT10EMvU8VGiwXvT
yJz3fjoYsdFzpWPlJEBRMedCot60g5dmbdrZ5DWClAr0yau47zpWj3enf1tLWaqc
suylWsviuGjKGw7KHQd3bxALOknAp4dN3QwBYCKuZ7AddY9yjynVaD5X7nF9nO5B
jR/i1DG86lem3iBDXzXsZDn8R38=3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------ZXC0J5JRmcrj00OcjXTE080q--

--------------CB3ra5FvZUZ65MTcgpK2B63A--

--------------YfBeDjsowkWQAX52ZYDXnuyR
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIhob8FAwAAAAAACgkQsN6d1ii/Ey/I
Jgf9FtGqrWUhdYkMKmdHWkC7SsAdrJfZL/v3ZVRA0Z2TcZZjE6I9DWHUPc63qEmnt168xQHFcski
ytk4L3BkfWUPMFKuuDCBzZ6ud3uQOADdJPwBa+HLSjesRxPl97emk6dKP2Jrkecqy7f0iZiG4znP
QUHX75XAGfVCMDO8SnnFK3fyVlWnrigCLTA+rs/IAVXwB4IOz8trEEWef+Q413L3HU1e8H5hBDSZ
8dE6o0jvAkJH390hp55X2Gz6Dx7kMYNbAh2EtDn9xTG3TFT0Jsmqocfv5cRNXkCyhl52HgsqjQch
VY/DC/A5n12sQhHgyl6kzPcgWAiAEEXVeA6o8dilhQ==
=rvdo
-----END PGP SIGNATURE-----

--------------YfBeDjsowkWQAX52ZYDXnuyR--


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 05:39:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 05:39:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283951.483060 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ0eN-0003ED-Ts; Fri, 04 Mar 2022 05:38:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283951.483060; Fri, 04 Mar 2022 05:38:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ0eN-0003E6-Q7; Fri, 04 Mar 2022 05:38:47 +0000
Received: by outflank-mailman (input) for mailman id 283951;
 Fri, 04 Mar 2022 05:38:46 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=mOd5=TP=arm.com=Wei.Chen@srs-se1.protection.inumbo.net>)
 id 1nQ0eL-0003Dz-O2
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 05:38:46 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05on20613.outbound.protection.outlook.com
 [2a01:111:f400:7d00::613])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 5a0626a5-9b7d-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 06:38:43 +0100 (CET)
Received: from DBBPR09CA0009.eurprd09.prod.outlook.com (2603:10a6:10:c0::21)
 by PAXPR08MB6622.eurprd08.prod.outlook.com (2603:10a6:102:153::19) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Fri, 4 Mar
 2022 05:38:40 +0000
Received: from DB5EUR03FT048.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:c0:cafe::90) by DBBPR09CA0009.outlook.office365.com
 (2603:10a6:10:c0::21) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Fri, 4 Mar 2022 05:38:40 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT048.mail.protection.outlook.com (10.152.21.28) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Fri, 4 Mar 2022 05:38:40 +0000
Received: ("Tessian outbound 826a6d8e58c3:v113");
 Fri, 04 Mar 2022 05:38:40 +0000
Received: from 18f8c9b9f68e.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 0324454F-ED44-442B-AE3F-92CCB94F1C3A.1; 
 Fri, 04 Mar 2022 05:38:30 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 18f8c9b9f68e.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 04 Mar 2022 05:38:30 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com (2603:10a6:102:2b9::9)
 by PR2PR08MB4857.eurprd08.prod.outlook.com (2603:10a6:101:1c::13)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Fri, 4 Mar
 2022 05:38:24 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa]) by PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa%4]) with mapi id 15.20.5038.014; Fri, 4 Mar 2022
 05:38:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5a0626a5-9b7d-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=k76k4ujfYmUlE3//lAUTcg7jG/wESpqtfiKW+HWvlJ8=;
 b=ylXojTDxlM5CN8Xss88NLO0FslpTncJ+5Qa1mVHTYlO386r+mG29PxuxRxIxB/MqUULIuKlbvUyFPCBWWj6g9dtlMrhi+8r3Cy6hxkR26g5QFoBrrUjDxh0IM4z6R2Nd2QfDUnn36ccl5WtmCS6FWezHbTEpFiDepjm+Zurwhus=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=bIT0qKCl+tRJYFmA682ISxj9sn7xexy6UugmLkh1lp8u6Vn08+KF/tEM1QmgAJ4/DaLfYCvbVgP9wTuOTlvTVwfsttoOwrqim8g1/Vu+uAXtfcwuGz0zdjcmB/6aHEsM/E8aeLjEwLf279PqCSm38fnzETwJ1A55c25feX29bWDUQN+DzAV0OFqbIvqFGG1QpnFTyJPngJreIDoMoQW2DNfSx2Ti/0kKlc0hYnUUMFfkt3Ii+uLeHH7hlWr1nG+VFAeBmpejsmCVOw+2ffGPpIy7Oq476tqZraoMyRdLVcJ/UW7uhTTomCYrR/l/arUqSExccl7PiDZ8tTVMd72yBg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=k76k4ujfYmUlE3//lAUTcg7jG/wESpqtfiKW+HWvlJ8=;
 b=CKtCW8npwMkROxC/dfUMQMwiEteeVg6wIFrPKg7EKx3WZAHAn3c2Me8ee40LACB1PoN3+tGVoUJqHvTSrxa1tv1l75ETGecGcFyj042hgvjr03K1ZNwE+poOXascZhkV0gOgTNGeMDGOdbhdg06/87mbbgFCSkaIZ+cbmWC+Cw1q6iaiZq6A+q1rUJP/XoGFahnjOaj2n6WZe6B/QJ5s5mYy5JoRxEZ7jLy0hNl22iU/F73qGlEbCnEYpsjQw2+AJ2YriNT355EpAF9VgolYzbI4ZXWZXB9JDqvzCFYgfdBumt+STXdAFboBQCR6qDi1B6PttjDWhqBgNYeSBA7d9w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=k76k4ujfYmUlE3//lAUTcg7jG/wESpqtfiKW+HWvlJ8=;
 b=ylXojTDxlM5CN8Xss88NLO0FslpTncJ+5Qa1mVHTYlO386r+mG29PxuxRxIxB/MqUULIuKlbvUyFPCBWWj6g9dtlMrhi+8r3Cy6hxkR26g5QFoBrrUjDxh0IM4z6R2Nd2QfDUnn36ccl5WtmCS6FWezHbTEpFiDepjm+Zurwhus=
From: Wei Chen <Wei.Chen@arm.com>
To: Julien Grall <julien@xen.org>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>, Stefano Stabellini <sstabellini@kernel.org>
CC: Bertrand Marquis <Bertrand.Marquis@arm.com>, Penny Zheng
	<Penny.Zheng@arm.com>, Henry Wang <Henry.Wang@arm.com>, nd <nd@arm.com>
Subject: RE: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Topic: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Index:
 AdgpQxtXwh7LkfydTgiYk9bhMgU+ogBRt1sAAKse4VAAPag1gAAckyvAACYrsoAAFEbkAA==
Date: Fri, 4 Mar 2022 05:38:24 +0000
Message-ID:
 <PAXPR08MB7420DAE8A51AF70882B7A8519E059@PAXPR08MB7420.eurprd08.prod.outlook.com>
References:
 <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <04db7e8b-2f04-41d7-1deb-d8bda3625c04@xen.org>
 <PAXPR08MB7420BF1299A1577B98211C1A9E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <1f0bba54-158b-d171-6f99-0c29e0547f8a@xen.org>
 <PAXPR08MB742067028155B11528C5CCA39E049@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <d860bbdb-c0ef-d4c4-51aa-b248a858e177@xen.org>
In-Reply-To: <d860bbdb-c0ef-d4c4-51aa-b248a858e177@xen.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 384E887B958872428E23651BBB321FA8.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 7ee4bfee-fa9c-47e5-fc26-08d9fda13cd7
x-ms-traffictypediagnostic:
	PR2PR08MB4857:EE_|DB5EUR03FT048:EE_|PAXPR08MB6622:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR08MB662282DA0E08D084306836F79E059@PAXPR08MB6622.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 UiKpzEisX/L1ihJxU885WEzSJ4Ge5bzdKSqonVgjCVDHan1EE9Q/3SCcCPu+1Riia6/aL/AXylo5MX9sLzlYwdYPz4i+oVdZZiPvSR2TrN4e8fwHoM6PFRLg/aI8DQNE1FDTS40KagF64jzfWUFrT2j9vIMxCy/nm/SFcz5UQrceTa8AoN/5Xihf4mwXVLUF9Sj44etqr5eEClfWsjdi3OpBm+Cm8WsiVXFdv0tMYABPa+865Zlx4hoo9aS7kuMBglfHjOzWvWoZaI6GtI8bS8VX+oewmjODIFJfTWu3FiXS53J7FCzL/WndpM0uWm8dncm14W3/M2FoYkwJe5paJiX4mN+E7RCflykuGiwd9b/rJjuCojaEmzSGidWTS5x/UfG3fiA7zH7krhea4ULt9M1MzKLrFoUIG+mdI4XxPlMb2R7FPiuC5SlQg5RV84PIFfW9QpSZa20rzAZFO1M24Jyz9AorhAaEZEWauxGDWyUIzzAnQLBokiS/ohxJO2GtHZimbmEpyDfEzIIthaD5QgbTTnZROLb9If8wpfHxLL5SL+PeKIYBYKBzvBkB7fICsnjkdgtMYVNb3kFKbZDE2NIoGyFcVjxQMa4RtMgNJH9OGu9QUyCh1xA1FtE8zEvbF5I/GQDu/yVZfaHhHq/hxBjWq3//d2aMuEAwOYGjM9OcYyHNo8zseDX0KP+4ErrGK3DgZ85CibjY8GbUK6D3wZajox0Vhhm32wTLjQid3GVOkJdRPlBuKTwNYU3D+12RKfEj5kHDUJI+KT79nQj/SZO6pLF9QMCSr5nWMNCEMfw=
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAXPR08MB7420.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(2906002)(5660300002)(83380400001)(54906003)(53546011)(26005)(55016003)(6506007)(52536014)(186003)(7696005)(8936002)(9686003)(66556008)(66476007)(66446008)(71200400001)(122000001)(316002)(38100700002)(64756008)(86362001)(33656002)(508600001)(38070700005)(76116006)(66946007)(966005)(8676002)(4326008)(110136005);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PR2PR08MB4857
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT048.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	c667aa75-643a-43fb-f47f-08d9fda1338c
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	1XB2MXBQnhr3hCpRpXUWlAINSgULmnG3NuCM0kAdtEOgApNnpEkBHVf5bDMNI1Tcw9Sqzhg9c4i4rvr592B/tZErihPmvhI7FjE6mQmnyKWdPmcgqTNN8DcXmy/NC4b9HqWsYBYn4PJ6vmUSyoJvVTawtk4HDF/IBGlIV3DbFivlEHZnodAoj8MtYfmd/+Jnj/BBJFAnt/iNR/PR1oWRO40bes4+jXbBfXiEQtXRgGJmb9WKVS+SdZO9qBljHMBUX3EhUFpJGyW9FsZ3zcQnIKw4KRKdkrL36HHg2YqImam5Go7en9kbSy2eo2Pb602uKZC/9gJOAQsW043HlaaBr5pqW4a2Qx7o0oB6a6PmOMzUZdejg1hCqJFi1rwO8lg+EsUUjK/e79CSHiouU0ne4+drBqdMbbVrtN8GuFVIDI8GMC6H/fuGMABDvJXCMJuKHdMLM+ceLrIwZ7/rayJQuzhloBaZfAJ0S58+yKNyfe40C0h3jig7VxteWJ+o/WXrQpEpu37CgXhaL8+EnMmyNfdmHLKEAiOyXZv4DvYZBGgBXwJYr2tDZ0ib+zzWJZgOoPbNm+c3Y4s9/1FWuELu/09AitFyB5NzWpk+I9JD8A/GD6ZgiSwTqgWdJrwdwuEv2o7wjmoiss3AGLfDmlGdctfV29sNT0qhJpB416rNpcCH7oXxVgDte+5RNM7ROE+8aNdfIlEP1rOdX6UwmvG3MbuGGt6z/0IsdZwJfl8IsLe/X6x1B9JPMqd8kiX2jjnuVQw+wS7nQJoZEfMupaIB3g==
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(40460700003)(82310400004)(33656002)(86362001)(81166007)(356005)(966005)(54906003)(110136005)(5660300002)(8936002)(52536014)(316002)(4326008)(8676002)(70586007)(70206006)(2906002)(83380400001)(36860700001)(47076005)(6506007)(7696005)(508600001)(9686003)(26005)(336012)(186003)(55016003)(53546011);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 05:38:40.1829
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 7ee4bfee-fa9c-47e5-fc26-08d9fda13cd7
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT048.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB6622
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From xen-devel-bounces@lists.xenproject.org Fri Mar 04 07:02:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 07:02:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283960.483072 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ1x6-0004t4-7t; Fri, 04 Mar 2022 07:02:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283960.483072; Fri, 04 Mar 2022 07:02:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ1x6-0004sx-1Q; Fri, 04 Mar 2022 07:02:12 +0000
Received: by outflank-mailman (input) for mailman id 283960;
 Fri, 04 Mar 2022 07:02:09 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=LpR9=TP=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nQ1x3-0004sr-Or
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 07:02:09 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 006f0ce2-9b89-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 08:02:06 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2176.outbound.protection.outlook.com [104.47.17.176]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-36-cPUy5g2FMB6P4JcitluEOA-1; Fri, 04 Mar 2022 08:02:04 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PAXPR04MB8367.eurprd04.prod.outlook.com (2603:10a6:102:1c7::22)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Fri, 4 Mar
 2022 07:02:03 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.017; Fri, 4 Mar 2022
 07:02:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 006f0ce2-9b89-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646377326;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=R2B0lIJ9tAjzbrUIlL9HmnypKenAbC+cZenZHpOlip8=;
	b=ggOSxdEXodBTmA2YC5okwY7C54XY4qY6ov3NIW6sSzBCba3ERohteuylS+QQKyfRZfa/Qq
	8YVn38bvf+pi/p7HgyOAak19aDpOkpOWsOjvb13gyaCewcI01/t5pGkfmm9rilSiRhzYhW
	9HVQlEkLkTLZ+inc+4c4J6C2Vas0+L0=
X-MC-Unique: cPUy5g2FMB6P4JcitluEOA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=CdnAhoVKHeoJ/6hdHOgC3ZJtBSTpICAWzre2uEis4/ZtdFW9tf0CKgnZ2rEY6AGlwDkSsnKl1sx4ui5dENQ2hWYSfmiN9agMvoE3LDHPmwoVllUvmTYp42D79POiqQKVhNjK5tnigy/4hhWBGmCLq+AlIrNT3K7HD72eaWJg84qTo6iGreWHiqOsaRHkIw95EejDJIItGMIo2QLnPlYm95ZkmGxvZwl6X9aIv9LoJeFKLZ7dT1Zaf9+9ordP6NAtDiAPtv2SXP7GWXj5echfwckUg83X8kzhgOZX49Avj5vKh92u8wghhh8EfNzYd9wistk6393MnUJVwhSnJSfzUw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=R2B0lIJ9tAjzbrUIlL9HmnypKenAbC+cZenZHpOlip8=;
 b=e9rJBM0VmYNJ2JsaYU5Nj9jyWIHEAmK0ZL4BGCggpKKFBIV0ABYI32WHHguaCgyoa3N/rjR42NDCiA//kHpOTMh5IDCVP18hTxWu9+p406Igs2UNG/V9DD/+LdqCU6Tpio/OHtbOTXg9F1sagdKzhaBdHDNtqo0brk/DnOh9tWlfcrHLq1rnqdk9ZMhAHrWLn4WpsO/ScxGMRmrR/Nc+L6JZf/av21BnqWoaWy/sNH75HJXsENWkVENGFOarIg9cyGPiyBoKYwq6Md8YDcH5vlmmkewhSh/N6BR8/EfQA+B6maFDQaqhQWasoiUn2evDAY1MHeLRG14CFTPfSYdJ2A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <bd668aaf-441b-d7d1-1a07-15f0aec870b8@suse.com>
Date: Fri, 4 Mar 2022 08:02:00 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH 3/3] hvm/pirq: allow control domains usage of
 PHYSDEVOP_{un,}map_pirq
Content-Language: en-US
To: Alex Olson <this.is.a0lson@gmail.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 Roger Pau Monne <roger.pau@citrix.com>, xen-devel@lists.xenproject.org
References: <20220303103057.49181-1-roger.pau@citrix.com>
 <20220303103057.49181-4-roger.pau@citrix.com>
 <9a02db6a23b269fe774ad4a0bc4c662e5e4df37c.camel@gmail.com>
 <c416bfc2-218a-e641-5fd7-505ea4f7a322@suse.com>
 <8a1fc9175a1227e8f7271face85e5a38671e0891.camel@gmail.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <8a1fc9175a1227e8f7271face85e5a38671e0891.camel@gmail.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8PR04CA0068.eurprd04.prod.outlook.com
 (2603:10a6:20b:313::13) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 7695ea34-4410-4448-8df2-08d9fdace250
X-MS-TrafficTypeDiagnostic: PAXPR04MB8367:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB836742DB16802E232C9AE4CCB3059@PAXPR04MB8367.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66476007)(6506007)(66556008)(53546011)(8676002)(6916009)(66946007)(6512007)(2616005)(6486002)(31696002)(316002)(54906003)(508600001)(86362001)(83380400001)(26005)(186003)(38100700002)(4326008)(36756003)(8936002)(31686004)(5660300002)(2906002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?eXBZMmREc3g5cWxRZFFxc3J3cERXUmxmc2dqVkZzVmZ3bFhvaHMyekdnVG1t?=
 =?utf-8?B?RVRqaHFUYjJYbitxT2dleUh2ZUdFOVhUWEw0MU1SK0YxSkJraDZxSGpTcHVh?=
 =?utf-8?B?MUxZV0lSem8zVHhhUEJub2RpYW5YOUl5WWtPNE1aKzB1Q3EwZlBjT0pzTEF6?=
 =?utf-8?B?UlFEWklTazRlTDdDc2ErakZTRzBuK2FLN1U3c0RxNUhyV0pSTmFvd0VTcnlR?=
 =?utf-8?B?MlVJQSt5K1JlQW9BVURRdDU4ZkJ6a00zdG52VG5jWElKY09yem5QZy9xcm1h?=
 =?utf-8?B?QzVnSldFcVVqbEk0WG14QUk2NDlqU25aTWpmdFBzbGxjRFBEdWE5U2tKUUla?=
 =?utf-8?B?Z0QxNnlQUFZPcytZYzBOcjdzaHFYN2JXRmdvc2d2NitVOUlUb2Z6TGttVS91?=
 =?utf-8?B?aU5VOWppa0Zoa1ZheHBOMEUxcHF2ZDFHRFZCQTlRM0VPVWtBY2hNdmNheEhU?=
 =?utf-8?B?TWhwd0RYR3diQ1JsQ2J2Zy9JTVRFMVdHY0gyaFYxS08yNUV6aWQzeE5IdXRV?=
 =?utf-8?B?YmJUYnBtYW9NL2J4dm9QMlY1U0t6a21HbVlvRGhCaFdtRVFtNmtENnIvdWdJ?=
 =?utf-8?B?U2szSjQ5VHQzWG5aVDByc09HazJoMDdEYy96WW1JYkpZSlA2YUExRjlFQ2lW?=
 =?utf-8?B?bVJuKzBSTC9lT0hpeWowNmI1U3JKaUk5SHV2OWg3endiM215Z0VDVSttTVZa?=
 =?utf-8?B?N2pSc255aUVKWWpObVFNSVpVQ1lGQUhOS3UxWUJncERJSDBvbVR0bzA5bnBn?=
 =?utf-8?B?enA3b2MwRCt6OEVMYTR2SE11ZHlxT0k2QW5RLzd3TWx4bkhoVjRRV3owMGtk?=
 =?utf-8?B?TGNQWm9nRHlzbWk3b2hNR2lUMGVRbnNibll2T3Zvc1hMMy9GeUY4M2Njdklt?=
 =?utf-8?B?R0o4TDJYaXp0ZlNZc2dlNzFTR2pMN0NFSjN2aUJONWdGTjhkQWc5U1ZGRENX?=
 =?utf-8?B?djQvWno5MDlJczZKL1MzcFVheWNTeHRoSDZFcGZ3aUhFSGM0Rk1pYlFxRW1Y?=
 =?utf-8?B?QXNuOVA2YWJNYU5ZSDhLbTF0azZLT29hN3VIUk1lak91QXMxTkZkRGEvd3Nu?=
 =?utf-8?B?SmFLM1B1RnkzUTdKdHVHWmlDTm84SEc3Z1BPekVDUzdoL0Q3VWsxZkFxWmk5?=
 =?utf-8?B?L09kbVN4anhoZC9hdU1lbFVvRGxnODcxenlCS2E5OGNPQnJsVGdDaVlEeVdF?=
 =?utf-8?B?L2FtS2JrNXdRaWtoU1JtMkdNT0VQenRiTGJHOGJOY1QxcTlSWVFTc2lnS1pP?=
 =?utf-8?B?d1dURmNCWlZJdjNYKzBFUDhyMm5HLytiUVhzWVRkNU5FOXlWN3JoOHF3SHdN?=
 =?utf-8?B?NlM2ZWtJTkVEL3FSaG94LzB6UjVvQzRqR3cyYmptN2p4RmVQZ2NGWld2M3pL?=
 =?utf-8?B?MjAyNmRGbFRGNllBSnp0dm0rMVVYY3dDRDQ0d3p1Zk93ZVBlUzNRRGFuTVBK?=
 =?utf-8?B?ODM5bTEzeVEvUjZTODRnbkF4cndyYjA5Uk5YekI4aGhyRktxRjFzNmxYcllS?=
 =?utf-8?B?ZngzNWkwYVdZN3NnYW1VUHZiNlpvb3h6aXUxVGNPY0tNRmRVYUZ6b0xmTk85?=
 =?utf-8?B?VFlpOU5JYVZHMkNCRTZBT2F5cyt4K0cvL0wwZHFLbURRbGV5VHg0czhYQUNT?=
 =?utf-8?B?a216bzdFOHRoV2RRUlZwT2VhRkNoeGJWYTNGQXhGaDI5N2JBQnlITWR1UHlq?=
 =?utf-8?B?eW5mOTExSmdGMGxvMW9weDJzUEdvOFl2Q0VyMjBlMEdnd3pJcG44b0xQTlhh?=
 =?utf-8?B?K0NDaVltTk1mYSs2Nm9kNjBwdUVPaGxvWklyRm9vWW13WmdoSXRHSmVVeENq?=
 =?utf-8?B?aGFIUlVjUndPY3BGQSt1NTkvUjVGdW9GdXVkR0I1U2F2ZUJmc25Hbk12RlRK?=
 =?utf-8?B?MEpMVWg4aXQyQlpIU3BNY3V0TjBPVENScjIzMlh6YjZCZllQcXp2QVM4bXYr?=
 =?utf-8?B?VGhTVGo3WkxjTDVoN2hvK0hrb0NySWJPZjdEVk56K2lTWG9hTm1UZlUreWN2?=
 =?utf-8?B?Z0w1dWJ4MzF4cFZnVnhwZjUxVUZNVC9ZVGhuS25kLzA3MllkY1FlZ2tPdVl2?=
 =?utf-8?B?Sk1tMlFMMnlkZmlTb3Z0SXg0OHRpREVRZlVZalNOWWoydm8vRXlEbnJEMHZu?=
 =?utf-8?B?T0lVbVRPVUlPY25IUzVtWUhyNnVJajZCTlJtSm5CT1RDeFVSVXk5UUQ4TTFo?=
 =?utf-8?Q?N4bfMzGKbRNbEoj1/ZTuq74=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7695ea34-4410-4448-8df2-08d9fdace250
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 07:02:02.4643
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: WKV+59YAADT6evw4VrzupmT+Cwf/mEJzJUIyZilZlxo/bv7GAn9ZqQOFfYH4Hz9+DjLjapiwx035V5OBxUu3gw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB8367

On 03.03.2022 18:14, Alex Olson wrote:
> I wasn't sure of the distinction between hardware domain and control domain for these commands, but they appear to be blocked at the moment when dom0 executes them, including a lot at boot.  Are you suggesting to use is_hardware_domain(currd) instead in my diff?    
> 
> Or should the hardware domain always be able to execute any physdev op command? (such as to bypass the switch statement entirely)

No, certainly not. It was on purpose to restrict PVH Dom0. Only PV
Dom0 is supposed to be able to access all sub-ops.

> It looks like hvm_physdev_op() is the only real caller of do_physdev_op(), and  several other commands (besides the ones in the diff below) are also being blocked by the default case of hvm_physdev_op.
> 
> PHYSDEVOP_pirq_eoi_gmfn_v2
> PHYSDEVOP_pirq_eoi_gmfn_v1
> PHYSDEVOP_IRQ_UNMASK_NOTIFY // legacy?
> PHYSDEVOP_apic_read
> PHYSDEVOP_apic_write
> PHYSDEVOP_alloc_irq_vector
> PHYSDEVOP_set_iopl
> PHYSDEVOP_set_iobitmap
> PHYSDEVOP_restore_msi
> PHYSDEVOP_restore_msi_ext
> PHYSDEVOP_setup_gsi
> PHYSDEVOP_get_free_pirq
> PHYSDEVOP_dbgp_op
> 
> Thanks
> 
> -Alex

Also - please don't top-post.

Jan

> On Thu, 2022-03-03 at 17:47 +0100, Jan Beulich wrote:
>> On 03.03.2022 17:45, Alex Olson wrote:
>>> --- a/xen/arch/x86/hvm/hypercall.c
>>> +++ b/xen/arch/x86/hvm/hypercall.c
>>> @@ -84,6 +84,17 @@ static long hvm_physdev_op(int cmd,
>>> XEN_GUEST_HANDLE_PARAM(void) arg)
>>>  
>>>      switch ( cmd )
>>>      {
>>> +
>>> +    case PHYSDEVOP_manage_pci_add:
>>> +    case PHYSDEVOP_manage_pci_remove:
>>> +    case PHYSDEVOP_pci_device_add:
>>> +    case PHYSDEVOP_pci_device_remove:
>>> +    case PHYSDEVOP_manage_pci_add_ext:
>>> +    case PHYSDEVOP_prepare_msix:
>>> +    case PHYSDEVOP_release_msix:
>>> +        if ( is_control_domain(currd) )
>>> +            break;
>>
>> These are all operations which I think are purposefully permitted to
>> be invoked by the hardware domain only. That's where all the devices
>> live when they're not passed through to guests.
>>
>> Jan
>>
> 



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 07:23:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 07:23:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283969.483082 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ2HR-0007hS-1X; Fri, 04 Mar 2022 07:23:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283969.483082; Fri, 04 Mar 2022 07:23:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ2HQ-0007hL-TI; Fri, 04 Mar 2022 07:23:12 +0000
Received: by outflank-mailman (input) for mailman id 283969;
 Fri, 04 Mar 2022 07:23:12 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=LpR9=TP=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nQ2HQ-0007hE-BB
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 07:23:12 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f2198876-9b8b-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 08:23:10 +0100 (CET)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur03lp2051.outbound.protection.outlook.com [104.47.8.51]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-20-xanM2N8VPdCwo8-Tr2emRQ-1; Fri, 04 Mar 2022 08:23:09 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM6PR04MB6296.eurprd04.prod.outlook.com (2603:10a6:20b:b5::22)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.17; Fri, 4 Mar
 2022 07:23:07 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.017; Fri, 4 Mar 2022
 07:23:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f2198876-9b8b-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646378590;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=62xcxUc4w+30iYjWp36YDlow73h/33prvah3JI0xBSQ=;
	b=Q+jM51kXNMgLzWzK6KjayBY8+ha2JYINzGl3XCdBTTUtDwORSPV6kF/RyifjroV775UQEI
	UcOtLZA6QJqpTyFu7aF2ISjXWwFmvfoUd22YI0f1apLkCFcdnjlQ4MDDoUcS3BPGC5M2Wy
	kiGW+MzPiLHSp1MK/P0mTts/RqeBAgU=
X-MC-Unique: xanM2N8VPdCwo8-Tr2emRQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Jth0Um6UxX6n8tRx/gCjlwFYapZbZJ8aLXwAMNxhz1P76w3H7Hl2Uq8ai1i8lmm+70RHi2UC1agXwhOQkqK9q44bpbOqm1kc4OlnQUP2nMCIkh2Jek9kGClit/6n4e2OlfCS8lTYQKhF/Dcdn+DAlGXpHEncJzx8iiUyqp6WbDdZvsq1wSzoBf3blhQwLY9dIdLxnCRviMXchx+AWxKjnIyUVKih6GFAYRi3gDegb7FnFVkd5fQgQaXLuHAAigMUjlQiy7cKdt+qoMembkz/uhBQr1+aV+tsTvxlzZkV0/g+uTkEx4Ya+Y1hcHk8P4Ye5PEpDWY+1ODYlPM4S9/IRg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=62xcxUc4w+30iYjWp36YDlow73h/33prvah3JI0xBSQ=;
 b=br7r+DgqB4lMP/Zz45tIAMKWKa0f/98Vrh0RZlQQ1DjECFVmQcO2cGtn1XjUnoYC2cUZryiKB71y5Umx1rHi0N7xo+EO1kpCstsi0WcMc/NiN7jcIVBMAvgaqadFFfBUzFkOSd8D4dO0yYe8XcqtbInPWzqrjZ0psFD4skGD5nh6ACxA8qA4NndTdtX+SysAtXA5ES5/5eC66JfQoJEKDluITMp76Mo10xfkhQsooSm7AlDDSb3K9lIHwmceifhO8jVLwf8ZEw9370hToShA0VYYQl5v2pOTuRCQqLFvsqrq3ta3VCJFhK5hFvO5xSfOa6cqRC8r4dKZy1Ae3Jd+/w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <175a55cc-70b4-4832-9a78-0db57a9ae4a4@suse.com>
Date: Fri, 4 Mar 2022 08:23:05 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v2 1/3] xen/vpci: msix: move x86 specific code to x86 file
Content-Language: en-US
To: Rahul Singh <Rahul.Singh@arm.com>
Cc: Bertrand Marquis <Bertrand.Marquis@arm.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>, Wei Liu
 <wl@xen.org>, George Dunlap <george.dunlap@citrix.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Paul Durrant <paul@xen.org>
References: <cover.1644937405.git.rahul.singh@arm.com>
 <4d2a727ba218468e4f347dc12ca051a0534fe205.1644937405.git.rahul.singh@arm.com>
 <6e188f87-7e4c-00ee-dd0c-373d42acec34@suse.com>
 <6BFB9B87-D8A1-442D-B4DC-18760C59D7BF@arm.com>
 <c11278f4-c902-0eb9-ac59-e27c0f2ba912@suse.com>
 <41F03A07-F8D6-423D-9E40-F4B89C611C87@arm.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <41F03A07-F8D6-423D-9E40-F4B89C611C87@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR06CA0372.eurprd06.prod.outlook.com
 (2603:10a6:20b:460::26) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 912c8b74-c6b4-4f23-ec46-08d9fdafd47f
X-MS-TrafficTypeDiagnostic: AM6PR04MB6296:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB62968CAF728B466F037E97E7B3059@AM6PR04MB6296.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(53546011)(6506007)(8936002)(5660300002)(38100700002)(6512007)(31696002)(6486002)(6916009)(54906003)(316002)(86362001)(66476007)(66556008)(66946007)(8676002)(4326008)(508600001)(83380400001)(26005)(186003)(36756003)(31686004)(2616005)(7416002)(2906002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?ZElkQnY5T1E4d3JvQm0rYWo2TmI3ZnY2YVA4WEhkdit2YUZKa2NKRGxjUFZQ?=
 =?utf-8?B?S29YYzhCUXM4N1o2ZkcxWFpOc1MvSzBqVVMzdGtiS0dxOHFpOHJacWxqZTY5?=
 =?utf-8?B?bVpTMTNuTlJxZDJZWEMxVytoT0JPdFB5bHRSZmlFcUdhK3Y4ZkFBS0VXbUM0?=
 =?utf-8?B?eFlOT0JaWWVURkNzMlBaaFFXajdVRnFia0EyalNPUG4wek8ra0tRU1BZbEh0?=
 =?utf-8?B?QUpSZFM3S2ZzdkkxdHdnRjFyL09hYTBRZmRqZFdkdXpGSHZIdVJkREk3K3h4?=
 =?utf-8?B?THE1WXJWRmk1M0s4eXJWNlNPWmFhZkEzVGp6Y3ZZcDViR1VDWEIwM2hHV2pl?=
 =?utf-8?B?ZmVRdTRObHo1bXpTMEhpbWFHaXpJSjBMK1RRZEovaTBBUUZTSDUySG1VZDhN?=
 =?utf-8?B?Wk15emFqN0I2b2p5c1ljSCtrZ1RnQmVjMUhiejJzZjRDekVwanFPZ25pYjR0?=
 =?utf-8?B?OEYxSG11aXk0RFNzVzJSQnhSSnpWNGFtc1M3ck5tcnlsUE5qL0dOSU01cGJk?=
 =?utf-8?B?S0orR0pLVFk1UFhzZXlid0ViYmxLWno0UW44TFdWclQ4STVjSTBsL3dEdGVv?=
 =?utf-8?B?b0ZMUUtJQ3BnM2tuTHRjeklKWDUvektydzkzdCtvUGV0MHhIeVkveWZIY2xD?=
 =?utf-8?B?aHdLR3drRmZKc1R4ODVmUWtMQk5IRVp5MGdiMFFtZzhNU2RBOFVPYmlWNlFX?=
 =?utf-8?B?T2xOL1ljQ1dFN2o0b1kxZEdkcytFZTRCUGN2aHp5WDNLblRHSWpWZGQvYmNi?=
 =?utf-8?B?TDFNdHF1cjE1ZXRJTzA3Wnk4NTJCbkVCL1pleXVxNW02R2NRVlNWWGJoTWJZ?=
 =?utf-8?B?QUlQSXUxTml6ZmFZWmJkUVRpQWZwbWNXd3N1c3p6d05RdW44aWNrQVc5NCts?=
 =?utf-8?B?NzlXbmRKaVEvenp1ZjZuQ2kwZFZUQThhYjY4RzVGTDBXajJXV0ZDMGNyUlpp?=
 =?utf-8?B?NEFjNTJWMzdPQVFKY3ZpVzJYdW1wSVVOVUNzZUVURHZSelZOQ2xxTHYyUE0w?=
 =?utf-8?B?d3JLMHVtMlgyTGNsN1dvTVhTWThwcUdlNnR5VVQzZ0V6Q3Y3ZlVIYTNlU01l?=
 =?utf-8?B?S1pqcVo3ODFweDZ4ckNWRUk5aWU2MkhvWVA2K1VHOE9JNVNTQ04weFMxai8r?=
 =?utf-8?B?MEpqU2tZWnBHN1d0ZExHL1o2UGNtRzB0QzIyWnBOYUx4NVR3ajNHWjNUeGpn?=
 =?utf-8?B?UDVEME5FK3FXZzJtZ0NQL28xNGdFNDZYUEpMekNDcHlsdVd6Ym41NTBWenRD?=
 =?utf-8?B?Mm92bUVRUWhqMG5aVkdReHpENVQ0bTlmY2VlQW9mcVZIb1hhSU5BdmRiVDEz?=
 =?utf-8?B?blpkMVFPWE5zeTdyblNLTjQveGg1QlF4Ni81R3diUGxMUE50am42MG1KaElE?=
 =?utf-8?B?ZEFTNWlRUUdGV2pQSUtGNTh0SXlOcXA4YWt1QlV3aWRmc3k5UG0vT0ljU1d5?=
 =?utf-8?B?amdRVkNoejRrQUpkTS9JUnV3Y3VFdUlQaDZ5LzV3bU90UWFocDR4QXRlTEN1?=
 =?utf-8?B?MUVvNGFQUkZ4K3hreGJDdWxlOXBCL2lRWjYzbWg2b1U4NjBMeWRWZFpCZSs2?=
 =?utf-8?B?UlZPVG9EaEl5NDk1N0NlZmhCL2FXRnFnOFF0d2tuQlRSN0NndXQrb3doOTBV?=
 =?utf-8?B?NDhoQnJNbW9nVkJLRHRBUlRmVWl2MDE4bkdXVU5qLzJ0b3o0WCtPbS83Skoz?=
 =?utf-8?B?REE2Q3MrOGZOUGs0UElWbEhtaHp1OVVvTjBUQnRJSlliZU5VZXc3Mkh6SGhV?=
 =?utf-8?B?NEczSHFIMEVsUC8vREl5TjUzK3NaR1cwaHVOQ2dLRWNSd0J1QVZEMmIvVXVm?=
 =?utf-8?B?Yk1JTjhWcFhOQmR2WlVHWURlcUFFVmxId0U0Zm5SMExWQlBmNndsODYrMkpw?=
 =?utf-8?B?THk0Y1hudkVscE9GTFhwa0sybjRBNGxpY1dpQ2c2N0Z2eHByZWNqRmtEZDln?=
 =?utf-8?B?bzlobjJ6Q3lzODhtQnhnYTY3ZGpMcEp6QUZCZ1FrV3BaeUtmUDFGTGdlMndn?=
 =?utf-8?B?R0JkZ0ZVWDhUYm55d1pjaS9hVWZvUVM2Z0Z4QWdjQ1U0RzlxWXhYKzlQcm1D?=
 =?utf-8?B?a3VtMStXTVlDQjd6RHpuYXFua2JlK1BlME14ZjJQTkR0WG1PWTMxOHpiY3Ns?=
 =?utf-8?B?K0p0UXMzKzZIVzl4bUl3ZWZxd0pZNXBOeFB4ZjdVdXg1UmQ1dUtNb0FHZ0Iv?=
 =?utf-8?Q?L7wMiaRgqjp06SpyamtnXBE=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 912c8b74-c6b4-4f23-ec46-08d9fdafd47f
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 07:23:07.6986
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Mq8fAXghsWOFHCYsCfVaDQ3D1frTv8jsi5zAbJR6PEQ1zNuiqKf0fzK4f0Hn7z4k2PhTzDoCDI5zeS7O5iSkEw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB6296

On 03.03.2022 17:31, Rahul Singh wrote:
>> On 1 Mar 2022, at 1:55 pm, Jan Beulich <jbeulich@suse.com> wrote:
>> On 01.03.2022 14:34, Rahul Singh wrote:
>>>> On 24 Feb 2022, at 2:57 pm, Jan Beulich <jbeulich@suse.com> wrote:
>>>> On 15.02.2022 16:25, Rahul Singh wrote:
>>>>> --- a/xen/arch/x86/hvm/vmsi.c
>>>>> +++ b/xen/arch/x86/hvm/vmsi.c
>>>>> @@ -925,4 +925,106 @@ int vpci_msix_arch_print(const struct vpci_msix *msix)
>>>>>
>>>>>    return 0;
>>>>> }
>>>>> +
>>>>> +int vpci_make_msix_hole(const struct pci_dev *pdev)
>>>>> +{
>>>>> +    struct domain *d = pdev->domain;
>>>>> +    unsigned int i;
>>>>> +
>>>>> +    if ( !pdev->vpci->msix )
>>>>> +        return 0;
>>>>> +
>>>>> +    /* Make sure there's a hole for the MSIX table/PBA in the p2m. */
>>>>> +    for ( i = 0; i < ARRAY_SIZE(pdev->vpci->msix->tables); i++ )
>>>>> +    {
>>>>> +        unsigned long start = PFN_DOWN(vmsix_table_addr(pdev->vpci, i));
>>>>> +        unsigned long end = PFN_DOWN(vmsix_table_addr(pdev->vpci, i) +
>>>>> +                                     vmsix_table_size(pdev->vpci, i) - 1);
>>>>> +
>>>>> +        for ( ; start <= end; start++ )
>>>>> +        {
>>>>> +            p2m_type_t t;
>>>>> +            mfn_t mfn = get_gfn_query(d, start, &t);
>>>>> +
>>>>> +            switch ( t )
>>>>> +            {
>>>>> +            case p2m_mmio_dm:
>>>>> +            case p2m_invalid:
>>>>> +                break;
>>>>> +            case p2m_mmio_direct:
>>>>> +                if ( mfn_x(mfn) == start )
>>>>> +                {
>>>>> +                    clear_identity_p2m_entry(d, start);
>>>>> +                    break;
>>>>> +                }
>>>>> +                /* fallthrough. */
>>>>> +            default:
>>>>> +                put_gfn(d, start);
>>>>> +                gprintk(XENLOG_WARNING,
>>>>> +                        "%pp: existing mapping (mfn: %" PRI_mfn
>>>>> +                        "type: %d) at %#lx clobbers MSIX MMIO area\n",
>>>>> +                        &pdev->sbdf, mfn_x(mfn), t, start);
>>>>> +                return -EEXIST;
>>>>> +            }
>>>>> +            put_gfn(d, start);
>>>>> +        }
>>>>> +    }
>>>>> +
>>>>> +    return 0;
>>>>> +}
>>>>
>>>> ... nothing in this function looks to be x86-specific, except maybe
>>>> functions like clear_identity_p2m_entry() may not currently be available
>>>> on Arm. But this doesn't make the code x86-specific.
>>>
>>> I will maybe be wrong but what I understand from the code is that for x86 
>>> if there is no p2m entries setup for the region, accesses to them will be trapped 
>>> into the hypervisor and can be handled by specific MMIO handler.
>>>
>>> But for ARM when we are registering the MMIO handler we have to provide 
>>> the GPA also for the MMIO handler. 
>>
>> Question is: Is this just an effect resulting from different implementation,
>> or an inherent requirement? In the former case, harmonizing things may be an
>> alternative option.
> 
> This is an inherent requirement to provide a GPA when registering the MMIO handler.

So you first say yes to my "inherent" question, but then ...

> For x86 msix mmio handlers is registered in init_msix(..) function as there is no requirement
> on x86 to provide GPA when registering the handler. Later point of time when BARs are configured
> and memory decoding bit is enabled vpci_make_msix_hole() will clear the identity mapping for msix
> base table address so that access to msix tables will be trapped.
> 
> On ARM we need to provide GPA to register the mmio handler and MSIX table base
> address is not valid when init_msix() is called as BAR will be configured later point in time.
> Therefore on ARM mmio handler will be registered in function vpci_make_msix_hole() when
> memory decoding bit is enabled.

... you explain it's an implementation detail. I'm inclined to
suggest that x86 also pass the GPA where possible. Handler lookup
really would benefit from not needing to iterate over all registered
handlers, until one claims the access. The optimization part of this
of course doesn't need to be done right here, but harmonizing
register_mmio_handler() between both architectures would seem to be
a reasonable prereq step.

I'm adding Paul to Cc in case he wants to comment, as this would
touch his territory on the x86 side.

Jan



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 07:29:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 07:29:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283976.483093 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ2No-00008x-NV; Fri, 04 Mar 2022 07:29:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283976.483093; Fri, 04 Mar 2022 07:29:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ2No-00008q-KS; Fri, 04 Mar 2022 07:29:48 +0000
Received: by outflank-mailman (input) for mailman id 283976;
 Fri, 04 Mar 2022 07:29:47 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=LpR9=TP=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nQ2Nn-00008k-8Z
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 07:29:47 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id dda19dd3-9b8c-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 08:29:46 +0100 (CET)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur03lp2058.outbound.protection.outlook.com [104.47.8.58]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-40-V-nxuICBMES9oqmZd2FHNQ-1; Fri, 04 Mar 2022 08:29:44 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM6PR04MB6296.eurprd04.prod.outlook.com (2603:10a6:20b:b5::22)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.17; Fri, 4 Mar
 2022 07:29:43 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.017; Fri, 4 Mar 2022
 07:29:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: dda19dd3-9b8c-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646378985;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=Vob/TRDzpFKLurlcs5DJ56sShHWhgC6Etwn80wNOGWo=;
	b=RgZb6r529oPWitvrlevRo7pn/hVMbbMQLwkiitXC4P36tMPxH94WFgrmhXY38+IZHwSLpv
	OqtjeHI2s2bxB2WOqPEDIvV4sfV7c5HY8h74ZL33lU3Et7zq/EnMMKl8meHU2nwFmo77/q
	UfNfeoeMQogo7urPbGlTuvLyUNYdP/8=
X-MC-Unique: V-nxuICBMES9oqmZd2FHNQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=LwTzS2SdKxLfN3rWLPInEoeTYkI9/tHc3Mcx779lI+og0xpNNtUox0BJQAwwPgUmg1XIWpUjuHJIourVO3TcLlE4rwL5aEL2ewfvv2589vI8otoKt8qXezYwma+WX1kE4YaykCOeSuf7xpmZ8A5TVbHYo4ggJvZMpwgVaUN7hQSyEGKaSFsglpW6JnNXtwekYWtk+uM5LIgeE/9mZaZDKBYMX/H33vPnVHjIpOKwuclAsjvKJQmQgFo4WFoaLmvexPfNm0AOu5GBo64GHMcqYVmrxbBVuhtozzDHhjJo0UduRf+nXLowOlKSsOk7ZQXe/qRh6DN9XSnIJUINnbWxag==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Vob/TRDzpFKLurlcs5DJ56sShHWhgC6Etwn80wNOGWo=;
 b=i6eQj2ob+XaoLCXBpPdubUynB43bbIgoLBcp6Wup3enS3n2GmPSLQe/3dNW6pGc4nAT71QlNgJkGfBRkZKvsP0wt+gFTbBIns9coXAD7deRWmoRAjpcPzdxB52Xvx5MMPXsOslfjePQoAOgkG5AH5dnIFTrgBcBj7O2RfrvfEesSfmaAHptv5kfeFTTA94jT+U/Z6eYXRk/JOJI2Q8mkqueJcyAzqD+an4458BhRknlSmlV6YKIL5JN+SeKN8sTiwdzPz2cDfluDhPwRznEw7Tbp7r3YSJqY/075SJYqad2leu/28s7QQVXo403BphPSGxo3rj2CAsNueCDSdnAY0Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <c85691b8-675a-7a7f-8c38-d224c88a9aaa@suse.com>
Date: Fri, 4 Mar 2022 08:29:42 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [Regression] [PATCH] x86: fold sections in final binaries
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
Cc: Wei Liu <wl@xen.org>, Roger Pau Monne <roger.pau@citrix.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <03851bd4-9202-385f-d991-c9720185c946@suse.com>
 <85b6a876-ac8c-051f-5b61-23c58b29c1dc@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <85b6a876-ac8c-051f-5b61-23c58b29c1dc@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6PR10CA0080.EURPRD10.PROD.OUTLOOK.COM
 (2603:10a6:209:8c::21) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: af66dbc6-598a-4d73-827a-08d9fdb0c08e
X-MS-TrafficTypeDiagnostic: AM6PR04MB6296:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB6296AEBBAC20524002CD772BB3059@AM6PR04MB6296.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(26005)(186003)(83380400001)(2616005)(2906002)(36756003)(31686004)(38100700002)(8936002)(508600001)(5660300002)(6512007)(53546011)(6506007)(8676002)(54906003)(316002)(86362001)(66476007)(66556008)(66946007)(4326008)(31696002)(6486002)(6916009)(966005)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?QkZXdkVFRy92SFl0MndvZWc0UXppZWJVaHVGL0dhQzYyeFhRNFpRaUZMS2pk?=
 =?utf-8?B?ZHZ2V3JGbGtUSzhKQ3RVTDBOTFRMbVhmaTdQaUNzaVFaTUwxR1dOWWRvOFNB?=
 =?utf-8?B?Z3Qyc2pCaDJnRzVMZWdqRDVPdHQ5UG85cDl5OC9lYi9td2pXd0tDV0QvaXNa?=
 =?utf-8?B?UkltSER3bEpFREppNkpBNUhYR0c1RFNONXdTVDlKSzYya1dVbGhYTVdiZkVp?=
 =?utf-8?B?RkIyWlV0cFRwbjlld1ZTSkUvNWtYdnRDNVIrakVaZFFDcGJ6Qi81SmxiK3lR?=
 =?utf-8?B?MGx2bEJiUzd0L2x3LzVOQWkxa1pxMHU4MEtNT3hFRnRaanVkbi9vVjVzQVps?=
 =?utf-8?B?RWRzMDdTbXhXZVNtdE9WdXM4RWdOdGhwOG9FMG5qcnZ6R3ZTdDh6WTM2ODJ1?=
 =?utf-8?B?YWE2Y0JwMnlsWXBpQmRKcE1OUldyUnhYcElDNjBkb1NjMnhPREJUMGpuQWQv?=
 =?utf-8?B?N2VScHZSeC92L1Y4UVhnWWNqb2VseEEyT0t2ZVpqMVlVdjZwWGZodFkvQ24y?=
 =?utf-8?B?REUrZ0wxT0xCS2JWWGpPQ0RYZENJWTQ3TkgzZlp3cTVSTURQL3l2YjA3OWJa?=
 =?utf-8?B?WU9YYzZiZGljaDRWcCtaVlhwUU96blJpaDlQeGJiSnJKZE9hVlJkV3RMd0NU?=
 =?utf-8?B?a0dwZ3N3REdweXo1S016VmtTdkF1bFdHNTlVeUo0eVhZeURFOHp4eDJiMldL?=
 =?utf-8?B?SktHMG16cDd3Zk1yZzVMNmV1R1VuQ29vSXpqZFpybmtUR1VBcmViQmlDaG50?=
 =?utf-8?B?ZUhTQ3dwZnNPZGpsUkdRdXltR2xKUWx6aFR3Z2RpNGp0VEYvYytuVXZUOURD?=
 =?utf-8?B?TUI4VU13WVpXY09IWVVMQjRwN2pyTjE4NHBUdHY2ZzlDWWVScU85aU15TVRI?=
 =?utf-8?B?YUFGYUkyVjExMHU0NEVnL1FTRkNuc3YyQ2VzLzJhc0djT1U2eDNyMVBHVVlr?=
 =?utf-8?B?V3lWQWcwUE9IZkh5Y04zbURwa2lrbUZpZ2FIZS9hdVhFNFBwY3hNTXlyQWQy?=
 =?utf-8?B?aEtVZENWQWpBZ0NRTGcvR29JT05MVHg1b1JUVFNyem1xcGI2Mk9JY01nb2ND?=
 =?utf-8?B?aFNzV0lJTmhYVnc1dyt6NmJWRUY0TnBTMktvRTVBcGJwT1pBcS9RdnFSRlZ1?=
 =?utf-8?B?TXZJa1ZudWFNN3d0NmM2ajdPcmhuTTBnaUVkU1JHSjZPcjQwQVFNVkhCaGRm?=
 =?utf-8?B?eTFhN01uMTdYZmJrbDErK1NoMU44amFaRzh6dHNzMXVlQ1luS0toTFdmK2ho?=
 =?utf-8?B?SnJFeDd2dTQxL2VNcWxWL3g1Q0tjZ0Q1dk5pc0xGdWFtMjh5WDJQa0FqMzM5?=
 =?utf-8?B?TkpBaGU3TjZNUHZVN1hDMXc3d29IeG5tRzNqd1hSZmdXRUp5OEhEY3N1bU1Q?=
 =?utf-8?B?MWVRUzlKMFl2MGY2NWxaUHZ5emFreWN0RlB2YTE4ZXNtL25tbUpBVUR6RUF1?=
 =?utf-8?B?U0Z6QXR0SDFLUVY0TEpXNkhJYlFCamVKVWgxcm4vWUV6M1F1VWRxQTFBMHBF?=
 =?utf-8?B?dFJzUnhacFQ0Z2ZRbGkvVE9pQXNmb1lQYURjVmJLK3crRUNyYXRXdXVzZVY1?=
 =?utf-8?B?Z3NmdXdCeDFZQXpxVGIxbUUyWDBSUXVQdlpmSlJLcVV4djd2Vzc5U2VXOUlO?=
 =?utf-8?B?OGFaeFp3bXhVdjM4cVJ1NTFsdjdSMENEQ1d5V2twbzYxbEJMQnB6T0szeHBH?=
 =?utf-8?B?UTg5L1NSOVdqdVJzZ0hwZkFXQUowNk5UUUQwcEN0U3FJZmlKUzNoa3lGMzQ2?=
 =?utf-8?B?VjI5TWdaL2Q4MG9ndEkreFdGN1FobFBRVkZSam5KRjcwbTFrME5YMUVRdUFx?=
 =?utf-8?B?TXZKM2tVYU9TNmJCRWd3QlpHaGh0cGlLbzI5dGRVSUdKejgybU9rRks4MldP?=
 =?utf-8?B?M2s2L3J3ellOWEFSSHVYZXZ6dU9jRVJuRkJuODNaVnU0WHZnRHUzcUxWNENk?=
 =?utf-8?B?dVJ4Q0hkNndXNW1GL014NlZOYU9tS3R3RXBDT0FQbmFBUzU3T1hkdWZxTXE4?=
 =?utf-8?B?cHNpWDBTaFlFK2I5cDU4ZjFjOGdUSnNRMDRzNGF5MXRIZEUvWkQ3R0dFQXds?=
 =?utf-8?B?aDlNd2dQc2RESnZJYWkxeUNzUWNLOWZyMzhjcVdOMnJIY0dWNE5jOXN6UkNo?=
 =?utf-8?B?TnhYZ0xPT2VYdjYrMEhyRHFVKzdHNFlrdnFXUVc0eFVpVG5qdWRhaFl3bEt5?=
 =?utf-8?Q?/Fz3sGJDRo0OMg57J+7UojA=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: af66dbc6-598a-4d73-827a-08d9fdb0c08e
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 07:29:43.7522
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: iURoqrTmz+kWdjx4WXgQ1+KZOuJmPp9lnkaGHeLe4/9YABBMpexZP8SN9YFkuDAp0pm4gv3i/64d9wXan1xd7w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB6296

On 03.03.2022 21:02, Andrew Cooper wrote:
> On 01/03/2022 08:55, Jan Beulich wrote:
>> Especially when linking a PE binary (xen.efi), standalone output
>> sections are expensive: Often the linker will align the subsequent one
>> on the section alignment boundary (2Mb) when the linker script doesn't
>> otherwise place it. (I haven't been able to derive from observed
>> behavior under what conditions it would not do so.)
>>
>> With gcov enabled (and with gcc11) I'm observing enough sections that,
>> as of quite recently, the resulting image doesn't fit in 16Mb anymore,
>> failing the final ASSERT() in the linker script. (That assertion is
>> slated to go away, but that's a separate change.)
>>
>> Any destructor related sections can be discarded, as we never "exit"
>> the hypervisor. This includes .text.exit, which is referenced from
>> .dtors.*. Constructor related sections need to all be taken care of, not
>> just those with historically used names: .ctors.* and .text.startup is
>> what gcc11 populates. While there re-arrange ordering / sorting to match
>> that used by the linker provided scripts.
>>
>> Finally, for xen.efi only, also discard .note.gnu.*. These are
>> meaningless in a PE binary. Quite likely, while not meaningless there,
>> the section is also of no use in ELF, but keep it there for now.
>>
>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>> ---
>> TBD: We also use CONSTRUCTORS for an unknown reason. Documentation for
>>      ld is quite clear that this is an a.out-only construct.
>>      Implementation doesn't look to fully match this for ELF, but I'd
>>      nevertheless be inclined to remove its use.
>>
>> --- a/xen/arch/x86/xen.lds.S
>> +++ b/xen/arch/x86/xen.lds.S
>> @@ -194,6 +194,7 @@ SECTIONS
>>  #endif
>>         _sinittext = .;
>>         *(.init.text)
>> +       *(.text.startup)
>>         _einittext = .;
>>         /*
>>          * Here are the replacement instructions. The linker sticks them
>> @@ -258,9 +259,10 @@ SECTIONS
>>  
>>         . = ALIGN(8);
>>         __ctors_start = .;
>> -       *(.ctors)
>> +       *(SORT_BY_INIT_PRIORITY(.init_array.*))
>> +       *(SORT_BY_INIT_PRIORITY(.ctors.*))
>>         *(.init_array)
>> -       *(SORT(.init_array.*))
>> +       *(.ctors)
>>         __ctors_end = .;
>>    } PHDR(text)
>>  
>> @@ -404,16 +406,20 @@ SECTIONS
>>  
>>    /* Sections to be discarded */
>>    /DISCARD/ : {
>> +       *(.text.exit)
>>         *(.exit.text)
>>         *(.exit.data)
>>         *(.exitcall.exit)
>>         *(.discard)
>>         *(.discard.*)
>>         *(.eh_frame)
>> +       *(.dtors)
>> +       *(.dtors.*)
>>  #ifdef EFI
>>         *(.comment)
>>         *(.comment.*)
>>         *(.note.Xen)
>> +       *(.note.gnu.*)
>>  #endif
>>    }
> 
> This breaks reliably in Gitlab CI.
> 
> https://gitlab.com/xen-project/people/andyhhp/xen/-/jobs/2159059956 (gcc 11)

Hmm, I wonder why I'm not seeing this locally. The lack of mentioning of
.fini_array in the linker script struck me as odd already before. I can
easily make a patch to add those sections to the script, but I'd first
like to understand why I'm seeing gcc11 use .ctors / .dtors while here
it's .init_array / .fini_array.

Jan



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 07:39:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 07:39:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283983.483104 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ2X9-0001oM-Mb; Fri, 04 Mar 2022 07:39:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283983.483104; Fri, 04 Mar 2022 07:39:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ2X9-0001oF-It; Fri, 04 Mar 2022 07:39:27 +0000
Received: by outflank-mailman (input) for mailman id 283983;
 Fri, 04 Mar 2022 07:39:26 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=LpR9=TP=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nQ2X8-0001o9-38
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 07:39:26 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3605104c-9b8e-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 08:39:25 +0100 (CET)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur01lp2055.outbound.protection.outlook.com [104.47.2.55]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-8-gCVkx7wRM5yuq9ynzDaISw-1; Fri, 04 Mar 2022 08:39:22 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM6PR04MB4262.eurprd04.prod.outlook.com (2603:10a6:209:4a::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Fri, 4 Mar
 2022 07:39:20 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.017; Fri, 4 Mar 2022
 07:39:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3605104c-9b8e-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646379563;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=yCSTnhtK73JG4Bm4Aiy6BExqm0UZpVdf+AjyBQJ4yAE=;
	b=ad4z0Y6+2T3TXLrbW09V5rpUz7p3SjwnFwiWVygUgcObIb5zQ3lMK9p899tJsB4Ln2vDUo
	s3g7g7cVPGcsV2s8GYyKqhVUMhqY2q8RSGFaggYljKY3giw9zal1vI6qH8c3dzrvqrgAJs
	bwtZcY3yc80rzdQYE+uXq07eVadoc/Q=
X-MC-Unique: gCVkx7wRM5yuq9ynzDaISw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=DtNAg8+GbvBTL1xc3XZcOLBDOnhCzpVElWbsPTrB6TlmwFx0TQMUY01eRSLnyejEixrhJeNgd+3fpxHJ7H+CNzKCUlMxNiWHg+LKjRc4KIPkU4lyd/1ZPM24S6Mg7AKqvK/tvYx7u7e7y7fZls7s0U7YdnyC28WEbvLntqNLSP2KyFDryLWYDIulPdk2bgUy3YIAMw8NDre+Fa/942GRj+uO7imA5TMvq+GHZjo3xgPaOO4b/wwsjEUeeUa8AFDHOC/62cvToEYNusn2KIKuPsq5mc89oOfIQ/puX0Hid7xfTTCl/3jA0VU2PJ/RDGMM8RaqRm4hYGFT0PrZYAqJng==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=yCSTnhtK73JG4Bm4Aiy6BExqm0UZpVdf+AjyBQJ4yAE=;
 b=F9t17rlfQ5E0C6KV3xlwZCF8CqyMrmAAORgo8bpO+yNYJn68bUOTDhndDzO6jsA7YNZDXQXW6UcA9ATzywk3SBSSMzwFmH7Os3dLuXn67VbHDISvZjOVndkgh8h+Wv1yPxG3cmKbk2No8RmgS4PMNMBBkh9XUyMInS7Ux87XWwpOV9NKOPwxlq1GkVkfQmr9T2WSJ7OsANDYTCUgGZISfqQfir4j4LHtixWgmFDYU5X433YPMBJWXJnekNBgD4COY3/4ApM/2TmD2w8dhZAyl4kZNHipvVdWVmAWx2XlP1BVtxXmzRTDD6svraqi8Re7T7jeJSiI7+ejyCUCv9Qspw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <d7169f24-c5c5-fd74-7c8f-809482615a43@suse.com>
Date: Fri, 4 Mar 2022 08:39:18 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [Regression] [PATCH] x86: fold sections in final binaries
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
Cc: Wei Liu <wl@xen.org>, Roger Pau Monne <roger.pau@citrix.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <03851bd4-9202-385f-d991-c9720185c946@suse.com>
 <85b6a876-ac8c-051f-5b61-23c58b29c1dc@citrix.com>
 <c85691b8-675a-7a7f-8c38-d224c88a9aaa@suse.com>
In-Reply-To: <c85691b8-675a-7a7f-8c38-d224c88a9aaa@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8PR05CA0022.eurprd05.prod.outlook.com
 (2603:10a6:20b:311::27) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 82be941d-e6c8-4f3c-7451-08d9fdb2181e
X-MS-TrafficTypeDiagnostic: AM6PR04MB4262:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB4262C86F514BC8EBD7B7B85BB3059@AM6PR04MB4262.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	gBnTMQD4SVbo0Cc6IxsXQvMjp4kWn57H/BOUChUQrJWa2ZLl1Ku0O7Jpk8v4p+X/Q6c8LajtNomJT7bBPkPUEo7tu1l04+OLQ6ksZT8tHF6EXTZYbssuaFlrPpYj/qy6yEaZZJ8INvL0QQQ0nBnfbAiJE9ba9O6z97ehxHHyMOm3QWKFWtAIMsMawa8nH1VYxmVauaWirbH23rRXTYJJWgHn3UBVNHaTk5cBJAW9xcn8S7gATAZpbja+HkNRewFHKa0lt9TiCMU+VGZd0AdOvc4hLte/JdcPYOkg08av+Y6W7J/03uanMLElg+JA9zOxiQJLCch7BCpI8EpArBnwQ1xA3p+dzB9TwREcqCo0xv3AnQoor62AraN6F5u1hqCbsrZetxV1Sv3XJOxf+477J8Dc6rBMBON91Dgfv5EBvzVMyk27cT4DokqRk5bAzIPAbiybnI8SDCeY1ayIbBXdqdv2LAgJarxisljCft5jcSm1quCAunzhyYKOyl9o5ixsSb4MHxZPpVt2sngr8gCO8IYYoMZMzA1JMUjSm2nFMXmh6iaBaYLXN3Lb71QoKVoDsWwzwzHSzNLaRA+2dlImPBXGNPK+3InMks7FZom9HUly/MqqR+jI8l5TJ4oBUcl4l9Vuq4Wkgyfm0JUTb6KTLJsheY2OIiTG2BJVW/atJFarUJHJ+LuGJKtrKnEqsI1f+1cGBggGI9lkvj41zzecBCe0BC+gvDxUqzntYqeH5xRDqxs3votyhJwzv+ESAm+ZGTqbDzNEQ7K/VpElTQh2Cjf+IJPRLA7UKqoHglYpu2LoiD0fQS8bmkwaKXiOhl6ohtbLNnSFz3uaF4IpQVtoww==
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(38100700002)(2616005)(6512007)(53546011)(66556008)(6486002)(966005)(83380400001)(31696002)(66946007)(6506007)(8676002)(4326008)(66476007)(316002)(54906003)(36756003)(26005)(186003)(5660300002)(6916009)(2906002)(86362001)(508600001)(8936002)(31686004)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?VitqaEpFR04xN1VkOXIvdU94bFhJUk81YTZQcmVMaWNTc0g5TWJBbWRwY3pn?=
 =?utf-8?B?TkpneUhtbHdWcDl6eGY0VUJlWWRENFFvZmtjYlpIUWFrd2p0YkVQbDlvZ2N6?=
 =?utf-8?B?NFdmWFMyT0NFRGNLVFBQR08xY2tYRGZSTnNPL1BRNFd4KytvNi9kRStDdkdR?=
 =?utf-8?B?Y3RMQ05MN0g2THlJSExNaWorUGw2SWpNNWpLdjl6Uys4TVJyKzl5dTRISTZV?=
 =?utf-8?B?NFBSWTJxRXdzTnpLUS9iU2NUMVc3OUl5Y0lYVFpYYzcrMjEwQ0VnU2hxYm91?=
 =?utf-8?B?WmY0ZlJ2czFRWGtNQ1Ria21CS3oycEJjYkJFV1hwbjQ2Sjdaa0grMGQxcVgy?=
 =?utf-8?B?bDNXVUtBMkNWL1pkcllXeEVOQVk2QjJ6bWN6cXQ1Z3lRVkI2R2NSL0ZqOFBq?=
 =?utf-8?B?cTVpekppczN3eXJ6WlFteEFybTBoTk03SEV5dDNGVzYrcFBkWDdSTVQwY3Rv?=
 =?utf-8?B?SURZcHUwZkh0eDk5V0NYTUptTnFwd1p3MThMdzFHSkxZSFREZTRnSHpPRGJz?=
 =?utf-8?B?amIvV3lpQjlnY1FLN3lybkVVREtxeGV2TjNvMk9vSCsyOC9VSmMyWVBNZHMy?=
 =?utf-8?B?dlBsYXF3TE5JWGY0bWMyMUloNkJaZmR1dGhNVllMMnNBdGZVdnp5Y3AxZSsr?=
 =?utf-8?B?Tnh0SUREU081NndyQlFVTEIvVThudEoybFBNaXpNOVVHYzFYK2JvcTFwVElP?=
 =?utf-8?B?Y3BQQTYyZFVJUlIrWTZKcVJZd3JDNmJYOUZGaDFHNDg0SVVzb1JNbGh3eW1h?=
 =?utf-8?B?OGhvNnowRDBGOXR4dEhKYVBwK0svWGRKeDBYbUtSS21jVlpCZjdaY09rUjNn?=
 =?utf-8?B?OFRRSGpKZ09aUWdHNmZOa0dvbWFvL2s5ek9BYUdMb3gzQXdacHMwVjN0cXNB?=
 =?utf-8?B?VGlXMWVwZ1c1KzBxbTc5RkxaL3o3clJ4Tkl2UXZhM1hwU1libTJTQzlkczdU?=
 =?utf-8?B?d1V4MStyZFhVaEtsdVJwNTliU2Z3RmZRS2lnK21sY2xGY3lER0wxU0dRZjZ1?=
 =?utf-8?B?OGtyVmhyV2Mxa250R3VkU1ZaTEEwK1RiTGc1dmlDbElDT2t4REtKZk5pVXYx?=
 =?utf-8?B?UUlsUWNyVU5CZStZR2xLZU8yRmtTY2NNTVdhSmJQRHd3dVVGWW9IY0RpTFRx?=
 =?utf-8?B?UktPbXg2eG9LcVlsbWQ1bTI4MDd1cDVnUEJ3UiswSGpZZDZidFBOUzMwV2FQ?=
 =?utf-8?B?Wm5vZ2lqK1duZGNZc0R6ejN6bEw0NXhXNWFINk8yNUYwTklsSnlKUDlwNmlm?=
 =?utf-8?B?eXhsRy9FUFE3R3hncUVqaVd3WitkRVRHTnFGc2RpdkRsbXNVQ1hwQTgwUWZt?=
 =?utf-8?B?N1JaMk5nV0hxeFQwbkV0QUJlbzBQMDdkNXhyWGNVQktieUpXcXRmT3ZQMXJ2?=
 =?utf-8?B?MGtRWHdPak1OMm5qRmxUMWJUdzAvMitSanVMRm9nbDU1a3RibTR5M2pxVW9n?=
 =?utf-8?B?QjhkN3VVRGxBdGxiSDM2STJKR0NBMzBkc2t4N3NBV3ZBa09iZlo4emdYV1Jl?=
 =?utf-8?B?WldZMXFYVEZzRGEvdzRaS1drZk9HbWxzTEt5SXpwMFZORzlYc3RFQXdHaEZE?=
 =?utf-8?B?MHZXUWNMNHNJUVcrY3FLdlFDbkkrcVpRdWpiOU9jdXpUQ1R3TWsyOWlBY1RB?=
 =?utf-8?B?NWZvWGZISFVOYTdlVnRwOHhlVGI3WTlkOUw3NmRnY2I4UlR1TzYxancrZ2Rh?=
 =?utf-8?B?ako5NzFSbnV6Nzl5Wmd2ZnVpdzBTbStWRnFCRGpXUDVzYUdKREtONGpnVE0y?=
 =?utf-8?B?YWVYS3V2NTBDVTg4WGd2ZG1XLzhIeE04TFF6UUFmUnhjNEJFU0xOQUVQc3BL?=
 =?utf-8?B?UzJnZklYa2VTK1ZXOFVoSjdiTlh4akpDUS9YQktLbERhNzRLVDZONUpYeHVK?=
 =?utf-8?B?OHJ3SFV2K0NSSzBHNXlhdW01em16MFlyRnNoMlAvclVDWCsxZU5oeE5XUE83?=
 =?utf-8?B?NnR0dHN2M3hyd0lzY01ib3IvVFdqMFplWHArN0I3dEFjNlZ6WllkQ0lIa1BL?=
 =?utf-8?B?Wm1QaDJRckQ1WVFxSFRqbEtzR0crZ0Qrbis3YVp4UnhlZEFyTEd5K2haQ25o?=
 =?utf-8?B?d1BZbVVBekc3QS9PVHVlczJpOGpKZ0J4alhLbmY5WFpKekhlVnpnek13TW4y?=
 =?utf-8?B?OU1HNjBLTUYrUjAwWU9Ja0JBSlg1T290VlJBV3VpMFcvM05kWHNiTUV1TjQ5?=
 =?utf-8?Q?ZI/bBH4U4/5t9lkF9DTRYqI=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 82be941d-e6c8-4f3c-7451-08d9fdb2181e
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 07:39:20.1540
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 05cmNUCMdZfyNtJ39r0Fdn/mew2hZ+0fhjCd7PZsJAjVXzwVq/seqWiCpc/+UX3EdvTLX4jYxqwzR5jfAci08Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB4262

On 04.03.2022 08:29, Jan Beulich wrote:
> On 03.03.2022 21:02, Andrew Cooper wrote:
>> On 01/03/2022 08:55, Jan Beulich wrote:
>>> Especially when linking a PE binary (xen.efi), standalone output
>>> sections are expensive: Often the linker will align the subsequent one
>>> on the section alignment boundary (2Mb) when the linker script doesn't
>>> otherwise place it. (I haven't been able to derive from observed
>>> behavior under what conditions it would not do so.)
>>>
>>> With gcov enabled (and with gcc11) I'm observing enough sections that,
>>> as of quite recently, the resulting image doesn't fit in 16Mb anymore,
>>> failing the final ASSERT() in the linker script. (That assertion is
>>> slated to go away, but that's a separate change.)
>>>
>>> Any destructor related sections can be discarded, as we never "exit"
>>> the hypervisor. This includes .text.exit, which is referenced from
>>> .dtors.*. Constructor related sections need to all be taken care of, not
>>> just those with historically used names: .ctors.* and .text.startup is
>>> what gcc11 populates. While there re-arrange ordering / sorting to match
>>> that used by the linker provided scripts.
>>>
>>> Finally, for xen.efi only, also discard .note.gnu.*. These are
>>> meaningless in a PE binary. Quite likely, while not meaningless there,
>>> the section is also of no use in ELF, but keep it there for now.
>>>
>>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>>> ---
>>> TBD: We also use CONSTRUCTORS for an unknown reason. Documentation for
>>>      ld is quite clear that this is an a.out-only construct.
>>>      Implementation doesn't look to fully match this for ELF, but I'd
>>>      nevertheless be inclined to remove its use.
>>>
>>> --- a/xen/arch/x86/xen.lds.S
>>> +++ b/xen/arch/x86/xen.lds.S
>>> @@ -194,6 +194,7 @@ SECTIONS
>>>  #endif
>>>         _sinittext = .;
>>>         *(.init.text)
>>> +       *(.text.startup)
>>>         _einittext = .;
>>>         /*
>>>          * Here are the replacement instructions. The linker sticks them
>>> @@ -258,9 +259,10 @@ SECTIONS
>>>  
>>>         . = ALIGN(8);
>>>         __ctors_start = .;
>>> -       *(.ctors)
>>> +       *(SORT_BY_INIT_PRIORITY(.init_array.*))
>>> +       *(SORT_BY_INIT_PRIORITY(.ctors.*))
>>>         *(.init_array)
>>> -       *(SORT(.init_array.*))
>>> +       *(.ctors)
>>>         __ctors_end = .;
>>>    } PHDR(text)
>>>  
>>> @@ -404,16 +406,20 @@ SECTIONS
>>>  
>>>    /* Sections to be discarded */
>>>    /DISCARD/ : {
>>> +       *(.text.exit)
>>>         *(.exit.text)
>>>         *(.exit.data)
>>>         *(.exitcall.exit)
>>>         *(.discard)
>>>         *(.discard.*)
>>>         *(.eh_frame)
>>> +       *(.dtors)
>>> +       *(.dtors.*)
>>>  #ifdef EFI
>>>         *(.comment)
>>>         *(.comment.*)
>>>         *(.note.Xen)
>>> +       *(.note.gnu.*)
>>>  #endif
>>>    }
>>
>> This breaks reliably in Gitlab CI.
>>
>> https://gitlab.com/xen-project/people/andyhhp/xen/-/jobs/2159059956 (gcc 11)
> 
> Hmm, I wonder why I'm not seeing this locally. The lack of mentioning of
> .fini_array in the linker script struck me as odd already before. I can
> easily make a patch to add those sections to the script, but I'd first
> like to understand why I'm seeing gcc11 use .ctors / .dtors while here
> it's .init_array / .fini_array.

And it's as simple as this, seen in gcc's config.log:

configure:24049: checking for .preinit_array/.init_array/.fini_array support
configure:24214: checking cross compile... guessing
configure:24219: result: no

The mentioning of .preinit_array there of course makes me wonder whether
we need to also cater for that section. But with the orphan section
warning in place (hopefully soon), we'd at least be made aware by the
linker if such a section ever appears for whichever reason.

Jan



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 07:49:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 07:49:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283995.483115 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ2h8-0003Xe-R5; Fri, 04 Mar 2022 07:49:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283995.483115; Fri, 04 Mar 2022 07:49:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ2h8-0003XX-Nr; Fri, 04 Mar 2022 07:49:46 +0000
Received: by outflank-mailman (input) for mailman id 283995;
 Fri, 04 Mar 2022 07:49:45 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=LpR9=TP=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nQ2h7-0003XR-Co
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 07:49:45 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a7c787b5-9b8f-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 08:49:44 +0100 (CET)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur03lp2052.outbound.protection.outlook.com [104.47.8.52]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-33-2YBc3VmMOt2715J0Ij5VWA-1; Fri, 04 Mar 2022 08:49:42 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB6PR0402MB2757.eurprd04.prod.outlook.com (2603:10a6:4:94::23)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Fri, 4 Mar
 2022 07:49:40 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.017; Fri, 4 Mar 2022
 07:49:40 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a7c787b5-9b8f-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646380183;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=/O8NOBCkJHew4SJp04VnA85nUKzZ6JUynilejL0ZA9A=;
	b=XurWj9UgkYHdyCYRvfAWc9JrGrS4+v2ce6ywWdWgyBvD5geXxZsbuHPF//WBT2SX6OvawN
	ZPusg/kyuNQb03AMMzdYyzlbhtjqQ2/7swPvlAtGkSUTZOKU+Q0DyqZI3YdZIheusNCvus
	5p1Tt4fGWL97U1bFFOtid2aBG9xvo/s=
X-MC-Unique: 2YBc3VmMOt2715J0Ij5VWA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=KugFAC3AwLdPnEccBvBKsb4d//57mNq0Img9gt8LrLGLSTZrCh3hU7bkCLtYyt3MwBTVFUTVpRUmSBjx05FOzRLbEkz2J+eTEAxjwMReMlZoywnFvPucyD39qzTj8OmOmZh8XDVPZxioxuC4720ztmMttou06qQSI2dgSHsbfRCn6lWwmlykTeLcziPa6zBMMbaExLWXjAzwghVj2LXIC5zcPbIDLIwqPQC6RCcnUNBKsFNbk87To9hE5whmysz3fnTkNG3MZSgIGJyAPuGAX/dTzaFbptGZ6KLfA1KWnSiRx5Sx6MtqMlPkZRPEaHEiurranJbh1BwaXJsczqVAuA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=/O8NOBCkJHew4SJp04VnA85nUKzZ6JUynilejL0ZA9A=;
 b=Ckn1znu9dlrsVWga27fejWJXEbjrd3FjIcwsPwArkP6/bf7jBB6LsaXFYrAfy8QM9HBGsK27FC42wpeRSYJyyYeUogjaehrkGm5qfWVKygUlFNXhQWJ3JPwsJuFyz9ZZ9tGr+mszIloYMDPR/mdhe+Y/qO3AToqxjN0KonXWHjFR0buYGQF46fgzbgDEVvMsogFxnnShrKxmOrdxu2HQouIRLhc5Pm4BtuvH2bdQ4W9KE70tLnjU2gb98WLwUfrKu5pIUUn+/umKEEe73JATsWzK9zagSs/P3LzxExw+S8HRiSc4i716eTPVqvMDCJhgWj+Js6ECKWVGQ4Li5CGbEw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <2a9061de-3d68-20f7-75b9-b1b9491342f8@suse.com>
Date: Fri, 4 Mar 2022 08:49:39 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Content-Language: en-US
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH] x86: also discard .fini_array in linker script
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: FR3P281CA0007.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:1d::6) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: def1f291-5c06-4dcc-6f1c-08d9fdb38a04
X-MS-TrafficTypeDiagnostic: DB6PR0402MB2757:EE_
X-Microsoft-Antispam-PRVS:
	<DB6PR0402MB275721F5219A0DFC60EF3E0CB3059@DB6PR0402MB2757.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(54906003)(6916009)(86362001)(316002)(6506007)(6486002)(31696002)(6512007)(508600001)(2616005)(8936002)(4744005)(5660300002)(2906002)(66476007)(66556008)(66946007)(26005)(38100700002)(186003)(31686004)(36756003)(8676002)(4326008)(142923001)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?OFBEVzU2a2o1WU00ZjhiZjRTUUljMTNiQ0pkSHp6aWVrT3B2Vm14OG9BT2oz?=
 =?utf-8?B?Z283ZjNjVFFWa3dIZ1pJdEdTejhtRy9vN1NhMFNNWEZ4ZDdHcVRiU2Q1Wi9V?=
 =?utf-8?B?cnJvczlISWlRSjhiYmt4QTlMSmI2Q0M1dDBxWU5WMUZvUHUwYkFIWXdiVG82?=
 =?utf-8?B?V1BWWHVuM29Edlg1ZzN4V2RHWDc0em5WUktRUXBpY2ZISnFvVFhNSGFBVjQ1?=
 =?utf-8?B?aUpQVklJVmxyYkJ1TEVleVlYUytYeVFqNVhrdlI2TzlBUHpOTlJPVUZDRGRJ?=
 =?utf-8?B?RlZITmh2ekVzczJ2RVltTExaVys4Uy9ia2hYL20ydkt4S1o3RGJFNTJTY1hR?=
 =?utf-8?B?MDdrNHlDN3BzMVhoQVVGajBOTHA1UTZBck8yNVJQM0laWFAycGhTRnhLWmFP?=
 =?utf-8?B?TFhqVTY5am1rL2Qrc1Mxa2tua09nb3dycC9HZXJzQ2lMcjZzS1p0b3ZleGdN?=
 =?utf-8?B?VjZWTllXWEhyRHJnNVVpaGFvSXJGYUNuUTA3RTB4dlR0ckJDWmFzWCt0R054?=
 =?utf-8?B?YVdtNHdNeWNBbTdLTlZETWd3enJVSUVNajIzaERBaVhzLzhhRkluZFlUSGdQ?=
 =?utf-8?B?UzdGYkFyTm9LY0F2c3Z0ZTVTR0dxanlBYzI2bjhZWklaaXhJNFpUd2c0dzFH?=
 =?utf-8?B?aHA2NXBGN0JWdXVhWk9tTkNYM0hwcVN2cUN1UG5XYjdONUFKdlVRT1lid3NB?=
 =?utf-8?B?R2MwWm90Q3V2RmQ5UU0yS3B0YXlWTmJhcVNVTzZIbWxCajJaTUNOVFRwbnRE?=
 =?utf-8?B?T1dCUjRNVmNIc3lJVUNVOGZtYlVMSjVjczNhOTVMRCt1eVFMdVRIVlc3Z3Nq?=
 =?utf-8?B?dEtZNU0xUnQyZmcyRktSWHpocUNhSW9ZWW1ZTklaOUlIckV5U1ZlVkhJNHBM?=
 =?utf-8?B?ZVpQWkJSaWVURVg1L1o2TnVad1ZsQkpQRUwxL2Y1T2w0d0YwcFZaZU9ReVBG?=
 =?utf-8?B?V20zbG10YmYrNDMrVGQxek5Bd0NaOGIyb2w5MXc2NnA2c2t4dVRlbGIrVHVz?=
 =?utf-8?B?NzdKdmxySTZWL1FQTkQwSGRGNk9ha0t0V1Z1VVNwQVhmUE5WSHg4VXlUWGZ3?=
 =?utf-8?B?M3haYXlZYVBuNkNDUXB4a1o4aGhGUkt3QjVpNExvdG9nSFNuOFJJUEcwS29U?=
 =?utf-8?B?dURyTHVJNXVUbEh3b1Q0VmxBUzhmcnF4Q1BWZTFOQ1RiRjFmS2hoUC9UbnZx?=
 =?utf-8?B?cURSb0h3K2JFQk02akVzYzBLL1FVYkk2Rklocmc2Wkh6RTN6MTQ0dDdibStR?=
 =?utf-8?B?SzRYRnRPZmJPOWRVbjIyVHpBVE0zUWJCczk1YitZNGoyY3RzYXBFMEs2ajIr?=
 =?utf-8?B?b1lqTWlEbnFQMkxJSURzeTQ2L3F3THkxMEdsVXMrckszRTFNTXRjU0JWVUdm?=
 =?utf-8?B?NWF6Nno0K2I4aHFnazZQcks0OHRvSTNqekhrWW9wcloySk1oSVFqU2lnU1Ru?=
 =?utf-8?B?Y051eEd5TWdFcnQ4Y21ULy9CTE05MVg5WXR5UHI1ckhXRXZManJiSndLUDdB?=
 =?utf-8?B?N0Z0aHFQcDBGYlV3NFZ3K0Zoa2FxQllsd0dIV29MY3Zkbjh0K3hGVno4c1BF?=
 =?utf-8?B?SDk2UE1JTUtUaS9UZUdUdTl2NEU3OFpJeElwY1huWHFjRHpmVy9sZ2orMlNz?=
 =?utf-8?B?RkJ2dHN2U1RzNjBMdUxGblo5OGxKMnhSU2lPYVNFN3BtcFFQaGxUR3hLdlhC?=
 =?utf-8?B?a041aVQ2NDJSNXo2R3JRdHh1bFc3NWs2S28wVUNPa21sbjBwK1Fha1h5YnBu?=
 =?utf-8?B?R1BhM1ZvQXUvY0owL0VNak14SUlDMGNDbjZDc1lZTktZUThneU1RdUtybndT?=
 =?utf-8?B?YmQ2MlZlK09hYUxRQ0tmVDF6SmRPaHhWb2tkVkh0bDRJMWdQeStncC9kMXg2?=
 =?utf-8?B?V0dDK2h3NG1qODczTmpGaFcremphek92RGZDUDZQaS9FajBEUFBIRFRHYTIx?=
 =?utf-8?B?SkQ1Z2FROXR4RlU2TjA3ZTBvWHUwNnVLNFV6NnRsd1BUeG1WRm4xRUtUS3k3?=
 =?utf-8?B?OVRjVEp0WXo3enVYeGJxd09COEdqbUk5SFJkSmp5MSt2NXlURkN5dmZ3NXVr?=
 =?utf-8?B?QUlSOXFPRGd6ZFg2Z01MTkh3UXJXa0txN0t1TC9xMWpIZkdIcHRYeFIrTENB?=
 =?utf-8?B?VnN4T3htRnNmUVFtdjI4UzFtNzI4MVZjZkFrVTdIUk4vTEVIZXJYTFM2WWM1?=
 =?utf-8?Q?1VJDHfAJjAxjtoxiDZJvzlc=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: def1f291-5c06-4dcc-6f1c-08d9fdb38a04
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 07:49:40.7092
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: BUkOO6xnn/NQ1JEGLc6Ztn+dJ+yL3umX8WV2rxz1lfBeTpQ3G0lcm+t4txcuTOBq8iJOxmPWbkXYOPq3KVtxiQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0402MB2757

This simply parallels .dtors. Both section types can reference
.text.exit, which requires them to be discarded together with that one.
Compilers, depending on their findings during the configure phase, may
elect to use either model. While .{init,fini}_array look to be
preferred, cross compilers apparently have this guessed, likely
resulting in a fallback to .{c,d}tors. Hence we need to support both
sets.

Fixes: 4b7fd8153ddf ("x86: fold sections in final binaries")
Reported-by: Andrew Cooper <Andrew.Cooper3@citrix.com>
Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
As mentioned elsewhere, I don't think init_constructors() is correct
for the .ctors variant. But that's a separate issue.

--- a/xen/arch/x86/xen.lds.S
+++ b/xen/arch/x86/xen.lds.S
@@ -415,6 +415,8 @@ SECTIONS
        *(.eh_frame)
        *(.dtors)
        *(.dtors.*)
+       *(.fini_array)
+       *(.fini_array.*)
 #ifdef EFI
        *(.comment)
        *(.comment.*)



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 08:02:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 08:02:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284011.483126 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ2tF-0006aJ-DJ; Fri, 04 Mar 2022 08:02:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284011.483126; Fri, 04 Mar 2022 08:02:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ2tF-0006aC-9m; Fri, 04 Mar 2022 08:02:17 +0000
Received: by outflank-mailman (input) for mailman id 284011;
 Fri, 04 Mar 2022 08:02:16 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=LpR9=TP=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nQ2tD-0006a6-VB
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 08:02:16 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6709457e-9b91-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 09:02:14 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2107.outbound.protection.outlook.com [104.47.17.107]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-34-XdExIWqMNDu3DsLlRcNWrQ-1; Fri, 04 Mar 2022 09:02:13 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by HE1PR04MB3082.eurprd04.prod.outlook.com (2603:10a6:7:1c::31) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Fri, 4 Mar
 2022 08:02:10 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.017; Fri, 4 Mar 2022
 08:02:09 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6709457e-9b91-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646380934;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=FAeYqOQo0dqKfU9g7bMkIrOi77TAj/BS2m2GjPt7iH0=;
	b=l9EW7l7y4Xaw9TDGso+JKs427uUF+W0by60z+iDP2USMkPiUrWtPYWWuBr5SLdbSvJNb6n
	8daaKMigduzxZ0cTfT2507X3du1l7+ycbxV1pFOpH15uwCr013OtCk43nPFdDPX9tFzlLQ
	8K/gkuYyZF7MA1FZIGbZ9yYGiW+lWvo=
X-MC-Unique: XdExIWqMNDu3DsLlRcNWrQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=YZKf2o1jUWOIbZ8jixq9mZX3GBSjVr0gTDbrvcJEeFi+hVdBaxXwVq13sjAQjk1WUsw9OAmQVpV0ke56qBIaVYuVH/oPGA4Hc5xZSSAz8CFX552MKsMw6mRFWkGb+28Z3vhXRj/luAu7X4dH2RSFlnhbdsxwbT3b5kPR1TwEH3zU+w5+pna75iCMt1/XqGXrCsmCpLE6qVAZ+x/OTSf+wXam08i9hbczVmKFsPn8qEoZzI6WCadE+T1W/wYE8CK2HhlYJtz1cLjdXuGj1YWAX6dCulbx4G+h7WTYlcOVqh6HbTDH41HH+cwt1jAURZ49/mphpQD3nGpHoD/vB0Yx+A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Z3vZgyK1VgbXd9WQxjc6Rwgr8IL/aKOpLKP3kWaqfBE=;
 b=nCCJ2FPiweKixaB4CySajB0AGG5W9t4mjKdnl0viivW9iVdzLomNk1d488J+RPGpcNybAIMWvEMkJFu/Kpfm5tY1KtVKDElZxkAfeVXB7/Cf0wFzWGA40e0pfOLqt5WjKidBdsqoyswHcTi3SnDhSfVHWQoBT1WcsgotxrIm9UHHi9l8+dVhlE13krDspXEyyGvg2I3A5GCgv1hat38x0YqraUv7Hgxcq1ZnYb6mFcD+w0kwZBDUQ+EIHjcQSer6jcNUNrVydY2kHS6TekAuEL25JM//XxqqOeh0bkMA1KFe0iYF5FB0orEo4jEq7gFHU8ZHkQS1JcWiuzmv6pNL2w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <abd691c8-9c7e-40d7-3f18-d96f826b8539@suse.com>
Date: Fri, 4 Mar 2022 09:02:08 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] x86/build: use --orphan-handling linker option if
 available
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
References: <5c374fd3-017d-3c40-4ded-25a3b1c978a6@suse.com>
 <YiCkUebvg0gaBm4/@Air-de-Roger>
 <3c335ca5-63e3-6389-cba5-b9047a4ce3b9@suse.com>
 <YiDaQY1ToO8G2QYd@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YiDaQY1ToO8G2QYd@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6P195CA0011.EURP195.PROD.OUTLOOK.COM
 (2603:10a6:209:81::24) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0ac48502-7a0c-44d4-8696-08d9fdb54885
X-MS-TrafficTypeDiagnostic: HE1PR04MB3082:EE_
X-Microsoft-Antispam-PRVS:
	<HE1PR04MB308263CBE3A65B5ABEDEBB49B3059@HE1PR04MB3082.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6506007)(66946007)(31686004)(66476007)(66556008)(6512007)(54906003)(4326008)(8676002)(53546011)(2616005)(2906002)(38100700002)(186003)(26005)(316002)(6916009)(5660300002)(31696002)(8936002)(86362001)(508600001)(966005)(6486002)(83380400001)(36756003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?vfSLslMCDI/N9ERD5BTotTUsh6j37hKO+MT/3otxA+ARXPMVlJ1Zhhr6IQaA?=
 =?us-ascii?Q?BDyOk/1ftbvjytKSKdeuDwgUbdDQItfulFPcu3cAbI1QBgIY9fuq+fZPzt+w?=
 =?us-ascii?Q?e2qqm0UndYd8tFXqUmrjeRl+xjomNPVx+sDMmP8/gqQz0U0AXFiOHpkgdPsN?=
 =?us-ascii?Q?vJRUXoIU1LYSxl17SvOh9K6ZRFizeS1yZ0bTS6aUD4rxHFh7Gehrx6HWcmB8?=
 =?us-ascii?Q?fn74Ex7ybS0AqY/pi3w5PanLsVFd+64nH6NK1v2vxWqgI4cBc6Fdh7kWTZTR?=
 =?us-ascii?Q?E26/cBsMrArM4ZEwpYIk8Vu48dYS6bqtmM0V4C9m2iIpk0inSUaf8zYtOjgX?=
 =?us-ascii?Q?euI3ouN8j5F9/cewMMettCvlAuFbHgmtj11F1kC05j7dJ1VeKT8xWxAqNOgx?=
 =?us-ascii?Q?ThXdJE0xXBk3JlPp09ev0EC6CdBxHPeo3UhxSrD3YEgp/I4/HXPLsxzgxutf?=
 =?us-ascii?Q?kbasNW5iFHbMu1p/54hf6okV0PrPAuDktU3wFRwoRwiJ9bAqIeXFVGdqBtUY?=
 =?us-ascii?Q?Rqakuhw6l++B2ReXHkEWfvby9vC+CrBd3oPv+C7GRc0qxTLYyvJbbronZvIC?=
 =?us-ascii?Q?Q3uiXFXu+mNqt6LGWMfeF9Q+V2VBttD47UOdUo6CYfkd8Y950sOQHDfV3K/T?=
 =?us-ascii?Q?UN+lxyLjgO4U90PAZRDLxCYfJnVwc2680hlLK0HnsEULJKvFSPD5OmUnGzcV?=
 =?us-ascii?Q?JULvKmpblLbP2+WellNvAQRjI0MSteaAXQzLtfYLl4EgxAPM+HiHnmUoYDFS?=
 =?us-ascii?Q?pE7vBhvmUz2SD3uh5g9aD1K5BOE3Rotc6yjH+UxkbHs6Kdk8eUKP1ZE2UegS?=
 =?us-ascii?Q?nat4Xt16emS6Rx+8JriSFs/Ni9Wq9uCL0ZWJF7xHhX762JtzUT+FzLghuNGV?=
 =?us-ascii?Q?RkRixxiRcqqqaiC/FvwoAK2tuC5K0s/rfVhrArP9uX87oyy8s5EVLIV14xwB?=
 =?us-ascii?Q?RRrlrpna6QLLqPRsqYzFchQPa7ISoEFAZyK8DeenBoHgAuojQBNClPBMnoJu?=
 =?us-ascii?Q?s47kTPjhAkXYu8UDDG0H7/GYuuzb7PeJJqfvEaUMTocnNzrNV3oeV0Tsu9M7?=
 =?us-ascii?Q?1cyPyvjXqLZP+pFDue8TPAJsmcMDcfAoeo52JceW9qqZdalEOLnUVEHMfHI2?=
 =?us-ascii?Q?GKrfYfXPEV4xHPaPEQKVMgm1o7L/QDmKIyfadEL2P8ejTWXoaTsY36duN8zM?=
 =?us-ascii?Q?kWjOcR1jV2dX5+J9XjJL5X3yjvQEM29crUEtjzrmPQsvycfty61QK2+rh4NW?=
 =?us-ascii?Q?MgGKxqYKIioo0EgNo7gdhQjUTKcHk5fqcrpCocGtGadfDQTyEYiAwhNz9Ri+?=
 =?us-ascii?Q?koHnQr3Ycw1180uZbt/AUqD+ZaXGkeTBPNAsW+AqX3vs4Jw8fIejRKhxCmVJ?=
 =?us-ascii?Q?6xLJ2G+88yOeUfLjDXseOcvNDZCUqTBjI1N1XLX7kR4oFbI6LIbrUSWHLSv9?=
 =?us-ascii?Q?3cc2TQjtz4CiLQOr6ixX0ChQu8S4npjD8InMDcfH/JpCDap0EWTHj4bIYhgA?=
 =?us-ascii?Q?5iWWLQfkm1ca74MFPhtLouI0kx8G2HTZ21cgGH68XVxY/DSa6+/AIXeYSkbN?=
 =?us-ascii?Q?7Jnggu4gJD+VO8E4BDadMmEnvl+XMEutTeuw5/ONvzG6Qo4i0VaWlz/qpBsL?=
 =?us-ascii?Q?k9F5LT9wTkpkuJVJ3f2L8EA=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0ac48502-7a0c-44d4-8696-08d9fdb54885
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 08:02:09.8503
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: oDPY4uyPTYXxbmXLYXmpkAExuLgqWyvpr1jVVmp2OmOAc4GzU1UDMLtqHMlSeOZku5Ktp3iLyRZRxVB4wAX1Gw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR04MB3082

On 03.03.2022 16:09, Roger Pau Monn=C3=A9 wrote:
> On Thu, Mar 03, 2022 at 01:17:03PM +0100, Jan Beulich wrote:
>> On 03.03.2022 12:19, Roger Pau Monn=C3=A9 wrote:
>>> On Wed, Mar 02, 2022 at 03:19:35PM +0100, Jan Beulich wrote:
>>>> As was e.g. making necessary 4b7fd8153ddf ("x86: fold sections in fina=
l
>>>> binaries"), arbitrary sections appearing without our linker script
>>>> placing them explicitly can be a problem. Have the linker make us awar=
e
>>>> of such sections, so we would know that the script needs adjusting.
>>>>
>>>> To deal with the resulting warnings:
>>>> - Retain .note.* explicitly for ELF, and discard all of them (except t=
he
>>>>   earlier consumed .note.gnu.build-id) for PE/COFF.
>>>> - Have explicit statements for .got, .plt, and alike and add assertion=
s
>>>>   that they're empty. No output sections will be created for these as
>>>>   long as they remain empty (or else the assertions would cause early
>>>>   failure anyway).
>>>> - Collect all .rela.* into a single section, with again an assertion
>>>>   added for the resulting section to be empty.
>>>> - Extend the enumerating of .debug_* to ELF. Note that for Clang addin=
g
>>>>   of .debug_macinfo is necessary. Amend this by its Dwarf5 counterpart=
,
>>>>   .debug_macro, then as well (albeit more may need adding for full
>>>>   coverage).
>>>>
>>>> Suggested-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>
>>>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>>>> ---
>>>> I would have wanted to make this generic (by putting it in
>>>> xen/Makefile), but the option cannot be added to LDFLAGS, or else
>>>> there'll be a flood of warnings with $(LD) -r. (Besides, adding to
>>>> LDFLAGS would mean use of the option on every linker pass rather than
>>>> just the last one.)
>>>>
>>>> Retaining of .note in xen-syms is under question. Plus if we want to
>>>> retain all notes, the question is whether they wouldn't better go into
>>>> .init.rodata. But .note.gnu.build-id shouldn't move there, and when
>>>> notes are discontiguous all intermediate space will also be assigned t=
o
>>>> the NOTE segment, thus making the contents useless for tools going jus=
t
>>>> by program headers.
>>>>
>>>> Newer Clang may require yet more .debug_* to be added. I've only playe=
d
>>>> with versions 5 and 7 so far.
>>>>
>>>> Unless we would finally drop all mentioning of Stabs sections, we may
>>>> want to extend to there what is done for Dwarf here (allowing the EFI
>>>> conditional around the section to also go away).
>>>>
>>>> See also https://sourceware.org/pipermail/binutils/2022-March/119922.h=
tml.
>>>
>>> LLD 13.0.0 also warns about:
>>>
>>> ld: warning: <internal>:(.symtab) is being placed in '.symtab'
>>> ld: warning: <internal>:(.shstrtab) is being placed in '.shstrtab'
>>> ld: warning: <internal>:(.strtab) is being placed in '.strtab'
>>>
>>> So seeing your mail where you mention GNU ld not needing those, I
>>> think we would need to add them anyway for LLVM ld.
>>
>> Hmm, that's ugly. How do I recognize LLVM ld? I can't simply use a
>> pre-processor conditional keying off of __clang__, as that used as the
>> compiler doesn't mean their ld is also in use (typically the case on
>> Linux).
>=20
> Hard to tell, `ld -v` for LLD will typically contain '^LLD' I think,
> but I don't really like matching on human readable output like this.

Same here. But Linux'es ld-version.sh looks to be doing just that.

>> I also don't want to add these uniformly, for now knowing what
>> side effects their mentioning might have with GNU ld.
>=20
> Wouldn't it be fine to just place them at the end, just like it's
> done by default by ld?
>=20
> Are you worried about not getting the proper type if mentioned in the
> linker script?

I'm worried of about any kind of anomaly that could be caused by
mentioning sections which a linker doesn't expect to be named in
a script. That's hardly something they would even test their
linkers against.

>>>> --- a/xen/arch/x86/Makefile
>>>> +++ b/xen/arch/x86/Makefile
>>>> @@ -120,6 +120,8 @@ syms-warn-dup-y :=3D --warn-dup
>>>>  syms-warn-dup-$(CONFIG_SUPPRESS_DUPLICATE_SYMBOL_WARNINGS) :=3D
>>>>  syms-warn-dup-$(CONFIG_ENFORCE_UNIQUE_SYMBOLS) :=3D --error-dup
>>>> =20
>>>> +orphan-handling-$(call ld-option,--orphan-handling=3Dwarn) +=3D --orp=
han-handling=3Dwarn
>>>
>>> Might be better to place in xen/Kconfig with the CC checks?
>>
>> Well. I've tried to stay away from complaining if people introduce
>> new tool chain capability checks in Kconfig. But I'm not going to
>> add any myself (unless things would become really inconsistent) up
>> and until we have actually properly discussed the upsides and
>> downsides of either model. Doing this via email (see the "Kconfig
>> vs tool chain capabilities" thread started in August 2020) has
>> proven to not lead anywhere. I'm really hoping that we can finally
>> sort this in Bukarest.
>>
>>> I'm also wondering whether we could add the flag here into XEN_LDFLAGS
>>> and EFI_LDFLAGS, as those options are only used together with the
>>> linker script in the targets on the Makefile.
>>
>> Not for XEN_LDFLAGS at least, and undesirable for EFI_LDFLAGS. See
>> the respective post-commit message remark.
>=20
> But the calls to LD in order to generate $(TARGET)-syms do not use -r,
> and are all using the linker script, so it should be fine to use
> --orphan-handling=3Dwarn there?

But XEN_LDFLAGS is also used elsewhere together with -r. (Whether
that's actually correct is a different question.)

> Could we do something like:
>=20
> $(TARGET)-syms: XEN_LDFLAGS +=3D ...
>=20
> And similar for $(TARGET).efi?

Yes, this ought to be possible, but would again lead to the option
being passed on all three linking stages instead of just the final
one. When there are many warnings (e.g. because of the same kind of
section appearing many times), it's not helpful to see the flood
three times (or likely even six times, once for xen-syms and once
for xen.efi).

Jan



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 08:03:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 08:03:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.283992.483137 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ2uO-00077o-Nu; Fri, 04 Mar 2022 08:03:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 283992.483137; Fri, 04 Mar 2022 08:03:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ2uO-00077h-KU; Fri, 04 Mar 2022 08:03:28 +0000
Received: by outflank-mailman (input) for mailman id 283992;
 Fri, 04 Mar 2022 07:45:12 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=evYc=TP=gmail.com=trigger.huang@srs-se1.protection.inumbo.net>)
 id 1nQ2ci-0003I0-E5
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 07:45:12 +0000
Received: from mail-wr1-x42c.google.com (mail-wr1-x42c.google.com
 [2a00:1450:4864:20::42c])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 0503ec92-9b8f-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 08:45:11 +0100 (CET)
Received: by mail-wr1-x42c.google.com with SMTP id x15so11329551wru.13
 for <xen-devel@lists.xenproject.org>; Thu, 03 Mar 2022 23:45:11 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0503ec92-9b8f-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:from:date:message-id:subject:to;
        bh=VYGOGoGLQH9F6CymjlPAmDax1Fii+CrifqjSgPcKrLs=;
        b=o7icDHbW4OOxUmKH4gZi1/q9xSJqgVNGc27ZarBZ3XJjK9xkdbRtDddyS73FonnhWQ
         qEyDkwoOGVeyDxCaI+4Gv4sEIsG5EI9GxhswsohZzfcM7sqz2cVIrJTDZQZLleoohxIJ
         VGK9vB099xKaMmrl0Vk/Tpyy5Kf5sdnbrZB6T1wa+hMTnYPCIvvqoO6MWXkOCk4kJWIi
         Degy99kas9cufP+K+QLHyIPTjZMYU2z5zunXIdYFFd8wuvsgvmJ+j1vVs6G/4Ibn34Jq
         hZjWQd0wXyaOy81xQlLWdU9TfUlx+0tjIsVMIYJh0SiXVxRItBL8Wijgoxp1CWiKenfs
         dFAw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
        bh=VYGOGoGLQH9F6CymjlPAmDax1Fii+CrifqjSgPcKrLs=;
        b=r03CikY/QuCjSyBxHVRouJtY0T+Fv4D3TR6aiIkyVK8BEXOEkOgk1JBw9Flvxu+IIz
         2SKZ2QLzNZH4upySJvTX4iAOwbgvO4YfWcHL3yl7ZgcflxbHoqaX9GrdocNmqR1d0Dba
         t1///kLlw2bvZySh+mCCEbJgeUT/WJpG6Iq2HL+Pb1GHrZ1J9MSNZgepmucWfKPtzlpg
         0iTQ9GS9OKH/1CSg18en1j0LEzgBvcWQgkAaegqGosGskl5DkDf9jqQYkx1jbf/nS8WC
         WJYgtoV0WeM8n1XyIcAytzb9z3UYktqUvpCo6L8KgHhbx0wXXXU3SoavuQb6ZKcaJkKT
         yXVQ==
X-Gm-Message-State: AOAM530FZuuWmOyMWweSEiYzfPPxBKHAhhyY9lSxzpVwg71SyKfZigu6
	qUhC8iJFlL3E1IHZ1kGl4Zuqr1fa3hQ1VnbVGoNAXMdSwzQ=
X-Google-Smtp-Source: ABdhPJxy2xNmZcj0AYSZJQQcBdc3gEtHQDPA23WqOMAsaWteErm6X9QQ4WiuzJx78rO2zgahRLdEpbTlM8rMmlqJ79o=
X-Received: by 2002:a5d:514e:0:b0:1f0:25a5:2d49 with SMTP id
 u14-20020a5d514e000000b001f025a52d49mr8865529wrt.154.1646379910442; Thu, 03
 Mar 2022 23:45:10 -0800 (PST)
MIME-Version: 1.0
From: Trigger Huang <trigger.huang@gmail.com>
Date: Fri, 4 Mar 2022 15:44:59 +0800
Message-ID: <CANH0Q9k6SJQ+EXNZz+-ZPnPtsxHXthYcx1E6z8euSDEt7XhLQg@mail.gmail.com>
Subject: How to create and start Xen guest VM by qemu-system-x86_64 command line
To: xen-devel@lists.xenproject.org
Content-Type: multipart/alternative; boundary="000000000000ba31c205d95fb164"

--000000000000ba31c205d95fb164
Content-Type: text/plain; charset="UTF-8"

Hello,

I have built & installed Xen 4.15 onto my Ubuntu20.04 platform successfully
according to https://wiki.xenproject.org/wiki/Compiling_Xen_From_Source
After reboot, I entered Domain 0 successfully. The command xl info shows
the right version string.


































*host                   : xvgrelease                :
5.13.0-30-genericversion                : #33~20.04.1-Ubuntu SMP Mon Feb 7
14:25:10 UTC 2022machine                : x86_64nr_cpus                :
16max_cpu_id             : 31nr_nodes               : 1cores_per_socket
  : 8threads_per_core       : 2cpu_mhz                : 2994.377hw_caps
           :
178bf3ff:76d8320b:2e500800:244037ff:0000000f:219c91a9:00400004:00000500virt_caps
             : pv hvm hvm_directio pv_directio hap shadowtotal_memory
    : 15719free_memory            : 11425sharing_freed_memory   :
0sharing_used_memory    : 0outstanding_claims     : 0free_cpus
 : 0xen_major              : 4xen_minor              : 15xen_extra
     : .3-pre-atg08xen_version            : 4.15.3-pre-atg08xen_caps
        : xen-3.0-x86_64 hvm-3.0-x86_32 hvm-3.0-x86_32p
hvm-3.0-x86_64xen_scheduler          : credit2xen_pagesize           :
4096platform_params        : virt_start=0xffff800000000000xen_changeset
     : Fri Mar 4 13:33:49 2022 +0800 git:6aa4cdbc31xen_commandline        :
placeholder dom0_mem=4096M,max:8192M no-real-mode edd=offcc_compiler
     : gcc (Ubuntu 9.3.0-17ubuntu1~20.04) 9.3.0cc_compile_by          :
xvgcc_compile_domain      :cc_compile_date        : Fri Mar  4 14:21:33 CST
2022build_id               :
234929adcb7588b1414c2b6e5477fa95052b4dedxend_config_format     : 4*

Then my next step is to create ubuntu guest VM(sudo or use root user):
   */usr/local/lib/xen/bin/qemu-system-x86_64 -smp 1 -xen-domid 4 -machine
xenfv -m 4G -net nic,model=virtio -net user,hostfwd=tcp::2222-:22 -hda
./u2004.qcow2 -boot d -cdrom ./ubuntu-20.04-desktop-amd64.iso*
However, I always failed with the following error:

*  qemu-system-x86_64: failed to map ioreq server resources: error 3
handle=0x55eeb1f6c0b0    qemu-system-x86_64: xen hardware virtual machine
initialisation failed*
After debugging, the error is caused by osdep_xenforeignmemory_map_resource
failed to invoke IOCTL_PRIVCMD_MMAP_RESOURCE. And this IOCTL will return
-1.

So my question is, am I using the right qemu command? Anything else is
needed to set/config?
Note, if I didn't specify the option ' *-xen-domid 4 -machine xenfv* ', I
can start qemu successfully

Would you please help with it?

--000000000000ba31c205d95fb164
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Hello,</div><div><br></div><div>I have built &amp; in=
stalled Xen 4.15 onto my Ubuntu20.04 platform successfully according to <a =
href=3D"https://wiki.xenproject.org/wiki/Compiling_Xen_From_Source">https:/=
/wiki.xenproject.org/wiki/Compiling_Xen_From_Source</a> <br></div><div>Afte=
r reboot, I entered Domain 0 successfully. The command xl info shows the ri=
ght version string.</div><div><u><i>host =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : xvg<br>release =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0: 5.13.0-30-generic<br>version =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: #33~20.04.1-Ubuntu SMP Mon Feb 7 14=
:25:10 UTC 2022<br>machine =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 =C2=A0: x86_64<br>nr_cpus =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 =C2=A0: 16<br>max_cpu_id =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 31<br=
>nr_nodes =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 1<br>cores_per=
_socket =C2=A0 =C2=A0 =C2=A0 : 8<br>threads_per_core =C2=A0 =C2=A0 =C2=A0 :=
 2<br>cpu_mhz =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 2994=
.377<br>hw_caps =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 17=
8bf3ff:76d8320b:2e500800:244037ff:0000000f:219c91a9:00400004:00000500<br>vi=
rt_caps =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: pv hvm hvm_direct=
io pv_directio hap shadow<br>total_memory =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 : 15719<br>free_memory =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 11425=
<br>sharing_freed_memory =C2=A0 : 0<br>sharing_used_memory =C2=A0 =C2=A0: 0=
<br>outstanding_claims =C2=A0 =C2=A0 : 0<br>free_cpus =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0: 0<br>xen_major =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0: 4<br>xen_minor =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 =C2=A0: 15<br><b>xen_extra =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0: .3-pre-atg08<br>xen_version =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 4.15.3-pre-atg08</b><br>xen_caps =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 =C2=A0 : xen-3.0-x86_64 hvm-3.0-x86_32 hvm-3.0-x86_32p hvm-3.0-x86_64<br>x=
en_scheduler =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: credit2<br>xen_pagesize =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 4096<br>platform_params =C2=A0 =C2=A0 =
=C2=A0 =C2=A0: virt_start=3D0xffff800000000000<br>xen_changeset =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0: Fri Mar 4 13:33:49 2022 +0800 git:6aa4cdbc31<br>x=
en_commandline =C2=A0 =C2=A0 =C2=A0 =C2=A0: placeholder dom0_mem=3D4096M,ma=
x:8192M no-real-mode edd=3Doff<br>cc_compiler =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0: gcc (Ubuntu 9.3.0-17ubuntu1~20.04) 9.3.0<br>cc_compile_by =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: xvg<br>cc_compile_domain =C2=A0 =C2=A0 =
=C2=A0:<br>cc_compile_date =C2=A0 =C2=A0 =C2=A0 =C2=A0: Fri Mar =C2=A04 14:=
21:33 CST 2022<br>build_id =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 : 234929adcb7588b1414c2b6e5477fa95052b4ded<br>xend_config_format =C2=A0 =
=C2=A0 : 4</i><br></u></div><div><br></div><div>Then my next step is to cre=
ate ubuntu guest VM(sudo or use root user):</div><div>=C2=A0=C2=A0 <u><i>/u=
sr/local/lib/xen/bin/qemu-system-x86_64 -smp 1 <b>-xen-domid 4</b> -machine=
 xenfv -m 4G -net nic,model=3Dvirtio -net user,hostfwd=3Dtcp::2222-:22 -hda=
 ./u2004.qcow2 -boot d -cdrom ./ubuntu-20.04-desktop-amd64.iso</i></u></div=
><div>However, I always failed with the following error:</div><div>=C2=A0=
=C2=A0<u><i>=C2=A0 qemu-system-x86_64: failed to map ioreq server resources=
: error 3 handle=3D0x55eeb1f6c0b0<br>=C2=A0=C2=A0=C2=A0 qemu-system-x86_64:=
 xen hardware virtual machine initialisation failed</i></u><br></div><div>A=
fter debugging, the error is caused by osdep_xenforeignmemory_map_resource =
failed to invoke IOCTL_PRIVCMD_MMAP_RESOURCE. And this IOCTL will return -1=
.=C2=A0 <br></div><div><br></div><div>So my question is, am I using the rig=
ht qemu command? Anything else is needed to set/config?</div><div>Note, if =
I didn&#39;t specify the option &#39;
<u><i><b>-xen-domid 4</b> -machine xenfv</i></u>

&#39;, I can start qemu successfully<br></div><div><br></div><div>Would you=
 please help with it?<br></div><div><br></div></div>

--000000000000ba31c205d95fb164--


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 08:17:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 08:17:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284027.483148 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ37r-0000jV-3A; Fri, 04 Mar 2022 08:17:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284027.483148; Fri, 04 Mar 2022 08:17:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ37r-0000jO-03; Fri, 04 Mar 2022 08:17:23 +0000
Received: by outflank-mailman (input) for mailman id 284027;
 Fri, 04 Mar 2022 08:17:22 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=LpR9=TP=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nQ37q-0000jI-4K
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 08:17:22 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 82e3303a-9b93-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 09:17:20 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2175.outbound.protection.outlook.com [104.47.17.175]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-41-Zs2aC_GtO0eqjq-8vJituA-1; Fri, 04 Mar 2022 09:17:18 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PAXPR04MB8175.eurprd04.prod.outlook.com (2603:10a6:102:1bc::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Fri, 4 Mar
 2022 08:17:16 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.017; Fri, 4 Mar 2022
 08:17:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 82e3303a-9b93-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646381839;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=cH6ZmZMoyiJ6DrZp7awSP7q0QTF/KxA1Ot9DRwO044E=;
	b=k5QCoH4/+IcUmINJ3zmYsZpazB1AfLghpKmKuFDYvlTbEs7v2lki2MI7duKyoxUC2tbRS+
	4kSXEX8oahUBSehqY8hBgBX/y0zWVU4C8Ljaq84MCixDEDX0fZHdwz6FHGsGrKAg6cnSbD
	/4rNpzyQlyUBcPQUqF5A+aj5SigoZSM=
X-MC-Unique: Zs2aC_GtO0eqjq-8vJituA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=JGRnKricJdArfsbj8H0n76WOxRstbxYkAcAG1zIsCjnWLFWC1jmXAjWw5TkhKZt7dtsERwj3xt9zcHrhnV3qCWYhF+20jSsPexuMNU5OGtPotFtK5iBuOUWRA+x8bI1cPyh+bVoZk59h27o3BcwDTDTPckAQOdLLwG/GGsupyUxhBPZmrWCWdT/iLHAdnqwJatVAspltPzCq63cn5nTf6dwQMmONTNzi81xJhdMMrd97TPs4BcGa7WqXeokAnRiCcOrxi1F/micAAh9aJphCOfr13nkODOaySZ1esF9PAvKt9yS4pZdu/OJPE6qH5TPgfhrOW7JE6FR8KaP+ejmBsg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=cH6ZmZMoyiJ6DrZp7awSP7q0QTF/KxA1Ot9DRwO044E=;
 b=m+yOK4Z6oHB0Np0RKtwFeS/XrN5Sn6MGql3nwuoZgmk3VhI7rV3AHByISHYEMNavtaT9MSy0T6vI2uOsGGMn1OAunZzm27bMTMELDGpMRouHyIzatltB2YNtI+lxhsB1wcKJDFp5KX9EG2CgfjUoo0U/fpAXB6OlOx5WUAgZFNV8LDKPz3ahTyMSlfUi346S+cgyXFfoVaIZ0NvyO9WD4Dv4lGFkTk7oY/17FF7JoEoxZz9I7p87py+7QPUQsvXBWji8U/PiF9vY0048b3oCWRnczw5XwEKp9guVRY1xItj/GIKREbeQ2nNLjt3qeQ/ysIvzTwBXbw1dgP3nTUFvuQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <fa957ce7-07f8-9726-9537-8b05e9b6d76e@suse.com>
Date: Fri, 4 Mar 2022 09:17:14 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v4 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Content-Language: en-US
To: Jane Malalane <Jane.Malalane@citrix.com>
Cc: Wei Liu <wl@xen.org>, Anthony Perard <anthony.perard@citrix.com>,
 Juergen Gross <jgross@suse.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
 George Dunlap <George.Dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian <kevin.tian@intel.com>,
 Roger Pau Monne <roger.pau@citrix.com>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <20220302150056.14381-1-jane.malalane@citrix.com>
 <20220302150056.14381-2-jane.malalane@citrix.com>
 <240602ab-412c-8607-ed6c-916cf37343f7@suse.com>
 <67296830-aa16-4231-69ba-f07d2b1a4b65@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <67296830-aa16-4231-69ba-f07d2b1a4b65@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR05CA0030.eurprd05.prod.outlook.com
 (2603:10a6:20b:488::24) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0062343e-aa78-44cd-da45-08d9fdb764ec
X-MS-TrafficTypeDiagnostic: PAXPR04MB8175:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB8175624F9838B434BB1D155EB3059@PAXPR04MB8175.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(54906003)(6916009)(83380400001)(7416002)(38100700002)(508600001)(8936002)(8676002)(36756003)(66556008)(66946007)(66476007)(316002)(6486002)(4326008)(31686004)(5660300002)(2906002)(6512007)(2616005)(186003)(31696002)(53546011)(6506007)(26005)(86362001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?VktZdGtXbFZEUi9Rb1ZUZjdONVZBRzl0NkRFL2p2RGhEdlVBaUdEWW5wZkts?=
 =?utf-8?B?NUFQSDdFbDFZeWpzQ2pScnc0R084OEp1ZGxjKzFPbXVQUXcxZFpHVk9lNXUz?=
 =?utf-8?B?Q1ZnYklXWGU4ZTJVdHBtVWcvS3F4K3JuTzVWTm9oNjgrYy95YUZMM2VQSlc5?=
 =?utf-8?B?aFdwUUVLaDZJK2xHSmNPSVN6ak0xTXZtN3JjNTBoT2Z2Y3dJMHVSZmNMTlBK?=
 =?utf-8?B?NFZueEdCajA5Q1FFZlRxcTdLam9mamtoNkFOZkxIczEwZjFkNUg0VWpLNU80?=
 =?utf-8?B?UlZiNlJFdW5IYWhQZkVtY2xrOU5Ma1VVUlhnY25nU2Rkd3A3QkU3bHJaTmsv?=
 =?utf-8?B?NXYxMCs4b3BNakZpTmNxaElHT0NTNVI0dFdaQVo1RHErQjNTRUI1S3pGRzJp?=
 =?utf-8?B?Z3ZFMG1WVWMwRUdUZzBVbU5taHUrMVNjWG1BWTRBQmdtU1lTQldZL1plUGgw?=
 =?utf-8?B?R0tDRHYrbkNzSTdMcm1IclRyRFZFZy9TMmMxQXF5L3FtUDYzbmFNUTM0a2ls?=
 =?utf-8?B?L3g0VjhmNFdlMGJEb0JnVWI0a3AzRnNUZW9TM1JoRGdXaEpxY0FvWWswakMz?=
 =?utf-8?B?OFE0VlJvTjJQWUhiMmpTME0rT2JsU0dRaGhMZTBZdXlaL2pvSUcxb2pVMEtE?=
 =?utf-8?B?UGRRaThQRFkrRzhTMzVMQysxU0o3Z1dVQklHWkNOYXovYzZ0NkVkZk1tVnNh?=
 =?utf-8?B?MUhWeTRBM0hCcGNpdldoTFZCVGkwOVJuZ0p2dWNLRHF5Z0VPa2VhV1ppWlk0?=
 =?utf-8?B?NnJpMnlLNDJZNDl0aU44ZkpqQzZiSUNQOVYxQjcveHNuRUV2OGRtaXpRaGpn?=
 =?utf-8?B?dU05NTBRVjhSV080aFVRZUpPTVNWYXMwT004cGNiOCtFUm1xcWo4K1pYL3ho?=
 =?utf-8?B?YWV3U01pZWVSWlA2L2lLQzJyVDZwYnpLZ0Zwa3NzdDJGR056NUVUMjRXK3FD?=
 =?utf-8?B?eVRtWmRBQzVDSUd0NVVlaVZxMXpQK21JbWJSY2JLM0xJQzl3Qk9hM0lWWVVn?=
 =?utf-8?B?SFF1RmwyNll3ZkxzVmNoL3pEL1RkWTlRajFJakRSVzBxdms0akdlZk0zdDQ2?=
 =?utf-8?B?MkxXT1NWNEowNnhkbmRPTXlteU9JSnEwYVIzVDZpbDdYMmpRZHZlM2RFNENm?=
 =?utf-8?B?cDI1SDFDNXd2L0NsOU5LbmVPTElRbWluRldIN0VnbGx0bWU4OXFjdXpwUHF3?=
 =?utf-8?B?OXJ1MDB2alRqam1pdWEwTjRUU0dYRGxLRWhsYitkUDF0M3BnQklyMXlUdWhX?=
 =?utf-8?B?UkRBbWFtMlBacmdLRytLcDVsbDdUdGF4RUVmM3kxd1IxYXpmQnNxT1RHMUFR?=
 =?utf-8?B?MkM5Y0Y4cGRnTjRnSDZOVDZuM1VKTHE1Y0FET01jNHNYVG0vZWM3TkJJUTBY?=
 =?utf-8?B?bTA0UlgyMXd5aVJmcmYrV1JvNVRKOHNTakd5ZUJYam1kbEhIanpFNFF1SGZ0?=
 =?utf-8?B?RzE2MHJyYk9DcDNuT2FES3NYVUpQd00vS3dHeHBMeXZwSE1PQnl0bmxMYktF?=
 =?utf-8?B?NEVsWGxFeDNJNEM3dVJRc1haS05oWFNTOTNRa3VQaWNpU0NhN3FYbEg1NlpN?=
 =?utf-8?B?RjZOalFtR0ZUbHRoQ0s5K1A4aHpPK2Q0M3F4MzFjS21mTDNEUitYWDJQT2Vn?=
 =?utf-8?B?NkVOUGxZY2xuVlJsTFdRQTMwM29JSElTREZwcll6QWJlNFhVSnAvTTBTMHZL?=
 =?utf-8?B?Y2MvS0QxaTR1ZlRKR2ZkMGNIUlhNUDQ1Ykd5M3dUY3g2QVFLNkNOcTVPNXRa?=
 =?utf-8?B?dWtzczdhcmFXdmNnbWx4bGtGL1dKV0xQTk5UM3MzNjRzVTg4L1E2cjRLRXFQ?=
 =?utf-8?B?ckVXamI2YlljVVNkZVVZSlFzSDlLS3Y3ckZ4TllMQk1DRUdSN2RaTHlZVk1T?=
 =?utf-8?B?b29HU1VKWDQ1MnV1bVROclM2M2JTZmdkbENVd3NPbktVQzBjZlpod0ZwVXRj?=
 =?utf-8?B?UHkxd29YZWNvM2p1UDcwRXBTbDEzWVRndklWTzFXc1Y4Tk1TTzQ0SGg5VHpL?=
 =?utf-8?B?TnpWeU1DZWxHQjVYU3VxTkhMUWJGQ1E5aXkrUllyZS80N0tMSVBycjYvZVZD?=
 =?utf-8?B?ZUgvQWpNMEFzR3hnQkRMSGJiWXhDaTR2SGJwWXFqQkpGTFd4NE9OM1RKeEEr?=
 =?utf-8?B?MjBmRFMwTkpEeWIxVzhYMzRKRk1GUm91RE96ekxscDM4QUJ3RU43dVNNZEZS?=
 =?utf-8?Q?h/U8do48YsuHq3PHTd+v7zA=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0062343e-aa78-44cd-da45-08d9fdb764ec
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 08:17:16.5128
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: oz8LoUbEO9fTjBNi1bkWeeCGGBxUIYdI8g3LvVyGdZIH0Oby1HGfsP4Kq7MK2ADMFiRuW2n5h3Dhj47fLmQXUw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB8175

On 03.03.2022 17:37, Jane Malalane wrote:
> On 03/03/2022 11:37, Jan Beulich wrote:
>> On 02.03.2022 16:00, Jane Malalane wrote:
>>> Add XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_xapic and
>>> XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_x2apic to report accelerated xapic
>>> and x2apic, on x86 hardware.
>>> No such features are currently implemented on AMD hardware.
>>>
>>> For that purpose, also add an arch-specific "capabilities" parameter
>>> to struct xen_sysctl_physinfo.
>>>
>>> Note that this interface is intended to be compatible with AMD so that
>>> AVIC support can be introduced in a future patch. Unlike Intel that
>>> has multiple controls for APIC Virtualization, AMD has one global
>>> 'AVIC Enable' control bit, so fine-graining of APIC virtualization
>>> control cannot be done on a common interface. Therefore, for xAPIC HW
>>> assisted virtualization support to be reported, HW must support
>>> virtualize_apic_accesses as well as apic_reg_virt.
>>
>> Okay, here you now describe _what_ is being implemented, but I'm
>> afraid it still lacks justification (beyond making this re-usable for
>> AVIC, which imo can only be a secondary goal). You actually say ...
>>
>>> For x2APIC HW
>>> assisted virtualization reporting, virtualize_x2apic_mode must be
>>> supported alongside apic_reg_virt and virtual_intr_delivery.
>>>
>>> Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
>>> Signed-off-by: Jane Malalane <jane.malalane@citrix.com>
>>>
>>> v4:
>>>   * Fallback to the original v2/v1 conditions for setting
>>>     assisted_xapic_available and assisted_x2apic_available so that in
>>>     the future APIC virtualization can be exposed on AMD hardware
>>>     since fine-graining of "AVIC" is not supported, i.e., AMD solely
>>>     uses "AVIC Enable". This also means that sysctl mimics what's
>>>     exposed in CPUID.
>>
>> ... more here: You claim similarity with CPUID. That's a possible route,
>> but we need to be clear that these CPUID flags are optimization hints
>> for the guest to use, while the new control is intended to be a functional
>> one. Hence it's not obvious that CPUID wants following, and not instead
>> the conditionals used in vmx_vlapic_msr_changed() (or yet something else).
>>
>> What's worse though: What you say is true for x2APIC, but not for xAPIC.
>> Which effectively is in line with vmx_vlapic_msr_changed() and CPUID
>> handling also agreeing as far as x2APIC is concerned, but disagreeing on
>> the xAPIC side. I can only once again try to express that it may well be
>> that pre-existing code wants adjusting before actually making the changes
>> you're after.
> 
> 
> I've been thinking about this. Considering what you say, I propose:
> 
> - having assisted_x2apic_available = cpu_has_vmx_virtualize_x2apic_mode 
> && (cpu_has_vmx_apic_reg_virt || cpu_has_vmx_virtual_intr_delivery). 
> This would mean that on Intel CPUs has_assisted_x2apic==1 would signify 
> that there is at least "some" assistance*, whereas on AMD it would 
> signify that there is full assistance (assistance here meaning no VM-exits).
> * apic_reg_virt prevents VM exits on execution of RDMSR and 
> virtual_intr_delivery prevents VM exits on execution of RDMSR, from what 
> I've gathered.

I agree with this part of the plan.

> - having assisted_xapic_available = cpu_has_vmx_virtualize_apic_accesses 
> && cpu_has_vmx_apic_reg_virt because apic_reg_virt is neccessary for 
> "any" assistance.

Not exactly, aiui: cpu_has_vmx_virtualize_apic_accesses alone is beneficial
because a separate VM exit is then used, simplifying some internal handling.
There might actually be room for improvement in our handling of this, as we
presently use the exit qualification only to accelerate EOI writes.

> - Currently, the code only sets SECONDARY_EXEC_VIRTUALIZE_X2APIC_MODE if 
> "some" assistance is guaranteed but sets 
> SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES even if no assistance is 
> guaranteed. So the adjustment to the pre-existing code that I propose is
> adding cpu_has_vmx_apic_reg_virt to the initial check in 
> vmx_vlapic_msr_changed():
> 
>   void vmx_vlapic_msr_changed(struct vcpu *v)
>   {
>       int virtualize_x2apic_mode;
>       struct vlapic *vlapic = vcpu_vlapic(v);
>       unsigned int msr;
> 
>       virtualize_x2apic_mode = ((cpu_has_vmx_apic_reg_virt ||
>                                  cpu_has_vmx_virtual_intr_delivery) &&
>                                 cpu_has_vmx_virtualize_x2apic_mode);
> 
>       if ( !cpu_has_vmx_virtualize_apic_accesses &&
> +         !cpu_has_vmx_apic_reg_virt &&
>            !virtualize_x2apic_mode )
>           return;

I'd suggest the opposite for the xAPIC case: Leave the condition here
unchanged, but consider tightening the condition for the CPUID flag.
That'll bring xAPIC handling more in line with x2APIC one.

> which would then eventually just be what I currently have:
> +    if ( !has_assisted_xapic(v->domain) &&
> +         !has_assisted_x2apic(v->domain) )
>           return;

Yes, the eventual form is expected in any event.

Jan

> So, essentially, the only difference from v4 would be 
> assisted_x2apic_available = (cpu_has_vmx_virtualize_x2apic_mode &&
> 	  	             (cpu_has_vmx_apic_reg_virt ||
> 			      cpu_has_vmx_virtual_intr_delivery));	
> 
> sysctl would now coincide with CPUID for xAPIC but not x2APIC (for CPUID 
> the condition is the AND of all features unlike the 
> assisted_x2apic_available proposed). IOW, it would follow the 
> conditionals used in vmx_vlapic_msr_changed(), if we take the change to 
> vmx_vlapic_msr_changed() above.
> 
> Thank you,
> 
> Jane.



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 08:58:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 08:58:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284071.483204 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ3l8-0007E4-W0; Fri, 04 Mar 2022 08:57:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284071.483204; Fri, 04 Mar 2022 08:57:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ3l8-0007Dx-Sx; Fri, 04 Mar 2022 08:57:58 +0000
Received: by outflank-mailman (input) for mailman id 284071;
 Fri, 04 Mar 2022 08:57:57 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ZVQB=TP=citrix.com=prvs=055bc9087=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nQ3l7-0007Dr-5X
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 08:57:57 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 2d6972e3-9b99-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 09:57:55 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2d6972e3-9b99-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646384275;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=Wvq+6bSblD3LIucltOo+P5wbM9LUdG1cgVQc1v+f8PQ=;
  b=eBhOegcXB4JFC3KZBbdhoyKGrMR7dQnFvCq9RtdDGIPpfdbCSjDxW0sc
   tmW31eGFWgE0JifY+q7uITimzEQDftixGjYKiCYLxoKp1jvzjuGhXDj15
   s9Lfd9zKyzL8uJ97dTceWcoVvs1D+AZWN2nT04w1tBfise7F26vSHYvMw
   s=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65391214
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:dashuK48PEpPmOE7kWebagxRtC7HchMFZxGqfqrLsTDasY5as4F+v
 mIbD2/UaPmDYWumL4x1Odjn8EwDvJ7Wn4VhTlc+rHw2Hi5G8cbLO4+Ufxz6V8+wwmwvb67FA
 +E2MISowBUcFyeEzvuVGuG96yE6j8lkf5KkYAL+EnkZqTRMFWFw0XqPp8Zj2tQy2YPhX1vU0
 T/Pi5a31GGNimYc3l08s8pvmDs31BglkGpF1rCWTakjUG72zxH5PrpGTU2CByKQrr1vNvy7X
 47+IISRpQs1yfuP5uSNyd4XemVSKlLb0JPnZnB+A8BOiTAazsA+PzpS2FPxpi67hh3Q9+2dx
 umhurSpZFwDIqiQld47CStyHg5XII1vwLv+dC3XXcy7lyUqclPpyvRqSko3IZcZ6qB8BmQmG
 f4wcW5XKErZ3qTvnez9GrIEascLdaEHOKsFvX5t13fBBOsOSpHfWaTao9Rf2V/cg+gQQK2PP
 pBANVKDajyefxxzFH1UU6g+s7u0g0iubT1Ro3Ga8P9fD2/7k1UqjemF3MDuUsOObdVYmACfv
 G2u13T0BFQWOcKSzRKB82mwnanfkCXjQoUQGbaksPlwjzW7xGYeFRkXXluTuuSihwi1XNc3F
 qAP0nNw9+5orhXtF4SjGU3jyJKZgvICc8N9SMcm7V2A8IyO0SyUKUEZbhd5bOVz4afaWgcW/
 lOOmtroAxlmv7uUVW+R+9+okN+iBcQGBTRcPHFZFGPp9/Gm+dhu1UyXEr6PBYbo1oWdJN3m/
 9ydQMHSbZ03hNVD6ai09Euvb9mE9smQFV5dCuk6swuYAuJFiGyNOtTABbvzt68owGOlor+p5
 iJsdy+2trxmMH11vHbRKNjh5Znwjxp/DBXSgER0A74q/Cm39niocOh4uW8iehwyaJdfIWG1O
 yc/XD+9ArcJZhNGioctPuqM5zkCl/C8RbwJqNiOBjaxXnSBXFDep3w/DaJh92vsjFItgckC1
 WSzKq6R4YIhIf0/llKeHr5FuZdyn3xW7T6DFPjTkkX8uZLDNSH9dFvwGAbXBgzPxPjf+1u9H
 hc2H5bi9iizp8WlOniHqdNIdAtSRZX5bLivw/Fqmie4ClMOMEkqCuPLwKNnfIpgnq9PkfzP8
 G37UUhdoGcTT1WdQelWQhiPsI/SYKs=
IronPort-HdrOrdr: A9a23:9BxdO6EPPZ2y+yQ3pLqFBpHXdLJyesId70hD6qkvc3Jom52j+P
 xGws526faVslYssHFJo6HnBEClewKgyXcV2/hqAV7GZmjbUQSTXeRfBOfZslnd8mjFh5JgPM
 RbAtlD4b/LfCBHZK/BiWHSebtQo6jkzEnrv5ak854Ed3AVV0gK1XYBNu/0KDwQeOEQbqBJa6
 Z0q/A37waISDAyVICWF3MFV+/Mq5nik4/nWwcPA1oC5BOVhT2lxbbmG1zAty1uGQ9n8PMHyy
 zoggb57qKsv7WSzQLd7Xba69BzlMH6wtVOKcSQgow+KynqiCyveIN9Mofy9wwdkaWK0hIHgd
 PMqxAvM4Ba7G7QRHi8pV/X1wzpwF8Vmgjf4G7dpUGmjd3yRTo8BcYEr5leaAHl500pu8w5+L
 5X3kqC3qAnQi/orWDY3ZzlRhtqnk27rT4JiugIlUFSVoMYdft4sZEfxkVIC50NdRiKpLzPKN
 MeTf002cwmMW9zNxvizypSKZ2XLzkO9y69MwY/Upf/6UkVoJh7p3FosPD30E1wsa7VcKM0lN
 gsAp4Y5I2mcfVmH56VJN1xN/dfWVa9CC4lDgqpUCHa/ec8Sjbwl6I=
X-IronPort-AV: E=Sophos;i="5.90,154,1643691600"; 
   d="scan'208";a="65391214"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=lOLAB5pDmNIk8QL3JxcnE0uFq5xePPeBI9p6Rb8Yq+GFmZumOWwxiWyIeSCy/C/H2TkIvKCcE4KF8Ay5NjnS0BUZnU44zC9Kxe7ELW0pgTo4AEtvK93sEunCXo5L5SugVLlspX55AfTicuAcmYbHPsGD48bGIBwEHrUAWF8GdsYX8MlYYatkAb2OKjpq9O3vz2eejy/8r91kBQ8Il3VqWFBhJ5LXLLMD6U4pzt6QlAyUSRPIG+HU+T840lFylkIA/wlYVP/ZKTayHKpexr5IpG/OiSBy163vLQsnJvAJim2c45O/PB4SP8atBIoq8K8z3oF8yfYHQD1E7wDkM9R6nA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Wvq+6bSblD3LIucltOo+P5wbM9LUdG1cgVQc1v+f8PQ=;
 b=Efp1eoHcLCLdsPtR3uuTftxl+h5lmN+DumepUN/WtWIxkKKcqFSzoJdAywqYIHUywj0F6FqytcfWXiddpFoRBaYoIiKbiMkLhP7bfJyYqB0+oNa6chYnqx3Ho33xUbrysERbLTshG6sJiWKrkGwU8Q+O5eEkviksj/z8yxGa/2R7JAIDd2uGDfNmX2IQ1MfAo//B3NUvMoAM2WPK28tf76b1kT0CJZHVZ/bTnFxfeVL88b1wcPAoCEE24SM5KeUu0ghC6FMeaE7MUW4r268u80g5X1H2kJZGDPy1jAmC02B9/SUNtbBT6kd/aybF2nRS+Y21Wszc7zrTUDxS9RI9bg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Wvq+6bSblD3LIucltOo+P5wbM9LUdG1cgVQc1v+f8PQ=;
 b=gGZjGnBS0bxdQoII8OQSiqbq1+MtF6pDETWQ3TiV0dTkqHtk0cCeH9Lyw8eaj2hmNrWx+NCjB3nKWnei6AAiHN5hbKeyQ7rghF5I/xV2cUKjeEis+eFArChrteEZvVEaRbMiDPF2q8X2uFRuwcFQz5YuzPv4/eKqEuJW8BSVduw=
Date: Fri, 4 Mar 2022 09:57:38 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH] x86: also discard .fini_array in linker script
Message-ID: <YiHUgkdkp4NFW4Lz@Air-de-Roger>
References: <2a9061de-3d68-20f7-75b9-b1b9491342f8@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <2a9061de-3d68-20f7-75b9-b1b9491342f8@suse.com>
X-ClientProxiedBy: PR3P191CA0049.EURP191.PROD.OUTLOOK.COM
 (2603:10a6:102:55::24) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: bf9fc8f0-fc47-427e-3eb8-08d9fdbd0e65
X-MS-TrafficTypeDiagnostic: MWHPR03MB2512:EE_
X-Microsoft-Antispam-PRVS: <MWHPR03MB2512DD7D2D411E49B95DD4F58F059@MWHPR03MB2512.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(85182001)(5660300002)(6916009)(316002)(33716001)(508600001)(54906003)(66946007)(6486002)(66476007)(66556008)(26005)(186003)(8676002)(4326008)(86362001)(6512007)(6506007)(38100700002)(2906002)(6666004)(4744005)(8936002)(9686003)(82960400001)(142923001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?TWI3UzM2ZXFUQ2xxZFQ2TjdVTXV4MnBDQmdxeFRXMHFqSjNhUkE5ZlZUaDA4?=
 =?utf-8?B?OG11YlVlcmVMZ1ovVmxwTkg2RjFDd2dXWGpldG5Ka09WYXlZeHFzSkhYa2s3?=
 =?utf-8?B?bEZVbDBUdUVqN01Xc25OS255MXZIQm5rVlJ1K3BiWk42YU1ueFhBT2RDNFFB?=
 =?utf-8?B?WkdaOFlzdTRCb1V4OW4ydExqU0kya1NGWjlQZnhwT3plNEd5bFFrbzZ0MUxL?=
 =?utf-8?B?ZW16NDhUdXMxcEV4UW5zYWRoNnB0a3dGRnpaQ0Z5bkVERWxtUHdYTFAzYzUw?=
 =?utf-8?B?MHJDUXR5VFNpb2M4WnFTUUxXN2diNTJCeDM1bDBFbVE4a2ZKMzc4Y0dZcFky?=
 =?utf-8?B?anZULzFZVjdac1pGdlpJeURHZm45c1Q5UG5BKzFhMDZGc1BHUkt3Q3g2aDF5?=
 =?utf-8?B?UmhxRm5Qb1NPTmxMeVJ1YnJMcXV1YVdkc1R5OEdkVUtEWW9vL3pnVURFb1Zh?=
 =?utf-8?B?QlhZTjhLTEFLM3VqTnVFSEpYZG1MeWJGRTJ4Nmw5R3NrelJHQnhESDN6LzM5?=
 =?utf-8?B?OFVrbERKUU1STHRXUmFPRUZKWFpvV3ZPanlHbEJFam9QcVUrREYyVHo5NFNN?=
 =?utf-8?B?UUJ6QUlLeDJaRkErd0VQUEwyUHRrbUY2aEFlWmpWdnlFa0ZTL21BaTI2ZCtq?=
 =?utf-8?B?eFEza3JhbHI0YisyQ1R1UlMzelo4dlgrUjk5VjIxL0piSzA1M3NtRG9zQ0gr?=
 =?utf-8?B?V0pHZVVpa254TFI0N1pid1lHZzR2b2NEV01SbzM0VldWQnBXTU4yYTUwZ0ls?=
 =?utf-8?B?YnpSL1NsS1FQcDk4S1FOUm93UWI3VjZEVGxBazNZTnJwWkM2YitlM3ZuS0R5?=
 =?utf-8?B?Ti9jYVhTUjBhcnhBY0dTZ3dqZ29QdkY3dEFpOUl4Tk1tL29sWjR2MUdocS85?=
 =?utf-8?B?bHNRUWN6TWlDY1VRN2FBT1VLc3ZoeGpmRFFRQmJQa0lqTlJDY1JzdGRkZWRo?=
 =?utf-8?B?MEZzb1pyd1NKWndTdGkyVGQzUklOMTFOdzk3Z0VmL1d5UUk3aUlWdGFnTng5?=
 =?utf-8?B?SFF5M0tDekZQZE9qSTZxRG5LSndyRU1IODZGdkJsemoxaklITXpZZS9nbUFp?=
 =?utf-8?B?VENpL04yV0Z0S2FuZW1XOU15eDNHSGwvdVlZRmNsWi8zMXhDZUJYZ3hwcW5Z?=
 =?utf-8?B?OWdLLytIYTA3NUJMUWlQQm9jWG1lZDFla0VKTXB1TjRxSC8wK1Q4NUh4eGMr?=
 =?utf-8?B?RnVtTDFtdWZFVHpCM0hqMFBhdHdLNXd4c0wzSUtWbDNnVXFlRlh6QnJYZlVM?=
 =?utf-8?B?cTE4WGNmR1IwaXVSbDB4ZXVabmpKWUFrVGR6UXRycnJUTlRYdzJrNjFsMkp3?=
 =?utf-8?B?cWFLQkNxQzZsbHFhckVJVFVCRVRiQ3haMDR6Zm4vQzlleXM4eTlVdE9WcmdL?=
 =?utf-8?B?YzB3UkJUWmNrT21HN3ZucFpQUEhrb0tUaXVyQU5MclI3bHhnWU1mYzRsQW9R?=
 =?utf-8?B?dVRtWkJkdjVNNkFpdzdBbWlzalZsdkJveFRsZlZXN2JLQjBNNlVselNJVS9l?=
 =?utf-8?B?QVJsK0taYjJXd1IzMk5mcXM2bWhhMGVZeitmUlEydGFaSXBXS2NaeG9uQ05T?=
 =?utf-8?B?UDlVVVptYTI5VTB5NGtXc2ovYUFCNkxpODFGb3k2elNISlhnazMxOS9RZ09W?=
 =?utf-8?B?Mkd4Q0xrQmFCRDRLbk4rb0ZhSFBaUGE4eVFtUURFdFo2OVA1bmlTcHBNcnkw?=
 =?utf-8?B?dGVXZmF2czdNZHZZNWxqMTh1OWswYUhkR1c1MnhnU25rVmlWR1U4VGZaUjRk?=
 =?utf-8?B?Q3p2MzI4c1cwQ0NNUVRwNHpuanN5Zng1dmZ6L2Z2NTJaMnJWWFZBV1ZFUGhu?=
 =?utf-8?B?d0paZkRBYS9nWVpWbGg0amdPL1Fwc1dlNisrbWFXU25OMThFdnB1U01sQnc5?=
 =?utf-8?B?V05MTm1lWTRJL2tmVDFHRTU5NTN1SGpOWEdnWldOS3FLb1Rmc3crekxDQUIy?=
 =?utf-8?B?WUxvajBKcE9Zb0pXdHV1Rk1QeUJZaWhwMUJwc3QwZzFYSkd6WGp4bVhCeWZR?=
 =?utf-8?B?TTJGd0NiOStWQnd2M2VBaVRncDEyT1BTejZZR3dqb2dLRTYwL2NmUzArSVc4?=
 =?utf-8?B?UTlsS1JYU1ArZmZzeHI2eGE5MkluZnZINHhWV2dQUjBscjF0UkNKMHZVYXJT?=
 =?utf-8?B?Z0l5eHoyd2FLNDAzQjhGTFZwNlY5UjJFNU5BN25KZmRmWitOOXRJUzVoMUhU?=
 =?utf-8?Q?p+DqdZNY5WazJzjzQSgoxOw=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: bf9fc8f0-fc47-427e-3eb8-08d9fdbd0e65
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 08:57:48.3360
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 3zziUqg5frrfIcZWnqXKw5ccivX54ln8g7bXSnIgx0cELJMZwuGaeHnwrI1P999ddmhqhVCpp6a+u2vBk7ST+Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR03MB2512
X-OriginatorOrg: citrix.com

On Fri, Mar 04, 2022 at 08:49:39AM +0100, Jan Beulich wrote:
> This simply parallels .dtors. Both section types can reference
> .text.exit, which requires them to be discarded together with that one.
> Compilers, depending on their findings during the configure phase, may
> elect to use either model. While .{init,fini}_array look to be
> preferred, cross compilers apparently have this guessed, likely
> resulting in a fallback to .{c,d}tors. Hence we need to support both
> sets.

Do we also need to consider discarding .fini? Or that's guaranteed to
not be used by the compiler?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 09:17:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 09:17:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284078.483216 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ441-0001bd-Ny; Fri, 04 Mar 2022 09:17:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284078.483216; Fri, 04 Mar 2022 09:17:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ441-0001bW-Iq; Fri, 04 Mar 2022 09:17:29 +0000
Received: by outflank-mailman (input) for mailman id 284078;
 Fri, 04 Mar 2022 09:17:29 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=LpR9=TP=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nQ440-0001bQ-Vr
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 09:17:29 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id e8c5395b-9b9b-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 10:17:27 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2104.outbound.protection.outlook.com [104.47.18.104]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-2-umCPsN4mMXWarl0EZc7KOQ-1; Fri, 04 Mar 2022 10:17:25 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AS8PR04MB9096.eurprd04.prod.outlook.com (2603:10a6:20b:447::10)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Fri, 4 Mar
 2022 09:17:24 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.017; Fri, 4 Mar 2022
 09:17:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e8c5395b-9b9b-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646385446;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=xJ8tnRqPXCfHENriotdltI7jRTtWka+LQz2JvM2P6RA=;
	b=V2Dkr1/ACHPmU62K1B2kbeaCWJChqoo3KtFPRg7ML9ccfWvzun415f/W/XOEV4TUI0zCS/
	Nh7Tbv6LS2t2D7JGd6HeB2mhLdBTQ3p/O2nMhI2BF1CNHDjC10EzWOEwbHiF4I3vLDGkkZ
	h6GRKlE9gJuVJU/4a7YsxGpkdK/ftj4=
X-MC-Unique: umCPsN4mMXWarl0EZc7KOQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=fYnok4SAwBz+K43JsKsx3TBdjJft4fSdIYfwYW++Dum/aa6zlpO7D4B/i90DlIjA8l7Ma0iVW970oSoOYQjcX0/GU+pR2pf4/mUtsgFEcR7HJye9I3LGwsjzpMlw+AZ4Biq/95U0SNcauR1Pcfq03t6Ms/HvlGIISAsa5VwXXbaeiPS3PgN5QPQGdy6EbcHNMphM2K3DxENRMKm8ltnRd/yF1PHgWQ2Cxckn+o9nkAcoG/pP/maXn2mL4qd9wGsmfWf2wKP3/o3Fq35CR/JSCWP8eBWv3qAImBsCQ1DlPZ1veErO21x/OSN363U0t8G8/Rw1kbKRC52x+bw0P0sZaw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=prXitb9VmFyu1Stn09SlA17CbeW+6mCPB+vTer0PBZY=;
 b=XPoJxsSRwyRNo5IdrNmZQsMw/Gpa2k4QBdlp7LowJzNH0q02OlB+lnD9XoNjsoXQmNnCR9w7Pit/bAVPFekPRzfgk58HrGw1SUzS9CmDLQg+iCTsxQdcmuEdFbHGtZi0xd3ErpiYl/8nNQJTLRW18UE3csmRn1qXvB7GQWfqQjjQerzvq365nSJbvIOe+IMCwoc0n1IJoQott7BcgLFykxyBOvp98l1d6ZIg2ze0FjMW+VPdLc5ZAPkzsG7KBdaIKf90aFSJo3kj9Nv1lZJAln2GpBR5v/2O2LEArw+7k/pvCKkgmvJiKUBpngyS1GC4flM4UJ6I65qgJ9PHrmLRxQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <a4bbfb15-1771-3083-74e2-141c219666ba@suse.com>
Date: Fri, 4 Mar 2022 10:17:22 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] x86: also discard .fini_array in linker script
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
References: <2a9061de-3d68-20f7-75b9-b1b9491342f8@suse.com>
 <YiHUgkdkp4NFW4Lz@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YiHUgkdkp4NFW4Lz@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR06CA0066.eurprd06.prod.outlook.com
 (2603:10a6:20b:464::11) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: de681b05-176f-4f16-2d46-08d9fdbfcb24
X-MS-TrafficTypeDiagnostic: AS8PR04MB9096:EE_
X-Microsoft-Antispam-PRVS:
	<AS8PR04MB90969845A13AE6C7F59C65D5B3059@AS8PR04MB9096.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(8936002)(6916009)(31686004)(4744005)(54906003)(2616005)(6512007)(66476007)(66556008)(316002)(36756003)(186003)(26005)(5660300002)(66946007)(38100700002)(53546011)(6506007)(2906002)(8676002)(4326008)(6486002)(508600001)(31696002)(86362001)(142923001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?2xY46n+vA/pIxoQnznBXIM8ATEcSthPZ7LNJewKiqs+1Ekn6YB9PraCxTChp?=
 =?us-ascii?Q?tRJdMlPXsNF76hqeNcCn75wnOgndGtZvqPb7y9aZPhu40oOCMJU86RZWpPMB?=
 =?us-ascii?Q?4+GGPqKuZV1Y9c23E9EFp/Y7tXJOmxdFQEPAdyurhr6AmqB9W+d2rVqbbIvg?=
 =?us-ascii?Q?bdQwKAD0E3iIS+9oTMXAmEKcaf3qoWRB7zXPSRf57VlQNE7FHCjWzDe1Y+y1?=
 =?us-ascii?Q?KggA0QcCmPEYJohYIUTqtTNLQh6ke/kRNuUxOavBUhh4czgXcKHS1EL62V4f?=
 =?us-ascii?Q?1EuapqlVWhUGnTCPaCGMSJsLug7pYCRTTon9ltlu6HgFZXA6KyAeLUGqEq14?=
 =?us-ascii?Q?fHaekY8F93MgA1cmhuDr+EpDlie9qmXSnTiYio2Nez92bh1kEO8bHAF1egbU?=
 =?us-ascii?Q?dgeKwER7A8eKppiJIJftucg5AnAcKqtBVRnbpvbrbSsLaScjk61MrXDwGeTS?=
 =?us-ascii?Q?k4FxxWtWehr7bLIQ00qrIKGznuADieyV1sjAbhhPUunQtbsBwwd7GjYBF+mV?=
 =?us-ascii?Q?hbs+SveqQU0oOTlR6jewMaYWnyB0u3cmHG4H5WVQhRj9p3FaeeOkBaXeUo0E?=
 =?us-ascii?Q?nspE48mkwN2QivZTnUJ3nw58YeounnEEXbF2G+mhT7o/YDxd4c83InFRd97Y?=
 =?us-ascii?Q?JYdJfkvyodlIwmqdL3sJQKN5SZMGh/vbdZ0ywcmxOZ8/VtCn7KvW1/QxkjZ6?=
 =?us-ascii?Q?qKaEaLSxhWRaaavUWWcA0/Kp6WpZoERHGoLof8ypm6hF1CKVvS3ElMHZ07rK?=
 =?us-ascii?Q?cBh2joDrrDDnpoAAda5RoEKOP8hIcHmRqNmbewWmDl0RXTsc5tcItBkIp/k3?=
 =?us-ascii?Q?0k4K+eFwWNPwBqid3+Vnkbw+UdbXVepqD2TjVPQ1FcTcD2FsRLffIg8tMIWL?=
 =?us-ascii?Q?DH61aq6kV1TpCVwDfWZ030wDLeBlgP7N/5TluLP/ISzbVrX4ZuKxrudodSOB?=
 =?us-ascii?Q?Tp/rm1oLmu+CbBPLLIuE12NqgDnA0p6PH+2EsKMtHD9J6N1aitv3Tj5RGrxM?=
 =?us-ascii?Q?1qLM8R7M8fRHFeoLWClN4rsu8vqEcaRPsNwiDX65P7XlyCctVWdE55lg60lX?=
 =?us-ascii?Q?bFht0jCP0Z8LMo3+BekahKnb2noWr1zEaEzrYlG6iV5y1nRBfBCzJVFOSHqz?=
 =?us-ascii?Q?mko3Er7j1fEG9uHIRqs6WY64ttStFk+vH8tW67Nj4zZHw8Nzj0QdRCfHEgsi?=
 =?us-ascii?Q?ceKNM8veRPU0HWi3XrHRRaFqdpvML3+1tYGWuy0VKNNEdsCoB50e8+/OHfy5?=
 =?us-ascii?Q?9Q+r0cyhCbAZKZyv9oHebbL8N6G/5AJ0/r1by58rcvVun/DEBLhqlLGAxLxS?=
 =?us-ascii?Q?Gficl46IJzQkED6vDKnkFPFIGnVA6c3ipNU6nI/9J5cCbb2l2HxhyULNeNlN?=
 =?us-ascii?Q?1FDQkRYA989HMbn97he67/9WohkbvZJtJ5Wvto6zETvyyOOayAnZXJT/HsX/?=
 =?us-ascii?Q?A+qrDey5J6PpZ45X7J54srpDn6Q6MJsP110Qt/Jov1vBMTY7AVHg3W8pTRj4?=
 =?us-ascii?Q?Q6KsmwurUYYRVHVl2AAWeSIXih96ia4nSBps389GpW/kKiyxbAnwjC3Qokf0?=
 =?us-ascii?Q?LKdozTHDPtD9zHOoJhs5fdd5mdaoYKwPaDg7GTwSUQOzPxV9sNmaezEa9Ijk?=
 =?us-ascii?Q?VT2AwTs9Af0d7lCQEKTXCuE=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: de681b05-176f-4f16-2d46-08d9fdbfcb24
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 09:17:24.1174
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: EMurdEDNMmuMJNkpHA5O91fRF3P0Ms+grwiaKxLHFvYN0xjpwqG5+Am4TAMPpIwlZhiO/vnJGiK/aHanQfMnLw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR04MB9096

On 04.03.2022 09:57, Roger Pau Monn=C3=A9 wrote:
> On Fri, Mar 04, 2022 at 08:49:39AM +0100, Jan Beulich wrote:
>> This simply parallels .dtors. Both section types can reference
>> .text.exit, which requires them to be discarded together with that one.
>> Compilers, depending on their findings during the configure phase, may
>> elect to use either model. While .{init,fini}_array look to be
>> preferred, cross compilers apparently have this guessed, likely
>> resulting in a fallback to .{c,d}tors. Hence we need to support both
>> sets.
>=20
> Do we also need to consider discarding .fini? Or that's guaranteed to
> not be used by the compiler?

I'm not aware of it being used anymore; if it was used, we'd also need
to deal with .init (which - logically, but not technically - would
conflict with our own section of this same name in xen.efi).

Jan



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 09:19:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 09:19:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284087.483226 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ46P-0002GG-6Q; Fri, 04 Mar 2022 09:19:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284087.483226; Fri, 04 Mar 2022 09:19:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ46P-0002G9-32; Fri, 04 Mar 2022 09:19:57 +0000
Received: by outflank-mailman (input) for mailman id 284087;
 Fri, 04 Mar 2022 09:19:56 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ZVQB=TP=citrix.com=prvs=055bc9087=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nQ46O-0002G3-30
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 09:19:56 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 3dbffc00-9b9c-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 10:19:51 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3dbffc00-9b9c-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646385591;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=sR3H3ct19tdmO7Mwwl5hHJgUNFLV5vH6INWa0rrIHaQ=;
  b=GnDeMFU2ZQjNuFUrJGWAHym8LoQcT+mIn93CoTxp90GFczvKJXtHIBtL
   xg3vzhLoli9iUxz6EjOTJMeXT8kPzaEk1fEdPphGypd3i4cBXYB1DGBrt
   fMWwAUYqctuos6Crdoaxh0jpOP4wj61ZeCqDm6PwunVsMoid3Z8HwqfVK
   s=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67800808
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:rj/1HKLQ/n1jcDp7FE+Rx5UlxSXFcZb7ZxGr2PjKsXjdYENS1zxWz
 msYCjiGa/6LZGT9KNh0YIW/8RsP68PTnIdgTwZlqX01Q3x08seUXt7xwmUcns+xwm8vaGo9s
 q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUYYoAQgsA148IMsdoUg7wbRh2dY02YHR7z6l4
 rseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3fMldG0DQUIhMdtNWc
 s6YpF2PEsE1yD92Yj+tuu6TnkTn2dc+NyDW4pZdc/DKbhSvOkXee0v0XRYRQR4/ttmHozx+4
 PVDh8yATCUxBKj3tedAdxpYMQp3BoQTrdcrIVDn2SCS50jPcn+qyPRyFkAme4Yf/46bA0kXq
 6ZecmpUKEne2aTmm9pXScE17ignBNPsM44F/Glp0BnSDOo8QICFSKLPjTNd9Glv1pgWTa6OD
 yYfQQplN0jBajkXAAZUEqA4hNaq2ELNbxQN/Tp5ooJoujOOnWSdyoPFL979atGMA8JPkS6wt
 m/Aumj0HBweHNie0iaetGKhgPfVmiH2U55UE6e3ntZoilCOwm0YCDUNSEC25/K+jyaDt8l3c
 hJOvHB09O5rqRLtHoKVswCETGCsnhAuC+pVMfUA7Tqgyffw4Aa7LWE/Z2sUADA5j/MeSTsv3
 16PutrmAz1zrbGYIU6gGqeoQSCaYnZMczJbDcMQZU5cuoS4/tlv5v7aZos7SMaIYsvJ9SYcK
 txghAw3nP0tgMECzM1XFniX0mv39vAlouPYjzg7v15JDCskPOZJhKTysDA3CMqsyq7DFDFtW
 1Bex6CjABgmV83lqcB0aLxl8EuVz/iEKibAplVkAoMs8T+gk1b6I9wOu2okdRwxbJpfEdMMX
 KM1kVkLjHO0FCH3BZKbnqrrU5h6pUQePY6Nug/ogipmPcEqKV7vENBGbk+MxWH9+HXAYolkU
 ap3hf2EVC5AYYw+lWLeb75EjdcDm3BvrUuOFMuT50n2jtKjiIu9FO5t3K2mNbtisstpYWz9r
 r5iCid9404HAb2mP3KOqtZ7wJJjBSFTOK0aYvd/L4arCgFnBHsgG7nWx7YgcJZihKNbiqHD+
 XTVZ6OS4ACXaaHvQelSVk1eVQ==
IronPort-HdrOrdr: A9a23:MI0DSaEit74SxMQhpLqFCpHXdLJyesId70hD6qkvc3Nom52j+/
 xGws536faVslcssHFJo6HmBEClewKnyXcT2/htAV7CZnichILMFu9fBOTZsl/d8kHFh4tgPO
 JbAtRD4b7LfClHZKTBkXCF+r8bqbHtmsDY5ts2jU0dNT2CA5sQkTuRYTzrdHGeKjM2YabQQ/
 Gnl7V6TnebCDwqR/X+IkNAc/nIptXNmp6jSRkaByQ/4A3LqT+z8rb1HzWRwx9bClp0sP0f2F
 mAtza8yrSosvm9xBOZ/2jP765OkN+k7tdYHsSDhuUcNz2poAe1Y4ZKXaGEoVkO0aqSwWdvtO
 OJjwYrPsx15X+UVmapoSH10w2l6zoq42+K8y7uvVLT5ejCAB4qActIgoxUNjHD7VA7gd162K
 VXm0qEqpt+F3r77WvAzumNcysvulu/oHIkn+JWpWdYS5EiZLhYqpFa1F9JEa0HADnx5OkcYa
 VT5fnnlbdrmG6hHjDkVjEF+q3uYp1zJGbKfqE6gL3a79AM90oJjXfxx6Qk7wM9HdwGOtx5Dt
 //Q9dVfYF1P78rhJ1GdZU8qOuMexrwqEH3QSuvyWqOLtBzB5uKke+y3IkI
X-IronPort-AV: E=Sophos;i="5.90,154,1643691600"; 
   d="scan'208";a="67800808"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=We9Ggm8ucBcz6DrRzgqQ0A04C4kYFyaWDyIHZAJVexwcEgcwOu5YcvrVqm2cpspejSs9udX/Nr/zmSL0cWTyiehH7CuQlpVNDT2JUvaOpuaK0HMadKksP7f/jqVGNsJFET21reOZTbvopGqjT4OO1lIBXysgr9qYMXrk9FBkngGRqze3VygXhGrfTlEw9WmvxcqWBe8h/LSJXNKJrhjfrTKnIBNA0FzGXsif0HeXnN27MOo+urtAHjiszPHgO3iuElS0wE99JaWP/6Bvd1Xebx03JCp7OQcuY2momKoxVtui8wy7L1qBXcsp5Se5Y3YmVtKSQid+isCsj2/Dd9v7IA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=9P1ZjLL1kVlW6J4Z49boFuPRdd4bDtOHBhk1MH43gNI=;
 b=QXA1mkzfEsXpeQiikuvis8BA2xzH7M945n3Ieg2hhjyE2UGSTZE+yO9oJ1Huy7gvBRVkgEMWCX/KNROoIcmUpm7SPgf90ERzjomk26ps8AvK0HIOTrO0jAYuZ3wcXhR3W5Ar324ewOSb1thcOoOzoL/XoeSettpjfTMwvkPiLxcjNCZ8qZ0eM95/qsFjRFkZUAQzD6T2S21Wf7AzNh0PJFOZusgnkLIFr2opFfqcwNqbiCYPD1UYreeM3CA26tuLq5ba+qv1tIZSFa1l7vQM8OjK2NDmiJ5N9kv33glRhq5zGXgrcrzkMrILJcxj80tGeqLLVWcB+ANYxnOo4/TQIA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=9P1ZjLL1kVlW6J4Z49boFuPRdd4bDtOHBhk1MH43gNI=;
 b=LitrltJrmk5t1XJXsu12bGKPcVAzRbe9uxxqfUaBajW84l+n2VqP3TZGLy7xraRAw46YyYFDYj7I8eZEwM5JdAI7F8UEkucksPSyW3UUUb7hAR8V/VH36uykvVxlKqbP89DkMZDLjG0m5dEC45wUMRHqSJuRrNrlt7UsLUTvD48=
Date: Fri, 4 Mar 2022 10:19:34 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Andrew
 Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH] x86/build: use --orphan-handling linker option if
 available
Message-ID: <YiHZpmrYt+QvE7ex@Air-de-Roger>
References: <5c374fd3-017d-3c40-4ded-25a3b1c978a6@suse.com>
 <YiCkUebvg0gaBm4/@Air-de-Roger>
 <3c335ca5-63e3-6389-cba5-b9047a4ce3b9@suse.com>
 <YiDaQY1ToO8G2QYd@Air-de-Roger>
 <abd691c8-9c7e-40d7-3f18-d96f826b8539@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <abd691c8-9c7e-40d7-3f18-d96f826b8539@suse.com>
X-ClientProxiedBy: FR3P281CA0079.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:1f::7) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: e3425801-4477-4386-d2b8-08d9fdc01b85
X-MS-TrafficTypeDiagnostic: SA0PR03MB5449:EE_
X-Microsoft-Antispam-PRVS: <SA0PR03MB54494721366313CC756FD9648F059@SA0PR03MB5449.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(8936002)(316002)(5660300002)(6916009)(54906003)(82960400001)(6512007)(186003)(9686003)(26005)(83380400001)(53546011)(6666004)(6506007)(85182001)(966005)(6486002)(38100700002)(66476007)(66556008)(66946007)(4326008)(8676002)(86362001)(508600001)(2906002)(33716001)(67856001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?SERwejZSTE9uckdjT1hCVjRXM3VHd0FuakFnMWFYaWpBWEx6Q3A0YTJ4S1E3?=
 =?utf-8?B?QTFhd0NaWCtLZ010QzcxQVpzYWg5U2ZLbHFXMlJGYlBEbHdUUko0eG0rM2xP?=
 =?utf-8?B?TS9oWDhGUTF3aUljbldzek85ZC9ZKzcrMFVRRndwdVh5QXk2NXkyOWtsSTFK?=
 =?utf-8?B?UVBRdmpwZ3JnMzZueWhrcmpFRXphazdkcUNDa2UxNjd0YXJhRW51NmJILzBY?=
 =?utf-8?B?bjlhOGt4M1k2Q3BNUmpjbm1CQjRKbndUWTRRdjE3cjhqUy9xdEt3V1hveTJG?=
 =?utf-8?B?ZThjR2pRcmxEYkZLNUtVNjYxUkhRUHh2RE1YMG5veVdWdDRSSVpTaVpmNkFi?=
 =?utf-8?B?dVBOSUJYSllRY3Z4REd1MStYd0xnZzdyYVFLeEtYUXZUeTF5cDVQaVZsME5E?=
 =?utf-8?B?YUlEMnp0RUUzeGk4UFR2dXMzN0hPRitRTENkZnlPNE04ei9YZ2hsUFJLSkY4?=
 =?utf-8?B?bU5CVG1tQjQ2OUdOSThybHJqYWNITEFkNTE0KzJnOGMwM2JYb2ttb2dXem1k?=
 =?utf-8?B?UTM0VFM4am9uaHh5SGtKQ3FLdlJSaHJkZTVrYkp5YjdiWnU4OTV5bHFwd1hl?=
 =?utf-8?B?VlNnWVFrdURzOFBFUzdleWUxWXNpYWsvVUtsQUJFWVFZemVzck9wSVJUaXZX?=
 =?utf-8?B?bTlUUzRoNXRpQkZpaWdYaTN3SWVaV2trdVBMbXhJYXhyalk4SmtTR3Y5cUlr?=
 =?utf-8?B?ckJiS0owUnVzMnMvazIzclNObHlsKzNDV1F0Q0NDRFZWaEVuMy8wZ2NhV0lI?=
 =?utf-8?B?SnIrUHBtdDdsQzJDQWZtYnVmekROL1VJdEFjTG1HdEdHZDJDdmc0VXhlMXM1?=
 =?utf-8?B?NlVxdURzR3lxQzN4YlF2NEZ5RUFuUmx4OWpVa1dRZmZLbDRqbWVBM0M2ejk5?=
 =?utf-8?B?T2RHdXFRNXhkQlBrc3FsWVdpWmNRRE5zZ3p2WGlzcFhjdXlkdndPbXVTSDJa?=
 =?utf-8?B?Z3JIbTFjOGtCdHlFb1p6Z0ZqNVNhazRLWmJvTDdnYTdYKzFBckJSUHJLckFy?=
 =?utf-8?B?WGV4T2J0QVhnbGVSTjJIUlBRaG1TSmxyMldVQlo3M28zMzBjak03bE93emc5?=
 =?utf-8?B?VEVlWEdaWmozK2ZWa1lxYVIxVjlXQWVZNXhCaVdmQjB4aVB3ZE5IWlhXSHdy?=
 =?utf-8?B?WmZiYXVEbVRNSlkrUFAvQ0RnSGQvTklkVDVlekMyamNudHRGYUMyUHFWVWZ6?=
 =?utf-8?B?QUsyb2ovNDgxSEp0cVpZMTEvamF2a1MxWnFFWVZPTWVyZjlsQUt6Ly9lYytQ?=
 =?utf-8?B?RmhqK3NOZ1AyWGYvNkRjTEdVdGQrcjBhY29pSVRqM0VFbmtFdTdrVVBKZkxY?=
 =?utf-8?B?bWp1N1lJNFFBNWZNQzVDTExRNFVUNG9VQ2MxZHZZdzZJbTlRaTlvWkZMSkQ0?=
 =?utf-8?B?NGV0QVBQMk5lMVAwcWtDV2xUWlVzZG1OTmUwdGR4akNtSm90Q3dkSWQ0cHRn?=
 =?utf-8?B?QWtJZlM0bGxhZlF0UHJIYysyS1JJSm9oVGVqQjI0YnRUdDhZUWMvTzlrVERh?=
 =?utf-8?B?eVI5NjlXRzVHUFpOOUVmWFQwU0o0YzVKL3hGc0E5dGdVRDFxSmp5WkxWdUhV?=
 =?utf-8?B?b3c0aXN3cDBIR2ZZTVBjMndCcE5rYVVwYUtycnF6cjMyVGNxc3RodnRmYU5R?=
 =?utf-8?B?K21XUkhOZUJSZmZzMVZIY1ZHZUI4WFBlVURxREJCYkJ3SUVSZE01dEpEZGFn?=
 =?utf-8?B?Qi82TkY1VDVVZEFhSFlpVk5CQXNLYzl0VHdnM0VrMS9hYzBCNlgrSTlmR3p2?=
 =?utf-8?B?VDI3dVg2ZWZHa3RTMmFzZjViVHNiangwZUE0WWdrd0RsV2dHc0lkNFRVUDQr?=
 =?utf-8?B?aFFWeTBnUWlKMHZPRmV0MG1PY2hISUtNZ0VnVlFsc3FOMUZFMlYrdjRIU3Jy?=
 =?utf-8?B?c2c0ZU5tc1czRFF6NW4venBTWkpLTjM3V1BtMElVQmlxWFVLUlBoU2s2Wlhs?=
 =?utf-8?B?MnRqb1RPUHRUYjhSaU5uY0l1S3FHY1d1YjVSR2xSS1VRYjFZQy8xZ2JXQkZX?=
 =?utf-8?B?aThRNTBtTkM0RTFjRzB6WWF0MjdUM3JwdFdjNXZpekRhQmVWQXhpZGszNWtS?=
 =?utf-8?B?ZmR0U1kxRjBoVzViSDcyeTBQL2Vqb3VLeUVDVTMzV2tOMVc5M1lFWHVGNWJv?=
 =?utf-8?B?NGt5NjNCUTYrVWx5K0FGSXJJNytyMGI3VGZYRFNXaDdtZTdZN1ZiTkFzaVQ4?=
 =?utf-8?Q?Vo6q4I1aYPjS/0Uimy9AApM=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: e3425801-4477-4386-d2b8-08d9fdc01b85
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 09:19:38.8657
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: do3Wr0P5kbgHPmcx29VyvU17gBQS4dzwwodiSiaNeuw/kmwmavVSUyq8U90VL+vGVb3XaDr2SGbtvsbpfl/mnA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA0PR03MB5449
X-OriginatorOrg: citrix.com

On Fri, Mar 04, 2022 at 09:02:08AM +0100, Jan Beulich wrote:
> On 03.03.2022 16:09, Roger Pau Monné wrote:
> > On Thu, Mar 03, 2022 at 01:17:03PM +0100, Jan Beulich wrote:
> >> On 03.03.2022 12:19, Roger Pau Monné wrote:
> >>> On Wed, Mar 02, 2022 at 03:19:35PM +0100, Jan Beulich wrote:
> >>>> As was e.g. making necessary 4b7fd8153ddf ("x86: fold sections in final
> >>>> binaries"), arbitrary sections appearing without our linker script
> >>>> placing them explicitly can be a problem. Have the linker make us aware
> >>>> of such sections, so we would know that the script needs adjusting.
> >>>>
> >>>> To deal with the resulting warnings:
> >>>> - Retain .note.* explicitly for ELF, and discard all of them (except the
> >>>>   earlier consumed .note.gnu.build-id) for PE/COFF.
> >>>> - Have explicit statements for .got, .plt, and alike and add assertions
> >>>>   that they're empty. No output sections will be created for these as
> >>>>   long as they remain empty (or else the assertions would cause early
> >>>>   failure anyway).
> >>>> - Collect all .rela.* into a single section, with again an assertion
> >>>>   added for the resulting section to be empty.
> >>>> - Extend the enumerating of .debug_* to ELF. Note that for Clang adding
> >>>>   of .debug_macinfo is necessary. Amend this by its Dwarf5 counterpart,
> >>>>   .debug_macro, then as well (albeit more may need adding for full
> >>>>   coverage).
> >>>>
> >>>> Suggested-by: Roger Pau Monné <roger.pau@citrix.com>
> >>>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
> >>>> ---
> >>>> I would have wanted to make this generic (by putting it in
> >>>> xen/Makefile), but the option cannot be added to LDFLAGS, or else
> >>>> there'll be a flood of warnings with $(LD) -r. (Besides, adding to
> >>>> LDFLAGS would mean use of the option on every linker pass rather than
> >>>> just the last one.)
> >>>>
> >>>> Retaining of .note in xen-syms is under question. Plus if we want to
> >>>> retain all notes, the question is whether they wouldn't better go into
> >>>> .init.rodata. But .note.gnu.build-id shouldn't move there, and when
> >>>> notes are discontiguous all intermediate space will also be assigned to
> >>>> the NOTE segment, thus making the contents useless for tools going just
> >>>> by program headers.
> >>>>
> >>>> Newer Clang may require yet more .debug_* to be added. I've only played
> >>>> with versions 5 and 7 so far.
> >>>>
> >>>> Unless we would finally drop all mentioning of Stabs sections, we may
> >>>> want to extend to there what is done for Dwarf here (allowing the EFI
> >>>> conditional around the section to also go away).
> >>>>
> >>>> See also https://sourceware.org/pipermail/binutils/2022-March/119922.html.
> >>>
> >>> LLD 13.0.0 also warns about:
> >>>
> >>> ld: warning: <internal>:(.symtab) is being placed in '.symtab'
> >>> ld: warning: <internal>:(.shstrtab) is being placed in '.shstrtab'
> >>> ld: warning: <internal>:(.strtab) is being placed in '.strtab'
> >>>
> >>> So seeing your mail where you mention GNU ld not needing those, I
> >>> think we would need to add them anyway for LLVM ld.
> >>
> >> Hmm, that's ugly. How do I recognize LLVM ld? I can't simply use a
> >> pre-processor conditional keying off of __clang__, as that used as the
> >> compiler doesn't mean their ld is also in use (typically the case on
> >> Linux).
> > 
> > Hard to tell, `ld -v` for LLD will typically contain '^LLD' I think,
> > but I don't really like matching on human readable output like this.
> 
> Same here. But Linux'es ld-version.sh looks to be doing just that.

OK, so be it then. We can always improve afterwards, as I don't really
have any better suggestion ATM.

> >> I also don't want to add these uniformly, for now knowing what
> >> side effects their mentioning might have with GNU ld.
> > 
> > Wouldn't it be fine to just place them at the end, just like it's
> > done by default by ld?
> > 
> > Are you worried about not getting the proper type if mentioned in the
> > linker script?
> 
> I'm worried of about any kind of anomaly that could be caused by
> mentioning sections which a linker doesn't expect to be named in
> a script. That's hardly something they would even test their
> linkers against.

I've raised a bug with LLD:

https://github.com/llvm/llvm-project/issues/54194

To see whether this behavior is intended.

> >>>> --- a/xen/arch/x86/Makefile
> >>>> +++ b/xen/arch/x86/Makefile
> >>>> @@ -120,6 +120,8 @@ syms-warn-dup-y := --warn-dup
> >>>>  syms-warn-dup-$(CONFIG_SUPPRESS_DUPLICATE_SYMBOL_WARNINGS) :=
> >>>>  syms-warn-dup-$(CONFIG_ENFORCE_UNIQUE_SYMBOLS) := --error-dup
> >>>>  
> >>>> +orphan-handling-$(call ld-option,--orphan-handling=warn) += --orphan-handling=warn
> >>>
> >>> Might be better to place in xen/Kconfig with the CC checks?
> >>
> >> Well. I've tried to stay away from complaining if people introduce
> >> new tool chain capability checks in Kconfig. But I'm not going to
> >> add any myself (unless things would become really inconsistent) up
> >> and until we have actually properly discussed the upsides and
> >> downsides of either model. Doing this via email (see the "Kconfig
> >> vs tool chain capabilities" thread started in August 2020) has
> >> proven to not lead anywhere. I'm really hoping that we can finally
> >> sort this in Bukarest.
> >>
> >>> I'm also wondering whether we could add the flag here into XEN_LDFLAGS
> >>> and EFI_LDFLAGS, as those options are only used together with the
> >>> linker script in the targets on the Makefile.
> >>
> >> Not for XEN_LDFLAGS at least, and undesirable for EFI_LDFLAGS. See
> >> the respective post-commit message remark.
> > 
> > But the calls to LD in order to generate $(TARGET)-syms do not use -r,
> > and are all using the linker script, so it should be fine to use
> > --orphan-handling=warn there?
> 
> But XEN_LDFLAGS is also used elsewhere together with -r. (Whether
> that's actually correct is a different question.)
> 
> > Could we do something like:
> > 
> > $(TARGET)-syms: XEN_LDFLAGS += ...
> > 
> > And similar for $(TARGET).efi?
> 
> Yes, this ought to be possible, but would again lead to the option
> being passed on all three linking stages instead of just the final
> one. When there are many warnings (e.g. because of the same kind of
> section appearing many times), it's not helpful to see the flood
> three times (or likely even six times, once for xen-syms and once
> for xen.efi).

OK, I think our build system is already quite chatty, so wouldn't
really care about seeing repeated messages there. We can find a way to
generalize passing options to the final linker step if/when we need to
add more.

I'm fine with doing the LLD fixup as a separate patch, so:

Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>

My personal preference would also be for placing the ld option check
in Kconfig, but I'm not going to insist.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 09:23:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 09:23:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284094.483238 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ49Y-0003e4-MY; Fri, 04 Mar 2022 09:23:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284094.483238; Fri, 04 Mar 2022 09:23:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ49Y-0003dx-IH; Fri, 04 Mar 2022 09:23:12 +0000
Received: by outflank-mailman (input) for mailman id 284094;
 Fri, 04 Mar 2022 09:23:10 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ZVQB=TP=citrix.com=prvs=055bc9087=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nQ49W-0003dr-T6
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 09:23:10 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b3cf25d0-9b9c-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 10:23:09 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b3cf25d0-9b9c-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646385789;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=utifmjU8b8bW1lzd7Q7rZ7iu62wS1uCpyhuEv93x8Gg=;
  b=AP2XWZHQyFHUUQmG9CO0LBIpDFEmuhjHGnMLzKzN27lvzvUVO5tnN4Xn
   GuPbqAojYMB5mqxvdxcRt2LPkI+LPOmvHJ4Ah5lQ6RMg/PvtT19y8Gccw
   p/9U7OxF+s4lkI7WudfuhIYX7azXolP1oVTUyXYp8rNAIZjoYfMhoDs3i
   I=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65392345
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:vMlueqBvZXWBoRVW/z/jw5YqxClBgxIJ4kV8jS/XYbTApGki1zZWz
 2QdCmnSbvyLMGb0KtlzOY+19U9VuJKEn9FjQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vh3tYx6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhsy
 ehSm5rzFD0sGf3Rg7k2bRAfNT1XaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguw5K8bmJsUHs2xIxjDFF/c2B5vERs0m4PcGgWxh3JsSQJ4yY
 eIASDZtVjuQSCdzEUwKBagmtqSsn1fwJmgwRFW9+vNsvjm7IBZK+KfpGMrYfJqNX8o9tlaVo
 CfK8nr0BjkeNceD0nyV/3S0nOjNkCjnHoUIG9WQ9PRnnVmSzWw7EwANWB2wpvzRt6Klc4sBc
 QpOoHNo9PVsshzwJjXgY/GmiGOFgwEyXZkNKegduByWl4Hq6kG/GkFRG1atd+canMMxQDUr0
 HqAkNXoGSFjvdWpdJ6NyluHhWjsYHZIdAfucQdBFFJYuIe7/OnfmzqSFo4LLUKjsjHi9dgcK
 RiupTN2ubgchNVjO06TrQGe2GLESnQko2cICuTrsoCNs1sRiG2NPdXABb3nARBodtzxor6p5
 iRspiRmxLpSZaxhbQTUKAn3IJmn5uyeLBrXikN1Ep8q+lyFoiD/I9sLumAlfBk1aa7onAMFh
 meJ42u9A7cJYROXgVJfOdrtW6zGM4C6fTgaahwkRoUXOcUgHON21CpveVSRzwjQfLsEyskC1
 WOgWZ/0Vx4yUP0/pBLvHrt1+eJ7l0gWmDKILbimnkvP7FZrTCPMIVvzGADVNb5RAWLtiFi9z
 uuzwOPRk0QPCLClO3KPmWPRRHhTRUUG6VnNg5U/XsaIIxZ8GXFnDPnUwLg7fJdikbgTneDNl
 kxRkGcCoLYjrRUr8Tm3V00=
IronPort-HdrOrdr: A9a23:RhTLxa6c9puosos6UwPXwSqBI+orL9Y04lQ7vn2ZFiY7TiXIra
 yTdaoguCMc6AxxZJkh8erwX5VoZUmsj6KdhrNhQItKPTOWw1dASbsN0WKM+UyDJ8STzJ856U
 4kSdkDNDSSNykKsS+Z2njALz9I+rDum8rJ9ITjJjVWPHlXgslbnnlE422gYytLrWd9dP4E/M
 323Ls5m9PsQwVeUu2LQl0+G8TTrdzCk5zrJTYAGh4c8QGLyRel8qTzHRS01goXF2on+8ZpzU
 H11yjCoomzufCyzRHRk0fV8pRtgdPkjv9OHtaFhMQ5IijlziyoeINicbufuy1dmpDl1H8a1P
 335zswNcV67H3cOkmzvBvWwgHllA0j7nfzoGXo9kfLkIjcfnYXGsBBjYVWfl/y8Ew7puxx16
 pNwiawq4dXJQmoplWz2/H4EzVR0makq3srluAey1ZFV5EFVbNXpYsDuGtIDZY7Gj7g4oxPKp
 gjMCjl3ocWTbqmVQGYgoE2q+bcHUjbXy32D3Tqg/blnQS/xxtCvgklLM92pAZ1yHtycegA2w
 3+CNUaqFh/dL5nUUtDPpZyfSKWMB26ffueChPaHbzYfJt3Tk4l7aSHpIkI2A==
X-IronPort-AV: E=Sophos;i="5.90,154,1643691600"; 
   d="scan'208";a="65392345"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=bJEF9+lJQxdofce0EGFy7mw+Ew+AOgD0i4+KPJNzFyw2VS3fH0CKv7GU5HEp3sYyoUE1dXCgz53ffFrDck2HHikSrFegXYguARpUPOOv69yIiqD1wKjGsnVjr5c4n/xqL+Umca+nknGOwMEj1GdcL/tkpWOpu8J42zG7w1cTkjuHG+enVlW5xqdZIoOAufazta7/lI4NLNIQ1s9gZb+qNArBBi0FYb9x7S2s4wvL5wD9mLtK2LtDbTyYwc/NlRiMX+VFLbEZ2sipGM/BNG85jDA7zSjWfyV0wBHkZMYoc2aH6d7O3fen8xEfmnhglWMn1t/k3Ek1RCua9gX5s4G6ZQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ULCRxBn4E4+Y6hs+knTA/7HPwqhGArPhRyYKyp8W8Qc=;
 b=BrJo8EdAdfb72pOnRHf/cqXLQXbv2JZXvqXaNasMw/arBh5LBsoCnWmyeq5mnX1dKXFT1Qu/3wpgV5+pIlhrp2quID4lMb2Z6ofAREfY+a/Bv75VLVyvInw5IsbYa0MmBnhHjRUl9+JqtTB7xp2d+C4KTfZ6P6oort8XQNECQIMURmvvnGBxwW5Rzc0cDMoI6yeMfcvb2IagkAkVTQJ29cUotSTrvcXio1z7V8Y8vqRkjqNqp2w0QwyeDBpvzF3nuagvWVv0CLvrETerRJcTxmF7Ve+JOb/RDJtjQxuc8VwCybLHJxp2RBX7ngj27TLXiItlifn5EImZWoHB+52QTA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=ULCRxBn4E4+Y6hs+knTA/7HPwqhGArPhRyYKyp8W8Qc=;
 b=M1zctQgVFG7N5VvDEvTsy+7wwAYREAFIwZTNsxpIdHVpfDaNx9RVI/w1Cy6+FlbOfhD7rAf/BB00mKwsP6NGsVgB47YnJD0mdR7QUu3jojGOvoaifrUdJSYnp/9clCco2xRDPYck3L6U7JihhZfVTSl/NTxcUcYX4TkoiJf4w8M=
Date: Fri, 4 Mar 2022 10:22:54 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Andrew
 Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH] x86: also discard .fini_array in linker script
Message-ID: <YiHabhxABDN2tyxZ@Air-de-Roger>
References: <2a9061de-3d68-20f7-75b9-b1b9491342f8@suse.com>
 <YiHUgkdkp4NFW4Lz@Air-de-Roger>
 <a4bbfb15-1771-3083-74e2-141c219666ba@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <a4bbfb15-1771-3083-74e2-141c219666ba@suse.com>
X-ClientProxiedBy: PR0P264CA0092.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:100:18::32) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: d62357b3-bff3-4c62-775b-08d9fdc092b2
X-MS-TrafficTypeDiagnostic: SA0PR03MB5449:EE_
X-Microsoft-Antispam-PRVS: <SA0PR03MB54496A9AAABBBF729CF86E2F8F059@SA0PR03MB5449.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(8936002)(316002)(5660300002)(6916009)(54906003)(82960400001)(6512007)(186003)(9686003)(26005)(53546011)(6666004)(6506007)(85182001)(6486002)(38100700002)(66476007)(66556008)(66946007)(4326008)(8676002)(86362001)(508600001)(2906002)(33716001)(142923001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?bEhqM1piazNyZUlxM2laZFJPK0hET2M4ZTI5a29VSW16aHdwaFZBMkROc3pL?=
 =?utf-8?B?dmMwSGJmSlNCdENXK2grWWRiTk1mUlVzZlA5TUR3NkROOHFnWHVUYm9aK1Ft?=
 =?utf-8?B?cFdQRHhvL2JmQlM5em9iQjhUVWJoczRuWC9Ha1lUdXpnTGVMMC9YUEpRcjR6?=
 =?utf-8?B?Z1NMUnZJbVEzdmMxUTd2dWJZcldIWXJOUzlhcGFYcWlLdEwwWXZNaUdrTjBq?=
 =?utf-8?B?dnE1Z0tXMnFLNG5LRHNRc2xEZ0VBZU4vZzJ3dlJVMG1iTHRIN1FVSFBVcVVx?=
 =?utf-8?B?bUdZbkN0TXM0eUMvU1doWlhTT0ZHeFA2NlVzekVXWTBqMmcwRVlUa0ZDQnFz?=
 =?utf-8?B?SlBldFdOU2tYRlNnaUJ5R0h4TkpNc1ZJVWxudGd2b0MyREkxMzUwcTJMdFkw?=
 =?utf-8?B?aUc4T040UmlKQmpodCtwbk9CQmNnVlA5M3pSVWJsV0xzSndudjlndHVxV0I0?=
 =?utf-8?B?WFI3S21Jd2xBeVFSaVhOa3M2anFpUHVYQmVDNllkQ1Q4TEVpeEk4a0sxUHhP?=
 =?utf-8?B?VjVta0RtQ0NiWlpEMThjYnY0T0NhUCsxczgxL2RXNlUzNUY3UFo5U3BnaUJB?=
 =?utf-8?B?Z28zdGlyb0tXSlNpUnJ0L2k0ckhEZU1vbktrNkxiYTc1WnJwQmw2RUdHeG1a?=
 =?utf-8?B?TmlEdTdxaGxHbyt4a3VnNDJYWXBJOU91cm5neXBnYzVJL3BaWkpSUW5Oek9Q?=
 =?utf-8?B?QkY2RGNWdXdhM3pZaW9XNjRJaUZRRzQ2amp5c0JyenNkOXZLclFtSlpha3Yv?=
 =?utf-8?B?dVpSeUd6Z2xoYmh4YlhDZ3NmZjU3eUszNnlSSW5NYkNNK3ZWUWlZbnIybzkv?=
 =?utf-8?B?cEQxdnBDVWduazBTcWh5ak05b21RMzB6K0R5T0w0VjdxajVtWlZYZjZLa3RW?=
 =?utf-8?B?bDBZWXZIYm5iaDI3dWIyL1R3Smx1blZZV3NqOFFCek1SNzlJKzd1Zk5nNFFw?=
 =?utf-8?B?KzBDMEtyZDd2aXFjSm0xSlNvcHhERHB5UitzL2R0anJFbDdnM3gyS2JYWXFK?=
 =?utf-8?B?b1d2YUQwcytQZVlrN2MzS1VobHhBSFh5M3pOdkQ1RHAvSGF6bEFZamdNNTBv?=
 =?utf-8?B?TGdXTkJaRzY2T1BaVUpFVXU4MHB4YTZNWVF5RDkzbTQrWW5Ob2pNeGV6Q0l1?=
 =?utf-8?B?OUI0OXVabDN0QkZ0bWJJYkZLMUkybDhqdmt3c2RHTHlsdy9sZG1pU3dObDhm?=
 =?utf-8?B?VmJDenJiTEN5OUR5MC8ySVltaDRiQ29VdTVnZDhKUFQwZGVnRW5pN05hTEZR?=
 =?utf-8?B?ZW1NR2dHV0RFN09YODg4YVRaR2QvYjVaM1NmTm5iQi9BdFIxMENxbFVuZEs2?=
 =?utf-8?B?S0gwQzNIeFB6SkVXSHlKWTh2K2NVb29tWGkxSllmWjlQbWY4MVR6eUJkWWwx?=
 =?utf-8?B?eUlGVG5hSkpLYkVQTHpsTHRrZDJoR3doK3dMTXNnUnNaL2dRMDR1alVjZzZX?=
 =?utf-8?B?VHRRVTdBUWwxVlplY1J2SVpzeDhmTDJxVG15ZzdDa0VqdTd1dlppcnhnYktV?=
 =?utf-8?B?ZHZXNHFPcEUrcUgyTVpwc3NvQ1JUeHo1VVFQYndhMlQxK0dRck5TcFhMUjFw?=
 =?utf-8?B?OFVKRGhlcXlPZWY3S2t1M0ROL1hQaWd3YUVtN016QndESmxhR0ZGZWlwTkEx?=
 =?utf-8?B?VjhMVFJnOU1PdHRBMy9nOSthdEhIcExvYU1xajBDSTh4Wk5RdzUrWUNXL3hx?=
 =?utf-8?B?ZmNoanRRa0tTK3BpMDZUOVFMQitIbzdHTk4wRVJFelJ5NkJlVDFOZkM1NkNF?=
 =?utf-8?B?KzMvTXpXMXkzUFdMVUtwTGpPeCtUMXAvb042SUx1UUVCSUJISWljaW9sbTMv?=
 =?utf-8?B?MitpZDAxZmh0dGk0dkJBNHVhbDRjNVlSZFZIcXhUSm02bUptcG4vVWZ6QU9W?=
 =?utf-8?B?K3IrM2duTE85UmhnRHhUUHF1eG9GZVpINXgxRjA5YVltNERjeDBGWTZXdVMv?=
 =?utf-8?B?OW9BbmV6dkcycS9SMDI3VHQ0eHpGdnhaVnFXSVppaUJPTzRxZXpMVDBrYjZB?=
 =?utf-8?B?QmZHQy9neTY4MDNkU0MrQU1Xc0V3WEdxSi9RK2hyVzR2U2ZkSVg3NEE3QkJQ?=
 =?utf-8?B?M3N4eU9GSUZpbjB1dTlHT1Y3cVhGb2l4UHlRZ0taZWNsZm42UW5GcGVnRjNM?=
 =?utf-8?B?YXNrZUJoNUJBSUIwVEpTZ0x2QnJobnhKcDdaemlUNlp5eVo3ck14QnRhT1dz?=
 =?utf-8?Q?NlT1oMMZcUoiQ/J3VaQvDzY=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: d62357b3-bff3-4c62-775b-08d9fdc092b2
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 09:22:58.7134
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: CKFSUFFaf2g/EUi31DGOJT/xEcWbLAdMaL8xzroUKc4V+2qXyne7A+bq8T9O2xVlIqeGnaLTdOFqDWOiwhHxog==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA0PR03MB5449
X-OriginatorOrg: citrix.com

On Fri, Mar 04, 2022 at 10:17:22AM +0100, Jan Beulich wrote:
> On 04.03.2022 09:57, Roger Pau Monné wrote:
> > On Fri, Mar 04, 2022 at 08:49:39AM +0100, Jan Beulich wrote:
> >> This simply parallels .dtors. Both section types can reference
> >> .text.exit, which requires them to be discarded together with that one.
> >> Compilers, depending on their findings during the configure phase, may
> >> elect to use either model. While .{init,fini}_array look to be
> >> preferred, cross compilers apparently have this guessed, likely
> >> resulting in a fallback to .{c,d}tors. Hence we need to support both
> >> sets.
> > 
> > Do we also need to consider discarding .fini? Or that's guaranteed to
> > not be used by the compiler?
> 
> I'm not aware of it being used anymore; if it was used, we'd also need
> to deal with .init (which - logically, but not technically - would
> conflict with our own section of this same name in xen.efi).

We would realize if having the orphaned check (or like here would get
missing references.

Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 09:31:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 09:31:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284103.483249 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ4Hu-0005Mk-LE; Fri, 04 Mar 2022 09:31:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284103.483249; Fri, 04 Mar 2022 09:31:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ4Hu-0005Md-HJ; Fri, 04 Mar 2022 09:31:50 +0000
Received: by outflank-mailman (input) for mailman id 284103;
 Fri, 04 Mar 2022 09:31:48 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ZVQB=TP=citrix.com=prvs=055bc9087=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nQ4Hs-0005MX-Qw
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 09:31:48 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e83ad058-9b9d-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 10:31:46 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e83ad058-9b9d-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646386306;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=jifoNZv29ZUyfi+/fhy8//JPzu9WaOPYlLcB25hHUcA=;
  b=BEbAFVSuZP6ro+AVKcw7/ZVa84Qb8INTvA22yUtAPVfd6gMO7cZmXXIw
   ysZyAxZ6KI/ajIxHFf5VMRwMi5BXMY/bcAuP6rlUR+Ctxbo+ZtVrg13OT
   CDChcXQeNMMjVUXoZQWwwduzRvMR5AhyhYBZSn3GS3FgtNwMEFHMpygY2
   I=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65869201
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:sMnA36O/yABwGEjvrR2zl8FynXyQoLVcMsEvi/4bfWQNrUpw1WFTz
 mJODWvQOP2PN2WmKYx/bo2xoBgPvMODyd5hSQto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi2tIw2LBVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Z8
 IhSjMG/blsQZZbnovpNFEh+HyJsBPgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALNs7kMZlZonh95TrYEewnUdbIRKCiCdpwgmpg2JEURa+2i
 8wxSxxobTuaQSZ1FV4eBZF5xOCWv2LkfGgNwL6SjfVuuDWCpOBr65DyNPLFd9rMQt9a9m6Iq
 2SD82nnDxUyMN2E1SHD4n+qnvXIny7wRMQVDrLQ3vxgjUCXx2cTIAYLTlb9qv684nNSQPoGd
 RZSoHB36/Fvqgr7FbERQiFUvla84wElBtV3T9Rh0yq31PqTsiCVBXo9G2sphMMdiOc6Qjkj1
 1msltzvBCByvLD9dU9x5ot4vhvpZ3FLcDZqiTssCFJcvoK9+N1bYgfnE447eJNZmOEZDt0ZL
 9qiiCElz4segscQv0lQ1QCW2mn8znQlo+Nc2+k2Yo5Hxl4hDGJGT9bxgbQ+0RqmBNzDJrVml
 CJY8/VyFMhUUfmweNWlGY3h5o2B6fefKyH7ilVyBZQn/DnF0yf9Id4Lu2svfx83bp1sldrVj
 Kn741k5CHh7ZibCUEOKS9jpV5RCIVbIT7wJqcw4nvIRO8MsJWdrDQllZFKK3nCFraTfufpXB
 HtvSu71VSxyIf0+lFKeHr5BuZd2lnFW7T6CHvjTkkX4uYdykVbIEN/pxnPVNbtnhE5FyS2Im
 +ti2zyikE0OALWjOXCMqeb+7zkidBAGOHw/kOQOHsarKQt6AmAxTfjXxLIqYYt+mKpJ0OzP+
 xmAtoVwkjITWVWvxd22V01e
IronPort-HdrOrdr: A9a23:mGF1cKuvMIHzuLdDdQSw9v317skClIMji2hC6mlwRA09TyXGra
 +TdaUguSMc1gx9ZJhBo7G90KnpewK6yXdQ2/hqAV7EZniahILIFvAY0WKG+VPd8kLFh4xgPM
 tbAs1D4ZjLfCRHZKXBkXiF+rQbsaC6GcmT7I+0pRcdLj2CKZsQlzuRYjzrbHGeLzM2Y6bReq
 Dsgvau8FGbCAsqh4mAdzE4dtmGg+eOuIPtYBYACRJiwA6SjQmw4Lq/NxSDxB8RXx5G3L9nqA
 H+4kbEz5Tml8v+5g7X1mfV4ZgTsNz9yuFbDMjJrsQOMD3jhiuheYwkcbyfuzIepv2p9T8R4Z
 LxiiZlG/42x2Laf2mzrxeo8w780Aw243un8lOciWuLm72PeBsKT+56wa5JeBrQ7EQt+Ptm1r
 hQ4m6fv51LSTvdgSXU/bHzJl5Xv3vxhUBnvf8YjnRZX4dbQqRWt5Yj8ERcF4pFND7m6bogDP
 JlAKjnlbprmGuhHjHkV1RUsZyRtixZJGbEfqFCgL3Z79FupgE286NCr/Zv3Evp9/oGOu15Dq
 r/Q+FVfYp1P7wrhJJGdZc8qPSMex7wqDL3QRSvyAfcZeg600ykke+D3Fxy3pDvRKA1
X-IronPort-AV: E=Sophos;i="5.90,154,1643691600"; 
   d="scan'208";a="65869201"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=LtxZ8Jd2ZOr7m1aDZjmQlSwX2sWrV1Uy51Dob3CD4+yh1u4ahnWMQabadcydxUXgTQxHMY+17MDGXHxiVgEy5MEAmDyePmCu0L+lTXKzpzURStbHn91INDL6ICM9b+m4o/Ni5sUwdzdcSOreqBAM6ksdM3oWFjU89GBGnxm/2uz1pEHCPiyp44U3AbXPMEv2IgZrRMSI/ndEgToZVIl2viDelb3zIUMfdFXXH+23EwdvEUV3hbdIT6+JO/DNC3w3eRkj2Gl42UfSSpeDF8HOgkDOPD1AcinQQc8+mjFxd+CAHgU2at9bh4TUyueQL9PwZCPuj46RRCF/pgEOf2dnng==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=L8sXyyt3L3wZhfLq9d8zDwJ7p6dp2ouhmGJlKbKFa+M=;
 b=DS7G/9ojDp7zTPwgbqgNZpyOqfL5QiJ2/9spCNdg8LBI5zn6oOHP7pK4JheRvPvlHrwRJ+Z1niBS/FzuustUsoAIGMjtSgOXZmkcgeoXxNNAPlfQK85osKOB1e08gFbPCmloUjdpEXE1jBbZDPApw/QmmGtDocKSViX3GgcG1STyrd/wRtxnRVFXzajs+kBU2s/9wn8ER1AderHRi5oBkDlqC4zOlSOSNY4kIV7SjP0vqQrLYJdW5n5VjsCxvN6S1IKuRBKHtWxL4CTBuq+KBxPTTM6nRMVfGoesvueiGLmniMgF0h3sk9wjYYkN6S5tQ4T6UUUmFpiOHyK/M3WGvA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=L8sXyyt3L3wZhfLq9d8zDwJ7p6dp2ouhmGJlKbKFa+M=;
 b=IMOxWHHmJuMe2ZJUGxKj53cKYEwWJN9IpVXGQuby+4cQyMi/cGy8f/hxfWDP3qZz+GzcGyk6UnZdwjKzuvlcbNbo0tTyIUgWmioaqyK0KW9jiltF+AowJDciaei2Ybuk6AoFMe3NWzaTpSa9ETH4rOR/PtneaF6xm60NxKt0GjY=
Date: Fri, 4 Mar 2022 10:31:37 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Andrew
 Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH] x86/build: use --orphan-handling linker option if
 available
Message-ID: <YiHceSbi5SPim/4S@Air-de-Roger>
References: <5c374fd3-017d-3c40-4ded-25a3b1c978a6@suse.com>
 <YiCkUebvg0gaBm4/@Air-de-Roger>
 <3c335ca5-63e3-6389-cba5-b9047a4ce3b9@suse.com>
 <YiDaQY1ToO8G2QYd@Air-de-Roger>
 <abd691c8-9c7e-40d7-3f18-d96f826b8539@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <abd691c8-9c7e-40d7-3f18-d96f826b8539@suse.com>
X-ClientProxiedBy: FR0P281CA0083.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:1e::18) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 6ad54c06-a698-44e2-96fa-08d9fdc1c9e8
X-MS-TrafficTypeDiagnostic: DM6PR03MB4844:EE_
X-Microsoft-Antispam-PRVS: <DM6PR03MB4844840133A5B35EE89894898F059@DM6PR03MB4844.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: ckFuyQG90zcOCUkSbF6L2IyxHonNdlaOEu3faxlW5yRg42YLfISwarR5aVXy60IymvQ79XLvt2nhVMh4ukgTAb3KiejDtG2Me0RytxdGokUKCaUGxqzG0E+TyqD1WaYBtbVvNxYXq3q5UugvF7Cyqw21Zh1defPIaxFsIu4bxP9/UaxqiUVebJRC9/dGSqRIalifszRTWs7JXmO3sI4TZVNpf6YZshr3gqkDzXrpodVWfn16uoc3YG+F8z7KJolYosnQ/OhsEummt/xET9YZrCEu63MJ8Efgu0edd02RI2MHrqx9nMqOTpZmqIGPhFyQ4NxL7Uy8R28Eu7gnalbmKWsMZZwbZ+Kvl5dT/BeQBGD4c6SdCXuUsKNp9otaIKVJ4ry8IwDQxZbkVh8jnpq2k9mTMqLPMzJmzWcXqth/9mIit4el3PJH9h/Xk91YWRSnBCle3rLks1o4t4Ln0oi5tFat6MI21ffHjEVRcjVrKfS2HCm2u4Sf5dqOls1Eg3uia40dWKj9RqFWSSRB0aVAcOP9DIRHXgR6Sou2HxlD80+Ze3J/qTJR0hC44VK8mi2M+d42UzpwOBl8LdY7Jls+zqzqEy7zGQVMXAmYzAXySePkysp3FHzqt/Ky0+Wakbpbns43XOKydU9ViLX/yJr0wvwhlCR9zJPF3yuxZdeQbhdjJQXf7GRgfe1ZK33nTSSyRaHMDkLkXzpVLL8+BYl9YXrJ1j+bQd7qW5Mas5p6+LM=
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(966005)(6486002)(83380400001)(85182001)(54906003)(86362001)(6916009)(508600001)(33716001)(8936002)(186003)(26005)(5660300002)(316002)(6666004)(66476007)(66556008)(66946007)(4326008)(8676002)(38100700002)(9686003)(53546011)(6506007)(6512007)(82960400001)(2906002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?RWEwNE05UUZ4NUd0UVhkckk3amorQWdxYk9VMzAyenNOS1NXeHZ0REN4WTdS?=
 =?utf-8?B?TGpGSGx4M3V4aEpzdVYxV0pVWXhHNms2T1Jpc1dlTEZzMEIxOVBROXVYNkJk?=
 =?utf-8?B?L2lOWDlkYkV6cExZMlNYNEZ1M0h6VFVIb1VBck0vRENaMk5IZzJ0SHo5akFo?=
 =?utf-8?B?UVpKY2RWWUVIcUtsSGJlRnp4WS9CamlmY1dtbHF6Zk1ka3RabElDem5IL1Zp?=
 =?utf-8?B?RzNvR2pzRjZIamZveEF2SHIvZk1XZ0RJcmpxMzNGSkxBNVVVck1ETHpaY1Zs?=
 =?utf-8?B?K0syTHBXRGdYUDZoUXVhR2NXTm5QYXlYSEUwQXptVmNLOG5paFE3VHZPeEE3?=
 =?utf-8?B?T1E3dTlETXFZaTk0Y3RucFkweHBzei9GejF3VTdUOHdzZDJDS0ZaTm44RnR1?=
 =?utf-8?B?SUh6VXIwZERtOTYwR3FQTUt6MWNUYkJFd25GMy9EZXB2aUJ0elc3OFllZm1s?=
 =?utf-8?B?ZnErZE5DRmFmVUR5RkNxR1dyQlpRTElBRnZpcEx1ejhoblR0RklIZkh1eUVV?=
 =?utf-8?B?bVhEMVJTeXlBemQ1aWpQL0JzMy9zRUpCaEtVcCtKYmVQeDY2SUpHVFY0azJi?=
 =?utf-8?B?SXFacTJNYXJxMWtYZ2lITFllRU04QTFGWVlBTzdRbStvb2w0NmxqQ3NDWC9O?=
 =?utf-8?B?ak1HcGRoUHhNL2dOd1hmajFhWmRrRmc1UlFCQllqNUZEWnpPbkpvZnNpZTBP?=
 =?utf-8?B?NzZ1SEpsRHpzYnR1cmdZaHFiYjUzUlJFbExlYm1PRnJQUktZbUZxRGFSditx?=
 =?utf-8?B?WTRkQk9EN281NjJ0a0h4MEZTa3ZxL2kraFpicTVZYWR6bFdrR2JmQ0hjQUJ1?=
 =?utf-8?B?bUxYbTk4TWlRSWtFZXNwNXcxWVZTQ3RORENsNXBEdDk2RjkrekFZa04zdmNT?=
 =?utf-8?B?TU5WVDNsTHJtK2U4MFdVbHliTlUxbXRhRTBrd0ZkNHJzZ2I4cmMxSWlxbzRu?=
 =?utf-8?B?dWkwczJKZDBkd0lNRTZVTGt5ZW41NnFyWFZPWDVZZ1ByYW5CWllRWmhNUDJo?=
 =?utf-8?B?ZTJMSFZBUVVGeHU1OEUxM0Rwa0xGdUd4bFhmbnB2M3Q2SCtXTWI4VWFEV3Nk?=
 =?utf-8?B?R3JYVzlmSlZZQUEzbjFCcUpTbk9VYUZtZE8zb212Rm9YOFhpeko1a01KbmZQ?=
 =?utf-8?B?VmFvNU44dXdJaUVqazVxYitiSDBLRzRic25tZjBOdnBzVW1POHNZRHBzRDZr?=
 =?utf-8?B?MXdDNWQ2TGJqa2JGbFVwMGRTZXV1bFBJMVE4YnNIbzNvRGpqWVl3SnJ6QnVN?=
 =?utf-8?B?aVZjdXdjWmo3QmtlUmJEQW1yOFNiZjVyaGhlUjNRdnhYMVZDVThFaHY5bE9Q?=
 =?utf-8?B?TXRSMVhyTkdNendVdEtKSDVpTHJLMWVmZ3V0WHNUK3NSVTJOelc3Q1g0YXBG?=
 =?utf-8?B?aGNKT25DWEZtOE5xdjBkOGZpQWd0WFhqY1RHSUJCVFI0UW8zWVM2cFBsdDNp?=
 =?utf-8?B?VTlSTE1TTVNUblVsTHZnL1ZuaXA2Z0Nhd3pua2l3SmJ6eW01dnlKWmdpNDM1?=
 =?utf-8?B?Qnhnc2NOYXMyT2psUW5iTDMwRGt1TFB3VjZTb29aN2t0ZXUwdFdjVXFjM3pT?=
 =?utf-8?B?aHlHZ1NQWFExd0NSRm5lWkphbERzNmIyQ1dtNll2RHFiOGtRUHcwZU9DT25X?=
 =?utf-8?B?dFBYZ08rL3hBUFRVaTdJQUdaNDVHYnpYSlZyZG1VNGUrQlV3cmlrTWlJaVZm?=
 =?utf-8?B?QjNsUWhQU1piLzBWWm44TU5mUytuanZneG5zQS9MSnZzYlcvdXBVU0kvOHpx?=
 =?utf-8?B?Rnc1aVYwYVdmOC80eGg4M1g5aG5OSHNXczJZK0NxcVdFN2FhcjA3OWJyd01o?=
 =?utf-8?B?UVl2SlpVRjZDMkJPbFE1dWVnQ3czSTNHTUZsbVJQRTRiejFVQklmWExWQmJt?=
 =?utf-8?B?MGVNT1llRUlSUStOQ1pySU9Iei90NW5pTXZaYmdpQ3lGMmVKQ3pzTWlRckFW?=
 =?utf-8?B?djJRK0pIZzFWT01uZkF4YmZ1QTNpUlh5WkFycUxBQ2ZZdVR2STlSd24wUk91?=
 =?utf-8?B?N3RHMlBGS2lmR3ZjSlVSOHk3TWxIRXhLZUVxLzMyZEhtSE5yaVc1SVdGK2tY?=
 =?utf-8?B?Z1owZ3Vwd0dlQzR0a21BSXhWUDZIZ0h4cWZwbzZ3MjgzR1ZncXJsTXdVMFVw?=
 =?utf-8?B?alIvek1VRzA1N1FYb0lTSHl2eWRyMWRsdVdwRWN3YVlsOXBSZEh0S1dsS3Rj?=
 =?utf-8?Q?FE7MpxFO855D+/uoaf4vhI4=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 6ad54c06-a698-44e2-96fa-08d9fdc1c9e8
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 09:31:40.8552
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: leSjykit0I66LUwBkndoOiyG9PFbcceqV8K2+TKoWqv4WEOAX5e27TIYDARt9i2SvtSsQy3Uqa+f8JzzF2Y3fg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR03MB4844
X-OriginatorOrg: citrix.com

On Fri, Mar 04, 2022 at 09:02:08AM +0100, Jan Beulich wrote:
> On 03.03.2022 16:09, Roger Pau Monné wrote:
> > On Thu, Mar 03, 2022 at 01:17:03PM +0100, Jan Beulich wrote:
> >> On 03.03.2022 12:19, Roger Pau Monné wrote:
> >>> On Wed, Mar 02, 2022 at 03:19:35PM +0100, Jan Beulich wrote:
> >>>> As was e.g. making necessary 4b7fd8153ddf ("x86: fold sections in final
> >>>> binaries"), arbitrary sections appearing without our linker script
> >>>> placing them explicitly can be a problem. Have the linker make us aware
> >>>> of such sections, so we would know that the script needs adjusting.
> >>>>
> >>>> To deal with the resulting warnings:
> >>>> - Retain .note.* explicitly for ELF, and discard all of them (except the
> >>>>   earlier consumed .note.gnu.build-id) for PE/COFF.
> >>>> - Have explicit statements for .got, .plt, and alike and add assertions
> >>>>   that they're empty. No output sections will be created for these as
> >>>>   long as they remain empty (or else the assertions would cause early
> >>>>   failure anyway).
> >>>> - Collect all .rela.* into a single section, with again an assertion
> >>>>   added for the resulting section to be empty.
> >>>> - Extend the enumerating of .debug_* to ELF. Note that for Clang adding
> >>>>   of .debug_macinfo is necessary. Amend this by its Dwarf5 counterpart,
> >>>>   .debug_macro, then as well (albeit more may need adding for full
> >>>>   coverage).
> >>>>
> >>>> Suggested-by: Roger Pau Monné <roger.pau@citrix.com>
> >>>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
> >>>> ---
> >>>> I would have wanted to make this generic (by putting it in
> >>>> xen/Makefile), but the option cannot be added to LDFLAGS, or else
> >>>> there'll be a flood of warnings with $(LD) -r. (Besides, adding to
> >>>> LDFLAGS would mean use of the option on every linker pass rather than
> >>>> just the last one.)
> >>>>
> >>>> Retaining of .note in xen-syms is under question. Plus if we want to
> >>>> retain all notes, the question is whether they wouldn't better go into
> >>>> .init.rodata. But .note.gnu.build-id shouldn't move there, and when
> >>>> notes are discontiguous all intermediate space will also be assigned to
> >>>> the NOTE segment, thus making the contents useless for tools going just
> >>>> by program headers.
> >>>>
> >>>> Newer Clang may require yet more .debug_* to be added. I've only played
> >>>> with versions 5 and 7 so far.
> >>>>
> >>>> Unless we would finally drop all mentioning of Stabs sections, we may
> >>>> want to extend to there what is done for Dwarf here (allowing the EFI
> >>>> conditional around the section to also go away).
> >>>>
> >>>> See also https://sourceware.org/pipermail/binutils/2022-March/119922.html.
> >>>
> >>> LLD 13.0.0 also warns about:
> >>>
> >>> ld: warning: <internal>:(.symtab) is being placed in '.symtab'
> >>> ld: warning: <internal>:(.shstrtab) is being placed in '.shstrtab'
> >>> ld: warning: <internal>:(.strtab) is being placed in '.strtab'
> >>>
> >>> So seeing your mail where you mention GNU ld not needing those, I
> >>> think we would need to add them anyway for LLVM ld.
> >>
> >> Hmm, that's ugly. How do I recognize LLVM ld? I can't simply use a
> >> pre-processor conditional keying off of __clang__, as that used as the
> >> compiler doesn't mean their ld is also in use (typically the case on
> >> Linux).
> > 
> > Hard to tell, `ld -v` for LLD will typically contain '^LLD' I think,
> > but I don't really like matching on human readable output like this.
> 
> Same here. But Linux'es ld-version.sh looks to be doing just that.
> 
> >> I also don't want to add these uniformly, for now knowing what
> >> side effects their mentioning might have with GNU ld.
> > 
> > Wouldn't it be fine to just place them at the end, just like it's
> > done by default by ld?
> > 
> > Are you worried about not getting the proper type if mentioned in the
> > linker script?
> 
> I'm worried of about any kind of anomaly that could be caused by
> mentioning sections which a linker doesn't expect to be named in
> a script. That's hardly something they would even test their
> linkers against.

Just realized, in arch/x86/boot/build32.lds we already explicitly
handle .symtab, .shstrtab and .strtab for LLD, it was added by commit
10d27b48b5b in order to prevent LLD from complaining about discarding
those sections. So it should be safe to also do this handling in the
general linker script?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 09:32:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 09:32:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284104.483260 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ4I3-0005gI-TF; Fri, 04 Mar 2022 09:31:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284104.483260; Fri, 04 Mar 2022 09:31:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ4I3-0005gB-Pl; Fri, 04 Mar 2022 09:31:59 +0000
Received: by outflank-mailman (input) for mailman id 284104;
 Fri, 04 Mar 2022 09:31:59 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQ4I3-0005ft-85; Fri, 04 Mar 2022 09:31:59 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQ4I3-0006fa-6O; Fri, 04 Mar 2022 09:31:59 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQ4I2-0006w4-O1; Fri, 04 Mar 2022 09:31:58 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQ4I2-0000oM-NX; Fri, 04 Mar 2022 09:31:58 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=2HZLfKkCOydkw8k+Gmjrm52brh4J/rb2WuojN9odURw=; b=FFs+bNVTRJNM6JBUR9b0xO3dY2
	IH1nSiU0vHJf+cAuL8jtCApn3HOwQ6HuXEKd6VMmJE5EloQoUun4913brhtkMcK/t6Qw7P5NO7pRo
	9RnEIgPZiJVsWGIfvQ/hpBU7pbDV/oq3rPakwVwSkPq2rISzD1pTkg9wfLW6+Zqx1+UE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168395-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168395: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=b83d0a6438f24ba3c6234d9b7593be6f2246ec1e
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 04 Mar 2022 09:31:58 +0000

flight 168395 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168395/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 b83d0a6438f24ba3c6234d9b7593be6f2246ec1e
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    3 days
Failing since        168258  2022-03-01 01:55:31 Z    3 days   31 attempts
Testing same since   168392  2022-03-04 04:10:32 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 327 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 09:46:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 09:46:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284121.483271 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ4W1-0007vO-9U; Fri, 04 Mar 2022 09:46:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284121.483271; Fri, 04 Mar 2022 09:46:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ4W1-0007vH-4Y; Fri, 04 Mar 2022 09:46:25 +0000
Received: by outflank-mailman (input) for mailman id 284121;
 Fri, 04 Mar 2022 09:46:24 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=LpR9=TP=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nQ4W0-0007vB-EJ
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 09:46:24 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f3a32ca6-9b9f-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 10:46:23 +0100 (CET)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur01lp2058.outbound.protection.outlook.com [104.47.2.58]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-26-squpeonWMbGQNI437T58Xg-1; Fri, 04 Mar 2022 10:46:22 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM5PR04MB3281.eurprd04.prod.outlook.com (2603:10a6:206:f::14) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Fri, 4 Mar
 2022 09:46:20 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.017; Fri, 4 Mar 2022
 09:46:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f3a32ca6-9b9f-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646387183;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=9oSHPoawc72BXb2ZOw22OcfjtJnd5eyq7T0i6qwUdhU=;
	b=bsqtS5+E2aiUQ6FAKreKfW5EaXMYi6Wi3k5OeU/EfGlGNug9KrttbTJj0cRKchQXE5jHdu
	36clOLiKg6fHTAtFPaRi4i9BbL9vk5HcRXHMwPe3KpiNohcxd8eEklVTPVKNdFOnxFTBYr
	qoIN/x4UcSCyR7MQap1EfrL3gdvZiV4=
X-MC-Unique: squpeonWMbGQNI437T58Xg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=jy2yWJtUhnvfBpL521Mx7dMQ/KZz7IDomS0yx6KE4Xm4nxXG+fsd2OByzzCMEjYbKU93HgU1qki9fxpVz6GWaSJvvUNxB0gjRD3Er0HMoM6CFTD2pxSgYPDk6jGuPtTW7QTE1PRKTDvR5LAMLC6zf9DSN6N6WRgEjaGI+G2xqeFt5IUcrghEMkyxH7RyfyLXizTzDBy0xaYflCnzU2m05SuzhkHu5aoI0qKJ2gnPxKVL9vjn803m5xmo16vNkK567PeUU+lWbjrtwKAP1n90DCGQFi5xQSpbhhDaiYgxPGM2tttOeUkb1BHgUPe850Lnh65G3PI8w0cQXoIPgobowg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=I4wCX8Yi6MLEgQvA1tVPPT2clhigiZoNTvtJw7rYau8=;
 b=gecbx3yyABGOP3SxqKE8W74nzCOaonUeZrv1stn/nVrz8OMwhvrh+iB6LWleO1nKUrJU8/yG3Pz/r03dTJQTEelQj2BWBex+r09UKYIX3mruRyCxw4n9RhGuDNVzDDp/OGgtIo+8eK+WWTB4yzufrwd+xg9gZVoQ401PINhfSF37qKiN5zeaIlM1v6Fu0JDsRV6CQ8uOIOMlyKr4oD9dMy2fDUq6pqxbldRwTiJVf5c0JKEygVT8A82r8P2dG264JMwIZZef69WqYy5XTL1+MQytKk6lr7w58ZpVhWTImnW6HIBjNsPaCOeFwwTPlpZLXxvV0HYPS5NDd9BzjZAb6A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <e658c56c-5849-5c89-2d98-e617e42869b9@suse.com>
Date: Fri, 4 Mar 2022 10:46:19 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] x86/build: use --orphan-handling linker option if
 available
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
References: <5c374fd3-017d-3c40-4ded-25a3b1c978a6@suse.com>
 <YiCkUebvg0gaBm4/@Air-de-Roger>
 <3c335ca5-63e3-6389-cba5-b9047a4ce3b9@suse.com>
 <YiDaQY1ToO8G2QYd@Air-de-Roger>
 <abd691c8-9c7e-40d7-3f18-d96f826b8539@suse.com>
 <YiHceSbi5SPim/4S@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YiHceSbi5SPim/4S@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6P192CA0067.EURP192.PROD.OUTLOOK.COM
 (2603:10a6:209:82::44) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c9ef1bbf-3b24-4069-5da7-08d9fdc3d640
X-MS-TrafficTypeDiagnostic: AM5PR04MB3281:EE_
X-Microsoft-Antispam-PRVS:
	<AM5PR04MB3281F7CCDFF978E537EE93FCB3059@AM5PR04MB3281.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	+8KoGdR3DtlqjdcgHm1MZkGYIBHDIk0DyoM/JEtFufMLAMj6C9pox6zx4xsmzuGuyZYZyPpD2baAMLc3DKH1HOHGN5IlfasngElu5lyH5EtaV8jJQPHWEx9/DvlY3BqdEMG9Q7PYVjXX5pPA/AURYNuEK1zrb45bZe1GHLfcYdXEKXSHtJLPSrVPvnTvQr8xPxCuj29WhK3aKJ+7+abhP1fot44cU/DamPAPo1n3D0YHBvNG+rmjbH6ke/V+dOebcW0klbFqzmESHeePtsuOyzRqEHeeMOL7pcza0Xkht0mx0ACqw8R4ZhoqX5E42YdLvl6FAnFuPDFdoW8Cj019kmcMH/XagPgoywzaV4Cb6dQcswScVc7AYvXXH6JGHjTXFbZMfzUVsTgSmIywbKFU/wAzA3/VBipo5lD0Xr4emUjHtHCd/zSpulDLGL08fI2DwxQhyd1YqXJ3yTgjjTsbrmd/UbAD4RgcWpO+8wMTy4JIIAzA6+NyneFdUcyEOXAnDVDlJHmocWjx93+YkXo216kW3cn/0JWFU8+wL/3FVtppeutPId/t53NLzaatE24CwedqtX8/nNw9qMppjAOeF9G0sGe8A2sDWcZXOlQkJYWsMrlJQM4UFE+7v0xm30FQVwreGVUiedb5Oi84vuaT42h7Sx572jP2TtZjI3ZwhjPDCVQv9s410PcCBgTE93iAp2Q+wePmEvBtP0tPd43b9L6D2Cykexz5NqZcMEdlvMzuT2GNoKu2fIPLnjXt9H5w0cQaldRTcb8tREqmnv//4eA2YgpqTb3s8m1AmKBIkKnQ8dBBIREtn0LwMCemM7zXVWApsg74G9EW+g9guMZp+w==
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6916009)(53546011)(2616005)(2906002)(6512007)(54906003)(316002)(31686004)(8936002)(38100700002)(6486002)(31696002)(966005)(508600001)(66946007)(6506007)(66556008)(66476007)(36756003)(5660300002)(186003)(26005)(8676002)(4326008)(83380400001)(86362001)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?CoaLugokQHQEeZgfm8Sg0Z1ff7MSiwvP7Tqn2DgOzxnWok+brfqw/jgoh+8J?=
 =?us-ascii?Q?GXDYI3dhzAdIwyVFYGPNQMagKXFdHewLs9bq9v0vkbPqonTiLLsae4CReXIK?=
 =?us-ascii?Q?DvfAMwQDE28FWSHFCsol7VMEu2/pxi5cwlUfjupDYBuO8ErKoW/Qk2TeYuG9?=
 =?us-ascii?Q?2wJIEDaNYuI1NSH9wpalYOirTRHGY5XY+44VUHHRKqqh5UbNMAuqij+Pgo0S?=
 =?us-ascii?Q?LCN9bVowANKjR+dwHHoCqJd/JIbf8G6lw5iOxJRaDmIzfvTorH6ZkRX5/3jv?=
 =?us-ascii?Q?CrKGEZGmnmGX38EcmrAiD4uNvtqmI6+FpFJCI3n+3yrnXTGsTjbfbti3fvlx?=
 =?us-ascii?Q?7GTXWZeBgS28n7ec5Nj6FQ9KieIk/VvmvHfYs5hvOu5BIlvrlGdKOgK768mv?=
 =?us-ascii?Q?slIO7IK6fCnuuLftReNSiJnEIzOxseunTIaGJFImtNEQPo+y/adm6vAAwCyK?=
 =?us-ascii?Q?cOLtmX2VFsM2KILWx6e05/tx15VnQrO0VHS3YYsnhdtKbHzBl4wGMPfzEu/g?=
 =?us-ascii?Q?R7hn8shWUMMWH/YHLsmOxeyiTSQsSX5J8/jLuzubu7Sz7NLauqzOanM+CD+T?=
 =?us-ascii?Q?8jQYaN+EOqT382CT/fbWvmdaOo387q7HbMA//gZ/fO6Lpl9JgD6y/5X/A2hw?=
 =?us-ascii?Q?JNn/1sizdySsW1usldUKaUXy8I2dK3Xl++yx/YtWV/Zz7dnFUI7zISzv6717?=
 =?us-ascii?Q?LPXZRXwALswqZ58pbJS8bavchF9//3GQFn3RBrdVSgq+49rwd2/Zwptvbtbx?=
 =?us-ascii?Q?SeYOlm0l+LOIFFvF3gYE28zm2cfNMgZEPq9p3XPeW4TjZ8N/LDaDgM/BEHM5?=
 =?us-ascii?Q?P6dhXpTWiom3NUNx/Z/ijqXc7cVwv/EF5HL+QvYL6sdEYnZpTUoBach0LB8+?=
 =?us-ascii?Q?t34AQJgEDSUvtyQNetxR6LYgO0d/tycDBpR4tFXdYIHIUfRlSUCF/S7jfGw8?=
 =?us-ascii?Q?QsPSCQd+bD7N20zvEcuWHFJkA9eCHfO2MdjuCaKT7V/gsGxnp0InPXgRFIMd?=
 =?us-ascii?Q?1vo3d2fEkix/+MtJ2e6+W/wrNSN5j3nDjwmp4GFp+hs4sSoK7zSMCFWyaf0X?=
 =?us-ascii?Q?0stSWILWQWJfshrADtLDTVKMdMBvhJYpSwelAggOM7NwQoxHjGEwj/57kQC/?=
 =?us-ascii?Q?DP35UZ9rWNiWbp4JqmSHa0DGCiO+NG50WUyTPefYXZz/PNI/iQAGH6ZcGheB?=
 =?us-ascii?Q?NrlnJkKQsTkHsnJAB9I6mIBTZnBiBNAhb+zyclC7iTYxftT+AjLOeFAvKlm3?=
 =?us-ascii?Q?J027caPABJZgoOCJoO88Sv2BYJRc1TWiQjTnAMb97Xrm3WE462rR531yQvIF?=
 =?us-ascii?Q?xUcNXVd5hJ/uX+V00n0j0Csnm6hPBN9vLdUWvGWAz1M2Wih7pYFg0PdTZr8U?=
 =?us-ascii?Q?XgedyhblSG99dsQgopN7x5GrQBYcuS1TZ3nAt0iwLfzGEdqLFekruA2sx9U0?=
 =?us-ascii?Q?yrqm3+IXMF2mTlvC2pKYERhW2Gw1BH1gfKzJdyqd9SsWDKF1mx4YsAhTmCDz?=
 =?us-ascii?Q?44KTeolVLpRdt0c6cQZpkqEJZhb+dtn7wS/QBctzPbSD6VgiZ01S2R6hAFkA?=
 =?us-ascii?Q?hovCHpRC+7YjCr6NcW8M92I+6i99u/XMMcsdbdLaUgE/2ZgYRKqApSSbspJV?=
 =?us-ascii?Q?DG06JLFp8/gz1O5ofEErd8Y=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c9ef1bbf-3b24-4069-5da7-08d9fdc3d640
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 09:46:20.6034
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: +LegwGJWXkbcP7pGyJvxs9+qzIV3dYHdoK06ytWRfcrIVWOCxO7Poi9111WMnnkG9xBpvOZXC6DzGgdqz3m6RA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR04MB3281

On 04.03.2022 10:31, Roger Pau Monn=C3=A9 wrote:
> On Fri, Mar 04, 2022 at 09:02:08AM +0100, Jan Beulich wrote:
>> On 03.03.2022 16:09, Roger Pau Monn=C3=A9 wrote:
>>> On Thu, Mar 03, 2022 at 01:17:03PM +0100, Jan Beulich wrote:
>>>> On 03.03.2022 12:19, Roger Pau Monn=C3=A9 wrote:
>>>>> On Wed, Mar 02, 2022 at 03:19:35PM +0100, Jan Beulich wrote:
>>>>>> As was e.g. making necessary 4b7fd8153ddf ("x86: fold sections in fi=
nal
>>>>>> binaries"), arbitrary sections appearing without our linker script
>>>>>> placing them explicitly can be a problem. Have the linker make us aw=
are
>>>>>> of such sections, so we would know that the script needs adjusting.
>>>>>>
>>>>>> To deal with the resulting warnings:
>>>>>> - Retain .note.* explicitly for ELF, and discard all of them (except=
 the
>>>>>>   earlier consumed .note.gnu.build-id) for PE/COFF.
>>>>>> - Have explicit statements for .got, .plt, and alike and add asserti=
ons
>>>>>>   that they're empty. No output sections will be created for these a=
s
>>>>>>   long as they remain empty (or else the assertions would cause earl=
y
>>>>>>   failure anyway).
>>>>>> - Collect all .rela.* into a single section, with again an assertion
>>>>>>   added for the resulting section to be empty.
>>>>>> - Extend the enumerating of .debug_* to ELF. Note that for Clang add=
ing
>>>>>>   of .debug_macinfo is necessary. Amend this by its Dwarf5 counterpa=
rt,
>>>>>>   .debug_macro, then as well (albeit more may need adding for full
>>>>>>   coverage).
>>>>>>
>>>>>> Suggested-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>
>>>>>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>>>>>> ---
>>>>>> I would have wanted to make this generic (by putting it in
>>>>>> xen/Makefile), but the option cannot be added to LDFLAGS, or else
>>>>>> there'll be a flood of warnings with $(LD) -r. (Besides, adding to
>>>>>> LDFLAGS would mean use of the option on every linker pass rather tha=
n
>>>>>> just the last one.)
>>>>>>
>>>>>> Retaining of .note in xen-syms is under question. Plus if we want to
>>>>>> retain all notes, the question is whether they wouldn't better go in=
to
>>>>>> .init.rodata. But .note.gnu.build-id shouldn't move there, and when
>>>>>> notes are discontiguous all intermediate space will also be assigned=
 to
>>>>>> the NOTE segment, thus making the contents useless for tools going j=
ust
>>>>>> by program headers.
>>>>>>
>>>>>> Newer Clang may require yet more .debug_* to be added. I've only pla=
yed
>>>>>> with versions 5 and 7 so far.
>>>>>>
>>>>>> Unless we would finally drop all mentioning of Stabs sections, we ma=
y
>>>>>> want to extend to there what is done for Dwarf here (allowing the EF=
I
>>>>>> conditional around the section to also go away).
>>>>>>
>>>>>> See also https://sourceware.org/pipermail/binutils/2022-March/119922=
.html.
>>>>>
>>>>> LLD 13.0.0 also warns about:
>>>>>
>>>>> ld: warning: <internal>:(.symtab) is being placed in '.symtab'
>>>>> ld: warning: <internal>:(.shstrtab) is being placed in '.shstrtab'
>>>>> ld: warning: <internal>:(.strtab) is being placed in '.strtab'
>>>>>
>>>>> So seeing your mail where you mention GNU ld not needing those, I
>>>>> think we would need to add them anyway for LLVM ld.
>>>>
>>>> Hmm, that's ugly. How do I recognize LLVM ld? I can't simply use a
>>>> pre-processor conditional keying off of __clang__, as that used as the
>>>> compiler doesn't mean their ld is also in use (typically the case on
>>>> Linux).
>>>
>>> Hard to tell, `ld -v` for LLD will typically contain '^LLD' I think,
>>> but I don't really like matching on human readable output like this.
>>
>> Same here. But Linux'es ld-version.sh looks to be doing just that.
>>
>>>> I also don't want to add these uniformly, for now knowing what
>>>> side effects their mentioning might have with GNU ld.
>>>
>>> Wouldn't it be fine to just place them at the end, just like it's
>>> done by default by ld?
>>>
>>> Are you worried about not getting the proper type if mentioned in the
>>> linker script?
>>
>> I'm worried of about any kind of anomaly that could be caused by
>> mentioning sections which a linker doesn't expect to be named in
>> a script. That's hardly something they would even test their
>> linkers against.
>=20
> Just realized, in arch/x86/boot/build32.lds we already explicitly
> handle .symtab, .shstrtab and .strtab for LLD, it was added by commit
> 10d27b48b5b in order to prevent LLD from complaining about discarding
> those sections. So it should be safe to also do this handling in the
> general linker script?

I wouldn't want to infer such. What build32.lds is used for is very
simple input. It's a hint at best that it might be okay to use even
with GNU ld.

Jan



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 10:01:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 10:01:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284138.483310 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ4kY-0002RE-44; Fri, 04 Mar 2022 10:01:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284138.483310; Fri, 04 Mar 2022 10:01:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ4kX-0002R7-Ug; Fri, 04 Mar 2022 10:01:25 +0000
Received: by outflank-mailman (input) for mailman id 284138;
 Fri, 04 Mar 2022 10:01:24 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQ4kW-0002Qx-6d; Fri, 04 Mar 2022 10:01:24 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQ4kW-0007IS-4N; Fri, 04 Mar 2022 10:01:24 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQ4kV-0008Jg-Sb; Fri, 04 Mar 2022 10:01:23 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQ4kV-0007ZT-Rz; Fri, 04 Mar 2022 10:01:23 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Oe3C3XnZmYiG6IIg0pBB4UPrx4uK4000c9qaFYuS5Jg=; b=Gagbc74cwN/izLFKY9y1JQGWts
	NGHy5SeiEwI4L3UHtlNKgPJrUcOmieFNXuz7+abO0c8NCdkJ3a45wTrgt6fRl6wnpWUk+RXopscSm
	EyOXFU/3hJx7di79X5T+BVD+bI5472/uEkN/GSycpCXmYUuKngcc+byMTlumo5p1wIdE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168388-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168388: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=b692523fafb39f5f930e1e8a316f7b8cebc9f62a
X-Osstest-Versions-That:
    xen=faecea18d252f97c6ad41f0f457566ff2c125b8d
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 04 Mar 2022 10:01:23 +0000

flight 168388 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168388/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168328
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168328
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168328
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168328
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168328
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168328
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168328
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168328
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168328
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168328
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168328
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168328
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  b692523fafb39f5f930e1e8a316f7b8cebc9f62a
baseline version:
 xen                  faecea18d252f97c6ad41f0f457566ff2c125b8d

Last test of basis   168328  2022-03-02 08:41:59 Z    2 days
Failing since        168349  2022-03-02 21:07:18 Z    1 days    3 attempts
Testing same since   168388  2022-03-04 01:37:03 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Jan Beulich <jbeulich@suse.com>
  Juergen Gross <jgross@suse.com>
  Julien Grall <jgrall@amazon.com>
  Michal Orzel <michal.orzel@arm.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   faecea18d2..b692523faf  b692523fafb39f5f930e1e8a316f7b8cebc9f62a -> master


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 10:29:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 10:29:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284151.483329 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ5BF-0005gB-JE; Fri, 04 Mar 2022 10:29:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284151.483329; Fri, 04 Mar 2022 10:29:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ5BF-0005g4-G6; Fri, 04 Mar 2022 10:29:01 +0000
Received: by outflank-mailman (input) for mailman id 284151;
 Fri, 04 Mar 2022 10:29:00 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nQ5BE-0005fy-HJ
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 10:29:00 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nQ5BD-0007jz-SL; Fri, 04 Mar 2022 10:28:59 +0000
Received: from [54.239.6.187] (helo=[192.168.25.28])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nQ5BD-0004jP-LB; Fri, 04 Mar 2022 10:28:59 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=g2tV0PRGymFXbypaqKS4sgHZ2GxeiwIPRGRA0O8a4AU=; b=SgM1bYyjowl9dR+nmCUX38fxHM
	WIp0rm9ff1Xcti+SugAyp9r0ZqeI3Ma9+Fl3nrppPqsTFT7wKzrctZFD9uBDtu4OSuuVttJQbyGli
	Dwpw+FWouLRKbk/lW4djbSkzftaPa1HhJ93I0OrTsHuSFqniyBRSHcyW2B44BlErNBP4=;
Message-ID: <d41241f9-de9d-e681-2768-d44531722069@xen.org>
Date: Fri, 4 Mar 2022 10:28:56 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [XEN v9 2/4] xen/arm64: io: Support instructions (for which ISS
 is not valid) on emulated MMIO region using MMIO/ioreq handler
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>,
 xen-devel@lists.xenproject.org
Cc: sstabellini@kernel.org, stefanos@xilinx.com, Volodymyr_Babchuk@epam.com,
 bertrand.marquis@arm.com, andrew.cooper3@citrix.com,
 george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org,
 roger.pau@citrix.com, Ayan Kumar Halder <ayankuma@xilinx.com>
References: <20220301124022.10168-1-ayankuma@xilinx.com>
 <20220301124022.10168-3-ayankuma@xilinx.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220301124022.10168-3-ayankuma@xilinx.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Ayan,

On 01/03/2022 12:40, Ayan Kumar Halder wrote:
> +void post_increment_register(const struct instr_details *instr)
> +{
> +    struct cpu_user_regs *regs = guest_cpu_user_regs();
> +    register_t val = 0;
> +
> +    /* Currently, we handle only ldr/str post indexing instructions */
> +    if ( instr->state != INSTR_LDR_STR_POSTINDEXING )
> +        return;
> +
> +    /*
> +     * Handle when rn = SP
> +     * Refer ArmV8 ARM DDI 0487G.b, Page - D1-2463 "Stack pointer register
> +     * selection"
> +     * t = SP_EL0
> +     * h = SP_ELx
> +     * and M[3:0] (Page - C5-474 "When exception taken from AArch64 state:")
> +     */
> +    if (instr->rn == 31 )
> +    {
> +        if ( (regs->cpsr & PSR_MODE_MASK) == PSR_MODE_EL1h )
> +            val = regs->sp_el1;
> +        else if ( ((regs->cpsr & PSR_MODE_MASK) == PSR_MODE_EL1t) ||
> +                    ((regs->cpsr & PSR_MODE_MASK) == PSR_MODE_EL0t) )

You are using 3 times regs->cpsr & PSR_MODE_MASK. Can you introduce a 
temporary variable?

Alternatively, a switch could be used here.

[...]

> diff --git a/xen/arch/arm/include/asm/mmio.h b/xen/arch/arm/include/asm/mmio.h
> index 3354d9c635..ef2c57a2d5 100644
> --- a/xen/arch/arm/include/asm/mmio.h
> +++ b/xen/arch/arm/include/asm/mmio.h
> @@ -26,12 +26,24 @@
>   
>   #define MAX_IO_HANDLER  16
>   
> +enum instr_decode_state
> +{
> +    INSTR_ERROR,                    /* Error encountered while decoding instr */
> +    INSTR_VALID,                    /* ISS is valid, so no need to decode */
> +    /*
> +     * Instruction is decoded successfully. It is a ldr/str post indexing
> +     * instruction.
> +     */
> +    INSTR_LDR_STR_POSTINDEXING

NIT: Please add ',' even for the last item. This would reduce the diff 
if we add new one.

> +};
> +
>   typedef struct
>   {
>       struct hsr_dabt dabt;
>       struct instr_details {
>           unsigned long rn:5;
>           signed int imm9:9;
> +        enum instr_decode_state state;
>       } dabt_instr;
>       paddr_t gpa;
>   } mmio_info_t;
> @@ -69,14 +81,15 @@ struct vmmio {
>   };
>   
>   enum io_state try_handle_mmio(struct cpu_user_regs *regs,
> -                              const union hsr hsr,
> -                              paddr_t gpa);
> +                              mmio_info_t *info);
>   void register_mmio_handler(struct domain *d,
>                              const struct mmio_handler_ops *ops,
>                              paddr_t addr, paddr_t size, void *priv);
>   int domain_io_init(struct domain *d, int max_count);
>   void domain_io_free(struct domain *d);
>   
> +void try_decode_instruction(const struct cpu_user_regs *regs,
> +                            mmio_info_t *info);
>   
>   #endif  /* __ASM_ARM_MMIO_H__ */
>   
> diff --git a/xen/arch/arm/include/asm/traps.h b/xen/arch/arm/include/asm/traps.h
> index 2ed2b85c6f..95c46ad391 100644
> --- a/xen/arch/arm/include/asm/traps.h
> +++ b/xen/arch/arm/include/asm/traps.h
> @@ -109,6 +109,8 @@ static inline register_t sign_extend(const struct hsr_dabt dabt, register_t r)
>       return r;
>   }
>   
> +void post_increment_register(const struct instr_details *instr);
> +
>   #endif /* __ASM_ARM_TRAPS__ */
>   /*
>    * Local variables:
> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
> index fad103bdbd..bea69ffb08 100644
> --- a/xen/arch/arm/io.c
> +++ b/xen/arch/arm/io.c
> @@ -102,57 +102,79 @@ static const struct mmio_handler *find_mmio_handler(struct domain *d,
>       return handler;
>   }
>   
> +void try_decode_instruction(const struct cpu_user_regs *regs,
> +                            mmio_info_t *info)
> +{
> +    int rc;
> +
> +    if ( info->dabt.valid )
> +    {
> +        info->dabt_instr.state = INSTR_VALID;
> +
> +        /*
> +         * Erratum 766422: Thumb store translation fault to Hypervisor may
> +         * not have correct HSR Rt value.
> +         */
> +        if ( check_workaround_766422() && (regs->cpsr & PSR_THUMB) &&
> +             info->dabt.write )

This change is not explained in the commit message. TBH, I think it 
should be separate but I am not going to request that at v9.

> +        {
> +            rc = decode_instruction(regs, info);
> +            if ( rc )
> +            {
> +                gprintk(XENLOG_DEBUG, "Unable to decode instruction\n");
> +                info->dabt_instr.state = INSTR_ERROR;
> +        }
> +        return;
> +    }
> +
> +    /*
> +     * Armv8 processor does not provide a valid syndrome for decoding some
> +     * instructions. So in order to process these instructions, Xen must
> +     * decode them.
> +     */
> +    rc = decode_instruction(regs, info);
> +    if ( rc )
> +    {
> +        gprintk(XENLOG_ERR, "Unable to decode instruction\n");
> +        info->dabt_instr.state = INSTR_ERROR;
> +    }
> +}
> +
>   enum io_state try_handle_mmio(struct cpu_user_regs *regs,
> -                              const union hsr hsr,
> -                              paddr_t gpa)
> +                              mmio_info_t *info)
>   {
>       struct vcpu *v = current;
>       const struct mmio_handler *handler = NULL;
> -    const struct hsr_dabt dabt = hsr.dabt;
> -    mmio_info_t info = {
> -        .gpa = gpa,
> -        .dabt = dabt
> -    };
> +    int rc;
>   
> -    ASSERT(hsr.ec == HSR_EC_DATA_ABORT_LOWER_EL);
> +    ASSERT(info->dabt.ec == HSR_EC_DATA_ABORT_LOWER_EL);
>   
> -    handler = find_mmio_handler(v->domain, info.gpa);
> -    if ( !handler )
> +    if ( !((info->dabt_instr.state == INSTR_VALID) || (info->dabt_instr.state == INSTR_LDR_STR_POSTINDEXING)) )

This check will become quite large if we decode more class. I would 
instead set the dabt.valid bit whenever we successfully decoded the 
instruction and check that if dabt.valid here.

>       {
> -        int rc;
> +        ASSERT_UNREACHABLE();
> +        return IO_ABORT;
> +    }

[...]

> @@ -1982,21 +2030,18 @@ static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
>               case IO_UNHANDLED:
>                   /* IO unhandled, try another way to handle it. */
>                   break;
> -            }
>           }
>   
>           /*
> -         * First check if the translation fault can be resolved by the
> -         * P2M subsystem. If that's the case nothing else to do.
> +         * If the instruction syndrome was invalid, then we already checked if
> +         * this was due to a P2M fault. So no point to check again as the result
> +         * will be the same.
>            */
> -        if ( p2m_resolve_translation_fault(current->domain,
> -                                           gaddr_to_gfn(gpa)) )
> -            return;
> -
> -        if ( is_data && try_map_mmio(gaddr_to_gfn(gpa)) )
> +        if ( info.dabt.valid && check_p2m(is_data, gpa) )

This check would need to be adjusted to check the instruction state is 
INSTR_VALID.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 10:30:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 10:30:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284159.483339 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ5CV-00074o-1Y; Fri, 04 Mar 2022 10:30:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284159.483339; Fri, 04 Mar 2022 10:30:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ5CU-00074h-Uq; Fri, 04 Mar 2022 10:30:18 +0000
Received: by outflank-mailman (input) for mailman id 284159;
 Fri, 04 Mar 2022 10:30:17 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nQ5CT-00074a-A9
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 10:30:17 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nQ5CS-0007nV-EY; Fri, 04 Mar 2022 10:30:16 +0000
Received: from [54.239.6.187] (helo=[192.168.25.28])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nQ5CS-0004mD-8K; Fri, 04 Mar 2022 10:30:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=s5pbt7yCNVZ8D5xfn+hADGatcEDZGevvEhD90McTKKA=; b=njlINeWFsS/rkWPDDoxA0nthmb
	WrzUzlqgdSbTFzH9s3SK/85yvGTZoZGfckDlIIGL6STmAFBkqYKDbVJKkp2ShBzG6RuxTrPLnvRbK
	y5eOnGXnk6tYThGg4hCqqDehswv+DltZe7F/QM1oUoFPevglwC+7fTT1Oy9KnHcTMzbI=;
Message-ID: <e8c030cf-6909-b730-96f9-b98221c8d4c2@xen.org>
Date: Fri, 4 Mar 2022 10:30:13 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [XEN v9 2/4] xen/arm64: io: Support instructions (for which ISS
 is not valid) on emulated MMIO region using MMIO/ioreq handler
To: Stefano Stabellini <sstabellini@kernel.org>,
 Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
Cc: xen-devel@lists.xenproject.org, stefanos@xilinx.com,
 Volodymyr_Babchuk@epam.com, bertrand.marquis@arm.com,
 andrew.cooper3@citrix.com, george.dunlap@citrix.com, jbeulich@suse.com,
 wl@xen.org, paul@xen.org, roger.pau@citrix.com,
 Ayan Kumar Halder <ayankuma@xilinx.com>
References: <20220301124022.10168-1-ayankuma@xilinx.com>
 <20220301124022.10168-3-ayankuma@xilinx.com>
 <alpine.DEB.2.22.394.2203031637200.3261@ubuntu-linux-20-04-desktop>
From: Julien Grall <julien@xen.org>
In-Reply-To: <alpine.DEB.2.22.394.2203031637200.3261@ubuntu-linux-20-04-desktop>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Stefano,

On 04/03/2022 00:42, Stefano Stabellini wrote:
>>   void register_mmio_handler(struct domain *d,
>> diff --git a/xen/arch/arm/ioreq.c b/xen/arch/arm/ioreq.c
>> index 308650b400..58cd320b5a 100644
>> --- a/xen/arch/arm/ioreq.c
>> +++ b/xen/arch/arm/ioreq.c
>> @@ -47,6 +47,7 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
>>                                struct vcpu *v, mmio_info_t *info)
>>   {
>>       struct vcpu_io *vio = &v->io;
>> +    struct dabt_instr instr = info->dabt_instr;
>>       ioreq_t p = {
>>           .type = IOREQ_TYPE_COPY,
>>           .addr = info->gpa,
>> @@ -76,10 +77,10 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
>>       if ( !s )
>>           return IO_UNHANDLED;
>>   
>> -    if ( !info->dabt.valid )
>> -        return IO_ABORT;
>> +    ASSERT(dabt.valid);
> 
> I cannot see where we set dabt.valid on successfully decoding the
> instruction. It looks like we don't? If we don't, then here the ASSERT
> would fail in case of postindexing instructions, right?

We don't currently set dabt.valid. There are other reasons to set it 
(see my reply to Ayan). So...

> 
> If we don't, then we should probably just get rid of this ASSERT: it is
> not worth setting dabt.valid just so that this ASSERT would succeed.

... I would keep the ASSERT.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 10:39:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 10:39:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284168.483351 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ5Lh-00081l-Tt; Fri, 04 Mar 2022 10:39:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284168.483351; Fri, 04 Mar 2022 10:39:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ5Lh-00081e-QY; Fri, 04 Mar 2022 10:39:49 +0000
Received: by outflank-mailman (input) for mailman id 284168;
 Fri, 04 Mar 2022 10:39:47 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nQ5Lf-00081Y-Rt
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 10:39:47 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nQ5Lf-0007w4-5e; Fri, 04 Mar 2022 10:39:47 +0000
Received: from [54.239.6.187] (helo=[192.168.25.28])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nQ5Le-0005Ur-V2; Fri, 04 Mar 2022 10:39:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=52ED2Zgibtugkn66f/nC0LVaMz+d1vBT5FeAuEWvZ4s=; b=DZ1f82zHs/merF7SVoqwQZvJ8o
	LurK46YF/F3S8VEC2M2CSKNlXkNCSGEk4oVzkuBTqRcW0i9kMR/NYxJQPJfxhwEmDJn/mi7OqXYcl
	bDjIYSFaszN0J29aEAnsHUw7fhZXshvYVehtga9C9eTeR/kRMirEwoE1jkbJ0159U77U=;
Message-ID: <68acfbf0-f2c1-c52e-93a3-632f1286d90f@xen.org>
Date: Fri, 4 Mar 2022 10:39:43 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [XEN v9 3/4] xen/arm64: io: Handle the abort due to access to
 stage1 translation table
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>,
 xen-devel@lists.xenproject.org
Cc: sstabellini@kernel.org, stefanos@xilinx.com, Volodymyr_Babchuk@epam.com,
 bertrand.marquis@arm.com, andrew.cooper3@citrix.com,
 george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org,
 roger.pau@citrix.com, Ayan Kumar Halder <ayankuma@xilinx.com>
References: <20220301124022.10168-1-ayankuma@xilinx.com>
 <20220301124022.10168-4-ayankuma@xilinx.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220301124022.10168-4-ayankuma@xilinx.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Ayan,

On 01/03/2022 12:40, Ayan Kumar Halder wrote:
> If the abort was caused due to access to stage1 translation table, Xen
> will assume that the stage1 translation table is in the non MMIO region.
> It will try to resolve the translation fault. If it succeeds, it will
> return to the guest to retry the instruction. If not, then it means
> that the table is in MMIO region which is not expected by Xen. Thus,
> Xen will forward the abort to the guest.
> 
> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
> ---
> 
> Changelog :-
> 
> v1..v8 - NA
> 
> v9 - 1. Extracted this change from "[XEN v8 2/2] xen/arm64: io: Support
> instructions (for which ISS is not..." into a separate patch of its own.
> The reason being this is an existing bug in the codebase.
> 
>   xen/arch/arm/io.c    | 11 +++++++++++
>   xen/arch/arm/traps.c | 12 +++++++++++-
>   2 files changed, 22 insertions(+), 1 deletion(-)
> 
> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
> index bea69ffb08..ebcb8ed548 100644
> --- a/xen/arch/arm/io.c
> +++ b/xen/arch/arm/io.c
> @@ -128,6 +128,17 @@ void try_decode_instruction(const struct cpu_user_regs *regs,
>           return;
>       }
>   
> +    /*
> +     * At this point, we know that the stage1 translation table is in the MMIO
> +     * region. This is not expected by Xen and thus it forwards the abort to the

We don't know that. We only know that there are no corresponding valid 
mapping in the P2M. So the address may be part of an emulated MMIO 
region or invalid.

For both cases, we will want to send an abort.

Furthermore, I would say "emulated MMIO region" rather than MMIO region 
because the P2M can also contain MMIO mapping (we usually call then 
"direct MMIO").

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 10:46:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 10:46:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284175.483362 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ5S0-0001GL-IP; Fri, 04 Mar 2022 10:46:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284175.483362; Fri, 04 Mar 2022 10:46:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ5S0-0001GE-FE; Fri, 04 Mar 2022 10:46:20 +0000
Received: by outflank-mailman (input) for mailman id 284175;
 Fri, 04 Mar 2022 10:46:19 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nQ5Rz-0001G8-99
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 10:46:19 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nQ5Ry-00084Q-K5; Fri, 04 Mar 2022 10:46:18 +0000
Received: from [54.239.6.187] (helo=[192.168.25.28])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nQ5Ry-00062Y-DA; Fri, 04 Mar 2022 10:46:18 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=nrXCoX8rYkFXLodM6ougi10YCLxb+BtxLh60QHMahjE=; b=Yng8v4iZ8zOjTAsgUhLKMOl7cr
	joGasSBqf101aH4mVL4Blh7EOxTIDuGJltgc4V2EmjaqB4dDMyquo2fhd0pLXFKWBFp22RXKwCZA0
	yKBu3V0KpSSTPQT/wLAEAcDuOTX19Iod1xjmyvK9I9jZ45D0AT8VqFbxm9BZnoQ+1uO8=;
Message-ID: <26ee167e-16ea-e358-f390-dc96961d3234@xen.org>
Date: Fri, 4 Mar 2022 10:46:15 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [XEN v9 4/4] xen/arm64: io: Handle data abort due to cache
 maintenance instructions
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>,
 xen-devel@lists.xenproject.org
Cc: sstabellini@kernel.org, stefanos@xilinx.com, Volodymyr_Babchuk@epam.com,
 bertrand.marquis@arm.com, andrew.cooper3@citrix.com,
 george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org,
 roger.pau@citrix.com, Ayan Kumar Halder <ayankuma@xilinx.com>
References: <20220301124022.10168-1-ayankuma@xilinx.com>
 <20220301124022.10168-5-ayankuma@xilinx.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220301124022.10168-5-ayankuma@xilinx.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Ayan,

On 01/03/2022 12:40, Ayan Kumar Halder wrote:
> When the data abort is caused due to cache maintenance for an address,
> there are two scenarios:-
> 
> 1. Address belonging to a non emulated region - For this, Xen should
> set the corresponding bit in the translation table entry to valid and
> return to the guest to retry the instruction. This can happen sometimes
> as Xen need to set the translation table entry to invalid. (for eg
> 'Break-Before-Make' sequence).
> 
> 2. Address belongs to an emulated region - Xen should ignore the
> instruction (ie increment the PC) and return to the guest.

I would be explicit and say something along the lines:

"Xen doesn't cache data for emulated regions. So we can safely ignore them".

There is a third scenarios:

The address belongs to neither an emulated region nor has a valid 
mapping in the P2M.
> 
> We try to deal with scenario#1, by invoking check_p2m(). If this is
> unsuccessful, then we assume scenario#2.

This means that you will ignore cache maintenance on invalid region. I 
think we should send an abort to the guest rather than let them believe 
it worked.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 11:18:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 11:18:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284183.483372 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ5x0-0005Ce-2i; Fri, 04 Mar 2022 11:18:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284183.483372; Fri, 04 Mar 2022 11:18:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ5wz-0005CX-Vx; Fri, 04 Mar 2022 11:18:21 +0000
Received: by outflank-mailman (input) for mailman id 284183;
 Fri, 04 Mar 2022 11:18:21 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=mKET=TP=santannapisa.it=Andrea.Stevanato@srs-se1.protection.inumbo.net>)
 id 1nQ5wy-0005CR-Qv
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 11:18:21 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05on20615.outbound.protection.outlook.com
 [2a01:111:f400:7d00::615])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id cacad29c-9bac-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 12:18:18 +0100 (CET)
Received: from DB7PR03MB5002.eurprd03.prod.outlook.com (2603:10a6:10:74::22)
 by DB9PR03MB7178.eurprd03.prod.outlook.com (2603:10a6:10:22b::17) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Fri, 4 Mar
 2022 11:18:16 +0000
Received: from DB7PR03MB5002.eurprd03.prod.outlook.com
 ([fe80::746a:e27:47ff:3e90]) by DB7PR03MB5002.eurprd03.prod.outlook.com
 ([fe80::746a:e27:47ff:3e90%7]) with mapi id 15.20.5038.015; Fri, 4 Mar 2022
 11:18:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cacad29c-9bac-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=WtDBK/yXMyY40hETLLscQhZInGx9OCHhSNlKgESEg1n6L/TaUoSipsWlB+J/yDWPasgh6VlbPJ6P9SDCLVlsB1K9b7iIYwzVUTIPMSBt9cOfOofWDJwedOs2eUQFLYt1HePaQD0+Td5wPE4494CLf1J0R5GoN7ojxEzxxVX6PK281zW2SWkyujVHpWkauZHofEjzyHrRXvg+CjeQIQNcPtrJ9AAiLB6E/ba98hW6Jzavajd3QJjo+/8kgnN4T5rj4TH47YxXtwrqX8blanz7TMld3K4gMjPhk6HkKaFPUZ2yG2N5hxyJHCmow5Ofvg9pGcJ8izklbrquPm+LDjLtaw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=c1UehCpKL0sUjppEIROksc1zAgP0aPVzngp56HWLTik=;
 b=WPLdJvUb5a+EJXr3d48JLwxs/iTm6BVNcyV/MSGRsybkyVwUQFIJY6h7SqjdJsBMsisRehtH9GygJHw8H9dEq/cv5Xtm7dvZM5x7bJPtkhI49J2eWDX3Z+Tn6Xaw++4FZ/pe7v4huHLObBDvYdP1WIQ7YhzayimB981u7qdSgGJ/JVjcigM6k7zJ17wLobspP8L5xPpGGdIX74nRsCvLl6KTO4VWvwjG8YVG7Y83RCRc9L1Qz4BUIF/aPUAOnlemByHhc/7T0fR2pUYjfAU9KlI1IDtUDVbj3to8m3NO+k0Z/NXIQ+WvUIhcv+swDdGiOUu3nKN4ou4pE6mag6eCCA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=santannapisa.it; dmarc=pass action=none
 header.from=santannapisa.it; dkim=pass header.d=santannapisa.it; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=santannapisa.it;
 s=selector1;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=c1UehCpKL0sUjppEIROksc1zAgP0aPVzngp56HWLTik=;
 b=zc9h0Y4pRbJhIerXj/FuxdCOUt4R6mJkKHHguNyS8NDVz7E5F8WL6zWUGRLHOspui7p7LlyrqN/hFXHwS/z9wPpYO9K27ueQWHZmTa4ImxV2+Ms6jfiSZm2dktcwB5ZPuaApS1gpyjfvyO3rfXwC+LOjtpbgluduRChzDeSJv5Q=
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=santannapisa.it;
Message-ID: <3bf4cfba-4d9a-1a6c-fc93-7a5dbeac311b@santannapisa.it>
Date: Fri, 4 Mar 2022 12:18:18 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: Network driver domain broken
Content-Language: en-US
To: Jason Andryuk <jandryuk@gmail.com>, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?=
 <roger.pau@citrix.com>
Cc: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 "wl@xen.org" <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>
References: <DB7PR03MB50027EE92E11BFFF71AADC4598049@DB7PR03MB5002.eurprd03.prod.outlook.com>
 <92827eec-b6e9-9c95-8f9e-fcf063d45090@santannapisa.it>
 <YiDt7fX92n6Luc2l@Air-de-Roger>
 <CAKf6xpsnmQG7-LXn5+Uz4mncWsN0EZ8wpagY8f8OydvZNb6g5A@mail.gmail.com>
From: Andrea Stevanato <andrea.stevanato@santannapisa.it>
In-Reply-To: <CAKf6xpsnmQG7-LXn5+Uz4mncWsN0EZ8wpagY8f8OydvZNb6g5A@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: MR1P264CA0038.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:501:3e::32) To DB7PR03MB5002.eurprd03.prod.outlook.com
 (2603:10a6:10:74::22)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f135452d-74a8-4a33-70c0-08d9fdd0ad85
X-MS-TrafficTypeDiagnostic: DB9PR03MB7178:EE_
X-Microsoft-Antispam-PRVS:
	<DB9PR03MB7178D1E20C896501D326F65498059@DB9PR03MB7178.eurprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	d4+6o4EP1+DQrIP3ZsCkt6jX1ympCzWAisW5kCy1cDwE2kIy08MjkdKStG5cvRtKd6eLvxfNxUj9ZEQFXZj2bJwotFCre10TaeTFVWrEQNZr1y2t3mVXeKv56mUxs9nHSmDJk+xNyr1oCOlU1Xg/dztFa95gZJIAwtQ7nemLEuGJ+ZJznjKoRNSxzdIQHHQkJc5nJRVZlyrZQVoFVgxqaYbIwt/e8BGPkv1wlfUmYW3o9R15jLBwfCMPc2Wr93gvifCUb6dgcLImOlZADACy6hbqFcpqqx2AA1PnGU35f7huo9v9pUxnh4aYgVyjElylXpIAeXkcHSEm9Pc5WvNI5S3/89PlW1hBw+3GrDBs+J7ByQUIyP0RzqWGYF0KgI74QDvEEzJi9HTKnxA080w+0pH4WXf7AZ4y5iNeRzQQBrbW3+0cAnbCOSWHb+X+d+/QrU0Sp+r9Cw7g9KCiiCwbptQpi98EfcKV2EC3pbs9VC3OgDXJtXNb6NM3T+vhwIO4ijlXva5FrX+k3c0wqRogf+ddNLGm9aI2BuQOyFgLFsMEjG9NrtWn2I29qcx7MZCTiNgWthkkSF0XAqHtg44BYLg4gKREJ1PiEq3e5iCW9nzCW5fmgZyIl/WFlROXscm3jDOcThVq6FW0h+IXX7zXUkm9Qj/1XoKlEk+Dh250GnL6kTgSoa3Xm0iaZ/zY9JliAFIK7rpPNzcFxBEqR+M6fLvCkqYSpZJ3TqmYzwa570+qt9ieD7Ml4ymES/mLlGk7w4tND9mqNxpUq8QqGXCoFQ==
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DB7PR03MB5002.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(3480700007)(31686004)(44832011)(8936002)(83380400001)(36756003)(2906002)(2616005)(186003)(26005)(38350700002)(38100700002)(316002)(786003)(6486002)(110136005)(54906003)(52116002)(8676002)(4326008)(53546011)(31696002)(86362001)(508600001)(5660300002)(66556008)(66476007)(6512007)(66946007)(6506007)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?ZG1TTS80QXl4V1plZm95Ty9yVEphb1F6NWZMODZic3d0ZW1ZR3BqMXZDeFFK?=
 =?utf-8?B?NFZrWVNsQy9Hbk5LNThFZFNzcmtKSHhGcXpsZGFpRXpBYzEwY082QlVuRVI5?=
 =?utf-8?B?TXcwVURxaXBEenpkQVJ1MEYwdUpHdzlhUTlWTnJkNHlHZVk1V0krUFhBOGZy?=
 =?utf-8?B?M0JnYVRLYkloSUVPbmYyTzEySUxmTnVlN1E2TkEzdUNKMzJERXp6cTVEVFly?=
 =?utf-8?B?OGF1bHZaK01ldkJGWmg3ZzVOL2djRC9VRTR2Sy8zNEdpL0VYMnhGOVhmNjl3?=
 =?utf-8?B?WVpkZEVaNWNsNkxTUDlObE0zdCtvaDYweXhyakIvQWRBekJjanRXMitOdlVN?=
 =?utf-8?B?cDFucWN3cEhSN3NhSzBsNXRTdFJBV1ZBYWVnSWJ0ai9rUzZFR1hLUENiUlZm?=
 =?utf-8?B?MzEwQzFlZWNFciszSlVqc1g1ZWRHdmNudHk4elhIQ3BQOWE5V3dJZzd0REUz?=
 =?utf-8?B?Qld0K1kxakNtRldkaUpjTWZ2aXprdUxkY2dQZnhxSzVQellOWE1kVTN5dWFn?=
 =?utf-8?B?Tng1T2p2ZXZweUljcE1XcWV0TnVXWEpPak4rQ1FrVFc4ZVV1TFhNaEhOSFEx?=
 =?utf-8?B?UnhjR1pmR0dNcmRqWVdpYWx4MXJtMDgxWmtnNmxtTW5xV1UrY0hCSE8wTmlT?=
 =?utf-8?B?a3pmYTdJZUwvSVZ4L1VnZkxHSWFDUkJOSzFDTTZHOU9FSDFXdGwyUVhwdGlp?=
 =?utf-8?B?UzZoYmY4M2JSaFoyL0lFMUJVWGl6UjVBNENkdUpPL1h1VFBTeFhSSFVDdXlp?=
 =?utf-8?B?dnFzMmlTbTJRR0xxZ3ViTVhXQzVUNGlrUTJKRTNRTTcvUElrRmQ5RGlDWklM?=
 =?utf-8?B?QXpvUktncnlDMEl4SHN4b1hLOVgvTmY4UUhxOU14RUFWeCt6RER6Z2JiaVVN?=
 =?utf-8?B?eUVCVVRSejBzM3BEL0J1d1dabHloRE5TY3NrMjE3bkdtcXA4S016alVLOTJ5?=
 =?utf-8?B?bTdnUVdrNnRtQXpTL293cjFLVTNzaVdqRWpaOTlLVi9xYnNCVEVZTWZ4aFBY?=
 =?utf-8?B?cHFQY3hMazRJZ1BOL3Z5V1VMcmVsOXArbkVyTVVpbzF0SC9LSDlITW9MQ2g2?=
 =?utf-8?B?NXdSaW1meXUwcXRRNDA4dlVSaW1jMUFZMUxjcmxlMHp0QnVFSDM4d1Y4b3Fl?=
 =?utf-8?B?OUh0SXlkaWhNT1A3aUZSMFVCZnpoR25kWmVEWlZsWStLcmVVTnNsampqNkdY?=
 =?utf-8?B?cExOVElzczljL3NWNkhJOFg4V0djTXl1ejNtQmdrN3pxd0ZxazkwUHg1M1V5?=
 =?utf-8?B?Y3Y1ODc1UDNzRTRlQTkydXNBSU5DSXlDNkVONUVtNkJtRktDUHVWYlYwZENY?=
 =?utf-8?B?d2ZmVkpQY1NyZ0ptMDhYS3VWVUhscmExTmV3aXA1ckYvWWY4bnV6a3lwNG5K?=
 =?utf-8?B?eWtVWW9KSWhTWTIxcmZoZHR5N0ViRFB2Z3N1YUplV1lHV0JRUTNaR283dG5n?=
 =?utf-8?B?MXlHQTVnN0xadlpMRytSQjM2bWFQRmQwNDEwd0ZFc1VzU1FYVU9IZDJwS1JS?=
 =?utf-8?B?VmFodVEwMTNwRzJnRTdUUE1xWUxyeHhpQ2c3L1JINVNidE10T1p2STY3UkRU?=
 =?utf-8?B?L1Z6QjByWGJLRjFCNmwwaE55R3Y2aXZQelkwRmYzUEpvc3ZjTkI0U3VSWjhS?=
 =?utf-8?B?VXE2aUpUR2FYWWNrdTRBcTdRcTFxaDNORExuNjBMM2djV3RSWm1mNmx4Z2M5?=
 =?utf-8?B?R0JIODB2cW92Y0k5T1JDSTEzS3U0R3czWVVjUGlyTjVtbk15bWNSSm0xRUZv?=
 =?utf-8?B?VSsyRHllcmFEdVdxTDBDeHdiVUdHK1JHWlZJMlZaNkVhUkNXOGhqdkovd2lr?=
 =?utf-8?B?QWJpckN4M0R0aFZqOVhqTFRTaDdQNjZkTlRPMVppWGd6R0VUTU9OZjhYZGc3?=
 =?utf-8?B?a2xNTjEvQWhMdnpCNzAzSTRONzNJdjkyMzFDMUNCNFUyN2lIa1dwQ0dEZytV?=
 =?utf-8?B?UWRSOVB2a05PWmlpQkdWTXB3emFtZjJjQWNNYXI3c2xxUTNyamp0ZnBWQ1ZK?=
 =?utf-8?B?bDA0UTdRUlFENnVHYkp6a0xvZnRuTi9PVWxkSU9nVWh4NFhDY284WEVtekxa?=
 =?utf-8?B?Y3NiSmNwc0lXNG12SHN5S1BXTHNoMmVHa20yYlB4aENac1pVdHNXK2o4UUdX?=
 =?utf-8?B?NTBxNE1tVURwR3o3Zm95NjBXNWZXY0ptMms2MGg2bXZaMGd2ZWh2ZTFESlFZ?=
 =?utf-8?B?RDZVN1drOXMvTktEWlBOWUcvMnhaMzBJWjE3c1BrZEpGbWpDcFZGY1p1bVIy?=
 =?utf-8?B?VDBBN3hieTRsZ1IvU0syRmVndmtFRTF5YzlTbVRKWlZ1dXZhME9KL1dzdkh2?=
 =?utf-8?B?VTVXU0xpcGgwNU1sc0J6aFdkZG16S2tVQVZDaEFvYThCL2NhTkxFUT09?=
X-OriginatorOrg: santannapisa.it
X-MS-Exchange-CrossTenant-Network-Message-Id: f135452d-74a8-4a33-70c0-08d9fdd0ad85
X-MS-Exchange-CrossTenant-AuthSource: DB7PR03MB5002.eurprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 11:18:16.0863
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: d97360e3-138d-4b5f-956f-a646c364a01e
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Ij23qLbb/2+zk1uKPTu0LWLHi5hEtTogMTzAGrHN3520qpdMzBgYyIc0r1G8u1Rpjm7yTF6oA2qnO17TxM/00O8GMYBjPxAYA9IrCJHIhfulTbX5Mv4gpWaxXPJvdikZ
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR03MB7178

On 03/03/2022 19:08, Jason Andryuk wrote:
> On Thu, Mar 3, 2022 at 11:34 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
>>
>> On Thu, Mar 03, 2022 at 05:01:23PM +0100, Andrea Stevanato wrote:
>>> On 03/03/2022 15:54, Andrea Stevanato wrote:
>>>> Hi all,
>>>>
>>>> according to the conversation that I had with royger, aa67b97ed34  broke the driver domain support.
>>>>
>>>> What I'm trying to do is to setup networking between guests using driver domain. Therefore, the guest (driver) has been started with the following cfg.
>>>>
>>>> name    = "guest0"
>>>> kernel  = "/media/sd-mmcblk0p1/Image"
>>>> ramdisk = "/media/sd-mmcblk0p1/rootfs.cpio.gz"
>>>> extra   = "console=hvc0 rdinit=/sbin/init root=/dev/ram0"
>>>> memory  = 1024 vcpus   = 2
>>>> driver_domain = 1
>>>>
>>>> On guest0 I created the bridge, assigned a static IP and started the udhcpd on xenbr0 interface.
>>>> While the second guest has been started with the following cfg:
>>>>
>>>> name    = "guest1"
>>>> kernel  = "/media/sd-mmcblk0p1/Image"
>>>> ramdisk = "/media/sd-mmcblk0p1/rootfs.cpio.gz"
>>>> extra   = "console=hvc0 rdinit=/sbin/init root=/dev/ram0"
>>>> memory  = 1024 vcpus   = 2
>>>> vcpus   = 2
>>>> vif = [ 'bridge=xenbr0, backend=guest0' ]
>>>>
>>>> Follows the result of strace xl devd:
>>>>
>>>> # strace xl devd
>>>> execve("/usr/sbin/xl", ["xl", "devd"], 0xffffdf0420c8 /* 13 vars */) = 0
> 
>>>> ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41b40) = -1 EPERM (Operation not permitted)
>>>> write(2, "libxl: ", 7libxl: )                  = 7
>>>> write(2, "error: ", 7error: )                  = 7
>>>> write(2, "libxl_utils.c:820:libxl_cpu_bitm"..., 87libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve the maximum number of cpus) = 87
>>>> write(2, "\n", 1
>>>> )                       = 1
>>>> clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0xffff9ee7a0e0) = 814
>>>> wait4(814, [{WIFEXITED(s) && WEXITSTATUS(s) == 0}], 0, NULL) = 814
>>>> --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=814, si_uid=0, si_status=0, si_utime=2, si_stime=2} ---
> 
> xl devd is daemonizing, but strace is only following the first
> process.  Use `strace xl devd -F` to prevent the daemonizing (or
> `strace -f xl devd` to follow children).
> 
>>>> close(6)                                = 0
>>>> close(5)                                = 0
>>>> munmap(0xffff9f45f000, 4096)            = 0
>>>> close(7)                                = 0
>>>> close(10)                               = 0
>>>> close(9)                                = 0
>>>> close(8)                                = 0
>>>> close(11)                               = 0
>>>> close(3)                                = 0
>>>> close(4)                                = 0
>>>> exit_group(0)                           = ?
>>>> +++ exited with 0 +++
>>>>
>>>> royger told me that it is a BUG and not an issue with my setup. Therefore here I am.
>>
>> Just a bit more context: AFAICT the calls to libxl_cpu_bitmap_alloc in
>> parse_global_config will prevent xl from being usable on anything
>> different than the control domain (due to sysctl only available to
>> privileged domains). This is an issue for 'xl devd', as it won't
>> start anymore.
> 
> These look non-fatal at first glance?
> 
> Regards,
> Jason

Well, actually, this prevents me to be able to create network driver 
domains for inter-guests networking (no passthrough is required since 
they do not need to reach outside).

Cheers,
Andrea


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 11:28:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 11:28:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284190.483383 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ66G-0006yy-Ve; Fri, 04 Mar 2022 11:27:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284190.483383; Fri, 04 Mar 2022 11:27:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ66G-0006yr-Sb; Fri, 04 Mar 2022 11:27:56 +0000
Received: by outflank-mailman (input) for mailman id 284190;
 Fri, 04 Mar 2022 11:27:55 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=zc/n=TP=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nQ66F-0006yl-DL
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 11:27:55 +0000
Received: from NAM11-DM6-obe.outbound.protection.outlook.com
 (mail-dm6nam11on20600.outbound.protection.outlook.com
 [2a01:111:f400:7eaa::600])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 208ada2f-9bae-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 12:27:52 +0100 (CET)
Received: from BN6PR1401CA0008.namprd14.prod.outlook.com
 (2603:10b6:405:4b::18) by SN4PR0201MB3408.namprd02.prod.outlook.com
 (2603:10b6:803:50::16) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Fri, 4 Mar
 2022 11:27:48 +0000
Received: from BN1NAM02FT057.eop-nam02.prod.protection.outlook.com
 (2603:10b6:405:4b:cafe::3) by BN6PR1401CA0008.outlook.office365.com
 (2603:10b6:405:4b::18) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.13 via Frontend
 Transport; Fri, 4 Mar 2022 11:27:48 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (149.199.80.198) by
 BN1NAM02FT057.mail.protection.outlook.com (10.13.2.165) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5038.14 via Frontend Transport; Fri, 4 Mar 2022 11:27:48 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Fri, 4 Mar 2022 11:27:47 +0000
Received: from smtp.xilinx.com (172.21.105.197) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Fri, 4 Mar 2022 11:27:46 +0000
Received: from [10.71.117.182] (port=31989)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nQ665-0000tn-9l; Fri, 04 Mar 2022 11:27:45 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 208ada2f-9bae-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Alu5ozSd3udqTS/D9JOh5tkyS/i8a3AW5/9bnqr30d0r+o6LL1Yoc1NejuNXH+8cjaWm83hzNyqNuBsyWONEgZ1uWJVfPBUIh4gTVg8MObgWz2KMVpQ4BAPf70TyLGoR1zyru/CYmV8dv+y2jpsjmbri/oX4KuOe1cYxnpL+LqdnxwLCC6evCm/E+adNFjvZaXAgn0AQP37pRCY/j17A/LIkAEZL8WULE+Pig4AN/6pcjiraV2x5/AiDcacrK9bRJSepJI+5UZg2oxzjMxqCbZ7ujS4P0j9ULmaPyZUI1A4nM5s8rkCWnus7cHX7PQFvX14RTmZ0XNZy6gPul4QEpw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=UWdXdxJAxpiiBhIaqM4O7szg4GBHjeVO1CWpQUmALUE=;
 b=mweoiOGMF0vqcCtPVcijzZ4iogDi+oMLNjX9EG0gi9kEHZJeia8OlvSwOOYPSeKmYYD2U0gUa8qyWIBjvREXmKuxDaP5JVzNdO2WPuxdTgouj/rOKBCVfaJkdMR7ux1mGYfg4Oa3xwLRYcjLUAFDZw07UzyZKJIoprMoiXwcq2qcs9VlOTRs9aQ7ICMlUCzV9GMigqMepo0YvEdeIM4uNwSVXD7qWdh0gCFCQcmKMQBnpt4u5KK/6Mv5DVot7KooEJRC7v/KwUqNfeAsxK2QfBFoCHlWPZ109huZNtkBC1yfwmHW8SCQ54Wh1sQ5f8JFZyfyQRlSw2duP6ethQ6ntg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=xen.org smtp.mailfrom=xilinx.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=xilinx.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=UWdXdxJAxpiiBhIaqM4O7szg4GBHjeVO1CWpQUmALUE=;
 b=nMXZQn94uj7G7bwovP8/J5+VjpRCpRnM+fLWv4tLpjDzhHSVwXDTGPq/NDbGLuSETcNo22RzPjfnxI9hIvdB4Kb/IomfhVrAQcc21pCH9GXchIvLmmyST1OZjjUA4XfIkPn/cqdvITNgxhcDMoHJ/+jFgaO4UZrBZKLsGWTpQGs=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch01.xlnx.xilinx.com;
Message-ID: <e4cb625d-5f2a-7e93-85ad-701e01e95e7f@xilinx.com>
Date: Fri, 4 Mar 2022 11:27:44 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [XEN v9 2/4] xen/arm64: io: Support instructions (for which ISS
 is not valid) on emulated MMIO region using MMIO/ioreq handler
To: Julien Grall <julien@xen.org>, Ayan Kumar Halder
	<ayan.kumar.halder@xilinx.com>, <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <stefanos@xilinx.com>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>
References: <20220301124022.10168-1-ayankuma@xilinx.com>
 <20220301124022.10168-3-ayankuma@xilinx.com>
 <d41241f9-de9d-e681-2768-d44531722069@xen.org>
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
In-Reply-To: <d41241f9-de9d-e681-2768-d44531722069@xen.org>
Content-Type: text/plain; charset="UTF-8"; format=flowed
Content-Transfer-Encoding: 8bit
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2ac028d4-a60b-4e40-6d53-08d9fdd202d6
X-MS-TrafficTypeDiagnostic: SN4PR0201MB3408:EE_
X-Microsoft-Antispam-PRVS:
	<SN4PR0201MB340822D7F090FBAAA4C81EA6B2059@SN4PR0201MB3408.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch01.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(36860700001)(508600001)(83380400001)(47076005)(7636003)(356005)(5660300002)(70586007)(2906002)(70206006)(8676002)(31686004)(7416002)(36756003)(4326008)(9786002)(8936002)(26005)(426003)(2616005)(82310400004)(336012)(316002)(54906003)(110136005)(186003)(31696002)(40460700003)(53546011)(50156003)(461764006)(43740500002);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 11:27:48.0483
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 2ac028d4-a60b-4e40-6d53-08d9fdd202d6
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch01.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	BN1NAM02FT057.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN4PR0201MB3408

Hi Julien,

Many thanks for the feedback.

I have some clarifications.

On 04/03/2022 10:28, Julien Grall wrote:
> Hi Ayan,
>
> On 01/03/2022 12:40, Ayan Kumar Halder wrote:
>> +void post_increment_register(const struct instr_details *instr)
>> +{
>> +    struct cpu_user_regs *regs = guest_cpu_user_regs();
>> +    register_t val = 0;
>> +
>> +    /* Currently, we handle only ldr/str post indexing instructions */
>> +    if ( instr->state != INSTR_LDR_STR_POSTINDEXING )
>> +        return;
>> +
>> +    /*
>> +     * Handle when rn = SP
>> +     * Refer ArmV8 ARM DDI 0487G.b, Page - D1-2463 "Stack pointer 
>> register
>> +     * selection"
>> +     * t = SP_EL0
>> +     * h = SP_ELx
>> +     * and M[3:0] (Page - C5-474 "When exception taken from AArch64 
>> state:")
>> +     */
>> +    if (instr->rn == 31 )
>> +    {
>> +        if ( (regs->cpsr & PSR_MODE_MASK) == PSR_MODE_EL1h )
>> +            val = regs->sp_el1;
>> +        else if ( ((regs->cpsr & PSR_MODE_MASK) == PSR_MODE_EL1t) ||
>> +                    ((regs->cpsr & PSR_MODE_MASK) == PSR_MODE_EL0t) )
>
> You are using 3 times regs->cpsr & PSR_MODE_MASK. Can you introduce a 
> temporary variable?
>
> Alternatively, a switch could be used here.
Yes, a switch is better. I will address that in v10.
>
> [...]
>
>> diff --git a/xen/arch/arm/include/asm/mmio.h 
>> b/xen/arch/arm/include/asm/mmio.h
>> index 3354d9c635..ef2c57a2d5 100644
>> --- a/xen/arch/arm/include/asm/mmio.h
>> +++ b/xen/arch/arm/include/asm/mmio.h
>> @@ -26,12 +26,24 @@
>>     #define MAX_IO_HANDLER  16
>>   +enum instr_decode_state
>> +{
>> +    INSTR_ERROR,                    /* Error encountered while 
>> decoding instr */
>> +    INSTR_VALID,                    /* ISS is valid, so no need to 
>> decode */
>> +    /*
>> +     * Instruction is decoded successfully. It is a ldr/str post 
>> indexing
>> +     * instruction.
>> +     */
>> +    INSTR_LDR_STR_POSTINDEXING
>
> NIT: Please add ',' even for the last item. This would reduce the diff 
> if we add new one.
Ack (To be addressed in v10)
>
>> +};
>> +
>>   typedef struct
>>   {
>>       struct hsr_dabt dabt;
>>       struct instr_details {
>>           unsigned long rn:5;
>>           signed int imm9:9;
>> +        enum instr_decode_state state;
>>       } dabt_instr;
>>       paddr_t gpa;
>>   } mmio_info_t;
>> @@ -69,14 +81,15 @@ struct vmmio {
>>   };
>>     enum io_state try_handle_mmio(struct cpu_user_regs *regs,
>> -                              const union hsr hsr,
>> -                              paddr_t gpa);
>> +                              mmio_info_t *info);
>>   void register_mmio_handler(struct domain *d,
>>                              const struct mmio_handler_ops *ops,
>>                              paddr_t addr, paddr_t size, void *priv);
>>   int domain_io_init(struct domain *d, int max_count);
>>   void domain_io_free(struct domain *d);
>>   +void try_decode_instruction(const struct cpu_user_regs *regs,
>> +                            mmio_info_t *info);
>>     #endif  /* __ASM_ARM_MMIO_H__ */
>>   diff --git a/xen/arch/arm/include/asm/traps.h 
>> b/xen/arch/arm/include/asm/traps.h
>> index 2ed2b85c6f..95c46ad391 100644
>> --- a/xen/arch/arm/include/asm/traps.h
>> +++ b/xen/arch/arm/include/asm/traps.h
>> @@ -109,6 +109,8 @@ static inline register_t sign_extend(const struct 
>> hsr_dabt dabt, register_t r)
>>       return r;
>>   }
>>   +void post_increment_register(const struct instr_details *instr);
>> +
>>   #endif /* __ASM_ARM_TRAPS__ */
>>   /*
>>    * Local variables:
>> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
>> index fad103bdbd..bea69ffb08 100644
>> --- a/xen/arch/arm/io.c
>> +++ b/xen/arch/arm/io.c
>> @@ -102,57 +102,79 @@ static const struct mmio_handler 
>> *find_mmio_handler(struct domain *d,
>>       return handler;
>>   }
>>   +void try_decode_instruction(const struct cpu_user_regs *regs,
>> +                            mmio_info_t *info)
>> +{
>> +    int rc;
>> +
>> +    if ( info->dabt.valid )
>> +    {
>> +        info->dabt_instr.state = INSTR_VALID;
>> +
>> +        /*
>> +         * Erratum 766422: Thumb store translation fault to 
>> Hypervisor may
>> +         * not have correct HSR Rt value.
>> +         */
>> +        if ( check_workaround_766422() && (regs->cpsr & PSR_THUMB) &&
>> +             info->dabt.write )
>
> This change is not explained in the commit message. TBH, I think it 
> should be separate but I am not going to request that at v9.
I will leave this as it is then. I will explain in the commit message 
that the logic to infer the type of instruction has been moved from 
try_handle_mmio() to try_decode_instruction() which is called before. 
try_handle_mmio() is solely responsible for handling the mmio operation.
>
>> +        {
>> +            rc = decode_instruction(regs, info);
>> +            if ( rc )
>> +            {
>> +                gprintk(XENLOG_DEBUG, "Unable to decode 
>> instruction\n");
>> +                info->dabt_instr.state = INSTR_ERROR;
>> +        }
>> +        return;
>> +    }
>> +
>> +    /*
>> +     * Armv8 processor does not provide a valid syndrome for 
>> decoding some
>> +     * instructions. So in order to process these instructions, Xen 
>> must
>> +     * decode them.
>> +     */
>> +    rc = decode_instruction(regs, info);
>> +    if ( rc )
>> +    {
>> +        gprintk(XENLOG_ERR, "Unable to decode instruction\n");
>> +        info->dabt_instr.state = INSTR_ERROR;
>> +    }
>> +}
>> +
>>   enum io_state try_handle_mmio(struct cpu_user_regs *regs,
>> -                              const union hsr hsr,
>> -                              paddr_t gpa)
>> +                              mmio_info_t *info)
>>   {
>>       struct vcpu *v = current;
>>       const struct mmio_handler *handler = NULL;
>> -    const struct hsr_dabt dabt = hsr.dabt;
>> -    mmio_info_t info = {
>> -        .gpa = gpa,
>> -        .dabt = dabt
>> -    };
>> +    int rc;
>>   -    ASSERT(hsr.ec == HSR_EC_DATA_ABORT_LOWER_EL);
>> +    ASSERT(info->dabt.ec == HSR_EC_DATA_ABORT_LOWER_EL);
>>   -    handler = find_mmio_handler(v->domain, info.gpa);
>> -    if ( !handler )
>> +    if ( !((info->dabt_instr.state == INSTR_VALID) || 
>> (info->dabt_instr.state == INSTR_LDR_STR_POSTINDEXING)) )
>
> This check will become quite large if we decode more class. I would 
> instead set the dabt.valid bit whenever we successfully decoded the 
> instruction and check that if dabt.valid here.

Actually the main reason to introduce INSTR_LDR_STR_POSTINDEXING is to 
distinguish the scenario where the ISS was valid vs when instruction was 
decoded manually.

In the later scenario, one would need to do the post increment of the rn.

It makes sense to me to have a unque 'info->dabt_instr.state' for each 
type of instruction decoded as the post processing will vary. In this 
case, the post processing logic checks that the instruction is 
ldr_str_postindexing.

However your concern that the check will become large is valid. I would 
introduce a function as follows :-

bool check_instr_is_valid(enum instr_decode_state state)

{

     if (state == INSTR_VALID) || (state == INSTR_LDR_STR_POSTINDEXING) 
|| ...)

         return true;

     else

         return false;

}

And then in

enum io_state try_handle_mmio(struct cpu_user_regs *regs, ...)

{

...

     if ( !check_instr_is_valid(info->dabt_instr.state) )

     {

         ASSERT_UNREACHABLE();
         return IO_ABORT;

     }

...

}

Please let me know your thoughts,

>
>>       {
>> -        int rc;
>> +        ASSERT_UNREACHABLE();
>> +        return IO_ABORT;
>> +    }
>
> [...]
>
>> @@ -1982,21 +2030,18 @@ static void do_trap_stage2_abort_guest(struct 
>> cpu_user_regs *regs,
>>               case IO_UNHANDLED:
>>                   /* IO unhandled, try another way to handle it. */
>>                   break;
>> -            }
>>           }
>>             /*
>> -         * First check if the translation fault can be resolved by the
>> -         * P2M subsystem. If that's the case nothing else to do.
>> +         * If the instruction syndrome was invalid, then we already 
>> checked if
>> +         * this was due to a P2M fault. So no point to check again 
>> as the result
>> +         * will be the same.
>>            */
>> -        if ( p2m_resolve_translation_fault(current->domain,
>> -                                           gaddr_to_gfn(gpa)) )
>> -            return;
>> -
>> -        if ( is_data && try_map_mmio(gaddr_to_gfn(gpa)) )
>> +        if ( info.dabt.valid && check_p2m(is_data, gpa) )
>
> This check would need to be adjusted to check the instruction state is 
> INSTR_VALID.

Ack (To be addressed in v10).

- Ayan

>
> Cheers,
>


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 11:47:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 11:47:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284199.483395 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ6PK-0001PA-Oz; Fri, 04 Mar 2022 11:47:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284199.483395; Fri, 04 Mar 2022 11:47:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ6PK-0001P3-Lf; Fri, 04 Mar 2022 11:47:38 +0000
Received: by outflank-mailman (input) for mailman id 284199;
 Fri, 04 Mar 2022 11:47:36 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ZVQB=TP=citrix.com=prvs=055bc9087=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nQ6PI-0001Ow-7i
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 11:47:36 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id dfd165b2-9bb0-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 12:47:32 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: dfd165b2-9bb0-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646394453;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=zNnai2QU1i1dnfdGH+ixaSOl/8N4O+FSaPHPPAGZ0dI=;
  b=ajcAfW/tR+3zhIHALjKYWoYcGsHrTxEE0NDtvNfgnRwX8VA5iFgquB8D
   p9tzuRt/MdOdcCHPpwoqVdNGDBmKLVhi2+46EunyyqebxXroDoaMdp8Ei
   7oOmNCtkrxK6TtfXxdUU+VClIu5q4Yn1xdukQmNP636+/m/v9Sy0EdsuD
   A=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 64943038
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:tEiSDqMLZHc7aBHvrR2Nl8FynXyQoLVcMsEvi/4bfWQNrUp3g2AOy
 TNKC2qAPf+LZDPwLdwgYYrkp04GsZLRnNBiHQto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi2tIw27BVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Zw
 otisI2MexsTJbDOqtg2AkMbIj5uIvgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALNs7kMZlZonh95TrYEewnUdbIRKCiCdpwgmth2psWRqa2i
 8wxSAVXdR7tZBR0Z1o8UZdimMyrql7wfGgNwL6SjfVuuDWCpOBr65DyNPLFd9rMQt9a9m6Iq
 2SD82nnDxUyMN2E1SHD4n+qnvXIny7wRMQVDrLQ3vxgjUCXx2cTIAYLTlb9qv684maiW9NEb
 U0PvCN2qbM18mSkS9D8W1uzp3vsg/IHc4MOSatgsljLk/eKpVbCboQZctJfQNZ4m8oneQ427
 ESUneHVLm0184yKWW3Io994sgiOESQSKGYDYwoNQg0E/8TvrekPs/7fcjpwOPXr14OoQFkc1
 xjP9XFj3OtL0abnwo3mpQivvt66mnTeoufZDC3zV3nt0A52bZXNi2eAuQmCtqYowGp0ozC8U
 Jk4dyq2sbhm4XKlznXlrAAx8FeBvazt3Nr02wIHInXZ327xk0NPhKgJiN2EGG9nM9wfZRjia
 1LJtAVa6fd7ZSX2M/QsOdPqU5p2lsAM8OgJsNiONLKihbArKWe6ENxGPxbMjwgBbmB2+U3AB
 XtrWZn1VitLYUiW5DG3W/0cwdcWKtMWngvuqWTA503/i9K2PSfNIZ9caQfmRr1pvcus/VSOm
 /4CZpTi9vmqeLCnCsUh2dVIdg5iwLlSLc2elvG7gcbYels2QDx6UqSJqV7jEqQ895loei7z1
 ijVcmdTyUblhG2BLgOPa3t5b6joU4o5pnU+VRHA937xs5T/Se5DNJsiSqY=
IronPort-HdrOrdr: A9a23:qEOZ4aBmVOglq+vlHehAsceALOsnbusQ8zAXPh9KJiC9I/b1qy
 nxppkmPH/P6Qr4WBkb6Le90Y27MAnhHP9OkPIs1NKZMjUO11HYTr2KgbGSpgEIXheOi9K1tp
 0QDZSWaueAdGSS5PySiGLTc6dC/DDEytHRuQ639QYTcegAUdAH0+4WMHf+LqUgLzM2eabRWa
 Dsr/Zvln6FQzA6f867Dn4KU6zqoMDKrovvZVojCwQ84AeDoDu04PqieiLolSs2Yndq+/MP4G
 LFmwv26uGKtOy68AbV0yv2445NkNXs59NfDIini9QTKB/rlgG0Db4RE4GqjXQQmqWC+VwqmN
 7Dr1MJONly0WrYeiWPrR7ky2DboUITwk6n7WXdrWrooMT/Sj5/IdFGn5hlfhzQ7FdllM1g0Y
 pQtljp+6Z/PFflpmDQ9tLIXxZlmg6funw5i9MeiHRZTM83dKJRl4oC50lYea1wUR4S0LpXXt
 WGMfuspcq/KTihHjDkVyhUsZaRt00Ib1i7qhNogL3X79BU9EoJunfwivZv3Evoz6hNO6Ws19
 60Q5iAq4s+PfP+TZgNc9vpEvHHfFAkf3r3QRCvyBLcZeQ6B04=
X-IronPort-AV: E=Sophos;i="5.90,155,1643691600"; 
   d="scan'208";a="64943038"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ZeQWOSn0gASdcYzVl8rvwesLdVer1Qkl/7acOdWuqXS3YJFtGXgCx9Cs31Z10A7la9U8LiYmFC5QbDsEMXLbrc1TF7ixkXfL2n3dnI6HHmur6vOf9pwXtWYTSB+SZPVrdugtmb8SvN9diMtfxn4LyE95zfyWXLkAJ29UKMs7DpxTanJkvNBgXSQ5nCY+LzUuS/H7q8FDXkM0kje7UbUID7KlhlkRsLNkNe49MQt5DNNln+MDD6UdNUf53jgWHIC9OaGfFwOkLa9BX9Cut+cHTaoAkhW5xEIdjR4qR+xi9bPWwFDbu7/GG+ecD5h2JRYz1gR0+FiDOMrxszrqEKohcA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=sKZJJsgBO+owu6MKwQuWnkINJXMgAiL/wyH8JKhCKX0=;
 b=SBC9EaIJZYfn74c0HRelxyFRsmmy/3zvKUmHqGBZdZZXos3klNcDzR4tYLvtVnHBBscJlLyiBdFRIEMAT7iUHTCD17q4rcwCD8e4PR8QRTguOd2IrCoUAboczB2ZRaNIrEI6D1wwm+dm5fdp4LeqU4QzGp21u0YuATDw5gxTLg74pp7/t37TKlo5V21Pzi+GWksN9InO83sUeabZfXiD9aHy7J3PdKlBE46tpkrIzQdieVTZtE/9xuAKgbKzz45FmI+yCqVj9EtDbkT1JM+nLXi6Xuc5/q6ZLYVXyvJHFeusgx/pZW7U8eLz2AuwDiwQaRPqenPtFGObYGTlv06dtg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=sKZJJsgBO+owu6MKwQuWnkINJXMgAiL/wyH8JKhCKX0=;
 b=Yt2jwKG51FE7fXFbQ8qYiSNCj5YqZgcW1BEuXe6OtI0SETgEWwi1EsfA/o88Iaaro/ROl1otmmXvKG3FcGaiYzIjIEoad76toUnVsFtvuGeGy09H/ISh3sNGD5Em6e38h0NsJl9BYECdv+dnOm7L8QW3YaBT+X2GcPZjPSIoteQ=
Date: Fri, 4 Mar 2022 12:47:21 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>, Alex Olson <this.is.a0lson@gmail.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH 3/3] hvm/pirq: allow control domains usage of
 PHYSDEVOP_{un,}map_pirq
Message-ID: <YiH8SQxHGZBrQo5D@Air-de-Roger>
References: <20220303103057.49181-1-roger.pau@citrix.com>
 <20220303103057.49181-4-roger.pau@citrix.com>
 <9a02db6a23b269fe774ad4a0bc4c662e5e4df37c.camel@gmail.com>
 <c416bfc2-218a-e641-5fd7-505ea4f7a322@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <c416bfc2-218a-e641-5fd7-505ea4f7a322@suse.com>
X-ClientProxiedBy: MR1P264CA0119.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:501:50::14) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 44aeca14-4a49-4669-409e-08d9fdd4c1e3
X-MS-TrafficTypeDiagnostic: CY1PR03MB2345:EE_
X-Microsoft-Antispam-PRVS: <CY1PR03MB2345E8BE34078D5072BF23AB8F059@CY1PR03MB2345.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(6486002)(508600001)(85182001)(53546011)(6506007)(33716001)(110136005)(54906003)(316002)(82960400001)(66476007)(8676002)(4326008)(66946007)(8936002)(38100700002)(83380400001)(66556008)(6512007)(6666004)(186003)(86362001)(2906002)(26005)(9686003)(5660300002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?TUVITmpJSmJ0Zm1xb3dtcEx3NVR0TE1GSHp2VEtFMVowMHR0aHJDbzZnVzRH?=
 =?utf-8?B?OXFUUlIrSjBqSE1xdnRrS3pGeGJCdTNQajJtR3V3VG9vcjBxdXF0cWlCbmtX?=
 =?utf-8?B?NzQwUklySlR6WGJBYk1Zak5sV1IyR0RFVlhuZjljZnZZZ1RHL09pYi9iQ1Z2?=
 =?utf-8?B?RzZyOHp2bDNEWTdxYkordzlzMndxRnlUU0IvcVdpY1pnS3hRYVpiZnQxZG5M?=
 =?utf-8?B?R3dNb1hOV2h3b3NqM1UyWWx4T25Va2JCd0xmUlZGSTBNQkdjRUM5U0RwVnhG?=
 =?utf-8?B?amhrNXc3clZ2UlVkZzlqRUsyNXVrbFNIWk1KMXFRVmVyVFBic1dKbXU2Q3ZD?=
 =?utf-8?B?VC9sYnJSc3BwdlhRNHVLaHc2dmpzQXd3L1JDcXBTdkJKcDVvTkxwWmxic1pN?=
 =?utf-8?B?U2JyUlZqSlNUR0FUd3NRVGdISENhWnVtbG5aY2tTQlpTZGgvczNMMys0K3Jl?=
 =?utf-8?B?aDZFZGtiMjBvQTJOTDJSSENvWmtPWnZ2OGU2UHFMdlJSOHFWUDhUTG55YS8w?=
 =?utf-8?B?TkVhTUFXSkdnd2p3RUhYaDBoY0s2QlFnRXpkQXJ6ZXFOamc4TnYwK3p1a1Vl?=
 =?utf-8?B?M0tjQVI4Z1RDT2E5dkZLRHJObzNKeDBMYmlsdnJ2Y0Q5b2I5dEl6UzhmaU1w?=
 =?utf-8?B?eTZYUVVkL3lkVkdEMktKbmZZa01IODRLZjY1bEVqSHBnRzVET1NrMkZ6WkdJ?=
 =?utf-8?B?SDlBOW1XVUw3U3FXZXgvNjYvWkozeFNKMldMU3lkbittRWsvckpkZnMwajAy?=
 =?utf-8?B?QXhjS3NlUVU5a2NaemdiWSs5NmR4eCtISS9XMlAwNitQY2JTZm9qMk83WXc1?=
 =?utf-8?B?UUJZSWR4VnNiM0JrYXoraVBpQjBVaVZNdENnNUhTS1ZNT3JGNVlBRHRPL1dy?=
 =?utf-8?B?b20rdzlWWUZ6YzAydzMrOHd5N0wxL1RKdW1MSWtKVk8wRDMvZUQzbS9oYlNE?=
 =?utf-8?B?dCtOaWoxa2VMOWRHeGRGT0I0aUM2YWczTDFDQTc4NlRBZUd5U1M2VmFWYldF?=
 =?utf-8?B?MUJkKzFVRXo2dkUyM2dxc280eEN5V21ORHlCT0U5ZDcxb2RhSi9tZlZSUFpu?=
 =?utf-8?B?OGJLRjBrd01NbFJDajNMblVmVXdkYkx0Y2tmK29SNmdkUWJNd0ZPUVRuTjBQ?=
 =?utf-8?B?bEJCNjBCVmNNK1pSQ0RSZ29BOXRZdmw5VHFVbnZQNUJuaDdBTm5tTE9TMkFz?=
 =?utf-8?B?aFh1OXRzcjVuMFZMOHFOaWJ1c2NFaUVGWnJ5SXpFOHdPbm9Kb21zdDBPZElp?=
 =?utf-8?B?Ym9Gb0VTQUZQYlBMT0VEbXRlNTloZklQSnRtUEFKaTFvRnNKTVJrMWs0VGVN?=
 =?utf-8?B?Mzk3SlhSSlIzTDZEczBUSVhKbklMNFZpSE1jRXhOaHhuSElKVmNVWjloUVVY?=
 =?utf-8?B?VkdFSGxVenk0NXNNNGxEQVhGaGJyUWUyWEZ1cDhNWXFFVlphemJucUtpZTNZ?=
 =?utf-8?B?VFpUaFZ4WXlOQjV1YmJmL3d4c3BPK3VNRlFhY0dyU3o0VldkcFkwOUF2Zm93?=
 =?utf-8?B?Z0tTSGNOVHlaOU5hSGdtUUx5NnV1UURKNDRWcTRUWXZ4V1RiSGRaNFpxUHZZ?=
 =?utf-8?B?a3NQbzl4b2V2bzFyQisrS0F2NVVjdmFMQW9CYnkzOEh0aTNaMFVyMS9mR0Vp?=
 =?utf-8?B?Y09Dd095RDNLMUdYaG5YRVJvUkhEY2ZSZXV3SlRSck82d2NJTFVPK1RNbjQw?=
 =?utf-8?B?OVYwdTFFdkRtL3crMWNpSDRKNXQzZUh0WGlMdlpWaHlSbkxDMFZlbVJ1NFM3?=
 =?utf-8?B?NXB5L0U3OWZ2S29BU1VHTURaNUs0UjAvYlQ2NzUzQ3V2dDB0bU5JYThMVmIw?=
 =?utf-8?B?TFFiWHdFRzVrQUxMejNGOGI2YkpIVzVwdm45ZGs3dHBaaHpFR0tPYnpNTExX?=
 =?utf-8?B?dXJpYVRNMlBRSDNIZk5iaEZKUCtPODBIMG9KUTNVNXdCWTQrSjZ6RURDNTlU?=
 =?utf-8?B?UjQxUFhvUHUwbFpTSGZVVEwrVjNRbWxXYWl0eTI2ZGxwa2MrQ1BoSnM1eEZq?=
 =?utf-8?B?aHJ2NXl1NXJKNGNDcEtmeERxMzRISExlNG81VHlubGhnNDMwalNZOHg5c1Zw?=
 =?utf-8?B?bnR1cElnVFloOUR6bURYQlp5ZFlJZ3pMVzVGcy94R0p2YVQwSlVtcmVYRGN6?=
 =?utf-8?B?VkZqUnhIbGNRM2NsdDIrY0o2cm0weUwvajh5L0QzQTRRZFE4eUsxYnJmVEpS?=
 =?utf-8?Q?2aAKY7LznhFB6IaH9fJGKnQ=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 44aeca14-4a49-4669-409e-08d9fdd4c1e3
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 11:47:28.0574
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: nDWJdAHQSGuVqD0Mhk+BaRSUXWtULbNFPIXCDpwE9hfAawaCCzxEXVVFATCxEdvkEUpwsknaTDbdz2FKBwzJqg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY1PR03MB2345
X-OriginatorOrg: citrix.com

On Thu, Mar 03, 2022 at 05:47:48PM +0100, Jan Beulich wrote:
> On 03.03.2022 17:45, Alex Olson wrote:
> > --- a/xen/arch/x86/hvm/hypercall.c
> > +++ b/xen/arch/x86/hvm/hypercall.c
> > @@ -84,6 +84,17 @@ static long hvm_physdev_op(int cmd,
> > XEN_GUEST_HANDLE_PARAM(void) arg)
> >  
> >      switch ( cmd )
> >      {
> > +
> > +    case PHYSDEVOP_manage_pci_add:
> > +    case PHYSDEVOP_manage_pci_remove:
> > +    case PHYSDEVOP_pci_device_add:
> > +    case PHYSDEVOP_pci_device_remove:

The add/remove options are already available to a PVH hardware
domain.

> > +    case PHYSDEVOP_manage_pci_add_ext:

This shouldn't be needed in principle for a PVH hardware domain, as
the plan it to emulate accesses to the SR-IOV capability and detect
VFs that way.

> > +    case PHYSDEVOP_prepare_msix:
> > +    case PHYSDEVOP_release_msix:

Those two are likely fine to use for a PVH hardware domain (not the
control domain). AFAICT they shouldn't interact badly with vPCI.

> > +        if ( is_control_domain(currd) )
> > +            break;
> 
> These are all operations which I think are purposefully permitted to
> be invoked by the hardware domain only. That's where all the devices
> live when they're not passed through to guests.

Indeed. I think it's only the {prepare,release}_msix operations that
needs adding (but would need confirmation they actually work as
intended in a PVH setup).

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 11:52:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 11:52:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284206.483406 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ6U5-0002n2-CR; Fri, 04 Mar 2022 11:52:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284206.483406; Fri, 04 Mar 2022 11:52:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ6U5-0002mv-97; Fri, 04 Mar 2022 11:52:33 +0000
Received: by outflank-mailman (input) for mailman id 284206;
 Fri, 04 Mar 2022 11:52:32 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ZVQB=TP=citrix.com=prvs=055bc9087=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nQ6U4-0002mp-0V
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 11:52:32 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 8fc0d858-9bb1-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 12:52:29 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8fc0d858-9bb1-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646394750;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=y48Ralyrh3stW0qN99zYGluAAU9Me+EQ6N1k1JQNq20=;
  b=OaXc35lVZy8EJ9TpesPxQUhxq5vSU7Sk+cZWAhiQZw3Lf4AGpCoxctQP
   MtRNU8hKRk9uLmNXFzSeKQ/Bb4VQkzDUVVJL5jrjDhMGiYi9CFHdK+vPr
   7nFKd6roPcm/8V4tTCMUWzchjOPGLyafrSLKanHrcHuym3/nfTuzFD7xR
   0=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65465451
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:GRO0a6unCo6M/nSUhLqdxfmtR+fnVGVeMUV32f8akzHdYApBsoF/q
 tZmKWqObPuLZDbzftFxO9nj9x4OvcXVndBhGgdl/ik0RS4T+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jV5
 YuoyyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi8bJo2d27ktayJVLAYvEpVk8brHE32W5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AO
 pZHNGYyNXwsZTVCal0qBJkh2961oSTEfwZDo2C8pfQOtj27IAtZj+G2bYu9lsaxbdVYmAOUq
 3zL+0z9AwoGL5qPxDyd6HWui+TT2yThV+o6C7mQ5vNsxlqJyQQ7ChQQWUGqvPqRhUu3WtYZI
 EsRkgInq6Qo+UXtVcXwQRS+qWKDlgUVXcZZFesz8ACWw+zV/26k6nMsF2AbLoZ87YlvGGJsh
 gThc87V6SJHgqW1GDHAxo+voAyVaActD2YHZR0BZF5QizX8m70bghXKR9dlNae6iNzpBD39q
 wy3QDgCa6Y71pBSifjilbzTq3f1/8WSEFZpjunCdj/9tmtEiJiZi5tEALQxxdJJN86nQ1aIp
 xDocODOvblVXflheMFgKdjh/Y1FBd7YaFUwYnY1RvHNEghBHVb5J+i8BxkkeC9U3j4sI2OBX
 aMqkVo5CGVvFHWrd7RrRIm6Ft4ny6Ptffy8CKyKNYEUM8MpKlPclM2LWaJ29zq3+KTLuftiU
 ap3jO72VSpKYUiZ5GDeqxghPU8DmXllmDK7qWHTxBW7y7uODEN5up9eWGZimtsRtfveyC2Mq
 o43H5LTl313Db2vCgGKoNV7BQ1bchAG6WXe9pU/mhireVE9RgnMypb5nNscRmCSt/8Nx7eQo
 yrkARcwJZiWrSSvFDhmo0tLMdvHdZ1+sWg6LWorO1Op0GIkeoGh8OEUcJ5fQFXt3LULISJcJ
 xXdR/i9Pw==
IronPort-HdrOrdr: A9a23:236lzqFODS93f7/opLqFCpHXdLJyesId70hD6qkvc3Nom52j+/
 xGws536faVslcssHFJo6HmBEClewKnyXcT2/htAV7CZnichILMFu9fBOTZsl/d8kHFh4tgPO
 JbAtRD4b7LfClHZKTBkXCF+r8bqbHtmsDY5ts2jU0dNT2CA5sQkTuRYTzrdHGeKjM2YabQQ/
 Gnl7V6TnebCDwqR/X+IkNAc/nIptXNmp6jSRkaByQ/4A3LqT+z8rb1HzWRwx9bClp0sP0f2F
 mAtza8yrSosvm9xBOZ/2jP765OkN+k7tdYHsSDhuUcNz2poAe1Y4ZKXaGEoVkO0aqSwWdvtO
 OJjwYrPsx15X+UVmapoSH10w2l6zoq42+K8y7uvVLT5ejCAB4qActIgoxUNjHD7VA7gd162K
 VXm0qEqpt+F3r77WvAzumNcysvulu/oHIkn+JWpWdYS5EiZLhYqpFa1F9JEa0HADnx5OkcYa
 VT5fnnlbdrmG6hHjDkVjEF+q3uYp1zJGbKfqE6gL3a79AM90oJjXfxx6Qk7wM9HdwGOtx5Dt
 //Q9dVfYF1P78rhJ1GdZU8qOuMexrwqEH3QSuvyWqOLtBzB5uKke+y3IkI
X-IronPort-AV: E=Sophos;i="5.90,155,1643691600"; 
   d="scan'208";a="65465451"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=BmS1WwhK5gqeuYax8EbU1WNZOAcvvc36kgVxsZfaia/LCJ8NY1Yau7bgicuuszeHnFthUzvQ2kYVdiwA/hclWNeORWXJP0ZFPdK6ZgcMpPtGSM4uMQJHOs/tBcaSAToShSfoSm7bMIycgHVZQtlpete5NDvVccShQ1JzeNm64Ed5l2JrdDUgrCun7mzGSWHDsL3/eALw7hy2OfEcaBZwYh0uNjINA/J5diwEgb2mA+XSSbh12h2k0F5E9OqJdLsAFOy/3sotJX/F/ix276B4K5DQ9dSahBn5C+5kq3CZFpi4Pfd1XPtSzrYMB1fKwhBhyBKsv4x5Yfrd9ydNZkrAkw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=j5SS1dHuYycuSoYehj7iJaF3D097KEM8AVMqmxjTuLI=;
 b=gqBWJOmOnOVkI/88BehHMfzh0wQ9Y5o4mty9eRN06iPS6U9/gv3mcTr7a3AKmRwOoe1asWUqIG+Sd31lKSfRTkpVwg7rKIcfeceFS3f0uTtj226ZeUAeKBsywW3JXPApbqiPLmtFgefy2w5YpzMP0ek+Ch5lIKw08vhrBf2suL+zn708FolhBKMwcxw9Po6hePJqjVDtDIdNGF8SfE9GW04MN2xCTXO/tOqjevQX5YroTpMUu+yrj8nl6DbEMpXMrDRz/CaY1tYCeObG/O/B/vGMcY/1cPr1u8mplj6IxnMbiyP1RdjZPhn23C3xn9ZzhI+empKhpL7qUVMgl1fCSA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=j5SS1dHuYycuSoYehj7iJaF3D097KEM8AVMqmxjTuLI=;
 b=gpPDb8+ZfMmt/JXmGgbrI8M3WtIZOWFNVmQ93mDjZwEkim4nBGq0+CTR+zZDKl0zqxhdbvZLge8CXLI6Rx8lpFEhnxjhrb6B2AS0vhatyp3JIeDzqigQGPXqASi1hQB1VRKKMQIZk+Na3GO3hNSgbi30oNm7R1ImdsL4HDi8GOo=
Date: Fri, 4 Mar 2022 12:52:17 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jason Andryuk <jandryuk@gmail.com>
CC: Andrea Stevanato <andrea.stevanato@santannapisa.it>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	"wl@xen.org" <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>
Subject: Re: Network driver domain broken
Message-ID: <YiH9cee6NIKA6MWg@Air-de-Roger>
References: <DB7PR03MB50027EE92E11BFFF71AADC4598049@DB7PR03MB5002.eurprd03.prod.outlook.com>
 <92827eec-b6e9-9c95-8f9e-fcf063d45090@santannapisa.it>
 <YiDt7fX92n6Luc2l@Air-de-Roger>
 <CAKf6xpsnmQG7-LXn5+Uz4mncWsN0EZ8wpagY8f8OydvZNb6g5A@mail.gmail.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <CAKf6xpsnmQG7-LXn5+Uz4mncWsN0EZ8wpagY8f8OydvZNb6g5A@mail.gmail.com>
X-ClientProxiedBy: MRXP264CA0036.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:500:14::24) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c90bd553-6729-4377-c9ba-08d9fdd5707d
X-MS-TrafficTypeDiagnostic: SJ0PR03MB5469:EE_
X-Microsoft-Antispam-PRVS: <SJ0PR03MB54695A2BBE67041324D884EE8F059@SJ0PR03MB5469.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(2906002)(82960400001)(85182001)(86362001)(38100700002)(83380400001)(6666004)(6512007)(9686003)(5660300002)(33716001)(4326008)(26005)(186003)(8676002)(6506007)(53546011)(316002)(6916009)(8936002)(66556008)(66476007)(66946007)(54906003)(508600001)(6486002)(3480700007)(107886003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?YStQL01RNDFpc2FJMFZqcDdFZC8zb3pjNnN4K0twYURXVG5SbzBPTjdzMzYr?=
 =?utf-8?B?NnVDV2VvTFdScXBuYXlxemo2V2NHRTdpU0tJNHdzL010RE9vNjZBZjM3NDV6?=
 =?utf-8?B?YWI1cGhZamNJY3hCN1NRbnhMbWEyV010RzZUOVkyVU9lK1dVckNuSFBkWVda?=
 =?utf-8?B?eS9aRmM0YnpWOWRkUCsrNmE1YXBEOWpCSkJRYXNoT2NwQ1gxeE85V3RQUTBL?=
 =?utf-8?B?NEh2S2duN3F3NmxnNW0zTE1lSWJUVEZPMlhTdE1qQ3NqZXdFc2ZKWUllcEt0?=
 =?utf-8?B?ZExnSGJFdldXY0k1SXVWcGhqNG5BQWdsUFgwWHkxeGY4YmZnZkpTZWo3VFZG?=
 =?utf-8?B?TEQ3bHA1MFlHVTk1WVBaUlc4aDhUVGtSWXBPT1RKU2h2dHRkdkhPeGlzcC82?=
 =?utf-8?B?dUNSTTBpemFuZWJXU2ZnREpLc254VTV2cmwxak1nZHJoc0hsUEVDOWVUVGxq?=
 =?utf-8?B?ZEkvNEQzSzN5UnVQd29rRGMwMlFJMGx0TnhhcHU3eUhEMVJZUUV2MW5VQVVH?=
 =?utf-8?B?Qm1YTThCVjVId0tld1FZQW8yeUxBbDIxQlA0L2l4eEphZHVKbitJM1FmbXY2?=
 =?utf-8?B?RG8zRUtMUStOUzEveUFKRTMwS2xRbFZaUjF3bnFaS29YS1ZpV3JMYjR6cDdP?=
 =?utf-8?B?REN6TVhGbFB4WG9DVWpSZzFkWW9oeUhyUXBQOVBKVkxBQy8xVjBaaGlYeXJ5?=
 =?utf-8?B?OVZNdk1SbUo3WDBsVkVVdXZlb3c4b290bHVObnlWZVNQeFhaZHhnRGhUZXVQ?=
 =?utf-8?B?b3FoeFV1dHVOOXl1YUY3VG1UdnAxRVJnWnNpR3lXdDZmZVFjR2Fib2JKeEwy?=
 =?utf-8?B?c0tqWGVxRU9TektNaDMvTHpsQWNmNTMwSlNyYkhwRkZuQWM5cTF4WERnM3dH?=
 =?utf-8?B?YzB6SHg3alRNcnBZOHhvdlUwcUsrOW8vZjUraEg3bjhjRHBSR3ppdU5JZkdC?=
 =?utf-8?B?a0U3SlF5RTBCS0lBaTErNWdvWVJCRWRlQmJGWk91MDltSEtVTUs2NjE1UExL?=
 =?utf-8?B?dFVIdWwweC9ObGUzOGM2Z2VOUjhGYkJkemNsNjZHdnhwOEpxR3VwT1ZxR0NB?=
 =?utf-8?B?elhFVzl2V29sOHhQcm4yWmg5bXgxMUN1c0cxRXg1cnZrdmd6c0l4N0U1cUJ4?=
 =?utf-8?B?REN6cngxYWloMkNBREJyeXpROTdRc0w3RUJoakk4OVhNOG8vL204REkraDR6?=
 =?utf-8?B?cXNaUWVNZCtoQThXZzVUZlE5T2lOL0t6elpWY29CSWNIK3V2R1pWb1ozZnQv?=
 =?utf-8?B?aktOZGwyd1ZreE1VcDFrdGhucVp2T3FyRkdneUIvb2VicEhlWTZXVlFoejdj?=
 =?utf-8?B?aHNMcHc0bE1wY3V2aG5yUFBHTnlSckVpU2FlOVJGbGFxaEdSNlBDekRjOFlx?=
 =?utf-8?B?UlFsTy9RRzNsclIybTdyUHgxT08zZ3JzNVAweEFQdzNLQ0xJUmttK3ZuczlJ?=
 =?utf-8?B?SnBuOU9JYXhQMkt5ZWZuZ3NiN0FLd21WSDNRbUYvdnhMYUc4cVZFeXREQUZo?=
 =?utf-8?B?Q0dtdDZNeWF6MHBDaXFBYXZiQWlMalVBcm9rQlFNR0dxUWxhN2lmeGhjY2h1?=
 =?utf-8?B?cDMvZWgrNkgrbENXUDlxSkc5OE1WUC95K3ZYVnlPSVBFQXBvUzd5Ryt2bGpx?=
 =?utf-8?B?WTVQYjA5c2hFM2ZTaS9kVTlHdjNVM2h4WndzWmw2UFNDSnpEeWxLRDlIN2dn?=
 =?utf-8?B?SlVtcmlONDdaYzl4R3BhNWgvT1p1ZlR2aUl0N0ZHdmxTMHpyMHQ0M2FmdFN1?=
 =?utf-8?B?K0VjSlZ5c0RWZ3VueS9kVExSWkQrQXRyRDA5UUkyVU16TEhRU3ViS2M5OEx0?=
 =?utf-8?B?U2dVa3pCUzFCV0ZzRlI4bjRLdk5OcVVISmpJZDFBSlIrWWdNai9GbkNLT0ZF?=
 =?utf-8?B?N3ZrZlBzWmhDMkt6UFUrSUoyOWFjQ2FDOHBVRVVNZkhrSWJVOVRKbEpNZXoy?=
 =?utf-8?B?ZWVKTzIzTHFZL2RVUGdKMk9XdEFMQzlCSWk4R2tXTDRlcWU0WXJaTlF5djd5?=
 =?utf-8?B?dXVaS3QzOEdkK3ViMk4xWjRySzc0SHJ3THlmTDFWMUtRR3dxMnp2bTBvT0VJ?=
 =?utf-8?B?aWxWajFMY3dONkxiQU81S1M4dks0akR0THlZUGZGTGI0S3ZsK3NhMG1ENXB3?=
 =?utf-8?B?aFBTMmd0c0EyQTdCbUNBNzcxK0VTcnpVdjRmbU43S0dKWjRUUUVpLytNQWgr?=
 =?utf-8?Q?g2zMKk29wekR1GvYIpS8wE8=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: c90bd553-6729-4377-c9ba-08d9fdd5707d
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 11:52:20.7896
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: pc+cz8DKgpL/Wczacuc0uJFSPMEGFYW3r1rbUVc542CEUby2cumJM2l+agazLMQy2YziT4p0XD2OWf4T9WedsQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR03MB5469
X-OriginatorOrg: citrix.com

On Thu, Mar 03, 2022 at 01:08:31PM -0500, Jason Andryuk wrote:
> On Thu, Mar 3, 2022 at 11:34 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
> >
> > On Thu, Mar 03, 2022 at 05:01:23PM +0100, Andrea Stevanato wrote:
> > > On 03/03/2022 15:54, Andrea Stevanato wrote:
> > > > Hi all,
> > > >
> > > > according to the conversation that I had with royger, aa67b97ed34  broke the driver domain support.
> > > >
> > > > What I'm trying to do is to setup networking between guests using driver domain. Therefore, the guest (driver) has been started with the following cfg.
> > > >
> > > > name    = "guest0"
> > > > kernel  = "/media/sd-mmcblk0p1/Image"
> > > > ramdisk = "/media/sd-mmcblk0p1/rootfs.cpio.gz"
> > > > extra   = "console=hvc0 rdinit=/sbin/init root=/dev/ram0"
> > > > memory  = 1024 vcpus   = 2
> > > > driver_domain = 1
> > > >
> > > > On guest0 I created the bridge, assigned a static IP and started the udhcpd on xenbr0 interface.
> > > > While the second guest has been started with the following cfg:
> > > >
> > > > name    = "guest1"
> > > > kernel  = "/media/sd-mmcblk0p1/Image"
> > > > ramdisk = "/media/sd-mmcblk0p1/rootfs.cpio.gz"
> > > > extra   = "console=hvc0 rdinit=/sbin/init root=/dev/ram0"
> > > > memory  = 1024 vcpus   = 2
> > > > vcpus   = 2
> > > > vif = [ 'bridge=xenbr0, backend=guest0' ]
> > > >
> > > > Follows the result of strace xl devd:
> > > >
> > > > # strace xl devd
> > > > execve("/usr/sbin/xl", ["xl", "devd"], 0xffffdf0420c8 /* 13 vars */) = 0
> 
> > > > ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41b40) = -1 EPERM (Operation not permitted)
> > > > write(2, "libxl: ", 7libxl: )                  = 7
> > > > write(2, "error: ", 7error: )                  = 7
> > > > write(2, "libxl_utils.c:820:libxl_cpu_bitm"..., 87libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve the maximum number of cpus) = 87
> > > > write(2, "\n", 1
> > > > )                       = 1
> > > > clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0xffff9ee7a0e0) = 814
> > > > wait4(814, [{WIFEXITED(s) && WEXITSTATUS(s) == 0}], 0, NULL) = 814
> > > > --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=814, si_uid=0, si_status=0, si_utime=2, si_stime=2} ---
> 
> xl devd is daemonizing, but strace is only following the first
> process.  Use `strace xl devd -F` to prevent the daemonizing (or
> `strace -f xl devd` to follow children).

Or as a first step try to see what kind of messages you get from `xl
devd -F` when trying to attach a device using the driver domain.

> > > > close(6)                                = 0
> > > > close(5)                                = 0
> > > > munmap(0xffff9f45f000, 4096)            = 0
> > > > close(7)                                = 0
> > > > close(10)                               = 0
> > > > close(9)                                = 0
> > > > close(8)                                = 0
> > > > close(11)                               = 0
> > > > close(3)                                = 0
> > > > close(4)                                = 0
> > > > exit_group(0)                           = ?
> > > > +++ exited with 0 +++
> > > >
> > > > royger told me that it is a BUG and not an issue with my setup. Therefore here I am.
> >
> > Just a bit more context: AFAICT the calls to libxl_cpu_bitmap_alloc in
> > parse_global_config will prevent xl from being usable on anything
> > different than the control domain (due to sysctl only available to
> > privileged domains). This is an issue for 'xl devd', as it won't
> > start anymore.
> 
> These look non-fatal at first glance?

Indeed. I was too quick reading the trace and assumed `xl devd` exited
due to the errors, but those are non fatal, the process just
daemonized.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 11:56:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 11:56:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284213.483417 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ6YC-0003fI-Ti; Fri, 04 Mar 2022 11:56:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284213.483417; Fri, 04 Mar 2022 11:56:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ6YC-0003fB-QL; Fri, 04 Mar 2022 11:56:48 +0000
Received: by outflank-mailman (input) for mailman id 284213;
 Fri, 04 Mar 2022 11:56:47 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=mKET=TP=santannapisa.it=Andrea.Stevanato@srs-se1.protection.inumbo.net>)
 id 1nQ6YB-0003f5-HL
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 11:56:47 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04on0610.outbound.protection.outlook.com
 [2a01:111:f400:fe0c::610])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2959e390-9bb2-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 12:56:44 +0100 (CET)
Received: from DB7PR03MB5002.eurprd03.prod.outlook.com (2603:10a6:10:74::22)
 by VE1PR03MB5454.eurprd03.prod.outlook.com (2603:10a6:802:a1::20) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.25; Fri, 4 Mar
 2022 11:56:41 +0000
Received: from DB7PR03MB5002.eurprd03.prod.outlook.com
 ([fe80::746a:e27:47ff:3e90]) by DB7PR03MB5002.eurprd03.prod.outlook.com
 ([fe80::746a:e27:47ff:3e90%7]) with mapi id 15.20.5038.015; Fri, 4 Mar 2022
 11:56:41 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2959e390-9bb2-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=XRwxrzxy9HoVX/eP3HAciMkZORQgIOU7hrd95QqcTiJ9smnybsNammO3lcLcN/IvpodpXxEWo913B0OWjNpiIYkTgtiXmKU6YP6gngu2HNfXGQ54AuGpmyJvlD8cPLuMZQd1K6Uxa2lXZnyA2fJ5dCtQf0W/ZZNIIlytRyMY1EFk3dohk10Is449s8KZChKsNYyym75IOrCHrJ9YoG6klaZcQwXUd9hq4WK2QQB5x6CZXhfmD4S9NtjQGvcyEvTOTamvkzceYedS9+UtJNKOt/3A1u5UGq23Wd9Jz8MXadPQi1x+eLmK6/b8QD6ON1nAT0GQC87rs54QNPMdTeqSyQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=o63noCftgahBZB6mGGSsYpqEcwZ66lBdKmZDDCHIV3U=;
 b=Xba/GBUWkyOnPqmdcD+61obEA6zaoHHx+2nk35w4ysPmI1hoKohP3wRDC9NSYZoxn+p0bzLTjp8hEIz8vB7xtYY8zEFpVV6xHW0i7UKtzFba8Sm9lf7tZKD9bCwzBVV1SbVVNbITZHBKvFJ4owOZcga7JWcVVO7xlqK0Lhb5KfZnOkwCw0AQwL2XGy1LLpToTLj1K/edUQfLXpN02+KJuGf3fgT3z15TYMJBoBYINfnTkjuzVy7DFatY1LiHlN5AWuTqLS8jL/V+7SlxFnMrB1pXA3zkmWfBE61TBTj4hQoL22xGbQCyeZi/gcNV5i8/dlccJR13lwcyxePG/XN0lg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=santannapisa.it; dmarc=pass action=none
 header.from=santannapisa.it; dkim=pass header.d=santannapisa.it; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=santannapisa.it;
 s=selector1;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=o63noCftgahBZB6mGGSsYpqEcwZ66lBdKmZDDCHIV3U=;
 b=KevitR/acGzNoLgkcSrQttMO0uh+GvMdTZZPTL/vdbjrozBQIh0HNIiPwVPRFeF+R1gMvT3jyBTCcEb9MRCMBDSk29MsQGY/cJCXPEpezIymNfwPX34PVcUANbxRAVRgiftlW6AmaiuEEQq73PsvinQvT4hKCkqme2kJB69W5Hg=
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=santannapisa.it;
Message-ID: <1d00a228-a699-5743-69ae-4dbadee5ebb9@santannapisa.it>
Date: Fri, 4 Mar 2022 12:56:43 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: Network driver domain broken
Content-Language: en-US
To: Jason Andryuk <jandryuk@gmail.com>, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?=
 <roger.pau@citrix.com>
Cc: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 "wl@xen.org" <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>
References: <DB7PR03MB50027EE92E11BFFF71AADC4598049@DB7PR03MB5002.eurprd03.prod.outlook.com>
 <92827eec-b6e9-9c95-8f9e-fcf063d45090@santannapisa.it>
 <YiDt7fX92n6Luc2l@Air-de-Roger>
 <CAKf6xpsnmQG7-LXn5+Uz4mncWsN0EZ8wpagY8f8OydvZNb6g5A@mail.gmail.com>
From: Andrea Stevanato <andrea.stevanato@santannapisa.it>
In-Reply-To: <CAKf6xpsnmQG7-LXn5+Uz4mncWsN0EZ8wpagY8f8OydvZNb6g5A@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: MRXP264CA0040.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:500:14::28) To DB7PR03MB5002.eurprd03.prod.outlook.com
 (2603:10a6:10:74::22)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ba0d083d-d6a0-4c8c-485c-08d9fdd60b96
X-MS-TrafficTypeDiagnostic: VE1PR03MB5454:EE_
X-Microsoft-Antispam-PRVS:
	<VE1PR03MB5454D79E6518CB87F5B2C5B398059@VE1PR03MB5454.eurprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DB7PR03MB5002.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(8676002)(66476007)(31686004)(26005)(3480700007)(53546011)(4326008)(2906002)(36756003)(2616005)(52116002)(6486002)(186003)(31696002)(508600001)(5660300002)(8936002)(38350700002)(38100700002)(83380400001)(54906003)(66556008)(6506007)(6512007)(316002)(110136005)(86362001)(786003)(66946007)(44832011)(30864003)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?bnZLZmdaNWppMWs0RUpKa0dyeU1xRHFDZW9zZDFBbDVPbXhTY2ZPN2QzZEJY?=
 =?utf-8?B?VzJ6QkxoL1VwQjJhQjhRL2VWd2sxZHA5R3JZL0t2YjBzbHo3NnBLMFRwd3JT?=
 =?utf-8?B?bHM5RVJiU0xEMHBnVENQRG45Vkc1ekxLdzk4bDJBYzhxYlJpSnRYT0hHQVVO?=
 =?utf-8?B?RzkwMzdBeERPV1A1TjNrbDRKS1d5UWJ0RXdUTlJWeG1SUUovaW8ycHdSRG4z?=
 =?utf-8?B?dVQzcHRFZzdHTmsxdHc2QU4yOXVFaFNhc0ZTbmYxNDU3dVNzMFNHby9Ldm84?=
 =?utf-8?B?M1NaaEtaUXN6ODZWOWQzTjBqMTA5ZFVjdnJEZ1JDbE1PMjFmUUJwUnRkbW02?=
 =?utf-8?B?MkZZM2N1Q0k5TDhER1dyWXZJVmZzUngyKzhLSDY3MWJML2MreExOVi9tVldn?=
 =?utf-8?B?aXVQZUM0ZzhydjRYcHV3Q0hhcGdJY1pSS1BHY0RUY1BzVHRZQTBSMHo5SWI4?=
 =?utf-8?B?bU1EcGxZV1g5cUMzZXYrVzVUYU1SMUluMytwYW4vNldQVFExOEM3aWZGNDg3?=
 =?utf-8?B?cEk5Yy8zWjlzK2VucGV4WWVqaC9wK0RJMUtza01hY05kUzZOZGZ3d0VHdDN5?=
 =?utf-8?B?c01jZ2k0cGx4TDJDTUVBcVpRbHBvYzRpMnhXaFNMVW9yUU96dThhMEdGWHBT?=
 =?utf-8?B?eFROdVdWOVhmMFRqdi8xV3UvREZucGVQTitKbGRkM0pLcVhTdFpJa1UwUUZ0?=
 =?utf-8?B?Wm5Xc0lLOWlDMk84MEpZK2JjQTdPZyt5MmFkeXRQdUtOL1dadFBFbnF6clZK?=
 =?utf-8?B?M09lK2pQMHloanVUeDdzbS9qUk94c1c2dzBGQlRBd05IOGNFcm5kSVFYelow?=
 =?utf-8?B?elZLcnkzVFlFb3doalMyc1FEYmRQbGVHRENEUzUxckxaWHY5UFZPNTE5S0dq?=
 =?utf-8?B?NkdXN3JKUmRnNUJ3cHZtakZ5d2l6algydXdLZ2VVTTArV2FDdFdVU1F3Vjkv?=
 =?utf-8?B?d0N2MDA1UWdma21CRkFLdnFIbjI3L3R1QzUwVjRZYVIrbGp6aEZkSnJYUDlP?=
 =?utf-8?B?dUZPWUE2L2c3dXh1ZUF3YklUZ2pHbE5FRDdPV3AvSCtmM1k2VUJqMTZuaTdN?=
 =?utf-8?B?VUU5Q0JPS1BEdmVqSGpyTlhoNWRDOGpmMHZST2xQMDMzU1B0RmhTV0UzRkUw?=
 =?utf-8?B?dVVBZlpCeDJIQmNMcmRkSVFTdjhuMitJd0dHakF3dGNWbWVBbXdiaHdMUUdE?=
 =?utf-8?B?VDNmSEd3cHFnUytCb2lQc0F2bGpLQzhDdHpTdjN4MDY1MTJhNGw4bUkzRktZ?=
 =?utf-8?B?ejhTTHI5ZmVtdWlpNk8wMEtVb1I4MGd4YzNSbzBPelFwTFdYN0N6RXRQdlJt?=
 =?utf-8?B?Nnd1OXRWbnQyeTVnUStteDBUYnVTNWpmVUVkV0dqTG1pUk5CN0NFUkNIbnFn?=
 =?utf-8?B?dUd4V20rY2NuTmRzN3ZvaG1wd0Y3Q0ZXVkJBbkNpNDRXalNwd2M1OW5za1BB?=
 =?utf-8?B?cHUxWjRNRWI4YU5HejloZUxwSHEra3pIdmZWNXJQWlNwT0NaRXE0dkhjVlpO?=
 =?utf-8?B?emtsRUl5Ui9iNENRdFhSUER2UU5wV1lxdGlTY0luQjlPWTM2ZGNHTWRTUlg3?=
 =?utf-8?B?MlYva3VaYytJZStDdCtOcEkvamVQUEtsRjIycHE3VzhBUEdCV2ExL25PNzhx?=
 =?utf-8?B?eCtqc2FZTFlBK1liVHJFRUNyMUJQcS9YRkRwUTR3Q1ZnazVQMjRkczRIMjcw?=
 =?utf-8?B?c3ZRNzB3MG90ZmU5THUxZmlaMjJKR056d2FxclF4NDQrb0hYNElPU2lXUTI3?=
 =?utf-8?B?OU5qRURYazBPNCtGYmd2eDg0NTZiRGh5bTZsc1B5b1c4SFFucGhsT1NPZ2px?=
 =?utf-8?B?Yno3M09vOGVheFRmSlVrKytXY0MvWEp0M2NxZ1JUUVJLTlJDNE5ZRzJrSHRW?=
 =?utf-8?B?RE1vS0d2aWxpODY4RHR1Z0REWVVzZzhMN21YKy9iYVV1aDhGL0ozWW8vSlly?=
 =?utf-8?B?WEgxdGhjNzE3R0wrWTBLQlJUSHNNSHBYR09yMDRBSmlaOWMzbG8wSzI5N3Nm?=
 =?utf-8?B?WTJGUEFxWUlDZStwVkRQbzMyc050Q0YyUDRYYmVXb0dwdFJPdVZlZXNya3pC?=
 =?utf-8?B?MnpqbWJIbUt5TjRDM1hyVFh0eWRXdXA3ZW51azcxR0tXWlZ4RTdaUisvMTFB?=
 =?utf-8?B?KzVab2dKZXp4UFF5SDZEZGlnVVlOYnBpWGhKNS9LN1RTTEU3VDRzQ3VMTUpq?=
 =?utf-8?B?TFZZVVVPZkowTFRWajV5djhySlBHY1hQVTErUUswMXpTdFBBUkx2eXNiM3k0?=
 =?utf-8?B?U3psOTVhYUZaaVVxdWFHSEFjelNkRUExV1BjRDdmS2dvblVPRCtXNS8wUHNt?=
 =?utf-8?B?a3IzVGVVWGJUalMyNW5INkdWcTFIaXROam10bGkzbVprdDVBVStBZz09?=
X-OriginatorOrg: santannapisa.it
X-MS-Exchange-CrossTenant-Network-Message-Id: ba0d083d-d6a0-4c8c-485c-08d9fdd60b96
X-MS-Exchange-CrossTenant-AuthSource: DB7PR03MB5002.eurprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 11:56:41.0268
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: d97360e3-138d-4b5f-956f-a646c364a01e
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: qPhOrrZzV0lfOs6W902T652uRqf09UVRTNCEErxNMlVZsPJr79Ng4O3jzQsBTN1qmc/VjXLKrfowk9lgBh3L0IjfbpumGfRq8tHMneS4voX7+nVOe+2/I/3nTyrfBKTN
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR03MB5454

On 3/3/2022 7:08 PM, Jason Andryuk wrote:
> On Thu, Mar 3, 2022 at 11:34 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
>>
>> On Thu, Mar 03, 2022 at 05:01:23PM +0100, Andrea Stevanato wrote:
>>> On 03/03/2022 15:54, Andrea Stevanato wrote:
>>>> Hi all,
>>>>
>>>> according to the conversation that I had with royger, aa67b97ed34  broke the driver domain support.
>>>>
>>>> What I'm trying to do is to setup networking between guests using driver domain. Therefore, the guest (driver) has been started with the following cfg.
>>>>
>>>> name    = "guest0"
>>>> kernel  = "/media/sd-mmcblk0p1/Image"
>>>> ramdisk = "/media/sd-mmcblk0p1/rootfs.cpio.gz"
>>>> extra   = "console=hvc0 rdinit=/sbin/init root=/dev/ram0"
>>>> memory  = 1024 vcpus   = 2
>>>> driver_domain = 1
>>>>
>>>> On guest0 I created the bridge, assigned a static IP and started the udhcpd on xenbr0 interface.
>>>> While the second guest has been started with the following cfg:
>>>>
>>>> name    = "guest1"
>>>> kernel  = "/media/sd-mmcblk0p1/Image"
>>>> ramdisk = "/media/sd-mmcblk0p1/rootfs.cpio.gz"
>>>> extra   = "console=hvc0 rdinit=/sbin/init root=/dev/ram0"
>>>> memory  = 1024 vcpus   = 2
>>>> vcpus   = 2
>>>> vif = [ 'bridge=xenbr0, backend=guest0' ]
>>>>
>>>> Follows the result of strace xl devd:
>>>>
>>>> # strace xl devd
>>>> execve("/usr/sbin/xl", ["xl", "devd"], 0xffffdf0420c8 /* 13 vars */) = 0
> 
>>>> ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41b40) = -1 EPERM (Operation not permitted)
>>>> write(2, "libxl: ", 7libxl: )                  = 7
>>>> write(2, "error: ", 7error: )                  = 7
>>>> write(2, "libxl_utils.c:820:libxl_cpu_bitm"..., 87libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve the maximum number of cpus) = 87
>>>> write(2, "\n", 1
>>>> )                       = 1
>>>> clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0xffff9ee7a0e0) = 814
>>>> wait4(814, [{WIFEXITED(s) && WEXITSTATUS(s) == 0}], 0, NULL) = 814
>>>> --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=814, si_uid=0, si_status=0, si_utime=2, si_stime=2} ---
> 
> xl devd is daemonizing, but strace is only following the first
> process.  Use `strace xl devd -F` to prevent the daemonizing (or
> `strace -f xl devd` to follow children).

Sorry, I have not read this part.

# strace xl devd -F
execve("/usr/sbin/xl", ["xl", "devd", "-F"], 0xffffc53b6e50 /* 13 vars 
*/) = 0
brk(NULL)                               = 0xaaab058a0000
faccessat(AT_FDCWD, "/etc/ld.so.preload", R_OK) = -1 ENOENT (No such 
file or directory)
openat(AT_FDCWD, "/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0644, st_size=7840, ...}) = 0
mmap(NULL, 7840, PROT_READ, MAP_PRIVATE, 3, 0) = 0xffff833c7000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxlutil.so.4.14", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\0200\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=68168, ...}) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) 
= 0xffff833c5000
mmap(NULL, 131784, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff83379000
mprotect(0xffff83388000, 65536, PROT_NONE) = 0
mmap(0xffff83398000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xf000) = 0xffff83398000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxenlight.so.4.14", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0`\16\2\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=861848, ...}) = 0
mmap(NULL, 925752, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff83296000
mprotect(0xffff83363000, 61440, PROT_NONE) = 0
mmap(0xffff83372000, 24576, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xcc000) = 0xffff83372000
mmap(0xffff83378000, 56, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffff83378000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxentoollog.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0P\r\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=10368, ...}) = 0
mmap(NULL, 73904, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff83283000
mprotect(0xffff83285000, 61440, PROT_NONE) = 0
mmap(0xffff83294000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1000) = 0xffff83294000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libyajl.so.2", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\320\22\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=38728, ...}) = 0
mmap(NULL, 102416, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff83269000
mprotect(0xffff83272000, 61440, PROT_NONE) = 0
mmap(0xffff83281000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x8000) = 0xffff83281000
close(3)                                = 0
openat(AT_FDCWD, "/lib/libpthread.so.0", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\300j\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=113184, ...}) = 0
mmap(NULL, 192872, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff83239000
mprotect(0xffff83253000, 65536, PROT_NONE) = 0
mmap(0xffff83263000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1a000) = 0xffff83263000
mmap(0xffff83265000, 12648, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffff83265000
close(3)                                = 0
openat(AT_FDCWD, "/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\320I\2\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=1428872, ...}) = 0
mmap(NULL, 1502000, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 
0) = 0xffff830ca000
mprotect(0xffff83221000, 61440, PROT_NONE) = 0
mmap(0xffff83230000, 24576, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x156000) = 0xffff83230000
mmap(0xffff83236000, 11056, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffff83236000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxenevtchn.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0@\f\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=10240, ...}) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) 
= 0xffff833c3000
mmap(NULL, 73856, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff830b7000
mprotect(0xffff830b9000, 61440, PROT_NONE) = 0
mmap(0xffff830c8000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1000) = 0xffff830c8000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxenctrl.so.4.14", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0000\203\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=154752, ...}) = 0
mmap(NULL, 218504, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff83081000
mprotect(0xffff830a6000, 61440, PROT_NONE) = 0
mmap(0xffff830b5000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x24000) = 0xffff830b5000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxenguest.so.4.14", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0PB\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=77248, ...}) = 0
mmap(NULL, 140880, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff8305e000
mprotect(0xffff83070000, 61440, PROT_NONE) = 0
mmap(0xffff8307f000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x11000) = 0xffff8307f000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxenhypfs.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\300\16\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=14432, ...}) = 0
mmap(NULL, 78048, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff8304a000
mprotect(0xffff8304c000, 65536, PROT_NONE) = 0
mmap(0xffff8305c000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff8305c000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxenstore.so.3.0", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0 
$\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=31176, ...}) = 0
mmap(NULL, 107088, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff8302f000
mprotect(0xffff83035000, 65536, PROT_NONE) = 0
mmap(0xffff83045000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x6000) = 0xffff83045000
mmap(0xffff83047000, 8784, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffff83047000
close(3)                                = 0
openat(AT_FDCWD, "/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0@\20\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=14296, ...}) = 0
mmap(NULL, 77920, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff8301b000
mprotect(0xffff8301e000, 61440, PROT_NONE) = 0
mmap(0xffff8302d000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff8302d000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxentoolcore.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0 
\10\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=6104, ...}) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) 
= 0xffff833c1000
mmap(NULL, 69768, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff83009000
mprotect(0xffff8300a000, 61440, PROT_NONE) = 0
mmap(0xffff83019000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0) = 0xffff83019000
close(3)                                = 0
openat(AT_FDCWD, "/lib/libutil.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0`\21\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=14296, ...}) = 0
mmap(NULL, 77840, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff82ff5000
mprotect(0xffff82ff7000, 65536, PROT_NONE) = 0
mmap(0xffff83007000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff83007000
close(3)                                = 0
openat(AT_FDCWD, "/lib/libuuid.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0000\30\0\0\0\0\0\0"..., 832) 
= 832
fstat(3, {st_mode=S_IFREG|0755, st_size=30680, ...}) = 0
mmap(NULL, 94240, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff82fdd000
mprotect(0xffff82fe3000, 65536, PROT_NONE) = 0
mmap(0xffff82ff3000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x6000) = 0xffff82ff3000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libnl-route-3.so.200", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\200\327\1\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=536688, ...}) = 0
mmap(NULL, 609024, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff82f48000
mprotect(0xffff82fc3000, 65536, PROT_NONE) = 0
mmap(0xffff82fd3000, 32768, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x7b000) = 0xffff82fd3000
mmap(0xffff82fdb000, 6912, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffff82fdb000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libnl-3.so.200", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\360\221\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=141304, ...}) = 0
mmap(NULL, 205192, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff82f15000
mprotect(0xffff82f36000, 61440, PROT_NONE) = 0
mmap(0xffff82f45000, 12288, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x20000) = 0xffff82f45000
close(3)                                = 0
openat(AT_FDCWD, "/lib/librt.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\0#\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=31032, ...}) = 0
mmap(NULL, 94568, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff82efd000
mprotect(0xffff82f04000, 61440, PROT_NONE) = 0
mmap(0xffff82f13000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x6000) = 0xffff82f13000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libfdt.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0000#\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=38800, ...}) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) 
= 0xffff833bf000
mmap(NULL, 102416, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff82ee3000
mprotect(0xffff82eec000, 61440, PROT_NONE) = 0
mmap(0xffff82efb000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x8000) = 0xffff82efb000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxengnttab.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0`\20\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=14368, ...}) = 0
mmap(NULL, 77984, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff82ecf000
mprotect(0xffff82ed2000, 61440, PROT_NONE) = 0
mmap(0xffff82ee1000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff82ee1000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxencall.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\320\17\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=14400, ...}) = 0
mmap(NULL, 78064, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff82ebb000
mprotect(0xffff82ebe000, 61440, PROT_NONE) = 0
mmap(0xffff82ecd000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff82ecd000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxenforeignmemory.so.1", 
O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0000\16\0\0\0\0\0\0"..., 832) 
= 832
fstat(3, {st_mode=S_IFREG|0755, st_size=14392, ...}) = 0
mmap(NULL, 78000, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff82ea7000
mprotect(0xffff82ea9000, 65536, PROT_NONE) = 0
mmap(0xffff82eb9000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff82eb9000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxendevicemodel.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0`\23\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=14400, ...}) = 0
mmap(NULL, 78008, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff82e93000
mprotect(0xffff82e96000, 61440, PROT_NONE) = 0
mmap(0xffff82ea5000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff82ea5000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libbz2.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\320\27\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=70472, ...}) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) 
= 0xffff833bd000
mmap(NULL, 134160, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff82e72000
mprotect(0xffff82e82000, 61440, PROT_NONE) = 0
mmap(0xffff82e91000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xf000) = 0xffff82e91000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/liblzma.so.5", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\3403\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=153496, ...}) = 0
mmap(NULL, 217104, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff82e3c000
mprotect(0xffff82e60000, 65536, PROT_NONE) = 0
mmap(0xffff82e70000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x24000) = 0xffff82e70000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/liblzo2.so.2", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\320&\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=120648, ...}) = 0
mmap(NULL, 184336, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff82e0e000
mprotect(0xffff82e2b000, 61440, PROT_NONE) = 0
mmap(0xffff82e3a000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1c000) = 0xffff82e3a000
close(3)                                = 0
openat(AT_FDCWD, "/lib/libz.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\360%\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=92056, ...}) = 0
mmap(NULL, 155664, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff82de7000
mprotect(0xffff82dfc000, 65536, PROT_NONE) = 0
mmap(0xffff82e0c000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x15000) = 0xffff82e0c000
close(3)                                = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) 
= 0xffff82de5000
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) 
= 0xffff82de3000
mprotect(0xffff83230000, 12288, PROT_READ) = 0
mprotect(0xffff82e0c000, 4096, PROT_READ) = 0
mprotect(0xffff82e3a000, 4096, PROT_READ) = 0
mprotect(0xffff83263000, 4096, PROT_READ) = 0
mprotect(0xffff82e70000, 4096, PROT_READ) = 0
mprotect(0xffff82e91000, 4096, PROT_READ) = 0
mprotect(0xffff83294000, 4096, PROT_READ) = 0
mprotect(0xffff83019000, 4096, PROT_READ) = 0
mprotect(0xffff82ecd000, 4096, PROT_READ) = 0
mprotect(0xffff82ea5000, 4096, PROT_READ) = 0
mprotect(0xffff82eb9000, 4096, PROT_READ) = 0
mprotect(0xffff82ee1000, 4096, PROT_READ) = 0
mprotect(0xffff82efb000, 4096, PROT_READ) = 0
mprotect(0xffff82f13000, 4096, PROT_READ) = 0
mprotect(0xffff82f45000, 8192, PROT_READ) = 0
mprotect(0xffff82fd3000, 16384, PROT_READ) = 0
mprotect(0xffff82ff3000, 4096, PROT_READ) = 0
mprotect(0xffff83007000, 4096, PROT_READ) = 0
mprotect(0xffff8302d000, 4096, PROT_READ) = 0
mprotect(0xffff83045000, 4096, PROT_READ) = 0
mprotect(0xffff8305c000, 4096, PROT_READ) = 0
mprotect(0xffff830c8000, 4096, PROT_READ) = 0
mprotect(0xffff830b5000, 4096, PROT_READ) = 0
mprotect(0xffff8307f000, 4096, PROT_READ) = 0
mprotect(0xffff83281000, 4096, PROT_READ) = 0
mprotect(0xffff83372000, 8192, PROT_READ) = 0
mprotect(0xffff83398000, 4096, PROT_READ) = 0
mprotect(0xaaaac7570000, 4096, PROT_READ) = 0
mprotect(0xffff833cc000, 4096, PROT_READ) = 0
munmap(0xffff833c7000, 7840)            = 0
set_tid_address(0xffff82de30e0)         = 767
set_robust_list(0xffff82de30f0, 24)     = 0
rt_sigaction(SIGRTMIN, {sa_handler=0xffff8323f570, sa_mask=[], 
sa_flags=SA_SIGINFO}, NULL, 8) = 0
rt_sigaction(SIGRT_1, {sa_handler=0xffff8323f630, sa_mask=[], 
sa_flags=SA_RESTART|SA_SIGINFO}, NULL, 8) = 0
rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
brk(NULL)                               = 0xaaab058a0000
brk(0xaaab058c1000)                     = 0xaaab058c1000
newfstatat(AT_FDCWD, "/etc/libnl/classid", {st_mode=S_IFREG|0644, 
st_size=1130, ...}, 0) = 0
openat(AT_FDCWD, "/etc/libnl/classid", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0644, st_size=1130, ...}) = 0
read(3, "################################"..., 4096) = 1130
read(3, "", 4096)                       = 0
close(3)                                = 0
ioctl(2, TCGETS, 0xffffdf6a4f18)        = -1 ENOTTY (Inappropriate ioctl 
for device)
pipe2([3, 4], 0)                        = 0
fcntl(3, F_GETFL)                       = 0 (flags O_RDONLY)
fcntl(3, F_SETFL, O_RDONLY|O_NONBLOCK)  = 0
fcntl(4, F_GETFL)                       = 0x1 (flags O_WRONLY)
fcntl(4, F_SETFL, O_WRONLY|O_NONBLOCK)  = 0
openat(AT_FDCWD, "/dev/xen/privcmd", O_RDWR|O_CLOEXEC) = 5
openat(AT_FDCWD, "/dev/xen/hypercall", O_RDWR|O_CLOEXEC) = 6
openat(AT_FDCWD, "/dev/xen/privcmd", O_RDWR|O_CLOEXEC) = 7
ioctl(7, _IOC(_IOC_NONE, 0x50, 0xff, 0), 0) = -1 ENOTTY (Inappropriate 
ioctl for device)
openat(AT_FDCWD, "/dev/xen/privcmd", O_RDWR|O_CLOEXEC) = 8
openat(AT_FDCWD, "/dev/xen/hypercall", O_RDWR|O_CLOEXEC) = 9
openat(AT_FDCWD, "/dev/xen/privcmd", O_RDWR|O_CLOEXEC) = 10
ioctl(10, _IOC(_IOC_NONE, 0x50, 0x5, 0x10), 0xffffdf6a4aa0) = 0
newfstatat(AT_FDCWD, "/var/run/xenstored/socket", 0xffffdf6a4ed0, 0) = 
-1 ENOENT (No such file or directory)
faccessat(AT_FDCWD, "/dev/xen/xenbus", F_OK) = 0
newfstatat(AT_FDCWD, "/dev/xen/xenbus", {st_mode=S_IFCHR|0600, 
st_rdev=makedev(0xa, 0x3e), ...}, 0) = 0
openat(AT_FDCWD, "/dev/xen/xenbus", O_RDWR) = 11
openat(AT_FDCWD, "/etc/xen/xl.conf", O_RDONLY) = 12
fstat(12, {st_mode=S_IFREG|0644, st_size=1602, ...}) = 0
fstat(12, {st_mode=S_IFREG|0644, st_size=1602, ...}) = 0
read(12, "## Global XL config file ##\n\n# S"..., 4096) = 1602
close(12)                               = 0
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffdf6a4b00) = 262158
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_SHARED, 6, 0) = 0xffff833c8000
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffdf6a4b00) = 0
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffdf6a4b00) = 0
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffdf6a4b00) = 0
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffdf6a4b00) = 0
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffdf6a4b00) = 0
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffdf6a4b00) = 4096
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffdf6a4b00) = 0
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffdf6a4ad0) = -1 EPERM 
(Operation not permitted)
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffdf6a4df0) = -1 EPERM 
(Operation not permitted)
write(2, "libxl: ", 7libxl: )                  = 7
write(2, "error: ", 7error: )                  = 7
write(2, "libxl_utils.c:820:libxl_cpu_bitm"..., 
87libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve the 
maximum number of cpus) = 87
write(2, "\n", 1
)                       = 1
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffdf6a4df0) = -1 EPERM 
(Operation not permitted)
write(2, "libxl: ", 7libxl: )                  = 7
write(2, "error: ", 7error: )                  = 7
write(2, "libxl_utils.c:820:libxl_cpu_bitm"..., 
87libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve the 
maximum number of cpus) = 87
write(2, "\n", 1
)                       = 1
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffdf6a4df0) = -1 EPERM 
(Operation not permitted)
write(2, "libxl: ", 7libxl: )                  = 7
write(2, "error: ", 7error: )                  = 7
write(2, "libxl_utils.c:820:libxl_cpu_bitm"..., 
87libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve the 
maximum number of cpus) = 87
write(2, "\n", 1
)                       = 1
pipe2([12, 13], 0)                      = 0
fcntl(12, F_GETFL)                      = 0 (flags O_RDONLY)
fcntl(12, F_SETFL, O_RDONLY|O_NONBLOCK) = 0
fcntl(13, F_GETFL)                      = 0x1 (flags O_WRONLY)
fcntl(13, F_SETFL, O_WRONLY|O_NONBLOCK) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 
{sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
write(11, "\2\0\0\0\0\0\0\0\0\0\0\0\6\0\0\0", 16) = 16
write(11, "domid\0", 6)                 = 6
read(11, "\2\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0", 16) = 16
read(11, "1", 1)                        = 1
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 
NULL, 8) = 0
pipe2([14, 15], 0)                      = 0
futex(0xffff8302e048, FUTEX_WAKE_PRIVATE, 2147483647) = 0
rt_sigprocmask(SIG_SETMASK, ~[RTMIN RT_1], [], 8) = 0
mmap(NULL, 141168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 
0) = 0xffff82dc0000
mprotect(0xffff82dc1000, 137072, PROT_READ|PROT_WRITE) = 0
rt_sigprocmask(SIG_BLOCK, ~[], ~[KILL STOP RTMIN RT_1], 8) = 0
clone(child_stack=0xffff82de10e0, 
flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, 
parent_tid=[768], tls=0xffff82de2000, child_tidptr=0xffff82de1940) = 768
rt_sigprocmask(SIG_SETMASK, ~[KILL STOP RTMIN RT_1], NULL, 8) = 0
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 
{sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
write(11, "\4\0\0\0\0\0\0\0\0\0\0\0\34\0\0\0", 16) = 16
write(11, "/local/domain/1/backend\0", 24) = 24
write(11, "3/0\0", 4)                   = 4
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 
NULL, 8) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 
{sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
write(11, "\1\0\0\0\0\0\0\0\0\0\0\0\30\0\0\0", 16) = 16
write(11, "/local/domain/1/backend\0", 24) = 24
futex(0xaaab058a13b8, FUTEX_WAIT_PRIVATE, 0, NULL) = 0
futex(0xaaab058a1360, FUTEX_WAKE_PRIVATE, 1) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 
NULL, 8) = 0
ppoll([{fd=14, events=POLLIN}, {fd=12, events=POLLIN}], 2, NULL, NULL, 
0) = 1 ([{fd=14, revents=POLLIN}])
ppoll([{fd=14, events=POLLIN}], 1, {tv_sec=0, tv_nsec=0}, NULL, 0) = 1 
([{fd=14, revents=POLLIN}], left {tv_sec=0, tv_nsec=0})
read(14, "/", 1)                        = 1
ppoll([{fd=14, events=POLLIN}, {fd=12, events=POLLIN}], 2, NULL, NULL, 
0strace: Process 767 detached
  <detached ...>

>>>> close(6)                                = 0
>>>> close(5)                                = 0
>>>> munmap(0xffff9f45f000, 4096)            = 0
>>>> close(7)                                = 0
>>>> close(10)                               = 0
>>>> close(9)                                = 0
>>>> close(8)                                = 0
>>>> close(11)                               = 0
>>>> close(3)                                = 0
>>>> close(4)                                = 0
>>>> exit_group(0)                           = ?
>>>> +++ exited with 0 +++
>>>>
>>>> royger told me that it is a BUG and not an issue with my setup. Therefore here I am.
>>
>> Just a bit more context: AFAICT the calls to libxl_cpu_bitmap_alloc in
>> parse_global_config will prevent xl from being usable on anything
>> different than the control domain (due to sysctl only available to
>> privileged domains). This is an issue for 'xl devd', as it won't
>> start anymore.
> 
> These look non-fatal at first glance?
> 
> Regards,
> Jason

Andrea


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 12:06:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 12:06:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284231.483428 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ6h9-0005Ox-Ao; Fri, 04 Mar 2022 12:06:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284231.483428; Fri, 04 Mar 2022 12:06:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ6h9-0005Oq-5h; Fri, 04 Mar 2022 12:06:03 +0000
Received: by outflank-mailman (input) for mailman id 284231;
 Fri, 04 Mar 2022 12:06:01 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=mKET=TP=santannapisa.it=Andrea.Stevanato@srs-se1.protection.inumbo.net>)
 id 1nQ6h6-0005Ok-UZ
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 12:06:01 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04on0608.outbound.protection.outlook.com
 [2a01:111:f400:fe0e::608])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 72cdfeef-9bb3-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 13:05:57 +0100 (CET)
Received: from DB7PR03MB5002.eurprd03.prod.outlook.com (2603:10a6:10:74::22)
 by AM0PR03MB4962.eurprd03.prod.outlook.com (2603:10a6:208:103::29) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Fri, 4 Mar
 2022 12:05:53 +0000
Received: from DB7PR03MB5002.eurprd03.prod.outlook.com
 ([fe80::746a:e27:47ff:3e90]) by DB7PR03MB5002.eurprd03.prod.outlook.com
 ([fe80::746a:e27:47ff:3e90%7]) with mapi id 15.20.5038.015; Fri, 4 Mar 2022
 12:05:53 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 72cdfeef-9bb3-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=MywuC+V+Vk9d0iFk9LpHKYMnehDUO1FsUmnxvok9UGmSOfE6GPkUg7wMJaHlf8vWIECA7nF+yXo5XIyLYG4NxkQEDtNPO3GNO2u7l+2bdIqrS6PEspNM0JiGC68HAV+cMDP6GlmpQBVJj3IeEecCTw8WQtwk4vTMc3YmmK50WAz5kMBjgvPC3cWqddJnCA4fPqpySRGsFcXsQtzW8k4LIiEVTOzWKCCrdtlIFfrMLhTIsXdDaQuFag3gRcQrdriWBNw3WjVKklmSX08CUzE2zHbBtWyyxg5S8cteeZDu2R/7lX8DWrX8YhcNt2QNHz5jJ99tgXcSHNN4Y0AaR/IORA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=nriWyWVC9vk6oUd3gR5IdgnmsSBK7vaOjO/3nysPD4U=;
 b=Ke9+xvtGEF7CnCNnZPKO6ZhqAm6rqiqvbj2Q8NA6Q/2ETNYX+yqjx8aA+RR8n/R+zkjBMhSVL7/s9fnaSXXd6wiilEFvV4TGmsriYSEZF2V5Uaf4TlqNj2+d8mPiHmH5Uw5+UP9pfO4AHTSQLs5lj6Wl4iKYZJq+WxAKy1vW6mmHYwcJUY+peYQHWPke7LjJCnUbe60TWbOm44BZNQwJNE0xz7tInav8Qfw73Iek265O7Jr2c0O0sVIPZa3NvHkC1W9lqO54TUBRKl/I8ANO0ykzGqRPRtBwVwbZ9o1yspsPvuJLewSPi5GogJTy+68IRkCIsLtfQv+IJ02QN4qynw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=santannapisa.it; dmarc=pass action=none
 header.from=santannapisa.it; dkim=pass header.d=santannapisa.it; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=santannapisa.it;
 s=selector1;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=nriWyWVC9vk6oUd3gR5IdgnmsSBK7vaOjO/3nysPD4U=;
 b=rFkQXyfeo0Es1ZQMfB5/cQYwNHG/YQbqbpWmtf952DDTPTocDmfNjbP2apXEdJox6WklpSZhUJtFBSBAmQ1objiarUkGv4OlB5r7EdLPVO5BnoRHWhcRQj6yG2f79/U1AZkwJcNlJmgB7hvkQLjItYzGWWTZzrz24eSWyJB/7vQ=
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=santannapisa.it;
Message-ID: <53a4fe6b-efc8-bfa1-8475-0aa58774051a@santannapisa.it>
Date: Fri, 4 Mar 2022 13:05:55 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: Network driver domain broken
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Jason Andryuk <jandryuk@gmail.com>
Cc: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 "wl@xen.org" <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>
References: <DB7PR03MB50027EE92E11BFFF71AADC4598049@DB7PR03MB5002.eurprd03.prod.outlook.com>
 <92827eec-b6e9-9c95-8f9e-fcf063d45090@santannapisa.it>
 <YiDt7fX92n6Luc2l@Air-de-Roger>
 <CAKf6xpsnmQG7-LXn5+Uz4mncWsN0EZ8wpagY8f8OydvZNb6g5A@mail.gmail.com>
 <YiH9cee6NIKA6MWg@Air-de-Roger>
From: Andrea Stevanato <andrea.stevanato@santannapisa.it>
In-Reply-To: <YiH9cee6NIKA6MWg@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: MR2P264CA0139.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:500:30::31) To DB7PR03MB5002.eurprd03.prod.outlook.com
 (2603:10a6:10:74::22)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2a3c2d5d-6d8f-4bec-6ca3-08d9fdd754a6
X-MS-TrafficTypeDiagnostic: AM0PR03MB4962:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR03MB496273E1880F159565C8996298059@AM0PR03MB4962.eurprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DB7PR03MB5002.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(8676002)(31696002)(4326008)(2616005)(83380400001)(186003)(26005)(2906002)(5660300002)(44832011)(3480700007)(30864003)(8936002)(786003)(6486002)(36756003)(110136005)(31686004)(54906003)(6512007)(86362001)(52116002)(53546011)(508600001)(6506007)(66476007)(66556008)(66946007)(38350700002)(38100700002)(316002)(43740500002)(45980500001)(579004);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?V3ZacWh4d3cvaFpKQnRoL2dJRmRmVjJxcG85Zml2NEZSRGV6Rnl3WVdrSUNv?=
 =?utf-8?B?eUkyci9JS3BwZ3FZVS9veVo4MVNHZXFTZmZXRFdCdDBMeUo5MEVsUEVWa29x?=
 =?utf-8?B?NStpYnN0MVpObytzdGNuRjBod0RUVUtpdERWaEtWUU93YXB6KzJtMTFyMG5B?=
 =?utf-8?B?cmlBaDJ3WWhiZDVsZVZ5UnB3UzlVYVhWS1JWS3NQdncraXN4aU5qbVFtVlVa?=
 =?utf-8?B?bmJsNlpiVUVxTGVmUXFrNm9NVEh0S2svQTQvN2lKbG1wNE1NVldvTEtVZkhq?=
 =?utf-8?B?OUc5VDAyalRzdXlocURUYm5WMTR1QjRSN1NZUFpQbVh6Y21yay9pcElVRzBL?=
 =?utf-8?B?RGNDZ0NiQllUWENjdE5MRkJOQ2ZxSkR5KzRIM1hHQXlNL0U4SEUwbTNVUnVN?=
 =?utf-8?B?dXdCMnEvTDhkREY4dUNzY0E0Q1phSDRsL0Z2Yk9JRGM4bERmSG9wcjVjUENN?=
 =?utf-8?B?UVZiM1pFby81NHN4engreHFxTzBrNUsvbi9lWWFpMU1SYVpKMzNuTG5uUlJm?=
 =?utf-8?B?SnpBMGRFQlV5Qmd1bENGRW5XQTRKdzlkb1ZET09ZWGRLbndIU0Nrd1hGcWJ6?=
 =?utf-8?B?cUx4bXRlMnhnQUlNWCtPaHh3MlBCQ2NRaFNpa3psdEd2dmtKT0VjZjdaeDM3?=
 =?utf-8?B?ZDVFQW1iazZOVjl2eEJZTjUvMENXT0hhS2ljQTlhcTdPKzBSRnNacWoremx2?=
 =?utf-8?B?Q25MWVhpY1NkZWovTmRDQ0duSUNFMUpyY2YxRHdoNTQwa0ZwQ2ZIVjVQSHJn?=
 =?utf-8?B?VTZac0FFQmQxbDdHLy9vVWFTTkFjTHhZc2NkOGhwcDgvT3l4dUwrY1lKOG1L?=
 =?utf-8?B?Qy9BZERPdnNTbkJVT2NtTENzMWdEVGxiV3pGbkQxL2NXRlpnRThtdGlxOUFl?=
 =?utf-8?B?a1pxckZFNlkxbnU5cXVjelZSZ1lSYUtjUHNSaVVqZGY3N2w3WnAwSnUrUysw?=
 =?utf-8?B?ckJ1L2RaM1JjUmxVdnhwNUVTaHl4RmpDNlZZOVBkM1dGR2VObEZhNlFITnhi?=
 =?utf-8?B?akVuWXNiRDJpN2tHSDFHYTRyUnNqQ2R4Wkh5eWFWaU9Rc2tYOFpjeTVOK2I0?=
 =?utf-8?B?OFNaZENiVC9sTWxsK0l2eG51Nm9EZmkvZ2ExbkxUdXBiR001ekJTOGkvVTRE?=
 =?utf-8?B?MHNQNkkxa0wwQTZiQzQvWFYzNGllZFNTakovZmM5VHErQzd6RTlnNWdXcWU1?=
 =?utf-8?B?Q0VzVG9ZUXRqYnhnUDZhOHczcVZRK0syVm1nLzZLVXFDWi9oVlJYQ2tBRXVt?=
 =?utf-8?B?WnEwaGUzZ0pIbjJrdXVVdCsxekVSQlRKRnQxS3pHMC9KR3pZdDRIUWtoN0VB?=
 =?utf-8?B?VVVwLy9NV3pnMmJndjlOUnIxZDlMTXZ0ejRHME5CUEM3NDllL0NMRlR1cTVH?=
 =?utf-8?B?VnZuMkhPYmNaWVJyK3VyWDk3Y0IyWi9jVmdGK0ZGZ1o3V3VOTlg5RnlzWTQy?=
 =?utf-8?B?bDM1R1pSUTJYeEQ4TFBpb1FVMmV2anVocjhIakpXY21Zb2JYNGJQVnpyaHNj?=
 =?utf-8?B?YThtVm9CQWQvZGgrb3pheXNqUUtRZXlodDM2aGpDaG9rU2d0aGtLQmdISkJa?=
 =?utf-8?B?UmhhK2tDMGlZUjk3T1N3cTFINnVSMUlLVzZsdGh4MXVJbGM1cWlnWi9HbVln?=
 =?utf-8?B?NUFuNUFNWmQ5U1VWODdFUi9ZZmpGMzIzSkUxUndzSG55UFJBZDhwWjFrNHUy?=
 =?utf-8?B?eU1DK2F4V1lja2hhUkg0WTAzREJrRFlFL2xpSnF0K2RyVTRtNTg3aXp6SVRB?=
 =?utf-8?B?bnVHdUsvY3laZlp5dE4rbnJ4aTZNcXkvTFM2YitVOFV5TnV5OXpQK1BRYkFB?=
 =?utf-8?B?WGFxQ2pUb0tuT29nVGpwQU9rNlhmWnd5T0ZGU243Y1pnN3hkNk1hc1NyQ3Vp?=
 =?utf-8?B?UGJnbzYvNDVjZlBMYWk3V0orZGErRHRWdjNkSWtaeGVjSW5lQjU1bExoQUEw?=
 =?utf-8?B?UUF5OVJ4aFhaWkJZNFlla2hGQkVia2IrbktHY05ETnRXcUZoRi8zU2ljM1V1?=
 =?utf-8?B?dmJEVU5rY3ptb3FhU3A5VlcvbE5xdlNuVmw4QUYxMzNUb1Z5TzU0VFlRd295?=
 =?utf-8?B?aHlkdGpwNjlMazlFQlNxSHM4NE5MUXo0MHIrRjZYNE90Tjd5bzc0STh3YTY0?=
 =?utf-8?B?RVU5S0NJYi84QU80L0ZxYUsvQW5lSDNsZVdsZVN5WjRjaEJ3UldURTNRQjZ4?=
 =?utf-8?B?ZU42NlZQWmZTeit0VFpJOEpvL1ZjWkpkZlg4YlV4amNKUFhVSGYxQ2ZKemh1?=
 =?utf-8?B?QkVkSUZRcE1aV09YYlVrckZmT3AwQVVjRXN0V2tPZnhkU1Q5T29XMUVHNVN4?=
 =?utf-8?B?cEppb0oyYnNZc3dqZkkwWnJuVGFhTU9MTlpZYWhQOG11bXJGWnRzdz09?=
X-OriginatorOrg: santannapisa.it
X-MS-Exchange-CrossTenant-Network-Message-Id: 2a3c2d5d-6d8f-4bec-6ca3-08d9fdd754a6
X-MS-Exchange-CrossTenant-AuthSource: DB7PR03MB5002.eurprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 12:05:53.1187
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: d97360e3-138d-4b5f-956f-a646c364a01e
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: ygiy+EPsIwCh+4IC629J7MUyM7Hiyrtfdpl+7nZd0VqFW7HLXA0N9b9rMGszhkxxIIs697c7mDJdf7JpuoWF3U+wY8h9Vxpsry6PdbVHEtacSUywDlZWVG66UbVB4pLA
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR03MB4962

On 3/4/2022 12:52 PM, Roger Pau Monné wrote:
> On Thu, Mar 03, 2022 at 01:08:31PM -0500, Jason Andryuk wrote:
>> On Thu, Mar 3, 2022 at 11:34 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
>>>
>>> On Thu, Mar 03, 2022 at 05:01:23PM +0100, Andrea Stevanato wrote:
>>>> On 03/03/2022 15:54, Andrea Stevanato wrote:
>>>>> Hi all,
>>>>>
>>>>> according to the conversation that I had with royger, aa67b97ed34  broke the driver domain support.
>>>>>
>>>>> What I'm trying to do is to setup networking between guests using driver domain. Therefore, the guest (driver) has been started with the following cfg.
>>>>>
>>>>> name    = "guest0"
>>>>> kernel  = "/media/sd-mmcblk0p1/Image"
>>>>> ramdisk = "/media/sd-mmcblk0p1/rootfs.cpio.gz"
>>>>> extra   = "console=hvc0 rdinit=/sbin/init root=/dev/ram0"
>>>>> memory  = 1024 vcpus   = 2
>>>>> driver_domain = 1
>>>>>
>>>>> On guest0 I created the bridge, assigned a static IP and started the udhcpd on xenbr0 interface.
>>>>> While the second guest has been started with the following cfg:
>>>>>
>>>>> name    = "guest1"
>>>>> kernel  = "/media/sd-mmcblk0p1/Image"
>>>>> ramdisk = "/media/sd-mmcblk0p1/rootfs.cpio.gz"
>>>>> extra   = "console=hvc0 rdinit=/sbin/init root=/dev/ram0"
>>>>> memory  = 1024 vcpus   = 2
>>>>> vcpus   = 2
>>>>> vif = [ 'bridge=xenbr0, backend=guest0' ]
>>>>>
>>>>> Follows the result of strace xl devd:
>>>>>
>>>>> # strace xl devd
>>>>> execve("/usr/sbin/xl", ["xl", "devd"], 0xffffdf0420c8 /* 13 vars */) = 0
>>
>>>>> ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41b40) = -1 EPERM (Operation not permitted)
>>>>> write(2, "libxl: ", 7libxl: )                  = 7
>>>>> write(2, "error: ", 7error: )                  = 7
>>>>> write(2, "libxl_utils.c:820:libxl_cpu_bitm"..., 87libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve the maximum number of cpus) = 87
>>>>> write(2, "\n", 1
>>>>> )                       = 1
>>>>> clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0xffff9ee7a0e0) = 814
>>>>> wait4(814, [{WIFEXITED(s) && WEXITSTATUS(s) == 0}], 0, NULL) = 814
>>>>> --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=814, si_uid=0, si_status=0, si_utime=2, si_stime=2} ---
>>
>> xl devd is daemonizing, but strace is only following the first
>> process.  Use `strace xl devd -F` to prevent the daemonizing (or
>> `strace -f xl devd` to follow children).
> 
> Or as a first step try to see what kind of messages you get from `xl
> devd -F` when trying to attach a device using the driver domain.

Nothing has changed. On guest0 (the driver domain):

# xl devd -F
libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to 
retrieve the maximum number of cpus
libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to 
retrieve the maximum number of cpus
libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to 
retrieve the maximum number of cpus
[  696.805619] xenbr0: port 1(vif2.0) entered blocking state
[  696.810334] xenbr0: port 1(vif2.0) entered disabled state
[  696.824518] device vif2.0 entered promiscuous mode

While on dom0:

# xl network-list guest1
Idx BE Mac Addr.         handle state evt-ch   tx-/rx-ring-ref BE-path
0   1  00:16:3e:18:52:ac     0     6     -1    -1/-1 
/local/domain/1/backend/vif/2/0

The same with using strace gives the following output:

# strace xl devd -F
execve("/usr/sbin/xl", ["xl", "devd", "-F"], 0xffffeed242a0 /* 13 vars 
*/) = 0
brk(NULL)                               = 0xaaab092a8000
faccessat(AT_FDCWD, "/etc/ld.so.preload", R_OK) = -1 ENOENT (No such 
file or directory)
openat(AT_FDCWD, "/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0644, st_size=7840, ...}) = 0
mmap(NULL, 7840, PROT_READ, MAP_PRIVATE, 3, 0) = 0xffff986e2000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxlutil.so.4.14", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\0200\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=68168, ...}) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) 
= 0xffff986e0000
mmap(NULL, 131784, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff98694000
mprotect(0xffff986a3000, 65536, PROT_NONE) = 0
mmap(0xffff986b3000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xf000) = 0xffff986b3000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxenlight.so.4.14", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0`\16\2\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=861848, ...}) = 0
mmap(NULL, 925752, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff985b1000
mprotect(0xffff9867e000, 61440, PROT_NONE) = 0
mmap(0xffff9868d000, 24576, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xcc000) = 0xffff9868d000
mmap(0xffff98693000, 56, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffff98693000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxentoollog.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0P\r\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=10368, ...}) = 0
mmap(NULL, 73904, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff9859e000
mprotect(0xffff985a0000, 61440, PROT_NONE) = 0
mmap(0xffff985af000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1000) = 0xffff985af000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libyajl.so.2", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\320\22\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=38728, ...}) = 0
mmap(NULL, 102416, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff98584000
mprotect(0xffff9858d000, 61440, PROT_NONE) = 0
mmap(0xffff9859c000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x8000) = 0xffff9859c000
close(3)                                = 0
openat(AT_FDCWD, "/lib/libpthread.so.0", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\300j\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=113184, ...}) = 0
mmap(NULL, 192872, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff98554000
mprotect(0xffff9856e000, 65536, PROT_NONE) = 0
mmap(0xffff9857e000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1a000) = 0xffff9857e000
mmap(0xffff98580000, 12648, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffff98580000
close(3)                                = 0
openat(AT_FDCWD, "/lib/libc.so.6", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\320I\2\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=1428872, ...}) = 0
mmap(NULL, 1502000, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 
0) = 0xffff983e5000
mprotect(0xffff9853c000, 61440, PROT_NONE) = 0
mmap(0xffff9854b000, 24576, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x156000) = 0xffff9854b000
mmap(0xffff98551000, 11056, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffff98551000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxenevtchn.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0@\f\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=10240, ...}) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) 
= 0xffff986de000
mmap(NULL, 73856, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff983d2000
mprotect(0xffff983d4000, 61440, PROT_NONE) = 0
mmap(0xffff983e3000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1000) = 0xffff983e3000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxenctrl.so.4.14", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0000\203\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=154752, ...}) = 0
mmap(NULL, 218504, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff9839c000
mprotect(0xffff983c1000, 61440, PROT_NONE) = 0
mmap(0xffff983d0000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x24000) = 0xffff983d0000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxenguest.so.4.14", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0PB\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=77248, ...}) = 0
mmap(NULL, 140880, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff98379000
mprotect(0xffff9838b000, 61440, PROT_NONE) = 0
mmap(0xffff9839a000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x11000) = 0xffff9839a000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxenhypfs.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\300\16\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=14432, ...}) = 0
mmap(NULL, 78048, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff98365000
mprotect(0xffff98367000, 65536, PROT_NONE) = 0
mmap(0xffff98377000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff98377000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxenstore.so.3.0", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0 
$\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=31176, ...}) = 0
mmap(NULL, 107088, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff9834a000
mprotect(0xffff98350000, 65536, PROT_NONE) = 0
mmap(0xffff98360000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x6000) = 0xffff98360000
mmap(0xffff98362000, 8784, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffff98362000
close(3)                                = 0
openat(AT_FDCWD, "/lib/libdl.so.2", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0@\20\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=14296, ...}) = 0
mmap(NULL, 77920, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff98336000
mprotect(0xffff98339000, 61440, PROT_NONE) = 0
mmap(0xffff98348000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff98348000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxentoolcore.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0 
\10\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=6104, ...}) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) 
= 0xffff986dc000
mmap(NULL, 69768, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff98324000
mprotect(0xffff98325000, 61440, PROT_NONE) = 0
mmap(0xffff98334000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0) = 0xffff98334000
close(3)                                = 0
openat(AT_FDCWD, "/lib/libutil.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0`\21\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=14296, ...}) = 0
mmap(NULL, 77840, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff98310000
mprotect(0xffff98312000, 65536, PROT_NONE) = 0
mmap(0xffff98322000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff98322000
close(3)                                = 0
openat(AT_FDCWD, "/lib/libuuid.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0000\30\0\0\0\0\0\0"..., 832) 
= 832
fstat(3, {st_mode=S_IFREG|0755, st_size=30680, ...}) = 0
mmap(NULL, 94240, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff982f8000
mprotect(0xffff982fe000, 65536, PROT_NONE) = 0
mmap(0xffff9830e000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x6000) = 0xffff9830e000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libnl-route-3.so.200", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\200\327\1\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=536688, ...}) = 0
mmap(NULL, 609024, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff98263000
mprotect(0xffff982de000, 65536, PROT_NONE) = 0
mmap(0xffff982ee000, 32768, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x7b000) = 0xffff982ee000
mmap(0xffff982f6000, 6912, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xffff982f6000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libnl-3.so.200", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\360\221\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=141304, ...}) = 0
mmap(NULL, 205192, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff98230000
mprotect(0xffff98251000, 61440, PROT_NONE) = 0
mmap(0xffff98260000, 12288, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x20000) = 0xffff98260000
close(3)                                = 0
openat(AT_FDCWD, "/lib/librt.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\0#\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=31032, ...}) = 0
mmap(NULL, 94568, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff98218000
mprotect(0xffff9821f000, 61440, PROT_NONE) = 0
mmap(0xffff9822e000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x6000) = 0xffff9822e000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libfdt.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0000#\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=38800, ...}) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) 
= 0xffff986da000
mmap(NULL, 102416, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff981fe000
mprotect(0xffff98207000, 61440, PROT_NONE) = 0
mmap(0xffff98216000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x8000) = 0xffff98216000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxengnttab.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0`\20\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=14368, ...}) = 0
mmap(NULL, 77984, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff981ea000
mprotect(0xffff981ed000, 61440, PROT_NONE) = 0
mmap(0xffff981fc000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff981fc000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxencall.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\320\17\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=14400, ...}) = 0
mmap(NULL, 78064, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff981d6000
mprotect(0xffff981d9000, 61440, PROT_NONE) = 0
mmap(0xffff981e8000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff981e8000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxenforeignmemory.so.1", 
O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0000\16\0\0\0\0\0\0"..., 832) 
= 832
fstat(3, {st_mode=S_IFREG|0755, st_size=14392, ...}) = 0
mmap(NULL, 78000, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff981c2000
mprotect(0xffff981c4000, 65536, PROT_NONE) = 0
mmap(0xffff981d4000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff981d4000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libxendevicemodel.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0`\23\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=14400, ...}) = 0
mmap(NULL, 78008, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff981ae000
mprotect(0xffff981b1000, 61440, PROT_NONE) = 0
mmap(0xffff981c0000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0xffff981c0000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/libbz2.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\320\27\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=70472, ...}) = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) 
= 0xffff986d8000
mmap(NULL, 134160, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff9818d000
mprotect(0xffff9819d000, 61440, PROT_NONE) = 0
mmap(0xffff981ac000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0xf000) = 0xffff981ac000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/liblzma.so.5", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\3403\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=153496, ...}) = 0
mmap(NULL, 217104, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff98157000
mprotect(0xffff9817b000, 65536, PROT_NONE) = 0
mmap(0xffff9818b000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x24000) = 0xffff9818b000
close(3)                                = 0
openat(AT_FDCWD, "/usr/lib/liblzo2.so.2", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\320&\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=120648, ...}) = 0
mmap(NULL, 184336, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff98129000
mprotect(0xffff98146000, 61440, PROT_NONE) = 0
mmap(0xffff98155000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1c000) = 0xffff98155000
close(3)                                = 0
openat(AT_FDCWD, "/lib/libz.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, 
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0\267\0\1\0\0\0\360%\0\0\0\0\0\0"..., 
832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=92056, ...}) = 0
mmap(NULL, 155664, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) 
= 0xffff98102000
mprotect(0xffff98117000, 65536, PROT_NONE) = 0
mmap(0xffff98127000, 8192, PROT_READ|PROT_WRITE, 
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x15000) = 0xffff98127000
close(3)                                = 0
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) 
= 0xffff98100000
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) 
= 0xffff980fe000
mprotect(0xffff9854b000, 12288, PROT_READ) = 0
mprotect(0xffff98127000, 4096, PROT_READ) = 0
mprotect(0xffff98155000, 4096, PROT_READ) = 0
mprotect(0xffff9857e000, 4096, PROT_READ) = 0
mprotect(0xffff9818b000, 4096, PROT_READ) = 0
mprotect(0xffff981ac000, 4096, PROT_READ) = 0
mprotect(0xffff985af000, 4096, PROT_READ) = 0
mprotect(0xffff98334000, 4096, PROT_READ) = 0
mprotect(0xffff981e8000, 4096, PROT_READ) = 0
mprotect(0xffff981c0000, 4096, PROT_READ) = 0
mprotect(0xffff981d4000, 4096, PROT_READ) = 0
mprotect(0xffff981fc000, 4096, PROT_READ) = 0
mprotect(0xffff98216000, 4096, PROT_READ) = 0
mprotect(0xffff9822e000, 4096, PROT_READ) = 0
mprotect(0xffff98260000, 8192, PROT_READ) = 0
mprotect(0xffff982ee000, 16384, PROT_READ) = 0
mprotect(0xffff9830e000, 4096, PROT_READ) = 0
mprotect(0xffff98322000, 4096, PROT_READ) = 0
mprotect(0xffff98348000, 4096, PROT_READ) = 0
mprotect(0xffff98360000, 4096, PROT_READ) = 0
mprotect(0xffff98377000, 4096, PROT_READ) = 0
mprotect(0xffff983e3000, 4096, PROT_READ) = 0
mprotect(0xffff983d0000, 4096, PROT_READ) = 0
mprotect(0xffff9839a000, 4096, PROT_READ) = 0
mprotect(0xffff9859c000, 4096, PROT_READ) = 0
mprotect(0xffff9868d000, 8192, PROT_READ) = 0
mprotect(0xffff986b3000, 4096, PROT_READ) = 0
mprotect(0xaaaaceff0000, 4096, PROT_READ) = 0
mprotect(0xffff986e7000, 4096, PROT_READ) = 0
munmap(0xffff986e2000, 7840)            = 0
set_tid_address(0xffff980fe0e0)         = 882
set_robust_list(0xffff980fe0f0, 24)     = 0
rt_sigaction(SIGRTMIN, {sa_handler=0xffff9855a570, sa_mask=[], 
sa_flags=SA_SIGINFO}, NULL, 8) = 0
rt_sigaction(SIGRT_1, {sa_handler=0xffff9855a630, sa_mask=[], 
sa_flags=SA_RESTART|SA_SIGINFO}, NULL, 8) = 0
rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, 
rlim_max=RLIM64_INFINITY}) = 0
brk(NULL)                               = 0xaaab092a8000
brk(0xaaab092c9000)                     = 0xaaab092c9000
newfstatat(AT_FDCWD, "/etc/libnl/classid", {st_mode=S_IFREG|0644, 
st_size=1130, ...}, 0) = 0
openat(AT_FDCWD, "/etc/libnl/classid", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0644, st_size=1130, ...}) = 0
read(3, "################################"..., 4096) = 1130
read(3, "", 4096)                       = 0
close(3)                                = 0
ioctl(2, TCGETS, {B38400 opost isig icanon echo ...}) = 0
pipe2([3, 4], 0)                        = 0
fcntl(3, F_GETFL)                       = 0 (flags O_RDONLY)
fcntl(3, F_SETFL, O_RDONLY|O_NONBLOCK)  = 0
fcntl(4, F_GETFL)                       = 0x1 (flags O_WRONLY)
fcntl(4, F_SETFL, O_WRONLY|O_NONBLOCK)  = 0
openat(AT_FDCWD, "/dev/xen/privcmd", O_RDWR|O_CLOEXEC) = 5
openat(AT_FDCWD, "/dev/xen/hypercall", O_RDWR|O_CLOEXEC) = 6
openat(AT_FDCWD, "/dev/xen/privcmd", O_RDWR|O_CLOEXEC) = 7
ioctl(7, _IOC(_IOC_NONE, 0x50, 0xff, 0), 0) = -1 ENOTTY (Inappropriate 
ioctl for device)
openat(AT_FDCWD, "/dev/xen/privcmd", O_RDWR|O_CLOEXEC) = 8
openat(AT_FDCWD, "/dev/xen/hypercall", O_RDWR|O_CLOEXEC) = 9
openat(AT_FDCWD, "/dev/xen/privcmd", O_RDWR|O_CLOEXEC) = 10
ioctl(10, _IOC(_IOC_NONE, 0x50, 0x5, 0x10), 0xffffd0b60960) = 0
newfstatat(AT_FDCWD, "/var/run/xenstored/socket", 0xffffd0b60d90, 0) = 
-1 ENOENT (No such file or directory)
faccessat(AT_FDCWD, "/dev/xen/xenbus", F_OK) = 0
newfstatat(AT_FDCWD, "/dev/xen/xenbus", {st_mode=S_IFCHR|0600, 
st_rdev=makedev(0xa, 0x3e), ...}, 0) = 0
openat(AT_FDCWD, "/dev/xen/xenbus", O_RDWR) = 11
openat(AT_FDCWD, "/etc/xen/xl.conf", O_RDONLY) = 12
fstat(12, {st_mode=S_IFREG|0644, st_size=1602, ...}) = 0
fstat(12, {st_mode=S_IFREG|0644, st_size=1602, ...}) = 0
read(12, "## Global XL config file ##\n\n# S"..., 4096) = 1602
close(12)                               = 0
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffd0b609c0) = 262158
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_SHARED, 6, 0) = 0xffff986e3000
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffd0b609c0) = 0
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffd0b609c0) = 0
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffd0b609c0) = 0
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffd0b609c0) = 0
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffd0b609c0) = 0
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffd0b609c0) = 4096
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffd0b609c0) = 0
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffd0b60990) = -1 EPERM 
(Operation not permitted)
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffd0b60cb0) = -1 EPERM 
(Operation not permitted)
write(2, "libxl: ", 7libxl: )                  = 7
write(2, "error: ", 7error: )                  = 7
write(2, "libxl_utils.c:820:libxl_cpu_bitm"..., 
87libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve the 
maximum number of cpus) = 87
write(2, "\n", 1
)                       = 1
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffd0b60cb0) = -1 EPERM 
(Operation not permitted)
write(2, "libxl: ", 7libxl: )                  = 7
write(2, "error: ", 7error: )                  = 7
write(2, "libxl_utils.c:820:libxl_cpu_bitm"..., 
87libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve the 
maximum number of cpus) = 87
write(2, "\n", 1
)                       = 1
ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffd0b60cb0) = -1 EPERM 
(Operation not permitted)
write(2, "libxl: ", 7libxl: )                  = 7
write(2, "error: ", 7error: )                  = 7
write(2, "libxl_utils.c:820:libxl_cpu_bitm"..., 
87libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve the 
maximum number of cpus) = 87
write(2, "\n", 1
)                       = 1
pipe2([12, 13], 0)                      = 0
fcntl(12, F_GETFL)                      = 0 (flags O_RDONLY)
fcntl(12, F_SETFL, O_RDONLY|O_NONBLOCK) = 0
fcntl(13, F_GETFL)                      = 0x1 (flags O_WRONLY)
fcntl(13, F_SETFL, O_WRONLY|O_NONBLOCK) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 
{sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
write(11, "\2\0\0\0\0\0\0\0\0\0\0\0\6\0\0\0", 16) = 16
write(11, "domid\0", 6)                 = 6
read(11, "\2\0\0\0\0\0\0\0\0\0\0\0\1\0\0\0", 16) = 16
read(11, "1", 1)                        = 1
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 
NULL, 8) = 0
pipe2([14, 15], 0)                      = 0
futex(0xffff98349048, FUTEX_WAKE_PRIVATE, 2147483647) = 0
rt_sigprocmask(SIG_SETMASK, ~[RTMIN RT_1], [], 8) = 0
mmap(NULL, 141168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 
0) = 0xffff980db000
mprotect(0xffff980dc000, 137072, PROT_READ|PROT_WRITE) = 0
rt_sigprocmask(SIG_BLOCK, ~[], ~[KILL STOP RTMIN RT_1], 8) = 0
clone(child_stack=0xffff980fc0e0, 
flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, 
parent_tid=[883], tls=0xffff980fd000, child_tidptr=0xffff980fc940) = 883
rt_sigprocmask(SIG_SETMASK, ~[KILL STOP RTMIN RT_1], NULL, 8) = 0
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 
{sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
write(11, "\4\0\0\0\0\0\0\0\0\0\0\0\34\0\0\0", 16) = 16
write(11, "/local/domain/1/backend\0", 24) = 24
write(11, "3/0\0", 4)                   = 4
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 
NULL, 8) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 
{sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
write(11, "\1\0\0\0\0\0\0\0\0\0\0\0\30\0\0\0", 16) = 16
write(11, "/local/domain/1/backend\0", 24) = 24
futex(0xaaab092a93b8, FUTEX_WAIT_PRIVATE, 0, NULL) = -1 EAGAIN (Resource 
temporarily unavailable)
futex(0xaaab092a9360, FUTEX_WAKE_PRIVATE, 1) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 
NULL, 8) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 
{sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
write(11, "\1\0\0\0\0\0\0\0\0\0\0\0\34\0\0\0", 16) = 16
write(11, "/local/domain/1/backend/vif\0", 28) = 28
futex(0xaaab092a93bc, FUTEX_WAIT_PRIVATE, 0, NULL) = -1 EAGAIN (Resource 
temporarily unavailable)
futex(0xaaab092a9360, FUTEX_WAKE_PRIVATE, 1) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 
NULL, 8) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 
{sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
write(11, "\1\0\0\0\0\0\0\0\0\0\0\0\36\0\0\0", 16) = 16
write(11, "/local/domain/1/backend/vif/2\0", 30) = 30
futex(0xaaab092a93b8, FUTEX_WAIT_PRIVATE, 0, NULL) = 0
futex(0xaaab092a9360, FUTEX_WAKE_PRIVATE, 1) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 
NULL, 8) = 0
ppoll([{fd=14, events=POLLIN}, {fd=12, events=POLLIN}], 2, NULL, NULL, 
0) = 1 ([{fd=14, revents=POLLIN}])
ppoll([{fd=14, events=POLLIN}], 1, {tv_sec=0, tv_nsec=0}, NULL, 0) = 1 
([{fd=14, revents=POLLIN}], left {tv_sec=0, tv_nsec=0})
read(14, "/", 1)                        = 1
ppoll([{fd=14, events=POLLIN}, {fd=12, events=POLLIN}], 2, NULL, NULL, 
0) = 1 ([{fd=14, revents=POLLIN}])
ppoll([{fd=14, events=POLLIN}], 1, {tv_sec=0, tv_nsec=0}, NULL, 0) = 1 
([{fd=14, revents=POLLIN}], left {tv_sec=0, tv_nsec=0})
read(14, "/", 1)                        = 1
ppoll([{fd=14, events=POLLIN}, {fd=12, events=POLLIN}], 2, NULL, NULL, 
0) = 1 ([{fd=14, revents=POLLIN}])
ppoll([{fd=14, events=POLLIN}], 1, {tv_sec=0, tv_nsec=0}, NULL, 0) = 1 
([{fd=14, revents=POLLIN}], left {tv_sec=0, tv_nsec=0})
read(14, "/", 1)                        = 1
ppoll([{fd=14, events=POLLIN}, {fd=12, events=POLLIN}], 2, NULL, NULL, 
0) = 1 ([{fd=14, revents=POLLIN}])
ppoll([{fd=14, events=POLLIN}], 1, {tv_sec=0, tv_nsec=0}, NULL, 0) = 1 
([{fd=14, revents=POLLIN}], left {tv_sec=0, tv_nsec=0})
read(14, "/", 1)                        = 1
ppoll([{fd=14, events=POLLIN}, {fd=12, events=POLLIN}], 2, NULL, NULL, 
0) = 1 ([{fd=14, revents=POLLIN}])
ppoll([{fd=14, events=POLLIN}], 1, {tv_sec=0, tv_nsec=0}, NULL, 0) = 1 
([{fd=14, revents=POLLIN}], left {tv_sec=0, tv_nsec=0})
read(14, "/", 1)                        = 1
ppoll([{fd=14, events=POLLIN}, {fd=12, events=POLLIN}], 2, NULL, NULL, 
0) = 1 ([{fd=14, revents=POLLIN}])
ppoll([{fd=14, events=POLLIN}], 1, {tv_sec=0, tv_nsec=0}, NULL, 0) = 1 
([{fd=14, revents=POLLIN}], left {tv_sec=0, tv_nsec=0})
read(14, "/", 1)                        = 1
futex(0xaaab092a92e0, FUTEX_WAKE_PRIVATE, 1) = 1
rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 
{sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
write(11, "\2\0\0\0\0\0\0\0\0\0\0\0&\0\0\0", 16) = 16
write(11, "/local/domain/1/backend/vif/2/0/"..., 38) = 38
futex(0xaaab092a93bc, FUTEX_WAIT_PRIVATE, 0, NULL) = 0
futex(0xaaab092a9360, FUTEX_WAKE_PRIVATE, 1) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 
NULL, 8) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 
{sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
write(11, "\2\0\0\0\0\0\0\0\0\0\0\0'\0\0\0", 16) = 16
write(11, "/local/domain/1/backend/vif/2/0/"..., 39) = 39
futex(0xaaab092a93b8, FUTEX_WAIT_PRIVATE, 0, NULL) = 0
futex(0xaaab092a9360, FUTEX_WAIT_PRIVATE, 2, NULL) = -1 EAGAIN (Resource 
temporarily unavailable)
futex(0xaaab092a9360, FUTEX_WAKE_PRIVATE, 1) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 
NULL, 8) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 
{sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
write(11, "\n\0\0\0\0\0\0\0\0\0\0\0\2\0\0\0", 16) = 16
write(11, "1\0", 2)                     = 2
futex(0xaaab092a93bc, FUTEX_WAIT_PRIVATE, 0, NULL) = 0
futex(0xaaab092a9360, FUTEX_WAKE_PRIVATE, 1) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 
NULL, 8) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 
{sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
write(11, "\n\0\0\0\0\0\0\0\0\0\0\0\2\0\0\0", 16) = 16
write(11, "1\0", 2)                     = 2
futex(0xaaab092a93b8, FUTEX_WAIT_PRIVATE, 0, NULL) = 0
futex(0xaaab092a9360, FUTEX_WAKE_PRIVATE, 1) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 
NULL, 8) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 
{sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
write(11, "\4\0\0\0\0\0\0\0\0\0\0\0*\0\0\0", 16) = 16
write(11, "/local/domain/1/backend/vif/2/0/"..., 38) = 38
write(11, "2/1\0", 4)                   = 4
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 
NULL, 8) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 
{sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
write(11, "\2\0\0\0\0\0\0\0\0\0\0\0&\0\0\0", 16) = 16
write(11, "/local/domain/1/backend/vif/2/0/"..., 38) = 38
futex(0xaaab092a93bc, FUTEX_WAIT_PRIVATE, 0, NULL) = 0
futex(0xaaab092a9360, FUTEX_WAKE_PRIVATE, 1) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 
NULL, 8) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 
{sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
write(11, "\2\0\0\0\0\0\0\0\0\0\0\0'\0\0\0", 16) = 16
write(11, "/local/domain/1/backend/vif/2/0/"..., 39) = 39
futex(0xaaab092a93b8, FUTEX_WAIT_PRIVATE, 0, NULL) = 0
futex(0xaaab092a9360, FUTEX_WAKE_PRIVATE, 1) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 
NULL, 8) = 0
read(14, "/", 1)                        = 1
ppoll([{fd=14, events=POLLIN}, {fd=12, events=POLLIN}], 2, {tv_sec=9, 
tv_nsec=736000000}, NULL, 0) = 1 ([{fd=14, revents=POLLIN}], left 
{tv_sec=9, tv_nsec=719257893})
ppoll([{fd=14, events=POLLIN}], 1, {tv_sec=0, tv_nsec=0}, NULL, 0) = 1 
([{fd=14, revents=POLLIN}], left {tv_sec=0, tv_nsec=0})
read(14, "/", 1)                        = 1
ppoll([{fd=14, events=POLLIN}, {fd=12, events=POLLIN}], 2, {tv_sec=9, 
tv_nsec=703000000}, NULL, 0) = 1 ([{fd=14, revents=POLLIN}], left 
{tv_sec=9, tv_nsec=692405877})
ppoll([{fd=14, events=POLLIN}], 1, {tv_sec=0, tv_nsec=0}, NULL, 0) = 1 
([{fd=14, revents=POLLIN}], left {tv_sec=0, tv_nsec=0})
read(14, "/", 1)                        = 1
ppoll([{fd=14, events=POLLIN}, {fd=12, events=POLLIN}], 2, {tv_sec=9, 
tv_nsec=675000000}, NULL, 0) = 1 ([{fd=14, revents=POLLIN}], left 
{tv_sec=9, tv_nsec=652580293})
ppoll([{fd=14, events=POLLIN}], 1, {tv_sec=0, tv_nsec=0}, NULL, 0) = 1 
([{fd=14, revents=POLLIN}], left {tv_sec=0, tv_nsec=0})
read(14, "/", 1)                        = 1
ppoll([{fd=14, events=POLLIN}, {fd=12, events=POLLIN}], 2, {tv_sec=9, 
tv_nsec=628000000}, NULL, 0) = 1 ([{fd=14, revents=POLLIN}], left 
{tv_sec=9, tv_nsec=626201831})
ppoll([{fd=14, events=POLLIN}], 1, {tv_sec=0, tv_nsec=0}, NULL, 0) = 1 
([{fd=14, revents=POLLIN}], left {tv_sec=0, tv_nsec=0})
read(14, "/", 1)                        = 1
ppoll([{fd=14, events=POLLIN}, {fd=12, events=POLLIN}], 2, {tv_sec=9, 
tv_nsec=608000000}, NULL, 0) = 1 ([{fd=14, revents=POLLIN}], left 
{tv_sec=9, tv_nsec=606705200})
ppoll([{fd=14, events=POLLIN}], 1, {tv_sec=0, tv_nsec=0}, NULL, 0) = 1 
([{fd=14, revents=POLLIN}], left {tv_sec=0, tv_nsec=0})
read(14, "/", 1)                        = 1
ppoll([{fd=14, events=POLLIN}, {fd=12, events=POLLIN}], 2, {tv_sec=9, 
tv_nsec=587000000}, NULL, 0) = 1 ([{fd=14, revents=POLLIN}], left 
{tv_sec=9, tv_nsec=579627984})
ppoll([{fd=14, events=POLLIN}], 1, {tv_sec=0, tv_nsec=0}, NULL, 0) = 1 
([{fd=14, revents=POLLIN}], left {tv_sec=0, tv_nsec=0})
read(14, "/", 1)                        = 1
rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 
{sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
write(11, "\2\0\0\0\0\0\0\0\0\0\0\0&\0\0\0", 16) = 16
write(11, "/local/domain/1/backend/vif/2/0/"..., 38) = 38
futex(0xaaab092a93bc, FUTEX_WAIT_PRIVATE, 0, NULL) = 0
futex(0xaaab092a9360, FUTEX_WAKE_PRIVATE, 1) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 
NULL, 8) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 
{sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
write(11, "\2\0\0\0\0\0\0\0\0\0\0\0'\0\0\0", 16) = 16
write(11, "/local/domain/1/backend/vif/2/0/"..., 39) = 39
futex(0xaaab092a93b8, FUTEX_WAIT_PRIVATE, 0, NULL) = 0
futex(0xaaab092a9360, FUTEX_WAKE_PRIVATE, 1) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 
NULL, 8) = 0
ppoll([{fd=14, events=POLLIN}, {fd=12, events=POLLIN}], 2, {tv_sec=9, 
tv_nsec=446000000}, NULL, 0) = 1 ([{fd=14, revents=POLLIN}], left 
{tv_sec=9, tv_nsec=402461923})
ppoll([{fd=14, events=POLLIN}], 1, {tv_sec=0, tv_nsec=0}, NULL, 0) = 1 
([{fd=14, revents=POLLIN}], left {tv_sec=0, tv_nsec=0})
read(14, "/", 1)                        = 1
rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 
{sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
write(11, "\2\0\0\0\0\0\0\0\0\0\0\0&\0\0\0", 16) = 16
write(11, "/local/domain/1/backend/vif/2/0/"..., 38) = 38
futex(0xaaab092a93bc, FUTEX_WAIT_PRIVATE, 0, NULL) = 0
futex(0xaaab092a9360, FUTEX_WAKE_PRIVATE, 1) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 
NULL, 8) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 
{sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
write(11, "\2\0\0\0\0\0\0\0\0\0\0\0&\0\0\0", 16) = 16
write(11, "/local/domain/1/backend/vif/2/0/"..., 38) = 38
futex(0xaaab092a93b8, FUTEX_WAIT_PRIVATE, 0, NULL) = 0
futex(0xaaab092a9360, FUTEX_WAKE_PRIVATE, 1) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 
NULL, 8) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 
{sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
write(11, "\2\0\0\0\0\0\0\0\0\0\0\0'\0\0\0", 16) = 16
write(11, "/local/domain/1/backend/vif/2/0/"..., 39) = 39
futex(0xaaab092a93bc, FUTEX_WAIT_PRIVATE, 0, NULL) = 0
futex(0xaaab092a9360, FUTEX_WAKE_PRIVATE, 1) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 
NULL, 8) = 0
read(14, "/", 1)                        = 1
rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 
{sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
write(11, "\2\0\0\0\0\0\0\0\0\0\0\0&\0\0\0", 16) = 16
write(11, "/local/domain/1/backend/vif/2/0/"..., 38) = 38
futex(0xaaab092a93b8, FUTEX_WAIT_PRIVATE, 0, NULL) = 0
futex(0xaaab092a9360, FUTEX_WAKE_PRIVATE, 1) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 
NULL, 8) = 0
ppoll([{fd=14, events=POLLIN}, {fd=12, events=POLLIN}], 2, {tv_sec=9, 
tv_nsec=173000000}, NULL, 0) = 1 ([{fd=14, revents=POLLIN}], left 
{tv_sec=9, tv_nsec=146785969})
ppoll([{fd=14, events=POLLIN}], 1, {tv_sec=0, tv_nsec=0}, NULL, 0) = 1 
([{fd=14, revents=POLLIN}], left {tv_sec=0, tv_nsec=0})
rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 
{sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
write(11, "\2\0\0\0\0\0\0\0\0\0\0\0&\0\0\0", 16) = 16
write(11, "/local/domain/1/backend/vif/2/0/"..., 38) = 38
futex(0xaaab092a93bc, FUTEX_WAIT_PRIVATE, 0, NULL) = 0
futex(0xaaab092a9360, FUTEX_WAKE_PRIVATE, 1) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 
NULL, 8) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 
{sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
write(11, "\2\0\0\0\0\0\0\0\0\0\0\0'\0\0\0", 16) = 16
write(11, "/local/domain/1/backend/vif/2/0/"..., 39) = 39
futex(0xaaab092a93b8, FUTEX_WAIT_PRIVATE, 0, NULL) = 0
futex(0xaaab092a9360, FUTEX_WAKE_PRIVATE, 1) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 
NULL, 8) = 0
read(14, "/", 1)                        = 1
rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, 
{sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 8) = 0
write(11, "\2\0\0\0\0\0\0\0\0\0\0\0&\0\0\0", 16) = 16
write(11, "/local/domain/1/backend/vif/2/0/"..., 38) = 38
futex(0xaaab092a93bc, FUTEX_WAIT_PRIVATE, 0, NULL) = 0
futex(0xaaab092a9360, FUTEX_WAKE_PRIVATE, 1) = 0
rt_sigaction(SIGPIPE, {sa_handler=SIG_DFL, sa_mask=[], sa_flags=0}, 
NULL, 8) = 0
ppoll([{fd=14, events=POLLIN}, {fd=12, events=POLLIN}], 2, {tv_sec=9, 
tv_nsec=13000000}, NULL, 0

>>>>> close(6)                                = 0
>>>>> close(5)                                = 0
>>>>> munmap(0xffff9f45f000, 4096)            = 0
>>>>> close(7)                                = 0
>>>>> close(10)                               = 0
>>>>> close(9)                                = 0
>>>>> close(8)                                = 0
>>>>> close(11)                               = 0
>>>>> close(3)                                = 0
>>>>> close(4)                                = 0
>>>>> exit_group(0)                           = ?
>>>>> +++ exited with 0 +++
>>>>>
>>>>> royger told me that it is a BUG and not an issue with my setup. Therefore here I am.
>>>
>>> Just a bit more context: AFAICT the calls to libxl_cpu_bitmap_alloc in
>>> parse_global_config will prevent xl from being usable on anything
>>> different than the control domain (due to sysctl only available to
>>> privileged domains). This is an issue for 'xl devd', as it won't
>>> start anymore.
>>
>> These look non-fatal at first glance?
> 
> Indeed. I was too quick reading the trace and assumed `xl devd` exited
> due to the errors, but those are non fatal, the process just
> daemonized.
> 
> Thanks, Roger.

Cheers,
Andrea


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 12:11:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 12:11:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284241.483438 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ6m3-00077E-16; Fri, 04 Mar 2022 12:11:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284241.483438; Fri, 04 Mar 2022 12:11:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ6m2-000777-UK; Fri, 04 Mar 2022 12:11:06 +0000
Received: by outflank-mailman (input) for mailman id 284241;
 Fri, 04 Mar 2022 12:11:05 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQ6m1-00076x-Mc; Fri, 04 Mar 2022 12:11:05 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQ6m1-000188-Fn; Fri, 04 Mar 2022 12:11:05 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQ6m1-0006bR-4q; Fri, 04 Mar 2022 12:11:05 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQ6m1-00060U-1a; Fri, 04 Mar 2022 12:11:05 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=R+XN9sDsTVIAM/FfhCg3r9rxX80TyQBLGvOJZD8VlqU=; b=Q/60ufHBadUtQQFygR3/HQTGEd
	pV/0XDatLAEw2ObVdngvLPNCff+18yMvVR7psa5IDNvAFADvh+Ur1kfD/2ytzv7VE2yl/6f6NAxHW
	CX8hpk6Aat/m3tm5lsc5eKm4iRzwi24g3aRJDrZ/YPI51Gn8YzEMN1HsUJWt+7Etpkrc=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168393-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168393: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=cac9608c172e9439d9cba350579af59b649b77e7
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 04 Mar 2022 12:11:05 +0000

flight 168393 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168393/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              cac9608c172e9439d9cba350579af59b649b77e7
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  602 days
Failing since        151818  2020-07-11 04:18:52 Z  601 days  583 attempts
Testing same since   168393  2022-03-04 04:19:07 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 99482 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 12:13:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 12:13:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284252.483449 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ6oQ-0007ik-F6; Fri, 04 Mar 2022 12:13:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284252.483449; Fri, 04 Mar 2022 12:13:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ6oQ-0007id-C3; Fri, 04 Mar 2022 12:13:34 +0000
Received: by outflank-mailman (input) for mailman id 284252;
 Fri, 04 Mar 2022 12:13:33 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=zc/n=TP=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nQ6oP-0007iW-46
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 12:13:33 +0000
Received: from NAM04-BN8-obe.outbound.protection.outlook.com
 (mail-bn8nam08on2061b.outbound.protection.outlook.com
 [2a01:111:f400:7e8d::61b])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 811d3015-9bb4-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 13:13:31 +0100 (CET)
Received: from DM6PR03CA0011.namprd03.prod.outlook.com (2603:10b6:5:40::24) by
 SN6PR02MB4989.namprd02.prod.outlook.com (2603:10b6:805:71::17) with
 Microsoft
 SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5038.14; Fri, 4 Mar 2022 12:13:27 +0000
Received: from DM3NAM02FT036.eop-nam02.prod.protection.outlook.com
 (2603:10b6:5:40:cafe::12) by DM6PR03CA0011.outlook.office365.com
 (2603:10b6:5:40::24) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.13 via Frontend
 Transport; Fri, 4 Mar 2022 12:13:27 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (149.199.80.198) by
 DM3NAM02FT036.mail.protection.outlook.com (10.13.5.20) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5038.14 via Frontend Transport; Fri, 4 Mar 2022 12:13:26 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Fri, 4 Mar 2022 12:13:25 +0000
Received: from smtp.xilinx.com (172.21.105.197) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Fri, 4 Mar 2022 12:13:25 +0000
Received: from [10.71.117.182] (port=58089)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nQ6oG-00036m-El; Fri, 04 Mar 2022 12:13:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 811d3015-9bb4-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=AD2Y0OAJPUSYc/s+nmp0erQ5p4L3xjGiqByMQ7iqQPWvhXlv8hsVAdCoPrYnUpz4YTipVPiks95U7No7OlKsvX27iY/pRvuqYG+dybyThvTz3VbduNnvA4foADKlK0o2gHLMaBxZ/j8+umOTf9QM4kJb0OjnkNLuzv0eldD9xLoQs4hcUvbBoyADjTpMB9tLA6xQG3r4TASzYb/rShkNjMtCTEhQwTD+ARF4v0iYoJbETbqv8bzUrNmqhzbCMt4kijElB93IgOYk8AqpEbGBVaV4Rh51ceTKoDdYfP+bmFFMJRbjevEb/wuY1Vt7/qQ5of6h1dY+JGJB7YSu/erT5g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=wVHYqt6+KjCrCZlM/hq1qXnt9nEaEPbJGD011O0LeKM=;
 b=YjXvHXCpoOeAtKrdU0nwgk5jCRYUoEMiyy3JW0t78zU+qvxhpHcPMwPPLO87gUT5dgNRcSJE3T56UifEDbHeoPhANT5tFHUKi4xuenRXLOAi92Gf0GSauSgMx0LK9A3kzxerJ1j03Jn4Nc5uhvyjsD1V5Nn7HcQCxpHGwO9u9I8N6G+LDwl/o+U46Jt1p/SrnmNm6Qa88MP8AI3moyA+ndBbIHTrhAFi9K32flSLKXkH49ClUmdRKfB5Inwqy9CqVAh8TEi86jQ2ZDX0nYXm1O22ERMQb2JctiUBcWFRlh8/j4JiSTB4KebZksqEM2cS9XlvVk8EohsfRuB33Sjn0w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=xen.org smtp.mailfrom=xilinx.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=xilinx.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=wVHYqt6+KjCrCZlM/hq1qXnt9nEaEPbJGD011O0LeKM=;
 b=Vz7JAsZyR10S1fMittSWNuiR5Lt0Z2rUOgvGAMBZMWqflXvpdATtudchqy+FzciLvctyU6np4+hmUB6SET2cvyOsC1U8n9J2+E77sPklHU2wRc6XYrLOgCCYeFiu3WQVhtcP26LDwWduwuYuFj2Hyh77dPJ6IgGBrYtygfYiShs=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch01.xlnx.xilinx.com;
Message-ID: <8f78044e-aca2-5919-1841-15989daeb986@xilinx.com>
Date: Fri, 4 Mar 2022 12:13:23 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [XEN v9 4/4] xen/arm64: io: Handle data abort due to cache
 maintenance instructions
To: Julien Grall <julien@xen.org>, Ayan Kumar Halder
	<ayan.kumar.halder@xilinx.com>, <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <stefanos@xilinx.com>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>
References: <20220301124022.10168-1-ayankuma@xilinx.com>
 <20220301124022.10168-5-ayankuma@xilinx.com>
 <26ee167e-16ea-e358-f390-dc96961d3234@xen.org>
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
In-Reply-To: <26ee167e-16ea-e358-f390-dc96961d3234@xen.org>
Content-Type: text/plain; charset="UTF-8"; format=flowed
Content-Transfer-Encoding: 7bit
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 458743a7-9495-440c-a105-08d9fdd86335
X-MS-TrafficTypeDiagnostic: SN6PR02MB4989:EE_
X-Microsoft-Antispam-PRVS:
	<SN6PR02MB4989994038A63462C955F71CB2059@SN6PR02MB4989.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch01.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(70206006)(54906003)(82310400004)(70586007)(2616005)(110136005)(316002)(5660300002)(31696002)(4326008)(8676002)(7416002)(8936002)(9786002)(36860700001)(36756003)(53546011)(7636003)(40460700003)(47076005)(508600001)(336012)(426003)(2906002)(186003)(26005)(356005)(31686004)(50156003)(43740500002);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 12:13:26.6670
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 458743a7-9495-440c-a105-08d9fdd86335
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch01.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DM3NAM02FT036.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR02MB4989

Hi Julien,

On 04/03/2022 10:46, Julien Grall wrote:
> Hi Ayan,
>
> On 01/03/2022 12:40, Ayan Kumar Halder wrote:
>> When the data abort is caused due to cache maintenance for an address,
>> there are two scenarios:-
>>
>> 1. Address belonging to a non emulated region - For this, Xen should
>> set the corresponding bit in the translation table entry to valid and
>> return to the guest to retry the instruction. This can happen sometimes
>> as Xen need to set the translation table entry to invalid. (for eg
>> 'Break-Before-Make' sequence).
>>
>> 2. Address belongs to an emulated region - Xen should ignore the
>> instruction (ie increment the PC) and return to the guest.
>
> I would be explicit and say something along the lines:
>
> "Xen doesn't cache data for emulated regions. So we can safely ignore 
> them".
>
> There is a third scenarios:
>
> The address belongs to neither an emulated region nor has a valid 
> mapping in the P2M.

To check this, we should test "try_handle_mmio() == IO_UNHANDLED". If so 
then send an abort to the guest.

Is this correct ?

- Ayan

>>
>> We try to deal with scenario#1, by invoking check_p2m(). If this is
>> unsuccessful, then we assume scenario#2.
>
> This means that you will ignore cache maintenance on invalid region. I 
> think we should send an abort to the guest rather than let them 
> believe it worked.
>
> Cheers,
>


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 12:28:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 12:28:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284259.483461 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ72V-0001Hn-Pp; Fri, 04 Mar 2022 12:28:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284259.483461; Fri, 04 Mar 2022 12:28:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ72V-0001Hg-MR; Fri, 04 Mar 2022 12:28:07 +0000
Received: by outflank-mailman (input) for mailman id 284259;
 Fri, 04 Mar 2022 12:28:06 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ZVQB=TP=citrix.com=prvs=055bc9087=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nQ72U-0001Ha-GS
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 12:28:06 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 895c277d-9bb6-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 13:28:04 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 895c277d-9bb6-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646396885;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=dN0AMt5O+yXjoCqRavd7qAnoTlWmzYwYUUprXXvzMYA=;
  b=PtKVIqewPGPzhELDDxrRTymOVSqTH96hDvl3nBXeEKG4tQDADxi4bNWV
   SEBPP5B59NUYFJMxhkbJdHTm3ZOw3Zg64cOu51Xc1PW29theFt2Agy1o4
   /bYRzqIpir1LVl9IaPo8R7eXvZLWUd5zMV+QIcgAVLq+nt16sGHtMSPWm
   4=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65466918
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:IFy9W6nrEaJKB1slIs79aHLo5gyyJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xJNDDuOO/jZYGKnL95wbNvlph9VupLXxoUySgRqq3pjFSMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiW1/V4
 7senuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYFhoiNa3etuonWBRzPwVdL4BlpOPdGC3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3oHZvwCufFf87aZvCX7/L9ZlT2zJYasVmQ6uCO
 ZRIMGoHgBLoQkJCAgpQGcMHpsiPonagfBxoogO3jP9ii4TU5FMoi+W8WDbPQfSaSMMQkkuGq
 2bu+2XiHgpcJNGZ0SCC8H+nmqnIhyyTcJ0WPK218LhtmlL77mUVBAcbXB2gvfSng0i3R9V3M
 EUS5iMoq6Eq9VeiCNjhNzW6qXiIpA8BWPJfFuQ77EeGza+83uqCLjFaFHgbMoVg7ZJoA2xxv
 rOUoz/3LWNyu7aVW1yTzLyZhh+WGjo4DjNefxZRGGPp/OLfiI00ixvOSPNqH6i0ksD5FFnM/
 tyakMQtr+5N1JBWjs1X6XiC2mvx/caREmbZ8y2KBjrN0+9vWGKyi2VEA3D/5O0IEouWR0LpU
 JMsy5nHt7Bm4X1geUWwrAQx8FOBuq7t3N702wcH83wdG9KFoSTLkWd4um0WGauRGpxYEQIFm
 WeK0e+r2LddPWGxcYh8aJ+rBsIhwMDITIq5CKuPNIsVOsYtL2drGR2Cg2bKhQgBd2B2zMkC1
 WqzK57wXR7294w9pNZJewvt+eBynX1vrY8ibZv60w6mwdKjiI29Et843K+1Rrlhtsus+VyNm
 /4Gbpfi40gPAYXWP3iMmaZOfA9iEJTOLc2vwyChXrXYeVQO9aBII6K5/I7NjKQ+x/UFzrqTp
 yrlMqKaoXKm7UD6xcyxQikLQJvkXIplrGJ9OiopPF2y3GMkb5rp56AaH6bbt5F+nAC/5ZaYl
 8U4Rvg=
IronPort-HdrOrdr: A9a23:BRISNKrvnohXIKrIa9lbKOgaV5vJL9V00zEX/kB9WHVpm5Oj+P
 xGzc526farslsssREb+OxpOMG7MBThHLpOkPMs1NCZLXTbUQqTXfpfBO7ZrQEIdBeOlNK1uZ
 0QFpSWTeeAcWSS7vyKkTVQcexQueVvmZrA7Yy1rwYPcegpUdAZ0+4QMHfkLqQcfnghOXNWLu
 v52iIRzADQBkj/I/7LTkUtbqzmnZnmhZjmaRkJC1oO7xSPtyqh7PrfHwKD1hkTfjtTyfN6mF
 K12TDR1+GGibWW2xXc32jc49B/n8bg8MJKAIiphtIOIjvhpw60bMBKWqGEvhoyvOazgWxa2+
 XkklMFBYBe+nnRdma6rV/E3BTh6i8n7zvYxVqRkRLY0LvEbQN/L/AEqZNScxPf5UZllsp7yr
 h302WQsIcSJQ/cnQzmjuK4GC1Cpw6Rmz4PgOQTh3tQXc81c7lKt7ES+0tTDdMpAD/60oY6C+
 NjZfusqMq+SWnqLkwxg1MfgOBFBh8Ib1S7qwk5y4GoOgFt7T5EJxBy/r1cop8CnKhNP6Wsqd
 60d5iAr4s+PfP+XZgNdNvpfvHHeFAlYSi8Rl56cm6XXZ3uBRr22uvKCfMOlaWXRKA=
X-IronPort-AV: E=Sophos;i="5.90,155,1643691600"; 
   d="scan'208";a="65466918"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=bBh640GhcekHCsaQ7O71OcXRazG6E3P1cV6QYWkagRjr/oiV5+goSXJfKVgGt54s05pGV11O4sTgZzTbcZllzaAj6tMvDekU3AcJLL3M95lT1J5DgES/P6TzqLcV+DSMZGdyljPjHby4+pCtchUArc6Ls1vFCIxzZVn8fHW3x/EmiRbsRJ8EoFEslNbr6TRt0RSMjkVYLloihN3OVef5n9yH7oNHPE/hDOVU9n54mJ9ZvvUsenrwwEmWnHRgCPQAWTZj2acRIPcRyYwgKxg8GudnN9nrxMWepMEZbuwCAgScvdqbD4JAyiDwWBQWCP0A3gJAh0UtT8LtnXLYc8BmDA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=gNKztTb58j2y4AuBoJQ8CN7b5TakX7boc7Um12ZryHc=;
 b=Wm5BZF6lZ3kYAZX7WAAqN97XqErUxxk6RIhlu6C30DsYzrdayli2eEJQ2ITvAsy3+WKrD68QkSvdsJGCOcijBJiUh349n/95KI+SBscYRWvdu7CUgUzUkzN99XzdK30FtwU497Bb/LcxdVlSKQ4nMsf9sPfWT56fp/xdDWLlVZDbRtn3V4by7RZdfvcnl68a4XKHcvCUmutdST8s+opbvkb7ElzQLGpCWsGfq/Ju+PIgsk/Hp0jf3mNOe5bZkAhQexHE3M/o4KTPIoMhTG5xwKkq8rmHquqUAxS4QnZA7mTmi/tKNo9nQSq95hM+KpeeKiHFoFB1rXropt1yhbqKzg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=gNKztTb58j2y4AuBoJQ8CN7b5TakX7boc7Um12ZryHc=;
 b=I0GkqdTMQ/KscLfJe7v50fVLrTA1SkQEF1az+C5bmjPl82vf39lsnRe7nHl2uW4iLluRL9fa0zM3wjdDFFVu94NRueWBSUomX8PXK3uLMfoYhApAOZf8ojEjD+p52VchlV1NhCcrmZug9DY7ZM8rW7yFW+v8f7hGsb8+Tz9c9gM=
Date: Fri, 4 Mar 2022 13:27:53 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Andrea Stevanato <andrea.stevanato@santannapisa.it>
CC: Jason Andryuk <jandryuk@gmail.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>, "wl@xen.org" <wl@xen.org>, Anthony PERARD
	<anthony.perard@citrix.com>
Subject: Re: Network driver domain broken
Message-ID: <YiIFyRUNXpUfzwRB@Air-de-Roger>
References: <DB7PR03MB50027EE92E11BFFF71AADC4598049@DB7PR03MB5002.eurprd03.prod.outlook.com>
 <92827eec-b6e9-9c95-8f9e-fcf063d45090@santannapisa.it>
 <YiDt7fX92n6Luc2l@Air-de-Roger>
 <CAKf6xpsnmQG7-LXn5+Uz4mncWsN0EZ8wpagY8f8OydvZNb6g5A@mail.gmail.com>
 <YiH9cee6NIKA6MWg@Air-de-Roger>
 <53a4fe6b-efc8-bfa1-8475-0aa58774051a@santannapisa.it>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <53a4fe6b-efc8-bfa1-8475-0aa58774051a@santannapisa.it>
X-ClientProxiedBy: LO4P265CA0070.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:2af::10) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2593ff65-7e34-4aa8-e035-08d9fdda6b34
X-MS-TrafficTypeDiagnostic: BYAPR03MB4198:EE_
X-Microsoft-Antispam-PRVS: <BYAPR03MB41984FC1DC9A53F49CD99A1B8F059@BYAPR03MB4198.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(4326008)(186003)(66946007)(26005)(66476007)(66556008)(8676002)(107886003)(6666004)(9686003)(53546011)(8936002)(5660300002)(82960400001)(6512007)(86362001)(6506007)(38100700002)(2906002)(316002)(85182001)(6916009)(54906003)(508600001)(83380400001)(3480700007)(6486002)(33716001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?d1ZFdlB4Z0F5bldFWlYzSkd0RUF0VUtHVjB4UzMrY2hxVFl1S241T1B5d0JU?=
 =?utf-8?B?cG85RmE3WitaZHhpK2RmaVBLTmpUenBTLzZyRjVsK2JLMEhtdDRMU1BPdHlr?=
 =?utf-8?B?RGdqSitsWTNNQWNjdC9HeHNRdS94N2JGRjBQQS9iWUEwdTQ4VnpteGcwNjZt?=
 =?utf-8?B?RExEWktNWkx1MDg2OTNTTWxIaUtZbXdRWlYyU0dRdTZkQngyY0Zac0d1V2Q2?=
 =?utf-8?B?L2dneFMrTW1kdG9OVTZVQm8yd292Q1pELzJyY2FpTWJ3ZDIxZzR4TlNldTZW?=
 =?utf-8?B?YUx5UDFwdnZSaXdTdTJobElNZjNpQ1JQZml4TlgxUG5rK3dIWjhRL3YxYjJv?=
 =?utf-8?B?UHh0NU1DRkxURVphTzJWMTZkQ1MxVUhPRUw5UzBYSWovZTZjVnJIcmF5eVJW?=
 =?utf-8?B?bzR1YTU5NVUvTXM4YXhnclAvM2FMYUw1YXhKL0lDMnNIMnhBT25hWEtHd1BN?=
 =?utf-8?B?Vy80cXlNZVpPZ0pYY0xFSzdFVE5CMUlRdWxnZ2hIbFpYblVCUnpZMWh1V3Qx?=
 =?utf-8?B?RmdQWjYyWlFKTTZxcEIvejNmZFZ1WEI4VTVST2ZXelF5UmNmemhwdEpaWi8x?=
 =?utf-8?B?WkZNVWx0b0NHV20zNjFTRi8xTmlLOUNCSWxUcE9OaS9MSnNLdFBQZ0VJRE5q?=
 =?utf-8?B?Yjk4SUtIdUpFay9paXF1bkhTeHRRbVBVOHppUW15dXFuWURMY1Uzbkh3THU4?=
 =?utf-8?B?ZmlGVWE1bjJGUHZ0Zng5cG9KU0NGTTNSd0J1WnU5NVNaN0doWUVwaUFDT2hL?=
 =?utf-8?B?dnZRdThKMlRLcW1PdVIyeCsrNGljNmoyWTdoMG1IVjh5V01wSTZ1WHNMdkpI?=
 =?utf-8?B?OEI0UGxmd08wdHhGdFBVc0dGVmMwN3liRVFiRmhWTGdvQVRucllhUWtCZlpp?=
 =?utf-8?B?UlBXdWx4OUpadGVIUnFjbTljbERDTzdwT1Zkczh1cEpEbVVRcXYyQ0lzcXkz?=
 =?utf-8?B?Mjgvbi9SOVhETys0SGx2UllkcEdLUU5tdEduK1l6Uk1BWjdpY0xIQXNNZEdx?=
 =?utf-8?B?ekdQSUZuM3R6TGxrR2xya3ZLUkdlYlZvR1pUU3kxenBqYkx0NExCRGd4QjdV?=
 =?utf-8?B?L3MrL1FrQkVnSGx5UkdRbjBTeXBIVW5MZjB3L0dzWU14TVc4QmVrZWZIN1dq?=
 =?utf-8?B?VzQ0RkwvUHF5VFJWZ3hPSFVSMzZsZFVncmxMbmRXL0JHd2ZBbHlEdXI4S1ZN?=
 =?utf-8?B?Y0k3UFhzaEd2bWR0S0QrM3hFSXpLU2h3LysxM2ZraEFOdFNkUWpjdXUxbFNK?=
 =?utf-8?B?djdsNFhaQnpOYThONkhCWVpjYlBnOEFZMC9vVngyRGIyT0FyVllQdjFTSjA5?=
 =?utf-8?B?WElnY0FpaVZXTkhuSnhRN1dLWnlHaVRHT2h3dnZXcWdhRGRVU051cjU4NjFy?=
 =?utf-8?B?cmhsTWJsYko2ODh1UU0xckk4NUFKWFJ3UDJLUWxyOFJ1RGdWZ3FIcHA3SGxh?=
 =?utf-8?B?Zms4TjVGUFY4OHRDSjNpaXhIZUJ3ZUNxWU4wUVIrUmMwZXd0a0NsYW5uYXJj?=
 =?utf-8?B?QWRYSXZ5MXYxamt1ZEJ3Q3FXN0o0eTBBSlF5UWs3TS8yazM4dSs5dGlWZEto?=
 =?utf-8?B?T1Qxc0tha3pHZzlId0JKbHZacWdkOUkzdVFvaWx0SDlFaVhmazgvejhNazUr?=
 =?utf-8?B?aFh2WWxEMnJ6Y29iYUdHZ1BMSDcwQlFLaWNlL2lkekgrZWNHV1hqVkhaWFR3?=
 =?utf-8?B?cjU5WnArSTZXaHNXYmY0ZENJdFUvYjQ0enhoV2VRMWRVY1kyMUpjMElsa1pT?=
 =?utf-8?B?enl5WVQxY0hXV0g5ZUlLM0FwVmJDR3p6S041VjdPZHYxVjJWMEFod2FSNDZY?=
 =?utf-8?B?V0lXdE9iQkszdWs0RURqM0YwRE9DZ1dBdkswSDdiRTZVT0VnY1BrRnZFVFpi?=
 =?utf-8?B?QU5WZzNFejFEaEo5Q0Z3cStaMnB6eVlNeUtBQ1lSdzdOSHpVbVQzT3NMbzZw?=
 =?utf-8?B?NWo0R3N1L2dMZ3Y2VFFKdGNlM2ptWTFkZlM4aTRwWllrVzNDZDE0U09xTUp3?=
 =?utf-8?B?T0t1N3E1UG1ZeHlvMUNpQ01ETjZtVEdhRnhUUnN6bnJIZ1l5V2FZSGZSZVMz?=
 =?utf-8?B?dnFHaDFQcFFBcmsxTXBvUlJTWERXWm02QnI1YnhaL0NaQTlXTE5rMWJTK093?=
 =?utf-8?B?UFFFM0I0amJUQ3N5bkFFdXRUNXZnYnJzVWFvelptYmkvVzNWeHVSdFhONjdp?=
 =?utf-8?Q?XhYwKW5KfLGFowPgk/zZUE0=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 2593ff65-7e34-4aa8-e035-08d9fdda6b34
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 12:27:59.4054
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: ng5JxMAT3y+/3pvqM8lS0pZyijnRwA8n+CTm2gulPCoH1+PRoZ3I5pENSBBuiPXTGzVN58EYG0Vff9p6ANBkUA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB4198
X-OriginatorOrg: citrix.com

On Fri, Mar 04, 2022 at 01:05:55PM +0100, Andrea Stevanato wrote:
> On 3/4/2022 12:52 PM, Roger Pau Monné wrote:
> > On Thu, Mar 03, 2022 at 01:08:31PM -0500, Jason Andryuk wrote:
> > > On Thu, Mar 3, 2022 at 11:34 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
> > > > 
> > > > On Thu, Mar 03, 2022 at 05:01:23PM +0100, Andrea Stevanato wrote:
> > > > > On 03/03/2022 15:54, Andrea Stevanato wrote:
> > > > > > Hi all,
> > > > > > 
> > > > > > according to the conversation that I had with royger, aa67b97ed34  broke the driver domain support.
> > > > > > 
> > > > > > What I'm trying to do is to setup networking between guests using driver domain. Therefore, the guest (driver) has been started with the following cfg.
> > > > > > 
> > > > > > name    = "guest0"
> > > > > > kernel  = "/media/sd-mmcblk0p1/Image"
> > > > > > ramdisk = "/media/sd-mmcblk0p1/rootfs.cpio.gz"
> > > > > > extra   = "console=hvc0 rdinit=/sbin/init root=/dev/ram0"
> > > > > > memory  = 1024 vcpus   = 2
> > > > > > driver_domain = 1
> > > > > > 
> > > > > > On guest0 I created the bridge, assigned a static IP and started the udhcpd on xenbr0 interface.
> > > > > > While the second guest has been started with the following cfg:
> > > > > > 
> > > > > > name    = "guest1"
> > > > > > kernel  = "/media/sd-mmcblk0p1/Image"
> > > > > > ramdisk = "/media/sd-mmcblk0p1/rootfs.cpio.gz"
> > > > > > extra   = "console=hvc0 rdinit=/sbin/init root=/dev/ram0"
> > > > > > memory  = 1024 vcpus   = 2
> > > > > > vcpus   = 2
> > > > > > vif = [ 'bridge=xenbr0, backend=guest0' ]
> > > > > > 
> > > > > > Follows the result of strace xl devd:
> > > > > > 
> > > > > > # strace xl devd
> > > > > > execve("/usr/sbin/xl", ["xl", "devd"], 0xffffdf0420c8 /* 13 vars */) = 0
> > > 
> > > > > > ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41b40) = -1 EPERM (Operation not permitted)
> > > > > > write(2, "libxl: ", 7libxl: )                  = 7
> > > > > > write(2, "error: ", 7error: )                  = 7
> > > > > > write(2, "libxl_utils.c:820:libxl_cpu_bitm"..., 87libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve the maximum number of cpus) = 87
> > > > > > write(2, "\n", 1
> > > > > > )                       = 1
> > > > > > clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0xffff9ee7a0e0) = 814
> > > > > > wait4(814, [{WIFEXITED(s) && WEXITSTATUS(s) == 0}], 0, NULL) = 814
> > > > > > --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=814, si_uid=0, si_status=0, si_utime=2, si_stime=2} ---
> > > 
> > > xl devd is daemonizing, but strace is only following the first
> > > process.  Use `strace xl devd -F` to prevent the daemonizing (or
> > > `strace -f xl devd` to follow children).
> > 
> > Or as a first step try to see what kind of messages you get from `xl
> > devd -F` when trying to attach a device using the driver domain.
> 
> Nothing has changed. On guest0 (the driver domain):
> 
> # xl devd -F
> libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve
> the maximum number of cpus
> libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve
> the maximum number of cpus
> libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve
> the maximum number of cpus
> [  696.805619] xenbr0: port 1(vif2.0) entered blocking state
> [  696.810334] xenbr0: port 1(vif2.0) entered disabled state
> [  696.824518] device vif2.0 entered promiscuous mode

Can you use `xl -vvv devd -F` here?

I assume the process doesn't die unexpectedly?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 12:45:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 12:45:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284268.483472 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ7J9-0003tF-DP; Fri, 04 Mar 2022 12:45:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284268.483472; Fri, 04 Mar 2022 12:45:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ7J9-0003t8-AG; Fri, 04 Mar 2022 12:45:19 +0000
Received: by outflank-mailman (input) for mailman id 284268;
 Fri, 04 Mar 2022 12:45:18 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nQ7J8-0003t2-HY
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 12:45:18 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nQ7J7-0001jq-T2; Fri, 04 Mar 2022 12:45:17 +0000
Received: from [54.239.6.187] (helo=[192.168.25.28])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nQ7J7-0006hh-M1; Fri, 04 Mar 2022 12:45:17 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=4ORg51VQcbeoJRtDmWuHU8qi2+q7pSAtFjmJOldN+6E=; b=DAXCA1dH0ndi0sXZABmhGVz2p2
	AUvNNFHdcliD79ZI1nmuXZdnWWJl4eWHJoEH9c+7zgfsDA1nc3C7BX6Fqxd+tl2GHIdy1MhRns81Y
	eYYvm6uHkDt4WhN5o4eyLrH3cRjfKmIAQ7Pr4z4d4MOAO2rU2JDZ/o95HzzCa6GlZ+us=;
Message-ID: <b2e5d9ae-5ed0-f1ad-cf82-b66528577456@xen.org>
Date: Fri, 4 Mar 2022 12:45:14 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [XEN v9 2/4] xen/arm64: io: Support instructions (for which ISS
 is not valid) on emulated MMIO region using MMIO/ioreq handler
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>,
 xen-devel@lists.xenproject.org
Cc: sstabellini@kernel.org, stefanos@xilinx.com, Volodymyr_Babchuk@epam.com,
 bertrand.marquis@arm.com, andrew.cooper3@citrix.com,
 george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org,
 roger.pau@citrix.com
References: <20220301124022.10168-1-ayankuma@xilinx.com>
 <20220301124022.10168-3-ayankuma@xilinx.com>
 <d41241f9-de9d-e681-2768-d44531722069@xen.org>
 <e4cb625d-5f2a-7e93-85ad-701e01e95e7f@xilinx.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <e4cb625d-5f2a-7e93-85ad-701e01e95e7f@xilinx.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi,

On 04/03/2022 11:27, Ayan Kumar Halder wrote:
>>
>>> +        {
>>> +            rc = decode_instruction(regs, info);
>>> +            if ( rc )
>>> +            {
>>> +                gprintk(XENLOG_DEBUG, "Unable to decode 
>>> instruction\n");
>>> +                info->dabt_instr.state = INSTR_ERROR;
>>> +        }
>>> +        return;
>>> +    }
>>> +
>>> +    /*
>>> +     * Armv8 processor does not provide a valid syndrome for 
>>> decoding some
>>> +     * instructions. So in order to process these instructions, Xen 
>>> must
>>> +     * decode them.
>>> +     */
>>> +    rc = decode_instruction(regs, info);
>>> +    if ( rc )
>>> +    {
>>> +        gprintk(XENLOG_ERR, "Unable to decode instruction\n");
>>> +        info->dabt_instr.state = INSTR_ERROR;
>>> +    }
>>> +}
>>> +
>>>   enum io_state try_handle_mmio(struct cpu_user_regs *regs,
>>> -                              const union hsr hsr,
>>> -                              paddr_t gpa)
>>> +                              mmio_info_t *info)
>>>   {
>>>       struct vcpu *v = current;
>>>       const struct mmio_handler *handler = NULL;
>>> -    const struct hsr_dabt dabt = hsr.dabt;
>>> -    mmio_info_t info = {
>>> -        .gpa = gpa,
>>> -        .dabt = dabt
>>> -    };
>>> +    int rc;
>>>   -    ASSERT(hsr.ec == HSR_EC_DATA_ABORT_LOWER_EL);
>>> +    ASSERT(info->dabt.ec == HSR_EC_DATA_ABORT_LOWER_EL);
>>>   -    handler = find_mmio_handler(v->domain, info.gpa);
>>> -    if ( !handler )
>>> +    if ( !((info->dabt_instr.state == INSTR_VALID) || 
>>> (info->dabt_instr.state == INSTR_LDR_STR_POSTINDEXING)) )
>>
>> This check will become quite large if we decode more class. I would 
>> instead set the dabt.valid bit whenever we successfully decoded the 
>> instruction and check that if dabt.valid here.
> 
> Actually the main reason to introduce INSTR_LDR_STR_POSTINDEXING is to 
> distinguish the scenario where the ISS was valid vs when instruction was 
> decoded manually.
> 
> In the later scenario, one would need to do the post increment of the rn.
> 
> It makes sense to me to have a unque 'info->dabt_instr.state' for each 
> type of instruction decoded as the post processing will vary. In this 
> case, the post processing logic checks that the instruction is 
> ldr_str_postindexing.

So I agree we want to have a unique state for type of instruction. I 
wasn't suggesting to remove it. Instead, I was suggesting to use 
dabt.valid as "This is a valid instruction for accessing an emulated MMIO".

> 
> However your concern that the check will become large is valid. I would 
> introduce a function as follows :-
> 
> bool check_instr_is_valid(enum instr_decode_state state)
> 
> {
> 
>      if (state == INSTR_VALID) || (state == INSTR_LDR_STR_POSTINDEXING) 
> || ...)
> 
>          return true;
> 
>      else
> 
>          return false;
> 
> }
> 
> And then in
> 
> enum io_state try_handle_mmio(struct cpu_user_regs *regs, ...)
> 
> {
> 
> ...
> 
>      if ( !check_instr_is_valid(info->dabt_instr.state) )
> 
>      {
> 
>          ASSERT_UNREACHABLE();
>          return IO_ABORT;
> 
>      }
> 
> ...
> 
> }
> 
> Please let me know your thoughts,

This is only moving the check to a separate function. It doesn't help 
with the fact that the check in check_instr_is_valid() is going to grow.

I can see two options:
   * Using dabt.valid as "The instruction was fully decoded".
   * Check that the state is not INSTR_ERROR

Above, I was suggesting the former. But I am open to use latter.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 12:49:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 12:49:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284277.483482 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ7NN-0004kP-UB; Fri, 04 Mar 2022 12:49:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284277.483482; Fri, 04 Mar 2022 12:49:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ7NN-0004kI-R9; Fri, 04 Mar 2022 12:49:41 +0000
Received: by outflank-mailman (input) for mailman id 284277;
 Fri, 04 Mar 2022 12:49:40 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nQ7NM-0004kC-Nb
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 12:49:40 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nQ7NJ-0001o2-Mm; Fri, 04 Mar 2022 12:49:37 +0000
Received: from [54.239.6.187] (helo=[192.168.25.28])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nQ7NJ-0006wf-Gy; Fri, 04 Mar 2022 12:49:37 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=tj+ngjbF5ZJ/diDwRe6jVcjr2CXT9qyUdecTd/dJZOo=; b=N9xXkveiehin42UNWMZv0gEGg/
	L1CX1YqsYNkWGmKO+pNZusMiKWgJLEICzchXJKSzyyW7SGB1OIUNmv65rBUrOP925Nk9rzUgIA9kG
	975Tv2P1C7egRJzOD2/lld3klbnD+5hxD7i5I4NSmh2GSce79pinaCpz9rbD7L6LTCV4=;
Message-ID: <26107eb2-d38d-d6b5-bdaa-d5058e964623@xen.org>
Date: Fri, 4 Mar 2022 12:49:34 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [XEN v9 4/4] xen/arm64: io: Handle data abort due to cache
 maintenance instructions
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>,
 xen-devel@lists.xenproject.org
Cc: sstabellini@kernel.org, stefanos@xilinx.com, Volodymyr_Babchuk@epam.com,
 bertrand.marquis@arm.com, andrew.cooper3@citrix.com,
 george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org,
 roger.pau@citrix.com
References: <20220301124022.10168-1-ayankuma@xilinx.com>
 <20220301124022.10168-5-ayankuma@xilinx.com>
 <26ee167e-16ea-e358-f390-dc96961d3234@xen.org>
 <8f78044e-aca2-5919-1841-15989daeb986@xilinx.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <8f78044e-aca2-5919-1841-15989daeb986@xilinx.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit



On 04/03/2022 12:13, Ayan Kumar Halder wrote:
> Hi Julien,

Hi,

> 
> On 04/03/2022 10:46, Julien Grall wrote:
>> Hi Ayan,
>>
>> On 01/03/2022 12:40, Ayan Kumar Halder wrote:
>>> When the data abort is caused due to cache maintenance for an address,
>>> there are two scenarios:-
>>>
>>> 1. Address belonging to a non emulated region - For this, Xen should
>>> set the corresponding bit in the translation table entry to valid and
>>> return to the guest to retry the instruction. This can happen sometimes
>>> as Xen need to set the translation table entry to invalid. (for eg
>>> 'Break-Before-Make' sequence).
>>>
>>> 2. Address belongs to an emulated region - Xen should ignore the
>>> instruction (ie increment the PC) and return to the guest.
>>
>> I would be explicit and say something along the lines:
>>
>> "Xen doesn't cache data for emulated regions. So we can safely ignore 
>> them".
>>
>> There is a third scenarios:
>>
>> The address belongs to neither an emulated region nor has a valid 
>> mapping in the P2M.
> 
> To check this, we should test "try_handle_mmio() == IO_UNHANDLED". If so 
> then send an abort to the guest.
> 
> Is this correct ?
I think it would be too late because if the region is emulated, then we 
would have already tried to handle it.

Instead, I think we need to check after we confirmed that the region is 
emulated or we need to forward to an IOREQ server.

So the check would have to be duplicated here.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 13:01:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 13:01:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284285.483493 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ7Yh-0007H3-U5; Fri, 04 Mar 2022 13:01:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284285.483493; Fri, 04 Mar 2022 13:01:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ7Yh-0007Gw-RH; Fri, 04 Mar 2022 13:01:23 +0000
Received: by outflank-mailman (input) for mailman id 284285;
 Fri, 04 Mar 2022 13:01:22 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQ7Yg-0007Gm-Ks; Fri, 04 Mar 2022 13:01:22 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQ7Yg-00022r-Bj; Fri, 04 Mar 2022 13:01:22 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQ7Yf-0001Tf-SO; Fri, 04 Mar 2022 13:01:21 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQ7Yf-0003R2-Rw; Fri, 04 Mar 2022 13:01:21 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=FwR+4SZ6AgzWrW6/QoWXGJv6gAhlZ9pwmYlZoD3j6nY=; b=FSELlVteUtf/iJv552HsvdeQjL
	IegSOwYM8a7CP42EjnQx6RC+ZCdFhwsZPx5tH9cWD+hnibcFYhHx1M4ExRiVFJ4ZGB4AHXXKNrCp9
	tf9Peopqc72hiadFjpsyDtAFzWFwuirWCn8f8xwLWwDQqQZN7n0JvXKlJ+zAirti+pPM=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168396-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168396: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=248496f890562fd6d6fea779520dd6335269e92c
X-Osstest-Versions-That:
    xen=1f410b0c7455748021be4ede59e7a0c0a2ffb1c4
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 04 Mar 2022 13:01:21 +0000

flight 168396 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168396/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  248496f890562fd6d6fea779520dd6335269e92c
baseline version:
 xen                  1f410b0c7455748021be4ede59e7a0c0a2ffb1c4

Last test of basis   168386  2022-03-03 23:01:40 Z    0 days
Testing same since   168396  2022-03-04 09:01:42 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Anthony PERARD <anthony.perard@citrix.com>
  Jan Beulich <jbeulich@suse.com>
  Roger Pau Monné <roger.pau@citrix.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   1f410b0c74..248496f890  248496f890562fd6d6fea779520dd6335269e92c -> smoke


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 13:46:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 13:46:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284297.483504 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ8Gb-0004Br-E1; Fri, 04 Mar 2022 13:46:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284297.483504; Fri, 04 Mar 2022 13:46:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ8Gb-0004Bk-Ap; Fri, 04 Mar 2022 13:46:45 +0000
Received: by outflank-mailman (input) for mailman id 284297;
 Fri, 04 Mar 2022 13:46:44 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=mKET=TP=santannapisa.it=Andrea.Stevanato@srs-se1.protection.inumbo.net>)
 id 1nQ8GZ-0004Be-Dg
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 13:46:44 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on20629.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::629])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 8358337b-9bc1-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 14:46:38 +0100 (CET)
Received: from DB7PR03MB5002.eurprd03.prod.outlook.com (2603:10a6:10:74::22)
 by VI1PR0301MB2191.eurprd03.prod.outlook.com (2603:10a6:800:27::6) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Fri, 4 Mar
 2022 13:46:35 +0000
Received: from DB7PR03MB5002.eurprd03.prod.outlook.com
 ([fe80::746a:e27:47ff:3e90]) by DB7PR03MB5002.eurprd03.prod.outlook.com
 ([fe80::746a:e27:47ff:3e90%7]) with mapi id 15.20.5038.015; Fri, 4 Mar 2022
 13:46:34 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8358337b-9bc1-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=U0tVR84QImKx/cLK+a0buBB5NagxASLvW/rP1u5u+T3xVLO+LUPUapuT6kZk/l7a8d6yiig6T96eqUeX1RB1ueaGpixFi886VldBpMepzTkNYMxiDqaB+ZE3B8tBWeeQGnzqOPH6V1O089gvESdHPaY0rhR/8E295hg+vRkQqXXF7oUo7SLLnyTBe1N8aLSPU+3m+ko0mhuUcHlpLodp+c8lMyv3sKconn7qHpVYuceL548Qp/tuqqPRnDr/qZ10e9FlzxdgcOhZNgrcQ3cStIllH80NDiInYxLva5CdtKqnDj5Nz/GpMm/pXTIHH9a8GGmE4UaI92Kj/8ne1BNr7A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=6eUl3G7/1+pk5GgG+vF6SKRGjenX5dou3XDLrKuLQh4=;
 b=lhocGC3zqX1DXV3blMdtP42EFeWs85FT3ck7PCo/AQWKrB3nz/0A2PRrSnwDXB5juFN06HwNlliMR+eKG6QgCFVpgHgu/W1MiSwoA6qFC5awAEMC9XcH5MI6/kUdT4RxSOiCHNLtQ3vOpt2Bq4XERwzjVhy2v+cQBaHf+lI9ze+iItTtPu+Nx1vYts/37tfyPH7gRUNKZs7zi6XtWkEnTx/7hjj8nVE03u+c++HVYrUxdsdJplXbo4jzuav+F250FmHgp7zb98FythEae0Bndg2h3hTy2DDZH2+vdDQ6AXlp/r3mGP+Fx8MZgPxH2VMmuPg/jbj6WXoZ6AD4xsyMSQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=santannapisa.it; dmarc=pass action=none
 header.from=santannapisa.it; dkim=pass header.d=santannapisa.it; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=santannapisa.it;
 s=selector1;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=6eUl3G7/1+pk5GgG+vF6SKRGjenX5dou3XDLrKuLQh4=;
 b=atcRuv094aJUVthQTcmgKHz2gpls4GnU9ICUdU2Evm04yZTOEuP/1+GgpIEaMvp8nD1AiIIL0UVnkDlrzv1igmZJAMsjTdP5OCaSTBhN9n/JzCGi5NxouLjOodtblM9Wm5TV/DKdJDrpNGmuGvOvvbKJpLIL/m+UBmLAgIwAS58=
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=santannapisa.it;
Message-ID: <0ce52d38-f542-9336-a100-1cbfc559f218@santannapisa.it>
Date: Fri, 4 Mar 2022 14:46:37 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: Network driver domain broken
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
Cc: Jason Andryuk <jandryuk@gmail.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 "wl@xen.org" <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>
References: <DB7PR03MB50027EE92E11BFFF71AADC4598049@DB7PR03MB5002.eurprd03.prod.outlook.com>
 <92827eec-b6e9-9c95-8f9e-fcf063d45090@santannapisa.it>
 <YiDt7fX92n6Luc2l@Air-de-Roger>
 <CAKf6xpsnmQG7-LXn5+Uz4mncWsN0EZ8wpagY8f8OydvZNb6g5A@mail.gmail.com>
 <YiH9cee6NIKA6MWg@Air-de-Roger>
 <53a4fe6b-efc8-bfa1-8475-0aa58774051a@santannapisa.it>
 <YiIFyRUNXpUfzwRB@Air-de-Roger>
From: Andrea Stevanato <andrea.stevanato@santannapisa.it>
In-Reply-To: <YiIFyRUNXpUfzwRB@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: MR2P264CA0061.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:500:31::25) To DB7PR03MB5002.eurprd03.prod.outlook.com
 (2603:10a6:10:74::22)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: eb279990-6592-4915-fd99-08d9fde565cf
X-MS-TrafficTypeDiagnostic: VI1PR0301MB2191:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR0301MB2191F63D3C868868D0B9BAE798059@VI1PR0301MB2191.eurprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DB7PR03MB5002.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(31696002)(786003)(53546011)(6916009)(316002)(66946007)(52116002)(86362001)(8936002)(54906003)(6506007)(4326008)(8676002)(66476007)(83380400001)(2906002)(66556008)(3480700007)(2616005)(6512007)(5660300002)(30864003)(38350700002)(38100700002)(44832011)(26005)(186003)(31686004)(36756003)(508600001)(6486002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?Nm5DQ3lCbUIxSWgweGxsQXRwd3ZIZFVucjM2ODlJaHdPeE9jTEIzeERHVHJ3?=
 =?utf-8?B?WmphNGdRL05tWktJUE44RjA3aDZicVNSNXIyN1ppQTQrdXA4Ylp1WDBtWjZB?=
 =?utf-8?B?Q0JhbU5kRHR2MmRia2RmYzVDV0loMjhxaVpIdStPY21YSUl5TU9Kby9GYzVB?=
 =?utf-8?B?TW95bnNWRjhoakVPdC9vcTNBbXFEd2JsM2lKcll0N0xzVjdGZmN2dWhkd3pj?=
 =?utf-8?B?Z3lwYkZGdDFSaHB2c2M4OWFFTFlsZFBMMjBWVmliTFVFNDhjSUxPQXdKaUFl?=
 =?utf-8?B?NlNPSU5DcnJWcDZRcS9aQndLVGhqVkdGdDVmR1F6VjBrdTZaU09FWmhnZnlO?=
 =?utf-8?B?M3U2UDAxZzZhSExPZ0FHR2FvNmtBN0p4ZXBqYndWK1Q1aVZpelBNVktKVzl6?=
 =?utf-8?B?c0xmZmFEcmgvc3dEN00rNGhqUlE4Ni9BZlZXa0V1Tm12b1Zjc1dpOVl6OHlt?=
 =?utf-8?B?Z25nb0kyQ09LQWtBRDhDYjlGZmZCRHNuTEwzSUlkKzBFQXlNN1V3alVOVjNu?=
 =?utf-8?B?TWhSVVdId3k4MzVTMXZtc3RwZEV3VUZYMWQ2cEZGWkk1TnMrYmpFVElRbXZM?=
 =?utf-8?B?dW5JYUNOTEowNGhWUnlkTGN5c2ExUXIwRDFmcDk4UWhOL3pHb2lyWHdsV1Fz?=
 =?utf-8?B?VHQ2NTVHZzlpeVo5NFFxSHJ2ekxFL09JcTROSlppa2VoZm5SQll4dk9PMlI4?=
 =?utf-8?B?ZCtVMStsamt5RUk2KzF0bFR5aXJNSDJ0ckhJTzl2QkxjZlNiWGNiSVZRSlNJ?=
 =?utf-8?B?YTBRc1ZoQmhsVnZhaURwNmp4bVVzY0NRcHpxZ0VueG4rZm1mVUp2KzA3MFpM?=
 =?utf-8?B?b3RRc0RjSDFNNmFKY0pERGQyWFVYQTJSRHB0a1RCd3RRdERNMmh6WG1sYklQ?=
 =?utf-8?B?QzE5aW95ZVVRazByZmR4VjJ1YXlOdGVJU3Q0cDZPTWRGWVZaYzdkREtWTkZa?=
 =?utf-8?B?VEVxVDVJcXpkQXQ4SEt5aS8rYnR0MFhiMk5IdGhQemo0VjJaRTdHbmxtcUhV?=
 =?utf-8?B?d1hkV1Q4SWZIOGlYTFJpcTd1V3U4d1F6d2RTVVhzREFaTWJyS3RtVEVWRDli?=
 =?utf-8?B?a0x0Ni90WCtmR08wY1lEMGFvYXltZnJYMWRRWnM0ZEpzOHNhOXdTc0lHaHNY?=
 =?utf-8?B?WW1nQXhsaW1rdmx3YytnamptOTRwdi9iWGtTOEZqR3ZpZFlVSThESEMzTUJh?=
 =?utf-8?B?cUtIRFVWSDRNb1laVkIyOUxNUmt0UEQyMG5OWE94ZVB2TGZ2NWlMVEk4K0ZV?=
 =?utf-8?B?cEs0dXM3UUdJR255UEd0ajJJTHZqUzdRRGRwOFBMd2k3amZaVEhDbHZMNTQy?=
 =?utf-8?B?dytjWVhFTFhaU1grbVU3UFEvcGJ6S0dmRVpveFZtRFRRRmk3bTlnbUZ1NktK?=
 =?utf-8?B?MlBKWVRWaFRhanQza3RkQzBFanZOTWZSR3FYSWc4S1RDWDlzbThBQk56bjRq?=
 =?utf-8?B?TVM4d3RpQVJUcEplYTdOR2UrY2dCK0V3UUM3TFN5Z2xaVjN6VVhhSG9icUhO?=
 =?utf-8?B?M2ZrbWRmVXpSYUNjMlhVbHZtQUkzTml5SkJHWSt4eHJiQTJnUTFITUljclE0?=
 =?utf-8?B?WkI5akxzM096T0NsSTZZZ2VBeWJUdW5xeG5kWWJZTDdVZWVMTkVBSTFhcHpu?=
 =?utf-8?B?bGw2bGg3djhFcVIxWENjMzBSU0pObEFqQjlxUEpPM3lCMTU3YWE1ZlJ6UnZD?=
 =?utf-8?B?dE1ka3c1V25wb3JPVjRLOG5mMlNlcU1OdmJrUXhnR0hONHRhcDJSeW1qdnR3?=
 =?utf-8?B?TytCOGN3MlFndjlKZzdkbEkwc3MrOE1rT2NINDdibTZzRDBJRytxVythR1ZT?=
 =?utf-8?B?U2hsWE0wRXJyOTV6ZmUrY1VhSk5NQ0NScEJta0NRWitkbE03T2lBSVMrMDY4?=
 =?utf-8?B?eWpHNUhSQko1Z00wV0kycWtEdTM2OW5xYW9iZzhBMkhEdEp3ck56QURyRnVq?=
 =?utf-8?B?eDJ1bGZNK2pHb1E5aGVvUjBVbWxNNVFOaXVaVWtVaXRwcGl4dnhOMUl1WGZF?=
 =?utf-8?B?cThNeDYxenJuTDFicGVOSlkxVG01NytMNXIxbXBDdzl3a1gwbXkwV2VJemNY?=
 =?utf-8?B?S3lwNzRtaW1XbUphR2tMRzlCbFJNditFTWtTNnZhZGo3T1BiOFpVSGxTUlVU?=
 =?utf-8?B?d1UycTJsazYvZlhTSlBSN1NLUkdpanJ1TVVZaFlySk1WT0tQSXNGR0o0ci9o?=
 =?utf-8?B?TW9iZTlzNXRza005YUdQYkZON05PUGwzenIzdEo4MWROMVdtTDZsYUQzUnBj?=
 =?utf-8?B?VjN4TWI2bWQ3Y3dVQ3ZxUnJmRlArcE83QzNGTmlmK2lrVUx2bytwQXVYNUpo?=
 =?utf-8?B?MUllbjM1T21xbFBtTDlwNnRZU0NsMVNzSUlnYVZSQTdXK1gxNHMrQT09?=
X-OriginatorOrg: santannapisa.it
X-MS-Exchange-CrossTenant-Network-Message-Id: eb279990-6592-4915-fd99-08d9fde565cf
X-MS-Exchange-CrossTenant-AuthSource: DB7PR03MB5002.eurprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 13:46:34.8822
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: d97360e3-138d-4b5f-956f-a646c364a01e
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: ++0w85VJObNyDrtlqZMNbhClwi1rskdMo9d7Up1np0MpA54C8c02XemOWP/41ZGt4h2+6+en4/vBeRD4hCGCScvMnpy5gqP2wijOOdJCe9ChgYWpyG4ie2m0f/nkwiVA
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0301MB2191

On 3/4/2022 1:27 PM, Roger Pau Monné wrote:
> On Fri, Mar 04, 2022 at 01:05:55PM +0100, Andrea Stevanato wrote:
>> On 3/4/2022 12:52 PM, Roger Pau Monné wrote:
>>> On Thu, Mar 03, 2022 at 01:08:31PM -0500, Jason Andryuk wrote:
>>>> On Thu, Mar 3, 2022 at 11:34 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
>>>>>
>>>>> On Thu, Mar 03, 2022 at 05:01:23PM +0100, Andrea Stevanato wrote:
>>>>>> On 03/03/2022 15:54, Andrea Stevanato wrote:
>>>>>>> Hi all,
>>>>>>>
>>>>>>> according to the conversation that I had with royger, aa67b97ed34  broke the driver domain support.
>>>>>>>
>>>>>>> What I'm trying to do is to setup networking between guests using driver domain. Therefore, the guest (driver) has been started with the following cfg.
>>>>>>>
>>>>>>> name    = "guest0"
>>>>>>> kernel  = "/media/sd-mmcblk0p1/Image"
>>>>>>> ramdisk = "/media/sd-mmcblk0p1/rootfs.cpio.gz"
>>>>>>> extra   = "console=hvc0 rdinit=/sbin/init root=/dev/ram0"
>>>>>>> memory  = 1024 vcpus   = 2
>>>>>>> driver_domain = 1
>>>>>>>
>>>>>>> On guest0 I created the bridge, assigned a static IP and started the udhcpd on xenbr0 interface.
>>>>>>> While the second guest has been started with the following cfg:
>>>>>>>
>>>>>>> name    = "guest1"
>>>>>>> kernel  = "/media/sd-mmcblk0p1/Image"
>>>>>>> ramdisk = "/media/sd-mmcblk0p1/rootfs.cpio.gz"
>>>>>>> extra   = "console=hvc0 rdinit=/sbin/init root=/dev/ram0"
>>>>>>> memory  = 1024 vcpus   = 2
>>>>>>> vcpus   = 2
>>>>>>> vif = [ 'bridge=xenbr0, backend=guest0' ]
>>>>>>>
>>>>>>> Follows the result of strace xl devd:
>>>>>>>
>>>>>>> # strace xl devd
>>>>>>> execve("/usr/sbin/xl", ["xl", "devd"], 0xffffdf0420c8 /* 13 vars */) = 0
>>>>
>>>>>>> ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41b40) = -1 EPERM (Operation not permitted)
>>>>>>> write(2, "libxl: ", 7libxl: )                  = 7
>>>>>>> write(2, "error: ", 7error: )                  = 7
>>>>>>> write(2, "libxl_utils.c:820:libxl_cpu_bitm"..., 87libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve the maximum number of cpus) = 87
>>>>>>> write(2, "\n", 1
>>>>>>> )                       = 1
>>>>>>> clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0xffff9ee7a0e0) = 814
>>>>>>> wait4(814, [{WIFEXITED(s) && WEXITSTATUS(s) == 0}], 0, NULL) = 814
>>>>>>> --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=814, si_uid=0, si_status=0, si_utime=2, si_stime=2} ---
>>>>
>>>> xl devd is daemonizing, but strace is only following the first
>>>> process.  Use `strace xl devd -F` to prevent the daemonizing (or
>>>> `strace -f xl devd` to follow children).
>>>
>>> Or as a first step try to see what kind of messages you get from `xl
>>> devd -F` when trying to attach a device using the driver domain.
>>
>> Nothing has changed. On guest0 (the driver domain):
>>
>> # xl devd -F
>> libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve
>> the maximum number of cpus
>> libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve
>> the maximum number of cpus
>> libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve
>> the maximum number of cpus
>> [  696.805619] xenbr0: port 1(vif2.0) entered blocking state
>> [  696.810334] xenbr0: port 1(vif2.0) entered disabled state
>> [  696.824518] device vif2.0 entered promiscuous mode
> 
> Can you use `xl -vvv devd -F` here?

# xl -vvv devd -F
libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to 
retrieve the maximum number of cpus
libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to 
retrieve the maximum number of cpus
libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to 
retrieve the maximum number of cpus
libxl: debug: libxl_device.c:1749:libxl_device_events_handler: ao 
0xaaaaece52130: create: how=(nil) callback=(nil) poller=0xaaaaece52430
libxl: debug: libxl_event.c:813:libxl__ev_xswatch_register: watch 
w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: register slotnum=3
libxl: debug: libxl_device.c:1806:libxl_device_events_handler: ao 
0xaaaaece52130: inprogress: poller=0xaaaaece52430, flags=i
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece51b90: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece51b90: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece4e7b0: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece4e7b0: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece4e990: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece4e990: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/frontend
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece4eaa0: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece4eaa0: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/frontend-id
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece4ebb0: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece4ebb0: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/online
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece52830: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_device.c:1714:backend_watch_callback: Domain 2:Added 
domain to the list of active guests
libxl: debug: libxl_device.c:1569:add_device: Domain 2:Added device 
/local/domain/1/backend/vif/2/0 to the list of active devices
libxl: debug: libxl_event.c:813:libxl__ev_xswatch_register: watch 
w=0xaaaaece52a10 wpath=/local/domain/1/backend/vif/2/0/state token=2/1: 
register slotnum=2
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/state
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece52d50: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/script
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece52f30: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece52f30: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/mac
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/bridge
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/handle
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/type
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/feature-sg
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/feature-gso-tcpv4
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/feature-gso-tcpv6
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/feature-ipv6-csum-offload
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/feature-rx-copy
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/feature-xdp-headroom
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/feature-rx-flip
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/feature-multicast-control
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/feature-dynamic-multicast-control
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/feature-split-event-channels
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/multi-queue-max-queues
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/feature-ctrl-ring
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/feature-sg
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/feature-gso-tcpv4
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/feature-gso-tcpv6
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/feature-ipv6-csum-offload
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/feature-rx-copy
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/feature-xdp-headroom
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/feature-rx-flip
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/feature-multicast-control
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/feature-dynamic-multicast-control
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/feature-split-event-channels
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/multi-queue-max-queues
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/feature-ctrl-ring
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: 
destroy
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/state
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53110: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xaaaaece52a10 
wpath=/local/domain/1/backend/vif/2/0/state token=2/1: event 
epath=/local/domain/1/backend/vif/2/0/state
libxl: debug: libxl_event.c:1055:devstate_callback: backend 
/local/domain/1/backend/vif/2/0/state wanted state 2 still waiting state 5
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/state
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece53fa0: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xaaaaece52a10 
wpath=/local/domain/1/backend/vif/2/0/state token=2/1: event 
epath=/local/domain/1/backend/vif/2/0/state
libxl: debug: libxl_event.c:1055:devstate_callback: backend 
/local/domain/1/backend/vif/2/0/state wanted state 2 still waiting state 5
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 
wpath=/local/domain/1/backend token=3/0: event 
epath=/local/domain/1/backend/vif/2/0/state
libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 
0xaaaaece54180: nested ao, parent 0xaaaaece52130
libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xaaaaece52a10 
wpath=/local/domain/1/backend/vif/2/0/state token=2/1: event 
epath=/local/domain/1/backend/vif/2/0/state
libxl: debug: libxl_event.c:1055:devstate_callback: backend 
/local/domain/1/backend/vif/2/0/state wanted state 2 still waiting state 6


> I assume the process doesn't die unexpectedly?

No, it does not.

> Thanks, Roger.

Regards,
Andrea


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 13:48:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 13:48:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284306.483516 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ8If-0004pu-Ui; Fri, 04 Mar 2022 13:48:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284306.483516; Fri, 04 Mar 2022 13:48:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ8If-0004pn-RB; Fri, 04 Mar 2022 13:48:53 +0000
Received: by outflank-mailman (input) for mailman id 284306;
 Fri, 04 Mar 2022 13:48:51 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQ8Id-0004pd-Mg; Fri, 04 Mar 2022 13:48:51 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQ8Id-0002tX-KP; Fri, 04 Mar 2022 13:48:51 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQ8Id-00034w-8S; Fri, 04 Mar 2022 13:48:51 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQ8Id-0006gg-82; Fri, 04 Mar 2022 13:48:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=SZLNFVgO9eeoa4hbORKt+xt/jgadDqfduyZsr4ZjjWc=; b=jFlL/BsFtoWu6yZgYIYI/JNac0
	kGT1101hLTQl9ZKPSkJRzH+9D2LpAycTH7vebpnaaDWZRQ5nydt6aY8Rv7AQOeza6CeWqPugEQL+z
	mkdMkTdjn6sjRVeOVVxcVp1vug4zzdcvVVFaiRzhVIaxVxjbdhptNSUqd5IQTvsJ+vf0=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168390-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168390: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=6629bf78aac7e53f83fd0bcbdbe322e2302dfd1f
X-Osstest-Versions-That:
    qemuu=36eae3a732a1f2aa81391e871ac0e9bb3233e7d7
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 04 Mar 2022 13:48:51 +0000

flight 168390 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168390/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168376
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168376
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168376
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168376
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168376
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168376
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168376
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168376
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 qemuu                6629bf78aac7e53f83fd0bcbdbe322e2302dfd1f
baseline version:
 qemuu                36eae3a732a1f2aa81391e871ac0e9bb3233e7d7

Last test of basis   168376  2022-03-03 15:08:22 Z    0 days
Testing same since   168390  2022-03-04 02:52:39 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Akihiko Odaki <akihiko.odaki@gmail.com>
  Jimmy Brisson <jimmy.brisson@linaro.org>
  Patrick Venture <venture@google.com>
  Peter Maydell <peter.maydell@linaro.org>
  Philippe Mathieu-Daudé <f4bug@amsat.org>
  Richard Henderson <richard.henderson@linaro.org>
  Shengtan Mao <stmao@google.com>
  Wentao_Liang <Wentao_Liang_g@163.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   36eae3a732..6629bf78aa  6629bf78aac7e53f83fd0bcbdbe322e2302dfd1f -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 13:49:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 13:49:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284315.483527 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ8J5-0005MP-7G; Fri, 04 Mar 2022 13:49:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284315.483527; Fri, 04 Mar 2022 13:49:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ8J5-0005MI-4I; Fri, 04 Mar 2022 13:49:19 +0000
Received: by outflank-mailman (input) for mailman id 284315;
 Fri, 04 Mar 2022 13:49:18 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQ8J4-0005M2-FW; Fri, 04 Mar 2022 13:49:18 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQ8J4-0002uN-EO; Fri, 04 Mar 2022 13:49:18 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQ8J4-00036S-7G; Fri, 04 Mar 2022 13:49:18 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQ8J4-0006qS-6v; Fri, 04 Mar 2022 13:49:18 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=5jxWc199DGFabkbzYIpFOwGojNCJ8UxrALZpDvobAak=; b=htgVmFgBqtVTj1rA0+KaSq0Snq
	T/W9n2p7916AZQoe/2TIJTOnvBqkY/r3l5dyydvdK4CQApQ53vehCmSvIDWEX9LkLOsPsX+dxaXbA
	yY7ij39NMlBwZ9dcRJEeRzoGViPkxkh7DfkxSvOo7YFlILkSDxvEKlaPjoRxGIvFfHwM=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168397-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168397: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4a68176cb548902cad93e6ebb5957d0cac94d297
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 04 Mar 2022 13:49:18 +0000

flight 168397 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168397/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4a68176cb548902cad93e6ebb5957d0cac94d297
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    4 days
Failing since        168258  2022-03-01 01:55:31 Z    3 days   32 attempts
Testing same since   168397  2022-03-04 09:41:33 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 351 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 14:40:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 14:40:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284328.483537 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ96l-000448-Uw; Fri, 04 Mar 2022 14:40:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284328.483537; Fri, 04 Mar 2022 14:40:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ96l-000441-Rt; Fri, 04 Mar 2022 14:40:39 +0000
Received: by outflank-mailman (input) for mailman id 284328;
 Fri, 04 Mar 2022 14:40:39 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=zc/n=TP=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nQ96k-00043v-OL
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 14:40:39 +0000
Received: from NAM10-DM6-obe.outbound.protection.outlook.com
 (mail-dm6nam10on2060e.outbound.protection.outlook.com
 [2a01:111:f400:7e88::60e])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 0cffa23c-9bc9-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 15:40:36 +0100 (CET)
Received: from DM5PR04CA0041.namprd04.prod.outlook.com (2603:10b6:3:12b::27)
 by CY4PR02MB3384.namprd02.prod.outlook.com (2603:10b6:910:7c::32) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Fri, 4 Mar
 2022 14:40:30 +0000
Received: from DM3NAM02FT049.eop-nam02.prod.protection.outlook.com
 (2603:10b6:3:12b:cafe::e1) by DM5PR04CA0041.outlook.office365.com
 (2603:10b6:3:12b::27) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Fri, 4 Mar 2022 14:40:30 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (149.199.80.198) by
 DM3NAM02FT049.mail.protection.outlook.com (10.13.5.68) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5038.14 via Frontend Transport; Fri, 4 Mar 2022 14:40:29 +0000
Received: from xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Fri, 4 Mar 2022 14:40:28 +0000
Received: from smtp.xilinx.com (172.21.105.198) by
 xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Fri, 4 Mar 2022 14:40:28 +0000
Received: from [10.71.116.156] (port=49343)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nQ96Z-00037Y-W6; Fri, 04 Mar 2022 14:40:28 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0cffa23c-9bc9-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=nidxNz/7EJFP7uR9eRW7Hhgq9gpY/fFPmu41I4LQmCJtLQ2ZMqKFb0eFeoXF9cA9W8dNy28SztpDdsurLllLfBho9GDAJJ0JhFY22ei+tw/gkC4lz3mJaBcvT4+JnosYYQbFuP0N+r30/C4klnIa8Dqy1Yb5NEh9nl6MYEQs3bq10us2BpabaLaETJzeyOnqwxuYAnZtEzFegFYxX+gnkWsP4N5wKKZW3peldntVUUZdWDs/Ta4MkDVMXKd2I0Pj2cGI8Ro8WWOuudAT58funItZDtaCM+05DA31oXmOz/9eAPnJW/kZVctD/iO3LpnN4QjIX7RIy9yYhJrLDiO06A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=dojcFxBy0yGGvny/02e/mRdN5er1A2JlDuY7tl6w8vU=;
 b=HgQmoyUJanfeBTWcbNui8G8r5N9pc0EoD+egVchw0cHN380wI7NYtlqZtNd+iCWq6HmsBfuU036EVPHsG/GPrC3p/oVoPraAbYOJmu3pEFOYaCZ8qTKQsEQF/dkYb1Wqgd/beiQbckk5Gx7qwUQC+Qvo2uCfax2zf6VBrAA+fLDOBRDVXpPSFNcHglq2A2FY4rpqNbXj4diT4P8pjnxvuYIournUjAFb6upaGYFfZ6m0e0Wp8I5pYsVNx37h6noIi6ng5rCyuNEsd8FfBB6F5thQzQQHCduq+0xKUNR7ULc9Pq8xthXh0dHYs7ylTVD6DR5/h7MLUvBDqjIlVmGmxQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=xen.org smtp.mailfrom=xilinx.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=xilinx.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=dojcFxBy0yGGvny/02e/mRdN5er1A2JlDuY7tl6w8vU=;
 b=DFMq5SEMDjUcMM2J7DDcRpzCLr5yFfbkJCCyP5YgQkDKjaAT5y8sWtTFc5ojxD1zYWygkZZuJIo8OPZuuqB3nP4YeDiqSX6f8fPFuvq/E7yZWG9HRjQgH8CxrRoYwIyn/xw0bfk9amZQDvz52lSl4Ypexp7I8N3BlYCddrXYycM=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch01.xlnx.xilinx.com;
Message-ID: <9be4bf1c-0d56-2917-1404-f56590a8034d@xilinx.com>
Date: Fri, 4 Mar 2022 14:40:27 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [XEN v9 4/4] xen/arm64: io: Handle data abort due to cache
 maintenance instructions
To: Julien Grall <julien@xen.org>, Ayan Kumar Halder
	<ayan.kumar.halder@xilinx.com>, <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <stefanos@xilinx.com>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>
References: <20220301124022.10168-1-ayankuma@xilinx.com>
 <20220301124022.10168-5-ayankuma@xilinx.com>
 <26ee167e-16ea-e358-f390-dc96961d3234@xen.org>
 <8f78044e-aca2-5919-1841-15989daeb986@xilinx.com>
 <26107eb2-d38d-d6b5-bdaa-d5058e964623@xen.org>
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
In-Reply-To: <26107eb2-d38d-d6b5-bdaa-d5058e964623@xen.org>
Content-Type: text/plain; charset="UTF-8"; format=flowed
Content-Transfer-Encoding: 7bit
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c9eb3437-c547-4936-cbac-08d9fdecee37
X-MS-TrafficTypeDiagnostic: CY4PR02MB3384:EE_
X-Microsoft-Antispam-PRVS:
	<CY4PR02MB3384C533A9B34631FDC19339B2059@CY4PR02MB3384.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch01.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(53546011)(110136005)(54906003)(36860700001)(2616005)(47076005)(36756003)(31686004)(70586007)(508600001)(40460700003)(356005)(7636003)(4326008)(5660300002)(316002)(8676002)(70206006)(31696002)(9786002)(8936002)(83380400001)(186003)(26005)(82310400004)(426003)(2906002)(7416002)(336012)(50156003)(43740500002);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 14:40:29.8035
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: c9eb3437-c547-4936-cbac-08d9fdecee37
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch01.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DM3NAM02FT049.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR02MB3384

Hi Julien,

I have a question.

On 04/03/2022 12:49, Julien Grall wrote:
>
>
> On 04/03/2022 12:13, Ayan Kumar Halder wrote:
>> Hi Julien,
>
> Hi,
>
>>
>> On 04/03/2022 10:46, Julien Grall wrote:
>>> Hi Ayan,
>>>
>>> On 01/03/2022 12:40, Ayan Kumar Halder wrote:
>>>> When the data abort is caused due to cache maintenance for an address,
>>>> there are two scenarios:-
>>>>
>>>> 1. Address belonging to a non emulated region - For this, Xen should
>>>> set the corresponding bit in the translation table entry to valid and
>>>> return to the guest to retry the instruction. This can happen 
>>>> sometimes
>>>> as Xen need to set the translation table entry to invalid. (for eg
>>>> 'Break-Before-Make' sequence).
>>>>
>>>> 2. Address belongs to an emulated region - Xen should ignore the
>>>> instruction (ie increment the PC) and return to the guest.
>>>
>>> I would be explicit and say something along the lines:
>>>
>>> "Xen doesn't cache data for emulated regions. So we can safely 
>>> ignore them".
>>>
>>> There is a third scenarios:
>>>
>>> The address belongs to neither an emulated region nor has a valid 
>>> mapping in the P2M.
>>
>> To check this, we should test "try_handle_mmio() == IO_UNHANDLED". If 
>> so then send an abort to the guest.
>>
>> Is this correct ?
> I think it would be too late because if the region is emulated, then 
> we would have already tried to handle it.
>
> Instead, I think we need to check after we confirmed that the region 
> is emulated or we need to forward to an IOREQ server.
>
> So the check would have to be duplicated here.

When do we know that a particular address does not belong to an emulated 
MMIO region ?

Is this after both "find_mmio_handler()" and "ioreq_server_select()" 
have returned NULL ?

- Ayan

>
> Cheers,
>


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 14:54:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 14:54:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284337.483549 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ9KU-0005r3-BZ; Fri, 04 Mar 2022 14:54:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284337.483549; Fri, 04 Mar 2022 14:54:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ9KU-0005qw-82; Fri, 04 Mar 2022 14:54:50 +0000
Received: by outflank-mailman (input) for mailman id 284337;
 Fri, 04 Mar 2022 14:54:49 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=mKET=TP=santannapisa.it=Andrea.Stevanato@srs-se1.protection.inumbo.net>)
 id 1nQ9KS-0005qq-Kb
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 14:54:49 +0000
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur03on060b.outbound.protection.outlook.com
 [2a01:111:f400:fe08::60b])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 06edb027-9bcb-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 15:54:44 +0100 (CET)
Received: from DB7PR03MB5002.eurprd03.prod.outlook.com (2603:10a6:10:74::22)
 by DB7PR03MB4411.eurprd03.prod.outlook.com (2603:10a6:10:17::22) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.26; Fri, 4 Mar
 2022 14:54:41 +0000
Received: from DB7PR03MB5002.eurprd03.prod.outlook.com
 ([fe80::746a:e27:47ff:3e90]) by DB7PR03MB5002.eurprd03.prod.outlook.com
 ([fe80::746a:e27:47ff:3e90%7]) with mapi id 15.20.5038.015; Fri, 4 Mar 2022
 14:54:41 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 06edb027-9bcb-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=K/vUdAPss26XgUJqPs6qKgMhS5F4MZXSjeWgQrorkBdaLj8HyjDhH1EFTndxJHunbaJ3hQW0j6hvcefwnFurYp1/FAyrlq4lj8Wag0MioCr1nvg5DrGZLb6iSJjW4SvxPoq98WYuFTQBdmt47OX3m8yShh9vPJo+oozDpzhlzlEJ6DwbZMomy1iQ1p+oTaUew5RUPc845zNQ1UBjv/IsZd57Tug1MfFO+kQhfQ619H2wmNWwLFPO1dXfAir7hLqZbSgRBrY8ACFSnevALi7tUoraZx+aODhXkEWOXhTedJRkQcSwUvKcPDhwpFUyEaYiGwiajn8/vpY2/Xi5yNGSfQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=3hD2Mi4Ios0WqynSc/IiYEloUXUi+rSuIWNsElZlnng=;
 b=NopQ/BAqzSrSzgDaGlUu6Q9RwjTCA2s4MRHUNOeerqk2Pl8QvgNEXFeiTi1YUbCblzaxb0ljfiXrdZc324CI5G/yGuy5//WKkGh+n10Nk+Vcrh3piUANlfw5xfh2aH517peu9emPuDmie2cQV2JmwxrdO2K/SgGB0Xxpvx7OHP+VK1gy5pVvJHZzbkYl+6LZCNvTVShR4G5wJaoKl4zJva2c62/NEvhv+g9l9hSvemsGqxCswtVcufSmq0lNeQB4C/wbV+Z0S9PJO9W3Tr3+jFdfNJagMX0xJVbF7+IxToIvXSoh55fOLdQ96BmzOIaS1ST1lZicqtuM5ZSYeO5HJQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=santannapisa.it; dmarc=pass action=none
 header.from=santannapisa.it; dkim=pass header.d=santannapisa.it; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=santannapisa.it;
 s=selector1;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=3hD2Mi4Ios0WqynSc/IiYEloUXUi+rSuIWNsElZlnng=;
 b=rRkcqUfOgzFwI5of06zb4rzgsH807YERcnqV9auk2kgLF0tYIp7zSdwiYPZFK1xU6+4hb1DsBjo0XP3mOkAqT/HZ4+//Xe08KqLtvrcQ1yfshBbB6UTkK1JoU6stGk8ryrn9MfpzU2wHlwn1gWnMI8bUgwlDsx1oW1E2jM0Ag3g=
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=santannapisa.it;
Message-ID: <e92ab29e-a355-237e-5da8-60c43e94eb32@santannapisa.it>
Date: Fri, 4 Mar 2022 15:54:44 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: Network driver domain broken
Content-Language: en-US
From: Andrea Stevanato <andrea.stevanato@santannapisa.it>
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
Cc: Jason Andryuk <jandryuk@gmail.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 "wl@xen.org" <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>
References: <DB7PR03MB50027EE92E11BFFF71AADC4598049@DB7PR03MB5002.eurprd03.prod.outlook.com>
 <92827eec-b6e9-9c95-8f9e-fcf063d45090@santannapisa.it>
 <YiDt7fX92n6Luc2l@Air-de-Roger>
 <CAKf6xpsnmQG7-LXn5+Uz4mncWsN0EZ8wpagY8f8OydvZNb6g5A@mail.gmail.com>
 <YiH9cee6NIKA6MWg@Air-de-Roger>
 <53a4fe6b-efc8-bfa1-8475-0aa58774051a@santannapisa.it>
 <YiIFyRUNXpUfzwRB@Air-de-Roger>
 <0ce52d38-f542-9336-a100-1cbfc559f218@santannapisa.it>
In-Reply-To: <0ce52d38-f542-9336-a100-1cbfc559f218@santannapisa.it>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: MRXP264CA0025.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:500:14::13) To DB7PR03MB5002.eurprd03.prod.outlook.com
 (2603:10a6:10:74::22)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 1d11ad64-9bcc-4d37-0bb5-08d9fdeee9bf
X-MS-TrafficTypeDiagnostic: DB7PR03MB4411:EE_
X-Microsoft-Antispam-PRVS:
	<DB7PR03MB44116E26EB93D962A724355498059@DB7PR03MB4411.eurprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DB7PR03MB5002.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(26005)(38100700002)(4326008)(8676002)(66946007)(66476007)(66556008)(38350700002)(83380400001)(2616005)(36756003)(186003)(316002)(86362001)(44832011)(8936002)(30864003)(31696002)(5660300002)(6506007)(3480700007)(6512007)(53546011)(52116002)(6916009)(54906003)(786003)(508600001)(6486002)(31686004)(2906002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?ekJUM2pRaExSM1BOZ21IKzF1SGV1SkVlVEVVV0pJSGgvRWlKdmp5dHZGRWZN?=
 =?utf-8?B?ZDIzRHBIeEtJd3piaFBZdTZSQy9VdWFDL21ZU1JXQkZiOWJBQ1NmQkhDRnJO?=
 =?utf-8?B?NENPcmlOY2R0V3dVTHorQ2ZXaWYxQWpzS2UwV3N5Q3dlRUdvVFd3alRnVGpX?=
 =?utf-8?B?OExic2J1bll4eGY2ZmtMdWtVVUJHTnVPOTk2NU9QbDUvU2tLOENRd1RTVXpn?=
 =?utf-8?B?YmlpUnBBYlR5bW5FQUluN0hQQ0FNdG9wTS9XZzgvS0xIQzd2Ym93ZFNWeVJK?=
 =?utf-8?B?Wkdyc2VNbElZaEZCclNBcU9CRzdCby9SbS9rRGNpVk9UZjBuNUNuVnJEc284?=
 =?utf-8?B?UWVwS2ljRnRUWmM5bHM3T1kveVBYdGxiLzZWaTM4dzVwUEpPQXNWOVR3MlJt?=
 =?utf-8?B?Q1M1RGN0QmR1dWIzKzBtaUZ5YXduVE5WaVNCYmYxeEJLK3pMTjQrUmZXODRs?=
 =?utf-8?B?bUFPZnQ4aVdTSklIZ28wV280a1VRc2k1eDFXb0gwYW9FQ21zNzJBZ1FILzc4?=
 =?utf-8?B?WnU2NFg2dmVaVjRUdXBiU1lHSDc2c2RkWHdFYWc2MmxFZk1uRXg2RC8xSmRB?=
 =?utf-8?B?cE5DRkgxblZlVWFTSitpbWlIRGFVOUhIdUxpK0I1YnhuVWtVWVpydi9YNWI1?=
 =?utf-8?B?TXFxNmFvZ2cvZ3R6NTdZNU5Bd29wTmFPR29RdWZDQzJMTVBZdmNFbWpUY1NR?=
 =?utf-8?B?dy85Ymx3S3BOaW10NTJrdHRDU0VrMjdsenR0eWZ3YUxWajIzSHA4YmQveWlk?=
 =?utf-8?B?WFNpSC9rVm1lQVJlTWtvamYzRTFvY1dkaU5ZektoOEx5cG0zMzhFWCt5czJq?=
 =?utf-8?B?dXFGWStQMEh2TzYwV0IydFA1VnBuZzFqZU5uVitranVxdjlyTytZcGR5cjdL?=
 =?utf-8?B?YmRJd092YVNRS2lLZE9PRW1kNTNPeVlYSkJYSTdTbGJFTTlad1IxTVRjK0t3?=
 =?utf-8?B?MldsV3g5ZXNUcmhZc1ZYZ3dDdnhxSUcwbFpLQmFwT1dCMU5Fc3d4OU9rZzYy?=
 =?utf-8?B?Nk1Bam9GcExEQnBqM2NLQkxJK1hKSjFldkVEanlQRVN1Y21ZZ0tMbk5Lbm5h?=
 =?utf-8?B?a3YvR0dxNDVtOG0wWWIwVHRwN0FsMjllck1HdkZ3SE85WmdmMXdlaVRrRVVv?=
 =?utf-8?B?K2I3WHpHb2Rka1VvWWxxSU1aTFpteDM3VXZDaERSYmE0UDZkd0F6aWxHaHRl?=
 =?utf-8?B?bWF5ZWFnWURaWmRncXF5eGMzdktya3RNZlhya0xkN1dCeFBoWUYyY0QvbmxF?=
 =?utf-8?B?TTZoY1d3SHJ4NmJJT2hNSE9uY00rVERJUDVIbzhXeXZ4L0UzWUlURjRaTENr?=
 =?utf-8?B?Ynl5Nlo1WXBMOW1zZkJDcDliT1pYbmdyeGRWVHdtK0hEUHRBUHhLc01vK3I4?=
 =?utf-8?B?Z3NyQlFqVmV0UVB2VjR4UHluN0tkL2lyWWpXdHA4RmtEeW1IYlNkcGZ0ZldR?=
 =?utf-8?B?K1lYcDQvRkRUeUhPSTQxZm1RNUZXRmJFMjJ6K0wrODBHVHpGRVVSZ2tQcUhB?=
 =?utf-8?B?TUNraURUdWtSRVExOU1PTitxRUN2NnVaR25BaHh3dkNSUWUrcHA0RTNXYWJW?=
 =?utf-8?B?SW1LNk5ZOS9wbmlyUTdoTVRrTm5XRVpBSTgvZC9remJwdWxHd1FTMkxZYUI4?=
 =?utf-8?B?TUEreFVqc1FDSERkcWY4YVhsN09YUDdiUnVoNUlvOEwvakxTRCsyQTV2TDgy?=
 =?utf-8?B?YTdjOUlBRjBBaHlsclFXTWVLV0MrK0QvU3FqcjkvUUlPWFhnV3BkWEQ5N3RU?=
 =?utf-8?B?YUozY2hWRDdaa2JiTWpPQWh5bG41VE9ieTM4QVlvMUdVM3VUTk8wcnVwNk9k?=
 =?utf-8?B?ZldDZ215M3hkNnhIN3pZdURZNDA0V1d6a0FXeFBCV1ZDc0JpMTRQalZnUFVv?=
 =?utf-8?B?OHlmOVVLbERDdzZJOXl4c1BodlltcEQzQy9DYzZsK2NvcHhrVVd6eWFUZFFL?=
 =?utf-8?B?Q21ENEMyd21NN2ZRVlNOeFJrSzVnMit2alprcFkxbVBLbkRKMnY1c3pjeHI2?=
 =?utf-8?B?UmdkYW1BUlVSZUZWMHIvUFkwMlFUYnBJbU5TRm04YlN4YjJXV2VzNEZnaHBx?=
 =?utf-8?B?bHRoQzRTUmYvSDUwUElmdXV1cnl1THlzdlJLWUI3cXpEeHIySnV0UTJyWVNt?=
 =?utf-8?B?UCttR1FKb3lzaHhYQkJGamhhOFpBakhIM0padHdzOTR6TXVvVURLaUNDdlJR?=
 =?utf-8?B?MldvWDR4RDcrZlZyQXkxcGt6bzBuZjFFMjFMb0xkQWx4OXNJWmp1c0VlSEl0?=
 =?utf-8?B?S01hRjJ6Si8zUnliK2FXcVNYVTBHWWZMVG9aSEtPL3J0T2laS25XM2VZMG5N?=
 =?utf-8?B?STdGb1V5MjRFZUlSTUkvVU1nVHNCNEY1Q001UEhsRnJtTDFiM2xiUT09?=
X-OriginatorOrg: santannapisa.it
X-MS-Exchange-CrossTenant-Network-Message-Id: 1d11ad64-9bcc-4d37-0bb5-08d9fdeee9bf
X-MS-Exchange-CrossTenant-AuthSource: DB7PR03MB5002.eurprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 14:54:41.7947
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: d97360e3-138d-4b5f-956f-a646c364a01e
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: sz0IxvXezGItgt/T9QxK1PVrBmuNuRIMv1iu+n574iD/EfS/RxaPbwX6l52ezmcWcsnDdDu/1igFe3A7LOTw4NzMuzRoUfVN6PZ1rg9/vq8X0ixGUmGPW+qJS3eftw4S
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR03MB4411

On 04/03/2022 14:46, Andrea Stevanato wrote:
> On 3/4/2022 1:27 PM, Roger Pau Monné wrote:
>> On Fri, Mar 04, 2022 at 01:05:55PM +0100, Andrea Stevanato wrote:
>>> On 3/4/2022 12:52 PM, Roger Pau Monné wrote:
>>>> On Thu, Mar 03, 2022 at 01:08:31PM -0500, Jason Andryuk wrote:
>>>>> On Thu, Mar 3, 2022 at 11:34 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
>>>>>>
>>>>>> On Thu, Mar 03, 2022 at 05:01:23PM +0100, Andrea Stevanato wrote:
>>>>>>> On 03/03/2022 15:54, Andrea Stevanato wrote:
>>>>>>>> Hi all,
>>>>>>>>
>>>>>>>> according to the conversation that I had with royger, aa67b97ed34  broke the driver domain support.
>>>>>>>>
>>>>>>>> What I'm trying to do is to setup networking between guests using driver domain. Therefore, the guest (driver) has been started with the following cfg.
>>>>>>>>
>>>>>>>> name    = "guest0"
>>>>>>>> kernel  = "/media/sd-mmcblk0p1/Image"
>>>>>>>> ramdisk = "/media/sd-mmcblk0p1/rootfs.cpio.gz"
>>>>>>>> extra   = "console=hvc0 rdinit=/sbin/init root=/dev/ram0"
>>>>>>>> memory  = 1024 vcpus   = 2
>>>>>>>> driver_domain = 1
>>>>>>>>
>>>>>>>> On guest0 I created the bridge, assigned a static IP and started the udhcpd on xenbr0 interface.
>>>>>>>> While the second guest has been started with the following cfg:
>>>>>>>>
>>>>>>>> name    = "guest1"
>>>>>>>> kernel  = "/media/sd-mmcblk0p1/Image"
>>>>>>>> ramdisk = "/media/sd-mmcblk0p1/rootfs.cpio.gz"
>>>>>>>> extra   = "console=hvc0 rdinit=/sbin/init root=/dev/ram0"
>>>>>>>> memory  = 1024 vcpus   = 2
>>>>>>>> vcpus   = 2
>>>>>>>> vif = [ 'bridge=xenbr0, backend=guest0' ]
>>>>>>>>
>>>>>>>> Follows the result of strace xl devd:
>>>>>>>>
>>>>>>>> # strace xl devd
>>>>>>>> execve("/usr/sbin/xl", ["xl", "devd"], 0xffffdf0420c8 /* 13 vars */) = 0
>>>>>
>>>>>>>> ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41b40) = -1 EPERM (Operation not permitted)
>>>>>>>> write(2, "libxl: ", 7libxl: )                  = 7
>>>>>>>> write(2, "error: ", 7error: )                  = 7
>>>>>>>> write(2, "libxl_utils.c:820:libxl_cpu_bitm"..., 87libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve the maximum number of cpus) = 87
>>>>>>>> write(2, "\n", 1
>>>>>>>> )                       = 1
>>>>>>>> clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0xffff9ee7a0e0) = 814
>>>>>>>> wait4(814, [{WIFEXITED(s) && WEXITSTATUS(s) == 0}], 0, NULL) = 814
>>>>>>>> --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=814, si_uid=0, si_status=0, si_utime=2, si_stime=2} ---
>>>>>
>>>>> xl devd is daemonizing, but strace is only following the first
>>>>> process.  Use `strace xl devd -F` to prevent the daemonizing (or
>>>>> `strace -f xl devd` to follow children).
>>>>
>>>> Or as a first step try to see what kind of messages you get from `xl
>>>> devd -F` when trying to attach a device using the driver domain.
>>>
>>> Nothing has changed. On guest0 (the driver domain):
>>>
>>> # xl devd -F
>>> libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve
>>> the maximum number of cpus
>>> libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve
>>> the maximum number of cpus
>>> libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve
>>> the maximum number of cpus
>>> [  696.805619] xenbr0: port 1(vif2.0) entered blocking state
>>> [  696.810334] xenbr0: port 1(vif2.0) entered disabled state
>>> [  696.824518] device vif2.0 entered promiscuous mode
>>
>> Can you use `xl -vvv devd -F` here?
> 
> # xl -vvv devd -F
> libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve the maximum number of cpus
> libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve the maximum number of cpus
> libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve the maximum number of cpus
> libxl: debug: libxl_device.c:1749:libxl_device_events_handler: ao 0xaaaaece52130: create: how=(nil) callback=(nil) poller=0xaaaaece52430
> libxl: debug: libxl_event.c:813:libxl__ev_xswatch_register: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: register slotnum=3
> libxl: debug: libxl_device.c:1806:libxl_device_events_handler: ao 0xaaaaece52130: inprogress: poller=0xaaaaece52430, flags=i
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece51b90: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece51b90: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece4e7b0: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece4e7b0: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece4e990: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece4e990: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/frontend
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece4eaa0: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece4eaa0: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/frontend-id
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece4ebb0: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece4ebb0: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/online
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece52830: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_device.c:1714:backend_watch_callback: Domain 2:Added domain to the list of active guests
> libxl: debug: libxl_device.c:1569:add_device: Domain 2:Added device /local/domain/1/backend/vif/2/0 to the list of active devices
> libxl: debug: libxl_event.c:813:libxl__ev_xswatch_register: watch w=0xaaaaece52a10 wpath=/local/domain/1/backend/vif/2/0/state token=2/1: register slotnum=2
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/state
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece52d50: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/script
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece52f30: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece52f30: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/mac
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/bridge
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/handle
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/type
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/feature-sg
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/feature-gso-tcpv4
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/feature-gso-tcpv6
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/feature-ipv6-csum-offload
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/feature-rx-copy
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/feature-xdp-headroom
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/feature-rx-flip
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/feature-multicast-control
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/feature-dynamic-multicast-control
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/feature-split-event-channels
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/multi-queue-max-queues
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/feature-ctrl-ring
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/feature-sg
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/feature-gso-tcpv4
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/feature-gso-tcpv6
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/feature-ipv6-csum-offload
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/feature-rx-copy
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/feature-xdp-headroom
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/feature-rx-flip
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/feature-multicast-control
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/feature-dynamic-multicast-control
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/feature-split-event-channels
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/multi-queue-max-queues
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/feature-ctrl-ring
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110: destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/state
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xaaaaece52a10 wpath=/local/domain/1/backend/vif/2/0/state token=2/1: event epath=/local/domain/1/backend/vif/2/0/state
> libxl: debug: libxl_event.c:1055:devstate_callback: backend /local/domain/1/backend/vif/2/0/state wanted state 2 still waiting state 5
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/state
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53fa0: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xaaaaece52a10 wpath=/local/domain/1/backend/vif/2/0/state token=2/1: event epath=/local/domain/1/backend/vif/2/0/state
> libxl: debug: libxl_event.c:1055:devstate_callback: backend /local/domain/1/backend/vif/2/0/state wanted state 2 still waiting state 5
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend/vif/2/0/state
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece54180: nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xaaaaece52a10 wpath=/local/domain/1/backend/vif/2/0/state token=2/1: event epath=/local/domain/1/backend/vif/2/0/state
> libxl: debug: libxl_event.c:1055:devstate_callback: backend /local/domain/1/backend/vif/2/0/state wanted state 2 still waiting state 6

There were one piece missing, I copied-pasted too early.

libxl: debug: libxl_aoutils.c:88:xswait_timeout_callback: backend /local/domain/1/backend/vif/2/0/state (hoping for state change to 2): xswait timeout (path=/local/domain/1/backend/vif/2/0/state)
libxl: debug: libxl_event.c:850:libxl__ev_xswatch_deregister: watch w=0xaaaadbbd3a10 wpath=/local/domain/1/backend/vif/2/0/state token=2/1: deregister slotnum=2
libxl: debug: libxl_event.c:1039:devstate_callback: backend /local/domain/1/backend/vif/2/0/state wanted state 2  timed out
libxl: debug: libxl_event.c:864:libxl__ev_xswatch_deregister: watch w=0xaaaadbbd3a10: deregister unregistered
libxl: debug: libxl_device.c:1090:device_backend_callback: Domain 2:calling device_backend_cleanup
libxl: debug: libxl_event.c:864:libxl__ev_xswatch_deregister: watch w=0xaaaadbbd3a10: deregister unregistered
libxl: error: libxl_device.c:1103:device_backend_callback: Domain 2:unable to add device with path /local/domain/1/backend/vif/2/0
libxl: debug: libxl_event.c:864:libxl__ev_xswatch_deregister: watch w=0xaaaadbbd3b10: deregister unregistered
libxl: debug: libxl_device.c:1444:device_complete: device /local/domain/1/backend/vif/2/0 add failed
libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaadbbd3830: destroy
 
>> I assume the process doesn't die unexpectedly?
> 
> No, it does not.
> 
>> Thanks, Roger.
> 
> Regards,
> Andrea

Andrea


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 15:05:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 15:05:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284347.483562 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ9V7-0007oo-Gb; Fri, 04 Mar 2022 15:05:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284347.483562; Fri, 04 Mar 2022 15:05:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQ9V7-0007oh-Df; Fri, 04 Mar 2022 15:05:49 +0000
Received: by outflank-mailman (input) for mailman id 284347;
 Fri, 04 Mar 2022 15:05:47 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=86Qk=TP=linaro.org=alex.bennee@srs-se1.protection.inumbo.net>)
 id 1nQ9V5-0007ob-SM
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 15:05:47 +0000
Received: from mail-ed1-x535.google.com (mail-ed1-x535.google.com
 [2a00:1450:4864:20::535])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 91a023f8-9bcc-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 16:05:46 +0100 (CET)
Received: by mail-ed1-x535.google.com with SMTP id f8so11109952edf.10
 for <xen-devel@lists.xenproject.org>; Fri, 04 Mar 2022 07:05:46 -0800 (PST)
Received: from zen.linaroharston ([51.148.130.216])
 by smtp.gmail.com with ESMTPSA id
 q18-20020a170906771200b006d2a835ac30sm1837863ejm.151.2022.03.04.07.05.44
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Fri, 04 Mar 2022 07:05:44 -0800 (PST)
Received: from zen (localhost [127.0.0.1])
 by zen.linaroharston (Postfix) with ESMTP id A0ABC1FFB7;
 Fri,  4 Mar 2022 15:05:43 +0000 (GMT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 91a023f8-9bcc-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=linaro.org; s=google;
        h=references:user-agent:from:to:cc:subject:date:in-reply-to
         :message-id:mime-version:content-transfer-encoding;
        bh=pbZW5PHE71bnKFtyV5BRDeRiJEy5SXR48g9puf6/Cqo=;
        b=jcJ0tt8uOfk7WEymu8lA1FySybnit9tdOZkU6wRpHQk+eCHYr3t6jFAnof3T0aNG2W
         oqXYBdk/sZ0qwf/jALVdWRfHXHLUt8sJNRiafz+ws1Dvhv7iAKOL6oTjJBDunUj6Ahll
         Lhc/H1lKcHLpjO5+ZvltSXEyi5IXJ4DWMWQmJhX2H58b8y1yDUuZG1IfZwggadV1zXgO
         c8Q8PQbROrYXVWbpVrfZSTIPlv86mX+NgsCCF6NIL83JpV1Q8Zbym5jcB3bMtwoDEEoj
         b0ZiV/c4p7OEok8oxipklZXeTHR8BhWnigEVc45p1fhCqfvIybrsXT41HV5Ga7yrbelX
         K1tw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:references:user-agent:from:to:cc:subject:date
         :in-reply-to:message-id:mime-version:content-transfer-encoding;
        bh=pbZW5PHE71bnKFtyV5BRDeRiJEy5SXR48g9puf6/Cqo=;
        b=BcxZM1BFK8tU7LApQ08KEcFPqSuijWXgqqz+H2+snpKI5cq3sqNmNrJDlLcEXoiE/K
         XcD3nHwqxixlSGsMIH8y12e8WjRFNsDxM8QpZKhjDNs+GlRP7w5x4IoZSB0pZfVwuXmg
         CrLgF0jVyoYdYHLvlu2Cm3HFQ1CaTy1nU29kNzA4/6VbqqRoK85JbJrzzl3IAFT2tchm
         ge7dAG1mdYej+jj/lbBOTnzHKsEOsSKTUHkswr88uHcOYyoALw4t7vEmOjfyw/IO6tYR
         ejYo7CCGHpProqqO+E26Zn5YZ635krWuMzqbqYSsfVmJ+s5YL85i0uNyJS9VlIP2VlcF
         Azkw==
X-Gm-Message-State: AOAM531QEp7EMWqJUpqAxSK3+dKBjqLDYwxPNJN6dTLF2nojqLHgRvJy
	phfLVFTJJNwCYCRrfA34Jgzn3kl8fMCRzw==
X-Google-Smtp-Source: ABdhPJzrqwduPjpyp6QKKOuiYhxWIiDbVG6unEBf+YvMuFMRKV1Uzuj8EFOREtz7t3isiWoUWrhTrw==
X-Received: by 2002:a05:6402:34d1:b0:410:fede:429b with SMTP id w17-20020a05640234d100b00410fede429bmr39226383edc.250.1646406345651;
        Fri, 04 Mar 2022 07:05:45 -0800 (PST)
References: <CANH0Q9k6SJQ+EXNZz+-ZPnPtsxHXthYcx1E6z8euSDEt7XhLQg@mail.gmail.com>
User-agent: mu4e 1.7.9; emacs 28.0.91
From: Alex =?utf-8?Q?Benn=C3=A9e?= <alex.bennee@linaro.org>
To: Trigger Huang <trigger.huang@gmail.com>
Cc: xen-devel@lists.xenproject.org
Subject: Re: How to create and start Xen guest VM by qemu-system-x86_64
 command line
Date: Fri, 04 Mar 2022 15:04:27 +0000
In-reply-to: <CANH0Q9k6SJQ+EXNZz+-ZPnPtsxHXthYcx1E6z8euSDEt7XhLQg@mail.gmail.com>
Message-ID: <871qzhiwqg.fsf@linaro.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable


Trigger Huang <trigger.huang@gmail.com> writes:

> Hello,
>
> I have built & installed Xen 4.15 onto my Ubuntu20.04 platform successful=
ly according to
> https://wiki.xenproject.org/wiki/Compiling_Xen_From_Source=20
> After reboot, I entered Domain 0 successfully. The command xl info shows =
the right version string.
> host                   : xvg
> release                : 5.13.0-30-generic
> version                : #33~20.04.1-Ubuntu SMP Mon Feb 7 14:25:10 UTC 20=
22
> machine                : x86_64
> nr_cpus                : 16
> max_cpu_id             : 31
> nr_nodes               : 1
> cores_per_socket       : 8
> threads_per_core       : 2
> cpu_mhz                : 2994.377
> hw_caps                : 178bf3ff:76d8320b:2e500800:244037ff:0000000f:219=
c91a9:00400004:00000500
> virt_caps              : pv hvm hvm_directio pv_directio hap shadow
> total_memory           : 15719
> free_memory            : 11425
> sharing_freed_memory   : 0
> sharing_used_memory    : 0
> outstanding_claims     : 0
> free_cpus              : 0
> xen_major              : 4
> xen_minor              : 15
> xen_extra              : .3-pre-atg08
> xen_version            : 4.15.3-pre-atg08
> xen_caps               : xen-3.0-x86_64 hvm-3.0-x86_32 hvm-3.0-x86_32p hv=
m-3.0-x86_64
> xen_scheduler          : credit2
> xen_pagesize           : 4096
> platform_params        : virt_start=3D0xffff800000000000
> xen_changeset          : Fri Mar 4 13:33:49 2022 +0800 git:6aa4cdbc31
> xen_commandline        : placeholder dom0_mem=3D4096M,max:8192M no-real-m=
ode edd=3Doff
> cc_compiler            : gcc (Ubuntu 9.3.0-17ubuntu1~20.04) 9.3.0
> cc_compile_by          : xvg
> cc_compile_domain      :
> cc_compile_date        : Fri Mar  4 14:21:33 CST 2022
> build_id               : 234929adcb7588b1414c2b6e5477fa95052b4ded
> xend_config_format     : 4
>
> Then my next step is to create ubuntu guest VM(sudo or use root user):
>    /usr/local/lib/xen/bin/qemu-system-x86_64 -smp 1 -xen-domid 4 -machine=
 xenfv -m 4G -net nic,model=3Dvirtio -net
> user,hostfwd=3Dtcp::2222-:22 -hda ./u2004.qcow2 -boot d -cdrom ./ubuntu-2=
0.04-desktop-amd64.iso
> However, I always failed with the following error:
>     qemu-system-x86_64: failed to map ioreq server resources: error 3 han=
dle=3D0x55eeb1f6c0b0
>     qemu-system-x86_64: xen hardware virtual machine initialisation failed
> After debugging, the error is caused by osdep_xenforeignmemory_map_resour=
ce failed to invoke IOCTL_PRIVCMD_MMAP_RESOURCE. And
> this IOCTL will return -1.

Why are you not launching your guests with the xl commands?=20

>
> So my question is, am I using the right qemu command? Anything else is ne=
eded to set/config?
> Note, if I didn't specify the option ' -xen-domid 4 -machine xenfv ', I c=
an start qemu successfully
>
> Would you please help with it?


--=20
Alex Benn=C3=A9e


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 16:34:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 16:34:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284356.483573 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQAt4-00027G-Sl; Fri, 04 Mar 2022 16:34:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284356.483573; Fri, 04 Mar 2022 16:34:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQAt4-000279-P2; Fri, 04 Mar 2022 16:34:38 +0000
Received: by outflank-mailman (input) for mailman id 284356;
 Fri, 04 Mar 2022 16:34:37 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=2+cs=TP=lst.de=hch@srs-se1.protection.inumbo.net>)
 id 1nQAt3-000273-D0
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 16:34:37 +0000
Received: from verein.lst.de (verein.lst.de [213.95.11.211])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id fa0ec7de-9bd8-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 17:34:35 +0100 (CET)
Received: by verein.lst.de (Postfix, from userid 2407)
 id E2BFF68AFE; Fri,  4 Mar 2022 17:34:30 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fa0ec7de-9bd8-11ec-8eba-a37418f5ba1a
Date: Fri, 4 Mar 2022 17:34:30 +0100
From: Christoph Hellwig <hch@lst.de>
To: Stefano Stabellini <sstabellini@kernel.org>
Cc: Christoph Hellwig <hch@lst.de>, iommu@lists.linux-foundation.org,
	x86@kernel.org, Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org, linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org, tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: Re: [PATCH 11/12] swiotlb: merge swiotlb-xen initialization into
 swiotlb
Message-ID: <20220304163430.GA12317@lst.de>
References: <20220301105311.885699-1-hch@lst.de> <20220301105311.885699-12-hch@lst.de> <alpine.DEB.2.22.394.2203011720150.3261@ubuntu-linux-20-04-desktop> <20220302081500.GB23075@lst.de> <alpine.DEB.2.22.394.2203021709470.3261@ubuntu-linux-20-04-desktop> <20220303105931.GA15137@lst.de> <alpine.DEB.2.22.394.2203031447120.3261@ubuntu-linux-20-04-desktop>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <alpine.DEB.2.22.394.2203031447120.3261@ubuntu-linux-20-04-desktop>
User-Agent: Mutt/1.5.17 (2007-11-01)

On Thu, Mar 03, 2022 at 02:49:29PM -0800, Stefano Stabellini wrote:
> On Thu, 3 Mar 2022, Christoph Hellwig wrote:
> > On Wed, Mar 02, 2022 at 05:25:10PM -0800, Stefano Stabellini wrote:
> > > Thinking more about it we actually need to drop the xen_initial_domain()
> > > check otherwise some cases won't be functional (Dom0 not 1:1 mapped, or
> > > DomU 1:1 mapped).
> > 
> > Hmm, but that would be the case even before this series, right?
> 
> Before this series we only have the xen_swiotlb_detect() check in
> xen_mm_init, we don't have a second xen_initial_domain() check.
> 
> The issue is that this series is adding one more xen_initial_domain()
> check in xen_mm_init.

In current mainline xen_mm_init calls xen_swiotlb_init unconditionally.
But xen_swiotlb_init then calls xen_swiotlb_fixup after allocating
the memory, which in turn calls xen_create_contiguous_region.
xen_create_contiguous_region fails with -EINVAL for the
!xen_initial_domain() and thus caues xen_swiotlb_fixup and
xen_swiotlb_init to unwind and return -EINVAL.

So as far as I can tell there is no change in behavior, but maybe I'm
missing something subtle?


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 16:54:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 16:54:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284363.483584 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQBBo-0004vi-GB; Fri, 04 Mar 2022 16:54:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284363.483584; Fri, 04 Mar 2022 16:54:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQBBo-0004vb-DD; Fri, 04 Mar 2022 16:54:00 +0000
Received: by outflank-mailman (input) for mailman id 284363;
 Fri, 04 Mar 2022 16:53:59 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQBBn-0004vP-Lk; Fri, 04 Mar 2022 16:53:59 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQBBn-0006id-Ig; Fri, 04 Mar 2022 16:53:59 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQBBn-00040S-5J; Fri, 04 Mar 2022 16:53:59 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQBBn-00041P-2s; Fri, 04 Mar 2022 16:53:59 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=PWuE3706NBigxGOChkGZ0ULkuqLn2KwsBzyEYEa4A14=; b=BBrJ00mC/iNzcPgzHYR6YQrlHP
	2hFhKyLy3ROPSJjy6EkM4p1DcNEYETva2/L2gm2C3R6Mg4JpcsD+UNeCm0iRF16L/f2FV04BqQpX5
	XI20vNtRPH++sa5+cR5wtXlpk8wafr/A+xRio/Hs23gujhCZcbXDFEf9LgWLlVCCoJCw=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168394-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168394: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=38f80f42147ff658aff218edb0a88c37e58bf44f
X-Osstest-Versions-That:
    linux=b949c21fc23ecaccef89582f251e6281cad1f81e
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 04 Mar 2022 16:53:59 +0000

flight 168394 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168394/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168383
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168383
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168383
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168383
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168383
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168383
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168383
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168383
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                38f80f42147ff658aff218edb0a88c37e58bf44f
baseline version:
 linux                b949c21fc23ecaccef89582f251e6281cad1f81e

Last test of basis   168383  2022-03-03 19:41:08 Z    0 days
Testing same since   168394  2022-03-04 04:34:13 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Ammar Faizi <ammarfaizi2@gnuweeb.org>
  David Howells <dhowells@redhat.com>
  Jeff Layton <jlayton@kernel.org>
  Linus Torvalds <torvalds@linux-foundation.org>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   b949c21fc23e..38f80f42147f  38f80f42147ff658aff218edb0a88c37e58bf44f -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 17:04:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 17:04:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284374.483596 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQBLy-0006gg-H3; Fri, 04 Mar 2022 17:04:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284374.483596; Fri, 04 Mar 2022 17:04:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQBLy-0006gZ-E6; Fri, 04 Mar 2022 17:04:30 +0000
Received: by outflank-mailman (input) for mailman id 284374;
 Fri, 04 Mar 2022 17:04:29 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=zc/n=TP=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nQBLx-0006gT-3n
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:04:29 +0000
Received: from NAM04-BN8-obe.outbound.protection.outlook.com
 (mail-bn8nam08on20621.outbound.protection.outlook.com
 [2a01:111:f400:7e8d::621])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 256253cb-9bdd-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 18:04:27 +0100 (CET)
Received: from DM3PR14CA0147.namprd14.prod.outlook.com (2603:10b6:0:53::31) by
 MWHPR02MB2655.namprd02.prod.outlook.com (2603:10b6:300:46::17) with
 Microsoft
 SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5038.17; Fri, 4 Mar 2022 17:04:23 +0000
Received: from DM3NAM02FT059.eop-nam02.prod.protection.outlook.com
 (2603:10b6:0:53:cafe::a7) by DM3PR14CA0147.outlook.office365.com
 (2603:10b6:0:53::31) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Fri, 4 Mar 2022 17:04:23 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (149.199.80.198) by
 DM3NAM02FT059.mail.protection.outlook.com (10.13.4.97) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5038.14 via Frontend Transport; Fri, 4 Mar 2022 17:04:22 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Fri, 4 Mar 2022 17:04:21 +0000
Received: from smtp.xilinx.com (172.21.105.197) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Fri, 4 Mar 2022 17:04:21 +0000
Received: from [10.71.116.156] (port=11293)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nQBLp-0001F8-9z; Fri, 04 Mar 2022 17:04:21 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 256253cb-9bdd-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=KQDguG16rHoyNN01irundm4pIC22QwPeBgFNOuYtNwoHFHUpyi0fFuUTJA8Lo0Q3yhOcDbEmvmvaaNe56//sbYLfkR3LhnXhNPP/7b1Go6/93dMqgaJqPr6zDBUByj+R0wrvsbSry49WYqG8WUGq6MQyg2xORcUl4mQHOCrkobLp80NbwUXnabVesukZTtMn09ZIwMC1mzZG646hwUFlmof+6KwImlu0dhaCYlbfRkcr7HtvCQTPnqilL13GYm2iXkH6OburxsCFD2QRXQ7tzDGOU2F8Zzug8bLRIBGVNF3LSluBh0akmaxKBXixpwJuD1HMMr3V8NU2P9JJFH4y1w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=XHIuiIIuEuaYu3UAiE+oJwCm2HBVhopphocB+NXpdtM=;
 b=DSyEQk7FeTNouXglB8GAIVkXyGvvxNBvI9QICmvFG1nowh6ceYiuhGS+QFE5LVCwacXI4isq7J5h/VxWUiDoPz45tICxJUndVcckWZBpTrl04Ag/hZ92E0owKcfb6sST+n4f4TE2z+oeG/VeqmXO1NeP4PUPwD+Hm7qUNfkiX4ObYpiPcCWmT5u3APYOuzxuJeI8hHm3YVAgqHxnDbfmUIESRrrz88MXfL5Bp1cmxtA/Ry/44nJeN2DDQB+Px9b2/ihtTit/vLYtpNnca/8F2hZnAGd+3smWIQ9UySu0rJEdDu20W30pYzwOoGFxTCKQzMKZmhXUOmx4jU82FogCHg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=kernel.org smtp.mailfrom=xilinx.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=xilinx.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=XHIuiIIuEuaYu3UAiE+oJwCm2HBVhopphocB+NXpdtM=;
 b=IBm+O4osqByhF7VOmr1Zk3nsN23KbYujtphGJDmMvVpXmgBQ+n2sw55o4QxGkGaQ50fP3lI+DT/KJwJTa1jf6OOBj8Y5CQA8WzgRTXDS/6tedUNnzmtYJUwGHFDUEwOod82uQA2VTtOeHXbJqojSve7/4rKiiuIq2/1jCg7l92w=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch01.xlnx.xilinx.com;
Message-ID: <4ad9d776-88b7-30ea-01a7-3f6bfc1a6bde@xilinx.com>
Date: Fri, 4 Mar 2022 17:04:20 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [XEN v9 3/4] xen/arm64: io: Handle the abort due to access to
 stage1 translation table
To: Stefano Stabellini <sstabellini@kernel.org>, Ayan Kumar Halder
	<ayan.kumar.halder@xilinx.com>
CC: <xen-devel@lists.xenproject.org>, <stefanos@xilinx.com>, <julien@xen.org>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>
References: <20220301124022.10168-1-ayankuma@xilinx.com>
 <20220301124022.10168-4-ayankuma@xilinx.com>
 <alpine.DEB.2.22.394.2203031736140.3261@ubuntu-linux-20-04-desktop>
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
In-Reply-To: <alpine.DEB.2.22.394.2203031736140.3261@ubuntu-linux-20-04-desktop>
Content-Type: text/plain; charset="UTF-8"; format=flowed
Content-Transfer-Encoding: 7bit
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 23150a7b-7534-428b-36fb-08d9fe0107d2
X-MS-TrafficTypeDiagnostic: MWHPR02MB2655:EE_
X-Microsoft-Antispam-PRVS:
	<MWHPR02MB26555B40E710B2085D92A4A8B2059@MWHPR02MB2655.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch01.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(70586007)(70206006)(2906002)(8676002)(36860700001)(54906003)(83380400001)(4326008)(31696002)(5660300002)(47076005)(82310400004)(316002)(110136005)(36756003)(9786002)(7416002)(508600001)(8936002)(53546011)(40460700003)(31686004)(2616005)(426003)(336012)(186003)(26005)(356005)(7636003)(50156003)(43740500002)(473944003);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 17:04:22.7088
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 23150a7b-7534-428b-36fb-08d9fe0107d2
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch01.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DM3NAM02FT059.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR02MB2655

Hi Stefano,

On 04/03/2022 01:43, Stefano Stabellini wrote:
> On Tue, 1 Mar 2022, Ayan Kumar Halder wrote:
>> If the abort was caused due to access to stage1 translation table, Xen
>> will assume that the stage1 translation table is in the non MMIO region.
>> It will try to resolve the translation fault. If it succeeds, it will
>> return to the guest to retry the instruction. If not, then it means
>> that the table is in MMIO region which is not expected by Xen. Thus,
>> Xen will forward the abort to the guest.
>>
>> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
>> ---
>>
>> Changelog :-
>>
>> v1..v8 - NA
>>
>> v9 - 1. Extracted this change from "[XEN v8 2/2] xen/arm64: io: Support
>> instructions (for which ISS is not..." into a separate patch of its own.
>> The reason being this is an existing bug in the codebase.
>>
>>   xen/arch/arm/io.c    | 11 +++++++++++
>>   xen/arch/arm/traps.c | 12 +++++++++++-
>>   2 files changed, 22 insertions(+), 1 deletion(-)
>>
>> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
>> index bea69ffb08..ebcb8ed548 100644
>> --- a/xen/arch/arm/io.c
>> +++ b/xen/arch/arm/io.c
>> @@ -128,6 +128,17 @@ void try_decode_instruction(const struct cpu_user_regs *regs,
>>           return;
>>       }
>>   
>> +    /*
>> +     * At this point, we know that the stage1 translation table is in the MMIO
>> +     * region. This is not expected by Xen and thus it forwards the abort to the
>> +     * guest.
>> +     */
>> +    if ( info->dabt.s1ptw )
>> +    {
>> +        info->dabt_instr.state = INSTR_ERROR;
>> +        return;
>> +    }
>> +
>>       /*
>>        * Armv8 processor does not provide a valid syndrome for decoding some
>>        * instructions. So in order to process these instructions, Xen must
>> diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
>> index 120c971b0f..e491ca15d7 100644
>> --- a/xen/arch/arm/traps.c
>> +++ b/xen/arch/arm/traps.c
>> @@ -1923,6 +1923,7 @@ static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
>>       bool is_data = (hsr.ec == HSR_EC_DATA_ABORT_LOWER_EL);
>>       mmio_info_t info;
>>       enum io_state state;
>> +    bool check_mmio_region = true;
>>   
>>       /*
>>        * If this bit has been set, it means that this stage-2 abort is caused
>> @@ -1987,7 +1988,16 @@ static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
>>            */
>>           if ( !is_data || !info.dabt.valid )
>>           {
>> -            if ( check_p2m(is_data, gpa) )
>> +            /*
>> +             * If the translation fault was caused due to access to stage 1
>> +             * translation table, then we try to set the translation table entry
>> +             * for page1 translation table (assuming that it is in the non mmio
>                        ^ stage1
>
> Do you mean to say maybe:
Yes, it should be stage1. Sorry for typo.
>
> If the translation fault was caused by an access to stage 1 translation
> table, then no need to change the stage 2 p2m.
>
> ?

The translation fault was caused due to access to stage1 translation 
table. As per my understanding, the address of stage1 tables is in 
stage2 translation table entries. Thus, Xen needs to modify the 
corresponding stage2 p2m entries.

- Ayan

>
>
>
>> +             * region).
>> +             */
>> +            if ( xabt.s1ptw )
>> +                check_mmio_region = false;
>> +
>> +            if ( check_p2m((is_data && check_mmio_region), gpa) )
>>                   return;
>>   
>>               /*
>> -- 
>> 2.17.1
>>


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 17:29:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 17:29:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284383.483607 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQBjm-0001Sy-EO; Fri, 04 Mar 2022 17:29:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284383.483607; Fri, 04 Mar 2022 17:29:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQBjm-0001Sr-BO; Fri, 04 Mar 2022 17:29:06 +0000
Received: by outflank-mailman (input) for mailman id 284383;
 Fri, 04 Mar 2022 17:29:05 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=2+cs=TP=lst.de=hch@srs-se1.protection.inumbo.net>)
 id 1nQBjl-0001Sl-Ej
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:29:05 +0000
Received: from verein.lst.de (verein.lst.de [213.95.11.211])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 9643db9e-9be0-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 18:29:04 +0100 (CET)
Received: by verein.lst.de (Postfix, from userid 2407)
 id C0EE168AFE; Fri,  4 Mar 2022 18:28:59 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9643db9e-9be0-11ec-8eba-a37418f5ba1a
Date: Fri, 4 Mar 2022 18:28:59 +0100
From: Christoph Hellwig <hch@lst.de>
To: Boris Ostrovsky <boris.ostrovsky@oracle.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
	Christoph Hellwig <hch@lst.de>, iommu@lists.linux-foundation.org,
	x86@kernel.org, Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org, linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org, tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: Re: [PATCH 11/12] swiotlb: merge swiotlb-xen initialization into
 swiotlb
Message-ID: <20220304172859.GA12860@lst.de>
References: <20220301105311.885699-1-hch@lst.de> <20220301105311.885699-12-hch@lst.de> <alpine.DEB.2.22.394.2203011720150.3261@ubuntu-linux-20-04-desktop> <ca748512-12bb-7d75-13f1-8d5ec9703e26@oracle.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <ca748512-12bb-7d75-13f1-8d5ec9703e26@oracle.com>
User-Agent: Mutt/1.5.17 (2007-11-01)

On Wed, Mar 02, 2022 at 08:15:03AM -0500, Boris Ostrovsky wrote:
> Not for me, I fail to boot with
>
> [   52.202000] bnxt_en 0000:31:00.0: swiotlb buffer is full (sz: 256 bytes), total 0 (slots), used 0 (slots)
>
> (this is iscsi root so I need the NIC).
>
>
> I bisected it to "x86: remove the IOMMU table infrastructure" but haven't actually looked at the code yet.

That looks like the swiotlb buffer did not get initialized at all, but I
can't really explain why.

Can you stick in a printk and see if xen_swiotlb_init_early gets called
at all?


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 17:37:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 17:37:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284390.483617 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQBrj-00039O-80; Fri, 04 Mar 2022 17:37:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284390.483617; Fri, 04 Mar 2022 17:37:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQBrj-00039H-4l; Fri, 04 Mar 2022 17:37:19 +0000
Received: by outflank-mailman (input) for mailman id 284390;
 Fri, 04 Mar 2022 17:37:18 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=/RWa=TP=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nQBrh-00039B-Po
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:37:18 +0000
Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com
 [205.220.165.32]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ba522ab2-9be1-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 18:37:15 +0100 (CET)
Received: from pps.filterd (m0246629.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 224HD9QD009041; 
 Fri, 4 Mar 2022 17:36:27 GMT
Received: from userp3030.oracle.com (userp3030.oracle.com [156.151.31.80])
 by mx0b-00069f02.pphosted.com with ESMTP id 3ek4hv2c2a-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Fri, 04 Mar 2022 17:36:27 +0000
Received: from pps.filterd (userp3030.oracle.com [127.0.0.1])
 by userp3030.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 224HW9Vu196350;
 Fri, 4 Mar 2022 17:36:25 GMT
Received: from nam04-dm6-obe.outbound.protection.outlook.com
 (mail-dm6nam08lp2040.outbound.protection.outlook.com [104.47.73.40])
 by userp3030.oracle.com with ESMTP id 3ek4juj0vq-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Fri, 04 Mar 2022 17:36:25 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
 by CY4PR10MB1285.namprd10.prod.outlook.com (2603:10b6:903:2a::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.17; Fri, 4 Mar
 2022 17:36:23 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::6d20:6694:a16:56f7]) by BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::6d20:6694:a16:56f7%3]) with mapi id 15.20.5038.017; Fri, 4 Mar 2022
 17:36:23 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ba522ab2-9be1-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=8uDqCUNhTviB4mhiyVPkrrcvb7ikd/TcQJ7W18h5qzQ=;
 b=e1FmGaKbZATpdIe3v+TJm5KR4vqL7EQoIJpHNUwV+M0kCP7IiPQ5XL3mYnKsXW//Yyg3
 l0AjseHHqUl8OWn2ILV6UCW0r1Onk5hCHNQVuc2CdbBu1n5/SbD4C+DIXgq4NRujUsaw
 hGvTbxtthDSR9Gj8FzRuIZivKUTZOXMOLB3fOEsGmasQJu05visKti+IqL+GrE6gkSy5
 JA5uYoiRvP0ccIOOgyrKAlGkYjSw9dIqFr9usEu6ITU6kWUiyv9rrsKruZb7jr2JQcvm
 rDiZEraGKeeAQ3WZsd2h9i4WZFBG0TeVku9CR3dK4J4tRhSoqxb0OowP4bs4PrgJ5z8K gg== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=PtKCDmlz24K1BNOjrslp07cPDZKhRaJ3EwRT5o9PzUHYh3ChFUAI44wa6bV1m2pp/OcdeCsFSwy9uuDNjtuQ0PiHxiqPCo1BFfr2wp0a5DyNJsjLh7knL2/sqhB4iqqvbARoIQAjOUcXSgY+wdE7LxFfiehRBd9IuZePcyUNe/43BPxTgnbS0S+L6Wx8wXs03DrFlFg7qHSzklQqkLSMq0GOnyCzsN0XNlrCSamFdcx64BbU5gzOwJqjtcrecvzQctZAmERB3sFJBPu74lMpePVXQQ3bW0+oPz2VECbOocSpoXMqICC4UbUTOoRBrpE/TW/3S/vKHU7lN4cJgERufA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=8uDqCUNhTviB4mhiyVPkrrcvb7ikd/TcQJ7W18h5qzQ=;
 b=NZQmAyO+pnCdswTpCTkXwlbs2UfaG3nVFGjFzHXrPBcPrYnYrouE7Fkaw4JHFczbdzmNwWpOoim/79VvhQ3eSx67k3aikPl2DtKcCEMIrGVoRA/gPZ8L3aoklxrlb+I/jwtHq1QjQrAocMP8SbT70q1eMI8U+h5PcVt+yi/HVKK6/o4D1vgVCsKYhhnLOH3Dcnca1tapTeq6jrBl9S0fC7uc50RlJIS330KBCgjjIP5FbBaMXRPmqbLRXBSBMtv1e2g7q7lIGWQKdi4OCQJbi71HALjUc+GV4L9jF4WAYYg1tpiELatamR1YcL7S7ee7EKNOII4blSVjmsku8rR4yQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=8uDqCUNhTviB4mhiyVPkrrcvb7ikd/TcQJ7W18h5qzQ=;
 b=NnBzQt7imRTHEphuBC6woD/cADs09z/aaC1r+Y3jg/g5qsbrm3aPy4GokflAao62PpIuAw09SvbGeEQTqcl0bxaM8QC8YH7R/mNV5fuVtu7g4380Mt+drmSoWP4+0vJq+U9eXaU9rynCa9+aSjQcmprrqRuxXGdbTLguLyUUj0E=
Message-ID: <fc3992a8-896b-f0fc-e500-9010ec085c57@oracle.com>
Date: Fri, 4 Mar 2022 12:36:17 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH 11/12] swiotlb: merge swiotlb-xen initialization into
 swiotlb
Content-Language: en-US
To: Christoph Hellwig <hch@lst.de>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
        iommu@lists.linux-foundation.org, x86@kernel.org,
        Anshuman Khandual <anshuman.khandual@arm.com>,
        Tom Lendacky <thomas.lendacky@amd.com>,
        Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
        Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
        David Woodhouse <dwmw2@infradead.org>,
        Lu Baolu <baolu.lu@linux.intel.com>,
        Robin Murphy <robin.murphy@arm.com>,
        linux-arm-kernel@lists.infradead.org, xen-devel@lists.xenproject.org,
        linux-ia64@vger.kernel.org, linux-mips@vger.kernel.org,
        linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org,
        linux-s390@vger.kernel.org, linux-hyperv@vger.kernel.org,
        tboot-devel@lists.sourceforge.net, linux-pci@vger.kernel.org
References: <20220301105311.885699-1-hch@lst.de>
 <20220301105311.885699-12-hch@lst.de>
 <alpine.DEB.2.22.394.2203011720150.3261@ubuntu-linux-20-04-desktop>
 <ca748512-12bb-7d75-13f1-8d5ec9703e26@oracle.com>
 <20220304172859.GA12860@lst.de>
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
In-Reply-To: <20220304172859.GA12860@lst.de>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: SN4PR0501CA0134.namprd05.prod.outlook.com
 (2603:10b6:803:2c::12) To BLAPR10MB5009.namprd10.prod.outlook.com
 (2603:10b6:208:321::10)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 7e7187f7-d4db-4948-94b2-08d9fe05803a
X-MS-TrafficTypeDiagnostic: CY4PR10MB1285:EE_
X-Microsoft-Antispam-PRVS: 
	<CY4PR10MB1285ADD3FBA21F562F3E40038A059@CY4PR10MB1285.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	MH3gkrhXX4IxX/Fa3hOgBKf0Zvz+HsmF5ZwwSvLKXuELIqo86AvI352uGtwZh1TrVNndCGJHMKLheXcnQoIOs/cvDtLih/a773HcxV3p4M5IOFH3Sezg0DlC3bsoU1q3ydeS1ydk8wQHMerkG3T93iQnWNwXT7qxdsCvdL/xIhWhQTY/w/ZzsIZdv1nXbVIwhXrug35+5OaMMFoUvtfR0ingL4zXzFEAlUbT4uon8Lp7sfVpuu/dX439KOddkw7uw5zPJJdR+lyIFneC4dBz/OtmqT/UpcFbgre0r8Jj2AnuQjDbAfiUlMFO3mOUPlkxAaOOZFH3jOyNPr8+krZesioPSh88kXIEu7bxR0w3EhT85ZDg80XZNa6P+2hYJj+75XDy+C1i7g5QjNxKXVTcNfm+MwrgFX0sFc1XXe4+LahnikuJXcCZTfU8+4moi7LCDzrCFZJ0mLSpgSbijtbR+KSCGaPIzRyvUc2X/0eDPGeKMIoPPR/DtrFr8WXfGbNxZZO+fqc+QvNyn05DwkfghcrSy6LbfC4K0JmpMJf/F4YRn+n9ANZLaW5AX9mc1HtkeZQRgHca4nxxLGgfBIVbkyjcNEJ96UHsc98daKO10ykLGvxwej2wmINDXtqRZSvMzb4RL6NomlC6iXVQImGR9M4NHno+pHaaxb9Pvsgr+eMHkU6BE+hfsuIl85aZ4O0ezOh6ibb6UhktE6lyytmPgC0acl7WxHKlZGJ0YA6tQKyeZs6fJbCAZ1Xt0wiwB76T
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BLAPR10MB5009.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(5660300002)(508600001)(36756003)(26005)(31696002)(186003)(2616005)(7416002)(2906002)(6486002)(38100700002)(31686004)(66946007)(86362001)(4326008)(66556008)(66476007)(8676002)(316002)(54906003)(6506007)(6512007)(6666004)(6916009)(53546011)(44832011)(8936002)(4744005)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?V2lYd0x1dnpWNTVQUExqSWFzLzhteS9rQndBeG9IeXBXNENMaTNhTStLeUhL?=
 =?utf-8?B?UUk3ekxzQkw2ajh6Q0JrWHNiNGJ6MHh6Mkh3OVhET25pdUdBbXU5aVpobzln?=
 =?utf-8?B?REN3dFJwOWsvZFc1dU84L2VXME4xUSsrVlFKbUFqRnBvKzVSZ1lJTEZjUDd4?=
 =?utf-8?B?Q1NDc2pjaG9OcVc2SmNxME5qelJ3UEF3SzZKQW5DMkdybmNJOWU0TDhmMlJJ?=
 =?utf-8?B?ME91aldQVXJKcmcweDJJVEkvcnYxdHJET0g5NXhRMDFQTU9HSjNIaUpaMFQ0?=
 =?utf-8?B?RUg5bEptL2w1T3E4dENQbHdHWk03eGxJK2kvbG9yT0Q3K0o0dWpDL3pqOEN5?=
 =?utf-8?B?MUo0N21lNFVOV1FEdU5yaDRuSVJHREZpdjNDc2xTTGdhdnk1THlPOEhNczJ5?=
 =?utf-8?B?K2xGUTdnRTdnZzVIOW1nUGpuOFpzQ3pQdTAzdFRibHhtWGNVOFBpVlVIeVFN?=
 =?utf-8?B?VWNpenNjUFdMbW12ZjlDVSt1MUsycWxGUkQ3WXRTeVB6dll1THd2RHU1SzFD?=
 =?utf-8?B?UXR3aWVDN0szUzF6SWs0K2c1SEVjNTZxRjR1UFVnS2NxL0NsRmpRL0ZtZ2dW?=
 =?utf-8?B?VEpTUVp0U2t0ZVFydjhXczIreGFZRHFQV3lWdWo2Mk9nR3daSDZzTExpMXFT?=
 =?utf-8?B?eFZwdDJyTUd4WGp2bTUrVy9kRHdOdEQ2aGVSTU52Tnl5aDVud2tLalp2S3RE?=
 =?utf-8?B?S1V0eDVUY0hna1pjampQZEZoS2Fnc3BHVlFWdkZTZVNqUVVPSWE0a3ZyZHF1?=
 =?utf-8?B?QXlyVGhEU3Z2WXVqVDBWclpDbDFnWnB2cGx0M1J3bUhFYThneDVpbzE4c0Zy?=
 =?utf-8?B?VG5QMmxRTzk3Z2dJSzhRUDkrU3dEbU1MS2pZaHVoMUs0bHVvUWFNdDRDQVc3?=
 =?utf-8?B?aWMybHZaUWd5R3dEMDh3V2xmSDhIcTZMc1FQSzN3NlQ4cEVmTnZQMGprbEZv?=
 =?utf-8?B?algxQU5scEN5Y1lrdTVKcDFtb1pRQnRlbnFwTURGNFlDSGlhbVpTVzdsNklu?=
 =?utf-8?B?WXZBeHFuUlNEY1ZreEd6ZzluLy9yeWcxSDNKRlRzdkpTRk9hNCtjUlVtQ1VZ?=
 =?utf-8?B?WHFKTXhiVDFyUE95ZG9SREdnbXQ0SjFpK0ltYkZlcWJqekFvTUtQcGJiUlJV?=
 =?utf-8?B?eS83c3FHckdXTTducTJ3eVAxRU9pUHhYMlNwd1laaDhyVlk2YWI0eHdKL01t?=
 =?utf-8?B?MkdiWkVRNmk2ZFhyM05pemlCelZ3bmQzeU5UTExtdllHK0JtN3JPK21iTXlG?=
 =?utf-8?B?MHZKWkErQVFDUmV4bmJTM2toeTloNUdySnNiS0ZBOStYRUNwZ3BsN1Jscmxw?=
 =?utf-8?B?WHlVL29sdDFoUjJGWHk0RmtiSWpmQjJkVFdvZHZqT0NiaFduOTUwZ0NQb3VX?=
 =?utf-8?B?NmVlYmZLQzEwdldnTEJ4RFdjd08yT1IrQXpkdHhNQkIzcjlBbytIYzVkYm1Y?=
 =?utf-8?B?djFTSjRhQzhtZXhHbTJ3bmRaRkg2cjlxUms2Q1VuZm1USldwSi82dE9GYlpL?=
 =?utf-8?B?M2xuQWt3aHZiQjdZbklHNTdtdlhKM05iOXBXOGVLWk84YUhLMHN2UzhzcElB?=
 =?utf-8?B?U2h2NXovRTdEZ3RzTXNSQk5kYTZyQm9XQ1JoVEk4TDRPK0x4b0F2VHdSd2l6?=
 =?utf-8?B?WDhCRVg1ZXhSTWF3dk5DRkZFQmJmVFl4MlFzeHVSZTNwTnkrSm9XRXd0dzll?=
 =?utf-8?B?Rmduc0M3NEhMUVpTWUllSEpxaGRVbWJ3bld6YkhuWlVYNzFkMy80ZHFFanpM?=
 =?utf-8?B?KzZ6MzhCLzNTU1ZlTWlkbTJ2TFY5VlhhK0tlbVNZMFhwck1YaG5md255bGlj?=
 =?utf-8?B?MDVDREdWdW5UOGVSU2MrbC9tczF6bUowVENRV012YUhUaEpuRnhJTlJ3SVE2?=
 =?utf-8?B?OGhWQUZWYXNlTkpSQXdTSDRmT3V6SHE1MDlvUUY0SDdDOEdCb1hQY3BKeitF?=
 =?utf-8?B?NlNzdVAwcENPcUFwd3FiWXJPWFZKMERyTGFOMHE4azBLaTVPaCtTRHgvdXBo?=
 =?utf-8?B?dERkVTRkS3lZYTNzKzVVSzlpWWJ4eDdhQytPZGQvaHg4U3g3VWlMczZkMndi?=
 =?utf-8?B?bkNpZWp1eHJWb0phNkxJYlZraGE5TWI0U3FETlpQMkpCRDVOZDZDeXJxUHIr?=
 =?utf-8?B?ZG83cjlDVDhqTGRiUnV4UmNpNjFpT1praGVZSHZ6bVo4QkhMQ0c5KzZvQzQz?=
 =?utf-8?B?bUlRYjBSOG9hUndkUSt2dCtBYm44QVRlNElqU2VrRE9INWs0ZzV2aFh1VVlK?=
 =?utf-8?Q?52r73YbfsAMeV2/9C16damm+jYZr8KlJC72T56dDHA=3D?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7e7187f7-d4db-4948-94b2-08d9fe05803a
X-MS-Exchange-CrossTenant-AuthSource: BLAPR10MB5009.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 17:36:23.0812
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 1YVb7NxWLJoThYJHosOYKO8D8ONaG67SC76V75LqbIWMc95M7KdQvRJJRh8FROXLz83NsdgApeiLB4kiNe//Fkv1iPblNdZBc5nBq6q2QYI=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR10MB1285
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10276 signatures=690470
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 bulkscore=0 spamscore=0 adultscore=0
 suspectscore=0 mlxlogscore=901 malwarescore=0 phishscore=0 mlxscore=0
 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2202240000
 definitions=main-2203040088
X-Proofpoint-GUID: kizS7Ryb1NSRvb55A1Pvqpf1wnjNU6K5
X-Proofpoint-ORIG-GUID: kizS7Ryb1NSRvb55A1Pvqpf1wnjNU6K5


On 3/4/22 12:28 PM, Christoph Hellwig wrote:
> On Wed, Mar 02, 2022 at 08:15:03AM -0500, Boris Ostrovsky wrote:
>> Not for me, I fail to boot with
>>
>> [   52.202000] bnxt_en 0000:31:00.0: swiotlb buffer is full (sz: 256 bytes), total 0 (slots), used 0 (slots)
>>
>> (this is iscsi root so I need the NIC).
>>
>>
>> I bisected it to "x86: remove the IOMMU table infrastructure" but haven't actually looked at the code yet.
> That looks like the swiotlb buffer did not get initialized at all, but I
> can't really explain why.
>
> Can you stick in a printk and see if xen_swiotlb_init_early gets called
> at all?



Actually, that's the only thing I did do so far and yes, it does get called.


-boris



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 17:43:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 17:43:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284397.483629 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQBxU-0004Xw-TP; Fri, 04 Mar 2022 17:43:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284397.483629; Fri, 04 Mar 2022 17:43:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQBxU-0004Xp-Q5; Fri, 04 Mar 2022 17:43:16 +0000
Received: by outflank-mailman (input) for mailman id 284397;
 Fri, 04 Mar 2022 17:43:15 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=2+cs=TP=lst.de=hch@srs-se1.protection.inumbo.net>)
 id 1nQBxT-0004Xj-3G
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:43:15 +0000
Received: from verein.lst.de (verein.lst.de [213.95.11.211])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 90b6cd28-9be2-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 18:43:13 +0100 (CET)
Received: by verein.lst.de (Postfix, from userid 2407)
 id 18C7068BEB; Fri,  4 Mar 2022 18:43:09 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 90b6cd28-9be2-11ec-8eba-a37418f5ba1a
Date: Fri, 4 Mar 2022 18:43:08 +0100
From: Christoph Hellwig <hch@lst.de>
To: Boris Ostrovsky <boris.ostrovsky@oracle.com>
Cc: Christoph Hellwig <hch@lst.de>,
	Stefano Stabellini <sstabellini@kernel.org>,
	iommu@lists.linux-foundation.org, x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org, linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org, tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: Re: [PATCH 11/12] swiotlb: merge swiotlb-xen initialization into
 swiotlb
Message-ID: <20220304174308.GA13515@lst.de>
References: <20220301105311.885699-1-hch@lst.de> <20220301105311.885699-12-hch@lst.de> <alpine.DEB.2.22.394.2203011720150.3261@ubuntu-linux-20-04-desktop> <ca748512-12bb-7d75-13f1-8d5ec9703e26@oracle.com> <20220304172859.GA12860@lst.de> <fc3992a8-896b-f0fc-e500-9010ec085c57@oracle.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <fc3992a8-896b-f0fc-e500-9010ec085c57@oracle.com>
User-Agent: Mutt/1.5.17 (2007-11-01)

On Fri, Mar 04, 2022 at 12:36:17PM -0500, Boris Ostrovsky wrote:
>>> I bisected it to "x86: remove the IOMMU table infrastructure" but haven't actually looked at the code yet.
>> That looks like the swiotlb buffer did not get initialized at all, but I
>> can't really explain why.
>>
>> Can you stick in a printk and see if xen_swiotlb_init_early gets called
>> at all?
>
>
>
> Actually, that's the only thing I did do so far and yes, it does get called.

So, specifically for "x86: remove the IOMMU table infrastructure" I
think we need the one-liner below so that swiotlb_exit doesn't get called
for the Xen case.  But that should have been fixed up by the next
patch already.

diff --git a/arch/x86/kernel/pci-dma.c b/arch/x86/kernel/pci-dma.c
index 2ac0ef9c2fb76..1173aa282ab27 100644
--- a/arch/x86/kernel/pci-dma.c
+++ b/arch/x86/kernel/pci-dma.c
@@ -70,7 +70,7 @@ static void __init pci_xen_swiotlb_init(void)
 	if (!xen_initial_domain() && !x86_swiotlb_enable &&
 	    swiotlb_force != SWIOTLB_FORCE)
 		return;
-	x86_swiotlb_enable = false;
+	x86_swiotlb_enable = true;
 	xen_swiotlb = true;
 	xen_swiotlb_init_early();
 	dma_ops = &xen_swiotlb_dma_ops;


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 17:51:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 17:51:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284444.483640 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQC5e-0006TM-47; Fri, 04 Mar 2022 17:51:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284444.483640; Fri, 04 Mar 2022 17:51:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQC5e-0006TF-16; Fri, 04 Mar 2022 17:51:42 +0000
Received: by outflank-mailman (input) for mailman id 284444;
 Fri, 04 Mar 2022 17:51:40 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQC5c-0006T5-Lr; Fri, 04 Mar 2022 17:51:40 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQC5c-0007jj-FJ; Fri, 04 Mar 2022 17:51:40 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQC5b-0007Ce-Ka; Fri, 04 Mar 2022 17:51:39 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQC5b-0003Zj-K9; Fri, 04 Mar 2022 17:51:39 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=9sqrLCBCZPLj3x17LyICQgtsbyY3HoQAGt9Ob6VMpds=; b=O0sME4ga6gaf5/AEPHVuMXKhOx
	q1YreWwvZfoqNkTLiZeZIryZC1cgtby20QpnAIZQ/seJqliEkXyOs8fjExCA9gxWvYFVpqLCbvnN1
	j37z7d9nhtTLAnHJV5FoBUGCV3s9t6j5GuUewH2k3MC3SpkVtW+d4truqB9OZK8sXfkg=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168399-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168399: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=1145d94c738ea13e0d2ceedb97a4cfe46292b08e
X-Osstest-Versions-That:
    xen=248496f890562fd6d6fea779520dd6335269e92c
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 04 Mar 2022 17:51:39 +0000

flight 168399 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168399/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  1145d94c738ea13e0d2ceedb97a4cfe46292b08e
baseline version:
 xen                  248496f890562fd6d6fea779520dd6335269e92c

Last test of basis   168396  2022-03-04 09:01:42 Z    0 days
Testing same since   168399  2022-03-04 14:03:05 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Jan Beulich <jbeulich@suse.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   248496f890..1145d94c73  1145d94c738ea13e0d2ceedb97a4cfe46292b08e -> smoke


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:13:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:13:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284491.483651 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCQG-0001AN-9D; Fri, 04 Mar 2022 18:13:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284491.483651; Fri, 04 Mar 2022 18:13:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCQG-0001AG-5z; Fri, 04 Mar 2022 18:13:00 +0000
Received: by outflank-mailman (input) for mailman id 284491;
 Fri, 04 Mar 2022 18:12:59 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=U8O5=TP=microsoft.com=mikelley@srs-se1.protection.inumbo.net>)
 id 1nQCQE-00019r-Qu
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 18:12:59 +0000
Received: from na01-obe.outbound.protection.outlook.com
 (mail-cusazlp170110003.outbound.protection.outlook.com
 [2a01:111:f403:c111::3])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id b697fab4-9be6-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 19:12:56 +0100 (CET)
Received: from MN0PR21MB3098.namprd21.prod.outlook.com (2603:10b6:208:376::14)
 by SN6PR2101MB1726.namprd21.prod.outlook.com (2603:10b6:805:64::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.8; Fri, 4 Mar
 2022 18:12:52 +0000
Received: from MN0PR21MB3098.namprd21.prod.outlook.com
 ([fe80::a0b3:c840:b085:5d7b]) by MN0PR21MB3098.namprd21.prod.outlook.com
 ([fe80::a0b3:c840:b085:5d7b%8]) with mapi id 15.20.5061.008; Fri, 4 Mar 2022
 18:12:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b697fab4-9be6-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=KSmHMD9Jw6jHx5Z8fGehEpi9YvYaBqa5J/EQaGE7VUEr50RTeV3DCiT0VvHimDTzMNMHX9h8fszRYlJ1rQaHgbz8+pwudplU6E9GugIBK+F0LPIVn+6iJ4HnlvNyJtK24TGk6D5+k2p9T1seuvmUy5zGzefUR1H0XiXahhRyVfc5A51isOU1KzGWSMbuV5hFdf/wk4NX219XgTwpfzeJcrc+5rRPAPEovDzb5l5Hhkho4Qy+1Ko7fOTXixdokbg7PNoTtKy8xHb6OnD5RwtwUK3MmS8y5KuWowL1W0+JfyLrrHJqrZjgnipZfIqS/mXD/H5jVbLvJOJOxzuuIQhuXw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=8OXTrBswO8QeeqMfl0MoFLx04JPU/sOVAvR5g8UTxKQ=;
 b=Kkh8zqHJVF7JY3FzTgtz9DYYrDzmz+TRgI1bQj3ypS2AzkCsz83EFuBOfXNbLKZygE6ODLPiUfZGV+QaV/jYEeClRV7G97ZLzKv4jwJAq7IJHKLkA2fcLRhoJL+wFb+xgAEJnzSvhDz5E/sAQ0bEsVdIQgUqUVVLy6bQBH+gib1G+/ydfO14VJbo7oYAwWCKLb3FsB1ho3VjySXscRY3Zqpr2gjFs+QqbyxMaPrwxgiN0qN2mU8vQGfCgSwRTtrskCnmsQflsQ250yrIVogHMpx9JV6rkk9ZvdZwrPL+tK1x12ajaFkiBRokuUSbQZY7tmHTS+TeN2LEDwkl1VaiCQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=microsoft.com; dmarc=pass action=none
 header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=selector2;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=8OXTrBswO8QeeqMfl0MoFLx04JPU/sOVAvR5g8UTxKQ=;
 b=dUn7ernPzjoigXe7i1rMEHsk9/iOLg8cw09r8hB2dxGB6LhBj8v9RJaiSJY7lxqccNKxNxry27Z3fr1N6z0nMm1YAoXFZ0kbFKhUOqIEVzk85FkBYicbiZaneadPPEp9iuy/uVIWA4CG4xlSD7dGjYjvJFLpZK0S9pIxWCWPkHM=
From: "Michael Kelley (LINUX)" <mikelley@microsoft.com>
To: Christoph Hellwig <hch@lst.de>, "iommu@lists.linux-foundation.org"
	<iommu@lists.linux-foundation.org>
CC: "x86@kernel.org" <x86@kernel.org>, Anshuman Khandual
	<anshuman.khandual@arm.com>, Tom Lendacky <thomas.lendacky@amd.com>, Konrad
 Rzeszutek Wilk <konrad.wilk@oracle.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>, David
 Woodhouse <dwmw2@infradead.org>, Lu Baolu <baolu.lu@linux.intel.com>, Robin
 Murphy <robin.murphy@arm.com>, "linux-arm-kernel@lists.infradead.org"
	<linux-arm-kernel@lists.infradead.org>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>, "linux-ia64@vger.kernel.org"
	<linux-ia64@vger.kernel.org>, "linux-mips@vger.kernel.org"
	<linux-mips@vger.kernel.org>, "linuxppc-dev@lists.ozlabs.org"
	<linuxppc-dev@lists.ozlabs.org>, "linux-riscv@lists.infradead.org"
	<linux-riscv@lists.infradead.org>, "linux-s390@vger.kernel.org"
	<linux-s390@vger.kernel.org>, "linux-hyperv@vger.kernel.org"
	<linux-hyperv@vger.kernel.org>, "tboot-devel@lists.sourceforge.net"
	<tboot-devel@lists.sourceforge.net>, "linux-pci@vger.kernel.org"
	<linux-pci@vger.kernel.org>
Subject: RE: [PATCH 10/12] swiotlb: add a SWIOTLB_ANY flag to lift the low
 memory restriction
Thread-Topic: [PATCH 10/12] swiotlb: add a SWIOTLB_ANY flag to lift the low
 memory restriction
Thread-Index: AQHYLVq0uSlYkDWbKUeZ67gbcRgpDayviVjw
Date: Fri, 4 Mar 2022 18:12:52 +0000
Message-ID:
 <MN0PR21MB3098F7AFC85BE5D83B0E64E5D7059@MN0PR21MB3098.namprd21.prod.outlook.com>
References: <20220301105311.885699-1-hch@lst.de>
 <20220301105311.885699-11-hch@lst.de>
In-Reply-To: <20220301105311.885699-11-hch@lst.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels:
 MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=4eaee8ee-4e42-4e1f-b906-ba38a9503a12;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2022-03-04T18:02:35Z;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47;
authentication-results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=microsoft.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: c274e37a-cbf6-4184-d10e-08d9fe0a9942
x-ms-traffictypediagnostic: SN6PR2101MB1726:EE_
x-ms-exchange-atpmessageproperties: SA|SL
x-microsoft-antispam-prvs:
 <SN6PR2101MB1726DFD44A7C57C90A679AEFD7059@SN6PR2101MB1726.namprd21.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info:
 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
x-forefront-antispam-report:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN0PR21MB3098.namprd21.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(66946007)(186003)(26005)(66556008)(76116006)(86362001)(66446008)(4326008)(8990500004)(66476007)(83380400001)(7416002)(2906002)(82950400001)(38100700002)(5660300002)(82960400001)(122000001)(8676002)(64756008)(38070700005)(8936002)(55016003)(52536014)(10290500003)(966005)(7696005)(33656002)(9686003)(6506007)(316002)(508600001)(54906003)(71200400001)(110136005);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0:
 =?us-ascii?Q?5W5BivVjRFu+Bss9JLAzsEBmo3iUXWlHXJ2EQ/pTokCm2fEyrPFggV2IOXib?=
 =?us-ascii?Q?nFpIG4Ob8VfP/9wk13JwsWBxhtJ8hNklFtpS29K9HZ9ipCjWIseAgkrIbHPi?=
 =?us-ascii?Q?5Q/2NwOHR5SytfYxIVCedi/lZwCYfG68u4O/izLzrOKA3c6viWwDvliqIuMx?=
 =?us-ascii?Q?CsXNxsZk4H2DxwYhWHSgg0A7rimq/elHpADeOLAd1f/a1OAMT2t+7U+btsSZ?=
 =?us-ascii?Q?DGGqxCU1xXjqeLrnsFp56gslIRIKYAa26aOjxNkMmkqm6E/48e6tiwFxJyEa?=
 =?us-ascii?Q?FCKz2+wJKBAUyp1sBnfOARGsnbzAwtxSKV2UMh9qZH6YenQ7vN9RYh0fnisU?=
 =?us-ascii?Q?DE7K6aKl+Uxtq2zvOttc3l9UPZJs2Ib2WA6wJzb83EtaAcFaVBBWHakcHQX3?=
 =?us-ascii?Q?vRIikKrI50z6IxXUySvWIf5Hrd18Q/MU621Djv8i0HuBigliC6++rWx4QmQQ?=
 =?us-ascii?Q?fO9EA9XRdWbNW/NNsN6LhN8vHEmd2n0uBLENjEgvUbMx4gof1KyFpqf1hqRw?=
 =?us-ascii?Q?PgF1/R6LCV5P3p5xcUnlIzBFtFNn3UTIYW6h2IZS6n2EHKiWNFTEXAVsKeOU?=
 =?us-ascii?Q?5XF8qeQtjoeZgqzWAKeuTxwXYwMRHLJzLb4EQtR0uhIPFUbwubt9NTrxZA8/?=
 =?us-ascii?Q?6ac/XijW0xfkH3sesEV4BKxhI5Ltw3+xmQ2TOKyLdoTGpPjgIeuNnrNDN7XI?=
 =?us-ascii?Q?OeI46Iuvb5AtSZllpmkpiomET/3QEZCncmvMbST6vsJ88gupV6APjLwyJGsp?=
 =?us-ascii?Q?yW9nzKJnPap3zEXYnazx84H9wRNp1MBxF+8wvXlWE+2WS1gEcaFLMOeAkUXL?=
 =?us-ascii?Q?fAMzfMK2CmcrnBjoaK+10AOz+L3sRZJ4EuSJGD/lwFuQoJY/8VFAfW3FAcdn?=
 =?us-ascii?Q?BSDjYj9QZP9SNzsAYmKdHwYGoo9o202MpnUDteDlJzqCbEscAXV3Ij/D795Q?=
 =?us-ascii?Q?hYTufnM/O7h3s6DOs9IPu+yCV7Y5T4aaqFK7OIHd9XYRTMyukdeG5a0n0IMH?=
 =?us-ascii?Q?uvL4Pc71A2EDamdm8GcFh6qw5HqBFILaJjdxD6REA4hnV95ouGaB8EnvM3nL?=
 =?us-ascii?Q?hVeqyxzspx4d2GdH2hmNKaFe6EObgVmIjU/IbDs4dO8YwfZb1JraJffynPXP?=
 =?us-ascii?Q?K4o0e8glTXGYr8qY3cpB8i8TZohi09XlURYs9cW/+2wJso6HON3GF0mdg5Lr?=
 =?us-ascii?Q?LWrJucZXX/1b2E8no4bmyJ3jfTJJSR+QIm5I2gB0y8moRP0p15ARU7bd4AjH?=
 =?us-ascii?Q?OFInlLN8MZOhasLLo8I4d6GT2e6Vh71Yueo8yAQwBbGCQJ2KzD0l3D5YxxVR?=
 =?us-ascii?Q?Wkioi6nSqtiVdKyBRuxsrg02ZLF0WIQ7lOqlL7YNbFdLrYmqH+xiw2IDYS3v?=
 =?us-ascii?Q?E6WbzJgsnbrldz/h71J2Q4VcycU73JOaFx2xXlaG1/es8ppAWV6uQnyQEbKH?=
 =?us-ascii?Q?MtyhQBTBbJx6SWmUL/q6hkysFQIJm4croZGHhxdDblbG3dNIEjC8rg=3D=3D?=
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN0PR21MB3098.namprd21.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c274e37a-cbf6-4184-d10e-08d9fe0a9942
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Mar 2022 18:12:52.2507
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: S3cDJwHIdzK5KgvQc+b6vlI/BNS30x5VYpzHZSFhUXZsLjTDZLZ/Q/04G9r+2ZHIIJa5aoSVkdNWVBg0n2BWL9nsjZLmj/ZVPJbpGvpRLu0=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR2101MB1726

From: Christoph Hellwig <hch@lst.de> Sent: Tuesday, March 1, 2022 2:53 AM
>=20
> Power SVM wants to allocate a swiotlb buffer that is not restricted to lo=
w memory for
> the trusted hypervisor scheme.  Consolidate the support for this into the=
 swiotlb_init
> interface by adding a new flag.

Hyper-V Isolated VMs want to do the same thing of not restricting the swiot=
lb
buffer to low memory.  That's what Tianyu Lan's patch set[1] is proposing.
Hyper-V synthetic devices have no DMA addressing limitations, and the
likelihood of using a PCI pass-thru device with addressing limitations in a=
n
Isolated VM seems vanishingly small.

So could use of the SWIOTLB_ANY flag be generalized?  Let Hyper-V init
code set the flag before swiotlb_init() is called.  Or provide a CONFIG
variable that Hyper-V Isolated VMs could set.

Michael

[1] https://lore.kernel.org/lkml/20220209122302.213882-1-ltykernel@gmail.co=
m/

>=20
> Signed-off-by: Christoph Hellwig <hch@lst.de>
> ---
>  arch/powerpc/include/asm/svm.h       |  4 ----
>  arch/powerpc/include/asm/swiotlb.h   |  1 +
>  arch/powerpc/kernel/dma-swiotlb.c    |  1 +
>  arch/powerpc/mm/mem.c                |  5 +----
>  arch/powerpc/platforms/pseries/svm.c | 26 +-------------------------
>  include/linux/swiotlb.h              |  1 +
>  kernel/dma/swiotlb.c                 |  9 +++++++--
>  7 files changed, 12 insertions(+), 35 deletions(-)
>=20
> diff --git a/arch/powerpc/include/asm/svm.h b/arch/powerpc/include/asm/sv=
m.h
> index 7546402d796af..85580b30aba48 100644
> --- a/arch/powerpc/include/asm/svm.h
> +++ b/arch/powerpc/include/asm/svm.h
> @@ -15,8 +15,6 @@ static inline bool is_secure_guest(void)
>  	return mfmsr() & MSR_S;
>  }
>=20
> -void __init svm_swiotlb_init(void);
> -
>  void dtl_cache_ctor(void *addr);
>  #define get_dtl_cache_ctor()	(is_secure_guest() ? dtl_cache_ctor : NULL)
>=20
> @@ -27,8 +25,6 @@ static inline bool is_secure_guest(void)
>  	return false;
>  }
>=20
> -static inline void svm_swiotlb_init(void) {}
> -
>  #define get_dtl_cache_ctor() NULL
>=20
>  #endif /* CONFIG_PPC_SVM */
> diff --git a/arch/powerpc/include/asm/swiotlb.h
> b/arch/powerpc/include/asm/swiotlb.h
> index 3c1a1cd161286..4203b5e0a88ed 100644
> --- a/arch/powerpc/include/asm/swiotlb.h
> +++ b/arch/powerpc/include/asm/swiotlb.h
> @@ -9,6 +9,7 @@
>  #include <linux/swiotlb.h>
>=20
>  extern unsigned int ppc_swiotlb_enable;
> +extern unsigned int ppc_swiotlb_flags;
>=20
>  #ifdef CONFIG_SWIOTLB
>  void swiotlb_detect_4g(void);
> diff --git a/arch/powerpc/kernel/dma-swiotlb.c b/arch/powerpc/kernel/dma-
> swiotlb.c
> index fc7816126a401..ba256c37bcc0f 100644
> --- a/arch/powerpc/kernel/dma-swiotlb.c
> +++ b/arch/powerpc/kernel/dma-swiotlb.c
> @@ -10,6 +10,7 @@
>  #include <asm/swiotlb.h>
>=20
>  unsigned int ppc_swiotlb_enable;
> +unsigned int ppc_swiotlb_flags;
>=20
>  void __init swiotlb_detect_4g(void)
>  {
> diff --git a/arch/powerpc/mm/mem.c b/arch/powerpc/mm/mem.c index
> e1519e2edc656..a4d65418c30a9 100644
> --- a/arch/powerpc/mm/mem.c
> +++ b/arch/powerpc/mm/mem.c
> @@ -249,10 +249,7 @@ void __init mem_init(void)
>  	 * back to to-down.
>  	 */
>  	memblock_set_bottom_up(true);
> -	if (is_secure_guest())
> -		svm_swiotlb_init();
> -	else
> -		swiotlb_init(ppc_swiotlb_enable, 0);
> +	swiotlb_init(ppc_swiotlb_enable, ppc_swiotlb_flags);
>  #endif
>=20
>  	high_memory =3D (void *) __va(max_low_pfn * PAGE_SIZE); diff --git
> a/arch/powerpc/platforms/pseries/svm.c b/arch/powerpc/platforms/pseries/s=
vm.c
> index c5228f4969eb2..3b4045d508ec8 100644
> --- a/arch/powerpc/platforms/pseries/svm.c
> +++ b/arch/powerpc/platforms/pseries/svm.c
> @@ -28,7 +28,7 @@ static int __init init_svm(void)
>  	 * need to use the SWIOTLB buffer for DMA even if dma_capable() says
>  	 * otherwise.
>  	 */
> -	swiotlb_force =3D SWIOTLB_FORCE;
> +	ppc_swiotlb_flags |=3D SWIOTLB_ANY | SWIOTLB_FORCE;
>=20
>  	/* Share the SWIOTLB buffer with the host. */
>  	swiotlb_update_mem_attributes();
> @@ -37,30 +37,6 @@ static int __init init_svm(void)  }  machine_early_ini=
tcall(pseries,
> init_svm);
>=20
> -/*
> - * Initialize SWIOTLB. Essentially the same as swiotlb_init(), except th=
at it
> - * can allocate the buffer anywhere in memory. Since the hypervisor does=
n't have
> - * any addressing limitation, we don't need to allocate it in low addres=
ses.
> - */
> -void __init svm_swiotlb_init(void)
> -{
> -	unsigned char *vstart;
> -	unsigned long bytes, io_tlb_nslabs;
> -
> -	io_tlb_nslabs =3D (swiotlb_size_or_default() >> IO_TLB_SHIFT);
> -	io_tlb_nslabs =3D ALIGN(io_tlb_nslabs, IO_TLB_SEGSIZE);
> -
> -	bytes =3D io_tlb_nslabs << IO_TLB_SHIFT;
> -
> -	vstart =3D memblock_alloc(PAGE_ALIGN(bytes), PAGE_SIZE);
> -	if (vstart && !swiotlb_init_with_tbl(vstart, io_tlb_nslabs, false))
> -		return;
> -
> -
> -	memblock_free(vstart, PAGE_ALIGN(io_tlb_nslabs << IO_TLB_SHIFT));
> -	panic("SVM: Cannot allocate SWIOTLB buffer");
> -}
> -
>  int set_memory_encrypted(unsigned long addr, int numpages)  {
>  	if (!cc_platform_has(CC_ATTR_MEM_ENCRYPT))
> diff --git a/include/linux/swiotlb.h b/include/linux/swiotlb.h index
> dcecf953f7997..ee655f2e4d28b 100644
> --- a/include/linux/swiotlb.h
> +++ b/include/linux/swiotlb.h
> @@ -15,6 +15,7 @@ struct scatterlist;
>=20
>  #define SWIOTLB_VERBOSE	(1 << 0) /* verbose initialization */
>  #define SWIOTLB_FORCE	(1 << 1) /* force bounce buffering */
> +#define SWIOTLB_ANY	(1 << 2) /* allow any memory for the buffer */
>=20
>  /*
>   * Maximum allowable number of contiguous slabs to map, diff --git
> a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c index 1a40c71c4d51a..77cf73=
dc20a78
> 100644
> --- a/kernel/dma/swiotlb.c
> +++ b/kernel/dma/swiotlb.c
> @@ -275,8 +275,13 @@ void __init swiotlb_init(bool addressing_limit, unsi=
gned int
> flags)
>  	if (swiotlb_force_disable)
>  		return;
>=20
> -	/* Get IO TLB memory from the low pages */
> -	tlb =3D memblock_alloc_low(bytes, PAGE_SIZE);
> +	/*
> +	 * By default allocate the bonuce buffer memory from low memory.
> +	 */
> +	if (flags & SWIOTLB_ANY)
> +		tlb =3D memblock_alloc(bytes, PAGE_SIZE);
> +	else
> +		tlb =3D memblock_alloc_low(bytes, PAGE_SIZE);
>  	if (!tlb)
>  		goto fail;
>  	if (swiotlb_init_with_tbl(tlb, default_nslabs, flags))
> --
> 2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:16:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:16:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284405.483667 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCU4-0002A9-9H; Fri, 04 Mar 2022 18:16:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284405.483667; Fri, 04 Mar 2022 18:16:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCU4-000294-2G; Fri, 04 Mar 2022 18:16:56 +0000
Received: by outflank-mailman (input) for mailman id 284405;
 Fri, 04 Mar 2022 17:47:56 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC20-0005R5-R1
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:47:56 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 384aa71f-9be3-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 18:47:55 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC1x-0008PE-IK; Fri, 04 Mar 2022 18:47:53 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 384aa71f-9be3-11ec-8539-5f4723681683
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 01/36] Revert "xen/arm: setup: Add Xen as boot module before printing all boot modules"
Date: Fri,  4 Mar 2022 18:46:26 +0100
Message-Id: <20220304174701.1453977-2-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

This reverts commit 48fb2a9deba11ee48dde21c5c1aa93b4d4e1043b.
---
 xen/arch/arm/setup.c | 12 ++++++------
 1 file changed, 6 insertions(+), 6 deletions(-)

diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c
index d5d0792ed4..c5a556855e 100644
--- a/xen/arch/arm/setup.c
+++ b/xen/arch/arm/setup.c
@@ -888,18 +888,18 @@ void __init start_xen(unsigned long boot_phys_offset,
               "Please check your bootloader.\n",
               fdt_paddr);
 
-    /* Register Xen's load address as a boot module. */
-    xen_bootmodule = add_boot_module(BOOTMOD_XEN,
-                             (paddr_t)(uintptr_t)(_start + boot_phys_offset),
-                             (paddr_t)(uintptr_t)(_end - _start), false);
-    BUG_ON(!xen_bootmodule);
-
     fdt_size = boot_fdt_info(device_tree_flattened, fdt_paddr);
 
     cmdline = boot_fdt_cmdline(device_tree_flattened);
     printk("Command line: %s\n", cmdline);
     cmdline_parse(cmdline);
 
+    /* Register Xen's load address as a boot module. */
+    xen_bootmodule = add_boot_module(BOOTMOD_XEN,
+                             (paddr_t)(uintptr_t)(_start + boot_phys_offset),
+                             (paddr_t)(uintptr_t)(_end - _start + 1), false);
+    BUG_ON(!xen_bootmodule);
+
     setup_mm();
 
     /* Parse the ACPI tables for possible boot-time configuration */
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:16:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:16:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284404.483662 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCU3-000272-Uk; Fri, 04 Mar 2022 18:16:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284404.483662; Fri, 04 Mar 2022 18:16:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCU3-00026v-Qp; Fri, 04 Mar 2022 18:16:55 +0000
Received: by outflank-mailman (input) for mailman id 284404;
 Fri, 04 Mar 2022 17:47:56 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC20-0005R4-JV
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:47:56 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 384b1cee-9be3-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 18:47:54 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC1w-0008PA-Hf; Fri, 04 Mar 2022 18:47:53 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 384b1cee-9be3-11ec-8eba-a37418f5ba1a
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>
Subject: [PATCH 00/36] Arm cache coloring
Date: Fri,  4 Mar 2022 18:46:25 +0100
Message-Id: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Shared caches in multi-core CPU architectures represent a problem for
predictability of memory access latency.  This jeopardizes applicability
of many Arm platform in real-time critical and mixed-criticality
scenarios.  We introduce support for cache partitioning with page
coloring, a transparent software technique that enables isolation
between domains and Xen, and thus avoids cache interference.

When creating a domain, a simple syntax (e.g. `0-3` or `4-11`) allows
the user to define assignments of cache partitions ids, called colors,
where assigning different colors guarantees no mutual eviction on cache
will ever happen.  This instructs the Xen memory allocator to provide
the i-th color assignee only with pages that maps to color i, i.e. that
are indexed in the i-th cache partition.

The proposed implementation supports the dom0less experimental feature.
The solution has been tested in several scenarios, including Xilinx Zynq
MPSoCs.


Overview of implementation and commits structure
------------------------------------------------

- Coloring support is added for dom0 and domU by defining the core
  logic, as well as the hardware inspection functionalities used for
  getting needed coloring information [4-17].
- A new memory page allocator that implement the cache coloring
  mechanism is introduced.  The allocation algorithm follows the given
  coloring scheme specified for each domain, and maximizes contiguity in
  the page selection [18-21].
- Coloring support is added to Xen .text region [22-29], as well as to
  dom0less domains [30].
- Extensive documentation details the technique and gently explains
  usage [33-36].


Known limitations
-----------------

- We need to bring back [1-3] the relocation feature in order to move
  Xen memory to a colored space where the hypervisor could be isolated
  from VMs interference.
- When cache coloring is used, static memory assignment is disabled to
  avoid incompatibility. [31]
- Due to assert failure [32], the number of supported colors is
  currently limited at 64, which should be satisfactory for most chips.
  In particular, the problem lies in the cache coloring configuration
  data structure that belongs to each domain.  We are aware that this is
  not a clean solution but we hope that this could be discussed and
  solved within this pull request.


Acknowledgements
----------------

This work is sponsored by Xilinx Inc., and supported by University of
Modena and Reggio Emilia and Minerva Systems.

***

Luca Miccio (36):
  Revert "xen/arm: setup: Add Xen as boot module before printing all
    boot modules"
  Revert "xen/arm: mm: Initialize page-tables earlier"
  xen/arm: restore xen_paddr argument in setup_pagetables
  xen/arm: add parsing function for cache coloring configuration
  xen/arm: compute LLC way size by hardware inspection
  xen/arm: add coloring basic initialization
  xen/arm: add coloring data to domains
  xen/arm: add colored flag to page struct
  xen/arch: add default colors selection function
  xen/arch: check color selection function
  xen/include: define hypercall parameter for coloring
  xen/arm: initialize cache coloring data for Dom0/U
  xen/arm: A domain is not direct mapped when coloring is enabled
  xen/arch: add dump coloring info for domains
  tools: add support for cache coloring configuration
  xen/color alloc: implement color_from_page for ARM64
  xen/arm: add get_max_color function
  Alloc: introduce page_list_for_each_reverse
  xen/arch: introduce cache-coloring allocator
  xen/common: introduce buddy required reservation
  xen/common: add colored allocator initialization
  xen/arch: init cache coloring conf for Xen
  xen/arch: coloring: manually calculate Xen physical addresses
  xen/arm: enable consider_modules for coloring
  xen/arm: bring back get_xen_paddr
  xen/arm: add argument to remove_early_mappings
  xen/arch: add coloring support for Xen
  xen/arm: introduce xen_map_text_rw
  xen/arm: add dump function for coloring info
  xen/arm: add coloring support to dom0less
  Disable coloring if static memory support is selected
  xen/arm: reduce the number of supported colors
  doc, xen-command-line: introduce coloring options
  doc, xl.cfg: introduce coloring configuration option
  doc, device-tree: introduce 'colors' property
  doc, arm: add usage documentation for cache coloring support

 docs/man/xl.cfg.5.pod.in              |  14 +
 docs/misc/arm/cache_coloring.rst      | 191 +++++++++++
 docs/misc/arm/device-tree/booting.txt |   3 +
 docs/misc/xen-command-line.pandoc     |  51 ++-
 tools/libs/light/libxl_arm.c          |  11 +
 tools/libs/light/libxl_types.idl      |   1 +
 tools/xl/xl_parse.c                   |  59 +++-
 xen/arch/arm/Kconfig                  |   6 +
 xen/arch/arm/Makefile                 |   2 +-
 xen/arch/arm/alternative.c            |   8 +-
 xen/arch/arm/coloring.c               | 469 ++++++++++++++++++++++++++
 xen/arch/arm/domain.c                 |  56 +++
 xen/arch/arm/domain_build.c           |  42 ++-
 xen/arch/arm/include/asm/coloring.h   |  98 ++++++
 xen/arch/arm/include/asm/mm.h         |  18 +-
 xen/arch/arm/mm.c                     | 245 +++++++++++++-
 xen/arch/arm/psci.c                   |   4 +-
 xen/arch/arm/setup.c                  |  94 +++++-
 xen/arch/arm/smpboot.c                |  19 +-
 xen/common/page_alloc.c               | 321 +++++++++++++++++-
 xen/common/vmap.c                     |   4 +-
 xen/include/public/arch-arm.h         |   8 +
 xen/include/xen/mm.h                  |   7 +
 xen/include/xen/sched.h               |   4 +
 xen/include/xen/vmap.h                |   2 +
 25 files changed, 1689 insertions(+), 48 deletions(-)
 create mode 100644 docs/misc/arm/cache_coloring.rst
 create mode 100644 xen/arch/arm/coloring.c
 create mode 100644 xen/arch/arm/include/asm/coloring.h

-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:16:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:16:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284406.483673 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCU4-0002Ec-Lg; Fri, 04 Mar 2022 18:16:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284406.483673; Fri, 04 Mar 2022 18:16:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCU4-0002DV-Df; Fri, 04 Mar 2022 18:16:56 +0000
Received: by outflank-mailman (input) for mailman id 284406;
 Fri, 04 Mar 2022 17:47:57 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC21-0005R5-KP
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:47:57 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 38adf329-9be3-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 18:47:55 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC1y-0008PQ-U7; Fri, 04 Mar 2022 18:47:55 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 38adf329-9be3-11ec-8539-5f4723681683
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 03/36] xen/arm: restore xen_paddr argument in setup_pagetables
Date: Fri,  4 Mar 2022 18:46:28 +0100
Message-Id: <20220304174701.1453977-4-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

Coloring support will re-enable part of the Xen relocation since the
underlying idea is to "relocate using coloring" for the hypervisors
itself.
We setup a target region that will be used exclusively from Xen and
it will be mapped using the coloring configuration of the hypervisor.
Part of the relocation we need to bring back is the usage of xen_paddr
variable that will tell us the physical start address where Xen is
located.
Add this variable to the setup_pagetables function and set it properly
when coloring is not enabled.
Later on it will be initialized accordingly whether the coloring support
is enabled or not.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
---
 xen/arch/arm/include/asm/mm.h | 2 +-
 xen/arch/arm/mm.c             | 2 +-
 xen/arch/arm/setup.c          | 6 +++---
 3 files changed, 5 insertions(+), 5 deletions(-)

diff --git a/xen/arch/arm/include/asm/mm.h b/xen/arch/arm/include/asm/mm.h
index 424aaf2823..487be7cf59 100644
--- a/xen/arch/arm/include/asm/mm.h
+++ b/xen/arch/arm/include/asm/mm.h
@@ -176,7 +176,7 @@ extern unsigned long total_pages;
 #define PDX_GROUP_SHIFT SECOND_SHIFT
 
 /* Boot-time pagetable setup */
-extern void setup_pagetables(unsigned long boot_phys_offset);
+extern void setup_pagetables(unsigned long boot_phys_offset, paddr_t xen_paddr);
 /* Map FDT in boot pagetable */
 extern void *early_fdt_map(paddr_t fdt_paddr);
 /* Remove early mappings */
diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
index e6381e46e6..fd7a313d88 100644
--- a/xen/arch/arm/mm.c
+++ b/xen/arch/arm/mm.c
@@ -634,7 +634,7 @@ static void clear_table(void *table)
 
 /* Boot-time pagetable setup.
  * Changes here may need matching changes in head.S */
-void __init setup_pagetables(unsigned long boot_phys_offset)
+void __init setup_pagetables(unsigned long boot_phys_offset, paddr_t xen_paddr)
 {
     uint64_t ttbr;
     lpae_t pte, *p;
diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c
index 100b322b3e..b8d4f50d90 100644
--- a/xen/arch/arm/setup.c
+++ b/xen/arch/arm/setup.c
@@ -867,6 +867,7 @@ void __init start_xen(unsigned long boot_phys_offset,
     struct bootmodule *xen_bootmodule;
     struct domain *d;
     int rc;
+    paddr_t xen_paddr = (paddr_t)(_start + boot_phys_offset);
 
     dcache_line_bytes = read_dcache_line_bytes();
 
@@ -893,12 +894,11 @@ void __init start_xen(unsigned long boot_phys_offset,
     cmdline_parse(cmdline);
 
     /* Register Xen's load address as a boot module. */
-    xen_bootmodule = add_boot_module(BOOTMOD_XEN,
-                             (paddr_t)(uintptr_t)(_start + boot_phys_offset),
+    xen_bootmodule = add_boot_module(BOOTMOD_XEN, xen_paddr,
                              (paddr_t)(uintptr_t)(_end - _start + 1), false);
     BUG_ON(!xen_bootmodule);
 
-    setup_pagetables(boot_phys_offset);
+    setup_pagetables(boot_phys_offset, xen_paddr);
 
     setup_mm();
 
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:16:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:16:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284409.483680 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCU5-0002P5-7C; Fri, 04 Mar 2022 18:16:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284409.483680; Fri, 04 Mar 2022 18:16:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCU4-0002Mr-QJ; Fri, 04 Mar 2022 18:16:56 +0000
Received: by outflank-mailman (input) for mailman id 284409;
 Fri, 04 Mar 2022 17:47:58 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC22-0005R5-Kj
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:47:58 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 384e0956-9be3-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 18:47:55 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC1y-0008PH-8A; Fri, 04 Mar 2022 18:47:54 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 384e0956-9be3-11ec-8539-5f4723681683
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 02/36] Revert "xen/arm: mm: Initialize page-tables earlier"
Date: Fri,  4 Mar 2022 18:46:27 +0100
Message-Id: <20220304174701.1453977-3-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

This reverts commit 3a5d341681af650825bbe3bee9be5d187da35080.

The coloring support  will be configurable within the Xen command line
but it will be initialized before the page-tables; this is necessary
for coloring the hypervisor itself beacuse we will create a specific
mapping for it that could be configured using some options.
In order to parse all the needed information from the device tree, we
need to revert the above commit and restore the previous order for
page-tables initialization.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
---
 xen/arch/arm/mm.c    | 11 +++++++++--
 xen/arch/arm/setup.c |  4 ++--
 2 files changed, 11 insertions(+), 4 deletions(-)

diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
index b1eae767c2..e6381e46e6 100644
--- a/xen/arch/arm/mm.c
+++ b/xen/arch/arm/mm.c
@@ -551,6 +551,7 @@ static inline lpae_t pte_of_xenaddr(vaddr_t va)
     return mfn_to_xen_entry(maddr_to_mfn(ma), MT_NORMAL);
 }
 
+/* Map the FDT in the early boot page table */
 void * __init early_fdt_map(paddr_t fdt_paddr)
 {
     /* We are using 2MB superpage for mapping the FDT */
@@ -573,7 +574,7 @@ void * __init early_fdt_map(paddr_t fdt_paddr)
     /* The FDT is mapped using 2MB superpage */
     BUILD_BUG_ON(BOOT_FDT_VIRT_START % SZ_2M);
 
-    create_mappings(xen_second, BOOT_FDT_VIRT_START, paddr_to_pfn(base_paddr),
+    create_mappings(boot_second, BOOT_FDT_VIRT_START, paddr_to_pfn(base_paddr),
                     SZ_2M >> PAGE_SHIFT, SZ_2M);
 
     offset = fdt_paddr % SECOND_SIZE;
@@ -588,7 +589,7 @@ void * __init early_fdt_map(paddr_t fdt_paddr)
 
     if ( (offset + size) > SZ_2M )
     {
-        create_mappings(xen_second, BOOT_FDT_VIRT_START + SZ_2M,
+        create_mappings(boot_second, BOOT_FDT_VIRT_START + SZ_2M,
                         paddr_to_pfn(base_paddr + SZ_2M),
                         SZ_2M >> PAGE_SHIFT, SZ_2M);
     }
@@ -699,6 +700,12 @@ void __init setup_pagetables(unsigned long boot_phys_offset)
     pte.pt.table = 1;
     xen_second[second_table_offset(FIXMAP_ADDR(0))] = pte;
 
+    /* ... DTB */
+    pte = boot_second[second_table_offset(BOOT_FDT_VIRT_START)];
+    xen_second[second_table_offset(BOOT_FDT_VIRT_START)] = pte;
+    pte = boot_second[second_table_offset(BOOT_FDT_VIRT_START + SZ_2M)];
+    xen_second[second_table_offset(BOOT_FDT_VIRT_START + SZ_2M)] = pte;
+
 #ifdef CONFIG_ARM_64
     ttbr = (uintptr_t) xen_pgtable + phys_offset;
 #else
diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c
index c5a556855e..100b322b3e 100644
--- a/xen/arch/arm/setup.c
+++ b/xen/arch/arm/setup.c
@@ -877,8 +877,6 @@ void __init start_xen(unsigned long boot_phys_offset,
     /* Initialize traps early allow us to get backtrace when an error occurred */
     init_traps();
 
-    setup_pagetables(boot_phys_offset);
-
     smp_clear_cpu_maps();
 
     device_tree_flattened = early_fdt_map(fdt_paddr);
@@ -900,6 +898,8 @@ void __init start_xen(unsigned long boot_phys_offset,
                              (paddr_t)(uintptr_t)(_end - _start + 1), false);
     BUG_ON(!xen_bootmodule);
 
+    setup_pagetables(boot_phys_offset);
+
     setup_mm();
 
     /* Parse the ACPI tables for possible boot-time configuration */
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:16:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:16:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284411.483688 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCU5-0002X2-Nz; Fri, 04 Mar 2022 18:16:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284411.483688; Fri, 04 Mar 2022 18:16:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCU5-0002TW-AX; Fri, 04 Mar 2022 18:16:57 +0000
Received: by outflank-mailman (input) for mailman id 284411;
 Fri, 04 Mar 2022 17:47:59 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC23-0005R5-Kk
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:47:59 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 399d2c12-9be3-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 18:47:57 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC1z-0008PV-Ji; Fri, 04 Mar 2022 18:47:56 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 399d2c12-9be3-11ec-8539-5f4723681683
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>,
	Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: [PATCH 04/36] xen/arm: add parsing function for cache coloring configuration
Date: Fri,  4 Mar 2022 18:46:29 +0100
Message-Id: <20220304174701.1453977-5-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

Add three new bootargs allowing configuration of cache coloring support
for Xen:
- way_size: The size of a LLC way in bytes. This value is mainly used
  to calculate the maximum available colors on the platform.
- dom0_colors: The coloring configuration for Dom0, which also acts as
  default configuration for any DomU without an explicit configuration.
- xen_colors: The coloring configuration for the Xen hypervisor itself.

A cache coloring configuration consists of a selection of colors to be
assigned to a VM or to the hypervisor. It is represented by a set of
ranges. Add a common function that parses a string with a
comma-separated set of hyphen-separated ranges like "0-7,15-16" and
returns both: the number of chosen colors, and an array containing their
ids.
Currently we support platforms with up to 128 colors.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
---
 xen/arch/arm/Kconfig                |   5 ++
 xen/arch/arm/Makefile               |   2 +-
 xen/arch/arm/coloring.c             | 131 ++++++++++++++++++++++++++++
 xen/arch/arm/include/asm/coloring.h |  28 ++++++
 4 files changed, 165 insertions(+), 1 deletion(-)
 create mode 100644 xen/arch/arm/coloring.c
 create mode 100644 xen/arch/arm/include/asm/coloring.h

diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig
index ecfa6822e4..f0f999d172 100644
--- a/xen/arch/arm/Kconfig
+++ b/xen/arch/arm/Kconfig
@@ -97,6 +97,11 @@ config HARDEN_BRANCH_PREDICTOR
 
 	  If unsure, say Y.
 
+config COLORING
+	bool "L2 cache coloring"
+	default n
+	depends on ARM_64
+
 config TEE
 	bool "Enable TEE mediators support (UNSUPPORTED)" if UNSUPPORTED
 	default n
diff --git a/xen/arch/arm/Makefile b/xen/arch/arm/Makefile
index c993ce72a3..581896a528 100644
--- a/xen/arch/arm/Makefile
+++ b/xen/arch/arm/Makefile
@@ -66,7 +66,7 @@ obj-$(CONFIG_SBSA_VUART_CONSOLE) += vpl011.o
 obj-y += vsmc.o
 obj-y += vpsci.o
 obj-y += vuart.o
-
+obj-$(CONFIG_COLORING) += coloring.o
 extra-y += xen.lds
 
 #obj-bin-y += ....o
diff --git a/xen/arch/arm/coloring.c b/xen/arch/arm/coloring.c
new file mode 100644
index 0000000000..8f1cff6efb
--- /dev/null
+++ b/xen/arch/arm/coloring.c
@@ -0,0 +1,131 @@
+/*
+ * xen/arch/arm/coloring.c
+ *
+ * Coloring support for ARM
+ *
+ * Copyright (C) 2019 Xilinx Inc.
+ *
+ * Authors:
+ *    Luca Miccio <lucmiccio@gmail.com>
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License version 2 as
+ * published by the Free Software Foundation.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program.  If not, see <http://www.gnu.org/licenses/>.
+ */
+#include <xen/init.h>
+#include <xen/types.h>
+#include <xen/lib.h>
+#include <xen/errno.h>
+#include <xen/param.h>
+#include <asm/coloring.h>
+
+/* Number of color(s) assigned to Xen */
+static uint32_t xen_col_num;
+/* Coloring configuration of Xen as bitmask */
+static uint32_t xen_col_mask[MAX_COLORS_CELLS];
+
+/* Number of color(s) assigned to Dom0 */
+static uint32_t dom0_col_num;
+/* Coloring configuration of Dom0 as bitmask */
+static uint32_t dom0_col_mask[MAX_COLORS_CELLS];
+
+static uint64_t way_size;
+
+/*************************
+ * PARSING COLORING BOOTARGS
+ */
+
+/*
+ * Parse the coloring configuration given in the buf string, following the
+ * syntax below, and store the number of colors and a corresponding mask in
+ * the last two given pointers.
+ *
+ * COLOR_CONFIGURATION ::= RANGE,...,RANGE
+ * RANGE               ::= COLOR-COLOR
+ *
+ * Example: "2-6,15-16" represents the set of colors: 2,3,4,5,6,15,16.
+ */
+static int parse_color_config(
+    const char *buf, uint32_t *col_mask, uint32_t *col_num)
+{
+    int start, end, i;
+    const char* s = buf;
+    unsigned int offset;
+
+    if ( !col_mask || !col_num )
+        return -EINVAL;
+
+    *col_num = 0;
+    for ( i = 0; i < MAX_COLORS_CELLS; i++ )
+        col_mask[i] = 0;
+
+    while ( *s != '\0' )
+    {
+        if ( *s != ',' )
+        {
+            start = simple_strtoul(s, &s, 0);
+
+            /* Ranges are hyphen-separated */
+            if ( *s != '-' )
+                goto fail;
+            s++;
+
+            end = simple_strtoul(s, &s, 0);
+
+            for ( i = start; i <= end; i++ )
+            {
+                offset = i / 32;
+                if ( offset > MAX_COLORS_CELLS )
+                    goto fail;
+
+                if ( !(col_mask[offset] & (1 << i % 32)) )
+                    *col_num += 1;
+                col_mask[offset] |= (1 << i % 32);
+            }
+        }
+        else
+            s++;
+    }
+
+    return *s ? -EINVAL : 0;
+fail:
+    return -EINVAL;
+}
+
+static int __init parse_way_size(const char *s)
+{
+    way_size = simple_strtoull(s, &s, 0);
+
+    return *s ? -EINVAL : 0;
+}
+custom_param("way_size", parse_way_size);
+
+static int __init parse_dom0_colors(const char *s)
+{
+    return parse_color_config(s, dom0_col_mask, &dom0_col_num);
+}
+custom_param("dom0_colors", parse_dom0_colors);
+
+static int __init parse_xen_colors(const char *s)
+{
+    return parse_color_config(s, xen_col_mask, &xen_col_num);
+}
+custom_param("xen_colors", parse_xen_colors);
+
+/*
+ * Local variables:
+ * mode: C
+ * c-file-style: "BSD"
+ * c-basic-offset: 4
+ * tab-width: 4
+ * indent-tabs-mode: nil
+ * End:
+ */
diff --git a/xen/arch/arm/include/asm/coloring.h b/xen/arch/arm/include/asm/coloring.h
new file mode 100644
index 0000000000..60958d1244
--- /dev/null
+++ b/xen/arch/arm/include/asm/coloring.h
@@ -0,0 +1,28 @@
+/*
+ * xen/arm/include/asm/coloring.h
+ *
+ * Coloring support for ARM
+ *
+ * Copyright (C) 2019 Xilinx Inc.
+ *
+ * Authors:
+ *    Luca Miccio <lucmiccio@gmail.com>
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License version 2 as
+ * published by the Free Software Foundation.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program.  If not, see <http://www.gnu.org/licenses/>.
+ */
+#ifndef __ASM_ARM_COLORING_H__
+#define __ASM_ARM_COLORING_H__
+
+#define MAX_COLORS_CELLS 4
+
+#endif /* !__ASM_ARM_COLORING_H__ */
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:16:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:16:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284413.483694 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCU6-0002cy-6f; Fri, 04 Mar 2022 18:16:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284413.483694; Fri, 04 Mar 2022 18:16:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCU5-0002Zt-NP; Fri, 04 Mar 2022 18:16:57 +0000
Received: by outflank-mailman (input) for mailman id 284413;
 Fri, 04 Mar 2022 17:48:00 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC24-0005R5-Kq
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:00 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 39bbb6ac-9be3-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 18:47:57 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC20-0008Pk-Ky; Fri, 04 Mar 2022 18:47:56 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 39bbb6ac-9be3-11ec-8539-5f4723681683
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>,
	Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: [PATCH 05/36] xen/arm: compute LLC way size by hardware inspection
Date: Fri,  4 Mar 2022 18:46:30 +0100
Message-Id: <20220304174701.1453977-6-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

The size of the LLC way is a crucial parameter for the cache coloring
support, since it determines the maximum number of available colors on
the platform.  This parameter can currently be retrieved only from
the way_size bootarg and it is prone to misconfiguration nullifying the
coloring mechanism and breaking cache isolation.

Add an alternative and more safe method to retrieve the way size by
directly asking the hardware, namely using CCSIDR_EL1 and CSSELR_EL1
registers.

This method has to check also if at least L2 is implemented in the
hardware since there are scenarios where only L1 cache is availble, e.g,
QEMU.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
---
 xen/arch/arm/coloring.c | 76 +++++++++++++++++++++++++++++++++++++++++
 1 file changed, 76 insertions(+)

diff --git a/xen/arch/arm/coloring.c b/xen/arch/arm/coloring.c
index 8f1cff6efb..e3d490b453 100644
--- a/xen/arch/arm/coloring.c
+++ b/xen/arch/arm/coloring.c
@@ -25,7 +25,10 @@
 #include <xen/lib.h>
 #include <xen/errno.h>
 #include <xen/param.h>
+
+#include <asm/sysregs.h>
 #include <asm/coloring.h>
+#include <asm/io.h>
 
 /* Number of color(s) assigned to Xen */
 static uint32_t xen_col_num;
@@ -39,6 +42,79 @@ static uint32_t dom0_col_mask[MAX_COLORS_CELLS];
 
 static uint64_t way_size;
 
+#define CTR_LINESIZE_MASK 0x7
+#define CTR_SIZE_SHIFT 13
+#define CTR_SIZE_MASK 0x3FFF
+#define CTR_SELECT_L2 1 << 1
+#define CTR_SELECT_L3 1 << 2
+#define CTR_CTYPEn_MASK 0x7
+#define CTR_CTYPE2_SHIFT 3
+#define CTR_CTYPE3_SHIFT 6
+#define CTR_LLC_ON 1 << 2
+#define CTR_LOC_SHIFT 24
+#define CTR_LOC_MASK 0x7
+#define CTR_LOC_L2 1 << 1
+#define CTR_LOC_NOT_IMPLEMENTED 1 << 0
+
+
+/* Return the way size of last level cache by asking the hardware */
+static uint64_t get_llc_way_size(void)
+{
+    uint32_t cache_sel = READ_SYSREG64(CSSELR_EL1);
+    uint32_t cache_global_info = READ_SYSREG64(CLIDR_EL1);
+    uint32_t cache_info;
+    uint32_t cache_line_size;
+    uint32_t cache_set_num;
+    uint32_t cache_sel_tmp;
+
+    printk(XENLOG_INFO "Get information on LLC\n");
+    printk(XENLOG_INFO "Cache CLIDR_EL1: 0x%"PRIx32"\n", cache_global_info);
+
+    /* Check if at least L2 is implemented */
+    if ( ((cache_global_info >> CTR_LOC_SHIFT) & CTR_LOC_MASK)
+        == CTR_LOC_NOT_IMPLEMENTED )
+    {
+        printk(XENLOG_ERR "ERROR: L2 Cache not implemented\n");
+        return 0;
+    }
+
+    /* Save old value of CSSELR_EL1 */
+    cache_sel_tmp = cache_sel;
+
+    /* Get LLC index */
+    if ( ((cache_global_info >> CTR_CTYPE2_SHIFT) & CTR_CTYPEn_MASK)
+        == CTR_LLC_ON )
+        cache_sel = CTR_SELECT_L2;
+    else
+        cache_sel = CTR_SELECT_L3;
+
+    printk(XENLOG_INFO "LLC selection: %u\n", cache_sel);
+    /* Select the correct LLC in CSSELR_EL1 */
+    WRITE_SYSREG64(cache_sel, CSSELR_EL1);
+
+    /* Ensure write */
+    isb();
+
+    /* Get info about the LLC */
+    cache_info = READ_SYSREG64(CCSIDR_EL1);
+
+    /* ARM TRM: (Log2(Number of bytes in cache line)) - 4. */
+    cache_line_size = 1 << ((cache_info & CTR_LINESIZE_MASK) + 4);
+    /* ARM TRM: (Number of sets in cache) - 1 */
+    cache_set_num = ((cache_info >> CTR_SIZE_SHIFT) & CTR_SIZE_MASK) + 1;
+
+    printk(XENLOG_INFO "Cache line size: %u bytes\n", cache_line_size);
+    printk(XENLOG_INFO "Cache sets num: %u\n", cache_set_num);
+
+    /* Restore value in CSSELR_EL1 */
+    WRITE_SYSREG64(cache_sel_tmp, CSSELR_EL1);
+
+    /* Ensure write */
+    isb();
+
+    return (cache_line_size * cache_set_num);
+}
+
 /*************************
  * PARSING COLORING BOOTARGS
  */
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:16:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:16:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284415.483703 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCU6-0002o5-S8; Fri, 04 Mar 2022 18:16:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284415.483703; Fri, 04 Mar 2022 18:16:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCU6-0002lQ-B5; Fri, 04 Mar 2022 18:16:58 +0000
Received: by outflank-mailman (input) for mailman id 284415;
 Fri, 04 Mar 2022 17:48:01 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC25-0005R5-Ky
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:01 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3a352594-9be3-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 18:47:58 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC21-0008Q0-Dy; Fri, 04 Mar 2022 18:47:57 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3a352594-9be3-11ec-8539-5f4723681683
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 06/36] xen/arm: add coloring basic initialization
Date: Fri,  4 Mar 2022 18:46:31 +0100
Message-Id: <20220304174701.1453977-7-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

Introduce a first and simple initialization function for the cache
coloring support. A helper function computes 'addr_col_mask', the
platform-dependent bitmask asserting the bits in memory addresses that
can be used for the coloring mechanism. This, in turn is used to
determine the total amount of available colors.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
---
 xen/arch/arm/coloring.c             | 83 +++++++++++++++++++++++++++++
 xen/arch/arm/include/asm/coloring.h |  8 +++
 xen/arch/arm/setup.c                |  4 ++
 3 files changed, 95 insertions(+)

diff --git a/xen/arch/arm/coloring.c b/xen/arch/arm/coloring.c
index e3d490b453..af75b536a7 100644
--- a/xen/arch/arm/coloring.c
+++ b/xen/arch/arm/coloring.c
@@ -39,8 +39,13 @@ static uint32_t xen_col_mask[MAX_COLORS_CELLS];
 static uint32_t dom0_col_num;
 /* Coloring configuration of Dom0 as bitmask */
 static uint32_t dom0_col_mask[MAX_COLORS_CELLS];
+/* Maximum number of available color(s) */
+static uint32_t max_col_num;
+/* Maximum available coloring configuration as bitmask */
+static uint32_t max_col_mask[MAX_COLORS_CELLS];
 
 static uint64_t way_size;
+static uint64_t addr_col_mask;
 
 #define CTR_LINESIZE_MASK 0x7
 #define CTR_SIZE_SHIFT 13
@@ -115,6 +120,84 @@ static uint64_t get_llc_way_size(void)
     return (cache_line_size * cache_set_num);
 }
 
+/*
+ * Return the coloring mask based on the value of @param llc_way_size.
+ * This mask represents the bits in the address that can be used
+ * for defining available colors.
+ *
+ * @param llc_way_size		Last level cache way size.
+ * @return unsigned long	The coloring bitmask.
+ */
+static __init uint64_t calculate_addr_col_mask(uint64_t llc_way_size)
+{
+    uint64_t addr_col_mask = 0;
+    unsigned int i;
+    unsigned int low_idx, high_idx;
+
+    low_idx = PAGE_SHIFT;
+    high_idx = get_count_order(llc_way_size) - 1;
+
+    for ( i = low_idx; i <= high_idx; i++ )
+        addr_col_mask |= (1 << i);
+
+    return addr_col_mask;
+}
+
+bool __init coloring_init(void)
+{
+    int i;
+
+    printk(XENLOG_INFO "Initialize XEN coloring: \n");
+    /*
+     * If the way size is not provided by the configuration, try to get
+     * this information from hardware.
+     */
+    if ( !way_size )
+    {
+        way_size = get_llc_way_size();
+
+        if ( !way_size )
+        {
+            printk(XENLOG_ERR "ERROR: way size is null\n");
+            return false;
+        }
+    }
+
+    addr_col_mask = calculate_addr_col_mask(way_size);
+    if ( !addr_col_mask )
+    {
+        printk(XENLOG_ERR "ERROR: addr_col_mask is null\n");
+        return false;
+    }
+
+    max_col_num = ((addr_col_mask >> PAGE_SHIFT) + 1);
+
+   /*
+    * If the user or the platform itself provide a way_size
+    * configuration that corresponds to a number of max.
+    * colors greater than the one we support, we cannot
+    * continue. So the check on offset value is necessary.
+    */
+    if ( max_col_num > 32 * MAX_COLORS_CELLS )
+    {
+        printk(XENLOG_ERR "ERROR: max. color value not supported\n");
+        return false;
+    }
+
+    for ( i = 0; i < max_col_num; i++ )
+    {
+        unsigned int offset = i / 32;
+
+        max_col_mask[offset] |= (1 << i % 32);
+    }
+
+    printk(XENLOG_INFO "Way size: 0x%"PRIx64"\n", way_size);
+    printk(XENLOG_INFO "Color bits in address: 0x%"PRIx64"\n", addr_col_mask);
+    printk(XENLOG_INFO "Max number of colors: %u\n", max_col_num);
+
+    return true;
+}
+
 /*************************
  * PARSING COLORING BOOTARGS
  */
diff --git a/xen/arch/arm/include/asm/coloring.h b/xen/arch/arm/include/asm/coloring.h
index 60958d1244..70e1dbd09b 100644
--- a/xen/arch/arm/include/asm/coloring.h
+++ b/xen/arch/arm/include/asm/coloring.h
@@ -25,4 +25,12 @@
 
 #define MAX_COLORS_CELLS 4
 
+#ifdef CONFIG_COLORING
+bool __init coloring_init(void);
+#else /* !CONFIG_COLORING */
+static inline bool __init coloring_init(void)
+{
+    return true;
+}
+#endif /* CONFIG_COLORING */
 #endif /* !__ASM_ARM_COLORING_H__ */
diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c
index b8d4f50d90..f39c62ea70 100644
--- a/xen/arch/arm/setup.c
+++ b/xen/arch/arm/setup.c
@@ -53,6 +53,7 @@
 #include <asm/setup.h>
 #include <xsm/xsm.h>
 #include <asm/acpi.h>
+#include <asm/coloring.h>
 
 struct bootinfo __initdata bootinfo;
 
@@ -893,6 +894,9 @@ void __init start_xen(unsigned long boot_phys_offset,
     printk("Command line: %s\n", cmdline);
     cmdline_parse(cmdline);
 
+    if ( !coloring_init() )
+        panic("Xen Coloring support: setup failed\n");
+
     /* Register Xen's load address as a boot module. */
     xen_bootmodule = add_boot_module(BOOTMOD_XEN, xen_paddr,
                              (paddr_t)(uintptr_t)(_end - _start + 1), false);
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284416.483714 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCU7-00036z-Uf; Fri, 04 Mar 2022 18:16:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284416.483714; Fri, 04 Mar 2022 18:16:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCU7-00031O-2M; Fri, 04 Mar 2022 18:16:59 +0000
Received: by outflank-mailman (input) for mailman id 284416;
 Fri, 04 Mar 2022 17:48:02 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC26-0005R4-GX
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:02 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 3c7d6c1b-9be3-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 18:48:01 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC24-0008S3-TQ; Fri, 04 Mar 2022 18:48:01 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3c7d6c1b-9be3-11ec-8eba-a37418f5ba1a
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>,
	Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: [PATCH 11/36] xen/include: define hypercall parameter for coloring
Date: Fri,  4 Mar 2022 18:46:36 +0100
Message-Id: <20220304174701.1453977-12-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

During domU creation process the colors selection has to be passed to
the Xen hypercall.
This is generally done using what Xen calls GUEST_HANDLE_PARAMS. In this
case a simple bitmask for the coloring configuration suffices.
Currently the maximum amount of supported colors is 128.
Add a new parameter that allows us to pass both the colors bitmask
and the number of elements in it.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
---
 xen/arch/arm/include/asm/coloring.h | 2 --
 xen/include/public/arch-arm.h       | 8 ++++++++
 2 files changed, 8 insertions(+), 2 deletions(-)

diff --git a/xen/arch/arm/include/asm/coloring.h b/xen/arch/arm/include/asm/coloring.h
index fdd46448d7..1f7e0dde79 100644
--- a/xen/arch/arm/include/asm/coloring.h
+++ b/xen/arch/arm/include/asm/coloring.h
@@ -23,8 +23,6 @@
 #ifndef __ASM_ARM_COLORING_H__
 #define __ASM_ARM_COLORING_H__
 
-#define MAX_COLORS_CELLS 4
-
 #ifdef CONFIG_COLORING
 #include <xen/sched.h>
 
diff --git a/xen/include/public/arch-arm.h b/xen/include/public/arch-arm.h
index 94b31511dd..627cc42164 100644
--- a/xen/include/public/arch-arm.h
+++ b/xen/include/public/arch-arm.h
@@ -303,6 +303,12 @@ struct vcpu_guest_context {
 typedef struct vcpu_guest_context vcpu_guest_context_t;
 DEFINE_XEN_GUEST_HANDLE(vcpu_guest_context_t);
 
+#define MAX_COLORS_CELLS 4
+struct color_guest_config {
+    uint32_t max_colors;
+    uint32_t colors[MAX_COLORS_CELLS];
+};
+
 /*
  * struct xen_arch_domainconfig's ABI is covered by
  * XEN_DOMCTL_INTERFACE_VERSION.
@@ -335,6 +341,8 @@ struct xen_arch_domainconfig {
      *
      */
     uint32_t clock_frequency;
+    /* IN */
+    struct color_guest_config colors;
 };
 #endif /* __XEN__ || __XEN_TOOLS__ */
 
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284418.483726 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCU8-0003Ny-RN; Fri, 04 Mar 2022 18:17:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284418.483726; Fri, 04 Mar 2022 18:17:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCU8-0003KH-87; Fri, 04 Mar 2022 18:17:00 +0000
Received: by outflank-mailman (input) for mailman id 284418;
 Fri, 04 Mar 2022 17:48:02 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC26-0005R5-L6
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:02 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3a9a258e-9be3-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 18:47:58 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC22-0008QK-5S; Fri, 04 Mar 2022 18:47:58 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3a9a258e-9be3-11ec-8539-5f4723681683
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 07/36] xen/arm: add coloring data to domains
Date: Fri,  4 Mar 2022 18:46:32 +0100
Message-Id: <20220304174701.1453977-8-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

We want to be able to associate an assignment of cache colors to each
domain.  Add a configurable-length array containing a set of color
indices in the domain data.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
---
 xen/include/xen/sched.h | 4 ++++
 1 file changed, 4 insertions(+)

diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
index 10ea969c7a..bfbe72b3ea 100644
--- a/xen/include/xen/sched.h
+++ b/xen/include/xen/sched.h
@@ -388,6 +388,10 @@ struct domain
     atomic_t         shr_pages;         /* shared pages */
     atomic_t         paged_pages;       /* paged-out pages */
 
+    /* Coloring. */
+    uint32_t        *colors;
+    uint32_t        max_colors;
+
     /* Scheduling. */
     void            *sched_priv;    /* scheduler-specific data */
     struct sched_unit *sched_unit_list;
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284419.483738 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUA-0003fI-2Q; Fri, 04 Mar 2022 18:17:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284419.483738; Fri, 04 Mar 2022 18:17:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCU9-0003by-1h; Fri, 04 Mar 2022 18:17:01 +0000
Received: by outflank-mailman (input) for mailman id 284419;
 Fri, 04 Mar 2022 17:48:03 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC27-0005R4-GZ
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:03 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 3ced96da-9be3-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 18:48:02 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC25-0008Sl-Vu; Fri, 04 Mar 2022 18:48:02 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3ced96da-9be3-11ec-8eba-a37418f5ba1a
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 12/36] xen/arm: initialize cache coloring data for Dom0/U
Date: Fri,  4 Mar 2022 18:46:37 +0100
Message-Id: <20220304174701.1453977-13-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

Initialize cache coloring configuration during domain creation. If no
colors assignment is provided by the user, use the default one.
The default configuration is the one assigned to Dom0. The latter is
configured as a standard domain with default configuration.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
---
 xen/arch/arm/domain.c       | 53 +++++++++++++++++++++++++++++++++++++
 xen/arch/arm/domain_build.c |  5 +++-
 2 files changed, 57 insertions(+), 1 deletion(-)

diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
index 8110c1df86..33471b3c58 100644
--- a/xen/arch/arm/domain.c
+++ b/xen/arch/arm/domain.c
@@ -38,6 +38,7 @@
 #include <asm/vfp.h>
 #include <asm/vgic.h>
 #include <asm/vtimer.h>
+#include <asm/coloring.h>
 
 #include "vpci.h"
 #include "vuart.h"
@@ -782,6 +783,58 @@ int arch_domain_create(struct domain *d,
     if ( (rc = domain_vpci_init(d)) != 0 )
         goto fail;
 
+    d->max_colors = 0;
+#ifdef CONFIG_COLORING
+    /* Setup domain colors */
+    if ( !config->arch.colors.max_colors )
+    {
+        if ( !is_hardware_domain(d) )
+            printk(XENLOG_INFO "Color configuration not found for dom%u, using default\n",
+                   d->domain_id);
+        d->colors = setup_default_colors(&d->max_colors);
+        if ( !d->colors )
+        {
+            rc = -ENOMEM;
+            printk(XENLOG_ERR "Color array allocation failed for dom%u\n",
+                   d->domain_id);
+            goto fail;
+        }
+    }
+    else
+    {
+        int i, k;
+
+        d->colors = xzalloc_array(uint32_t, config->arch.colors.max_colors);
+        if ( !d->colors )
+        {
+            rc = -ENOMEM;
+            printk(XENLOG_ERR "Failed to alloc colors for dom%u\n",
+                   d->domain_id);
+            goto fail;
+        }
+
+        d->max_colors = config->arch.colors.max_colors;
+        for ( i = 0, k = 0;
+              k < d->max_colors && i < sizeof(config->arch.colors.colors) * 8;
+              i++ )
+        {
+            if ( config->arch.colors.colors[i / 32] & (1 << (i % 32)) )
+                d->colors[k++] = i;
+        }
+    }
+
+    printk("Dom%u colors: [ ", d->domain_id);
+    for ( int i = 0; i < d->max_colors; i++ )
+        printk("%u ", d->colors[i]);
+    printk("]\n");
+
+    if ( !check_domain_colors(d) )
+    {
+        rc = -EINVAL;
+        printk(XENLOG_ERR "Failed to check colors for dom%u\n", d->domain_id);
+        goto fail;
+    }
+#endif
     return 0;
 
 fail:
diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index 8be01678de..9630d00066 100644
--- a/xen/arch/arm/domain_build.c
+++ b/xen/arch/arm/domain_build.c
@@ -3344,7 +3344,10 @@ void __init create_dom0(void)
         printk(XENLOG_WARNING "Maximum number of vGIC IRQs exceeded.\n");
     dom0_cfg.arch.tee_type = tee_get_type();
     dom0_cfg.max_vcpus = dom0_max_vcpus();
-
+#ifdef CONFIG_COLORING
+    /* Colors are set after domain_create */
+    dom0_cfg.arch.colors.max_colors = 0;
+#endif
     if ( iommu_enabled )
         dom0_cfg.flags |= XEN_DOMCTL_CDF_iommu;
 
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284420.483747 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUB-00040m-7I; Fri, 04 Mar 2022 18:17:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284420.483747; Fri, 04 Mar 2022 18:17:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUA-0003t6-CA; Fri, 04 Mar 2022 18:17:02 +0000
Received: by outflank-mailman (input) for mailman id 284420;
 Fri, 04 Mar 2022 17:48:03 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC27-0005R5-LE
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:03 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3aff2d0f-9be3-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 18:47:59 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC22-0008Qf-R4; Fri, 04 Mar 2022 18:47:58 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3aff2d0f-9be3-11ec-8539-5f4723681683
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 08/36] xen/arm: add colored flag to page struct
Date: Fri,  4 Mar 2022 18:46:33 +0100
Message-Id: <20220304174701.1453977-9-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

A new allocator enforcing a cache-coloring configuration is going to be
introduced.  We thus need to distinguish the memory pages assigned to,
and managed by, such colored allocator from the ordinary buddy
allocator's ones.  Add a color flag to the page structure.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
---
 xen/arch/arm/include/asm/mm.h | 4 ++++
 1 file changed, 4 insertions(+)

diff --git a/xen/arch/arm/include/asm/mm.h b/xen/arch/arm/include/asm/mm.h
index 487be7cf59..9ac1767595 100644
--- a/xen/arch/arm/include/asm/mm.h
+++ b/xen/arch/arm/include/asm/mm.h
@@ -88,6 +88,10 @@ struct page_info
          */
         u32 tlbflush_timestamp;
     };
+
+    /* Is page managed by the cache-colored allocator? */
+    bool colored;
+
     u64 pad;
 };
 
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284422.483757 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUC-0004Hv-5a; Fri, 04 Mar 2022 18:17:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284422.483757; Fri, 04 Mar 2022 18:17:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUB-0004Df-IL; Fri, 04 Mar 2022 18:17:03 +0000
Received: by outflank-mailman (input) for mailman id 284422;
 Fri, 04 Mar 2022 17:48:04 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC28-0005R5-LJ
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:04 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3b6e7c23-9be3-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 18:48:00 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC23-0008R5-Fw; Fri, 04 Mar 2022 18:47:59 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3b6e7c23-9be3-11ec-8539-5f4723681683
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 09/36] xen/arch: add default colors selection function
Date: Fri,  4 Mar 2022 18:46:34 +0100
Message-Id: <20220304174701.1453977-10-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

When cache coloring support is enabled, a color assignment is needed for
every domain. Introduce a function computing a default configuration
with a safe and common value -- the dom0 color selection.

Do not access directly the array of color indices of dom0. Instead make
use of the dom0 color configuration as a bitmask.
Add a helper function that converts the color configuration bitmask into
the indices array.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
---
 xen/arch/arm/coloring.c             | 36 +++++++++++++++++++++++++++++
 xen/arch/arm/include/asm/coloring.h |  7 ++++++
 2 files changed, 43 insertions(+)

diff --git a/xen/arch/arm/coloring.c b/xen/arch/arm/coloring.c
index af75b536a7..f6e6d09477 100644
--- a/xen/arch/arm/coloring.c
+++ b/xen/arch/arm/coloring.c
@@ -143,6 +143,42 @@ static __init uint64_t calculate_addr_col_mask(uint64_t llc_way_size)
     return addr_col_mask;
 }
 
+static int copy_mask_to_list(
+    uint32_t *col_mask, uint32_t *col_list, uint64_t col_num)
+{
+    unsigned int i, k, c;
+
+    if ( !col_list )
+        return -EINVAL;
+
+    for ( i = 0, k = 0; i < MAX_COLORS_CELLS; i++ )
+        for ( c = 0; k < col_num && c < 32; c++ )
+            if ( col_mask[i] & (1 << (c + (i*32))) )
+                col_list[k++] = c + (i * 32);
+
+    return 0;
+}
+
+uint32_t *setup_default_colors(uint32_t *col_num)
+{
+    uint32_t *col_list;
+
+    if ( dom0_col_num )
+    {
+        *col_num = dom0_col_num;
+        col_list = xzalloc_array(uint32_t, dom0_col_num);
+        if ( !col_list )
+        {
+            printk(XENLOG_ERR "setup_default_colors: Alloc failed\n");
+            return NULL;
+        }
+        copy_mask_to_list(dom0_col_mask, col_list, dom0_col_num);
+        return col_list;
+    }
+
+    return NULL;
+}
+
 bool __init coloring_init(void)
 {
     int i;
diff --git a/xen/arch/arm/include/asm/coloring.h b/xen/arch/arm/include/asm/coloring.h
index 70e1dbd09b..8f24acf082 100644
--- a/xen/arch/arm/include/asm/coloring.h
+++ b/xen/arch/arm/include/asm/coloring.h
@@ -27,6 +27,13 @@
 
 #ifdef CONFIG_COLORING
 bool __init coloring_init(void);
+
+/*
+ * Return an array with default colors selection and store the number of
+ * colors in @param col_num. The array selection will be equal to the dom0
+ * color configuration.
+ */
+uint32_t *setup_default_colors(uint32_t *col_num);
 #else /* !CONFIG_COLORING */
 static inline bool __init coloring_init(void)
 {
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284425.483769 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUD-0004ZK-RS; Fri, 04 Mar 2022 18:17:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284425.483769; Fri, 04 Mar 2022 18:17:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUC-0004Vu-Mq; Fri, 04 Mar 2022 18:17:04 +0000
Received: by outflank-mailman (input) for mailman id 284425;
 Fri, 04 Mar 2022 17:48:05 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC29-0005R5-LP
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:05 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3bd73a6b-9be3-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 18:48:00 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC24-0008Rc-7e; Fri, 04 Mar 2022 18:48:00 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3bd73a6b-9be3-11ec-8539-5f4723681683
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 10/36] xen/arch: check color selection function
Date: Fri,  4 Mar 2022 18:46:35 +0100
Message-Id: <20220304174701.1453977-11-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

Dom0 color configuration is parsed in the Xen command line. Add an
helper function to check the user selection. If no configuration is
provided by the user, all the available colors supported by the
hardware will be assigned to dom0.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
---
 xen/arch/arm/coloring.c             | 17 +++++++++++++++++
 xen/arch/arm/include/asm/coloring.h |  8 ++++++++
 2 files changed, 25 insertions(+)

diff --git a/xen/arch/arm/coloring.c b/xen/arch/arm/coloring.c
index f6e6d09477..382d558021 100644
--- a/xen/arch/arm/coloring.c
+++ b/xen/arch/arm/coloring.c
@@ -179,6 +179,23 @@ uint32_t *setup_default_colors(uint32_t *col_num)
     return NULL;
 }
 
+bool check_domain_colors(struct domain *d)
+{
+    int i;
+    bool ret = false;
+
+    if ( !d )
+        return ret;
+
+    if ( d->max_colors > max_col_num )
+        return ret;
+
+    for ( i = 0; i < d->max_colors; i++ )
+        ret |= (d->colors[i] > (max_col_num - 1));
+
+    return !ret;
+}
+
 bool __init coloring_init(void)
 {
     int i;
diff --git a/xen/arch/arm/include/asm/coloring.h b/xen/arch/arm/include/asm/coloring.h
index 8f24acf082..fdd46448d7 100644
--- a/xen/arch/arm/include/asm/coloring.h
+++ b/xen/arch/arm/include/asm/coloring.h
@@ -26,8 +26,16 @@
 #define MAX_COLORS_CELLS 4
 
 #ifdef CONFIG_COLORING
+#include <xen/sched.h>
+
 bool __init coloring_init(void);
 
+/*
+ * Check colors of a given domain.
+ * Return true if check passed, false otherwise.
+ */
+bool check_domain_colors(struct domain *d);
+
 /*
  * Return an array with default colors selection and store the number of
  * colors in @param col_num. The array selection will be equal to the dom0
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284428.483776 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUF-0004s2-2o; Fri, 04 Mar 2022 18:17:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284428.483776; Fri, 04 Mar 2022 18:17:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUE-0004kL-2p; Fri, 04 Mar 2022 18:17:06 +0000
Received: by outflank-mailman (input) for mailman id 284428;
 Fri, 04 Mar 2022 17:48:06 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC29-0005R4-OD
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:05 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 3e5b054b-9be3-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 18:48:05 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC28-0008UZ-AX; Fri, 04 Mar 2022 18:48:04 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3e5b054b-9be3-11ec-8eba-a37418f5ba1a
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>,
	Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: [PATCH 15/36] tools: add support for cache coloring configuration
Date: Fri,  4 Mar 2022 18:46:40 +0100
Message-Id: <20220304174701.1453977-16-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

Add a new "colors" parameter that defines the color assignment for a
domain. The user can specify one or more color ranges using the same
syntax as the command line color selection (e.g. 0-4).
The parameter is defined as a list of strings that represent the
color ranges.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
---
 tools/libs/light/libxl_arm.c     | 11 ++++++
 tools/libs/light/libxl_types.idl |  1 +
 tools/xl/xl_parse.c              | 59 ++++++++++++++++++++++++++++++--
 3 files changed, 69 insertions(+), 2 deletions(-)

diff --git a/tools/libs/light/libxl_arm.c b/tools/libs/light/libxl_arm.c
index eef1de0939..8944b250d9 100644
--- a/tools/libs/light/libxl_arm.c
+++ b/tools/libs/light/libxl_arm.c
@@ -101,6 +101,17 @@ int libxl__arch_domain_prepare_config(libxl__gc *gc,
         return ERROR_FAIL;
     }
 
+    config->arch.colors.max_colors = d_config->b_info.num_colors;
+    for (i = 0; i < sizeof(config->arch.colors.colors) / 4; i++)
+        config->arch.colors.colors[i] = 0;
+    for (i = 0; i < d_config->b_info.num_colors; i++) {
+        unsigned int j = d_config->b_info.colors[i] / 32;
+        if (j > sizeof(config->arch.colors.colors) / 4)
+            return ERROR_FAIL;
+        config->arch.colors.colors[j] |= (1 << (d_config->b_info.colors[i] % 32));
+    }
+    LOG(DEBUG, "Setup domain colors");
+
     return 0;
 }
 
diff --git a/tools/libs/light/libxl_types.idl b/tools/libs/light/libxl_types.idl
index 2a42da2f7d..2a39012369 100644
--- a/tools/libs/light/libxl_types.idl
+++ b/tools/libs/light/libxl_types.idl
@@ -545,6 +545,7 @@ libxl_domain_build_info = Struct("domain_build_info",[
     ("ioports",          Array(libxl_ioport_range, "num_ioports")),
     ("irqs",             Array(uint32, "num_irqs")),
     ("iomem",            Array(libxl_iomem_range, "num_iomem")),
+    ("colors",           Array(uint32, "num_colors")),
     ("claim_mode",	     libxl_defbool),
     ("event_channels",   uint32),
     ("kernel",           string),
diff --git a/tools/xl/xl_parse.c b/tools/xl/xl_parse.c
index 117fcdcb2b..9b6ab1c2e4 100644
--- a/tools/xl/xl_parse.c
+++ b/tools/xl/xl_parse.c
@@ -1216,8 +1216,9 @@ void parse_config_data(const char *config_source,
     XLU_ConfigList *cpus, *vbds, *nics, *pcis, *cvfbs, *cpuids, *vtpms,
                    *usbctrls, *usbdevs, *p9devs, *vdispls, *pvcallsifs_devs;
     XLU_ConfigList *channels, *ioports, *irqs, *iomem, *viridian, *dtdevs,
-                   *mca_caps;
-    int num_ioports, num_irqs, num_iomem, num_cpus, num_viridian, num_mca_caps;
+                   *mca_caps, *colors;
+    int num_ioports, num_irqs, num_iomem, num_cpus, num_viridian, num_mca_caps,
+                    num_colors;
     int pci_power_mgmt = 0;
     int pci_msitranslate = 0;
     int pci_permissive = 0;
@@ -1366,6 +1367,60 @@ void parse_config_data(const char *config_source,
     if (!xlu_cfg_get_long (config, "maxmem", &l, 0))
         b_info->max_memkb = l * 1024;
 
+    if (!xlu_cfg_get_list(config, "colors", &colors, &num_colors, 0)) {
+        int ret, k, p, cur_index;
+
+        b_info->num_colors = 0;
+        /* Get number of colors based on ranges */
+        for (i = 0; i < num_colors; i++) {
+            uint32_t start, end;
+
+            buf = xlu_cfg_get_listitem (colors, i);
+            if (!buf) {
+                fprintf(stderr,
+                    "xl: Unable to get element %d in colors range list\n", i);
+                exit(1);
+            }
+
+            ret = sscanf(buf, "%u-%u", &start, &end);
+            if (ret < 2) {
+                fprintf(stderr,
+                    "xl: Invalid argument parsing colors range: %s\n", buf);
+                exit(1);
+            }
+
+            if (start > end) {
+                fprintf(stderr,
+                    "xl: invalid range: S:%u > E:%u \n", start,end);
+                exit(1);
+            }
+
+            /*
+             * Alloc a first array and then increase its size with realloc based
+             * on the number of ranges
+             */
+
+            /* Check for overlaps */
+            for (k = start; k <= end; k++) {
+                 for (p = 0; p < b_info->num_colors; p++)
+                    if(b_info->colors[p] == k) {
+                        fprintf(stderr,
+                            "xl: overlapped ranges not allowed\n");
+                        exit(1);
+                    }
+            }
+
+            cur_index = b_info->num_colors;
+            b_info->num_colors += (end - start) + 1;
+            b_info->colors = (uint32_t *)realloc(b_info->colors,
+                             sizeof(*b_info->colors) * b_info->num_colors);
+
+            for (k = start; cur_index < b_info->num_colors;
+                cur_index++, k++)
+                b_info->colors[cur_index] = k;
+        }
+    }
+
     if (!xlu_cfg_get_long (config, "vcpus", &l, 0)) {
         vcpus = l;
         if (libxl_cpu_bitmap_alloc(ctx, &b_info->avail_vcpus, l)) {
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284429.483786 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUH-0005Fn-Ot; Fri, 04 Mar 2022 18:17:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284429.483786; Fri, 04 Mar 2022 18:17:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUF-00056s-Ut; Fri, 04 Mar 2022 18:17:07 +0000
Received: by outflank-mailman (input) for mailman id 284429;
 Fri, 04 Mar 2022 17:48:06 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC2A-0005R4-Aw
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:06 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 3ec47c14-9be3-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 18:48:05 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC29-0008V5-3U; Fri, 04 Mar 2022 18:48:05 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3ec47c14-9be3-11ec-8eba-a37418f5ba1a
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 16/36] xen/color alloc: implement color_from_page for ARM64
Date: Fri,  4 Mar 2022 18:46:41 +0100
Message-Id: <20220304174701.1453977-17-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

The colored allocator should not make any assumptions on how a color is
defined, since the definition may change depending on the architecture.
Use a generic function "color_from_page" that returns the color id based
on the page address.
Add a definition for ARMv8 architectures.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
---
 xen/arch/arm/coloring.c             | 13 +++++++++++++
 xen/arch/arm/include/asm/coloring.h |  7 +++++++
 2 files changed, 20 insertions(+)

diff --git a/xen/arch/arm/coloring.c b/xen/arch/arm/coloring.c
index 8061c3824f..4748d717d6 100644
--- a/xen/arch/arm/coloring.c
+++ b/xen/arch/arm/coloring.c
@@ -196,6 +196,19 @@ bool check_domain_colors(struct domain *d)
     return !ret;
 }
 
+/*
+ * Compute color id from the page @param pg.
+ * Page size determines the lowest available bit, while add_col_mask is used to
+ * select the rest.
+ *
+ * @param pg              Page address
+ * @return unsigned long  Color id
+ */
+unsigned long color_from_page(struct page_info *pg)
+{
+  return ((addr_col_mask & page_to_maddr(pg)) >> PAGE_SHIFT);
+}
+
 bool __init coloring_init(void)
 {
     int i;
diff --git a/xen/arch/arm/include/asm/coloring.h b/xen/arch/arm/include/asm/coloring.h
index 8609e17e80..318e2a4521 100644
--- a/xen/arch/arm/include/asm/coloring.h
+++ b/xen/arch/arm/include/asm/coloring.h
@@ -42,6 +42,13 @@ bool check_domain_colors(struct domain *d);
 uint32_t *setup_default_colors(uint32_t *col_num);
 
 void coloring_dump_info(struct domain *d);
+
+/*
+ * Compute the color of the given page address.
+ * This function should change depending on the cache architecture
+ * specifications.
+ */
+unsigned long color_from_page(struct page_info *pg);
 #else /* !CONFIG_COLORING */
 static inline bool __init coloring_init(void)
 {
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284431.483795 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUK-0005fH-8f; Fri, 04 Mar 2022 18:17:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284431.483795; Fri, 04 Mar 2022 18:17:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUI-0005X5-HO; Fri, 04 Mar 2022 18:17:10 +0000
Received: by outflank-mailman (input) for mailman id 284431;
 Fri, 04 Mar 2022 17:48:07 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC2B-0005R4-3U
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:07 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 3f3a46a0-9be3-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 18:48:06 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC29-0008Vu-QC; Fri, 04 Mar 2022 18:48:06 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3f3a46a0-9be3-11ec-8eba-a37418f5ba1a
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 17/36] xen/arm: add get_max_color function
Date: Fri,  4 Mar 2022 18:46:42 +0100
Message-Id: <20220304174701.1453977-18-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

In order to initialize the colored allocator data structure, the maximum
amount of colors defined by the hardware has to be know.
Add a helper function that returns this information.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
---
 xen/arch/arm/coloring.c             | 5 +++++
 xen/arch/arm/include/asm/coloring.h | 8 ++++++++
 2 files changed, 13 insertions(+)

diff --git a/xen/arch/arm/coloring.c b/xen/arch/arm/coloring.c
index 4748d717d6..d1ac193a80 100644
--- a/xen/arch/arm/coloring.c
+++ b/xen/arch/arm/coloring.c
@@ -209,6 +209,11 @@ unsigned long color_from_page(struct page_info *pg)
   return ((addr_col_mask & page_to_maddr(pg)) >> PAGE_SHIFT);
 }
 
+uint32_t get_max_colors(void)
+{
+    return max_col_num;
+}
+
 bool __init coloring_init(void)
 {
     int i;
diff --git a/xen/arch/arm/include/asm/coloring.h b/xen/arch/arm/include/asm/coloring.h
index 318e2a4521..22e67dc9d8 100644
--- a/xen/arch/arm/include/asm/coloring.h
+++ b/xen/arch/arm/include/asm/coloring.h
@@ -49,6 +49,9 @@ void coloring_dump_info(struct domain *d);
  * specifications.
  */
 unsigned long color_from_page(struct page_info *pg);
+
+/* Return the maximum available number of colors supported by the hardware */
+uint32_t get_max_colors(void);
 #else /* !CONFIG_COLORING */
 static inline bool __init coloring_init(void)
 {
@@ -59,5 +62,10 @@ static inline void coloring_dump_info(struct domain *d)
 {
     return;
 }
+
+static inline uint32_t get_max_colors(void)
+{
+    return 0;
+}
 #endif /* CONFIG_COLORING */
 #endif /* !__ASM_ARM_COLORING_H__ */
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284436.483806 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUN-00067h-3q; Fri, 04 Mar 2022 18:17:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284436.483806; Fri, 04 Mar 2022 18:17:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUK-0005w8-R7; Fri, 04 Mar 2022 18:17:12 +0000
Received: by outflank-mailman (input) for mailman id 284436;
 Fri, 04 Mar 2022 17:48:11 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC2E-0005R4-RQ
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:10 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4168c134-9be3-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 18:48:10 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC2D-00007P-6W; Fri, 04 Mar 2022 18:48:09 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4168c134-9be3-11ec-8eba-a37418f5ba1a
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>,
	Luca Miccio <206497@studenti.unimore.it>,
	Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: [PATCH 21/36] xen/common: add colored allocator initialization
Date: Fri,  4 Mar 2022 18:46:46 +0100
Message-Id: <20220304174701.1453977-22-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

Initialize colored heap and allocator data structures. It is assumed
that pages are given to the init function is in ascending order. To
ensure that, pages are retrieved from bootmem_regions starting from the
first one. Moreover, this allows quickly insertion of freed pages into
the colored allocator's internal data structures -- sorted lists.
If coloring is disabled, changing the free page order should not affect
both performance and functionalities of the buddy allocator.

Do not allocate Dom0 memory with direct mapping if colored is enabled.

Signed-off-by: Luca Miccio <206497@studenti.unimore.it>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
---
 xen/arch/arm/domain_build.c |  7 +++++-
 xen/common/page_alloc.c     | 43 +++++++++++++++++++++++++++++++------
 2 files changed, 42 insertions(+), 8 deletions(-)

diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index 9630d00066..03a2573d67 100644
--- a/xen/arch/arm/domain_build.c
+++ b/xen/arch/arm/domain_build.c
@@ -3292,7 +3292,12 @@ static int __init construct_dom0(struct domain *d)
     /* type must be set before allocate_memory */
     d->arch.type = kinfo.type;
 #endif
-    allocate_memory_11(d, &kinfo);
+#ifdef CONFIG_COLORING
+    if ( d->max_colors )
+        allocate_memory(d, &kinfo);
+    else
+#endif
+        allocate_memory_11(d, &kinfo);
     find_gnttab_region(d, &kinfo);
 
     /* Map extra GIC MMIO, irqs and other hw stuffs to dom0. */
diff --git a/xen/common/page_alloc.c b/xen/common/page_alloc.c
index fffa438029..dea14bc39f 100644
--- a/xen/common/page_alloc.c
+++ b/xen/common/page_alloc.c
@@ -2154,11 +2154,26 @@ void __init end_boot_allocator(void)
             break;
         }
     }
-    for ( i = nr_bootmem_regions; i-- > 0; )
+
+    for ( i = 0; i < nr_bootmem_regions; i++ )
     {
         struct bootmem_region *r = &bootmem_region_list[i];
-        if ( r->s < r->e )
-            init_heap_pages(mfn_to_page(_mfn(r->s)), r->e - r->s);
+
+        /*
+         * Find the first region that can fill the buddy allocator memory
+         * specified by buddy_required_size.
+         */
+        if ( buddy_required_size && (r->e - r->s) >
+            PFN_DOWN(buddy_required_size) )
+        {
+            init_heap_pages(mfn_to_page(_mfn(r->s)),
+                PFN_DOWN(buddy_required_size));
+
+            r->s += PFN_DOWN(buddy_required_size);
+            buddy_required_size = 0;
+        }
+
+        init_col_heap_pages(mfn_to_page(_mfn(r->s)), r->e - r->s);
     }
     nr_bootmem_regions = 0;
 
@@ -2619,9 +2634,12 @@ int assign_pages(
         page_set_owner(&pg[i], d);
         smp_wmb(); /* Domain pointer must be visible before updating refcnt. */
         pg[i].count_info =
-            (pg[i].count_info & (PGC_extra | PGC_reserved)) | PGC_allocated | 1;
+             (pg[i].count_info & (PGC_extra | PGC_reserved)) | PGC_allocated | 1;
 
-        page_list_add_tail(&pg[i], page_to_list(d, &pg[i]));
+        if ( is_page_colored(pg) )
+            page_list_add(&pg[i], page_to_list(d, &pg[i]));
+        else
+            page_list_add_tail(&pg[i], page_to_list(d, &pg[i]));
     }
 
  out:
@@ -2642,6 +2660,15 @@ struct page_info *alloc_domheap_pages(
     unsigned int bits = memflags >> _MEMF_bits, zone_hi = NR_ZONES - 1;
     unsigned int dma_zone;
 
+    /* Only Dom0 and DomUs are supported for coloring */
+    if ( d && d->max_colors > 0 )
+    {
+        /* Colored allocation must be done on 0 order */
+        if (order)
+            return NULL;
+
+        return alloc_col_domheap_page(d, memflags);
+    }
     ASSERT(!in_irq());
 
     bits = domain_clamp_alloc_bitsize(memflags & MEMF_no_owner ? NULL : d,
@@ -2761,8 +2788,10 @@ void free_domheap_pages(struct page_info *pg, unsigned int order)
             scrub = 1;
         }
 
-        free_heap_pages(pg, order, scrub);
-    }
+        if ( is_page_colored(pg) )
+            free_col_heap_page(pg);
+        else
+            free_heap_pages(pg, order, scrub);}
 
     if ( drop_dom_ref )
         put_domain(d);
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284437.483816 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUP-0006g9-NO; Fri, 04 Mar 2022 18:17:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284437.483816; Fri, 04 Mar 2022 18:17:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUN-0006Uh-Gw; Fri, 04 Mar 2022 18:17:15 +0000
Received: by outflank-mailman (input) for mailman id 284437;
 Fri, 04 Mar 2022 17:48:12 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC2G-0005R4-BY
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:12 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4253958d-9be3-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 18:48:11 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC2E-000091-Vv; Fri, 04 Mar 2022 18:48:11 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4253958d-9be3-11ec-8eba-a37418f5ba1a
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 23/36] xen/arch: coloring: manually calculate Xen physical addresses
Date: Fri,  4 Mar 2022 18:46:48 +0100
Message-Id: <20220304174701.1453977-24-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

During Xen coloring procedure, we need to manually calculate consecutive
physical addresses that conform to the color selection. Add an helper
function that does this operation. The latter will return the next
address that conforms to Xen color selection.

The next_colored function is architecture dependent and the provided
implementation is for ARMv8.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
---
 xen/arch/arm/coloring.c             | 43 +++++++++++++++++++++++++++++
 xen/arch/arm/include/asm/coloring.h | 14 ++++++++++
 2 files changed, 57 insertions(+)

diff --git a/xen/arch/arm/coloring.c b/xen/arch/arm/coloring.c
index 761414fcd7..aae3c77a7b 100644
--- a/xen/arch/arm/coloring.c
+++ b/xen/arch/arm/coloring.c
@@ -222,6 +222,49 @@ uint32_t get_max_colors(void)
     return max_col_num;
 }
 
+paddr_t next_xen_colored(paddr_t phys)
+{
+    unsigned int i;
+    unsigned int col_next_number = 0;
+    unsigned int col_cur_number = (phys & addr_col_mask) >> PAGE_SHIFT;
+    int overrun = 0;
+    paddr_t ret;
+
+    /*
+     * Check if address color conforms to Xen selection. If it does, return
+     * the address as is.
+     */
+    for( i = 0; i < xen_col_num; i++)
+        if ( col_cur_number == xen_col_list[i] )
+            return phys;
+
+    /* Find next col */
+    for( i = xen_col_num -1 ; i >= 0; i--)
+    {
+        if ( col_cur_number > xen_col_list[i])
+        {
+            /* Need to start to first element and add a way_size */
+            if ( i == (xen_col_num - 1) )
+            {
+                col_next_number = xen_col_list[0];
+                overrun = 1;
+            }
+            else
+            {
+                col_next_number = xen_col_list[i+1];
+                overrun = 0;
+            }
+            break;
+        }
+    }
+
+    /* Align phys to way_size */
+    ret = phys - (PAGE_SIZE * col_cur_number);
+    /* Add the offset based on color selection*/
+    ret += (PAGE_SIZE * (col_next_number)) + (way_size*overrun);
+    return ret;
+}
+
 bool __init coloring_init(void)
 {
     int i, rc;
diff --git a/xen/arch/arm/include/asm/coloring.h b/xen/arch/arm/include/asm/coloring.h
index 22e67dc9d8..8c4525677c 100644
--- a/xen/arch/arm/include/asm/coloring.h
+++ b/xen/arch/arm/include/asm/coloring.h
@@ -28,6 +28,20 @@
 
 bool __init coloring_init(void);
 
+/*
+ * Return physical page address that conforms to the colors selection
+ * given in col_selection_mask after @param phys.
+ *
+ * @param phys         Physical address start.
+ * @param addr_col_mask        Mask specifying the bits available for coloring.
+ * @param col_selection_mask   Mask asserting the color bits to be used,
+ * must not be 0.
+ *
+ * @return The lowest physical page address being greater or equal than
+ * 'phys' and belonging to Xen color selection
+ */
+paddr_t next_xen_colored(paddr_t phys);
+
 /*
  * Check colors of a given domain.
  * Return true if check passed, false otherwise.
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284440.483829 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUR-00078H-QN; Fri, 04 Mar 2022 18:17:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284440.483829; Fri, 04 Mar 2022 18:17:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUP-0006zY-To; Fri, 04 Mar 2022 18:17:17 +0000
Received: by outflank-mailman (input) for mailman id 284440;
 Fri, 04 Mar 2022 17:48:14 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC2I-0005R4-OZ
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:14 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 43c46fe5-9be3-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 18:48:14 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC2H-0000Av-9l; Fri, 04 Mar 2022 18:48:13 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 43c46fe5-9be3-11ec-8eba-a37418f5ba1a
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>,
	Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: [PATCH 26/36] xen/arm: add argument to remove_early_mappings
Date: Fri,  4 Mar 2022 18:46:51 +0100
Message-Id: <20220304174701.1453977-27-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

Upcoming patches will need to remove temporary mappings created during
Xen coloring process. The function remove_early_mappings does what we
need but it is case-specific. Parametrize the function to avoid code
replication.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
Acked-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
---
 xen/arch/arm/include/asm/mm.h | 2 +-
 xen/arch/arm/mm.c             | 8 ++++----
 xen/arch/arm/setup.c          | 3 ++-
 3 files changed, 7 insertions(+), 6 deletions(-)

diff --git a/xen/arch/arm/include/asm/mm.h b/xen/arch/arm/include/asm/mm.h
index 9ac1767595..041ec4ee70 100644
--- a/xen/arch/arm/include/asm/mm.h
+++ b/xen/arch/arm/include/asm/mm.h
@@ -184,7 +184,7 @@ extern void setup_pagetables(unsigned long boot_phys_offset, paddr_t xen_paddr);
 /* Map FDT in boot pagetable */
 extern void *early_fdt_map(paddr_t fdt_paddr);
 /* Remove early mappings */
-extern void remove_early_mappings(void);
+extern void remove_early_mappings(unsigned long va, unsigned long size);
 /* Allocate and initialise pagetables for a secondary CPU. Sets init_ttbr to the
  * new page table */
 extern int init_secondary_pagetables(int cpu);
diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
index fd7a313d88..d69f18b5d2 100644
--- a/xen/arch/arm/mm.c
+++ b/xen/arch/arm/mm.c
@@ -597,13 +597,13 @@ void * __init early_fdt_map(paddr_t fdt_paddr)
     return fdt_virt;
 }
 
-void __init remove_early_mappings(void)
+void __init remove_early_mappings(unsigned long va, unsigned long size)
 {
     lpae_t pte = {0};
-    write_pte(xen_second + second_table_offset(BOOT_FDT_VIRT_START), pte);
-    write_pte(xen_second + second_table_offset(BOOT_FDT_VIRT_START + SZ_2M),
+    write_pte(xen_second + second_table_offset(va), pte);
+    write_pte(xen_second + second_table_offset(va + size),
               pte);
-    flush_xen_tlb_range_va(BOOT_FDT_VIRT_START, BOOT_FDT_SLOT_SIZE);
+    flush_xen_tlb_range_va(va, size);
 }
 
 /*
diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c
index 8d980ce18d..13b10515a8 100644
--- a/xen/arch/arm/setup.c
+++ b/xen/arch/arm/setup.c
@@ -41,6 +41,7 @@
 #include <xen/libfdt/libfdt.h>
 #include <xen/acpi.h>
 #include <xen/warning.h>
+#include <xen/sizes.h>
 #include <asm/alternative.h>
 #include <asm/page.h>
 #include <asm/current.h>
@@ -426,7 +427,7 @@ void __init discard_initial_modules(void)
 
     mi->nr_mods = 0;
 
-    remove_early_mappings();
+    remove_early_mappings(BOOT_FDT_VIRT_START, SZ_2M);
 }
 
 /* Relocate the FDT in Xen heap */
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284442.483836 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUU-0007gG-9Y; Fri, 04 Mar 2022 18:17:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284442.483836; Fri, 04 Mar 2022 18:17:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUS-0007VC-9w; Fri, 04 Mar 2022 18:17:20 +0000
Received: by outflank-mailman (input) for mailman id 284442;
 Fri, 04 Mar 2022 17:48:22 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC2Q-0005R4-4d
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:22 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 47d1a459-9be3-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 18:48:20 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC2I-0000BX-6d; Fri, 04 Mar 2022 18:48:20 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 47d1a459-9be3-11ec-8eba-a37418f5ba1a
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 27/36] xen/arch: add coloring support for Xen
Date: Fri,  4 Mar 2022 18:46:52 +0100
Message-Id: <20220304174701.1453977-28-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

Introduce a new implementation of setup_pagetables that uses coloring
logic in order to isolate Xen code using its color selection.
Page tables construction is essentially copied, except for the xenmap
table, where coloring logic is needed.  Given the absence of a contiguous
physical mapping, pointers to next level tables need to be manually
calculated.

Xen code is relocated in strided mode using the same coloring logic as
the one in xenmap table by using a temporary colored mapping that will
be destroyed after switching the TTBR register.

Keep Xen text section mapped in the newly created pagetables.
The boot process relies on computing needed physical addresses of Xen
code by using a shift, but colored mapping is not linear and not easily
computable. Therefore, the old Xen code is temporarily kept and used to
boot secondary CPUs until they switch to the colored mapping, which is
accessed using the handy macro virt_old.  After the boot process, the old
Xen code memory is reset and its mapping is destroyed.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
---
 xen/arch/arm/include/asm/coloring.h |  13 ++
 xen/arch/arm/include/asm/mm.h       |   7 ++
 xen/arch/arm/mm.c                   | 186 +++++++++++++++++++++++++++-
 xen/arch/arm/psci.c                 |   4 +-
 xen/arch/arm/setup.c                |  21 +++-
 xen/arch/arm/smpboot.c              |  19 ++-
 6 files changed, 241 insertions(+), 9 deletions(-)

diff --git a/xen/arch/arm/include/asm/coloring.h b/xen/arch/arm/include/asm/coloring.h
index 8c4525677c..424f6c2b04 100644
--- a/xen/arch/arm/include/asm/coloring.h
+++ b/xen/arch/arm/include/asm/coloring.h
@@ -26,6 +26,17 @@
 #ifdef CONFIG_COLORING
 #include <xen/sched.h>
 
+/*
+ * Amount of memory that we need to map in order to color Xen.  The value
+ * depends on the maximum number of available colors of the hardware.  The
+ * memory size is pessimistically calculated assuming only one color is used,
+ * which means that any pages belonging to any other color has to be skipped.
+ */
+#define XEN_COLOR_MAP_SIZE \
+	((((_end - _start) * get_max_colors())\
+		+ (XEN_PADDR_ALIGN-1)) & ~(XEN_PADDR_ALIGN-1))
+#define XEN_COLOR_MAP_SIZE_M (XEN_COLOR_MAP_SIZE >> 20)
+
 bool __init coloring_init(void);
 
 /*
@@ -67,6 +78,8 @@ unsigned long color_from_page(struct page_info *pg);
 /* Return the maximum available number of colors supported by the hardware */
 uint32_t get_max_colors(void);
 #else /* !CONFIG_COLORING */
+#define XEN_COLOR_MAP_SIZE (_end - _start)
+
 static inline bool __init coloring_init(void)
 {
     return true;
diff --git a/xen/arch/arm/include/asm/mm.h b/xen/arch/arm/include/asm/mm.h
index 041ec4ee70..1422091436 100644
--- a/xen/arch/arm/include/asm/mm.h
+++ b/xen/arch/arm/include/asm/mm.h
@@ -362,6 +362,13 @@ void clear_and_clean_page(struct page_info *page);
 
 unsigned int arch_get_dma_bitsize(void);
 
+#ifdef CONFIG_COLORING
+#define virt_boot_xen(virt)\
+    (vaddr_t)((virt - XEN_VIRT_START) + BOOT_RELOC_VIRT_START)
+#else
+#define virt_boot_xen(virt) virt
+#endif
+
 #endif /*  __ARCH_ARM_MM__ */
 /*
  * Local variables:
diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
index d69f18b5d2..53ea13641b 100644
--- a/xen/arch/arm/mm.c
+++ b/xen/arch/arm/mm.c
@@ -42,6 +42,7 @@
 #include <xen/libfdt/libfdt.h>
 
 #include <asm/setup.h>
+#include <asm/coloring.h>
 
 /* Override macros from asm/page.h to make them work with mfn_t */
 #undef virt_to_mfn
@@ -110,6 +111,9 @@ DEFINE_BOOT_PAGE_TABLE(boot_second_id);
 DEFINE_BOOT_PAGE_TABLE(boot_third_id);
 DEFINE_BOOT_PAGE_TABLE(boot_second);
 DEFINE_BOOT_PAGE_TABLE(boot_third);
+#ifdef CONFIG_COLORING
+DEFINE_BOOT_PAGE_TABLE(boot_colored_xen);
+#endif
 
 /* Main runtime page tables */
 
@@ -632,6 +636,166 @@ static void clear_table(void *table)
     clean_and_invalidate_dcache_va_range(table, PAGE_SIZE);
 }
 
+#ifdef CONFIG_COLORING
+/*
+ * Translate a Xen (.text) virtual address to the colored physical one
+ * depending on the hypervisor configuration.
+ * N.B: this function must be used only when migrating from non colored to
+ * colored pagetables since it assumes to have the temporary mappings created
+ * during setup_pagetables that starts from BOOT_RELOC_VIRT_START.
+ * After the migration we have to use virt_to_maddr.
+ */
+static paddr_t virt_to_maddr_colored(vaddr_t virt)
+{
+    unsigned int va_offset;
+
+    va_offset = virt - XEN_VIRT_START;
+    return __pa(BOOT_RELOC_VIRT_START + va_offset);
+}
+
+static void __init coloring_temp_mappings(paddr_t xen_paddr, vaddr_t virt_start)
+{
+    int i;
+    lpae_t pte;
+    unsigned int xen_text_size = (_end - _start);
+
+    xen_text_size = PAGE_ALIGN(xen_text_size);
+
+    pte = mfn_to_xen_entry(maddr_to_mfn(__pa(boot_second)), MT_NORMAL);
+    pte.pt.table = 1;
+    boot_first[first_table_offset(virt_start)] = pte;
+
+    pte = mfn_to_xen_entry(maddr_to_mfn(__pa(boot_colored_xen)), MT_NORMAL);
+    pte.pt.table = 1;
+    boot_second[second_table_offset(virt_start)] = pte;
+
+    for ( i = 0; i < (xen_text_size/PAGE_SIZE); i++ )
+    {
+        mfn_t mfn;
+        xen_paddr = next_xen_colored(xen_paddr);
+        mfn = maddr_to_mfn(xen_paddr);
+        pte = mfn_to_xen_entry(mfn, MT_NORMAL);
+        pte.pt.table = 1; /* 4k mappings always have this bit set */
+        boot_colored_xen[i] = pte;
+        xen_paddr += PAGE_SIZE;
+    }
+
+   flush_xen_tlb_local();
+}
+
+/*
+ * Boot-time pagetable setup with coloring support
+ * Changes here may need matching changes in head.S
+ *
+ * The process can be explained as follows:
+ * - Create a temporary colored mapping that conforms to Xen color selection.
+ * - Update all the pagetables links that point to the next level table(s):
+ * this process is crucial beacause the translation tables are not physically
+ * contiguous and we cannot calculate the physical addresses by using the
+ * standard method (physical offset). In order to get the correct physical
+ * address we use virt_to_maddr_colored that translates the virtual address
+ * into a physical one based on the Xen coloring configuration.
+ * - Copy Xen to the new location.
+ * - Update TTBR0_EL2 with the new root page table address.
+ */
+void __init setup_pagetables(unsigned long boot_phys_offset, paddr_t xen_paddr)
+{
+    int i;
+    lpae_t pte, *p;
+    paddr_t pt_phys;
+    mfn_t pt_phys_mfn;
+    paddr_t _xen_paddr = xen_paddr;
+
+    phys_offset = boot_phys_offset;
+
+    ASSERT((_end - _start) < SECOND_SIZE);
+    /* Create temporary mappings */
+    coloring_temp_mappings(xen_paddr, BOOT_RELOC_VIRT_START);
+
+    /* Build pagetables links */
+    p = (void *)xen_pgtable;
+    pt_phys = virt_to_maddr_colored((vaddr_t)xen_first);
+    pt_phys_mfn = maddr_to_mfn(pt_phys);
+    p[0] = mfn_to_xen_entry(pt_phys_mfn, MT_NORMAL);
+    p[0].pt.table = 1;
+    p[0].pt.xn = 0;
+    p = (void *)xen_first;
+
+    for ( i = 0; i < 2; i++ )
+    {
+        pt_phys = virt_to_maddr_colored((vaddr_t)(xen_second + i * LPAE_ENTRIES));
+        pt_phys_mfn = maddr_to_mfn(pt_phys);
+        p[i] = mfn_to_xen_entry(pt_phys_mfn, MT_NORMAL);
+        p[i].pt.table = 1;
+        p[i].pt.xn = 0;
+    }
+
+    for ( i = 0; i < LPAE_ENTRIES; i++ )
+    {
+        mfn_t mfn;
+        vaddr_t va = XEN_VIRT_START + (i << PAGE_SHIFT);
+        _xen_paddr = next_xen_colored(_xen_paddr);
+        mfn = maddr_to_mfn(_xen_paddr);
+        if ( !is_kernel(va) )
+            break;
+        pte = mfn_to_xen_entry(mfn, MT_NORMAL);
+        pte.pt.table = 1; /* 4k mappings always have this bit set */
+        if ( is_kernel_text(va) || is_kernel_inittext(va) )
+        {
+            pte.pt.xn = 0;
+            pte.pt.ro = 1;
+        }
+        if ( is_kernel_rodata(va) )
+            pte.pt.ro = 1;
+        xen_xenmap[i] = pte;
+        _xen_paddr += PAGE_SIZE;
+    }
+
+    /* Initialise xen second level entries ... */
+    /* ... Xen's text etc */
+    pt_phys = virt_to_maddr_colored((vaddr_t)(xen_xenmap));
+    pt_phys_mfn = maddr_to_mfn(pt_phys);
+    pte = mfn_to_xen_entry(pt_phys_mfn, MT_NORMAL);
+    pte.pt.table = 1;
+    xen_second[second_table_offset(XEN_VIRT_START)] = pte;
+
+    /* ... Fixmap */
+    pt_phys = virt_to_maddr_colored((vaddr_t)(xen_fixmap));
+    pt_phys_mfn = maddr_to_mfn(pt_phys);
+    pte = mfn_to_xen_entry(pt_phys_mfn, MT_NORMAL);
+    pte.pt.table = 1;
+    xen_second[second_table_offset(FIXMAP_ADDR(0))] = pte;
+
+    /* ... DTB */
+    pte = boot_second[second_table_offset(BOOT_FDT_VIRT_START)];
+    xen_second[second_table_offset(BOOT_FDT_VIRT_START)] = pte;
+    pte = boot_second[second_table_offset(BOOT_FDT_VIRT_START + SZ_2M)];
+    xen_second[second_table_offset(BOOT_FDT_VIRT_START + SZ_2M)] = pte;
+
+    /* Update the value of init_ttbr */
+    init_ttbr = virt_to_maddr_colored((vaddr_t)xen_pgtable);
+    clean_dcache(init_ttbr);
+
+    /* Copy Xen to the new location */
+    memcpy((void*)BOOT_RELOC_VIRT_START,
+        (const void*)XEN_VIRT_START, (_end - _start));
+    clean_dcache_va_range((void*)BOOT_RELOC_VIRT_START, (_end - _start));
+
+    /* Change ttbr */
+    switch_ttbr(init_ttbr);
+
+    /*
+     * Keep mapped old Xen memory in a contiguous mapping
+     * for other cpus to boot. This mapping will also replace the
+     * one created at the beginning of setup_pagetables.
+     */
+    create_mappings(xen_second, BOOT_RELOC_VIRT_START,
+                paddr_to_pfn(XEN_VIRT_START + phys_offset),
+                SZ_2M >> PAGE_SHIFT, SZ_2M);
+
+    xen_pt_enforce_wnx();
+}
+#else
 /* Boot-time pagetable setup.
  * Changes here may need matching changes in head.S */
 void __init setup_pagetables(unsigned long boot_phys_offset, paddr_t xen_paddr)
@@ -721,6 +885,7 @@ void __init setup_pagetables(unsigned long boot_phys_offset, paddr_t xen_paddr)
     per_cpu(xen_dommap, 0) = cpu0_dommap;
 #endif
 }
+#endif /* !CONFIG_COLORING */
 
 static void clear_boot_pagetables(void)
 {
@@ -735,6 +900,9 @@ static void clear_boot_pagetables(void)
 #endif
     clear_table(boot_second);
     clear_table(boot_third);
+#ifdef CONFIG_COLORING
+    clear_table(boot_colored_xen);
+#endif
 }
 
 #ifdef CONFIG_ARM_64
@@ -742,10 +910,16 @@ int init_secondary_pagetables(int cpu)
 {
     clear_boot_pagetables();
 
+    /*
+     * For coloring the value of the ttbr was already set up during
+     * setup_pagetables.
+     */
+#ifndef CONFIG_COLORING
     /* Set init_ttbr for this CPU coming up. All CPus share a single setof
      * pagetables, but rewrite it each time for consistency with 32 bit. */
     init_ttbr = (uintptr_t) xen_pgtable + phys_offset;
     clean_dcache(init_ttbr);
+#endif
     return 0;
 }
 #else
@@ -859,12 +1033,20 @@ void __init setup_xenheap_mappings(unsigned long base_mfn,
         else if ( xenheap_first_first_slot == -1)
         {
             /* Use xenheap_first_first to bootstrap the mappings */
-            first = xenheap_first_first;
+            paddr_t phys_addr;
+
+            /*
+             * At this stage is safe to use virt_to_maddr because Xen mapping
+             * is already in place. Using virt_to_maddr allows us to unify
+             * codepath with and without cache coloring enabled.
+             */
+            phys_addr = virt_to_maddr((vaddr_t)xenheap_first_first);
+            pte = mfn_to_xen_entry(maddr_to_mfn(phys_addr),MT_NORMAL);
 
-            pte = pte_of_xenaddr((vaddr_t)xenheap_first_first);
             pte.pt.table = 1;
             write_pte(p, pte);
 
+            first = xenheap_first_first;
             xenheap_first_first_slot = slot;
         }
         else
diff --git a/xen/arch/arm/psci.c b/xen/arch/arm/psci.c
index 0c90c2305c..d443fac6a2 100644
--- a/xen/arch/arm/psci.c
+++ b/xen/arch/arm/psci.c
@@ -25,6 +25,7 @@
 #include <asm/cpufeature.h>
 #include <asm/psci.h>
 #include <asm/acpi.h>
+#include <asm/coloring.h>
 
 /*
  * While a 64-bit OS can make calls with SMC32 calling conventions, for
@@ -49,7 +50,8 @@ int call_psci_cpu_on(int cpu)
 {
     struct arm_smccc_res res;
 
-    arm_smccc_smc(psci_cpu_on_nr, cpu_logical_map(cpu), __pa(init_secondary),
+    arm_smccc_smc(psci_cpu_on_nr, cpu_logical_map(cpu),
+                  __pa(virt_boot_xen((vaddr_t)init_secondary)),
                   &res);
 
     return PSCI_RET(res);
diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c
index 13b10515a8..294b806120 100644
--- a/xen/arch/arm/setup.c
+++ b/xen/arch/arm/setup.c
@@ -924,6 +924,7 @@ void __init start_xen(unsigned long boot_phys_offset,
     struct domain *d;
     int rc;
     paddr_t xen_paddr = (paddr_t)(_start + boot_phys_offset);
+    uint32_t xen_size = (_end - _start);
 
     dcache_line_bytes = read_dcache_line_bytes();
 
@@ -952,13 +953,16 @@ void __init start_xen(unsigned long boot_phys_offset,
     if ( !coloring_init() )
         panic("Xen Coloring support: setup failed\n");
 
+    xen_size = XEN_COLOR_MAP_SIZE;
+#ifdef CONFIG_COLORING
+    xen_paddr = get_xen_paddr(xen_size);
+#endif
+
     /* Register Xen's load address as a boot module. */
-    xen_bootmodule = add_boot_module(BOOTMOD_XEN, xen_paddr,
-                             (paddr_t)(uintptr_t)(_end - _start + 1), false);
+    xen_bootmodule = add_boot_module(BOOTMOD_XEN, xen_paddr, xen_size, false);
     BUG_ON(!xen_bootmodule);
 
     setup_pagetables(boot_phys_offset, xen_paddr);
-
     setup_mm();
 
     /* Parse the ACPI tables for possible boot-time configuration */
@@ -1072,6 +1076,17 @@ void __init start_xen(unsigned long boot_phys_offset,
 
     setup_virt_paging();
 
+    /*
+     * This removal is useful if cache coloring is enabled but
+     * it should not affect non coloring configuration.
+     * The removal is done earlier than discard_initial_modules
+     * beacuse in do_initcalls there is the livepatch support
+     * setup which uses the virtual addresses starting from
+     * BOOT_RELOC_VIRT_START.
+     * Remove coloring mappings to expose a clear state to the
+     * livepatch module.
+     */
+    remove_early_mappings(BOOT_RELOC_VIRT_START, SZ_2M);
     do_initcalls();
 
     /*
diff --git a/xen/arch/arm/smpboot.c b/xen/arch/arm/smpboot.c
index 7bfd0a73a7..5ef68976c9 100644
--- a/xen/arch/arm/smpboot.c
+++ b/xen/arch/arm/smpboot.c
@@ -438,6 +438,7 @@ int __cpu_up(unsigned int cpu)
 {
     int rc;
     s_time_t deadline;
+    vaddr_t *smp_up_cpu_addr;
 
     printk("Bringing up CPU%d\n", cpu);
 
@@ -453,10 +454,22 @@ int __cpu_up(unsigned int cpu)
     /* Tell the remote CPU what its logical CPU ID is. */
     init_data.cpuid = cpu;
 
+    /*
+     * If coloring is enabled, non-Master CPUs boot using the old Xen code.
+     * During the boot process each cpu is booted one after another using the
+     * smp_cpu_cpu variable. This variable is accessed in head.S using its
+     * physical address.
+     * That address is calculated using the physical offset of the old Xen
+     * code. With coloring we can not rely anymore on that offset. For this
+     * reason in order to boot the other cpus we rely on the old xen code that
+     * was mapped during tables setup in mm.c so that we can use the old physical
+     * offset and the old head.S code also. In order to modify the old Xen code
+     * we need to access it using the mapped done in color_xen.
+     */
+    smp_up_cpu_addr = (vaddr_t *)virt_boot_xen((vaddr_t)&smp_up_cpu);
+    *smp_up_cpu_addr = cpu_logical_map(cpu);
     /* Open the gate for this CPU */
-    smp_up_cpu = cpu_logical_map(cpu);
-    clean_dcache(smp_up_cpu);
-
+    clean_dcache(*smp_up_cpu_addr);
     rc = arch_cpu_up(cpu);
 
     console_end_sync();
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284455.483845 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUW-0008C6-NS; Fri, 04 Mar 2022 18:17:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284455.483845; Fri, 04 Mar 2022 18:17:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUU-0007x7-97; Fri, 04 Mar 2022 18:17:22 +0000
Received: by outflank-mailman (input) for mailman id 284455;
 Fri, 04 Mar 2022 17:56:08 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC2U-0005R5-Nz
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:26 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4aed8000-9be3-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 18:48:26 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC2T-0000HB-Cg; Fri, 04 Mar 2022 18:48:25 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4aed8000-9be3-11ec-8539-5f4723681683
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 31/36] Disable coloring if static memory support is selected
Date: Fri,  4 Mar 2022 18:46:56 +0100
Message-Id: <20220304174701.1453977-32-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

Static memory assumes to have physically contiguous memory mapped to
domains. This assumption cannot be made when coloring is enabled.
These two features have to be mutually exclusive.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
---
 xen/arch/arm/Kconfig | 1 +
 1 file changed, 1 insertion(+)

diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig
index f0f999d172..8f8be9d754 100644
--- a/xen/arch/arm/Kconfig
+++ b/xen/arch/arm/Kconfig
@@ -100,6 +100,7 @@ config HARDEN_BRANCH_PREDICTOR
 config COLORING
 	bool "L2 cache coloring"
 	default n
+	depends on !STATIC_MEMORY
 	depends on ARM_64
 
 config TEE
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284456.483858 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUY-0000L0-T6; Fri, 04 Mar 2022 18:17:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284456.483858; Fri, 04 Mar 2022 18:17:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUX-0000CZ-7F; Fri, 04 Mar 2022 18:17:25 +0000
Received: by outflank-mailman (input) for mailman id 284456;
 Fri, 04 Mar 2022 17:56:08 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC2G-0005R5-VI
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:12 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 42c06666-9be3-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 18:48:12 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC2F-00009k-PP; Fri, 04 Mar 2022 18:48:11 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 42c06666-9be3-11ec-8539-5f4723681683
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 24/36] xen/arm: enable consider_modules for coloring
Date: Fri,  4 Mar 2022 18:46:49 +0100
Message-Id: <20220304174701.1453977-25-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

In order to relocate Xen the function get_xen_paddr will be used in the
following patches. The method has "consider_modules" as a prerequisite
so it has to be enabled both for ARM32 and coloring.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
---
 xen/arch/arm/setup.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c
index f39c62ea70..0bfe12da57 100644
--- a/xen/arch/arm/setup.c
+++ b/xen/arch/arm/setup.c
@@ -442,7 +442,7 @@ static void * __init relocate_fdt(paddr_t dtb_paddr, size_t dtb_size)
     return fdt;
 }
 
-#ifdef CONFIG_ARM_32
+#if defined (CONFIG_ARM_32) || (CONFIG_COLORING)
 /*
  * Returns the end address of the highest region in the range s..e
  * with required size and alignment that does not conflict with the
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284457.483870 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUb-0000yN-Rb; Fri, 04 Mar 2022 18:17:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284457.483870; Fri, 04 Mar 2022 18:17:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUZ-0000jT-O3; Fri, 04 Mar 2022 18:17:27 +0000
Received: by outflank-mailman (input) for mailman id 284457;
 Fri, 04 Mar 2022 17:56:09 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC2T-0005R4-VH
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:25 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4a70f9ea-9be3-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 18:48:25 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC2Q-0000Fs-LA; Fri, 04 Mar 2022 18:48:24 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4a70f9ea-9be3-11ec-8eba-a37418f5ba1a
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 30/36] xen/arm: add coloring support to dom0less
Date: Fri,  4 Mar 2022 18:46:55 +0100
Message-Id: <20220304174701.1453977-31-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

Dom0less color assignment is performed via Device Tree with a new
attribute "colors". In this case the color assignment is represented by
a bitmask where it suffices to set all and only the bits having a
position equal to the chosen colors, leaving unset all the others.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
---
 xen/arch/arm/domain_build.c | 30 ++++++++++++++++++++++++++++++
 1 file changed, 30 insertions(+)

diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index 03a2573d67..c7ca45c0c4 100644
--- a/xen/arch/arm/domain_build.c
+++ b/xen/arch/arm/domain_build.c
@@ -27,6 +27,7 @@
 #include <asm/setup.h>
 #include <asm/cpufeature.h>
 #include <asm/domain_build.h>
+#include <asm/coloring.h>
 
 #include <xen/irq.h>
 #include <xen/grant_table.h>
@@ -3173,6 +3174,10 @@ void __init create_domUs(void)
 {
     struct dt_device_node *node;
     const struct dt_device_node *chosen = dt_find_node_by_path("/chosen");
+    u32 col_val;
+    const u32 *cells;
+    u32 len;
+    int cell, i, k;
 
     BUG_ON(chosen == NULL);
     dt_for_each_child_node(chosen, node)
@@ -3241,6 +3246,31 @@ void __init create_domUs(void)
                                          vpl011_virq - 32 + 1);
         }
 
+        d_cfg.arch.colors.max_colors = 0;
+        memset(&d_cfg.arch.colors.colors, 0x0, sizeof(d_cfg.arch.colors.colors));
+
+        cells = dt_get_property(node, "colors", &len);
+        if ( cells != NULL && len > 0 )
+        {
+            if ( !get_max_colors() )
+                panic("Coloring requested but no colors configuration found!\n");
+
+            if ( len > sizeof(d_cfg.arch.colors.colors) )
+                panic("Dom0less DomU color information is invalid\n");
+
+            for ( k = 0, cell = len/4 - 1; cell >= 0; cell--, k++ )
+            {
+                col_val = be32_to_cpup(&cells[cell]);
+                if ( col_val )
+                {
+                    /* Calculate number of bit set */
+                    for ( i = 0; i < 32; i++)
+                        if ( col_val & (1 << i) )
+                            d_cfg.arch.colors.max_colors++;
+                    d_cfg.arch.colors.colors[k] = col_val;
+                }
+            }
+        }
         /*
          * The variable max_init_domid is initialized with zero, so here it's
          * very important to use the pre-increment operator to call
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284458.483878 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUd-0001Ee-70; Fri, 04 Mar 2022 18:17:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284458.483878; Fri, 04 Mar 2022 18:17:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUb-000168-9J; Fri, 04 Mar 2022 18:17:29 +0000
Received: by outflank-mailman (input) for mailman id 284458;
 Fri, 04 Mar 2022 17:56:09 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC2R-0005R4-4w
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:23 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 48cccd0d-9be3-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 18:48:22 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC2P-0000FR-Rf; Fri, 04 Mar 2022 18:48:22 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 48cccd0d-9be3-11ec-8eba-a37418f5ba1a
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>,
	Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: [PATCH 29/36] xen/arm: add dump function for coloring info
Date: Fri,  4 Mar 2022 18:46:54 +0100
Message-Id: <20220304174701.1453977-30-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

Display general information about coloring support both during boot and
when requested by the user.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
---
 xen/arch/arm/coloring.c | 24 ++++++++++++++++++++++++
 1 file changed, 24 insertions(+)

diff --git a/xen/arch/arm/coloring.c b/xen/arch/arm/coloring.c
index aae3c77a7b..c590e1629a 100644
--- a/xen/arch/arm/coloring.c
+++ b/xen/arch/arm/coloring.c
@@ -24,6 +24,7 @@
 #include <xen/types.h>
 #include <xen/lib.h>
 #include <xen/errno.h>
+#include <xen/keyhandler.h>
 #include <xen/param.h>
 
 #include <asm/sysregs.h>
@@ -434,6 +435,29 @@ void coloring_dump_info(struct domain *d)
     printk("]\n");
 }
 
+static void dump_coloring_info(unsigned char key)
+{
+    int i;
+
+    printk("Coloring general information\n");
+    printk("Way size: %"PRIu64"kB\n", way_size >> 10);
+    printk("Max. number of colors available: %"PRIu32"\n", max_col_num);
+
+    printk("Xen color(s):\t[");
+    for ( i = 0; i < xen_col_num; i++ )
+        printk(" %"PRIu32" ", xen_col_list[i]);
+    printk("]\n");
+}
+
+static __init int register_heap_trigger(void)
+{
+    register_keyhandler('C', dump_coloring_info, "dump coloring general info", 1);
+
+    /* Also print general information once at boot */
+    dump_coloring_info('C');
+    return 0;
+}
+__initcall(register_heap_trigger);
 /*
  * Local variables:
  * mode: C
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284459.483890 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUf-0001eG-Bi; Fri, 04 Mar 2022 18:17:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284459.483890; Fri, 04 Mar 2022 18:17:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUd-0001SU-7T; Fri, 04 Mar 2022 18:17:31 +0000
Received: by outflank-mailman (input) for mailman id 284459;
 Fri, 04 Mar 2022 17:56:09 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC2X-0005R4-Jj
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:29 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4caa5a8e-9be3-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 18:48:29 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC2W-0000JI-FC; Fri, 04 Mar 2022 18:48:28 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4caa5a8e-9be3-11ec-8eba-a37418f5ba1a
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 35/36] doc, device-tree: introduce 'colors' property
Date: Fri,  4 Mar 2022 18:47:00 +0100
Message-Id: <20220304174701.1453977-36-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

Dom0less uses device tree for DomUs when booting them without using
Dom0. Add a new device tree property 'colors' that specifies the
coloring configuration for DomUs when using Dom0less.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
---
 docs/misc/arm/device-tree/booting.txt | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/docs/misc/arm/device-tree/booting.txt b/docs/misc/arm/device-tree/booting.txt
index a94125394e..44971bfe60 100644
--- a/docs/misc/arm/device-tree/booting.txt
+++ b/docs/misc/arm/device-tree/booting.txt
@@ -162,6 +162,9 @@ with the following properties:
 
     An integer specifying the number of vcpus to allocate to the guest.
 
+- colors
+    A 64 bit bitmask specifying the color configuration for the guest.
+
 - vpl011
 
     An empty property to enable/disable a virtual pl011 for the guest to
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284460.483901 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUi-00029V-1y; Fri, 04 Mar 2022 18:17:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284460.483901; Fri, 04 Mar 2022 18:17:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUf-0001yM-Gi; Fri, 04 Mar 2022 18:17:33 +0000
Received: by outflank-mailman (input) for mailman id 284460;
 Fri, 04 Mar 2022 17:56:09 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC2W-0005R4-72
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:28 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4bc51566-9be3-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 18:48:27 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC2U-0000IG-TQ; Fri, 04 Mar 2022 18:48:27 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4bc51566-9be3-11ec-8eba-a37418f5ba1a
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 33/36] doc, xen-command-line: introduce coloring options
Date: Fri,  4 Mar 2022 18:46:58 +0100
Message-Id: <20220304174701.1453977-34-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

Four additional parameters in the Xen command line are used to define
the underlying coloring policy, which is not directly configurable
otherwise.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
---
 docs/misc/xen-command-line.pandoc | 51 +++++++++++++++++++++++++++++--
 1 file changed, 49 insertions(+), 2 deletions(-)

diff --git a/docs/misc/xen-command-line.pandoc b/docs/misc/xen-command-line.pandoc
index efda335652..a472d51cf9 100644
--- a/docs/misc/xen-command-line.pandoc
+++ b/docs/misc/xen-command-line.pandoc
@@ -299,6 +299,20 @@ can be maintained with the pv-shim mechanism.
     cause Xen not to use Indirect Branch Tracking even when support is
     available in hardware.
 
+### buddy\_size (arm64)
+> `= <size in megabyte>`
+
+> Default: `64 MB`
+
+Amount of memory reserved for the buddy allocator when colored allocator is
+active. This options is useful only if coloring support is enabled.
+The colored allocator is meant as an alternative to the buddy allocator,
+since its allocation policy is by definition incompatible with the
+generic one. Since the Xen heap systems is not colored yet, we need to
+support the coexistence of the two allocators for now. This parameter, which is
+optional and for expert only, is used to set the amount of memory reserved to
+the buddy allocator.
+
 ### clocksource (x86)
 > `= pit | hpet | acpi | tsc`
 
@@ -884,7 +898,17 @@ Controls for the dom0 IOMMU setup.
 
     Incorrect use of this option may result in a malfunctioning system.
 
-### dom0_ioports_disable (x86)
+### dom0\_colors (arm64)
+> `= List of <integer>-<integer>`
+
+> Default: `All available colors`
+
+Specify dom0 color configuration. If the parameter is not set, all available
+colors are chosen and the user is warned on Xen's serial console. This color
+configuration acts also as the default one for all DomUs that do not have any
+explicit color assignment in their configuration file.
+
+### dom0\_ioports\_disable (x86)
 > `= List of <hex>-<hex>`
 
 Specify a list of IO ports to be excluded from dom0 access.
@@ -2625,6 +2649,20 @@ unknown NMIs will still be processed.
 Set the NMI watchdog timeout in seconds.  Specifying `0` will turn off
 the watchdog.
 
+### way\_size (arm64)
+> `= <size in byte>`
+
+> Default: `Obtained from the hardware`
+
+Specify the way size of the Last Level Cache. This parameter is only useful with
+coloring support enabled. It is an optional, expert-only parameter and it is
+used to calculate what bits in the physical address can be used by the coloring
+algorithm, and thus the maximum available colors on the platform. It can be
+obtained by dividing the total LLC size by the number of associativity ways.
+By default, the value is also automatically computed during coloring
+initialization to avoid any kind of misconfiguration. For this reason, it is
+highly recommended to use this boot argument with specific needs only.
+
 ### x2apic (x86)
 > `= <boolean>`
 
@@ -2642,7 +2680,16 @@ In the case that x2apic is in use, this option switches between physical and
 clustered mode.  The default, given no hint from the **FADT**, is cluster
 mode.
 
-### xenheap_megabytes (arm32)
+### xen\_colors (arm64)
+> `= List of <integer>-<integer>`
+
+> Default: `0-0: the lowermost color`
+
+Specify Xen color configuration. 
+Two colors are most likely needed on platforms where private caches are
+physically indexed, e.g. the L1 instruction cache of the Arm Cortex-A57.
+
+### xenheap\_megabytes (arm32)
 > `= <size>`
 
 > Default: `0` (1/32 of RAM)
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284461.483908 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUj-0002gW-AG; Fri, 04 Mar 2022 18:17:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284461.483908; Fri, 04 Mar 2022 18:17:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUh-0002Wk-Gx; Fri, 04 Mar 2022 18:17:35 +0000
Received: by outflank-mailman (input) for mailman id 284461;
 Fri, 04 Mar 2022 17:56:10 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC2B-0005R5-La
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:07 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3ddfbb0d-9be3-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 18:48:04 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC27-0008Ty-Il; Fri, 04 Mar 2022 18:48:03 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3ddfbb0d-9be3-11ec-8539-5f4723681683
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 14/36] xen/arch: add dump coloring info for domains
Date: Fri,  4 Mar 2022 18:46:39 +0100
Message-Id: <20220304174701.1453977-15-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

Print the color assignment for each domain when requested.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
---
 xen/arch/arm/coloring.c             | 12 ++++++++++++
 xen/arch/arm/domain.c               |  1 +
 xen/arch/arm/include/asm/coloring.h |  7 +++++++
 3 files changed, 20 insertions(+)

diff --git a/xen/arch/arm/coloring.c b/xen/arch/arm/coloring.c
index 382d558021..8061c3824f 100644
--- a/xen/arch/arm/coloring.c
+++ b/xen/arch/arm/coloring.c
@@ -332,6 +332,18 @@ static int __init parse_xen_colors(const char *s)
 }
 custom_param("xen_colors", parse_xen_colors);
 
+void coloring_dump_info(struct domain *d)
+{
+    int i;
+
+    printk("Domain %d has %u color(s) [ ", d->domain_id, d->max_colors);
+    for ( i = 0; i < d->max_colors; i++ )
+    {
+        printk("%"PRIu32" ", d->colors[i]);
+    }
+    printk("]\n");
+}
+
 /*
  * Local variables:
  * mode: C
diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
index 80a6f39464..fc12c79488 100644
--- a/xen/arch/arm/domain.c
+++ b/xen/arch/arm/domain.c
@@ -1131,6 +1131,7 @@ int domain_relinquish_resources(struct domain *d)
 void arch_dump_domain_info(struct domain *d)
 {
     p2m_dump_info(d);
+    coloring_dump_info(d);
 }
 
 
diff --git a/xen/arch/arm/include/asm/coloring.h b/xen/arch/arm/include/asm/coloring.h
index 1f7e0dde79..8609e17e80 100644
--- a/xen/arch/arm/include/asm/coloring.h
+++ b/xen/arch/arm/include/asm/coloring.h
@@ -40,10 +40,17 @@ bool check_domain_colors(struct domain *d);
  * color configuration.
  */
 uint32_t *setup_default_colors(uint32_t *col_num);
+
+void coloring_dump_info(struct domain *d);
 #else /* !CONFIG_COLORING */
 static inline bool __init coloring_init(void)
 {
     return true;
 }
+
+static inline void coloring_dump_info(struct domain *d)
+{
+    return;
+}
 #endif /* CONFIG_COLORING */
 #endif /* !__ASM_ARM_COLORING_H__ */
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284469.483921 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUm-0003Dx-3S; Fri, 04 Mar 2022 18:17:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284469.483921; Fri, 04 Mar 2022 18:17:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUj-0002yP-QP; Fri, 04 Mar 2022 18:17:37 +0000
Received: by outflank-mailman (input) for mailman id 284469;
 Fri, 04 Mar 2022 17:56:12 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC2D-0005R5-Lm
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:09 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 40586353-9be3-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 18:48:08 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC2B-00005k-CV; Fri, 04 Mar 2022 18:48:07 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 40586353-9be3-11ec-8539-5f4723681683
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 19/36] xen/arch: introduce cache-coloring allocator
Date: Fri,  4 Mar 2022 18:46:44 +0100
Message-Id: <20220304174701.1453977-20-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

Introduce a new memory page allocator that implement the cache coloring
mechanism. The allocation algorithm follows the given coloring scheme
specified for each guest, and maximizes contiguity in the page
selection.

Pages are stored by color in separated and address-ordered lists that
are collectively called the colored heap.  These lists will be populated
by a simple initialisation function, which, for any available page,
compute its color and insert it in the corresponding list.  When a
domain requests a page, the allocator take one from the subset of lists
whose colors equal the domain configuration.  It chooses the highest
page element among the lasts elements of such lists.  This ordering
guarantees that contiguous pages are sequentially allocated, if this is
made possible by a color assignment which includes adjacent ids.

The allocator can handle only requests with order equals to 0 since the
single color granularity is represented in memory by one page.

A dump function is added to allow inspection of colored heap
information.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
---
 xen/common/page_alloc.c | 264 +++++++++++++++++++++++++++++++++++++++-
 xen/include/xen/mm.h    |   5 +
 2 files changed, 268 insertions(+), 1 deletion(-)

diff --git a/xen/common/page_alloc.c b/xen/common/page_alloc.c
index 4635718237..82f6e8330a 100644
--- a/xen/common/page_alloc.c
+++ b/xen/common/page_alloc.c
@@ -150,6 +150,9 @@
 #define p2m_pod_offline_or_broken_hit(pg) 0
 #define p2m_pod_offline_or_broken_replace(pg) BUG_ON(pg != NULL)
 #endif
+#ifdef CONFIG_COLORING
+#include <asm/coloring.h>
+#endif
 
 #ifndef PGC_reserved
 #define PGC_reserved 0
@@ -438,6 +441,263 @@ mfn_t __init alloc_boot_pages(unsigned long nr_pfns, unsigned long pfn_align)
 
 
 
+static DEFINE_SPINLOCK(heap_lock);
+
+#ifdef CONFIG_COLORING
+/*************************
+ * COLORED SIDE-ALLOCATOR
+ *
+ * Pages are stored by their color in separated lists. Each list defines a color
+ * and it is initialized during end_boot_allocator, where each page's color
+ * is calculated and the page itself is put in the correct list.
+ * After initialization we have N list where N is the number of maximum
+ * available colors on the platform.
+ * All the lists' heads are stored as element in an array with size N-1 using
+ * the following schema:
+ * array[X] = head of color X, where X goes from 0 to N-1
+ */
+typedef struct page_list_head color_list;
+static color_list *color_heap;
+static long total_avail_col_pages;
+static u64 col_num_max;
+static bool color_init_state = true;
+
+#define page_to_head(pg) (&color_heap[color_from_page(pg)])
+#define color_to_head(col) (&color_heap[col])
+
+/* Add page in list in order depending on its physical address. */
+static void page_list_add_order(struct page_info *pg, struct list_head *head)
+{
+    struct page_info *pos;
+
+    /* Add first page after head */
+    if ( page_list_empty(head) )
+    {
+        page_list_add(pg, head);
+        return;
+    }
+
+    /* Add non-first page in list in ascending order */
+    page_list_for_each_reverse(pos, head)
+    {
+        /* Get pg position */
+        if ( page_to_maddr(pos) <= page_to_maddr(pg) )
+        {
+            /* Insert pg between pos and pos->list.next */
+            page_list_add(pg, &pos->list);
+            break;
+        }
+
+        /*
+         * If pos is the first element it means that pg <= pos so we have
+         * to insert pg after head.
+         */
+        if ( page_list_first(head) == pos )
+        {
+            page_list_add(pg, head);
+            break;
+        }
+    }
+}
+
+/* Alloc one page based on domain color configuration */
+static struct page_info *alloc_col_heap_page(
+    unsigned int memflags, struct domain *d)
+{
+    struct page_info *pg, *tmp;
+    bool need_tlbflush = false;
+    uint32_t cur_color;
+    uint32_t tlbflush_timestamp = 0;
+    uint32_t *colors = 0;
+    int max_colors;
+    int i;
+
+    colors = d->colors;
+    max_colors = d->max_colors;
+
+    spin_lock(&heap_lock);
+
+    tmp = pg = NULL;
+
+    /* Check for the first pg on non-empty list */
+    for ( i = 0; i < max_colors; i++ )
+    {
+        if ( !page_list_empty(color_to_head(colors[i])) )
+        {
+            tmp = pg = page_list_last(color_to_head(colors[i]));
+            cur_color = d->colors[i];
+            break;
+        }
+    }
+
+    /* If all lists are empty, no requests can be satisfied */
+    if ( !pg )
+    {
+        spin_unlock(&heap_lock);
+        return NULL;
+    }
+
+    /* Get the highest page from the lists compliant to the domain color(s) */
+    for ( i += 1; i < max_colors; i++ )
+    {
+        if ( page_list_empty(color_to_head(colors[i])) )
+        {
+            printk(XENLOG_INFO "List empty\n");
+            continue;
+        }
+        tmp = page_list_last(color_to_head(colors[i]));
+        if ( page_to_maddr(tmp) > page_to_maddr(pg) )
+        {
+            pg = tmp;
+            cur_color = colors[i];
+        }
+    }
+
+    if ( !pg )
+    {
+        spin_unlock(&heap_lock);
+        return NULL;
+    }
+
+    pg->count_info = PGC_state_inuse;
+
+    if ( !(memflags & MEMF_no_tlbflush) )
+        accumulate_tlbflush(&need_tlbflush, pg,
+                            &tlbflush_timestamp);
+
+    /* Initialise fields which have other uses for free pages. */
+    pg->u.inuse.type_info = 0;
+    page_set_owner(pg, NULL);
+
+    flush_page_to_ram(mfn_x(page_to_mfn(pg)),
+                      !(memflags & MEMF_no_icache_flush));
+
+    page_list_del(pg, page_to_head(pg));
+    total_avail_col_pages--;
+
+    spin_unlock(&heap_lock);
+
+    if ( need_tlbflush )
+        filtered_flush_tlb_mask(tlbflush_timestamp);
+
+    return pg;
+}
+
+struct page_info *alloc_col_domheap_page(
+    struct domain *d, unsigned int memflags)
+{
+    struct page_info *pg;
+
+    ASSERT(!in_irq());
+
+    /* Get page based on color selection */
+    pg = alloc_col_heap_page(memflags, d);
+
+    if ( !pg )
+    {
+        printk(XENLOG_INFO "ERROR: Colored Page is null\n");
+        return NULL;
+    }
+
+    /* Assign page to domain */
+    if ( d && !(memflags & MEMF_no_owner) &&
+        assign_page(pg, 0, d, memflags) )
+    {
+        free_col_heap_page(pg);
+        return NULL;
+    }
+
+    return pg;
+}
+
+void free_col_heap_page(struct page_info *pg)
+{
+    /* This page is not a guest frame any more. */
+    pg->count_info = PGC_state_free;
+
+    page_set_owner(pg, NULL);
+    total_avail_col_pages++;
+    page_list_add_order( pg, page_to_head(pg) );
+}
+
+static inline void init_col_heap_pages(struct page_info *pg, unsigned long nr_pages)
+{
+    int i;
+
+    if ( color_init_state )
+    {
+        col_num_max = get_max_colors();
+        color_heap = xmalloc_array(color_list, col_num_max);
+        BUG_ON(!color_heap);
+
+        for ( i = 0; i < col_num_max; i++ )
+        {
+            printk(XENLOG_INFO "Init list for color: %u\n", i);
+            INIT_PAGE_LIST_HEAD(&color_heap[i]);
+        }
+
+        color_init_state = false;
+    }
+
+    printk(XENLOG_INFO "Init color heap pages with %lu pages for a given size of 0x%"PRIx64"\n",
+            nr_pages, nr_pages * PAGE_SIZE);
+    printk(XENLOG_INFO "Paging starting from: 0x%"PRIx64"\n", page_to_maddr(pg));
+    total_avail_col_pages += nr_pages;
+
+    for ( i = 0; i < nr_pages; i++ )
+    {
+        pg->colored = true;
+        page_list_add_order(pg, page_to_head(pg));
+        pg++;
+    }
+}
+
+static inline bool is_page_colored(struct page_info *pg)
+{
+        return pg->colored;
+}
+
+static void dump_col_heap(unsigned char key)
+{
+    struct page_info *pg;
+    unsigned long size;
+    unsigned int i;
+
+    printk("Colored heap info\n");
+    for ( i = 0; i < col_num_max; i++ )
+    {
+        printk("Heap[%u]: ", i);
+        size = 0;
+        page_list_for_each( pg, color_to_head(i) )
+        {
+            BUG_ON(!(color_from_page(pg) == i));
+            size++;
+        }
+        printk("%lu pages -> %lukB free\n", size, size << (PAGE_SHIFT - 10));
+    }
+
+    printk("Total number of pages: %lu\n", total_avail_col_pages);
+}
+#else /* !CONFIG_COLORING */
+#define init_col_heap_pages(x, y) init_heap_pages(x, y)
+
+inline struct page_info *alloc_col_domheap_page(
+	struct domain *d, unsigned int memflags)
+{
+	return NULL;
+}
+
+inline void free_col_heap_page(struct page_info *pg)
+{
+	return;
+}
+
+static inline bool is_page_colored(struct page_info *pg)
+{
+        return false;
+}
+#endif /* CONFIG_COLORING */
+
 /*************************
  * BINARY BUDDY ALLOCATOR
  */
@@ -458,7 +718,6 @@ static unsigned long node_need_scrub[MAX_NUMNODES];
 static unsigned long *avail[MAX_NUMNODES];
 static long total_avail_pages;
 
-static DEFINE_SPINLOCK(heap_lock);
 static long outstanding_claims; /* total outstanding claims by all domains */
 
 unsigned long domain_adjust_tot_pages(struct domain *d, long pages)
@@ -2600,6 +2859,9 @@ static void cf_check dump_heap(unsigned char key)
 static __init int cf_check register_heap_trigger(void)
 {
     register_keyhandler('H', dump_heap, "dump heap info", 1);
+#ifdef CONFIG_COLORING
+    register_keyhandler('c', dump_col_heap, "dump coloring heap info", 1);
+#endif
     return 0;
 }
 __initcall(register_heap_trigger);
diff --git a/xen/include/xen/mm.h b/xen/include/xen/mm.h
index f0861ed5bb..63288e537c 100644
--- a/xen/include/xen/mm.h
+++ b/xen/include/xen/mm.h
@@ -131,6 +131,11 @@ unsigned int online_page(mfn_t mfn, uint32_t *status);
 int offline_page(mfn_t mfn, int broken, uint32_t *status);
 int query_page_offline(mfn_t mfn, uint32_t *status);
 
+/* Colored suballocator. */
+struct page_info *alloc_col_domheap_page(
+    struct domain *d, unsigned int memflags);
+void free_col_heap_page(struct page_info *pg);
+
 void heap_init_late(void);
 
 int assign_pages(
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284470.483932 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUp-00041W-DI; Fri, 04 Mar 2022 18:17:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284470.483932; Fri, 04 Mar 2022 18:17:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUn-0003sK-6c; Fri, 04 Mar 2022 18:17:41 +0000
Received: by outflank-mailman (input) for mailman id 284470;
 Fri, 04 Mar 2022 17:56:13 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC2A-0005R5-LV
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:06 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3d6dfd4d-9be3-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 18:48:03 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC26-0008TH-O6; Fri, 04 Mar 2022 18:48:02 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3d6dfd4d-9be3-11ec-8539-5f4723681683
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 13/36] xen/arm: A domain is not direct mapped when coloring is enabled
Date: Fri,  4 Mar 2022 18:46:38 +0100
Message-Id: <20220304174701.1453977-14-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

Based on the intrinsic nature of cache coloring, it is trivial to state
that each domain that is colored is also not direct mapped.
Set the directmap variable to false when coloring is enabled.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
---
 xen/arch/arm/domain.c | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
index 33471b3c58..80a6f39464 100644
--- a/xen/arch/arm/domain.c
+++ b/xen/arch/arm/domain.c
@@ -785,6 +785,8 @@ int arch_domain_create(struct domain *d,
 
     d->max_colors = 0;
 #ifdef CONFIG_COLORING
+    d->arch.directmap = false;
+
     /* Setup domain colors */
     if ( !config->arch.colors.max_colors )
     {
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284471.483946 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUs-0004kQ-Tg; Fri, 04 Mar 2022 18:17:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284471.483946; Fri, 04 Mar 2022 18:17:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUq-0004Wf-6h; Fri, 04 Mar 2022 18:17:44 +0000
Received: by outflank-mailman (input) for mailman id 284471;
 Fri, 04 Mar 2022 17:56:13 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC2Q-0005R5-K7
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:22 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 48543e68-9be3-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 18:48:21 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC2P-0000Es-0H; Fri, 04 Mar 2022 18:48:21 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 48543e68-9be3-11ec-8539-5f4723681683
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>,
	Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: [PATCH 28/36] xen/arm: introduce xen_map_text_rw
Date: Fri,  4 Mar 2022 18:46:53 +0100
Message-Id: <20220304174701.1453977-29-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

Introduce two new arm specific functions to temporarily map/unmap the
Xen text read-write (the Xen text is mapped read-only by default by
setup_pagetables): xen_map_text_rw and xen_unmap_text_rw.

There is only one caller in the alternative framework.

The non-colored implementation simply uses __vmap to do the mapping. In
other words, there are no changes to the non-colored case.

The colored implementation calculates Xen text physical addresses
appropriately, according to the coloring configuration.

Export vm_alloc because it is needed by the colored implementation of
xen_map_text_rw.

Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
---
 xen/arch/arm/alternative.c    |  8 ++------
 xen/arch/arm/include/asm/mm.h |  3 +++
 xen/arch/arm/mm.c             | 38 +++++++++++++++++++++++++++++++++++
 xen/common/vmap.c             |  4 ++--
 xen/include/xen/vmap.h        |  2 ++
 5 files changed, 47 insertions(+), 8 deletions(-)

diff --git a/xen/arch/arm/alternative.c b/xen/arch/arm/alternative.c
index 237c4e5642..2481521c9c 100644
--- a/xen/arch/arm/alternative.c
+++ b/xen/arch/arm/alternative.c
@@ -185,9 +185,6 @@ static int __apply_alternatives_multi_stop(void *unused)
     {
         int ret;
         struct alt_region region;
-        mfn_t xen_mfn = virt_to_mfn(_start);
-        paddr_t xen_size = _end - _start;
-        unsigned int xen_order = get_order_from_bytes(xen_size);
         void *xenmap;
 
         BUG_ON(patched);
@@ -196,8 +193,7 @@ static int __apply_alternatives_multi_stop(void *unused)
          * The text and inittext section are read-only. So re-map Xen to
          * be able to patch the code.
          */
-        xenmap = __vmap(&xen_mfn, 1U << xen_order, 1, 1, PAGE_HYPERVISOR,
-                        VMAP_DEFAULT);
+        xenmap = xen_map_text_rw();
         /* Re-mapping Xen is not expected to fail during boot. */
         BUG_ON(!xenmap);
 
@@ -208,7 +204,7 @@ static int __apply_alternatives_multi_stop(void *unused)
         /* The patching is not expected to fail during boot. */
         BUG_ON(ret != 0);
 
-        vunmap(xenmap);
+        xen_unmap_text_rw(xenmap);
 
         /* Barriers provided by the cache flushing */
         write_atomic(&patched, 1);
diff --git a/xen/arch/arm/include/asm/mm.h b/xen/arch/arm/include/asm/mm.h
index 1422091436..defb1efaad 100644
--- a/xen/arch/arm/include/asm/mm.h
+++ b/xen/arch/arm/include/asm/mm.h
@@ -195,6 +195,9 @@ extern void mmu_init_secondary_cpu(void);
 extern void setup_xenheap_mappings(unsigned long base_mfn, unsigned long nr_mfns);
 /* Map a frame table to cover physical addresses ps through pe */
 extern void setup_frametable_mappings(paddr_t ps, paddr_t pe);
+/* Create temporary Xen text read-write mapping */
+extern void *xen_map_text_rw(void);
+extern void xen_unmap_text_rw(void *va);
 /* Map a 4k page in a fixmap entry */
 extern void set_fixmap(unsigned map, mfn_t mfn, unsigned attributes);
 /* Remove a mapping from a fixmap entry */
diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
index 53ea13641b..b18c7cd373 100644
--- a/xen/arch/arm/mm.c
+++ b/xen/arch/arm/mm.c
@@ -637,6 +637,31 @@ static void clear_table(void *table)
 }
 
 #ifdef CONFIG_COLORING
+void* __init xen_map_text_rw(void)
+{
+    paddr_t xen_paddr = __pa(_start);
+    unsigned int xen_size = 1 << get_order_from_bytes(_end - _start);
+    void *va = vm_alloc(xen_size, 1, VMAP_DEFAULT);
+    unsigned long cur = (unsigned long)va;
+    mfn_t mfn_col;
+    unsigned int i;
+
+    for ( i = 0; i < xen_size; i++, cur += PAGE_SIZE )
+    {
+        xen_paddr = next_xen_colored(xen_paddr);
+        mfn_col = maddr_to_mfn(xen_paddr);
+        if ( map_pages_to_xen(cur, mfn_col, 1, PAGE_HYPERVISOR) )
+            return NULL;
+        xen_paddr += PAGE_SIZE;
+    }
+    return va;
+}
+
+void __init xen_unmap_text_rw(void *va)
+{
+    vunmap(va);
+}
+
 /*
  * Translate a Xen (.text) virtual address to the colored physical one
  * depending on the hypervisor configuration.
@@ -796,6 +821,19 @@ void __init setup_pagetables(unsigned long boot_phys_offset, paddr_t xen_paddr)
     xen_pt_enforce_wnx();
 }
 #else
+void* __init xen_map_text_rw(void)
+{
+    unsigned int xen_order = get_order_from_bytes(_end - _start);
+    mfn_t xen_mfn = virt_to_mfn(_start);
+    return __vmap(&xen_mfn, 1U << xen_order, 1, 1, PAGE_HYPERVISOR,
+                  VMAP_DEFAULT);
+}
+
+void __init xen_unmap_text_rw(void *va)
+{
+    vunmap(va);
+}
+
 /* Boot-time pagetable setup.
  * Changes here may need matching changes in head.S */
 void __init setup_pagetables(unsigned long boot_phys_offset, paddr_t xen_paddr)
diff --git a/xen/common/vmap.c b/xen/common/vmap.c
index 4fd6b3067e..bedfc9d418 100644
--- a/xen/common/vmap.c
+++ b/xen/common/vmap.c
@@ -45,8 +45,8 @@ void __init vm_init_type(enum vmap_region type, void *start, void *end)
     populate_pt_range(va, vm_low[type] - nr);
 }
 
-static void *vm_alloc(unsigned int nr, unsigned int align,
-                      enum vmap_region t)
+void *vm_alloc(unsigned int nr, unsigned int align,
+               enum vmap_region t)
 {
     unsigned int start, bit;
 
diff --git a/xen/include/xen/vmap.h b/xen/include/xen/vmap.h
index b0f7632e89..dcf2be692f 100644
--- a/xen/include/xen/vmap.h
+++ b/xen/include/xen/vmap.h
@@ -12,6 +12,8 @@ enum vmap_region {
 
 void vm_init_type(enum vmap_region type, void *start, void *end);
 
+void *vm_alloc(unsigned int nr, unsigned int align,
+               enum vmap_region t);
 void *__vmap(const mfn_t *mfn, unsigned int granularity, unsigned int nr,
              unsigned int align, unsigned int flags, enum vmap_region);
 void *vmap(const mfn_t *mfn, unsigned int nr);
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284472.483959 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUw-0005b2-19; Fri, 04 Mar 2022 18:17:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284472.483959; Fri, 04 Mar 2022 18:17:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUt-0005IF-FZ; Fri, 04 Mar 2022 18:17:47 +0000
Received: by outflank-mailman (input) for mailman id 284472;
 Fri, 04 Mar 2022 17:56:14 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC2Y-0005R5-RD
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:30 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4d3875b5-9be3-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 18:48:29 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC2X-0000Jk-4f; Fri, 04 Mar 2022 18:48:29 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4d3875b5-9be3-11ec-8539-5f4723681683
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 36/36] doc, arm: add usage documentation for cache coloring support
Date: Fri,  4 Mar 2022 18:47:01 +0100
Message-Id: <20220304174701.1453977-37-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

Add basic documentation that shows how cache coloring support can be
used in Xen. It introduces the basic concepts behind cache coloring,
defines the cache selection format, and explains how to assign colors to
the supported domains: Dom0, DomUs and Xen itself. Known issues are
also reported.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
---
 docs/misc/arm/cache_coloring.rst | 191 +++++++++++++++++++++++++++++++
 1 file changed, 191 insertions(+)
 create mode 100644 docs/misc/arm/cache_coloring.rst

diff --git a/docs/misc/arm/cache_coloring.rst b/docs/misc/arm/cache_coloring.rst
new file mode 100644
index 0000000000..082afb1b6c
--- /dev/null
+++ b/docs/misc/arm/cache_coloring.rst
@@ -0,0 +1,191 @@
+Xen coloring support user's guide
+=================================
+
+The cache coloring support in Xen allows to reserve last level cache partition
+for Dom0, DomUs and Xen itself. Currently only ARM64 is supported.
+
+In order to enable and use it, few steps are needed.
+
+- Enable coloring in XEN configuration file.
+
+        CONFIG_COLORING=y
+
+- Enable/disable debug information (optional).
+
+        CONFIG_COLORING_DEBUG=y/n
+
+Before digging into configuration instructions, configurers should first
+understand the basics of cache coloring.
+
+Background
+**********
+
+Cache hierarchy of a modern multi-core CPU typically has first levels dedicated
+to each core (hence using multiple cache units), while the last level is shared
+among all of them. Such configuration implies that memory operations on one
+core (e.g. running a DomU) are able to generate interference on another core
+(e.g .hosting another DomU). Cache coloring allows eliminating this
+mutual interference, and thus guaranteeing higher and more predictable
+performances for memory accesses.
+The key concept underlying cache coloring is a fragmentation of the memory
+space into a set of sub-spaces called colors that are mapped to disjoint cache
+partitions. Technically, the whole memory space is first divided into a number
+of subsequent regions. Then each region is in turn divided into a number of
+subsequent sub-colors. The generic i-th color is then obtained by all the
+i-th sub-colors in each region.
+
+.. raw:: html
+
+    <pre>
+                            Region j            Region j+1
+                .....................   ............
+                .                     . .
+                .                       .
+            _ _ _______________ _ _____________________ _ _
+                |     |     |     |     |     |     |
+                | c_0 | c_1 |     | c_n | c_0 | c_1 |
+           _ _ _|_____|_____|_ _ _|_____|_____|_____|_ _ _
+                    :                       :
+                    :                       :...         ... .
+                    :                            color 0
+                    :...........................         ... .
+                                                :
+          . . ..................................:
+    </pre>
+
+There are two pragmatic lesson to be learnt.
+
+1. If one wants to avoid cache interference between two domains, different
+   colors needs to be used for their memory.
+
+2. Color assignment must privilege contiguity in the partitioning. E.g.,
+   assigning colors (0,1) to domain I  and (2,3) to domain  J is better than
+   assigning colors (0,2) to I and (1,3) to J.
+
+
+Color(s) selection format
+**************************
+
+Regardless of the domain that has to be colored (Dom0, DomUs and Xen),
+the color selection can be expressed using the same syntax.  In particular,
+the latter is expressed as a comma-separated list of hyphen-separated intervals
+of color numbers, as in `0-4,5-8,10-15`.  Ranges are always represented using
+strings. Note that no spaces are allowed.
+
+The number of available colors depends on the LLC layout of the specific
+platform and determines the maximum allowed value.  This number can be either
+calculated [#f1]_ or read from the output given by the hypervisor during boot,
+if DEBUG logging is enabled.
+
+Examples:
+
++---------------------+-----------------------------------+
+|**Configuration**    |**Actual selection**               |
++---------------------+-----------------------------------+
+|  1-2,5-8            | [1, 2, 5, 6, 7, 8]                |
++---------------------+-----------------------------------+
+|  0-8,3-8            | [0, 1, 2, 3, 4, 5, 6, 7, 8]       |
++---------------------+-----------------------------------+
+|  0-0                | [0]                               |
++---------------------+-----------------------------------+
+
+General coloring parameters
+***************************
+
+Four additional parameters in the Xen command line are used to define the
+underlying coloring policy, which is not directly configurable otherwise.
+
+Please refer to the relative documentation in docs/man/xl.cfg.pod.5.in.
+
+Dom0less support
+****************
+Support for the Dom0less experimental features is provided. Color selection for
+a virtual machine is defined by the attribute `colors`, whose format is not a
+string for ranges list, but a bitmask. It suffices to set all and only the bits
+having a position equal to the chosen colors, leaving unset all the others. For
+example, if we choose 8 colors out of 16, we can use a bitmask with 8 bits set
+and 8 bit unset, like:
+
+- `0xff00` -> `1111 1111 0000 0000`
+- `0x0ff0` -> `0000 1111 1111 0000`
+- `0x3c3c` -> `0011 1100 0011 1100`
+
+Configuration example:
+
+.. raw:: html
+
+    <pre>
+        xen,xen-bootargs = "console=dtuart dtuart=serial0 dom0_mem=1G dom0_max_vcpus=1 sched=null way_size=65536 xen_colors=0-1 dom0_colors=2-6";
+        xen,dom0-bootargs "console=hvc0 earlycon=xen earlyprintk=xen root=/dev/ram0"
+
+        dom0 {
+            compatible = "xen,linux-zimage" "xen,multiboot-module";
+            reg = <0x0 0x1000000 0x0 15858176>;
+        };
+
+        dom0-ramdisk {
+            compatible = "xen,linux-initrd" "xen,multiboot-module";
+            reg = <0x0 0x2000000 0x0 20638062>;
+        };
+
+        domU0 {
+            #address-cells = <0x1>;
+            #size-cells = <0x1>;
+            compatible = "xen,domain";
+            memory = <0x0 0x40000>;
+            colors = <0x0 0x0f00>;
+            cpus = <0x1>;
+            vpl011 = <0x1>;
+
+            module@2000000 {
+                compatible = "multiboot,kernel", "multiboot,module";
+                reg = <0x2000000 0xffffff>;
+                bootargs = "console=ttyAMA0";
+            };
+
+            module@30000000 {
+                compatible = "multiboot,ramdisk", "multiboot,module";
+                reg = <0x3000000 0xffffff>;
+            };
+        };
+    </pre>
+
+Please refer to the relative documentation in
+docs/misc/arm/device-tree/booting.txt.
+
+
+Known issues
+************
+
+Explicitly define way_size in QEMU
+##################################
+
+Currently, QEMU does not have a comprehensive cache model, so the cache coloring
+support fails to detect a cache geometry where to operate. In this case, the
+boot hangs as soon as the Xen image is loaded. To overcome this issue, it is
+enough to specify the way_size parameter in the command line. Any multiple
+greater than 1 of the page size allows the coloring mechanism to work, but the
+precise behavior on the system that QEMU is emulating can be obtained with its
+way_size. For instance, set way_size=65536.
+
+
+Fail to boot colored DomUs with large memory size
+#################################################
+
+If the kernel used for Dom0 does not contain the upstream commit
+3941552aec1e04d63999988a057ae09a1c56ebeb and uses the hypercall buffer device,
+colored DomUs with memory size larger then 127 MB cannot be created. This is
+caused by the default limit of this buffer of 64 pages. The solution is to
+manually apply the above patch, or to check if there is an updated version of
+the kernel in use for Dom0 that contains this change.
+
+Notes:
+******
+
+.. [#f1] To compute the number of available colors on a platform, one can simply
+  divide `way_size` by `page_size`, where: `page_size` is the size of the page
+  used on the system (usually 4 KiB); `way_size` is size of each LLC way.  For
+  example, an Arm Cortex-A53 with a 16-ways associative 1 MiB LLC enable 16
+  colors, when pages are 4 KiB.
+
+
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284474.483971 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUz-0006Md-9G; Fri, 04 Mar 2022 18:17:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284474.483971; Fri, 04 Mar 2022 18:17:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCUw-0006B7-R8; Fri, 04 Mar 2022 18:17:50 +0000
Received: by outflank-mailman (input) for mailman id 284474;
 Fri, 04 Mar 2022 17:56:14 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC2V-0005R4-C9
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:27 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4b55c8dc-9be3-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 18:48:26 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC2U-0000Hn-7S; Fri, 04 Mar 2022 18:48:26 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4b55c8dc-9be3-11ec-8eba-a37418f5ba1a
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 32/36] xen/arm: reduce the number of supported colors
Date: Fri,  4 Mar 2022 18:46:57 +0100
Message-Id: <20220304174701.1453977-33-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

Currently coloring supports breaks assertion in domctl.c:892 because of
the data structure used for color configuration. Currently the array is
set to support up to 128 colors.
Lower the number of supported colors to 64 until a better solution is
found.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
---
 xen/include/public/arch-arm.h | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/xen/include/public/arch-arm.h b/xen/include/public/arch-arm.h
index 627cc42164..5e2eaa02ad 100644
--- a/xen/include/public/arch-arm.h
+++ b/xen/include/public/arch-arm.h
@@ -303,7 +303,7 @@ struct vcpu_guest_context {
 typedef struct vcpu_guest_context vcpu_guest_context_t;
 DEFINE_XEN_GUEST_HANDLE(vcpu_guest_context_t);
 
-#define MAX_COLORS_CELLS 4
+#define MAX_COLORS_CELLS 2
 struct color_guest_config {
     uint32_t max_colors;
     uint32_t colors[MAX_COLORS_CELLS];
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:17:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:17:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284475.483982 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCV2-000719-A2; Fri, 04 Mar 2022 18:17:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284475.483982; Fri, 04 Mar 2022 18:17:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCV0-0006ot-3A; Fri, 04 Mar 2022 18:17:54 +0000
Received: by outflank-mailman (input) for mailman id 284475;
 Fri, 04 Mar 2022 17:56:14 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC2C-0005R5-Lp
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:08 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3fafe84e-9be3-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 18:48:07 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC2A-000050-J4; Fri, 04 Mar 2022 18:48:06 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3fafe84e-9be3-11ec-8539-5f4723681683
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 18/36] Alloc: introduce page_list_for_each_reverse
Date: Fri,  4 Mar 2022 18:46:43 +0100
Message-Id: <20220304174701.1453977-19-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
---
 xen/include/xen/mm.h | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/xen/include/xen/mm.h b/xen/include/xen/mm.h
index 3be754da92..f0861ed5bb 100644
--- a/xen/include/xen/mm.h
+++ b/xen/include/xen/mm.h
@@ -488,6 +488,8 @@ page_list_splice(struct page_list_head *list, struct page_list_head *head)
     list_for_each_entry_safe(pos, tmp, head, list)
 # define page_list_for_each_safe_reverse(pos, tmp, head) \
     list_for_each_entry_safe_reverse(pos, tmp, head, list)
+# define page_list_for_each_reverse(pos, head) \
+    list_for_each_entry_reverse(pos, head, list)
 #endif
 
 static inline unsigned int get_order_from_bytes(paddr_t size)
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:18:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:18:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284476.483991 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCV4-0007Wl-SY; Fri, 04 Mar 2022 18:17:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284476.483991; Fri, 04 Mar 2022 18:17:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCV2-0007Ki-Kj; Fri, 04 Mar 2022 18:17:56 +0000
Received: by outflank-mailman (input) for mailman id 284476;
 Fri, 04 Mar 2022 17:56:14 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC2E-0005R5-Lr
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:10 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 40c746f5-9be3-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 18:48:09 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC2C-00006k-F1; Fri, 04 Mar 2022 18:48:08 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 40c746f5-9be3-11ec-8539-5f4723681683
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 20/36] xen/common: introduce buddy required reservation
Date: Fri,  4 Mar 2022 18:46:45 +0100
Message-Id: <20220304174701.1453977-21-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

When cache coloring is enabled, a certain amount of memory is reserved
for buddy allocation because current coloring implementation does not
support Xen heap memory. As of this commit, the colored allocator is used
for dom0, domUs, while the buddy manages only Xen memory. The memory
reserved to the buddy is thus lowered to a reasonably small value.
Introduce a new variable that specifies the amount of memory reserved
for the buddy allocator.
The current default value will be enough even when we will add
coloring for Xen in the following patches.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
---
 xen/common/page_alloc.c | 14 ++++++++++++++
 1 file changed, 14 insertions(+)

diff --git a/xen/common/page_alloc.c b/xen/common/page_alloc.c
index 82f6e8330a..fffa438029 100644
--- a/xen/common/page_alloc.c
+++ b/xen/common/page_alloc.c
@@ -230,6 +230,13 @@ static bool __read_mostly scrub_debug;
 #define scrub_debug    false
 #endif
 
+#ifdef CONFIG_COLORING
+/* Minimum size required for buddy allocator to work with colored one */
+unsigned long buddy_required_size __read_mostly = MB(64);
+#else
+unsigned long buddy_required_size __read_mostly = 0;
+#endif
+
 /*
  * Bit width of the DMA heap -- used to override NUMA-node-first.
  * allocation strategy, which can otherwise exhaust low memory.
@@ -678,6 +685,13 @@ static void dump_col_heap(unsigned char key)
 
     printk("Total number of pages: %lu\n", total_avail_col_pages);
 }
+static int __init parse_buddy_required_size(const char *s)
+{
+    buddy_required_size = simple_strtoull(s, &s, 0);
+
+    return *s ? -EINVAL : 0;
+}
+custom_param("buddy_size", parse_buddy_required_size);
 #else /* !CONFIG_COLORING */
 #define init_col_heap_pages(x, y) init_heap_pages(x, y)
 
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:18:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:18:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284478.483998 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCV6-0007vh-9t; Fri, 04 Mar 2022 18:18:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284478.483998; Fri, 04 Mar 2022 18:17:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCV4-0007np-MY; Fri, 04 Mar 2022 18:17:58 +0000
Received: by outflank-mailman (input) for mailman id 284478;
 Fri, 04 Mar 2022 17:56:14 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC2H-0005R5-Rt
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:13 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 433b3b5c-9be3-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 18:48:13 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC2G-0000AI-G5; Fri, 04 Mar 2022 18:48:12 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 433b3b5c-9be3-11ec-8539-5f4723681683
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>,
	Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: [PATCH 25/36] xen/arm: bring back get_xen_paddr
Date: Fri,  4 Mar 2022 18:46:50 +0100
Message-Id: <20220304174701.1453977-26-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

In order to efficiently coloring Xen, we need to relocate it and move
the xen code to a unique memory region that will be marked as colored
for Xen itself. This region will be out target region and it will be
placed as high as possibile in RAM. To do that we need to use the old
get_xen_paddr function that was part of the relocation feature.
Moreover the size of the region we want to relocate is not equal to xen
code size anymore because of coloring.
In the worst case the target region must be greater than xen code
size * avail. colors. However the get_xen_paddr assumes to handle a
memory with size equals only to xen code region.
Add a new "size" parameter to handle also the coloring case.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
Acked-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
---
 xen/arch/arm/setup.c | 54 ++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 54 insertions(+)

diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c
index 0bfe12da57..8d980ce18d 100644
--- a/xen/arch/arm/setup.c
+++ b/xen/arch/arm/setup.c
@@ -570,6 +570,60 @@ static paddr_t __init next_module(paddr_t s, paddr_t *end)
     return lowest;
 }
 
+#ifdef CONFIG_COLORING
+/**
+ * get_xen_paddr - get physical address to relocate Xen to
+ *
+ * Xen is relocated to as near to the top of RAM as possible and
+ * aligned to a XEN_PADDR_ALIGN boundary.
+ */
+static paddr_t __init get_xen_paddr(uint32_t xen_size)
+{
+    struct meminfo *mi = &bootinfo.mem;
+    paddr_t min_size;
+    paddr_t paddr = 0;
+    int i;
+
+    min_size = (xen_size + (XEN_PADDR_ALIGN-1)) & ~(XEN_PADDR_ALIGN-1);
+
+    /* Find the highest bank with enough space. */
+    for ( i = 0; i < mi->nr_banks; i++ )
+    {
+        const struct membank *bank = &mi->bank[i];
+        paddr_t s, e;
+
+        if ( bank->size >= min_size )
+        {
+            e = consider_modules(bank->start, bank->start + bank->size,
+                                 min_size, XEN_PADDR_ALIGN, 0);
+            if ( !e )
+                continue;
+
+#ifdef CONFIG_ARM_32
+            /* Xen must be under 4GB */
+            if ( e > 0x100000000ULL )
+                e = 0x100000000ULL;
+            if ( e < bank->start )
+                continue;
+#endif
+
+            s = e - min_size;
+
+            if ( s > paddr )
+                paddr = s;
+        }
+    }
+
+    if ( !paddr )
+        panic("Not enough memory to relocate Xen\n");
+
+    printk("Placing Xen at 0x%"PRIpaddr"-0x%"PRIpaddr"\n",
+           paddr, paddr + min_size);
+
+    return paddr;
+}
+#endif
+
 static void __init init_pdx(void)
 {
     paddr_t bank_start, bank_size, bank_end;
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:18:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:18:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284481.484010 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCV9-00008s-9m; Fri, 04 Mar 2022 18:18:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284481.484010; Fri, 04 Mar 2022 18:18:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCV7-0008PX-4Z; Fri, 04 Mar 2022 18:18:01 +0000
Received: by outflank-mailman (input) for mailman id 284481;
 Fri, 04 Mar 2022 17:56:15 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC2W-0005R5-Uy
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:28 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4c4464a7-9be3-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 18:48:28 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC2V-0000Il-KE; Fri, 04 Mar 2022 18:48:27 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4c4464a7-9be3-11ec-8539-5f4723681683
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: [PATCH 34/36] doc, xl.cfg: introduce coloring configuration option
Date: Fri,  4 Mar 2022 18:46:59 +0100
Message-Id: <20220304174701.1453977-35-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

The color selection has to be specified in the configuration file of the
virtual machine with the new parameter 'colors'. This parameter
defines the colors to be assigned to that particular VM, expressed as a
list of ranges.
Add documentation for the new 'colors' parameter.

Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
---
 docs/man/xl.cfg.5.pod.in | 14 ++++++++++++++
 1 file changed, 14 insertions(+)

diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in
index b98d161398..98c2da0c9e 100644
--- a/docs/man/xl.cfg.5.pod.in
+++ b/docs/man/xl.cfg.5.pod.in
@@ -2865,6 +2865,20 @@ Currently, only the "sbsa_uart" model is supported for ARM.
 
 =back
 
+=over 4
+
+=item B<colors=[ "COLORS_RANGE", "COLORS_RANGE", ...]>
+
+Specify the color configuration for the guest. B<COLORS_RANGE> is expressed
+using colors numbers. The range starts always from 0 up to the maximum amount
+of available colors.
+The number of available colors depends on the LLC layout of the specific
+platform and determines the maximum allowed value.  This number can be either
+calculated or read from the output given by the hypervisor during boot, if
+DEBUG logging is enabled.
+
+=back
+
 =head3 x86
 
 =over 4
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:18:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:18:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284482.484019 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCVC-0000fh-12; Fri, 04 Mar 2022 18:18:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284482.484019; Fri, 04 Mar 2022 18:18:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCV9-0000Vv-Gz; Fri, 04 Mar 2022 18:18:03 +0000
Received: by outflank-mailman (input) for mailman id 284482;
 Fri, 04 Mar 2022 17:56:15 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WvCO=TP=xt3.it=ms@srs-se1.protection.inumbo.net>)
 id 1nQC2F-0005R5-Lt
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 17:48:11 +0000
Received: from radon.xt3.it (radon.xt3.it [2a01:4f8:190:4055::2])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 41dd6d85-9be3-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 18:48:10 +0100 (CET)
Received: from nb2assolieri.mat.unimo.it ([155.185.4.56] helo=localhost)
 by radon.xt3.it with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256)
 (Exim 4.89) (envelope-from <ms@xt3.it>)
 id 1nQC2E-00008L-6Q; Fri, 04 Mar 2022 18:48:10 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 41dd6d85-9be3-11ec-8539-5f4723681683
From: Marco Solieri <marco.solieri@minervasys.tech>
To: xen-devel@lists.xenproject.org
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>,
	Luca Miccio <206497@studenti.unimore.it>
Subject: [PATCH 22/36] xen/arch: init cache coloring conf for Xen
Date: Fri,  4 Mar 2022 18:46:47 +0100
Message-Id: <20220304174701.1453977-23-marco.solieri@minervasys.tech>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Luca Miccio <lucmiccio@gmail.com>

Add initialization for Xen coloring data. By default, use the lowest
color index available.

Benchmarking the VM interrupt response time provides an estimation of
LLC usage by Xen's most latency-critical runtime task.  Results on Arm
Cortex-A53 on Xilinx Zynq UltraScale+ XCZU9EG show that one color, which
reserves 64 KiB of L2, is enough to attain best responsiveness.

More colors are instead very likely to be needed on processors whose L1
cache is physically-indexed and physically-tagged, such as Cortex-A57.
In such cases, coloring applies to L1 also, and there typically are two
distinct L1-colors. Therefore, reserving only one color for Xen would
senselessly partitions a cache memory that is already private, i.e.
underutilize it. The default amount of Xen colors is thus set to one.

Signed-off-by: Luca Miccio <206497@studenti.unimore.it>
Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
---
 xen/arch/arm/coloring.c | 31 ++++++++++++++++++++++++++++++-
 1 file changed, 30 insertions(+), 1 deletion(-)

diff --git a/xen/arch/arm/coloring.c b/xen/arch/arm/coloring.c
index d1ac193a80..761414fcd7 100644
--- a/xen/arch/arm/coloring.c
+++ b/xen/arch/arm/coloring.c
@@ -30,10 +30,18 @@
 #include <asm/coloring.h>
 #include <asm/io.h>
 
+/* By default Xen uses the lowestmost color */
+#define XEN_COLOR_DEFAULT_MASK 0x0001
+#define XEN_COLOR_DEFAULT_NUM 1
+/* Current maximum useful colors */
+#define MAX_XEN_COLOR   128
+
 /* Number of color(s) assigned to Xen */
 static uint32_t xen_col_num;
 /* Coloring configuration of Xen as bitmask */
 static uint32_t xen_col_mask[MAX_COLORS_CELLS];
+/* Xen colors IDs */
+static uint32_t xen_col_list[MAX_XEN_COLOR];
 
 /* Number of color(s) assigned to Dom0 */
 static uint32_t dom0_col_num;
@@ -216,7 +224,7 @@ uint32_t get_max_colors(void)
 
 bool __init coloring_init(void)
 {
-    int i;
+    int i, rc;
 
     printk(XENLOG_INFO "Initialize XEN coloring: \n");
     /*
@@ -266,6 +274,27 @@ bool __init coloring_init(void)
     printk(XENLOG_INFO "Color bits in address: 0x%"PRIx64"\n", addr_col_mask);
     printk(XENLOG_INFO "Max number of colors: %u\n", max_col_num);
 
+    if ( !xen_col_num )
+    {
+        xen_col_mask[0] = XEN_COLOR_DEFAULT_MASK;
+        xen_col_num = XEN_COLOR_DEFAULT_NUM;
+        printk(XENLOG_WARNING "Xen color configuration not found. Using default\n");
+    }
+
+    printk(XENLOG_INFO "Xen color configuration: 0x%"PRIx32"%"PRIx32"%"PRIx32"%"PRIx32"\n",
+            xen_col_mask[3], xen_col_mask[2], xen_col_mask[1], xen_col_mask[0]);
+    rc = copy_mask_to_list(xen_col_mask, xen_col_list, xen_col_num);
+
+    if ( rc )
+        return false;
+
+    for ( i = 0; i < xen_col_num; i++ )
+        if ( xen_col_list[i] > (max_col_num - 1) )
+        {
+            printk(XENLOG_ERR "ERROR: max. color value not supported\n");
+            return false;
+        }
+
     return true;
 }
 
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:28:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:28:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284728.484069 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCfb-0008Jg-5q; Fri, 04 Mar 2022 18:28:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284728.484069; Fri, 04 Mar 2022 18:28:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCfb-0008JZ-2b; Fri, 04 Mar 2022 18:28:51 +0000
Received: by outflank-mailman (input) for mailman id 284728;
 Fri, 04 Mar 2022 18:28:49 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3cjd=TP=oracle.com=dongli.zhang@srs-se1.protection.inumbo.net>)
 id 1nQCfZ-0008JP-JF
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 18:28:49 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ede7a1fc-9be8-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 19:28:47 +0100 (CET)
Received: from pps.filterd (m0246631.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 224HCat4015308; 
 Fri, 4 Mar 2022 18:27:57 GMT
Received: from aserp3020.oracle.com (aserp3020.oracle.com [141.146.126.70])
 by mx0b-00069f02.pphosted.com with ESMTP id 3ek4ht2j6s-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Fri, 04 Mar 2022 18:27:56 +0000
Received: from pps.filterd (aserp3020.oracle.com [127.0.0.1])
 by aserp3020.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 224IH39h128219;
 Fri, 4 Mar 2022 18:27:55 GMT
Received: from nam12-dm6-obe.outbound.protection.outlook.com
 (mail-dm6nam12lp2171.outbound.protection.outlook.com [104.47.59.171])
 by aserp3020.oracle.com with ESMTP id 3ek4j92jn9-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Fri, 04 Mar 2022 18:27:55 +0000
Received: from BYAPR10MB2663.namprd10.prod.outlook.com (2603:10b6:a02:a9::20)
 by DM5PR10MB1849.namprd10.prod.outlook.com (2603:10b6:3:10b::16) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.16; Fri, 4 Mar
 2022 18:27:53 +0000
Received: from BYAPR10MB2663.namprd10.prod.outlook.com
 ([fe80::a0d5:610d:bcf:9b47]) by BYAPR10MB2663.namprd10.prod.outlook.com
 ([fe80::a0d5:610d:bcf:9b47%4]) with mapi id 15.20.5038.017; Fri, 4 Mar 2022
 18:27:53 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ede7a1fc-9be8-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=subject : to : cc :
 references : from : message-id : date : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=E41W9AB7/X2xx7UrWdagdqfWZZYBGIFtIK/VhE/09OQ=;
 b=lC4dawYdb0VDvsY75ChKSioIuBPZEi0JorEE4gTIX8lDtVtzBMK/SNXOgt1bwaENOShK
 HvNpEFIlzDDaqB7pO/Os4pXUI7jBwrvhZ9gh2PBuHIsM6q3w5TYwLSRxMA2HsaCRCEjf
 hQTA4/BvlLpty73Q7neEpY3oaF2+aAuH+Rl1TyT14xRQRiTc7r9HO0cn79HxphXKNQFK
 i8D2E1BS8iTU6+QX9t8RWDKnpWrvfh0MtF3NkMf++3lXkuyLNy4CK0J63xYWr5tiRi4O
 TN3WYFosocYY5hhAbAnKYQ0VQHcXSB4fJOQxf17vd2KxK5B+uwG+rF2RHP8vad9TSw6T Fg== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=gmmU5gxqtTr0n+hCoWI4tOvvTPlA0iNC9lieqh7D6KBl9+VYFbX5YZ7mE8PO7dt4YTfly8E9CZssq1vb1aLngQSZayuFw7PcvDL76LDW9nkRWaFrfCGyb+ubmAZZFGrJR2GMuLzk17XKR6avI8K0u2ekDP/FSHpAJ7DjGdL9pNcWomXxvUDhkK63I1jYZ+P0/Npitjr+XjEMkCue/ryuC9Xg8r4lpxz6CwJYHUjtAxJMkYhQE1UfqqnS5eHYSDC386C2ScrnmpJF8CWlgOepXDjwaAA/FRhqMTYSMSCW5lz8D+pJpDmHt+sV6oZbc25hJ/1+zOlPc43yW4XOGlou8w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=E41W9AB7/X2xx7UrWdagdqfWZZYBGIFtIK/VhE/09OQ=;
 b=UojoVXG6sM5Z8jSUl/ZAJrk99MoyYBQOncH3STNycdd0MLK/i9Xf9S0jeUTDpXqeCKiLp6dgkYErVC6u7e0HqDqm0Cx8UNug0J+pQ0Zw2jHzGKdPX38xlVr9YbVAktxZH579V5xI6e+al0V5qLERMBE8Etbdt3xfPOS+aNr0R9pjYI7XMFDukbjhqGia8fw5bNyTN10fgDuxWgohxdw0GkZRuJqP9pdHqXYnZWDL3KLvGpwWsdiGJe36tzs5vq4tBoiWj6LZ3FQH5wlbmOUzXlm7adA4aHWdlXW2fNT84pvJ9zMnNpVP/iGWIO1d4R15B5pj6phO/ddlvFqWza+7ag==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=E41W9AB7/X2xx7UrWdagdqfWZZYBGIFtIK/VhE/09OQ=;
 b=V/2Xe5dianinvARdqhn/uw3gmqOXWhpf7J/M2IJ++1z2wussNs2j65WKX856pegCRblzwxGLT6yIV2qwLjg04lQDTv7II2sI0djzD/6IE2pVQXnqQzGAQn+EMX1ONlQLHXX21GPKez9bPLAbaO3JVqVUBCszkdM7eKryUf8e5Fw=
Subject: Re: [PATCH 10/12] swiotlb: add a SWIOTLB_ANY flag to lift the low
 memory restriction
To: "Michael Kelley (LINUX)" <mikelley@microsoft.com>,
        Christoph Hellwig <hch@lst.de>,
        "iommu@lists.linux-foundation.org" <iommu@lists.linux-foundation.org>
Cc: "x86@kernel.org" <x86@kernel.org>,
        Anshuman Khandual <anshuman.khandual@arm.com>,
        Tom Lendacky <thomas.lendacky@amd.com>,
        Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
        Stefano Stabellini <sstabellini@kernel.org>,
        Boris Ostrovsky <boris.ostrovsky@oracle.com>,
        Juergen Gross
 <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
        David Woodhouse <dwmw2@infradead.org>,
        Lu Baolu <baolu.lu@linux.intel.com>,
        Robin Murphy <robin.murphy@arm.com>,
        "linux-arm-kernel@lists.infradead.org"
 <linux-arm-kernel@lists.infradead.org>,
        "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
        "linux-ia64@vger.kernel.org" <linux-ia64@vger.kernel.org>,
        "linux-mips@vger.kernel.org" <linux-mips@vger.kernel.org>,
        "linuxppc-dev@lists.ozlabs.org" <linuxppc-dev@lists.ozlabs.org>,
        "linux-riscv@lists.infradead.org" <linux-riscv@lists.infradead.org>,
        "linux-s390@vger.kernel.org" <linux-s390@vger.kernel.org>,
        "linux-hyperv@vger.kernel.org" <linux-hyperv@vger.kernel.org>,
        "tboot-devel@lists.sourceforge.net" <tboot-devel@lists.sourceforge.net>,
        "linux-pci@vger.kernel.org" <linux-pci@vger.kernel.org>
References: <20220301105311.885699-1-hch@lst.de>
 <20220301105311.885699-11-hch@lst.de>
 <MN0PR21MB3098F7AFC85BE5D83B0E64E5D7059@MN0PR21MB3098.namprd21.prod.outlook.com>
From: Dongli Zhang <dongli.zhang@oracle.com>
Message-ID: <556312e4-da86-b980-475c-1cfd7818ffdc@oracle.com>
Date: Fri, 4 Mar 2022 10:27:50 -0800
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
 Thunderbird/78.6.1
In-Reply-To: <MN0PR21MB3098F7AFC85BE5D83B0E64E5D7059@MN0PR21MB3098.namprd21.prod.outlook.com>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: SJ0PR03CA0035.namprd03.prod.outlook.com
 (2603:10b6:a03:33e::10) To BYAPR10MB2663.namprd10.prod.outlook.com
 (2603:10b6:a02:a9::20)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2de9445d-3444-479f-1615-08d9fe0cb225
X-MS-TrafficTypeDiagnostic: DM5PR10MB1849:EE_
X-Microsoft-Antispam-PRVS: 
	<DM5PR10MB1849E5A16214D1BA5A77FBE8F0059@DM5PR10MB1849.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR10MB2663.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(7416002)(186003)(5660300002)(44832011)(31686004)(110136005)(6506007)(508600001)(8936002)(38100700002)(2616005)(8676002)(53546011)(86362001)(66476007)(66556008)(66946007)(83380400001)(2906002)(6512007)(966005)(316002)(6486002)(4326008)(54906003)(31696002)(36756003)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?WDAxZkZDSWV6MFc4a2h2VnBGUzBNQjE3MTVNMWhmL3ZEbnJyaGlwS3VpK0NG?=
 =?utf-8?B?cTRXaU91WmFqNE1xYnZXczA1VjhUeHRpUlpaSDVjTzZvYjBVMGtmMU04OGVy?=
 =?utf-8?B?bTNHdGVrWm1MclZ5NHJrNzZnY0U4aUdBMk1rdHFJTitZbDhUVWRrSjlyNVZu?=
 =?utf-8?B?WUQxRUxzemhIWnRLa09Wa3UzdzNsL1hPTjMxY0FycGNHT0R5anNybG03dzlh?=
 =?utf-8?B?Q0NGbzZjQ1lUdDJ4UEhNTFBqbHhCc0QyTm9TNWZmNDM3N0dnWWJNd0V4VmJN?=
 =?utf-8?B?Q21LVkRac1pwZFVNb0RWTGExSDQ1SndoU21Cd2JFMHpSQzVwaFRLem9iR1hz?=
 =?utf-8?B?SkJuM01LVVZadFR4ek9sbGdsOUpjRVRYaUFYZ3oyZFVTd09SZHVrT1ZGNS9V?=
 =?utf-8?B?SzBHaSt6N3JrdUZldm55VVAzSlZ4T3N5NnVvcUg0Y0JGMkhERHFNZkJHY3oz?=
 =?utf-8?B?ZEhBRUJZYzUzcVRKb0cvdlNSbmF3bXkxWFFrSFh5UVl3RUR1eVdmbC9UNHQ4?=
 =?utf-8?B?cm9id2JkcTBWWWtxMzByU0RyLyt4THp4UXFIWVJIZnZJV3RyVE1sVUNrZks1?=
 =?utf-8?B?bG1LOEJWd2pTZGJpQzdjb0V5K2trazkxY3lkSldmRzZKaGxTb3VJSXIzSVFJ?=
 =?utf-8?B?RXhHc1VaQ0pNYUFmSWlGMWdQamhIMlNXQTdzRERod3IrVDhQbFRwTzYvd1o1?=
 =?utf-8?B?Z3E1dnN3VkdQbUgyZ0ZGZ0RPTUdoL3UzWFlmWDh6bE11VHFKUzlNclRvTTZu?=
 =?utf-8?B?RXpGNkJHNWh3a3V6UEgrS3pGS0YwWlB5a1pBaUZHek0yczBQdFZLOXoyaVFZ?=
 =?utf-8?B?Sm1GQ3hNSDNRa1NvTDZIOHVqdnRqU0ZIV0thQzNHbkNJVlRNa3A0Z1JRaDNZ?=
 =?utf-8?B?U2E0Z0kxeEkzbUZuVFFsSzROTENZWHRjT2R2SmhZVnhGRVhUbGRPaUVKUHJF?=
 =?utf-8?B?cEc0Z29FZlBZVVdSbXRXcWV1N3hibU93TTh2aDF6bW91TWFLcTNnYVlhSzFJ?=
 =?utf-8?B?dEpKdmdGd1M2MHkrcmZhNkZOREZLZDh0aFZXamQ3dTJEbzVOWVlXdGxjNVNZ?=
 =?utf-8?B?SjNqcTR6YUNFdmRzTVMyaGZYVlBPWXBlbkQ0cWhiUWFDbWJGNTZsbG1nekVV?=
 =?utf-8?B?dDErcmZHM214RFZYUXl3WVI0RTdCWnc0TUJqSHFCTWVFTzFCWmhrUkRGaDJx?=
 =?utf-8?B?bVlqUXdudmd5d0FWL0VVS0VoQ3dUSzFoZmpxeGdXNUFqeCt1ZXBWTDcyNnVP?=
 =?utf-8?B?WjZUa1M5U0xaQ3JtcEhkWDZBc0ErVHp3K1ZJOTZQaFN2d21FdjlSYVFtQTJk?=
 =?utf-8?B?S1ExUmNnT2ZVUWhJdmRrQTZlWlAyd05MR2R1NldTMTB4TllGL2RROTVzK3ZL?=
 =?utf-8?B?MWlVdkZxblNWSGhnb3MyTS9xNDB6K3d1dkp4bmFlNnhEZ0RyV2I3ZndwNU5P?=
 =?utf-8?B?cEpuaDhlbVY0T25sUFBXdjJUTjlrQWc0UzJ6dktoSWR4VHZhdzc5Skh1Wm1t?=
 =?utf-8?B?QnVUZlZQeVplUlY3Tm9uT1ZmOUhWTFZMcVJDdERrM09WbVJ6S0sxRXFUTTY5?=
 =?utf-8?B?aU42V2pSOHpyelZOeWFSTmxyL2xDME53N1dGeTRiU3kxeVI5QzRBZENtQU9y?=
 =?utf-8?B?U2szeCtMQ2tNUCtHMXFmR0d6cGNzSXhtQUh0TVRpTDZaYzllWFZhc1ZSWkd0?=
 =?utf-8?B?WGJVelNBTEE5dnUyZWdjTUhRSFdwZ0RXWGlOQWlqQ3AvWk1BNlIrM3gvL0Jl?=
 =?utf-8?B?RzROUStBemFGRmwzYk1ENHlMVy80ZlAxV1FoM3pHVnpYVFVKOWxCWEZDQVJa?=
 =?utf-8?B?cnlNa0JnT2lSTHk1bnc2L3JNRFJUM3NtU0NxTGx1T0hvN0ZqRUFIOHNxbnNo?=
 =?utf-8?B?WmpXSSt3aUtOTStnakZRWFRhU0ZXWEhuM1NocHRXZ0lnaUlKeFNUV0laS2dB?=
 =?utf-8?B?d0sveUhUOStDdENwTUdPYVkyK2RjYU5FZHNUbTJaWVpKRmVjOE1kaU4ycE5T?=
 =?utf-8?B?K25aeC9hbWFCUzd4b0s2VlV3NXVlYXcrSGpId3ZobWl5RjczZ2FCZGpObEl3?=
 =?utf-8?B?bWZNa3RvRFBaU0xpR1VSU05vWm02MHZFV1Bnd01OUVFFdmRUdERsTW9KUUg4?=
 =?utf-8?B?TDdaUnAvWnJwSncyK25FeUhaaTA5RXFsMTFaQnhjcVpNSkxtN2VucE54NzNz?=
 =?utf-8?Q?8krf42B7GoJ7C4N+k6IUVJ2E4YZ1f/POPV04CHKAW+Eu?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 2de9445d-3444-479f-1615-08d9fe0cb225
X-MS-Exchange-CrossTenant-AuthSource: BYAPR10MB2663.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 18:27:53.4129
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: GKjFR8zhBR98XVYezKj18C7MPnB6fFzjs1UYx9YrejjusZjdFSq5Qum0RiztGuGIRBVn8bLyEMuMzoSyLt3oHA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR10MB1849
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10276 signatures=690470
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 adultscore=0 phishscore=0 bulkscore=0
 malwarescore=0 mlxscore=0 spamscore=0 suspectscore=0 mlxlogscore=999
 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2202240000
 definitions=main-2203040092
X-Proofpoint-ORIG-GUID: 5zkTEFZIUil-jkep0W3bngAeAxQzK4mA
X-Proofpoint-GUID: 5zkTEFZIUil-jkep0W3bngAeAxQzK4mA

Hi Michael,

On 3/4/22 10:12 AM, Michael Kelley (LINUX) wrote:
> From: Christoph Hellwig <hch@lst.de> Sent: Tuesday, March 1, 2022 2:53 AM
>>
>> Power SVM wants to allocate a swiotlb buffer that is not restricted to low memory for
>> the trusted hypervisor scheme.  Consolidate the support for this into the swiotlb_init
>> interface by adding a new flag.
> 
> Hyper-V Isolated VMs want to do the same thing of not restricting the swiotlb
> buffer to low memory.  That's what Tianyu Lan's patch set[1] is proposing.
> Hyper-V synthetic devices have no DMA addressing limitations, and the
> likelihood of using a PCI pass-thru device with addressing limitations in an
> Isolated VM seems vanishingly small.
> 
> So could use of the SWIOTLB_ANY flag be generalized?  Let Hyper-V init
> code set the flag before swiotlb_init() is called.  Or provide a CONFIG
> variable that Hyper-V Isolated VMs could set.

I used to send 64-bit swiotlb, while at that time people thought it was the same
as Restricted DMA patchset.

https://lore.kernel.org/all/20210203233709.19819-1-dongli.zhang@oracle.com/

However, I do not think Restricted DMA patchset is going to supports 64-bit (or
high memory) DMA. Is this what you are looking for?

Dongli Zhang

> 
> Michael
> 
> [1] https://urldefense.com/v3/__https://lore.kernel.org/lkml/20220209122302.213882-1-ltykernel@gmail.com/__;!!ACWV5N9M2RV99hQ!fUx4fMgdQIrqJDDy-pbv9xMeyHX0rC6iN8176LWjylI2_lsjy03gysm0-lAbV1Yb7_g$ 
> 
>>
>> Signed-off-by: Christoph Hellwig <hch@lst.de>
>> ---
>>  arch/powerpc/include/asm/svm.h       |  4 ----
>>  arch/powerpc/include/asm/swiotlb.h   |  1 +
>>  arch/powerpc/kernel/dma-swiotlb.c    |  1 +
>>  arch/powerpc/mm/mem.c                |  5 +----
>>  arch/powerpc/platforms/pseries/svm.c | 26 +-------------------------
>>  include/linux/swiotlb.h              |  1 +
>>  kernel/dma/swiotlb.c                 |  9 +++++++--
>>  7 files changed, 12 insertions(+), 35 deletions(-)
>>
>> diff --git a/arch/powerpc/include/asm/svm.h b/arch/powerpc/include/asm/svm.h
>> index 7546402d796af..85580b30aba48 100644
>> --- a/arch/powerpc/include/asm/svm.h
>> +++ b/arch/powerpc/include/asm/svm.h
>> @@ -15,8 +15,6 @@ static inline bool is_secure_guest(void)
>>  	return mfmsr() & MSR_S;
>>  }
>>
>> -void __init svm_swiotlb_init(void);
>> -
>>  void dtl_cache_ctor(void *addr);
>>  #define get_dtl_cache_ctor()	(is_secure_guest() ? dtl_cache_ctor : NULL)
>>
>> @@ -27,8 +25,6 @@ static inline bool is_secure_guest(void)
>>  	return false;
>>  }
>>
>> -static inline void svm_swiotlb_init(void) {}
>> -
>>  #define get_dtl_cache_ctor() NULL
>>
>>  #endif /* CONFIG_PPC_SVM */
>> diff --git a/arch/powerpc/include/asm/swiotlb.h
>> b/arch/powerpc/include/asm/swiotlb.h
>> index 3c1a1cd161286..4203b5e0a88ed 100644
>> --- a/arch/powerpc/include/asm/swiotlb.h
>> +++ b/arch/powerpc/include/asm/swiotlb.h
>> @@ -9,6 +9,7 @@
>>  #include <linux/swiotlb.h>
>>
>>  extern unsigned int ppc_swiotlb_enable;
>> +extern unsigned int ppc_swiotlb_flags;
>>
>>  #ifdef CONFIG_SWIOTLB
>>  void swiotlb_detect_4g(void);
>> diff --git a/arch/powerpc/kernel/dma-swiotlb.c b/arch/powerpc/kernel/dma-
>> swiotlb.c
>> index fc7816126a401..ba256c37bcc0f 100644
>> --- a/arch/powerpc/kernel/dma-swiotlb.c
>> +++ b/arch/powerpc/kernel/dma-swiotlb.c
>> @@ -10,6 +10,7 @@
>>  #include <asm/swiotlb.h>
>>
>>  unsigned int ppc_swiotlb_enable;
>> +unsigned int ppc_swiotlb_flags;
>>
>>  void __init swiotlb_detect_4g(void)
>>  {
>> diff --git a/arch/powerpc/mm/mem.c b/arch/powerpc/mm/mem.c index
>> e1519e2edc656..a4d65418c30a9 100644
>> --- a/arch/powerpc/mm/mem.c
>> +++ b/arch/powerpc/mm/mem.c
>> @@ -249,10 +249,7 @@ void __init mem_init(void)
>>  	 * back to to-down.
>>  	 */
>>  	memblock_set_bottom_up(true);
>> -	if (is_secure_guest())
>> -		svm_swiotlb_init();
>> -	else
>> -		swiotlb_init(ppc_swiotlb_enable, 0);
>> +	swiotlb_init(ppc_swiotlb_enable, ppc_swiotlb_flags);
>>  #endif
>>
>>  	high_memory = (void *) __va(max_low_pfn * PAGE_SIZE); diff --git
>> a/arch/powerpc/platforms/pseries/svm.c b/arch/powerpc/platforms/pseries/svm.c
>> index c5228f4969eb2..3b4045d508ec8 100644
>> --- a/arch/powerpc/platforms/pseries/svm.c
>> +++ b/arch/powerpc/platforms/pseries/svm.c
>> @@ -28,7 +28,7 @@ static int __init init_svm(void)
>>  	 * need to use the SWIOTLB buffer for DMA even if dma_capable() says
>>  	 * otherwise.
>>  	 */
>> -	swiotlb_force = SWIOTLB_FORCE;
>> +	ppc_swiotlb_flags |= SWIOTLB_ANY | SWIOTLB_FORCE;
>>
>>  	/* Share the SWIOTLB buffer with the host. */
>>  	swiotlb_update_mem_attributes();
>> @@ -37,30 +37,6 @@ static int __init init_svm(void)  }  machine_early_initcall(pseries,
>> init_svm);
>>
>> -/*
>> - * Initialize SWIOTLB. Essentially the same as swiotlb_init(), except that it
>> - * can allocate the buffer anywhere in memory. Since the hypervisor doesn't have
>> - * any addressing limitation, we don't need to allocate it in low addresses.
>> - */
>> -void __init svm_swiotlb_init(void)
>> -{
>> -	unsigned char *vstart;
>> -	unsigned long bytes, io_tlb_nslabs;
>> -
>> -	io_tlb_nslabs = (swiotlb_size_or_default() >> IO_TLB_SHIFT);
>> -	io_tlb_nslabs = ALIGN(io_tlb_nslabs, IO_TLB_SEGSIZE);
>> -
>> -	bytes = io_tlb_nslabs << IO_TLB_SHIFT;
>> -
>> -	vstart = memblock_alloc(PAGE_ALIGN(bytes), PAGE_SIZE);
>> -	if (vstart && !swiotlb_init_with_tbl(vstart, io_tlb_nslabs, false))
>> -		return;
>> -
>> -
>> -	memblock_free(vstart, PAGE_ALIGN(io_tlb_nslabs << IO_TLB_SHIFT));
>> -	panic("SVM: Cannot allocate SWIOTLB buffer");
>> -}
>> -
>>  int set_memory_encrypted(unsigned long addr, int numpages)  {
>>  	if (!cc_platform_has(CC_ATTR_MEM_ENCRYPT))
>> diff --git a/include/linux/swiotlb.h b/include/linux/swiotlb.h index
>> dcecf953f7997..ee655f2e4d28b 100644
>> --- a/include/linux/swiotlb.h
>> +++ b/include/linux/swiotlb.h
>> @@ -15,6 +15,7 @@ struct scatterlist;
>>
>>  #define SWIOTLB_VERBOSE	(1 << 0) /* verbose initialization */
>>  #define SWIOTLB_FORCE	(1 << 1) /* force bounce buffering */
>> +#define SWIOTLB_ANY	(1 << 2) /* allow any memory for the buffer */
>>
>>  /*
>>   * Maximum allowable number of contiguous slabs to map, diff --git
>> a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c index 1a40c71c4d51a..77cf73dc20a78
>> 100644
>> --- a/kernel/dma/swiotlb.c
>> +++ b/kernel/dma/swiotlb.c
>> @@ -275,8 +275,13 @@ void __init swiotlb_init(bool addressing_limit, unsigned int
>> flags)
>>  	if (swiotlb_force_disable)
>>  		return;
>>
>> -	/* Get IO TLB memory from the low pages */
>> -	tlb = memblock_alloc_low(bytes, PAGE_SIZE);
>> +	/*
>> +	 * By default allocate the bonuce buffer memory from low memory.
>> +	 */
>> +	if (flags & SWIOTLB_ANY)
>> +		tlb = memblock_alloc(bytes, PAGE_SIZE);
>> +	else
>> +		tlb = memblock_alloc_low(bytes, PAGE_SIZE);
>>  	if (!tlb)
>>  		goto fail;
>>  	if (swiotlb_init_with_tbl(tlb, default_nslabs, flags))
>> --
>> 2.30.2
> 
> 


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:38:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:38:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284843.484080 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCoI-0001ri-20; Fri, 04 Mar 2022 18:37:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284843.484080; Fri, 04 Mar 2022 18:37:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQCoH-0001rb-V3; Fri, 04 Mar 2022 18:37:49 +0000
Received: by outflank-mailman (input) for mailman id 284843;
 Fri, 04 Mar 2022 18:37:48 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nQCoG-0001rV-FY
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 18:37:48 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nQCoG-0000HR-0w; Fri, 04 Mar 2022 18:37:48 +0000
Received: from [54.239.6.187] (helo=[192.168.25.28])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nQCoF-0007rU-QB; Fri, 04 Mar 2022 18:37:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=OiEr1Mg00GpX/BUP7ZdgfmACwj68tgb1l4nhZXCS5Tk=; b=SZPsdWHkIOfJeKDfO8n0CnMpyL
	7Mg9cuMQYPHtCQTk8CJ7IqPJdKywcGSMa8NrsMn5skYZL3bewPWpfUu/Jmj4n0E40GSf5Xx5rz+y3
	visZtEd+aUU3e31GYawXLxEtKEA76DY+XRSZSCcJQqfQJdYTACrOs+iXlzFbHwbUJS4s=;
Message-ID: <18284189-7aae-25ca-14b6-48f9c41e2973@xen.org>
Date: Fri, 4 Mar 2022 18:37:44 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [XEN v9 4/4] xen/arm64: io: Handle data abort due to cache
 maintenance instructions
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>,
 xen-devel@lists.xenproject.org
Cc: sstabellini@kernel.org, stefanos@xilinx.com, Volodymyr_Babchuk@epam.com,
 bertrand.marquis@arm.com, andrew.cooper3@citrix.com,
 george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org,
 roger.pau@citrix.com
References: <20220301124022.10168-1-ayankuma@xilinx.com>
 <20220301124022.10168-5-ayankuma@xilinx.com>
 <26ee167e-16ea-e358-f390-dc96961d3234@xen.org>
 <8f78044e-aca2-5919-1841-15989daeb986@xilinx.com>
 <26107eb2-d38d-d6b5-bdaa-d5058e964623@xen.org>
 <9be4bf1c-0d56-2917-1404-f56590a8034d@xilinx.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <9be4bf1c-0d56-2917-1404-f56590a8034d@xilinx.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit



On 04/03/2022 14:40, Ayan Kumar Halder wrote:
> Hi Julien,

Hi,

> I have a question.
> 
> On 04/03/2022 12:49, Julien Grall wrote:
>>
>>
>> On 04/03/2022 12:13, Ayan Kumar Halder wrote:
>>> Hi Julien,
>>
>> Hi,
>>
>>>
>>> On 04/03/2022 10:46, Julien Grall wrote:
>>>> Hi Ayan,
>>>>
>>>> On 01/03/2022 12:40, Ayan Kumar Halder wrote:
>>>>> When the data abort is caused due to cache maintenance for an address,
>>>>> there are two scenarios:-
>>>>>
>>>>> 1. Address belonging to a non emulated region - For this, Xen should
>>>>> set the corresponding bit in the translation table entry to valid and
>>>>> return to the guest to retry the instruction. This can happen 
>>>>> sometimes
>>>>> as Xen need to set the translation table entry to invalid. (for eg
>>>>> 'Break-Before-Make' sequence).
>>>>>
>>>>> 2. Address belongs to an emulated region - Xen should ignore the
>>>>> instruction (ie increment the PC) and return to the guest.
>>>>
>>>> I would be explicit and say something along the lines:
>>>>
>>>> "Xen doesn't cache data for emulated regions. So we can safely 
>>>> ignore them".
>>>>
>>>> There is a third scenarios:
>>>>
>>>> The address belongs to neither an emulated region nor has a valid 
>>>> mapping in the P2M.
>>>
>>> To check this, we should test "try_handle_mmio() == IO_UNHANDLED". If 
>>> so then send an abort to the guest.
>>>
>>> Is this correct ?
>> I think it would be too late because if the region is emulated, then 
>> we would have already tried to handle it.
>>
>> Instead, I think we need to check after we confirmed that the region 
>> is emulated or we need to forward to an IOREQ server.
>>
>> So the check would have to be duplicated here.
> 
> When do we know that a particular address does not belong to an emulated 
> MMIO region ?
> 
> Is this after both "find_mmio_handler()" and "ioreq_server_select()" 
> have returned NULL ?

Correct.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 18:50:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 18:50:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284856.484091 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQD0D-0004pE-BK; Fri, 04 Mar 2022 18:50:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284856.484091; Fri, 04 Mar 2022 18:50:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQD0D-0004p7-7q; Fri, 04 Mar 2022 18:50:09 +0000
Received: by outflank-mailman (input) for mailman id 284856;
 Fri, 04 Mar 2022 18:50:08 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nQD0C-0004oy-1o
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 18:50:08 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nQD0B-0000en-KZ; Fri, 04 Mar 2022 18:50:07 +0000
Received: from [54.239.6.187] (helo=[192.168.25.28])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nQD0B-0000Nt-EL; Fri, 04 Mar 2022 18:50:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=sHm24ysoP3DaXGZ/UkTU9i8EpmDacYnpcvoImI8GSBQ=; b=vKWPyPuFG2ou4SNQzKYCWUfOAB
	jQAMqX2JWfNoO2sGt/I+5KElRc0m0GTfWn6LcA1VWm0toIAu0cJIfPctq7EyC+Rz+AphIqkyp7Naa
	I7qNVUsZLMF8Bv82Yz1VHZxzhPYOx9tZnVhyZdLMIcdGEs39oCdNMRkntveYPdp0Cj9o=;
Message-ID: <69ad61c1-8ba6-effa-d8f2-de2567c6aad1@xen.org>
Date: Fri, 4 Mar 2022 18:50:05 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH 01/36] Revert "xen/arm: setup: Add Xen as boot module
 before printing all boot modules"
To: Marco Solieri <marco.solieri@minervasys.tech>,
 xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-2-marco.solieri@minervasys.tech>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220304174701.1453977-2-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Marco,

On 04/03/2022 17:46, Marco Solieri wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> This reverts commit 48fb2a9deba11ee48dde21c5c1aa93b4d4e1043b.
Can you explain why you need to revert this patch?

Also, there is a missing signed-off-by for both Luca and you.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 19:03:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 19:03:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284863.484101 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQDDN-0006eQ-HG; Fri, 04 Mar 2022 19:03:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284863.484101; Fri, 04 Mar 2022 19:03:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQDDN-0006eJ-EA; Fri, 04 Mar 2022 19:03:45 +0000
Received: by outflank-mailman (input) for mailman id 284863;
 Fri, 04 Mar 2022 19:03:44 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQDDM-0006e9-0c; Fri, 04 Mar 2022 19:03:44 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQDDL-0000v2-TO; Fri, 04 Mar 2022 19:03:43 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQDDL-0001Ft-Hf; Fri, 04 Mar 2022 19:03:43 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQDDL-0001kL-H4; Fri, 04 Mar 2022 19:03:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=M8sa6uOFAgXGfhhrvoLHAGepmFYeJAIJ295Z2Gg6CGw=; b=GttYTDIz7Cd4JnqVoeZyd15aSA
	aG7hzXV6MsO+2js/oEPcnIkM2iJBQ+yDsb7QDKsSC9g014uRuGrG15KXNGGHlGmvCSZ6pNyisA19y
	uqMPPQhQkOXBiGzcDssh2HwnkrI4slTGrjCYwwLxIDNFpG6FpF27HP5w+vYrkd3FfouE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168401-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168401: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4a68176cb548902cad93e6ebb5957d0cac94d297
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 04 Mar 2022 19:03:43 +0000

flight 168401 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168401/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4a68176cb548902cad93e6ebb5957d0cac94d297
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    4 days
Failing since        168258  2022-03-01 01:55:31 Z    3 days   33 attempts
Testing same since   168397  2022-03-04 09:41:33 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 351 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 19:47:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 19:47:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284878.484112 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQDtN-0003rV-Vq; Fri, 04 Mar 2022 19:47:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284878.484112; Fri, 04 Mar 2022 19:47:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQDtN-0003rO-Sw; Fri, 04 Mar 2022 19:47:09 +0000
Received: by outflank-mailman (input) for mailman id 284878;
 Fri, 04 Mar 2022 19:47:09 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nQDtN-0003rI-Cq
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 19:47:09 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nQDtM-0001f4-Nx; Fri, 04 Mar 2022 19:47:08 +0000
Received: from [54.239.6.187] (helo=[192.168.25.28])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nQDtM-00052L-HP; Fri, 04 Mar 2022 19:47:08 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=MHZ1ghPOuUlg0YkSfRK3QND5tj+Y12pFl7behRxNpkc=; b=HfKTR+0Pc1XCPBgBLKqEVYiUXb
	LkNmVsC+wTVExQ/r6P6hwWPniI88NXJggrHFYl36j4h3JkJl30mrMBEZFW0U7esDqt0iKZ4CKoalI
	oGhxY1/2MjRUxVnUu2ZsVOswXvYK7GIzbHyuAOp+VRWxWYFZF/JOekBeRbYGcPrLG+Y8=;
Message-ID: <d6216110-7cf0-b647-8a5d-ec5f8f437941@xen.org>
Date: Fri, 4 Mar 2022 19:47:06 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH 27/36] xen/arch: add coloring support for Xen
To: Marco Solieri <marco.solieri@minervasys.tech>,
 xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-28-marco.solieri@minervasys.tech>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220304174701.1453977-28-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 04/03/2022 17:46, Marco Solieri wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> Introduce a new implementation of setup_pagetables that uses coloring
> logic in order to isolate Xen code using its color selection.
> Page tables construction is essentially copied, except for the xenmap
> table, where coloring logic is needed.  Given the absence of a contiguous
> physical mapping, pointers to next level tables need to be manually
> calculated.

The implementation of setup_pagetables() is not compliant to the Arm 
Arm. And I have plan to completely get rid of it.

The main part that is not compliant is switch_ttbr() because it keeps 
the MMU on. We should switch the MMU off, update the TTBR and then 
switch on the MMU. This implies that we need an identity mapping of the 
part of Xen that will run with MMU off.

I understand that rebuilding the page-tables and therefore switching the 
TTBR will be necessary for cache coloring. So before any new use, I 
would like the implementation of switch_ttbr() to be fixed.

What we will need to do is find space in the virtual layout that also 
match a physical address. With that in place, we could use the mapping 
to switch between TTBR.

[...]

>   void __init setup_pagetables(unsigned long boot_phys_offset, paddr_t xen_paddr)
> @@ -721,6 +885,7 @@ void __init setup_pagetables(unsigned long boot_phys_offset, paddr_t xen_paddr)
>       per_cpu(xen_dommap, 0) = cpu0_dommap;
>   #endif
>   }
> +#endif /* !CONFIG_COLORING */
>   
>   static void clear_boot_pagetables(void)
>   {
> @@ -735,6 +900,9 @@ static void clear_boot_pagetables(void)
>   #endif
>       clear_table(boot_second);
>       clear_table(boot_third);
> +#ifdef CONFIG_COLORING
> +    clear_table(boot_colored_xen);
> +#endif

AFAICT, this is going to clear the boot pagetables in the cache coloring 
version of Xen. However, the secondary CPUs will build their page-tables 
using the version in the old Xen.

So you will need to update the code to clear the correct boot page tables.

[...]

> diff --git a/xen/arch/arm/psci.c b/xen/arch/arm/psci.c
> index 0c90c2305c..d443fac6a2 100644
> --- a/xen/arch/arm/psci.c
> +++ b/xen/arch/arm/psci.c
> @@ -25,6 +25,7 @@
>   #include <asm/cpufeature.h>
>   #include <asm/psci.h>
>   #include <asm/acpi.h>
> +#include <asm/coloring.h>
>   
>   /*
>    * While a 64-bit OS can make calls with SMC32 calling conventions, for
> @@ -49,7 +50,8 @@ int call_psci_cpu_on(int cpu)
>   {
>       struct arm_smccc_res res;
>   
> -    arm_smccc_smc(psci_cpu_on_nr, cpu_logical_map(cpu), __pa(init_secondary),
> +    arm_smccc_smc(psci_cpu_on_nr, cpu_logical_map(cpu),
> +                  __pa(virt_boot_xen((vaddr_t)init_secondary)),
>                     &res);
>   
>       return PSCI_RET(res);
> diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c
> index 13b10515a8..294b806120 100644
> --- a/xen/arch/arm/setup.c
> +++ b/xen/arch/arm/setup.c
> @@ -924,6 +924,7 @@ void __init start_xen(unsigned long boot_phys_offset,
>       struct domain *d;
>       int rc;
>       paddr_t xen_paddr = (paddr_t)(_start + boot_phys_offset);
> +    uint32_t xen_size = (_end - _start);
>   
>       dcache_line_bytes = read_dcache_line_bytes();
>   
> @@ -952,13 +953,16 @@ void __init start_xen(unsigned long boot_phys_offset,
>       if ( !coloring_init() )
>           panic("Xen Coloring support: setup failed\n");
>   
> +    xen_size = XEN_COLOR_MAP_SIZE;
> +#ifdef CONFIG_COLORING
> +    xen_paddr = get_xen_paddr(xen_size);
> +#endif
> +
>       /* Register Xen's load address as a boot module. */
> -    xen_bootmodule = add_boot_module(BOOTMOD_XEN, xen_paddr,
> -                             (paddr_t)(uintptr_t)(_end - _start + 1), false);
> +    xen_bootmodule = add_boot_module(BOOTMOD_XEN, xen_paddr, xen_size, false);

How do you plan to exclude the memory allocate the cache coloring version?

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 20:13:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 20:13:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284889.484124 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQEJ0-0007hL-4O; Fri, 04 Mar 2022 20:13:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284889.484124; Fri, 04 Mar 2022 20:13:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQEJ0-0007hE-14; Fri, 04 Mar 2022 20:13:38 +0000
Received: by outflank-mailman (input) for mailman id 284889;
 Fri, 04 Mar 2022 20:13:36 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nQEIy-0007h8-Ga
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 20:13:36 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nQEIx-0002Ep-Dr; Fri, 04 Mar 2022 20:13:35 +0000
Received: from [54.239.6.187] (helo=[192.168.25.28])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nQEIx-0007sl-7H; Fri, 04 Mar 2022 20:13:35 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=tJj7v32esvWemNFcgx8xD0UHoLBoAcpPBekeDO/8w2k=; b=rMpEbutJ16/MpRIkoE2AhwRcYB
	8KWuaIYIobjavZW+D8qMZarIk5GbtwL+cQEqJhKLmpumGFoHm0Tb9x/v8oD9H57mmNKfAwaYrL1vh
	iPeUBx3qXzv8hPKdVLi4qZzB4nG/AWsXqwY0/Xbww1Ikidi0cqCrdT81W/wxMV+6CQ28=;
Message-ID: <584d1043-5085-7dc1-228f-ce1338759753@xen.org>
Date: Fri, 4 Mar 2022 20:13:32 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH 08/36] xen/arm: add colored flag to page struct
To: Marco Solieri <marco.solieri@minervasys.tech>,
 xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-9-marco.solieri@minervasys.tech>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220304174701.1453977-9-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 04/03/2022 17:46, Marco Solieri wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> A new allocator enforcing a cache-coloring configuration is going to be
> introduced.  We thus need to distinguish the memory pages assigned to,
> and managed by, such colored allocator from the ordinary buddy
> allocator's ones.  Add a color flag to the page structure.
> 
> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
> ---
>   xen/arch/arm/include/asm/mm.h | 4 ++++
>   1 file changed, 4 insertions(+)
> 
> diff --git a/xen/arch/arm/include/asm/mm.h b/xen/arch/arm/include/asm/mm.h
> index 487be7cf59..9ac1767595 100644
> --- a/xen/arch/arm/include/asm/mm.h
> +++ b/xen/arch/arm/include/asm/mm.h
> @@ -88,6 +88,10 @@ struct page_info
>            */
>           u32 tlbflush_timestamp;
>       };
> +
> +    /* Is page managed by the cache-colored allocator? */
> +    bool colored;

struct page_info is going to be used quite a lot. In fact, there is one 
per RAM page. So we need to avoid growing the structure.

For Arm64, there is a 4 bytes padding here. But for arm32, there are 
none. So the size will increase by another 8 bytes.

In this case, I would use a bit in count_info.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 20:19:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 20:19:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284896.484135 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQEOd-0000CU-Qy; Fri, 04 Mar 2022 20:19:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284896.484135; Fri, 04 Mar 2022 20:19:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQEOd-0000CN-Ms; Fri, 04 Mar 2022 20:19:27 +0000
Received: by outflank-mailman (input) for mailman id 284896;
 Fri, 04 Mar 2022 20:19:26 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=/RWa=TP=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nQEOc-0000CH-Gs
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 20:19:26 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 621e6d9d-9bf8-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 21:19:25 +0100 (CET)
Received: from pps.filterd (m0246630.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 224HFvRS019110; 
 Fri, 4 Mar 2022 20:18:34 GMT
Received: from userp3020.oracle.com (userp3020.oracle.com [156.151.31.79])
 by mx0b-00069f02.pphosted.com with ESMTP id 3ek4hvar45-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Fri, 04 Mar 2022 20:18:34 +0000
Received: from pps.filterd (userp3020.oracle.com [127.0.0.1])
 by userp3020.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 224KBTqf043959;
 Fri, 4 Mar 2022 20:18:33 GMT
Received: from nam10-mw2-obe.outbound.protection.outlook.com
 (mail-mw2nam10lp2105.outbound.protection.outlook.com [104.47.55.105])
 by userp3020.oracle.com with ESMTP id 3ek4jhcggj-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Fri, 04 Mar 2022 20:18:33 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
 by BN7PR10MB2418.namprd10.prod.outlook.com (2603:10b6:406:cb::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Fri, 4 Mar
 2022 20:18:30 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::6d20:6694:a16:56f7]) by BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::6d20:6694:a16:56f7%3]) with mapi id 15.20.5038.017; Fri, 4 Mar 2022
 20:18:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 621e6d9d-9bf8-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=g1zl/jtSQUcv6zq5IH8TsnBi6aRZ+imTi1+joGXQAjg=;
 b=X67tZTA/uVEO4CnS81ENaHWi3A7hafrQn4IZcb+uWh7Adspl7Uyq9ezdqYNszdSqAvE8
 S33Qx0lx3EZtxt9qdgPtgA+lvoT3/pprjdJiaQTO6lh5IQOOKAPiZZsJxg5L3BF1O+7A
 ZF6lIBlNBEmybXxN22J6r7hd7rVP490gx70yeVBKC7yXcQoXJK5qXCqphvXKkHCk7nnY
 D/7W5/5lj6TCxTLQEh3O50NP/2k+fkdua7I+Gk1kz+L92GrwZR0Ni/A6di5Nlt3stnxY
 KCa6zTNvhQFrEpje7SsUNdbfc9dkIvekI2yeS4sFQMtZKIW1arYvBh0PLoqg+dvwzqFs uA== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=OhGarKdRSorgd/CEDvE1i2bAtbM6QhxahtIAy3DZCcJWfUcdlz1lKSu+KVGSSTi6ETYg2DbHsaxEudu37OePhs/kfYUY/f+qpFCPLB8NqErO82r95sf0buZKEFWmQZuU9EUuhEQEyRuLIqBQarsJTD087W8WyCQxg8MXJnkgHHE/ENEB8ZsPD6tnEgIVCVmYUVcbUcbzk6nxGiG5kZGTyf77H5ZZBxqCSG3E2Q7boGtVTxSq7Qm6V6yj2b5LhcsMrScFk9S4ctqnWbQTlxAYMXsokcuKNqfUrNwymZr7t5XM/uOtBKs82YRBOvzc/MAg6801FOmlKIw9B+DweOHnSg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=g1zl/jtSQUcv6zq5IH8TsnBi6aRZ+imTi1+joGXQAjg=;
 b=PtvWc7g9PEdMkY7/88sO2XzUd3hhiS8fkVbr4Z4W8KXNfwRymBm+UO/OYPEr5uIkcjarU4IYcEMLcWZYPobe3tmOjD5JqOSQMaaDvvs0ax/1ccmOKBrxWvng4L868qJGjSg3QuEGrYBM6Z89ldiP7YmzmeDZ+Q25AuousH6lcvviQIeUHSmbpQaTsyf720o6n+JYTuFmwWBQElHs521x1nMgh7OO4JVY2W3udr4mV8EB2Gm7heE/Fu40WvqP7/So352v9hfWojeVDz00DVPI+jEmIhbcpjchEJfw5tUdScyipuIsFvC6AF+FREon/5ZWHCesH8qtsJgOnpkmcqDoqg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=g1zl/jtSQUcv6zq5IH8TsnBi6aRZ+imTi1+joGXQAjg=;
 b=vfDSotFZI8+Of/YHYjFPFb8zoiBL0WfcJPGV5JvJw8mXUV8e8D6amRRR5eOAQR4cXvXh58eU8Du/SBCVmVHDKO/fAPV/LFoeWK8RKTvR0e/+J2y7Bkcd3B5UBDHlcfZ3fjTvFGLCYp73N4ZMVZWdG/QtOvJMiq2iZtlK4GKcAak=
Message-ID: <75cb15b5-d861-1b88-5413-df326c3f1144@oracle.com>
Date: Fri, 4 Mar 2022 15:18:23 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH 11/12] swiotlb: merge swiotlb-xen initialization into
 swiotlb
Content-Language: en-US
To: Christoph Hellwig <hch@lst.de>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
        iommu@lists.linux-foundation.org, x86@kernel.org,
        Anshuman Khandual <anshuman.khandual@arm.com>,
        Tom Lendacky <thomas.lendacky@amd.com>,
        Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
        Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
        David Woodhouse <dwmw2@infradead.org>,
        Lu Baolu <baolu.lu@linux.intel.com>,
        Robin Murphy <robin.murphy@arm.com>,
        linux-arm-kernel@lists.infradead.org, xen-devel@lists.xenproject.org,
        linux-ia64@vger.kernel.org, linux-mips@vger.kernel.org,
        linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org,
        linux-s390@vger.kernel.org, linux-hyperv@vger.kernel.org,
        tboot-devel@lists.sourceforge.net, linux-pci@vger.kernel.org
References: <20220301105311.885699-1-hch@lst.de>
 <20220301105311.885699-12-hch@lst.de>
 <alpine.DEB.2.22.394.2203011720150.3261@ubuntu-linux-20-04-desktop>
 <ca748512-12bb-7d75-13f1-8d5ec9703e26@oracle.com>
 <20220304172859.GA12860@lst.de>
 <fc3992a8-896b-f0fc-e500-9010ec085c57@oracle.com>
 <20220304174308.GA13515@lst.de>
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
In-Reply-To: <20220304174308.GA13515@lst.de>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: SJ0PR13CA0218.namprd13.prod.outlook.com
 (2603:10b6:a03:2c1::13) To BLAPR10MB5009.namprd10.prod.outlook.com
 (2603:10b6:208:321::10)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 30b5e278-3965-457b-18f6-08d9fe1c262e
X-MS-TrafficTypeDiagnostic: BN7PR10MB2418:EE_
X-Microsoft-Antispam-PRVS: 
	<BN7PR10MB241890FD23B08A445411034E8A059@BN7PR10MB2418.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	Nocj07XcbmJrvdPiYW/qSck1N32eVRKcrdh6rTaclqIVJHPZSnzlefVkdJMIw50PFKxiBmlyPrDIV0osUmX3pB2Ofm3oL0RjbZ1zfamE4PR5OQL1umoasZfbyMmo4gjdEfesSb83V+qXlieDfDWY3Hzd0koHSEQxDUWxH2+6YL/+iFA2MxVOBSr5fRpjSaScip6tbhYdLNE7zFm81/daimeempItWRi294b4OU/2mlE4f2xGyCX8qkKUKycBTMJZJ7YLRIrsKYT+Yx30cPGDH8Gta5ARuUfrXKc+IUPqKx91vpn633HRjfXRL63/6M+yPA+GErmVjynuEyGvDFLmMdr45g1zhNPAKrUbUgwlZ4SlM1PxYWFVcTMasiry3H1jhAZcbJgV4tBgDlZCkjLTNCmb3kBuwkuW38UIFVXmg2fAjcfk0fXSOG++ZnFKjZE20LMzK5MBgusm9s+CtPOkzXbNhyxJGZVltnVRimU8Zti/oDITM8uRwEGemxxfU+IgXD+WYwbw7zpjdTz3FuDrpRqU8zrnCoJzoZe1CDjgqdoXhEl1hGBmUiMjCrOUGViZXOd43DUyzjzwMGxYhUbQXPry4ZuLDNyZoXvRi4ZevKE5eJAJjUTfK0WQ+K8qS5QEUhotZLzr9Eoy7UbiEtcjIzMzLyh9BVm0Us8RiRsdWGpuRLdPgrL6mWTw0ZldPvmvRL2Rk2sSlMG094psobP64RK/mB+rR+wexLYTpo1MC/E=
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BLAPR10MB5009.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6506007)(8936002)(31686004)(316002)(36756003)(66946007)(66476007)(6666004)(2616005)(66556008)(6486002)(53546011)(54906003)(508600001)(6512007)(6916009)(31696002)(8676002)(4326008)(83380400001)(86362001)(186003)(26005)(44832011)(4744005)(7416002)(38100700002)(2906002)(5660300002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?YUFZUnV5Z0R1TFFPcTlhdm5BMWx1Z3dkczJWc3Q3Sjh0aWJFTk1OeHRIa0ll?=
 =?utf-8?B?eGZIc05ua3gvVmZESXAxWlJiU2QzWGlCNDcwRWt4eEQ1RWFDako1ZU41UHBv?=
 =?utf-8?B?MkF4K2R2RUJkUWtHTGxDaXdLcE1UWXQ4OFlWd1NyRlV1UmtxTllLTUkralJn?=
 =?utf-8?B?enJaVU9Mbjd3d3NKLzN4aU5sMkdGMjF6K2Y2RWU5S3NLMVZMZjltL1Y1U1JV?=
 =?utf-8?B?b2daeG14SlFNcHd2QUxGVUJtZzVjUE1pNnh4VEZiemYwYURzMTBVc21BTTZS?=
 =?utf-8?B?Qm9tRTVjRUFFZzcrUTJQNXI0YnFkY1FSUHA0MjZXcFJWSWg3L1g3Sjl5K3I5?=
 =?utf-8?B?dEZXQjU1ZGJkc3dFdnNmMXNIMW5JT3FHYzlseWxTVUppRTV6aDRSM1hOdXp1?=
 =?utf-8?B?a1lpZzdVNU0xN1NMeU81bCtPeE1CbkVJd1R5VnNBT0xYVXplN3FUVmkzYVIz?=
 =?utf-8?B?SXU3aEJYclg1dnN0SlgyeGlpaDk1YlRvWTE2YlJoaGdzelZld1lFSXZla1U2?=
 =?utf-8?B?dUNTVzZ0NnZYcHhyRGYyYVMxYVFrbVk1UU43cElBejluY3dPdlkwL3E1TG0v?=
 =?utf-8?B?a2FKL0NUeWpwNGZWRFBDbzVYMXJBbHZzdWU4WjFmMVlOT0JpK1ZtbHRFVXgv?=
 =?utf-8?B?TXJyeHBSOGJuV1l0SDRxMUROaUZCejNSaFhXVjczV3JRU1F5QW5qc241VDgx?=
 =?utf-8?B?R24yNEJVRVFQR3JBeFlRVkowL09IZkhidHdUUXdKSUMxTTNOMVJIeHlOMGI1?=
 =?utf-8?B?ZzBFVmx5TUtWM0IvSGdqUkhCQzZBZ1lVelk1Y2tRRE1jVTl3UEo3QUpmZW4x?=
 =?utf-8?B?bHlOeGliNHVJREhIbkZhL0RiQjM4Mzh1eHlSQkU3RTFOMXl3K29Ick9jdXdS?=
 =?utf-8?B?TDhKZGFQRlB5UTZVWkNQSHl2OW9pUmRJdS9lQk5wRzRYWHNMYk01RlJwVTdC?=
 =?utf-8?B?NUcyZ1p0UmpGVmdqTzg4VXowbGg3THhOb21ESU1XZVNDZVAvTFJIQm5aYTRk?=
 =?utf-8?B?cDRkWlFORG9NTlNhVSs5M2RrV0VmdTJERU9TU2RWVXpGM1RuU3REby9iUXda?=
 =?utf-8?B?cEh0allyRXBzMUVqek5YanJVS3pLR2dva2RLL1RkcW91K1FSR0h2U1RtblY2?=
 =?utf-8?B?Z0JVTWtCaUN6ZXNXcTdhNzk2Q3VkVndTSHBwMS9iL29pTnBBOXVNd24vNCsz?=
 =?utf-8?B?YkRrSjg5MGpBcFhMbUgrY01sVnhraHVDU28wV3ZiakRyL282WEw2Rm12Wmoz?=
 =?utf-8?B?TmtZbXFyN1BPRVdQWEI0OStUZjlldmFnVDFrTHBhS3ZzdEl5UmVnSEZFemRU?=
 =?utf-8?B?TjJTdnMycmZDSzlqL2daU1ZXUXBQdVRUaWc5QThJemlGcUNzVDBlallrR2VS?=
 =?utf-8?B?SHRma25mdFBKdWE5QzBJc0RRN2hMblJkV3pndjdtckF1UFkzMzFCQWRTZ3FU?=
 =?utf-8?B?cGVKaWx5eGlLVm5TN05CQTVYdW1WRmVyc3lXdFhmSGg0bGwvQmZSSVFrTGtM?=
 =?utf-8?B?V3JuUGNwSXAxVzN0QlliRFREVkwrRHFmUEpEbnFGKzdlWFllTGpOa0VqVHBa?=
 =?utf-8?B?OU1GUy9tdUw4Q0RTdlZlSnZZTllJenBZRGhJcTBKZkpUYlE5MDZoZmNzRWFD?=
 =?utf-8?B?c2l2OXp5T2NySHY3NHZEc0VpRldYVnA3bnZ5N1ZrUno0ODBmZURrOXNwK0xj?=
 =?utf-8?B?aGpYZ24xMDIvZ0dRc0pIQzhNYmxpc2ptSVJFY1c2WitUSTVLWkpPUldVSHdo?=
 =?utf-8?B?WnJnSGVqWk9JWFE3akdEZ3Boci8xYS95NmN2bEhET0lsK0lPL29QTjltRG96?=
 =?utf-8?B?ak1CVzF6OTRCbnNuZDR5NnZaU3oxNGFhSjZFMXZXNXBXcGIrQ09TTXIrNDZM?=
 =?utf-8?B?WmtDRXZZdFNMbVlZUjZnWkxrVGVUWHhZK2ZxT2tsWkc2dGVua3dybmMvUTJH?=
 =?utf-8?B?Rms4czZGUVpzUUtmMlBXN1NkclYyczdOa2l4a1BGM2dCR2paT2w4L2JlNDJW?=
 =?utf-8?B?dGxOSUhSR1BNVDZsNk01cURUZWVXUEtIblpDYXBLaGlQSDF3bVN4Zlg0QVI5?=
 =?utf-8?B?ZG84VkFnNE1rS0RNbHFkdEVsZzA1NDBjeXNJVnRaeHcyOHBLZ0ltZXR1bnlH?=
 =?utf-8?B?Qmsxd1ByQ1hvZVdDVmNWL05PakQ5RTF1S0dZdDBUaXV3MEFxWlNhTTk4UERU?=
 =?utf-8?B?Mk14OG9xZG5xZGI1OE1QSEUvaUJuOWVpQzREVDZzNi9rZ1BKZUl5OGF6RWd2?=
 =?utf-8?Q?7TtBsC9N4JQqfrX++FXqcxmF06UPoaqPsyQClstjWE=3D?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 30b5e278-3965-457b-18f6-08d9fe1c262e
X-MS-Exchange-CrossTenant-AuthSource: BLAPR10MB5009.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2022 20:18:30.5230
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: mV48hjgWHi6Pbqx447K51UJ+OGtJbfpJe9pSO8+HAKAEtv/1bzJFBKyy5we1zMg7V9o3tXqkdgD6bnD8ytxaTZM4SUSjr4v+bRwGlIY7Qoc=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN7PR10MB2418
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10276 signatures=690470
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 malwarescore=0 mlxlogscore=823
 adultscore=0 spamscore=0 phishscore=0 suspectscore=0 bulkscore=0
 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1
 engine=8.12.0-2202240000 definitions=main-2203040101
X-Proofpoint-GUID: 8hJhYIJeTbw-Nq1Sqvvk0fd9jQeRkrHK
X-Proofpoint-ORIG-GUID: 8hJhYIJeTbw-Nq1Sqvvk0fd9jQeRkrHK


On 3/4/22 12:43 PM, Christoph Hellwig wrote:
> On Fri, Mar 04, 2022 at 12:36:17PM -0500, Boris Ostrovsky wrote:
>>>> I bisected it to "x86: remove the IOMMU table infrastructure" but haven't actually looked at the code yet.
>>> That looks like the swiotlb buffer did not get initialized at all, but I
>>> can't really explain why.
>>>
>>> Can you stick in a printk and see if xen_swiotlb_init_early gets called
>>> at all?
>>
>>
>> Actually, that's the only thing I did do so far and yes, it does get called.
> So, specifically for "x86: remove the IOMMU table infrastructure" I
> think we need the one-liner below so that swiotlb_exit doesn't get called
> for the Xen case.  But that should have been fixed up by the next
> patch already.


This indeed allows dom0 to boot. Not sure I see where in the next patch this would have been fixed?


(BTW, just noticed in iommu_setup() you set this variable to 1. Should be 'true')


-boris



From xen-devel-bounces@lists.xenproject.org Fri Mar 04 20:54:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 20:54:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284909.484146 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQEwh-00058D-Lu; Fri, 04 Mar 2022 20:54:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284909.484146; Fri, 04 Mar 2022 20:54:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQEwh-000586-IR; Fri, 04 Mar 2022 20:54:39 +0000
Received: by outflank-mailman (input) for mailman id 284909;
 Fri, 04 Mar 2022 20:54:38 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nQEwg-000580-RB
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 20:54:38 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nQEwg-0002yL-3I; Fri, 04 Mar 2022 20:54:38 +0000
Received: from [54.239.6.187] (helo=[192.168.25.28])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nQEwf-0002Ty-SR; Fri, 04 Mar 2022 20:54:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=vYRiq5Y5GKsgAmnffzmE2GqX91dQAzzALXoefxqMECY=; b=PKWZ3WNK/OnG9iDGDVBweI9fRk
	UEgWxv8QN/zUcn4remm8uhwhfHz5Kp8lM29iD5s31bakKdvjDQyqYDThpDPOp7nsfkTV5us7ft8ET
	yFDJJ03tuyIw6TJ9iTovnxz/1J5b5zPmVsA0Ps/MeypEuwgJuPZHCAvecggn7BB3Z8vs=;
Message-ID: <1bf96df3-3593-1c01-a571-a0ee6e63524e@xen.org>
Date: Fri, 4 Mar 2022 20:54:35 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH 16/36] xen/color alloc: implement color_from_page for
 ARM64
To: Marco Solieri <marco.solieri@minervasys.tech>,
 xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-17-marco.solieri@minervasys.tech>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220304174701.1453977-17-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 04/03/2022 17:46, Marco Solieri wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> The colored allocator should not make any assumptions on how a color is
> defined, since the definition may change depending on the architecture.
IIUC, you are saying that the mapping between a physical address to a 
way is the same on every Armv8 processor.

Can you provide a reference from the Arm Arm which confirm this statement?

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 21:03:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 21:03:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284918.484160 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQF5F-0006vF-Jz; Fri, 04 Mar 2022 21:03:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284918.484160; Fri, 04 Mar 2022 21:03:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQF5F-0006v8-Gn; Fri, 04 Mar 2022 21:03:29 +0000
Received: by outflank-mailman (input) for mailman id 284918;
 Fri, 04 Mar 2022 21:03:28 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=2+cs=TP=lst.de=hch@srs-se1.protection.inumbo.net>)
 id 1nQF5E-0006v2-R6
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 21:03:28 +0000
Received: from verein.lst.de (verein.lst.de [213.95.11.211])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 89a687f3-9bfe-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 22:03:27 +0100 (CET)
Received: by verein.lst.de (Postfix, from userid 2407)
 id 0D8E068BEB; Fri,  4 Mar 2022 22:03:18 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 89a687f3-9bfe-11ec-8eba-a37418f5ba1a
Date: Fri, 4 Mar 2022 22:03:16 +0100
From: Christoph Hellwig <hch@lst.de>
To: Boris Ostrovsky <boris.ostrovsky@oracle.com>
Cc: Christoph Hellwig <hch@lst.de>,
	Stefano Stabellini <sstabellini@kernel.org>,
	iommu@lists.linux-foundation.org, x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org, linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org, tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: Re: [PATCH 11/12] swiotlb: merge swiotlb-xen initialization into
 swiotlb
Message-ID: <20220304210316.GA17365@lst.de>
References: <20220301105311.885699-1-hch@lst.de> <20220301105311.885699-12-hch@lst.de> <alpine.DEB.2.22.394.2203011720150.3261@ubuntu-linux-20-04-desktop> <ca748512-12bb-7d75-13f1-8d5ec9703e26@oracle.com> <20220304172859.GA12860@lst.de> <fc3992a8-896b-f0fc-e500-9010ec085c57@oracle.com> <20220304174308.GA13515@lst.de> <75cb15b5-d861-1b88-5413-df326c3f1144@oracle.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <75cb15b5-d861-1b88-5413-df326c3f1144@oracle.com>
User-Agent: Mutt/1.5.17 (2007-11-01)

On Fri, Mar 04, 2022 at 03:18:23PM -0500, Boris Ostrovsky wrote:
> This indeed allows dom0 to boot. Not sure I see where in the next patch this would have been fixed?

I thought it did, but it doesn't.  In the meantime I've pushed out an
updated branch with this folded in to:

git://git.infradead.org/users/hch/misc.git swiotlb-init-cleanup

> (BTW, just noticed in iommu_setup() you set this variable to 1. Should be 'true')

Thank, I'll fix this up.


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 22:04:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 22:04:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284930.484171 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQG2O-00063g-BX; Fri, 04 Mar 2022 22:04:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284930.484171; Fri, 04 Mar 2022 22:04:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQG2O-00063Z-8I; Fri, 04 Mar 2022 22:04:36 +0000
Received: by outflank-mailman (input) for mailman id 284930;
 Fri, 04 Mar 2022 22:04:34 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQG2M-00063P-5M; Fri, 04 Mar 2022 22:04:34 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQG2M-00049b-2v; Fri, 04 Mar 2022 22:04:34 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQG2L-0001px-Jn; Fri, 04 Mar 2022 22:04:33 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQG2L-0005Jr-JJ; Fri, 04 Mar 2022 22:04:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=0e+ylX72RkOz+dGL5ALEhTav1DaVVe74Tr9tnaiOmX0=; b=vJAjSVm+wGKIn8huAxk8fvba9R
	coMaDm3YjaX4Fxd2lrJAaeICnI1do+8MhnRRxqZ4f7rcaEUJlNxvHnajj2Y088kUXtPhRx8tdgO8C
	+R/o2ol8gKXplSx7Zo4V2PM4lS5ukwsmpbPZa7VhckmqIuyKuBYWsVHygj1w/JD5Cgog=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168402-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168402: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=949b8a3d97ce1ff01f1f29959a4b33aed742c024
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 04 Mar 2022 22:04:33 +0000

flight 168402 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168402/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 949b8a3d97ce1ff01f1f29959a4b33aed742c024
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    4 days
Failing since        168258  2022-03-01 01:55:31 Z    3 days   34 attempts
Testing same since   168402  2022-03-04 19:12:58 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 369 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 22:24:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 22:24:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284942.484181 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQGL6-0000XG-Un; Fri, 04 Mar 2022 22:23:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284942.484181; Fri, 04 Mar 2022 22:23:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQGL6-0000X9-RZ; Fri, 04 Mar 2022 22:23:56 +0000
Received: by outflank-mailman (input) for mailman id 284942;
 Fri, 04 Mar 2022 22:23:56 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=zYUj=TP=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nQGL6-0000X3-CX
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 22:23:56 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id c6fe11f3-9c09-11ec-8eba-a37418f5ba1a;
 Fri, 04 Mar 2022 23:23:55 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 4367AB8267A;
 Fri,  4 Mar 2022 22:23:54 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 44258C340EE;
 Fri,  4 Mar 2022 22:23:52 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c6fe11f3-9c09-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646432632;
	bh=BsJiPOPlwKKu/0/BCjO4QXxRCz/0dNfpTa19/sxPjkY=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=nwN+nOqlSUFMjH8s1K/KrDpjay724NTxHVeNkzYZrfxvzkYalJsHaXhisySo7cSCN
	 RU0bKAIKtyJQEAEgzZoKRCWrF8Tmo8YPYcxVF+sx3MAQ+thc5cOzQNwDU84BDZ7ZZ6
	 pcZ/iWnZ1V7WwOSknBwXX1yJdZK+cs+69+A2/gJKJIUfn4irVg0/06FTD4rXKyNqzx
	 mQuaxuMhDNkU/7bExiKmDgxSEARI0xZFDbXjQQ5EGUx0QGrKCw4ncgXG0q0ICfsGv8
	 Z1B/mPnX6oDOqvZejyKsnU4EoagRzrnsAunU97k/3++HotpCo9Hzg5NMFqx66ECsX4
	 1y1e6rpymW06g==
Date: Fri, 4 Mar 2022 14:23:51 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Julien Grall <julien@xen.org>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>, 
    xen-devel@lists.xenproject.org, stefanos@xilinx.com, 
    Volodymyr_Babchuk@epam.com, bertrand.marquis@arm.com, 
    andrew.cooper3@citrix.com, george.dunlap@citrix.com, jbeulich@suse.com, 
    wl@xen.org, paul@xen.org, roger.pau@citrix.com, 
    Ayan Kumar Halder <ayankuma@xilinx.com>
Subject: Re: [XEN v9 2/4] xen/arm64: io: Support instructions (for which ISS
 is not valid) on emulated MMIO region using MMIO/ioreq handler
In-Reply-To: <e8c030cf-6909-b730-96f9-b98221c8d4c2@xen.org>
Message-ID: <alpine.DEB.2.22.394.2203041423400.3261@ubuntu-linux-20-04-desktop>
References: <20220301124022.10168-1-ayankuma@xilinx.com> <20220301124022.10168-3-ayankuma@xilinx.com> <alpine.DEB.2.22.394.2203031637200.3261@ubuntu-linux-20-04-desktop> <e8c030cf-6909-b730-96f9-b98221c8d4c2@xen.org>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Fri, 4 Mar 2022, Julien Grall wrote:
> Hi Stefano,
> 
> On 04/03/2022 00:42, Stefano Stabellini wrote:
> > >   void register_mmio_handler(struct domain *d,
> > > diff --git a/xen/arch/arm/ioreq.c b/xen/arch/arm/ioreq.c
> > > index 308650b400..58cd320b5a 100644
> > > --- a/xen/arch/arm/ioreq.c
> > > +++ b/xen/arch/arm/ioreq.c
> > > @@ -47,6 +47,7 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
> > >                                struct vcpu *v, mmio_info_t *info)
> > >   {
> > >       struct vcpu_io *vio = &v->io;
> > > +    struct dabt_instr instr = info->dabt_instr;
> > >       ioreq_t p = {
> > >           .type = IOREQ_TYPE_COPY,
> > >           .addr = info->gpa,
> > > @@ -76,10 +77,10 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs
> > > *regs,
> > >       if ( !s )
> > >           return IO_UNHANDLED;
> > >   -    if ( !info->dabt.valid )
> > > -        return IO_ABORT;
> > > +    ASSERT(dabt.valid);
> > 
> > I cannot see where we set dabt.valid on successfully decoding the
> > instruction. It looks like we don't? If we don't, then here the ASSERT
> > would fail in case of postindexing instructions, right?
> 
> We don't currently set dabt.valid. There are other reasons to set it (see my
> reply to Ayan). So...
> 
> > 
> > If we don't, then we should probably just get rid of this ASSERT: it is
> > not worth setting dabt.valid just so that this ASSERT would succeed.
> 
> ... I would keep the ASSERT.

OK


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 22:34:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 22:34:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284952.484192 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQGVA-0002Ho-SK; Fri, 04 Mar 2022 22:34:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284952.484192; Fri, 04 Mar 2022 22:34:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQGVA-0002Hh-PQ; Fri, 04 Mar 2022 22:34:20 +0000
Received: by outflank-mailman (input) for mailman id 284952;
 Fri, 04 Mar 2022 22:34:19 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=zYUj=TP=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nQGV9-0002Hb-L4
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 22:34:19 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3a63e8d5-9c0b-11ec-8539-5f4723681683;
 Fri, 04 Mar 2022 23:34:18 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 733EBB8267A;
 Fri,  4 Mar 2022 22:34:17 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9EBA0C340E9;
 Fri,  4 Mar 2022 22:34:15 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3a63e8d5-9c0b-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646433256;
	bh=0ebbo65qulgWXdNvja7rdvXSwwm0zXnuWaiv+v5qJws=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=Y/DuXe2BZnb3D9B1aZj+4t/7WE7qT4O0UA2SOOmPJs6b4ctr6XRDixsxSSm/0/91m
	 1rA5W22pmJacqZLPhmGwIxT+goOIbiq9sRGsgBlyYbnEKSK3g4nyrHsl2r67MoLOxO
	 kCwWROsLynVZ+9fuZoNbpm4SVBDFD5ZT7Vl29a0R/7QQ8uo1I6DuK88b5APxQNXk4V
	 +sDSJN0+JePxY/S8yi5sR/tyE1jveXBVm0PUXCUuJZRMi8EnI772sHhq6pgSNMa9/n
	 L7fJDaTjbzF2mEsvQ02LNJxjyVZPr0+hMEWPEgYSVl9BEU8FIyM1i/TPmtsOWYMi/l
	 kEssZ/UeOr8sA==
Date: Fri, 4 Mar 2022 14:34:14 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    xen-devel@lists.xenproject.org, stefanos@xilinx.com, julien@xen.org, 
    Volodymyr_Babchuk@epam.com, bertrand.marquis@arm.com, 
    andrew.cooper3@citrix.com, george.dunlap@citrix.com, jbeulich@suse.com, 
    wl@xen.org, paul@xen.org, roger.pau@citrix.com
Subject: Re: [XEN v9 3/4] xen/arm64: io: Handle the abort due to access to
 stage1 translation table
In-Reply-To: <4ad9d776-88b7-30ea-01a7-3f6bfc1a6bde@xilinx.com>
Message-ID: <alpine.DEB.2.22.394.2203041430360.3261@ubuntu-linux-20-04-desktop>
References: <20220301124022.10168-1-ayankuma@xilinx.com> <20220301124022.10168-4-ayankuma@xilinx.com> <alpine.DEB.2.22.394.2203031736140.3261@ubuntu-linux-20-04-desktop> <4ad9d776-88b7-30ea-01a7-3f6bfc1a6bde@xilinx.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Fri, 4 Mar 2022, Ayan Kumar Halder wrote:
> On 04/03/2022 01:43, Stefano Stabellini wrote:
> > On Tue, 1 Mar 2022, Ayan Kumar Halder wrote:
> > > If the abort was caused due to access to stage1 translation table, Xen
> > > will assume that the stage1 translation table is in the non MMIO region.
> > > It will try to resolve the translation fault. If it succeeds, it will
> > > return to the guest to retry the instruction. If not, then it means
> > > that the table is in MMIO region which is not expected by Xen. Thus,
> > > Xen will forward the abort to the guest.
> > > 
> > > Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
> > > ---
> > > 
> > > Changelog :-
> > > 
> > > v1..v8 - NA
> > > 
> > > v9 - 1. Extracted this change from "[XEN v8 2/2] xen/arm64: io: Support
> > > instructions (for which ISS is not..." into a separate patch of its own.
> > > The reason being this is an existing bug in the codebase.
> > > 
> > >   xen/arch/arm/io.c    | 11 +++++++++++
> > >   xen/arch/arm/traps.c | 12 +++++++++++-
> > >   2 files changed, 22 insertions(+), 1 deletion(-)
> > > 
> > > diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
> > > index bea69ffb08..ebcb8ed548 100644
> > > --- a/xen/arch/arm/io.c
> > > +++ b/xen/arch/arm/io.c
> > > @@ -128,6 +128,17 @@ void try_decode_instruction(const struct
> > > cpu_user_regs *regs,
> > >           return;
> > >       }
> > >   +    /*
> > > +     * At this point, we know that the stage1 translation table is in the
> > > MMIO
> > > +     * region. This is not expected by Xen and thus it forwards the abort
> > > to the
> > > +     * guest.
> > > +     */
> > > +    if ( info->dabt.s1ptw )
> > > +    {
> > > +        info->dabt_instr.state = INSTR_ERROR;
> > > +        return;
> > > +    }
> > > +
> > >       /*
> > >        * Armv8 processor does not provide a valid syndrome for decoding
> > > some
> > >        * instructions. So in order to process these instructions, Xen must
> > > diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
> > > index 120c971b0f..e491ca15d7 100644
> > > --- a/xen/arch/arm/traps.c
> > > +++ b/xen/arch/arm/traps.c
> > > @@ -1923,6 +1923,7 @@ static void do_trap_stage2_abort_guest(struct
> > > cpu_user_regs *regs,
> > >       bool is_data = (hsr.ec == HSR_EC_DATA_ABORT_LOWER_EL);
> > >       mmio_info_t info;
> > >       enum io_state state;
> > > +    bool check_mmio_region = true;
> > >         /*
> > >        * If this bit has been set, it means that this stage-2 abort is
> > > caused
> > > @@ -1987,7 +1988,16 @@ static void do_trap_stage2_abort_guest(struct
> > > cpu_user_regs *regs,
> > >            */
> > >           if ( !is_data || !info.dabt.valid )
> > >           {
> > > -            if ( check_p2m(is_data, gpa) )
> > > +            /*
> > > +             * If the translation fault was caused due to access to stage
> > > 1
> > > +             * translation table, then we try to set the translation
> > > table entry
> > > +             * for page1 translation table (assuming that it is in the
> > > non mmio
> >                        ^ stage1
> > 
> > Do you mean to say maybe:
> Yes, it should be stage1. Sorry for typo.
> > 
> > If the translation fault was caused by an access to stage 1 translation
> > table, then no need to change the stage 2 p2m.
> > 
> > ?
> 
> The translation fault was caused due to access to stage1 translation table. As
> per my understanding, the address of stage1 tables is in stage2 translation
> table entries. Thus, Xen needs to modify the corresponding stage2 p2m entries.

OK, I follow what you are saying and what this patch is doing now. I suggest:

If the translation fault was caused due to access to the stage 1
translation table, then we try to set the p2m entry for the stage 1
translation table, but we don't handle stage 1 translation tables in
MMIO regions.


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 22:38:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 22:38:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284958.484204 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQGZN-0003D8-D7; Fri, 04 Mar 2022 22:38:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284958.484204; Fri, 04 Mar 2022 22:38:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQGZN-0003D1-A4; Fri, 04 Mar 2022 22:38:41 +0000
Received: by outflank-mailman (input) for mailman id 284958;
 Fri, 04 Mar 2022 22:38:40 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQGZM-0003Cr-2H; Fri, 04 Mar 2022 22:38:40 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQGZL-0004iK-Qj; Fri, 04 Mar 2022 22:38:39 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQGZL-0003X2-A5; Fri, 04 Mar 2022 22:38:39 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQGZL-00083a-9d; Fri, 04 Mar 2022 22:38:39 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=K+jqcPV+tzWFmg8hgQ+6QkPCdt7CQuG8SbzLBDjq+d4=; b=tNhj1bgucPFel8lwUsLlZcCJOc
	9OieReOYaYbK7infWcohgWljroGxLBvByhWb5xvz2Y75LEJ7UUcBhN6R9igIcYm/AUSplf3tgliLz
	Gzq3cRs3zobKeuQN/d776eJ7ueC4Mji1SLFsnYLZOSPDOabpv5+J3mXyG2jzWFPqFtGo=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168404-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168404: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=949b8a3d97ce1ff01f1f29959a4b33aed742c024
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 04 Mar 2022 22:38:39 +0000

flight 168404 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168404/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 949b8a3d97ce1ff01f1f29959a4b33aed742c024
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    4 days
Failing since        168258  2022-03-01 01:55:31 Z    3 days   35 attempts
Testing same since   168402  2022-03-04 19:12:58 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 369 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 22:57:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 22:57:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284974.484218 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQGrI-0006HJ-62; Fri, 04 Mar 2022 22:57:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284974.484218; Fri, 04 Mar 2022 22:57:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQGrI-0006HC-34; Fri, 04 Mar 2022 22:57:12 +0000
Received: by outflank-mailman (input) for mailman id 284974;
 Fri, 04 Mar 2022 22:57:10 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQGrG-0006H2-9T; Fri, 04 Mar 2022 22:57:10 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQGrG-00051o-6z; Fri, 04 Mar 2022 22:57:10 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQGrF-00048D-PT; Fri, 04 Mar 2022 22:57:09 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQGrF-0003Cf-P0; Fri, 04 Mar 2022 22:57:09 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=jM2TtfddxUZ9iwJ+zCD+FZh9UdBz/JW1zZ32AsKCuRo=; b=3Xv3Y3gS4Y8D6XwM5Cs6eR0kfQ
	yzG4JJ6i0kJGwzjC2IeDIkZYPMiJSBVzXllw3ulSHyub2sDSJvAEdyOvR0BRwYMeY4JwvhoUkEAwl
	gO65RxSXEfdlr/enj11TraVxky70NKBlzGV4Vve5ir2q8BuvU7vl9+8f3CJcWiQac6Yw=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168398-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168398: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=1f410b0c7455748021be4ede59e7a0c0a2ffb1c4
X-Osstest-Versions-That:
    xen=b692523fafb39f5f930e1e8a316f7b8cebc9f62a
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 04 Mar 2022 22:57:09 +0000

flight 168398 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168398/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168388
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168388
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168388
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168388
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168388
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168388
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168388
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168388
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168388
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168388
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168388
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168388
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  1f410b0c7455748021be4ede59e7a0c0a2ffb1c4
baseline version:
 xen                  b692523fafb39f5f930e1e8a316f7b8cebc9f62a

Last test of basis   168388  2022-03-04 01:37:03 Z    0 days
Testing same since   168398  2022-03-04 10:03:29 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Julien Grall <jgrall@amazon.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   b692523faf..1f410b0c74  1f410b0c7455748021be4ede59e7a0c0a2ffb1c4 -> master


From xen-devel-bounces@lists.xenproject.org Fri Mar 04 23:23:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 04 Mar 2022 23:23:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284986.484229 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQHGG-0001c8-9U; Fri, 04 Mar 2022 23:23:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284986.484229; Fri, 04 Mar 2022 23:23:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQHGG-0001c1-6d; Fri, 04 Mar 2022 23:23:00 +0000
Received: by outflank-mailman (input) for mailman id 284986;
 Fri, 04 Mar 2022 23:22:59 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=zYUj=TP=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nQHGF-0001bv-GO
 for xen-devel@lists.xenproject.org; Fri, 04 Mar 2022 23:22:59 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 06cc91ab-9c12-11ec-8eba-a37418f5ba1a;
 Sat, 05 Mar 2022 00:22:58 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 2E4BBB82B66;
 Fri,  4 Mar 2022 23:22:57 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id E31A5C340E9;
 Fri,  4 Mar 2022 23:22:54 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 06cc91ab-9c12-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646436175;
	bh=JGCldX7FEWqVZ5Q+U58HuEVwslrSLhbhnML6kEBr9Ws=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=rQAjzobsYiAs9wsfWE2rkUFtA1eVSkOA2Iav4ks0CqW9RP+ItlZh454EggaFHA0t7
	 cMuMuy/be5qJ5PPtyG/1I9k0vG8LWuC0s+fh9P52rFCGl1J82aaAj6ulLeOz4jBEd+
	 Nd/6EoXUpXBY6u39E8iSHqihbbZHokm82wpl1YjLkM0+9H+801fikQc/d+uXwGJnhl
	 XBKYJYaojo34JXtttn23IyibunqEvz4QH2Jr0xJKJVWlwM1v3PugwJccgZI7srIP8x
	 7QO2Nby/+u0TkfMtRQBDDfBlWCbEwfvoCjXrEBxdGWWN5TvTd9q9BnIh/lHE9wt82J
	 YB5glRBbksGuA==
Date: Fri, 4 Mar 2022 15:22:54 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Christoph Hellwig <hch@lst.de>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    iommu@lists.linux-foundation.org, x86@kernel.org, 
    Anshuman Khandual <anshuman.khandual@arm.com>, 
    Tom Lendacky <thomas.lendacky@amd.com>, 
    Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>, 
    Boris Ostrovsky <boris.ostrovsky@oracle.com>, 
    Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>, 
    David Woodhouse <dwmw2@infradead.org>, Lu Baolu <baolu.lu@linux.intel.com>, 
    Robin Murphy <robin.murphy@arm.com>, linux-arm-kernel@lists.infradead.org, 
    xen-devel@lists.xenproject.org, linux-ia64@vger.kernel.org, 
    linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, 
    linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org, 
    linux-hyperv@vger.kernel.org, tboot-devel@lists.sourceforge.net, 
    linux-pci@vger.kernel.org
Subject: Re: [PATCH 11/12] swiotlb: merge swiotlb-xen initialization into
 swiotlb
In-Reply-To: <20220304163430.GA12317@lst.de>
Message-ID: <alpine.DEB.2.22.394.2203041511090.3261@ubuntu-linux-20-04-desktop>
References: <20220301105311.885699-1-hch@lst.de> <20220301105311.885699-12-hch@lst.de> <alpine.DEB.2.22.394.2203011720150.3261@ubuntu-linux-20-04-desktop> <20220302081500.GB23075@lst.de> <alpine.DEB.2.22.394.2203021709470.3261@ubuntu-linux-20-04-desktop>
 <20220303105931.GA15137@lst.de> <alpine.DEB.2.22.394.2203031447120.3261@ubuntu-linux-20-04-desktop> <20220304163430.GA12317@lst.de>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Fri, 4 Mar 2022, Christoph Hellwig wrote:
> On Thu, Mar 03, 2022 at 02:49:29PM -0800, Stefano Stabellini wrote:
> > On Thu, 3 Mar 2022, Christoph Hellwig wrote:
> > > On Wed, Mar 02, 2022 at 05:25:10PM -0800, Stefano Stabellini wrote:
> > > > Thinking more about it we actually need to drop the xen_initial_domain()
> > > > check otherwise some cases won't be functional (Dom0 not 1:1 mapped, or
> > > > DomU 1:1 mapped).
> > > 
> > > Hmm, but that would be the case even before this series, right?
> > 
> > Before this series we only have the xen_swiotlb_detect() check in
> > xen_mm_init, we don't have a second xen_initial_domain() check.
> > 
> > The issue is that this series is adding one more xen_initial_domain()
> > check in xen_mm_init.
> 
> In current mainline xen_mm_init calls xen_swiotlb_init unconditionally.
> But xen_swiotlb_init then calls xen_swiotlb_fixup after allocating
> the memory, which in turn calls xen_create_contiguous_region.
> xen_create_contiguous_region fails with -EINVAL for the
> !xen_initial_domain() and thus caues xen_swiotlb_fixup and
> xen_swiotlb_init to unwind and return -EINVAL.
> 
> So as far as I can tell there is no change in behavior, but maybe I'm
> missing something subtle?

You are right.

The xen_initial_domain() check in xen_create_contiguous_region() is
wrong and we should get rid of it. It is a leftover from before the
xen_swiotlb_detect rework.

We could either remove it or change it into another xen_swiotlb_detect()
check.

Feel free to add the patch to your series or fold it with another patch
or rework it as you prefer. Thanks for spotting this!

---

arm/xen: don't check for xen_initial_domain() in xen_create_contiguous_region

It used to be that Linux enabled swiotlb-xen when running a dom0 on ARM.
Since f5079a9a2a31 "xen/arm: introduce XENFEAT_direct_mapped and
XENFEAT_not_direct_mapped", Linux detects whether to enable or disable
swiotlb-xen based on the new feature flags: XENFEAT_direct_mapped and
XENFEAT_not_direct_mapped.

However, there is still a leftover xen_initial_domain() check in
xen_create_contiguous_region. Remove the check as
xen_create_contiguous_region is only called by swiotlb-xen during
initialization. If xen_create_contiguous_region is called, we know Linux
is running 1:1 mapped so there is no need for additional checks.

Also update the in-code comment.

Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>


diff --git a/arch/arm/xen/mm.c b/arch/arm/xen/mm.c
index a7e54a087b80..28c207060253 100644
--- a/arch/arm/xen/mm.c
+++ b/arch/arm/xen/mm.c
@@ -122,10 +122,7 @@ int xen_create_contiguous_region(phys_addr_t pstart, unsigned int order,
 				 unsigned int address_bits,
 				 dma_addr_t *dma_handle)
 {
-	if (!xen_initial_domain())
-		return -EINVAL;
-
-	/* we assume that dom0 is mapped 1:1 for now */
+	/* the domain is 1:1 mapped to use swiotlb-xen */
 	*dma_handle = pstart;
 	return 0;
 }


From xen-devel-bounces@lists.xenproject.org Sat Mar 05 00:27:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 05 Mar 2022 00:27:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.284996.484241 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQIGn-0001j2-Do; Sat, 05 Mar 2022 00:27:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 284996.484241; Sat, 05 Mar 2022 00:27:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQIGn-0001iv-9y; Sat, 05 Mar 2022 00:27:37 +0000
Received: by outflank-mailman (input) for mailman id 284996;
 Sat, 05 Mar 2022 00:27:35 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQIGl-0001il-Ds; Sat, 05 Mar 2022 00:27:35 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQIGl-00078n-9x; Sat, 05 Mar 2022 00:27:35 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQIGk-0007mh-Pw; Sat, 05 Mar 2022 00:27:34 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQIGk-00049c-PU; Sat, 05 Mar 2022 00:27:34 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=PoOMwC3t5J3U6I5DXWnUAHhZmLDYa3sv8EkVxUXffOw=; b=h6F8EeNeCDMB5MRYE8m4C+89z9
	bou8b7sjEO9mHvkpfG2jFl1oqjE1PHC081kE4b4knb2YxvI7sipyP2z9YmAOvm7M4ZI6ruB9GrOsn
	2qoZBK17IdGy2Hn2cSfuROBy8nQiir+Dja/7B2eYM8Up3yCppqPoUoPNaHx03vOh5hi8=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168405-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168405: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=091b6a11970a447106aadb6538046a85d3f29df5
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 05 Mar 2022 00:27:34 +0000

flight 168405 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168405/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 091b6a11970a447106aadb6538046a85d3f29df5
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    4 days
Failing since        168258  2022-03-01 01:55:31 Z    3 days   36 attempts
Testing same since   168405  2022-03-04 22:40:29 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 391 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 05 01:29:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 05 Mar 2022 01:29:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285009.484251 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQJEM-000305-5n; Sat, 05 Mar 2022 01:29:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285009.484251; Sat, 05 Mar 2022 01:29:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQJEM-0002zy-2t; Sat, 05 Mar 2022 01:29:10 +0000
Received: by outflank-mailman (input) for mailman id 285009;
 Sat, 05 Mar 2022 01:29:09 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQJEL-0002zo-CU; Sat, 05 Mar 2022 01:29:09 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQJEL-0001Hs-A0; Sat, 05 Mar 2022 01:29:09 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQJEK-0002cI-TA; Sat, 05 Mar 2022 01:29:08 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQJEK-00036T-Sh; Sat, 05 Mar 2022 01:29:08 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=X+nqBguwA+vQoVh8TjL/dbIPHnwerY4WeSvK5hZ3Jpc=; b=wbJk6Zy3YEl76+LZUBz3TWC5o9
	I/vSomuwabUJO5po61bMcR9e3rWPM78VEK1MpTeS6BhW2uUULes6ddpFSYPZsw/dZAMGaHVWCUdAk
	NFGqR71k4qng1efLG0dvVZEP6ul80VO1LeqXxAV29/O/kKZZGphg4ScRO082rK86TpQk=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168407-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168407: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 05 Mar 2022 01:29:08 +0000

flight 168407 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168407/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    4 days
Failing since        168258  2022-03-01 01:55:31 Z    3 days   37 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 05 01:55:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 05 Mar 2022 01:55:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285021.484266 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQJe0-0006mS-DT; Sat, 05 Mar 2022 01:55:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285021.484266; Sat, 05 Mar 2022 01:55:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQJe0-0006mL-9f; Sat, 05 Mar 2022 01:55:40 +0000
Received: by outflank-mailman (input) for mailman id 285021;
 Sat, 05 Mar 2022 01:55:39 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQJdy-0006m9-VS; Sat, 05 Mar 2022 01:55:38 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQJdy-0001jk-Tp; Sat, 05 Mar 2022 01:55:38 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQJdy-0003ht-Gn; Sat, 05 Mar 2022 01:55:38 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQJdy-0004iD-GG; Sat, 05 Mar 2022 01:55:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=P3b94bLFyahSCfDwoJ9LkN2lnoR/Ci/zY9SGdKyRz+w=; b=iM8zUhRtXVISn9c7moUtSyJSBC
	PXjRuRdo5cgfLeE//8yZrFYrU2CHjIqsIgSNoU+wpzjFbxgG8Znd+caz6fHX24/vR3NrBQKo8tbjo
	Oj1VMunOogQQL1HB1xGzci2r5+3indr2ABQn24Ho+UHjkF0eZF9/yqQ6GxuGlKO/1OWo=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168400-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168400: regressions - FAIL
X-Osstest-Failures:
    qemu-mainline:build-i386-xsm:xen-build:fail:regression
    qemu-mainline:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=4c1d764d586f2dd126285a11cddb4ec683d033fa
X-Osstest-Versions-That:
    qemuu=6629bf78aac7e53f83fd0bcbdbe322e2302dfd1f
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 05 Mar 2022 01:55:38 +0000

flight 168400 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168400/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-i386-xsm                6 xen-build                fail REGR. vs. 168390

Tests which did not succeed, but are not blocking:
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-xsm        1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168390
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168390
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168390
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168390
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168390
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168390
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168390
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168390
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 qemuu                4c1d764d586f2dd126285a11cddb4ec683d033fa
baseline version:
 qemuu                6629bf78aac7e53f83fd0bcbdbe322e2302dfd1f

Last test of basis   168390  2022-03-04 02:52:39 Z    0 days
Testing same since   168400  2022-03-04 14:07:06 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Alistair Francis <alistair.francis@wdc.com>
  Anup Patel <anup.patel@wdc.com>
  Anup Patel <anup@brainfault.org>
  Junqiang Wang <wangjunqiang@iscas.ac.cn>
  Peter Maydell <peter.maydell@linaro.org>
  Philipp Tomsich <philipp.tomsich@vrull.eu>
  Richard Henderson <richard.henderson@linaro.org>
  Weiwei Li <liweiwei@iscas.ac.cn>
  Wilfred Mallawa <wilfred.mallawa@wdc.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               fail    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       blocked 
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 379 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 05 02:19:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 05 Mar 2022 02:19:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285033.484277 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQK1M-00020F-ED; Sat, 05 Mar 2022 02:19:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285033.484277; Sat, 05 Mar 2022 02:19:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQK1M-000208-9t; Sat, 05 Mar 2022 02:19:48 +0000
Received: by outflank-mailman (input) for mailman id 285033;
 Sat, 05 Mar 2022 02:19:47 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQK1L-0001zy-Sc; Sat, 05 Mar 2022 02:19:47 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQK1L-0002ap-RQ; Sat, 05 Mar 2022 02:19:47 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQK1L-0004Qz-KM; Sat, 05 Mar 2022 02:19:47 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQK1L-0008RL-Jv; Sat, 05 Mar 2022 02:19:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=pq2COxKy5C/2SEN3RrPRuOhbMTygtfWcnQATok9DEIo=; b=fmD8SoQjzKgGKOKjXB0ecStUK9
	2XY176pTDitALiTdKWtNkIBBhfKZVWwCPqh76isgIjBRpa9BN6GDotK3IiyhjxwEhscITqa9LbKlQ
	m0zznz/uj8UzmgbYCk11azvhUAeN27aADsD4z9JPxYWXdRmt1jgPEEy9UkT6lECQGHEc=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168408-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168408: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 05 Mar 2022 02:19:47 +0000

flight 168408 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168408/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    4 days
Failing since        168258  2022-03-01 01:55:31 Z    4 days   38 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 05 07:43:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 05 Mar 2022 07:43:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285053.484296 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQP44-000867-LZ; Sat, 05 Mar 2022 07:42:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285053.484296; Sat, 05 Mar 2022 07:42:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQP44-000860-Ij; Sat, 05 Mar 2022 07:42:56 +0000
Received: by outflank-mailman (input) for mailman id 285053;
 Sat, 05 Mar 2022 07:42:56 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQP44-00085q-0D; Sat, 05 Mar 2022 07:42:56 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQP43-0008Up-Rg; Sat, 05 Mar 2022 07:42:55 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQP43-0002dk-Bb; Sat, 05 Mar 2022 07:42:55 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQP43-0005CV-BA; Sat, 05 Mar 2022 07:42:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=JbHZFY9DyyZTu8tImK0hITednKRlXjgnxZij0AwlapQ=; b=YBSp426dRQRco5LV1qWu3bQrGw
	pNYmNfE1svYtYvlokKvq91zteZyjW8jfTzQ3HF3xsl7OtyOeUPmEQedbBTNUTyjDX9z/lE+GTPvMS
	KTOZ7+1SWOdod4TCn0uV9Bb3fBfYhauBkcK6rvodyeXgbjZhT6bKA9NtZAsXErDF/J4s=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168411-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168411: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 05 Mar 2022 07:42:55 +0000

flight 168411 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168411/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    4 days
Failing since        168258  2022-03-01 01:55:31 Z    4 days   39 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    0 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 05 08:09:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 05 Mar 2022 08:09:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285073.484308 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQPTb-0003YJ-2I; Sat, 05 Mar 2022 08:09:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285073.484308; Sat, 05 Mar 2022 08:09:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQPTa-0003YC-Ut; Sat, 05 Mar 2022 08:09:18 +0000
Received: by outflank-mailman (input) for mailman id 285073;
 Sat, 05 Mar 2022 08:09:18 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQPTa-0003Y2-6V; Sat, 05 Mar 2022 08:09:18 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQPTa-000135-4S; Sat, 05 Mar 2022 08:09:18 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQPTZ-0003mK-Ob; Sat, 05 Mar 2022 08:09:17 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQPTZ-00049g-O8; Sat, 05 Mar 2022 08:09:17 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=r90MGHCcnVReKlGeve6ZVHS9+HN3cVEDfIBs4PJwq20=; b=Yz0nUKr+Z/44bTDVI7xc2xEiz3
	HdBzDpkSlfBmcyJJr5zQB1tHU+o8DZKTZFgEPj8DzMp5Aq+DirHCN5IDkKqM2iYVe8jfp/PHRXMSP
	vzqtwDjCYgcrSI0iQWEG4c28hbisSyi/bGuD/+HC7m2fkuUChsA4y088c2i/QYRiomu8=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168403-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168403: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=07ebd38a0da24d2534da57b4841346379db9f354
X-Osstest-Versions-That:
    linux=38f80f42147ff658aff218edb0a88c37e58bf44f
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 05 Mar 2022 08:09:17 +0000

flight 168403 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168403/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168394
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168394
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168394
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168394
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168394
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168394
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168394
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168394
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                07ebd38a0da24d2534da57b4841346379db9f354
baseline version:
 linux                38f80f42147ff658aff218edb0a88c37e58bf44f

Last test of basis   168394  2022-03-04 04:34:13 Z    1 days
Testing same since   168403  2022-03-04 20:39:45 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Adrian Huang <ahuang12@lenovo.com>
  Alex Deucher <alexander.deucher@amd.com>
  Alexandre Ghiti <alexandre.ghiti@canonical.com>
  Carsten Haitzler <carsten.haitzler@arm.com>
  Charles Keepax <ckeepax@opensource.cirrus.com>
  Corentin Labbe <clabbe.montjoie@gmail.com>
  Daniel Borkmann <daniel@iogearbox.net>
  Daniel Jordan <daniel.m.jordan@oracle.com>
  Dave Airlie <airlied@redhat.com>
  Douglas Anderson <dianders@chromium.org>
  Fabio Estevam <festevam@denx.de>
  Guenter Roeck <linux@roeck-us.net>
  Hans Verkuil <hverkuil-cisco@xs4all.nl>
  Inki Dae <inki.dae@samsung.com>
  Jernej Skrabec <jernej.skrabec@gmail.com>
  Joerg Roedel <jroedel@suse.de>
  Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com>
  Lennert Buytenhek <buytenh@arista.com>
  Lennert Buytenhek <buytenh@wantstofly.org>
  Linus Torvalds <torvalds@linux-foundation.org>
  Linus Walleij <linus.walleij@linaro.org>
  Liviu Dudau <liviu.dudau@arm.com>
  Lu Baolu <baolu.lu@linux.intel.com>
  Manasi Navare <manasi.d.navare@intel.com>
  Marek Szyprowski <m.szyprowski@samsung.com>
  Marek Vasut <marex@denx.de>
  Mark Brown <broonie@kernel.org>
  Miaoqian Lin <linmq006@gmail.com>
  Nicolas Cavallari <nicolas.cavallari@green-communications.fr>
  Niklas Cassel <niklas.cassel@wdc.com>
  Palmer Dabbelt <palmer@rivosinc.com>
  Qiang Yu <qiang.yu@amd.com>
  Rafael J. Wysocki <rafael.j.wysocki@intel.com>
  Ramalingam C <ramalingam.c@intel.com>
  Rob Herring <robh@kernel.org>
  Samuel Holland <samuel@sholland.org>
  Suravee Suthikulpanit <suravee.suthikulpanit@amd.com>
  syzbot+11421fbbff99b989670e@syzkaller.appspotmail.com
  Takashi Iwai <tiwai@suse.de>
  Thierry Reding <treding@nvidia.com>
  Thomas Zimmermann <tzimmermann@suse.de>
  Tomas Bzatek <bugs@bzatek.net>
  Tvrtko Ursulin <tvrtko.ursulin@intel.com>
  Tvrtko Ursulin <tvrtko.ursulin@linux.intel.com>
  Ville Syrjälä <ville.syrjala@linux.intel.com>
  Vinay Belgaumkar <vinay.belgaumkar@intel.com>
  Vivek Kasireddy <vivek.kasireddy@intel.com>
  Zhen Ni <nizhen@uniontech.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   38f80f42147f..07ebd38a0da2  07ebd38a0da24d2534da57b4841346379db9f354 -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Sat Mar 05 09:33:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 05 Mar 2022 09:33:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285086.484318 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQQmp-0005yg-3P; Sat, 05 Mar 2022 09:33:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285086.484318; Sat, 05 Mar 2022 09:33:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQQmp-0005yZ-0Q; Sat, 05 Mar 2022 09:33:15 +0000
Received: by outflank-mailman (input) for mailman id 285086;
 Sat, 05 Mar 2022 09:33:13 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQQmn-0005yP-F1; Sat, 05 Mar 2022 09:33:13 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQQmn-0002Ph-E1; Sat, 05 Mar 2022 09:33:13 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQQmn-0006nw-7Q; Sat, 05 Mar 2022 09:33:13 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQQmn-0002cX-6y; Sat, 05 Mar 2022 09:33:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=7mZBlKyNwR7GI8TUu67WOlBd8l3zBhoAGtRg9IyiHMI=; b=eBIqu3c+7LbREDMr+lPf8KLPVy
	S0IK85r9dxAhY1Ij7mtU11+oMTaV7APOxMvb4tg/8r/ZEoW+IwZQM7iVshWpX6b3/Q9fbPwxnH0An
	GXPHdKzcnAygci21ANY7jE8uPOYQLfo29Gh2U2KWv9yfx7+Te6DQPffPJxbLImyQFaZc=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168415-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168415: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 05 Mar 2022 09:33:13 +0000

flight 168415 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168415/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    4 days
Failing since        168258  2022-03-01 01:55:31 Z    4 days   40 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    0 days    4 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 05 10:21:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 05 Mar 2022 10:21:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285099.484330 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQRXp-00048c-Rj; Sat, 05 Mar 2022 10:21:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285099.484330; Sat, 05 Mar 2022 10:21:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQRXp-00048V-Od; Sat, 05 Mar 2022 10:21:49 +0000
Received: by outflank-mailman (input) for mailman id 285099;
 Sat, 05 Mar 2022 10:21:48 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQRXo-00048L-0a; Sat, 05 Mar 2022 10:21:48 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQRXn-0003J8-Sq; Sat, 05 Mar 2022 10:21:47 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQRXn-0002JX-Fm; Sat, 05 Mar 2022 10:21:47 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQRXn-0005q9-FH; Sat, 05 Mar 2022 10:21:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=rdxQSBRKYeLEhapZ9t/XEhxfFXyWA6iKuO9dKMOJc9w=; b=so7L4bH73Xq0DQkya8+l8V+coh
	GTvdmM8DLJOxyyvRCOcA4GFj90ZAQ0+YK3khm3QQineoTPd2AU6rUOG1ogif1xEzOdlIHhA/zocWp
	t8V7ZG+3ntkyUdmkBJgQTMbv2k9KqOhpuN14TOcdy8UB0G+WmiNy/GANZd3LEChaKxak=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168406-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168406: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=1145d94c738ea13e0d2ceedb97a4cfe46292b08e
X-Osstest-Versions-That:
    xen=1f410b0c7455748021be4ede59e7a0c0a2ffb1c4
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 05 Mar 2022 10:21:47 +0000

flight 168406 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168406/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168398
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168398
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168398
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168398
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168398
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168398
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168398
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168398
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168398
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168398
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168398
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168398
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  1145d94c738ea13e0d2ceedb97a4cfe46292b08e
baseline version:
 xen                  1f410b0c7455748021be4ede59e7a0c0a2ffb1c4

Last test of basis   168398  2022-03-04 10:03:29 Z    1 days
Testing same since   168406  2022-03-04 23:08:13 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Anthony PERARD <anthony.perard@citrix.com>
  Jan Beulich <jbeulich@suse.com>
  Roger Pau Monné <roger.pau@citrix.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   1f410b0c74..1145d94c73  1145d94c738ea13e0d2ceedb97a4cfe46292b08e -> master


From xen-devel-bounces@lists.xenproject.org Sat Mar 05 10:49:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 05 Mar 2022 10:49:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285118.484369 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQRyp-0007od-Fc; Sat, 05 Mar 2022 10:49:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285118.484369; Sat, 05 Mar 2022 10:49:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQRyp-0007oW-C7; Sat, 05 Mar 2022 10:49:43 +0000
Received: by outflank-mailman (input) for mailman id 285118;
 Sat, 05 Mar 2022 10:49:42 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQRyo-0007oM-IL; Sat, 05 Mar 2022 10:49:42 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQRyo-0003kt-Di; Sat, 05 Mar 2022 10:49:42 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQRyn-0003yN-Vk; Sat, 05 Mar 2022 10:49:42 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQRyn-0001cc-VI; Sat, 05 Mar 2022 10:49:41 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=JUjslkAhBZmAX+LUvwa2/Uzc51TB1ABxCvBJuT+3e80=; b=4wTh9SGWd5KTIwOPxnLDR2pKxH
	IriKyfY0VTh/XcoHtBY/m/6ap4J5+YhMlFvkZuM5Jh84XYs8nA+uFuxhnFNfH30bDqRXkhRuBgzFo
	/ygiRt8i7npr2EWWio6CnUuC1lYtwjEzEJV44D4WWbKPstl4Ak78JT+Rr0WOn4PrOj3s=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168416-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168416: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 05 Mar 2022 10:49:41 +0000

flight 168416 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168416/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    5 days
Failing since        168258  2022-03-01 01:55:31 Z    4 days   41 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    0 days    5 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 05 12:59:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 05 Mar 2022 12:59:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285133.484380 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQTzo-0006ag-0g; Sat, 05 Mar 2022 12:58:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285133.484380; Sat, 05 Mar 2022 12:58:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQTzn-0006aZ-Tu; Sat, 05 Mar 2022 12:58:51 +0000
Received: by outflank-mailman (input) for mailman id 285133;
 Sat, 05 Mar 2022 12:58:50 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQTzm-0006aP-Fh; Sat, 05 Mar 2022 12:58:50 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQTzm-0005u1-DN; Sat, 05 Mar 2022 12:58:50 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQTzm-0000hc-4H; Sat, 05 Mar 2022 12:58:50 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQTzm-0004l0-3n; Sat, 05 Mar 2022 12:58:50 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=HudYVdNKZF+vnrtzjpLdWtyHRzbysRuvjDBoDIciRFo=; b=V7Lineo+aF8G321hFhpBtl5PlS
	MMjbFP5aeL+ja/d6zYvyXvhyL94K6IP000f1XB237rY7WVTwqdUphhMa4caygLc6ESAdIh9JAalVH
	W9pBkF5tbAXk/2e8JLsrUyvfaA935/MaDAOb8gJr6IAl2eRorpeDZxQ7HwwfIwqTQ3CQ=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168418-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168418: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 05 Mar 2022 12:58:50 +0000

flight 168418 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168418/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    5 days
Failing since        168258  2022-03-01 01:55:31 Z    4 days   42 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    0 days    6 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 05 13:55:44 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 05 Mar 2022 13:55:44 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285148.484390 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQUsf-0005YF-57; Sat, 05 Mar 2022 13:55:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285148.484390; Sat, 05 Mar 2022 13:55:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQUsf-0005Y8-1W; Sat, 05 Mar 2022 13:55:33 +0000
Received: by outflank-mailman (input) for mailman id 285148;
 Sat, 05 Mar 2022 13:55:31 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=SXtQ=TQ=linuxfoundation.org=gregkh@srs-se1.protection.inumbo.net>)
 id 1nQUsd-0005Y2-Iy
 for xen-devel@lists.xenproject.org; Sat, 05 Mar 2022 13:55:31 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ea800dc6-9c8b-11ec-8eba-a37418f5ba1a;
 Sat, 05 Mar 2022 14:55:29 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 5EC0CB80C72;
 Sat,  5 Mar 2022 13:55:28 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 4E65DC004E1;
 Sat,  5 Mar 2022 13:55:26 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ea800dc6-9c8b-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org;
	s=korg; t=1646488527;
	bh=BQrokMzSMloe/hyjVeBHCLDN0uRptwXDCXljI99iSGQ=;
	h=Date:From:To:Cc:Subject:References:In-Reply-To:From;
	b=BjIAle22LuRoNHbItvtz5QjSdGbq1MZjYCdl1AcMg7OlUzfENaPvI9sCCynbnn903
	 oxjhERhiWX0Hb8MU9JkY7ZF54ZL1HDQii67RN47huVWuAo2CtdIyOPQsGbAgRbrm8z
	 OygsfFEKIuzNf8aqHKsAagzzfYBaQq7n2iL5yjXQ=
Date: Sat, 5 Mar 2022 14:55:23 +0100
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: zhanglianjie <zhanglianjie@uniontech.com>
Cc: Juergen Gross <jgross@suse.com>, David Vrabel <david.vrabel@citrix.com>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Subject: Re: [PATCH] drivers/xen: use helper macro __ATTR_RW
Message-ID: <YiNry3TtIPbEh1Yr@kroah.com>
References: <20220305133823.158961-1-zhanglianjie@uniontech.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20220305133823.158961-1-zhanglianjie@uniontech.com>

On Sat, Mar 05, 2022 at 09:38:23PM +0800, zhanglianjie wrote:
> Use helper macro __ATTR_RW to define HYPERVISOR_ATTR_RW to make code more clear.
> Minor readability improvement.
> 
> Signed-off-by: zhanglianjie <zhanglianjie@uniontech.com>

Is this the name you sign legal documents with?  (I have to ask...)

> 
> diff --git a/drivers/xen/sys-hypervisor.c b/drivers/xen/sys-hypervisor.c
> index feb1d16252e7..fcb0792f090e 100644
> --- a/drivers/xen/sys-hypervisor.c
> +++ b/drivers/xen/sys-hypervisor.c
> @@ -22,11 +22,10 @@
>  #endif
> 
>  #define HYPERVISOR_ATTR_RO(_name) \
> -static struct hyp_sysfs_attr  _name##_attr = __ATTR_RO(_name)
> +static struct hyp_sysfs_attr _name##_attr = __ATTR_RO(_name)

Why change this line?  That's not relevant to this change :(

thanks,

greg k-h


From xen-devel-bounces@lists.xenproject.org Sat Mar 05 14:17:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 05 Mar 2022 14:17:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285155.484403 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQVDs-0000Tm-10; Sat, 05 Mar 2022 14:17:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285155.484403; Sat, 05 Mar 2022 14:17:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQVDr-0000Tf-Ry; Sat, 05 Mar 2022 14:17:27 +0000
Received: by outflank-mailman (input) for mailman id 285155;
 Sat, 05 Mar 2022 14:17:27 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQVDr-0000TV-F6; Sat, 05 Mar 2022 14:17:27 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQVDr-0007JW-Bp; Sat, 05 Mar 2022 14:17:27 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQVDq-0004GM-US; Sat, 05 Mar 2022 14:17:27 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQVDq-00070T-U0; Sat, 05 Mar 2022 14:17:26 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=aUcPvnehPeHzje536Q7RK/pzx86CWjBaTJhS7QQiGzs=; b=jKTidkbEWJdNZH3W1OMqQam/cu
	7JgLNbWW3I8Kkn5lQrZT0OojXBIfL7J9PhBAB7mxJw/hpLD0QGJgmU/utAgxBVTbSxtGcIc9RtNaX
	vIfGBFjC8gXkUE/yCI4ivTI7l7VpA0PrhRFgerVC0Xf6YS/F1zIPZ7ofsPjo4UPwIpgM=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168413-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168413: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=86c691e6dedc1cfb487eb1e1651c0600cc567ea9
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 05 Mar 2022 14:17:26 +0000

flight 168413 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168413/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              86c691e6dedc1cfb487eb1e1651c0600cc567ea9
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  603 days
Failing since        151818  2020-07-11 04:18:52 Z  602 days  584 attempts
Testing same since   168413  2022-03-05 04:19:02 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 99598 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 05 14:35:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 05 Mar 2022 14:35:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285166.484412 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQVV0-000369-En; Sat, 05 Mar 2022 14:35:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285166.484412; Sat, 05 Mar 2022 14:35:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQVV0-000362-Bf; Sat, 05 Mar 2022 14:35:10 +0000
Received: by outflank-mailman (input) for mailman id 285166;
 Sat, 05 Mar 2022 14:35:09 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQVUz-00035s-5x; Sat, 05 Mar 2022 14:35:09 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQVUz-0007ar-15; Sat, 05 Mar 2022 14:35:09 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQVUy-0004um-E3; Sat, 05 Mar 2022 14:35:08 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQVUy-0000BS-DF; Sat, 05 Mar 2022 14:35:08 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=PzPh/t3MP+jFOKmDRMi0QUC84Yv85KK9p3rDnSpmUtg=; b=52Bxcsn1mgKOM575cTBu7JgWkh
	B1XxbF89h5UcKR72sHC04N5+1iS4eFFAUnQEy8bo1F8c5ipuWK6AMQua8CWUn8ASC/+g6G7PM5IeJ
	RuSq8mrIK6rAuxexyLih8IzaDNLIY2t5TdoUtzWLaJHD7Gg8QumbpIyI54DiWWPRVTNw=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168410-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168410: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=3d1fbc59665ff8a5d74b0fd30583044fe99e1117
X-Osstest-Versions-That:
    qemuu=6629bf78aac7e53f83fd0bcbdbe322e2302dfd1f
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 05 Mar 2022 14:35:08 +0000

flight 168410 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168410/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168390
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168390
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168390
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168390
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168390
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168390
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168390
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168390
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 qemuu                3d1fbc59665ff8a5d74b0fd30583044fe99e1117
baseline version:
 qemuu                6629bf78aac7e53f83fd0bcbdbe322e2302dfd1f

Last test of basis   168390  2022-03-04 02:52:39 Z    1 days
Failing since        168400  2022-03-04 14:07:06 Z    1 days    2 attempts
Testing same since   168410  2022-03-05 01:57:37 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Alistair Francis <alistair.francis@wdc.com>
  Anup Patel <anup.patel@wdc.com>
  Anup Patel <anup@brainfault.org>
  Junqiang Wang <wangjunqiang@iscas.ac.cn>
  Klaus Jensen <k.jensen@samsung.com>
  Naveen Nagar <naveen.n1@samsung.com>
  Peter Maydell <peter.maydell@linaro.org>
  Philipp Tomsich <philipp.tomsich@vrull.eu>
  Richard Henderson <richard.henderson@linaro.org>
  Weiwei Li <liweiwei@iscas.ac.cn>
  Wilfred Mallawa <wilfred.mallawa@wdc.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   6629bf78aa..3d1fbc5966  3d1fbc59665ff8a5d74b0fd30583044fe99e1117 -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Sat Mar 05 15:09:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 05 Mar 2022 15:09:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285181.484423 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQW1q-0007i5-BF; Sat, 05 Mar 2022 15:09:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285181.484423; Sat, 05 Mar 2022 15:09:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQW1q-0007hy-8A; Sat, 05 Mar 2022 15:09:06 +0000
Received: by outflank-mailman (input) for mailman id 285181;
 Sat, 05 Mar 2022 15:09:04 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQW1o-0007ho-S4; Sat, 05 Mar 2022 15:09:04 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQW1o-0008AK-Lb; Sat, 05 Mar 2022 15:09:04 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQW1o-0006VI-BD; Sat, 05 Mar 2022 15:09:04 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQW1o-0004lo-Ae; Sat, 05 Mar 2022 15:09:04 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=bDk0T9DsVKu+8OO9hL2AEhfDaGS8dKPo+cOxLqFrDKs=; b=E+tclqIJThREcIMqiruLhM6hCg
	t0Sk1UwPimgjmU6mG7L8C+bY2TaqXngAexCUzIU08VSxENsvqHeTzDH1Aa1dq029zPEKkE+YrgmDM
	rrV1no43jip+O3riYe0k/28gYw6yyLuYvJXXsa6WJNqG5sUFmS2+yUi77cwE3FQHkdq8=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168419-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168419: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 05 Mar 2022 15:09:04 +0000

flight 168419 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168419/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    5 days
Failing since        168258  2022-03-01 01:55:31 Z    4 days   43 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    0 days    7 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 05 16:02:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 05 Mar 2022 16:02:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285146.484435 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQWrN-00079s-Iu; Sat, 05 Mar 2022 16:02:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285146.484435; Sat, 05 Mar 2022 16:02:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQWrN-00079l-G1; Sat, 05 Mar 2022 16:02:21 +0000
Received: by outflank-mailman (input) for mailman id 285146;
 Sat, 05 Mar 2022 13:39:09 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=GEmz=TQ=uniontech.com=zhanglianjie@srs-se1.protection.inumbo.net>)
 id 1nQUcn-0003WL-EU
 for xen-devel@lists.xenproject.org; Sat, 05 Mar 2022 13:39:09 +0000
Received: from smtpbg152.qq.com (smtpbg152.qq.com [13.245.186.79])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 9d120542-9c89-11ec-8eba-a37418f5ba1a;
 Sat, 05 Mar 2022 14:39:02 +0100 (CET)
Received: from localhost.localdomain ( [114.222.120.105])
 by bizesmtp.qq.com (ESMTP) with 
 id ; Sat, 05 Mar 2022 21:38:34 +0800 (CST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9d120542-9c89-11ec-8eba-a37418f5ba1a
X-QQ-mid: bizesmtp80t1646487530t0ad08pm
X-QQ-SSF: 01400000002000B0I000B00A0000000
X-QQ-FEAT: F3yR32iATbigXkT0FCE9DsObg5oq/MN3OGcaVKW3SzyBGnuKqNLFJhhrnBSss
	OEeEKWXCYXFgWxlBFjnddgdP3hYrW7Boq5CIhmIdRlax3caNoJd34bgMazPzJnmFaSCfE3U
	irLUm43siAqYb5/xhKRPLiPLZEVIApzI5pl3OhTu1wDyiDdpEL2zhysTrZtfdaROI3Zk+rk
	1rHdciWu44nEdT/JA0tNNTgnCq3sX2lqdwmHvBWyCE27uiY+8eY2pssFLWh7wr/WMrF2ANT
	oVua3dfwqv32zcYaPeEnJ2bhGSnjYDtnkSG9ZN2M1T7NoWMcLMGznKLejy6drQVQBqqpDNF
	ShmC+9yljlPiUI2pvM=
X-QQ-GoodBg: 2
From: zhanglianjie <zhanglianjie@uniontech.com>
To: Juergen Gross <jgross@suse.com>,
	David Vrabel <david.vrabel@citrix.com>
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	xen-devel@lists.xenproject.org,
	linux-kernel@vger.kernel.org,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	zhanglianjie <zhanglianjie@uniontech.com>
Subject: [PATCH] drivers/xen: use helper macro __ATTR_RW
Date: Sat,  5 Mar 2022 21:38:23 +0800
Message-Id: <20220305133823.158961-1-zhanglianjie@uniontech.com>
X-Mailer: git-send-email 2.20.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-QQ-SENDSIZE: 520
Feedback-ID: bizesmtp:uniontech.com:qybgforeign:qybgforeign6
X-QQ-Bgrelay: 1

Use helper macro __ATTR_RW to define HYPERVISOR_ATTR_RW to make code more clear.
Minor readability improvement.

Signed-off-by: zhanglianjie <zhanglianjie@uniontech.com>

diff --git a/drivers/xen/sys-hypervisor.c b/drivers/xen/sys-hypervisor.c
index feb1d16252e7..fcb0792f090e 100644
--- a/drivers/xen/sys-hypervisor.c
+++ b/drivers/xen/sys-hypervisor.c
@@ -22,11 +22,10 @@
 #endif

 #define HYPERVISOR_ATTR_RO(_name) \
-static struct hyp_sysfs_attr  _name##_attr = __ATTR_RO(_name)
+static struct hyp_sysfs_attr _name##_attr = __ATTR_RO(_name)

 #define HYPERVISOR_ATTR_RW(_name) \
-static struct hyp_sysfs_attr _name##_attr = \
-	__ATTR(_name, 0644, _name##_show, _name##_store)
+static struct hyp_sysfs_attr _name##_attr = __ATTR_RW(_name)

 struct hyp_sysfs_attr {
 	struct attribute attr;
--
2.20.1






From xen-devel-bounces@lists.xenproject.org Sat Mar 05 16:02:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 05 Mar 2022 16:02:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285192.484439 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQWrN-0007DQ-RB; Sat, 05 Mar 2022 16:02:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285192.484439; Sat, 05 Mar 2022 16:02:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQWrN-0007CE-NP; Sat, 05 Mar 2022 16:02:21 +0000
Received: by outflank-mailman (input) for mailman id 285192;
 Sat, 05 Mar 2022 15:34:26 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=GEmz=TQ=uniontech.com=zhanglianjie@srs-se1.protection.inumbo.net>)
 id 1nQWQM-00033D-JV
 for xen-devel@lists.xenproject.org; Sat, 05 Mar 2022 15:34:26 +0000
Received: from smtpproxy21.qq.com (smtpbg702.qq.com [203.205.195.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id b6d6e428-9c99-11ec-8539-5f4723681683;
 Sat, 05 Mar 2022 16:34:20 +0100 (CET)
Received: from [192.168.31.174] ( [114.222.120.105])
 by bizesmtp.qq.com (ESMTP) with 
 id ; Sat, 05 Mar 2022 23:34:03 +0800 (CST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b6d6e428-9c99-11ec-8539-5f4723681683
X-QQ-mid: bizesmtp76t1646494445tfu1xbnk
X-QQ-SSF: 00400000002000B0I000B00A0000000
X-QQ-FEAT: LItLOq/50o2PmYfAwguweBDHzjuwj/b82I/76cIyZ3DR2bPRqgfcBnjeFJ/zm
	Ti0kyQNN+UIAwx/lkzVu6yosSlS0LcreJM1bhPJLgMvHyDFBWuOVA/jNCTX3kkVSTqH8onu
	Y60DWJ3D77mpQOYAkaiRaUD87H0CLtqu8j90JprD+vscoEwM9iVR0RG8Xxx1cSMjGet3PdY
	YSBqOtJVzF4c33s3Vis0ZX2a8DzrdchsraBeL/apst8OL9bXVYkctYLxKTdPoTyTZJ10y0o
	DzwiX9FnnIwCVbu2AaeuajkZGvJ744tmkFGPuWBfzW1em9Q868BozCF/zQjFUk2UW5WG/ow
	4cZLPK1Hli6Am0o61Y6aTcKovG9pA==
X-QQ-GoodBg: 2
Message-ID: <9ce86761-37e0-8a21-7b91-344058c9b563@uniontech.com>+CB7907B06FE21C96
Date: Sat, 5 Mar 2022 23:33:58 +0800
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.0
Subject: Re: [PATCH] drivers/xen: use helper macro __ATTR_RW
To: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: Juergen Gross <jgross@suse.com>, David Vrabel <david.vrabel@citrix.com>,
 Boris Ostrovsky <boris.ostrovsky@oracle.com>,
 Stefano Stabellini <sstabellini@kernel.org>, xen-devel@lists.xenproject.org,
 linux-kernel@vger.kernel.org, Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
References: <20220305133823.158961-1-zhanglianjie@uniontech.com>
 <YiNry3TtIPbEh1Yr@kroah.com>
From: zhanglianjie <zhanglianjie@uniontech.com>
In-Reply-To: <YiNry3TtIPbEh1Yr@kroah.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-QQ-SENDSIZE: 520
Feedback-ID: bizesmtp:uniontech.com:qybgforeign:qybgforeign5
X-QQ-Bgrelay: 1

Hi,

在 2022/3/5 21:55, Greg Kroah-Hartman 写道:
> On Sat, Mar 05, 2022 at 09:38:23PM +0800, zhanglianjie wrote:
>> Use helper macro __ATTR_RW to define HYPERVISOR_ATTR_RW to make code more clear.
>> Minor readability improvement.
>>
>> Signed-off-by: zhanglianjie <zhanglianjie@uniontech.com>
> 
> Is this the name you sign legal documents with?  (I have to ask...)
Yes, this is my signature.
> 
>>
>> diff --git a/drivers/xen/sys-hypervisor.c b/drivers/xen/sys-hypervisor.c
>> index feb1d16252e7..fcb0792f090e 100644
>> --- a/drivers/xen/sys-hypervisor.c
>> +++ b/drivers/xen/sys-hypervisor.c
>> @@ -22,11 +22,10 @@
>>   #endif
>>
>>   #define HYPERVISOR_ATTR_RO(_name) \
>> -static struct hyp_sysfs_attr  _name##_attr = __ATTR_RO(_name)
>> +static struct hyp_sysfs_attr _name##_attr = __ATTR_RO(_name)
> 
> Why change this line?  That's not relevant to this change :(
> 
There are two spaces between struct hyp_sysfs_attr and _name, by the 
way, modify it.
thanks.
> thanks,
> 
> greg k-h
> 




From xen-devel-bounces@lists.xenproject.org Sat Mar 05 17:45:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 05 Mar 2022 17:45:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285208.484456 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQYT1-0002HC-97; Sat, 05 Mar 2022 17:45:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285208.484456; Sat, 05 Mar 2022 17:45:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQYT1-0002H5-68; Sat, 05 Mar 2022 17:45:19 +0000
Received: by outflank-mailman (input) for mailman id 285208;
 Sat, 05 Mar 2022 17:45:17 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQYSz-0002Gb-Lc; Sat, 05 Mar 2022 17:45:17 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQYSz-0002qd-Jp; Sat, 05 Mar 2022 17:45:17 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQYSz-0005WJ-5d; Sat, 05 Mar 2022 17:45:17 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQYSz-0006RK-5B; Sat, 05 Mar 2022 17:45:17 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=68qMFOOVtrXUg27AkpVeUu4ZeIXXxuDBZAVfc3KdjCM=; b=SVhhSCJzjpuhCB+Q9k+6FKhvS1
	YS8agymTJMsLWj7Sy40cfVNrguPOaKFXcva47KiBBQ/d2jbchKCAc0RQLoiel+kDj1qctWjsqcnd8
	sDSGS+6lF4gPISfpFMlYc0M/oRQl8WpTalkKJPe37cXA0201HHPVUz+iXY4wtJf56aXc=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168421-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168421: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 05 Mar 2022 17:45:17 +0000

flight 168421 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168421/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    5 days
Failing since        168258  2022-03-01 01:55:31 Z    4 days   44 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    0 days    8 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 05 19:43:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 05 Mar 2022 19:43:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285220.484468 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQaJ2-0005e7-Ti; Sat, 05 Mar 2022 19:43:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285220.484468; Sat, 05 Mar 2022 19:43:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQaJ2-0005e0-Px; Sat, 05 Mar 2022 19:43:08 +0000
Received: by outflank-mailman (input) for mailman id 285220;
 Sat, 05 Mar 2022 19:43:07 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=SXtQ=TQ=linuxfoundation.org=gregkh@srs-se1.protection.inumbo.net>)
 id 1nQaJ1-0005du-3P
 for xen-devel@lists.xenproject.org; Sat, 05 Mar 2022 19:43:07 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 78a31d1d-9cbc-11ec-8539-5f4723681683;
 Sat, 05 Mar 2022 20:43:03 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 8C004B80BEC;
 Sat,  5 Mar 2022 19:43:02 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 68459C004E1;
 Sat,  5 Mar 2022 19:43:00 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 78a31d1d-9cbc-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org;
	s=korg; t=1646509381;
	bh=aTwFDS8jMOiSeLykSnLcKQ9n+zp/EVyGHLTn7DlzIkY=;
	h=Date:From:To:Cc:Subject:References:In-Reply-To:From;
	b=veIwZV6CHYNDlYHUU0i4h/aqyLz0BpL3r442nxVH4Fhow68c3KJgMw82DjRZtHGg+
	 BvQr/1VWlJBPSGOqnAPmUhylAJ85ZEIlCgQSFSLEZOql/1nvNxTLG/WgRLKxkOsi/r
	 E2m/lWGlkFhIoYSMNYsTWO3+bKA1ptcJyiuFcaGM=
Date: Sat, 5 Mar 2022 20:42:56 +0100
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: zhanglianjie <zhanglianjie@uniontech.com>
Cc: Juergen Gross <jgross@suse.com>, David Vrabel <david.vrabel@citrix.com>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Subject: Re: [PATCH] drivers/xen: use helper macro __ATTR_RW
Message-ID: <YiO9QDpqepZXEZ6L@kroah.com>
References: <20220305133823.158961-1-zhanglianjie@uniontech.com>
 <YiNry3TtIPbEh1Yr@kroah.com>
 <622382f3.1c69fb81.55f81.aff0SMTPIN_ADDED_BROKEN@mx.google.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <622382f3.1c69fb81.55f81.aff0SMTPIN_ADDED_BROKEN@mx.google.com>

On Sat, Mar 05, 2022 at 11:33:58PM +0800, zhanglianjie wrote:
> Hi,
> 
> 在 2022/3/5 21:55, Greg Kroah-Hartman 写道:
> > On Sat, Mar 05, 2022 at 09:38:23PM +0800, zhanglianjie wrote:
> > > Use helper macro __ATTR_RW to define HYPERVISOR_ATTR_RW to make code more clear.
> > > Minor readability improvement.
> > > 
> > > Signed-off-by: zhanglianjie <zhanglianjie@uniontech.com>
> > 
> > Is this the name you sign legal documents with?  (I have to ask...)
> Yes, this is my signature.
> > 
> > > 
> > > diff --git a/drivers/xen/sys-hypervisor.c b/drivers/xen/sys-hypervisor.c
> > > index feb1d16252e7..fcb0792f090e 100644
> > > --- a/drivers/xen/sys-hypervisor.c
> > > +++ b/drivers/xen/sys-hypervisor.c
> > > @@ -22,11 +22,10 @@
> > >   #endif
> > > 
> > >   #define HYPERVISOR_ATTR_RO(_name) \
> > > -static struct hyp_sysfs_attr  _name##_attr = __ATTR_RO(_name)
> > > +static struct hyp_sysfs_attr _name##_attr = __ATTR_RO(_name)
> > 
> > Why change this line?  That's not relevant to this change :(
> > 
> There are two spaces between struct hyp_sysfs_attr and _name, by the way,
> modify it.

Coding style cleanups should be a separate patch, as each change should
only do one logical thing.

But hey, I'm not the maintainer of this file/driver, others might be
more lax.

good luck!

greg k-h


From xen-devel-bounces@lists.xenproject.org Sat Mar 05 20:05:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 05 Mar 2022 20:05:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285227.484479 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQaeZ-0008CB-Ja; Sat, 05 Mar 2022 20:05:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285227.484479; Sat, 05 Mar 2022 20:05:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQaeZ-0008C4-FZ; Sat, 05 Mar 2022 20:05:23 +0000
Received: by outflank-mailman (input) for mailman id 285227;
 Sat, 05 Mar 2022 20:05:22 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQaeY-0008Bu-I9; Sat, 05 Mar 2022 20:05:22 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQaeY-0005Hh-GI; Sat, 05 Mar 2022 20:05:22 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQaeX-0003i1-UL; Sat, 05 Mar 2022 20:05:22 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQaeX-0001ZQ-Tt; Sat, 05 Mar 2022 20:05:21 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=d87+ifF+VHIBlP9WzlXNkE455o3e7XwEgGP41cv/19U=; b=Rt7e/5sPLfeSUlvfcJsPCGSN/Y
	l7W3tOGH06whvGEfYidEqtVr+VqPi12PERrkYohYEph0jKfgMbA+T/GSQJUDPJmA4WpWemcv7Cw7v
	JjHyzYH3ih04gLfuMsauYDIzxLHI2YpqVW1G5cFWuA+xrot5fkmiOFg1YRywSmLCiriw=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168414-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168414: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=ac84e82f78cb55ce8e760e0b5887d56efd78d6bc
X-Osstest-Versions-That:
    linux=07ebd38a0da24d2534da57b4841346379db9f354
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 05 Mar 2022 20:05:21 +0000

flight 168414 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168414/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168403
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168403
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168403
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168403
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168403
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168403
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168403
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168403
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                ac84e82f78cb55ce8e760e0b5887d56efd78d6bc
baseline version:
 linux                07ebd38a0da24d2534da57b4841346379db9f354

Last test of basis   168403  2022-03-04 20:39:45 Z    0 days
Testing same since   168414  2022-03-05 08:13:13 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Jens Axboe <axboe@kernel.dk>
  Linus Torvalds <torvalds@linux-foundation.org>
  Yu Kuai <yukuai3@huawei.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   07ebd38a0da2..ac84e82f78cb  ac84e82f78cb55ce8e760e0b5887d56efd78d6bc -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Sat Mar 05 22:04:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 05 Mar 2022 22:04:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285242.484490 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQcVk-0002yp-Ka; Sat, 05 Mar 2022 22:04:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285242.484490; Sat, 05 Mar 2022 22:04:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQcVk-0002yi-H3; Sat, 05 Mar 2022 22:04:24 +0000
Received: by outflank-mailman (input) for mailman id 285242;
 Sat, 05 Mar 2022 22:04:23 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQcVj-0002yY-SU; Sat, 05 Mar 2022 22:04:23 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQcVj-0007Gr-Qi; Sat, 05 Mar 2022 22:04:23 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQcVj-0008On-De; Sat, 05 Mar 2022 22:04:23 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQcVj-00019V-DA; Sat, 05 Mar 2022 22:04:23 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Vl2CoDfMf1AjiRG7qk5oVqPnDOtXBGWc6+nlVaLYg5E=; b=WVIwRaTRj23wL6C8HzWa/zf/CD
	r5CflYfYAgMTX5QlH5W2/5ZwR6E6EWNw9H+d9/zIX+yNIPytPpefu3JuuoKzNod4u8btrMSC8QW9m
	NapbXDMfMBTNpIs91BvkRJms8KOel12kF9Hnec35kxqPHNqQRKf4dhtbMP5ynZ/LJCVo=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168422-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168422: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 05 Mar 2022 22:04:23 +0000

flight 168422 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168422/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    5 days
Failing since        168258  2022-03-01 01:55:31 Z    4 days   45 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    0 days    9 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 05 22:13:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 05 Mar 2022 22:13:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285253.484500 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQced-0004T3-Hx; Sat, 05 Mar 2022 22:13:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285253.484500; Sat, 05 Mar 2022 22:13:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQced-0004Sw-F0; Sat, 05 Mar 2022 22:13:35 +0000
Received: by outflank-mailman (input) for mailman id 285253;
 Sat, 05 Mar 2022 22:13:33 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQceb-0004Sm-Qi; Sat, 05 Mar 2022 22:13:33 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQceb-0007R1-Iq; Sat, 05 Mar 2022 22:13:33 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQceb-0000EN-4X; Sat, 05 Mar 2022 22:13:33 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQceb-0004bi-47; Sat, 05 Mar 2022 22:13:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=MKUnhempoMMgv+Xuv+LTBX8GQo3faDvVzkIw7VWd50M=; b=ZhkXwTacNU4+xUZr/oGf2p9lQu
	htTK/Se4fiGQxHfpn0W9z0gNkj63wWcrUr6B0h8ZJ2bkhQtZePZJ3Q+QfczP4x/0A2ps0T8+vR0o5
	/4qAXuEmzBIEfATQ3SNdbctuhJyE4rM7uo4IqshNDergC+SgQOf9xS6unn6lD4zTmUcg=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168417-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168417: tolerable FAIL
X-Osstest-Failures:
    xen-unstable:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:heisenbug
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=1145d94c738ea13e0d2ceedb97a4cfe46292b08e
X-Osstest-Versions-That:
    xen=1145d94c738ea13e0d2ceedb97a4cfe46292b08e
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 05 Mar 2022 22:13:33 +0000

flight 168417 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168417/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-armhf-armhf-xl-rtds     18 guest-start/debian.repeat  fail pass in 168406

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168406
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168406
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168406
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168406
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168406
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168406
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168406
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168406
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168406
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168406
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168406
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168406
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  1145d94c738ea13e0d2ceedb97a4cfe46292b08e
baseline version:
 xen                  1145d94c738ea13e0d2ceedb97a4cfe46292b08e

Last test of basis   168417  2022-03-05 10:23:49 Z    0 days
Testing same since                          (not found)         0 attempts

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Published tested tree is already up to date.



From xen-devel-bounces@lists.xenproject.org Sat Mar 05 23:04:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 05 Mar 2022 23:04:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285265.484511 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQdS2-0001KC-9S; Sat, 05 Mar 2022 23:04:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285265.484511; Sat, 05 Mar 2022 23:04:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQdS2-0001K5-6R; Sat, 05 Mar 2022 23:04:38 +0000
Received: by outflank-mailman (input) for mailman id 285265;
 Sat, 05 Mar 2022 23:04:36 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQdS0-0001Jv-Cu; Sat, 05 Mar 2022 23:04:36 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQdS0-0008KH-AD; Sat, 05 Mar 2022 23:04:36 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQdRz-0003GF-WA; Sat, 05 Mar 2022 23:04:36 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQdRz-0003N9-Ve; Sat, 05 Mar 2022 23:04:35 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=6QiN8NDvvgUemvBjWLXRNy4DUnTtJanklCmcdNEtgaQ=; b=sB/jEcNACiL1gDHNhdVH+hOlG0
	kJT54niuthxdTFoPK2P8slVbxnJ5UYViseEb5lF/30Z2sc4+COelmaSektlVaIO5aurYrmWSzUBCR
	0VLsvwjxUcwgzQVptz13EKSksK6BY5ZX+baaUNTNAdAnAzrVLj2aLnyLIXScY0GJB5UA=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168424-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168424: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 05 Mar 2022 23:04:35 +0000

flight 168424 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168424/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    5 days
Failing since        168258  2022-03-01 01:55:31 Z    4 days   46 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    0 days   10 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 06 00:27:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 06 Mar 2022 00:27:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285278.484523 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQejy-0001QC-Go; Sun, 06 Mar 2022 00:27:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285278.484523; Sun, 06 Mar 2022 00:27:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQejy-0001Q5-Do; Sun, 06 Mar 2022 00:27:14 +0000
Received: by outflank-mailman (input) for mailman id 285278;
 Sun, 06 Mar 2022 00:27:13 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=nNsN=TR=uniontech.com=zhanglianjie@srs-se1.protection.inumbo.net>)
 id 1nQejx-0001Pz-1A
 for xen-devel@lists.xenproject.org; Sun, 06 Mar 2022 00:27:13 +0000
Received: from smtpproxy21.qq.com (smtpbg702.qq.com [203.205.195.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 25a7ce92-9ce4-11ec-8539-5f4723681683;
 Sun, 06 Mar 2022 01:27:06 +0100 (CET)
Received: from [192.168.31.174] ( [114.222.120.105])
 by bizesmtp.qq.com (ESMTP) with 
 id ; Sun, 06 Mar 2022 08:26:53 +0800 (CST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 25a7ce92-9ce4-11ec-8539-5f4723681683
X-QQ-mid: bizesmtp73t1646526415ti1ccug6
X-QQ-SSF: 00400000002000B0I000B00A0000000
X-QQ-FEAT: Yoi7Hxl/bVy2P93GWHfklzKDrsURX7H8T1Vgrem27D85i64DwFlKMUkFT0Y/G
	SAPCInBPraAvoVWYfx9NoliTKW9b1CBIFqmmRFpUV7YJQ6MYpxvxfvaTOTT6khHUZVkOgSK
	cvH+OxbWWpSXeHfcSFpHzzsgPHpgXa0XsCeH6pMy2RXDPHnK//ooIdZzWkTz+iTloi0WIa/
	4O6cZwjhHNAAkxA7P1s+4uQHu3fchkul2BL48w5mOL5Ywm/v8Bi4o2BMqTPCZ8JWyPsBU+L
	vXLztD/4G4DN0K/NjYp2xjT0IJbuhvvseHyxlQLralg5quMfo2tka6crBKYhUv3WJFqOATy
	Oq8HkE+0zBP9Nnbw9Q=
X-QQ-GoodBg: 2
Message-ID: <587332d1-167b-505f-8f73-1aabbb2e8b3a@uniontech.com>+14969B3658B13A2C
Date: Sun, 6 Mar 2022 08:26:52 +0800
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.0
Subject: Re: [PATCH] drivers/xen: use helper macro __ATTR_RW
To: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: Juergen Gross <jgross@suse.com>, David Vrabel <david.vrabel@citrix.com>,
 Boris Ostrovsky <boris.ostrovsky@oracle.com>,
 Stefano Stabellini <sstabellini@kernel.org>, xen-devel@lists.xenproject.org,
 linux-kernel@vger.kernel.org, Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
References: <20220305133823.158961-1-zhanglianjie@uniontech.com>
 <YiNry3TtIPbEh1Yr@kroah.com>
 <622382f3.1c69fb81.55f81.aff0SMTPIN_ADDED_BROKEN@mx.google.com>
 <YiO9QDpqepZXEZ6L@kroah.com>
From: zhanglianjie <zhanglianjie@uniontech.com>
In-Reply-To: <YiO9QDpqepZXEZ6L@kroah.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-QQ-SENDSIZE: 520
Feedback-ID: bizesmtp:uniontech.com:qybgforeign:qybgforeign2
X-QQ-Bgrelay: 1

Hi,

在 2022/3/6 03:42, Greg Kroah-Hartman 写道:
> On Sat, Mar 05, 2022 at 11:33:58PM +0800, zhanglianjie wrote:
>> Hi,
>>
>> 在 2022/3/5 21:55, Greg Kroah-Hartman 写道:
>>> On Sat, Mar 05, 2022 at 09:38:23PM +0800, zhanglianjie wrote:
>>>> Use helper macro __ATTR_RW to define HYPERVISOR_ATTR_RW to make code more clear.
>>>> Minor readability improvement.
>>>>
>>>> Signed-off-by: zhanglianjie <zhanglianjie@uniontech.com>
>>>
>>> Is this the name you sign legal documents with?  (I have to ask...)
>> Yes, this is my signature.
>>>
>>>>
>>>> diff --git a/drivers/xen/sys-hypervisor.c b/drivers/xen/sys-hypervisor.c
>>>> index feb1d16252e7..fcb0792f090e 100644
>>>> --- a/drivers/xen/sys-hypervisor.c
>>>> +++ b/drivers/xen/sys-hypervisor.c
>>>> @@ -22,11 +22,10 @@
>>>>    #endif
>>>>
>>>>    #define HYPERVISOR_ATTR_RO(_name) \
>>>> -static struct hyp_sysfs_attr  _name##_attr = __ATTR_RO(_name)
>>>> +static struct hyp_sysfs_attr _name##_attr = __ATTR_RO(_name)
>>>
>>> Why change this line?  That's not relevant to this change :(
>>>
>> There are two spaces between struct hyp_sysfs_attr and _name, by the way,
>> modify it.
> 
> Coding style cleanups should be a separate patch, as each change should
> only do one logical thing.
> 
> But hey, I'm not the maintainer of this file/driver, others might be
> more lax.
Thanks for the guide, I will pay attention to these in the future.
> 
> good luck!
> 
> greg k-h
> 




From xen-devel-bounces@lists.xenproject.org Sun Mar 06 00:44:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 06 Mar 2022 00:44:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285285.484534 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQf0l-0003jn-0B; Sun, 06 Mar 2022 00:44:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285285.484534; Sun, 06 Mar 2022 00:44:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQf0k-0003jg-Sx; Sun, 06 Mar 2022 00:44:34 +0000
Received: by outflank-mailman (input) for mailman id 285285;
 Sun, 06 Mar 2022 00:44:33 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQf0j-0003jW-IM; Sun, 06 Mar 2022 00:44:33 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQf0j-00027K-Fx; Sun, 06 Mar 2022 00:44:33 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQf0j-00078Y-1l; Sun, 06 Mar 2022 00:44:33 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQf0j-0007Hz-1H; Sun, 06 Mar 2022 00:44:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=8bQC/UAU3P27jAl19Al35JmZ4OcOBo/gfN4RQJevHp8=; b=gVvrckk0dg3ZxVCpu0HU5/3W8h
	uwY5TDaVjpITPmEv8tICLTk1WsVdzajtUoszPqJzP339LXwz43dLUgAeSGuEMc5Ue8PPAo7ko3aP9
	um75yW2MbP8JtiE3Xmx1IhF3vfh+wwueoE2KcXADAjkqrQ1cAWDmsW/wf5uAcnNwH+hE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168425-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168425: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 06 Mar 2022 00:44:33 +0000

flight 168425 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168425/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    5 days
Failing since        168258  2022-03-01 01:55:31 Z    4 days   47 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    1 days   11 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 06 01:36:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 06 Mar 2022 01:36:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285298.484545 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQfon-0002TU-W0; Sun, 06 Mar 2022 01:36:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285298.484545; Sun, 06 Mar 2022 01:36:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQfon-0002TN-RK; Sun, 06 Mar 2022 01:36:17 +0000
Received: by outflank-mailman (input) for mailman id 285298;
 Sun, 06 Mar 2022 01:36:16 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQfom-0002TD-Ho; Sun, 06 Mar 2022 01:36:16 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQfom-0004Z4-Do; Sun, 06 Mar 2022 01:36:16 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQfol-0008U3-Fr; Sun, 06 Mar 2022 01:36:15 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQfol-0007Z1-FR; Sun, 06 Mar 2022 01:36:15 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=7zXaZgVBy7pJek7zXmG3fh5x0vUwBtorrTCfu3VMa5Y=; b=UoZmCVhW0AJaIilQDvLyoWjnEk
	NfLv5+2Ej4LLf6Zotnz5kAkrhLjXfYe0rQp0/y5kxTBUiXe5yp2Gfha8hvvWf17wG6rr3W7ppbHJY
	IqUPwuojzzxW3Kld2tPXlTMlxoDWI/2lA6t51PIWeXuTEBNUJe3WL8p43kh18C6sTOvs=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168426-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168426: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 06 Mar 2022 01:36:15 +0000

flight 168426 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168426/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    5 days
Failing since        168258  2022-03-01 01:55:31 Z    4 days   48 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    1 days   12 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 06 02:16:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 06 Mar 2022 02:16:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285311.484556 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQgRU-0007NZ-66; Sun, 06 Mar 2022 02:16:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285311.484556; Sun, 06 Mar 2022 02:16:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQgRT-0007NQ-Ue; Sun, 06 Mar 2022 02:16:15 +0000
Received: by outflank-mailman (input) for mailman id 285311;
 Sun, 06 Mar 2022 02:16:14 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQgRS-0007Mk-TP; Sun, 06 Mar 2022 02:16:14 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQgRS-0005ft-Qx; Sun, 06 Mar 2022 02:16:14 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQgRR-00016v-FJ; Sun, 06 Mar 2022 02:16:13 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQgRR-000747-Er; Sun, 06 Mar 2022 02:16:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=UeMVtpUCClVySuvNFqRCfUCktLHJb2rkqrwLTKb87AI=; b=jrgnEkbuVbcSMn2MOx6I3eQOaG
	0JyRqydNq1In2TeFqbAR2iq6kFu2RUF9iGxqn2GWwVsGWDtfFIN+vFud245FF3Z87eyXaPoqktoGV
	jY3Gt6r0Va6rqA5W3sM9Hn18hEoOSc6OD0aTRCuCPkOWc82SLcAIhG9mTam2+M+A055Y=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168420-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168420: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=5c8463886d50eeb0337bd121ab877cf692731e36
X-Osstest-Versions-That:
    qemuu=3d1fbc59665ff8a5d74b0fd30583044fe99e1117
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 06 Mar 2022 02:16:13 +0000

flight 168420 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168420/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168410
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168410
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168410
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168410
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168410
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168410
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168410
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168410
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 qemuu                5c8463886d50eeb0337bd121ab877cf692731e36
baseline version:
 qemuu                3d1fbc59665ff8a5d74b0fd30583044fe99e1117

Last test of basis   168410  2022-03-05 01:57:37 Z    1 days
Testing same since   168420  2022-03-05 14:38:22 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Akihiko Odaki <akihiko.odaki@gmail.com>
  BALATON Zoltan <balaton@eik.bme.hu>
  Carwyn Ellis <carwynellis@gmail.com>
  Denis V. Lunev <den@openvz.org>
  Dov Murik <dovmurik@linux.ibm.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Pavel Polozov <pavel.polozov@virtuozzo.com>
  Peter Maydell <peter.maydell@linaro.org>
  Philippe Mathieu-Daudé <f4bug@amsat.org>
  Volker Rümelin <vr_qemu@t-online.de>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   3d1fbc5966..5c8463886d  5c8463886d50eeb0337bd121ab877cf692731e36 -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Sun Mar 06 02:16:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 06 Mar 2022 02:16:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285322.484567 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQgS1-0007yR-Hc; Sun, 06 Mar 2022 02:16:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285322.484567; Sun, 06 Mar 2022 02:16:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQgS1-0007yI-EW; Sun, 06 Mar 2022 02:16:49 +0000
Received: by outflank-mailman (input) for mailman id 285322;
 Sun, 06 Mar 2022 02:16:49 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQgS1-0007y8-2y; Sun, 06 Mar 2022 02:16:49 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQgS1-0005hE-27; Sun, 06 Mar 2022 02:16:49 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQgS0-00018z-7p; Sun, 06 Mar 2022 02:16:48 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQgS0-0007YZ-7P; Sun, 06 Mar 2022 02:16:48 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=LgeW0as4Fauy+42vgS4G2ChrBBSjj5u57k/1MQ/2SJ8=; b=KP+uiuqDq4ZwhWT72gJWA5BNQu
	ImVf0Ij6vSwm8O3e2nTJgEr9hr21kwBOZVyOydAmT/tcbbIbf9usb2JF2tV+0ggpatWXnyb6l1E6E
	9EYr5L6kXZEmnW4v7jQpgPCAhL40hfGdWV8qrLDMPx/LjDPgH21n022RpMPL8XYZZgmI=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168427-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168427: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 06 Mar 2022 02:16:48 +0000

flight 168427 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168427/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    5 days
Failing since        168258  2022-03-01 01:55:31 Z    5 days   49 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    1 days   13 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 06 03:24:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 06 Mar 2022 03:24:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285337.484578 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQhV7-0006U7-NR; Sun, 06 Mar 2022 03:24:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285337.484578; Sun, 06 Mar 2022 03:24:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQhV7-0006Tg-F5; Sun, 06 Mar 2022 03:24:05 +0000
Received: by outflank-mailman (input) for mailman id 285337;
 Sun, 06 Mar 2022 03:24:04 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQhV5-0006TW-VO; Sun, 06 Mar 2022 03:24:03 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQhV5-0006q5-Ta; Sun, 06 Mar 2022 03:24:03 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQhV5-0003CU-FD; Sun, 06 Mar 2022 03:24:03 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQhV5-0008Om-Ek; Sun, 06 Mar 2022 03:24:03 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=54TGbLwBxRuR8M6/OoJtf9msbjmlD3DHFTb3ELzu2zw=; b=kCxel1t8WcO0Lh08eYRSQpJSpC
	AyTcu4knLmbE4slnUQN3zfXttVzKaE1wo2ctcVY/N0LSnZrnLQCR9eqP76fYprsEX+VhiFST6buR9
	4RI2WvlVJaEar4vikf9jjxoOVTElc/93gonacesVR/F1H+23vFZoxCxf57IhbeaFwffU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168430-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168430: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 06 Mar 2022 03:24:03 +0000

flight 168430 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168430/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    5 days
Failing since        168258  2022-03-01 01:55:31 Z    5 days   50 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    1 days   14 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 06 04:52:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 06 Mar 2022 04:52:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285351.484589 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQis0-00071q-3q; Sun, 06 Mar 2022 04:51:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285351.484589; Sun, 06 Mar 2022 04:51:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQirz-00071P-SS; Sun, 06 Mar 2022 04:51:47 +0000
Received: by outflank-mailman (input) for mailman id 285351;
 Sun, 06 Mar 2022 04:51:46 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQiry-00071F-16; Sun, 06 Mar 2022 04:51:46 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQirx-0008UU-VU; Sun, 06 Mar 2022 04:51:45 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQirw-0007Qy-Q1; Sun, 06 Mar 2022 04:51:44 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQirw-0002Wx-O1; Sun, 06 Mar 2022 04:51:44 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=xGFZtIrnLk3o5z70XjPPtylh0S3JrRIdiMgtJHdiCxk=; b=kp2ghiTHseRkX66RsGZ0eIzS5J
	/sIq+CCGV9WMAkYhSqeg5rwJY2dMiSFiCl+aLlDtE9cU9Yfd40CuWR9dvBnaDXieSXnY+5DTtrshf
	xaY5Tl4S1g+R71dHx/McUhNVQyIGsF2UOUwtLiq8KUVDTa7CF6x9/SbW3pOI2TwP4vpU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168431-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168431: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 06 Mar 2022 04:51:44 +0000

flight 168431 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168431/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    5 days
Failing since        168258  2022-03-01 01:55:31 Z    5 days   51 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    1 days   15 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 06 09:08:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 06 Mar 2022 09:08:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285371.484599 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQms2-0006RJ-4i; Sun, 06 Mar 2022 09:08:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285371.484599; Sun, 06 Mar 2022 09:08:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQms2-0006RC-1i; Sun, 06 Mar 2022 09:08:06 +0000
Received: by outflank-mailman (input) for mailman id 285371;
 Sun, 06 Mar 2022 09:08:04 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQms0-0006R2-K4; Sun, 06 Mar 2022 09:08:04 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQms0-00058v-GC; Sun, 06 Mar 2022 09:08:04 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQms0-0004TA-5O; Sun, 06 Mar 2022 09:08:04 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQms0-0000n4-3Y; Sun, 06 Mar 2022 09:08:04 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=7GW8NqQsB5+cwgcrh8LhfnmkCpiyuCOxvutWQclx6Ro=; b=Lhdcagtiel9I4/R5zutO7ZaxW1
	V2h74Sx1Sl0BbWgQMjdFXlq8ARcx26XQ6JM66RF0L2LsJjcykPmsQsfRudyx6Vb1v3OYGwgzndsNM
	F+DxucDHhud8Va988vfErIyQ6tUvt+jrAhE/5IErWOpl1NI4lJe9Cv6tANl1PBOqthbM=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168423-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168423: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-armhf-armhf-xl-credit2:debian-install:fail:heisenbug
    linux-linus:test-armhf-armhf-xl-vhd:guest-start/debian.repeat:fail:heisenbug
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=0014404f9c18dd360a1b8bb4243643c679ce99bf
X-Osstest-Versions-That:
    linux=ac84e82f78cb55ce8e760e0b5887d56efd78d6bc
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 06 Mar 2022 09:08:04 +0000

flight 168423 linux-linus real [real]
flight 168434 linux-linus real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168423/
http://logs.test-lab.xenproject.org/osstest/logs/168434/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-armhf-armhf-xl-credit2  12 debian-install      fail pass in 168434-retest
 test-armhf-armhf-xl-vhd 17 guest-start/debian.repeat fail pass in 168434-retest

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-xl-credit2 15 migrate-support-check fail in 168434 never pass
 test-armhf-armhf-xl-credit2 16 saverestore-support-check fail in 168434 never pass
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168414
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168414
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168414
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168414
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168414
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168414
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168414
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168414
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                0014404f9c18dd360a1b8bb4243643c679ce99bf
baseline version:
 linux                ac84e82f78cb55ce8e760e0b5887d56efd78d6bc

Last test of basis   168414  2022-03-05 08:13:13 Z    1 days
Testing same since   168423  2022-03-05 20:42:39 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Alexander Egorenkov <egorenar@linux.ibm.com>
  Andrew Morton <akpm@linux-foundation.org>
  Chengming Zhou <zhouchengming@bytedance.com>
  Heiko Carstens <hca@linux.ibm.com>
  Hugh Dickins <hughd@google.com>
  Ilya Leoshkevich <iii@linux.ibm.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Michal Hocko <mhocko@suse.com>
  Mike Kravetz <mike.kravetz@oracle.com>
  Qian Cai <quic_qiancai@quicinc.com>
  Suren Baghdasaryan <surenb@google.com>
  Vasily Gorbik <gor@linux.ibm.com>
  Yosry Ahmed <yosryahmed@google.com>
  Yun Zhou <yun.zhou@windriver.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  fail    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      fail    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   ac84e82f78cb..0014404f9c18  0014404f9c18dd360a1b8bb4243643c679ce99bf -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Sun Mar 06 10:15:05 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 06 Mar 2022 10:15:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285386.484611 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQnua-00053i-4O; Sun, 06 Mar 2022 10:14:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285386.484611; Sun, 06 Mar 2022 10:14:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQnua-00053b-1F; Sun, 06 Mar 2022 10:14:48 +0000
Received: by outflank-mailman (input) for mailman id 285386;
 Sun, 06 Mar 2022 10:14:47 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQnuZ-00053R-Jg; Sun, 06 Mar 2022 10:14:47 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQnuZ-0006Hv-H6; Sun, 06 Mar 2022 10:14:47 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQnuZ-0006uX-1V; Sun, 06 Mar 2022 10:14:47 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQnuZ-0001nM-13; Sun, 06 Mar 2022 10:14:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=JQPo7Jx+ynhW6p1e7NEam7n33tNtXu3DDqZ44Gr9Sbk=; b=fLJF52A8+hhXhF9JihbbGETDNq
	zYYVN55QLctiQ4do7wJvQ+svJvD500A4mlJfRsi1UrWh+mmixMYjKF0cNMaYZraLrTXCHdVg0lloj
	drscvrNNXiMrqqyAoefo1mS51+eITRNko6GNhCru4rafcDLbqj0xtxaUEbfzBwWLmw94=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168432-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168432: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=86c691e6dedc1cfb487eb1e1651c0600cc567ea9
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 06 Mar 2022 10:14:47 +0000

flight 168432 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168432/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              86c691e6dedc1cfb487eb1e1651c0600cc567ea9
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  604 days
Failing since        151818  2020-07-11 04:18:52 Z  603 days  585 attempts
Testing same since   168413  2022-03-05 04:19:02 Z    1 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 99598 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 06 11:23:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 06 Mar 2022 11:23:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285398.484622 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQoyw-0003aZ-L1; Sun, 06 Mar 2022 11:23:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285398.484622; Sun, 06 Mar 2022 11:23:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQoyw-0003aS-Gq; Sun, 06 Mar 2022 11:23:22 +0000
Received: by outflank-mailman (input) for mailman id 285398;
 Sun, 06 Mar 2022 11:23:21 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQoyv-0003aI-9l; Sun, 06 Mar 2022 11:23:21 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQoyv-0007Pv-5c; Sun, 06 Mar 2022 11:23:21 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQoyu-0002af-Qx; Sun, 06 Mar 2022 11:23:20 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQoyu-00059U-QT; Sun, 06 Mar 2022 11:23:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=NbNC2eMoY7lWbHDUZVbLY2JGF0cBxJJ53jTshdySFgk=; b=W97g84PZuMLKwPwA1JaIil67HU
	Rb7jtrZ0qOTUehIh9BLyxmP0rrzqrme/eyllOBx/oEP8q5wKpr8v43K2EtIuqfADNXT+3/9pT4qmy
	fFAYMCy/F1hfQlMsq8b1w4XDiDlaCGaTAfXyk6iXg/c+Te0CGOr4GbXToRg6cxaHJ1Tg=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168428-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168428: tolerable FAIL
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-rtds:guest-localmigrate/x10:fail:heisenbug
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=1145d94c738ea13e0d2ceedb97a4cfe46292b08e
X-Osstest-Versions-That:
    xen=1145d94c738ea13e0d2ceedb97a4cfe46292b08e
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 06 Mar 2022 11:23:20 +0000

flight 168428 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168428/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-rtds     20 guest-localmigrate/x10     fail pass in 168417

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168417
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168417
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168417
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168417
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168417
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168417
 test-armhf-armhf-xl-rtds     18 guest-start/debian.repeat    fail  like 168417
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168417
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168417
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168417
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168417
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168417
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168417
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  1145d94c738ea13e0d2ceedb97a4cfe46292b08e
baseline version:
 xen                  1145d94c738ea13e0d2ceedb97a4cfe46292b08e

Last test of basis   168428  2022-03-06 01:52:10 Z    0 days
Testing same since                          (not found)         0 attempts

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     fail    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Published tested tree is already up to date.



From xen-devel-bounces@lists.xenproject.org Sun Mar 06 11:52:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 06 Mar 2022 11:52:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285411.484632 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQpRR-0006yO-4n; Sun, 06 Mar 2022 11:52:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285411.484632; Sun, 06 Mar 2022 11:52:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQpRR-0006yH-1y; Sun, 06 Mar 2022 11:52:49 +0000
Received: by outflank-mailman (input) for mailman id 285411;
 Sun, 06 Mar 2022 11:52:48 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQpRQ-0006y7-FK; Sun, 06 Mar 2022 11:52:48 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQpRQ-0007tf-Ce; Sun, 06 Mar 2022 11:52:48 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQpRP-0003pc-QP; Sun, 06 Mar 2022 11:52:47 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQpRP-0000wI-Px; Sun, 06 Mar 2022 11:52:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=X06EG+epUTEEr+NnEbVg5BJNUy1E7nMZIE1yP+QHa74=; b=POOKK1gn6IrG45uMn18MNElLvH
	KEdLXbvUFrpWsIgiqZYqfxQ+e0T+32FjePnrxYyKfUwHIDJetcyqzNrR0eJGsfU8hB8pNpAgArTfi
	DYheCcskZ321yaO/Bbu0+oEsNzDwOcU5O0MI7wUk5N6oVa5deheFI/xvh/faPwcUZEYo=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168433-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168433: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 06 Mar 2022 11:52:47 +0000

flight 168433 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168433/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    6 days
Failing since        168258  2022-03-01 01:55:31 Z    5 days   52 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    1 days   16 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 06 13:31:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 06 Mar 2022 13:31:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285426.484643 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQqz3-0008Ls-BP; Sun, 06 Mar 2022 13:31:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285426.484643; Sun, 06 Mar 2022 13:31:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQqz3-0008Ll-8S; Sun, 06 Mar 2022 13:31:37 +0000
Received: by outflank-mailman (input) for mailman id 285426;
 Sun, 06 Mar 2022 13:31:35 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQqz1-0008Lb-JF; Sun, 06 Mar 2022 13:31:35 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQqz1-00019a-HS; Sun, 06 Mar 2022 13:31:35 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQqz1-00083H-2Y; Sun, 06 Mar 2022 13:31:35 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQqz1-0007kb-27; Sun, 06 Mar 2022 13:31:35 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=ShC9c+irqX94nQ2TRZqEKStG/AKqEXk1MCtKi8UazXQ=; b=jnjc7NihaDFFvMGmmIJA4PQTgH
	7Tvklnhn98H2yJsVazpIKOeUM55tUO+Msl9/kK00dAROBHEZqctJXye/4CC8MroQdryUBXBeqac1R
	v2dHAMevqKyXlpM1KsxrhOSjgahOdB2jrYpbX0qDVR5uLHWHgfAL5cgAz6CV5cijop3Y=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168429-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168429: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:allowable
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=2acf5e1d0e0f15be1b0ad85cf05b3a6e6307680c
X-Osstest-Versions-That:
    qemuu=5c8463886d50eeb0337bd121ab877cf692731e36
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 06 Mar 2022 13:31:35 +0000

flight 168429 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168429/

Failures :-/ but no regressions.

Regressions which are regarded as allowable (not blocking):
 test-armhf-armhf-xl-rtds    18 guest-start/debian.repeat fail REGR. vs. 168420

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168420
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168420
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168420
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168420
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168420
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168420
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168420
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168420
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 qemuu                2acf5e1d0e0f15be1b0ad85cf05b3a6e6307680c
baseline version:
 qemuu                5c8463886d50eeb0337bd121ab877cf692731e36

Last test of basis   168420  2022-03-05 14:38:22 Z    0 days
Testing same since   168429  2022-03-06 02:19:22 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Alex Bennée <alex.bennee@linaro.org>
  Emanuele Giuseppe Esposito <eesposit@redhat.com>
  Hanna Reitz <hreitz@redhat.com>
  Kevin Wolf <kwolf@redhat.com>
  Peter Maydell <peter.maydell@linaro.org>
  Richard Henderson <richard.henderson@linaro.org>
  Stefan Hajnoczi <stefanha@redhat.com>
  Thomas Huth <thuth@redhat.com>
  Ziqiao Kong <ziqiaokong@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   5c8463886d..2acf5e1d0e  2acf5e1d0e0f15be1b0ad85cf05b3a6e6307680c -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Sun Mar 06 15:10:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 06 Mar 2022 15:10:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285439.484654 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQsW7-0000Ts-DC; Sun, 06 Mar 2022 15:09:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285439.484654; Sun, 06 Mar 2022 15:09:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQsW7-0000Tl-AH; Sun, 06 Mar 2022 15:09:51 +0000
Received: by outflank-mailman (input) for mailman id 285439;
 Sun, 06 Mar 2022 15:09:50 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQsW6-0000Tb-BZ; Sun, 06 Mar 2022 15:09:50 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQsW6-0002nF-AW; Sun, 06 Mar 2022 15:09:50 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQsW5-0003fc-Qh; Sun, 06 Mar 2022 15:09:49 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQsW5-0007Ua-QF; Sun, 06 Mar 2022 15:09:49 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=2MS562ZavQn8WbBhLtndull47wZGw0/+eEJw01pTAQI=; b=lSjYnUYo3ixB+yDGtZ8Bmd3iuN
	WNNOt7EGJ2RogLSOzVtq1s2dWa5eb60jD9vuR6TdTHjXkqAmctZSWGRvWC2/xKwoUdUHa7qODAR9E
	HYhkz52S1WMlg3c7dPqUSnaGye5eRpgb4JQx/X/z6mnRARCtxkUeqxrwIgrALM1iBLpE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168436-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168436: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 06 Mar 2022 15:09:49 +0000

flight 168436 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168436/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    6 days
Failing since        168258  2022-03-01 01:55:31 Z    5 days   53 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    1 days   17 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 06 15:35:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 06 Mar 2022 15:35:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285450.484666 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQsuV-0003lt-Ed; Sun, 06 Mar 2022 15:35:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285450.484666; Sun, 06 Mar 2022 15:35:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQsuV-0003lm-Be; Sun, 06 Mar 2022 15:35:03 +0000
Received: by outflank-mailman (input) for mailman id 285450;
 Sun, 06 Mar 2022 15:35:02 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQsuU-0003kq-7t; Sun, 06 Mar 2022 15:35:02 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQsuU-0003CS-4a; Sun, 06 Mar 2022 15:35:02 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQsuT-0004cX-CJ; Sun, 06 Mar 2022 15:35:01 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQsuT-0004jp-Bt; Sun, 06 Mar 2022 15:35:01 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=nLdqFXCwmG9s4kJZc3bIEzW4tzLnBmHR8EbpvUt2eYY=; b=7O4c9dNQsaxQLvU+S/UqiU9Lu1
	hHpDaIlchnAflGmYh4HRI+d+bK8Mt0O0HOWKIL+bygg14Ud9y1CzwunoigVTSdqDRFm4yBzBy78Es
	EBu2Ddg3Mbd+Vha78uwxiTE+QMjf2HwiMsDydGn71seveabFtsOkxjJfw2fKOZ47UhkQ=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168435-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168435: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=dcde98da997075053041942ecf97d787855722ec
X-Osstest-Versions-That:
    linux=0014404f9c18dd360a1b8bb4243643c679ce99bf
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 06 Mar 2022 15:35:01 +0000

flight 168435 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168435/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168423
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168423
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168423
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168423
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168423
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168423
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168423
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168423
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                dcde98da997075053041942ecf97d787855722ec
baseline version:
 linux                0014404f9c18dd360a1b8bb4243643c679ce99bf

Last test of basis   168423  2022-03-05 20:42:39 Z    0 days
Testing same since   168435  2022-03-06 09:11:05 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  anton ivanov <anton.ivanov@cambridgegreys.com>
  Benjamin Tissoires <benjamin.tissoires@redhat.com>
  David Gow <davidgow@google.com>
  Dmitry Torokhov <dmitry.torokhov@gmail.com>
  Hans de Goede <hdegoede@redhat.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  William Mahon <wmahon@chromium.org>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   0014404f9c18..dcde98da9970  dcde98da997075053041942ecf97d787855722ec -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Sun Mar 06 15:57:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 06 Mar 2022 15:57:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285463.484676 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQtGY-0006J3-C0; Sun, 06 Mar 2022 15:57:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285463.484676; Sun, 06 Mar 2022 15:57:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQtGY-0006Iw-8m; Sun, 06 Mar 2022 15:57:50 +0000
Received: by outflank-mailman (input) for mailman id 285463;
 Sun, 06 Mar 2022 15:57:49 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQtGX-0006Im-4V; Sun, 06 Mar 2022 15:57:49 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQtGX-0003Zy-1w; Sun, 06 Mar 2022 15:57:49 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQtGW-0005Ra-M6; Sun, 06 Mar 2022 15:57:48 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQtGW-0006ga-Lf; Sun, 06 Mar 2022 15:57:48 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=dKXECvEc2eLVu1g7+SEdOI4+qIX1K7PH2qoD2QC61bU=; b=VOJv38g1h/bTNuPn0r3dWpREtW
	SruNho9QjXJ16U1+rAydaLaMYUA5zhFb40RZWf6JTA32l5xXhJiBY18auFhhJYeLuoQRQslmtmcJf
	Ticb7GS1jx/flmJj4fOxz7DeUuZvxGGqIMBHARcd8sKcmXME46g24qlvQv4C9aezO/SU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168438-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168438: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 06 Mar 2022 15:57:48 +0000

flight 168438 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168438/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    6 days
Failing since        168258  2022-03-01 01:55:31 Z    5 days   54 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    1 days   18 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 06 17:01:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 06 Mar 2022 17:01:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285475.484688 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQuGM-0005Lh-TS; Sun, 06 Mar 2022 17:01:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285475.484688; Sun, 06 Mar 2022 17:01:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQuGM-0005La-QR; Sun, 06 Mar 2022 17:01:42 +0000
Received: by outflank-mailman (input) for mailman id 285475;
 Sun, 06 Mar 2022 17:01:41 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=8/if=TR=microsoft.com=mikelley@srs-se1.protection.inumbo.net>)
 id 1nQuGK-0005LU-Qt
 for xen-devel@lists.xenproject.org; Sun, 06 Mar 2022 17:01:41 +0000
Received: from na01-obe.outbound.protection.outlook.com
 (mail-cusazlp170110003.outbound.protection.outlook.com
 [2a01:111:f403:c111::3])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 148b6fa6-9d6f-11ec-8539-5f4723681683;
 Sun, 06 Mar 2022 18:01:39 +0100 (CET)
Received: from MN0PR21MB3098.namprd21.prod.outlook.com (2603:10b6:208:376::14)
 by BYAPR21MB1365.namprd21.prod.outlook.com (2603:10b6:a03:10c::33)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.4; Sun, 6 Mar
 2022 17:01:28 +0000
Received: from MN0PR21MB3098.namprd21.prod.outlook.com
 ([fe80::a0b3:c840:b085:5d7b]) by MN0PR21MB3098.namprd21.prod.outlook.com
 ([fe80::a0b3:c840:b085:5d7b%8]) with mapi id 15.20.5061.008; Sun, 6 Mar 2022
 17:01:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 148b6fa6-9d6f-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=aYMnlDLnCoTlQ0m0bfddJAdHUnc0KWQe1gNc/5nZKL+bOXXO4x7IJ1Lzo+J6+5g8yJ/7f/khf5gDmSHC3r6uVNI6yUbP+r7KIRg+vmQCwXSaUy/kzR0sBUqFktRUy5XozVHzpsBMSv+xL6L3QYy5Ez1WZbfMeyhauU7+GRQtQrlr1hZ3s4kXtehlcDyyAN9+DNVjZOeGZtUEJF6rmp+0wXOUZ+TpIHh+trpkGXUyavel/aFtOLAnYnUqvPBl+BTYXLagteOJRdfOWFjhMQBV9jXmIZXLSU/NH1otendfS4WhEhUsrNn2bE/Ff24dUXkK4zTQeQF/m6gxbd6HJV83Uw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=uOLUEoNUTj3NHP00m/Xck2wpfIX+AoQV3lb6Af/zENw=;
 b=i3leWI6ml4/sGDaUguV3EF6vrimkBHk+Ntf1hC6+tgEKdh9FfyKFDUXdJt6Mc6gGp62eSHewYa7JVjUk8SvDwVHpEDEJ02+GCEZ0HYUchH0KRQWbJx0Rj+6UtmjU0eOkQy+UfMkJGpb9m7Q1cOLruPHt5WO+i5+vSmGpqXXlcjVkhXbQ881cgusbgrdC7/f5hsjoipWeLbR2EaFHv6bhOEvnODmaYKNpPvPw+30cFQ286SWDNabAI/gh+D0Ph11kloM9/mYb13PuKVkrwBYIShD4Yz+kYX74dJZnPRPzARS6GhaYcti+twRFwS5MRjz00Vkm0SiRhgJK/Us9iJ27zw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=microsoft.com; dmarc=pass action=none
 header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=selector2;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=uOLUEoNUTj3NHP00m/Xck2wpfIX+AoQV3lb6Af/zENw=;
 b=iJCGNxdF3Fo0JwCRGxSWD8hV5azsE8sqYRXKmv+oOMtnpDVDrsqx6f3tT+jCO/MhFWdWUjGKeM4YxMCgxFi4ZNUAwkizBqYblPXhhdgSVxh6YazT1NVkCNrv8hdTV6XMVczk0C5pVdjD2fmIsOE0uwX/CRXIZjW/1ZFY12LBio8=
From: "Michael Kelley (LINUX)" <mikelley@microsoft.com>
To: Dongli Zhang <dongli.zhang@oracle.com>, Christoph Hellwig <hch@lst.de>,
	"iommu@lists.linux-foundation.org" <iommu@lists.linux-foundation.org>
CC: "x86@kernel.org" <x86@kernel.org>, Anshuman Khandual
	<anshuman.khandual@arm.com>, Tom Lendacky <thomas.lendacky@amd.com>, Konrad
 Rzeszutek Wilk <konrad.wilk@oracle.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>, David
 Woodhouse <dwmw2@infradead.org>, Lu Baolu <baolu.lu@linux.intel.com>, Robin
 Murphy <robin.murphy@arm.com>, "linux-arm-kernel@lists.infradead.org"
	<linux-arm-kernel@lists.infradead.org>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>, "linux-ia64@vger.kernel.org"
	<linux-ia64@vger.kernel.org>, "linux-mips@vger.kernel.org"
	<linux-mips@vger.kernel.org>, "linuxppc-dev@lists.ozlabs.org"
	<linuxppc-dev@lists.ozlabs.org>, "linux-riscv@lists.infradead.org"
	<linux-riscv@lists.infradead.org>, "linux-s390@vger.kernel.org"
	<linux-s390@vger.kernel.org>, "linux-hyperv@vger.kernel.org"
	<linux-hyperv@vger.kernel.org>, "tboot-devel@lists.sourceforge.net"
	<tboot-devel@lists.sourceforge.net>, "linux-pci@vger.kernel.org"
	<linux-pci@vger.kernel.org>
Subject: RE: [PATCH 10/12] swiotlb: add a SWIOTLB_ANY flag to lift the low
 memory restriction
Thread-Topic: [PATCH 10/12] swiotlb: add a SWIOTLB_ANY flag to lift the low
 memory restriction
Thread-Index: AQHYLVq0uSlYkDWbKUeZ67gbcRgpDayviVjwgAAHDgCAAwkZ0A==
Date: Sun, 6 Mar 2022 17:01:27 +0000
Message-ID:
 <MN0PR21MB3098558B83B5A520FFCCE6D1D7079@MN0PR21MB3098.namprd21.prod.outlook.com>
References: <20220301105311.885699-1-hch@lst.de>
 <20220301105311.885699-11-hch@lst.de>
 <MN0PR21MB3098F7AFC85BE5D83B0E64E5D7059@MN0PR21MB3098.namprd21.prod.outlook.com>
 <556312e4-da86-b980-475c-1cfd7818ffdc@oracle.com>
In-Reply-To: <556312e4-da86-b980-475c-1cfd7818ffdc@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels:
 MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=433969a6-4cde-4cdd-a529-34a7717de2f8;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2022-03-06T16:49:10Z;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47;
authentication-results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=microsoft.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 7d1051ce-a5a5-44e0-5274-08d9ff92f44c
x-ms-traffictypediagnostic: BYAPR21MB1365:EE_
x-ms-exchange-atpmessageproperties: SA|SL
x-microsoft-antispam-prvs:
 <BYAPR21MB13659872C94F06366112C6F1D7079@BYAPR21MB1365.namprd21.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info:
 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
x-forefront-antispam-report:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN0PR21MB3098.namprd21.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(6506007)(8936002)(71200400001)(508600001)(7696005)(5660300002)(26005)(53546011)(83380400001)(7416002)(55016003)(52536014)(86362001)(8990500004)(186003)(66556008)(64756008)(66946007)(76116006)(110136005)(4326008)(66446008)(33656002)(38070700005)(9686003)(316002)(2906002)(10290500003)(66476007)(82960400001)(82950400001)(122000001)(966005)(8676002)(54906003)(38100700002);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0:
 =?us-ascii?Q?xwcnoc49++k/XhQTp+2xSDHA9y6nJz1z6k0O1G26LmO5odDj/mcyDy67UKpQ?=
 =?us-ascii?Q?atsCmhOUT1CNoCRvsRb8FJ15c9CcTSJjscmwn5zBVkuYykgc5hTEkO5ubS5Q?=
 =?us-ascii?Q?G538yKWNDx5PH93yx3TryuzdyH5nS43Ye0o0AEufYshObFIybN8nC+m68cH5?=
 =?us-ascii?Q?C2slQIIBhjp2nUMG6wFxsLo1bskfI4bPX3H+PCHw6O4X2XbmnIiap7/GBTS+?=
 =?us-ascii?Q?/DOAOc3fS/Ydm1bbmXFypF4miLfReMO5WJ9mqWN39GuQo7nF2QCCA9B56pjh?=
 =?us-ascii?Q?N9iV2ducIHefTDbAC/Ylt5O1k/mwFoLRlSsk0BXY5vx94mzelBOmrV2f5gEH?=
 =?us-ascii?Q?QpxJ50Xz3f9v/GLa6QuIJBDyU6Z5w+1mWtASBeZakgsenBrHs6vpLc+nAuWs?=
 =?us-ascii?Q?zD8WOsuZveyljsCkxzUdhaw4FOWu/e83hI+Jn0/iY4lUL6/9IvoGqrBCsNbM?=
 =?us-ascii?Q?2IiH4PRXYfUiiNcjiaAqjEZZuMLapJ/Xl0RFMLOdNX0xlfI4AGE0qQd87A0Q?=
 =?us-ascii?Q?/FG/my6ddA8Rld9tKAMbMZrmWHNp67KoM15gYAdYVHDUdkFG3HRBh70ySdqJ?=
 =?us-ascii?Q?E345gse/QkZqtt90wGCVdGQZTsmqC682iQlOeNdd03LiEsobH1KrAi9GShyz?=
 =?us-ascii?Q?BNag8SVzmr+RcOJ+przr77WaIgb/OHw89MiITVdJZ6l2XAPb7ffb31/9kjsc?=
 =?us-ascii?Q?PLI/ebYE69W0zxOhyTK6A+zKj004ROzHjd7avlxfjlFN3w+1o+/uTpT8sChW?=
 =?us-ascii?Q?SLHRjLsTq2Vtld8UDs7E12yswQyfbSTv4qZFrFEKXR88gqZnvcM/5+UULPiQ?=
 =?us-ascii?Q?dbYUkCFtQ0Hzf/7Qr7eAQTXBDqNLfZyYcvR0B94CO+y9RhOD5LltrpwI+er8?=
 =?us-ascii?Q?6QE07Qi0W5gizDqrWeAl+dfOUgqo/YerLnvRffG/DEvo0P4pSuD4xtFyqyP0?=
 =?us-ascii?Q?9rC1GvF/aky2xcQhqdJZ5gTIvcDEvY//3x+zyfvX7OoNBQx/BAVHd43tE2ZJ?=
 =?us-ascii?Q?dwUyBphT15DI8gmCDgHtX5lDMsdkgaNQDZantDHFJzs1sgV3eqQ4vC1rcjKb?=
 =?us-ascii?Q?qx18JiDUikv/LWeabdhyicg83Uhx0/TfItI6XW9uy8dfCHCnkpbibYA3Cn2X?=
 =?us-ascii?Q?6ulK98fJukbpLv7k3CuiwCnBe7xZIF5gIIyS2z0QlWrfxUbQqZ3N/zjsJ3VH?=
 =?us-ascii?Q?o1mF4oWflEKfjAgZ7DV6d/irZ4u9qVNSQ6ovp5EYG4ivC3Zala8A8OSNadOR?=
 =?us-ascii?Q?70KPAhcVq/HShpqT2avpnIdshnYUio277Oscxj5eHYDwXwCSZ0dfEzHfQkU8?=
 =?us-ascii?Q?QDSuuvI1DzoXS055cIJI6z1QUuXBlB2s1v2PxaxikB2CS1vYlAs5pSjpE+uP?=
 =?us-ascii?Q?H/hpqt+CxLOBq3GA/bAjCLWUFW7xufRy1i2eDyLv6Y6tl5/MG0snzjjR0EgH?=
 =?us-ascii?Q?/tz+aVekbQq8cN/mYRDSOSTFpMha6iN7LO3GwYE9oLufTZm6Xmnt/A=3D=3D?=
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN0PR21MB3098.namprd21.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7d1051ce-a5a5-44e0-5274-08d9ff92f44c
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Mar 2022 17:01:27.7736
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 2Q0P5BfbqyMvCZd1dvCYqFGw3KLmQ/5chX9kG4KyKK7Eoffm0WWVL9/U+9PkReHFRC8UhPbPgRfmtnQ6VwnAaX7dxPg1zbseOeLON1XtiHI=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR21MB1365

From: Dongli Zhang <dongli.zhang@oracle.com> Sent: Friday, March 4, 2022 10=
:28 AM
>=20
> Hi Michael,
>=20
> On 3/4/22 10:12 AM, Michael Kelley (LINUX) wrote:
> > From: Christoph Hellwig <hch@lst.de> Sent: Tuesday, March 1, 2022 2:53 =
AM
> >>
> >> Power SVM wants to allocate a swiotlb buffer that is not restricted to=
 low memory for
> >> the trusted hypervisor scheme.  Consolidate the support for this into =
the swiotlb_init
> >> interface by adding a new flag.
> >
> > Hyper-V Isolated VMs want to do the same thing of not restricting the s=
wiotlb
> > buffer to low memory.  That's what Tianyu Lan's patch set[1] is proposi=
ng.
> > Hyper-V synthetic devices have no DMA addressing limitations, and the
> > likelihood of using a PCI pass-thru device with addressing limitations =
in an
> > Isolated VM seems vanishingly small.
> >
> > So could use of the SWIOTLB_ANY flag be generalized?  Let Hyper-V init
> > code set the flag before swiotlb_init() is called.  Or provide a CONFIG
> > variable that Hyper-V Isolated VMs could set.
>=20
> I used to send 64-bit swiotlb, while at that time people thought it was t=
he same
> as Restricted DMA patchset.
>=20
> https://lore.kernel.org/all/20210203233709.19819-1-dongli.zhang@oracle.co=
m/
>=20
> However, I do not think Restricted DMA patchset is going to supports 64-b=
it (or
> high memory) DMA. Is this what you are looking for?

Yes, it looks like your patchset would do what we want for Hyper-V Isolated
VMs, but it is a more complex solution than is needed.  My assertion is tha=
t
in some environments, such as Hyper-V Isolated VMs, we're willing to assume
all devices are 64-bit DMA capable, and to stop carrying the legacy baggage=
.
Bounce buffering is used for a different scenario (memory encryption), and
the bounce buffers can be allocated in high memory.   There's no need for a
2nd swiotlb buffer.

Michael


From xen-devel-bounces@lists.xenproject.org Sun Mar 06 17:43:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 06 Mar 2022 17:43:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285482.484699 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQuuF-0001A4-W2; Sun, 06 Mar 2022 17:42:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285482.484699; Sun, 06 Mar 2022 17:42:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQuuF-00019x-Ss; Sun, 06 Mar 2022 17:42:55 +0000
Received: by outflank-mailman (input) for mailman id 285482;
 Sun, 06 Mar 2022 17:42:55 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQuuF-00019n-3T; Sun, 06 Mar 2022 17:42:55 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQuuE-0005og-Tn; Sun, 06 Mar 2022 17:42:54 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQuuE-0000ks-JH; Sun, 06 Mar 2022 17:42:54 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQuuE-0008LE-Ip; Sun, 06 Mar 2022 17:42:54 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=/mMGDeVXvN1gDNFmHY3Br+No0M2CMN3Adwmq47hbEGs=; b=MFridKGL3D6pTNQyN7PhT4FdbF
	+A8A9mAcSvGENJOeBTu8lavXRdW5wp4tqDqJMdLonC/4txDPAqNAb9kKsGgS7JCv5zR4N/m7PtbpX
	E+ax5uRSQR8mfPkMd5gcR8eYJtUX0p7gaQpGFKDKLc2rvstg+ponxQ/nCbWeKYlvcfTY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168439-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168439: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 06 Mar 2022 17:42:54 +0000

flight 168439 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168439/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    6 days
Failing since        168258  2022-03-01 01:55:31 Z    5 days   55 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    1 days   19 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 06 19:51:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 06 Mar 2022 19:51:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285495.484709 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQwu4-0005Mq-1a; Sun, 06 Mar 2022 19:50:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285495.484709; Sun, 06 Mar 2022 19:50:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQwu3-0005Mj-Un; Sun, 06 Mar 2022 19:50:51 +0000
Received: by outflank-mailman (input) for mailman id 285495;
 Sun, 06 Mar 2022 19:50:50 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQwu2-0005MZ-T4; Sun, 06 Mar 2022 19:50:50 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQwu2-000827-QU; Sun, 06 Mar 2022 19:50:50 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQwu2-0005VB-60; Sun, 06 Mar 2022 19:50:50 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQwu2-0000cL-5Z; Sun, 06 Mar 2022 19:50:50 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=xa4AVnT/6db3ZqagU1ZNIUHk0VtJaNwTggdvR061lTg=; b=Ua/UKHsCRSj3cqH1fgBbi1hTIE
	M8X/qPmln1KW14/nQjsV7a5W5L5Avfco118E+JpzKQdCpqjP8u0pUYayG0Gf200EMd2JrmWsEs6Xs
	Q6Dp+yXswwNogOHgEKCqMC/p0qEPS7SmUxPilXCB6nubNLmPyTnak+znb9b/x6dhoXhY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168440-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168440: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 06 Mar 2022 19:50:50 +0000

flight 168440 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168440/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    6 days
Failing since        168258  2022-03-01 01:55:31 Z    5 days   56 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    1 days   20 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 06 20:22:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 06 Mar 2022 20:22:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285508.484721 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQxOc-0000Qp-Mm; Sun, 06 Mar 2022 20:22:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285508.484721; Sun, 06 Mar 2022 20:22:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQxOc-0000Qi-JY; Sun, 06 Mar 2022 20:22:26 +0000
Received: by outflank-mailman (input) for mailman id 285508;
 Sun, 06 Mar 2022 20:22:24 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQxOa-0000QY-FV; Sun, 06 Mar 2022 20:22:24 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQxOa-0000BK-9A; Sun, 06 Mar 2022 20:22:24 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQxOZ-0006EQ-HY; Sun, 06 Mar 2022 20:22:23 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQxOZ-0000ar-H7; Sun, 06 Mar 2022 20:22:23 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=TJdb0hYa6aoiMGuFoSyiaPjmXcyCJRtz1I2pxbTm8Ks=; b=DN1B35SL7IdruxoxUJJwL0z//q
	vo2YQWQyyVej2Q9jMoEyQVG3Ykv7mZAf7q4olqE+X5M8gQrcU4AbjUsA/yZgYoahD4pCUAJjhGsQX
	aMiczhwxL5ea8d+/5/NqprmR5hgYTomTGx9p0L8kIDWufNxgh66W46DusR8zD0qJfDMg=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168437-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168437: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=9d662a6b22a0838a85c5432385f35db2488a33a5
X-Osstest-Versions-That:
    qemuu=2acf5e1d0e0f15be1b0ad85cf05b3a6e6307680c
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 06 Mar 2022 20:22:23 +0000

flight 168437 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168437/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168429
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168429
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168429
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168429
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168429
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168429
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168429
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168429
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 qemuu                9d662a6b22a0838a85c5432385f35db2488a33a5
baseline version:
 qemuu                2acf5e1d0e0f15be1b0ad85cf05b3a6e6307680c

Last test of basis   168429  2022-03-06 02:19:22 Z    0 days
Testing same since   168437  2022-03-06 13:39:36 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Alex Bennée <alex.bennee@linaro.org>
  Cédric Le Goater <clg@kaod.org>
  Lucas Mateus Castro (alqotel) <lucas.araujo@eldorado.org.br>
  Matheus Ferst <matheus.ferst@eldorado.org.br>
  Miroslav Rezanina <mrezanin@redhat.com>
  Peter Maydell <peter.maydell@linaro.org>
  Víctor Colombo <victor.colombo@eldorado.org.br>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   2acf5e1d0e..9d662a6b22  9d662a6b22a0838a85c5432385f35db2488a33a5 -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Sun Mar 06 20:36:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 06 Mar 2022 20:36:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285519.484732 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQxbq-00021z-Sj; Sun, 06 Mar 2022 20:36:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285519.484732; Sun, 06 Mar 2022 20:36:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQxbq-00021s-P2; Sun, 06 Mar 2022 20:36:06 +0000
Received: by outflank-mailman (input) for mailman id 285519;
 Sun, 06 Mar 2022 20:36:05 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQxbp-00021i-9n; Sun, 06 Mar 2022 20:36:05 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQxbp-0000SF-6U; Sun, 06 Mar 2022 20:36:05 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQxbo-0006W0-Rm; Sun, 06 Mar 2022 20:36:04 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQxbo-0006Og-RM; Sun, 06 Mar 2022 20:36:04 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=SoUcwM9OT7LmtqxN7KyzAB5G9lJkkptfduW33heVspY=; b=yRC3maK68Hu+srlo5tiIKj4VBh
	UITbljenLY3YbMcFUno5AKL67zJGY0vgOgptXcbDSesKRy2X+kMYNADjSnQIPbFaBjWzZQJjfxHGh
	ATms/buUXS1IXrrS37GjNfCePTmmN/0LEZDKSjNqhufRN2W9thplLyi6TQkV4li0Y5gY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168441-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168441: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 06 Mar 2022 20:36:04 +0000

flight 168441 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168441/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    6 days
Failing since        168258  2022-03-01 01:55:31 Z    5 days   57 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    1 days   21 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 06 22:05:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 06 Mar 2022 22:05:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285530.484742 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQz0H-0002W0-Dc; Sun, 06 Mar 2022 22:05:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285530.484742; Sun, 06 Mar 2022 22:05:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nQz0H-0002Vt-Al; Sun, 06 Mar 2022 22:05:25 +0000
Received: by outflank-mailman (input) for mailman id 285530;
 Sun, 06 Mar 2022 22:05:24 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQz0G-0002Vj-4g; Sun, 06 Mar 2022 22:05:24 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQz0G-0001wW-0C; Sun, 06 Mar 2022 22:05:24 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nQz0F-0008SL-Gj; Sun, 06 Mar 2022 22:05:23 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nQz0F-0006IR-GK; Sun, 06 Mar 2022 22:05:23 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=q6caQVoqsXfiTto0zLDjBpWkVQQA2xgcO4854iOJ9NY=; b=IJ+kzmDrOrRhsYzLl2UOTymqBO
	lPzZkceNdSGj0sAwXIu20J49H5Gc+vr+JfePauu07qYUBghEYSOaC2HwqnPozdJ5rRZso5y8cp51g
	bh7CKNAj7aEcU1n8bUjCPZokDSK5vles2AZ97OFb/0l6kSSvFH1Vac8WO5+zNp0KpqyY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168443-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168443: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 06 Mar 2022 22:05:23 +0000

flight 168443 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168443/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    6 days
Failing since        168258  2022-03-01 01:55:31 Z    5 days   58 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    1 days   22 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 06 23:17:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 06 Mar 2022 23:17:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285546.484754 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR07g-0001Oz-1w; Sun, 06 Mar 2022 23:17:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285546.484754; Sun, 06 Mar 2022 23:17:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR07f-0001Os-TE; Sun, 06 Mar 2022 23:17:07 +0000
Received: by outflank-mailman (input) for mailman id 285546;
 Sun, 06 Mar 2022 23:17:06 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nR07e-0001Oi-3X; Sun, 06 Mar 2022 23:17:06 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nR07e-000396-0M; Sun, 06 Mar 2022 23:17:06 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nR07d-0002yn-LU; Sun, 06 Mar 2022 23:17:05 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nR07d-0001ci-L7; Sun, 06 Mar 2022 23:17:05 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=G9/vjlYxMSN0GAPSQ8ns7qui65k0WRFnOS8U5QLYLuw=; b=J4McZlNc74ssUe3UTIHGtrAmri
	hXQ4SiuQ06zLqexmX2CdIYefY0813fEv++LATwnh52W9i8lYWREjBFyaQnBl7jOG/P5QvGa03AdpT
	10PQnf7HJ8p8unUct9wvTDqZAaK3qaqEGtAYBxKNWhQfh6/vastXRgEJwOsjrEI36MuE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168444-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168444: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 06 Mar 2022 23:17:05 +0000

flight 168444 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168444/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    6 days
Failing since        168258  2022-03-01 01:55:31 Z    5 days   59 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    1 days   23 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 00:33:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 00:33:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285557.484765 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR1Ja-0001Q8-5M; Mon, 07 Mar 2022 00:33:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285557.484765; Mon, 07 Mar 2022 00:33:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR1Ja-0001Q1-1b; Mon, 07 Mar 2022 00:33:30 +0000
Received: by outflank-mailman (input) for mailman id 285557;
 Mon, 07 Mar 2022 00:33:28 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nR1JY-0001Pr-3B; Mon, 07 Mar 2022 00:33:28 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nR1JY-0004yO-0b; Mon, 07 Mar 2022 00:33:28 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nR1JX-0006it-Ll; Mon, 07 Mar 2022 00:33:27 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nR1JX-0006af-LJ; Mon, 07 Mar 2022 00:33:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=IBNWIw1ZuH3pWAO110W0zoLTlfqG9YTk29LWCIIF+/o=; b=ag0dq7Sea+9rIIYbojhVvA0bQa
	HM89GpGF22n+8zhHm8K2DvyJ/vLakNEPb9THJAYS5/r+tUeGBt0/ehobGjW3WNGaaPVuhHNGVtH2f
	eE9pbNuahPIJ9EuPeHyWJNasvg69yAARBR5gCHD7Bt5XYFPO8y8cCivtet3Ld1sbi0hg=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168445-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168445: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 07 Mar 2022 00:33:27 +0000

flight 168445 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168445/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    6 days
Failing since        168258  2022-03-01 01:55:31 Z    5 days   60 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    1 days   24 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 00:46:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 00:46:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285569.484776 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR1WQ-00032F-9v; Mon, 07 Mar 2022 00:46:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285569.484776; Mon, 07 Mar 2022 00:46:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR1WQ-000328-5b; Mon, 07 Mar 2022 00:46:46 +0000
Received: by outflank-mailman (input) for mailman id 285569;
 Mon, 07 Mar 2022 00:46:45 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=6kcw=TS=gmail.com=trigger.huang@srs-se1.protection.inumbo.net>)
 id 1nR1WP-000322-Ed
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 00:46:45 +0000
Received: from mail-lf1-x12b.google.com (mail-lf1-x12b.google.com
 [2a00:1450:4864:20::12b])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 0f524b1b-9db0-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 01:46:44 +0100 (CET)
Received: by mail-lf1-x12b.google.com with SMTP id bt26so3808691lfb.3
 for <xen-devel@lists.xenproject.org>; Sun, 06 Mar 2022 16:46:44 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0f524b1b-9db0-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=4Pzk0JtwNXrNrmpzZ90IWdTWwUgH6E9/0rIUma2TChI=;
        b=TIMjhFd8yru+zCOf6tUeCUGWoFLspzp1RhGjDMw2r1qZ2xJ3RVhXrojTukIHWdqQoZ
         3GvPArfheYbnpNTu5ozOTZe0yJDXRroDykhNvAnmhNRnT2Eh49Gi3qK3+Vt0cjt4falt
         0tJyBwrKEH4czGZBMsUKJ0qz2vZUilkNu1ycdy9nCqgsJZOxS7JGa14GXgkoYN25BSNw
         MmnJGa79ofYXwG/5WC7g9YJzOkD0QZql9Sd/qa1v9EEmk8UAwP7ftoSLxVDob0XHiluL
         brHmT+BwnAtvrvB+XAy7HWGw+e3PP2SwtEzM8Nx5SLYHkO77mehfjERQkEotRhP8iBZg
         c4mw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=4Pzk0JtwNXrNrmpzZ90IWdTWwUgH6E9/0rIUma2TChI=;
        b=B5ZyxrWz60TE2oyGUGpUq6sFBL9jr4i+VZYtfni5UIJ5ZdkcicHIFfD2jXFGTBd9BL
         nbaDu5VuQK+3LAeaAodSrevrWmhM90Bttdi80g4MKu4f3PBcAxeAAZPoRDvTLnk3UrFD
         qs+EhNeSWhELz0CflsbK1Ackqd01gCEfw6Od+kN07CyIpVjknCWrU0fDNo74ZzLgZ7Q0
         DzqbVaxJEcbKd+8M+D28rwUEgdjlaABmR3STw9m609Cq31Ni7DKZm6dzkSVssZE4FYXL
         uxYaFMlxAl03jzR8VGOpC1mP4elkNkqtq5X2XbjpmpsKNBd4P4K2U+B0Dr63u1raLaBN
         nJow==
X-Gm-Message-State: AOAM532cGfKAZp4V636SnBcwpTp4q0FTxoJrO6Uyg8X3OletWG8+kiZP
	HSd8j/LIEMqY++q3lqzWaLweKshreQkN/KYeLAFVEOVkhC0=
X-Google-Smtp-Source: ABdhPJw4srG3aqenhSU1/lIsSRTC310I7MoBaNyzBKHRm57ZrHCoXxPA3ByToraeedKhglBLKlqOUqlDaDuxfChzg6k=
X-Received: by 2002:a05:6512:3d04:b0:442:1093:aa9b with SMTP id
 d4-20020a0565123d0400b004421093aa9bmr6323801lfv.499.1646614003582; Sun, 06
 Mar 2022 16:46:43 -0800 (PST)
MIME-Version: 1.0
References: <CANH0Q9k6SJQ+EXNZz+-ZPnPtsxHXthYcx1E6z8euSDEt7XhLQg@mail.gmail.com>
 <871qzhiwqg.fsf@linaro.org>
In-Reply-To: <871qzhiwqg.fsf@linaro.org>
From: Trigger Huang <trigger.huang@gmail.com>
Date: Mon, 7 Mar 2022 08:46:30 +0800
Message-ID: <CANH0Q9mF-vmW6gNDWnkMKR-VGQ2YbT+_55p=8F-N_L67Wuv5NQ@mail.gmail.com>
Subject: Re: How to create and start Xen guest VM by qemu-system-x86_64
 command line
To: =?UTF-8?B?QWxleCBCZW5uw6ll?= <alex.bennee@linaro.org>
Cc: xen-devel@lists.xenproject.org
Content-Type: multipart/alternative; boundary="000000000000c409bc05d996323d"

--000000000000c409bc05d996323d
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi Alex,

Thanks for the response.

Actually my target is trying to enable virglrenderer on Xen based Qemu.
Before, I have successfully enabled it on KVM based Qemu by the Qemu
command line. Such as 'qemu-system-x86_64 *-device virtio-vga-gl*  xxxxxxx'
If change to use xl, I don't know how to set this kind of special
option(*-device
virtio-vga-gl* ) to qemu after I checked the xl's arguments. Or do you have
any idea? :)

Seems using XL is much more common than directly using the qemu command
line , right?

Thanks,
Trigger

On Fri, Mar 4, 2022 at 11:05 PM Alex Benn=C3=A9e <alex.bennee@linaro.org> w=
rote:

>
> Trigger Huang <trigger.huang@gmail.com> writes:
>
> > Hello,
> >
> > I have built & installed Xen 4.15 onto my Ubuntu20.04 platform
> successfully according to
> > https://wiki.xenproject.org/wiki/Compiling_Xen_From_Source
> > After reboot, I entered Domain 0 successfully. The command xl info show=
s
> the right version string.
> > host                   : xvg
> > release                : 5.13.0-30-generic
> > version                : #33~20.04.1-Ubuntu SMP Mon Feb 7 14:25:10 UTC
> 2022
> > machine                : x86_64
> > nr_cpus                : 16
> > max_cpu_id             : 31
> > nr_nodes               : 1
> > cores_per_socket       : 8
> > threads_per_core       : 2
> > cpu_mhz                : 2994.377
> > hw_caps                :
> 178bf3ff:76d8320b:2e500800:244037ff:0000000f:219c91a9:00400004:00000500
> > virt_caps              : pv hvm hvm_directio pv_directio hap shadow
> > total_memory           : 15719
> > free_memory            : 11425
> > sharing_freed_memory   : 0
> > sharing_used_memory    : 0
> > outstanding_claims     : 0
> > free_cpus              : 0
> > xen_major              : 4
> > xen_minor              : 15
> > xen_extra              : .3-pre-atg08
> > xen_version            : 4.15.3-pre-atg08
> > xen_caps               : xen-3.0-x86_64 hvm-3.0-x86_32 hvm-3.0-x86_32p
> hvm-3.0-x86_64
> > xen_scheduler          : credit2
> > xen_pagesize           : 4096
> > platform_params        : virt_start=3D0xffff800000000000
> > xen_changeset          : Fri Mar 4 13:33:49 2022 +0800 git:6aa4cdbc31
> > xen_commandline        : placeholder dom0_mem=3D4096M,max:8192M
> no-real-mode edd=3Doff
> > cc_compiler            : gcc (Ubuntu 9.3.0-17ubuntu1~20.04) 9.3.0
> > cc_compile_by          : xvg
> > cc_compile_domain      :
> > cc_compile_date        : Fri Mar  4 14:21:33 CST 2022
> > build_id               : 234929adcb7588b1414c2b6e5477fa95052b4ded
> > xend_config_format     : 4
> >
> > Then my next step is to create ubuntu guest VM(sudo or use root user):
> >    /usr/local/lib/xen/bin/qemu-system-x86_64 -smp 1 -xen-domid 4
> -machine xenfv -m 4G -net nic,model=3Dvirtio -net
> > user,hostfwd=3Dtcp::2222-:22 -hda ./u2004.qcow2 -boot d -cdrom
> ./ubuntu-20.04-desktop-amd64.iso
> > However, I always failed with the following error:
> >     qemu-system-x86_64: failed to map ioreq server resources: error 3
> handle=3D0x55eeb1f6c0b0
> >     qemu-system-x86_64: xen hardware virtual machine initialisation
> failed
> > After debugging, the error is caused by
> osdep_xenforeignmemory_map_resource failed to invoke
> IOCTL_PRIVCMD_MMAP_RESOURCE. And
> > this IOCTL will return -1.
>
> Why are you not launching your guests with the xl commands?
>
> >
> > So my question is, am I using the right qemu command? Anything else is
> needed to set/config?
> > Note, if I didn't specify the option ' -xen-domid 4 -machine xenfv ', I
> can start qemu successfully
> >
> > Would you please help with it?
>
>
> --
> Alex Benn=C3=A9e
>

--000000000000c409bc05d996323d
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Hi Alex,</div><div><br></div><div>Thanks for the resp=
onse.</div><div><br></div><div>Actually my target is trying to enable virgl=
renderer on Xen based Qemu. Before, I have successfully enabled it on KVM b=
ased Qemu by the Qemu command line. Such as &#39;qemu-system-x86_64 <b>-dev=
ice virtio-vga-gl</b>=C2=A0 xxxxxxx&#39;</div><div>If change to use xl, I d=
on&#39;t know how to set this kind of special option(<b>-device virtio-vga-=
gl</b>

) to qemu after I checked the xl&#39;s arguments. Or do you have any idea? =
:)<br></div><div><br></div><div>Seems using XL is much more common than=20
directly

using the qemu command line , right?<br></div><div><br></div><div>Thanks,</=
div><div>Trigger<br></div></div><br><div class=3D"gmail_quote"><div dir=3D"=
ltr" class=3D"gmail_attr">On Fri, Mar 4, 2022 at 11:05 PM Alex Benn=C3=A9e =
&lt;<a href=3D"mailto:alex.bennee@linaro.org">alex.bennee@linaro.org</a>&gt=
; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px=
 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><br>
Trigger Huang &lt;<a href=3D"mailto:trigger.huang@gmail.com" target=3D"_bla=
nk">trigger.huang@gmail.com</a>&gt; writes:<br>
<br>
&gt; Hello,<br>
&gt;<br>
&gt; I have built &amp; installed Xen 4.15 onto my Ubuntu20.04 platform suc=
cessfully according to<br>
&gt; <a href=3D"https://wiki.xenproject.org/wiki/Compiling_Xen_From_Source"=
 rel=3D"noreferrer" target=3D"_blank">https://wiki.xenproject.org/wiki/Comp=
iling_Xen_From_Source</a> <br>
&gt; After reboot, I entered Domain 0 successfully. The command xl info sho=
ws the right version string.<br>
&gt; host=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0: xvg<br>
&gt; release=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 5.13.=
0-30-generic<br>
&gt; version=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : #33~2=
0.04.1-Ubuntu SMP Mon Feb 7 14:25:10 UTC 2022<br>
&gt; machine=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : x86_6=
4<br>
&gt; nr_cpus=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 16<br=
>
&gt; max_cpu_id=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 31<br>
&gt; nr_nodes=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 1<br>
&gt; cores_per_socket=C2=A0 =C2=A0 =C2=A0 =C2=A0: 8<br>
&gt; threads_per_core=C2=A0 =C2=A0 =C2=A0 =C2=A0: 2<br>
&gt; cpu_mhz=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 2994.=
377<br>
&gt; hw_caps=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 178bf=
3ff:76d8320b:2e500800:244037ff:0000000f:219c91a9:00400004:00000500<br>
&gt; virt_caps=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : pv hvm hvm=
_directio pv_directio hap shadow<br>
&gt; total_memory=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 15719<br>
&gt; free_memory=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 11425<br>
&gt; sharing_freed_memory=C2=A0 =C2=A0: 0<br>
&gt; sharing_used_memory=C2=A0 =C2=A0 : 0<br>
&gt; outstanding_claims=C2=A0 =C2=A0 =C2=A0: 0<br>
&gt; free_cpus=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 0<br>
&gt; xen_major=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 4<br>
&gt; xen_minor=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 15<br>
&gt; xen_extra=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : .3-pre-atg=
08<br>
&gt; xen_version=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : 4.15.3-pre-atg0=
8<br>
&gt; xen_caps=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: xen-3=
.0-x86_64 hvm-3.0-x86_32 hvm-3.0-x86_32p hvm-3.0-x86_64<br>
&gt; xen_scheduler=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : credit2<br>
&gt; xen_pagesize=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 4096<br>
&gt; platform_params=C2=A0 =C2=A0 =C2=A0 =C2=A0 : virt_start=3D0xffff800000=
000000<br>
&gt; xen_changeset=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : Fri Mar 4 13:33:49 2=
022 +0800 git:6aa4cdbc31<br>
&gt; xen_commandline=C2=A0 =C2=A0 =C2=A0 =C2=A0 : placeholder dom0_mem=3D40=
96M,max:8192M no-real-mode edd=3Doff<br>
&gt; cc_compiler=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : gcc (Ubuntu 9.3=
.0-17ubuntu1~20.04) 9.3.0<br>
&gt; cc_compile_by=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : xvg<br>
&gt; cc_compile_domain=C2=A0 =C2=A0 =C2=A0 :<br>
&gt; cc_compile_date=C2=A0 =C2=A0 =C2=A0 =C2=A0 : Fri Mar=C2=A0 4 14:21:33 =
CST 2022<br>
&gt; build_id=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: 23492=
9adcb7588b1414c2b6e5477fa95052b4ded<br>
&gt; xend_config_format=C2=A0 =C2=A0 =C2=A0: 4<br>
&gt;<br>
&gt; Then my next step is to create ubuntu guest VM(sudo or use root user):=
<br>
&gt;=C2=A0 =C2=A0 /usr/local/lib/xen/bin/qemu-system-x86_64 -smp 1 -xen-dom=
id 4 -machine xenfv -m 4G -net nic,model=3Dvirtio -net<br>
&gt; user,hostfwd=3Dtcp::2222-:22 -hda ./u2004.qcow2 -boot d -cdrom ./ubunt=
u-20.04-desktop-amd64.iso<br>
&gt; However, I always failed with the following error:<br>
&gt;=C2=A0 =C2=A0 =C2=A0qemu-system-x86_64: failed to map ioreq server reso=
urces: error 3 handle=3D0x55eeb1f6c0b0<br>
&gt;=C2=A0 =C2=A0 =C2=A0qemu-system-x86_64: xen hardware virtual machine in=
itialisation failed<br>
&gt; After debugging, the error is caused by osdep_xenforeignmemory_map_res=
ource failed to invoke IOCTL_PRIVCMD_MMAP_RESOURCE. And<br>
&gt; this IOCTL will return -1.<br>
<br>
Why are you not launching your guests with the xl commands? <br>
<br>
&gt;<br>
&gt; So my question is, am I using the right qemu command? Anything else is=
 needed to set/config?<br>
&gt; Note, if I didn&#39;t specify the option &#39; -xen-domid 4 -machine x=
enfv &#39;, I can start qemu successfully<br>
&gt;<br>
&gt; Would you please help with it?<br>
<br>
<br>
-- <br>
Alex Benn=C3=A9e<br>
</blockquote></div>

--000000000000c409bc05d996323d--


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 01:29:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 01:29:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285578.484787 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR2Bx-00013y-ND; Mon, 07 Mar 2022 01:29:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285578.484787; Mon, 07 Mar 2022 01:29:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR2Bx-00013r-KF; Mon, 07 Mar 2022 01:29:41 +0000
Received: by outflank-mailman (input) for mailman id 285578;
 Mon, 07 Mar 2022 01:29:40 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nR2Bw-00013h-MZ; Mon, 07 Mar 2022 01:29:40 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nR2Bw-0007St-Fz; Mon, 07 Mar 2022 01:29:40 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nR2Bw-0008RJ-4b; Mon, 07 Mar 2022 01:29:40 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nR2Bw-0008UO-4A; Mon, 07 Mar 2022 01:29:40 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=o3Tpunwh3UkwFaR3tJS/IVxLX5HBIjdfbqTBt2F4a8w=; b=W8sWczdZKuSXf8L2STn41VCADl
	O+f/Dh1rtifPVxFXRRjMhfSXqbG3Dey9tfsJniSF4wt2cHTJqQnt/x+hXHHxU5slE7P8oEmB4p1gl
	m2DCxddm63lN3QTGPKBMVoLYDvQooQdoUAf/Obg+TrobKRxMUcEYU7JvRnBNfxwD01KM=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168446-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168446: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 07 Mar 2022 01:29:40 +0000

flight 168446 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168446/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    6 days
Failing since        168258  2022-03-01 01:55:31 Z    5 days   61 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    2 days   25 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 02:12:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 02:12:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285592.484798 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR2ra-0006Zl-9k; Mon, 07 Mar 2022 02:12:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285592.484798; Mon, 07 Mar 2022 02:12:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR2ra-0006ZK-2l; Mon, 07 Mar 2022 02:12:42 +0000
Received: by outflank-mailman (input) for mailman id 285592;
 Mon, 07 Mar 2022 02:12:40 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=PzSx=TS=arm.com=Wei.Chen@srs-se1.protection.inumbo.net>)
 id 1nR2rY-0006ZE-Ak
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 02:12:40 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on20629.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::629])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 0dd2f10d-9dbc-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 03:12:36 +0100 (CET)
Received: from AS9PR04CA0085.eurprd04.prod.outlook.com (2603:10a6:20b:50e::10)
 by VI1PR08MB4543.eurprd08.prod.outlook.com (2603:10a6:803:f4::13)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Mon, 7 Mar
 2022 02:12:27 +0000
Received: from VE1EUR03FT049.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:50e:cafe::2f) by AS9PR04CA0085.outlook.office365.com
 (2603:10a6:20b:50e::10) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Mon, 7 Mar 2022 02:12:27 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT049.mail.protection.outlook.com (10.152.19.216) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Mon, 7 Mar 2022 02:12:26 +0000
Received: ("Tessian outbound 1f399c739551:v113");
 Mon, 07 Mar 2022 02:12:26 +0000
Received: from 3324ac1cb578.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 14B29D45-9A4C-429A-8013-1E3225C146EE.1; 
 Mon, 07 Mar 2022 02:12:20 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 3324ac1cb578.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Mon, 07 Mar 2022 02:12:20 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com (2603:10a6:102:2b9::9)
 by DBBPR08MB5882.eurprd08.prod.outlook.com (2603:10a6:10:200::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Mon, 7 Mar
 2022 02:12:09 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa]) by PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa%4]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 02:12:09 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0dd2f10d-9dbc-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=0g8yivnvx85CDEKooahcFOCx+7K/iJEV17lk+KBSg5s=;
 b=6OgXsrocnWciHljh6rGPZ5gnthwMPblapJHH6GbKOnXLDhVXUoaEU88lpyhH4RMAC6Dy3DEWiicUO8CKxtnjOzRc2Tmbifn4/XSjgzAJHDgn3kz0iE43w4yNuqw3EwUDLF41naKNxzAm2SAFgQzPONCBXE3ItlsPFP+DXPRlDSQ=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=LUz6UEMnDCO8ILbjxNthzOJ/nGh71OnpO/Mdlz/Gq3kMXQvWh63+oJs8XGnmxx0PPHtQNYETDdxwbJJKyuIyxqyWbUXcb7azPMjC2hyQQV9JiBQS54Kh6BVd4TX9tKfRUsM5TQxixGMtYGfER3X1IKikj7Izbn8wvsq4bGnAwPVhoED+C+THih4ZdyErxfEX0SrQC2UxXO3cY2D/+N10MeoOoYBA79UzWefbopuu4KeN2R3mTYO6DrGsUFvgJ+ruDgyxvSGhSXx8JHJacEZWWWkPqK3A6DYCC6KYlpkW1XmGjJmXXl0PAVff5yLOOQ+pziXtCEr5tB0rLNAVHmh5rA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=0g8yivnvx85CDEKooahcFOCx+7K/iJEV17lk+KBSg5s=;
 b=PZrw7sQcq7psiZOw1gekvpgIxlGzZkq8eWmvVsrayQYbw54y7P3c602sP0+UfB5z0UHZyYkohLCjQAtQfaxqGyrxS4aKV7MjPGnoGOhpQs11cKnGBTdYORS42WIpEht0r1wkHv6rSUVXBupX0rp0D/7Az2/Fh9PNiGikX5muSyoIO6O7FVtW9WqLT1FOwxRW6CXW4HbZjndBgL1qrWS/KgRx4gNaHaT1PD6UBPJNVaZk/799mtctdMqu7mR29/5/txhohdjd7ylf9fLodXX0/dN9pbDBA4qd3kf31nTICGVWDp4kWvMODuGM76tI0DHI76KSzSOOg7juTwPCgyhb9g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=0g8yivnvx85CDEKooahcFOCx+7K/iJEV17lk+KBSg5s=;
 b=6OgXsrocnWciHljh6rGPZ5gnthwMPblapJHH6GbKOnXLDhVXUoaEU88lpyhH4RMAC6Dy3DEWiicUO8CKxtnjOzRc2Tmbifn4/XSjgzAJHDgn3kz0iE43w4yNuqw3EwUDLF41naKNxzAm2SAFgQzPONCBXE3ItlsPFP+DXPRlDSQ=
From: Wei Chen <Wei.Chen@arm.com>
To: Wei Chen <Wei.Chen@arm.com>, Julien Grall <julien@xen.org>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Stefano
 Stabellini <sstabellini@kernel.org>
CC: Bertrand Marquis <Bertrand.Marquis@arm.com>, Penny Zheng
	<Penny.Zheng@arm.com>, Henry Wang <Henry.Wang@arm.com>, nd <nd@arm.com>
Subject: RE: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Topic: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Index: AdgpQxtXwh7LkfydTgiYk9bhMgU+ogBRt1sAAKse4VAAPag1gAAckyvAAMo7i2A=
Date: Mon, 7 Mar 2022 02:12:09 +0000
Message-ID:
 <PAXPR08MB7420827063D47932F428CEC89E089@PAXPR08MB7420.eurprd08.prod.outlook.com>
References:
 <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <04db7e8b-2f04-41d7-1deb-d8bda3625c04@xen.org>
 <PAXPR08MB7420BF1299A1577B98211C1A9E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <1f0bba54-158b-d171-6f99-0c29e0547f8a@xen.org>
 <PAXPR08MB742067028155B11528C5CCA39E049@PAXPR08MB7420.eurprd08.prod.outlook.com>
In-Reply-To:
 <PAXPR08MB742067028155B11528C5CCA39E049@PAXPR08MB7420.eurprd08.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: BBF7EB49631EB449A488D1A77FB1DFFA.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 96cf3465-a978-40a7-4cdb-08d9ffdfecf7
x-ms-traffictypediagnostic:
	DBBPR08MB5882:EE_|VE1EUR03FT049:EE_|VI1PR08MB4543:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR08MB4543B865EE1DF21B42082FDE9E089@VI1PR08MB4543.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAXPR08MB7420.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(86362001)(508600001)(38100700002)(52536014)(110136005)(71200400001)(55016003)(54906003)(122000001)(38070700005)(7696005)(6506007)(66476007)(66556008)(66946007)(76116006)(4326008)(316002)(66446008)(64756008)(8676002)(9686003)(186003)(33656002)(83380400001)(53546011)(8936002)(5660300002)(2906002);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB5882
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT049.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	dd335dee-f162-430f-5dd6-08d9ffdfe2b5
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(110136005)(83380400001)(55016003)(356005)(36860700001)(86362001)(54906003)(186003)(26005)(33656002)(336012)(316002)(5660300002)(8936002)(52536014)(2906002)(8676002)(508600001)(4326008)(70206006)(70586007)(9686003)(82310400004)(6506007)(7696005)(53546011)(47076005)(81166007);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 02:12:26.6649
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 96cf3465-a978-40a7-4cdb-08d9ffdfecf7
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT049.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB4543
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From xen-devel-bounces@lists.xenproject.org Mon Mar 07 02:14:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 02:14:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285598.484809 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR2tg-00079D-Iq; Mon, 07 Mar 2022 02:14:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285598.484809; Mon, 07 Mar 2022 02:14:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR2tg-000796-Fu; Mon, 07 Mar 2022 02:14:52 +0000
Received: by outflank-mailman (input) for mailman id 285598;
 Mon, 07 Mar 2022 02:14:51 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nR2tf-00078u-LG; Mon, 07 Mar 2022 02:14:51 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nR2tf-0000DD-JX; Mon, 07 Mar 2022 02:14:51 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nR2tf-00017e-4n; Mon, 07 Mar 2022 02:14:51 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nR2tf-0001nb-4I; Mon, 07 Mar 2022 02:14:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=PVI7/31I4cU+d5OIq+eNAfhtmkCg2ulQYR1J/hC9d8w=; b=mgUVnxo810i9v+7eFOTS1+jYS5
	GTZYBilnKsKNrRMudfBW8RIxF5IysiCcJ47OPF141v4x89wZzgNt5rpqeNKqrwBztsIYaB3lg2eal
	5QS/r7JrE/G6wtB/nJmlXIENRsxBmLsYr4HwOUfSOur/hv9Kil3DFmvbDdJzggRUG6fI=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168447-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168447: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=4adc364c75b556eb0b741332f08c0aceb5e2cb0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 07 Mar 2022 02:14:51 +0000

flight 168447 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168447/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 4adc364c75b556eb0b741332f08c0aceb5e2cb0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    6 days
Failing since        168258  2022-03-01 01:55:31 Z    6 days   62 attempts
Testing same since   168407  2022-03-05 00:41:43 Z    2 days   26 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 407 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 02:29:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 02:29:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285609.484820 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR38B-0000NR-Tg; Mon, 07 Mar 2022 02:29:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285609.484820; Mon, 07 Mar 2022 02:29:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR38B-0000NK-Qd; Mon, 07 Mar 2022 02:29:51 +0000
Received: by outflank-mailman (input) for mailman id 285609;
 Mon, 07 Mar 2022 02:29:50 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nR38A-0000NA-UG; Mon, 07 Mar 2022 02:29:50 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nR38A-0000Sq-R1; Mon, 07 Mar 2022 02:29:50 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nR38A-0001TP-DD; Mon, 07 Mar 2022 02:29:50 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nR38A-0007CT-Cf; Mon, 07 Mar 2022 02:29:50 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=rJLMztzPgMMM46F3xM8QmmhC3qMwRvQW2zyUOnUJ7O0=; b=IFFGkQW52HrBeZyUoj19eOpWdo
	tog+ZGV7bQJRX/Rd5IzAievrptr6SNPbuX1BzUH12VBxnXkf93oZ9JZAg5b4yvqbz6uJfyE2seKHx
	3bs7cs17NBP6QoaC4ODGVCWV9SdGBl0lFWIfxhu47WO7Z24qSBV9R9hnZGR5chKwyfZw=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168442-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168442: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=3ee65c0f0778b8fa95381cd7676cde2c03e0f889
X-Osstest-Versions-That:
    linux=dcde98da997075053041942ecf97d787855722ec
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 07 Mar 2022 02:29:50 +0000

flight 168442 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168442/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168435
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168435
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168435
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168435
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168435
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168435
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168435
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168435
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                3ee65c0f0778b8fa95381cd7676cde2c03e0f889
baseline version:
 linux                dcde98da997075053041942ecf97d787855722ec

Last test of basis   168435  2022-03-06 09:11:05 Z    0 days
Testing same since   168442  2022-03-06 20:41:04 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrea Parri (Microsoft) <parri.andrea@gmail.com>
  David Sterba <dsterba@suse.com>
  Dexuan Cui <decui@microsoft.com>
  Filipe Manana <fdmanana@suse.com>
  Josef Bacik <josef@toxicpanda.com>
  Li RongQing <lirongqing@baidu.com>
  Like Xu <likexu@tencent.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Masami Hiramatsu <mhiramat@kernel.org>
  Michael Ellerman <mpe@ellerman.id.au>
  Murilo Opsfelder Araujo <muriloo@linux.ibm.com>
  Omar Sandoval <osandov@fb.com>
  Paolo Bonzini <pbonzini@redhat.com>
  Qu Wenruo <wqu@suse.com>
  Randy Dunlap <rdunlap@infradead.org>
  Sean Christopherson <seanjc@google.com>
  Sidong Yang <realwakka@gmail.com>
  Steven Rostedt (Google) <rostedt@goodmis.org>
  Su Yue <l@damenly.su>
  Wanpeng Li <wanpengli@tencent.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   dcde98da9970..3ee65c0f0778  3ee65c0f0778b8fa95381cd7676cde2c03e0f889 -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 03:27:44 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 03:27:44 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285621.484831 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR41u-00071L-EL; Mon, 07 Mar 2022 03:27:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285621.484831; Mon, 07 Mar 2022 03:27:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR41u-00071E-BM; Mon, 07 Mar 2022 03:27:26 +0000
Received: by outflank-mailman (input) for mailman id 285621;
 Mon, 07 Mar 2022 03:27:24 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nR41s-000714-Rj; Mon, 07 Mar 2022 03:27:24 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nR41s-0001st-Pu; Mon, 07 Mar 2022 03:27:24 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nR41s-0003Yx-Dh; Mon, 07 Mar 2022 03:27:24 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nR41s-0000W2-DB; Mon, 07 Mar 2022 03:27:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=sriYLxeNQ8/n3TNVIdU/WksK6ipxu8Np+xRuKTujpIA=; b=oqesEXX+X4aKF4ILVPLrjjqeIQ
	FtFNVlKwoCeUn5b5ad0OojIOPI+FuhUVmOUAhRwxhOHsfaAqX8Jo0eNPvszM8OtLw2MEkHdxRvZI1
	CLEsnmsxXCuywAxADkg2aPz9rKiewL6dNrwXSCj3B12mZ0VH/CvsBfzESIkLXGPujICo=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168449-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168449: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=79f2734e5a7bc2e5256eb0e599f45407855159c7
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 07 Mar 2022 03:27:24 +0000

flight 168449 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168449/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 79f2734e5a7bc2e5256eb0e599f45407855159c7
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    6 days
Failing since        168258  2022-03-01 01:55:31 Z    6 days   63 attempts
Testing same since   168449  2022-03-07 02:15:20 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 437 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 04:57:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 04:57:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285631.484842 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR5Qu-0007oW-0B; Mon, 07 Mar 2022 04:57:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285631.484842; Mon, 07 Mar 2022 04:57:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR5Qt-0007oP-S5; Mon, 07 Mar 2022 04:57:19 +0000
Received: by outflank-mailman (input) for mailman id 285631;
 Mon, 07 Mar 2022 04:57:19 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nR5Qs-0007oF-Uz; Mon, 07 Mar 2022 04:57:18 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nR5Qs-0003Xi-S5; Mon, 07 Mar 2022 04:57:18 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nR5Qs-0006nX-H9; Mon, 07 Mar 2022 04:57:18 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nR5Qs-0004dB-Fc; Mon, 07 Mar 2022 04:57:18 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=B6lDC2BQU+KblXMlN8JkOSl8JRkxa3ik8bxkQv8DjpI=; b=36gJfD0H3tcOy7FgzonJHpNh5d
	QeGVXPlKOMZ95KmlA8kQC9C476asjgdqyFkDSaaWf4o5CnKvjznxPfRIsS+czymAlvg7RkP1sFGd5
	xkSaxwhEVHOpl/ejRrFZLcodwwKZa46nIAiubMiaZIClFGUixLe2qL7kFTjNRaFEVsHc=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168451-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168451: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=79f2734e5a7bc2e5256eb0e599f45407855159c7
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 07 Mar 2022 04:57:18 +0000

flight 168451 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168451/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 79f2734e5a7bc2e5256eb0e599f45407855159c7
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    6 days
Failing since        168258  2022-03-01 01:55:31 Z    6 days   64 attempts
Testing same since   168449  2022-03-07 02:15:20 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 437 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 06:26:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 06:26:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285641.484853 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR6p0-0000Lu-BK; Mon, 07 Mar 2022 06:26:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285641.484853; Mon, 07 Mar 2022 06:26:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR6p0-0000Ln-73; Mon, 07 Mar 2022 06:26:18 +0000
Received: by outflank-mailman (input) for mailman id 285641;
 Mon, 07 Mar 2022 06:26:16 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=YAZl=TS=linux.alibaba.com=jiapeng.chong@srs-se1.protection.inumbo.net>)
 id 1nR6oy-0000Lh-TJ
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 06:26:16 +0000
Received: from out30-130.freemail.mail.aliyun.com
 (out30-130.freemail.mail.aliyun.com [115.124.30.130])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 79883799-9ddf-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 07:26:11 +0100 (CET)
Received: from localhost(mailfrom:jiapeng.chong@linux.alibaba.com
 fp:SMTPD_---0V6Qe3PL_1646634356) by smtp.aliyun-inc.com(127.0.0.1);
 Mon, 07 Mar 2022 14:26:06 +0800
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 79883799-9ddf-11ec-8eba-a37418f5ba1a
X-Alimail-AntiSpam:AC=PASS;BC=-1|-1;BR=01201311R201e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04407;MF=jiapeng.chong@linux.alibaba.com;NM=1;PH=DS;RN=13;SR=0;TI=SMTPD_---0V6Qe3PL_1646634356;
From: Jiapeng Chong <jiapeng.chong@linux.alibaba.com>
To: boris.ostrovsky@oracle.com
Cc: jgross@suse.com,
	sstabellini@kernel.org,
	tglx@linutronix.de,
	mingo@redhat.com,
	bp@alien8.de,
	dave.hansen@linux.intel.com,
	x86@kernel.org,
	hpa@zytor.com,
	xen-devel@lists.xenproject.org,
	linux-kernel@vger.kernel.org,
	Jiapeng Chong <jiapeng.chong@linux.alibaba.com>,
	Abaci Robot <abaci@linux.alibaba.com>
Subject: [PATCH] x86/xen: Fix kerneldoc warning
Date: Mon,  7 Mar 2022 14:25:54 +0800
Message-Id: <20220307062554.8334-1-jiapeng.chong@linux.alibaba.com>
X-Mailer: git-send-email 2.20.1.7.g153144c
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Fix the following W=1 kernel warnings:

arch/x86/xen/setup.c:725: warning: expecting prototype for
machine_specific_memory_setup(). Prototype was for xen_memory_setup()
instead.

Reported-by: Abaci Robot <abaci@linux.alibaba.com>
Signed-off-by: Jiapeng Chong <jiapeng.chong@linux.alibaba.com>
---
 arch/x86/xen/setup.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/arch/x86/xen/setup.c b/arch/x86/xen/setup.c
index af216feb63d9..81aa46f770c5 100644
--- a/arch/x86/xen/setup.c
+++ b/arch/x86/xen/setup.c
@@ -719,7 +719,7 @@ static void __init xen_reserve_xen_mfnlist(void)
 }
 
 /**
- * machine_specific_memory_setup - Hook for machine specific memory setup.
+ * xen_memory_setup - Hook for machine specific memory setup.
  **/
 char * __init xen_memory_setup(void)
 {
-- 
2.20.1.7.g153144c



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 07:23:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 07:23:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285647.484864 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR7hy-0006Tf-MY; Mon, 07 Mar 2022 07:23:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285647.484864; Mon, 07 Mar 2022 07:23:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR7hy-0006TY-JX; Mon, 07 Mar 2022 07:23:06 +0000
Received: by outflank-mailman (input) for mailman id 285647;
 Mon, 07 Mar 2022 07:23:04 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nR7hw-0006TS-JH
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 07:23:04 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 6c9eabd7-9de7-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 08:23:03 +0100 (CET)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2050.outbound.protection.outlook.com [104.47.14.50]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-31-3WfyqMADPJS0NrUhL1c3zg-1; Mon, 07 Mar 2022 08:23:01 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DBBPR04MB7660.eurprd04.prod.outlook.com (2603:10a6:10:20f::11)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.13; Mon, 7 Mar
 2022 07:23:00 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 07:23:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6c9eabd7-9de7-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646637782;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=WzFDXxWDK2sJ2o/S5nZgsygIWlIUOI+W05Jh37KClns=;
	b=Tcprjass3bM4WGJZZtxTJQ5qBN1mDfNZoVwrSLlI0PpC/12aEmh7NJZbcUf/+FK90uakmY
	F+E3rjfUi4xQtzNrU+vqu15orzkmGdsmJDzIIA9A5tWZ/Fw53AaNKboTVIohvYoVKrDI0N
	PQGoMdt11n82s3/OH5wiAfHCb/GtaGo=
X-MC-Unique: 3WfyqMADPJS0NrUhL1c3zg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=WwayfVxW3dkXh0gSz/D4ubTMGQRRVQKvkmQV/JXzSeRLGSjlS93WgeckRLhmGm+KtdtiWfCgHRBex628WkYjhhyqPtSRreUrZXqsIR4dkkI0oomxWWYjJDwqcxeBLYJRSUYY0ynZ5OdCOZoMpQ63QV57sQt0kmdHzggTimsgkaseUegx3WgaFT7Fa0JXtrtzXgEUJaSypUz1irQH6n/+0+I49ejbhUg+xMBsY/R03A2LnQMTZox6pUlN1fATwXlviz3wLIujSh8o8StOvfmTbcE5upbSSnxKVuSTnkbliHs4tA8hVJOQy8arSFTph7H8+wZ5TRMdE/wo6Ymsw+f13A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=WzFDXxWDK2sJ2o/S5nZgsygIWlIUOI+W05Jh37KClns=;
 b=BfFEpTsiERuq99e3QNAfVvGLSLzNPiXcAe3AYLsgJT2M4GufXohrLV7grDNkXyMqhTgmgbzRVgkrTLG3cV2rIO6dX82NTEWhifS9HIUa97lFGdlv0lh1SCS9AWl7zEWzC6FnkxotoTZxW42tjgvo/aCg1v52F6emciEfVHwzfbeWtTo4bDIWuTRyx1kULsFpnWZpyxh1zNEa833P6EUbnxiBSmoAnp9tjqu7FLhpgc12usGX4WOMwn1LZq1sfx9L2O9oI49i7da9eG7PhM7NMl+zzHZvxhitV28FJouW3pA5BqANGY26ncWxXyByH+dOZugsvGVP6EDP1Y7IiX9ikA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <b15ca91c-9847-b0cd-a4f7-b2a3b919d253@suse.com>
Date: Mon, 7 Mar 2022 08:22:59 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH 07/36] xen/arm: add coloring data to domains
Content-Language: en-US
To: Marco Solieri <marco.solieri@minervasys.tech>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>, xen-devel@lists.xenproject.org
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-8-marco.solieri@minervasys.tech>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220304174701.1453977-8-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR04CA0099.eurprd04.prod.outlook.com
 (2603:10a6:20b:50e::22) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 3c355017-9874-4518-bcc1-08da000b4f16
X-MS-TrafficTypeDiagnostic: DBBPR04MB7660:EE_
X-Microsoft-Antispam-PRVS:
	<DBBPR04MB76606D461FBD4A87E224C6C0B3089@DBBPR04MB7660.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(53546011)(38100700002)(36756003)(6506007)(2616005)(31686004)(2906002)(5660300002)(7416002)(316002)(26005)(54906003)(66946007)(66556008)(6512007)(8936002)(31696002)(6486002)(86362001)(6916009)(186003)(4326008)(8676002)(508600001)(66476007)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?Z3VDWFdRZ3ZGZDQzUllhcjQ4a3l0Q0hkM3NYL0tDbGFGS1hUeHJoZW5DRHM3?=
 =?utf-8?B?K2JYMXBrR2ViakY4dzRxeUNuNEZxUHdobGx0QjdIbzdVS1R2SDVLYWJQMkky?=
 =?utf-8?B?RXRyY05ZOXlLV25XY2kvVGRQMjdMcG42azVkU1hIVE9BZzJERjI1MXRGZEMr?=
 =?utf-8?B?LzFrOGQxTkRkSWoySXJDYnlBeTQ1anlMWFNvRXZYV205SmdpaVA3K1RXTWo0?=
 =?utf-8?B?MFQyRENQdUxneW1ac2JVUGZWenpRclFLazJMaEpSTDlSNlhlY3NKOC9DOHBj?=
 =?utf-8?B?WFJxajNXQ0pwRGdsV2s3R25yWFdYMGRlbU5UWDhxbjYra1dQZlB6RnR6Nkls?=
 =?utf-8?B?QzMyT2FHSXZWdG1xUGRubEtKbmhYY2M1TmwxSklLQjlxNHFyNmZ4Um5qckdv?=
 =?utf-8?B?RXR1UVRmOTh5c21Sb3YwSHFEYlp5UC9VZ0QxcWIrc3luZkk0TGxIS1BpN1cw?=
 =?utf-8?B?UmxUOXhsTGhOSDcvcmFsaldjZUtoUmZRVVpXaEt3NGtTclZtWDZ1azN6RlVu?=
 =?utf-8?B?R2x4WHZrTjNVRm1UT0lVclB4RWlUNFJTM2tVSEZHV3dVMGZqVGMwTDhjWEI5?=
 =?utf-8?B?SDVVMm11eDAvWUhTMnd4NCswMHI3czZCU0FRUlpPZGRwNVRLKzY4ZFVzaWYr?=
 =?utf-8?B?ZVNWSmVXLzltRmUwUDBjb0JuaTVoMW1aQjd0MExxbzF2emdic1F2a0NIODdT?=
 =?utf-8?B?elJwNzExazFsdm51YUVYTlJzZ2pHY3p4dTRjWmlHRFpTcTluei9XVVJvTUVM?=
 =?utf-8?B?ZUZUM1lacTJLeVdDeEJoa2JWTThNd3k3SThlbXZiWnpmK05BMzYyYlBLYUFP?=
 =?utf-8?B?L1FVbGJpb1pIeVFKR3ArVDVIRzR5MUFLN2ZSOHdFWUxjeVJidE9oU0s1cHBw?=
 =?utf-8?B?MTN4UlIwWGcvMTlHdXh2YnpDNCtqS0RVNVZndVNhMkh5VDVkY0NrRDRVdFJI?=
 =?utf-8?B?aGRRK0tiMGhnOUNVWnZyYnpFejRxOHNVTkpkb1Q3cmliZVZrazVwMmk3UmM5?=
 =?utf-8?B?Rnl1aVMrOFBybFEvNysrakg4d0d2M05YQmQ2SUR6dCtwaXRibVB0VXJqZVNU?=
 =?utf-8?B?eENCSW4vKzUwZmV1ek82TDFjd2JQL25Wbzhwa3FscCs1YXZQaUtIRW1OOXF1?=
 =?utf-8?B?QVRSUHRsM1lXbGxSakFTOGIzZkI5ejREekg5OS9KeVV0UUQvV1ZaWitrcXJX?=
 =?utf-8?B?Y2VxSFUxWkN0b0k0cmFNRCtrUlI1Sjlsc3B1bDBxMXpNVGJxUVlGOGNoSXMz?=
 =?utf-8?B?cEhCNjMzWDNKRCs5NHFFVWZVSHNscENiMFJ1QzVPTmo0ajJ3dnF1RENqOWFx?=
 =?utf-8?B?dG51L0hIeXVlSEpRaUc3RUgxVXp2K1BzVzRKdmZRbGE4UmxPbkVsSVRnU1FK?=
 =?utf-8?B?UWYvMGdFRTRzVmw4TGtwMTkzTDd1dHovdjU3RUhBL01TRmxFbXIrcVgvbGpx?=
 =?utf-8?B?QmpEN09uYlpPZXdMWTlua0xCcDhxdTBjQUl4Z0pnUkpLWUVUbk9kR0xEUFFW?=
 =?utf-8?B?cDhoNVhSWmlVZ1JTTWV4VTVVR2dqU3hvVG96cEZuaHRiNmRFUHUyU1FuMS9J?=
 =?utf-8?B?NVdJMWFLZVFmQW9rMWNqRkh3cFRCVUt5czhvcGEwQ3VUcHBZWGM0MzRJa2Jz?=
 =?utf-8?B?N0ZqQ2p1djJWVUJwbWxtQTgwQjNWL3hCNDA4MnprV0ZIekQwNWdCMmVTSng0?=
 =?utf-8?B?RVg0bjAwRUFvUUh1NC9Dc0g3WEZEV3VRT3NRZytvMDZRdTdma1dpZ0JXUjVH?=
 =?utf-8?B?TjFaWmE3WFllY1VvdW9sZFdNdk92ZUoxaFNoM1l3RWxTTW1pMk9panRPOGts?=
 =?utf-8?B?bTFJTXMwSnYvNUIvdXhIMHRsZys2SWZJWmN2MTdRKzhsYmF2clIxdnc0d1FD?=
 =?utf-8?B?UDZUZjgzQTF6V2pINGVuVVFVV1lLNndSNUdOQW8yTktWZXM0NExlU2gzYy94?=
 =?utf-8?B?QTFJaWZUR2JjM011WEpXcVNZUDBzUC85amNwYW0yWkpCcUJwZHh6T3R6ZmZk?=
 =?utf-8?B?cTdTbis4VWQwSkNGUTNRS3NISktFdG5rbnNJT3EvVDFIcXgzV1RuUjN4Rkdq?=
 =?utf-8?B?cjFBV2FLRlBwY09uQ2d2Q0JBMHJ3Zm9IM09laEVaam5LYWdxTGxldy9HeGhl?=
 =?utf-8?B?OXdiK3NYbjljUVNHaE13TytBNUMyekt3VDNFWG16V2xwQ2hoYzRNTkFoMXNO?=
 =?utf-8?Q?5bSzCjjcSEE5w6gfO7WrnYs=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3c355017-9874-4518-bcc1-08da000b4f16
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 07:22:59.9439
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: NtFYDOMX3rYep6JoCnwjhJvJjRIQNBgtrJKnGmUmHNymjbKcBIYHkgiF3oie0e7iNFZcYXeINaRqEl+G4txsIw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR04MB7660

On 04.03.2022 18:46, Marco Solieri wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> We want to be able to associate an assignment of cache colors to each
> domain.  Add a configurable-length array containing a set of color
> indices in the domain data.
> 
> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
> ---
>  xen/include/xen/sched.h | 4 ++++
>  1 file changed, 4 insertions(+)
> 
> diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
> index 10ea969c7a..bfbe72b3ea 100644
> --- a/xen/include/xen/sched.h
> +++ b/xen/include/xen/sched.h
> @@ -388,6 +388,10 @@ struct domain
>      atomic_t         shr_pages;         /* shared pages */
>      atomic_t         paged_pages;       /* paged-out pages */
>  
> +    /* Coloring. */
> +    uint32_t        *colors;
> +    uint32_t        max_colors;

You will want to justify why this needs to live in struct domain, and
not in struct arch_domain (as the title would suggest). You will also
want to check whether uint32_t is actually appropriate to use here -
see ./CODING_STYLE. Finally, a comment this short (and hence ambiguous)
isn't worthwhile to have, imo. It (as well as the title) doesn't even
include the word "cache".

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 07:28:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 07:28:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285653.484875 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR7n4-0007CH-B4; Mon, 07 Mar 2022 07:28:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285653.484875; Mon, 07 Mar 2022 07:28:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR7n4-0007CA-7k; Mon, 07 Mar 2022 07:28:22 +0000
Received: by outflank-mailman (input) for mailman id 285653;
 Mon, 07 Mar 2022 07:28:21 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nR7n2-0007C4-PU
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 07:28:21 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 28ea92d1-9de8-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 08:28:19 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2111.outbound.protection.outlook.com [104.47.17.111]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-29-ti3a-uU3OBa5fj68man-Hg-1; Mon, 07 Mar 2022 08:28:16 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PA4PR04MB7646.eurprd04.prod.outlook.com (2603:10a6:102:f3::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Mon, 7 Mar
 2022 07:28:14 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 07:28:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 28ea92d1-9de8-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646638098;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=jyxxv8GTl8y+hQQym9L9nFDOc5vItDRJsUKCqsZ7LDM=;
	b=S8A3Pmdbi40WxVJcl+GnOVLzdNpzTBjN0pTFW2HZalrtwpICSPxTKHs0GriFtC0PeaB2n5
	rkVZiJl7PXCMk8hE3b1hTfdvZIoAHO5IKbp4LD7NcRuYP3yeGK2PDqoWMeCFxCP7pTxEy2
	nj3f/F+b1EXeBkKLZI1Vs+ycrT2qBmc=
X-MC-Unique: ti3a-uU3OBa5fj68man-Hg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ZcJ+da8/bRRh0P2Dp3xtWAlNMnZs9T6ubSqTISduIgE/70l8zxOxfZcH99f3aR0Rc1TSemFkLNyMiuaLMlOecuAqweLJ6f2wY2Rw+i4DlacVWob3jVbSBuQjovvDt2arqFwU+8QrkXtKW0UXBE1AlEfJJHt3Zet/pChvY/b7hgP1fvYAyMtTI3irUSxbyFuTWFl9yWkeSWsaU8oKfIoyzwR4F6BRs7sZViV5a5ZGRS2H+HR54GQNufhGV7cYgjXKZRB63/YeR/VwkFw++JAVJxy5JN3NBsWmuM9nOTd505QlJ6zKmLB6VWZcGu1hrTsRn6uh4MI0CCqCCLt+yV3/wQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=jyxxv8GTl8y+hQQym9L9nFDOc5vItDRJsUKCqsZ7LDM=;
 b=HpKK3+YKKkO6t7AA1IUNrgeVoiBmpdFtk1YZU9pDZJaX8oVuY+b+/VyrvKNY2Gk8+VyPe9KNc3q4yGaoLMdvUfyvd3BIQutMieu0Ay8x8Dgpaz9Eln41fkNVX0zaFf7DTsXAvKLLe9XmAvzCTyZbOtRKvLZZ2uGYqL/HdDxlcBlYtx8OZeE+6iUx7blH6OiiVXRmS27jNuB4gON1KpofQDBWEkmdUbBvu95goidqUgyG4nZL82ra2Tk+OwiLddx03sRqpl6/PogHdKRPIIbaVqEodGJQB8GZu/ACvwFE7kTIq9+tMG/9H+apwh+DOdJzPmqxoD/Npm8Yhz+RQ/t40Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <c8461cbd-78ee-69e6-6a1e-43039e8290a9@suse.com>
Date: Mon, 7 Mar 2022 08:28:15 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH 09/36] xen/arch: add default colors selection function
Content-Language: en-US
To: Marco Solieri <marco.solieri@minervasys.tech>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>, xen-devel@lists.xenproject.org
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-10-marco.solieri@minervasys.tech>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220304174701.1453977-10-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: FR3P281CA0065.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:4b::20) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 1c9affd8-a2ab-47f6-97dd-08da000c0a37
X-MS-TrafficTypeDiagnostic: PA4PR04MB7646:EE_
X-Microsoft-Antispam-PRVS:
	<PA4PR04MB7646C23F85B6BA79B3BC6BBBB3089@PA4PR04MB7646.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	n1yOLWZf9lOyYGsp4/DDnB5lhkZGHfUk/yPvG+2y96O8kifd4nWjkCie2YB4dB+E3eFfag8N37XYYPNT/RrDnoqM1JgKmRY/kR3k+FsbmWOrGvfdFEFSo0FvxvCwA44OOyXXwo2WKfKQTeXUplfWXa13j8fGNAULbUw0B8j8Sp5+cp+QmRnSx3hQw0/5rCWMr4xA1ZFFlgphQKsvLcAQV+jtGnWn6Cu4ssf2qA9cMRjAr9ZVowhQkOiHHffSZi6yjBSQDuD20fsgXo+zstMcnSH+uAPgAf1uddMSP89RrEf9gCQI/xDUxsq0pzhWywwfcEY9APoeDYqp61pr+GQhgdA+ibRcbE+Ht8UKHqayVMsiJ2vyuhju+neNDquYH/qYdPbvs8l6QkyYsOkrQIxEvaOvnuq4IAk1zpgarU1elq+d8+/ryI9Pad3V9N4isW66DnPVG3dWJnn8H6mp5ryC4fcMrQr56eIvSkVaoVEjA5PGlY+BsQfenSXBsVxqk322MpXyAOdm+Lq0no5hhzVMdh95MpaQB6ITJKXcFn0mbJeXIPDx0L1U6k0tmSH6Yn2h3ilBR/deENBpYs8LN1ln39xkp3zv1FPSuWPQQpp6AIGgAMEabGXNNYiQyu6odeHqcUH0aA7Rbmwh4Z0JerixGi/Ka9Yv/3DAi1T30O5vlWwwf8ThNVrwqik+diDzQ/pPKVF785bGntO6wKmeMOSz/1qdxpeHn3N13fFvBN7qC+k=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(86362001)(8676002)(4326008)(316002)(54906003)(31686004)(6916009)(66556008)(66946007)(508600001)(66476007)(31696002)(7416002)(5660300002)(8936002)(6486002)(36756003)(38100700002)(186003)(2616005)(26005)(2906002)(83380400001)(6512007)(6506007)(53546011)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?THlic1VGUit0OU55b3NqVnVlNTY4K3ZEc3c2eS9DQURMSDR0VnJDaTR6UDJW?=
 =?utf-8?B?K2FwRXlXeFZsZDgyMXNWYTRGVC8vTjNYOFlPaERETFpmeUVYNHZJNmFRcDBR?=
 =?utf-8?B?VGo3eXBFYkF0WFJTMit1UlNPTG93RGRqV1I5VTY5TGJhUlN6eUZmM3NGZEVJ?=
 =?utf-8?B?RmRYWFY1Zmg1YlBJSFpHajhld25vRmU4ZnFTYVk3YTVTQmVES081b0gxdUlS?=
 =?utf-8?B?b09VZzYwYnlEQSsxMlVmRzRsZzk4WGFDZ2tlMXdWMTFmZ2hLTzFBME5WYldL?=
 =?utf-8?B?OXhxcElXN0ZNRlRTNmpPalRKUFN6Mlo0bU1TUHl5T1V1VElVN3RwNDFpV0x1?=
 =?utf-8?B?NENQTVdFejI3N1piQkJtb0R2RFdiMkhSekthb3Y2d3BhOHNYb3ZGWko2SE1Y?=
 =?utf-8?B?VW0yMVJmQ0RnSS9KdHlUNUd3NjYzZURDUVgvT3FzTVhTTGNxeHB1d1dPYmlz?=
 =?utf-8?B?dnZSeDkzK2xVNVN0UkljZEhpMWZBSEVaUkRYUld2a1hFeU1qT3hLZHp4R2FN?=
 =?utf-8?B?UWR6QkNqczN2S2tjSEt1cjZXbWNmbWlvRkNXdUl3Sk8zL0RENTJEUG1ac3ll?=
 =?utf-8?B?a3NCZnZKejdFUHJ3MXFFT3JvREtRY05UK0Y5Qnk3V05nOWlXS2QxTmtkOXRw?=
 =?utf-8?B?YzBqRWhxU1E4UXRhenBBblVHWjkyS2hiZkpHSytvcGJ4aCtZMkxLZjl6TFhq?=
 =?utf-8?B?bWpvdnQ1aWNLdkJFTHVUYUJCczVFcXBPQkZIZ3A0NmkxcEl0Y0pDR3prTHpi?=
 =?utf-8?B?TXFnOHdhNDZtZG5CQ0RYV1EwRkRMMUNSSFEyeW5JcXRxdlNabGdXNlZITGdT?=
 =?utf-8?B?MzMwbWNPZnI2SS8zMzJ6VzBZQWJDRzN1a09IQzhCSk1MYThlWEhQL2RqQi9U?=
 =?utf-8?B?anlnQkIzTEtWMlVNV0hEbWFQd21FUWxVU2h1ZzFxdVMrd28yVzRmTm1ZUlBW?=
 =?utf-8?B?MUNBWDcxMFhUY2hIRkFkTzhBaGd1aURFLzVlbUQxZXBTV1JOeW02VDFTMWUy?=
 =?utf-8?B?bGF0SDlwekxabkZQY1lkR2NIRXZDQ1Q5STlOcTFldk40NGhnSEZKZGZZeElw?=
 =?utf-8?B?dUo4ZTQwWXltcTRYeVd3T1VlTHBEVzdoTUhNNWxhS0kxQXcvVU5lYW8yaGcx?=
 =?utf-8?B?TmVXQ21DMVFnRS9CRzVLemduTk1GZTlPR3VqYitBY2JoYUZjVlJYMW1hQlRj?=
 =?utf-8?B?SHFjWXJtZ0JGU0xkYlFBdXN2aEQvSjhPYWh6MGdTcWdIR1AzblRqdXloK2Iv?=
 =?utf-8?B?WWVRU2dFQmJ2UzMzY09vVmc5V0xLZVFZeFR4RXBnTFBybmNqZkhkT01XdWZB?=
 =?utf-8?B?WkQ1cUJFNU1UeldZV0JWdkRFUTV2bHpnRm0vNk5WaEw5cG03RlUyWDVoNHV5?=
 =?utf-8?B?UlM1bmhtckpZbTltTFZBTjB2eVBzTmsyQjRIQjJFQXlPTDIyZkVsTjIvTENS?=
 =?utf-8?B?Rk1BWVNjTS80c1lRbUlWTkRabHllK3pxUXF2WjhOUGppb2Iya3VxcEMvMHAy?=
 =?utf-8?B?RzdFcTJCS0FwQmNMMWFZeVFVWnE2SWMxOGVUZFNpMGN4M0o5aUNUTkg1WDRx?=
 =?utf-8?B?Q3EzckRwbDlWUTVEZlR4TjdoSmtWZzI4Z2hqdHFKa1RXTU5Od2dFb2QwNEtJ?=
 =?utf-8?B?RXZybVJIOXFQdUNaMnFIaG5TZFUxTXJ4RFZ3dEVQMkp5Z25PNGZDYTc3NGxP?=
 =?utf-8?B?SHpSU01kSWtvWHlVeDFYbjFKMWgwNHY2WnpsZWdCUWVUNVErZ0tJZk5qWW5v?=
 =?utf-8?B?ZEpVcTlRZ3FTMGFIS2I1UGRYamp0QzF1WUZpUE9uTHNDMjE2eHRyN1g2c3Mw?=
 =?utf-8?B?Yk9LbDVDYUMxTW1yUktyZ2J0UEJvekRYM0VWT1pta1VyWkFFNHBQRkJBcGFD?=
 =?utf-8?B?Rnh5NW1zaWZzUXJCdm8xOGJpOXhCa20vTFc0cFJMcExpY014YTRHdzZSSk1n?=
 =?utf-8?B?YnNoM2o4TS82SUtmWVNjZHkvc0hsOE8yNzMrQWRqd29aUFUwYnRBbG9QR29H?=
 =?utf-8?B?WGkzN2VGeVNSWEsvakswQ09vNEdRTGZTV09pa1ZTdkViaWVEWGFxL0oxQTdK?=
 =?utf-8?B?RWZDb1pwZWpPVzJZd1VWQ3RBSmpQSFlCQ1lNOURibkdVV2k5Yy9CQUJpNVla?=
 =?utf-8?B?UDJESGZkdFFwUVZjdFZYTEU0RVNCc1B5bHY1QW12Y0liU1hSQ3VMRWFiSkZB?=
 =?utf-8?Q?CgpqF5W1vbgWwgPFC3m1Pjk=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1c9affd8-a2ab-47f6-97dd-08da000c0a37
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 07:28:13.8619
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: seiKOu8LW2NufKeJyHl+YD/H3xnfkKnS/CJXklq02kmiUauNajPx7eiwu9MzyBeFbSU6eebZRMd2ZSFn5RNfYA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR04MB7646

On 04.03.2022 18:46, Marco Solieri wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> When cache coloring support is enabled, a color assignment is needed for
> every domain. Introduce a function computing a default configuration
> with a safe and common value -- the dom0 color selection.
> 
> Do not access directly the array of color indices of dom0. Instead make
> use of the dom0 color configuration as a bitmask.
> Add a helper function that converts the color configuration bitmask into
> the indices array.
> 
> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>

Nit (but relevant because it might be misguiding people just glancing over
the series): Did you mean "xen/arm:" rather than "xen/arch:" in the title
here as well as in that of the next patch?

Jan

> ---
>  xen/arch/arm/coloring.c             | 36 +++++++++++++++++++++++++++++
>  xen/arch/arm/include/asm/coloring.h |  7 ++++++
>  2 files changed, 43 insertions(+)
> 
> diff --git a/xen/arch/arm/coloring.c b/xen/arch/arm/coloring.c
> index af75b536a7..f6e6d09477 100644
> --- a/xen/arch/arm/coloring.c
> +++ b/xen/arch/arm/coloring.c
> @@ -143,6 +143,42 @@ static __init uint64_t calculate_addr_col_mask(uint64_t llc_way_size)
>      return addr_col_mask;
>  }
>  
> +static int copy_mask_to_list(
> +    uint32_t *col_mask, uint32_t *col_list, uint64_t col_num)
> +{
> +    unsigned int i, k, c;
> +
> +    if ( !col_list )
> +        return -EINVAL;
> +
> +    for ( i = 0, k = 0; i < MAX_COLORS_CELLS; i++ )
> +        for ( c = 0; k < col_num && c < 32; c++ )
> +            if ( col_mask[i] & (1 << (c + (i*32))) )
> +                col_list[k++] = c + (i * 32);
> +
> +    return 0;
> +}
> +
> +uint32_t *setup_default_colors(uint32_t *col_num)
> +{
> +    uint32_t *col_list;
> +
> +    if ( dom0_col_num )
> +    {
> +        *col_num = dom0_col_num;
> +        col_list = xzalloc_array(uint32_t, dom0_col_num);
> +        if ( !col_list )
> +        {
> +            printk(XENLOG_ERR "setup_default_colors: Alloc failed\n");
> +            return NULL;
> +        }
> +        copy_mask_to_list(dom0_col_mask, col_list, dom0_col_num);
> +        return col_list;
> +    }
> +
> +    return NULL;
> +}
> +
>  bool __init coloring_init(void)
>  {
>      int i;
> diff --git a/xen/arch/arm/include/asm/coloring.h b/xen/arch/arm/include/asm/coloring.h
> index 70e1dbd09b..8f24acf082 100644
> --- a/xen/arch/arm/include/asm/coloring.h
> +++ b/xen/arch/arm/include/asm/coloring.h
> @@ -27,6 +27,13 @@
>  
>  #ifdef CONFIG_COLORING
>  bool __init coloring_init(void);
> +
> +/*
> + * Return an array with default colors selection and store the number of
> + * colors in @param col_num. The array selection will be equal to the dom0
> + * color configuration.
> + */
> +uint32_t *setup_default_colors(uint32_t *col_num);
>  #else /* !CONFIG_COLORING */
>  static inline bool __init coloring_init(void)
>  {



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 07:32:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 07:32:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285661.484886 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR7qZ-0000CY-Uw; Mon, 07 Mar 2022 07:31:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285661.484886; Mon, 07 Mar 2022 07:31:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR7qZ-0000CR-Qv; Mon, 07 Mar 2022 07:31:59 +0000
Received: by outflank-mailman (input) for mailman id 285661;
 Mon, 07 Mar 2022 07:31:59 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nR7qZ-0000CL-2K
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 07:31:59 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ab65c19c-9de8-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 08:31:58 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2113.outbound.protection.outlook.com [104.47.18.113]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-34-Ophk5rmnN4KNl7zVnJR-zQ-1; Mon, 07 Mar 2022 08:31:56 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PA4PR04MB7646.eurprd04.prod.outlook.com (2603:10a6:102:f3::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Mon, 7 Mar
 2022 07:31:55 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 07:31:54 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ab65c19c-9de8-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646638317;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=9MzOaZCQ4KsNhbKy2oDZ8s6PNB0BqvBTtfujc6kJ9nQ=;
	b=EzO/7xCh9Gkau+9Y3sVaLc+mVDO2X7T+nFPq8QQd1OSNQHOXbZp0GYk0zv9N1L2YJI150r
	Bm3BBpFksTtuA296linbu+G9KG0YGBG9+vnMhISRhUSmFYb68YfTcja8GtAakBelhqmZU0
	yyQ/Gc7LVMESAg0uoD0j8/ydqSuj0KM=
X-MC-Unique: Ophk5rmnN4KNl7zVnJR-zQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=OT35G+w8uJ9OnQ3QH5e5ocNjTqu0Xpftfdmgq7iIS2ZIVliKJ61fKaijYi+wk8LFC7RTZar2ijHLvW/BDVUwg9dv8nV7VEoWEWpMJeJn9fK76FB99VIJ95bLdxVIkve1jHRlj40Rw08JgFUQmSdV+NqDxghAu6F4WDLB/Qm0Lh7sPKl25b0SZ+UkVHXCY60ZxXKW9ywrBZFcDXG7Arn9RsJKfcExRdxrOqJeJ2R09Y3mLttFrJYS6+4r4yNO09CZ53VfCLWSoOwtujHQgQQw3sstW5BKb0XTR6oNATA4TgVh6JaoU3B0cVU538Uv5tG50reQimeeaVvoNryGTvypSA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=9MzOaZCQ4KsNhbKy2oDZ8s6PNB0BqvBTtfujc6kJ9nQ=;
 b=eGKbGZdfSzwFcHw6AuT79FJRDf9Vao7Jt7WrOTTszyNS8IOXoZDgCTXCTsq2MQABpzGcVYYyhxnnGAfyRY8EeA6Mxj9y5k7R//32gOaoGj3v16Y+dqrLC9gBcty1sxPHn2t4nsbc6QH5Uhy/Io4/9lcF+OsWKeKHLJn5RDN8rxf4MOyZuM8e6P7Pw+1ZBx+EKAuXrsiTC1lgcGVrxgx6lm2smHj0AmgjK9jMLvdtXiTmFBU7uSbb6nzhi6jvXmVsC4OVk/wN7ntWXMx1ptcBbtoGr7ylkO8hUNNWM3Gqa650mzm+5mQFaIRBlv0jViMWUk6ToS1q2A1JlI0oOZ2juw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <79adf785-622f-c897-cede-7f54b025ed55@suse.com>
Date: Mon, 7 Mar 2022 08:31:56 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH 11/36] xen/include: define hypercall parameter for
 coloring
Content-Language: en-US
To: Marco Solieri <marco.solieri@minervasys.tech>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>,
 xen-devel@lists.xenproject.org
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-12-marco.solieri@minervasys.tech>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220304174701.1453977-12-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8PR07CA0029.eurprd07.prod.outlook.com
 (2603:10a6:20b:451::30) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 8298d7d3-a544-4499-1d64-08da000c8de1
X-MS-TrafficTypeDiagnostic: PA4PR04MB7646:EE_
X-Microsoft-Antispam-PRVS:
	<PA4PR04MB76469AE151EA55D9845D595DB3089@PA4PR04MB7646.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	oF7vql6vger3MkJWg8rp4cHcdJtsbUx7dyuIeMcw3HYkZ3YGg8lq4n8LPaK4RLwJ2SVEzjkYEj/AGheJAF54lNBTWu9LAWP6qo6mKMCGST/vJlIUZK6cxD/yWlHbs20cxps5eZA+hcIEUfGg/qh9Ug/PIQvsE7Xa8AstiKabRMqEWOfNQ2Ca3RDV2cHouaUJKqQPWlx8tjqvcVfFIov3TwKHgCwkJy9pvw6MpxBKvIDB5LePDIc2QCiaF8Qw9EzBHHEwnbcI+pUYjmpcUECshEkM9gLn1G5EM8HOBp0CyfxZsraBpdPAEbV2IZBiVJ86aT5bGqFh3ykL4GmA2flCCCSKDrQSmckGB//PB+IvdrfmYRE3VfCijI7O01c8Fuc4F7cAdYZ9a6UAHb9pQZ/lPYFfbclX5fhKXjD/lAguRFa48x/g0BP/sl8qESG1UTwzl3fmJHC6IotGaSvvm9i5F1DU/6BfnL4WtFe3AwXnpjR3Uh/DbZs2WNsgTU6B7mPLiggqkR9lqlEjt5E2rnbR2hLCcAYoFfEznptjwj5BmSNZYBCKv3hwMGk1/cwVbD/nj+QtN+gnUlFMj0EasUffLhA7EbuLzUDxs468F1qv4VeSOi5KRD8aSHmN9j2KAVkqIkSU+GdYC+US4hCNYDFrb9HdAbw7IDjS+xeF3TQ/8yuDKaBMwVTFcDe38nM279q6LIS7NqWSrjvv4/PYzMWqh+HPExOQXX+XJOGuPFq1BTs=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6512007)(6506007)(83380400001)(53546011)(36756003)(38100700002)(2906002)(186003)(2616005)(26005)(66556008)(66946007)(508600001)(8676002)(4326008)(86362001)(54906003)(31686004)(6916009)(316002)(66476007)(6486002)(8936002)(4744005)(31696002)(7416002)(5660300002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?dm42V3M4WVlRekJzT3hYUGZ0VTJtRTI1S2ZTMWJLVG9zTnNHaEhKeFlhbWFi?=
 =?utf-8?B?a2dWdDZQdFNBK0dsNW1BQmwrMFNHMU5tYy9EY3FTeTVQelpkKzNyQW45d3Fs?=
 =?utf-8?B?azU1bFdEQkRIU2h4VTVkYW1sNTdnMVJqNktxaTdRZHlUN21RMWJqWXJrWnpQ?=
 =?utf-8?B?VWJyN2RnMUZoVFJRbUdqVDZSZm5BbEFLM0d1bC8ySzJMNllZdVpSSDR4Qm5Z?=
 =?utf-8?B?UnRiYlQvQ1lUWHlOa1doMDRTV2VkTHFIR0VxenhJSWN6bkFFaGhCdlU0K21S?=
 =?utf-8?B?NFZEV3dJaHZzcEROMzJkL0tGUmxyc1NuQzM3ZnQyajBtVVhmWE1NN25OUGNl?=
 =?utf-8?B?VXRXbG1QMHRWN1g5WjNTcVB4WkFLQU52V2I4TUxYUWJRRlhYV1VHeUo1RHds?=
 =?utf-8?B?SzZDMGhsMk1qM0xFV0pOUTBwMWpkajF1T3JLbUUwNjFyWHZUU3Y5ZkZLWkN1?=
 =?utf-8?B?OEZhVS82Rmx0enJCeFVHTUhOcUhHSENLanJPTjIxTFU1Ym44THNjb0hZTERX?=
 =?utf-8?B?MzhVWW1WT0xMb0MzU2xPU1pXZ1ozWGVUUlp4bWZBeVNQUWo3aU9USldvSUx5?=
 =?utf-8?B?RG9lNFZwWHpoMGpqTjMyckF4bDMvRW9LeEprL0JHU2d3YWhObDBOTklHSWxh?=
 =?utf-8?B?TU1FNnI4bjNVTHNweTI0Y2JSRnZQSmg5TFRGVFlQeVFocnpQVnFyZGM4T284?=
 =?utf-8?B?NmZ5UWxSV0RKcDNTckI4Y3BOVVNHc3F4UFB2TDEzOEk4WXhIdWovZVM5Y2Y3?=
 =?utf-8?B?bXFERmNmMEJ3d0p4b1lXMzNXMm5nOUNpSDhjTnU0VWxzL3FwSXNIamcvN3pM?=
 =?utf-8?B?ZFhRVnIzWjgvaUdST0hBcU1QQkpLaTVVVGFKMHVtRGZhOWhieWo1YVpjK2hZ?=
 =?utf-8?B?WXVMa25PN3RtSitNMzg1T2dnbEY0KzFidU9nSktQUXozRzBqZ1NQaThnSjBr?=
 =?utf-8?B?RFRXV1lEcGVBbmdlMUVaVkp3QUlBZHNHVllzK2JlaVhkTTQwVTFGYzRzckJM?=
 =?utf-8?B?MnpxemRhem1CWTdSbVJFcHFaK1ZQeit6WHo5RVdrSnZrVU5ldE4zYWhmSFA3?=
 =?utf-8?B?dVZGTVJzS1ZxWWl6OEpwMTdNL3oxeDkyeVBaZXFIbldMMWRsbTlLcFE0UlVP?=
 =?utf-8?B?b1FSbEZGY2Z2ZjNtdjFrQnZjazRHYjE5WDhqaG54dkJzQ2Q4K1JzM3Fxbkhp?=
 =?utf-8?B?TVd2MU81NFQxUnNKR2FwajdWQXdrOWE4c3p3a3VWWlhNYUNET1A4WmMxRmE5?=
 =?utf-8?B?U3Z2VTE1RVNTQkdPOTZUZ3VMbEpYdnB2T3R0YlVmdW1CUFFEblovZjBTdCtX?=
 =?utf-8?B?QWUwT0JUSzhwQ2QrM1ZjUXFyU0s5T2EwaXo5SGNza25VbXlIUURheHczd1FN?=
 =?utf-8?B?a0liZVhNUVFEZzRZY2RoQTJuTnhocjdoejRqV1lGYUZ4UHNscCsxRGQ4U0l6?=
 =?utf-8?B?MUs2VWhBS1NnWHV6Ky9iOE9uTVdyekN1NVMwMitRVTJrRWsvVGJkbHZMR2Rq?=
 =?utf-8?B?ZitLYnlzZ1Vqdk9DOGFYQW1DR3lzSllJV2VpZnJkeGdEdmtXWVRjd0RIME9U?=
 =?utf-8?B?YjJyOCtOQ3FGUE9Zb2ZKSHA4Q09SaUVVZXlDQlJaWitoOTZ3OUxDSitHVmdj?=
 =?utf-8?B?WWU3elZ3c2N0TE8rTUNEaGxyYUtDRkVNZmQrdis1d2xvd1pZWjBaeUh0dWRT?=
 =?utf-8?B?SHgzTWVNNS90TEZFN0J6Zm95bFRtK09mSFNsaTRsa1I5Z016N2R3dWZPdnZY?=
 =?utf-8?B?M2JxTlRIWDc4TVh5QWQyWEJzQXZUa1g1c2pTSFlhZ3BEczJNVmZ6aE9MTTlz?=
 =?utf-8?B?Q0I0bnNtSmk5Y2FzbEJvbzNtcnBEa1NSMjRlL1lzOWZvTTB1eCtVT3hCSU1B?=
 =?utf-8?B?MHBCL1QxWElaWVVRLzdWeG9sMS84Nzd4VmVsQ2xDeldUVm9QY2hMMDhMdnov?=
 =?utf-8?B?cUxIVThQL0g5enlZMSsyanptQ0hlajVnRWIvWVJxbjhuUmdFNlJkT1Vhckdk?=
 =?utf-8?B?cE9DQnVOYU40Wm1XZDQyWUtQMkM1eUVoZGwxZ3psT1I0TGN2aU5PNG9xb0RL?=
 =?utf-8?B?dVJyNjZJRUhiQmJLZVZSZy9XeWdnY3M2NTllQ2pKMVVhcEVFOWxxcWRkYnFa?=
 =?utf-8?B?eGpKSXlvZ2xvTVJ1bTBrL0UzZnNHWkg5UWlVZG5JVU9URGx3dHhyUWVuSXVV?=
 =?utf-8?Q?OzAp7E5UkALFq6SPc0zTOc4=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8298d7d3-a544-4499-1d64-08da000c8de1
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 07:31:54.7700
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: jTaKUtUr3baVsPSHqStQ44+HfJj6WETpbDOjEZAh6Oeg4F5DqvbmhndzBV4pz+fIO+loxGbt+Wr6FKlXbXs25w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR04MB7646

On 04.03.2022 18:46, Marco Solieri wrote:
> --- a/xen/include/public/arch-arm.h
> +++ b/xen/include/public/arch-arm.h
> @@ -303,6 +303,12 @@ struct vcpu_guest_context {
>  typedef struct vcpu_guest_context vcpu_guest_context_t;
>  DEFINE_XEN_GUEST_HANDLE(vcpu_guest_context_t);
>  
> +#define MAX_COLORS_CELLS 4
> +struct color_guest_config {
> +    uint32_t max_colors;
> +    uint32_t colors[MAX_COLORS_CELLS];
> +};
> +
>  /*
>   * struct xen_arch_domainconfig's ABI is covered by
>   * XEN_DOMCTL_INTERFACE_VERSION.
> @@ -335,6 +341,8 @@ struct xen_arch_domainconfig {
>       *
>       */
>      uint32_t clock_frequency;
> +    /* IN */
> +    struct color_guest_config colors;
>  };
>  #endif /* __XEN__ || __XEN_TOOLS__ */
>  

Please no new additions to the public interface without proper XEN_ / xen_
name prefixes on anything going in some global name space. (Personally I
also wonder whether a separate struct is warranted, but I'm not a
maintainer here, so I've got little say.)

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 07:35:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 07:35:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285667.484897 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR7tx-0000qF-Eh; Mon, 07 Mar 2022 07:35:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285667.484897; Mon, 07 Mar 2022 07:35:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR7tx-0000q8-9m; Mon, 07 Mar 2022 07:35:29 +0000
Received: by outflank-mailman (input) for mailman id 285667;
 Mon, 07 Mar 2022 07:35:27 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nR7tv-0000q2-UG
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 07:35:27 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 27ca135f-9de9-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 08:35:26 +0100 (CET)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04lp2057.outbound.protection.outlook.com [104.47.12.57]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-19-EmYvgOo9MRCRxMKbPsVHsA-1; Mon, 07 Mar 2022 08:35:24 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PA4PR04MB7565.eurprd04.prod.outlook.com (2603:10a6:102:e7::23)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Mon, 7 Mar
 2022 07:35:22 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 07:35:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 27ca135f-9de9-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646638526;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=y3DPOzJfYnLuN2CUMbsCLzEVa402hEMBDzE2WeKXS48=;
	b=LYdEZBlu5WEYa2GKeLR2pcUqhzGmEHgibSR+z1mfvjo/TaNODMy+Mj5c5lGR2/Eub3Hlr3
	Y9iZhQyeD1eJYmx/n44NWzOE5zAPF8ki6EMnh/bn9SCtXtmcyFagpHvIocJRsLd/8H42eA
	8gF/jstJ5TW8Sr77E4jlrGQMyFb/9LU=
X-MC-Unique: EmYvgOo9MRCRxMKbPsVHsA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=S8gphM8vYDazEKsgkWwJd8/4wV8MTiA/jm0s751M7CJj8uwzvNdZM4v2KN96zV067l2BrW6Ab2tjI2q2+uo866w5ExITcXxVg9ySrMch3xQYf3ZuvS5hzSwxOfG2MqWfUBh1SsARvdZbsbd33Yt7msW6J8MYQMOXVq6pymbS2k0v3DG+nx2c1SeGZpu5cyVMOojl88WOfZ0vm50pW/U+hoc2qjtvM0jw0100UNQKME6CsJDMpFhQ923OPaCyrPQIO5HUejrppPNmInlxugTa82PXaG0gJ/WMdA0lAniqp5UDOp4i5MFm6FhgYpb/6qSihE522hJiOBM1/1D82dwLJw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=y3DPOzJfYnLuN2CUMbsCLzEVa402hEMBDzE2WeKXS48=;
 b=Kbm+8pvMN9+Fmul8hYFZabyUW7v0g/nc+vgiNiXWfEK691nBb2j5e/AAM0wXSOW+gpQKNwztgkGBjmiOxfvnWzSOSZu1vRT1hsVMpd9qdKISX7+sCbxp3bkE3XjvadDS181pcgjdUoiaA5mycwSmHvQ3QUF3ZC+eMD9l2LFkRkdqJTT0SIafwrbL9dVc/dD/mgCy6GmWZ270m20yApPMIy5weFNoQhOCxlVNpdYxj48Y4/rqTNcqk4P4n4jukOh4fEjlb4DBruXf20WPFaR5+paSX/eNxnxKVsb3iGE/JvkA4UGd9KZvA7T6kVQqUosbf4X3o6PwqitsakyzZNJ9ew==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <08710561-3afa-4708-86fb-91eeec908a5c@suse.com>
Date: Mon, 7 Mar 2022 08:35:23 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH 18/36] Alloc: introduce page_list_for_each_reverse
Content-Language: en-US
To: Marco Solieri <marco.solieri@minervasys.tech>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>, xen-devel@lists.xenproject.org
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-19-marco.solieri@minervasys.tech>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220304174701.1453977-19-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8PR04CA0008.eurprd04.prod.outlook.com
 (2603:10a6:20b:310::13) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 3f49047c-48a5-4ba2-f728-08da000d09c3
X-MS-TrafficTypeDiagnostic: PA4PR04MB7565:EE_
X-Microsoft-Antispam-PRVS:
	<PA4PR04MB7565A1D41655F351295216A1B3089@PA4PR04MB7565.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(31696002)(8936002)(53546011)(6506007)(86362001)(8676002)(4326008)(31686004)(36756003)(5660300002)(316002)(2616005)(66476007)(66946007)(26005)(66556008)(7416002)(186003)(4744005)(6512007)(6486002)(54906003)(508600001)(2906002)(6916009)(38100700002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?aUJTa1lJWEF3WW9oVzBiUS92QitWRm5xOEMxZWRxOElodEtzVk4zRG80ZWZk?=
 =?utf-8?B?VTVOd2FlWUt3Y3h0dEtLZ01EaWNyb3dTWlZHZHg3dmRlZlpPb2kweXVPdE9a?=
 =?utf-8?B?MWRwNkN2cmhQT21GWitna0JoNWVNbzlZemtYVEljdVdpMEdHcVBNd1AwTm9t?=
 =?utf-8?B?L085NnpDUkFCZUVySUNxU2J4NGNiWkp1bVZ5eVB1Y3FQSHRVUm53dlNhdlF5?=
 =?utf-8?B?TERNS284NnA4MXFNMjFPZngvUXNZczM3Y3g5OUQxYldidk5nUXBUd3I1UUdt?=
 =?utf-8?B?QWtzZU5jYVV1T0dWdUxHblJHQWRMZEZSbFdYMVNCUFlzdGMyb1RrdE90NlQz?=
 =?utf-8?B?N2VIK3hZc0dTMU03QUoxaFE3TVcwTTlwb2kxZ0NiQXhuQnNqSDliNmF0Q0tX?=
 =?utf-8?B?eTh6UVdNU2dGTzVYMjhSSEZuYXdSUzA0eUdyejNRSkkva1NpQXNlRXh0U1k3?=
 =?utf-8?B?K0FWOW1POEpaUW5YbXBWMk1MZy8xNjVnQ1pEcnBLdy9BM21ib2VudlV6ZWFU?=
 =?utf-8?B?RTNQNVJLV1ZEYmhxK3JKTVF5RDdmUHM2KzhSQjRzN1FuZENnaS9ucjdaV3JH?=
 =?utf-8?B?WGM4M3ZwdnRKVU9GaEV4TGpNY0NzT3NQMzI3cDJNc09NNzVWMEJhMnoxNjhI?=
 =?utf-8?B?cDRFVUh1aUVhWTIwOUpJbEpscmJEaWo0SFdpRWQ5S25rcDQxMzAvMzYwWDJq?=
 =?utf-8?B?UllrMXZJRldnTVIwMVNYWXo1dEVXYWp1Szk1UlJqNjdvVXhZMFI1ZEh5T2c5?=
 =?utf-8?B?YUdNd0JqTFB2NGFTa0FnWVlkdGRMVVI4ZUVrbnByckFCQXZHa29sOS9jS1Rk?=
 =?utf-8?B?NXgxT0s5L1kydDBHSVJkRWpOTERxTHN1SmIzbzJ5dHExM3A0LzlaMEExUmJS?=
 =?utf-8?B?WUF1bHZWU0VBK3FuMFAyTWI1TVdzbzdwTmxxOFlkMlYxNUVKYUllNTk2RzRH?=
 =?utf-8?B?YlA3eHc5QUhvYklLMkh1ZCtZNVhqSFhuYllsWGhReDVWQWVlcG5XcFAyODRx?=
 =?utf-8?B?THFsRXZrQSswVVZ5TDJ3M0Znc295QjlialBrU1JZWlV5a3o0Q0VDcFJqWDBi?=
 =?utf-8?B?SDVPR2FwNjJKYlUrWFhmeUh1NmM3M0s5UGVwRWhIc0lIVll0TUIxVXBKKzEv?=
 =?utf-8?B?UHBabVFYT1BJV1MwZ3FmaE0wY1BPUDc2UzNEZ2ROaU1pSmpPd3hiY2hwR0pz?=
 =?utf-8?B?dlF0MFRMVHlXK3Q2b1h0RU5yL3BxbVl0NlFPQ0Vtcks2MGU0bHNudzkxRzlh?=
 =?utf-8?B?akZXWU5iSE1qa3N3RzVmODNoYzhWbjdWTW9uZUhkNFM3RDZORTdlSWFmTzZy?=
 =?utf-8?B?ZnVIN1FQMlAyTlpKNkNtYkdkMGxFTUE1T3BSMkxMT3ZpK2R2Z3c2b2RKUGtv?=
 =?utf-8?B?TTBsSWFSaU9sUy9rbnVpbms1cEJjWTdkaGpHUCtXZ3VMQzRrNVFZSDUwSU5m?=
 =?utf-8?B?d2FmVUdQL1dmMUh5a09tWG9JaEpyeGppS21zTkp6dFZKU1l1NVlVYVRaOGNL?=
 =?utf-8?B?bFdjNlRTQzVXZm9CQlI1dXFCa3BML1crb3RZY01GMEhGRllJUTBvRFlOSGZk?=
 =?utf-8?B?MzdiNXZIbVo1VFdpT0trbUV5S0NVQTczSjBLRTNNZzFLOStrdG53aXFid0Ft?=
 =?utf-8?B?YThRN0s4SWt2T3lNekN2akRlTXRkNmliaEQxb2NqamEzbTBQck81U3ZwU2pG?=
 =?utf-8?B?dDN5ZS9TV3Z3clhrR2w4ZHgrUUkxbTB6YVJJbEs3OUEyR0ZDd3lZZFhpVVJm?=
 =?utf-8?B?Z2tPamJ2elJFOW8rcUo1S3B0ZHhKU1JEV0RIekZ2OVU1VzdWY0Nad1h6VjFj?=
 =?utf-8?B?TjY4WTZQT0JSZ1dqV3R0Mmt3SUIyLzFVZklBM3JhZ3ZSV1BKM3dOdnMvVDVH?=
 =?utf-8?B?ZTcrRDNqNjBjNGR4cHArTmt6MFNwOHE4TmpVN0o0alduTVgrV2NVOGtiRUxQ?=
 =?utf-8?B?M1A5SVA5d0NzV2hER0JsMnlLS290VjhGRGhGZmIvdkU5eDAxa0xkMEg0ZG5n?=
 =?utf-8?B?Mmo2cFllelVRVDBSelpJa0JCSlA2Lzl2cEl5dnNCQUU4RlNZd2kvTlplemZp?=
 =?utf-8?B?TnFNWW9WNjByWlJBSzJFdjMyVlVPRXJXL08vRi9obm9QRnNpdHNFbFQyVTdy?=
 =?utf-8?B?Y3YvSldUVVhER0NleHY2QkJncmdYVWVjMk5sb2habzVoUFprOW1zM2pZRnNN?=
 =?utf-8?Q?IFPUNCHOeWPUCax/x96Qy7Y=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3f49047c-48a5-4ba2-f728-08da000d09c3
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 07:35:22.6165
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 2S1N4ef59QQa8h+l3TqnWBbJs36/Ldcx1FFvAGNe7IAsFJU9thLlKoj3mACFU7SgoOo5Q6X10Mn5BMVAhD/UrA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR04MB7565

On 04.03.2022 18:46, Marco Solieri wrote:
> --- a/xen/include/xen/mm.h
> +++ b/xen/include/xen/mm.h
> @@ -488,6 +488,8 @@ page_list_splice(struct page_list_head *list, struct page_list_head *head)
>      list_for_each_entry_safe(pos, tmp, head, list)
>  # define page_list_for_each_safe_reverse(pos, tmp, head) \
>      list_for_each_entry_safe_reverse(pos, tmp, head, list)
> +# define page_list_for_each_reverse(pos, head) \
> +    list_for_each_entry_reverse(pos, head, list)
>  #endif

There are two sets of macros (for there being two flavors of lists),
and hence - even if you need only one form on Arm - the other form
should be introduced right away. I also think it would be far better
to merge this into the patch actually first needing the new
construct, as only then it'll be able to judge whether none of the
existing constructs would be a reasonable fit.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 07:39:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 07:39:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285673.484908 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR7xT-0001WI-Sg; Mon, 07 Mar 2022 07:39:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285673.484908; Mon, 07 Mar 2022 07:39:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR7xT-0001WB-Pd; Mon, 07 Mar 2022 07:39:07 +0000
Received: by outflank-mailman (input) for mailman id 285673;
 Mon, 07 Mar 2022 07:39:05 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nR7xR-0001Vz-U3
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 07:39:05 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a9ec8c77-9de9-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 08:39:04 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2106.outbound.protection.outlook.com [104.47.18.106]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-2-gSzP6-RWOHm0eA4anPkE8w-1; Mon, 07 Mar 2022 08:39:03 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB7PR04MB5068.eurprd04.prod.outlook.com (2603:10a6:10:14::30) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Mon, 7 Mar
 2022 07:39:02 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 07:39:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a9ec8c77-9de9-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646638744;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=+A6exbRyakH8VBMY1Lm+YRC0U2Pe4ZMpXQkghKUaZ8c=;
	b=IoCDRoDI2CbGJynLeI0MWS9Njs5Oo2xZcXBRrsEN+NEvnYrBpcGCMSUHdVjx5IEBBodDGt
	xzkOtnXlUIKacxovG6coW2qwCiA2J2Iy7ArD1pay6YSy2XBSOxxDVPNpwHnZbVze1Dwd+B
	DdnRtc84VJmXKC3X4WV7Xu2zP8xdvdg=
X-MC-Unique: gSzP6-RWOHm0eA4anPkE8w-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=hq1qm8mTPxZ9yeWl0+QktU9my/TORkbo/VINNPh6VPvikpWUkX4Xw0Y6bo940L7+K1rDbfhmtqqHxXtneh8Dfz6he+9cYSBYoDj6GCf011vhsCiNKdCeqoUQRWRXwqQW/OPnUYNcE75HtZEDNdcHhYGpXe73KHqQrk/F9R0Z+BqUMuwBL83CPt9ME2TvsoFKvec8UBBcVFWOb0l3VOU/RUPyFuvPPtDXOEUC6ZgS7q9Uzd/Qg29rlGOasBhKOctJg/dqp4p+Bcge6cPFE49i/xU3wGI3lXdKm60jlETAl6v3s0YRTWJucq1xPczlw8mpTf3Q69Dkw/by7sRN/LI7Dw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=+A6exbRyakH8VBMY1Lm+YRC0U2Pe4ZMpXQkghKUaZ8c=;
 b=HNTbySm3OBoCL6J2MoOF2qs/kSIyNA/EdqZJMSNtpJf1/yqxEHMgcYcmpZzCrCg3D0C0kDnrM0JR5mmqnWcMMqjJY+1ZNy7m+88vbp0r9ydRs5AiPby6YmibIymxCa+zuh4H67eqIcDW5GYCmF9VaQ7C4UxHmn8PzZxEu+sEHaHbhvEd66sY8MUVvDD5tXzYlA+exTT4h4JzBghOF1D7dLpztvWcmwhVmTGJc7FskiU3dcKvt2kYv7ntnmSrJJ+VIFbuC5/Km8eZmDcLubLS/nSHRhDGdW+BxPvalENGwiDk0buJpOn8v08cueH+iH5UqE/kaWYngHqgK6f1YzkfPQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <07507a77-168a-9387-1f5a-11f00de587f6@suse.com>
Date: Mon, 7 Mar 2022 08:39:03 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH 28/36] xen/arm: introduce xen_map_text_rw
Content-Language: en-US
To: Marco Solieri <marco.solieri@minervasys.tech>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>,
 xen-devel@lists.xenproject.org
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-29-marco.solieri@minervasys.tech>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220304174701.1453977-29-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P191CA0051.EURP191.PROD.OUTLOOK.COM
 (2603:10a6:209:7f::28) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 4e80160f-7e99-4620-60a3-08da000d8ccb
X-MS-TrafficTypeDiagnostic: DB7PR04MB5068:EE_
X-Microsoft-Antispam-PRVS:
	<DB7PR04MB5068DF66CBCE6B714B3F7C6FB3089@DB7PR04MB5068.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6916009)(54906003)(86362001)(316002)(38100700002)(31686004)(53546011)(2906002)(26005)(66476007)(66556008)(8676002)(31696002)(4326008)(2616005)(186003)(5660300002)(4744005)(7416002)(8936002)(36756003)(6486002)(508600001)(66946007)(6506007)(6512007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?VmIwY1M2RXpyVENxWUFlcm50dC9yNnlNb1h4MUZuRzJ4MS93Vkl0WXpZQ2lw?=
 =?utf-8?B?c0ZkQ1ZaWmZ0VXl3bXUvK2pSRERNSWtzT251WW1iQWpPM3Q5aTU2NXhZZXBX?=
 =?utf-8?B?WENxSkFXNmduTUFWMnh2M3QzWmVhVjlsT0NXMXNlZTMvTmYwVms4MVgxT3Zm?=
 =?utf-8?B?cHJ5UytZOHhnRm1XVzdKU1NOZ3VqMVAvT09YcTEwcFNJdkdYa1FvVjVDOHhu?=
 =?utf-8?B?cHBaU0dEa2ZFdXBnNkpCS2VXbmxoMXlZbHVScTIvMUlzbWxHYWo0bnRZYnNh?=
 =?utf-8?B?NnNrcENuVVdrdlF1bFFZaWtOZERYaTNzb04zekwwZEJrbWp0NUc3U3JCMzlR?=
 =?utf-8?B?U1BpbW4vSjRaaHZOSWZBQnIvOXY4U05JbVBYMGRuQVRtV2x2TklaMHVLU1RI?=
 =?utf-8?B?VkFFQmlKNEc3TmlOWi8wcXFpNzNQRk1ObG45aVF1N1B2UlRRejQxN01aMjBE?=
 =?utf-8?B?TlR6UWpaYlFETndVZ2JLNlNJWnFLdEpvNWZFaTRHeE5JaElRdmlCYk9NTi8w?=
 =?utf-8?B?OXpXVlVXNUc4ZGpDRit5UlBkYUxzZFJkaFFkMGtmRDRuc0dRa3YvWks3dUh4?=
 =?utf-8?B?NFZHKzIxejBjTTZyeG5GOXhwRTB3SnRGUXpWN3BJT0F5TXR4L052VTZRVm5G?=
 =?utf-8?B?Kzc5cHVkRHBvaWlGOFkxem5JZjgrRWxlcEpYVkVwOWgyckN6eEFwMkRnUDE0?=
 =?utf-8?B?RWhwMHZubXdRZFlTODV4MGJRT3NzYit1RHo5U0FtQTdTZUxISnNneW5jdGxZ?=
 =?utf-8?B?VjZBcGowWnlISmg0ZGIrcHByZmQ4TDRPek94TmFJRFVRODhsWFd6Z1RvNkJS?=
 =?utf-8?B?Q1lmb2dveGtkeVB0RUNuUjJDNVJPSVp3YWx6eE5hMndIb1UxcWtKZ1lHK1NT?=
 =?utf-8?B?aG9PbHFCbytqaFo0cWFyUk9leHA4emVYQkdEdVZvaW43OTBtNXk2RGJyWjRW?=
 =?utf-8?B?dVd2bmdLcGMvRnZKeUFXMEVhUnQyY2JjRU5BbS80akE5K1dMb1ZjSjJkT3I4?=
 =?utf-8?B?LzExKzhSdDRBSDRFeXF1TTRRYVBna2gvZjM5WGhUQ2t6M082a2hZNXpldVNN?=
 =?utf-8?B?RDFNeHVXN2RqeHh5Z0JDcFRuM1VBdWxJaldrRWNvcllpeHFGNkNQa1d1c0sx?=
 =?utf-8?B?czk3cGtSNGxtMWJocnhMMmFrSjNOVEpvUE5CZ2tWbmo4K3VGcU1pZlUyZFQ0?=
 =?utf-8?B?RzRZUDZiNkI3WEgxSnFQbkxLcUpYNWJYamVqblhsbDk1MnVQNlpvR3lNYkh1?=
 =?utf-8?B?ZUlwVW1VaEVjYlRiaFdUZGJRYnROWFVkNUl4M0lJQzRsRDVQZllVclJ0dnVX?=
 =?utf-8?B?VUhjWTRkaXdadlY5TUhiVEdjUXJNcll1bVJsMm8yWTZLbXAyRUtGYk9EOEpC?=
 =?utf-8?B?b0ROSEh5d2VkMjNTTU4wdWVmOXk2ZXNSYUI1L3dxblVGdUMrUHdINVBwOVhI?=
 =?utf-8?B?Z1ZLZjk4OWpKdWxCYWxjQnE3RWxtbXNqQU1PTWZwSVFqdS9FZ0RjWHpvUW54?=
 =?utf-8?B?RXBOOUVlZ0xMN29YZklPVEpmNG5HVkhGMUFITlhnOFZWV0ZhY2VZQkhZa29C?=
 =?utf-8?B?dnB5N1VtN2FzWHQ3SHprSHNya1h5TWtqZ0F5TEpvSkY5c2V2b0ladkc2MVFj?=
 =?utf-8?B?dUhRSUtOWUJMWTgzNkx4NE9ORHp2U09RNFc0UjZHblkxRnA5S1lxTkFzR3NC?=
 =?utf-8?B?VTllUCtRbjlFOEF0eUM2ajBWM1RTNFhzSFhtdUxTRFZPeFB0b1lhOFNzYmZw?=
 =?utf-8?B?YjZiMk01MmMzVUo2Z0VVOStQQWwyQ3dIN2oyVS9zLytleXRya0oxYXBuTm9H?=
 =?utf-8?B?ZEJWeHBVT1ExcVB3QWpyZjlndTY1b01icXUydVlDN0p3SmhneXdlaUpKbFRZ?=
 =?utf-8?B?MUlpZHdnNEcyektyNlozM09obXRyWCtaK3FnbzNBSmNJUXFyNzNnbkhjeGJS?=
 =?utf-8?B?NnpuRTVKNTZrUUhmRDVSYys3OUR5UVQxMWoxTGFwaUVHOFRNZjhma1o2NC8v?=
 =?utf-8?B?dGd5dUoyMWM1Y2tLb1p1ZklDSWx3NW5WazRCVlhjZHdmZVhRRmF6SnNac0t6?=
 =?utf-8?B?aE1yNlQ4TnloQ05ZK3B5YWw1YThxdU1YeEFMSGxFWWpHRTVCZkU5NWlsWEx6?=
 =?utf-8?B?Z2JxQzNRakE4UUdsUUNvUnNSVlRML2k0UVNBbmhvbEgvRDR1bStaWTRsWmpS?=
 =?utf-8?Q?a080/3D31lu6ciimDMs+G78=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4e80160f-7e99-4620-60a3-08da000d8ccb
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 07:39:02.4466
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 0wUYobbZGEOypd3PwD9UgTwBuXb8af0kwUASio0JzpQblkgbE7aD/7TQJRnqI7gPMOGqqpQIA2WTHHZDTzlrYA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR04MB5068

On 04.03.2022 18:46, Marco Solieri wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> Introduce two new arm specific functions to temporarily map/unmap the
> Xen text read-write (the Xen text is mapped read-only by default by
> setup_pagetables): xen_map_text_rw and xen_unmap_text_rw.
> 
> There is only one caller in the alternative framework.
> 
> The non-colored implementation simply uses __vmap to do the mapping. In
> other words, there are no changes to the non-colored case.
> 
> The colored implementation calculates Xen text physical addresses
> appropriately, according to the coloring configuration.
> 
> Export vm_alloc because it is needed by the colored implementation of
> xen_map_text_rw.

I'm afraid I view vm_alloc() as strictly an internal function to
vmap.c. Even livepatching infrastructure has got away without making
it non-static.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 07:42:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 07:42:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285681.484918 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR80X-00030i-Fi; Mon, 07 Mar 2022 07:42:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285681.484918; Mon, 07 Mar 2022 07:42:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR80X-00030b-Cl; Mon, 07 Mar 2022 07:42:17 +0000
Received: by outflank-mailman (input) for mailman id 285681;
 Mon, 07 Mar 2022 07:42:16 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nR80W-00030V-EH
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 07:42:16 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 1b46edab-9dea-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 08:42:14 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2111.outbound.protection.outlook.com [104.47.18.111]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-3-rKUMBHMnNoa0Fkv6IuR2Bg-1; Mon, 07 Mar 2022 08:42:13 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by HE1PR04MB3051.eurprd04.prod.outlook.com (2603:10a6:7:1f::30) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.16; Mon, 7 Mar
 2022 07:42:11 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 07:42:11 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1b46edab-9dea-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646638934;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=WhA4ixUqMQkIwjPmJQXOghGRvQ4BmDzBgCnaqvL2xRQ=;
	b=aJ5nGkCqf/RvLtLK61nXCtyuyGF70SFHwK3RWkSJKSDgOcU4N+KWlwHDbR68QuCF9UoZyU
	Iya2uI1gaV/4ict8Nqupb7I7Bm0xZ5qxvACZb4p3o2+71QLQYAU28YIl6uL8AE5l7GpyBs
	nL6CWb0x44MS43WEY0EAUPZjGdsJE5c=
X-MC-Unique: rKUMBHMnNoa0Fkv6IuR2Bg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Q6rLAiVFTNioCvrugh9oBKTgrmNfvFtB+TkaEqAcuJG6wU7aJwiMkPsQR8pfPp/ar/EYpQavkV8Es7le4zeKMqmOSJT8cNJtJzPneSwuuiksXj31n4Bw1v9ZWSFr0pSfIaMvwoR0hwEcv/PCBUNvqKuiaLlY++BExOAKwOhnd+R96rAkVQq+VwEtJWsBzpKGlhbLSDuCoSa+xYAZRPop/ZXum3LYnHl4VoQjoq/tj63+P25mwdZNcMyRLdroBp28Ro3tuKGimS7kIFIJIUGj7M6Vtw2DvHeCIK8lXiGWAdlF/Y+SA7J/mBmuE71N3vaF1EjTDJcJLNyrS66sKPzDhw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=WhA4ixUqMQkIwjPmJQXOghGRvQ4BmDzBgCnaqvL2xRQ=;
 b=DACOn3X97kSPI9jbwvcco7G+Tb3/e/27f2/JnSSqnPZ8/ElFWvkFXXwmt+Yuz9+5iYhHQyaXTr8DnzKBCsKnt4vzvDLbMhvQVFJsG8n1QR5aRqvRPz/k3jcKGBobTqCFPb546UyWN2jx4RfGweIwb+hlbJH60KMtCN6uZ9I4d1nzr0Phdps8nlS9bBsq5Xelagp2bMPkFUxw49xZfE+znNYrR3zOFwHzheoR/FQMCgx2Ymz8MC+0RwmhAgnJCdsnsDmcTkahkDcx/exN2dNMDzDLF13pBKSzRDHaibTWj6CAXkIp7HChAMxiUldB4MtD/szC4mQs3+NgPKlTeDkcKg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <72b9f9c1-3cf7-1abc-4fea-e165ca4620c0@suse.com>
Date: Mon, 7 Mar 2022 08:42:12 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH 33/36] doc, xen-command-line: introduce coloring options
Content-Language: en-US
To: Marco Solieri <marco.solieri@minervasys.tech>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>, xen-devel@lists.xenproject.org
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-34-marco.solieri@minervasys.tech>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220304174701.1453977-34-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8PR04CA0035.eurprd04.prod.outlook.com
 (2603:10a6:20b:312::10) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: b14e094f-1120-4455-52a1-08da000dfd4f
X-MS-TrafficTypeDiagnostic: HE1PR04MB3051:EE_
X-Microsoft-Antispam-PRVS:
	<HE1PR04MB30510E6D6DB9168D10F2E7B2B3089@HE1PR04MB3051.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(31696002)(83380400001)(54906003)(6512007)(38100700002)(508600001)(6916009)(2616005)(186003)(31686004)(26005)(53546011)(6506007)(36756003)(86362001)(2906002)(8676002)(66556008)(66946007)(66476007)(316002)(7416002)(8936002)(4326008)(5660300002)(6486002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?Q3NOQjF4Q0hhclYxRkw2M2RMZ0hlWGFBaDJiOU93bFVaWDdHUUNnU2dnc3cv?=
 =?utf-8?B?Q3IvcVJhdWlOM0d1Z2dia0h3Yk9aamJOTUprR2s0MlIzNVdndm0xYWZicDZ5?=
 =?utf-8?B?ZWptSm5vL1FYM1FncmtuR09TSXVTcmt5dE1iaFlaZVNDdXJldHBlMXpSaXcr?=
 =?utf-8?B?VzRqTUV0Y3lTRktnRmptbk9Cci90V1MzVnhpSWNZZ2VIVUxadmNQc2V1cXJH?=
 =?utf-8?B?Ym5XRExGa0NudVFvK1oranF4NW9odlVmbXMvOG0ySER4ZmNSZWFDengzYzZ6?=
 =?utf-8?B?V3czc1gwN3BWUmgza0w4VFNib3NpK3RvenNDeUdxZi9QN0tGUE1zZHdMUEkz?=
 =?utf-8?B?SDQvcnJQempRcG5Pa0Nja1ltQkJvMkdINUF4MkVscHlqMTN1cWhISHRENGlT?=
 =?utf-8?B?MjAzWERUZmFzZlViSWN4bmZNNlRhTzdmSW1VUG0yeVZxZ1VnZGdCWTRSTUky?=
 =?utf-8?B?S3JHbE15TGxaZXZaMy91MWl1YVRtNVYzR2lNU0J2VEFwVjFQTjRXLzllWjIz?=
 =?utf-8?B?M2JMeldjMEg2ZHBEWWVPSVgwcTZTVEhOdjdYYVlQODlXalZwT1RaeDlkTmtB?=
 =?utf-8?B?SHJSUGlubnk5cWtQUDd5cHV5ZG8yRVUzWUdoY200QWsrMUUwaXBPckV0QVBx?=
 =?utf-8?B?QWNBM3VWQzBCUHNWa3RwSU9yVUdNcDNTZStxbk1JbllZRHRBdHFGTmFnMEFS?=
 =?utf-8?B?WVAydWtRWGtXRXYyY2ltek5BS3h2Q0x2U2FsY2w0eGFXamgvazZOUHpuWmNF?=
 =?utf-8?B?dTJJbkovcld2NzBvcWxoL0dncHpwN3hrU2p6ZDJFbkNRWnBpT3o3dGJwUjFV?=
 =?utf-8?B?cFJYbWVmdmFJRW9lcjdZaWRvSDFIbHdjTXVrMUFBb2VEcUlyZDRaeTg0Qk9s?=
 =?utf-8?B?SzV6TEsxK2FObmYyNzh1OFFxbGZ2QlA4bFZpUE1KN0dzTmprWjNCbllIM0hT?=
 =?utf-8?B?REc5Z0tnV1dSKzVHMm40S2lycU55QzIrY05vM2NiNVBhOFZSUEF0L3lQaDVp?=
 =?utf-8?B?SWI5cktRdlJqT0ZJNHcyMlc4ZEthNjI1a2RsMElTNHNIWXVhWDZSL2pVTStO?=
 =?utf-8?B?cVZzb1BLSG5YeGYyeUgyY3dKNnlqd0tZQWFlcWZGMzR2dDhGYTZoNjA4ZHQr?=
 =?utf-8?B?WGh5S0g1M3FQOHphWnNERWZnQUxjbkQ3T1EyTitMQ21lWEZxczVGRmFlM1hP?=
 =?utf-8?B?c1I5bHQ1L3I3UUI2VTBnd2syMTMzMnhCUFBKN0h0VEZ2VHU3OGJsSkZuS0NG?=
 =?utf-8?B?UEVSZmJseWxKcHY1L2JlVnM3WWhZSDhLeE03Wi8rUVM3VkthSFhEbkk5RUFx?=
 =?utf-8?B?Y1JlL20zU3N0OGhDU3ljM0tXVWR6T1NHYStKMHlyeXhSY1RYMWdUeExRY25k?=
 =?utf-8?B?UU0rWFhsVHFtU1FSMGozcjlkSkQyWW93WGgzb1ZPcmd6c2FvaExTRXA3V1du?=
 =?utf-8?B?eWdmZmFDbFRJc2VjWXNPa2ZNbmx4SVpFcmNJYzNJK2M5eTlVSDZMQ0VKaEtB?=
 =?utf-8?B?czZlVzZJL2pmWFhJR3kyUzFFN1VMTkxDUmI2TC8yQjlqK1V2QzJRM0xmR2hJ?=
 =?utf-8?B?ZTYyYVFVaDVVd2tMQWlGQXNPV29Dbko2c0N4NjZQQ0twQkNmTW1KZm9QdUdk?=
 =?utf-8?B?YTQ4SHNOOHVJaGdha3JoeWpVeHJKZjdXbGdBd1VTVDFleWF5NVAzQzBlbGl2?=
 =?utf-8?B?cVNNOVZvVzlIMVl5anluc2dzaFhBR2daa1FrUUl5MVYvdENSSUlHZlNTNHgz?=
 =?utf-8?B?NEdScTlXQXVTR2hmbG1KWUlrMFZPTjZYNUZVOFl5M1l3UGVKeHo0M3dUWENr?=
 =?utf-8?B?N0xneHJjS09LanJ2U2w2LzdyMm1LQ1lwc1I3dFJQRVppeUdrejh5SDhRdk1P?=
 =?utf-8?B?VVJqMU5zakFNL1dXWlhaVm9mMzVIUGlyMWxRdmpON0hoQnRTY01QcWtpTGh4?=
 =?utf-8?B?TU5UYjY5aWlablYyb2NwaG4zUG5SRk94L2NEaFRQUFMyMkUrU2xaYnJwcGZq?=
 =?utf-8?B?RWlXOUNyOHV3WTFUdGRLYjQ5TVFWV2VFTWxqZ2NoNnpHWXRHc3lIWVF3RUZQ?=
 =?utf-8?B?S1UyRDhtSG91alRFZW85L1JXUGxzUmJ0dXJDTUFWZXFUNzkzZXA1Q0RjclJt?=
 =?utf-8?B?cUhBcXZqRzhNTSt1ZFlKdmdVaERHclFMSlV0S2JGK0VoQmpXanNucHVVM05v?=
 =?utf-8?Q?IblYB1GrKe/E/vM85oecMMY=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b14e094f-1120-4455-52a1-08da000dfd4f
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 07:42:11.2161
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: n3BaHRwPE6zRMnRxnVopwaPPUeUEZikzJjzQwYy46lozM0OncejbO2faED6ehMCTO7gWs0Wy7uh56JId9fSnWg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR04MB3051

On 04.03.2022 18:46, Marco Solieri wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> Four additional parameters in the Xen command line are used to define
> the underlying coloring policy, which is not directly configurable
> otherwise.
> 
> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
> ---
>  docs/misc/xen-command-line.pandoc | 51 +++++++++++++++++++++++++++++--
>  1 file changed, 49 insertions(+), 2 deletions(-)

Documentation of new command line options should be added in the same
patch which adds support for the options.

> diff --git a/docs/misc/xen-command-line.pandoc b/docs/misc/xen-command-line.pandoc
> index efda335652..a472d51cf9 100644
> --- a/docs/misc/xen-command-line.pandoc
> +++ b/docs/misc/xen-command-line.pandoc
> @@ -299,6 +299,20 @@ can be maintained with the pv-shim mechanism.
>      cause Xen not to use Indirect Branch Tracking even when support is
>      available in hardware.
>  
> +### buddy\_size (arm64)

In new options we generally prefer - over _. I also don't think the name
is making clear enough what is actually being controlled.

Jan

> +> `= <size in megabyte>`
> +
> +> Default: `64 MB`
> +
> +Amount of memory reserved for the buddy allocator when colored allocator is
> +active. This options is useful only if coloring support is enabled.
> +The colored allocator is meant as an alternative to the buddy allocator,
> +since its allocation policy is by definition incompatible with the
> +generic one. Since the Xen heap systems is not colored yet, we need to
> +support the coexistence of the two allocators for now. This parameter, which is
> +optional and for expert only, is used to set the amount of memory reserved to
> +the buddy allocator.
> +
>  ### clocksource (x86)
>  > `= pit | hpet | acpi | tsc`
>  
> @@ -884,7 +898,17 @@ Controls for the dom0 IOMMU setup.
>  
>      Incorrect use of this option may result in a malfunctioning system.
>  
> -### dom0_ioports_disable (x86)
> +### dom0\_colors (arm64)
> +> `= List of <integer>-<integer>`
> +
> +> Default: `All available colors`
> +
> +Specify dom0 color configuration. If the parameter is not set, all available
> +colors are chosen and the user is warned on Xen's serial console. This color
> +configuration acts also as the default one for all DomUs that do not have any
> +explicit color assignment in their configuration file.
> +
> +### dom0\_ioports\_disable (x86)
>  > `= List of <hex>-<hex>`
>  
>  Specify a list of IO ports to be excluded from dom0 access.
> @@ -2625,6 +2649,20 @@ unknown NMIs will still be processed.
>  Set the NMI watchdog timeout in seconds.  Specifying `0` will turn off
>  the watchdog.
>  
> +### way\_size (arm64)
> +> `= <size in byte>`
> +
> +> Default: `Obtained from the hardware`
> +
> +Specify the way size of the Last Level Cache. This parameter is only useful with
> +coloring support enabled. It is an optional, expert-only parameter and it is
> +used to calculate what bits in the physical address can be used by the coloring
> +algorithm, and thus the maximum available colors on the platform. It can be
> +obtained by dividing the total LLC size by the number of associativity ways.
> +By default, the value is also automatically computed during coloring
> +initialization to avoid any kind of misconfiguration. For this reason, it is
> +highly recommended to use this boot argument with specific needs only.
> +
>  ### x2apic (x86)
>  > `= <boolean>`
>  
> @@ -2642,7 +2680,16 @@ In the case that x2apic is in use, this option switches between physical and
>  clustered mode.  The default, given no hint from the **FADT**, is cluster
>  mode.
>  
> -### xenheap_megabytes (arm32)
> +### xen\_colors (arm64)
> +> `= List of <integer>-<integer>`
> +
> +> Default: `0-0: the lowermost color`
> +
> +Specify Xen color configuration. 
> +Two colors are most likely needed on platforms where private caches are
> +physically indexed, e.g. the L1 instruction cache of the Arm Cortex-A57.
> +
> +### xenheap\_megabytes (arm32)
>  > `= <size>`
>  
>  > Default: `0` (1/32 of RAM)



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 08:18:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 08:18:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285726.484974 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR8Zt-0007iP-3k; Mon, 07 Mar 2022 08:18:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285726.484974; Mon, 07 Mar 2022 08:18:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR8Zs-0007iI-Ve; Mon, 07 Mar 2022 08:18:48 +0000
Received: by outflank-mailman (input) for mailman id 285726;
 Mon, 07 Mar 2022 08:18:47 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nR8Zr-0007i9-0U
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 08:18:47 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 34c9efb0-9def-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 09:18:45 +0100 (CET)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur01lp2052.outbound.protection.outlook.com [104.47.0.52]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-6-c3HhabaQM-GqYVIbARKbmQ-1; Mon, 07 Mar 2022 09:18:43 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB6PR0402MB2903.eurprd04.prod.outlook.com (2603:10a6:4:9b::10)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.16; Mon, 7 Mar
 2022 08:18:41 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 08:18:41 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 34c9efb0-9def-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646641124;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=keUYAVxn0TixUeENyrqR/1xBGDV5Z81O92OLPbTk0AE=;
	b=kSw2T8BQz0gwyf5RTxw+tR2/yRtBPcR4ReUk8hOEjGcAi4crkRrihqg20TIrrVQzkZdddh
	D+2zIFXFdF5ZeVwiDIMd1tK1lL63PK1igMrZRDrFpeNLcoK0tQ+bAx9cT+gVwbZaighkY7
	TcpUgi5MCvyU/xbnHk2f32n+hj/tr64=
X-MC-Unique: c3HhabaQM-GqYVIbARKbmQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=jxaUAFFeJZkzkLlDhYfOa+CfiTZHC0/JS4ASnuoR7GQLQjzqqcRFEwBO8/SWYpB5cuVtGG33kZ0KRqo7zpQWzFHTDLHvEYwqzDjeGEtzGmdOo6AZx8xPeVNTybmG/CUcDD9xEKJZ/U2xCN5O3leQetmf4u+VrfgFZnE9aGqTRxqSdQRQs1n0Cmqwcm4VWcfh+cSRjNEC8hv5uoLV2lYUcyPvU+7y0fBVWRJZgSbdbOg8ca2JyuiVqr9jsP9Yk5rSowcxdhXATsMD8CJ2Uh1fiwUOEWK1x0sh2MS++mbpbklQEB9lUJ0y1whpJ07Lcwtvyfj7zfRilGavda+3rYR2tQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=SRm8j4M8EbRAtnLkRmhA7SnytvFW5kJrYtMNz4p1JrQ=;
 b=fz8qoFBSC9zNI7Zq2pRjKMepxF9byCcBXM9wle8ke4yb7hvRZZXD+amS1KmFUeuYdRRLn4Od3UHzjV9Uf69J/j9aB8pvw4tje8/13QBLflQfgGJzJfFsV1TEuThq33xUuKzXt2TisrOx5VkYSleZJs65eLsxpThUuxKjbuCh8W44jmas7+54OTsjcJxlSXfQsF0EzjUG/j+ayjMwIoZYK14b/8oSHlSaU2vsP5pM/BnfuSjlI5IB2lR1c/8XVnzIsEIuVp3Nq0mtreP3nNiTvT+UKdsCwI8wzXIRUZEjO+S533mqHFHPsUkuI30T7Fhy3BkxAaTaUPuvEomp2BwKLw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <2ebf82d3-3509-7224-6537-acdaad34dcf2@suse.com>
Date: Mon, 7 Mar 2022 09:18:42 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] x86/build: use --orphan-handling linker option if
 available
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
References: <5c374fd3-017d-3c40-4ded-25a3b1c978a6@suse.com>
 <YiCkUebvg0gaBm4/@Air-de-Roger>
 <3c335ca5-63e3-6389-cba5-b9047a4ce3b9@suse.com>
 <YiDaQY1ToO8G2QYd@Air-de-Roger>
 <abd691c8-9c7e-40d7-3f18-d96f826b8539@suse.com>
 <YiHZpmrYt+QvE7ex@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YiHZpmrYt+QvE7ex@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6P195CA0069.EURP195.PROD.OUTLOOK.COM
 (2603:10a6:209:87::46) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 6145edf1-012f-46e2-6ce3-08da00131694
X-MS-TrafficTypeDiagnostic: DB6PR0402MB2903:EE_
X-Microsoft-Antispam-PRVS:
	<DB6PR0402MB2903B26F33F666FC53BDEB79B3089@DB6PR0402MB2903.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(508600001)(2616005)(31696002)(186003)(8676002)(26005)(66476007)(66556008)(66946007)(8936002)(86362001)(4326008)(6512007)(83380400001)(5660300002)(36756003)(6506007)(31686004)(53546011)(54906003)(6916009)(316002)(38100700002)(966005)(6486002)(2906002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?NaxPoTODkLp45CDscoCtdr4qEmR/oALejTQK/2PRolPH32mwY/YjWyxQt/aY?=
 =?us-ascii?Q?jAigbnywOfTH7P8Q8KjZxX005nym2vGoGdxJ+Iebv/1iWWEW1t7vYqoVnHZz?=
 =?us-ascii?Q?h/b1r8YmcCexZZPRKKFt/bqqvL6jhbJYP0pe8CHlV75VWOVN+Uk29NxXuqP0?=
 =?us-ascii?Q?BqiZ8eBAj8D8+a2U5U3v2LotKb7mqbWJApl+fsB2FEo9XsUNVtrHpHSLLy7W?=
 =?us-ascii?Q?u1xyEWlbeEkQ6mAflNUnxUe1vRdfqbpmjNRmfGrpCywDiUOo+6UWT0atLPVE?=
 =?us-ascii?Q?pepXGNDvvGw68gRn81n1/LviK4ZNH7T2mV7a0BRetfyk8o/266HakyYrL5qJ?=
 =?us-ascii?Q?reBzS2G9SnSYmqYiFdDU+6HG5Vb3bPfyUECq+qdqfryAmhubAr39XLCT3fh3?=
 =?us-ascii?Q?eqfFnywbj4t7DoBHRJO2aot4ruBqmhVU3dhxL3I/YKMzdiiTEMgIOY5Ll3h8?=
 =?us-ascii?Q?NkzlhyrQl1aV/3pgRZJMXXnmioFkJ8KbpkUI34K3Xd0tvovxok3LKM97Bihk?=
 =?us-ascii?Q?Cv80M5mmRiXodMuhLsbFTxiJm16zzh3Vnscd80I0i2Iy2TdbeSXMIU3l9Z6m?=
 =?us-ascii?Q?O3d/8a65H7JQ8asAFFnt9s1JUjcGKeXoyiz0OBZVRn2S1OKTdpU7mbcRMkF5?=
 =?us-ascii?Q?muB+7reTcKr0C4B6ZmltpjRM5Qms5VRVl+cUXfQw+/YLSuXokSGnE3t0yNBs?=
 =?us-ascii?Q?N2W9+14zmJObkAZ6oRQVTLEja3fK/Cghddohd7JhCGk21HN4/xi72OhAi+T3?=
 =?us-ascii?Q?aRuXAF4nhU/zQsjvcSBKVvio7KZlLfpreUaEiPF+nCy/Vi8etNIQx0WE6jzu?=
 =?us-ascii?Q?seaSBq8G0iyEZN6Q8noS9UVcN5266plAztBUfcafSd8Z8dpJa9LVhMri/4yN?=
 =?us-ascii?Q?u1DiVcS2PnpXGZy+EY44M7gUGdQNxq1xV3qmnk3cy5gvcJ9ipjVhTgTySid/?=
 =?us-ascii?Q?VJXPmVXv3e80OkrptQFV+K3wtUC4sp4crx87E4TWAC28smlmm9W6+pLWF2oK?=
 =?us-ascii?Q?HUQKwKKed1IKIAF/hr5QVXyGvp3GyS9T39J+k7d2EbAs5+0BQMw6Vrt+2Czf?=
 =?us-ascii?Q?3Jr7F19CC4aE+N7hU9FqkaCHZxqTcljJVOfIg4R5UTxy8wai45t81H60dG2+?=
 =?us-ascii?Q?ZUnnH/urCP1rwLjTy+aWTux0OnxgihIwC/jbjsHHQlfzOUx49nA8FovhKp5s?=
 =?us-ascii?Q?VqgDFVLQtYU5K2v6bMO1am8dGnLOJqkifNbUESn30L/ldI753l8eWykCr7yW?=
 =?us-ascii?Q?eR+4+hQgmZJj8sCe40uXpBIcYqczrsNJyFaCCBu6We11L1rNoQ/6AfaYL6f8?=
 =?us-ascii?Q?JW4rKwzgWCdmjfPshLTiyGqR5KVzQNQ956UCOddycaXcyEHAANs0LZP2xuzo?=
 =?us-ascii?Q?saAR5wov/7ctbt5n7VzzoB3udXLDhOJBPhi+jlF+iqZ+fgeakbp4DdSQ07q4?=
 =?us-ascii?Q?CaRvUWgkmZeQ4bb/ByJno4ijxpyjZoBy3PCOjM6SVoJm8j25t4HWX3eu6TE2?=
 =?us-ascii?Q?AuynVAMwz3F7hXNskpLsqeBcJMeiqrCgfhSnSJisD35/16h5bPrUxIL105/3?=
 =?us-ascii?Q?NW2WLntZtif4ohbBneO82KTrewWwtczTwM976Ecs/wjyJl0yGLsL6D6hm8r3?=
 =?us-ascii?Q?f221fikydE+4KqEC5tUDM1c=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6145edf1-012f-46e2-6ce3-08da00131694
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 08:18:41.1425
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: hB4CXgK3f0nZ8VTjRLK6r4nDDC8YtPsPg48bLMcCZmTQRztNme1igrUXPgI/drYeHwSRPvLOCfaLcrrfiC6VYg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0402MB2903

On 04.03.2022 10:19, Roger Pau Monn=C3=A9 wrote:
> On Fri, Mar 04, 2022 at 09:02:08AM +0100, Jan Beulich wrote:
>> On 03.03.2022 16:09, Roger Pau Monn=C3=A9 wrote:
>>> On Thu, Mar 03, 2022 at 01:17:03PM +0100, Jan Beulich wrote:
>>>> On 03.03.2022 12:19, Roger Pau Monn=C3=A9 wrote:
>>>>> On Wed, Mar 02, 2022 at 03:19:35PM +0100, Jan Beulich wrote:
>>>>>> As was e.g. making necessary 4b7fd8153ddf ("x86: fold sections in fi=
nal
>>>>>> binaries"), arbitrary sections appearing without our linker script
>>>>>> placing them explicitly can be a problem. Have the linker make us aw=
are
>>>>>> of such sections, so we would know that the script needs adjusting.
>>>>>>
>>>>>> To deal with the resulting warnings:
>>>>>> - Retain .note.* explicitly for ELF, and discard all of them (except=
 the
>>>>>>   earlier consumed .note.gnu.build-id) for PE/COFF.
>>>>>> - Have explicit statements for .got, .plt, and alike and add asserti=
ons
>>>>>>   that they're empty. No output sections will be created for these a=
s
>>>>>>   long as they remain empty (or else the assertions would cause earl=
y
>>>>>>   failure anyway).
>>>>>> - Collect all .rela.* into a single section, with again an assertion
>>>>>>   added for the resulting section to be empty.
>>>>>> - Extend the enumerating of .debug_* to ELF. Note that for Clang add=
ing
>>>>>>   of .debug_macinfo is necessary. Amend this by its Dwarf5 counterpa=
rt,
>>>>>>   .debug_macro, then as well (albeit more may need adding for full
>>>>>>   coverage).
>>>>>>
>>>>>> Suggested-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>
>>>>>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>>>>>> ---
>>>>>> I would have wanted to make this generic (by putting it in
>>>>>> xen/Makefile), but the option cannot be added to LDFLAGS, or else
>>>>>> there'll be a flood of warnings with $(LD) -r. (Besides, adding to
>>>>>> LDFLAGS would mean use of the option on every linker pass rather tha=
n
>>>>>> just the last one.)
>>>>>>
>>>>>> Retaining of .note in xen-syms is under question. Plus if we want to
>>>>>> retain all notes, the question is whether they wouldn't better go in=
to
>>>>>> .init.rodata. But .note.gnu.build-id shouldn't move there, and when
>>>>>> notes are discontiguous all intermediate space will also be assigned=
 to
>>>>>> the NOTE segment, thus making the contents useless for tools going j=
ust
>>>>>> by program headers.
>>>>>>
>>>>>> Newer Clang may require yet more .debug_* to be added. I've only pla=
yed
>>>>>> with versions 5 and 7 so far.
>>>>>>
>>>>>> Unless we would finally drop all mentioning of Stabs sections, we ma=
y
>>>>>> want to extend to there what is done for Dwarf here (allowing the EF=
I
>>>>>> conditional around the section to also go away).
>>>>>>
>>>>>> See also https://sourceware.org/pipermail/binutils/2022-March/119922=
.html.
>>>>>
>>>>> LLD 13.0.0 also warns about:
>>>>>
>>>>> ld: warning: <internal>:(.symtab) is being placed in '.symtab'
>>>>> ld: warning: <internal>:(.shstrtab) is being placed in '.shstrtab'
>>>>> ld: warning: <internal>:(.strtab) is being placed in '.strtab'
>>>>>
>>>>> So seeing your mail where you mention GNU ld not needing those, I
>>>>> think we would need to add them anyway for LLVM ld.
>>>>
>>>> Hmm, that's ugly. How do I recognize LLVM ld? I can't simply use a
>>>> pre-processor conditional keying off of __clang__, as that used as the
>>>> compiler doesn't mean their ld is also in use (typically the case on
>>>> Linux).
>>>
>>> Hard to tell, `ld -v` for LLD will typically contain '^LLD' I think,
>>> but I don't really like matching on human readable output like this.
>>
>> Same here. But Linux'es ld-version.sh looks to be doing just that.
>=20
> OK, so be it then. We can always improve afterwards, as I don't really
> have any better suggestion ATM.
>=20
>>>> I also don't want to add these uniformly, for now knowing what
>>>> side effects their mentioning might have with GNU ld.
>>>
>>> Wouldn't it be fine to just place them at the end, just like it's
>>> done by default by ld?
>>>
>>> Are you worried about not getting the proper type if mentioned in the
>>> linker script?
>>
>> I'm worried of about any kind of anomaly that could be caused by
>> mentioning sections which a linker doesn't expect to be named in
>> a script. That's hardly something they would even test their
>> linkers against.
>=20
> I've raised a bug with LLD:
>=20
> https://github.com/llvm/llvm-project/issues/54194
>=20
> To see whether this behavior is intended.
>=20
>>>>>> --- a/xen/arch/x86/Makefile
>>>>>> +++ b/xen/arch/x86/Makefile
>>>>>> @@ -120,6 +120,8 @@ syms-warn-dup-y :=3D --warn-dup
>>>>>>  syms-warn-dup-$(CONFIG_SUPPRESS_DUPLICATE_SYMBOL_WARNINGS) :=3D
>>>>>>  syms-warn-dup-$(CONFIG_ENFORCE_UNIQUE_SYMBOLS) :=3D --error-dup
>>>>>> =20
>>>>>> +orphan-handling-$(call ld-option,--orphan-handling=3Dwarn) +=3D --o=
rphan-handling=3Dwarn
>>>>>
>>>>> Might be better to place in xen/Kconfig with the CC checks?
>>>>
>>>> Well. I've tried to stay away from complaining if people introduce
>>>> new tool chain capability checks in Kconfig. But I'm not going to
>>>> add any myself (unless things would become really inconsistent) up
>>>> and until we have actually properly discussed the upsides and
>>>> downsides of either model. Doing this via email (see the "Kconfig
>>>> vs tool chain capabilities" thread started in August 2020) has
>>>> proven to not lead anywhere. I'm really hoping that we can finally
>>>> sort this in Bukarest.
>>>>
>>>>> I'm also wondering whether we could add the flag here into XEN_LDFLAG=
S
>>>>> and EFI_LDFLAGS, as those options are only used together with the
>>>>> linker script in the targets on the Makefile.
>>>>
>>>> Not for XEN_LDFLAGS at least, and undesirable for EFI_LDFLAGS. See
>>>> the respective post-commit message remark.
>>>
>>> But the calls to LD in order to generate $(TARGET)-syms do not use -r,
>>> and are all using the linker script, so it should be fine to use
>>> --orphan-handling=3Dwarn there?
>>
>> But XEN_LDFLAGS is also used elsewhere together with -r. (Whether
>> that's actually correct is a different question.)
>>
>>> Could we do something like:
>>>
>>> $(TARGET)-syms: XEN_LDFLAGS +=3D ...
>>>
>>> And similar for $(TARGET).efi?
>>
>> Yes, this ought to be possible, but would again lead to the option
>> being passed on all three linking stages instead of just the final
>> one. When there are many warnings (e.g. because of the same kind of
>> section appearing many times), it's not helpful to see the flood
>> three times (or likely even six times, once for xen-syms and once
>> for xen.efi).
>=20
> OK, I think our build system is already quite chatty, so wouldn't
> really care about seeing repeated messages there. We can find a way to
> generalize passing options to the final linker step if/when we need to
> add more.
>=20
> I'm fine with doing the LLD fixup as a separate patch, so:
>=20
> Reviewed-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>

Thanks. However, something is wrong here. Unlike in my local builds, the
pre-push build test I did after committing this triggered a massive amount
(tens of thousands) of objdump warnings:

CU at offset ... contains corrupt or unsupported version number: 0
Invalid pointer size (0) in compunit header, using 4 instead

Helpfully it doesn't say whether that's xen-syms, xen-efi, or both. I'll
have to investigate and fix; I can only guess at this point that this
might be triggered by a difference in .config, or be hidden by some
other change I have in my local tree.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 09:18:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 09:18:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285742.484989 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR9VX-0005cp-JR; Mon, 07 Mar 2022 09:18:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285742.484989; Mon, 07 Mar 2022 09:18:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR9VX-0005ci-GN; Mon, 07 Mar 2022 09:18:23 +0000
Received: by outflank-mailman (input) for mailman id 285742;
 Mon, 07 Mar 2022 09:18:22 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=7T3K=TS=amazon.de=prvs=058ff0969=doebel@srs-se1.protection.inumbo.net>)
 id 1nR9VV-0005cc-RB
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 09:18:22 +0000
Received: from smtp-fw-2101.amazon.com (smtp-fw-2101.amazon.com [72.21.196.25])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 86677351-9df7-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 10:18:19 +0100 (CET)
Received: from iad12-co-svc-p1-lb1-vlan2.amazon.com (HELO
 email-inbound-relay-pdx-2c-51ba86d8.us-west-2.amazon.com) ([10.43.8.2])
 by smtp-border-fw-2101.iad2.amazon.com with ESMTP; 07 Mar 2022 09:18:05 +0000
Received: from EX13D44EUC001.ant.amazon.com
 (pdx1-ws-svc-p6-lb9-vlan2.pdx.amazon.com [10.236.137.194])
 by email-inbound-relay-pdx-2c-51ba86d8.us-west-2.amazon.com (Postfix) with
 ESMTPS id 8F10B840B8; Mon,  7 Mar 2022 09:18:04 +0000 (UTC)
Received: from EX13MTAUWB001.ant.amazon.com (10.43.161.207) by
 EX13D44EUC001.ant.amazon.com (10.43.164.236) with Microsoft SMTP Server (TLS)
 id 15.0.1497.28; Mon, 7 Mar 2022 09:18:03 +0000
Received: from dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (10.13.240.106)
 by mail-relay.amazon.com (10.43.161.249) with Microsoft SMTP Server
 id
 15.0.1497.28 via Frontend Transport; Mon, 7 Mar 2022 09:18:01 +0000
Received: by dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (Postfix,
 from userid 3160037)
 id 3886C4E7F; Mon,  7 Mar 2022 09:18:00 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 86677351-9df7-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646644700; x=1678180700;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=ddX3RTclsMOPSNazwnK9SdFNGe3EdxDBGalO8CrgNm4=;
  b=uNY7wZ0WRnHmtW8JT4byPJIG+mlNQTR2LfFBCxk9+NPXhUWaMTUfJOrg
   BzRvkOrtDwkxQHGNev/AJtGHHQ8aAJnSQv6isxvE5UYp/Vq5Le840BgAG
   eKpcj9QjcsUj7SBXz4ypfd2Z378v7zTqxqNwXvipOgoKJnUWfiuBB71BN
   A=;
X-IronPort-AV: E=Sophos;i="5.90,161,1643673600"; 
   d="scan'208";a="178993956"
From: Bjoern Doebel <doebel@amazon.de>
To: <xen-devel@lists.xenproject.org>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, Roger
 Pau Monne <roger.pau@citrix.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
	Bjoern Doebel <doebel@amazon.de>, Konrad Rzeszutek Wilk
	<konrad.wilk@oracle.com>, Ross Lagerwall <ross.lagerwall@citrix.com>
Subject: [PATCH] xen/x86: Livepatch: support patching CET-enhanced functions
Date: Mon, 7 Mar 2022 09:17:47 +0000
Message-ID: <fd56d3713b873bb00f7fca80e86ee7466057be3c.1646643967.git.doebel@amazon.de>
X-Mailer: git-send-email 2.32.0
MIME-Version: 1.0
Precedence: Bulk
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

Xen enabled CET for supporting architectures. The control flow aspect of
CET expects functions that can be called indirectly (i.e., via function
pointers) to start with an ENDBR64 instruction. Otherwise a control flow
exception is raised.

This expectation breaks livepatching flows because we patch functions by
overwriting their first 5 bytes with a JMP + <offset>, thus breaking the
ENDBR64. We fix this by checking the start of a patched function for
being ENDBR64. In the positive case we move the livepatch JMP to start
behind the ENDBR64 instruction.

To avoid having to guess the ENDBR64 offset again on patch reversal
(which might race with other mechanisms adding/removing ENDBR
dynamically), use the livepatch metadata to store the computed offset
along with the saved bytes of the overwritten function.

Signed-off-by: Bjoern Doebel <doebel@amazon.de>
CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
CC: Ross Lagerwall <ross.lagerwall@citrix.com>

Note that on top of livepatching functions, Xen supports an additional
mode where we can "remove" a function by overwriting it with NOPs. This
is only supported for functions up to 31 bytes in size and this patch
reduces this limit to 27 bytes.
---
 xen/arch/x86/livepatch.c | 39 +++++++++++++++++++++++++++++++++------
 1 file changed, 33 insertions(+), 6 deletions(-)

diff --git a/xen/arch/x86/livepatch.c b/xen/arch/x86/livepatch.c
index 65530c1e57..bb7ecf36a6 100644
--- a/xen/arch/x86/livepatch.c
+++ b/xen/arch/x86/livepatch.c
@@ -14,11 +14,28 @@
 #include <xen/vm_event.h>
 #include <xen/virtual_region.h>
 
+#include <asm/endbr.h>
 #include <asm/fixmap.h>
 #include <asm/nmi.h>
 #include <asm/livepatch.h>
 #include <asm/setup.h>
 
+/*
+ * CET hotpatching support: We may have functions starting with an ENDBR64 instruction
+ * that MUST remain the first instruction of the function, hence we need to move any
+ * hotpatch trampoline further into the function. For that we need to keep track of the
+ * patching offset used for any loaded hotpatch (to avoid racing against other fixups
+ * adding/removing ENDBR64 or similar instructions).
+ *
+ * We do so by making use of the existing opaque metadata area. We use its first 4 bytes
+ * to track the offset into the function used for patching and the remainder of the data
+ * to store overwritten code bytes.
+ */
+struct __packed x86_livepatch_meta {
+    int32_t patch_offset;
+    uint8_t instruction[LIVEPATCH_OPAQUE_SIZE - sizeof(int32_t)];
+};
+
 static bool has_active_waitqueue(const struct vm_event_domain *ved)
 {
     /* ved may be xzalloc()'d without INIT_LIST_HEAD() yet. */
@@ -104,11 +121,14 @@ void noinline arch_livepatch_revive(void)
 
 int arch_livepatch_verify_func(const struct livepatch_func *func)
 {
+    BUILD_BUG_ON(sizeof(struct x86_livepatch_meta) != LIVEPATCH_OPAQUE_SIZE);
+
     /* If NOPing.. */
     if ( !func->new_addr )
     {
+        struct x86_livepatch_meta *lp = (struct x86_livepatch_meta*)func->opaque;
         /* Only do up to maximum amount we can put in the ->opaque. */
-        if ( func->new_size > sizeof(func->opaque) )
+        if ( func->new_size > sizeof(lp->instruction) )
             return -EOPNOTSUPP;
 
         if ( func->old_size < func->new_size )
@@ -127,15 +147,20 @@ int arch_livepatch_verify_func(const struct livepatch_func *func)
 void noinline arch_livepatch_apply(struct livepatch_func *func)
 {
     uint8_t *old_ptr;
-    uint8_t insn[sizeof(func->opaque)];
+    struct x86_livepatch_meta *lp = (struct x86_livepatch_meta*)func->opaque;
+    uint8_t insn[sizeof(lp->instruction)];
     unsigned int len;
 
+    lp->patch_offset = 0;
     old_ptr = func->old_addr;
     len = livepatch_insn_len(func);
     if ( !len )
         return;
 
-    memcpy(func->opaque, old_ptr, len);
+    if ( is_endbr64( old_ptr ) )
+        lp->patch_offset += ENDBR64_LEN;
+
+    memcpy(lp->instruction, old_ptr + lp->patch_offset, len);
     if ( func->new_addr )
     {
         int32_t val;
@@ -143,14 +168,14 @@ void noinline arch_livepatch_apply(struct livepatch_func *func)
         BUILD_BUG_ON(ARCH_PATCH_INSN_SIZE != (1 + sizeof(val)));
 
         insn[0] = 0xe9; /* Relative jump. */
-        val = func->new_addr - func->old_addr - ARCH_PATCH_INSN_SIZE;
+        val = func->new_addr - (func->old_addr + lp->patch_offset + ARCH_PATCH_INSN_SIZE);
 
         memcpy(&insn[1], &val, sizeof(val));
     }
     else
         add_nops(insn, len);
 
-    memcpy(old_ptr, insn, len);
+    memcpy(old_ptr + lp->patch_offset, insn, len);
 }
 
 /*
@@ -159,7 +184,9 @@ void noinline arch_livepatch_apply(struct livepatch_func *func)
  */
 void noinline arch_livepatch_revert(const struct livepatch_func *func)
 {
-    memcpy(func->old_addr, func->opaque, livepatch_insn_len(func));
+    struct x86_livepatch_meta *lp = (struct x86_livepatch_meta*)func->opaque;
+
+    memcpy(func->old_addr + lp->patch_offset, lp->instruction, livepatch_insn_len(func));
 }
 
 /*
-- 
2.32.0




Amazon Development Center Germany GmbH
Krausenstr. 38
10117 Berlin
Geschaeftsfuehrung: Christian Schlaeger, Jonathan Weiss
Eingetragen am Amtsgericht Charlottenburg unter HRB 149173 B
Sitz: Berlin
Ust-ID: DE 289 237 879





From xen-devel-bounces@lists.xenproject.org Mon Mar 07 09:37:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 09:37:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285750.485000 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR9oF-00085n-97; Mon, 07 Mar 2022 09:37:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285750.485000; Mon, 07 Mar 2022 09:37:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nR9oF-00085g-5r; Mon, 07 Mar 2022 09:37:43 +0000
Received: by outflank-mailman (input) for mailman id 285750;
 Mon, 07 Mar 2022 09:37:42 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nR9oE-00085a-9N
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 09:37:42 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3b5f87e3-9dfa-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 10:37:40 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2169.outbound.protection.outlook.com [104.47.17.169]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-41-A8VZ_E0hMv2KEuToyjIY6Q-1; Mon, 07 Mar 2022 10:37:39 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR0401MB2318.eurprd04.prod.outlook.com (2603:10a6:800:27::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Mon, 7 Mar
 2022 09:37:37 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 09:37:37 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3b5f87e3-9dfa-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646645860;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=/uHqtRAO9dlYDP5J95RWFP4BjApNFAFlG2TEmino1QM=;
	b=BAEgcB9isxUZC+Ralvfbsd9qeDtz3t1MxVxq0sJZmOmsHIqDgCfP/pmO6ap//Ze8JHZtZV
	rz+V4nrApN/atK0ggvZi8bekfYULZiXm3KdQtSamgcNVrU1tIiXNAYvnmTztyStfRIiP7Y
	q9CYciDzovQve91Nr3CLJajIbC1dVgI=
X-MC-Unique: A8VZ_E0hMv2KEuToyjIY6Q-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=YL7Th8EZooU594QLeJKC1ka54w/mZMKRpyCI5yKxpfkIlEYG3UNMDSfNz+9bDyurrELLvAYd1IykKi/NdtgdQvPoJwj/P6EDbHOFor8mjgUdW9X+9PpFHPsQBKQj1SOy2c/2jHSjOeChT6s2jIhgNh3frJzI5IVtUzK6Pb+BsQz3eVfyKCpGvy/eepM27K3bIwhD90dTiWAWbpuVACDeYIN7lGGEr5lCf6O5+uLvNSbXA5+0zm5fD2mE15ICiSn4JG6ZXxCVz5iTIlBkJUVLvKZOeCeXBuJktvQWpXBZjKM6M7PMaZAapoQuygY4ll6nQJUhFz3Btbxa8VWo/cIXtQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=/uHqtRAO9dlYDP5J95RWFP4BjApNFAFlG2TEmino1QM=;
 b=BrGLVpu0RUBVtISkk69VvFeBDTlJzJ6+uqCVTzEHIT6F3bWpdLWlqxCGLoVy2NOARHTPanN0X4a9a8KFCL/2N+p4abJt1jClCfyxJf7T/gttoGsy/o6lUFQqjKG0KYmPLkjTFmXwmZkBqE4aRuZObOBPHAOlJBRTt7iCirUESkIWPohTaXfJGOZIwsYGzOzyCMI0ggnPRwC1D4YG7SAjBXmh2PbzJZCAH/7A//jcVqfyC1AtH56e3lkSD4vTMwxPzq217a4iAris7pS5yUW4Jh0QjSx8RXFRmxX1rab2EktQLVLYeUrkNEKKx9cocBXSztfYGXn6OTf5GUZyi15BFA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <f9a608be-8aea-9116-fcd7-15a197073f8d@suse.com>
Date: Mon, 7 Mar 2022 10:37:38 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] xen/x86: Livepatch: support patching CET-enhanced
 functions
Content-Language: en-US
To: Bjoern Doebel <doebel@amazon.de>
Cc: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>,
 Roger Pau Monne <roger.pau@citrix.com>,
 Andrew Cooper <Andrew.Cooper3@citrix.com>,
 Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
 Ross Lagerwall <ross.lagerwall@citrix.com>, xen-devel@lists.xenproject.org
References: <fd56d3713b873bb00f7fca80e86ee7466057be3c.1646643967.git.doebel@amazon.de>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <fd56d3713b873bb00f7fca80e86ee7466057be3c.1646643967.git.doebel@amazon.de>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM5PR0601CA0031.eurprd06.prod.outlook.com
 (2603:10a6:203:68::17) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 658d0244-13ed-4b56-6584-08da001e1d45
X-MS-TrafficTypeDiagnostic: VI1PR0401MB2318:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR0401MB231820754F2EE7682787E2CDB3089@VI1PR0401MB2318.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(38100700002)(6486002)(2616005)(8936002)(4326008)(8676002)(66556008)(31696002)(508600001)(5660300002)(66476007)(83380400001)(36756003)(86362001)(2906002)(26005)(66946007)(6512007)(316002)(6506007)(186003)(54906003)(6916009)(31686004)(53546011)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?MGFKMjJmWmFtMHFUbUI4QlNtTHd6ekxIL2xTeDlLSXc2TDNWbHJYSGNCcGFV?=
 =?utf-8?B?OVg2WXZJSmNoeitCbm82dlYyNCtsRitoRUlSWFVIL1hKTnJ0S0xFMWh1dDJD?=
 =?utf-8?B?ME9zNFc3N1M4S055TXpWak01UGVFTUtmZ09QeStSRVVXTXlHcTRFMFAvQmZx?=
 =?utf-8?B?T29Od3lIamg5NURqU3d3Z25KVnhWdXRuOWZ2Z01IMk5KbzFpQ0RCVzJqUWsv?=
 =?utf-8?B?YzNDVEh5a29vMlhPMTZHOUFwVUxjNHYyT05ZU0VLNHVjUUR2L1NlWFBubXNL?=
 =?utf-8?B?Vm9MbXBMV1doU25ldGdUNHZTZHpOdmh2UzZTWjNZaTBpcW5rZGJmZ05EVE1W?=
 =?utf-8?B?bWhHaXBaaEFVTXMzYUpkdktqdWd3M01PTW9ISnZiWkorNGJkcG00WXArcXN3?=
 =?utf-8?B?enhIbW1EUmpqVDU5d3ZSUVIzazVzZ1hkZzcwQkVoOXhTZ1MrU0JjbGJFdEdO?=
 =?utf-8?B?OXdRaWc1TW1MRHlCaGNGOE1GaEhiVmt3YkJsaU5WSzJQczhVNTBiL0hjVDU3?=
 =?utf-8?B?dyt2Q0JmUDRBZ016U3JhdGVPaW95SjFtVVRkWnNqamFHenZyYVRKYVNwdXBL?=
 =?utf-8?B?VWxEQVoxdEQxT3l6T2RhZjBWQjlVMEFuZnAzUkMxZ0lPQTBTZTdic0dWeHpo?=
 =?utf-8?B?dGZVYTRySjdBUUI2Uit0ZnRBM0tsUEFtY0xKZEV2NEJHeEcySC8rbGw2SnIy?=
 =?utf-8?B?cFp5ckRTc3ZxNDg1UUhzQTZRa085clEzamhyYUxlMHJMMVVpYmNGaUxPNUsr?=
 =?utf-8?B?cFFEY2NZdEZ2NGs4bGFnVUhnQnJORi82aStnZDVDV2JNcDJKUXYzNjRkWkwx?=
 =?utf-8?B?WksrbmxlZXB4OHJxNEt5NTdvdkFUZEdwVXR3MlZueWdnVDRBRzgyQlJCVjlI?=
 =?utf-8?B?cWlZclROdHRmSHY1am5NR1ozV1NaeDQyUHl4U1NCK2VRUTUwWDdUZkh2dnpB?=
 =?utf-8?B?cGpRWnozSUJQVFFoMENEOFgycHhiSlFpRVlUTFJpYzVUQndERzdtZlRCN0g1?=
 =?utf-8?B?eXdLdXplcW5RWFRGdnpWQ2VKQUVoRW5aV3U3bFNwVVNUVTdTemhYL25JbWpB?=
 =?utf-8?B?QUhNQkhtVHJESFdYQnZ2anRmd2t2TUVMcGxPV2lZcm1keEx3cGlLQXJ6NEF6?=
 =?utf-8?B?RG5RaTFveUQyTjZFdGp5QUZIZFZWWUQ1WUQ4N29CL0djSjA4ZWFPWU8vVHQ4?=
 =?utf-8?B?UStPTEVhb0QvOW1KZXVyV1RGWXNaUFdlSGQzcTdodU1nTUpIMkVHckI3Unlm?=
 =?utf-8?B?M1JxYytNYlljMHA4a2hwWEsvellUZU5CUDhpTE5xaWdsbC9Fa2g3RlBvR3lx?=
 =?utf-8?B?ekJ1cC9ud3p3WnFhTkwwN01CeGRRNFdNeXlyTjd3T0VHOHJHb2FRS2lkYkoy?=
 =?utf-8?B?Q01HcTdadVZtUjVIUExyTjhLeWZPQnNwZTlPN09Wb0FHSzRIcXZiRTV3MmtE?=
 =?utf-8?B?TFcwOG1vYkhGbXZnNXJXelVST0RhTGxBbEIwQnoxelZvZG5rWXZtSzFocUx6?=
 =?utf-8?B?eFZUeml4Vis3QTNiM0FBUUdMV2J0SnI0MTFjb2JZZG1wS0pmY0ZhQXVGd2RO?=
 =?utf-8?B?cmlFZTNpWXpOM1RwdlVkUHpjWTRlOHRzcGVMUWZ2R3pDVUVLK2dVQUZsSXVt?=
 =?utf-8?B?Uit3QmNGUW43Y084MGVIdjd0M2hxTXpyVCtWeUdHT014RjNYK005NzF6NUxh?=
 =?utf-8?B?Znc3b0M5aDI5cURUV1N3SW9zODduUGovY29yTERTcTM4Q0l1T3dVT3BFU2Zv?=
 =?utf-8?B?ZTBPdWMrWHF2eUFDZW5WTnN5YzZnL0FPeEVlTjZvbjg4dG5vaytjWVlneVlD?=
 =?utf-8?B?L3orTU5OQmc1R0VueE5kaHllTzZISVhxalU2dkNWMjZ5YWVDdW1rcjhid0tp?=
 =?utf-8?B?YXVic0drOTJKcHBET2psbDRiUzJENUVmcU9uSnhUc1RHT29iYVBTYmhFOTV0?=
 =?utf-8?B?eTVmMXdwaWhpYjFzQU1UMnRRanRENHNnN0ZFR2tWRklOcVB6MFFFM1g2NjI5?=
 =?utf-8?B?bkdmYTZ6MDNhb3JYbWFQd2dCSVQ4WE1oOTgwcS8rTll0Z2VFTnNtTDY2bkg3?=
 =?utf-8?B?Rnd3VVE4bHV4c29JM05zQzhSMFBueUpaY3BmUWJVdk0yS3R6dkduSlNETWg1?=
 =?utf-8?B?RkJTOVhGMjRPZmN5UTJ4V1R3QTdRZDc0VEQ2VjA2bVN5bXdGUUtjdmlsZ0Z5?=
 =?utf-8?Q?JcEjoLmJQ47OOpECP/sRUzs=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 658d0244-13ed-4b56-6584-08da001e1d45
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 09:37:36.9421
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: NFL9SGX3GzwKkLDUqZu43BNalXj/lDFDkIrxvmYGDFn0QnJXVcMqx8wdw5SEV4yuDNyTlWfC1zyf0BFHIvSdQg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0401MB2318

On 07.03.2022 10:17, Bjoern Doebel wrote:
> Xen enabled CET for supporting architectures. The control flow aspect of
> CET expects functions that can be called indirectly (i.e., via function
> pointers) to start with an ENDBR64 instruction. Otherwise a control flow
> exception is raised.
> 
> This expectation breaks livepatching flows because we patch functions by
> overwriting their first 5 bytes with a JMP + <offset>, thus breaking the
> ENDBR64. We fix this by checking the start of a patched function for
> being ENDBR64. In the positive case we move the livepatch JMP to start
> behind the ENDBR64 instruction.
> 
> To avoid having to guess the ENDBR64 offset again on patch reversal
> (which might race with other mechanisms adding/removing ENDBR
> dynamically), use the livepatch metadata to store the computed offset
> along with the saved bytes of the overwritten function.
> 
> Signed-off-by: Bjoern Doebel <doebel@amazon.de>
> CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
> CC: Ross Lagerwall <ross.lagerwall@citrix.com>
> 
> Note that on top of livepatching functions, Xen supports an additional
> mode where we can "remove" a function by overwriting it with NOPs. This
> is only supported for functions up to 31 bytes in size and this patch
> reduces this limit to 27 bytes.

Is this intended to be part of the description (then it should move up)
or a post-commit-message remark (then there should be a --- separator
ahead of it)?

> --- a/xen/arch/x86/livepatch.c
> +++ b/xen/arch/x86/livepatch.c
> @@ -14,11 +14,28 @@
>  #include <xen/vm_event.h>
>  #include <xen/virtual_region.h>
>  
> +#include <asm/endbr.h>
>  #include <asm/fixmap.h>
>  #include <asm/nmi.h>
>  #include <asm/livepatch.h>
>  #include <asm/setup.h>
>  
> +/*
> + * CET hotpatching support: We may have functions starting with an ENDBR64 instruction
> + * that MUST remain the first instruction of the function, hence we need to move any
> + * hotpatch trampoline further into the function. For that we need to keep track of the
> + * patching offset used for any loaded hotpatch (to avoid racing against other fixups
> + * adding/removing ENDBR64 or similar instructions).
> + *
> + * We do so by making use of the existing opaque metadata area. We use its first 4 bytes
> + * to track the offset into the function used for patching and the remainder of the data
> + * to store overwritten code bytes.
> + */

Style: Line length (also elsewhere).

> +struct __packed x86_livepatch_meta {
> +    int32_t patch_offset;

I was first going to suggest to use plain int here to comply with
./CODING_STYLE, but it looks like int8_t or uint8_t will do, leaving
more space for the insn. I'm also not convinced you really need the
__packed annotation. Furthermore, to avoid the need for casts,
simply using the ->opaque[] directly would look to be an option then
(with suitable #define-s to identify the two parts).

> @@ -104,11 +121,14 @@ void noinline arch_livepatch_revive(void)
>  
>  int arch_livepatch_verify_func(const struct livepatch_func *func)
>  {
> +    BUILD_BUG_ON(sizeof(struct x86_livepatch_meta) != LIVEPATCH_OPAQUE_SIZE);
> +
>      /* If NOPing.. */
>      if ( !func->new_addr )
>      {
> +        struct x86_livepatch_meta *lp = (struct x86_livepatch_meta*)func->opaque;

_If_ there is to remain a struct, please insert the missing blank before
the star (applicable elsewhere as well), and please separate declaration(s)
from statement(s) by a blank line.

> -        if ( func->new_size > sizeof(func->opaque) )
> +        if ( func->new_size > sizeof(lp->instruction) )

This being the only use of the new variable, I expect compilers to warn
about the variable being actually unused.


> @@ -127,15 +147,20 @@ int arch_livepatch_verify_func(const struct livepatch_func *func)
>  void noinline arch_livepatch_apply(struct livepatch_func *func)
>  {
>      uint8_t *old_ptr;
> -    uint8_t insn[sizeof(func->opaque)];
> +    struct x86_livepatch_meta *lp = (struct x86_livepatch_meta*)func->opaque;
> +    uint8_t insn[sizeof(lp->instruction)];
>      unsigned int len;
>  
> +    lp->patch_offset = 0;
>      old_ptr = func->old_addr;
>      len = livepatch_insn_len(func);
>      if ( !len )
>          return;
>  
> -    memcpy(func->opaque, old_ptr, len);
> +    if ( is_endbr64( old_ptr ) )

Style: No blanks inside the inner parentheses, please.

> @@ -159,7 +184,9 @@ void noinline arch_livepatch_apply(struct livepatch_func *func)
>   */
>  void noinline arch_livepatch_revert(const struct livepatch_func *func)
>  {
> -    memcpy(func->old_addr, func->opaque, livepatch_insn_len(func));
> +    struct x86_livepatch_meta *lp = (struct x86_livepatch_meta*)func->opaque;

const (if the variable was to remain in the first place).

Jan

> +    memcpy(func->old_addr + lp->patch_offset, lp->instruction, livepatch_insn_len(func));
>  }
>  
>  /*



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 09:51:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 09:51:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285757.485014 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRA1l-0001zy-JP; Mon, 07 Mar 2022 09:51:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285757.485014; Mon, 07 Mar 2022 09:51:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRA1l-0001zr-Eu; Mon, 07 Mar 2022 09:51:41 +0000
Received: by outflank-mailman (input) for mailman id 285757;
 Mon, 07 Mar 2022 09:51:40 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRA1j-0001zh-UL; Mon, 07 Mar 2022 09:51:39 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRA1j-00013L-MN; Mon, 07 Mar 2022 09:51:39 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRA1j-00069Z-7r; Mon, 07 Mar 2022 09:51:39 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRA1j-0004p1-7R; Mon, 07 Mar 2022 09:51:39 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=TntKthC3wZrmk+qUfRmvb2pmSjMivqfbYEkHBlSsAI0=; b=vglWAKw3BFzZGTj1X514XXRfXl
	ZQj2iNA9QikQZ3hKrWTerGZZfmMRzCMXUvI9AtGe+uYSiAZ+NXMVjWycuDXxV6mix/UetsOm9osXl
	GeqmyyIH2uk1LJviCGdGFKE1TTdxUFIUWeFNqmUxybF1lLJ7Jg2hD/t45rGEW6aRANbM=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168448-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168448: tolerable FAIL
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=1145d94c738ea13e0d2ceedb97a4cfe46292b08e
X-Osstest-Versions-That:
    xen=1145d94c738ea13e0d2ceedb97a4cfe46292b08e
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 07 Mar 2022 09:51:39 +0000

flight 168448 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168448/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168428
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168428
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168428
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168428
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168428
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168428
 test-armhf-armhf-xl-rtds     18 guest-start/debian.repeat    fail  like 168428
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168428
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168428
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168428
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168428
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168428
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168428
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  1145d94c738ea13e0d2ceedb97a4cfe46292b08e
baseline version:
 xen                  1145d94c738ea13e0d2ceedb97a4cfe46292b08e

Last test of basis   168448  2022-03-07 01:51:48 Z    0 days
Testing same since                          (not found)         0 attempts

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Published tested tree is already up to date.



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 09:52:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 09:52:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285766.485025 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRA2B-0002Ux-0r; Mon, 07 Mar 2022 09:52:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285766.485025; Mon, 07 Mar 2022 09:52:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRA2A-0002Uq-TD; Mon, 07 Mar 2022 09:52:06 +0000
Received: by outflank-mailman (input) for mailman id 285766;
 Mon, 07 Mar 2022 09:52:06 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRA2A-0002Ua-86; Mon, 07 Mar 2022 09:52:06 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRA2A-000146-7B; Mon, 07 Mar 2022 09:52:06 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRA29-00069x-Qf; Mon, 07 Mar 2022 09:52:05 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRA29-00059C-QE; Mon, 07 Mar 2022 09:52:05 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=6s1XCBRr6wRX2rvzpSgBsIRSZw+tGNnIT4ooVHM7Iz0=; b=wWDna6+bR62bY6+ptR72j4KLqV
	T98+QS29jHNjOJkJByArFPdIprMpuZhmwk46K9fIzBpozFAf6xQGX1XT1iV12OjVUOpShECD9tMlS
	AS/B47TmdCi28v5OBVlUak7QD36FqCdsHiD72KxeGMaC7ySzJRYgBtECdahvWDclElmQ=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168453-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168453: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=79f2734e5a7bc2e5256eb0e599f45407855159c7
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 07 Mar 2022 09:52:05 +0000

flight 168453 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168453/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 79f2734e5a7bc2e5256eb0e599f45407855159c7
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    6 days
Failing since        168258  2022-03-01 01:55:31 Z    6 days   65 attempts
Testing same since   168449  2022-03-07 02:15:20 Z    0 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 437 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 10:17:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 10:17:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285779.485035 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRAR0-0005Kg-4y; Mon, 07 Mar 2022 10:17:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285779.485035; Mon, 07 Mar 2022 10:17:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRAR0-0005KZ-21; Mon, 07 Mar 2022 10:17:46 +0000
Received: by outflank-mailman (input) for mailman id 285779;
 Mon, 07 Mar 2022 10:17:44 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=7T3K=TS=amazon.de=prvs=058ff0969=doebel@srs-se1.protection.inumbo.net>)
 id 1nRAQx-0005KT-Pt
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 10:17:44 +0000
Received: from smtp-fw-6001.amazon.com (smtp-fw-6001.amazon.com [52.95.48.154])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id cfb88f54-9dff-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 11:17:38 +0100 (CET)
Received: from iad12-co-svc-p1-lb1-vlan3.amazon.com (HELO
 email-inbound-relay-pdx-2b-31df91b1.us-west-2.amazon.com) ([10.43.8.6])
 by smtp-border-fw-6001.iad6.amazon.com with ESMTP; 07 Mar 2022 10:17:26 +0000
Received: from EX13D03EUC002.ant.amazon.com
 (pdx1-ws-svc-p6-lb9-vlan2.pdx.amazon.com [10.236.137.194])
 by email-inbound-relay-pdx-2b-31df91b1.us-west-2.amazon.com (Postfix) with
 ESMTPS id 4501B41586; Mon,  7 Mar 2022 10:17:25 +0000 (UTC)
Received: from [10.139.202.10] (10.43.166.70) by EX13D03EUC002.ant.amazon.com
 (10.43.164.60) with Microsoft SMTP Server (TLS) id 15.0.1497.28;
 Mon, 7 Mar 2022 10:17:23 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cfb88f54-9dff-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646648259; x=1678184259;
  h=message-id:date:mime-version:subject:to:cc:references:
   from:in-reply-to:content-transfer-encoding;
  bh=lOO+mrNgdxxzlKUNFdK/RdZAqXGFCUEeY9KD5oWuMgQ=;
  b=P5M+2VMloQAuzrpZ7MzXdU3RL9vjSKRELxV/fzl8njP6yGpDqfgu7JUb
   rVAYBk1cysaOgvFWm00tHLxbSdFqwBykVaovgUGCn1f+XwP8oWGOFwk67
   IaBVP/mhwJda1WJACAZHVAj7AKwRLSyhyuhDidx7tXpPwieL16RixVoC3
   g=;
X-IronPort-AV: E=Sophos;i="5.90,161,1643673600"; 
   d="scan'208";a="183629214"
Message-ID: <2aa0886c-9a62-dd29-644f-edb5b10a340c@amazon.de>
Date: Mon, 7 Mar 2022 11:17:22 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH] xen/x86: Livepatch: support patching CET-enhanced
 functions
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, Roger
 Pau Monne <roger.pau@citrix.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>, Ross Lagerwall
	<ross.lagerwall@citrix.com>, <xen-devel@lists.xenproject.org>
References: <fd56d3713b873bb00f7fca80e86ee7466057be3c.1646643967.git.doebel@amazon.de>
 <f9a608be-8aea-9116-fcd7-15a197073f8d@suse.com>
From: "Doebel, Bjoern" <doebel@amazon.de>
In-Reply-To: <f9a608be-8aea-9116-fcd7-15a197073f8d@suse.com>
X-Originating-IP: [10.43.166.70]
X-ClientProxiedBy: EX13D49EUC002.ant.amazon.com (10.43.164.112) To
 EX13D03EUC002.ant.amazon.com (10.43.164.60)
Precedence: Bulk
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: base64

CgpPbiAwNy4wMy4yMiAxMDozNywgSmFuIEJldWxpY2ggd3JvdGU6Cj4gQ0FVVElPTjogVGhpcyBl
bWFpbCBvcmlnaW5hdGVkIGZyb20gb3V0c2lkZSBvZiB0aGUgb3JnYW5pemF0aW9uLiBEbyBub3Qg
Y2xpY2sgbGlua3Mgb3Igb3BlbiBhdHRhY2htZW50cyB1bmxlc3MgeW91IGNhbiBjb25maXJtIHRo
ZSBzZW5kZXIgYW5kIGtub3cgdGhlIGNvbnRlbnQgaXMgc2FmZS4KPiAKPiAKPiAKPiBPbiAwNy4w
My4yMDIyIDEwOjE3LCBCam9lcm4gRG9lYmVsIHdyb3RlOgo+PiBYZW4gZW5hYmxlZCBDRVQgZm9y
IHN1cHBvcnRpbmcgYXJjaGl0ZWN0dXJlcy4gVGhlIGNvbnRyb2wgZmxvdyBhc3BlY3Qgb2YKPj4g
Q0VUIGV4cGVjdHMgZnVuY3Rpb25zIHRoYXQgY2FuIGJlIGNhbGxlZCBpbmRpcmVjdGx5IChpLmUu
LCB2aWEgZnVuY3Rpb24KPj4gcG9pbnRlcnMpIHRvIHN0YXJ0IHdpdGggYW4gRU5EQlI2NCBpbnN0
cnVjdGlvbi4gT3RoZXJ3aXNlIGEgY29udHJvbCBmbG93Cj4+IGV4Y2VwdGlvbiBpcyByYWlzZWQu
Cj4+Cj4+IFRoaXMgZXhwZWN0YXRpb24gYnJlYWtzIGxpdmVwYXRjaGluZyBmbG93cyBiZWNhdXNl
IHdlIHBhdGNoIGZ1bmN0aW9ucyBieQo+PiBvdmVyd3JpdGluZyB0aGVpciBmaXJzdCA1IGJ5dGVz
IHdpdGggYSBKTVAgKyA8b2Zmc2V0PiwgdGh1cyBicmVha2luZyB0aGUKPj4gRU5EQlI2NC4gV2Ug
Zml4IHRoaXMgYnkgY2hlY2tpbmcgdGhlIHN0YXJ0IG9mIGEgcGF0Y2hlZCBmdW5jdGlvbiBmb3IK
Pj4gYmVpbmcgRU5EQlI2NC4gSW4gdGhlIHBvc2l0aXZlIGNhc2Ugd2UgbW92ZSB0aGUgbGl2ZXBh
dGNoIEpNUCB0byBzdGFydAo+PiBiZWhpbmQgdGhlIEVOREJSNjQgaW5zdHJ1Y3Rpb24uCj4+Cj4+
IFRvIGF2b2lkIGhhdmluZyB0byBndWVzcyB0aGUgRU5EQlI2NCBvZmZzZXQgYWdhaW4gb24gcGF0
Y2ggcmV2ZXJzYWwKPj4gKHdoaWNoIG1pZ2h0IHJhY2Ugd2l0aCBvdGhlciBtZWNoYW5pc21zIGFk
ZGluZy9yZW1vdmluZyBFTkRCUgo+PiBkeW5hbWljYWxseSksIHVzZSB0aGUgbGl2ZXBhdGNoIG1l
dGFkYXRhIHRvIHN0b3JlIHRoZSBjb21wdXRlZCBvZmZzZXQKPj4gYWxvbmcgd2l0aCB0aGUgc2F2
ZWQgYnl0ZXMgb2YgdGhlIG92ZXJ3cml0dGVuIGZ1bmN0aW9uLgo+Pgo+PiBTaWduZWQtb2ZmLWJ5
OiBCam9lcm4gRG9lYmVsIDxkb2ViZWxAYW1hem9uLmRlPgo+PiBDQzogS29ucmFkIFJ6ZXN6dXRl
ayBXaWxrIDxrb25yYWQud2lsa0BvcmFjbGUuY29tPgo+PiBDQzogUm9zcyBMYWdlcndhbGwgPHJv
c3MubGFnZXJ3YWxsQGNpdHJpeC5jb20+Cj4+Cj4+IE5vdGUgdGhhdCBvbiB0b3Agb2YgbGl2ZXBh
dGNoaW5nIGZ1bmN0aW9ucywgWGVuIHN1cHBvcnRzIGFuIGFkZGl0aW9uYWwKPj4gbW9kZSB3aGVy
ZSB3ZSBjYW4gInJlbW92ZSIgYSBmdW5jdGlvbiBieSBvdmVyd3JpdGluZyBpdCB3aXRoIE5PUHMu
IFRoaXMKPj4gaXMgb25seSBzdXBwb3J0ZWQgZm9yIGZ1bmN0aW9ucyB1cCB0byAzMSBieXRlcyBp
biBzaXplIGFuZCB0aGlzIHBhdGNoCj4+IHJlZHVjZXMgdGhpcyBsaW1pdCB0byAyNyBieXRlcy4K
PiAKPiBJcyB0aGlzIGludGVuZGVkIHRvIGJlIHBhcnQgb2YgdGhlIGRlc2NyaXB0aW9uICh0aGVu
IGl0IHNob3VsZCBtb3ZlIHVwKQo+IG9yIGEgcG9zdC1jb21taXQtbWVzc2FnZSByZW1hcmsgKHRo
ZW4gdGhlcmUgc2hvdWxkIGJlIGEgLS0tIHNlcGFyYXRvcgo+IGFoZWFkIG9mIGl0KT8KCk1pc3Np
bmcgc2VwYXJhdG9yLiBXaWxsIGZpeCBhcyB3ZWxsIGFzIHlvdXIgc3R5bGUgY29tbWVudHMgYmVs
b3cuCgo+IAo+PiAtLS0gYS94ZW4vYXJjaC94ODYvbGl2ZXBhdGNoLmMKPj4gKysrIGIveGVuL2Fy
Y2gveDg2L2xpdmVwYXRjaC5jCj4+IEBAIC0xNCwxMSArMTQsMjggQEAKPj4gICAjaW5jbHVkZSA8
eGVuL3ZtX2V2ZW50Lmg+Cj4+ICAgI2luY2x1ZGUgPHhlbi92aXJ0dWFsX3JlZ2lvbi5oPgo+Pgo+
PiArI2luY2x1ZGUgPGFzbS9lbmRici5oPgo+PiAgICNpbmNsdWRlIDxhc20vZml4bWFwLmg+Cj4+
ICAgI2luY2x1ZGUgPGFzbS9ubWkuaD4KPj4gICAjaW5jbHVkZSA8YXNtL2xpdmVwYXRjaC5oPgo+
PiAgICNpbmNsdWRlIDxhc20vc2V0dXAuaD4KPj4KPj4gKy8qCj4+ICsgKiBDRVQgaG90cGF0Y2hp
bmcgc3VwcG9ydDogV2UgbWF5IGhhdmUgZnVuY3Rpb25zIHN0YXJ0aW5nIHdpdGggYW4gRU5EQlI2
NCBpbnN0cnVjdGlvbgo+PiArICogdGhhdCBNVVNUIHJlbWFpbiB0aGUgZmlyc3QgaW5zdHJ1Y3Rp
b24gb2YgdGhlIGZ1bmN0aW9uLCBoZW5jZSB3ZSBuZWVkIHRvIG1vdmUgYW55Cj4+ICsgKiBob3Rw
YXRjaCB0cmFtcG9saW5lIGZ1cnRoZXIgaW50byB0aGUgZnVuY3Rpb24uIEZvciB0aGF0IHdlIG5l
ZWQgdG8ga2VlcCB0cmFjayBvZiB0aGUKPj4gKyAqIHBhdGNoaW5nIG9mZnNldCB1c2VkIGZvciBh
bnkgbG9hZGVkIGhvdHBhdGNoICh0byBhdm9pZCByYWNpbmcgYWdhaW5zdCBvdGhlciBmaXh1cHMK
Pj4gKyAqIGFkZGluZy9yZW1vdmluZyBFTkRCUjY0IG9yIHNpbWlsYXIgaW5zdHJ1Y3Rpb25zKS4K
Pj4gKyAqCj4+ICsgKiBXZSBkbyBzbyBieSBtYWtpbmcgdXNlIG9mIHRoZSBleGlzdGluZyBvcGFx
dWUgbWV0YWRhdGEgYXJlYS4gV2UgdXNlIGl0cyBmaXJzdCA0IGJ5dGVzCj4+ICsgKiB0byB0cmFj
ayB0aGUgb2Zmc2V0IGludG8gdGhlIGZ1bmN0aW9uIHVzZWQgZm9yIHBhdGNoaW5nIGFuZCB0aGUg
cmVtYWluZGVyIG9mIHRoZSBkYXRhCj4+ICsgKiB0byBzdG9yZSBvdmVyd3JpdHRlbiBjb2RlIGJ5
dGVzLgo+PiArICovCj4gCj4gU3R5bGU6IExpbmUgbGVuZ3RoIChhbHNvIGVsc2V3aGVyZSkuCj4g
Cj4+ICtzdHJ1Y3QgX19wYWNrZWQgeDg2X2xpdmVwYXRjaF9tZXRhIHsKPj4gKyAgICBpbnQzMl90
IHBhdGNoX29mZnNldDsKPiAKPiBJIHdhcyBmaXJzdCBnb2luZyB0byBzdWdnZXN0IHRvIHVzZSBw
bGFpbiBpbnQgaGVyZSB0byBjb21wbHkgd2l0aAo+IC4vQ09ESU5HX1NUWUxFLCBidXQgaXQgbG9v
a3MgbGlrZSBpbnQ4X3Qgb3IgdWludDhfdCB3aWxsIGRvLCBsZWF2aW5nCj4gbW9yZSBzcGFjZSBm
b3IgdGhlIGluc24uIEknbSBhbHNvIG5vdCBjb252aW5jZWQgeW91IHJlYWxseSBuZWVkIHRoZQo+
IF9fcGFja2VkIGFubm90YXRpb24uIEZ1cnRoZXJtb3JlLCB0byBhdm9pZCB0aGUgbmVlZCBmb3Ig
Y2FzdHMsCj4gc2ltcGx5IHVzaW5nIHRoZSAtPm9wYXF1ZVtdIGRpcmVjdGx5IHdvdWxkIGxvb2sg
dG8gYmUgYW4gb3B0aW9uIHRoZW4KPiAod2l0aCBzdWl0YWJsZSAjZGVmaW5lLXMgdG8gaWRlbnRp
ZnkgdGhlIHR3byBwYXJ0cykuCgoqIEFncmVlIG9uIHRoZSB1aW50OF90LgoqIFRoZSBfX3BhY2tl
ZCB3YXMgbW9zdGx5IHRvIGJlIHJlYWxseSBzdXJlIHRoZXJlJ3Mgbm8gYWRkZWQgcGFkZGluZy4K
ICAgTGlrZWx5IHdpbGwgYmUgbmVlZGVkIG9uY2UgSSBjaGFuZ2UgdGhlIHR5cGUgZm9yIHRoZSBv
ZmZzZXQuCiogSSB0aGluayB1c2luZyBhbiBleHBsaWNpdCBzdHJ1Y3QgaXMgbW9yZSByZWFkYWJs
ZStjb21wcmVoZW5zaWJsZSB0aGFuCiAgIG1hZ2ljYWxseSBkZWZpbmluZyBtYWNyb3MgdG8gcmVp
bnRlcnByZXQgdGhlIG9wYXF1ZVtdIGFycmF5LCBzbyBJJ2QKICAgcHJlZmVyIHRoYXQuIE5vIGhh
cmQgZmVlbGluZ3MsIHRob3VnaC4KCj4+IEBAIC0xMDQsMTEgKzEyMSwxNCBAQCB2b2lkIG5vaW5s
aW5lIGFyY2hfbGl2ZXBhdGNoX3Jldml2ZSh2b2lkKQo+Pgo+PiAgIGludCBhcmNoX2xpdmVwYXRj
aF92ZXJpZnlfZnVuYyhjb25zdCBzdHJ1Y3QgbGl2ZXBhdGNoX2Z1bmMgKmZ1bmMpCj4+ICAgewo+
PiArICAgIEJVSUxEX0JVR19PTihzaXplb2Yoc3RydWN0IHg4Nl9saXZlcGF0Y2hfbWV0YSkgIT0g
TElWRVBBVENIX09QQVFVRV9TSVpFKTsKPj4gKwo+PiAgICAgICAvKiBJZiBOT1BpbmcuLiAqLwo+
PiAgICAgICBpZiAoICFmdW5jLT5uZXdfYWRkciApCj4+ICAgICAgIHsKPj4gKyAgICAgICAgc3Ry
dWN0IHg4Nl9saXZlcGF0Y2hfbWV0YSAqbHAgPSAoc3RydWN0IHg4Nl9saXZlcGF0Y2hfbWV0YSop
ZnVuYy0+b3BhcXVlOwo+IAo+IF9JZl8gdGhlcmUgaXMgdG8gcmVtYWluIGEgc3RydWN0LCBwbGVh
c2UgaW5zZXJ0IHRoZSBtaXNzaW5nIGJsYW5rIGJlZm9yZQo+IHRoZSBzdGFyIChhcHBsaWNhYmxl
IGVsc2V3aGVyZSBhcyB3ZWxsKSwgYW5kIHBsZWFzZSBzZXBhcmF0ZSBkZWNsYXJhdGlvbihzKQo+
IGZyb20gc3RhdGVtZW50KHMpIGJ5IGEgYmxhbmsgbGluZS4KPiAKPj4gLSAgICAgICAgaWYgKCBm
dW5jLT5uZXdfc2l6ZSA+IHNpemVvZihmdW5jLT5vcGFxdWUpICkKPj4gKyAgICAgICAgaWYgKCBm
dW5jLT5uZXdfc2l6ZSA+IHNpemVvZihscC0+aW5zdHJ1Y3Rpb24pICkKPiAKPiBUaGlzIGJlaW5n
IHRoZSBvbmx5IHVzZSBvZiB0aGUgbmV3IHZhcmlhYmxlLCBJIGV4cGVjdCBjb21waWxlcnMgdG8g
d2Fybgo+IGFib3V0IHRoZSB2YXJpYWJsZSBiZWluZyBhY3R1YWxseSB1bnVzZWQuCj4gCj4gCj4+
IEBAIC0xMjcsMTUgKzE0NywyMCBAQCBpbnQgYXJjaF9saXZlcGF0Y2hfdmVyaWZ5X2Z1bmMoY29u
c3Qgc3RydWN0IGxpdmVwYXRjaF9mdW5jICpmdW5jKQo+PiAgIHZvaWQgbm9pbmxpbmUgYXJjaF9s
aXZlcGF0Y2hfYXBwbHkoc3RydWN0IGxpdmVwYXRjaF9mdW5jICpmdW5jKQo+PiAgIHsKPj4gICAg
ICAgdWludDhfdCAqb2xkX3B0cjsKPj4gLSAgICB1aW50OF90IGluc25bc2l6ZW9mKGZ1bmMtPm9w
YXF1ZSldOwo+PiArICAgIHN0cnVjdCB4ODZfbGl2ZXBhdGNoX21ldGEgKmxwID0gKHN0cnVjdCB4
ODZfbGl2ZXBhdGNoX21ldGEqKWZ1bmMtPm9wYXF1ZTsKPj4gKyAgICB1aW50OF90IGluc25bc2l6
ZW9mKGxwLT5pbnN0cnVjdGlvbildOwo+PiAgICAgICB1bnNpZ25lZCBpbnQgbGVuOwo+Pgo+PiAr
ICAgIGxwLT5wYXRjaF9vZmZzZXQgPSAwOwo+PiAgICAgICBvbGRfcHRyID0gZnVuYy0+b2xkX2Fk
ZHI7Cj4+ICAgICAgIGxlbiA9IGxpdmVwYXRjaF9pbnNuX2xlbihmdW5jKTsKPj4gICAgICAgaWYg
KCAhbGVuICkKPj4gICAgICAgICAgIHJldHVybjsKPj4KPj4gLSAgICBtZW1jcHkoZnVuYy0+b3Bh
cXVlLCBvbGRfcHRyLCBsZW4pOwo+PiArICAgIGlmICggaXNfZW5kYnI2NCggb2xkX3B0ciApICkK
PiAKPiBTdHlsZTogTm8gYmxhbmtzIGluc2lkZSB0aGUgaW5uZXIgcGFyZW50aGVzZXMsIHBsZWFz
ZS4KPiAKPj4gQEAgLTE1OSw3ICsxODQsOSBAQCB2b2lkIG5vaW5saW5lIGFyY2hfbGl2ZXBhdGNo
X2FwcGx5KHN0cnVjdCBsaXZlcGF0Y2hfZnVuYyAqZnVuYykKPj4gICAgKi8KPj4gICB2b2lkIG5v
aW5saW5lIGFyY2hfbGl2ZXBhdGNoX3JldmVydChjb25zdCBzdHJ1Y3QgbGl2ZXBhdGNoX2Z1bmMg
KmZ1bmMpCj4+ICAgewo+PiAtICAgIG1lbWNweShmdW5jLT5vbGRfYWRkciwgZnVuYy0+b3BhcXVl
LCBsaXZlcGF0Y2hfaW5zbl9sZW4oZnVuYykpOwo+PiArICAgIHN0cnVjdCB4ODZfbGl2ZXBhdGNo
X21ldGEgKmxwID0gKHN0cnVjdCB4ODZfbGl2ZXBhdGNoX21ldGEqKWZ1bmMtPm9wYXF1ZTsKPiAK
PiBjb25zdCAoaWYgdGhlIHZhcmlhYmxlIHdhcyB0byByZW1haW4gaW4gdGhlIGZpcnN0IHBsYWNl
KS4KPiAKPiBKYW4KPiAKPj4gKyAgICBtZW1jcHkoZnVuYy0+b2xkX2FkZHIgKyBscC0+cGF0Y2hf
b2Zmc2V0LCBscC0+aW5zdHJ1Y3Rpb24sIGxpdmVwYXRjaF9pbnNuX2xlbihmdW5jKSk7Cj4+ICAg
fQo+Pgo+PiAgIC8qCj4gCj4gCgoKQmpvZXJuCgoKCkFtYXpvbiBEZXZlbG9wbWVudCBDZW50ZXIg
R2VybWFueSBHbWJICktyYXVzZW5zdHIuIDM4CjEwMTE3IEJlcmxpbgpHZXNjaGFlZnRzZnVlaHJ1
bmc6IENocmlzdGlhbiBTY2hsYWVnZXIsIEpvbmF0aGFuIFdlaXNzCkVpbmdldHJhZ2VuIGFtIEFt
dHNnZXJpY2h0IENoYXJsb3R0ZW5idXJnIHVudGVyIEhSQiAxNDkxNzMgQgpTaXR6OiBCZXJsaW4K
VXN0LUlEOiBERSAyODkgMjM3IDg3OQoKCg==



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 10:33:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 10:33:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285807.485065 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRAgG-0000GI-Ri; Mon, 07 Mar 2022 10:33:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285807.485065; Mon, 07 Mar 2022 10:33:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRAgG-0000GB-OY; Mon, 07 Mar 2022 10:33:32 +0000
Received: by outflank-mailman (input) for mailman id 285807;
 Mon, 07 Mar 2022 10:33:31 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRAgF-0000G0-Jm
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 10:33:31 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 07c30ff5-9e02-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 11:33:30 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2110.outbound.protection.outlook.com [104.47.17.110]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-6-Rs0uFRX9MVyep0Ihpmwfhw-1; Mon, 07 Mar 2022 11:33:28 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AS8PR04MB8754.eurprd04.prod.outlook.com (2603:10a6:20b:42d::8)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Mon, 7 Mar
 2022 10:33:27 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 10:33:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 07c30ff5-9e02-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646649209;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=GgbDyPoo8GQc0yETPpRZhJ3FGEFYKIVp1LBTWsa3RiE=;
	b=bU8tftTQqs8uosvWCgH0UrE0JLgRC450uXsarmhVrq5tc9YSl6EmtRPgx2iXG6Qayx0Xqv
	s1fIgOoE3X3+8ntD8NklKppU9q8bakUpCSkJf/76VZ5RwFFrplzRjlAfESxviEV8VXLUqF
	k7wIlUW3f17+35p3hmxpG2m79Azxce8=
X-MC-Unique: Rs0uFRX9MVyep0Ihpmwfhw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=gS0ppJAKBPCl0MLyPeQWBsGDXwZn2C6iDL8CnmkyNmkSeOjjEVK5QZlhZ1vq+n/RSrxX76LgQhUm6jVhQVDwo/qZP8aBepRwuwg96vcBeXzKCGtz0TsdwreeWqFasEvCqwoCwPsLZi22zJqFv/uDKiScZUWrIE5t9Kl7gyPJD/44l6coglMu2NofwO5eU22mTl5nGIXfuGZ2anPhUFab0IOKlR1j2Uss9soodlyCxmfKnTnzpzSOkqHuJ6F+JyXOhnEA9ig1/bLGlslomCwAfX/uzybEOefx+DkffIs7HfI9Br5gGH75mD+8HRhCVKRLm1En5bIh0Jc9II2PH7XlFw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=GgbDyPoo8GQc0yETPpRZhJ3FGEFYKIVp1LBTWsa3RiE=;
 b=jUnDwqMLDTfZVYIVwIDO5caQqUgA4v0dFc+PJ/YVWcl+pKyTaHrkmkkUGICXQgEN16HDtViteZxM8fB1ki4KZ0j9P8FQo/DdP0gTceSttEWLW0U1nyEXNqnIHZ6+E35r/uoZSnHUy1m2x9HeIxP2juqoz1SRJC/UjVHdbwSwxgIzfC+sShMud40bi5tAn2HLoSNJnDA/p+SSQU7Xq7XFw0SJC7CmR7tzNd6L5e0yEzMe/DRn3MCM+7XUDdJG6LOmxSThbnVt6oJGs6DUVpsysGcph9i+1Beyywef7cVZNg65g/XpVepWlX/t8OiIa4ZUtu1v9EHT9AELR9hxyKUj1A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <02856ef4-3cc9-b3c7-30e6-84a5d0037fcb@suse.com>
Date: Mon, 7 Mar 2022 11:33:28 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] xen/x86: Livepatch: support patching CET-enhanced
 functions
Content-Language: en-US
To: "Doebel, Bjoern" <doebel@amazon.de>
Cc: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>,
 Roger Pau Monne <roger.pau@citrix.com>,
 Andrew Cooper <Andrew.Cooper3@citrix.com>,
 Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
 Ross Lagerwall <ross.lagerwall@citrix.com>, xen-devel@lists.xenproject.org
References: <fd56d3713b873bb00f7fca80e86ee7466057be3c.1646643967.git.doebel@amazon.de>
 <f9a608be-8aea-9116-fcd7-15a197073f8d@suse.com>
 <2aa0886c-9a62-dd29-644f-edb5b10a340c@amazon.de>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <2aa0886c-9a62-dd29-644f-edb5b10a340c@amazon.de>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P193CA0045.EURP193.PROD.OUTLOOK.COM
 (2603:10a6:209:8e::22) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 6c885149-8231-4412-4d24-08da0025ea20
X-MS-TrafficTypeDiagnostic: AS8PR04MB8754:EE_
X-Microsoft-Antispam-PRVS:
	<AS8PR04MB8754C7961A8E3F5E61533FCDB3089@AS8PR04MB8754.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(38100700002)(31686004)(508600001)(86362001)(6486002)(54906003)(6916009)(36756003)(6506007)(66556008)(66946007)(4326008)(316002)(66476007)(8676002)(6512007)(186003)(26005)(53546011)(83380400001)(31696002)(8936002)(5660300002)(2616005)(2906002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?ekNVV0RvZlA3aXRVQmE4N3dpZ0c1YnBrcldqWWhrVGZnWXIwWklpTjV5T09C?=
 =?utf-8?B?L1pTRkhkdkpKbXJXYTFrWEc0OHU2b3FjY3d3QWphdWFueEhjdVJvRDE2WkRq?=
 =?utf-8?B?a2s1cXVBbUhjdVdMWVBnbHY4bnJGM1RvWHp2QUNBaTRWRWEyMGZFbmdISVZo?=
 =?utf-8?B?T1o4VCszY0xXamxzRlNyOFQzMUVPaXlLa0tRdTVmUHg3TDNuaEFOZUlGeDZ5?=
 =?utf-8?B?VldZTEgzMTdYcHkrVUlIbmZjZ20xWE54eEp4b1RVWFNtQ3lYOWVrQktTZjhT?=
 =?utf-8?B?VTNWOS9RS1BvWXhzMUZlQ3hIVjB5UXA2YWZqYnM4a1B1U0ZQUFRJTFphOGNq?=
 =?utf-8?B?VHlPbEJsOTdpUzRWbHFqTlZMWG5nZDBXQWZOVXc2OUI4anNLc2lpbjBZWVdw?=
 =?utf-8?B?QXJlcGdEdzZEZENTZzVSNkM5SzEwL1lvWUdVd2FVTkdsbXB4QjZkVElHdGFv?=
 =?utf-8?B?ZUNkZ1FLRUNXTkd2bkxJTmMvUzVXczFqZEpTQ0htTzBwaGE3UXNMeGtGbm1h?=
 =?utf-8?B?dHJkTlZjSXFvcFNGRDBkWjJSUitoNnF6eGF4SHBIRE9OOHh1TWRnN0Q3T1VX?=
 =?utf-8?B?b0gzcmkwSjJWWmxYQ1hvNThiVlplcmYzMXhHTDRwVUxabTBreGwwSnNZdmJm?=
 =?utf-8?B?eGxYU2F6SHFnM25aMDJQZUt0ZXhVQ0dWR0hoUS9zbHk4OVZGSzZaRWcybHNF?=
 =?utf-8?B?b2llUitrWVAvZXBJaXZKNTNsSm16NlBraUJsYXQ2MU5OOVNWQ0lQVVN6WTZm?=
 =?utf-8?B?L29WSnZZUDYvV2l6VE93RFhVbGV3ZGlKVVdWY3NTbG1jMXNqR1pibEZLUFhm?=
 =?utf-8?B?NlZyZ2R2bmdXZnp4SDBWc2YzL2hpcFgyMTZ6VHVzNDlSaWx0TlllYWd5OWxp?=
 =?utf-8?B?MTZyVEJQRzZYMm5qWUUrdC95VWlEVnkyNjgyMVhaLzIwaVRuWEVwK1k1VUZX?=
 =?utf-8?B?MWV6YW16bzg4ck9XalJMQW5zNjlQU3dwNHNxakdPNDc1ak56ZUlTTkc1cEkx?=
 =?utf-8?B?elZ4TTg5eWE0Z1VCYUx4QTJYU1Z0Tlp2aGh6QXA4Tkk0aHdWL0JaS1VzVkhw?=
 =?utf-8?B?MXY3NFJ3bzg4Mkp1WXR1R2FiQWwzcTc3SjUxMjZtak0vVnZUUEFJMXA3RU81?=
 =?utf-8?B?cVFSSUxzSlBORG0zdjI0bThGbzVCb0pOOFVtNkNDZmdPUUZOVkpLd0RqTWU2?=
 =?utf-8?B?bDA3Yk5UcS9EVjVyaEx6QVIwWHdzYmFneHVqUDJrbGNkbjBzRG5GTGdTdHlj?=
 =?utf-8?B?Ny9kYnhPS3o4b042NzZsVnF1VmthS0gzRkZTN201UXpNem53WkNiVzRmNHds?=
 =?utf-8?B?Qk5pdTJVWktONDY3WlRnMVQ5VU9wdmpRVmFJbGNYN0Nia3BLSzZzZkxPU05i?=
 =?utf-8?B?ZWxUSzU5WVJtUFJNRnlHNzdRVDJkY0M2R1RSdnhTbEx2bHNQNFhrTW5EL0pL?=
 =?utf-8?B?ekVUOWE3NXY4TjR0SWJJVWIvL0ZhMkl6eVVqZ0Y5b2lsRDdSNVNTQXpBaElz?=
 =?utf-8?B?UW5NVE1nREZiNUE5WDR4NWVDNWVnaDZmckU4cVlobjYrNzJBOGUrRGt5L05H?=
 =?utf-8?B?dVp2b0JhV3d3RjRHczBWSzR5aWtTS0xBMzN5MmY2U1hRd2NTdnFGOHljL29D?=
 =?utf-8?B?alZONTBieHBzQnZPQUovVXhDNlFPWnNIcjUvVy9yVVpCVEw0UzBxb0lOTGRI?=
 =?utf-8?B?WC9ZZVBYOEMxM1RXbGNnN2p6MzN6WVdiWS8vSmhtd0V6ZzJ1bS9nSXlYS3Rt?=
 =?utf-8?B?V2ZGSUhXNTNmYkF0UExkRXlLWWkwNjNmNjZUNWY3cW5zNlNobjh5Zkc5R3lq?=
 =?utf-8?B?WC9UNjdTMXNud3YvcDk0bGllbmtNWDMwTTFCREhWOVJub2ExWWJnckxQT2Z4?=
 =?utf-8?B?WFNtWkkxT0ZwaGRGN2dXQTBoSG45and4c0h6SytINzRwVXg3dXNIQjZyRGU0?=
 =?utf-8?B?ak5wQmtpUmNZRFBzdi9YNHcvb0FUVUlpVjJhMmJabW55ZGNhT2Ewb201RWZz?=
 =?utf-8?B?U3NMV2YrMXFlZFk4M0tEWlZUZVBKTWpYaUl3eCtvcWFyYVhqV2VGMVRRYStV?=
 =?utf-8?B?eEtLcEd4ZGplZk9iaUtXamkxTGNMSXRxQU52aUpzNDBVUnRwY05CNG9RSWVx?=
 =?utf-8?B?RUc1VEJWUXFIMFhkZE5Ma25qZml6L2svQ09nRkNad0s5Zyt5ekMraittZlpi?=
 =?utf-8?Q?qsliRBls3X5i6ZPEG5jEp3U=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6c885149-8231-4412-4d24-08da0025ea20
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 10:33:27.0621
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: TUToglIEvKSdcaiXwvyz0URW0MQ2hpuy5wj20eHHcdi2tHfGsXhtDN6BC5LoUS1g6/6SBiIv5rl2M1yL+JOU4Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR04MB8754

On 07.03.2022 11:17, Doebel, Bjoern wrote:
> On 07.03.22 10:37, Jan Beulich wrote:
>> On 07.03.2022 10:17, Bjoern Doebel wrote:
>>> --- a/xen/arch/x86/livepatch.c
>>> +++ b/xen/arch/x86/livepatch.c
>>> @@ -14,11 +14,28 @@
>>>   #include <xen/vm_event.h>
>>>   #include <xen/virtual_region.h>
>>>
>>> +#include <asm/endbr.h>
>>>   #include <asm/fixmap.h>
>>>   #include <asm/nmi.h>
>>>   #include <asm/livepatch.h>
>>>   #include <asm/setup.h>
>>>
>>> +/*
>>> + * CET hotpatching support: We may have functions starting with an ENDBR64 instruction
>>> + * that MUST remain the first instruction of the function, hence we need to move any
>>> + * hotpatch trampoline further into the function. For that we need to keep track of the
>>> + * patching offset used for any loaded hotpatch (to avoid racing against other fixups
>>> + * adding/removing ENDBR64 or similar instructions).
>>> + *
>>> + * We do so by making use of the existing opaque metadata area. We use its first 4 bytes
>>> + * to track the offset into the function used for patching and the remainder of the data
>>> + * to store overwritten code bytes.
>>> + */
>>
>> Style: Line length (also elsewhere).
>>
>>> +struct __packed x86_livepatch_meta {
>>> +    int32_t patch_offset;
>>
>> I was first going to suggest to use plain int here to comply with
>> ./CODING_STYLE, but it looks like int8_t or uint8_t will do, leaving
>> more space for the insn. I'm also not convinced you really need the
>> __packed annotation. Furthermore, to avoid the need for casts,
>> simply using the ->opaque[] directly would look to be an option then
>> (with suitable #define-s to identify the two parts).
> 
> * Agree on the uint8_t.
> * The __packed was mostly to be really sure there's no added padding.
>    Likely will be needed once I change the type for the offset.
> * I think using an explicit struct is more readable+comprehensible than
>    magically defining macros to reinterpret the opaque[] array, so I'd
>    prefer that. No hard feelings, though.

While I agree on the readable/comprehensible aspect, casts - in particular
such as used here - come with a risk. But it'll be up to the maintainers
to judge anyway.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 11:02:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 11:02:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285820.485075 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRB7k-0003hm-5f; Mon, 07 Mar 2022 11:01:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285820.485075; Mon, 07 Mar 2022 11:01:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRB7k-0003hf-2i; Mon, 07 Mar 2022 11:01:56 +0000
Received: by outflank-mailman (input) for mailman id 285820;
 Mon, 07 Mar 2022 11:01:55 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRB7j-0003hV-Ib; Mon, 07 Mar 2022 11:01:55 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRB7j-0002Jh-GE; Mon, 07 Mar 2022 11:01:55 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRB7j-00085Y-8d; Mon, 07 Mar 2022 11:01:55 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRB7j-0001Wj-8C; Mon, 07 Mar 2022 11:01:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=k0AJ+fBndvhYUbriftPD1INhOetQU0TTVKkx+h5VpHo=; b=n65o29fApWpjDlMbpVQm383lO8
	sTS7ZM1Kv/6Ygd40VdZqsL5qe/d0h1+Volqf+WlH4RM2+e/kXJvtLjeqbPjTAvjUaijKgC/7CFfCK
	bAKhOkPQ8pOzxKgfezV1Qx4z/w5ADbFsx78KeLRsMXUxbs1YcYh1TZIzjH9fzGDR5llg=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168455-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168455: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=79f2734e5a7bc2e5256eb0e599f45407855159c7
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 07 Mar 2022 11:01:55 +0000

flight 168455 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168455/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 79f2734e5a7bc2e5256eb0e599f45407855159c7
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    7 days
Failing since        168258  2022-03-01 01:55:31 Z    6 days   66 attempts
Testing same since   168449  2022-03-07 02:15:20 Z    0 days    4 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 437 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 11:06:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 11:06:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285832.485087 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRBCG-0004UY-SC; Mon, 07 Mar 2022 11:06:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285832.485087; Mon, 07 Mar 2022 11:06:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRBCG-0004UR-OM; Mon, 07 Mar 2022 11:06:36 +0000
Received: by outflank-mailman (input) for mailman id 285832;
 Mon, 07 Mar 2022 11:06:35 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+gfv=TS=citrix.com=prvs=0582ef7ee=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRBCE-0004UL-Ui
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 11:06:35 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a3820ee2-9e06-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 12:06:32 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a3820ee2-9e06-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646651192;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=4jiTWFzfg+Hof24nySxLLbYj+1Se52/xC+gnTX+UC5I=;
  b=TSv7VUecLmfXK/HwyScZJhxNKd1q69aX+pCfvyYLxFWnJQdVN7QyT7qV
   QmJvE5DGFn/iecYSxe7mtVOJ4W4unDggVsBN2b2ztaQK/vHbq7FTTzXcX
   R130YJhpKN7GjxG46vI8s0QyV1c+HovOJ4Uvuk195iGCd6EZdru9x+yvR
   A=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65596249
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:UG6qWapr+ytH8hoRH02YjoFt8LdeBmIaZRIvgKrLsJaIsI4StFCzt
 garIBmHO/2DM2H0Kop0YIq+8xhSvZCGzIQxTgRv+381Qi8UpJuZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 Yyq+aUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBGYzpnMkBawJiGixlIbYbxI/JPFe7rpnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVI1zbWAOxgWZnea67L+cVZzHE7gcUm8fP2O
 ZdEOGQ1MEWojxtnHks9L8oOzOiUomTVKwNfkmKanZcb7D2GpOB2+Oe0a4eEEjCQfu1Kmm6Iq
 2SA+H72ajkKOdraxTeb/3aEgu7UgTi9SI8UDKe/9PNhnBuU3GN7IB8cWEa/oPK5olWjQN8ZI
 EsRkhfCtoBrqhbtFIOkGUTl/jjU5XbwRua8DcUdySSJ57bs+DyQC3MYVWN9WNI7m8spEGlCO
 kCyo/vlAjlmsbuwQH2b96uJoT7aBRX5PVPudgdfE1JbvoCLTJUby0uWE409SPLdYsjdRGmoq
 w1muhTSkFn6YSQj86ygtW7KjDu3znQiZl5kv16HNo5JA+4QWWJEW2BKwQWBhRqjBNzAJrVkg
 JTjs5LChN3i9bnXyESwrBwlRdlFHcqtPjzGmkJIFJI87Tmr8HPLVdkOvG8jdRkxbZ1UKWOBj
 KrvVeR5vsM7AZdXRfUvP9LZ5zoCl8AM6ugJptiLN4ETM/CdhSeM/T10ZF744oweuBNErE3LA
 r/CKZzEJS9DUcxPlWPqL89Age5D7n1vngv7GMGkpylLJJLDPRZ5v59eawDQBg34hYvZyDjoH
 yF3bJPbm00CC7SlOkE6M+c7dDg3EJTyPrivw+R/fe+fOAt2XmYnDv7a27Q6fIJ52a9Sk4/1E
 ruVACe0FHKXaaX7FDi3
IronPort-HdrOrdr: A9a23:VtSbWq0OJvEWVc96G3uYfgqjBVByeYIsimQD101hICG9Lfb2qy
 n+ppgmPEHP5Qr5OEtApTiBUJPwJk800aQFm7X5Wo3SITUO2VHYV72KiLGN/9SOIVydygcw79
 YET0E6MqyNMbEYt7eK3ODbKadY/DDvysnB7o2/vhRQpENRGtldBm9Ce3im+yZNNW977PQCZf
 6hDp0tnUveRZ1bVLXyOlA1G8z44/HbnpPvZhALQzYh9Qm1lDutrJr3CQKR0BsyWy5Ghe5Kyx
 mOryXJooGY992rwB7V0GHeq7xQhdva09NGQOiBkNIcJDnAghuhIK5hR7qBljYop/zH0idgrP
 D85zMbe+hj4XLYeW+45TPrxgnbyT4rr0TvzFeJ6EGT1vDRdXYfMY5slIhZehzW5w4Lp9dnyp
 9G2Gqfqt5+EQ7AtD6V3amGazha0m6P5VYym+8aiHJSFaEEbqVKkIAZ9ERJVL8dASPB7pw9Gu
 UGNrCR2B9vSyLaU5nlhBgu/DT1NU5DXStuA3Jy9/B96gIm0kyQlCAjtY4idnRpzuNId3AL3Z
 WADk1SrsA8ciYnV9MMOA4/e7rENoXse2O7DIvAGyWvKEk4U0i93qIfpo9FoN2XRA==
X-IronPort-AV: E=Sophos;i="5.90,162,1643691600"; 
   d="scan'208";a="65596249"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=MKC6AIlGlg6jl2piluRSMvFav30H45VdiAncc0qBwSxMWHkbVypqMWZSou6V2E2MuG69VKz1OEuQhB4AUyek94F2cNilBzfvB+YHrbmYEUqfqZ2mATNf5heUws/ZAadFHuLtsnMo4SNTDfK9b7hUiXbOPsHZ62Rav6pfEl8yUgpp2t8vtZySSd84tVDDKuOu3XD1nMmumr1JmQusidqAeF5+LpsQ8Fv4YrWqdTke2YDdG3lsmGI+H7aRuLVXxV3C4oc9RbY9ThIVf1r8HhEtbsoTqiZ0M25ZoGmjeetEfiOkyESrh8qQfg7MT8SLWzYA2Qn3XfwZan5mKo5htqC/pw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Zm398PVYfwhoOOx5KbPcWKDdvz31L6nypnsbIg8q0q8=;
 b=fl48AGHiIR3bx0t06CbLXIyOTN4TlHLY4gCFpIlNJHt9tw4PmZNUSek4RfvnOGJPHqrQ4Y1liYfXQkSK+x7iQd+psT0/X+ifiv4WzhlFS+h5Kd8cSycuf6sWriSPMV0tfZN8DGcEpRX6g6Wsw3NtGt46uis/BvHhO7Lb8PT2GMz3WefoUpClhT/PBnkj1crRQvzx5HWULbtAjRuTvYx/9HHEdt1To9ipcK9v8TgVBozCet/LFK6y3V+L9AO2v9N83Si9kqgyVe9RxxJ3X1mkBqh0ZdspENeJkO03ZkJXQz6vE80ITRhBznDuLDiDXCJlQh6zqI/843sduXH9fulJVA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Zm398PVYfwhoOOx5KbPcWKDdvz31L6nypnsbIg8q0q8=;
 b=rPJQ5rkDBlmnbtm/3vI+UAGivBFg2PdMP/CTlAkwggiXgENxzevUsP89SkzZ3iZeNDPejBVlEa/MHq0XjdMRRsKqY6pbRTEaeiyYo7xY+21w2NdMpMaj1xpAU1F0duC0GdiqJsx4cHrwpIPGs6G3mB3F6XMAT7OMlaI+yPJs6es=
Date: Mon, 7 Mar 2022 12:06:18 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Andrew
 Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH] x86/build: use --orphan-handling linker option if
 available
Message-ID: <YiXnKvqX1FGyhzmy@Air-de-Roger>
References: <5c374fd3-017d-3c40-4ded-25a3b1c978a6@suse.com>
 <YiCkUebvg0gaBm4/@Air-de-Roger>
 <3c335ca5-63e3-6389-cba5-b9047a4ce3b9@suse.com>
 <YiDaQY1ToO8G2QYd@Air-de-Roger>
 <abd691c8-9c7e-40d7-3f18-d96f826b8539@suse.com>
 <YiHZpmrYt+QvE7ex@Air-de-Roger>
 <2ebf82d3-3509-7224-6537-acdaad34dcf2@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <2ebf82d3-3509-7224-6537-acdaad34dcf2@suse.com>
X-ClientProxiedBy: LO4P265CA0052.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:2ac::15) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 60d0e498-2c9c-4dcd-1995-08da002a84b1
X-MS-TrafficTypeDiagnostic: BN8PR03MB4995:EE_
X-Microsoft-Antispam-PRVS: <BN8PR03MB4995DA9F181EE9495411F4AB8F089@BN8PR03MB4995.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(508600001)(6506007)(53546011)(8936002)(66946007)(5660300002)(86362001)(6666004)(9686003)(6486002)(2906002)(6512007)(186003)(26005)(8676002)(4326008)(66476007)(966005)(38100700002)(82960400001)(85182001)(316002)(54906003)(33716001)(6916009)(83380400001)(66556008);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?V2dBY1hPSDE0QzMrY3kzTHBjSFNjZVhPL2NlaW85ZktiaHJJcld5c2xFUlZW?=
 =?utf-8?B?V2MrNmJqNUlpYVJwUGZQd0NFRWhSVTJ2UFZvV0VvdGxBRFF1OTVrQnV3N3FB?=
 =?utf-8?B?MzdCTXdsSFlCWFQ3Y2ROWnR2RzFLZWxWYVhUNmZGWnBKb1VOLzMyRzhxWjQy?=
 =?utf-8?B?RDRFVkxkZkRDLzg3SW9ETlVZZDNXZjhqditzcGdPbVROTGp2WXJsS243ZEpE?=
 =?utf-8?B?V0g1S3lqT05sSGhJOStPK1hrYzRsWENYdkJDemJWY1NqQXkvRlh3R29ZVm9F?=
 =?utf-8?B?OHh1YVJ2bXZtOWlxSmFIYXFZZjg0VlgvaGJvV0ZaZldTSXVFbVpza1liNnZ3?=
 =?utf-8?B?NFIzdXNmZHdsczZFL21tT3U0Z2h3ZTVPdjZJWnd4MEtkNExTUWRpc25rTm5L?=
 =?utf-8?B?THIrUXNGWkUyOEdTNGx5cWRrNGhIYmlvaDlIcDBYWSsxR0RrTTJGTTluNkw1?=
 =?utf-8?B?QkU2NEVFblFIY2YvVGk4SEJ4Rko0RGhPZUp3aE9kTTZtZkFzdmN4MWpUN1Rm?=
 =?utf-8?B?NG5WWkNteEg4MnBlYkNrQklBZEhzQU9XN2kycXJjd1FiUnRta29KcHcxS3Ro?=
 =?utf-8?B?N3dFTlpndVQ4cVdQME1wcmhHOFIzMWRZL2ROcmtxVmdBRUNUajlCZGEwTlBM?=
 =?utf-8?B?VFhyQ1RCeW5jbFYvbkhOaVpMRmt6M2RjbmpTTjUyMktSWE5Pb0RBZlBRa2Nn?=
 =?utf-8?B?K1JHRjlPY2J5TVFWUmhnMHRZTnRUUyt3UmpBaVNjaWhBakVQYWozejFIczJl?=
 =?utf-8?B?Q1BQTmRtcWMrbTVPYytZcy8yMXNUa25ZWHg4U1ZUNXB4czl0V01JeFNMNjI2?=
 =?utf-8?B?c2VIYTRrTUxCUjY1eGZ6M2FpQWppVThLcjFBL21GSjlneHBpSFZXVTVNOXph?=
 =?utf-8?B?dUhlTUQ3Q1kvK3ZUZW1yT3g1Y1hpVHhPU21UMGsxOEZuTTY0TDhHSENIT2No?=
 =?utf-8?B?VExnYnkzSW5KRzFKZFlEU3BLaWJYTFpDTTZPMUdicmRCb2RDUVcwam41OEt1?=
 =?utf-8?B?QW5UYkRRUGZsMmU4QnJlbm1jalhGb1J1bEp4d0JCWjArem53UjBjN2dTOEtZ?=
 =?utf-8?B?UXJ4KzVSd2wwdHNxTC83SVRxNmc1cnViMUVPNmRRMXR1U3hKa3dKNmtaMUxt?=
 =?utf-8?B?emtsejFvQWdGaHpWVUVNdFVYQTRKSWhQT3IyU0NWZzNLa2RoVWhhWERrVklH?=
 =?utf-8?B?cUJSaDFndVZMTHNFY1VqcmhGOUljY2pCQk5KRnpuMmJFazF5MWs2YWJiOXFM?=
 =?utf-8?B?NzN0aVdpV0dpL0QvVHYxYUdRdG9tZ3FPSUcwOFBUa2gxQzNSV0pFWEM5bHRG?=
 =?utf-8?B?NFpSZndPQWVvSjFBbTNwSDZjMGFLT1UvSVFnRWQ4WFNXdHI0aS9XYm5lMm5m?=
 =?utf-8?B?TlZRckNPeUxLTHdwK05JdGRJNW5KRnliYVRTRm5XT0tlQkpqWXVUeEtTMGVQ?=
 =?utf-8?B?ejBURWRmRWd6bWpDdEhBZy9wbVZqQzh5ZlF1YjNQSzBqTXhFZk9HODNtNTlU?=
 =?utf-8?B?eXhXU1JrZjVKalBLaE42OUpScm1iZUlqK1EwbDNDSlRnS1JON0pqbURZNmp3?=
 =?utf-8?B?UTRsTGJ2WEFEMDg0cDZlbHFUcUQreThrMGdXVVM4ejRLM09JMm43cEp6TmFi?=
 =?utf-8?B?aGtySzFhM0Jrcm5NR1NudUxRUnFmMk96RUNVaVdzd2pEK1lydUtVNlBSNVMr?=
 =?utf-8?B?WUc3ZWtOejFDbFkrOGZ5VmJhRzV0S0xNck1EVzk0a1ROeVNtaXRkRXlESWlX?=
 =?utf-8?B?NTlIcUJvR29HR0c2blNucDlkekFHaFRqdXF2VDZlM0IreVF3T2FkZVRUUHpn?=
 =?utf-8?B?T096c0ZDL3JvUGkzSWlRbU9Jc0JKYkt1d21pVldNSFlnSVFxaDlERE1BaGRs?=
 =?utf-8?B?dlhPbURncEJQZHJJbUh4YUxOT0liR3lRbjNBVm1vVVBOQWFvMThLYzdnb1NB?=
 =?utf-8?B?UXpuTTBlOWlCeGtwMEJ5YW9PZlJscTR2ZHNITVJSdTI5eEtJVWVLSHcyZzlt?=
 =?utf-8?B?LzRhRi95TUN5ZHFmc0JCUHB2Q3ZwYnpiTytyalduVlNPYXdHYmhDSlg2V2hs?=
 =?utf-8?B?a3ZpeUpuTWxENVlpd3NPL0hMQ3VYYmErQU1tWWh0bVZoTXhwVEdjeERxUWxw?=
 =?utf-8?B?YW9Sd21lUU1yeDFtL2xuc2NWN1VVRzlnNkwxOEk3SWg3Qm9WeGNBSXZXRVpJ?=
 =?utf-8?Q?J4OEPRk2QPy4myOBsrD2QXw=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 60d0e498-2c9c-4dcd-1995-08da002a84b1
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 11:06:24.2890
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: kvHyBzwtmbkbjHd8uRaFHGuWCampEBBLSY/tACLRP5wEf7omxmGkC/dcr44ZxCCqXAt8pxZjC787DixmGXgU4Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN8PR03MB4995
X-OriginatorOrg: citrix.com

On Mon, Mar 07, 2022 at 09:18:42AM +0100, Jan Beulich wrote:
> On 04.03.2022 10:19, Roger Pau Monné wrote:
> > On Fri, Mar 04, 2022 at 09:02:08AM +0100, Jan Beulich wrote:
> >> On 03.03.2022 16:09, Roger Pau Monné wrote:
> >>> On Thu, Mar 03, 2022 at 01:17:03PM +0100, Jan Beulich wrote:
> >>>> On 03.03.2022 12:19, Roger Pau Monné wrote:
> >>>>> On Wed, Mar 02, 2022 at 03:19:35PM +0100, Jan Beulich wrote:
> >>>>>> As was e.g. making necessary 4b7fd8153ddf ("x86: fold sections in final
> >>>>>> binaries"), arbitrary sections appearing without our linker script
> >>>>>> placing them explicitly can be a problem. Have the linker make us aware
> >>>>>> of such sections, so we would know that the script needs adjusting.
> >>>>>>
> >>>>>> To deal with the resulting warnings:
> >>>>>> - Retain .note.* explicitly for ELF, and discard all of them (except the
> >>>>>>   earlier consumed .note.gnu.build-id) for PE/COFF.
> >>>>>> - Have explicit statements for .got, .plt, and alike and add assertions
> >>>>>>   that they're empty. No output sections will be created for these as
> >>>>>>   long as they remain empty (or else the assertions would cause early
> >>>>>>   failure anyway).
> >>>>>> - Collect all .rela.* into a single section, with again an assertion
> >>>>>>   added for the resulting section to be empty.
> >>>>>> - Extend the enumerating of .debug_* to ELF. Note that for Clang adding
> >>>>>>   of .debug_macinfo is necessary. Amend this by its Dwarf5 counterpart,
> >>>>>>   .debug_macro, then as well (albeit more may need adding for full
> >>>>>>   coverage).
> >>>>>>
> >>>>>> Suggested-by: Roger Pau Monné <roger.pau@citrix.com>
> >>>>>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
> >>>>>> ---
> >>>>>> I would have wanted to make this generic (by putting it in
> >>>>>> xen/Makefile), but the option cannot be added to LDFLAGS, or else
> >>>>>> there'll be a flood of warnings with $(LD) -r. (Besides, adding to
> >>>>>> LDFLAGS would mean use of the option on every linker pass rather than
> >>>>>> just the last one.)
> >>>>>>
> >>>>>> Retaining of .note in xen-syms is under question. Plus if we want to
> >>>>>> retain all notes, the question is whether they wouldn't better go into
> >>>>>> .init.rodata. But .note.gnu.build-id shouldn't move there, and when
> >>>>>> notes are discontiguous all intermediate space will also be assigned to
> >>>>>> the NOTE segment, thus making the contents useless for tools going just
> >>>>>> by program headers.
> >>>>>>
> >>>>>> Newer Clang may require yet more .debug_* to be added. I've only played
> >>>>>> with versions 5 and 7 so far.
> >>>>>>
> >>>>>> Unless we would finally drop all mentioning of Stabs sections, we may
> >>>>>> want to extend to there what is done for Dwarf here (allowing the EFI
> >>>>>> conditional around the section to also go away).
> >>>>>>
> >>>>>> See also https://sourceware.org/pipermail/binutils/2022-March/119922.html.
> >>>>>
> >>>>> LLD 13.0.0 also warns about:
> >>>>>
> >>>>> ld: warning: <internal>:(.symtab) is being placed in '.symtab'
> >>>>> ld: warning: <internal>:(.shstrtab) is being placed in '.shstrtab'
> >>>>> ld: warning: <internal>:(.strtab) is being placed in '.strtab'
> >>>>>
> >>>>> So seeing your mail where you mention GNU ld not needing those, I
> >>>>> think we would need to add them anyway for LLVM ld.
> >>>>
> >>>> Hmm, that's ugly. How do I recognize LLVM ld? I can't simply use a
> >>>> pre-processor conditional keying off of __clang__, as that used as the
> >>>> compiler doesn't mean their ld is also in use (typically the case on
> >>>> Linux).
> >>>
> >>> Hard to tell, `ld -v` for LLD will typically contain '^LLD' I think,
> >>> but I don't really like matching on human readable output like this.
> >>
> >> Same here. But Linux'es ld-version.sh looks to be doing just that.
> > 
> > OK, so be it then. We can always improve afterwards, as I don't really
> > have any better suggestion ATM.
> > 
> >>>> I also don't want to add these uniformly, for now knowing what
> >>>> side effects their mentioning might have with GNU ld.
> >>>
> >>> Wouldn't it be fine to just place them at the end, just like it's
> >>> done by default by ld?
> >>>
> >>> Are you worried about not getting the proper type if mentioned in the
> >>> linker script?
> >>
> >> I'm worried of about any kind of anomaly that could be caused by
> >> mentioning sections which a linker doesn't expect to be named in
> >> a script. That's hardly something they would even test their
> >> linkers against.
> > 
> > I've raised a bug with LLD:
> > 
> > https://github.com/llvm/llvm-project/issues/54194
> > 
> > To see whether this behavior is intended.

Got a reply back from the LLD folks, and they consider the GNU ld
behavior quirky. Linux linker script does explicitly mention .symtab,
.strtab and shstrtab:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a840c4de56

So Xen should be safe to do the same.

> >>>>>> --- a/xen/arch/x86/Makefile
> >>>>>> +++ b/xen/arch/x86/Makefile
> >>>>>> @@ -120,6 +120,8 @@ syms-warn-dup-y := --warn-dup
> >>>>>>  syms-warn-dup-$(CONFIG_SUPPRESS_DUPLICATE_SYMBOL_WARNINGS) :=
> >>>>>>  syms-warn-dup-$(CONFIG_ENFORCE_UNIQUE_SYMBOLS) := --error-dup
> >>>>>>  
> >>>>>> +orphan-handling-$(call ld-option,--orphan-handling=warn) += --orphan-handling=warn
> >>>>>
> >>>>> Might be better to place in xen/Kconfig with the CC checks?
> >>>>
> >>>> Well. I've tried to stay away from complaining if people introduce
> >>>> new tool chain capability checks in Kconfig. But I'm not going to
> >>>> add any myself (unless things would become really inconsistent) up
> >>>> and until we have actually properly discussed the upsides and
> >>>> downsides of either model. Doing this via email (see the "Kconfig
> >>>> vs tool chain capabilities" thread started in August 2020) has
> >>>> proven to not lead anywhere. I'm really hoping that we can finally
> >>>> sort this in Bukarest.
> >>>>
> >>>>> I'm also wondering whether we could add the flag here into XEN_LDFLAGS
> >>>>> and EFI_LDFLAGS, as those options are only used together with the
> >>>>> linker script in the targets on the Makefile.
> >>>>
> >>>> Not for XEN_LDFLAGS at least, and undesirable for EFI_LDFLAGS. See
> >>>> the respective post-commit message remark.
> >>>
> >>> But the calls to LD in order to generate $(TARGET)-syms do not use -r,
> >>> and are all using the linker script, so it should be fine to use
> >>> --orphan-handling=warn there?
> >>
> >> But XEN_LDFLAGS is also used elsewhere together with -r. (Whether
> >> that's actually correct is a different question.)
> >>
> >>> Could we do something like:
> >>>
> >>> $(TARGET)-syms: XEN_LDFLAGS += ...
> >>>
> >>> And similar for $(TARGET).efi?
> >>
> >> Yes, this ought to be possible, but would again lead to the option
> >> being passed on all three linking stages instead of just the final
> >> one. When there are many warnings (e.g. because of the same kind of
> >> section appearing many times), it's not helpful to see the flood
> >> three times (or likely even six times, once for xen-syms and once
> >> for xen.efi).
> > 
> > OK, I think our build system is already quite chatty, so wouldn't
> > really care about seeing repeated messages there. We can find a way to
> > generalize passing options to the final linker step if/when we need to
> > add more.
> > 
> > I'm fine with doing the LLD fixup as a separate patch, so:
> > 
> > Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>
> 
> Thanks. However, something is wrong here. Unlike in my local builds, the
> pre-push build test I did after committing this triggered a massive amount
> (tens of thousands) of objdump warnings:
> 
> CU at offset ... contains corrupt or unsupported version number: 0
> Invalid pointer size (0) in compunit header, using 4 instead

That's weird, I wasn't aware we had any objdump calls after the final
image is linked.

> Helpfully it doesn't say whether that's xen-syms, xen-efi, or both. I'll
> have to investigate and fix; I can only guess at this point that this
> might be triggered by a difference in .config, or be hidden by some
> other change I have in my local tree.

Hm, I didn't see any of those when doing my test build on FreeBSD, but
didn't check with gcc.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 11:20:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 11:20:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285838.485098 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRBPl-0006p9-2t; Mon, 07 Mar 2022 11:20:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285838.485098; Mon, 07 Mar 2022 11:20:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRBPk-0006p2-W8; Mon, 07 Mar 2022 11:20:32 +0000
Received: by outflank-mailman (input) for mailman id 285838;
 Mon, 07 Mar 2022 11:20:31 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRBPj-0006ow-5t
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 11:20:31 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 96cc2769-9e08-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 12:20:27 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2106.outbound.protection.outlook.com [104.47.17.106]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-5--i12SI7YOjy4DbDywLr7Ew-1; Mon, 07 Mar 2022 12:20:25 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB7PR04MB4057.eurprd04.prod.outlook.com (2603:10a6:5:25::22) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Mon, 7 Mar
 2022 11:20:23 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 11:20:23 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 96cc2769-9e08-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646652026;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=wucVCDQ8TARid7Lanbfc55k9ZcuwKJSQiQAzawWrSos=;
	b=meYMYTH+/3TS25ZxB8QW+p87Jak7DVPby8HxPiOrngXb25F3760CPNepJ1TrmSY5DGNF4l
	TVWyRl79icawG3/O3i8YrW+XQdA2HDYEfDiB50tmf4Hfs9RE5dF8XpeIncsprAL7W0FDC0
	5HXIVwtxe6b9vU1ZiIAGHlRIUJXGKxU=
X-MC-Unique: -i12SI7YOjy4DbDywLr7Ew-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=XJoyQoVdIwCq/OlnViA84af+L8GuGHtlt/pkIB/mCN8GIZywxhVwqqoyuBkEhMDuqfvMX+VUFtms67GjBt+f75ImKOTlNc3lSO6+MotN+r9ix6HMNp5ioY8NZdEsf6kmKg16DM33Dis34oseUuAKAfjz+5fWy16FPvCaSuEXq5uDYQsIraSdmISkHtzcsksCrjJ25VflGBGJfUjBadyPJO2KxjCbiaQQTQlkdrGVqSmOUmlgHUewrKptd+vrcxU+Zb7dQ88jUgUXEpwksgDVTAFuOgXRl70kp737TK+keLfbP1nD+ZsjqrNMR9zFF8uRzuBalZIFBHlm/sfHp8kekQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=7tZrsaSs50EP1Q6IaDDjjL7iNRX2q5WoxhQFue0olIY=;
 b=M7kfaKf9nxMJTBjQACqguOsrTjXkJEa26SntIVB0M6AWwOkZFkI/OAiO+dtpzLszwNRyLppXP01KaarddbbduCUQyVOwp9cDZ036QVjg0vHYNMD/amFojUdu3vuroLVMJceArKbeZqpipxrs0Pg22WCbow6QatUkuolW7GKaPgxVpE9YePGuilt0Mc8Ix57BnJ9OZkg0nEZnXBGnfg9UWWqcrfKNl3sqwRoiir55XhirRZbz4nJ/cE1/0eLLNgohj6l0i0GYOwfg1CSpUWPb6QMnoVbd/S4jqXo8eluuIOJl9VPSCWJM2cDkYEZC504UqIMm1JozXOP/KE3TTy3dag==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <b36a549e-4446-8164-bc4d-f132cac1cde2@suse.com>
Date: Mon, 7 Mar 2022 12:20:25 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] x86/build: use --orphan-handling linker option if
 available
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
References: <5c374fd3-017d-3c40-4ded-25a3b1c978a6@suse.com>
 <YiCkUebvg0gaBm4/@Air-de-Roger>
 <3c335ca5-63e3-6389-cba5-b9047a4ce3b9@suse.com>
 <YiDaQY1ToO8G2QYd@Air-de-Roger>
 <abd691c8-9c7e-40d7-3f18-d96f826b8539@suse.com>
 <YiHZpmrYt+QvE7ex@Air-de-Roger>
 <2ebf82d3-3509-7224-6537-acdaad34dcf2@suse.com>
 <YiXnKvqX1FGyhzmy@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YiXnKvqX1FGyhzmy@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR06CA0346.eurprd06.prod.outlook.com
 (2603:10a6:20b:466::21) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: cac8f348-e783-4279-771e-08da002c78ef
X-MS-TrafficTypeDiagnostic: DB7PR04MB4057:EE_
X-Microsoft-Antispam-PRVS:
	<DB7PR04MB4057074AC9EEC6B74B849F77B3089@DB7PR04MB4057.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6512007)(2616005)(2906002)(8936002)(53546011)(5660300002)(6506007)(83380400001)(86362001)(31696002)(66946007)(26005)(186003)(4326008)(31686004)(966005)(6486002)(54906003)(8676002)(6916009)(66556008)(316002)(66476007)(508600001)(36756003)(38100700002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?YhhJZgIM1yIyqwJuNodARZa32Y/3D4QRsEw8oIa14tpeIxPdPe+6Mrfv50J0?=
 =?us-ascii?Q?Qwfovdq3Ux1JG92cxHTrz9sX1a2cANrLyUZR+qT4bTS+dXJh++IY2Qn3p/ok?=
 =?us-ascii?Q?L9YMpDIus7Gs5nFHv2FYoonMT1mnwR9mk/Va9deqd3nUClvs6tjirpSTO6/X?=
 =?us-ascii?Q?33wVmU+9+CDEnlK5Q3hiVFbDY94tKIzavUOypLrAPfog8fIGL7Xd4aWNlABH?=
 =?us-ascii?Q?BBmKDFYjOvqsbAbj592x0q13ataeOrpuZvc5MuaPQA1oLUk/2rRy2xj8h+Tk?=
 =?us-ascii?Q?VXGLXQcG1F+m8WnCtDsGRJbqsr/y6auSEY244LbH+oxMy2+dTGgm9e7md0/G?=
 =?us-ascii?Q?HBOy3Yjlh7FiE63l4QdkJDgtKAq8nwjb8YVX4j/hsxZxI169TCet/jjHS0AD?=
 =?us-ascii?Q?sHh0Bio3WW2ueuiFcVkQU9SRwPXn15Q+JDuq4Aeokomn23/4h//EL6+tl+Y8?=
 =?us-ascii?Q?cMiFlpv5wy3VBaErjjUBSsGubIMc3wPPT5pV+Y1abXD9hiXLDoOeUFjkoJbt?=
 =?us-ascii?Q?Aj1/NBFMJVXGECdrDQnUbNndiPQ3ZkAZSq8bDLt4axYarN+2j2eCh1IkJBSw?=
 =?us-ascii?Q?NXn/LkcHCXS+x9Jw31i4oUmXqX+gcQSx4Eu145Ss1DRY3jxhoRUD1jZ3Zan2?=
 =?us-ascii?Q?9pmv4Pg2dglhODi0TiFyzX3NC4Gn54fzIwZzZ/GQT32A0jDix6ZoBGHuqRhc?=
 =?us-ascii?Q?q0qf8hS56mXarBnri9PKNz+6eE3DXi84N6c2HBx+1cf5WnjbsB/Es1cMUOHx?=
 =?us-ascii?Q?tE9zr8Fz76n8/TDsOrIVlXGPq2CG5SjSm1ZBsQPCE99tFwQUk+UvlGVDiG3E?=
 =?us-ascii?Q?ekBLYgcqUqqNRCpDpRTde/M0IGym2dENnf1nwotpQeLe4mwtCusy+TtQt6yu?=
 =?us-ascii?Q?I2UM3LAqXbjE/wKMda7Q8HKIPgRUDiSxvjTR46Mj5U9+d6bg79wPDB1+hnEk?=
 =?us-ascii?Q?0fn3p8PeEe1TsiT6rLYtRMsqcRaiA8g+lQTQ83tLLo72HgVDQexUNIFnn2zA?=
 =?us-ascii?Q?26VaN39vR2xx7ima2pC8zC942NsJWKfKImhllPFGRmphYaTDXLnu5czuQd21?=
 =?us-ascii?Q?p+kHpGYOyLvwYmDVfdHGvXQAzyShYNLmTHpKJeCY9p5xFGwUgfhD0WRiUelG?=
 =?us-ascii?Q?EM4lP+8oaNG9AMXKiXuLxwpFXAFrp3Kl8YgnIGODXIBiKHIUjA3xyB2jPiAZ?=
 =?us-ascii?Q?l7kCDyE3X/5fKyffFZmmYvHzncpmCvih0IPXrWbD1NI75uCnvz69sWMgDWBZ?=
 =?us-ascii?Q?AgwBEU9j+xgHTPy9JAojoUhhSXiJPAU/rVXPE50L4H0WhmoABDC3A3acttTt?=
 =?us-ascii?Q?anKhmLtkVOo4vz9wYtM5VZa9Pmty2yD4UU4nRmsLjciRQM5HbR0l+/F4emVv?=
 =?us-ascii?Q?iWe6XYCkDtYVsm00pdLXNcuiU2o+8yQVWn6YYcTnjG6MoMK0hsYXJLCJe9S6?=
 =?us-ascii?Q?TRS/DNwlfmYJmnkiUrWwPr9PU8SCCvduWHuM6VXUMeV7iZxwlpNT5KG9eyEm?=
 =?us-ascii?Q?rTITSZhCkQk6bBRdLSfYX13JigTacnVnc94KQ61ND7/47GGTjLnjZ/BZxQf7?=
 =?us-ascii?Q?hFr3A4f1uuFnsCLX3PxdmIKktIJlwXew7gaB1b2FqgKqzSCsSYq2CbgsOu0Y?=
 =?us-ascii?Q?7AIVaBxnq19oRWWrk8cq5NA=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: cac8f348-e783-4279-771e-08da002c78ef
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 11:20:23.4960
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: y2jkvmxWTl78j7sjkCnJ3dKgwP36+AQ8N6XlKttOTvT4zv/cgCDTPdvOXd4kEt9hDR8qsbcFQoiwgZJ6BE1UNA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR04MB4057

On 07.03.2022 12:06, Roger Pau Monn=C3=A9 wrote:
> On Mon, Mar 07, 2022 at 09:18:42AM +0100, Jan Beulich wrote:
>> On 04.03.2022 10:19, Roger Pau Monn=C3=A9 wrote:
>>> On Fri, Mar 04, 2022 at 09:02:08AM +0100, Jan Beulich wrote:
>>>> On 03.03.2022 16:09, Roger Pau Monn=C3=A9 wrote:
>>>>> On Thu, Mar 03, 2022 at 01:17:03PM +0100, Jan Beulich wrote:
>>>>>> On 03.03.2022 12:19, Roger Pau Monn=C3=A9 wrote:
>>>>>>> On Wed, Mar 02, 2022 at 03:19:35PM +0100, Jan Beulich wrote:
>>>>>>>> As was e.g. making necessary 4b7fd8153ddf ("x86: fold sections in =
final
>>>>>>>> binaries"), arbitrary sections appearing without our linker script
>>>>>>>> placing them explicitly can be a problem. Have the linker make us =
aware
>>>>>>>> of such sections, so we would know that the script needs adjusting=
.
>>>>>>>>
>>>>>>>> To deal with the resulting warnings:
>>>>>>>> - Retain .note.* explicitly for ELF, and discard all of them (exce=
pt the
>>>>>>>>   earlier consumed .note.gnu.build-id) for PE/COFF.
>>>>>>>> - Have explicit statements for .got, .plt, and alike and add asser=
tions
>>>>>>>>   that they're empty. No output sections will be created for these=
 as
>>>>>>>>   long as they remain empty (or else the assertions would cause ea=
rly
>>>>>>>>   failure anyway).
>>>>>>>> - Collect all .rela.* into a single section, with again an asserti=
on
>>>>>>>>   added for the resulting section to be empty.
>>>>>>>> - Extend the enumerating of .debug_* to ELF. Note that for Clang a=
dding
>>>>>>>>   of .debug_macinfo is necessary. Amend this by its Dwarf5 counter=
part,
>>>>>>>>   .debug_macro, then as well (albeit more may need adding for full
>>>>>>>>   coverage).
>>>>>>>>
>>>>>>>> Suggested-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>
>>>>>>>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>>>>>>>> ---
>>>>>>>> I would have wanted to make this generic (by putting it in
>>>>>>>> xen/Makefile), but the option cannot be added to LDFLAGS, or else
>>>>>>>> there'll be a flood of warnings with $(LD) -r. (Besides, adding to
>>>>>>>> LDFLAGS would mean use of the option on every linker pass rather t=
han
>>>>>>>> just the last one.)
>>>>>>>>
>>>>>>>> Retaining of .note in xen-syms is under question. Plus if we want =
to
>>>>>>>> retain all notes, the question is whether they wouldn't better go =
into
>>>>>>>> .init.rodata. But .note.gnu.build-id shouldn't move there, and whe=
n
>>>>>>>> notes are discontiguous all intermediate space will also be assign=
ed to
>>>>>>>> the NOTE segment, thus making the contents useless for tools going=
 just
>>>>>>>> by program headers.
>>>>>>>>
>>>>>>>> Newer Clang may require yet more .debug_* to be added. I've only p=
layed
>>>>>>>> with versions 5 and 7 so far.
>>>>>>>>
>>>>>>>> Unless we would finally drop all mentioning of Stabs sections, we =
may
>>>>>>>> want to extend to there what is done for Dwarf here (allowing the =
EFI
>>>>>>>> conditional around the section to also go away).
>>>>>>>>
>>>>>>>> See also https://sourceware.org/pipermail/binutils/2022-March/1199=
22.html.
>>>>>>>
>>>>>>> LLD 13.0.0 also warns about:
>>>>>>>
>>>>>>> ld: warning: <internal>:(.symtab) is being placed in '.symtab'
>>>>>>> ld: warning: <internal>:(.shstrtab) is being placed in '.shstrtab'
>>>>>>> ld: warning: <internal>:(.strtab) is being placed in '.strtab'
>>>>>>>
>>>>>>> So seeing your mail where you mention GNU ld not needing those, I
>>>>>>> think we would need to add them anyway for LLVM ld.
>>>>>>
>>>>>> Hmm, that's ugly. How do I recognize LLVM ld? I can't simply use a
>>>>>> pre-processor conditional keying off of __clang__, as that used as t=
he
>>>>>> compiler doesn't mean their ld is also in use (typically the case on
>>>>>> Linux).
>>>>>
>>>>> Hard to tell, `ld -v` for LLD will typically contain '^LLD' I think,
>>>>> but I don't really like matching on human readable output like this.
>>>>
>>>> Same here. But Linux'es ld-version.sh looks to be doing just that.
>>>
>>> OK, so be it then. We can always improve afterwards, as I don't really
>>> have any better suggestion ATM.
>>>
>>>>>> I also don't want to add these uniformly, for now knowing what
>>>>>> side effects their mentioning might have with GNU ld.
>>>>>
>>>>> Wouldn't it be fine to just place them at the end, just like it's
>>>>> done by default by ld?
>>>>>
>>>>> Are you worried about not getting the proper type if mentioned in the
>>>>> linker script?
>>>>
>>>> I'm worried of about any kind of anomaly that could be caused by
>>>> mentioning sections which a linker doesn't expect to be named in
>>>> a script. That's hardly something they would even test their
>>>> linkers against.
>>>
>>> I've raised a bug with LLD:
>>>
>>> https://github.com/llvm/llvm-project/issues/54194
>>>
>>> To see whether this behavior is intended.
>=20
> Got a reply back from the LLD folks, and they consider the GNU ld
> behavior quirky. Linux linker script does explicitly mention .symtab,
> .strtab and shstrtab:
>=20
> https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit=
/?id=3Da840c4de56
>=20
> So Xen should be safe to do the same.

Ah yes, this is good enough proof for those present being (sufficiently)
benign to GNU ld (and being able to expect that this isn't going to
change). I'll get these added in v2.

>>>>>>>> --- a/xen/arch/x86/Makefile
>>>>>>>> +++ b/xen/arch/x86/Makefile
>>>>>>>> @@ -120,6 +120,8 @@ syms-warn-dup-y :=3D --warn-dup
>>>>>>>>  syms-warn-dup-$(CONFIG_SUPPRESS_DUPLICATE_SYMBOL_WARNINGS) :=3D
>>>>>>>>  syms-warn-dup-$(CONFIG_ENFORCE_UNIQUE_SYMBOLS) :=3D --error-dup
>>>>>>>> =20
>>>>>>>> +orphan-handling-$(call ld-option,--orphan-handling=3Dwarn) +=3D -=
-orphan-handling=3Dwarn
>>>>>>>
>>>>>>> Might be better to place in xen/Kconfig with the CC checks?
>>>>>>
>>>>>> Well. I've tried to stay away from complaining if people introduce
>>>>>> new tool chain capability checks in Kconfig. But I'm not going to
>>>>>> add any myself (unless things would become really inconsistent) up
>>>>>> and until we have actually properly discussed the upsides and
>>>>>> downsides of either model. Doing this via email (see the "Kconfig
>>>>>> vs tool chain capabilities" thread started in August 2020) has
>>>>>> proven to not lead anywhere. I'm really hoping that we can finally
>>>>>> sort this in Bukarest.
>>>>>>
>>>>>>> I'm also wondering whether we could add the flag here into XEN_LDFL=
AGS
>>>>>>> and EFI_LDFLAGS, as those options are only used together with the
>>>>>>> linker script in the targets on the Makefile.
>>>>>>
>>>>>> Not for XEN_LDFLAGS at least, and undesirable for EFI_LDFLAGS. See
>>>>>> the respective post-commit message remark.
>>>>>
>>>>> But the calls to LD in order to generate $(TARGET)-syms do not use -r=
,
>>>>> and are all using the linker script, so it should be fine to use
>>>>> --orphan-handling=3Dwarn there?
>>>>
>>>> But XEN_LDFLAGS is also used elsewhere together with -r. (Whether
>>>> that's actually correct is a different question.)
>>>>
>>>>> Could we do something like:
>>>>>
>>>>> $(TARGET)-syms: XEN_LDFLAGS +=3D ...
>>>>>
>>>>> And similar for $(TARGET).efi?
>>>>
>>>> Yes, this ought to be possible, but would again lead to the option
>>>> being passed on all three linking stages instead of just the final
>>>> one. When there are many warnings (e.g. because of the same kind of
>>>> section appearing many times), it's not helpful to see the flood
>>>> three times (or likely even six times, once for xen-syms and once
>>>> for xen.efi).
>>>
>>> OK, I think our build system is already quite chatty, so wouldn't
>>> really care about seeing repeated messages there. We can find a way to
>>> generalize passing options to the final linker step if/when we need to
>>> add more.
>>>
>>> I'm fine with doing the LLD fixup as a separate patch, so:
>>>
>>> Reviewed-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>
>>
>> Thanks. However, something is wrong here. Unlike in my local builds, the
>> pre-push build test I did after committing this triggered a massive amou=
nt
>> (tens of thousands) of objdump warnings:
>>
>> CU at offset ... contains corrupt or unsupported version number: 0
>> Invalid pointer size (0) in compunit header, using 4 instead
>=20
> That's weird, I wasn't aware we had any objdump calls after the final
> image is linked.

We've gained those recently, from check-endbr.sh.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 11:22:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 11:22:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285846.485108 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRBRc-0007T8-JA; Mon, 07 Mar 2022 11:22:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285846.485108; Mon, 07 Mar 2022 11:22:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRBRc-0007T1-Fs; Mon, 07 Mar 2022 11:22:28 +0000
Received: by outflank-mailman (input) for mailman id 285846;
 Mon, 07 Mar 2022 11:22:27 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+gfv=TS=citrix.com=prvs=0582ef7ee=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRBRb-0007St-Mh
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 11:22:27 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id dc411050-9e08-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 12:22:24 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: dc411050-9e08-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646652144;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=v8ED+sWHiTnVDmj1QKiR1RGDygoNVQSZNn2gG3rhs8A=;
  b=MWzz5Sb9u6/cqRX0T+TMU5vlP9pSfkIz2fIKO/Fmj7ljHTCRB6oV1Jmp
   o25ZI0C8NmCiB48YemK+50A1E6RKVzUOMTRDOOzsrtJ2Ax61XAfdCS9xY
   +WJ8e5j3QxHVtFs5vpusWcS4D45yQIXYT2X2oj77xThpi8i/oBY9NLR9H
   8=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66001880
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:oSpE0KAjBV8dyBVW/wbjw5YqxClBgxIJ4kV8jS/XYbTApGsh0zQBx
 jYWDG3Vaf+OMTHyf4p0PY2280sOsZOGxodlQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vh3dYy6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhd8
 fVPh7bzZTwUP5Pxm8IhaBljIQ5xaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguw5K8bmJsUHs2xIxjDFF/c2B5vERs0m4PcGgm9o35AeRZ4yY
 eIfcmtIdTPpPyFpFVYKGJcEraCYp37GJmgwRFW9+vNsvjm7IBZK+KjgNp/Zd8KHQe1Rn12Ev
 STW8mLhGBYYOdeDjz2f/RqEmevnjS79HoUIG9WQ//hmmlCagHcPBQMfU1KnptGig0iiUtRZI
 lQV4SNorLRa3E6iSNXnTgC7iHGBtx8YHdFXFoUHBBqlk/SOpVzDXy5dE2AHOIdOWNIKqSIC+
 mapneHDRhBUjbyrdHG7yoyUlgGdNn1ARYMdXhMsQQwA6tjlhYg8iBPTU9pueJKIYs3J9SLYm
 G7T8nVn71kHpYtSjvjgowib6965jsWRFmYIChPrsnVJB++TTKqsfMSW5FfS9p6sx67JHwDa7
 BDodyVzhd3i7K1hdgTQGo3h/5nzvp5p1QEwZnY1Q/EcG8yFoSLLQGypyGgWyL1VGsgFYyT1R
 0TYpBlc4pReVFPzM/MpPtPvU5txnfi8fTgAahwzRoASCqWdiSfdpH0+DaJu9zqFfLcQfVEXZ
 s7ALJfE4YcyAqV71jumL9rxIpdwrh3SMVj7HMihpzz+iOL2TCfMFd8tbQvfBshkvfjsiFiEr
 L5i2z6ilkw3vBvWOXKMr+b+7DkicBAGOHwBg5cPJ77bf1E/QzlJ5j246epJRrGJVp99z4/g1
 nq8RlVZ2Bz4g3jGIh+NcXdtdPXkWpMXkJ7xFXVE0YqAs5T7XbuS0Q==
IronPort-HdrOrdr: A9a23:QZ2nc60yuvHFcFFUdl4WwwqjBVZyeYIsimQD101hICG9Lfb3qy
 n+ppsmPEHP5Ar5OEtBpTiBUJPwJ0800aQFnLX5Wo3SIDUO2VHYVr2KiLGC/9SOIVyaygcw79
 YFT0E6MqyOMbEYt7eL3ODbKadZ/DDvysnB7o2yvhQdLz2CKZsQlDuRYjzrY3GeLzM2fKbReq
 Dsgfau8FGbCAoqh4mAdzI4dtmGg+eOuIPtYBYACRJiwA6SjQmw4Lq/NxSDxB8RXx5G3L9nqA
 H+4kHEz5Tml8v+5g7X1mfV4ZgTsNz9yuFbDMjJrsQOMD3jhiuheYwkcbyfuzIepv2p9T8R4Z
 PxiiZlG/42x2Laf2mzrxeo8w780Aw243un8lOciWuLm72OeBsKT+56wa5JeBrQ7EQt+Ptm1r
 hQ4m6fv51LSTvdgSXU/bHzJl9Xv3vxhUBnvf8YjnRZX4dbQqRWt5Yj8ERcF4pFND7m6bogDP
 JlAKjnlblrmGuhHjDkV1RUsZ+RtixZJGbFfqFCgL3Y79FupgE586NCr/Zv20vp9/oGOu55Dq
 r/Q+BVfYp1P70rhJJGdZQ8qPSMexnwqDL3QSuvyAfcZek600ykke+C3Fxy3pDsRKA1
X-IronPort-AV: E=Sophos;i="5.90,162,1643691600"; 
   d="scan'208";a="66001880"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=DsSy0+YoDD404rgR65IJVEFv7hNGuRfQ7crtIkgCc/nu6Ownp/HqDyAZYO16yK/Sk18OBEGP+15fVabKYpiQIZf8UkJRm/I9NwM4xtKKfZLUbycyQn/iNYa6RWWduh5XH4E3vMpmBcR7EqHFyxUOgy1uCcjiKyg69ejeWBEYhJdC+H5E3soVCGFe0cKWNu+PaDkK+VHhy/IGYyLoDn32AnBc0ypNjHvqLmzKXw1fQuZhoq2K3Q4H2WrkHQGTOCAILLjnxWcLoUYrY9xJtVVuXG1E+pfnTfjETyT8u3WbaI4iWBzYsNupV2uec+g6tXML6eU7B3u2CnJmh38a3eGDtA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=JGHKQIQOA/JCYeaWyXITFiv4iuN4k7QMJ/nbrCj+b0w=;
 b=gynSsbbgmhxMFCO1IaC9Trbw9o7KWD+vf+fTQJVZMG7KQhoGgc9GWDKY0WhZBJjZ2rx2+hgn4ig0/CMDJeQkrIwxIJFgMEl8isDmJ3ILBxgfU+8WWdObOLohKYcOkqygM2uait0lu5kYjiVyVYCtZdvj/OIDvPvvUXdXH9eAp1hIaML1Cqza0t2v2ZmdM1cviDQUYK23uTPVp96YOAwweALiKtfpBl+oz0l5bs4JcbMOexGmWqltSkceASyuwSwaEcpmzAV/AojvPcRNqtj5VeCYJYNooW79zafQZsLHicHDAkloxDjiqw70LtSM0CplzwQxIm8ZbbCq92IZQlR+Vw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=JGHKQIQOA/JCYeaWyXITFiv4iuN4k7QMJ/nbrCj+b0w=;
 b=YItbGAKrpqm9rggpwzmWMz1auNIV0gPHsBEGZoUdHXCxaWLOeAWIwjcv//FH0MIBw7tC4clWgKz1rEL8FnEnZ0+Ebfd3SL4CJ8Qwta/au+Pwu0ua4DkvNkFbvsEvcLUXkngjlcHuZlpG0A7ft8Lt4lSSUZUqu+YFtKWCXOIQuAc=
Date: Mon, 7 Mar 2022 12:22:12 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Andrea Stevanato <andrea.stevanato@santannapisa.it>
CC: Jason Andryuk <jandryuk@gmail.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>, "wl@xen.org" <wl@xen.org>, Anthony PERARD
	<anthony.perard@citrix.com>
Subject: Re: Network driver domain broken
Message-ID: <YiXq5HIrvZsy7QKU@Air-de-Roger>
References: <DB7PR03MB50027EE92E11BFFF71AADC4598049@DB7PR03MB5002.eurprd03.prod.outlook.com>
 <92827eec-b6e9-9c95-8f9e-fcf063d45090@santannapisa.it>
 <YiDt7fX92n6Luc2l@Air-de-Roger>
 <CAKf6xpsnmQG7-LXn5+Uz4mncWsN0EZ8wpagY8f8OydvZNb6g5A@mail.gmail.com>
 <YiH9cee6NIKA6MWg@Air-de-Roger>
 <53a4fe6b-efc8-bfa1-8475-0aa58774051a@santannapisa.it>
 <YiIFyRUNXpUfzwRB@Air-de-Roger>
 <0ce52d38-f542-9336-a100-1cbfc559f218@santannapisa.it>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <0ce52d38-f542-9336-a100-1cbfc559f218@santannapisa.it>
X-ClientProxiedBy: LO2P265CA0216.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:9e::36) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 449bdbf3-80d0-4b13-b98a-08da002cbc5c
X-MS-TrafficTypeDiagnostic: MW4PR03MB6364:EE_
X-Microsoft-Antispam-PRVS: <MW4PR03MB636484537E8B53EC838496418F089@MW4PR03MB6364.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(54906003)(6916009)(66946007)(316002)(3480700007)(86362001)(66476007)(66556008)(8676002)(186003)(107886003)(30864003)(508600001)(33716001)(26005)(85182001)(6486002)(53546011)(6506007)(5660300002)(2906002)(38100700002)(82960400001)(4326008)(9686003)(6666004)(6512007)(8936002)(83380400001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?YnBTVURpYlh2cUFyYzdOWkt4RU0yZTk4ajE4Z2JNb0F0TGRXZEZ0aW0rejhN?=
 =?utf-8?B?SnBqQ2RKVGhpUjNoUWp4bmR2c3lYRUZTSDg1TkdQcTZOUzFtMEViZm96WU5Q?=
 =?utf-8?B?ZmVJcU9ONkVVdXZvRWFPbERZOVhzc2VsU3JmL1JDamJDSnFBdmNiREdVa20r?=
 =?utf-8?B?SVVhdnlnRlQzZ0FvOXN6SUJ3Rkk2SURoSmdDWE5yeUx0enJTam95djMzS0Mx?=
 =?utf-8?B?MjE2TUJ5QVJQc2xtc2dRQ3VoMmNua0cySVhMSE1QYkx3YkppRENVVVlQWEd6?=
 =?utf-8?B?bjZxV09zcDZWNjh4YnpLZC9qVjVpWHBjbVI4ZU0wNHl0K2ZINm9QY09IM1dW?=
 =?utf-8?B?WUgwb1JzbStZaHVBSHdhU1FNa3BpZjY5U1dEeW40L2FmdnFXUUFLb3BDdU1G?=
 =?utf-8?B?aUg5RnhRNlhtS280MFJCTkVkNFBUYjNqcEZ4L0NudnhhZkRWZVVoZE96UUlP?=
 =?utf-8?B?QmpDWC81WTBvclZ0OXhRSGF5OThXVEVIR0JJN3lEc21kZy8rbmlEMDZSai8y?=
 =?utf-8?B?bG0wR1RRWkdiek9ibmJlYXFSZVp3YVBCSUNxRTVRVVczNi9xYk9PYkVhL0ZD?=
 =?utf-8?B?RjlDd1ZNMTBjMEZIYnYrZHRXQUROQnFFOGtmR0xaUlBqY1g3bGdYZkRyRXlL?=
 =?utf-8?B?d2MzeDRmaGJ5bkdWb25LYlBMZ2JUc2NWemVZaE1HTGpMT2xqNk93V3pxWWxV?=
 =?utf-8?B?WFhOVW9yVldhNU91K3RoTWhRZXpBZWdUUHNsNGZFMkJxY2dnUTFMaDdmUW1y?=
 =?utf-8?B?QUhjQkZwZTVCeGRxRGhuZHFTcTJFVVhqeVZUVGJEcElka3h6Mnpid3BKOTZN?=
 =?utf-8?B?RkZTcmlQcHBPZDcvVWptbmZPTm1MdnluTEN5MHo5RDdXQkgzeEdNUWNiMXJF?=
 =?utf-8?B?bkhucEMrOTQ5NWYvUWQ1R1R4aHpjOWM5VXJSd2lTZ0V5MDVsZnRvWXR4ZTVM?=
 =?utf-8?B?Wjhjbit6ak5WWHE4aWlQMTdKMEg2RFFJTWkvTGx0Nm9zTmpPVEFrVGdPb2pp?=
 =?utf-8?B?YzY3b29yK3hJUVk4WTZyaTE1MzZBcEpRS2RnU3pyZFFLclRrQkxLeXdkRXJz?=
 =?utf-8?B?MGU0cEFER2g1ZVZqdUVQWlhmVG11Nk54VnVCMGZrUmNxNFo1cDZ0QjVxRzQ0?=
 =?utf-8?B?dUNEYjk2U1BJV3lhUzJ2b3hDUkk1RG83cWRvTHFlNnppeFQyRXNTN0VsTmx4?=
 =?utf-8?B?aWZ6RFJHZEVzaE1DZXFnM3p5b0U1bjI2TG14dG9uS0M0TXB1a0NTcTJTdW5T?=
 =?utf-8?B?L3ljOWZTRnZXTFkwUHl2SUh5UjEwRC9ITm9IaGtuRDJTQmgwbkFVbFJiSkFv?=
 =?utf-8?B?SDlPNzNFU1hVbElxVzBRMEhGL2NLRWQ4V0ZrV0RGcGEwQ082bFYzdUhzbkE2?=
 =?utf-8?B?VzA1TnY4T2xEWWdCNzVCNHpKa2llWTNWQjFtUjFHZzZxbGVPSHd6eVJyK0Fp?=
 =?utf-8?B?MjNKMUJET0VRWjJoSG80ZkhhTm1IRkFoSzhmTlFGNzVUN1NwaUNQYXdFQUtB?=
 =?utf-8?B?YUY3SzQzcDk3Rjg0a2EzUGRVRTdJNzFHNW53c1hHZ05ZbjVGOTlRbHYySFc0?=
 =?utf-8?B?OU9qOTRLWE4zOUJiTzY3WDdwZXNBSTFuZkJOcXhCYXNEQmFmT3N2b3hxYkZ4?=
 =?utf-8?B?VUZQc3IrT3VFdXYwaVU2RGVBVElVM1h0Z3A5NUd3ZTRwZjQvNy9hWk9ha0Rr?=
 =?utf-8?B?MU1GTWl5eDVWNWgxbktLcXY4MHA2VnArZ1poSFNjZHpDR3VqUmlOYVpweWVi?=
 =?utf-8?B?MU5CaUZHclBaQkF1bWtiUmhrMDFhQnM1bEQ2RVpWNmFoSDMvNDQ4SWJQcmFN?=
 =?utf-8?B?NzcyR1hMbzN6MGdEUFpmdm5pQTZuMXJjTWErK1EwckdXbGhuU1paSnlONjdW?=
 =?utf-8?B?U1JwMmhkN1hkWHpzK3Z2TE45VEs5U0lvVGRZYndkVWhNVkUrT2Z6Uk1reVN4?=
 =?utf-8?B?Y25wVVpIMXNJNThDMkt1bm9MS3h5MVBaMlI3aitnaU5EeEl0WjlaKzNoWCtp?=
 =?utf-8?B?Z3FqQTJNb0RERy8vcVFCSVlPK1V2ZllMb1BSQ0p2c1BUQ1l2OGFydis2WjQ4?=
 =?utf-8?B?U0NhM050UWhiMXhJOGYwNTRoeElMSUVXRnFVbVlwa09rSWJuQlhSTWo3WStJ?=
 =?utf-8?B?N1ZhcjJ3MnFPQUwySlI4TEpPU280ME1XVCtzS0hWYU5Za3J4bk9HWWVFUFB1?=
 =?utf-8?Q?Bm5+OG5QUvviy4auPd5KZus=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 449bdbf3-80d0-4b13-b98a-08da002cbc5c
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 11:22:16.7601
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: A3S7mVsKkt5rK76AqmnA9kpQBzOXFrYrpRaWdJdjv8WE1a23JO4dnEu8B6jY4t26w3IN5uPA5Gu3jrFPbarM7g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW4PR03MB6364
X-OriginatorOrg: citrix.com

On Fri, Mar 04, 2022 at 02:46:37PM +0100, Andrea Stevanato wrote:
> On 3/4/2022 1:27 PM, Roger Pau Monné wrote:
> > On Fri, Mar 04, 2022 at 01:05:55PM +0100, Andrea Stevanato wrote:
> > > On 3/4/2022 12:52 PM, Roger Pau Monné wrote:
> > > > On Thu, Mar 03, 2022 at 01:08:31PM -0500, Jason Andryuk wrote:
> > > > > On Thu, Mar 3, 2022 at 11:34 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
> > > > > > 
> > > > > > On Thu, Mar 03, 2022 at 05:01:23PM +0100, Andrea Stevanato wrote:
> > > > > > > On 03/03/2022 15:54, Andrea Stevanato wrote:
> > > > > > > > Hi all,
> > > > > > > > 
> > > > > > > > according to the conversation that I had with royger, aa67b97ed34  broke the driver domain support.
> > > > > > > > 
> > > > > > > > What I'm trying to do is to setup networking between guests using driver domain. Therefore, the guest (driver) has been started with the following cfg.
> > > > > > > > 
> > > > > > > > name    = "guest0"
> > > > > > > > kernel  = "/media/sd-mmcblk0p1/Image"
> > > > > > > > ramdisk = "/media/sd-mmcblk0p1/rootfs.cpio.gz"
> > > > > > > > extra   = "console=hvc0 rdinit=/sbin/init root=/dev/ram0"
> > > > > > > > memory  = 1024 vcpus   = 2
> > > > > > > > driver_domain = 1
> > > > > > > > 
> > > > > > > > On guest0 I created the bridge, assigned a static IP and started the udhcpd on xenbr0 interface.
> > > > > > > > While the second guest has been started with the following cfg:
> > > > > > > > 
> > > > > > > > name    = "guest1"
> > > > > > > > kernel  = "/media/sd-mmcblk0p1/Image"
> > > > > > > > ramdisk = "/media/sd-mmcblk0p1/rootfs.cpio.gz"
> > > > > > > > extra   = "console=hvc0 rdinit=/sbin/init root=/dev/ram0"
> > > > > > > > memory  = 1024 vcpus   = 2
> > > > > > > > vcpus   = 2
> > > > > > > > vif = [ 'bridge=xenbr0, backend=guest0' ]
> > > > > > > > 
> > > > > > > > Follows the result of strace xl devd:
> > > > > > > > 
> > > > > > > > # strace xl devd
> > > > > > > > execve("/usr/sbin/xl", ["xl", "devd"], 0xffffdf0420c8 /* 13 vars */) = 0
> > > > > 
> > > > > > > > ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41b40) = -1 EPERM (Operation not permitted)
> > > > > > > > write(2, "libxl: ", 7libxl: )                  = 7
> > > > > > > > write(2, "error: ", 7error: )                  = 7
> > > > > > > > write(2, "libxl_utils.c:820:libxl_cpu_bitm"..., 87libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve the maximum number of cpus) = 87
> > > > > > > > write(2, "\n", 1
> > > > > > > > )                       = 1
> > > > > > > > clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0xffff9ee7a0e0) = 814
> > > > > > > > wait4(814, [{WIFEXITED(s) && WEXITSTATUS(s) == 0}], 0, NULL) = 814
> > > > > > > > --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=814, si_uid=0, si_status=0, si_utime=2, si_stime=2} ---
> > > > > 
> > > > > xl devd is daemonizing, but strace is only following the first
> > > > > process.  Use `strace xl devd -F` to prevent the daemonizing (or
> > > > > `strace -f xl devd` to follow children).
> > > > 
> > > > Or as a first step try to see what kind of messages you get from `xl
> > > > devd -F` when trying to attach a device using the driver domain.
> > > 
> > > Nothing has changed. On guest0 (the driver domain):
> > > 
> > > # xl devd -F
> > > libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve
> > > the maximum number of cpus
> > > libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve
> > > the maximum number of cpus
> > > libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve
> > > the maximum number of cpus
> > > [  696.805619] xenbr0: port 1(vif2.0) entered blocking state
> > > [  696.810334] xenbr0: port 1(vif2.0) entered disabled state
> > > [  696.824518] device vif2.0 entered promiscuous mode
> > 
> > Can you use `xl -vvv devd -F` here?
> 
> # xl -vvv devd -F
> libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve
> the maximum number of cpus
> libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve
> the maximum number of cpus
> libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve
> the maximum number of cpus
> libxl: debug: libxl_device.c:1749:libxl_device_events_handler: ao
> 0xaaaaece52130: create: how=(nil) callback=(nil) poller=0xaaaaece52430
> libxl: debug: libxl_event.c:813:libxl__ev_xswatch_register: watch
> w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: register slotnum=3
> libxl: debug: libxl_device.c:1806:libxl_device_events_handler: ao
> 0xaaaaece52130: inprogress: poller=0xaaaaece52430, flags=i
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece51b90:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece51b90:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece4e7b0:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece4e7b0:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece4e990:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece4e990:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/frontend
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece4eaa0:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece4eaa0:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/frontend-id
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece4ebb0:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece4ebb0:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/online
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece52830:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_device.c:1714:backend_watch_callback: Domain 2:Added
> domain to the list of active guests
> libxl: debug: libxl_device.c:1569:add_device: Domain 2:Added device
> /local/domain/1/backend/vif/2/0 to the list of active devices
> libxl: debug: libxl_event.c:813:libxl__ev_xswatch_register: watch
> w=0xaaaaece52a10 wpath=/local/domain/1/backend/vif/2/0/state token=2/1:
> register slotnum=2
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/state
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece52d50:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/script
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece52f30:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece52f30:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/mac
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/bridge
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/handle
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/type
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/feature-sg
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/feature-gso-tcpv4
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/feature-gso-tcpv6
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/feature-ipv6-csum-offload
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/feature-rx-copy
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/feature-xdp-headroom
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/feature-rx-flip
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/feature-multicast-control
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/feature-dynamic-multicast-control
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/feature-split-event-channels
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/multi-queue-max-queues
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/feature-ctrl-ring
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/feature-sg
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/feature-gso-tcpv4
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/feature-gso-tcpv6
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/feature-ipv6-csum-offload
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/feature-rx-copy
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/feature-xdp-headroom
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/feature-rx-flip
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/feature-multicast-control
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/feature-dynamic-multicast-control
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/feature-split-event-channels
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/multi-queue-max-queues
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/feature-ctrl-ring
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
> destroy
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
> wpath=/local/domain/1/backend token=3/0: event
> epath=/local/domain/1/backend/vif/2/0/state
> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
> nested ao, parent 0xaaaaece52130
> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xaaaaece52a10
> wpath=/local/domain/1/backend/vif/2/0/state token=2/1: event
> epath=/local/domain/1/backend/vif/2/0/state
> libxl: debug: libxl_event.c:1055:devstate_callback: backend
> /local/domain/1/backend/vif/2/0/state wanted state 2 still waiting state 5

There's something wrong with the negotiation between the frontend and
the backend AFAICT. The backed switches to state 5 and 6 (Closed) so
the connection cannot be established.

Can you paste the output of `xenstore-ls -fp` from dom0 after `xl
devd` reports the timeout?

What OS/versions are you using for the guest and the driver domain, do
you have any local modifications?

Regards, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 11:31:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 11:31:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285854.485120 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRBa6-0000dR-DX; Mon, 07 Mar 2022 11:31:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285854.485120; Mon, 07 Mar 2022 11:31:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRBa6-0000dK-AN; Mon, 07 Mar 2022 11:31:14 +0000
Received: by outflank-mailman (input) for mailman id 285854;
 Mon, 07 Mar 2022 11:31:13 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRBa5-0000d9-8V; Mon, 07 Mar 2022 11:31:13 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRBa5-0002od-57; Mon, 07 Mar 2022 11:31:13 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRBa4-0000HW-Qc; Mon, 07 Mar 2022 11:31:12 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRBa4-0000cM-Q9; Mon, 07 Mar 2022 11:31:12 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Nd7+BnZFaYXCK/z4dFjRWiY4xC+81bJoQO7mY5iQ1DA=; b=Ke0yoNE4j5NCPw1ijyzFGLZ3Go
	Gynxnv2/RhGMobrA28xfuqxS4S0nbA1gaSADSMMs0YZlKEEJsxcdWB46MSVUHjS32aT510Ds57Wdi
	4zi8VUATSmRP+hjpSmCB9u5lXM4c28fKK6LdJLBC70pVoAGf5IOMBR8ev1LrafN0ASgE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168456-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168456: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=79f2734e5a7bc2e5256eb0e599f45407855159c7
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 07 Mar 2022 11:31:12 +0000

flight 168456 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168456/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 79f2734e5a7bc2e5256eb0e599f45407855159c7
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    7 days
Failing since        168258  2022-03-01 01:55:31 Z    6 days   67 attempts
Testing same since   168449  2022-03-07 02:15:20 Z    0 days    5 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 437 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 11:39:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 11:39:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285864.485131 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRBi9-0001O4-9p; Mon, 07 Mar 2022 11:39:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285864.485131; Mon, 07 Mar 2022 11:39:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRBi9-0001Nx-5z; Mon, 07 Mar 2022 11:39:33 +0000
Received: by outflank-mailman (input) for mailman id 285864;
 Mon, 07 Mar 2022 11:39:32 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=/EJ7=TS=santannapisa.it=Andrea.Stevanato@srs-se1.protection.inumbo.net>)
 id 1nRBi7-0001Nr-Lk
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 11:39:32 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05on20609.outbound.protection.outlook.com
 [2a01:111:f400:7e1a::609])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3f339476-9e0b-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 12:39:28 +0100 (CET)
Received: from AM6PR03MB5000.eurprd03.prod.outlook.com (2603:10a6:20b:88::11)
 by DB7PR03MB4507.eurprd03.prod.outlook.com (2603:10a6:10:13::17) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Mon, 7 Mar
 2022 11:39:24 +0000
Received: from AM6PR03MB5000.eurprd03.prod.outlook.com
 ([fe80::cdef:8699:47b:300d]) by AM6PR03MB5000.eurprd03.prod.outlook.com
 ([fe80::cdef:8699:47b:300d%3]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 11:39:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3f339476-9e0b-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=MGpdivGnmw0q5IKQgqRhXpgag81F8OXYxLfbSTaLjlTm3gBGyXRi7ScR20gaWci1CGykCqZh3hZCOSbr3DRHeEvTLi6EaXyBVNnmrx0FFiOcw+bfw4XdlJJNiJpFZojRNrmpnlHoFJ+l5r1GD2ANiF0lCj/LAhZSTHhmio7Xug1gOSdtFzZsIExlsuTWpUA1hBqqCxdL0dWSnITDaj/A+UaFCVwi0OdqQ/us4hZ7PGBfbp45NXUHr699wSysXkPxRI87U2lUt8F4xEdJtrYgeFNtwnvpFHfJjvVuP6/3mbZ+2OLLi5uV1Rdml2ntQqCprlRM/9WuWyTXkbVpAS21cQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=P9vq27DMxWML12du5uN59XinDWxYicu43CCMny+ntBU=;
 b=eGbSBehb1/4cD3uyTpPUiMZb28WpwDNTCszehW3zOvs3xSG3bDmBu7k3i2JlcDbWeJLbZ2zTRTMWsQVfLird3hozOpdouzG0O06S2YdZLqLF+GjdzLgw6zkOgsMvB7GREsE0v47Zs+fcJWKoeXAQkmNgqVTwkrRvXYohvKlDFxGAftE0moF3QALOSoGriwd0Gn7k7LMHvYL6+56WitEpKMWiZBkCL2pjO8FJfflAFVpJpGaJJF49k/8SvcFDD0r1Ko0HlKk5StJ36CNlcZjimWes+D9eRCpOfRNGcOpQ1eOEdYfBg4AkU8FcoKyX8bT+kejQpiWi3oagMID9Zi48Hg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=santannapisa.it; dmarc=pass action=none
 header.from=santannapisa.it; dkim=pass header.d=santannapisa.it; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=santannapisa.it;
 s=selector1;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=P9vq27DMxWML12du5uN59XinDWxYicu43CCMny+ntBU=;
 b=Ud/mZ3584L4YE4/rmD3+A44w5wAZn1rcvFckLMzjzox/Oa8wbrL0lZQP8wXeTYVqrKdjNBEp+mOHL4w3b0PZrrFtliiJXuebFMnchuii+NMNX2r+sBcOmS1RTBLUl59JzpTg6hjki2FX/XfQrY0vmNvocpaKIFYgJvDjKWRIzjE=
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=santannapisa.it;
Message-ID: <b388ed5b-177e-2e9d-6450-6df16d9250c4@santannapisa.it>
Date: Mon, 7 Mar 2022 12:39:22 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: Network driver domain broken
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
Cc: Jason Andryuk <jandryuk@gmail.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 "wl@xen.org" <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>
References: <DB7PR03MB50027EE92E11BFFF71AADC4598049@DB7PR03MB5002.eurprd03.prod.outlook.com>
 <92827eec-b6e9-9c95-8f9e-fcf063d45090@santannapisa.it>
 <YiDt7fX92n6Luc2l@Air-de-Roger>
 <CAKf6xpsnmQG7-LXn5+Uz4mncWsN0EZ8wpagY8f8OydvZNb6g5A@mail.gmail.com>
 <YiH9cee6NIKA6MWg@Air-de-Roger>
 <53a4fe6b-efc8-bfa1-8475-0aa58774051a@santannapisa.it>
 <YiIFyRUNXpUfzwRB@Air-de-Roger>
 <0ce52d38-f542-9336-a100-1cbfc559f218@santannapisa.it>
 <YiXq5HIrvZsy7QKU@Air-de-Roger>
From: Andrea Stevanato <andrea.stevanato@santannapisa.it>
In-Reply-To: <YiXq5HIrvZsy7QKU@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: MR1P264CA0130.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:501:51::23) To AM6PR03MB5000.eurprd03.prod.outlook.com
 (2603:10a6:20b:88::11)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 907feb88-745f-4790-111a-08da002f20a9
X-MS-TrafficTypeDiagnostic: DB7PR03MB4507:EE_
X-Microsoft-Antispam-PRVS:
	<DB7PR03MB45077A78C4B97C9EFBDEC1B298089@DB7PR03MB4507.eurprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR03MB5000.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(44832011)(31696002)(786003)(86362001)(6486002)(4326008)(36756003)(83380400001)(52116002)(53546011)(54906003)(186003)(26005)(3480700007)(6916009)(31686004)(6506007)(30864003)(38100700002)(38350700002)(66476007)(8936002)(316002)(66946007)(66556008)(5660300002)(8676002)(6512007)(2906002)(2616005)(508600001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?LzJZK1V3RVV2dldldUZyTFJNTlRpYUMxZ0RJb211cFlRRUFEbXpKdndaWUFi?=
 =?utf-8?B?MllBZ05Jd3VGWUJqZ3BacXJ1d1o1dmVMRzJTRnY1WjNZSDhXbDlsWXdvbjl3?=
 =?utf-8?B?T1FROTFJYUZxbU90U1dacEo2dmQ2SHE2WVVOOWFoeFJPdHpzeU8yWXkxNHdL?=
 =?utf-8?B?TDlJUFRFenora3ZOSGlhUXlwNkY3LzFMM2NKTU1rQWV3RTdnSVBzMytmRVcy?=
 =?utf-8?B?anRXdm4yWUxJdUN1UTMvTGNEZWlpWjd1aHNVSEhCd2RFY3lpTmdJYnZ0bkNT?=
 =?utf-8?B?b0V4aGdaem0rbm9sdHA5S2t2ME50Vkh3aW1NeWovbHNIbnBBeVViR1FabFY1?=
 =?utf-8?B?akZmZ256a1VHUUNubW5RTHRFaE1HY2FBYmRMdUdoOXpZcGtLeU5OMjBoc1hP?=
 =?utf-8?B?d3pkKzFGVEpQNFFCRXlzaklmVHg3OXp6dW1xbU9aenlDaVhOWEF6cXBEbWQ0?=
 =?utf-8?B?NS9uVGdFdEN6Y2YvV2dmdzJkeU5uYUlXUHY1SExQWGpnb3h6RkZtWlArR1lJ?=
 =?utf-8?B?N2tjTGlhQ3VTZGo5bGpvRkx5by9sVVBlQlRLdDBVd2FTLzllbndleDZWbU9S?=
 =?utf-8?B?QXRkRXhkQVRGU2wzcVdXRllZSTZWMy9GMXA1c0x4aFh4d3ovRjAxd20zakFZ?=
 =?utf-8?B?YVRKZ3J2ckVEVU84RzkyWXV0dmc0K1R3VEUwWEJ4Z0owQXlsUmxpTWxITXJE?=
 =?utf-8?B?ZFpNVXdqWEVNa1ZaQTdsSVBMMzdJRURwQWo4SENCSDBMNHQzTkhuVlFzSlRw?=
 =?utf-8?B?SDRhQWlsT2dVTW9iOEwxdWlibWxyM0E5TUZ0MkJnNUM1ekVoYVJxYzFYcnM5?=
 =?utf-8?B?REJpWFRXQlg0RkRNTjc5U05wbC9RL3V1ajNFRlRWeitXT2lUUUdhV3E1bDBE?=
 =?utf-8?B?Q3lETHlGSzVzZlEwVURuZ0Y0K1NlR3VDQXFmenBTWUh5UzJ2a01WNlhGbExZ?=
 =?utf-8?B?TlJZZVFNWUJFMHYxZTlKUkY5L0FObzc3a2toN285U2FpSlN4UU50bSt5akhs?=
 =?utf-8?B?U1RYbXVibVVjSm1MMW14TkVBa1c2clFQZzIreWZKd2ZRNlozY0t4ZW9UKzQ4?=
 =?utf-8?B?b0NoQXFtMEdRdlo4QUN5ZlhoSlAveXRMT3dSY05rN1B2RkhEcURHUUR0ZXhY?=
 =?utf-8?B?cm9ZdDRuUEc0VVJmVWF2S0NJQUlmQ05LdkxhUkUwZHh5M2d3bit6VU40T0xH?=
 =?utf-8?B?US9SSTNIaGJrZ2V3dnRxY21xaVMvWFppOXFJa0RsOFZsNHAwdDJYWWJXSXh4?=
 =?utf-8?B?QWR6YWVqc2p0VXlhTGxtZHg2ZzlVU05FMXdoclRXQmVKWUNCbHFNY0VoTlY3?=
 =?utf-8?B?TTRwcTRoT3VwV0RBcnR6eUJvOG1tQmZxbmJtWjFCdHIyWWhnWGRRRG51YTY2?=
 =?utf-8?B?bnF0RGpDWWJCc2hmdmp1S0ZtVjMxL3VjbXk4ZU1qQ3VRNGNaWUtXa1J1Z21Z?=
 =?utf-8?B?RU4yVU00WHJ5QmwyRDJqb1YyTFVCZkxOb2VvbENsVWxhWmZEYnAwaDhIT0hS?=
 =?utf-8?B?dWZacHJNbUh6R05MSnNuVFR4L1BkclZ3SFFMYk1sMC94QVpLZVlMWmE0cnlJ?=
 =?utf-8?B?aGNRcVk3a3VvMkl1U2tKUDRJdXpUT3loK3o2NFZKTDlMWlo2V1Q5Rmg1NC9T?=
 =?utf-8?B?ZHAvc2FqRlZIdjBjWHo2aHkrNVo3aUYvdnBxMGRtSkJaaFo4dzdGRVRKWnRs?=
 =?utf-8?B?aTkvcnBGckJueWQ1dzZXVGhJMjFGaVRsRGgxWkk4bVRqRXVlbE1rTmlMNy8y?=
 =?utf-8?B?QUxUSnQ4QU04Z3dtSjhFOVl3TTJJRXhRTVhSOXp2Z241UkV1SDFTK2ZDR00z?=
 =?utf-8?B?WFRGVEZVWXEwVUNjcWdjakZmY0hvV080ZklhdUZtaUFiMXJ1YTI0VzZ1SWZM?=
 =?utf-8?B?RUVoaWcwaXc4elBxQ0tBb0wxN2NCRzJJa3ppcHB0NGI1eXYxbWdYWmlhSlZU?=
 =?utf-8?B?N0c0VHNIOEpnNHQ2bDlGWVB0ckR4MTdFcURqRVFNVUF1RmFIcVlnSVYrOVQz?=
 =?utf-8?B?eUlRdWdMUnRndmpTcHRhalpuR08yK2dxeG9zY01zY0xSaUU5VmlDOUxsQk5X?=
 =?utf-8?B?aUNJaG8rOFdIY0tmTGZwdlpweEs2ZTA2OWkzTFpYMmFhRm5iMXhQYW9mSk1o?=
 =?utf-8?B?ak16U0tCTi9CcEtXYnc1NTlRam1uK1gvTCtJUTgxU0NTcEo1UFR4eGxZVGk5?=
 =?utf-8?B?MSsyY2EzM2lPRE1ML3FiV3g3Z0ZzaEM4d251eUtWRU5HOE5EWE44T3EyYnE0?=
 =?utf-8?B?K3RBQU1CNmdxQ2hMdS9wWThvMlFDOEFFajc4a3pJNFBpN3BIVkxrZmlkRk0r?=
 =?utf-8?B?dkt3R2YxY1BURlFpZUFLTi9lbEtNdFNydEF4VHQrYi9FSDM3cnlQdz09?=
X-OriginatorOrg: santannapisa.it
X-MS-Exchange-CrossTenant-Network-Message-Id: 907feb88-745f-4790-111a-08da002f20a9
X-MS-Exchange-CrossTenant-AuthSource: AM6PR03MB5000.eurprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 11:39:24.0103
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: d97360e3-138d-4b5f-956f-a646c364a01e
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: PMQwbSF5xDDfWbyXRP6ueY1bWz+c9BaWytfAxPlctneHFX73l82CqphRS1SCuO/Kd7sZwVpBx5Z+UTWjpjkvtxTgNQKIqDvIXv9xfi//6GNKY8BbSs00I6/zzNMvD4SS
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR03MB4507

On 3/7/22 12:22, Roger Pau Monné wrote:
> On Fri, Mar 04, 2022 at 02:46:37PM +0100, Andrea Stevanato wrote:
>> On 3/4/2022 1:27 PM, Roger Pau Monné wrote:
>>> On Fri, Mar 04, 2022 at 01:05:55PM +0100, Andrea Stevanato wrote:
>>>> On 3/4/2022 12:52 PM, Roger Pau Monné wrote:
>>>>> On Thu, Mar 03, 2022 at 01:08:31PM -0500, Jason Andryuk wrote:
>>>>>> On Thu, Mar 3, 2022 at 11:34 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
>>>>>>>
>>>>>>> On Thu, Mar 03, 2022 at 05:01:23PM +0100, Andrea Stevanato wrote:
>>>>>>>> On 03/03/2022 15:54, Andrea Stevanato wrote:
>>>>>>>>> Hi all,
>>>>>>>>>
>>>>>>>>> according to the conversation that I had with royger, aa67b97ed34  broke the driver domain support.
>>>>>>>>>
>>>>>>>>> What I'm trying to do is to setup networking between guests using driver domain. Therefore, the guest (driver) has been started with the following cfg.
>>>>>>>>>
>>>>>>>>> name    = "guest0"
>>>>>>>>> kernel  = "/media/sd-mmcblk0p1/Image"
>>>>>>>>> ramdisk = "/media/sd-mmcblk0p1/rootfs.cpio.gz"
>>>>>>>>> extra   = "console=hvc0 rdinit=/sbin/init root=/dev/ram0"
>>>>>>>>> memory  = 1024 vcpus   = 2
>>>>>>>>> driver_domain = 1
>>>>>>>>>
>>>>>>>>> On guest0 I created the bridge, assigned a static IP and started the udhcpd on xenbr0 interface.
>>>>>>>>> While the second guest has been started with the following cfg:
>>>>>>>>>
>>>>>>>>> name    = "guest1"
>>>>>>>>> kernel  = "/media/sd-mmcblk0p1/Image"
>>>>>>>>> ramdisk = "/media/sd-mmcblk0p1/rootfs.cpio.gz"
>>>>>>>>> extra   = "console=hvc0 rdinit=/sbin/init root=/dev/ram0"
>>>>>>>>> memory  = 1024 vcpus   = 2
>>>>>>>>> vcpus   = 2
>>>>>>>>> vif = [ 'bridge=xenbr0, backend=guest0' ]
>>>>>>>>>
>>>>>>>>> Follows the result of strace xl devd:
>>>>>>>>>
>>>>>>>>> # strace xl devd
>>>>>>>>> execve("/usr/sbin/xl", ["xl", "devd"], 0xffffdf0420c8 /* 13 vars */) = 0
>>>>>>
>>>>>>>>> ioctl(5, _IOC(_IOC_NONE, 0x50, 0, 0x30), 0xffffe6e41b40) = -1 EPERM (Operation not permitted)
>>>>>>>>> write(2, "libxl: ", 7libxl: )                  = 7
>>>>>>>>> write(2, "error: ", 7error: )                  = 7
>>>>>>>>> write(2, "libxl_utils.c:820:libxl_cpu_bitm"..., 87libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve the maximum number of cpus) = 87
>>>>>>>>> write(2, "\n", 1
>>>>>>>>> )                       = 1
>>>>>>>>> clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0xffff9ee7a0e0) = 814
>>>>>>>>> wait4(814, [{WIFEXITED(s) && WEXITSTATUS(s) == 0}], 0, NULL) = 814
>>>>>>>>> --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=814, si_uid=0, si_status=0, si_utime=2, si_stime=2} ---
>>>>>>
>>>>>> xl devd is daemonizing, but strace is only following the first
>>>>>> process.  Use `strace xl devd -F` to prevent the daemonizing (or
>>>>>> `strace -f xl devd` to follow children).
>>>>>
>>>>> Or as a first step try to see what kind of messages you get from `xl
>>>>> devd -F` when trying to attach a device using the driver domain.
>>>>
>>>> Nothing has changed. On guest0 (the driver domain):
>>>>
>>>> # xl devd -F
>>>> libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve
>>>> the maximum number of cpus
>>>> libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve
>>>> the maximum number of cpus
>>>> libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve
>>>> the maximum number of cpus
>>>> [  696.805619] xenbr0: port 1(vif2.0) entered blocking state
>>>> [  696.810334] xenbr0: port 1(vif2.0) entered disabled state
>>>> [  696.824518] device vif2.0 entered promiscuous mode
>>>
>>> Can you use `xl -vvv devd -F` here?
>>
>> # xl -vvv devd -F
>> libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve
>> the maximum number of cpus
>> libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve
>> the maximum number of cpus
>> libxl: error: libxl_utils.c:820:libxl_cpu_bitmap_alloc: failed to retrieve
>> the maximum number of cpus
>> libxl: debug: libxl_device.c:1749:libxl_device_events_handler: ao
>> 0xaaaaece52130: create: how=(nil) callback=(nil) poller=0xaaaaece52430
>> libxl: debug: libxl_event.c:813:libxl__ev_xswatch_register: watch
>> w=0xffffe628caf8 wpath=/local/domain/1/backend token=3/0: register slotnum=3
>> libxl: debug: libxl_device.c:1806:libxl_device_events_handler: ao
>> 0xaaaaece52130: inprogress: poller=0xaaaaece52430, flags=i
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event epath=/local/domain/1/backend
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece51b90:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece51b90:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece4e7b0:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece4e7b0:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece4e990:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece4e990:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/frontend
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece4eaa0:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece4eaa0:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/frontend-id
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece4ebb0:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece4ebb0:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/online
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece52830:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_device.c:1714:backend_watch_callback: Domain 2:Added
>> domain to the list of active guests
>> libxl: debug: libxl_device.c:1569:add_device: Domain 2:Added device
>> /local/domain/1/backend/vif/2/0 to the list of active devices
>> libxl: debug: libxl_event.c:813:libxl__ev_xswatch_register: watch
>> w=0xaaaaece52a10 wpath=/local/domain/1/backend/vif/2/0/state token=2/1:
>> register slotnum=2
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/state
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece52d50:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/script
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece52f30:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece52f30:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/mac
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/bridge
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/handle
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/type
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/feature-sg
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/feature-gso-tcpv4
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/feature-gso-tcpv6
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/feature-ipv6-csum-offload
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/feature-rx-copy
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/feature-xdp-headroom
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/feature-rx-flip
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/feature-multicast-control
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/feature-dynamic-multicast-control
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/feature-split-event-channels
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/multi-queue-max-queues
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/feature-ctrl-ring
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/feature-sg
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/feature-gso-tcpv4
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/feature-gso-tcpv6
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/feature-ipv6-csum-offload
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/feature-rx-copy
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/feature-xdp-headroom
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/feature-rx-flip
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/feature-multicast-control
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/feature-dynamic-multicast-control
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/feature-split-event-channels
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/multi-queue-max-queues
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/feature-ctrl-ring
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:2035:libxl__ao__destroy: ao 0xaaaaece53110:
>> destroy
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xffffe628caf8
>> wpath=/local/domain/1/backend token=3/0: event
>> epath=/local/domain/1/backend/vif/2/0/state
>> libxl: debug: libxl_event.c:2445:libxl__nested_ao_create: ao 0xaaaaece53110:
>> nested ao, parent 0xaaaaece52130
>> libxl: debug: libxl_event.c:750:watchfd_callback: watch w=0xaaaaece52a10
>> wpath=/local/domain/1/backend/vif/2/0/state token=2/1: event
>> epath=/local/domain/1/backend/vif/2/0/state
>> libxl: debug: libxl_event.c:1055:devstate_callback: backend
>> /local/domain/1/backend/vif/2/0/state wanted state 2 still waiting state 5
> 
> There's something wrong with the negotiation between the frontend and
> the backend AFAICT. The backed switches to state 5 and 6 (Closed) so
> the connection cannot be established.
> 
> Can you paste the output of `xenstore-ls -fp` from dom0 after `xl
> devd` reports the timeout?

# xenstore-ls -fp
/tool = ""   (n0)
/tool/xenstored = ""   (n0)
/local = ""   (n0)
/local/domain = ""   (n0)
/local/domain/0 = ""   (n0)
/local/domain/0/control = ""   (n0)
/local/domain/0/control/feature-poweroff = "1"   (n0)
/local/domain/0/control/feature-reboot = "1"   (n0)
/local/domain/0/domid = "0"   (n0)
/local/domain/0/name = "Domain-0"   (n0)
/local/domain/0/device-model = ""   (n0)
/local/domain/0/device-model/0 = ""   (n0)
/local/domain/0/device-model/0/backends = ""   (n0)
/local/domain/0/device-model/0/backends/console = ""   (n0,n0)
/local/domain/0/device-model/0/backends/vkbd = ""   (n0,n0)
/local/domain/0/device-model/0/backends/9pfs = ""   (n0,n0)
/local/domain/0/device-model/0/backends/vfb = ""   (n0,n0)
/local/domain/0/device-model/0/backends/qnic = ""   (n0,n0)
/local/domain/0/device-model/0/state = "running"   (n0)
/local/domain/0/backend = ""   (n0)
/local/domain/0/backend/console = ""   (n0)
/local/domain/0/backend/console/1 = ""   (n0)
/local/domain/0/backend/console/1/0 = ""   (n0,r1)
/local/domain/0/backend/console/1/0/frontend = "/local/domain/1/console" 
   (n0,r1)
/local/domain/0/backend/console/1/0/frontend-id = "1"   (n0,r1)
/local/domain/0/backend/console/1/0/online = "1"   (n0,r1)
/local/domain/0/backend/console/1/0/state = "1"   (n0,r1)
/local/domain/0/backend/console/1/0/protocol = "vt100"   (n0,r1)
/local/domain/0/backend/console/2 = ""   (n0)
/local/domain/0/backend/console/2/0 = ""   (n0,r2)
/local/domain/0/backend/console/2/0/frontend = "/local/domain/2/console" 
   (n0,r2)
/local/domain/0/backend/console/2/0/frontend-id = "2"   (n0,r2)
/local/domain/0/backend/console/2/0/online = "1"   (n0,r2)
/local/domain/0/backend/console/2/0/state = "1"   (n0,r2)
/local/domain/0/backend/console/2/0/protocol = "vt100"   (n0,r2)
/local/domain/1 = ""   (n0,r1)
/local/domain/1/vm = "/vm/cd36b881-cd46-4de7-a59b-7d173198862e"   (n0,r1)
/local/domain/1/name = "guest0"   (n0,r1)
/local/domain/1/cpu = ""   (n0,r1)
/local/domain/1/cpu/0 = ""   (n0,r1)
/local/domain/1/cpu/0/availability = "online"   (n0,r1)
/local/domain/1/cpu/1 = ""   (n0,r1)
/local/domain/1/cpu/1/availability = "online"   (n0,r1)
/local/domain/1/memory = ""   (n0,r1)
/local/domain/1/memory/static-max = "1048576"   (n0,r1)
/local/domain/1/memory/target = "1048577"   (n0,r1)
/local/domain/1/memory/videoram = "-1"   (n0,r1)
/local/domain/1/device = ""   (n0,r1)
/local/domain/1/device/suspend = ""   (n0,r1)
/local/domain/1/device/suspend/event-channel = ""   (n1)
/local/domain/1/control = ""   (n0,r1)
/local/domain/1/control/shutdown = ""   (n1)
/local/domain/1/control/feature-poweroff = "1"   (n1)
/local/domain/1/control/feature-reboot = "1"   (n1)
/local/domain/1/control/feature-suspend = ""   (n1)
/local/domain/1/control/sysrq = ""   (n1)
/local/domain/1/control/platform-feature-multiprocessor-suspend = "1" 
(n0,r1)
/local/domain/1/control/platform-feature-xs_reset_watches = "1"   (n0,r1)
/local/domain/1/data = ""   (n1)
/local/domain/1/drivers = ""   (n1)
/local/domain/1/feature = ""   (n1)
/local/domain/1/attr = ""   (n1)
/local/domain/1/error = ""   (n1)
/local/domain/1/libxl = ""   (n1)
/local/domain/1/device-model = ""   (n1)
/local/domain/1/domid = "1"   (n0,r1)
/local/domain/1/store = ""   (n0,r1)
/local/domain/1/store/port = "1"   (n0,r1)
/local/domain/1/store/ring-ref = "233473"   (n0,r1)
/local/domain/1/console = ""   (n0,r1)
/local/domain/1/console/backend = "/local/domain/0/backend/console/1/0" 
   (n0,r1)
/local/domain/1/console/backend-id = "0"   (n1,r0)
/local/domain/1/console/limit = "1048576"   (n0,r1)
/local/domain/1/console/type = "xenconsoled"   (n0,r1)
/local/domain/1/console/output = "pty"   (n0,r1)
/local/domain/1/console/tty = "/dev/pts/0"   (n0,r1)
/local/domain/1/console/port = "2"   (n0,r1)
/local/domain/1/console/ring-ref = "233472"   (n0,r1)
/local/domain/1/backend = ""   (n0,r1)
/local/domain/1/backend/vif = ""   (n0,r1)
/local/domain/1/backend/vif/2 = ""   (n0,r1)
/local/domain/1/backend/vif/2/0 = ""   (n1,r2)
/local/domain/1/backend/vif/2/0/frontend = 
"/local/domain/2/device/vif/0"   (n1,r2)
/local/domain/1/backend/vif/2/0/frontend-id = "2"   (n1,r2)
/local/domain/1/backend/vif/2/0/online = "1"   (n1,r2)
/local/domain/1/backend/vif/2/0/state = "6"   (n1,r2)
/local/domain/1/backend/vif/2/0/script = "/etc/xen/scripts/vif-bridge" 
  (n1,r2)
/local/domain/1/backend/vif/2/0/mac = "00:16:3e:07:df:91"   (n1,r2)
/local/domain/1/backend/vif/2/0/bridge = "xenbr1"   (n1,r2)
/local/domain/1/backend/vif/2/0/handle = "0"   (n1,r2)
/local/domain/1/backend/vif/2/0/type = "vif"   (n1,r2)
/local/domain/1/backend/vif/2/0/feature-sg = "1"   (n1,r2)
/local/domain/1/backend/vif/2/0/feature-gso-tcpv4 = "1"   (n1,r2)
/local/domain/1/backend/vif/2/0/feature-gso-tcpv6 = "1"   (n1,r2)
/local/domain/1/backend/vif/2/0/feature-ipv6-csum-offload = "1"   (n1,r2)
/local/domain/1/backend/vif/2/0/feature-rx-copy = "1"   (n1,r2)
/local/domain/1/backend/vif/2/0/feature-xdp-headroom = "1"   (n1,r2)
/local/domain/1/backend/vif/2/0/feature-rx-flip = "0"   (n1,r2)
/local/domain/1/backend/vif/2/0/feature-multicast-control = "1"   (n1,r2)
/local/domain/1/backend/vif/2/0/feature-dynamic-multicast-control = "1" 
   (n1,r2)
/local/domain/1/backend/vif/2/0/feature-split-event-channels = "1"   (n1,r2)
/local/domain/1/backend/vif/2/0/multi-queue-max-queues = "2"   (n1,r2)
/local/domain/1/backend/vif/2/0/feature-ctrl-ring = "1"   (n1,r2)
/local/domain/2 = ""   (n0,r2)
/local/domain/2/vm = "/vm/f6dca20a-54bb-43af-9a62-67c55cb75708"   (n0,r2)
/local/domain/2/name = "guest1"   (n0,r2)
/local/domain/2/cpu = ""   (n0,r2)
/local/domain/2/cpu/0 = ""   (n0,r2)
/local/domain/2/cpu/0/availability = "online"   (n0,r2)
/local/domain/2/cpu/1 = ""   (n0,r2)
/local/domain/2/cpu/1/availability = "online"   (n0,r2)
/local/domain/2/memory = ""   (n0,r2)
/local/domain/2/memory/static-max = "1048576"   (n0,r2)
/local/domain/2/memory/target = "1048577"   (n0,r2)
/local/domain/2/memory/videoram = "-1"   (n0,r2)
/local/domain/2/device = ""   (n0,r2)
/local/domain/2/device/suspend = ""   (n0,r2)
/local/domain/2/device/suspend/event-channel = ""   (n2)
/local/domain/2/device/vif = ""   (n0,r2)
/local/domain/2/device/vif/0 = ""   (n2,r1)
/local/domain/2/device/vif/0/backend = "/local/domain/1/backend/vif/2/0" 
   (n2,r1)
/local/domain/2/device/vif/0/backend-id = "1"   (n2,r1)
/local/domain/2/device/vif/0/state = "6"   (n2,r1)
/local/domain/2/device/vif/0/handle = "0"   (n2,r1)
/local/domain/2/device/vif/0/mac = "00:16:3e:07:df:91"   (n2,r1)
/local/domain/2/device/vif/0/xdp-headroom = "0"   (n2,r1)
/local/domain/2/control = ""   (n0,r2)
/local/domain/2/control/shutdown = ""   (n2)
/local/domain/2/control/feature-poweroff = "1"   (n2)
/local/domain/2/control/feature-reboot = "1"   (n2)
/local/domain/2/control/feature-suspend = ""   (n2)
/local/domain/2/control/sysrq = ""   (n2)
/local/domain/2/control/platform-feature-multiprocessor-suspend = "1" 
(n0,r2)
/local/domain/2/control/platform-feature-xs_reset_watches = "1"   (n0,r2)
/local/domain/2/data = ""   (n2)
/local/domain/2/drivers = ""   (n2)
/local/domain/2/feature = ""   (n2)
/local/domain/2/attr = ""   (n2)
/local/domain/2/error = ""   (n2)
/local/domain/2/error/device = ""   (n2)
/local/domain/2/error/device/vif = ""   (n2)
/local/domain/2/error/device/vif/0 = ""   (n2)
/local/domain/2/error/device/vif/0/error = "1 allocating event channel" 
   (n2)
/local/domain/2/domid = "2"   (n0,r2)
/local/domain/2/store = ""   (n0,r2)
/local/domain/2/store/port = "1"   (n0,r2)
/local/domain/2/store/ring-ref = "233473"   (n0,r2)
/local/domain/2/console = ""   (n0,r2)
/local/domain/2/console/backend = "/local/domain/0/backend/console/2/0" 
   (n0,r2)
/local/domain/2/console/backend-id = "0"   (n2,r0)
/local/domain/2/console/limit = "1048576"   (n0,r2)
/local/domain/2/console/type = "xenconsoled"   (n0,r2)
/local/domain/2/console/output = "pty"   (n0,r2)
/local/domain/2/console/tty = "/dev/pts/3"   (n0,r2)
/local/domain/2/console/port = "2"   (n0,r2)
/local/domain/2/console/ring-ref = "233472"   (n0,r2)
/vm = ""   (n0)
/vm/cd36b881-cd46-4de7-a59b-7d173198862e = ""   (n0,r1)
/vm/cd36b881-cd46-4de7-a59b-7d173198862e/name = "guest0"   (n0,r1)
/vm/cd36b881-cd46-4de7-a59b-7d173198862e/uuid = 
"cd36b881-cd46-4de7-a59b-7d173198862e"   (n0,r1)
/vm/cd36b881-cd46-4de7-a59b-7d173198862e/start_time = "1646643480.69" 
(n0,r1)
/vm/f6dca20a-54bb-43af-9a62-67c55cb75708 = ""   (n0,r2)
/vm/f6dca20a-54bb-43af-9a62-67c55cb75708/name = "guest1"   (n0,r2)
/vm/f6dca20a-54bb-43af-9a62-67c55cb75708/uuid = 
"f6dca20a-54bb-43af-9a62-67c55cb75708"   (n0,r2)
/vm/f6dca20a-54bb-43af-9a62-67c55cb75708/start_time = "1646644038.80" 
(n0,r2)
/libxl = ""   (n0)
/libxl/1 = ""   (n0)
/libxl/1/device = ""   (n0)
/libxl/1/device/console = ""   (n0)
/libxl/1/device/console/0 = ""   (n0)
/libxl/1/device/console/0/frontend = "/local/domain/1/console"   (n0)
/libxl/1/device/console/0/backend = 
"/local/domain/0/backend/console/1/0"   (n0)
/libxl/1/device/console/0/frontend-id = "1"   (n0)
/libxl/1/device/console/0/online = "1"   (n0)
/libxl/1/device/console/0/state = "1"   (n0)
/libxl/1/device/console/0/protocol = "vt100"   (n0)
/libxl/1/type = "pvh"   (n0)
/libxl/1/dm-version = "qemu_xen"   (n0)
/libxl/2 = ""   (n0)
/libxl/2/device = ""   (n0)
/libxl/2/device/console = ""   (n0)
/libxl/2/device/console/0 = ""   (n0)
/libxl/2/device/console/0/frontend = "/local/domain/2/console"   (n0)
/libxl/2/device/console/0/backend = 
"/local/domain/0/backend/console/2/0"   (n0)
/libxl/2/device/console/0/frontend-id = "2"   (n0)
/libxl/2/device/console/0/online = "1"   (n0)
/libxl/2/device/console/0/state = "1"   (n0)
/libxl/2/device/console/0/protocol = "vt100"   (n0)
/libxl/2/device/vif = ""   (n0)
/libxl/2/device/vif/0 = ""   (n0)
/libxl/2/device/vif/0/frontend = "/local/domain/2/device/vif/0"   (n0)
/libxl/2/device/vif/0/backend = "/local/domain/1/backend/vif/2/0"   (n0)
/libxl/2/device/vif/0/frontend-id = "2"   (n0)
/libxl/2/device/vif/0/online = "1"   (n0)
/libxl/2/device/vif/0/state = "1"   (n0)
/libxl/2/device/vif/0/script = "/etc/xen/scripts/vif-bridge"   (n0)
/libxl/2/device/vif/0/mac = "00:16:3e:07:df:91"   (n0)
/libxl/2/device/vif/0/bridge = "xenbr1"   (n0)
/libxl/2/device/vif/0/handle = "0"   (n0)
/libxl/2/device/vif/0/type = "vif"   (n0)
/libxl/2/type = "pvh"   (n0)
/libxl/2/dm-version = "qemu_xen"   (n0)

> What OS/versions are you using for the guest and the driver domain, do
> you have any local modifications?

I'm using the same OS for everything: dom0 and guestX. It is petalinux 
2021.2.

> Regards, Roger.

Cheers,
Andrea


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 11:46:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 11:46:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285872.485142 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRBoq-0002x0-6S; Mon, 07 Mar 2022 11:46:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285872.485142; Mon, 07 Mar 2022 11:46:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRBoq-0002wt-3H; Mon, 07 Mar 2022 11:46:28 +0000
Received: by outflank-mailman (input) for mailman id 285872;
 Mon, 07 Mar 2022 11:46:26 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+gfv=TS=citrix.com=prvs=0582ef7ee=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRBoo-0002wn-S5
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 11:46:26 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 36725d44-9e0c-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 12:46:25 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 36725d44-9e0c-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646653585;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=v4zFag5yglm9rUEffzub4zUGwu5mVdz7ZYushMGUVXM=;
  b=WJJ/GIqIiAug4Q/Obqa2tzXogEQqSr45fUxIy0taN6fZMIx1hrFMi+YZ
   QSs2X0RgLYj5HEamUVKklVQlIXRQwySLl7pR+VwdRdZrOQFdkf6CHVA4p
   UHae5P8TeKEP9tWVI3230D6w8IM48G+znhT31xyLlUuAiE75yflez156J
   0=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65077368
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:Y62HF6wk3dxujKDSEVR6t+cYxirEfRIJ4+MujC+fZmUNrF6WrkUGy
 GRKW2jXbv2LNGKhL99waIrk9R9Uv5WGz4dlHAFqrCAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2YfhWWthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 Npli7ybTDcHFLf3hMtHdRQbSiZPEvxv0eqSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DJoQQt2sm1TjEJf0nXYrCU+PB4towMDIY2J0WQqmFO
 ZpxhTxHTxr5aiF2CF4sBrVkl9z5hnPufTNzkQfAzUYwyzeKl1EguFT3C/LFd9rPSchLk0Kwo
 mPd43+/EhwcLMaYyzeO7jSrnOCntTz/cJIfEvu/7PECqFSVynYeAVsNSValqP+wlkmWQNtZN
 0US/CM2rLM7sk23JvH/Vhu0um+ZvTYTXtNRF6sx7wTl90bPy1/HXC5eFGcHMYF48p9tLdA36
 rOXt+3JLjlfnpePcm6yrJGZ7mq1CAdEBEZXMEfoUjA5y9XkpYgyiDfGQdBiDLO5g7XJJN3g/
 9yZhHNg3utO1Kbnw43+pAma2Gz0+vAlWyZovl2/Y46z0u9uiGdJjaSM4EOT0/tPJZ3xorKp7
 CldwJj2AAzj4PiweM2xrAclQevBCxWtamS0bbtT834JrWjFxpJbVdoMiAyS3W8wWir+RRfnY
 VXIpSRa74JJMX2hYMdfOtztVZl7k/C/ToS1Cpg4i+aihbArKGe6ENxGPxbMjwgBbmB2+U3AB
 XtrWZn1VitLYUiW5DG3W/0cwdcWKtMWngvuqWTA503/i9K2PSfNIZ9caQfmRr1pvcus/VSOm
 /4CZpTi9vmqeLCnCsUh2dVIdg5iwLlSLc2elvG7gcbYels2QDx6UqSJqV7jEqQ895loei7z1
 ijVcmdTyUblhG2BLgOPa3t5b6joU4o5pnU+VRHA9370s5T/Se5DNJsiSqY=
IronPort-HdrOrdr: A9a23:CVNZNq0GiK1nHxYVlIid4AqjBVxyeYIsimQD101hICG9Lfb3qy
 n+ppsmPEHP5Ar5OEtBpTiBUJPwJ0800aQFnLX5XI3SJjUO3VHIEGgM1/qG/9SNIVybygcZ79
 YdT0EcMqyAMbEZt7eD3ODQKb9Jq7PrgcPY59s2jU0dNj2CA5sQkTuRYTzra3GeKjM2YqbQQ/
 Gnl7V6TnebCDwqR/X+IkNAc/nIptXNmp6jSRkaByQ/4A3LqT+z8rb1HzWRwx9bClp0sP0f2F
 mAtza8yrSosvm9xBOZ/2jP765OkN+k7tdYHsSDhuUcNz2poAe1Y4ZKXaGEoVkO0aqSwWdvtO
 OJjwYrPsx15X+UVmapoSH10w2l6zoq42+K8y7uvVLT5ejCAB4qActIgoxUNjHD7VA7gd162K
 VXm0qEqpt+F3r77WvAzumNcysvulu/oHIkn+JWpWdYS5EiZLhYqpFa1F9JEa0HADnx5OkcYa
 VT5fnnlbdrmG6hHjDkVjEF+q3uYp1zJGbKfqE6gL3a79AM90oJjXfxx6Qk7wM9HdwGOtx5Dt
 //Q9dVfYF1P78rhJ1GdZU8qOuMexrwqEH3QSuvyWqOLtBzB5uKke+y3IkI
X-IronPort-AV: E=Sophos;i="5.90,162,1643691600"; 
   d="scan'208";a="65077368"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=iuSOcGbWAXx6w7NYrClwxogv5QX4IMSy9jIcTyJdfjdOg7J35AR34TwXxOpst1JGmX5pBbbV8siPVG6Ul3vlE9/ntNHEXLOaKJRPvzvbYM/8xsV0qFNpIOV/+ZiS8Z6c8BK/Tua/9eepCETsAaSQ6qLe6u77BLcf5iEgqxu5xqM5tthZd9hI0lPQaUIwsLVjfuEpgo0PiGDm8NZv8IZG75cZ3fka4G0XCzqnkiQGbjP5xkXBGmvMWamZfqK4tEEAOxbjBL46VMSHO3ViRPvNcDf6FsfHz5AOQxGedLHpAoN3lQco7s8p5MUUlZB6Tg/E666Adl5olfuQQ6EKwTx2HA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=PhnXEgI3LXEG4DO6l2VCUSOoxWuihfY5Ax29qTSzuAA=;
 b=keDPhwwKFzgvkRJEeXewd+SoMV3IRhMWxEKaI06kZHBTK5q4mBQBToAtaEy4OcxASPjMciwjxr3lWqiDEPBFZuceLhgKF0D6Unp4m3cMFz1qdeQ0XxISs9eNMM6lM0YEl+LKPZ5hXJK6wAsTvNYvH49ayhTVapRNz57sh990y459R5cCCBjqnzrV7P8SMphLdbctsOKoWVHJaSyl4p+T1oF2a1st5F2mq3N5VUqvEJxBHR3QQrvjBhZsdVKkWfGuc5L8/829yPWuKXLbbMS5KdPARp/VWDjM9UzKs8/0NQbJy1jfmslNFGUAtgv1r1VZqAKXWGQl3cQq684+yGLwEA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=PhnXEgI3LXEG4DO6l2VCUSOoxWuihfY5Ax29qTSzuAA=;
 b=JYrPXO+gRc93KfrKWTQODdl52BmYma6qB23s+LNi7tKSPeXALOObXwzMhj3Lt/ds0nTsMknF8YCFmkHFissE2rA3P8zQrvk06BVpCNeQC1zdBI/YSGrQEFvG7cJ0+L+6psu1yTMI4x51JiTaqHtkn8qMm9lCnQJ0gc9KxLVvH5U=
Date: Mon, 7 Mar 2022 12:46:13 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Andrea Stevanato <andrea.stevanato@santannapisa.it>
CC: Jason Andryuk <jandryuk@gmail.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>, "wl@xen.org" <wl@xen.org>, Anthony PERARD
	<anthony.perard@citrix.com>
Subject: Re: Network driver domain broken
Message-ID: <YiXwhUnZL8bcJvH2@Air-de-Roger>
References: <DB7PR03MB50027EE92E11BFFF71AADC4598049@DB7PR03MB5002.eurprd03.prod.outlook.com>
 <92827eec-b6e9-9c95-8f9e-fcf063d45090@santannapisa.it>
 <YiDt7fX92n6Luc2l@Air-de-Roger>
 <CAKf6xpsnmQG7-LXn5+Uz4mncWsN0EZ8wpagY8f8OydvZNb6g5A@mail.gmail.com>
 <YiH9cee6NIKA6MWg@Air-de-Roger>
 <53a4fe6b-efc8-bfa1-8475-0aa58774051a@santannapisa.it>
 <YiIFyRUNXpUfzwRB@Air-de-Roger>
 <0ce52d38-f542-9336-a100-1cbfc559f218@santannapisa.it>
 <YiXq5HIrvZsy7QKU@Air-de-Roger>
 <b388ed5b-177e-2e9d-6450-6df16d9250c4@santannapisa.it>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <b388ed5b-177e-2e9d-6450-6df16d9250c4@santannapisa.it>
X-ClientProxiedBy: LO2P123CA0003.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:a6::15) To SA0PR03MB5610.namprd03.prod.outlook.com
 (2603:10b6:806:b2::9)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f31e55a8-7235-4ac0-3ef7-08da0030173b
X-MS-TrafficTypeDiagnostic: MWHPR03MB3311:EE_
X-Microsoft-Antispam-PRVS: <MWHPR03MB33114FADCC3F8C41B9D4A44D8F089@MWHPR03MB3311.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SA0PR03MB5610.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(38100700002)(82960400001)(107886003)(6512007)(2906002)(26005)(5660300002)(8676002)(4326008)(6916009)(66476007)(66556008)(86362001)(83380400001)(66946007)(186003)(6506007)(9686003)(6666004)(8936002)(316002)(54906003)(6486002)(508600001)(85182001)(33716001)(3480700007);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?b0VIdTMwMnZ3M3hVUCtTUGlsRm9FSEhQaTh2NEVGZ0pBaWZtTTlpa1lsT2M3?=
 =?utf-8?B?M2QyeUllMUdsOHZUeHRqNDRZMVdkV0hmSWYrMEp4NkhXTDhDOTMzcXBLVVNr?=
 =?utf-8?B?ME40OVNIVVl2NmtvU2pCMDAyaC9VL0N4YUhpeG0zS1ZwRUh2WU04OWIyWnFS?=
 =?utf-8?B?NTFrN0dKYUpNdlFqN2U3MUNFdmtZdnRzdlZSdjNzSzN3ckNoWk0zSHpSdnRa?=
 =?utf-8?B?cmdlYmZheE40cGxLc1JMcXZFU3kvd0xhMG8zaDdOQ2FMZlNCbFZySlE0eGdq?=
 =?utf-8?B?VEpFRFk1djM4VmFzeWJ2K0FJYWNTV0xBZXZaTDZZMklRVWR3dkpNRDhSTWdu?=
 =?utf-8?B?djVoVkxzeFNaVlVnd3Q4ZzRyNGhKNUJLWGJvSHZtZ1RBVDVUREdFR25tdWYz?=
 =?utf-8?B?emlieExqc09HSjR6MXpKYjlpWjhUeXowVXRPa0hQenM1MEMvMlZCWkdZRWhV?=
 =?utf-8?B?VUVLRXJ2akZINEVhOEJsZFo0dzBINEdUeGJaVEk3ZkpQb1RRcWZBQUg3ZHMx?=
 =?utf-8?B?dHdMc1Y0TjUwMnF2ZnBrdmxhOVd6WHBjTHhEakdZQVl6Y1UrZmpiU211Z1BT?=
 =?utf-8?B?eFlMZHJKUkRkYmNFbzBPNVR4VDFCQzJvaUtaczF6eHlsRFI5Um5mcGtaQ3V4?=
 =?utf-8?B?WURlcytUMUVqdVhZYWZXUXp1a0dQZnNhUWhpVWJ4ZUdoWnA2SUdiSThKMEJQ?=
 =?utf-8?B?QnZYd2ZJSDVrMlBqV0o2WU1OZnoxazdta2Vpd3dWdG1mcUtjNkRzWXN3bGFL?=
 =?utf-8?B?dlZ4VFF0MzZKLzVHK3dLQW1pQVRta091VURpalJIWkVDMG1Kbi80ZDRMSVNq?=
 =?utf-8?B?NTFISE05TVhOTFpmZzV5bFU4elRHdU1MSkEzOVVSa1VuVmxmYk5FQ0wzZElE?=
 =?utf-8?B?R1dqLzluQitPelVLWFQ2djJsa1BtYzlhVzhzd2lIUGJDMmluSG8wNVFnNU40?=
 =?utf-8?B?eEtXSzIwY0NXb1pvM2NiU1dYM2ZNMzFKbWwxTGEyWWQzdGI3UFZqR3FTajR6?=
 =?utf-8?B?cWpwd2h5bDQ4dWxXcHdhaXk1WFpOdThCSVRacWlUb1FlTHAxWEJuTUNNTG1D?=
 =?utf-8?B?M1FIY0ZCeWVtN1U5V3lRWkhzdlJjYjhNMzhaQWkyMmdEZmZmbTVQOWFoMUYz?=
 =?utf-8?B?S0FmYktDZG84MFN1MG00UEZRSXlUcHlrSnFvdGx0RTg2azVITWdBVVExMUQv?=
 =?utf-8?B?bUQyNUl0L2F0Y2pTckl0UXIwclN4bjNreVhIM0kzNEtYbEtESW5XMG1TSlFs?=
 =?utf-8?B?QVNIcVpDN0dRK1QwTFlmWUNMaVpNY3FrRXl3bkc0Y0h5dXBsS3dvVFpoWGpo?=
 =?utf-8?B?WE9yVGlpSXdseHR6UUtnVVFCL2JZRHFIUTlZQWRPTjNUTk5ha0FHV2dsdXVB?=
 =?utf-8?B?RWFxTzNGMjcyNEc1MlRiTGlFdnp0aHVxLzV5OTJpU2R3MzczNmoxd3BoNGZD?=
 =?utf-8?B?eW1ZdWRCb1JVQVpyL0RyZEJ2WkVrZnpHL1Zoam1YMXlid3IwUVdYV0JuR01r?=
 =?utf-8?B?QWdPd3UrVmJ6WmpjYUdvdmxveCtQelpBck9RdHNWb2dNa25KcmNiWWN3b29O?=
 =?utf-8?B?a3pVYVFlK0hFekI3c1U1YmxPbEpKNGhMUVIrVTYyRHg4U0w2WXFsRGJ0TkVq?=
 =?utf-8?B?NllZNktDN3RKc0VkOTd1eFVGTTRGUEpCWGtNbjA4cklLN3JIa1NLWExzTGJ6?=
 =?utf-8?B?d1dhSllhbFREVUIzSWFXL2w4MFVZMU1tV1RKL3hOSHkrOTJZbHhuTXcyaUpx?=
 =?utf-8?B?MEh6ZktHdHNKT016L0U3Q2V1Mm1PYy9xUTl4UmdZNXZHMGNOYk5ia0pNVjR5?=
 =?utf-8?B?eHV1eGpyNk5mRFB2a0ErR0FaT0ZjNTdHMGFLUlZvY05PYS8vdmMyUjBzSEVn?=
 =?utf-8?B?U3Y2cHZYZzRZV3J6Q282a04xaU54Z2pyczRZWHBkdHJmZmV0aVlYSTV6Y3NP?=
 =?utf-8?B?RXNiMUZlY00yaDBZejk0K1NvZjFPSjFlcWJHV3Q1UnJDa1BHUnkwMHZ2cG9h?=
 =?utf-8?B?MXlFcFNTTGJtK1RocTJQVkJTQ0JyNmErL0hCblpNaGVqdllXSjZuN29MSGd6?=
 =?utf-8?B?ODhJTTh5dFVTUTN1UzlVQzhKTzhiUFpoTnFzZzF3dkFKVDNKYTVzaGdYeTJW?=
 =?utf-8?B?NjRsS2pzVlFwa2RsaVpVRDN6VDRab3FlWWlMeFBJUk9uTUEvN0xHTGtObW4z?=
 =?utf-8?Q?LP+yMGNUysmwdIvVhYCNCZo=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: f31e55a8-7235-4ac0-3ef7-08da0030173b
X-MS-Exchange-CrossTenant-AuthSource: SA0PR03MB5610.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 11:46:17.7816
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: cJ6EH4cpYjl6zSlzJsky3U5HnzaN/rnesACfAFXsFtZAK4Oiu308m9PaDBtjBMW7v1rROMUkplVqApYyRs624w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR03MB3311
X-OriginatorOrg: citrix.com

On Mon, Mar 07, 2022 at 12:39:22PM +0100, Andrea Stevanato wrote:
> /local/domain/2 = ""   (n0,r2)
> /local/domain/2/vm = "/vm/f6dca20a-54bb-43af-9a62-67c55cb75708"   (n0,r2)
> /local/domain/2/name = "guest1"   (n0,r2)
> /local/domain/2/cpu = ""   (n0,r2)
> /local/domain/2/cpu/0 = ""   (n0,r2)
> /local/domain/2/cpu/0/availability = "online"   (n0,r2)
> /local/domain/2/cpu/1 = ""   (n0,r2)
> /local/domain/2/cpu/1/availability = "online"   (n0,r2)
> /local/domain/2/memory = ""   (n0,r2)
> /local/domain/2/memory/static-max = "1048576"   (n0,r2)
> /local/domain/2/memory/target = "1048577"   (n0,r2)
> /local/domain/2/memory/videoram = "-1"   (n0,r2)
> /local/domain/2/device = ""   (n0,r2)
> /local/domain/2/device/suspend = ""   (n0,r2)
> /local/domain/2/device/suspend/event-channel = ""   (n2)
> /local/domain/2/device/vif = ""   (n0,r2)
> /local/domain/2/device/vif/0 = ""   (n2,r1)
> /local/domain/2/device/vif/0/backend = "/local/domain/1/backend/vif/2/0"
> (n2,r1)
> /local/domain/2/device/vif/0/backend-id = "1"   (n2,r1)
> /local/domain/2/device/vif/0/state = "6"   (n2,r1)
> /local/domain/2/device/vif/0/handle = "0"   (n2,r1)
> /local/domain/2/device/vif/0/mac = "00:16:3e:07:df:91"   (n2,r1)
> /local/domain/2/device/vif/0/xdp-headroom = "0"   (n2,r1)
> /local/domain/2/control = ""   (n0,r2)
> /local/domain/2/control/shutdown = ""   (n2)
> /local/domain/2/control/feature-poweroff = "1"   (n2)
> /local/domain/2/control/feature-reboot = "1"   (n2)
> /local/domain/2/control/feature-suspend = ""   (n2)
> /local/domain/2/control/sysrq = ""   (n2)
> /local/domain/2/control/platform-feature-multiprocessor-suspend = "1"
> (n0,r2)
> /local/domain/2/control/platform-feature-xs_reset_watches = "1"   (n0,r2)
> /local/domain/2/data = ""   (n2)
> /local/domain/2/drivers = ""   (n2)
> /local/domain/2/feature = ""   (n2)
> /local/domain/2/attr = ""   (n2)
> /local/domain/2/error = ""   (n2)
> /local/domain/2/error/device = ""   (n2)
> /local/domain/2/error/device/vif = ""   (n2)
> /local/domain/2/error/device/vif/0 = ""   (n2)
> /local/domain/2/error/device/vif/0/error = "1 allocating event channel"
> (n2)

That's the real error. Your guest netfront fails to allocate the event
channel. Do you get any messages in the guest dmesg after trying to
attach the network interface?

Does the same happen if you don't use a driver domain and run the
backend in dom0?

Regards, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 11:54:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 11:54:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285880.485175 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRBwV-0004sM-Fi; Mon, 07 Mar 2022 11:54:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285880.485175; Mon, 07 Mar 2022 11:54:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRBwV-0004s9-Cb; Mon, 07 Mar 2022 11:54:23 +0000
Received: by outflank-mailman (input) for mailman id 285880;
 Mon, 07 Mar 2022 11:54:21 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=7T3K=TS=amazon.de=prvs=058ff0969=doebel@srs-se1.protection.inumbo.net>)
 id 1nRBwT-0004Lv-Mp
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 11:54:21 +0000
Received: from smtp-fw-9102.amazon.com (smtp-fw-9102.amazon.com
 [207.171.184.29]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 51be7f8e-9e0d-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 12:54:20 +0100 (CET)
Received: from pdx4-co-svc-p1-lb2-vlan3.amazon.com (HELO
 email-inbound-relay-iad-1e-7dac3c4d.us-east-1.amazon.com) ([10.25.36.214])
 by smtp-border-fw-9102.sea19.amazon.com with ESMTP; 07 Mar 2022 11:54:03 +0000
Received: from EX13D03EUA003.ant.amazon.com
 (iad12-ws-svc-p26-lb9-vlan3.iad.amazon.com [10.40.163.38])
 by email-inbound-relay-iad-1e-7dac3c4d.us-east-1.amazon.com (Postfix) with
 ESMTPS id 8653E99B13; Mon,  7 Mar 2022 11:54:01 +0000 (UTC)
Received: from EX13MTAUEA001.ant.amazon.com (10.43.61.82) by
 EX13D03EUA003.ant.amazon.com (10.43.165.89) with Microsoft SMTP Server (TLS)
 id 15.0.1497.28; Mon, 7 Mar 2022 11:54:00 +0000
Received: from dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (10.13.240.106)
 by mail-relay.amazon.com (10.43.61.243) with Microsoft SMTP Server id
 15.0.1497.28 via Frontend Transport; Mon, 7 Mar 2022 11:53:59 +0000
Received: by dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (Postfix,
 from userid 3160037)
 id 61D514F5E; Mon,  7 Mar 2022 11:53:59 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 51be7f8e-9e0d-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646654061; x=1678190061;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=7eEisiDKKSHw1++xLYtfPHKS3ymk9DBq2ioO+9jWrTY=;
  b=lBKIm+cqWi3PpCyDIQtJaz+qO0O1a9HOHrtyfifZwJFUryjFTwa1Qm2A
   2SOjFDyOA6YHtfbxRfiTD/so6hXxfT1ZOkTWfLzXdUT5ZbKd9ASqzQExu
   SEWGbblXeL2cCZ3VQHKPEKGTaHJcMesca7zQfEahBLdjjcFfWuS3+PVrb
   U=;
X-IronPort-AV: E=Sophos;i="5.90,162,1643673600"; 
   d="scan'208";a="200034811"
From: Bjoern Doebel <doebel@amazon.de>
To: <xen-devel@lists.xenproject.org>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, Roger
 Pau Monne <roger.pau@citrix.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
	Bjoern Doebel <doebel@amazon.de>, Konrad Rzeszutek Wilk
	<konrad.wilk@oracle.com>, Ross Lagerwall <ross.lagerwall@citrix.com>
Subject: [PATCH 1/2] Livepatch: resolve old address before function verification
Date: Mon, 7 Mar 2022 11:53:52 +0000
Message-ID: <15b092bb3af6e32f72ee8fca45317687d23b8be4.1646653825.git.doebel@amazon.de>
X-Mailer: git-send-email 2.32.0
In-Reply-To: <cover.1646653825.git.doebel@amazon.de>
References: <cover.1646653825.git.doebel@amazon.de>
MIME-Version: 1.0
Precedence: Bulk
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

When verifying that a livepatch can be applied, we may as well want to
inspect the target function to be patched. To do so, we need to resolve
this function's address before running the arch-specific
livepatch_verify hook.

Signed-off-by: Bjoern Doebel <doebel@amazon.de>
CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
CC: Ross Lagerwall <ross.lagerwall@citrix.com>
---
 xen/common/livepatch.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/xen/common/livepatch.c b/xen/common/livepatch.c
index ec301a9f12..be2cf75c2d 100644
--- a/xen/common/livepatch.c
+++ b/xen/common/livepatch.c
@@ -684,11 +684,11 @@ static int prepare_payload(struct payload *payload,
                 return -EINVAL;
             }
 
-            rc = arch_livepatch_verify_func(f);
+            rc = resolve_old_address(f, elf);
             if ( rc )
                 return rc;
 
-            rc = resolve_old_address(f, elf);
+            rc = arch_livepatch_verify_func(f);
             if ( rc )
                 return rc;
 
-- 
2.32.0




Amazon Development Center Germany GmbH
Krausenstr. 38
10117 Berlin
Geschaeftsfuehrung: Christian Schlaeger, Jonathan Weiss
Eingetragen am Amtsgericht Charlottenburg unter HRB 149173 B
Sitz: Berlin
Ust-ID: DE 289 237 879





From xen-devel-bounces@lists.xenproject.org Mon Mar 07 11:54:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 11:54:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285879.485158 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRBwT-0004Oo-9i; Mon, 07 Mar 2022 11:54:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285879.485158; Mon, 07 Mar 2022 11:54:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRBwT-0004Ns-3Q; Mon, 07 Mar 2022 11:54:21 +0000
Received: by outflank-mailman (input) for mailman id 285879;
 Mon, 07 Mar 2022 11:54:19 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=7T3K=TS=amazon.de=prvs=058ff0969=doebel@srs-se1.protection.inumbo.net>)
 id 1nRBwR-0004Lv-6X
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 11:54:19 +0000
Received: from smtp-fw-6001.amazon.com (smtp-fw-6001.amazon.com [52.95.48.154])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 50e84562-9e0d-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 12:54:17 +0100 (CET)
Received: from iad12-co-svc-p1-lb1-vlan3.amazon.com (HELO
 email-inbound-relay-iad-1a-2d7489a4.us-east-1.amazon.com) ([10.43.8.6])
 by smtp-border-fw-6001.iad6.amazon.com with ESMTP; 07 Mar 2022 11:54:05 +0000
Received: from EX13D44EUB004.ant.amazon.com
 (iad12-ws-svc-p26-lb9-vlan2.iad.amazon.com [10.40.163.34])
 by email-inbound-relay-iad-1a-2d7489a4.us-east-1.amazon.com (Postfix) with
 ESMTPS id 0A014A2947; Mon,  7 Mar 2022 11:54:03 +0000 (UTC)
Received: from EX13MTAUWC001.ant.amazon.com (10.43.162.135) by
 EX13D44EUB004.ant.amazon.com (10.43.166.198) with Microsoft SMTP Server (TLS)
 id 15.0.1497.28; Mon, 7 Mar 2022 11:54:02 +0000
Received: from dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (10.13.240.106)
 by mail-relay.amazon.com (10.43.162.232) with Microsoft SMTP Server
 id
 15.0.1497.28 via Frontend Transport; Mon, 7 Mar 2022 11:54:01 +0000
Received: by dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (Postfix,
 from userid 3160037)
 id BD80E4F5E; Mon,  7 Mar 2022 11:54:00 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 50e84562-9e0d-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646654057; x=1678190057;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=T4HQVwdD+Sp1df6ID2a/ASUAEQvXVBttAi63ggcy0Qg=;
  b=MXN2CE4ibQjOGFFf5GdbBuqlWVpn87doajRq59UQSH3r8qmoBxdSsW2h
   QSZYf//MYpWYKrF0MfKIEjUuSfOiF9Mi/ortaJaIFFeRkdiFmCwj6+Kyl
   CuWzmusDtZHcV3ZDpnvWtnd/lZzCu4UaeQIAbU87T1JE8v2Ci++4b8GUY
   E=;
X-IronPort-AV: E=Sophos;i="5.90,162,1643673600"; 
   d="scan'208";a="183654544"
From: Bjoern Doebel <doebel@amazon.de>
To: <xen-devel@lists.xenproject.org>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, Roger
 Pau Monne <roger.pau@citrix.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
	Bjoern Doebel <doebel@amazon.de>, Konrad Rzeszutek Wilk
	<konrad.wilk@oracle.com>, Ross Lagerwall <ross.lagerwall@citrix.com>
Subject: [PATCH 1/1] xen/x86: Livepatch: support patching CET-enhanced functions
Date: Mon, 7 Mar 2022 11:53:53 +0000
Message-ID: <deb5d86b20c02312023959bae06b0fe651a4b2f4.1646653822.git.doebel@amazon.de>
X-Mailer: git-send-email 2.32.0
In-Reply-To: <cover.1646653822.git.doebel@amazon.de>
References: <cover.1646653822.git.doebel@amazon.de>
MIME-Version: 1.0
Precedence: Bulk
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

Xen enabled CET for supporting architectures. The control flow aspect of
CET expects functions that can be called indirectly (i.e., via function
pointers) to start with an ENDBR64 instruction. Otherwise a control flow
exception is raised.

This expectation breaks livepatching flows because we patch functions by
overwriting their first 5 bytes with a JMP + <offset>, thus breaking the
ENDBR64. We fix this by checking the start of a patched function for
being ENDBR64. In the positive case we move the livepatch JMP to start
behind the ENDBR64 instruction.

To avoid having to guess the ENDBR64 offset again on patch reversal
(which might race with other mechanisms adding/removing ENDBR
dynamically), use the livepatch metadata to store the computed offset
along with the saved bytes of the overwritten function.

Signed-off-by: Bjoern Doebel <doebel@amazon.de>
CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
CC: Ross Lagerwall <ross.lagerwall@citrix.com>
----
Note that on top of livepatching functions, Xen supports an additional
mode where we can "remove" a function by overwriting it with NOPs. This
is only supported for functions up to 31 bytes in size and this patch
reduces this limit to 30 bytes.
---
 xen/arch/x86/livepatch.c | 63 +++++++++++++++++++++++++++++++++++-----
 1 file changed, 55 insertions(+), 8 deletions(-)

diff --git a/xen/arch/x86/livepatch.c b/xen/arch/x86/livepatch.c
index 65530c1e57..da7611c01d 100644
--- a/xen/arch/x86/livepatch.c
+++ b/xen/arch/x86/livepatch.c
@@ -14,11 +14,29 @@
 #include <xen/vm_event.h>
 #include <xen/virtual_region.h>
 
+#include <asm/endbr.h>
 #include <asm/fixmap.h>
 #include <asm/nmi.h>
 #include <asm/livepatch.h>
 #include <asm/setup.h>
 
+/*
+ * CET hotpatching support: We may have functions starting with an ENDBR64
+ * instruction that MUST remain the first instruction of the function, hence
+ * we need to move any hotpatch trampoline further into the function. For that
+ * we need to keep track of the patching offset used for any loaded hotpatch
+ * (to avoid racing against other fixups adding/removing ENDBR64 or similar
+ * instructions).
+ *
+ * We do so by making use of the existing opaque metadata area. We use its
+ * first 4 bytes to track the offset into the function used for patching and
+ * the remainder of the data to store overwritten code bytes.
+ */
+struct x86_livepatch_meta {
+    uint8_t patch_offset;
+    uint8_t instruction[LIVEPATCH_OPAQUE_SIZE - sizeof(uint8_t)];
+};
+
 static bool has_active_waitqueue(const struct vm_event_domain *ved)
 {
     /* ved may be xzalloc()'d without INIT_LIST_HEAD() yet. */
@@ -104,18 +122,36 @@ void noinline arch_livepatch_revive(void)
 
 int arch_livepatch_verify_func(const struct livepatch_func *func)
 {
+    BUILD_BUG_ON(sizeof(struct x86_livepatch_meta) != LIVEPATCH_OPAQUE_SIZE);
+
     /* If NOPing.. */
     if ( !func->new_addr )
     {
+        struct x86_livepatch_meta *lp;
+
+        lp = (struct x86_livepatch_meta *)func->opaque;
         /* Only do up to maximum amount we can put in the ->opaque. */
-        if ( func->new_size > sizeof(func->opaque) )
+        if ( func->new_size > sizeof(lp->instruction) )
             return -EOPNOTSUPP;
 
         if ( func->old_size < func->new_size )
             return -EINVAL;
     }
-    else if ( func->old_size < ARCH_PATCH_INSN_SIZE )
-        return -EINVAL;
+    else
+    {
+        /*
+         * Space needed now depends on whether the target function
+         * starts with an ENDBR64 instruction.
+         */
+        uint8_t needed;
+
+        needed = ARCH_PATCH_INSN_SIZE;
+        if ( is_endbr64(func->old_addr) )
+            needed += ENDBR64_LEN;
+
+        if ( func->old_size < needed )
+            return -EINVAL;
+    }
 
     return 0;
 }
@@ -127,15 +163,21 @@ int arch_livepatch_verify_func(const struct livepatch_func *func)
 void noinline arch_livepatch_apply(struct livepatch_func *func)
 {
     uint8_t *old_ptr;
-    uint8_t insn[sizeof(func->opaque)];
+    struct x86_livepatch_meta *lp;
+    uint8_t insn[sizeof(lp->instruction)];
     unsigned int len;
 
+    lp = (struct x86_livepatch_meta *)func->opaque;
+    lp->patch_offset = 0;
     old_ptr = func->old_addr;
     len = livepatch_insn_len(func);
     if ( !len )
         return;
 
-    memcpy(func->opaque, old_ptr, len);
+    if ( is_endbr64(old_ptr) )
+        lp->patch_offset += ENDBR64_LEN;
+
+    memcpy(lp->instruction, old_ptr + lp->patch_offset, len);
     if ( func->new_addr )
     {
         int32_t val;
@@ -143,14 +185,15 @@ void noinline arch_livepatch_apply(struct livepatch_func *func)
         BUILD_BUG_ON(ARCH_PATCH_INSN_SIZE != (1 + sizeof(val)));
 
         insn[0] = 0xe9; /* Relative jump. */
-        val = func->new_addr - func->old_addr - ARCH_PATCH_INSN_SIZE;
+        val = func->new_addr - (func->old_addr + lp->patch_offset
+                                + ARCH_PATCH_INSN_SIZE);
 
         memcpy(&insn[1], &val, sizeof(val));
     }
     else
         add_nops(insn, len);
 
-    memcpy(old_ptr, insn, len);
+    memcpy(old_ptr + lp->patch_offset, insn, len);
 }
 
 /*
@@ -159,7 +202,11 @@ void noinline arch_livepatch_apply(struct livepatch_func *func)
  */
 void noinline arch_livepatch_revert(const struct livepatch_func *func)
 {
-    memcpy(func->old_addr, func->opaque, livepatch_insn_len(func));
+    struct x86_livepatch_meta *lp;
+
+    lp = (struct x86_livepatch_meta *)func->opaque;
+
+    memcpy(func->old_addr + lp->patch_offset, lp->instruction, livepatch_insn_len(func));
 }
 
 /*
-- 
2.32.0




Amazon Development Center Germany GmbH
Krausenstr. 38
10117 Berlin
Geschaeftsfuehrung: Christian Schlaeger, Jonathan Weiss
Eingetragen am Amtsgericht Charlottenburg unter HRB 149173 B
Sitz: Berlin
Ust-ID: DE 289 237 879





From xen-devel-bounces@lists.xenproject.org Mon Mar 07 11:54:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 11:54:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285878.485153 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRBwS-0004MD-VY; Mon, 07 Mar 2022 11:54:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285878.485153; Mon, 07 Mar 2022 11:54:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRBwS-0004M6-SE; Mon, 07 Mar 2022 11:54:20 +0000
Received: by outflank-mailman (input) for mailman id 285878;
 Mon, 07 Mar 2022 11:54:18 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=7T3K=TS=amazon.de=prvs=058ff0969=doebel@srs-se1.protection.inumbo.net>)
 id 1nRBwP-0004Lv-L8
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 11:54:18 +0000
Received: from smtp-fw-6001.amazon.com (smtp-fw-6001.amazon.com [52.95.48.154])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4eb831d2-9e0d-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 12:54:15 +0100 (CET)
Received: from iad12-co-svc-p1-lb1-vlan3.amazon.com (HELO
 email-inbound-relay-iad-1a-2d7489a4.us-east-1.amazon.com) ([10.43.8.6])
 by smtp-border-fw-6001.iad6.amazon.com with ESMTP; 07 Mar 2022 11:54:02 +0000
Received: from EX13D44EUB004.ant.amazon.com
 (iad12-ws-svc-p26-lb9-vlan2.iad.amazon.com [10.40.163.34])
 by email-inbound-relay-iad-1a-2d7489a4.us-east-1.amazon.com (Postfix) with
 ESMTPS id 8CFBDA2774; Mon,  7 Mar 2022 11:54:01 +0000 (UTC)
Received: from EX13MTAUWA001.ant.amazon.com (10.43.160.58) by
 EX13D44EUB004.ant.amazon.com (10.43.166.198) with Microsoft SMTP Server (TLS)
 id 15.0.1497.28; Mon, 7 Mar 2022 11:54:00 +0000
Received: from dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (10.13.240.106)
 by mail-relay.amazon.com (10.43.160.118) with Microsoft SMTP Server
 id
 15.0.1497.28 via Frontend Transport; Mon, 7 Mar 2022 11:53:59 +0000
Received: by dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (Postfix,
 from userid 3160037)
 id 8CA8E4E7F; Mon,  7 Mar 2022 11:53:58 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4eb831d2-9e0d-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646654055; x=1678190055;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=mNz9Q4f0IrIKfF872XTy4kRaP42K2/1c23e5EBuxuL8=;
  b=fzmeKN65tLTBJAnno4f3STFXLLC8+O1jeZxreiBwKj1EZb5o71qmaCn6
   U66mnp5a+XUNbJRBP1k13AYY8cbAEHUy6N82tod9oeM/O5w00BR196FTX
   Prg0hG0gX8hCdmpHMw76lFlu8wGU13JviQb1aXMgnMxAA1mkjjCTpj3Y3
   g=;
X-IronPort-AV: E=Sophos;i="5.90,162,1643673600"; 
   d="scan'208";a="183654532"
From: Bjoern Doebel <doebel@amazon.de>
To: <xen-devel@lists.xenproject.org>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, Roger
 Pau Monne <roger.pau@citrix.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
	Bjoern Doebel <doebel@amazon.de>
Subject: [PATCH 0/2] Livepatch: support for livepatching CET functions
Date: Mon, 7 Mar 2022 11:53:51 +0000
Message-ID: <cover.1646653825.git.doebel@amazon.de>
X-Mailer: git-send-email 2.32.0
MIME-Version: 1.0
Precedence: Bulk
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

This series enables support for livepatching functions compiled with
Intel CET support where we have to make sure we leave a potential
leading ENDBR64 instruction intact on livepatch application.

The series also requires a change to generic livepatching code: we need
to make sure that the address of the patched function is known at the
time Xen tries to verify the livepatch for applicability, hence we need
to resolve this address before verifying the patch.

Bjoern Doebel (2):
  Livepatch: resolve old address before function verification
  xen/x86: Livepatch: support patching CET-enhanced functions

 xen/arch/x86/livepatch.c | 63 +++++++++++++++++++++++++++++++++++-----
 xen/common/livepatch.c   |  4 +--
 2 files changed, 57 insertions(+), 10 deletions(-)

-- 
2.32.0




Amazon Development Center Germany GmbH
Krausenstr. 38
10117 Berlin
Geschaeftsfuehrung: Christian Schlaeger, Jonathan Weiss
Eingetragen am Amtsgericht Charlottenburg unter HRB 149173 B
Sitz: Berlin
Ust-ID: DE 289 237 879





From xen-devel-bounces@lists.xenproject.org Mon Mar 07 11:54:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 11:54:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285881.485186 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRBwd-0005LF-U4; Mon, 07 Mar 2022 11:54:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285881.485186; Mon, 07 Mar 2022 11:54:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRBwd-0005Kx-Qp; Mon, 07 Mar 2022 11:54:31 +0000
Received: by outflank-mailman (input) for mailman id 285881;
 Mon, 07 Mar 2022 11:54:30 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=7T3K=TS=amazon.de=prvs=058ff0969=doebel@srs-se1.protection.inumbo.net>)
 id 1nRBwc-0004Lv-8O
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 11:54:30 +0000
Received: from smtp-fw-80006.amazon.com (smtp-fw-80006.amazon.com
 [99.78.197.217]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 56adcddc-9e0d-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 12:54:28 +0100 (CET)
Received: from pdx4-co-svc-p1-lb2-vlan3.amazon.com (HELO
 email-inbound-relay-iad-1a-2d7489a4.us-east-1.amazon.com) ([10.25.36.214])
 by smtp-border-fw-80006.pdx80.corp.amazon.com with ESMTP;
 07 Mar 2022 11:54:08 +0000
Received: from EX13D44EUB004.ant.amazon.com
 (iad12-ws-svc-p26-lb9-vlan2.iad.amazon.com [10.40.163.34])
 by email-inbound-relay-iad-1a-2d7489a4.us-east-1.amazon.com (Postfix) with
 ESMTPS id 8EB46A277F; Mon,  7 Mar 2022 11:54:05 +0000 (UTC)
Received: from EX13MTAUEA001.ant.amazon.com (10.43.61.82) by
 EX13D44EUB004.ant.amazon.com (10.43.166.198) with Microsoft SMTP Server (TLS)
 id 15.0.1497.28; Mon, 7 Mar 2022 11:54:04 +0000
Received: from dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (10.13.240.106)
 by mail-relay.amazon.com (10.43.61.243) with Microsoft SMTP Server id
 15.0.1497.28 via Frontend Transport; Mon, 7 Mar 2022 11:54:03 +0000
Received: by dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (Postfix,
 from userid 3160037)
 id 4E48D4E7F; Mon,  7 Mar 2022 11:54:03 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 56adcddc-9e0d-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646654069; x=1678190069;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=T4HQVwdD+Sp1df6ID2a/ASUAEQvXVBttAi63ggcy0Qg=;
  b=oqPK8vc+PN0FW5dmOzkrjNIO2hC8qvNtHVSV7ncHGGbsAHLeWuXzNre5
   WLmZE+qVdmG9aQhv6UxebDJkZ7NeQVvl4MB/LNHtOIfD+mpzjAGQkuUZR
   B0SnZuV0F0g+d/5AbHpgto6QXF/P/LwLU9k8lkt28Yux0jzX0b944bpqr
   A=;
X-IronPort-AV: E=Sophos;i="5.90,162,1643673600"; 
   d="scan'208";a="68586367"
From: Bjoern Doebel <doebel@amazon.de>
To: <xen-devel@lists.xenproject.org>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, Roger
 Pau Monne <roger.pau@citrix.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
	Bjoern Doebel <doebel@amazon.de>, Konrad Rzeszutek Wilk
	<konrad.wilk@oracle.com>, Ross Lagerwall <ross.lagerwall@citrix.com>
Subject: [PATCH 2/2] xen/x86: Livepatch: support patching CET-enhanced functions
Date: Mon, 7 Mar 2022 11:53:54 +0000
Message-ID: <deb5d86b20c02312023959bae06b0fe651a4b2f4.1646653825.git.doebel@amazon.de>
X-Mailer: git-send-email 2.32.0
In-Reply-To: <cover.1646653825.git.doebel@amazon.de>
References: <cover.1646653825.git.doebel@amazon.de>
MIME-Version: 1.0
Precedence: Bulk
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

Xen enabled CET for supporting architectures. The control flow aspect of
CET expects functions that can be called indirectly (i.e., via function
pointers) to start with an ENDBR64 instruction. Otherwise a control flow
exception is raised.

This expectation breaks livepatching flows because we patch functions by
overwriting their first 5 bytes with a JMP + <offset>, thus breaking the
ENDBR64. We fix this by checking the start of a patched function for
being ENDBR64. In the positive case we move the livepatch JMP to start
behind the ENDBR64 instruction.

To avoid having to guess the ENDBR64 offset again on patch reversal
(which might race with other mechanisms adding/removing ENDBR
dynamically), use the livepatch metadata to store the computed offset
along with the saved bytes of the overwritten function.

Signed-off-by: Bjoern Doebel <doebel@amazon.de>
CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
CC: Ross Lagerwall <ross.lagerwall@citrix.com>
----
Note that on top of livepatching functions, Xen supports an additional
mode where we can "remove" a function by overwriting it with NOPs. This
is only supported for functions up to 31 bytes in size and this patch
reduces this limit to 30 bytes.
---
 xen/arch/x86/livepatch.c | 63 +++++++++++++++++++++++++++++++++++-----
 1 file changed, 55 insertions(+), 8 deletions(-)

diff --git a/xen/arch/x86/livepatch.c b/xen/arch/x86/livepatch.c
index 65530c1e57..da7611c01d 100644
--- a/xen/arch/x86/livepatch.c
+++ b/xen/arch/x86/livepatch.c
@@ -14,11 +14,29 @@
 #include <xen/vm_event.h>
 #include <xen/virtual_region.h>
 
+#include <asm/endbr.h>
 #include <asm/fixmap.h>
 #include <asm/nmi.h>
 #include <asm/livepatch.h>
 #include <asm/setup.h>
 
+/*
+ * CET hotpatching support: We may have functions starting with an ENDBR64
+ * instruction that MUST remain the first instruction of the function, hence
+ * we need to move any hotpatch trampoline further into the function. For that
+ * we need to keep track of the patching offset used for any loaded hotpatch
+ * (to avoid racing against other fixups adding/removing ENDBR64 or similar
+ * instructions).
+ *
+ * We do so by making use of the existing opaque metadata area. We use its
+ * first 4 bytes to track the offset into the function used for patching and
+ * the remainder of the data to store overwritten code bytes.
+ */
+struct x86_livepatch_meta {
+    uint8_t patch_offset;
+    uint8_t instruction[LIVEPATCH_OPAQUE_SIZE - sizeof(uint8_t)];
+};
+
 static bool has_active_waitqueue(const struct vm_event_domain *ved)
 {
     /* ved may be xzalloc()'d without INIT_LIST_HEAD() yet. */
@@ -104,18 +122,36 @@ void noinline arch_livepatch_revive(void)
 
 int arch_livepatch_verify_func(const struct livepatch_func *func)
 {
+    BUILD_BUG_ON(sizeof(struct x86_livepatch_meta) != LIVEPATCH_OPAQUE_SIZE);
+
     /* If NOPing.. */
     if ( !func->new_addr )
     {
+        struct x86_livepatch_meta *lp;
+
+        lp = (struct x86_livepatch_meta *)func->opaque;
         /* Only do up to maximum amount we can put in the ->opaque. */
-        if ( func->new_size > sizeof(func->opaque) )
+        if ( func->new_size > sizeof(lp->instruction) )
             return -EOPNOTSUPP;
 
         if ( func->old_size < func->new_size )
             return -EINVAL;
     }
-    else if ( func->old_size < ARCH_PATCH_INSN_SIZE )
-        return -EINVAL;
+    else
+    {
+        /*
+         * Space needed now depends on whether the target function
+         * starts with an ENDBR64 instruction.
+         */
+        uint8_t needed;
+
+        needed = ARCH_PATCH_INSN_SIZE;
+        if ( is_endbr64(func->old_addr) )
+            needed += ENDBR64_LEN;
+
+        if ( func->old_size < needed )
+            return -EINVAL;
+    }
 
     return 0;
 }
@@ -127,15 +163,21 @@ int arch_livepatch_verify_func(const struct livepatch_func *func)
 void noinline arch_livepatch_apply(struct livepatch_func *func)
 {
     uint8_t *old_ptr;
-    uint8_t insn[sizeof(func->opaque)];
+    struct x86_livepatch_meta *lp;
+    uint8_t insn[sizeof(lp->instruction)];
     unsigned int len;
 
+    lp = (struct x86_livepatch_meta *)func->opaque;
+    lp->patch_offset = 0;
     old_ptr = func->old_addr;
     len = livepatch_insn_len(func);
     if ( !len )
         return;
 
-    memcpy(func->opaque, old_ptr, len);
+    if ( is_endbr64(old_ptr) )
+        lp->patch_offset += ENDBR64_LEN;
+
+    memcpy(lp->instruction, old_ptr + lp->patch_offset, len);
     if ( func->new_addr )
     {
         int32_t val;
@@ -143,14 +185,15 @@ void noinline arch_livepatch_apply(struct livepatch_func *func)
         BUILD_BUG_ON(ARCH_PATCH_INSN_SIZE != (1 + sizeof(val)));
 
         insn[0] = 0xe9; /* Relative jump. */
-        val = func->new_addr - func->old_addr - ARCH_PATCH_INSN_SIZE;
+        val = func->new_addr - (func->old_addr + lp->patch_offset
+                                + ARCH_PATCH_INSN_SIZE);
 
         memcpy(&insn[1], &val, sizeof(val));
     }
     else
         add_nops(insn, len);
 
-    memcpy(old_ptr, insn, len);
+    memcpy(old_ptr + lp->patch_offset, insn, len);
 }
 
 /*
@@ -159,7 +202,11 @@ void noinline arch_livepatch_apply(struct livepatch_func *func)
  */
 void noinline arch_livepatch_revert(const struct livepatch_func *func)
 {
-    memcpy(func->old_addr, func->opaque, livepatch_insn_len(func));
+    struct x86_livepatch_meta *lp;
+
+    lp = (struct x86_livepatch_meta *)func->opaque;
+
+    memcpy(func->old_addr + lp->patch_offset, lp->instruction, livepatch_insn_len(func));
 }
 
 /*
-- 
2.32.0




Amazon Development Center Germany GmbH
Krausenstr. 38
10117 Berlin
Geschaeftsfuehrung: Christian Schlaeger, Jonathan Weiss
Eingetragen am Amtsgericht Charlottenburg unter HRB 149173 B
Sitz: Berlin
Ust-ID: DE 289 237 879





From xen-devel-bounces@lists.xenproject.org Mon Mar 07 11:57:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 11:57:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285906.485199 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRBzb-0006wf-H7; Mon, 07 Mar 2022 11:57:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285906.485199; Mon, 07 Mar 2022 11:57:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRBzb-0006wY-De; Mon, 07 Mar 2022 11:57:35 +0000
Received: by outflank-mailman (input) for mailman id 285906;
 Mon, 07 Mar 2022 11:57:34 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=7T3K=TS=amazon.de=prvs=058ff0969=doebel@srs-se1.protection.inumbo.net>)
 id 1nRBza-0006wS-CJ
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 11:57:34 +0000
Received: from smtp-fw-6001.amazon.com (smtp-fw-6001.amazon.com [52.95.48.154])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c4fcedff-9e0d-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 12:57:32 +0100 (CET)
Received: from iad12-co-svc-p1-lb1-vlan3.amazon.com (HELO
 email-inbound-relay-iad-1e-98691110.us-east-1.amazon.com) ([10.43.8.6])
 by smtp-border-fw-6001.iad6.amazon.com with ESMTP; 07 Mar 2022 11:57:31 +0000
Received: from EX13D03EUC002.ant.amazon.com
 (iad12-ws-svc-p26-lb9-vlan3.iad.amazon.com [10.40.163.38])
 by email-inbound-relay-iad-1e-98691110.us-east-1.amazon.com (Postfix) with
 ESMTPS id 7907F84DAE; Mon,  7 Mar 2022 11:57:30 +0000 (UTC)
Received: from [10.139.202.10] (10.43.166.120) by EX13D03EUC002.ant.amazon.com
 (10.43.164.60) with Microsoft SMTP Server (TLS) id 15.0.1497.28;
 Mon, 7 Mar 2022 11:57:29 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c4fcedff-9e0d-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646654253; x=1678190253;
  h=message-id:date:mime-version:subject:to:cc:references:
   from:in-reply-to:content-transfer-encoding;
  bh=J8FaHJ6I9RVAxdIwCsNyUerpw7N9nZiCzxq2KCUfZHw=;
  b=E2hIQee+sKAPt2IvXvxsgTYhYKHlipa2hKjcfkTPMD17IBubYj6uboLM
   gK8a47HUOrkPf8HA67jUehRbJEzve8g862XQ3DYTa8S8YqPvqjcYEu0AU
   JVRIw1n1pu3V5zihG/7eRRAJW3jUtM4N4Ol/HXzA6DlIAFpI4fr29hsZB
   8=;
X-IronPort-AV: E=Sophos;i="5.90,162,1643673600"; 
   d="scan'208";a="183655464"
Message-ID: <6d901e58-b7ee-8631-b23c-bbbeaf2dda7b@amazon.de>
Date: Mon, 7 Mar 2022 12:57:28 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH 1/1] xen/x86: Livepatch: support patching CET-enhanced
 functions
Content-Language: en-US
To: <xen-devel@lists.xenproject.org>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, Roger
 Pau Monne <roger.pau@citrix.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>, Ross Lagerwall
	<ross.lagerwall@citrix.com>
References: <cover.1646653822.git.doebel@amazon.de>
 <deb5d86b20c02312023959bae06b0fe651a4b2f4.1646653822.git.doebel@amazon.de>
From: "Doebel, Bjoern" <doebel@amazon.de>
In-Reply-To: <deb5d86b20c02312023959bae06b0fe651a4b2f4.1646653822.git.doebel@amazon.de>
X-Originating-IP: [10.43.166.120]
X-ClientProxiedBy: EX13D08EUC002.ant.amazon.com (10.43.164.124) To
 EX13D03EUC002.ant.amazon.com (10.43.164.60)
Precedence: Bulk
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: base64
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From xen-devel-bounces@lists.xenproject.org Mon Mar 07 12:00:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 12:00:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285912.485212 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRC1y-0007ea-2h; Mon, 07 Mar 2022 12:00:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285912.485212; Mon, 07 Mar 2022 12:00:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRC1x-0007eK-RG; Mon, 07 Mar 2022 12:00:01 +0000
Received: by outflank-mailman (input) for mailman id 285912;
 Mon, 07 Mar 2022 12:00:00 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRC1w-0007Xl-Eo; Mon, 07 Mar 2022 12:00:00 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRC1w-0003JV-Ai; Mon, 07 Mar 2022 12:00:00 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRC1v-0000wb-Tv; Mon, 07 Mar 2022 12:00:00 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRC1v-0008HC-TT; Mon, 07 Mar 2022 11:59:59 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=rMhuHXq7ktGqHGvD1Tkp3rMKnqK+tP24qJFZ95wuyEM=; b=Wz8NnAmwzQve++fzaiS7sd9KnR
	1YZONcCfCjAgK09QuVeqfT+LFkfA9b8nvLs6hMk8WTgNR/HS13BK1wm0wNj70Ji+McNJOe+qfet2/
	O7Zqvex0DatnVaYL9JSUNkmPEbybA0I3wZBaCnBJmyVU0xocz5pSGMXPXls91vki/Khs=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168450-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168450: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl-rtds:guest-localmigrate/x10:fail:allowable
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=ffb217a13a2eaf6d5bd974fc83036a53ca69f1e2
X-Osstest-Versions-That:
    linux=3ee65c0f0778b8fa95381cd7676cde2c03e0f889
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 07 Mar 2022 11:59:59 +0000

flight 168450 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168450/

Failures :-/ but no regressions.

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-rtds     20 guest-localmigrate/x10   fail REGR. vs. 168442

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168442
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168442
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168442
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168442
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168442
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168442
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168442
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168442
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                ffb217a13a2eaf6d5bd974fc83036a53ca69f1e2
baseline version:
 linux                3ee65c0f0778b8fa95381cd7676cde2c03e0f889

Last test of basis   168442  2022-03-06 20:41:04 Z    0 days
Testing same since   168450  2022-03-07 02:33:49 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Linus Torvalds <torvalds@linux-foundation.org>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     fail    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   3ee65c0f0778..ffb217a13a2e  ffb217a13a2eaf6d5bd974fc83036a53ca69f1e2 -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 12:00:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 12:00:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285921.485222 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRC2M-0000Ty-ND; Mon, 07 Mar 2022 12:00:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285921.485222; Mon, 07 Mar 2022 12:00:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRC2M-0000Tr-Ji; Mon, 07 Mar 2022 12:00:26 +0000
Received: by outflank-mailman (input) for mailman id 285921;
 Mon, 07 Mar 2022 12:00:25 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRC2L-0000TS-31; Mon, 07 Mar 2022 12:00:25 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRC2L-0003NY-2L; Mon, 07 Mar 2022 12:00:25 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRC2K-0000x9-Nf; Mon, 07 Mar 2022 12:00:24 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRC2K-0008JB-NC; Mon, 07 Mar 2022 12:00:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=yNagPRNemvYNaKswRtIM/kapNxpgoJaapA/G7YR/66g=; b=ZbqegoFHBFzysmfw92ZfCOp3Wu
	b0UdhjHgZuy7V2Tc4K045s244PiccddvjEuMWo9m5LFIogxdMvSZd2nTlJR2VVJ+zpCTJgaufuBz3
	az6H8hpiUDZsJYGWMLSn9bNID7YEsglNcAeLKqq1YEPK8GbfCbf4DyqJFJkzCsd26NR4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168457-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168457: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=79f2734e5a7bc2e5256eb0e599f45407855159c7
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 07 Mar 2022 12:00:24 +0000

flight 168457 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168457/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 79f2734e5a7bc2e5256eb0e599f45407855159c7
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    7 days
Failing since        168258  2022-03-01 01:55:31 Z    6 days   68 attempts
Testing same since   168449  2022-03-07 02:15:20 Z    0 days    6 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 437 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 12:04:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 12:04:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285942.485232 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRC6D-0001NL-8k; Mon, 07 Mar 2022 12:04:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285942.485232; Mon, 07 Mar 2022 12:04:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRC6D-0001NE-5V; Mon, 07 Mar 2022 12:04:25 +0000
Received: by outflank-mailman (input) for mailman id 285942;
 Mon, 07 Mar 2022 12:04:24 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRC6C-0001N4-Eq; Mon, 07 Mar 2022 12:04:24 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRC6C-0003Qf-DJ; Mon, 07 Mar 2022 12:04:24 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRC6C-000131-6O; Mon, 07 Mar 2022 12:04:24 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRC6C-0000ZK-5s; Mon, 07 Mar 2022 12:04:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=e973F+RK9nPRN04jkmk4LaiFrY9DF30G2ShO3dYNNao=; b=YiI2Zj+tEUh+Lh29HFDuUS4mIQ
	gkVaZI0ZCnklQ0x8o7F2T/qTbxgwAUyMsu4qrYahKcQLhJO4SekeGhu3FIpxkT1fc/AAOd2fTzo3t
	VJ+UZ6F+WUYzT5osxQWCnq6zoF4XGH14V96xjfzITUlAZEJCdu8FGbj0dfdPqTfP3br8=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168452-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168452: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=86c691e6dedc1cfb487eb1e1651c0600cc567ea9
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 07 Mar 2022 12:04:24 +0000

flight 168452 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168452/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              86c691e6dedc1cfb487eb1e1651c0600cc567ea9
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  605 days
Failing since        151818  2020-07-11 04:18:52 Z  604 days  586 attempts
Testing same since   168413  2022-03-05 04:19:02 Z    2 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 99598 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 12:18:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 12:18:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285955.485243 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRCJT-00037d-KK; Mon, 07 Mar 2022 12:18:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285955.485243; Mon, 07 Mar 2022 12:18:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRCJT-00037W-HM; Mon, 07 Mar 2022 12:18:07 +0000
Received: by outflank-mailman (input) for mailman id 285955;
 Mon, 07 Mar 2022 12:18:06 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=NixE=TS=citrix.com=prvs=05809d0ec=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nRCJR-00037Q-Ov
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 12:18:06 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a1c93b85-9e10-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 13:18:03 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a1c93b85-9e10-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646655483;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=Qh3cHb5mreaFkEXdWWDpEitO5nyXMiy2B62z+zdAVis=;
  b=WdfJTxqU3/04jNQZY5+ESAvsTcsnBrf5zKXahQjZf8IG7kWtWwHUvA6S
   irdkEK3JaR6KPALE4nMS0PBo5DnDv3sWTdfjVl0iEaFm1rR9mwLLDTMvE
   FfiY44M/qlbQcsXcj5wlawkrIL7hZGGlOzTMGs6iPqU0Qm2AjKkfqmkeM
   4=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65610455
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:kS62zaIJAPbY/tB4FE+RfJUlxSXFcZb7ZxGr2PjKsXjdYENShmNRy
 WZMUW2GOP/eYmWjKo0kaYvi8EMBup/VmoNhSQVlqX01Q3x08seUXt7xwmUcns+xwm8vaGo9s
 q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUYYoAQgsA148IMsdoUg7wbRh2dY32YLR7z6l4
 rseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3fMldG0DQUIhMdtNWc
 s6YpF2PEsE1yD92Yj+tuu6TnkTn2dc+NyDW4pZdc/DKbhSvOkXee0v0XRYRQR4/ttmHozx+4
 O92u5ewYCNxB7ySxs1MCAABGAVjIqITrdcrIVDn2SCS50jPcn+qyPRyFkAme4Yf/46bA0kXq
 6ZecmpUKEne2aTmm9pXScE17ignBOviOo5Zn3hkxDXQC/sOSpHfWaTao9Rf2V/cg+gQQKiHP
 5ZENFKDajz9WBF9fWszAalls96op3T2WQAA63OK8P9fD2/7k1UqjemF3MDuUtaHX9lPl0CU4
 GfP5X3kAwoyPcaajzGC9xqEuOjLmi/qXZMII5ex/PVqnV67y3QaDVsdUl7TifukjAi4UtFWK
 U0R8wIvq7Q/8AqgSdyVdw21pjuIswARX/JUEvYm80edx6zM+QGbC2MYCDlbZ7QOt8IoRDpsy
 l6AmfvoAyBitPueTnf13qiQhSO/P24SN2BqTS0OQBYB4tLjiJoulR+JRdFmeIa3gcfyAirY2
 C2RoW41gLB7pdUQy6yx8FTDgjStjpvEVAg44kPQRG3NxgFkYI+oYaS45F6d6uxPRLt1VXHY4
 iJCwZLHqrlTU9fdz0RhXdnhApmT3PiOMBT42Wd+QccIpm+0onWHYJ9ftWQWyFhSDu4IfjrgY
 Un2sAxX5YNOMHbCUZKbc75dGOxxk/G+SI2NuuT8K4MXP8MvLFPvEDRGOBbIt10BhnTAhk3W1
 X2zVc+3RUgXBq18pNZdb7dMiOR7rszSKI66eHwa8/hF+efEDJJ2Ye1cWLdrUgzexPnYyDg5C
 /4Fa6O3J+x3CYUSmBX//48JNkwtJnMmH53woME/XrfdflQ7ST95VKSBke9Jl2lZc0N9zLugw
 51AchUAlAqXaYPvc21mlUyPmJuwBM0i/BrXzAQnPEqy2mhLXGpcxPx3SnfDRpF+rLYL5actF
 5EtIpzcatwSGmWv02lMNvHV8d09HClHcCrTZkJJlhBkJMU+L+EIk/e5FjbSGN4mVXLm5ZNj+
 OT7jms2g/MrHmxfMSofU9r2p3uZtnkBguNiGUzOJ9hYYkL394Z2bSf2i5cKzwskcH0vGhPyO
 96qPCol
IronPort-HdrOrdr: A9a23:sz5N96qGPc65VJLgsvfThGwaV5uEL9V00zEX/kB9WHVpm5Oj+f
 xGzc516farslossSkb6Ky90KnpewK5yXbsibNhc4tKLzOWx1dAS7sSrLcKogeQVBEWk9Q96U
 4OSdkHNDSdNykZsS++2njELz9C+qjGzEnLv5ak854Fd2gDAMsMj3YbNu/YKDwNeOAvP+tiKH
 P23Lshm9PUQwVvUi3NPAhiYwGsnayvqLvWJTo9QzI34giHij2lrJTgFQKD4xsYWzRThZ8/7G
 nsiWXCl+aemsD+7iWZ+37Y7pxQltek4MBEHtawhs8cLSipohq0Zb5mR6aJsFkO0aOSARcR4Z
 zxSiUbToNOAkDqDyeISNzWqlDdOQMVmjvfIJmj8CPeSILCNWkH4oF69Pxkm1PimjsdVZdHof
 92NiuixupqJAKFkyLn69fSURZ20kKyvHo5iOYWy2dSSI0EddZq3MYiFexuYeM99Q/Bmcga+d
 NVfYrhDTdtACSnRmGcunMqzM2nX3w1EBvDSk8eutaN2zwTmHxi1UMXyMEWg39FrfsGOtV5zv
 WBNr4tmKBFT8cQY644DOAdQdGvAmiIRR7XKmqdLVnuCalCMXPQrJz85qkz+YiRCdE15Yp3nI
 6EXEJTtGY0dU6rAcqS3IdT+hSIW2m5VSSF8LAW23G4gMyLeFPGC1zwdLl1qbrSnxw2OLyvZ8
 qO
X-IronPort-AV: E=Sophos;i="5.90,162,1643691600"; 
   d="scan'208";a="65610455"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=hMDhT/NjEwvarhOO2aKrSJMnq++Lu17JqHty5zl2wcTuWn3cCydmst4cK4y5qrpwO/3Rt5juGAAqBUnxqW4rqutR/n0o+OcR8Tc5YpeGUChYdSBr4FwtPyJw0E7sC9fCzZaQSbEgOTFU+s+QI/lL8guELywOmW8uy1C5WmHy8NmLwd9ieh1s2KHnWFsP2jxGZrPQ3oI3aq0wrCB8BzvEZqUGwCcuJ+wJ4oo3MY1v/lsNqXX3UOZrPYv52LpdTn16NTK5Rm7D/ZXtJxneFLjvxI0C7XnXSCLWyXVoldwP6D1qTdbFPqN7CeFMlm+D94aH6RRXN+N8/SfW3FhsDntdpA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Qh3cHb5mreaFkEXdWWDpEitO5nyXMiy2B62z+zdAVis=;
 b=QU5Rxi+wEoP+vv1npxYl+BprJRA1Y865H1VQaX5aNjzNz6v1rmNMOcQz6nqo3RsHx+3Nv2PYLgMrj48oNf/zfoykFCD6UxFGDXTPVJhXdqBO0z1jT/Y0YCl/W0I4vpqRhutT/lJ0CSxVQF+AU/CAK6FprOts6IV1C0labgPBGtxzNofqCu2Xl4DGU6ZGsuqC7btpkDlCpiAt8miDDCVEuvL5+TA9R9AJYinuf4nFjaCKM54PeyRjzj9TrxcSyHUt0C1yB8wES2fJBnjUl96Cd4b1bUsTjr3fJvm9d/2F3yZ7/N0ObUvhDTh0IMQY/7Ccfr47Wg5fFl8ska6AdgQZqA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Qh3cHb5mreaFkEXdWWDpEitO5nyXMiy2B62z+zdAVis=;
 b=Jnb/H3ArwEWab2nCrPmWc/p8d5zpzVoOyG+Ray62eyxsaYwLwerNuEe3d7aHlHZsxTTxesvkW0v2YRl5WFu7rPFHV7lAfincJbERsII0gzpRPxDk9IDJxwfluN1uB5+GVDSE1LySN2xAYsFNjMEfXZMR3T60CrMCKlH3vZkewto=
From: Jane Malalane <Jane.Malalane@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Wei Liu <wl@xen.org>, Anthony Perard <anthony.perard@citrix.com>, "Juergen
 Gross" <jgross@suse.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>, "George
 Dunlap" <George.Dunlap@citrix.com>, Julien Grall <julien@xen.org>, "Stefano
 Stabellini" <sstabellini@kernel.org>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>, Bertrand Marquis <bertrand.marquis@arm.com>,
	Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian <kevin.tian@intel.com>,
	Roger Pau Monne <roger.pau@citrix.com>, Xen-devel
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v4 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Thread-Topic: [PATCH v4 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Thread-Index: AQHYLkaMjdZBkrS3CkWZwGsOatNz36ytiXSAgABT+oCAAQaGAIAE+jyA
Date: Mon, 7 Mar 2022 12:17:56 +0000
Message-ID: <ee556d51-bcf7-5749-6e3a-92d1ec3092f9@citrix.com>
References: <20220302150056.14381-1-jane.malalane@citrix.com>
 <20220302150056.14381-2-jane.malalane@citrix.com>
 <240602ab-412c-8607-ed6c-916cf37343f7@suse.com>
 <67296830-aa16-4231-69ba-f07d2b1a4b65@citrix.com>
 <fa957ce7-07f8-9726-9537-8b05e9b6d76e@suse.com>
In-Reply-To: <fa957ce7-07f8-9726-9537-8b05e9b6d76e@suse.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: f36e3296-8899-476b-6cd4-08da00348334
x-ms-traffictypediagnostic: CO6PR03MB6305:EE_
x-ld-processed: 335836de-42ef-43a2-b145-348c2ee9ca5b,ExtAddr
x-microsoft-antispam-prvs: <CO6PR03MB6305CF27903F9294507C0F0C81089@CO6PR03MB6305.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM5PR03MB3386.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(186003)(6512007)(2906002)(7416002)(86362001)(71200400001)(26005)(316002)(6916009)(54906003)(2616005)(82960400001)(38100700002)(6486002)(122000001)(83380400001)(31696002)(66556008)(66476007)(64756008)(8676002)(66946007)(76116006)(66446008)(4326008)(38070700005)(508600001)(91956017)(53546011)(36756003)(31686004)(5660300002)(8936002)(6506007)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?cUxrYU4vb3dLaHkvMWhzbnNGYkgzUzNHMVhOeHV1Y1NpRDlXMW9qT3RzME1V?=
 =?utf-8?B?dzIvZHRmejA5cEdiMGk2SkpMTjV5SnB5V1hFcDJRK1ZQdXd5ckFRbDBZTEsr?=
 =?utf-8?B?RThUMnh5ajhvNW9lM2FCejhGc1dxbDE1UEpnVUFWY1BuTURqQTBpM21xemVu?=
 =?utf-8?B?ZndSODQ1OU5oenhLdjdMRnl2R29XbjBVazRndFhETDU2SithVjdkemFtQ0FH?=
 =?utf-8?B?WnZsOTJRWXIxbFQvL0hXaWVzZlM1bWxsNTVncm1HOUFqdmRJSzNZdndMMnl0?=
 =?utf-8?B?M0crUzh3SndSNFR0V3NDRlY4dThnU2NWY0hORThFZEtISHVoaHYzK0xoRFFw?=
 =?utf-8?B?RFZRRWp0emhHZEFnUmY1RGRHZ2dUTlYvTEVHdnl1dmVKZGNRQUxvRGdGYmtF?=
 =?utf-8?B?RUJpVUswbmtxMFZoSjNZc3FFL0daZDdPbUEvWi90WndEckhsU2JaZVpGdnJo?=
 =?utf-8?B?dEw1TTljU0VURE9MQ09MQXVaWTZ1cmJoNzFYTUJuOFdVU2FRdnQ4enh3WENU?=
 =?utf-8?B?RW5wUmRYeHFtT3UwK2pwYW5tVy9pM2NSbStucnB5OXExd2JwSnE1QmJlSWN2?=
 =?utf-8?B?dTZFYUplT1hRb0tvZmRXaGpiSHhsN0M4bkhwVXZEcWpnaWg4T3pldXRIUmxw?=
 =?utf-8?B?Sk94Z1pYaHVUSXNLOUFmYjllN2VUUXZ4UXU4cW5OZXhyd2s4UGdrR1luTDZp?=
 =?utf-8?B?LzVCcndGbzRjUVp5Qis1aTZqRXEwNkh3ZjdMK2c1NnRkNVFkL0hhRGJuRFFL?=
 =?utf-8?B?N2pXTFRwM1FUMTJGMXdhTXU0ckJjaUdEWVVNNksrWktDK3NYcy9YR01IeCsy?=
 =?utf-8?B?am5oOXdwMlZrV0E0bFNsNlNWK2VaZUxMRkZ1TnJBV2ZjdGV6czhNS3BZV2xp?=
 =?utf-8?B?aEVwZFd1aTJQcnBKSDlzOG9zRjBJeWpWeDYyeXRvcnZXeFE5K1FYeFJUYVNv?=
 =?utf-8?B?SG9Ia3dUQk5mNFdRZGNDdzVZRWFCRGVHRHI5Y1NXZWpwQUI4NVptRTF6dWl1?=
 =?utf-8?B?VysyOWJLRzRrTlArQTBnQytLSTRzTTJ6N1BqUVJJLy9IcXl6UnFQekxQN0lo?=
 =?utf-8?B?K2lwa00xU0tiUEt0emFjdVZMZlFVcmw1OVhwN1FNeU9FNUhtQzk1dTJYTy9h?=
 =?utf-8?B?VVJPbnlOOXFkYVhBb2lCQTBwODBtZkdVM1pDWGtmYlcrREhlUWFwRmRlTDN3?=
 =?utf-8?B?anIrTngwZGJ6ME1GUU9kVE5NVFg4MlFuSTUycG9oZlJVTlBIaWhHV1RJZmN0?=
 =?utf-8?B?clN3VUNDMmxvNi9lQjJXdkVyazdDeG9YdUM4U3BuR3dEVVpsQmZzay9INXdB?=
 =?utf-8?B?WWJCdXBzbmdMclJPZ1JobkE0am9JRFZ1MDBnbWRqUG5aYnVRekhCK2dpRFc0?=
 =?utf-8?B?Y3JFdlJXM2xQLzRQSE5TSEcwUitSWWN6TDZZeEo0S0o2MlgzbjhYQzBwbGVJ?=
 =?utf-8?B?TkIyZm1wSVFqaW45azZoZ3Y3L1dRTFJZdVVwcmVlR2MxUnY4L1E4dkw1TDVQ?=
 =?utf-8?B?VVl2amtrRUM1WDl4SkRDZktBY2Zab1FyNndpSW5yM3c0VGhMb0hraVdGanVy?=
 =?utf-8?B?cDRFSjJBcmExc1RWZzVHRDFSclVPWnhOdW1GcXhTTzkwT3AzUVNNbHJFZHd2?=
 =?utf-8?B?cUhwRUxLSmdNUVh4Zyt2a2Q3cXFRbzY5WGhkeGxpb0JuYUdkVjBNYzNKc2lT?=
 =?utf-8?B?cXI2UzlyY3UzQ1AwcjlmNDhQM1VJL1BOQXNaZFJFODRUaE5BajdlVmpkVkZs?=
 =?utf-8?B?aGVrYWZ0N1BPcU9GZkRlNURtcUdWTFBqNjdTdlhYWGFxeHRYOTVFaHdQd2t3?=
 =?utf-8?B?Qm9Ka0VML1hEZzR0MExqWUhzZHZZMFRmdXFUdlNGbWtwcmZiVUlGbEhzWjdF?=
 =?utf-8?B?UXFSZVdzMUN6UzRvRUo4bHQyVFk4SFJOTEZvN1FkVGtMeXgya2FQdkRpMDBp?=
 =?utf-8?B?a1ZFYU9JM3hKRFdqVTNIbk9UY2dOM1o0NzV6Q3JMSG8vbk5oNmZGQUphMjha?=
 =?utf-8?B?SlJZNDdiU1czS2xQSFZNbmhLSk5WSC80a1FRVzJMaGQ4dWppblM3QnVHc0dW?=
 =?utf-8?B?V0dleTFuK1lKejdJV0d6UUpxeEtiNUl3blpLbUEyTTJmU3ZoaUNCNlkxOTF5?=
 =?utf-8?B?NGJRcG5BL1ZzVThXck5LSmEvQ0U2R2FBZjRZbW1uQWZINUZ2UlpQc055YlpJ?=
 =?utf-8?B?ejNaOWtmZC9sLytCR3k4bThRakVLN2hoTmd0R2QzZkdTT1NkQmhRaXNKUnM4?=
 =?utf-8?Q?I7ScLU60hG4LeSjvkROFhsmsNTfLuzKxALftkQ85ds=3D?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <753937CDAE629A478C60758B884A0752@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM5PR03MB3386.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f36e3296-8899-476b-6cd4-08da00348334
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Mar 2022 12:17:56.3397
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ZxRNgJ0r1dHxLOcT4n2/2HNGpu7Gc3Zd5ZIYbjwXqIaCM29rvah1fUDQ7lcR1n/o4+R1cONIzAELlsZOWP+B5B+Fth4ru/zZ1D2laFCQP+o=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO6PR03MB6305
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Mon Mar 07 12:30:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 12:30:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285961.485255 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRCVo-0005S9-QU; Mon, 07 Mar 2022 12:30:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285961.485255; Mon, 07 Mar 2022 12:30:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRCVo-0005S2-ML; Mon, 07 Mar 2022 12:30:52 +0000
Received: by outflank-mailman (input) for mailman id 285961;
 Mon, 07 Mar 2022 12:30:51 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRCVn-0005Rs-GT; Mon, 07 Mar 2022 12:30:51 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRCVn-0003tK-Em; Mon, 07 Mar 2022 12:30:51 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRCVm-0001bp-U4; Mon, 07 Mar 2022 12:30:51 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRCVm-0007SG-TZ; Mon, 07 Mar 2022 12:30:50 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=xH1H1MIKtHnnf0fTrzlk7Vao8KUR1kRhQx35KbbOVPs=; b=fudXeFIifi3VL5T8fSxmffChFQ
	EsQu1SPxFmd+TKnPAnRuyLDSDp+wDZtma5Ng7VtXotxryGyT8YErFHpTCgC6jzld9+eF6crBPhV7B
	CugwckiBR68UEHW44vdPEsXH6CYHjmcmOz7EShayh587vPPJ9rQBYmg1zmFhIDJ9jGnc=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168458-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168458: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=79f2734e5a7bc2e5256eb0e599f45407855159c7
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 07 Mar 2022 12:30:50 +0000

flight 168458 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168458/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 79f2734e5a7bc2e5256eb0e599f45407855159c7
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    7 days
Failing since        168258  2022-03-01 01:55:31 Z    6 days   69 attempts
Testing same since   168449  2022-03-07 02:15:20 Z    0 days    7 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 437 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 12:31:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 12:31:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285971.485269 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRCWY-000617-5p; Mon, 07 Mar 2022 12:31:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285971.485269; Mon, 07 Mar 2022 12:31:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRCWY-000610-1b; Mon, 07 Mar 2022 12:31:38 +0000
Received: by outflank-mailman (input) for mailman id 285971;
 Mon, 07 Mar 2022 12:31:37 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRCWX-0005qx-2x
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 12:31:37 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 86fb9e73-9e12-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 13:31:35 +0100 (CET)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04lp2052.outbound.protection.outlook.com [104.47.12.52]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-28-8V8-EMFpN8Siq06a9EicJg-2; Mon, 07 Mar 2022 13:31:34 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR04MB5298.eurprd04.prod.outlook.com (2603:10a6:208:c3::20)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.23; Mon, 7 Mar
 2022 12:31:27 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 12:31:23 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 86fb9e73-9e12-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646656295;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=OX8+mQGx/S0OPfBxV04yPiNt/DoaGgGSTLZ/OoAajj4=;
	b=WWPMaBwcLqxk7Yxuk2JtSnPsts3TQ4dU4PhMnu9R0vgGrDAlkBrM8M9ybNSmT3Myx4QcKB
	osHN3jcSIORb6qFVymaW5K1pdW1VCfGKSDozQjta64FT0CvgVpeuAf6XW9W8KfcP9m5RE/
	V0VBvjNPM5c1gzfZZEviZK2CxaI5fN0=
X-MC-Unique: 8V8-EMFpN8Siq06a9EicJg-2
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=D2ORbTD25SHIKuT/RB9wO4GdXCq/p9tSipSO06hpxcRPiIKTdPmYDH6jGIiEEqOASxnaFTgZcGHyGRuAN/9XGAdlHc2Ee1IZv6Cd2l9gE9YGS9EjG1qLQwCPSLTN0tpddFrWBWRFSR9J3VSVAh3awJWN4VvUXfSIvOn7LADjnIDwEgiMn/zljRJxn5LsQlKQdNmVW5F/3Yyj9D05t7wac2tg2QzGNrlp3GSt5HkEEVmORE1X4fPcaRO0wmBwX32f2Wx6Jy/+Uw3GdlG1b/kHlP9H5Hq3CJDSAW6JDl0+66/pzPtFBldtDW+OpLgecbl/UhqEtnVVBWR/neCWbpTSLA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=OX8+mQGx/S0OPfBxV04yPiNt/DoaGgGSTLZ/OoAajj4=;
 b=KL0qWW+QlUsuLJZrN5dq7WBj8Xf2QglDzu/lNP0tagFy/fhY0f0EVhu9UJQMfqAEBJ1qVUkpHEJDdKloEpDHRvk9Hi6lhrmBqhORbECM6LJu8zHiMiR8mNAq0NUBftGxp3msu25nMFcddSDuPmx7x2e3FDuGN4w8RzY0ZLLx5ASS79iksm9nCYhYyqfFfiCqCqBU7RRs5pYFFfUZb/UUi+mgftJLxcohH86lRGUCVHZUnVnYvfH8TdPJCYD7dy6uC1ETppoTzV+IkTcLBQFjVEM6ep0e3pQ3MsupmBWmKlAwcemzmf9iWDvCgnetPUN3wkRJYCAdftnL3qv+NdxIWg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <299a0fe4-e7c0-b381-4318-a27f02c96d98@suse.com>
Date: Mon, 7 Mar 2022 13:31:24 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v4 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Content-Language: en-US
To: Jane Malalane <Jane.Malalane@citrix.com>
Cc: Wei Liu <wl@xen.org>, Anthony Perard <anthony.perard@citrix.com>,
 Juergen Gross <jgross@suse.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
 George Dunlap <George.Dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian <kevin.tian@intel.com>,
 Roger Pau Monne <roger.pau@citrix.com>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <20220302150056.14381-1-jane.malalane@citrix.com>
 <20220302150056.14381-2-jane.malalane@citrix.com>
 <240602ab-412c-8607-ed6c-916cf37343f7@suse.com>
 <67296830-aa16-4231-69ba-f07d2b1a4b65@citrix.com>
 <fa957ce7-07f8-9726-9537-8b05e9b6d76e@suse.com>
 <ee556d51-bcf7-5749-6e3a-92d1ec3092f9@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <ee556d51-bcf7-5749-6e3a-92d1ec3092f9@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM5PR0701CA0004.eurprd07.prod.outlook.com
 (2603:10a6:203:51::14) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 443e85ec-d25d-4043-9d62-08da00366402
X-MS-TrafficTypeDiagnostic: AM0PR04MB5298:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB52987DE3F26EC850D290EAFAB3089@AM0PR04MB5298.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(83380400001)(5660300002)(36756003)(7416002)(6486002)(2616005)(8936002)(6506007)(31686004)(6512007)(508600001)(53546011)(54906003)(6916009)(186003)(66946007)(4326008)(316002)(26005)(66556008)(66476007)(38100700002)(86362001)(31696002)(2906002)(8676002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?ZndUa2d0eWtTME1WOG9Fa2ZHeWFnQXRMZTFlK3BVNUpXWWRGRjhJcVJFdWRz?=
 =?utf-8?B?cllKTTFKRjVVYWxZZGFKQlAxNUFseWczY1JmcUE1NWVTSjBvQmZ6NjJCcjlh?=
 =?utf-8?B?clhNWExLNjVUaXZlVDBScE5lbjl4OExBOG5WRUZQQUxEUk5hVlAvc3JKOGhG?=
 =?utf-8?B?aE83Y1QzR0FrcWlVeTJTaGdmclhyUUxSNmtTTXF1cStUMzhJemxaeENsT3Zj?=
 =?utf-8?B?Q044aitlWnNNYUdKQWV3UHlIbmRRL3dKWVRvTlViMUowd2EyNW5YdmVWWVJk?=
 =?utf-8?B?MUlDRkR4VXYvbDY4QUFtTHJWSDZMem5BTTA0QU5FVS9QZ2NOZWp6U1RvVFBt?=
 =?utf-8?B?WFI5T3IvWVFlMG5uc2srUmQ2S0hQeXY0dXdvckszTlhoS25URTNCV1FRVUtL?=
 =?utf-8?B?b3pSWkZDbmloSnRoaGlRVElCQnNQUzAvbHR2akgvdTB5aTdOV1RRdEIwNzZS?=
 =?utf-8?B?VXBqVC8vYmVWSWZSbk9jT0xESkhkby9SOGkxZ0NmWDdhWFdwMGFYOTdiQjlZ?=
 =?utf-8?B?Yy9ndWVrejlpb250MjBhT1lseEltc21zcUYrUVNJQUQwZVBOSWNDK0pzaUxQ?=
 =?utf-8?B?eTIxY1o2SWdYVXhVVlVvWTYyd3dJQU83eVVVOWJjeS9UcEgydERib29VaGhP?=
 =?utf-8?B?aEF1d1FXOUhtUzRsaGk1RnMwbXJiWkxOZm11TnMvanVOL0NUT1piTjFxY0tr?=
 =?utf-8?B?eDJCZXhHeENheXAyL1JycjZZZ2lFV1R0N3hGanBzQXZBTVZrd0lxbFpaSVlE?=
 =?utf-8?B?dnBOSW9yYUNIRHRMSU1jbTZ2UkVHbzFWbkVQNUs5SFRGQ3ZDdVIwOC82VUZz?=
 =?utf-8?B?N1ZXYUM1anlNTFhvcStwT3B2V1R4NG40UjFGNTRURXJDMUFIZEZ4NUorR0w5?=
 =?utf-8?B?clZqR1hOQ0Nybm5FMlRBN1d0Yk80YlBCM01aMUZ6T3BkRE1IbVA3YUR3NzJF?=
 =?utf-8?B?Rzl0by9hZnpOSFMyNmFIMUJwR1BFZUtOQmJNSE1KNkY3VkEzWHZseDAzZXhD?=
 =?utf-8?B?MlFJZDlxSWkzbnRTaW1IUFZldGxkbis0eE5MYjM1MDFnRWM4Z2duK3dkZDQx?=
 =?utf-8?B?b2gxQWVjMXNobDc3OUEycVN6aDU4NndmQm9RakdJYVU0bHd6SlljMDc0c256?=
 =?utf-8?B?cVN1UnQvRXhyNEEvMHEzVFBtb0ZtQzYxamtOSnMvY0gva1hCbGdvNlVkZG5M?=
 =?utf-8?B?QVhKMm1RU3VJQXZ1MWxxbTZJMXF5WlowaUNrQVZ3RlpNaENFSUhYclNlTS9j?=
 =?utf-8?B?Rk5raTNyQ0EwN1VSQTErWFlhRE5sSisxSi9Hei92RWhNVXBsN1RlWlZiZFlq?=
 =?utf-8?B?T2ZLSTdNVi9JYTRnRTBDaFhuYXlMTWVZK2FJMFJ2Z1lxSElpajRBSDdiSExG?=
 =?utf-8?B?WlRWZjdnYXp5Z0w0T3lHZzlmNXFEa1UxUE44MkNldFRqZ3JGNEJPeE5UZldp?=
 =?utf-8?B?bGVyQzByV1U3SjBlNnhtODZoTjlsVldHRXV0WVBEc29hc0tCNWJvYTdpNmlY?=
 =?utf-8?B?NS9QTDVWNTJ3YzZGU3VEaDdETXpYd25QelAyY0hXOFZac3grd0JQQ3dwQVNG?=
 =?utf-8?B?SFBUK0syNDl2M2lzUnFaYXIyYXF5Y3lqZEpxQWZ3VjczYVZEc2tDdHAxTlA3?=
 =?utf-8?B?SG5qTUNnZnZJdUI1d0ZhMktIWm1NdXVGYjZmWXZhNVladjYvQ0hUVDk4cSti?=
 =?utf-8?B?ajFIVUgwelJudzJ2UmxVaTRTQkkrOFhnMnpmSnVMT1RTd0NsWDRZNlA0RmZp?=
 =?utf-8?B?TERTMHhBZVdJcTYyRmVrUU9JcU1BUG15aWx5YXEzb2Jubm5sWUViOHM0OTRJ?=
 =?utf-8?B?cGRLZU9LbUJYZ3FERDdJQ0RoMjhFdTU0RHduS3VhWGJKTkdxUnVTS3ZsL1J2?=
 =?utf-8?B?K1dIWjhnQTJYaU8zOVR5cnMyRFFpQjJ6WU9zRkc2SDVLVHhmTFBNQmRJajBy?=
 =?utf-8?B?cTBaeStaOGxUVmRtR2hGOUtKQlVUN1JLR1N5YW1sSUlzbndNemFnU0F2N2Nh?=
 =?utf-8?B?SUowWTR4aGpDVXB5T1VqQVIwQzltTVNFejJkbmhqSHlFUzlEN2JUaFEzWXBD?=
 =?utf-8?B?VFJpZlgxUGd1Y1BpTDRVcnN1b202UUJTb0c2aUhURDAxQ2Nmdjdnc2VsdGQ0?=
 =?utf-8?B?UGx2UnN3WWhCUVpXSFZLajhQSjROMlM2SWxxY1VBTkRzSEJUSHA0ZTUvMzND?=
 =?utf-8?Q?G3kaDKg0/HZXFb/atozQmsE=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 443e85ec-d25d-4043-9d62-08da00366402
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 12:31:23.6691
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Nc8T1KcvBcBXMay5TWlDVJxqIF8fEBmr6/cc+Ps/bpCAk4Mie+51iA0L7R2soGfjZe1CVVn7RdBaHy7A9FNiMA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB5298

On 07.03.2022 13:17, Jane Malalane wrote:
> On 04/03/2022 08:17, Jan Beulich wrote:
>> [CAUTION - EXTERNAL EMAIL] DO NOT reply, click links, or open attachments unless you have verified the sender and know the content is safe.
>>
>> On 03.03.2022 17:37, Jane Malalane wrote:
>>> On 03/03/2022 11:37, Jan Beulich wrote:
>>>> On 02.03.2022 16:00, Jane Malalane wrote:
>>>>> Add XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_xapic and
>>>>> XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_x2apic to report accelerated xapic
>>>>> and x2apic, on x86 hardware.
>>>>> No such features are currently implemented on AMD hardware.
>>>>>
>>>>> For that purpose, also add an arch-specific "capabilities" parameter
>>>>> to struct xen_sysctl_physinfo.
>>>>>
>>>>> Note that this interface is intended to be compatible with AMD so that
>>>>> AVIC support can be introduced in a future patch. Unlike Intel that
>>>>> has multiple controls for APIC Virtualization, AMD has one global
>>>>> 'AVIC Enable' control bit, so fine-graining of APIC virtualization
>>>>> control cannot be done on a common interface. Therefore, for xAPIC HW
>>>>> assisted virtualization support to be reported, HW must support
>>>>> virtualize_apic_accesses as well as apic_reg_virt.
>>>>
>>>> Okay, here you now describe _what_ is being implemented, but I'm
>>>> afraid it still lacks justification (beyond making this re-usable for
>>>> AVIC, which imo can only be a secondary goal). You actually say ...
> Is the following any better...?
> 
> "Add XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_xapic and
> XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_x2apic to report accelerated xapic
> and x2apic, on x86 hardware.
> No such features are currently implemented on AMD hardware.
> 
> HW assisted xAPIC virtualization will be reported if HW, at the minimum, 
>   supports virtualize_apic_accesses as this feature alone means that an 
> access to the APIC page will cause an APIC-access VM exit. An 
> APIC-access VM exit provides a VMM with information about the access 
> causing the VM exit, unlike a regular EPT fault, thus simplifying some 
> internal handling.
> 
> HW assisted x2APIC virtualization will be reported if HW supports 
> virtualize_x2apic_mode and, at least, either apic_reg_virt or 
> virtual_intr_delivery. This is due to apic_reg_virt and 
> virtual_intr_delivery preventing a VM exit from occuring or at least 
> replacing a regular EPT fault VM-exit with an APIC-access VM-exit on 
> read and write APIC accesses, respectively.
> This also means that sysctl follows the conditionals in 
> vmx_vlapic_msr_changed().
> 
> For that purpose, also add an arch-specific "capabilities" parameter
> to struct xen_sysctl_physinfo.
> 
> Note that this interface is intended to be compatible with AMD so that
> AVIC support can be introduced in a future patch. Unlike Intel that
> has multiple controls for APIC Virtualization, AMD has one global
> 'AVIC Enable' control bit, so fine-graining of APIC virtualization
> control cannot be done on a common interface."

Yes, this looks quite a bit better, thanks. Assuming, of course, it's
in sync with the code in v5 ...

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 12:40:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 12:40:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285982.485279 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRCel-0007fa-Sl; Mon, 07 Mar 2022 12:40:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285982.485279; Mon, 07 Mar 2022 12:40:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRCel-0007fT-Pf; Mon, 07 Mar 2022 12:40:07 +0000
Received: by outflank-mailman (input) for mailman id 285982;
 Mon, 07 Mar 2022 12:40:06 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRCek-0007b7-Mx
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 12:40:06 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b6e7cae0-9e13-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 13:40:05 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2177.outbound.protection.outlook.com [104.47.17.177]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-16-S2bDrfhxNbCTtJOEA6RXpQ-1; Mon, 07 Mar 2022 13:40:03 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PAXPR04MB8605.eurprd04.prod.outlook.com (2603:10a6:102:218::5)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Mon, 7 Mar
 2022 12:40:02 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 12:40:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b6e7cae0-9e13-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646656805;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=YEKtCAuOOZJ7TSZFF1yLRHnEVddhkovDTQcW6zuHdVs=;
	b=Kb6aIm1Mm1qbsIiyw8Xq4U73OccQBOwCetZKn9djRhqhdKLRujrn1PsnM9CCljtXco19+k
	i3vWVMDPiwumSRzoFEUpTGK7yQSo69nHu5deLHA2hWKwZjcDX2GXeavRxM6/EsLT69mi7R
	pmG2WkHkCB6MjiLTSvewwZI3r20uyug=
X-MC-Unique: S2bDrfhxNbCTtJOEA6RXpQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=VmS5nC2JdFyGEK1dINx4/jsL0b/whqZlqMXn+Uayrp7tMbBmzjpmZd5RanHvZ7qGnfTkmWxsox0KLWhIAALzLjWPGvEqUyfIkNesL9m9y+o9Cz9MiX3NScZsX/b0AygdAoH1QIHoM4Lut1rJWkdUB1dItJDxKUIIhme0koU7PjhDsz810hGsjfHslGOrcM4wcKVLCmcNdJ8LAd14J1OiLT3sOA/2lBAvZTnXbyC98pl/W6lBiuy8TEyGPuprmhEaL9Pz4uR/ttqWmm4xFXGobwmiVMFQzrWs8kYuS8g4LktRdSrKbCkmNoYSNybHP26oGlEScsrY8+ThdBGkgNKp3g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=YEKtCAuOOZJ7TSZFF1yLRHnEVddhkovDTQcW6zuHdVs=;
 b=JFAtVSv8GZMlEmDE5xKXETuvcv3fex20/m0TLN5bOxRokZ035rdLrF6tUv4cc8wjDIonmogTlv+6oR35vUbfwyiy/T2Vk2HNofKmYY5MT8WT/1SLCzWenS5X7EOE+I805f6nIARTyBD9OxECjsANC8B175ShD2oyYveYsdC5PQItAqcK7UplBWRBeceCux0Ca4qEYhx12kf58EiRQFqFyT86o5/JCKOQzeITs1QUc2r5ii840V4i+WJqQS48a3WRkdZKz/vXGt733sUhF3QpC8KikyZ5/FO585socdWOsrNMaBlw2ib4QTNm5tdfk/OFYHv2aIlKreEdwWfH2/KWLQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <67e34863-74fd-6d7f-8b63-26f45bf0426f@suse.com>
Date: Mon, 7 Mar 2022 13:40:03 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Content-Language: en-US
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Paul Durrant <paul@xen.org>, Andrew Cooper <andrew.cooper3@citrix.com>,
 Kevin Tian <kevin.tian@intel.com>
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH] IOMMU/x86: tidy adjust_irq_affinities hook
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6PR10CA0009.EURPRD10.PROD.OUTLOOK.COM
 (2603:10a6:209:89::22) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: d872c7dd-3f7c-4691-f897-08da0037995d
X-MS-TrafficTypeDiagnostic: PAXPR04MB8605:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB8605DBE229CDA5F7EDE4473DB3089@PAXPR04MB8605.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(31696002)(8936002)(186003)(2616005)(6506007)(36756003)(38100700002)(26005)(31686004)(83380400001)(6512007)(8676002)(2906002)(66946007)(66476007)(4326008)(508600001)(66556008)(5660300002)(86362001)(6486002)(316002)(54906003)(6916009)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?cmU1UTl0bGJQS0xmRURpOHA2OWpNSThXRDhqQ0djdWx4dUxTU3Z3bE1LR1Rt?=
 =?utf-8?B?YjFQMTJ2aklaZ3k5TS9IZGJONlhhTlRQQ3h1RmZ0eW9SZnViUk1DQlFyUnh0?=
 =?utf-8?B?aDV2YzhEc3FQVzlJVDdwcTh0WXJlWWpMTXJKS1haQjNzT3ZqVFRycmxORGt6?=
 =?utf-8?B?ZUdwSXowRUttQnJKdWJBckRsUHpvcm1VZ3dSdERsYU95SllBSlIwZFhyNXFj?=
 =?utf-8?B?V2l3M1BmaEhwMWt6ZG8rbzc0MWFXVXBqZjZOTXg1YS9lclcwTmlPUk5EWi9q?=
 =?utf-8?B?NWRQcitwaTZ6NlJ0MHFXSW4zMVh0bHkxV2N1SG41cS9mZm1Hd2NpSEN6NEZs?=
 =?utf-8?B?UmhRak1zN0hlSjNBb0tyVnpoOUd3R0x1MStvR0ZYWGR2N3Q2WmNtQTNnU3V2?=
 =?utf-8?B?RzN6LzZJc3BsNkNhSkcwcWQ4ZThMTUREOXlxN3lhcEd5eWJGUDZOY3gxRStX?=
 =?utf-8?B?Sm1LclZJaEN5Z2NmS3R0ZGcxWGtMK0VyOFZoOE1mckg0WlQvWCtyeE1DM2dw?=
 =?utf-8?B?c0ExcmtFU2FMOHlnU29xb0lxazh6WlZzaytPczY2OEpiZ0ZFLzA3NVFhN0NC?=
 =?utf-8?B?Um96WUdJbkgvNkdOVm1Gcjgwd3lFckNlVzFURUZncGt6OG5OTFFQVHpudVhP?=
 =?utf-8?B?TDFmM2I3Y3NYeDRyZFJoWG91bTZUZ096VTh0OHh2MXVrblB6WVFualNHRG1h?=
 =?utf-8?B?MmcrNmdXUlZ2T1FQTzFRbVVKdDQ5V01qVWs5V1d6MGthdkpjd2d3Q1p1SWRC?=
 =?utf-8?B?d2RCT2NsMjEvYlFUdWUxaHQvbS93eHE4OXMrU3ZvenhBenFwYTRyRUMyeXNk?=
 =?utf-8?B?R3hmaFh2MUhHbTdZL09ZeEN6Y25RNzB5WGFaYm5zeThMSi9WVFdjVUhrbGRZ?=
 =?utf-8?B?YUwzbVd2QnU3d2JXaFRTWDJUaTcyV2dxUEdCTjlFbk4ybmNyUXRXRDd2Njh5?=
 =?utf-8?B?dTRIbmFUVmZRL2Q1VkRsT1FaaHN6MHIrdzZ0ZzVPM3VXS2Ywcm9RcWJyWE4w?=
 =?utf-8?B?aytNUytuV2ZEWUF6dmhya1ZwTms4ckRnRkhETURrd3dReDdsOWpHVUtFRlFn?=
 =?utf-8?B?M3hsZWxGTldnVmpZOUFiNGdWc2N4eHd0aDlaakNsWUpmVG96VXg3dEk4M2x1?=
 =?utf-8?B?bGNvVm1vZ3FNSGdzNnI0MXY0SjhMQ1BrbTROOVRiWURSQVhNSmFnUGsrVUhO?=
 =?utf-8?B?TU9JbEhvNGFaaFNxUUxRTmtrR0NVY1Z3NFppU004QmZNOTljV2RMNmcrZzBs?=
 =?utf-8?B?ZlVzYW5wZ1MvVk9LaVF4Q1JXRDdKeURoUU1ZS0dIdzRjekZ0NUwxWHk2bWZv?=
 =?utf-8?B?dTZWRXl5cVdnb2owQlhXZDFOa3FCOUF4U2JiUklTbXk0RWtBR29OWDhORGFZ?=
 =?utf-8?B?UmxlZ3VIbWpXUGFVQWttNEhpSm9JdFRLYUhEbUtPc2ZSMFFySFhaWUZMOWN4?=
 =?utf-8?B?MUtnZ0JjVmRHdWZGWlBndmdFUmNIVWZsNkxCYkw4NFBqTWRmc1RhaVFPRkd4?=
 =?utf-8?B?VHA0a3dPMm9pNGNON2xBL2d5OXVwdmtGd3BMcDRlWjF5ZjVSMTh1UVFmWGJC?=
 =?utf-8?B?K2NYZW9RSGpBTHVMb1puMnUwZk0vc2NZK2Z3MENwVnNGZW1NRmpmQ1BVdDdj?=
 =?utf-8?B?cFhrMjJlWE4va0d4emVWZm0ydnhhb2JmYVVnSFo3WGgwV0FXeGhpanhOMWt1?=
 =?utf-8?B?TVNxSHA0ZEFzYUp2bVFPeWcvT2xqQWVFN09vUWJpWVRuYllsZkEvNzhpZHJX?=
 =?utf-8?B?aEpQQU1rU3p5bGc2WmlIcVBUNEFkL2oraDl0ajFia3F1NHZUbkQyMTNiQmtE?=
 =?utf-8?B?VlZncnBkcktMRDVEZWZzZWNNUUI2R3BnVWtOdTF6YUlTV2ZNeGZXRkJoOW1x?=
 =?utf-8?B?RkpmR0lLcDJtbkNlV3J6WjhvMVkzS2JOd1VzUFdQVzR2V1Y5RHpKeTRmMlBq?=
 =?utf-8?B?VGw2ZENQbGNPUXlDUWlyTjBCazF5UWNFVmUvOCtOTXRMbzQ5dmxCTUl6NkxY?=
 =?utf-8?B?QlEzT1NidU9NeUpZM0RVdnJzWUU1Q3FjditPbWw3MXpjMVI2L09rTWxlMWxs?=
 =?utf-8?B?ZmZnYXhIZXZsTEZ4ZkF6NTd0WmkvcGo2VWhlTlZzSG10VE0vRTY4L2NXZWJB?=
 =?utf-8?B?Tm1CSWhSSUEybFMxQU1wYkhTdFgxeExMZDVqOG8ralZmMnM3OUV5dzBEeENw?=
 =?utf-8?Q?EPmCchBWLgoc9xkjwSlyZwY=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d872c7dd-3f7c-4691-f897-08da0037995d
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 12:40:02.3557
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: lHhkS1PpIPTlxgh3tVe9uJ8P15ZQlXiiEFeA2D/UC8VzpbhkkaBnqnGH+MK7TXJOEjrVCYb9kxJH27i3C2q1cA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB8605

As of 3e56754b0887 ("xen/cet: Fix __initconst_cf_clobber") there's no
need for a non-void return value anymore, as the hook functions are no
longer themselves passed to __initcall(). For the same reason the
iommu_enabled checks can now move from the individual functions to the
wrapper.

Signed-off-by: Jan Beulich <jbeulich@suse.com>

--- a/xen/arch/x86/include/asm/iommu.h
+++ b/xen/arch/x86/include/asm/iommu.h
@@ -101,11 +101,10 @@ void iommu_update_ire_from_apic(unsigned
 unsigned int iommu_read_apic_from_ire(unsigned int apic, unsigned int reg);
 int iommu_setup_hpet_msi(struct msi_desc *);
 
-static inline int iommu_adjust_irq_affinities(void)
+static inline void iommu_adjust_irq_affinities(void)
 {
-    return iommu_ops.adjust_irq_affinities
-           ? iommu_call(&iommu_ops, adjust_irq_affinities)
-           : 0;
+    if ( iommu_enabled && iommu_ops.adjust_irq_affinities )
+        iommu_vcall(&iommu_ops, adjust_irq_affinities);
 }
 
 static inline bool iommu_supports_x2apic(void)
--- a/xen/drivers/passthrough/amd/iommu.h
+++ b/xen/drivers/passthrough/amd/iommu.h
@@ -234,7 +234,7 @@ int amd_iommu_prepare(bool xt);
 int amd_iommu_init(bool xt);
 int amd_iommu_init_late(void);
 int amd_iommu_update_ivrs_mapping_acpi(void);
-int cf_check iov_adjust_irq_affinities(void);
+void cf_check iov_adjust_irq_affinities(void);
 
 int cf_check amd_iommu_quarantine_init(struct domain *d);
 
--- a/xen/drivers/passthrough/amd/iommu_init.c
+++ b/xen/drivers/passthrough/amd/iommu_init.c
@@ -809,13 +809,10 @@ static bool_t __init set_iommu_interrupt
     return 1;
 }
 
-int cf_check iov_adjust_irq_affinities(void)
+void cf_check iov_adjust_irq_affinities(void)
 {
     const struct amd_iommu *iommu;
 
-    if ( !iommu_enabled )
-        return 0;
-
     for_each_amd_iommu ( iommu )
     {
         struct irq_desc *desc = irq_to_desc(iommu->msi.irq);
@@ -828,8 +825,6 @@ int cf_check iov_adjust_irq_affinities(v
             set_msi_affinity(desc, NULL);
         spin_unlock_irqrestore(&desc->lock, flags);
     }
-
-    return 0;
 }
 
 /*
--- a/xen/drivers/passthrough/vtd/iommu.c
+++ b/xen/drivers/passthrough/vtd/iommu.c
@@ -2107,17 +2107,12 @@ static void adjust_irq_affinity(struct a
     spin_unlock_irqrestore(&desc->lock, flags);
 }
 
-static int cf_check adjust_vtd_irq_affinities(void)
+static void cf_check adjust_vtd_irq_affinities(void)
 {
     struct acpi_drhd_unit *drhd;
 
-    if ( !iommu_enabled )
-        return 0;
-
     for_each_drhd_unit ( drhd )
         adjust_irq_affinity(drhd);
-
-    return 0;
 }
 
 static int __must_check init_vtd_hw(bool resume)
--- a/xen/drivers/passthrough/x86/iommu.c
+++ b/xen/drivers/passthrough/x86/iommu.c
@@ -464,7 +464,9 @@ bool arch_iommu_use_permitted(const stru
 
 static int __init cf_check adjust_irq_affinities(void)
 {
-    return iommu_adjust_irq_affinities();
+    iommu_adjust_irq_affinities();
+
+    return 0;
 }
 __initcall(adjust_irq_affinities);
 
--- a/xen/include/xen/iommu.h
+++ b/xen/include/xen/iommu.h
@@ -267,7 +267,7 @@ struct iommu_ops {
 
     int (*setup_hpet_msi)(struct msi_desc *);
 
-    int (*adjust_irq_affinities)(void);
+    void (*adjust_irq_affinities)(void);
     void (*clear_root_pgtable)(struct domain *d);
     int (*update_ire_from_msi)(struct msi_desc *msi_desc, struct msi_msg *msg);
 #endif /* CONFIG_X86 */



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 12:44:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 12:44:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285988.485290 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRCjP-0008He-DC; Mon, 07 Mar 2022 12:44:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285988.485290; Mon, 07 Mar 2022 12:44:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRCjP-0008HX-AE; Mon, 07 Mar 2022 12:44:55 +0000
Received: by outflank-mailman (input) for mailman id 285988;
 Mon, 07 Mar 2022 12:44:54 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=4knz=TS=srcf.net=amc96@srs-se1.protection.inumbo.net>)
 id 1nRCjO-0008HR-A7
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 12:44:54 +0000
Received: from ppsw-31.csi.cam.ac.uk (ppsw-31.csi.cam.ac.uk [131.111.8.131])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 61fe1243-9e14-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 13:44:52 +0100 (CET)
Received: from hades.srcf.societies.cam.ac.uk ([131.111.179.67]:47302)
 by ppsw-31.csi.cam.ac.uk (ppsw.cam.ac.uk [131.111.8.137]:25)
 with esmtps (TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
 id 1nRCjG-000rZD-KL (Exim 4.95) (return-path <amc96@srcf.net>);
 Mon, 07 Mar 2022 12:44:46 +0000
Received: from [192.168.1.10] (host-92-12-45-187.as13285.net [92.12.45.187])
 (Authenticated sender: amc96)
 by hades.srcf.societies.cam.ac.uk (Postfix) with ESMTPSA id 185511FA70;
 Mon,  7 Mar 2022 12:44:46 +0000 (GMT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 61fe1243-9e14-11ec-8eba-a37418f5ba1a
X-Cam-AntiVirus: no malware found
X-Cam-ScannerInfo: https://help.uis.cam.ac.uk/email-scanner-virus
Message-ID: <f52babbd-e435-a1c5-cf9f-a6e36417645c@srcf.net>
Date: Mon, 7 Mar 2022 12:44:45 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] IOMMU/x86: tidy adjust_irq_affinities hook
Content-Language: en-GB
To: Jan Beulich <jbeulich@suse.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Paul Durrant <paul@xen.org>, Andrew Cooper <andrew.cooper3@citrix.com>,
 Kevin Tian <kevin.tian@intel.com>
References: <67e34863-74fd-6d7f-8b63-26f45bf0426f@suse.com>
From: Andrew Cooper <amc96@srcf.net>
In-Reply-To: <67e34863-74fd-6d7f-8b63-26f45bf0426f@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

On 07/03/2022 12:40, Jan Beulich wrote:
> As of 3e56754b0887 ("xen/cet: Fix __initconst_cf_clobber") there's no
> need for a non-void return value anymore, as the hook functions are no
> longer themselves passed to __initcall(). For the same reason the
> iommu_enabled checks can now move from the individual functions to the
> wrapper.
>
> Signed-off-by: Jan Beulich <jbeulich@suse.com>

Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 12:54:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 12:54:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.285994.485302 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRCsm-0001OQ-AA; Mon, 07 Mar 2022 12:54:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 285994.485302; Mon, 07 Mar 2022 12:54:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRCsm-0001OJ-6l; Mon, 07 Mar 2022 12:54:36 +0000
Received: by outflank-mailman (input) for mailman id 285994;
 Mon, 07 Mar 2022 12:54:34 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+gfv=TS=citrix.com=prvs=0582ef7ee=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRCsk-0001OD-P6
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 12:54:34 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id bad5ee64-9e15-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 13:54:32 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: bad5ee64-9e15-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646657672;
  h=from:to:cc:subject:date:message-id:
   content-transfer-encoding:mime-version;
  bh=1D/2i18TRwfN1jVi+Ba0ny5SLfpW8SDuGNPWRheWh8Q=;
  b=QV6062eiBPafksP/5QNRyOCVIsq4HE6CUbEK5t7Z8FzFDWSiCxkQkQHf
   saLyfekSLEC9VxQUzadj/lvpio+xOumeAUAmxKX2CfGTALrtBkvVD0TbC
   cCbLgZ/lK6jUZ4021ZPEc3TnCmbJLRH4BnnEeRQ4z0f9wHIhrn7UZMlCM
   Q=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65082412
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:BHWwlqyYKHsose6Tcpx6t+cnxirEfRIJ4+MujC+fZmUNrF6WrkVSn
 2cZCm+HPq3ZZWvzetgkbt7j/UIG7JXUz4RgHgprqiAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2YfhWWthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 NpliZKuaRkkbpP3suk2fjQbEDFiDPJN0eqSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DJoQQt2sm1TjEJf0nXYrCU+PB4towMDIY2J0WTayCP
 pBxhTxHPDTdZj9VGFUuKY8gu8u5n3faWh1RkQfAzUYwyzeKl1EguFT3C/LJet2RA8RO2E/Ao
 nnB+Uz2BxgbMJqUzj/t2nCmi/LLnCj7cJkPD7D+/flv6HWDy2pWBBAIWF+TpfiillX4S99ZM
 1YT+Cclse417kPDczXmd0Tm+jje5EdaAocOVb1hgO2Q9kbKyzqXGEgaQ25/U/Yrn+IbBj86y
 m7WlPq8UFSDr4apYX6a876Vqxa7Ni4UMXIOaEc4cOcV3zXwiNpt10ySF76PBIbw14SoQm+on
 1hmuQBj3+17sCId60msEbkraRqIr4OBcAM67x6/somNvlIgP97Ni2BFBDHmARd8wGSxEwPpU
 JsswZH2AAUy4XalznDlfQn1NOv1j8tpyRWF6bKVI7Ev9i6251modp1K7Td1KS9Ba5hYJ2K4P
 heM4lMBuPe/2UdGioctP+qM5zkCl/C8RbwJqNiOBjaxXnSBXFDep3w/DaJh92vsjFItgckC1
 WSzKq6R4YIhIf0/llKeHr5FuZdyn3xW7T6DFPjTkkX8uZLDNSH9dFvwGAbXBgzPxPjf+1u9H
 hc2H5bi9iizp8WlOniHqdNIdAtSRZX5bLivw/Fqmie4ClMOMEkqCuPLwKNnfIpgnq9PkfzP8
 G37UUhdoGcTT1WeQelWQhiPsI/SYKs=
IronPort-HdrOrdr: A9a23:zRBQAahyz7Lo5iUncIyZLHAXLXBQXyx13DAbv31ZSRFFG/FwyP
 rAoB1L73PJYWgqNU3I+ergBEGBKUmskaKdhrNhR4tKPTOWw1dASbsN0WKM+UyHJ8STzJ8+6U
 4CSdkANDSTNykCsS+S2mDReLxBsbq6GciT9JvjJhxWPGZXgs9bnmJE4lHxKDwKeOAKP+tOKL
 Osou584xawc3Ueacq2QlEDQuj4vtXO0LbrewQPCRIL4BSHyWrA0s+zLzGomjMlFx9fy7Yr9m
 bI1yT/+6WYqvm+jjvRzXXa4Zh6kMbojvFDGMuPoM4ILSiEsHfgWK1RH5m5+BwlquCm71gn1P
 HKvhcbJsx2r0jce2mkyCGdrjXI4XIL0TvP2FWYiXzsrYjSXzQhEfdMgopfb1/w91cglMsU6t
 MH40up875sST/QliX04NbFEztwkFCvnHYkmekPy1RCTIolbqNLp4B3xjIeLH45JlO01GkbKp
 ghMCmFj8wmMG9yLkqp9VWH+ebcEkjaRXy9Mwg/Us/86UkloJk29Tpa+CUlpAZwyHsMceg72w
 36CNUZqFg3dL5vUUtcPpZ0fSLlMB27ffrzWFjiUmgPUpt3eU7wlw==
X-IronPort-AV: E=Sophos;i="5.90,162,1643691600"; 
   d="scan'208";a="65082412"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=lwpa431UfSVJcrrhS8eaQJgi/v2r+D4zOqTmrPjoHa2Sqmv+M+CdITJcTiNjwBRlzz9uE/K3o0AvAAmLKUMo7yvj43iZgQx8knSJ5E7PsdhGGSkppTb1AUUPBa6nqMa1Umn6TQOuS/8zYt2sL2odm/VXjbUBASpxw/Sb0IYVX+h+g6o+j0z8HmNAAr/YxKS98RtNVl1mrAGctwXVBcDdgU645iLexwxkK9Z/mmZdUCBoEL5wlBqgXEndZNYVz3Rt+d1ySqmFZBEfWJ6BZAIBWGNcmr659HYsbq8Wp+nQ6ziyGDSAmCUt810mukD8/MUCyY0TuD7r3UpqI4XMn0HdcQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=faQe+RKeQDpG2+OeeF6Y6gflGnNZ4uulMco+3ISpJvs=;
 b=CL05k2WWaTvfWSfqvNxWQciJ+yG01sBgN2QEj+1yOhC9/m72mSMpyrjWpV1eLmwdqHqAEgmcQ44G502FQJ0H2n7mpE5xHnfNmap5TMJt1q2ro7nSoviLgq/ISRqnAZWfbChZ+xErQisr94HhNpZ7sMyEV2fkdEnk9N0RVIYBf9C/WTEi/WQOModPfTqbQxn+si9taWBMIzlMHyDCcIzda1ROqLr4usm1rGi+3aCBkIx97ycNvBiaA9tQNK9rQz1hmByEAZDWAydC9ZwIvmmE4QIBp5M5+zC4PE6WUblXM3OVgYNZ2g1dfdbXQXMCEEJr+qdz+zdDjkprWoEF1CoD1g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=faQe+RKeQDpG2+OeeF6Y6gflGnNZ4uulMco+3ISpJvs=;
 b=sv7zRmJ0PLg59X/yFTUks7JUEVw/sYFMw2BWyeVl//O6dS2Js6BsRzLLUdZ7C4ujm+ZonmqFBMA6kNjrwPpqg0L2EcDOSYuQ1pXZ3TQrROatg/+01NPUJMu4nSpAlFuQk9r5mKd3fSJvW5VvLnJLGJWYu7Thb+hAQKF5vYIncr4=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Jan Beulich <jbeulich@suse.com>,
	Alex Olson <this.is.a0lson@gmail.com>
Subject: [PATCH v3] vpci/msix: fix PBA accesses
Date: Mon,  7 Mar 2022 13:53:47 +0100
Message-ID: <20220307125347.71814-1-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO2P123CA0090.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:138::23) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 78d79ada-db63-4847-214c-08da00399c59
X-MS-TrafficTypeDiagnostic: SJ0PR03MB6303:EE_
X-Microsoft-Antispam-PRVS: <SJ0PR03MB6303AE71A3FCD2FD72E79C948F089@SJ0PR03MB6303.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: OX1/3sxkl20zkZMY96hVt/VenEvrj4qNO1HdNMFZ18yl6LH0jAEhMbA1OxA/juJD0haN1sxaIyKpREl8gvMr9msj3foXQZrY23RPELNZtN04Ce3hG1vuaBRtq2rFmIZ5sSCG2FbUfFjzIK0yjz2MnQxmLCAB60bY07APSfVJcreAXl9EPeDNTMj1mHwjxIHWm0Z5rgnxrwr/t3Po3ny1DpkWqPGEIz9HIBcs1Z4c4iXRQ9QS9dhhvl3eqfSoD1j4eVnODY/Fha/NiSGcfe5SkF7Fq518oUsGuM/ry9i/eDxwbFl8HZm7O/FFdAmaJMci37h3F4UY3Eb/qZHAlJkhgFd1fI+OdaE09liiJtjZzzHlXlh1UP4pWAdAo5xp38Mv6ixp7l7JaGeuTvilXDQbaEl+vT0A49Z69uDTik6DCwFzs1torVtTMaOr4IKazqdwZk8+vu+3GJgGQxq8ZFZYnxHNSnP51isAdNvZkfzuN873FsUbXP5pDVAqana1wyU0vr5XtHlaHcP3NTcFzh60D9lgUHst3ChOItTdj+X2xjcUeZ/cZPIMP10/YEd8rTDmVVJrNVp7+KcuBuYod/HfsoViOFv8RALbmA2w+9F8j3dvWWBGQl+Hh0B6Yx6m8iW/UpMW/50V8DibK/wlHUnnog==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(6916009)(54906003)(83380400001)(186003)(26005)(86362001)(2616005)(316002)(1076003)(5660300002)(8936002)(36756003)(2906002)(6666004)(508600001)(4326008)(8676002)(66476007)(66946007)(66556008)(38100700002)(6512007)(6486002)(6506007)(82960400001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?ZHFZUXF4SXVtWVJaVkNtYVV3Zm15RDcyblIzUDRYZWNNTTM2Mm5DYmNzUWRU?=
 =?utf-8?B?VHRXb2tPam11S0oydnl3T24rNFk4dVFJZW9HWW1FaDZzK3dFaXdvQStnbDd0?=
 =?utf-8?B?U1N4aTF1K1VVTGEwYjNvSlQ3c2x3ZTJicnh2QlVGZ01YVVlvb2tPdXhFZHN6?=
 =?utf-8?B?cHZod0pvQlhSVk44d05EbEVURXZTMy8vY056OG9Ua3Q0WVBWU3dyRWI0dmNZ?=
 =?utf-8?B?T3NRWkp0YUhrVHl1RVA5UGQ4eGl0OFczaXorOHR3QmJicVR2b2ZtcE9keWFU?=
 =?utf-8?B?dU5mZm9Sb2hvcnlaY1FGaUppTDdZSWRVWEk0bXVvZDNya1ZuRlVpOERxcGdw?=
 =?utf-8?B?VzBCTEs0RHJmaGZ4b1pBYnZHS3djMlRiajN0a0lwZm9jbVhIQjJOaGw5ZU0v?=
 =?utf-8?B?a3NHVHJDTFZJQ3RPVW5ScDF1NVA0ZjhXbkM3OUkySDM4U1AxMmVrOEJyQ05X?=
 =?utf-8?B?WXM5R3I4eVNScXl2WFM2WEhrNlBaNFpvS3pZRDRpREVrQ0lDM3hYV3FLbk8v?=
 =?utf-8?B?d2tGcjI0cDd2S2Z0Z3VydVFiTno1aWNUTVN0dENmOVZtdGtLdU8vMVFSUXRa?=
 =?utf-8?B?RjNSNDdhVmFLcnllL0QwSFgrb1ZQL0pnMFQ1ZThjNGlyanR3V1dqTW9SNW9k?=
 =?utf-8?B?NXNtMXlMWnR0K3BDQU5pMDVmdXJ2V1pWVjUwOWU0RlhoQVBQUTJMTHUrWjhV?=
 =?utf-8?B?eWtLckVBejJYazhHbnZTbTBKOWxCSTVPR1ZLK0JDZEhLYndTVHFLbE1rUGtX?=
 =?utf-8?B?K3A5UGd4VE50MkJqT1NLUmNBTXViT0VhMG9UbG9kUVdEZ29xTHp2UEU5TXJW?=
 =?utf-8?B?bW5WQ3hMeUh6TjZIb1pDRmliZ0t5SU8wVVI1TVo2WkFEaGVqbVF1MmpYVW5o?=
 =?utf-8?B?eWNiKzRrTTdqeEhKYzh3RlRYdlJLeXBQdG1BaHd6dytabVhPL2gyc2ZCZEtr?=
 =?utf-8?B?cXRJbnNRbWg5NU5rNnJ2cGE3ZklKam9hWmJxWEF5KyttWW1hUUg1ZkFWQXIz?=
 =?utf-8?B?WU5CNzlHUVNiWkNGRzE3cEgvN3ZzYTZOZHgvdVRaRDRldGFqUUNPREJLdVcx?=
 =?utf-8?B?aUtYWmY3QzVkcFdzZ3B4anpnVVRnTGZMdlk5UEJtOFUyYTIxa0pFZ0RlT1Rh?=
 =?utf-8?B?M2hhaTAwdkV4emlLckdYaHVQRmVsWC9Ga3ZFTGtSZkdSTks3cC84eDY3NW12?=
 =?utf-8?B?R3lUOHpLRG9aa2JORExnK2lOaTBsSkN6VU9INnlmSTdvRUR1VFVKWS9VRDN1?=
 =?utf-8?B?dUtQVDZIUGtvVWptVDhCUmVIOE9uSi9hR0U5NVVMUGpzdThYWG4wa2xDaG5J?=
 =?utf-8?B?dzM2dXBXTkkwMy92NXNXZGNyRzhabUh5L1RZZmpiandSaXcwcHc4ai9BZmNS?=
 =?utf-8?B?dHFIL01xY25tTnZ2MlZMUERQYjlTeXN6VUNQbWhkK1N5aGQ4L2E1QjRKQWcw?=
 =?utf-8?B?WDRHOWc1U3l1c1g1ZjhISmpxdTFrMFA4cXdDbjl2Y2tCSXg1OUI5STEwazZX?=
 =?utf-8?B?dDJKV3JBdDR2dVpUSjhHdjhEcHY2NDdOQitwK0Z4TXBrd3dpWWpoY3NTQWFu?=
 =?utf-8?B?eVNtZGN3RHoyM2d4czNhOHYwUzd4aDhYMkdRS3hCc0tUZG1MeXhRaldzQmhD?=
 =?utf-8?B?V3Nta2RvUklHbVVJbkQ2bVBDWGhpTmR0SDFjMUZJUWVld0NWQnlGZ2hIZVIr?=
 =?utf-8?B?bnFSQSsvd3BEOC83M1pWYzc5MDVoT05nNnJ5Q08yK00yTk5YSDZ6Q25OTk5p?=
 =?utf-8?B?ZWhxbTFlbTE3c3FBWitpTUhQQ2pIcFArcitJZ2poNWNvcmpyaVppZnZia2tv?=
 =?utf-8?B?M0JtL2NlZWV0UHQ5MElYNVpTRjJ2R0R1WkxuNGhHNGVQWVZmVmp6LzEySit4?=
 =?utf-8?B?TjJWeVVuemdLR1JqWC9lQldMVnBvRm9QRzZPUHhWd3NmR0o5WUp6M0llcnlY?=
 =?utf-8?B?dFZoY1czaW5WWFFWdkFsTUtERFM4V3A4bkxnM0RoSG5yRUcxOTU5bitiVlUz?=
 =?utf-8?B?SzlodmVsVXN5cjNyb25PNXBGUFlraUhuRFh5ODQyQ0xwSlB4MDJWT3piMzFx?=
 =?utf-8?B?YmI1SHF1eDdkUkEyd1A5L0U3QUc2enNDNWV5RkRVbWVqeFVSeVVtdDFYUS9l?=
 =?utf-8?B?UmtXSXpPTXZVZHRLMXRVb1BJc3o2MVVxc3I3YU5EMkFnT2pkSk1FQmt0MVFp?=
 =?utf-8?Q?jMRnK12045huDq7/mm+xrUI=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 78d79ada-db63-4847-214c-08da00399c59
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 12:54:26.3662
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: thLYmyYrI9Wj5gZ9F1ZdedACQmhi+QwV2obXqxDsOlU8zSjp/1EMJceeab9zZXIjFv/3Pf0th651j9OBybwrVQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR03MB6303
X-OriginatorOrg: citrix.com

Map the PBA in order to access it from the MSI-X read and write
handlers. Note that previously the handlers would pass the physical
host address into the {read,write}{l,q} handlers, which is wrong as
those expect a linear address.

Map the PBA using ioremap when the first access is performed. Note
that 32bit arches might want to abstract the call to ioremap into a
vPCI arch handler, so they can use a fixmap range to map the PBA.

Reported-by: Jan Beulich <jbeulich@suse.com>
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
Cc: Alex Olson <this.is.a0lson@gmail.com>
---
Changes since v2:
 - Use helper function to map PBA.
 - Mark memory as iomem.

Changes since v1:
 - Also handle writes.

I don't seem to have a box with a driver that will try to access the
PBA, so I would consider this specific code path only build tested. At
least it doesn't seem to regress the current state of vPCI.
---
 xen/drivers/vpci/msix.c | 59 ++++++++++++++++++++++++++++++++++++++---
 xen/drivers/vpci/vpci.c |  2 ++
 xen/include/xen/vpci.h  |  2 ++
 3 files changed, 59 insertions(+), 4 deletions(-)

diff --git a/xen/drivers/vpci/msix.c b/xen/drivers/vpci/msix.c
index a1fa7a5f13..fdd406e309 100644
--- a/xen/drivers/vpci/msix.c
+++ b/xen/drivers/vpci/msix.c
@@ -182,6 +182,33 @@ static struct vpci_msix_entry *get_entry(struct vpci_msix *msix,
     return &msix->entries[(addr - start) / PCI_MSIX_ENTRY_SIZE];
 }
 
+static void __iomem *get_pba(struct vpci *vpci)
+{
+    struct vpci_msix *msix = vpci->msix;
+    void __iomem *pba;
+
+    /*
+     * PBA will only be unmapped when the device is deassigned, so access it
+     * without holding the vpci lock.
+     */
+    if ( likely(msix->pba) )
+        return msix->pba;
+
+    pba = ioremap(vmsix_table_addr(vpci, VPCI_MSIX_PBA),
+                  vmsix_table_size(vpci, VPCI_MSIX_PBA));
+    if ( !pba )
+        return msix->pba;
+
+    spin_lock(&vpci->lock);
+    if ( !msix->pba )
+        msix->pba = pba;
+    else
+        iounmap(pba);
+    spin_unlock(&vpci->lock);
+
+    return msix->pba;
+}
+
 static int cf_check msix_read(
     struct vcpu *v, unsigned long addr, unsigned int len, unsigned long *data)
 {
@@ -200,6 +227,10 @@ static int cf_check msix_read(
 
     if ( VMSIX_ADDR_IN_RANGE(addr, msix->pdev->vpci, VPCI_MSIX_PBA) )
     {
+        struct vpci *vpci = msix->pdev->vpci;
+        unsigned int idx = addr - vmsix_table_addr(vpci, VPCI_MSIX_PBA);
+        void __iomem *pba = get_pba(vpci);
+
         /*
          * Access to PBA.
          *
@@ -207,14 +238,22 @@ static int cf_check msix_read(
          * guest address space. If this changes the address will need to be
          * translated.
          */
+        if ( !pba )
+        {
+            gprintk(XENLOG_WARNING,
+                    "%pp: unable to map MSI-X PBA, report all pending\n",
+                    msix->pdev);
+            return X86EMUL_OKAY;
+        }
+
         switch ( len )
         {
         case 4:
-            *data = readl(addr);
+            *data = readl(pba + idx);
             break;
 
         case 8:
-            *data = readq(addr);
+            *data = readq(pba + idx);
             break;
 
         default:
@@ -275,19 +314,31 @@ static int cf_check msix_write(
 
     if ( VMSIX_ADDR_IN_RANGE(addr, msix->pdev->vpci, VPCI_MSIX_PBA) )
     {
+        struct vpci *vpci = msix->pdev->vpci;
+        unsigned int idx = addr - vmsix_table_addr(vpci, VPCI_MSIX_PBA);
+        void __iomem *pba = get_pba(vpci);
 
         if ( !is_hardware_domain(d) )
             /* Ignore writes to PBA for DomUs, it's behavior is undefined. */
             return X86EMUL_OKAY;
 
+        if ( !pba )
+        {
+            /* Unable to map the PBA, ignore write. */
+            gprintk(XENLOG_WARNING,
+                    "%pp: unable to map MSI-X PBA, write ignored\n",
+                    msix->pdev);
+            return X86EMUL_OKAY;
+        }
+
         switch ( len )
         {
         case 4:
-            writel(data, addr);
+            writel(data, pba + idx);
             break;
 
         case 8:
-            writeq(data, addr);
+            writeq(data, pba + idx);
             break;
 
         default:
diff --git a/xen/drivers/vpci/vpci.c b/xen/drivers/vpci/vpci.c
index f3b32d66cb..9fb3c05b2b 100644
--- a/xen/drivers/vpci/vpci.c
+++ b/xen/drivers/vpci/vpci.c
@@ -51,6 +51,8 @@ void vpci_remove_device(struct pci_dev *pdev)
         xfree(r);
     }
     spin_unlock(&pdev->vpci->lock);
+    if ( pdev->vpci->msix && pdev->vpci->msix->pba )
+        iounmap(pdev->vpci->msix->pba);
     xfree(pdev->vpci->msix);
     xfree(pdev->vpci->msi);
     xfree(pdev->vpci);
diff --git a/xen/include/xen/vpci.h b/xen/include/xen/vpci.h
index bcad1516ae..67c9a0c631 100644
--- a/xen/include/xen/vpci.h
+++ b/xen/include/xen/vpci.h
@@ -127,6 +127,8 @@ struct vpci {
         bool enabled         : 1;
         /* Masked? */
         bool masked          : 1;
+        /* PBA map */
+        void __iomem *pba;
         /* Entries. */
         struct vpci_msix_entry {
             uint64_t addr;
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 12:55:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 12:55:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286001.485313 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRCtZ-00021c-NR; Mon, 07 Mar 2022 12:55:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286001.485313; Mon, 07 Mar 2022 12:55:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRCtZ-00021V-KR; Mon, 07 Mar 2022 12:55:25 +0000
Received: by outflank-mailman (input) for mailman id 286001;
 Mon, 07 Mar 2022 12:55:23 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRCtX-00021D-Th; Mon, 07 Mar 2022 12:55:23 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRCtX-0004Iq-RX; Mon, 07 Mar 2022 12:55:23 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRCtX-0002Bx-GY; Mon, 07 Mar 2022 12:55:23 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRCtX-00054i-G4; Mon, 07 Mar 2022 12:55:23 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=t9Gm7sIXKgpiXVXtBWB6DpC1qMhcMT7nNfH8KYnhBCU=; b=uXMDRH328xIdFtTH1J4SSTazGL
	MZa9GNehj8zudlomVEy4B/TTtJlVKG5BcxZh/nyigv3XNQxJPdEiooU0yowjydXHqms8EP+ySmHfe
	src/3ffjuu5lNYE7tOm3ILanCsQI1PPoL4nx2YEFXU/zSCzUBYzig2F5uVe0ZhK1OKHE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168454-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168454: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=4cb8d7a06752b368a365e30117f535a2fdad3963
X-Osstest-Versions-That:
    xen=1145d94c738ea13e0d2ceedb97a4cfe46292b08e
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 07 Mar 2022 12:55:23 +0000

flight 168454 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168454/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  4cb8d7a06752b368a365e30117f535a2fdad3963
baseline version:
 xen                  1145d94c738ea13e0d2ceedb97a4cfe46292b08e

Last test of basis   168399  2022-03-04 14:03:05 Z    2 days
Testing same since   168454  2022-03-07 09:01:41 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Andrew Morton <akpm@linux-foundation.org>
  Daniel Walker <danielwa@cisco.com>
  Gao Xiang <hsiangkao@linux.alibaba.com>
  Jan Beulich <jbeulich@suse.com>
  Jiri Kosina <jkosina@suse.cz>
  Lasse Collin <lasse.collin@tukaani.org>
  Linus Torvalds <torvalds@linux-foundation.org>
  Zhen Lei <thunder.leizhen@huawei.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   1145d94c73..4cb8d7a067  4cb8d7a06752b368a365e30117f535a2fdad3963 -> smoke


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 12:58:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 12:58:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286012.485324 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRCwp-0002m5-7i; Mon, 07 Mar 2022 12:58:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286012.485324; Mon, 07 Mar 2022 12:58:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRCwp-0002ly-4n; Mon, 07 Mar 2022 12:58:47 +0000
Received: by outflank-mailman (input) for mailman id 286012;
 Mon, 07 Mar 2022 12:58:45 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRCwn-0002lr-Qi
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 12:58:45 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 5227a73d-9e16-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 13:58:44 +0100 (CET)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2056.outbound.protection.outlook.com [104.47.14.56]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-20-UDV3kI88N5yFk-z20cRzUg-1; Mon, 07 Mar 2022 13:58:43 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR04MB4692.eurprd04.prod.outlook.com (2603:10a6:208:cc::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.13; Mon, 7 Mar
 2022 12:58:41 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 12:58:41 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5227a73d-9e16-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646657924;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=fo1Xv3aTC0Dr8YQc6ay8PVni0sHLeJ9IKSxJHRpcaHM=;
	b=ICM40SNIT0mKA08KPrvXKh3T18kLC1G9cyfeenHSDjmHSo4fzGMl+BuxHXfX2pqdr9MX9X
	FCSFBCZ9aahDQUvWpLM6Y4Ay52Of4J1VxGoqB80OxBC8/4OuVkFzERKJL6hLUePd4jBp8v
	0FA+KsWhjNudiJNFi+wkE3nvGaPwuA8=
X-MC-Unique: UDV3kI88N5yFk-z20cRzUg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ayhOQ9hOYv5pNoh0dsH+2bHRwf8JBvKuXwtC7R09CqVPu4kF94TE01ZAcGCFt15HthMubvpgKi7ckofqq7wm4q/UOo4xHYlqyUmA+Rry2Z+F5Vkw7cnRsO1iToLy4Sv8W/eRQKgTkKkasc4wFRIwzGAEyy1DG6O0nb9Iyz417qLaJoE1/gDsDBNH9LN3zXWiiJtdlHRXax+QlkdVKT4kyHxAtCz66b+wD3xwVfoMFCwhqWuy2b4ckAITgGnkgtKbKfPHYttItiMuMjCDhv4zhJEgMpU6HMc+zif8IPeUk8PSDcp6j7yww0BMEFVYDuC/bnIHjGnxEsUJqANPtlHhoQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=fo1Xv3aTC0Dr8YQc6ay8PVni0sHLeJ9IKSxJHRpcaHM=;
 b=YV7BUBgMGCoRvQg0ZMlgLuWzZAgnWmGbZR6hdOzCIirWHfHIXFdK0nfGCtDG7nK6XY1p6fLoKrNH3def9QgnkzLyAp177uaM+d1y001QN2As+Ny/hTqdn/a+XYBOIX1RDRbY6KaQKWcseGjiy00dMtMy3O7Aa7cnnH44NoNHSFPjJLx2AwMqSTcSyuQnc6/BU1DAtT7f8Qd2XdWIfm7efsj3J5TnSWbpBHBL5ZU5DPVaeIKf01RAjh8PSvW/Lw1BgJwjJ18L1GCDc7KZ7Os5FMfeAYJjkMNh8P2iAcV26x5BSghjr6gGNYiXpp8FDi+pS7K5g7fz0hfiirBTvn9GtQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <72480195-fca2-ac6b-f592-e3f3fc316a9b@suse.com>
Date: Mon, 7 Mar 2022 13:58:42 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] x86: fold sections in final binaries
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
References: <03851bd4-9202-385f-d991-c9720185c946@suse.com>
In-Reply-To: <03851bd4-9202-385f-d991-c9720185c946@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P194CA0105.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:209:8f::46) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 42b77f5b-47ba-4e2f-00e4-08da003a3433
X-MS-TrafficTypeDiagnostic: AM0PR04MB4692:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB4692DF225B0F7A9DCDD67C0AB3089@AM0PR04MB4692.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	hOfxZnnTyXBUsuRNkmdQOI720SDkQ45G2aqSyj+IHIRn1lNainxFkWxmCxGyPtG69w4mr9020OzHGnFlhlvBbVd8/aGBvPbZRNjC8DE0zQa/ALl4iopA/YhXEAnkmmr3uZkyTOkOAWlNdy9YfeUZHZHWsu1Nzz4DX9sHnGfRYHiViiQXNPb5mXiYVJBbykastMj0lY4eHHnIVne2px205L9V8ND/Efz36X48qUUYKPsdmR+9g8C1Dl1pluW+hGI++0+jIPAQqAq/nacLPxG4JcEDAZrmoAr1P95y5sWmE6eQEYnC9ITC6cpMyhGXtiNviZxkE8lLjtQEdphq8csbi18ITIVu5WuR1heUqZiS1acvg9LNfRcCNYLPchrFE7t10B8UL//3dpJVswen82gzmw2umeJwEcUDfeHi38otJ4UYZ/3NWSgx0Tjd2FxaPDl+LZn5oiytd4FEXEGZeErHoJXmx+rvuSqjHZ4JQjWPtSkmLBOmdxHlBrZKQ7PRhtH+4opLfiiVObQ6eyVqdZQKdpbVoyC9jnpG+CctcyNePggJ2X1evubf7nuwNcBNiU4DKGbrHVn2/fnIrOkUSrUgcz/TX1bfeqXPc4XuirbH22tuT7jJY7xeTppQtq+2L+eN6+QnipgH8+aZoOlpGfZa5ygPXEIbU7nyIaGSHyDHIb52+LA7NndgYA2xfAEU5OMWrccH5JypY7jVxgn/UMGhXrES0FN5LhlFr7uxj4FAPMY=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(4744005)(26005)(66556008)(66476007)(38100700002)(66946007)(186003)(5660300002)(2616005)(316002)(508600001)(54906003)(6486002)(6916009)(2906002)(6512007)(53546011)(6506007)(8936002)(31696002)(4326008)(31686004)(8676002)(86362001)(36756003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?dW9ReDNhSXhQS0NjZ2tsYURzaWFKZXAySklSTjNLZHZFWUJ1RU1YSDhMeXEz?=
 =?utf-8?B?Y1VFaXlsbTZlL2lKQURqczJPRnhXbTJYbFdHVUs2Ty8zRjFJYVZDYlU0ejJp?=
 =?utf-8?B?UERKZnBIYjlCRW5DQ3ZNY25SenRFUWsvVjc3QlJCd2M2WFRkTXNxVEtCdVFZ?=
 =?utf-8?B?ZDVrWTRUdzM4Z1dZbDFndnBKb3hWcmpFYm5YUS9YL1ZsUWtpR3g1SEJmZitX?=
 =?utf-8?B?ZGFibmhiUHptenhkRDhuUlNxWGZkek1ralpmNDhtdFRNeGNtcEprcFRmR2NK?=
 =?utf-8?B?d2lQTHpMSS94NGtwMk9nUnpHYm5Ea004Z1BTYkJOcER5RGdPeStVeUVHSkNw?=
 =?utf-8?B?a00rSVBwMktIamU1NVRGQkRMZzZVZjd6V1NNcjZYSkxLWXlacU9hd2x0bEU0?=
 =?utf-8?B?Rjczc3RvM240dDdvS1JQVjFoYWlrQXhxOEgvRVhXTzVmcU5FbG0wUWRXNllB?=
 =?utf-8?B?bFBmR3VZUTlkQlRoYldWZC9pUDR1ZnovTXNWQ1BOdTFtVGk1azNIZTVNWTVE?=
 =?utf-8?B?YzdLWE9zUE00SXQ3ZkRxWjRucDJaS05rTUJoSDk0Q2FrNVBnQ1FwaElrakV6?=
 =?utf-8?B?UHFqNTBUblB3YjIrblNUKzFZQ2l1VU5HSGxHREJUMEFvRkVGakpKR0FBcWkr?=
 =?utf-8?B?ODhmb1JablVuY21Ta3IxVldNUTVkS25ybXNlQXhXRkNtM0FFeHhYT1FPS1RB?=
 =?utf-8?B?NlUvYUc0bk40WXhDNWNMODh2VGRITDJQMld1N2ZJN0h2Z2I4bjYzNmQ5K1Yv?=
 =?utf-8?B?dFo2a0tYQ1o4aDZ5by8wOVNhNTZ4YWExQzllb0x0UERMd1BnZ0grMy9BYXVz?=
 =?utf-8?B?SytVOEJySnljUEtXazFGcHpVaVF0ZVhNeTIzMngxTGJQRldoUUNqSUVlN1NJ?=
 =?utf-8?B?SmJncWhXZ2tTT1orcTZqZGF6YkRrMER3ajJZRXhaeWRBTXFvbDBQWlc3enRr?=
 =?utf-8?B?bzVpZTBWQzFRanpWeXp2Sk9oZjcrdzZHVzhpYXRSVzNyV0VkWldva0phNXBY?=
 =?utf-8?B?YUhmNFpWUzFKakdKbndlV1FzZ0xoNmlIV1JvTnlocnBaU29FaEU5SVNwY25V?=
 =?utf-8?B?ZGtKV21LTkZXc1hkcnEyRVFHTDNrcTVIc1BWRHNlTEpWaWplMERuNXQwRVRU?=
 =?utf-8?B?L2NILzE5citSVHNQRmY0bTNFMTZLd2dENWRZVUx6b2xtL1Z5L3g4TENOWXRJ?=
 =?utf-8?B?cWZaRi82WGMwb01WTVJQTEE4OWM2RVVTWUhmNFJSSDJWTjk1Tk1YRmQyZFpI?=
 =?utf-8?B?V0Y4eDJlQkhhSDZNYit4bDV4ZUc2ZVZZZmRrMHA5bWJBVjJyNXR4N3ZnYUxV?=
 =?utf-8?B?OWVGSkpBSFVUY3NzeEZrU3lZR00zSkZkRUJmRUFmNE4vZnFVeVVnTllZemN4?=
 =?utf-8?B?anE4eGgya3pzKzZtcE1Pd1NMOFZ0ZXhoVlZ5NFhUc05maDZrK0ZQcVlJS1J0?=
 =?utf-8?B?VGhFekFPOTkzdDVqY0s4TFhKeW52R1hicmZUdlJDVC9uYk9LQlowSlQwWGxX?=
 =?utf-8?B?d1BzQUo4bUZZVjhZQnlVR250YzRmUzBIclBFWVA3dWlvZ1pLcDBzQUVobzdU?=
 =?utf-8?B?MmtXaXJxME1wc05JVWJwelVuUzVRUytPaUlFUXREcjhOY2JGVjc1eHNhb0Fu?=
 =?utf-8?B?UEtrR3RwMTBKK2NMZzczM3EvKzNrNldBeWloWlhzQjhubkRmams5Qy9oQUVy?=
 =?utf-8?B?RU54UGgyVTdWcUxZNDJtQkhMMjdMd1lxank2bnFWV1BrWWlsdUg3Nll6Rkdo?=
 =?utf-8?B?d0ZhS1ZHVTN3SGdNRzYxSE91bUx4ZWxBR3RCQ3Y0akxmUFU5SFB1WnhjenRF?=
 =?utf-8?B?b210Z3hWbnQ5Vnk3eVc1YWg3SFMvemJ2ME96ZW5uTXpNSExWK0VKOXhXQjlV?=
 =?utf-8?B?am5XZnVGOUcrQTdYMVgrQ0I4U2E5R3I2N21odllTVHNTZlhEdjBYU0svWms0?=
 =?utf-8?B?c01XSS9nMUEvZlhPczR1c2VSRm13bjNnWlBWbWl5SGF2cSt5bVZ4YmoydVE3?=
 =?utf-8?B?Yys5b213d2dEQmd2VDNIUlc0M0pOR0ZvN3JOTlVlYnBCU01ZMGRSQmRrTUVv?=
 =?utf-8?B?bkU2TnFESVFjQllod3E5dnhVSmFNNDlaMk9xbHVCN1MwaGE1K0NickJwdERU?=
 =?utf-8?B?OVZvbFozdytMZHdpdWg5aVZ1RVNrT21ZMVVMQjY2VGh5dnc5V1hRMmFvVmVZ?=
 =?utf-8?Q?ATIYM1SLgazdcv0tXncYerE=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 42b77f5b-47ba-4e2f-00e4-08da003a3433
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 12:58:41.2082
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: TGUOLFfg4TmJB5HETxsU8nCh8XswuZ5Pg/KqSb8Pnm6Sx51tP54ZTgzupSohCh+gfeCQKr1D8iknF0b++PPrng==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB4692

On 01.03.2022 09:55, Jan Beulich wrote:
> @@ -258,9 +259,10 @@ SECTIONS
>  
>         . = ALIGN(8);
>         __ctors_start = .;
> -       *(.ctors)
> +       *(SORT_BY_INIT_PRIORITY(.init_array.*))
> +       *(SORT_BY_INIT_PRIORITY(.ctors.*))
>         *(.init_array)
> -       *(SORT(.init_array.*))
> +       *(.ctors)
>         __ctors_end = .;
>    } PHDR(text)

Sadly there's another regression here, with old GNU ld: SORT_BY_INIT_PRIORITY
is known by binutils 2.22 and newer only. 2.21 uses SORT() in respective
places, but I have to admit I don't fancy adding a probe for what we can or
cannot have in linker scripts. Yet for now I also don't see any alternative
yet ...

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 13:14:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 13:14:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286019.485335 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRDCG-00059g-L8; Mon, 07 Mar 2022 13:14:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286019.485335; Mon, 07 Mar 2022 13:14:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRDCG-00059Z-Hi; Mon, 07 Mar 2022 13:14:44 +0000
Received: by outflank-mailman (input) for mailman id 286019;
 Mon, 07 Mar 2022 13:14:43 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRDCF-000599-Rp; Mon, 07 Mar 2022 13:14:43 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRDCF-0004cd-Ov; Mon, 07 Mar 2022 13:14:43 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRDCF-0002c2-73; Mon, 07 Mar 2022 13:14:43 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRDCF-0001po-6a; Mon, 07 Mar 2022 13:14:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=YJxsnPfd+43lr8ZMqYYBfLiAi6zDXZ3GvG0iRMX7BWk=; b=d5vLU5mdCH3a1G7to4qnV1PvfR
	u1/Pms37K9j8h/+/Ful1bQVcMZiE0kA8VqAQvUIFIOsKgCplBHnoHlxWBVFdH21WYSJDJFPjyef41
	J12qxH7IfohiRWxTNAQtCqbmbCWazmh1RTy1gFno489nzWwe4/MHmHXDhdFVewpqK4ps=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168459-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168459: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=79f2734e5a7bc2e5256eb0e599f45407855159c7
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 07 Mar 2022 13:14:43 +0000

flight 168459 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168459/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 79f2734e5a7bc2e5256eb0e599f45407855159c7
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    7 days
Failing since        168258  2022-03-01 01:55:31 Z    6 days   70 attempts
Testing same since   168449  2022-03-07 02:15:20 Z    0 days    8 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 437 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 13:17:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 13:17:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286029.485346 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRDET-0005sF-2J; Mon, 07 Mar 2022 13:17:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286029.485346; Mon, 07 Mar 2022 13:17:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRDES-0005s8-UE; Mon, 07 Mar 2022 13:17:00 +0000
Received: by outflank-mailman (input) for mailman id 286029;
 Mon, 07 Mar 2022 13:16:59 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=NixE=TS=citrix.com=prvs=05809d0ec=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nRDER-0005s2-OO
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 13:16:59 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id dd264158-9e18-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 14:16:58 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: dd264158-9e18-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646659017;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=c+k+7/LIv5GOwGrRzB9qcjoW4h3ycch/t2uRfEac1Jc=;
  b=cl9fdr+MpUiNPAOkkOP4JL27ZtwTvgYteBoKJlIj43x/aQ4zcCDIL47k
   M19ymOu1xGXCYFTUlYWrgCUOlxPi1o+NpTnQVGv6hafnLNIzOpWTQmLNA
   inolW1ovcCSCLaK2g+uExBt/bs8wq9Q9F133H8zwHFYCL+SV4HnvWqAjr
   4=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66009736
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:laWaXKpZQRkHHXtwG2YP/+3GAH1eBmK1ZRIvgKrLsJaIsI4StFCzt
 garIBmEbK3eMzf1f4t+ao3lpkhT7Z7Ty9JjTQY6pS0yQy0X9puZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 Yyq+aUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBLvHwuacdCBJjCjxQAL185ZuWByG2vpnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVI7zjfALADSJTKR6zM6PdT3Ssqh9AIFvHbD
 yYcQWQxNEyRPEYRUrsRIKAHuOH531nASTRJtwqovY9puHT47CUkhdABN/KKI4fXFK25hH2wr
 G/c437wBB1cMdWF0CeE6VqlnOqJliT+MKosE7m/+u9vkUek7GUZAx0LVnO2ufC8zEW5Xrp3K
 VESvCwnrqEw9UmiZtj7QxC85nWDu3Y0S9dWVuE39gyJ4q7V+BqCQHgJSCZbb94rv9NwQiYlv
 neKks3oA3pzsbSTYXOb6rqQ6zi1PEA9MmsqdSICCwwf7LHLoos+kxbORdZLC7Oug5v+HjSY6
 zKFti8lnJ0IkNUGka68+DjvmCmwr5LESgo04AT/XW+/6A59Iom/aOSA60Xf7PtGBJaUSB+Gp
 ndspiSFxLlQV9fXznXLGbhTWuHyjxqYDNHCqU4zI7hi92+mwGe+U71A2ixadWEwO8lRLFcFf
 3TvkQ9W4ZZSOl6jYql2f5+9BqwW8ETwKTj2fquKN4QTO/CdYCfCpXgzPhDIgwgBhWBxyflXB
 HuNTSq74Z/244xDxSH+eeoS2KRDKssWlTKKHsCTI/hKPNOjiJ+ppVUtbQHmggMRtvrsTODpH
 zF3bZfi9vmneLeiChQ7CKZKRbzwEVA1BIrtt+tcffOZLwxtFQkJUqGNn+5wJdQ6xPQFyo8kG
 01RvWcClDLCaYDvc13WOhiPlpu1NXqAkZ7LFXN1Zgv5s5TSSY2u8L0eZ/MKkUoPr4ReIQpPZ
 6BdIa2oW60XIhyeomh1RcSt/eRKKUXw7SrTbnXNXdTKV8M5L+A/0oS/JVWHGehnJnffiPbSV
 JX7jlKLGcdYHl86ZCsUAdr2p26MUbEmsLsad2PDI8VJeVWq945vKifrieQwLd1KIhLGrgZ2H
 S7PafvEjYEhe7MIzeQ=
IronPort-HdrOrdr: A9a23:wmgwoKPxpdrf4MBcT2z155DYdb4zR+YMi2TDiHofdfUFSKClfp
 6V8cjzjSWE9Qr4WBkb6LW90DHpewKSyXcH2/hsAV7EZniphILIFvAv0WKG+VPd8kLFh5dgPM
 tbAstD4ZjLfCJHZKXBkUiF+rQbsaG6GcmT7I+0pRYMcegpUdAa0+4QMHfBLqQcfngjOXNNLu
 v72iMxnUvGRZ14VLXYOlA1G8z44/HbnpPvZhALQzQ97hOVsD+u4LnmVzCFwxY3SVp0sPcf2F
 mAtza8yrSosvm9xBOZ/XTU9Y5qlNzozcYGLNCQi/ISNi7nhm+TFcdcsvy5zXIISdOUmRIXee
 r30lAd1gNImjXsl1SO0F7QMs/boW8TAjHZuAelaDDY0LPErXoBerR8bMRiA0HkAgMbzaBB+b
 MO0GSDu5VNCxTc2Cz7+tjTThlv0lG5uHw4jIco/jdiuCQlGcpsRKEkjQpo+a07bWrHAUEcYZ
 1TJdCZ4OwTfUKRbnjfsGUqyNuwXm4rFhPDRkQZoMSa3zVfgXg8liIjtYEit2ZF8Ih4R4hP5u
 zCPKgtnLZSTtUOZaY4AOsaW8O4BmHEXBqJOmOPJlbsEr0BJhv22tTKyaRw4PvvdI0DzZM0lp
 iEWFREtXQqc0arEsGK1I0jyGG6fIx8Z0Wb9ihz3ekLhlSnfsuaDcSqciFdr/ed
X-IronPort-AV: E=Sophos;i="5.90,162,1643691600"; 
   d="scan'208";a="66009736"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=jC5+Yp+iCWLGwNHi0cEVWCCYJ/CvKb7k3oGDLA3hHB2A8PKGyMMWn+g5cGSXYqEoMCoPmWaSVc6rxv0ikvFBcmRwVZyoitxf570daQWa7p/E9dBZH72en1DmWTplNVM3pEfqI0EzEg2gn5hlZynwvQHlPgfkldvzTbkxoQj/paBmMJfEm2WCgx4CWD0MK5a/Gjzhb4K6/a7oR1/Y4Neh5iCpT0Nl2XtIaMchs3dxZ9dgiEXqqZHwL8V0aWfWJeWfUdjepudqlGCm4uinRLgLna3e/4tKpe5iW8NpyOEczXOxXoR54Znm/JZCB0k7IVWDye3FVMwM+w46pxJBWEfXfA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=c+k+7/LIv5GOwGrRzB9qcjoW4h3ycch/t2uRfEac1Jc=;
 b=Wzy3NPTcwSUas0B9reLxwPHDPbJQHLR9SuvwF5grxwX9+JwNnSsCB4aF2lBj/IK/O9cp+L6lFEOjMaukeTiHw71NIe7W/dJ08ugidjMyHgHObxMWnNaaE43S9Z3pl+EJpkMC78+Y4SeSxIaNO2ph+ZnhYM+iqVfNnPt5Qjhs4N9NtpIznh48sbi3T+/3Vj+duXSZKhYXwq5DtAiKqQ3LyAoR4Dg0cYTomUYtiKJNrheeOhujDC1q0mQh8lGOQoD0RXVILgYzmVhTZttyJGbLQPSdt2RQ7wGKdnrTyEcDE1B14Jo6PFq5tTTCqZyMeBlhdfCauvwkX86Fk1vTS0A3cw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=c+k+7/LIv5GOwGrRzB9qcjoW4h3ycch/t2uRfEac1Jc=;
 b=uOfmUfA79IZKpEN/iz0W/v2K/9JrlC2z2tMK3G2DX30HUit+JRG4HdLLJoH0gTzcOf/EzYsRPhxrraNDd/2vFLZygRPj0GeBXeYlj2LR/8eABI5mXfUZ2AEa21lCJeqw++ZWi9/i4BGCJ4tum6vRdWt6WwtWAc9DQKpepjbpzOg=
From: Jane Malalane <Jane.Malalane@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Wei Liu <wl@xen.org>, Anthony Perard <anthony.perard@citrix.com>, "Juergen
 Gross" <jgross@suse.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>, "George
 Dunlap" <George.Dunlap@citrix.com>, Julien Grall <julien@xen.org>, "Stefano
 Stabellini" <sstabellini@kernel.org>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>, Bertrand Marquis <bertrand.marquis@arm.com>,
	Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian <kevin.tian@intel.com>,
	Roger Pau Monne <roger.pau@citrix.com>, Xen-devel
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v4 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Thread-Topic: [PATCH v4 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Thread-Index: AQHYLkaMjdZBkrS3CkWZwGsOatNz36ytiXSAgABT+oCAAQaGAIAE+jyAgAADxgCAAAyyAA==
Date: Mon, 7 Mar 2022 13:16:52 +0000
Message-ID: <0d0dc2f0-470e-4ef7-ff88-f411ba79617d@citrix.com>
References: <20220302150056.14381-1-jane.malalane@citrix.com>
 <20220302150056.14381-2-jane.malalane@citrix.com>
 <240602ab-412c-8607-ed6c-916cf37343f7@suse.com>
 <67296830-aa16-4231-69ba-f07d2b1a4b65@citrix.com>
 <fa957ce7-07f8-9726-9537-8b05e9b6d76e@suse.com>
 <ee556d51-bcf7-5749-6e3a-92d1ec3092f9@citrix.com>
 <299a0fe4-e7c0-b381-4318-a27f02c96d98@suse.com>
In-Reply-To: <299a0fe4-e7c0-b381-4318-a27f02c96d98@suse.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: f3b9c6b2-b869-4981-433e-08da003cbed3
x-ms-traffictypediagnostic: BN7PR03MB3826:EE_
x-ld-processed: 335836de-42ef-43a2-b145-348c2ee9ca5b,ExtAddr
x-microsoft-antispam-prvs: <BN7PR03MB38269F63CB789A3B4EAE650B81089@BN7PR03MB3826.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM5PR03MB3386.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(26005)(36756003)(83380400001)(186003)(2906002)(2616005)(31686004)(7416002)(54906003)(316002)(38070700005)(5660300002)(82960400001)(6916009)(71200400001)(6512007)(6486002)(8936002)(508600001)(122000001)(91956017)(76116006)(31696002)(53546011)(66476007)(86362001)(66946007)(6506007)(4326008)(64756008)(66446008)(66556008)(8676002)(38100700002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?b3lBU2RpbUU3eVNTQTJBMmxKV1l4dlNtZWl1K3hna2NRSTJPR1pCSDYycTVH?=
 =?utf-8?B?cWFza0lCNWdZUk5kSi8zRC9aNXBXcVdReEJMQ3p4Wm4zdHk0V05tVjJEb0Vo?=
 =?utf-8?B?Vkx1QWpmZlpWMHRlYWRXakxVUU9RRytGUGQzclpHRmhXaTA0TlNIZDByT0RD?=
 =?utf-8?B?enNwMEFiRGdKWFB0RG85QUpaRUVoNmdlTWVIb1hBdy9TSTFSNU9PMWlORDZk?=
 =?utf-8?B?eUJsZ0RPenV4VnpuaWNoR2w4YklaSFQwYzNpKzJVWitvQjV4N0JCNUw2RHMv?=
 =?utf-8?B?LzNmRGpqVCtQN2ZVR1puNjRCZ0JmZGJjdnUvN0ZrbVFHSEIzYXdmd0pPWnU0?=
 =?utf-8?B?V0I1Mk1sdGs4cFIyVXBnMzRSQ25MTkxwWG4yV21peWlrRDFJaWVrVWQyRXUw?=
 =?utf-8?B?MnNNZnJmN1lqWnUyTy84UUJqSktYR3o1VWFGcWxWeWJtNktyelBqbHpSNG1Y?=
 =?utf-8?B?M1AvK2VNZm53YzdVQ0NoSS9hOXJHakR5V0k1UDFKbDZodVBqOVpWeFg5MnlQ?=
 =?utf-8?B?TXJ1d0tEY29TVjQvYTFVcmJQMjZSZE5ER3lhZ1p4WDNraFNKVFFXNzl6eEVG?=
 =?utf-8?B?eWhVTXJNNzhEd0ZqblJEY2dBUFZWbFJzK1FMV1QrbzNiVUQ5Y3A4NlVRdW9p?=
 =?utf-8?B?cWQzSmxKT1AzN2JvZENIOXFkVE5DUTJudmFoenc0SE9haGVKS1cwSnUrU2hj?=
 =?utf-8?B?TnkwdGZkT2l4SERlTEczRmNKNmpTZE54TkFxWlAxaFZSK3ZkRXh6SXB4c2g0?=
 =?utf-8?B?ak4wekszRndpNi8xM3JueWtSOWdHeFBBZW9zdzNtWkJDelZOdVlFb0NOVm1i?=
 =?utf-8?B?TlFCTThRSWl5dE9xZ013K2I1NFd5RXoxV0trU2ZabTVmVjV5WTU2d3d1ajJT?=
 =?utf-8?B?cENMM3laSnhhUUlNc2lJWnBubUd0ZHd3RGhKcldQNk81NVN1dXRydytocHBh?=
 =?utf-8?B?a291MnJDWkdnU2EvRTc1WTVRUkx4OVduYjVLNHRzWGZqei8rNm0xeGZyc3NI?=
 =?utf-8?B?WC9yRlFNcytSa1BUR2ZiRE52MDNDRjRMeUlqRDlmWWRkZFNsUmRncDVkdjJs?=
 =?utf-8?B?a25pMTF6WVpiWVJ5d09wZVNMNnhsTnBUb0V2Wk9nU21kY3NTWmhmTElJSWkw?=
 =?utf-8?B?RjBNa3FmZGpuQmNocmhpdC9CZTQzOGtWK2E5SlFDL2wwdmdycUdKSWcrcndW?=
 =?utf-8?B?T0xCQUZhejZQOFVPRmdqZG02cEdnbVkvMzQ3Vm90LzJxVUdtZmJNekVwS041?=
 =?utf-8?B?QytpWEkxSEdNWFlRT210MzVrUWpEQ0orVEVEOWlwRi9UK3BST1I0WHFrN2dM?=
 =?utf-8?B?YVBybXZCRzlRY2lIZmtIZlVCQk52OEZvaUJlM1ZucGVaaEpRT2o0QTVnNUtK?=
 =?utf-8?B?UDZod0IvTWkwVnNvUzFndmZkdWs1WHhpUTRJVnpkVmdNdGJTTXRJK0dKUW9w?=
 =?utf-8?B?OXBsZDdRS0h1TWUwWTMrUWNBK1FoaW5KbFV1cDFTbkRmZ2VCNXcxendmclp5?=
 =?utf-8?B?bHg1bUZaM1FjaHA3YUJOaG1XeTQvRFBKUU9jOG5oYVkrVmtMU2FqcDhJMnBB?=
 =?utf-8?B?ajRZakluRk1xNFA2Z1FWZ0tCUlJVMFBFRENvRUNrN2hRbFQzTC82Y2xDaldU?=
 =?utf-8?B?eDRNTDlpK1lqTkw1ekJrNEdTdkpEcEVuMGdhZENidWtaa05wanlEQ2EyWG9u?=
 =?utf-8?B?V0ZaY21GUkQyK2ltT3FxeWVEQXh1WlEyVWVLcVJBQ1BKYnRCb3BtVzEwbVQ3?=
 =?utf-8?B?cXRJWllaWTNscTF5WGpnZktFaTUrNmRhYVd6ZTUyWGt4eGJyOUtQVEZtamYx?=
 =?utf-8?B?RmZCamhTK3JIbGlOMGowdmVNWTEwbW9rVWh0aDNOQ3FKRWdBSDBZSkkwUVdn?=
 =?utf-8?B?QVdrTDdUZ3MxNjQyTklBVU1hcXN0QnZ5Vlk2clpOWWNMZTRoK2ZCWVBDaDJl?=
 =?utf-8?B?QUpqZjdKN0oycncxWHVXWTh2cTBSUkI3eWlkYzJNWDMrYTB5UjhLOWRsOHZF?=
 =?utf-8?B?eHlsdy9BT2xTYzBDYldDR1VRZ0tPUmZZdnk5RUhEU1pQc1VMSmhha0pFVklv?=
 =?utf-8?B?dmdKQzZlQldSOFhJajFxSDR5SVNma0dUL1JRZFA1b2N4SDhqWmZkUFd3WXVy?=
 =?utf-8?B?MVpjWnduMHAvWVR2bkY3ZFVLZXFUZUxmSWtteGVJcWpJcW1WVklEVXdTMHpl?=
 =?utf-8?B?dzRJWGo1RGpkMDJtVjQ5dU11SFp1KzNHMG1oS2tRNkM1bjQ2cWZiZGVwTktk?=
 =?utf-8?Q?97gD7Ik/7zoYVp0ocEBT+B78LWaAGphcOJElL0xFPs=3D?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <9BB1C3518079D24CA36CD610F7753FD6@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM5PR03MB3386.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f3b9c6b2-b869-4981-433e-08da003cbed3
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Mar 2022 13:16:52.3869
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: N2/s6AOWvg2Q/Y5xKhM7cwmWvwrTy+t1SJyjPayU+m4Tav/NlRdgAdHQGXsgLufght7x30zOUh/0sLxm3+P+n0QY//fSS5EaPSK3HqfsV9A=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN7PR03MB3826
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Mon Mar 07 13:27:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 13:27:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286037.485357 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRDOW-0007VY-1q; Mon, 07 Mar 2022 13:27:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286037.485357; Mon, 07 Mar 2022 13:27:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRDOV-0007VR-Uk; Mon, 07 Mar 2022 13:27:23 +0000
Received: by outflank-mailman (input) for mailman id 286037;
 Mon, 07 Mar 2022 13:27:23 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=9NfF=TS=citrix.com=prvs=058fb9784=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nRDOU-0007VL-V2
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 13:27:22 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 5047a127-9e1a-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 14:27:21 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5047a127-9e1a-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646659641;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=8WBhbeFM83plyJRJ4bS9p+w4+qcZkh9ZBtc9lqg5Il0=;
  b=R/AhZsHXd00PMtd2D3DdRz5dDcTdRqQ+vuJB2A1fO1UIcZiACnfZazEM
   HfOE4uzi4ablmmi8vwcO6PAkKF2J1x4GjjQZB+birkL0iRWcxp5cOK1D+
   PN1+PT918Wkll+SXdhP7g+u8du71oq5VPoZMMww44qIZv2e2YbxaI4tf5
   4=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 65605479
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:BQT+96yWp9c93w7XsaN6t+dHxirEfRIJ4+MujC+fZmUNrF6WrkVUz
 zQeW2qBOKzfYjGgLdsiPIm28R8FsceGyoJjGVZkrSAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2YfhWWthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 NpljMaMR18HfazwpOUxVzcbOHlxIIRn5+qSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DFYUToHx/ixreCu4rW8vrSKTW/95Imjw3g6iiGN6AO
 pRBNGYwPXwsZTVWJXwnLb03tdz3j3bZegZXhm6QnfIotj27IAtZj+G2bYu9lsaxbdpRtlaVo
 CTB5WuRKjMwOcGbyDGF2mmxneKJliT+MKoCGbv9+vN0jVm7wm0IFAZQRVa9ueO+iEO1R5RYM
 UN8x8Y1hfFsrgrxFIC7BkDm5i7f1vIBZzZOO9Rg1A/V5OnV3zqYKmwqDRUZZ8EPldBjEFTGy
 WS1t9/uADVutpicRnSc6qqYoFuOBMQFEYMRTXRaFFVYurEPtKl210uSFYg7TMZZm/WoQWmY/
 tyckMQpa1z/Z+Yv3r7zw13IiinESnPhHl9svVW/so5IA2pEiG+Zi26AtAKzARVodt/xory9U
 J8swZT20Qz2JcvR/BFhuc1UdF1T296LMSfHnXlkFIQ7+jKm9haLJN4Mvmwveh82aZZUJVcFh
 XM/XisLuPdu0IaCN/crM+pd9exwpUQfKTgVfq+NNYcfCnSAXASG4DtvdSatM5PFyyARfVUEE
 c7DK66EVC9CYYw+lWbeb7pNgNcDm3FlrUuOFM+T8vhS+efHDJJjYexeawXmgyFQxP7snTg5B
 P4Eb5rak0gECbamCsQVmKZKRW03wbEALcieg6RqmiSreGKKxElJ5yft/I4c
IronPort-HdrOrdr: A9a23:MM0rHKO6eOw0tMBcTs2jsMiBIKoaSvp037Eqv3oedfUzSL3+qy
 nOpoV+6faaslYssR0b9exoW5PwJE80l6QFgrX5VI3KNGKN1VdARLsSi7cKqAeAJ8SRzIFgPN
 9bAspDNOE=
X-IronPort-AV: E=Sophos;i="5.90,162,1643691600"; 
   d="scan'208";a="65605479"
From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Jan Beulich
	<JBeulich@suse.com>, =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?=
	<roger.pau@citrix.com>, Wei Liu <wl@xen.org>
Subject: [PATCH] x86/cet: Force -fno-jump-tables for CET-IBT
Date: Mon, 7 Mar 2022 13:26:51 +0000
Message-ID: <20220307132651.25691-1-andrew.cooper3@citrix.com>
X-Mailer: git-send-email 2.11.0
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

Both GCC and Clang have a (mis)feature where, even with
-fcf-protection=branch, jump tables are created using a notrack jump rather
than using endbr's in each case statement.

This is incompatible with the safety properties we want in Xen, and enforced
by not setting MSR_S_CET.NOTRACK_EN.  The consequence is a fatal #CP[endbr].

-fno-jump-tables is generally active as a side effect of
CONFIG_INDIRECT_THUNK (retpoline), but as of c/s 95d9ab461436 ("x86/Kconfig:
introduce option to select retpoline usage"), we explicitly support turning
retpoline off.

Fixes: 3667f7f8f7c4 ("x86: Introduce support for CET-IBT")
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
---
CC: Jan Beulich <JBeulich@suse.com>
CC: Roger Pau Monné <roger.pau@citrix.com>
CC: Wei Liu <wl@xen.org>
---
 xen/arch/x86/arch.mk | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/xen/arch/x86/arch.mk b/xen/arch/x86/arch.mk
index f6fc852b5767..8e57476d6573 100644
--- a/xen/arch/x86/arch.mk
+++ b/xen/arch/x86/arch.mk
@@ -51,7 +51,10 @@ CFLAGS-$(CONFIG_CC_IS_CLANG) += -mretpoline-external-thunk
 endif
 
 ifdef CONFIG_XEN_IBT
-CFLAGS += -fcf-protection=branch -mmanual-endbr
+# Force -fno-jump-tables to work around
+#   https://gcc.gnu.org/bugzilla/show_bug.cgi?id=104816
+#   https://github.com/llvm/llvm-project/issues/54247
+CFLAGS += -fcf-protection=branch -mmanual-endbr -fno-jump-tables
 $(call cc-option-add,CFLAGS,CC,-fcf-check-attribute=no)
 else
 $(call cc-option-add,CFLAGS,CC,-fcf-protection=none)
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 13:38:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 13:38:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286043.485368 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRDYn-0000cn-39; Mon, 07 Mar 2022 13:38:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286043.485368; Mon, 07 Mar 2022 13:38:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRDYm-0000cg-V2; Mon, 07 Mar 2022 13:38:00 +0000
Received: by outflank-mailman (input) for mailman id 286043;
 Mon, 07 Mar 2022 13:37:59 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRDYk-0000ca-Th
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 13:37:59 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id cb9b90cc-9e1b-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 14:37:56 +0100 (CET)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur03lp2054.outbound.protection.outlook.com [104.47.9.54]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-26-n5Qcd5AeMkON5a2jUvVHnw-2; Mon, 07 Mar 2022 14:37:54 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR04MB5140.eurprd04.prod.outlook.com (2603:10a6:208:ca::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.26; Mon, 7 Mar
 2022 13:37:51 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 13:37:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cb9b90cc-9e1b-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646660275;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=kIqkv8ybezUixvUhAtSNcJLi/OOxgZMaTY3yByPj5Bk=;
	b=B+mJ27+54ipWhC9fgOZFZBSN4yxgzjThmCL6xZZpd1H5d1js2hVMXKRd6TuIRw5WozSQYc
	wUUoYIefnVNL54yweo5A1X5JphN6wj+sntDIa4CEhOJVnq+gm4vsFGX3LhW/zqPFIhbvBl
	p6Uy/Dwmq8hd5C/AaaGNf1KgNHGTFrU=
X-MC-Unique: n5Qcd5AeMkON5a2jUvVHnw-2
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=TVYvA4qxwWJF+XLv/kkgt7tQXrDAiyQ3JjTCjUT07DW3NGNUeATSzcssFJIEckAH3ewST19nsQfqoooSsDwVz1eht32z/SLqLmNoGRpdw+sMqKEyTYW0qOO1O+ent37eptQ3EPYErqTARKOJosOChLk7OXuGpQvTWoPsBOblsym4XOStPBueTFurVImtmdrw5qv0qGpTgkd8RAnRXMm4jc7YgQSVsUpHRa3h/k6bBi3aA1iVy1Cnh7Gtrv8zOKFcy9JByjwsisG+HNwNtASD6nxRiiBq3tUBMwWPPdUonpshG8bDwPOEXl/PHyMtEyYsp/2nbpcK2ikw4TaoF0pjUQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=kIqkv8ybezUixvUhAtSNcJLi/OOxgZMaTY3yByPj5Bk=;
 b=cN5dgoSuo9Jp15MxafvOjQIVN8RWvcbRtXLZNdyJ9pvp5Pl2JcZGM0T1ODDOvX6TTuBqe20yWdLVwCtd7A3JpCBfHLUJwea3detvJJnPGoxy5pbtOo8vSUoE/lrVEGM5Qr6Psqat/MBAyAXvBfcRGbV0W6S45P2dVas3zT3cC9TxAeqUN88QT2cJchhqQEyQkkCgtiKDZ/7nUweHnIIK3hHA/DqBrAM94sAWS04dO0r0kCAS7rdC8m8xBFCPJ1FAEHEvPP9DVara5HCwvwzYcodOY/Hdxv4zC3L4f5lRNAV9zdxaNPxglUniIZvlLqB2PGlIDojMnGQMuWyxSiEJBw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <298b7b5c-0c5a-c449-deb9-4495a704b3d3@suse.com>
Date: Mon, 7 Mar 2022 14:37:52 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v4 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Content-Language: en-US
To: Jane Malalane <Jane.Malalane@citrix.com>
Cc: Wei Liu <wl@xen.org>, Anthony Perard <anthony.perard@citrix.com>,
 Juergen Gross <jgross@suse.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
 George Dunlap <George.Dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian <kevin.tian@intel.com>,
 Roger Pau Monne <roger.pau@citrix.com>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <20220302150056.14381-1-jane.malalane@citrix.com>
 <20220302150056.14381-2-jane.malalane@citrix.com>
 <240602ab-412c-8607-ed6c-916cf37343f7@suse.com>
 <67296830-aa16-4231-69ba-f07d2b1a4b65@citrix.com>
 <fa957ce7-07f8-9726-9537-8b05e9b6d76e@suse.com>
 <ee556d51-bcf7-5749-6e3a-92d1ec3092f9@citrix.com>
 <299a0fe4-e7c0-b381-4318-a27f02c96d98@suse.com>
 <0d0dc2f0-470e-4ef7-ff88-f411ba79617d@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <0d0dc2f0-470e-4ef7-ff88-f411ba79617d@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P191CA0104.EURP191.PROD.OUTLOOK.COM
 (2603:10a6:209:8a::45) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 56eae4d3-f44b-4678-fc88-08da003face2
X-MS-TrafficTypeDiagnostic: AM0PR04MB5140:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB5140D9CCE3F6183668272CCEB3089@AM0PR04MB5140.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(31696002)(6916009)(26005)(316002)(38100700002)(6512007)(6506007)(53546011)(54906003)(83380400001)(2616005)(186003)(508600001)(6486002)(36756003)(86362001)(31686004)(66556008)(66476007)(5660300002)(7416002)(8676002)(4326008)(66946007)(8936002)(2906002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?WHBubDdaaXc2dFRvTkVPZXNNS1hXTHA3ZGxRV1BGZUp2OXhhV00xREp5SnFj?=
 =?utf-8?B?TmpuN21HY041U0F3eDFLZkJTMzZMVzZqMThRTE5NSE16N1ZLNTFMMnhkbjlQ?=
 =?utf-8?B?ckJIVEM5azlxdGZWTndheVhOUUE2bkU0dWU5Y3VaN3pUR01rNlNKY0g1L1hX?=
 =?utf-8?B?aHdSVHIza0Z1Z0pjMG43bStlSkpPK3dEbkF2WmNPMDNNcUJQbVNvb25FTmV5?=
 =?utf-8?B?RHl5WVNYSG1Zd1RLTVRiZGhEeHdCUnlqdXI5K0k4S1VMRFJGb3g4Y0JTR2FO?=
 =?utf-8?B?dlJaTVhha0U0YTdzb01HTGIyYlhhUVRROXV1ZjJiUlV5eUVJaGN0ajJhZjNZ?=
 =?utf-8?B?bDJ6SWt2M09ta2pVaFM3RzZIT1ZDN1ZSU3JIQTlGMDhVUlZlL055V0liazlx?=
 =?utf-8?B?elZZc2RoQkpOaDF4L3hXSUFKVzdoY1RjU1IyZ3hlclA5ZmdxTE9lb1dEQTgv?=
 =?utf-8?B?WlFva0taY2ZGZUgvZ05MZ0wxTTlxWGQrVnJXSW5RaFZSWDlRNWtzdHV1ZjZl?=
 =?utf-8?B?Qm5obXRwTkorR2J0YzBDWU4vTEh4cGRkbmo4R1VBVWdVYkRMdktudHZsMTAw?=
 =?utf-8?B?VEhWaVFTTUk0Z1Z0UDFHNGhzSnQ1MklZTFYzcVBKZTRKVkZhakdTQmZGeFMx?=
 =?utf-8?B?bW9zYnFaczFXbWUrYzNJc3hEZ0p0dFg2anhHbCtKQTFncHhzWWExbyttRXBr?=
 =?utf-8?B?aXN1ZXNpUHBNUEc3eFROTXY1VUt4ZTlWelMyOXYwRG9vS3kxK2pLRXZ3bzA2?=
 =?utf-8?B?MUVLQUE5ajVldjhlak9LMXNTT28rbW5Vc2N2OEw0UDhWSkpQeFVjSDJHRVlZ?=
 =?utf-8?B?SXFCcHQ5eXZGNnlXWkZGV0sraUlWVFd2WEdEOGVac1VnemhuM3hUOU5KUmJx?=
 =?utf-8?B?dzc3YktoNzNmYk9PenNCcy9XOEtLRWRpcnBxV2FlRmhaVHhxK0doOVdqNTYx?=
 =?utf-8?B?dk1jYzN3ZEFZcUNQNHo4anViQXhCbjdhL0ZQNHB6Z0s5U0hWWEVBRHdpdlFM?=
 =?utf-8?B?Vnd2Umxld1VsMnRDNjRwTUZNU2hiekJrQWs5NVBxaTcvZnBFTktWRVNrZTdr?=
 =?utf-8?B?VEc4cHBtUWV5ZG1reG82bytKZVJ0bURwRVA4MzlTRWRjYlNnWGdBVkg4WUs3?=
 =?utf-8?B?OGN1eWxsaFpVVWxBOXVEdENtVUo0WmlvY2VCalBlT2ovZ1VjVkhiMU9VVWRh?=
 =?utf-8?B?eXNYcVp5bzB4aTU1cU1kc3lnekg5QlU2VDNINWlNanNSZ0tsUStQR1RtZnhC?=
 =?utf-8?B?d3dXNC8vOFF2cEwwM1BzN29pcHMyRmlRQUI2ci9KeHYvWEo2aXRBQU12U0ZI?=
 =?utf-8?B?NGc2S1NpVENzS29Kb25HejBtQlZDUnZLdXQwb3lsQWNvTTJzTlJ4QU1tdE9B?=
 =?utf-8?B?K0puT3AycmlLZkVYNG1UUHhRN2ZOMWI3RFM0bzRFeG9jQnNOTHQ4OUdLcDhF?=
 =?utf-8?B?MnBaa0hBL3ZnR1ZZNnFDTUN2YytVamE0TWNUVzVWbEI0dWdOenRDUnVYWEhJ?=
 =?utf-8?B?dzd3cDR5cGRuR3g5WXJ2Rm9KeGtyb1NRMEwySlIxZGwzNklTSzJCMjlVTUhx?=
 =?utf-8?B?TkxuZ1pFTUdvc0h2UUxVaGF1YVFDR0NIdUlPNjNDV3dkUU41QnNBbWlLbklO?=
 =?utf-8?B?MXdlWVpBSFlCUTk3bFlDVlozYlNrWWJrOHFtbWI3L1FLZG12Z3dGZXlrZnVC?=
 =?utf-8?B?UXlRMHhhYlFUUVBDTVlhc0hlUEx6S1N1OTA2RUhJcmNOcWhaU0ZlczNOVXQx?=
 =?utf-8?B?YWtwa052Ky9EenV5R3FNZjBkK3E3TGtXbkptV0VaVnFPWklKd3lmQ0prMG1p?=
 =?utf-8?B?d240OGwyTElGdytBYmtobUp1SGlpMVZ6UzF2MXVUWDBENFpjc0t6dmpuQ3l0?=
 =?utf-8?B?aFRnVzZIcUtPUFUraWlzNEhLbkJsNVJOWVZFbS9hWjNqSHk2aStXeXI4YWJj?=
 =?utf-8?B?NHY4elAyU1BmdUpSLzEwWjI3cjIrMktYdHF1b3Z2WEtxM1F4K2FmUkJhZ2g2?=
 =?utf-8?B?bHVUMStIdUQvY1dLRXJuRWxmNzh6c3lTOU0vTXN5dTRlL1U4SHpyRG00VjlN?=
 =?utf-8?B?UkZpR1g2SW5wNkR4SXJqd3pTeUhEdlJWMkNxRExpeEE0b25vTXlaNTVPbTRl?=
 =?utf-8?B?TjExUXd2aHB1MnFmNkdZQ1FHM1RueEQ5ampxQU5mREJRUmxVNlNXeU9xeVNI?=
 =?utf-8?Q?jZOiyocWQRkNmgP/vQYWptU=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 56eae4d3-f44b-4678-fc88-08da003face2
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 13:37:51.2655
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: lrJYeILm0BwlYQtUCy9AsN1E5e9svvCq2T9p8A0c7pXS2Hpf58fs0+oFGjA/Hn41mfL/oZFmJMcpSFDbIQ8bIA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB5140

On 07.03.2022 14:16, Jane Malalane wrote:
> On 07/03/2022 12:31, Jan Beulich wrote:
>> [CAUTION - EXTERNAL EMAIL] DO NOT reply, click links, or open attachments unless you have verified the sender and know the content is safe.
>>
>> On 07.03.2022 13:17, Jane Malalane wrote:
>>> On 04/03/2022 08:17, Jan Beulich wrote:
>>>> [CAUTION - EXTERNAL EMAIL] DO NOT reply, click links, or open attachments unless you have verified the sender and know the content is safe.
>>>>
>>>> On 03.03.2022 17:37, Jane Malalane wrote:
>>>>> On 03/03/2022 11:37, Jan Beulich wrote:
>>>>>> On 02.03.2022 16:00, Jane Malalane wrote:
>>>>>>> Add XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_xapic and
>>>>>>> XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_x2apic to report accelerated xapic
>>>>>>> and x2apic, on x86 hardware.
>>>>>>> No such features are currently implemented on AMD hardware.
>>>>>>>
>>>>>>> For that purpose, also add an arch-specific "capabilities" parameter
>>>>>>> to struct xen_sysctl_physinfo.
>>>>>>>
>>>>>>> Note that this interface is intended to be compatible with AMD so that
>>>>>>> AVIC support can be introduced in a future patch. Unlike Intel that
>>>>>>> has multiple controls for APIC Virtualization, AMD has one global
>>>>>>> 'AVIC Enable' control bit, so fine-graining of APIC virtualization
>>>>>>> control cannot be done on a common interface. Therefore, for xAPIC HW
>>>>>>> assisted virtualization support to be reported, HW must support
>>>>>>> virtualize_apic_accesses as well as apic_reg_virt.
>>>>>>
>>>>>> Okay, here you now describe _what_ is being implemented, but I'm
>>>>>> afraid it still lacks justification (beyond making this re-usable for
>>>>>> AVIC, which imo can only be a secondary goal). You actually say ...
>>> Is the following any better...?
>>>
>>> "Add XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_xapic and
>>> XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_x2apic to report accelerated xapic
>>> and x2apic, on x86 hardware.
>>> No such features are currently implemented on AMD hardware.
>>>
>>> HW assisted xAPIC virtualization will be reported if HW, at the minimum,
>>>    supports virtualize_apic_accesses as this feature alone means that an
>>> access to the APIC page will cause an APIC-access VM exit. An
>>> APIC-access VM exit provides a VMM with information about the access
>>> causing the VM exit, unlike a regular EPT fault, thus simplifying some
>>> internal handling.
>>>
>>> HW assisted x2APIC virtualization will be reported if HW supports
>>> virtualize_x2apic_mode and, at least, either apic_reg_virt or
>>> virtual_intr_delivery. This is due to apic_reg_virt and
>>> virtual_intr_delivery preventing a VM exit from occuring or at least
>>> replacing a regular EPT fault VM-exit with an APIC-access VM-exit on
>>> read and write APIC accesses, respectively.
>>> This also means that sysctl follows the conditionals in
>>> vmx_vlapic_msr_changed().
>>>
>>> For that purpose, also add an arch-specific "capabilities" parameter
>>> to struct xen_sysctl_physinfo.
>>>
>>> Note that this interface is intended to be compatible with AMD so that
>>> AVIC support can be introduced in a future patch. Unlike Intel that
>>> has multiple controls for APIC Virtualization, AMD has one global
>>> 'AVIC Enable' control bit, so fine-graining of APIC virtualization
>>> control cannot be done on a common interface."
>>
>> Yes, this looks quite a bit better, thanks. Assuming, of course, it's
>> in sync with the code in v5 ...
> Yes, ofc.
> 
> Just one thing, since vmx_vlapic_msr_changed() uses 
> has_assisted_x{2}apic anyway do you think it's still necessary to add a 
> comment pointing to this function in vmx_init_vmcs_config() when setting 
> asissted_x{2}apic_available and v.v. ?

If they both use the same, non-open-coded condition, then I don't think a
cross reference is needed.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 13:49:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 13:49:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286049.485379 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRDk0-0002Aj-52; Mon, 07 Mar 2022 13:49:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286049.485379; Mon, 07 Mar 2022 13:49:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRDk0-0002Ac-1p; Mon, 07 Mar 2022 13:49:36 +0000
Received: by outflank-mailman (input) for mailman id 286049;
 Mon, 07 Mar 2022 13:49:35 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRDjz-0002AW-HC
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 13:49:35 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6b45ce44-9e1d-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 14:49:33 +0100 (CET)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur01lp2055.outbound.protection.outlook.com [104.47.2.55]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-41-RORnIGj0O8in5_hQ1D-G8Q-1; Mon, 07 Mar 2022 14:49:32 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM6PR04MB5749.eurprd04.prod.outlook.com (2603:10a6:20b:a8::23)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Mon, 7 Mar
 2022 13:49:30 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 13:49:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6b45ce44-9e1d-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646660973;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=XPMDXJ8DEsGxfE6cWFy2tMlf7ejnDjisqhedDx6eHvE=;
	b=VDCkbYQCMO86bPJ1Ut5C9/JNsf5q/ClFBS5R8f40BSqWQ5dw+XzRFnzjBAaFqdqT032ZOj
	/8sJdRsn62cwSoIsYWKCaZFQvYCoOXxXCmtX+FZSSsaQlpSOh2mDMIhMG+B0e8sG8FZ2lg
	3v+0YHT9M3uvcJjmNeTflQP66tbdYjE=
X-MC-Unique: RORnIGj0O8in5_hQ1D-G8Q-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=R5vUUEjT+CqY9fSKPmcYfMazJXfmZUx38Hfp4cgmYuJnnBZy6VtPeqgKrN3Yl1PYbaPF9R3FMWQIKe3NFkWRrRGULw5izrJIrgNi8yvlbhn8P27UjlY+n7lb1S0uVOnmZOCpA1TjbrIRyB4ViaFG2iveSnD2xaS5/qUHRJ2nyQOG1qCQ45vx/u3pTEWM2jnlDYdd0NpwcOdSZjWju8Wi/g72H3EX6Uapc3PmErH8ssbk4aF/G8aQrU4st2qlWXH8NtCCHTDEa/wYj5zcLfc7PCv1wqCImTVgr+nRnuuIMiQ4jOLsmZZcFqi9ytWtqcXXDvGsYDFXVx6TRu6cIjUuhw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=XPMDXJ8DEsGxfE6cWFy2tMlf7ejnDjisqhedDx6eHvE=;
 b=RSFvSbQ64v88UO8BcYy7tKxD94gdwwGL7KYVLi1LvQgat3ekbgoTWnJOI6xtkP1PD6n0dSYFVX2jK97H8pp2ChCuFzgGgE0b1NnVohYbkeXU5TQ1tVKwl1mNjPwUSPRkIQPP6YrE9vW+ZIRI3tCQ3wUyO4CsjKOKE3Sl3y39jE+pLCnVPgbv9N5vGTqUnyI+nLOedjsD0trrNFHQSvChy7nK5WvhFcTvI47GWBHvCtLyWjCJu3GlCzl+cNUa42uzrebMUTiQVqzoDTVayxMxDQgpeCDDdTCr5zi+evf0Y4rGVlwTrcaTTpEyRg9l3L6YfDZ1iZNLY+3IFhy6oZFRuQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <8b982bab-9b16-61e7-620f-5a5b2be39588@suse.com>
Date: Mon, 7 Mar 2022 14:49:32 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Content-Language: en-US
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH] x86: avoid SORT_BY_INIT_PRIORITY with old GNU ld
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6PR08CA0017.eurprd08.prod.outlook.com
 (2603:10a6:20b:b2::29) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 84970321-079e-4ff6-6f82-08da00414de3
X-MS-TrafficTypeDiagnostic: AM6PR04MB5749:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB5749A3357F295B91B540586BB3089@AM6PR04MB5749.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	XnRueKY22NRlNU2WZ5BqQRaeN5jMHjK1eRyknDXESLsBJQ6CD2+lclq1ljeSlzg3cmpMEKvaFCCyu7f5f8jv+AvG8QyMphdUHZmtswIz9WrZ+V2VnejCPHMABN4KViihADd8+O8OK+AytOBHl2fwNN+/uSXn/NVcaUFNNtS30csE6lPSUsfgpUSLX5KySf6ehvqUmZP5IZ/ZQntnPbEgrfXFak1rO6gyiRStNOr3+GDgSB8IejyykIO40GzeXug3c/+IxwwIxKysRwXMnbgRK13/V2Mno8IC214uudloaIoSNFtzkXdwPNGYiR5VT6T8k8yHkSHr5jQE6ht29l/GhvZUlLrOdYDSTMupB/AJ2TVUS9ty4NeTiVFgoGJU5GtP4xaPGtSU6uFk8LNOF/+RMb4MOvlswbxd1aP6QmeoKG4AoZEuEKqaPRMnbBG2yJelRbjL2R38zuiqa4AQH/rLsyNKV6iV7wdPK+UO01uqnSnXROqy+vdQ/TCN9b3U5lOAJ+ZjaHbJ4ISDY6PF3cZail/pBZrsFOcvT3xzBjdHTT98b3HKvm3QeyH9fGhhwFNBXzwywWkkdk3hnjo4II9aDlgRNRlRNuoZ78dLbyMfNHh3ZdKK5pgtuoW4i6eQZQdWHaX3AH1FDAae/8Sk9eRXN52DNFhVt6QkTy5GqQ0ypX2x5Yq8kZerQoJ3EgV/vgaA2A8gVha1fVE3ZGTUPIpQxdqwJWLaboU9bcfMKOyReSyMQWPkLXpo8jj09Agr8lJh
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(38100700002)(6486002)(66946007)(2616005)(31686004)(8936002)(4326008)(8676002)(66556008)(508600001)(66476007)(31696002)(5660300002)(2906002)(86362001)(36756003)(26005)(316002)(6512007)(6506007)(186003)(54906003)(6916009)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?QXp3akNqcDg4a1QzUEVRdUdvL3FWcm1qSU9QRkpxUGFJcGtnQ1FLZzJ2MjZ2?=
 =?utf-8?B?TEFLRUsySm9XRWhua3QrU2wzOHlGcmIwaVNPN3VjczJWcUs3dmlMZmk0ZXoz?=
 =?utf-8?B?Q1hvR2JSQ3hEWDdGZnZjMUQ3VEV2cHh2OW9UbDYrS296ZFV6QUxteGNRUDVa?=
 =?utf-8?B?UDRnOFRGNjlJWU5KRW1mUndqNFlUejNHM3Bxc2lLVHRzL0hhcHdjZUVFWG94?=
 =?utf-8?B?VjdlTXF2VE9lSWZadnFNQ0lPK0RxaG8zcnZsSVI2OXBudGVmNnUya2N1Q3hR?=
 =?utf-8?B?cFZiSDV0aU42OEZZZ3BLTXVubmxkNE9uRlpwY29NRlA2d2xMQnFQb2FRUFFk?=
 =?utf-8?B?NHoxdHFSU1RnY2IzVDhOMzNQMkdaenkvNEF4OFRKQU5WcDJmQmxsK1RVNGk3?=
 =?utf-8?B?SmtvaWp3N2RTMUJBTkgyZFdTWnZWWm9vcEhGdFhWYU1wOXdERzFkR2hpTXlX?=
 =?utf-8?B?ZTd0RytQclVvNjRXYWQ3OVllTlRVWWxsb29tbmJ1SlBPZXppVGkxVEh1QWRV?=
 =?utf-8?B?RHZSUUJGYUR2YzBPS0RDbWZjQktHc2lHcXJaektmYk9NQXhZV3BTR1RreDRy?=
 =?utf-8?B?RkRXMzNDM1ZadnJYODhjZW5KYWlRWVgybWxFazZaMStzMS9DcGM0YmVrSUhM?=
 =?utf-8?B?RUYySWhIYnBJTVhyYi9IdkRzSzJtODRmSjNTcDZ5VTZBUHNsV3VLaUhSdHBz?=
 =?utf-8?B?YjVKSGIyNC9BVmhRQ2RtTHAxRFNzM05OcGRWWWRxL3c5a2VCNHluSFp5YVFT?=
 =?utf-8?B?eENxTkpWWjRTWS96WjQ5a2tyUlVtR1I1ZXgxbUhXV1pQUGkxY3QyTG5pNThU?=
 =?utf-8?B?UHcvYnA2Qmt3UnprSnBISHBkbVA1di9YRzIxamRucEFVKy9lK015d042VGts?=
 =?utf-8?B?eEFzRCszZVNMck5KU0xqRDIwa3h3WWRKY1ZDd3ZGMlMxbnplUDBha2hVUlp3?=
 =?utf-8?B?VDMxdy9uZmNuMkVFVkZsbm1NTUpBaEx3aHEzZjhsV2EzcjA1RnJibWRCSkxo?=
 =?utf-8?B?N3VPWXlObTdEcTJVamJrTjZMYVhYdUptN0dpUFZyOFphbG4vN1JoekJBVlNp?=
 =?utf-8?B?TGVKMXcvYUpKcUdab0ZSRWYzblQrZEU1dnBoTGRkR0RhSSt1SWxsRzFnUXRl?=
 =?utf-8?B?dW1zSHNQNms5U1YzUjAweXpjZXhOcUM1OVlWek12VUZQbTVvaittSnIzTDdo?=
 =?utf-8?B?Qm1CVlRsc1hPTTJyTHdOd2RXQjlybFIrN0w2aG1URFBvSEZZTW05YXFrZGxW?=
 =?utf-8?B?d1hBa2phekhlRjN2MVdkenV1dmQ5UkdCdTJQb1NpZU1UdVhxWXpUZVU1NGdO?=
 =?utf-8?B?bWtsS1VKYlVHZG1CYXZNak9xYVdoNVNXWWZHUDEzZlpabWNvZVV4eXVVYVdC?=
 =?utf-8?B?cVNLKzZ0NWV3TmZ6TEFMY004aE1iejVjdUZsYURmMGRGRnE1dHZwcVZYc1R3?=
 =?utf-8?B?eEhDczFBVm9qUDFaTnRjQVYrZXZQeE5VRW1leW94dkZVYzNnQmVCYVZWbk80?=
 =?utf-8?B?RWlaNFpVZGxBeVFVQUZSb00xbEgrbXMzRnIvNEVmYU9VMkZwMTd3MWVvYWZT?=
 =?utf-8?B?NEF0YmhQZkY2eDBKd29Ka0NCcmhtdXVwVGpyTVhpL0NrcnFHbnVjNjd5dTBJ?=
 =?utf-8?B?VW4rRW1iUXplL3BjZWtta3Z3VWpzTC9PNEJ2ZDNnR0dpQUtWOWJqWHVBdGwy?=
 =?utf-8?B?UnVhUUo2dG45a2tKc2dyNHNVeU1pb3NJam1VSVhmNGpmaTYvVmVsbDRIS2Jo?=
 =?utf-8?B?MGErOTJZOStxcEFzandycHM0Y3FsMEJ1bE5WNDlsNG96T0lYU0FwMDVHZ3Iz?=
 =?utf-8?B?Sk9QcFF0b1RLQTRTZkk5azRjbElsT2hudkUzWUxzMmx6dHcxM21KODdteGgy?=
 =?utf-8?B?U280QlJsbWhscHM1VXV0TGRaRllrUi9qU0x3cmdRUTI3OXNaM0xoYm4zWG9C?=
 =?utf-8?B?R1JnZGRCNVBIaDNwN1hDS0ZXTXFqekJqdmtySU5zM2RGTFJUY0lXTXJtc1Qw?=
 =?utf-8?B?bWRKcVJIdkUwVVNvUkJYM0sxQWZqdVFhVy9KUWZodTdMRWlRUWpnbFZza0RX?=
 =?utf-8?B?d1ZUL2g2UEtDWmVHa05KNGoyS2xOL2x3Q0ZaVEZQWktxQnlYdk1pNWZXR1cx?=
 =?utf-8?B?QTB6OFR2aDNJQy95dVRUTWFsblBUeVkyU292RCtwOHdqL2NnK0tqcjR3T2xR?=
 =?utf-8?Q?m8E9gprZvmkFsCo5uWWMb0s=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 84970321-079e-4ff6-6f82-08da00414de3
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 13:49:30.7377
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 15ZtFMbPGn4DlimpAuBBID8TYuVEPHZwYRPVDLXN1re2M0VplyUO+oMwN9heKg3GgA1Lzpoqam0sKZ2cQQthqA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB5749

Support for this construct was added in 2.22 only. Avoid the need to
introduce logic to probe for linker script capabilities by (ab)using the
probe for a command line option having appeared at about the same time.

Fixes: 4b7fd8153ddf ("x86: fold sections in final binaries")
Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
Obviously this doesn't take care of old LLVM ld yet, if any care is
needed there in the first place.

--- a/xen/arch/x86/arch.mk
+++ b/xen/arch/x86/arch.mk
@@ -70,6 +70,11 @@ ifeq ($(CONFIG_UBSAN),y)
 $(call cc-option-add,CFLAGS_UBSAN,CC,-fno-sanitize=alignment)
 endif
 
+# While not much better than going by raw GNU ld version, utilize that the
+# feature we're after has appeared in the same release as the
+# --print-output-format command line option.
+AFLAGS-$(call ld-option,--print-output-format) += -DHAVE_LD_SORT_BY_INIT_PRIORITY
+
 ifneq ($(CONFIG_PV_SHIM_EXCLUSIVE),y)
 
 efi-check := arch/x86/efi/check
--- a/xen/arch/x86/xen.lds.S
+++ b/xen/arch/x86/xen.lds.S
@@ -30,6 +30,10 @@ ENTRY(start_pa)
 # define SECTION_ALIGN PAGE_SIZE
 #endif
 
+#ifndef HAVE_LD_SORT_BY_INIT_PRIORITY
+# define SORT_BY_INIT_PRIORITY SORT
+#endif
+
 OUTPUT_FORMAT(FORMAT, FORMAT, FORMAT)
 
 OUTPUT_ARCH(i386:x86-64)



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 13:53:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 13:53:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286057.485389 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRDnr-0003bn-PT; Mon, 07 Mar 2022 13:53:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286057.485389; Mon, 07 Mar 2022 13:53:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRDnr-0003bg-MM; Mon, 07 Mar 2022 13:53:35 +0000
Received: by outflank-mailman (input) for mailman id 286057;
 Mon, 07 Mar 2022 13:53:35 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRDnq-0003ba-Sp
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 13:53:34 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id fa66c990-9e1d-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 14:53:33 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2113.outbound.protection.outlook.com [104.47.18.113]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-7-U7bGXXVOO_OncyNSPfsJyA-1; Mon, 07 Mar 2022 14:53:32 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PAXPR04MB8318.eurprd04.prod.outlook.com (2603:10a6:102:1c0::7)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Mon, 7 Mar
 2022 13:53:31 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 13:53:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fa66c990-9e1d-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646661213;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=846rwHpjor88qTLP2jLcjP5OzqWT2glBKNGKgJU9u2A=;
	b=cVJ12dBNbpNO6anGFxcavw3TjC5iJGF2HWjThzECmEUj5LWQkfHbye+A/lpQdwN09bFF/i
	KjpOWLwrO0Y9cC0Kdyr2C7s6aICFYiTOQaSStBqKX16UveW8IqBs587ALQJcT/5XSuLofH
	ldUGE/qypEs92DnRQ5OgaR5uTjDadKQ=
X-MC-Unique: U7bGXXVOO_OncyNSPfsJyA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=BChyIaFWkCuISoraQVQH70VyPHmk4BRO4Or8ndidgF+FsA1rtBE/HXNb17Mr7OSyAomMfGyPkHBoXwNUPEw3UEOsJ7xr/AqlgL2oUEmO8vC67/+APQxHwdPFfOOdA5y1/I38AmeEI0lHSj8hdJXhkjhywFtiFZZiMxoGcZo1e+0VseHBCAU8nPX76ptObh3CMbxE/K7DaQBwk396p9l/E7VOIlkcRfSuAq4d4T+4LQ/aU1chjKnsckeg4g0zTG15JETBvwb3EA32axot048EH60zMDZFmIxEsQcBxm6QXQRzHLdCwfGgFDl6BWMt1BnpM58FH9FaFS8kgyN0wouFKQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=JMhknlz9yh8+1iD4fWNtd2tdMygpNNidZmv+OoaqSZ4=;
 b=OHsze2I6aAdtvsO3PObCGJKKirx6/uEilTN6cRoUb+YvZw9Otj5i3U1aFMB97ODZfUTRKEAlh2MONVy//luyAqhXJo747lTXw5qTT2U8Da/haocgt9xXEnX9OC1K5VViI7Ig9jU7XjVYKOHrAoKGOLxcvH4A3vKFQC6PRiwlT0HkQpo8NBXBWJWPFVZLn7M6wwS2GyFV3aDpDeMGlJk+3Ux9FnOX4gIdpbGKm+/MqrcwKQqbS9rN9m7u3C0HOa6YHHxO+gn/heY8zZyx6kzaLmkleu1HqtIzYqhr3ah3TMCpB0x5CczmE3IUYymbPTGxnJow6tpezXSycYEwbgP4uA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <289684f6-fa73-bf02-137c-680ad8891640@suse.com>
Date: Mon, 7 Mar 2022 14:53:32 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH v2] x86/build: use --orphan-handling linker option if
 available
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
Content-Language: en-US
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM5PR0601CA0053.eurprd06.prod.outlook.com
 (2603:10a6:206::18) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ed4a8db6-9c98-422f-8f92-08da0041dcfc
X-MS-TrafficTypeDiagnostic: PAXPR04MB8318:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB8318E2989C22E573512E5601B3089@PAXPR04MB8318.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(38100700002)(31696002)(86362001)(83380400001)(4326008)(8676002)(66556008)(66946007)(66476007)(54906003)(6916009)(316002)(5660300002)(36756003)(8936002)(2906002)(186003)(26005)(6506007)(2616005)(6512007)(6486002)(966005)(31686004)(508600001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?vweFIvHDhBTq/jg+ZAKPiqUKlT9eQYmRhBKDDfStrTk6Srljt2X8WF4WKIUJ?=
 =?us-ascii?Q?hwd7E+UBwJd9DfLs+FrhkfC+gu1Iu5qseU1/ewYAJMnwypp+x3mOYnIEcnvJ?=
 =?us-ascii?Q?bPKcdvUMO+66XODXaV/P5WQXSb/eMVVOWx7SLssKC5YXgbvgIfIECYfy1qsD?=
 =?us-ascii?Q?A4zVYMnOvtTStoHK/DBJJO3o7mv9YP9mDoTrWnnnQbeNC7WQrY1VSYO2cSBJ?=
 =?us-ascii?Q?yAFbZghq35RODpfpTISFBu2ZXPKyG6zL0AX7IfhIY3wRYB2t+FkcXLMVhv1C?=
 =?us-ascii?Q?yD98cCw6h2QM08Iz+fqda1EeHNgeQY7ZudZTWJ1GGrlDNeks7hQbgDdip1BI?=
 =?us-ascii?Q?ZIHHACLT2+eq51+T/0KxHnX9ltMUtZivv7as6IaV/hqvvPolMFu77f4pli27?=
 =?us-ascii?Q?zbLCBEkNZZur2LVtUhchzY1MDu+s6Ti+Rr2GBmRtnd0x44wLKJLEk10gdHWO?=
 =?us-ascii?Q?ZRi2zWi9aHvuCn/NnDcO0wPCKrY5KLONnwCtQnsZLioQVbA6MJKtKnFuCS+y?=
 =?us-ascii?Q?sWiK4abh9x1d7pd6ocqhI7Vvfjz22mW8Hm8mWQyN/e6d2r/K2LnZ0fV57Mlv?=
 =?us-ascii?Q?Fn0TqNcR28FAGYAQyFd7w/4hcICc9XFG+Qavzz6UMY8reKoCgsxfDDhDLY/D?=
 =?us-ascii?Q?ks+o0J3LaB1u8hXIMmfnLoApkzlY+l2UnsT2sI18HPqUlZGY0/dqvi2XEgVn?=
 =?us-ascii?Q?6K/PkHebFVeUan2ImKU/38kXar//r8FQagK5v0bexQu6MQNB3OmZvfImzaa4?=
 =?us-ascii?Q?3XZPdUTE9ZZwJ168CBpTmgOgKKPWFP1NY6mrK1DhPUOF2m9mcbCWddyQkatR?=
 =?us-ascii?Q?zMiuDE/F0+W4IwZGiq5LeE+TKw3fZGdM9KnIVPmXTxY51fiSff2+3SWfo02L?=
 =?us-ascii?Q?0hH4dmTc0FjFUDvUWz+EEU1VvBMs/M2WhoVvPdziKBGYYcbYb3VtMMBo8YKJ?=
 =?us-ascii?Q?fPjVLsNGaSbpcBYpRMeLhdTxN2StaumbVLBYe2KMKMdCok8krHtZ4/3tUMWX?=
 =?us-ascii?Q?2/OG1ValCsmuSg6rjaS1EFDIj05LCmOKqczHKOsYvNTDDDtuKBx+Vd7ekNSI?=
 =?us-ascii?Q?lMxjIL0q+CTKu6g9Ygv9w5FJ8O7uE9tyEX5lWe7m6sykkLnYVrUwCIVGHEwr?=
 =?us-ascii?Q?YavUUZ75K4CqASEwbr74Dn1OiW9IWNNBIe8bEkl+eyDVxWbBYgdTkoPbrCXP?=
 =?us-ascii?Q?CVkUVPhG8pKyfjQjsnd6AhxFBm7P9aqY1PmaK5dO6BMJfYr9iOneoLLuhgNB?=
 =?us-ascii?Q?TocMwbHtrWOxVLeC2POwGHqYtIg+BZeQVHVEQD1c1t42FH5jcRbOQlf+55/b?=
 =?us-ascii?Q?IiZuYvcBDt7yAuRLKh6AZN4TjltJnv1i0q7qWCi7Ga2dZHf/FcSIvxGi4d2T?=
 =?us-ascii?Q?kW0p7TC9tKzhJ028sXL4En03G1c9OhQU9n4Fyp6sCqiYhuvr0ZzJRTRZFbyq?=
 =?us-ascii?Q?+HpD+FGPsQ8AoAmnMNXV/ynbIjeTPAPTyKmybla2dpven550T5LXqM/l1Fwd?=
 =?us-ascii?Q?DgyI4UVodSENJnQuoi62/VcXsMO1pFvMbyhmQ2rkNs8VEv9iyXhJtYCjo8ma?=
 =?us-ascii?Q?IQV/S2+7ukyavp5oX6hFNF3DwIZ5WySigstsz2Vd++jfqP5vi6EU76gtdBK5?=
 =?us-ascii?Q?HOBDc7zMZtoSbXu11zL6aJM=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ed4a8db6-9c98-422f-8f92-08da0041dcfc
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 13:53:30.8322
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: PckkepXfiHezO9cYPM3LK/Qz01BMKbWR26I68ok+MltJFosHAvUQpWG8a3B9cSech+kX6MUlKdS/QlO7K3oMeg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB8318

As was e.g. making necessary 4b7fd8153ddf ("x86: fold sections in final
binaries"), arbitrary sections appearing without our linker script
placing them explicitly can be a problem. Have the linker make us aware
of such sections, so we would know that the script needs adjusting.

To deal with the resulting warnings:
- Retain .note.* explicitly for ELF, and discard all of them (except the
  earlier consumed .note.gnu.build-id) for PE/COFF.
- Have explicit statements for .got, .plt, and alike and add assertions
  that they're empty. No output sections will be created for these as
  long as they remain empty (or else the assertions would cause early
  failure anyway).
- Collect all .rela.* into a single section, with again an assertion
  added for the resulting section to be empty.
- Extend the enumerating of .debug_* to ELF. Note that for Clang adding
  of .debug_macinfo is necessary. Amend this by its Dwarf5 counterpart,
  .debug_macro, then as well (albeit more may need adding for full
  coverage).

Suggested-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>
Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
v2: Don't use (NOLOAD) for ELF; it has undocumented (and unhelpful)
    behavior with GNU ld there. Also place .{sym,str,shstr}tab for LLVM
    ld.
---
I would have wanted to make this generic (by putting it in
xen/Makefile), but the option cannot be added to LDFLAGS, or else
there'll be a flood of warnings with $(LD) -r. (Besides, adding to
LDFLAGS would mean use of the option on every linker pass rather than
just the last one.)

Retaining of .note in xen-syms is under question. Plus if we want to
retain all notes, the question is whether they wouldn't better go into
.init.rodata. But .note.gnu.build-id shouldn't move there, and when
notes are discontiguous all intermediate space will also be assigned to
the NOTE segment, thus making the contents useless for tools going just
by program headers.

Newer Clang may require yet more .debug_* to be added. I've only played
with versions 5 and 7 so far.

Unless we would finally drop all mentioning of Stabs sections, we may
want to extend to there what is done for Dwarf here (allowing the EFI
conditional around the section to also go away).

See also https://sourceware.org/pipermail/binutils/2022-March/119922.html.

--- a/xen/arch/x86/Makefile
+++ b/xen/arch/x86/Makefile
@@ -120,6 +120,8 @@ syms-warn-dup-y :=3D --warn-dup
 syms-warn-dup-$(CONFIG_SUPPRESS_DUPLICATE_SYMBOL_WARNINGS) :=3D
 syms-warn-dup-$(CONFIG_ENFORCE_UNIQUE_SYMBOLS) :=3D --error-dup
=20
+orphan-handling-$(call ld-option,--orphan-handling=3Dwarn) +=3D --orphan-h=
andling=3Dwarn
+
 $(TARGET): TMP =3D $(@D)/.$(@F).elf32
 $(TARGET): $(TARGET)-syms $(efi-y) $(obj)/boot/mkelf32
 	$(obj)/boot/mkelf32 $(notes_phdrs) $(TARGET)-syms $(TMP) $(XEN_IMG_OFFSET=
) \
@@ -146,7 +148,7 @@ $(TARGET)-syms: $(BASEDIR)/prelink.o $(o
 		>$(@D)/.$(@F).1.S
 	$(MAKE) $(build)=3D$(@D) $(@D)/.$(@F).1.o
 	$(LD) $(XEN_LDFLAGS) -T $(obj)/xen.lds -N $< $(build_id_linker) \
-	    $(@D)/.$(@F).1.o -o $@
+	    $(orphan-handling-y) $(@D)/.$(@F).1.o -o $@
 	$(NM) -pa --format=3Dsysv $(@D)/$(@F) \
 		| $(BASEDIR)/tools/symbols --all-symbols --xensyms --sysv --sort \
 		>$(@D)/$(@F).map
@@ -220,7 +222,7 @@ endif
 		| $(BASEDIR)/tools/symbols $(all_symbols) --sysv --sort >$(@D)/.$(@F).1s=
.S
 	$(MAKE) $(build)=3D$(@D) .$(@F).1r.o .$(@F).1s.o
 	$(LD) $(call EFI_LDFLAGS,$(VIRT_BASE)) -T $(obj)/efi.lds -N $< \
-	                $(@D)/.$(@F).1r.o $(@D)/.$(@F).1s.o $(note_file_option) -=
o $@
+	      $(@D)/.$(@F).1r.o $(@D)/.$(@F).1s.o $(orphan-handling-y) $(note_fil=
e_option) -o $@
 	$(NM) -pa --format=3Dsysv $(@D)/$(@F) \
 		| $(BASEDIR)/tools/symbols --all-symbols --xensyms --sysv --sort >$(@D)/=
$(@F).map
 	rm -f $(@D)/.$(@F).[0-9]* $(@D)/..$(@F).[0-9]*
--- a/xen/arch/x86/xen.lds.S
+++ b/xen/arch/x86/xen.lds.S
@@ -12,6 +12,13 @@
 #undef __XEN_VIRT_START
 #define __XEN_VIRT_START __image_base__
 #define DECL_SECTION(x) x :
+/*
+ * Use the NOLOAD directive, despite currently ignored by (at least) GNU l=
d
+ * for PE output, in order to record that we'd prefer these sections to no=
t
+ * be loaded into memory.
+ */
+#define DECL_DEBUG(x, a) #x ALIGN(a) (NOLOAD) : { *(x) }
+#define DECL_DEBUG2(x, y, a) #x ALIGN(a) (NOLOAD) : { *(x) *(y) }
=20
 ENTRY(efi_start)
=20
@@ -19,6 +26,8 @@ ENTRY(efi_start)
=20
 #define FORMAT "elf64-x86-64"
 #define DECL_SECTION(x) #x : AT(ADDR(#x) - __XEN_VIRT_START)
+#define DECL_DEBUG(x, a) #x 0 : { *(x) }
+#define DECL_DEBUG2(x, y, a) #x 0 : { *(x) *(y) }
=20
 ENTRY(start_pa)
=20
@@ -179,6 +188,13 @@ SECTIONS
 #endif
 #endif
=20
+#ifndef EFI
+  /* Retain these just for the purpose of possible analysis tools. */
+  DECL_SECTION(.note) {
+       *(.note.*)
+  } PHDR(note) PHDR(text)
+#endif
+
   _erodata =3D .;
=20
   . =3D ALIGN(SECTION_ALIGN);
@@ -266,6 +282,32 @@ SECTIONS
        __ctors_end =3D .;
   } PHDR(text)
=20
+#ifndef EFI
+  /*
+   * With --orphan-sections=3Dwarn (or =3Derror) we need to handle certain=
 linker
+   * generated sections. These are all expected to be empty; respective
+   * ASSERT()s can be found towards the end of this file.
+   */
+  DECL_SECTION(.got) {
+       *(.got)
+  } PHDR(text)
+  DECL_SECTION(.got.plt) {
+       *(.got.plt)
+  } PHDR(text)
+  DECL_SECTION(.igot.plt) {
+       *(.igot.plt)
+  } PHDR(text)
+  DECL_SECTION(.iplt) {
+       *(.iplt)
+  } PHDR(text)
+  DECL_SECTION(.plt) {
+       *(.plt)
+  } PHDR(text)
+  DECL_SECTION(.rela) {
+       *(.rela.*)
+  } PHDR(text)
+#endif
+
   . =3D ALIGN(SECTION_ALIGN);
   __init_end =3D .;
   __2M_init_end =3D .;
@@ -320,71 +362,6 @@ SECTIONS
     *(.reloc)
     __base_relocs_end =3D .;
   }
-  /*
-   * Explicitly list debug section for the PE output so that they don't en=
d
-   * up at VA 0 which is below image base and thus invalid. Also use the
-   * NOLOAD directive, despite currently ignored by ld for PE output, in
-   * order to record that we'd prefer these sections to not be loaded into
-   * memory.
-   *
-   * Note that we're past _end here, so if these sections get loaded they'=
ll
-   * be discarded at runtime anyway.
-   */
-  .debug_abbrev ALIGN(1) (NOLOAD) : {
-     *(.debug_abbrev)
-  }
-  .debug_info ALIGN(1) (NOLOAD) : {
-    *(.debug_info)
-    *(.gnu.linkonce.wi.*)
-  }
-  .debug_types ALIGN(1) (NOLOAD) : {
-    *(.debug_types)
-  }
-  .debug_str ALIGN(1) (NOLOAD) : {
-    *(.debug_str)
-  }
-  .debug_line ALIGN(1) (NOLOAD) : {
-    *(.debug_line)
-    *(.debug_line.*)
-  }
-  .debug_line_str ALIGN(1) (NOLOAD) : {
-    *(.debug_line_str)
-  }
-  .debug_names ALIGN(4) (NOLOAD) : {
-    *(.debug_names)
-  }
-  .debug_frame ALIGN(4) (NOLOAD) : {
-    *(.debug_frame)
-  }
-  .debug_loc ALIGN(1) (NOLOAD) : {
-    *(.debug_loc)
-  }
-  .debug_loclists ALIGN(4) (NOLOAD) : {
-    *(.debug_loclists)
-  }
-  .debug_ranges ALIGN(8) (NOLOAD) : {
-    *(.debug_ranges)
-  }
-  .debug_rnglists ALIGN(4) (NOLOAD) : {
-    *(.debug_rnglists)
-  }
-  .debug_addr ALIGN(8) (NOLOAD) : {
-    *(.debug_addr)
-  }
-  .debug_aranges ALIGN(1) (NOLOAD) : {
-    *(.debug_aranges)
-  }
-  .debug_pubnames ALIGN(1) (NOLOAD) : {
-    *(.debug_pubnames)
-  }
-  .debug_pubtypes ALIGN(1) (NOLOAD) : {
-    *(.debug_pubtypes)
-  }
-  /* Trick the linker into setting the image size to no less than 16Mb. */
-  __image_end__ =3D .;
-  .pad ALIGN(__section_alignment__) : {
-    . =3D __image_end__ < __image_base__ + MB(16) ? ALIGN(MB(16)) : .;
-  }
 #elif defined(XEN_BUILD_EFI)
   /*
    * Due to the way EFI support is currently implemented, these two symbol=
s
@@ -399,6 +376,42 @@ SECTIONS
   efi =3D .;
 #endif
=20
+  /*
+   * Explicitly list debug sections, first of all to avoid these sections =
being
+   * viewed as "orphan" by the linker.
+   *
+   * For the PE output this is further necessary so that they don't end up=
 at
+   * VA 0, which is below image base and thus invalid. Note that we're pas=
t
+   * _end here, so if these sections get loaded they'll be discarded at ru=
ntime
+   * anyway.
+   */
+  DECL_DEBUG(.debug_abbrev, 1)
+  DECL_DEBUG2(.debug_info, .gnu.linkonce.wi.*, 1)
+  DECL_DEBUG(.debug_types, 1)
+  DECL_DEBUG(.debug_str, 1)
+  DECL_DEBUG2(.debug_line, .debug_line.*, 1)
+  DECL_DEBUG(.debug_line_str, 1)
+  DECL_DEBUG(.debug_names, 4)
+  DECL_DEBUG(.debug_frame, 4)
+  DECL_DEBUG(.debug_loc, 1)
+  DECL_DEBUG(.debug_loclists, 4)
+  DECL_DEBUG(.debug_macinfo, 1)
+  DECL_DEBUG(.debug_macro, 1)
+  DECL_DEBUG(.debug_ranges, 8)
+  DECL_DEBUG(.debug_rnglists, 4)
+  DECL_DEBUG(.debug_addr, 8)
+  DECL_DEBUG(.debug_aranges, 1)
+  DECL_DEBUG(.debug_pubnames, 1)
+  DECL_DEBUG(.debug_pubtypes, 1)
+
+#ifdef EFI
+  /* Trick the linker into setting the image size to no less than 16Mb. */
+  __image_end__ =3D .;
+  .pad ALIGN(__section_alignment__) : {
+    . =3D __image_end__ < __image_base__ + MB(16) ? ALIGN(MB(16)) : .;
+  }
+#endif
+
 #ifdef CONFIG_HYPERV_GUEST
   hv_hcall_page =3D ABSOLUTE(HV_HCALL_PAGE - XEN_VIRT_START + __XEN_VIRT_S=
TART);
 #endif
@@ -419,8 +432,7 @@ SECTIONS
 #ifdef EFI
        *(.comment)
        *(.comment.*)
-       *(.note.Xen)
-       *(.note.gnu.*)
+       *(.note.*)
 #endif
   }
=20
@@ -433,6 +445,13 @@ SECTIONS
   .stab.index 0 : { *(.stab.index) }
   .stab.indexstr 0 : { *(.stab.indexstr) }
   .comment 0 : { *(.comment) }
+  /*
+   * LLVM ld also wants .symtab, .strtab, and .shstrtab placed. These look=
 to
+   * be benign to GNU ld, so we can have them here unconditionally.
+   */
+  .symtab 0 : { *(.symtab) }
+  .strtab 0 : { *(.strtab) }
+  .shstrtab 0 : { *(.shstrtab) }
 #endif
 }
=20
@@ -466,6 +485,15 @@ ASSERT(IS_ALIGNED(trampoline_end,   4),
 ASSERT(IS_ALIGNED(__bss_start,      8), "__bss_start misaligned")
 ASSERT(IS_ALIGNED(__bss_end,        8), "__bss_end misaligned")
=20
+#ifndef EFI
+ASSERT(!SIZEOF(.got),      ".got non-empty")
+ASSERT(!SIZEOF(.got.plt),  ".got.plt non-empty")
+ASSERT(!SIZEOF(.igot.plt), ".igot.plt non-empty")
+ASSERT(!SIZEOF(.iplt),     ".iplt non-empty")
+ASSERT(!SIZEOF(.plt),      ".plt non-empty")
+ASSERT(!SIZEOF(.rela),     "leftover relocations")
+#endif
+
 ASSERT((trampoline_end - trampoline_start) < TRAMPOLINE_SPACE - MBI_SPACE_=
MIN,
     "not enough room for trampoline and mbi data")
 ASSERT((wakeup_stack - wakeup_stack_start) >=3D WAKEUP_STACK_MIN,



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 13:57:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 13:57:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286063.485401 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRDr7-0004L4-88; Mon, 07 Mar 2022 13:56:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286063.485401; Mon, 07 Mar 2022 13:56:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRDr7-0004Kx-51; Mon, 07 Mar 2022 13:56:57 +0000
Received: by outflank-mailman (input) for mailman id 286063;
 Mon, 07 Mar 2022 13:56:56 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRDr6-0004Kr-34
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 13:56:56 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 72a608fd-9e1e-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 14:56:55 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2172.outbound.protection.outlook.com [104.47.17.172]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-14-Wfq0O7aLP6O0BU1FJBfJ8w-1; Mon, 07 Mar 2022 14:56:53 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PAXPR04MB8318.eurprd04.prod.outlook.com (2603:10a6:102:1c0::7)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Mon, 7 Mar
 2022 13:56:53 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 13:56:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 72a608fd-9e1e-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646661414;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=pKOtJ5rZ/cCNRnJt8oBduFecx7Vl6nC0sAX2vRaNI9Y=;
	b=SEt2Y3AqWxM2El9IfYYtLtPSwaQrfUs4dg9x25v8DJw8eEPXBrm4Ma1DO1DhAmdDMY9y8w
	GAt6kSisJzycVDSX4+O2HdD41qCzJYeRE/uJ66YxvdcquMWPTntGlNTwbrgRM0DE2ywSbo
	5PI9hzDXvE10atioZ+ng50npmgVz+Po=
X-MC-Unique: Wfq0O7aLP6O0BU1FJBfJ8w-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=LYi2iquip4/8ecs2S8ry9kzDOUPCbqVFUujGsb9XEpeuygzI/laxw+e042WVNi0naN0c7E+4xtEuJt7DdGMvtH4etNOSIEXq2UzqsAlLtOcH2pav/2j18mlv6ufvCNgi8Sg2++vx5XI3af7aVixCvytiJ83x+bhCJi8bHYy+1x5bkT69WYTWlvis49FGEXaNcC+nUo5nikLg9P+RIho2n9tOoKePHRDYENa20aqv74+45Tg2uVeYu7zs49Yw73DGhrZkPiDNedruYNpJ7fluaG85YtDgASyYcdOCMTtq6f1xV5bLcvbo3FaUn3R44wMPfgjsvoD8sXzZXnLIzh8BqA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=pKOtJ5rZ/cCNRnJt8oBduFecx7Vl6nC0sAX2vRaNI9Y=;
 b=epPYjMzNMIThQuBEPpNizE89esIe8HWD8swvVER63PKl5m2tg/zMf9699y72cdts8a1cHYHvgqM5q8lFKGeaLiNNkqnXy0ypheseyEetAAdIjEATcUcnFUPRuBVq8efCssOMNYDYt8ZQrip4bYg6V4PV5fBQPUvJ1gGeNT8BUiprsiCNgvrXT1NXoZghpoMUq26DmMXaP/VuQu3QHnsKFnP3hXdqrRWjhRVyH1UgJR+iZkX7UE0qik2VVQVhGcYrcEO53VLM3csl6FgqShisCc9A03LIlB07D8uutEDJ0YTOxRGF+radRrvei27q8WmhK4t+yVB69EYOw5iLkihNmg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <3c7241bf-e110-3670-0cc8-9b84e228803e@suse.com>
Date: Mon, 7 Mar 2022 14:56:54 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] x86/cet: Force -fno-jump-tables for CET-IBT
Content-Language: en-US
To: Andrew Cooper <andrew.cooper3@citrix.com>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Wei Liu <wl@xen.org>, Xen-devel <xen-devel@lists.xenproject.org>
References: <20220307132651.25691-1-andrew.cooper3@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220307132651.25691-1-andrew.cooper3@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P192CA0108.EURP192.PROD.OUTLOOK.COM
 (2603:10a6:209:8d::49) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 56c64885-d892-4ea8-2b68-08da00425566
X-MS-TrafficTypeDiagnostic: PAXPR04MB8318:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB8318D07D8D245D85ECB8D932B3089@PAXPR04MB8318.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(38100700002)(31696002)(86362001)(4326008)(8676002)(66556008)(66946007)(66476007)(54906003)(6916009)(316002)(5660300002)(36756003)(8936002)(2906002)(4744005)(186003)(26005)(53546011)(6506007)(2616005)(6512007)(6486002)(31686004)(508600001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?a0FQdlBnMDNsWmwxU0dOWVJMMGpCR2FsSG9LNE5BT1hWL09nMDVWTURFbkw1?=
 =?utf-8?B?WW0vTGgyVVdCeUZUbVpFOGtvVEh2TjhZMDhoT3FoZEl6Wk1Tdml1TEUyaHZy?=
 =?utf-8?B?TWF0Zy9Cbk9BN1Qrb2RtNUxJMnBsalpYY01hWVE2RXpsK3RMK1RCOVlwTHk5?=
 =?utf-8?B?SVcyN1VyTTZRd0x1SWREeTdYVHZCVXhFamVMSmNzL1BWYlR3THJ5elc4WkxJ?=
 =?utf-8?B?UTZhdkNEMzMyZzhpQ3NTZmtTZEpFTTdyTisvRlU5ZmVObEptbnVTczVMUWtQ?=
 =?utf-8?B?dExMY1JyTDNJbGxZYVl2b0JmbmVYeThUemN3a250VkNKeTZVa2lWSkt3d0VR?=
 =?utf-8?B?c2EvbEhXN1U5ZU1uOXUwTmdjSUxHN2hmTnMvRytRRjZBY0k0bDF5VmMraUFM?=
 =?utf-8?B?WVFJTmlGYzM2ZjVjZ1ZDcFVySlFTVVcvajdPMlNncmFKc0FQTjBGdGFHVlZM?=
 =?utf-8?B?cjZlTm5HQzNrU21Yakt5SkFmcnpHODZVRmR4U280UTBUc2E5RkdtdzJKWDFK?=
 =?utf-8?B?bnJrRlpuVW9sRlZyR2xic3I0dW9URnRsS1VUWWhRRGFBZHBwYTJUS21ZYkt5?=
 =?utf-8?B?OWZZMGlCSEZqL2M2cGdlZ0JhbXdDSTlIYjB2ZHk3ZGxlUUdKMTZDQ0p2dTF5?=
 =?utf-8?B?QldGY2grUm9YY1Jvbi9weVh0NWRSWnlqOGI1R0luY2xHWElNejNSSVREOExM?=
 =?utf-8?B?bjlCTzUvK1E3TFgvY0o5ZElEU3VIb25rcXA4S0xiZTRSaTNoWHJ0TkpKZ2d4?=
 =?utf-8?B?Mmp5czhweDR2c0Ztend6RjAyTUZYUjByVkRZMWI3aVBBYVZGdW1mS1JNRlNz?=
 =?utf-8?B?TkJpemQvbktraStFektZd3RydWsvRFZuVHVsNWhWcmd6WUZJckQvMjgyK091?=
 =?utf-8?B?SUJiSFFLNWFOMlQveTU4RHg4RFFXRG5TeEF2Y1ZEZ2s2c0RmRm1YRFYxcGk3?=
 =?utf-8?B?cFJ4a0VQYTNMeWJjRm5HV2k2UnpPUkgrUUhaOUViRjdpREtCaVVuV1RhdEJK?=
 =?utf-8?B?NEcwaUpwTEN3R0lKaW9QOUh6dG9GSnBlbkxYTG1ncy9XVGk3RTJIVDVVUThX?=
 =?utf-8?B?aHc3NGF0NTIreVFiUW14cjd5S2VxWkVDaFlWRmV5UkZIa3dZODRyMjR3RlNz?=
 =?utf-8?B?UkpPVk9EaEZFWWZXcjdKSEZJNnlReGN1RmdQR1B3ZWttSDIxNmU0R1JnRWtZ?=
 =?utf-8?B?bDRoZVVDQmpZbXpUb0IwY05zVm1uVVcwbUFBek02VjkvbE9XQVFCanRPTFI5?=
 =?utf-8?B?ckZ3cjVsYlI5NDJsRzJlMUpSVHlXL0dKZG5jTE9zcHB0cjVtcXBGT0djNCs2?=
 =?utf-8?B?c3BXS2dMT2pxZlVZSzBBeTZwcUQ5WnNzS2grUG1sWHV6Y2FLQXh0ckdBT1ZE?=
 =?utf-8?B?R3VoajA4OGcyZFljZjErQVl6cVIwM2NnQmJtaktnaWJnNEJoTU5PNW1MZENJ?=
 =?utf-8?B?TTVKbDJaSUhzbWtuY0NibzZNTmlxbEtySTlybUdkbnhHbmF3MmYySXIxeXhU?=
 =?utf-8?B?VllFQ3hhVmJJVEVKcnl3RGVnM1FYbjlaUWRyMFkwNFVmZGVuamdLeDkzelpL?=
 =?utf-8?B?YTRrdzZMbHlPTk5tWkRPankvM09VSVlIOGVUa1htWERnSG5pcURPT1dOUElh?=
 =?utf-8?B?NlpYQVNIN1NQOG5aK1M2NDh5b3h4NUtwN2pweVVIdGtMSXRLZEpkWkFkbE9C?=
 =?utf-8?B?T244Y0dVZ1FCU2lHUHVNWGY1djl4cjNUT2Vvdlo4aUE3Zy9ieVVzNnVlZ1pt?=
 =?utf-8?B?Ry91U00wbUJ3NW1JRGw4ZThnbmo0eWxFalVGYi90NkdpeVA3Y0lGUjAyQjk0?=
 =?utf-8?B?WFRDVEQxMFlZVlkwWXdWZWhwaXNTKzBMY3lSL2x4NjJONDhUK005dDV2Y094?=
 =?utf-8?B?eHl3d3hCekJpTEl3RTVrRVovV2VwRjZZQitmSlZ6cTJoZk51T2JxK3NZSjhn?=
 =?utf-8?B?U2ZJVDNZOU9aU2xUSUp0dmtnWE5rRWFpazF0RmlYOUJNQ1lObnlJUXhKOVI4?=
 =?utf-8?B?L2RCYXJOOW1UYmxpMjZjZW14anJDcUFxWDBMMllFZytmanFXVHdxcWp0N21N?=
 =?utf-8?B?TllkVWdDeFhhK0kzbWpwUEsxYTNUVmxsTXB0RTNqRVJDQ0xKVEpTa2lnd1dI?=
 =?utf-8?B?Vit0YUlHV0pLRmpvTXJxMzl3ajhkK2N3Q3pjWU5JaEJKTzBaUEY1SXJEKzVN?=
 =?utf-8?Q?X5KK3L/22sqsY/6UnH+2evw=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 56c64885-d892-4ea8-2b68-08da00425566
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 13:56:52.8509
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: UXTerp3FCq1rzeKf0z+vEE1hdlr6BKWWtBRYyRYteRC4+CPhK880Gqbc3FFlEuV2vH9IDAJ0r5Sg2cAsR36cYQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB8318

On 07.03.2022 14:26, Andrew Cooper wrote:
> Both GCC and Clang have a (mis)feature where, even with
> -fcf-protection=branch, jump tables are created using a notrack jump rather
> than using endbr's in each case statement.
> 
> This is incompatible with the safety properties we want in Xen, and enforced
> by not setting MSR_S_CET.NOTRACK_EN.  The consequence is a fatal #CP[endbr].
> 
> -fno-jump-tables is generally active as a side effect of
> CONFIG_INDIRECT_THUNK (retpoline), but as of c/s 95d9ab461436 ("x86/Kconfig:
> introduce option to select retpoline usage"), we explicitly support turning
> retpoline off.
> 
> Fixes: 3667f7f8f7c4 ("x86: Introduce support for CET-IBT")
> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>

Reviewed-by: Jan Beulich <jbeulich@suse.com>



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 14:04:05 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 14:04:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286069.485412 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRDxw-0005oc-VH; Mon, 07 Mar 2022 14:04:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286069.485412; Mon, 07 Mar 2022 14:04:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRDxw-0005oV-SA; Mon, 07 Mar 2022 14:04:00 +0000
Received: by outflank-mailman (input) for mailman id 286069;
 Mon, 07 Mar 2022 14:03:59 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRDxv-0005oP-4m
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 14:03:59 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6e8fcedf-9e1f-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 15:03:58 +0100 (CET)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04lp2059.outbound.protection.outlook.com [104.47.12.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-17-fvLjhe6tOSae9JkFyPK03w-1; Mon, 07 Mar 2022 15:03:56 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM8PR04MB7249.eurprd04.prod.outlook.com (2603:10a6:20b:1d0::5)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Mon, 7 Mar
 2022 14:03:54 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 14:03:54 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6e8fcedf-9e1f-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646661837;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=2LhL91v+erslwG97KFfViS8SOcILS0gvy4/Lv/4rkzE=;
	b=BGwJJq1pXYB7mFgVUuFAc7h8XdvJ0eS//cUtraXmMsGK8i4CBX1i7Ztf46iolnZzatZohd
	c5oGvMAWx/LzM3v9FHuCCu9w1x4hR3/+QzxquJzPkcl/2MXIpsokIa1kJwUYe5LgdPiqMq
	3cAH4OqZGJj2hiawRGsGURS8xWGLr9w=
X-MC-Unique: fvLjhe6tOSae9JkFyPK03w-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=hvx/tVx/NcM2ps2eUcbNOIuGZpKA7yD0nsoIsP15dMlvn2IOMQtiLa9I+rQjXxu0XRU6B7Fp2r2CIRyXarEEdbSONdC/BS1tNpIMXN41Gd9on5OO1V0Mn1qg+KIoxMOJooLTp5+3O7brfW7rJqVlq3XupZ+Tv5BsG1r87y2naezNbH1roaDjjteUsQxfBgRskyYUkB3ILVl7BByjih/1Rq7tzEjvFC1hRgQOlDKUrRgk5+bXdZdQqwuwAB7UJ2HcZJm7loyW5Ju+39B/uEbf3SqO1cDVWDjteUiE+NDMLAurUBzypo+PU1TlrWsgbx7wx/R1IJt0lehregSPMDEw4A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=2LhL91v+erslwG97KFfViS8SOcILS0gvy4/Lv/4rkzE=;
 b=ghc1+dZge3+Ga0z+k1OdD/qSfGerPAbbR0kOFcp27mDhTLf87Xd0fmq7Q1gVgnZgzqKHjVjCT91N+EhrNMeRgBF6cdz4TSxubN+NL2KP/la/MO+mRuNeathd1dPaVg0bGHiGMmMk7ckAPETAsaLaDznVNW14pP4gf+4fMMmgRkfTmrAVEGYlATKSxd8+4PBlM98Op4ptqKO9L5hQXHsrYylkI4vp2di1Q7/eTWjuGqhi6DRB/sHad9YkQvGmwZwjY4A/30WfZDkuyBRbrbBdp3knT5NEhFeU51PMoDaUuj+DZc6c/ACsqlkgmZzu9WnbFXVmDe8w3H+k6+ZGz/QSPA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <8315826a-c6ae-0abe-a25b-74e37080383e@suse.com>
Date: Mon, 7 Mar 2022 15:03:55 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
Content-Language: en-US
To: Bjoern Doebel <doebel@amazon.de>
Cc: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>,
 Roger Pau Monne <roger.pau@citrix.com>,
 Andrew Cooper <Andrew.Cooper3@citrix.com>,
 Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
 Ross Lagerwall <ross.lagerwall@citrix.com>, xen-devel@lists.xenproject.org
References: <cover.1646653825.git.doebel@amazon.de>
 <deb5d86b20c02312023959bae06b0fe651a4b2f4.1646653825.git.doebel@amazon.de>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <deb5d86b20c02312023959bae06b0fe651a4b2f4.1646653825.git.doebel@amazon.de>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P194CA0097.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:209:8f::38) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: b23dd623-f32e-4b76-34bf-08da00435099
X-MS-TrafficTypeDiagnostic: AM8PR04MB7249:EE_
X-Microsoft-Antispam-PRVS:
	<AM8PR04MB72493982A2F9E0EC5C0B772DB3089@AM8PR04MB7249.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(31696002)(6486002)(508600001)(6512007)(8936002)(86362001)(6506007)(316002)(2616005)(54906003)(31686004)(6916009)(53546011)(36756003)(83380400001)(38100700002)(66476007)(66556008)(186003)(4326008)(5660300002)(26005)(8676002)(2906002)(66946007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?R2Q5TG11NElkSzV0QmZ1SGk0NTBSYUsxK01RNVY3Znl4cEhzT1YvSDZPbFVN?=
 =?utf-8?B?QUxlYlRqQmRVV0F6bFVsU01kR29sd0I0bS9nRTY0Ky95UlcwRE5OQW9RczJS?=
 =?utf-8?B?d2FTMXVJVGhLS002dlBTZmhFVTNTTkpDeXFzV0pmajdyN2RpcGRicmFZWEsw?=
 =?utf-8?B?YnZ1VDBGclJmWDNqdHRDc2Y0OVlkdW5wRFJwOXJoU3U5NGNXRlhuZTlvVEJB?=
 =?utf-8?B?Z205Sjl6MEgzUERKUmJBSDRKOVNHMFJ5cDY3S2cyUUwrT1dJZk8vRTROQ0pQ?=
 =?utf-8?B?OGJvWnZ0bmdVWlZGa2J5OEl1aUg5LzVMWXJNdlhGMlRGK0ROZHRaY29zRlVa?=
 =?utf-8?B?Y2l3c0xJVVROdm1HaXFaWVdTSEdNQWlTTVZQbUYxbS9iWDdCKzVNS0VFYWh3?=
 =?utf-8?B?UzFraU9UenhiUE9rWGwzOVliSExGcTI4TWpjUWdPSjR3T2laZjNhU0Nrb1l3?=
 =?utf-8?B?cittMGZ6MnNVUCtrQkd4YlM1TEpKYUlhbUF6cU4wRDZMT2tjekxwYkorOEFM?=
 =?utf-8?B?d2ZhVklvenZCaVB5SmFlaGJ1bFYrcStLTHRjQU94VWlmanZjQlBIUXMxdk10?=
 =?utf-8?B?bE5BdGl1a2tiRnVpcnV6Z1pnUm1VakwzY1dnRjQyRXdMRXp5YXJZZ0liaGZG?=
 =?utf-8?B?MTRjTWpueFllWnZoR1FNdFBXbjM5eUIvMEZWOXNIcUo1NDIrVmJ4b2xWODFE?=
 =?utf-8?B?L2xVbkRXWUlkODUxRkpnUUM2UDloYUM2d0NCK1BTRGYvOW5hMlhXNjdyUVBZ?=
 =?utf-8?B?Z2wzWTlmL0VqN2NzaFdTMnllV0puck9EZ1FlYU9wZ1VzM1RudlRsU0RCbk5E?=
 =?utf-8?B?Z2xwRjI3dXhzRXZGY1hOZGt6OTVDTjhZZ2pwQlpOKytIV1VRMmdOdjlVeDRZ?=
 =?utf-8?B?cDhWVDZuLzN2c0R5My9LdEJudzdUTm84WmtPWFNLaXA2SkkwVEg4VjN0YVRt?=
 =?utf-8?B?TFlIdStadEFNeGFIbHg3TFIyV2l4RFExU0NJRnFZZFg4VW9MNVg5cmNQa0x2?=
 =?utf-8?B?ZGRsaUdBTnZkNVZTeVlVQlVPeGc1MzZMREx4SkluQkh3UXVUMzBiRHB0cDhS?=
 =?utf-8?B?OWxMcFhMVDUvdzlReUpBV1R5ZzIrbkVvOUV0OWlGTC9kcmJSWVlhcGR4Mmdi?=
 =?utf-8?B?ME81VWJDRHFPWGZLY0tLOTFmQjNXdzVJVDRxQUMzYTI1T0RkWDI3V2NqeFdG?=
 =?utf-8?B?OVN6cW9USEJoQVF2SmU2V3EzdnB3bmpDdi8vZUdPMTlJclFCbGRHVFNFOTE4?=
 =?utf-8?B?SUpiTHE5aGMyMWljY3FVbGxkd3FiZDlNUFR1NHZJQUF6ZVJPdThVMlhONGF2?=
 =?utf-8?B?VXBtUTJTUkQ4aWhSTVorNTJDM3VUNDgxZzZXSWhYbnAzakticm9ieDhWRS9W?=
 =?utf-8?B?QW92OWYrblZOU3g0cTI5MEZBdmdQb2k3OHBqeWJ4amhmL2tMVTVzNGNhMk1n?=
 =?utf-8?B?T0tmN3lnNCtCMk10d1FBb3V0cHFFUE4xb3NaUjErRzJrekptSTJtaXJSTStV?=
 =?utf-8?B?QW9HR0NmckFQbVJLM3BZUlVJSW1ZNmxxSHRmUk5wdXBKREluamVnUWJBVHdN?=
 =?utf-8?B?ODV3VFhwNHlCZGxicVNxUTZER1REdTIvYzVnQ05mbkhGWWhreEliTEdMZXlS?=
 =?utf-8?B?ODNkUFgrSjFMWk1QR0xPWjRyVGtldXFIaGhCWmVhbVU5UFBaalVzRVNSSjQx?=
 =?utf-8?B?SFZJU2dtS1lOd3ZpKzYzOHVDS2k0U1RsNDN3RC9NS1BIUUlERnhHaDhHQzdX?=
 =?utf-8?B?LzFJZ3YzeVV0a3lCZ0J4V1NPdy8rTTVaWjZFcVNmL2NvUVNnUmNvYUszSVc3?=
 =?utf-8?B?KzE4UzZlM2lrT0k4bG42YXRzdUEzbWJLOEx0T2hpclo0cXZSVFlSSHJCL2dU?=
 =?utf-8?B?TVdRSWVTNkVlR0lRMHZGaGczUk1jYUE5UWtBY2dIREwyekhMV2xDdUlNUDRJ?=
 =?utf-8?B?VWxDRk5BbmlZQmdwS0laK0M2QUhQTDI5VU1naE1ITW9lbDk3dWpla012WXBu?=
 =?utf-8?B?SlhVcFk5MmhzcFM4ekN6alljVkJIa2hwRC9iVC9LNklnMUNOWklJSjQwTVpr?=
 =?utf-8?B?Si9sOEIyd01GNXNOaW4vdTFlZ2FLRzFQelBZUkI3MzhOZGx6cmEyVGZKK0tU?=
 =?utf-8?B?anV5TlJEczlnYjkzNGhzZk9peXY5RTZWeTFsMTU1cUF5SXQ3a3lNdFFLQllV?=
 =?utf-8?Q?BL0Kdq7zHjGtWYwQz2eQP6g=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b23dd623-f32e-4b76-34bf-08da00435099
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 14:03:54.3247
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: qrBPv7sJ6B4GxSSbmZrgQEkluLjhBrHS2g/dhk8aR89rcalivqnPnCcd7o9w+uMWHrkksYCxKhysr06Zs2/EcA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM8PR04MB7249

On 07.03.2022 12:53, Bjoern Doebel wrote:
> @@ -104,18 +122,36 @@ void noinline arch_livepatch_revive(void)
>  
>  int arch_livepatch_verify_func(const struct livepatch_func *func)
>  {
> +    BUILD_BUG_ON(sizeof(struct x86_livepatch_meta) != LIVEPATCH_OPAQUE_SIZE);
> +
>      /* If NOPing.. */
>      if ( !func->new_addr )
>      {
> +        struct x86_livepatch_meta *lp;
> +
> +        lp = (struct x86_livepatch_meta *)func->opaque;
>          /* Only do up to maximum amount we can put in the ->opaque. */
> -        if ( func->new_size > sizeof(func->opaque) )
> +        if ( func->new_size > sizeof(lp->instruction) )
>              return -EOPNOTSUPP;
>  
>          if ( func->old_size < func->new_size )
>              return -EINVAL;
>      }

I continue to be concerned of the new local variable causing compiler
warnings. With the adjustment made compared to v1, the specific
warning would have changed, and we're now liable to see set-but-never-
used ones.

Taking of versions - please tag your patches accordingly, and please
have, in each patch, a short summary of what has changed from the last
version.

> @@ -159,7 +202,11 @@ void noinline arch_livepatch_apply(struct livepatch_func *func)
>   */
>  void noinline arch_livepatch_revert(const struct livepatch_func *func)
>  {
> -    memcpy(func->old_addr, func->opaque, livepatch_insn_len(func));
> +    struct x86_livepatch_meta *lp;

As before - const please (wherever possible).

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 14:12:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 14:12:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286076.485423 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRE6F-0007QF-Vx; Mon, 07 Mar 2022 14:12:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286076.485423; Mon, 07 Mar 2022 14:12:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRE6F-0007Q8-R0; Mon, 07 Mar 2022 14:12:35 +0000
Received: by outflank-mailman (input) for mailman id 286076;
 Mon, 07 Mar 2022 14:12:35 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRE6E-0007Q1-Uq
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 14:12:34 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a1bbbfde-9e20-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 15:12:33 +0100 (CET)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04lp2058.outbound.protection.outlook.com [104.47.12.58]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-41-HQvrv3vaNAK1Yb_1AjLqag-1; Mon, 07 Mar 2022 15:12:32 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AS8PR04MB8658.eurprd04.prod.outlook.com (2603:10a6:20b:429::22)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Mon, 7 Mar
 2022 14:12:31 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 14:12:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a1bbbfde-9e20-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646662353;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=LKUf4j+vtRwEuE8r7CIp+76QvTBHVqvnLlWbMSqE0Uc=;
	b=WNrZdGMCV9UjUw9mc/cda/WzlCiKJjdPZqMoy/mjUVq/xcCSNBTKfpErpbN7tUxmJZnKhe
	5wR+VeSTfv43CL2KKpjmR9yRpAjNV6NQ5NagJFzbB7TZKF/17w8oWdBzvXsVUQiLlIuP0a
	Mtn6kZv5JZn/dkBYB6Ry8WMH3ZlC43I=
X-MC-Unique: HQvrv3vaNAK1Yb_1AjLqag-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=aWc9fTI5G+j5PXiAqTzteipMU6jOuKUEY5Y44jva43hricldkgNZeHzgbNwHv7VaY2PNFn+gKRT/Y0ISQN7FHDPQ6NfNS2OWp54Hi89R19vOI3CBwt8AZgHsO8dLGR1fSUFXGg0pn8eglTNkH61vWTSHvdSLckVMsnwiVuDuX+W5wh6Tra1bwgBM7g6xeFoO+r5Y8SZ94huQIhr2JHyu8yXAibyPNZTZboQCO8ohdvbnffkdm9Wibw63VxcZnVztZWyW0b8EOJokeataPApJvSb6tD8pJ49WR1FgD1KN3+TmjWCqWwd++Tl07ovZQkxSs9EC1a89UV2dJpWwVt+WCQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=LKUf4j+vtRwEuE8r7CIp+76QvTBHVqvnLlWbMSqE0Uc=;
 b=C8AZ8IrCsYuIcKIo1ebSm6H6H4Xt7UjcV+JbnaFjhbBd6qYdwyVVZJrO8wl816uwufguYYT5KthI4lBKWY5tOlyadfkGJQ32dXj2YisyGBilE6yFX9UhGfUio3I/6yNeu/FhPK2BOHPHwyqUIxyuaVzow1/ph3nn3HYKdR9wNHO+7FsRKWFNJZUCR7E5OKwIeFL2jDIKIcZPTLr1GW765A43W9/E49e/+2gA/oLX7Y7hxEtck7yxoaPRIO4c6PMwg7LBmoWZXgn7Nh5+xz0d6KOt0H5HUNIWyJdTRd++/H4nnoD0u2pspNAnRg9CeO2410oprZFxJDHIVC/0XbABew==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <1480fa5d-bcee-e945-6b2f-9db7931c63af@suse.com>
Date: Mon, 7 Mar 2022 15:12:32 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v3] vpci/msix: fix PBA accesses
Content-Language: en-US
To: Roger Pau Monne <roger.pau@citrix.com>
Cc: Alex Olson <this.is.a0lson@gmail.com>, xen-devel@lists.xenproject.org
References: <20220307125347.71814-1-roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220307125347.71814-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8PR04CA0145.eurprd04.prod.outlook.com
 (2603:10a6:20b:127::30) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f8acef97-1a84-4b1c-3023-08da0044848a
X-MS-TrafficTypeDiagnostic: AS8PR04MB8658:EE_
X-Microsoft-Antispam-PRVS:
	<AS8PR04MB86588E964F4FB8A49C9BF742B3089@AS8PR04MB8658.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6916009)(83380400001)(316002)(31686004)(26005)(186003)(2616005)(508600001)(6486002)(36756003)(86362001)(38100700002)(5660300002)(6512007)(66476007)(66946007)(66556008)(8676002)(4326008)(53546011)(6506007)(31696002)(2906002)(8936002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?N2JQNE9DWksxSUJIT1RsSkN6WHFEK2s3Q3NnZlc4ZmlOMUZnVi9PS2lPeVla?=
 =?utf-8?B?R2lyMGVMNk43cUI0dWR1VThZenpheTVkSU5wdktkeHJuaWJxZCtaZjZDNHl1?=
 =?utf-8?B?eWg1RHZ6S2ZoTUxwYVVEV0FPWk9NdmUzeUtIb1liWmpwYXFxVWRlK0t2Y1hn?=
 =?utf-8?B?V0JhOUZaMk11M2MwdXpRbDFEWVZwQ011S015ajVuR1M4ZkdEZEUwZDlNdVMr?=
 =?utf-8?B?ZVp1eFBNaU04clQ2QTRGeThqREJKb0xHaktMYVc3L1FlaEtleWV2RzluQjBw?=
 =?utf-8?B?SlhueU8yejNXK2ZZb3dhTXNmbnpteG5QVjFyOSswL0V0Njc2MzR2K1dvUW5a?=
 =?utf-8?B?Zys3TXA1aFRGK05EUDZ1NzhmcGFlQXFjbFVGRFhDOU10S2FwSVZJWWVSczE4?=
 =?utf-8?B?SVJPM0xvMjFnUmd6ZHpzK0tiQTZmQXpoMXdFNTJMcTJBeXNReVRoTmRKZjhv?=
 =?utf-8?B?ak9SNXluODR2aEFuQ3oyTnlueG9KeVI2WEdpKzcwOVVxenplT1B0Vy9rRnd4?=
 =?utf-8?B?RmVWZ3hpeThqdmFXenR6Ym5Hcks4YnVqOEM4MFM3KzRmM3VZS2NDWThaSE0r?=
 =?utf-8?B?VHVzVEcveW1KeVZIcjliMzRwV1F4dys0SVNXTGhMazNLWHE4NU1LYjBMWHU5?=
 =?utf-8?B?azA0bzVFVGl5MzQzRVBRWDMwUFltQWVIVEFZcjhHcFhJV3NhSUtJd3NzMnVR?=
 =?utf-8?B?UTFRYXUvc0JMSVdVWjRHdm9pTmFGaGY4ZjY0ODB6VllxcTBqOXJ1b25jWGk0?=
 =?utf-8?B?TXM2SXN3dExIYWdmZTVWQUlDTUNpN1JrNzRGSktuN281RDhxK3pDWTFPZ0lk?=
 =?utf-8?B?RHdKd1NTdHc2VW03UG1uL3hxOGE1azNsTHloRVE1TGlUYVFXS2drRkZoR2pr?=
 =?utf-8?B?VitOU01nUnlQeHpOS1JPck5lWHBmVGt3c2M5YnJlczhtN2Rqd2pSQzZCVEIx?=
 =?utf-8?B?Zko0VWlicjFnNThSMmFJR2lyN2NqUjdlVjFEYUwwVCtRYlZxZmdJZWxZV2Z5?=
 =?utf-8?B?QVczKzY3VzhZWFM4QmJzdEU5VXFqR2JxMW1OWFdWTHhYMXFFRzFqZU5ZZmVu?=
 =?utf-8?B?ZWt2TEpoNHM2amVtR0EyTlJvV0lobFo0S3JlLzRXSHpwUDgzdldrLzh4K0tt?=
 =?utf-8?B?UkMxSk16Q3hLWC9NMU9VWmNoeWdDdk9Hbkd4dnBUNzFyWDQ2SS9PRDUzYmVN?=
 =?utf-8?B?WEhaeVprdlEvenFMWTVUb2ZZeXYwV2puZkoxTGZGUXUxbGZrSjBnN0I2WGp3?=
 =?utf-8?B?T1RlZEY4MHN2VGRzdDN0YjA0NHZFcnVOMTZEZGxiSFVjeVdIRkxqengwcExr?=
 =?utf-8?B?QWhnajdBaHJHMFByU1RwLzVsQmdDRjI0emw3M0JCOGFpU3Ixd2RRVmthV20w?=
 =?utf-8?B?TDNrdk1YR29xMC9CZkZXYTVIQzA1dXlJMS9Vbm5uRnNrRHgzMjVrNVZIR1Bm?=
 =?utf-8?B?RktMbUxKU0FuN2kvVytnTHdURTUzaDEyM1dvQW8zYTNPUWxPTWhQSFpDRWl5?=
 =?utf-8?B?dnI2a3oxNnJRSE12UjlrY01GeVV0aVpDZlQ5MDk2WEkvNFF0Z3hoMlBMQndX?=
 =?utf-8?B?UStEcWIxREdwc2d0NXJoRi9VSVhMbUxSUDBzWlBnQnppa1dGaXoxMHpPdldV?=
 =?utf-8?B?bjBoMEFNUTd1dmhUcFpsL1RZR3BVdlNic0p1dFp6SURuNm1wTitGVWpNWjNE?=
 =?utf-8?B?S3VtQTJKWm9YaGhUM2FBalNhRGpWdXJuMEZNTDV1SDBwTGVnUGJlSXNQRnFl?=
 =?utf-8?B?OVhVbUFoWithU2N5Ynd2SnNITHdoV1JPYjFzSE5JUkJiWWszamt3V2NHVkhR?=
 =?utf-8?B?bzZCOWlsZHUvR2FrblE5eDlMOTRsekdXdUxvTVM4SVNEeGpQT0VWMFI4TFBW?=
 =?utf-8?B?bHFrOU94Q2I5MzRaODJ1aDdXc01QWk5LZnlWcnYzUGlzbVhnemo0dHhYeGZj?=
 =?utf-8?B?ZFpWeGRRM09HM3RZMU85MHAvQmp3RGVPMEhQR05SOTVpZTZsdVMraVUyTTVE?=
 =?utf-8?B?VW5XYjNNeHU1RG91RTZ4S1RqRU1DVWV4YmhwOTVzcm8weHpvaW8zbHlZYWdR?=
 =?utf-8?B?U2k5TEJNc3Z0NHAwaVVGSFpPSWlpM2R1MVJGcklFYmhoQ1BlV1Axdm43Mk9L?=
 =?utf-8?B?eXUvblAyeEdDOE51bXlUaFpzYUliTENyTklOeTFsc01LejhEUTBrK2NWSUxK?=
 =?utf-8?Q?ZwK+/u5qUHEU6g/IyN66+pA=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f8acef97-1a84-4b1c-3023-08da0044848a
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 14:12:30.9333
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: YnFrIGYGcMiUx/yOJsQspYGPm6MeH76FkAaPDzJ1LS6KlhIjYmTKtrBaxQvboKp3vdfcxU6QeIODmbLSk0ot3g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR04MB8658

On 07.03.2022 13:53, Roger Pau Monne wrote:
> --- a/xen/drivers/vpci/msix.c
> +++ b/xen/drivers/vpci/msix.c
> @@ -182,6 +182,33 @@ static struct vpci_msix_entry *get_entry(struct vpci_msix *msix,
>      return &msix->entries[(addr - start) / PCI_MSIX_ENTRY_SIZE];
>  }
>  
> +static void __iomem *get_pba(struct vpci *vpci)
> +{
> +    struct vpci_msix *msix = vpci->msix;
> +    void __iomem *pba;
> +
> +    /*
> +     * PBA will only be unmapped when the device is deassigned, so access it
> +     * without holding the vpci lock.
> +     */
> +    if ( likely(msix->pba) )
> +        return msix->pba;
> +
> +    pba = ioremap(vmsix_table_addr(vpci, VPCI_MSIX_PBA),
> +                  vmsix_table_size(vpci, VPCI_MSIX_PBA));
> +    if ( !pba )
> +        return msix->pba;

For this particular purpose may want to consider using ACCESS_ONCE() for
all accesses to this field.

> +    spin_lock(&vpci->lock);
> +    if ( !msix->pba )
> +        msix->pba = pba;
> +    else
> +        iounmap(pba);
> +    spin_unlock(&vpci->lock);

Whenever possible I think we should try to do things, in particular ones
involving further locks, with as few locks held as possible. IOW I'd like
to ask that you pull out the iounmap().

> @@ -200,6 +227,10 @@ static int cf_check msix_read(
>  
>      if ( VMSIX_ADDR_IN_RANGE(addr, msix->pdev->vpci, VPCI_MSIX_PBA) )
>      {
> +        struct vpci *vpci = msix->pdev->vpci;
> +        unsigned int idx = addr - vmsix_table_addr(vpci, VPCI_MSIX_PBA);
> +        void __iomem *pba = get_pba(vpci);

const?

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 14:20:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 14:20:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286085.485433 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREDt-0000Zt-P9; Mon, 07 Mar 2022 14:20:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286085.485433; Mon, 07 Mar 2022 14:20:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREDt-0000Zm-MA; Mon, 07 Mar 2022 14:20:29 +0000
Received: by outflank-mailman (input) for mailman id 286085;
 Mon, 07 Mar 2022 14:20:28 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=/EJ7=TS=santannapisa.it=Andrea.Stevanato@srs-se1.protection.inumbo.net>)
 id 1nREDs-0000Zg-6k
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 14:20:28 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on20627.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::627])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id bb34409d-9e21-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 15:20:25 +0100 (CET)
Received: from AM6PR03MB5000.eurprd03.prod.outlook.com (2603:10a6:20b:88::11)
 by DBAPR03MB6517.eurprd03.prod.outlook.com (2603:10a6:10:19a::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Mon, 7 Mar
 2022 14:20:23 +0000
Received: from AM6PR03MB5000.eurprd03.prod.outlook.com
 ([fe80::cdef:8699:47b:300d]) by AM6PR03MB5000.eurprd03.prod.outlook.com
 ([fe80::cdef:8699:47b:300d%3]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 14:20:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: bb34409d-9e21-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=L+H9i2GA0fyKdply2AIYsso6j31Cm3ydrbYtcRcsfgRpuP6OwIA7g2maDduyy7f9HbiL0e80MdBdZLE0W1OpM19N5HwGNVdx0MAyVE3EEekyZqHxzkmfmcybkuaeZ976IC8Kegzlo8NThi1TuHjKxDgwdx6WMbvLp1t+CmckFxqVUNAZgau5z6MYoF0Le6vMDoawUQWlUejM1tXF0ARGZKK9kBOqf4WJ93JZNyIe/Kb5zfGW/F01Rm1G9FK7gHH+IOeXNhkNos1LdUYK7jj11BEol/RxCuN6wd/bqXl7q8h9WymnqNn4XZD247mlum3Wv0BXLx8kWv9zCo20lW94uQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=B89FcYxILbSsm9x4zTe5ruz1r7jr1d0Fn8Ch8Vdyqyg=;
 b=RvZkvyutlborDtF216LPVI4MjuqORMm8Xhuerspd4GN0tLEVgdWwUxuUQWvec1y56izxtOvvZNUQbfguoc9vtTJZcgX/Nl2dC+llcGdiX3lbZ3JN5HO5hy/Zyz5Mrdy8WYaqRjPsBLSOn6Lj31J5K99BiQGeW3Mh0hH3B+UlOrrW0y4oZsoQlSXnCrlXvRqnexriYbR7vD4d/Td7/TK92aqNgGz3094STe4ER+1nVoawWjrNBui/J9hldaC3lC/PE8nQndIMMjYXQqjNGh18v1FUmh4wad8SlC2OWwoeZaW71XRA+oCDz1S6KJCBtrPMyk35NJKpgsqYL3m4v3Aivw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=santannapisa.it; dmarc=pass action=none
 header.from=santannapisa.it; dkim=pass header.d=santannapisa.it; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=santannapisa.it;
 s=selector1;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=B89FcYxILbSsm9x4zTe5ruz1r7jr1d0Fn8Ch8Vdyqyg=;
 b=wVK9LvHvECfVKx2X/6LiE/foZ4CuIGUSKjbuQpIsGNVjp91hvoz2lLos6cCQimnlxjepJSGzdAt1ahxbbBGQZf4CobwJQc68NNi/hXMCD6Ll/n2s28yiJQb2+itXiSbPE+Xot50Oa42wOvHR3/Ae2sRLWyD6fP7+cHbHwX1tx3c=
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=santannapisa.it;
Message-ID: <93fb9755-d40a-3cfe-1f6e-335b57d5a213@santannapisa.it>
Date: Mon, 7 Mar 2022 15:20:22 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: Network driver domain broken
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
Cc: Jason Andryuk <jandryuk@gmail.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 "wl@xen.org" <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>
References: <DB7PR03MB50027EE92E11BFFF71AADC4598049@DB7PR03MB5002.eurprd03.prod.outlook.com>
 <92827eec-b6e9-9c95-8f9e-fcf063d45090@santannapisa.it>
 <YiDt7fX92n6Luc2l@Air-de-Roger>
 <CAKf6xpsnmQG7-LXn5+Uz4mncWsN0EZ8wpagY8f8OydvZNb6g5A@mail.gmail.com>
 <YiH9cee6NIKA6MWg@Air-de-Roger>
 <53a4fe6b-efc8-bfa1-8475-0aa58774051a@santannapisa.it>
 <YiIFyRUNXpUfzwRB@Air-de-Roger>
 <0ce52d38-f542-9336-a100-1cbfc559f218@santannapisa.it>
 <YiXq5HIrvZsy7QKU@Air-de-Roger>
 <b388ed5b-177e-2e9d-6450-6df16d9250c4@santannapisa.it>
 <YiXwhUnZL8bcJvH2@Air-de-Roger>
From: Andrea Stevanato <andrea.stevanato@santannapisa.it>
In-Reply-To: <YiXwhUnZL8bcJvH2@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: MR2P264CA0022.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:500:1::34) To AM6PR03MB5000.eurprd03.prod.outlook.com
 (2603:10a6:20b:88::11)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 35a89b43-ed08-433f-10a6-08da00459dd9
X-MS-TrafficTypeDiagnostic: DBAPR03MB6517:EE_
X-Microsoft-Antispam-PRVS:
	<DBAPR03MB651759DB35EB3214EB4D157398089@DBAPR03MB6517.eurprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR03MB5000.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(66556008)(38100700002)(26005)(66476007)(66946007)(83380400001)(186003)(5660300002)(2616005)(38350700002)(786003)(316002)(54906003)(508600001)(6486002)(6916009)(2906002)(44832011)(6512007)(53546011)(6506007)(52116002)(8936002)(31696002)(3480700007)(8676002)(31686004)(4326008)(86362001)(36756003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?UzVEVjU1N3dvcG5NeUF0SFhzR08zTUpwZTRqMXAwNitBMDBLY0J5NXpZbDd3?=
 =?utf-8?B?bDNTZDdoMjhONkxpQXRLbCtXaVBZV2xRN0Zac2hKTkhnSFVTRld2L2pFRWd5?=
 =?utf-8?B?WGU3ZmlpUnZraDFhc3ZOYVpubkxzY3Q2Mk9wRmZxMHlCYXZGc01iNmp1N3Yv?=
 =?utf-8?B?NmdnMk0wRmk4MGxYNmlCQjFoOXRUcEpCWWRoK0pGTm9iYUZqdHBINDIzNnhH?=
 =?utf-8?B?Y250bzM1SUxJVzFwRldnSTM1R3NIbTR1UC81aGhaYzVTK09UbGlyZVNraGdW?=
 =?utf-8?B?QVlydjlvTVZqV1V6WmZaQUQvMit5SzJVaGw2SVUrMUtlT1krK2FiK3E1Y0sx?=
 =?utf-8?B?RFlLcFppelpjdHMzdlB1R2FSdjVsNGpQODZXWE0wTWV1a0k1TFl6WGlBMmJt?=
 =?utf-8?B?a3YwbmVHTWoyTUhRcitBazFVNU83UG9PMUdvcFBDamRuVVR4SDFGeXRqNnFI?=
 =?utf-8?B?enFZK1EvMC9yaFJjTVpsV2Yya2p0WnpGM0FEdWh5dXpnYzRzR3VZMmpZMmox?=
 =?utf-8?B?SjRBblhUQ3gvbjNWYXBJeXJzdTIyY3hpV3ZJUWJHSDBWbWNLVS84Nkp6ZFJT?=
 =?utf-8?B?cEFBWS80bFRUYXpHZ1BRWVFqVWJFdWhQU0VmdjB6QW1BQWZJRmRQK3kwMEdD?=
 =?utf-8?B?bnhtSGhibTlnRnFqUnVJcU9Sa0VqRWRIQms0NW1BSXZRV1p6NHZSL0dHWWVS?=
 =?utf-8?B?RWlJWnd0N2x0aVhpMTBGK2lWK0NmeENtR0lBM2UvMFBPbGUyeWU0TnVjTWl5?=
 =?utf-8?B?dkMxbGRpc1hLT0xBVGthaC96QjNxWDVIVDAzS0xSSzNxbUdKT0Y1c20rSlRi?=
 =?utf-8?B?RE1LVGw4Y2IrNlJXM1RjelFXNmZaUjVSblRBa3MvcDFvQzl5QzhFR3cyaGpr?=
 =?utf-8?B?OFBZQjlmVitYRVdMZlV5RXcrOHlaQkZmZDlYZnFIbEVFNzNKSDJQMW9sZlZV?=
 =?utf-8?B?K3BjcHpDRThOcEg1R1pJRXI3TFZFd3B4VVo2V3BCYWt2WnUraWJGQ0ZuWWtV?=
 =?utf-8?B?LzFDdnR6dXl4VHlKOWJXRDlEdjFKWG9uSS8zZnYzWTg1b0pEdXdnR3UxbjV4?=
 =?utf-8?B?cUZuSlNXZHNpRUFDbXpZdHlZNlBGelNHNTVGdW9Hb0pkWStRZ3JSVUM0b0s5?=
 =?utf-8?B?YWI5eVN1Rk03TDFVblJiQ1hRWUgzcFdubk0xOUFSK2kvQzU5KzhYdS8rUjBJ?=
 =?utf-8?B?VmcxMk9rcDhtSTBPckJkZFM3S0hnY0F4UDhpZHZQOTRkVnYxVnRSOEJtQmtJ?=
 =?utf-8?B?Ti9Uc0lWcldLeW5YOFJlcjk5OVZISzRkeUxtMGp3YXQyNUtMb3J6TGVyOXZE?=
 =?utf-8?B?YXBzUmtNdjFUT1dNd1IwSFVOL2xyL1ptTGNUdTltQ3VJQWExVkJXa0FONEhk?=
 =?utf-8?B?eTI2SWNZOVJHUHFuR0VSakNseHJtTjdTcVpVODBucld4bHVwTFkxTW95M1FH?=
 =?utf-8?B?OWVTdmRJYkRHZmtnK21SS2ZGbkV6a3dPMEJiZWJ6eWh3NlZjSnM2Q0xJWU1H?=
 =?utf-8?B?cU1hYXU4WVQ1OWZtb3hLZnRNRS9kZnZhNWhyRUdvL3JFWFNiV0VXRkU2emoz?=
 =?utf-8?B?M3ZxeFloYk0zYkpVRXVnMDR2ZkZPWFE4SFhOdExueHQyYkFvYThuUm1VNzFG?=
 =?utf-8?B?UmRNbW5OY0V4cW45cDhybWRSWU5qZHovdkxDbkZGMmM2QiszZTYvQ2RFLzNp?=
 =?utf-8?B?UE13eE9MakNZRTE2dS91YkdKOGtKRlhyYXY1UFZOM09CWW9xZFhybTdkWlpt?=
 =?utf-8?B?aGFTVXBhVC9lOXVUdjlobzdENU9MQUtlZlRBdmdxU290Vzl0Z05YOVhqS3hi?=
 =?utf-8?B?SGticWFESGRDWUdDZVh6RHR1eDZBb0lwN0ZKUXdpU1AzSEZFeVhFWnF4RSs3?=
 =?utf-8?B?djFDMFg2Qk1nMDNuaDg0S1dSTHBJMGhGc1hPc2p4N0daR01SQjhvb1p6SGp3?=
 =?utf-8?B?UnhEVVlxOHNQQ2Q3RkhKYlJsVkhSU1UrR1B1NkN2YkNXL2JucmZCelNZbjU1?=
 =?utf-8?B?cHpHaEVnbzRhS0RIdHJ0alVCNHc4U2VobmZ1bFdMZVphWXFXSVZ3ZEczYVFj?=
 =?utf-8?B?OUY2Ri9pRzhJcGtyQkZ3OHFUWDF1NThiSWFlZHpzelFad2pWaTZjVThMOFhU?=
 =?utf-8?B?T2o0LzVNRVNJRnNLQlplNmIvZk9RK2U3QnlOSzdlVElySnBCREhSaU9vSDA3?=
 =?utf-8?B?NklBM2xGbkpKdGc2d0dMT3JlTjRsa0I3c1hYeExIRzE1MUtMM3FTVWQweGRr?=
 =?utf-8?B?Nm9QYmlmb01kR0hTM01MVmZKTXptS2E4aXB1NnYvUlVWQUNidXZUT2ZkQnhT?=
 =?utf-8?B?NzlkaHZiQldGKzNVYzJISEVrUk9WL2xTVHR0aWt0ZEJHQlJva0lvZz09?=
X-OriginatorOrg: santannapisa.it
X-MS-Exchange-CrossTenant-Network-Message-Id: 35a89b43-ed08-433f-10a6-08da00459dd9
X-MS-Exchange-CrossTenant-AuthSource: AM6PR03MB5000.eurprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 14:20:22.9213
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: d97360e3-138d-4b5f-956f-a646c364a01e
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: /N3rfFj4qpj2VZlQ4xLCRsrhMdfUixMPA2OVpzxLELS/2LyhwMlK7UY8wz2Rtksdpv6scKUCMUQQmsgsL0iRwy0E6C3sEhLcpqDKm5MR2UThtsDeZOPPGTSusNxupnfA
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBAPR03MB6517

On 3/7/2022 12:46 PM, Roger Pau Monné wrote:
> On Mon, Mar 07, 2022 at 12:39:22PM +0100, Andrea Stevanato wrote:
>> /local/domain/2 = ""   (n0,r2)
>> /local/domain/2/vm = "/vm/f6dca20a-54bb-43af-9a62-67c55cb75708"   (n0,r2)
>> /local/domain/2/name = "guest1"   (n0,r2)
>> /local/domain/2/cpu = ""   (n0,r2)
>> /local/domain/2/cpu/0 = ""   (n0,r2)
>> /local/domain/2/cpu/0/availability = "online"   (n0,r2)
>> /local/domain/2/cpu/1 = ""   (n0,r2)
>> /local/domain/2/cpu/1/availability = "online"   (n0,r2)
>> /local/domain/2/memory = ""   (n0,r2)
>> /local/domain/2/memory/static-max = "1048576"   (n0,r2)
>> /local/domain/2/memory/target = "1048577"   (n0,r2)
>> /local/domain/2/memory/videoram = "-1"   (n0,r2)
>> /local/domain/2/device = ""   (n0,r2)
>> /local/domain/2/device/suspend = ""   (n0,r2)
>> /local/domain/2/device/suspend/event-channel = ""   (n2)
>> /local/domain/2/device/vif = ""   (n0,r2)
>> /local/domain/2/device/vif/0 = ""   (n2,r1)
>> /local/domain/2/device/vif/0/backend = "/local/domain/1/backend/vif/2/0"
>> (n2,r1)
>> /local/domain/2/device/vif/0/backend-id = "1"   (n2,r1)
>> /local/domain/2/device/vif/0/state = "6"   (n2,r1)
>> /local/domain/2/device/vif/0/handle = "0"   (n2,r1)
>> /local/domain/2/device/vif/0/mac = "00:16:3e:07:df:91"   (n2,r1)
>> /local/domain/2/device/vif/0/xdp-headroom = "0"   (n2,r1)
>> /local/domain/2/control = ""   (n0,r2)
>> /local/domain/2/control/shutdown = ""   (n2)
>> /local/domain/2/control/feature-poweroff = "1"   (n2)
>> /local/domain/2/control/feature-reboot = "1"   (n2)
>> /local/domain/2/control/feature-suspend = ""   (n2)
>> /local/domain/2/control/sysrq = ""   (n2)
>> /local/domain/2/control/platform-feature-multiprocessor-suspend = "1"
>> (n0,r2)
>> /local/domain/2/control/platform-feature-xs_reset_watches = "1"   (n0,r2)
>> /local/domain/2/data = ""   (n2)
>> /local/domain/2/drivers = ""   (n2)
>> /local/domain/2/feature = ""   (n2)
>> /local/domain/2/attr = ""   (n2)
>> /local/domain/2/error = ""   (n2)
>> /local/domain/2/error/device = ""   (n2)
>> /local/domain/2/error/device/vif = ""   (n2)
>> /local/domain/2/error/device/vif/0 = ""   (n2)
>> /local/domain/2/error/device/vif/0/error = "1 allocating event channel"
>> (n2)
> 
> That's the real error. Your guest netfront fails to allocate the event
> channel. Do you get any messages in the guest dmesg after trying to
> attach the network interface?

Just these two lines:

[  389.453390] vif vif-0: 1 allocating event channel
[  389.804135] vif vif-0: 1 allocating event channel
 
> Does the same happen if you don't use a driver domain and run the
> backend in dom0?

No, it does not. On dom0 everything is set up correctly. Here the final
part of xl -vvv devd -F executed on dom0, which is different from the 
execution on guest0

libxl: debug: libxl_event.c:1052:devstate_callback: backend /local/domain/0/backend/vif/1/0/state wanted state 2 ok
libxl: debug: libxl_event.c:850:libxl__ev_xswatch_deregister: watch w=0xaaaaca342470 wpath=/local/domain/0/backend/vif/1/0/state token=1/2: deregister slotnum=1
libxl: debug: libxl_device.c:1090:device_backend_callback: Domain 1:calling device_backend_cleanup
libxl: debug: libxl_event.c:864:libxl__ev_xswatch_deregister: watch w=0xaaaaca342470: deregister unregistered
libxl: debug: libxl_device.c:1191:device_hotplug: Domain 1:calling hotplug script: /etc/xen/scripts/vif-bridge online
libxl: debug: libxl_device.c:1192:device_hotplug: Domain 1:extra args:
libxl: debug: libxl_device.c:1198:device_hotplug: Domain 1:     type_if=vif
libxl: debug: libxl_device.c:1200:device_hotplug: Domain 1:env:
libxl: debug: libxl_device.c:1207:device_hotplug: Domain 1:     script: /etc/xen/scripts/vif-bridge
libxl: debug: libxl_device.c:1207:device_hotplug: Domain 1:     XENBUS_TYPE: vif
libxl: debug: libxl_device.c:1207:device_hotplug: Domain 1:     XENBUS_PATH: backend/vif/1/0
libxl: debug: libxl_device.c:1207:device_hotplug: Domain 1:     XENBUS_BASE_PATH: backend
libxl: debug: libxl_device.c:1207:device_hotplug: Domain 1:     netdev:
libxl: debug: libxl_device.c:1207:device_hotplug: Domain 1:     vif: vif1.0
libxl: debug: libxl_aoutils.c:593:libxl__async_exec_start: forking to execute: /etc/xen/scripts/vif-bridge online

> 
> Regards, Roger.

Cheers,
Andrea.


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 14:22:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 14:22:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286092.485449 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREFX-0001BS-6v; Mon, 07 Mar 2022 14:22:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286092.485449; Mon, 07 Mar 2022 14:22:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREFX-0001BL-3h; Mon, 07 Mar 2022 14:22:11 +0000
Received: by outflank-mailman (input) for mailman id 286092;
 Mon, 07 Mar 2022 14:22:10 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=pTMl=TS=cantab.net=dvrabel@srs-se1.protection.inumbo.net>)
 id 1nREFV-0001Ax-Vu
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 14:22:09 +0000
Received: from smarthost01b.sbp.mail.zen.net.uk
 (smarthost01b.sbp.mail.zen.net.uk [212.23.1.3])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f83c3a29-9e21-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 15:22:08 +0100 (CET)
Received: from [82.70.146.41] (helo=pear.davidvrabel.org.uk)
 by smarthost01b.sbp.mail.zen.net.uk with esmtps
 (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1)
 (envelope-from <dvrabel@cantab.net>)
 id 1nREFP-0003Vq-3t; Mon, 07 Mar 2022 14:22:03 +0000
Received: from apple.davidvrabel.org.uk ([82.70.146.43])
 by pear.davidvrabel.org.uk with esmtp (Exim 4.92)
 (envelope-from <dvrabel@cantab.net>)
 id 1nREFF-0005Go-Ra; Mon, 07 Mar 2022 14:22:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f83c3a29-9e21-11ec-8539-5f4723681683
Message-ID: <31b6eb2a-31cc-efa4-fe22-e0012acdf2c3@cantab.net>
Date: Mon, 7 Mar 2022 14:21:53 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Content-Language: en-GB
To: Jan Beulich <jbeulich@suse.com>, Bjoern Doebel <doebel@amazon.de>
Cc: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>,
 Roger Pau Monne <roger.pau@citrix.com>,
 Andrew Cooper <Andrew.Cooper3@citrix.com>,
 Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
 Ross Lagerwall <ross.lagerwall@citrix.com>, xen-devel@lists.xenproject.org
References: <cover.1646653825.git.doebel@amazon.de>
 <deb5d86b20c02312023959bae06b0fe651a4b2f4.1646653825.git.doebel@amazon.de>
 <8315826a-c6ae-0abe-a25b-74e37080383e@suse.com>
From: David Vrabel <dvrabel@cantab.net>
In-Reply-To: <8315826a-c6ae-0abe-a25b-74e37080383e@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-SA-Exim-Connect-IP: 82.70.146.43
X-SA-Exim-Mail-From: dvrabel@cantab.net
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on
	pear.davidvrabel.org.uk
X-Spam-Level: 
X-Spam-Status: No, score=-1.2 required=5.0 tests=BAYES_00,SPF_SOFTFAIL
	autolearn=no autolearn_force=no version=3.4.2
Subject: Re: [PATCH 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
X-SA-Exim-Version: 4.2.1 (built Wed, 08 May 2019 21:11:16 +0000)
X-SA-Exim-Scanned: Yes (on pear.davidvrabel.org.uk)
X-Originating-smarthost01b-IP: [82.70.146.41]
Feedback-ID: 82.70.146.41

On 07/03/2022 14:03, Jan Beulich wrote:
> On 07.03.2022 12:53, Bjoern Doebel wrote:
>> @@ -104,18 +122,36 @@ void noinline arch_livepatch_revive(void)
>>   
>>   int arch_livepatch_verify_func(const struct livepatch_func *func)
>>   {
>> +    BUILD_BUG_ON(sizeof(struct x86_livepatch_meta) != LIVEPATCH_OPAQUE_SIZE);
>> +
>>       /* If NOPing.. */
>>       if ( !func->new_addr )
>>       {
>> +        struct x86_livepatch_meta *lp;
>> +
>> +        lp = (struct x86_livepatch_meta *)func->opaque;
>>           /* Only do up to maximum amount we can put in the ->opaque. */
>> -        if ( func->new_size > sizeof(func->opaque) )
>> +        if ( func->new_size > sizeof(lp->instruction) )
>>               return -EOPNOTSUPP;
>>   
>>           if ( func->old_size < func->new_size )
>>               return -EINVAL;
>>       }
> 
> I continue to be concerned of the new local variable causing compiler
> warnings. With the adjustment made compared to v1, the specific
> warning would have changed, and we're now liable to see set-but-never-
> used ones.

Linux has a sizeof_field() macro for this sort of use.

     /**
      * sizeof_field() - Report the size of a struct field in bytes
      *
      * @TYPE: The structure containing the field of interest
      * @MEMBER: The field to return the size of
      */
     #define sizeof_field(TYPE, MEMBER) sizeof((((TYPE *)0)->MEMBER))

David


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 14:26:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 14:26:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286101.485459 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREJg-00020v-T8; Mon, 07 Mar 2022 14:26:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286101.485459; Mon, 07 Mar 2022 14:26:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREJg-00020o-Q2; Mon, 07 Mar 2022 14:26:28 +0000
Received: by outflank-mailman (input) for mailman id 286101;
 Mon, 07 Mar 2022 14:26:27 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nREJf-00020i-7r
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 14:26:27 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 91d8f4e0-9e22-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 15:26:25 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2169.outbound.protection.outlook.com [104.47.17.169]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-10-wsMBWSRXOFqMQeJ5UkC2Dw-1; Mon, 07 Mar 2022 15:26:24 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM6PR04MB4198.eurprd04.prod.outlook.com (2603:10a6:209:4e::32)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Mon, 7 Mar
 2022 14:26:23 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 14:26:23 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 91d8f4e0-9e22-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646663185;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=ipYBTJyVZYqQIjlvd2AgtoPfdZUZKUxC8m4xSwOfnsw=;
	b=e2IyFpQ35+QlgeRBlQnliTL1LFEFvXLQBQ73yI6+Onw5d4TlAJCbkz7wjijW7XwIi1ZcKw
	YMyxaOcI6x7jMiBfvHg+kVrtcDH8uAt5VGrQXWH6IzgZ0ihLdgEKUGvy2Gcd9w+wOGCbfI
	5EjXtwgsQr2fvY2dOMcmvowG6qauk/w=
X-MC-Unique: wsMBWSRXOFqMQeJ5UkC2Dw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=eeBhTDAmEBZu3NI9hHzVRfw5uqLPoNXpcsUQObgDpRKzSwkFf535SwCPdcyy4ChOn09YqpE/0G+opy90M6E8aCUUxL0hrIuQtxG7dmICjk/fA8GHkdg6cRB7sBLNZShYSQbLPrO1jc9vp5lSEQOqk/1qqUeZkboBM8HoyuN525i4O92lUsH4d3GmndxiodtkeQR6hxF31QpSX7wesDazkBLqMGvAJYZLB8ZV1qRv7U7d2aSosrU92gTW2DgoyzNJDAQ2x6NxVzPz9PTy3FaBwhzlU7aHCEd42scAhnVQzWmzZ8m1nXFtjLoZLj5mBpV9r1d2mhbs+42BKN6JPv3RBQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ipYBTJyVZYqQIjlvd2AgtoPfdZUZKUxC8m4xSwOfnsw=;
 b=hUwhyyk5OhqKBIi92PaRj9rof6SaE0tbyhULOZq3sKkWyuO2bW1uAg0DYN2oQcqKFqXs/g+N5hcyxE2ibqOCPkCFnUN24KXAoIaedaZZQ/T0IlOEA3BXwYOcfySF6U2PP06KZXL+PN6Hq8nxXwgmcRlJdp878M0r2u943qpjW+Sqd0a2XRoOJVQ3i3jGDCg5d+RFtX8mxHw4rfOz85gX7y10s1y2933Cssd7IlDXqPCN1reT7fSJ+RU9YKyBvwJR1uC2C1CurTnxkgqsP0+oYqNxr94R6lBkdWD6be5evitpEscEiJSEAjIvaL1JhonP8IY+Hu1eMVmVdpJMMvsd2Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <db353243-3fc9-3763-100c-67d79856b3e3@suse.com>
Date: Mon, 7 Mar 2022 15:26:24 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
Content-Language: en-US
To: David Vrabel <dvrabel@cantab.net>, Bjoern Doebel <doebel@amazon.de>
Cc: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>,
 Roger Pau Monne <roger.pau@citrix.com>,
 Andrew Cooper <Andrew.Cooper3@citrix.com>,
 Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
 Ross Lagerwall <ross.lagerwall@citrix.com>, xen-devel@lists.xenproject.org
References: <cover.1646653825.git.doebel@amazon.de>
 <deb5d86b20c02312023959bae06b0fe651a4b2f4.1646653825.git.doebel@amazon.de>
 <8315826a-c6ae-0abe-a25b-74e37080383e@suse.com>
 <31b6eb2a-31cc-efa4-fe22-e0012acdf2c3@cantab.net>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <31b6eb2a-31cc-efa4-fe22-e0012acdf2c3@cantab.net>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8PR07CA0023.eurprd07.prod.outlook.com
 (2603:10a6:20b:451::23) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 012193a6-a856-4655-f6e6-08da00467474
X-MS-TrafficTypeDiagnostic: AM6PR04MB4198:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB4198263935C6BE857331191BB3089@AM6PR04MB4198.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(36756003)(316002)(38100700002)(110136005)(54906003)(26005)(2616005)(186003)(508600001)(6486002)(6506007)(83380400001)(5660300002)(8936002)(2906002)(31686004)(31696002)(66476007)(66556008)(6512007)(8676002)(4326008)(66946007)(86362001)(53546011)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?RkZaVmxrL29HR1lOcHY3UUNtOTBweEFQaGxIMTdJcWpYSUJCWnR4R3FlY3Nm?=
 =?utf-8?B?NXFKSUFRR3BtejBheDlQRll6OGRSQTg1ay9vbkdkSWQyV1VvMHE5OGJCZXZS?=
 =?utf-8?B?dGFyT24zVUNjenczc01RaHRwU1R0SFB5Q2ZxV3pJOUJVSGVKWWh6YVZ4TlpU?=
 =?utf-8?B?ZlNsOEZBN1F3Qks5WHlrdTk4UEVkOEJzeldNbzhmcm5PRy9VOVZoNGcyMHY2?=
 =?utf-8?B?YmtOQWMvNy9PTGgxcjN5TVBic3QrTUUvYTczMjV0REJKOHVJSXBVRldkalRx?=
 =?utf-8?B?MGdxc3VHL2FhVVptTVBacmdwU2hRRkpWWUVzWTZGZ2Zpazd1RzdaSzJIbEpl?=
 =?utf-8?B?dzhXOXF3US83eGNVR0VmUC9GS2tJZ05wdE8rQ3k2cDF5T010U2gvSkVZYnJF?=
 =?utf-8?B?TzVkK2FEZFNIaFptdEFEZ2FJcjNlQ21jQmVORkZpTTEzUlUxS0FjaXViVFIw?=
 =?utf-8?B?YWg3cU9XeThmZVlTRmpLVXJMNGRjUENTc3QyR1JWNU93czhUaVovN1p5R3Rt?=
 =?utf-8?B?MU54TTczbWRGaW0wSVIzQUo4TmlMZGRSU0ZhU0pTY3d6VmVxdzdKZnJqZ2x3?=
 =?utf-8?B?NG1BK3J0emRKSWFSOWZITDZQaVlUVmFEZVVPZnZLais4NEsvaFlLUngrb0VK?=
 =?utf-8?B?a1lSblhTMXRtY091UXR2U1lmcDd5TW1PT1ZpeEhnVHptTlZjM1BnWGdpRzFN?=
 =?utf-8?B?VG05K21SRU95dTdoWXdJcVlpa0dtY2F2MjgyTlJtOUpHZWE4NCtaTVpzOTZj?=
 =?utf-8?B?SUwvbmQ4Ykw2TEZackd0T1Y3emhZd0RtQklKMm1McVNTSHpBeHNCdjBjQUQz?=
 =?utf-8?B?ME4wZXhKRzNUQzl2cVFPSnZWYWFHMVNFc2daTEVjN3c0UnJEZndlcVp5b3dZ?=
 =?utf-8?B?QlZHOEE5RmVqeitDMTJMTEVzcFovQXZ0U01vK015dSs0bVg3MW9IRjE4VUpi?=
 =?utf-8?B?VTV3SWluaTFNM3poQzRIMm5IWkJENzRWbEZEMCtXa09QSUFSMWlLeHFnc1Zz?=
 =?utf-8?B?YXVDUXhkVVFQUHlueUFhSFl2a0UwbFhybWJ4dnVUUjg4RWM1RFlQRnVuRFdR?=
 =?utf-8?B?OTlQLzZmNFJxSVlVQmlxanIxSFNzQklxcVp3dDZHaUwxUVFDWm5ldm9Rc0hZ?=
 =?utf-8?B?UjkycEtyYkdRY3Y5a0dQOVo2NTZnZ1Z0N3hlNU5XZ2tWa1M0SWR6NFVZWlJv?=
 =?utf-8?B?RWRpUzNpVnR0VDM4Rks4bEpxZ00wcW5EdEFMc1QvMXRlTzZpWmFZQTMwSlJ0?=
 =?utf-8?B?L09XUWlBc2tIMDZ2WERBTXBMOG5uZUdobEtRenRxeE1xbVRncXRyOUJwd29C?=
 =?utf-8?B?UlZYSWZxbXpidjVzdzV4UEpoMnBSdHFEQnd2eDlVRlJBSXV6bEJVczBrcm5W?=
 =?utf-8?B?a2FzeXUxTkQ1NU1LMUFQRTEwaTF6MGwzL0ZFMWdrcUlBcWlxbmJVeGhGck9W?=
 =?utf-8?B?VnpRU2RvZDg0WlRxQ3lEQUhtVWdGY2ZtVWl0QkZGalhuMGZ1VVkwR29MUEtW?=
 =?utf-8?B?OUJaYllTM2JpbVVJWmZBeWJpQStqQ3A0S0tjYzNNYkxYSGtXT2xiaUo5dkly?=
 =?utf-8?B?MWFGaUVDRjFvblVrNXR1S1lIc2REbm92QUY5NjFMc3dBMUd3dVk5Y0RIQ290?=
 =?utf-8?B?YXQwZXpNUmh0MFFmOVoyV3Z2UUpMS0NQUGNFQmxkNHlONHozd0lkTi9may85?=
 =?utf-8?B?Qm5ja3A1QkRvR0ZMQUk3US9vSWhnODYwZmlqRXZ2MFZJSVhGeXhESHBZOWt1?=
 =?utf-8?B?MHpPSFFYbms2WC9PQVBLZVBBQ25JRXl4SVdVYnY1UHlCMmRFaFh0bDY0bE54?=
 =?utf-8?B?NXZJNmFPZzQ4b0dzSDVXYXQwV1hDSzZxKzZWRk9wZGYya1U1NkMzRFZZaVBH?=
 =?utf-8?B?OUF4ODgrMjN5bzUwSXd1d3ZtaVBPekF6djUyN2MrL2ExUjZzTTNLS3MxZFd6?=
 =?utf-8?B?MFZZQWxXYnNwbWdMa0o2MEhKdGJtRzBwWjFYRXBsNlpDSDMzMEVTaFJzWkZm?=
 =?utf-8?B?WmpCbmpUbWJJWm56aVVBUzRZVThPc21Ccm5OSEo1WDJDT25nL214cnlIUy9H?=
 =?utf-8?B?QWloSGZGYjR3VExDcVpXNkUyS3ZWWFRGSGFmSkw3STg4QU1BOGVkeDhjQlg4?=
 =?utf-8?B?dnhjZUsvT2lFVWZ6UGo5VlhaemxmSW1DOVRCbTF0Nm5QbktkaHlhWktuT3o0?=
 =?utf-8?Q?RYKHKNSHoV2agp6DJ1+m4I8=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 012193a6-a856-4655-f6e6-08da00467474
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 14:26:22.9285
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: +qD26qim0OCZ+E3ZKp3UlXgnGJSMfERBV0o/I2/FFmxeBNKgZ/OpuBu1/If3YLPbO5uVBBQaBEfipMsIYPjFLg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB4198

On 07.03.2022 15:21, David Vrabel wrote:
> On 07/03/2022 14:03, Jan Beulich wrote:
>> On 07.03.2022 12:53, Bjoern Doebel wrote:
>>> @@ -104,18 +122,36 @@ void noinline arch_livepatch_revive(void)
>>>   
>>>   int arch_livepatch_verify_func(const struct livepatch_func *func)
>>>   {
>>> +    BUILD_BUG_ON(sizeof(struct x86_livepatch_meta) != LIVEPATCH_OPAQUE_SIZE);
>>> +
>>>       /* If NOPing.. */
>>>       if ( !func->new_addr )
>>>       {
>>> +        struct x86_livepatch_meta *lp;
>>> +
>>> +        lp = (struct x86_livepatch_meta *)func->opaque;
>>>           /* Only do up to maximum amount we can put in the ->opaque. */
>>> -        if ( func->new_size > sizeof(func->opaque) )
>>> +        if ( func->new_size > sizeof(lp->instruction) )
>>>               return -EOPNOTSUPP;
>>>   
>>>           if ( func->old_size < func->new_size )
>>>               return -EINVAL;
>>>       }
>>
>> I continue to be concerned of the new local variable causing compiler
>> warnings. With the adjustment made compared to v1, the specific
>> warning would have changed, and we're now liable to see set-but-never-
>> used ones.
> 
> Linux has a sizeof_field() macro for this sort of use.
> 
>      /**
>       * sizeof_field() - Report the size of a struct field in bytes
>       *
>       * @TYPE: The structure containing the field of interest
>       * @MEMBER: The field to return the size of
>       */
>      #define sizeof_field(TYPE, MEMBER) sizeof((((TYPE *)0)->MEMBER))

Oh, I should have thought of this. Iirc it was Paul who did pull in
this one, so it should be readily available.

Thanks for pointing out,
Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 14:27:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 14:27:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286106.485470 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREL0-0002ah-7c; Mon, 07 Mar 2022 14:27:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286106.485470; Mon, 07 Mar 2022 14:27:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREL0-0002aa-4l; Mon, 07 Mar 2022 14:27:50 +0000
Received: by outflank-mailman (input) for mailman id 286106;
 Mon, 07 Mar 2022 14:27:49 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=bwGU=TS=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nREKz-0002aU-8l
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 14:27:49 +0000
Received: from NAM10-BN7-obe.outbound.protection.outlook.com
 (mail-bn7nam10on20609.outbound.protection.outlook.com
 [2a01:111:f400:7e8a::609])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c2576f89-9e22-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 15:27:46 +0100 (CET)
Received: from BN9PR03CA0251.namprd03.prod.outlook.com (2603:10b6:408:ff::16)
 by BL0PR02MB6482.namprd02.prod.outlook.com (2603:10b6:208:1ce::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Mon, 7 Mar
 2022 14:27:43 +0000
Received: from BN1NAM02FT036.eop-nam02.prod.protection.outlook.com
 (2603:10b6:408:ff:cafe::54) by BN9PR03CA0251.outlook.office365.com
 (2603:10b6:408:ff::16) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Mon, 7 Mar 2022 14:27:43 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (149.199.80.198) by
 BN1NAM02FT036.mail.protection.outlook.com (10.13.2.147) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5038.14 via Frontend Transport; Mon, 7 Mar 2022 14:27:43 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Mon, 7 Mar 2022 14:27:41 +0000
Received: from smtp.xilinx.com (172.21.105.197) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Mon, 7 Mar 2022 14:27:41 +0000
Received: from [10.71.117.199] (port=49369)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nREKq-00086H-QO; Mon, 07 Mar 2022 14:27:41 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c2576f89-9e22-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=KysS6YMTdHV2xCDwd5c8HdRYUu2n3UvVpOBE+sV0zWIOwd/1KEiKn5BAjaJ1wvZfwwLYUt7Alu7TWt4Pb6O5qLXX7ScUxckQT/9nsSb7ih7gyWhpqrMRd1zhCZqNjQ3RVRJHmqJQz/Yo+zxV2bnCPwcV1sk0k2gjXiQIPu0UJD57OVPFbVEQQApLfDlGjRCz7+kr2Kv1tRj3pvTGAqqtyDV7VRdjEV271i6BWrss/LqW7FAKmgf/AP9USyAx0oMkJoBuTj3xGg63XLIeeuuOghQRPWknq32BFMABex+Bk6j+d4ZevPpT+yBz3d0uVmNlQ7Sl8/g2unMYHqxw/+WA0A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=GxiLODk+6owjnI69lut48gI8D4WNfPzmaL06TYvTt+s=;
 b=QICyoy3phf9uPvVkGcM9Kl7vUj4pBkOvLJjy17skay5iE8Yza29J1GUmv4tuNKRBH6OeGasioRxUQOgZxIAPms2uqaDL95M2iUP/HbOSkYLVlSsYNpGPCkd3yhSUZtRPRxN4nCEseHzRfY/kLwGAXHQMtmAWxuRY+iql755Qe6Wq636Bu5z2gXia4lhZymCJMGraRUr5GEf+HCDuE03iqMerZP2KIm7/jojlaEVc8ipuwkD3nX3NpwgcGsMAH72acRao9n892lmxgVkiVPzVgeTrBPlfVtViYAc2UoPXhR6VRSXsTBk8Uy6A8vM5gzP21LeHJ/J83uFFYHh0nvHVXw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=xen.org smtp.mailfrom=xilinx.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=xilinx.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=GxiLODk+6owjnI69lut48gI8D4WNfPzmaL06TYvTt+s=;
 b=aQyu+Vm+bGXqjPJ3eHR9Tww1/5THhEXP47IcyDRakQxh7lhpes+DkmF52vEyKRsAGJP3cm7OgmiNigLcexWk1auTDdchssZZpBObhgkUl+gLLcVlRCjrXhR4U6c2BeaeyEy1kqeIddZtdlt0iIys/7FaR2jc9XuKbkTJSs9OMcg=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch01.xlnx.xilinx.com;
Message-ID: <5d5b0fc1-6f47-dfc0-dca3-5d60483a6eae@xilinx.com>
Date: Mon, 7 Mar 2022 14:27:40 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Subject: Re: [XEN v9 3/4] xen/arm64: io: Handle the abort due to access to
 stage1 translation table
To: Julien Grall <julien@xen.org>, Ayan Kumar Halder
	<ayan.kumar.halder@xilinx.com>, <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <stefanos@xilinx.com>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>
References: <20220301124022.10168-1-ayankuma@xilinx.com>
 <20220301124022.10168-4-ayankuma@xilinx.com>
 <68acfbf0-f2c1-c52e-93a3-632f1286d90f@xen.org>
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
In-Reply-To: <68acfbf0-f2c1-c52e-93a3-632f1286d90f@xen.org>
Content-Type: text/plain; charset="UTF-8"; format=flowed
Content-Transfer-Encoding: 8bit
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ef52b3c6-7a87-4053-0629-08da0046a4b3
X-MS-TrafficTypeDiagnostic: BL0PR02MB6482:EE_
X-Microsoft-Antispam-PRVS:
	<BL0PR02MB64824B15DBE0038B947AF4DBB2089@BL0PR02MB6482.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	sDmrUfVbTC95O8mAk25l18JRMqtssDN408KkgOLNfpZUb81Zy3M+ow6HdcwoNEKGo25b1osk2VetkP8/a98fGKYvo9CLid/cqY+y0Ay6mkwlPxFTV8tRDWVWHpAqDUrwiKyS8fojAtYY5bJmoupIt0bn4KzpKTI8Yzog1athVJ3vpBWr8WN/BjJ6st5RW67Me+A6iT19rSXXiFft1BXotidLE+hfCf8xZdbSGz5eSft1VPr/tuiNjVDuJ+yFhF5GhM0gcIu9VHHmex4B4JBOxbBIsEE2cEJZcaiETEJnBZTZS/oWvgkc5RdhMdcaOrFxurC0Raucp0UJRJsskmSElqZ35r1f8y8v1o2oWEbqnh9qvdkQeqtV19x0iLDK0RtYBxd7wddcHT4JmJOjd2LDyK1M6RHZSDtIcq0rlr5Io9TLQ/RLGguRgtxc7J+hF11xsvfIcjqjW4ZSkuo0ls4brBJvnnAOgHcULvIbae+1eqG7Am6umCsjLSt2m6kaFpvSk85AeMA5VJNFIZ8DBZcrF4K23P9Dn4JRNDDEaT/uB5sw1XYWs9uiiH9XCNhoUBu4ctfOWXVamMDZfHC1TDnC/skN8v/3IZU8nm7AS2YnrqToGVmp4dWZ1Nr4x8pd0fjjakyhtqWTaCq/0/iOeBL8ITEcYuIR8oP6KH/82xM5Ldr9A5ipsZeU09N07+InoHuUZWpxXmQPkga98F0eoxCcr39pJ/LVZvPmecoqzsINFKI=
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch01.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(70206006)(316002)(54906003)(8676002)(4326008)(82310400004)(31696002)(110136005)(9786002)(8936002)(356005)(7636003)(2906002)(5660300002)(2616005)(7416002)(336012)(426003)(70586007)(186003)(26005)(508600001)(53546011)(36860700001)(83380400001)(47076005)(36756003)(31686004)(50156003)(43740500002)(473944003);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 14:27:43.5534
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: ef52b3c6-7a87-4053-0629-08da0046a4b3
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch01.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	BN1NAM02FT036.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR02MB6482

Hi Julien,

One clarification.

On 04/03/2022 10:39, Julien Grall wrote:
> Hi Ayan,
>
> On 01/03/2022 12:40, Ayan Kumar Halder wrote:
>> If the abort was caused due to access to stage1 translation table, Xen
>> will assume that the stage1 translation table is in the non MMIO region.
>> It will try to resolve the translation fault. If it succeeds, it will
>> return to the guest to retry the instruction. If not, then it means
>> that the table is in MMIO region which is not expected by Xen. Thus,
>> Xen will forward the abort to the guest.
>>
>> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
>> ---
>>
>> Changelog :-
>>
>> v1..v8 - NA
>>
>> v9 - 1. Extracted this change from "[XEN v8 2/2] xen/arm64: io: Support
>> instructions (for which ISS is not..." into a separate patch of its own.
>> The reason being this is an existing bug in the codebase.
>>
>>   xen/arch/arm/io.c    | 11 +++++++++++
>>   xen/arch/arm/traps.c | 12 +++++++++++-
>>   2 files changed, 22 insertions(+), 1 deletion(-)
>>
>> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
>> index bea69ffb08..ebcb8ed548 100644
>> --- a/xen/arch/arm/io.c
>> +++ b/xen/arch/arm/io.c
>> @@ -128,6 +128,17 @@ void try_decode_instruction(const struct 
>> cpu_user_regs *regs,
>>           return;
>>       }
>>   +    /*
>> +     * At this point, we know that the stage1 translation table is 
>> in the MMIO
>> +     * region. This is not expected by Xen and thus it forwards the 
>> abort to the
>
> We don't know that. We only know that there are no corresponding valid 
> mapping in the P2M. So the address may be part of an emulated MMIO 
> region or invalid.
>
> For both cases, we will want to send an abort.
>
> Furthermore, I would say "emulated MMIO region" rather than MMIO 
> region because the P2M can also contain MMIO mapping (we usually call 
> then "direct MMIO").

Can I say MMIO region (to indicate both emulated and direct) ? The 
reason being the assumption that stage1 page tables cannot be in the 
MMIO region. And thus, when check_p2m() is invoked, we do not invoke 
try_map_mmio(gaddr_to_gfn(gpa).

See this snippet :-

             if ( xabt.s1ptw )
                 check_mmio_region = false;

             if ( check_p2m((is_data && check_mmio_region), gpa) )
                 return;

- Ayan

>
> Cheers,
>


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 14:32:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 14:32:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286113.485481 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREPD-0003z9-PE; Mon, 07 Mar 2022 14:32:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286113.485481; Mon, 07 Mar 2022 14:32:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREPD-0003z2-MK; Mon, 07 Mar 2022 14:32:11 +0000
Received: by outflank-mailman (input) for mailman id 286113;
 Mon, 07 Mar 2022 14:32:10 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nREPC-0003ys-58; Mon, 07 Mar 2022 14:32:10 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nREPC-00062P-2g; Mon, 07 Mar 2022 14:32:10 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nREPB-00056y-PA; Mon, 07 Mar 2022 14:32:09 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nREPB-0002EK-Oi; Mon, 07 Mar 2022 14:32:09 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=IcGfAB+83od9lCS8n+OUjVmFDMkOQ8PpF87pYfcq8cI=; b=UjH8Zl/fLD/8AEfi5Sg74SMpY/
	TAcZdS/yjaU/zT5EhG8bSsppuYDw1MRLVjY5294A+QhiRXc+vF00PFuySzYLEW2Qh32EczhGMlQ+O
	ADeJHZ9KMM9z+EUm9kEMY1ylfdblLAaMmDZR7ovO3NNvlxNv9EosBzvFwlpadctUhWMM=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168461-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168461: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=79f2734e5a7bc2e5256eb0e599f45407855159c7
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 07 Mar 2022 14:32:09 +0000

flight 168461 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168461/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 79f2734e5a7bc2e5256eb0e599f45407855159c7
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    7 days
Failing since        168258  2022-03-01 01:55:31 Z    6 days   71 attempts
Testing same since   168449  2022-03-07 02:15:20 Z    0 days    9 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 437 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 14:36:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 14:36:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286124.485493 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRETl-0004jv-CY; Mon, 07 Mar 2022 14:36:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286124.485493; Mon, 07 Mar 2022 14:36:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRETl-0004jo-9W; Mon, 07 Mar 2022 14:36:53 +0000
Received: by outflank-mailman (input) for mailman id 286124;
 Mon, 07 Mar 2022 14:36:51 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRETj-0004ji-TO
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 14:36:51 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 064f586a-9e24-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 15:36:50 +0100 (CET)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04lp2051.outbound.protection.outlook.com [104.47.12.51]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-8-dt0hgImqOImTkuUGk6Eajg-1; Mon, 07 Mar 2022 15:36:49 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PAXPR04MB8208.eurprd04.prod.outlook.com (2603:10a6:102:1c7::5)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Mon, 7 Mar
 2022 14:36:47 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 14:36:46 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 064f586a-9e24-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646663810;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=p/Kd3A8WuUJvl6lX2fsfihRjh6zV+ujL+zrUBOzOqYk=;
	b=Q9cAws99iLAzXvGL6FNq8dnGOLv6tprrhXlRQsYAocm4NObILRm2PGpFidlGf0A4AVg4f6
	5vqhj/Fi4gzeDpIp4Xk05sbubc39vNj1oj/9zUJGXfDaxc/wlJZTmUtNhKpymoydAcQuB1
	eJzSp3ywL0tsG7VwqTYjj7+dpgMUNVo=
X-MC-Unique: dt0hgImqOImTkuUGk6Eajg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=IjiSeSbbXsse3GkanCKNGGZgv5id+V/28fkjTa27KJkaomGQusfSyjL0KRgA2h8Lj9F34PyEqpqiUZkmbRWfWrBNI6wxFGj1C8LQQsRLyEkjmvjiwZc5Tqlg3ocFc/vn6jsKifgaM9OOtI/pIMngRmM4zSwY14nu6EhLtdO1tZNt2OEC2vVcA4/Czd9soYx0vJUSMDXkbB7c+MjItE8Il72JqX40tvaqwoUtmdqKS4Ff/86tD0PeK6IX8hglHz5Pg/IKBHmtKpSMUU6YOLASs/3bWS9KpfgJiahxNo4NGYdCZL4oojbSgd9ijPGqNAcXcKtkfuP9pPWQgI3rJ8Ukjg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=yF89vvKdeF4DK/uA5UcNsMIWRFEbZXQida894KnwPHM=;
 b=njlc/opaeONAbXp1KV9bIsgDCilB0Xa43f+IWl99kZt6BHFi4y6DvKSsAMsYWHfcFhq0ITAHZOG+NLKt70Suz9YmzL0q+17NN7pMJCz5V9KRkPX+0eBPAlRe/tw1sSy2HPBRiPxvObmbQ3mZO2JtihzPT/wuEvt9fzOnHeZ0pMDgPFYI2MuEvysHwNL82x6i7nOdo8wRAE2GN6V01UjeWlBuOsLAQMMLa5JbwZY0rQ4bUCo3/1hzoCP/eF2k8CLcIEfo5BB0jzOOKIwAiLe9XA/1b9c92Y2fAX5VAJf6NbgZC+82RC4IloSFEH2stBoCliR43YlBLUVUdZE2sqeh+A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <e5c4c591-8ef4-f8d7-aa2a-b196a5a9749c@suse.com>
Date: Mon, 7 Mar 2022 15:36:48 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: Network driver domain broken
Content-Language: en-US
To: Andrea Stevanato <andrea.stevanato@santannapisa.it>
CC: Jason Andryuk <jandryuk@gmail.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 "wl@xen.org" <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
References: <DB7PR03MB50027EE92E11BFFF71AADC4598049@DB7PR03MB5002.eurprd03.prod.outlook.com>
 <92827eec-b6e9-9c95-8f9e-fcf063d45090@santannapisa.it>
 <YiDt7fX92n6Luc2l@Air-de-Roger>
 <CAKf6xpsnmQG7-LXn5+Uz4mncWsN0EZ8wpagY8f8OydvZNb6g5A@mail.gmail.com>
 <YiH9cee6NIKA6MWg@Air-de-Roger>
 <53a4fe6b-efc8-bfa1-8475-0aa58774051a@santannapisa.it>
 <YiIFyRUNXpUfzwRB@Air-de-Roger>
 <0ce52d38-f542-9336-a100-1cbfc559f218@santannapisa.it>
 <YiXq5HIrvZsy7QKU@Air-de-Roger>
 <b388ed5b-177e-2e9d-6450-6df16d9250c4@santannapisa.it>
 <YiXwhUnZL8bcJvH2@Air-de-Roger>
 <93fb9755-d40a-3cfe-1f6e-335b57d5a213@santannapisa.it>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <93fb9755-d40a-3cfe-1f6e-335b57d5a213@santannapisa.it>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9P194CA0024.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:20b:46d::29) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: b2734b54-6e01-4cf2-fa85-08da0047e851
X-MS-TrafficTypeDiagnostic: PAXPR04MB8208:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB8208FCCA77F170E73B4947EBB3089@PAXPR04MB8208.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(38100700002)(86362001)(31696002)(83380400001)(186003)(26005)(66556008)(4326008)(8676002)(66476007)(66946007)(2616005)(316002)(36756003)(2906002)(8936002)(3480700007)(5660300002)(6506007)(53546011)(6512007)(31686004)(508600001)(6916009)(54906003)(6486002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?GnpLAxQ7pxoxLl1KkODK6OcVJ9jCZqpp3BltkYKE1AAcbzR+y1gTXr13b55J?=
 =?us-ascii?Q?+5/qHcHcfxSF+GQ4TgQ+PFy1ifSDrMvK/AshkDyTGzWMOjJPNdVlAiZ3rRgW?=
 =?us-ascii?Q?cYCftXzXiGs1F8JxLtClGkN8H+BrnOoAMqc1KfsoEplqsocvQlYiG8K+0W27?=
 =?us-ascii?Q?mqSEje+u4IdWfWeu4xloLkseLLeMyfeyaeT5WRYy6s8yZLRpRpzJSZXgbusC?=
 =?us-ascii?Q?stC4zQsJyCclJMXxfcs9EIkM1mlPoGBLkzvK5NX2W4+xzSLFUrpKC4RrOma3?=
 =?us-ascii?Q?GIjkXn35kup4Ey7JX0+NSY+G2oqj/+01r9+zHL5SQdkRl/VU4/zwvne9v8/H?=
 =?us-ascii?Q?olJQkwFiEFXNWcu9yY/mrCX6LPXiyueLov3BGtmMIOtwEGN47xR9i2eIynld?=
 =?us-ascii?Q?xz4B9LLxU5yjZP+rv3foghjbtyQ5uCRmTEIZ2lG694g25664zMltlWhBmQae?=
 =?us-ascii?Q?V4dnlANySCByVHz3CSGp5k8/2O6ipsmbcRk9Yue7qCTKTSYteOxBoZAS65rj?=
 =?us-ascii?Q?aQI1qhr7VvXyLR1tZLI8zBUa6d/aCSMOitZdEdiTI+awW1L0g8+rZnLKbN4/?=
 =?us-ascii?Q?tL+pBKcHf0D3W+r5myjNMQCxsDBBjyd3m4dEG9G3tJOZgt20FHqvFRbVAb/u?=
 =?us-ascii?Q?Vj5gc7Gzsn1H/kCKpVLJvSKkfXbNEXF9qFQlXiEBvxE70tV3b+EUAyZHc86b?=
 =?us-ascii?Q?/DKSIPfiHt9SWiKOIqZqq0Qh56yIlDv/SthdTydHtKMuFBXE6AtLtctslJcj?=
 =?us-ascii?Q?VQ9ewHwg6TBWWSf1WPN7d9KfWVtp+IAKsRzyaEiV/yh/Wb0cDjtMIh26BXdl?=
 =?us-ascii?Q?65Y5+dfc+2CILeKwG97QOnZVZi5VttocJ2tDQtOpu5svFDadsWFnNA6lUFI8?=
 =?us-ascii?Q?ODPQ6EbdpNegHNd56JTd6oMqNB7Kqote1rdk4ZfW5eKb4Ng7DLqgdyTc0nqz?=
 =?us-ascii?Q?i4seiOMqjV5AdxFLKnoA1vSrJ/bpcxRzdGdsFMUzhIoU6aLz6rla6kVCFlHQ?=
 =?us-ascii?Q?OOJikcao9x4WrwvF+GL/tXgWczdaFEK0vP79emBtiyS3z/DrtfxvYsIcf4jT?=
 =?us-ascii?Q?sQrzyoODShCxuD2ntTUbfP9eW5q6vTMQoFVpNAC9b+aBjWwE3IkUHDBKI7Ck?=
 =?us-ascii?Q?BzKTeJNEgrCTaE/xjUDvd9vELc5fvZvfmdh5wPO3iEQgpC2X+k++bGMdkSzP?=
 =?us-ascii?Q?7/PFFHZFjhnukm1vG6MaiPfi1NnipIYnl2ipMDrPkUx2DDJf8C6YlH1ugfgx?=
 =?us-ascii?Q?+YnYApqK9GBINpGiRVwZWKZeq3CuxXOcHS1T0JDNbnhw4vewJOorDwCQjucn?=
 =?us-ascii?Q?8+xPmtIu3FLA5kGi+6Ifzm96T3QXk0jzhypztLe3hAw1fYwq5qsLGsRS0YkS?=
 =?us-ascii?Q?F4wxqKJCIPmJfkIv7DWl7pE7uUprrjF6ESRst5PZ3vfn7ZTrMMPjR5YeKazc?=
 =?us-ascii?Q?QcCcydEKt1OALObxzM2z8wLC5hUeSfy4R5MqNx7p8cUr1xS5dzu4Toozgl6j?=
 =?us-ascii?Q?l7lhStnMv35BgaRSaNvbrgS1yFjsFEI63n8MoS/KjNe1tNvjbMgu+J6taHGa?=
 =?us-ascii?Q?ucB8yGhPtPOlsDsSE0hAo7z1+glc4kxoqIzOlqsLZi9IO1fKfvmIuYnkXyki?=
 =?us-ascii?Q?BdQ/pZicJvKhE9OulzHuGys=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b2734b54-6e01-4cf2-fa85-08da0047e851
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 14:36:46.8273
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: rFcIqh3c7v36D2T5AgGIxKTOPqbNYCcpWkFB3s29q3RnX1fhT+oEOnvXUyx7ZwZb9HkB/KGQU43h8CdWd164jg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB8208

On 07.03.2022 15:20, Andrea Stevanato wrote:
> On 3/7/2022 12:46 PM, Roger Pau Monn=C3=A9 wrote:
>> On Mon, Mar 07, 2022 at 12:39:22PM +0100, Andrea Stevanato wrote:
>>> /local/domain/2 =3D ""   (n0,r2)
>>> /local/domain/2/vm =3D "/vm/f6dca20a-54bb-43af-9a62-67c55cb75708"   (n0=
,r2)
>>> /local/domain/2/name =3D "guest1"   (n0,r2)
>>> /local/domain/2/cpu =3D ""   (n0,r2)
>>> /local/domain/2/cpu/0 =3D ""   (n0,r2)
>>> /local/domain/2/cpu/0/availability =3D "online"   (n0,r2)
>>> /local/domain/2/cpu/1 =3D ""   (n0,r2)
>>> /local/domain/2/cpu/1/availability =3D "online"   (n0,r2)
>>> /local/domain/2/memory =3D ""   (n0,r2)
>>> /local/domain/2/memory/static-max =3D "1048576"   (n0,r2)
>>> /local/domain/2/memory/target =3D "1048577"   (n0,r2)
>>> /local/domain/2/memory/videoram =3D "-1"   (n0,r2)
>>> /local/domain/2/device =3D ""   (n0,r2)
>>> /local/domain/2/device/suspend =3D ""   (n0,r2)
>>> /local/domain/2/device/suspend/event-channel =3D ""   (n2)
>>> /local/domain/2/device/vif =3D ""   (n0,r2)
>>> /local/domain/2/device/vif/0 =3D ""   (n2,r1)
>>> /local/domain/2/device/vif/0/backend =3D "/local/domain/1/backend/vif/2=
/0"
>>> (n2,r1)
>>> /local/domain/2/device/vif/0/backend-id =3D "1"   (n2,r1)
>>> /local/domain/2/device/vif/0/state =3D "6"   (n2,r1)
>>> /local/domain/2/device/vif/0/handle =3D "0"   (n2,r1)
>>> /local/domain/2/device/vif/0/mac =3D "00:16:3e:07:df:91"   (n2,r1)
>>> /local/domain/2/device/vif/0/xdp-headroom =3D "0"   (n2,r1)
>>> /local/domain/2/control =3D ""   (n0,r2)
>>> /local/domain/2/control/shutdown =3D ""   (n2)
>>> /local/domain/2/control/feature-poweroff =3D "1"   (n2)
>>> /local/domain/2/control/feature-reboot =3D "1"   (n2)
>>> /local/domain/2/control/feature-suspend =3D ""   (n2)
>>> /local/domain/2/control/sysrq =3D ""   (n2)
>>> /local/domain/2/control/platform-feature-multiprocessor-suspend =3D "1"
>>> (n0,r2)
>>> /local/domain/2/control/platform-feature-xs_reset_watches =3D "1"   (n0=
,r2)
>>> /local/domain/2/data =3D ""   (n2)
>>> /local/domain/2/drivers =3D ""   (n2)
>>> /local/domain/2/feature =3D ""   (n2)
>>> /local/domain/2/attr =3D ""   (n2)
>>> /local/domain/2/error =3D ""   (n2)
>>> /local/domain/2/error/device =3D ""   (n2)
>>> /local/domain/2/error/device/vif =3D ""   (n2)
>>> /local/domain/2/error/device/vif/0 =3D ""   (n2)
>>> /local/domain/2/error/device/vif/0/error =3D "1 allocating event channe=
l"
>>> (n2)
>>
>> That's the real error. Your guest netfront fails to allocate the event
>> channel. Do you get any messages in the guest dmesg after trying to
>> attach the network interface?
>=20
> Just these two lines:
>=20
> [  389.453390] vif vif-0: 1 allocating event channel
> [  389.804135] vif vif-0: 1 allocating event channel

Well, these are the error messages, from xenbus_alloc_evtchn().
What's a little odd is that the error code is positive, but that's
how -EPERM is logged. Is there perhaps a strange or broken XSM
policy in use? I ask because evtchn_alloc_unbound() itself
wouldn't return -EPERM afaics.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 14:44:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 14:44:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286132.485504 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREad-0006E3-9s; Mon, 07 Mar 2022 14:43:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286132.485504; Mon, 07 Mar 2022 14:43:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREad-0006Dw-6E; Mon, 07 Mar 2022 14:43:59 +0000
Received: by outflank-mailman (input) for mailman id 286132;
 Mon, 07 Mar 2022 14:43:57 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=/EJ7=TS=santannapisa.it=Andrea.Stevanato@srs-se1.protection.inumbo.net>)
 id 1nREab-0006Dn-2m
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 14:43:57 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05on2062b.outbound.protection.outlook.com
 [2a01:111:f400:7d00::62b])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 03b29006-9e25-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 15:43:55 +0100 (CET)
Received: from AM6PR03MB5000.eurprd03.prod.outlook.com (2603:10a6:20b:88::11)
 by AM5PR03MB2898.eurprd03.prod.outlook.com (2603:10a6:206:19::20)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Mon, 7 Mar
 2022 14:43:53 +0000
Received: from AM6PR03MB5000.eurprd03.prod.outlook.com
 ([fe80::cdef:8699:47b:300d]) by AM6PR03MB5000.eurprd03.prod.outlook.com
 ([fe80::cdef:8699:47b:300d%3]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 14:43:53 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 03b29006-9e25-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=RrTK3Uz/L6kXO5cmYt5UysZPMhJj3oxo+hdFsJUYyH5mmHGW+oncC1XTxEcPuWBHQfoSjntJOCahLDVF5ehUlpRVVQN1CPg9BoAsret4e5Six3U2ln3Vy5TBvLsyeJboAmn4Ef53oYNLI9T7kFJZ9QGwTJqThgaLFelKUAHFHIktuMVfuc9mJcXNzNzma1Td67J5e3SXjOg124PE6nvyCXQZNImaEwn5pugbmuwPI04fTAzMmLXAjbp4hU5RZJpc0eOf6dlzsAOB2Ioqw/YQ86CRRwbULEAihwkZkc4v5ILAR8hrezIMV4njW8Z/8KWTD/DM57YiFKGi3SuT9byqtg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=6BMQLzh96Zx8smPPl/rUox3+iY+cxCT4cwG9pFYH1PM=;
 b=ZuM5IALBV84oIxjQMf6O7+HoPja3THh9zDocEm/tP8Vn9+xPWr15SzkNpgA85BKkqHbJw0HbfE6UdPfqz8NoWNIlkdOIbPfgEG0iJZgq1p/HDuUU67O2FoJ17E084ZVXQX2hPp7BMgwGk2H1rFQoQyf7SpWPNHguXIy2KuBA1UaGu6XnDyCV5BZQ3ZhrhU1aIxecTm6RnkDcRXt+WoEBOPANj9pLIPVTll9c/TSmnPk9o8sxD5xp2Cy1OWW9bx4s1mJOSo4vFZOW1N5y5wf+qjzJedrtQwBDrGwH4fRz7veRZhprlWWjGcthP+a357NOZMM137q0R0mydXPfg+tgYQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=santannapisa.it; dmarc=pass action=none
 header.from=santannapisa.it; dkim=pass header.d=santannapisa.it; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=santannapisa.it;
 s=selector1;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=6BMQLzh96Zx8smPPl/rUox3+iY+cxCT4cwG9pFYH1PM=;
 b=lLCGDk88v0W+KFvgcuR1FqmDGMjyX/eGKOkMWUjKKG3QNa/y1EVk2AqWc6cUHoJyoaTK3zusK1NEB4geXUZg2mCc6ozVxDpmFMOk6+hGwdjEVLhgeuZ5aMyz+SAvENTLibnA6mMVduui7sD/3bSMnWwmGMp5vA+2SQRV1fM0Rl4=
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=santannapisa.it;
Message-ID: <6028180c-ff1c-5d4f-2cf2-582e4104d888@santannapisa.it>
Date: Mon, 7 Mar 2022 15:43:52 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: Network driver domain broken
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>
Cc: Jason Andryuk <jandryuk@gmail.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 "wl@xen.org" <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
References: <DB7PR03MB50027EE92E11BFFF71AADC4598049@DB7PR03MB5002.eurprd03.prod.outlook.com>
 <92827eec-b6e9-9c95-8f9e-fcf063d45090@santannapisa.it>
 <YiDt7fX92n6Luc2l@Air-de-Roger>
 <CAKf6xpsnmQG7-LXn5+Uz4mncWsN0EZ8wpagY8f8OydvZNb6g5A@mail.gmail.com>
 <YiH9cee6NIKA6MWg@Air-de-Roger>
 <53a4fe6b-efc8-bfa1-8475-0aa58774051a@santannapisa.it>
 <YiIFyRUNXpUfzwRB@Air-de-Roger>
 <0ce52d38-f542-9336-a100-1cbfc559f218@santannapisa.it>
 <YiXq5HIrvZsy7QKU@Air-de-Roger>
 <b388ed5b-177e-2e9d-6450-6df16d9250c4@santannapisa.it>
 <YiXwhUnZL8bcJvH2@Air-de-Roger>
 <93fb9755-d40a-3cfe-1f6e-335b57d5a213@santannapisa.it>
 <e5c4c591-8ef4-f8d7-aa2a-b196a5a9749c@suse.com>
From: Andrea Stevanato <andrea.stevanato@santannapisa.it>
In-Reply-To: <e5c4c591-8ef4-f8d7-aa2a-b196a5a9749c@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: MR2P264CA0164.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:501:1::27) To AM6PR03MB5000.eurprd03.prod.outlook.com
 (2603:10a6:20b:88::11)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 25f3777e-373d-4989-cc1b-08da0048e6d2
X-MS-TrafficTypeDiagnostic: AM5PR03MB2898:EE_
X-Microsoft-Antispam-PRVS:
	<AM5PR03MB2898078EB9316F463C7EB0D498089@AM5PR03MB2898.eurprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	06TL8Rt4LM2N540gyObXzmYf0F2Axt+4ZrvWslYFfpUB7o7/Dlnt/rWnaov4smDs+u1du37V7x+ufsARUjtMbClw1eYBN+aTOlIZwKTuG04O82+lJWDQi/BwOlCxFf7SYlV8trQgNfi7w3O4isaflJ8MrFh6/81iWIctDZNqA8miDnpDqZOnXP29j9oSBBNAN7+laKuu7F1vKGCoW6jQcLvHFJ2xGzbhKFWo/cSRBcl517jqPS1y3oGO25Sq4FMT/M8/q19DS1LhWAurrilZwA51+/3le/AqLiF4IRVTmQq/Xe5aBWUy2lUZd5/PXfyacbA9Djc9Uv9VcgRX+g4U526lTDmr62rJonauDUKWlOvYGCRYM611kTd7XjoPjXl5I4hhycDvUxCtnCnK9/9KTNCqaNW31rY6z/BGceAeV5V0tNBycRWJHqQpXK0JL1PkfewN75sI29N++v9hD/kUYFxQtV72tRqhAGzimeqn1UyGD8Fpqikv1L6+MguQ7MYUlm+god7jJfSoFtgdbkU2arzTspbk3AE5dO5hZCObC0jtjdAuS6Zai8gDOTqAdtucW9Z7duPR0uPNgzoednWk5oYdthCtBGMMUFiv4dq75hrYpwzC2dtgnMFbGHsyjq4Bcdn4/3lPCqoY6XGjS5neAy3IR6j7upK+oHprDyLXdD6uROIodD0+T6/wQolyn4hfxg7SfidRTu3gM3kLalIxG+zpyHs/oXpI790m/14wBk+1hqiDi+mX4DBpuZMccs1uNvnImLPT3R8yLf85d+Wp5w==
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR03MB5000.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(31696002)(8936002)(38100700002)(508600001)(86362001)(3480700007)(6486002)(54906003)(83380400001)(6916009)(786003)(38350700002)(6512007)(186003)(26005)(31686004)(316002)(44832011)(36756003)(2616005)(66476007)(52116002)(53546011)(4326008)(8676002)(6506007)(66556008)(66946007)(5660300002)(2906002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?WnFvSnp1bnZHWGpUQVFsKzk2c3pzbVBVODNNNnh3dGJ0QUk4ZlVFNXErZFlX?=
 =?utf-8?B?ZTYrU2hWVGhiQ2txMnNLLzZ5ZFovbTlNWDh0ZGdEVHFscG1PY1ppbmczTnVY?=
 =?utf-8?B?NXdRanFxMjFpSno3UVJFcFY1MGxDSWdOUXQwSzkvazAvQlY4SHRiVFRCREZi?=
 =?utf-8?B?WFprYm54Q1M3YVdRa2s3STd6ZVBHam9zUUo3Ykp0MWg3M05nVFRSQWNsbFZQ?=
 =?utf-8?B?OGtJc1FxZUNOYXUycEIrLzkvd1ZRa0VMc1BDZEw1bCs3Q2lWcjJRazROM3ky?=
 =?utf-8?B?cjlEa0llZS9NdzhYc1VWL0dDNHpQb0pxN2Q4d2RaWWtvZWczblBybDY3NmtD?=
 =?utf-8?B?VjhpT0RjdUlzKzluR1czUGpDbS9TK3pmd0lsYjllcHhFTkJqWEhGQUhLejFs?=
 =?utf-8?B?Rm1aQXNoYXBjWlBicXp5ZElabEkxWjA5eDBMd2tSc3VTc3dOUTNYY1dJWCt3?=
 =?utf-8?B?UkFON1NkRmRHRitLUzFKNGdTcDRpRXhMS2pnSjhpcXRUQzNqeG1KVHRHRXRx?=
 =?utf-8?B?YVVxS1N1SkU1S3o5V3BLY2trZVhSeWFJM0xINnlkT0owSzJpT3hXMDBPSUdP?=
 =?utf-8?B?TzBsY2pBVEhtTFBwY1dkM2hKSFBkL3ptcVVFQ3lRZXJhZlBFbHU3V3huQllI?=
 =?utf-8?B?a2Jpa3pJYlY1STlhNnRQbE5SOGZNYjJ2Z2d3WmZUKysxS1Z5L0dnWGNkVk1L?=
 =?utf-8?B?Wk9WRHNUQVBiNWpKMUdNMVlIYlpoTEpIVy9ZRHY0T1FhUjIvMnFYalJpSHhU?=
 =?utf-8?B?cWlwNjE0SnBzL001MitMaDZ0MHZKQnNTVjAwTStaRjd1Z3pPd1k2TCswdFY3?=
 =?utf-8?B?cmpiVGVaSlpnZG9YdU1DcHJBSDBQeTFnSnQ0TnhEQm5NR1lia2Z1amEwQmp4?=
 =?utf-8?B?VGFEMkJnc24ydjVQTWwwam9VRjMyY3hUMDRrbE1TN2FXN092YWZXakppTXdO?=
 =?utf-8?B?UXVsLy9kTFBmRkNKMHZqYkpMbFR1R3dZV2YzMXB5WnlsT3I1eHdRUmQ2WW8z?=
 =?utf-8?B?QzArWTN4cUc4VUozTUd1RVYwSnZhY1Z4M1lRNFNxVXY0bXJVMDBMOUJSWlBu?=
 =?utf-8?B?Wk5HK2x1bTMyRTc3VlJqanVuMFZ3MTdTSzd1V3RIQ01Cc2xNWkw2L1U0clNt?=
 =?utf-8?B?ZmRobTJIOHpxZ2VKWVFtK09ONU5UL1l0WHVNbGloaG1XaHhWcktGOFNleldM?=
 =?utf-8?B?azFQeVdWWExBbFJHVnBLRmcvUW1HTUVwN0pUMVFpM3F4VlRMa1l6RFE5S3NO?=
 =?utf-8?B?Rk5jWmVzeWM1aEJLUG1ORytFT1lFeEpjb1BmaFVQTm95cElJcTZFMENMbHZo?=
 =?utf-8?B?UmN2VW9ZS3lHRG1iVTJsaU5vcXRrZ1ZwMTZPQ1FFeXk2WXlxbVlFMHN2TkVx?=
 =?utf-8?B?M3ZyUUlIdGZVVXR6WDJqazRYWG5HVTkvY3RhQUxZdmRMU2k5ei90cE5pQzVy?=
 =?utf-8?B?eVc0RzZlOVpMbFlWNnpTTGdNVTltcFdQYnNUV2R6MkhWcUN2K1dIeVdHSUZB?=
 =?utf-8?B?MVo2R3ZaRGdjYTZnMmVxaW9ncUpBM0NTbHd4T3JzY3ptZWRpWlp2OTZTZ20z?=
 =?utf-8?B?VlJWK0IxeElkK0pnNTdXQnMrbWNKWXBnSmZsYjRFa0RCUjJwVXZHc3duK29J?=
 =?utf-8?B?SWVzMGluejRGSG9TMnlUaTVQazBqUG1VL1Vha2swVVlUNFp3U1RNUEM3ZHN2?=
 =?utf-8?B?NXdILzdnTG1XVGNsL2pJTlZLTjhCMWk0djdrU0ExNm9TWGFJTk9xbUxKSVNX?=
 =?utf-8?B?YzZ2bnE4OVJVaVJJSGFiZkE4K2xQOEdZVk1hN1FmRGt0NmZPTXJJOU5RdTkz?=
 =?utf-8?B?ZExOZGVERFVTNlFIU0U1VnlJczFESGUyZTVFUDlUMHBIK3docEtpSnNVNi92?=
 =?utf-8?B?NHhSSjl5bjZNcTdMUWlTQ1NjMnVJWnN3MS9Nekx3L3lTTlRDN3pQalgrRXJG?=
 =?utf-8?B?R3hXYXhuSFk2blFpdUVmV0tzQThEeDNteGtzT0t0eG11WlRZUmZqZDJtYklI?=
 =?utf-8?B?aEtNY2oxVk5JZTFma3pwTlVaQ0hPN1FLenFyNDBlNlNzZjZINFVjZi9HbDl3?=
 =?utf-8?B?dVF3alBOSFVRazMvQkhoWWYyNmN6cVdIT0JEak0yRGM5SXdyOFp3VVlFa2dF?=
 =?utf-8?B?dVZlMmRlQ1JSUVJEOWJBSy9JYWZCdGJLOVNzVFB6U1pRK3VnMFBpS09nYWI1?=
 =?utf-8?B?T3RISzBIWHQvMzhNWVhaRWRqenAxQ3liKzhxY01IeDJ4cnFxM2xPMzJKTmFk?=
 =?utf-8?B?OUxuaWFSbkhFekljcjltN2huT0JDaGxsSjJuVVRHRFBNYjZTTll6Y2xhUkhm?=
 =?utf-8?B?RmNNUDRpWnBlL2dwS25JUmZnRHNkODhUSEsvSWQ1QW9TZXY5b0l1Zz09?=
X-OriginatorOrg: santannapisa.it
X-MS-Exchange-CrossTenant-Network-Message-Id: 25f3777e-373d-4989-cc1b-08da0048e6d2
X-MS-Exchange-CrossTenant-AuthSource: AM6PR03MB5000.eurprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 14:43:53.7972
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: d97360e3-138d-4b5f-956f-a646c364a01e
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: +acSZdNHqH+37Wq86zvc0n/8zOkhL3ObnR/DYJXSqS4UCN0gksOBZzdbzESjj8aK1US8AlHorlcine7JfZEcYAu6RJmH3UZUYQvgKUtuwYcD+Gsb5hNRn9en1dwizvid
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR03MB2898

On 3/7/2022 3:36 PM, Jan Beulich wrote:
> On 07.03.2022 15:20, Andrea Stevanato wrote:
>> On 3/7/2022 12:46 PM, Roger Pau Monné wrote:
>>> On Mon, Mar 07, 2022 at 12:39:22PM +0100, Andrea Stevanato wrote:
>>>> /local/domain/2 = ""   (n0,r2)
>>>> /local/domain/2/vm = "/vm/f6dca20a-54bb-43af-9a62-67c55cb75708"   (n0,r2)
>>>> /local/domain/2/name = "guest1"   (n0,r2)
>>>> /local/domain/2/cpu = ""   (n0,r2)
>>>> /local/domain/2/cpu/0 = ""   (n0,r2)
>>>> /local/domain/2/cpu/0/availability = "online"   (n0,r2)
>>>> /local/domain/2/cpu/1 = ""   (n0,r2)
>>>> /local/domain/2/cpu/1/availability = "online"   (n0,r2)
>>>> /local/domain/2/memory = ""   (n0,r2)
>>>> /local/domain/2/memory/static-max = "1048576"   (n0,r2)
>>>> /local/domain/2/memory/target = "1048577"   (n0,r2)
>>>> /local/domain/2/memory/videoram = "-1"   (n0,r2)
>>>> /local/domain/2/device = ""   (n0,r2)
>>>> /local/domain/2/device/suspend = ""   (n0,r2)
>>>> /local/domain/2/device/suspend/event-channel = ""   (n2)
>>>> /local/domain/2/device/vif = ""   (n0,r2)
>>>> /local/domain/2/device/vif/0 = ""   (n2,r1)
>>>> /local/domain/2/device/vif/0/backend = "/local/domain/1/backend/vif/2/0"
>>>> (n2,r1)
>>>> /local/domain/2/device/vif/0/backend-id = "1"   (n2,r1)
>>>> /local/domain/2/device/vif/0/state = "6"   (n2,r1)
>>>> /local/domain/2/device/vif/0/handle = "0"   (n2,r1)
>>>> /local/domain/2/device/vif/0/mac = "00:16:3e:07:df:91"   (n2,r1)
>>>> /local/domain/2/device/vif/0/xdp-headroom = "0"   (n2,r1)
>>>> /local/domain/2/control = ""   (n0,r2)
>>>> /local/domain/2/control/shutdown = ""   (n2)
>>>> /local/domain/2/control/feature-poweroff = "1"   (n2)
>>>> /local/domain/2/control/feature-reboot = "1"   (n2)
>>>> /local/domain/2/control/feature-suspend = ""   (n2)
>>>> /local/domain/2/control/sysrq = ""   (n2)
>>>> /local/domain/2/control/platform-feature-multiprocessor-suspend = "1"
>>>> (n0,r2)
>>>> /local/domain/2/control/platform-feature-xs_reset_watches = "1"   (n0,r2)
>>>> /local/domain/2/data = ""   (n2)
>>>> /local/domain/2/drivers = ""   (n2)
>>>> /local/domain/2/feature = ""   (n2)
>>>> /local/domain/2/attr = ""   (n2)
>>>> /local/domain/2/error = ""   (n2)
>>>> /local/domain/2/error/device = ""   (n2)
>>>> /local/domain/2/error/device/vif = ""   (n2)
>>>> /local/domain/2/error/device/vif/0 = ""   (n2)
>>>> /local/domain/2/error/device/vif/0/error = "1 allocating event channel"
>>>> (n2)
>>>
>>> That's the real error. Your guest netfront fails to allocate the event
>>> channel. Do you get any messages in the guest dmesg after trying to
>>> attach the network interface?
>>
>> Just these two lines:
>>
>> [  389.453390] vif vif-0: 1 allocating event channel
>> [  389.804135] vif vif-0: 1 allocating event channel
> 
> Well, these are the error messages, from xenbus_alloc_evtchn().
> What's a little odd is that the error code is positive, but that's
> how -EPERM is logged. Is there perhaps a strange or broken XSM
> policy in use? I ask because evtchn_alloc_unbound() itself
> wouldn't return -EPERM afaics.

As you can see I'm pretty new to Xen. Furthermore, it is the first
time that I heard about XSM, so since I did not change anything I
do not know what to answer! The only thing that I can tell is that
for both dom0 and guests I'm using the same exact kernel and rootfs.
 
> Jan

Cheers,
Andrea


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 14:51:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 14:51:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286138.485515 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREhs-0007lk-3p; Mon, 07 Mar 2022 14:51:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286138.485515; Mon, 07 Mar 2022 14:51:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREhr-0007ld-Vn; Mon, 07 Mar 2022 14:51:27 +0000
Received: by outflank-mailman (input) for mailman id 286138;
 Mon, 07 Mar 2022 14:51:27 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=9NfF=TS=citrix.com=prvs=058fb9784=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nREhq-0007lX-MW
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 14:51:27 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 0d588857-9e26-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 15:51:24 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0d588857-9e26-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646664684;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=Nf2d3LiP0+gNXgZuWDmuum3+UIEDe9INXg63qoVt2Io=;
  b=XDQO0b/XZA1P0AqyWV/GgZof1gTVaEu6bxhBfQLbriPcbrTNA/3Cqa8E
   RnJ23Gm8KljZlcuBrqYC8SRJAzL+03PoTv2SUwYzqrvvJmqVxWZ0dXuNW
   +OVw3gUQ/Llpu0OzVrRpLMsIEw982R1ImPChhqhaeNIJxTcaDc4eET1nP
   4=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65551223
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:6OftlawNMTFE+IErW8x6t+fxxirEfRIJ4+MujC+fZmUNrF6WrkUHy
 GJKWmuAMvjcY2OhfIt1bo+wpEkD65fTyYRgSwc9/yAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2YfhWWthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 Nplqq2Zdxw5OaL3od8xVTxnAx1dYqZk5+qSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DFYUToHx/ixreCu4rW8vrSKTW/95Imjw3g6iiGN6AO
 pdEMGA1N3wsZTVEIQszVJc9vNyhnz7TVwIE+EOepa8etj27IAtZj+G2bYu9lsaxbdVYmAOUq
 3zL+0z9AwoGL5qPxDyd6HWui+TT2yThV+o6C7mQ5vNsxlqJyQQ7ChQQWUGqvPqRhUu3WtYZI
 EsRkgInq6Qo+UXtVcXwQRS+qWKDlgUVXcZZFesz8ACWw+zV/26xBGIJUzpAY9wOr9ItSHoh0
 Vrhoj/yLWUx6vvPEyvbr+rK62PpUcQIEYMcTTA1ZDUe897sm7gIohTqccZfM/G+rMKgTFkc3
 Au2hCQ5grwSi+sC2KO64U3LjlqQm3TZcuImzl6JBzz4t2uVcKbgPtX1sgaDsZ6sOa7EFgHpg
 ZQSpySJAAni57mpnTfFfugCFarBCx2tYGyF2g4H83XMGl2QF5+fkWJ4vWsWyKRBaJ9sldrVj
 Kj741852XOrFCH2BZKbmqroYyjQ8YDuFM7+StffZcdUb556eWevpX8yOxPBgTiyyxh8zcnT3
 Kt3lu72UR4n5VlPlmLqF4/xL5dxrszB+Y8jbc+ilEn2uVZvTHWUVa0EIDOzghMRt8u5TPHu2
 48HbaOikkwHOMWnO3W/2dNDfDgicClgbbir+pM/SwJ2Clc/cI3XI6SKmu1Jlk0Mt/k9q9okC
 VnmAh4IkAek3CafQehIA1g6AI7SsV9EhStTFQQnPEqy2mhlZoCq7awFcIAwc6Vh/+tmpcOYh
 dFcJ61s3twnpuz7xgkg
IronPort-HdrOrdr: A9a23:McrPuqoVh5JTM9yDP7QBqycaV5uLL9V00zEX/kB9WHVpm5Oj+f
 xGzc516farslossSkb6Ky90KnpewK5yXbsibNhc4tKLzOWx1dAS7sSrLcKogeQVBEWk9Q96U
 4OSdkHNDSdNykZsS++2njELz9C+qjGzEnLv5ak854Fd2gDAMsMj3YbNu/YKDwNeOAvP+tiKH
 P23Lshm9PUQwVvUi3NPAhiYwGsnayvqLvWJTo9QzI34giHij2lrJTgFQKD4xsYWzRThZ8/7G
 nsiWXCl+aemsD+7iWZ+37Y7pxQltek4MBEHtawhs8cLSipohq0Zb5mR6aJsFkO0aOSARcR4Z
 zxSiUbToNOAkDqDyeISNzWqlDdOQMVmjvfIJmj8CPeSILCNWkH4oF69Pxkm1PimjsdVZdHof
 92Niuixulq5VmrplWM2/HYEx5tjUa6unwkjKoaiGFeS5IXbPtLoZUY5149KuZLIMvW0vFuLA
 BVNrCW2B+WSyLsU1nJ+m10hNC8VHU6GRmLBkAEp8yOyjBT2HR01VERysATlmoJsMtVcegJ28
 3UdqBz0L1eRM4faqxwQO8HXMusE2TIBRbBKnibL1jrHLwOf3jNt5n06rMo4/zCQu1E8LIi3J
 DaFF9Iv287fEzjTcWIwZ1Q6xjIBH6wWDz8o/surqSReoeMMoYDHRfzPWzGyfHQ0cn3KverL8
 qOBA==
X-IronPort-AV: E=Sophos;i="5.90,162,1643691600"; 
   d="scan'208";a="65551223"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=oF76Y/XTfvpttzSUPM4fZ7BNSAocq380VluZPoLuDWGUS0TTW/bjhKJJn7OTwviKH2m+cFesRS1rs8L8WkzBmmKsl6Yh6PrpEHWqKubWQ5plf+Ng43D2lYMdRneQ1vM7IGmiS83H4KFtMFJVTILL/+6ILT6d4bjVJzf29uS0rFHK/b0OuLjZ77o4jdu1f8XHHQeCNUiXdd0tiMmUVdLiT1E3kDxDChSnhbDBaLGloCc4qL+7w4ueqNwYwdchRWk6k8Jp74FPxVHzk66sKn5axVg9xvQMtP8QGAzMoAlABJ051ZCjxamULshzuGGtAiKXtPjfz6Wm67SzSeEGoa9RUA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Nf2d3LiP0+gNXgZuWDmuum3+UIEDe9INXg63qoVt2Io=;
 b=MMkm0COMlkQWdxZFDx9nYtWf9poaeIFhbELJAH7tZLwgPQb1Y17PYF31228wQD/iom+4/fqxVoNI4OKUtxc98GQvvo2NfxVc0qzSi8sBANZgXMvLl/r8K61FfoIwwsvxrtvlphwk/xK9yYojt9snSccnniXiW+RedKxId8hsMw3kKTqg1pIJGOb5wHqHMjQnqUe4X0yq/zbwa2Z8YrFymSU9jVlFUMUZuK9R2KtiTj8TPlfhm6+UPalrkzheO5lmXEG53TyJAZH9DbLCekFBFfEdaSa5/x8tdrirMp8oKFO4Hn1mQJ43CdavPZdKiZ/aXfeOWF4GB5TnegB/H93uZw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Nf2d3LiP0+gNXgZuWDmuum3+UIEDe9INXg63qoVt2Io=;
 b=HAxbu7YydvaGWnnuGaAQR9dV7St9k0esesViDjHIDGHWXlEsijHHCptYLrhGM/xJ2vlx468OizGDYHZl/2v9q2J8rWD4hn3k4HIrZjb0/8/jynaM1L8rC8uxnocwe4qZMnYpf5Se4hP4/3kdlMuFcCAuwZHJrDjUoVT2cimBSvk=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Andrea Stevanato <andrea.stevanato@santannapisa.it>, Jan Beulich
	<jbeulich@suse.com>
CC: Jason Andryuk <jandryuk@gmail.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>, "wl@xen.org" <wl@xen.org>, Anthony Perard
	<anthony.perard@citrix.com>, Roger Pau Monne <roger.pau@citrix.com>
Subject: Re: Network driver domain broken
Thread-Topic: Network driver domain broken
Thread-Index: AQHYLw1qzygpamMN3EyejpXz6IEhzKyt0cGAgAAJD4CAABp2gIABKTaAgAADz4CAAAYkgIAAFf+AgASOpQCAAATMAIAAAeqAgAArEgCAAASXAIAAAfkAgAAB+YA=
Date: Mon, 7 Mar 2022 14:50:55 +0000
Message-ID: <04e4ecfb-0235-db0d-d5fd-3274879003fa@citrix.com>
References: <DB7PR03MB50027EE92E11BFFF71AADC4598049@DB7PR03MB5002.eurprd03.prod.outlook.com>
 <92827eec-b6e9-9c95-8f9e-fcf063d45090@santannapisa.it>
 <YiDt7fX92n6Luc2l@Air-de-Roger>
 <CAKf6xpsnmQG7-LXn5+Uz4mncWsN0EZ8wpagY8f8OydvZNb6g5A@mail.gmail.com>
 <YiH9cee6NIKA6MWg@Air-de-Roger>
 <53a4fe6b-efc8-bfa1-8475-0aa58774051a@santannapisa.it>
 <YiIFyRUNXpUfzwRB@Air-de-Roger>
 <0ce52d38-f542-9336-a100-1cbfc559f218@santannapisa.it>
 <YiXq5HIrvZsy7QKU@Air-de-Roger>
 <b388ed5b-177e-2e9d-6450-6df16d9250c4@santannapisa.it>
 <YiXwhUnZL8bcJvH2@Air-de-Roger>
 <93fb9755-d40a-3cfe-1f6e-335b57d5a213@santannapisa.it>
 <e5c4c591-8ef4-f8d7-aa2a-b196a5a9749c@suse.com>
 <6028180c-ff1c-5d4f-2cf2-582e4104d888@santannapisa.it>
In-Reply-To: <6028180c-ff1c-5d4f-2cf2-582e4104d888@santannapisa.it>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: fb4ce27f-d7b3-4b2c-a6f1-08da0049e2a5
x-ms-traffictypediagnostic: BN6PR03MB2804:EE_
x-microsoft-antispam-prvs: <BN6PR03MB280495F8AD1F269FE838EAB8BA089@BN6PR03MB2804.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(107886003)(6506007)(3480700007)(71200400001)(76116006)(6512007)(6486002)(508600001)(53546011)(186003)(26005)(31686004)(36756003)(83380400001)(91956017)(54906003)(66946007)(38100700002)(8676002)(66476007)(4326008)(64756008)(66556008)(66446008)(316002)(82960400001)(122000001)(8936002)(2616005)(2906002)(5660300002)(38070700005)(31696002)(86362001)(110136005)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?TmtZMXRNMmN2bHFFOXdlQ05xMVFJRll3Sys5MVBUZFFYeExwTUxuM0JGd1Zy?=
 =?utf-8?B?YmZQVjV0b2tqTGJ5OFZqMzZiRGFhK0NBdnFlaW9DQXRQejhDcmZieGhneFdq?=
 =?utf-8?B?RjJ3bjNSNFVZUjY4M25FRU9pemlBT2h5VU1NS2JSa0xZdnd6cVU0am94ZGgx?=
 =?utf-8?B?cGVmK2xLL0E4RE42QjRVUkcwM2dZR0s2eUt1bFA4SGRhZmNrVFZkaEtOUlg5?=
 =?utf-8?B?MkdPbVcwZkVZZEtCSXhwTUtPYlcwaDNxTjBRTmc3WEZCRmV6OUNPc1dlSHdz?=
 =?utf-8?B?UGF4WnFuanl3VjNiRUMrQ3RJS1BtLzh5d1BiSU1vSXR4NG9RcHYwVFFsTkNN?=
 =?utf-8?B?eURTWlhsM0ZvUGNTSSsvK1NjcWlTbVRmSm5FRmhSZFl3ZUFiWENCN1hJS3B6?=
 =?utf-8?B?ZmVycnVXTFh4aG55V1VNN05LcVFZb05RdUd4Uks4Yk9FQ1Y4RWQxRnA1SzFi?=
 =?utf-8?B?L2pLMUxqRXZmVXY5WlArdWV6OWtUb2FGN25XZkRSalJmbmRZem8xV1VFKzBP?=
 =?utf-8?B?aU94VGxFdDBRYzV6VlhLVGVXMjlkNWIyclZjM1o3d1pBR0d5MmIwTzVtU1JI?=
 =?utf-8?B?RldlYUJucGNYaHo0aHRvdm9mVXZZSUc4Q3prcU5aSEtHWVFvYmxaNk84OEVD?=
 =?utf-8?B?elprTVRFbEthR2xaSitPRW9nUDVtQ2xpVHVsZDFLdFRLdldQZjY4VGNrTTNw?=
 =?utf-8?B?T08ySE8vVjA1dnY2ekVwVEU0UDR5N09SeFhFQlpuNjk1a1NldWFoNWNQRm9v?=
 =?utf-8?B?VTdRNCt6ZHdjNkt5TndKZFRLbTN4Q25HbFhrK3NsbmRFcnFaVE9lU2pxTUly?=
 =?utf-8?B?cEtMcnozNnUvTFFVSjlzSlJIVXI1bmY3VmVyZDdhVGQrNDdGSGx5VlNReHVF?=
 =?utf-8?B?L2ZTNUl6ZnN4MitvSllhSVJTZ3dteU5YM0lHWmFxNEU1d3cwNkRoQWZUUjV5?=
 =?utf-8?B?TUZCSDVvR2xsUkJDT1lIdll1SVBFV2FJVzJwQmJTK1BXak5pbVRxN3FwbmVy?=
 =?utf-8?B?T21NeWh1TUkzVEVIV2t2dmZtZXcwREFYRkM3ajZoaU45OUR1eW9uMlVBNDNB?=
 =?utf-8?B?bWNZc3YyRngwUS9WYnhNcTlaZFpqamVYbTJOeG83d3puUC9QbGc1K2lJSm85?=
 =?utf-8?B?RGZSTDdxV1BqTHZXVHROYjVCQUFuZjlUNmRZRjFiRE9VNGdnVXg2b2N2VEZ5?=
 =?utf-8?B?a0ZTZUd3QTBlcTZRWXlGZUNITjNzOVNhcXN5dllDOVFBaS82SDQyUDhMd3NB?=
 =?utf-8?B?R1RzVUhKZENiUkppVnUxSkxMQW5lWSs5OGFIUmNJVGV4YmFGbWJ5TkNuZ1RD?=
 =?utf-8?B?Uy9qenZtYTZQQTVKQkREZ3V1Qk16ZnNsMCtmOE84d2xUOTZBWjZheC9KOVh0?=
 =?utf-8?B?ZklOajNvTXVKZXQwYjZvcmprQWgxVUdUdGtDRnZ5bm5DYnU4TSt6UGErbXB4?=
 =?utf-8?B?ODZyT1BIdHVON1liSVZnMUlaMUh1ZEVnd0NOWURaVWVMRmNRSFR5ajNMWERt?=
 =?utf-8?B?aUM4NmpuOW4zSGp2RnJsTHZBN3NZMXVLQ01PNU9vV1BJRVVrMDVsRWxmcXgy?=
 =?utf-8?B?UWd4YXE3RzVraXZXSFBZK3RBcFNsK216MXhzUzJmbUt2aFZmdkZVWEVEUU5X?=
 =?utf-8?B?YXloQXVPdXRRakU1UDNTUUpUbE1Yd1NiWHlObVg0bFhLN2VpWTNzQ0Z6WGJT?=
 =?utf-8?B?S3FqNFkzOEszSE0rODdFSFRoK0xvN21SVnRJclFjMG45SDVOYkFxQzlTelAz?=
 =?utf-8?B?Qzd2YmIvai9xaE5SVE5TS1BjWm5sMmUvbVErZ1NLL0I2dXFnNkRtNklWN2J0?=
 =?utf-8?B?NmdESmNtd3E3cldGdHVjMDFrTkxQV1NGTnZQdkUzcU00c0ZoRGZROFhqWDVG?=
 =?utf-8?B?UVhjV283VURMd2JMNDJCQU9aWWJNdFFkdmZNdUpIRHUrNXN4MkhqWkNuNmxZ?=
 =?utf-8?B?UGRvSzhvakVQRzdqS2QwMnZPZFdxNGRRZXFEajJlcHdqOVhWL3VUWnVlRUhT?=
 =?utf-8?B?VXRiVURNVytxSzNoM21heHZ3NFlnanBONHlxYXI0cTlKY2xPRTFnd2hTMUp3?=
 =?utf-8?B?TUQvRkdjUzdHQzV2QU1EVWxhc0s3Zk9JOTBZY095QkJMSlpXSTc2WEFsaTlx?=
 =?utf-8?B?Y2U4Ym02R080cXJ5M1JxR1crenRzWXZmR09YVi8zNDMyYXdoVFk4UVJZQ1pY?=
 =?utf-8?B?eDNHR1pIT2JvYkFnSGJ0ZWdFM3UyUzk2SS9VTkVuSEtpRTFQWDl3dlJVcVp0?=
 =?utf-8?B?Mmh6UWJNY2Q4eURQRmFqNDM2TVhRPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <5E4251EB0C088C41983A6BA1AE28D594@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: fb4ce27f-d7b3-4b2c-a6f1-08da0049e2a5
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Mar 2022 14:50:56.0059
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: IbucAYVzTl0PSU2yosWZu04Q93JYoas7q5X6IRYpqBwTYeUiQKY4IjjtO6tHFP9Qyv7SvIZ88y9axaBNf8LsCAjLuvQojCatHxQcXgpIG18=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR03MB2804
X-OriginatorOrg: citrix.com

T24gMDcvMDMvMjAyMiAxNDo0MywgQW5kcmVhIFN0ZXZhbmF0byB3cm90ZToNCj4gT24gMy83LzIw
MjIgMzozNiBQTSwgSmFuIEJldWxpY2ggd3JvdGU6DQo+PiBPbiAwNy4wMy4yMDIyIDE1OjIwLCBB
bmRyZWEgU3RldmFuYXRvIHdyb3RlOg0KPj4+IE9uIDMvNy8yMDIyIDEyOjQ2IFBNLCBSb2dlciBQ
YXUgTW9ubsOpIHdyb3RlOg0KPj4+PiBPbiBNb24sIE1hciAwNywgMjAyMiBhdCAxMjozOToyMlBN
ICswMTAwLCBBbmRyZWEgU3RldmFuYXRvIHdyb3RlOg0KPj4+Pj4gL2xvY2FsL2RvbWFpbi8yID0g
IiIgICAobjAscjIpDQo+Pj4+PiAvbG9jYWwvZG9tYWluLzIvdm0gPSAiL3ZtL2Y2ZGNhMjBhLTU0
YmItNDNhZi05YTYyLTY3YzU1Y2I3NTcwOCIgICAobjAscjIpDQo+Pj4+PiAvbG9jYWwvZG9tYWlu
LzIvbmFtZSA9ICJndWVzdDEiICAgKG4wLHIyKQ0KPj4+Pj4gL2xvY2FsL2RvbWFpbi8yL2NwdSA9
ICIiICAgKG4wLHIyKQ0KPj4+Pj4gL2xvY2FsL2RvbWFpbi8yL2NwdS8wID0gIiIgICAobjAscjIp
DQo+Pj4+PiAvbG9jYWwvZG9tYWluLzIvY3B1LzAvYXZhaWxhYmlsaXR5ID0gIm9ubGluZSIgICAo
bjAscjIpDQo+Pj4+PiAvbG9jYWwvZG9tYWluLzIvY3B1LzEgPSAiIiAgIChuMCxyMikNCj4+Pj4+
IC9sb2NhbC9kb21haW4vMi9jcHUvMS9hdmFpbGFiaWxpdHkgPSAib25saW5lIiAgIChuMCxyMikN
Cj4+Pj4+IC9sb2NhbC9kb21haW4vMi9tZW1vcnkgPSAiIiAgIChuMCxyMikNCj4+Pj4+IC9sb2Nh
bC9kb21haW4vMi9tZW1vcnkvc3RhdGljLW1heCA9ICIxMDQ4NTc2IiAgIChuMCxyMikNCj4+Pj4+
IC9sb2NhbC9kb21haW4vMi9tZW1vcnkvdGFyZ2V0ID0gIjEwNDg1NzciICAgKG4wLHIyKQ0KPj4+
Pj4gL2xvY2FsL2RvbWFpbi8yL21lbW9yeS92aWRlb3JhbSA9ICItMSIgICAobjAscjIpDQo+Pj4+
PiAvbG9jYWwvZG9tYWluLzIvZGV2aWNlID0gIiIgICAobjAscjIpDQo+Pj4+PiAvbG9jYWwvZG9t
YWluLzIvZGV2aWNlL3N1c3BlbmQgPSAiIiAgIChuMCxyMikNCj4+Pj4+IC9sb2NhbC9kb21haW4v
Mi9kZXZpY2Uvc3VzcGVuZC9ldmVudC1jaGFubmVsID0gIiIgICAobjIpDQo+Pj4+PiAvbG9jYWwv
ZG9tYWluLzIvZGV2aWNlL3ZpZiA9ICIiICAgKG4wLHIyKQ0KPj4+Pj4gL2xvY2FsL2RvbWFpbi8y
L2RldmljZS92aWYvMCA9ICIiICAgKG4yLHIxKQ0KPj4+Pj4gL2xvY2FsL2RvbWFpbi8yL2Rldmlj
ZS92aWYvMC9iYWNrZW5kID0gIi9sb2NhbC9kb21haW4vMS9iYWNrZW5kL3ZpZi8yLzAiDQo+Pj4+
PiAobjIscjEpDQo+Pj4+PiAvbG9jYWwvZG9tYWluLzIvZGV2aWNlL3ZpZi8wL2JhY2tlbmQtaWQg
PSAiMSIgICAobjIscjEpDQo+Pj4+PiAvbG9jYWwvZG9tYWluLzIvZGV2aWNlL3ZpZi8wL3N0YXRl
ID0gIjYiICAgKG4yLHIxKQ0KPj4+Pj4gL2xvY2FsL2RvbWFpbi8yL2RldmljZS92aWYvMC9oYW5k
bGUgPSAiMCIgICAobjIscjEpDQo+Pj4+PiAvbG9jYWwvZG9tYWluLzIvZGV2aWNlL3ZpZi8wL21h
YyA9ICIwMDoxNjozZTowNzpkZjo5MSIgICAobjIscjEpDQo+Pj4+PiAvbG9jYWwvZG9tYWluLzIv
ZGV2aWNlL3ZpZi8wL3hkcC1oZWFkcm9vbSA9ICIwIiAgIChuMixyMSkNCj4+Pj4+IC9sb2NhbC9k
b21haW4vMi9jb250cm9sID0gIiIgICAobjAscjIpDQo+Pj4+PiAvbG9jYWwvZG9tYWluLzIvY29u
dHJvbC9zaHV0ZG93biA9ICIiICAgKG4yKQ0KPj4+Pj4gL2xvY2FsL2RvbWFpbi8yL2NvbnRyb2wv
ZmVhdHVyZS1wb3dlcm9mZiA9ICIxIiAgIChuMikNCj4+Pj4+IC9sb2NhbC9kb21haW4vMi9jb250
cm9sL2ZlYXR1cmUtcmVib290ID0gIjEiICAgKG4yKQ0KPj4+Pj4gL2xvY2FsL2RvbWFpbi8yL2Nv
bnRyb2wvZmVhdHVyZS1zdXNwZW5kID0gIiIgICAobjIpDQo+Pj4+PiAvbG9jYWwvZG9tYWluLzIv
Y29udHJvbC9zeXNycSA9ICIiICAgKG4yKQ0KPj4+Pj4gL2xvY2FsL2RvbWFpbi8yL2NvbnRyb2wv
cGxhdGZvcm0tZmVhdHVyZS1tdWx0aXByb2Nlc3Nvci1zdXNwZW5kID0gIjEiDQo+Pj4+PiAobjAs
cjIpDQo+Pj4+PiAvbG9jYWwvZG9tYWluLzIvY29udHJvbC9wbGF0Zm9ybS1mZWF0dXJlLXhzX3Jl
c2V0X3dhdGNoZXMgPSAiMSIgICAobjAscjIpDQo+Pj4+PiAvbG9jYWwvZG9tYWluLzIvZGF0YSA9
ICIiICAgKG4yKQ0KPj4+Pj4gL2xvY2FsL2RvbWFpbi8yL2RyaXZlcnMgPSAiIiAgIChuMikNCj4+
Pj4+IC9sb2NhbC9kb21haW4vMi9mZWF0dXJlID0gIiIgICAobjIpDQo+Pj4+PiAvbG9jYWwvZG9t
YWluLzIvYXR0ciA9ICIiICAgKG4yKQ0KPj4+Pj4gL2xvY2FsL2RvbWFpbi8yL2Vycm9yID0gIiIg
ICAobjIpDQo+Pj4+PiAvbG9jYWwvZG9tYWluLzIvZXJyb3IvZGV2aWNlID0gIiIgICAobjIpDQo+
Pj4+PiAvbG9jYWwvZG9tYWluLzIvZXJyb3IvZGV2aWNlL3ZpZiA9ICIiICAgKG4yKQ0KPj4+Pj4g
L2xvY2FsL2RvbWFpbi8yL2Vycm9yL2RldmljZS92aWYvMCA9ICIiICAgKG4yKQ0KPj4+Pj4gL2xv
Y2FsL2RvbWFpbi8yL2Vycm9yL2RldmljZS92aWYvMC9lcnJvciA9ICIxIGFsbG9jYXRpbmcgZXZl
bnQgY2hhbm5lbCINCj4+Pj4+IChuMikNCj4+Pj4gVGhhdCdzIHRoZSByZWFsIGVycm9yLiBZb3Vy
IGd1ZXN0IG5ldGZyb250IGZhaWxzIHRvIGFsbG9jYXRlIHRoZSBldmVudA0KPj4+PiBjaGFubmVs
LiBEbyB5b3UgZ2V0IGFueSBtZXNzYWdlcyBpbiB0aGUgZ3Vlc3QgZG1lc2cgYWZ0ZXIgdHJ5aW5n
IHRvDQo+Pj4+IGF0dGFjaCB0aGUgbmV0d29yayBpbnRlcmZhY2U/DQo+Pj4gSnVzdCB0aGVzZSB0
d28gbGluZXM6DQo+Pj4NCj4+PiBbICAzODkuNDUzMzkwXSB2aWYgdmlmLTA6IDEgYWxsb2NhdGlu
ZyBldmVudCBjaGFubmVsDQo+Pj4gWyAgMzg5LjgwNDEzNV0gdmlmIHZpZi0wOiAxIGFsbG9jYXRp
bmcgZXZlbnQgY2hhbm5lbA0KPj4gV2VsbCwgdGhlc2UgYXJlIHRoZSBlcnJvciBtZXNzYWdlcywg
ZnJvbSB4ZW5idXNfYWxsb2NfZXZ0Y2huKCkuDQo+PiBXaGF0J3MgYSBsaXR0bGUgb2RkIGlzIHRo
YXQgdGhlIGVycm9yIGNvZGUgaXMgcG9zaXRpdmUsIGJ1dCB0aGF0J3MNCj4+IGhvdyAtRVBFUk0g
aXMgbG9nZ2VkLiBJcyB0aGVyZSBwZXJoYXBzIGEgc3RyYW5nZSBvciBicm9rZW4gWFNNDQo+PiBw
b2xpY3kgaW4gdXNlPyBJIGFzayBiZWNhdXNlIGV2dGNobl9hbGxvY191bmJvdW5kKCkgaXRzZWxm
DQo+PiB3b3VsZG4ndCByZXR1cm4gLUVQRVJNIGFmYWljcy4NCj4gQXMgeW91IGNhbiBzZWUgSSdt
IHByZXR0eSBuZXcgdG8gWGVuLiBGdXJ0aGVybW9yZSwgaXQgaXMgdGhlIGZpcnN0DQo+IHRpbWUg
dGhhdCBJIGhlYXJkIGFib3V0IFhTTSwgc28gc2luY2UgSSBkaWQgbm90IGNoYW5nZSBhbnl0aGlu
ZyBJDQo+IGRvIG5vdCBrbm93IHdoYXQgdG8gYW5zd2VyIQ0KDQpQbGVhc2UgY2FuIHlvdSBhdHRh
Y2ggdGhlIGZ1bGwgb3V0cHV0IG9mIGB4bCBkbWVzZ2AsIHdoaWNoIHdpbGwgaGVscA0KYW5zd2Vy
IHRoaXMgcXVlc3Rpb24uDQoNCn5BbmRyZXcNCg==


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 14:53:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 14:53:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286145.485526 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREjO-0008PI-I2; Mon, 07 Mar 2022 14:53:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286145.485526; Mon, 07 Mar 2022 14:53:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREjO-0008PB-Ev; Mon, 07 Mar 2022 14:53:02 +0000
Received: by outflank-mailman (input) for mailman id 286145;
 Mon, 07 Mar 2022 14:53:00 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+gfv=TS=citrix.com=prvs=0582ef7ee=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nREjM-0008P5-Qm
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 14:53:00 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 46d35838-9e26-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 15:52:59 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 46d35838-9e26-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646664779;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=ltg0mwKBQkFH4KWst5CWdgvnBrZ7YydBF5TsFQq2Hx0=;
  b=aPXuuCM/tb060Dcsahkdlam9Y+vBMf4BbzJlgEkq/AFAkVG1BhiSUVmG
   eau637F8NrSzdA8AKzPI/zeZpbQvzVvCW61O9odP1YN7fyGXy4nt5DpRG
   EK5yNaI8FdLsKgXdrhsfZC+HCQfNso7c6q7q4lEduMvVTbmlDpMXzid4q
   A=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65095192
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:TNY946lUdkduikbjzcWzlQHo5gyuJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xIbUG6Gb/qIZzamL4ojPoq/8kMO7JLWnYJmS1dk+y42ESMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiW1zV4
 7senuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYWC4kMq7XquIhAxB3NXE5DZdD2oLmGC3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3oHZvwCufFf87aZvCX7/L9ZlT2zJYasVmQ6uGN
 pdAOGAHgBLoOAxCCnRKEJECgP6DgVPDbWAfoljMnP9ii4TU5FMoi+W8WDbPQfSaSMMQkkuGq
 2bu+2XiHgpcJNGZ0SCC8H+nmqnIhyyTcJ0WPK218LhtmlL77mUVBAcbXB2gvfSng0i3R9V3M
 EUS5iMoq6Eq9VeiCNjhNzW6qXiIpA8BWPJfFuQ77EeGza+83uqCLjFaFHgbMoVg7ZJoA2xxv
 rOUoz/3LS1GvbGWUkCbyuedghXifhgvKE0/RBZRGGPp/OLfiI00ixvOSPNqH6i0ksD5FFnM/
 tyakMQtr+5N1JBWjs1X6XiC2mvx/caREmbZ8y2KBjrN0+9vWGKyi2VEA3D/5O0IEouWR0LpU
 JMsy5nHt7Bm4X1geUWwrAQx8FOBuqzt3N702wcH83wdG9OFoSLLQGyoyGsiTHqFy+5dEdMTX
 GfduBlK+LhYN2awYKl8buqZUpp2k/WxS4y6DaCEMrKih6SdkyfdoElTibO4hTixwCDAb4llU
 XtkTSpcJSlDUvk2pNZHb+wczaUq1kgDKZD7HvjGI+Cc+ePGPha9EO5dWHPXN7xRxP7U8W39r
 ocEX+PXmko3bQELSnSOmWLlBQtRdiZT6FGfg5E/S9Nv1SI9QDBxU6KKmOh5E2Gn9owM/tr1E
 riGchYw4HL0hGHdKBXMbXZmabj1Wo14o259NispVWtEEVB6CWpzxM/zr6cKQIQ=
IronPort-HdrOrdr: A9a23:CZzNqqv/TGh2Ndy/D8PoYW6m7skDctV00zEX/kB9WHVpm6uj5q
 eTdZUgpHvJYVMqM03I9urtBEDtexzhHP1OgbX5X43NYOCOggLBRuxfBODZogHIKmnT8fNcyL
 clU4UWMqyUMbGit7eY3OBvKadD/OW6
X-IronPort-AV: E=Sophos;i="5.90,162,1643691600"; 
   d="scan'208";a="65095192"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Fn+lNGxfpJrkpZZc+62PZAOz8tGLdXl7MVMjBJ1z55lgfJYszqRwnJk4ZzxtUnlEawi/EPZRVV+Axw6m4nAB2GX7kExqB+UvM2ZxmFDnPpvAc89c39NBvWk0P24Mqvs8ZHWTO5a6pll4Dh2AdHN/MyR7gN7Wvrxy11zM5iV7qPg9ozonGL1qTPFmBLDsMFwyqJuuHpZpN7iODB3u6KbmRpi1OZfwJoMKfrg32hTfGCj/4PuRaPnr1ijkzTrZu4SLRfp7qNxxxV/hMd4L2GNDj1+/5DM8hwB2to4KoR3SwrR7QczZEY475KKaFWK7WUBPxG8AG6VpbelY5qtHaZ5YZQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=kICYxlHhD0Z4fIu/g+eTvrum3uMuVKuRJuqM117DqPM=;
 b=bw/vNOeQV7ouYKuyunphuCHL2Idn3mYqc4OdJggja9OitlonPOYF2SXdTzgFj2Me88UU+MsZvY7t/5cv6OwDBVQlsG2QRE0soxWTf62t5FH95414hpP+UMSuN8tT3T8KX6lPw4P1oqiL86cQyE6AtBMEnx+VIsR6pORDNX0VIlainLmUjHlRhEXtEBcfq6kprzOjkW2mOB8jEwdTAcJbPJHJ+Oiu63UFYRsgz1/diK0eQLtUfp2j64FhejJurqVfThNwrdU6GPdRgVClqPqdfophIGNQoWT1rOhZDLT9Ya3+FHFClj8NpYdF1bLGNX5y6OYQYsglq6NyGqXJqwnmjg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=kICYxlHhD0Z4fIu/g+eTvrum3uMuVKuRJuqM117DqPM=;
 b=IU/g/0LV8aLBM4PoA6qUJ9aFZh1Pl5nfSwfxLox4LjDeEtSLT4ZrHoaSeqUANDTtJVAPaSBQ0EJG/teNsMfNI2UfVQMEAtaKUXplU0NXDxYGqGhhmf6NwksrtW0e2B1+2fSoUH+uyrqpyEEY67C3of/3i7uMUmNYB1KjsDjUZGE=
Date: Mon, 7 Mar 2022 15:52:46 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Andrea Stevanato <andrea.stevanato@santannapisa.it>
CC: Jason Andryuk <jandryuk@gmail.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>, "wl@xen.org" <wl@xen.org>, Anthony PERARD
	<anthony.perard@citrix.com>
Subject: Re: Network driver domain broken
Message-ID: <YiYcPgVTpA8//ojA@Air-de-Roger>
References: <YiDt7fX92n6Luc2l@Air-de-Roger>
 <CAKf6xpsnmQG7-LXn5+Uz4mncWsN0EZ8wpagY8f8OydvZNb6g5A@mail.gmail.com>
 <YiH9cee6NIKA6MWg@Air-de-Roger>
 <53a4fe6b-efc8-bfa1-8475-0aa58774051a@santannapisa.it>
 <YiIFyRUNXpUfzwRB@Air-de-Roger>
 <0ce52d38-f542-9336-a100-1cbfc559f218@santannapisa.it>
 <YiXq5HIrvZsy7QKU@Air-de-Roger>
 <b388ed5b-177e-2e9d-6450-6df16d9250c4@santannapisa.it>
 <YiXwhUnZL8bcJvH2@Air-de-Roger>
 <93fb9755-d40a-3cfe-1f6e-335b57d5a213@santannapisa.it>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <93fb9755-d40a-3cfe-1f6e-335b57d5a213@santannapisa.it>
X-ClientProxiedBy: LNXP265CA0077.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:76::17) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: aab801dd-2275-408b-ee57-08da004a26dd
X-MS-TrafficTypeDiagnostic: BYAPR03MB3718:EE_
X-Microsoft-Antispam-PRVS: <BYAPR03MB37188B95751A1271BD77DE508F089@BYAPR03MB3718.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: R0lrRNzN3qSIH8bnLm/95H7+z3sWHbXVrFduU3FLQ3a0kelLS45DImlpW711uWETRgbrKlwg/rkFBU5wROdsc6jvnC+9Z9PDooVROfu4Ajj+2aCpy7sflQ5ChBfTg7ysWMjb5IfJ2jg4jNg1wtsqxOLKjUft2+n8wUfi12Tr1eDst4tDGw+9nXKT91ixORTmOYvSqTFN9T9p2k3UFlNWjOfd7yg+uqDZRFlUO+CWFip+C69S+jmm8fe/TfRGHoDtoCtDT0FCNDEnA0RcktHTkla0+JAghDOjgg0JDmg+Tx0YQh246YmWK3u2rw5kTMdCsHnYSn3aP+L1Vm3HarOt0UIp7Vc0jawSWcnA6vCPWJP+74qN/YLsk0fN4PiGKfNJ9hmQXUQuf49HUDYcBKAnAs09aJKuy+4HjR6o1FFtwOOwCNsbiv1P5/3jinV/5awKtU2V1t+TLte+1WAbHD2IBD+EUmLGccTzk+0+SwRidxmOL4N1zY/g+xSWfT+lZXKem1zOefMS1pY2nQaPQT4lIYwy1T5VazZdFDdujqMzlUtAmCDc+UsApxTkTcCGWhro/2ofXbLGNCrqENPwWqlpliYcikqhUyDcKgOuMdslE0e8RfLOJmfmzTyDWCVvKaDof+It9AKIz9w0cpWOfQz3xQ==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(6512007)(9686003)(83380400001)(53546011)(6666004)(107886003)(26005)(186003)(86362001)(2906002)(8936002)(5660300002)(33716001)(38100700002)(6506007)(82960400001)(85182001)(3480700007)(6916009)(54906003)(508600001)(4326008)(8676002)(66556008)(66476007)(6486002)(66946007)(316002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?c0NVSG4raEtwNi82akcvR2V1TE1QczRQdTFSRk1tNTd4ZUZGVGwzaVgyM24w?=
 =?utf-8?B?MWFwbmZ4aWhydnN2UzhiS1dHNVBBMTB1VmN6M2VFZG40WkRlYWdFaldIVzUr?=
 =?utf-8?B?YzFVNFNKUUREeGtRaVdjUkVaaTN1b3BWRHNDNzdpWTJCZUxRZldneXBVYnVh?=
 =?utf-8?B?OStmNGpJOVVOa28relYwazE0bkZSTGpTbVVzQm5WSTUzUUxLbXhJOG9ISnRZ?=
 =?utf-8?B?UklTa0s1bURXL2xQL2lNY1pXUjMvaGFVTG9VSFVlTUc2d0xsRjRvK2V2cHo0?=
 =?utf-8?B?S0lGRVJ4WE50RmllWXhRT240MDU4UzRJRHlMQ3pwckpaeUdJV1lzeXZ5NmIx?=
 =?utf-8?B?U0kwNGpoTjNlL3pibG1uSE1CbGc3ZWVzcEw1aDRNYXBxNnE0WkpPWXg1NjFJ?=
 =?utf-8?B?a0xhSng2V2FqV0pnN1FkN1ZiRncwRjJSR2NIMTNacVVrWHhUMVZYWkhtekJZ?=
 =?utf-8?B?bTlUclJ4bGFSdUU0K1BMRDNKa0hyUnVBNmdGaStKOVFMTlEyWUlUb2F1VFl5?=
 =?utf-8?B?d0luRkRhcGo2anJMVDFpZW1KUHpKdkR5YnJ4QXREMW5DMjNsSEZMKzZTdlVF?=
 =?utf-8?B?SnpDSFJxT25jZEdYbUFScEY0MDZxczZuSzR4ZmtWKzNDYllDeVByUklQYytW?=
 =?utf-8?B?c1NyWkZaL0JJMll6TnNqdVY3dlJDdWVTT2M4VENoVXpjVUhzdHp1TXVhNVdK?=
 =?utf-8?B?WjlQVUJsNXA3dnRKT2NsOXRGNWswVUlPc2N5eCt1WDhhUUtuV0IzYzNNYXVu?=
 =?utf-8?B?c0ZOamNiUDBrQlF5N29GcDRoMFBVSTMrWXhpOHVMVHJBemQzOE94YWozTG5p?=
 =?utf-8?B?bC8zclM1d2Zaak5DM0x5bWdMME1peDNIUmR2SmZRQXJGMVZraDQzR3ZoMVFV?=
 =?utf-8?B?QTN4ZzVBYWVncWxsUGpNNEpLMEtiZ3hqZGVYUUFTYVBEVUJHa01xRGZRQk1R?=
 =?utf-8?B?MzBTT3p5MjhZeW5xV0xBc3VuK3BTY0FuenIzWGtVV2RuMzRVVmxFM291RHVM?=
 =?utf-8?B?QWpzQTdqckkzRmhQTEZPN3VaOFE5bGNNU2dZazlEc0lYeHVJYzVKOHJub3k0?=
 =?utf-8?B?SXp1eUpIY1VCaGFVNXBCWEYxRmk4MVJDTDVxK1FveUZtWG1lNnFCYlBRN2Yx?=
 =?utf-8?B?bE1NbnNhVVJzRGRDM0dBY2NqWm5ybFNnZTVxTGxBUlVwaFpoNFpDblRNVlF1?=
 =?utf-8?B?QUwzNUMyYlBITUljWnZGaVVMK05qV015SFVwSmNxckZmS3NVYVExTXAydGtl?=
 =?utf-8?B?ZG53ZkoxYjNPY3hyU2JVbGVQWmxRbTd2VGpWUENnOUFBcHFvdFBEWm9tV2dL?=
 =?utf-8?B?SWZHbmhqZHhUMWlUdUdFdVdoSDVXQ3huWFM5aUdHVDB3bHdjR3pObjgrd3Yr?=
 =?utf-8?B?T0g0SWJoQXlSRmFtbUFSekxKcGhOeUpOL0V5ckZ5NjZXU3ArRzlzamZCalg0?=
 =?utf-8?B?L3Z5WUZjb0M0dW9kR09Neko1Z2NTbzY1d1IvUnJpYzZJbzFxQzV4eFM4aURa?=
 =?utf-8?B?VEJWSmxsZ3BxeVBaTm5xTTkvbVY4Vm10L1hKMVJEck02OTdEOFBTRUVmVC90?=
 =?utf-8?B?Nm1talgvRHhmcGVGZXdZVkNxVW1GU3cwRGc5bVNqUXgwVG9sbXdab29Pa1FQ?=
 =?utf-8?B?Vmh1bFRNTmRyWVZweDFSVkhXSmdTRFV4bVNSRFp5RVF0R2M1KzNaZE9VZ3lF?=
 =?utf-8?B?WWprdnYxSWF3SDh0bWxhandpWDBsKzdOWVhRVk94SHg5aE15U1dQblkvNC9F?=
 =?utf-8?B?RWsvLzFqRDE3dHBiRmpYeVdLMExuM2ZJdXM5YXB6dTN2UVRwMjlRU0t2OVho?=
 =?utf-8?B?WlhPcTMxOW5NVjhZQXRtS0ZKbGpVYytjTDFhWGxRbXAwdGRlbmNQMTk3MXJl?=
 =?utf-8?B?bTlKa2hMNEZ6SkVjbUZ4V2tvRjJERXZIR29EUk0zZHZEd0F4bUJEZmErT2JC?=
 =?utf-8?B?Nk43Qkwxc0J5UVV1eEJ1MFBwb1FoMlZkdGJkTGxJb1VqaTN0aU5uT05jSkZz?=
 =?utf-8?B?TUhhV3F0TFV5TFZTK0c2N2ZxaFRoTEVUZVY2bzcyVEZmdFFWa0hSV0xNR3Ax?=
 =?utf-8?B?dFUrV3luNzJJRkN1N2tWeThVNDZrUXlBTUtQR0psQzVNNnp6aWZmVVNLekY0?=
 =?utf-8?B?QjVHNDFCem5hWXZDZEdldmovaHpRNlZoenJLazFuNDk0RTBKaVJWSkp5QU54?=
 =?utf-8?Q?VS9m0OrF8POx2+Z3Tkb7WKg=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: aab801dd-2275-408b-ee57-08da004a26dd
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 14:52:50.7098
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: cz5u+mkZA47U7klKpoBrSC6Rc7laWxdfyfozDZuv3oaxJL2W9DU6LADpDNE92Ki9qV+eiM8HaMHJIrSbyfiTfA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB3718
X-OriginatorOrg: citrix.com

On Mon, Mar 07, 2022 at 03:20:22PM +0100, Andrea Stevanato wrote:
> On 3/7/2022 12:46 PM, Roger Pau Monné wrote:
> > On Mon, Mar 07, 2022 at 12:39:22PM +0100, Andrea Stevanato wrote:
> >> /local/domain/2 = ""   (n0,r2)
> >> /local/domain/2/vm = "/vm/f6dca20a-54bb-43af-9a62-67c55cb75708"   (n0,r2)
> >> /local/domain/2/name = "guest1"   (n0,r2)
> >> /local/domain/2/cpu = ""   (n0,r2)
> >> /local/domain/2/cpu/0 = ""   (n0,r2)
> >> /local/domain/2/cpu/0/availability = "online"   (n0,r2)
> >> /local/domain/2/cpu/1 = ""   (n0,r2)
> >> /local/domain/2/cpu/1/availability = "online"   (n0,r2)
> >> /local/domain/2/memory = ""   (n0,r2)
> >> /local/domain/2/memory/static-max = "1048576"   (n0,r2)
> >> /local/domain/2/memory/target = "1048577"   (n0,r2)
> >> /local/domain/2/memory/videoram = "-1"   (n0,r2)
> >> /local/domain/2/device = ""   (n0,r2)
> >> /local/domain/2/device/suspend = ""   (n0,r2)
> >> /local/domain/2/device/suspend/event-channel = ""   (n2)
> >> /local/domain/2/device/vif = ""   (n0,r2)
> >> /local/domain/2/device/vif/0 = ""   (n2,r1)
> >> /local/domain/2/device/vif/0/backend = "/local/domain/1/backend/vif/2/0"
> >> (n2,r1)
> >> /local/domain/2/device/vif/0/backend-id = "1"   (n2,r1)
> >> /local/domain/2/device/vif/0/state = "6"   (n2,r1)
> >> /local/domain/2/device/vif/0/handle = "0"   (n2,r1)
> >> /local/domain/2/device/vif/0/mac = "00:16:3e:07:df:91"   (n2,r1)
> >> /local/domain/2/device/vif/0/xdp-headroom = "0"   (n2,r1)
> >> /local/domain/2/control = ""   (n0,r2)
> >> /local/domain/2/control/shutdown = ""   (n2)
> >> /local/domain/2/control/feature-poweroff = "1"   (n2)
> >> /local/domain/2/control/feature-reboot = "1"   (n2)
> >> /local/domain/2/control/feature-suspend = ""   (n2)
> >> /local/domain/2/control/sysrq = ""   (n2)
> >> /local/domain/2/control/platform-feature-multiprocessor-suspend = "1"
> >> (n0,r2)
> >> /local/domain/2/control/platform-feature-xs_reset_watches = "1"   (n0,r2)
> >> /local/domain/2/data = ""   (n2)
> >> /local/domain/2/drivers = ""   (n2)
> >> /local/domain/2/feature = ""   (n2)
> >> /local/domain/2/attr = ""   (n2)
> >> /local/domain/2/error = ""   (n2)
> >> /local/domain/2/error/device = ""   (n2)
> >> /local/domain/2/error/device/vif = ""   (n2)
> >> /local/domain/2/error/device/vif/0 = ""   (n2)
> >> /local/domain/2/error/device/vif/0/error = "1 allocating event channel"
> >> (n2)
> > 
> > That's the real error. Your guest netfront fails to allocate the event
> > channel. Do you get any messages in the guest dmesg after trying to
> > attach the network interface?
> 
> Just these two lines:
> 
> [  389.453390] vif vif-0: 1 allocating event channel
> [  389.804135] vif vif-0: 1 allocating event channel

Are you perhaps using some kind flask/xsm policy different from the
defaults?

Regards, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 14:56:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 14:56:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286152.485537 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREmd-0000kS-3j; Mon, 07 Mar 2022 14:56:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286152.485537; Mon, 07 Mar 2022 14:56:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREmc-0000kL-VS; Mon, 07 Mar 2022 14:56:22 +0000
Received: by outflank-mailman (input) for mailman id 286152;
 Mon, 07 Mar 2022 14:56:21 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nREmb-0000k9-Ov
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 14:56:21 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id bf7a9c82-9e26-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 15:56:20 +0100 (CET)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur01lp2053.outbound.protection.outlook.com [104.47.2.53]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-4-XnI188UaPaKtNH6ekIB2Tg-1; Mon, 07 Mar 2022 15:56:18 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PA4PR04MB9341.eurprd04.prod.outlook.com (2603:10a6:102:2a5::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.13; Mon, 7 Mar
 2022 14:56:17 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 14:56:17 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: bf7a9c82-9e26-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646664979;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=PDvWKmTEwKqDdwtgPgGZSNrqkN6n7MIeCMs/Nq79X5A=;
	b=lHpp+7ukEqiO35+dfct9AVGBTdTz9PbKbFY2TrmgmhODpY5VOoNqov00bohJjw7KyW77F5
	AclGtj/F2i04MlsQtX5ZQBjW2n6mOOceXuDUzDF6tGRulnzpPE3FhSSXRH/rvIYzh+xgxP
	LdadTyhCprFt8+Ps9+/+H9UodAf7cPE=
X-MC-Unique: XnI188UaPaKtNH6ekIB2Tg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ktIiQ7bFyiY17R2DwYlDj4MnzBAyhbB3ahsoABw5vQmGpM9aIWem4TV4/CjhsXCHIL2wxM7AJ0BnvzUf3OzKO4OBB0JDUYa7kzypq+Q7K9Z1kL4znKhRVEbME0uYw4O159thAbW9CAkfve/aa0YpQUyC5B1lxbeq4k7W9E6bMAD12hAnv0KrUiRM9AHaaTJL0Qz3Kgbl9BWDNPeo8OQQOJVIXbxU+9jRJlO2UJBOazxpFIWZy/Fmkan+i1DEfeBzUdY5WJ1aspJehfVG/b8VE1wNCsNb6VOvmd0lmAroPUwD6nlK8q6lZU7buH3A4wyvXcVW6qj9gZkZ15tR2vhiMw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=5EprFH6AOMnBpAUKL+oQnEqbk2OM4lyjYovChzHIeYg=;
 b=GnlEBvlGzOIO4AWHgqDrRi8MLgkEMI/mmAe7meomcN0P2RGhHmn5OIbdu3LNk/zI8u9w4EpWm/Y0e0l721qAXJLabFYS5nQ5NlderEtuMYveS2slHpZmqKRb3j1EwBXsYTHBL5sDGfcLdN+sr+i91OMfJb3iqyf1Wk8oDSH4nKTzTuAEMh9JWtEWnJJ4T3VHqfuG5nhaPJXusxcDNjGhWKgXWih6sleaUpZ2eLfRevrrrJvVJLbhZ89R49HtzKdCRYbT0TdjO9FiCF0pXzOLMlM6dtczdrE30TuYwm9e/nDt+YXoLa3XSmgza5Q7612qCBt9mLCbH75AkgpIhMqaOw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <9bdcff21-064c-b671-d8d2-7b7e20e486c7@suse.com>
Date: Mon, 7 Mar 2022 15:56:19 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: Network driver domain broken
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Andrea Stevanato <andrea.stevanato@santannapisa.it>
CC: Jason Andryuk <jandryuk@gmail.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 "wl@xen.org" <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>
References: <YiDt7fX92n6Luc2l@Air-de-Roger>
 <CAKf6xpsnmQG7-LXn5+Uz4mncWsN0EZ8wpagY8f8OydvZNb6g5A@mail.gmail.com>
 <YiH9cee6NIKA6MWg@Air-de-Roger>
 <53a4fe6b-efc8-bfa1-8475-0aa58774051a@santannapisa.it>
 <YiIFyRUNXpUfzwRB@Air-de-Roger>
 <0ce52d38-f542-9336-a100-1cbfc559f218@santannapisa.it>
 <YiXq5HIrvZsy7QKU@Air-de-Roger>
 <b388ed5b-177e-2e9d-6450-6df16d9250c4@santannapisa.it>
 <YiXwhUnZL8bcJvH2@Air-de-Roger>
 <93fb9755-d40a-3cfe-1f6e-335b57d5a213@santannapisa.it>
 <YiYcPgVTpA8//ojA@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YiYcPgVTpA8//ojA@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS8P251CA0016.EURP251.PROD.OUTLOOK.COM
 (2603:10a6:20b:2f2::11) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 6bbd3462-2458-4afd-77df-08da004aa21b
X-MS-TrafficTypeDiagnostic: PA4PR04MB9341:EE_
X-Microsoft-Antispam-PRVS:
	<PA4PR04MB93414983F8F6D7F19292C98EB3089@PA4PR04MB9341.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(316002)(8936002)(83380400001)(36756003)(38100700002)(53546011)(66556008)(66946007)(66476007)(6506007)(4326008)(26005)(3480700007)(2906002)(2616005)(54906003)(5660300002)(31696002)(8676002)(6486002)(110136005)(508600001)(6512007)(86362001)(31686004)(186003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?VUmxXFKgRVieVg72gfb5EdI7mYCtEkyHw3s0Xa6RANBf5KsTyVXQJe+AFTGQ?=
 =?us-ascii?Q?jI97XL9C2RZrlzzFMEDuNqO9xRRj3Mlv2z+itQj0jtx852FMu6iOdDG9E/S6?=
 =?us-ascii?Q?iyKc+zeOALPGV/9enTrmp05TrSuF26WqVdES9fIJicN+uT+GLN6C2J0XKzrp?=
 =?us-ascii?Q?UHPtXrZidnkn0nYKyebuLg6pDQI6mInZuz3gg1DOiRtADxi1dHntDwiCiPcy?=
 =?us-ascii?Q?XwElgJOSZyIgoRPCXXJKf/YqInUYSHEgOYttoRMfpOwTmqetVybE7WJYT4Tt?=
 =?us-ascii?Q?pHm1dTCardqrhMI3o4X5BHnNmc3dpCozq5bQ1SKMilmB4lxE+u9ezr4UIJ7x?=
 =?us-ascii?Q?OmSGqYo+9GxHNivS8WEfZDnJoil+wD9k5y0MwFpoCJkb22D1IsxTJmmnMysL?=
 =?us-ascii?Q?iUxmZnDZFT1TZFtnSaiqdEWNVx6/xD3C03k6OQv9H70bmiUztpiVrcSWAeHM?=
 =?us-ascii?Q?ju5sXcXafF7D9It4zfQUeGRRiP70W076X8dndF/eVNCoRHdWHr7ksrlY9iqs?=
 =?us-ascii?Q?2gNXANXa2ZRB+YuxlEqueHL2SkZoFe4SehPQzUR8ty8wFrje8U2PjVOCVmk7?=
 =?us-ascii?Q?el6vSdpYrGO0JKH5ZuRaCFiElW7p93v34qr55hW/Zv4okpGGxZo2y+6J+PQD?=
 =?us-ascii?Q?TbLyFexC7NHi8MWlz3yt3t5Cda7cfHKtzLPpQJtjltLvXgm6+ERbM3hOgE7R?=
 =?us-ascii?Q?+81zOpP2plqvCBMCDEiLeK15sl4Z8bRzTmxAZaY/lBkpFuag0An+CyVzhC/7?=
 =?us-ascii?Q?2uYLyzPLc5zVFMf1r9kzH7KcXe77g+Uvrl+XW27CznOdGSJ2sGTIS0vDT4VY?=
 =?us-ascii?Q?s1a98ysuGbJ5keAxnCNT7ig5HchxV2WeiyeC8jCIpGdowaxgerwpvq+tWVK/?=
 =?us-ascii?Q?herVvspB0dA86C+UV7rybZYvFK4oj2FtVEIcvHbEFTEuVsZDjHsc3+SqhaLA?=
 =?us-ascii?Q?4sZhA4nSAA+rsHKjmnAbXtxgoozE0cqvs4Is1WB7VSPmmpMqr+xeMmwx5dWE?=
 =?us-ascii?Q?Q6BnFXlC9I5bQlrVNv75LwxSeY75wFvK7FM0lPLsfSiCvHKyIgyygDWM7Xaa?=
 =?us-ascii?Q?oL0ynQBrIrx+CQMWymEppoTEA4ZcjLo/d/3f6dFwd2X5uunI0ems0TszKPHK?=
 =?us-ascii?Q?ouSWNcIvwZZgekv9ToFxjj+DPyZwoyNDO1p8huUH5cDMl/bgjs5SNefxAxf3?=
 =?us-ascii?Q?oxUQ5eI9rJklUVTxNNUwJAOVfWFZNla5WNKiEe3KXqSHBuNi49h5ABHMWrXW?=
 =?us-ascii?Q?0RcBIM0yh1vW6K81NBCNxxNb85hXT3mPtruZgvY0B6rtAqbSX4qyWv0mP3uJ?=
 =?us-ascii?Q?jfzsrZFl9YXruTVi0kH2znQ88BKpj4Y8BuEGOMLoEd49Z7vWOjoWlytdw1QM?=
 =?us-ascii?Q?SM7zuoeahMmY1/jAA+ncxJ+6wRKhRTlZdYDi/yhFq290lhInwVgLGi3YcfRQ?=
 =?us-ascii?Q?vkfpSlPL3kYDX8RziquBwsCav67gGyOr08qs8FH4Yc4w03mVJ+o17eCHzLkO?=
 =?us-ascii?Q?uMATRYI03CzVhVNdM2yg7/WE/WbL8bPsBVOnBSvQ28/P6Aidry0QQHH+ZuyS?=
 =?us-ascii?Q?uE6+cKFBo450oeQZuP1kGVE7LUDlnWHgLpw+xbH/5Pblqzr42xJRyLpqEoSa?=
 =?us-ascii?Q?1CD4dvkhzIpAG2SAwN2nrLY=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6bbd3462-2458-4afd-77df-08da004aa21b
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 14:56:17.5197
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 7V823IEMBQciuM0qT2HMeHYE+QtSqzPUUOy35bQ7v0p2TCrDbPWhHFkdmFTeR/INtuD5LFLFAg2PV+RXufQJHg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR04MB9341

On 07.03.2022 15:52, Roger Pau Monn=C3=A9 wrote:
> On Mon, Mar 07, 2022 at 03:20:22PM +0100, Andrea Stevanato wrote:
>> On 3/7/2022 12:46 PM, Roger Pau Monn=C3=A9 wrote:
>>> On Mon, Mar 07, 2022 at 12:39:22PM +0100, Andrea Stevanato wrote:
>>>> /local/domain/2 =3D ""   (n0,r2)
>>>> /local/domain/2/vm =3D "/vm/f6dca20a-54bb-43af-9a62-67c55cb75708"   (n=
0,r2)
>>>> /local/domain/2/name =3D "guest1"   (n0,r2)
>>>> /local/domain/2/cpu =3D ""   (n0,r2)
>>>> /local/domain/2/cpu/0 =3D ""   (n0,r2)
>>>> /local/domain/2/cpu/0/availability =3D "online"   (n0,r2)
>>>> /local/domain/2/cpu/1 =3D ""   (n0,r2)
>>>> /local/domain/2/cpu/1/availability =3D "online"   (n0,r2)
>>>> /local/domain/2/memory =3D ""   (n0,r2)
>>>> /local/domain/2/memory/static-max =3D "1048576"   (n0,r2)
>>>> /local/domain/2/memory/target =3D "1048577"   (n0,r2)
>>>> /local/domain/2/memory/videoram =3D "-1"   (n0,r2)
>>>> /local/domain/2/device =3D ""   (n0,r2)
>>>> /local/domain/2/device/suspend =3D ""   (n0,r2)
>>>> /local/domain/2/device/suspend/event-channel =3D ""   (n2)
>>>> /local/domain/2/device/vif =3D ""   (n0,r2)
>>>> /local/domain/2/device/vif/0 =3D ""   (n2,r1)
>>>> /local/domain/2/device/vif/0/backend =3D "/local/domain/1/backend/vif/=
2/0"
>>>> (n2,r1)
>>>> /local/domain/2/device/vif/0/backend-id =3D "1"   (n2,r1)
>>>> /local/domain/2/device/vif/0/state =3D "6"   (n2,r1)
>>>> /local/domain/2/device/vif/0/handle =3D "0"   (n2,r1)
>>>> /local/domain/2/device/vif/0/mac =3D "00:16:3e:07:df:91"   (n2,r1)
>>>> /local/domain/2/device/vif/0/xdp-headroom =3D "0"   (n2,r1)
>>>> /local/domain/2/control =3D ""   (n0,r2)
>>>> /local/domain/2/control/shutdown =3D ""   (n2)
>>>> /local/domain/2/control/feature-poweroff =3D "1"   (n2)
>>>> /local/domain/2/control/feature-reboot =3D "1"   (n2)
>>>> /local/domain/2/control/feature-suspend =3D ""   (n2)
>>>> /local/domain/2/control/sysrq =3D ""   (n2)
>>>> /local/domain/2/control/platform-feature-multiprocessor-suspend =3D "1=
"
>>>> (n0,r2)
>>>> /local/domain/2/control/platform-feature-xs_reset_watches =3D "1"   (n=
0,r2)
>>>> /local/domain/2/data =3D ""   (n2)
>>>> /local/domain/2/drivers =3D ""   (n2)
>>>> /local/domain/2/feature =3D ""   (n2)
>>>> /local/domain/2/attr =3D ""   (n2)
>>>> /local/domain/2/error =3D ""   (n2)
>>>> /local/domain/2/error/device =3D ""   (n2)
>>>> /local/domain/2/error/device/vif =3D ""   (n2)
>>>> /local/domain/2/error/device/vif/0 =3D ""   (n2)
>>>> /local/domain/2/error/device/vif/0/error =3D "1 allocating event chann=
el"
>>>> (n2)
>>>
>>> That's the real error. Your guest netfront fails to allocate the event
>>> channel. Do you get any messages in the guest dmesg after trying to
>>> attach the network interface?
>>
>> Just these two lines:
>>
>> [  389.453390] vif vif-0: 1 allocating event channel
>> [  389.804135] vif vif-0: 1 allocating event channel
>=20
> Are you perhaps using some kind flask/xsm policy different from the
> defaults?

Or SILO mode.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 15:00:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 15:00:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286158.485548 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREqI-0002Cv-J9; Mon, 07 Mar 2022 15:00:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286158.485548; Mon, 07 Mar 2022 15:00:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREqI-0002Co-G4; Mon, 07 Mar 2022 15:00:10 +0000
Received: by outflank-mailman (input) for mailman id 286158;
 Mon, 07 Mar 2022 15:00:08 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=/EJ7=TS=santannapisa.it=Andrea.Stevanato@srs-se1.protection.inumbo.net>)
 id 1nREqG-0002Cb-9m
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 15:00:08 +0000
Received: from EUR03-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur03on0622.outbound.protection.outlook.com
 [2a01:111:f400:fe0a::622])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 464327bf-9e27-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 16:00:06 +0100 (CET)
Received: from AM6PR03MB5000.eurprd03.prod.outlook.com (2603:10a6:20b:88::11)
 by GV1PR03MB8112.eurprd03.prod.outlook.com (2603:10a6:150:23::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Mon, 7 Mar
 2022 15:00:03 +0000
Received: from AM6PR03MB5000.eurprd03.prod.outlook.com
 ([fe80::cdef:8699:47b:300d]) by AM6PR03MB5000.eurprd03.prod.outlook.com
 ([fe80::cdef:8699:47b:300d%3]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 15:00:03 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 464327bf-9e27-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=IQEmUrKwOncBxYopxKs0R0xOPA49eGt1a2bI0EdmwrG0iEvvPelLWDLQcuJpyz/IJLUWnQh43aflYD9VhO7GLkhaOaA8m44QJlyypCbb3ut1ZIBhwl2abWs43o6sKrMfqJg7x1qfdg/HiuqLsGqIGlcg9Td9j4ozStwpAX32Es+fXYfkqdgH76EZMIgCskTmHvtTZ8C7Peuq4y8ZxTBgMa6COydYEmXDlzy+ZoRc3ioQvWDp8U7C+f9zeXN2hdGOuEyzCudViDSSaV7KhBdsYaNwgp8UJppTzcXisjfKMfM6lKRvxeQr6/k7hqF/QWFFMWvzwFEAXWeWU19M+s34jQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=rlyDpvG2RcY23M/mSa9UtC9Ah5HjLZStW52pPkfn6c0=;
 b=DUZ54c2QDSmhmxahhfwHfmbvP+5YzZSgvPxZm7N1Xtk/eY1MMUVp7Tr7UX5zMtnDJy4gqM+LCJS4ig8Akkz8OzWwPRHhMahczH49ocTuXqCl/TpCovGeR48B/TcjXD7DDQLoy5W1pTKeq43VIDlGGvTqVDzcWJ4lZmCEX5eoe/LwexoK0OAFTPuUyJ/SpooOPlw+4rtD7+yXldINqfkxJ/De/6YIbtF14BYgHtMOamMG8Ew4+SEK7rv5fQGRUb6QvsMu8yb4U358e37y7j40d+Msl8xzb/8JpGwznLBuaxvHp6Qj5Q4+TYu/ILH8KLwO8IdzjCbTpeWOa9FBTW2QSg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=santannapisa.it; dmarc=pass action=none
 header.from=santannapisa.it; dkim=pass header.d=santannapisa.it; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=santannapisa.it;
 s=selector1;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=rlyDpvG2RcY23M/mSa9UtC9Ah5HjLZStW52pPkfn6c0=;
 b=kKcKvWIzeAAHDGsPLweXfzL4orgHTv1Kw5So1yoaGwBW15ZR+QntmzlAh64A+eOnmRpNczE0VIS47R9Fv52efOicVGDbgJl+8jzebKwq2BPbOJ+qTQRW4snTEUI85fHfajrx/pdMHNdRCcb/DAy5mMt2+ZDJAKXUZUE7IXutdV4=
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=santannapisa.it;
Message-ID: <9b38e9b4-b2e9-b790-397c-38d7b62443d4@santannapisa.it>
Date: Mon, 7 Mar 2022 16:00:02 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: Network driver domain broken
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>, Jan Beulich
 <jbeulich@suse.com>, Roger Pau Monne <roger.pau@citrix.com>
Cc: Jason Andryuk <jandryuk@gmail.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 "wl@xen.org" <wl@xen.org>, Anthony Perard <anthony.perard@citrix.com>
References: <DB7PR03MB50027EE92E11BFFF71AADC4598049@DB7PR03MB5002.eurprd03.prod.outlook.com>
 <92827eec-b6e9-9c95-8f9e-fcf063d45090@santannapisa.it>
 <YiDt7fX92n6Luc2l@Air-de-Roger>
 <CAKf6xpsnmQG7-LXn5+Uz4mncWsN0EZ8wpagY8f8OydvZNb6g5A@mail.gmail.com>
 <YiH9cee6NIKA6MWg@Air-de-Roger>
 <53a4fe6b-efc8-bfa1-8475-0aa58774051a@santannapisa.it>
 <YiIFyRUNXpUfzwRB@Air-de-Roger>
 <0ce52d38-f542-9336-a100-1cbfc559f218@santannapisa.it>
 <YiXq5HIrvZsy7QKU@Air-de-Roger>
 <b388ed5b-177e-2e9d-6450-6df16d9250c4@santannapisa.it>
 <YiXwhUnZL8bcJvH2@Air-de-Roger>
 <93fb9755-d40a-3cfe-1f6e-335b57d5a213@santannapisa.it>
 <e5c4c591-8ef4-f8d7-aa2a-b196a5a9749c@suse.com>
 <6028180c-ff1c-5d4f-2cf2-582e4104d888@santannapisa.it>
 <04e4ecfb-0235-db0d-d5fd-3274879003fa@citrix.com>
From: Andrea Stevanato <andrea.stevanato@santannapisa.it>
In-Reply-To: <04e4ecfb-0235-db0d-d5fd-3274879003fa@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: MR2P264CA0131.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:500:30::23) To AM6PR03MB5000.eurprd03.prod.outlook.com
 (2603:10a6:20b:88::11)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2d6e1772-d257-4477-8bff-08da004b28cf
X-MS-TrafficTypeDiagnostic: GV1PR03MB8112:EE_
X-Microsoft-Antispam-PRVS:
	<GV1PR03MB8112BD0B517AAA2C4D3C8C3E98089@GV1PR03MB8112.eurprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR03MB5000.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(36756003)(83380400001)(31686004)(44832011)(3480700007)(8936002)(5660300002)(2906002)(26005)(186003)(316002)(52116002)(53546011)(786003)(6506007)(38100700002)(38350700002)(86362001)(6486002)(31696002)(66946007)(110136005)(2616005)(8676002)(4326008)(54906003)(66556008)(66476007)(508600001)(6512007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?QksyNTlja2pIWitSUUZvdWcrMEZEakVuTWJ2WWlwL05ieHNWTUxLNjFxMlVw?=
 =?utf-8?B?bnBKVEJXazRVUDhma3dmVUltWlhzTHRwSjFvYjkyRXlmK2ZFczNobm5BZGlR?=
 =?utf-8?B?TWZTTlgrWTlwbWtxZHpoSEREY1FJMzc1azdOOHBVeEF3SERhWlFZMFJnQ05L?=
 =?utf-8?B?SHBmalIrRUZCdWF4d2JrTzVFZ0JxZnRkMkFRV284UENMT0YrVkorZ2tRSURP?=
 =?utf-8?B?SEVrT2NLbC90OVpMdVNGMEErbmx3cVB5QlF6ajlZVGJFNmhYb1BtWVRicGRa?=
 =?utf-8?B?blBZMUZtd2dURDl2TlJzbElHU2VhbmpldFNMRjYrNkhxem9nY2FmWDBtcnJm?=
 =?utf-8?B?enlqc1pyb28waU92VFVIbFFQU0dUMHA5RlZXaDF5YzFiRmRoNElMWmlxaTJM?=
 =?utf-8?B?MXJCMUpYSk52SFV2MU91U0ljZVdzVzJ0OHZhdXpLdVVmZFNKVDVVU1dER3NP?=
 =?utf-8?B?bzlrK21lWEJUMCtyV2JoL3RTcVJGREx6L1JhbE1VMUYwQ0FTZjVtREtOREh3?=
 =?utf-8?B?ZUZIeGFiZ2RCTUVEZk1QdWRQcVM0N1crZVN5cCtXeXZmMzNSUERLcFpCazli?=
 =?utf-8?B?aGIvMWkvV2E3OG5hY3NDSmliVStZcXV2MjVYdUtzbENGcDBnSGw2OXhCRDRp?=
 =?utf-8?B?b2F2bTRJTGR0dGpzWXpUTVErZUx4UnBDOGFjNCtVMHhPOUdvRzdDUVFPUTJ2?=
 =?utf-8?B?RlNta1RYQzg1Zml0Ym1CVnlWS0QybXYxczIxMC9qS21Gbjc5aG9VRXFqS1Nz?=
 =?utf-8?B?YVdKYjlGT1p5bE1TT1RRa3V1NStqc2dOUDdOOGlPb0xYQkFCSGhhTTl6VU9y?=
 =?utf-8?B?anNCUytJZ08zSWREblVvVmRGTUVreUUxd05OdXkzbTc2dVlGc1ZvOWtPdUFl?=
 =?utf-8?B?VndiUzMxSzZUaWZ5THU1Wi80dFlSS3ZUa2xURGJyU1VqU2t2NUl1bnpvYWJV?=
 =?utf-8?B?Z3J4SjhhVmFLejZoMlYzbkxIc2E5WWpQOXdMSUlONEtjN3k3S1h4QWtScmdj?=
 =?utf-8?B?a3RtR2g4QXBXSnVUUWNRYXNvaFFNRkpWaE16MHRoeUpTd0NiSXdCbVdZcU1R?=
 =?utf-8?B?VmlHVWpZYUpySmQxQ3M1cVdGNWc5VEI5QUkzYmtRemo3dVo3SUxFcitMdzZJ?=
 =?utf-8?B?RHpFWUdZT3VaRjVuZnUrV0JqOHV4T1dzbU9QYXpUWkx5V0o4QlUvenYwUjcw?=
 =?utf-8?B?WmNYcmQ2bVZLVEszVTRTRUFBeWtLYXB0VDI1Ymx6THJOQ1YwOWFkdHpIbzVE?=
 =?utf-8?B?WmJlSExTWDQvUTJ0c2hISFdjS3BpNHlWZjBKNklDYkNlOXhsL01XRVE4eE1s?=
 =?utf-8?B?MHdNNDlWK05FQllFWFU4OUVGbHNRQVlJMEE0RmtveWRPUGt0OG9FdFpoRGJm?=
 =?utf-8?B?YXhxY2lRblh2dURsSE5vNnRDOFVPNytvTjBWSVBCNytINHd4NVVkbnU2dnpH?=
 =?utf-8?B?L1JiMmJYeWdyNGdIWHdkN0Y3TnFxci9MZ1VaMmdIL0tIanNTeXpNczZwN3Fk?=
 =?utf-8?B?czNuNHI2TWNrZ1BwMTJQV2lJaUxFQ2IvSk0wZkFSUThINE9NeXIxT1JGdkFk?=
 =?utf-8?B?RTA5blN3Kzd2dXUwcXVBSmRGMWtVRTNyRW9wNkFFZ0FlREZaOURjSlI1Zi91?=
 =?utf-8?B?Mjh3RFdLV0dLWHp2ZVBtVVZBZlhxNGpIanZURUtWV09CMGRRUFpkdVQwKzZu?=
 =?utf-8?B?N2p0MHNrTjl0YjAzZG5qSVIyNUhubC9DcDE4VHluZ1QwV1ZIZGozYk5ISXZu?=
 =?utf-8?B?Yjhac1diRFY5dHYrcEptOUEyWnJqVGVFMFAydFpRQmhmRVBVTWtYQ2l5U3Ux?=
 =?utf-8?B?QnRaQ1JtMmZ1dUxhOHZiVCsrVWZ5aDN4RXBsTDJoUWY4bFMwSEZOMHRSbENq?=
 =?utf-8?B?UkhCVEl0L0RtNFFCblFqSTRLdDk5aVovVlZWMGE4NTRlVTBFRUwvSnlTRHpo?=
 =?utf-8?B?YVVhZUM0Z3ZiRkxnYzdod2FuM0EzOVB5ZUxha3lNNjU2a0ZJblhYRWlWVmR6?=
 =?utf-8?B?MTRyRExBMlFVcTd1MElHZkVQM3RLUWFtaFlNWnlSSmtqWSsxdk9PcW5ucjhm?=
 =?utf-8?B?UFdVUFZ3TDE4K3hscXVNdm9WSW5pYXFRcTMrTDBhUkM4RzJjd3J3MEJlU0lJ?=
 =?utf-8?B?WnQ2eWF4Z0tGNEJXQU4zYktWQXlUcjRJYlZSZHZHcDdWaytGRCtacExVTDNO?=
 =?utf-8?B?aVJNcDJQVWZPdW5WSHUxU1Jya0plWHJaOUJWVlV2cWhYWTFVb25xQndRZmlu?=
 =?utf-8?B?MEI0dDY3STBkUXl0M0tNWHFuNTZLRnhocTdUZ2p1SDhhOUtPdWM4U2NGM0pX?=
 =?utf-8?B?N01POERSNnMyREdoME5IcmQ4aVBTUWVXUnlTR0QzVDZMUDB6TnpCQT09?=
X-OriginatorOrg: santannapisa.it
X-MS-Exchange-CrossTenant-Network-Message-Id: 2d6e1772-d257-4477-8bff-08da004b28cf
X-MS-Exchange-CrossTenant-AuthSource: AM6PR03MB5000.eurprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 15:00:03.4834
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: d97360e3-138d-4b5f-956f-a646c364a01e
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: g8tq1ctNaC9QQRNVA4S+4z8a15iDCG62ufaVTnjuxTcKGogaHCV2Oe7G01bhwN5tQd9Ib4SYJzEJ5ccATo5uwbN9MVSDGEXdWaXaJLd+NtzyUHszm/SuAm4Hi9sagtkJ
X-MS-Exchange-Transport-CrossTenantHeadersStamped: GV1PR03MB8112

On 3/7/2022 3:50 PM, Andrew Cooper wrote:
> On 07/03/2022 14:43, Andrea Stevanato wrote:
>> On 3/7/2022 3:36 PM, Jan Beulich wrote:
>>> On 07.03.2022 15:20, Andrea Stevanato wrote:
>>>> On 3/7/2022 12:46 PM, Roger Pau Monné wrote:
>>>>> On Mon, Mar 07, 2022 at 12:39:22PM +0100, Andrea Stevanato wrote:
>>>>>> /local/domain/2 = ""   (n0,r2)
>>>>>> /local/domain/2/vm = "/vm/f6dca20a-54bb-43af-9a62-67c55cb75708"   (n0,r2)
>>>>>> /local/domain/2/name = "guest1"   (n0,r2)
>>>>>> /local/domain/2/cpu = ""   (n0,r2)
>>>>>> /local/domain/2/cpu/0 = ""   (n0,r2)
>>>>>> /local/domain/2/cpu/0/availability = "online"   (n0,r2)
>>>>>> /local/domain/2/cpu/1 = ""   (n0,r2)
>>>>>> /local/domain/2/cpu/1/availability = "online"   (n0,r2)
>>>>>> /local/domain/2/memory = ""   (n0,r2)
>>>>>> /local/domain/2/memory/static-max = "1048576"   (n0,r2)
>>>>>> /local/domain/2/memory/target = "1048577"   (n0,r2)
>>>>>> /local/domain/2/memory/videoram = "-1"   (n0,r2)
>>>>>> /local/domain/2/device = ""   (n0,r2)
>>>>>> /local/domain/2/device/suspend = ""   (n0,r2)
>>>>>> /local/domain/2/device/suspend/event-channel = ""   (n2)
>>>>>> /local/domain/2/device/vif = ""   (n0,r2)
>>>>>> /local/domain/2/device/vif/0 = ""   (n2,r1)
>>>>>> /local/domain/2/device/vif/0/backend = "/local/domain/1/backend/vif/2/0"
>>>>>> (n2,r1)
>>>>>> /local/domain/2/device/vif/0/backend-id = "1"   (n2,r1)
>>>>>> /local/domain/2/device/vif/0/state = "6"   (n2,r1)
>>>>>> /local/domain/2/device/vif/0/handle = "0"   (n2,r1)
>>>>>> /local/domain/2/device/vif/0/mac = "00:16:3e:07:df:91"   (n2,r1)
>>>>>> /local/domain/2/device/vif/0/xdp-headroom = "0"   (n2,r1)
>>>>>> /local/domain/2/control = ""   (n0,r2)
>>>>>> /local/domain/2/control/shutdown = ""   (n2)
>>>>>> /local/domain/2/control/feature-poweroff = "1"   (n2)
>>>>>> /local/domain/2/control/feature-reboot = "1"   (n2)
>>>>>> /local/domain/2/control/feature-suspend = ""   (n2)
>>>>>> /local/domain/2/control/sysrq = ""   (n2)
>>>>>> /local/domain/2/control/platform-feature-multiprocessor-suspend = "1"
>>>>>> (n0,r2)
>>>>>> /local/domain/2/control/platform-feature-xs_reset_watches = "1"   (n0,r2)
>>>>>> /local/domain/2/data = ""   (n2)
>>>>>> /local/domain/2/drivers = ""   (n2)
>>>>>> /local/domain/2/feature = ""   (n2)
>>>>>> /local/domain/2/attr = ""   (n2)
>>>>>> /local/domain/2/error = ""   (n2)
>>>>>> /local/domain/2/error/device = ""   (n2)
>>>>>> /local/domain/2/error/device/vif = ""   (n2)
>>>>>> /local/domain/2/error/device/vif/0 = ""   (n2)
>>>>>> /local/domain/2/error/device/vif/0/error = "1 allocating event channel"
>>>>>> (n2)
>>>>> That's the real error. Your guest netfront fails to allocate the event
>>>>> channel. Do you get any messages in the guest dmesg after trying to
>>>>> attach the network interface?
>>>> Just these two lines:
>>>>
>>>> [  389.453390] vif vif-0: 1 allocating event channel
>>>> [  389.804135] vif vif-0: 1 allocating event channel
>>> Well, these are the error messages, from xenbus_alloc_evtchn().
>>> What's a little odd is that the error code is positive, but that's
>>> how -EPERM is logged. Is there perhaps a strange or broken XSM
>>> policy in use? I ask because evtchn_alloc_unbound() itself
>>> wouldn't return -EPERM afaics.
>> As you can see I'm pretty new to Xen. Furthermore, it is the first
>> time that I heard about XSM, so since I did not change anything I
>> do not know what to answer!
> 
> Please can you attach the full output of `xl dmesg`, which will help
> answer this question.

# xl dmesg
(XEN) Checking for initrd in /chosen
(XEN) RAM: 0000000000000000 - 000000007fefffff
(XEN) RAM: 0000000800000000 - 000000087fffffff
(XEN)
(XEN) MODULE[0]: 0000000007000000 - 000000000700e000 Device Tree
(XEN) MODULE[1]: 0000000002a00000 - 0000000006d1e0aa Ramdisk
(XEN) MODULE[2]: 0000000000e00000 - 0000000002891200 Kernel
(XEN)
(XEN)
(XEN) Command line: console=dtuart dtuart=serial0 dom0_mem=1500M dom0_max_vcpus=1 bootscrub=0 vwfi=native sched=null loglvl=all guest_loglvl=all
(XEN) PFN compression on bits 19...22
(XEN) Domain heap initialised
(XEN) Booting using Device Tree
(XEN) Platform: Xilinx ZynqMP
(XEN) Looking for dtuart at "serial0", options ""
 Xen 4.14.3-pre
(XEN) Xen version 4.14.3-pre (xen-4.14+gitAUTOINC+e9efd896f9-r0@petalinux) (aarch64-xilinx-linux-gcc (GCC) 10.2.0) debug=n  2021-09-24
(XEN) Latest ChangeSet: Thu Sep 23 18:38:11 2021 -0700 git:e9efd896f9-dirty
(XEN) build-id: 4b7faa4d0c0a308eee0ae8eb52a6fda106026076
(XEN) Processor: 410fd034: "ARM Limited", variant: 0x0, part 0xd03, rev 0x4
(XEN) 64-bit Execution:
(XEN)   Processor Features: 1100000000002222 0000000000000000
(XEN)     Exception Levels: EL3:64+32 EL2:64+32 EL1:64+32 EL0:64+32
(XEN)     Extensions: FloatingPoint AdvancedSIMD
(XEN)   Debug Features: 0000000010305106 0000000000000000
(XEN)   Auxiliary Features: 0000000000000000 0000000000000000
(XEN)   Memory Model Features: 0000000000001122 0000000000000000
(XEN)   ISA Features:  0000000000011120 0000000000000000
(XEN) 32-bit Execution:
(XEN)   Processor Features: 00001231:00011011
(XEN)     Instruction Sets: AArch32 A32 Thumb Thumb-2 ThumbEE Jazelle
(XEN)     Extensions: GenericTimer Security
(XEN)   Debug Features: 03010066
(XEN)   Auxiliary Features: 00000000
(XEN)   Memory Model Features: 10101105 40000000 01260000 02102211
(XEN)  ISA Features: 02101110 13112111 21232042 01112131 00011142 00011121
(XEN) Using SMC Calling Convention v1.2
(XEN) Using PSCI v1.1
(XEN) SMP: Allowing 4 CPUs
(XEN) Generic Timer IRQ: phys=30 hyp=26 virt=27 Freq: 65000 KHz
(XEN) GICv2 initialization:
(XEN)         gic_dist_addr=00000000f9010000
(XEN)         gic_cpu_addr=00000000f9020000
(XEN)         gic_hyp_addr=00000000f9040000
(XEN)         gic_vcpu_addr=00000000f9060000
(XEN)         gic_maintenance_irq=25
(XEN) GICv2: Adjusting CPU interface base to 0xf902f000
(XEN) GICv2: 192 lines, 4 cpus, secure (IID 00000000).
(XEN) XSM Framework v1.0.0 initialized
(XEN) Initialising XSM SILO mode
(XEN) Using scheduler: null Scheduler (null)
(XEN) Initializing null scheduler
(XEN) WARNING: This is experimental software in development.
(XEN) Use at your own risk.
(XEN) Allocated console ring of 32 KiB.
(XEN) CPU0: Guest atomics will try 1 times before pausing the domain
(XEN) Bringing up CPU1
(XEN) CPU1: Guest atomics will try 1 times before pausing the domain
(XEN) CPU 1 booted.
(XEN) Bringing up CPU2
(XEN) CPU2: Guest atomics will try 1 times before pausing the domain
(XEN) CPU 2 booted.
(XEN) Bringing up CPU3
(XEN) CPU3: Guest atomics will try 1 times before pausing the domain
(XEN) CPU 3 booted.
(XEN) Brought up 4 CPUs
(XEN) smmu: /axi/smmu@fd800000: probing hardware configuration...
(XEN) smmu: /axi/smmu@fd800000: SMMUv2 with:
(XEN) smmu: /axi/smmu@fd800000:         stage 2 translation
(XEN) smmu: /axi/smmu@fd800000:         stream matching with 48 register groups, mask 0x7fff
(XEN) smmu: /axi/smmu@fd800000:         16 context banks (0 stage-2 only)
(XEN) smmu: /axi/smmu@fd800000:         Stage-2: 48-bit IPA -> 48-bit PA
(XEN) smmu: /axi/smmu@fd800000: registered 29 master devices
(XEN) I/O virtualisation enabled
(XEN)  - Dom0 mode: Relaxed
(XEN) P2M: 40-bit IPA with 40-bit PA and 8-bit VMID
(XEN) P2M: 3 levels with order-1 root, VTCR 0x80023558
(XEN) Scheduling granularity: cpu, 1 CPU per sched-resource
(XEN) alternatives: Patching with alt table 00000000002c3360 -> 00000000002c3b28
(XEN) *** LOADING DOMAIN 0 ***
(XEN) Loading d0 kernel from boot module @ 0000000000e00000
(XEN) Loading ramdisk from boot module @ 0000000002a00000
(XEN) Allocating 1:1 mappings totalling 1500MB for dom0:
(XEN) BANK[0] 0x00000020000000-0x0000007c000000 (1472MB)
(XEN) BANK[1] 0x0000007e000000-0x0000007fc00000 (28MB)
(XEN) Grant table range: 0x00000006e00000-0x00000006e40000
(XEN) smmu: /axi/smmu@fd800000: d0: p2maddr 0x000000087bf94000
(XEN) Allocating PPI 16 for event channel interrupt
(XEN) Loading zImage from 0000000000e00000 to 0000000020000000-0000000021a91200
(XEN) Loading d0 initrd from 0000000002a00000 to 0x0000000028200000-0x000000002c51e0aa
(XEN) Loading d0 DTB to 0x0000000028000000-0x000000002800c4d5
(XEN) Initial low memory virq threshold set at 0x4000 pages.
(XEN) Std. Loglevel: All
(XEN) Guest Loglevel: All
(XEN) *** Serial input to DOM0 (type 'CTRL-a' three times to switch input)
(XEN) Freed 336kB init memory.
(XEN) d0v0: vGICD: unhandled word write 0x000000ffffffff to ICACTIVER4
(XEN) d0v0: vGICD: unhandled word write 0x000000ffffffff to ICACTIVER8
(XEN) d0v0: vGICD: unhandled word write 0x000000ffffffff to ICACTIVER12
(XEN) d0v0: vGICD: unhandled word write 0x000000ffffffff to ICACTIVER16
(XEN) d0v0: vGICD: unhandled word write 0x000000ffffffff to ICACTIVER20
(XEN) d0v0: vGICD: unhandled word write 0x000000ffffffff to ICACTIVER0
(XEN) d1v0: vGICD: unhandled word write 0x000000ffffffff to ICACTIVER0
(XEN) d1v1: vGICD: unhandled word write 0x000000ffffffff to ICACTIVER0
(XEN) d2v0: vGICD: unhandled word write 0x000000ffffffff to ICACTIVER0
(XEN) d2v1: vGICD: unhandled word write 0x000000ffffffff to ICACTIVER0
(XEN) d3v0: vGICD: unhandled word write 0x000000ffffffff to ICACTIVER0

# cat /boot/xen-4.14.3-pre.config | grep XSM
CONFIG_XSM=y
CONFIG_XSM_FLASK=y
CONFIG_XSM_FLASK_AVC_STATS=y
# CONFIG_XSM_FLASK_POLICY is not set
CONFIG_XSM_SILO=y
# CONFIG_XSM_DUMMY_DEFAULT is not set
# CONFIG_XSM_FLASK_DEFAULT is not set
CONFIG_XSM_SILO_DEFAULT=y

This is the default configuration shipped with petalinux. From the
help menuconfig, it seems that this XSM SILO deny communication
between unprivileged VMs.
 
> ~Andrew

Cheers,
Andrea


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 15:06:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 15:06:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286166.485558 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREw7-0002xR-D7; Mon, 07 Mar 2022 15:06:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286166.485558; Mon, 07 Mar 2022 15:06:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREw7-0002xJ-A1; Mon, 07 Mar 2022 15:06:11 +0000
Received: by outflank-mailman (input) for mailman id 286166;
 Mon, 07 Mar 2022 15:06:10 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+gfv=TS=citrix.com=prvs=0582ef7ee=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nREw6-0002xD-0D
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 15:06:10 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 1d79e3ad-9e28-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 16:06:08 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1d79e3ad-9e28-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646665568;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=by72GStshEPk1Q8XMK8Ic6u1fjNBPB29NDe0lYQKRYI=;
  b=MmZySA2G66ErbOq4ZWyoOBJpC7O6vMwb284hsdGeiKr8kIFGKriM66BF
   Cchq961KJ1Z3PblRJME2H8HA0Fe2Spk0BNAOsZmgZ36eipaTJABsOi9cC
   vp7LPw5Us+6zJR4vUN1y/20R6rwE0Tvc+3zfeBeHhqKsPKlVRGGPJinC4
   o=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65096633
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:lKenT6s9X9MOoI1SYeOp5KluvufnVFReMUV32f8akzHdYApBsoF/q
 tZmKWqFaPrfZGP9e48jb9zg8RkEvZPUzN82TAVvqnpmRCpB+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jV5
 ouoyyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi9qEJTO288fAyUfDjhRO7AZ6JnYK3aG5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AO
 pJIN2Q0N3wsZTVBHg8vMM8Qvdy1oWXUTDRDqVOxqo0Otj27IAtZj+G2bYu9lsaxbdpRtlaVo
 CTB5WuRKgEXMpmTxCSI9lqoh/TThmXrVYQKDrq6+/V2xlqJyQQ7ChcbSF+6qvmRkVOlVpRUL
 El8x8Y1hfFsrgrxFIC7BkDm5i7f1vIBZzZOO64U0QPO4aiE30GEH0cCU2FRTsMsuvZjEFTGy
 WS1t9/uADVutpicRnSc6qqYoFuOBMQFEYMRTXRaFFVYurEPtKl210uSFYg7TMZZm/WoQWmY/
 tyckMQpa1z/Z+Yv3r7zw13IiinESnPhHl9svVW/so5IA2pEiG+Zi26AtAKzARVodt/xory9U
 J8swZT20Qz2JcvR/BFhuc1UdF1T296LMSfHnXlkFIQ7+jKm9haLJN4Mvmwveh82aZZUJVcFh
 XM/XisLuPdu0IaCN/crM+pd9exwpUQfKTgVfq+NNYcfCnSAXASG4DtvdSatM5PFyyARfVUEE
 c7DK66EVC9CYYw+lWbeb7pNgNcDm3FlrUuOFM+T8vhS+efHDJJjYexeawXmgyFQxP7snTg5B
 P4Eb5rak0gECbamCsQVmKZKRW03wbEALcmeg+Rcd/KZIxogH2ckCvTLxqgmdZAjlKNQ/tokN
 FnmMqOE4DITXUH6FDg=
IronPort-HdrOrdr: A9a23:ecjmSa7KUEndSp7N8QPXwX6BI+orL9Y04lQ7vn2ZFiY1TiXIra
 6TdaoguiMc0AxhJ03Jmbi7Sc69qADnhOBICOgqTPiftWzd2FdAQ7sSlrcKrweQfhEWs9QtqZ
 uIEJIORuEYb2IK9/oSiTPQe71LrbX3k9HLuQ6d9QYRcegAUdAH0+4NMHfiLqQAfng+OXNWLu
 v52uN34x6bPVgHZMWyAXcIG8LZocfQqZ7gaRkaQzY69Qinl1qTmf/HOind+i1bfyJEwL8k/2
 SAuRf+/L+fv/ayzQKZ/3PP7q5RhMDqxrJ4dYyxY4kuW3bRYzSTFcFcso65zXQISSaUmREXee
 z30lUd1gJImjXsly+O0ELQMkLboUcTAjfZuC+laD3Y0JTErPZQMbsauWqfGSGpsHbI9esMo5
 5jziaXsYFaAgjHmzm479/UVwtynk7xunY6l/UP5kYvG7f2RYUh5bD3xnklW6vo3RiKn7wPAa
 1rFoXR9fxWeVSVYzTQuXRu2sWlWjA2Eg2dSkYPt8SJ23wO9UoJg3cw1YgahDMN5Zg9Q55L66
 DNNblpjqhHSosTYbhmDOkMTMOrAijGQA7KMmiVPVP7fZt3dk7lutry+vE49euqcJsHwN87n4
 nASkpRsSood0fnGaS1rdR2G9D2MROAtBjWu7RjDsJCy8/BrZLQQFm+dGw=
X-IronPort-AV: E=Sophos;i="5.90,162,1643691600"; 
   d="scan'208";a="65096633"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=iy2rKMU2fuVAAvzt7oh7wdO0ycBTI/X1gNzQL1qo6DAJsZ2Qi+4lKWyw1Ev+9nrXgTSgIu4ITWgpERn3BztTI6y81ZwGdmJxI68i+lgZJf3N1PwlmZASemfVsWcKUjBTEAroy93GwkbjSJ+nyqmNhfIgRubNEODS/La6AXtSgwtB/G9BLt/ewF/7bSCE2PrePIaqU0aQxcdCdYixKJyw/MISu2uWGzsZM8P36ns3F5I4cpi1AaRd2xSqZnxETIJWwqeaFN3cbq0Bgud83iWTGiZYAr9HOt/lQZInkyUT4UMznx/BPjDZw19tLE10fS3/83oFRZg3k1YoaAgfqp+rOg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=46aEkjbHFZN+nf3qZnqMYfC5PjuOEPNVjec/auPrBiY=;
 b=luV42oISNlU5EYvbPFeqCJWy0CSYBjClUapFlfz+k0AM6iVhog2lJ3Khio71hrFtW/dSp+srraSkhyNRGDBW7qp5GvDGtDd8g6A1T5db4rMETlFHNDndU4+XgapFEMnGtVzGBUYDx42K3Mg0LkgKFGGhLHjOPfd2fdXt3KKhV3G9v9n3KQBtrnGlas6B4yoWvA1XhsNhoGrzJUwO0GA1yuf/DT277rSdiBopojCvVF2x//XZh+Fozo14oDQBw/EK80LcG9JmIFKwjrzZRjaO1W+x2KSxQFN9AybZdKI92mrw2AGBEWW4S7bSFQFILgC0ysgdOZBr48uSy3mhdBmZ4g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=46aEkjbHFZN+nf3qZnqMYfC5PjuOEPNVjec/auPrBiY=;
 b=qkMUwe7qy0iDHNWkNeGf60OdFzklpK/F0T40FQ/qCnziVJCKWQbfomL5XlE2E/d8sP8CvWG7FoRNuyg4kzrHYjIJ1P33XSp3kpxdWTeNAikCZGQ2t9PM30VP0Bos3ODxUgmlr3Fc4u0GvZB+i/oJFdwsz84iHG4K/IZy2bvQpO4=
Date: Mon, 7 Mar 2022 16:05:58 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH] x86: avoid SORT_BY_INIT_PRIORITY with old GNU ld
Message-ID: <YiYfVmW3iQ4wA5k/@Air-de-Roger>
References: <8b982bab-9b16-61e7-620f-5a5b2be39588@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <8b982bab-9b16-61e7-620f-5a5b2be39588@suse.com>
X-ClientProxiedBy: LO2P265CA0456.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:e::36) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: fd0d985b-10c9-4cf5-7244-08da004bfe94
X-MS-TrafficTypeDiagnostic: BN8PR03MB5042:EE_
X-Microsoft-Antispam-PRVS: <BN8PR03MB5042DF5C822DB2EC9672072F8F089@BN8PR03MB5042.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(6506007)(6666004)(9686003)(6512007)(6486002)(508600001)(186003)(26005)(85182001)(6916009)(33716001)(54906003)(66946007)(38100700002)(8676002)(66476007)(4326008)(66556008)(316002)(82960400001)(8936002)(2906002)(5660300002)(86362001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?L1RPb2JXYnJwcVhzMkIwcHNXK1ZxZ0I0UjZJOWlZNXdTWVNrcEhWMjgwR1By?=
 =?utf-8?B?MDh2dzRZRVZNK0duS0k0R2Y4MnhjSzRiZ1JQWGdoS1ZjNnZPNmZRSlpySHZO?=
 =?utf-8?B?N0VMSGRxcm5RTlhqWk5obzd5ZHh6WHN6MVc1MUVzYUhVVTNRNjZSUTZhTGtm?=
 =?utf-8?B?SGJ5NE9Ienp2aSs3U3hnblV5Qk91OUdQdnkxMWtRQnFuSDFQcHNHeVZlNG5m?=
 =?utf-8?B?eTlhZ2FoaExsakJrdEFkcGFUSkJlTy8yamM2SG8yQUlBczRRaFRZQW9ZYWlM?=
 =?utf-8?B?cXByL3oveVhzTFV4TS9CUEJ1L3V5WmMyVXlhZGRFQm9NZUl5cTd3dWNjNU9i?=
 =?utf-8?B?UEFHbDJiODRaYjMwUm9MWmY1clp4b1pqS3lOTUduRVZBVzBXVmxkVlZCRzkw?=
 =?utf-8?B?eWg0Sk9VYStLWHJnd01icGhxcWVqSFdhR2prellONHVNVVluL2Q3bVpCRUY4?=
 =?utf-8?B?SjRyL2thOG9IWndiaU1raUQyVGlubEZlSlJubUI1UWp1V1hva1U4RHBzd1NC?=
 =?utf-8?B?TjFMMTAwN0VpS0tPOWd4Z0U4ZE94QkUyQVR4cUVZeWZiODVobk1qVXpxVmJZ?=
 =?utf-8?B?L0F2L3QzRk5OOHI1SVJDQ2VZSmVmQTJXaGFUOFgycElvS25QVFcyeDA2Tjdy?=
 =?utf-8?B?WU81RTZld054cGRBN1I0djZhbzFKR2paaFIxbGtNQXM0ayswYTIrVklFT2pa?=
 =?utf-8?B?VVN4NkJZTGJYSEJST0RIblhYckNFaFNhN3lSM2RLVnVJL2w5NmttalozNVU2?=
 =?utf-8?B?WXlEMkdiYUkzU1cvaEVxcERWMnVjV1UzaE40TjZFRVNuMVlCTVlwRnpMTllH?=
 =?utf-8?B?andnWjBtTmd5OGUyUUVzcTFqL0c2d0RFNWRjd2tKTEg4Tlhma2tYZkVvNm5i?=
 =?utf-8?B?dXJlVC9BdHlSeE1ZWW5Mbi9wMm00SGc2Qjg0b0xVaVBkWFY1MTNSUEJxdnQ3?=
 =?utf-8?B?a1lBRVhmdDV6M09GUXpXUjFWcUo4MmVsZ3V5R3BPUmxzZm4waVVWNThZNThs?=
 =?utf-8?B?dElGUnlrWHJjdWFBc2Jwb2dmODR5N1l5SE1reWpzMTBkOWRNT0xKZ0Uwd21C?=
 =?utf-8?B?SUZoeXBvbGRBQ0Y5QUdzbFNQMngrQUROMDBQcnp6Wko4VzJoT2FjTDJtQVhR?=
 =?utf-8?B?dDkra3VwTUhZS2tPQ1c3U3l1UmYvOUFyc2UycGplNGQzZDFCOTkvS3dURENJ?=
 =?utf-8?B?bnlRdVQyTGxZeTIzRDBJVlRsTjJ0T202UlNZcjFaMXhHazJkVndFSFpDSlln?=
 =?utf-8?B?cGJDZ1hBUVgwV0hidEFpc0VwN3VWWXp3Q2pGc2pFdjVWR2RBYmt3a1ZtVGt4?=
 =?utf-8?B?bnMydXhVWDlIYSs3cnJJNlhxazcycm5JVS84WkQrQnJSUHkrZFFpT1hKSEU1?=
 =?utf-8?B?bUpkMXFuYjZoY3c2N2ZFMldOVTd0ZHhtbFl1WEpEYWlKRVhIU0dPNUcyL1h4?=
 =?utf-8?B?WGJoK0V6M285SHJrVTNyMk9FOTgxTExBbnJlM2FoODFHMzBVZmRvaGdta0g3?=
 =?utf-8?B?bmNzc2ZDNUROSUtCc1V4K0VmUi8yc3BWUXRldXpOZE5iOG85NjgwQ0pBV3Vx?=
 =?utf-8?B?SkFSbXI5TDNKWnA4WlpPY2tyTEdNT1NDMnRZeW9Pakk1bkZXNnNPVlRjTzE0?=
 =?utf-8?B?bnM5TmV5dno2TG1wbDBrbnpSdHgrV3M3UVN3QzUxZlhsa1NwRmJ4YzNFS3Va?=
 =?utf-8?B?QmhHODY5eWpqUnF2dUFWYWlKSGdtSU1wSnhKQVo3eU8zVlg2SSt0dDFCS0la?=
 =?utf-8?B?QU5KakFMcHVDV1gvRnk1Nk0vQUorZ0ZVMVY4UzloUTE4Q3h1S1hNQzRuUmY1?=
 =?utf-8?B?VythLzl6cURRRDhkY2NZQ2dOa09RZVdFNkN6dTFocjRkMG50QTIvREI0S0NF?=
 =?utf-8?B?UHJTK09ya3pxVmFTODNEdHdlWkpyRlo3OWhiam1PRGFSdXBhTXdsS2tWYXd1?=
 =?utf-8?B?VkQxWnYybW9WMW56OUN0UTRlYXpzazlSMUlpa3B1d3l0V0IvcXdmbC9Kd3ha?=
 =?utf-8?B?MmxPU1Q2ekpqNlY0VEVGOXppeGtXV1V3c1VZYlpVOHNqWWV6T3pXUHBhWkdE?=
 =?utf-8?B?SHRFRmFGNnRMd3FKVTc0SFpSdzhtd1p6TUtobWVzTTRvUFJMMzhlSUpiSTJv?=
 =?utf-8?B?SGU1VEVBQURKbkY5aDZsNERhMVVDR2RZKzRXMHYvNVFURjFBemozc29abzJ4?=
 =?utf-8?Q?87eWhJ5cvnAUjr2GobPrif8=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: fd0d985b-10c9-4cf5-7244-08da004bfe94
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 15:06:02.2534
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: x07M3UTQPXlIe8MhyXjjR6YVZSiO49WZn+IcOzZT15Ai7X+6vXGFBalKwElfD5zk9NlV0iRGdWuoP+LYQ6+sjw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN8PR03MB5042
X-OriginatorOrg: citrix.com

On Mon, Mar 07, 2022 at 02:49:32PM +0100, Jan Beulich wrote:
> Support for this construct was added in 2.22 only. Avoid the need to
> introduce logic to probe for linker script capabilities by (ab)using the
> probe for a command line option having appeared at about the same time.
> 
> Fixes: 4b7fd8153ddf ("x86: fold sections in final binaries")
> Signed-off-by: Jan Beulich <jbeulich@suse.com>
> ---
> Obviously this doesn't take care of old LLVM ld yet, if any care is
> needed there in the first place.
> 
> --- a/xen/arch/x86/arch.mk
> +++ b/xen/arch/x86/arch.mk
> @@ -70,6 +70,11 @@ ifeq ($(CONFIG_UBSAN),y)
>  $(call cc-option-add,CFLAGS_UBSAN,CC,-fno-sanitize=alignment)
>  endif
>  
> +# While not much better than going by raw GNU ld version, utilize that the
> +# feature we're after has appeared in the same release as the
> +# --print-output-format command line option.
> +AFLAGS-$(call ld-option,--print-output-format) += -DHAVE_LD_SORT_BY_INIT_PRIORITY

LLVM ld doesn't have --print-output-format:

% ld --print-output-format
ld: error: unknown argument '--print-output-format'

So it would be always defaulting to SORT. I'm not sure what to
recommend.

Regards, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 15:06:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 15:06:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286167.485570 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREwL-0003Od-LI; Mon, 07 Mar 2022 15:06:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286167.485570; Mon, 07 Mar 2022 15:06:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREwL-0003OU-I7; Mon, 07 Mar 2022 15:06:25 +0000
Received: by outflank-mailman (input) for mailman id 286167;
 Mon, 07 Mar 2022 15:06:24 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=NixE=TS=citrix.com=prvs=05809d0ec=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nREwK-0002xD-Ga
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 15:06:24 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 26508988-9e28-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 16:06:23 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 26508988-9e28-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646665583;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=iwyxUg1jLsfl7bKz9mfciR2QE1g4jrUE9CZvlOdbhmk=;
  b=Dpby/gRa84vPef62dtnAcs4PHyJYnZn47qa0Dwb23Fr1tamigTf0iJfP
   V37ZRIdRmMB5TBfQ5m15oInpvPKtCdwk//p9siDPH3rxrWNAWq4CjeGl2
   JxYTtkDHhHidWStrssCO1PAqRHyz62rY3WKRKVKBQH3gPubbzXA0xmw96
   g=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 65628148
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:e+TplaJNXRE9rSC9FE+RgZUlxSXFcZb7ZxGr2PjKsXjdYENS0zMEm
 GpNCjuGa/qMZGH1L9t3PNyz900Bv5fdnNQyGgJlqX01Q3x08seUXt7xwmUcns+xwm8vaGo9s
 q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUYYoAQgsA148IMsdoUg7wbRh2dY32YLR7z6l4
 rseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3fMldG0DQUIhMdtNWc
 s6YpF2PEsE1yD92Yj+tuu6TnkTn2dc+NyDW4pZdc/DKbhSvOkXee0v0XRYRQR4/ttmHozx+4
 MdHmMeQFh4oBa3dm/YRYQNfUCpiF6ITrdcrIVDn2SCS50jPcn+qyPRyFkAme4Yf/46bA0kXq
 6ZecmpUKEne2aTmm9pXScE17ignBOviOo5Zn3hkxDXQC/sOSpHfWaTao9Rf2V/cg+gQQKiEN
 5NFOVKDajzAeDNqH0oTEa4Hjb6SiXnyQhl3mQ2K8P9fD2/7k1UqjemF3MDuUsyHQ4BZk1iVo
 krC/n/lGVcKOdqH0z2H/3mwwOjVkkvGtJk6TePisKQw2RvKmzJVWEZ+uUaHTeeRmESTAPIAM
 k0v+jstv6QA7kvoRcXXUEjtyJKbhSI0V91VGuw8zQiCzKvI/gqUblQ5oi59hM8O75FvG2Fzv
 rOdt5awXGE07uXJIZ6I3urM9VuP1T4pwXjujMPuZS8M+JHdrY46lXojpf4zQffu3rUZ9dwdq
 g1mTRTSZZ1O16bnNI3hpDgrZg5AQbCTEmYICv3/BD7N0++ATNfNi3aUwVba9+1cC42SU0OMu
 nMJ8+DHsrxQUMDTzHPWELVRdF1M2xpiGGeA6WOD4rF7r2j9k5JdVdo4DM5CyLdBbZ9fJG6Bj
 L77sgJN/p5DVEZGnocsC79d//8ClPC6ffy8D6i8RoMXPvBZKV/WlAkzNBX49z28zyARfVQXZ
 M7znTCEVi1BV8yKDVOeGo8g7FPc7ntmlDOLGMuilEzPPHj3TCf9dIrp+WCmNogRhJ5oai2Pm
 zqDH6NmEylibdA=
IronPort-HdrOrdr: A9a23:ArMoo6swAG11NHKukfvTflzP7skDX9V00zEX/kB9WHVpm5qj5r
 iTdZMgpHvJYVcqKRQdcbLpAsO9qBbnmKKdjrN8AV7PZmbbUQiTXeNfBOnZowEIQBeOj9K1vJ
 0IG8ND4bvLY2SS5vyKgzVQfexA/DEpmprY/ts3Yx1WPGZXgwAL1XYeNjqm
X-IronPort-AV: E=Sophos;i="5.90,162,1643691600"; 
   d="scan'208";a="65628148"
From: Jane Malalane <jane.malalane@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Jane Malalane <jane.malalane@citrix.com>
Subject: [PATCH v5 0/2] xen: Report and use hardware APIC virtualization capabilities
Date: Mon, 7 Mar 2022 15:06:07 +0000
Message-ID: <20220307150609.10662-1-jane.malalane@citrix.com>
X-Mailer: git-send-email 2.11.0
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

Jane Malalane (2):
  xen+tools: Report Interrupt Controller Virtualization capabilities on
    x86
  x86/xen: Allow per-domain usage of hardware virtualized APIC

 docs/man/xl.cfg.5.pod.in                | 19 ++++++++++++++++
 docs/man/xl.conf.5.pod.in               | 12 ++++++++++
 tools/golang/xenlight/helpers.gen.go    | 16 ++++++++++++++
 tools/golang/xenlight/types.gen.go      |  4 ++++
 tools/include/libxl.h                   | 14 ++++++++++++
 tools/libs/light/libxl.c                |  3 +++
 tools/libs/light/libxl_arch.h           |  9 ++++++--
 tools/libs/light/libxl_arm.c            | 12 ++++++++--
 tools/libs/light/libxl_create.c         | 22 +++++++++++--------
 tools/libs/light/libxl_types.idl        |  4 ++++
 tools/libs/light/libxl_x86.c            | 39 +++++++++++++++++++++++++++++++--
 tools/ocaml/libs/xc/xenctrl.ml          |  7 ++++++
 tools/ocaml/libs/xc/xenctrl.mli         |  7 ++++++
 tools/ocaml/libs/xc/xenctrl_stubs.c     | 16 ++++++++++----
 tools/xl/xl.c                           |  8 +++++++
 tools/xl/xl.h                           |  2 ++
 tools/xl/xl_info.c                      |  6 +++--
 tools/xl/xl_parse.c                     | 16 ++++++++++++++
 xen/arch/x86/domain.c                   | 28 ++++++++++++++++++++++-
 xen/arch/x86/hvm/vmx/vmcs.c             | 13 +++++++++++
 xen/arch/x86/hvm/vmx/vmx.c              | 13 ++++-------
 xen/arch/x86/include/asm/domain.h       |  3 +++
 xen/arch/x86/include/asm/hvm/domain.h   |  6 +++++
 xen/arch/x86/include/asm/hvm/vmx/vmcs.h |  3 +++
 xen/arch/x86/sysctl.c                   |  7 ++++++
 xen/arch/x86/traps.c                    |  9 ++++----
 xen/include/public/arch-x86/xen.h       |  2 ++
 xen/include/public/sysctl.h             | 11 +++++++++-
 28 files changed, 275 insertions(+), 36 deletions(-)

-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 15:06:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 15:06:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286169.485581 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREwN-0003gu-U4; Mon, 07 Mar 2022 15:06:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286169.485581; Mon, 07 Mar 2022 15:06:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREwN-0003gl-Qj; Mon, 07 Mar 2022 15:06:27 +0000
Received: by outflank-mailman (input) for mailman id 286169;
 Mon, 07 Mar 2022 15:06:26 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=NixE=TS=citrix.com=prvs=05809d0ec=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nREwM-0003OR-Iy
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 15:06:26 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 26793aa6-9e28-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 16:06:23 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 26793aa6-9e28-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646665583;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=gzl4AlZfYu+Ry/lc9a2klVkao8TiQODPSjeG9hsX6p4=;
  b=GZgYjLJJ7NTLm/AAFbuVhnlNSzQN3jVbjvzSPj5iWTFZxz5V4rnSMoO5
   pXnhcHrCg9RqoMfjmFiSYIeJ+P5R0dN5P0VMb7xjwshfRrjhCm1o5J4wv
   sFM2knbgQW57o5Q8Gv4js+gKYu6okgs49gthPyCgKHiyeOeHR39xQNoe+
   A=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 65617982
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:+I0pI6Cav313bBVW/73jw5YqxClBgxIJ4kV8jS/XYbTApGh21WQDy
 DEXWGmOb6nYYmDyc4gkb4W2/E8D6JfXz9NjQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vh3dYy6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPh8z
 fBfh42SWDsHZKDu391FQRBbQn1HaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguwBJc/meqYWvnhkxDfUJf0nXYrCU+PB4towMDIY2J0QRKmPN
 5BxhTxHYDjPJENDPHctBakhmMeChmL2UhsAkQfAzUYwyzeKl1EguFT3C/LrfdiNSdRQj1yvj
 GvM9GTkATkXLNWajzGC9xqEnfTTlCn2XIYTEryQ9fNwhlCXgGsJB3U+X1ahveOwjEL4XttFM
 lEV4QInt610/0uuJvH+UgO5pjiYvxcac9tWD+A+rgqKz8L84RufQG4NTTdDadkvnM4wWTEuk
 FSOmrvBBzN1t6aOYWmA7brSpjS3UQAFIGlHaSIaQA8t59j4vJp1nh/JVsxkEqO+kpvyAz6Y6
 zKAoTU6hr4TpdUWzKj99lfC6xquu5zIQwgd9gjRGGW/4WtRe4qNd4Gur1/B4p59wJ2xFwfb+
 iJewo7Hsb5IXcrleDGxrPslEbSM9cSUEizgrwRiPd4Yryak+C//RNUFiN1hH3tBPsEBcD7vR
 UbcvwJN+ZNeVEeXgb9Lj5GZUJpzk/W5fTjxfrWNN4cVPMAtHOOS1Hw2PSatM3bRfF/AeE3VE
 bOSao6SAHkTEsyLJxLmFr5GgdfHKs3TrF4/pKwXLTz6i9Jyh1bPEN/p1WdiichjsMu5TP39q
 Yo3Cidz40w3vBfCSifW65UPClsBMGI2A5v7w+QOKLLdf1s4QD56W6+NqV/ER2CCt/4J/tokA
 1nnAhMIoLYBrSevxfq2hoBLN+q0AMcXQYMTNi0wJ1e4s0XPkq70hJrzg6AfJOF9nMQ6lKYcZ
 6BcJ62oX6QeIhyaqm91RcSs8+RfmOGD2Fvm09yNO2NkIfaNhmXhp7fZQ+cY3HJWX3rv6JBn+
 OXIO8GyacNrejmOxf3+MJqHp25dd1BH8A6udyMk+uVuRXg=
IronPort-HdrOrdr: A9a23:1tJJ1KOfIHUGj8BcTvmjsMiBIKoaSvp037Eqv3oedfUzSL3gqy
 nOpoV86faaslYssR0b9exofZPwJE80lqQFhrX5X43SPzUO0VHAROoJgLcKgQeQfxEWntQtrZ
 uIGJIeNDSfNzdHZL7BkWuFL+o=
X-IronPort-AV: E=Sophos;i="5.90,162,1643691600"; 
   d="scan'208";a="65617982"
From: Jane Malalane <jane.malalane@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Jane Malalane <jane.malalane@citrix.com>, Wei Liu <wl@xen.org>, "Anthony
 PERARD" <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien Grall
	<julien@xen.org>, "Stefano Stabellini" <sstabellini@kernel.org>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian
	<kevin.tian@intel.com>, =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?=
	<roger.pau@citrix.com>
Subject: [PATCH v5 1/2] xen+tools: Report Interrupt Controller Virtualization capabilities on x86
Date: Mon, 7 Mar 2022 15:06:08 +0000
Message-ID: <20220307150609.10662-2-jane.malalane@citrix.com>
X-Mailer: git-send-email 2.11.0
In-Reply-To: <20220307150609.10662-1-jane.malalane@citrix.com>
References: <20220307150609.10662-1-jane.malalane@citrix.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

Add XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_xapic and
XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_x2apic to report accelerated xapic
and x2apic, on x86 hardware.
No such features are currently implemented on AMD hardware.

HW assisted xAPIC virtualization will be reported if HW, at the
minimum, supports virtualize_apic_accesses as this feature alone means
that an access to the APIC page will cause an APIC-access VM exit. An
APIC-access VM exit provides a VMM with information about the access
causing the VM exit, unlike a regular EPT fault, thus simplifying some
internal handling.

HW assisted x2APIC virtualization will be reported if HW supports
virtualize_x2apic_mode and, at least, either apic_reg_virt or
virtual_intr_delivery. This is due to apic_reg_virt and
virtual_intr_delivery preventing a VM exit from occuring or at least
replacing a regular EPT fault VM-exit with an APIC-access VM-exit on
read and write APIC accesses, respectively. This also means that
sysctl follows the conditionals in vmx_vlapic_msr_changed().

For that purpose, also add an arch-specific "capabilities" parameter
to struct xen_sysctl_physinfo.

Note that this interface is intended to be compatible with AMD so that
AVIC support can be introduced in a future patch. Unlike Intel that
has multiple controls for APIC Virtualization, AMD has one global
'AVIC Enable' control bit, so fine-graining of APIC virtualization
control cannot be done on a common interface.

Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Jane Malalane <jane.malalane@citrix.com>
---
CC: Wei Liu <wl@xen.org>
CC: Anthony PERARD <anthony.perard@citrix.com>
CC: Juergen Gross <jgross@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>
CC: George Dunlap <george.dunlap@citrix.com>
CC: Jan Beulich <jbeulich@suse.com>
CC: Julien Grall <julien@xen.org>
CC: Stefano Stabellini <sstabellini@kernel.org>
CC: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
CC: Bertrand Marquis <bertrand.marquis@arm.com>
CC: Jun Nakajima <jun.nakajima@intel.com>
CC: Kevin Tian <kevin.tian@intel.com>
CC: "Roger Pau Monné" <roger.pau@citrix.com>

v5:
* Have assisted_xapic_available solely depend on
  cpu_has_vmx_virtualize_apic_accesses and assisted_x2apic_available
  depend on cpu_has_vmx_virtualize_x2apic_mode and
  cpu_has_vmx_apic_reg_virt OR cpu_has_vmx_virtual_intr_delivery.

v4:
 * Fallback to the original v2/v1 conditions for setting
   assisted_xapic_available and assisted_x2apic_available so that in
   the future APIC virtualization can be exposed on AMD hardware
   since fine-graining of "AVIC" is not supported, i.e., AMD solely
   uses "AVIC Enable". This also means that sysctl mimics what's
   exposed in CPUID.

v3:
 * Define XEN_SYSCTL_PHYSCAP_ARCH_MAX for ABI checking and actually
   set "arch_capbilities", via a call to c_bitmap_to_ocaml_list()
 * Have assisted_x2apic_available only depend on
   cpu_has_vmx_virtualize_x2apic_mode

v2:
 * Use one macro LIBXL_HAVE_PHYSINFO_ASSISTED_APIC instead of two
 * Pass xcpyshinfo as a pointer in libxl__arch_get_physinfo
 * Set assisted_x{2}apic_available to be conditional upon "bsp" and
   annotate it with __ro_after_init
 * Change XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_X{2}APIC to
   _X86_ASSISTED_X{2}APIC
 * Keep XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X{2}APIC contained within
   sysctl.h
 * Fix padding introduced in struct xen_sysctl_physinfo and bump
   XEN_SYSCTL_INTERFACE_VERSION
---
 tools/golang/xenlight/helpers.gen.go |  4 ++++
 tools/golang/xenlight/types.gen.go   |  2 ++
 tools/include/libxl.h                |  7 +++++++
 tools/libs/light/libxl.c             |  3 +++
 tools/libs/light/libxl_arch.h        |  4 ++++
 tools/libs/light/libxl_arm.c         |  5 +++++
 tools/libs/light/libxl_types.idl     |  2 ++
 tools/libs/light/libxl_x86.c         | 11 +++++++++++
 tools/ocaml/libs/xc/xenctrl.ml       |  5 +++++
 tools/ocaml/libs/xc/xenctrl.mli      |  5 +++++
 tools/ocaml/libs/xc/xenctrl_stubs.c  | 14 +++++++++++---
 tools/xl/xl_info.c                   |  6 ++++--
 xen/arch/x86/hvm/vmx/vmcs.c          |  9 +++++++++
 xen/arch/x86/include/asm/domain.h    |  3 +++
 xen/arch/x86/sysctl.c                |  7 +++++++
 xen/include/public/sysctl.h          | 11 ++++++++++-
 16 files changed, 92 insertions(+), 6 deletions(-)

diff --git a/tools/golang/xenlight/helpers.gen.go b/tools/golang/xenlight/helpers.gen.go
index b746ff1081..dd4e6c9f14 100644
--- a/tools/golang/xenlight/helpers.gen.go
+++ b/tools/golang/xenlight/helpers.gen.go
@@ -3373,6 +3373,8 @@ x.CapVmtrace = bool(xc.cap_vmtrace)
 x.CapVpmu = bool(xc.cap_vpmu)
 x.CapGnttabV1 = bool(xc.cap_gnttab_v1)
 x.CapGnttabV2 = bool(xc.cap_gnttab_v2)
+x.CapAssistedXapic = bool(xc.cap_assisted_xapic)
+x.CapAssistedX2Apic = bool(xc.cap_assisted_x2apic)
 
  return nil}
 
@@ -3407,6 +3409,8 @@ xc.cap_vmtrace = C.bool(x.CapVmtrace)
 xc.cap_vpmu = C.bool(x.CapVpmu)
 xc.cap_gnttab_v1 = C.bool(x.CapGnttabV1)
 xc.cap_gnttab_v2 = C.bool(x.CapGnttabV2)
+xc.cap_assisted_xapic = C.bool(x.CapAssistedXapic)
+xc.cap_assisted_x2apic = C.bool(x.CapAssistedX2Apic)
 
  return nil
  }
diff --git a/tools/golang/xenlight/types.gen.go b/tools/golang/xenlight/types.gen.go
index b1e84d5258..87be46c745 100644
--- a/tools/golang/xenlight/types.gen.go
+++ b/tools/golang/xenlight/types.gen.go
@@ -1014,6 +1014,8 @@ CapVmtrace bool
 CapVpmu bool
 CapGnttabV1 bool
 CapGnttabV2 bool
+CapAssistedXapic bool
+CapAssistedX2Apic bool
 }
 
 type Connectorinfo struct {
diff --git a/tools/include/libxl.h b/tools/include/libxl.h
index 51a9b6cfac..94e6355822 100644
--- a/tools/include/libxl.h
+++ b/tools/include/libxl.h
@@ -528,6 +528,13 @@
 #define LIBXL_HAVE_MAX_GRANT_VERSION 1
 
 /*
+ * LIBXL_HAVE_PHYSINFO_ASSISTED_APIC indicates that libxl_physinfo has
+ * cap_assisted_xapic and cap_assisted_x2apic fields, which indicates
+ * the availability of x{2}APIC hardware assisted virtualization.
+ */
+#define LIBXL_HAVE_PHYSINFO_ASSISTED_APIC 1
+
+/*
  * libxl ABI compatibility
  *
  * The only guarantee which libxl makes regarding ABI compatibility
diff --git a/tools/libs/light/libxl.c b/tools/libs/light/libxl.c
index a0bf7d186f..6d699951e2 100644
--- a/tools/libs/light/libxl.c
+++ b/tools/libs/light/libxl.c
@@ -15,6 +15,7 @@
 #include "libxl_osdeps.h"
 
 #include "libxl_internal.h"
+#include "libxl_arch.h"
 
 int libxl_ctx_alloc(libxl_ctx **pctx, int version,
                     unsigned flags, xentoollog_logger * lg)
@@ -410,6 +411,8 @@ int libxl_get_physinfo(libxl_ctx *ctx, libxl_physinfo *physinfo)
     physinfo->cap_gnttab_v2 =
         !!(xcphysinfo.capabilities & XEN_SYSCTL_PHYSCAP_gnttab_v2);
 
+    libxl__arch_get_physinfo(physinfo, &xcphysinfo);
+
     GC_FREE;
     return 0;
 }
diff --git a/tools/libs/light/libxl_arch.h b/tools/libs/light/libxl_arch.h
index 1522ecb97f..207ceac6a1 100644
--- a/tools/libs/light/libxl_arch.h
+++ b/tools/libs/light/libxl_arch.h
@@ -86,6 +86,10 @@ int libxl__arch_extra_memory(libxl__gc *gc,
                              uint64_t *out);
 
 _hidden
+void libxl__arch_get_physinfo(libxl_physinfo *physinfo,
+                              const xc_physinfo_t *xcphysinfo);
+
+_hidden
 void libxl__arch_update_domain_config(libxl__gc *gc,
                                       libxl_domain_config *dst,
                                       const libxl_domain_config *src);
diff --git a/tools/libs/light/libxl_arm.c b/tools/libs/light/libxl_arm.c
index eef1de0939..39fdca1b49 100644
--- a/tools/libs/light/libxl_arm.c
+++ b/tools/libs/light/libxl_arm.c
@@ -1431,6 +1431,11 @@ int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
     return rc;
 }
 
+void libxl__arch_get_physinfo(libxl_physinfo *physinfo,
+                              const xc_physinfo_t *xcphysinfo)
+{
+}
+
 void libxl__arch_update_domain_config(libxl__gc *gc,
                                       libxl_domain_config *dst,
                                       const libxl_domain_config *src)
diff --git a/tools/libs/light/libxl_types.idl b/tools/libs/light/libxl_types.idl
index 2a42da2f7d..42ac6c357b 100644
--- a/tools/libs/light/libxl_types.idl
+++ b/tools/libs/light/libxl_types.idl
@@ -1068,6 +1068,8 @@ libxl_physinfo = Struct("physinfo", [
     ("cap_vpmu", bool),
     ("cap_gnttab_v1", bool),
     ("cap_gnttab_v2", bool),
+    ("cap_assisted_xapic", bool),
+    ("cap_assisted_x2apic", bool),
     ], dir=DIR_OUT)
 
 libxl_connectorinfo = Struct("connectorinfo", [
diff --git a/tools/libs/light/libxl_x86.c b/tools/libs/light/libxl_x86.c
index 1feadebb18..e0a06ecfe3 100644
--- a/tools/libs/light/libxl_x86.c
+++ b/tools/libs/light/libxl_x86.c
@@ -866,6 +866,17 @@ int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
     return rc;
 }
 
+void libxl__arch_get_physinfo(libxl_physinfo *physinfo,
+                              const xc_physinfo_t *xcphysinfo)
+{
+    physinfo->cap_assisted_xapic =
+        !!(xcphysinfo->arch_capabilities &
+           XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC);
+    physinfo->cap_assisted_x2apic =
+        !!(xcphysinfo->arch_capabilities &
+           XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC);
+}
+
 void libxl__arch_update_domain_config(libxl__gc *gc,
                                       libxl_domain_config *dst,
                                       const libxl_domain_config *src)
diff --git a/tools/ocaml/libs/xc/xenctrl.ml b/tools/ocaml/libs/xc/xenctrl.ml
index 7503031d8f..21783d3622 100644
--- a/tools/ocaml/libs/xc/xenctrl.ml
+++ b/tools/ocaml/libs/xc/xenctrl.ml
@@ -127,6 +127,10 @@ type physinfo_cap_flag =
 	| CAP_Gnttab_v1
 	| CAP_Gnttab_v2
 
+type physinfo_arch_cap_flag =
+	| CAP_X86_ASSISTED_XAPIC
+	| CAP_X86_ASSISTED_X2APIC
+
 type physinfo =
 {
 	threads_per_core : int;
@@ -139,6 +143,7 @@ type physinfo =
 	scrub_pages      : nativeint;
 	(* XXX hw_cap *)
 	capabilities     : physinfo_cap_flag list;
+	arch_capabilities : physinfo_arch_cap_flag list;
 	max_nr_cpus      : int;
 }
 
diff --git a/tools/ocaml/libs/xc/xenctrl.mli b/tools/ocaml/libs/xc/xenctrl.mli
index d1d9c9247a..af6ba3d1a0 100644
--- a/tools/ocaml/libs/xc/xenctrl.mli
+++ b/tools/ocaml/libs/xc/xenctrl.mli
@@ -112,6 +112,10 @@ type physinfo_cap_flag =
   | CAP_Gnttab_v1
   | CAP_Gnttab_v2
 
+type physinfo_arch_cap_flag =
+  | CAP_X86_ASSISTED_XAPIC
+  | CAP_X86_ASSISTED_X2APIC
+
 type physinfo = {
   threads_per_core : int;
   cores_per_socket : int;
@@ -122,6 +126,7 @@ type physinfo = {
   free_pages       : nativeint;
   scrub_pages      : nativeint;
   capabilities     : physinfo_cap_flag list;
+  arch_capabilities : physinfo_arch_cap_flag list;
   max_nr_cpus      : int; (** compile-time max possible number of nr_cpus *)
 }
 type version = { major : int; minor : int; extra : string; }
diff --git a/tools/ocaml/libs/xc/xenctrl_stubs.c b/tools/ocaml/libs/xc/xenctrl_stubs.c
index 5b4fe72c8d..e0d49b18d2 100644
--- a/tools/ocaml/libs/xc/xenctrl_stubs.c
+++ b/tools/ocaml/libs/xc/xenctrl_stubs.c
@@ -712,7 +712,7 @@ CAMLprim value stub_xc_send_debug_keys(value xch, value keys)
 CAMLprim value stub_xc_physinfo(value xch)
 {
 	CAMLparam1(xch);
-	CAMLlocal2(physinfo, cap_list);
+	CAMLlocal3(physinfo, cap_list, arch_cap_list);
 	xc_physinfo_t c_physinfo;
 	int r;
 
@@ -730,8 +730,15 @@ CAMLprim value stub_xc_physinfo(value xch)
 		/* ! physinfo_cap_flag CAP_ lc */
 		/* ! XEN_SYSCTL_PHYSCAP_ XEN_SYSCTL_PHYSCAP_MAX max */
 		(c_physinfo.capabilities);
+	/*
+	 * arch_capabilities: physinfo_arch_cap_flag list;
+	 */
+	arch_cap_list = c_bitmap_to_ocaml_list
+		/* ! physinfo_arch_cap_flag CAP_ none */
+		/* ! XEN_SYSCTL_PHYSCAP_ XEN_SYSCTL_PHYSCAP_X86_MAX max */
+		(c_physinfo.arch_capabilities);
 
-	physinfo = caml_alloc_tuple(10);
+	physinfo = caml_alloc_tuple(11);
 	Store_field(physinfo, 0, Val_int(c_physinfo.threads_per_core));
 	Store_field(physinfo, 1, Val_int(c_physinfo.cores_per_socket));
 	Store_field(physinfo, 2, Val_int(c_physinfo.nr_cpus));
@@ -741,7 +748,8 @@ CAMLprim value stub_xc_physinfo(value xch)
 	Store_field(physinfo, 6, caml_copy_nativeint(c_physinfo.free_pages));
 	Store_field(physinfo, 7, caml_copy_nativeint(c_physinfo.scrub_pages));
 	Store_field(physinfo, 8, cap_list);
-	Store_field(physinfo, 9, Val_int(c_physinfo.max_cpu_id + 1));
+	Store_field(physinfo, 9, arch_cap_list);
+	Store_field(physinfo, 10, Val_int(c_physinfo.max_cpu_id + 1));
 
 	CAMLreturn(physinfo);
 }
diff --git a/tools/xl/xl_info.c b/tools/xl/xl_info.c
index 712b7638b0..3205270754 100644
--- a/tools/xl/xl_info.c
+++ b/tools/xl/xl_info.c
@@ -210,7 +210,7 @@ static void output_physinfo(void)
          info.hw_cap[4], info.hw_cap[5], info.hw_cap[6], info.hw_cap[7]
         );
 
-    maybe_printf("virt_caps              :%s%s%s%s%s%s%s%s%s%s%s\n",
+    maybe_printf("virt_caps              :%s%s%s%s%s%s%s%s%s%s%s%s%s\n",
          info.cap_pv ? " pv" : "",
          info.cap_hvm ? " hvm" : "",
          info.cap_hvm && info.cap_hvm_directio ? " hvm_directio" : "",
@@ -221,7 +221,9 @@ static void output_physinfo(void)
          info.cap_vmtrace ? " vmtrace" : "",
          info.cap_vpmu ? " vpmu" : "",
          info.cap_gnttab_v1 ? " gnttab-v1" : "",
-         info.cap_gnttab_v2 ? " gnttab-v2" : ""
+         info.cap_gnttab_v2 ? " gnttab-v2" : "",
+         info.cap_assisted_xapic ? " assisted_xapic" : "",
+         info.cap_assisted_x2apic ? " assisted_x2apic" : ""
         );
 
     vinfo = libxl_get_version_info(ctx);
diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
index e1e1fa14e6..06831099ed 100644
--- a/xen/arch/x86/hvm/vmx/vmcs.c
+++ b/xen/arch/x86/hvm/vmx/vmcs.c
@@ -343,6 +343,15 @@ static int vmx_init_vmcs_config(bool bsp)
             MSR_IA32_VMX_PROCBASED_CTLS2, &mismatch);
     }
 
+    /* Check whether hardware supports accelerated xapic and x2apic. */
+    if ( bsp )
+    {
+        assisted_xapic_available = cpu_has_vmx_virtualize_apic_accesses;
+        assisted_x2apic_available = (cpu_has_vmx_virtualize_x2apic_mode &&
+                                     (cpu_has_vmx_apic_reg_virt ||
+                                      cpu_has_vmx_virtual_intr_delivery));
+    }
+
     /* The IA32_VMX_EPT_VPID_CAP MSR exists only when EPT or VPID available */
     if ( _vmx_secondary_exec_control & (SECONDARY_EXEC_ENABLE_EPT |
                                         SECONDARY_EXEC_ENABLE_VPID) )
diff --git a/xen/arch/x86/include/asm/domain.h b/xen/arch/x86/include/asm/domain.h
index e62e109598..72431df26d 100644
--- a/xen/arch/x86/include/asm/domain.h
+++ b/xen/arch/x86/include/asm/domain.h
@@ -756,6 +756,9 @@ static inline void pv_inject_sw_interrupt(unsigned int vector)
                       : is_pv_32bit_domain(d) ? PV32_VM_ASSIST_MASK \
                                               : PV64_VM_ASSIST_MASK)
 
+extern bool assisted_xapic_available;
+extern bool assisted_x2apic_available;
+
 #endif /* __ASM_DOMAIN_H__ */
 
 /*
diff --git a/xen/arch/x86/sysctl.c b/xen/arch/x86/sysctl.c
index f82abc2488..ad95c86aef 100644
--- a/xen/arch/x86/sysctl.c
+++ b/xen/arch/x86/sysctl.c
@@ -69,6 +69,9 @@ struct l3_cache_info {
     unsigned long size;
 };
 
+bool __ro_after_init assisted_xapic_available;
+bool __ro_after_init assisted_x2apic_available;
+
 static void cf_check l3_cache_get(void *arg)
 {
     struct cpuid4_info info;
@@ -135,6 +138,10 @@ void arch_do_physinfo(struct xen_sysctl_physinfo *pi)
         pi->capabilities |= XEN_SYSCTL_PHYSCAP_hap;
     if ( IS_ENABLED(CONFIG_SHADOW_PAGING) )
         pi->capabilities |= XEN_SYSCTL_PHYSCAP_shadow;
+    if ( assisted_xapic_available )
+        pi->arch_capabilities |= XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC;
+    if ( assisted_x2apic_available )
+        pi->arch_capabilities |= XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC;
 }
 
 long arch_do_sysctl(
diff --git a/xen/include/public/sysctl.h b/xen/include/public/sysctl.h
index 55252e97f2..7fe05be0c9 100644
--- a/xen/include/public/sysctl.h
+++ b/xen/include/public/sysctl.h
@@ -35,7 +35,7 @@
 #include "domctl.h"
 #include "physdev.h"
 
-#define XEN_SYSCTL_INTERFACE_VERSION 0x00000014
+#define XEN_SYSCTL_INTERFACE_VERSION 0x00000015
 
 /*
  * Read console content from Xen buffer ring.
@@ -111,6 +111,13 @@ struct xen_sysctl_tbuf_op {
 /* Max XEN_SYSCTL_PHYSCAP_* constant.  Used for ABI checking. */
 #define XEN_SYSCTL_PHYSCAP_MAX XEN_SYSCTL_PHYSCAP_gnttab_v2
 
+/* The platform supports x{2}apic hardware assisted emulation. */
+#define XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC  (1u << 0)
+#define XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC (1u << 1)
+
+/* Max XEN_SYSCTL_PHYSCAP_X86__* constant. Used for ABI checking. */
+#define XEN_SYSCTL_PHYSCAP_X86_MAX XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC
+
 struct xen_sysctl_physinfo {
     uint32_t threads_per_core;
     uint32_t cores_per_socket;
@@ -120,6 +127,8 @@ struct xen_sysctl_physinfo {
     uint32_t max_node_id; /* Largest possible node ID on this host */
     uint32_t cpu_khz;
     uint32_t capabilities;/* XEN_SYSCTL_PHYSCAP_??? */
+    uint32_t arch_capabilities;/* XEN_SYSCTL_PHYSCAP_X86{ARM}_??? */
+    uint32_t pad;
     uint64_aligned_t total_pages;
     uint64_aligned_t free_pages;
     uint64_aligned_t scrub_pages;
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 15:06:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 15:06:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286173.485591 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREwb-0004EE-DH; Mon, 07 Mar 2022 15:06:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286173.485591; Mon, 07 Mar 2022 15:06:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nREwb-0004E5-A5; Mon, 07 Mar 2022 15:06:41 +0000
Received: by outflank-mailman (input) for mailman id 286173;
 Mon, 07 Mar 2022 15:06:40 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=NixE=TS=citrix.com=prvs=05809d0ec=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nREwZ-0003OR-V6
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 15:06:40 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2daa7cf7-9e28-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 16:06:37 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2daa7cf7-9e28-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646665597;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=teZVFNEWlZY3YSJiz8w18cNAADCO+kDEO4BTiglA8Uw=;
  b=drDHA0LN4YFPU2GRPi/iZttWThEAl7kTHANc1aSVhvQ7JAdDCIO9IdRs
   G6PPzEQ9SFsIO5hSTXRMGIpLwtq8/duGpfmOwIV5ngQ8a+cKzxmwqWgL1
   JrIYCW8mk11+JmNAWAcbV6sBaY0BnhZxeg6AODLNhmPb8Q4THJRunZTU3
   s=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 67966231
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:0o+wpa0dfUhz0fFCt/bD5Q1xkn2cJEfYwER7XKvMYLTBsI5bpzQFy
 mMWCz+OM6mNYjCnfNF+bom38EsAscPVyd9iSwI/pC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUw3oDja++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /1XqI2sTB41EZbyhfUEFEVfETx3I4N/reqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHJNYUS/FRpyTjdBPAraZvCX7/L9ZlT2zJYasVmQ6mPO
 ZRDMmMHgBLoTxtTPVZPUYsHlfqUunD+azYAqEiTjP9ii4TU5FMoi+W8WDbPQfSRXtlclEuco
 mPA/kz6DwscOdjZziCKmlqum+vOkCXTSI8UUrqi+ZZCvlqXwWACDQwMYnGyq/K5l02WVspWL
 gof/S9GhaQ76kGDVNT2WBy85nmesXY0WdVKFPYhwBqQ0aeS6AGcbkAUQzgEZNE4ucseQT0xy
 kTPj97vHSZosrCeVTSa7Lj8hSy2ETgYKykFfyBsZQkP7sTnoYozpgnSVdslG6mw5uAZAhmpn
 WrM9nJnwexO04hbjM1X4GwrnRq2u4nVSxcpyT7pQ3O8qV9+ZpOseaKRvA2zAel7EK6VSVyIv
 X4hkseY7fwTAZzlqBFhUNnhD5nyua/bbWS0bUpHWsB4qm/zoyLLkZV4vWkmTHqFJProbtMAj
 KX7nQpKrKFeM3KxBUOcS9LgUp96pUQM+DmMaxw1UjasSsUrHONk1Hs3DaJ144wKuBJw+ZzTw
 b/BLa6R4Y8yUMyLNgaeSeYHyqMMzSsj327VTp2T5035jeTDNSDNFuxVYAfmggUFAESs+lm9z
 jqiH5HSl0U3vBPWOEE7DrL/3XhVdCNmVPgaWuRcd/KZIxoOJY3SI6S5/F/VQKQ8x/49vr6Rp
 hmVAxYEoHKi1SyvAVjbMRhLNeKwNauTWFpmZETAy37zgCN9CWtuhY9CH6YKkU4Pr7QynaYpF
 KBeI61twJ1nE1z6xtjUVrGlxKQKSfhhrVjeV8Z5SFDTp6JdejE=
IronPort-HdrOrdr: A9a23:MiO10KmEvAsWLj6kbb3DwuHqEi7pDfIW3DAbv31ZSRFFG/Fxl6
 iV/cjzsiWE8Ar5OUtQ4OxoV5PwIk80maQb3WBVB8bHYOCEghrPEGgB1/qB/9SIIUSXnYQxuZ
 uIMZIOb+EYZWIK9voSizPZLz9P+re6GdiT9ILj80s=
X-IronPort-AV: E=Sophos;i="5.90,162,1643691600"; 
   d="scan'208";a="67966231"
From: Jane Malalane <jane.malalane@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Jane Malalane <jane.malalane@citrix.com>, Wei Liu <wl@xen.org>, "Anthony
 PERARD" <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien Grall
	<julien@xen.org>, "Stefano Stabellini" <sstabellini@kernel.org>, Christian
 Lindig <christian.lindig@citrix.com>, David Scott <dave@recoil.org>,
	"Volodymyr Babchuk" <Volodymyr_Babchuk@epam.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>
Subject: [PATCH v5 2/2] x86/xen: Allow per-domain usage of hardware virtualized APIC
Date: Mon, 7 Mar 2022 15:06:09 +0000
Message-ID: <20220307150609.10662-3-jane.malalane@citrix.com>
X-Mailer: git-send-email 2.11.0
In-Reply-To: <20220307150609.10662-1-jane.malalane@citrix.com>
References: <20220307150609.10662-1-jane.malalane@citrix.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

Introduce a new per-domain creation x86 specific flag to
select whether hardware assisted virtualization should be used for
x{2}APIC.

A per-domain option is added to xl in order to select the usage of
x{2}APIC hardware assisted virtualization, as well as a global
configuration option.

Having all APIC interaction exit to Xen for emulation is slow and can
induce much overhead. Hardware can speed up x{2}APIC by decoding the
APIC access and providing a VM exit with a more specific exit reason
than a regular EPT fault or by altogether avoiding a VM exit.

On the other hand, being able to disable x{2}APIC hardware assisted
virtualization can be useful for testing and debugging purposes.

Note: vmx_install_vlapic_mapping doesn't require modifications
regardless of whether the guest has "Virtualize APIC accesses" enabled
or not, i.e., setting the APIC_ACCESS_ADDR VMCS field is fine so long
as virtualize_apic_accesses is supported by the CPU.

Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Jane Malalane <jane.malalane@citrix.com>
---
CC: Wei Liu <wl@xen.org>
CC: Anthony PERARD <anthony.perard@citrix.com>
CC: Juergen Gross <jgross@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>
CC: George Dunlap <george.dunlap@citrix.com>
CC: Jan Beulich <jbeulich@suse.com>
CC: Julien Grall <julien@xen.org>
CC: Stefano Stabellini <sstabellini@kernel.org>
CC: Christian Lindig <christian.lindig@citrix.com>
CC: David Scott <dave@recoil.org>
CC: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
CC: "Roger Pau Monné" <roger.pau@citrix.com>

v5:
* Revert v4 changes in vmx_vlapic_msr_changed(), preserving the use of
  the has_assisted_x{2}apic macros
* Following changes in assisted_x{2}apic_available definitions in
  patch 1, retighten conditionals for setting
  XEN_HVM_CPUID_APIC_ACCESS_VIRT and XEN_HVM_CPUID_X2APIC_VIRT in
  cpuid_hypervisor_leaves()

v4:
 * Add has_assisted_x{2}apic macros and use them where appropriate
 * Replace CPU checks with per-domain assisted_x{2}apic control
   options in vmx_vlapic_msr_changed() and cpuid_hypervisor_leaves(),
   following edits to assisted_x{2}apic_available definitions in
   patch 1
   Note: new assisted_x{2}apic_available definitions make later
   cpu_has_vmx_apic_reg_virt and cpu_has_vmx_virtual_intr_delivery
   checks redundant in vmx_vlapic_msr_changed()

v3:
 * Change info in xl.cfg to better express reality and fix
   capitalization of x{2}apic
 * Move "physinfo" variable definition to the beggining of
   libxl__domain_build_info_setdefault()
 * Reposition brackets in if statement to match libxl coding style
 * Shorten logic in libxl__arch_domain_build_info_setdefault()
 * Correct dprintk message in arch_sanitise_domain_config()
 * Make appropriate changes in vmx_vlapic_msr_changed() and
   cpuid_hypervisor_leaves() for amended "assisted_x2apic" bit
 * Remove unneeded parantheses

v2:
 * Add a LIBXL_HAVE_ASSISTED_APIC macro
 * Pass xcpyshinfo as a pointer in libxl__arch_get_physinfo
 * Add a return statement in now "int"
   libxl__arch_domain_build_info_setdefault()
 * Preserve libxl__arch_domain_build_info_setdefault 's location in
   libxl_create.c
 * Correct x{2}apic default setting logic in
   libxl__arch_domain_prepare_config()
 * Correct logic for parsing assisted_x{2}apic host/guest options in
   xl_parse.c and initialize them to -1 in xl.c
 * Use guest options directly in vmx_vlapic_msr_changed
 * Fix indentation of bool assisted_x{2}apic in struct hvm_domain
 * Add a change in xenctrl_stubs.c to pass xenctrl ABI checks
---
 docs/man/xl.cfg.5.pod.in                | 19 +++++++++++++++++++
 docs/man/xl.conf.5.pod.in               | 12 ++++++++++++
 tools/golang/xenlight/helpers.gen.go    | 12 ++++++++++++
 tools/golang/xenlight/types.gen.go      |  2 ++
 tools/include/libxl.h                   |  7 +++++++
 tools/libs/light/libxl_arch.h           |  5 +++--
 tools/libs/light/libxl_arm.c            |  7 +++++--
 tools/libs/light/libxl_create.c         | 22 +++++++++++++---------
 tools/libs/light/libxl_types.idl        |  2 ++
 tools/libs/light/libxl_x86.c            | 28 ++++++++++++++++++++++++++--
 tools/ocaml/libs/xc/xenctrl.ml          |  2 ++
 tools/ocaml/libs/xc/xenctrl.mli         |  2 ++
 tools/ocaml/libs/xc/xenctrl_stubs.c     |  2 +-
 tools/xl/xl.c                           |  8 ++++++++
 tools/xl/xl.h                           |  2 ++
 tools/xl/xl_parse.c                     | 16 ++++++++++++++++
 xen/arch/x86/domain.c                   | 28 +++++++++++++++++++++++++++-
 xen/arch/x86/hvm/vmx/vmcs.c             |  4 ++++
 xen/arch/x86/hvm/vmx/vmx.c              | 13 ++++---------
 xen/arch/x86/include/asm/hvm/domain.h   |  6 ++++++
 xen/arch/x86/include/asm/hvm/vmx/vmcs.h |  3 +++
 xen/arch/x86/traps.c                    |  9 +++++----
 xen/include/public/arch-x86/xen.h       |  2 ++
 23 files changed, 183 insertions(+), 30 deletions(-)

diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in
index b98d161398..dcca564a23 100644
--- a/docs/man/xl.cfg.5.pod.in
+++ b/docs/man/xl.cfg.5.pod.in
@@ -1862,6 +1862,25 @@ firmware tables when using certain older guest Operating
 Systems. These tables have been superseded by newer constructs within
 the ACPI tables.
 
+=item B<assisted_xapic=BOOLEAN>
+
+B<(x86 only)> Enables or disables hardware assisted virtualization for
+xAPIC. With this option enabled, a memory-mapped APIC access will be
+decoded by hardware and either issue a more specific VM exit than just
+an EPT fault, or altogether avoid a VM exit. Notice full
+virtualization for xAPIC can only be achieved if hardware supports
+“APIC-register virtualization” and “virtual-interrupt delivery”. The
+default is settable via L<xl.conf(5)>.
+
+=item B<assisted_x2apic=BOOLEAN>
+
+B<(x86 only)> Enables or disables hardware assisted virtualization for
+x2APIC. With this option enabled, an MSR-Based APIC access will
+either issue a VM exit or altogether avoid one. Notice full
+virtualization for x2APIC can only be achieved if hardware supports
+“APIC-register virtualization” and “virtual-interrupt delivery”. The
+default is settable via L<xl.conf(5)>.
+
 =item B<nx=BOOLEAN>
 
 B<(x86 only)> Hides or exposes the No-eXecute capability. This allows a guest
diff --git a/docs/man/xl.conf.5.pod.in b/docs/man/xl.conf.5.pod.in
index df20c08137..95d136d1ea 100644
--- a/docs/man/xl.conf.5.pod.in
+++ b/docs/man/xl.conf.5.pod.in
@@ -107,6 +107,18 @@ Sets the default value for the C<max_grant_version> domain config value.
 
 Default: maximum grant version supported by the hypervisor.
 
+=item B<assisted_xapic=BOOLEAN>
+
+If enabled, domains will use xAPIC hardware assisted virtualization by default.
+
+Default: enabled if supported.
+
+=item B<assisted_x2apic=BOOLEAN>
+
+If enabled, domains will use x2APIC hardware assisted virtualization by default.
+
+Default: enabled if supported.
+
 =item B<vif.default.script="PATH">
 
 Configures the default hotplug script used by virtual network devices.
diff --git a/tools/golang/xenlight/helpers.gen.go b/tools/golang/xenlight/helpers.gen.go
index dd4e6c9f14..dece545ee0 100644
--- a/tools/golang/xenlight/helpers.gen.go
+++ b/tools/golang/xenlight/helpers.gen.go
@@ -1120,6 +1120,12 @@ x.ArchArm.Vuart = VuartType(xc.arch_arm.vuart)
 if err := x.ArchX86.MsrRelaxed.fromC(&xc.arch_x86.msr_relaxed);err != nil {
 return fmt.Errorf("converting field ArchX86.MsrRelaxed: %v", err)
 }
+if err := x.ArchX86.AssistedXapic.fromC(&xc.arch_x86.assisted_xapic);err != nil {
+return fmt.Errorf("converting field ArchX86.AssistedXapic: %v", err)
+}
+if err := x.ArchX86.AssistedX2Apic.fromC(&xc.arch_x86.assisted_x2apic);err != nil {
+return fmt.Errorf("converting field ArchX86.AssistedX2Apic: %v", err)
+}
 x.Altp2M = Altp2MMode(xc.altp2m)
 x.VmtraceBufKb = int(xc.vmtrace_buf_kb)
 if err := x.Vpmu.fromC(&xc.vpmu);err != nil {
@@ -1605,6 +1611,12 @@ xc.arch_arm.vuart = C.libxl_vuart_type(x.ArchArm.Vuart)
 if err := x.ArchX86.MsrRelaxed.toC(&xc.arch_x86.msr_relaxed); err != nil {
 return fmt.Errorf("converting field ArchX86.MsrRelaxed: %v", err)
 }
+if err := x.ArchX86.AssistedXapic.toC(&xc.arch_x86.assisted_xapic); err != nil {
+return fmt.Errorf("converting field ArchX86.AssistedXapic: %v", err)
+}
+if err := x.ArchX86.AssistedX2Apic.toC(&xc.arch_x86.assisted_x2apic); err != nil {
+return fmt.Errorf("converting field ArchX86.AssistedX2Apic: %v", err)
+}
 xc.altp2m = C.libxl_altp2m_mode(x.Altp2M)
 xc.vmtrace_buf_kb = C.int(x.VmtraceBufKb)
 if err := x.Vpmu.toC(&xc.vpmu); err != nil {
diff --git a/tools/golang/xenlight/types.gen.go b/tools/golang/xenlight/types.gen.go
index 87be46c745..253c9ad93d 100644
--- a/tools/golang/xenlight/types.gen.go
+++ b/tools/golang/xenlight/types.gen.go
@@ -520,6 +520,8 @@ Vuart VuartType
 }
 ArchX86 struct {
 MsrRelaxed Defbool
+AssistedXapic Defbool
+AssistedX2Apic Defbool
 }
 Altp2M Altp2MMode
 VmtraceBufKb int
diff --git a/tools/include/libxl.h b/tools/include/libxl.h
index 94e6355822..cdcccd6d01 100644
--- a/tools/include/libxl.h
+++ b/tools/include/libxl.h
@@ -535,6 +535,13 @@
 #define LIBXL_HAVE_PHYSINFO_ASSISTED_APIC 1
 
 /*
+ * LIBXL_HAVE_ASSISTED_APIC indicates that libxl_domain_build_info has
+ * assisted_xapic and assisted_x2apic fields for enabling hardware
+ * assisted virtualization for x{2}apic per domain.
+ */
+#define LIBXL_HAVE_ASSISTED_APIC 1
+
+/*
  * libxl ABI compatibility
  *
  * The only guarantee which libxl makes regarding ABI compatibility
diff --git a/tools/libs/light/libxl_arch.h b/tools/libs/light/libxl_arch.h
index 207ceac6a1..03b89929e6 100644
--- a/tools/libs/light/libxl_arch.h
+++ b/tools/libs/light/libxl_arch.h
@@ -71,8 +71,9 @@ void libxl__arch_domain_create_info_setdefault(libxl__gc *gc,
                                                libxl_domain_create_info *c_info);
 
 _hidden
-void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
-                                              libxl_domain_build_info *b_info);
+int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
+                                             libxl_domain_build_info *b_info,
+                                             const libxl_physinfo *physinfo);
 
 _hidden
 int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
diff --git a/tools/libs/light/libxl_arm.c b/tools/libs/light/libxl_arm.c
index 39fdca1b49..ba5b8f433f 100644
--- a/tools/libs/light/libxl_arm.c
+++ b/tools/libs/light/libxl_arm.c
@@ -1384,8 +1384,9 @@ void libxl__arch_domain_create_info_setdefault(libxl__gc *gc,
     }
 }
 
-void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
-                                              libxl_domain_build_info *b_info)
+int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
+                                             libxl_domain_build_info *b_info,
+                                             const libxl_physinfo *physinfo)
 {
     /* ACPI is disabled by default */
     libxl_defbool_setdefault(&b_info->acpi, false);
@@ -1399,6 +1400,8 @@ void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
     memset(&b_info->u, '\0', sizeof(b_info->u));
     b_info->type = LIBXL_DOMAIN_TYPE_INVALID;
     libxl_domain_build_info_init_type(b_info, LIBXL_DOMAIN_TYPE_PVH);
+
+    return 0;
 }
 
 int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
diff --git a/tools/libs/light/libxl_create.c b/tools/libs/light/libxl_create.c
index 15ed021f41..88d08d7277 100644
--- a/tools/libs/light/libxl_create.c
+++ b/tools/libs/light/libxl_create.c
@@ -75,6 +75,7 @@ int libxl__domain_build_info_setdefault(libxl__gc *gc,
                                         libxl_domain_build_info *b_info)
 {
     int i, rc;
+    libxl_physinfo info;
 
     if (b_info->type != LIBXL_DOMAIN_TYPE_HVM &&
         b_info->type != LIBXL_DOMAIN_TYPE_PV &&
@@ -264,7 +265,18 @@ int libxl__domain_build_info_setdefault(libxl__gc *gc,
     if (!b_info->event_channels)
         b_info->event_channels = 1023;
 
-    libxl__arch_domain_build_info_setdefault(gc, b_info);
+    rc = libxl_get_physinfo(CTX, &info);
+    if (rc) {
+        LOG(ERROR, "failed to get hypervisor info");
+        return rc;
+    }
+
+    rc = libxl__arch_domain_build_info_setdefault(gc, b_info, &info);
+    if (rc) {
+        LOG(ERROR, "unable to set domain arch build info defaults");
+        return rc;
+    }
+
     libxl_defbool_setdefault(&b_info->dm_restrict, false);
 
     if (b_info->iommu_memkb == LIBXL_MEMKB_DEFAULT)
@@ -457,14 +469,6 @@ int libxl__domain_build_info_setdefault(libxl__gc *gc,
     }
 
     if (b_info->max_grant_version == LIBXL_MAX_GRANT_DEFAULT) {
-        libxl_physinfo info;
-
-        rc = libxl_get_physinfo(CTX, &info);
-        if (rc) {
-            LOG(ERROR, "failed to get hypervisor info");
-            return rc;
-        }
-
         if (info.cap_gnttab_v2)
             b_info->max_grant_version = 2;
         else if (info.cap_gnttab_v1)
diff --git a/tools/libs/light/libxl_types.idl b/tools/libs/light/libxl_types.idl
index 42ac6c357b..db5eb0a0b3 100644
--- a/tools/libs/light/libxl_types.idl
+++ b/tools/libs/light/libxl_types.idl
@@ -648,6 +648,8 @@ libxl_domain_build_info = Struct("domain_build_info",[
                                ("vuart", libxl_vuart_type),
                               ])),
     ("arch_x86", Struct(None, [("msr_relaxed", libxl_defbool),
+                               ("assisted_xapic", libxl_defbool),
+                               ("assisted_x2apic", libxl_defbool),
                               ])),
     # Alternate p2m is not bound to any architecture or guest type, as it is
     # supported by x86 HVM and ARM support is planned.
diff --git a/tools/libs/light/libxl_x86.c b/tools/libs/light/libxl_x86.c
index e0a06ecfe3..c377d13b19 100644
--- a/tools/libs/light/libxl_x86.c
+++ b/tools/libs/light/libxl_x86.c
@@ -23,6 +23,14 @@ int libxl__arch_domain_prepare_config(libxl__gc *gc,
     if (libxl_defbool_val(d_config->b_info.arch_x86.msr_relaxed))
         config->arch.misc_flags |= XEN_X86_MSR_RELAXED;
 
+    if (d_config->c_info.type != LIBXL_DOMAIN_TYPE_PV)
+    {
+        if (libxl_defbool_val(d_config->b_info.arch_x86.assisted_xapic))
+            config->arch.misc_flags |= XEN_X86_ASSISTED_XAPIC;
+
+        if (libxl_defbool_val(d_config->b_info.arch_x86.assisted_x2apic))
+            config->arch.misc_flags |= XEN_X86_ASSISTED_X2APIC;
+    }
     return 0;
 }
 
@@ -819,11 +827,27 @@ void libxl__arch_domain_create_info_setdefault(libxl__gc *gc,
 {
 }
 
-void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
-                                              libxl_domain_build_info *b_info)
+int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
+                                             libxl_domain_build_info *b_info,
+                                             const libxl_physinfo *physinfo)
 {
     libxl_defbool_setdefault(&b_info->acpi, true);
     libxl_defbool_setdefault(&b_info->arch_x86.msr_relaxed, false);
+
+    if (b_info->type != LIBXL_DOMAIN_TYPE_PV) {
+        libxl_defbool_setdefault(&b_info->arch_x86.assisted_xapic,
+                             physinfo->cap_assisted_xapic);
+        libxl_defbool_setdefault(&b_info->arch_x86.assisted_x2apic,
+                             physinfo->cap_assisted_x2apic);
+    }
+
+    else if (!libxl_defbool_is_default(b_info->arch_x86.assisted_xapic) ||
+             !libxl_defbool_is_default(b_info->arch_x86.assisted_x2apic)) {
+        LOG(ERROR, "Interrupt Controller Virtualization not supported for PV");
+        return ERROR_INVAL;
+    }
+
+    return 0;
 }
 
 int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
diff --git a/tools/ocaml/libs/xc/xenctrl.ml b/tools/ocaml/libs/xc/xenctrl.ml
index 21783d3622..672a11ceb6 100644
--- a/tools/ocaml/libs/xc/xenctrl.ml
+++ b/tools/ocaml/libs/xc/xenctrl.ml
@@ -50,6 +50,8 @@ type x86_arch_emulation_flags =
 
 type x86_arch_misc_flags =
 	| X86_MSR_RELAXED
+	| X86_ASSISTED_XAPIC
+	| X86_ASSISTED_X2APIC
 
 type xen_x86_arch_domainconfig =
 {
diff --git a/tools/ocaml/libs/xc/xenctrl.mli b/tools/ocaml/libs/xc/xenctrl.mli
index af6ba3d1a0..f9a6aa3a0f 100644
--- a/tools/ocaml/libs/xc/xenctrl.mli
+++ b/tools/ocaml/libs/xc/xenctrl.mli
@@ -44,6 +44,8 @@ type x86_arch_emulation_flags =
 
 type x86_arch_misc_flags =
   | X86_MSR_RELAXED
+  | X86_ASSISTED_XAPIC
+  | X86_ASSISTED_X2APIC
 
 type xen_x86_arch_domainconfig = {
   emulation_flags: x86_arch_emulation_flags list;
diff --git a/tools/ocaml/libs/xc/xenctrl_stubs.c b/tools/ocaml/libs/xc/xenctrl_stubs.c
index e0d49b18d2..ecfc7125d5 100644
--- a/tools/ocaml/libs/xc/xenctrl_stubs.c
+++ b/tools/ocaml/libs/xc/xenctrl_stubs.c
@@ -239,7 +239,7 @@ CAMLprim value stub_xc_domain_create(value xch, value wanted_domid, value config
 
 		cfg.arch.misc_flags = ocaml_list_to_c_bitmap
 			/* ! x86_arch_misc_flags X86_ none */
-			/* ! XEN_X86_ XEN_X86_MSR_RELAXED all */
+			/* ! XEN_X86_ XEN_X86_ASSISTED_X2APIC max */
 			(VAL_MISC_FLAGS);
 
 #undef VAL_MISC_FLAGS
diff --git a/tools/xl/xl.c b/tools/xl/xl.c
index 2d1ec18ea3..31eb223309 100644
--- a/tools/xl/xl.c
+++ b/tools/xl/xl.c
@@ -57,6 +57,8 @@ int max_grant_frames = -1;
 int max_maptrack_frames = -1;
 int max_grant_version = LIBXL_MAX_GRANT_DEFAULT;
 libxl_domid domid_policy = INVALID_DOMID;
+int assisted_xapic = -1;
+int assisted_x2apic = -1;
 
 xentoollog_level minmsglevel = minmsglevel_default;
 
@@ -201,6 +203,12 @@ static void parse_global_config(const char *configfile,
     if (!xlu_cfg_get_long (config, "claim_mode", &l, 0))
         claim_mode = l;
 
+    if (!xlu_cfg_get_long (config, "assisted_xapic", &l, 0))
+        assisted_xapic = l;
+
+    if (!xlu_cfg_get_long (config, "assisted_x2apic", &l, 0))
+        assisted_x2apic = l;
+
     xlu_cfg_replace_string (config, "remus.default.netbufscript",
         &default_remus_netbufscript, 0);
     xlu_cfg_replace_string (config, "colo.default.proxyscript",
diff --git a/tools/xl/xl.h b/tools/xl/xl.h
index c5c4bedbdd..528deb3feb 100644
--- a/tools/xl/xl.h
+++ b/tools/xl/xl.h
@@ -286,6 +286,8 @@ extern libxl_bitmap global_vm_affinity_mask;
 extern libxl_bitmap global_hvm_affinity_mask;
 extern libxl_bitmap global_pv_affinity_mask;
 extern libxl_domid domid_policy;
+extern int assisted_xapic;
+extern int assisted_x2apic;
 
 enum output_format {
     OUTPUT_FORMAT_JSON,
diff --git a/tools/xl/xl_parse.c b/tools/xl/xl_parse.c
index 117fcdcb2b..0ab9b145fe 100644
--- a/tools/xl/xl_parse.c
+++ b/tools/xl/xl_parse.c
@@ -1681,6 +1681,22 @@ void parse_config_data(const char *config_source,
         xlu_cfg_get_defbool(config, "vpt_align", &b_info->u.hvm.vpt_align, 0);
         xlu_cfg_get_defbool(config, "apic", &b_info->apic, 0);
 
+        e = xlu_cfg_get_long(config, "assisted_xapic", &l , 0);
+        if ((e == ESRCH && assisted_xapic != -1)) /* use global default if present */
+            libxl_defbool_set(&b_info->arch_x86.assisted_xapic, assisted_xapic);
+        else if (!e)
+            libxl_defbool_set(&b_info->arch_x86.assisted_xapic, l);
+        else
+            exit(1);
+
+        e = xlu_cfg_get_long(config, "assisted_x2apic", &l, 0);
+        if ((e == ESRCH && assisted_x2apic != -1)) /* use global default if present */
+            libxl_defbool_set(&b_info->arch_x86.assisted_x2apic, assisted_x2apic);
+        else if (!e)
+            libxl_defbool_set(&b_info->arch_x86.assisted_x2apic, l);
+        else
+            exit(1);
+
         switch (xlu_cfg_get_list(config, "viridian",
                                  &viridian, &num_viridian, 1))
         {
diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c
index a5048ed654..bcca0dc900 100644
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -619,6 +619,8 @@ int arch_sanitise_domain_config(struct xen_domctl_createdomain *config)
     bool hvm = config->flags & XEN_DOMCTL_CDF_hvm;
     bool hap = config->flags & XEN_DOMCTL_CDF_hap;
     bool nested_virt = config->flags & XEN_DOMCTL_CDF_nested_virt;
+    bool assisted_xapic = config->arch.misc_flags & XEN_X86_ASSISTED_XAPIC;
+    bool assisted_x2apic = config->arch.misc_flags & XEN_X86_ASSISTED_X2APIC;
     unsigned int max_vcpus;
 
     if ( hvm ? !hvm_enabled : !IS_ENABLED(CONFIG_PV) )
@@ -685,13 +687,31 @@ int arch_sanitise_domain_config(struct xen_domctl_createdomain *config)
         }
     }
 
-    if ( config->arch.misc_flags & ~XEN_X86_MSR_RELAXED )
+    if ( config->arch.misc_flags & ~(XEN_X86_MSR_RELAXED |
+                                     XEN_X86_ASSISTED_XAPIC |
+                                     XEN_X86_ASSISTED_X2APIC) )
     {
         dprintk(XENLOG_INFO, "Invalid arch misc flags %#x\n",
                 config->arch.misc_flags);
         return -EINVAL;
     }
 
+    if ( (assisted_xapic || assisted_x2apic) && !hvm )
+    {
+        dprintk(XENLOG_INFO,
+                "Interrupt Controller Virtualization not supported for PV\n");
+        return -EINVAL;
+    }
+
+    if ( (assisted_xapic && !assisted_xapic_available) ||
+         (assisted_x2apic && !assisted_x2apic_available) )
+    {
+        dprintk(XENLOG_INFO,
+                "Hardware assisted x%sAPIC requested but not available\n",
+                assisted_xapic && !assisted_xapic_available ? "" : "2");
+        return -EINVAL;
+    }
+
     return 0;
 }
 
@@ -864,6 +884,12 @@ int arch_domain_create(struct domain *d,
 
     d->arch.msr_relaxed = config->arch.misc_flags & XEN_X86_MSR_RELAXED;
 
+    d->arch.hvm.assisted_xapic =
+        config->arch.misc_flags & XEN_X86_ASSISTED_XAPIC;
+
+    d->arch.hvm.assisted_x2apic =
+        config->arch.misc_flags & XEN_X86_ASSISTED_X2APIC;
+
     return 0;
 
  fail:
diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
index 06831099ed..e4503a02a7 100644
--- a/xen/arch/x86/hvm/vmx/vmcs.c
+++ b/xen/arch/x86/hvm/vmx/vmcs.c
@@ -1157,6 +1157,10 @@ static int construct_vmcs(struct vcpu *v)
         __vmwrite(PLE_WINDOW, ple_window);
     }
 
+    if ( !has_assisted_xapic(v->domain) )
+        v->arch.hvm.vmx.secondary_exec_control &=
+            ~SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES;
+
     if ( cpu_has_vmx_secondary_exec_control )
         __vmwrite(SECONDARY_VM_EXEC_CONTROL,
                   v->arch.hvm.vmx.secondary_exec_control);
diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
index c075370f64..949ddd684c 100644
--- a/xen/arch/x86/hvm/vmx/vmx.c
+++ b/xen/arch/x86/hvm/vmx/vmx.c
@@ -3344,16 +3344,11 @@ static void vmx_install_vlapic_mapping(struct vcpu *v)
 
 void vmx_vlapic_msr_changed(struct vcpu *v)
 {
-    int virtualize_x2apic_mode;
     struct vlapic *vlapic = vcpu_vlapic(v);
     unsigned int msr;
 
-    virtualize_x2apic_mode = ( (cpu_has_vmx_apic_reg_virt ||
-                                cpu_has_vmx_virtual_intr_delivery) &&
-                               cpu_has_vmx_virtualize_x2apic_mode );
-
-    if ( !cpu_has_vmx_virtualize_apic_accesses &&
-         !virtualize_x2apic_mode )
+    if ( !has_assisted_xapic(v->domain) &&
+         !has_assisted_x2apic(v->domain) )
         return;
 
     vmx_vmcs_enter(v);
@@ -3363,7 +3358,7 @@ void vmx_vlapic_msr_changed(struct vcpu *v)
     if ( !vlapic_hw_disabled(vlapic) &&
          (vlapic_base_address(vlapic) == APIC_DEFAULT_PHYS_BASE) )
     {
-        if ( virtualize_x2apic_mode && vlapic_x2apic_mode(vlapic) )
+        if ( has_assisted_x2apic(v->domain) && vlapic_x2apic_mode(vlapic) )
         {
             v->arch.hvm.vmx.secondary_exec_control |=
                 SECONDARY_EXEC_VIRTUALIZE_X2APIC_MODE;
@@ -3384,7 +3379,7 @@ void vmx_vlapic_msr_changed(struct vcpu *v)
                 vmx_clear_msr_intercept(v, MSR_X2APIC_SELF, VMX_MSR_W);
             }
         }
-        else
+        else if ( has_assisted_xapic(v->domain) )
             v->arch.hvm.vmx.secondary_exec_control |=
                 SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES;
     }
diff --git a/xen/arch/x86/include/asm/hvm/domain.h b/xen/arch/x86/include/asm/hvm/domain.h
index 698455444e..92bf53483c 100644
--- a/xen/arch/x86/include/asm/hvm/domain.h
+++ b/xen/arch/x86/include/asm/hvm/domain.h
@@ -117,6 +117,12 @@ struct hvm_domain {
 
     bool                   is_s3_suspended;
 
+    /* xAPIC hardware assisted virtualization. */
+    bool                   assisted_xapic;
+
+    /* x2APIC hardware assisted virtualization. */
+    bool                   assisted_x2apic;
+
     /* hypervisor intercepted msix table */
     struct list_head       msixtbl_list;
 
diff --git a/xen/arch/x86/include/asm/hvm/vmx/vmcs.h b/xen/arch/x86/include/asm/hvm/vmx/vmcs.h
index 9119aa8536..5b7d662ed7 100644
--- a/xen/arch/x86/include/asm/hvm/vmx/vmcs.h
+++ b/xen/arch/x86/include/asm/hvm/vmx/vmcs.h
@@ -220,6 +220,9 @@ void vmx_vmcs_reload(struct vcpu *v);
 #define CPU_BASED_ACTIVATE_SECONDARY_CONTROLS 0x80000000
 extern u32 vmx_cpu_based_exec_control;
 
+#define has_assisted_xapic(d)   ((d)->arch.hvm.assisted_xapic)
+#define has_assisted_x2apic(d)  ((d)->arch.hvm.assisted_x2apic)
+
 #define PIN_BASED_EXT_INTR_MASK         0x00000001
 #define PIN_BASED_NMI_EXITING           0x00000008
 #define PIN_BASED_VIRTUAL_NMIS          0x00000020
diff --git a/xen/arch/x86/traps.c b/xen/arch/x86/traps.c
index a2278d9499..a0c6b89a88 100644
--- a/xen/arch/x86/traps.c
+++ b/xen/arch/x86/traps.c
@@ -1121,7 +1121,8 @@ void cpuid_hypervisor_leaves(const struct vcpu *v, uint32_t leaf,
         if ( !is_hvm_domain(d) || subleaf != 0 )
             break;
 
-        if ( cpu_has_vmx_apic_reg_virt )
+        if ( cpu_has_vmx_apic_reg_virt &&
+             has_assisted_xapic(d) )
             res->a |= XEN_HVM_CPUID_APIC_ACCESS_VIRT;
 
         /*
@@ -1130,9 +1131,9 @@ void cpuid_hypervisor_leaves(const struct vcpu *v, uint32_t leaf,
          * and wrmsr in the guest will run without VMEXITs (see
          * vmx_vlapic_msr_changed()).
          */
-        if ( cpu_has_vmx_virtualize_x2apic_mode &&
-             cpu_has_vmx_apic_reg_virt &&
-             cpu_has_vmx_virtual_intr_delivery )
+        if ( cpu_has_vmx_apic_reg_virt &&
+             cpu_has_vmx_virtual_intr_delivery &&
+             has_assisted_x2apic(d) )
             res->a |= XEN_HVM_CPUID_X2APIC_VIRT;
 
         /*
diff --git a/xen/include/public/arch-x86/xen.h b/xen/include/public/arch-x86/xen.h
index 7acd94c8eb..9da32c6239 100644
--- a/xen/include/public/arch-x86/xen.h
+++ b/xen/include/public/arch-x86/xen.h
@@ -317,6 +317,8 @@ struct xen_arch_domainconfig {
  * doesn't allow the guest to read or write to the underlying MSR.
  */
 #define XEN_X86_MSR_RELAXED (1u << 0)
+#define XEN_X86_ASSISTED_XAPIC (1u << 1)
+#define XEN_X86_ASSISTED_X2APIC (1u << 2)
     uint32_t misc_flags;
 };
 
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 15:29:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 15:29:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286195.485602 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRFIc-0007Vr-DK; Mon, 07 Mar 2022 15:29:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286195.485602; Mon, 07 Mar 2022 15:29:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRFIc-0007Vk-AL; Mon, 07 Mar 2022 15:29:26 +0000
Received: by outflank-mailman (input) for mailman id 286195;
 Mon, 07 Mar 2022 15:29:25 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRFIb-0007Ve-4A
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 15:29:25 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 5da86a30-9e2b-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 16:29:23 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2104.outbound.protection.outlook.com [104.47.18.104]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-28-_l2mH8TAMHy8S6EbEt8_qQ-1; Mon, 07 Mar 2022 16:29:22 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by GV1PR04MB9184.eurprd04.prod.outlook.com (2603:10a6:150:28::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Mon, 7 Mar
 2022 15:29:21 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 15:29:21 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5da86a30-9e2b-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646666963;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=NRZVMtaqDlsKl8Tru3ZNcYRu9khEjIaHFi3H2J7T5RU=;
	b=K0XPxw5YnLigxZbv2xsmL6PI/dQFyJ9mcRThWlrKtYqXpKxK+o3MlylYWdDmVRAluVE+Br
	xtB1KiEKCoQMB0Dvi2kOKQJV1Jlt3lZykALhkVRA/rZjIu2hy6zEL+nGp08drG/fCw4zrU
	RtOy5MFI/d8uEW4CIBq5DfrF+lgmm5A=
X-MC-Unique: _l2mH8TAMHy8S6EbEt8_qQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=UakJC8KMTGI5FHuIa5+YRz/OOw3+m7W7NBMG18f99rjUFrqZQoBJs33O5kRjFkF18u761BRscb0H7/MSm4CcLh2vd0huV8vi37S1hGqCX75uIwdMZixLhLVi1PnHh8PMrpneU1nhE31w6H6J3hLSR1sE33JZheLz0/vrtHaEeEQXwe32ZYU5zXepegjkgpEKQGEKunckVO+dfLCzEhUSrC584YR3stk+nL5+4/02HLIVWM5PW0J2sBo8AeujrdEXluWb+9tqHsUtfJLhamBXwZXJS15wHsHSyNewzRlxYBC2kxZAqK1u4eGpervnaw/gRaEoDGEKPu8EFdBxOCW5pg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=P0VkT6DXU3YRObGk0/mjBplc0jMgZPZyH+wkIlIXrms=;
 b=B23h+aSl9NVgslSfLnxwJubydFvQepI6bWaejZQI93ht0aNU1UVPVwl29dvPP+RzjRwVFPRaJo4Oo39BhCc7ckowZf+Mex7cm+gjwhJf3wjjL7fsfcqXJH/aaiYZ/PnRSoAcxNSYcnbqPweNKxlAbHv4BTuFRSm1g1Okv6+Hra1WJwzZLkTQzC+m4iZV+fsdgo2Wj5/w9PwkjwB/ONJ7JMwD/gxlpk22wT6Lz0O+ECbhVEQ/BwX0Nc+jiLMdeKmCOQ+kz6ZT2Cru8k8oJ0Sxwn07xIn61KhDdVAC9EL2aWBFn3832L9El2n9qn7Li6vHTpTeM5+It8cSHq8Ejkdmtg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <ca144758-da48-00a1-1e76-872c3455c335@suse.com>
Date: Mon, 7 Mar 2022 16:29:22 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] x86: avoid SORT_BY_INIT_PRIORITY with old GNU ld
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
References: <8b982bab-9b16-61e7-620f-5a5b2be39588@suse.com>
 <YiYfVmW3iQ4wA5k/@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YiYfVmW3iQ4wA5k/@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6PR0502CA0063.eurprd05.prod.outlook.com
 (2603:10a6:20b:56::40) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 967f03ca-e2be-4222-a66d-08da004f4043
X-MS-TrafficTypeDiagnostic: GV1PR04MB9184:EE_
X-Microsoft-Antispam-PRVS:
	<GV1PR04MB91849A49BED7E6761121379EB3089@GV1PR04MB9184.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	BQrwYWhlll7xyiVZgb5Cx7ynTKM03pNx1HMStG0eOs9wFvFZ2U0W7o+6a4wQ7UYgiJQUzpk/MsgZZ9gXgeiwjttU/aSiuOMYfc8NncypNGRV8GNcnfw4uCeDc6pFvReswdeWyQSFlTtUWyc5bfLkLczPg05E776qX00Nh+R+iI9aM57r5c6kJBYf7kAJlc9VCohK7/VVAKtJ2dAejP1+AXRMPW2FJN113In5q2uv/r3cV76J/rYTZYUVXuXkVCoL7M3AHixZRn+d5JmytAup0IZZo/DbHKLLEXwCuX8fWx37zSitF5BA3Utoz8i2KJvXaNftIhmF21aJURBolXXslYzmwJPz2LBcm8hecbGBHwOssmzo6Kp8hCrmXuJJUjwcu6vL0i5F6Izie5WxPRvzKRp3paMFizoTX9r1yl4ibzv1rOybcJ0CS9DR/DLqKlVngz0VO+W4LlksCu/iKL7H/IJNN23uLt2qaq2uyHyVAJcxcipy0P4Vt6lL3NcA7vDvwRzfRhHKhnW9kqJ8FLKpvoLqeSAXuL+4soobD9rHAek9EzLXBdmFx/qBMLHTDdPPjjrt98T4adCYNfpRy+YXOlzgfDtmPQ67bzcg8jCv58mVFa4ow89OJWIuZITck1Qu70QF/SV0KF4ufEAGyjQhLGaD/JGH0/ROBlXkkmOAA3EwSi93XytPrx/R71pw7BfbpNhLFTdYmk3CAnhQGWl32dQB7PBWRGRS0+lkpbcS45o=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(38100700002)(31696002)(86362001)(26005)(186003)(36756003)(8936002)(4326008)(316002)(66946007)(66556008)(66476007)(5660300002)(8676002)(2906002)(6506007)(54906003)(6916009)(53546011)(2616005)(31686004)(508600001)(6512007)(6486002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?W75P4YdEsomNnhTvvIT+1c6vtua9Syks8ZTUTeKoruPglh3DwcUO86aq9RMO?=
 =?us-ascii?Q?AlHQEsNqob94dXTurYhYu8GjqK3KWoNMYfcuJxZtQ9qHqyP4fky33Q+IfqT1?=
 =?us-ascii?Q?L8qcRp+0m3U/6S4UYRunzMdZvHH1lwYuEpc1D9EDQnJHpPWHADavw0E8ZdM+?=
 =?us-ascii?Q?1PDyukxaIC+Ho/7idwuFRLbrZ919t5IXjgXk0oWFtfX/4J/gycVNQMWsOe9q?=
 =?us-ascii?Q?5kMHBJZ3m7PNH74dvm4+DzSSHpMeJWjFxftsYA++jhRpcon1gwjgZLDq2wMg?=
 =?us-ascii?Q?vbcMIy6JbJkzbP3H7Fe52CQIEXjF54YzYjJsa5H0VwvulRtbD3vJQgFQF65a?=
 =?us-ascii?Q?TSYszBeae1XaXmbsEj4ZNoSvbmiPSTsXCeZTf1EDH0tXPSmrrQiJYKb6N3MK?=
 =?us-ascii?Q?2OO3V4NCUsju17Pd8aFmZ3+xIWHDTjjiekKCufcUYGnbsg1+2riQKGkwyYt/?=
 =?us-ascii?Q?5Zk8eWGcOWLCYxL75KBa1yChaCUB82g4rOLJcWu5TCOz00Kv+PsPW0EE9Qa7?=
 =?us-ascii?Q?pQyhJI3brcxfUQqWNSNpM7lt7nY1jDz+PEELTPs50NxHC08M6keRZHvnQgMB?=
 =?us-ascii?Q?ZONGjP2ayu5erulMolSXCFdkic63UoVZww7D18XGSqZgw9HQGwLokfvMzVJd?=
 =?us-ascii?Q?1PxEAasTia5KwH4kMxvTur3tddkaz19CLosc8xfEtS43NQG78AxCJSvi7he1?=
 =?us-ascii?Q?YzBRY33S54q06dy6OUEzgkwB0ywtJsbI2nv1Sf0qYPvagCQC/4NDr7ypGGNH?=
 =?us-ascii?Q?uiFtbSVlmam63FOLX3P7iMQprGnLjSOe5XIKtb5483osvOq6WMc/Vvliglb7?=
 =?us-ascii?Q?qNeSJQ536nDNR8zb1F8Tq7/Y7eq0hVuq78k4OoKzOwKulBtF7z4GDHfBFGm0?=
 =?us-ascii?Q?JftikQp5mKgL7eZb+XM1Fh9ozpTZwSguUkKyHrcp7SlnPMmj4q7YZ1X+GjyR?=
 =?us-ascii?Q?J5kCQjfplMzAH1QWmL7NH+ot/ctEL4Dm8+3hGnjDCPBPQRqonO89PD3BpMO0?=
 =?us-ascii?Q?YZTvjRVKN+czEwbDXTMfxIYgyA6apTB0P2DZWUtlrj13xKaCrL0+mktdg5JC?=
 =?us-ascii?Q?I5CeMsGo1FBS0sqre8KfiJ+0sUu45doRxWQ2YRM9AaBw6xVRMF7ulVV6oneN?=
 =?us-ascii?Q?zF5XhIwpoQfwnN3aThGwpE+9hprU9UJguH5HSRX3veRAVGZgeedCls3B3jex?=
 =?us-ascii?Q?J70ZrI/gZLaZvuBYJZZZimJK3LsJMamJfNGVCDTPEjRrN6+AeIy9NxJQOHB7?=
 =?us-ascii?Q?5H+bLXo0U5GFRkqom6BVzmu9Pb1axWnau4Ok/Y6IFDcfYkGqiULhoKRMf+nX?=
 =?us-ascii?Q?NHp5SXAnp30rhcGNocL2YeLA5RPYp8BiXeYPQLyA5Ur0F5H4TM2YViCL0bL4?=
 =?us-ascii?Q?/pPkkxRWyl93K/X3hHs82bkqRRARB9YCOE84TKyCSAgg0s0lZ6/RAQ4S+382?=
 =?us-ascii?Q?kB2XuYHj4pbKhEe2Gvc7yjyRK0qzFzQnwqiaEjvgOmtQabDPxtEQ941P8MyS?=
 =?us-ascii?Q?hCSCwEzzpClf7xFBEH1jCEbpbIJ1z4AB0Le29WxJcDMAwceLg4aJOe0mTQ+m?=
 =?us-ascii?Q?Ivso9luJEyVTeofQgUPfYnQx7Ocok/RazurEyqP+4vZxWWE8YDhKckcJEaU+?=
 =?us-ascii?Q?kBYFidJ9L1R0nRbVLfesqVg=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 967f03ca-e2be-4222-a66d-08da004f4043
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 15:29:21.0063
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: clk7+BTbcBt8hZGWu28Mm/8dihw9BDmYSpi0aEvQnYxxFwWUep6Yd7AKkZTAIyuYOxXL8tG9tu4vw4DTx/9MPA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: GV1PR04MB9184

On 07.03.2022 16:05, Roger Pau Monn=C3=A9 wrote:
> On Mon, Mar 07, 2022 at 02:49:32PM +0100, Jan Beulich wrote:
>> Support for this construct was added in 2.22 only. Avoid the need to
>> introduce logic to probe for linker script capabilities by (ab)using the
>> probe for a command line option having appeared at about the same time.
>>
>> Fixes: 4b7fd8153ddf ("x86: fold sections in final binaries")
>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>> ---
>> Obviously this doesn't take care of old LLVM ld yet, if any care is
>> needed there in the first place.
>>
>> --- a/xen/arch/x86/arch.mk
>> +++ b/xen/arch/x86/arch.mk
>> @@ -70,6 +70,11 @@ ifeq ($(CONFIG_UBSAN),y)
>>  $(call cc-option-add,CFLAGS_UBSAN,CC,-fno-sanitize=3Dalignment)
>>  endif
>> =20
>> +# While not much better than going by raw GNU ld version, utilize that =
the
>> +# feature we're after has appeared in the same release as the
>> +# --print-output-format command line option.
>> +AFLAGS-$(call ld-option,--print-output-format) +=3D -DHAVE_LD_SORT_BY_I=
NIT_PRIORITY
>=20
> LLVM ld doesn't have --print-output-format:
>=20
> % ld --print-output-format
> ld: error: unknown argument '--print-output-format'
>=20
> So it would be always defaulting to SORT. I'm not sure what to
> recommend.

Do you know if all versions we support know of SORT_BY_INIT_PRIORITY?

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 15:52:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 15:52:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286201.485614 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRFf0-0002P7-9y; Mon, 07 Mar 2022 15:52:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286201.485614; Mon, 07 Mar 2022 15:52:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRFf0-0002P0-6k; Mon, 07 Mar 2022 15:52:34 +0000
Received: by outflank-mailman (input) for mailman id 286201;
 Mon, 07 Mar 2022 15:52:32 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+gfv=TS=citrix.com=prvs=0582ef7ee=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRFey-0002Oo-4X
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 15:52:32 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 95742cfd-9e2e-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 16:52:27 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 95742cfd-9e2e-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646668347;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=2GhFWeqpdrnH3T41BDnyJsD/fccv7Z0QAi8At7DLRQs=;
  b=RACiA2tuCzm46n+nYsvfhfDRNsDZGqty+9b701OJM4ouLzLCSJeH5mdq
   fG/lGrvNCbuIrw3lt9xTgNMSWWXD23S7AzOa41ie13JW9cNBGItF3T1Zy
   SNfCguMHKFYEYxm2hq6KxXmwRx0hua+KQYrH2Q9ZS28H2lXcnTz5mRMUY
   Y=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65557446
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:qqhgB69BDYIxn/GknqAXDrUDiX6TJUtcMsCJ2f8bNWPcYEJGY0x3n
 zMcWW2OO6neZ2Xxf9sjOdi/8UhUu8eExocyGlc5/n08E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oDmW1nlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnbmCVywmEI+SpMM+C0h4GSE9HYBE1paSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFJkYtXx6iynQEN4tQIzZQrWM7thdtNs1rp4TQKuBO
 5ZHAdZpRC7xQxd0E2tQMYk3x8uXqV6hKgFGk2vA8MLb5ECMlVcsgdABKuH9ZdiiVchT2EGCq
 Qru72n/Rx0XKtGb4T6E6W63wP/CmzvhX4AfH6H+8eRl6HWRzGEODBwdVXOgvOK0zEW5Xrpix
 1c8o3R06/JorQryE4e7D0bQTGO4UgA0fuhOOOIUyl+x7YmMsiaTBiskYzxvQYlz3CMpfgAC2
 liMltLvIDVgtryJVH6QnoupQSOO1Ts9djFbO3JdJecRy5y6+dxo0EqTJjp2OPPt1rXI9SfML
 ydmRcTUr5EaloY12qqy5jgraBr898GSHmbZCug6N19JDz+Vhqb4PeRECnCBtJ6sybp1qXHb4
 BA5dzC2trxmMH10vHXlrB8xNL+o/e2ZFzbXnERiGZIsnxz0pSL9INEOuG4ldBc1WirhRdMOS
 BWP0T69GbcJZCf6BUOJS9jZ5zsWIVjISo2+C6G8gitmaZltbg6XlByClmbLt10BZHMEyPllU
 b/CKJ7EJS9DVcxPlWPmL89Age5D7n1vngv7GMGkpylLJJLDPRZ5v59eawDQBg34hYvZyDjoH
 yF3bJPbm00CC7SlOkE6M+c7dDg3EJTyPrivw+R/fe+fOAt2XmYnDv7a27Q6fIJ52a9Sk4/1E
 ruVAye0FHKXaaX7FDi3
IronPort-HdrOrdr: A9a23:LARgWazX6V0aerCAim/iKrPxzuskLtp133Aq2lEZdPULSKOlfp
 GV8MjziyWYtN9wYhAdcdDpAtjmfZr5z+8O3WB3B8beYOCGghrSEGgG1+XfKlLbak/DH4JmpM
 Jdmu1FeaHN5DtB/LfHCWuDYq8dKbC8mcjC74eurEuFDzsaE52Ihz0JdDpzeXcGIjWua6BJcK
 Z1saF81kWdkDksH4yGL0hAe9KGi8zAlZrgbxJDLxk76DOWhTftzLLhCRCX0joXTjsKmN4ZgC
 L4uj28wp/mn+Cwyxfa2WOWx5NKmOH5wt8GIMCXkMAaJhjllw7tToV8XL+puiwzvYiUmR0Xue
 iJhy1lE9V46nvXcG3wiRzx2zP42DJr0HPmwU/wuwqVneXJABYBT+ZRj4NQdRXUr2A6ustn7a
 5N12WF87JKEBLphk3Glpf1fiAvsnDxjWspkOYVgXAae5AZcqVtoYsW+14QOIscHRj99JssHI
 BVfY3hDc5tABKnhk3izylSKITGZAVxIv7GeDlOhiWt6UkZoJgjpHFohvD2nR87heYAotd/lq
 H5259T5cJzp/8tHNJA7dg6MLmK40z2MGTx2TGpUB3a/J9uAQO5l3ew2sRw2N2X
X-IronPort-AV: E=Sophos;i="5.90,162,1643691600"; 
   d="scan'208";a="65557446"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Id3G5g5l4bKcIFjJEDtw8PbR6M6QEo9c+CzwL3TNgKtbE00sZlr759ZBT7fc1Y3DqVt7jr+emPOVTxBYL2FpaH+iTTG+dwdCHbx1tj4aL0e6jvcjtRd7pAye00DHRIOVz3yW++WKhlqIs9+sLJvlcB074PnJOU388/ATl/EAsseMExoZ6yZcc2MoxmVDWi5XqkkFzVFdglqGI4abJtl7CR9vV7aCQH3SOobt2YOa6WjVZO6JGgSXZ3qCVO/q2fCTGBzVgdGh7Au3vhD2ec2yFEr7AHB40cNcEmIozufc6wypNitUwvU0l/GbqKg+sv/OSuqC1tbPheX9dS5Urp5/8g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=J5a4fuJ+lqzAwiO6udmAJaIeSMCHy74RsE6eVuysi7Q=;
 b=gpuOka2GvqYAxZ2Z6t8S9XNo0Hr7J79v6L1syzC8XYMwGiS2Y8q+vVWVw6MGrz4vfyWAiy4ZzfJivFIfHlYN2Q7KFWy5Vq3/gnNiNORaMsta7XaQGzQa3ZXl8LEOR8oTHVLYR/+R1WtHg9YZtdd2ewH/qVoEs0G/pPKHGcvzwxgQgMKjXjti8fnoJYGlbATKhv4hCK13fcgK6dX/QB6mBCT6KDTkyWbwWlhtFfGXjOYajI76QViJFZbZmyJzrCs/fQwHQm2o0Q6fN2qt2D+RkjKzjo4c1aYK/nlOXVxQ07CyIpayeYcCpCWNYM0VzzyZB9Rl8VNXaWK+4zIRCQUW6g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=J5a4fuJ+lqzAwiO6udmAJaIeSMCHy74RsE6eVuysi7Q=;
 b=wxe3CQYwwYKY4ibGxgNgJKxOnDCo9ldOrPMIh+vCoXg/YoAi7Q+6ti9J+CIF/hwA1bniHLYjT/a4wzouf6oxjojcYBgNcCO62XeZNGxadQyiH5FhQTsdSAQB+ilNhuS2VMjiVve8doY4gaY64qhc3QzjBGuSsY57VYBtB64Umsk=
Date: Mon, 7 Mar 2022 16:52:14 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Andrew
 Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH] x86: avoid SORT_BY_INIT_PRIORITY with old GNU ld
Message-ID: <YiYqLtozm4/2Ibu0@Air-de-Roger>
References: <8b982bab-9b16-61e7-620f-5a5b2be39588@suse.com>
 <YiYfVmW3iQ4wA5k/@Air-de-Roger>
 <ca144758-da48-00a1-1e76-872c3455c335@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <ca144758-da48-00a1-1e76-872c3455c335@suse.com>
X-ClientProxiedBy: LO4P265CA0085.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:2bd::14) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f14085b5-0599-43cb-bc39-08da00527674
X-MS-TrafficTypeDiagnostic: BYAPR03MB4664:EE_
X-Microsoft-Antispam-PRVS: <BYAPR03MB4664121E8E7765147078FE6B8F089@BYAPR03MB4664.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(26005)(508600001)(6666004)(9686003)(186003)(6512007)(53546011)(86362001)(6486002)(82960400001)(6506007)(38100700002)(8936002)(5660300002)(8676002)(4326008)(66946007)(66556008)(66476007)(33716001)(85182001)(2906002)(54906003)(6916009)(316002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?NTZNNzNDemtWUjZEYVpCYVhZRVg3N2M3K2J0MjF4bDhzSmJYa1RCZkhleC96?=
 =?utf-8?B?bkVvV1c4cDdkWEo3b1U3ZlcrWWsrRUloZE9IU3pBNmJZcEE2REVQenZWS21x?=
 =?utf-8?B?VWpudXM2MDVhWjdWQm81cEx5dXdMb3VudmlDS0xTa3dWNytCWjlqTWR5eC9h?=
 =?utf-8?B?UXJtVzVtYVZuVnlySU4xN0hDVlVFNGFUYy92bnV2UllqaVVwMVdHZUJYclF4?=
 =?utf-8?B?UGd5a0syU2ZqRkNZdFR2NStjYVMza25ic0MzVkVRVGdqUFZjMVVYdFdyWUN4?=
 =?utf-8?B?RGFvNHVyRGd5N3FhTG0rNUVwVXVBWVpEcFg4NnpyRXVPTzE3OCtoSFlCOTVi?=
 =?utf-8?B?WDdieTc2dW03NE9xWkg4bnVZb3BHV1YrU0w4L1lDQ2RWOGtCL2tGbzhoL3NB?=
 =?utf-8?B?K3ZPY080d1BkZkcxeEdXWlc5cStEeVNmT1FpV2k4UFlnYVF3RnlmNHQ5ZDZZ?=
 =?utf-8?B?bUxjbzhpaXB1V053Qlc1cXA5VjR0K0JqOVFUZWd6aGFxVEROMVFQR2FEL2ZU?=
 =?utf-8?B?WEtjM3RkWkM2QTVSaTVHYWU1V3pzNlVIeHRoT1Q4U216dTZGTXZMTXZvdkw4?=
 =?utf-8?B?YUtVNTMrMlFySkJ6MENTT0RZeXFmNktKY2JseE1tMmRXQTFwOURPRmU4ZlBh?=
 =?utf-8?B?RUs2WW5RdXZwalhsbkZ3S3Nid1RoS1VtWVVUNFhnMDd0QlcxOFI4VDRQbWN3?=
 =?utf-8?B?WWVzWFVmbGlLTEJadTBQK2I4aWRKODZHUnk3RXZrNHRpQ3pEMEIvU0pWUjZa?=
 =?utf-8?B?a0xHVndmRzgwbUE1eHpaRDZ6ejdHWXNoS0Y0UjZ3eENYK084czZmRFZXaHJo?=
 =?utf-8?B?Rk5YdmR5dml3WHhtM25US1FXWEd2ZzBwQXhOY1NoMlRRVTJTNjJ3eVdNZ1Yr?=
 =?utf-8?B?ajRqc2FaYnZqOWZCaitPRDlmUS9udm1FU2N6SGxRTEI0WU1XeURXVXlMZDhI?=
 =?utf-8?B?SnJQekUreUI4VzE0K2JqZk5uQmZFSGJiTUpWWjRFblBqV281UndJV28vUk1K?=
 =?utf-8?B?QmR5Yjk2dmdVVlBRYjNBSGdZKytUSWphNEJmV2pEanQ5K0xMdmJNU1V4Z1pH?=
 =?utf-8?B?cGUyelRiREZwSXRPcENDa0VmYTZpVDFkdWxIZG5WMUM5Yk5QbThZV015dTVn?=
 =?utf-8?B?UFltMHV5QWovT0NuMHM3akY2OFF2R1BqNGZUWm81c3pDUkhiUFhVSUI5VmVE?=
 =?utf-8?B?ZVlJKzFmeU9SMW50azdERzNpOFZmakdmQWR3T2RrV1BpakpPQkJzUlpIek1l?=
 =?utf-8?B?T01Sb3BJb2o3VzlsMmw0VTVZbWZ3Q2FTU1JuN0lvRDVQTFg1V0VoNngzaWJU?=
 =?utf-8?B?czE3eWxyNGt0WXZZVlBqNGprUmh5RnZhYW0zTWhmM2tSRGdWLzliZ2U4cGw0?=
 =?utf-8?B?ZVV3TEdBYkx0UnYzN1pZRDNmWE55VW4rUE12a25iOUIrcmpZSTlhUE5ZZUJo?=
 =?utf-8?B?VkpHVjdjeVFYbFNHM1NQL1pjcEl5aW52c3ZXVXV1UDBMdDBtWHBpQ2NRWHBW?=
 =?utf-8?B?alFoNEwzdjN0eW0zV3M2SHNtTHA0Q0g3V3Z3aGJiQlZOaWY5cVF2c0V5akZ3?=
 =?utf-8?B?ZCtSNjZBbXQraXh1KzJtZTRTbGR2SW0vN0Z4am1qbzhzdTlnaXZNQlRoMlhK?=
 =?utf-8?B?ai9leWZEYWcycXJzMWlCMjAyVURYamRXcFdVWU0vNnR1TUNLUjhObWJPcWM0?=
 =?utf-8?B?Uk1RYnJlaTZnWTFrT3YyUDhzUEUxeUF4YTVXYjlqaVp1UmlXcjBzb0ljbngr?=
 =?utf-8?B?VWNwcE5aMFN4eUtCVXFERllzZXdnOFQ1NWkxWExaa3NaNnFhMHo4aWVIN29H?=
 =?utf-8?B?VnJ0SGJTajlwN1QyTUh1VXByMnhDaTdIcjNXQVlMSEpXSHA0VlBsUGJPOTR3?=
 =?utf-8?B?aUpLQ2doRG1GT1NDVzJBTmdYbnhPaWd1WVVSdUN6YmJDdnU2RWJYN1FVZmEr?=
 =?utf-8?B?d2R6d1BJVFRPaU5WNkd0ZmxUUUpKVU1FNE9SVE5IelZydC9wTXBGSmFKaHhp?=
 =?utf-8?B?TFJaYmRYalB5N0hhS0RWVC9IUzlSTm41NWgyNUR5TUdHZ3lEVjUxQU9vbmZY?=
 =?utf-8?B?Y0pueXBEWDg1d3pkQzE3RkNkNzRKQ3hDcXcyaERoOUsvVG9Rbk1pSDRIdmxF?=
 =?utf-8?B?RkFQU1RPNW04S1p3R0FvYjhjS2VMaXZCQm9ZZ0UwZjlzSkhtTEx4WmluZzRu?=
 =?utf-8?Q?8BwivxO6VuRb7EMBauutuiU=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: f14085b5-0599-43cb-bc39-08da00527674
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 15:52:20.3838
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: sDwQ9CcbWPIYkc4KWq1ZCCtcGThIs48x4t3u1+x2E3QCsSaSr2MhOfrRFkOhflu83C0wrskJI97J0iJMjDRg9A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB4664
X-OriginatorOrg: citrix.com

On Mon, Mar 07, 2022 at 04:29:22PM +0100, Jan Beulich wrote:
> On 07.03.2022 16:05, Roger Pau Monné wrote:
> > On Mon, Mar 07, 2022 at 02:49:32PM +0100, Jan Beulich wrote:
> >> Support for this construct was added in 2.22 only. Avoid the need to
> >> introduce logic to probe for linker script capabilities by (ab)using the
> >> probe for a command line option having appeared at about the same time.
> >>
> >> Fixes: 4b7fd8153ddf ("x86: fold sections in final binaries")
> >> Signed-off-by: Jan Beulich <jbeulich@suse.com>
> >> ---
> >> Obviously this doesn't take care of old LLVM ld yet, if any care is
> >> needed there in the first place.
> >>
> >> --- a/xen/arch/x86/arch.mk
> >> +++ b/xen/arch/x86/arch.mk
> >> @@ -70,6 +70,11 @@ ifeq ($(CONFIG_UBSAN),y)
> >>  $(call cc-option-add,CFLAGS_UBSAN,CC,-fno-sanitize=alignment)
> >>  endif
> >>  
> >> +# While not much better than going by raw GNU ld version, utilize that the
> >> +# feature we're after has appeared in the same release as the
> >> +# --print-output-format command line option.
> >> +AFLAGS-$(call ld-option,--print-output-format) += -DHAVE_LD_SORT_BY_INIT_PRIORITY
> > 
> > LLVM ld doesn't have --print-output-format:
> > 
> > % ld --print-output-format
> > ld: error: unknown argument '--print-output-format'
> > 
> > So it would be always defaulting to SORT. I'm not sure what to
> > recommend.
> 
> Do you know if all versions we support know of SORT_BY_INIT_PRIORITY?

Hm, I don't think we can assume that we support LLVM LD in 3.5. I'm
not even sure if LLVM 3.5 had LLD in the first place.

The first version that we care about and that we test is LLVM LD 6,
anything below that version is of unknown state.

I've tested you change with SORT_BY_INIT_PRIORITY on it and it seems
to be fine. This was on FreeBSD 12.3 version of LLD, not sure how
many changes have been backported from newer versions there.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 15:56:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 15:56:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286207.485624 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRFid-00039L-QZ; Mon, 07 Mar 2022 15:56:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286207.485624; Mon, 07 Mar 2022 15:56:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRFid-00039E-Mn; Mon, 07 Mar 2022 15:56:19 +0000
Received: by outflank-mailman (input) for mailman id 286207;
 Mon, 07 Mar 2022 15:56:17 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+gfv=TS=citrix.com=prvs=0582ef7ee=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRFib-000398-Br
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 15:56:17 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 1ce3261c-9e2f-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 16:56:14 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1ce3261c-9e2f-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646668574;
  h=from:to:cc:subject:date:message-id:
   content-transfer-encoding:mime-version;
  bh=hx2gAxBHrnWckVQL0StG1ROI0FpWyR+BNGHkPWm7YWQ=;
  b=a9Lt3ckKhGfaJhFIxBGcbMWlem0kRUIQZZh2xg7NxrcrwN2QMm4qRhmb
   zd5iXFSDSVnaLaU2B/P/q24BOh3tHsJlOUY5dnAFhz8YvQjBQU3Rqa56t
   //sEy1mH1ml2VXd0bmnyGeg2L4YbI61hT77BUOEQmGrakISa+ipZU0uL8
   Y=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67971345
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:Bp6rP6k2gfR9aZBSg77PB+no5gxuJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xJNUW3Ub/uDY2Twed4gadm2/E0BvZTUzdViGgA+qCljRCMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiW1zV4
 7senuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYbQZwFYPvxeMhQxRRA35SDJZD5rTgPi3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3oHZvwCufFf87aZvCX7/L9ZlT2zJYasVmQ6mPO
 JNCNWcHgBLoT0BKK14GVJIFheKQ2F7/fhxEmWi2nP9ii4TU5FMoi+W8WDbPQfSVQe1Fk0Deo
 XjJl0zzDwsGLtWZxXyA+2i1m+7UtSrhXcQZE7jQ3sBthFqf12kCEio8XFGwoeS6okOmUtcZI
 EsRkgI1trQ7/kGvStj7XjW7rWSCsxpaXMBfe8Uq5QfIxqfK7gKxAmkfUiUHeNEgrNUxRzEhy
 hmOhdyBLT5lvaCRSHmd3qyJtj70Mi8QRUcAeCsFQA0t89Tl5oYpgXryos1LSfDvyIevQHepn
 m7M/HNWa6gvYdAj86Ti1n7k3jWQtpXAXlEZ1z7SQGmC8VYsDGK6XLCA5V/e5PdGCY+WSFido
 XQJ8/SjAPAy4YKlz3LUHrhUdF29z7PcaWCH3wYzd3U032n1oxaekZZsDCaSzauDGuINYnfXb
 UDaomu9D7cDbSLxPcebj29cYvnGLJQM9/y4DJg4jfIUO/CdkTNrGwk0OSatM5jFyhRErE3GE
 c7znTyQJXgbE7976zG9Wv0Q17Qmrghnmz+NGMGll0v8gerCDJJwdVviGAHSBt3VEYve+FmFm
 zqhH5HiJ+pjvB3WPXCMrN97waEiJnknH5Hmw/G7hcbYSjeK7FoJUqeLqZt4ItQNt/0Myo/gp
 yjtMmcFmAuXrSCWcm2iNyE8AI4DqL4i9BrXywR3Zg32s5XiCK7yhJoim2wfJuF2pLQ+lqcvF
 5HouayoW5xyd9gOwBxEBbHVp41+bhW7wwWIOiuuej8keJB8AQfO/7fZksHHr0Hi0gLfWRMCn
 oCd
IronPort-HdrOrdr: A9a23:gzyBuqpwZxMH48ulsf99XkYaV5vDL9V00zEX/kB9WHVpm5Oj+f
 xGzc516farslossREb+expOMG7MBThHPlOkPQs1NaZLXPbUQ6TTb2KgrGSugEIdxeOk9K1tp
 0QDZSWaueAdWSS5PySiGLTfqdCsbu6GciT9JjjJhxWPGdXgs9bnmNE4lHxKDwLeOAKP+txKL
 Osou584xawc3Ueacq2QlEDQuj4vtXO0LbrewQPCRIL4BSHyWrA0s+wLzGomjMlFx9fy7Yr9m
 bI1yT/+6WYqvm+jjvRzXXa4Zh6kMbojvFDGMuPoM4ILSiEsHfhWK1RH5m5+BwlquCm71gn1P
 HKvhcbJsx2r0jce2mkyCGdrzXI4XIL0TvP2FWYiXzsrYjSXzQhEfdMgopfb1/w91cglMsU6t
 MG40up875sST/QliX04NbFEztwkFCvnHYkmekPy1RCTIolbqNLp4B3xjIZLH45JlO11GkbKp
 guMCmFj8wmMW9yLkqp9FWH+ebcEUjaRXy9Mws/Us/86UkioJk29Tpb+CUlpAZxyHsMceg02w
 36CNUaqFg3dL5sUUtcPpZ3fSLlMB26ffrzWFjiU2gPUpt3fk7wlw==
X-IronPort-AV: E=Sophos;i="5.90,162,1643691600"; 
   d="scan'208";a="67971345"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=LRv52r3Kmzu53E3rSqjyReAzHfApIW0r1RY8v57Q2Sh9xzkvhIEYDnVjRWvRPnGGpCo04Q7Eq/ofyk0Y0pMjGicTUnxKe40GZ9v/S1DQLG5um3nuLGcXmasN1ybCoFOJrh+kHtORq7Ep3M7lV2UrFfhFa/v5tjEfjLnlVIzya/a9yVbPFmnLDyl3pzoek1N+eguy/T9grU8xx+khI3NNr3f9w9YlfWtSUG0ZEkjMFiwYLAOaS7kTQunKEUv5S9nCAx0dPzda1SGqUVh7oDBNMsYrUr+xuuQyxbtASjbV+KTZPNnDe4nyHbpsoPTCw//eKSZy59rnAwohlzGXXt2Xqw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=rJ4EYjrcFXlo3aS7BX2YYz8Oqio8yDQPlQTvRa6h9Vs=;
 b=JJA61VHNdktkc44Am11E4pZuYLqzxm/29mej+DTSaLHofyk7FF7MeeDlikpzWJ0Fmwj/z+YM5gzY3Sqr3ayE9WvFOHHZpMsqhfAEmotHwqor4P8RIsSp39G6TSEObDjM37TnJ98JkPkWazP0HBA2/2hfpq/zjZ4O/TuVFKuVZDD2p5k6BpwWx+CtZ2dmsWTYsqJupC2xPnHsZ9WN7LBZFT+ca8ahnJXGPF2ajVy9Lgbjxy0qJdJqvlrH1ARhwIK3hXEI4fW0TiLMJ6XTwbQ98qGTMujiGBytnsUGw9Uz1qE1Z0z0FyuMiwTzF0AxdPupvptaAGTZ2w8r8sexRd1BlA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=rJ4EYjrcFXlo3aS7BX2YYz8Oqio8yDQPlQTvRa6h9Vs=;
 b=ptfvPz3iY+2R+m1AcpPXB0Efat+v0AFpswibom0Vlxy2hOW9KEqcFHpjXCM2ERgFk1P9iCbttSC6dOOFfYStGPMGzdHljaVWyM13N539ejSwlS+MKsDBJZGL/CRS9Vuy3udfAIgAlprING26qvYbIGKKaN873cqPYL37l5fs30U=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, "Jan
 Beulich" <jbeulich@suse.com>, Julien Grall <julien@xen.org>, "Stefano
 Stabellini" <sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH v2] livepatch: set -f{function,data}-sections compiler option
Date: Mon,  7 Mar 2022 16:55:58 +0100
Message-ID: <20220307155558.72876-1-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO4P123CA0507.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:272::17) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0b1a2a0e-b91c-4bbf-7907-08da0052fe51
X-MS-TrafficTypeDiagnostic: MW4PR03MB6489:EE_
X-Microsoft-Antispam-PRVS: <MW4PR03MB6489A3435C08954DF00004848F089@MW4PR03MB6489.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(6506007)(186003)(54906003)(6916009)(26005)(316002)(6512007)(82960400001)(66946007)(8936002)(2616005)(38100700002)(6666004)(83380400001)(86362001)(1076003)(36756003)(4326008)(8676002)(5660300002)(508600001)(2906002)(66556008)(6486002)(66476007);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?Z2NpNVVEWUFyVjhmKzRJNzVkL1hWZHRma3N5d3BTZXdqN3p6ZVNTaWx5Y3Q1?=
 =?utf-8?B?azJZSzMrMEhYQWRJUG1BKzV1d3d4ZzJuNFhObHJPeUJWOEhjNXhreWtxTDAv?=
 =?utf-8?B?aWwrMHk4RWZEdkZZZ0xYYTU4RStoYm5Mejd2b1gzdjdoemxpcEptVGlHbXhN?=
 =?utf-8?B?eFBGelNSS3NmTHA2Q0VPbThydjJEUmpqeUZyRjdIT2lleUNNZVRPbXFoMFNM?=
 =?utf-8?B?djdHTVRKdnVHWlNMNlY3MGNBTEpWSTQ4WmpYZC9DZzExZ3FiL1k2WXNwWENV?=
 =?utf-8?B?bTZQQXUxWUo3Q3BOeHpLcDMxZCthRWtqbFhpWjRyTXk2NStKSGYyWExhajJX?=
 =?utf-8?B?aFE2Y0VpNTY4MS81eGsvdTZUeERGTUl6dzYzZzhveUkvU0VTYmo1TzlaSklT?=
 =?utf-8?B?UXNhd2tYMDIraUl1ZzVkN2Q2cTl2WTJENTRKZkxrOUw3eGxhZTZFZ1J2L3F6?=
 =?utf-8?B?L2JYRFN3eWV4UWxPbEFyNnZDanl2ZG9hRUlPUFJVUWoySnR1V1Bzc0VxVy9v?=
 =?utf-8?B?Mlk3UGdWM2NFMGJlYldsdWNwWHZTdUJ6WXljTGc1MlcwR2ZrTzJnUFBtT29v?=
 =?utf-8?B?Zy9yYmQvU1hnLzFENHdhd1FhdjNuL3FYYXZON295WXZ2cG4yQ2V5bnYzeUls?=
 =?utf-8?B?enhJM3dTTTNiNzFKbFRqaWNLaE56NlpPMW9kc0IwVnpRbTlkbFBDcVJ6MjN5?=
 =?utf-8?B?R3U2MUE0Sm1oTnFXZkZvT0pRZDFMUHpoWXBzaHJHTlZPakhLckxuTVFwc3pk?=
 =?utf-8?B?NGV1bmNhY29xZm9KYzhPOUlZRjgxOW1TSkhVNm1LQ08waGp2VHYyTitXL05z?=
 =?utf-8?B?WlpOZ1Bsb0R4S1ZSeThJK09IWXRqYUFxZjRCRFhhREVNNmgzbDJCRWd5aTMx?=
 =?utf-8?B?UmIrNisyZU14Y2JQUTNzd3FmZFR2dlp6SVVUVEZwdDJkdEFrZDFIRXJJbzRO?=
 =?utf-8?B?Wm1DUDJrS2Q0aE1BUis5RElyOFJZVDFNemViSjNhWW1ERkJENTBBQU9xTmhn?=
 =?utf-8?B?bk9ybEp3Rnlwc0lCY25URUg2MlJiTUZOKzVYUHJDeXp4d2o1LzNaQmo0RjJo?=
 =?utf-8?B?cjZzWFJPZWtUWlFkMHFPMWs5cXdvdHdUOE04RlM3NGJqQXlneER6RXBWYzdt?=
 =?utf-8?B?N09aZlN0T1ZvNEMzWlBoYWEyTGhpNm0rdC82bitiSGlRTFFZNUltR2U2bG01?=
 =?utf-8?B?VmN2ZVUvZXp3SFlSbzVGS2xrNnlLYjN4Mlg1Qjh3L2FlVjdaOGhIT003U1lT?=
 =?utf-8?B?TlVYWGhWekJwL3NEYUtvM2l3bGhvdmd4Yis5bUlxSkRURUNPTlk1M29oeDl5?=
 =?utf-8?B?UFVZUHYrdVNCbHc3aElrR2JKMUhjVWh2RmlMOC92YS94Z1lvT1pBUUZRL3lM?=
 =?utf-8?B?ZW9QSERmZlROR3doZGFESWNHY0JRZ2MvVzVwWDBNc3dWSFJ2V0w3TE9CSWVU?=
 =?utf-8?B?aFpZMjFVOHlGWHBIMjlTY2dwRE1tSHROOFhrMDhKWUp4Q1lETVpHSC82clRq?=
 =?utf-8?B?K3dreVgreU5CZ2J6SVRVcWFMbE11OEtlSEZwTnFlemNqaS9qYSs1d0M1WURV?=
 =?utf-8?B?dXBkRWNlOUtuUDR6QmVEblNyNEZaN2ZmTDA5Z3p4WWVwYmNXRDMyRUl5RHZo?=
 =?utf-8?B?L2t4ak9wZFRnS2FFM3lQQVlQVGtwdVpza28zSGVQVjN5ajdMK2tPNnV0Qjl1?=
 =?utf-8?B?c25BcFdXZnAwdEZKY1BzUFp4N0phTUNhY1d1dGpoallodHo4LzNWS2dtN3hO?=
 =?utf-8?B?bld6bWErNk9YZnd3WUFIRDBPMExyNGRxQU5MTjNtdzdodldnZXBHMVYxbjUx?=
 =?utf-8?B?RmVJRWJTU3lzRFp5cWQrOU01cDFtM3JMaWdVc0k1RDk0VmI1VkZsQklSZUFx?=
 =?utf-8?B?ek0xZVJWdFdXSXMvS3RoVGdLaWlPNTEwREdDYU1LU0szY3krRmJDUSsyeFg4?=
 =?utf-8?B?OUIxVC9BVU1HaXdPNjNvSVhKblBVaFRJSkVseitoRUxZV0kvazhuMkQ2ZDg5?=
 =?utf-8?B?NDZURDZSVExsTjU2cStIc25GTXEydEFtMGJWSXVZSnRQYjE4K1FuZDA0NkpL?=
 =?utf-8?B?amJBU2U1bXloRHg3NzJiQVNPUzRqcnhrM1pYY1JpN24wZzRxMW80VGRsM2c2?=
 =?utf-8?B?R2JSV1h4MTJ4MkxFZnBFSDZlb1FsVWM2d1VLakZ2L0tTRTBGdlN6cnA1bHBB?=
 =?utf-8?Q?NUXzseYOcDzmjcwdDG+AOBU=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 0b1a2a0e-b91c-4bbf-7907-08da0052fe51
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 15:56:08.2916
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: OKRE44Ic0751vF5l5ygzvOLg4MWPPSdCejwVpLe1FA0TfGwicfnkiN7GNc+P2SDuz3CUrQ4IVZ9N1XN+idHOGA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW4PR03MB6489
X-OriginatorOrg: citrix.com

If livepatching support is enabled build the hypervisor with
-f{function,data}-sections compiler options, which is required by the
livepatching tools to detect changes and create livepatches.

This shouldn't result in any functional change on the hypervisor
binary image, but does however require some changes in the linker
script in order to handle that each function and data item will now be
placed into its own section in object files. As a result add catch-all
for .text, .data and .bss in order to merge each individual item
section into the final image.

The main difference will be that .text.startup will end up being part
of .text rather than .init, and thus won't be freed. .text.exit will
also be part of .text rather than dropped. Overall this could make the
image bigger, and package some .text code in a sub-optimal way.

Note that placement of the sections inside of .text is also slightly
adjusted to be more similar to the position found in the default GNU
ld linker script. This requires having a separate section for the
header in order to place it at the begging of the output image,
followed with the unlikely and related sections, and finally the main
.text section.

On Arm the .data.read_mostly needs to be moved ahead of the .data
section like it's already done on x86, and the alignment needs to be
set to PAGE_SIZE so it doesn't end up being placed at the tail of a
read-only page from the previous section. While there move the
alignment of the .data section ahead of the section declaration, like
it's done for other sections.

The benefit of having CONFIG_LIVEPATCH enable those compiler option
is that the livepatch build tools no longer need to fiddle with the
build system in order to enable them. Note the current livepatch tools
are broken after the recent build changes due to the way they
attempt to set  -f{function,data}-sections.

Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
Changes since v1:
 - Introduce CC_SPLIT_SECTIONS for selecting the compiler options.
 - Drop check for compiler options, all supported versions have them.
 - Re-arrange section placement in .text, to match the default linker
   script.
 - Introduce .text.header to contain the headers bits that must appear
   first in the final binary.
---
Given that now the header is explicitly placed in .text.header, it's
likely possible to simplify some of the ordering of the object files
for the prelink.o generation, as arch/x86/boot/built_in.o no longer
needs to be the first object file in the list.

It also seems on Arm the schedulers and hypfs .data sections should be
moved into read_mostly.
---
Tested by gitlab in order to assert I didn't introduce any regression
on Arm specially.
---
 xen/Makefile              |  2 ++
 xen/arch/arm/arm32/head.S |  1 +
 xen/arch/arm/arm64/head.S |  1 +
 xen/arch/arm/xen.lds.S    | 49 +++++++++++++++++++++------------------
 xen/arch/x86/boot/head.S  |  2 +-
 xen/arch/x86/xen.lds.S    | 22 +++++++++++-------
 xen/common/Kconfig        |  4 ++++
 7 files changed, 49 insertions(+), 32 deletions(-)

diff --git a/xen/Makefile b/xen/Makefile
index 5c21492d6f..18a4f7e101 100644
--- a/xen/Makefile
+++ b/xen/Makefile
@@ -273,6 +273,8 @@ else
 CFLAGS += -fomit-frame-pointer
 endif
 
+CFLAGS-$(CONFIG_CC_SPLIT_SECTIONS) += -ffunction-sections -fdata-sections
+
 CFLAGS += -nostdinc -fno-builtin -fno-common
 CFLAGS += -Werror -Wredundant-decls -Wno-pointer-arith
 $(call cc-option-add,CFLAGS,CC,-Wvla)
diff --git a/xen/arch/arm/arm32/head.S b/xen/arch/arm/arm32/head.S
index 7a906167ef..c837d3054c 100644
--- a/xen/arch/arm/arm32/head.S
+++ b/xen/arch/arm/arm32/head.S
@@ -120,6 +120,7 @@
 
 #endif /* !CONFIG_EARLY_PRINTK */
 
+        .section .text.header, "ax", %progbits
         .arm
 
         /*
diff --git a/xen/arch/arm/arm64/head.S b/xen/arch/arm/arm64/head.S
index 66d862fc81..e62c48ec1c 100644
--- a/xen/arch/arm/arm64/head.S
+++ b/xen/arch/arm/arm64/head.S
@@ -133,6 +133,7 @@
         add \xb, \xb, x20
 .endm
 
+        .section .text.header, "ax", %progbits
         /*.aarch64*/
 
         /*
diff --git a/xen/arch/arm/xen.lds.S b/xen/arch/arm/xen.lds.S
index 08016948ab..836da880c3 100644
--- a/xen/arch/arm/xen.lds.S
+++ b/xen/arch/arm/xen.lds.S
@@ -30,9 +30,16 @@ SECTIONS
   _start = .;
   .text : {
         _stext = .;            /* Text section */
+       *(.text.header)
+
+       *(.text.cold .text.cold.*)
+       *(.text.unlikely .text.*_unlikely .text.unlikely.*)
+
        *(.text)
-       *(.text.cold)
-       *(.text.unlikely)
+#ifdef CONFIG_CC_SPLIT_SECTIONS
+       *(.text.*)
+#endif
+
        *(.fixup)
        *(.gnu.warning)
        _etext = .;             /* End of text section */
@@ -78,10 +85,24 @@ SECTIONS
 #endif
   _erodata = .;                /* End of read-only data */
 
+  . = ALIGN(PAGE_SIZE);
+  .data.read_mostly : {
+       /* Exception table */
+       __start___ex_table = .;
+       *(.ex_table)
+       __stop___ex_table = .;
+
+       /* Pre-exception table */
+       __start___pre_ex_table = .;
+       *(.ex_table.pre)
+       __stop___pre_ex_table = .;
+
+       *(.data.read_mostly)
+  } :text
+
+  . = ALIGN(SMP_CACHE_BYTES);
   .data : {                    /* Data */
-       . = ALIGN(PAGE_SIZE);
        *(.data.page_aligned)
-       *(.data)
        . = ALIGN(8);
        __start_schedulers_array = .;
        *(.data.schedulers)
@@ -94,26 +115,10 @@ SECTIONS
        __paramhypfs_end = .;
 #endif
 
-       *(.data.rel)
-       *(.data.rel.*)
+       *(.data .data.*)
        CONSTRUCTORS
   } :text
 
-  . = ALIGN(SMP_CACHE_BYTES);
-  .data.read_mostly : {
-       /* Exception table */
-       __start___ex_table = .;
-       *(.ex_table)
-       __stop___ex_table = .;
-
-       /* Pre-exception table */
-       __start___pre_ex_table = .;
-       *(.ex_table.pre)
-       __stop___pre_ex_table = .;
-
-       *(.data.read_mostly)
-  } :text
-
   . = ALIGN(8);
   .arch.info : {
       _splatform = .;
@@ -207,7 +212,7 @@ SECTIONS
        *(.bss.percpu.read_mostly)
        . = ALIGN(SMP_CACHE_BYTES);
        __per_cpu_data_end = .;
-       *(.bss)
+       *(.bss .bss.*)
        . = ALIGN(POINTER_ALIGN);
        __bss_end = .;
   } :text
diff --git a/xen/arch/x86/boot/head.S b/xen/arch/x86/boot/head.S
index dd1bea0d10..92d73345f0 100644
--- a/xen/arch/x86/boot/head.S
+++ b/xen/arch/x86/boot/head.S
@@ -9,7 +9,7 @@
 #include <asm/cpufeature.h>
 #include <public/elfnote.h>
 
-        .text
+        .section .text.header, "ax", @progbits
         .code32
 
 #define sym_offs(sym)     ((sym) - __XEN_VIRT_START)
diff --git a/xen/arch/x86/xen.lds.S b/xen/arch/x86/xen.lds.S
index 506bc8e404..75925fe145 100644
--- a/xen/arch/x86/xen.lds.S
+++ b/xen/arch/x86/xen.lds.S
@@ -73,9 +73,7 @@ SECTIONS
   _start = .;
   DECL_SECTION(.text) {
         _stext = .;            /* Text and read-only data */
-       *(.text)
-       *(.text.__x86_indirect_thunk_*)
-       *(.text.page_aligned)
+       *(.text.header)
 
        . = ALIGN(PAGE_SIZE);
        _stextentry = .;
@@ -86,8 +84,16 @@ SECTIONS
        *(.text.kexec)          /* Page aligned in the object file. */
        kexec_reloc_end = .;
 
-       *(.text.cold)
-       *(.text.unlikely)
+       *(.text.cold .text.cold.*)
+       *(.text.unlikely .text.*_unlikely .text.unlikely.*)
+
+       *(.text)
+#ifdef CONFIG_CC_SPLIT_SECTIONS
+       *(.text.*)
+#endif
+       *(.text.__x86_indirect_thunk_*)
+       *(.text.page_aligned)
+
        *(.fixup)
        *(.gnu.warning)
        _etext = .;             /* End of text section */
@@ -289,9 +295,7 @@ SECTIONS
 
   DECL_SECTION(.data) {
        *(.data.page_aligned)
-       *(.data)
-       *(.data.rel)
-       *(.data.rel.*)
+       *(.data .data.*)
   } PHDR(text)
 
   DECL_SECTION(.bss) {
@@ -306,7 +310,7 @@ SECTIONS
        *(.bss.percpu.read_mostly)
        . = ALIGN(SMP_CACHE_BYTES);
        __per_cpu_data_end = .;
-       *(.bss)
+       *(.bss .bss.*)
        . = ALIGN(POINTER_ALIGN);
        __bss_end = .;
   } PHDR(text)
diff --git a/xen/common/Kconfig b/xen/common/Kconfig
index 6443943889..202f0811d1 100644
--- a/xen/common/Kconfig
+++ b/xen/common/Kconfig
@@ -350,10 +350,14 @@ source "common/sched/Kconfig"
 config CRYPTO
 	bool
 
+config CC_SPLIT_SECTIONS
+	bool
+
 config LIVEPATCH
 	bool "Live patching support"
 	default X86
 	depends on "$(XEN_HAS_BUILD_ID)" = "y"
+	select CC_SPLIT_SECTIONS
 	---help---
 	  Allows a running Xen hypervisor to be dynamically patched using
 	  binary patches without rebooting. This is primarily used to binarily
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 16:06:44 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 16:06:44 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286215.485636 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRFsd-0005Lt-Ve; Mon, 07 Mar 2022 16:06:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286215.485636; Mon, 07 Mar 2022 16:06:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRFsd-0005Lm-RO; Mon, 07 Mar 2022 16:06:39 +0000
Received: by outflank-mailman (input) for mailman id 286215;
 Mon, 07 Mar 2022 16:06:38 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRFsc-0005Lc-RM; Mon, 07 Mar 2022 16:06:38 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRFsc-0008Dd-OL; Mon, 07 Mar 2022 16:06:38 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRFsc-0002D7-50; Mon, 07 Mar 2022 16:06:38 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRFsc-0001oz-4X; Mon, 07 Mar 2022 16:06:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=WCCb2HJ8MT+gkrw+0KTd7CfeT7oDGNt6MLPQqq0M8+s=; b=01spOIHXdC1STgqqBxws3zgVvE
	5apeRny83G7SO22ytlXO6O+qQN7YxP8ICw3wXCuh421fGZjz40yVGc805qboJLol8MnaxKA9LtfxJ
	Hek5PUXFeS6I1gXqlmM6dAmseAXydY3V3kGMeiYK06NO4DXCcb2QRI1k60EDFuZNybp4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168462-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168462: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=79f2734e5a7bc2e5256eb0e599f45407855159c7
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 07 Mar 2022 16:06:38 +0000

flight 168462 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168462/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 79f2734e5a7bc2e5256eb0e599f45407855159c7
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    7 days
Failing since        168258  2022-03-01 01:55:31 Z    6 days   72 attempts
Testing same since   168449  2022-03-07 02:15:20 Z    0 days   10 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 437 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 16:07:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 16:07:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286224.485647 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRFtC-0005tF-8a; Mon, 07 Mar 2022 16:07:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286224.485647; Mon, 07 Mar 2022 16:07:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRFtC-0005t8-5V; Mon, 07 Mar 2022 16:07:14 +0000
Received: by outflank-mailman (input) for mailman id 286224;
 Mon, 07 Mar 2022 16:07:12 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+gfv=TS=citrix.com=prvs=0582ef7ee=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRFtA-0005sw-KU
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 16:07:12 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a3cb7912-9e30-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 17:07:10 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a3cb7912-9e30-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646669230;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=Up7HvUx2iJQByKJw1mjpzmOHF1HPvSznlwsC7lOMEoA=;
  b=ZvUZi6QgMAItkRVcBtVinzBfB29GpcfG+nTgS2q4Vrtt0sLwNCBMnIF0
   j7MAiCXJgqdiLeFx419IClIVXflw4WQzJxkvSeFYUmxatDi7f5L0iCEOf
   UMd2rkcKuPN4zghdxja11qy8Uyeob/58hcl1I7AMX2Ocido1W59P0BUpU
   I=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66028614
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:xygFr6iRxDbnjcaagWvOo4nTX161fxAKZh0ujC45NGQN5FlHY01je
 htvCziHPfqJYWD8eNp2Yd+wpEsO65DUnYRnSlFtqCs0QXkb9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFvS4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YUApD/X0tcUhbwkGMDlhIZR45LbJB3fq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bkmtnwjzDS+4vXLjIQrnQ5M8e1zA17ixLNaiAP
 5BJN2MzBPjGS0QXPg8QGogwp9y12Eb8eWFj82iw5oNitgA/yyQuieOwYbI5YOeiVchT20qVu
 G/C12D4GQ0BcsySzyKf9XChjfOJmjn0MKoOFLyjsP9xxlTLwncUDjUZUFK6pb+yjUvWc9BVJ
 lEQ+yEuhbMv70HtRd74NyBUu1bd4ERaAYAJVbRntkfdkcI4/jp1GEBDTg8ZUPEHiPMmGx8yy
 UOwoc/gCxpg5ej9pW2myp+Yqja7OC4wJGAEZDMZQQZt3+QPsL3fnTqUEI89TffdYsndXGipn
 mvU9HRWa6A70JZTv5hX62wrlN5FSnLhagcurjvaUWu+hu+STN70Ptf4gbQ3ABspEWp4crVjl
 CVe8yR9xLpXZX1oqMBqaL9RdIxFH97fbFXhbadHRvHNDQiF9X+5Zpx36zpjPkpvOctsUWa3P
 BGO6F0Ju8QDbCfCgUpLj2WZUZhC8EQdPY69CqC8giRmOPCdizNrDAkxPBXNjggBYWAnkL0lO
 IfzTCpfJS1yNEiT9xLvH711+eZynkgWnDqPLbiilkTP+efONRa9FOZeWHPTP79R0U9xiFiMm
 zqpH5DRkEs3vSyXSnS/zLP/2nhRdSlrXc2t8pcPHgNBSyI/cFwc5zbq6epJU6RunrhPl/eO+
 Xe4W0RCz0H4i2GBIgKPAk2Popu1NXqjhRrX5RARAGs=
IronPort-HdrOrdr: A9a23:S9r6cqCCK7eotEHlHemo55DYdb4zR+YMi2TDsHoBLiC9E/bo8/
 xG+c5x6faaslossR0b9uxoW5PhfZq/z/BICOAqVN/JMTUO01HIEKhSqafk3j38C2nf24dmpM
 JdmnFFeb7N5I5B/KTH3DU=
X-IronPort-AV: E=Sophos;i="5.90,162,1643691600"; 
   d="scan'208";a="66028614"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=LUUBCTjewF9WnDiDt2zQqLaD8Sv0lP/6cYJJ+tFPdwto3lGxYUHiAGOMX4RfAM8O9mkt3crEhPtyZGpIHCUZOryBkKch5umHMXVgPddE8WN+k2G9CJPoDECwEDY4+Tk2UqBvcEiwUaXiBbqRiVak6GGuNn3YZHqW5ilfA9KltOnsznTAjZEuPSUhvmdz9OP3yolKI+/QZqmC/zgoyHzrHxTtdRT1xFe0u8jeQRB/SBDUKunz64KEgJULxY4h1yanQ8u9ze5SV0blWDOuNEZvJ93vY7QjZJoBVtDYpzdwGwJXAFxuW55ib1ovmxX/J0kvJ5mK2RVbfIWQSPkSmOCYfA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Sbaen9etnTXnRwjhhj6twHBeqnDJQHKTfmp/QQ6Rkio=;
 b=IQqDGV3eQe7a8AnEjd8Eaz+eTfr3Soc2dsqSX3pmqnZVYaJtOHbQDKjAkFJIVslY7w7tPitV9HLBYyTa0f/ktURJ8KSamrOYhfC1KuDfozVoMlh1HGoCJz0viZRCxghb/x8zOixPW1tzdHX5xqC5RcCnIM0w47T2rcdfw+ACuSxE1kIcHTWUkOHQ+pus51H7BEcOoIJC7gV0n5gIo2Ielk8v3fd01MEJNHIdrdI9mfoNOOhopDb9PGxTczTgluQmQ8MAfRdE2zjzBqLcIYwwZiVWASXoyfbrLLihZPKpMZd/YtQ3tUebfoK6QfETh4yF8uqnQQ1kN+l3pCZbCtmgtQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Sbaen9etnTXnRwjhhj6twHBeqnDJQHKTfmp/QQ6Rkio=;
 b=sULVL4qhVurUFYYCL5ZWz+0hrh4pTFycJC1LeRlvKLeKJZVW0AHmSqnpfKNrSMQeSHWLRpWa/RZyGDuahUn17cTu34/8QsxndxnLzOeMbbXl4hQQ0hiIUD1zIEqmeXXtzGRRKh4uq8xKTmQ3XszbFDBE3v2mKuMzrelFCPC0/DQ=
Date: Mon, 7 Mar 2022 17:06:59 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Alex Olson <this.is.a0lson@gmail.com>, <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v3] vpci/msix: fix PBA accesses
Message-ID: <YiYtoxcpi/KalGqg@Air-de-Roger>
References: <20220307125347.71814-1-roger.pau@citrix.com>
 <1480fa5d-bcee-e945-6b2f-9db7931c63af@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <1480fa5d-bcee-e945-6b2f-9db7931c63af@suse.com>
X-ClientProxiedBy: LO4P123CA0367.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:18e::12) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 33d1b586-01db-434b-3794-08da00548510
X-MS-TrafficTypeDiagnostic: SN6PR03MB3454:EE_
X-Microsoft-Antispam-PRVS: <SN6PR03MB3454BB3878CBB05B3EE735EE8F089@SN6PR03MB3454.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(6512007)(86362001)(4326008)(508600001)(26005)(66476007)(66556008)(66946007)(9686003)(6666004)(83380400001)(6486002)(53546011)(2906002)(5660300002)(8676002)(6506007)(8936002)(6916009)(38100700002)(33716001)(85182001)(82960400001)(186003)(316002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?WDhXRDlWSFZwL2xyakdPN2RlWGdOcUFPUkR2cEJUUUN1UG1pQ0hwcHBRbjha?=
 =?utf-8?B?OVh4VVBqRndlTlhlYUZzUkZVNHVtRE9Kelh2SG1GeHU2eGJVanBCSXRPeHh2?=
 =?utf-8?B?WUt6cXhlajdRNHJ3Q0ZwdURlR2twMU9nOXFKNG54WTlZVFFKRTQyMGFYVHVI?=
 =?utf-8?B?ZUxRS291Y08rWmJiRm8rbUVKcmdJeXRubm9WUk1SbysyVlV2Vy9ScnFGQllE?=
 =?utf-8?B?Sm0yT3NkSXRySTVER2lSUTdwd1VJK2hGTURLYWN2QWRsYmxMTGp1VnIxTVRE?=
 =?utf-8?B?bHozZnBlaUxMS3BJTUhaNzNNMG1YVklqVGc4NTE4L040V3ozbmV4M0FwV2R3?=
 =?utf-8?B?TUJTa1YybVk2R0JmN05FcENRU3dwUzVlK1lJcmMwWC9CTFFFWHRqVjl1YmFY?=
 =?utf-8?B?cFZWdFFxbkRPOWpOWDZhQlJ6aDJ6TzVVUWZVZm9VeVlhYWRPVDlQUnJKK1lk?=
 =?utf-8?B?ZUlTZEdaV3c2TnZGOVY1ZGdJR0xWQWtSbWhkWUdlQXRMcjk4Q3hMMmY3N0hp?=
 =?utf-8?B?WkF6UnVBNTFtczBRendCWXJGYS9LNGl5d2FyQTJLR2M5VTlnenMyU2gyckFt?=
 =?utf-8?B?VSs5QmxDMXJsMitGdEIrVW5rZ3lnTUJneUdzVzdjR2hpdFpobnZMK3RNcmpy?=
 =?utf-8?B?SWNvSWVQRU5QYmpObVg2SUt6WkRia05jMy9PTVVSb2o2SjA4SmdBT3JLNy9E?=
 =?utf-8?B?dGRlN2RmYWtMMmsyWDFTR0ZNeFVXYjFGa0VNeFI5QmtDS05uVEErS3NWRU9B?=
 =?utf-8?B?RDJ0Qk5IemtDV2NiY2Q0OXovUEQzL243aXhOQWs4bUFpWElqTFFPbUxlZkkv?=
 =?utf-8?B?K3YxQkczR0doeXdkZWMzQ1RPN1ZKTVpMVExKenZVcUw4UWpPSkF4andjYm9G?=
 =?utf-8?B?REhXYWNwbUdRN1pFdUhkcDZocmlVejlISElScEVXOEVreGxMZEtVSnN1NThr?=
 =?utf-8?B?Um1Rdk51MUdEeHA1b1l1WXoxWjNPak1HeXJGWGhhQndjNWF5YXZSRzFKeUtx?=
 =?utf-8?B?b1ZkR1loMk43eWoyY1pHdGUwUlNuSXcvN0o5Z0hTS25HcU9EM1I2dThHS3U2?=
 =?utf-8?B?QmM1R0FTb3FrNS9ZT0p6aXpLS0tYZUZxRWQ0dE00VmJoejN5a1dsVmtWUTB4?=
 =?utf-8?B?QzFoR3NqQTlndVIzam1SZ2FvWEFPeElJc29OdDI5RnpURVI4SForcXFoY1Vi?=
 =?utf-8?B?Mzd2VXNNUkJKajRqSFIrc0tjY0xUSkdTNnJLVjNOcitRbUZrM2pLazdRZlpp?=
 =?utf-8?B?WHBBRVVzWDhvSFpoSzBYZDYvdzl1RWpmMm10eXAvOFV1YzFoUG9DUjIweWt3?=
 =?utf-8?B?ZGdnZ0Qvb241UUpqcVppVzhjS0tRN3hmdkk4ZXlTZXNXdXVTYzVyS0tRTHRH?=
 =?utf-8?B?SWFnR0JuRjNGQTNycEpkZ1h1b3NXNjdhay8xYkhvbVN6bGg2a1VwWkNhQlE4?=
 =?utf-8?B?bThoRHJ0RzAvanRDZTE2L0Q2RzU1L0VsMXBqSGxLZlJtNWJGeVU2YzZBWDBH?=
 =?utf-8?B?dGpYZTc1QmtCaHA2Mkk5UUh4Yjh1czBVbHlZU1FNUzJyY25lTmt3SU1PME1p?=
 =?utf-8?B?c3BreVJPaFAwRmJnK0pGcUJrNEgrcDNvS0F6SEpUY1djTnZQZFFPU0Q1akRN?=
 =?utf-8?B?QjJOdDhKaUlrNEtUVUR4eGhNWDdXTUN4bEFjM0JIUzZ6Wi9wNmdXUHhsblN6?=
 =?utf-8?B?QXdQbThFYkZiQk9RSWkwZzQ1aU43QVZ0ZFhYQitUSkVrQlZYZXVyOHBDRGVD?=
 =?utf-8?B?TzhqTENVNC8yR3NoYWVJVHlnMXBtNHVKQ3gwaVNvOWZWVXF2THZFZndaWXJ3?=
 =?utf-8?B?eUJoWURFTkpGMFE1ZHJVMHJqRmc5N28ybkJTZmgzdCttQjcxYmQ5dHlBeDht?=
 =?utf-8?B?cGNVQ0IzNmlpOExYeDJKS1dXSnlWeVlZY3dKcDJtY3cyRnlMRFF1RS9IS29j?=
 =?utf-8?B?UjdSNVVQZ2VkQTd0Rm9GWHQrbEIxRFo4WmxOb2xNTm5Ca3BteHNyV0p3OVpG?=
 =?utf-8?B?S1NjRzlERjkycm81WnNWRkcvNUhXb3VzQWM0MjJIbGdwQ09IT0E4YUNlb0pO?=
 =?utf-8?B?cnhBd3JMc05aQnRLbTkveDBmdGhEUys2Q3JqSDYyK3hYZTNQRmlNUkpCMFB3?=
 =?utf-8?B?U1Bic3cwK0tVM3lqeDNMTE5mMWc4YmhwM1NHMDNuL3dwYXE0NUJkTjhieFp3?=
 =?utf-8?Q?aiAFO1o78qkMd+pL1gJN5zs=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 33d1b586-01db-434b-3794-08da00548510
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 16:07:03.8218
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: pi0e3nHKgnc1DLZT3Z21AVKHcsc71Hj8psNGgoBHEfibvSA5wMaz1it5xQ96q51Jfa+Hy5BKayy7TWS8cdx2lw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR03MB3454
X-OriginatorOrg: citrix.com

On Mon, Mar 07, 2022 at 03:12:32PM +0100, Jan Beulich wrote:
> On 07.03.2022 13:53, Roger Pau Monne wrote:
> > --- a/xen/drivers/vpci/msix.c
> > +++ b/xen/drivers/vpci/msix.c
> > @@ -182,6 +182,33 @@ static struct vpci_msix_entry *get_entry(struct vpci_msix *msix,
> >      return &msix->entries[(addr - start) / PCI_MSIX_ENTRY_SIZE];
> >  }
> >  
> > +static void __iomem *get_pba(struct vpci *vpci)
> > +{
> > +    struct vpci_msix *msix = vpci->msix;
> > +    void __iomem *pba;
> > +
> > +    /*
> > +     * PBA will only be unmapped when the device is deassigned, so access it
> > +     * without holding the vpci lock.
> > +     */
> > +    if ( likely(msix->pba) )
> > +        return msix->pba;
> > +
> > +    pba = ioremap(vmsix_table_addr(vpci, VPCI_MSIX_PBA),
> > +                  vmsix_table_size(vpci, VPCI_MSIX_PBA));
> > +    if ( !pba )
> > +        return msix->pba;
> 
> For this particular purpose may want to consider using ACCESS_ONCE() for
> all accesses to this field.

Hm, I think I've asked before, but we do assume that ACCESS_ONCE will
generate a single instruction, or else we would have to use
read_atomic.

> > +    spin_lock(&vpci->lock);
> > +    if ( !msix->pba )
> > +        msix->pba = pba;

Here we would then use write_atomic.

> > +    else
> > +        iounmap(pba);
> > +    spin_unlock(&vpci->lock);
> 
> Whenever possible I think we should try to do things, in particular ones
> involving further locks, with as few locks held as possible. IOW I'd like
> to ask that you pull out the iounmap().
> 
> > @@ -200,6 +227,10 @@ static int cf_check msix_read(
> >  
> >      if ( VMSIX_ADDR_IN_RANGE(addr, msix->pdev->vpci, VPCI_MSIX_PBA) )
> >      {
> > +        struct vpci *vpci = msix->pdev->vpci;
> > +        unsigned int idx = addr - vmsix_table_addr(vpci, VPCI_MSIX_PBA);
> > +        void __iomem *pba = get_pba(vpci);
> 
> const?

Sure.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 16:08:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 16:08:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286229.485657 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRFtw-0006V4-Hd; Mon, 07 Mar 2022 16:08:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286229.485657; Mon, 07 Mar 2022 16:08:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRFtw-0006Ux-Ee; Mon, 07 Mar 2022 16:08:00 +0000
Received: by outflank-mailman (input) for mailman id 286229;
 Mon, 07 Mar 2022 16:07:59 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=e/ad=TS=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nRFtv-0005sw-6Q
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 16:07:59 +0000
Received: from mail-lj1-x236.google.com (mail-lj1-x236.google.com
 [2a00:1450:4864:20::236])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c155aec6-9e30-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 17:07:58 +0100 (CET)
Received: by mail-lj1-x236.google.com with SMTP id bn33so21162269ljb.6
 for <xen-devel@lists.xenproject.org>; Mon, 07 Mar 2022 08:07:58 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c155aec6-9e30-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=Pion4CixDvZ8IvMRvvgjLSdT9j2vMW5ans9YMwXUKdw=;
        b=CCx2Pg1LBSORTbPKesDFWI4xw30qbPvZIeqkrNsGZ6h6mTXDz4R26AZlaWbqYXRr7B
         F96f1N7GekGCxrOBhVadCzWJOP6PgBW5PZzBz0wd3scT15Jyk1HrrBRNju3qU9+U7ANa
         0RlCf74lU+HXssFymhT/SBgTvTyFm/zm8touEC6XDcp9e+olMh7cGXjSbhqM9ETmH2Wp
         DSxW0F0eB2iohYUu5GhBATVm75DR2l5b1tUYpQNZkeMz19mq/45nBe5LEKnnAYYlNoY+
         pc/VoNIMqQGTTpymNpgat3aOoyoi3lATqVhauBJu84WSrIWtV4whFV7b8dS+ykbDknBm
         oq9Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=Pion4CixDvZ8IvMRvvgjLSdT9j2vMW5ans9YMwXUKdw=;
        b=FXZlUf1fG5CQOA5jRlAe1ouBXHfDlDcZIXbZZkovc37lpwF4W+D6GI92WsqE6TZxFq
         2P2yTyvgOT71sSichROfs757WMhPpApI0AkCuMHFdOEF6paXNEQEwEJKlL8t07NW7STb
         JrKEOvRp9IlBBa583S0GX7Tyh8l2225EUSBwA53cfbdD8nO96oDeEis+bSqqN7MwXgYO
         ZvUXhZT2yr7gGOw8SVkVAWz5YKbdBqPmdHr6d26Pw0pPz0j4oEcZcH+pCCFdUe473y/M
         5qO57hLVia0auGdXCZCUwW0sXvk1Y0ghN2PeswYm/S/bZX5jCHaiDhKWGyRMTqtRz6rg
         hslA==
X-Gm-Message-State: AOAM531FG3UI0ZiHdQED0qe4nNpJ+gYMjiF+ykQ6zN2BksElfNzfoAru
	PT5SUZfeJ8NWJCKQ7Xfw/8GTojlpAUXLXeVfTEE=
X-Google-Smtp-Source: ABdhPJzUPLtf/HRW6iJDJAyrYdzo/PQbnyDWNa5/wg3ayU5IQ9K4ww7ou6LjwyBWxhnEhGKtBh0apRiCrqFKmaj6Aew=
X-Received: by 2002:a2e:3c0d:0:b0:246:3c52:7ada with SMTP id
 j13-20020a2e3c0d000000b002463c527adamr8072176lja.459.1646669277675; Mon, 07
 Mar 2022 08:07:57 -0800 (PST)
MIME-Version: 1.0
References: <DB7PR03MB50027EE92E11BFFF71AADC4598049@DB7PR03MB5002.eurprd03.prod.outlook.com>
 <92827eec-b6e9-9c95-8f9e-fcf063d45090@santannapisa.it> <YiDt7fX92n6Luc2l@Air-de-Roger>
 <CAKf6xpsnmQG7-LXn5+Uz4mncWsN0EZ8wpagY8f8OydvZNb6g5A@mail.gmail.com>
 <YiH9cee6NIKA6MWg@Air-de-Roger> <53a4fe6b-efc8-bfa1-8475-0aa58774051a@santannapisa.it>
 <YiIFyRUNXpUfzwRB@Air-de-Roger> <0ce52d38-f542-9336-a100-1cbfc559f218@santannapisa.it>
 <YiXq5HIrvZsy7QKU@Air-de-Roger> <b388ed5b-177e-2e9d-6450-6df16d9250c4@santannapisa.it>
 <YiXwhUnZL8bcJvH2@Air-de-Roger> <93fb9755-d40a-3cfe-1f6e-335b57d5a213@santannapisa.it>
 <e5c4c591-8ef4-f8d7-aa2a-b196a5a9749c@suse.com> <6028180c-ff1c-5d4f-2cf2-582e4104d888@santannapisa.it>
 <04e4ecfb-0235-db0d-d5fd-3274879003fa@citrix.com> <9b38e9b4-b2e9-b790-397c-38d7b62443d4@santannapisa.it>
In-Reply-To: <9b38e9b4-b2e9-b790-397c-38d7b62443d4@santannapisa.it>
From: Jason Andryuk <jandryuk@gmail.com>
Date: Mon, 7 Mar 2022 11:07:46 -0500
Message-ID: <CAKf6xpt7ygY_+zAHR6pHSRdtbgyjnSpB2Phz8qNCrdptU9H=Cg@mail.gmail.com>
Subject: Re: Network driver domain broken
To: Andrea Stevanato <andrea.stevanato@santannapisa.it>
Cc: Andrew Cooper <Andrew.Cooper3@citrix.com>, Jan Beulich <jbeulich@suse.com>, 
	Roger Pau Monne <roger.pau@citrix.com>, 
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "wl@xen.org" <wl@xen.org>, 
	Anthony Perard <anthony.perard@citrix.com>
Content-Type: text/plain; charset="UTF-8"

On Mon, Mar 7, 2022 at 10:00 AM Andrea Stevanato
<andrea.stevanato@santannapisa.it> wrote:
> (XEN) XSM Framework v1.0.0 initialized
> (XEN) Initialising XSM SILO mode

Yes, SILO mode is running.

> # cat /boot/xen-4.14.3-pre.config | grep XSM
> CONFIG_XSM=y
> CONFIG_XSM_FLASK=y
> CONFIG_XSM_FLASK_AVC_STATS=y
> # CONFIG_XSM_FLASK_POLICY is not set
> CONFIG_XSM_SILO=y
> # CONFIG_XSM_DUMMY_DEFAULT is not set
> # CONFIG_XSM_FLASK_DEFAULT is not set
> CONFIG_XSM_SILO_DEFAULT=y
>
> This is the default configuration shipped with petalinux. From the
> help menuconfig, it seems that this XSM SILO deny communication
> between unprivileged VMs.

You could try adding xsm=dummy to your hypervisor command line to turn
off SILO and allow the guests to communicate.

Regards,
Jason


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 16:08:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 16:08:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286236.485669 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRFug-00075l-QV; Mon, 07 Mar 2022 16:08:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286236.485669; Mon, 07 Mar 2022 16:08:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRFug-00075e-NW; Mon, 07 Mar 2022 16:08:46 +0000
Received: by outflank-mailman (input) for mailman id 286236;
 Mon, 07 Mar 2022 16:08:45 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=/EJ7=TS=santannapisa.it=Andrea.Stevanato@srs-se1.protection.inumbo.net>)
 id 1nRFue-0005sw-JZ
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 16:08:45 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04on0610.outbound.protection.outlook.com
 [2a01:111:f400:fe0e::610])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id dbc23599-9e30-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 17:08:42 +0100 (CET)
Received: from AM6PR03MB5000.eurprd03.prod.outlook.com (2603:10a6:20b:88::11)
 by DB7PR03MB4844.eurprd03.prod.outlook.com (2603:10a6:10:7e::12) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Mon, 7 Mar
 2022 16:08:39 +0000
Received: from AM6PR03MB5000.eurprd03.prod.outlook.com
 ([fe80::cdef:8699:47b:300d]) by AM6PR03MB5000.eurprd03.prod.outlook.com
 ([fe80::cdef:8699:47b:300d%3]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 16:08:39 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: dbc23599-9e30-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=L7x5m7fn2MavIpRBfoFXJejGwJBmwf3Nn0lem+bcKLpRuYf0QzyPAN1HmK7JSc16qJqUmVw7VY0Pbos3DEK2Q0d5cp9yUIVMRwn/dG0kgOHjONPwd7aQVl+jNi1UDDf+qvU07cYgmqY8VlD3zjifTz5lpCwdw+VfYho+sdYYjLxAKNwSpJC6dU2M/npJqRKG9DPcW17vckY11VpX56n3wb05UyqQS9FSGv5vjsEI1idunZzjnRkMZuxmMaKvQxsXPNFA+WIEknIIQ53PfCfR+6hzZRs859gl3oV3gvq81ORGdHE2hSaPaJxRWs1Sy/2BzlwfgH4NqOGEolWAAuOnyA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=fsov/kYrN0P1VuEaEL68xieAQHSnRBrLrUPiRWzPWQ8=;
 b=FpT90XkGHkwjQkpu0koFxXayW2C0DtCOFEeTYhKT17jopweNbMkgMAvNlno9UREfga6loyzl1qUXIhSQxg4OsQcr015cAabye9FhrKVHV6AnaplkxppmoIHQDa+etU3R7eVGijpEKsnSl/H1RSFdrdd3Qqs+tIG9jrONTS0LIOtZvVUtWNxVUHFnnCCfpAjEWslvYfWTgQyiXCkeCPFt0wggwz/ykvUlpmFC84/WjvPRPa71R5ffR3QTqpkB5IrqCc9PIMbuF8gFKA1w5Wznz4s15vt7RHdK5YVceYyXCAuxkxmuK0JjC2d7Y41IOmMICHRCnKH+9KSy5DUFp0NvXg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=santannapisa.it; dmarc=pass action=none
 header.from=santannapisa.it; dkim=pass header.d=santannapisa.it; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=santannapisa.it;
 s=selector1;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=fsov/kYrN0P1VuEaEL68xieAQHSnRBrLrUPiRWzPWQ8=;
 b=pQbC7T1L3f9f7ZeMcH85j8LS6mO9f48gvhOnhhYvpYZByh6dRGWx1dWAchNqyFV9ReFgBd+l97XQidcjuVEwQM5k/Fvd+z4airAWw3/oOpprI4kvfR5kJLMiqqmFDGKMXBGVPAMs3WeeMFV16cXEsWElpmICqyTQFBZXjSPGKxM=
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=santannapisa.it;
Message-ID: <feaea184-2b6e-3dd4-132f-9a8489ae5a0f@santannapisa.it>
Date: Mon, 7 Mar 2022 17:08:38 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: Network driver domain broken
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?=
 <roger.pau@citrix.com>
Cc: Jason Andryuk <jandryuk@gmail.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 "wl@xen.org" <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>
References: <YiDt7fX92n6Luc2l@Air-de-Roger>
 <CAKf6xpsnmQG7-LXn5+Uz4mncWsN0EZ8wpagY8f8OydvZNb6g5A@mail.gmail.com>
 <YiH9cee6NIKA6MWg@Air-de-Roger>
 <53a4fe6b-efc8-bfa1-8475-0aa58774051a@santannapisa.it>
 <YiIFyRUNXpUfzwRB@Air-de-Roger>
 <0ce52d38-f542-9336-a100-1cbfc559f218@santannapisa.it>
 <YiXq5HIrvZsy7QKU@Air-de-Roger>
 <b388ed5b-177e-2e9d-6450-6df16d9250c4@santannapisa.it>
 <YiXwhUnZL8bcJvH2@Air-de-Roger>
 <93fb9755-d40a-3cfe-1f6e-335b57d5a213@santannapisa.it>
 <YiYcPgVTpA8//ojA@Air-de-Roger>
 <9bdcff21-064c-b671-d8d2-7b7e20e486c7@suse.com>
From: Andrea Stevanato <andrea.stevanato@santannapisa.it>
In-Reply-To: <9bdcff21-064c-b671-d8d2-7b7e20e486c7@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: MR2P264CA0035.FRAP264.PROD.OUTLOOK.COM (2603:10a6:500::23)
 To AM6PR03MB5000.eurprd03.prod.outlook.com (2603:10a6:20b:88::11)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: d3420b60-5407-4233-2f35-08da0054be33
X-MS-TrafficTypeDiagnostic: DB7PR03MB4844:EE_
X-Microsoft-Antispam-PRVS:
	<DB7PR03MB4844B15DDF11DF819D6DE68D98089@DB7PR03MB4844.eurprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR03MB5000.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(3480700007)(2906002)(186003)(316002)(786003)(508600001)(66476007)(66556008)(2616005)(44832011)(66946007)(4326008)(8936002)(86362001)(8676002)(83380400001)(53546011)(52116002)(31686004)(6512007)(6506007)(26005)(54906003)(6486002)(31696002)(110136005)(38350700002)(38100700002)(5660300002)(36756003)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?Q0x4RVkyZGFjMzI1dGJhMDRqZDhlSHdQWlZqcEJkZmorWUphSTJpMGdVOExG?=
 =?utf-8?B?amRaT3RBR1RFUlFGSk9FVDBlY0R2Rnp4NHVOdlJHdWp0RmY4MVc3RW1PWnpE?=
 =?utf-8?B?SmVzOUNQUWxWTm1kTXRpSXdLVHplNTdaMUlsWWR1QUgzblk0V1hqOXRYUWQy?=
 =?utf-8?B?MmZlb1NrbFhzckRsL1pDbUhzd3daTHE3UW9wWFRxclFJSjRIODhGYVNiWHVq?=
 =?utf-8?B?WkNpUXhleHZYMGZ2WHVaVi9MSUVibHVEeGNybmQrTUw3NUk3dHNyWWpsSkNN?=
 =?utf-8?B?TW9hUFR6RmpLVGhJdXdhTVhnQVVia0laTEFmU2xsUlkrbEtabDRKSENBdFcv?=
 =?utf-8?B?Mm12WkhHOElzeVN4TXdLVUUrMTV3QlpaaEdCYW82TXptMUc2MUpua2xtd2xt?=
 =?utf-8?B?QlhXZXROL3VUWENyMUN6UmdoOVlDYnJBL1NpWkNGY1pzZ1dlYm9BVnJIbkdY?=
 =?utf-8?B?dUpsU0lCMjBVNTU3aDJ5azdrditoeHFjYmxoTUtQbHJraDNsQXM2M0JGOFhD?=
 =?utf-8?B?WHo1WUhlTVY5ZHRhbTZZREMvZ2ltL2QyaUIzMS9ORUppMnhnNzBJSzZ5VjBs?=
 =?utf-8?B?QnlWckJ2MUhqdGhnZVdxQ2lSb2FwS0UzN1NsaXlBNWRreldJaDZmRmJRSEJk?=
 =?utf-8?B?K1NFS1pCOVRXUWRJQnNpUjNGa1ZmNmZ0WUVRYklzWDhlTlp3WnBoejhBK3FM?=
 =?utf-8?B?U3ZFMzNleUdta0hJZDZzQy9FeUZyK3Z5REVsdzlUZkpwUFBjR1IyL3IzQkpH?=
 =?utf-8?B?ODNmK05UT281WHBpQnpySE01bldOMGVHcGU1ZngzcnFIRFd5S1o2N1lQTUJX?=
 =?utf-8?B?ZDVIUytRRlIzNHN3UlZBbzJ5VFE4RGhDRUI3RnpWZ3UrdmJaNVg0L3JOd0dL?=
 =?utf-8?B?dUE2NHQ3NHZFTjRRU2hCb2dCSDVMd1VVcE9YT2Qxcmtlc0NsU0c5c2EralA2?=
 =?utf-8?B?M3NpSDZtRE1sVGFYL1hmTmMvblk2TW1qRUFTWFZNUTBwK01Bc09Yd3FiV3cz?=
 =?utf-8?B?bG5XNkFTanQvb0xmaG9kNndnazJNaGIyRVBTcTNzN1lTbXZDNjVMWUxkMm1t?=
 =?utf-8?B?OHRqOXdUME0wS2FMZmoyc1hFc2VRMlNVemxSdTZxdTdQWFlsdGRybkIwMWpS?=
 =?utf-8?B?VGk1T2Jid3ROVi8zWjk4ZFNMVkNUd1V3Sy9FOVd6UEZiSkpsOElDTU5qbk9l?=
 =?utf-8?B?Y3k3MVlFV3U5Q3NPb0tKUUlueFVETVlxVHcvaWdjcW9uV2VPS2NicjQwdWpH?=
 =?utf-8?B?Tyt2ZlZpc0ZrSU92Y1Q4TnN2QmpaWk9HQVBGOGR0NlBtRVEvYlRtRlFXUVlF?=
 =?utf-8?B?OUU1aE5sSFhLb2lWL1pHOGJ4M3NjL2dOS0R5VEVoaVVueDlUSml5M3ZkWTVF?=
 =?utf-8?B?V2U3T1RJS3oyZk53T2E5clBUZDUvUG9VbThDZUczMjdaenVmUGlmN1gzWEtO?=
 =?utf-8?B?T3hObkRUWFY5bXBqYnlYa2xlRFVGblc0RHJiQys5cHRxK1VubkVjckJPeVZY?=
 =?utf-8?B?WE83d3RtQVlXL3BadHZSMW5YMnlXbGh2aEhiSSs4U3VrcVFCOHNWQlREVXpH?=
 =?utf-8?B?cUhpc3YxMGg4NG5qTC9JOTFJOFBOdXZHVDNpdW82RkMrRmlNYU80cjd2dFNY?=
 =?utf-8?B?MGdySmlZVEtBekJJWlE0dTg1UnViTHdRUmd4TWVJa1QzZkpmVjdleWk1Tmp3?=
 =?utf-8?B?OGtNbmZId2FFdHhtZHV5SVdHWEo1bG5sTWowVXZncTRiUlJsd0FocGJHRjFW?=
 =?utf-8?B?OEY3UU45cjNnY2xWWmR2UzV3dHdOVys4Vnp0Q0xkSVlsdTVCTnEzclZPN3A4?=
 =?utf-8?B?QXcrbHpXWEM4Q0pCUU4xQm1QSVh3YWY1T203dGJ6UkxTVnpXUWVWcEZuY3Iv?=
 =?utf-8?B?QmVoaEVoZVpteEJwTGhnRnNNYWtqSEk4bzlnMWxZNTI2K2c0bGxTbHZGdWdY?=
 =?utf-8?B?aGVpaTJoeFBpMUNWNG4vb0xKL2kvNXJxZi90dzFTOWpreHBxYWcyY1NiTjJU?=
 =?utf-8?B?NE5LUG1wM1B6S3FmRytJSFg1dklPOVNRTGlXK2xnbHNFa3R1bXVaVXhWenIr?=
 =?utf-8?B?ZTdlN1R2K2s0TnJ3Y3N1ZW4vcUZsNlRtbUdCWk00dTl1a1JMKzltZWZGSWpm?=
 =?utf-8?B?OGl3MGxlWng5QTlWU2hNalJxYXJxNGpOOGxuUExicUZSWkhkVWFNZ2tUdWRZ?=
 =?utf-8?B?eTFrZ2NYSmVJWEFxSWxsVlEyOGx5aGJiVTNFeUFOR3VWM3E2WmgzN2hqMWxn?=
 =?utf-8?B?QTVIZFBndzhheE5RRCt6OUJibEFncC8ya0RVNDNvYjlzbmY0aS96Mk14S0Uv?=
 =?utf-8?B?ZjYvcHZVVXRxKzRsdjNEQ3lBbFNsMEdrMHZ5UEh1d2hLSUlSanZnUT09?=
X-OriginatorOrg: santannapisa.it
X-MS-Exchange-CrossTenant-Network-Message-Id: d3420b60-5407-4233-2f35-08da0054be33
X-MS-Exchange-CrossTenant-AuthSource: AM6PR03MB5000.eurprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 16:08:39.5718
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: d97360e3-138d-4b5f-956f-a646c364a01e
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: NQ7SGsJCTL33jig7P0u/r3Jte2z3/CnOpa8fGfY/Ur7KfUAhOFjlYT4ynvwuHIO4Sxi9ksEuv5XVILB+ylihS0exbwFum8Hi148+dUGm/PhJPOBF1sSNnZU4t05OYaQM
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR03MB4844

On 3/7/2022 3:56 PM, Jan Beulich wrote:
> On 07.03.2022 15:52, Roger Pau Monné wrote:
>> On Mon, Mar 07, 2022 at 03:20:22PM +0100, Andrea Stevanato wrote:
>>> On 3/7/2022 12:46 PM, Roger Pau Monné wrote:
>>>> On Mon, Mar 07, 2022 at 12:39:22PM +0100, Andrea Stevanato wrote:
>>>>> /local/domain/2 = ""   (n0,r2)
>>>>> /local/domain/2/vm = "/vm/f6dca20a-54bb-43af-9a62-67c55cb75708"   (n0,r2)
>>>>> /local/domain/2/name = "guest1"   (n0,r2)
>>>>> /local/domain/2/cpu = ""   (n0,r2)
>>>>> /local/domain/2/cpu/0 = ""   (n0,r2)
>>>>> /local/domain/2/cpu/0/availability = "online"   (n0,r2)
>>>>> /local/domain/2/cpu/1 = ""   (n0,r2)
>>>>> /local/domain/2/cpu/1/availability = "online"   (n0,r2)
>>>>> /local/domain/2/memory = ""   (n0,r2)
>>>>> /local/domain/2/memory/static-max = "1048576"   (n0,r2)
>>>>> /local/domain/2/memory/target = "1048577"   (n0,r2)
>>>>> /local/domain/2/memory/videoram = "-1"   (n0,r2)
>>>>> /local/domain/2/device = ""   (n0,r2)
>>>>> /local/domain/2/device/suspend = ""   (n0,r2)
>>>>> /local/domain/2/device/suspend/event-channel = ""   (n2)
>>>>> /local/domain/2/device/vif = ""   (n0,r2)
>>>>> /local/domain/2/device/vif/0 = ""   (n2,r1)
>>>>> /local/domain/2/device/vif/0/backend = "/local/domain/1/backend/vif/2/0"
>>>>> (n2,r1)
>>>>> /local/domain/2/device/vif/0/backend-id = "1"   (n2,r1)
>>>>> /local/domain/2/device/vif/0/state = "6"   (n2,r1)
>>>>> /local/domain/2/device/vif/0/handle = "0"   (n2,r1)
>>>>> /local/domain/2/device/vif/0/mac = "00:16:3e:07:df:91"   (n2,r1)
>>>>> /local/domain/2/device/vif/0/xdp-headroom = "0"   (n2,r1)
>>>>> /local/domain/2/control = ""   (n0,r2)
>>>>> /local/domain/2/control/shutdown = ""   (n2)
>>>>> /local/domain/2/control/feature-poweroff = "1"   (n2)
>>>>> /local/domain/2/control/feature-reboot = "1"   (n2)
>>>>> /local/domain/2/control/feature-suspend = ""   (n2)
>>>>> /local/domain/2/control/sysrq = ""   (n2)
>>>>> /local/domain/2/control/platform-feature-multiprocessor-suspend = "1"
>>>>> (n0,r2)
>>>>> /local/domain/2/control/platform-feature-xs_reset_watches = "1"   (n0,r2)
>>>>> /local/domain/2/data = ""   (n2)
>>>>> /local/domain/2/drivers = ""   (n2)
>>>>> /local/domain/2/feature = ""   (n2)
>>>>> /local/domain/2/attr = ""   (n2)
>>>>> /local/domain/2/error = ""   (n2)
>>>>> /local/domain/2/error/device = ""   (n2)
>>>>> /local/domain/2/error/device/vif = ""   (n2)
>>>>> /local/domain/2/error/device/vif/0 = ""   (n2)
>>>>> /local/domain/2/error/device/vif/0/error = "1 allocating event channel"
>>>>> (n2)
>>>>
>>>> That's the real error. Your guest netfront fails to allocate the event
>>>> channel. Do you get any messages in the guest dmesg after trying to
>>>> attach the network interface?
>>>
>>> Just these two lines:
>>>
>>> [  389.453390] vif vif-0: 1 allocating event channel
>>> [  389.804135] vif vif-0: 1 allocating event channel
>>
>> Are you perhaps using some kind flask/xsm policy different from the
>> defaults?
> 
> Or SILO mode.

It turns out that this was the problem. I changed it to FLASK, added
flask=late to the bootloader cmd and now it works fine (at least for
now).

> Jan

Forgive me for bothering you so much, as soon as I can I will update
the wiki with all the information that I have discovered!
Thank you all!

Cheers,
Andrea


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 16:10:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 16:10:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286245.485680 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRFwM-00007v-A7; Mon, 07 Mar 2022 16:10:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286245.485680; Mon, 07 Mar 2022 16:10:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRFwM-00007o-73; Mon, 07 Mar 2022 16:10:30 +0000
Received: by outflank-mailman (input) for mailman id 286245;
 Mon, 07 Mar 2022 16:10:29 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=/EJ7=TS=santannapisa.it=Andrea.Stevanato@srs-se1.protection.inumbo.net>)
 id 1nRFwL-00007e-8c
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 16:10:29 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on20611.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::611])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 1a6f509b-9e31-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 17:10:28 +0100 (CET)
Received: from AM6PR03MB5000.eurprd03.prod.outlook.com (2603:10a6:20b:88::11)
 by VI1PR03MB6271.eurprd03.prod.outlook.com (2603:10a6:800:13a::17)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Mon, 7 Mar
 2022 16:10:25 +0000
Received: from AM6PR03MB5000.eurprd03.prod.outlook.com
 ([fe80::cdef:8699:47b:300d]) by AM6PR03MB5000.eurprd03.prod.outlook.com
 ([fe80::cdef:8699:47b:300d%3]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 16:10:25 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1a6f509b-9e31-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Zs8uw8kM5ORnHS49qUl3LAy4moHccT5yjIu6lOQozahGq/a8doZPgQFkjaD6qio3UwXBzgkEb5UGzcM9OQgKaJ4MTHXbtq6/ZIvMwAruiHeAe1+xJYkc8/LCgIpzT+cv4LvCcTVoIxs9rPEIwxC3pMw9FjKR09/5Llrv3AqGjT6o/TYX72Yc6vS8t3B9E8zQU+rAvEWrxGCCiicYbWLt8km51Yie9G7Cjj3bDHgYfOnnU238xc0tLyZsuH0HF11WoQ1QGkZIXNGzhxfuOq41V7UaGTTpXmT+FEb7HqyZMYwKDi6zD2vO1/QUn+TAK62kY6W8fDgjoc26N23C0hwfiw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=8m03gDCF/6FQNc1o72rGkzNTVqWIpKBWRPbyHs9zZPE=;
 b=U+1bsMlGwF9ndk0IkBf7vM+zZofwWfqDS1jEc4S2CKsYVIK45ub8qa55zxMr3hLr7GlrUj5dZOwblrpXmqK7GTyF2hPr0zOwxDezJQJe3hapfNoHtNB5a8S1JNBDyhkIA2RFU6QJ/2sNtevmPiLSxHVEk9qIiGeceT3PN2wIx00LDuO2EYUre5a12uKxqp74HSx25r8tjk5/ShNaIThkvj6N7I5C0gsRT7R9LZQA0rNFRIjDV5mBgduvYDX6ZWoQIojn7/Mb3vbjVEdMGd9Fcr9MT5rOnTP9HPsl+d+3Bp04Yb9Mk/3aCxVqva+QrzORx68D6H7FS0PqMyEdhMiffw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=santannapisa.it; dmarc=pass action=none
 header.from=santannapisa.it; dkim=pass header.d=santannapisa.it; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=santannapisa.it;
 s=selector1;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=8m03gDCF/6FQNc1o72rGkzNTVqWIpKBWRPbyHs9zZPE=;
 b=nb13W0CJVjb+Old8OUPpGMpAF9rB21gXLXdD1b77LJyW3l515idmYRGTvHEI1uSZHE9LZrJSWEErOQ66a2pnfLK4GBIS4q2W7NSppl9rVoakpSJaG/t9uOOsERChXQJJ3YivuGXUz2rdAm5eghA90Avxwba12W5FHjIRzbCpE+c=
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=santannapisa.it;
Message-ID: <f3ea9089-92db-d868-c7b5-6fb76124623f@santannapisa.it>
Date: Mon, 7 Mar 2022 17:10:24 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: Network driver domain broken
Content-Language: en-US
To: Jason Andryuk <jandryuk@gmail.com>
Cc: Andrew Cooper <Andrew.Cooper3@citrix.com>, Jan Beulich
 <jbeulich@suse.com>, Roger Pau Monne <roger.pau@citrix.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 "wl@xen.org" <wl@xen.org>, Anthony Perard <anthony.perard@citrix.com>
References: <DB7PR03MB50027EE92E11BFFF71AADC4598049@DB7PR03MB5002.eurprd03.prod.outlook.com>
 <92827eec-b6e9-9c95-8f9e-fcf063d45090@santannapisa.it>
 <YiDt7fX92n6Luc2l@Air-de-Roger>
 <CAKf6xpsnmQG7-LXn5+Uz4mncWsN0EZ8wpagY8f8OydvZNb6g5A@mail.gmail.com>
 <YiH9cee6NIKA6MWg@Air-de-Roger>
 <53a4fe6b-efc8-bfa1-8475-0aa58774051a@santannapisa.it>
 <YiIFyRUNXpUfzwRB@Air-de-Roger>
 <0ce52d38-f542-9336-a100-1cbfc559f218@santannapisa.it>
 <YiXq5HIrvZsy7QKU@Air-de-Roger>
 <b388ed5b-177e-2e9d-6450-6df16d9250c4@santannapisa.it>
 <YiXwhUnZL8bcJvH2@Air-de-Roger>
 <93fb9755-d40a-3cfe-1f6e-335b57d5a213@santannapisa.it>
 <e5c4c591-8ef4-f8d7-aa2a-b196a5a9749c@suse.com>
 <6028180c-ff1c-5d4f-2cf2-582e4104d888@santannapisa.it>
 <04e4ecfb-0235-db0d-d5fd-3274879003fa@citrix.com>
 <9b38e9b4-b2e9-b790-397c-38d7b62443d4@santannapisa.it>
 <CAKf6xpt7ygY_+zAHR6pHSRdtbgyjnSpB2Phz8qNCrdptU9H=Cg@mail.gmail.com>
From: Andrea Stevanato <andrea.stevanato@santannapisa.it>
In-Reply-To: <CAKf6xpt7ygY_+zAHR6pHSRdtbgyjnSpB2Phz8qNCrdptU9H=Cg@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: MR1P264CA0039.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:501:3e::31) To AM6PR03MB5000.eurprd03.prod.outlook.com
 (2603:10a6:20b:88::11)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 8f8cb651-1763-4291-d5be-08da0054fd24
X-MS-TrafficTypeDiagnostic: VI1PR03MB6271:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR03MB62718C9785116E419909286D98089@VI1PR03MB6271.eurprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR03MB5000.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(31686004)(53546011)(3480700007)(6916009)(54906003)(508600001)(36756003)(6512007)(6506007)(6486002)(786003)(2906002)(38350700002)(38100700002)(316002)(8936002)(66476007)(2616005)(66946007)(44832011)(66556008)(86362001)(83380400001)(31696002)(26005)(186003)(4326008)(5660300002)(8676002)(52116002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?NzZ4clI3WW5xd1VPUGExWGs0d1ZLNWNBM1pHNEY2S3ZlMndaN1dkVW5EWXRm?=
 =?utf-8?B?bU1wdEdoQkZmcnpKTlI0NWFONU9lSjZqc3l3d2VtQ013bC9wS0pnNEE4VkM3?=
 =?utf-8?B?amwyUnRNZzdoNUoyd3FtOVhKUVgwSTFKM2R0T21aQk10eTdxYTZVcWx0dDlG?=
 =?utf-8?B?dDhsdmJZRU96L1BRRTgwREtwdTg5ZDZENFp0eVYrdjR5UGZTdGd4M3IzZnpo?=
 =?utf-8?B?TXhwdGxjMnRvamg3MFVCd1ExcFVVS2xKZkQ3UWNndE4wQnZVQzNrT0lpMTRL?=
 =?utf-8?B?NG9UMW9Nb0NOYlFGUFI0aHVUUnJsZ1Fha1pDNjlvVWtMamljU1NlSnlHOFFo?=
 =?utf-8?B?eERFVWxrbTZ4ejNCMm5uaDZEYXRlUzlmNy9UcUN1QS9reVoxRlRXNTlTOStB?=
 =?utf-8?B?L2IvaC9PR1RtSUxBVzhMRlo2a25GMFFnTGIvOSswRzk0dmc3QTNWRFlXU1dD?=
 =?utf-8?B?Wjl1U3Z0b2VqN2I4WEVHUXBWYWFjSnNBaFE1VnpMWXNSNmxSenl3aFRPOG5i?=
 =?utf-8?B?dVhtYTNGY3dncUdQN3RvZC9Nc2JhTkNqaXh3c0FDUE01MWpocXpEdVowRHhN?=
 =?utf-8?B?UlRXcmRXK080OWZuek9teXF5amd1RU1pQy93QllMcXgrQm5CRlBLbzFHc1hP?=
 =?utf-8?B?Z2Uvbll0NjJDRFVhMHQzQU5NL29XTDFOSTlVZGJidzlsZ1cyZGpXNU9PZU5C?=
 =?utf-8?B?L0pXN2ZCcW9uM3JyNFBSN3VOV2hBdzU1UGVJUHlPNmJnMWFHWW0zMGI4R0Zw?=
 =?utf-8?B?UGVGaFNWSFVXZEkwQW5sN2FzOWtnaDVZQVU4dkFwYXR1eTVqNkRGSGVEQUJQ?=
 =?utf-8?B?L0h5VkFpcDRnalVKT1lXQ3hSQUkwRFc4cE9ma1RHVDh0b2xBL3JvRFN4UXZj?=
 =?utf-8?B?SEF6TmdsKzQzbnpBL1hkYnI1L0hoSW1JWFo5N0I5RWtYd2VBSUQweGMyNkMw?=
 =?utf-8?B?MkRIaDQ5bStvaWFkKy8vZUNaRDhWNVM4V0pLdWQ4QzIrZk5McUlPZUV2Z0NL?=
 =?utf-8?B?Q2k5bm0wbGdvZTUrNHhpUGVIbkdENmVXZWRiL1UvcnBQMDBudCtBZU9nQVA3?=
 =?utf-8?B?eXpac3FBL2FINkNyNTRPZ3E0TkUxNjlGbjluMWt6RGtzN012UFY1azVpV1VC?=
 =?utf-8?B?eTcwaGxRYzBrZ3NRazBMWFJqMmJqUndNaGpFSXpWYjI5Q08xZEd3dE01VXN2?=
 =?utf-8?B?WEVhL3BwSWQwRllBeEJSeUtqaUJWZE5mTjFxYmJHc25FNzNJK0s4cEtqZkhJ?=
 =?utf-8?B?ei9MaFRtcFNGU2tZbXI4UW9MdXZpa05walNTZWZaaTFDVTZpaW92L01rNGhw?=
 =?utf-8?B?clJLdFNlUlZnS28wN3VEUEhCTWZXakpDT3AwQjhzaE9KNW9MWnpNUytqbFlq?=
 =?utf-8?B?OUVCMGFES2I5UVJlbDY3ZU1sVExlUUU4YUE2c1ZaRk14U0plTDhiQjNKRzkw?=
 =?utf-8?B?Y243YkNLS2c5T25WTWYraCtVVTJ1L0FsL0pMcFRWUFc5VEszYnlkeDJpNVhL?=
 =?utf-8?B?dXBUQkUxRGlDQkwyQW8wc09naHVxTWFxZWV6Y1lkdUxTenJzL1A4a2w4LzV6?=
 =?utf-8?B?KzU2TWpkd2RTV2Q1RURIM1pPQVhEVWY2ZXZVSnlBY21zUHhBYUt1U3Mydllr?=
 =?utf-8?B?ODcybmcvaHhCY3pGUUVpSkZRbnpjakt5L3NlRW50RmtvbmV1QmU0eUtkV0R2?=
 =?utf-8?B?Q05wMCtudWozTnJ1MmZjcjR1clVlaU41aFl4RWhmbHVORU5BUGV5N1VCa213?=
 =?utf-8?B?S0Vob1dJWHV1UGVHVFlCZ01WdXVOQWJrekpabHBWbU85SWRYTi9OYVMxTTl3?=
 =?utf-8?B?V1NONnJpdlQ5NVIxOW9WRk93a0NyL1ZuZldzOVp6TkxsOGdEcjQ5cnFVcFNV?=
 =?utf-8?B?RUtnQzN1T285WHBuUExieTFOTENMMm5zY1E5UVUwMTg2QlNuL05ZaVFkRUNu?=
 =?utf-8?B?QlRGR05vSWlJSUFrNDFvVG5Md0pIeUQwZVQyMDdpOE5KNUFoeTVxcnpjZ1h3?=
 =?utf-8?B?QnhzRUJueUVWSjkxZTNCU2RObEVWSm1XUWFpTHd2V2ZvRVNibGFMY1U2dWhm?=
 =?utf-8?B?M3ZrR1EyMk9uZGY5dmU5Y2pKMEw5WFdCSlJLb0diR3dtS1oxUkprTHZzRzE2?=
 =?utf-8?B?QUMya3RRaEhNVHA5UVlBamlLUTRyenZHRzFyNkRVZ1I4SzJPWmpERjVkczU0?=
 =?utf-8?B?Y0JMSHArTW5DaERlS0Zwblo1TGlaa3Z1ZDc2YklDZUo2K3FEMDVaNFR5S3lB?=
 =?utf-8?B?UUxWVCt3eEs4MVJLNFVKRnVEd2xsdC9zSmtRZHdFK0g4MTZFWEltS2ZrbW9n?=
 =?utf-8?B?ZkhCUmRQWDUzYWVRYUhGTGVTZFF3VG5XaXdUUUt0eTRSQXRqVGpMQT09?=
X-OriginatorOrg: santannapisa.it
X-MS-Exchange-CrossTenant-Network-Message-Id: 8f8cb651-1763-4291-d5be-08da0054fd24
X-MS-Exchange-CrossTenant-AuthSource: AM6PR03MB5000.eurprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 16:10:25.1586
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: d97360e3-138d-4b5f-956f-a646c364a01e
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: QKa0RdgTe+jsh+9cTrB8dh02hsSa5Ek6ktq/ATN4RQ0QlMNTs1V6fT+k0LKtN0jPO2XRQvQX8FCE8TK9VRtKztRYjjVjJfjJb1biONqURhdTC9cUdoY0ytDBNjHWdsiu
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR03MB6271

On 3/7/2022 5:07 PM, Jason Andryuk wrote:
> On Mon, Mar 7, 2022 at 10:00 AM Andrea Stevanato
> <andrea.stevanato@santannapisa.it> wrote:
>> (XEN) XSM Framework v1.0.0 initialized
>> (XEN) Initialising XSM SILO mode
> 
> Yes, SILO mode is running.
> 
>> # cat /boot/xen-4.14.3-pre.config | grep XSM
>> CONFIG_XSM=y
>> CONFIG_XSM_FLASK=y
>> CONFIG_XSM_FLASK_AVC_STATS=y
>> # CONFIG_XSM_FLASK_POLICY is not set
>> CONFIG_XSM_SILO=y
>> # CONFIG_XSM_DUMMY_DEFAULT is not set
>> # CONFIG_XSM_FLASK_DEFAULT is not set
>> CONFIG_XSM_SILO_DEFAULT=y
>>
>> This is the default configuration shipped with petalinux. From the
>> help menuconfig, it seems that this XSM SILO deny communication
>> between unprivileged VMs.
> 
> You could try adding xsm=dummy to your hypervisor command line to turn
> off SILO and allow the guests to communicate.

I changed it to FLASK adding flask=late to hypervisor the command line.
Which one should I choose? SILO + xsm=dummy or FLASK + flask=late/disabled?
What are the differences?

Cheers,
Andrea


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 16:11:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 16:11:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286250.485691 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRFxT-0000ih-Lk; Mon, 07 Mar 2022 16:11:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286250.485691; Mon, 07 Mar 2022 16:11:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRFxT-0000ia-Ii; Mon, 07 Mar 2022 16:11:39 +0000
Received: by outflank-mailman (input) for mailman id 286250;
 Mon, 07 Mar 2022 16:11:38 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRFxS-0000iU-18
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 16:11:38 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 435838f2-9e31-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 17:11:36 +0100 (CET)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur02lp2053.outbound.protection.outlook.com [104.47.5.53]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-12-Bf_3ADzRNzW9ANKpuSFMzA-1; Mon, 07 Mar 2022 17:11:35 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR04MB5860.eurprd04.prod.outlook.com (2603:10a6:208:133::31)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.18; Mon, 7 Mar
 2022 16:11:33 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 16:11:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 435838f2-9e31-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646669496;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=1PIdWhR3asbm6W96+nsN5itjJ+WwEFi+pK6pK7eIE8E=;
	b=jA7lpQ4Ndy5K8U5Pk5V41bcrXBmWm2lo4mC9kr9+sYCXxo/TlpPAg9/GiJQTFXrKPKp/sM
	STJq6GXVTBCDaaemkl+niJIjtLRtPXNrmEOICcgMqz2cQoTXKQazerCxsszFwzV+jee9yd
	te/rgya0FkeDK6HE0bTawSk1rfeLQDA=
X-MC-Unique: Bf_3ADzRNzW9ANKpuSFMzA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=fhJRqMqJu4UdcPssRCQU4H/+1mtX8zjWM0G3ISSlBF0+rQ+GdTzFKY80EFd9B3JpRyO+ehmyTLUJhGFU6uRyVYH1Z1VwUzY0ltj6d8pCQPQG4fMHgAltHrXzNNbLKIPKJLSyup5hHCfjVnZNqTfIG7RUDNBSfqqWOJQ9yPEuHuzcjoFSCM2u6tY9UQgbEnJwyYNlhlQM/f2dNAIp6FAInWVjR9zHIN24jpxNHfPW1aoZDSXAEaNTI+qznJBCiOSwQqW/gYJCkawleH8Jou77oXAYPjKWfYpK6OzB4a4m0WfZo+/blDRbc0M0yZltDc5mVG4I90MDtQSXWC1Tkl5zUg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Dzk5JVDvy4W4k7HgRn24d7pkM2C+eKKhEv7oOeWeO8A=;
 b=BeyiFYdqEM6IhlhJfgN59BXdjR7yDVbb1UulOMGw48Vjmp+ebTvtv6XnnB4bNZkkjsevS7Ybb0DrNpFH+CIhiOmw8/vS7ZxsBdaQymtwufDuFUbnSXvD6VIySvF9lRXCWtJnFbQQuBOPa3LQq3tfcF+Y1iGDlv9FHCdKd5WEmORsk4KZIbjOg7K/6CoZK0Xg0ssetyu/gLHO39ciIho2qCFVoLp0ldA+7UR8Tjy++aYXPdjr1JovuxDL7BmbOt9zJYnXXd/Y1Ok/6zrENgKbS8fF20osT96ksgRsKtkY+CSa7pjt1PrKgvW3IE+SxoAs1MJauox5OZwZ4t2HLsyWpw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <62bc3030-496a-5d33-9278-614350df94d1@suse.com>
Date: Mon, 7 Mar 2022 17:11:34 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v3] vpci/msix: fix PBA accesses
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: Alex Olson <this.is.a0lson@gmail.com>, xen-devel@lists.xenproject.org
References: <20220307125347.71814-1-roger.pau@citrix.com>
 <1480fa5d-bcee-e945-6b2f-9db7931c63af@suse.com>
 <YiYtoxcpi/KalGqg@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YiYtoxcpi/KalGqg@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM5PR0602CA0010.eurprd06.prod.outlook.com
 (2603:10a6:203:a3::20) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2c7e0d53-44e4-445f-d91f-08da0055258b
X-MS-TrafficTypeDiagnostic: AM0PR04MB5860:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB5860394E59FF64F193750D50B3089@AM0PR04MB5860.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(86362001)(8936002)(2906002)(4326008)(36756003)(8676002)(66946007)(66476007)(66556008)(5660300002)(6916009)(83380400001)(31696002)(31686004)(316002)(6486002)(53546011)(6512007)(6506007)(508600001)(38100700002)(26005)(186003)(2616005)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?pv5B5Lom7RfrR5KlPcc7aRRsyYAJNpAUVc6zJ4pfGyV+Gf2YP/nvncRVEnv8?=
 =?us-ascii?Q?2FkXjyPQh3eIvj3p+ThDMayzySUY9qIjLw7YtnWrpN+X6W0tIR7IUNUqD1aR?=
 =?us-ascii?Q?XOR7v9bonmC4adpPH2ZBz1r8b5419G19bCG0V0qyaIGG7PpwyahTVxVly8Vh?=
 =?us-ascii?Q?e/EG8gguf2iywhIyMP4XOrGf4MIImH8aXYeFMyOipuO6D1TZJKQVUHFRh2TG?=
 =?us-ascii?Q?/Ll9rCgRpRkY4tzHwD07YtOsW1eo/OqB5AAHcuEStYfXCpRqU5aKFBSdrYfh?=
 =?us-ascii?Q?7h7Srcd1cO4C+7kmYKfbppG+coDujrpnW0ILjAFvzj8yN7K4LpLYIyisbtd4?=
 =?us-ascii?Q?gy4RaB9XVuO0OKXCBuhXwDxn6LstDEqzXo/cGEHudDay2XFw5+r5V0n2/Wfz?=
 =?us-ascii?Q?SsnRrq5hgphRKdriwlAG4wEuDzR7MpMSuPxtDvWG1f/Ph+HNEjV6cLhT0Kbt?=
 =?us-ascii?Q?JzmMwM3qaWePykAckErsbvF1oyrO3+4lOAWPUfkKlKut1zijN3Me71naf/EV?=
 =?us-ascii?Q?pbVUYnyRn3B+Lo6jXCM77sRW+mQb/F2whmwh1pRZX6FVQMmAGMCNikEC3bqY?=
 =?us-ascii?Q?S17KW+qenQcPu6bvkRnwv4H6Rt8fCFsdaizIeb8HMdWXiM2CCNWAffNJ7psW?=
 =?us-ascii?Q?4/dXAPWvtdT5TeoDdR0/v0I1ApvFdm6u+H2dDHqjJ9q074rG1QYqepDSj7Y/?=
 =?us-ascii?Q?pmzA3nipm3GCN2D1GGKa3IXbOCrPtn6jGVUZTwYa6XwriOF9ELQkX8T5WH2B?=
 =?us-ascii?Q?UZUiAHnpNLezOcrz18hK+VM7Obm27DI/aNEUqMDPCyNHZ8x/zbXZJf58wqy5?=
 =?us-ascii?Q?R2UQJPDTxUbRlPXqd2+ANn+ixcmSMdQx+AT78oRz2DQyWgAyrI9152GxGkxx?=
 =?us-ascii?Q?tDAfRDHA/9zVD9hsOED/bkIOm/SbDseoKurtZOsUor64W3cu6mr1aEfuC8U9?=
 =?us-ascii?Q?ultU3ic6rrZCIffd9Ire/WhNkWlElVOhfY5weXMVy8qGqXxaDELx2GKPkeBF?=
 =?us-ascii?Q?1BiCxzGekKgyXok0fl+mtuB9mmwCwjtX0cM3y1AUOvjDwBd0REPhLx4464aY?=
 =?us-ascii?Q?i85vz79WVYyRpPi29MUvcv/OTLo/ueIHF8A8EToN1RaPnFhgNbwOTWiqQ3fL?=
 =?us-ascii?Q?H3aV7M7bzWfw8KZ/1xq7cGzkgRqUBLtra3jfj/VX2t6le8bT2Qrt3osNTmNf?=
 =?us-ascii?Q?aPGDNHBJhWa5+7Dz9CsDvUdxSX3U0YsR/yFJHH7VanyiNLWVcBvCGxNmsLg8?=
 =?us-ascii?Q?Vow51OfMRTXZ72AN8u1KeO8s5vjQHnKpbRBlARbnhY8p5jqOkqTB1DCVFx+g?=
 =?us-ascii?Q?yHN7wAb1P1N4P4NX2sTVbH5gMDCwNAWGAAtiLP9UKuNXhQhUb0gWkzXOTlFp?=
 =?us-ascii?Q?nWCO3RDpYFsbRkE+YL6rCRIUWqrMcA9DMEzWEXe8CsMDjPz7zMMDxD0p9SWG?=
 =?us-ascii?Q?/SWknKcx8tC98MAWz+SSED7ttv6XME2lmA0mN5F/t7LAF2UWPl51wxMKzL52?=
 =?us-ascii?Q?JL2NwPA+A8aqKWV4x5JDYF+L9PYHWrgOBn5l5VfDNQy3XGcXWfECvAa0IITS?=
 =?us-ascii?Q?cIju9GLVCGlBev+zu4XVHXYBmMRriFQY1UHqfJ8BmWRLO1Qe3/NQf8EpNzw9?=
 =?us-ascii?Q?wMyhJlIoC3hzmf5elxYHBfA=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 2c7e0d53-44e4-445f-d91f-08da0055258b
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 16:11:33.0988
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: TOUbilnWjhgAb342K+NcXtl49z1+XjOYW1L3JksuhJX9PWKGfkdR6i/+0sxzI45I1HjhDvla8xIU4yaheOhOlg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB5860

On 07.03.2022 17:06, Roger Pau Monn=C3=A9 wrote:
> On Mon, Mar 07, 2022 at 03:12:32PM +0100, Jan Beulich wrote:
>> On 07.03.2022 13:53, Roger Pau Monne wrote:
>>> --- a/xen/drivers/vpci/msix.c
>>> +++ b/xen/drivers/vpci/msix.c
>>> @@ -182,6 +182,33 @@ static struct vpci_msix_entry *get_entry(struct vp=
ci_msix *msix,
>>>      return &msix->entries[(addr - start) / PCI_MSIX_ENTRY_SIZE];
>>>  }
>>> =20
>>> +static void __iomem *get_pba(struct vpci *vpci)
>>> +{
>>> +    struct vpci_msix *msix =3D vpci->msix;
>>> +    void __iomem *pba;
>>> +
>>> +    /*
>>> +     * PBA will only be unmapped when the device is deassigned, so acc=
ess it
>>> +     * without holding the vpci lock.
>>> +     */
>>> +    if ( likely(msix->pba) )
>>> +        return msix->pba;
>>> +
>>> +    pba =3D ioremap(vmsix_table_addr(vpci, VPCI_MSIX_PBA),
>>> +                  vmsix_table_size(vpci, VPCI_MSIX_PBA));
>>> +    if ( !pba )
>>> +        return msix->pba;
>>
>> For this particular purpose may want to consider using ACCESS_ONCE() for
>> all accesses to this field.
>=20
> Hm, I think I've asked before, but we do assume that ACCESS_ONCE will
> generate a single instruction, or else we would have to use
> read_atomic.

Yeah, that looks to be the assumption. It has become my understanding
that ACCESS_ONCE() is generally favored over {read,write}_atomic().
Personally I prefer the latter when the goal is to have single insns.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 16:15:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 16:15:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286257.485701 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRG1D-0001Ng-6y; Mon, 07 Mar 2022 16:15:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286257.485701; Mon, 07 Mar 2022 16:15:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRG1D-0001NZ-3b; Mon, 07 Mar 2022 16:15:31 +0000
Received: by outflank-mailman (input) for mailman id 286257;
 Mon, 07 Mar 2022 16:15:29 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+gfv=TS=citrix.com=prvs=0582ef7ee=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRG1B-0001NT-UU
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 16:15:29 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ccd7f925-9e31-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 17:15:28 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ccd7f925-9e31-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646669728;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=Km/3q68rw2JH7gSLpeViXaUZ7XTJ4dNuvIHVdXeI1Mc=;
  b=IHyN2fWWaJMcOIQp5NBiWO46CjI1J58KuRnphzJnpilZhcXHXXc5BSOr
   UQR6nq5CMUI6M4jjIXrTGLDQLqDjUpsXpPS2HEy/WVNMXGfpwVV2+2WGN
   GLfAvZjg7K1SkBcfvq5OjFw9Ziov6ktW/upda493QMnUjMtsYkBmKAfV3
   4=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65560131
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:4GpiEq9V7S+OIkJVIrzWDrUDn36TJUtcMsCJ2f8bNWPcYEJGY0x3y
 mVOUTuDbvaPa2akKdl2b9nk/EJQu5XTm9BhSgtspCo8E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oDmW1nlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnZuZDlk0G4nJof4QeT52NXBsLKZo3JaSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFJkYtXx6iynQEN4tQIzZQrWM7thdtNs1rp4TQKiGP
 pFAAdZpRFPjUgNoEVQSM7lgrt6BrFalLwxSlU3A8MLb5ECMlVcsgdABKuH9atGMAMlYgEucj
 mbH5HjiRAEXMsSFzjiI+W7qgfXA9QvnWIMJUryjsPcyhEaUwEQcDRQXUR2wpvzRoky0Vs9bK
 kcU0jEztqV0/0uuJuQRRDXh/iTC5ERFHYMNTatqs2lh15Y4/S6eLy9aUxtlbeU8ueURaxp7x
 E6CsffAUGkHXKKudVqR8bKdrDWXMCcTLHMfaSJscTbp8+UPs6lo0EuRE48L/Lqdy4SsRGqum
 2ziQD0W2u1L5fPnwZlX6rwub9iEgpHSBjA46QzMNo5OxlMoPdX1D2BEBLWy0BqhEGp7ZgTb1
 JTns5LHhAzrMX1qvHbRKNjh5Jnzu5643MT02DaD5aUJ+TW34GKEdotN+jx4L0oBGp9aJWG0M
 RGL5lgBtMM70J6WgUhfOd7ZNijX5fK4SYSNug78NLKinaSdhCfYpXozNCZ8LkjmkVQ2kLFXB
 HtoWZ3EMJruMow+lGDeb75EidcDn3lirUuKHMCT50n3gNK2OS/OIZ9YYQTmUwzMxP7dyOkj2
 40EbJXiJtQ2eLCWXxQ7BqZIdQFadSVgXMuuwyGVH8baSjdb9KgaI6a56ZsqepB/nrQTkeHN/
 3qnXVRfxka5jnrCQThmoFg6AF8zdf6TdU4GABE=
IronPort-HdrOrdr: A9a23:ObI5cK3uEwK7z6crx8DUowqjBVByeYIsimQD101hICG9Lfb2qy
 n+ppgmPEHP5Qr5OEtApTiBUJPwJk800aQFm7X5Wo3SITUO2VHYV72KiLGN/9SOIVydygcw79
 YET0E6MqyNMbEYt7eK3ODbKadY/DDvysnB7o2/vhRQpENRGtldBm9Ce3im+yZNNW977PQCZf
 6hDp0tnUveRZ1bVLXyOlA1G8z44/HbnpPvZhALQzYh9Qm1lDutrJr3CQKR0BsyWy5Ghe5Kyx
 mOryXJooGY992rwB7V0GHeq7xQhdva09NGQOiBkNIcJDnAghuhIK5hR7qBljYop/zH0idgrP
 D85zMbe+hj4XLYeW+45TPrxgnbyT4rr0TvzFeJ6EGT1vDRdXYfMY5slIhZehzW5w4Lp9dnyp
 9G2Gqfqt5+EQ7AtD6V3amGazha0m6P5VYym+8aiHJSFaEEbqVKkIAZ9ERJVL8dASPB7pw9Gu
 UGNrCR2B9vSyLaU5nlhBgu/DT1NU5DXStuA3Jy9/B96gIm0kyQlCAjtY4idnRpzuNId3AL3Z
 WADk1SrsA8ciYnV9MMOA4/e7rENoXse2O7DIvAGyWvKEk4U0i93qIfpo9FoN2XRA==
X-IronPort-AV: E=Sophos;i="5.90,162,1643691600"; 
   d="scan'208";a="65560131"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Vhlu8zUNwSvb06bdZTw/OGmWPJ+llISCLJMp00gPdET3BZ7MAmSxw1Fn0xBRZoFFmenzkoFd8XRM4zD6lzs4xlyN8aTwFvCKgEf7+sunfdyv1x3oabKUT97f1/FkTSAkSFMnaSuC8faS+HYtXUqq3ICsnieHOKEcc7kl/FLNEmPIQx73jM9Y18uT7eED30C5KLjVa8qmaPnRGQOqGguFcbjVDSehzUY0IHqvHA53VPKvdIOlkLlAPJZOlhTNNx8phLRP0uLi6p+BI4ccuw+mI20ROeINmEg2kn0xtonTZB22LJprmGYFsXoLXZMHV/VCFk/ptcbRO/u+ikZicFkF5g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=5a+UhMJ/OFCFj36MDwfJR7NkceoAv1d/Lp9Zg/v2CUk=;
 b=MX4f9Fp1iF5hfGhaakr0lQj6U7FCQ+KprG5YDzriE6SBy/sMszn9hlZEPL1FAjkll8+eeW5FrUAYAtkWZdXVrJv73PjXAmFTXkVfj1sPDQBYsnTouqWQAwj2Hkg4A/Z6o3Xetn2Fl984u9q1Ioujq/WEaB2iLyTtpIOwPbXCcsnJL53JL9kJ2/nzdOeDCDk+1vvcKHSXoZ7P9adbMEqIeeaztNfSf4KJ+H33aml45+fCt1J6jFjRnzHfOIx6t5gmaMBKSbFQJJ8ZOzXnksD8wPRYc6MFyKefhQyFIPSkdClGuD+RfV27c4z/nlkLf3L08/HRFUFK/b/EpPY+efGfVg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=5a+UhMJ/OFCFj36MDwfJR7NkceoAv1d/Lp9Zg/v2CUk=;
 b=r2fWVkr3CFLqQTL7FGgGQKiBYrhAG5+gsydXdqTfkKTZdLnvisMWyXentOMCmMKtPYKKB/2Hef+Hev4hX0ocPVAY9PCvDTi3xSio7DXpYZ6hPGTPPBmjnvgvQzKbAmPREKR6tDigMnWLl6+dqKNpkS26QFGZSnaJA2U/sbnQXZA=
Date: Mon, 7 Mar 2022 17:15:18 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Alex Olson <this.is.a0lson@gmail.com>, <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v3] vpci/msix: fix PBA accesses
Message-ID: <YiYvltzDBzPCHzFx@Air-de-Roger>
References: <20220307125347.71814-1-roger.pau@citrix.com>
 <1480fa5d-bcee-e945-6b2f-9db7931c63af@suse.com>
 <YiYtoxcpi/KalGqg@Air-de-Roger>
 <62bc3030-496a-5d33-9278-614350df94d1@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <62bc3030-496a-5d33-9278-614350df94d1@suse.com>
X-ClientProxiedBy: LO2P265CA0381.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:a3::33) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2cefa20b-a0b1-4625-60d4-08da0055af0d
X-MS-TrafficTypeDiagnostic: SJ0PR03MB6875:EE_
X-Microsoft-Antispam-PRVS: <SJ0PR03MB6875A8C95E31127C31E4F2B78F089@SJ0PR03MB6875.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(8936002)(6486002)(5660300002)(9686003)(6512007)(316002)(53546011)(6666004)(6506007)(6916009)(85182001)(508600001)(86362001)(83380400001)(186003)(26005)(33716001)(66476007)(8676002)(66556008)(66946007)(4326008)(2906002)(38100700002)(82960400001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?NXZ5Q1dsaEh1c1JhT3NENHlhZThxZk56VWt0ejB2WEFzeko0bHZvclpuRVlL?=
 =?utf-8?B?RVNQRm1XZnk4eDBZOGJRNVgrZHhrTmFLRmJDdnI5TzVzNFdOUDdpbTZncFYr?=
 =?utf-8?B?OFo1Wkk0c0F5ekJ3emhDRmJYUklqb0Z4RW1PalZGUEg3UzF0TGZPUWlPaG5k?=
 =?utf-8?B?VytZL3VWNEpWR2cxd0wrVTlIUy81QTkvK00zcWdYa0drVnhDa0hjdnlqcUVC?=
 =?utf-8?B?aktyV3ByZnZ0djQzSWZJeDJadnNGbkFTQ0ZaWmtNcmFWeDMyMUdWZ0R5UkVC?=
 =?utf-8?B?RFZtenZKLzRRdTVHSEpPSm1ZamNGclJlam5YTURaZ0lCaGZhZDFSRlZDS0xs?=
 =?utf-8?B?QStCS0RTM1JwTEtCVkVoMjVjSUk3M1luMmJYcXNiSGZVaUhMY1orZHZvZFVi?=
 =?utf-8?B?cVh5NUpKSWRjNDh6R1lLeWtmcUpIVXJFSzlXcTZQajVuYWsxcVh6NnpocWlJ?=
 =?utf-8?B?YkUzT3F4Q2xwRDhjc3FtYmk5c01mTTBXRHNnOFRtYThadWlxRGl6QXNtQW5x?=
 =?utf-8?B?RVJEWUpJbWFNTkQzVXJKMWFKdGlFWFhtYjk4T2VHR3l3TG51OGtyMEh4TE9u?=
 =?utf-8?B?U3VmcGxac09pOXlKUlQ4cHp0cTI4bXp0YVgxQVVvdFc0U2laUWowVVRPY1Jr?=
 =?utf-8?B?ekZFYlh4ekMyK25jaWNSbDNnWlVPbDRQTmhwYm9zQVNsS3Z2bGZyZEVxUnRt?=
 =?utf-8?B?UWsvTnRaeWgwcWt5QW0zQ0ZTTGZrTGRXL1dOZXZpcnVQYk1GNWRkdkUzbFRo?=
 =?utf-8?B?ajFGSFk2bDU5Sm5Da29EVzF0NTlKY2hLcFltbnlMT3J6R1d6ZGp3OUYxL0w0?=
 =?utf-8?B?ZFpEZ0NsdFRpemdseVFreEw4YjlBekMzdTA0ZVVpTktBLyszOUhLZzNuSmFp?=
 =?utf-8?B?bFpKTS9qT2JleGgycGhJSjVRV0RXWWVNWm9kT291eWVaUmhORko4dkpQTTVt?=
 =?utf-8?B?YlZuL1NLM1RmWm1CMG1BWDRoM0dKblk1bi9oaU1QOEJTbUNWa0xOYlVRUndO?=
 =?utf-8?B?V3BwQzJXeTd5QWZYb0FleFE0ZmtBMHVYWVZaN3dBRjNlWHBBanVSclcvZG1z?=
 =?utf-8?B?UTcvRzlMaXVPQ2tmQ0ZDVE8zbHVPMW9vallkOHhqODRIRUJCeE1tSjVacXBa?=
 =?utf-8?B?dFJML1liclRpdUxxSFNrcUZuakUxdXF6d1dHUFBwbzhGMTJXLzBzc01HQ1Bl?=
 =?utf-8?B?a2NheVZ4UzJqbVhsVTlPdUdPdnpoaURINWtLN05iZVNlVlJFRmNyMFE2SjFj?=
 =?utf-8?B?Y3R2bVFQOFppYjBOQkJBL3NyRmdtUzhvSXhYMWZQUGI5eis1aGpmRU5MdWdO?=
 =?utf-8?B?N0RNT2hMY3d2ME9xNDhZaElINkZ6Yzl4OFVSOVI4Z0pxK2t6R0xvcXkwbUMx?=
 =?utf-8?B?c0JWa01RQXptZ29GUmZKcTFKTTE3M1lmSXgxTUV6dlNLVVRrZG9EZDlaM01t?=
 =?utf-8?B?V2lrNXZBeG80djFRc3ZtNHc4RklvWXFJRXh4Mk4ydEVxYVpSMzBuS2ZQN3A3?=
 =?utf-8?B?TUZEMW9jVWdGdFFmOGlFbFFYaW5pUGFORGJoaXhzT0o4bnRpQ1d0b0FZdnMw?=
 =?utf-8?B?ejAzT3hXM05raW9qUWlSTXBKQzBHUWo5U3NlOXI3OHZVcTVKVDNkaXJjeW14?=
 =?utf-8?B?dGlpZnY5R2cxbTFkVm8zRFBuRHlvODIza1ZwZGoyY2hoK0NpaVhhZUt5N0k2?=
 =?utf-8?B?STdZYXp5a29zZmpobnk2ZzZ1clU4M2xDQXdGOWV5T0RDZEkyTHBIMzhLYWto?=
 =?utf-8?B?VjMvWmxDRDVCejJ4Nkt6Wmw3M0c4YTVVOEZjZ0Fzdmc4NGFUL0I2WXlaWVFI?=
 =?utf-8?B?QVpIczNFZS9HK1ZONURMa0hiVkpVN2tHcExqbHFJS3hKQktwS3FuNFZGYzhy?=
 =?utf-8?B?R0Q2bTBJdmxLZ2p6bksveDU1UmVFNU50SWppTm43NEFQakpOT3RVVFJneGxp?=
 =?utf-8?B?YmVwWGx1Y2RVT1AySDJ0MHJGbGh4Tnp4NCtjVzhxdjRpcy9nbEdFV09iTkVJ?=
 =?utf-8?B?ZGNtWUdDZWF0aGVHTTRMR0lvcGZXUzFkU3h6TnNOdmpnSHZWRlFRS2VreWVz?=
 =?utf-8?B?SlhuWkptdjlrR1YzQ2ZSdW4rUE11NUxBckZSaVQwN2FqSTVyd29UV0QzMmlM?=
 =?utf-8?B?QXpHblY1TWdJdzRkSFJyYUdrTnRhZ2lwQjRSWmwvV3R4VGdNMHVqZjFNdFh0?=
 =?utf-8?Q?qUTXp8Kr7tDy9U2simn0Hd4=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 2cefa20b-a0b1-4625-60d4-08da0055af0d
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 16:15:23.7487
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: p7eVVaSn/fgiHiKLS4nQU3krrmQtwOE1DOnAP2qLtIJ5eIzrZYdfaC3e6VSR7fkaVeDMeDes+i32tQ2KvvreEA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR03MB6875
X-OriginatorOrg: citrix.com

On Mon, Mar 07, 2022 at 05:11:34PM +0100, Jan Beulich wrote:
> On 07.03.2022 17:06, Roger Pau Monné wrote:
> > On Mon, Mar 07, 2022 at 03:12:32PM +0100, Jan Beulich wrote:
> >> On 07.03.2022 13:53, Roger Pau Monne wrote:
> >>> --- a/xen/drivers/vpci/msix.c
> >>> +++ b/xen/drivers/vpci/msix.c
> >>> @@ -182,6 +182,33 @@ static struct vpci_msix_entry *get_entry(struct vpci_msix *msix,
> >>>      return &msix->entries[(addr - start) / PCI_MSIX_ENTRY_SIZE];
> >>>  }
> >>>  
> >>> +static void __iomem *get_pba(struct vpci *vpci)
> >>> +{
> >>> +    struct vpci_msix *msix = vpci->msix;
> >>> +    void __iomem *pba;
> >>> +
> >>> +    /*
> >>> +     * PBA will only be unmapped when the device is deassigned, so access it
> >>> +     * without holding the vpci lock.
> >>> +     */
> >>> +    if ( likely(msix->pba) )
> >>> +        return msix->pba;
> >>> +
> >>> +    pba = ioremap(vmsix_table_addr(vpci, VPCI_MSIX_PBA),
> >>> +                  vmsix_table_size(vpci, VPCI_MSIX_PBA));
> >>> +    if ( !pba )
> >>> +        return msix->pba;
> >>
> >> For this particular purpose may want to consider using ACCESS_ONCE() for
> >> all accesses to this field.
> > 
> > Hm, I think I've asked before, but we do assume that ACCESS_ONCE will
> > generate a single instruction, or else we would have to use
> > read_atomic.
> 
> Yeah, that looks to be the assumption. It has become my understanding
> that ACCESS_ONCE() is generally favored over {read,write}_atomic().
> Personally I prefer the latter when the goal is to have single insns.

Oh, OK, so I should use 'ACCESS_ONCE(msix->pba) = pba;' rather than
write_atomic then.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 16:16:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 16:16:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286264.485713 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRG1i-0001xO-LC; Mon, 07 Mar 2022 16:16:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286264.485713; Mon, 07 Mar 2022 16:16:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRG1i-0001xH-GK; Mon, 07 Mar 2022 16:16:02 +0000
Received: by outflank-mailman (input) for mailman id 286264;
 Mon, 07 Mar 2022 16:16:00 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRG1g-0001jB-QO
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 16:16:00 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id e00a5348-9e31-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 17:15:59 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2176.outbound.protection.outlook.com [104.47.17.176]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-26-TszvJ_t_MA-aVcGAPBn17w-2; Mon, 07 Mar 2022 17:15:58 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR04MB5860.eurprd04.prod.outlook.com (2603:10a6:208:133::31)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.18; Mon, 7 Mar
 2022 16:15:57 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 16:15:57 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e00a5348-9e31-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646669759;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=nEjYlXt1zDan7oLayGVR7OxAzU5uQFkZuknePAOxufI=;
	b=RYe+oevauSbdcrZhp2ZjjduabO8XIWCbBF4CunpW1s/LwDsPk1+Vo536OnID1avISflcNM
	zMDnJlMijyQTpPR+Kl2DX1HTjyobfg1SjdgXOo/5Cy//Bm7nb+hVwENQnHD4r+V3wkSHY1
	SUppQWoa0JFqb33TAlAEO06rC+GwR2w=
X-MC-Unique: TszvJ_t_MA-aVcGAPBn17w-2
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=iLhnta1FwQmemKYv8mKXC5ygkqFmTgEZ/avjONdxBuPxHlFM50sMRLfrM672Pxk3J+L5iHKRdAERQbx2eOxckbSqun7MlcKJZ4IYMjVsEKJoX3CRJ7ZKT6KCI64zmLJtdsToBKH2Gf9++aODguqynW+LSK5PO3yNdz1C8KHIasX1CDat3b4ubpgLghEYCg0MiWcCzIEJfwi1aV3yJz9veuc4mcTJXKj1wCHZ601V7ldvl7J6c4WpphiN0joNgndj6CGJBBskrh6rGuKJPtR/NsD6rm/b8ekOGvVP88FOJnzmCdeakdgQu4aeiwl3dAp2zuxd1buJdVGDTHqp/8yB8g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=sBGHdI3enb7inDsl/3vmPPVxzYsTe6TEN595EWw/u2o=;
 b=kahwW6MbO1+7T1+bdeTMHEDC21xlCQ81QpnMLQIf86OadEjaAE9rFYYPziUKsU/y7xg5QKQjp7d9KKI1HH5fPn6c/f2ya0uGo9juWgaT5r9TOks0sDa3vfey6pftpOfdFeaKFWWzdnBIa4YgdH3Xv71B3KO9ZNFfO3bKwzh44hdXcr61IlNir3pJ0Mqiq+bUDGm4Uc8deUwX5DJOIZ0bauUS/cl5NHKBOQOXzsutMhVSMhKJrR7DfA56FOHI3NeVn8ihr5F6XHD/CWlztpBAfX8eqZI0Hpleq7uCwvOUEMfq+QhYJ+aHJeMsQjd3R7vKNTm1GWfH8NQCtpSroyNbCg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <2f0b8b0a-7f0a-13b7-4839-94f30aaecfeb@suse.com>
Date: Mon, 7 Mar 2022 17:15:57 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] x86: avoid SORT_BY_INIT_PRIORITY with old GNU ld
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
References: <8b982bab-9b16-61e7-620f-5a5b2be39588@suse.com>
 <YiYfVmW3iQ4wA5k/@Air-de-Roger>
 <ca144758-da48-00a1-1e76-872c3455c335@suse.com>
 <YiYqLtozm4/2Ibu0@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YiYqLtozm4/2Ibu0@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM5PR0101CA0025.eurprd01.prod.exchangelabs.com
 (2603:10a6:206:16::38) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 03f8e10c-105d-49f8-c883-08da0055c2df
X-MS-TrafficTypeDiagnostic: AM0PR04MB5860:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB58600215C943EB836FDE5AB6B3089@AM0PR04MB5860.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	mO0ynthp5ff0JHZNEDtck9N5ZLK6vwWWHPAxPEKqTY6jvcAnnPxtwpjL9rNw9gCKLGBlIwLKbN3inxf1Xr93590rz3vDKbXL0j0jXvldZOGjaDE5ldALFWAVqpurAGU+D8uPCCTreLBohwrakj53nACYFTImuvQJY+EsweRDPiDZrfNsx6xy7k/c5WXEVtBywaZNVtD8MOyWyjc2Rnb6yP2K5ie39qO8+s65q6KOpvqUSNjFicOhPMMcpnEnF5FNHFVRKg1uIZrGfJa0/mN+7moZW+gD7lxy9afmV7pt9Du0Z5Etey9/dFBmqczP7fw8OerMVs8WZf0zHfm23VQ1rze4BAcb0lWqL4QAVdnAP/yXlxZ+VuPG2pDMVHp2061V6uxCRhoSMYpifid4m7wowd05gXU8lx+THya/sgbeceFT1k8X8Au7xnZe2Q1HyggXLBQ+Kb6enb8T2h+5FjJvGovI1Cp1/KN5lc+27kVYb0ptHQWB2isCtWDbp5Ahg5kjv02/PED14rL+vMoGG4PYPoEUgnfKLmcLSpXecqKRldl19Wetbj1eBpv3vAaNjiNHCs1xlnOAHETkYl6C/PXj3RlSnlizQoOVUVdPk9ZsgILNS55XoEMZyENnjMhC62JcJReqWJYf/rMocW7YzWSFwkXp0O+SLNfzN8VaSyAj//V2egLWLcz2faQzHPZUasVnbEXemXdyrLMFzqniyj++u0/orQBcrpxCdUtl8MBhtum3gBvxZhPKqVgDUHVa3swG
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(86362001)(8936002)(2906002)(4326008)(36756003)(8676002)(66946007)(66476007)(66556008)(5660300002)(54906003)(6916009)(31696002)(31686004)(316002)(6486002)(53546011)(6512007)(6506007)(508600001)(38100700002)(26005)(186003)(2616005)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?8Fq6XbwsUFrDvl30qQeeIWUfiaps7wBlc5VXMzBNbvzpC3yp61uKk2fEWcaa?=
 =?us-ascii?Q?4SRldHNkQaK5cMiUUO4gDdC5zegnxz+iZuZETX3MsrfaLt5hjGzIEfyGqe1A?=
 =?us-ascii?Q?at8TzssEMULUq/tfqwAuTp0UsPisLZEgA+GXd8VXCAeZDqf+l2qpigr5QdYR?=
 =?us-ascii?Q?PQarvmB0YmrsuMkjqm7Nz7CrYzCWn74MKb2Za1MHIdgRjd5TDm4r8v6w2ity?=
 =?us-ascii?Q?0/Wr147y40D3MWzuYDtZkuf91Z3fR42KEuuG4ogGvn0xLVyz+4M/D5tQEpHp?=
 =?us-ascii?Q?Gxd2S5hQ8HJVEmrjYpi05FTg2xYQ4IIbTyQw1OnRj0/4XW6ed4+jO4e+5Ln+?=
 =?us-ascii?Q?b9YOJ3doiEB9kKDYezWm/4v2dMPf9H/HZKWOZyfp2ITJxuZSSecvyR0bB7l0?=
 =?us-ascii?Q?sDNs1WCMUih6FhrTj02B3jtADpAt8lkkOEcqoMB3HdzO+3fne/RJOdmP4vr+?=
 =?us-ascii?Q?SClWQTskZhE8aJz9IhD59uBsTWne8ClYB7Vv+fx+4gnJfHGZsdtDYK+19hoX?=
 =?us-ascii?Q?/DTyfhRrBUAU0jOYkvbPuVF8zxkFjTLXTMvjFvjtD//QlAp0bh4gGRYErTLb?=
 =?us-ascii?Q?pf3rkZ9dMnCMtP2mfSwRJjayPU1LpMCMY09ORD/tQWSPX1M8LexptnlyMRRt?=
 =?us-ascii?Q?yxuvbyo+BoJuq+2DFEjxkygO47bKsURm/fE0QVVW300bRk+ufC36HkK6jyu7?=
 =?us-ascii?Q?EIC+56KhHp8eF2qUUYD28KetabvkIgFBXhQJrxpiT17X5DiFHhVjp5n8fJoG?=
 =?us-ascii?Q?xyTZwLdyuPE9+H2u7PKV8IJoHPAMtl4FGWPe11ZGB0hoyeV+fzSU+fvNhLPL?=
 =?us-ascii?Q?y/ubKLZu2G98aYgbqUPH+DmgUHNq5QLdR197p3gYR+A/S1YE/fAmDT/t2Fyx?=
 =?us-ascii?Q?HdE3ylVqZM8LqSa1SkCOnQMNCIahIhjVFvaHBuKggWD+h6jCU/bJumljamWU?=
 =?us-ascii?Q?is5ieig0KdfIUpteVT3FCGOnWIWiuyr/DwX4p8zDohGwWcTYnZhXiw0MBnHL?=
 =?us-ascii?Q?gSiKzIoXKSmEtiwRBsFPytGW+99LfDfDTtKHPjX4ht3rVtvhF/fnVlSnT3fj?=
 =?us-ascii?Q?718NDDb5MDhdI0jLsCX0e8OH1Kfdmj2k/mc3jPKFs8cYT3eTjwbIRfTzVy7N?=
 =?us-ascii?Q?FBSKnCM+tdcX2/w4Fifhl44LnNrmfTZrrp49Ny6nf//Y7+w3AC/qPNxf2isI?=
 =?us-ascii?Q?4e7CEnUU4VOU6Zw2A0nnGsyPKf1cUqZjOEdPwONm/8JEyoH9ONnBuO0R/tXo?=
 =?us-ascii?Q?povWEwrsyXEuqoLP/ofdi3nSXQcQRi5e/1GurCfBnrMnLblPWD1W5RrRXE8X?=
 =?us-ascii?Q?d4AHTUIye07H2ez+OjlP44XiYlcOp1VYHERSkyjJpBdJA2y3SzVhY91gWmXA?=
 =?us-ascii?Q?JW61oMHSbs7pA15Az1fyXBZy6kdAEvkZ8Tp35ZMUeDxFrUbb8Ehwrh3jm+CZ?=
 =?us-ascii?Q?2new2hJxiFf6J0+VdLD4O+wH0SqUfW2Yl0fD2lpZPuO8EG89rdiXHwO+bHLK?=
 =?us-ascii?Q?lmDWzpYTNBh1aBmwJ+jBF9ZqKzlQ8/6UfW5oAc8ItvUGLrcDo6j6+uvbkJiE?=
 =?us-ascii?Q?fni8s/8frZmG8rB6tTSpyoUwc0nWJze48rEOK5JHDqY296SuHrFh/RUlz91E?=
 =?us-ascii?Q?fIyHdkWBxctHgBk+5CPWEVQ=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 03f8e10c-105d-49f8-c883-08da0055c2df
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 16:15:56.9418
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: FrFsRFQ6qKKWtxULJWmOfi14V8DZOZFRzrI+oS2GtMOqowl3f+XdCMUN9UpTDCeUJy9ePfSQVbkAsVnd2GIfEQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB5860

On 07.03.2022 16:52, Roger Pau Monn=C3=A9 wrote:
> On Mon, Mar 07, 2022 at 04:29:22PM +0100, Jan Beulich wrote:
>> On 07.03.2022 16:05, Roger Pau Monn=C3=A9 wrote:
>>> On Mon, Mar 07, 2022 at 02:49:32PM +0100, Jan Beulich wrote:
>>>> Support for this construct was added in 2.22 only. Avoid the need to
>>>> introduce logic to probe for linker script capabilities by (ab)using t=
he
>>>> probe for a command line option having appeared at about the same time=
.
>>>>
>>>> Fixes: 4b7fd8153ddf ("x86: fold sections in final binaries")
>>>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>>>> ---
>>>> Obviously this doesn't take care of old LLVM ld yet, if any care is
>>>> needed there in the first place.
>>>>
>>>> --- a/xen/arch/x86/arch.mk
>>>> +++ b/xen/arch/x86/arch.mk
>>>> @@ -70,6 +70,11 @@ ifeq ($(CONFIG_UBSAN),y)
>>>>  $(call cc-option-add,CFLAGS_UBSAN,CC,-fno-sanitize=3Dalignment)
>>>>  endif
>>>> =20
>>>> +# While not much better than going by raw GNU ld version, utilize tha=
t the
>>>> +# feature we're after has appeared in the same release as the
>>>> +# --print-output-format command line option.
>>>> +AFLAGS-$(call ld-option,--print-output-format) +=3D -DHAVE_LD_SORT_BY=
_INIT_PRIORITY
>>>
>>> LLVM ld doesn't have --print-output-format:
>>>
>>> % ld --print-output-format
>>> ld: error: unknown argument '--print-output-format'
>>>
>>> So it would be always defaulting to SORT. I'm not sure what to
>>> recommend.
>>
>> Do you know if all versions we support know of SORT_BY_INIT_PRIORITY?
>=20
> Hm, I don't think we can assume that we support LLVM LD in 3.5. I'm
> not even sure if LLVM 3.5 had LLD in the first place.
>=20
> The first version that we care about and that we test is LLVM LD 6,
> anything below that version is of unknown state.
>=20
> I've tested you change with SORT_BY_INIT_PRIORITY on it and it seems
> to be fine. This was on FreeBSD 12.3 version of LLD, not sure how
> many changes have been backported from newer versions there.

I'm inclined to suggest then that we unconditionally enable use of
this, in the hope that we'll never see a bug report. But of course
this then again gets me into the business of needing to determine
the which ld variant we're working with. Looks like I won't be able
to escape this anymore ...

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 16:18:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 16:18:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286271.485724 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRG3e-0002l1-0W; Mon, 07 Mar 2022 16:18:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286271.485724; Mon, 07 Mar 2022 16:18:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRG3d-0002ku-Sm; Mon, 07 Mar 2022 16:18:01 +0000
Received: by outflank-mailman (input) for mailman id 286271;
 Mon, 07 Mar 2022 16:18:01 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRG3d-0002kk-Fl
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 16:18:01 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 28429e2b-9e32-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 17:18:00 +0100 (CET)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur03lp2057.outbound.protection.outlook.com [104.47.8.57]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-12-P_Y70i7lN3K0vq9ejTZTsw-1; Mon, 07 Mar 2022 17:17:59 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM6PR04MB4359.eurprd04.prod.outlook.com (2603:10a6:209:3f::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Mon, 7 Mar
 2022 16:17:58 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 16:17:57 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 28429e2b-9e32-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646669880;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=IGP2DtfD0+6oVih3NIBMUZprjwBzRdT+uQ+son0t3Sk=;
	b=SW8DIYoCuJq84B0d/Agyx++4nhBZCKGBe5MSQGKC7acjF9GItpCPgcFqsZeSFEL53ruCGT
	dQnrMk2lsEqsLyGO8fjkSY6U1m5rgx8Pj7bPXiYLJyCLrF/eUPqSaAsw00RttMtitio2j+
	ZQEaLDUQHTFGthXmdvmA0FfM9cMYxx8=
X-MC-Unique: P_Y70i7lN3K0vq9ejTZTsw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=gLjdFXBJ4fRxNgJ1L5vC53jRtyvwt1bhhNd/Ti7rsyV66zM1sKSh3b2WkXbdIIrK+ILpg2IHa+eVDZSLSYiTU6lA/blMfn16Qg/NNrfFQA5ruD7BCeS7fOhHtVm6IVL/USUCaS8mdhZvGJzkZYnNNyVtE1HYWelchiLAUr8bCyxEqIBBHR1zVnPflEdjMKxIk+uSdBw/abyx1M8UGTCp7IzdGR3OZJcUod9X98ycu//HnFQCz39bfbkuNTZ428VNo7MBGokg0Se4q2tNcovBJ3Wy3hLJ1wnSwm37xr1YbJmyHjwytfWVynz696s0xnL0dM6CX//f92bIwYDPRWZnLg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=+4XvI9Cxx+nhR5CYFbw6cyhfcUZCOR3VuOE9EzBy+cE=;
 b=f6tulXgUJmuf8+B8Ye7D2Yd3CT+l4pyXzzAhxgC7Wknh8R1pSRcaaH15s85CNyxWj7P6YbYTZeIJPL+L4tT4GMLkp0zk9hOduuVm/jStpcIDT5h4rYAG0ei0bIWIYxLP3zs7qR59UDfBykOilsa8tjd0b1e6zGv3Dn5tH+bfKpDUxoEPGVWVg/STpBWBLAQG89ndQnsrVtsZcwZeMahGMyC36Iuq0y0tY60q38cyPITFKauDT55F6pb+wr5ps4ouXALzLUaQPyOOrL2oXvox7bbfiZEzEvSFj88CH9YyczNRmstk3XUey8lnFHwFAxBcIq6v3gHBpd6Zoiex4/8YNA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <758ed960-3e26-e63d-d0f0-be01bed3e4f9@suse.com>
Date: Mon, 7 Mar 2022 17:17:59 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v3] vpci/msix: fix PBA accesses
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: Alex Olson <this.is.a0lson@gmail.com>, xen-devel@lists.xenproject.org
References: <20220307125347.71814-1-roger.pau@citrix.com>
 <1480fa5d-bcee-e945-6b2f-9db7931c63af@suse.com>
 <YiYtoxcpi/KalGqg@Air-de-Roger>
 <62bc3030-496a-5d33-9278-614350df94d1@suse.com>
 <YiYvltzDBzPCHzFx@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YiYvltzDBzPCHzFx@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM5PR0601CA0044.eurprd06.prod.outlook.com
 (2603:10a6:203:68::30) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 7ecaecc8-ea64-44de-1565-08da00560aed
X-MS-TrafficTypeDiagnostic: AM6PR04MB4359:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB43592BDA02F7D5CC80873FB8B3089@AM6PR04MB4359.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(186003)(2906002)(26005)(6486002)(36756003)(508600001)(6512007)(2616005)(53546011)(31696002)(86362001)(6506007)(66946007)(38100700002)(31686004)(5660300002)(6916009)(316002)(8936002)(4326008)(83380400001)(8676002)(66476007)(66556008)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?SwLf32dtaVFmn391/DXoRMrmpGd3fH3Qs2MV0XQCF7Jc0ApgnW9cbbfwSGBf?=
 =?us-ascii?Q?KAmdrtvs1bIEq1i+ARJlWpXAkqTHRAe30/26ZwSOJLcOYeWBjhQLwEn6y++Z?=
 =?us-ascii?Q?LG4p59HthCt7dCAoO9odjEn/lVm01GkjOEAH/O9l/xYqg19FGqDU0Ww9iFX6?=
 =?us-ascii?Q?aFr795ZQq6ig2LzgAXzrtVr0lQ88hGeTji1PzH4J3K4qFv3mTdxoJK+YRZkS?=
 =?us-ascii?Q?NOByT3SrZym7eglMgDwG1bDDwfxBqQq9iala8BboHzbqUVYSWILqT2S6QmMG?=
 =?us-ascii?Q?ilAqhjAh3khlkDs1UB4d+fupZ6TQ+wtsSQD0xj5PYiv34b9MWIC3qPLN6u7P?=
 =?us-ascii?Q?kqto8BUMbVWmetoXweZKhlEMHJPLSEoiTLMSbgGfrRYR0FFptdXzH8bR9c1p?=
 =?us-ascii?Q?UTBn8EU0FyZxmKtKTeEbYvLhR3CyGbrkXEyvpVYIlu6H1oXJCfjjBPVOTjDI?=
 =?us-ascii?Q?VpybQT44hK1F+EZa58MSfh29sGW5RC/1dW8yxt9KZa9S1Sju5xcAf31A3eYB?=
 =?us-ascii?Q?hqmscOq4r5ANF4EN+3P2ltiVyXqaL4SmOL5av0GyJ5S9fC+T305k3nQVpJqI?=
 =?us-ascii?Q?DhRNjKcvu1p9C9g4AVvfJJOBNrHmP38tkF2QWSnRkwESSM8XnXhxSGFdQmLq?=
 =?us-ascii?Q?pYl/S/cg0k8iLuNAzcJ77x0OWF4sdKban09NK8t5I7m1G8uiM55ibt13PRXQ?=
 =?us-ascii?Q?NpvtWuwgI6xoBuju4els6QrZgLNmFoweFqNyzOzg4L1OTR/sxOftGZokxtEo?=
 =?us-ascii?Q?59N1m2iNETupelPepsLEhRVhyc6ALGsXRyL/vuETjFx4EPx3dzYGrvN53Z9L?=
 =?us-ascii?Q?sW/rjknoMpjyN/VpnxrTQ7U7qiyvnWAre4JXc5j1PBiaOCMnsmDOgLZ/nAcL?=
 =?us-ascii?Q?vf4hcAT9uvRremwrHyzoGtBH/KZMRLJ9CF5+5LHf0+svmw3kasfAVqQHQPML?=
 =?us-ascii?Q?e7Y7aQ9cCQUMqUCXKLXdYzhFVl5E5G3RxKNWtEHXPHQ4Z9a1bRVcblsTBGNE?=
 =?us-ascii?Q?F6vGpaCgqP/K8EnDXvCsDXCyuuNynOFJCq5a4+hoBZ9suV5QqmYPxSvdHz3M?=
 =?us-ascii?Q?aff0SstdeZg2QryTQQdBAUBhCkiGjm6cyn/cZ6mVUcvITBcDkTaRIEgFfikp?=
 =?us-ascii?Q?yUjyrVGm0JjLxoAPM7sAlhacIWVAnBmMksmYOAn12pupPGeRvkHqMDWPCj+8?=
 =?us-ascii?Q?FbhvRyumQ8Iwh4g1Qdjy96EpF8JKFondGKnnuziYBc0SXebeLiTORXFDqEL0?=
 =?us-ascii?Q?CF4N97drQyUQPxz1f2cqik7Ebe4lFTES0tiqz4Y23WsT1SjExobxiOJ4j9xM?=
 =?us-ascii?Q?5xugLUIGRolqKA5P/0uF6FzwROnUVbbrpKYTn468O8vives9/WcSWkndlgJE?=
 =?us-ascii?Q?bFzHu7ePtyqh0+Gxm53agFYKo/34u8mrJiFahwxNAsrVVE2KxuawkhaZEUyL?=
 =?us-ascii?Q?xIm4LR27hAymDcyt3O7cIrg4RtkhGjjNGm2YhvXT3UmMrthF++JQ/Qnb6n1i?=
 =?us-ascii?Q?XaXfwuLYf/php/2src9hlQGEx9I4fJ4OUAf/NK/CFK6QWAno0lA8NtpPtcb4?=
 =?us-ascii?Q?CuvBWVR+CyH8o4buHY9LUDVwxkWpeH0BRRNdN7BBUjmw5H264y1b7Bo8Fpc6?=
 =?us-ascii?Q?BVlymyS1jldp69M8qaZhHEw=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7ecaecc8-ea64-44de-1565-08da00560aed
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 16:17:57.8406
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: /ni9K1EoRKMpIQG5QFr7Tulqt9gTaU3dymYYVRtw0Qp/d5RonEnkx/4ACZQtm7yXlX9LrLQTwvvWqyAW1ElUIw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB4359

On 07.03.2022 17:15, Roger Pau Monn=C3=A9 wrote:
> On Mon, Mar 07, 2022 at 05:11:34PM +0100, Jan Beulich wrote:
>> On 07.03.2022 17:06, Roger Pau Monn=C3=A9 wrote:
>>> On Mon, Mar 07, 2022 at 03:12:32PM +0100, Jan Beulich wrote:
>>>> On 07.03.2022 13:53, Roger Pau Monne wrote:
>>>>> --- a/xen/drivers/vpci/msix.c
>>>>> +++ b/xen/drivers/vpci/msix.c
>>>>> @@ -182,6 +182,33 @@ static struct vpci_msix_entry *get_entry(struct =
vpci_msix *msix,
>>>>>      return &msix->entries[(addr - start) / PCI_MSIX_ENTRY_SIZE];
>>>>>  }
>>>>> =20
>>>>> +static void __iomem *get_pba(struct vpci *vpci)
>>>>> +{
>>>>> +    struct vpci_msix *msix =3D vpci->msix;
>>>>> +    void __iomem *pba;
>>>>> +
>>>>> +    /*
>>>>> +     * PBA will only be unmapped when the device is deassigned, so a=
ccess it
>>>>> +     * without holding the vpci lock.
>>>>> +     */
>>>>> +    if ( likely(msix->pba) )
>>>>> +        return msix->pba;
>>>>> +
>>>>> +    pba =3D ioremap(vmsix_table_addr(vpci, VPCI_MSIX_PBA),
>>>>> +                  vmsix_table_size(vpci, VPCI_MSIX_PBA));
>>>>> +    if ( !pba )
>>>>> +        return msix->pba;
>>>>
>>>> For this particular purpose may want to consider using ACCESS_ONCE() f=
or
>>>> all accesses to this field.
>>>
>>> Hm, I think I've asked before, but we do assume that ACCESS_ONCE will
>>> generate a single instruction, or else we would have to use
>>> read_atomic.
>>
>> Yeah, that looks to be the assumption. It has become my understanding
>> that ACCESS_ONCE() is generally favored over {read,write}_atomic().
>> Personally I prefer the latter when the goal is to have single insns.
>=20
> Oh, OK, so I should use 'ACCESS_ONCE(msix->pba) =3D pba;' rather than
> write_atomic then.

To please others, perhaps. As said, I'd be fine with you using
{read,write}_atomic().

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 16:22:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 16:22:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286277.485735 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRG7e-0004AL-Fi; Mon, 07 Mar 2022 16:22:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286277.485735; Mon, 07 Mar 2022 16:22:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRG7e-0004AE-CZ; Mon, 07 Mar 2022 16:22:10 +0000
Received: by outflank-mailman (input) for mailman id 286277;
 Mon, 07 Mar 2022 16:22:09 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=e/ad=TS=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nRG7d-0004A8-73
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 16:22:09 +0000
Received: from mail-lj1-x22a.google.com (mail-lj1-x22a.google.com
 [2a00:1450:4864:20::22a])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id bbfce285-9e32-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 17:22:08 +0100 (CET)
Received: by mail-lj1-x22a.google.com with SMTP id e8so21233512ljj.2
 for <xen-devel@lists.xenproject.org>; Mon, 07 Mar 2022 08:22:08 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: bbfce285-9e32-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=9C5DBCbsfu8SZHqZQ6PXI5sSarw5G3jk2qwOBmV/P2o=;
        b=oHOY+WEfbRDqKQP6yA+Eg3+DiHtJAGHh2tkMkmcA/nY0XMnNmJ8YW5L1R1/E7h2D+w
         dvxvTcQ5qWb64dPN+nI2B43uAqcgdeIiLEVybEtKa5eOC1/M7Ozb2SlOcPs9BgLYYAwM
         uEiBNkKBASHDjI+gAL9gIDYeJFZPfoMPwbogVMLgPjOfBVBHjMWwO7NbTImxkC/CMi2X
         uMGEQoyWQTtWMyw39OiopCbn31admljGGV18cwMiYGZXptOQQPUyr5Th/o3XxpPURBXH
         dS+rwH5bbZXGTzJnAxcKGd/eBy9ZNI86bTJ72Q0qeX/JxR73RF1rVo0P83kiPylZ6bh2
         EsVw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=9C5DBCbsfu8SZHqZQ6PXI5sSarw5G3jk2qwOBmV/P2o=;
        b=iIlFWKTjIXSlLjWvxOyOE4bjmzHKh/wyT9E9X70da/4ijJiy7HSEuok+5MpZn7RVT1
         BXLIPbfBDGEJn58HCI7uAOEjnJDWbIL3yK23tFwLzKbmaGVpA3XMW70X9jYaqhFLcfZG
         xIdbSmunQ0BkxpIyYdNVUVgpZYB2oeq2myWJXvQQ3MKM+hx390sXoBHDJhRQId8ouj3w
         M1FPmU9SQ4XmtGfDodFEMPBYm8OWFckBBIA1Y1erQKqSIBLargQv/Ayx+qKenq+DEtZI
         IxnjtGuH7NZCm4RS/VjkWmU0G/HdeRm8uYKFvdX9l+lmz9LKhZGSbyh4O/Enoj2xOwwa
         fuzg==
X-Gm-Message-State: AOAM532C6WDwBuKCXTn+hoiuZ+BlkF4Q0PUGXTGCN16ulx7PYJ1GzV/2
	QwoGaPLTW4JqDnZjbPs5Mj5jw0ZNrEhhsAcRzEc=
X-Google-Smtp-Source: ABdhPJyk7vUD/oWWY9RBWCKb7tQ4GcdsFRNK+oeWU9f9TwAXmWlkdBfvMvg0BM5zlOD7ii0tQoyKdw0cwbWHS1jaMuA=
X-Received: by 2002:a2e:7c19:0:b0:247:e9a7:5b76 with SMTP id
 x25-20020a2e7c19000000b00247e9a75b76mr2435683ljc.135.1646670127721; Mon, 07
 Mar 2022 08:22:07 -0800 (PST)
MIME-Version: 1.0
References: <DB7PR03MB50027EE92E11BFFF71AADC4598049@DB7PR03MB5002.eurprd03.prod.outlook.com>
 <92827eec-b6e9-9c95-8f9e-fcf063d45090@santannapisa.it> <YiDt7fX92n6Luc2l@Air-de-Roger>
 <CAKf6xpsnmQG7-LXn5+Uz4mncWsN0EZ8wpagY8f8OydvZNb6g5A@mail.gmail.com>
 <YiH9cee6NIKA6MWg@Air-de-Roger> <53a4fe6b-efc8-bfa1-8475-0aa58774051a@santannapisa.it>
 <YiIFyRUNXpUfzwRB@Air-de-Roger> <0ce52d38-f542-9336-a100-1cbfc559f218@santannapisa.it>
 <YiXq5HIrvZsy7QKU@Air-de-Roger> <b388ed5b-177e-2e9d-6450-6df16d9250c4@santannapisa.it>
 <YiXwhUnZL8bcJvH2@Air-de-Roger> <93fb9755-d40a-3cfe-1f6e-335b57d5a213@santannapisa.it>
 <e5c4c591-8ef4-f8d7-aa2a-b196a5a9749c@suse.com> <6028180c-ff1c-5d4f-2cf2-582e4104d888@santannapisa.it>
 <04e4ecfb-0235-db0d-d5fd-3274879003fa@citrix.com> <9b38e9b4-b2e9-b790-397c-38d7b62443d4@santannapisa.it>
 <CAKf6xpt7ygY_+zAHR6pHSRdtbgyjnSpB2Phz8qNCrdptU9H=Cg@mail.gmail.com> <f3ea9089-92db-d868-c7b5-6fb76124623f@santannapisa.it>
In-Reply-To: <f3ea9089-92db-d868-c7b5-6fb76124623f@santannapisa.it>
From: Jason Andryuk <jandryuk@gmail.com>
Date: Mon, 7 Mar 2022 11:21:56 -0500
Message-ID: <CAKf6xpt0TJegOQrBh17aAGTA-7pQcPxLYmR5BAj+RQrNXm8oOw@mail.gmail.com>
Subject: Re: Network driver domain broken
To: Andrea Stevanato <andrea.stevanato@santannapisa.it>
Cc: Andrew Cooper <Andrew.Cooper3@citrix.com>, Jan Beulich <jbeulich@suse.com>, 
	Roger Pau Monne <roger.pau@citrix.com>, 
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "wl@xen.org" <wl@xen.org>, 
	Anthony Perard <anthony.perard@citrix.com>
Content-Type: text/plain; charset="UTF-8"

On Mon, Mar 7, 2022 at 11:10 AM Andrea Stevanato
<andrea.stevanato@santannapisa.it> wrote:
>
> On 3/7/2022 5:07 PM, Jason Andryuk wrote:
> > On Mon, Mar 7, 2022 at 10:00 AM Andrea Stevanato
> > <andrea.stevanato@santannapisa.it> wrote:
> >> (XEN) XSM Framework v1.0.0 initialized
> >> (XEN) Initialising XSM SILO mode
> >
> > Yes, SILO mode is running.
> >
> >> # cat /boot/xen-4.14.3-pre.config | grep XSM
> >> CONFIG_XSM=y
> >> CONFIG_XSM_FLASK=y
> >> CONFIG_XSM_FLASK_AVC_STATS=y
> >> # CONFIG_XSM_FLASK_POLICY is not set
> >> CONFIG_XSM_SILO=y
> >> # CONFIG_XSM_DUMMY_DEFAULT is not set
> >> # CONFIG_XSM_FLASK_DEFAULT is not set
> >> CONFIG_XSM_SILO_DEFAULT=y
> >>
> >> This is the default configuration shipped with petalinux. From the
> >> help menuconfig, it seems that this XSM SILO deny communication
> >> between unprivileged VMs.
> >
> > You could try adding xsm=dummy to your hypervisor command line to turn
> > off SILO and allow the guests to communicate.
>
> I changed it to FLASK adding flask=late to hypervisor the command line.
> Which one should I choose? SILO + xsm=dummy or FLASK + flask=late/disabled?
> What are the differences?

xsm=dummy is the "default" policy.  Basically, it's allowing dom0 to
make privileged hypercalls and guests to make non-privileged
hypercalls.

flask without a policy may be allowing everything, which means guests
can make privileged hypercalls.  flask with a policy lets you define
what is or isn't allowed.

xsm=dummy is probably better for you than flask without a policy
(assuming it works :).

Regards,
Jason


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 16:24:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 16:24:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286283.485746 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRG9c-0004lh-Sg; Mon, 07 Mar 2022 16:24:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286283.485746; Mon, 07 Mar 2022 16:24:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRG9c-0004la-PV; Mon, 07 Mar 2022 16:24:12 +0000
Received: by outflank-mailman (input) for mailman id 286283;
 Mon, 07 Mar 2022 16:24:11 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+gfv=TS=citrix.com=prvs=0582ef7ee=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRG9b-0004lU-Cc
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 16:24:11 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 0352b4de-9e33-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 17:24:09 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0352b4de-9e33-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646670250;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=Hw4ChFqqRCgDZMlvxxo/VDB2pJZLzDDpYLAPRuARsO8=;
  b=PnCSjz6sP5wCHk7Mw6D2wnPcNCgOoGSzYiki5kuFUq99xoNzRjxrCe31
   tdOUud+CRg8LI0advL2UO0WRy+Qe9fvTNQTRSqbYFSFphVHefH8Kn0MdK
   T19U3Ap3XaA2HPIOHB81GgcwGP0pwIr7MQFrwMEKS8e0uNylJjcmrAioa
   o=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65626181
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:bYCORKBFXmUjARVW/yDjw5YqxClBgxIJ4kV8jS/XYbTApDgn0mQOz
 mccCm3XMvfeNGqged9wOty/80hT68TRzoUxQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vh3dYy6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhX0
 sVO67OycT0rYLTIx88laDsJHhlhaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguw5K8bmJsUHs2xIxjDFF/c2B5vERs0m4PcGgWlq2JkeRJ4yY
 eJIUGJvfQ7sUiceAWgzLbcDs77yr17gJmgwRFW9+vNsvjm7IBZK+KfpGMrYfJqNX8o9tlaVo
 CfK8nr0BjkeNceD0nyV/3S0nOjNkCjnHoUIG9WQ9PRnnVmSzWw7EwANWB2wpvzRt6Klc4sBc
 QpOoHNo9PVsshzwJjXgY/GmiFierh1CdNhoKe9k8QXS4ZLvwVeUPndRG1atd+canMMxQDUr0
 HqAkNXoGSFjvdWpdJ6NyluHhWjsYHZIdAfucQdBFFJYuIe7/OnfmzqSFo4LLUKjsjHi9dgcK
 RiupTN2ubgchNVjO06TrQGe2GLESnQko2cICuTrsoCNs1kRiG2NPdXABb3nARFodtrxc7V5l
 CJY8/VyFchXZX13qASDQf8WAJai7OufPTvXjDZHRsd9qWn8pSb8JtAAvFmSwXuF1e5eJVfUj
 LL741sNtPe/wlPwBUOIX25BI5tzlvWxfTgUfvvVcsBPcvBMmPyvp0lTibqr9zm1yiAEyPhnU
 b/CKJrEJS9DWcxPkWrnL89AgORD7n1vmgvuqWXTkk3PPUy2PyXOF9/o8TKmM4gE0U9ziF6No
 oYHapDTkE03vS+XSnC/zLP/5GsidBATLZv3t9ZWZqiEJA9nE3smEPjf3fUqfIkNokifvrugE
 q2VMqOA9GfCuA==
IronPort-HdrOrdr: A9a23:sJ1kTKydEIWFiDKWKQQcKrPxzuskLtp133Aq2lEZdPULSKOlfp
 GV8MjziyWYtN9wYhAdcdDpAtjmfZr5z+8O3WB3B8beYOCGghrSEGgG1+XfKlLbak/DH4JmpM
 Jdmu1FeaHN5DtB/LfHCWuDYq8dKbC8mcjC74eurEuFDzsaE52Ihz0JdDpzeXcGIjWua6BJcK
 Z1saF81kWdkDksH4yGL0hAe9KGi8zAlZrgbxJDLxk76DOWhTftzLLhCRCX0joXTjsKmN4ZgC
 L4uj28wp/mn+Cwyxfa2WOWx5NKmOH5wt8GIMCXkMAaJhjllw7tToV8XL+puiwzvYiUmR0Xue
 iJhy1lE9V46nvXcG3wiRzx2zP42DJr0HPmwU/wuwqVneXJABYBT+ZRj4NQdRXUr2A6ustn7a
 5N12WF87JKEBLphk3Glpf1fiAvsnDxjWspkOYVgXAae5AZcqVtoYsW+14QOIscHRj99JssHI
 BVfY3hDc5tABKnhk3izylSKITGZAVxIv7GeDlOhiWt6UkZoJgjpHFohvD2nR87heYAotd/lq
 H5259T5cJzp/8tHNJA7dg6MLmK40z2MGTx2TGpUB3a/J9uAQO5l3ew2sRw2N2X
X-IronPort-AV: E=Sophos;i="5.90,162,1643691600"; 
   d="scan'208";a="65626181"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=nzjdnTy9B3tbxtktFNz8Ov+2NDI2NCV010IgvgKb06aQj4wEuJ0UCwFXTBadppEVE6rSz4pDhVX4dUPzNRcx0L68vpQmBRFTjO26A4q8KqBbDOx3OpGGx9uM0CBTpZR/d6W4NSsAVyyAmT65el+V+msrV5lzrTpp8wSzSvr7nZqqUxOY6qooFhR8kiJkhgjh+Kkm1r79VaGJLJuK5ntuKp6lGHqlkqabW8v2PkIZGTxORN7acaXYlTHBJZKlOwR3niu5dG3V+knVtToZJIaXSzHgHOv8AY0tf/k47rUSkEN78dE1PgfefMRA7GmZIsKhmFuhUJK3g2sNQsWpqgk5Xg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=bwEf5thNpMC0iOa5SJZ3mnlSn6rIoIeQsgCpsPNQus0=;
 b=i5aJUPrVQrgYYv0eAxFXIGJrcmQ6Upb9+uGumVaVW7GC8CRyXiM0xbB/gl7GNxb0Q6STA+IOHSi+jgJVMtkK5K/zIa/cwG0m0knzBmDjiQzAXO91Rtm6q36ZjTA0oLPlsHjMvPA7ex6K31tDppXG5fTz5YzGswMxOWdlC+atoEnqWngn8WUokSumvLyfHgoYoRcQBXrkonGdByokhuJTwIzLsmNxPM+BsMh3xJuYj/2jt/Uuy6w0K0JGSYTaoN4QbdzWM9v1Iig8NpGr7Ew+L435tcTm86MilKWntshhwaSoSWWWw/wPbj+u5BeG02e+KDZirqlHSM2sMVN+iOf8FA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=bwEf5thNpMC0iOa5SJZ3mnlSn6rIoIeQsgCpsPNQus0=;
 b=udys/XMl8izoXPiI+qldZ0aDPWt3fgMuzV7ix6cogK7MEdmQdOCmaYUk/pQI15AkB0g2SlX8X9mcWScuaA5GqZn4td1+1kg2hsizGeqfqebEaQNtQPzwiuFMvO6fpN1U4pV72i0loK4rXkr4+qEK4s5pwJCEBWe1wOEK716U4UE=
Date: Mon, 7 Mar 2022 17:23:57 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Andrew
 Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH] x86: avoid SORT_BY_INIT_PRIORITY with old GNU ld
Message-ID: <YiYxnd67jUBUlWHs@Air-de-Roger>
References: <8b982bab-9b16-61e7-620f-5a5b2be39588@suse.com>
 <YiYfVmW3iQ4wA5k/@Air-de-Roger>
 <ca144758-da48-00a1-1e76-872c3455c335@suse.com>
 <YiYqLtozm4/2Ibu0@Air-de-Roger>
 <2f0b8b0a-7f0a-13b7-4839-94f30aaecfeb@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <2f0b8b0a-7f0a-13b7-4839-94f30aaecfeb@suse.com>
X-ClientProxiedBy: LO2P265CA0405.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:f::33) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 4ed0952e-ac35-46e3-61aa-08da0056e548
X-MS-TrafficTypeDiagnostic: SA0PR03MB5610:EE_
X-Microsoft-Antispam-PRVS: <SA0PR03MB56107497E659B14A03B019408F089@SA0PR03MB5610.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(316002)(53546011)(6486002)(508600001)(54906003)(6506007)(8936002)(6666004)(9686003)(186003)(33716001)(85182001)(6512007)(6916009)(2906002)(26005)(4326008)(8676002)(5660300002)(38100700002)(82960400001)(83380400001)(66946007)(66476007)(66556008)(86362001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?S2ZSUTJQS1BWOWRyL2RQOXA4SXZjeHY4VG9QRWlPQ2xBMm5nMTNTdTlFTlg2?=
 =?utf-8?B?VzBBVFhIWkswejRiZ3liaXpMTVZHdE5pT3lWY2w3TVNhU1RxY0lDQjZQU0s3?=
 =?utf-8?B?OGRrRGthRmJJalZrTjUrMkdubmxaOXRuSDcwK2xPMGFINUFRYUM0M2ljeXRV?=
 =?utf-8?B?NzN1d2E2UzBZanpjZE55eTVVS01IdFZmWTVwUi9SNzFmTVpwbEh4ZmlDSzVF?=
 =?utf-8?B?T2lIYU1RMFphc2VqeFJnbENjcUpNSzZrSHpJSWZSTHEwRG13MXBUK2ZQOTNW?=
 =?utf-8?B?WElSaENVNnplZ0xNVmExWnVwWDBWWEhyNjRLS1pNbjBqYTFzejBmbGZhTXBV?=
 =?utf-8?B?MUpNY0o4OWpCL3czSGtGU2VTT2V3TDNIOGpzb0xKMmxpckZyaVg5K0FlYnpj?=
 =?utf-8?B?cHNjblZCTlBaWG4zNWpVaFNEbmhxajVvajdZeHh6NTBBMEszN0VPVmNaV2Y1?=
 =?utf-8?B?K1JMRDkyekhOaWJPdGU5a0JpaVNFVk9BK0ZMbndKbzIzQzJ5MzMxQU43UC9s?=
 =?utf-8?B?RXVhOHpoV3BTSjJXMWpJTTA4QmphUEF5TEduNDRDMDFmdlNnUHlQajZvNDcz?=
 =?utf-8?B?eEZqdkR1cXFvN2Fza1haMGdla0cyZ2RnV1JIZWNwbkdpSitEOTYzamF4VlBu?=
 =?utf-8?B?WUphcUlGZ2lyMTMweFovK2V3STFxazRTVitITkY0dXY2eklrd3hUd2RwZ1Bh?=
 =?utf-8?B?ZkFoeVk3cmE3elJCYnFEYkszUDJHK2YrYjkxRDVxb0pjbDA0S0Ryd2ZObVVF?=
 =?utf-8?B?M2ZQakprcXdId2R5L3o0TlFJN3dtdEFsV2ZwcE10TFYvMTA1TmVzZi9TMjVa?=
 =?utf-8?B?YnNIaWk3N204NTRVcEFvV3g3Ymg5Nk5hZnQ1clg2UEw1OWJtQzFEaWdRVXpx?=
 =?utf-8?B?QkNGQ3FHaGtvQzJQcTQ0QUk4RVkzRUZIS1hMb3EyNU0rUGVxT2RFeFN3UU5H?=
 =?utf-8?B?QmtEOVZLWFJKdTF0NlMrYVorb0lUaGszT29lOG53L3lGT0ZCbFFEYUxvdmtO?=
 =?utf-8?B?ZG9oc2pCTEpvOWQ3WGZLS2t1S3BYQzRHV25PMjcyeFVURGF0ajFHbGZpYTdP?=
 =?utf-8?B?SDZXcGpXMkpBdjFmZDNOL1EzZ1FSWGI3NHZQNFVyQnZ3MWRuWVlDV0JFNVZu?=
 =?utf-8?B?eThXa0JHTjg3a2d3bDNIcFNlNkVoYU5qYlZMOTkyZExPc1dTeEIrdHFIODZl?=
 =?utf-8?B?UjBrMVZRLzRTZ0VzYllwTXo0Q0tXcFp3OXVKOVRSSXRISzZlTG1pbkhpUFNy?=
 =?utf-8?B?VG11SzQ2QXhxa1BpZ0ExS3F0a1dNeVlucjNKRk9xNW1YYTBnZjNuOUxPU1Ri?=
 =?utf-8?B?RHc2eTN2a3NTQStONzJ6NjZ6cjBxd1lGaWlqR1RjTUViekZWZ3pVUGVkTlJW?=
 =?utf-8?B?YldwTHF4V2JXMC9QUm1CWDV6dVRnWWlJOFh3RmpaMDRQbDdsblJZUkJZeUdP?=
 =?utf-8?B?aEUwMUdZempVQTk2OHpXZFMwT2s2dnl1Q1VJd1hBK2QvRWllQzhuMnJVa3RH?=
 =?utf-8?B?OVRFeVI0N0wyWk9iU000WHlDSG1XMzBZMkpBMzNUSmZpZ3ZkQXAwaVZ2ckZQ?=
 =?utf-8?B?SnR0ZHNIRGk5VFFLOCtRWjdzZ3AzRmlTVlRaUUlTcjlGc1RZQllKbCtzV2xJ?=
 =?utf-8?B?Y2kxWVhWMzdMUS9YU3ZKVll2UGFicGYxR3REMEtKOW5qTHNsYkF6UVRvcE5v?=
 =?utf-8?B?WS95bkNmQmxBdG04RkxON0NJYkdSUng1aUZ6emJtbUE0bFFEUzBUVml6RDJW?=
 =?utf-8?B?SzNDd0xYRVd5QjZSVWlNMnVhNUh2VVNRRkhrU29CdTh1MW0yWG1Mc2dEMFBq?=
 =?utf-8?B?SGgrb1NST3l5MkpZbkhSZXJ3ZENKalNZUEwzUU5heDdZYmszSkhZYy9zQ2da?=
 =?utf-8?B?c01sZmlYMTkwalErVXFaVnBIWVVEQm94ak1sMmI3RnpZZXBYalNMRVRzY1Zo?=
 =?utf-8?B?Sy9zMDQvNWJlRDc4aklpRzc3WDBDSWNUQWt1eU5tcEtTeDU3elZWOFU0dDFl?=
 =?utf-8?B?VytMNVJYWGVtUkhjRHdXaWNLMGhoNmYxSDdUY2dPeHlCMUtsczFUY2JMZVk0?=
 =?utf-8?B?cjY5SE9Oam00N2NOeU43b2lCWVV1Q2dHZXEvWllEUWg1Z281YUNrRUEwRnYw?=
 =?utf-8?B?K0o5WVV6OGNQS2NxOUJ6VE4vY1kySHVoOVhnKzVwc2dtdERNdUhKWWxYbFlQ?=
 =?utf-8?Q?gQEcNCDBULJM4xBRhy3W880=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 4ed0952e-ac35-46e3-61aa-08da0056e548
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 16:24:04.1665
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: zI5aDOxMHWbAXgsBjzJAO3PfyvmxeMKyiBXrSlT+T6dLjuV1dn6ayAMG6JmSuBRxqVuPHUIMkpUKi6lL0tsPnA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA0PR03MB5610
X-OriginatorOrg: citrix.com

On Mon, Mar 07, 2022 at 05:15:57PM +0100, Jan Beulich wrote:
> On 07.03.2022 16:52, Roger Pau Monné wrote:
> > On Mon, Mar 07, 2022 at 04:29:22PM +0100, Jan Beulich wrote:
> >> On 07.03.2022 16:05, Roger Pau Monné wrote:
> >>> On Mon, Mar 07, 2022 at 02:49:32PM +0100, Jan Beulich wrote:
> >>>> Support for this construct was added in 2.22 only. Avoid the need to
> >>>> introduce logic to probe for linker script capabilities by (ab)using the
> >>>> probe for a command line option having appeared at about the same time.
> >>>>
> >>>> Fixes: 4b7fd8153ddf ("x86: fold sections in final binaries")
> >>>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
> >>>> ---
> >>>> Obviously this doesn't take care of old LLVM ld yet, if any care is
> >>>> needed there in the first place.
> >>>>
> >>>> --- a/xen/arch/x86/arch.mk
> >>>> +++ b/xen/arch/x86/arch.mk
> >>>> @@ -70,6 +70,11 @@ ifeq ($(CONFIG_UBSAN),y)
> >>>>  $(call cc-option-add,CFLAGS_UBSAN,CC,-fno-sanitize=alignment)
> >>>>  endif
> >>>>  
> >>>> +# While not much better than going by raw GNU ld version, utilize that the
> >>>> +# feature we're after has appeared in the same release as the
> >>>> +# --print-output-format command line option.
> >>>> +AFLAGS-$(call ld-option,--print-output-format) += -DHAVE_LD_SORT_BY_INIT_PRIORITY
> >>>
> >>> LLVM ld doesn't have --print-output-format:
> >>>
> >>> % ld --print-output-format
> >>> ld: error: unknown argument '--print-output-format'
> >>>
> >>> So it would be always defaulting to SORT. I'm not sure what to
> >>> recommend.
> >>
> >> Do you know if all versions we support know of SORT_BY_INIT_PRIORITY?
> > 
> > Hm, I don't think we can assume that we support LLVM LD in 3.5. I'm
> > not even sure if LLVM 3.5 had LLD in the first place.
> > 
> > The first version that we care about and that we test is LLVM LD 6,
> > anything below that version is of unknown state.
> > 
> > I've tested you change with SORT_BY_INIT_PRIORITY on it and it seems
> > to be fine. This was on FreeBSD 12.3 version of LLD, not sure how
> > many changes have been backported from newer versions there.
> 
> I'm inclined to suggest then that we unconditionally enable use of
> this, in the hope that we'll never see a bug report.

It's unlikely for anyone to try to use LLD < 6, as that wasn't
considered capable of linking the FreeBSD kernel. In fact I should
likely suggest an update to the README file for comments, as with my
FreeBSD hat I only care about LLVM >= 6.

> But of course
> this then again gets me into the business of needing to determine
> the which ld variant we're working with. Looks like I won't be able
> to escape this anymore ...

I assume bumping binutils minimum version to 2.22 is not a viable
option?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 16:28:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 16:28:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286291.485757 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRGDi-0005b6-Jk; Mon, 07 Mar 2022 16:28:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286291.485757; Mon, 07 Mar 2022 16:28:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRGDi-0005az-Gi; Mon, 07 Mar 2022 16:28:26 +0000
Received: by outflank-mailman (input) for mailman id 286291;
 Mon, 07 Mar 2022 16:28:24 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRGDg-0005at-JY
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 16:28:24 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 9b437db3-9e33-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 17:28:23 +0100 (CET)
Received: from EUR01-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur01lp2057.outbound.protection.outlook.com [104.47.1.57]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-18-OwQ_D9Z9M7aFFwXU-fD6oQ-1; Mon, 07 Mar 2022 17:28:21 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PAXPR04MB8654.eurprd04.prod.outlook.com (2603:10a6:102:21d::11)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Mon, 7 Mar
 2022 16:28:20 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 16:28:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9b437db3-9e33-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646670502;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=3hxqySCM0l5eg/V8RCuBROwKqZKolZuN/8KZRb8qhB4=;
	b=QxUj8HmAGcj+h+JlhzREBDivThHrQUH3QG6qLbdXqFtYiESURGIdy02SKnVX70PitYl9bX
	9FsW5SXL757I3qOWsjvyuC8FQZcyW+ivIQis215048K/yRmfJjXEojrSeDN6yji3zLdnMX
	1RMgbl09W0Vj0VUF9CEZUPOORofSgF8=
X-MC-Unique: OwQ_D9Z9M7aFFwXU-fD6oQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=dtM2MT61SVVqllOv5v32ALrUpAR+zioBTQ9PxKWXwzeWlefp4AIh+FnE2S/INeAcGZ3j7QvNCKicjnfxM+sz8DB84PbD6h8sVsl0tQGD3v63e5CB+B8O0eb1qozPsjzStRS3bfKABJ0ZscnnKWE8tOvT4Ymb+P5/OZHrmgviUL/w12cK5L/6btP+f408k/l61EhUUwbeODlTSJDTPysXrGsuSEqDGHKTeW7zV17b9gxBh9kpxuLaSgJJNkTFX3eJqoN1PIUVwHY2SC7W69SWouwqSbVdiYnwkFZcTEoQelo4hDuVZFkf7P6b04rSWUA77uhAndklKLmErgAsF/Xaag==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=TpZmy+WckZWHPjdugwBIWtrS8HJyTvdknliRjg0Fh5E=;
 b=bxw3D5unEnq4iSS7Pr4KS8WctYcZ7pZnb8f9zJDDs+D/LNzV2RigfCK941XWLl3nm3ezMjFA1hit5Xj6hSLj7YCRYC+za5my7ia/w/UjE+nMDW5eNXHKelg056fSgHNpupEhaJ9IWfmHnQCD1PjZuHF2qeudgLPPvGapQvqChasvFVWTmqVN/v5ET6Sg7gJxApuKbZbJh3zX6mGQvSqSZNlxpY/uA9vs6CIduk3RAFyu8hswKRIZgxVjQ9K8v1faZZUGSBS1ehio0le/Qh5/dX40ja/qgJmgSw8EFJMZYJO/r7/OG/LTgnewYPN5AVZMz026hRmH9FbrcznA0BxI/g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <984284e3-c423-16ec-5ad7-c4211ebddb70@suse.com>
Date: Mon, 7 Mar 2022 17:28:20 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v2] livepatch: set -f{function,data}-sections compiler
 option
Content-Language: en-US
To: Roger Pau Monne <roger.pau@citrix.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 xen-devel@lists.xenproject.org
References: <20220307155558.72876-1-roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220307155558.72876-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR06CA0169.eurprd06.prod.outlook.com
 (2603:10a6:20b:45c::33) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 200217cb-8ea2-4cdf-7a15-08da00577da2
X-MS-TrafficTypeDiagnostic: PAXPR04MB8654:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB865426C13B7A859B5BEEB5BAB3089@PAXPR04MB8654.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(31696002)(8936002)(38100700002)(6506007)(53546011)(8676002)(86362001)(4326008)(31686004)(36756003)(316002)(66476007)(83380400001)(66946007)(26005)(66556008)(2616005)(186003)(5660300002)(6512007)(6486002)(508600001)(54906003)(2906002)(6916009)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?IrTpwh7mF0iEopD+WFFD7up/Fs3ddkIFUIVlc3VXxOMt015xUECpLH8+psd4?=
 =?us-ascii?Q?rPhjcAvXYG1JYoXXnegW/pBRLxw46Bz+Wkd9I0hPEGREUCnU7LEetYYNb82S?=
 =?us-ascii?Q?fDvtuNB9R7HH4WX08vxzt8o4iEm1QjVHxBSwovTxjTyH/EfW7rd4hiepwUqH?=
 =?us-ascii?Q?stwiXAnTb5b657ZdM7CTR5ZSxJ6j4TyLsYP3ZR5rnR/2PoRGW3iqPXsKzYnj?=
 =?us-ascii?Q?2FSmgOOwbrr7kmdA/1ALLKGOlVpmaNUpqdUaBY7NutU6pE/ZXTovmW7X9se3?=
 =?us-ascii?Q?tJGOclUXrC/qqmYf9jGhxK6kb2nH7ax4gVbF157C8/n0klXJuMmZpaHNnY5i?=
 =?us-ascii?Q?oGSmKp1cGcIVr/BE1hDwhWcl2KR9u4LeyhXVnsyje58tJgtkHGYm2SfVsMq1?=
 =?us-ascii?Q?nP3xOpC02VJXzGQWhSqpqE/6I2mZfhAdujonL8lb3WC+ljlM2T5AOMQw7/d1?=
 =?us-ascii?Q?8gvQeNXI8KHm4fFB/jsOaSXqloieL6xGRuyJhFZD/R1hXgslqsPUom2bE0+K?=
 =?us-ascii?Q?vTI15mFuIYmpS2N8zrbliuHxYV+Q70TA2sA0qgjFR5q6d7EYpbvh7P5aogPz?=
 =?us-ascii?Q?4aQPS+ajjI5yTzpmiuAWXb8/ao0NQ4w4tAYxXayvJLnnPSS91Jy6qd1wrXOT?=
 =?us-ascii?Q?ocBHs58F9FHRthq3sa3CwEp0BAAOFweK608JQ9Ii7ThXzHbGVzMO41F1rEHV?=
 =?us-ascii?Q?wfWxTOlmfoqGdTPleY0tSAv1F9Qq3ZPCsqQXrkaFtEkMlavEgLf4n7SVKVtI?=
 =?us-ascii?Q?IZ3Q6AR8Pl1s9v1IyaXZHDmxaAfGQQdngr7ns+eJKJicxQYzoosERTT71P/I?=
 =?us-ascii?Q?mTBzl4W3yve2R2WBjFrdlLKN2ULqppjja7Vk/LT10j5V1U0wcIAB1byYiHBD?=
 =?us-ascii?Q?6BmU2dn0PFzbpW8u5YXsrCMP31gTo0cOJLbm42GwiITfz7Ys/+w+YygfqaKk?=
 =?us-ascii?Q?aF3b/7WxD0jm16gLqQjA0Gb9I0d5g+djhdBZOdhvspNJyzQJ2h0sG4xzpgks?=
 =?us-ascii?Q?oj7ct9v8/DoEwTqpu0CIjbYa8AlGaB6bLwR+xmX2lN3twX0sNUXP4VqadJ/F?=
 =?us-ascii?Q?L3SkrbpFQtpfaveIYtj7CQ25HChlXpTZvNMLyShLgyyjz+KH5Z+cnZgoTCnC?=
 =?us-ascii?Q?dku0CQqAOgz0ZLgLYDUa2NI6ynZUupFXLKXL3qz2XKrTgwNmxHg1ooHbr0cH?=
 =?us-ascii?Q?CMkJYiUjtw7Ev2RFrhVJkQKJh/dC6M9dP2o4ENavZspfaigyTPppPzo3sDjB?=
 =?us-ascii?Q?s0I9ddbke77uwWsB+bWBSxY3P/h2cpm6e4Yq07LOsAmrA50mG5dfJcxUBnYT?=
 =?us-ascii?Q?zyFQ8IqnQ4hZS6G78wIraSo7VglF+aYFG+YipbJ/XtIgv9ozAXelfbzTNjGz?=
 =?us-ascii?Q?hIZDXhYK4Ln6a+CsWro8otKiF7Tm4tSLJAJECZNBCZ1J/jXLI3VKdkkKbKuU?=
 =?us-ascii?Q?a3aAkDm94rJ/qD5jffg/fyBPI1yHhq1RXBz8yuisrdBVSAj0vglm1Y2R/4VI?=
 =?us-ascii?Q?6BCZog7WgkOfrWXnbc4Gfv2AJSirxdZ8ySTdY41Kty31qv3IJ8YvJkBYTfzN?=
 =?us-ascii?Q?WKAQ7wUk0p+VAwv8tqGngsp0anNi2epQHcsE9hrLU07T3bszCNYKgGpn3Aua?=
 =?us-ascii?Q?h95SPlmk/5PL7smNenr+KLQ=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 200217cb-8ea2-4cdf-7a15-08da00577da2
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 16:28:19.9738
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: mUNWY/xye/cgF9yILxFtmIPSBS/3txGJI4V/nsrn/ekOm8KBmazYPIQQZd1PumISfWDfV6x7q5YHNGXJZ3ecCw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB8654

On 07.03.2022 16:55, Roger Pau Monne wrote:
> If livepatching support is enabled build the hypervisor with
> -f{function,data}-sections compiler options, which is required by the
> livepatching tools to detect changes and create livepatches.
>=20
> This shouldn't result in any functional change on the hypervisor
> binary image, but does however require some changes in the linker
> script in order to handle that each function and data item will now be
> placed into its own section in object files. As a result add catch-all
> for .text, .data and .bss in order to merge each individual item
> section into the final image.
>=20
> The main difference will be that .text.startup will end up being part
> of .text rather than .init, and thus won't be freed. .text.exit will
> also be part of .text rather than dropped. Overall this could make the
> image bigger, and package some .text code in a sub-optimal way.
>=20
> Note that placement of the sections inside of .text is also slightly
> adjusted to be more similar to the position found in the default GNU
> ld linker script. This requires having a separate section for the
> header in order to place it at the begging of the output image,
> followed with the unlikely and related sections, and finally the main
> .text section.
>=20
> On Arm the .data.read_mostly needs to be moved ahead of the .data
> section like it's already done on x86, and the alignment needs to be
> set to PAGE_SIZE so it doesn't end up being placed at the tail of a
> read-only page from the previous section. While there move the
> alignment of the .data section ahead of the section declaration, like
> it's done for other sections.
>=20
> The benefit of having CONFIG_LIVEPATCH enable those compiler option
> is that the livepatch build tools no longer need to fiddle with the
> build system in order to enable them. Note the current livepatch tools
> are broken after the recent build changes due to the way they
> attempt to set  -f{function,data}-sections.
>=20
> Signed-off-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>

The x86 part of this looks fine to me, just one other remark:

> --- a/xen/common/Kconfig
> +++ b/xen/common/Kconfig
> @@ -350,10 +350,14 @@ source "common/sched/Kconfig"
>  config CRYPTO
>  	bool
> =20
> +config CC_SPLIT_SECTIONS
> +	bool

I think this wants to live higher up in the file, perhaps between
ALTERNATIVE_CALL and HAS_ALTERNATIVE. (CRYPTO, as seen in context
here, imo also would better live higher up.) Or alternatively it may
want to move to xen/Kconfig, next to CC_HAS_VISIBILITY_ATTRIBUTE.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 16:28:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 16:28:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286293.485768 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRGE9-00066V-UV; Mon, 07 Mar 2022 16:28:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286293.485768; Mon, 07 Mar 2022 16:28:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRGE9-00066L-Qq; Mon, 07 Mar 2022 16:28:53 +0000
Received: by outflank-mailman (input) for mailman id 286293;
 Mon, 07 Mar 2022 16:28:52 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+gfv=TS=citrix.com=prvs=0582ef7ee=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRGE8-00065y-Eu
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 16:28:52 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ab11dc8d-9e33-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 17:28:50 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ab11dc8d-9e33-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646670531;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=/aZEkVonQOClsqokFS5hc2h1yMoKA0ku8F9eRDlD+rU=;
  b=Mp+FzbPKFmqhu598DMqjMelTIXT1FdbHs/x7Enrd9GqaQXgyVZPylevy
   eVM0nTaw20u8lADDGTHj27WMFTsSpl8ns2zpMcp9/GVb56NldaMBY/h3B
   EeWCbFxjRjbvfR2fYKDC7qyM7B3xAdsmbZg+8/8xPSFxhES8MrkccUmCi
   E=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65561544
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:/u8oYaCpyYEz/xVW/zbjw5YqxClBgxIJ4kV8jS/XYbTApDkj0T0Cm
 mRLXW+Ea6zYMzGnKdt0a4zi90NXuMfVxtU1QQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vh3dYy6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPgt8
 oxXp8TvFD11YJPdyac4QzBkNSdxaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguw5K8bmJsUHs2xIxjDFF/c2B5vERs0m4PcGgWpu350SQZ4yY
 eIXUQhWPCv8ZCdwAU0tE6MPw8qJqXnwJmgwRFW9+vNsvjm7IBZK+KjgNp/Zd8KHQe1Rn12Ev
 STW8mLhGBYYOdeDjz2f/RqEmu/OhmX6Q8QbTLmj8fhCj1iax2hVAxoTPXO5q/Skjk+1W/pEN
 lcZvCEpqMAPGFeDF4enGUfi+Tjd40BaC4E4//AGBB+llpCN+RTBWTU+EmB/eY1lkd8feRos2
 Qrc9z/2PgBHvLqQQHOb076bqzKuJCQYRVM/iT84oRgtuIe6/txq5v7bZpM6SfPu0IWpcd3l6
 23S9EADa6MvYdnnPklR1XTOmHqSq5fAVWbZDS2HDzv+vmuViGNIDrFECGQ3D94ddu51rXHb5
 RDofvRyC8hUUfmweNSlGrllIV1Qz6/t3MfgqVBuBYI90D+m5mSue4tdiBknehs3b5daIWCyM
 B+P0e+02HO0FCH2BZKbnqrrU5h6pUQePY6Nug/ogipmPcEqKV7vENBGbk+MxWH9+HXAYolkU
 ap3hf2EVC5AYYw+lWLeb75EjdcDn3lurUuOFcGT50n2itK2OS/KIYrpxXPTN4jVGovf+16Lm
 zueXuPXoyhivBrWOXGGodZOdglRdRDWx/ne8qRqSwJKGSI/cEkJAP7N27IxPYtjmqVejODT+
 X+hHERfzTLCabfvcG1mtlgLhGvTYKtC
IronPort-HdrOrdr: A9a23:m9A6VqHi/35ycdVGpLqFfJHXdLJyesId70hD6qkvc3Fom52j/f
 xGws5x6fatskdoZJhSo6H6BEDgewKWyXcR2+Us1NiZLW3bUQeTTb2KqLGSugEIeBeOvNK1t5
 0QFJSWYeeYZTcVsS+52njfLz9K+qjlzEncv5a6854bd3AJV0gP1WdEIzfeNnczaBhNBJI/Gp
 bZzNFAvSCcdXMeadn+LmUZXsDYzue72K7OUFojPVoK+QOOhTSn5PrRCB6DxCoTVDtJ3PML7X
 XFqQrk/a+u2svLhSM0llWjoai+quGRiuerN/b8yfT9Hw+cyzpAKr4RGYFq9wpF2t1HoGxa7e
 Uk5S1QcvibokmhAV1crXbWqnXd+Sdr5Hn4xVCCh3z/5cT/WTIhEsJEwZlUax3D9iMbzadBOY
 9wrhakXqBsfGT9deXGlqv1fgAvklDxrWspkOYVgXAaWYwCaKVJpYha+E9OCp8PEC/z9YhiSY
 BVfYnhzecTdUnfY2HSv2FpztDpVnMvHg2eSkxHvsCOyTBZkH1w0kNdzs0CmXUL8o47VvB/lq
 35G7UtkKsLQt4dbKp7CutEScyrCnbVSRaJK26WKUSPLtBzB5sMke+E3FwY3pDaRHVT9upNpH
 3oaiIpiVIP
X-IronPort-AV: E=Sophos;i="5.90,162,1643691600"; 
   d="scan'208";a="65561544"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=hXb+nLGunZYlEVpDWDl+LZtYJDanqQNN/EwOIRwXlJq1ZBkB3mLeN20XmDLbROna4oyvR3FlODoPZjV7t4FcrR20hXn35ZAUiPYi4FtoEaxrnUwdEzjqyyCnpFqYDu0Jl2yGrP2GBQcY1X5zzU1/GeGKlAckQzzULY0Aml4YhV2dyFRze7CbGdCBMar1IFnX6ooWBx7Ly1JH7I/7JjjNmD/TWW/OjSlYIKGJhKaIUFRYCE4Sm5yDTiouSYYXPjSziJ5G/mK39eYEnU+DwO22Pq7FYT3BSgZw0lNrhxIcSSd1Bzt2L1/nsHIurWbkIVNb+RjUwvYvxle9ww1UDbF1Lg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=nwmDFDYOQUrG51oIRCLnj5H/ptVgEgg2boLsbs0NflY=;
 b=dPazhiA4xMdb7BMy8CIK1p3XY5BS4pb91pzEcogfrztilo2ZvfiopxmoP6ZwlAL+YrN6jbGLecx5mzb9KRG34pNTntLCrzGqa5LxHaTKVFNiHoZXPjrOHoC36jsDHdY5043D2Jrs8gO83YysQFV1PTj92BB2DAdlpbSbTZNHFmtgcYiZYkZIuySHHPMZmAlQKVt7VKP7Jmj/rNXt58AkJHa5k+pafTu3VyW22KuadyIc82HzF9nQ8le1hqz4w+OHpRW4ALnK9++D8Q4inLpcytZMh+nKvt3oYVa919aMxQFFeG45EFimNnYJY4X6pwLUKd9YVeGPJucRlv68179Wwg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=nwmDFDYOQUrG51oIRCLnj5H/ptVgEgg2boLsbs0NflY=;
 b=iGTaGDXVVg7/T5jLQdftlP9UeD6t9H7lXOF+kHIoVKfeyRJZIz28qcmj8Ek2JKCpssUl1dEkq37F5DUQvm9WMysX6+P8nYTUXCDpMISIE1jttfQwc3907hzGXsXoUz7cu5UDWoWDGYB4CvVwrbBCNcb0MEBy/hjj3TckCcfQoJE=
Date: Mon, 7 Mar 2022 17:28:41 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Alex Olson <this.is.a0lson@gmail.com>, <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v3] vpci/msix: fix PBA accesses
Message-ID: <YiYyuf6YkydVU+hE@Air-de-Roger>
References: <20220307125347.71814-1-roger.pau@citrix.com>
 <1480fa5d-bcee-e945-6b2f-9db7931c63af@suse.com>
 <YiYtoxcpi/KalGqg@Air-de-Roger>
 <62bc3030-496a-5d33-9278-614350df94d1@suse.com>
 <YiYvltzDBzPCHzFx@Air-de-Roger>
 <758ed960-3e26-e63d-d0f0-be01bed3e4f9@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <758ed960-3e26-e63d-d0f0-be01bed3e4f9@suse.com>
X-ClientProxiedBy: LO4P123CA0252.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:1a7::23) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 53c71aaa-4ccb-446d-8c42-08da00578d18
X-MS-TrafficTypeDiagnostic: SA0PR03MB5626:EE_
X-Microsoft-Antispam-PRVS: <SA0PR03MB5626378B35A093AD0EE017AB8F089@SA0PR03MB5626.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(53546011)(316002)(508600001)(6486002)(6506007)(186003)(8936002)(6666004)(6916009)(9686003)(33716001)(85182001)(6512007)(2906002)(26005)(8676002)(4326008)(5660300002)(38100700002)(82960400001)(83380400001)(66946007)(66476007)(66556008)(86362001)(67856001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?U3lnUDRrc0F3NUpvMldPNWtMbCtEYzVGWGxvdDQrZlJTeTBKcWFiWE9EbDhM?=
 =?utf-8?B?ZXpBaklNZHY1VFJsYnR1VkZtRVRXbzIzVDQrRXpmUklPbjJ1djlrV2xMbmFM?=
 =?utf-8?B?NU1kUzMzN1NYU1dyYUp0dHljRGlwdUlHUmw0bkVwWW4vdGxzMzBWcndWWjY0?=
 =?utf-8?B?QVM3RHB6SHhYMWcvQnVoQk84VWN3bk0zOE40QUhzRS9ldXpzU2czbkZiWUNS?=
 =?utf-8?B?TkVPSFBhN0l5UUtWZFJEQ3ZvMlZWWk1wZ0FzQU5uOXFYaDhQOFFhY0dnaEVM?=
 =?utf-8?B?YjBqdUZqUlpXNTZOMVNrRWZ2c3BrSEI1aDdSVnNNQi9BaEZhbUFFdFhLd0xr?=
 =?utf-8?B?dzBZTHNBWng5K3ZKbllMaGcyOHpndVZmR1VsSk01RytkaThBTHZZc0xkVlJi?=
 =?utf-8?B?emN0STBBVW9qWDVQN2YvMEh6R1pvSHd2VlU1S1BVT1FBdUI3QkYvamZscGRK?=
 =?utf-8?B?SDFGdllab0RyQVZpWTRuc2x4ZEdZK2RJbUVWOFFqWWRyN0dzbml4OGFmZEN6?=
 =?utf-8?B?ZzI0Wmw3YVROTWFYYUJ5NmRZdEJEVGcxRTUyVHBod2ZVOVViSU0xaUdzSEFX?=
 =?utf-8?B?dERZWTlGUVFwVHU4UEFYc1AvWWllSkZvK1R6ckN4L3U1NERYRi93dkduWkMz?=
 =?utf-8?B?Y3JpejljRmhyQ0IxZlJkSFNMcVM3Y0lIQkpqN3pZMHdXSUUvNnZjWEY1VHVl?=
 =?utf-8?B?Q3M0NC9lRlk5R2cyZFJHSEdWZExuN2s5a0dLS2NTVktPUEdkNzc4WmFjTjFi?=
 =?utf-8?B?MFd3NUhoWmovLzNySFNxL1hPdm9VY1NCOUdsRTcwR1liZzY2U3ZlZFRueWxT?=
 =?utf-8?B?SjhpcHhrTDQ2bVVPdU5iakVlbXpITnFmK0RPNFBCdTZaQjlUVW5iM0xRSHd2?=
 =?utf-8?B?SlFtZFRYZnlMUXV1Vml4N1dnaDNyMG0ybEJqa01KWW5GcjhzcFBUV3U1TUNo?=
 =?utf-8?B?ZE0zenVrZjFCS0dJWXNTdGpjTGt6TVhvWXNZZWVoR3NLeWwzSjJ1YUtGM3hC?=
 =?utf-8?B?dzZtMTlmaHVTeUF4OC9TVkR1WS9xek8yUDAySTVjVko5aVgveVBjdkZpamVi?=
 =?utf-8?B?SWF3bzRTWm5XVU1mekF6Yk1sZEpqcFp0ckJhekdYUWVITVZFS2RrL1c2ZzMr?=
 =?utf-8?B?NHBVN0FZbnQvT21Td0F6Nm5NQkpiN1JjeUJTR3l1RHo4aUdxUGZmVXk5SWZu?=
 =?utf-8?B?cXFCVlhJamxiazUwTWVYL1dTTE5wYkhwcENLRnJ4RUFsKzVlamdMYnlsbXhB?=
 =?utf-8?B?aVJZanQzMEVxdHJ1ZE5JR3hybkU5U2p2NkxhVlJIM1FaVVJwQzh2MDdhaHhR?=
 =?utf-8?B?bjZZQ0VWV2o3dUZhNXdZWFNMa3AzejgvK25WWjkyS0F3cXdNYnZQUFRHSmZm?=
 =?utf-8?B?Tjl2MXJoN1pBK2VtSGZiNFZyV2dQVU9LY1l3YWZJLzJoNyszQWZ5blVjeHRJ?=
 =?utf-8?B?MnlHdjNJVEVwa09TR1ZlekU5dFBKQVYzWFVTMTRmSWM5RXRYdEpvRmNIaUky?=
 =?utf-8?B?ZW9ES1NyQjFlUTRWRG43UC85eFExQ2x2M29uS0YrR1d2SjZ3OFBJYTIwVUNW?=
 =?utf-8?B?VXllR0tvaldrMDlVTGF1MkFNOWhSN29rMFBHVVo4TVNwZGhUS1RVUDZjVTk2?=
 =?utf-8?B?Wi90TklqUi9SeXBmTVk1V3NSM0tMK3pZbEJSK3RGQ2RVMWZwNVVxQlZLRGw0?=
 =?utf-8?B?QWRFdEFveEdZZGVWVnNTODBFUXdqK1ZpOUN1SG9QKzE0OUdRSkpsaFM1a1B1?=
 =?utf-8?B?czVEUnJCUDNmWlFxVHpOVjE5NUdiL0Y3TXFvRHBkZEdLV1pIOFBLWFRNR0t0?=
 =?utf-8?B?UWN0VDZ0OTR3UmlXeEtqYlIvL0Ywa09KNUZYZnlad2RpN0FGQWgwUUl2YVM0?=
 =?utf-8?B?NXVXZkhJVGtPMmczRGNRTVVydWdLU2hyRWpIY1JlV0JrQ3BaRUxJa1Q1Nzgr?=
 =?utf-8?B?QkhyUERiNkJDZ2x0T1h0Y1FvN3gveExpLzE4QW9EMVNaN09ZMWJnZ1k5Z2Ur?=
 =?utf-8?B?T1l3bkxnbWdTenhhVEJ5djRjZlRLMnU0Ly9GZWc2Qno0WU5kQ2VGbGZ1ZVc5?=
 =?utf-8?B?aU1xMStFWllTa2Nvb29qU0c2NENSekpBWUFMbTRvLzBFYUZqUW1HclVnUEds?=
 =?utf-8?B?OFdzM09LSWtqV283TFViYzRhMFJwS2cwbTFDK3RpUytLdlNJUTZkRmliZ2ZU?=
 =?utf-8?Q?l7WxD9jec183OBW1HXWZzD4=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 53c71aaa-4ccb-446d-8c42-08da00578d18
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 16:28:45.7884
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: c8+Tnj56+P9hdYjsGsMZLJpJH9XFEfn2mkzXROnE2KnQfIy+wVWmIH5lbhdnshuYZOt+YNf2stXZx1teAyWCUA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA0PR03MB5626
X-OriginatorOrg: citrix.com

On Mon, Mar 07, 2022 at 05:17:59PM +0100, Jan Beulich wrote:
> On 07.03.2022 17:15, Roger Pau Monné wrote:
> > On Mon, Mar 07, 2022 at 05:11:34PM +0100, Jan Beulich wrote:
> >> On 07.03.2022 17:06, Roger Pau Monné wrote:
> >>> On Mon, Mar 07, 2022 at 03:12:32PM +0100, Jan Beulich wrote:
> >>>> On 07.03.2022 13:53, Roger Pau Monne wrote:
> >>>>> --- a/xen/drivers/vpci/msix.c
> >>>>> +++ b/xen/drivers/vpci/msix.c
> >>>>> @@ -182,6 +182,33 @@ static struct vpci_msix_entry *get_entry(struct vpci_msix *msix,
> >>>>>      return &msix->entries[(addr - start) / PCI_MSIX_ENTRY_SIZE];
> >>>>>  }
> >>>>>  
> >>>>> +static void __iomem *get_pba(struct vpci *vpci)
> >>>>> +{
> >>>>> +    struct vpci_msix *msix = vpci->msix;
> >>>>> +    void __iomem *pba;
> >>>>> +
> >>>>> +    /*
> >>>>> +     * PBA will only be unmapped when the device is deassigned, so access it
> >>>>> +     * without holding the vpci lock.
> >>>>> +     */
> >>>>> +    if ( likely(msix->pba) )
> >>>>> +        return msix->pba;
> >>>>> +
> >>>>> +    pba = ioremap(vmsix_table_addr(vpci, VPCI_MSIX_PBA),
> >>>>> +                  vmsix_table_size(vpci, VPCI_MSIX_PBA));
> >>>>> +    if ( !pba )
> >>>>> +        return msix->pba;
> >>>>
> >>>> For this particular purpose may want to consider using ACCESS_ONCE() for
> >>>> all accesses to this field.
> >>>
> >>> Hm, I think I've asked before, but we do assume that ACCESS_ONCE will
> >>> generate a single instruction, or else we would have to use
> >>> read_atomic.
> >>
> >> Yeah, that looks to be the assumption. It has become my understanding
> >> that ACCESS_ONCE() is generally favored over {read,write}_atomic().
> >> Personally I prefer the latter when the goal is to have single insns.
> > 
> > Oh, OK, so I should use 'ACCESS_ONCE(msix->pba) = pba;' rather than
> > write_atomic then.
> 
> To please others, perhaps. As said, I'd be fine with you using
> {read,write}_atomic().

Well, given that you are the only one that has provided review I'm
fine with using {read,write}_atomic if that's also your preference.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 16:30:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 16:30:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286302.485778 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRGFN-0007XZ-9V; Mon, 07 Mar 2022 16:30:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286302.485778; Mon, 07 Mar 2022 16:30:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRGFN-0007XS-6b; Mon, 07 Mar 2022 16:30:09 +0000
Received: by outflank-mailman (input) for mailman id 286302;
 Mon, 07 Mar 2022 16:30:08 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRGFM-0007XH-Gd
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 16:30:08 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id d997b39a-9e33-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 17:30:07 +0100 (CET)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2057.outbound.protection.outlook.com [104.47.14.57]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-37-WxIHGhb9P560wV7W31XGMA-1; Mon, 07 Mar 2022 17:30:06 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AS1PR04MB9240.eurprd04.prod.outlook.com (2603:10a6:20b:4c4::5)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Mon, 7 Mar
 2022 16:30:04 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 16:30:04 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d997b39a-9e33-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646670607;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=2S4qfrW56WHwDMTIkb7iuCepsddjLG6m7m0sVNU9C9o=;
	b=iGjzRGskB4EIgyB6tAiYqgG0tvLmE+HXz2D0WI46dOcdxvasCKDE1jQfr9+Fc9Eonz6THX
	WcCN4sKAMT5PrZt5WwOSjSfHTIdcAcPeygBlvs3iZEOJc5OxG0vSr1FW9GzzJTHvjxfHc2
	mAVrr8PUXJPDY0HgYkKc6sWF3eA0ZIM=
X-MC-Unique: WxIHGhb9P560wV7W31XGMA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=BVZYwJXO7MxWK4LnLr9DwkeNsoKY6eXfWZcrOn0W/qwL5TZR9XFZXZKxoDfUIThh+4X/F7JSTAWoz5x7e4ngeATk6kvnQGdLI6kh4aqrMnqFScTveHzePfHMVWXKZxDUYpXH00x8cSyOtd5J9/5S+IiAuHSyztQ1YyeMNGw0K4NDzf7XYjo2Jp/R0v88m9TNvcyJc1msDVJvOw1RZTOsibbNqyQFgalUPUedefdDo3Mf9S2/MGc1bILMaeYOVxJ/GghniRDww8JHBYlDdHuCm5y4+6PbVBKT26KC/vOyv15pWhumVDCqdim5YqR0VLZGN/ARDQLIjVSWZqME7Ija3g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=6KxpdRytzyNHAeQ7ItxC9M3K6kjc2GUgtr+Q9qHAma0=;
 b=P2zHP2D81rUpOx97Lmolp0ChrWsD7WCnftKuAG1OxgzoOO5W/NFnCTkqM9oE0W8KbZpsYfzvcJCKJrYZPrwHRluN7a5lm6JxxfcTFG3TM4VeyjNq1aaqgAsSdAnBtlNJRM2ZlOu/ggQ5Kh3uY1XavGU5FNvQ0vc6E8ixyTABt7LIi57Itjv5P8RqS4alSQ6aB8LTD1jMdPbQLA/P71HG5Dsxn/D6I9Kec9Crbj5MDYCqyTBPwzknjtU8jR606l+WIDkl6o+T+HV+ZcUWS4M1FTKnF1Z6H4tq75fGohaQE1uEPu3Bw6f/zQ2UGuWmCt4T+1sFmc0D1u5rRnVxR4SzLg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <fdc16024-c997-ad1f-c5b2-9ee48f44392f@suse.com>
Date: Mon, 7 Mar 2022 17:30:05 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] x86: avoid SORT_BY_INIT_PRIORITY with old GNU ld
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
References: <8b982bab-9b16-61e7-620f-5a5b2be39588@suse.com>
 <YiYfVmW3iQ4wA5k/@Air-de-Roger>
 <ca144758-da48-00a1-1e76-872c3455c335@suse.com>
 <YiYqLtozm4/2Ibu0@Air-de-Roger>
 <2f0b8b0a-7f0a-13b7-4839-94f30aaecfeb@suse.com>
 <YiYxnd67jUBUlWHs@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YiYxnd67jUBUlWHs@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM7PR04CA0030.eurprd04.prod.outlook.com
 (2603:10a6:20b:110::40) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f70c60f5-d9fe-4fb6-14ea-08da0057bbd3
X-MS-TrafficTypeDiagnostic: AS1PR04MB9240:EE_
X-Microsoft-Antispam-PRVS:
	<AS1PR04MB92400AD04FED1145D6DE2936B3089@AS1PR04MB9240.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(4326008)(26005)(8936002)(53546011)(66946007)(66556008)(8676002)(66476007)(54906003)(6916009)(186003)(5660300002)(36756003)(31686004)(31696002)(6486002)(86362001)(2616005)(2906002)(6506007)(6512007)(508600001)(558084003)(316002)(38100700002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?J8dufGPkD+TL/K+ITzSrOAiNYIyupR/z+GpbReTLGZmzVV4TqfBLVU0Tb7fx?=
 =?us-ascii?Q?C9mdp7yDX60juMht5LGvNieXwqolejPxJg0Hrd/nBf2ed01539fHmKSlHRfJ?=
 =?us-ascii?Q?juoWL8W46yxF+tHP/ttiTKDwAD5n4CNuZpFq02Un0SqkVXEsspThvVJkDH/F?=
 =?us-ascii?Q?FhqSqSyBlUWrHiK5zEVejBbLfG6t/f0pJKlAHnPO4YHqNM+70H33orC+/+8W?=
 =?us-ascii?Q?giaGZIXC/gdRvaTDv3uj/um2jwlxcWFeaZn3eyQZ5GjUGQtOS248FjJi4sTU?=
 =?us-ascii?Q?sR8Pkq9L+HFT0VWGvVFDCEDEhQHjpCBi1JbTidCvOw3RJDtjPpZb8EOFaWhY?=
 =?us-ascii?Q?wRgYpe4XyqBUY5nOoQufjI0y4dQIBWuT84n7n8cUdrNvckxiL2zJlcOptL0j?=
 =?us-ascii?Q?MEVhOYXxxoJdMRVP9SuLtmtcBOGUtQPIB7umisOO7ZBw5qE11jQqdkyyj0AV?=
 =?us-ascii?Q?y1vT/7bNyA7xpXgEEh/1M7Bngbib4KmN05OpFbMCEMdbgTxcd0mxEmo3MgON?=
 =?us-ascii?Q?k2eG7wRrcfrkytgSCMJ6Y8xi1iCLicLc71kTlTzUYo3T7hOZ0ijxWCYthQAk?=
 =?us-ascii?Q?5AexzhSMHf1+/e+aDZWCAIE2noIBf+ombs4m5lLGDImvl6FxVZZ4fAxQyxXb?=
 =?us-ascii?Q?ILfq53AYM1vxZdWdWD5NAJ2z1RDBczBzKVBlvAREpdb0t4kWAzeH2MtNXXTD?=
 =?us-ascii?Q?kCH3bOlxcLiDBEFhMynkND9tFnsTky52i+YlrFaPrbkHI1I9aFf95zwhsOR4?=
 =?us-ascii?Q?Ggs/4HrdUHlmO1UaI5YmWxLxrtae142PooSDWzxPJ0xVZPIA7BZenprKiFbx?=
 =?us-ascii?Q?X2lRdSdgd6itPSM+9UqR+ji8f4Ig1thM854XD17QekA4bKFnKTgS18cPEIBD?=
 =?us-ascii?Q?X+s3Or/gMCN38aW/oeBgvaQZaNoQJlEsMo5o4XJtn3mKDs4ztP4cbFd7Rg4s?=
 =?us-ascii?Q?FHjKDyI99GNiGDkiVBwaVOONcEcSOPtLcp3cs9t6dohwIRq7JaF4j4j1EbMJ?=
 =?us-ascii?Q?XUXmyAeDPWWYtnTmbK6tjfsLUi7tilsDLelPE9NRJhO4bg4/PZByfWFioM4I?=
 =?us-ascii?Q?JK1dwJYAouWLBEkrk2mMpvM33VI1gbsNzTTdRhL2fNFlpQyjE3s4lrLHeS5c?=
 =?us-ascii?Q?533z55y5NWwdKxu3hF0blw2T3auNmTJgDzGZUJkIKbXjCP98Osf/iSPSh4pI?=
 =?us-ascii?Q?hHdwvjv/uPrHFILAEQyZlJNJRb03qg4w7aH5VGijqqeCRYxVzNPXHd9X1du3?=
 =?us-ascii?Q?iDooc7Y4WB96yPijqVXII+Z6E6DfXH7DtjkaROMwCcjwmnsedTi6CLEGbaid?=
 =?us-ascii?Q?HiBk/vlr9E4jIt7s5EZ2qzm9QZJdFyyBGo85IhuGoi2dglXxBp1FJ3P60+CJ?=
 =?us-ascii?Q?o575MDVxFH7oohiX8aqUwZfavYEiTQ6cZ6AVAxlXB94+Q5x5Z/Z39qMepKs0?=
 =?us-ascii?Q?dlBLyYMoTsId4RW77TqAgVYSmnrpRCZ4gbhDeO786AiOwC5CfTjq9c0hCzsZ?=
 =?us-ascii?Q?vkQqJ9Ol25U2Lsv7h032vMyrELPYJ+MgoYaCuGw1eC/9/DSmCcNbPcgebPdz?=
 =?us-ascii?Q?5URTWXHQ+zzYoUDHE/OYdBWxauzoJygExjwi0h/d1t7q//rHhvcA+3c34jKY?=
 =?us-ascii?Q?gQdF+ha+hqw1FhYJ3eMy3fE=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f70c60f5-d9fe-4fb6-14ea-08da0057bbd3
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 16:30:04.1548
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: S0FsEsvA8BGjD4m8W2BIm607PG6jHAwh/bkxoWOjz3YB6g7mPrsHcRq9d76b67wE390Gl9HLn3YIrr8Pa/RssA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS1PR04MB9240

On 07.03.2022 17:23, Roger Pau Monn=C3=A9 wrote:
> I assume bumping binutils minimum version to 2.22 is not a viable
> option?

It's an option, but is also part of the bigger area of determining
what the baseline tool chain requirements should be established from.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 16:36:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 16:36:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286311.485790 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRGLl-0008Pg-6W; Mon, 07 Mar 2022 16:36:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286311.485790; Mon, 07 Mar 2022 16:36:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRGLl-0008PZ-1j; Mon, 07 Mar 2022 16:36:45 +0000
Received: by outflank-mailman (input) for mailman id 286311;
 Mon, 07 Mar 2022 16:36:43 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+gfv=TS=citrix.com=prvs=0582ef7ee=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRGLj-0008PS-L8
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 16:36:43 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id c41cbb11-9e34-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 17:36:42 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c41cbb11-9e34-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646671002;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=xb0kFfnto/nHPlv85TFWuPM5uNwXbNRtvGh0hQ7z3UA=;
  b=cbBsR8rkldmFnAHe2fa+4JQWQZ98vy/h555kStG5LEaTAs013i1zH0Z5
   hdKFKfBvK57JyzkvyojoSBhz9rrHatHeAiVTHoQ8l6CKYZtsMJo52jnzh
   zuLyWJfF4qVAxz6HZ53ucnrlnWq0XsEcMldxTLhjs9miSYT7XW6gcBCkj
   8=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65562399
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:zS1uZ630kwvdVIe0xPbD5Txxkn2cJEfYwER7XKvMYLTBsI5bpzIAz
 zZNUW2FbPneMGukL9twOdnipkIAsZfSyoM1TAA6pC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUw3oDja++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /1rma2xcVsoOpHu29g+eARlAyxMBoBJreqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHxO4wSoDd4xCzxBvc6W5HTBa7N4Le02R9u250QR62PN
 qL1bxJlUkWZXTl0IG4MJ5YZm9qMlGTnUSZX/Qf9Sa0fvDGIkV0ZPKLWGNDYYMCQTMNZ2EORv
 Hvb/n/RCwsfcteYzFKtzHWogePemDLhb6gbHra46/1CjUWawyoYDxh+fUu2p7y1h1CzX/pbK
 lcI4Ww+oK4q7kupQ9LhGRqirxasoRo0S9dWVeog52mlyKDZ/gKYDWgsVSNaZZots8pebT430
 l6Emfv5CDopt6eaIVqG7audpz62PSkTLEcBaDUCQA9D5MPsyLzflTqWEIwlSvTsyISoR3egm
 FhmsRTSmZ01of8K7/m6+WzlwA6PjYX0XgMH3SjYCzfNAhxCWKapYImh6F7+5PlGLZqEQlTpg
 EXoi/Ry/8hVU8jTyXXlrPElWejwuq3baGG0bUtHQsF5nwlB7UJPamy5DNtWAE5yevgJdjbyC
 KM4kVMAvcQDVJdGgEIeXm5QNyjI5fW6fTgGfqqNBjarXnSWXFXblByCnWbKgwjQfLEEyMnTw
 6uzf8e2Fmo9Aq961jewTOp1+eZ1mn5jlD2LGsurn0jPPV+iiJm9E+ttDbdzRrphsPPsTPv9q
 b6zyPdmOz0ACbajM0E7AKYYLEwQLGhTOHwFg5c/SwJ3GSI/QDtJI6aImdsJItU594wMz7eg1
 iztCydwlQuk7VWaeFriV5yWQO62NXqJhSlgZnJE0JfB8yVLXLtDG49EL8pnJeR8rbc7pRO2J
 tFcE/i97j10Ym2v0xwWbIXnrZwkcxKuhAmUODGibiR5dJllLzElMPe7Fucz3EHi1haKiPY=
IronPort-HdrOrdr: A9a23:bYOFnKkg/+RmSc6UO2Ae4Pj2ULnpDfPOimdD5ihNYBxZY6Wkfp
 +V88jzhCWZtN9OYhwdcLC7WZVpQRvnhPlICK0qTM2ftW7dyRaVxeBZnPDfKljbdREWmdQtt5
 uIH5IObeEYSGIK8foSgzPIYurIouP3iZxA7N22pxwGLXAIV0gj1XYANu/yKDwJeOAsP+teKH
 Pz3Lsim9L2Ek5nEfhTS0N1F9TrlpnurtbLcBQGDxko5E2nii6p0qfzF1y90g0FWz1C7L8++S
 yd+jaJrJmLgrWe8FvxxmXT55NZlJ/IzcZCPtWFjowwJi/3ggilSYx9U/mpvSwzosuo9FE2+e
 O86CsIDoBW0Tf8b2u1qRzi103J1ysv0WbrzRuijX7qsaXCNUUHIvsEobgcXgrS6kImst05+r
 lMxXilu51eCg6FtDjh5vDTPisa2XackD4Hq6o+nnZfWYwRZPt6tooE5n5YF58GAWbT9J0nKu
 9zF8vRjcwmPW9yV0qp/1WH/ebcHkjaRny9Mws/U42uonVrdUlCvgUlLJd1pAZDyHo/I6M0k9
 gsfJ4Y0Y2mdfVmHp6VNN1xMfdfNVa9My4kEFjiV2gPR5t3ck4klfbMkcAIDaeRCdg18Kc=
X-IronPort-AV: E=Sophos;i="5.90,162,1643691600"; 
   d="scan'208";a="65562399"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Yt1qmLdI7qwwGvoesuOHaDtVVWJ+hAdaSlcVPwUolGbuuEtGFeuopZ6IEXQJC1OWhYZ5dqw6XneMkm8ncfTE+S+VQLxPBERVU4ZfvPH+hbmdqHXID6oGByxnKh29bLQTray2hDvvBprPeYPU798biqpmSlStLZqW6V+kzcP2dxpFy3myrGitzEn8WTYngSekRDpt3ZQFHmOk4UErzHJGXJS0yc7JDuGJzBH+354ZynBVsWlYF0yOtWW3ZQ5fE6UMQXd/jdAk9F7gw1jGvGJXlr1/KPszSq7k3M8II38TWtUHF5fTRNlqx04etXfOOENtJIcHHdG4CgEZ5naZSH+OCQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Z3xROm6DFkdCKIDAqiL7E57MvhGKHu1iWupBBogtGJY=;
 b=gxA08lQCSCcm1UB2DHIPHJZG4mCKqLx8qvaXZzID9AF51LNio+OZJZF7TR2dp50rdMsnq87Z7OfHtA9hkpdcWsJcaep/6tzfBFA+C3BmhhkL8nP2iMdrPOWUs8t8qKyNp7JjSOWTUt3ij6SbtN50xlV93Ybkz3ftSUvnUyOIL1+cqODNFntal68aP3DTu6L74DoTumQedtKUHIG6I5lI7QeZ495f76YkUbPHk/jQT+U5ciGRxAVAx7gnvFBjg1AxJ9oDTZFHOwACl7Mvf3Fe56DYPWmxTPoMnNn5wMjZ7GkrzQbvm9Tbe2MlC/Xxkbny4Dv7r9zwyU+Tec+LPjScoA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Z3xROm6DFkdCKIDAqiL7E57MvhGKHu1iWupBBogtGJY=;
 b=Ehz2dkrTAu5EqSuZguCohO1DhZSm0Pngn203euOP7WJqPY3EcKvZdYSnj06EVjBRR6jAtnSAZqDv4IklO+uPp4eTTsVVily8ZK27SpGV8QCE87NofXuH/c6jczOyfXJRBJmzqdssEFgttl9B+n43CiPSjKnApg8e65x0k1AW5SI=
Date: Mon, 7 Mar 2022 17:36:28 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v2] livepatch: set -f{function,data}-sections compiler
 option
Message-ID: <YiY0jMinvZf8sBaK@Air-de-Roger>
References: <20220307155558.72876-1-roger.pau@citrix.com>
 <984284e3-c423-16ec-5ad7-c4211ebddb70@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <984284e3-c423-16ec-5ad7-c4211ebddb70@suse.com>
X-ClientProxiedBy: LO4P123CA0182.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:1a4::7) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5e1aa21d-9c82-45fc-84b9-08da0058a448
X-MS-TrafficTypeDiagnostic: MWHPR03MB2589:EE_
X-Microsoft-Antispam-PRVS: <MWHPR03MB25892E6ACC11CA54065901798F089@MWHPR03MB2589.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(66556008)(33716001)(186003)(66476007)(85182001)(4326008)(8676002)(26005)(66946007)(8936002)(316002)(508600001)(6486002)(54906003)(6916009)(5660300002)(53546011)(6506007)(86362001)(9686003)(6512007)(6666004)(82960400001)(2906002)(83380400001)(38100700002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?MWdyVm5VbnU3SXJLbFdiUVFsY0ZzeXl6ZVpMMDdTRVZQTFluOUE2cWExeG5m?=
 =?utf-8?B?RW1sZTQ5clBseThMVlNhOHQwTkhnV3YxMDhpUkk3ZCtYNFRnNmlqZjhBaDZF?=
 =?utf-8?B?NWg5Y0NtOFJxVkpwQ3Q2eVZoUFZtcHAzYmJkMFFNUUozYnVkdExjamlOY0pp?=
 =?utf-8?B?Z1NPMWJqQTE2V3FTbXVEbnRjYUppdVlSZDBFMWN0TW0yQ1JENXVWcEtzWWxK?=
 =?utf-8?B?MnVzNXUvZkFycWxVVkl4TmpjTnVkNDRua3VmU1NuRmZUVXBWVVVtdEhEdVVi?=
 =?utf-8?B?R3JyT0ZNbk9hYzlBaDNidFF2V0RWaDlYd1JPZTlxcHlsa3h4Y0s4QkVzbHBm?=
 =?utf-8?B?N3VyUTJCTjhBU21KZCtHTnFzbVBROCtIdHlmY1ptaURzYXBwdlovYWVIUHJU?=
 =?utf-8?B?NXgrOWU1ZDc0MG0yRUxsd2N5NVVBeE43SzR6Nnp6RzU1b2taSG1CekVDSUNN?=
 =?utf-8?B?dVV1RzFxVkN1NU8wUGZZYXZ1c3NEUzk3ZXJGTElhOU1SUFZacGNuWjZLa0Iz?=
 =?utf-8?B?Z2hWa2ZKTGp6QytVc0ZaVkhnWURqcHZheFRPeXd3cm80d3ZqREpvcE1yb3Fm?=
 =?utf-8?B?dFJnNnZVRndabWk1ZUlYSXk1SlI0MnZ2cWxFdnRMaFA2ZFpZaFVYYlEwMDJJ?=
 =?utf-8?B?eUI5bHFwM1JxTG1JQjBHZmFIU1dOS2xGdGQvYTJnVm1EOXFheUpNTUVaTldj?=
 =?utf-8?B?dlBUcGFWOWRjdEcvVlpPSDVWdnpkbjJ5MzZ5b2pzY3JGbnZnV3J6WVFZVkZh?=
 =?utf-8?B?K1NWQjNtMXFnako4NWEwOXAzTXFib3hPVmVLQUhUb2pQdndMRUY2K3J0R1R2?=
 =?utf-8?B?bjRwR2RjaFRGN3ZkL1ZvYjJnNk9OV05KVzZzcHJpUFp3dWsxWk5kSTFRWk5Q?=
 =?utf-8?B?WDFaMjF2RGNqTVJLQ1FHRkYxdXV2RkhpcUh5NTVldUl5cHZZYnlhbThxa3hS?=
 =?utf-8?B?S0wyODJ2a0s4SWtUWXBiUzlBM0U0YzVKUnZjTkVHc3lXNGRkUnQzcm4xQno1?=
 =?utf-8?B?Vys5OE0xeGR3U2tnVldvcFBGS1pRcEM5c2tuOThRTFpuU0E5eGFXdjRFRHY4?=
 =?utf-8?B?eXNxUUphNzFVODAvOEFOOVBlSVRTUHl2WEFSWEV1bFVLaVZLcXcva1VYbWdr?=
 =?utf-8?B?ZHZ5bHNJRDdyNzhQSFhQMnRhQ1FKQkYyamVvOVdBY1MwRTZRT2FPa2FxT3I2?=
 =?utf-8?B?dXd1OGFQcUZtMHplNVZNeTZ3R081SEhUcG9zd3BDY0FQMmhmZTdjNENiMnFL?=
 =?utf-8?B?VkRwejFoWWRidGNacjNrNmlXWVQvWlcvQVA3TS84Qm9wbE1jREJ0b3pDcGl2?=
 =?utf-8?B?MzFXK1hYaDd5Q2RvaUdKSTFaTGpheFRRUXFiWFhXMlVETys4ODZlRlQ3eHd2?=
 =?utf-8?B?cGNxaFo3bFNoWS9BbjVSaTZLczRINm5nQU5HajFTb2VNZmtTMUNJSHJxR3dv?=
 =?utf-8?B?UDU2Q0E0aGUyUUdnUG1BS1FMZnhSQzVUSm8wTDFhQ1ZFMTJ0T2pNRVhmSWNp?=
 =?utf-8?B?S1gwbCtkT3F1azJHb2F2RVRFQ1ZuT2pnMkM2NEwrSlA4SCswWVA2UGdvWWRC?=
 =?utf-8?B?SmpobEdxa3NuMkJkQU12Mml0dFlCUU1TTVRteVNZYnlkS3ZYUFZuTEZEYzJa?=
 =?utf-8?B?Wk9tVk9nT3g5dGI5dzd1QXk0Z3hBemVSQXo5L0ttN0FCdEZBaDByVThCVmUz?=
 =?utf-8?B?OUIrZktjdFpjRnVZejJJd1NSZmJCSHgxcWtVMnplMVIyd2RYN3VqYW4yMnM1?=
 =?utf-8?B?blRrOUpPbkh4dVNxL2RmZTRKSnBxZ21wYitCVlhhL2pkYzZCOVVWa0tvdnpH?=
 =?utf-8?B?QXEvOUxnREpnZFNVQmlrb1lKSEo3TWlINHQvTCtXUDZYT2pYdXBoRm5tQnNQ?=
 =?utf-8?B?UmljODBGU0pPM3o3RXFHa0ZnZ3FvR0gvazRSMzZKcjJSTGNrcEpuRWpqczUy?=
 =?utf-8?B?Q3Z1Ri9OWS9pQlNIZVpQcy9aRXk3OUlWRXl0TUllcHJrVWI1Z0xadzluSWRF?=
 =?utf-8?B?aUd0WHlqdXZiTXptRjB6THd3ZTBzYTR3YWFBeHR1SjlWOEZ1dzVxTXhhY3J3?=
 =?utf-8?B?RzJYNHYxVW9HMHFQZmtQRmJlUnEzeURJTWZSTUFENzQ1Tmx1NTJnZVZCbkhw?=
 =?utf-8?B?Q0g3VjdYcXVVZnM1V3JNS0tuK1FhZ1VmUWllN1ZXMldNNHNvOUJ4aFgzNzBa?=
 =?utf-8?Q?ReprZSK4/+k4ZwC6HBy9rEE=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 5e1aa21d-9c82-45fc-84b9-08da0058a448
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 16:36:34.1402
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: CB3CayHQi/QH6Mc9pkm8HdsmRsqomGZ7l2WfABCdqZVXfgMwrnEk5abHCTTfdJ+oSrD4tfyTFWy0somMqmVgXg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR03MB2589
X-OriginatorOrg: citrix.com

On Mon, Mar 07, 2022 at 05:28:20PM +0100, Jan Beulich wrote:
> On 07.03.2022 16:55, Roger Pau Monne wrote:
> > If livepatching support is enabled build the hypervisor with
> > -f{function,data}-sections compiler options, which is required by the
> > livepatching tools to detect changes and create livepatches.
> > 
> > This shouldn't result in any functional change on the hypervisor
> > binary image, but does however require some changes in the linker
> > script in order to handle that each function and data item will now be
> > placed into its own section in object files. As a result add catch-all
> > for .text, .data and .bss in order to merge each individual item
> > section into the final image.
> > 
> > The main difference will be that .text.startup will end up being part
> > of .text rather than .init, and thus won't be freed. .text.exit will
> > also be part of .text rather than dropped. Overall this could make the
> > image bigger, and package some .text code in a sub-optimal way.
> > 
> > Note that placement of the sections inside of .text is also slightly
> > adjusted to be more similar to the position found in the default GNU
> > ld linker script. This requires having a separate section for the
> > header in order to place it at the begging of the output image,
> > followed with the unlikely and related sections, and finally the main
> > .text section.
> > 
> > On Arm the .data.read_mostly needs to be moved ahead of the .data
> > section like it's already done on x86, and the alignment needs to be
> > set to PAGE_SIZE so it doesn't end up being placed at the tail of a
> > read-only page from the previous section. While there move the
> > alignment of the .data section ahead of the section declaration, like
> > it's done for other sections.
> > 
> > The benefit of having CONFIG_LIVEPATCH enable those compiler option
> > is that the livepatch build tools no longer need to fiddle with the
> > build system in order to enable them. Note the current livepatch tools
> > are broken after the recent build changes due to the way they
> > attempt to set  -f{function,data}-sections.
> > 
> > Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
> 
> The x86 part of this looks fine to me, just one other remark:
> 
> > --- a/xen/common/Kconfig
> > +++ b/xen/common/Kconfig
> > @@ -350,10 +350,14 @@ source "common/sched/Kconfig"
> >  config CRYPTO
> >  	bool
> >  
> > +config CC_SPLIT_SECTIONS
> > +	bool
> 
> I think this wants to live higher up in the file, perhaps between
> ALTERNATIVE_CALL and HAS_ALTERNATIVE. (CRYPTO, as seen in context
> here, imo also would better live higher up.) Or alternatively it may
> want to move to xen/Kconfig, next to CC_HAS_VISIBILITY_ATTRIBUTE.

I was tempted to place it in xen/Kconfig. The logic for the current
suggested placement is to be closer to it's current only user
(LIVEPATCH), but I'm not opposed to moving it somewhere else if
there's consensus.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 16:38:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 16:38:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286316.485800 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRGN0-0000Yy-FQ; Mon, 07 Mar 2022 16:38:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286316.485800; Mon, 07 Mar 2022 16:38:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRGN0-0000Yr-CN; Mon, 07 Mar 2022 16:38:02 +0000
Received: by outflank-mailman (input) for mailman id 286316;
 Mon, 07 Mar 2022 16:38:00 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+gfv=TS=citrix.com=prvs=0582ef7ee=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRGMy-0000Yf-BL
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 16:38:00 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f1537e11-9e34-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 17:37:58 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f1537e11-9e34-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646671078;
  h=from:to:cc:subject:date:message-id:
   content-transfer-encoding:mime-version;
  bh=Ablg7d6y+ZeMIfab2ud+fkaw258NmbzhOzrFF28HJZ8=;
  b=N29XEt7VdTL6YJoqSXnO7/Ik+2u2sJR4b4C1SZwkcbzjVCKijlXablee
   /ef1/nU33WM62T/ClQripjS9lRRs3raHAhcJb1GHf1Eag+Ybq6LrEOUDs
   8VvsfqxCBsaAHpdtzLVK7BWthTowZb3s642+aqL7HBUNiy0/tUSDV5+Af
   U=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65637023
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:Mw7Z4qiqhmOUYhjDtIKOxv9RX161fxAKZh0ujC45NGQN5FlHY01je
 htvWG7UbPuOZGb0ctsnbou/8EsDsZHQmt8xSlNvrSBjRSgb9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFvS4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YQkDBb+dgfUYakcGLTolNrRi2Y3rD2fq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bkmtnwjzDS+4vXLjIQrnQ5M8e1zA17ixLNaiDO
 ZFGMWA0BPjGSwB1IQhUT6wCoMaDi2nWTgx4s2qPg6VitgA/yyQuieOwYbI5YOeiWcVUhQCZv
 STPp2DiBRcyO9mWyD7D+XWp7sfNly7mXIMZFJWj6+VnxlaUwwQ7GBAQEFe2v/S9okq/QM5Eb
 VwZ/DI0qqo//1DtScPyNyBUu1bd4ERaAYAJVbRntkfdkcI4/jp1GEAKZAVTOcU3sfZoGwIxj
 VSQu/LbKRJw5ej9pW2myp+Yqja7OC4wJGAEZDMZQQZt3+QPsL3fnTqUEI89TffdYsndXGipn
 mvU9HRWa6A70JZTv5hX62wrlN5FSnLhagcurjvaUWu+hu+STN70Ptf4gbQ3ABspEWp4crVjl
 CVe8yR9xLpXZX1oqMBqaL9RdIxFH97fbFXhbadHRvHNDQiF9X+5Zpx36zpjPkpvOctsUWa3P
 BGO6F0Ju8QDbCfCgUpLj2WZUZhC8EQdPY69CqC8giRmOPCdizNrDAkxPBXNjggBYWAnkL0lO
 IfzTCpfJS1yNEiT9xLvH711+eZynkgWnDqPLbiilkTP+efONRa9FOZeWHPTP79R0U9xiFiMm
 zqpH5DRkEs3vSyXSnS/zLP/2nhRdSlrXc2t8pcPHgNBSyI/cFwc5zbq6epJU6RunrhPl/eO+
 Xe4W0RCz0H4i2GBIgKPAk2Popu2NXqjhRrX5RARAGs=
IronPort-HdrOrdr: A9a23:hxPhXqv7iqT2oeptwZVIOAil7skCgIMji2hC6mlwRA09TyXGra
 +TdaUguSMc1gx9ZJhBo7G90KnpewK5yXcT2/hqAV7CZnichILMFu9fBOTZslvd8kHFh4xgPM
 RbAtdD4b/LfCFHZK/BiWHSebZQo+VvmJrY+ds2pE0dKj2CBZsQijuQXW2gYzBLrUR9dOwEPa
 vZwvACiyureHwRYMj+Ln4ZX9Lbr9mOsJ79exYJCzMu9QHL1FqTmfbHOind+i1bfyJEwL8k/2
 SAuwvl5p+7u/X+7hPHzWfc47lfhdOk4NpeA86njNQTN1zX+0+VTbUkf4fHkCE+oemp5lpvuN
 7Qoy04N8A20H/VdnHdm2qZ5yDQlBIVr1Pyw16RhnXu5ebjQighNsZHjYVFNjPE9ksJprhHoe
 929lPck6ASIQLLnSz76dSNfQptjFCIrX0rlvNWp2BDULEZdKRaoeUkjQlo+a87bW3HAb0cYa
 dT5Jm23ocWTbraVQGTgoBX+q3hYpxpdS32AnTruaSuokprdT5CvgglLfck7wY9HaIGOud5Dt
 v/Q9RVfcl1P7crhIJGdZM8qJiMexvwqSylChPgHb2gLtBEB07w
X-IronPort-AV: E=Sophos;i="5.90,162,1643691600"; 
   d="scan'208";a="65637023"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=d1BGgqEe2aXiHe8GN/qRS4Fx0spIQdgZxun5gqoCNip9FG3j9BkWzOXm/SiBASGnRV9k1QJXCrMAx4S2RpL7kp5bfZwzdnIzn41nfpKD4YzkFCWymZTxHM6l7AAOdmJ25MUFd3wrliYS7gguo9kJNG48Zga9FScvvOz49kMHHwSWNWgExW0cJIAcdkOXJNfY+2pUNU2hFUzr8n9DzP+bXUNPiYTcHmrgjjZdvz951uooMbYtlleJBiRgr+S0c9s9Lz50MBKEO73YbMG2xnyNYdImf1Q0ydiKm5kMQdvOPH+B7rZtf5Q+2u1TLx2Bymnv126bT01xskSBt5Wp36QeEg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=awF+pMLl+Var2LckzL1CExaM5qE8ESGC675Kwer2Mw0=;
 b=auyZPEryupSYxB02t7ROjXcezMsLN8jnYmiDROQwSr17hMx+n5Y/QW0XoJzjLVomohGK3HdUOnGoLfMwpshc054MiGvVLxDwOwMNire/Txy0CxftteqNSLahx6fxhXcyvRG2Sq8XsjEgoXX9FoYoKKRI99/zhHn/cLOCykhyhfcj3rCx39fhdC7JrLkWf2ZWpQibXCaGfxgZOdL7y6eP1tAbefzsCy4lLe2tMVuujBOZvJy5MxE53WTbsL5WOCdNJZEYRi6i3o8yu9GQsHmmp2ze7nnFi/9WaailKl2Igzg1S87xdxqvybq4Mk51N39RVgK6GtKSowyO96p59Y8gng==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=awF+pMLl+Var2LckzL1CExaM5qE8ESGC675Kwer2Mw0=;
 b=mDQ1lN22wDi7kZtzVkEEu0okhfzUaDq9C86UkU5v/n9Wrdz3twM7hRNpIqM5Gq7gH37MWvqCvamwdoUPt4S+LUGOMisITHUZE1xV9FK9NNPqmWEFCLeEJNBL4uGW2O6QHKx2EN+af/q4ModsWZaquRaFMRHqSrrV1QoUtSBFSJw=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Jan Beulich <jbeulich@suse.com>,
	Alex Olson <this.is.a0lson@gmail.com>
Subject: [PATCH v4] vpci/msix: fix PBA accesses
Date: Mon,  7 Mar 2022 17:37:44 +0100
Message-ID: <20220307163744.74030-1-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO2P123CA0106.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:139::21) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: aca318fd-56ec-4be8-e932-08da0058d1c9
X-MS-TrafficTypeDiagnostic: BYAPR03MB3573:EE_
X-Microsoft-Antispam-PRVS: <BYAPR03MB3573CA05CEA5DE3C46C27ABE8F089@BYAPR03MB3573.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(82960400001)(316002)(54906003)(6916009)(66946007)(66556008)(66476007)(4326008)(86362001)(5660300002)(8676002)(8936002)(38100700002)(6512007)(6506007)(186003)(2616005)(6486002)(1076003)(83380400001)(26005)(6666004)(508600001)(36756003)(2906002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?L2M0RkpCWWNTNFJJNWVEcEUrbXRiN0xsNEUyMUlxV1E3ak81TGEzZWhvbHhN?=
 =?utf-8?B?bFJsVHFqNVJVMmZ3YVN1RENqVWxOMHBqakZaNUI3cVZhZ3NWQzdwWGx3ZFZk?=
 =?utf-8?B?Y3J5eE42QWFXK1JPWVdjSWEzbTduWDRjZEUwSmN0RHNEbUdWbW5jQ1Z0SUlC?=
 =?utf-8?B?YUU2eCtyV2FyTWhmYVBvQW9yaGoyMVd0ckpwWlpCSFVuZi84WnVWSGJlZ09p?=
 =?utf-8?B?U244Z0lsUlNiVHVMV21wSEo2OVVXM3gxSy96SU5YOHRpOVVKTHR2NTNwVk9U?=
 =?utf-8?B?b3lVNlRobGZPTTJwc01wOFk5MEtZVytsVVI1V2VIek9scFRqamJGRHBpZFpp?=
 =?utf-8?B?cForUTVtYlhvYzV0UitCMTUxcnVSUDNGa2ZTd1ltYW8wckNmbHZ1MnRvQUMw?=
 =?utf-8?B?cGY2RTY1RjRyS3lHZjFmU3JBUUdkV3ZveHRFdFU4YmIxU0Uzb2RSYzVCNW1C?=
 =?utf-8?B?RnE1NmdhaFVrekR6cmYxbGdiZzdRV0lnWkJyNVdrWnFuRU8yZzZ3ZUYrY3Mv?=
 =?utf-8?B?eUM2NkgvWGhXOTZYMmFzaHZuaitBRnc1SVJVVERsSWJEcm04TktrR0hoVUlZ?=
 =?utf-8?B?aWtXcTRZNGl5eWpPcVNtOGYzSitWRlFCL0FIVTcxMXY2OGtnV2V0ODB6bFhC?=
 =?utf-8?B?T0FWbndMN2Z2NUtycnhDQ0tXWWcxdC9KMXdUWWFFSjVpNkNrM1Q1UXJHMFh4?=
 =?utf-8?B?Y1hFT0JBUG4rYUhRRzFLVzVwaHZJYWtrRXplVjlkaHZMNE9QellZWktwTUdy?=
 =?utf-8?B?aFdwU2g5M2E1K2ltVWFSd1dMUXJJYlNiczJTOHF0Tjh6U3JIMW4wTDhReEhn?=
 =?utf-8?B?U0ZYNVpvdmN4RDJ4c1BGbUhyM0NGSVJaL0h1V001VDNXWXFpMDI5aWdDdVBB?=
 =?utf-8?B?RHUzRHQ2eUpWSVB5ZEhzdE43NjRycXJ0T0dCaWhxeWhDdWdjcXNINllObWNG?=
 =?utf-8?B?aWFwTWgzZ01xejVlK1VmNXhmajRra3ovS0pPWTZoR1ViWkcrSWtWQU5GK0N6?=
 =?utf-8?B?R084TzRDSnhwbXhmcnN6bFlsWmt1RS9FdUgxSE5aZEptZTMvVzRZcXNFYUVQ?=
 =?utf-8?B?SGhLalgyS2Q2eHUycS9OMEZBS2o2REtrTTE4a3ZrSlBFaG9ZMmZ2UWY2TG1a?=
 =?utf-8?B?SE1kVWtjRjlaUWJBY0ZZVUF0R1hDdUJHNE1lUFJqcWxLci81SGdnNFdXTVBO?=
 =?utf-8?B?eWVlM0RBT1BTcXVnUHpFaXgvV0JWeHYvb2h1N21xbDJ3Q1J6RWF2cFNIUGRu?=
 =?utf-8?B?UnI3MGtsSWlPTlNHRFdtSFhCNEJXTkVlY20rZXc0KzRkeFlkYXNpcms1TTJ3?=
 =?utf-8?B?dExPMDg5UUxJbUlQUHZmcDBRVXQrWVdoVU9KNElveEZhajM1ck9qZGRDM1hH?=
 =?utf-8?B?dnZldk5EbmQ5ZWprK1FZeWQzQlhlY2wrRGlTKzdyN1ZUWXN5YWZmMGE2UXp0?=
 =?utf-8?B?YjZZWWdSM08zMmZBRVhUd09xbUNKOUxjdXhqSDY4ZmhRL1hFTjBPVFhqOGov?=
 =?utf-8?B?azc2RWRpaUh2QnBzN21SNkcwUU41amE0WTJ2eTBXSFhRbWdBUUszQTlXNWQ1?=
 =?utf-8?B?RDJpNGhkOG1ueFRFOGk3d01OWDlLaHlsOC9HN0hFU2VZTHovYmZ6eWZwQnhq?=
 =?utf-8?B?UkU4Z3BPdDc3WnRPMCtocmpsUGwwd2xzbVJoUDBpVW5YdzIrNVgyZEF5ZC9F?=
 =?utf-8?B?NkIrWVFxUlBwZDVhS01Dc3F5UWtJNDZzVFZEak1OVGIvUEc0WFBzNjdFeXJW?=
 =?utf-8?B?aTAxVGtTM0hrOUdiTmNBdnNsUVlnYnJjOGx4TFY4R1VBSlc1RlU0YTQ5bVdj?=
 =?utf-8?B?aTcxMW9ZanBCeTdadnNFRFpqQzVNRit1dXkweWNHaEUxTjAwOEc0S2hQQlNm?=
 =?utf-8?B?bWVjMUlhLzdQZnJRZ3VjMXpuTC9UclU1ckdZUWtGeUt3LzB2MXNtWDhVQWQ4?=
 =?utf-8?B?TkI2THZzNm1qcHZTSm5OdUlmUTVvMWxiVVpqeUtaeUQvTVd2TzVKb25XUXF2?=
 =?utf-8?B?MEhHbm00VWZFcG1Lb0tmSlpiZ3JMVWo5MjhRWk03eS9RMmZEM01iV3pRYjcr?=
 =?utf-8?B?ekZ1L0x1SWNMR2lEMm9SaFBGZGVBRjhuRE4xT29mZUJEajZta3ZFQnVjZ0Fz?=
 =?utf-8?B?ZTF5SFZyL2lwTDczc0hrMkp1ZzRXUHdTNDdMQ1FHM3JrU1lMdWF3Q1dpSy9D?=
 =?utf-8?Q?imUVzMxhzSNC/fx6VDVN2kc=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: aca318fd-56ec-4be8-e932-08da0058d1c9
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 16:37:50.6107
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: aPKhbbjFNFI+1INUMxa/mJWm5hRN1gDTdoDFagZvSYDqPgwyeSZFKwoW7cULcKbi4SmofgRiPRmCRJQdvCyJ2g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB3573
X-OriginatorOrg: citrix.com

Map the PBA in order to access it from the MSI-X read and write
handlers. Note that previously the handlers would pass the physical
host address into the {read,write}{l,q} handlers, which is wrong as
those expect a linear address.

Map the PBA using ioremap when the first access is performed. Note
that 32bit arches might want to abstract the call to ioremap into a
vPCI arch handler, so they can use a fixmap range to map the PBA.

Reported-by: Jan Beulich <jbeulich@suse.com>
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
Cc: Alex Olson <this.is.a0lson@gmail.com>
---
Changes since v3:
 - Use {read,write}_atomic for accessing msix pba field.
 - Shrink locked section.
 - Constify pba.

Changes since v2:
 - Use helper function to map PBA.
 - Mark memory as iomem.

Changes since v1:
 - Also handle writes.

I don't seem to have a box with a driver that will try to access the
PBA, so I would consider this specific code path only build tested. At
least it doesn't seem to regress the current state of vPCI.
---
 xen/drivers/vpci/msix.c | 64 ++++++++++++++++++++++++++++++++++++++---
 xen/drivers/vpci/vpci.c |  2 ++
 xen/include/xen/vpci.h  |  2 ++
 3 files changed, 64 insertions(+), 4 deletions(-)

diff --git a/xen/drivers/vpci/msix.c b/xen/drivers/vpci/msix.c
index a1fa7a5f13..63f162cf5a 100644
--- a/xen/drivers/vpci/msix.c
+++ b/xen/drivers/vpci/msix.c
@@ -182,6 +182,38 @@ static struct vpci_msix_entry *get_entry(struct vpci_msix *msix,
     return &msix->entries[(addr - start) / PCI_MSIX_ENTRY_SIZE];
 }
 
+static void __iomem *get_pba(struct vpci *vpci)
+{
+    struct vpci_msix *msix = vpci->msix;
+    /*
+     * PBA will only be unmapped when the device is deassigned, so access it
+     * without holding the vpci lock.
+     */
+    void __iomem *pba = read_atomic(&msix->pba);
+
+    if ( likely(pba) )
+        return pba;
+
+    pba = ioremap(vmsix_table_addr(vpci, VPCI_MSIX_PBA),
+                  vmsix_table_size(vpci, VPCI_MSIX_PBA));
+    if ( !pba )
+        return read_atomic(&msix->pba);
+
+    spin_lock(&vpci->lock);
+    if ( !msix->pba )
+    {
+        write_atomic(&msix->pba, pba);
+        spin_unlock(&vpci->lock);
+    }
+    else
+    {
+        spin_unlock(&vpci->lock);
+        iounmap(pba);
+    }
+
+    return read_atomic(&msix->pba);
+}
+
 static int cf_check msix_read(
     struct vcpu *v, unsigned long addr, unsigned int len, unsigned long *data)
 {
@@ -200,6 +232,10 @@ static int cf_check msix_read(
 
     if ( VMSIX_ADDR_IN_RANGE(addr, msix->pdev->vpci, VPCI_MSIX_PBA) )
     {
+        struct vpci *vpci = msix->pdev->vpci;
+        unsigned int idx = addr - vmsix_table_addr(vpci, VPCI_MSIX_PBA);
+        const void __iomem *pba = get_pba(vpci);
+
         /*
          * Access to PBA.
          *
@@ -207,14 +243,22 @@ static int cf_check msix_read(
          * guest address space. If this changes the address will need to be
          * translated.
          */
+        if ( !pba )
+        {
+            gprintk(XENLOG_WARNING,
+                    "%pp: unable to map MSI-X PBA, report all pending\n",
+                    msix->pdev);
+            return X86EMUL_OKAY;
+        }
+
         switch ( len )
         {
         case 4:
-            *data = readl(addr);
+            *data = readl(pba + idx);
             break;
 
         case 8:
-            *data = readq(addr);
+            *data = readq(pba + idx);
             break;
 
         default:
@@ -275,19 +319,31 @@ static int cf_check msix_write(
 
     if ( VMSIX_ADDR_IN_RANGE(addr, msix->pdev->vpci, VPCI_MSIX_PBA) )
     {
+        struct vpci *vpci = msix->pdev->vpci;
+        unsigned int idx = addr - vmsix_table_addr(vpci, VPCI_MSIX_PBA);
+        const void __iomem *pba = get_pba(vpci);
 
         if ( !is_hardware_domain(d) )
             /* Ignore writes to PBA for DomUs, it's behavior is undefined. */
             return X86EMUL_OKAY;
 
+        if ( !pba )
+        {
+            /* Unable to map the PBA, ignore write. */
+            gprintk(XENLOG_WARNING,
+                    "%pp: unable to map MSI-X PBA, write ignored\n",
+                    msix->pdev);
+            return X86EMUL_OKAY;
+        }
+
         switch ( len )
         {
         case 4:
-            writel(data, addr);
+            writel(data, pba + idx);
             break;
 
         case 8:
-            writeq(data, addr);
+            writeq(data, pba + idx);
             break;
 
         default:
diff --git a/xen/drivers/vpci/vpci.c b/xen/drivers/vpci/vpci.c
index f3b32d66cb..9fb3c05b2b 100644
--- a/xen/drivers/vpci/vpci.c
+++ b/xen/drivers/vpci/vpci.c
@@ -51,6 +51,8 @@ void vpci_remove_device(struct pci_dev *pdev)
         xfree(r);
     }
     spin_unlock(&pdev->vpci->lock);
+    if ( pdev->vpci->msix && pdev->vpci->msix->pba )
+        iounmap(pdev->vpci->msix->pba);
     xfree(pdev->vpci->msix);
     xfree(pdev->vpci->msi);
     xfree(pdev->vpci);
diff --git a/xen/include/xen/vpci.h b/xen/include/xen/vpci.h
index bcad1516ae..67c9a0c631 100644
--- a/xen/include/xen/vpci.h
+++ b/xen/include/xen/vpci.h
@@ -127,6 +127,8 @@ struct vpci {
         bool enabled         : 1;
         /* Masked? */
         bool masked          : 1;
+        /* PBA map */
+        void __iomem *pba;
         /* Entries. */
         struct vpci_msix_entry {
             uint64_t addr;
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 16:46:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 16:46:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286325.485811 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRGUv-0002DX-Dl; Mon, 07 Mar 2022 16:46:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286325.485811; Mon, 07 Mar 2022 16:46:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRGUv-0002DQ-AI; Mon, 07 Mar 2022 16:46:13 +0000
Received: by outflank-mailman (input) for mailman id 286325;
 Mon, 07 Mar 2022 16:46:12 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+gfv=TS=citrix.com=prvs=0582ef7ee=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRGUu-0002CU-Kq
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 16:46:12 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 1623b512-9e36-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 17:46:09 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1623b512-9e36-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646671569;
  h=from:to:cc:subject:date:message-id:
   content-transfer-encoding:mime-version;
  bh=tUhqVK/sRlvClYdwwc85nr5730j/G6l0BNTVO7hMWTA=;
  b=AWjEQl43/f98zv2oi1Tcrh6GRr7smDyvzyLwDdkKYakcySrVbeVPcH4E
   7osWi+P1hWKbJgRhPaYcdFVOtZk6ScTZi655vrQsi0nJ7QydoyxYvghyc
   aLkkTbQNjejphcXxjThdPMUUJjYJQZ/og+dD78PZWjCgWG5H7fdnI3Tfn
   k=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65107497
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:4VjIeqk/MHDubf2CV55iw5/o5gywJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xIZCDvTb/iNYzT3eNwib461oEgBupTdmoMwQAtr/y5mRCMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiW1zV4
 7senuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYZEQFDqzrtOskWjJ7FzBaP/FM/7zbCC3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3oHZvwCufFf87aZvCX7/L9ZlT2zJYasVmQ6uHP
 5VFOGUHgBLobCAMNH4ZMcwEtdixrXvdVDlAqFnMuv9ii4TU5FMoi+W8WDbPQfSRXtlclEuco
 mPA/kz6DwscOdjZziCKmlqzgsffkCW9X5gdfJW66/prjVu71mEVThoMWjOTsfS/z0KzRd9bA
 0gV4TY167g/8lSxSdvwVAH+p2SL1jYeUddNF+wx6CmW17HZpQ2eAwA5oiVpMYJ88pVsHHpzi
 wHPz4iB6SFTXKO9ZDGxxrazgTyLMAM2KX4mZ3MOSggZyoy2yG0stS7nQtFmGa+zq9T6HzDs3
 jyHxBQDa6UvYd0jjPviow2e6964jt2QF1NuuF2LNo6wxl4hPOaYi5qUBU83BBqqBKKQVRG/s
 XcNgKByB8heXMjWxERhrAjgdYxFBspp0hWB2zaD/LF7rlxBHkJPmqgKvFlDyL9BaJpsRNMQS
 Ba7VfltzJFSJmC2SqR8fpi8Dc8npYC5S4i7C6GKNoUVMsgtHONiwM2JTRTMt10BbWB2yf1vU
 XtlWZzE4Ykm5VRPk2PtGrZ1PU4DzSEi32LDLa0XPDz8uYdykEW9EO9fWHPXN7hRxPrd/G39q
 o8PX+PXm0Q3eLCvOUH/rN9MRW3m2FBmXPgaXeQMLbXdSuencUl8Y8LsLUQJINQ0z/wIzb6Tp
 hlQmCZwkTLCuJEOEi3TAlhLY7LzR5dv63U9OC0nJ1Gz3HY/J42o6c8im1EfJtHLKMQLISZIc
 sQ4
IronPort-HdrOrdr: A9a23:N3t03agE9qTFxCFEGGRe07x+4HBQXyx13DAbv31ZSRFFG/FwyP
 rAoB1L73PJYWgqNU3I+ergBEGBKUmskaKdhrNhR4tKPTOWw1dASbsN0WKM+UyHJ8STzJ8+6U
 4CSdkANDSTNykCsS+S2mDReLxBsbq6GciT9JvjJhxWPGZXgs9bnmJE4lHxKDwKeOAKP+tOKL
 Osou584xawc3Ueacq2QlEDQuj4vtXO0LbrewQPCRIL4BSHyWrA0s+zLzGomjMlFx9fy7Yr9m
 bI1yT/+6WYqvm+jjvRzXXa4Zh6kMbojvFDGMuPoM4ILSiEsHfgWK1RH5m5+BwlquCm71gn1P
 HKvhcbJsx2r0jce2mkyCGdrjXI4XIL0TvP2FWYiXzsrYjSXzQhEfdMgopfb1/w91cglMsU6t
 MH40up875sST/QliX04NbFEztwkFCvnHYkmekPy1RCTIolbqNLp4B3xjIeLH45JlO01GkbKp
 ghMCmFj8wmMG9yLkqp9VWH+ebcEkjaRXy9Mwg/Us/86UkloJk29Tpa+CUlpAZwyHsMceg72w
 36CNUZqFg3dL5vUUtcPpZ0fSLlMB27ffrzWFjiUmgPUpt3eU7wlw==
X-IronPort-AV: E=Sophos;i="5.90,162,1643691600"; 
   d="scan'208";a="65107497"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=UM5F9SAbURIfyypv+ukQ5/d3HLYF0NUEjAkMPkFSbu9V5AgdJRobl/5ESvS56kyiCOlu+cd6UctApGQ+vYB3zoD8+QM0th9m2GHaQD3Io+/BghReb80UNSpi1xGZuNvO/vsgQTdH28AYa0XYuTNF98wnhw0PR0CBcvdYRyvZf1fSVYV/sEYajXpM4qkFNXfJmmZDS77H+gQm1Ywhvk1wJaKYfqL1PmcruPxWwgq7aKanL3Ij4WISNhQ8QHKA4ykicD47CF8oIMPAf4wZuRI7WEyK2rMwDHEw/DlAaGNoCl85zfDIwdCa8l9sWmG4V/b5SqwH8mQ/82uzIGmjgjGP9A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=t08aK4lKbx3YUPdgoKlaHSJWBc36sDwBIg64iJAj1/o=;
 b=GsBwzU68MVNGYxej78E9q2MqogT5/R6xv0saq8XOuD1JXRGGGK38ZTREr13NWvdnJP/Y9CtGM0oo2GDW0Fa45etnxYYI7OdTFyGsm3lrteVkMkg0mYkjFngm93+oIF+VoY8ty/lzxZWDBf1hZL+/PkyDsReA/HQHR+8znbCIESl219FWJ/Il3l2DrLPI/zqS9t/SRNV+ls9xzVPbQZemSBw2C/gPYE9cjvINUFrRLhFKo9WVXI0nYfowRy+71ZROUqxUaVlS9Z4PNsMWj/4mkuOYdQ4gAu+23bql+NaOHNU6SD+v98j4Zf9+5eUUjmFuegRH+OWosPiNEr4gTCpGeA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=t08aK4lKbx3YUPdgoKlaHSJWBc36sDwBIg64iJAj1/o=;
 b=fR+qDQlIzsOFXkTaHRwdVbAJbkpry8tLQ0PEf+NnGa89akPRH3kzQWNPit3uBWxM2xIMDA4MEnAfKlWIpoxQnjBzAmYMFn5uzwc6Hi27yBCXahUqqUChjhcw1Jp5yFA07ZKRi7XVlsJYKTZuKNYxpmgKMe54hf8nzlKMLaAldBE=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, Jan
 Beulich <jbeulich@suse.com>, Julien Grall <julien@xen.org>, Stefano
 Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
Subject: [PATCH v2] codeql: add support for analyzing C, Python and Go
Date: Mon,  7 Mar 2022 17:45:52 +0100
Message-ID: <20220307164552.74818-1-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO2P265CA0160.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:9::28) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: d07b694a-cd1c-44e9-9c20-08da0059f521
X-MS-TrafficTypeDiagnostic: SJ0PR03MB5805:EE_
X-Microsoft-Antispam-PRVS: <SJ0PR03MB58057F55A05AFF5DE980E1668F089@SJ0PR03MB5805.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(508600001)(6486002)(2906002)(5660300002)(8936002)(2616005)(1076003)(186003)(26005)(82960400001)(38100700002)(83380400001)(6666004)(6512007)(6506007)(86362001)(66946007)(66556008)(6916009)(36756003)(8676002)(316002)(66476007)(4326008)(54906003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?Yk1aYUpQbkdjK3hkOXN6TVFkUzBZMmJ6ZS9LK3VXdUtjWklWWHN4a1BjQkhV?=
 =?utf-8?B?RTdHWHorTm83QXdsS1lhaXBoR3VRd3g1Nm93MnZ2Y21pV0JMZ2FyWkZhNEVL?=
 =?utf-8?B?L1lBaG1TWFlVWk5TekJUZ3BheDJjU0VVU2VEZHFzak1jV0hkNWtCRzhXT1Zq?=
 =?utf-8?B?ZXZKcE1iemZSZnBieERFanlYZkovcFI2L3lZSnBxajZSUzB6MUlxZ1BzK21V?=
 =?utf-8?B?M1ZPancvbTVwdGJZSEpaLy8waVJHbFV6dVBtNVViMU00TGhvNk5lN2JQOTZm?=
 =?utf-8?B?clFBMlRScmh6UTcycEZNWjdhMVd2MTlIWGZQRUVuOFZQQ2lOd0ExT0RsZHBV?=
 =?utf-8?B?QlJlTVNUTEVuRm10UVJGN201UG1VUXkwSVU4K21LcldOQU93d0N0Wkd5RmNB?=
 =?utf-8?B?WEd5WklILzN5NzRza1FiT0VlN3gxQ1dNUmlBR05ETVU2QXJ6QjdlT2NBUGRl?=
 =?utf-8?B?K0UvdU9JeExocXJod1RPancyamY5QXFTY3pSM1NRTnYvTUJoN2w3TjFyVVlz?=
 =?utf-8?B?THJhVUxyd3B2bGlsa2prNFlrZUFFRTJBYS9LWGhwRzVzTW85Q3BDWDI1czcw?=
 =?utf-8?B?SklmeEdKVk9sNWVMK2hZbktBVlprbDdzbjNQUmUyaXBvYlpKNjFvNEMrYlFw?=
 =?utf-8?B?UCs3L0xxM2tEcitGTHB6bE5yUTBqUy9kZHo4ZVRiaFRjREQ1SlFTdWljd2Z0?=
 =?utf-8?B?OTQ5Nm9JNmdGcnFibXUxWVJaYWducnUzZ2F2WTlMbE5XbVZRc01Fbk5uRHBB?=
 =?utf-8?B?c0w3cUpZS1ZOakhCQmZFRFUvZ05GdTRrYmNiMkkwOVFIcUtLSEJieG94U2ZD?=
 =?utf-8?B?MHN2NjhUMWJ1Q1NxMVkyMWJMK05kMGFDZWVJOWQxODhNYkt1a3pObWl0SG83?=
 =?utf-8?B?SXRIMjZITVZ0a1M3ckFwRE1NNFJXVWhjNy84WWRVVU1FbjBvZjFia0VwV2Q5?=
 =?utf-8?B?dzZ0S2o4MDJJRHh1c1g0amhoQnJrejFMN0tqbjU5MEttRjM1SlhEN2F4c2JE?=
 =?utf-8?B?R1FheURoQUI1MCsyT1FycExRRklIN2pNZmJQTnhMZVgvUk1xVGp3cmZxZHZv?=
 =?utf-8?B?aHpGUDNRMWdDN1UrRjFCUm5mRndENW9ZWEpLbmt1RTNvTjZFMEtRcDVEa0dq?=
 =?utf-8?B?VEhLeFFjSktjK0xtaE96YmRQVk9FbExkNm1XSjhzTFJWYVlpK1llSU5HRTls?=
 =?utf-8?B?L3ZWTGlTUDUwOWlUWDBBNDFBZjh6cU5iZFJCS3N2cTljVXEyTUhaQ1dtcnRL?=
 =?utf-8?B?OFBrRjNSMVpBejluY0lyRlRtZ3pCbzhhNWpnOFNoSFg1Q0hMVVBKOTdFd3pB?=
 =?utf-8?B?Vjl6eU5leVNLeWVGd3ZVVk5jeWhSaElVN2QyNnpTNGNtbENvdHU1a2ZJY0hz?=
 =?utf-8?B?aEk0SW5ZUGovVmZmQ2lNNmtCWXVkbVhxdE1Dc2YrcHZuNkFaeVJybEFETDZT?=
 =?utf-8?B?MFMvVUFZaFdkLzV4Q0VodDJqM0hvOEJIakMrR3FnUjFwaEE5Z3lnajdFY0lP?=
 =?utf-8?B?N3hSNVVWSHdSeHdGOXltTlhQclQ4ZzZCSjBTSEUvWDQwME1tNGZpZFloNFNU?=
 =?utf-8?B?YWY4MDUrOGFnSWhsWG53OURZRDZoZ0tTZ0JuRTBiNHdNaW0vclZPMkFVNWlL?=
 =?utf-8?B?TFI2SDNqTCttQ01QTzNXRVp5cVUvTnV5VzJ6cXpMdWRoSGhYRHR6cnVuTzZj?=
 =?utf-8?B?U3g3SVJNbW1yWjM5aWVVTnJpUzVVeGQrZjJRZWloem1PRWErd0dWTGpUZllv?=
 =?utf-8?B?VXlFMkxzREkwQ1dBM25VbitvMEM0OFVPNXNDYkt1MzhJT0RlRFkwcGI2a0tZ?=
 =?utf-8?B?WVRYRHVnUzJtczI4dXZSTlRvcldCYXBoekZZRktqUkM3ejZDRXNHc1RNVjFO?=
 =?utf-8?B?RzVOMFBuNWlKQkcwYTNpbGVVK2JCQnhFQkkxZ0Vxd1A0OG5zM244V0lwNkY4?=
 =?utf-8?B?d2VOMXU1QnB2WjdQanpRTDlwUWp3SW5SVDkxbWptUTJnZVVjMFhQdVYwN2JK?=
 =?utf-8?B?cWIwNUE2RmNCc1AyTWNrclJsUWhGSksvdlFxeGJSUTFuVURYQVlnR2MrNmlr?=
 =?utf-8?B?UVh1VUoxcnlYZlUrS3dFL2FlWjRJcUFjQVlUNW9LUUtUanhzTlRKMHdLWUFM?=
 =?utf-8?B?eTZjTGEzYXpPWTU5SjB1dzVremV2MmRvbE5uM0Y5aWpycm5rdFYyc3VYUyti?=
 =?utf-8?Q?b2rwDgeMV9rtxCQu3bCQHw8=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: d07b694a-cd1c-44e9-9c20-08da0059f521
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 16:45:59.3243
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: HWQwEOzKCXkgOSt79NEdrVu2wTZGh3yJOj69rsMo+2Hdd6T0aypw3OJAkuAI1RD7HuBLav6pNBVI9BBoseDtqw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR03MB5805
X-OriginatorOrg: citrix.com

Introduce CodeQL support for Xen and analyze the C, Python and Go
files.

Note than when analyzing Python or Go we avoid building the hypervisor
and only build the tools.

Requested-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
Changes since v1:
 - Rename to note it's x86 specific right now.
 - Merge the ignored path patch.
---
It's my understanding that we need to force the checkout action to
fetch 'staging' branch, or else for the scheduled runs we would end up
picking the current default branch (master).

Maybe we want to remove the scheduled action and just rely on pushes
and manually triggered workflows?
---
 .github/codeql/codeql-config.yml |  3 ++
 .github/workflows/codeql-x86.yml | 60 ++++++++++++++++++++++++++++++++
 2 files changed, 63 insertions(+)
 create mode 100644 .github/codeql/codeql-config.yml
 create mode 100644 .github/workflows/codeql-x86.yml

diff --git a/.github/codeql/codeql-config.yml b/.github/codeql/codeql-config.yml
new file mode 100644
index 0000000000..721640c2a5
--- /dev/null
+++ b/.github/codeql/codeql-config.yml
@@ -0,0 +1,3 @@
+paths-ignore:
+  - xen/tools/kconfig
+  - tools/firmware/xen-dir/xen-root/xen/tools/kconfig
diff --git a/.github/workflows/codeql-x86.yml b/.github/workflows/codeql-x86.yml
new file mode 100644
index 0000000000..a3ec6236c4
--- /dev/null
+++ b/.github/workflows/codeql-x86.yml
@@ -0,0 +1,60 @@
+name: CodeQL x86
+
+on:
+  workflow_dispatch:
+  push:
+    branches: [staging]
+  schedule:
+    - cron: '18 10 * * WED,SUN' # Bi-weekly at 10:18 UTC
+
+jobs:
+  analyse:
+
+    strategy:
+      matrix:
+        language: [ 'cpp', 'python', 'go' ]
+
+    runs-on: ubuntu-latest
+
+    steps:
+    - name: Install build dependencies
+      run: |
+        sudo apt-get install -y wget git \
+          libbz2-dev build-essential \
+          zlib1g-dev libncurses5-dev iasl \
+          libbz2-dev e2fslibs-dev uuid-dev libyajl-dev \
+          autoconf libtool liblzma-dev \
+          python3-dev golang python-dev libsystemd-dev
+
+    - uses: actions/checkout@v2
+      with:
+        ref: staging
+
+    - name: Configure Xen
+      run: |
+        ./configure --with-system-qemu=/bin/true \
+                    --with-system-seabios=/bin/true \
+                    --with-system-ovmf=/bin/true
+
+    - name: Pre build stuff
+      run: |
+        make -j`nproc` mini-os-dir
+
+    - uses: github/codeql-action/init@v1
+      with:
+        config-file: ./.github/codeql/codeql-config.yml
+        languages: ${{matrix.language}}
+        queries: security-and-quality
+
+    - if: matrix.language == 'cpp'
+      name: Full Build
+      run: |
+        make -j`nproc` build-xen build-tools
+        make -j`nproc` -C extras/mini-os/
+
+    - if: matrix.language == 'python' || matrix.language == 'go'
+      name: Tools Build
+      run: |
+        make -j`nproc` build-tools
+
+    - uses: github/codeql-action/analyze@v1
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 17:07:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 17:07:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286333.485823 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRGp9-0004rJ-5a; Mon, 07 Mar 2022 17:07:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286333.485823; Mon, 07 Mar 2022 17:07:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRGp9-0004rC-2d; Mon, 07 Mar 2022 17:07:07 +0000
Received: by outflank-mailman (input) for mailman id 286333;
 Mon, 07 Mar 2022 17:07:05 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XxC1=TS=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRGp7-0004r6-5v
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 17:07:05 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 024a609f-9e39-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 18:07:03 +0100 (CET)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04lp2057.outbound.protection.outlook.com [104.47.12.57]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-41-EJt4v3n8Mdi0qfTJRzBlpQ-1; Mon, 07 Mar 2022 18:07:01 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM9PR04MB8731.eurprd04.prod.outlook.com (2603:10a6:20b:43e::13)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.13; Mon, 7 Mar
 2022 17:06:59 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.026; Mon, 7 Mar 2022
 17:06:59 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 024a609f-9e39-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646672822;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=oUhvdr1iwNRxejErf30G1YM1hmJnjSpAlCNGALh+CJc=;
	b=lzUkDnKmxCvmiex+jXevjlFmF0mTwaSDiNgAuatEkru93YnbBRj9PBBhoIscq89NDT8lrT
	TPE0g5hzzmH7D6u2b/7Hk3mvXvyT6O59zNwcQ2b6hRT3s15X1Nsa7V8/HpZ11rU51Gbbi/
	oE0U0CVagOBv1bx0FcWM+l7lf52BTq0=
X-MC-Unique: EJt4v3n8Mdi0qfTJRzBlpQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=jAOOY6BNha0qeK1EPM7TK7bow4hnl4Nmt1jbOpk0lOlsYLwlztiIekoPxxGvVMR/E99D6XWIU/NryJF0VotRAuOd/mCEGxwJ9GGJBSraKGQwJEycavUrDL07px2fJ2dhXfMgT5LNgMbekzvYNrrztfYHc/odetm+nKUiCZv3AmclNEi8AIzzhUeHgCRHhYCVp+DdrNQAAZ4bsFGvu/Mjz/YJQOVeGw8N0szMAsyfD2O25BTZmzQx1otGuzgmLtb16YHtyKPmWAzx2QaP+K4qbBMi8CJLRrIsD/E7BbzwXQ41H7w3Am2j+tLwkFYFlSXzBxu4GPqVlreTw3VYFAhGDA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=shjXGSpVv5/bgyHdHpdMlgS8QQgnoymWvTKqlQGN4II=;
 b=VjEGz8fZFUTmbV3NH1I9FvQYkeJ8eTBU2qiJOLTnTqBt64ibpFB2snL79uPcQhB27WBdqVNXrFzyibmoqEbOEjpp6yw6QqD7Pbbkwj0ySIo/KYLLi/AbxBrkOZ4d57fZiMYGOFIPyKAMY0hXW9UleqEiljzcg4nT70mpbuJOZxc47W3b67jwHd0WO6psdVeGqO3YcvlzTvn92fyd12y/ZJRF+bXO2VHp3eqAQpzXKoIJZlc4F0oKu+AC3uy6IYJA4kzoFQ6083fZshn6IzLZA2MWycb0E7o+me4Pd5+i+LuDhix5cdAe7OhlL9izIa9duk81AuEKCNN2WDNSSVItFA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <c5623c11-cccd-c74c-6ebd-ada9885216e6@suse.com>
Date: Mon, 7 Mar 2022 18:07:00 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v2] livepatch: set -f{function,data}-sections compiler
 option
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 xen-devel@lists.xenproject.org
References: <20220307155558.72876-1-roger.pau@citrix.com>
 <984284e3-c423-16ec-5ad7-c4211ebddb70@suse.com>
 <YiY0jMinvZf8sBaK@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YiY0jMinvZf8sBaK@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM5P194CA0023.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:203:8f::33) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 7a0922f4-848e-4788-c1d0-08da005ce436
X-MS-TrafficTypeDiagnostic: AM9PR04MB8731:EE_
X-Microsoft-Antispam-PRVS:
	<AM9PR04MB87319FA77E6489DF4114403EB3089@AM9PR04MB8731.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	rDAnHx8Q9qGI0WmRY2GEkziDna5HyQmM07R+TNt+HJ1I9hfUg56RKa49x2Vq9krayp1Cg6DdclCuJFVo82tqL624uQnKcGuvDq311tO/xzXWhe5CvJfDLj7+gIh6nSE63hAPbIj6BFVLTXMvD7bYVyJC/WER37wjhOBIgkCzukVkBmp2BxCkG9pjthkndl45VSDbIa+Vr9oM1D8q5PvhoYa5eG2o0YDXWND38a5cddcDr6UQkQptz0Kf69nxBLuwkpJcvc5aUvGQljIQ15Dhv7igkqQ4fCYZGgMDPLGQnVNb8UY7DTkP38qlP8VtrsL49nhEmN3mXv/iE93QIlQxN98Mn392bmpXAuQZ0UOzwVWKyvYy6pAx+ht5EYCCsIa25qWCLCt1yQfmlRKuEuwUdK25DwEc+SS4ZalKLWWbKAPTeifmDjqUOHo7lwFG0P3hL8DtVz0OAQyaAxN3kY8ZzRSBqIKPObrV4D6MUKOI35H0iU2RA20c9PahIxUiElFALm5LD/91evMofXZZNxWY25jvoaLMi+kN6NUWlltrHm1MEHmVO0tyzVbIO5IpFuHurpiLiv90MBf6txje7cERlyzLwMSdocMyYKqCEz0B/m5xpdgpSEpQ3hIMMtQDCRLKaj/aR3Gx4Jxl+TnvO7zkKE6GmfuMex/3hSGObyVDyyn5SEJmq1iG5P1zeDGyCkW/DBQsLQgPG0Vr5gG7a189pQlv7UbP1K93G2i/ulfUTVw=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(26005)(186003)(316002)(6506007)(53546011)(6512007)(6666004)(6916009)(54906003)(36756003)(66946007)(66476007)(6486002)(31686004)(83380400001)(66556008)(4326008)(2616005)(38100700002)(2906002)(86362001)(31696002)(508600001)(8936002)(8676002)(5660300002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?NyMCslY5lwcxE7YQIT11wmVtoj2PHRFDDs7xdHiLA9fgLtD3utNOHj8tGVEC?=
 =?us-ascii?Q?oIYE+GZgToEhJBEn49N8d3DD0oVreRvGBVj7jEVOfSyQHwi3LVTNq1knkVR2?=
 =?us-ascii?Q?JCZGX5tCn2dPv7tZCUe0nkCFboUYK5RIaAq5nSOBBaOk79hOXu3Ka7XS+DeU?=
 =?us-ascii?Q?PTASmhJo1hR1oyh3uaBmWZXpxqxgC+5tS1wJRBgMgPBTqHWV4YkhV9DubrQO?=
 =?us-ascii?Q?h0RntflnFKxFBFOKOHO0B9S0JyAXOlVvlKYo23EI9MMWQKrXQnFxD/Bs5xjt?=
 =?us-ascii?Q?EI5mEFN30n5xCeCFwHmBucSkx7QtGRnFynGKL6K+terjYsq2eYwt0wbm2v8i?=
 =?us-ascii?Q?Ri+laeXFh2EwRe3gNZeU35qtcBbLlf0H1iNi0TrXjJiOSZqkH4Y4srFBAhOj?=
 =?us-ascii?Q?1i+yHChPdx4pF96gr4nE782xoJB0oyT4Go87qBjieH40o0UwqgR96po1sqY6?=
 =?us-ascii?Q?Kj93gbp0Dgw5azjyZwdVN2zrrt9Ukkxr248BvrWJ4yC8HhVi/YEmrkJysKxp?=
 =?us-ascii?Q?40Dqsjz2avIZjQKSQ20pBNS/xR/u5Qr/Yq13sYk0ToWJkB1ACWVxHmRDCBBt?=
 =?us-ascii?Q?EgqzP74Qg8DjEeTHCXJk94sWVkBbPR/EjEx/J+/8o/OO8uwQBBc9U+DXt9gU?=
 =?us-ascii?Q?wjsapyWdZqbyUADuJVtd2jIK4Kfv7E+1FQ2yJ8EnTM8c+1qyfqVCtyO9POjP?=
 =?us-ascii?Q?qshrRqI+0qh8CZwgaMAOwuEXJRXpgLD8BIRjqMCrIU6MOWwXWBQQZLIpIKH+?=
 =?us-ascii?Q?gaWTk8050bcmXdJW/xEBpuQ9/w5Lq68Od6KlE09solOKDh6ZYE0RHMQpqAbu?=
 =?us-ascii?Q?f92swsHvMe/VgOFE+9w/1fyD2n5i7hnUAakybuQ0pnNOT8ARLLGgrjgPsM5e?=
 =?us-ascii?Q?+xshcJQb9ryYUGnOLgcC71z+vudKQxp3dnQIWzBKWEq6BzHBWd3KEExKddt5?=
 =?us-ascii?Q?NVll6yp0tNCEOmsnO3XjQQbEoX3L08SjEAyS4/DiXnCjGSfafKJIvwMEUSkV?=
 =?us-ascii?Q?9U/C62SjDB4y6EHHj8KKREFR5ValWRJ8Nu5K2z+PH0mvLEweVcYKFsj1wkaU?=
 =?us-ascii?Q?GTIgM2NMrYqo9begGHQbHSXMW9Zu4QeSlPQUDdctz2UU8qHiQZ87uqP5HvNU?=
 =?us-ascii?Q?S3NKi4uQ/pQcYsiSv/Yu3NCkJ7MIDoSfoO3mWYFt5IhljYebUZtS7Fcg039e?=
 =?us-ascii?Q?L3Sdg0sLVHat0PDWMapX6mqIdNpTvdwFl0uOJUjUudlJEDyn4pwj4mOP75a6?=
 =?us-ascii?Q?JKNvIzYVRISezp9qISrrQ0KuPr9laq59mLiFtKROgaJrciGSKIHcRmBbmjOo?=
 =?us-ascii?Q?eI8+e7GdL43l+gDOxSDTv62cFXSR51dE1IoHGUxpS4myO5W6oKlpEj0EnxbF?=
 =?us-ascii?Q?tBRJkrdjP0mvmVsHbcJqD6Zz1CFgq9cqslRM+KRQ3MD52SdBjtPrOfVyxwgp?=
 =?us-ascii?Q?sXp30dh+ZbIoudhrlcKZ8sq0kH5Nbd4hh7xhijiPyuz2N7pj0lglYLC2gfmx?=
 =?us-ascii?Q?y90fCoeBeHbiAUFdhw1fEehDTo/6BH06nwVMdC2leZ1Rwrpwijk1nPYPnDpd?=
 =?us-ascii?Q?tc6wl//APzmXhVjjrCnbnw7PT5IPYF7oxcr0NuW+Hp2bvfmYf6mkruJ4hw3E?=
 =?us-ascii?Q?TZd+/RRejKbFH12fMdq2I1g=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7a0922f4-848e-4788-c1d0-08da005ce436
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 17:06:59.4162
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: R5fPyyTUg+h1IGoq/qnWXQX4/4pCi9RGh40Eo9MpOwfFn6IE55vnvQFYfKIAjHnhDQX0fhtjx1YqPpT/3XXFow==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR04MB8731

On 07.03.2022 17:36, Roger Pau Monn=C3=A9 wrote:
> On Mon, Mar 07, 2022 at 05:28:20PM +0100, Jan Beulich wrote:
>> On 07.03.2022 16:55, Roger Pau Monne wrote:
>>> If livepatching support is enabled build the hypervisor with
>>> -f{function,data}-sections compiler options, which is required by the
>>> livepatching tools to detect changes and create livepatches.
>>>
>>> This shouldn't result in any functional change on the hypervisor
>>> binary image, but does however require some changes in the linker
>>> script in order to handle that each function and data item will now be
>>> placed into its own section in object files. As a result add catch-all
>>> for .text, .data and .bss in order to merge each individual item
>>> section into the final image.
>>>
>>> The main difference will be that .text.startup will end up being part
>>> of .text rather than .init, and thus won't be freed. .text.exit will
>>> also be part of .text rather than dropped. Overall this could make the
>>> image bigger, and package some .text code in a sub-optimal way.
>>>
>>> Note that placement of the sections inside of .text is also slightly
>>> adjusted to be more similar to the position found in the default GNU
>>> ld linker script. This requires having a separate section for the
>>> header in order to place it at the begging of the output image,
>>> followed with the unlikely and related sections, and finally the main
>>> .text section.
>>>
>>> On Arm the .data.read_mostly needs to be moved ahead of the .data
>>> section like it's already done on x86, and the alignment needs to be
>>> set to PAGE_SIZE so it doesn't end up being placed at the tail of a
>>> read-only page from the previous section. While there move the
>>> alignment of the .data section ahead of the section declaration, like
>>> it's done for other sections.
>>>
>>> The benefit of having CONFIG_LIVEPATCH enable those compiler option
>>> is that the livepatch build tools no longer need to fiddle with the
>>> build system in order to enable them. Note the current livepatch tools
>>> are broken after the recent build changes due to the way they
>>> attempt to set  -f{function,data}-sections.
>>>
>>> Signed-off-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>
>>
>> The x86 part of this looks fine to me, just one other remark:
>>
>>> --- a/xen/common/Kconfig
>>> +++ b/xen/common/Kconfig
>>> @@ -350,10 +350,14 @@ source "common/sched/Kconfig"
>>>  config CRYPTO
>>>  	bool
>>> =20
>>> +config CC_SPLIT_SECTIONS
>>> +	bool
>>
>> I think this wants to live higher up in the file, perhaps between
>> ALTERNATIVE_CALL and HAS_ALTERNATIVE. (CRYPTO, as seen in context
>> here, imo also would better live higher up.) Or alternatively it may
>> want to move to xen/Kconfig, next to CC_HAS_VISIBILITY_ATTRIBUTE.
>=20
> I was tempted to place it in xen/Kconfig. The logic for the current
> suggested placement is to be closer to it's current only user
> (LIVEPATCH), but I'm not opposed to moving it somewhere else if
> there's consensus.

I guess the main question is whether this option is intended to gain
a prompt. If so, xen/common/Kconfig is likely the better place. If
not, I think it better fits in xen/Kconfig.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 17:10:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 17:10:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286340.485836 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRGsA-0006Ga-Le; Mon, 07 Mar 2022 17:10:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286340.485836; Mon, 07 Mar 2022 17:10:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRGsA-0006GT-In; Mon, 07 Mar 2022 17:10:14 +0000
Received: by outflank-mailman (input) for mailman id 286340;
 Mon, 07 Mar 2022 17:10:12 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=pTMl=TS=cantab.net=dvrabel@srs-se1.protection.inumbo.net>)
 id 1nRGs8-0006GI-TB
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 17:10:12 +0000
Received: from smarthost01c.ixn.mail.zen.net.uk
 (smarthost01c.ixn.mail.zen.net.uk [212.23.1.22])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 72684e2c-9e39-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 18:10:11 +0100 (CET)
Received: from [82.70.146.41] (helo=pear.davidvrabel.org.uk)
 by smarthost01c.ixn.mail.zen.net.uk with esmtps
 (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1)
 (envelope-from <dvrabel@cantab.net>)
 id 1nRGs6-0005Uw-8u; Mon, 07 Mar 2022 17:10:10 +0000
Received: from apple.davidvrabel.org.uk ([82.70.146.43])
 by pear.davidvrabel.org.uk with esmtp (Exim 4.92)
 (envelope-from <dvrabel@cantab.net>)
 id 1nRGs1-0005gN-Dm; Mon, 07 Mar 2022 17:10:09 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 72684e2c-9e39-11ec-8eba-a37418f5ba1a
Message-ID: <51f25a2c-4cf3-979d-9049-f301b6295299@cantab.net>
Date: Mon, 7 Mar 2022 17:10:05 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Content-Language: en-GB
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andew Cooper <andrew.cooper3@citrix.com>
From: David Vrabel <dvrabel@cantab.net>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-SA-Exim-Connect-IP: 82.70.146.43
X-SA-Exim-Mail-From: dvrabel@cantab.net
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on
	pear.davidvrabel.org.uk
X-Spam-Level: 
X-Spam-Status: No, score=-1.2 required=5.0 tests=BAYES_00,SPF_SOFTFAIL
	autolearn=no autolearn_force=no version=3.4.2
Subject: CET-IBT and kexec?
X-SA-Exim-Version: 4.2.1 (built Wed, 08 May 2019 21:11:16 +0000)
X-SA-Exim-Scanned: Yes (on pear.davidvrabel.org.uk)
X-Originating-smarthost01c-IP: [82.70.146.41]
Feedback-ID: 82.70.146.41

kexec_reloc (see xen/arch/x86/x86_64/kexec_reloc.S) has an indirect 
branch as part of switching page tables. I understand that if CET-IBT is 
enabled this will raise an exception since there's no ENDBR64 
instruction and (as far as I could tell) CET-IBT has not been disabled 
in machine_kexec() prior to calling kexec_reloc().

Have I correctly spotted an issue, and if so, would the correct fix be 
to disable CET-IBT in machine_kexec()?

I guess this would also be an issue if kexec'ing to a image without 
CET-IBT support.

David


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 17:20:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 17:20:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286348.485851 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRH1Z-0007BY-QF; Mon, 07 Mar 2022 17:19:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286348.485851; Mon, 07 Mar 2022 17:19:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRH1Z-0007BP-Mx; Mon, 07 Mar 2022 17:19:57 +0000
Received: by outflank-mailman (input) for mailman id 286348;
 Mon, 07 Mar 2022 17:19:56 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nRH1Y-0007BJ-Fw
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 17:19:56 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRH1X-00015z-Ss; Mon, 07 Mar 2022 17:19:55 +0000
Received: from [54.239.6.188] (helo=[192.168.26.124])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRH1X-0006Cd-MR; Mon, 07 Mar 2022 17:19:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=3SrX5XMJMtGn10qrI+gdXUyC4ttQTBmmysSPDfN2WKk=; b=W1xlIJsGTu1br+5LxPD5Bv5b/E
	wesAfBVtqktBoyCxnh0CM8YfVIN5StbX2kujZ1doskptniAR6TI2Xq8ySS02XpNDohlU/qeiI9O7D
	DF8PFZxBGpEGNrxcQXJ0d1nka/Kc1HAvlu7UUsV1ln1mJXTJL41edv3rN4vnAE0IbRLQ=;
Message-ID: <f6e3f58a-ca7c-6173-815b-8bf300df33ed@xen.org>
Date: Mon, 7 Mar 2022 17:19:53 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH v2] livepatch: set -f{function,data}-sections compiler
 option
To: Roger Pau Monne <roger.pau@citrix.com>, xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
References: <20220307155558.72876-1-roger.pau@citrix.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220307155558.72876-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi Roger,

On 07/03/2022 15:55, Roger Pau Monne wrote:
> If livepatching support is enabled build the hypervisor with
> -f{function,data}-sections compiler options, which is required by the
> livepatching tools to detect changes and create livepatches.
> 
> This shouldn't result in any functional change on the hypervisor
> binary image, but does however require some changes in the linker
> script in order to handle that each function and data item will now be
> placed into its own section in object files. As a result add catch-all
> for .text, .data and .bss in order to merge each individual item
> section into the final image.
> 
> The main difference will be that .text.startup will end up being part
> of .text rather than .init, and thus won't be freed. .text.exit will
> also be part of .text rather than dropped. Overall this could make the
> image bigger, and package some .text code in a sub-optimal way.
> 
> Note that placement of the sections inside of .text is also slightly
> adjusted to be more similar to the position found in the default GNU
> ld linker script. This requires having a separate section for the
> header in order to place it at the begging of the output image,
> followed with the unlikely and related sections, and finally the main
> .text section.
> 
> On Arm the .data.read_mostly needs to be moved ahead of the .data
> section like it's already done on x86, and the alignment needs to be
> set to PAGE_SIZE so it doesn't end up being placed at the tail of a
> read-only page from the previous section. While there move the
> alignment of the .data section ahead of the section declaration, like
> it's done for other sections.

This sounds like a bug not related to this patch. Can this be split 
separately?

> 
> The benefit of having CONFIG_LIVEPATCH enable those compiler option
> is that the livepatch build tools no longer need to fiddle with the
> build system in order to enable them. Note the current livepatch tools
> are broken after the recent build changes due to the way they
> attempt to set  -f{function,data}-sections.
> 
> Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
> ---
> Changes since v1:
>   - Introduce CC_SPLIT_SECTIONS for selecting the compiler options.
>   - Drop check for compiler options, all supported versions have them.
>   - Re-arrange section placement in .text, to match the default linker
>     script.
>   - Introduce .text.header to contain the headers bits that must appear
>     first in the final binary.
> ---
> Given that now the header is explicitly placed in .text.header, it's
> likely possible to simplify some of the ordering of the object files
> for the prelink.o generation, as arch/x86/boot/built_in.o no longer
> needs to be the first object file in the list.
> 
> It also seems on Arm the schedulers and hypfs .data sections should be
> moved into read_mostly.
> ---
> Tested by gitlab in order to assert I didn't introduce any regression
> on Arm specially.
> ---
>   xen/Makefile              |  2 ++
>   xen/arch/arm/arm32/head.S |  1 +
>   xen/arch/arm/arm64/head.S |  1 +
>   xen/arch/arm/xen.lds.S    | 49 +++++++++++++++++++++------------------
>   xen/arch/x86/boot/head.S  |  2 +-
>   xen/arch/x86/xen.lds.S    | 22 +++++++++++-------
>   xen/common/Kconfig        |  4 ++++
>   7 files changed, 49 insertions(+), 32 deletions(-)
> 
> diff --git a/xen/Makefile b/xen/Makefile
> index 5c21492d6f..18a4f7e101 100644
> --- a/xen/Makefile
> +++ b/xen/Makefile
> @@ -273,6 +273,8 @@ else
>   CFLAGS += -fomit-frame-pointer
>   endif
>   
> +CFLAGS-$(CONFIG_CC_SPLIT_SECTIONS) += -ffunction-sections -fdata-sections
> +
>   CFLAGS += -nostdinc -fno-builtin -fno-common
>   CFLAGS += -Werror -Wredundant-decls -Wno-pointer-arith
>   $(call cc-option-add,CFLAGS,CC,-Wvla)
> diff --git a/xen/arch/arm/arm32/head.S b/xen/arch/arm/arm32/head.S
> index 7a906167ef..c837d3054c 100644
> --- a/xen/arch/arm/arm32/head.S
> +++ b/xen/arch/arm/arm32/head.S
> @@ -120,6 +120,7 @@
>   
>   #endif /* !CONFIG_EARLY_PRINTK */
>   
> +        .section .text.header, "ax", %progbits
>           .arm
>   
>           /*
> diff --git a/xen/arch/arm/arm64/head.S b/xen/arch/arm/arm64/head.S
> index 66d862fc81..e62c48ec1c 100644
> --- a/xen/arch/arm/arm64/head.S
> +++ b/xen/arch/arm/arm64/head.S
> @@ -133,6 +133,7 @@
>           add \xb, \xb, x20
>   .endm
>   
> +        .section .text.header, "ax", %progbits
>           /*.aarch64*/
>   
>           /*
> diff --git a/xen/arch/arm/xen.lds.S b/xen/arch/arm/xen.lds.S
> index 08016948ab..836da880c3 100644
> --- a/xen/arch/arm/xen.lds.S
> +++ b/xen/arch/arm/xen.lds.S
> @@ -30,9 +30,16 @@ SECTIONS
>     _start = .;
>     .text : {
>           _stext = .;            /* Text section */
> +       *(.text.header)

With this change, the changes in arch/*/arch.mk to order head.o looks 
unnecessary. Can we remove it at the same time? (The .text.header and 
the update of arch.mk may want to be done together in a separate patch).

> +
> +       *(.text.cold .text.cold.*)
> +       *(.text.unlikely .text.*_unlikely .text.unlikely.*)
> +
>          *(.text)
> -       *(.text.cold)
> -       *(.text.unlikely)
> +#ifdef CONFIG_CC_SPLIT_SECTIONS
> +       *(.text.*)
> +#endif
> +
>          *(.fixup)
>          *(.gnu.warning)
>          _etext = .;             /* End of text section */
> @@ -78,10 +85,24 @@ SECTIONS
>   #endif
>     _erodata = .;                /* End of read-only data */

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 17:26:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 17:26:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286354.485862 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRH7e-0000Kk-GZ; Mon, 07 Mar 2022 17:26:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286354.485862; Mon, 07 Mar 2022 17:26:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRH7e-0000Kd-CB; Mon, 07 Mar 2022 17:26:14 +0000
Received: by outflank-mailman (input) for mailman id 286354;
 Mon, 07 Mar 2022 17:26:13 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=9NfF=TS=citrix.com=prvs=058fb9784=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nRH7d-0000KV-0y
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 17:26:13 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id abbcb91a-9e3b-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 18:26:09 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: abbcb91a-9e3b-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646673968;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=9o2/1mxb+L0ljiQl/EdESBVgRtCw8o/iccanDF5noO0=;
  b=UrE8lDSFPmUlMLMwTUKDXFiyJ998D2Tl97tbGLWW+5fIg1Riarz1fXSD
   u9ThDe+dQWkl9//s3jCVi7rKl0/39I0wSgVuO6MNmCjikp2Ti1xKj1Tyc
   D1KXIShTyGtRM6DpRkvEMpyaT9x1BwVZWa/CVGUr+XkFl27eZ7CWWZyl6
   s=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65111729
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:v/lpBKmfsji3ELwXkQOICt/o5gyFJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xIeX2mDbPreM2P3Kt90PYS/oEkDvZTXnNM2Sws5qH03HiMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiW1zV4
 7senuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYRAYjMor9s9whVgBkSSQnLbFN9e7+Li3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3k3ds1zzGS90hRojOWf7i7t5ExjYgwMtJGJ4yY
 uJHNGM2NUuaMnWjPH81MJ9lm6DxvUDDLRFnlny1j7UwskLqmVkZPL/Fb4OOJ43iqd9utlaVo
 CfK8nr0BjkeNceD0nyV/3S0nOjNkCjnHoUIG9WQ+uBwiVeewkQYARsKXFH9p/Sl4nNSQPoGd
 RZSoHB36/Fvqgr7FbERQiFUvlaJvxQQfOt7K9E/8T3Xz/PE/w2UV1ELG2sphMMdiOc6Qjkj1
 1msltzvBCByvLD9dU9x5ot4vhvpZ3FLcDZqiTssCFJcvoK9+N1bYgfnE447eJNZmOEZDt0ZL
 9qiiCElz4segscQv0lQ1QCW2mn8znQlo+Nc2+k2Yo5Hxl4jDGJGT9bxgbQ+0RqnBNzFJmRtR
 FBex6CjABkmVPlhbhClTuQXB62O7P2YKjDailMHN8B/q2rwqiD7ItsAsG0WyKJV3iEsI2OBX
 aMukVkJuM870IWCN8ebnL5d++x1lPO9RLwJp9jfb8ZUY4gZSeN01HoGWKJk5Ei0yBJEufhmY
 f+zKJ/wZV5HWfUP5GfnHI81jO50rh3SMEuOHPgXOTz8iuHADJNUIJ9YWGazghcRt/vV8F2Iq
 I8Eb6NnCXx3CYXDX8UeyqZKRXgiJnknH5Hm7ctRc++IOA19H289TfTWxNscl0ZNxsy5Ss+gE
 qmBZ3Jl
IronPort-HdrOrdr: A9a23:Hn1NPKDehpcvHXblHegCsceALOsnbusQ8zAXPh9KJiC9I/b1qy
 nxppkmPEfP+UsssHFJo6HkBEEZKUmsuqKdkrNhQYtKOzOW9ldATbsSobcKpgePJ8SQzJ8l6U
 4NSdkcNDS0NykBsS+Y2nj4Lz9D+qj+zEnAv463pB0NLT2CKZsQlDuRYjzrSXGeLzM2YabRYa
 DsgPav0ADQHkj/AP7LZEUtbqzmnZnmhZjmaRkJC1oM8w+Vlw6l77b8Dlyxwgoeeykn+8ZjzU
 H11yjCoomzufCyzRHRk0XJ6Y5NpdfnwtxfQOSRl8kuLCn2gArAXvUjZ1TChkF2nAic0idvrD
 D+mWZmAy210QKWQoiBm2qp5+An6kd215at8y7BvZKpm72HeNtzMbs+uWseSGqC16NohqAN7E
 oAtVjpxqZ/HFfOmj/w6MPPUAwvnk2ooWA6mepWlHBHV5ACAYUh5rD30XklWavoJhiKoLzP0d
 MeeP309bJTaxeXfnrZtm5gzJilWWkyBA6PRgwHttaO2zZbkXhlxw9ArfZv00so5dY4Ud1J9u
 7EOqNnmPVHSdIXd7t0AKMETdGsAmLATBrQOCaZIEjhFqsAJ3XRwqSHqokd9aWvYtgF3ZEykJ
 POXBdRsnMzYVvnDYmU0JhC4nn2MROAtPTWu7ZjDrRCy8/BreDQQF6+oXgV4r6dn8k=
X-IronPort-AV: E=Sophos;i="5.90,162,1643691600"; 
   d="scan'208";a="65111729"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=DhSuXMqR7d+JED9Xjaig2kAegEROjKeesAjUrJ2yHz2/P0y+XmqBCKCqTd7zUSGIYKLeg1VejR145RrpCov57dxS5VZ7Tjb3qyh4o5tia/eI1kBfDJDRNKxgQtulALiuP1g2TGUIscDegzb6skwcjuZLxCPPwa0fxYHz2eRkqmcNtgfrvvoszPdVFjvB09YHAa+68TYMYPigYUlmf0amI79koDYxxoTKBsLNWuNVuVQ+bnvQP+n98Ohqq1mg2UEEsyZ14WE7mBKVyx9GMxFKAiRyO4Gh+on7r2fZYHUb8ACwum61roT9Ug1IvV65TQ6Ozrnnorm/nJGS7cjzJuNarg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=9o2/1mxb+L0ljiQl/EdESBVgRtCw8o/iccanDF5noO0=;
 b=HyboXSSmivv48LS4QH0I2mw70nVmILI+FAVeXsPZJoIBKmiDv40FpZUhYoXk87F12AX7Bn/Pj3p1DFVGqD5Pd7ecDIbjqunJAXC1gfXZisrEpavY65C1PPmPuWiypLJ6aAkN54bwtO8XNT990uic4HM71hNEgV2DAKXjJLHnFtwkJqoXsOx42iwXdgNdwbItnFGnLZJ3tjaLuD5K0bXNsTXtSmj+M9Wei86LToV/bGlgWYrMUDEHzKavgKqxkJL4WneXX1xlkmxardH36y5x/iLFPWyv10FgyEr0C1V3xr6ikbJJDYzRsd+3wLotAjbDSMk8V6GnYisrM9pKedv8hg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=9o2/1mxb+L0ljiQl/EdESBVgRtCw8o/iccanDF5noO0=;
 b=G3UZ+ft63kR6wIGtJpUjYtRQ1OR1LaOmvBFC1Ns7dNkR9LY/s8hagbkZ48JTQ8T4tmD9xPvEA7aJbdvJtn21CmdLKY9UEm8XMX7ucxX48MKhgYzmM2Ka5ZacEEHooWu2Dqa+Wrzy2tthtO/AJ+b/vLn9U4ikhB3iBeqWOUPLIGo=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: David Vrabel <dvrabel@cantab.net>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Andrew Cooper <Andrew.Cooper3@citrix.com>
Subject: Re: CET-IBT and kexec?
Thread-Topic: CET-IBT and kexec?
Thread-Index: AQHYMkZGRiX5uAcMSkGDeNGbXVStcqy0LEIA
Date: Mon, 7 Mar 2022 17:25:56 +0000
Message-ID: <b3d74444-3f63-c03b-b9b0-792363b7abcd@citrix.com>
References: <51f25a2c-4cf3-979d-9049-f301b6295299@cantab.net>
In-Reply-To: <51f25a2c-4cf3-979d-9049-f301b6295299@cantab.net>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 010c6580-157a-4a22-0845-08da005f8a42
x-ms-traffictypediagnostic: SA1PR03MB6564:EE_
x-microsoft-antispam-prvs: <SA1PR03MB65641B6B26EC73EF9755EFEBBA089@SA1PR03MB6564.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(31696002)(26005)(71200400001)(508600001)(107886003)(2616005)(186003)(6512007)(53546011)(86362001)(6486002)(82960400001)(6506007)(3480700007)(38070700005)(83380400001)(38100700002)(122000001)(8936002)(5660300002)(31686004)(8676002)(4326008)(66946007)(66556008)(66476007)(66446008)(64756008)(76116006)(2906002)(36756003)(4744005)(110136005)(316002)(91956017)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?Q0MyQ2dsTUN0by9Wc2QySkhwcHMxT0VybVZ6akdlWnMzN0RYZVRWUkhBTjVK?=
 =?utf-8?B?Tkd6T0NkNU04cFJkUEZwTHNaeFMvSEdiK0c2SkxmLzZUbWIvaGpzUGZocEh0?=
 =?utf-8?B?YmpwQzh1MVR3Wm5nUWJnRzFqUFNDQmpOcWJtMmZvUFA4Q3pWbm4rMTBBYXB2?=
 =?utf-8?B?SWlMcStCa09FKzNtbzc1SFUwQkt3SytkUFVFRmZhVW53Rkg3Z2lHWEFseUI1?=
 =?utf-8?B?anBnUlppWGlVQjhrYm9qQTBZMEVTbUZxcllTQ0F2UmtFOVU0SFh6eGJhVk44?=
 =?utf-8?B?dEQ2aDVsUG9pU010UDlwM3hkY0htaUtlRDJMbytjZkNJY1pTZ2dQT3BCUm9y?=
 =?utf-8?B?T0k2cUJZMXgzUEpSWU5UdDVJZmdqUUN2Z0M4M1FsL2xOdWIrQVNOcEZDZFg2?=
 =?utf-8?B?UHBEUGplR2N3Ly9NendRVzJuWDU4ZGhUYmw4dU5EbkMrOHNnUjdnRjZwcEwr?=
 =?utf-8?B?UEF5Wml3alMrYVBVNDhJektXK1pDa2JBNm9SNi9XWVJ4TmJ0QXMyWEg5Snht?=
 =?utf-8?B?d1BUMXl3N2ZOd2NIcS9PR3RGRGtOUkV1RGlkbEZxK2ozcElaelplM3ZpNlU4?=
 =?utf-8?B?YjNaZzUzOHFscUlwVHdNQkVPaHFsb3FGQ2hzQ0RlWjRDeW51dzZqQytSS001?=
 =?utf-8?B?N2MvSFNNL3lycmNZbzlOaTJvTzBqOUYvVTdlaXlUaVo1OUZDLzhOMjVvQ3h2?=
 =?utf-8?B?VXJRMmNmbTRLTnJTamRTZVNGanhUYk5oRTNReUlVY3E3VXpGRGRZVG1MRFZT?=
 =?utf-8?B?UjBnTmF0RjBBaW12ZmxXODZYZDNLb0ErVklncUYxbkZISncxQmdrQXQ5NFBK?=
 =?utf-8?B?dlRqN2hZcFZQSktEa3R4ZWZ2R2dGMGNWbmhlaDdLZFVwaU5Ub25iczNSYWZH?=
 =?utf-8?B?NFJWOE5TRnVuVEVhUDRSeWtBajdxaG1VSi9xd1Y5R3lqS3JDRGlwUVppSVV5?=
 =?utf-8?B?VUxPUEVPZlZDYnNoUDRUNnZMd0l6eGNkM2JuVnhDNWRFQ3JyU1c4KytUYlJJ?=
 =?utf-8?B?WFh2ZkdlbVpmQjl3ckVXRXBCM01jbWFjbGk0dEtxSENnRUxkQXdocnl1cEE2?=
 =?utf-8?B?U1lDazVWMWVOUVhqTXB3SFJJamljTmlKajdsd3ZGVmxKcmVRTU41aXVMMDBs?=
 =?utf-8?B?RGRVdGVxV2xSeGtLVE9mZWN3dGRGeU5pZzV2VjZxc3lDbG5nWGZNOGs5ZFAz?=
 =?utf-8?B?V0JwLy9zMUU0dW9mRVhUQWFiQzBFQnVQTEVqdEY3VjhKN2g2Z2hzOVdNZ0lX?=
 =?utf-8?B?Vmh3ZDdFZks0cDZVeXVZekptVlNuUklROUlrNCsvZW4yR3hBd2xEOWxOTVRs?=
 =?utf-8?B?TnZsa1FUSmhyVllOUGNwZzJYWVNoby9wd0hCd050elMrTXF0VmFUaWdSTDZ3?=
 =?utf-8?B?bGRyVTRNYjR5RGdOMWd2YlhmS3Bhb3U2U2FSUnBPUEhnZWtFdWxYZWI0NjFi?=
 =?utf-8?B?cGxqRExYVnNsK2czU094TVlYMmhzVUdpeTltc0dVMFlML0d3dFRMSmJFeFB4?=
 =?utf-8?B?dE9XREdjTyt5bzJNZ0xWNzhmam1QY1JiRTRLeWg0VWFRNHJFcDUvYkVhR09s?=
 =?utf-8?B?ZjlrajNIZnZQM3BsWTZWL25mZElKNVFaZEExWnNIamJIYVpzK3lqbmZWNDda?=
 =?utf-8?B?ZWtWUzJHWEdTWUQzOWJBd0ZJZjIvU2J0U0piQ2xrbWg3L1lPeG5uWldDQlNF?=
 =?utf-8?B?WDVhZ3Q0cndMZ2svL2VaYzFJYWF5N2RDNEh5Q2N2RjFvVmI0ZzZoNlYxS1Rm?=
 =?utf-8?B?QklRbDRrNHdvdDNTMmNJeWE5bjZYdExvdVZhRHF1ZVpIOFJ2RndoVlpWajVl?=
 =?utf-8?B?ZzMwQnh6QTFrSFhHWVN4czhCYk55eEEvMUs0bXcxVlZoTDZUd0QwcDZSdHZr?=
 =?utf-8?B?aGJ2Sk9YRFlWNHIzT3dIYWtBZTFQL0gxajBZc2dZeUkrUFUxYk5VNGpoc3hv?=
 =?utf-8?B?eXlkalhZZysxM21iTmVtaFlsRHRPYWJDbmpzOFFnN1VZdXlWVTNRYm90djZU?=
 =?utf-8?B?NFJTZG9tSVFlTTE4djhkRG1sdUE2c1MycUdGcU1KNEdwRHFITWE0YThCR1d2?=
 =?utf-8?B?VnZBVHRncC9JNG1GMGZXZ3g2SXVBcG9XR2JobXpmUCs3Rnl0aGFYUDdBdEVo?=
 =?utf-8?B?cXJqekVFaDlpa3FZTXM5ZFM0QWY0WWRhd0RGVFNkRDc3RnBQL2llRzQvWFhI?=
 =?utf-8?B?OVdxMnB1Mm9wS1lKMFpPRVd5bVZLbllhdHRmeE5qaGZ1R01hbGl2UERLekx6?=
 =?utf-8?B?S0c1SHRFbkJWaWxkb0VXaThaL2p3PT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <D9B45C2081E6834199104D60647C1D68@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 010c6580-157a-4a22-0845-08da005f8a42
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Mar 2022 17:25:56.6885
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: gpt8DqHIOSJUeV6XIr50ruVDeeR3x8ri76TB0yxUw+OAOMpdU252jmhWVKKs09dzD2rIPyf5BZn3hxpL0xwDN/A3Hso7fSR5kJVaDBOyAGo=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR03MB6564
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Mon Mar 07 17:47:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 17:47:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286361.485873 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRHS8-0002v6-6f; Mon, 07 Mar 2022 17:47:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286361.485873; Mon, 07 Mar 2022 17:47:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRHS8-0002uz-3W; Mon, 07 Mar 2022 17:47:24 +0000
Received: by outflank-mailman (input) for mailman id 286361;
 Mon, 07 Mar 2022 17:47:22 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRHS6-0002up-Ri; Mon, 07 Mar 2022 17:47:22 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRHS6-0001YR-PD; Mon, 07 Mar 2022 17:47:22 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRHS6-0005uj-DZ; Mon, 07 Mar 2022 17:47:22 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRHS6-0000HK-D5; Mon, 07 Mar 2022 17:47:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=u/fucjU8iZ4eS/fqPGis/8xIpjUm3QESXaZOGvU1UHM=; b=7CS38YykCMtwvOd+y0ddXM7cIO
	26zNOVzNGPWREgD/c2IJLNO1w0h/bRkivu8QNYgP+9UlY7IKE6GXCuPmrKzFPh0mE0IpbuSEuTYgA
	WmKge2REjm3W+vh709mxFzc6Pz7SpgsCuBBNw0kb5eeZLPEbRABdQ3CT9UO0TSYcMPX4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168463-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168463: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=9d4a44380d273de22d5753883cbf5581795ff24d
X-Osstest-Versions-That:
    xen=4cb8d7a06752b368a365e30117f535a2fdad3963
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 07 Mar 2022 17:47:22 +0000

flight 168463 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168463/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  9d4a44380d273de22d5753883cbf5581795ff24d
baseline version:
 xen                  4cb8d7a06752b368a365e30117f535a2fdad3963

Last test of basis   168454  2022-03-07 09:01:41 Z    0 days
Testing same since   168463  2022-03-07 15:00:26 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   4cb8d7a067..9d4a44380d  9d4a44380d273de22d5753883cbf5581795ff24d -> smoke


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 19:37:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 19:37:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286402.485904 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRJAq-0007Ix-RH; Mon, 07 Mar 2022 19:37:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286402.485904; Mon, 07 Mar 2022 19:37:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRJAq-0007Iq-Nt; Mon, 07 Mar 2022 19:37:40 +0000
Received: by outflank-mailman (input) for mailman id 286402;
 Mon, 07 Mar 2022 19:37:39 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nRJAo-0007Ik-WD
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 19:37:39 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRJAo-0003eC-DH; Mon, 07 Mar 2022 19:37:38 +0000
Received: from [54.239.6.188] (helo=[192.168.26.124])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRJAo-0007EX-62; Mon, 07 Mar 2022 19:37:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=lZijzCYgRh/tOJrITnMm393PPK5xLRsNmUwnbfI8ZeU=; b=oq2Ea5bTosPz31ya+o23bHt3UV
	6tRby0ZMBDhlSWVJ6VMDwbxrm2DOG+NAs0/Fkvp/CO2O9qYkw9rxw8AM+M1McQvmGnUAyw30gzlML
	/cEomXBVjoO6AVFUuYp6VmZyXVYK1lr+PxBOhe8dg16KW8QcFnjAzsqFSpdtK2/O53EY=;
Message-ID: <3e9d5d0c-f68f-004e-06b7-c4f0452f1e64@xen.org>
Date: Mon, 7 Mar 2022 19:37:35 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [XEN v9 3/4] xen/arm64: io: Handle the abort due to access to
 stage1 translation table
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>,
 xen-devel@lists.xenproject.org
Cc: sstabellini@kernel.org, stefanos@xilinx.com, Volodymyr_Babchuk@epam.com,
 bertrand.marquis@arm.com, andrew.cooper3@citrix.com,
 george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org,
 roger.pau@citrix.com
References: <20220301124022.10168-1-ayankuma@xilinx.com>
 <20220301124022.10168-4-ayankuma@xilinx.com>
 <68acfbf0-f2c1-c52e-93a3-632f1286d90f@xen.org>
 <5d5b0fc1-6f47-dfc0-dca3-5d60483a6eae@xilinx.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <5d5b0fc1-6f47-dfc0-dca3-5d60483a6eae@xilinx.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit



On 07/03/2022 14:27, Ayan Kumar Halder wrote:
> Hi Julien,

Hi Ayan,

> 
> One clarification.
> 
> On 04/03/2022 10:39, Julien Grall wrote:
>> Hi Ayan,
>>
>> On 01/03/2022 12:40, Ayan Kumar Halder wrote:
>>> If the abort was caused due to access to stage1 translation table, Xen
>>> will assume that the stage1 translation table is in the non MMIO region.

Reading this commit message again. I think you want to explain why we 
want to do that because, from my understanding, this is technically not 
forbidden by the Arm Arm.

 From the previous discussion, we want to do this because we can't 
easily handle such fault on emulated region (we have no away to the 
walker the value read).

>>> It will try to resolve the translation fault. If it succeeds, it will
>>> return to the guest to retry the instruction. If not, then it means
>>> that the table is in MMIO region which is not expected by Xen. Thus,
>>> Xen will forward the abort to the guest.
>>>
>>> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
>>> ---
>>>
>>> Changelog :-
>>>
>>> v1..v8 - NA
>>>
>>> v9 - 1. Extracted this change from "[XEN v8 2/2] xen/arm64: io: Support
>>> instructions (for which ISS is not..." into a separate patch of its own.
>>> The reason being this is an existing bug in the codebase.
>>>
>>>   xen/arch/arm/io.c    | 11 +++++++++++
>>>   xen/arch/arm/traps.c | 12 +++++++++++-
>>>   2 files changed, 22 insertions(+), 1 deletion(-)
>>>
>>> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
>>> index bea69ffb08..ebcb8ed548 100644
>>> --- a/xen/arch/arm/io.c
>>> +++ b/xen/arch/arm/io.c
>>> @@ -128,6 +128,17 @@ void try_decode_instruction(const struct 
>>> cpu_user_regs *regs,
>>>           return;
>>>       }
>>>   +    /*
>>> +     * At this point, we know that the stage1 translation table is 
>>> in the MMIO
>>> +     * region. This is not expected by Xen and thus it forwards the 
>>> abort to the
>>
>> We don't know that. We only know that there are no corresponding valid 
>> mapping in the P2M. So the address may be part of an emulated MMIO 
>> region or invalid.
>>
>> For both cases, we will want to send an abort.
>>
>> Furthermore, I would say "emulated MMIO region" rather than MMIO 
>> region because the P2M can also contain MMIO mapping (we usually call 
>> then "direct MMIO").
> 
> Can I say MMIO region (to indicate both emulated and direct) ? The 
> reason being the assumption that stage1 page tables cannot be in the 
> MMIO region. And thus, when check_p2m() is invoked, we do not invoke 
> try_map_mmio(gaddr_to_gfn(gpa).
> 
> See this snippet :-
> 
>              if ( xabt.s1ptw )
>                  check_mmio_region = false;

Thinking a bit more of this. I would actually drop this check. We don't 
need to decode the instruction, so I don't think there are much benefits 
here to restrict access for direct MMIO. Did I miss anything?

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 20:53:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 20:53:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286413.485916 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRKMQ-0007QA-De; Mon, 07 Mar 2022 20:53:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286413.485916; Mon, 07 Mar 2022 20:53:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRKMQ-0007Q3-AN; Mon, 07 Mar 2022 20:53:42 +0000
Received: by outflank-mailman (input) for mailman id 286413;
 Mon, 07 Mar 2022 20:53:41 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=9NfF=TS=citrix.com=prvs=058fb9784=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nRKMP-0007Px-EY
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 20:53:41 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a898a0a6-9e58-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 21:53:39 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a898a0a6-9e58-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646686419;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=kGpvloH2UbvmNZsKLoVi6Ea5k+FfbGw44P7pdOUT/Vw=;
  b=PKbLKCUf+e9p7fmq7QESwJ+C+vtfFlUNGiXME2wuE89448nzMsEqSTDu
   5BJUzaQ8NACCYOzPTh7QWxeCMQT+0rhcKaqdI7aeO8W7GZs7OLZl+5L3+
   Ir9OfubJelbGjZ2injYMItWqAQtQ8w8JMZfXlFfV+Mmbri2d6nw9P7mlW
   s=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 65647635
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:KNy4L6hw+01ltNmAD51CKmyyX161cBAKZh0ujC45NGQN5FlHY01je
 htvWDrUM/yONGD9L9pyaYmx8UhXu8eEydFqHFdur3wyE3gb9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFvS4
 YiaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YQ0wGPzNkd4FahRdHHEiNL1j5ZXWcHfq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bklhmwSvUErANRpfbTr+RzdRZwC0xloZFGvO2i
 88xN2cxMEueOEAn1lE/LJ0nt9WrqCLDQxYDoXK+o5UMv0zRw1kkuFTqGIWMIYHbLSlPpW6Ho
 krW8mK/BQsVXPST1yCM+H+oruTGmz/yUsQUGaHQ3u5nhhify3IeDDUSVECnur+ph0imQdVdJ
 kcIvC00osAa1mamU938VB2Qu2Ofs1gXXN84LgEhwFjTkOyOuV/fXzVaCG4aADA7iCMobTYz8
 A6IlunxPDFqv+3JQGK4652F/DznbED5MlQ+TSMDSAIE5fzqr4cykg/DQ75fLUKlsjHmMWqum
 m7X9UDSk51W1JdWjPvjoTgrlhrx/sChc+Ij2unAsotJBCtdbZXtWYGn4EOzAR1ofNfAFQnpU
 JTpdqGjAAEy4XOlyXTlrAYlRujBCxO53Nv02wYH834JrWjFxpJbVdoMiAyS3W8wWir+RRfnY
 VXIpSRa74JJMX2hYMdfOtztVZp1nfW7TIS4DZg4i+aihLArL2drGwk0OSatM53FyhBwwcnTx
 7/BGSpTMZrqIfs+l2fnLwvs+bQq2jo/1QvuqWPTlHyaPU6lTCfNE98taQLWBshgtf/siFiFo
 r53aprRoz0CAbKWX8Ui2dNKRbz8BSNgXs6eRg0+XrPrHzeK70l6U66Bme56Itc990mX/8+Rl
 kyAtoZj4AKXrRX6xc+iMxiPtJuHsU5DkE8G
IronPort-HdrOrdr: A9a23:AHYWGKlMsYlrxmqXT/JykLdXdrvpDfIi3DAbv31ZSRFFG/Fxl6
 iV/cjzsiWE7gr5OUtQ/uxoV5PwIk80maQb3WBzB8bHYOCFghrLEGgK1+KLqFeMdxEWntQtrJ
 uIGJIfNDSfNzZHZL7BkWyFL+o=
X-IronPort-AV: E=Sophos;i="5.90,163,1643691600"; 
   d="scan'208";a="65647635"
From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Jan Beulich
	<JBeulich@suse.com>, =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?=
	<roger.pau@citrix.com>, Wei Liu <wl@xen.org>, David Vrabel
	<dvrabel@cantab.net>
Subject: [PATCH] x86/kexec: Fix kexec-reboot with CET active
Date: Mon, 7 Mar 2022 20:53:13 +0000
Message-ID: <20220307205313.31247-1-andrew.cooper3@citrix.com>
X-Mailer: git-send-email 2.11.0
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

The kexec_reloc() asm has an indirect jump to relocate onto the identity
trampoline.  While we clear CET in machine_crash_shutdown(), we fail to clear
CET for the non-crash path.  This in turn highlights that the same is true of
resetting the CPUID masking/faulting.

Move both pieces of logic from machine_crash_shutdown() to machine_kexec(),
the latter being common for all kexec transitions.  Adjust the condition for
CET being considered active to check in CR4, which is simpler and more robust.

Fixes: 311434bfc9d1 ("x86/setup: Rework MSR_S_CET handling for CET-IBT")
Fixes: b60ab42db2f0 ("x86/shstk: Activate Supervisor Shadow Stacks")
Fixes: 5ab9564c6fa1 ("x86/cpu: Context switch cpuid masks and faulting state in context_switch()")
Reported-by: David Vrabel (XXX which alias to use?)
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
---
CC: Jan Beulich <JBeulich@suse.com>
CC: Roger Pau Monné <roger.pau@citrix.com>
CC: Wei Liu <wl@xen.org>
CC: David Vrabel <dvrabel@cantab.net>
---
 xen/arch/x86/crash.c         | 10 ----------
 xen/arch/x86/machine_kexec.c | 10 ++++++++++
 2 files changed, 10 insertions(+), 10 deletions(-)

diff --git a/xen/arch/x86/crash.c b/xen/arch/x86/crash.c
index 003222c0f1ac..99089f77a7eb 100644
--- a/xen/arch/x86/crash.c
+++ b/xen/arch/x86/crash.c
@@ -187,16 +187,6 @@ void machine_crash_shutdown(void)
 
     nmi_shootdown_cpus();
 
-    /* Reset CPUID masking and faulting to the host's default. */
-    ctxt_switch_levelling(NULL);
-
-    /* Disable CET. */
-    if ( cpu_has_xen_shstk || cpu_has_xen_ibt )
-    {
-        wrmsrl(MSR_S_CET, 0);
-        write_cr4(read_cr4() & ~X86_CR4_CET);
-    }
-
     info = kexec_crash_save_info();
     info->xen_phys_start = xen_phys_start;
     info->dom0_pfn_to_mfn_frame_list_list =
diff --git a/xen/arch/x86/machine_kexec.c b/xen/arch/x86/machine_kexec.c
index 751a9efcaf6a..d83aa4e7e93b 100644
--- a/xen/arch/x86/machine_kexec.c
+++ b/xen/arch/x86/machine_kexec.c
@@ -156,6 +156,16 @@ void machine_kexec(struct kexec_image *image)
      */
     local_irq_disable();
 
+    /* Reset CPUID masking and faulting to the host's default. */
+    ctxt_switch_levelling(NULL);
+
+    /* Disable CET. */
+    if ( read_cr4() & X86_CR4_CET )
+    {
+        wrmsrl(MSR_S_CET, 0);
+        write_cr4(read_cr4() & ~X86_CR4_CET);
+    }
+
     /* Now regular interrupts are disabled, we need to reduce the impact
      * of interrupts not disabled by 'cli'.
      *
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 21:02:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 21:02:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286419.485926 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRKVJ-0000bW-9D; Mon, 07 Mar 2022 21:02:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286419.485926; Mon, 07 Mar 2022 21:02:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRKVJ-0000bP-67; Mon, 07 Mar 2022 21:02:53 +0000
Received: by outflank-mailman (input) for mailman id 286419;
 Mon, 07 Mar 2022 21:02:52 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=9NfF=TS=citrix.com=prvs=058fb9784=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nRKVH-0000bJ-V8
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 21:02:51 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f190700a-9e59-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 22:02:50 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f190700a-9e59-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646686970;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=pNlGbt4V5HJ0PnyQXkAlvafTRuvpg8Xp8j8Gs8biWjk=;
  b=D/yym/7lOVtRXKoJ5asTE8k7lT/VSi87GsTmzNrT6ZRZrnu0DnRV6vIj
   EdRHFVNuIs9+/7TWnAAYLhN/0gyGswgnL/pbz79wiJxvBybGSkUtKaXVv
   SF+5R4/hYeaTJkOsA6kY/OXnVHX7bfqRBZjMAWvhvtkTM4I4sHm3gjtZM
   Q=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 67998639
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:4YUFdqOO208u6NTvrR2il8FynXyQoLVcMsEvi/4bfWQNrUom02AFn
 GAZXDyCa6mKamXwKNokPo/go09X78TTm4Q2QAto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi2tEw2rBVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Z0
 ch0p6KMGQIVL4qRu94fbyhlPyBhIvgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALBc/nJo4A/FpnyinUF60OSpHfWaTao9Rf2V/cg+gQQqePN
 5RCOFKDajzfOB9WBHYVJqsRs9e6mV77TQ9mkV2a8P9fD2/7k1UqjemF3MDuUsOObdVYmACfv
 G2u10bTDwweNdef4SGY6X/qjejK9QvrVYRXGLCm+/pChFyI2ndVGBAQTUG8o/Sylgi5Qd03F
 qAP0nNw9+5orhXtF4SjGU3jyJKZgvICc8NNKv8E1FGI9rvzviWjBFQ1cxJAd8Nz4afaWgcW/
 lOOmtroAxlmv7uUVW+R+9+okN+iBcQGBTRcPHFZFGPp9/Gm+dhu1UyXEr6PBYbo1oWdJN3m/
 9ydQMHSbZ03hNVD6ai09Euvb9mE9smQFV5dCuk6swuYAuJFiGyNOtTABbvzt68owGOlor+p5
 iBsdy+2trxmMH11vHbRKNjh5Znwjxp/DBXSgER0A74q/Cm39niocOh4uW8iehk2YptfIG+0O
 yc/XD+9ArcJZxNGioctP+qM5zkCl/C8RbwJqNiOBjaxXnSBXFDep3w/DaJh92vsjFItgckC1
 WSzKq6R4YIhIf0/llKeHr5FuZdyn3xW7T6DFPjTkkX8uZLDNSH9dFvwGAbXBgzPxPjf+1u9H
 hc2H5bi9iizp8WlOniHqdNIdAtSRZX5bLivw/Fqmie4ClIOMAkc5zX5mO1Jl1BN90iNqtr1w
 w==
IronPort-HdrOrdr: A9a23:TpbXV6BgdpSbzNPlHemg55DYdb4zR+YMi2TC1yhKJyC9Ffbo8P
 xG/c5rsSMc5wxwZJhNo7y90cq7MBbhHPxOkOos1N6ZNWGM0gaVxelZnO3fKlbbehEWmNQz6U
 4ZSdkdNOHN
X-IronPort-AV: E=Sophos;i="5.90,163,1643691600"; 
   d="scan'208";a="67998639"
From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Jan Beulich
	<JBeulich@suse.com>, =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?=
	<roger.pau@citrix.com>, Wei Liu <wl@xen.org>
Subject: [PATCH] x86/kexec: Use noreturn attributes, and drop unreachable code
Date: Mon, 7 Mar 2022 21:02:10 +0000
Message-ID: <20220307210210.4261-1-andrew.cooper3@citrix.com>
X-Mailer: git-send-email 2.11.0
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

kexec_reloc() does not return.  Plumbing this property upwards lets us mark
machine_kexec() and machine_reboot_kexec() noreturn too.  This in turn lets us
drop some unreachable BUG()/return statements.

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
---
CC: Jan Beulich <JBeulich@suse.com>
CC: Roger Pau Monné <roger.pau@citrix.com>
CC: Wei Liu <wl@xen.org>
---
 xen/arch/x86/include/asm/machine_kexec.h | 7 ++++---
 xen/arch/x86/machine_kexec.c             | 5 ++---
 xen/common/kexec.c                       | 5 -----
 xen/include/xen/kexec.h                  | 4 ++--
 4 files changed, 8 insertions(+), 13 deletions(-)

diff --git a/xen/arch/x86/include/asm/machine_kexec.h b/xen/arch/x86/include/asm/machine_kexec.h
index d4880818c1d9..81fe95e091d1 100644
--- a/xen/arch/x86/include/asm/machine_kexec.h
+++ b/xen/arch/x86/include/asm/machine_kexec.h
@@ -4,10 +4,11 @@
 #define KEXEC_RELOC_FLAG_COMPAT 0x1 /* 32-bit image */
 
 #ifndef __ASSEMBLY__
+#include <xen/compiler.h>
 
-extern void kexec_reloc(unsigned long reloc_code, unsigned long reloc_pt,
-                        unsigned long ind_maddr, unsigned long entry_maddr,
-                        unsigned long flags);
+extern void noreturn kexec_reloc(
+    unsigned long reloc_code, unsigned long reloc_pt, unsigned long ind_maddr,
+    unsigned long entry_maddr, unsigned long flags);
 
 extern const char kexec_reloc_end[];
 
diff --git a/xen/arch/x86/machine_kexec.c b/xen/arch/x86/machine_kexec.c
index d83aa4e7e93b..d9b839f46401 100644
--- a/xen/arch/x86/machine_kexec.c
+++ b/xen/arch/x86/machine_kexec.c
@@ -138,15 +138,14 @@ void machine_kexec_unload(struct kexec_image *image)
     /* no-op. kimage_free() frees all control pages. */
 }
 
-void machine_reboot_kexec(struct kexec_image *image)
+void noreturn machine_reboot_kexec(struct kexec_image *image)
 {
     BUG_ON(smp_processor_id() != 0);
     smp_send_stop();
     machine_kexec(image);
-    BUG();
 }
 
-void machine_kexec(struct kexec_image *image)
+void noreturn machine_kexec(struct kexec_image *image)
 {
     int i;
     unsigned long reloc_flags = 0;
diff --git a/xen/common/kexec.c b/xen/common/kexec.c
index a2ffb6530cff..0c85f6171a98 100644
--- a/xen/common/kexec.c
+++ b/xen/common/kexec.c
@@ -391,8 +391,6 @@ void kexec_crash(enum crash_reason reason)
     kexec_crash_save_cpu();
     machine_crash_shutdown();
     machine_kexec(kexec_image[KEXEC_IMAGE_CRASH_BASE + pos]);
-
-    BUG();
 }
 
 static long cf_check kexec_reboot(void *_image)
@@ -403,9 +401,6 @@ static long cf_check kexec_reboot(void *_image)
 
     kexec_common_shutdown();
     machine_reboot_kexec(image);
-
-    BUG();
-    return 0;
 }
 
 static void cf_check do_crashdump_trigger(unsigned char key)
diff --git a/xen/include/xen/kexec.h b/xen/include/xen/kexec.h
index e66eb6a8e593..ff3531586a21 100644
--- a/xen/include/xen/kexec.h
+++ b/xen/include/xen/kexec.h
@@ -48,8 +48,8 @@ int machine_kexec_add_page(struct kexec_image *image, unsigned long vaddr,
 int machine_kexec_load(struct kexec_image *image);
 void machine_kexec_unload(struct kexec_image *image);
 void machine_kexec_reserved(xen_kexec_reserve_t *reservation);
-void machine_reboot_kexec(struct kexec_image *image);
-void machine_kexec(struct kexec_image *image);
+void noreturn machine_reboot_kexec(struct kexec_image *image);
+void noreturn machine_kexec(struct kexec_image *image);
 void kexec_crash(enum crash_reason reason);
 void kexec_crash_save_cpu(void);
 struct crash_xen_info *kexec_crash_save_info(void);
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Mon Mar 07 21:04:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 21:04:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286425.485938 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRKX9-0001BP-Kt; Mon, 07 Mar 2022 21:04:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286425.485938; Mon, 07 Mar 2022 21:04:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRKX9-0001BI-Ha; Mon, 07 Mar 2022 21:04:47 +0000
Received: by outflank-mailman (input) for mailman id 286425;
 Mon, 07 Mar 2022 21:04:45 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRKX7-0001B8-Sd; Mon, 07 Mar 2022 21:04:45 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRKX7-0005Bs-O8; Mon, 07 Mar 2022 21:04:45 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRKX7-0005J7-3Y; Mon, 07 Mar 2022 21:04:45 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRKX7-0008DG-34; Mon, 07 Mar 2022 21:04:45 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=3SEWvxoI+JiBkhuawRs1+3utIxYefDIy/Hmvya28pDg=; b=0ucm54Sq656Facsbt0WcOnwrB5
	d6IJZiQPO9IfJYcg42Gyfv71WkOD+DAUHv38uCwYYrqRHO+mevKmf15zIAdnBGD0/GeL5JUMGZyc4
	XSgK5XPRwPgWCx1b1wH65M//oc6DWNzF781dsyU+4JrfWewPnoUszICjCR6aAqJgRj6w=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168464-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168464: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=79f2734e5a7bc2e5256eb0e599f45407855159c7
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 07 Mar 2022 21:04:45 +0000

flight 168464 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168464/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 79f2734e5a7bc2e5256eb0e599f45407855159c7
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    7 days
Failing since        168258  2022-03-01 01:55:31 Z    6 days   73 attempts
Testing same since   168449  2022-03-07 02:15:20 Z    0 days   11 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 437 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 21:14:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 21:14:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286435.485949 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRKgA-0002my-IV; Mon, 07 Mar 2022 21:14:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286435.485949; Mon, 07 Mar 2022 21:14:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRKgA-0002mr-F9; Mon, 07 Mar 2022 21:14:06 +0000
Received: by outflank-mailman (input) for mailman id 286435;
 Mon, 07 Mar 2022 21:14:04 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=7T3K=TS=amazon.de=prvs=058ff0969=doebel@srs-se1.protection.inumbo.net>)
 id 1nRKg7-0002mi-RX
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 21:14:04 +0000
Received: from smtp-fw-80007.amazon.com (smtp-fw-80007.amazon.com
 [99.78.197.218]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 8213de39-9e5b-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 22:14:02 +0100 (CET)
Received: from pdx4-co-svc-p1-lb2-vlan2.amazon.com (HELO
 email-inbound-relay-iad-1e-90d70b14.us-east-1.amazon.com) ([10.25.36.210])
 by smtp-border-fw-80007.pdx80.corp.amazon.com with ESMTP;
 07 Mar 2022 21:13:45 +0000
Received: from EX13D44EUC004.ant.amazon.com
 (iad12-ws-svc-p26-lb9-vlan3.iad.amazon.com [10.40.163.38])
 by email-inbound-relay-iad-1e-90d70b14.us-east-1.amazon.com (Postfix) with
 ESMTPS id 904E4C0291; Mon,  7 Mar 2022 21:13:44 +0000 (UTC)
Received: from EX13MTAUEA002.ant.amazon.com (10.43.61.77) by
 EX13D44EUC004.ant.amazon.com (10.43.164.123) with Microsoft SMTP Server (TLS)
 id 15.0.1497.28; Mon, 7 Mar 2022 21:13:43 +0000
Received: from dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (10.13.240.106)
 by mail-relay.amazon.com (10.43.61.169) with Microsoft SMTP Server id
 15.0.1497.28 via Frontend Transport; Mon, 7 Mar 2022 21:13:42 +0000
Received: by dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (Postfix,
 from userid 3160037)
 id A90954EE8; Mon,  7 Mar 2022 21:13:42 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8213de39-9e5b-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646687642; x=1678223642;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=mFrgVhNsj4c8IoZQrXDavhurXkwYMmJ6wDR9NJBN97E=;
  b=FtOizd5skJkqMhMbyI2+VFJokLs7WDq74rssNTKEqZ1PC4pUZNPHEU12
   nO6k/u2OcrkPXpuVRj0rYl3GjKLBLbC77u2UzJznSqobkq/jByASc9feH
   WODOdLzd22FeklPZ7n1Aml0auzBzEz4GnxNU739NaxEvLuMfVkGhucWM8
   Y=;
X-IronPort-AV: E=Sophos;i="5.90,163,1643673600"; 
   d="scan'208";a="68788850"
From: Bjoern Doebel <doebel@amazon.de>
To: <xen-devel@lists.xenproject.org>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, Roger
 Pau Monne <roger.pau@citrix.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
	Bjoern Doebel <doebel@amazon.de>, Konrad Rzeszutek Wilk
	<konrad.wilk@oracle.com>, Ross Lagerwall <ross.lagerwall@citrix.com>
Subject: [PATCH v2 2/2] xen/x86: Livepatch: support patching CET-enhanced functions
Date: Mon, 7 Mar 2022 21:13:36 +0000
Message-ID: <862e888468a1d9923a6e6bef4061ac0caeb9274d.1646687495.git.doebel@amazon.de>
X-Mailer: git-send-email 2.32.0
In-Reply-To: <15b092bb3af6e32f72ee8fca45317687d23b8be4.1646687495.git.doebel@amazon.de>
References: <15b092bb3af6e32f72ee8fca45317687d23b8be4.1646687495.git.doebel@amazon.de>
MIME-Version: 1.0
Precedence: Bulk
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

Xen enabled CET for supporting architectures. The control flow aspect of
CET expects functions that can be called indirectly (i.e., via function
pointers) to start with an ENDBR64 instruction. Otherwise a control flow
exception is raised.

This expectation breaks livepatching flows because we patch functions by
overwriting their first 5 bytes with a JMP + <offset>, thus breaking the
ENDBR64. We fix this by checking the start of a patched function for
being ENDBR64. In the positive case we move the livepatch JMP to start
behind the ENDBR64 instruction.

To avoid having to guess the ENDBR64 offset again on patch reversal
(which might race with other mechanisms adding/removing ENDBR
dynamically), use the livepatch metadata to store the computed offset
along with the saved bytes of the overwritten function.

Signed-off-by: Bjoern Doebel <doebel@amazon.de>
CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
CC: Ross Lagerwall <ross.lagerwall@citrix.com>
----
Note that on top of livepatching functions, Xen supports an additional
mode where we can "remove" a function by overwriting it with NOPs. This
is only supported for functions up to 31 bytes in size and this patch
reduces this limit to 30 bytes.

Changes since r1:
* use sizeof_field() to avoid unused variable warning
---
 xen/arch/x86/livepatch.c | 61 ++++++++++++++++++++++++++++++++++------
 1 file changed, 53 insertions(+), 8 deletions(-)

diff --git a/xen/arch/x86/livepatch.c b/xen/arch/x86/livepatch.c
index 65530c1e57..d9c8c6410a 100644
--- a/xen/arch/x86/livepatch.c
+++ b/xen/arch/x86/livepatch.c
@@ -14,11 +14,29 @@
 #include <xen/vm_event.h>
 #include <xen/virtual_region.h>
 
+#include <asm/endbr.h>
 #include <asm/fixmap.h>
 #include <asm/nmi.h>
 #include <asm/livepatch.h>
 #include <asm/setup.h>
 
+/*
+ * CET hotpatching support: We may have functions starting with an ENDBR64
+ * instruction that MUST remain the first instruction of the function, hence
+ * we need to move any hotpatch trampoline further into the function. For that
+ * we need to keep track of the patching offset used for any loaded hotpatch
+ * (to avoid racing against other fixups adding/removing ENDBR64 or similar
+ * instructions).
+ *
+ * We do so by making use of the existing opaque metadata area. We use its
+ * first 4 bytes to track the offset into the function used for patching and
+ * the remainder of the data to store overwritten code bytes.
+ */
+struct x86_livepatch_meta {
+    uint8_t patch_offset;
+    uint8_t instruction[LIVEPATCH_OPAQUE_SIZE - sizeof(uint8_t)];
+};
+
 static bool has_active_waitqueue(const struct vm_event_domain *ved)
 {
     /* ved may be xzalloc()'d without INIT_LIST_HEAD() yet. */
@@ -104,18 +122,34 @@ void noinline arch_livepatch_revive(void)
 
 int arch_livepatch_verify_func(const struct livepatch_func *func)
 {
+    BUILD_BUG_ON(sizeof(struct x86_livepatch_meta) != LIVEPATCH_OPAQUE_SIZE);
+
     /* If NOPing.. */
     if ( !func->new_addr )
     {
         /* Only do up to maximum amount we can put in the ->opaque. */
-        if ( func->new_size > sizeof(func->opaque) )
+        if ( func->new_size > sizeof_field(struct x86_livepatch_meta,
+                                           instruction) )
             return -EOPNOTSUPP;
 
         if ( func->old_size < func->new_size )
             return -EINVAL;
     }
-    else if ( func->old_size < ARCH_PATCH_INSN_SIZE )
-        return -EINVAL;
+    else
+    {
+        /*
+         * Space needed now depends on whether the target function
+         * starts with an ENDBR64 instruction.
+         */
+        uint8_t needed;
+
+        needed = ARCH_PATCH_INSN_SIZE;
+        if ( is_endbr64(func->old_addr) )
+            needed += ENDBR64_LEN;
+
+        if ( func->old_size < needed )
+            return -EINVAL;
+    }
 
     return 0;
 }
@@ -127,15 +161,21 @@ int arch_livepatch_verify_func(const struct livepatch_func *func)
 void noinline arch_livepatch_apply(struct livepatch_func *func)
 {
     uint8_t *old_ptr;
-    uint8_t insn[sizeof(func->opaque)];
+    struct x86_livepatch_meta *lp;
+    uint8_t insn[sizeof(lp->instruction)];
     unsigned int len;
 
+    lp = (struct x86_livepatch_meta *)func->opaque;
+    lp->patch_offset = 0;
     old_ptr = func->old_addr;
     len = livepatch_insn_len(func);
     if ( !len )
         return;
 
-    memcpy(func->opaque, old_ptr, len);
+    if ( is_endbr64(old_ptr) )
+        lp->patch_offset += ENDBR64_LEN;
+
+    memcpy(lp->instruction, old_ptr + lp->patch_offset, len);
     if ( func->new_addr )
     {
         int32_t val;
@@ -143,14 +183,15 @@ void noinline arch_livepatch_apply(struct livepatch_func *func)
         BUILD_BUG_ON(ARCH_PATCH_INSN_SIZE != (1 + sizeof(val)));
 
         insn[0] = 0xe9; /* Relative jump. */
-        val = func->new_addr - func->old_addr - ARCH_PATCH_INSN_SIZE;
+        val = func->new_addr - (func->old_addr + lp->patch_offset
+                                + ARCH_PATCH_INSN_SIZE);
 
         memcpy(&insn[1], &val, sizeof(val));
     }
     else
         add_nops(insn, len);
 
-    memcpy(old_ptr, insn, len);
+    memcpy(old_ptr + lp->patch_offset, insn, len);
 }
 
 /*
@@ -159,7 +200,11 @@ void noinline arch_livepatch_apply(struct livepatch_func *func)
  */
 void noinline arch_livepatch_revert(const struct livepatch_func *func)
 {
-    memcpy(func->old_addr, func->opaque, livepatch_insn_len(func));
+    struct x86_livepatch_meta *lp;
+
+    lp = (struct x86_livepatch_meta *)func->opaque;
+
+    memcpy(func->old_addr + lp->patch_offset, lp->instruction, livepatch_insn_len(func));
 }
 
 /*
-- 
2.32.0




Amazon Development Center Germany GmbH
Krausenstr. 38
10117 Berlin
Geschaeftsfuehrung: Christian Schlaeger, Jonathan Weiss
Eingetragen am Amtsgericht Charlottenburg unter HRB 149173 B
Sitz: Berlin
Ust-ID: DE 289 237 879





From xen-devel-bounces@lists.xenproject.org Mon Mar 07 22:11:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 22:11:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286445.485960 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRLZq-00011i-RK; Mon, 07 Mar 2022 22:11:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286445.485960; Mon, 07 Mar 2022 22:11:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRLZq-00011b-NO; Mon, 07 Mar 2022 22:11:38 +0000
Received: by outflank-mailman (input) for mailman id 286445;
 Mon, 07 Mar 2022 22:11:37 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=pTMl=TS=cantab.net=dvrabel@srs-se1.protection.inumbo.net>)
 id 1nRLZp-00011V-QG
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 22:11:37 +0000
Received: from smarthost01a.sbp.mail.zen.net.uk
 (smarthost01a.sbp.mail.zen.net.uk [212.23.1.1])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 8dbbe816-9e63-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 23:11:36 +0100 (CET)
Received: from [82.70.146.41] (helo=pear.davidvrabel.org.uk)
 by smarthost01a.sbp.mail.zen.net.uk with esmtps
 (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1)
 (envelope-from <dvrabel@cantab.net>)
 id 1nRLZm-0002r4-Ql; Mon, 07 Mar 2022 22:11:34 +0000
Received: from apple.davidvrabel.org.uk ([82.70.146.43])
 by pear.davidvrabel.org.uk with esmtp (Exim 4.92)
 (envelope-from <dvrabel@cantab.net>)
 id 1nRLZl-0006j5-Mf; Mon, 07 Mar 2022 22:11:34 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8dbbe816-9e63-11ec-8eba-a37418f5ba1a
Message-ID: <445970ed-4237-4bba-6701-b7223e93ae12@cantab.net>
Date: Mon, 7 Mar 2022 22:11:34 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Content-Language: en-GB
To: Andrew Cooper <andrew.cooper3@citrix.com>,
 Xen-devel <xen-devel@lists.xenproject.org>
Cc: Jan Beulich <JBeulich@suse.com>, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?=
 <roger.pau@citrix.com>, Wei Liu <wl@xen.org>
References: <20220307205313.31247-1-andrew.cooper3@citrix.com>
From: David Vrabel <dvrabel@cantab.net>
In-Reply-To: <20220307205313.31247-1-andrew.cooper3@citrix.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-SA-Exim-Connect-IP: 82.70.146.43
X-SA-Exim-Mail-From: dvrabel@cantab.net
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on
	pear.davidvrabel.org.uk
X-Spam-Level: 
X-Spam-Status: No, score=-1.2 required=5.0 tests=BAYES_00,SPF_SOFTFAIL
	autolearn=no autolearn_force=no version=3.4.2
Subject: Re: [PATCH] x86/kexec: Fix kexec-reboot with CET active
X-SA-Exim-Version: 4.2.1 (built Wed, 08 May 2019 21:11:16 +0000)
X-SA-Exim-Scanned: Yes (on pear.davidvrabel.org.uk)
X-Originating-smarthost01a-IP: [82.70.146.41]
Feedback-ID: 82.70.146.41

On 07/03/2022 20:53, Andrew Cooper wrote:
> The kexec_reloc() asm has an indirect jump to relocate onto the identity
> trampoline.  While we clear CET in machine_crash_shutdown(), we fail to clear
> CET for the non-crash path.  This in turn highlights that the same is true of
> resetting the CPUID masking/faulting.
> 
> Move both pieces of logic from machine_crash_shutdown() to machine_kexec(),
> the latter being common for all kexec transitions.  Adjust the condition for
> CET being considered active to check in CR4, which is simpler and more robust.

Reviewed-by: David Vrabel <dvrabel@amazon.co.uk>

> Fixes: 311434bfc9d1 ("x86/setup: Rework MSR_S_CET handling for CET-IBT")
> Fixes: b60ab42db2f0 ("x86/shstk: Activate Supervisor Shadow Stacks")
> Fixes: 5ab9564c6fa1 ("x86/cpu: Context switch cpuid masks and faulting state in context_switch()")
> Reported-by: David Vrabel (XXX which alias to use?)

Amazon, please.

David


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 22:23:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 22:23:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286454.485971 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRLlA-0002gC-2d; Mon, 07 Mar 2022 22:23:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286454.485971; Mon, 07 Mar 2022 22:23:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRLl9-0002g5-V2; Mon, 07 Mar 2022 22:23:19 +0000
Received: by outflank-mailman (input) for mailman id 286454;
 Mon, 07 Mar 2022 22:23:18 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=bwGU=TS=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nRLl8-0002fz-OZ
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 22:23:18 +0000
Received: from NAM10-DM6-obe.outbound.protection.outlook.com
 (mail-dm6nam10on2060f.outbound.protection.outlook.com
 [2a01:111:f400:7e88::60f])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2eb4085b-9e65-11ec-8eba-a37418f5ba1a;
 Mon, 07 Mar 2022 23:23:17 +0100 (CET)
Received: from DM6PR21CA0005.namprd21.prod.outlook.com (2603:10b6:5:174::15)
 by CH2PR02MB6294.namprd02.prod.outlook.com (2603:10b6:610:e::18) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Mon, 7 Mar
 2022 22:23:10 +0000
Received: from DM3NAM02FT050.eop-nam02.prod.protection.outlook.com
 (2603:10b6:5:174:cafe::7a) by DM6PR21CA0005.outlook.office365.com
 (2603:10b6:5:174::15) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.5 via Frontend
 Transport; Mon, 7 Mar 2022 22:23:10 +0000
Received: from xir-pvapexch02.xlnx.xilinx.com (149.199.80.198) by
 DM3NAM02FT050.mail.protection.outlook.com (10.13.5.53) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5038.14 via Frontend Transport; Mon, 7 Mar 2022 22:23:10 +0000
Received: from xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) by
 xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Mon, 7 Mar 2022 22:23:09 +0000
Received: from smtp.xilinx.com (172.21.105.197) by
 xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Mon, 7 Mar 2022 22:23:09 +0000
Received: from [10.71.118.47] (port=65347)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nRLkx-0007Pz-Rz; Mon, 07 Mar 2022 22:23:08 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2eb4085b-9e65-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=de9HuMKG0O5yefaIPt+94kyLY3WjtdgsnsafL9LiGqvZ2VEs49C05a10wZtJiGWGMVn3gNMVYqMBD3/wpZLtGi0kSQl1qyZ+8rY+LgNXoMmnh0TbMyrjO5qyYX6TR0aJh20ruxJRSSA55xoTM8uIKBu7DCLCDe5l9EsSpeOoJABThpQ67b+iSsC0R/rrs4OJwK5PYmBQF7STViRzkXGNSmVS7VQsnDEwzIZEDouqCZWXZeNPzgJV6PtLHO/Ni0H9Ub9WcTWo2bxA2X0NBLpfv0ceyWLqG9z8B/+cEFGaVRbeGEyn703n3V5CR2wgqaw6dLRx3kIyoMP7y7p/ys6zVw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=xPch9ewswf0FAvWG5bQkDwgAjlT3Qem9cNaXnNbglBw=;
 b=AMkR4ahnnA2QFNhBZ/JG2h+JLFSSe4tpaVki5/EYykSxoSSyO/2YqDUttBxvoeFuUzM8gC2EuQ7SRJRkZOJ0EzgJc6ml1na1WKldseBvocgPFaLJ9pPok4G6Vkq/pr0T7j/Z3mhWRpuDFLmYiw9aC04VQa3CvmfSVYDcy3K9MwMRw4UbQyV+9SsN8WfFiOMiXmv6Z+vuQ8wPMusXKF5vdQS2TiThV9OzTwiCL0ntq6M6zpOhfNOanV3sLr6QIcpKyMr+8ZMb+eeT2lvdIi0Hqn3I8TgPqcxTGQFDbIVkCDhCvqKzas3E7dEzMjLOT05DmhvD5xvzCD0X8JT9Zd1AvA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=xen.org smtp.mailfrom=xilinx.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=xilinx.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=xPch9ewswf0FAvWG5bQkDwgAjlT3Qem9cNaXnNbglBw=;
 b=nFV+80KQbYxokwNQDC/neNre/6+6XhbiK7FXCBwtk5jBmgP5xMMxYscQRhaZfgUd+vwPe3BSjb0XJxLlJH/+ugL/TmD8SCO8sF9ggrctQAQamqJfyWTMnpboghmrJ/KxN5gX0yWtU89inlgC9hpq89syEcqU/nIpo32NJAORFtM=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch02.xlnx.xilinx.com;
Message-ID: <124726df-eafe-014a-ea9a-f97e0921eccc@xilinx.com>
Date: Mon, 7 Mar 2022 22:23:07 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Subject: Re: [XEN v9 3/4] xen/arm64: io: Handle the abort due to access to
 stage1 translation table
To: Julien Grall <julien@xen.org>, Ayan Kumar Halder
	<ayan.kumar.halder@xilinx.com>, <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <stefanos@xilinx.com>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>
References: <20220301124022.10168-1-ayankuma@xilinx.com>
 <20220301124022.10168-4-ayankuma@xilinx.com>
 <68acfbf0-f2c1-c52e-93a3-632f1286d90f@xen.org>
 <5d5b0fc1-6f47-dfc0-dca3-5d60483a6eae@xilinx.com>
 <3e9d5d0c-f68f-004e-06b7-c4f0452f1e64@xen.org>
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
In-Reply-To: <3e9d5d0c-f68f-004e-06b7-c4f0452f1e64@xen.org>
Content-Type: text/plain; charset="UTF-8"; format=flowed
Content-Transfer-Encoding: 8bit
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 9be99591-988f-4295-3244-08da00890ff3
X-MS-TrafficTypeDiagnostic: CH2PR02MB6294:EE_
X-Microsoft-Antispam-PRVS:
	<CH2PR02MB6294E19EB4F295F6DBAD4E03B2089@CH2PR02MB6294.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch02.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(4326008)(26005)(8936002)(336012)(9786002)(53546011)(8676002)(54906003)(7416002)(40460700003)(5660300002)(186003)(426003)(83380400001)(36756003)(31696002)(110136005)(31686004)(2616005)(356005)(7636003)(2906002)(36860700001)(82310400004)(508600001)(70586007)(70206006)(47076005)(316002)(50156003)(43740500002)(473944003);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Mar 2022 22:23:10.2118
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 9be99591-988f-4295-3244-08da00890ff3
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch02.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DM3NAM02FT050.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH2PR02MB6294


On 07/03/2022 19:37, Julien Grall wrote:
>
>
> On 07/03/2022 14:27, Ayan Kumar Halder wrote:
>> Hi Julien,
>
> Hi Ayan,

Hi Julien,

I need a bit of clarification to understand this.

>
>>
>> One clarification.
>>
>> On 04/03/2022 10:39, Julien Grall wrote:
>>> Hi Ayan,
>>>
>>> On 01/03/2022 12:40, Ayan Kumar Halder wrote:
>>>> If the abort was caused due to access to stage1 translation table, Xen
>>>> will assume that the stage1 translation table is in the non MMIO 
>>>> region.
>
> Reading this commit message again. I think you want to explain why we 
> want to do that because, from my understanding, this is technically 
> not forbidden by the Arm Arm.
>
> From the previous discussion, we want to do this because we can't 
> easily handle such fault on emulated region (we have no away to the 
> walker the value read).

Sorry, Can you explain this a bit more ? Do you mean that if the page 
table is located in the emulated region, map_domain_page() (called from 
p2m_next_level()) will fail.

But for emulated region, shouldn't pages be already mapped for Xen to 
access them ?

>
>>>> It will try to resolve the translation fault. If it succeeds, it will
>>>> return to the guest to retry the instruction. If not, then it means
>>>> that the table is in MMIO region which is not expected by Xen. Thus,
>>>> Xen will forward the abort to the guest.
>>>>
>>>> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
>>>> ---
>>>>
>>>> Changelog :-
>>>>
>>>> v1..v8 - NA
>>>>
>>>> v9 - 1. Extracted this change from "[XEN v8 2/2] xen/arm64: io: 
>>>> Support
>>>> instructions (for which ISS is not..." into a separate patch of its 
>>>> own.
>>>> The reason being this is an existing bug in the codebase.
>>>>
>>>>   xen/arch/arm/io.c    | 11 +++++++++++
>>>>   xen/arch/arm/traps.c | 12 +++++++++++-
>>>>   2 files changed, 22 insertions(+), 1 deletion(-)
>>>>
>>>> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
>>>> index bea69ffb08..ebcb8ed548 100644
>>>> --- a/xen/arch/arm/io.c
>>>> +++ b/xen/arch/arm/io.c
>>>> @@ -128,6 +128,17 @@ void try_decode_instruction(const struct 
>>>> cpu_user_regs *regs,
>>>>           return;
>>>>       }
>>>>   +    /*
>>>> +     * At this point, we know that the stage1 translation table is 
>>>> in the MMIO
>>>> +     * region. This is not expected by Xen and thus it forwards 
>>>> the abort to the
>>>
>>> We don't know that. We only know that there are no corresponding 
>>> valid mapping in the P2M. So the address may be part of an emulated 
>>> MMIO region or invalid.
>>>
>>> For both cases, we will want to send an abort.
>>>
>>> Furthermore, I would say "emulated MMIO region" rather than MMIO 
>>> region because the P2M can also contain MMIO mapping (we usually 
>>> call then "direct MMIO").
>>
>> Can I say MMIO region (to indicate both emulated and direct) ? The 
>> reason being the assumption that stage1 page tables cannot be in the 
>> MMIO region. And thus, when check_p2m() is invoked, we do not invoke 
>> try_map_mmio(gaddr_to_gfn(gpa).
>>
>> See this snippet :-
>>
>>              if ( xabt.s1ptw )
>>                  check_mmio_region = false;
>
> Thinking a bit more of this. I would actually drop this check. We 
> don't need to decode the instruction, so I don't think there are much 
> benefits here to restrict access for direct MMIO. Did I miss anything?
>
Can Linux or any OS keep its page tables in the direct MMIO space ? If 
yes, then try_map_mmio() needs to be invoked to map the region, so that 
OS can access it. If not, then Xen needs to return abort because the OS 
may be behaving maliciously.

My understanding from previous discussion was that it does not make 
sense for linux or any OS to keep its page tables in any MMIO region 
(emulated or direct). Please correct me if mistaken.

- Ayan

> Cheers,
>


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 22:56:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 22:56:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286460.485982 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRMH5-0006Ko-Fb; Mon, 07 Mar 2022 22:56:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286460.485982; Mon, 07 Mar 2022 22:56:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRMH5-0006Kh-BJ; Mon, 07 Mar 2022 22:56:19 +0000
Received: by outflank-mailman (input) for mailman id 286460;
 Mon, 07 Mar 2022 22:56:18 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRMH4-0006KX-3u; Mon, 07 Mar 2022 22:56:18 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRMH3-00077t-VX; Mon, 07 Mar 2022 22:56:17 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRMH3-00023z-Cy; Mon, 07 Mar 2022 22:56:17 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRMH3-0007Cc-CZ; Mon, 07 Mar 2022 22:56:17 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=vHlHjUw6N2f4dLZdwPUa4aZXUNOj8Hnh6r6541/S+dc=; b=FTZPY0yBb1jnr47r4yS6wg0moh
	ZMTcimVq1Jgo2j0ZNuc/tBlyk5PZlii3hWYK01HFm05vaw2gYg/pUbS7hkGoh829MaI0k3eYB7Imv
	LUo/NHToGgaTkLD5fu2JIGyADOgkm4EbVF1VEb7IG815Wg7OkhA/OM5BMvwY63uP8taY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168468-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168468: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=af74efe494c5920c7992b543fada1af2b186bd8c
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 07 Mar 2022 22:56:17 +0000

flight 168468 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168468/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 af74efe494c5920c7992b543fada1af2b186bd8c
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    7 days
Failing since        168258  2022-03-01 01:55:31 Z    6 days   74 attempts
Testing same since   168468  2022-03-07 21:10:24 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 454 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 22:58:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 22:58:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286472.485992 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRMJ7-00074U-Sr; Mon, 07 Mar 2022 22:58:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286472.485992; Mon, 07 Mar 2022 22:58:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRMJ7-00074N-Oz; Mon, 07 Mar 2022 22:58:25 +0000
Received: by outflank-mailman (input) for mailman id 286472;
 Mon, 07 Mar 2022 22:58:25 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=AqIR=TS=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nRMJ6-00074D-Uj
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 22:58:24 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 167f06ca-9e6a-11ec-8539-5f4723681683;
 Mon, 07 Mar 2022 23:58:23 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id A0DB9611A9;
 Mon,  7 Mar 2022 22:58:21 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id A1C1EC340E9;
 Mon,  7 Mar 2022 22:58:20 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 167f06ca-9e6a-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646693901;
	bh=rUOFJ6HEoRWrFN/T2umu29Kzt0fUu5GhqRNkFJns+54=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=lakFENFFm1oyXbGmYuDsLwdoK6FaJ9asxAcx5nqpS+SzyL8UdzX7PsYk8g5gxXfAs
	 acpA+P+xxyK1dYOScCJJ0uYqdnhK5P9ZPMvFzRgde2T5vdc6BNjwcqJzpJ4SWABJKo
	 QBTMoSx4BZNfIzfKyHLGrJpBvIKgYatSXqEyFCbwSdS/fsEaN6WKYTMnatAR6A99ZY
	 jggRdivqP9MRIDrNT+sDgzSWV5eQhvElxFWh7sCb8gpLpwfvLf+DgKujDwX38QXW62
	 iwK5TnvjwfKRvF6A6Baw89kPak5TUesNOhpNeUNqXMkNpww6eMV/3nKs8ULDaEhz+K
	 2NMRLbVKQ90EA==
Date: Mon, 7 Mar 2022 14:58:20 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Wei Chen <Wei.Chen@arm.com>
cc: Julien Grall <julien@xen.org>, 
    "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, 
    Stefano Stabellini <sstabellini@kernel.org>, 
    Bertrand Marquis <Bertrand.Marquis@arm.com>, 
    Penny Zheng <Penny.Zheng@arm.com>, Henry Wang <Henry.Wang@arm.com>, 
    nd <nd@arm.com>
Subject: RE: Proposal for Porting Xen to Armv8-R64 - DraftA
In-Reply-To: <PAXPR08MB7420827063D47932F428CEC89E089@PAXPR08MB7420.eurprd08.prod.outlook.com>
Message-ID: <alpine.DEB.2.22.394.2203071348220.3261@ubuntu-linux-20-04-desktop>
References: <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com> <04db7e8b-2f04-41d7-1deb-d8bda3625c04@xen.org> <PAXPR08MB7420BF1299A1577B98211C1A9E029@PAXPR08MB7420.eurprd08.prod.outlook.com> <1f0bba54-158b-d171-6f99-0c29e0547f8a@xen.org>
 <PAXPR08MB742067028155B11528C5CCA39E049@PAXPR08MB7420.eurprd08.prod.outlook.com> <PAXPR08MB7420827063D47932F428CEC89E089@PAXPR08MB7420.eurprd08.prod.outlook.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Mon, 7 Mar 2022, Wei Chen wrote:
> > > On 01/03/2022 07:51, Wei Chen wrote:
> > > >>> ### 1.2. Xen Challenges with PMSA Virtualization
> > > >>> Xen is PMSA unaware Type-1 Hypervisor, it will need modifications to
> > > run
> > > >>> with an MPU and host multiple guest OSes.
> > > >>>
> > > >>> - No MMU at EL2:
> > > >>>       - No EL2 Stage 1 address translation
> > > >>>           - Xen provides fixed ARM64 virtual memory layout as basis
> > of
> > > >> EL2
> > > >>>             stage 1 address translation, which is not applicable on
> > > MPU
> > > >> system,
> > > >>>             where there is no virtual addressing. As a result, any
> > > >> operation
> > > >>>             involving transition from PA to VA, like ioremap, needs
> > > >> modification
> > > >>>             on MPU system.
> > > >>>       - Xen's run-time addresses are the same as the link time
> > > addresses.
> > > >>>           - Enable PIC (position-independent code) on a real-time
> > > target
> > > >>>             processor probably very rare.
> > > >>
> > > >> Aside the assembly boot code and UEFI stub, Xen already runs at the
> > > same
> > > >> address as it was linked.
> > > >>
> > > >
> > > > But the difference is that, base on MMU, we can use the same link
> > > address
> > > > for all platforms. But on MPU system, we can't do it in the same way.
> > >
> > > I agree that we currently use the same link address for all the
> > > platforms. But this is also a problem when using MMU because EL2 has a
> > > single TTBR.
> > >
> > > At the moment we are switching page-tables with the MMU which is not
> > > safe. Instead we need to turn out the MMU off, switch page-tables and
> > > then turn on the MMU. This means we need to have an identity mapping of
> > > Xen in the page-tables. Assuming Xen is not relocated, the identity
> > > mapping may clash with Xen (or the rest of the virtual address map).
> > >
> > 
> > Is this the same reason we create a dummy reloc section for EFI loader?
> > 
> > > My initial idea was to enable PIC and update the relocation at boot
> > > time. But this is a bit cumbersome to do. So now I am looking to have a
> > > semi-dynamic virtual layout and find some place to relocate part of Xen
> > > to use for CPU bring-up.
> > >
> > > Anyway, my point is we possibly could look at PIC if that could allow
> > > generic Xen image.
> > >
> > 
> > I understand your concern. IMO, PIC is possible to do this, but obviously,
> > it's not a small amount of work. And I want to hear some suggestions from
> > Stefano, because he also has some solutions in previous thread.
> >
> 
> Can you have a look at the PIC discussion between Julien and me?
> I think we may need some inputs from your view.

If we have to have a build-time device tree anyway, we could
automatically generate the link address, together with other required
addresses. There would little benefit to do PIC if we have to have a
build-time device tree in any case.

On the other hand, if we could get rid of the build-time device tree
altogether, then yes doing PIC provides some benefits. It would allow us
to have single Xen binary working on multiple Cortex-R boards. However,
I don't think that would be important from a user perspective. People
will not install Ubuntu on a Cortex-R and apt-get xen.  The target is
embedded: users will know from the start the board they will target, so
it would not be a problem for them to build Xen for a specific board.
ImageBuilder (or something like it) will still be required to generate
boot scripts and boot info. In other words, although it would be
convenient to produce a generic binary, it is not a must-have feature
and I would consider it low-priority compared to others.


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 23:23:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 23:23:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286487.486037 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRMhE-0002Q8-AK; Mon, 07 Mar 2022 23:23:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286487.486037; Mon, 07 Mar 2022 23:23:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRMhE-0002Px-39; Mon, 07 Mar 2022 23:23:20 +0000
Received: by outflank-mailman (input) for mailman id 286487;
 Mon, 07 Mar 2022 23:23:18 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRMhC-0002Pg-Fr; Mon, 07 Mar 2022 23:23:18 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRMhC-0007az-Dc; Mon, 07 Mar 2022 23:23:18 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRMhC-0003jG-1v; Mon, 07 Mar 2022 23:23:18 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRMhC-0003Aj-1T; Mon, 07 Mar 2022 23:23:18 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=a4Q593DhYuoTJf/T2xgEUrXrJ0QLs1njyH+3do8gGPk=; b=xzriDPV/JMpsLkyETeNmGTHBZ1
	M1qO/9guLYnOYx0ZdLtvz4XKqtAS7spAF87wOVctPBKJdVDLlPc8a1KTTPYa5qMAJzAk2hXPtpn4l
	VyGEif9c17BZTCbBiozT4LvHVGm+VoTZ7Is0QLqfGgRqKMsZmA2Ru4f/mxi2MhGOO1ZY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168460-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168460: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-unstable:test-amd64-i386-xl-qemut-debianhvm-i386-xsm:debian-hvm-install:fail:heisenbug
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=4cb8d7a06752b368a365e30117f535a2fdad3963
X-Osstest-Versions-That:
    xen=1145d94c738ea13e0d2ceedb97a4cfe46292b08e
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 07 Mar 2022 23:23:18 +0000

flight 168460 xen-unstable real [real]
flight 168467 xen-unstable real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168460/
http://logs.test-lab.xenproject.org/osstest/logs/168467/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm 12 debian-hvm-install fail pass in 168467-retest

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168448
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168448
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168448
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168448
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168448
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168448
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168448
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168448
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168448
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168448
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168448
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168448
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  4cb8d7a06752b368a365e30117f535a2fdad3963
baseline version:
 xen                  1145d94c738ea13e0d2ceedb97a4cfe46292b08e

Last test of basis   168448  2022-03-07 01:51:48 Z    0 days
Testing same since   168460  2022-03-07 13:08:06 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Andrew Morton <akpm@linux-foundation.org>
  Daniel Walker <danielwa@cisco.com>
  Gao Xiang <hsiangkao@linux.alibaba.com>
  Jan Beulich <jbeulich@suse.com>
  Jiri Kosina <jkosina@suse.cz>
  Lasse Collin <lasse.collin@tukaani.org>
  Linus Torvalds <torvalds@linux-foundation.org>
  Zhen Lei <thunder.leizhen@huawei.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  fail    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   1145d94c73..4cb8d7a067  4cb8d7a06752b368a365e30117f535a2fdad3963 -> master


From xen-devel-bounces@lists.xenproject.org Mon Mar 07 23:59:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 07 Mar 2022 23:59:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286499.486047 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRNGB-0006MY-5s; Mon, 07 Mar 2022 23:59:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286499.486047; Mon, 07 Mar 2022 23:59:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRNGB-0006MR-2M; Mon, 07 Mar 2022 23:59:27 +0000
Received: by outflank-mailman (input) for mailman id 286499;
 Mon, 07 Mar 2022 23:59:25 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nRNG9-0006ML-Lu
 for xen-devel@lists.xenproject.org; Mon, 07 Mar 2022 23:59:25 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRNG8-00089H-TB; Mon, 07 Mar 2022 23:59:24 +0000
Received: from [81.187.162.82] (helo=[10.0.1.102])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRNG8-0006uW-Md; Mon, 07 Mar 2022 23:59:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:Subject:
	From:References:Cc:To:MIME-Version:Date:Message-ID;
	bh=BWsMzbvRIxFE82a/I4uJEqqoAmkTlXHXC5TG/mv+mbY=; b=FFgciRrOWKErsHaxA0nTuHKuJU
	ss5X+pXeug0Ung+75gYE81LAZwod5tOJSOnTOPXD31u7tC6Ba1AdllI8SuQgWyxOIcnMUf6M4jb05
	dQrE0F5i6VyTq6V8PRjUJlWAqwSSXDDGiNdhz9M/UW+3d7GQN6CTZlxLdywukGKO/TFY=;
Message-ID: <6c4e63e4-4f9f-68f4-5e4e-f69cf6567e1a@xen.org>
Date: Mon, 7 Mar 2022 23:59:07 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>,
 xen-devel@lists.xenproject.org
Cc: sstabellini@kernel.org, stefanos@xilinx.com, Volodymyr_Babchuk@epam.com,
 bertrand.marquis@arm.com, andrew.cooper3@citrix.com,
 george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org,
 roger.pau@citrix.com
References: <20220301124022.10168-1-ayankuma@xilinx.com>
 <20220301124022.10168-4-ayankuma@xilinx.com>
 <68acfbf0-f2c1-c52e-93a3-632f1286d90f@xen.org>
 <5d5b0fc1-6f47-dfc0-dca3-5d60483a6eae@xilinx.com>
 <3e9d5d0c-f68f-004e-06b7-c4f0452f1e64@xen.org>
 <124726df-eafe-014a-ea9a-f97e0921eccc@xilinx.com>
From: Julien Grall <julien@xen.org>
Subject: Re: [XEN v9 3/4] xen/arm64: io: Handle the abort due to access to
 stage1 translation table
In-Reply-To: <124726df-eafe-014a-ea9a-f97e0921eccc@xilinx.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi,

On 07/03/2022 22:23, Ayan Kumar Halder wrote:
> 
> On 07/03/2022 19:37, Julien Grall wrote:
>>
>>
>> On 07/03/2022 14:27, Ayan Kumar Halder wrote:
>>> Hi Julien,
>>
>> Hi Ayan,
> 
> Hi Julien,
> 
> I need a bit of clarification to understand this.
> 
>>
>>>
>>> One clarification.
>>>
>>> On 04/03/2022 10:39, Julien Grall wrote:
>>>> Hi Ayan,
>>>>
>>>> On 01/03/2022 12:40, Ayan Kumar Halder wrote:
>>>>> If the abort was caused due to access to stage1 translation table, Xen
>>>>> will assume that the stage1 translation table is in the non MMIO 
>>>>> region.
>>
>> Reading this commit message again. I think you want to explain why we 
>> want to do that because, from my understanding, this is technically 
>> not forbidden by the Arm Arm.
>>
>> From the previous discussion, we want to do this because we can't 
>> easily handle such fault on emulated region (we have no away to the 
>> walker the value read).
> 
> Sorry, Can you explain this a bit more ? Do you mean that if the page 
> table is located in the emulated region, map_domain_page() (called from 
> p2m_next_level()) will fail.

For data abort with valid syndrome, you will have a register to write 
back the value read. When the data abort has s1ptw == 1, AFAICT, we have 
no information how to return the value.

> 
> But for emulated region, shouldn't pages be already mapped for Xen to 
> access them ?

I am not sure which "pages" you are referring to here. The 
implementation of emulated regions is left to the discretion of Xen. 
This may be reading/writing to a buffer allocated by Xen or return a 
fixed value.

> 
>>
>>>>> It will try to resolve the translation fault. If it succeeds, it will
>>>>> return to the guest to retry the instruction. If not, then it means
>>>>> that the table is in MMIO region which is not expected by Xen. Thus,
>>>>> Xen will forward the abort to the guest.
>>>>>
>>>>> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
>>>>> ---
>>>>>
>>>>> Changelog :-
>>>>>
>>>>> v1..v8 - NA
>>>>>
>>>>> v9 - 1. Extracted this change from "[XEN v8 2/2] xen/arm64: io: 
>>>>> Support
>>>>> instructions (for which ISS is not..." into a separate patch of its 
>>>>> own.
>>>>> The reason being this is an existing bug in the codebase.
>>>>>
>>>>>   xen/arch/arm/io.c    | 11 +++++++++++
>>>>>   xen/arch/arm/traps.c | 12 +++++++++++-
>>>>>   2 files changed, 22 insertions(+), 1 deletion(-)
>>>>>
>>>>> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
>>>>> index bea69ffb08..ebcb8ed548 100644
>>>>> --- a/xen/arch/arm/io.c
>>>>> +++ b/xen/arch/arm/io.c
>>>>> @@ -128,6 +128,17 @@ void try_decode_instruction(const struct 
>>>>> cpu_user_regs *regs,
>>>>>           return;
>>>>>       }
>>>>>   +    /*
>>>>> +     * At this point, we know that the stage1 translation table is 
>>>>> in the MMIO
>>>>> +     * region. This is not expected by Xen and thus it forwards 
>>>>> the abort to the
>>>>
>>>> We don't know that. We only know that there are no corresponding 
>>>> valid mapping in the P2M. So the address may be part of an emulated 
>>>> MMIO region or invalid.
>>>>
>>>> For both cases, we will want to send an abort.
>>>>
>>>> Furthermore, I would say "emulated MMIO region" rather than MMIO 
>>>> region because the P2M can also contain MMIO mapping (we usually 
>>>> call then "direct MMIO").
>>>
>>> Can I say MMIO region (to indicate both emulated and direct) ? The 
>>> reason being the assumption that stage1 page tables cannot be in the 
>>> MMIO region. And thus, when check_p2m() is invoked, we do not invoke 
>>> try_map_mmio(gaddr_to_gfn(gpa).
>>>
>>> See this snippet :-
>>>
>>>              if ( xabt.s1ptw )
>>>                  check_mmio_region = false;
>>
>> Thinking a bit more of this. I would actually drop this check. We 
>> don't need to decode the instruction, so I don't think there are much 
>> benefits here to restrict access for direct MMIO. Did I miss anything?
>>
> Can Linux or any OS keep its page tables in the direct MMIO space ? If 
> yes, then try_map_mmio() needs to be invoked to map the region, so that 
> OS can access it. If not, then Xen needs to return abort because the OS 
> may be behaving maliciously.

I think what matters is whether the Arm Arm would or would not allow it. 
 From what I can tell there are no such restriction. So we would need to 
be cautious to restrict it further than necessary.

> 
> My understanding from previous discussion was that it does not make 
> sense for linux or any OS to keep its page tables in any MMIO region 
> (emulated or direct). Please correct me if mistaken.

At the moment, none of the regions emulated by Xen could be used for 
page-tables. I am also not sure how we should handle such access if they 
arise. So it is more convenient to simply forbid them.

Regarding direct MMIO, see above. Correct me if I am wrong, but it 
should not be a problem for Xen to deal with them. So while I agree this 
doesn't seem to make sense, the restriction seems unnecessary.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 02:20:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 02:20:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286507.486058 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRPS3-0007Cd-L4; Tue, 08 Mar 2022 02:19:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286507.486058; Tue, 08 Mar 2022 02:19:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRPS3-0007CC-E3; Tue, 08 Mar 2022 02:19:51 +0000
Received: by outflank-mailman (input) for mailman id 286507;
 Tue, 08 Mar 2022 02:19:50 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=DJ36=TT=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nRPS2-0007C6-Bf
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 02:19:50 +0000
Received: from mail-lf1-x136.google.com (mail-lf1-x136.google.com
 [2a00:1450:4864:20::136])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 3a84a986-9e86-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 03:19:48 +0100 (CET)
Received: by mail-lf1-x136.google.com with SMTP id g39so29598928lfv.10
 for <xen-devel@lists.xenproject.org>; Mon, 07 Mar 2022 18:19:48 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3a84a986-9e86-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=iFAibcRWNE35UOcnXkapKq77qG8nZ67Esy5gljmzfPU=;
        b=cLpWod/ida82hDcPeKlONEOZTi+GTmnOQAwsQrb4n+18SYMgyv+jMdU/XK2PWWWbEC
         R7wY1V8PNsp2oK1LQV1LvTSeZNvvPaoZzVweNSboJ/LpkZAyHHDxJWeCWSUZFBygMEDH
         PCAeBAmZeogpfNY59ol5e4DygLIFWh/cTGx030pc9ICZNTw0F0R1p5iKxy3zZiKPV/Gx
         Wn/+GX3FBD1NXN+C97cTaSVjXeLHTRJDmk+iy64cBMA0zRVU8wW0Boy5JhR0YEnvGqOG
         C8aGvsjKbnnqNB6fMrbEiR2qBw08QBJ/DugOFOxdA0V5ZcZorGuPK/inoPHrKV0g7KxH
         wCGA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=iFAibcRWNE35UOcnXkapKq77qG8nZ67Esy5gljmzfPU=;
        b=7fO2xuQH5I71nFQLLROpnHHntZGDN2XoP4a7v/IwUGlMrW51nokM66YJ2j7eHbwEYc
         HCCttMhEvDPY/5fZ4rhyMpsuLp2HeqhWIoz0ovSQSCMZPDa/NQe3lyWCGlJOI0A9YUlS
         J+IMc9IOLmhRJT8opAONttCVeFwIfBp2+J9NEiGDhMYSHvIvX4gFxEscpgxJDI5Mp+dK
         n7OOF+iTdl8rPSzHhd42hTDiyZDCzAQ1/f3LXqKBRKcz7hvddLbdch9ExWYzNk/OQxcw
         EHA6O8F3OM2DrSLSB8x5L1ylqlv9Tc6zpHJEc4+do6aOaZ3uGDtezpNMp4JWqntdR5l1
         o+mA==
X-Gm-Message-State: AOAM5322vs2Oxyz8qYuqLrC0wsJom2tI+A/SBZAO6+QHEz5c/ZvBj0So
	pwd83iQ9TCYfWvT/YNgX3+VYNbri0EaWJRVmHDQ=
X-Google-Smtp-Source: ABdhPJwOPJ3zL2JyojKTY9vqzD+Po4i5YwidIMMmVrK8LCPyh33q5TGOW+HyJlLOkZZ998mNjtk5NihKUGE8Njsg3jY=
X-Received: by 2002:a05:6512:36c1:b0:443:41a7:27e6 with SMTP id
 e1-20020a05651236c100b0044341a727e6mr9642338lfs.359.1646705988195; Mon, 07
 Mar 2022 18:19:48 -0800 (PST)
MIME-Version: 1.0
References: <CANH0Q9k6SJQ+EXNZz+-ZPnPtsxHXthYcx1E6z8euSDEt7XhLQg@mail.gmail.com>
 <871qzhiwqg.fsf@linaro.org> <CANH0Q9mF-vmW6gNDWnkMKR-VGQ2YbT+_55p=8F-N_L67Wuv5NQ@mail.gmail.com>
In-Reply-To: <CANH0Q9mF-vmW6gNDWnkMKR-VGQ2YbT+_55p=8F-N_L67Wuv5NQ@mail.gmail.com>
From: Jason Andryuk <jandryuk@gmail.com>
Date: Mon, 7 Mar 2022 21:19:36 -0500
Message-ID: <CAKf6xpub8XNd+AGhcQEsQQmxvDQQDLyNYns1hoBikgijQ27C-w@mail.gmail.com>
Subject: Re: How to create and start Xen guest VM by qemu-system-x86_64
 command line
To: Trigger Huang <trigger.huang@gmail.com>
Cc: =?UTF-8?B?QWxleCBCZW5uw6ll?= <alex.bennee@linaro.org>, 
	xen-devel <xen-devel@lists.xenproject.org>
Content-Type: text/plain; charset="UTF-8"

On Sun, Mar 6, 2022 at 7:47 PM Trigger Huang <trigger.huang@gmail.com> wrote:
>
> Hi Alex,
>
> Thanks for the response.
>
> Actually my target is trying to enable virglrenderer on Xen based Qemu. Before, I have successfully enabled it on KVM based Qemu by the Qemu command line. Such as 'qemu-system-x86_64 -device virtio-vga-gl  xxxxxxx'
> If change to use xl, I don't know how to set this kind of special option(-device virtio-vga-gl ) to qemu after I checked the xl's arguments. Or do you have any idea? :)

You can use device_model_args in your xl.cfg:

       device_model_args=[ "ARG", "ARG", ...]
           Pass additional arbitrary options on the device-model command line.
           Each element in the list is passed as an option to the device-
           model.

Regards,
Jason


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 03:40:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 03:40:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286516.486068 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRQhl-0008G1-9n; Tue, 08 Mar 2022 03:40:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286516.486068; Tue, 08 Mar 2022 03:40:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRQhl-0008Fu-6q; Tue, 08 Mar 2022 03:40:09 +0000
Received: by outflank-mailman (input) for mailman id 286516;
 Tue, 08 Mar 2022 03:40:07 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRQhj-0008Fh-RK; Tue, 08 Mar 2022 03:40:07 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRQhj-0005ye-PV; Tue, 08 Mar 2022 03:40:07 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRQhj-0007zQ-FN; Tue, 08 Mar 2022 03:40:07 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRQhj-0002s6-E4; Tue, 08 Mar 2022 03:40:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=f1TTxpkkSRn2JwYw/8akjEOh//5QAnOHCT2uDRqnkgE=; b=rwYbTPJrhDU6hlxTC4yK2ga9yv
	XKh15cqpqyGIPx9ZeQE7/WtA2IuPILzj72dbJwQ0wC09zYn1C660/0acNc4BGdmznOv5ZFAJ1iTPn
	AAmc970I56n9TsRvZpQGLFvsN/rZNQTlb+3xGS9a8IDpyjVAp4T+MXr3YQ2YRSfXbA1k=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168465-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168465: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-armhf-armhf-xl-credit1:xen-boot:fail:heisenbug
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=b49872aa8fc0f3f5a3036cc37aa2cb5c92866f33
X-Osstest-Versions-That:
    qemuu=9d662a6b22a0838a85c5432385f35db2488a33a5
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 08 Mar 2022 03:40:07 +0000

flight 168465 qemu-mainline real [real]
flight 168471 qemu-mainline real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168465/
http://logs.test-lab.xenproject.org/osstest/logs/168471/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-armhf-armhf-xl-credit1   8 xen-boot            fail pass in 168471-retest

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-xl-credit1 15 migrate-support-check fail in 168471 never pass
 test-armhf-armhf-xl-credit1 16 saverestore-support-check fail in 168471 never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168437
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168437
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168437
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168437
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168437
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168437
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168437
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168437
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 qemuu                b49872aa8fc0f3f5a3036cc37aa2cb5c92866f33
baseline version:
 qemuu                9d662a6b22a0838a85c5432385f35db2488a33a5

Last test of basis   168437  2022-03-06 13:39:36 Z    1 days
Testing same since   168465  2022-03-07 19:37:00 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Hanna Reitz <hreitz@redhat.com>
  John Snow <jsnow@redhat.com>
  Peter Maydell <peter.maydell@linaro.org>
  Thomas Huth <thuth@redhat.com>
  Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  fail    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   9d662a6b22..b49872aa8f  b49872aa8fc0f3f5a3036cc37aa2cb5c92866f33 -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 03:42:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 03:42:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286527.486080 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRQkG-0000UA-TO; Tue, 08 Mar 2022 03:42:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286527.486080; Tue, 08 Mar 2022 03:42:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRQkG-0000U3-QK; Tue, 08 Mar 2022 03:42:44 +0000
Received: by outflank-mailman (input) for mailman id 286527;
 Tue, 08 Mar 2022 03:42:43 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRQkF-0000Tr-RG; Tue, 08 Mar 2022 03:42:43 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRQkF-00061p-QH; Tue, 08 Mar 2022 03:42:43 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRQkF-000859-Eh; Tue, 08 Mar 2022 03:42:43 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRQkF-0005T8-EE; Tue, 08 Mar 2022 03:42:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=LEKw4XbvsKya/2kmQ1FERJIs6SpW/jrUCroX9gDhxro=; b=IFJmgTEF/uoeJIVnYqXZbK0ew5
	2idOzxsw8kok19Z4T6wzEGQUViRg4Znt/fm+riGFSk80rTXBQWdV6t0sWKT0CGzPKm+qy6uF7zzKU
	90xBKPs7dBhJkfkoM3+QUPt3XJGQDrEdtMLK3/PkrG1N60eFe5PVKhbAQK9nADnPHMuY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168469-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168469: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=62fa37fe7b9df3c54a2d9d90aed9ff0e817ee0c6
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 08 Mar 2022 03:42:43 +0000

flight 168469 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168469/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 62fa37fe7b9df3c54a2d9d90aed9ff0e817ee0c6
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    7 days
Failing since        168258  2022-03-01 01:55:31 Z    7 days   75 attempts
Testing same since   168469  2022-03-07 23:11:34 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 468 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 04:27:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 04:27:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286538.486090 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRRRb-0005OI-Dv; Tue, 08 Mar 2022 04:27:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286538.486090; Tue, 08 Mar 2022 04:27:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRRRb-0005OB-As; Tue, 08 Mar 2022 04:27:31 +0000
Received: by outflank-mailman (input) for mailman id 286538;
 Tue, 08 Mar 2022 04:27:30 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRRRa-0005O1-9z; Tue, 08 Mar 2022 04:27:30 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRRRa-0006y9-7V; Tue, 08 Mar 2022 04:27:30 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRRRZ-0001hF-KC; Tue, 08 Mar 2022 04:27:29 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRRRZ-0001Jp-Ji; Tue, 08 Mar 2022 04:27:29 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=z7k+ib5Vy4bCH6V+Vrg/cLej2zLSeEsqqVgeqZNwvvU=; b=uICCDns4TW5P9SS3w1ZLMqBSF+
	2KOF6GkhmVN/Z1m3KpxRMBBkuSI+Nrbnh+NlTctTzmnF4Z2t9c1Q7gfpqL9TJ6KVPN+RQmrcCwPzd
	wL0NAqBUsZc919K0FjJu+8BeVboRqGM2tjDJV64Oo2wEhaSvvWtzG3M5pQ7A/JqJj2sQ=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168466-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168466: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl-rtds:guest-localmigrate/x10:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=ea4424be16887a37735d6550cfd0611528dbe5d9
X-Osstest-Versions-That:
    linux=ffb217a13a2eaf6d5bd974fc83036a53ca69f1e2
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 08 Mar 2022 04:27:29 +0000

flight 168466 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168466/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-rtds     20 guest-localmigrate/x10       fail  like 168450
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168450
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168450
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168450
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168450
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168450
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168450
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168450
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168450
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                ea4424be16887a37735d6550cfd0611528dbe5d9
baseline version:
 linux                ffb217a13a2eaf6d5bd974fc83036a53ca69f1e2

Last test of basis   168450  2022-03-07 02:33:49 Z    1 days
Testing same since   168466  2022-03-07 20:11:19 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Anirudh Rayabharam <mail@anirudhrb.com>
  David Hildenbrand <david@redhat.com>
  Halil Pasic <pasic@linux.ibm.com>
  Jason Wang <jasowang@redhat.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Michael S. Tsirkin <mst@redhat.com>
  Miquel Raynal <miquel.raynal@bootlin.com>
  Randy Dunlap <rdunlap@infradead.org>
  Roger Quadros <rogerq@kernel.org>
  Si-Wei Liu <si-wei.liu@oracle.com>
  Stefano Garzarella <sgarzare@redhat.com>
  syzbot+0abd373e2e50d704db87@syzkaller.appspotmail.com
  Xie Yongji <xieyongji@bytedance.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Zhang Min <zhang.min9@zte.com.cn>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     fail    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   ffb217a13a2e..ea4424be1688  ea4424be16887a37735d6550cfd0611528dbe5d9 -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 07:29:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 07:29:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286549.486102 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRUHD-00083e-Bk; Tue, 08 Mar 2022 07:28:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286549.486102; Tue, 08 Mar 2022 07:28:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRUHD-00083X-8W; Tue, 08 Mar 2022 07:28:59 +0000
Received: by outflank-mailman (input) for mailman id 286549;
 Tue, 08 Mar 2022 07:28:57 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=rZft=TT=arm.com=Wei.Chen@srs-se1.protection.inumbo.net>)
 id 1nRUHB-000837-4H
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 07:28:57 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04on0601.outbound.protection.outlook.com
 [2a01:111:f400:fe0d::601])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 6754836f-9eb1-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 08:28:52 +0100 (CET)
Received: from AM6P192CA0072.EURP192.PROD.OUTLOOK.COM (2603:10a6:209:82::49)
 by VE1PR08MB5280.eurprd08.prod.outlook.com (2603:10a6:803:10d::29) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Tue, 8 Mar
 2022 07:28:37 +0000
Received: from AM5EUR03FT013.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:82:cafe::f) by AM6P192CA0072.outlook.office365.com
 (2603:10a6:209:82::49) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Tue, 8 Mar 2022 07:28:36 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT013.mail.protection.outlook.com (10.152.16.140) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Tue, 8 Mar 2022 07:28:36 +0000
Received: ("Tessian outbound 18e50a6f0513:v113");
 Tue, 08 Mar 2022 07:28:36 +0000
Received: from 4374906bd992.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 D48E9E9C-ACF3-4A63-B38C-8763954E0CBB.1; 
 Tue, 08 Mar 2022 07:28:26 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 4374906bd992.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 08 Mar 2022 07:28:26 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com (2603:10a6:102:2b9::9)
 by DB9PR08MB6762.eurprd08.prod.outlook.com (2603:10a6:10:2a8::19)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.17; Tue, 8 Mar
 2022 07:28:24 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa]) by PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::89b3:80a2:2b58:f1aa%4]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 07:28:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6754836f-9eb1-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=gizHt90rMvtQzd/SsI6Q733YarjsdfP1ZD88mhvTwcQ=;
 b=SWpS9l0vZEZ88qvNBrTv5eGwO2uu0XNSq4gAPNZokBaixBmjaW4dFfYhCbYRYpExToS+trP+NeNG98WE2lg9REF7+RMvM+Y5IfwpKxiTaDdEupUFzLomwK1LddE56id6fXBvWkguIKrldGL1RK1N1y/kw4UQBLVIt0zuKMmpk2Y=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=XCV2pPt8PCh5NahgzF2D0nytL3DuHaiVt4/JJEKIs4bA8ib8TIhwgGbzrGMvnVa8Lnb2oraKLeJY9VsEgji1zqrfrJtAAbjwkdm1yqdTqbdu6B9jyfgxxXH8OZUs7Hcp44h4+XWOIyuTwzPftPpZkYB3Ez2MtinffY/MxTW0yhTHDmHuwqEO1dmiErvnLVMJN4+ScKY8NO6Ph2kJsymhl7SbOYnxkoeAfOzsJeedgHuIutDzu36X1MQ4RtF5QZNphan2wGKRUjYThyH1ctvGZ+onXFId4r0s1FYXK8A7RTmw0UMeBrzapGwS1GfTvnmYs0RRdFpFSVfXwdcMK5okpw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=gizHt90rMvtQzd/SsI6Q733YarjsdfP1ZD88mhvTwcQ=;
 b=d5OqkbSxtUG6g09prgFF+pa31d4PXxyooeS/WzopBj9vWZuCQAWn/2oPS4srAXA2X53N9f5uI7Eh6Fsfs7cSjvegTWY0vBQP52Ke3SJy1yU6ke8uoZmaH3ltWzssVp9gQpcTZFvUoLvpD/IFmZxCbLUyVqXxIi/8RkFZPyUXo2ALV5dRZ8IKzaG/6c1FSMF8q0YFzx3OkhthCAz9O2ZJTYwZSIPM/IMC7ZhShLgoukEhpqJ1hmvK/uDIUFNi7qtilPUppnAsfBR3Y8UmSitCGpy+3BZPDMYfExO+2coD2VZaIpDr2LWan/maJ/keFAO+NFDILm/noJTU+qk0lBCn5g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=gizHt90rMvtQzd/SsI6Q733YarjsdfP1ZD88mhvTwcQ=;
 b=SWpS9l0vZEZ88qvNBrTv5eGwO2uu0XNSq4gAPNZokBaixBmjaW4dFfYhCbYRYpExToS+trP+NeNG98WE2lg9REF7+RMvM+Y5IfwpKxiTaDdEupUFzLomwK1LddE56id6fXBvWkguIKrldGL1RK1N1y/kw4UQBLVIt0zuKMmpk2Y=
From: Wei Chen <Wei.Chen@arm.com>
To: Stefano Stabellini <sstabellini@kernel.org>
CC: Julien Grall <julien@xen.org>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, Penny Zheng <Penny.Zheng@arm.com>, Henry Wang
	<Henry.Wang@arm.com>, nd <nd@arm.com>
Subject: RE: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Topic: Proposal for Porting Xen to Armv8-R64 - DraftA
Thread-Index:
 AdgpQxtXwh7LkfydTgiYk9bhMgU+ogBRt1sAAKse4VAAPag1gAAckyvAAMo7i2AAK6G7AAAQksLg
Date: Tue, 8 Mar 2022 07:28:23 +0000
Message-ID:
 <PAXPR08MB7420DDE732B24C541B254E699E099@PAXPR08MB7420.eurprd08.prod.outlook.com>
References:
 <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <04db7e8b-2f04-41d7-1deb-d8bda3625c04@xen.org>
 <PAXPR08MB7420BF1299A1577B98211C1A9E029@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <1f0bba54-158b-d171-6f99-0c29e0547f8a@xen.org>
 <PAXPR08MB742067028155B11528C5CCA39E049@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <PAXPR08MB7420827063D47932F428CEC89E089@PAXPR08MB7420.eurprd08.prod.outlook.com>
 <alpine.DEB.2.22.394.2203071348220.3261@ubuntu-linux-20-04-desktop>
In-Reply-To:
 <alpine.DEB.2.22.394.2203071348220.3261@ubuntu-linux-20-04-desktop>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 4B6AF03F782A764EB1B91CC451D97076.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: a3c06d01-6773-4c8f-6010-08da00d54250
x-ms-traffictypediagnostic:
	DB9PR08MB6762:EE_|AM5EUR03FT013:EE_|VE1PR08MB5280:EE_
X-Microsoft-Antispam-PRVS:
	<VE1PR08MB5280E5987EB66E11AB1E12709E099@VE1PR08MB5280.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAXPR08MB7420.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(6916009)(52536014)(38070700005)(86362001)(2906002)(8676002)(66446008)(508600001)(38100700002)(71200400001)(5660300002)(83380400001)(9686003)(76116006)(7696005)(26005)(64756008)(66946007)(186003)(122000001)(54906003)(55016003)(33656002)(53546011)(316002)(6506007)(8936002)(66476007)(66556008)(4326008);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR08MB6762
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT013.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	c24574ce-bad7-45e4-7997-08da00d53ac6
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(508600001)(81166007)(316002)(7696005)(2906002)(55016003)(83380400001)(33656002)(70206006)(54906003)(70586007)(6506007)(4326008)(6862004)(8676002)(40460700003)(5660300002)(52536014)(8936002)(36860700001)(82310400004)(336012)(186003)(26005)(9686003)(86362001)(47076005)(356005)(53546011);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 07:28:36.5975
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: a3c06d01-6773-4c8f-6010-08da00d54250
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT013.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR08MB5280

SGkgU3RlZmFubywNCg0KPiAtLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0KPiBGcm9tOiBYZW4t
ZGV2ZWwgPHhlbi1kZXZlbC1ib3VuY2VzQGxpc3RzLnhlbnByb2plY3Qub3JnPiBPbiBCZWhhbGYg
T2YNCj4gU3RlZmFubyBTdGFiZWxsaW5pDQo+IFNlbnQ6IDIwMjLE6jPUwjjI1SA2OjU4DQo+IFRv
OiBXZWkgQ2hlbiA8V2VpLkNoZW5AYXJtLmNvbT4NCj4gQ2M6IEp1bGllbiBHcmFsbCA8anVsaWVu
QHhlbi5vcmc+OyB4ZW4tZGV2ZWxAbGlzdHMueGVucHJvamVjdC5vcmc7IFN0ZWZhbm8NCj4gU3Rh
YmVsbGluaSA8c3N0YWJlbGxpbmlAa2VybmVsLm9yZz47IEJlcnRyYW5kIE1hcnF1aXMNCj4gPEJl
cnRyYW5kLk1hcnF1aXNAYXJtLmNvbT47IFBlbm55IFpoZW5nIDxQZW5ueS5aaGVuZ0Bhcm0uY29t
PjsgSGVucnkgV2FuZw0KPiA8SGVucnkuV2FuZ0Bhcm0uY29tPjsgbmQgPG5kQGFybS5jb20+DQo+
IFN1YmplY3Q6IFJFOiBQcm9wb3NhbCBmb3IgUG9ydGluZyBYZW4gdG8gQXJtdjgtUjY0IC0gRHJh
ZnRBDQo+IA0KPiBPbiBNb24sIDcgTWFyIDIwMjIsIFdlaSBDaGVuIHdyb3RlOg0KPiA+ID4gPiBP
biAwMS8wMy8yMDIyIDA3OjUxLCBXZWkgQ2hlbiB3cm90ZToNCj4gPiA+ID4gPj4+ICMjIyAxLjIu
IFhlbiBDaGFsbGVuZ2VzIHdpdGggUE1TQSBWaXJ0dWFsaXphdGlvbg0KPiA+ID4gPiA+Pj4gWGVu
IGlzIFBNU0EgdW5hd2FyZSBUeXBlLTEgSHlwZXJ2aXNvciwgaXQgd2lsbCBuZWVkDQo+IG1vZGlm
aWNhdGlvbnMgdG8NCj4gPiA+ID4gcnVuDQo+ID4gPiA+ID4+PiB3aXRoIGFuIE1QVSBhbmQgaG9z
dCBtdWx0aXBsZSBndWVzdCBPU2VzLg0KPiA+ID4gPiA+Pj4NCj4gPiA+ID4gPj4+IC0gTm8gTU1V
IGF0IEVMMjoNCj4gPiA+ID4gPj4+ICAgICAgIC0gTm8gRUwyIFN0YWdlIDEgYWRkcmVzcyB0cmFu
c2xhdGlvbg0KPiA+ID4gPiA+Pj4gICAgICAgICAgIC0gWGVuIHByb3ZpZGVzIGZpeGVkIEFSTTY0
IHZpcnR1YWwgbWVtb3J5IGxheW91dCBhcw0KPiBiYXNpcw0KPiA+ID4gb2YNCj4gPiA+ID4gPj4g
RUwyDQo+ID4gPiA+ID4+PiAgICAgICAgICAgICBzdGFnZSAxIGFkZHJlc3MgdHJhbnNsYXRpb24s
IHdoaWNoIGlzIG5vdCBhcHBsaWNhYmxlDQo+IG9uDQo+ID4gPiA+IE1QVQ0KPiA+ID4gPiA+PiBz
eXN0ZW0sDQo+ID4gPiA+ID4+PiAgICAgICAgICAgICB3aGVyZSB0aGVyZSBpcyBubyB2aXJ0dWFs
IGFkZHJlc3NpbmcuIEFzIGEgcmVzdWx0LA0KPiBhbnkNCj4gPiA+ID4gPj4gb3BlcmF0aW9uDQo+
ID4gPiA+ID4+PiAgICAgICAgICAgICBpbnZvbHZpbmcgdHJhbnNpdGlvbiBmcm9tIFBBIHRvIFZB
LCBsaWtlIGlvcmVtYXAsDQo+IG5lZWRzDQo+ID4gPiA+ID4+IG1vZGlmaWNhdGlvbg0KPiA+ID4g
PiA+Pj4gICAgICAgICAgICAgb24gTVBVIHN5c3RlbS4NCj4gPiA+ID4gPj4+ICAgICAgIC0gWGVu
J3MgcnVuLXRpbWUgYWRkcmVzc2VzIGFyZSB0aGUgc2FtZSBhcyB0aGUgbGluayB0aW1lDQo+ID4g
PiA+IGFkZHJlc3Nlcy4NCj4gPiA+ID4gPj4+ICAgICAgICAgICAtIEVuYWJsZSBQSUMgKHBvc2l0
aW9uLWluZGVwZW5kZW50IGNvZGUpIG9uIGEgcmVhbC0NCj4gdGltZQ0KPiA+ID4gPiB0YXJnZXQN
Cj4gPiA+ID4gPj4+ICAgICAgICAgICAgIHByb2Nlc3NvciBwcm9iYWJseSB2ZXJ5IHJhcmUuDQo+
ID4gPiA+ID4+DQo+ID4gPiA+ID4+IEFzaWRlIHRoZSBhc3NlbWJseSBib290IGNvZGUgYW5kIFVF
Rkkgc3R1YiwgWGVuIGFscmVhZHkgcnVucyBhdA0KPiB0aGUNCj4gPiA+ID4gc2FtZQ0KPiA+ID4g
PiA+PiBhZGRyZXNzIGFzIGl0IHdhcyBsaW5rZWQuDQo+ID4gPiA+ID4+DQo+ID4gPiA+ID4NCj4g
PiA+ID4gPiBCdXQgdGhlIGRpZmZlcmVuY2UgaXMgdGhhdCwgYmFzZSBvbiBNTVUsIHdlIGNhbiB1
c2UgdGhlIHNhbWUgbGluaw0KPiA+ID4gPiBhZGRyZXNzDQo+ID4gPiA+ID4gZm9yIGFsbCBwbGF0
Zm9ybXMuIEJ1dCBvbiBNUFUgc3lzdGVtLCB3ZSBjYW4ndCBkbyBpdCBpbiB0aGUgc2FtZQ0KPiB3
YXkuDQo+ID4gPiA+DQo+ID4gPiA+IEkgYWdyZWUgdGhhdCB3ZSBjdXJyZW50bHkgdXNlIHRoZSBz
YW1lIGxpbmsgYWRkcmVzcyBmb3IgYWxsIHRoZQ0KPiA+ID4gPiBwbGF0Zm9ybXMuIEJ1dCB0aGlz
IGlzIGFsc28gYSBwcm9ibGVtIHdoZW4gdXNpbmcgTU1VIGJlY2F1c2UgRUwyIGhhcw0KPiBhDQo+
ID4gPiA+IHNpbmdsZSBUVEJSLg0KPiA+ID4gPg0KPiA+ID4gPiBBdCB0aGUgbW9tZW50IHdlIGFy
ZSBzd2l0Y2hpbmcgcGFnZS10YWJsZXMgd2l0aCB0aGUgTU1VIHdoaWNoIGlzIG5vdA0KPiA+ID4g
PiBzYWZlLiBJbnN0ZWFkIHdlIG5lZWQgdG8gdHVybiBvdXQgdGhlIE1NVSBvZmYsIHN3aXRjaCBw
YWdlLXRhYmxlcw0KPiBhbmQNCj4gPiA+ID4gdGhlbiB0dXJuIG9uIHRoZSBNTVUuIFRoaXMgbWVh
bnMgd2UgbmVlZCB0byBoYXZlIGFuIGlkZW50aXR5IG1hcHBpbmcNCj4gb2YNCj4gPiA+ID4gWGVu
IGluIHRoZSBwYWdlLXRhYmxlcy4gQXNzdW1pbmcgWGVuIGlzIG5vdCByZWxvY2F0ZWQsIHRoZSBp
ZGVudGl0eQ0KPiA+ID4gPiBtYXBwaW5nIG1heSBjbGFzaCB3aXRoIFhlbiAob3IgdGhlIHJlc3Qg
b2YgdGhlIHZpcnR1YWwgYWRkcmVzcyBtYXApLg0KPiA+ID4gPg0KPiA+ID4NCj4gPiA+IElzIHRo
aXMgdGhlIHNhbWUgcmVhc29uIHdlIGNyZWF0ZSBhIGR1bW15IHJlbG9jIHNlY3Rpb24gZm9yIEVG
SSBsb2FkZXI/DQo+ID4gPg0KPiA+ID4gPiBNeSBpbml0aWFsIGlkZWEgd2FzIHRvIGVuYWJsZSBQ
SUMgYW5kIHVwZGF0ZSB0aGUgcmVsb2NhdGlvbiBhdCBib290DQo+ID4gPiA+IHRpbWUuIEJ1dCB0
aGlzIGlzIGEgYml0IGN1bWJlcnNvbWUgdG8gZG8uIFNvIG5vdyBJIGFtIGxvb2tpbmcgdG8NCj4g
aGF2ZSBhDQo+ID4gPiA+IHNlbWktZHluYW1pYyB2aXJ0dWFsIGxheW91dCBhbmQgZmluZCBzb21l
IHBsYWNlIHRvIHJlbG9jYXRlIHBhcnQgb2YNCj4gWGVuDQo+ID4gPiA+IHRvIHVzZSBmb3IgQ1BV
IGJyaW5nLXVwLg0KPiA+ID4gPg0KPiA+ID4gPiBBbnl3YXksIG15IHBvaW50IGlzIHdlIHBvc3Np
Ymx5IGNvdWxkIGxvb2sgYXQgUElDIGlmIHRoYXQgY291bGQNCj4gYWxsb3cNCj4gPiA+ID4gZ2Vu
ZXJpYyBYZW4gaW1hZ2UuDQo+ID4gPiA+DQo+ID4gPg0KPiA+ID4gSSB1bmRlcnN0YW5kIHlvdXIg
Y29uY2Vybi4gSU1PLCBQSUMgaXMgcG9zc2libGUgdG8gZG8gdGhpcywgYnV0DQo+IG9idmlvdXNs
eSwNCj4gPiA+IGl0J3Mgbm90IGEgc21hbGwgYW1vdW50IG9mIHdvcmsuIEFuZCBJIHdhbnQgdG8g
aGVhciBzb21lIHN1Z2dlc3Rpb25zDQo+IGZyb20NCj4gPiA+IFN0ZWZhbm8sIGJlY2F1c2UgaGUg
YWxzbyBoYXMgc29tZSBzb2x1dGlvbnMgaW4gcHJldmlvdXMgdGhyZWFkLg0KPiA+ID4NCj4gPg0K
PiA+IENhbiB5b3UgaGF2ZSBhIGxvb2sgYXQgdGhlIFBJQyBkaXNjdXNzaW9uIGJldHdlZW4gSnVs
aWVuIGFuZCBtZT8NCj4gPiBJIHRoaW5rIHdlIG1heSBuZWVkIHNvbWUgaW5wdXRzIGZyb20geW91
ciB2aWV3Lg0KPiANCj4gSWYgd2UgaGF2ZSB0byBoYXZlIGEgYnVpbGQtdGltZSBkZXZpY2UgdHJl
ZSBhbnl3YXksIHdlIGNvdWxkDQo+IGF1dG9tYXRpY2FsbHkgZ2VuZXJhdGUgdGhlIGxpbmsgYWRk
cmVzcywgdG9nZXRoZXIgd2l0aCBvdGhlciByZXF1aXJlZA0KPiBhZGRyZXNzZXMuIFRoZXJlIHdv
dWxkIGxpdHRsZSBiZW5lZml0IHRvIGRvIFBJQyBpZiB3ZSBoYXZlIHRvIGhhdmUgYQ0KPiBidWls
ZC10aW1lIGRldmljZSB0cmVlIGluIGFueSBjYXNlLg0KPiANCj4gT24gdGhlIG90aGVyIGhhbmQs
IGlmIHdlIGNvdWxkIGdldCByaWQgb2YgdGhlIGJ1aWxkLXRpbWUgZGV2aWNlIHRyZWUNCj4gYWx0
b2dldGhlciwgdGhlbiB5ZXMgZG9pbmcgUElDIHByb3ZpZGVzIHNvbWUgYmVuZWZpdHMuIEl0IHdv
dWxkIGFsbG93IHVzDQo+IHRvIGhhdmUgc2luZ2xlIFhlbiBiaW5hcnkgd29ya2luZyBvbiBtdWx0
aXBsZSBDb3J0ZXgtUiBib2FyZHMuIEhvd2V2ZXIsDQo+IEkgZG9uJ3QgdGhpbmsgdGhhdCB3b3Vs
ZCBiZSBpbXBvcnRhbnQgZnJvbSBhIHVzZXIgcGVyc3BlY3RpdmUuIFBlb3BsZQ0KPiB3aWxsIG5v
dCBpbnN0YWxsIFVidW50dSBvbiBhIENvcnRleC1SIGFuZCBhcHQtZ2V0IHhlbi4gIFRoZSB0YXJn
ZXQgaXMNCj4gZW1iZWRkZWQ6IHVzZXJzIHdpbGwga25vdyBmcm9tIHRoZSBzdGFydCB0aGUgYm9h
cmQgdGhleSB3aWxsIHRhcmdldCwgc28NCj4gaXQgd291bGQgbm90IGJlIGEgcHJvYmxlbSBmb3Ig
dGhlbSB0byBidWlsZCBYZW4gZm9yIGEgc3BlY2lmaWMgYm9hcmQuDQo+IEltYWdlQnVpbGRlciAo
b3Igc29tZXRoaW5nIGxpa2UgaXQpIHdpbGwgc3RpbGwgYmUgcmVxdWlyZWQgdG8gZ2VuZXJhdGUN
Cj4gYm9vdCBzY3JpcHRzIGFuZCBib290IGluZm8uIEluIG90aGVyIHdvcmRzLCBhbHRob3VnaCBp
dCB3b3VsZCBiZQ0KPiBjb252ZW5pZW50IHRvIHByb2R1Y2UgYSBnZW5lcmljIGJpbmFyeSwgaXQg
aXMgbm90IGEgbXVzdC1oYXZlIGZlYXR1cmUNCj4gYW5kIEkgd291bGQgY29uc2lkZXIgaXQgbG93
LXByaW9yaXR5IGNvbXBhcmVkIHRvIG90aGVycy4NCg0KSSB0ZW5kIHRvIGFncmVlIHdpdGggeW91
ciBvcGluaW9uLiBXZSBjYW4gZ2V0IHNvbWUgYmVuZWZpdCBmcm9tIFBJQywNCmJ1dCB0aGUgcHJp
b3JpdHkgbWF5IGJlIGxvdy4gV2UgaGF2ZSBlbmNvdW50ZXJlZCBhIHByb2JsZW0gd2hlbiB3ZSdy
ZQ0KdHJ5aW5nIHRvIHVzZSBFRkkgbG9hZGVyIHRvIGJvb3QgeGVuLmVmaSBvbiB2OFIuIER1ZSB0
byBsYWNrIG9mIHJlbG9jYXRpb24NCmNhcGFiaWxpdHksIHRoZSBFRkkgbG9hZGVyIGNvdWxkIG5v
dCBsYXVuY2ggeGVuLmVmaSBvbiBWOFIuIEJ1dCBYZW4gRUZJDQpib290IGNhcGFiaWxpdHkgaXMg
YSByZXF1aXJlbWVudCBvZiBBcm0gRUJCUiBbMV0uIEluIG9yZGVyIHRvIHN1cHBvcnQgWGVuDQpF
RkkgYm9vdCBvbiBWOFIsIG1heSBiZSB3ZSBzdGlsbCBuZWVkIGEgcGFydGlhbGx5IHN1cHBvcnRl
ZCBQSUMuIE9ubHkgc29tZQ0KYm9vdCBjb2RlIHN1cHBvcnQgUElDIHRvIG1ha2UgRUZJIHJlbG9j
YXRpb24gaGFwcHkuIFRoaXMgYm9vdCBjb2RlIHdpbGwNCmhlbHAgWGVuIHRvIGNoZWNrIGl0cyBs
b2FkZWQgYWRkcmVzcyBhbmQgcmVsb2NhdGUgWGVuIGltYWdlIHRvIFhlbidzDQpydW4tdGltZSBh
ZGRyZXNzIGlmIG5lZWQuDQoNCkhvdyBhYm91dCB3ZSBwbGFjZSBQSUMgc3VwcG9ydCB0byBUT0RP
IGxpc3QgZm9yIGZ1cnRoZXIgZGlzY3Vzc2lvbiwNCkkgZG9uJ3QgdGhpbmsgd2UgY2FuIGluY2x1
ZGUgc28gbWFueSBpdGVtcyBpbiBkYXkxIDogKSANCg0KWzFdaHR0cHM6Ly9hcm0tc29mdHdhcmUu
Z2l0aHViLmlvL2ViYnIvaW5kZXguaHRtbA0KDQpDaGVlcnMsDQpXZWkgQ2hlbg0KDQoNCg==


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 07:39:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 07:39:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286557.486113 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRURc-0001KB-GJ; Tue, 08 Mar 2022 07:39:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286557.486113; Tue, 08 Mar 2022 07:39:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRURc-0001K4-CR; Tue, 08 Mar 2022 07:39:44 +0000
Received: by outflank-mailman (input) for mailman id 286557;
 Tue, 08 Mar 2022 07:39:43 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=BmU2=TT=gmail.com=trigger.huang@srs-se1.protection.inumbo.net>)
 id 1nRURb-0001Ju-Dr
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 07:39:43 +0000
Received: from mail-lj1-x230.google.com (mail-lj1-x230.google.com
 [2a00:1450:4864:20::230])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id eaa948d8-9eb2-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 08:39:42 +0100 (CET)
Received: by mail-lj1-x230.google.com with SMTP id s25so23849442lji.5
 for <xen-devel@lists.xenproject.org>; Mon, 07 Mar 2022 23:39:42 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: eaa948d8-9eb2-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=H6k1ygCh1H/HBxvkWCzBhrRDkuZ3jxNEmoVJooKWgWY=;
        b=RWy04UADJru3nZwM9Uqb67wlbVt+vZrttsH4z+LPIAIF+z0yvL3w75UDiCgJ8fWsfX
         ywi9rIYynupejXiWX5qNbc0TQ3KOOx2BLIOaZbVQafwdWS5rgE/cGWLsSYmxHCguZnAb
         cKRYQ2oPrstVKykzFiNE6+uzWWU5h28PFw7cyOAKmWRgq6Xy/YQZ7yI1t935aEhwMlzr
         w4NwUx81mon729J++xoARS89BkvA+6zxeTPkswYxsBPhWpsTlPFEdaFmQOmgrnqDa88e
         Bhx0b8sC0ynxqv4TbIN8dHmwAwZIcrOcFuRabX+ldUWdDbWdM9ryq4Uyu8nVROh57eau
         /Wgw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=H6k1ygCh1H/HBxvkWCzBhrRDkuZ3jxNEmoVJooKWgWY=;
        b=2gqTUIh/KbpX7/E8VST3UJMlRdfYoBKlVpAv8AKVppreoeXC8Oyr/8dUn9cYldeXhP
         /EsFBcxLxcuLIQZYbgNta07UKfFHnIbCjSkwN2XTbsCjPAn6v0LY8lYKDo7Ms6jEM93Z
         d9aD2gJ8NO1uuk7sFLrQbVyJGTuydMoeO+kyyT5VquH70McVUMpFIIAE55sxyKEuO0SK
         u0LIEdEhRv64RrTt3JYMXTLhOo0OWo/hwWliu2YT0Waav6fnWky0AXILVxXKEwfmwNBh
         rHaLAQRLnD/OWESlSIMIMvJKsyLy6VQqqjqQ0TfNBvH1ZDVKkvKuKLsKRNI2noEuWQUT
         vLGQ==
X-Gm-Message-State: AOAM533kfpGjTgMbJSaeNhbQZ3DhQQfOm4KxnujZ7OHbhM4RwFMt4JeH
	FCCAuMVJKEuVoVCQNQ5vn01HMZyLSKbTyQmFRAU=
X-Google-Smtp-Source: ABdhPJxcDF36d2wsMqbxXi8KHNReX2SgKj63WsRLRBb4noQwiwNpvfCq7lg1XGv8ICnuyuVN0kM9bXS8NlliXOEo37E=
X-Received: by 2002:a2e:9f56:0:b0:246:4d12:1652 with SMTP id
 v22-20020a2e9f56000000b002464d121652mr10361102ljk.258.1646725181559; Mon, 07
 Mar 2022 23:39:41 -0800 (PST)
MIME-Version: 1.0
References: <CANH0Q9k6SJQ+EXNZz+-ZPnPtsxHXthYcx1E6z8euSDEt7XhLQg@mail.gmail.com>
 <871qzhiwqg.fsf@linaro.org> <CANH0Q9mF-vmW6gNDWnkMKR-VGQ2YbT+_55p=8F-N_L67Wuv5NQ@mail.gmail.com>
 <CAKf6xpub8XNd+AGhcQEsQQmxvDQQDLyNYns1hoBikgijQ27C-w@mail.gmail.com>
In-Reply-To: <CAKf6xpub8XNd+AGhcQEsQQmxvDQQDLyNYns1hoBikgijQ27C-w@mail.gmail.com>
From: Trigger Huang <trigger.huang@gmail.com>
Date: Tue, 8 Mar 2022 15:39:28 +0800
Message-ID: <CANH0Q9k2+snmuPEkywn+6uR79y-rzKH3dZfKKPbXSy2qLMCRxQ@mail.gmail.com>
Subject: Re: How to create and start Xen guest VM by qemu-system-x86_64
 command line
To: Jason Andryuk <jandryuk@gmail.com>
Cc: =?UTF-8?B?QWxleCBCZW5uw6ll?= <alex.bennee@linaro.org>, 
	xen-devel <xen-devel@lists.xenproject.org>
Content-Type: multipart/alternative; boundary="0000000000007d562305d9b015ee"

--0000000000007d562305d9b015ee
Content-Type: text/plain; charset="UTF-8"

Hi Jason,

Thanks for sharing.

Yesterday I added some hard code in libxl__build_device_model_args_new()
and it worked. :)
I think your method is much more flexible, I will have a try at it.

Regards,
Trigger



My draft patch:
diff --git a/tools/libs/light/libxl_dm.c b/tools/libs/light/libxl_dm.c
index 9a8ddbe188..74961d0218 100644
--- a/tools/libs/light/libxl_dm.c
+++ b/tools/libs/light/libxl_dm.c
@@ -1346,7 +1346,7 @@ static int
libxl__build_device_model_args_new(libxl__gc *gc,
      * Ensure that by default no display backend is created. Further
      * options given below might then enable more.
      */
-    flexarray_append_pair(dm_args, "-display", "none");
+   flexarray_append_pair(dm_args, "-display", "sdl,gl=on");

     if (sdl && !is_stubdom) {
         flexarray_append(dm_args, "-sdl");
@@ -1449,9 +1449,9 @@ static int
libxl__build_device_model_args_new(libxl__gc *gc,
                 libxl__sizekb_to_mb(b_info->video_memkb)));
             break;
         case LIBXL_VGA_INTERFACE_TYPE_CIRRUS:
-            flexarray_append_pair(dm_args, "-device",
-                GCSPRINTF("cirrus-vga,vgamem_mb=%d",
-                libxl__sizekb_to_mb(b_info->video_memkb)));
+               flexarray_append_pair(dm_args, "-device", "virtio-vga-gl");
+               flexarray_append_pair(dm_args, "-vga", "none");
+               printf("Delete cirrus-vga, and add sdl display and
virtio-vga-gl!\n");
             break;
         case LIBXL_VGA_INTERFACE_TYPE_NONE:
             break;

On Tue, Mar 8, 2022 at 10:19 AM Jason Andryuk <jandryuk@gmail.com> wrote:

> On Sun, Mar 6, 2022 at 7:47 PM Trigger Huang <trigger.huang@gmail.com>
> wrote:
> >
> > Hi Alex,
> >
> > Thanks for the response.
> >
> > Actually my target is trying to enable virglrenderer on Xen based Qemu.
> Before, I have successfully enabled it on KVM based Qemu by the Qemu
> command line. Such as 'qemu-system-x86_64 -device virtio-vga-gl  xxxxxxx'
> > If change to use xl, I don't know how to set this kind of special
> option(-device virtio-vga-gl ) to qemu after I checked the xl's arguments.
> Or do you have any idea? :)
>
> You can use device_model_args in your xl.cfg:
>
>        device_model_args=[ "ARG", "ARG", ...]
>            Pass additional arbitrary options on the device-model command
> line.
>            Each element in the list is passed as an option to the device-
>            model.
>
> Regards,
> Jason
>

--0000000000007d562305d9b015ee
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Hi Jason,</div><div><br></div><div>Thanks for sharing=
.</div><div><br></div><div>Yesterday I added some hard code in=20
libxl__build_device_model_args_new() and it worked. :)</div><div>I think yo=
ur method is much more flexible, I will have a try at it.<br></div><div><br=
></div><div>
Regards,

</div><div>Trigger<br></div><div><br></div><div><br></div><div><br></div><d=
iv>My draft patch:<br></div><div>diff --git a/tools/libs/light/libxl_dm.c b=
/tools/libs/light/libxl_dm.c<br>index 9a8ddbe188..74961d0218 100644<br>--- =
a/tools/libs/light/libxl_dm.c<br>+++ b/tools/libs/light/libxl_dm.c<br>@@ -1=
346,7 +1346,7 @@ static int libxl__build_device_model_args_new(libxl__gc *g=
c,<br>=C2=A0 =C2=A0 =C2=A0 * Ensure that by default no display backend is c=
reated. Further<br>=C2=A0 =C2=A0 =C2=A0 * options given below might then en=
able more.<br>=C2=A0 =C2=A0 =C2=A0 */<br>- =C2=A0 =C2=A0flexarray_append_pa=
ir(dm_args, &quot;-display&quot;, &quot;none&quot;);<br>+ =C2=A0 flexarray_=
append_pair(dm_args, &quot;-display&quot;, &quot;sdl,gl=3Don&quot;);<br><br=
>=C2=A0 =C2=A0 =C2=A0if (sdl &amp;&amp; !is_stubdom) {<br>=C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0flexarray_append(dm_args, &quot;-sdl&quot;);<br>@@ -1449,9=
 +1449,9 @@ static int libxl__build_device_model_args_new(libxl__gc *gc,<br=
>=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0libxl__sizek=
b_to_mb(b_info-&gt;video_memkb)));<br>=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0break;<br>=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0case LIBXL_VGA_INT=
ERFACE_TYPE_CIRRUS:<br>- =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0flexarray=
_append_pair(dm_args, &quot;-device&quot;,<br>- =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 =C2=A0 =C2=A0 =C2=A0 =C2=A0GCSPRINTF(&quot;cirrus-vga,vgamem_mb=3D%d&quot;=
,<br>- =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0libxl__sizekb=
_to_mb(b_info-&gt;video_memkb)));<br>+ =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 flexarray_append_pair(dm_args, &quot;-device&quot;, &quot;vir=
tio-vga-gl&quot;);<br>+ =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 fl=
exarray_append_pair(dm_args, &quot;-vga&quot;, &quot;none&quot;);<br>+ =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 printf(&quot;Delete cirrus-vg=
a, and add sdl display and virtio-vga-gl!\n&quot;);<br>=C2=A0 =C2=A0 =C2=A0=
 =C2=A0 =C2=A0 =C2=A0 =C2=A0break;<br>=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0cas=
e LIBXL_VGA_INTERFACE_TYPE_NONE:<br>=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0break;<br></div></div><br><div class=3D"gmail_quote"><div dir=3D"=
ltr" class=3D"gmail_attr">On Tue, Mar 8, 2022 at 10:19 AM Jason Andryuk &lt=
;<a href=3D"mailto:jandryuk@gmail.com">jandryuk@gmail.com</a>&gt; wrote:<br=
></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;=
border-left:1px solid rgb(204,204,204);padding-left:1ex">On Sun, Mar 6, 202=
2 at 7:47 PM Trigger Huang &lt;<a href=3D"mailto:trigger.huang@gmail.com" t=
arget=3D"_blank">trigger.huang@gmail.com</a>&gt; wrote:<br>
&gt;<br>
&gt; Hi Alex,<br>
&gt;<br>
&gt; Thanks for the response.<br>
&gt;<br>
&gt; Actually my target is trying to enable virglrenderer on Xen based Qemu=
. Before, I have successfully enabled it on KVM based Qemu by the Qemu comm=
and line. Such as &#39;qemu-system-x86_64 -device virtio-vga-gl=C2=A0 xxxxx=
xx&#39;<br>
&gt; If change to use xl, I don&#39;t know how to set this kind of special =
option(-device virtio-vga-gl ) to qemu after I checked the xl&#39;s argumen=
ts. Or do you have any idea? :)<br>
<br>
You can use device_model_args in your xl.cfg:<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0device_model_args=3D[ &quot;ARG&quot;, &quot;ARG=
&quot;, ...]<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Pass additional arbitrary options =
on the device-model command line.<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Each element in the list is passed=
 as an option to the device-<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0model.<br>
<br>
Regards,<br>
Jason<br>
</blockquote></div>

--0000000000007d562305d9b015ee--


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 08:03:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 08:03:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286571.486127 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRUoQ-0005K4-MK; Tue, 08 Mar 2022 08:03:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286571.486127; Tue, 08 Mar 2022 08:03:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRUoQ-0005Jx-Hx; Tue, 08 Mar 2022 08:03:18 +0000
Received: by outflank-mailman (input) for mailman id 286571;
 Tue, 08 Mar 2022 08:03:17 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fWwI=TT=citrix.com=prvs=059ab6e88=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRUoP-0005Jr-J1
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 08:03:17 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 33a3510f-9eb6-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 09:03:15 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 33a3510f-9eb6-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646726595;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=U/uzF/sWVA17YsRRFwGtSih04Zj8zWp/OGJVaVdK8R4=;
  b=Y3hG59NbMLdRmQDgZk+Ge6eOjgfR51OQgkbfZi4aTOGmSg1TJwMQeBfR
   /Z4gsTnejNMXIh3cXumcbvwAWE1g2izMLPtFRmVnmX+bKqpHBayt/XhlW
   p57LZ8qC8iMgj8vLMIJIKVb8iYBfHm5f3ZEkqeqeZTPoRLJz4hcx9PHXv
   g=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65159904
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:dTNgp6hO4hWK2XosOgYmwIXUX161lBAKZh0ujC45NGQN5FlHY01je
 htvDWGPOqzZa2SgeNx3YIW2/RwHuJTUzYU1HQFvr3g0Hnkb9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFvS4
 YiaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YTwHLKbRtP8MaUAGFytyEqtc5Y72fXfq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bkmtnwjzDS+4vXLjIQrnQ5M8e1zA17ixLNaiDP
 pdIOGIzBPjGSx1BNnYIGqtgoMC5hCDzUBNIiXHFlKVitgA/yyQuieOwYbI5YOeiT8hPglyRo
 G6A+m3jGwwbL/SW0z/D+XWp7sfxmif8VJMXBaeP3Pdgi12OxUQeEBQTE1C8pJGRmkO4Ht5SN
 UEQ0i4vtrQpslymSMHnWB+1q2LCuQQTM/JPF8Uq5QfLzbDbiy6bDGUZSj9KaPQ9qdQ7Azct0
 zehnc7tBDFpmK2YTzSa7Lj8hSipJSEfIGsGZCkFZQgI+d/upMc0lB2nczp4OPfr1JuvQ2i2m
 m3U6nhl71kOsSIV/56V71varym9nMGXSgQ5yQPNQ1OUsgwsMeZJeLeUwVTc6P9BKqOQQV+Ao
 GUIlqCi0QweMX2evHfTGbtQRdlF897AaWSB2gA3Q/HN4hzwoybLQGxG3N1pyK6F2O4gcCShX
 kLcsBg5CHR7bCrzNv8fj25c5q0XIUnc+TbNC6i8gjlmOMEZmOq7EMdGPxb4M4fFyhRErE3HE
 c3HGftA9F5DYUid8BK4Rv0GzZggzT0kyGXYSPjTlkr7j+TBNCPOEOdYazNii9zVCove+205F
 P4Fa6O3J+h3CrWiMkE7D6ZJRbz1EZTLLc+v8JEGHgJyCgFnBHsgG5fsLUAJIORYc1Buvr6Qp
 BmVAxYAoHKm3CGvAVjaOxhLNeK0Nb4i/C1TAMDZFQvxs5TVSd30t/l3mlpeVeRPydGPOtYoF
 6lVIZvRWK8TItkFkhxEBaTAQEVZXE3DrSqFPja/YSh5eJhlRgfT/cTjcBep/y4LZhdbf+Nny
 1F8/ms3maY+ejk=
IronPort-HdrOrdr: A9a23:uA6ah6M0unYEeMBcTyP155DYdb4zR+YMi2TDiHofdfUFSKClfp
 6V8cjztSWUtN4QMEtQ/uxoHJPwO080kqQFnLX5XI3SJzUO3VHHEGgM1/qB/9SNIVyaygcZ79
 YdT0EcMqyAMbEZt7eC3ODQKb9Jq7PmgcOVbKXlvg9QpGlRGt9dBmxCe2Cm+yNNNW177c1TLu
 vi2iMLnUvpRV0nKuCAQlUVVenKoNPG0LrgfB49HhYirC2Dlymh5rLWGwWRmk52aUIE/Z4StU
 z+1yDp7KSqtP+2jjfaym/o9pxT3P/s0MFKCsCggtUcbh/slgGrToJ8XKDqhkF/nMifrHIR1P
 XcqRYpOMp+r1vXY2GOuBPonzLt1T4/gkWSvmOwsD/Gm4jUVTg6A81OicZyaR3C8Xctu9l6ze
 Ziw3+Zn4A/N2KOoA3No/zzEz16nEu9pnQv1cQJiWZEbIcYYLhN6aQC4UJuFosaFi6S0vFqLA
 BXNrCc2B9qSyLbU5iA1VMfg+BEH05DUytue3Jy9PB8iFNt7TJEJ0hx/r1qop5PzuN5d3B+3Z
 W2Dk1ZrsA/ciYoV9MOOA4ge7rANoWfe2OEDIqtSW6XYZ3vfUi976LK3A==
X-IronPort-AV: E=Sophos;i="5.90,163,1643691600"; 
   d="scan'208";a="65159904"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Dl0NFvrb4R8O8ie18g0jTW7a7thuWIfeYI4nx1FcnLmwWR2OICz2XlQm0SbRQ03piUD12KSgsIzC46eD8zE+cZucVXmlMpRDvoV8uphiDHN3m0ksKzIU4GNnlc+ylrtiKo35slo3TGcvFSn7ljH/u/d2vtDKgiobX7NwLgBaz5XrMJQesGjUYpbN58oSVM7RPYnITNeUaCg58awG1uh1m78sTSjFzdKbX7tETSlNNwCRTserXlBxmIeik2gtXSHixWVENdc+G+aLxhWRRjO/B7ek+DzPEJlHVHro87Ut43PQte/Vu5Bl/0j9JxHsSamIab01Q3u/5j9k7MIyHTqSmA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=v6I/KiQ/hLtiHfnmA3YIwNigA+yWpv/hHVyNtWTppkA=;
 b=VHwnwGCBt11ZweqrS+81HAtUXMkOepjKelug2n6Kb41VlxI1DIZ5GTurQcavBBdZNd818ta+J80OQxG+ifFi5vVXZSTFJ7rTsti27UG58mL1nen05TOECJavTpL49Q3zEiLbvbBEFc5kn7MSARZFBFFIPkrHMPyCEx1/ayUqNye66tTYNRciJFnsK8qD+ZsayvOXqXqXLRkiF4sYG3arardY2M+qSGT4wyRFwLP/B8Awz9y3HIL5mrXoS70CnHR0uThSniGlFZXY2Gc0uAzAehgPu3kz087iAXxHTYTTvlgct/Z9j9S+QHXLYKHnb0EexHebUvlPLv+uuQMLaPuV8w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=v6I/KiQ/hLtiHfnmA3YIwNigA+yWpv/hHVyNtWTppkA=;
 b=JpjTdnCPtdfpKCKOXauHkHAnya9EvI49O9Z0YEf1J9jIq39flz3a6jgEyRLkyEjoYbkmtlK/Bv6Vb9Nu+TO2pm4zf4phJakmhUITRpQHetUVd1asMi96PVMgyFzC0/8z01YRksTs1vWNAPzmtcsobEfn838j27tzLaxkSlxlw3s=
Date: Tue, 8 Mar 2022 09:03:04 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v2] livepatch: set -f{function,data}-sections compiler
 option
Message-ID: <YicNuCDYIr6dZMFN@Air-de-Roger>
References: <20220307155558.72876-1-roger.pau@citrix.com>
 <984284e3-c423-16ec-5ad7-c4211ebddb70@suse.com>
 <YiY0jMinvZf8sBaK@Air-de-Roger>
 <c5623c11-cccd-c74c-6ebd-ada9885216e6@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <c5623c11-cccd-c74c-6ebd-ada9885216e6@suse.com>
X-ClientProxiedBy: FR0P281CA0084.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:1e::23) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 61984c41-68bb-4f16-ceb6-08da00da15a7
X-MS-TrafficTypeDiagnostic: MWHPR03MB2623:EE_
X-Microsoft-Antispam-PRVS: <MWHPR03MB262383DFE4FC68F28DE353B08F099@MWHPR03MB2623.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(8936002)(6486002)(82960400001)(9686003)(6512007)(53546011)(316002)(54906003)(6506007)(6916009)(85182001)(508600001)(6666004)(83380400001)(86362001)(33716001)(66476007)(26005)(8676002)(66556008)(4326008)(66946007)(5660300002)(38100700002)(2906002)(186003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?RUNBMUg3OWN1Y0w5eWordjJwQ0FjN013V2Noa1h4YUdoLzdDeVJ2OExOMzVG?=
 =?utf-8?B?dUdSTHozOU4yWktRc1V4a1ltTDJ3NS9MSnYrcHNqdzZlR2daTUFTZEZFR3Qw?=
 =?utf-8?B?d0xidUFtOEVWNHRhb1BHVW81WVFrMDhKam5IdGhBSFJHeHNHTm55U081Q2xB?=
 =?utf-8?B?WDhxZWo3bVdPdzE4VkRESnkxbElueEFTUENNS0c0Z0FrSEZmeHdSYjM4V1Zl?=
 =?utf-8?B?Z29NSTdhaEtON25RYk90czNNTTZTbGJBT3B3STBHV1g2cG1aR1pjVHNrQzFY?=
 =?utf-8?B?Sm1GWCtGVVVmKzNBTWtiNlB5Vk1hREZCZWZ6UlB2M1NpeUVGTDlWdWhMdUVL?=
 =?utf-8?B?Rk1TSmM3L2ZWTUQ3VjN5VjNvS28vMktySk9aMVBYNkczYktObEVaL09Yd1BM?=
 =?utf-8?B?d1VudGdzVy9lemEzSURCRkpaZTM4cTRua2NsellKZktFK2gvNFNyYlk5bFph?=
 =?utf-8?B?V1B2bUwrVUNCSGU1bjBHNlZqQXBHeWxibGhSYzVJdDhPZ3B0Q1BTUGwvS3RQ?=
 =?utf-8?B?SzNXc1owcTdHd3FNV2dXNTZpYnBaSXZQeEJ4MjhPNFNRVHVhdDFlOUtFaCts?=
 =?utf-8?B?OE1UR2Z3ckc1M0MwZk5RRVZlcEdJd2k2MytCK1FGVVJuUmRFdmU1WTdiM1Va?=
 =?utf-8?B?VTFFSUhIQ2pFdGtLZnd0aG5XMXhiNStzUFJ6NUNLQ3I0Wk5yOUNUcmtDd2Nj?=
 =?utf-8?B?UldvTmNPdi9GaUUvekUrV3BvNG9ubHd5aWZnRGRzZE8zYkpkQWEwZ29EaWw0?=
 =?utf-8?B?RGF2V0NDc2NrNFRscWJsOVZnb2xkUjRrelpHbHZoL1Z0aHpBNDFPR0I0YWpT?=
 =?utf-8?B?R0pwc2ZjdVpITzNDazM0b0orakd0MEFjYkdlMzlvMmNacUZZeUMvTGVVcVlH?=
 =?utf-8?B?dEpSaFVPTUM1dHp1anlxMHBmd0toSzRhU1c2WnFOZ0ZuaVZLdmcxc205K1c3?=
 =?utf-8?B?Nkg5RFpGdjJ3dkFEWDdweHdQMHBrNjh2VmpOMzhlaG1OUmNIc2tUYTQ0VW5Q?=
 =?utf-8?B?UTNISHc2QVRXTnRXSUc0U243Ulo2dVRQZHVydjV6MktBdjBrMk15eVNJamJX?=
 =?utf-8?B?RlNvNTRrdUZ2U3o2TW1VQVZOQ3V3dzRwTUd3Yms4QUdVcFNWd3F3aklGZTNN?=
 =?utf-8?B?c3AxQUx6aEZIZjEvZFZZTDZVUFRrME4xSUZWVUd2SFhwMUxLUlMwelhYaTR4?=
 =?utf-8?B?bm8wZXVzU1JxMldCdk93dTk4dW0rNW1RaFk1Z2E2eURCUy9LS2NWMXlUdzY0?=
 =?utf-8?B?UDVuWTRvaUJ3VXNPakdSaFU5OUFYUnZKU1NYQWhFN1M5bmZ2N3E0RDBhMnJv?=
 =?utf-8?B?VVVWU2ppd1NNRFZUUTNWUDFwaTJ0TGVjckZrME5SczlSZGs4NkNQb1V1bDFa?=
 =?utf-8?B?b2YwbkoxWTA1ak0weFhtMTRUaEdMZXkySGE1QXc5bEpOSnU3VmUvSXNpYS8z?=
 =?utf-8?B?dEpwK2JZQWlGQW5VMDAwVllGdk5WajJ2aXpKT1M2YmFoSjk2SlMvWWRBMlE5?=
 =?utf-8?B?WnhVNEwzOWNZWm5YVzFMRTMvakduUmQ0bUZpRW1EUGJSb29PSWFxd0lRNXQx?=
 =?utf-8?B?YXhTT2tFVnBTbU9BSWFYT0thSjM0YVBXTGVMMStSUVcvNkkrakNuYjRoaGx0?=
 =?utf-8?B?WXd5QURsUkpLQlUwVWtEZGNTNnlRY2ZTbEJadHBnT1NLRktEbEJLVVBjRWhk?=
 =?utf-8?B?WHhjVUpkeDBET2Z6SVFpNkZmN1Q1MDdmbDNNVU9LakllNXJmMkRZY1ZORGdv?=
 =?utf-8?B?NTRwaW9pVElVWEFUaXhiSUtnYnVUTXpPM0E2cTdUOU5UK3FLLzBUQTRNWmZY?=
 =?utf-8?B?L2g3OWV2ak8yWmdaUllaNWtGZnd5WS85VG5rOWdUZTdqMHZnSFVyZU1jSWZH?=
 =?utf-8?B?VG9TbWY1OVlWaDVkelVrQXl4VUloamsvVWgva2RJbVJZa0tJeXE1UmVJNENH?=
 =?utf-8?B?WFEyc29pdVFRYm5ldEhWMTE1aWttdlNQclE1ZXE1bXIrUWFhT1gzSVpYN0RR?=
 =?utf-8?B?MEtWUkRUU0dsaDNSUUFXaHZyYzBnRWRkZHhzWlh3U01OSExIdGE1RkJBandY?=
 =?utf-8?B?dnN4ME8wdWhGTWtMYzhHMjllOXpPV00vZUJ1T0FtWDZnYnN3TEJvMDRvbWty?=
 =?utf-8?B?eHJ1OW40UzROcmVoZEVaVlczbHhpbXdNM2tPQzRMM1NDdFlHbityVVkwNnUz?=
 =?utf-8?Q?siS9ilL72RaF8PFOmdWXyM8=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 61984c41-68bb-4f16-ceb6-08da00da15a7
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 08:03:09.4566
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: nEmWI+E9US+wgn0+XnD6yDkvo1GNNUQjDAAyB9Glnxm4PBRcWAOPveS+mXl7oda8Tj8cPhWoSozlaDH+CfULiA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR03MB2623
X-OriginatorOrg: citrix.com

On Mon, Mar 07, 2022 at 06:07:00PM +0100, Jan Beulich wrote:
> On 07.03.2022 17:36, Roger Pau Monné wrote:
> > On Mon, Mar 07, 2022 at 05:28:20PM +0100, Jan Beulich wrote:
> >> On 07.03.2022 16:55, Roger Pau Monne wrote:
> >>> If livepatching support is enabled build the hypervisor with
> >>> -f{function,data}-sections compiler options, which is required by the
> >>> livepatching tools to detect changes and create livepatches.
> >>>
> >>> This shouldn't result in any functional change on the hypervisor
> >>> binary image, but does however require some changes in the linker
> >>> script in order to handle that each function and data item will now be
> >>> placed into its own section in object files. As a result add catch-all
> >>> for .text, .data and .bss in order to merge each individual item
> >>> section into the final image.
> >>>
> >>> The main difference will be that .text.startup will end up being part
> >>> of .text rather than .init, and thus won't be freed. .text.exit will
> >>> also be part of .text rather than dropped. Overall this could make the
> >>> image bigger, and package some .text code in a sub-optimal way.
> >>>
> >>> Note that placement of the sections inside of .text is also slightly
> >>> adjusted to be more similar to the position found in the default GNU
> >>> ld linker script. This requires having a separate section for the
> >>> header in order to place it at the begging of the output image,
> >>> followed with the unlikely and related sections, and finally the main
> >>> .text section.
> >>>
> >>> On Arm the .data.read_mostly needs to be moved ahead of the .data
> >>> section like it's already done on x86, and the alignment needs to be
> >>> set to PAGE_SIZE so it doesn't end up being placed at the tail of a
> >>> read-only page from the previous section. While there move the
> >>> alignment of the .data section ahead of the section declaration, like
> >>> it's done for other sections.
> >>>
> >>> The benefit of having CONFIG_LIVEPATCH enable those compiler option
> >>> is that the livepatch build tools no longer need to fiddle with the
> >>> build system in order to enable them. Note the current livepatch tools
> >>> are broken after the recent build changes due to the way they
> >>> attempt to set  -f{function,data}-sections.
> >>>
> >>> Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
> >>
> >> The x86 part of this looks fine to me, just one other remark:
> >>
> >>> --- a/xen/common/Kconfig
> >>> +++ b/xen/common/Kconfig
> >>> @@ -350,10 +350,14 @@ source "common/sched/Kconfig"
> >>>  config CRYPTO
> >>>  	bool
> >>>  
> >>> +config CC_SPLIT_SECTIONS
> >>> +	bool
> >>
> >> I think this wants to live higher up in the file, perhaps between
> >> ALTERNATIVE_CALL and HAS_ALTERNATIVE. (CRYPTO, as seen in context
> >> here, imo also would better live higher up.) Or alternatively it may
> >> want to move to xen/Kconfig, next to CC_HAS_VISIBILITY_ATTRIBUTE.
> > 
> > I was tempted to place it in xen/Kconfig. The logic for the current
> > suggested placement is to be closer to it's current only user
> > (LIVEPATCH), but I'm not opposed to moving it somewhere else if
> > there's consensus.
> 
> I guess the main question is whether this option is intended to gain
> a prompt. If so, xen/common/Kconfig is likely the better place. If
> not, I think it better fits in xen/Kconfig.

I think it's unlikely for it to gain a prompt, other options selecting
it is what I would expect.

Will move to xen/Kconfig unless someone objects.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 08:08:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 08:08:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286578.486138 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRUt0-00066h-6n; Tue, 08 Mar 2022 08:08:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286578.486138; Tue, 08 Mar 2022 08:08:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRUt0-00066a-3e; Tue, 08 Mar 2022 08:08:02 +0000
Received: by outflank-mailman (input) for mailman id 286578;
 Tue, 08 Mar 2022 08:08:00 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRUsy-00066U-FO
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 08:08:00 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id dde10b99-9eb6-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 09:07:59 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2170.outbound.protection.outlook.com [104.47.17.170]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-13-TVLMaOJvM9ScTgCY-95AYQ-1; Tue, 08 Mar 2022 09:07:56 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR04MB5757.eurprd04.prod.outlook.com (2603:10a6:803:e1::13)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.13; Tue, 8 Mar
 2022 08:07:55 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 08:07:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: dde10b99-9eb6-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646726878;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=dVsBHgTQhgRYrpY17WjFcdPVjzBQlMdlRS0U1Tvchn0=;
	b=frQivhuuhhv7FsEAz4W5a5Gar5iclJeWjpUpH5pVuNhyRUVdbZizOO+E/wwGkmzwKc504C
	RzX3u6+xKfHJWU4hbosD/hPXjLuXFxlbUpJsTrvne9JmgsQQMKAih7YOpB2ywuprNXhkhT
	r/tB0xMwXAvRYtUt6Nwfn1J7J1YQRlY=
X-MC-Unique: TVLMaOJvM9ScTgCY-95AYQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=OWkkuWTjgvXRQ0XlPFEkCkPsK2Gc5tnSZxqoT+f2ozRKzyVeTItSVzZ6N0+mVl6XnheY88EmJ0QjcdklBrbwXsWheB4VcTOWi24idXs32tWEZf5pogkC0Y+Izr8HXj+3OwdJQOaqmBE5Er1WWswLqwmLtT66yjPtS02da1X/1+buzmgLe3ObObApN0KYQnw4jxFqlDHmRuqbUGKYNsmfF5UM0lEvrbhbEaclM6c2u7jMgp4u3u1ufGskux16hPHlzvBMpfkeY9jmQtcuCWuand6oClVkyxvo6fduvoUQ2MYmUac0wEuizd2iPqO6GebgRU+a6WeddoscMyMhDwPObw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=dVsBHgTQhgRYrpY17WjFcdPVjzBQlMdlRS0U1Tvchn0=;
 b=NOw0ooHMI8OBwoq/MNAJrUomVu+JoVL5xY5Ar/8hIwZGDGhAmU1SuTNq2yyEqKDQ/2g0/5XL8lv85GPUAF8D+w9u1Bg+k5mizsSw0YXcmDZYe9hVjlTMntV1LHiUTDFyp3/hzxcCmirJREdEfpWweUuioYyYxJTluftlMLu2v+0+1vcTXoUvFLNuMtgvo2LFeSP4AO+WlSBwf26i8Kjb3cpeONJXV9y/VsaTJZi06gNVhY2h/LI8vmyCBShaG5e+8kYducViG4mCge31ZJE2AVaLOwH5iSVcNVWWaX/dbrwivXM2UeKkjVFgX6u1mufTIPAp/OKu9NTKFFkyINryMg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <ce1ced4e-b9f7-fadc-9f18-b66445c02cdf@suse.com>
Date: Tue, 8 Mar 2022 09:07:53 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v2 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
Content-Language: en-US
To: Bjoern Doebel <doebel@amazon.de>
Cc: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>,
 Roger Pau Monne <roger.pau@citrix.com>,
 Andrew Cooper <Andrew.Cooper3@citrix.com>,
 Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
 Ross Lagerwall <ross.lagerwall@citrix.com>, xen-devel@lists.xenproject.org
References: <15b092bb3af6e32f72ee8fca45317687d23b8be4.1646687495.git.doebel@amazon.de>
 <862e888468a1d9923a6e6bef4061ac0caeb9274d.1646687495.git.doebel@amazon.de>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <862e888468a1d9923a6e6bef4061ac0caeb9274d.1646687495.git.doebel@amazon.de>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P195CA0108.EURP195.PROD.OUTLOOK.COM
 (2603:10a6:209:86::49) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: b0000ea4-20c7-4097-e9f1-08da00dac037
X-MS-TrafficTypeDiagnostic: VI1PR04MB5757:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB575700525A7B0821333EDE25B3099@VI1PR04MB5757.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6506007)(36756003)(53546011)(38100700002)(31686004)(2616005)(2906002)(5660300002)(316002)(26005)(54906003)(6512007)(8936002)(66556008)(66946007)(4744005)(31696002)(6486002)(86362001)(186003)(6916009)(8676002)(4326008)(508600001)(66476007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?eWd5SmhRNDY0NnB3aThIci93TUVIeFhvc0gwVmxBY3ZwYStOM0ZJRFVpdHB2?=
 =?utf-8?B?S1Z6WkdCdmpld01LWUE3NUpuVVBwZjA4R0ZGZFlnMHdIWEorbFJyeDhCS1Jr?=
 =?utf-8?B?REVramthei9ZbjFxN0p5YVRMNnlGTGFLRitOWDFlQVJrSUhlWEFRRHZycCtZ?=
 =?utf-8?B?SlpueGY2STU3ZGp1UXd5eU0yQzFaWTVrbXZ0RE04Q2YvUW5YRGxpSFFEMzNC?=
 =?utf-8?B?QTU5ajdqN29LUmNZZE9XaFlHMjBUQjIyaW91TW5GYUZYOEM4RWYrczBpWEQz?=
 =?utf-8?B?WjhnYk5QOE05MXM5TFpUTFZZTUlMc0V6MGlRQk1TdEVNbG12STVmUkZULzlH?=
 =?utf-8?B?Z0Y1WDNHQUFWeU40S21rNTdxOE5uWnJZVzdTS3p5a1ArRExxUS9QdkZ4d3hW?=
 =?utf-8?B?eHJ5bWE2NEFkNnB1TmdYaGVKdmJPWUZ5b0ZHdW5KT2dycFpDQVdSUkhsTWhu?=
 =?utf-8?B?cWVnK3dIT0dDdmo1OUh0N2JPbUd2QTNxaTFTS3JibUU2VVBLV1JJa3lZRkxv?=
 =?utf-8?B?ckVOd0h1Mi9wYUhWTFpGaGdrejBmR3QxRmZJWEpnYjFlOUJ1ZzI4a2hsaVdD?=
 =?utf-8?B?OThpdk01MWF5QUhQV08rT0VXclFIWU5WT1dwZE82b2wzcTlOQVQvTVMwWjJ1?=
 =?utf-8?B?U1ZQYURFdnBEcnUvVStzQW5pWUp6QnM3L2Y3SUwzM1d6c0xBMHhJTU1SSnhI?=
 =?utf-8?B?RWZpbUNuYTg0aDdmT0t5K2lKWTU3d1VyMXRtTjJjVklwYlQrOFgzL3hBUnZw?=
 =?utf-8?B?Mko2NHR5eFY5WHQ0R1JvOU94ZzFLM0ZBRjd0L0xmVW5zOFVSUWNCdDBkVytG?=
 =?utf-8?B?SHYyQ0gxbjZycGo5aFhUYSs2WUlkcTJ3TE1WUmQ4cHFvKzFkYkRoY2ZYSG11?=
 =?utf-8?B?YkFBWlMrQlRUMmE3YUNvZVFOWTJPcDJiOUNKeTQ2TnJsbTJiL0x6MWQ5NjRh?=
 =?utf-8?B?cHdCOVYraU8vRENhblFyQzNUV2x1Q2dhVTRoaW8vYldOamJmamppeENmelFt?=
 =?utf-8?B?bmdWcms3SENpZDJYa3pnQkhlZFhVNFFoYjVPNXcyOEhvRnFqNXdkZXhJM2ow?=
 =?utf-8?B?MEZ2UEcwY0hncVBLazF5cm9HR1BVMTUzb3Y4OSszM3dBRTQ0M1BBaWdIUTJF?=
 =?utf-8?B?RDhWUTREdU93VThOQjRFRHd6K1AxMFdpSENDajBiRzRGUHRoUThPWEFnMW9m?=
 =?utf-8?B?SnQ5WWdSQ2VtV3MySy9XQW9aYlE1bENOMzd0bjBjRFIrTFo1NC90SmMvR3gr?=
 =?utf-8?B?cm1MWlp2clZTMDNvVWlUaE9iT0lKaDJudDlvL0lGKzVVSDRWeUdXb0tNd2Z0?=
 =?utf-8?B?RTBzRjFmcHpiNDRNTmFpaG1RUmEwY0dIS2FqNWMzM2ZvUlNxZXFBRUJkUWh1?=
 =?utf-8?B?U1hZMy83REpJVjZqcTV2WjRxeHE3NjJEUCtCd01pRURpd3MvYVRoVjc4dThl?=
 =?utf-8?B?SnZjUE15ek1hbVhEd0dGbURzWHZSQnFkRWd1Mi9YQ3JaeDZ4SDBySXpIZ2VJ?=
 =?utf-8?B?alpOZFZnSHZsTDFoNWVsUldwY0VOU29EZnRneTd0VG93VVpBd3pFV1NUeWx0?=
 =?utf-8?B?QXY0bWRVTVlyc09rNFNIcmhDUGhzTW9VclBEaDlkM3IyM2hKK1FteDVpYjVN?=
 =?utf-8?B?QnRrUDhUcHA5bVNGT0VNTkVWVjBaT3MwT3IycDA0R2YweEdudmw1aWFmaFZR?=
 =?utf-8?B?Z3NtZ3dxZ2wrdzJlZGRHS0c3ZWFRdEV5SFlDN2FpUVhHOHEyRVo2T1crNTFL?=
 =?utf-8?B?c2ttWGk1UFNwSFZXU0h5UkYwYW9PTkxsU2diSEYzWlV1aXRxVHhybytYNWFU?=
 =?utf-8?B?bi9XUjlRWHlpSEpBa1M4ZGJDUTFGMlVrY2ZsdndNSG9BNjU0UnM4OG9wVEw4?=
 =?utf-8?B?YTUwZEVJZUhJZkMyaXZVMXI2T2FEcWc1blkwZVh0SU1MdzhiRTUyTkFhSVVY?=
 =?utf-8?B?Y1F6bEk5bVRuVWtBaWhXVE0ram1EVUxjclZWNG04ODg1SU1zRy9MTmxaYi9s?=
 =?utf-8?B?QjlpbFQyRlRjQkpESjM1ckJCU2FlWTZLMjVBRWJ1eGZFbTVSaGgxTlF0ckd2?=
 =?utf-8?B?Uk03djRTWWR4N0ZKdndBRGVBdWZJRzBoeC9HTWZYa3JvNEEvU1JBdHNhVk1h?=
 =?utf-8?B?dVNxZzhMK3V6aVlicENyME9ZZUUreVplMUhqcXpSUFYzSDlTOFdLSlQ2RDNZ?=
 =?utf-8?Q?6eWFn3jcXuoFOdtd/wTSeLg=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b0000ea4-20c7-4097-e9f1-08da00dac037
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 08:07:55.6762
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: gxtcC/kUVCTtPjad+mPOkhw6sdrGfI9CddHdU0enZbd22wMw5dSQpQ3vtn+fSBWB0pZkPBx6mfKG5dYNo4rWXw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB5757

On 07.03.2022 22:13, Bjoern Doebel wrote:
> @@ -159,7 +200,11 @@ void noinline arch_livepatch_apply(struct livepatch_func *func)
>   */
>  void noinline arch_livepatch_revert(const struct livepatch_func *func)
>  {
> -    memcpy(func->old_addr, func->opaque, livepatch_insn_len(func));
> +    struct x86_livepatch_meta *lp;

Repeating my comment here a 3rd time (sorry): const please (and
generally wherever possible).

Jan

> +    lp = (struct x86_livepatch_meta *)func->opaque;
> +
> +    memcpy(func->old_addr + lp->patch_offset, lp->instruction, livepatch_insn_len(func));
>  }
>  
>  /*



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 08:13:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 08:13:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286586.486149 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRUyY-0007Ys-W3; Tue, 08 Mar 2022 08:13:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286586.486149; Tue, 08 Mar 2022 08:13:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRUyY-0007Yl-RX; Tue, 08 Mar 2022 08:13:46 +0000
Received: by outflank-mailman (input) for mailman id 286586;
 Tue, 08 Mar 2022 08:13:45 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fWwI=TT=citrix.com=prvs=059ab6e88=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRUyX-0007Ye-CF
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 08:13:45 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id aa04d1b0-9eb7-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 09:13:43 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: aa04d1b0-9eb7-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646727223;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=J5+YHmJ4AyZl7vAJ36YJwHUbaaRquqGnq4TZPhZ+MwI=;
  b=DMUU0N8oMh4S3uc7GJ6kjB/h4WCtDrpqLS0wpy8L7YHQ8o5TzMAN+J3V
   hXDZpzUdzSaqLANQfVlxvZsleNjMoK4ULVchru9YyHmH+O9gxROikLddy
   z6kyzuTrrIDZSDKFsL9v0SQqct6d9tsH40B8unwrp8tDLjXMnu3ssR9cu
   o=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65690194
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:q4sBOqs8pvv8O6UNnZFg8ffAL+fnVKJeMUV32f8akzHdYApBsoF/q
 tZmKWqAaKneNGv2eYt1Pti2pB4O6pfXyYJgTVNv+C9gESpG+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jV5
 oupyyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi8CHfT8peZeeSIHFg9iMu4c35/1HEmW5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AO
 pRIMWM+MHwsZTVoMEs4VLIfnNymg3jOXXp08HOvprM4tj27IAtZj+G2bYu9lsaxbdpRtlaVo
 CTB5WuRKhsXLsCFwDyJtHelnPbSnDjTUZgXUra/85ZCvlqXwWACDQwMYnGyq/K5l02WVspWL
 gof/S9GhbMp6EWhQ935Xhu5iH2JpBgRX5xXCeJSwAOQzqvZ5S6JC25CSSROAPQ2uclzSTE02
 1uhm9LyGScpoLCTUWia9LqfsXW1Iyd9BW0IaDIATAAFy8L+u4x1hRXKJuuPC4bs0IezQ2uph
 WnX8m5u3N3/kPLnyY2Q3gn3vjDvjKOWSyAp6UaNeUKX0zJQMdvNi5OT1XDX6vNJLYC8R1aHv
 WQZl8X20N3iHa1hhwTWHrxTQejBC+KtdWSF3AUxR8VJGyGFpib7Fb289g2SM6uA3iwsXTbyK
 HHetgpKjHO4FCv7NPQnC25d5ilD8EQBKTgHfq2MBjatSsIoHONiwM2ITRTIt4wKuBJw+ZzTw
 b/BLa6R4Y8yUMyLNgaeSeYHyqMMzSsj327VTp2T5035jeTAOy7IEu5VbQDmggUFAEWs+l69H
 zF3bZfi9vmieLemPnm/HXA7dzjm0kTX9bip8pcKJ4Zv0yJtGX07Cu+5/F/SU9cNokihrc+Rp
 ivVchYBkDLX3CSbQS3XOiELQO6+Bv5X8CNkVRHAyH71ghDPl670t/xBH3b2FJF6nNFeIQlcE
 6FVK5/eU64UFlwqOV01NPHAkWCrTzzy7SqmNCu5ejkvOZlmQg3C4Nj/eQXzsiIJC0KKWQEW+
 tVMCiuzrUI/ejlf
IronPort-HdrOrdr: A9a23:GagXMq8mAdZxiCzh639uk+AJI+orL9Y04lQ7vn2ZLiYlFfBw9v
 re+MjzsCWftN9/Yh8dcLy7WZVoIkmskKKdg7NhXotKNTOO0ADEQO5fBODZsl/d8kPFltJ15O
 NYaK55B8T3DV9myejHwCTQKadH/PC3tJmyg+HQ1nFsShwvTZpBwUNWNia3e3cGPTWvI/ICZe
 GhDw581kKdRUg=
X-IronPort-AV: E=Sophos;i="5.90,163,1643691600"; 
   d="scan'208";a="65690194"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Bbj/nbEoXhRgsGx+G/bIQ0jXvlhx93gB/5xHR96gX5nz04594OKf2aIP+SnsQTPcgWTgOUjbUQKLPD+kKAyGUOUdQSLMJfAGMDzYX6H4TSNP14AoTF0LBTcieJXgialYZkUs0L8zynt/qlx8asE7rdkGidrTFKpd2nKsWogmjgHt6lxIrYbl8wPkshcQ0xwYvSxNXr2oV87AE9bjbRCijV1rFUsc/q6KSdPBUcDwKO7yxCWtSAj+Y3Lg7xi3sEb4R9IOUJMTRJuDD5Qs+sgognzDs1A2HAjid8CZXYYIM7tghp+DwWwr8tB4jR+yCdtw7FKm9XT2Ejg+qN2IqOYKMA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=GmdmBT8xwaAp+5PvvSMSf2AOX8Aw+VXBSXod15KL0aQ=;
 b=HSEg/dNeOWQE/Teq97y7urPxKdjLFTDq9UMtDFO9JSV410K0ebubsaw7YgZ4mQ/l2NT/HT5zXlTvGWiQamFGaczR7FoUcsjsFaq5bYUzvhUVmdCdV+A013vtENjbxfeBhPWKwMnvF8CCt/Crqla1Vbr5CPk/KRyAWhjTY4ZmY5c6qpAlW+bTD4v//jrFY0nn//cLx13dqrt9HgkTahtJwd909ehqzy5EET0LEwCVJ7xOtNzLBJJ/bWCRg5tpPC805TVAe2im439HvncTNhh8xh5VSruYEOmB51dZz4j+faHNFUOLh5P+63ZOsnSMvWqO5czNGTjiUkdLTRlLKOIafw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=GmdmBT8xwaAp+5PvvSMSf2AOX8Aw+VXBSXod15KL0aQ=;
 b=VPm9i2ZSjXxjLeyJnkur0xABSwYc7it03cLjY5lbcKA+njX00k0r//pZB84W5snTrrsNKdQtyQ3IvuQUKSUAr06Mc6DbkfZ6HY8V584X0n8xxRSz3H1duDvE6nbj3dnCS3StatC0LEDkDUUTqV3SJEw1/1klwkUhKNG4s3GFunE=
Date: Tue, 8 Mar 2022 09:13:30 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Julien Grall <julien@xen.org>
CC: <xen-devel@lists.xenproject.org>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, Jan
 Beulich <jbeulich@suse.com>, Stefano Stabellini <sstabellini@kernel.org>, Wei
 Liu <wl@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH v2] livepatch: set -f{function,data}-sections compiler
 option
Message-ID: <YicQKoI8H3DJlqF2@Air-de-Roger>
References: <20220307155558.72876-1-roger.pau@citrix.com>
 <f6e3f58a-ca7c-6173-815b-8bf300df33ed@xen.org>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <f6e3f58a-ca7c-6173-815b-8bf300df33ed@xen.org>
X-ClientProxiedBy: MR1P264CA0007.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:501:2e::12) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: be79ba40-28b7-436f-217f-08da00db8b33
X-MS-TrafficTypeDiagnostic: PH0PR03MB6723:EE_
X-Microsoft-Antispam-PRVS: <PH0PR03MB67238496F73DF2BCE7007EC78F099@PH0PR03MB6723.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(6486002)(508600001)(316002)(6506007)(86362001)(6666004)(26005)(85182001)(6512007)(186003)(83380400001)(9686003)(53546011)(66556008)(82960400001)(4326008)(33716001)(38100700002)(66476007)(8676002)(66946007)(2906002)(8936002)(6916009)(5660300002)(54906003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?R3lYa1lQM2RibWQ5c3VQeDVubVA0RzUrMDFhLzBEUUg1dmp2L3lOTnpXZm5D?=
 =?utf-8?B?ZUdZV0hXZzNUSE9nTW5rVXZ4MWFrOEthWU96aXRnSDVGdldpVy80ekJDa0R4?=
 =?utf-8?B?VmJ3MThkRnM4SEFlTmRPaUZ5L280RSt2TTY2UWhBSFhLdExvVi9GZlZLQi9Q?=
 =?utf-8?B?dWUvZWM2ZXlzNXUrcStjdmJYQ0JKTUNaOVJ2U3JwTzcrakNObXBIeVNiQjZs?=
 =?utf-8?B?QzZ2bVltbmhTL3gxaW1iWnhUc2lndVNPdW5hMGV2R3dKSldNUmJ3TjhhLzkz?=
 =?utf-8?B?ZE94Zko2K3dLMmVMZjM3OEdubFJyMFhpZXNMYjErNnBJeXNYeFBhL1NBK1l0?=
 =?utf-8?B?VStsQ2wwNjZiUVRqZUNaT0JqdDQwNTNOMXpKd2w1ck4ybEwzRTd4NWZVNHNL?=
 =?utf-8?B?VllMeS9CaktHQTFIZnc3dUxTSW5yeTAxdCs2aGE2Z0o1WXhQR080ME9BczQy?=
 =?utf-8?B?bUNnQ3NRcGFkdDl2N1Q3KzhHNlNvbVArVU42dzlmR0ErcWRDSVRGRWVBSktu?=
 =?utf-8?B?QTJMV2pmTklCaUZ2eEhFZVhGbldqcnNMQ0EzUmlEbmhvcUNiSXYzVjZkR3lI?=
 =?utf-8?B?TXRwTGRIMUNkQm0wL05tYjJ1THAvbHYwSmFNRlMvanNWT09BaCtEeGJTYjhZ?=
 =?utf-8?B?aURTQm01b0VCME5SbTl3SWV3azhyc1BxaGRPOEZWbjNRTzJvMFQ3YkR5MlNt?=
 =?utf-8?B?UDJRM2NNQWQzbVQzcWpxNnIybE5WZml3d1dUNE96ZnN6MlNNSWJLTzV1cHJr?=
 =?utf-8?B?dSttZ2xaNGdzQ0hEbEF5QUZuSTNQR3lqL0cwb0I2WEpGdkhtaTRwNkJIYzdh?=
 =?utf-8?B?RjhFOWpMdGdWNGduU3duWHU4bmxmVVpQcU4zTHJ4QWY0Q1ZVSHpKMS9MRjU0?=
 =?utf-8?B?N2p6K25KUGFnNm1Pb1BNZ3kyWmhZQThDUndOdXhkNm5xS2d2UEpjQzIzOVVV?=
 =?utf-8?B?dnJDS3FPZmlIMW0raXF2QXdqR3lYelNFRVFpTy90eFk1WU5kU0F5V3k4Qk15?=
 =?utf-8?B?LzFqbVkxSHVaNkgrUy8yNnAyU0tzbUprSXBaRDh0aHVoVkkxWHdsK3dNUG9w?=
 =?utf-8?B?dG9BNUdPdXR2L0xwc1pmWXdES2g2aVhZbGNveEt1S1UvSHNiR1VxaUpkejNY?=
 =?utf-8?B?QVQvUk14ejVGMERMU0xZT0tnU09XcndGRVdlR3NHanhUbDVML29UeUVRVEsr?=
 =?utf-8?B?RVVYbGREWmVYcFRWdFVkT01tZEFxbFJDNlNrcmVMa1E2ZDdyUHBWWFAwNHJX?=
 =?utf-8?B?NVFnN20wS3pCQjA5ckllZkQzVlBPWnhsUVUvRDZmNUxBVmFTSWFOWTF2YVJo?=
 =?utf-8?B?S0RoSFRNTkw4OThya3JCa0pJTHBXZ05LSS9qejNFbS9UeUxVMjd2NzhHOVJ4?=
 =?utf-8?B?YUoxbGhjR3VkS25ldkYzMGM2R2pEYUpONExsUCtKWGtZMVVudTRzcXVGbTI0?=
 =?utf-8?B?YUM1QVIzVmQwVk9GenByWUdBVFdEN0lveVlRVGExbEpvTVlRL0lOaTdHazRN?=
 =?utf-8?B?YU9sa1BHQldSRnpxckgvWWdTZUd6RCtzdzZsekV3bUJhL2JCL2o1YU01WWdr?=
 =?utf-8?B?b2N3K0RaVXpnKzJtZ0NoYUxySzVNTDRiWXE3Z2JKekNPakRjd0hpNWpIY1ZB?=
 =?utf-8?B?VDcyUnB1MXAvTnNwc3pXYm5sc2ZBZ2ovK2FoNEcra1I5MHpHeTJxdEhpVTR6?=
 =?utf-8?B?VE9vS3ZGUk4zRmpXSy9vRUFpenF1S243N0JvTUdwT1I3c2lzelg3Yk5QenhF?=
 =?utf-8?B?Ykk4WU85MHcvUVhqdGEzWUVCN29SWnpXeFA0UVBSRWdIUHpCNXJhWU9LRnE5?=
 =?utf-8?B?R290M1N2L3JzK0NTTnI3SEZGclg2N0I2T3ZKMEJaZEpqYlppZHhjUmZWNUVi?=
 =?utf-8?B?cVREbE5DMFVKWUlNTmNZMTlDYnUyUTJDbGs1cXdwdlByMFgrWlV1UVQySWNp?=
 =?utf-8?B?KytBRXYvTkhLQVppS08wU3JUbzFJcnVSUG5CeUhDd2VXbysxMTc1bEt2Tm02?=
 =?utf-8?B?NWRyWjdmT1gyTjkxTWZvaGRpSWNyb2daSFBnajBVUFJVak55UWZ4K2FycEFJ?=
 =?utf-8?B?N0Z4TlZQc3JsWm9iblB3bE1WeGFNNTJhSnNRMFJtVU5lQk43Z3YydVo0dy9u?=
 =?utf-8?B?RVFLUWRlR0JjS3NqZmVjVXpiN2ZmU0NybFBPYUFkdFBrNHc5enduaENzRXo2?=
 =?utf-8?Q?Wu9SPYFBVbEKpAz0eyFRiLU=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: be79ba40-28b7-436f-217f-08da00db8b33
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 08:13:36.0348
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: rtw/lz4GAuWzCQ3htALMTz6J4R0T5cUXAj5qMNyLea/5HHIr0QDmcUeWGgVwGiw9F7/6xjhfvy0DIUDnhEKZZw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR03MB6723
X-OriginatorOrg: citrix.com

On Mon, Mar 07, 2022 at 05:19:53PM +0000, Julien Grall wrote:
> Hi Roger,
> 
> On 07/03/2022 15:55, Roger Pau Monne wrote:
> > If livepatching support is enabled build the hypervisor with
> > -f{function,data}-sections compiler options, which is required by the
> > livepatching tools to detect changes and create livepatches.
> > 
> > This shouldn't result in any functional change on the hypervisor
> > binary image, but does however require some changes in the linker
> > script in order to handle that each function and data item will now be
> > placed into its own section in object files. As a result add catch-all
> > for .text, .data and .bss in order to merge each individual item
> > section into the final image.
> > 
> > The main difference will be that .text.startup will end up being part
> > of .text rather than .init, and thus won't be freed. .text.exit will
> > also be part of .text rather than dropped. Overall this could make the
> > image bigger, and package some .text code in a sub-optimal way.
> > 
> > Note that placement of the sections inside of .text is also slightly
> > adjusted to be more similar to the position found in the default GNU
> > ld linker script. This requires having a separate section for the
> > header in order to place it at the begging of the output image,
> > followed with the unlikely and related sections, and finally the main
> > .text section.
> > 
> > On Arm the .data.read_mostly needs to be moved ahead of the .data
> > section like it's already done on x86, and the alignment needs to be
> > set to PAGE_SIZE so it doesn't end up being placed at the tail of a
> > read-only page from the previous section. While there move the
> > alignment of the .data section ahead of the section declaration, like
> > it's done for other sections.
> 
> This sounds like a bug not related to this patch. Can this be split
> separately?

No, .data.read_mostly needs to be moved before .data so that the catch
all .data.* introduced to .data to account for -fdata-sections doesn't
end up also including .data.read_mostly.

> > 
> > The benefit of having CONFIG_LIVEPATCH enable those compiler option
> > is that the livepatch build tools no longer need to fiddle with the
> > build system in order to enable them. Note the current livepatch tools
> > are broken after the recent build changes due to the way they
> > attempt to set  -f{function,data}-sections.
> > 
> > Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
> > ---
> > Changes since v1:
> >   - Introduce CC_SPLIT_SECTIONS for selecting the compiler options.
> >   - Drop check for compiler options, all supported versions have them.
> >   - Re-arrange section placement in .text, to match the default linker
> >     script.
> >   - Introduce .text.header to contain the headers bits that must appear
> >     first in the final binary.
> > ---
> > Given that now the header is explicitly placed in .text.header, it's
> > likely possible to simplify some of the ordering of the object files
> > for the prelink.o generation, as arch/x86/boot/built_in.o no longer
> > needs to be the first object file in the list.
> > 
> > It also seems on Arm the schedulers and hypfs .data sections should be
> > moved into read_mostly.
> > ---
> > Tested by gitlab in order to assert I didn't introduce any regression
> > on Arm specially.
> > ---
> >   xen/Makefile              |  2 ++
> >   xen/arch/arm/arm32/head.S |  1 +
> >   xen/arch/arm/arm64/head.S |  1 +
> >   xen/arch/arm/xen.lds.S    | 49 +++++++++++++++++++++------------------
> >   xen/arch/x86/boot/head.S  |  2 +-
> >   xen/arch/x86/xen.lds.S    | 22 +++++++++++-------
> >   xen/common/Kconfig        |  4 ++++
> >   7 files changed, 49 insertions(+), 32 deletions(-)
> > 
> > diff --git a/xen/Makefile b/xen/Makefile
> > index 5c21492d6f..18a4f7e101 100644
> > --- a/xen/Makefile
> > +++ b/xen/Makefile
> > @@ -273,6 +273,8 @@ else
> >   CFLAGS += -fomit-frame-pointer
> >   endif
> > +CFLAGS-$(CONFIG_CC_SPLIT_SECTIONS) += -ffunction-sections -fdata-sections
> > +
> >   CFLAGS += -nostdinc -fno-builtin -fno-common
> >   CFLAGS += -Werror -Wredundant-decls -Wno-pointer-arith
> >   $(call cc-option-add,CFLAGS,CC,-Wvla)
> > diff --git a/xen/arch/arm/arm32/head.S b/xen/arch/arm/arm32/head.S
> > index 7a906167ef..c837d3054c 100644
> > --- a/xen/arch/arm/arm32/head.S
> > +++ b/xen/arch/arm/arm32/head.S
> > @@ -120,6 +120,7 @@
> >   #endif /* !CONFIG_EARLY_PRINTK */
> > +        .section .text.header, "ax", %progbits
> >           .arm
> >           /*
> > diff --git a/xen/arch/arm/arm64/head.S b/xen/arch/arm/arm64/head.S
> > index 66d862fc81..e62c48ec1c 100644
> > --- a/xen/arch/arm/arm64/head.S
> > +++ b/xen/arch/arm/arm64/head.S
> > @@ -133,6 +133,7 @@
> >           add \xb, \xb, x20
> >   .endm
> > +        .section .text.header, "ax", %progbits
> >           /*.aarch64*/
> >           /*
> > diff --git a/xen/arch/arm/xen.lds.S b/xen/arch/arm/xen.lds.S
> > index 08016948ab..836da880c3 100644
> > --- a/xen/arch/arm/xen.lds.S
> > +++ b/xen/arch/arm/xen.lds.S
> > @@ -30,9 +30,16 @@ SECTIONS
> >     _start = .;
> >     .text : {
> >           _stext = .;            /* Text section */
> > +       *(.text.header)
> 
> With this change, the changes in arch/*/arch.mk to order head.o looks
> unnecessary. Can we remove it at the same time? (The .text.header and the
> update of arch.mk may want to be done together in a separate patch).

I had a note below the commit message about this, as I didn't think it
was strictly necessary to get this accepted. I will do a pre-patch
then with those added.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 08:15:44 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 08:15:44 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286592.486160 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRV0R-0008Ay-AE; Tue, 08 Mar 2022 08:15:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286592.486160; Tue, 08 Mar 2022 08:15:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRV0R-0008Ar-7E; Tue, 08 Mar 2022 08:15:43 +0000
Received: by outflank-mailman (input) for mailman id 286592;
 Tue, 08 Mar 2022 08:15:42 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRV0Q-0008Al-5B
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 08:15:42 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f17be3cb-9eb7-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 09:15:41 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2104.outbound.protection.outlook.com [104.47.18.104]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-32-h3A88TbbPbqlZlp9j1WKjA-1; Tue, 08 Mar 2022 09:15:39 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM6PR04MB6294.eurprd04.prod.outlook.com (2603:10a6:20b:be::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.19; Tue, 8 Mar
 2022 08:15:38 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 08:15:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f17be3cb-9eb7-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646727340;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=X1s6mjjH7R8wg503B6pqhzr81HIXl+9NtbdwV2yhnIg=;
	b=LhagFGw9xDTKsHmxNH7TNDm3OQi7A9L28aHkU3BRdgJjoZZPporu3MCK2LTwnUPSsoQPVd
	hgzXX8m9I0fPbFe9aFn2T2FrSDE0CyRJQrkrVKhoPcQeRmb6lgtyXGVzrq6vaQokWS7wUt
	eUmOLgFAYGLBgrd5aHN7zFNQ/ZjAw/A=
X-MC-Unique: h3A88TbbPbqlZlp9j1WKjA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=QhtA1B4gj7hzXngsYzu6NeGToxyTa9vxMxhUhHqU5woEeiC0u+IvhSBBbyOjDjSumeJoLGZAUSuuoQOUkZlgXXuEF0hIJXEoGdwI1E3SkuvNx1U+U6HNUJ8Vz9GTadraXjlLerl5/XcKa2XgSEaszy54Ba8BwznUQbTTDy8E7TFaO3LyySuJUYWsMehFcOZS5P+PsQpjPkCpvdzk3E/fSUSd8FFx0xAZ4++9PcBs49sw2CXmJVkSnJD1qGvAfel7nV97cq9DA/SEAy8UKcNweMKa1D5Vj+Nd4OF3SFGz58GDzbXkENJh+idjkIiDqphJuSHiSPaWwvdMyLjut2tAvA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=X1s6mjjH7R8wg503B6pqhzr81HIXl+9NtbdwV2yhnIg=;
 b=fpLCTemt12KKu+ZZnuaHkrOGOx2cLrUysqoqq2Z9NaM95BbIAbnJk6OrEasXlRoXNj48Ioh2Qmdu2vzt6On0uqwiU/dmtIcnP1KE+t6WfD5Ibf5m/3u0zAB/oTNIqnT5kHPGAI8uJsCaHZDaNUstoWzU/wMZFHQYUXoMKYSz4PKA+jj87bnVvuyxyMjw0AF/ze0HzkDz6+dOGzhnd8HRm8gTFbPuM5qV/m5O2KQVh7bzglkb8aRbUaklATUFT/WST55B8vUQHGhcHRnIg+x8xvxqjkf4oitS6pzKuWusx4UMLGb9RMlfcShoM6UA7mxYMRg4NcqOBFvi5w6zeNKrcQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <c3d9a1db-bda0-22f4-6733-11dfbb1bebfb@suse.com>
Date: Tue, 8 Mar 2022 09:15:37 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH] x86/kexec: Fix kexec-reboot with CET active
Content-Language: en-US
To: Andrew Cooper <andrew.cooper3@citrix.com>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Wei Liu <wl@xen.org>, David Vrabel <dvrabel@cantab.net>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <20220307205313.31247-1-andrew.cooper3@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220307205313.31247-1-andrew.cooper3@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM7PR04CA0012.eurprd04.prod.outlook.com
 (2603:10a6:20b:110::22) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 00f4f8e2-f486-43a6-dff8-08da00dbd451
X-MS-TrafficTypeDiagnostic: AM6PR04MB6294:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB629453ACDADC0756C4CC4666B3099@AM6PR04MB6294.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6916009)(316002)(6486002)(36756003)(31686004)(66946007)(66556008)(66476007)(8676002)(4326008)(26005)(83380400001)(5660300002)(6506007)(186003)(2616005)(53546011)(8936002)(4744005)(6512007)(86362001)(31696002)(54906003)(508600001)(2906002)(38100700002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?M2g1N1pvc2JQUEtuUkdDbzYvK2NWbWJzYjZpbEtubkY4SUR0czN2Z1k1N2tB?=
 =?utf-8?B?YXdvNzFRV09tbWpLcVlKaTk3Y0p4RzBZVjd3T09tNlpDSVBkUW9TQm1BeEwx?=
 =?utf-8?B?dzhrWC9xalcxZHFFNHZmWG5KVGEvN0gyOVlFY3lSK2tyVkpuNjNpSmZ3VFFt?=
 =?utf-8?B?R056V2Vxbmh5ZzhuZ3hBcGlxYjR4VStxV1ZRMkJQMnZQem1adVdqV0YzV05n?=
 =?utf-8?B?SmljVUJsZC9UTjhIK1lUVnBTN0MxSnhNVEpvamM5NGxGVTNPZzhPcGJNSEpv?=
 =?utf-8?B?aFRBTDlXalFCVnMvMnA1dk9WalNaN0NBSXFGM3lTSEg5M25YZ0VlTlRKRi9Y?=
 =?utf-8?B?aVBXZXdhdHFva3lwMmlKNjJjdnhLRllvUWp3UlI3QUVQWjlMMTNDY1luNjlR?=
 =?utf-8?B?MHUxUmhCN0lFUmNUOXlySjNUTGZiMENjU3ZaQWozZ1NoaXNNU0F4aFg5Q3lH?=
 =?utf-8?B?eEpCalFqamdxNzNJVGo1SHJpUm1DUTMySzhDWkRCUnBkakpKRFRUVWlBYXZI?=
 =?utf-8?B?U085REFFY0VXM1JiSnFoZDFXNFk3M1RPSE5iOVRBODU3UWxpNHdLWXJwMHFE?=
 =?utf-8?B?anNZOGJDb2RFRm9TZFlyZ21pQ0dNRzRrZFlyRWE2cnpyRmlaaW1kQkM3SFBl?=
 =?utf-8?B?TGdOMHFOZjc5WlhSZWRQd1ZOT201c3l0cGQ4VXdWV3M4WVpsc0ZlV1lpUDFz?=
 =?utf-8?B?Qy9jampTWjAzNU5OMWh4UnFVZlRwV09nbG9ZQ3RhK29PZm5KaDY0d3haYkN4?=
 =?utf-8?B?cGRkZndHd0xIZTNKOTlmTHdZYmFMYlVLbit6WWlVd29IYmZKL3VKdFI1aWRt?=
 =?utf-8?B?cWhGK0pBSkZJV1dXRStHcXdkd3VtdE5oa1Z3R2UzVlNXS0RPTzhmNzJHeEFN?=
 =?utf-8?B?OXpUWVl1cDZHdmRmMmhreG5BV3hCcDY2dDY2RkhLYkZEdlNGOU43dktndnZw?=
 =?utf-8?B?TnBDUms0N2pCNmF4c0dsWCthSzB2WFg1b3crRzVMdTRnc3N3QWU5a0FXYzdL?=
 =?utf-8?B?VVp5aHFsUlhwSzBlK0Y3bzYrU3lVNWFMckkvbEx0YTJ5MEl5V244anNZUGhP?=
 =?utf-8?B?UkNKcjJhaU9STmNhbDJKdCt6WmlTak9lOHBGaXpLV1Qza3EzZXBtQkM5azF2?=
 =?utf-8?B?dThmQXllQ05xOUFNdldQVW90ZGpGSVBxdktqSjVaWXFUV3NsS043Q2p5bU5C?=
 =?utf-8?B?MHhVNHlHbFFNQ1hoQXRIMm1kUlFCT1NianNWLy9BRk1mSUw3UnJEQnlzUFpL?=
 =?utf-8?B?S2NQV1NVYllGay81WGJZMVpIWHhybW5oTVZUcVlaUHJrWXo0dVVpU3RnN3Z5?=
 =?utf-8?B?c3dEUUx5RE02ODZkYWEyditUN283QXMyYnM1RFdoVTRRMkl5Uk9YVjE2a0d3?=
 =?utf-8?B?MS9MRE11VGNHY2xPd1JLem52bnFtM05BbExjY1AyRVBpMks4QnREWWc5Mjh2?=
 =?utf-8?B?VzUxVnllSWNIR0dUM2UxOUpQa2JvSzRsWUt5WENXbmFUSyt0RFdYQlYzcDBh?=
 =?utf-8?B?UlV3V0hmNXhLNWNrRW5IQ0JFTkR1NlZZcE9DTnM0WmM3eUZsZWJaVGJUM2w1?=
 =?utf-8?B?VWZEK0psRWJsTnZlR1BFMHNGWEZFOW4vbzBia3Z5MXlNNUFhUHdFczNya2hQ?=
 =?utf-8?B?QjFBZTNmc2UzYUR0MUkrdnB3cGhxWEpKdEwvQkMzaDlvcGdNS1JjVGVmdGdx?=
 =?utf-8?B?YkdsOVZWQTJXY0hPNnR6R2w4NTJ1VWorQ1lZQjU3YkJCZUNtN0R2Q0hCRzRt?=
 =?utf-8?B?bHRwMUk0b0kzNy9tbk5HbGFIVWpCRERGWjlUNGd3L0xlblhSOGRKdWFjV0tJ?=
 =?utf-8?B?RkFRdTZ0QVh0aVROd0lkbjIwUzkybGYzS2hXUm9jVkFnUHh0YWJrcHFmSkhh?=
 =?utf-8?B?TzVvdzA5MTY5Mmtub3djRTRuV1VvVEZlS1FlZE1jUEFoMWRSYmtpYnhwMm9H?=
 =?utf-8?B?VzJZaS8wdy9ETUlkWVFwR09uaUErMHZTS2VjbEZJdnJDRzdkdmlnZ2ZUR2hM?=
 =?utf-8?B?QW4xVlRCTG5oMUM3eWJCQUsvdk1EVk1GWUsrMFYwV1NsWVp1bmdyTEd6TmVS?=
 =?utf-8?B?N29PMDluNnlYMDl0SEVIZ0tjWFlNOUZRMjc2ZHB0cmdhTjV5MDJrcThGOWs4?=
 =?utf-8?B?cTZuT0FMYllRT29KQm1leTYyNitDZm1YQ2NzL1ZVY2xyNXdBZXlNbi8rMndN?=
 =?utf-8?Q?Nr9Lmk05f5YnSwmHA7a92LQ=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 00f4f8e2-f486-43a6-dff8-08da00dbd451
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 08:15:38.7569
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Z+DrAxw0Uc9PAorn3NoeTViKiAi0ih2N+fCql5qnkI4cYfxdp2ASWyfMio+cjiPUck0sEp4OOTFjnBWyGX9Meg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB6294

On 07.03.2022 21:53, Andrew Cooper wrote:
> --- a/xen/arch/x86/machine_kexec.c
> +++ b/xen/arch/x86/machine_kexec.c
> @@ -156,6 +156,16 @@ void machine_kexec(struct kexec_image *image)
>       */
>      local_irq_disable();
>  
> +    /* Reset CPUID masking and faulting to the host's default. */
> +    ctxt_switch_levelling(NULL);
> +
> +    /* Disable CET. */
> +    if ( read_cr4() & X86_CR4_CET )
> +    {
> +        wrmsrl(MSR_S_CET, 0);
> +        write_cr4(read_cr4() & ~X86_CR4_CET);
> +    }
> +
>      /* Now regular interrupts are disabled, we need to reduce the impact
>       * of interrupts not disabled by 'cli'.
>       *

Besides introducing somewhat of a disconnect between the comment in
context here and the earlier local_irq_disable(), is it really
necessary to do both actions with IRQs off?

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 08:23:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 08:23:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286598.486170 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRV7t-0001JY-3w; Tue, 08 Mar 2022 08:23:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286598.486170; Tue, 08 Mar 2022 08:23:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRV7t-0001JR-19; Tue, 08 Mar 2022 08:23:25 +0000
Received: by outflank-mailman (input) for mailman id 286598;
 Tue, 08 Mar 2022 08:23:23 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=JMfM=TT=amazon.de=prvs=0590b4220=doebel@srs-se1.protection.inumbo.net>)
 id 1nRV7q-0001JL-Uz
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 08:23:23 +0000
Received: from smtp-fw-80006.amazon.com (smtp-fw-80006.amazon.com
 [99.78.197.217]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 026b8193-9eb9-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 09:23:20 +0100 (CET)
Received: from pdx4-co-svc-p1-lb2-vlan3.amazon.com (HELO
 email-inbound-relay-iad-1a-b27d4a00.us-east-1.amazon.com) ([10.25.36.214])
 by smtp-border-fw-80006.pdx80.corp.amazon.com with ESMTP;
 08 Mar 2022 08:23:02 +0000
Received: from EX13D03EUC002.ant.amazon.com
 (iad12-ws-svc-p26-lb9-vlan3.iad.amazon.com [10.40.163.38])
 by email-inbound-relay-iad-1a-b27d4a00.us-east-1.amazon.com (Postfix) with
 ESMTPS id 751788175F; Tue,  8 Mar 2022 08:22:59 +0000 (UTC)
Received: from [192.168.29.124] (10.43.164.135) by
 EX13D03EUC002.ant.amazon.com (10.43.164.60) with Microsoft SMTP Server (TLS)
 id 15.0.1497.28; Tue, 8 Mar 2022 08:22:58 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 026b8193-9eb9-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646727801; x=1678263801;
  h=message-id:date:mime-version:to:cc:references:from:
   in-reply-to:content-transfer-encoding:subject;
  bh=VXhup/Ur94jPGiSw8W5fS2DtLWn5X7Fx2+CaWLbs/Uw=;
  b=UopnQW2G1ZJ1TJLvz3CUZNL0FcT3Kbih69U/hxc/YJoBnvHXK0aoDHpt
   7xTs4lu9SZATj1rQGFgyA0nyjmL+RuJJmQnkJkcO5l1mL/7cbpiU5+OVc
   I1EsSV9aUsg0LRKkFb6T2FURCbJyx+ABQ9V1x0VeIePmtMnPegsRfKgub
   E=;
X-IronPort-AV: E=Sophos;i="5.90,163,1643673600"; 
   d="scan'208";a="68886882"
Subject: Re: [PATCH v2 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
Message-ID: <d8fb0a0c-d723-65b9-e309-aa880780fc01@amazon.de>
Date: Tue, 8 Mar 2022 09:22:57 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, Roger
 Pau Monne <roger.pau@citrix.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>, Ross Lagerwall
	<ross.lagerwall@citrix.com>, <xen-devel@lists.xenproject.org>
References: <15b092bb3af6e32f72ee8fca45317687d23b8be4.1646687495.git.doebel@amazon.de>
 <862e888468a1d9923a6e6bef4061ac0caeb9274d.1646687495.git.doebel@amazon.de>
 <ce1ced4e-b9f7-fadc-9f18-b66445c02cdf@suse.com>
From: "Doebel, Bjoern" <doebel@amazon.de>
In-Reply-To: <ce1ced4e-b9f7-fadc-9f18-b66445c02cdf@suse.com>
X-Originating-IP: [10.43.164.135]
X-ClientProxiedBy: EX13D05EUC001.ant.amazon.com (10.43.164.118) To
 EX13D03EUC002.ant.amazon.com (10.43.164.60)
Precedence: Bulk
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: base64
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From xen-devel-bounces@lists.xenproject.org Tue Mar 08 08:25:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 08:25:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286606.486182 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRV9Y-0001zD-KN; Tue, 08 Mar 2022 08:25:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286606.486182; Tue, 08 Mar 2022 08:25:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRV9Y-0001z6-Fv; Tue, 08 Mar 2022 08:25:08 +0000
Received: by outflank-mailman (input) for mailman id 286606;
 Tue, 08 Mar 2022 08:25:06 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRV9W-0001yt-Q5
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 08:25:06 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 41f2caba-9eb9-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 09:25:05 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2109.outbound.protection.outlook.com [104.47.17.109]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-35-UsWH0zvXOoSZN1eM8hLrVg-1; Tue, 08 Mar 2022 09:25:04 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM7PR04MB7126.eurprd04.prod.outlook.com (2603:10a6:20b:117::11)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Tue, 8 Mar
 2022 08:25:02 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 08:25:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 41f2caba-9eb9-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646727905;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=vpwuUxvuVryOj+z07IltX4NawtC1HTPFBO6aoxcYoW8=;
	b=WutBGY+mA57f8TavYnUq7JvhnG2NuWytv9niNClYngfV671wV/3LnVzAM/QkhAOl2dbhJo
	mqqHBakYK5/KP434vEgpW/0QBRXNReIHSPtpQ6tFBoq5wL1YjSmr8iwbsdJgkGxzzkJ93c
	5osx49R5pkBkG4TLIjadUkjGkFMjiX4=
X-MC-Unique: UsWH0zvXOoSZN1eM8hLrVg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=k9Pn4D7zB0mkBTah0+rbZMQ8IGL7Yxizp4WxOh5YMQs/L2igdToRISICWoHRDhNOqCUvfYO3rOzV2NfImC607F8UetNH+iB+T0aTTPzJXnmo4Fk0OJNIC5Dl09L00JI8agibwG0BxZZgmnawt2QNSUNL4+Afj8kDqM5Vsm7NobfT729RGmcjbpp7kJ7Bx9AmmW0qFC1JGAPW5MzpS3fg8Rn2jILNQAWS1t6yOc9jPxmzb4FoRcI/l3VhMlvFtLYRMowDJmYG3+upo9Z2iDCn+giBVQSVOr86G+upuowRGOh5VbtJLzDCBuo0wDYj5ZUQWE3wC4g8lKX7nAMMyFAc8Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=vpwuUxvuVryOj+z07IltX4NawtC1HTPFBO6aoxcYoW8=;
 b=Ww//WJccPBInk0CDVXwuDS6BxX9lDJDcmRYSLlPlLhi+vH3BLhPr3K22Cm8v3vzpIPG/WMYytCz70z9qYYC51vB39kvVV/rqcAPVUa5Ft3P6lm3dNCiQiTNpStX7z3MTwagLo5/+JCryegDjlCOO2ER83EryTGrJQMk/cIgUuJAff62cFO4lEayMwv6cviid6u6smdohd0M0aHUk6fXYb51uEUHVAdG4lOIYKtaTJvF3P92XpBR/yDiOGOxSy951ARhN4Sj+YzBVGEt02ed3JtzE+sVgpCNZ2nutf6w0bBI7nqf0TZjmd8udh3nfTFzc7vpliiB20AQXQdUBkmmYnQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <c5244b6a-4d55-e80d-e5f3-cc8da3484e2f@suse.com>
Date: Tue, 8 Mar 2022 09:25:00 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH] x86/kexec: Use noreturn attributes, and drop unreachable
 code
Content-Language: en-US
To: Andrew Cooper <andrew.cooper3@citrix.com>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Wei Liu <wl@xen.org>, Xen-devel <xen-devel@lists.xenproject.org>
References: <20220307210210.4261-1-andrew.cooper3@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220307210210.4261-1-andrew.cooper3@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR06CA0314.eurprd06.prod.outlook.com
 (2603:10a6:20b:45b::16) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c77253aa-69c7-4057-723b-08da00dd2448
X-MS-TrafficTypeDiagnostic: AM7PR04MB7126:EE_
X-Microsoft-Antispam-PRVS:
	<AM7PR04MB71265AD2A9179A03740CF882B3099@AM7PR04MB7126.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6506007)(53546011)(2616005)(4326008)(38100700002)(86362001)(31686004)(83380400001)(6486002)(36756003)(31696002)(6916009)(54906003)(2906002)(4744005)(66476007)(66556008)(8936002)(66946007)(8676002)(6512007)(316002)(5660300002)(26005)(508600001)(186003)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?SjFwYTErTmJzbUhldEtoZk1RVEU2NHBYajVNcWltQXpLS3F0ZzlNTFlvZ21P?=
 =?utf-8?B?OFRGUnpGbG92dXZuQjRJQ0lFSXEvZmhLM2FxcWpTQlJRRGZwdmhpdDlOSDVs?=
 =?utf-8?B?Q2IwTWxaNTcvZXk1bVJkajZ1TDdaRE5qc1Q5anNYT2QwazVRRzlaamlZNEZV?=
 =?utf-8?B?S3FBblpEODM2THhpd3UyNnZBbCt3enptbkdIeEtLUWZzRitqT0JFR1RhS242?=
 =?utf-8?B?NWMwWWV4VkY0MkhqNzVGTWhSTi95dGFUVjZiL2tkbkR4blNqWWRUNWFpbHBo?=
 =?utf-8?B?QXZ3bzU3aG5reUpkWFlOamwxR20vY3RVek5LdUE0WHRWQ3Z0UTg2NjBmckpK?=
 =?utf-8?B?cTRHN2RvOHVlWUlsOGErTFIxc05FRUdjeU5LTFlIRXdTcEcwN2VMUlFaSGdL?=
 =?utf-8?B?VHNlcm9tMTBZSGxEaW9VdkVqWW9xcmEzQ2tHVjhrYXJ0UjN6Q3F6NlEyTURK?=
 =?utf-8?B?YXdiVWtQeXl2N3BFV3BuS280VTk5YU9kSVhqaUpsQlVST3dKMzJRZkVnN3Iz?=
 =?utf-8?B?Y2ordVhCeElUcVZGRkFyVFg3YzN2MEpjUFp5RXU4cVdwaE1IRGJ0UDRsaGtK?=
 =?utf-8?B?SitTS1J5ZHZUUSs3Rnd0UHAzRWd0LzZNNEdaQXVqZlNJUmVZbG1zUkUvV1dr?=
 =?utf-8?B?bVRPRU1NZk9PaThqQ0dYRlJ0SEd0L3R1a0xQVGVRK0RYRlZoNFFWcWtxQUp5?=
 =?utf-8?B?L1ZTeXkwb3FvbVAydVo4YTdQSjRsQ2dmakZYM0p4eHRGUS9ZZEZOL2dFZUxJ?=
 =?utf-8?B?ZkliU24wL1lEUHhwMW9xL2NlTFphMkQvUUlrM05pRDE4ZXdJLzQ3em1pUzR2?=
 =?utf-8?B?UUx4TmhTdWx5dmpRbDlmeTVtUVZ4VmN6VmxrNDQ5QjNhcWVIYnlOYlZ3a3Ey?=
 =?utf-8?B?N1lYUTQ5cldiWXpBMUdrRU1rWkxxRDcxTktmNlU0MXdJR2tMdU9QTTJNOUxr?=
 =?utf-8?B?UmtMY2FWSXZRZW9IK0Y3VVBlVEQ3Nk5YS21ERFdIdHN5aUpBMGRuSS9VNVNi?=
 =?utf-8?B?TGJ1RTBRNUh0ZnZXMjFURXk2ZVJKYkIveDlvSk9pbmZ0TUcxU1E0NExERVV4?=
 =?utf-8?B?a0dKa0RveFZNeXYwVkFtN0FsV3JKQkpYbmNxMU1UcTVqL0dFbm4rNG85aWdM?=
 =?utf-8?B?U3owc2NMQSswSEROUWNtclkybUVPNEsxM0lweWg2bHpIa0hudFBESUhsU1Bv?=
 =?utf-8?B?SktmTmdnUWM2SlByTTQwNTk0VWVpRlE0OUs5b2ZGbjNxamRZeHJISDNUcFEz?=
 =?utf-8?B?WjZCY2k2VlY4ZDZ3VHhHQ2xDYWtVY01pbkFtRkFubTBtRjBNMjgvRlVma3Vk?=
 =?utf-8?B?a3QxVXlFSFAxa2pXeTV0MXNJRHFmUGxjY3lORFUxdHBNaER5dzNEWXhCQTJu?=
 =?utf-8?B?VTZkajlkbmhxQ2FhZmlLSzZQU3FPLzdBTGxKdGRNUzJVT05qUHg4V1VmdGIy?=
 =?utf-8?B?RWtNMy82OHZaRWkxb242RThuN1poQklnanpuUnQ3N3NyYmZ1TlhwbmRJcHhL?=
 =?utf-8?B?UisrNTN1cFJ1ejBiZm8yaVJMZXpCcVFFSlZJRHNIRFQ5Lzg2ME5MOHN0eklV?=
 =?utf-8?B?V0s3bXNwMWR0YU9xUnpueUpQdFp4ZFpzckl2M1MxWXFBaXpXWmRqYWRzNkwr?=
 =?utf-8?B?TklHNWR1Y1Q3RWtKcC9wa0pPMVdnMytnQ3ZFMWVlakVuL1dIbEdyNnZnckdH?=
 =?utf-8?B?VERmMzRzU2xQb1ZXeCtvbkpCT1RHY0pWUER4d1Nlb085QlF2b05OMVhmWXcy?=
 =?utf-8?B?NCtYdG1DaCs1VXhEVlBweEVGV2t1Vmt0UHdNVXhtSzdjcS94a1Y0akM0VHNy?=
 =?utf-8?B?UUIvczJKZVFjNS8vTDROL1l6VFFqeFlLOGNocTlkWUxLSEpjTmdoZ1ZxU0pZ?=
 =?utf-8?B?a0NUZlVFekdCbWx5eXl5aDRHQWpvcnNYZXQ5aW5mRjI0UG0yRTVxTVZIalo5?=
 =?utf-8?B?bjhINlcvcEtrcnFtMFVqVGFmeGZrVFM4Vmw2R2Nkc0J1blBVUG90bjMxYUg3?=
 =?utf-8?B?Y1ZaZm9kS0N1MW96RHVNUGJKNEhONDJmTGlzdHlvbytmS1BjQkhtMjhzN3gz?=
 =?utf-8?B?OHJZaFB6bEY4U29iY25WVWk2YkhCb0czTFpNZzAwcWRZNGEwMlJScU9vSXND?=
 =?utf-8?B?V3Avb1ErS25ObmtXd2lKMkgwOHVKc0RZc2dsK09wUXdmS2k4WVlaYmg4dmVu?=
 =?utf-8?Q?RbiJ95/Hy5rYVwr58uTCRFM=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c77253aa-69c7-4057-723b-08da00dd2448
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 08:25:02.4252
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 6kttSbE9FUxQBb9gdcd1UkWS+Qynlcwo0KJtU/1RFDDO9R1r01bgY9WFuUTzOXt/k83rOSLhCdY+tclM94zWng==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM7PR04MB7126

On 07.03.2022 22:02, Andrew Cooper wrote:
> kexec_reloc() does not return.  Plumbing this property upwards lets us mark
> machine_kexec() and machine_reboot_kexec() noreturn too.  This in turn lets us
> drop some unreachable BUG()/return statements.

I'm certainly fine with the added attributes. I'm less convinced of the
removal of BUG() - I'd prefer to leave to the compiler elimination of
these when found to be dead, just to be on the safe side. And I'm pretty
uncertain about the removal of "return", when it comes to old enough
compilers.

> @@ -403,9 +401,6 @@ static long cf_check kexec_reboot(void *_image)
>  
>      kexec_common_shutdown();
>      machine_reboot_kexec(image);
> -
> -    BUG();
> -    return 0;
>  }

In principle this function now is also "noreturn", but I think I
vaguely recall some compilers warning about "noreturn" when a function
returns other than void.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 08:31:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 08:31:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286614.486193 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRVFt-0003Xc-8s; Tue, 08 Mar 2022 08:31:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286614.486193; Tue, 08 Mar 2022 08:31:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRVFt-0003XV-5U; Tue, 08 Mar 2022 08:31:41 +0000
Received: by outflank-mailman (input) for mailman id 286614;
 Tue, 08 Mar 2022 08:31:40 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRVFs-0003XP-L1
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 08:31:40 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2c712c63-9eba-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 09:31:39 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2107.outbound.protection.outlook.com [104.47.18.107]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-10-gshySC04OSSdj0sPomeLJw-1; Tue, 08 Mar 2022 09:31:37 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB7PR04MB4651.eurprd04.prod.outlook.com (2603:10a6:5:36::33) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Tue, 8 Mar
 2022 08:31:36 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 08:31:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2c712c63-9eba-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646728298;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=18Z3EfosTrvapQcWeNFkivfBE7wHn5/v6o88RnPMkuk=;
	b=N18tfN5aybgCXc4VQKGa7NVYSKZ5SV3KatumQXEkDeG1SbwlkUkSlZiLgaEEU9CFuescwE
	CQ1g9Ol41d4kgCzaXnxqmsr04XdAHylMUXJTJddhP8vsZTbvlhD7bafVNmoE2+rnWpjpHH
	qHXPfsGrC9XMcLsUjuaKxtY/Gxi7TpE=
X-MC-Unique: gshySC04OSSdj0sPomeLJw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=gSK9nD6jqL95zM7KS5UmqlZiUMlGnhNe84roSTA5Q0/F7Kw5fbwzPwEPNZ7/QubAEvk61U8FIzlHBdG1JlzpHWlOPUlsHRo/8n1rwo1qlGV4nd/0D4KtGfQXjb5xpbqClml/DD2wedPLBjd58yRJq0oHPvWuyUjAdg36yCp+J6efB3suDpPt+FPoIYwuxpVb6/EgjKoVCLsmqJJ0+J0uGIvH/Q3qm817EIIUFakkV/IBjnYjYZQsu5jW5diIeNyh2RX+Vqezt4/My8ZhsODyqgDh9eSkgeLLPj9yen0Vbav+d7iCnWnzaWtnTf6z2dPQnL5l9NiXKS/0GtzjAemfBQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=WO6qL/gJgZYfOTZOELUFOkFkuLMC5VouXnJW0Cjp0To=;
 b=c+sVn34hNbHiqcVQSQxjIFjG1QIkgAJYgzTZf6A+1uBRlvkCmbOsVqL0fK6votlX7H8K//GLrd6qeb7+WsqihWjusgqEb6KxKrJPCPGISt69xR1wLKa4f+4gyXQZW08wEKJ/z9hugmwq5MF09nqIugyBl46JWc41gukPQ99mRUwIslz9wWtKb29jQLdEytZRA7CT0ZlDV31uTyjhcUpIz624Alikn7CSl2q2/eh7Fj6CCKGFc3odI/ctUDpn2Hzn6hvWZRkbLc2KJwF2eC+ATF1drt3zS+1QRRGsogXe3mgcO9byE9fUSbUfjyAAG4C9MGnzAqrRC5GswOyL4LnG3A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <fbc1388e-8211-f498-b134-4df5b1ccd003@suse.com>
Date: Tue, 8 Mar 2022 09:31:34 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v4] vpci/msix: fix PBA accesses
Content-Language: en-US
To: Roger Pau Monne <roger.pau@citrix.com>
CC: Alex Olson <this.is.a0lson@gmail.com>, xen-devel@lists.xenproject.org
References: <20220307163744.74030-1-roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220307163744.74030-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6P191CA0026.EURP191.PROD.OUTLOOK.COM
 (2603:10a6:209:8b::39) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2884ad5a-ba8a-438c-a4f7-08da00de0f49
X-MS-TrafficTypeDiagnostic: DB7PR04MB4651:EE_
X-Microsoft-Antispam-PRVS:
	<DB7PR04MB465128CC639E9E3798058441B3099@DB7PR04MB4651.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	Sic5XUJRBX52DVdtXr/qdPdbdpzjzFiiLUDfyssYuajIG1mbRZ5wmJjEo42C9euryl4FWDlXXe7oXRDUwfp1EQlh1xrsnrzYSQRN3tJMI7uWeiZevDlzzwd+Dj5ORbY4capyYdIeOYpaMBTWf2ss7QJHgjzkvwFTTwZ6If7uRXBeCyYV4Mz/T0q3j3B9S/WPcNgv9A96vM/II6SINsTJqV3Z34/v3WqNXR2gSbYRRK/VNyquKiOgEasb/ElnIR+7Xx82TvbTjP6j6qaW3okYIC8LWcqsht3nWZkBmHYu/3sWTJzG8Np1ztHo87NIW1D8T3x+AWpnnWhv8r4Dl/Cc+HXfQ2iqzhyJRG4vHiEBo6LJi95cVFOdemNo4LYi7PMi4VVJBqivgV0mFg1gqBPFmSJx/nk7QEH58FN7ksZh7jivM0hT45kgjwRzKYK0oNFm0pn+ULO4AoZ4YyEZAcbyyJIXJzm3qrKaZUsF57UlrhaW9HWXJl7wZK8TEumTklRd8gi8rXeHfQaiQC7qihrlX8hjuv+r4AdIpwd6TgPMTAI4tJvSwkOPIvexUs2pXKL8dR1rBa5lj/l5aGM56zpLAIuIWB8kG8tzfW4N5IPjMX9gKKfcstfF5Ifluil+PETPPTOW6eBVGI0FSXl7xB1K75coBXTb/tXzIW8KmcgkaXyY5KkLZe3B2MymwaGa0o/PDZUsAprPr5zB7lBC4ACXCO5lw/0tkWzM3BRkmTqve3agKAqa/OvG5+drcVCQIFS1
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(86362001)(316002)(6916009)(36756003)(66946007)(66556008)(31696002)(66476007)(83380400001)(6512007)(31686004)(2906002)(4326008)(5660300002)(8676002)(508600001)(38100700002)(53546011)(6486002)(8936002)(2616005)(6506007)(186003)(26005)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?vRMpPQ484J2ATrOAaJL3vTwtCuYIfeT17Llq5qJFllUnrHEATJnbCXZJckcs?=
 =?us-ascii?Q?E6xHJ00sGMxy14/qPbdqdVkkc0qpOUhr18E28YHyE2sbltTvEPJZcs64waxV?=
 =?us-ascii?Q?NbByd9FTb/uAhfDEaQQCIa8gNHb1+90zU1KA19jVApczne/2UIYobZviqjx3?=
 =?us-ascii?Q?ggiSlrHV4uny+Fv5LYt4Q9mZ1wG25hrXNMau97kieYFJ/QkodmiHzCaGy02l?=
 =?us-ascii?Q?N7ptcN8slkMltbQEe4Pp8TPgeuJlLOhu3Qa6ChJ6IAiJ8OOJFULlk0/PAntv?=
 =?us-ascii?Q?7lPCHg5r1kguboDGVfA5u/TGrQvIlLrk5PvcAsQPXTbveJvHjLZCGjG16csW?=
 =?us-ascii?Q?WxxIOQBfc/uCAR5vu2SI3iDXUe7D5EE89Ba4KPFRFK5yJ8wVYKoFglFUAc9N?=
 =?us-ascii?Q?sz/N2zwzQKFkH1iSoBHR44Cq3Kyyf7Xb9EcEf7dKEtHo4QA5kSX0n3RnKcPU?=
 =?us-ascii?Q?ULA3LNbJWSjcN4+TQG/hxDTzj24MmBXZrd5gFPKD5W86ddsJFaMGk1FUlKVs?=
 =?us-ascii?Q?HFGKxHmIn26MG5GU4J3KlhVxdnE/wSNWgzTw7l4fNWBt+Zuw/tzgOYAySmKz?=
 =?us-ascii?Q?PrXXxb1fcIumaTpfgPRYlx5drus27K3smQCpZerRsc8GYsVMfBJ+i/2y6x/L?=
 =?us-ascii?Q?2b25pvIwJv9dDryosAUtLPVJBmpBMV1PfsWLo2x09MUcHVau3cwcegHOvusB?=
 =?us-ascii?Q?m3CTtqqo3XEq0xJDJan1uC5oph/m9zqi9IJn3dk5eDpJHsaJTmvpLqp8z+T4?=
 =?us-ascii?Q?hvefGvVj3eZ+XdUz/y7soqoGIv9xhTNicJSlR2EmmDVp8AC3eN935LGVC4Df?=
 =?us-ascii?Q?hl+9ZdKEIN95sccC49SBrx/g0B8JVsNZXIXHJE4VR8sBeBP1wmA8ijFgWd2p?=
 =?us-ascii?Q?UV4JvmBcjRyVCnYctsvtkoSTlubDvGbtbTpY2lPOvMieuN8LPfiQhdzSjcbU?=
 =?us-ascii?Q?XjNvmw1VlfRTXk4J0DQuIs7zTnXdgUtLbg7/e673w00OfxpFumIzwOmaEDPi?=
 =?us-ascii?Q?3cdfCDKPVRZdepp28kqhf0q5OwD2yuvQ+LBFJu30xa2ORTHdkjYXd8ZlzE/x?=
 =?us-ascii?Q?fR148y/19ZFYHDIBALReB574XSVDIWxuFeDo0yGxYIpNSE46giDr8/NwFLTJ?=
 =?us-ascii?Q?fYyV148pysJxZyOGJuxoP1Sm1tZgmDe4/NWmKR5w87qpPU15G88yXhexwZyD?=
 =?us-ascii?Q?9B4Fwy53tDTqRcds3P7n3R8aW0/wUzboF5YOaRdtEN6xRBH+zEC+HeT/oQvI?=
 =?us-ascii?Q?r66CfPlPkXZYnmLxFDBey1cJjyRNK8CN6WWkKZTPYPonrDxr2AhHf3A4E3w7?=
 =?us-ascii?Q?IkVQu4/t5n2qsps0jpTlILx0/SllZRF1VgCRQQCso7SVjesWKb2oKBbV/Fb7?=
 =?us-ascii?Q?Fa/z+vZvDIzlCbqAu/98Fr86pmN2aCKrPOqrn+r//JuiZkJUigo3y0fVjS2W?=
 =?us-ascii?Q?dUrfZYH5Crl7i6/JIAv92oSQddApUDofWFeyfOnM64rgA8FexRxX56r8dka6?=
 =?us-ascii?Q?NOUooSw1N1ZkcDmZPyvHG8YH6CkalAQESR6tpigPjqhbMyl2D+yHsb6at99A?=
 =?us-ascii?Q?1Ek+lE8xezb8pmupdvuxrDd0mu/bypMb0DPIF83XPGPyhpXGgKjbzc/u1hMp?=
 =?us-ascii?Q?jT7/67bJ2gqt2DCTqazfE3g=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 2884ad5a-ba8a-438c-a4f7-08da00de0f49
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 08:31:36.7289
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: PzhR/MlqRpGoQw3ny0WOTCiHDW7+RtDdyEcqSZPBrCSfnPI5AcrKgZ9tJh5wTSP41K6n82dHnArtfE7lPEb3vw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR04MB4651

On 07.03.2022 17:37, Roger Pau Monne wrote:
> Map the PBA in order to access it from the MSI-X read and write
> handlers. Note that previously the handlers would pass the physical
> host address into the {read,write}{l,q} handlers, which is wrong as
> those expect a linear address.
>=20
> Map the PBA using ioremap when the first access is performed. Note
> that 32bit arches might want to abstract the call to ioremap into a
> vPCI arch handler, so they can use a fixmap range to map the PBA.
>=20
> Reported-by: Jan Beulich <jbeulich@suse.com>
> Signed-off-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>

Reviewed-by: Jan Beulich <jbeulich@suse.com>

> Cc: Alex Olson <this.is.a0lson@gmail.com>

I'll wait a little with committing, in the hope for Alex to re-provide
a Tested-by.

> --- a/xen/drivers/vpci/msix.c
> +++ b/xen/drivers/vpci/msix.c
> @@ -182,6 +182,38 @@ static struct vpci_msix_entry *get_entry(struct vpci=
_msix *msix,
>      return &msix->entries[(addr - start) / PCI_MSIX_ENTRY_SIZE];
>  }
> =20
> +static void __iomem *get_pba(struct vpci *vpci)
> +{
> +    struct vpci_msix *msix =3D vpci->msix;
> +    /*
> +     * PBA will only be unmapped when the device is deassigned, so acces=
s it
> +     * without holding the vpci lock.
> +     */
> +    void __iomem *pba =3D read_atomic(&msix->pba);
> +
> +    if ( likely(pba) )
> +        return pba;
> +
> +    pba =3D ioremap(vmsix_table_addr(vpci, VPCI_MSIX_PBA),
> +                  vmsix_table_size(vpci, VPCI_MSIX_PBA));
> +    if ( !pba )
> +        return read_atomic(&msix->pba);
> +
> +    spin_lock(&vpci->lock);
> +    if ( !msix->pba )
> +    {
> +        write_atomic(&msix->pba, pba);
> +        spin_unlock(&vpci->lock);
> +    }
> +    else
> +    {
> +        spin_unlock(&vpci->lock);
> +        iounmap(pba);
> +    }

TBH I had been hoping for just a single spin_unlock(), but you're
the maintainer of this code ...

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 08:34:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 08:34:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286620.486204 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRVIN-00048e-MZ; Tue, 08 Mar 2022 08:34:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286620.486204; Tue, 08 Mar 2022 08:34:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRVIN-00048X-JP; Tue, 08 Mar 2022 08:34:15 +0000
Received: by outflank-mailman (input) for mailman id 286620;
 Tue, 08 Mar 2022 08:34:14 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRVIM-00048P-Lc
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 08:34:14 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 87812786-9eba-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 09:34:11 +0100 (CET)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04lp2050.outbound.protection.outlook.com [104.47.13.50]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-16-1zanYYQrPsWsmPF9LybEwQ-1; Tue, 08 Mar 2022 09:34:11 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM6PR04MB4295.eurprd04.prod.outlook.com (2603:10a6:209:4f::33)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Tue, 8 Mar
 2022 08:34:09 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 08:34:09 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 87812786-9eba-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646728452;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=UFQud19bU5SI+K0oYr86ExH4b1i7NXdnwoCxsRWm00w=;
	b=AokvIVn5vA2u1X3jRAKF50GO4vntZbVYGib44CEajM6We/ssQLbogneCf+j8IAtt0EWBtE
	s60KArxHHTRcekh4cYrqZcdd2pQRiAHrCGXHZ9PkwM9/+9MJyQ/GQpOd506otSyb+ZLw/P
	YEDDC6vCbrqM3Pb8aXIswr5R7xkAnpo=
X-MC-Unique: 1zanYYQrPsWsmPF9LybEwQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=nax93LHza/Ni4W+PR5+uFsaVQ7BDiECIq5tZ9313hhY41uqf7L1DT54vhACx0wFzCnUnPRJEWDSuu2UfLBixHEwVOFXdoUL/QQjXh+wQwO2SeCsq9c5j+2Mwd7Md0XuYRJ6KXDH1dusP4z0okXYeIxo2DvQihV/gxhpr+Eakk7VTyTU8o9APtmyOsRQQZ6YAjU+9Y17BJqHjRM+wgKOp+WHtnH2Y0F7aLbHQgslTLXxFgcHZeepF9n1qtoUkUqoRLDegKTubt0sAq0eRuHL4v+xvpkigB7a52Cla83OiqLuYHkvMGUiI9l0dMISHubmqJ1ajpXjcZXx567FqwIMpUA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=UFQud19bU5SI+K0oYr86ExH4b1i7NXdnwoCxsRWm00w=;
 b=lS1Hz6qigDr9VU6IxVHurVNEL3Nfz2y6FoHwfvDiXEztjk82Nk5+MeKg4Ej6RR0ntSa6ILXlqbtKePEDGU5MdImUtT+ASS5WRBUuH4s3jPz8oThXVMHgOR2lDzxE5oYFABk6SymVggWi+9JAMFeqOmLewshJnk5i/v7pqfw50XgDQGm9RHSrrlDQZxAAbn8hzVM1rDyVUufibr+ySriaFf/S9Ds+9/Nv8bkXNCRe4YBOWw/5JBgZoC6tEaSRLMzapdV+8dQEuTdal4TGGT9WgxmxrS/JovG1sYTIV25YyHthfQZFrRFp2Q5D4tJPJMSXXRNLS2dl9VN+l4C+32h7Pg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <0ec9f176-1108-e1ac-a250-5ab9d151f7a8@suse.com>
Date: Tue, 8 Mar 2022 09:34:07 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v3 00/13] xen: drop hypercall function tables
Content-Language: en-US
To: Juergen Gross <jgross@suse.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
 <julien@xen.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Christopher Clark <christopher.w.clark@gmail.com>,
 xen-devel@lists.xenproject.org
References: <20211208155606.20029-1-jgross@suse.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20211208155606.20029-1-jgross@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P194CA0068.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:209:84::45) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: d3849b59-45d1-41f2-73fe-08da00de6a88
X-MS-TrafficTypeDiagnostic: AM6PR04MB4295:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB4295D611D85BBD4D752F9621B3099@AM6PR04MB4295.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6512007)(5660300002)(31686004)(66476007)(6506007)(31696002)(6486002)(37006003)(54906003)(6636002)(53546011)(36756003)(86362001)(316002)(26005)(2906002)(186003)(66556008)(4326008)(508600001)(83380400001)(6862004)(8936002)(66946007)(2616005)(7416002)(38100700002)(8676002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?WkF1T05qZm1CdG1MNnZaKzV0cHBLRnBWUWVGd0lNN3NpS3RCZm5OV2VjRTZl?=
 =?utf-8?B?eWRNNEV6c1I5UWc2TE9PMFpBWlBMeHFzOVJJZ2NIaEZTdEdSb2E4a2NlMFdw?=
 =?utf-8?B?T05UdldBREthdkthRjQ1bnJVZXVNd3dLTG1FYVJjMFNOdUVTUFF2K0JxUnVa?=
 =?utf-8?B?dlZNUVdpMGxmOE40cTd0M0V0UFVKSHBoUFlGMjV2a05FZWFTTUNHMzRDdkxB?=
 =?utf-8?B?VmFBSEF2c0F0eStwUTczVVZycy91b3JuRkNkUVdFMTlMcU9Qc3BxYm8yTWY3?=
 =?utf-8?B?OUd4dituSjRvdFRtcEJvRWU3TEJwWk5NWmVYSjZrWVAzdDl1QlZ1R01idWVq?=
 =?utf-8?B?STFKdzJIdlVMZUhXV1BzRGVBUWVjMGxSS0pEeWhoTXhzNXJqRzd0V0g0ODdz?=
 =?utf-8?B?K1pvRG5iNDhHSDQ1RnVwMDQ4U0svcGh2Ri9ybHJDZy9IaUh0WStPQXJpUCt2?=
 =?utf-8?B?aXU1Witua1BPeThjUHVZTTRwQWU3UElobXBMY3NEYkdHMGFvNDVhNC9mSzZo?=
 =?utf-8?B?MC8rNUNBZ1Z5cWc1MmtUSFNwS3pQRzAwbjdoYmc5R0h2YzZwTTVRaW16Mktx?=
 =?utf-8?B?c0NGMVlnSDFKM0hvWVpIcUN3bnMwOWpNSElDNXdOSUR5Y1NXd3ZON1g2Qkxx?=
 =?utf-8?B?WGd6enRaZlpnMnkzL0M3SDlrWmpCS1BJQlUrY1pITXpSUklxYmZtNmxkdmdB?=
 =?utf-8?B?Y09NZ2ZnRlg2dG93M1ZoQ3EyamNUUEZ5MFJQdnVZT293YVhqQTJEU1RuSm5w?=
 =?utf-8?B?cStDSnpkbG1JMExVWW9QMmFlcUFKVHFYZkVEaFRIMWZqYldTWm5DNDBGc1Vr?=
 =?utf-8?B?WVNsNWxCUXVWdFVwa0hUT0tvR0ZSV1FPZHBhdlU2ODc2enRLMFVXellpOFZv?=
 =?utf-8?B?WVdrVnRvdTlQVHJORlRJakx5ZXovV2lYMW81YWxBWGVJUEprUnJLL2JhQ1Qy?=
 =?utf-8?B?OEgzRHg2ZTliQnRCMWtORWd5YlZEYVpBa2ZSblh1Z1EyeEkyZFVHVUZsbG9v?=
 =?utf-8?B?OGNwMXdPVk5VaGRUbjRrT21WR25XQUlnNzBOVDNQMnhKT0I3U0lsdWpyTkJZ?=
 =?utf-8?B?Lyt3RjE0SzlpOThJTkJ4U0FGVkxudU9WbkNreWZWN2l3OGhqQnozTHdQTFN5?=
 =?utf-8?B?b0VFN0RXVzRiaU4vQXVqUE9BS0ljVHBkaTNzeDBWVVV5RlN5UGFBUjQyakw2?=
 =?utf-8?B?Y3JrYWNHSnByckw2WjBpWkg4bnpXVi9TbWh0QVdTeW9zSGVsTm5wcElDR1VV?=
 =?utf-8?B?UXgzbmlUS1NXRUpIT21XYkdnSlNadzNXUUFMSkx5Zk1QSHNXQnpIV09SY2da?=
 =?utf-8?B?WDQ4REF4eE5wSUttdW5rSzY3TmFYSFlST0FLeTQ2cndVamV0UnBFd3NuRUlY?=
 =?utf-8?B?ZXU1c3QwL2E0RllYMUUyVHIvSnJjLzh4bzNnSG1XT0Z0Z0tuQ2JTTDRRMGVp?=
 =?utf-8?B?ZUVNNERSMTlOS2dLN3Rzd1pnVmh2enJqb0pYdDd2N0JWS1l3bzhiL21LaWVz?=
 =?utf-8?B?UDhNU2VxdHhQMlNQM25pVFg3Z0JpZVVhdjhnV2ZtZ3NCM2dWY09JR3FnNm4w?=
 =?utf-8?B?aGMwQmtYcHZBNzlvTkdtWnBNYThBdk83TkNFRVdGaE5EcTRFMnFqM0dEbmd1?=
 =?utf-8?B?akh6cU5QRWQ4cXN2Q3hvVTByeStjcnkvZGsya21zYmp6dHo4L1U0OVRTS1Jw?=
 =?utf-8?B?eXJZdDA5MkxjQnR5L3c0T1ZWeitlV2Rpc2Z2dWFoRlR6TUp4OHRDVWRlK0xW?=
 =?utf-8?B?d29vbWF4OFlzNlRQMGExUE51M2hhUGlqai9QeWNMTnMzVXJGMHZYVnZlRmZa?=
 =?utf-8?B?VTNiejNxc2FLNG9wVGFIREFveHpveFhOMjBsZklhL3VnZ0thR1NzL2FmZHZp?=
 =?utf-8?B?dXhwcjRmazFET0hmVHUyb1BNL3Q2Rkx4TTVBS2l2TnhyTmltMDdLNjdsTlJD?=
 =?utf-8?B?M09QOTgrOHVzaVI4NTYyN0xZNml0bWdnTnQrNy9yL1V6RGtFbUxvV0FZOXVh?=
 =?utf-8?B?MlZpdmM5KzZib0xzemwzOG1UbGx0ZDV1MVF3N1A0bXVJZ3haUkxLRjc5blp3?=
 =?utf-8?B?WVkxeHJQRXNZaTNXazZDaVdNTnRGK3NLV1huclc5N2xVb2xEb3p6RHBJUi9E?=
 =?utf-8?B?MFprTHpJSFo1ZGIvci9GRlEyTGtkZ3FiVmxiTWtpYzAxTzlqQm02Q1JuZlpR?=
 =?utf-8?Q?uQWnzuSDozq/nsrZYc12/eQ=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d3849b59-45d1-41f2-73fe-08da00de6a88
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 08:34:09.8757
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: BQFPFDB4KpM5fau/0mlyk3fIa4grMTXyzfkhOMdRcy2+N5rkbnSVuhYM4461fw5JMsLG7C0SqtZxFt+t/J/l/w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB4295

On 08.12.2021 16:55, Juergen Gross wrote:
> In order to avoid indirect function calls on the hypercall path as
> much as possible this series is removing the hypercall function tables
> and is replacing the hypercall handler calls via the function array
> by automatically generated call macros.
> 
> Another by-product of generating the call macros is the automatic
> generating of the hypercall handler prototypes from the same data base
> which is used to generate the macros.
> 
> This has the additional advantage of using type safe calls of the
> handlers and to ensure related handler (e.g. PV and HVM ones) share
> the same prototypes.
> 
> A very brief performance test (parallel build of the Xen hypervisor
> in a 6 vcpu guest) showed a very slim improvement (less than 1%) of
> the performance with the patches applied. The test was performed using
> a PV and a PVH guest.
> 
> Changes in V2:
> - new patches 6, 14, 15
> - patch 7: support hypercall priorities for faster code
> - comments addressed
> 
> Changes in V3:
> - patches 1 and 4 removed as already applied
> - comments addressed
> 
> Juergen Gross (13):
>   xen: move do_vcpu_op() to arch specific code
>   xen: harmonize return types of hypercall handlers
>   xen: don't include asm/hypercall.h from C sources
>   xen: include compat/platform.h from hypercall.h
>   xen: generate hypercall interface related code
>   xen: use generated prototypes for hypercall handlers
>   x86/pv-shim: don't modify hypercall table
>   xen/x86: don't use hypercall table for calling compat hypercalls
>   xen/x86: call hypercall handlers via generated macro
>   xen/arm: call hypercall handlers via generated macro
>   xen/x86: add hypercall performance counters for hvm, correct pv
>   xen: drop calls_to_multicall performance counter
>   tools/xenperf: update hypercall names

As it's pretty certain now that parts of this which didn't go in yet will
need re-basing, I'm going to drop this from my waiting-to-be-acked folder,
expecting a v4 instead.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 08:39:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 08:39:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286628.486215 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRVN2-0004zU-EE; Tue, 08 Mar 2022 08:39:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286628.486215; Tue, 08 Mar 2022 08:39:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRVN2-0004zN-AH; Tue, 08 Mar 2022 08:39:04 +0000
Received: by outflank-mailman (input) for mailman id 286628;
 Tue, 08 Mar 2022 08:39:03 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=PwwU=TT=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nRVN0-0004zD-Vd
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 08:39:03 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 346b0be7-9ebb-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 09:39:01 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 51CCE1F396;
 Tue,  8 Mar 2022 08:39:01 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 014FD13C2F;
 Tue,  8 Mar 2022 08:39:00 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id IvwIOiQWJ2J0EAAAMHmgww
 (envelope-from <jgross@suse.com>); Tue, 08 Mar 2022 08:39:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 346b0be7-9ebb-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646728741; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=cROBGpqb3bwVXQIc1jIl3XWHkXTT+howIBMcmLUTwWI=;
	b=HZuXVo+qJG8WlOVfm5nythdQwSeXeX1ylHlXscvntYaGBM0CGcYv/opfBbin7QjHSHgRou
	33rkVOoN+weRqUoAbyQkdQbpvAecYtcM9ZddvSYHLA05HiMTdmM6bXuw1Lwmd2Vl9dza2s
	/MuVd9v1gxgDi7yXz5YnHZG2os1ley0=
Message-ID: <4ac7c2ad-a600-f817-3b69-af0c1a47f4ac@suse.com>
Date: Tue, 8 Mar 2022 09:39:00 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [PATCH v3 00/13] xen: drop hypercall function tables
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
 <julien@xen.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Christopher Clark <christopher.w.clark@gmail.com>,
 xen-devel@lists.xenproject.org
References: <20211208155606.20029-1-jgross@suse.com>
 <0ec9f176-1108-e1ac-a250-5ab9d151f7a8@suse.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <0ec9f176-1108-e1ac-a250-5ab9d151f7a8@suse.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------NU7RUvpPhlL9iek00PPLqQLe"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------NU7RUvpPhlL9iek00PPLqQLe
Content-Type: multipart/mixed; boundary="------------nzb2aBdy5aWzl1IQFAD8SBOB";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Jan Beulich <jbeulich@suse.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
 <julien@xen.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Christopher Clark <christopher.w.clark@gmail.com>,
 xen-devel@lists.xenproject.org
Message-ID: <4ac7c2ad-a600-f817-3b69-af0c1a47f4ac@suse.com>
Subject: Re: [PATCH v3 00/13] xen: drop hypercall function tables
References: <20211208155606.20029-1-jgross@suse.com>
 <0ec9f176-1108-e1ac-a250-5ab9d151f7a8@suse.com>
In-Reply-To: <0ec9f176-1108-e1ac-a250-5ab9d151f7a8@suse.com>

--------------nzb2aBdy5aWzl1IQFAD8SBOB
Content-Type: multipart/mixed; boundary="------------lexoRItDrOYUcHHARhg7KGKl"

--------------lexoRItDrOYUcHHARhg7KGKl
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------lexoRItDrOYUcHHARhg7KGKl
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------lexoRItDrOYUcHHARhg7KGKl--

--------------nzb2aBdy5aWzl1IQFAD8SBOB--

--------------NU7RUvpPhlL9iek00PPLqQLe
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmInFiQFAwAAAAAACgkQsN6d1ii/Ey8R
sQf9Gfremgf8s1E3FmD0OVwBzPPbu32QaBRdXsPLI58aHBoW1/StjrrTpFG8FQ6w6zRdQZoPBxKz
OQ95MT6nTDXKUzEdums1fV4icxblTsZsXHBjidbIGObFq7UaxCZED/kHvxfpM4D8HisUlBN/PHOF
XGXROfKt5QD6Vgcd0xDYTA20cCfSwMtJn5hIOULPcUUHhIndKPxVVwJ3IgWU//R7Zrhf7I4eb1rD
uN8CS4zYYPuya/6U7xiCeFChT2ofG2rHhV8149ViUW6LpKPoynYcT1dirIKlJm508OQkKVKOxzPg
NE2gPrD24By+tLzuKyJugJQStXyXNzfkMO9TiBegsA==
=H7le
-----END PGP SIGNATURE-----

--------------NU7RUvpPhlL9iek00PPLqQLe--


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 08:50:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 08:50:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286634.486226 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRVXw-0007NC-FE; Tue, 08 Mar 2022 08:50:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286634.486226; Tue, 08 Mar 2022 08:50:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRVXw-0007N5-Bs; Tue, 08 Mar 2022 08:50:20 +0000
Received: by outflank-mailman (input) for mailman id 286634;
 Tue, 08 Mar 2022 08:50:18 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRVXu-0007Mz-GU
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 08:50:18 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c5ed9d61-9ebc-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 09:50:15 +0100 (CET)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04lp2058.outbound.protection.outlook.com [104.47.13.58]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-15-4mcY9Zu-Ma2d2um1R5WBOQ-2; Tue, 08 Mar 2022 09:50:15 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PAXPR04MB9024.eurprd04.prod.outlook.com (2603:10a6:102:20f::19)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Tue, 8 Mar
 2022 08:50:11 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 08:50:11 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c5ed9d61-9ebc-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646729416;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=jI28cgYk4hJftD6jXjMJeM0GHXR3vliy0a6ed7aoD6g=;
	b=BTvb/ZvvMbf3tHXuAbEfMNu/oW/ZgE9szqE1fjmmxnEoS3JUG73aEUYtH+fK5I3Rtaa+Dq
	E2hTrMPf7UI/3EYiPW/lcE8EdT1p4o2O3f1ytC86kX0BaiNUanTNR3DBNBSQxDH4FdpsPO
	sG3egvD6KX+WkL7Z6eqABri4sM2z1Zw=
X-MC-Unique: 4mcY9Zu-Ma2d2um1R5WBOQ-2
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=N4ef7CkFAxGtx7sIJGWrTCSjDOB1ZTBJv/P1DZYdb6KYOp7yHuszF2V415s36stB08FcRtnIS2ghv+ViDi3X6TDRAN1FnoQuTcZtA2V7dWNwy527pYVF78/ItCElTAK4DEz7NrG31RIx8gDH2LSUahCpUOn63fBVzbSdl03xPfpBuWSTufKkkYM3av8clRkBTbuYLE0u2zsavvxS3oE3ricvGNd/Trwyt5/EGMJ644eUBVOdtAQL6L0P9RE9LfLEq1ZDO0i+c1eJrqT+OnB3XR/QJ4RpFoUi3bbwXWwA0w0eyfOUSK5itWto+ARNGpwbMCE1uYsqDLonjf2i9VXH7w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=jI28cgYk4hJftD6jXjMJeM0GHXR3vliy0a6ed7aoD6g=;
 b=ghuYi/Hf5Ztv8PReISb4/AOANxlYZw+of+qPF5uVxa2MgZRpKsz/KJcowJ5vBRA49p/AJDQiZnGsi+lgg21JXt7Qe+TLAPicFCS91PF7C8hOmu3IyrqUuODgM+DoI11YDq1uwWS8YIngUuRljcfSv21E/GXv6KzeOB00y+p1MRspa4KDIcpYDBzHNeJamwWWBE41wZQ0tEiEfpY1UgDFOx5+MdrHxN77ew62WQPqVfaHHUKqN2pMDZr1vj0/icDtdE4NcXIFwmRWRHpGxy62ivbZBbkA5QdBDYl+fQ0Nzv5vZG0u1rkERNPVSha0eKG0KsaRgNRmC+e2INB5k3fa9A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <19d9390c-6ba1-ab0b-e582-8b83101b97a7@suse.com>
Date: Tue, 8 Mar 2022 09:50:09 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v3 00/13] xen: drop hypercall function tables
Content-Language: en-US
To: Juergen Gross <jgross@suse.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
 <julien@xen.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Christopher Clark <christopher.w.clark@gmail.com>,
 xen-devel@lists.xenproject.org
References: <20211208155606.20029-1-jgross@suse.com>
 <0ec9f176-1108-e1ac-a250-5ab9d151f7a8@suse.com>
 <4ac7c2ad-a600-f817-3b69-af0c1a47f4ac@suse.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <4ac7c2ad-a600-f817-3b69-af0c1a47f4ac@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM5PR1001CA0016.EURPRD10.PROD.OUTLOOK.COM
 (2603:10a6:206:2::29) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: b8f45454-3df8-40f1-b227-08da00e0a78c
X-MS-TrafficTypeDiagnostic: PAXPR04MB9024:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB902473793B3923E0F97C11C0B3099@PAXPR04MB9024.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(8676002)(6862004)(4326008)(66476007)(66946007)(66556008)(6512007)(2616005)(2906002)(31696002)(38100700002)(86362001)(53546011)(26005)(7416002)(6506007)(5660300002)(186003)(8936002)(83380400001)(6486002)(6636002)(36756003)(31686004)(54906003)(316002)(37006003)(508600001)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?dy9MbnpiZnFMUTd6anc4cWlROXZTU2NxUHBkTnVoK3VPNVRMdnBtUnp2cEhO?=
 =?utf-8?B?ZURBYnhtaThGTTYrb3VtZExqUXpibTJNTlRDKzh6eHlob1dxTDZ5SnZZcTli?=
 =?utf-8?B?NXMzL1BhQSsrenZtWjF0M040bGpZd1RUbk1pUC9lcDBsZmdNb0hOMEdMWFpR?=
 =?utf-8?B?Ym1FM0lPUzN5VDZwakUrMGZtN1IvaDRJaGI3dGxBVlpPSkZEYmg1dkN2U0Zv?=
 =?utf-8?B?TUpXc2EvUlpialY4em9OQkd0L0JHTHJLelZMTXBjSUIwY2lFa1JFVWVTcVIw?=
 =?utf-8?B?TTF5aUN1TmFreGM2S29NYWFLc2pZMTN6a05lM1kvRHdrM0Rqb1ByZi9UVzVK?=
 =?utf-8?B?bWc1dTJpREtIU3ViUW1lSStMbzJ0NlIyY3NYV3E4WGpZWFRXVHBYREVSOFRw?=
 =?utf-8?B?bnE2dFNyQldMOGpGbEt0bk1RODQydXJCdkV1dGNuZnBnL0VUejhHNVlQZjQ1?=
 =?utf-8?B?RHZycGlMY01mcE41OXRuTTZGRU9Ra1JEWkJYME9BMnhiYnZxOGR6RU8rYXpu?=
 =?utf-8?B?aStVS0oxdVdQV1hHQlZzVlNCZFQvSkhZTDRuYW5QbU50SzRVV21SUDZ3QlFU?=
 =?utf-8?B?RWJpZ0JhVmhvaCtCcnA5dDE2RHltZVBaemJSeTVIMDhDcmlsQmhIcXMyUkZC?=
 =?utf-8?B?U0NNc2JxY1ZwTGdtK3JBS2ZGcWxzaURjUDJLK1RicnZ1QUc2akxITVNQdnVX?=
 =?utf-8?B?OVlGd0ZnK3Zab1lsY24xbzcrdWI3OXBpSkZrSWhHbkN1RisxOHNFQ0g0NDVO?=
 =?utf-8?B?aVZENUhHdFhoaE9iYXkwOFdsN0pQbTkyNEZmSVZ1a2dnNERxVmVEYkdNQm04?=
 =?utf-8?B?ejBSbnUzcFFSck1PRWl0YysrZzFMT25ZaWVpMlB1ZWc2ZEYwdDZ2cWRRM0FB?=
 =?utf-8?B?cmJUTWpHcURwU1cwMFkvQ2VKUWV0ZFYxekcrZDJoQ2NkRmdtaDRsRVQvd1lk?=
 =?utf-8?B?S0p3bTZSVndBS0hlMkpxRzJvZGtmL21KcFNkUU9VaEhFNUhZVEJvRHhTcmxH?=
 =?utf-8?B?ZGFJYmJjZnd1S1p6T2xPWUFjQUVUc3QrRDUra1RNMHc0VzBpdFpVMVpqamVV?=
 =?utf-8?B?VTZVZGpvamVCa2RlcVJkQUVWcjlNQnpSVExESkJ6VHZlc3E0U0lEVjVmemJv?=
 =?utf-8?B?M2wrQkNzRDBnT1dYOEFmN3pxNG11MlNVcjA4NjY3YzBlQ25GTEs4OUxYKzlY?=
 =?utf-8?B?aHJnTEQyek55UnBocnpzZFRDd21kU0h1b0kxZXl0bGQyaXd0c29XRi9tOGhO?=
 =?utf-8?B?M0FzMGtQUFplM3ZBcStFUzkzZ21iK0ptK25ET0lCV2hTZkRGK2VDeEk1S3Za?=
 =?utf-8?B?bE5XcHVINi9CaWNPQmZxR1FObmRUTXhKM3loMXlKVTNCbFEvT1VGRTkwd3hS?=
 =?utf-8?B?TFk4bmhGWkhELzBwU1F3N3kzRkpjelFDZUN4dmtmaUROUU9uZUdyVDJMVDFI?=
 =?utf-8?B?Y0xVZGc1eVVNQkhlYTFkU0Y2Wjl5Qm9VRDE2RkJoMXhZTEZQVldyYkt5VHlS?=
 =?utf-8?B?enRXSGxvSlptaTJiSXdXTkpTSG53K1RBdVNaSzFQL013RlZHRXdRRVpzTnc3?=
 =?utf-8?B?eEtNSW44ZXlOSHFkSG1NNjZNakdMWFFUM3NCd051bk0zWGVxVUg4WHJsNmw5?=
 =?utf-8?B?ZUFYNm01VzFYV3kwTDIyMmNwN25aMnFuUXNoSWhteGRvQnZwbFNKQzU4M3RJ?=
 =?utf-8?B?c205c0FodHB6YWxRYVhLOE1BcjVVNkhOam9rT21KR0VaakJSKy9LcXV5UnpT?=
 =?utf-8?B?Ky9DRlNvZnVkaGFKY1RMc2F5R2RET2ZSNTBQSTlFUHNRdGh4VVI2amVlV3R2?=
 =?utf-8?B?OTZVUEtJSURPSTdONGtPMFRMakh2L1U5TDlNUi9YQitxUGtUcVQwL0c0SUpW?=
 =?utf-8?B?QWo0WStUTkpsRkowdzZmOVBnQWFCa1YyTkE3cUZHVnREcndpK2NKRU1ncjdG?=
 =?utf-8?B?WWlIQzdQUUYvS1grZGFlc1hCTXJuL243dlNIM0s1QTRRZlJ2UkRWdlVJWHBK?=
 =?utf-8?B?RGl0eXk3aFMrRERIc25NcEhjQXJSL0YydGtnSnNZT0FocTFFNmVZRkJIRk9z?=
 =?utf-8?B?T3oxdGNBMG1vcklCM2k4Qy8xWkh1Ti9hc1pidHYvWDliNjA2SHZ4YUJGYnVh?=
 =?utf-8?B?aDJ6alo4blhLdmJveDh4WFJFVDBtOVh1WGUyQ1JIcys5Mzl3QzNIcnAxc1JY?=
 =?utf-8?Q?JUm3drrk/AzK/zqhhWTn0rg=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b8f45454-3df8-40f1-b227-08da00e0a78c
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 08:50:11.1442
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: k3g8++KpW0Ah1jwrcjMDYTM3eeWiCpKy+6+/Uwbbc2bynGFPraPBjvLQq8T7w5vwg+8zxZAIGDjp7+nZzyHj+A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB9024

On 08.03.2022 09:39, Juergen Gross wrote:
> On 08.03.22 09:34, Jan Beulich wrote:
>> On 08.12.2021 16:55, Juergen Gross wrote:
>>> In order to avoid indirect function calls on the hypercall path as
>>> much as possible this series is removing the hypercall function tables
>>> and is replacing the hypercall handler calls via the function array
>>> by automatically generated call macros.
>>>
>>> Another by-product of generating the call macros is the automatic
>>> generating of the hypercall handler prototypes from the same data base
>>> which is used to generate the macros.
>>>
>>> This has the additional advantage of using type safe calls of the
>>> handlers and to ensure related handler (e.g. PV and HVM ones) share
>>> the same prototypes.
>>>
>>> A very brief performance test (parallel build of the Xen hypervisor
>>> in a 6 vcpu guest) showed a very slim improvement (less than 1%) of
>>> the performance with the patches applied. The test was performed using
>>> a PV and a PVH guest.
>>>
>>> Changes in V2:
>>> - new patches 6, 14, 15
>>> - patch 7: support hypercall priorities for faster code
>>> - comments addressed
>>>
>>> Changes in V3:
>>> - patches 1 and 4 removed as already applied
>>> - comments addressed
>>>
>>> Juergen Gross (13):
>>>    xen: move do_vcpu_op() to arch specific code
>>>    xen: harmonize return types of hypercall handlers
>>>    xen: don't include asm/hypercall.h from C sources
>>>    xen: include compat/platform.h from hypercall.h
>>>    xen: generate hypercall interface related code
>>>    xen: use generated prototypes for hypercall handlers
>>>    x86/pv-shim: don't modify hypercall table
>>>    xen/x86: don't use hypercall table for calling compat hypercalls
>>>    xen/x86: call hypercall handlers via generated macro
>>>    xen/arm: call hypercall handlers via generated macro
>>>    xen/x86: add hypercall performance counters for hvm, correct pv
>>>    xen: drop calls_to_multicall performance counter
>>>    tools/xenperf: update hypercall names
>>
>> As it's pretty certain now that parts of this which didn't go in yet will
>> need re-basing, I'm going to drop this from my waiting-to-be-acked folder,
>> expecting a v4 instead.
> 
> Yes, I was planning to spin that up soon.
> 
> The main remaining question is whether we want to switch the return type
> of all hypercalls (or at least the ones common to all archs) not
> requiring to return 64-bit values to "int", as Julien requested.

Could you remind me of the (sub)thread this was in, to read through the
justification again? Without recalling any details I guess I'd prefer
to stick to long for non-compat flavors.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 08:53:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 08:53:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286640.486237 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRVbQ-0007ym-Vn; Tue, 08 Mar 2022 08:53:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286640.486237; Tue, 08 Mar 2022 08:53:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRVbQ-0007yf-Sg; Tue, 08 Mar 2022 08:53:56 +0000
Received: by outflank-mailman (input) for mailman id 286640;
 Tue, 08 Mar 2022 08:53:56 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=PwwU=TT=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nRVbQ-0007yZ-Bj
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 08:53:56 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 482248ae-9ebd-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 09:53:53 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id F10881F397;
 Tue,  8 Mar 2022 08:53:54 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 928BF13C2F;
 Tue,  8 Mar 2022 08:53:54 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id I+1rIqIZJ2KeFwAAMHmgww
 (envelope-from <jgross@suse.com>); Tue, 08 Mar 2022 08:53:54 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 482248ae-9ebd-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646729634; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=t43t99z3UkjQ7VrAmE8Gr0s9IgMUfoyzhAEvHBVs+/k=;
	b=HQ+6STtoQxgjdkyMKvrCHRIzG0uxCHeIPlGl/Uad951ZTjugW/78EJWI4uMvaX2q8+h6OE
	tl4WJvDM7X0rNocH+aceIIygomtU9Xc+umoT1dLAboTRhu6BeJ6bo70IwEtZ5ApBE2joLH
	/wDOwgqD2noQ5oDw2SBrR6j4Ffm/bS8=
Message-ID: <a6d8a218-8e4d-a850-6b8a-61c40d067479@suse.com>
Date: Tue, 8 Mar 2022 09:53:54 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [PATCH v3 00/13] xen: drop hypercall function tables
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
 <julien@xen.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Christopher Clark <christopher.w.clark@gmail.com>,
 xen-devel@lists.xenproject.org
References: <20211208155606.20029-1-jgross@suse.com>
 <0ec9f176-1108-e1ac-a250-5ab9d151f7a8@suse.com>
 <4ac7c2ad-a600-f817-3b69-af0c1a47f4ac@suse.com>
 <19d9390c-6ba1-ab0b-e582-8b83101b97a7@suse.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <19d9390c-6ba1-ab0b-e582-8b83101b97a7@suse.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------OIZoYq1CQjDxsS0oQ0M0srB4"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------OIZoYq1CQjDxsS0oQ0M0srB4
Content-Type: multipart/mixed; boundary="------------eoctSyBKJ19fO0Y5a5rd0dxk";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Jan Beulich <jbeulich@suse.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
 <julien@xen.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Christopher Clark <christopher.w.clark@gmail.com>,
 xen-devel@lists.xenproject.org
Message-ID: <a6d8a218-8e4d-a850-6b8a-61c40d067479@suse.com>
Subject: Re: [PATCH v3 00/13] xen: drop hypercall function tables
References: <20211208155606.20029-1-jgross@suse.com>
 <0ec9f176-1108-e1ac-a250-5ab9d151f7a8@suse.com>
 <4ac7c2ad-a600-f817-3b69-af0c1a47f4ac@suse.com>
 <19d9390c-6ba1-ab0b-e582-8b83101b97a7@suse.com>
In-Reply-To: <19d9390c-6ba1-ab0b-e582-8b83101b97a7@suse.com>

--------------eoctSyBKJ19fO0Y5a5rd0dxk
Content-Type: multipart/mixed; boundary="------------pd8oG26yrpBPOesUFcJs02a0"

--------------pd8oG26yrpBPOesUFcJs02a0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------pd8oG26yrpBPOesUFcJs02a0
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------pd8oG26yrpBPOesUFcJs02a0--

--------------eoctSyBKJ19fO0Y5a5rd0dxk--

--------------OIZoYq1CQjDxsS0oQ0M0srB4
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmInGaIFAwAAAAAACgkQsN6d1ii/Ey/d
ywf9H1RsbG5hksI7ijpx4DHd9lExFpbhnnUim8LsGdsxaeZ7J1/6zZfxyNEl35/m3t/P4Y52jFMi
qKlTp/w9Bv3dtfuOThB7G4w3ilSOKQ++hSzAQpAnOgwCh164nmPQGsiiy7cE+EGsbj86CwXq+VBy
/F1IpVvqcQHzQJQgqlevtEvI/IW7XCTP/KvKoCPRtTfTOfa29rx7/sOTffWd2FMgtQ6/x0KyK6ts
1kugLmvv55MO19RRZX91nCQBfHnOaQxKR90v9Z21JzpvSF6jhXaBsqbA/tLqaUlNrJFEkourtPsh
dc1QT38wAYALDmUbspAbFoiXVK5tGvwqm2H4tHcRlg==
=Zlip
-----END PGP SIGNATURE-----

--------------OIZoYq1CQjDxsS0oQ0M0srB4--


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 09:05:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 09:05:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286648.486247 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRVmY-0001HL-5X; Tue, 08 Mar 2022 09:05:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286648.486247; Tue, 08 Mar 2022 09:05:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRVmY-0001HE-1p; Tue, 08 Mar 2022 09:05:26 +0000
Received: by outflank-mailman (input) for mailman id 286648;
 Tue, 08 Mar 2022 09:05:25 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fWwI=TT=citrix.com=prvs=059ab6e88=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRVmX-0001H8-0w
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 09:05:25 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e1bf699b-9ebe-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 10:05:23 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e1bf699b-9ebe-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646730322;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=Gw8B0zsr1ciZQ8qzMk8LOZmk29LT/7Z/wjnsOSgryiE=;
  b=WY4QuyRaDDATA5XbfNsOtBofycs5kSrAC9uyAOf7xMhpbCx1s7m1yRw0
   QPlHRaUkpM6ryH/Ml2+hZSjha1lSZitjuA1oI4evs4tzqvCw90oL5T4AU
   9V9ryZ4YASOjyCvZwMmWjfnryu0UlFZJE4+sjUE/vfGfBjHXo5SZcmixi
   c=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65163526
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:S24Frqmk4c10ChBSm/0Q0JXo5gylJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xIWCjvVP/vZNGPxf9slO4nn8xsBvcCGm99kTVdoqyw2FyMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiW1PV4
 LsenuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYFD8Rfer0ouokYxxRSiF7Z6JIp+bWLi3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3oHZvwCufFf87aZvCX7/L9ZlT2zJYasVmQ6uHO
 ZFEM2QHgBLoSkUfPVALGq0F39zx3CL/bRIHmkKwuv9ii4TU5FMoi+W8WDbPQfSaSMMQkkuGq
 2bu+2XiHgpcJNGZ0SCC8H+nmqnIhyyTcJ4SFab+9+UsiQWX3WsVIBITXFq/5/K+jyaWWdhSN
 kgV8SoGtrUp+QqgSdyVYvGjiCfa5FhGAYMWSrBkrlHWokbJ3+qHLjU8dn0GUOYojf8zTGUq0
 wWGkYywFDM65dV5Vkmh3ruTqDqzPw0cImkDeTIIQGM53jXznG0gpkmRF4g+ScZZmvWwQGitm
 G7S8EDSkp1O1ZZj6kmtwbzQb9tATLDtRxV92AjYV3nNAuhRNN/8PNzABbQ2AJ99wGelorup4
 SBsdyu2trlm4XSxeMqlGr1l8FaBvartDdEkqQQzd6TNDhz0k5JZQahe4StlOGBiOdsedDnib
 Sf74F0NusEMbCbxNP8qOOpd7vjGK4C6TrwJsdiOMrJzjmVZLlfbrEmCm2bKt4wSrKTcuf5mY
 srKGSpdJX0bFb5m3FKLqxQ1itcWKtQF7TqLH/jTlk3/uZLHPSL9YepVYTOmM7FihIvZ8Vq9z
 jqqH5bTo/mpeLalOXe/HE96BQ1iEEXX8riq85wHLLDSeFE6cIzjYteIqY4cl0Vet/09vs/D/
 22nW18ez1z6hHbdLh6NZGwlY7TqNauTZ1piVcDwFT5EA0QeXLs=
IronPort-HdrOrdr: A9a23:DVgvtKPR/p0JzMBcTyP155DYdb4zR+YMi2TDiHofdfUFSKClfp
 6V8cjztSWUtN4QMEtQ/uxoHJPwO080kqQFnLX5XI3SJzUO3VHHEGgM1/qB/9SNIVyaygcZ79
 YdT0EcMqyAMbEZt7eC3ODQKb9Jq7PmgcOVbKXlvg9QpGlRGt9dBmxCe2Cm+yNNNW177c1TLu
 vi2iMLnUvpRV0nKuCAQlUVVenKoNPG0LrgfB49HhYirC2Dlymh5rLWGwWRmk52aUIE/Z4StU
 z+1yDp7KSqtP+2jjfaym/o9pxT3P/s0MFKCsCggtUcbh/slgGrToJ8XKDqhkF/nMifrHIR1P
 XcqRYpOMp+r1vXY2GOuBPonzLt1T4/gkWSvmOwsD/Gm4jUVTg6A81OicZyaR3C8Xctu9l6ze
 Ziw3+Zn4A/N2KOoA3No/zzEz16nEu9pnQv1cQJiWZEbIcYYLhN6aQC4UJuFosaFi6S0vFqLA
 BXNrCc2B9qSyLbU5iA1VMfg+BEH05DUytue3Jy9PB8iFNt7TJEJ0hx/r1qop5PzuN5d3B+3Z
 W2Dk1ZrsA/ciYoV9MOOA4ge7rANoWfe2OEDIqtSW6XYZ3vfUi976LK3A==
X-IronPort-AV: E=Sophos;i="5.90,164,1643691600"; 
   d="scan'208";a="65163526"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=dE/dUvw0Ws1HbN/eLLk7Qs84bs3Ghnzl8FkCNwKz8jSSktpte06XvtTIRcxkOWVlYXLmw9U+ta8vlhHJnM9lr1uA3UHVlBfdZYQtUw2JmxINh1QAnbIKuOVApxt6Brgvz0eEYpfUok98/VpaQSKoWd1JKnjPh8nLBqPA+6rGOHMZjipOwROT3xHBuZDjY3OKwGUtwqJDHyYGclb35bEhZxjEN8MPLK41Dsi/mS1w+htVXxX/8zXj7p8cYkfqtJFugZfFkNo3W8LSZoNypvXLJcMxIeE8jc3lLfZOhziEZBjCEQ5seachNOWWoMRaEQcEq+b1I85xh2es5lKe07iz8w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=YNnwGePBMn/RtJGeSRzZsxRbI8wWIAT9UcWf2v/fO+M=;
 b=IVF8AIo2s2CBry98y1/hQJsvHvpjk7juTZq8iMf7/v70YdXl+LDL0z73ulEF6FPzwI/Jje6YYayyJE7RxvfgP5zwHjJWgupKr+1JveopHTHvOnB6YfERboDOCwL1chDLTDBo8lcp+L2wciZ6wBNfz9TYotd3YObnHcOfu/j6GvIY3qbm8RfeZtw19JlcFJ5Cd8e1hHau1+se6RFru/krY3BLDIlg7oPccmLe7HGze0oWJi/yuZaANTzBOnBGYqm0WcEhoY9H/7KUC+GScxeyiZlTHDQLm43C+6eRJpf3egl+yb9aYys3yb+fCsa2y3Th7elGLB1mGzZklhXSz/12sw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=YNnwGePBMn/RtJGeSRzZsxRbI8wWIAT9UcWf2v/fO+M=;
 b=d9UUigGrYxFGc9Tz+8uikxQtU/as6QdXREBF7knFtC9YbNCjadid9rGOX914aaYJg1aCY76f0CXCONxqtRoZw+0SSqAKq9fF8q3QFyPwxmc+VqAwxBSX77P1x1VA0R0mcVi3daC3tnOmFr99AYzJVe8uNK/tI05F4pmRCx4cFcI=
Date: Tue, 8 Mar 2022 10:05:12 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Alex Olson <this.is.a0lson@gmail.com>, <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v4] vpci/msix: fix PBA accesses
Message-ID: <YiccSMWbV2StPFB1@Air-de-Roger>
References: <20220307163744.74030-1-roger.pau@citrix.com>
 <fbc1388e-8211-f498-b134-4df5b1ccd003@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <fbc1388e-8211-f498-b134-4df5b1ccd003@suse.com>
X-ClientProxiedBy: LO2P265CA0264.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:8a::36) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 28aefa5a-3a74-48dd-ae6a-08da00e2c3cb
X-MS-TrafficTypeDiagnostic: SA0PR03MB5611:EE_
X-Microsoft-Antispam-PRVS: <SA0PR03MB5611C06BA5E9C4FE4F3D535F8F099@SA0PR03MB5611.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: Iqs6wbHYTrmwlMJ+ZcjUj1rHhRevKAYkfKLi0PRaOIrvh4F7qsPbJTd3FJ0F5/SV8BTh5Ic8ZFomymJtue25X4UOxKiQGD2NR0vz4nN3uryf8dXHfgW692+E66mi+IVCbumdl95YI3/SQC/GeMxn1bwnf5y7eqaHNnE5hOKELAn3o1vHzMr0pU/0ErQGK2XTydFkCDJORzjhGkAz2uJ7TRAUUj8B7zhkLPVEv5h7gWA7Uai6xtreUvGwHb4VXxdFiGzMzUhfWLT3jKOP6XjOaejm3pnTz49kX2nif1IpOwe1D6CNb7Bv+kcBsENODDsEYwqZ/kGMU54aphvWuYkgYpshDAZn6Y/hh/XlItuviOQRjcUyboZVR1FGAcNx4zdzmjB9mEx0k83UtacKsp/4IBNebFJGVda+fTNeRCVB7Gs8upTbnhobiHxCio3nuz0GSywlza4OB75jx0s55A7SI29AgxyjoeZoJUb6Tq57xDLU5ltcnfpCXUeO4Lj+mUAAF0opCAetwd6HpYKF3YsvWjOfZpABvg+4/z7shjZLJ74aUyPyCPF6aIR8gPfjkB6EBcHExOCCMl2wNkmj70SokGSLOEgxQegRqnQRsNiGbO7UaT0at5ju69Mg7lutzNCU4+1Ul310XWZdLqzoVOct4Q==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(53546011)(6666004)(66946007)(6486002)(6512007)(26005)(38100700002)(9686003)(6506007)(5660300002)(2906002)(8936002)(508600001)(66556008)(66476007)(33716001)(83380400001)(186003)(316002)(82960400001)(4326008)(85182001)(6916009)(86362001)(8676002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?ZHBpRFYxZEhwVFpnWFp0dG9yV0RQWGtLRkQzYXZ2QmdndmJQd21Yd0NHTU9Y?=
 =?utf-8?B?Y0Y2MlE2V0VlSlRNSUY4aW9nbTFmUFVPVURWNWJIQkhLR1o2enlUMnNVMWJY?=
 =?utf-8?B?OWpIVzdpaVE1bVhwbGZsWllBT0lybmVKVm9xZ05NS3hyZTgxS0R2RFAwUEZz?=
 =?utf-8?B?USt6NnZDdTczVU5pWXNVT3cwUGVleUxUbUE1ZGRvNG1DUmRhQlZkcW1taDdN?=
 =?utf-8?B?bjNqbk1YQTMvaFBKOWF6Sm1xbWF4UTY4UzJleWl2bGZ1VU5JdDhnNUd6NXZJ?=
 =?utf-8?B?MUFnMDR3VTU1R0RKdzJMOEJYeDNYeDM2SzhjUEFTdjBtakRLR280RUZFRUF3?=
 =?utf-8?B?Vko2T01ESE51RHJxbEtXand5SkljbHk0bURFQVdhdEV4c2VSMzRqZEtVa3Bp?=
 =?utf-8?B?NmlmdW1zWk1IS1R0Z3piMkh5NTFBdnJ4VE5SWjU5OVZ6ZXlXRm5sMURoTzJm?=
 =?utf-8?B?aEoxK1hZR3ZNOWdtMG16WXY5S2FMRDJHS2tZcHR0ZHhYeS94WS9DWUpIMXMw?=
 =?utf-8?B?VStWdjdvQm5nczB2TExwSVFoZEwwUHRxZWg0blhidnY0TW1IYlU5YXpOV0RO?=
 =?utf-8?B?czQ1RFpDazVuRlFYNHBrSzZ5ZXlYWmxNQzBEVWsvSTAycWdLNm1zVTJJNVh3?=
 =?utf-8?B?YnBLUUZKWGdsU2Y4K1pFcVFTZ0JITHcxeENwTElOMUJsRTFOekN2UWJaMXFn?=
 =?utf-8?B?Y1RxNTQrazVxWk01dG13WThyYWxZdlJQS004UjVxbjBGUnIydHViRnJoL1li?=
 =?utf-8?B?RXlHVEZLM3Qyby9mUEZwTW16dkhIeHI1akMxOHdlT0JySDBHWUFYSmlLS0k3?=
 =?utf-8?B?UVFPbHJvREVnY1FkQXg3ZEZmNWo4Z21PSWdjZGY4UmxRdWdlc25rSzZZTmNw?=
 =?utf-8?B?TzNaM09BMmNZVjMzdFpwNnV4Z2Y1anJwUjN6eFlhWjYrUUl6N1ZibFFZdzRP?=
 =?utf-8?B?enhiZlBrQzAzSmhkc3B3a1BCS0JIR01FV2lTek03YjJNWXh5TjJWVnQ0enZa?=
 =?utf-8?B?QTY3N3RSNHZvNjZPOG1tZ2R0dDZZY0R6aXBVS2hDS0djMXQyMHA2MXMvblRr?=
 =?utf-8?B?SDJIaFlNOWlma3BPSXJZTDJ0WXZMem8xNHRjQUs4MVRtejluMG5uOGJHUkF1?=
 =?utf-8?B?SDdua0p2d3krdUl6djRQbzFXb3lSd1dnM0txQzhaakE3bTdHRUYzM0hUNDEv?=
 =?utf-8?B?c1VFQ05QM3VrNHVvT2ZIZjJPQlBNN21GWWZ1R1ZVTVpuSUpzbWpFRnVUZm91?=
 =?utf-8?B?cHBlVXdZQXR6YnpZaFk4cmxqWHN3NHNMTyt6akZXbSttVmpSZWRFampOZmEz?=
 =?utf-8?B?a09sc3Z6ajB2M0w4NnFTek16UUl6SENVZE9DZmVlcXZlV2VZaE5xa0JUSlk3?=
 =?utf-8?B?YnRhRnVQRGVSOUl6RVVXZyt3OSthUU5qQ0JmU0hSK3hlS2FOMGF3eDJyWHZL?=
 =?utf-8?B?aGVZb1BqdWFWMzJ6R2JTSTMwT2JibFlMVGsrQnc4aFJNdkNGZE82NWtONVh3?=
 =?utf-8?B?aHJEc0ZSTGh2ekFVY0hQZ1d2N3J3QVQ3NVhHYmVCSjM1ejB1VTlnV3hFTFI5?=
 =?utf-8?B?dlRWNm55NVlMZ0tMWHhmeWlCaFJaOWc4SWZncS9NVmVWTVE1bkYrRzVrWTZq?=
 =?utf-8?B?bytYU2NOOTJyODlKM0RLdlVTdVlrSDhMS1loYXMzSTZ6Z0JieFJrYlNYZE4r?=
 =?utf-8?B?Q2pubm1kQ0d0Zy9HSDRrYjZmNHdmcndsUm1Cb0Flb0dXV3ZJcWU2VVVVS0tT?=
 =?utf-8?B?MGxsaS9QSmNMaXJ6aWdKN0ZBakhZNHFsZU8zWVF6cjBvQkIyUFhUbEo3V2lr?=
 =?utf-8?B?R0xrWmRNWWFzelNPNDlQY0F5QlZidTB5c0pyS1ZmSVR1YUZTL3p1Tjl3MkRW?=
 =?utf-8?B?bExCdERod1FFZ2x2RnN1K29mMTQ4am9MUXpGMnlJV3daeldtOHNZMmNHclNi?=
 =?utf-8?B?Vk45bEZvVU5VdUFXaysrb25QRTl0cTVPRjdrV3pINkpZa3dkTEpGUFg3OEFl?=
 =?utf-8?B?aDRDL3hHVm5hRkh0OTE4a1lTK2FQZWJLak5pRUFrUVBvRDhSajlSTVA1Ky90?=
 =?utf-8?B?a3NDcjd4YnhhTHdxUk1mNzZmcEZLdDd3ajZodmcwcG9ONDdzZy9Na0JJYUFZ?=
 =?utf-8?B?a0NSVDBIRmErVGNydkZTOTJ1N3RpN3NoY2FaTTYyQzVuSkE0YjZkMFpzVFpJ?=
 =?utf-8?Q?NsrSo3Aff8fYEguGZ1j080I=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 28aefa5a-3a74-48dd-ae6a-08da00e2c3cb
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 09:05:17.5735
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: AVrdjKwHl5gQmICvF6I6oSQ30WvFiaYPv+QiqeomvP4IK/Fure9zdjQtwT9a5dOc36VCAP8b0QI0exQOpaIH/A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA0PR03MB5611
X-OriginatorOrg: citrix.com

On Tue, Mar 08, 2022 at 09:31:34AM +0100, Jan Beulich wrote:
> On 07.03.2022 17:37, Roger Pau Monne wrote:
> > Map the PBA in order to access it from the MSI-X read and write
> > handlers. Note that previously the handlers would pass the physical
> > host address into the {read,write}{l,q} handlers, which is wrong as
> > those expect a linear address.
> > 
> > Map the PBA using ioremap when the first access is performed. Note
> > that 32bit arches might want to abstract the call to ioremap into a
> > vPCI arch handler, so they can use a fixmap range to map the PBA.
> > 
> > Reported-by: Jan Beulich <jbeulich@suse.com>
> > Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
> 
> Reviewed-by: Jan Beulich <jbeulich@suse.com>
> 
> > Cc: Alex Olson <this.is.a0lson@gmail.com>
> 
> I'll wait a little with committing, in the hope for Alex to re-provide
> a Tested-by.
> 
> > --- a/xen/drivers/vpci/msix.c
> > +++ b/xen/drivers/vpci/msix.c
> > @@ -182,6 +182,38 @@ static struct vpci_msix_entry *get_entry(struct vpci_msix *msix,
> >      return &msix->entries[(addr - start) / PCI_MSIX_ENTRY_SIZE];
> >  }
> >  
> > +static void __iomem *get_pba(struct vpci *vpci)
> > +{
> > +    struct vpci_msix *msix = vpci->msix;
> > +    /*
> > +     * PBA will only be unmapped when the device is deassigned, so access it
> > +     * without holding the vpci lock.
> > +     */
> > +    void __iomem *pba = read_atomic(&msix->pba);
> > +
> > +    if ( likely(pba) )
> > +        return pba;
> > +
> > +    pba = ioremap(vmsix_table_addr(vpci, VPCI_MSIX_PBA),
> > +                  vmsix_table_size(vpci, VPCI_MSIX_PBA));
> > +    if ( !pba )
> > +        return read_atomic(&msix->pba);
> > +
> > +    spin_lock(&vpci->lock);
> > +    if ( !msix->pba )
> > +    {
> > +        write_atomic(&msix->pba, pba);
> > +        spin_unlock(&vpci->lock);
> > +    }
> > +    else
> > +    {
> > +        spin_unlock(&vpci->lock);
> > +        iounmap(pba);
> > +    }
> 
> TBH I had been hoping for just a single spin_unlock(), but you're
> the maintainer of this code ...

Would you prefer something like:

spin_lock(&vpci->lock);
if ( !msix->pba )
    write_atomic(&msix->pba, pba);
spin_unlock(&vpci->lock);

if ( read_atomic(&msix->pba) != pba )
    iounmap(pba);

?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 09:30:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 09:30:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286655.486258 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRWB3-0004rG-8E; Tue, 08 Mar 2022 09:30:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286655.486258; Tue, 08 Mar 2022 09:30:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRWB3-0004r9-52; Tue, 08 Mar 2022 09:30:45 +0000
Received: by outflank-mailman (input) for mailman id 286655;
 Tue, 08 Mar 2022 09:30:43 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRWB1-0004qz-J0; Tue, 08 Mar 2022 09:30:43 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRWB1-0004Z3-HE; Tue, 08 Mar 2022 09:30:43 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRWB1-0004gv-2k; Tue, 08 Mar 2022 09:30:43 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRWB1-0005iu-2G; Tue, 08 Mar 2022 09:30:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=MwOEAgKTdYtuYoO59szS2OCRTpKi6b9bBQtPccEX+0I=; b=dbCd9vvhg+8a4fkzvEQZ5rw6hL
	ykyOVY9VtKGPw8rX29JWFT9BWyxPDbhuwLlmWUPftRXL5fBJQM7FXlokWJsyjD4y55RzPcSHxSkgD
	GEQ/5/bkJj9D25KOR6W89QaGmQxc2yvWMuTVDCnWz0bMrSdhB5DszZ0ZTX74RpePKzl8=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168472-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168472: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=62fa37fe7b9df3c54a2d9d90aed9ff0e817ee0c6
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 08 Mar 2022 09:30:43 +0000

flight 168472 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168472/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 62fa37fe7b9df3c54a2d9d90aed9ff0e817ee0c6
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    7 days
Failing since        168258  2022-03-01 01:55:31 Z    7 days   76 attempts
Testing same since   168469  2022-03-07 23:11:34 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 468 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 09:44:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 09:44:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286665.486270 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRWNh-0006UG-EZ; Tue, 08 Mar 2022 09:43:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286665.486270; Tue, 08 Mar 2022 09:43:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRWNh-0006U9-BS; Tue, 08 Mar 2022 09:43:49 +0000
Received: by outflank-mailman (input) for mailman id 286665;
 Tue, 08 Mar 2022 09:43:47 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRWNf-0006Tw-RO; Tue, 08 Mar 2022 09:43:47 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRWNf-0004kk-JB; Tue, 08 Mar 2022 09:43:47 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRWNe-0004zS-U9; Tue, 08 Mar 2022 09:43:47 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRWNe-0000rq-Tf; Tue, 08 Mar 2022 09:43:46 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=3g5WIljV25Rm8GkvtX1aiGwCCaOnK3SWaBn+cUGSClw=; b=itQUX4RYH8uxHCi+vgH+w4fjOk
	+XShFgeFbSSdP5QNEaXrbHOSRApJS4bceviHybYJ8RkeQMoYq0Pjuwd3YsfphDy4hZkUtfKUIKos0
	hIefYmz31O4DJ0YSqZH+mddwIh/grzJw6sv6CF60UPvQ9LkswYOiJ+f3O8H8s5AEN7Aw=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168470-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168470: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=9d4a44380d273de22d5753883cbf5581795ff24d
X-Osstest-Versions-That:
    xen=4cb8d7a06752b368a365e30117f535a2fdad3963
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 08 Mar 2022 09:43:46 +0000

flight 168470 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168470/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168460
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168460
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168460
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168460
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168460
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168460
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168460
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168460
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168460
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168460
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168460
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168460
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  9d4a44380d273de22d5753883cbf5581795ff24d
baseline version:
 xen                  4cb8d7a06752b368a365e30117f535a2fdad3963

Last test of basis   168460  2022-03-07 13:08:06 Z    0 days
Testing same since   168470  2022-03-07 23:38:15 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   4cb8d7a067..9d4a44380d  9d4a44380d273de22d5753883cbf5581795ff24d -> master


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 10:12:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 10:12:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286678.486285 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRWpK-0001sk-ST; Tue, 08 Mar 2022 10:12:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286678.486285; Tue, 08 Mar 2022 10:12:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRWpK-0001sd-O8; Tue, 08 Mar 2022 10:12:22 +0000
Received: by outflank-mailman (input) for mailman id 286678;
 Tue, 08 Mar 2022 10:12:21 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nRWpJ-0001sX-C3
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 10:12:21 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRWpI-0005LI-F0; Tue, 08 Mar 2022 10:12:20 +0000
Received: from home.octic.net ([81.187.162.82] helo=[10.0.1.193])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRWpI-0007FI-5a; Tue, 08 Mar 2022 10:12:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=5xXd5he0NK/VagT/ejfaznDfBEjPfWq4gpNNeyYnoRc=; b=jgpXdd+1CRepFR2tZJ+y7b6Ysx
	13E4Fsx3sA7bSVpdEj0flTeC595KJ+KmziVrHq0wbZb3o8ny1+qxLnJFWXc6n5dSyGbEG57rwfk6q
	iRdCkr+WSOfg7/Sto3KihglRgRe3adITorRr7nLRDY6pIq7KkBuQfKT+RvK2WoMcz+lE=;
Message-ID: <9c7fa64d-0f4c-c7a5-281a-225094e820f2@xen.org>
Date: Tue, 8 Mar 2022 10:12:17 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH v2] livepatch: set -f{function,data}-sections compiler
 option
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
Cc: xen-devel@lists.xenproject.org, Andrew Cooper
 <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
 Jan Beulich <jbeulich@suse.com>, Stefano Stabellini
 <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
References: <20220307155558.72876-1-roger.pau@citrix.com>
 <f6e3f58a-ca7c-6173-815b-8bf300df33ed@xen.org>
 <YicQKoI8H3DJlqF2@Air-de-Roger>
From: Julien Grall <julien@xen.org>
In-Reply-To: <YicQKoI8H3DJlqF2@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi Roger,

On 08/03/2022 08:13, Roger Pau Monné wrote:
> On Mon, Mar 07, 2022 at 05:19:53PM +0000, Julien Grall wrote:
>> Hi Roger,
>>
>> On 07/03/2022 15:55, Roger Pau Monne wrote:
>>> If livepatching support is enabled build the hypervisor with
>>> -f{function,data}-sections compiler options, which is required by the
>>> livepatching tools to detect changes and create livepatches.
>>>
>>> This shouldn't result in any functional change on the hypervisor
>>> binary image, but does however require some changes in the linker
>>> script in order to handle that each function and data item will now be
>>> placed into its own section in object files. As a result add catch-all
>>> for .text, .data and .bss in order to merge each individual item
>>> section into the final image.
>>>
>>> The main difference will be that .text.startup will end up being part
>>> of .text rather than .init, and thus won't be freed. .text.exit will
>>> also be part of .text rather than dropped. Overall this could make the
>>> image bigger, and package some .text code in a sub-optimal way.
>>>
>>> Note that placement of the sections inside of .text is also slightly
>>> adjusted to be more similar to the position found in the default GNU
>>> ld linker script. This requires having a separate section for the
>>> header in order to place it at the begging of the output image,
>>> followed with the unlikely and related sections, and finally the main
>>> .text section.
>>>
>>> On Arm the .data.read_mostly needs to be moved ahead of the .data
>>> section like it's already done on x86, and the alignment needs to be
>>> set to PAGE_SIZE so it doesn't end up being placed at the tail of a
>>> read-only page from the previous section. While there move the
>>> alignment of the .data section ahead of the section declaration, like
>>> it's done for other sections.
>>
>> This sounds like a bug not related to this patch. Can this be split
>> separately?
> 
> No, .data.read_mostly needs to be moved before .data so that the catch
> all .data.* introduced to .data to account for -fdata-sections doesn't
> end up also including .data.read_mostly.

Sorry I misread it. I thought you suggested the alignment was also wrong 
before this patch. Thanks for the clarification!

> 
>>>
>>> The benefit of having CONFIG_LIVEPATCH enable those compiler option
>>> is that the livepatch build tools no longer need to fiddle with the
>>> build system in order to enable them. Note the current livepatch tools
>>> are broken after the recent build changes due to the way they
>>> attempt to set  -f{function,data}-sections.
>>>
>>> Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
>>> ---
>>> Changes since v1:
>>>    - Introduce CC_SPLIT_SECTIONS for selecting the compiler options.
>>>    - Drop check for compiler options, all supported versions have them.
>>>    - Re-arrange section placement in .text, to match the default linker
>>>      script.
>>>    - Introduce .text.header to contain the headers bits that must appear
>>>      first in the final binary.
>>> ---
>>> Given that now the header is explicitly placed in .text.header, it's
>>> likely possible to simplify some of the ordering of the object files
>>> for the prelink.o generation, as arch/x86/boot/built_in.o no longer
>>> needs to be the first object file in the list.
>>>
>>> It also seems on Arm the schedulers and hypfs .data sections should be
>>> moved into read_mostly.
>>> ---
>>> Tested by gitlab in order to assert I didn't introduce any regression
>>> on Arm specially.
>>> ---
>>>    xen/Makefile              |  2 ++
>>>    xen/arch/arm/arm32/head.S |  1 +
>>>    xen/arch/arm/arm64/head.S |  1 +
>>>    xen/arch/arm/xen.lds.S    | 49 +++++++++++++++++++++------------------
>>>    xen/arch/x86/boot/head.S  |  2 +-
>>>    xen/arch/x86/xen.lds.S    | 22 +++++++++++-------
>>>    xen/common/Kconfig        |  4 ++++
>>>    7 files changed, 49 insertions(+), 32 deletions(-)
>>>
>>> diff --git a/xen/Makefile b/xen/Makefile
>>> index 5c21492d6f..18a4f7e101 100644
>>> --- a/xen/Makefile
>>> +++ b/xen/Makefile
>>> @@ -273,6 +273,8 @@ else
>>>    CFLAGS += -fomit-frame-pointer
>>>    endif
>>> +CFLAGS-$(CONFIG_CC_SPLIT_SECTIONS) += -ffunction-sections -fdata-sections
>>> +
>>>    CFLAGS += -nostdinc -fno-builtin -fno-common
>>>    CFLAGS += -Werror -Wredundant-decls -Wno-pointer-arith
>>>    $(call cc-option-add,CFLAGS,CC,-Wvla)
>>> diff --git a/xen/arch/arm/arm32/head.S b/xen/arch/arm/arm32/head.S
>>> index 7a906167ef..c837d3054c 100644
>>> --- a/xen/arch/arm/arm32/head.S
>>> +++ b/xen/arch/arm/arm32/head.S
>>> @@ -120,6 +120,7 @@
>>>    #endif /* !CONFIG_EARLY_PRINTK */
>>> +        .section .text.header, "ax", %progbits
>>>            .arm
>>>            /*
>>> diff --git a/xen/arch/arm/arm64/head.S b/xen/arch/arm/arm64/head.S
>>> index 66d862fc81..e62c48ec1c 100644
>>> --- a/xen/arch/arm/arm64/head.S
>>> +++ b/xen/arch/arm/arm64/head.S
>>> @@ -133,6 +133,7 @@
>>>            add \xb, \xb, x20
>>>    .endm
>>> +        .section .text.header, "ax", %progbits
>>>            /*.aarch64*/
>>>            /*
>>> diff --git a/xen/arch/arm/xen.lds.S b/xen/arch/arm/xen.lds.S
>>> index 08016948ab..836da880c3 100644
>>> --- a/xen/arch/arm/xen.lds.S
>>> +++ b/xen/arch/arm/xen.lds.S
>>> @@ -30,9 +30,16 @@ SECTIONS
>>>      _start = .;
>>>      .text : {
>>>            _stext = .;            /* Text section */
>>> +       *(.text.header)
>>
>> With this change, the changes in arch/*/arch.mk to order head.o looks
>> unnecessary. Can we remove it at the same time? (The .text.header and the
>> update of arch.mk may want to be done together in a separate patch).
> 
> I had a note below the commit message about this, as I didn't think it
> was strictly necessary to get this accepted. I will do a pre-patch
> then with those added.

Ah, I didn't spot the note. I would prefer if such clean-up is done now.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 10:13:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 10:13:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286683.486296 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRWqB-0002Pw-5F; Tue, 08 Mar 2022 10:13:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286683.486296; Tue, 08 Mar 2022 10:13:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRWqB-0002Pp-1y; Tue, 08 Mar 2022 10:13:15 +0000
Received: by outflank-mailman (input) for mailman id 286683;
 Tue, 08 Mar 2022 10:13:14 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fWwI=TT=citrix.com=prvs=059ab6e88=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRWq9-0002DX-RC
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 10:13:14 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 59d5763a-9ec8-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 11:13:09 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 59d5763a-9ec8-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646734391;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=d/pgkxgBWKvVPHZTeceLs/Le0/poXA6ZmKca8w/+3+k=;
  b=AwS5JTvcfrnNUsgW0eMeJJt37uQaC71c9qhj/yioLyhCUa+Yi34nTWe/
   JWnSapU947/2jF3hai9QTu/lqduh3/dkxvyGxOhM+D+EMlMyE3sMPkoaP
   gaguim/vkILQ0sfOzpAOHIMZliFZxyS/DKVTon+REYY7nJ/Vq9XVZmka6
   s=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65621790
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:iH5Pwq3zR5QMrMepTvbD5cVxkn2cJEfYwER7XKvMYLTBsI5bpzQEn
 WAWCmiGb6zZN2b8fIh/PI6/9UhXvsDXyoBhSQY5pC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUw0YDga++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /1Jlt+CURZ1HJbMleU3C0RVTRskNpBJreqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHxO4wSoDd4xCzxBvc6W5HTBa7N4Le02R9u254URKmPP
 6L1bxJsfFffeg1+HGsUI80bh8mNnljweA9h/Qf9Sa0fvDGIkV0ZPKLWGMXRUsyHQ4NShEnwj
 nLL+SH1Dw8XMPSbyCGZ6TS8i+nXhyT5VYkOUrqi+ZZCglee22gSAx0+TkagrL+yjUvWZj5EA
 xVKoGx09/F0rRH1CImmN/GlnJKalho/GOhIArEY0wGAy4CMvgvHPDIPczEUPbTKq/QKbTAt0
 1aImfbgCjpurKCZRBqhy1uEkd+hEXNLdDFfPEfoWSNAuoC++99r0nojW/4+SPbdszHjJd3nL
 9lmRgAajq5bs8ME3r7TEbvv02P1/cihouLYC2zqsoOZAuFROdbNi2+AswGzARN8wGCxFAHpU
 J8swZT20Qz2JcvR/BFhuc1UdF1T296LMSfHnXlkFIQ7+jKm9haLJN4Mvm8hdBoya5ZZIlcFh
 XM/XysLv/e/21PwMcdKj3+ZUZx2ncAM6/y/PhwrUja+SscoL1LWlM2fTUWRw3rsgCARfVIXY
 v+mnTKXJS9CU8xPlWPuL89EiOND7n1ulAv7GMGgpzz6gOX2WZJgYepcWLd4Rrtit/3sTcS82
 4s3CvZmPD0DCL2uOHeGq9VPRb3IRFBiba3LRwVsXrfrCiJtGX07Cu+XxrUkeod/mL9SmPuO9
 Xa4MnK0AnKm7ZEbAW1mskxeVY4=
IronPort-HdrOrdr: A9a23:BXEa7q+Cl/QPWCpu2t5uk+E8db1zdoMgy1knxilNoENuHPBwxv
 rAoB1E73PJYVYqOE3Jmbi7Sc+9qFfnhONICO4qTMuftWjdyRGVxeRZjLcKrAeQfhEWmtQtsZ
 uINpIOd+EYbmIK/foSgjPIa+rIqePvmMvD6Ja8vhVQpENRGtpdBm9Ce3em+yZNNXB77PQCZf
 2hDp0tnUvfRZ1bVLXxOlA1G8z44/HbnpPvZhALQzYh9Qm1lDutrJr3CQKR0BsyWy5Ghe5Kyx
 mJryXJooGY992rwB7V0GHeq7xQhdva09NGQOiBkNIcJDnAghuhIK5hR7qBljYop/zH0idhrP
 D85zMbe+hj4XLYeW+45TPrxgnbyT4rr0TvzFeJ6EGT1/DRdXYfMY5slIhZehzW5w4Lp9dnyp
 9G2Gqfqt5+EQ7AtD6V3amHazha0m6P5VYym+8aiHJSFaEEbqVKkIAZ9ERJVL8dASPB7pw9Gu
 UGNrCS2B9vSyLbU5nlhBgt/DT1NU5DXCtuA3Jy9vB96gIm3UyQlCAjtYkidnRpzuNLd3AL3Z
 WBDk1SrsA9ciYnV9MPOA4/e7rDNoXse2OEDIvAGyWuKEk4U0i936Ifpo9Fo92XRA==
X-IronPort-AV: E=Sophos;i="5.90,164,1643691600"; 
   d="scan'208";a="65621790"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ESclIgUAhyEMriVMMZbXKbAx9ebTh8S2l0uwwlL7Nr+vMkNSVwPtqbCyyBJtj2JaDTL4eZUXOnd2uLiyJ+aEd7CPPQqjOEG/6s3CWpH10CVQCg2vCbwX5B/ctG065y/uxMf6rRHpTaqTj1r1AlneShJqt6up4AtHrgGAEXIKY30w9Kc/lD2rYsjmjNArUGRSKOOrz4e36V0PjtdIwAdi2IWvwSKrYGLO7iO2pHnoC2zATTVR2jaiwUi6M2cmUEIcYCHHtRYAWOZivVVxrmB1pJx8y78NJoTRusRKHosreyapzdD9/uV9CFlGo4ikQAzP7wWaPVzWbtngPYbUuJbkjA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Zfdpb/i6GfctBoPXNLrBBbStHRD2B0CfueJsk5WpLLQ=;
 b=I/Vxusjm06eIQNRdkp7PEMc74fAKIiZwWxbIQ8bJYe3DMwGsMZoe9HwMZZ0KSl5Q45xHehdhk2eHEoXM09TSLsHzf7IrlVBnzmU+i4aB3E9ACl8g5xLYZS5MASihLvxwkBe5Juxv07j5JPmDixTVB2nr9FP3uYg1BBmTo5P7bDApNTdAGCan77B1VJCTWl9vZged71xwkkkD9y3bsGZBaPlvlArk6T8IC6OdGESH99A+nITw4V5PF0KVDhScy5h+jSNVXV6MINt9TVhEFnsItJ+3Ff4ezdvanwH7xP4OfuAQbO0yFmFb65+0Dbj1I+AfN+5fxCNysjT/fetQIt8kPg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Zfdpb/i6GfctBoPXNLrBBbStHRD2B0CfueJsk5WpLLQ=;
 b=ZeJaOstPdW/itnNzIB5UeXN9meRKtvZvsSNNmmdzrnddVw9G+MnEqNTNKl78H2Zu57vjgblPygE4X23qyk9I1HscUqdiuKynbO7VQH51bfV1ndRafMF2eqZ6IdnjF+/3xXzf2MVwXXY3EvLCJG7U6EiojSPP6O5kMC45uzVXDUg=
Date: Tue, 8 Mar 2022 11:12:59 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH v2] x86/build: use --orphan-handling linker option if
 available
Message-ID: <YicsK8xqdcGZYaIn@Air-de-Roger>
References: <289684f6-fa73-bf02-137c-680ad8891640@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <289684f6-fa73-bf02-137c-680ad8891640@suse.com>
X-ClientProxiedBy: LO4P265CA0034.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:2ae::8) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 879f457c-b55b-490c-ab8f-08da00ec3c42
X-MS-TrafficTypeDiagnostic: CO1PR03MB5875:EE_
X-Microsoft-Antispam-PRVS: <CO1PR03MB5875F280FFB8B51B41D26F958F099@CO1PR03MB5875.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(2906002)(4326008)(86362001)(186003)(8676002)(83380400001)(33716001)(6506007)(9686003)(6512007)(66476007)(66946007)(66556008)(316002)(85182001)(6916009)(54906003)(508600001)(38100700002)(6486002)(6666004)(26005)(8936002)(966005)(82960400001)(5660300002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?ampkU2RVd3JOdFJEdWxybkdwWjJXNEVFT2ZVaE01NUF1ZmIyOU56ZEU3U2FE?=
 =?utf-8?B?dm1NMWF3cjVzSW1QMllHYXhDU0V2b2FYZ3drVVZndWRaYmhyUXAxZ2hIcVJ2?=
 =?utf-8?B?RVpkcWRGQ3YrTU5DMGhta2I0Wjhkc2IrV1NxS25Vb2lNRVRnRkgwR3hpdFY1?=
 =?utf-8?B?NzE4ckROODRUNlpGeUc1N0d3WU5EN1dMSVRObEg1R1dUdkFqNGtCZlIzN2p5?=
 =?utf-8?B?ZHFndFJBaTdoRTJMckxHOVJpMHJib0VNcE56ZU1RaWt4NkUwTmlvZWZxSGJs?=
 =?utf-8?B?UXZ2ZGlGNGJrQ0FwZm9mclJjLzZpdkxnaiszcU1ROFNUZUwwTkIwaVpkdldj?=
 =?utf-8?B?L2IzclRBMFY5ZmhhK1ExVFUwM1ZOaExIM2R5d0NKY096VlV2UVRjY2VmaFdW?=
 =?utf-8?B?WWtXSnhZTC9EK3RrYlZyVVlyWldGbGN5bmtWUURadUUvaDV5OWJvNlZ2VVVS?=
 =?utf-8?B?dW1FY2hxU0ViSmhZcTROcnZWYTZNOGtMZVFyV1ZrM3RRSXN4WXBnV1MxWG9M?=
 =?utf-8?B?VFhkQWRxREF1ZGc5NXJNckxlcEVDWFdCUTVzTGpsb1M2VFowU3ZaZkYrblR2?=
 =?utf-8?B?K2VHZTVvMFpaWnFnNGY2ejJPanRZd1JMQWh1ckdoQThLOWV0TVNiY25xSVY5?=
 =?utf-8?B?ZzZvRWtqYnJoQ1hyS0tlR3lYM3pxcy9nTWtCSFFOVFJXSnp5ZVF1TEwyR0RB?=
 =?utf-8?B?aC9zNGxtUkpwWVNUU3lKeVh5bldhOVJXMU5IU2hxa0NXd2NXNVMwWm1HZ1c2?=
 =?utf-8?B?TVVLRzBBeEVmYk1JRGo3Q1hXMEIrSDZ5NndVN2FzYys0SkxSWlRuZWhCR2c5?=
 =?utf-8?B?NlBxbE5LMDFmSm9ma1RpWitEMUJNeXc0bHcyYVZhZklwVWdqTHlmLzIySjhD?=
 =?utf-8?B?K0NMNS92Rkdxak5WQklNYmhreEY3ZGVRekFrT1Naa0xhSmVYa3dTbzZoSTFh?=
 =?utf-8?B?ZHIwR3diMStpd0tGTlNZcXNFa1RhN0p4Ylk2bUlleGRMci9lZXZYN1MyRmhx?=
 =?utf-8?B?dFFvYnoxUEJDdlpJY2FzVmNYOVQxY2FRZlVjOHhzNjNTdXZqK2JqVG43VWIy?=
 =?utf-8?B?M0tZTkQwd2NrNno3dHR3VVFYRk1BbDUrSGMxeUovb2thQ3JPb1k4VUJteEY2?=
 =?utf-8?B?ekRxRU4rbWJoenpSbU8rT1FuTWZKbE9DSUZKenV2M2JXOWUrcjhpNTVlaEdj?=
 =?utf-8?B?KzNwLzlxYzMxWEg0Z0M1WHJFZi9lMHY0YWUxVkpqbmJacG9JU3BiTWxqSERM?=
 =?utf-8?B?UGpEcWpFSWN3VkZKbVlDM0RRbExVR2NQZVVoTHF2UlpERnRlNFpzVTFjTnRS?=
 =?utf-8?B?SWFvWmFoeUJLeUV0OW4wakxldTVXYlM3THcwYUcrQzJzYnN1L2VhZDl2THZk?=
 =?utf-8?B?QlR1NkhwV1BqbHQ0WnZUNlFuNlJxN1hyZ2tzMmhpemZKUFlWQkpqc1FidjZQ?=
 =?utf-8?B?Z0srU3pMU1NPbEtyOVpDTFpVZDdpbnZBd1o3T1QvQk90RTF6RVl0VkdoYVBy?=
 =?utf-8?B?QmIzc2YvZ0JlY1RkZUVFRDY3NmxSMmIrbGt2TWlQT053dXZmOWF5RkRDYkt3?=
 =?utf-8?B?VHp5Sm42T3Fvb2RRbXVRTDc2dllCRlRkeVlWRlB1alN4WlVrdzVpV0JSbjRL?=
 =?utf-8?B?WnRzUnFIN2QyWFhkNHlFSktrM3NTMDVpOHYwdWp4MmcvVlRlamNtYVVTUlFK?=
 =?utf-8?B?YjgwVFRjZE5MSWJkTWpUQnArbGhDcVdKT2hBdCsxeFQ4Z0MzVm5aVm1kUE4w?=
 =?utf-8?B?K3dRRlg0djFyOFExS1FaRTNCdnh3SXVGQmk2cVo4dFZuRmpLak42UUhzRzc0?=
 =?utf-8?B?ejdPYTM4ZUM4L0YwNGtac1lDMHdYMzBrSXI0eExZbGlUYS9JdWpIU3BQKzFF?=
 =?utf-8?B?bGl4WXd1QWdsOEdaQm5hMFhCck5YcWFSQjNOTGFCOTRkODFBc3IwZ1RVbXVt?=
 =?utf-8?B?Uk5wNEV4Rks2bFdrN3BoQTVVaHhONzFNTTdMeUlVazJJVHBmVFJ3aStST0dD?=
 =?utf-8?B?TktiOVZTV0hyK080Vkl1amxyMXloSWdzbldnUU5uaCsvVVgweENHbXM2SG1Z?=
 =?utf-8?B?a3l6RHo4NUtxTnlNdjFPRnJjSm1yTm84NldyWVFVQ1FyUzZmcEJTU1J2YytN?=
 =?utf-8?B?WFhZUnFQYUlNc0thMGZ0YTBSTXZFZmVQVzF2dmxSaGROSVRLZGI2TTNVbURY?=
 =?utf-8?Q?K1OvzGu8Gcw/eoWiVyT6CQA=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 879f457c-b55b-490c-ab8f-08da00ec3c42
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 10:13:05.1510
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: n3X5oeGyIn7G7kgfLikM9yT+RFiKC/gyq7uQ1d3B8zNJruSyi2PqFHr+CY7RxR1DbQgW8gObTlsdQpkvzccbjQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR03MB5875
X-OriginatorOrg: citrix.com

On Mon, Mar 07, 2022 at 02:53:32PM +0100, Jan Beulich wrote:
> As was e.g. making necessary 4b7fd8153ddf ("x86: fold sections in final
> binaries"), arbitrary sections appearing without our linker script
> placing them explicitly can be a problem. Have the linker make us aware
> of such sections, so we would know that the script needs adjusting.
> 
> To deal with the resulting warnings:
> - Retain .note.* explicitly for ELF, and discard all of them (except the
>   earlier consumed .note.gnu.build-id) for PE/COFF.
> - Have explicit statements for .got, .plt, and alike and add assertions
>   that they're empty. No output sections will be created for these as
>   long as they remain empty (or else the assertions would cause early
>   failure anyway).
> - Collect all .rela.* into a single section, with again an assertion
>   added for the resulting section to be empty.
> - Extend the enumerating of .debug_* to ELF. Note that for Clang adding
>   of .debug_macinfo is necessary. Amend this by its Dwarf5 counterpart,
>   .debug_macro, then as well (albeit more may need adding for full
>   coverage).
> 
> Suggested-by: Roger Pau Monné <roger.pau@citrix.com>
> Signed-off-by: Jan Beulich <jbeulich@suse.com>

LGTM, just two questions.

> ---
> v2: Don't use (NOLOAD) for ELF; it has undocumented (and unhelpful)
>     behavior with GNU ld there. Also place .{sym,str,shstr}tab for LLVM
>     ld.
> ---
> I would have wanted to make this generic (by putting it in
> xen/Makefile), but the option cannot be added to LDFLAGS, or else
> there'll be a flood of warnings with $(LD) -r. (Besides, adding to
> LDFLAGS would mean use of the option on every linker pass rather than
> just the last one.)
> 
> Retaining of .note in xen-syms is under question. Plus if we want to
> retain all notes, the question is whether they wouldn't better go into
> .init.rodata. But .note.gnu.build-id shouldn't move there, and when
> notes are discontiguous all intermediate space will also be assigned to
> the NOTE segment, thus making the contents useless for tools going just
> by program headers.
> 
> Newer Clang may require yet more .debug_* to be added. I've only played
> with versions 5 and 7 so far.
> 
> Unless we would finally drop all mentioning of Stabs sections, we may
> want to extend to there what is done for Dwarf here (allowing the EFI
> conditional around the section to also go away).
> 
> See also https://sourceware.org/pipermail/binutils/2022-March/119922.html.
> 
> --- a/xen/arch/x86/Makefile
> +++ b/xen/arch/x86/Makefile
> @@ -120,6 +120,8 @@ syms-warn-dup-y := --warn-dup
>  syms-warn-dup-$(CONFIG_SUPPRESS_DUPLICATE_SYMBOL_WARNINGS) :=
>  syms-warn-dup-$(CONFIG_ENFORCE_UNIQUE_SYMBOLS) := --error-dup
>  
> +orphan-handling-$(call ld-option,--orphan-handling=warn) += --orphan-handling=warn
> +
>  $(TARGET): TMP = $(@D)/.$(@F).elf32
>  $(TARGET): $(TARGET)-syms $(efi-y) $(obj)/boot/mkelf32
>  	$(obj)/boot/mkelf32 $(notes_phdrs) $(TARGET)-syms $(TMP) $(XEN_IMG_OFFSET) \
> @@ -146,7 +148,7 @@ $(TARGET)-syms: $(BASEDIR)/prelink.o $(o
>  		>$(@D)/.$(@F).1.S
>  	$(MAKE) $(build)=$(@D) $(@D)/.$(@F).1.o
>  	$(LD) $(XEN_LDFLAGS) -T $(obj)/xen.lds -N $< $(build_id_linker) \
> -	    $(@D)/.$(@F).1.o -o $@
> +	    $(orphan-handling-y) $(@D)/.$(@F).1.o -o $@
>  	$(NM) -pa --format=sysv $(@D)/$(@F) \
>  		| $(BASEDIR)/tools/symbols --all-symbols --xensyms --sysv --sort \
>  		>$(@D)/$(@F).map
> @@ -220,7 +222,7 @@ endif
>  		| $(BASEDIR)/tools/symbols $(all_symbols) --sysv --sort >$(@D)/.$(@F).1s.S
>  	$(MAKE) $(build)=$(@D) .$(@F).1r.o .$(@F).1s.o
>  	$(LD) $(call EFI_LDFLAGS,$(VIRT_BASE)) -T $(obj)/efi.lds -N $< \
> -	                $(@D)/.$(@F).1r.o $(@D)/.$(@F).1s.o $(note_file_option) -o $@
> +	      $(@D)/.$(@F).1r.o $(@D)/.$(@F).1s.o $(orphan-handling-y) $(note_file_option) -o $@
>  	$(NM) -pa --format=sysv $(@D)/$(@F) \
>  		| $(BASEDIR)/tools/symbols --all-symbols --xensyms --sysv --sort >$(@D)/$(@F).map
>  	rm -f $(@D)/.$(@F).[0-9]* $(@D)/..$(@F).[0-9]*
> --- a/xen/arch/x86/xen.lds.S
> +++ b/xen/arch/x86/xen.lds.S
> @@ -12,6 +12,13 @@
>  #undef __XEN_VIRT_START
>  #define __XEN_VIRT_START __image_base__
>  #define DECL_SECTION(x) x :
> +/*
> + * Use the NOLOAD directive, despite currently ignored by (at least) GNU ld
> + * for PE output, in order to record that we'd prefer these sections to not
> + * be loaded into memory.
> + */
> +#define DECL_DEBUG(x, a) #x ALIGN(a) (NOLOAD) : { *(x) }
> +#define DECL_DEBUG2(x, y, a) #x ALIGN(a) (NOLOAD) : { *(x) *(y) }
>  
>  ENTRY(efi_start)
>  
> @@ -19,6 +26,8 @@ ENTRY(efi_start)
>  
>  #define FORMAT "elf64-x86-64"
>  #define DECL_SECTION(x) #x : AT(ADDR(#x) - __XEN_VIRT_START)
> +#define DECL_DEBUG(x, a) #x 0 : { *(x) }
> +#define DECL_DEBUG2(x, y, a) #x 0 : { *(x) *(y) }

Would it be helpful to place those in a 

>  
>  ENTRY(start_pa)
>  
> @@ -179,6 +188,13 @@ SECTIONS
>  #endif
>  #endif
>  
> +#ifndef EFI
> +  /* Retain these just for the purpose of possible analysis tools. */
> +  DECL_SECTION(.note) {
> +       *(.note.*)
> +  } PHDR(note) PHDR(text)

Wouldn't it be enough to place it in the note program header?

The buildid note is already placed in .rodata, so any remaining notes
don't need to be in a LOAD section?

> +#endif
> +
>    _erodata = .;
>  
>    . = ALIGN(SECTION_ALIGN);
> @@ -266,6 +282,32 @@ SECTIONS
>         __ctors_end = .;
>    } PHDR(text)
>  
> +#ifndef EFI
> +  /*
> +   * With --orphan-sections=warn (or =error) we need to handle certain linker
> +   * generated sections. These are all expected to be empty; respective
> +   * ASSERT()s can be found towards the end of this file.
> +   */
> +  DECL_SECTION(.got) {
> +       *(.got)
> +  } PHDR(text)
> +  DECL_SECTION(.got.plt) {
> +       *(.got.plt)
> +  } PHDR(text)
> +  DECL_SECTION(.igot.plt) {
> +       *(.igot.plt)
> +  } PHDR(text)
> +  DECL_SECTION(.iplt) {
> +       *(.iplt)
> +  } PHDR(text)
> +  DECL_SECTION(.plt) {
> +       *(.plt)
> +  } PHDR(text)
> +  DECL_SECTION(.rela) {
> +       *(.rela.*)
> +  } PHDR(text)

Why do you need to explicitly place those in the text program header?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 10:13:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 10:13:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286688.486307 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRWqo-0002zU-GY; Tue, 08 Mar 2022 10:13:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286688.486307; Tue, 08 Mar 2022 10:13:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRWqo-0002zN-CJ; Tue, 08 Mar 2022 10:13:54 +0000
Received: by outflank-mailman (input) for mailman id 286688;
 Tue, 08 Mar 2022 10:13:52 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRWqm-0002z3-HF; Tue, 08 Mar 2022 10:13:52 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRWqm-0005MV-Fd; Tue, 08 Mar 2022 10:13:52 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRWqm-0005dm-23; Tue, 08 Mar 2022 10:13:52 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRWqm-0004AE-1d; Tue, 08 Mar 2022 10:13:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=bTndyQSpQ0x58NxRoI/TPAx4IC/xd6G1cz19yH9lgec=; b=EMh6ESrePwWl1i1AJ8gfzkhSkx
	aC436mRL9D5XecxcCaDh8RW34ZWnhECLalLkwcd1AvyOPe/aX+6dI9eeoZmMOMQxF1ikjnmc9FMIB
	Bc5IEaVqINKobo8yRamzs8qEKhMcSyIJLQB3v+X1MH6Tg5w7jN2Gpzo0zWCYMIZAL+AY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168473-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168473: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=34238d7408df4d9c83e7b00accfc310545165787
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 08 Mar 2022 10:13:52 +0000

flight 168473 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168473/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              34238d7408df4d9c83e7b00accfc310545165787
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  606 days
Failing since        151818  2020-07-11 04:18:52 Z  605 days  587 attempts
Testing same since   168473  2022-03-08 04:18:53 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 99948 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 10:30:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 10:30:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286703.486318 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRX6S-0005M7-4H; Tue, 08 Mar 2022 10:30:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286703.486318; Tue, 08 Mar 2022 10:30:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRX6R-0005LR-V5; Tue, 08 Mar 2022 10:30:03 +0000
Received: by outflank-mailman (input) for mailman id 286703;
 Tue, 08 Mar 2022 10:30:02 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=JMfM=TT=amazon.de=prvs=0590b4220=doebel@srs-se1.protection.inumbo.net>)
 id 1nRX6P-0004xE-3M
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 10:30:02 +0000
Received: from smtp-fw-80006.amazon.com (smtp-fw-80006.amazon.com
 [99.78.197.217]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b275c69b-9eca-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 11:29:58 +0100 (CET)
Received: from pdx4-co-svc-p1-lb2-vlan3.amazon.com (HELO
 email-inbound-relay-pdx-2c-72dc3927.us-west-2.amazon.com) ([10.25.36.214])
 by smtp-border-fw-80006.pdx80.corp.amazon.com with ESMTP;
 08 Mar 2022 10:29:42 +0000
Received: from EX13D44EUB004.ant.amazon.com
 (pdx1-ws-svc-p6-lb9-vlan2.pdx.amazon.com [10.236.137.194])
 by email-inbound-relay-pdx-2c-72dc3927.us-west-2.amazon.com (Postfix) with
 ESMTPS id C1C3741C60; Tue,  8 Mar 2022 10:29:40 +0000 (UTC)
Received: from EX13MTAUEE002.ant.amazon.com (10.43.62.24) by
 EX13D44EUB004.ant.amazon.com (10.43.166.198) with Microsoft SMTP Server (TLS)
 id 15.0.1497.28; Tue, 8 Mar 2022 10:29:39 +0000
Received: from dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (10.13.240.106)
 by mail-relay.amazon.com (10.43.62.224) with Microsoft SMTP Server id
 15.0.1497.28 via Frontend Transport; Tue, 8 Mar 2022 10:29:38 +0000
Received: by dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (Postfix,
 from userid 3160037)
 id 7487B4EA9; Tue,  8 Mar 2022 10:29:37 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b275c69b-9eca-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646735400; x=1678271400;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=Mj4KvWVjR2Lga3XKnQh2USZEpWm0M+0U0oUseAwdJjM=;
  b=Yb7I2MQDinijsuZDoEwg1viP+7O+B1hmEGvQyvG9rTxYsxNNNbLXucNY
   m1Tgn9Oxg5UYk3VvhfXe9Dah5Hy/JHiUFKeJPE1lnoGZltwi7unwGbU8R
   IMcedg+8Cdpa43Kz82tPA38lzrqa5hs27Fg5FNNzoMSqQtRGc//js8Uyn
   4=;
X-IronPort-AV: E=Sophos;i="5.90,164,1643673600"; 
   d="scan'208";a="68917907"
From: Bjoern Doebel <doebel@amazon.de>
To: <xen-devel@lists.xenproject.org>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, Roger
 Pau Monne <roger.pau@citrix.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
	Bjoern Doebel <doebel@amazon.de>, Konrad Rzeszutek Wilk
	<konrad.wilk@oracle.com>, Ross Lagerwall <ross.lagerwall@citrix.com>
Subject: [PATCH v3 2/2] xen/x86: Livepatch: support patching CET-enhanced functions
Date: Tue, 8 Mar 2022 10:29:35 +0000
Message-ID: <b91fc474832dd0ce07d223542316fba74afc35ee.1646735357.git.doebel@amazon.de>
X-Mailer: git-send-email 2.32.0
In-Reply-To: <453c6e5decb315109a4fbf0065cc364129dca195.1646735357.git.doebel@amazon.de>
References: <453c6e5decb315109a4fbf0065cc364129dca195.1646735357.git.doebel@amazon.de>
MIME-Version: 1.0
Precedence: Bulk
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

Xen enabled CET for supporting architectures. The control flow aspect of
CET expects functions that can be called indirectly (i.e., via function
pointers) to start with an ENDBR64 instruction. Otherwise a control flow
exception is raised.

This expectation breaks livepatching flows because we patch functions by
overwriting their first 5 bytes with a JMP + <offset>, thus breaking the
ENDBR64. We fix this by checking the start of a patched function for
being ENDBR64. In the positive case we move the livepatch JMP to start
behind the ENDBR64 instruction.

To avoid having to guess the ENDBR64 offset again on patch reversal
(which might race with other mechanisms adding/removing ENDBR
dynamically), use the livepatch metadata to store the computed offset
along with the saved bytes of the overwritten function.

Signed-off-by: Bjoern Doebel <doebel@amazon.de>
CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
CC: Ross Lagerwall <ross.lagerwall@citrix.com>
----
Note that on top of livepatching functions, Xen supports an additional
mode where we can "remove" a function by overwriting it with NOPs. This
is only supported for functions up to 31 bytes in size and this patch
reduces this limit to 30 bytes.

Changes since r1:
* use sizeof_field() to avoid unused variable warning
* make metadata variable const in arch_livepatch_revert
---
 xen/arch/x86/livepatch.c | 61 ++++++++++++++++++++++++++++++++++------
 1 file changed, 53 insertions(+), 8 deletions(-)

diff --git a/xen/arch/x86/livepatch.c b/xen/arch/x86/livepatch.c
index 65530c1e57..0fd97f2a00 100644
--- a/xen/arch/x86/livepatch.c
+++ b/xen/arch/x86/livepatch.c
@@ -14,11 +14,29 @@
 #include <xen/vm_event.h>
 #include <xen/virtual_region.h>
 
+#include <asm/endbr.h>
 #include <asm/fixmap.h>
 #include <asm/nmi.h>
 #include <asm/livepatch.h>
 #include <asm/setup.h>
 
+/*
+ * CET hotpatching support: We may have functions starting with an ENDBR64
+ * instruction that MUST remain the first instruction of the function, hence
+ * we need to move any hotpatch trampoline further into the function. For that
+ * we need to keep track of the patching offset used for any loaded hotpatch
+ * (to avoid racing against other fixups adding/removing ENDBR64 or similar
+ * instructions).
+ *
+ * We do so by making use of the existing opaque metadata area. We use its
+ * first 4 bytes to track the offset into the function used for patching and
+ * the remainder of the data to store overwritten code bytes.
+ */
+struct x86_livepatch_meta {
+    uint8_t patch_offset;
+    uint8_t instruction[LIVEPATCH_OPAQUE_SIZE - sizeof(uint8_t)];
+};
+
 static bool has_active_waitqueue(const struct vm_event_domain *ved)
 {
     /* ved may be xzalloc()'d without INIT_LIST_HEAD() yet. */
@@ -104,18 +122,34 @@ void noinline arch_livepatch_revive(void)
 
 int arch_livepatch_verify_func(const struct livepatch_func *func)
 {
+    BUILD_BUG_ON(sizeof(struct x86_livepatch_meta) != LIVEPATCH_OPAQUE_SIZE);
+
     /* If NOPing.. */
     if ( !func->new_addr )
     {
         /* Only do up to maximum amount we can put in the ->opaque. */
-        if ( func->new_size > sizeof(func->opaque) )
+        if ( func->new_size > sizeof_field(struct x86_livepatch_meta,
+                                           instruction) )
             return -EOPNOTSUPP;
 
         if ( func->old_size < func->new_size )
             return -EINVAL;
     }
-    else if ( func->old_size < ARCH_PATCH_INSN_SIZE )
-        return -EINVAL;
+    else
+    {
+        /*
+         * Space needed now depends on whether the target function
+         * starts with an ENDBR64 instruction.
+         */
+        uint8_t needed;
+
+        needed = ARCH_PATCH_INSN_SIZE;
+        if ( is_endbr64(func->old_addr) )
+            needed += ENDBR64_LEN;
+
+        if ( func->old_size < needed )
+            return -EINVAL;
+    }
 
     return 0;
 }
@@ -127,15 +161,21 @@ int arch_livepatch_verify_func(const struct livepatch_func *func)
 void noinline arch_livepatch_apply(struct livepatch_func *func)
 {
     uint8_t *old_ptr;
-    uint8_t insn[sizeof(func->opaque)];
+    struct x86_livepatch_meta *lp;
+    uint8_t insn[sizeof(lp->instruction)];
     unsigned int len;
 
+    lp = (struct x86_livepatch_meta *)func->opaque;
+    lp->patch_offset = 0;
     old_ptr = func->old_addr;
     len = livepatch_insn_len(func);
     if ( !len )
         return;
 
-    memcpy(func->opaque, old_ptr, len);
+    if ( is_endbr64(old_ptr) )
+        lp->patch_offset += ENDBR64_LEN;
+
+    memcpy(lp->instruction, old_ptr + lp->patch_offset, len);
     if ( func->new_addr )
     {
         int32_t val;
@@ -143,14 +183,15 @@ void noinline arch_livepatch_apply(struct livepatch_func *func)
         BUILD_BUG_ON(ARCH_PATCH_INSN_SIZE != (1 + sizeof(val)));
 
         insn[0] = 0xe9; /* Relative jump. */
-        val = func->new_addr - func->old_addr - ARCH_PATCH_INSN_SIZE;
+        val = func->new_addr - (func->old_addr + lp->patch_offset
+                                + ARCH_PATCH_INSN_SIZE);
 
         memcpy(&insn[1], &val, sizeof(val));
     }
     else
         add_nops(insn, len);
 
-    memcpy(old_ptr, insn, len);
+    memcpy(old_ptr + lp->patch_offset, insn, len);
 }
 
 /*
@@ -159,7 +200,11 @@ void noinline arch_livepatch_apply(struct livepatch_func *func)
  */
 void noinline arch_livepatch_revert(const struct livepatch_func *func)
 {
-    memcpy(func->old_addr, func->opaque, livepatch_insn_len(func));
+    const struct x86_livepatch_meta *lp;
+
+    lp = (struct x86_livepatch_meta *)func->opaque;
+
+    memcpy(func->old_addr + lp->patch_offset, lp->instruction, livepatch_insn_len(func));
 }
 
 /*
-- 
2.32.0




Amazon Development Center Germany GmbH
Krausenstr. 38
10117 Berlin
Geschaeftsfuehrung: Christian Schlaeger, Jonathan Weiss
Eingetragen am Amtsgericht Charlottenburg unter HRB 149173 B
Sitz: Berlin
Ust-ID: DE 289 237 879





From xen-devel-bounces@lists.xenproject.org Tue Mar 08 10:32:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 10:32:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286709.486329 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRX93-0006K2-Hh; Tue, 08 Mar 2022 10:32:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286709.486329; Tue, 08 Mar 2022 10:32:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRX93-0006Jv-Dr; Tue, 08 Mar 2022 10:32:45 +0000
Received: by outflank-mailman (input) for mailman id 286709;
 Tue, 08 Mar 2022 10:32:44 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRX92-0006Jl-B8; Tue, 08 Mar 2022 10:32:44 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRX92-0005gu-8e; Tue, 08 Mar 2022 10:32:44 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRX91-0006Vc-PP; Tue, 08 Mar 2022 10:32:43 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRX91-0004tX-Ox; Tue, 08 Mar 2022 10:32:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=+8IYsS5Wnv7dLwVJSKFofcnFh61MlEfYAKIBGOWJ9kE=; b=rPvV+9DUsxSGeMMtrhUjtl8lBZ
	NY0nTb4E9wKZw2yMcw9QK6W8bF5kEeZ6mEPWkOVR5ccblnb3IRXC7IkCZ4Ys2lii4P/1hVe15f1bQ
	G5r4l3PiSV+7Oe5H3HYVAgWNQHlSztRjr4gmAs3cKfSm98j/2dDOoite4gAdO87G9fHI=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168475-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168475: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=62fa37fe7b9df3c54a2d9d90aed9ff0e817ee0c6
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 08 Mar 2022 10:32:43 +0000

flight 168475 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168475/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 62fa37fe7b9df3c54a2d9d90aed9ff0e817ee0c6
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    7 days
Failing since        168258  2022-03-01 01:55:31 Z    7 days   77 attempts
Testing same since   168469  2022-03-07 23:11:34 Z    0 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 468 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 10:39:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 10:39:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286719.486340 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRXFo-00079P-AK; Tue, 08 Mar 2022 10:39:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286719.486340; Tue, 08 Mar 2022 10:39:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRXFo-00079I-6V; Tue, 08 Mar 2022 10:39:44 +0000
Received: by outflank-mailman (input) for mailman id 286719;
 Tue, 08 Mar 2022 10:39:43 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fWwI=TT=citrix.com=prvs=059ab6e88=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRXFn-00079C-73
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 10:39:43 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 0e8ec03f-9ecc-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 11:39:41 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0e8ec03f-9ecc-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646735980;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=7FNqC9YgdHBJSL47zKSLDnG/rEX0sORicm1feb5usp0=;
  b=UljzKr7W8MfVbdJGWf3RdG9BzDMNZcm3ujVJH/4EpJxCzxOfqQB3EbIp
   dhSX9lANobzOjFDTqAzIbJYEbWTX67dz0BaMi1LjKyqYTi4WcyNMFXLBT
   /aftb+uPe5ILYnTZ4m1SRvcv8fu3T9h6bsIe/QlbcRR/tzh65NDu7aWIG
   4=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65689087
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:V40ChqIb2tfHMl2lFE+RZJUlxSXFcZb7ZxGr2PjKsXjdYENShmFTz
 TMaCzqGM/fZNmDzetlwYN+y9EkDv5PSzdcyHgFlqX01Q3x08seUXt7xwmUcns+xwm8vaGo9s
 q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUYYoAQgsA148IMsdoUg7wbRh2dY42YHR7z6l4
 rseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3fMldG0DQUIhMdtNWc
 s6YpF2PEsE1yD92Yj+tuu6TnkTn2dc+NyDW4pZdc/DKbhSvOkXee0v0XRYRQR4/ttmHozx+4
 MlAj7aeeSAMAoPjkfxMekBJK2ZMA7ITrdcrIVDn2SCS50jPcn+qyPRyFkAme4Yf/46bA0kXq
 6ZecmpUKEne2aTmm9pXScE17ignBNPsM44F/Glp0BnSDOo8QICFSKLPjTNd9Glt2JAfRaaBD
 yYfQSVOXA2fcxcTAFc0DJskvc6aqj7gUiIN/Tp5ooJoujOOnWSdyoPFDt3RfdCbQNRPqWyRr
 GnG4mfRDwkTMZqUzj/t2mm3mubFkCf/WYQTPL617PhnhBuU3GN7IBcbT0ehqP+1zEu3QctCK
 lc88zAr66M18SSDTdTjXhv+vH+NuDYdXcZdF6sx7wTl4qjJ5UCfD2sNTD9EYfQnstM7QXoh0
 Vrht8ztLSxitvuSU3313qeZq3a+NDYYKUcGZDQYVk0V7t/7uoYxgxnTCNF5H8adjNLvHirr6
 yuXtyV4jLIW5eYJyqG68Fbvkz+q4J/TQWYd5A/aQ2ak5QNRf5O+asqj7l2z0BpbBN/HFB/b5
 iFCwpXAqrBVZX2QqMCTaPkAJpuH19GgDBPziEY+NsAwz3OfxWH2KOi8/wpCDEtuN88Ffxrgb
 0nSpR5d6fdvAZe6UUNkS9nvUpp3lMAMAfygD6mJNYQWPvCdYSfapHkGWKKG44z6fKHAe4kbM
 IzTT8ujBG1y5U9PnGvvHLd1PVPGK0kDKYLvqXLTkkzPPVm2Pif9pVI53L2mNLhRAESs+lm9z
 jqnH5HWoyizqcWnCsUtzaYdLEoRMV8wDo3spspce4are1Q6Rj9+W6KKmON8IOSJepi5cM+Sp
 RlRvWcClDLCaYDvc13WOhiPlpu1NXqAkZ7LFXN1Zgv5s5TSSY2u8L0eZ/MKkUoPr4ReIQpPZ
 6BdIa2oW60XIhyeomh1RcSt/eRKKUXw7SrTbnXNXdTKV8M5L+A/0oS/JVWHGehnJnffiPbSV
 JX8jlOLG8RSHV8+ZCsUAdr2p26MUbEmsLsad2PDI8VJeVWq945vKifrieQwLd1KIhLGrgZ2H
 S7PafvEjYEhe7MIzeQ=
IronPort-HdrOrdr: A9a23:z1auAquHiBP5bXCcZBTU1HLM7skC74Mji2hC6mlwRA09TyXGra
 +TdaUguSMc1gx9ZJhBo7G90KnpewK6yXdQ2/hqAV7EZniahILIFvAY0WKG+VPd8kLFh4xgPM
 tbAs1D4ZjLfCRHZKXBkXiF+rQbsaC6GcmT7I+0pRcdLj2CKZsQlzuRYjzrbHGeLzM2Y6bReq
 Dsgvau8FGbCAsqh4mAdzI4t6+pnay/qLvWJTo9QzI34giHij2lrJb8Dhijxx8bFxdC260r/2
 TpmxHwovzLiYD39jbsk0voq7hGktrozdVOQOSKl8guMz3pziKlfp5oVbGutC085Muv9FEput
 /RpApIBbU411rhOkWO5Tf90Qjp1zgjr1fk1F+jmHPm5ff0QTorYvAx875xQ1/80Q4Nrdt82K
 VE0yayrJxMFy7Nmyz7+pzhSwxqvlDcmwttrccjy1hkFacOYr5YqoISuGlPFo0bIS784Ic7VM
 FzEcDn4upMe1/yVQGXgoBW+q3tYp0PJGbEfqBb0fblkQS+3UoJg3fw/fZv30vpr/kGOtx5D+
 etCNUeqFgBdL5TUUtHPpZzfSKGMB28ffvyChPhHb3GLtBPB5ufke++3F0KjNvaDKDgiqFC36
 j8bA==
X-IronPort-AV: E=Sophos;i="5.90,164,1643691600"; 
   d="scan'208";a="65689087"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=aiR4YKSYdBlN2lSKEbhojvOZe9N1zkt8SiAGbNhmPH0XkzepGl3dR3v7ptZugeha5LqbESb2e65kWzucpklhUy1lQTP9lg809VWVnFYbXTO4AHGz4MHIj0w+hJAs5+2G5PrSk3wpQTPNYxWUvAz17wMnwqVNC+3wM4SzUf8NCppmk2FhRU+WTuKvuSkvMMw40JiOhNttoryCw/tQ7B78hYzPA2lQszjKCQiAS9OZcZ4IJkaLtDREo1l8go/6Yma9CS4DT4xF9T9HBfWmyWDUSgPC+/D6R9cnd+9Dkz8zK0LJoH4e6DXQxGfuNbm0OP5Ww92qb/2VQoWOLy74CwGF6g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=S+u/LQalv17r8oTRQP/N+TtOdRRNANO2jTiov4VmaSg=;
 b=FTWFBV49UwuBkzTQKIjD1SSxJPggEOAWZX7t97MzG82NlcR+2HiNizuQp3jBiEVCYbYhTtInrw9th8LNM4IEg7DxF0iovMW8Ac55c2No115GJoLmqJAF2PFiO6EQoFbYJNeufviUbUs7pGc5wstVTbRUz1SzjJUo6QMyGEqbazdRrBmXBw5FUgvGROFNcf/BBDtnD3Y3DfAOKcrhxqUrScByTV5ozYRLCVPYjkUeSTaKETS2lCt8sXaloW5p0TQ4dI309SxygwIg31Nqu2FxUzSnQ6aaRVzWRPvs8n4+0BllF3hceFQYmnhtFaJahHlnxo1EBHYqBsrm9wfGjWg7PQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=S+u/LQalv17r8oTRQP/N+TtOdRRNANO2jTiov4VmaSg=;
 b=MPKxei4KqZJ+aKTTyhIkMrYCwlKkCS2loshijX5WiB2Iz46cp1aaf/3S89gfPloJVwVTVQThVi8jHFIr/u9Ql0MLLy6pYr4I+ZCzR8vDv7lxdUWECXNIzhJQBAj7WmcIxYNzw1F0m74No8GSfzGSSs123TO9NslfMJSzQ4wsj1M=
Date: Tue, 8 Mar 2022 11:39:27 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jane Malalane <jane.malalane@citrix.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, Anthony
 PERARD <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, Andrew
 Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>, Julien Grall <julien@xen.org>, Stefano
 Stabellini <sstabellini@kernel.org>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>, Bertrand Marquis <bertrand.marquis@arm.com>,
	Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian <kevin.tian@intel.com>
Subject: Re: [PATCH v5 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Message-ID: <YicyXwIYIUdAI8ID@Air-de-Roger>
References: <20220307150609.10662-1-jane.malalane@citrix.com>
 <20220307150609.10662-2-jane.malalane@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <20220307150609.10662-2-jane.malalane@citrix.com>
X-ClientProxiedBy: LO4P123CA0013.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:150::18) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c327e4d8-9a44-42a5-77dc-08da00efee9a
X-MS-TrafficTypeDiagnostic: CY4PR03MB2837:EE_
X-LD-Processed: 335836de-42ef-43a2-b145-348c2ee9ca5b,ExtAddr
X-Microsoft-Antispam-PRVS: <CY4PR03MB2837C474384CACD9ED7321E88F099@CY4PR03MB2837.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(5660300002)(6862004)(8676002)(66476007)(66556008)(66946007)(2906002)(4326008)(30864003)(85182001)(8936002)(6636002)(316002)(7416002)(54906003)(38100700002)(186003)(86362001)(508600001)(6486002)(33716001)(82960400001)(6512007)(6666004)(9686003)(6506007)(26005)(83380400001)(21314003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?NEpDSWo5YkZLVGx4c080cGhpTmNjbXNvcGUwZGxyMHA1UDJ1bmhFZDJaSk1W?=
 =?utf-8?B?TndSalZlYmlvQmNIbUluaFpRc3Z4cTZnbHV0R1NUTFU4VmJySm9pUGoxZ1BE?=
 =?utf-8?B?UjU4alBXb2RXQkJuRGQ3ZXMrTUpjWnRHN2NUSjZWVEd6N0R6ZXJqdWg0amE5?=
 =?utf-8?B?cWFlcjJWYWN6bDZWbmVkQmtzaWhlODRBN2UyeVN0SXU3cDR5NVRNc1JheDZi?=
 =?utf-8?B?RUZCUzgwclJmWG9uRWNSdVVXOXFhYnloSjB1QnZTM2hxSGliZW5QeVVhbHZX?=
 =?utf-8?B?azlJWm9nWkxXRzFpaTBybStjYmFUMFI1aEZTQTd0RldlcElIVDY5elQrQzYw?=
 =?utf-8?B?YTVzck5EbEc5VEpSNW5SdDlzQyttM2prbFI0ZGF6T0Z6THBwL25oUnZETVpa?=
 =?utf-8?B?ZHZGWUFWeGhLRU9NZit5VTZYTUV3SGZaa0tTdXh0OVg4NWZQNEUrT1hoenQ2?=
 =?utf-8?B?bG82SFU0L2hsVmNDT0srUDhrM2dlS0tHNHdqL0RpbXNKRFNaZ1VRQzVDU0xQ?=
 =?utf-8?B?QlVNUkREYzNtaU9UWXcrSVM5MWxEWDRKQ2NxZCt6UkwwYTJqL2tPS0FFdm9N?=
 =?utf-8?B?by9TU01OOW5iVENmdVdzbkIxajlXMUMzK2FtU2VEaWpMd05ZVk0xanprUHB4?=
 =?utf-8?B?cFp4VFh3OWdwMGk4SFkweFdBeFNMcGo2Rm5QREF6WWJMYzhPbDlydVJsaExv?=
 =?utf-8?B?QXVkRTNHcFFxL2lVYjFqMkdGNGtGQnlXUVpPemxDOGR4alh3MzJNTFZ5Rm5w?=
 =?utf-8?B?L3dQelFJMllyTmxlTTlOWGlLRW9HZmtRV2pkTzBXR1FIQWd3QXdKNi9jbzRD?=
 =?utf-8?B?NFQ3dDA0WVFJYmxMNjc0RjA1WTBSV2NXQUxIZWQ3OWt1dlNwSWw0M0c3UE1R?=
 =?utf-8?B?WnhwTUZGc3JNUklXQjk2S3dEY2YxRWgyRzlNbFBYVlQ4ajlRNXd6dHY1KzRD?=
 =?utf-8?B?bE03cEhIR291bW05dTkxRi9rUmcrQlpvMlp5a1RLY2dEMEJMRTZQSHYxdFUv?=
 =?utf-8?B?NDFWR2NZOHNNSm9uZUhiYmorbWJ6UzFSR1VGV1Zsa0diYld4c0ZvYS91dTlV?=
 =?utf-8?B?L0J3QnN5Uk45WlloZHF3YzUxZ0ljKzY0TS9LTThnOUVyMDRNRnZTY05oZlVW?=
 =?utf-8?B?bllnSzJOZFJPTjZLZ2VkdDlOUWFMMnRDdEFsSnl4b1NrQmJxME5FaWgwaTNS?=
 =?utf-8?B?WGZGUjM2TGZRMEVuVmU0eEQ3V1dEYmsxcFVHdDhmQTFmNXdCUXR5bXpLbHZE?=
 =?utf-8?B?WjlEckR6dm9OUmYxNE51TkhaUWFLM01oYmVLSWVPMU1kN2ROOEZBSlk1c0pR?=
 =?utf-8?B?akRTamVLQUtKSzgra3gzcnJUN1VoeDVVemNPMmZIZlozdnBQU05CdVRaMGlF?=
 =?utf-8?B?dlNib3FYckJDdVd4L1hVS1JORTZwUlUrRnhEZm5YYXY5cVdFTkE4N1Jua0oz?=
 =?utf-8?B?cVo0Y1dqbnJpM21OdFVqOFM2WTgwdGVrZkh5SUhsQyt2NWNaYmp2alUydFBj?=
 =?utf-8?B?cHF1cXBHdXBHdHpEOEdmQkdjYmRmeDVCY2V1cG1DMGVlZksranVkNXFuTCt4?=
 =?utf-8?B?UWt2MWJ3a01uUUEwM3BlL1BJT0JuK3g4cmV5b0NOS0J2aVIzMnlBTDc0ODY1?=
 =?utf-8?B?dVdlOUlWWlh2dG56Q0NyMXBBeHN2dkFiR2V3YlRFdXd6ZlZoNWJKY1JhR3Vp?=
 =?utf-8?B?ejRmTW1zRi9TSEdtNXoxdkxXUUoyRlR5aVdGLzdCNmEyODRPWmR2bHdwS0Zk?=
 =?utf-8?B?Y0RyUE5pS2FMQjdKM293V0NYN3NLRUJ4bGRrTndKZzU4UU8rU2ZMSWRISTM3?=
 =?utf-8?B?S2NTZ3R4ZTVnMmhselIvWkpQaWpMem1MdU4wQzJNd2FBMjNKSnF6R1NzcTFh?=
 =?utf-8?B?TzB4RG9UTzMveXRqZU9hNUVkQ3dSYlMvdllUYzVwT3RjazhnUkU2K0ZxSjU5?=
 =?utf-8?B?Vlhvd09EcTdVSTBXcTZtSTdZOXErNTB4cCtQd1pEN3JsTExIaEY4SUNEeWFY?=
 =?utf-8?B?RnltU05SSS84RnA1R2hYVjd3SWxYWjRFRW9ENDR6Z05JRU96QjUxQmp2bEdi?=
 =?utf-8?B?c2lJdWVkRUZhMWdWcnlTWmNleDhJY1h2Y0NvdURRRkNWdFVDOFhNUjkwVGs2?=
 =?utf-8?B?TlJ6N1NxbzQ0WGhkMnMwNHU2VGl0dEZreEg4NjhrNXFyVVRsMTZoelRsQzIx?=
 =?utf-8?Q?lhe1HSjZqINWqc1lAPs3ncY=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: c327e4d8-9a44-42a5-77dc-08da00efee9a
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 10:39:32.8193
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: gOqbN0dULcA3OCOM99tIF+YFvlNbtFyrOmvilL84I397+4wNUNm9WZ3om/qFCQ5RbBIGw2QwWUKGfcC19gx4ZA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR03MB2837
X-OriginatorOrg: citrix.com

On Mon, Mar 07, 2022 at 03:06:08PM +0000, Jane Malalane wrote:
> Add XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_xapic and
> XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_x2apic to report accelerated xapic
> and x2apic, on x86 hardware.

I think the commit message has gone out of sync with the code, those
should now be XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X{2,}APIC

> No such features are currently implemented on AMD hardware.
> 
> HW assisted xAPIC virtualization will be reported if HW, at the
> minimum, supports virtualize_apic_accesses as this feature alone means
> that an access to the APIC page will cause an APIC-access VM exit. An
> APIC-access VM exit provides a VMM with information about the access
> causing the VM exit, unlike a regular EPT fault, thus simplifying some
> internal handling.
> 
> HW assisted x2APIC virtualization will be reported if HW supports
> virtualize_x2apic_mode and, at least, either apic_reg_virt or
> virtual_intr_delivery. This is due to apic_reg_virt and
> virtual_intr_delivery preventing a VM exit from occuring or at least
> replacing a regular EPT fault VM-exit with an APIC-access VM-exit on

For x2APIC there's no EPT fault, because x2APIC accesses are in the
MSR space. I think you can omit this whole sentence and just mention
that this now follows the conditionals in vmx_vlapic_msr_changed.

> read and write APIC accesses, respectively. This also means that
> sysctl follows the conditionals in vmx_vlapic_msr_changed().
> 
> For that purpose, also add an arch-specific "capabilities" parameter
> to struct xen_sysctl_physinfo.
> 
> Note that this interface is intended to be compatible with AMD so that
> AVIC support can be introduced in a future patch. Unlike Intel that
> has multiple controls for APIC Virtualization, AMD has one global
> 'AVIC Enable' control bit, so fine-graining of APIC virtualization
> control cannot be done on a common interface.
> 
> Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
> Signed-off-by: Jane Malalane <jane.malalane@citrix.com>
> ---
> CC: Wei Liu <wl@xen.org>
> CC: Anthony PERARD <anthony.perard@citrix.com>
> CC: Juergen Gross <jgross@suse.com>
> CC: Andrew Cooper <andrew.cooper3@citrix.com>
> CC: George Dunlap <george.dunlap@citrix.com>
> CC: Jan Beulich <jbeulich@suse.com>
> CC: Julien Grall <julien@xen.org>
> CC: Stefano Stabellini <sstabellini@kernel.org>
> CC: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
> CC: Bertrand Marquis <bertrand.marquis@arm.com>
> CC: Jun Nakajima <jun.nakajima@intel.com>
> CC: Kevin Tian <kevin.tian@intel.com>
> CC: "Roger Pau Monné" <roger.pau@citrix.com>
> 
> v5:
> * Have assisted_xapic_available solely depend on
>   cpu_has_vmx_virtualize_apic_accesses and assisted_x2apic_available
>   depend on cpu_has_vmx_virtualize_x2apic_mode and
>   cpu_has_vmx_apic_reg_virt OR cpu_has_vmx_virtual_intr_delivery.
> 
> v4:
>  * Fallback to the original v2/v1 conditions for setting
>    assisted_xapic_available and assisted_x2apic_available so that in
>    the future APIC virtualization can be exposed on AMD hardware
>    since fine-graining of "AVIC" is not supported, i.e., AMD solely
>    uses "AVIC Enable". This also means that sysctl mimics what's
>    exposed in CPUID.
> 
> v3:
>  * Define XEN_SYSCTL_PHYSCAP_ARCH_MAX for ABI checking and actually
>    set "arch_capbilities", via a call to c_bitmap_to_ocaml_list()
>  * Have assisted_x2apic_available only depend on
>    cpu_has_vmx_virtualize_x2apic_mode
> 
> v2:
>  * Use one macro LIBXL_HAVE_PHYSINFO_ASSISTED_APIC instead of two
>  * Pass xcpyshinfo as a pointer in libxl__arch_get_physinfo
>  * Set assisted_x{2}apic_available to be conditional upon "bsp" and
>    annotate it with __ro_after_init
>  * Change XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_X{2}APIC to
>    _X86_ASSISTED_X{2}APIC
>  * Keep XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X{2}APIC contained within
>    sysctl.h
>  * Fix padding introduced in struct xen_sysctl_physinfo and bump
>    XEN_SYSCTL_INTERFACE_VERSION
> ---
>  tools/golang/xenlight/helpers.gen.go |  4 ++++
>  tools/golang/xenlight/types.gen.go   |  2 ++
>  tools/include/libxl.h                |  7 +++++++
>  tools/libs/light/libxl.c             |  3 +++
>  tools/libs/light/libxl_arch.h        |  4 ++++
>  tools/libs/light/libxl_arm.c         |  5 +++++
>  tools/libs/light/libxl_types.idl     |  2 ++
>  tools/libs/light/libxl_x86.c         | 11 +++++++++++
>  tools/ocaml/libs/xc/xenctrl.ml       |  5 +++++
>  tools/ocaml/libs/xc/xenctrl.mli      |  5 +++++
>  tools/ocaml/libs/xc/xenctrl_stubs.c  | 14 +++++++++++---
>  tools/xl/xl_info.c                   |  6 ++++--
>  xen/arch/x86/hvm/vmx/vmcs.c          |  9 +++++++++
>  xen/arch/x86/include/asm/domain.h    |  3 +++
>  xen/arch/x86/sysctl.c                |  7 +++++++
>  xen/include/public/sysctl.h          | 11 ++++++++++-
>  16 files changed, 92 insertions(+), 6 deletions(-)
> 
> diff --git a/tools/golang/xenlight/helpers.gen.go b/tools/golang/xenlight/helpers.gen.go
> index b746ff1081..dd4e6c9f14 100644
> --- a/tools/golang/xenlight/helpers.gen.go
> +++ b/tools/golang/xenlight/helpers.gen.go
> @@ -3373,6 +3373,8 @@ x.CapVmtrace = bool(xc.cap_vmtrace)
>  x.CapVpmu = bool(xc.cap_vpmu)
>  x.CapGnttabV1 = bool(xc.cap_gnttab_v1)
>  x.CapGnttabV2 = bool(xc.cap_gnttab_v2)
> +x.CapAssistedXapic = bool(xc.cap_assisted_xapic)
> +x.CapAssistedX2Apic = bool(xc.cap_assisted_x2apic)
>  
>   return nil}
>  
> @@ -3407,6 +3409,8 @@ xc.cap_vmtrace = C.bool(x.CapVmtrace)
>  xc.cap_vpmu = C.bool(x.CapVpmu)
>  xc.cap_gnttab_v1 = C.bool(x.CapGnttabV1)
>  xc.cap_gnttab_v2 = C.bool(x.CapGnttabV2)
> +xc.cap_assisted_xapic = C.bool(x.CapAssistedXapic)
> +xc.cap_assisted_x2apic = C.bool(x.CapAssistedX2Apic)
>  
>   return nil
>   }
> diff --git a/tools/golang/xenlight/types.gen.go b/tools/golang/xenlight/types.gen.go
> index b1e84d5258..87be46c745 100644
> --- a/tools/golang/xenlight/types.gen.go
> +++ b/tools/golang/xenlight/types.gen.go
> @@ -1014,6 +1014,8 @@ CapVmtrace bool
>  CapVpmu bool
>  CapGnttabV1 bool
>  CapGnttabV2 bool
> +CapAssistedXapic bool
> +CapAssistedX2Apic bool
>  }
>  
>  type Connectorinfo struct {
> diff --git a/tools/include/libxl.h b/tools/include/libxl.h
> index 51a9b6cfac..94e6355822 100644
> --- a/tools/include/libxl.h
> +++ b/tools/include/libxl.h
> @@ -528,6 +528,13 @@
>  #define LIBXL_HAVE_MAX_GRANT_VERSION 1
>  
>  /*
> + * LIBXL_HAVE_PHYSINFO_ASSISTED_APIC indicates that libxl_physinfo has
> + * cap_assisted_xapic and cap_assisted_x2apic fields, which indicates
> + * the availability of x{2}APIC hardware assisted virtualization.
> + */
> +#define LIBXL_HAVE_PHYSINFO_ASSISTED_APIC 1
> +
> +/*
>   * libxl ABI compatibility
>   *
>   * The only guarantee which libxl makes regarding ABI compatibility
> diff --git a/tools/libs/light/libxl.c b/tools/libs/light/libxl.c
> index a0bf7d186f..6d699951e2 100644
> --- a/tools/libs/light/libxl.c
> +++ b/tools/libs/light/libxl.c
> @@ -15,6 +15,7 @@
>  #include "libxl_osdeps.h"
>  
>  #include "libxl_internal.h"
> +#include "libxl_arch.h"
>  
>  int libxl_ctx_alloc(libxl_ctx **pctx, int version,
>                      unsigned flags, xentoollog_logger * lg)
> @@ -410,6 +411,8 @@ int libxl_get_physinfo(libxl_ctx *ctx, libxl_physinfo *physinfo)
>      physinfo->cap_gnttab_v2 =
>          !!(xcphysinfo.capabilities & XEN_SYSCTL_PHYSCAP_gnttab_v2);
>  
> +    libxl__arch_get_physinfo(physinfo, &xcphysinfo);
> +
>      GC_FREE;
>      return 0;
>  }
> diff --git a/tools/libs/light/libxl_arch.h b/tools/libs/light/libxl_arch.h
> index 1522ecb97f..207ceac6a1 100644
> --- a/tools/libs/light/libxl_arch.h
> +++ b/tools/libs/light/libxl_arch.h
> @@ -86,6 +86,10 @@ int libxl__arch_extra_memory(libxl__gc *gc,
>                               uint64_t *out);
>  
>  _hidden
> +void libxl__arch_get_physinfo(libxl_physinfo *physinfo,
> +                              const xc_physinfo_t *xcphysinfo);
> +
> +_hidden
>  void libxl__arch_update_domain_config(libxl__gc *gc,
>                                        libxl_domain_config *dst,
>                                        const libxl_domain_config *src);
> diff --git a/tools/libs/light/libxl_arm.c b/tools/libs/light/libxl_arm.c
> index eef1de0939..39fdca1b49 100644
> --- a/tools/libs/light/libxl_arm.c
> +++ b/tools/libs/light/libxl_arm.c
> @@ -1431,6 +1431,11 @@ int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
>      return rc;
>  }
>  
> +void libxl__arch_get_physinfo(libxl_physinfo *physinfo,
> +                              const xc_physinfo_t *xcphysinfo)
> +{
> +}
> +
>  void libxl__arch_update_domain_config(libxl__gc *gc,
>                                        libxl_domain_config *dst,
>                                        const libxl_domain_config *src)
> diff --git a/tools/libs/light/libxl_types.idl b/tools/libs/light/libxl_types.idl
> index 2a42da2f7d..42ac6c357b 100644
> --- a/tools/libs/light/libxl_types.idl
> +++ b/tools/libs/light/libxl_types.idl
> @@ -1068,6 +1068,8 @@ libxl_physinfo = Struct("physinfo", [
>      ("cap_vpmu", bool),
>      ("cap_gnttab_v1", bool),
>      ("cap_gnttab_v2", bool),
> +    ("cap_assisted_xapic", bool),
> +    ("cap_assisted_x2apic", bool),
>      ], dir=DIR_OUT)
>  
>  libxl_connectorinfo = Struct("connectorinfo", [
> diff --git a/tools/libs/light/libxl_x86.c b/tools/libs/light/libxl_x86.c
> index 1feadebb18..e0a06ecfe3 100644
> --- a/tools/libs/light/libxl_x86.c
> +++ b/tools/libs/light/libxl_x86.c
> @@ -866,6 +866,17 @@ int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
>      return rc;
>  }
>  
> +void libxl__arch_get_physinfo(libxl_physinfo *physinfo,
> +                              const xc_physinfo_t *xcphysinfo)
> +{
> +    physinfo->cap_assisted_xapic =
> +        !!(xcphysinfo->arch_capabilities &
> +           XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC);
> +    physinfo->cap_assisted_x2apic =
> +        !!(xcphysinfo->arch_capabilities &
> +           XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC);
> +}
> +
>  void libxl__arch_update_domain_config(libxl__gc *gc,
>                                        libxl_domain_config *dst,
>                                        const libxl_domain_config *src)
> diff --git a/tools/ocaml/libs/xc/xenctrl.ml b/tools/ocaml/libs/xc/xenctrl.ml
> index 7503031d8f..21783d3622 100644
> --- a/tools/ocaml/libs/xc/xenctrl.ml
> +++ b/tools/ocaml/libs/xc/xenctrl.ml
> @@ -127,6 +127,10 @@ type physinfo_cap_flag =
>  	| CAP_Gnttab_v1
>  	| CAP_Gnttab_v2
>  
> +type physinfo_arch_cap_flag =
> +	| CAP_X86_ASSISTED_XAPIC
> +	| CAP_X86_ASSISTED_X2APIC
> +
>  type physinfo =
>  {
>  	threads_per_core : int;
> @@ -139,6 +143,7 @@ type physinfo =
>  	scrub_pages      : nativeint;
>  	(* XXX hw_cap *)
>  	capabilities     : physinfo_cap_flag list;
> +	arch_capabilities : physinfo_arch_cap_flag list;
>  	max_nr_cpus      : int;
>  }
>  
> diff --git a/tools/ocaml/libs/xc/xenctrl.mli b/tools/ocaml/libs/xc/xenctrl.mli
> index d1d9c9247a..af6ba3d1a0 100644
> --- a/tools/ocaml/libs/xc/xenctrl.mli
> +++ b/tools/ocaml/libs/xc/xenctrl.mli
> @@ -112,6 +112,10 @@ type physinfo_cap_flag =
>    | CAP_Gnttab_v1
>    | CAP_Gnttab_v2
>  
> +type physinfo_arch_cap_flag =
> +  | CAP_X86_ASSISTED_XAPIC
> +  | CAP_X86_ASSISTED_X2APIC
> +
>  type physinfo = {
>    threads_per_core : int;
>    cores_per_socket : int;
> @@ -122,6 +126,7 @@ type physinfo = {
>    free_pages       : nativeint;
>    scrub_pages      : nativeint;
>    capabilities     : physinfo_cap_flag list;
> +  arch_capabilities : physinfo_arch_cap_flag list;
>    max_nr_cpus      : int; (** compile-time max possible number of nr_cpus *)
>  }
>  type version = { major : int; minor : int; extra : string; }
> diff --git a/tools/ocaml/libs/xc/xenctrl_stubs.c b/tools/ocaml/libs/xc/xenctrl_stubs.c
> index 5b4fe72c8d..e0d49b18d2 100644
> --- a/tools/ocaml/libs/xc/xenctrl_stubs.c
> +++ b/tools/ocaml/libs/xc/xenctrl_stubs.c
> @@ -712,7 +712,7 @@ CAMLprim value stub_xc_send_debug_keys(value xch, value keys)
>  CAMLprim value stub_xc_physinfo(value xch)
>  {
>  	CAMLparam1(xch);
> -	CAMLlocal2(physinfo, cap_list);
> +	CAMLlocal3(physinfo, cap_list, arch_cap_list);
>  	xc_physinfo_t c_physinfo;
>  	int r;
>  
> @@ -730,8 +730,15 @@ CAMLprim value stub_xc_physinfo(value xch)
>  		/* ! physinfo_cap_flag CAP_ lc */
>  		/* ! XEN_SYSCTL_PHYSCAP_ XEN_SYSCTL_PHYSCAP_MAX max */
>  		(c_physinfo.capabilities);
> +	/*
> +	 * arch_capabilities: physinfo_arch_cap_flag list;
> +	 */
> +	arch_cap_list = c_bitmap_to_ocaml_list
> +		/* ! physinfo_arch_cap_flag CAP_ none */
> +		/* ! XEN_SYSCTL_PHYSCAP_ XEN_SYSCTL_PHYSCAP_X86_MAX max */
> +		(c_physinfo.arch_capabilities);

Note the above is likely to need adjusting if Arm (or other arches)
start using arch_capabilities. Could we make this conditional to
CONFIG_X86 being enabled?

>  
> -	physinfo = caml_alloc_tuple(10);
> +	physinfo = caml_alloc_tuple(11);
>  	Store_field(physinfo, 0, Val_int(c_physinfo.threads_per_core));
>  	Store_field(physinfo, 1, Val_int(c_physinfo.cores_per_socket));
>  	Store_field(physinfo, 2, Val_int(c_physinfo.nr_cpus));
> @@ -741,7 +748,8 @@ CAMLprim value stub_xc_physinfo(value xch)
>  	Store_field(physinfo, 6, caml_copy_nativeint(c_physinfo.free_pages));
>  	Store_field(physinfo, 7, caml_copy_nativeint(c_physinfo.scrub_pages));
>  	Store_field(physinfo, 8, cap_list);
> -	Store_field(physinfo, 9, Val_int(c_physinfo.max_cpu_id + 1));
> +	Store_field(physinfo, 9, arch_cap_list);
> +	Store_field(physinfo, 10, Val_int(c_physinfo.max_cpu_id + 1));
>  
>  	CAMLreturn(physinfo);
>  }
> diff --git a/tools/xl/xl_info.c b/tools/xl/xl_info.c
> index 712b7638b0..3205270754 100644
> --- a/tools/xl/xl_info.c
> +++ b/tools/xl/xl_info.c
> @@ -210,7 +210,7 @@ static void output_physinfo(void)
>           info.hw_cap[4], info.hw_cap[5], info.hw_cap[6], info.hw_cap[7]
>          );
>  
> -    maybe_printf("virt_caps              :%s%s%s%s%s%s%s%s%s%s%s\n",
> +    maybe_printf("virt_caps              :%s%s%s%s%s%s%s%s%s%s%s%s%s\n",
>           info.cap_pv ? " pv" : "",
>           info.cap_hvm ? " hvm" : "",
>           info.cap_hvm && info.cap_hvm_directio ? " hvm_directio" : "",
> @@ -221,7 +221,9 @@ static void output_physinfo(void)
>           info.cap_vmtrace ? " vmtrace" : "",
>           info.cap_vpmu ? " vpmu" : "",
>           info.cap_gnttab_v1 ? " gnttab-v1" : "",
> -         info.cap_gnttab_v2 ? " gnttab-v2" : ""
> +         info.cap_gnttab_v2 ? " gnttab-v2" : "",
> +         info.cap_assisted_xapic ? " assisted_xapic" : "",
> +         info.cap_assisted_x2apic ? " assisted_x2apic" : ""
>          );
>  
>      vinfo = libxl_get_version_info(ctx);
> diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
> index e1e1fa14e6..06831099ed 100644
> --- a/xen/arch/x86/hvm/vmx/vmcs.c
> +++ b/xen/arch/x86/hvm/vmx/vmcs.c
> @@ -343,6 +343,15 @@ static int vmx_init_vmcs_config(bool bsp)
>              MSR_IA32_VMX_PROCBASED_CTLS2, &mismatch);
>      }
>  
> +    /* Check whether hardware supports accelerated xapic and x2apic. */
> +    if ( bsp )
> +    {
> +        assisted_xapic_available = cpu_has_vmx_virtualize_apic_accesses;
> +        assisted_x2apic_available = (cpu_has_vmx_virtualize_x2apic_mode &&
> +                                     (cpu_has_vmx_apic_reg_virt ||
> +                                      cpu_has_vmx_virtual_intr_delivery));

There's no need for the outer parentheses.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 10:46:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 10:46:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286727.486350 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRXMM-0000Ne-5j; Tue, 08 Mar 2022 10:46:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286727.486350; Tue, 08 Mar 2022 10:46:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRXMM-0000NX-2j; Tue, 08 Mar 2022 10:46:30 +0000
Received: by outflank-mailman (input) for mailman id 286727;
 Tue, 08 Mar 2022 10:46:28 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRXMK-0000NR-F8
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 10:46:28 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 00f2fa75-9ecd-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 11:46:26 +0100 (CET)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur02lp2050.outbound.protection.outlook.com [104.47.5.50]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-4-1wgleEBHPvO1rW_-4MeDSg-1; Tue, 08 Mar 2022 11:46:25 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR04MB7101.eurprd04.prod.outlook.com (2603:10a6:800:12e::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Tue, 8 Mar
 2022 10:46:22 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 10:46:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 00f2fa75-9ecd-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646736386;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=WVuaexOvv5GeMIS+/8zCvCLyk6peMWkMfIPEUPZO7SA=;
	b=cC/LtocTkXqOnnZej+BLLy14BC36D2COBEsDbgniJkVFaN9kuXit7HHP17YhOi4NfwmelX
	A+RiU7KifM2TQSSWkqZ9hKS47jLZa6EZRYNbQj1UrNx7kw5zAfKsZB5wn30EbN4sUHZ525
	JkdQIhcFqErXuoBRT4AkL0tc0uswqZg=
X-MC-Unique: 1wgleEBHPvO1rW_-4MeDSg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=F5FxWul2jJEoUBwP9Mbvr+iKLkX4zAIM1G7Ay8pdFVMl3xM17BlnPEFqRYSn/32fWN9/+ymtwYP8um3VH854QO+4MECibVhUGUahcKg++H0hLGD2n8nsq4zvbp+CWF32TvaQiU2s1BgWe0UPgDYoOpMjbvqD5YkVpSxS61AYHTQ9B03AdUySGS73jX/96JznUJ77roVc9Ae2uF7rDxS0sBtbM9of4SEbHp9sKkNgtAjYJ0dhepCBXKFelXNaN2mOxRqXhkNdt+WUWTsNfCCFQZfQYN4JRdzh9jFN2aQgkYLoQbTvzSazR34Il5mQoHGGmhDRfGy6vBhc9pHgFmRm+w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=evRIC5qTSl1HD3cmRzPh9aztqVRrw9cv5kUjLlqScTg=;
 b=Ly2GyA1C+j5d6MZRzlj9cj0RO6yXn1Fa6LtAXl8HjJ46+oCR9M3Hltd9WPwuRJdpO2BC6cZgNeGYNMoFvq7KTjcnqbZSYIxPe67Wtk1d72z47I2yp2CT00zp5le2MWgQp+dlBeUFzxaI+Ywcw9YMoX1Ncfm/9m36BVfF+u1YOl1TSCedGB27fioZHy0i3CPPUFiIUSp35k2FCrQb7G0BAF6TRtBQu8g+IWI87/mHqyDBhEHb2r7QLaadlahQccs665o+G5aFGWWwKvxdnBbOFe0REG9m/84jOrpPvApycCbaZxzWuO9eyyyrVs7Lpu/G+3YesdzzTgPMaqM7VLIeUQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <b24007d2-1b2c-8358-e72b-2be49e62f065@suse.com>
Date: Tue, 8 Mar 2022 11:46:20 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v4] vpci/msix: fix PBA accesses
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: Alex Olson <this.is.a0lson@gmail.com>, xen-devel@lists.xenproject.org
References: <20220307163744.74030-1-roger.pau@citrix.com>
 <fbc1388e-8211-f498-b134-4df5b1ccd003@suse.com>
 <YiccSMWbV2StPFB1@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YiccSMWbV2StPFB1@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6P192CA0095.EURP192.PROD.OUTLOOK.COM
 (2603:10a6:209:8d::36) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 8df1517e-31c9-4cf5-3494-08da00f0e2cc
X-MS-TrafficTypeDiagnostic: VI1PR04MB7101:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB710176F261A7B8667855F39BB3099@VI1PR04MB7101.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	fEYuEkM/LRBZFnD3wKfUmFEs3U5d07JmHNZcGTb/+ffWK+hi6gOLHCisu+81mpxzEpflL4NEjmwflr4iHl4dGQReWGpXXTH/ZvjvpOF12GiqT/IrcYtfjcY1Gvcsyyr1gJaNM+Tzig/FGL/D9FCXHyq8qvGYZo7mqfouHohJF8r01yZDhEGF/TjpUOwfrgxA2Hio9RwcKOXcc8xV/JgXrUQBhqWwSNV7y+4kxyuh60K/JoMu6iDF0j5FYLO5TYOlWLQ9KQWOngDBHL4fT7W5W8j1wcaOwfVrRxXTEj6KK+z6CwVdMYMTR5nphHxePRpyybhmj9GRhdXjCHkaJ0/18NOkzDczx5HhhuZZJ+elFnL50WEkVdHjiqoAAguhfMkgggOuLuUoPGuEcMo3PCW/wzK4LoibjdnFjOQHK+/5WfU8HmQuGLgpNgX6Zah8NC+tRHeKSC82IkPY7fxaNEcPaM6HgIxZfZLYXtZfWtlZAZZgzXNZw/1hMGqLWVRV9AvSAH2cpWXnCdQfxXDYqI+CEG5drQAwQsGghfTR6FbhW2F2HvcKt1Tk+xBclh3IhSyOT1kNlaxsKcY+L6t8b7eLIW2Wf4goykjJvEb+3pfyYj1n5mZjQuJd70RQU73+HpQP6kEw6ywYY9Avq4aFjoNEtU7OSjCoGmuIxyuyZCqBhRz0+5V9efnc2bk7fBXu4ogJJ2XsDq9vq5mLkGaknNbvZAGfjesyUbUc+scnulu4cnI=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(36756003)(83380400001)(86362001)(4326008)(5660300002)(31686004)(66946007)(2906002)(8936002)(8676002)(66476007)(66556008)(508600001)(6916009)(316002)(2616005)(31696002)(6486002)(186003)(26005)(38100700002)(53546011)(6512007)(6506007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?InTKmdHvA1wW2BnEZUI4cCtcT42VUFUF6jKJhTvRe/21kB27R4LElh631gSz?=
 =?us-ascii?Q?cKBBoCdItGhlvcHdzyzhOqyk0WCnmPox1g9verWgkvSK/ugSdkQCC0YQmEis?=
 =?us-ascii?Q?guqBiT7oGhNlvehInqcncvC3+hEASo0Sy34/7HA2YWPVut3CCw6f9UF3Z7g5?=
 =?us-ascii?Q?gnO4vbkZO5Ok34bwmvyO9GJ7RApXA0BOESYDVAE/r9xk2VwlzojgnJY3r9yF?=
 =?us-ascii?Q?uDhilp++B9t9zqCYj7LkHtNsFX0FU+rWW3pAk+wAoHO6Bi51h/Jej4IYfi8X?=
 =?us-ascii?Q?pnpMotMhds789zIiA4nPazwxPMVWimF81WIu+chKGFWkOMsviFGtH4cAWrk9?=
 =?us-ascii?Q?1DpSw/b6o00J/3v70icvh7h0XOVxaBPR1TgNccuQN1UaJiph1MDqMXuaZQAq?=
 =?us-ascii?Q?9vyqZZLcyPvTB59dwr9eS3a7uZptWzY2+JTvfZq8JgFLum1tFWyqzkXUV6pW?=
 =?us-ascii?Q?h5rk2ZGnXIjR428Vo/sWy5OaTuO/DR0edt/j+xXqX5xL2pvH+9OlaMsvtgtV?=
 =?us-ascii?Q?Q24KfYVAuc1MtPBTjby+v4FQvy1UpwyvcnXpLhyky2O1/kS+NCVC1t9kfdky?=
 =?us-ascii?Q?xqyhs21R4t1U2CQWe7X8auQ1I2MnX3p+AiHjSsm37iGNquUn3v5Stw4xji8c?=
 =?us-ascii?Q?VEpX61DKBSjOAz86kd/t+tTS+FO8rmfB3mLwDlXP3z0PWSiWNwQtaYHI+bVd?=
 =?us-ascii?Q?AV7I22dIKWdKKyU/gVC0lRCEAGXVsBuQ+svg3+smmDHYQD3Q37ssjIHhzQ1g?=
 =?us-ascii?Q?eBtddDG3uvYnw1pap0uKaQAjmoPXpeokvCix/Nxxzmj8jC+iL0ujS1RvqExF?=
 =?us-ascii?Q?9Tj7tausmmyUAf/8q9nFa7QvodFDqBtkTeujWszqBp2MJeIOwnFlJgClWYLb?=
 =?us-ascii?Q?lPk3RfNLYdGtdOkOHKLq4QYdZbnNQ721xtOl/cgennlBxjYU0YzONpo4cvd3?=
 =?us-ascii?Q?rQS4MxBPEjHU+ejQxQJwiH+ucNzxGeokmGKszAZU2qwjDsXJcoBmydErKgI9?=
 =?us-ascii?Q?U3+chD0ahPyGrBVn6zdMrfj3BipQdn1XK7ceqOKdKdtDUG3T48yjBT+4jDHi?=
 =?us-ascii?Q?5GeHbM1IufIVpZx4FVx/1bOGsIkTQdsOXKnvbUcH5Pf4gZvvVtNJulcui0eO?=
 =?us-ascii?Q?UqS5QuIvBv9np671OWeDZ2U7lXkcqP+PZt0r5O6aIoJFAvY4BbJiXukiOApS?=
 =?us-ascii?Q?dxmrw8sEFyd2ua1HvxkDJg9B+jWovh0b74HqLUimBOJQJKwElhC0uy6gCBTN?=
 =?us-ascii?Q?FJ0tjyjLn0l1Gs5y6Z05x9W+RYIjSrcZ5ysxlhOo39HPan2D0pUwbq7XDFTu?=
 =?us-ascii?Q?saBJG/6EtUFxM9OtcX1OXqSivGTYSCuKEuhhMIUDMRxMSpVWrfrJSw4/E3c9?=
 =?us-ascii?Q?OILyeu9N0fmVZf/CeOYXRn0xkkGosWCb1/p5IyGYyP4SZa1OA1aDFLTIZ4MM?=
 =?us-ascii?Q?Nu3+EWXv42EBbnBdCJtOmzluhGocZR0OMETIiWm17TVwgWY/IQ1WnWkCsh4W?=
 =?us-ascii?Q?DLb4fsrOrPy2Pm/58r/bGcBPDu+8Xm6nmK6EtU969d+vXHRd1xiIAvRYwKei?=
 =?us-ascii?Q?KA/Hs9ZkjQX2LWCefuuDMC3skuguz4er5V0iG079pjkhjDk0kdhITpwb6wDa?=
 =?us-ascii?Q?bwl6yqM923/5jCEgpVWtX+c=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8df1517e-31c9-4cf5-3494-08da00f0e2cc
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 10:46:22.6031
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: n+LFYMTwuYMoy7rQu09F1jF7XioJxc3vdkGISlHmUTU1gJMp+0ibiTS4EI5lj6fMx+In7XQJflylIKzHm4G8+w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB7101

On 08.03.2022 10:05, Roger Pau Monn=C3=A9 wrote:
> On Tue, Mar 08, 2022 at 09:31:34AM +0100, Jan Beulich wrote:
>> On 07.03.2022 17:37, Roger Pau Monne wrote:
>>> Map the PBA in order to access it from the MSI-X read and write
>>> handlers. Note that previously the handlers would pass the physical
>>> host address into the {read,write}{l,q} handlers, which is wrong as
>>> those expect a linear address.
>>>
>>> Map the PBA using ioremap when the first access is performed. Note
>>> that 32bit arches might want to abstract the call to ioremap into a
>>> vPCI arch handler, so they can use a fixmap range to map the PBA.
>>>
>>> Reported-by: Jan Beulich <jbeulich@suse.com>
>>> Signed-off-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>
>>
>> Reviewed-by: Jan Beulich <jbeulich@suse.com>
>>
>>> Cc: Alex Olson <this.is.a0lson@gmail.com>
>>
>> I'll wait a little with committing, in the hope for Alex to re-provide
>> a Tested-by.
>>
>>> --- a/xen/drivers/vpci/msix.c
>>> +++ b/xen/drivers/vpci/msix.c
>>> @@ -182,6 +182,38 @@ static struct vpci_msix_entry *get_entry(struct vp=
ci_msix *msix,
>>>      return &msix->entries[(addr - start) / PCI_MSIX_ENTRY_SIZE];
>>>  }
>>> =20
>>> +static void __iomem *get_pba(struct vpci *vpci)
>>> +{
>>> +    struct vpci_msix *msix =3D vpci->msix;
>>> +    /*
>>> +     * PBA will only be unmapped when the device is deassigned, so acc=
ess it
>>> +     * without holding the vpci lock.
>>> +     */
>>> +    void __iomem *pba =3D read_atomic(&msix->pba);
>>> +
>>> +    if ( likely(pba) )
>>> +        return pba;
>>> +
>>> +    pba =3D ioremap(vmsix_table_addr(vpci, VPCI_MSIX_PBA),
>>> +                  vmsix_table_size(vpci, VPCI_MSIX_PBA));
>>> +    if ( !pba )
>>> +        return read_atomic(&msix->pba);
>>> +
>>> +    spin_lock(&vpci->lock);
>>> +    if ( !msix->pba )
>>> +    {
>>> +        write_atomic(&msix->pba, pba);
>>> +        spin_unlock(&vpci->lock);
>>> +    }
>>> +    else
>>> +    {
>>> +        spin_unlock(&vpci->lock);
>>> +        iounmap(pba);
>>> +    }
>>
>> TBH I had been hoping for just a single spin_unlock(), but you're
>> the maintainer of this code ...
>=20
> Would you prefer something like:
>=20
> spin_lock(&vpci->lock);
> if ( !msix->pba )
>     write_atomic(&msix->pba, pba);
> spin_unlock(&vpci->lock);
>=20
> if ( read_atomic(&msix->pba) !=3D pba )
>     iounmap(pba);

This or (to avoid the re-read)

    spin_lock(&vpci->lock);
    if ( !msix->pba )
    {
        write_atomic(&msix->pba, pba);
        pba =3D NULL;
    }
    spin_unlock(&vpci->lock);

    if ( pba )
        iounmap(pba);

Iirc we have similar constructs elsewhere in a few places.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 11:15:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 11:15:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286736.486362 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRXo8-0003vI-Fi; Tue, 08 Mar 2022 11:15:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286736.486362; Tue, 08 Mar 2022 11:15:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRXo8-0003vB-Ch; Tue, 08 Mar 2022 11:15:12 +0000
Received: by outflank-mailman (input) for mailman id 286736;
 Tue, 08 Mar 2022 11:15:10 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRXo6-0003v5-RQ
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 11:15:10 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 03eb809d-9ed1-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 12:15:09 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2173.outbound.protection.outlook.com [104.47.17.173]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-17-NY11hhkjN1CVQt-E1YaOgg-1; Tue, 08 Mar 2022 12:15:08 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AS8PR04MB7703.eurprd04.prod.outlook.com (2603:10a6:20b:23c::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Tue, 8 Mar
 2022 11:15:06 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 11:15:06 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 03eb809d-9ed1-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646738109;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=wVWf0j1ul/b8eWM+/zvX9t0+8MWqS6GYuUB3LBGbqaw=;
	b=UoJCos3MaeNFuyQAQk9yTbKW8612ZTuVeDB169OfcF+v4HHRtv4GsLpf/ND9adZsiE7t0S
	qZw7U5hIY8uvs+/Uw06rr1P17ZFBsyqyMfMyWWtE2LiqKNXWbagBuuIM9ObT8Gorviq754
	/VSnywG8o2rMcZmMqHrSbjHj7F5w/h4=
X-MC-Unique: NY11hhkjN1CVQt-E1YaOgg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=eFjvGWtOznCEApT9yoOh9SGx8t7efnjNoDxRf5RrYfzD480sUq3LjyMaf7plyr/PR8UCpp/WCFQk6/UZHyNG1rURnZpxQ95UeZ14AD2E7AasXHwHZQmWrAoRDN681ee2Cs8lfw8qUk7Od7dV7NxLTyOtRrUQtq1hoNHiUxwJb94QCDVpUN+dVi6WxcxcUS8MRGy3ru1gtfuVoeWZFn8gVB8XCbGUrVZ9GZUtBo+9/NuSK2NpvwJ3v4Whis8HObkNDfmLtjNhCHOJ4fQgkLtLvi93mzouoUCNMbNmscEcjWYB/3haJoaoWvmHAcXtYXRyu041HpT/CWeB5HdyNT0EMA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=jLAE1rUwTBXWLXmGNuBMDWnAuUZQaR/HNcqv8pX4qD8=;
 b=RpSBP6kC5vcpQANt4/yfTKQlcS4vVbdv2ClKhmOXkWX2wB/5eRUJHMk5z4/YoXSex2jg8jUq9GFllrITYHV6bnwS+FgtvFGA69Js9TUlxtZqDReFb5r3/i5w6REj0IcjzuVTWhrE3xWxsikaiHwslaLzWFAA8SZWr07MFnKj4B978BK2sC34jqkIMc1Q7dJKrmkpzv34pD54kTCj6cyHhHiHHh1HTWYp2ERX3l/STgLqmkyJ9Pg38TTde7MVEx0Ie6QMCMggQO8B1e9XSrgBxeKb/FNhfNLMMVWypz/I52AmqFAs2AOjdLF0CDIrDmYovRQkgIi5x1ftaFJOGz/9Gw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <0cde8972-b357-e2c0-ccc4-a0720cfb3501@suse.com>
Date: Tue, 8 Mar 2022 12:15:04 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v2] x86/build: use --orphan-handling linker option if
 available
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
References: <289684f6-fa73-bf02-137c-680ad8891640@suse.com>
 <YicsK8xqdcGZYaIn@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YicsK8xqdcGZYaIn@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS8PR04CA0193.eurprd04.prod.outlook.com
 (2603:10a6:20b:2f3::18) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0b87d31c-07f9-48ad-5658-08da00f4e67c
X-MS-TrafficTypeDiagnostic: AS8PR04MB7703:EE_
X-Microsoft-Antispam-PRVS:
	<AS8PR04MB77035C6BC6CD1CA3EED4A9FDB3099@AS8PR04MB7703.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(5660300002)(8936002)(86362001)(83380400001)(31696002)(6506007)(316002)(66946007)(31686004)(54906003)(53546011)(36756003)(8676002)(4326008)(2906002)(66556008)(26005)(2616005)(66476007)(186003)(38100700002)(6486002)(6916009)(508600001)(6512007)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?H8OXKbTZ3x86UPEVPv5SyGeo8L9M+T/CKBCCCTptVPYCMBNVGdP+kzKAKF2M?=
 =?us-ascii?Q?B2WOPJyuyoGdn+QmG9lvLzdoUrIqMXLJc6E2mD2VNzkEs5x0GOlKzhd9Fb05?=
 =?us-ascii?Q?z3/aWcjMPTXHDFIHgQ01qDte7w5kBMOTpCupGMMUBt2yi/sDeMBEFah0XA7H?=
 =?us-ascii?Q?WG/Gd15mcHUMYXbGXpE43OPzHWZupc4Gor1n8BtCgcHoYzVPl1CHqvD0HmR0?=
 =?us-ascii?Q?hCW/r2tshR0LOxd7nc8j0k7C5GaFNyCN/AG4jEF619ePvFpYPeKNkgtB8CVb?=
 =?us-ascii?Q?2cga/lutO/XnAMn5pxGPxTWbwOPUKnHa6Mvc5CXwuZIrbE4Sr5eOaGleIxZH?=
 =?us-ascii?Q?YDf9PLD27cjaCr4Vfr9qM3K05ybb6kX4lYgzqxmfRbRb5ghFgvHysxMukIG/?=
 =?us-ascii?Q?2edSohOdJffLSlLnq4Hqq+ZlFToQ7etCou3WQdBhZSXurPyX/OljLxw6FhU9?=
 =?us-ascii?Q?epewmxpQI3AIb3oC9ZKIMYri737EH2UhMXeAfEwdf0g4QrR61YLzIIft4vGn?=
 =?us-ascii?Q?t/Yp8+s5HPXHXE5Q9mQXdL0wg/R8TfwI73xinRtYdKruekJ5BmA2ObJfaEsE?=
 =?us-ascii?Q?NIGowf0dE41P8kMYmMciHILjGJJ1Kx+/43e9OO2qutRTN226uNYK/zBlltd/?=
 =?us-ascii?Q?nWVI+VVbKtbnxfDVMvI573DpytrveH81EwdFoutrkAIXOzk5bN04hAi3KyJQ?=
 =?us-ascii?Q?J/64YnN8DkusY2bRlM3l28T2luycXUHblCFPSMJaU29fc4wFZ3WqQraGqaDw?=
 =?us-ascii?Q?j8M3VCJi7xRxir3quyxd7Huc5MpvospSSQseivZgyKa1E6XVwNfJNVN1NwVu?=
 =?us-ascii?Q?undgwK2C3MNHrOQy2oTQQBqgUZPPeioejGm3ayDXu9QgjECPrvDLvV9yms5E?=
 =?us-ascii?Q?UfbG9C+6bxF3Y1KocLaSBUwziHxcnSf+MlhKlt74Xppw+v4jh52LP7TCTis2?=
 =?us-ascii?Q?LLT5xVKRWs0owIzato1u4V6npGqggw2k2/F71l4R9UFEKGi09+KMGoZQ6cQN?=
 =?us-ascii?Q?8JOHqjtm5HFEcbCWk1gyuPzBEITjjDZrfrTi31OvqxTQeeSuSKDmMaX+pp/u?=
 =?us-ascii?Q?iRD5zFXfM45xnfdlcnMRlhLiSDRpxqlFAajkLjvjIh+i1LFcsSVMBgIW06DP?=
 =?us-ascii?Q?fQxWpkraisOTlm8Hlv1K1amfhvzK4vzrS4gqDZtCUR2r2kmUOZe3zqX1xhE+?=
 =?us-ascii?Q?oNxoEN19PWM695s1Jynqg/2HFyI1CD3QPg66mrAJZV8w302WrDF5aDFZ6c+i?=
 =?us-ascii?Q?NqbmXJ8iscbQwaOKAjTvAyZFwv8vRCtbYM2hpbVagsMZaQgeVZX6daAEUrtF?=
 =?us-ascii?Q?eTyhyNZHxxOA3w2SbhF8Lnem/JMCSqURt5U++mM21cmaCJI40D0oipuG7SNz?=
 =?us-ascii?Q?HrG4ARRKqUgDyRzHiUoZNZ5TPcFRRxWVh4+9o53yEZPPhASKY7wl/SOsXyJa?=
 =?us-ascii?Q?B7KWcyC1PCr1vgl0TJj1zraU6+2yOXo1TAHAynLEQ9fepXPU1eIuPg4OAAd+?=
 =?us-ascii?Q?Nxjy1JLJGa9UCOrywQnOPBFRZxk/RVxuIWWQUTNtyaV5v5R3OKMXsVxuKois?=
 =?us-ascii?Q?7XVYfx3XX4SyZ3NCzW2G/QZ+tpCmkn7F7u9A0pDoL/r0MClvgUlkt9RcdxN1?=
 =?us-ascii?Q?g+jWGHGJM0aU6X/ZpXUsmRw=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0b87d31c-07f9-48ad-5658-08da00f4e67c
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 11:15:06.6524
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: COs3iOTGi5gQD1G+9ZO9FkvVdZtXHf3D87AN0iLLgOXalk6ngWyMM592OpEsG/DRXOEcwY8mXi9jFRWw+mllEg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR04MB7703

On 08.03.2022 11:12, Roger Pau Monn=C3=A9 wrote:
> On Mon, Mar 07, 2022 at 02:53:32PM +0100, Jan Beulich wrote:
>> As was e.g. making necessary 4b7fd8153ddf ("x86: fold sections in final
>> binaries"), arbitrary sections appearing without our linker script
>> placing them explicitly can be a problem. Have the linker make us aware
>> of such sections, so we would know that the script needs adjusting.
>>
>> To deal with the resulting warnings:
>> - Retain .note.* explicitly for ELF, and discard all of them (except the
>>   earlier consumed .note.gnu.build-id) for PE/COFF.
>> - Have explicit statements for .got, .plt, and alike and add assertions
>>   that they're empty. No output sections will be created for these as
>>   long as they remain empty (or else the assertions would cause early
>>   failure anyway).
>> - Collect all .rela.* into a single section, with again an assertion
>>   added for the resulting section to be empty.
>> - Extend the enumerating of .debug_* to ELF. Note that for Clang adding
>>   of .debug_macinfo is necessary. Amend this by its Dwarf5 counterpart,
>>   .debug_macro, then as well (albeit more may need adding for full
>>   coverage).
>>
>> Suggested-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>
>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>=20
> LGTM, just two questions.

Sure, just that ...

>> @@ -19,6 +26,8 @@ ENTRY(efi_start)
>> =20
>>  #define FORMAT "elf64-x86-64"
>>  #define DECL_SECTION(x) #x : AT(ADDR(#x) - __XEN_VIRT_START)
>> +#define DECL_DEBUG(x, a) #x 0 : { *(x) }
>> +#define DECL_DEBUG2(x, y, a) #x 0 : { *(x) *(y) }
>=20
> Would it be helpful to place those in a=20

... you may have had a 3rd one?

>> @@ -179,6 +188,13 @@ SECTIONS
>>  #endif
>>  #endif
>> =20
>> +#ifndef EFI
>> +  /* Retain these just for the purpose of possible analysis tools. */
>> +  DECL_SECTION(.note) {
>> +       *(.note.*)
>> +  } PHDR(note) PHDR(text)
>=20
> Wouldn't it be enough to place it in the note program header?
>=20
> The buildid note is already placed in .rodata, so any remaining notes
> don't need to be in a LOAD section?

All the notes will be covered by the NOTE phdr. I had this much later
in the script originally, but then the NOTE phdr covered large parts of
.init.*. Clearly that yields invalid notes, which analysis (or simple
dumping) tools wouldn't be happy about. We might be able to add 2nd
NOTE phdr, but mkelf32 assumes exactly 2 phdrs if it finds more than
one, so changes there would likely be needed then (which I'd like to
avoid for the moment). I'm also not sure in how far tools can be
expected to look for multiple NOTE phdrs ...

>> +#endif
>> +
>>    _erodata =3D .;
>> =20
>>    . =3D ALIGN(SECTION_ALIGN);
>> @@ -266,6 +282,32 @@ SECTIONS
>>         __ctors_end =3D .;
>>    } PHDR(text)
>> =20
>> +#ifndef EFI
>> +  /*
>> +   * With --orphan-sections=3Dwarn (or =3Derror) we need to handle cert=
ain linker
>> +   * generated sections. These are all expected to be empty; respective
>> +   * ASSERT()s can be found towards the end of this file.
>> +   */
>> +  DECL_SECTION(.got) {
>> +       *(.got)
>> +  } PHDR(text)
>> +  DECL_SECTION(.got.plt) {
>> +       *(.got.plt)
>> +  } PHDR(text)
>> +  DECL_SECTION(.igot.plt) {
>> +       *(.igot.plt)
>> +  } PHDR(text)
>> +  DECL_SECTION(.iplt) {
>> +       *(.iplt)
>> +  } PHDR(text)
>> +  DECL_SECTION(.plt) {
>> +       *(.plt)
>> +  } PHDR(text)
>> +  DECL_SECTION(.rela) {
>> +       *(.rela.*)
>> +  } PHDR(text)
>=20
> Why do you need to explicitly place those in the text program header?

I guess that's largely for consistency with all other directives. With the
assertions that these need to be empty, we might get away without, as long
as no linker would decide to set up another zero-size phdr for them.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 11:22:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 11:22:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286742.486373 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRXvW-0005Th-AX; Tue, 08 Mar 2022 11:22:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286742.486373; Tue, 08 Mar 2022 11:22:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRXvW-0005Ta-6b; Tue, 08 Mar 2022 11:22:50 +0000
Received: by outflank-mailman (input) for mailman id 286742;
 Tue, 08 Mar 2022 11:22:49 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=PT2b=TT=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nRXvV-0005TU-9o
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 11:22:49 +0000
Received: from NAM12-BN8-obe.outbound.protection.outlook.com
 (mail-bn8nam12on2062d.outbound.protection.outlook.com
 [2a01:111:f400:fe5b::62d])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 1432089f-9ed2-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 12:22:47 +0100 (CET)
Received: from BN6PR18CA0001.namprd18.prod.outlook.com (2603:10b6:404:121::11)
 by DM6PR02MB4796.namprd02.prod.outlook.com (2603:10b6:5:fb::10) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.21; Tue, 8 Mar
 2022 11:22:42 +0000
Received: from BN1NAM02FT031.eop-nam02.prod.protection.outlook.com
 (2603:10b6:404:121:cafe::66) by BN6PR18CA0001.outlook.office365.com
 (2603:10b6:404:121::11) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Tue, 8 Mar 2022 11:22:42 +0000
Received: from xir-pvapexch02.xlnx.xilinx.com (149.199.80.198) by
 BN1NAM02FT031.mail.protection.outlook.com (10.13.2.145) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5038.14 via Frontend Transport; Tue, 8 Mar 2022 11:22:42 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) by
 xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 8 Mar 2022 11:22:41 +0000
Received: from smtp.xilinx.com (172.21.105.198) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 8 Mar 2022 11:22:41 +0000
Received: from [10.71.117.157] (port=49634)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nRXvM-0006PG-ME; Tue, 08 Mar 2022 11:22:41 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1432089f-9ed2-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=nc6xk37uEor9YgrZEyg70cx4pkgBbP2SRYm+6bEHRRe3001PtMkgqxQzgM0NyNOds9v9qJPEY/roPLEZuO/E1Ww4s0DSTkrccVt1QqFLRPOKHpAlox2yqkWxAQ+UeCl7vag1m93aY3ovsa2iiO02QeSedYhvn8sNNYWjuptjiwpncKqxWLc5JIcrNmvM905HiR9jHoS6nuNWGgGC/elWdsJRuOEzvLrlWpp8N+XxOot14drkRivGSZi0rSxXHH0XfPsgaGCxtv52Mw14mR0fk59ABVS46Gadg8861yczD6FlI51FAEonVg/zkjEjkG4EUVGKn8iXK7hniIUfU+cogA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=5hRnIZw6T6CCWhdlyDcyKcVFLC1+aj8uAQgeZr3sApg=;
 b=E71KEOnmWGPgBxMNEgqblXJKd5p51W2WDt2hExLIIjaVIsHFT3SnBt6n81WmiFC3iwwqFjsrReauPz8J47jjxXb3/rFP85lSrZZB0HWLtDJsiSKYgv9XoATy2wQd5OFUx+VcBDl+5xmDA8xey3dwibLOE0gPcc2O9ufzOsdRik1aTaks/iHUxpUu5yA77+w0WjpIEX+42LvQyckquao7H63/0AHy9jLc3tNcKQGvbHJjszCPEb3sTOXE9n1TIeStMuklvivjyP4HOKrqwr10U5VPm09wR/sTcIKqqmcW+NMOt0MMQGFe5eRk9GeYJSDm8PhZkJY996dmVNIFSACgXw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=xen.org smtp.mailfrom=xilinx.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=xilinx.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=5hRnIZw6T6CCWhdlyDcyKcVFLC1+aj8uAQgeZr3sApg=;
 b=XCVvG8PtsmTzJlcZpMfjGr8M100F5qM1aP4ZL/VnN2lziJv2cvmk2CjQyHuV3HfOLNnTe+NDXHV5udYMCiT5srWZIzyVUnPWo/gvd104v4lLb/a0J6q+Nf44EB3t3KJBp+dK9A4TdRwyWPODQWOKHlck+/aRFo9DW8yhf9zJwow=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch02.xlnx.xilinx.com;
Message-ID: <b6e2a7eb-9d14-077d-c2d9-04528ffaa53a@xilinx.com>
Date: Tue, 8 Mar 2022 11:22:40 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Subject: Re: [XEN v9 3/4] xen/arm64: io: Handle the abort due to access to
 stage1 translation table
To: Julien Grall <julien@xen.org>, Ayan Kumar Halder
	<ayan.kumar.halder@xilinx.com>, <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <stefanos@xilinx.com>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>
References: <20220301124022.10168-1-ayankuma@xilinx.com>
 <20220301124022.10168-4-ayankuma@xilinx.com>
 <68acfbf0-f2c1-c52e-93a3-632f1286d90f@xen.org>
 <5d5b0fc1-6f47-dfc0-dca3-5d60483a6eae@xilinx.com>
 <3e9d5d0c-f68f-004e-06b7-c4f0452f1e64@xen.org>
 <124726df-eafe-014a-ea9a-f97e0921eccc@xilinx.com>
 <6c4e63e4-4f9f-68f4-5e4e-f69cf6567e1a@xen.org>
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
In-Reply-To: <6c4e63e4-4f9f-68f4-5e4e-f69cf6567e1a@xen.org>
Content-Type: text/plain; charset="UTF-8"; format=flowed
Content-Transfer-Encoding: 8bit
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ba5d6456-b3bc-4c36-d445-08da00f5f626
X-MS-TrafficTypeDiagnostic: DM6PR02MB4796:EE_
X-Microsoft-Antispam-PRVS:
	<DM6PR02MB47969632DB0C80C08CE7107CB2099@DM6PR02MB4796.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch02.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(7636003)(36860700001)(356005)(31686004)(36756003)(53546011)(426003)(9786002)(83380400001)(5660300002)(7416002)(336012)(508600001)(31696002)(82310400004)(8936002)(110136005)(26005)(54906003)(40460700003)(186003)(2906002)(8676002)(47076005)(70206006)(316002)(2616005)(4326008)(70586007)(50156003)(43740500002)(414714003)(473944003);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 11:22:42.1511
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: ba5d6456-b3bc-4c36-d445-08da00f5f626
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch02.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	BN1NAM02FT031.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR02MB4796

Hi Julien,

On 07/03/2022 23:59, Julien Grall wrote:
> Hi,
>
> On 07/03/2022 22:23, Ayan Kumar Halder wrote:
>>
>> On 07/03/2022 19:37, Julien Grall wrote:
>>>
>>>
>>> On 07/03/2022 14:27, Ayan Kumar Halder wrote:
>>>> Hi Julien,
>>>
>>> Hi Ayan,
>>
>> Hi Julien,
>>
>> I need a bit of clarification to understand this.
>>
>>>
>>>>
>>>> One clarification.
>>>>
>>>> On 04/03/2022 10:39, Julien Grall wrote:
>>>>> Hi Ayan,
>>>>>
>>>>> On 01/03/2022 12:40, Ayan Kumar Halder wrote:
>>>>>> If the abort was caused due to access to stage1 translation 
>>>>>> table, Xen
>>>>>> will assume that the stage1 translation table is in the non MMIO 
>>>>>> region.
>>>
>>> Reading this commit message again. I think you want to explain why 
>>> we want to do that because, from my understanding, this is 
>>> technically not forbidden by the Arm Arm.
>>>
>>> From the previous discussion, we want to do this because we can't 
>>> easily handle such fault on emulated region (we have no away to the 
>>> walker the value read).
>>
>> Sorry, Can you explain this a bit more ? Do you mean that if the page 
>> table is located in the emulated region, map_domain_page() (called 
>> from p2m_next_level()) will fail.
>
> For data abort with valid syndrome, you will have a register to write 
> back the value read. When the data abort has s1ptw == 1, AFAICT, we 
> have no information how to return the value.

Do you mean that for s1ptw, we get an intermediate physical address ?

     if ( hpfar_is_valid(xabt.s1ptw, fsc) )
         gpa = get_faulting_ipa(gva);

If the IPA corresponds to an emulated region, then Xen can read the 
emulated address, but can't return the value to the guest OS.

(I actually want to understand this very well).

>
>>
>> But for emulated region, shouldn't pages be already mapped for Xen to 
>> access them ?
>
> I am not sure which "pages" you are referring to here. The 
> implementation of emulated regions is left to the discretion of Xen. 
> This may be reading/writing to a buffer allocated by Xen or return a 
> fixed value.
>
>>
>>>
>>>>>> It will try to resolve the translation fault. If it succeeds, it 
>>>>>> will
>>>>>> return to the guest to retry the instruction. If not, then it means
>>>>>> that the table is in MMIO region which is not expected by Xen. Thus,
>>>>>> Xen will forward the abort to the guest.
>>>>>>
>>>>>> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
>>>>>> ---
>>>>>>
>>>>>> Changelog :-
>>>>>>
>>>>>> v1..v8 - NA
>>>>>>
>>>>>> v9 - 1. Extracted this change from "[XEN v8 2/2] xen/arm64: io: 
>>>>>> Support
>>>>>> instructions (for which ISS is not..." into a separate patch of 
>>>>>> its own.
>>>>>> The reason being this is an existing bug in the codebase.
>>>>>>
>>>>>>   xen/arch/arm/io.c    | 11 +++++++++++
>>>>>>   xen/arch/arm/traps.c | 12 +++++++++++-
>>>>>>   2 files changed, 22 insertions(+), 1 deletion(-)
>>>>>>
>>>>>> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
>>>>>> index bea69ffb08..ebcb8ed548 100644
>>>>>> --- a/xen/arch/arm/io.c
>>>>>> +++ b/xen/arch/arm/io.c
>>>>>> @@ -128,6 +128,17 @@ void try_decode_instruction(const struct 
>>>>>> cpu_user_regs *regs,
>>>>>>           return;
>>>>>>       }
>>>>>>   +    /*
>>>>>> +     * At this point, we know that the stage1 translation table 
>>>>>> is in the MMIO
>>>>>> +     * region. This is not expected by Xen and thus it forwards 
>>>>>> the abort to the
>>>>>
>>>>> We don't know that. We only know that there are no corresponding 
>>>>> valid mapping in the P2M. So the address may be part of an 
>>>>> emulated MMIO region or invalid.
>>>>>
>>>>> For both cases, we will want to send an abort.
>>>>>
>>>>> Furthermore, I would say "emulated MMIO region" rather than MMIO 
>>>>> region because the P2M can also contain MMIO mapping (we usually 
>>>>> call then "direct MMIO").
>>>>
>>>> Can I say MMIO region (to indicate both emulated and direct) ? The 
>>>> reason being the assumption that stage1 page tables cannot be in 
>>>> the MMIO region. And thus, when check_p2m() is invoked, we do not 
>>>> invoke try_map_mmio(gaddr_to_gfn(gpa).
>>>>
>>>> See this snippet :-
>>>>
>>>>              if ( xabt.s1ptw )
>>>>                  check_mmio_region = false;
>>>
>>> Thinking a bit more of this. I would actually drop this check. We 
>>> don't need to decode the instruction, so I don't think there are 
>>> much benefits here to restrict access for direct MMIO. Did I miss 
>>> anything?
>>>
>> Can Linux or any OS keep its page tables in the direct MMIO space ? 
>> If yes, then try_map_mmio() needs to be invoked to map the region, so 
>> that OS can access it. If not, then Xen needs to return abort because 
>> the OS may be behaving maliciously.
>
> I think what matters is whether the Arm Arm would or would not allow 
> it. From what I can tell there are no such restriction. So we would 
> need to be cautious to restrict it further than necessary.
>
>>
>> My understanding from previous discussion was that it does not make 
>> sense for linux or any OS to keep its page tables in any MMIO region 
>> (emulated or direct). Please correct me if mistaken.
>
> At the moment, none of the regions emulated by Xen could be used for 
> page-tables. I am also not sure how we should handle such access if 
> they arise. So it is more convenient to simply forbid them.
>
> Regarding direct MMIO, see above. Correct me if I am wrong, but it 
> should not be a problem for Xen to deal with them. So while I agree 
> this doesn't seem to make sense, the restriction seems unnecessary.

So the behavior will be :-

1. If the stage1 translation table is in the non MMIO region or 'direct 
mapped' MMIO region, then invoke p2m_resolve_translation_fault() and 
try_map_mmio() to resolve the fault. If it succeeds, then return to the 
guest to retry.

2. If the previous step fails and for any other scenario (ie stage1 
translation table is in emulated MMIO region or the address is invalid), 
return the abort to the guest.

- Ayan

>
> Cheers,
>


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 11:25:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 11:25:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286750.486384 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRXxs-0006AP-RR; Tue, 08 Mar 2022 11:25:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286750.486384; Tue, 08 Mar 2022 11:25:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRXxs-0006AI-O7; Tue, 08 Mar 2022 11:25:16 +0000
Received: by outflank-mailman (input) for mailman id 286750;
 Tue, 08 Mar 2022 11:25:15 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRXxr-0006A6-GI; Tue, 08 Mar 2022 11:25:15 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRXxr-0006fG-Dr; Tue, 08 Mar 2022 11:25:15 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRXxr-0008FF-3E; Tue, 08 Mar 2022 11:25:15 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRXxr-0004Xq-2k; Tue, 08 Mar 2022 11:25:15 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=2ZHR3XKpURY0pugyACM5IdfNA/NXyotipt1GSYdNF4U=; b=1HpR3SCox4oO375LNZUN/6Ks+E
	int8nzrr6TwlUnsrYHz4a4D+/alst5DWuboCtUl0JMW+j6cMnK1n/B+TzzvqJiUQ8CSIGr5Yinxlm
	ZiPcBVaqZnLOQ7eV6VglmvyMFQVajEdO5E5EyELAIxubX14FfEB7sUfT0aVd8yS0zzgY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168477-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168477: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=62fa37fe7b9df3c54a2d9d90aed9ff0e817ee0c6
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 08 Mar 2022 11:25:15 +0000

flight 168477 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168477/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 62fa37fe7b9df3c54a2d9d90aed9ff0e817ee0c6
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    8 days
Failing since        168258  2022-03-01 01:55:31 Z    7 days   78 attempts
Testing same since   168469  2022-03-07 23:11:34 Z    0 days    4 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 468 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 11:39:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 11:39:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286761.486394 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRYBW-0007yw-PP; Tue, 08 Mar 2022 11:39:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286761.486394; Tue, 08 Mar 2022 11:39:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRYBW-0007yp-MK; Tue, 08 Mar 2022 11:39:22 +0000
Received: by outflank-mailman (input) for mailman id 286761;
 Tue, 08 Mar 2022 11:39:21 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fWwI=TT=citrix.com=prvs=059ab6e88=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRYBV-0007yj-6h
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 11:39:21 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 6226b848-9ed4-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 12:39:17 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6226b848-9ed4-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646739558;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=ripalwEe6I7NNwbLQ+/TV6oItJ9+CjhrbfOzNkoL2rE=;
  b=M+LEttZ/Uv2vVVrSqbD3Fh3bXTA97vIE6h4n/1VHf0PTw1BloWnJQIJw
   ierJO1SYNA/KnGGDGjlAWGVgaKAbB7HZ+wntyAZeXPuotbUYcK3dqI8PU
   jx0f80yyMAAe0nTHxm9+o+dqsSs8Fyry4ZBxBE5mVwwyB2iJQu4EG+E0B
   E=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66094228
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:SuG0iqD5nKe0CRVW/9Xjw5YqxClBgxIJ4kV8jS/XYbTApDN21mcCm
 jBMWmvSPf2JYGX0fYxwPIS2oUwE7JfWm9UyQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vh0tYx6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhxx
 dkXtaKWST5xBY/Uk8czfhQEMRxXaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguw5K8bmJsUHs2xIxjDFF/c2B5vERs0m4PcGgm9h2poUTZ4yY
 eI7S2prT0vLWCdrKwsmCIs0guOpoijgJmgwRFW9+vNsvjm7IBZK+KP2LNPfd9iORMNUtkWVv
 GTL+yL+GB5yHN6CzTuI9Fq8i+mJmjn0MKosE7m/+u9vkUek7GUZAx0LVnO2ufC8zEW5Xrp3J
 0UK9wI0oKM19UjtScPyNzWnpFaUsxhaXMBfe8Uq5QfIxqfK7gKxAmkfUiUHeNEgrNUxRzEhy
 hmOhdyBLT5lvaCRSHmd3qyJtj70Mi8QRUcAajUDVhAt+MT4rcc4iRenczp4OPfr1JuvQ2i2m
 m3U6nhl71kOsSIV/6W28QrHvRSsn8DybBY+xSv6Uz6H0yosMeZJeLeUwVTc6P9BKqOQQV+Ao
 GUIlqCi0QweMX2evHfTGbtQRdlF897AaWSB2gA3Q/HN4hzwoybLQGxG3N1pyK6F2O4gcCShX
 kLcsBg5CHR7bCrzNv8fj25c5q0XIUnc+TbNC6i8gjlmOMEZmOq7EMdGPxb4M4fFyhRErE3HE
 c3HGftA9F5DYUid8BK4Rv0GzZggzT0kyGXYSPjTlkr7j+TBNCPOEOdYazNii9zVCove+205F
 P4Fa6O3J+h3CrWiMkE7D6ZJRbz1EZTLLc+v8JEGHgJyCgFnBHsgG5fsLUAJIORYc1Buvr6Qp
 BmVAxYAoHKm3CGvAVjaOxhLNeK0Nb4i/C1TAMDZFQvxs5TVSd30t/l3mlpeVeRPydGPOtYoF
 6lVIZvRWK8TItkFkhxEBaTAQEVZXE3DrSqFPja/YSh5eJhlRgfT/cTjcBep/y4LZhdbf+Nny
 1F8/ms3maY+ejk=
IronPort-HdrOrdr: A9a23:fb3FlquJyxHHRKLsaCa2ePGz7skClIMji2hC6mlwRA09TyXGra
 +TdaUguSMc1gx9ZJhBo7G90KnpewK6yXdQ2/hqAV7EZniahILIFvAY0WKG+VPd8kLFh4xgPM
 tbAs1D4ZjLfCRHZKXBkXiF+rQbsaC6GcmT7I+0pRcdLj2CKZsQlzuRYjzrbHGeLzM2Y6bReq
 Dsgvau8FGbCAsqh4mAdzE4dtmGg+eOuIPtYBYACRJiwA6SjQmw4Lq/NxSDxB8RXx5G3L9nqA
 H+4kbEz5Tml8v+5g7X1mfV4ZgTsNz9yuFbDMjJrsQOMD3jhiuheYwkcbyfuzIepv2p9T8R4Z
 LxiiZlG/42x2Laf2mzrxeo8w780Aw243un8lOciWuLm72PeBsKT+56wa5JeBrQ7EQt+Ptm1r
 hQ4m6fv51LSTvdgSXU/bHzJl5Xv3vxhUBnvf8YjnRZX4dbQqRWt5Yj8ERcF4pFND7m6bogDP
 JlAKjnlbprmGuhHjHkV1RUsZyRtixZJGbEfqFCgL3Z79FupgE286NCr/Zv3Evp9/oGOu15Dq
 r/Q+FVfYp1P7wrhJJGdZc8qPSMex7wqDL3QRSvyAfcZeg600ykke+D3Fxy3pDvRKA1
X-IronPort-AV: E=Sophos;i="5.90,164,1643691600"; 
   d="scan'208";a="66094228"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=GYPRYdYDQcKHBbfQWy1cFWFsrBfYnKJilIgEGqEJOABUp8ft6HTxbgfY3OFdPn2JHr7uTu34J4tVO6WOhE/bMRVi6sKDbquincbnC8IVn+z7Ey0ERi2U3WB6wVmvwrj/G/wht7SOz9a51D6BOgL+ZkAv/cIeX2EnEqS/kFYTlB7Tp7qqWhdowlPI7L5OlHwMI31LN5DdUIHZgZ6QMz9OvDrY4d0AkzIeVsx+lAMKqZgHVS3uulxsdM5g2Iqqld3tDyaoEyVq4Ns5P6I4L+NGa0cMU6GQ7OOO1gxcDbTnZCCpzPcgYvc8MlacKlnp4xGoGfyIZFHRkJb1V1P736I3yw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=y6yk0/hjFSZ6Mvi618r5ZZ/v+vtKRqYZ6iLrsT0NDgQ=;
 b=Lss8i/2jJgjhhMYmTToJz3xH24+IyOTmVOXvgOm/0JgJmSGGx/wLi0TpVkzjbSpPTs0/2yjigvzoG3TL+WAnMIhsg6fT/dU3koOoXbt22F6OiFz2GHS3ONFACpLiKBGeM+p4OS1kqbY4nubBVCCow560+GWe3+ptfQtqQvu9TfuSG8k7F7emNQFIgSiblmDuFR7f4qI00ZSIyaQ2o2g76DDtMOvaaumKiztBLW+tGPzuVPZyr4HGZdo5dVRUamXNjlMmzqkBVaTXb34ItFOdrixwUsr9LMVXAzotfytAFeRoQjXqQLPp6ysf0IkHcPHK6jF8WONmcjphyUfKWMCz7w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=y6yk0/hjFSZ6Mvi618r5ZZ/v+vtKRqYZ6iLrsT0NDgQ=;
 b=PVHFwR/gucxSRG6IeVYoLPXrdIssMunvHDW7LNGcjCfRzmAfghcOLeSLxAzxQ3P2/bIhtM2wLdGvS/6D9il3AI9dDmkyQODuDXVjFIKUNbZQYC9H3jraQnGoUUsoMIKPhQyewVlC7YhFiF30wZZhpytjmM90Td7GCRK1AcQl1hI=
Date: Tue, 8 Mar 2022 12:38:59 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jane Malalane <jane.malalane@citrix.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, Anthony
 PERARD <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, Andrew
 Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>, Julien Grall <julien@xen.org>, Stefano
 Stabellini <sstabellini@kernel.org>, Christian Lindig
	<christian.lindig@citrix.com>, David Scott <dave@recoil.org>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH v5 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Message-ID: <YidAU63TsVO/X1Q+@Air-de-Roger>
References: <20220307150609.10662-1-jane.malalane@citrix.com>
 <20220307150609.10662-3-jane.malalane@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <20220307150609.10662-3-jane.malalane@citrix.com>
X-ClientProxiedBy: LO4P123CA0124.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:192::21) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 021b1f37-3791-4c7b-6c6e-08da00f84016
X-MS-TrafficTypeDiagnostic: DM5PR03MB2537:EE_
X-Microsoft-Antispam-PRVS: <DM5PR03MB25379C715B37D8E94920D5948F099@DM5PR03MB2537.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(86362001)(66946007)(6666004)(6512007)(9686003)(6506007)(66556008)(82960400001)(66476007)(4326008)(6636002)(316002)(508600001)(6486002)(54906003)(26005)(186003)(38100700002)(83380400001)(2906002)(30864003)(8936002)(33716001)(85182001)(5660300002)(8676002)(6862004);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?TDVJZE13V09QSjRLajdVem1udVVOSmZJMkFsbndKS2RMaThjcnJienBSMUZv?=
 =?utf-8?B?ZktZUzV1Z2VLN2dnU0J5bDJiWXRPWThrcEg3OTcwWVFhd1JsRHFZdlFONGdu?=
 =?utf-8?B?YmttM1Y5Nnc2OWNjdUpWN2ZvdHNkQXVOdml5V2Q5TVhjRm1BTUczVDFQZFpp?=
 =?utf-8?B?NFgxQVFEWXlrZW5iWHJRVlAvdkI4eVFEbDhMaEIzNi9EZzF6Y3pSM2pIVlZS?=
 =?utf-8?B?dGNhRVJwemV4WitHT1ZlMmJwRFRxMnJlTjNER09PZHVlSEhBdHAwQWF5UFpW?=
 =?utf-8?B?TkRGN0FmdU5OekVQbFhKZ0RDSjhHZFIra0M1WFhnTUJNbmx0MndxMGVoT0Fk?=
 =?utf-8?B?NDZISndZdCt0MXNISmNPcjBkcytrRVJIRUZvVy83cGIrUG4xMTZzNlVBU211?=
 =?utf-8?B?VmpCVjJ0WGNubDRobUNrMjlTRVZGMHc0N3pNUWlINlU0SmtGYnk2NFVwbkd2?=
 =?utf-8?B?RlZRV1RiZlYyenJpYWZHcy9MZUNGWHdxZmhpd09ETlB2cGk3RGthaVdWQWZm?=
 =?utf-8?B?UTIxSkdIZ3NaTzhTZXFFS3hWN3dtWjRqa1Y4NTdOeVpadlp0NW03dUFDbEN3?=
 =?utf-8?B?UWJIMVpLbkV0YXFqUUFhOWFXVC9odm5yNDRjMnd2VSsxRW1FNXVrZHFBV1Uv?=
 =?utf-8?B?cjRoTkhjWTQrcHNkVjJjbjAvQXN2TjFGQTNNRlgwWXROMGR3RVlmUmVFVWJu?=
 =?utf-8?B?OFBNSDYrL2VNNDA3THpEdE5OTS9iaFdVSGk4cnlldGJqLzYwMFVWMUhyMHJ6?=
 =?utf-8?B?Z2ZGaHp6Q3NpbWtXQzE2cFNEMyt4a1ZGS0lONlhPeUNxZG83WCtOY2xqZzJQ?=
 =?utf-8?B?Z1dwdk9hVWFRd3AxUUNITmR2WkZDUTBNQytlN2tpNGc0b0FLWGs1Ync2dDBV?=
 =?utf-8?B?L28wQUMxTm93bHZMWUhpa3NEWEl2dHExV1pIeEV4RFhZMUxZc1FleEpIZnFB?=
 =?utf-8?B?NEh5TjNWWWpPWURKUENzTW5URWNTVjBoRy9KMlpPQ0tQZUh2RHVCZE82ZW01?=
 =?utf-8?B?MW1vZUFNeWxFSzR5T3VmUGtieVcyRk5TL0IrTEhSS1JiS2tZdHB0OFBvalYv?=
 =?utf-8?B?dXI5VUZwVXNZcEJJNEVyMWNRYVl4ZTJpdVhiSS9YU1VSMnNMaGlHeEl5SkhS?=
 =?utf-8?B?MlVadHpXSGU3L3lBemV4RTJJTndiaVUwdktnR3BuOVpQU2dEbVJ1UzRjS3lE?=
 =?utf-8?B?QnBDQkNhRFgxMUtIS2VJbWdWYmdRZkdEcEsxVU9MbEhzM0dnd1cvNnJTR296?=
 =?utf-8?B?aklxREJrYTlUZ0lLYUlRK2MxZUJCWmM1b1dhS1NnZFk4UFlsWFF2eXZMdTls?=
 =?utf-8?B?TXhMSUlWTWNaa1ZXaHdoTmorV1pJTE5rdTJSbTlsWWg3djMrN1hrQ3dodkVM?=
 =?utf-8?B?T1Q0YjVvL0JNMkVtYmdkdEMvNFFUZGxBM290OEZxQjZ0L2hGd2dILzJ1THU3?=
 =?utf-8?B?Tk9HY3h3eU03SDVmQVdzam4zckdDMzhKb0p2RDI2YndDS080MGpETCtGYlp2?=
 =?utf-8?B?d1dkbExRQVZkVDcxUXYwSGo3NmxiYTQ3NzQ5NFBlWGVCZDRldjVzVTRvQmpW?=
 =?utf-8?B?VHJlRG1CeVJ0SGFIMG5JNEpINE43YWd3RHQ1Y2NiOXVMUDNwcFk1RHA2RHNM?=
 =?utf-8?B?ZmEzV25BUFEwME9iaStycGZxa1lxa3lYWFgxRkU0S0xqRzUvOENMRnNrcTJF?=
 =?utf-8?B?UTUydnM0Z3RmZDJqalZZWnhxUmVXVCtZQWNaY3ZoRU5BYTg0RysyWjgrUmJt?=
 =?utf-8?B?RnJsYmt0UGlubnRKbDhvOGRUc2Zoc1pGWmdwNU9CWWNpTEM4N2FuR3lBeVJs?=
 =?utf-8?B?QzF3eU5vS3pzZUNmUFIwRzRoRllLNCt4WWhoa0RWTHJmNzNSeUNXNTdUbGhT?=
 =?utf-8?B?cTFqejR6OUpIVjgxcUZ1UmsvUGdDZlpUUTZRNnRQRFYrMi92aXJENUFScjNa?=
 =?utf-8?B?dkJMMC9PKzFHT211YXhaSWFYT3E3UjI5bWJwOHlLMlM4TDRPdmVTUXhRSGFs?=
 =?utf-8?B?MU51QjVKdTJSRS9pNVl5UWZ0NWJTVUtkalZHMmdQQzZsSjVqOXVhMk5sOXF2?=
 =?utf-8?B?SC9Fb1BRVWhhdWF6QUhyOENHcWd0V21jR0VLYzVMeWxGQWFwTi9OdFkxbmFj?=
 =?utf-8?B?dVJ3ZXg0cmxBVVhYQVEyd0JZYzZQTlE0bkdaZW5kaWxKV0w5czlIb0htTWd3?=
 =?utf-8?Q?MAIUKBZfPQUHedGaT1f/esU=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 021b1f37-3791-4c7b-6c6e-08da00f84016
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 11:39:05.6426
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 6NJzPxyYjHOkG5FwduWvMGLWFyJRDHgf0ey5++SZ9bBZp6IIyyqpIrZmf0vea4pWcnHfjFKEs6WdR7ig/9pp2w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR03MB2537
X-OriginatorOrg: citrix.com

On Mon, Mar 07, 2022 at 03:06:09PM +0000, Jane Malalane wrote:
> Introduce a new per-domain creation x86 specific flag to
> select whether hardware assisted virtualization should be used for
> x{2}APIC.
> 
> A per-domain option is added to xl in order to select the usage of
> x{2}APIC hardware assisted virtualization, as well as a global
> configuration option.
> 
> Having all APIC interaction exit to Xen for emulation is slow and can
> induce much overhead. Hardware can speed up x{2}APIC by decoding the
> APIC access and providing a VM exit with a more specific exit reason
> than a regular EPT fault or by altogether avoiding a VM exit.
> 
> On the other hand, being able to disable x{2}APIC hardware assisted
> virtualization can be useful for testing and debugging purposes.
> 
> Note: vmx_install_vlapic_mapping doesn't require modifications
> regardless of whether the guest has "Virtualize APIC accesses" enabled
> or not, i.e., setting the APIC_ACCESS_ADDR VMCS field is fine so long
> as virtualize_apic_accesses is supported by the CPU.
> 
> Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
> Signed-off-by: Jane Malalane <jane.malalane@citrix.com>
> ---
> CC: Wei Liu <wl@xen.org>
> CC: Anthony PERARD <anthony.perard@citrix.com>
> CC: Juergen Gross <jgross@suse.com>
> CC: Andrew Cooper <andrew.cooper3@citrix.com>
> CC: George Dunlap <george.dunlap@citrix.com>
> CC: Jan Beulich <jbeulich@suse.com>
> CC: Julien Grall <julien@xen.org>
> CC: Stefano Stabellini <sstabellini@kernel.org>
> CC: Christian Lindig <christian.lindig@citrix.com>
> CC: David Scott <dave@recoil.org>
> CC: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
> CC: "Roger Pau Monné" <roger.pau@citrix.com>
> 
> v5:
> * Revert v4 changes in vmx_vlapic_msr_changed(), preserving the use of
>   the has_assisted_x{2}apic macros
> * Following changes in assisted_x{2}apic_available definitions in
>   patch 1, retighten conditionals for setting
>   XEN_HVM_CPUID_APIC_ACCESS_VIRT and XEN_HVM_CPUID_X2APIC_VIRT in
>   cpuid_hypervisor_leaves()
> 
> v4:
>  * Add has_assisted_x{2}apic macros and use them where appropriate
>  * Replace CPU checks with per-domain assisted_x{2}apic control
>    options in vmx_vlapic_msr_changed() and cpuid_hypervisor_leaves(),
>    following edits to assisted_x{2}apic_available definitions in
>    patch 1
>    Note: new assisted_x{2}apic_available definitions make later
>    cpu_has_vmx_apic_reg_virt and cpu_has_vmx_virtual_intr_delivery
>    checks redundant in vmx_vlapic_msr_changed()
> 
> v3:
>  * Change info in xl.cfg to better express reality and fix
>    capitalization of x{2}apic
>  * Move "physinfo" variable definition to the beggining of
>    libxl__domain_build_info_setdefault()
>  * Reposition brackets in if statement to match libxl coding style
>  * Shorten logic in libxl__arch_domain_build_info_setdefault()
>  * Correct dprintk message in arch_sanitise_domain_config()
>  * Make appropriate changes in vmx_vlapic_msr_changed() and
>    cpuid_hypervisor_leaves() for amended "assisted_x2apic" bit
>  * Remove unneeded parantheses
> 
> v2:
>  * Add a LIBXL_HAVE_ASSISTED_APIC macro
>  * Pass xcpyshinfo as a pointer in libxl__arch_get_physinfo
>  * Add a return statement in now "int"
>    libxl__arch_domain_build_info_setdefault()
>  * Preserve libxl__arch_domain_build_info_setdefault 's location in
>    libxl_create.c
>  * Correct x{2}apic default setting logic in
>    libxl__arch_domain_prepare_config()
>  * Correct logic for parsing assisted_x{2}apic host/guest options in
>    xl_parse.c and initialize them to -1 in xl.c
>  * Use guest options directly in vmx_vlapic_msr_changed
>  * Fix indentation of bool assisted_x{2}apic in struct hvm_domain
>  * Add a change in xenctrl_stubs.c to pass xenctrl ABI checks
> ---
>  docs/man/xl.cfg.5.pod.in                | 19 +++++++++++++++++++
>  docs/man/xl.conf.5.pod.in               | 12 ++++++++++++
>  tools/golang/xenlight/helpers.gen.go    | 12 ++++++++++++
>  tools/golang/xenlight/types.gen.go      |  2 ++
>  tools/include/libxl.h                   |  7 +++++++
>  tools/libs/light/libxl_arch.h           |  5 +++--
>  tools/libs/light/libxl_arm.c            |  7 +++++--
>  tools/libs/light/libxl_create.c         | 22 +++++++++++++---------
>  tools/libs/light/libxl_types.idl        |  2 ++
>  tools/libs/light/libxl_x86.c            | 28 ++++++++++++++++++++++++++--
>  tools/ocaml/libs/xc/xenctrl.ml          |  2 ++
>  tools/ocaml/libs/xc/xenctrl.mli         |  2 ++
>  tools/ocaml/libs/xc/xenctrl_stubs.c     |  2 +-
>  tools/xl/xl.c                           |  8 ++++++++
>  tools/xl/xl.h                           |  2 ++
>  tools/xl/xl_parse.c                     | 16 ++++++++++++++++
>  xen/arch/x86/domain.c                   | 28 +++++++++++++++++++++++++++-
>  xen/arch/x86/hvm/vmx/vmcs.c             |  4 ++++
>  xen/arch/x86/hvm/vmx/vmx.c              | 13 ++++---------
>  xen/arch/x86/include/asm/hvm/domain.h   |  6 ++++++
>  xen/arch/x86/include/asm/hvm/vmx/vmcs.h |  3 +++
>  xen/arch/x86/traps.c                    |  9 +++++----
>  xen/include/public/arch-x86/xen.h       |  2 ++
>  23 files changed, 183 insertions(+), 30 deletions(-)
> 
> diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in
> index b98d161398..dcca564a23 100644
> --- a/docs/man/xl.cfg.5.pod.in
> +++ b/docs/man/xl.cfg.5.pod.in
> @@ -1862,6 +1862,25 @@ firmware tables when using certain older guest Operating
>  Systems. These tables have been superseded by newer constructs within
>  the ACPI tables.
>  
> +=item B<assisted_xapic=BOOLEAN>
> +
> +B<(x86 only)> Enables or disables hardware assisted virtualization for
> +xAPIC. With this option enabled, a memory-mapped APIC access will be
> +decoded by hardware and either issue a more specific VM exit than just
> +an EPT fault, or altogether avoid a VM exit. Notice full
> +virtualization for xAPIC can only be achieved if hardware supports
> +“APIC-register virtualization” and “virtual-interrupt delivery”.

You shouldn't mention “APIC-register virtualization” or
“virtual-interrupt delivery”, as those are Intel specific options. I
would just remove that sentence (same below).

> The
> +default is settable via L<xl.conf(5)>.
> +
> +=item B<assisted_x2apic=BOOLEAN>
> +
> +B<(x86 only)> Enables or disables hardware assisted virtualization for
> +x2APIC. With this option enabled, an MSR-Based APIC access will
> +either issue a VM exit or altogether avoid one.

"With this option enabled, certain accesses to MSR APIC registers will
avoid a VM exit into the hypervisor."

> Notice full
> +virtualization for x2APIC can only be achieved if hardware supports
> +“APIC-register virtualization” and “virtual-interrupt delivery”. The
> +default is settable via L<xl.conf(5)>.
> +
>  =item B<nx=BOOLEAN>
>  
>  B<(x86 only)> Hides or exposes the No-eXecute capability. This allows a guest
> diff --git a/docs/man/xl.conf.5.pod.in b/docs/man/xl.conf.5.pod.in
> index df20c08137..95d136d1ea 100644
> --- a/docs/man/xl.conf.5.pod.in
> +++ b/docs/man/xl.conf.5.pod.in
> @@ -107,6 +107,18 @@ Sets the default value for the C<max_grant_version> domain config value.
>  
>  Default: maximum grant version supported by the hypervisor.
>  
> +=item B<assisted_xapic=BOOLEAN>
> +
> +If enabled, domains will use xAPIC hardware assisted virtualization by default.
> +
> +Default: enabled if supported.
> +
> +=item B<assisted_x2apic=BOOLEAN>
> +
> +If enabled, domains will use x2APIC hardware assisted virtualization by default.
> +
> +Default: enabled if supported.
> +
>  =item B<vif.default.script="PATH">
>  
>  Configures the default hotplug script used by virtual network devices.
> diff --git a/tools/golang/xenlight/helpers.gen.go b/tools/golang/xenlight/helpers.gen.go
> index dd4e6c9f14..dece545ee0 100644
> --- a/tools/golang/xenlight/helpers.gen.go
> +++ b/tools/golang/xenlight/helpers.gen.go
> @@ -1120,6 +1120,12 @@ x.ArchArm.Vuart = VuartType(xc.arch_arm.vuart)
>  if err := x.ArchX86.MsrRelaxed.fromC(&xc.arch_x86.msr_relaxed);err != nil {
>  return fmt.Errorf("converting field ArchX86.MsrRelaxed: %v", err)
>  }
> +if err := x.ArchX86.AssistedXapic.fromC(&xc.arch_x86.assisted_xapic);err != nil {
> +return fmt.Errorf("converting field ArchX86.AssistedXapic: %v", err)
> +}
> +if err := x.ArchX86.AssistedX2Apic.fromC(&xc.arch_x86.assisted_x2apic);err != nil {
> +return fmt.Errorf("converting field ArchX86.AssistedX2Apic: %v", err)
> +}
>  x.Altp2M = Altp2MMode(xc.altp2m)
>  x.VmtraceBufKb = int(xc.vmtrace_buf_kb)
>  if err := x.Vpmu.fromC(&xc.vpmu);err != nil {
> @@ -1605,6 +1611,12 @@ xc.arch_arm.vuart = C.libxl_vuart_type(x.ArchArm.Vuart)
>  if err := x.ArchX86.MsrRelaxed.toC(&xc.arch_x86.msr_relaxed); err != nil {
>  return fmt.Errorf("converting field ArchX86.MsrRelaxed: %v", err)
>  }
> +if err := x.ArchX86.AssistedXapic.toC(&xc.arch_x86.assisted_xapic); err != nil {
> +return fmt.Errorf("converting field ArchX86.AssistedXapic: %v", err)
> +}
> +if err := x.ArchX86.AssistedX2Apic.toC(&xc.arch_x86.assisted_x2apic); err != nil {
> +return fmt.Errorf("converting field ArchX86.AssistedX2Apic: %v", err)
> +}
>  xc.altp2m = C.libxl_altp2m_mode(x.Altp2M)
>  xc.vmtrace_buf_kb = C.int(x.VmtraceBufKb)
>  if err := x.Vpmu.toC(&xc.vpmu); err != nil {
> diff --git a/tools/golang/xenlight/types.gen.go b/tools/golang/xenlight/types.gen.go
> index 87be46c745..253c9ad93d 100644
> --- a/tools/golang/xenlight/types.gen.go
> +++ b/tools/golang/xenlight/types.gen.go
> @@ -520,6 +520,8 @@ Vuart VuartType
>  }
>  ArchX86 struct {
>  MsrRelaxed Defbool
> +AssistedXapic Defbool
> +AssistedX2Apic Defbool
>  }
>  Altp2M Altp2MMode
>  VmtraceBufKb int
> diff --git a/tools/include/libxl.h b/tools/include/libxl.h
> index 94e6355822..cdcccd6d01 100644
> --- a/tools/include/libxl.h
> +++ b/tools/include/libxl.h
> @@ -535,6 +535,13 @@
>  #define LIBXL_HAVE_PHYSINFO_ASSISTED_APIC 1
>  
>  /*
> + * LIBXL_HAVE_ASSISTED_APIC indicates that libxl_domain_build_info has
> + * assisted_xapic and assisted_x2apic fields for enabling hardware
> + * assisted virtualization for x{2}apic per domain.
> + */
> +#define LIBXL_HAVE_ASSISTED_APIC 1
> +
> +/*
>   * libxl ABI compatibility
>   *
>   * The only guarantee which libxl makes regarding ABI compatibility
> diff --git a/tools/libs/light/libxl_arch.h b/tools/libs/light/libxl_arch.h
> index 207ceac6a1..03b89929e6 100644
> --- a/tools/libs/light/libxl_arch.h
> +++ b/tools/libs/light/libxl_arch.h
> @@ -71,8 +71,9 @@ void libxl__arch_domain_create_info_setdefault(libxl__gc *gc,
>                                                 libxl_domain_create_info *c_info);
>  
>  _hidden
> -void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
> -                                              libxl_domain_build_info *b_info);
> +int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
> +                                             libxl_domain_build_info *b_info,
> +                                             const libxl_physinfo *physinfo);
>  
>  _hidden
>  int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
> diff --git a/tools/libs/light/libxl_arm.c b/tools/libs/light/libxl_arm.c
> index 39fdca1b49..ba5b8f433f 100644
> --- a/tools/libs/light/libxl_arm.c
> +++ b/tools/libs/light/libxl_arm.c
> @@ -1384,8 +1384,9 @@ void libxl__arch_domain_create_info_setdefault(libxl__gc *gc,
>      }
>  }
>  
> -void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
> -                                              libxl_domain_build_info *b_info)
> +int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
> +                                             libxl_domain_build_info *b_info,
> +                                             const libxl_physinfo *physinfo)
>  {
>      /* ACPI is disabled by default */
>      libxl_defbool_setdefault(&b_info->acpi, false);
> @@ -1399,6 +1400,8 @@ void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
>      memset(&b_info->u, '\0', sizeof(b_info->u));
>      b_info->type = LIBXL_DOMAIN_TYPE_INVALID;
>      libxl_domain_build_info_init_type(b_info, LIBXL_DOMAIN_TYPE_PVH);
> +
> +    return 0;
>  }
>  
>  int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
> diff --git a/tools/libs/light/libxl_create.c b/tools/libs/light/libxl_create.c
> index 15ed021f41..88d08d7277 100644
> --- a/tools/libs/light/libxl_create.c
> +++ b/tools/libs/light/libxl_create.c
> @@ -75,6 +75,7 @@ int libxl__domain_build_info_setdefault(libxl__gc *gc,
>                                          libxl_domain_build_info *b_info)
>  {
>      int i, rc;
> +    libxl_physinfo info;
>  
>      if (b_info->type != LIBXL_DOMAIN_TYPE_HVM &&
>          b_info->type != LIBXL_DOMAIN_TYPE_PV &&
> @@ -264,7 +265,18 @@ int libxl__domain_build_info_setdefault(libxl__gc *gc,
>      if (!b_info->event_channels)
>          b_info->event_channels = 1023;
>  
> -    libxl__arch_domain_build_info_setdefault(gc, b_info);
> +    rc = libxl_get_physinfo(CTX, &info);
> +    if (rc) {
> +        LOG(ERROR, "failed to get hypervisor info");
> +        return rc;
> +    }
> +
> +    rc = libxl__arch_domain_build_info_setdefault(gc, b_info, &info);
> +    if (rc) {
> +        LOG(ERROR, "unable to set domain arch build info defaults");
> +        return rc;
> +    }
> +
>      libxl_defbool_setdefault(&b_info->dm_restrict, false);
>  
>      if (b_info->iommu_memkb == LIBXL_MEMKB_DEFAULT)
> @@ -457,14 +469,6 @@ int libxl__domain_build_info_setdefault(libxl__gc *gc,
>      }
>  
>      if (b_info->max_grant_version == LIBXL_MAX_GRANT_DEFAULT) {
> -        libxl_physinfo info;
> -
> -        rc = libxl_get_physinfo(CTX, &info);
> -        if (rc) {
> -            LOG(ERROR, "failed to get hypervisor info");
> -            return rc;
> -        }
> -
>          if (info.cap_gnttab_v2)
>              b_info->max_grant_version = 2;
>          else if (info.cap_gnttab_v1)
> diff --git a/tools/libs/light/libxl_types.idl b/tools/libs/light/libxl_types.idl
> index 42ac6c357b..db5eb0a0b3 100644
> --- a/tools/libs/light/libxl_types.idl
> +++ b/tools/libs/light/libxl_types.idl
> @@ -648,6 +648,8 @@ libxl_domain_build_info = Struct("domain_build_info",[
>                                 ("vuart", libxl_vuart_type),
>                                ])),
>      ("arch_x86", Struct(None, [("msr_relaxed", libxl_defbool),
> +                               ("assisted_xapic", libxl_defbool),
> +                               ("assisted_x2apic", libxl_defbool),
>                                ])),
>      # Alternate p2m is not bound to any architecture or guest type, as it is
>      # supported by x86 HVM and ARM support is planned.
> diff --git a/tools/libs/light/libxl_x86.c b/tools/libs/light/libxl_x86.c
> index e0a06ecfe3..c377d13b19 100644
> --- a/tools/libs/light/libxl_x86.c
> +++ b/tools/libs/light/libxl_x86.c
> @@ -23,6 +23,14 @@ int libxl__arch_domain_prepare_config(libxl__gc *gc,
>      if (libxl_defbool_val(d_config->b_info.arch_x86.msr_relaxed))
>          config->arch.misc_flags |= XEN_X86_MSR_RELAXED;
>  
> +    if (d_config->c_info.type != LIBXL_DOMAIN_TYPE_PV)
> +    {
> +        if (libxl_defbool_val(d_config->b_info.arch_x86.assisted_xapic))
> +            config->arch.misc_flags |= XEN_X86_ASSISTED_XAPIC;
> +
> +        if (libxl_defbool_val(d_config->b_info.arch_x86.assisted_x2apic))
> +            config->arch.misc_flags |= XEN_X86_ASSISTED_X2APIC;
> +    }
>      return 0;
>  }
>  
> @@ -819,11 +827,27 @@ void libxl__arch_domain_create_info_setdefault(libxl__gc *gc,
>  {
>  }
>  
> -void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
> -                                              libxl_domain_build_info *b_info)
> +int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
> +                                             libxl_domain_build_info *b_info,
> +                                             const libxl_physinfo *physinfo)
>  {
>      libxl_defbool_setdefault(&b_info->acpi, true);
>      libxl_defbool_setdefault(&b_info->arch_x86.msr_relaxed, false);
> +
> +    if (b_info->type != LIBXL_DOMAIN_TYPE_PV) {
> +        libxl_defbool_setdefault(&b_info->arch_x86.assisted_xapic,
> +                             physinfo->cap_assisted_xapic);
> +        libxl_defbool_setdefault(&b_info->arch_x86.assisted_x2apic,
> +                             physinfo->cap_assisted_x2apic);
> +    }
> +

Extra newline? 'else if' should be one space after the closing
bracket.

> +    else if (!libxl_defbool_is_default(b_info->arch_x86.assisted_xapic) ||
> +             !libxl_defbool_is_default(b_info->arch_x86.assisted_x2apic)) {
> +        LOG(ERROR, "Interrupt Controller Virtualization not supported for PV");
> +        return ERROR_INVAL;
> +    }
> +
> +    return 0;
>  }
>  
>  int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
> diff --git a/tools/ocaml/libs/xc/xenctrl.ml b/tools/ocaml/libs/xc/xenctrl.ml
> index 21783d3622..672a11ceb6 100644
> --- a/tools/ocaml/libs/xc/xenctrl.ml
> +++ b/tools/ocaml/libs/xc/xenctrl.ml
> @@ -50,6 +50,8 @@ type x86_arch_emulation_flags =
>  
>  type x86_arch_misc_flags =
>  	| X86_MSR_RELAXED
> +	| X86_ASSISTED_XAPIC
> +	| X86_ASSISTED_X2APIC
>  
>  type xen_x86_arch_domainconfig =
>  {
> diff --git a/tools/ocaml/libs/xc/xenctrl.mli b/tools/ocaml/libs/xc/xenctrl.mli
> index af6ba3d1a0..f9a6aa3a0f 100644
> --- a/tools/ocaml/libs/xc/xenctrl.mli
> +++ b/tools/ocaml/libs/xc/xenctrl.mli
> @@ -44,6 +44,8 @@ type x86_arch_emulation_flags =
>  
>  type x86_arch_misc_flags =
>    | X86_MSR_RELAXED
> +  | X86_ASSISTED_XAPIC
> +  | X86_ASSISTED_X2APIC
>  
>  type xen_x86_arch_domainconfig = {
>    emulation_flags: x86_arch_emulation_flags list;
> diff --git a/tools/ocaml/libs/xc/xenctrl_stubs.c b/tools/ocaml/libs/xc/xenctrl_stubs.c
> index e0d49b18d2..ecfc7125d5 100644
> --- a/tools/ocaml/libs/xc/xenctrl_stubs.c
> +++ b/tools/ocaml/libs/xc/xenctrl_stubs.c
> @@ -239,7 +239,7 @@ CAMLprim value stub_xc_domain_create(value xch, value wanted_domid, value config
>  
>  		cfg.arch.misc_flags = ocaml_list_to_c_bitmap
>  			/* ! x86_arch_misc_flags X86_ none */
> -			/* ! XEN_X86_ XEN_X86_MSR_RELAXED all */
> +			/* ! XEN_X86_ XEN_X86_ASSISTED_X2APIC max */
>  			(VAL_MISC_FLAGS);
>  
>  #undef VAL_MISC_FLAGS
> diff --git a/tools/xl/xl.c b/tools/xl/xl.c
> index 2d1ec18ea3..31eb223309 100644
> --- a/tools/xl/xl.c
> +++ b/tools/xl/xl.c
> @@ -57,6 +57,8 @@ int max_grant_frames = -1;
>  int max_maptrack_frames = -1;
>  int max_grant_version = LIBXL_MAX_GRANT_DEFAULT;
>  libxl_domid domid_policy = INVALID_DOMID;
> +int assisted_xapic = -1;
> +int assisted_x2apic = -1;
>  
>  xentoollog_level minmsglevel = minmsglevel_default;
>  
> @@ -201,6 +203,12 @@ static void parse_global_config(const char *configfile,
>      if (!xlu_cfg_get_long (config, "claim_mode", &l, 0))
>          claim_mode = l;
>  
> +    if (!xlu_cfg_get_long (config, "assisted_xapic", &l, 0))
> +        assisted_xapic = l;
> +
> +    if (!xlu_cfg_get_long (config, "assisted_x2apic", &l, 0))
> +        assisted_x2apic = l;
> +
>      xlu_cfg_replace_string (config, "remus.default.netbufscript",
>          &default_remus_netbufscript, 0);
>      xlu_cfg_replace_string (config, "colo.default.proxyscript",
> diff --git a/tools/xl/xl.h b/tools/xl/xl.h
> index c5c4bedbdd..528deb3feb 100644
> --- a/tools/xl/xl.h
> +++ b/tools/xl/xl.h
> @@ -286,6 +286,8 @@ extern libxl_bitmap global_vm_affinity_mask;
>  extern libxl_bitmap global_hvm_affinity_mask;
>  extern libxl_bitmap global_pv_affinity_mask;
>  extern libxl_domid domid_policy;
> +extern int assisted_xapic;
> +extern int assisted_x2apic;
>  
>  enum output_format {
>      OUTPUT_FORMAT_JSON,
> diff --git a/tools/xl/xl_parse.c b/tools/xl/xl_parse.c
> index 117fcdcb2b..0ab9b145fe 100644
> --- a/tools/xl/xl_parse.c
> +++ b/tools/xl/xl_parse.c
> @@ -1681,6 +1681,22 @@ void parse_config_data(const char *config_source,
>          xlu_cfg_get_defbool(config, "vpt_align", &b_info->u.hvm.vpt_align, 0);
>          xlu_cfg_get_defbool(config, "apic", &b_info->apic, 0);
>  
> +        e = xlu_cfg_get_long(config, "assisted_xapic", &l , 0);
> +        if ((e == ESRCH && assisted_xapic != -1)) /* use global default if present */
> +            libxl_defbool_set(&b_info->arch_x86.assisted_xapic, assisted_xapic);
> +        else if (!e)
> +            libxl_defbool_set(&b_info->arch_x86.assisted_xapic, l);
> +        else
> +            exit(1);
> +
> +        e = xlu_cfg_get_long(config, "assisted_x2apic", &l, 0);
> +        if ((e == ESRCH && assisted_x2apic != -1)) /* use global default if present */
> +            libxl_defbool_set(&b_info->arch_x86.assisted_x2apic, assisted_x2apic);
> +        else if (!e)
> +            libxl_defbool_set(&b_info->arch_x86.assisted_x2apic, l);
> +        else
> +            exit(1);
> +
>          switch (xlu_cfg_get_list(config, "viridian",
>                                   &viridian, &num_viridian, 1))
>          {
> diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c
> index a5048ed654..bcca0dc900 100644
> --- a/xen/arch/x86/domain.c
> +++ b/xen/arch/x86/domain.c
> @@ -619,6 +619,8 @@ int arch_sanitise_domain_config(struct xen_domctl_createdomain *config)
>      bool hvm = config->flags & XEN_DOMCTL_CDF_hvm;
>      bool hap = config->flags & XEN_DOMCTL_CDF_hap;
>      bool nested_virt = config->flags & XEN_DOMCTL_CDF_nested_virt;
> +    bool assisted_xapic = config->arch.misc_flags & XEN_X86_ASSISTED_XAPIC;
> +    bool assisted_x2apic = config->arch.misc_flags & XEN_X86_ASSISTED_X2APIC;
>      unsigned int max_vcpus;
>  
>      if ( hvm ? !hvm_enabled : !IS_ENABLED(CONFIG_PV) )
> @@ -685,13 +687,31 @@ int arch_sanitise_domain_config(struct xen_domctl_createdomain *config)
>          }
>      }
>  
> -    if ( config->arch.misc_flags & ~XEN_X86_MSR_RELAXED )
> +    if ( config->arch.misc_flags & ~(XEN_X86_MSR_RELAXED |
> +                                     XEN_X86_ASSISTED_XAPIC |
> +                                     XEN_X86_ASSISTED_X2APIC) )
>      {
>          dprintk(XENLOG_INFO, "Invalid arch misc flags %#x\n",
>                  config->arch.misc_flags);
>          return -EINVAL;
>      }
>  
> +    if ( (assisted_xapic || assisted_x2apic) && !hvm )
> +    {
> +        dprintk(XENLOG_INFO,
> +                "Interrupt Controller Virtualization not supported for PV\n");
> +        return -EINVAL;
> +    }
> +
> +    if ( (assisted_xapic && !assisted_xapic_available) ||
> +         (assisted_x2apic && !assisted_x2apic_available) )
> +    {
> +        dprintk(XENLOG_INFO,
> +                "Hardware assisted x%sAPIC requested but not available\n",
> +                assisted_xapic && !assisted_xapic_available ? "" : "2");
> +        return -EINVAL;

I think for those two you could return -ENODEV if others agree.

> +    }
> +
>      return 0;
>  }
>  
> @@ -864,6 +884,12 @@ int arch_domain_create(struct domain *d,
>  
>      d->arch.msr_relaxed = config->arch.misc_flags & XEN_X86_MSR_RELAXED;
>  
> +    d->arch.hvm.assisted_xapic =
> +        config->arch.misc_flags & XEN_X86_ASSISTED_XAPIC;
> +
> +    d->arch.hvm.assisted_x2apic =
> +        config->arch.misc_flags & XEN_X86_ASSISTED_X2APIC;
> +
>      return 0;
>  
>   fail:
> diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
> index 06831099ed..e4503a02a7 100644
> --- a/xen/arch/x86/hvm/vmx/vmcs.c
> +++ b/xen/arch/x86/hvm/vmx/vmcs.c
> @@ -1157,6 +1157,10 @@ static int construct_vmcs(struct vcpu *v)
>          __vmwrite(PLE_WINDOW, ple_window);
>      }
>  
> +    if ( !has_assisted_xapic(v->domain) )
> +        v->arch.hvm.vmx.secondary_exec_control &=
> +            ~SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES;
> +
>      if ( cpu_has_vmx_secondary_exec_control )
>          __vmwrite(SECONDARY_VM_EXEC_CONTROL,
>                    v->arch.hvm.vmx.secondary_exec_control);
> diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
> index c075370f64..949ddd684c 100644
> --- a/xen/arch/x86/hvm/vmx/vmx.c
> +++ b/xen/arch/x86/hvm/vmx/vmx.c
> @@ -3344,16 +3344,11 @@ static void vmx_install_vlapic_mapping(struct vcpu *v)
>  
>  void vmx_vlapic_msr_changed(struct vcpu *v)
>  {
> -    int virtualize_x2apic_mode;
>      struct vlapic *vlapic = vcpu_vlapic(v);
>      unsigned int msr;
>  
> -    virtualize_x2apic_mode = ( (cpu_has_vmx_apic_reg_virt ||
> -                                cpu_has_vmx_virtual_intr_delivery) &&
> -                               cpu_has_vmx_virtualize_x2apic_mode );
> -
> -    if ( !cpu_has_vmx_virtualize_apic_accesses &&
> -         !virtualize_x2apic_mode )
> +    if ( !has_assisted_xapic(v->domain) &&
> +         !has_assisted_x2apic(v->domain) )
>          return;
>  
>      vmx_vmcs_enter(v);
> @@ -3363,7 +3358,7 @@ void vmx_vlapic_msr_changed(struct vcpu *v)
>      if ( !vlapic_hw_disabled(vlapic) &&
>           (vlapic_base_address(vlapic) == APIC_DEFAULT_PHYS_BASE) )
>      {
> -        if ( virtualize_x2apic_mode && vlapic_x2apic_mode(vlapic) )
> +        if ( has_assisted_x2apic(v->domain) && vlapic_x2apic_mode(vlapic) )
>          {
>              v->arch.hvm.vmx.secondary_exec_control |=
>                  SECONDARY_EXEC_VIRTUALIZE_X2APIC_MODE;
> @@ -3384,7 +3379,7 @@ void vmx_vlapic_msr_changed(struct vcpu *v)
>                  vmx_clear_msr_intercept(v, MSR_X2APIC_SELF, VMX_MSR_W);
>              }
>          }
> -        else
> +        else if ( has_assisted_xapic(v->domain) )
>              v->arch.hvm.vmx.secondary_exec_control |=
>                  SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES;
>      }
> diff --git a/xen/arch/x86/include/asm/hvm/domain.h b/xen/arch/x86/include/asm/hvm/domain.h
> index 698455444e..92bf53483c 100644
> --- a/xen/arch/x86/include/asm/hvm/domain.h
> +++ b/xen/arch/x86/include/asm/hvm/domain.h
> @@ -117,6 +117,12 @@ struct hvm_domain {
>  
>      bool                   is_s3_suspended;
>  
> +    /* xAPIC hardware assisted virtualization. */
> +    bool                   assisted_xapic;
> +
> +    /* x2APIC hardware assisted virtualization. */
> +    bool                   assisted_x2apic;
> +
>      /* hypervisor intercepted msix table */
>      struct list_head       msixtbl_list;
>  
> diff --git a/xen/arch/x86/include/asm/hvm/vmx/vmcs.h b/xen/arch/x86/include/asm/hvm/vmx/vmcs.h
> index 9119aa8536..5b7d662ed7 100644
> --- a/xen/arch/x86/include/asm/hvm/vmx/vmcs.h
> +++ b/xen/arch/x86/include/asm/hvm/vmx/vmcs.h
> @@ -220,6 +220,9 @@ void vmx_vmcs_reload(struct vcpu *v);
>  #define CPU_BASED_ACTIVATE_SECONDARY_CONTROLS 0x80000000
>  extern u32 vmx_cpu_based_exec_control;
>  
> +#define has_assisted_xapic(d)   ((d)->arch.hvm.assisted_xapic)
> +#define has_assisted_x2apic(d)  ((d)->arch.hvm.assisted_x2apic)

Those macros should not be in an Intel specific header,
arch/x86/include/asm/hvm/domain.h is likely a better place.

> +
>  #define PIN_BASED_EXT_INTR_MASK         0x00000001
>  #define PIN_BASED_NMI_EXITING           0x00000008
>  #define PIN_BASED_VIRTUAL_NMIS          0x00000020
> diff --git a/xen/arch/x86/traps.c b/xen/arch/x86/traps.c
> index a2278d9499..a0c6b89a88 100644
> --- a/xen/arch/x86/traps.c
> +++ b/xen/arch/x86/traps.c
> @@ -1121,7 +1121,8 @@ void cpuid_hypervisor_leaves(const struct vcpu *v, uint32_t leaf,
>          if ( !is_hvm_domain(d) || subleaf != 0 )
>              break;
>  
> -        if ( cpu_has_vmx_apic_reg_virt )
> +        if ( cpu_has_vmx_apic_reg_virt &&
> +             has_assisted_xapic(d) )
>              res->a |= XEN_HVM_CPUID_APIC_ACCESS_VIRT;
>  
>          /*
> @@ -1130,9 +1131,9 @@ void cpuid_hypervisor_leaves(const struct vcpu *v, uint32_t leaf,
>           * and wrmsr in the guest will run without VMEXITs (see
>           * vmx_vlapic_msr_changed()).
>           */
> -        if ( cpu_has_vmx_virtualize_x2apic_mode &&
> -             cpu_has_vmx_apic_reg_virt &&
> -             cpu_has_vmx_virtual_intr_delivery )
> +        if ( cpu_has_vmx_apic_reg_virt &&
> +             cpu_has_vmx_virtual_intr_delivery &&
> +             has_assisted_x2apic(d) )

This will result in less code changes if you just replace
cpu_has_vmx_virtualize_x2apic_mode with has_assisted_x2apic(d).

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 12:12:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 12:12:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286777.486405 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRYgs-0004Gb-Ng; Tue, 08 Mar 2022 12:11:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286777.486405; Tue, 08 Mar 2022 12:11:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRYgs-0004GU-Kg; Tue, 08 Mar 2022 12:11:46 +0000
Received: by outflank-mailman (input) for mailman id 286777;
 Tue, 08 Mar 2022 12:11:44 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fWwI=TT=citrix.com=prvs=059ab6e88=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRYgq-0004GO-Eb
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 12:11:44 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e92f5f58-9ed8-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 13:11:42 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e92f5f58-9ed8-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646741501;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=jrnMhiM5/yuSLSYE5+yZrcEhrPJesRn/SNu57zDKZ2w=;
  b=I2sDHqibQRWJPhKH1oxCisWqhzbMb3GikgFYFf8W939y3WE3J8cbGtyi
   Tc+TZOX64MXY7pKDQS9bE/bzp0bex1MbSVjB2cKPYw6Zpca0ARUz7HL2i
   LnkLyg1YVbDpnrxldG3QmIcxuzcolQHFs23uHxnoEbL2Vdl72UFqX9H5w
   Y=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 68046791
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:GeKSpaM6PqcODXDvrR2zl8FynXyQoLVcMsEvi/4bfWQNrUoj1T1Sm
 jBJWzrQaKrYNzP8L4pxO4q080pS7Z6AytdiTwto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi2t4w2LBVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Z1
 OtLh6DqFQQQMY7TpPQ8SkVmEC8kIvgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALNs7kMZlZonh95TrYEewnUdbIRKCiCdpwgmdo2p4RTK+2i
 8wxcwU1bEnyIDp2H2wLJLQTubiavEnwbGgNwL6SjfVuuDWCpOBr65DyNPLFd9rMQt9a9m6Iq
 2SD82nnDxUyMN2E1SHD4n+qnvXIny7wRMQVDrLQ3vxgjUCXx2cTIAYLTlb9qv684nNSQPoGd
 RZSoHB36/Fvqgr7FbERQiFUvlaYgBguZ4AMENQ1yx6x2ovNvziaCDIbG2sphMMdiOc6Qjkj1
 1msltzvBCByvLD9dU9x5ot4vhvpZ3FLcDZqiTssCFJcvoK9+N1bYgfnE447eJNZmOEZDt0ZL
 9qiiCElz4segscQv0lQ1QCW2mn8znQlo+Nc2+k2Yo5Hxl4hDGJGT9bxgbQ+0RqmBNzBJrVml
 CJY8/VyFMhUUfmweNWlGY3h5o2B6fefKyH7ilVyBZQn/DnF0yf9Id4Ov2Ejfx45b51sldrVj
 Kn741g5CHh7ZifCUEOKS9jpV5RCIVbIT7wJqcw4nvIRO8MsJWdrDQllZFKK3nCFraTfufpXB
 HtvSu71VSxyIf0+lFKeHr5BuZd2lnFW7T6CHvjTkkX4uYdykVbIEN/pxnPVNbtnhE5FyS2Im
 +ti2zyil00PALegM3OMreb+7zkidBAGOHw/kOQOHsarKQt6AmAxTfjXxLIqYYt+mKpJ0OzP+
 xmAtoVwlDITWVWvxd22V01e
IronPort-HdrOrdr: A9a23:JCdkk6sffZouwOXSWWQwjmx87skClIMji2hC6mlwRA09TyXGra
 +TdaUguSMc1gx9ZJhBo7G90KnpewK6yXdQ2/hqAV7EZniahILIFvAY0WKG+VPd8kLFh4xgPM
 tbAs1D4ZjLfCRHZKXBkXiF+rQbsaC6GcmT7I+0pRcdLj2CKZsQlzuRYjzrbHGeLzM2Y6bReq
 Dsgvau8FGbCAsqh4mAdzE4dtmGg+eOuIPtYBYACRJiwA6SjQmw4Lq/NxSDxB8RXx5G3L9nqA
 H+4kbEz5Tml8v+5g7X1mfV4ZgTsNz9yuFbDMjJrsQOMD3jhiuheYwkcbyfuzIepv2p9T8R4Z
 LxiiZlG/42x2Laf2mzrxeo8w780Aw243un8lOciWuLm72PeBsKT+56wa5JeBrQ7EQt+Ptm1r
 hQ4m6fv51LSTvdgSXU/bHzJl5Xv3vxhUBnvf8YjnRZX4dbQqRWt5Yj8ERcF4pFND7m6bogDP
 JlAKjnlbprmGuhHjHkV1RUsZyRtixZJGbEfqFCgL3Z79FupgE286NCr/Zv3Evp9/oGOu15Dq
 r/Q+FVfYp1P7wrhJJGdZc8qPSMex7wqDL3QRSvyAfcZeg600ykke+D3Fxy3pDvRKA1
X-IronPort-AV: E=Sophos;i="5.90,164,1643691600"; 
   d="scan'208";a="68046791"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Os4bKxrhNBUkYwyRxCXNMuhIoJztkddFmbu+2vc1fYGs4gK9XasWnoKIMWiQ8rxmnvGDJHrmqBK9W1fsi3+mFl6OzM0Afzg4jE5eOnluYgG9Ua73Bo+svDaG7PEJDzX3nYjwNzDH5U4iOhvsuSbE0DVtkmEcmVNjcAh5EkycXodckXUiXKE8OrCss7yfyDc8unOLsrrCXu2ox0PgU0T89vxUL2pmS0p428q7eQ5unTv7aqPTUtXf3d6it/4dQDlCfw03t+lZ87llYMi6KtdolrkTWUa96ymMQkkW72o8BMlRdol2emFvfibVinTfI022yWfiSYcpoKHz/6yEHcv9cQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=2XhK1Bf8Jdjwmh0Gg7nwadCc7ANgqxa5bytjkrcWg84=;
 b=fpRWfgzb2gvPJpRUbfE0VETDYtiX4s8UCEBWRJWRGnusxnC3fnPR+WvzKRsK0p03p7gfBWtYWpxzcd3XxrRcULAYtMeMX6tCDgtvpEY6prFSG70ONONI1ZWENIblv8itGhdZzpS/KWQLMexQa4x7g4rrQy/BLSX7ASlXEf0C9r7b8kyIg3AogLsSTAeLui0wphb9Q+tihR3OSpLWSNJXo0GHCyKSFhsb2pMLXZnmU7ghJ3uP4P+t9chB80e3JB30pbjQgPfDwwit2QCSAxyH7NTfZIN9DeGs4XPcqIMyFJp2/bd89FaYsKA36wOAV3Z2tZ0ujMWrQmvp6ZQMmulwzw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=2XhK1Bf8Jdjwmh0Gg7nwadCc7ANgqxa5bytjkrcWg84=;
 b=WdS0FkFUcghEVHD8kwNR03ca5+YxZri4rLI7fZsyP/lZxjRfIbLm54yhypm9dV/Y/849+cC3uHtUTalMzZctRJ8kZG0zIckC7M1Jar7peCbbtpOtoZIqSxjq0gC/D6/pE4M9IYsc8++r9D/pO4iplzpPdYEedO2/5xwnbQLk4Uk=
Date: Tue, 8 Mar 2022 13:11:32 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Andrew
 Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH v2] x86/build: use --orphan-handling linker option if
 available
Message-ID: <YidH9La8I4X+M2S5@Air-de-Roger>
References: <289684f6-fa73-bf02-137c-680ad8891640@suse.com>
 <YicsK8xqdcGZYaIn@Air-de-Roger>
 <0cde8972-b357-e2c0-ccc4-a0720cfb3501@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <0cde8972-b357-e2c0-ccc4-a0720cfb3501@suse.com>
X-ClientProxiedBy: LO4P123CA0301.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:196::18) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ea8ce24c-295c-4e78-719c-08da00fccb57
X-MS-TrafficTypeDiagnostic: SN6PR03MB3695:EE_
X-Microsoft-Antispam-PRVS: <SN6PR03MB3695A5ED9ED1E3987055A8408F099@SN6PR03MB3695.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: iXtEsIZNaCmNtVuTDnKcJO8cxSi6tOSgy7c103tl1LokCVlSLpSDYtDdWh9RjsMBT3YDPpgFRLgqcFDe+v57SmSDHEqp7A35ZpX3b23Ao0QQEX5k1AIbvBAqrtPe6kDOrG6tIGUPp/UPobWmrZSOlUJVYlPDS+Fes6C6b06+0kXtAwnx8YK9F1Z7UlhTyMvknxEMGi77b36cF3e7t04hgtT3aUCW1P3cM5CsXlnnbVFfRkkXYetNFwxiYlgzVk5JYLlv66OOODzepJHX3gleQbXo0gmoXPZ3d2kItflEAV3dSvUrTVRo6Yv429VbKNUoyOv6npDYCxQZd2oyJyRDQaiBrxxTHtIUh2Fz+hFpS3JLJoDN/BP+2xiN8NrzdzGNSYn5AYz7L4MJbc/ZzfgMLNwC/RLJwtkbULU2ZY4rIbnjfpkBoIggUyLEom8mRSHLXjZqA2gRLjgCA78rn6s0WT8qJEpxv2Tvn0y+VliaelvMEw7k32S3ED3dv3YXUyU7+RhkHtc70tqG0jsZSMvaOMWmyr0q/oF16xzmx12bs73SGArHmmfyY1zBkX8nyojCUtp/T4ALsX5hZKnlQQio1Oh13rylST6zz6YM80SQDsi/ZjA7eYnuuAVTF9SsxsgJzZlXmqhDxgbQBqQNWnE7Akf07NccRu9f/QfUg/ImlCfsYdEHIpWIW2DVTkkA1l4dHNo4adqS9rmc4mgKGQkrBQ==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(85182001)(8936002)(316002)(2906002)(33716001)(508600001)(54906003)(9686003)(6512007)(6916009)(6486002)(53546011)(6506007)(5660300002)(6666004)(82960400001)(38100700002)(86362001)(26005)(186003)(8676002)(66476007)(66556008)(66946007)(4326008)(83380400001)(67856001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?cHVsczJ4N1k4ZzRFWDVQN0x0SWordnJWV1BmMTJTR1kxTm5jQzRhZTNyR2JG?=
 =?utf-8?B?bldqdXV6ZnZ3K2dqRnpxckR1OW5mVzJXeGc4YWxNMURwZkxMa3o3VTM4VUdQ?=
 =?utf-8?B?OXlXSGdaZHU3elB5N0JJemZkcGFyQmtMYXJuTUNaQ08xdzFzUlVQUG9sNHZm?=
 =?utf-8?B?dUJYb0x4S1BiMUJmRmRkbDRIQmZXWjdXbThTZURKZFVrdjlMNFBVSHpISlI4?=
 =?utf-8?B?SXRJV2k1OGpJZktWQmEyOGY1eDJKMnpaU2k5ZDZreTZuMm9GaG0vd1JHNitF?=
 =?utf-8?B?c3lxeTBvdGtZSnd2VGFXbnZETmpCOVkrbG5vTjdLZWU1OXduNktqcXYzMTBK?=
 =?utf-8?B?YzBNVkN4cXNCankwazR4Ni8zc2FkZEIxb1VNelVyMUdpTnVRa3hTZEFuQWZW?=
 =?utf-8?B?ZS90cWpMeWZjUlVONk5TMTlGQy9UV25hc1lhMFhNV3RRVXQ2NlZtdFlVZWhU?=
 =?utf-8?B?ODNZTWJ2TEJKNThCZUVkNndNTkVVZzdLZFMrSnpHdk9STFh0VDl3cGVrZUZj?=
 =?utf-8?B?MGNxbWtBV3Q0VkN0TStKK2M4N1diQjNRak5wbFFnUHg3WDJGazNWaE1jMGUx?=
 =?utf-8?B?U0NZKzFicURubmtITVZuVDlqV2V2V3loZlpGTzdSaWdNK3h5VmlHdVRPeTZS?=
 =?utf-8?B?UU5FV0M0M1VzZ0lyY2hrRkE4eXhjd2NTUVF5ZHNTeFQ5RElRb2hpc2YzTE5G?=
 =?utf-8?B?T2NYN1BZUzhhQlRMQS9RdDE1VXpBOHZLelVKNmJaSXNtVU9OZFU4N2NRZUtZ?=
 =?utf-8?B?S0FTNzVZamVGK2Q3c0RoVCtyaHBNcEU0a3hBOGw4NHpZVS9jaGJReDltV0o5?=
 =?utf-8?B?enhPbE9KNUJmUUMyRS83dVBTdnA3RDByWHZ6NWVESloyUGxLNE05VUFaQkhz?=
 =?utf-8?B?VC9nQVZDYk9sYW4rQWtGc3AzUyttSzYrMEtoWC9VOFJyKzZ5Y0UzdGlrWHll?=
 =?utf-8?B?c21mWmxKeGpRbDhjd3k1MjFFYzFxdVRDMS90bnRXcUNiNll6OGtKZTVGZGpI?=
 =?utf-8?B?akVib1hkZzdCeUZnTHh3Y25DQXRqYmdqMy9BNmZNZTZ3enBPNmtmK0QxdFA1?=
 =?utf-8?B?di9tejJyNU42NXVjeXdWSWJQc1FTc2lvaW5hbnliRGdRbUZTUG5RYjRpZU9t?=
 =?utf-8?B?Q1BKakxRSXJ4UHQyZ0Y0L3FmaVJVdWdTT0k1VmpNYUNVV0FlMXhLTlpmMGlh?=
 =?utf-8?B?MnpIdHlOOW82b1ZRTGhGWThVRXp4YXhwUE5FT1F5L0NadWVGMkFUMEhUMDVE?=
 =?utf-8?B?aWdyUC81YXdLTGhmK2ttc1p2UUc1TysrN2tmVWdzb096c0xycWczSU9wWlRU?=
 =?utf-8?B?US9vRVBmbGt1SmJZeHJCN3hTNy9sWGh4RVZuR2ZlL05idjZ1V000Sm85OWpC?=
 =?utf-8?B?YkMyKzRkb09JQ2grR29OanowckNqVG4walA3SEYxSWVjQmFIS0c0Y2gwUHFM?=
 =?utf-8?B?RzRTczA4QWIwTHJiSVRVMVFLSFZCQW5DaStzV0doTFpRZ2xQZWNtRlpHUzZL?=
 =?utf-8?B?cGVJT0NGYWJGMFpOMmh4VkNjSGEzZDFjZHJ6bG9jZzhSU09iVnNKc25SVFBl?=
 =?utf-8?B?RUFybXBjTTlwbVFkdk1uanZNMkJXQm1UUDJLd2I4WFpsdGJhWVlxOGFwRU9y?=
 =?utf-8?B?SW02YUdwSlhlZ3JLTGQvVFo3VHNSNStvSUJ3bkVneEk0OXM4U3RKWTBsa01C?=
 =?utf-8?B?TnJQQ1RuRG1pOUFsUDh6dlZ4Y05FN280K0pXMHVuZ3lhZkQ3S2RCWWhrT1lx?=
 =?utf-8?B?N09UUHJxMDJBdmg5dndrVUZsWk0yVDFCWDRiQktidGVvTklpdk9tWGNXbHVs?=
 =?utf-8?B?Z2FQbjdtTXBNSVpHczE5M1VDSnZDK3RJcHdGZ01oUFhXNm0wQzRxcEhoenpj?=
 =?utf-8?B?a1E1TFF0b3Nad1JHZDIrVytxY2xMWlRYVjkvRGZEaG0rcTAxdWFWaE1IVzZP?=
 =?utf-8?B?Rzdud3Q1VVBTUVNaSVNweEtCVnBjeXBJS1FpK1VDa2I4Y3dldHRtOERpenFS?=
 =?utf-8?B?K292TTFnOXRxLzV3WkJNVktqZHFvdG83SkgyQ0F1SFREM1czNVh3SnI4ZnBr?=
 =?utf-8?B?VUlISEpPMjQ0a2diL3k3RVZKV1llcTFtTzg4MW13WVI1M2pvZ3dZZFRXQlVw?=
 =?utf-8?B?TUJHbDJQZzlTWUFrcDlRRHJBalpWYlNWeUhib0RUeUpjYkdyQXlMNnZZWUFX?=
 =?utf-8?Q?KWtkg6pgZvMxFywFOUIUqX0=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: ea8ce24c-295c-4e78-719c-08da00fccb57
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 12:11:37.1654
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: VN3ygSCWqYlKr9vxsOXKuD+RYuRezfW6bHVxmeixKlNqyYdBmPrFDcRVRvSsoQ7OsSAc0NCdW1P5iBvdOUHStw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR03MB3695
X-OriginatorOrg: citrix.com

On Tue, Mar 08, 2022 at 12:15:04PM +0100, Jan Beulich wrote:
> On 08.03.2022 11:12, Roger Pau Monné wrote:
> > On Mon, Mar 07, 2022 at 02:53:32PM +0100, Jan Beulich wrote:
> >> As was e.g. making necessary 4b7fd8153ddf ("x86: fold sections in final
> >> binaries"), arbitrary sections appearing without our linker script
> >> placing them explicitly can be a problem. Have the linker make us aware
> >> of such sections, so we would know that the script needs adjusting.
> >>
> >> To deal with the resulting warnings:
> >> - Retain .note.* explicitly for ELF, and discard all of them (except the
> >>   earlier consumed .note.gnu.build-id) for PE/COFF.
> >> - Have explicit statements for .got, .plt, and alike and add assertions
> >>   that they're empty. No output sections will be created for these as
> >>   long as they remain empty (or else the assertions would cause early
> >>   failure anyway).
> >> - Collect all .rela.* into a single section, with again an assertion
> >>   added for the resulting section to be empty.
> >> - Extend the enumerating of .debug_* to ELF. Note that for Clang adding
> >>   of .debug_macinfo is necessary. Amend this by its Dwarf5 counterpart,
> >>   .debug_macro, then as well (albeit more may need adding for full
> >>   coverage).
> >>
> >> Suggested-by: Roger Pau Monné <roger.pau@citrix.com>
> >> Signed-off-by: Jan Beulich <jbeulich@suse.com>
> > 
> > LGTM, just two questions.
> 
> Sure, just that ...
> 
> >> @@ -19,6 +26,8 @@ ENTRY(efi_start)
> >>  
> >>  #define FORMAT "elf64-x86-64"
> >>  #define DECL_SECTION(x) #x : AT(ADDR(#x) - __XEN_VIRT_START)
> >> +#define DECL_DEBUG(x, a) #x 0 : { *(x) }
> >> +#define DECL_DEBUG2(x, y, a) #x 0 : { *(x) *(y) }
> > 
> > Would it be helpful to place those in a 
> 
> ... you may have had a 3rd one?

Oh, no, I just forgot to remove this. I was going to ask whether we
could place those in something akin to a PT_NOLOAD program section,
but that doesn't exist AFAICT (and even if possible would require
adjustments to mkelf32).

> 
> >> @@ -179,6 +188,13 @@ SECTIONS
> >>  #endif
> >>  #endif
> >>  
> >> +#ifndef EFI
> >> +  /* Retain these just for the purpose of possible analysis tools. */
> >> +  DECL_SECTION(.note) {
> >> +       *(.note.*)
> >> +  } PHDR(note) PHDR(text)
> > 
> > Wouldn't it be enough to place it in the note program header?
> > 
> > The buildid note is already placed in .rodata, so any remaining notes
> > don't need to be in a LOAD section?
> 
> All the notes will be covered by the NOTE phdr. I had this much later
> in the script originally, but then the NOTE phdr covered large parts of
> .init.*. Clearly that yields invalid notes, which analysis (or simple
> dumping) tools wouldn't be happy about. We might be able to add 2nd
> NOTE phdr, but mkelf32 assumes exactly 2 phdrs if it finds more than
> one, so changes there would likely be needed then (which I'd like to
> avoid for the moment). I'm also not sure in how far tools can be
> expected to look for multiple NOTE phdrs ...

But if we are adding a .note section now we might as well merge it
with .note.gnu.build-id:

  DECL_SECTION(.note) {
       __note_gnu_build_id_start = .;
       *(.note.gnu.build-id)
       __note_gnu_build_id_end = .;
       *(.note.*)
  } PHDR(note) PHDR(text)

And drop the .note.Xen section?

> >> +#endif
> >> +
> >>    _erodata = .;
> >>  
> >>    . = ALIGN(SECTION_ALIGN);
> >> @@ -266,6 +282,32 @@ SECTIONS
> >>         __ctors_end = .;
> >>    } PHDR(text)
> >>  
> >> +#ifndef EFI
> >> +  /*
> >> +   * With --orphan-sections=warn (or =error) we need to handle certain linker
> >> +   * generated sections. These are all expected to be empty; respective
> >> +   * ASSERT()s can be found towards the end of this file.
> >> +   */
> >> +  DECL_SECTION(.got) {
> >> +       *(.got)
> >> +  } PHDR(text)
> >> +  DECL_SECTION(.got.plt) {
> >> +       *(.got.plt)
> >> +  } PHDR(text)
> >> +  DECL_SECTION(.igot.plt) {
> >> +       *(.igot.plt)
> >> +  } PHDR(text)
> >> +  DECL_SECTION(.iplt) {
> >> +       *(.iplt)
> >> +  } PHDR(text)
> >> +  DECL_SECTION(.plt) {
> >> +       *(.plt)
> >> +  } PHDR(text)
> >> +  DECL_SECTION(.rela) {
> >> +       *(.rela.*)
> >> +  } PHDR(text)
> > 
> > Why do you need to explicitly place those in the text program header?
> 
> I guess that's largely for consistency with all other directives. With the
> assertions that these need to be empty, we might get away without, as long
> as no linker would decide to set up another zero-size phdr for them.

We already set the debug sections to not be part of any program header
and seem to get away with it. I'm not sure how different the sections
handled below would be, linkers might indeed want to place them
regardless?

If so it might be good to add a comment that while those should be
empty (and thus don't end up in any program header) we assign them to
the text one in order to avoid the linker from creating a new program
header for them.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 12:24:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 12:24:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286783.486417 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRYtD-0005tU-SI; Tue, 08 Mar 2022 12:24:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286783.486417; Tue, 08 Mar 2022 12:24:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRYtD-0005tN-PL; Tue, 08 Mar 2022 12:24:31 +0000
Received: by outflank-mailman (input) for mailman id 286783;
 Tue, 08 Mar 2022 12:24:30 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRYtC-0005tH-Lc
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 12:24:30 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b345e43c-9eda-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 13:24:29 +0100 (CET)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04lp2055.outbound.protection.outlook.com [104.47.13.55]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-39-Ca8O6UlrPZmd45MEsSELXw-1; Tue, 08 Mar 2022 13:24:27 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM8PR04MB7476.eurprd04.prod.outlook.com (2603:10a6:20b:1d1::23)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Tue, 8 Mar
 2022 12:24:26 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 12:24:25 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b345e43c-9eda-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646742268;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=0LL8PMLRbKF+XTB52/yKyvFWshAaeLbt0/KuJDKP3pg=;
	b=Fy7X2e7EnoohSU4VM48kJeonZueKCfFbLBtNf71qryRYrTHRc30z9GCiNSVyers5x7Kajk
	zMJQvEdhQwqPT834DWuapA/mSJ9EbRNnDfoehDmSVTYF3gTsS14WzryXEUtcFTgqPDE3wL
	vYR4LLT++7G67DrwXPapkdQet7zLVZQ=
X-MC-Unique: Ca8O6UlrPZmd45MEsSELXw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=iB7xqxg8ZOxUhm5vUsRgNEQSkfprWW/uO5UPXn1asFi2wG81D9pNvjp1Wpm/cz49Np8sxvbQKZ95HLEOTtg5ZiJdmdyYEOQvCdKMSgwMNhm3KdSkFfmZZ6kokEOkc/MX2O354Xy8yudbeRSuQ2bEG8Mm/9jnavTEH5KKPTH98nfznO7QS5rjJD163BlE6mFrbQTN+gxPuxesVgMDyRNxeb8ZmNojdcTQfPpkaBrgwdTTmhMPtGUgMaUBfjwQINxVCFiQI7S/OXsroXVU0TxtOQvFFeFHd2fLqrIggkNcL+/XoUTK9t52TejH93j07vkNoADzPKS/sw7R/nfQRG5zrQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=REOBaqC8Z6Bo9aQ9/1S6EGs+ehrv4TdB7erO7x5Q6Og=;
 b=Hhq6teKqQM4V3V7+oXialz43/WLsepeAL41R9kHWlGdVPBj25yYY6Jq5OxKCO/hI9oNWHEfxxnpQRdMJ9AJ5tTwdS/HvvW00vvWfJI4MHJW/wH6l0GIjuEPmuSDptH1LRoqiOpVNltQMkzrVPcWYtNjkyS/16vHjBs2urr2ieVDxOJS79Lk0ucphMZKGtC9MGhCWj3TqtjoS4X6lnj/PeGMPU356Fz3dJ6AXjNkHsphBFDDIUA0P9k9Eb495ObgkZk1n+KlT6uTBEephFjENI13kAPA7/xuSj5lWuejKNyEWs35rgJcarK3gaHAIBopUbKbPmN/PClIsUgE3IEQETQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <b633f92a-151f-c7ca-0d91-cfad8d2edcbe@suse.com>
Date: Tue, 8 Mar 2022 13:24:23 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v5 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Jane Malalane <jane.malalane@citrix.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>,
 Anthony PERARD <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Christian Lindig <christian.lindig@citrix.com>, David Scott
 <dave@recoil.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
References: <20220307150609.10662-1-jane.malalane@citrix.com>
 <20220307150609.10662-3-jane.malalane@citrix.com>
 <YidAU63TsVO/X1Q+@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YidAU63TsVO/X1Q+@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS8PR04CA0158.eurprd04.prod.outlook.com
 (2603:10a6:20b:331::13) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 681b30cc-8fb8-4de7-559b-08da00fe956b
X-MS-TrafficTypeDiagnostic: AM8PR04MB7476:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<AM8PR04MB74760DC54C84358324536986B3099@AM8PR04MB7476.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(53546011)(86362001)(186003)(31696002)(2906002)(26005)(8676002)(66476007)(66946007)(2616005)(4326008)(38100700002)(6506007)(36756003)(6512007)(66556008)(31686004)(6486002)(316002)(110136005)(508600001)(83380400001)(7416002)(54906003)(8936002)(5660300002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?pVgvtiHoxzEwwb62MAQHLZMYhpsNfJ8P4rBJdNXFoW9Yfapk9HJjPWSVrSU2?=
 =?us-ascii?Q?ovzB9tWkVeKTSGowoURE/Az5w6T/VKIAwHc/spb8uc38cjo/2ocxubP3fNda?=
 =?us-ascii?Q?L912gu4Q7ude8q2vXLS1twLVYi310CeWSzEGSMm6LPh/UZb7dpAauwpb3Oy5?=
 =?us-ascii?Q?DxvmHB+OYTwblUVkuO17jqDutTcXR/p1jPllvD4G2vlp08iANdXvwzKP+8hQ?=
 =?us-ascii?Q?uw5VOKnn0wqlGVlmTJ0iU3+L58WuGDFtNDzwoFN+DqQKvWAxAFVjPBjR+fM/?=
 =?us-ascii?Q?2nJp8jSM7F1jRXTCLma+5whhL1u0gFsK/krlxmijntPXq7cvRX1qpuLmoPJT?=
 =?us-ascii?Q?KELQ3AU1cAvzmO7jgBleEcbPLkl/BOu1inOquGHfDKmvCK5nxL18ZuBtDSPk?=
 =?us-ascii?Q?xU6NUPRj8Kr0GAQBo+2x0+iKzbEoxYi072Nde3FxzYxUBYSZPz/pU6OIiatx?=
 =?us-ascii?Q?QsCRdNlUJWuK11w2ljLXUPqNyD3H8jHOrtmiXIMx5ALc7aBITUusz5z+eBPV?=
 =?us-ascii?Q?WrO+ebAwc/5bz7e/1nLA9jyTgh5KxNKKZRaXNZ3uEtyIBRE9JILCtq3At3Dh?=
 =?us-ascii?Q?mjWQkdH5tQyKUEdSUI0E1tLsEap9E7QJ0aisirj46CY+zZfBfn/ph0Nlb6x1?=
 =?us-ascii?Q?3ZLNTRlmFu6enc0qb23ginwanxlfGCF4W7H0DZHa/Q4xM20blcppjzwAUBf9?=
 =?us-ascii?Q?4qQgxYMf1dwWVtwbJFMvVLKY6nowt0TLX7a9bbQzKSvKbgVYL8g9Sf+/4+La?=
 =?us-ascii?Q?+Xj6MP0cj+CgYGialYRPZBHyd7MMR8tQG2jiT6B+gi+LE6dySXDci9T5n3IJ?=
 =?us-ascii?Q?5YLOS10yTOvyp9B+X9aamrq3iGxHXbBaxi5bY8zdOfLzp1K9Jnabw/gAlwf4?=
 =?us-ascii?Q?mn2v5FGIXu3XUQkvOQyRgQ2nULFIvFon1HQcTzETFgSlirPHtbluYtgwTQGu?=
 =?us-ascii?Q?eLP0hIq5XIaQvxvkPBWEKctvW76G89ZZvjDA6SWN3KDZwr1DQakYby/HhZ7v?=
 =?us-ascii?Q?Vncrn3q0BeZDwN9wiUmsiTPKQ4VSRCe25qeY/CQgclJfYWawfIubJSuob5WC?=
 =?us-ascii?Q?PqfK7iB/+stzWyrAFI3lnCBCZpc/W6GjqbLvrtoHn+Ta7m10lfpu17pHU1mL?=
 =?us-ascii?Q?I2zwN44czLE/9M3eqTBlXciSDUqa+YGqtQaYGjZmFvKm2CZ1uzH8KknK53s6?=
 =?us-ascii?Q?dTQK9iFFdOjunALpCHq1VIGY9E8XDvzn4apwoz61O0bZW3458Jp1xGtDM/+0?=
 =?us-ascii?Q?ogkBhLDhwiFSNUQmQPyJsR2/Pk+uqdihYvun/qSM8nbXzZ4mcI7fb0ovPkOw?=
 =?us-ascii?Q?FeyKwf2ABj8BlgXY2LeFw54f6KkuFzERiCPN22MVFUqcLmLbn6xHcVfpyXqJ?=
 =?us-ascii?Q?tkLJour3ltYy2HHXOTaoNwUOWLom7SXaRDUWcsmKypUZWXLyVIA8+QwbzbX4?=
 =?us-ascii?Q?kJ6k9TJ9X0R0tyhzg6JijbCCa0c15qf3s069zDn5Y45kMAmoV/ff8JZmtjTy?=
 =?us-ascii?Q?y7eHm7K23nnZ9COL15kkox2bHM/kLAP7KdwY6JLhJcRaInhte5dJZFtd8uc3?=
 =?us-ascii?Q?DYN64ercGHZ8l3OHd/+alpiU4Ke8oEefkNSX2Pitgpvm0Qzqt/nLYMekM506?=
 =?us-ascii?Q?sjfV73h7kUp57JF+/RPmHbc=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 681b30cc-8fb8-4de7-559b-08da00fe956b
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 12:24:25.7222
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: tQWI0Pzx92SgwF7EakjtzzZGSmwP5EaPzkLtbJaUlOm/irvF205Z27Azjm31HnOipbyJyxUXtNjO+TjchL12Dw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM8PR04MB7476

On 08.03.2022 12:38, Roger Pau Monn=C3=A9 wrote:
> On Mon, Mar 07, 2022 at 03:06:09PM +0000, Jane Malalane wrote:
>> @@ -685,13 +687,31 @@ int arch_sanitise_domain_config(struct xen_domctl_=
createdomain *config)
>>          }
>>      }
>> =20
>> -    if ( config->arch.misc_flags & ~XEN_X86_MSR_RELAXED )
>> +    if ( config->arch.misc_flags & ~(XEN_X86_MSR_RELAXED |
>> +                                     XEN_X86_ASSISTED_XAPIC |
>> +                                     XEN_X86_ASSISTED_X2APIC) )
>>      {
>>          dprintk(XENLOG_INFO, "Invalid arch misc flags %#x\n",
>>                  config->arch.misc_flags);
>>          return -EINVAL;
>>      }
>> =20
>> +    if ( (assisted_xapic || assisted_x2apic) && !hvm )
>> +    {
>> +        dprintk(XENLOG_INFO,
>> +                "Interrupt Controller Virtualization not supported for =
PV\n");
>> +        return -EINVAL;
>> +    }
>> +
>> +    if ( (assisted_xapic && !assisted_xapic_available) ||
>> +         (assisted_x2apic && !assisted_x2apic_available) )
>> +    {
>> +        dprintk(XENLOG_INFO,
>> +                "Hardware assisted x%sAPIC requested but not available\=
n",
>> +                assisted_xapic && !assisted_xapic_available ? "" : "2")=
;
>> +        return -EINVAL;
>=20
> I think for those two you could return -ENODEV if others agree.

If by "two" you mean the xAPIC and x2APIC aspects here (and not e.g. this
and the earlier if()), then I agree. I'm always in favor of using distinct
error codes when possible and at least halfway sensible.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 12:33:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 12:33:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286789.486427 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRZ1h-0007VD-PJ; Tue, 08 Mar 2022 12:33:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286789.486427; Tue, 08 Mar 2022 12:33:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRZ1h-0007V6-Lr; Tue, 08 Mar 2022 12:33:17 +0000
Received: by outflank-mailman (input) for mailman id 286789;
 Tue, 08 Mar 2022 12:33:16 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fWwI=TT=citrix.com=prvs=059ab6e88=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRZ1g-0007V0-TH
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 12:33:16 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id eb925c2f-9edb-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 13:33:14 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: eb925c2f-9edb-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646742794;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=Glj0s5WkRJfKduXcHGgSBWxSXxGqvijyF8t1+b1iwmQ=;
  b=GalJUxN88ob4b3bKe/iNjuZHXQwSoQEGAHTYpl0YaEYq+ir5ol2FPNjy
   8OGhA17JhPoiImEgAM2sj9cGmIl+vpLST2a0LWhQ6kvVIAx0Du58lKGjd
   qFoWQucMMm4tG3uGR2insGF13Z0rc6IhtgoFfU/U2RVzdJ5/cfACgSDAF
   E=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65630323
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:/pqJ1avvFWQTkhYlpixzN63jD+fnVKpeMUV32f8akzHdYApBsoF/q
 tZmKW6CM/aOYmDyKNF2Pt609EsH78CEz9M2SQc/+yw3FikX+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jV6
 YuryyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi8mYpWWu+4ZAiN3Eh9hGYJ8p56dAlqW5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AO
 pRCMWE1N3wsZTVxAnotJIo0zd32lyeuKD9oigmphaMotj27IAtZj+G2bYu9lsaxbd5Ogk+Sq
 2bC/mL4KhIXLtqSzXyC6H3Eru3SmSL2XqoCGbv+8eRl6HWtwWgUBAwTREGMi/CzgU6jWPpSM
 0URvCEpqMAa+EW1Q/HnUha/oXrCuQQTM/JAHut/5AyTx6785weCGnNCXjNHcMYhtsI9WXotz
 FDht9HjCCFrsbaVYWmA7brSpjS3UQAXInUFfjQsVhYe7p/op4Rbpg3LZsZuFuiylNKdJN3r6
 2nU9m5k3exV1JNVkfXglbzav96yjpeVdlQW7AGGZE2k0BxdS7T6RtaLy3GOuJ6sM72lZlWGu
 XEFne2X4+YPEYyBmUSxfQkdIF26z63baWOB2DaDC7Fkrm3woCD7Iei89RkjfB8BDyoSRdP+j
 KY/Uyt17YQbAnalZLQfj2mZW5VzlviI+TgIu5npgjtyjnpZKVfvEMJGPxf4M4XRfK4Ey/lX1
 XCzK5rEMJriIf47pAdavs9EuVPR+ggwxHnIWbfwxAm93LyVaRa9EOlZbgXRPr1itfPZ+205F
 uqz0ePQkH2zt8WkPkHqHXM7dwhWfRDX+7iswyCoSgJzClU/QzxwYxMg6bggZ5Zkj8xoehTgp
 RmAtrtj4AOn3xXvcFzSAlg6Me+Hdcsv/BoTYH13VX71iidLXGpaxPpGH3fBVeJ8r7ILID8dZ
 6RtRvhs9dwTEmSXoWpMN8KhxGGgHTzy7T+z0+OeSGFXV7ZrRhDT+8+ieQ3q9SIUCTGwu9d4q
 Lqlvj43i7JYL+i+JK46sM6S8m4=
IronPort-HdrOrdr: A9a23:JcXEhKAqWPkozzDlHehOsceALOsnbusQ8zAXPh9KJiC9I/b1qy
 nxppkmPH/P6Qr4WBkb6Le90Y27MAnhHPlOkPQs1NaZLXLbUQ6TQr2KgrGSoQEIdxeOk9K1kJ
 0QD5SWa+eAfGSS7/yKmTVQeuxIqLLskNHKuQ6d9QYUcegDUdAf0+4TMHf8LqQZfngjOXJvf6
 Dsmfav6gDQMUg/X4CePD0oTuLDr9rEmNbPZgMHPQcu7E2rgSmz4LD3PhCE1lNGOgk/i4sKwC
 zgqUjU96+ju/a0xlv10HLS1Y1fnJ/ExsFYDMKBp8AJInHHixquZq5mR7qe1QpF692H2RIPqp
 3hsh0gN8N85zf4eXy0mwLk303a3DMn+xbZuCilqEqmhfa8aCMxCsJHi44cWADe8VAcsNZ117
 8O936FtrJMZCmw0xjV1pztbVVHh0C0qX0tnao4lHpES7YTb7dXsMg24F5VKpEdByj3gbpXXN
 WGNPuspcq+TGnqL0ww5gJUsZ+RtzUIb1q7q3E5y4KoO2M8pgE686MarPZv6kvouqhNDqWs3N
 60QZiApIs+PvP+UpgNdtvpYfHHfFAlEii8eV57HzzcZdQ60jT22trK3Ik=
X-IronPort-AV: E=Sophos;i="5.90,164,1643691600"; 
   d="scan'208";a="65630323"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=HERxmhygmrHBhnX5QXu//PDSM4Xse1fx/PAbhq+k41GhYFhGkeL8YmUr0ZZNys9E8CNW+AuCbEW+yhD3h4FTQjXYLHPqkQFrCVFS+FGtZdeotQyOwTdk+vmHjkbOGXeHcbmlCS1w2LILpMulWJUrwp5gJR64nUFUM+fcQvBcVnQ+shWHd9SL3YGFfDtqoLAZJyV7Useyp4k6k+lx5ig0cp9aoJI4Imge2CkUCP4IAu1FClsgyGhYzA0XROo+ESwubjynN2EwAgxe9ehHc9F2Qgn0+kRVn9yO6aSkNjo6NEJeG7iTcC+fPP315dkXzPeTQhTucb2sLBBfhfDvlSv97Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=2C0RNWLQWwXVTO4kQL0oJOjTz3hJD7BB5iUxb4AYlYI=;
 b=myC09QMuXi5xZeP8CAHlCPdADg2ZC2AKQ6t9TdZWUJbyn4O9Bcl4RoEOr+85N6pUPGU1k1hXPxdfzo6Op2zeHNHN5itc7P1RJmQAGftoDNR3e5mul/PZ5vBZt0yodCfy4ZEz+Aip3NptO3KFw4HwjalzuicspDLYW1ASSnC4v4KxVhBUhH4UqLO048MiPXrqyJkC0afpE+KVyA7XxCOvfQVgiL8T14r0EvgtFZ1HVPB6O4rg0KfPvGuKqbT1+UZSzDAIOlnIg+X464NFVOv5t3mQKnP1E2kcTIMwD0J9sTBqN2uj2ZME5dIgwwUVNNpuSKb/STB4R1soR53C7FwHzA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=2C0RNWLQWwXVTO4kQL0oJOjTz3hJD7BB5iUxb4AYlYI=;
 b=LDuJbcmWELbQYjtPDoQYDOax8VcUix0uv+/0XVQtQwxi+7OKL1yi5FxU0EFzwil3/c3mVlvHCdLD+SicP51ADfQnVCQUnnieT8cYEWZi/b16GYgLThj0eUV3VDIx/UU4y24aFwwwUY4x0pB+BUR8eDVksMhNkh9fk8X0BCktElE=
Date: Tue, 8 Mar 2022 13:33:01 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Jane Malalane <jane.malalane@citrix.com>, Xen-devel
	<xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, Anthony PERARD
	<anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, Julien
 Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
	Christian Lindig <christian.lindig@citrix.com>, David Scott
	<dave@recoil.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH v5 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Message-ID: <YidM/Wu5lqF48zg2@Air-de-Roger>
References: <20220307150609.10662-1-jane.malalane@citrix.com>
 <20220307150609.10662-3-jane.malalane@citrix.com>
 <YidAU63TsVO/X1Q+@Air-de-Roger>
 <b633f92a-151f-c7ca-0d91-cfad8d2edcbe@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <b633f92a-151f-c7ca-0d91-cfad8d2edcbe@suse.com>
X-ClientProxiedBy: LO2P265CA0333.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:a4::33) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 1cac6403-0767-4713-5c6d-08da00ffcbf9
X-MS-TrafficTypeDiagnostic: BN8PR03MB4897:EE_
X-Microsoft-Antispam-PRVS: <BN8PR03MB489766E84C94CE107BD875078F099@BN8PR03MB4897.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(33716001)(53546011)(38100700002)(6506007)(2906002)(83380400001)(82960400001)(5660300002)(316002)(6512007)(26005)(54906003)(8936002)(85182001)(66556008)(9686003)(66946007)(6486002)(86362001)(186003)(6916009)(6666004)(8676002)(4326008)(508600001)(66476007);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?LzZKZlVDNTE2eitpWUhlcXBIV1RWMU9qU2RTdHRWMVVYaUdKVTVvZXBPL25j?=
 =?utf-8?B?WVJPYWprNTZiRlFyN0d4MlVBNDVmK203bll1UVFXN2E3MWFhQzZibHVhTlk1?=
 =?utf-8?B?cDRqNDFEV2RkK0pKRmQ3dDlSWHpac1hWT253c3NZNnZGcXZsaEdUUnd3RVFO?=
 =?utf-8?B?dms0UEt5TytvT0RjNVFqU21DcnhpdDFhd0RPYzlnTkFYeFlKUVVIbVE5N2NX?=
 =?utf-8?B?UkN6UEZrTmpVMjdnQ2UxZWVhRUt0ZEdpSXRqVVBkYlZnejhpWitJUVZGZUxq?=
 =?utf-8?B?QTg2RlJZQW1NbmpYUGxnUXV2ZWR4OExNSHBHTEhNM3RrenRtZE9TY0xCc3hT?=
 =?utf-8?B?MklacnM0cVNGVEtBSSsrTkM0RjBJbmFESStlbTdCSzhOZHU1dWRUbnlBdkxs?=
 =?utf-8?B?NXVqaXBSY2ZIK25JaDdSbEZoM3cwcmU5cEVhelRnZlZqTFJyL0J3Q1ZZT0Jz?=
 =?utf-8?B?amdmbVg0MXl3bnNmeVN5SDZBQWs2VENaNkZJVzFoK1FwODJoRkpOQWFpYVp3?=
 =?utf-8?B?d1pQTnlNWWNkbEFTalNwbTlIT2UwZFh3ek5ab1hkb2pMRnk4eEtVZEpFK3FH?=
 =?utf-8?B?UC9GZTFiaVdjM1hJdHNuMS92eHdwK3EraWxpcTZ4dmU2MlFIU3NNWXlxeEZT?=
 =?utf-8?B?M24wRHNhVnY4WXFDakwxSFVZaFhubkRaSGpEQlJacUhlcVl6ekhUemFzSEQz?=
 =?utf-8?B?RlJxNDVGaDVaT1ZFWVU3UmtibkxTMnhnN2NnUW5wMnNmTlI0NG12cXVkKzB2?=
 =?utf-8?B?Y0tvTUE1Z29DT3luOHJuYngwMzhObkRnb3NpMjlWdlhIVmo5Qk03R0xzZGRK?=
 =?utf-8?B?YTkyRDRodW5vV1ZiNUJVVzcrczRTVTBhdEhENVIrelNnQm92RlRFR1BTRnNj?=
 =?utf-8?B?VUpyMXBrNysrUjhITXdGaldHVk1GaFJDVDd6N0ZXQUlVcEtYY2V5VjF3NmxI?=
 =?utf-8?B?RFhublpreXVZQ1RWZm9DZEFnQ3YvZWJ1blpGYVR2alpyRzNFT2lVTll5UzVX?=
 =?utf-8?B?enhSRFhsaXNycmRIWUdRWTMxei94S2EzbDNZcVBNdmRwZzQyNGRoSTA3Uk9E?=
 =?utf-8?B?aXRORHFLZGFqTDZKMVhjVk94Ymdxb1BnZmsrczhpZFlrN09XaUZWN2NuS1dM?=
 =?utf-8?B?WWk4My9heURRM1hEV3lyTGozaUNPUmNTTW9xRVlSdTBUVVFiSGcyUU5GeWJB?=
 =?utf-8?B?MHBvQ01uL2pFUytSSzZmTVJjRXA0eG54K1ljN25qMlY2b3pFSjZLSzB0b24z?=
 =?utf-8?B?ZEFHRHFlaHVGUmFRWkFnMXNtTzhIRkk4b2FKcmQvVHBxSm9pbGdYbkxlb3pi?=
 =?utf-8?B?bHBwRFRwVEFKL293SmdNOE5jSEROVDhQWTNmUW5HZWhPMk9qTEZqNzY2STlZ?=
 =?utf-8?B?c3Y1N24vRHhmU2M0NGdsb2ZCeWhZZUhsVVlLS2lYNkZ3UUNHN25ybXcwWWY3?=
 =?utf-8?B?cmZUbExxZ2N4VDR3MjJSUVdHWUM1UjVrbVV6aXZOZVNjYUhiMkc3NHlxL2ZJ?=
 =?utf-8?B?d0tBc2ZIQzY0TUpTWkV5MTkzUzY5NGxNSk5EdHR2aVlQNnRmYkJWK0E2WE5T?=
 =?utf-8?B?QjBEMFI0MWVMdnlaWVNnOEprMVlUbklMczJXcE5nZXNoN3NvZW1wSDdnWWQ2?=
 =?utf-8?B?UnlqMWhoZngxVEZQc1FwejBJdkllaVA0bU1UUTNwUzVUeHl1NkFuNThwblc4?=
 =?utf-8?B?OHlhc2xyb1RkVE4wakY5QXd4TVBVdDA1Nm9RWXVvcHgvaXFiTkxCdGRVUW53?=
 =?utf-8?B?L1ZHRWxJT2lNak1XODFxQlV4eWQyYVlreS9jNStNM2p5RXJTV1J0ajhQay9V?=
 =?utf-8?B?bGM0dXVxY094VWxuZWFrUzE2eVYzN1hGQzY1ZW00bHpxaXJaZFB6Z0JRcVdz?=
 =?utf-8?B?cW9QYi90anJkRFlTbmVYZ24xTTFNWEJrY1I2QWZubHBtanViaTZ6aVlsemFB?=
 =?utf-8?B?UDc1N1ovY3VyVUh6THUrUWNVNjFBeU1HS0gzbGFzNDhGaUlTdW9qUWZuS1FI?=
 =?utf-8?B?MmxtdFRCMVBvOWN5QnQySU9LTVJwWUVMRUQ3Wi9ES04xUGg1QUdZTE90cDZP?=
 =?utf-8?B?RkNCMEZzcE9NbnlTeE1FNENYUGhuVnlFbTg5Wkx4dnovMzhVWWRucEtsYSt1?=
 =?utf-8?B?WXFHd0JNZTdCQ1I4cWhFQ1lta0xMc1ZBYU9kK3Z3SjdXVU1GRnkyaTl3L1FO?=
 =?utf-8?Q?jX5ha4oPy3dgpx3ytPHr7QQ=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 1cac6403-0767-4713-5c6d-08da00ffcbf9
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 12:33:06.7467
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: KIt6JyDhXZU2sHdp0ZL+98AqoK1FDG3dGYpk7rQkdl0ZZQg1+wnXw72EL6kjJ6dfye9W8J7d+5EE+a3C6ulAMw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN8PR03MB4897
X-OriginatorOrg: citrix.com

On Tue, Mar 08, 2022 at 01:24:23PM +0100, Jan Beulich wrote:
> On 08.03.2022 12:38, Roger Pau Monné wrote:
> > On Mon, Mar 07, 2022 at 03:06:09PM +0000, Jane Malalane wrote:
> >> @@ -685,13 +687,31 @@ int arch_sanitise_domain_config(struct xen_domctl_createdomain *config)
> >>          }
> >>      }
> >>  
> >> -    if ( config->arch.misc_flags & ~XEN_X86_MSR_RELAXED )
> >> +    if ( config->arch.misc_flags & ~(XEN_X86_MSR_RELAXED |
> >> +                                     XEN_X86_ASSISTED_XAPIC |
> >> +                                     XEN_X86_ASSISTED_X2APIC) )
> >>      {
> >>          dprintk(XENLOG_INFO, "Invalid arch misc flags %#x\n",
> >>                  config->arch.misc_flags);
> >>          return -EINVAL;
> >>      }
> >>  
> >> +    if ( (assisted_xapic || assisted_x2apic) && !hvm )
> >> +    {
> >> +        dprintk(XENLOG_INFO,
> >> +                "Interrupt Controller Virtualization not supported for PV\n");
> >> +        return -EINVAL;
> >> +    }
> >> +
> >> +    if ( (assisted_xapic && !assisted_xapic_available) ||
> >> +         (assisted_x2apic && !assisted_x2apic_available) )
> >> +    {
> >> +        dprintk(XENLOG_INFO,
> >> +                "Hardware assisted x%sAPIC requested but not available\n",
> >> +                assisted_xapic && !assisted_xapic_available ? "" : "2");
> >> +        return -EINVAL;
> > 
> > I think for those two you could return -ENODEV if others agree.
> 
> If by "two" you mean the xAPIC and x2APIC aspects here (and not e.g. this
> and the earlier if()), then I agree. I'm always in favor of using distinct
> error codes when possible and at least halfway sensible.

I would be fine by using it for the !hvm if also. IMO it makes sense
as PV doesn't have an APIC 'device' at all, so ENODEV would seem
fitting. EINVAL is also fine as the caller shouldn't even attempt that
in the first place.

So let's use it for the last if only.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 12:34:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 12:34:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286796.486440 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRZ2b-00087V-7v; Tue, 08 Mar 2022 12:34:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286796.486440; Tue, 08 Mar 2022 12:34:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRZ2b-00087O-2q; Tue, 08 Mar 2022 12:34:13 +0000
Received: by outflank-mailman (input) for mailman id 286796;
 Tue, 08 Mar 2022 12:34:12 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRZ2Z-0007wf-Tm
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 12:34:12 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 0e0ded31-9edc-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 13:34:11 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2170.outbound.protection.outlook.com [104.47.17.170]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-31-SCFzAxmdMomHpzi13Oxxcg-1; Tue, 08 Mar 2022 13:34:09 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PAXPR04MB8317.eurprd04.prod.outlook.com (2603:10a6:102:1ce::7)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Tue, 8 Mar
 2022 12:34:08 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 12:34:08 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0e0ded31-9edc-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646742850;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=EIKALJnr7hAyQiWVu0WlUPWT3Off1RQJ//kUSt+Jco0=;
	b=THvyhOtZHrqLpVdDaHAyufYd2CS3UKEITOJ7u/AKREGgUsQFIFATQBX1evKKzPCTjWSRZf
	YLjuhaoS/2j7DXXKgnq8lH0dIMQ4IW+Z4lNF4Z2T6VKil8N9uMkqoslH8omKz5jb25DxiZ
	NubqXSomI1PwcHz4aQLMiZ0bhmTVPUA=
X-MC-Unique: SCFzAxmdMomHpzi13Oxxcg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=FB1K6P8uOIl+O+wBO3YZQ3cPXlkCr8qeJ4p60jd9DQfG0CV1s4XopbabWjMjwBh2WfomqubNnOxSwqdN49RHm6d8aWV3PkOmbxndmNZgqOWeP7SUW8ZfUr4i0jvYqHOcvQfsqtDqFP+4GkrEwne8/3BYtSp9WCm3nlLduthnf3lt2Ig17MwxPCUOuWqDVQeIh06pzHCYj4CKIO1MG73jWiy2AphbZLYkjvvoZcq27eMT8m/JW8ip68fNfADV4ZXbP8vMkYm05lQCrdvN0fwwFIdoBnxjlmyyqBGW8Ao83GPtLJHA9osnJGrqeVwAcCp0WVXa7RzaCdOB0SuIRK6wcw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=zhJaR9rb0xobUbZw7BfM/XRM8H/6pBx/5GQB1oHhRlc=;
 b=he4bdXOWuJT5WhZQcxsxvp3eYMo3Y+tspYAJWtNNCJPxODFL6CAJQQg4Yi7JjDoi6NVcAalpBLJgMI/RtEcZqpKjpnrGgRumS3Vh7lHcItM5vVTUZnV8edo5j21DRwL6DLxBeulu2w8m9hH8Wy3EfvzGO+BZQzJX1nq2n3C1AWh2GarXf6RwLoXP0fHt9LSMDNxNG2gDqpCqV1FO6u1Zu5RFyptldQRvsYI2cQYw3M3D8lxiD8ERz2CFSVgqQSkrxxDHgLDkI3sMb4wcQhUpuw2eT+T+H7FCvxW3gct/GNuFCOXp5ZO+H/t7y+/Du/NTfyJhRShP7fBprtJR47RQnA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <90124755-cd69-6352-e75f-80a1e53c93e8@suse.com>
Date: Tue, 8 Mar 2022 13:34:06 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v2] x86/build: use --orphan-handling linker option if
 available
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
References: <289684f6-fa73-bf02-137c-680ad8891640@suse.com>
 <YicsK8xqdcGZYaIn@Air-de-Roger>
 <0cde8972-b357-e2c0-ccc4-a0720cfb3501@suse.com>
 <YidH9La8I4X+M2S5@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YidH9La8I4X+M2S5@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM5PR0602CA0017.eurprd06.prod.outlook.com
 (2603:10a6:203:a3::27) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 87fb6ee8-b606-49e6-cb19-08da00fff082
X-MS-TrafficTypeDiagnostic: PAXPR04MB8317:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB83172788F5F87E3566F59FA7B3099@PAXPR04MB8317.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	nGI+2e8FcKtWuHgikxT0jGUv/Siihn9KqRZEPcs/m8l9iQsdPPIZwf8JoRrLqQYUjxZGqcC18soxRKTiCDTZGruektTcQSqZuelCw5wMWx96T8M6EHzC/2ZVdv7qizox6bWyEddGLG6ngSlUSpdsGvepE3Wg8uNa1O6JLk+APsbZjMRFfuiQTROp7n08im3fkCZIVY0gEEReom7Fr/m9GsbUPKfpsjOcdkpCOcAL7E2WFK2pcB9wp+4xcy/54E1rZrLWTeHDSKHxD+d6VxByu4i0u/PUPLsruKsIsLAgAaepWVURE5xJUxOYG5MrKca/5JLmWz0deulu6RYm7oH3aJP/JKbAC5P76DH3vH0kr9Izt5Rcfdk/+MbLcjpggRoY0plpJkzxvn4uPgBFNCbfnfxqhq2mzMWjNo8aRcEs0OSEXoZut3cldtuysH0D2AHd+oewONs3Sfe6DalbwazIv/KlVtzXAuZ8iuYiiqdkE7ORZ7mTrd5CHhWrLH7GwUrgtTVaRaUJtlc7KSiFJAMl5ig0rnP95T6RCArW0vPdVfP5nGPyLi09Ed4Kv/FZOsb+JCEXrDSZ+0rRY4ycPsM8pp3Ccn5afdFY7WhHEmE/frB4vf447z4y2UVg0zrBOMOFaOnRLmwDyahXC64hdrxtOvI6eY7h3qwr5H5F7X8QQDQcWX0t/mjDbsBC5TkrNa1Y8nJokKeUwt/yau3oex7sRXJts9dks745x1EZvZRcOrU=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(36756003)(53546011)(6916009)(6512007)(6506007)(2906002)(4326008)(66556008)(66946007)(8936002)(66476007)(8676002)(5660300002)(86362001)(31686004)(38100700002)(54906003)(316002)(31696002)(6486002)(83380400001)(186003)(26005)(2616005)(508600001)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?ZBsuspbgb2pWoaC71zABHq/7bIuiovRme9E1632T4ZYjv2U0P/Pe/LqOhQXo?=
 =?us-ascii?Q?44z2Rcxc4y7GyobV90NlzNzb2+gpiapSbHjbaH6pKHe1MYlg9rMKto+49cGF?=
 =?us-ascii?Q?3KA+X/asSxHxhuGdCfoiiePGo7/ThBh6RNg9QeIOYc/rTSZ4rVLXhcy4bA9w?=
 =?us-ascii?Q?M6AZRwJMhiaM80EG/0adHeXBg238JlK0TYrVS0EbNgd3kXxWjAqhoKrr1Rpg?=
 =?us-ascii?Q?TTu9KoDMPy04PwzG7/wIGp+Nc38j/AH2uqec1DQvaAOILl/d9uFjGimyO5OF?=
 =?us-ascii?Q?yHhHOx6eXmqe5ua7eZ4T7S6UuXANuAh2yzEUyyvIA3sjGWwQdOUI1EJ4/7Gn?=
 =?us-ascii?Q?LeqJ0MSNMzVOxn1hwnu/Gx9MxEBRe5kyIEHCVSzLd4cHrRxLtDwz9krQayEO?=
 =?us-ascii?Q?SZ7pD6zfpoCGrCgv+UAloqPwxC2RnPMce10IyI/xKnZ6HaQ/nxLj3BbZuNy2?=
 =?us-ascii?Q?Bt0pE2ipW1d5pMNTDiu7jkWaVON/HXeH04kUZzO+5uiuawChf7b3cyJ58lYi?=
 =?us-ascii?Q?RG/l9t3K8xYz/WtFruhXakl6KhB0bYob7HceE4/KvgbTyc5E679Mu638atN0?=
 =?us-ascii?Q?4MUDp/zFI5DOHboStf0uCqu6KWVNUGqozwhIQVBaQSxJQIzmaasOvO9/+a05?=
 =?us-ascii?Q?iJc79lqzTTka28/JkAUP6qTog4EF+d+AJaEaWk7kw25YlqV7cMOncm4gLyGD?=
 =?us-ascii?Q?987qR2a25ELbMFFUkv6oUrnDrAp8YWMvpeqBrNC1WglP27pN2LMNXP4M3DT4?=
 =?us-ascii?Q?2r+Uk1lqyJ52aBLvzwUqQEOgYCCtOHS4Z9dl3gTP3h/KGJ2rmWb1yfL50kR3?=
 =?us-ascii?Q?jKd8ls3MHi3IlcauOU+WmRpvAqtlAXs0tqttKMA9T0DSOsmQtY55a/2QYLIZ?=
 =?us-ascii?Q?I5/aXG3nHkjTM7pqhsPG9oU/8dtvu2lH42pibLh6iNH8NJOUEb0ALcV9brFL?=
 =?us-ascii?Q?DllWodecEJHFlcqcI6B0xze/nBvno1X2wY8L1T+RTOnY7fxP6iJoWN6qXGTx?=
 =?us-ascii?Q?gcpExLl34RF8MyeEQz7XAn4vrtqVCTd3xRlFz5echweHNcuff93VrLs/bIOX?=
 =?us-ascii?Q?XcS6cEkUL9qNXPrKq9Io4TT9iKVf8JRCqV8xI8xcYKtYybyc8PU5OK6dNi4T?=
 =?us-ascii?Q?US64iW4LcuONteSwXZ6iFJRdCKBd4RoeDw0LM3nkmZhE+0hN5pOD0Cy0KCWy?=
 =?us-ascii?Q?kgSpPVVv+CQJwH+yvhS204bkREcdb022xzQGlePGYrIk8gMge3NrgOVpFlor?=
 =?us-ascii?Q?DrUmjv8o6BnjYFTo8cTeGnltNuGqGyTiz3zNpbbICKrdgsGtotCcTVtddJC4?=
 =?us-ascii?Q?yKkBFNDYD6/y9qwl8rWg6OPPOaFfKuupM+nxQALQUwMvmCiVTZFg90NNdntU?=
 =?us-ascii?Q?2ixwiJz6Bi0Gtu3/ZlssCI1U0lx2mPMs8Tq9nlHE9+utfQkUOnuimixJ6gjO?=
 =?us-ascii?Q?ey2ks3A5LKsvjowe+Ljsq63hJeCSRwkTWBtexBoSEaIZUOFq2pBwbZ4ybEuB?=
 =?us-ascii?Q?sEqo+2INY4Mc5nbobkVIzz4jNPxCc6cUpDWYo12OjTsG8YrOg8Fnc+Cg6d+Q?=
 =?us-ascii?Q?kvu4nMLXDjrFG7vSUTWOhSLQUBJiHJoTRLheSHjmsx/A569F8xlWzp5bjAWZ?=
 =?us-ascii?Q?98wx6uht/coXlXi9iSUxCy0=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 87fb6ee8-b606-49e6-cb19-08da00fff082
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 12:34:07.9516
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 07QX0SckwmXZ8ZE0+vNqekgXSZzDKpagFjefQo6sQG1JAKaDDVkweOh00F4URFcaMvhTKXhLl6GA3dnY8bgYsw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB8317

On 08.03.2022 13:11, Roger Pau Monn=C3=A9 wrote:
> On Tue, Mar 08, 2022 at 12:15:04PM +0100, Jan Beulich wrote:
>> On 08.03.2022 11:12, Roger Pau Monn=C3=A9 wrote:
>>> On Mon, Mar 07, 2022 at 02:53:32PM +0100, Jan Beulich wrote:
>>>> @@ -179,6 +188,13 @@ SECTIONS
>>>>  #endif
>>>>  #endif
>>>> =20
>>>> +#ifndef EFI
>>>> +  /* Retain these just for the purpose of possible analysis tools. */
>>>> +  DECL_SECTION(.note) {
>>>> +       *(.note.*)
>>>> +  } PHDR(note) PHDR(text)
>>>
>>> Wouldn't it be enough to place it in the note program header?
>>>
>>> The buildid note is already placed in .rodata, so any remaining notes
>>> don't need to be in a LOAD section?
>>
>> All the notes will be covered by the NOTE phdr. I had this much later
>> in the script originally, but then the NOTE phdr covered large parts of
>> .init.*. Clearly that yields invalid notes, which analysis (or simple
>> dumping) tools wouldn't be happy about. We might be able to add 2nd
>> NOTE phdr, but mkelf32 assumes exactly 2 phdrs if it finds more than
>> one, so changes there would likely be needed then (which I'd like to
>> avoid for the moment). I'm also not sure in how far tools can be
>> expected to look for multiple NOTE phdrs ...
>=20
> But if we are adding a .note section now we might as well merge it
> with .note.gnu.build-id:
>=20
>   DECL_SECTION(.note) {
>        __note_gnu_build_id_start =3D .;
>        *(.note.gnu.build-id)
>        __note_gnu_build_id_end =3D .;
>        *(.note.*)
>   } PHDR(note) PHDR(text)
>=20
> And drop the .note.Xen section?

In an ideal world we likely could, yes. But do we know for sure that
nothing recognizes the Xen notes by section name? .note.gnu.build-id
cannot be folded in any event - see the rule for generating note.o,
to be used by xen.efi linking in certain cases.

>>>> +#endif
>>>> +
>>>>    _erodata =3D .;
>>>> =20
>>>>    . =3D ALIGN(SECTION_ALIGN);
>>>> @@ -266,6 +282,32 @@ SECTIONS
>>>>         __ctors_end =3D .;
>>>>    } PHDR(text)
>>>> =20
>>>> +#ifndef EFI
>>>> +  /*
>>>> +   * With --orphan-sections=3Dwarn (or =3Derror) we need to handle ce=
rtain linker
>>>> +   * generated sections. These are all expected to be empty; respecti=
ve
>>>> +   * ASSERT()s can be found towards the end of this file.
>>>> +   */
>>>> +  DECL_SECTION(.got) {
>>>> +       *(.got)
>>>> +  } PHDR(text)
>>>> +  DECL_SECTION(.got.plt) {
>>>> +       *(.got.plt)
>>>> +  } PHDR(text)
>>>> +  DECL_SECTION(.igot.plt) {
>>>> +       *(.igot.plt)
>>>> +  } PHDR(text)
>>>> +  DECL_SECTION(.iplt) {
>>>> +       *(.iplt)
>>>> +  } PHDR(text)
>>>> +  DECL_SECTION(.plt) {
>>>> +       *(.plt)
>>>> +  } PHDR(text)
>>>> +  DECL_SECTION(.rela) {
>>>> +       *(.rela.*)
>>>> +  } PHDR(text)
>>>
>>> Why do you need to explicitly place those in the text program header?
>>
>> I guess that's largely for consistency with all other directives. With t=
he
>> assertions that these need to be empty, we might get away without, as lo=
ng
>> as no linker would decide to set up another zero-size phdr for them.
>=20
> We already set the debug sections to not be part of any program header
> and seem to get away with it. I'm not sure how different the sections
> handled below would be, linkers might indeed want to place them
> regardless?

Simply because I don't know I'd like to be on the safe side. Debug sections
can't really be taken as reference: At least GNU ld heavily special-cases
them anyway.

> If so it might be good to add a comment that while those should be
> empty (and thus don't end up in any program header) we assign them to
> the text one in order to avoid the linker from creating a new program
> header for them.

I'll add a sentence to the comment I'm already adding here.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 12:37:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 12:37:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286803.486450 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRZ5o-0000WG-Ku; Tue, 08 Mar 2022 12:37:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286803.486450; Tue, 08 Mar 2022 12:37:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRZ5o-0000W9-I1; Tue, 08 Mar 2022 12:37:32 +0000
Received: by outflank-mailman (input) for mailman id 286803;
 Tue, 08 Mar 2022 12:37:30 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fWwI=TT=citrix.com=prvs=059ab6e88=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRZ5m-0000W3-JA
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 12:37:30 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 837326a0-9edc-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 13:37:29 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 837326a0-9edc-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646743049;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=9VrkbleKNpf7rEW/4+vWvP6st6hg0WnKMV7/Q8MgRuE=;
  b=W/WGwxcoKpt+m4PKsZEd4iOmT+MQs8YBjv14S66h6Gv1mrj2c8WzPoqU
   S9rV2e9Gfq9aSeFjrHzkAJ/SHwVt3wTBEBIP41seRlFvkDOrcaHcplO8n
   j8UGbljBl35Jb1hZ59qpad/H1joykS4ANrmRmwrRB21TrmhXtRSbirqkW
   8=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65176449
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:FvsUY67MYGqHOVbWRajErAxRtBzHchMFZxGqfqrLsTDasY5as4F+v
 mZLDW2BbvqPNGLzLY0gOoS38RkOuJfXndQwQQNk/3pkHi5G8cbLO4+Ufxz6V8+wwmwvb67FA
 +E2MISowBUcFyeEzvuVGuG96yE6j8lkf5KkYAL+EnkZqTRMFWFw0XqPp8Zj2tQy2YPhU1vU0
 T/Pi5a31GGNimYc3l08s8pvmDs31BglkGpF1rCWTakjUG72zxH5PrpGTU2CByKQrr1vNvy7X
 47+IISRpQs1yfuP5uSNyd4XemVSKlLb0JPnZnB+A8BOiTAazsA+PzpS2FPxpi67hh3Q9+2dx
 umhurSvZgsFZ43iqt0HcEBSTzp+M58YyLrudC3XXcy7lyUqclPpyvRqSko3IZcZ6qB8BmQmG
 f4wcW5XKErZ3qTvnez9GrIEascLdaEHOKsFvX5t13fBBOsOSpHfWaTao9Rf2V/cg+gQQK+BO
 ZZFOFKDajyZUhldFw80Jqthv83xlHv0KjgFl3W88P9fD2/7k1UqjemF3MDuUsyHQ4BZk1iVo
 krC/n/lGVcKOdqH0z2H/3mwwOjVkkvTRIITD/u57bhj2FmIwWo7BxgfVF/9qv684ma8Ud9CL
 00f+gI1sLM/skesS7HAswaQ+SDe+ERGApwJTrN8uFrlJrfoDxixGUcIYmdhRu4fruxvT2Ax1
 lG7wePsLGk62FGKck61+rCRpDK0HCEaK24eeCMJJTc4D8nfTJIb1UyWEIs6eEKhppisQGyrn
 WjWxMQrr+hL1aY2O7OHEUcrat5GjrzAVUYL6wreRQpJBSspNdf+N+REBbU2hMuszbp1rHHc5
 BDoeODEtYji6K1hcgTXGI3h+5nzu5643MX02wIHInXY323FF4SfVY5R+ipiA0xiL9wJfzTkC
 GeK518PusADYSDzPfIsC25UNyjM5fK7fTgCfqqIBuein7ArLFPXlM2QTRT4M5/RfLgEzvhkZ
 MbznTeEBncGE6V3pAdatM9GuYLHMhsWnDuJLbiilkzP+ePHOBa9FOdUWHPTP7tRxP7V/23oH
 yN3apLiJ+N3C7alPEE6MOc7cDg3EJTMLcyu+5wNKL/ZeVYO9aNII6a5/I7NsrdNxsx9vuzJ4
 mu8Sglfzl/+jmfAMgKEdjZob7aHYHq1hStT0fAEVbpw50UeXA==
IronPort-HdrOrdr: A9a23:nYfhK64OMw0qobQi9gPXwSqBI+orL9Y04lQ7vn2ZFiY7TiXIra
 yTdaoguCMc6AxxZJkh8erwX5VoZUmsj6KdhrNhQItKPTOWw1dASbsN0WKM+UyDJ8STzJ856U
 4kSdkDNDSSNykKsS+Z2njALz9I+rDum8rJ9ITjJjVWPHlXgslbnnlE422gYytLrWd9dP4E/M
 323Ls5m9PsQwVeUu2LQl0+G8TTrdzCk5zrJTYAGh4c8QGLyRel8qTzHRS01goXF2on+8ZpzU
 H11yjCoomzufCyzRHRk0fV8pRtgdPkjv9OHtaFhMQ5IijlziyoeINicbufuy1dmpDl1H8a1P
 335zswNcV67H3cOkmzvBvWwgHllA0j7nfzoGXo9kfLkIjcfnYXGsBBjYVWfl/y8Ew7puxx16
 pNwiawq4dXJQmoplWz2/H4EzVR0makq3srluAey1ZFV5EFVbNXpYsDuGtIDZY7Gj7g4oxPKp
 gjMCjl3ocWTbqmVQGYgoE2q+bcHUjbXy32D3Tqg/blnQS/xxtCvgklLM92pAZ1yHtycegA2w
 3+CNUaqFh/dL5nUUtDPpZyfSKWMB26ffueChPaHbzYfJt3Tk4l7aSHpIkI2A==
X-IronPort-AV: E=Sophos;i="5.90,164,1643691600"; 
   d="scan'208";a="65176449"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=IxnVvxQQ1507b7j/NXDe7kalrvvxrp0+ZfvV6e2/ux53HF7IR2qktU04uDqbO0kBjK9n/4mLShQpwGjF//CWaRgLkw4x0EWXwBcUEuwPju/qk9HcV708Etnjo7GNOH/VwaKgF+vC3Y9YxqiFPLy8b97pE0o/jmUwUEeGpOTm7jPzBJbkrJZZmGCPezREFdo7gzRbKXcOKFqiHUTZMktNpcWcSErJkhBhI1fuaeo5V1Ej/6GmiUA3LF2l/JnHgSwDabxJ+iLmgouswr0vX4prDKv99bV11taKd7J6YDaDqmob8nCZYEJmnVZyqmdFWDRYh9a3NSCUTZexFOFypCTBYw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=q3PjM7YjxFPOmv6OkEMZsIGB/W/MEnG0q9AmT8FGzjE=;
 b=S+fQcbCBjgq9x2pTIgSaZi4aGf48msugbmTdrbmq5XlsZU7SowWeYGlPJ36wLk+I0psjbpKi2gt74NvgWb1KJd25m0+CJs5MFWTf7eeiGUnIslv3OlHkdaS1vHcDd4QKup2ji4Eg4m2coJYtEvi0fxqhREcQZ2hqejmiwnhSTal2Lux0QAoPCcLamJI6ji3kEnGmigAa+MpGdBltlbRK85XhB6/TGpVXRnrKmIaH2nvhwgBWEXNpZMYSqrAcHdRAObIharChNnM4GstAtkHJbq9XjNdadHJNxVBiQiuivfZdFtmUlAkXxwHqFeyGLH3a3hLT1PG2UMgih6o35TwKkA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=q3PjM7YjxFPOmv6OkEMZsIGB/W/MEnG0q9AmT8FGzjE=;
 b=uNNXbFFwaGynYtwD9Yd10S6gkxZG6XcxDYTA4MU0LT7GLGr2nFpd4wqiDx1leiq05QVVyH2I95wvHSmr1IfJS5YeolcT8yz5witST1Scbhm7zwPnQfEVUtGfLzDO7EqLaHppGgv5RVxjaAbJfgOYepY+KTNku05haubMwEa3Kmk=
Date: Tue, 8 Mar 2022 13:37:20 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Alex Olson <this.is.a0lson@gmail.com>, <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v4] vpci/msix: fix PBA accesses
Message-ID: <YidOAA9rljXnXYLb@Air-de-Roger>
References: <20220307163744.74030-1-roger.pau@citrix.com>
 <fbc1388e-8211-f498-b134-4df5b1ccd003@suse.com>
 <YiccSMWbV2StPFB1@Air-de-Roger>
 <b24007d2-1b2c-8358-e72b-2be49e62f065@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <b24007d2-1b2c-8358-e72b-2be49e62f065@suse.com>
X-ClientProxiedBy: LO4P123CA0211.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:1a5::18) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 1d571c4b-e78c-4e85-368e-08da010065b5
X-MS-TrafficTypeDiagnostic: CH0PR03MB5988:EE_
X-Microsoft-Antispam-PRVS: <CH0PR03MB598814DCBA0C43EEB7E00D3F8F099@CH0PR03MB5988.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: TlLKJ+WRzD6nbns/Gd0zHV0Hozh4Kx5OBRY6zSRRNsvEW3qtALnAdqGogRCK6UtwWgdH090pR4NohH5/b4bOZYicXCPNvUBMSPP6GTQwfiQZc+tPl8wJdFTBRfqsfpZbmRCWJA+IdQvk0i50/Qe1xKfuhObSFfgJJ1YeB5QIIM7nNJww+MAQGJ7gZtHqXeyiLldo9JPrkdM/DAPJxAmC6CLCKG7rTHWIpIS7bqxMBVr24IpXMOzIXnCLthjDazUKJNR9EalxvfFO1D87POTXIoc/NWZvV1P3uFuZ2ylqzGa6l/uKY+xJBa26DE54xpwt41gPgDCP+ad3CF2084DUe0XAwaPJ9XrJj6/ZL362o5r9/86driK3JwExW5Xsn4ICzgemyJ77KSUjnX3cgayMGZvHoSiTJV9Z0chUTDGiovUiY3ghDbAH69ygUUZ+GSXOrKl+FCeMndCsQvzbtBwsFWVYBzvQziwoTH6lmC+cj2hqRqFmkDlzaWBKb244G7JyfN+9G+pSi6vXfRMG4tZ2LWi9w/qxmtHSyntSVKtA3Pp1mKy1QNnMDEfoLUlQ0IVpaXRJqZByIB7m4qOmUR1zjszUR9kpZtZ2iR/+Kouna33Inz0oef+B0sdIg8x0V7P+6uv+6SKH6DbYu2qzRTPvtQ==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(6916009)(66946007)(26005)(186003)(6506007)(6512007)(316002)(9686003)(6486002)(53546011)(82960400001)(85182001)(8936002)(38100700002)(33716001)(6666004)(83380400001)(86362001)(8676002)(4326008)(508600001)(66476007)(5660300002)(66556008)(2906002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?RWV4Nk5Fa1MwSVRKRGgrK0JscDRLcjFUN2s1eERBZ1VZekxwZjVhczRTSGh1?=
 =?utf-8?B?aHFZSDI5MDdSa29rYjVKK1B5VEFqWFEvRTBBMWFSUm1lbEdYcTRJYTFvcnNH?=
 =?utf-8?B?dWd0eTFiZStVOXR5Q09DbGZaQXczN1JaWDI1Y2RaNTNsV09sWHpQMG9KZ2xt?=
 =?utf-8?B?TzNaek9jUXRlNDBkWFNtQmhBMk5aTHlnaFpXcGRUVis3Q1RFREJJdUd5THZI?=
 =?utf-8?B?V1ZCS3hGb0YwaVdtMFFCdWRPSjc3LzZWeUZCanY1N0NhUTFlanV2Y1dHVjc0?=
 =?utf-8?B?VmpsNzRxa25OVWppTEJ6MHhac3NLSWRTZjlPU2RHNit5SXRIWWc3VmNQL3Zn?=
 =?utf-8?B?dFNSTzIxZlVhczd1T3pIVUszUkhsZDNRaTFjZDIzTEFqZ28xNW5HRXVMWHQ2?=
 =?utf-8?B?Z3pKUGhrTnZaWTVtRVNrYkxvSUVkS1F4cVV3SWpJU0doLzdSZ2dpdXEwd0Z4?=
 =?utf-8?B?Yi8wUmVrTUpOaUNRSE5udjM5cGRwOGpxMVNDNTZ1NHZZRXRiUkw0TW1QNDhY?=
 =?utf-8?B?V1ByMjMxRDZDcjlDdE8vd2VsRFhTbVpMZ2dleHI5VmVlQzZpYUR4WGRrU0F4?=
 =?utf-8?B?WTB2VEtyc2N1VHozZjBnMWFnVmxoYzVESlhnTDlUK2Z4YjNCT2lHdmRhSnFG?=
 =?utf-8?B?eDdSSTZvMGdQOUV3eUxndVNaaG1MNkRidFdpa2RLMElFcHhiVE9sMS9Yb1FN?=
 =?utf-8?B?R2E4cnEwdzJaU0ZpMWtqamk5cnp2aFZycVJDMzFyWjh5NVIreGcybVZlaVBN?=
 =?utf-8?B?cXhhSlM4ZzhzYVpoSDdtNW1ESVViWUpySERNQ3piYTd3Q1VreC9YQnhEbEJJ?=
 =?utf-8?B?UStIZHp2ckNmY0pKVVFPRTJHK2M0K1Nac3Z0NjJXVFozOENoZGo3Y3dSSzNV?=
 =?utf-8?B?WjlPcDc5TitXbFdaOGpSakJ3VVFGeFZoNVczU3RGZXYwdVhzb1hPT0VYVEFa?=
 =?utf-8?B?Rmd3VzdqcHl2eFZ2ckQzVFR4M2ZSdEYyN2tCc3MzYzlWWUtURzB0SUEyWEgy?=
 =?utf-8?B?SUl3c09QVW5aRzl0bDNrZDZkaW12Qkg1aldhb1lHYTluTGxpRCtJd1MrWTBX?=
 =?utf-8?B?NE1YUm9YZS80ay9IREgxR004VjBnRGVKeVZSNk1DSXFYUnpPWUVGVW83S0ZV?=
 =?utf-8?B?SGErZHZBNytjTlNtRm1mMUdvbjFOSTNJMWg3aFpIelBMY1BNNGhPM0hld0lM?=
 =?utf-8?B?dVlNTlNhU2s5eW83UHp5NC8rMGFMVyt6a2QrSGtFYTEwRXhvOHVheFdvM2Rk?=
 =?utf-8?B?cXpXQ2doSkovQ0h1aDhkbjJXb3ZIbGd5dUdBVWNjT042UFIrMmdGQ3d1eDNv?=
 =?utf-8?B?ODYrM09XcHVvY0VxWXBBbTA5ak9nNXhaaWh5azQzU0x2N053Y3RydVRSVlkr?=
 =?utf-8?B?NXl0ZVVZWjhvWVZOR1JxNzlFUnVqSmJNdEFYNk1adEpXRSttd1lJdDRGbkd5?=
 =?utf-8?B?c2Y0N1pIdVVEQW1aRzJIdjRsVzUrK281TGxBdGlzcnZBa2hIUzhRVWxyZlFK?=
 =?utf-8?B?Zjc4UzZhTVh5Y25pTXZ4Wk5rY3FSa3ZPZE01OGpCYmprMENCOEF5YSs4dzdB?=
 =?utf-8?B?MXBxR2dvVEhMZ2IvbUs1eUgvSE8xMGVzYVF5Y1RHVFZ1Q1Fad2czWnRnUVRu?=
 =?utf-8?B?SWw2NWNxK2xxMkdPUEZjSEhOcHBxUWtlQXR0RUFqaE1BMHBPZFd1ZEJXcGZk?=
 =?utf-8?B?RC9uQVdZVWV6SDBvYlIwR0toNHQyc1hSNHBmNHlIYkhXS2F1SzZ4L2thTzI3?=
 =?utf-8?B?WUllNmJockRKQ29hTzIvYzVyR1R4Wk5VMkdBWGs4dmpPbnVWcHlGOTY4QUhE?=
 =?utf-8?B?SFNJSlNrbWVtd2Zza0VwQnZMMGJYZzZlZ3V4UDQ4S2VNa3EvYmxjbHQ1cEg1?=
 =?utf-8?B?R1BiN200ZGF4cUp2bnFPREtBTzIrQWdreTIyZVRoR3haZFRvVTdjekxENVZ0?=
 =?utf-8?B?SkpNaW9lS200MXo5MDBvZ1VjVjdXc0JIOW9HRjA2NDgxK3IyRUpVU29CMWd6?=
 =?utf-8?B?d2dBWk82dzVYdE5uckRPUm9XQWQ5dDJFN2FZWU0xQkEwVXFObDVTVkl4YVpL?=
 =?utf-8?B?MTJpNjdTUFZmZndtaU1NZmhIaENSNzIzdmVhT01YZ2ZLSUt5NzZRQkE3dFp3?=
 =?utf-8?B?NkRpQUlpdXo0MjFLWlVKcndmWnVaV09RWWhRcDBLMi9QWVQvTmFsYmlIbXBT?=
 =?utf-8?Q?AVjlHC3ZFS9qXAwwfEapr+o=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 1d571c4b-e78c-4e85-368e-08da010065b5
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 12:37:24.6848
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: ydu4aqeMsOxIZv/TafMfAGj/ZalXOTLcUDAuROaxPmdh8copGslaBzJctuP7X1mF3KARSXlz+Q693y/L4IhrGQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH0PR03MB5988
X-OriginatorOrg: citrix.com

On Tue, Mar 08, 2022 at 11:46:20AM +0100, Jan Beulich wrote:
> On 08.03.2022 10:05, Roger Pau Monné wrote:
> > On Tue, Mar 08, 2022 at 09:31:34AM +0100, Jan Beulich wrote:
> >> On 07.03.2022 17:37, Roger Pau Monne wrote:
> >>> Map the PBA in order to access it from the MSI-X read and write
> >>> handlers. Note that previously the handlers would pass the physical
> >>> host address into the {read,write}{l,q} handlers, which is wrong as
> >>> those expect a linear address.
> >>>
> >>> Map the PBA using ioremap when the first access is performed. Note
> >>> that 32bit arches might want to abstract the call to ioremap into a
> >>> vPCI arch handler, so they can use a fixmap range to map the PBA.
> >>>
> >>> Reported-by: Jan Beulich <jbeulich@suse.com>
> >>> Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
> >>
> >> Reviewed-by: Jan Beulich <jbeulich@suse.com>
> >>
> >>> Cc: Alex Olson <this.is.a0lson@gmail.com>
> >>
> >> I'll wait a little with committing, in the hope for Alex to re-provide
> >> a Tested-by.
> >>
> >>> --- a/xen/drivers/vpci/msix.c
> >>> +++ b/xen/drivers/vpci/msix.c
> >>> @@ -182,6 +182,38 @@ static struct vpci_msix_entry *get_entry(struct vpci_msix *msix,
> >>>      return &msix->entries[(addr - start) / PCI_MSIX_ENTRY_SIZE];
> >>>  }
> >>>  
> >>> +static void __iomem *get_pba(struct vpci *vpci)
> >>> +{
> >>> +    struct vpci_msix *msix = vpci->msix;
> >>> +    /*
> >>> +     * PBA will only be unmapped when the device is deassigned, so access it
> >>> +     * without holding the vpci lock.
> >>> +     */
> >>> +    void __iomem *pba = read_atomic(&msix->pba);
> >>> +
> >>> +    if ( likely(pba) )
> >>> +        return pba;
> >>> +
> >>> +    pba = ioremap(vmsix_table_addr(vpci, VPCI_MSIX_PBA),
> >>> +                  vmsix_table_size(vpci, VPCI_MSIX_PBA));
> >>> +    if ( !pba )
> >>> +        return read_atomic(&msix->pba);
> >>> +
> >>> +    spin_lock(&vpci->lock);
> >>> +    if ( !msix->pba )
> >>> +    {
> >>> +        write_atomic(&msix->pba, pba);
> >>> +        spin_unlock(&vpci->lock);
> >>> +    }
> >>> +    else
> >>> +    {
> >>> +        spin_unlock(&vpci->lock);
> >>> +        iounmap(pba);
> >>> +    }
> >>
> >> TBH I had been hoping for just a single spin_unlock(), but you're
> >> the maintainer of this code ...
> > 
> > Would you prefer something like:
> > 
> > spin_lock(&vpci->lock);
> > if ( !msix->pba )
> >     write_atomic(&msix->pba, pba);
> > spin_unlock(&vpci->lock);
> > 
> > if ( read_atomic(&msix->pba) != pba )
> >     iounmap(pba);
> 
> This or (to avoid the re-read)
> 
>     spin_lock(&vpci->lock);
>     if ( !msix->pba )
>     {
>         write_atomic(&msix->pba, pba);
>         pba = NULL;
>     }
>     spin_unlock(&vpci->lock);
> 
>     if ( pba )
>         iounmap(pba);
> 
> Iirc we have similar constructs elsewhere in a few places.

I don't really have a strong opinion. I agree the duplicated
spin_unlock() call is not nice, but I think the logic is easier to
follow by using a single if ... else ... section.

Feel free to adjust at commit, or else I can resend if you prefer.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 12:45:05 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 12:45:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286809.486461 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRZD3-0001vL-Ee; Tue, 08 Mar 2022 12:45:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286809.486461; Tue, 08 Mar 2022 12:45:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRZD3-0001vE-Ad; Tue, 08 Mar 2022 12:45:01 +0000
Received: by outflank-mailman (input) for mailman id 286809;
 Tue, 08 Mar 2022 12:45:00 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LykH=TT=citrix.com=prvs=059d7c239=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nRZD2-0001v8-EY
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 12:45:00 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 8f2ceee1-9edd-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 13:44:58 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8f2ceee1-9edd-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646743498;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=z2H5/oE2TqMy9eFvJfN3TcZaowjw1O9wy1bgwYJdpws=;
  b=YN3goADjc5jJyI3XZiOtTugwMEHbSQNXhPyxrivyLbT/JRpGDmiMBRV+
   yjCWojy/WeWv4EvVcsJO0AE+e7RfJI+Kp7u1KxqiUJ5DTZJWpBsVkfq8f
   kqsyzHgbEZUfAvkvrXmYsFG5GfEhYq6tZC8b5MqNCH+0dN3zGlQzBYC9V
   w=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65176978
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:akRZ7qP9StX9T0vvrR1ml8FynXyQoLVcMsEvi/4bfWQNrUp01zwDy
 jQfX26Hb6mPZGbyc99/YI618B4Ov8KHxtJjGgto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi2t4w2LBVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Z9
 NhittuqQBYTBYbFpspaDQFBHwZTFPgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALBc/nJo4A/FpnyinUF60OSpHfWaTao9Rf2V/cg+gQQK+BO
 ZtGOVKDajztXCARZE42I6smjaSZoljhSAVepHiK8P9fD2/7k1UqjemF3MDuUtmSQsVRl02bj
 mvD9nb+BFcWObS3yj2D6HugwPDOmSDTX5gbH7m1sPVthTW7w28OIBQTXEm8p7+1hyaWV9VSI
 UEQ0iMrpLo18gqnQ7HVTxC+5XKJoBMYc95RCPEhrhGAzLLO5ASUDXRCSSROAOHKr+dvG2Zsj
 AXQ2Yq0W3o/69V5VE5x6J+ooByxfjIcPFU5TiY6Y0xb+8Dvh6wa20enoslYLIa5idj8GDfVy
 j+MrTQji7h7sfPnx5lX7nic3Wvy+8Ghohodo1yOAzn7tl8RiJuNOtTwgWU3+8qsO2pworOpm
 HEf0/aT4+kVZX1mvHzcGb5ddF1FChvsDdE9vbKNN8R5n9hO0yT6FWy13N2YDB0xWirjUWW1C
 HI/QSsLuPdu0IKCNMebmb6ZBcUw1rTHHt/4TP3SZdcmSsEvKFHZo3EzPhfAgjuFfK0QfUcXY
 8zznSGEVypyNEia5GDuG7d1PUEDnEjSOl8/tbiklk/6gNJylVaeSKsfMUvmUwzKxPjsnekhy
 P4Gb5Hi40wGCIXWO3CLmaZOfQFiBSVqXvje9p0IHtNv1yI7QQnN/deKmuh/E2Gk9owI/tr1E
 oaVBhcImACh1CecdW1nqBlLMdvSYHq2llpiVQQENle0wXkzJ4Gp6aYUbZwserc7sudkyJZJo
 zMtIK1s3twnpuz7xgkg
IronPort-HdrOrdr: A9a23:5D/90ag2DgeUBVcNwQEjDglMGXBQX3R13DAbv31ZSRFFG/FwyP
 rAoB1L73PJYWgqNU3IwerwRZVpQRvnhPtICRF4B8bsYOCUghrVEGgE1/qt/9SAIVyzygc578
 ldmsdFeaTN5DRB/KXHCUyDYqwdKbq8geGVbIXlvg9QpGhRAskKhWYYNu/YKDwMeOAvP+tjKH
 P23Lsim9PUQwVwUi3NPAhjYwGsnayoqLvWJTo9QzI34giHij2lrJTgFQKD4xsYWzRThZ8/7G
 nsiWXCl+WemsD+7iWZ+37Y7pxQltek4MBEHtawhs8cLSipohq0Zb5mR6aJsFkO0aKSARcR4Z
 vxSiUbToBOAkDqDyaISNzWqk/dOQMVmjrfIJmj8CLeSILCNWoH4oF69P1km1PimjQdVZdHof
 h2Niuixupq5VmrplWN2/HYEx5tjUa6unwkjKoaiGFeS5IXbPtLoZUY5149KuZKIMvW0vFvLA
 BVNrCV2B+WSyLvU1nJ+m10hNC8VHU6GRmLBkAEp8yOyjBT2HR01VERysATlmoJsMtVcegI28
 3UdqBz0L1eRM4faqxwQO8HXMusE2TIBRbBKnibL1jrHLwOf3jNt5n06rMo4/zCQu1D8LIi3J
 DaFF9Iv287fEzjTcWIwZ1Q6xjIBH6wWDz8o/sukaSReoeMM4YDHRfzOmzGyfHQ0Mn3KverLs
 qOBA==
X-IronPort-AV: E=Sophos;i="5.90,164,1643691600"; 
   d="scan'208";a="65176978"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=U+lRp/KanVtXP+y48wGdm2s5wIvJ//VwcGGpeYhF/EuubCJB98JMx0DahsJ9j3A/ZyZxDA/0qRlSGadWXgI4ad/9D+6TNPXl5OkAzphz01Frp4D2KODaDaZBbE0oqg3bNJA/PEsmzN7LpQkY+9gGaFWjJwy1IzJ0px8JPkftBLUHlIexOQl+FVKd1//fCeeRP1UHpR706CoBGgh1PNE7VX+l8QpHdak+q0TaiZPcvByk6xk+S5Seq7aW4d+QbmeMn+3T1y6My9rqPJlK04lGEwnXtbZRyjTWV2/G55nilLNJ+oMffueWHQIQxFqeq5jA27CANXFpIwWAcedTibDleQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=z2H5/oE2TqMy9eFvJfN3TcZaowjw1O9wy1bgwYJdpws=;
 b=Re1J/56BtPCmVwqJOubCxX1VnTWCsUZYyib0iz2lp0WvxkzRbW2BN7C4PrQhJ2CjtTmDs0VeBA4QbSUHIwoa8ujBxyUSXYWv5O9/+sdmogHHVLCVUytCGJOBTrv2SjiodK20KFdhNBSnivtCGuftnU8blXC3DdWO4QtfD+4gj4AK11D9WubbdWTTLDrPMDB9hBv1bwfqn8y+WXPBqvjeo5frVwxbctFWmtC4BLjtUa76O4ZIYYXrsWqZcwJ5SmjS2UcZtd3mO5/ItCiy0Q6K82oYodB54KHeANsHb0DqWcXtSgj4U5jsBqRKddeBIj0n1OuZy7ovhkT0u+oeYRbmmw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=z2H5/oE2TqMy9eFvJfN3TcZaowjw1O9wy1bgwYJdpws=;
 b=nQP6v82nw4t2nADx89uztuiGfcAudFO0ZiLJt/IJgrxdS3k+dO/a3cf+oBz869k3GegkA9NwjptqeV02O0jZOqPXy1/ybrGI6NGk8O9iYJb7aWwOzMM6miJ+gwt5JKog8i86n7vDlOSKQlB0tTzY44nYh9MMzK6pTDz6WHptikg=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Bjoern Doebel <doebel@amazon.de>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, "Roger
 Pau Monne" <roger.pau@citrix.com>, Konrad Rzeszutek Wilk
	<konrad.wilk@oracle.com>, Ross Lagerwall <ross.lagerwall@citrix.com>
Subject: Re: [PATCH v3 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
Thread-Topic: [PATCH v3 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
Thread-Index: AQHYMteGcC582OJoEkS5PAkljujCDqy1bu8A
Date: Tue, 8 Mar 2022 12:44:54 +0000
Message-ID: <cf0be28d-090c-1881-5831-1d58696a9272@citrix.com>
References: <453c6e5decb315109a4fbf0065cc364129dca195.1646735357.git.doebel@amazon.de>
 <b91fc474832dd0ce07d223542316fba74afc35ee.1646735357.git.doebel@amazon.de>
In-Reply-To: <b91fc474832dd0ce07d223542316fba74afc35ee.1646735357.git.doebel@amazon.de>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 8ad8936b-9853-4898-4fc2-08da010171ea
x-ms-traffictypediagnostic: BN9PR03MB6107:EE_
x-microsoft-antispam-prvs: <BN9PR03MB6107280B0C51A2ACD3A9A1D9BA099@BN9PR03MB6107.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(4326008)(66476007)(316002)(8676002)(54906003)(66946007)(64756008)(36756003)(66556008)(66446008)(38100700002)(2616005)(31696002)(38070700005)(91956017)(86362001)(8936002)(82960400001)(122000001)(5660300002)(2906002)(110136005)(6506007)(6512007)(26005)(186003)(107886003)(76116006)(53546011)(508600001)(6486002)(71200400001)(83380400001)(31686004)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?cGtvWE5TUUZEWGZ6dW13aHlJK0NQWVhyMGFmb2dSdFFHWm9jcnFhd0hFMSs5?=
 =?utf-8?B?cTFFeDd1cHFzSXpTZlYxcTFzZ3ZNRjRoYTJ5N3lsSXlEWUplZ1hnRlZsa1d4?=
 =?utf-8?B?ak5vRE9Ldi9qcnJxYTVOMDFXRTZMVGRMK1pyNE5pWHZWcktkdjVHNmFUNXVT?=
 =?utf-8?B?QWkzNTVYUkpWR2xjSkxhK3l0VmM4OW4rY2FxUTlVaEsvYzNMaCtXV08ra21U?=
 =?utf-8?B?UGZlUnNmRCtpNTZkNlcvYTRTZk5uemF3WGdJZTlZSlZlcmlmcFA1UkxQWG40?=
 =?utf-8?B?b2lwUS9DWTZYallLNGkwZVBIMTR5TUhJTHVwTGltN3F3eW9MOHdqenNnbFlG?=
 =?utf-8?B?Y3RLRW04Q1IxSjg2MHNjOXNwMmxnVEd5cy94bFhxUG5sREY2V0trVjdudjcv?=
 =?utf-8?B?Y0g2dHRZYmpXbDIyR0haTXgxM3B2a29DTzV2cmNRQUNWbWVzQk10R1h1dWtT?=
 =?utf-8?B?bFovaE5PRnF3KzZMMU1oY0JXU0hTZDF4U2grelBxSXVDZVlrbXBKZCtvOE1z?=
 =?utf-8?B?cGYwYk12ejhmSFJkZEx3NnAxVCtROUFJL0hQNmgwTG9aYzJtbTArUDB6RDFJ?=
 =?utf-8?B?UFJCQjFhTWlNTzFsNSs2MEJsaTJoVWdjL1ExNURqME5WeUZEOGVaZWhLWHdJ?=
 =?utf-8?B?UDdTVzVjM3pERFljL3UyZzZrZ05IYlNEcFBzV2FiRENXM3RlSnM1M01Edkpn?=
 =?utf-8?B?cVhYT2ZMQ2pEQkk5SCtZN1hHYmlIWHZMVUtjVWVQMGdGc0lTNWZkcDB2dG56?=
 =?utf-8?B?THZucmRaZFV0Mm1ucWY3U0JuZ1JMUFRTbnpDaHU5dUFtbDRLeHgycy9qd05B?=
 =?utf-8?B?ZURwcmdzVVhtbjgrZzBZblN4QlBPanVodTRJZlk4VVNMWEFKN0lQS3c5dGxn?=
 =?utf-8?B?UE5FM0VwWS8vTHcvTjZYeThTYjIzYnc4Uis1OWRTcTB6c0dwM1Y5VTA0dmtD?=
 =?utf-8?B?VlV2MWlGQ2NCZHBLSXc2Y0V2NkEzSEtBLytxSWYxUWs1VVNxcDNPbTlub3dL?=
 =?utf-8?B?UWRvY2p5UnhIWkF6ZzJKK0tRUjJ0a0ZpeVJqbUR0LzI0ZVFEK3RwZ2xHZVhQ?=
 =?utf-8?B?M1pEZnZJenpPdGlwSm5tTkpNYk5JOUlJSEh0eW5OcEZiZ2YyMmpMUlg2clNs?=
 =?utf-8?B?Wnp4TXVRTWpKMXp2TldFU1ZPT3RpR01VcnhtOTV1Z0JLQUx1NkV0b1ZQT01Y?=
 =?utf-8?B?S0VyOExEZ2N0em05S3NzK0tzTWpiUE1rYXhuenMvUlRpOVl6cXJzUWR6V2l6?=
 =?utf-8?B?QTFmcDFwOTVtYjhMcXJ6aUhEdDZzaXljWmVJMFZjZmdFQXVIZmNrVVVGL0tK?=
 =?utf-8?B?N0JNbWx6ZDFBV0FrN0liK0o1aCtUVlp6dkNva1RhK1VtTkRXRHdtcFhYeHFN?=
 =?utf-8?B?YXZYZS9KSGlwdlZ2OWFrK2YrRk5lY1QzZDFYM1ozSGgzcjJteWg3ZFFFaUtC?=
 =?utf-8?B?bGRDNURQSDU1VzZEZDAxa2xHNzN4TUd3NWFZTUVOYU12Z2tweXNublBCY2tL?=
 =?utf-8?B?ZzdaRzhMYThGdnpTKy9uQ0VFcnN6b1pzWFRTTmFySUR0cDIwWnJWWXhQSjYx?=
 =?utf-8?B?T2RmdHFxQ0o1a2RacDRSV2diOWhyMm5WS0lWeDhsd0NqdzBmdXh2WUlYVGpK?=
 =?utf-8?B?TlRkdGd6TUkzNEVVMG9PVkZzNTBCV2orSU95cTZGOTUrNXhpc2pWQ2JaNWFF?=
 =?utf-8?B?UzFldkkvYUlHVTNIa0JIOUdKUXVGUjhzUW9abXV2MG1qMTdNQzRDZE9EZkxK?=
 =?utf-8?B?NjhGYjkrWmEvQjhGSE9oQ0NFS3p2bGFUUUlrenZTMkpGUzV0TlNhK3pEVUVi?=
 =?utf-8?B?RGU5OXkzbU1JUzlQcTh2VGRWRjI5VExvZnZsWTJvS0FOOUFNbTR2M0lONmhU?=
 =?utf-8?B?RXV4bGlMUEZuMW9XSFNMY3RCQTBKRThzRkpDb1phbVd5aGFFRk1SQ2k1TmJL?=
 =?utf-8?B?b2JuTmlaR2ZJVWxkbkI3SVhxa1o2SWVQcyt0VU1sd3YyckwzdHJNbmx6dVJE?=
 =?utf-8?B?dTBEMmZUNVFhMWJIeEV3bEFua1hycTRqSjlxTG90T0VwREh3eUh0QzM0Y1Q5?=
 =?utf-8?B?ZzNhV2V0RmZDTWZXWlRFNXNFM2hnM09EN0pIU05DbmNDS0dwTE0wb1hDSUFi?=
 =?utf-8?B?TkUyeU05ZjJGUkp0SS90TE1kdktPT1dBRy9BVUNyWHVwTHRjZDdQdTR0K2ZO?=
 =?utf-8?B?eS80WDhkenhveDlidVlvMkljaDJxSlA3b2N2M282b0VsM0ZyWldxeGZmRzE4?=
 =?utf-8?B?NUtBUnpPRGtFK01aUDI4SnRtalFBPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <B640A6BDB3F8FF418933CF3E7D99A40A@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8ad8936b-9853-4898-4fc2-08da010171ea
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Mar 2022 12:44:54.3497
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: W29ShQxMGE9yBvTDSe57PIs5IfGL6nOWWInQ5iNdDpvw4LkAacj8HC7fmdR4hcZT1751SsRQzNo/ozNf3cYbP4ikjtFa+/mQdSWJ/QuhOKs=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN9PR03MB6107
X-OriginatorOrg: citrix.com

T24gMDgvMDMvMjAyMiAxMDoyOSwgQmpvZXJuIERvZWJlbCB3cm90ZToNCj4gQEAgLTEwNCwxOCAr
MTIyLDM0IEBAIHZvaWQgbm9pbmxpbmUgYXJjaF9saXZlcGF0Y2hfcmV2aXZlKHZvaWQpDQo+ICAN
Cj4gIGludCBhcmNoX2xpdmVwYXRjaF92ZXJpZnlfZnVuYyhjb25zdCBzdHJ1Y3QgbGl2ZXBhdGNo
X2Z1bmMgKmZ1bmMpDQo+ICB7DQo+ICsgICAgQlVJTERfQlVHX09OKHNpemVvZihzdHJ1Y3QgeDg2
X2xpdmVwYXRjaF9tZXRhKSAhPSBMSVZFUEFUQ0hfT1BBUVVFX1NJWkUpOw0KPiArDQo+ICAgICAg
LyogSWYgTk9QaW5nLi4gKi8NCj4gICAgICBpZiAoICFmdW5jLT5uZXdfYWRkciApDQo+ICAgICAg
ew0KPiAgICAgICAgICAvKiBPbmx5IGRvIHVwIHRvIG1heGltdW0gYW1vdW50IHdlIGNhbiBwdXQg
aW4gdGhlIC0+b3BhcXVlLiAqLw0KPiAtICAgICAgICBpZiAoIGZ1bmMtPm5ld19zaXplID4gc2l6
ZW9mKGZ1bmMtPm9wYXF1ZSkgKQ0KPiArICAgICAgICBpZiAoIGZ1bmMtPm5ld19zaXplID4gc2l6
ZW9mX2ZpZWxkKHN0cnVjdCB4ODZfbGl2ZXBhdGNoX21ldGEsDQo+ICsgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgaW5zdHJ1Y3Rpb24pICkNCj4gICAgICAgICAgICAg
IHJldHVybiAtRU9QTk9UU1VQUDsNCj4gIA0KPiAgICAgICAgICBpZiAoIGZ1bmMtPm9sZF9zaXpl
IDwgZnVuYy0+bmV3X3NpemUgKQ0KPiAgICAgICAgICAgICAgcmV0dXJuIC1FSU5WQUw7DQo+ICAg
ICAgfQ0KPiAtICAgIGVsc2UgaWYgKCBmdW5jLT5vbGRfc2l6ZSA8IEFSQ0hfUEFUQ0hfSU5TTl9T
SVpFICkNCj4gLSAgICAgICAgcmV0dXJuIC1FSU5WQUw7DQo+ICsgICAgZWxzZQ0KPiArICAgIHsN
Cj4gKyAgICAgICAgLyoNCj4gKyAgICAgICAgICogU3BhY2UgbmVlZGVkIG5vdyBkZXBlbmRzIG9u
IHdoZXRoZXIgdGhlIHRhcmdldCBmdW5jdGlvbg0KPiArICAgICAgICAgKiBzdGFydHMgd2l0aCBh
biBFTkRCUjY0IGluc3RydWN0aW9uLg0KPiArICAgICAgICAgKi8NCj4gKyAgICAgICAgdWludDhf
dCBuZWVkZWQ7DQo+ICsNCj4gKyAgICAgICAgbmVlZGVkID0gQVJDSF9QQVRDSF9JTlNOX1NJWkU7
DQo+ICsgICAgICAgIGlmICggaXNfZW5kYnI2NChmdW5jLT5vbGRfYWRkcikgKQ0KPiArICAgICAg
ICAgICAgbmVlZGVkICs9IEVOREJSNjRfTEVOOw0KDQpUaGlzIHdvbid0IHdvcmsgZm9yIGNmX2Ns
b2JiZXIgdGFyZ2V0cywgSSBkb24ndCB0aGluay7CoCBUaGUgRU5EQlIgZ2V0cw0KY29udmVydGVk
IHRvIE5PUDQgYW5kIGZhaWxzIHRoaXMgY2hlY2ssIGJ1dCB0aGUgYWx0Y2FsbHMgY2FsbGluZw0K
b2xkX2Z1bmMgaGFkIHRoZWlyIGRpc3BsYWNlbWVudHMgYWRqdXN0ZWQgYnkgKzQuDQoNClRoZSBp
c19lbmRicjY0KCkgY2hlY2sgd2lsbCBmYWlsLCBhbmQgdGhlIDUtYnl0ZSBqbXAgd2lsbCBiZSB3
cml0dGVuIGF0DQp0aGUgc3RhcnQgb2YgdGhlIGZ1bmN0aW9uLCBhbmQgY29ycnVwdCB0aGUgaW5z
dHJ1Y3Rpb24gc3RyZWFtIGZvciB0aGUNCmFsdGNhbGwoKSdkIGNhbGxlcnMuDQoNCkxldCBtZSB3
cml0ZSBhbiBpbmNyZW1lbnRhbCBwYXRjaCB0byBoZWxwLg0KDQp+QW5kcmV3DQo=


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 12:50:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 12:50:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286817.486471 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRZIU-0003Z6-5o; Tue, 08 Mar 2022 12:50:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286817.486471; Tue, 08 Mar 2022 12:50:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRZIU-0003Yz-2t; Tue, 08 Mar 2022 12:50:38 +0000
Received: by outflank-mailman (input) for mailman id 286817;
 Tue, 08 Mar 2022 12:50:36 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRZIS-0003Yt-LK
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 12:50:36 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 589a358d-9ede-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 13:50:35 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2105.outbound.protection.outlook.com [104.47.18.105]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-24-vATR96WNN2aNRBwzcqpWtQ-1; Tue, 08 Mar 2022 13:50:33 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM4PR0401MB2404.eurprd04.prod.outlook.com (2603:10a6:200:4b::26)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.18; Tue, 8 Mar
 2022 12:50:32 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 12:50:32 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 589a358d-9ede-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646743834;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=7SblrfZY2acWsqUY/KahSUzXx1gRY6ivrQqQpdsqMms=;
	b=nCkpefFyKx7YN5DWxJUaYQTwhcJfAd9AFuvTxB347Abkad7icGa8aP3QhHLOHWQ9MXdduD
	KFULR8wMbx1am6HdDW7VPTCCnfZvZUGOSrL27BNFphAdawaX8DG1c2Sv34vf2bZDG77/kv
	Yz20+STLrJdZge13TBC6ufN4B8CbFG0=
X-MC-Unique: vATR96WNN2aNRBwzcqpWtQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=XUXO6Z1K5q12jN6ITC4BonkRV2iUcE2+zgk3pR9mIqtFM2WdPRKMwaxjFNyeUVXFknW1yu9tWcv8UtyBNFBRF6RrcBdU/WWLKGBTd36A7P2rvR7ldX6AXKz1dV21i2SAMTpA4ZXeF+z2d//uBiml+RwmbgZEhBgX0vdGZp10QD9CryCGEOnCK0/Okhh7/YbBTjkcnucccIYO45ZNXSIYO6AiT4JHBYOca97SG7JDFTILVVqCsaZrtyYtzemdbj107Ab7QHzV+I+i/IxA3UrNbsJ3khe6XjNgYyRn0ezrpCnFEsYqZnPpahHsR0hBuoV6nva0i1o936D7HO0YUYn/0w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=43TsMcYIYFxlhUVO9Ze7uUWegEX8/4VzMzZawsv3Cns=;
 b=E/xlEDNh1BfDla6YhnpuJP1YBuN8LQVtKE5wh4XtGBFFhXBky+Pw8qSS6WG9MpW0jwxuTMkvh7S8N1mIoSai0Bid8IeBY1t/jm3MqQcC7FCm4uIwqqDbYCf0EdIzErmgIgh9x42sMWZnjDd9iczYVjrztiWJpaVj3xtT4BqiNHilzRNtRAAMUnxzYY/xWm466TUdx7x6V42ZzdV+uRKS2wkzvidOvOGotExQhdCgzfO2YcxcvBJJBYHUE+sButkPNLvxGKurlm2JpyKpKkVXr9VnpaKyf/p7QwM3qQgVFzLieKWlf5maJDS25/rKYQfB5AdcCLFZ82tgDbmZbSyNeg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <cc6c9782-fff6-1832-0c25-d8fd38ed1c1d@suse.com>
Date: Tue, 8 Mar 2022 13:50:30 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v3 00/13] xen: drop hypercall function tables
Content-Language: en-US
To: Juergen Gross <jgross@suse.com>
CC: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
 <julien@xen.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Christopher Clark <christopher.w.clark@gmail.com>,
 xen-devel@lists.xenproject.org
References: <20211208155606.20029-1-jgross@suse.com>
 <0ec9f176-1108-e1ac-a250-5ab9d151f7a8@suse.com>
 <4ac7c2ad-a600-f817-3b69-af0c1a47f4ac@suse.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <4ac7c2ad-a600-f817-3b69-af0c1a47f4ac@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR06CA0341.eurprd06.prod.outlook.com
 (2603:10a6:20b:466::14) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c4b7e7a5-04e4-42b0-52a9-08da01023b3c
X-MS-TrafficTypeDiagnostic: AM4PR0401MB2404:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<AM4PR0401MB2404DA7AC4B4642770DB57D0B3099@AM4PR0401MB2404.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6512007)(26005)(186003)(316002)(31686004)(6506007)(5660300002)(8936002)(7416002)(6486002)(508600001)(36756003)(6636002)(38100700002)(37006003)(54906003)(8676002)(66946007)(66556008)(66476007)(6862004)(83380400001)(66574015)(4326008)(2616005)(31696002)(86362001)(53546011)(2906002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?EmHMnMtjUPc4PPGbSNrmDAitf4Yhyvl0VLbKOM5L5O3YsIRsw0A6Y+Fg4oNb?=
 =?us-ascii?Q?CnudSjTn2bCTZ/vxEuqU0ocYZT4pPKwHxEl7axXDoSsOnkBj+Dof6wIcr2f/?=
 =?us-ascii?Q?l0Afud5WUzwJDcANm/w5RKB+ZympTmONl54n5aghn+3XGV0KSGrtTi+vEkfm?=
 =?us-ascii?Q?Brss4CCGKFHr6yQEXWhc7rwKavyoRhT+/ALynjGxLHmbgghDJjbjOOwsp9OJ?=
 =?us-ascii?Q?epDlgjV4XsTdNccS11nDckmUbNJ35vItte7icp4N8mf5K2ufawGpZNbkgnRU?=
 =?us-ascii?Q?lI8NT5TQmarbVKK9qWIRgVGeAKAP5UNwlRH0MRGIo4GaowsCw/OnjlALe1yV?=
 =?us-ascii?Q?gZCFDBZ+hNKhr+q1aDk8aQL7uVH8OO4CmHTdcyE/20/i/yrt+YjgZXCUvvPJ?=
 =?us-ascii?Q?PxSWnrLC4yzg2QNnOeRN9h69tMfp22urqgZBwr49fRuAuKIHFBvKtdtLGO2y?=
 =?us-ascii?Q?k6FLJ+JRSuYbvYD+tWCK50vCiPJkvxLNrXJrvKwGTjBGLN1sjyiyGfWTxKR5?=
 =?us-ascii?Q?evch6QvCa0Ydx8lHRZIRw5bDxllyCTvVcxXUF4ghRwCkMZHyuLjyP7FD4rwS?=
 =?us-ascii?Q?2qQjBlzBZZZ3zuexhNgam1eC3eGPr4/t+oxISqfqd5/WhsDW4/dnycZweZCY?=
 =?us-ascii?Q?j+74MNfTnZgQZlCjHkwtZfJ0uR+/AfBTDn0m6Z0pb3MSdmR7+iR3WId6Rjbd?=
 =?us-ascii?Q?7hbslQq7wsxXjjERk+tz9VdpkL2QS8kFYCXMMfy91ZQGZP07V3U/lVim7B22?=
 =?us-ascii?Q?ciSXx3qIz2KbtYLY37X1kheDUaHzwrC2C2h7yDisOe/9COOQqCPeRvQJR5H9?=
 =?us-ascii?Q?BIGjDWHo8PMRmXUKBwol3xe4zq0/dWV39y5nPT5H8cQ6cfkOp40msIdozYu5?=
 =?us-ascii?Q?ND3VuhFTWlzmiCaRJeTzFi6LSjdmhM7ErQkp7vL0lsCCyJan8CemQ8bDmpTm?=
 =?us-ascii?Q?YkT2F+IIL/4hjz0AdIUhs0JNSQ4wy7Snte9VmNcPhc0O9EokUZ+2KlIOieuG?=
 =?us-ascii?Q?tl0CfFJppqDqvBWAPvkT46Qg8G7wUJkW244cHuRsatl9STsmdjCyLJkEbkNX?=
 =?us-ascii?Q?mJ1dWSjWAj3r3bwialT0DT/bnvuzsvPdC2j6158uueETsCE52BWOIwQDeaj+?=
 =?us-ascii?Q?jb6kCSdRVNCGkG9E8yQxfZSBTkbMMFLjrX+g41HqoZI0A74tDsa5oX1cTGUY?=
 =?us-ascii?Q?CjffgdwBDKiKaVxl4IZyCSKwkQEqJOmuYEbQSZxznpsEgfntwgRsOhbw3DLw?=
 =?us-ascii?Q?8tfqQ7Ghd98AkzMsbAOU8oyxfHmpJVsmGQgwn2b5bm5u1TzMzVVskvRpybSV?=
 =?us-ascii?Q?7ZD/kkax9gupnMv+kBFV+Yu7FwwHlxcMS6fq2xXUspis1Mq1IgSkz/0oO+3l?=
 =?us-ascii?Q?v9VOA9OOMESDkArvNTInIfwtyrsKzxgScSO67eQ0iV8OuNy8kCPUmN11OttT?=
 =?us-ascii?Q?O18A5GtJSA3vtqo8PZXN7txQKN8V8Pr/K507vi+HsilKbe7ShaeC76ijb7dD?=
 =?us-ascii?Q?2zjHNosFi7QT6lJMedAiWDHIxUBDhWd2C/XhKQ7lFFZ2zIZtnx6RC6JZAHoY?=
 =?us-ascii?Q?qbktOe7Hnp3sPRQ3VoyhNpkhsYu2h2w/+RpJ5iG2B5M6Hwrvcgkbllsv/PSa?=
 =?us-ascii?Q?oT3npSxOxnwu+CV0tx7N9Ho=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c4b7e7a5-04e4-42b0-52a9-08da01023b3c
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 12:50:32.3280
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: ST0a9Dg3MvGWkkarn5spYTdpNbi5xzsPZrSPWaCo4IjwHMohdqAsfqYfwz/h+TcQXWv1uy8ujFpDYuO5pP+VVA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR0401MB2404

On 08.03.2022 09:39, Juergen Gross wrote:
> On 08.03.22 09:34, Jan Beulich wrote:
>> On 08.12.2021 16:55, Juergen Gross wrote:
>>> In order to avoid indirect function calls on the hypercall path as
>>> much as possible this series is removing the hypercall function tables
>>> and is replacing the hypercall handler calls via the function array
>>> by automatically generated call macros.
>>>
>>> Another by-product of generating the call macros is the automatic
>>> generating of the hypercall handler prototypes from the same data base
>>> which is used to generate the macros.
>>>
>>> This has the additional advantage of using type safe calls of the
>>> handlers and to ensure related handler (e.g. PV and HVM ones) share
>>> the same prototypes.
>>>
>>> A very brief performance test (parallel build of the Xen hypervisor
>>> in a 6 vcpu guest) showed a very slim improvement (less than 1%) of
>>> the performance with the patches applied. The test was performed using
>>> a PV and a PVH guest.
>>>
>>> Changes in V2:
>>> - new patches 6, 14, 15
>>> - patch 7: support hypercall priorities for faster code
>>> - comments addressed
>>>
>>> Changes in V3:
>>> - patches 1 and 4 removed as already applied
>>> - comments addressed
>>>
>>> Juergen Gross (13):
>>>    xen: move do_vcpu_op() to arch specific code
>>>    xen: harmonize return types of hypercall handlers
>>>    xen: don't include asm/hypercall.h from C sources
>>>    xen: include compat/platform.h from hypercall.h
>>>    xen: generate hypercall interface related code
>>>    xen: use generated prototypes for hypercall handlers
>>>    x86/pv-shim: don't modify hypercall table
>>>    xen/x86: don't use hypercall table for calling compat hypercalls
>>>    xen/x86: call hypercall handlers via generated macro
>>>    xen/arm: call hypercall handlers via generated macro
>>>    xen/x86: add hypercall performance counters for hvm, correct pv
>>>    xen: drop calls_to_multicall performance counter
>>>    tools/xenperf: update hypercall names
>>
>> As it's pretty certain now that parts of this which didn't go in yet wil=
l
>> need re-basing, I'm going to drop this from my waiting-to-be-acked folde=
r,
>> expecting a v4 instead.
>=20
> Yes, I was planning to spin that up soon.
>=20
> The main remaining question is whether we want to switch the return type
> of all hypercalls (or at least the ones common to all archs) not
> requiring to return 64-bit values to "int", as Julien requested.

After walking through the earlier discussion (J=C3=BCrgen - thanks for the =
link)
I'm inclined to say that if Arm wants their return values limited to 32 bit=
s
(with exceptions where needed), so be it. But on x86 I'd rather not see us
change this aspect. Of course I'd much prefer if architectures didn't
diverge in this regard, yet then again Arm has already diverged in avoiding
the compat layer (in this case I view the divergence as helpful, though, as
it avoids unnecessary headache).

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 12:56:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 12:56:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286823.486482 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRZO9-0004NN-S7; Tue, 08 Mar 2022 12:56:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286823.486482; Tue, 08 Mar 2022 12:56:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRZO9-0004NG-P8; Tue, 08 Mar 2022 12:56:29 +0000
Received: by outflank-mailman (input) for mailman id 286823;
 Tue, 08 Mar 2022 12:56:28 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=PwwU=TT=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nRZO8-0004NA-Ga
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 12:56:28 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 2a2ee535-9edf-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 13:56:26 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 52E80210F6;
 Tue,  8 Mar 2022 12:56:26 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id E264D13CC6;
 Tue,  8 Mar 2022 12:56:25 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id meNdNXlSJ2LxDgAAMHmgww
 (envelope-from <jgross@suse.com>); Tue, 08 Mar 2022 12:56:25 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2a2ee535-9edf-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646744186; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=2TinVxgpBltmc38/Ft3BPtdAYRYLtFPtFL5O9nocKzg=;
	b=jy1B76Bw6NxE4BGu74TMKQbxnkLsADI2Z7zwbArfbKz6B2OYnbFBPrnr/rrse+wH7yj8ug
	u0hiV3O6j8TnTmN7nS0edye8rTCgNVXGG0f8ZGz/2tAUge3iyMRQaBvTqASFcWK95+Oyi/
	lQ+3TkXlNQc0koarf0MYWUKI+y0lZUk=
Message-ID: <88014841-017c-5621-0193-c4223596a29c@suse.com>
Date: Tue, 8 Mar 2022 13:56:25 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [PATCH v3 00/13] xen: drop hypercall function tables
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
 <julien@xen.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Christopher Clark <christopher.w.clark@gmail.com>,
 xen-devel@lists.xenproject.org
References: <20211208155606.20029-1-jgross@suse.com>
 <0ec9f176-1108-e1ac-a250-5ab9d151f7a8@suse.com>
 <4ac7c2ad-a600-f817-3b69-af0c1a47f4ac@suse.com>
 <cc6c9782-fff6-1832-0c25-d8fd38ed1c1d@suse.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <cc6c9782-fff6-1832-0c25-d8fd38ed1c1d@suse.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------JgOu9i040aZrXOraR720U3MM"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------JgOu9i040aZrXOraR720U3MM
Content-Type: multipart/mixed; boundary="------------EGRo0aBMmMKY0pJDgztw7vXh";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Jan Beulich <jbeulich@suse.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
 <julien@xen.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Christopher Clark <christopher.w.clark@gmail.com>,
 xen-devel@lists.xenproject.org
Message-ID: <88014841-017c-5621-0193-c4223596a29c@suse.com>
Subject: Re: [PATCH v3 00/13] xen: drop hypercall function tables
References: <20211208155606.20029-1-jgross@suse.com>
 <0ec9f176-1108-e1ac-a250-5ab9d151f7a8@suse.com>
 <4ac7c2ad-a600-f817-3b69-af0c1a47f4ac@suse.com>
 <cc6c9782-fff6-1832-0c25-d8fd38ed1c1d@suse.com>
In-Reply-To: <cc6c9782-fff6-1832-0c25-d8fd38ed1c1d@suse.com>

--------------EGRo0aBMmMKY0pJDgztw7vXh
Content-Type: multipart/mixed; boundary="------------LSYYDkReDzhWAHwyr5OaBjrC"

--------------LSYYDkReDzhWAHwyr5OaBjrC
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------LSYYDkReDzhWAHwyr5OaBjrC
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------LSYYDkReDzhWAHwyr5OaBjrC--

--------------EGRo0aBMmMKY0pJDgztw7vXh--

--------------JgOu9i040aZrXOraR720U3MM
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmInUnkFAwAAAAAACgkQsN6d1ii/Ey/y
mQgAgbgUnP6j/2QbTVATl8RX69oOm2siRDie1pQQzqWb24JJSPvmh/CTaco/flFA7wbPEbMjHsgC
byqVn/G2e1xkKMs4N1GrLc9VY4MwT+UhkktSyaDSGKhv9O+mtky2LgU2IFMuOTnEcDd+caLjjJCD
i36Z8afjfRxjo/MUQSS2lkgwe1GEr1EUcSGuBYZ1O8CAN0bfGaJFR4v9WLxtLuSfJXsRatlRfaZA
5OJat1R/sTqHsUBkDkrt2Ik9MhOY11c59ACqrZjeojZUzzu28juqWpP/Y7BbPL856SxCjyVv840b
mcwhNrOiY6ws1QVD7UHHblTpwwswxns7bqsK/65MpQ==
=2aev
-----END PGP SIGNATURE-----

--------------JgOu9i040aZrXOraR720U3MM--


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 12:59:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 12:59:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286829.486494 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRZQj-0004yg-9b; Tue, 08 Mar 2022 12:59:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286829.486494; Tue, 08 Mar 2022 12:59:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRZQj-0004yZ-65; Tue, 08 Mar 2022 12:59:09 +0000
Received: by outflank-mailman (input) for mailman id 286829;
 Tue, 08 Mar 2022 12:59:08 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRZQi-0004yN-2B; Tue, 08 Mar 2022 12:59:08 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRZQh-0000cm-Vs; Tue, 08 Mar 2022 12:59:07 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRZQh-0003zf-FW; Tue, 08 Mar 2022 12:59:07 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRZQh-00009S-F3; Tue, 08 Mar 2022 12:59:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=eFn4cDRHxV8xnff0KWta4y2Y4M6hSTijt7cXuq1Wh/o=; b=6gTBJI2fXcBKDq5mhsxOFKqTU+
	tq/HCjIelny+U6nwW9u8NkYHPxOJED9m0ycw4UdCW88beSv+1XmZn8M29fcRhBS/FLVu+7Oycki4/
	khkMl9Nw3UG1us85lb7jAM5Mz0TtN/8h7kpO12Y5Y3abUpp4Gts4P/VgUkdnPPFibHYk=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168478-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168478: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=62fa37fe7b9df3c54a2d9d90aed9ff0e817ee0c6
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 08 Mar 2022 12:59:07 +0000

flight 168478 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168478/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 62fa37fe7b9df3c54a2d9d90aed9ff0e817ee0c6
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    8 days
Failing since        168258  2022-03-01 01:55:31 Z    7 days   79 attempts
Testing same since   168469  2022-03-07 23:11:34 Z    0 days    5 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 468 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 13:06:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 13:06:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286841.486505 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRZXf-0006fg-68; Tue, 08 Mar 2022 13:06:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286841.486505; Tue, 08 Mar 2022 13:06:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRZXf-0006fZ-31; Tue, 08 Mar 2022 13:06:19 +0000
Received: by outflank-mailman (input) for mailman id 286841;
 Tue, 08 Mar 2022 13:06:17 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=lJ0X=TT=oracle.com=konrad.wilk@srs-se1.protection.inumbo.net>)
 id 1nRZXd-0006fS-Ea
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 13:06:17 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 87162064-9ee0-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 14:06:13 +0100 (CET)
Received: from pps.filterd (m0246631.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 228Ci8Yw002361; 
 Tue, 8 Mar 2022 13:06:10 GMT
Received: from aserp3020.oracle.com (aserp3020.oracle.com [141.146.126.70])
 by mx0b-00069f02.pphosted.com with ESMTP id 3ekxn2eyjw-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Tue, 08 Mar 2022 13:06:09 +0000
Received: from pps.filterd (aserp3020.oracle.com [127.0.0.1])
 by aserp3020.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 228D1G3a049374;
 Tue, 8 Mar 2022 13:06:09 GMT
Received: from nam12-dm6-obe.outbound.protection.outlook.com
 (mail-dm6nam12lp2170.outbound.protection.outlook.com [104.47.59.170])
 by aserp3020.oracle.com with ESMTP id 3ekyp256u7-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Tue, 08 Mar 2022 13:06:08 +0000
Received: from SN6PR10MB3006.namprd10.prod.outlook.com (2603:10b6:805:cf::13)
 by BL0PR10MB2996.namprd10.prod.outlook.com (2603:10b6:208:7e::10)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.17; Tue, 8 Mar
 2022 13:06:07 +0000
Received: from SN6PR10MB3006.namprd10.prod.outlook.com
 ([fe80::99d1:2941:91dc:bc78]) by SN6PR10MB3006.namprd10.prod.outlook.com
 ([fe80::99d1:2941:91dc:bc78%4]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 13:06:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 87162064-9ee0-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=date : from : to : cc
 : subject : message-id : references : content-type :
 content-transfer-encoding : in-reply-to : mime-version; s=corp-2021-07-09;
 bh=zK/deBtyWDe5Xvuz1WlD5E5TH2mXQmiuMqnIbzuiDCw=;
 b=ZC6g0BoSBthcCe4uPM0yHYFXDHvQQL1dH96mXQU9T12rBLvHxiQxuXlQjrjs0mGHcv2T
 bbQ4EUB785Keaa8wMFSySl4OkYwxfFMHK+ldUZ48Qky9yvTzvCe9I9BSjzUL3sdwyRGX
 na1ACOOr5/ib5uySjUb3DQYimN0oH3/15uMKg7Vn2WBJL4S5mKRlyTF+eQYac3Fskbpa
 bvSuojHjpYmIMS1t3/7+yWxe4aXvF9A/HMtpoEO70BTuwWiWUpSqmF7Ra/QGPkZ4bhrC
 xme46zm8YUia0nvu9YSoyTjSOpBkBviEp2HqJtpWgHaNfSEfYhnHV796ByYlwCDPitbs Qw== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ILakcvTkwE1+9VuNmQObt2wr4jROyZXkdVvR09dfwUwFBfontVknKpuua8I7QFzoFSF6Gd+zH/HybBsNzkFhfbS1I+cQKnwDyEPy/ZXScCJwPEY0/P2Rq6PfjgE8rsEAU+1B/h3Vo8Kh1vhXotxWYzKx5qiWYstAhjQu1C7eN9bIUBY4GicVFpTzTNxegTm+LYDM2LzUi9WI/AmhF4jg4OZ3K3h5TvSm3mYjvH4JMJSJDl2xHWZFywYWv32DY2MwtBhFRvuok6K+LXHPeyQj4g6TPx9g48GZa55cK2QLOJ2I4PgdsSOKSkeCtx3+NS2deiEJsooeWNIeNlAPsodBrQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=3U3C21nHbh6mCK8Uus/6EZdN0ukFe+dqwkhazJX0mcQ=;
 b=RU4WLfqEF7WM5mCxDKxxquSP464Mbh0AOJcFaazC6EqEQYfKc3s/69CBBGHzZbusVVE9+vOOuWm4zmiXYqo9lHayJz1ebJhIHlayJfYvAO1+9ly7KriAlk85XtYz0zw7coAeALGiM9FIwNSerQVNs3KHFg+JN4c4Z+wYGpIQqr00axAL4alhdmqPRq1fvER4Y3Po0ebO5S6U/Y0pMojFVx/m//h0SqjxFLgxW/Wf2lI7bm+b7iiyDIcVkfwBnTQSzIqDIYzyZW0SxjzhkJx6AZaHUHDuL+ZWhBAOE0qFJ8v9s/I2EuI+pBHtTXZ3pRLs7XKYehLntn+7E0zIBbg69g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=3U3C21nHbh6mCK8Uus/6EZdN0ukFe+dqwkhazJX0mcQ=;
 b=BlIGv8b3N5opWjDV0uUSYK85FUe4TvXRnfMlvCXwthHpFd8Ev3km1TWcl0BtdrycanzCSZ7OkcMBukS/josyrALEizxxyT8ANezZSmw7WVTN1QmsZNla6x2EEupkfOzGW7SWLF1y0F9GgG1iPjo76LoizTVR3myHt10uWqEP5+s=
Date: Tue, 8 Mar 2022 08:06:02 -0500
From: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
Cc: Bjoern Doebel <doebel@amazon.de>,
        "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
        Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>,
        Roger Pau Monne <roger.pau@citrix.com>,
        Ross Lagerwall <ross.lagerwall@citrix.com>
Subject: Re: [PATCH v3 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
Message-ID: <YidUuuWGAghGY7oM@char.us.oracle.com>
References: <453c6e5decb315109a4fbf0065cc364129dca195.1646735357.git.doebel@amazon.de>
 <b91fc474832dd0ce07d223542316fba74afc35ee.1646735357.git.doebel@amazon.de>
 <cf0be28d-090c-1881-5831-1d58696a9272@citrix.com>
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <cf0be28d-090c-1881-5831-1d58696a9272@citrix.com>
X-ClientProxiedBy: MN2PR20CA0012.namprd20.prod.outlook.com
 (2603:10b6:208:e8::25) To SN6PR10MB3006.namprd10.prod.outlook.com
 (2603:10b6:805:cf::13)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c9aba4ff-64f7-4b93-30e4-08da01046851
X-MS-TrafficTypeDiagnostic: BL0PR10MB2996:EE_
X-Microsoft-Antispam-PRVS: 
	<BL0PR10MB2996570D098089928362375689099@BL0PR10MB2996.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	tIkYvuYjZQ6J47r6+SXXQat7wivwNydZNdScmJqtQkSie2eYdi6P0ek7kfCB66OKDyydcdG5Meghogvw1DwkpVJhdHFDpcmrXuQ1HOWYH2mQ1c8HSZZZkJrAsQv/pt+6Kh/aLi4sce7dEG1UE7O0bs5MRJG+ybzTgYD5Dr9p5WoOOtSx79xBGbQOlSl4j4eIxazelcQwYYNoW7PbBQg7T1lnhPDY1pKC0GWAgyojJp4+kCZQoZiTz1b9iKMYsonyYFlkSTM0hXBv0/dSQnDgdlNhVC/r0bj9CBc9mDLgto7PJY0q4MAipEf/I/dBybMC4Pfxe8X4JZYb4quqRAepRHyKrAN5SE3nQ5a2yl1gsfzakqSaVfJiBUMI/ue4YYIyXhAXcnZs9LMPWla9kWZ13zCEtD1uH8BhIPfwZoFfrqK438jyjnmyRmYkPvX9pt4i56PBCd+Rt2YQSAhDtfKB+VxH4pQAboRVH1k0w/ZLVp6/9BbZwOhh8P9DYgEn28mlGKM+3iccwmKoLUf6a/beYYV/pHOSvLrj9XaxboK+3F2rELazJr4/lM8Mp0NlCNumGJIX5i0cjpXxz3hnAX8lkCYycrdX1DO+h4OUyqlsR5+gVkpeKFEHhnY7p7iO5gQJDEMTwt/REtINGWnTgcmiCD+XOoGaYRdJE4PwVRBUpJ4ydB/wenRjVXVqiEu1xWR/mw2/WQg11IjtHbXXEQ0wrw==
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SN6PR10MB3006.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(26005)(186003)(2906002)(52116002)(508600001)(6916009)(316002)(6666004)(5660300002)(6506007)(83380400001)(86362001)(8936002)(6512007)(53546011)(54906003)(38100700002)(38350700002)(6486002)(8676002)(66556008)(4326008)(66946007)(66476007);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?iso-8859-1?Q?JH3XsmRAQez4Fe1F5c574ha+0aCqpQrujgBZHYFKfjDm2Hd+Vj7h68k/X2?=
 =?iso-8859-1?Q?k3wG5EDLgG53dGpd52GsEL/6LCllj8q5bT88jKYz2FhKkydE0pZpdTVTn0?=
 =?iso-8859-1?Q?WIyQ1Qv+qUwGhkd5JTEePlveDpshwLxo9AcA4PCRRIwHmV+oMrDYxo72Au?=
 =?iso-8859-1?Q?7Ut/JrhJmf7nsyrbMpYLxz3fGNf8cC+Jw7J6Mdq4L4T9t21Sk87r312F++?=
 =?iso-8859-1?Q?g9hA9VHofyeavfM6/5t7uagOfbGMpJMQI2+/eBcBAGDihmyLfJQhi3TVRK?=
 =?iso-8859-1?Q?arpPCfgmd4WT6n9O8Yp8xqg3e96ez/D0oByHZwakW9Gcpc7xWPNIxSBcWk?=
 =?iso-8859-1?Q?IpkHchW9DhpoXXm5EmZGp2tpISyEU3CThI3wUbhhsTwsW4UlbdislfjGCC?=
 =?iso-8859-1?Q?eqJoMZrdMZFsArfxRX/TukDwS2jvJVZtBVTwMMf4vkkYekpQUYW2ADlDJj?=
 =?iso-8859-1?Q?lMCimmDZbCiUEwSw0zWvhSYEd+pAzAZnUhHmCqWtat8j0bEzkkmMpPtmZZ?=
 =?iso-8859-1?Q?ls8JqlA6xWsD9dK1JnWd2exXHdwgQP/PJU/vuY+SlXttUUuASOpYXaZqXY?=
 =?iso-8859-1?Q?IBN1NADpcUVZLI/Re+1Hd9nErdc1ACEh4RKwefBDaCzomE+1KkscSrqqte?=
 =?iso-8859-1?Q?AI/z5qY9BD03qLzOw+fmwQvKmFva2+TdBD0S2DhUdOBrkxOVT1uRz0al3m?=
 =?iso-8859-1?Q?jQABHpD/ZwpfBqqg1UwzPDfcMkvaH+tMOkrbgOc9w+5CHI5MItl3sGEAF4?=
 =?iso-8859-1?Q?ZY3VZfRlpzugYq1c7ooxSIx0+ok5ily7DQRVgfTOtjU/lDwkIm3J8xjs/p?=
 =?iso-8859-1?Q?o8jPZPls7Y1zmCj16PROTGquR1ZZVDSUJZH5TkyqFjyO1CUht+d4QiaffT?=
 =?iso-8859-1?Q?PdW5pv0oaNQOz2kQQZwyr18gcvsoSNX1QuOm+fHwwWoYs5t4yrKCxJ/ET1?=
 =?iso-8859-1?Q?ESIn0Gz4Sz5XQYBZ+ctmK7fal4NcX9rG3Ga3UGw7HCTc9bRgFsYAuc+ek9?=
 =?iso-8859-1?Q?J3lbB7UvON9JtmCB9sKCSn342ZSKfxJF6dsjLbV71lZZus4vY16vwvk2+V?=
 =?iso-8859-1?Q?Vbb9ilsjL21Irf4PapCEiRxnI3jo9hp4y07EbqpW0IjDFbZ9FDUmSfFLVq?=
 =?iso-8859-1?Q?t7I70mIIlsysM3/uw9bWeaxJMPx4gjH4g44m85NXVLzBUvjAkOnB/hbw+p?=
 =?iso-8859-1?Q?9571U33MRYLiP4PSm9E1lG2PmCeo4Qa7OhuHKQ1hmYRLWfI9vIOKISjqzJ?=
 =?iso-8859-1?Q?T/ZMwfzkV4Put+vCH6Ymq/W4ydVDabW5bACA/ebhI1V7mxfr13578WLx4O?=
 =?iso-8859-1?Q?Kh3gNEnwQJ66Z8jWwyfdSCaawT1scGKAGnJ3C4jgBgTZS2qv6FRio1ZFT+?=
 =?iso-8859-1?Q?7luRgx6pvFSqM+bm1xfAm2YH03+NZJQGXmrykNGKkwa3eYdED/LWXX+5r/?=
 =?iso-8859-1?Q?qoKSpRjfxhtVjt2nf2axN/BTXRRlcVR/SBl3Zs+jacmm5FUXtGoj7xO/NR?=
 =?iso-8859-1?Q?zeQ8Juh8dy1wwRRsHKDOnrc4VmuDv6FTj2ovICgfmvcmvKXQFLGIVWhZ5u?=
 =?iso-8859-1?Q?RuTgHViw05F6XrxzPfcWvVPcySo3b6PF7n4FHyosgV1eD+8tJJnX7pbcFb?=
 =?iso-8859-1?Q?13C6j3fC4TEly1ulxai53XGooy+UYOKk2AYvjnhERCqvNEy9tHLY+fhAwS?=
 =?iso-8859-1?Q?n4L+8QDh5bfaKUVnEJQ=3D?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c9aba4ff-64f7-4b93-30e4-08da01046851
X-MS-Exchange-CrossTenant-AuthSource: SN6PR10MB3006.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 13:06:06.9713
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: A+sm8FnF1hDYlRFBJL9gD2W1vSKB84fVGAw4kGMkToBYtFAapM02HFq62XzVskBDvMmAfje38LhnOVz3p0GrYg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR10MB2996
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10279 signatures=690470
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 phishscore=0 mlxscore=0
 bulkscore=0 mlxlogscore=999 spamscore=0 adultscore=0 malwarescore=0
 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2202240000
 definitions=main-2203080069
X-Proofpoint-ORIG-GUID: mFGNdE0amdSGzz_rxlHwdKJZDhxZZYjy
X-Proofpoint-GUID: mFGNdE0amdSGzz_rxlHwdKJZDhxZZYjy

On Tue, Mar 08, 2022 at 12:44:54PM +0000, Andrew Cooper wrote:
> On 08/03/2022 10:29, Bjoern Doebel wrote:
> > @@ -104,18 +122,34 @@ void noinline arch_livepatch_revive(void)
> >  
> >  int arch_livepatch_verify_func(const struct livepatch_func *func)
> >  {
> > +    BUILD_BUG_ON(sizeof(struct x86_livepatch_meta) != LIVEPATCH_OPAQUE_SIZE);
> > +
> >      /* If NOPing.. */
> >      if ( !func->new_addr )
> >      {
> >          /* Only do up to maximum amount we can put in the ->opaque. */
> > -        if ( func->new_size > sizeof(func->opaque) )
> > +        if ( func->new_size > sizeof_field(struct x86_livepatch_meta,
> > +                                           instruction) )
> >              return -EOPNOTSUPP;
> >  
> >          if ( func->old_size < func->new_size )
> >              return -EINVAL;
> >      }
> > -    else if ( func->old_size < ARCH_PATCH_INSN_SIZE )
> > -        return -EINVAL;
> > +    else
> > +    {
> > +        /*
> > +         * Space needed now depends on whether the target function
> > +         * starts with an ENDBR64 instruction.
> > +         */
> > +        uint8_t needed;
> > +
> > +        needed = ARCH_PATCH_INSN_SIZE;
> > +        if ( is_endbr64(func->old_addr) )
> > +            needed += ENDBR64_LEN;
> 
> This won't work for cf_clobber targets, I don't think. The ENDBR gets
> converted to NOP4 and fails this check, but the altcalls calling
> old_func had their displacements adjusted by +4.
> 
> The is_endbr64() check will fail, and the 5-byte jmp will be written at
> the start of the function, and corrupt the instruction stream for the
> altcall()'d callers.
> 
> Let me write an incremental patch to help.

Please add Acked-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
on the patches.

Thank you
> 
> ~Andrew


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 13:21:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 13:21:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286855.486521 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRZlm-0000sM-NZ; Tue, 08 Mar 2022 13:20:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286855.486521; Tue, 08 Mar 2022 13:20:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRZlm-0000sF-KA; Tue, 08 Mar 2022 13:20:54 +0000
Received: by outflank-mailman (input) for mailman id 286855;
 Tue, 08 Mar 2022 13:20:53 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=JMfM=TT=amazon.de=prvs=0590b4220=doebel@srs-se1.protection.inumbo.net>)
 id 1nRZlk-0000s9-MN
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 13:20:53 +0000
Received: from smtp-fw-33001.amazon.com (smtp-fw-33001.amazon.com
 [207.171.190.10]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 91ca30a8-9ee2-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 14:20:50 +0100 (CET)
Received: from iad12-co-svc-p1-lb1-vlan2.amazon.com (HELO
 email-inbound-relay-pdx-2c-d9fba5dd.us-west-2.amazon.com) ([10.43.8.2])
 by smtp-border-fw-33001.sea14.amazon.com with ESMTP; 08 Mar 2022 13:20:33 +0000
Received: from EX13D03EUC002.ant.amazon.com
 (pdx1-ws-svc-p6-lb9-vlan2.pdx.amazon.com [10.236.137.194])
 by email-inbound-relay-pdx-2c-d9fba5dd.us-west-2.amazon.com (Postfix) with
 ESMTPS id F1C7B41617; Tue,  8 Mar 2022 13:20:31 +0000 (UTC)
Received: from [192.168.10.142] (10.43.165.107) by
 EX13D03EUC002.ant.amazon.com (10.43.164.60) with Microsoft SMTP Server (TLS)
 id 15.0.1497.28; Tue, 8 Mar 2022 13:20:29 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 91ca30a8-9ee2-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646745651; x=1678281651;
  h=message-id:date:mime-version:to:cc:references:from:
   in-reply-to:content-transfer-encoding:subject;
  bh=u0TzM/J6sUbtlm6lScP8iZ+QOEpp0cLSgO7WYa9y4Hs=;
  b=kc18cK4ZZ7Fe3umYn9G/tDjTQpm+WcCB7uj5+K/SfoSvIhLxuFnpDAjC
   R0f883sZJaRTSl7/jp+/nYKChLJdjjQdSEM70IE2B9Jr/4SqzC0PD7iKG
   ZUsAGacwElZY9gZCmu/yB3qiIjhjk7PhVJVRiQB2O4inOXDb3y448+kK0
   g=;
X-IronPort-AV: E=Sophos;i="5.90,164,1643673600"; 
   d="scan'208";a="180538900"
Subject: Re: [PATCH v3 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
Message-ID: <47098ee3-e75d-7f61-6550-bb006186e7e1@amazon.de>
Date: Tue, 8 Mar 2022 14:20:28 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, Roger
 Pau Monne <roger.pau@citrix.com>, Konrad Rzeszutek Wilk
	<konrad.wilk@oracle.com>, Ross Lagerwall <ross.lagerwall@citrix.com>
References: <453c6e5decb315109a4fbf0065cc364129dca195.1646735357.git.doebel@amazon.de>
 <b91fc474832dd0ce07d223542316fba74afc35ee.1646735357.git.doebel@amazon.de>
 <cf0be28d-090c-1881-5831-1d58696a9272@citrix.com>
From: "Doebel, Bjoern" <doebel@amazon.de>
In-Reply-To: <cf0be28d-090c-1881-5831-1d58696a9272@citrix.com>
X-Originating-IP: [10.43.165.107]
X-ClientProxiedBy: EX13D45EUC001.ant.amazon.com (10.43.164.107) To
 EX13D03EUC002.ant.amazon.com (10.43.164.60)
Precedence: Bulk
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: base64
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=



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 13:21:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 13:21:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286860.486532 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRZmM-0001OM-W0; Tue, 08 Mar 2022 13:21:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286860.486532; Tue, 08 Mar 2022 13:21:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRZmM-0001OF-T2; Tue, 08 Mar 2022 13:21:30 +0000
Received: by outflank-mailman (input) for mailman id 286860;
 Tue, 08 Mar 2022 13:21:29 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=JMfM=TT=amazon.de=prvs=0590b4220=doebel@srs-se1.protection.inumbo.net>)
 id 1nRZmL-0001Ff-Mf
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 13:21:29 +0000
Received: from smtp-fw-9103.amazon.com (smtp-fw-9103.amazon.com
 [207.171.188.200]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a83c478d-9ee2-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 14:21:28 +0100 (CET)
Received: from pdx4-co-svc-p1-lb2-vlan2.amazon.com (HELO
 email-inbound-relay-pdx-2c-9ec26c6c.us-west-2.amazon.com) ([10.25.36.210])
 by smtp-border-fw-9103.sea19.amazon.com with ESMTP; 08 Mar 2022 13:21:09 +0000
Received: from EX13D03EUC002.ant.amazon.com
 (pdx1-ws-svc-p6-lb9-vlan2.pdx.amazon.com [10.236.137.194])
 by email-inbound-relay-pdx-2c-9ec26c6c.us-west-2.amazon.com (Postfix) with
 ESMTPS id 8941241C97; Tue,  8 Mar 2022 13:21:09 +0000 (UTC)
Received: from [192.168.10.142] (10.43.165.107) by
 EX13D03EUC002.ant.amazon.com (10.43.164.60) with Microsoft SMTP Server (TLS)
 id 15.0.1497.28; Tue, 8 Mar 2022 13:21:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a83c478d-9ee2-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646745688; x=1678281688;
  h=message-id:date:mime-version:to:cc:references:from:
   in-reply-to:content-transfer-encoding:subject;
  bh=U8K1pxteJUEIIJcy+OZKLzmxnc/Sh4osDnYwHGQ6aoY=;
  b=l1O14519JOBu+zpbOhicGcJwe/VDcD0bYuFBIlS9Kn/nBfsSHTcfAOER
   NVoMZg+fNVAZmxOYVXUN73ZvEwz4X7poMYOprqdDIbc7lHTH1jnnd2oJ4
   i0emrVvpd4QyOrUt8Nc24BOv4re1NQMUab0DqUbYb27EpYU1D/GZFA9Mg
   E=;
X-IronPort-AV: E=Sophos;i="5.90,164,1643673600"; 
   d="scan'208";a="997599590"
Subject: Re: [PATCH v3 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
Message-ID: <fa561059-a98c-9724-1db1-0af1fc124c20@amazon.de>
Date: Tue, 8 Mar 2022 14:21:06 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Content-Language: en-US
To: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>, Andrew Cooper
	<Andrew.Cooper3@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Michael
 Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, Roger Pau Monne
	<roger.pau@citrix.com>, Ross Lagerwall <ross.lagerwall@citrix.com>
References: <453c6e5decb315109a4fbf0065cc364129dca195.1646735357.git.doebel@amazon.de>
 <b91fc474832dd0ce07d223542316fba74afc35ee.1646735357.git.doebel@amazon.de>
 <cf0be28d-090c-1881-5831-1d58696a9272@citrix.com>
 <YidUuuWGAghGY7oM@char.us.oracle.com>
From: "Doebel, Bjoern" <doebel@amazon.de>
In-Reply-To: <YidUuuWGAghGY7oM@char.us.oracle.com>
X-Originating-IP: [10.43.165.107]
X-ClientProxiedBy: EX13D05EUC001.ant.amazon.com (10.43.164.118) To
 EX13D03EUC002.ant.amazon.com (10.43.164.60)
Precedence: Bulk
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: base64
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From xen-devel-bounces@lists.xenproject.org Tue Mar 08 13:37:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 13:37:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286868.486542 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRa1I-0003IR-8L; Tue, 08 Mar 2022 13:36:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286868.486542; Tue, 08 Mar 2022 13:36:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRa1I-0003IK-5Q; Tue, 08 Mar 2022 13:36:56 +0000
Received: by outflank-mailman (input) for mailman id 286868;
 Tue, 08 Mar 2022 13:36:54 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=yKud=TT=citrix.com=prvs=05922dae9=ross.lagerwall@srs-se1.protection.inumbo.net>)
 id 1nRa1G-0003IE-PV
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 13:36:54 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ce9e503e-9ee4-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 14:36:52 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ce9e503e-9ee4-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646746612;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-transfer-encoding:mime-version;
  bh=YC2dQfpJ2fbNbYs7YXDh7qTnSgC6EiRUZ1X06aKiLG0=;
  b=QDRqCTTNf6jIB3wQqtZUmdUFCtwmMBJ0m3LewyAeg4629YzHMi1AvPxk
   f79UPpG3P5/ta5wKnzx14dp+dBAM/l81hc6TOJz7DdqcfhE4xsuXVsEFt
   7JTnq8X9UW1xwPUbbQQHTTfWY2BhsVxbW42SJ4BGyZtoY/ERWzwDnmERI
   0=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65711074
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:nBYnza4/qv/UIcvP1bteFwxRtA7HchMFZxGqfqrLsTDasY5as4F+v
 mVKDWqOPfbbMTTwc4twaoqx/U8G7JCDydJnTgdsrSpjHi5G8cbLO4+Ufxz6V8+wwmwvb67FA
 +E2MISowBUcFyeEzvuVGuG96yE6j8lkf5KkYAL+EnkZqTRMFWFw0XqPp8Zj2tQy2YPhU1vU0
 T/Pi5a31GGNimYc3l08s8pvmDs31BglkGpF1rCWTakjUG72zxH5PrpGTU2CByKQrr1vNvy7X
 47+IISRpQs1yfuP5uSNyd4XemVSKlLb0JPnZnB+A8BOiTAazsA+PzpS2FPxpi67hh3Q9+2dx
 umhurSAaF8XbvyLwdgZdBIFIhlyfrZX15vYdC3XXcy7lyUqclPpyvRqSko3IZcZ6qB8BmQmG
 f4wcW5XKErZ3qTvnez9GrIEascLdaEHOKsFvWp7izXQAvs8XpnHR43B5MNC3Sd2jcdLdRrbT
 5RENmM2NEucC/FJEnYoDI9ghv+GuiXEWiZyi2qYlZMx6lGGmWSd15CyaYGIK7RmX/59kkGVr
 G/C1238CwMdMpqTxFKt8G+oh+LJtTP2XsQVDrLQ3u5nhhify3IeDDUSVECnur+ph0imQdVdJ
 kcIvC00osAa90utVNDxGQK5pH2suQQVUN5dVeY97WmwJrH8uljDQDJeF3gYNYJg5JReqSEWO
 kGhr/KxO2w+9+SpTVWWq4asoXCpKAcxMjpXDcMbdjct797mqYA1qxvASNd/DaK45uHI9SHML
 yOi93Zn2ehK5SIf/+DipA2c3WrwznTcZlNtvm3qsnSZAhSVjWJPT6ih8hDl4PlJN+51pXHR7
 SFfy6ByAA3jZKxhdRBhos1QRNlFBN7faVUwZGKD+bF7r1xBHFb5IehtDMlWfhsBDyr9UWaBj
 LXvkQ1Q/oRPG3ChcLV6ZYm8Y+xzk/S+S4u1C6uNPocVCnSUSONh1Hs1DaJ39zqx+HXAbIllY
 cvLGSpSJSxy5VtbIMqeGL5GjO5DKtEWzmLPX5HrpylLIpLFDEN5vYwtaQPUBshgtfvsiFyMr
 753apvboz0CAbaWSnSGruYuwaUicCFT6Wbe8JcMKIZu42NORQkcNhMm6e95K9w/wfUPzbugE
 7PUchYw9WcTTEbvcG2iQntidKnuTdB4q3c6NjYrJlGmxz4oZoPH0UvVX8JfkWUPnAC78cNJc
 g==
IronPort-HdrOrdr: A9a23:IqEcvqkkpRO43JOvmTIzrlAonzrpDfIo3DAbv31ZSRFFG/Fw8P
 re+8jztCWE7Ar5PUtKpTnuAsW9qB/nmqKdgrNwAV7BZmfbUQKTRekJgLcKqAeAJwTOssJbyK
 d8Y+xfJbTLfD1HZB/BkWqF+gAbsbu6zJw=
X-IronPort-AV: E=Sophos;i="5.90,164,1643691600"; 
   d="scan'208";a="65711074"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=eYK9dv2j9HDejrEMrCztKBi4QviuFtNJlLPN7dxYy4UGU7Ce/0rI2SUHH1UB6lhwFcH0lzA4VzcuPgI4V/h2iLDRFf1p1zcAEIwcz/CtrAIiL5qFvYSy38fiAqFZlsidOTEdLqpqSecRyitVcWL+tMEgJKfkN2IBr+h/qLkgfDW+QiX3mKThG0DEUrrdKOznYQL4A/IP60g3XTZdxq+R1mW/4FCQmIF7+x85fm61RGsgoyEWsbXyTr5vsyyMVlDKSOBervgdsO9gMKCWO+4ZaVn3CZcdNG4zZ1QFKLtwwo/dgNiQ7PVQq2EtFP31/W8/nGWghkCuyhg4WOQEQr+QhQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=QLAu9qJDL/P9QGfhR/kTH95q3pawlGzxzncuIe9wUgs=;
 b=kdpFj2FR9d3U+JCY62LiyfXclNoXOWuYZroeOvSNUM6ktdJlrT7I/5O2haJ/0c26XkrWETPTFsPcVL0Jy3+fNQ2QEPaIqvRXaraE+vzsD6JMU25/gyDZa9vdhHQuC6fdsTSpKbHlt9BAiJp4DI1QM+DfuYux4ZY6Gsgs53m2bJPu5Hlu/RFB8sdMSy3tOr/22b38+nCGKO/OVtbs27eqJfiGzxLSLLy6XpiOKkGzmAuqlLPX2yYnyH8Ikfk9qVpgIMf4VwfAFIVCfjuwb98+WODzStXQXNF1lpcw/UFCquOX2UdSsMMcfKvuWByZOaAZeda0Hem9EakwZkrKkFb/Lg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=QLAu9qJDL/P9QGfhR/kTH95q3pawlGzxzncuIe9wUgs=;
 b=aLIgb2iTWZWGXNQAVLOiDKRf1EU0BLCftym9F5u1nLLSAqfnz05UEUbbH9P5AeG616OVw+p1G4JKk8CoU2kdA+nyBUeN7CB0no2dNwQAXTt8Lh2M1wH/FlNIyBUXXOcTowc3i4znx5RiXhgeXEcgcPYabb2QiTXIP0D7JbSgBUQ=
From: Ross Lagerwall <ross.lagerwall@citrix.com>
To: Roger Pau Monne <roger.pau@citrix.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: "konrad.wilk@oracle.com" <konrad.wilk@oracle.com>, "doebel@amazon.de"
	<doebel@amazon.de>, "julien@xen.org" <julien@xen.org>, Andrew Cooper
	<Andrew.Cooper3@citrix.com>
Subject: Re: [PATCH 1/4] livepatch: update readme to mention --xen-depends
Thread-Topic: [PATCH 1/4] livepatch: update readme to mention --xen-depends
Thread-Index: AQHYLkHWdk8ixY/QjEWIM7th04Hb+ay1hLe9
Date: Tue, 8 Mar 2022 13:36:46 +0000
Message-ID: <PH0PR03MB6382F67574E30A2A5D773E38F0099@PH0PR03MB6382.namprd03.prod.outlook.com>
References: <20220302142711.38953-1-roger.pau@citrix.com>
 <20220302142711.38953-2-roger.pau@citrix.com>
In-Reply-To: <20220302142711.38953-2-roger.pau@citrix.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
suggested_attachment_session_id: cbca4830-1a8d-bc00-f705-a2e9a29f6dcc
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 418a0961-ed07-4c68-bbcc-08da0108b0e3
x-ms-traffictypediagnostic: CH0PR03MB6004:EE_
x-microsoft-antispam-prvs: <CH0PR03MB6004229DC8BD75EAD61C6529F0099@CH0PR03MB6004.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PH0PR03MB6382.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(5660300002)(52536014)(8676002)(4326008)(66946007)(66556008)(66446008)(64756008)(76116006)(122000001)(7696005)(33656002)(66476007)(8936002)(110136005)(38100700002)(6506007)(91956017)(316002)(54906003)(55016003)(44832011)(2906002)(15650500001)(86362001)(186003)(107886003)(71200400001)(53546011)(26005)(9686003)(508600001)(38070700005)(83380400001)(82960400001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?ruodvh+8SXYBbFcf3We5JlBZfN0UT2/SCpJBCFqqPdsJrcWPjTgQkabBCV?=
 =?iso-8859-1?Q?/i9QM5FQOHfDhwXxLJhfDLg3dXrG9wYMyFv2gU3XufC14KRkn9j0BTkWW0?=
 =?iso-8859-1?Q?jmY1mBqgrguZd1rHo5Qq1d3pkf8OK0a3rYeupfj0u7ULkxIf1dWyXmUfDk?=
 =?iso-8859-1?Q?GgBRq8TyNg+cy8lxp9s7b/ycO/MxR9K+g86fxxenhi44O2hzfq1ZHo9iWQ?=
 =?iso-8859-1?Q?guuNbtstIqo/Yr6DP1xn9R7fdx7J2grp0Lvyt+Uw14Ra7KrmY8caK813d+?=
 =?iso-8859-1?Q?k5kDRuXSU8v1ExwD7huRUXNRcFAlV/nvcydKFqrDKWjyFvOvKUkvp2kYwX?=
 =?iso-8859-1?Q?57MIEFGXm/IOTH8VCdiNwT2uyDwU22WhTp73fXEP4m9M+Hotbfr9Md8wYe?=
 =?iso-8859-1?Q?rz0y3pNuiBi1Kii1JF9WtLk/BIlS+t9xo1kt9rAtQnfJAGtwVn2WoF5y/H?=
 =?iso-8859-1?Q?vh75Arceh54Hbdjopopbs2VFy9glglRN7NpsgO4Rc16OU+NcfrHYEoSJB/?=
 =?iso-8859-1?Q?DuC5LqMAD/i7ftHvzZfaEzYpQTHW3dnTti1jAqg+c4xZLSAfOeiTFA9nGD?=
 =?iso-8859-1?Q?L/tCzwO81hSBdCjQBeOS3+RI/x57oqbcjlK0ABVJQAy8imoyZVq9jZMWIe?=
 =?iso-8859-1?Q?txg/b9G2G+iuJrzzVNZKTSeEmalKHKcHCelQOH/ynnzw6DvZ1BtySL5kcT?=
 =?iso-8859-1?Q?QQ8sZ+b7KTxIRQnhdG6j1vEclTQ214FHP5tMNGFT4zrC4SsJveNn1ykzvz?=
 =?iso-8859-1?Q?qCaO2E+xT13L7AOUqRzfH3abaYh/n2FFYiVuiF/pgviwmLkkdv1a6p5cW7?=
 =?iso-8859-1?Q?P3CcF2Pci5Xsvp5lBxxfQv2Y9HOIC5rEKd2Pz4o+Gi8zINEEVujqhppAxg?=
 =?iso-8859-1?Q?a4gNe+o+0j7IhDH3sX3dih5ETrZRh27ipp6rWDLWBcfNveOAwYlVFoccoi?=
 =?iso-8859-1?Q?u/sCcBSpyUS/m78g8nIyLXVa2Hcic5XLfkft0mJevaf5YA/kDmB0l0RTFW?=
 =?iso-8859-1?Q?PcChex+ZGL4myg064zBSdMvMEHbWtY5xjYyatjs5xUOv4SffvlGpKvBcki?=
 =?iso-8859-1?Q?+S9o9JsOlm1c4Ba2XEc52Jkirv7gvoZ5fQZjAOqBfMzg1LjOPpPdWPS3de?=
 =?iso-8859-1?Q?Vl5gldvxf8i3/J3VyFQc8fHAZZggR5xzQUIXoqR6VvIDPO8st8ryaIFHn6?=
 =?iso-8859-1?Q?Gxt90xll1xFZGBQmq5JxauIMiBsqz50yuecTAZHRzEK9hnMkAH8hqaiEQ1?=
 =?iso-8859-1?Q?DJMhaFo5dVsBuKCoFQvI7OrmEUiMM3rmkwaXomXxv1V6H62InEnXqy3g87?=
 =?iso-8859-1?Q?W5/JpyjDWkIZyLjNeJZqfmFqGcK02O/dUHseAnrbuNd+L+gSnQ1ABLH266?=
 =?iso-8859-1?Q?RUtXAkWWGBeA/zwjy2oV6P/dU8hJDEOkjuGcT6oEA8glnGS35p78lP8UDe?=
 =?iso-8859-1?Q?7cN7Gj29A300i1JnZMbf3TxRJCA0ya6xg3aXfapkVjROR0I80EPtAxMDGy?=
 =?iso-8859-1?Q?H8d9rSfmZVOCvrKbAyc4f9Yd2+365LatU8D/a3faBdvODbO+1q0DrJ2bNQ?=
 =?iso-8859-1?Q?v5M173p+Xa4VJi4ZjVxgK6o93jeCzagUMUA63Z+qP3NzNE/R6wBsDnQfvJ?=
 =?iso-8859-1?Q?dczGBGQjO6Lz6kQgYUPeuHfS4pOfN0LLs9mljMKmrQ8QXdGg8DM6NHEx8y?=
 =?iso-8859-1?Q?Cn7pCuP22c/ZBTXEaGt/qbEAhuiTKVKywgKY7Yh1P4hdlxHW2xiza6djQK?=
 =?iso-8859-1?Q?6YEQ=3D=3D?=
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR03MB6382.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 418a0961-ed07-4c68-bbcc-08da0108b0e3
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Mar 2022 13:36:46.4177
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: qCBosG+hj+js1z0imKWpvMPL3iFcSXCHNBMndp/EyRdvxkE+CmB6TcFtrbrH5V32mkMedOqx2xAQcpMTM8vhVBO6JEzC0yyW4RG6seo5OP0=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH0PR03MB6004
X-OriginatorOrg: citrix.com

> From: Roger Pau Monne <roger.pau@citrix.com>=0A=
> Sent: Wednesday, March 2, 2022 2:27 PM=0A=
> To: xen-devel@lists.xenproject.org <xen-devel@lists.xenproject.org>=0A=
> Cc: Ross Lagerwall <ross.lagerwall@citrix.com>; konrad.wilk@oracle.com <k=
onrad.wilk@oracle.com>; doebel@amazon.de <doebel@amazon.de>; julien@xen.org=
 <julien@xen.org>; Andrew Cooper <Andrew.Cooper3@citrix.com>; Roger Pau Mon=
ne <roger.pau@citrix.com>=0A=
> Subject: [PATCH 1/4] livepatch: update readme to mention --xen-depends =
=0A=
>  =0A=
> Fixes: b19df7b2c05e ('livepatch-build: Embed hypervisor build id into eve=
ry hotpatch')=0A=
> Signed-off-by: Roger Pau Monn=E9 <roger.pau@citrix.com>=0A=
> ---=0A=
>  README.md | 2 +-=0A=
>  1 file changed, 1 insertion(+), 1 deletion(-)=0A=
> =0A=
> diff --git a/README.md b/README.md=0A=
> index 653c624..b48a3df 100644=0A=
> --- a/README.md=0A=
> +++ b/README.md=0A=
> @@ -24,7 +24,7 @@ Next, build a live patch, using a patch and the source,=
 build ID, and=0A=
>  ```=0A=
>  $ cd ~/src/livepatch-build=0A=
>  $ ./livepatch-build -s ~/src/xenbuild -p ~/src/xsa.patch -o out \=0A=
> -    -c ~/src/xen/xen/.config --depends $BUILDID=0A=
> +    -c ~/src/xen/xen/.config --depends $BUILDID --xen-depends $BUILDID=
=0A=
>  Building LivePatch patch: xsa=0A=
>  =0A=
>  Xen directory: /home/ross/src/xenbuild=0A=
> -- =0A=
> 2.34.1=0A=
=0A=
Reviewed-by: Ross Lagerwall <ross.lagerwall@citrix.com>=


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 13:42:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 13:42:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286876.486553 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRa6Y-0004lk-1j; Tue, 08 Mar 2022 13:42:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286876.486553; Tue, 08 Mar 2022 13:42:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRa6X-0004ld-V8; Tue, 08 Mar 2022 13:42:21 +0000
Received: by outflank-mailman (input) for mailman id 286876;
 Tue, 08 Mar 2022 13:42:21 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRa6X-0004lX-4K
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 13:42:21 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 9310dd65-9ee5-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 14:42:19 +0100 (CET)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2052.outbound.protection.outlook.com [104.47.14.52]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-27-rSnQhfVcNXeHq3oaOjfuSQ-2; Tue, 08 Mar 2022 14:42:18 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by HE1PR0402MB2858.eurprd04.prod.outlook.com (2603:10a6:3:dc::22)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.26; Tue, 8 Mar
 2022 13:42:14 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 13:42:14 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9310dd65-9ee5-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646746939;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=wawVZcj2s5JoZuE9NG8FjNQVTNL9k0UTvZo/S2GbZYE=;
	b=cs0FG5edK6qX8yIunuXfCCs8+riYY08B7R9f0w/1GfUQvhI6Nf8nKraDwpw1AGiZ4OxKlx
	/FNKqVQGuJY0qZxq+CUgNUaPo3iLefi6mVav9bWtOth3L1KdrWNRQ1voyN+IenV0Ce5BMK
	nA1IdoTdS0IUAYMBjH9uCDeKlNRQJI0=
X-MC-Unique: rSnQhfVcNXeHq3oaOjfuSQ-2
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=li9eoyoxaGFnONs9w0LvBMdtDkrRZoy6OSiEkUyWVoSImw3PF2Vvq9MvdyGXgzLGpmB/3Vuk+pLyWd9iUGAU2IAnF9wJgXvu9Nq99pvkUEYfP11CdlEjJG49iMHtKdwh1gvs3qn1RBpiFf/kvdV552kb2h2VzrxD4YiZdCyq1BqyudJUr6DVMKlNc0yLyiqob2Su6UAq/Po7S1/4L2kBypszP5+k7CpfjDkht8c/5lNstfaSYalZhrvUlSANpmDwYedpmqDyWdHM+qbrVZ8gWZ+tdkcpzRH50UAynxggwPynqTDYFN4WxQVLuDzDueRhEmvp8bLa5RKXI9F3Bgj9lA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=kvBmONlQp41aBCRV/7mEA1SG2JJhYfyuY1K5GKBYnXw=;
 b=JtBhyOLf4QHYUF+svcgQsazZl+suya35AcsDDxSJ0syLYrHz841ziEurs/CC+fx4CIgbQ9WK0HUdUK7ieOuEs8WLGJQTFVRwr5DqAYGAu9ReeP1hR6VMh8XrHYhwHH0/I4eDOC06bkt+zf8kQTzUkhuUECe3m9x09sgj86HeZt1el4rHw2lT/lejd6V1xfMpxUv5XesCHaS6BQJ/B01QF4WTr5qnP5zPXFKCM9hNPkzH/EDR1AmTLvKUwO7ovrWUgQFUqmjsNjMjJm0EGwBWfqPea4apjKz4BSBCoa7mXRVLMLU8uS1oz/GYAA1/Ed06S0UZlhDR+rhWJJpQ4JTUAQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <4455dab2-d52b-2e1a-388a-ffc3123438a4@suse.com>
Date: Tue, 8 Mar 2022 14:42:11 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v3 00/13] xen: drop hypercall function tables
Content-Language: en-US
To: Juergen Gross <jgross@suse.com>
CC: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
 <julien@xen.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Christopher Clark <christopher.w.clark@gmail.com>,
 xen-devel@lists.xenproject.org
References: <20211208155606.20029-1-jgross@suse.com>
 <0ec9f176-1108-e1ac-a250-5ab9d151f7a8@suse.com>
 <4ac7c2ad-a600-f817-3b69-af0c1a47f4ac@suse.com>
 <cc6c9782-fff6-1832-0c25-d8fd38ed1c1d@suse.com>
 <88014841-017c-5621-0193-c4223596a29c@suse.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <88014841-017c-5621-0193-c4223596a29c@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6PR08CA0017.eurprd08.prod.outlook.com
 (2603:10a6:20b:b2::29) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 9c19dda8-9ffd-47b1-40dd-08da01097400
X-MS-TrafficTypeDiagnostic: HE1PR0402MB2858:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<HE1PR0402MB2858933320187B8CB990B36BB3099@HE1PR0402MB2858.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(38100700002)(86362001)(31696002)(8936002)(37006003)(54906003)(508600001)(316002)(6636002)(6486002)(7416002)(4326008)(6862004)(5660300002)(66556008)(66946007)(66476007)(8676002)(66574015)(2906002)(83380400001)(6666004)(6512007)(53546011)(6506007)(26005)(186003)(2616005)(31686004)(36756003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?HjBIVo9JurdGMRkdOLmRAJP8J9+wb+Ah5zDo16TesF82228jh1mCNBniVMts?=
 =?us-ascii?Q?F8oblnP+YfkIpGJIYwyvVLHSxT2DH+dtdkbE2oyQsCYM9/MBvHSXlYtYLPCq?=
 =?us-ascii?Q?S6jxaDiSxuKC6otm+jJFrNlzfSubGadQwCwa9XuqiVD78sK+RzmaX8cUCfdn?=
 =?us-ascii?Q?uoByn93R1TzsLtXPd90pWIPz3PQ/C+Uxz/1wOzRaV+xiYeFotWyDMgwFd1aH?=
 =?us-ascii?Q?ANSDgawcdSNLOZn7lO2tuHZd4pvia9WuGD5PAaZJBnOXFyLrudWlP2ZPxjeg?=
 =?us-ascii?Q?93mWiHSCUwL0Sdho1PSNjjs/nbXnPKFj1fEnT4PEJcswkaMmaHCQ73fHGF0O?=
 =?us-ascii?Q?d7f4vU4an3cPmnzAQRJukU/gn4ONdKoy8MbkRFWMWwgtZh6qr4GiSDEZe6y+?=
 =?us-ascii?Q?+gH62H4J+Eu0Qc8ZfgYNhTpBEIeSEkbVM7L1Wb4pO37huI9sJ0TcbE2CXWFZ?=
 =?us-ascii?Q?uLxKFuZ0rSS3MdUJqzZxP2rmhcsEk+sZtmhUWasPCy96GedJS6hGIzmRaO0L?=
 =?us-ascii?Q?tA1x8rtg420PYqZcucbM4Ojp9zP/VU7TRgAVxx2lrFniaUCAh4W86hS5V0QL?=
 =?us-ascii?Q?FFdt2d+7AGTuZZdPC035yYnbfug6qsa/KZVZXS3jxjPSvWHwTrbu4Oqg0NAg?=
 =?us-ascii?Q?pE/Yvs9oChD5n1c9P08FZAQezkNb1xekqiyKoe7djRDAoTh4DZVkegRnrsfo?=
 =?us-ascii?Q?4ycarl5VASTp4n4NG7QeTTnVTALwv26tko/Ag5c2MJTapPxy+uig2IJZPfXR?=
 =?us-ascii?Q?zjanHUF2PWx+XGQMKKmUetgWIxrb2MvVALog3+v3+5WC0QITdimqmeoo8R+m?=
 =?us-ascii?Q?u/x+H8kNRbJakSk/Wryr8F66jn4kSHpCft0tTFf/ocxwjomvMxzbaw7tD0UL?=
 =?us-ascii?Q?Lwhwz73Q2BoE1V6+2vFQSFuxjkcBMwnQHJK/GZOJvsv7bQI4WmGmHtZ1RLsY?=
 =?us-ascii?Q?hAmsHewjwxVPT471SkLtX/Ol31cqGlLsoNhZJxlcO3gcKTRpYJsdjDbB06Pz?=
 =?us-ascii?Q?Xil95SgjCmT2/+Hh6LwVe21F+w1d3Y9apPDZbxHI79VDiR4xUMb4Mq0tqdE9?=
 =?us-ascii?Q?7tQreUxHK35fPiAlo8ZRautxk05W/wbb4NmZyyKG09ZlvK2XbRBgX3qftJ0t?=
 =?us-ascii?Q?0ETTxLHf24u1Wx+T905mLd/aeqgrS/9duy5n4pUUSLs7lCyHbXQNC79EkFIT?=
 =?us-ascii?Q?cWuE/ZnutnhmaJVU9+MBbZt09X+MAGhO9s2WOKDAWiQ9MwBKD+tCzMy+wZDc?=
 =?us-ascii?Q?HZ6zFCiky0H6WHqXWShg1iayOMxN0cvRNFQmUOIYu7/+d9nvEEsLxTQxG2Wc?=
 =?us-ascii?Q?4bPNVE1jMGxGDNbDWSpg97v3nEHmi7WfKyNglnuI0PBxAV83hNmy2WAMqtMl?=
 =?us-ascii?Q?oPnV4n5abov7NSKf7UQWIqwS/hXisTCBIh2aquhZcAmqVI5RXYtfHmyYX9yO?=
 =?us-ascii?Q?7HZLU2wEVVZDPfp7egrHDrDoV+UbD/SrlvDmigbZXDVuq5yaof3f/qdoJCdz?=
 =?us-ascii?Q?b7IZJJ7mLz6n8fTcCL+lyUnEqMSciolEuK12+qp9+EzDypk3ha6w+1bn8mGJ?=
 =?us-ascii?Q?kLCXqOUYE3iRGuMOWfBGT4nADIaqHeCHsJ0W5yeQXLZLKcY9lB4oQh/eH0cy?=
 =?us-ascii?Q?OK6K56PzBL/+wgEEHNC/sLA=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 9c19dda8-9ffd-47b1-40dd-08da01097400
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 13:42:13.9791
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: yG5Hmh+1/Sl7sp9vGq1rJQUmAi198PRnC34zb8efhThm1yXohGlQpDqUWXwdhJemb+FG4W14NKwm7ollQ4DL4w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0402MB2858

On 08.03.2022 13:56, Juergen Gross wrote:
> On 08.03.22 13:50, Jan Beulich wrote:
>> On 08.03.2022 09:39, Juergen Gross wrote:
>>> On 08.03.22 09:34, Jan Beulich wrote:
>>>> On 08.12.2021 16:55, Juergen Gross wrote:
>>>>> In order to avoid indirect function calls on the hypercall path as
>>>>> much as possible this series is removing the hypercall function table=
s
>>>>> and is replacing the hypercall handler calls via the function array
>>>>> by automatically generated call macros.
>>>>>
>>>>> Another by-product of generating the call macros is the automatic
>>>>> generating of the hypercall handler prototypes from the same data bas=
e
>>>>> which is used to generate the macros.
>>>>>
>>>>> This has the additional advantage of using type safe calls of the
>>>>> handlers and to ensure related handler (e.g. PV and HVM ones) share
>>>>> the same prototypes.
>>>>>
>>>>> A very brief performance test (parallel build of the Xen hypervisor
>>>>> in a 6 vcpu guest) showed a very slim improvement (less than 1%) of
>>>>> the performance with the patches applied. The test was performed usin=
g
>>>>> a PV and a PVH guest.
>>>>>
>>>>> Changes in V2:
>>>>> - new patches 6, 14, 15
>>>>> - patch 7: support hypercall priorities for faster code
>>>>> - comments addressed
>>>>>
>>>>> Changes in V3:
>>>>> - patches 1 and 4 removed as already applied
>>>>> - comments addressed
>>>>>
>>>>> Juergen Gross (13):
>>>>>     xen: move do_vcpu_op() to arch specific code
>>>>>     xen: harmonize return types of hypercall handlers
>>>>>     xen: don't include asm/hypercall.h from C sources
>>>>>     xen: include compat/platform.h from hypercall.h
>>>>>     xen: generate hypercall interface related code
>>>>>     xen: use generated prototypes for hypercall handlers
>>>>>     x86/pv-shim: don't modify hypercall table
>>>>>     xen/x86: don't use hypercall table for calling compat hypercalls
>>>>>     xen/x86: call hypercall handlers via generated macro
>>>>>     xen/arm: call hypercall handlers via generated macro
>>>>>     xen/x86: add hypercall performance counters for hvm, correct pv
>>>>>     xen: drop calls_to_multicall performance counter
>>>>>     tools/xenperf: update hypercall names
>>>>
>>>> As it's pretty certain now that parts of this which didn't go in yet w=
ill
>>>> need re-basing, I'm going to drop this from my waiting-to-be-acked fol=
der,
>>>> expecting a v4 instead.
>>>
>>> Yes, I was planning to spin that up soon.
>>>
>>> The main remaining question is whether we want to switch the return typ=
e
>>> of all hypercalls (or at least the ones common to all archs) not
>>> requiring to return 64-bit values to "int", as Julien requested.
>>
>> After walking through the earlier discussion (J=C3=BCrgen - thanks for t=
he link)
>> I'm inclined to say that if Arm wants their return values limited to 32 =
bits
>> (with exceptions where needed), so be it. But on x86 I'd rather not see =
us
>> change this aspect. Of course I'd much prefer if architectures didn't
>> diverge in this regard, yet then again Arm has already diverged in avoid=
ing
>> the compat layer (in this case I view the divergence as helpful, though,=
 as
>> it avoids unnecessary headache).
>=20
> How to handle this in common code then? Have a hypercall_ret_t type
> (exact naming TBD) which is defined as long on x86 and int on Arm?
> Or use long in the handlers and check the value on Arm side to be a
> valid 32-bit signed int (this would be cumbersome for the exceptions,
> though)?

I was thinking along the lines of hypercall_ret_t, yes, but the
compiler wouldn't be helping with spotting truncation issues (we can't
reasonably enable the respective warnings, as they would trigger all
over the place). If we were to go that route, we'd rely on an initial
audit and subsequent patch review to spot issues. Therefore,
cumbersome or not, the checking approach may be the more viable one.

Then again Julien may have a better plan in mind; I'd anyway expect
him to supply details on how he thinks such a transition could be done
safely, as he was the one to request limiting to 32 bits.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 13:44:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 13:44:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286881.486564 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRa8X-0005Kt-EO; Tue, 08 Mar 2022 13:44:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286881.486564; Tue, 08 Mar 2022 13:44:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRa8X-0005Km-BY; Tue, 08 Mar 2022 13:44:25 +0000
Received: by outflank-mailman (input) for mailman id 286881;
 Tue, 08 Mar 2022 13:44:24 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=PwwU=TT=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nRa8W-0005Kg-DD
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 13:44:24 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id dcc66042-9ee5-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 14:44:23 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id C33BA210F5;
 Tue,  8 Mar 2022 13:44:22 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 0DCAB13CCE;
 Tue,  8 Mar 2022 13:44:22 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id COAEArZdJ2JKJQAAMHmgww
 (envelope-from <jgross@suse.com>); Tue, 08 Mar 2022 13:44:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: dcc66042-9ee5-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646747062; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=jMe7tVAgMCoCs60kbPFHS0ijMf3wCb5ecqkdk7hs2VI=;
	b=mBDUeYwXn3as9vpFKt/UcpOBEUzhJTJiApJCDyd7BEwSscTA5x8Jy0tXHX4UvpnSXvq/c8
	4WozC8XxMxdK98bGo6oPBHAkHI6Hlc9v+pe/ugEBrxPZXe99oa7Ur/LG410nFHryQ0fJ6a
	uGptj1A7qzQZJCHqxFR7o2yZLdJfXLk=
Message-ID: <7764a747-bff5-7c76-ab4b-a93fdd9050df@suse.com>
Date: Tue, 8 Mar 2022 14:44:21 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [PATCH v3 00/13] xen: drop hypercall function tables
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
 <julien@xen.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Christopher Clark <christopher.w.clark@gmail.com>,
 xen-devel@lists.xenproject.org
References: <20211208155606.20029-1-jgross@suse.com>
 <0ec9f176-1108-e1ac-a250-5ab9d151f7a8@suse.com>
 <4ac7c2ad-a600-f817-3b69-af0c1a47f4ac@suse.com>
 <cc6c9782-fff6-1832-0c25-d8fd38ed1c1d@suse.com>
 <88014841-017c-5621-0193-c4223596a29c@suse.com>
 <4455dab2-d52b-2e1a-388a-ffc3123438a4@suse.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <4455dab2-d52b-2e1a-388a-ffc3123438a4@suse.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------cZ1EIPHbOpkcQEXk0Ti3eL2t"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------cZ1EIPHbOpkcQEXk0Ti3eL2t
Content-Type: multipart/mixed; boundary="------------PklIN8lTebXafeKv8RHJ0GTf";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Jan Beulich <jbeulich@suse.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
 <julien@xen.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Christopher Clark <christopher.w.clark@gmail.com>,
 xen-devel@lists.xenproject.org
Message-ID: <7764a747-bff5-7c76-ab4b-a93fdd9050df@suse.com>
Subject: Re: [PATCH v3 00/13] xen: drop hypercall function tables
References: <20211208155606.20029-1-jgross@suse.com>
 <0ec9f176-1108-e1ac-a250-5ab9d151f7a8@suse.com>
 <4ac7c2ad-a600-f817-3b69-af0c1a47f4ac@suse.com>
 <cc6c9782-fff6-1832-0c25-d8fd38ed1c1d@suse.com>
 <88014841-017c-5621-0193-c4223596a29c@suse.com>
 <4455dab2-d52b-2e1a-388a-ffc3123438a4@suse.com>
In-Reply-To: <4455dab2-d52b-2e1a-388a-ffc3123438a4@suse.com>

--------------PklIN8lTebXafeKv8RHJ0GTf
Content-Type: multipart/mixed; boundary="------------yL9TfKeg30rDFQIL0BEcrNEo"

--------------yL9TfKeg30rDFQIL0BEcrNEo
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------yL9TfKeg30rDFQIL0BEcrNEo
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------yL9TfKeg30rDFQIL0BEcrNEo--

--------------PklIN8lTebXafeKv8RHJ0GTf--

--------------cZ1EIPHbOpkcQEXk0Ti3eL2t
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmInXbUFAwAAAAAACgkQsN6d1ii/Ey9G
pwf9EpC79NldYjKkDpklnj1WKSBkfGFZ8+LVwazNQ4njnlsOcL9nCX9SSrT2qa1WMlShKvQnXsU5
cTiN8gJDDTCOCGICzMuqmmOrjGjZj7V4viGCsMbNIv+wxm0cOTgaGgYJSUQ5gBpJlMraMEjSFkLh
g2bSmTadp5TCgVg/rPLaVHLsGTQcvpK5mtpc0NdD3FvofjoRTV8cN5ScZ/adg9ZNwtEVL7pGuv0v
xTj5/1Kn+sx+Vkx9FeAq8PqgYgZbhDLZ4m0TdzvBZVChS/o2QmKtxvClBh6bSVlbe9X744YopScB
ZkpP+bR2FBKLmVEJxImsVnSTwa6S5FqPR3uKg/JxrA==
=Wgec
-----END PGP SIGNATURE-----

--------------cZ1EIPHbOpkcQEXk0Ti3eL2t--


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 13:48:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 13:48:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286888.486576 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaBw-0006AR-V2; Tue, 08 Mar 2022 13:47:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286888.486576; Tue, 08 Mar 2022 13:47:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaBw-0006AK-Rh; Tue, 08 Mar 2022 13:47:56 +0000
Received: by outflank-mailman (input) for mailman id 286888;
 Tue, 08 Mar 2022 13:47:55 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=yKud=TT=citrix.com=prvs=05922dae9=ross.lagerwall@srs-se1.protection.inumbo.net>)
 id 1nRaBv-0006AE-NH
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 13:47:55 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 59a49614-9ee6-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 14:47:54 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 59a49614-9ee6-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646747273;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-transfer-encoding:mime-version;
  bh=wOdU7xka3uo93me38wtoC/vI4M3a7CuuzVpweUn2UnU=;
  b=LyDIxW5XblLQQAvSrZFg76qEv2TyKxbBW9Br5A7v4AXuUqQ6Isr+/eFj
   L6dAGIaQ2DBw3ZsQZgq3TvZm2XlifJ3A3g9O/oii1s7jpg2Ff0s97p2TY
   D/6V5yjSW+sazQDcmjFImOk9GJduo1DA/q+WBbWWoZO2dNJQVM7bqMrs2
   E=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65712098
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:EgDdEKles/zmtjrKTwWKuHfo5gxOJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xIZCmGPOa2KNGLyct51PIWz9BtSu5DRxoAwTFdl+XphQiMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiW1PV4
 7senuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYUScCIJGSsvomagQGEgZmbIJcpuPcGC3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3oHZ71nfdBPkrW4/KR6Hi7t5ExjYgwMtJGJ4yY
 uJHNGU2NkyRM3WjPH8lB7gj2/70hUPvTGBkqnWK9Zslv2TqmVkZPL/Fb4OOJ43iqd9utkSFo
 mPL+UzpDxdcM8aQoRKf9X2hnKnXlD7TU4MODqe55rhhh1j77mAUBRcbUXOypPCrjUj4V983A
 1wZ/G8ioLY/8GSvT8LhRFuorXicpBkeVtFMVeog52mlya3S+Q+VQHcFSj1pb8Yvv8s7Azct0
 ze0c8jBXGI19ufPEDTEq+nS/Wja1TUpwXEqfQ8vUzdbycfYmZxtjzXXH/l5TvKut4igcd3v+
 AyioC87jrQVqMcE0aSn4FzK6w6RSoj1oh0dvVuOAD/8hu9tTMv8PtHztwCHhRpVBNvBFjG8U
 G44d99yBQzkJbWEj2SzTeoEB9lFDN7VYWSH0TaD83TMnglBGkJPn6gNuFmSx28za67onAMFh
 meJ4Wu9A7cJYBOXgVdfOd7ZNijT5fGI+S7Zfv7VdMFSRZN6aRWK+ipjDWbJgTyzzhd8zPpma
 crAGSpJMZr8If48pNZRb71BuYLHOwhknT+DLXwF507PPUWiiI69Fu5ebQrmghER56KYugTFm
 +uzxOPRoyizpNbWO3GNmaZKdAhiBSFiWfje9pwGHsbec1EOMDxwVJfsLUYJJtUNc1J9zbyTo
 BlQmyZwlTLCuJEwAVnSOiA5NuK1BsoXQLBSFXVEAGtEEkMLOO6HxKwea4E2bf8g8ulixuRzV
 P4LZ4OLBfEnd9gN0211gUXVxGC6SCmWuA==
IronPort-HdrOrdr: A9a23:2DbMfa2FhvaLW1+2E4eTugqjBedxeYIsimQD101hICG9Lfb2qy
 n+ppgmPEHP5Qr5AEtQ5OxpOMG7MBbhHO1OkPUs1NCZLUbbUQqTXc1fBO7ZrQEIdBeOj9K1uZ
 0QEJSWTeeAd2SS7vyKrjVQcexQuOVvmZrA7Yy1rhdQpENRGtpdBm9Ce16m+yZNNW177O8CZf
 yhD7181l2dkBosH6aGL0hAe9KGi8zAlZrgbxJDLQUg8hOygTSh76O/OwSE3z8FOgk/gIsKwC
 zgqUjU96+ju/a0xlv3zGnI9albn9Pn159qGNGMsM4IMT/h4zzYJLiJGofy/wzdktvfrWrCo+
 O85yvI+P4DrE85S1vF4ycFHTOQlgrGpUWSkGNwykGT3vARDAhKdfapw7gpKScxonBQzO1Uyr
 5E0W6CqpZbOxvcgSz25tzFUAxdjEavu3olltgSghVkIPojQa4UoooF8ExPFpAcWCr89YA8Ce
 FrSNrR/fBMbDqhHjvkV0RUsZWRt04Ib1+7q4k5y7io+ikTmGo8w1oTxcQZkHtF/JUhS4Nc7+
 CBNqhzjrlBQsIfcKo4XY46MIaKI32IRQiJPHOZIFzhGq1CM3XRq4Tv6LFw4O2xYpQHwJY7hZ
 yEWlJFsmw5fV7oFKS1rdd22wGIRH/4USXmy8lY6ZQ8srrgRKDzOSnGU1wqm9vImYRoPiQaYY
 fFBHt7OY6QEYK1I/c74+TXYegmFUUj
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="65712098"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ZOHatACOFT6QFR4p2De50k8/5EwG1B/0Ph4D8cH9WX1uEvL8u6LNO1GDwo924GRb2r0tQqejGBfTL3aculUCQvyPP0l01c1ydWMjMH3xXSQWj3/lccRvPtxjbHM7GuVxdqT2kB9KAvT4MvPZ5v8t7T/p8SlRh89eym9dMqw5szcl73hqRDblFwwMCElvnwM/RzV/LLNxqOIQeZpOhKej00UqKZw3nY0nBakTLlu/rytWyg8DMPV5Jd70h91nPrN4B0y8CrZ1we8ko4mrJeMShZqDH2H1kvqGfpWuw00D9FVfdym5wopBSkvj+J+cBV/RsnCUFvAEFGqbL+oOvopjFw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=dzPb4aoy6dJCLBE13mc8KuqSvXNUEnu31vB5bt4QO6U=;
 b=BXy+YmjkpPyIh6dUAJHpAjDXcwkE6t6sU+GUyW0rx4nXL3yHzdBBJpUGBDTNTncBt6PDCiwsK3KYlbWLmYWHjE9/36WNa43RhgNy2Gq1K2LWx58uNKH8vzwAykKVQ0WVaw7zTbzNYOVxYSA76/q0PLaaxgg22Ijr7tNRtW1Y3cApVTfDEi1S/1QlzipXzxm4PudFXG6CSM/H4y3V308kIWMuXzfdCsP9mEG9O2vbsTm920HrcLSJvfOXnaJOK8Pvz2YAbHZGDOP7NKiHECLaOsR0NbG7zu63Z2jWqgSkVSCxNvrad7f4+0jB/kQ9pkf23svkd5GSVV7ZMh+6wy9CFQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=dzPb4aoy6dJCLBE13mc8KuqSvXNUEnu31vB5bt4QO6U=;
 b=eTIovXAkgDrHNd6JdMxoC6RdMX84K6/lK1+XyMLqto4GFJVfsrZCslItV4I+o9z1gmHW+6dGKc6D0Zt4heqdc8dzJr0benc+zM96zwOnzQGQdXR3IQneB/EINNl92HdgPaubcFfkwxUINI0K09H07s1oiYjV66o9CuoNph1AUcg=
From: Ross Lagerwall <ross.lagerwall@citrix.com>
To: Roger Pau Monne <roger.pau@citrix.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: "konrad.wilk@oracle.com" <konrad.wilk@oracle.com>, "doebel@amazon.de"
	<doebel@amazon.de>, "julien@xen.org" <julien@xen.org>, Andrew Cooper
	<Andrew.Cooper3@citrix.com>, =?iso-8859-1?Q?Roger_Pau_Monn=E9?=
	<roger.pau@citrrix.com>
Subject: Re: [PATCH 2/4] livepatch: improve rune for fetching of Build ID
Thread-Topic: [PATCH 2/4] livepatch: improve rune for fetching of Build ID
Thread-Index: AQHYLkHYPgIQbApwyE6feVSNYv9EXay1hwwH
Date: Tue, 8 Mar 2022 13:47:48 +0000
Message-ID: <PH0PR03MB6382F60EB5D712C1343799AFF0099@PH0PR03MB6382.namprd03.prod.outlook.com>
References: <20220302142711.38953-1-roger.pau@citrix.com>
 <20220302142711.38953-3-roger.pau@citrix.com>
In-Reply-To: <20220302142711.38953-3-roger.pau@citrix.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
suggested_attachment_session_id: 86fcc2cc-4d19-e260-876d-68c73321cc21
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 027fac0e-b1a1-4796-a5c4-08da010a3b9f
x-ms-traffictypediagnostic: SN4PR03MB6687:EE_
x-microsoft-antispam-prvs: <SN4PR03MB66871EADE1BCFC24218D101BF0099@SN4PR03MB6687.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PH0PR03MB6382.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(66476007)(186003)(86362001)(38100700002)(38070700005)(26005)(83380400001)(82960400001)(122000001)(66446008)(64756008)(76116006)(8676002)(54906003)(66946007)(8936002)(2906002)(33656002)(52536014)(316002)(110136005)(4326008)(5660300002)(44832011)(91956017)(55016003)(53546011)(508600001)(6506007)(7696005)(9686003)(71200400001)(66556008);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?OQpcfuQDd7G/Sqb8leBbccTxP+cjHV77kPo63tHa1Zby99d5GKFVe7bH9I?=
 =?iso-8859-1?Q?wzl3ePaANr9olACJpuZ0U5jMDqMYRdp7bTq8TDhU6tz6QeNxB78mqcLqZa?=
 =?iso-8859-1?Q?2N+3RiZ4oiRTGkMrl/Xi2rPJf7XFd2VtMpf0jzZYziObAjgLq8IGmoY38W?=
 =?iso-8859-1?Q?RE/GCNHeCMnoJiYVoXstqy1hpvH3umdJPwJ1VyHGitBhU40/OVs+VF4dqF?=
 =?iso-8859-1?Q?6ybkopEvMft8CIu4AHI2w+HKi7upOdG356wLJCVScerS+mEEUm7d22GMJ5?=
 =?iso-8859-1?Q?6ofQHIRQYwKl4H2VN0F5lkRibOLkpJpRyf4tTSQ9RlZGUd3xGOrBQKlNgT?=
 =?iso-8859-1?Q?G/3NF4/FKYZHh8BHjVRo7cIu17R4LV1jDsf4U8Y3n/iVauH4qVj0ByWbke?=
 =?iso-8859-1?Q?OSsQO4jigL7IKMLVRY/n/Ll3CrSHn6rESUi2Wo4290sJem+pLNc/8p7DL9?=
 =?iso-8859-1?Q?23bDSJ9HkGDPIEcv/ksAvMPNF6ehLo8xAK/WrKPGoBQsTvvqvhMuJOq/FO?=
 =?iso-8859-1?Q?4F+WOP1ej+sc3DSmZx9PmRydE+rOvg11Q5H59/4pEyqjs0aUvsaVg8U+iE?=
 =?iso-8859-1?Q?vcwzUiuyWAXcj5zj80kCSSBJQaLG2bzYdm2R7EY8j03ZsrwyfcU0nuKcgG?=
 =?iso-8859-1?Q?3lD8y5eKiG7z8W3lVXf17dB8J/VGGy+fvUwtqxXfcoUyNUT3/NwIbzzlS1?=
 =?iso-8859-1?Q?Woa8mj9iQXGUeylTsUn8o7qaojBZwFV/CJGO9fA0kOkLoYL0SBvSOmYjwR?=
 =?iso-8859-1?Q?XlBUztpTlnk20YJ14J/9XG0UQrCypSx/gv1/6qljQAr9ItQXspIVWztM08?=
 =?iso-8859-1?Q?BKcFsGBz6EiWw02kjFvmSyUwZ+8XbC6wIxHW7xkLIno2he62ZLuXwHTgDr?=
 =?iso-8859-1?Q?25g9LeV57n+WqVU/XH/tsLqDMAjhYZCIQKF32ktFQcXM7z3cCx6R3nSu1h?=
 =?iso-8859-1?Q?0+k+OJi1I88eKlcAW/JPM3G5PejuDaJ9NWpvMJP8LoAv0e3cdB5T1YX/6o?=
 =?iso-8859-1?Q?AXbihYX+jzQqTQIYXQwik8y6bJFEqrV5M0h842JUObGNG4edVbJN5/jm0w?=
 =?iso-8859-1?Q?Xye8hm4B6oeIh8tKpivbWPAzUnShtmoQHNQ88k6Zl1QsM9SwO5HntKOlpE?=
 =?iso-8859-1?Q?OO+Er4xj4FZpGZi2cyM4NwguPw95YDggzCMYjDD2t4P0KpRTQNKGlI1/mL?=
 =?iso-8859-1?Q?2fKIPrAzrYXHgUXT3qzMLQuVuIad7KEo8XS2U4aS3C1NLF40fNit8vo17G?=
 =?iso-8859-1?Q?4uECj3UZvzevtHo7SXxMjPd6tWNvsQn2qBC7IVXGzC/Ostrbnzv1VeBIFd?=
 =?iso-8859-1?Q?XnNoDVoEKbE5KP/EDGatO9i+vM17rs0QzhC/c4WtLV67cN9KRi5j7Sd7Q4?=
 =?iso-8859-1?Q?ZJi8PGvJXmYbR4s3Nxt448W1pcoZyndtfCTdfhyGpdokdJwUc02uJpGUUk?=
 =?iso-8859-1?Q?k+gN0VrTNLN7QxxAL5O5Pk0O965Tj0rV+aBbAJOryH1rO8aV4EQPeRNiAM?=
 =?iso-8859-1?Q?RASBW9T3DhbPnMGqZHu4tEKEBRROEWwMPthcGYO1xSDKBx4Zcrd0t/GZ4Q?=
 =?iso-8859-1?Q?eDrIy3oIbl6ZN3Ic4Guh7YBTEVk5J9CM1zp5W4AWLg4UALUoA+SrqpLN+6?=
 =?iso-8859-1?Q?7G/JrEKDPqkHP7eyibFOzuF2Uj0OGmWZ3Xwj7sIL6G5PyMNlGWQLWrkhuI?=
 =?iso-8859-1?Q?cCfziq5VpZWjbdNS36jNzQ31LTc/WAkIcsYiQQtUa6ug5eRQdUEl266tjk?=
 =?iso-8859-1?Q?Yg/Q=3D=3D?=
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR03MB6382.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 027fac0e-b1a1-4796-a5c4-08da010a3b9f
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Mar 2022 13:47:48.7184
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ErRVxX2f+QrWuVuffRFEz0pM47xBn9dug9ltjsWNxSX4NIed4rmJIcuH2gwBbfY1cZMU1g8cE+1MKOlU/t3n9tnqflG52UlslTTsA7ssmzc=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN4PR03MB6687
X-OriginatorOrg: citrix.com

> From: Roger Pau Monne <roger.pau@citrix.com>=0A=
> Sent: Wednesday, March 2, 2022 2:27 PM=0A=
> To: xen-devel@lists.xenproject.org <xen-devel@lists.xenproject.org>=0A=
> Cc: Ross Lagerwall <ross.lagerwall@citrix.com>; konrad.wilk@oracle.com <k=
onrad.wilk@oracle.com>; doebel@amazon.de <doebel@amazon.de>; julien@xen.org=
 <julien@xen.org>; Andrew Cooper <Andrew.Cooper3@citrix.com>; Roger Pau Mon=
ne <roger.pau@citrix.com>; Roger Pau Monn=E9 <roger.pau@citrrix.com>=0A=
> Subject: [PATCH 2/4] livepatch: improve rune for fetching of Build ID =0A=
>  =0A=
> The current one is broken with my version of readelf and returns=0A=
> 'NT_GNU_BUILD_ID'.=0A=
> =0A=
> Signed-off-by: Roger Pau Monn=E9 <roger.pau@citrrix.com>=0A=
> ---=0A=
>  README.md | 2 +-=0A=
>  1 file changed, 1 insertion(+), 1 deletion(-)=0A=
> =0A=
> diff --git a/README.md b/README.md=0A=
> index b48a3df..948a7de 100644=0A=
> --- a/README.md=0A=
> +++ b/README.md=0A=
> @@ -16,7 +16,7 @@ $ cp -r ~/src/xen ~/src/xenbuild=0A=
>  $ cd ~/src/xen/xen=0A=
>  $ make nconfig # Make sure to set CONFIG_LIVEPATCH=3Dy=0A=
>  $ make=0A=
> -$ BUILDID=3D$(readelf -Wn xen-syms | awk '/Build ID:/ {print $3}')=0A=
> +$ BUILDID=3D$(readelf -Wn xen-syms | sed -n -e 's/^.*Build ID: //p')=0A=
>  ```=0A=
>  =0A=
>  Next, build a live patch, using a patch and the source, build ID, and=0A=
> -- =0A=
> 2.34.1=0A=
=0A=
Reviewed-by: Ross Lagerwall <ross.lagerwall@citrix.com>=


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 13:50:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 13:50:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286897.486587 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaEB-0007cL-Ex; Tue, 08 Mar 2022 13:50:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286897.486587; Tue, 08 Mar 2022 13:50:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaEB-0007cE-BV; Tue, 08 Mar 2022 13:50:15 +0000
Received: by outflank-mailman (input) for mailman id 286897;
 Tue, 08 Mar 2022 13:50:13 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fWwI=TT=citrix.com=prvs=059ab6e88=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRaE9-0006oM-75
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 13:50:13 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id abdf1119-9ee6-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 14:50:12 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: abdf1119-9ee6-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646747412;
  h=from:to:cc:subject:date:message-id:
   content-transfer-encoding:mime-version;
  bh=ApJmu/csqEudMLqpJ6fTNTRd1xLjxspTzGCX/2ZvO6c=;
  b=eeuBXJoqei4JiuiBNQCIXfvhfuowYG4/oPqs2pZO/gJBey32cKAA/4lD
   tqfC1IRjZ9H67xx6WqSH9Y1AYd6/GYaPFTSXdvjX4yPSHG0uFoZd00CmV
   umJB8aI9kaY4SXRXQL4WfXMrJsEX6V9Pye6jP3+gD9S6hqrTicQkCB1TG
   c=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65183154
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:JRR0laA6sVG0GxVW/93jw5YqxClBgxIJ4kV8jS/XYbTApG8h3zBTy
 WQWWzjSPv2LZ2qjfdxwOoqz/U4B6Jfcy4NjQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vh0tYy6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPgpm
 egWspG9SD4SFYqSv8QwWRtVSHpxaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguw5K8bmJsUHs2xIxjDFF/c2B5vERs0m4PcGgW5g3ZkTQZ4yY
 eIYbzR2USvBaCFxYE1IOskanOKqjHPwJmgwRFW9+vNsvjm7IBZK+IbqNN3Za9mbX/J/l0yTp
 n/F12nhCxRcP9uaoRKH+H+xgu7EnQvgRZkfUra/85ZCn1m71mEVThoMWjOTq/SjllS3Xd4ZL
 kUO4zcvtoA77kntRd74NzWorXjBshMCVt54F+wh9BrL2qfS+xyeBGUPUnhGctNOnNQtWTUg2
 1uNntXoLT9iqruYTTSa7Lj8hTGvPSkYK0cSaClCShEKi+QPu6lq0EiJFIw6Vvfo0JulQlkc3
 gxmsgBm1ohIisMG1pyA1neZpBKBrJrEFVU6s1C/sn2e0it1Y4usZoqN4Ffd7OpdIIvxcmRtr
 EToiODFsrlQUMjleDilBbxUQer3v6rt3Cj03AY3d6TN4QhB7JJKkWp4xDhlbHlkPc8fEdMCS
 B+C4FgBjHO/0ZbDUEOWX25TI5lypUQDPY68PhwxUjaoSsIpHONg1HsyDXN8J0i3zCARfVgXY
 P93i/qEA3cAErhAxzGrXeob2rJD7nlgmT2NGsCmlE33jOH2iJuppVEtagDmggcRtv/sneko2
 4wHa5viJ+t3CoUSnRU7AaZMdAtXfBDX9Lj9qtBNd/7rH+aVMDpJNhMl+pt4I9YNt/0Mzo/gp
 yjhMmcFmAuXrSCWcm2iNyE8AI4DqL4i9BrXywR3Zg32s5XiCK7yhJoim2wfIeF3pLY9nKQvE
 5HouayoW5xyd9gOwBxEBbHVp41+bhW7wwWIOiuuej8keJB8AQfO/7fZksHHqUHi0gLfWRMCn
 oCd
IronPort-HdrOrdr: A9a23:GRd/5a7pu+pPGxkA4QPXwKvXdLJyesId70hD6qkRc3xom6mj/P
 xG88536faZslwssRIb+OxoRpPufZq0z/cc3WB7B9uftWfd1leVEA==
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="65183154"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=hQC82P4o3otIfRBsDLwsGNx5yeSoV6bElQ0tJDKqVbvAragzSQPacPU6saRMNIGXaZFYhKqTiVs8ufQGYsChj0ejWbjYgvaGjCTTM2w17x1dHHmKCx2Nen36bNY0hRF0+ahwoU5BX1WFmYlf5Ws7Hfu9E6RinvKqqCPWMFJP6fby/W+73cX7wRHjixmaEZZXqvBpuToOumDsZWhaUFENa/5QsLjkLfMl7vuqIrKPFZb2afT3+/Y2nITZ2RYOY6+SspoL1f9cOcIjpxOzQNNfAjRZ+z9jJtq+xYuO2ezHlEzXCCbl9vPvSLoHEkIa1pV8IGo08y4j41vguL8FiPnszw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=hZ70NmD9WZ+be6okT6ZM02Z4gO63tJJRl36GZkXlk+E=;
 b=aep31cxAu/jkNfQSlpMBcoUqdSm6fXpfUW6THEHIxrOclPHyvafHdAE+DL2TQLJ7yv4nzCIMSjtELncgL7DNr+aW2FLJqOmR8PuWgCGOLNf1dUlZPcM2wsXImq7p8KX6iRqbJEkXcO9uP3jOkL15+A2Kw94yxirnqqJQ2jOGjH/Kl4ULJzQyENBpe0KHeMdRv8X1rov+ZjikM7tJYRR5//ZfsK2VHUsgYkYxf7yYsBLUxAESOWRBDqvnt8h8dlTNdRI3MCI/U15+awL9QZGMCshMpbZTMwU6yfRYyGUlEq+4aSSWsJu8dr098JeDWFDrS/UC3GDR7DqG1ob04vrgXQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=hZ70NmD9WZ+be6okT6ZM02Z4gO63tJJRl36GZkXlk+E=;
 b=HXD3L2ZleQLHGg81hqqMNsdkPNLXyHoho9tmSR5Z50MPr7vAfBmKKZjxEhF+BWFrZQTl8Bt5010nnLhFkz5gdtoiyPVqBKtcSf56T99YeowTFS/MMZg7H39JI7rcsdaESu77f/cceafYISwxX9fiiZf65n4DCBS2BaKWDqpjEgk=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Julien Grall <julien@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Jan Beulich <jbeulich@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>,
	Wei Liu <wl@xen.org>, George Dunlap <george.dunlap@citrix.com>
Subject: [PATCH v3 0/2] livepatch: enable -f{function,data}-sections compiler option
Date: Tue,  8 Mar 2022 14:49:22 +0100
Message-ID: <20220308134924.83616-1-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO4P265CA0049.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:2ac::12) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 01e24ae6-ebc4-4c31-856d-08da010a8dc6
X-MS-TrafficTypeDiagnostic: DM5PR03MB2618:EE_
X-Microsoft-Antispam-PRVS: <DM5PR03MB2618CDBE4A41A0E472E293B18F099@DM5PR03MB2618.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(83380400001)(66946007)(4326008)(508600001)(66556008)(66476007)(8676002)(8936002)(5660300002)(6506007)(6666004)(36756003)(4744005)(6486002)(26005)(2906002)(86362001)(316002)(186003)(38100700002)(6512007)(82960400001)(54906003)(1076003)(6916009)(2616005)(107886003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?M280VnhYdEhqblJ4UUViOU5CSUd0Q3NtVTRYeG9LNHYwd0tEZi9BNmNhWE4r?=
 =?utf-8?B?Sk9aNzhPK2RGWk92b1BHdkVJYWlLOVNJZS9pK2xmY002N2pTaXM0cmptb1Q4?=
 =?utf-8?B?VWIyNlFKTmFhcjVWYWlJV1dSS1RnbVRnMFhHY2MrT3l6bXRYUys5TkNtSC9Z?=
 =?utf-8?B?dlZFTTBaT3ErNlNoWkhHTmRuSW1OdUVJaHNKRXltQ2VPdUhORjFFVnF1Q2Ix?=
 =?utf-8?B?SUE2NmROeGtsV2FZUjdnSEE3b0FZY05BNmhZM1A2RlZCNG4rbnVVVCtRSEVB?=
 =?utf-8?B?QnBhRTNGVFJudXQ2TGl6Q0ZkcFRPUHk2dDZTWjFUN3BHQk1zajJ3VmNFYTd6?=
 =?utf-8?B?R1psOTY1UkdqMU5PdmE3M2tvbFFFUG9aVXFGaVBaT0I3bEF5L2lIVEQ0ZGVl?=
 =?utf-8?B?RG9ON2JIN3FGcHB1Vk1MOUNyMk40ZmJobDEyOUlMcmRSNU5tZ0xCZGlGNzkr?=
 =?utf-8?B?VjN6cHdwNmZvb1ZITk5uRkZ3QWljN0dDV1R2cDVIN1JNbGFpdDBPTUI4U1VU?=
 =?utf-8?B?Z09mc043K2ZWRVJlRWR2L2gvSWhLSE5qS1JNcUJXYnk0Qy9QWlNmK1kzd3hj?=
 =?utf-8?B?eFQyZ0NmdjNHK1hpL3RuR1NJY3dsdktEa0dFV0YvVWQ0Rk95bGFLK25CV0Ni?=
 =?utf-8?B?cWR3NWk5bFdBVXpRSmV1TVlFVnp2WXhXTWErckNIblNZb2V0b2xlRkNaYTN3?=
 =?utf-8?B?ZWs5bjA5Q2dTVDBBSzF3ZTM3R21KK2wya2R1NG9COUh5ZUFEYWNYUDZjbjhW?=
 =?utf-8?B?c2d1cFhoeU1XSndhTE5tZVZQdGVPTCtRKzBuUG9lZ2habWs5ZlJ6L0hGSlow?=
 =?utf-8?B?NDBWOVgzWEtwUnNqbHdEamd4dHFza0hEc1JESEhITFZNS3pveEhKM20zNVhh?=
 =?utf-8?B?N21VWlMrMnA2cWtKaGlLSEdLaFdmWE56K0Ixdml2WEJmZGNSMTIyMkRKdnJv?=
 =?utf-8?B?Qm1ldmFQRHlMK3pBVTFDTlNtdjczM3YzRDhQN2JBQ2tBMHRGU0dzcDM1cUoy?=
 =?utf-8?B?K0NXbDVoZWZNOUJlc05SZ1pDTGRDWmF6TWR0QTZIUGExZ1JOc29PekRxR3hI?=
 =?utf-8?B?OCt4S1RZWDg2U2RWRjgvWEVjcGdQR0xjaEo2VXorZmpnNjJSZ01lQkt2R1dv?=
 =?utf-8?B?L3o0Yzl1K1VsQVZjZElXV21QQkJMUUNTMjFYOUtmNUFyUHdYNkpaWFRPZlZV?=
 =?utf-8?B?MTFwbWlvSlpnd3VIcFhZd0VTTC9OSDM2WTh5VkRWcTl3UmV0RHYvczA1ZUl3?=
 =?utf-8?B?MEoxNUNrMFlyMGp2SFhkWGNmM3Jxa0FobHVHM0JDUlRPYjVjWlVvNHdCSXFM?=
 =?utf-8?B?OTR2VHJKbEp6RHdHUXRLT21JM1FZQklmVSthOCtsNXUrWmNkZHo5NUdmVXl4?=
 =?utf-8?B?a2luUVErckltSmZrc1ZUSmZhZkFYM1NDL0RkUUp5cUllcFRzbGFSN0tITndY?=
 =?utf-8?B?TE13NWErbkdDZnlQRUJuVHRpL24rK2xFYis4Y0dpaFY3cDVmT2RmY0Vra2Ev?=
 =?utf-8?B?a3N1RzJuOFdsNWRSL0lyWVd1R0ZZcTlEZ01PTkRCaDE4ZEFZai9Wd2hLQU5T?=
 =?utf-8?B?R1YzOFllNjgzTzRiY2hOZjNqaHkza1RpdWVHOHVCOU04UC8wRkloNnRwN0dp?=
 =?utf-8?B?SWNnU0VFMlBzN21obE1FalVDOElZRnkyY0pubERJNHBXTXQzNHdsZGFqOERy?=
 =?utf-8?B?YUV1djRrdW9kV21sbmhNczlYMk9PYTkvcmdJNzhaellyaDRJK1pKWDUwZFRu?=
 =?utf-8?B?VHZqeW14dkU0VDYyMWNLb3VxMVdMSnRSRklsMzJNTGlYOUFWTDZzT2lJbm5q?=
 =?utf-8?B?TlR0a2R6MGJ3WnFWbTFEeTQvY2VweE43ZEIzeTB1QW91b1RxVmk3d0ZqaXpF?=
 =?utf-8?B?cHhqUnFpVzQ5U3pIZ0liM2tjWVdwblZsTGY1SHVZK2MzNWFMWjhwT3dBa1g5?=
 =?utf-8?B?ektrMDRzWmlCQ1YzOE1Kekd2U3VyTDNTSHJZUVFsZ0pJRE9xazdzWS8wR1lK?=
 =?utf-8?B?SENhMWI5TVhJdGRNY0lRaDZGSlcxcTk4TUtBWmprMzRhY0x0c0JtOE5iRzRl?=
 =?utf-8?B?ZFlVZWFIQmxMSTJBOUNDQU5CcllINGhCNnlSQU5KOXNHd1RiMHVJeSt3Ykhu?=
 =?utf-8?B?aUt4V3RUMUdmdEZ2d2tMaTNkSVlqaTMzMnlicWNmUm5ITm9iQzBVMEkveXFs?=
 =?utf-8?Q?Lo9Dsdwex4wzFC162UxJGjQ=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 01e24ae6-ebc4-4c31-856d-08da010a8dc6
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 13:50:06.8119
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: xijtrkE2KXem2jAnyS9oh/1sxDzC5ct191CWqfDCZTatIHsaTdTUvBSdPkYcChYrh5j+ZoR7heR0J6FNy7DPBA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR03MB2618
X-OriginatorOrg: citrix.com

Hello,

The content in v3 has been split in two patches, but is still mostly the
same. The main difference is that first patch does a bit of cleanup of
the build logic now that the header object file doesn't need to be the
first one passed to the linker script.

Thanks, Roger.

Roger Pau Monne (2):
  xen/build: put image header into a separate section
  livepatch: set -f{function,data}-sections compiler option

 xen/Kconfig                 |  4 +++
 xen/Makefile                |  2 ++
 xen/arch/arm/arch.mk        |  2 --
 xen/arch/arm/arm32/Makefile |  3 +--
 xen/arch/arm/arm32/head.S   |  1 +
 xen/arch/arm/arm64/Makefile |  3 +--
 xen/arch/arm/arm64/head.S   |  1 +
 xen/arch/arm/xen.lds.S      | 49 ++++++++++++++++++++-----------------
 xen/arch/x86/Makefile       |  5 ++--
 xen/arch/x86/arch.mk        |  2 --
 xen/arch/x86/boot/head.S    |  2 +-
 xen/arch/x86/xen.lds.S      | 22 ++++++++++-------
 xen/common/Kconfig          |  1 +
 13 files changed, 54 insertions(+), 43 deletions(-)

-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 13:50:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 13:50:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286898.486598 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaEJ-0007vT-MY; Tue, 08 Mar 2022 13:50:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286898.486598; Tue, 08 Mar 2022 13:50:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaEJ-0007vM-JP; Tue, 08 Mar 2022 13:50:23 +0000
Received: by outflank-mailman (input) for mailman id 286898;
 Tue, 08 Mar 2022 13:50:22 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fWwI=TT=citrix.com=prvs=059ab6e88=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRaEI-0007uj-HY
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 13:50:22 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b14eadf7-9ee6-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 14:50:21 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b14eadf7-9ee6-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646747421;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:content-transfer-encoding:mime-version;
  bh=RFoclzFWHJWdzzqlD8wGYy+jZlMc8vH1iUk1TVEYnUQ=;
  b=cQUE9pLs2bhuI+hQWfI/FJKGB3NPNQKKZk0O3iktv9+C7RSHe0BHGPpD
   txY9JJfhEgQGW4ykBZg0NUh5f9R7R01XzlSnSAd4RNSbLY/Mao2ceFAJk
   gKtPdHNLNDjVhqZaYviWimcFGtHuJK8W/98JPrZ4HMqexlJANyzZuW7bV
   Q=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65712261
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:YaZIKaNxESTfkgbvrR1Sl8FynXyQoLVcMsEvi/4bfWQNrUp03jIHn
 2UXWG6HaPiOMzHwetgnadm/8xsCu8XVytdjGwto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi2t4w27BVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Z6
 +VDhKGVEAgTEbDAl+oyAjUGOXtXBPgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALNs7kMZlZonh95TrYEewnUdbIRKCiCdpwgmpv35oUQ6+2i
 8wxTgNuXUzCYRp2I2gUVZ0MzdezgmTZfGgNwL6SjfVuuDWCpOBr65DTN97Sds2PVN9itE+Sr
 WLb/Ez0GhgfcteYzFKt8Hihm+vOliPTQ58JGfuz8fsCqEKX7nweDlsRT1TTifO0kFKkUtRTb
 Ukd4DMzrLMa/VauCNL6WnWQsHOC+xIRRddUO+k78x2WjLrZ5R6DAWoJRSIHb8Yp3OctXiAj3
 FKNm9LvBBRsvaeTRHbb8a2bxRuwJCwUIGkqdSICCwwf7LHeTJob10yVCIw5Sejs04OzSWqYL
 y22QDYWpIUdvPMujqqB0k3LjDyD97SXZFQc31CCNo661T9RaImgbo2uzFHU6/dcMYqUJmW8U
 Gg4d9u2t75XU8zU/MCZaKBURezyua7ZWNHJqQM3R/EcGyKRF2lPlGy6yBV3Pw9XP8kNYlcFi
 2eD6FoKtPe/0JZHBJKbgr5d6ex3lcAM9vy/D5g4i+aihLArLGdrGwk0OSatM5jFyhRErE3GE
 c7znTyQJXgbE7976zG9Wv0Q17Qmrghnmz+NG8+rkk/+gefFDJJwdVvjGAHVBgzexPnYyDg5D
 v4Fb5fao/mheLeWjtbrHX47cglRcClT6WHeoM1LbO+TSjeK60l6Y8I9NYgJItQ/94wMz7+g1
 ijkBidwlQqu7VWaeF7iQi0yN9vSsWNX8CtT0doEZg3zhRDOoO+Hsc8iSnfAVeV/pLw5k68uF
 KVtlgfpKq0ndwkrMg81NPHVhIdjaA6qlUSJOS+kayI4ZJluW0rC/dqMQ+cl3HBRZsZrnaPSe
 4Gd6z4=
IronPort-HdrOrdr: A9a23:SP6/+qkMyFRQtt/M6fZFaZn6xXLpDfIo3DAbv31ZSRFFG/Fw8P
 re+8jztCWE7Ar5PUtKpTnuAsW9qB/nmqKdgrNwAV7BZmfbUQKTRekJgLcKqAeAJwTOssJbyK
 d8Y+xfJbTLfD1HZB/BkWqF+gAbsbu6zJw=
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="65712261"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Rw81FjQzhQjXHaTbGrSfbKOc2imQASPLqz1XepPiW6bzWQx9VD6EFGBqKpKYUH7fuOJwDPYTXu4B0qJ/auHkJwEsbnCAYszTnpgFNraB2T9B6dF80qYtOhnPwbkyOSo4Bga8H9q8pO0rN3S/LKBxSWBO9BkV1eedc3mLLGER1rg3bCRw7Jrv6zzwn+yIOx4eRrY4KNfDpYJm5aVvMbn+lO7hB3TbnlX7Tb3eXzEC4K8rpMJMbXGUzLE49TbPPiNZq4K6oVxdqQ7Zj/ivxtrGb2oxPaO9K+NsqiPO9ZqvldKWYhCegKE/kC/PWP6cV963h3Br1lXO2tXge0nYcHTGRQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=gV5x7p3LQ3FyFctfMgc30qka83QbDX2enU8JqcNIJaI=;
 b=aEUA1CNRyzr6/yHwoRMZmSTDO8AFBE0TD6T9qriAarwD/3zmZDNPipnsi89RTvaC2E4UIaEfI08PPVWxrPethXspVeN6J1QTJZO9oo8ySr8qznyIaZ/W7UP7wxLaj1gIaeIH9v9vBIYjpuFeDFaz+ZGC69i2QKLK/5umFCR0Ys9UX3bjFpOTwItt9iMg9Yf40Dz6j7YfiNjqiZpi0j3QqYSRxJ+XJ6VhhZ+jLSdDFsbzRkOtO43/DUHcxAC2FAmdAtj82Za0tTyxXGSTEi7xugCVT3kqaogOgHt15OoJ3VymIRzwZhcX8eWBoDbL6vmI9bJS6lBvs3VrtzgGsXWq1A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=gV5x7p3LQ3FyFctfMgc30qka83QbDX2enU8JqcNIJaI=;
 b=DWO0QOK+CHSJdNyhUNXh63eY/BVPzHKfLf3COlz5lD4fUUaRdpYFkHw9ccW0+CfBkOtcgaM043g4huYuPyJWHiuWB2pIhZWy8oaiza7lTH0L28yXGPjdQ0AR7UMmL6V15rp3sKcdrTOpuQT4Om2uO6QljbnTkQ9Ynlt/rMZSvhU=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Julien Grall <julien@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Jan Beulich <jbeulich@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>,
	Wei Liu <wl@xen.org>
Subject: [PATCH v3 1/2] xen/build: put image header into a separate section
Date: Tue,  8 Mar 2022 14:49:23 +0100
Message-ID: <20220308134924.83616-2-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220308134924.83616-1-roger.pau@citrix.com>
References: <20220308134924.83616-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LNXP265CA0061.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:5d::25) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: a1156d19-057e-4840-8556-08da010a9041
X-MS-TrafficTypeDiagnostic: DM5PR03MB2618:EE_
X-Microsoft-Antispam-PRVS: <DM5PR03MB2618DECD496792FCA006DE2F8F099@DM5PR03MB2618.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(83380400001)(66946007)(4326008)(508600001)(66556008)(66476007)(8676002)(8936002)(5660300002)(6506007)(6666004)(36756003)(6486002)(26005)(2906002)(86362001)(316002)(186003)(38100700002)(6512007)(82960400001)(54906003)(1076003)(6916009)(2616005);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?NHhmQzZkTUNBV2wrZndpVUlZNFI1T1QxQUxDYWhGb08wWXk0Z2FFTDJUdm53?=
 =?utf-8?B?NGNUQ1ZMemNzTmJ6TUU0V1NPQjdIR0xFajc3RlFQSFhZZmRQTjdMNVRPRnJS?=
 =?utf-8?B?Nk9MUkpZZG4rSGcrL1hUSlZjeWg4bjRkNysyT1ZDQnZhNDFnSTltelNtYXVO?=
 =?utf-8?B?bWlRNkQxTWxVOWc2NWt1VExicWRvcWs1RDl2dStBMkNiRk1SQXZ6dHBHUUdF?=
 =?utf-8?B?WW03USs5YStpak9rZkZkYXVxWWRmbFIyZWdtQnEyeTN5UXF1bDlZcTBCa2k0?=
 =?utf-8?B?UkR2UEZSZi9YUUJzUFhUWUMzWjduTjhkNDMzcDhmRjJwcmViS1ZLVTllaWc3?=
 =?utf-8?B?d0ZlQWk1K3pTejBBekFIOXBjVzYvR1ZoSDRxelJmZ2o4THd1WkxtNDhCN3pW?=
 =?utf-8?B?Z3hRZXhBaWo1OXZPMGwwRXFRcjZlekp1R2w4T0UxSE5iczBGbjhDRUI1SDl1?=
 =?utf-8?B?aXhWVVZGelJJSW9ESURjRS8wRk9CNWwvS2ljZkIrZ2hTeXZDL1AxMDFiUFVm?=
 =?utf-8?B?dkI5L0tmOTMzTml4N3IrcDJzRTZFU3k1VWRZYTJTaTdsOTNxSzh2a2d5c21M?=
 =?utf-8?B?KzdhVEZuMUVoekFpMHR6aHNLVHNRcTRJeis4VGdoWWdURFZ6bmtNdGkrV20v?=
 =?utf-8?B?eE03YVMwOVVZUnhRVFJkZWhDZXlvdEFUZXdlV0Fsc3BpZTVvL0toT0lweWpI?=
 =?utf-8?B?aTg2MHBuc1VZajVWU2ZwUU9iek4rVnN3djk0OHRyazRSNVFGZVlITXIrQkxL?=
 =?utf-8?B?dUNISXBSaDFzNWdERVprVGlCYSs5MkVqQng1S1RHRjJ0UE9Cb2Z3Y0dJeHhX?=
 =?utf-8?B?Vk5ORmNBSWV3QUhuZ3Q1VDh1SzU4czRsMlB0MTlVKzB1TmJiYjcwMEhadGFQ?=
 =?utf-8?B?MS9Xc3RQZTE5L3hwRzI3WGFON0IrRnVPam8xWG15THd5R1F0UXJRU01GTnNx?=
 =?utf-8?B?eWg4UnpqZWp4eCttUHp0aE1IcWtJQUgvaDZma1BpOEdIVVNsM2oveURPWkwr?=
 =?utf-8?B?RVZYVVJ2blhSQ1hzSStWc2tlbmVBYmV4d1Ezd3lEOG51OWlFaXRPSjNqSzJ5?=
 =?utf-8?B?TlpsemFxZGE3NHN4WWpyYUpkcU52cnE2V1dMTmRMcXE2SjZtTDErOGFoTUJk?=
 =?utf-8?B?b0kydUVQS05OODVOamdWS2MvQ2JMZkFDNi9DdHBVc3BCNGJZUFpBWWlhMWlY?=
 =?utf-8?B?dVJXdFYwSkhQazhMbFVYajlFNzJJTUZ2WDdlZSs4UnlFVUpHVldMMTFHMjlB?=
 =?utf-8?B?MXJxdDhVeDV3amNTbHdzaUdXdFF2b1U4QS9VcEpzajhmN01aaFdER3lzdnlz?=
 =?utf-8?B?TjNOOUFGU3c0dFV3MTRrRHpvM21QUTg1Y1AzeklUYTdFWGxlaVh2OU1GaFNj?=
 =?utf-8?B?Y2FNZHlidjRZanJjS2Fnd1Q1NnJzNVk4bmpFUjBtWFJkUXYydUhaWGVwb3ZW?=
 =?utf-8?B?SFVnMzVwd3ZnSkd4WjkrbVk3MXZmVXF3bW40NWxjczU2bjVTM2kwOVFKbk1z?=
 =?utf-8?B?N0t6eXhCeTd1aGxHbTBSYzFncTdwcGI5RTZneldqZ3dGM0lXcDNLUFdsTDBh?=
 =?utf-8?B?QXJlUVFSNkpzZzlHQWJoRXl0M0NrN05zQVAzS1lmdlNiWWxaMzBaaHA2MERy?=
 =?utf-8?B?SGlFVFBWZ24vVGVZeElHWFRuZUo2aXIvS3R0bkdSOXJNSWRyNG41SlQ3dHkv?=
 =?utf-8?B?cWl1WnBBMWZwVDN5aXRoYUFQaDlZdFhVK2NtdHZueEVyNlM5Y2ZGaitlakRx?=
 =?utf-8?B?N2pINVduaG0rRFVSOEVRZXVOUEUwZ0VFaFZVYVVqelhSd2dlbUN6UTFMeitt?=
 =?utf-8?B?ZEd2cmcybXBCRjI2NkluOWM5aGdMTm0yaWI0a0xscWQyczJiQ2VmeEowei9j?=
 =?utf-8?B?cytCMFZ2VVM1UVBsTHd4RXMvanoyTms0bERqemxNN0w2WHdMcHlXRVJvYmYx?=
 =?utf-8?B?VjBld3JhUFd5aXpvM3ltNFkxekIwc2VFWnpEK0UxdWd2dzNvczV0RzRaRTB3?=
 =?utf-8?B?aGV0MzQrTklFT0VOL0dYdDRkakQ4MEM1OElVNmN5cE5WU3lhSGQ0L21Fakg5?=
 =?utf-8?B?WW9XWGE2aU9KR2ZxUmhlcGFDZFBYMnBEVktxKzFPR3pBK0ZsTmU1L0JHVGVr?=
 =?utf-8?B?ZS9qWlFidFNWcEJreVYxT1o1RUIycUJsL0VrV0Fha2V2N2hIdys2c1g5MldU?=
 =?utf-8?Q?NGVfxLkONgHULjNCwPq7WUo=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: a1156d19-057e-4840-8556-08da010a9041
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 13:50:10.9422
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: qkbb6LqrrKVTtcSaqZLhlO5zoVy1MfJigX8KCqAtPxBfQBdxEB6aTMDWBiWcsyS4/HBTExgjXfKxO878q62AZA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR03MB2618
X-OriginatorOrg: citrix.com

So it can be explicitly placed ahead of the rest of the .text content
in the linker script (and thus the resulting image). This is a
prerequisite for further work that will add a catch-all to the text
section (.text.*).

Note that placement of the sections inside of .text is also slightly
adjusted to be more similar to the position found in the default GNU
ld linker script.

The special handling of the object file containing the header data as
the first object file passed to the linker command line can also be
removed.

While there also remove the special handling of efi/ on x86. There's
no need for the resulting object file to be passed in any special
order to the linker.

Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
Changes since v2:
 - New in this version (split from patch 2).
---
 xen/arch/arm/arch.mk        |  2 --
 xen/arch/arm/arm32/Makefile |  3 +--
 xen/arch/arm/arm32/head.S   |  1 +
 xen/arch/arm/arm64/Makefile |  3 +--
 xen/arch/arm/arm64/head.S   |  1 +
 xen/arch/arm/xen.lds.S      |  8 ++++++--
 xen/arch/x86/Makefile       |  5 ++---
 xen/arch/x86/arch.mk        |  2 --
 xen/arch/x86/boot/head.S    |  2 +-
 xen/arch/x86/xen.lds.S      | 13 ++++++++-----
 10 files changed, 21 insertions(+), 19 deletions(-)

diff --git a/xen/arch/arm/arch.mk b/xen/arch/arm/arch.mk
index 094b670723..58db76c4e1 100644
--- a/xen/arch/arm/arch.mk
+++ b/xen/arch/arm/arch.mk
@@ -23,5 +23,3 @@ ifeq ($(CONFIG_ARM64_ERRATUM_843419),y)
         LDFLAGS += --fix-cortex-a53-843419
     endif
 endif
-
-ALL_OBJS-y := arch/arm/$(TARGET_SUBARCH)/head.o $(ALL_OBJS-y)
diff --git a/xen/arch/arm/arm32/Makefile b/xen/arch/arm/arm32/Makefile
index 3040eabce3..520fb42054 100644
--- a/xen/arch/arm/arm32/Makefile
+++ b/xen/arch/arm/arm32/Makefile
@@ -4,11 +4,10 @@ obj-$(CONFIG_EARLY_PRINTK) += debug.o
 obj-y += domctl.o
 obj-y += domain.o
 obj-y += entry.o
+obj-y += head.o
 obj-y += insn.o
 obj-$(CONFIG_LIVEPATCH) += livepatch.o
 obj-y += proc-v7.o proc-caxx.o
 obj-y += smpboot.o
 obj-y += traps.o
 obj-y += vfp.o
-
-extra-y += head.o
diff --git a/xen/arch/arm/arm32/head.S b/xen/arch/arm/arm32/head.S
index 7a906167ef..c837d3054c 100644
--- a/xen/arch/arm/arm32/head.S
+++ b/xen/arch/arm/arm32/head.S
@@ -120,6 +120,7 @@
 
 #endif /* !CONFIG_EARLY_PRINTK */
 
+        .section .text.header, "ax", %progbits
         .arm
 
         /*
diff --git a/xen/arch/arm/arm64/Makefile b/xen/arch/arm/arm64/Makefile
index baa87655fa..6d507da0d4 100644
--- a/xen/arch/arm/arm64/Makefile
+++ b/xen/arch/arm/arm64/Makefile
@@ -7,6 +7,7 @@ obj-$(CONFIG_EARLY_PRINTK) += debug.o
 obj-y += domctl.o
 obj-y += domain.o
 obj-y += entry.o
+obj-y += head.o
 obj-y += insn.o
 obj-$(CONFIG_LIVEPATCH) += livepatch.o
 obj-y += smc.o
@@ -14,5 +15,3 @@ obj-y += smpboot.o
 obj-y += traps.o
 obj-y += vfp.o
 obj-y += vsysreg.o
-
-extra-y += head.o
diff --git a/xen/arch/arm/arm64/head.S b/xen/arch/arm/arm64/head.S
index 66d862fc81..e62c48ec1c 100644
--- a/xen/arch/arm/arm64/head.S
+++ b/xen/arch/arm/arm64/head.S
@@ -133,6 +133,7 @@
         add \xb, \xb, x20
 .endm
 
+        .section .text.header, "ax", %progbits
         /*.aarch64*/
 
         /*
diff --git a/xen/arch/arm/xen.lds.S b/xen/arch/arm/xen.lds.S
index 08016948ab..47d09d6cf1 100644
--- a/xen/arch/arm/xen.lds.S
+++ b/xen/arch/arm/xen.lds.S
@@ -30,9 +30,13 @@ SECTIONS
   _start = .;
   .text : {
         _stext = .;            /* Text section */
+       *(.text.header)
+
+       *(.text.cold .text.cold.*)
+       *(.text.unlikely .text.*_unlikely .text.unlikely.*)
+
        *(.text)
-       *(.text.cold)
-       *(.text.unlikely)
+
        *(.fixup)
        *(.gnu.warning)
        _etext = .;             /* End of text section */
diff --git a/xen/arch/x86/Makefile b/xen/arch/x86/Makefile
index 9c40e0b4d7..04065a7310 100644
--- a/xen/arch/x86/Makefile
+++ b/xen/arch/x86/Makefile
@@ -1,5 +1,7 @@
 obj-y += acpi/
+obj-y += boot/
 obj-y += cpu/
+obj-y += efi/
 obj-y += genapic/
 obj-$(CONFIG_GUEST) += guest/
 obj-$(CONFIG_HVM) += hvm/
@@ -77,9 +79,6 @@ obj-$(CONFIG_COMPAT) += x86_64/platform_hypercall.o
 obj-y += sysctl.o
 endif
 
-# Allows "clean" to descend into boot/
-subdir- += boot
-
 extra-y += asm-macros.i
 extra-y += xen.lds
 
diff --git a/xen/arch/x86/arch.mk b/xen/arch/x86/arch.mk
index 8e57476d65..c90e56aeab 100644
--- a/xen/arch/x86/arch.mk
+++ b/xen/arch/x86/arch.mk
@@ -117,5 +117,3 @@ endif
 
 # Set up the assembler include path properly for older toolchains.
 CFLAGS += -Wa,-I$(srctree)/include
-
-ALL_OBJS-y := arch/x86/boot/built_in.o arch/x86/efi/built_in.o $(ALL_OBJS-y)
diff --git a/xen/arch/x86/boot/head.S b/xen/arch/x86/boot/head.S
index dd1bea0d10..92d73345f0 100644
--- a/xen/arch/x86/boot/head.S
+++ b/xen/arch/x86/boot/head.S
@@ -9,7 +9,7 @@
 #include <asm/cpufeature.h>
 #include <public/elfnote.h>
 
-        .text
+        .section .text.header, "ax", @progbits
         .code32
 
 #define sym_offs(sym)     ((sym) - __XEN_VIRT_START)
diff --git a/xen/arch/x86/xen.lds.S b/xen/arch/x86/xen.lds.S
index 506bc8e404..715452aad9 100644
--- a/xen/arch/x86/xen.lds.S
+++ b/xen/arch/x86/xen.lds.S
@@ -73,9 +73,7 @@ SECTIONS
   _start = .;
   DECL_SECTION(.text) {
         _stext = .;            /* Text and read-only data */
-       *(.text)
-       *(.text.__x86_indirect_thunk_*)
-       *(.text.page_aligned)
+       *(.text.header)
 
        . = ALIGN(PAGE_SIZE);
        _stextentry = .;
@@ -86,8 +84,13 @@ SECTIONS
        *(.text.kexec)          /* Page aligned in the object file. */
        kexec_reloc_end = .;
 
-       *(.text.cold)
-       *(.text.unlikely)
+       *(.text.cold .text.cold.*)
+       *(.text.unlikely .text.*_unlikely .text.unlikely.*)
+
+       *(.text)
+       *(.text.__x86_indirect_thunk_*)
+       *(.text.page_aligned)
+
        *(.fixup)
        *(.gnu.warning)
        _etext = .;             /* End of text section */
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 13:50:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 13:50:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286899.486609 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaEK-0008CC-VB; Tue, 08 Mar 2022 13:50:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286899.486609; Tue, 08 Mar 2022 13:50:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaEK-0008C3-RO; Tue, 08 Mar 2022 13:50:24 +0000
Received: by outflank-mailman (input) for mailman id 286899;
 Tue, 08 Mar 2022 13:50:23 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fWwI=TT=citrix.com=prvs=059ab6e88=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRaEJ-0007uj-Ab
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 13:50:23 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b18c7b01-9ee6-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 14:50:21 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b18c7b01-9ee6-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646747421;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:content-transfer-encoding:mime-version;
  bh=vaQJVY0eYO5A5TjnUkrtytZZxPG+7h7o5KII+En5qgQ=;
  b=NeMv8IIJWBDiNyGyj/iz3DL9lQVLoNlkjEwK8eIqBZh0DTo1WWhBi2QE
   q4wBwiK5XW9cTpobFNUQ+kzsUvSv72nErhatL9OYNpJ2xqvBTAC0IQ1f5
   NRpGbimLh3PsaDsRlDYfX8PbDPM3pYiHsD38qbCOBLkxScNtRLtHotgMR
   k=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 68055469
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:iRSyS6yulMY2L/Ybyk16t+fDxirEfRIJ4+MujC+fZmUNrF6WrkUAz
 TcXCm+BO/ePNDanLt5/aIrioEJU6JLTz9RjHlE9rCAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2YjhWWthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 NplpbeKYhoIBr/1tu0geSkFFSVgFrJb9+qSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DJoQQt2sm1TjEJf0nXYrCU+PB4towMDIY2JAWQKuCO
 ZtxhTxHMUXfR0UeHFssKbUGpcPyrH3WTxd6twfAzUYwyzeKl1EguFT3C/LKfvSaSMMTmVyXz
 krM8n7lGBgcOJqawCCc73O3rubVmGXwX4d6PIO/8vlmkViC3Fs5ARcdVUa4ifShg0v4UNVaQ
 2QP4TYnp6U28E2tT/H+Uge+rXrCuQQTM/JAHut/5AyTx6785weCGnNCXjNHcMYhtsI9WXotz
 FDht9HjCCFrsbaVYWmA7brSpjS3UQAXMGsDaCksXQYDpd75r+kOYgnnF4g5VvTv15usRG+2k
 2viQDUCa6s7neUx/LiaxUL+rTuRjKiUSAorzRrKUTfwhu9mX7KNa4ut4FndyP9PKoeFU1WM1
 EQ5d9iiAPMmVs/UynHUKAkZNPTwvqvebmWA6bJ6N8R5r1yQF2ifkZe8Cd2UDGNgKY46dDDge
 yc/UisBtcYIbBNGgUKaCr9d6vjGL4C9TbwJtdiON7Kih6SdkifdpEmCgmbKgwjQfLAEy/1XB
 HtiWZ/E4YwmIapm1iGqYOwWzKUmwCszrUuKG8ylkUv3jOHHNCPOIVvgDLdoRrpihE9jiF+Jm
 +uzyuPQk0kPOAEASnO/HXEvwaAiciFgWMGeRz1/fe+fOAt2cFzN+NeKqY7Nj7dNxvwP/s+Rp
 ynVchYBlDLX2C2WQS3XOysLQO6+Av5CQYcTYHVE0aCAgCN4P+5CLc43KvMKQFXQ3LA7na4uE
 ahfIJno7zYmYm2vxgnxpKLV9eRKXB+qmRiPL2yiZj0+dIRnXAvH5pnveQ6HycXEJnDfWRcWy
 1F46j7mfA==
IronPort-HdrOrdr: A9a23:oWMLz6zfp651uf6h/plJKrPwKL1zdoMgy1knxilNoHtuA6ulfq
 GV7ZAmPHrP4wr5N0tNpTntAsa9qBDnlaKdg7N+AV7KZmCP0gaVxepZjLfK8nnNHDD/6/4Y9Y
 oISdkaNDQoNykYsS8t2njbL+od
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="68055469"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=WaqOIH+4y4wZ5rRxqD3pJeWTlVH1KLk1eMdt0pjRGrpn62CyVczVI8pQcVQYP+gkT3nR0ubPOrRw+pAOzRspjQyI2bo/N78wXLovt2UkpcmcyWQL90+nSdRh578h/jB6Vy6ohYV4JOOTBdqJdFAsCpW6mx/W0QhmEq/TOxgp69kTg1f1/P3qawY76josyDGal0KVCtmZCFfpa6Bg+Otrdrt5v7sHIvtIEqtEmWkwMF4O+kOWv9xOLgmUGWtmd6oFvtWtDrpjX+/mi/x66M/CjUHiOpeEndM6suQeowImLHbl2gKhmTjtMgjPrqRVMTd2Y6/7yT45Qr/gJRzzCs8A0Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=xjlZ8Pl+NS5moZSBGDHV0ip1h1zHnxC1lwERKrmXVUw=;
 b=RJHY85FWPFLeAmpDSoUHm2khWPOQNAnvinK+PmZ/WPtrv2pr79JF4UrDymEA4huiDyIjkRr74nSsCuQMep1HsPbiK5QFg13uRNiRBRupPUY6Q/iJPenXDv7P1GT9+K1/APN3Oc3j2J61m8RYYp/2GEpz3biSxnIXIXmIVyk2r8tyOnbONowB+ZKnVXxoqcQ8jFqQ02Q1yhXxLEbbrtr7Iu25Pub/zdA9RVoatzMdzvPePAoMqRqefDpTTHbvqZlRsMsIKke+UXafVsUyGG4Imx4h+s0FjOt7gVjXLKt6/iFbNOBisyFr2XRn3VANbI7kikJTN7h7X5cQcZKlqv29fg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=xjlZ8Pl+NS5moZSBGDHV0ip1h1zHnxC1lwERKrmXVUw=;
 b=AUXoi/IsLYujH9LCl1Z+D3L2jT/BPr/OFyT2s2K5qHpkqhnrjNwoXlB328Npri6z83gEHTXP5MQevEwFh+fzanY+vi4+wvAlU2nC3JJfx3+6X/KchdpFkWBfTWVRNDxaKnaC3SVqfpRQ1+EhEhlZsAq3Y+vuinF+rA9NcsaqHiw=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, Jan
 Beulich <jbeulich@suse.com>, Julien Grall <julien@xen.org>, Stefano
 Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH v3 2/2] livepatch: set -f{function,data}-sections compiler option
Date: Tue,  8 Mar 2022 14:49:24 +0100
Message-ID: <20220308134924.83616-3-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220308134924.83616-1-roger.pau@citrix.com>
References: <20220308134924.83616-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO2P265CA0248.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:8a::20) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: fa1f69bc-573d-415b-7987-08da010a93c2
X-MS-TrafficTypeDiagnostic: DM5PR03MB2618:EE_
X-Microsoft-Antispam-PRVS: <DM5PR03MB2618C4C87CC6C7D42989B2CF8F099@DM5PR03MB2618.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(83380400001)(66946007)(4326008)(508600001)(66556008)(66476007)(8676002)(8936002)(5660300002)(6506007)(6666004)(36756003)(6486002)(26005)(2906002)(86362001)(316002)(186003)(38100700002)(6512007)(82960400001)(54906003)(1076003)(6916009)(2616005);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?WGhTRzVQbjI5RE1OTVRiN1NxRWpKT3ZoK2M5bDdSRm51MDdKbFZJMkVtaWdx?=
 =?utf-8?B?K0ZrOHAwS2MxT1hQclY0Skk2Z0MvbUM0REVsWkNET2lSR2pVYTZraGs1cDhT?=
 =?utf-8?B?MTRUaWdWdVgwczFZQ0cvK20wUTl1bk9QeW9YZ2dQTW13WDY4dGw0NUZ1aVJo?=
 =?utf-8?B?S1ZHZGc3L2R2U2RIdUt2RE10Zklma2FsV3lhOEdFTkE3UnQvU0NZcG9jaHpC?=
 =?utf-8?B?NjJyUWVYZVM1WEFQOHd2dGIrSzhlYXZnaWJkYnlOeDZld2VDYzEzeXA5RW9o?=
 =?utf-8?B?T0pkdU1xOHA4TlBRcWFpSmNNdE94ZUV3dWxsRnVyQmZuSFVreUtUL3J4QXpw?=
 =?utf-8?B?dWdTeVF3TlNiQ2ZvRzFOYUtiaU4rL3h1VFBNblo4ZGI1UnFVZU9ndGxpaUh0?=
 =?utf-8?B?aW95MUVQcWtPZTZxK0NpekVEeG5YN3g0SGRsMWxaSVhVbHJNcUNwZ2Z2Y1p6?=
 =?utf-8?B?QlhaM2hLNEVDcDB0bmlHdVlDdGg3QTRkLzZrUUVRQjNKUUdyd0tjTTFrcVd3?=
 =?utf-8?B?WDRqM3Nrc1l1ajlMNzFzUllWOXQwL0M3azNmZ0U0UHZETHU2WXNDWkJSTGVu?=
 =?utf-8?B?YVNGMkhDNkdLQk1oOFVMS1V4cTExTTBWTWN6SEcvU21kVU9aTUVzQSt5N1lH?=
 =?utf-8?B?aUZELzZMVFB4N3BBeVQ0QXV2VnNTVkF4YTVXckR2QnFieXlqYWs5bGt1ZVEx?=
 =?utf-8?B?ODF2SC9aRi95UkgwVWUzZ3VZczVYWEU4SE1tM3pTMDZiN3A5dXhVSEZwd1Rt?=
 =?utf-8?B?VXN4bDJ6VWpKZ2VFQUV3YlZKa05TZ2kzMWljMWpwZE5VelRsOXFGUlhVSHJt?=
 =?utf-8?B?RVFEYTZTTkhiUnVBb0hleldVcmdVKzZsaVkweUJCcjN2SVROWXhVNjdvMGVt?=
 =?utf-8?B?L0VvZnhHd0pvVmozeTNRSldQcmNaYy9sYkVmQXAzSERraWxZREFacndPdW1i?=
 =?utf-8?B?WXk2czFkbVNSakVXWnZrYWtITGUxcWR3NVF4UlVMNmFtYzBpK1V4NzRIMWxp?=
 =?utf-8?B?dW40c2pEenN4Y2VVVmpjN2dnUnNRaHRlMFNXYmFlOW42RTMyZVlZay92VUYr?=
 =?utf-8?B?c2JXRzhUeVBnczVSdk4wM25UMWZXV0lYa3pmU0U1MXp1UjZSQmU4bmxUd1By?=
 =?utf-8?B?UVVra3JhVGI2SnNHR1p0TjNuRE9yRHlQN0l3UGpDRGRBWUU0Q0FUbE4vcE9D?=
 =?utf-8?B?SXVZeThYRmNwMUlJeUVFWHFLa3lqNTVtano2QVhzbytFTzIvTVJXdllyTDEv?=
 =?utf-8?B?b2RhOWsvNVZmU3RIQXNneUl1aGMvNC9za1lSQnRONmJyeDUyTkZmbnRoaVR5?=
 =?utf-8?B?VzlTWHpHQnVWdW9BYkpNcEpsend6ZXNZemlwWGJxRGk4YWNEb25qVk1ONjcv?=
 =?utf-8?B?RG9aS0szaWdEYlRaZjNXZWlROXRTajJZS3oyWWp5SGZCWXRYMW1Wb0QwcVVH?=
 =?utf-8?B?d3Bhb0FaN1Y5d3pVVXRNY25UU1RsdnNVMnlTUksyK2VxWW1kWUNKQ0wzZmFu?=
 =?utf-8?B?YXZMMGVrd1lTd2YycnN2Z3FTdkdKTERxMlJoYmdqNlNPRWtreXl0TDdseEZq?=
 =?utf-8?B?c0NjdDZPOWRjWVN1K0E0UFU0bC8zWHhUZk1ObEdtT0xaU2t2bkk1UHlZZE5L?=
 =?utf-8?B?VWd0VXBScExadExZRGxld29pMTZ3OCtQbURUVkdESHVCQmV2Tm1GZTdLd3Zs?=
 =?utf-8?B?KzJkWENIYk1xQzZHWHBrMzRrejhLdlVmUk5VQ3lVRURnY0cvelBzTGRtRDlh?=
 =?utf-8?B?S21YOUJQYUcxQ0VtYytiek9jMElMYTBZRHM5SXZWMnZqa1dhK0xzUElrNi9R?=
 =?utf-8?B?NUE5MTErS3R5TEdzd3lRYWh3T0lsWUdZNTRpdCtSbmw3czJFajd6TDNtTk00?=
 =?utf-8?B?VFR6bll6REVJUWJ6blZGcTJ2WjR5eFd4WEd0dTNlUisrL1lYV2c0K214ZHF3?=
 =?utf-8?B?bEF4M1NJMEJJVVhGYlZHMU5hR2JkT0tFcndrVjhrYXM2Qk5JNDJMaW8zbUk1?=
 =?utf-8?B?VVBiNzBPWFp1dll5eTl1bmxvWHEwTmN2OWtadTgxVkhKNU1XMzBzVm82d2J5?=
 =?utf-8?B?T1FLY2dvM2swaTRycEh1akNESm52MjZEMkFSRy85NnRuc25TbGdMd2orbURS?=
 =?utf-8?B?M3JiVG5QbjhBL3NkWWszQTBwbmh5bjRMaG1lRWkzYVRXT0J2UURNVVFLWnRO?=
 =?utf-8?Q?TDJUeQQKP8kE55paTtZFcLo=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: fa1f69bc-573d-415b-7987-08da010a93c2
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 13:50:16.7892
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: T4FqfL20OScC+wpanWTuLCYMe4XeoQJaBXuX/zk7oS3sL+W/+Lm+kRS0gcwHhDF7b77hNPOR05BZUkvF8GRE2w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR03MB2618
X-OriginatorOrg: citrix.com

If livepatching support is enabled build the hypervisor with
-f{function,data}-sections compiler options, which is required by the
livepatching tools to detect changes and create livepatches.

This shouldn't result in any functional change on the hypervisor
binary image, but does however require some changes in the linker
script in order to handle that each function and data item will now be
placed into its own section in object files. As a result add catch-all
for .text, .data and .bss in order to merge each individual item
section into the final image.

The main difference will be that .text.startup will end up being part
of .text rather than .init, and thus won't be freed. .text.exit will
also be part of .text rather than dropped. Overall this could make the
image bigger, and package some .text code in a sub-optimal way.

On Arm the .data.read_mostly needs to be moved ahead of the .data
section like it's already done on x86, so the .data.* catch-all
doesn't also include .data.read_mostly. The alignment of
.data.read_mostly also needs to be set to PAGE_SIZE so it doesn't end
up being placed at the tail of a read-only page from the previous
section. While there move the alignment of the .data section ahead of
the section declaration, like it's done for other sections.

The benefit of having CONFIG_LIVEPATCH enable those compiler option
is that the livepatch build tools no longer need to fiddle with the
build system in order to enable them. Note the current livepatch tools
are broken after the recent build changes due to the way they
attempt to set  -f{function,data}-sections.

Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
Changes since v2:
 - Split the placing of the header code in a separate section to a
   pre-patch.
 - Move Kconfig option to xen/Kconfig.
 - Expand reasoning why .data.read_mostly needs to be moved on Arm.

Changes since v1:
 - Introduce CC_SPLIT_SECTIONS for selecting the compiler options.
 - Drop check for compiler options, all supported versions have them.
 - Re-arrange section placement in .text, to match the default linker
   script.
 - Introduce .text.header to contain the headers bits that must appear
   first in the final binary.
---
It seems on Arm the schedulers and hypfs .data sections should be
moved into read_mostly.
---
Tested by gitlab in order to assert I didn't introduce any regression
on Arm specially.
---
 xen/Kconfig            |  4 ++++
 xen/Makefile           |  2 ++
 xen/arch/arm/xen.lds.S | 41 +++++++++++++++++++++--------------------
 xen/arch/x86/xen.lds.S |  9 +++++----
 xen/common/Kconfig     |  1 +
 5 files changed, 33 insertions(+), 24 deletions(-)

diff --git a/xen/Kconfig b/xen/Kconfig
index bcbd2758e5..d134397a0b 100644
--- a/xen/Kconfig
+++ b/xen/Kconfig
@@ -27,6 +27,10 @@ config CLANG_VERSION
 config CC_HAS_VISIBILITY_ATTRIBUTE
 	def_bool $(cc-option,-fvisibility=hidden)
 
+# Use -f{function,data}-sections compiler parameters
+config CC_SPLIT_SECTIONS
+	bool
+
 source "arch/$(SRCARCH)/Kconfig"
 
 config DEFCONFIG_LIST
diff --git a/xen/Makefile b/xen/Makefile
index 5c21492d6f..18a4f7e101 100644
--- a/xen/Makefile
+++ b/xen/Makefile
@@ -273,6 +273,8 @@ else
 CFLAGS += -fomit-frame-pointer
 endif
 
+CFLAGS-$(CONFIG_CC_SPLIT_SECTIONS) += -ffunction-sections -fdata-sections
+
 CFLAGS += -nostdinc -fno-builtin -fno-common
 CFLAGS += -Werror -Wredundant-decls -Wno-pointer-arith
 $(call cc-option-add,CFLAGS,CC,-Wvla)
diff --git a/xen/arch/arm/xen.lds.S b/xen/arch/arm/xen.lds.S
index 47d09d6cf1..836da880c3 100644
--- a/xen/arch/arm/xen.lds.S
+++ b/xen/arch/arm/xen.lds.S
@@ -36,6 +36,9 @@ SECTIONS
        *(.text.unlikely .text.*_unlikely .text.unlikely.*)
 
        *(.text)
+#ifdef CONFIG_CC_SPLIT_SECTIONS
+       *(.text.*)
+#endif
 
        *(.fixup)
        *(.gnu.warning)
@@ -82,10 +85,24 @@ SECTIONS
 #endif
   _erodata = .;                /* End of read-only data */
 
+  . = ALIGN(PAGE_SIZE);
+  .data.read_mostly : {
+       /* Exception table */
+       __start___ex_table = .;
+       *(.ex_table)
+       __stop___ex_table = .;
+
+       /* Pre-exception table */
+       __start___pre_ex_table = .;
+       *(.ex_table.pre)
+       __stop___pre_ex_table = .;
+
+       *(.data.read_mostly)
+  } :text
+
+  . = ALIGN(SMP_CACHE_BYTES);
   .data : {                    /* Data */
-       . = ALIGN(PAGE_SIZE);
        *(.data.page_aligned)
-       *(.data)
        . = ALIGN(8);
        __start_schedulers_array = .;
        *(.data.schedulers)
@@ -98,26 +115,10 @@ SECTIONS
        __paramhypfs_end = .;
 #endif
 
-       *(.data.rel)
-       *(.data.rel.*)
+       *(.data .data.*)
        CONSTRUCTORS
   } :text
 
-  . = ALIGN(SMP_CACHE_BYTES);
-  .data.read_mostly : {
-       /* Exception table */
-       __start___ex_table = .;
-       *(.ex_table)
-       __stop___ex_table = .;
-
-       /* Pre-exception table */
-       __start___pre_ex_table = .;
-       *(.ex_table.pre)
-       __stop___pre_ex_table = .;
-
-       *(.data.read_mostly)
-  } :text
-
   . = ALIGN(8);
   .arch.info : {
       _splatform = .;
@@ -211,7 +212,7 @@ SECTIONS
        *(.bss.percpu.read_mostly)
        . = ALIGN(SMP_CACHE_BYTES);
        __per_cpu_data_end = .;
-       *(.bss)
+       *(.bss .bss.*)
        . = ALIGN(POINTER_ALIGN);
        __bss_end = .;
   } :text
diff --git a/xen/arch/x86/xen.lds.S b/xen/arch/x86/xen.lds.S
index 715452aad9..75925fe145 100644
--- a/xen/arch/x86/xen.lds.S
+++ b/xen/arch/x86/xen.lds.S
@@ -88,6 +88,9 @@ SECTIONS
        *(.text.unlikely .text.*_unlikely .text.unlikely.*)
 
        *(.text)
+#ifdef CONFIG_CC_SPLIT_SECTIONS
+       *(.text.*)
+#endif
        *(.text.__x86_indirect_thunk_*)
        *(.text.page_aligned)
 
@@ -292,9 +295,7 @@ SECTIONS
 
   DECL_SECTION(.data) {
        *(.data.page_aligned)
-       *(.data)
-       *(.data.rel)
-       *(.data.rel.*)
+       *(.data .data.*)
   } PHDR(text)
 
   DECL_SECTION(.bss) {
@@ -309,7 +310,7 @@ SECTIONS
        *(.bss.percpu.read_mostly)
        . = ALIGN(SMP_CACHE_BYTES);
        __per_cpu_data_end = .;
-       *(.bss)
+       *(.bss .bss.*)
        . = ALIGN(POINTER_ALIGN);
        __bss_end = .;
   } PHDR(text)
diff --git a/xen/common/Kconfig b/xen/common/Kconfig
index 6443943889..d921c74d61 100644
--- a/xen/common/Kconfig
+++ b/xen/common/Kconfig
@@ -354,6 +354,7 @@ config LIVEPATCH
 	bool "Live patching support"
 	default X86
 	depends on "$(XEN_HAS_BUILD_ID)" = "y"
+	select CC_SPLIT_SECTIONS
 	---help---
 	  Allows a running Xen hypervisor to be dynamically patched using
 	  binary patches without rebooting. This is primarily used to binarily
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 13:52:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 13:52:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286917.486619 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaGd-00010j-Ir; Tue, 08 Mar 2022 13:52:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286917.486619; Tue, 08 Mar 2022 13:52:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaGd-00010c-Fj; Tue, 08 Mar 2022 13:52:47 +0000
Received: by outflank-mailman (input) for mailman id 286917;
 Tue, 08 Mar 2022 13:52:46 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=yKud=TT=citrix.com=prvs=05922dae9=ross.lagerwall@srs-se1.protection.inumbo.net>)
 id 1nRaGc-00010W-1X
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 13:52:46 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 065968a4-9ee7-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 14:52:44 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 065968a4-9ee7-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646747564;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-transfer-encoding:mime-version;
  bh=O9155BDAnNVAviUt/U2hzgdm3VosB9qUYXeR6htG8Jo=;
  b=E9WOVwK17OYizQemjsXkPQKzR4MMMQPqNOahCdg2+PnuZ5tCoty5/Lzu
   0Y8wZYD1MU1JSfRs9eSMN90ywHOzZwqZ/u/zxGgiFC7oK9EnwG06tBnEO
   fW/BkvRLusVGOAr2gA481mwW7V8KHalLzKwqe4RBujcyPNy4zTRF3f51M
   g=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65636938
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:CBBRb63oUI3XDM9FqfbD5eVxkn2cJEfYwER7XKvMYLTBsI5bp2QOm
 zNKCz3UP66CYGL8eNFxbYrn9EpVsMCAz99jHgFtpC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUw0YDja++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /1qtoGbRR8GMZTFgdo+DgdzPHldHv1JreqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHxO5gE/HVpwjzDEv8iRbjIQrnQ5M8e1zA17ixLNaiDO
 ZFHOGE/BPjGSwdfME8TOY9jpsOtv2feIzRY+U7NhKVitgA/yyQuieOwYbI5YOeiScJYlEucj
 mvD9nb+BFcWObS3yyeB83+qrv/Cm2X8Qo16PK218LtmjUOewkQXCQYKTh2rrP+hkEm8VtlDb
 UsO9UIGrq807kWnCMb8Wx6Qp2SNtRoRHdFXFoUHBBqlk/SOpVzDXy5dE2AHOIdOWNIKqSIC8
 VyUtN/xKjNWuaSrai+D3ZjMjhDiNn1ARYMdXhMsQQwA6tjlhYg8iBPTU9pueJKIYs3J9SLYm
 G7T8nVn71kHpYtSjvjgowib6965jsWRFmYIChPrsnVJB++TTKqsfMSW5FfS9p6sx67JHwDa7
 BDodyVzhd3i7K1hdgTQGI3h/5nzvp5p1QEwZ3Y1R/HNEBz3pxaekXh4um0WGauQGp9slcXVS
 EHSoxhNw5RYIWGna6R6C6roVZh0k/ewSI+8Bq2PBjarXnSXXFXclM2JTRTMt10BbWB2yf1vU
 XtlWZzE4Ykm5VRPk2PtGrZ1PU4DzSEi32LDLa0XPDz8uYdykEW9EO9fWHPXN7hRxPrd/G39r
 oYOX+PXmk43eLCvPUHqHXs7cAliwY4TXsut9aS6t4erf2JbJY3WI6OJkeN7Jd0/xPg9eyWh1
 ijVZ3K0AWHX3BXvAQ6LdmpiePXoW5N+pmg8JisiIRCj3H1LXGplxP53m0cfFVX/yNFe8A==
IronPort-HdrOrdr: A9a23:o4lF06OF3vpeRcBcTsWjsMiBIKoaSvp037BN7TEXdfU1SL39qy
 nKpp8mPHDP5Ar5NEtOpTniAsm9qBHnm6KdiLN5Vd3OYOCMggqVBbAnwYz+wyDxXw3Sn9QtsJ
 uIqpIOa+EY22IK7/rH3A==
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="65636938"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=gOft0Eo/XnMJF0xeha48uB0ybOLj8zBmhLwmsOJFyuZagD24MKLNFuUE/cjSixkr0hDTm9sicG21rPUoU2c9A426bYVRA3WANzYE2XxZ6ksbEoARZMCCZwR3YfGUzN8nCCVyIkZ8elvNscmLcEKlDqQ76oBv4JBo/2iyL0Y+pFU+FDToK1WC8GUyNPcjjsWi4DoSOFkMGdAxeV1RpPgBPa3myCNzJivERDF8Hz0tIAUkrWdI8Rda58uC/HpPKyrm0Ww7xAP2uFofgUWCBCgu/Ah+DN+6nmL8Qk75Kh3v7LhyAOjfIVquidQ4HVjxlycV48fyMoqadr0LAd049Ls2kg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=uAOUOJ0jB6mSdT0t7+Eq+yBBYYGeFA374gfxlRedNL0=;
 b=OGuVw8xfKFzPAtMJAPKM+wH6mJVCpr3yYDH3PdAg9xnAVN83tWSpLWc4yh1nOOKUH+Oyr4JtpA/8YL9WLSdw2/rYqvLrCkMRtly/ERGtHzc1z0GumEQjtI3HlR4DZDZLbEiN2Mzi7K31Xs9g25pr1fx4ujVMq1nW5yTgEalm+Ih0JrleKpCFj2hP7X02MxwFUS7nubjv+MKHpa28ZvmpTGmCwL8KvhmTB9LZaZ4tz3whB68H3o5HmKbUu9HgtU//hrt5qGF5KjngO5SobA9Auy+ydeH3+nn8/qSkgkKpYWQkOghvqUAvcjj7rQxYWI3EAfEKrO62uBxVJ9mYwy0hHw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=uAOUOJ0jB6mSdT0t7+Eq+yBBYYGeFA374gfxlRedNL0=;
 b=Nt3YLLTjDaM+KaEXUYJLErK0iFXNwehzv4wvZLSxYzwYEWLya/m/2nhEG8igftIxjEr3DY5V5VuNqKmLGPPLh3/LVc5qn4bSGOW1EldJ/T/1P+DDwzf3cfsXW64blW6EFJnL7orNCin1FwqHkxMNCr6R3cXWOCDfzb3Np8zu9SU=
From: Ross Lagerwall <ross.lagerwall@citrix.com>
To: Roger Pau Monne <roger.pau@citrix.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: "konrad.wilk@oracle.com" <konrad.wilk@oracle.com>, "doebel@amazon.de"
	<doebel@amazon.de>, "julien@xen.org" <julien@xen.org>, Andrew Cooper
	<Andrew.Cooper3@citrix.com>
Subject: Re: [PATCH 3/4] livepatch: do the initial build using CROSS_COMPILE
Thread-Topic: [PATCH 3/4] livepatch: do the initial build using CROSS_COMPILE
Thread-Index: AQHYLkHcTkbZn1yzL0yPG0BHEpHy/Ky1icjX
Date: Tue, 8 Mar 2022 13:52:37 +0000
Message-ID: <PH0PR03MB638268644A8459016AB61C4BF0099@PH0PR03MB6382.namprd03.prod.outlook.com>
References: <20220302142711.38953-1-roger.pau@citrix.com>
 <20220302142711.38953-4-roger.pau@citrix.com>
In-Reply-To: <20220302142711.38953-4-roger.pau@citrix.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
suggested_attachment_session_id: 34e9a7e3-1c7c-4a8a-4a42-cba50b66feb9
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 8307660a-4b0a-40ec-776c-08da010ae7fe
x-ms-traffictypediagnostic: MWHPR03MB3262:EE_
x-microsoft-antispam-prvs: <MWHPR03MB3262B14BFBD5EB256C197FF0F0099@MWHPR03MB3262.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PH0PR03MB6382.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(8676002)(508600001)(91956017)(66946007)(82960400001)(66556008)(66446008)(66476007)(64756008)(4326008)(76116006)(38100700002)(86362001)(71200400001)(33656002)(107886003)(55016003)(186003)(83380400001)(26005)(9686003)(8936002)(7696005)(6506007)(5660300002)(52536014)(316002)(54906003)(110136005)(44832011)(2906002)(53546011)(122000001)(38070700005);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?8ImY/S2ywxBsU2t5G12Ks2g/9bbzSrPwnbDX9op0G29lCivMxNklrhcpnP?=
 =?iso-8859-1?Q?VwuMKkNLn8h8+g/nq5PrVo/ZlEYoxSLX1K5P1DGutvYMdelJFgDBK3WXyU?=
 =?iso-8859-1?Q?OwPQyqnChyPmBXNsLKjegglqzH2NCrlZFPkqHpLNyJjzNL5L62Z+VKZXGk?=
 =?iso-8859-1?Q?ve9mhTWXwWQvYkZaibHYHjV0dqAewqmIEi8War70IKvJRrvA/VjuowUesl?=
 =?iso-8859-1?Q?J9jjYQ7eKNw+WKH758lrmFyWJlzB/a/NTG0pznMfrtkpSjz9QVJ7xuqytS?=
 =?iso-8859-1?Q?Uul8ibn7dVMByVY7wMoTDvSmA3THrHxiqtP4JgoH3Rhu4kHD9ZBezvnCKL?=
 =?iso-8859-1?Q?UoHKmBe+el3mMY6s++vE4GtoMeiHczXib4ptU8BY/J3UUPrykoQJylHCrS?=
 =?iso-8859-1?Q?SBaS+S50JH05WFB67SvCUfTOPJiS90TeJVC7A9tdQVxUUHceS7Zjsq9h6w?=
 =?iso-8859-1?Q?1JJ7UIUBnZJpomi4aafFMkcX6WfHMLMmfgNHdK5Uxn7FyIoPEgEFCi5CO9?=
 =?iso-8859-1?Q?K3Faes/n92gXdInkE1IQpzqNPrWA7Qsk4R4ZAZO3nJw0JB2AesyJRkAH6E?=
 =?iso-8859-1?Q?+sXDCKhHPSRhxGd8OUsYcnyuGAQvWCiDo89iMf6jj0/hg3qkj/PL038Qrn?=
 =?iso-8859-1?Q?K14nr1X4jema0YBWAfhkYdXEsHBb0YTwXZboLlzUIaV5+3UDKVIwrq7jcm?=
 =?iso-8859-1?Q?EkQF8K72hL0V5iiHleLTjYgwcyR8vYc1rQXSPr09bkLOBUvm4ON6VSk3PS?=
 =?iso-8859-1?Q?zvFUJ+p3Ry9+Af7t3WXZOTa5lsxKvbH860L+CPQMiQo9XPwTtDTWcnUzqC?=
 =?iso-8859-1?Q?8FXktk0a8YIm6ramdbC1sqrw7iuuNUBfxPV7nJHJD2E2FCva5WyW3wstXl?=
 =?iso-8859-1?Q?1XcbEsehTGOJ89v5iMk3GYz8FKbcmLRKCzTn2EvpPSJ+LV6dSlvUEtymbS?=
 =?iso-8859-1?Q?K+o11Grboc5qLpixAqY8hcRf4Ap/TaaB84trDvKoY4wrWuK4ZaxBcGHJA7?=
 =?iso-8859-1?Q?TJnW72lKlxqdmoMdwfefIwTk6PUJKlXQy7pRXEjsJhI7R4tInIzJ/HCdPj?=
 =?iso-8859-1?Q?pA4Hhg17p0UMerDvA/zxvs6SbrpqYZTugmjm1u1GBZPnWDOjABdsKvx7ck?=
 =?iso-8859-1?Q?bP+RPDsRFgXeApQBKC4z7UfcIv8/ljV5Qoo6RlGBVUptFfzFiF2WOSzw+V?=
 =?iso-8859-1?Q?lSvVNJs0uqzYqCS5czt+UwO4KV+9S8umViNqLNzGaGknNlAezFoTrB7HtS?=
 =?iso-8859-1?Q?+CQdQY1UvvunxmPs5FiDwFqdCVMSQip8RmnLvJCLQbBg48KyBrnDqt7dNb?=
 =?iso-8859-1?Q?ZyM8jY/vAjD3mLryoQlsmxg2VlHBHM5qCowFpMYfPorMhDRya6wQJE12hP?=
 =?iso-8859-1?Q?rfv3YKgfbB0RvEXHyQBqnIQHdEkAKrJNzRz/NqncgWXMwpADeTipJqxjW8?=
 =?iso-8859-1?Q?3lIXu0uctHWf2TrNJAgHl2jjtXFNzkY6z2a5NPLudx2fJYxX25+Xfz1PuX?=
 =?iso-8859-1?Q?C2Ah1JA1BJi9O1u3QgpohYYJIsxrtxpcHd5toKhmLGgPvodQ1bh1LFChCR?=
 =?iso-8859-1?Q?AzqTOIMUptgkbYwUv5f1bJZlvkEJWLIQ+snxeDbuTxgdB0B7+YEV0YBrJR?=
 =?iso-8859-1?Q?OKKswGHfdnXF+vTFyWm/1Y4LWgCyfN3yQZQKwedEUqV7DV2lEGnwotVTfD?=
 =?iso-8859-1?Q?zoAIXVCwub09Db1f9HfkLaJxvqX1sy1cmTweQ1gz1Nko1yeJm/sajWh48k?=
 =?iso-8859-1?Q?G2VA=3D=3D?=
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR03MB6382.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8307660a-4b0a-40ec-776c-08da010ae7fe
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Mar 2022 13:52:37.8767
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: V25+guR80lpzzyFR5P7MBHzfgfoJd8Aqv4gx8RgyDnczlYB9VIvOOJv+7CiqFiwG6OkERvR7N92JRbC2I7xjNoI7aSKv24HyBxIaOd2y6rE=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR03MB3262
X-OriginatorOrg: citrix.com

> From: Roger Pau Monne <roger.pau@citrix.com>=0A=
> Sent: Wednesday, March 2, 2022 2:27 PM=0A=
> To: xen-devel@lists.xenproject.org <xen-devel@lists.xenproject.org>=0A=
> Cc: Ross Lagerwall <ross.lagerwall@citrix.com>; konrad.wilk@oracle.com <k=
onrad.wilk@oracle.com>; doebel@amazon.de <doebel@amazon.de>; julien@xen.org=
 <julien@xen.org>; Andrew Cooper <Andrew.Cooper3@citrix.com>; Roger Pau Mon=
ne <roger.pau@citrix.com>=0A=
> Subject: [PATCH 3/4] livepatch: do the initial build using CROSS_COMPILE =
=0A=
>  =0A=
> Setting it afterwards for further builds will cause the build logic to=0A=
> detect a change and thus force a rebuild of all sources.=0A=
> =0A=
> Signed-off-by: Roger Pau Monn=E9 <roger.pau@citrix.com>=0A=
> ---=0A=
>  livepatch-build | 3 ++-=0A=
>  1 file changed, 2 insertions(+), 1 deletion(-)=0A=
> =0A=
> diff --git a/livepatch-build b/livepatch-build=0A=
> index e1715ea..38a92be 100755=0A=
> --- a/livepatch-build=0A=
> +++ b/livepatch-build=0A=
> @@ -92,7 +92,6 @@ function build_special()=0A=
>      cd "${SRCDIR}" || die=0A=
>  =0A=
>      # Capture .o files from the patched build=0A=
> -    export CROSS_COMPILE=3D"${TOOLSDIR}/livepatch-gcc "=0A=
>      export LIVEPATCH_BUILD_DIR=3D"$(pwd)/"=0A=
>      export LIVEPATCH_CAPTURE_DIR=3D"$OUTPUT/${name}"=0A=
>      mkdir -p "$LIVEPATCH_CAPTURE_DIR"=0A=
> @@ -408,6 +407,8 @@ if [ "${SKIP}" !=3D "build" ]; then=0A=
>          XEN_DEBUG=3D"debug=3D$XEN_DEBUG"=0A=
>      fi=0A=
>  =0A=
> +    export CROSS_COMPILE=3D"${TOOLSDIR}/livepatch-gcc "=0A=
> +=0A=
>      echo "Perform full initial build with ${CPUS} CPU(s)..."=0A=
>      build_full=0A=
>  =0A=
> -- =0A=
> 2.34.1=0A=
=0A=
Reviewed-by: Ross Lagerwall <ross.lagerwall@citrix.com>=


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 13:53:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 13:53:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286918.486631 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaGs-0001OK-S7; Tue, 08 Mar 2022 13:53:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286918.486631; Tue, 08 Mar 2022 13:53:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaGs-0001OD-O4; Tue, 08 Mar 2022 13:53:02 +0000
Received: by outflank-mailman (input) for mailman id 286918;
 Tue, 08 Mar 2022 13:53:00 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRaGq-00010W-KC
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 13:53:00 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 10850441-9ee7-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 14:52:59 +0100 (CET)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur03lp2050.outbound.protection.outlook.com [104.47.8.50]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-30-oCxbH8yDNz6-oW8feW8ooA-1; Tue, 08 Mar 2022 14:52:58 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM6PR04MB5303.eurprd04.prod.outlook.com (2603:10a6:20b:5::12) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Tue, 8 Mar
 2022 13:52:56 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 13:52:56 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 10850441-9ee7-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646747579;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=yKsUp5TFllCbN8cWmemN41kbdSCY21VHkGEnScpabdE=;
	b=Kmx4v7k7qYBt4/YwtTm6vOGKwukiLFAjAZqgSp4Eou609icLJjaWRjtX3gOS0qnEUzSZye
	cIvj09OzKF0RCN0YxVeXjnxi8Mit0hpMVhU7f2rWmx8k0zNXl2EYJgcG9U/sB56SrW7EmW
	ov0ey2jKC0GmsXd11L9HMmtiTYL+ZXU=
X-MC-Unique: oCxbH8yDNz6-oW8feW8ooA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=cyU7yfHGCiifOy0/CKR90bgAdIsMShxxU7k2rcuChwSp5zjSh55Zy71/gv4aVO1HTEk7Vu9DKe1Qo5IavEN5Qlms3TBg++FvsZZ4PNbB3nqZq+PgWsA/csnH7nfAqhoz+sL22HRdyOJOEmZRB6GjrQ2mV97EZustEz1bccAls7TEzGAhi2jxlaE4kuwqrFXCr/nNlZcr0TANbQLRb2iq+Sdgl68RV4PuckMGdqHTaYsO9QqbMUbZBTDvuI3dJm598Tjaq2566jdPQyh/H3bLydy+Yx9RZ6jPL1fKRQ+uP5NYIDCmhM9p+twvPoGRBfG8Y0asmV98WlWR/sCK5B3kNg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=bKfaemJrMfPvHoimJl7a/DPrGcRY7VTcCuerE2pjJNE=;
 b=R79NtpJTEglP36ZcyoFFgCBGry3/T4kRpiQxAKS+vgP27jlKLIyhzYi7ivY/Cbhtdzx5fhosnVKjuMro1R1PHr6dFINpoMP530nX/vJ+bBFO/1g9XYI5+hBKC/H0WX83GpPleqfX4Tw8bwWmGumLP6UG8gtFOc2Qhcl6m0y0+CPDvL4P3/yOHz8112cWp2mBdkIt81QTLQ5qLH4foDa8HnEy4xs3ETa8vRhbckOpKLieOxNNpXRrB+aSBradzED6UxnftWsYRowQ9oMORkhYCMib5T+LosN+if/Uwq/bGA4TWDoV1KPnJ/77GWosZpO35mpLKvQgvBNFmixwEOMXtg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <4881ce3d-0598-bade-3b5e-ff26e3125b4d@suse.com>
Date: Tue, 8 Mar 2022 14:52:54 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v3 00/13] xen: drop hypercall function tables
Content-Language: en-US
To: Juergen Gross <jgross@suse.com>
CC: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
 <julien@xen.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Christopher Clark <christopher.w.clark@gmail.com>,
 xen-devel@lists.xenproject.org
References: <20211208155606.20029-1-jgross@suse.com>
 <0ec9f176-1108-e1ac-a250-5ab9d151f7a8@suse.com>
 <4ac7c2ad-a600-f817-3b69-af0c1a47f4ac@suse.com>
 <cc6c9782-fff6-1832-0c25-d8fd38ed1c1d@suse.com>
 <88014841-017c-5621-0193-c4223596a29c@suse.com>
 <4455dab2-d52b-2e1a-388a-ffc3123438a4@suse.com>
 <7764a747-bff5-7c76-ab4b-a93fdd9050df@suse.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <7764a747-bff5-7c76-ab4b-a93fdd9050df@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR04CA0089.eurprd04.prod.outlook.com
 (2603:10a6:20b:50e::13) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 3917ba48-0fe3-415c-a5c0-08da010af2f4
X-MS-TrafficTypeDiagnostic: AM6PR04MB5303:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB53037210AA4D5D7F76A1A7F4B3099@AM6PR04MB5303.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(5660300002)(38100700002)(508600001)(6486002)(2616005)(66574015)(6862004)(26005)(31686004)(186003)(4326008)(66476007)(8676002)(66556008)(66946007)(53546011)(86362001)(31696002)(83380400001)(8936002)(7416002)(6506007)(54906003)(316002)(37006003)(6636002)(6512007)(36756003)(2906002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?lmtnnsgYHpKGs0s21XTXZVpmD8QFVW3CEPUk4md9owyD3wwwybXbCddfWrCx?=
 =?us-ascii?Q?N3KIKenr5ZGQaBc+aJVRFwCOzZWe7013yglnGRs3Rllo2fFEpnVj3x8DHiES?=
 =?us-ascii?Q?tRbjuvJWnpiPtrOh7c6m6JajNoWQqJ8J76/DEBFYr5lkrcrwILTF+PV5Tuxm?=
 =?us-ascii?Q?7vX3WZjl/h+XSgOnRFpcoH3z/9DIxUnvOetyOZE6tT7uQXesv76IEEcn1Lyb?=
 =?us-ascii?Q?RlazN2xgrNUT6n6ZB69vb4S6y/hvw6hxT0INz06PmShY+7b3pUnkKEOhjsHk?=
 =?us-ascii?Q?ux/epNl8r4OvyuRMXLfN7wWDOVsMZE5S6LLOalX/xHWyqP3//8+Pfl37IWPj?=
 =?us-ascii?Q?BIMBBL+GuaY1YDMl4Psi41WFUFFT8X5hNoIhX4t46JgaAzNw7gWHwN4nYDNi?=
 =?us-ascii?Q?m6tAfsd48W/RNU83tlzIZlMykazqDXOEBxrlEwCBQKuhdIEezhRVwlbnVnfy?=
 =?us-ascii?Q?OjP+KtwzM7Q6LIyh1doXRYO7WtCex4s0e/26fYIbJHy7mp0lbDAf7ttkn/Vo?=
 =?us-ascii?Q?8GZyqK2Kwe9PZ21ETtc0IXo35U+sp0WNGU2edTlv1cEv9mH1sMZ99sF8+l8Y?=
 =?us-ascii?Q?satIYDwaf4RQikpG6ZaNKKCGSc8CKHv3I0GDR/3aBoIlEKrEzsqR4WYSR5dw?=
 =?us-ascii?Q?+Me/MX6GFxK0P4beUgVnqFN3qIomynh6GoYJffQidLg5Gusjf1kP5sPXwlon?=
 =?us-ascii?Q?WiyetdlmZqfgP0RXs3UzwDqTv8kW6E4OZ+MGtvBHMft9BikA5nRaQzjw+POR?=
 =?us-ascii?Q?o96zmQxf1dgy1DpWJsRRFWP3moWlVmkfYx6ZrtDCDwWs2EaYr8yb4se0+wrx?=
 =?us-ascii?Q?64F+bgxUwwgpghiP6oqwO08C1FzAyMHfPAdqQuejNkUBqsTy+1xjTY7+41f3?=
 =?us-ascii?Q?FX7m5FCvUOst1bDm2/G6jQBSI3IMznVNdFOyUYfrPa5vcH4LUKLVoxuCRCep?=
 =?us-ascii?Q?PvPRoHdr0odFJ6HRFh7X9z88uAApwosxGhzdYNplsPeb3OOnTZLc8LAAFHqB?=
 =?us-ascii?Q?Gu7+1iWUJ3AHFJ0dNotclvG02zDUAr2WsQBMeuncgHTBuzfc7+doR8YfyEc4?=
 =?us-ascii?Q?OIsa0IXTJsdFQ0HljvIvhRGsfm1jJINDeOyq41yYWlo06uRXSHSYHKY65tZ0?=
 =?us-ascii?Q?37s/cB96oVmVFc2X/lRn9cOFUE074/as8ozjRvQFtqubiKynGmzTtXJ2OfT5?=
 =?us-ascii?Q?UyfiZ+EWk6JELLR9VRLEuH2FvxavRImKwK1gCsj8YDl9bJXry96+/sf4Bi+9?=
 =?us-ascii?Q?UuT8oNGDrtp+PYyFeagSOGtP0nuGY+4BGyCmxyh2sVy3/KPED3aIfC6sRfML?=
 =?us-ascii?Q?upsjOoQ1M7OK1alEQYliGpyhT4GQTJ504InRCZWbHV4304urCc35mNtRxDzR?=
 =?us-ascii?Q?/LwdAFMWpcIfwXw2KIJ1dfn/bjpAuxcrA6RTlA8bt9NPFSpVNlyEW/LvR25L?=
 =?us-ascii?Q?skgALDGJ7s4OPgPs+R1tJg0IrNTUEPAAvoFa2AXYK2Vb48WrYGOVGThGso94?=
 =?us-ascii?Q?8cLpcKxSpbJ2KOecLfEIBu4yk1LQ6CNdJKZjG66kl5eeMTCo8ltKHv90KRlT?=
 =?us-ascii?Q?Ooyj1AoyEnlMxrTFEM30dzFmY5rFfqBu9FRdOifJdDCM3wiXxUu4kk45r7Ze?=
 =?us-ascii?Q?8C+GReO6v7q5jvUTIlki0+c=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3917ba48-0fe3-415c-a5c0-08da010af2f4
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 13:52:56.4860
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: pWfd+vAXZXNFX4GOWusy2bpeHCOtaJ+Fldwy7btJmZXkZjysCWMQfrBBavcZ+CwNMP7HlQDn0pNa4TPR7fHKAQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB5303

On 08.03.2022 14:44, Juergen Gross wrote:
> On 08.03.22 14:42, Jan Beulich wrote:
>> On 08.03.2022 13:56, Juergen Gross wrote:
>>> On 08.03.22 13:50, Jan Beulich wrote:
>>>> On 08.03.2022 09:39, Juergen Gross wrote:
>>>>> On 08.03.22 09:34, Jan Beulich wrote:
>>>>>> On 08.12.2021 16:55, Juergen Gross wrote:
>>>>>>> In order to avoid indirect function calls on the hypercall path as
>>>>>>> much as possible this series is removing the hypercall function tab=
les
>>>>>>> and is replacing the hypercall handler calls via the function array
>>>>>>> by automatically generated call macros.
>>>>>>>
>>>>>>> Another by-product of generating the call macros is the automatic
>>>>>>> generating of the hypercall handler prototypes from the same data b=
ase
>>>>>>> which is used to generate the macros.
>>>>>>>
>>>>>>> This has the additional advantage of using type safe calls of the
>>>>>>> handlers and to ensure related handler (e.g. PV and HVM ones) share
>>>>>>> the same prototypes.
>>>>>>>
>>>>>>> A very brief performance test (parallel build of the Xen hypervisor
>>>>>>> in a 6 vcpu guest) showed a very slim improvement (less than 1%) of
>>>>>>> the performance with the patches applied. The test was performed us=
ing
>>>>>>> a PV and a PVH guest.
>>>>>>>
>>>>>>> Changes in V2:
>>>>>>> - new patches 6, 14, 15
>>>>>>> - patch 7: support hypercall priorities for faster code
>>>>>>> - comments addressed
>>>>>>>
>>>>>>> Changes in V3:
>>>>>>> - patches 1 and 4 removed as already applied
>>>>>>> - comments addressed
>>>>>>>
>>>>>>> Juergen Gross (13):
>>>>>>>      xen: move do_vcpu_op() to arch specific code
>>>>>>>      xen: harmonize return types of hypercall handlers
>>>>>>>      xen: don't include asm/hypercall.h from C sources
>>>>>>>      xen: include compat/platform.h from hypercall.h
>>>>>>>      xen: generate hypercall interface related code
>>>>>>>      xen: use generated prototypes for hypercall handlers
>>>>>>>      x86/pv-shim: don't modify hypercall table
>>>>>>>      xen/x86: don't use hypercall table for calling compat hypercal=
ls
>>>>>>>      xen/x86: call hypercall handlers via generated macro
>>>>>>>      xen/arm: call hypercall handlers via generated macro
>>>>>>>      xen/x86: add hypercall performance counters for hvm, correct p=
v
>>>>>>>      xen: drop calls_to_multicall performance counter
>>>>>>>      tools/xenperf: update hypercall names
>>>>>>
>>>>>> As it's pretty certain now that parts of this which didn't go in yet=
 will
>>>>>> need re-basing, I'm going to drop this from my waiting-to-be-acked f=
older,
>>>>>> expecting a v4 instead.
>>>>>
>>>>> Yes, I was planning to spin that up soon.
>>>>>
>>>>> The main remaining question is whether we want to switch the return t=
ype
>>>>> of all hypercalls (or at least the ones common to all archs) not
>>>>> requiring to return 64-bit values to "int", as Julien requested.
>>>>
>>>> After walking through the earlier discussion (J=C3=BCrgen - thanks for=
 the link)
>>>> I'm inclined to say that if Arm wants their return values limited to 3=
2 bits
>>>> (with exceptions where needed), so be it. But on x86 I'd rather not se=
e us
>>>> change this aspect. Of course I'd much prefer if architectures didn't
>>>> diverge in this regard, yet then again Arm has already diverged in avo=
iding
>>>> the compat layer (in this case I view the divergence as helpful, thoug=
h, as
>>>> it avoids unnecessary headache).
>>>
>>> How to handle this in common code then? Have a hypercall_ret_t type
>>> (exact naming TBD) which is defined as long on x86 and int on Arm?
>>> Or use long in the handlers and check the value on Arm side to be a
>>> valid 32-bit signed int (this would be cumbersome for the exceptions,
>>> though)?
>>
>> I was thinking along the lines of hypercall_ret_t, yes, but the
>> compiler wouldn't be helping with spotting truncation issues (we can't
>> reasonably enable the respective warnings, as they would trigger all
>> over the place). If we were to go that route, we'd rely on an initial
>> audit and subsequent patch review to spot issues. Therefore,
>> cumbersome or not, the checking approach may be the more viable one.
>>
>> Then again Julien may have a better plan in mind; I'd anyway expect
>> him to supply details on how he thinks such a transition could be done
>> safely, as he was the one to request limiting to 32 bits.
>=20
> In order to have some progress I could just leave the Arm side alone
> in my series. It could be added later if a solution has been agreed
> on.
>=20
> What do you think?

I see no issue with this if there's no other dependency on Arm following
suit.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 13:57:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 13:57:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286929.486641 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaLC-0002J7-EM; Tue, 08 Mar 2022 13:57:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286929.486641; Tue, 08 Mar 2022 13:57:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaLC-0002J0-BQ; Tue, 08 Mar 2022 13:57:30 +0000
Received: by outflank-mailman (input) for mailman id 286929;
 Tue, 08 Mar 2022 13:57:29 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRaLB-0002Io-AW
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 13:57:29 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b0b87e26-9ee7-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 14:57:28 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2173.outbound.protection.outlook.com [104.47.17.173]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-24-2icVSMssM52tsq2JsCrA7w-1; Tue, 08 Mar 2022 14:57:26 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VE1PR04MB7280.eurprd04.prod.outlook.com (2603:10a6:800:1af::22)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Tue, 8 Mar
 2022 13:57:26 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 13:57:26 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b0b87e26-9ee7-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646747848;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=Gsj0GdTmg6sgFVjdAQFdXEsNNGMhgFiJ0ezI5CqkqKs=;
	b=gLwmegwGg7+OkIZIGoKa2smBny58KrII0y7dChNZFC2GKxcIImiXzKpyhpabP20ZGRYiOj
	ccvU2SIUQ932Xugifal8MPASIKhTNB5Fvbb3tg5zB+2ygZ9emwEHYXNdumjZp8Bp8C33Vh
	zl7yJpjr/tzfEiHOm0vaUIybudG3Ek8=
X-MC-Unique: 2icVSMssM52tsq2JsCrA7w-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ZVGNlfoyYNfqpTH6oZ59sTbEEWueZBVTBcMqoRfKsrA29MH/WlYU+f3pkyotg23R5j+4Sb8zJuroubKpAx4j/mk/doexfTeZwF4Lf+Letl8+020TFB+jUiDMTsILEgeSP1+LboyJVospJejSa1mEsV4mCUGJZur96nc8cqgRIJFX6jMXNvl9psDmvTeWzawk7gxjLDIp7tg/mfgKaLoLTYJ0ay0ng08WSrXSJ0TOcW3gKIB5lkMsK+mcj9qZqHR4JxRhBihVx07Aoh7Hl0rSnT4c0SkiwP0955bbFdbXigQmI5th45U83N2JFvHigevXbtlTNaaXTu1PSAnZRugZJw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=vSI9UrZBmBOAA6xi6wEm0NjZrePa1wMp1SWayJ++2zM=;
 b=k+gzUDLRLvnf0gPiVF8O31wGWu/C5oNDn/56U111CiexZzp/UbLypZoB+Y2cDZpVblO/lkpX2SdsvcROgdFpzmr8IToLY+144l/UgJ39p6XYMycwcnnfD9PUb6acdhtMn3QIOZjyT5mQK5ILDVkjnyDOPuh4kSEA7d4WOzkpll86EUg4zXJAYNpQDvS/kNLmRSNSpDi3SfT/jlX8lLXfKjZuIGmfP68lAXUAtwWJv6M94wkMZGlwsGlv3OaRqAfjxV3l+Q0xV1i/X2YuNdaMVMKw7d3bOlrjISvZ8yolSSXq7dDuDAVWoSpPzsCO5f77pfspiUQOpDliCsp/qRo/WQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <c2e15d35-91b3-ba29-eed0-92fa19a692e8@suse.com>
Date: Tue, 8 Mar 2022 14:57:23 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v3 1/2] xen/build: put image header into a separate
 section
Content-Language: en-US
To: Roger Pau Monne <roger.pau@citrix.com>
CC: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
 <julien@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220308134924.83616-1-roger.pau@citrix.com>
 <20220308134924.83616-2-roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220308134924.83616-2-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS8P189CA0009.EURP189.PROD.OUTLOOK.COM
 (2603:10a6:20b:31f::19) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 6ce93bf5-d54c-498a-ae3a-08da010b939b
X-MS-TrafficTypeDiagnostic: VE1PR04MB7280:EE_
X-Microsoft-Antispam-PRVS:
	<VE1PR04MB7280B79D2F0E445D14A006B4B3099@VE1PR04MB7280.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66476007)(6666004)(53546011)(38100700002)(36756003)(83380400001)(2906002)(2616005)(186003)(26005)(66946007)(66556008)(6512007)(6506007)(508600001)(86362001)(4326008)(316002)(8676002)(54906003)(31686004)(6916009)(8936002)(6486002)(31696002)(5660300002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?uaVugTNCve3J2hZeDLkGS7V4b1csz2HYEJ9WOuBGlgvlpwPQpmIQUvByXcM8?=
 =?us-ascii?Q?4doedyCasclioAWWBw+CqkqYhsW6LoGmyuK7G+YFwRD1Yfut68srrGBtTN2L?=
 =?us-ascii?Q?PHmQMqNuV955BNNA+heocoS/dwaQ/siNTl7qfmFjjmuTdCzeeRZrond50zGO?=
 =?us-ascii?Q?gaSGZmKnuc/mTba21zA0BoIXwJnHAPcfwOsbsf/JM0dLD/4uzeLx2HDKK1hw?=
 =?us-ascii?Q?Iln0zaSUB9QsyH+CVzz3JMR63KSjzfl+msVBvtFfjKd0PfaW3p04dYr3xlBF?=
 =?us-ascii?Q?uNbXqts3L0XFSelRaUZ5jCBb91j5IEgdFb+9mT1LoaAGyIJ4k/cMOdeRXHxF?=
 =?us-ascii?Q?1Y1ARalL93IoWpPUiRDKTFLg4iF3zRvPI+KnqKYJEIQbCDGtGio/+61qrN7i?=
 =?us-ascii?Q?Tx8/bTRPtC9BhcHTEhyz+dy8CY9HHC7EFMaHgHVoy6fdtyB4K5chpsH79Own?=
 =?us-ascii?Q?0ViiLvonfln0g4dbgby+eUYQysUecMnv7pynGUh57213CRMyRhUw+oB9c3ST?=
 =?us-ascii?Q?oZ6jTMubUXyAvpgljHjgEOn67UZ2DAc9vAxa5PnhgSAeGReLyZfYgCsqZJVK?=
 =?us-ascii?Q?egxje4ns9hRwersyZwklvfELr6XyIcRqwc7wXuF9slu5cGUpnUGPXo887DSo?=
 =?us-ascii?Q?TNb3Em5PmhkBk37nyl+lQT77+LkBahp2q1+FPAt9TTGKeQKfohtNqhJWf2wm?=
 =?us-ascii?Q?rWZY4gaO9l+j3nnU9XXOLdqqmkW8e7Jgu4TZJOMHYx7fR/YknZNV4wmsCE9W?=
 =?us-ascii?Q?hEF8Uc982ZM3k+9vkPptIXuvFLwLKOVZs2PrAFErw7t034ZZzosDXpxtdWJ8?=
 =?us-ascii?Q?diSlXOPMHXP/p9KmIUISrHKFbGQBSCs7j0FES948o5sEzHjNn7ex3y1g+qDf?=
 =?us-ascii?Q?U6rbl3qnBo3TOeObIyPjQ0qTiBl6DP//KlkH8ebILftMBzCItXyC24zcEQlp?=
 =?us-ascii?Q?gInK2JhXUv3RMMVlkCOdQq1gVgWL2fiwWrFjIiB8Bb7dGD6pWk4OaV74ST+g?=
 =?us-ascii?Q?aMIy1aZFnfDEiVUX/iidFxZNzVXt+pLV0AcdlktJjV02HYZZ9R8bXqX8Uzk4?=
 =?us-ascii?Q?0WEbG+GKJCPm+M1HtqMuM0OrM/7sw5kj3LyXYF9K5E8BDdgUeb7ua2R1Wx2M?=
 =?us-ascii?Q?Ds2s31cQLr63gcv1zNNmsuZtr6+6cP4vHKzLOZeLsM/P8KtnlIyzJEEmpqd1?=
 =?us-ascii?Q?QLwyv8E11AWq2LEKwVSSlJ/gepaVtKTZC2STQ/Kcs42nQsD0XZus/PD8+N8d?=
 =?us-ascii?Q?Q8psO4qUv2Vene6Ve4IXkC0dE+R9xcxGjv6oaadzl97KRxETEXUuTn7UJJRg?=
 =?us-ascii?Q?/qBDxlEwy8KL7qwExGlSgJmjVj7plePv3CFZ4ScOjfRMh/zsOWdnES/y6Umo?=
 =?us-ascii?Q?Zz/NqliZKva7V2oMvf3Pvfru/8XDLID0XqHD/Bf3d86kv/miuZrojLPwJQwc?=
 =?us-ascii?Q?o/1w6rJjUDtd/K2HRfYNfpx9K6jsL+RY/07ul6IH8ib0gL0CLKcQFXsbzpQ0?=
 =?us-ascii?Q?rD43mod1fMqQwdpK2VB4vG5X5Eo5ZTv0zEGEdNigUyU3pP1DkpNwOt3cSo9w?=
 =?us-ascii?Q?sviveKxJw8Ibjm84LxRfM/hZVfrgIXOjrJVYOHjM63CQ9T116+dpPWdS34CS?=
 =?us-ascii?Q?xDsAUOA5tgYgk5iJgVCrO80=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6ce93bf5-d54c-498a-ae3a-08da010b939b
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 13:57:26.0005
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: ajUWq2rGDGZZ2sqdWAcNxt30m1D2tr5MiR7q/+m4W0W47jGFZ4ak/UxUx3ew84cWITRlWq79urbUmuLeb36xeQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR04MB7280

On 08.03.2022 14:49, Roger Pau Monne wrote:
> So it can be explicitly placed ahead of the rest of the .text content
> in the linker script (and thus the resulting image). This is a
> prerequisite for further work that will add a catch-all to the text
> section (.text.*).
>=20
> Note that placement of the sections inside of .text is also slightly
> adjusted to be more similar to the position found in the default GNU
> ld linker script.
>=20
> The special handling of the object file containing the header data as
> the first object file passed to the linker command line can also be
> removed.
>=20
> While there also remove the special handling of efi/ on x86. There's
> no need for the resulting object file to be passed in any special
> order to the linker.
>=20
> Signed-off-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>

Looks good to me, but I have one question before feeling ready to
offer R-b:

> @@ -86,8 +84,13 @@ SECTIONS
>         *(.text.kexec)          /* Page aligned in the object file. */
>         kexec_reloc_end =3D .;
> =20
> -       *(.text.cold)
> -       *(.text.unlikely)
> +       *(.text.cold .text.cold.*)
> +       *(.text.unlikely .text.*_unlikely .text.unlikely.*)

What generates .text.*_unlikely? And if anything really does, why
would .text.cold not have a similar equivalent?

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 13:58:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 13:58:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286936.486652 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaMM-0002x5-UJ; Tue, 08 Mar 2022 13:58:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286936.486652; Tue, 08 Mar 2022 13:58:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaMM-0002wy-RM; Tue, 08 Mar 2022 13:58:42 +0000
Received: by outflank-mailman (input) for mailman id 286936;
 Tue, 08 Mar 2022 13:58:41 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=yKud=TT=citrix.com=prvs=05922dae9=ross.lagerwall@srs-se1.protection.inumbo.net>)
 id 1nRaML-0002wq-Hf
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 13:58:41 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id dabbf8e2-9ee7-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 14:58:40 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: dabbf8e2-9ee7-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646747919;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-transfer-encoding:mime-version;
  bh=rt4cfDzFZOTotWlyXZ/PSOSbZJ7CHVK/cdU8lYt+EDk=;
  b=Rn9AupEEzG1kuWXaB5/jcnPOboOh8cQMe6h1z65F2E599AdRNR5KvMlv
   OLfYXtp90LpassrlzF1hAnNRs+JRopdO1hlQpJ2CMVIV1fMgAQQ2RdiTu
   kV64OfK80PYlTmJPg/e+nNo9OAO9cHGV58JwZbEhfLUvWYhHTmDlt4ml4
   0=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65184025
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:ygRppqALUGhFzBVW/x/jw5YqxClBgxIJ4kV8jS/XYbTApG4n0jNUy
 TcZUG2FaaqKZGXze90kPdm0pE9TvcDVzIQwQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vh0tYy6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhgx
 olqlbKSYjsDO73RuekNEFp9MCFhaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguw5K9LweocWtXx60jjdCd4tQIzZQrWM7thdtNs1rp4TRKaCP
 5BEAdZpRD+dXi1jO3EoM6kBhs2HiifmST4GhF3A8MLb5ECMlVcsgdABKuH9dtuHT8hRtk+dr
 3DB+SL1D3kyNsGbyDeD2mKhgKnIhyyTcJIfEvi0++BnhHWXx3cPE1sGWF2ju/67h0WiHdVFJ
 CQ8+S0ot6E+slOqStrVWAexq3qJ+BUbXrJt//YSsV/XjPCOukDAWzZCHmUphMEaWNEeVDJ28
 X+nvfjVLzl/rZyYWTHe05SUsmbnUcQKFlMqaSgBRAoDxtDspoAvkx7CJupe/L6JYs7dQm+pn
 W3TxMQqr/BK1JNQif3nlbzSq2/0/vD0ohgJChI7t45Pxidwf8abaoOh8jA3Bt4Qfd/CHjFtU
 JXp8vVyDdzi77nQzERho81XRdlFAspp1hWG2TaD+LF7q1yQF4aLJ9w43d2HDB4B3jw4UTHoe
 lTPngha+YVeOnCnBYcuPd7vVZt6kPO5RYm+PhwxUjaoSsIqHONg1HsyDXN8Iki3yBR8+U3BE
 c3znTmQ4YYyVv08kWveqxY12r433CEurV4/trigpylLJYG2PSbPIZ9caQPmRrlgsMus/VWEm
 /4CZpDi40gOD4XDjtz/rNd7waYidiNgW/gbaqV/K4a+H+aRMD15W6+Ln+J7INANcmY8vr6gw
 0xRk3RwkTLXrXbGNR+LejZkbrbuVox4tnU1IWonOlPA5pTpSd3HAHs3H3fvQYQayQ==
IronPort-HdrOrdr: A9a23:0ABvraup2mfrqcYLavuqsHBJ7skCI4Aji2hC6mlwRA09TyXGra
 +TdaUguSMc1gx9ZJh5o6H8BEGBKUmskKKdkrNhQYtKOzOW91dATbsSobcKpgePJ8SQzJ8l6U
 4NSdkcNDS0NykBsS+Y2nj3Lz9D+qj+zEnAv463pB0NLT2CKZsQlDuRYjzrSnGeLzM2YabRYa
 DsgPav0ADQHkj/AP7LZEUtbqzmnZnmhZjmaRkJC1oM8w+Vlw6l77b8Dlyxwgoeeykn+8ZizU
 H11yjCoomzufCyzRHRk0XJ6Y5NpdfnwtxfQOSRl8kuLCn2gArAXvUgZ1TChkF3nAic0idurD
 D+mWZlAy210QKXQoiBm2qu5+An6kdp15at8y7AvZKpm72HeNtzMbs+uWseSGqD16NohqAN7I
 tQw2yWu4BLAR73lDnh79LIUx1si3yvrWA5kegVuXxTOLFuGYN5vMgR+lhYH4wHGz+/4Ic7EP
 N2BMWZ//pOd0iGBkqp9VWH7ebcF0jbJC32CnTqe/blpwR+jTR81Q8V1cYflnAP+NY0TIRF/f
 3NNuBtmKtVRsEbYKphDKNZKPHHR1DlUFbJKiafMF7nHKYINzbErIP2+qw84KWvdIYTxJU/lZ
 zdWBdTtHI0eUjpFcqStac7uCzlUSG4R3Dg28te7592tvn1Q6fqKzSKTBQ0n86ps5wkc7vmsj
 aISeVr6tPYXBnT8Nxyrn7DsrFpWAwjbPE=
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="65184025"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=DR7sFJv24yNtktPfuvEazCO+rmEdsLV82qpb2tF+24ayxHQb4TRCAE5UMhQ4/1VUSnTK9hsiyttkj0sB4X+wiFsnqf6mPdMXnWI8Fo64u//pLb2jaH50Q3EUu5m2JdHrCWA9EWW0PHTF65b0uoO++YYl9+uY9F/rR2zyiGGfvKZXeEhM72BqlyslLUgYneKtKWyobFYkDcSqPJLq3SsTDK7KpT/L2UnvGnlrapnIkJbPgUiRRo17wYpqxnThK0bo3U0WCKKCULFZHG0wHlvtAB8LILXLr5vdzk+czfEfYufsFU7I6yB2N4RRM0NXFdw0tmnRFUHC6qCmekOW8DBMkw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=8RFB/hQOeq43eBGNj1oRyYEhU1QdoQPtPJmfJi5cujY=;
 b=UgDlvEg31PtmrrSAenUoo85q3EPETs7lxzcxieRR4JaNqKH1n1nt7T2Wt2172u33JM5QGZCBNmgKXuojEVFg0qsExE9EYxoI6uno8zGmoT1D6+2Mk++w525lmLafewH6veJXLW+fyYzOkc+konZxob2SECQmLl0hHDeZN45M0ZdbdIHOGOLBkXNPA4ugxdHxJsVwV66muyUEU7gyUZJt2swU8YClNOCBHLmrBwojKGci59tRfShQtfhm1OTdNmSKC4zKvMqwVV9FuPeV3MNqgo9x97Yh40IEPyj0eB342HJLoj7ozlWGnvrsbCJ4TIy7wiBsT6egmHYHCgCBp9kNOw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=8RFB/hQOeq43eBGNj1oRyYEhU1QdoQPtPJmfJi5cujY=;
 b=HbjwlGo3+fKxkFLhKDDcURX7IKvfQu7U0m5SIytr0qVdeHu0j8jIkO5CcYV+LWcrVtN+Tyc9XLjB7Bwp1AWRcKRHwpvRQRn3qwOWPsBQ7c6jQ4C1TSCMZbljT8mTvntiDiHaVsNzz8aTG7dFjvjJaiOMQNUxEHrW7rJaX1tUwSo=
From: Ross Lagerwall <ross.lagerwall@citrix.com>
To: Roger Pau Monne <roger.pau@citrix.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: "konrad.wilk@oracle.com" <konrad.wilk@oracle.com>, "doebel@amazon.de"
	<doebel@amazon.de>, "julien@xen.org" <julien@xen.org>, Andrew Cooper
	<Andrew.Cooper3@citrix.com>
Subject: Re: [PATCH 4/4] livepatch: differentiate between old and new build
 systems
Thread-Topic: [PATCH 4/4] livepatch: differentiate between old and new build
 systems
Thread-Index: AQHYLkHgkh5BrSNp6k2TMCqk/XJtv6y1jGEP
Date: Tue, 8 Mar 2022 13:58:35 +0000
Message-ID: <PH0PR03MB63828DD5A6099B904EAE92C5F0099@PH0PR03MB6382.namprd03.prod.outlook.com>
References: <20220302142711.38953-1-roger.pau@citrix.com>
 <20220302142711.38953-5-roger.pau@citrix.com>
In-Reply-To: <20220302142711.38953-5-roger.pau@citrix.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
suggested_attachment_session_id: a10ab13c-f866-b434-0101-d97a06c34bf6
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 6c788fe2-1184-40b7-44af-08da010bbd16
x-ms-traffictypediagnostic: DM4PR03MB6973:EE_
x-microsoft-antispam-prvs: <DM4PR03MB6973594AEB4E4DDD47160A4BF0099@DM4PR03MB6973.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PH0PR03MB6382.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(26005)(82960400001)(5660300002)(66446008)(66556008)(64756008)(186003)(38070700005)(107886003)(86362001)(83380400001)(2906002)(4326008)(8676002)(91956017)(76116006)(66476007)(71200400001)(66946007)(316002)(110136005)(9686003)(6506007)(53546011)(8936002)(54906003)(38100700002)(44832011)(52536014)(33656002)(122000001)(7696005)(508600001)(55016003);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?YremvfiWAqPJLxvUtQpsi9pnktr3ieHQodzzdsbb97jZzcL2tk4O8d6mqY?=
 =?iso-8859-1?Q?kplSG98fArNHJVx2y3y1Zy1jxSntywUwKGOWHnks9RYlTeY8J1PRpqn77t?=
 =?iso-8859-1?Q?Z0WFd5kcDUWYX3L4km6q/sNhi8jpf+ujYTO7hb9POrm8K2Gx99OXFevwY1?=
 =?iso-8859-1?Q?Qzd+FFOhns/2HsY7dEkBtK0H8WDO8+lHD5z3w4hsR6T1i7BnOktUZUGMJe?=
 =?iso-8859-1?Q?ZN3LnJUJcd8edbMrdmA21voVkXXVePQFGpfthZRMvFbMPtpcV56+PLEf9v?=
 =?iso-8859-1?Q?gvF90SKV5+LWOpuXJBai691EdvTnelYv8PsZ2davSDr4t+jACCzeqDUznh?=
 =?iso-8859-1?Q?TICbk/tnJvUV8FttV2ZGOFA0BzNMkNzXzqsKnkFUGsRo9MeqRLvaGROQyV?=
 =?iso-8859-1?Q?hhV4DfPvgMjOZkWACg2uAVF9h3EAVoLnvvTGsqzoBWLFdY3vhz89d65qET?=
 =?iso-8859-1?Q?ZPy0mtKzo8Dk16ujncWqc916GLhuizU1Rbv7WMGa6XRQDT+q32XS77DHIF?=
 =?iso-8859-1?Q?I6X1JTm7IVrDcRQs/Fcly3AogbVIz4ykGo5W9LcfpDteuc9202PFk2/I6P?=
 =?iso-8859-1?Q?aA98GDP6m0i28dpHbydRzNoqAOaWr2b8bWNmMQ5c/D1Y/WDgC/9kARrfta?=
 =?iso-8859-1?Q?x6Xa7Ohc4k7CRq1A8RDAcHB8bIGP50j40AItRSXulpQBPPX9JpWmkRvv/8?=
 =?iso-8859-1?Q?WueRf8qCiSWcDgqMCAzXM8/cgr/Rga4B4pwJIPdsNyTaFo6pOSYAiipL1c?=
 =?iso-8859-1?Q?qbBwjZfY+aLTtQdTNQVn/70kKeAxq4b2e0+tCOvxchjHOREo2/a6OHei5b?=
 =?iso-8859-1?Q?+5X0UAI1ZICoL4D5gQ/et7UeKmJ5DUDqlLFva7k6Sio7DF1ps9gPTUvmW0?=
 =?iso-8859-1?Q?VgGJN6vC8ea8WoDMvPiMhrCc+D5Sgu3aYSTB1nS9+gz6yGDQlH5yg0PgmI?=
 =?iso-8859-1?Q?5vpKjusVUl59Zq/o1ECdkGlA2tgCDIiIPkViq+619Po1lU12aSoYwnk9j1?=
 =?iso-8859-1?Q?/4qH20l+YWk6IdTus3+CEDPfWgyH4U9xm0G3yUdrwsE7YReynICPz+invq?=
 =?iso-8859-1?Q?aXw+e9woYVGgAGotDVqtXHWI+DXRkO92fGCIirVYWMrVbztX5dugiV5U9J?=
 =?iso-8859-1?Q?P6RDRUuK/wnZov+k0ZMsCVJg3PYd3TxBGvGLeOg+M0VzLEpSlVB3DlvHUs?=
 =?iso-8859-1?Q?LwM8577YhAVnJ1Xc16crf2RsLNPekfD12XqRqx+Fm+6w0h5o1NEsaoxoL8?=
 =?iso-8859-1?Q?E+BQGsIBl/YGBm0KM2mhMW6XyrUVLcrY+2ybVlxLkPU07ipk0VTXY64ZDU?=
 =?iso-8859-1?Q?zwj7tslVsvs8O0ozX43SX7HFTEaVG99YJ0I1yk5oNxuNYnRyyKk/T/xEqg?=
 =?iso-8859-1?Q?b6w52nb6mPKRNpshvcXb3Le+0N0C3cFLiU/BioRITGHgzFm0qNzuJR8gn+?=
 =?iso-8859-1?Q?aNktl2NkWo3F/2s6D4H5uyhObf9cR9Vly4rR/OSrHeTQrmtOPlsftmJVRu?=
 =?iso-8859-1?Q?v/TdY6IWruUcFZzhaXFTY+6OcEwOkBUvgDSdcDcoGnSS0q54GfOtym5YmF?=
 =?iso-8859-1?Q?8oK1PskdrGQ7ftuVhOwc/+vcYohTrlVMFa9OYe0Z0OuWQi6kllAATQrjnG?=
 =?iso-8859-1?Q?fQNvPPkMVVkjIg2eKg9soJb2fBCVa2iYtACeCUepow6r4F/bUk1PTeVtp9?=
 =?iso-8859-1?Q?Hxe6pZbZTbC4df+iXd7UIVzHR24RPP2nj4MZoYTs7QTVkrBxzb2GPWqu84?=
 =?iso-8859-1?Q?NkaA=3D=3D?=
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR03MB6382.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6c788fe2-1184-40b7-44af-08da010bbd16
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Mar 2022 13:58:35.3874
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 1aqgXYhiYPz1jCDrYxVIlauz+vQoqbrZ2zazBw2AgQe4Dbo2vQeDaRFSPCadSOS7fL4JB0TRlLOu/OLx4NweYshvJce2zWMERnVa68XvnJ0=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR03MB6973
X-OriginatorOrg: citrix.com

> From: Roger Pau Monne <roger.pau@citrix.com>=0A=
> Sent: Wednesday, March 2, 2022 2:27 PM=0A=
> To: xen-devel@lists.xenproject.org <xen-devel@lists.xenproject.org>=0A=
> Cc: Ross Lagerwall <ross.lagerwall@citrix.com>; konrad.wilk@oracle.com <k=
onrad.wilk@oracle.com>; doebel@amazon.de <doebel@amazon.de>; julien@xen.org=
 <julien@xen.org>; Andrew Cooper <Andrew.Cooper3@citrix.com>; Roger Pau Mon=
ne <roger.pau@citrix.com>=0A=
> Subject: [PATCH 4/4] livepatch: differentiate between old and new build s=
ystems =0A=
>  =0A=
> Do not attempt to modify the build system if CFLAGS are not set in=0A=
> Rules.mk, and instead rely on CONFIG_LIVEPATCH already setting=0A=
> -f{function,data}-sections.=0A=
> =0A=
> Signed-off-by: Roger Pau Monn=E9 <roger.pau@citrix.com>=0A=
> ---=0A=
> This depends on getting the patch to add -f{function,data}-sections=0A=
> when using CONFIG_LIVEPATCH accepted.=0A=
> ---=0A=
>  livepatch-build | 22 ++++++++++++++--------=0A=
>  1 file changed, 14 insertions(+), 8 deletions(-)=0A=
> =0A=
> diff --git a/livepatch-build b/livepatch-build=0A=
> index 38a92be..656cdac 100755=0A=
> --- a/livepatch-build=0A=
> +++ b/livepatch-build=0A=
> @@ -98,14 +98,20 @@ function build_special()=0A=
>  =0A=
>      # Build with special GCC flags=0A=
>      cd "${SRCDIR}/xen" || die=0A=
> -    sed -i 's/CFLAGS +=3D -nostdinc/CFLAGS +=3D -nostdinc -ffunction-sec=
tions -fdata-sections/' Rules.mk=0A=
> -    cp -p arch/x86/Makefile arch/x86/Makefile.bak=0A=
> -    sed -i 's/--section-alignment=3D0x200000/--section-alignment=3D0x100=
0/' arch/x86/Makefile=0A=
> -    # Restore timestamps to prevent spurious rebuilding=0A=
> -    touch --reference=3Darch/x86/Makefile.bak arch/x86/Makefile=0A=
> -    make "-j$CPUS" $XEN_DEBUG &> "${OUTPUT}/build_${name}_compile.log" |=
| die=0A=
> -    sed -i 's/CFLAGS +=3D -nostdinc -ffunction-sections -fdata-sections/=
CFLAGS +=3D -nostdinc/' Rules.mk=0A=
> -    mv -f arch/x86/Makefile.bak arch/x86/Makefile=0A=
> +    if grep -q 'nostdinc' Rules.mk; then=0A=
> +         # Support for old build system, attempt to set -f{function,data=
}-sections and rebuild=0A=
> +        sed -i 's/CFLAGS +=3D -nostdinc/CFLAGS +=3D -nostdinc -ffunction=
-sections -fdata-sections/' Rules.mk=0A=
> +        cp -p arch/x86/Makefile arch/x86/Makefile.bak=0A=
> +        sed -i 's/--section-alignment=3D0x200000/--section-alignment=3D0=
x1000/' arch/x86/Makefile=0A=
> +        # Restore timestamps to prevent spurious rebuilding=0A=
> +        touch --reference=3Darch/x86/Makefile.bak arch/x86/Makefile=0A=
> +        make "-j$CPUS" $XEN_DEBUG &> "${OUTPUT}/build_${name}_compile.lo=
g" || die=0A=
> +        sed -i 's/CFLAGS +=3D -nostdinc -ffunction-sections -fdata-secti=
ons/CFLAGS +=3D -nostdinc/' Rules.mk=0A=
> +        mv -f arch/x86/Makefile.bak arch/x86/Makefile=0A=
> +    else=0A=
> +        # -f{function,data}-sections set by CONFIG_LIVEPATCH=0A=
> +        make "-j$CPUS" $XEN_DEBUG &> "${OUTPUT}/build_${name}_compile.lo=
g" || die=0A=
> +    fi=0A=
>  =0A=
>      unset LIVEPATCH_BUILD_DIR=0A=
>      unset LIVEPATCH_CAPTURE_DIR=0A=
> -- =0A=
> 2.34.1=0A=
=0A=
Reviewed-by: Ross Lagerwall <ross.lagerwall@citrix.com>=


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 14:02:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 14:02:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286944.486664 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaPa-0004Wa-Dk; Tue, 08 Mar 2022 14:02:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286944.486664; Tue, 08 Mar 2022 14:02:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaPa-0004WT-AF; Tue, 08 Mar 2022 14:02:02 +0000
Received: by outflank-mailman (input) for mailman id 286944;
 Tue, 08 Mar 2022 14:02:00 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LykH=TT=citrix.com=prvs=059d7c239=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nRaPY-0004W4-Ch
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 14:02:00 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 51028d95-9ee8-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 15:01:58 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 51028d95-9ee8-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646748119;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=58u414P6xR5hJNvUdcKD4U/dpwXfBAfsKY6bVSqnPnE=;
  b=K2n6vAoZhZwb6lh5cEnHNnq4IVzPsjLfAlFH16vpsEXVULjH98P4jNnY
   OgZ1N94I+r5rVIPifI0NSav5SrYf/Xueajx3sc0/4nu/hkElshny0P0bl
   /fVvSIMbYmcLCtmFNTp4YZOjTxF3KrhfGyvIDZoNWyyCrBvfknQ9/36oZ
   8=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 66105469
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:IwBB96rExgM8arH0zo4ZIsHuZ5deBmIrZRIvgKrLsJaIsI4StFCzt
 garIBmHPf2JZTOmftt2PIq2/E8FusfSxtQ2TFY5rC4zFCIb8JuZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 YOq+aUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBGb3FpcA5QkBkPGImH7Qf87LaE36mmJnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVI5DfVF/s5B7vERL3H/4Rw1zYsnMFeW/3ZY
 qL1bBIxMk2YPkERaz/7Dro6jsmTpkj2KgRz6xGY+YRnvlTc0S5Yhe2F3N39JYXRGJQ9clyjj
 m7B8m70BjkTMdWNzjzD/n/ErurMgAvyXYsAE7v++vMCqFiLwWwXARYVfVK+qOu+jAiyVrp3O
 0ESvyYjs6U23EiqVcXmGQ21pmaeuRwRUMYWFPc1gCmv4KfJ5weSBkAfUyVMLtchsaceWjgCx
 lKP2dTzClRSXKa9ECzHsO3O9HXrZHZTfTRqiTI4oRUtxMnqnaUXn0vzYZU7MrfshdDoKzfp6
 mXfxMQhvIk7gckO3qS92FnIhTOwu5TEJjIIChXrsnGNtV0gOtP8D2C8wR2CtKsbct7FJrWUl
 CVcw6CjAPYy4YZhfcBnaMEEB/mX6vmMK1UwanY/TsB6p1xBF5NOFL28AQ2Sxm80aq7omhezO
 Sc/XD+9ArcJZBNGioctP+qM5zwCl/SIKDgcfqm8giBySpZwbhSb2ypleFSd2Wvg+GB1z/1hZ
 8jLLJ31XStBYUiC8NZQb71GuVPM7npirV4/uLihl0j3uVZgTCT9pUg53KumMblisfLsTPT9+
 NdDLcqaoyizo8WlChQ7BbU7dAhQRVBiXMieg5UOKoarf1o3cEl8WqS56e5wJORYc1F9y76gE
 oeVARQDljISRBTvdG23V5yUQO+3DcYl8yNhZnBE0JTB8yFLXLtDJZw3L/MfFYTLPsQ/pRKoZ
 5Hpo/m9P8k=
IronPort-HdrOrdr: A9a23:ITb3X6MyuyoQj8BcThijsMiBIKoaSvp037By7TEJdfRUGvb4qy
 ncpoVi6faUskdsZJhOo6HkBEDtexzhHNtOkO8s1NSZLXbbUQmTXeVfBOLZqlWKcUCTygce79
 YGT0EUMr3N5C1B/KTHCX6DYrUdKbe8npxAzt2utEuFBTsaEZ2JYm1Ce3im+2NNNXR7OaY=
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="66105469"
From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Jan Beulich
	<JBeulich@suse.com>, =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?=
	<roger.pau@citrix.com>, Wei Liu <wl@xen.org>, Bjoern Doebel
	<doebel@amazon.de>, Michael Kurth <mku@amazon.de>, Martin Pohlack
	<mpohlack@amazon.de>
Subject: [PATCH] x86/cet: Use dedicated NOP4 for cf_clobber
Date: Tue, 8 Mar 2022 14:01:26 +0000
Message-ID: <20220308140126.8815-1-andrew.cooper3@citrix.com>
X-Mailer: git-send-email 2.11.0
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

For livepatching, we need to look at a potentially clobbered function and
determine whether it used to have an ENDBR64 instruction.

Use a non-default 4-byte P6 long nop, not emitted by toolchains, and introduce
the was_endbr64() predicate.

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
---
CC: Jan Beulich <JBeulich@suse.com>
CC: Roger Pau Monné <roger.pau@citrix.com>
CC: Wei Liu <wl@xen.org>
CC: Bjoern Doebel <doebel@amazon.de>
CC: Michael Kurth <mku@amazon.de>
CC: Martin Pohlack <mpohlack@amazon.de>

Bjoern: For the livepatching code, I think you want:

  if ( is_endbr64(...) || was_endbr64(...) )
      needed += ENDBR64_LEN;
---
 xen/arch/x86/alternative.c       | 10 +++++++++-
 xen/arch/x86/include/asm/endbr.h | 12 ++++++++++++
 2 files changed, 21 insertions(+), 1 deletion(-)

diff --git a/xen/arch/x86/alternative.c b/xen/arch/x86/alternative.c
index d41eeef1bcaf..ffb1b1d960c8 100644
--- a/xen/arch/x86/alternative.c
+++ b/xen/arch/x86/alternative.c
@@ -362,7 +362,15 @@ static void init_or_livepatch _apply_alternatives(struct alt_instr *start,
             if ( !is_kernel_text(ptr) || !is_endbr64(ptr) )
                 continue;
 
-            add_nops(ptr, ENDBR64_LEN);
+            /*
+             * Can't use add_nops() here.  ENDBR64_POISON is specifically
+             * different to NOP4 so it can be spotted after the fact.
+             *
+             * All CET-capable hardware uses P6 NOPS (no need to plumb through
+             * ideal_nops), and doesn't require a branch to synchronise the
+             * instruction stream.
+             */
+            memcpy(ptr, ENDBR64_POISON, ENDBR64_LEN);
             clobbered++;
         }
 
diff --git a/xen/arch/x86/include/asm/endbr.h b/xen/arch/x86/include/asm/endbr.h
index 6090afeb0bd8..5e1e55cb467d 100644
--- a/xen/arch/x86/include/asm/endbr.h
+++ b/xen/arch/x86/include/asm/endbr.h
@@ -52,4 +52,16 @@ static inline void place_endbr64(void *ptr)
     *(uint32_t *)ptr = gen_endbr64();
 }
 
+/*
+ * After clobbering ENDBR64, we may need to confirm that the site used to
+ * contain an ENDBR64 instruction.  Use an encoding which isn't the default
+ * P6_NOP4.
+ */
+#define ENDBR64_POISON "\x66\x0f\x1f\x00" /* osp nopl (%rax) */
+
+static inline bool was_endbr64(const void *ptr)
+{
+    return *(const uint32_t *)ptr == 0x001f0f66;
+}
+
 #endif /* XEN_ASM_ENDBR_H */
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 14:08:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 14:08:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286951.486675 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaVJ-0005LZ-3s; Tue, 08 Mar 2022 14:07:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286951.486675; Tue, 08 Mar 2022 14:07:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaVI-0005LS-Vj; Tue, 08 Mar 2022 14:07:56 +0000
Received: by outflank-mailman (input) for mailman id 286951;
 Tue, 08 Mar 2022 14:07:56 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fWwI=TT=citrix.com=prvs=059ab6e88=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRaVI-0005LM-8c
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 14:07:56 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 24248233-9ee9-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 15:07:53 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 24248233-9ee9-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646748473;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=AHtsnI9q4MbTl8xVo9WoHiFYPnI0pHMqFop8RM2nF44=;
  b=AD9jDq09QEiKGM+36E9eTR4p7OfxA0qHNG4aWfgVMQLveTL8FyhvfKUW
   kxT68x//ee3A2S5qwsmpi8xO73lWydktW761LZ9z4qD1Vc7gu/MP3e84D
   Nu7wCA58k4eWwfbBiriR29QxjXTW7loi7Oo0Rbla688WXQXWUAJMc7+3A
   k=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65714627
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:5nrITatTFm8SdjZIDA7DF6Q/uufnVEBeMUV32f8akzHdYApBsoF/q
 tZmKTjSPvbeY2D1LY1xaYyy80sOvpCHndJjGgNr+HhjHnwQ+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jV6
 YuoyyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi8GAe7xvrU+CyUBOHB5PpBA0ZngK1aw5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AO
 pVANWQ1M3wsZTVdAWgcOL4Snt3wm1+vaQxVjgOej6A4tj27IAtZj+G2bYu9lsaxbdpRtlaVo
 CTB5WuRKgEXMpmTxCSI9lqoh/TThmXrVYQKDrq6+/V2xlqJyQQ7ChcbSF+6qvmRkVOlVpRUL
 El8x8Y1hfFsrgrxFIC7BkDm5i7f1vIBZzZOO8IFqzyrm4mM31+yV28HczhoTvssmsBjEFTGy
 WS1t9/uADVutpicRnSc6qqYoFuOBMQFEYMRTXRaFFVYurEPtKl210uSFYg7TMZZm/WoQWmY/
 tyckMQpa1z/Z+Yv3r7zw13IiinESnPhHl9svVW/so5IA2pEiG+Zi26AtACzARVodt/xory9U
 J4swZD2AAcmV83lqcB1aL9RdIxFHt7cWNEmvXZhHoM66xOm8GO5cIZb7VlWfRk1bJhbKWKyO
 R+O4mu9AaO/2lPwNsebhKrrV6wXIVXIT4y5Bpg4kPIUCnSOSON31H43PhPBt4wcuEMtjbs+K
 f+mnTWEVh4n5VBc5GPuHY81iOZzrghnnD+7bc2rnnyPjOvFDFbIGOhtDbd7Rr1ghE9yiF6Oq
 Ig32grj40g3bdASlQGLqd5Ddw5bdyNnbX00wuQOHtO+zsNdMDhJI9fawK87epwjmKJQl+zS+
 Wq6VFMew1367UAr4y3UApy/QNsDhapCkE8=
IronPort-HdrOrdr: A9a23:2Uog96iyDOA87oTSs5fPSoHbY3BQXt4ji2hC6mlwRA09TyX+rb
 HIoB17726RtN91YhodcL+7VJVoLUmyyXcX2+ks1NWZMjUO0VHAROsO0WKI+VzdMhy72ulB1b
 pxN4hSYeeAaGSSVPyKgzVQxexQouW6zA==
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="65714627"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=LuHSQbZw1NDYjhWhM3FF4KhyKa/FePhS+bom7Z33orUks6b5quar2atLILYUd01e/exo+SW7B4ZPpfB2o/TSQz+tsH/bFEXGyQiPBj6mrIIuxVbpde/+ZYYYybWWr+rfCNs/mSVV0zsabkufzD5je6ShnkgZnq9T26z2Qxj5A/LmidtzbxYYCtBBAPoFYyH7veAcZM3wRYZ00OWmrc4tHHDu3Gbtso5hFaEBhHe1n1MToY7DHM6PJx925AyJoDPjDasngeFiQmyQwYQxFDdyg+hLrzCzMYBkhk7Cwekm1U2oHKWaEbiS2etakn+VWF4t+4EkOjhp5vQLX+ytl9z1RA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=sjaZHswrTyR4+kwDwtyQgFJTnNDjhsCfHY4wRa/Q9NA=;
 b=Sy5FbSfnichY+H59Si5yxygIQra9RAhch7RnoNV/8n/lbT/bnTEAyBqspPezpUMBHeuAlQ6NvxJLmCZQzp6br6LpJGOdsibC2HBI03t/6uVDvuQKl6KF9V6tE9e0doAUeCtqFChz1oJfuQuWNWFMYmHmJo5NHUqwVM+TsaJLSfNIWU0qz6kbOMze6BrE6SGl9Z/Rw3ogVnR10DYquQ0lzfMmroL4hvp1v5GWaxZTH53SERv/qNyecisagPuJREozH2VbNoCdX/+uWz7t+5MLSWlxxCi8AzAuTi5TAChW6k2yepw8R/5tTT694SZnWh/zr8Lfbpi/U9Gxv8EgmaoaJA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=sjaZHswrTyR4+kwDwtyQgFJTnNDjhsCfHY4wRa/Q9NA=;
 b=sfQNB62f99SqAVmI5oXNJ1r8sKu3CQIwgjTMTe0qI+8556ODYJs4sC2fZ/S3vAcsMsRcg2zHHcuBGKJFZd4jtrfzxSHTt0WIhfle0ZRNuzhZzkQwA+vbuPRCzRnPI9BkOq+zX8PPGorb8kdBNzXqRSSwCqt7+pGlJxQEv6CnCSc=
Date: Tue, 8 Mar 2022 15:07:40 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Andrew
 Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH v2] x86/build: use --orphan-handling linker option if
 available
Message-ID: <YidjLL7xiBxUNtWx@Air-de-Roger>
References: <289684f6-fa73-bf02-137c-680ad8891640@suse.com>
 <YicsK8xqdcGZYaIn@Air-de-Roger>
 <0cde8972-b357-e2c0-ccc4-a0720cfb3501@suse.com>
 <YidH9La8I4X+M2S5@Air-de-Roger>
 <90124755-cd69-6352-e75f-80a1e53c93e8@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <90124755-cd69-6352-e75f-80a1e53c93e8@suse.com>
X-ClientProxiedBy: LO4P123CA0423.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:18b::14) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f0638a66-d435-41a2-4796-08da010d05c5
X-MS-TrafficTypeDiagnostic: BYAPR03MB4853:EE_
X-Microsoft-Antispam-PRVS: <BYAPR03MB48536022783E70DB489A67A58F099@BYAPR03MB4853.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(82960400001)(4326008)(8936002)(508600001)(6486002)(83380400001)(2906002)(86362001)(66946007)(66556008)(66476007)(6916009)(5660300002)(316002)(8676002)(54906003)(85182001)(6666004)(9686003)(6512007)(6506007)(33716001)(53546011)(186003)(26005)(38100700002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?d2NFWXdSVE82ZmVSelRCNyt1dkhFTU1nTlJmcTMzRHBwd3NFRDV0dEF1MFM1?=
 =?utf-8?B?MTFON2NPcDM0ZWdWL2RBNjdTN3dNdE55QWpFbExYbzVNZVRnRGhreWpKNVVP?=
 =?utf-8?B?ck5oSXNZZTJTZmJnc2wzQTlaS2lWWlU1ZlBXaXpSQjk5ZUNiU0ZBU2hkM25j?=
 =?utf-8?B?Mm1rUFJtZEZsNUJvQ0d2U00xeUU0R2t5ei9HamIyWXdtL1FOMVlmU1kzdjFU?=
 =?utf-8?B?MDVZTHFZckQ4U21TR3I4NzhWZkNGakZwRjNZanQ4V2dvdUhkUngrVmhLc3JE?=
 =?utf-8?B?Q3dOZ0lxbDFoZlJNb0s3cFl3SFliWmtERUV1M0U5RVJ6VmRhSTNvVWdRc1pl?=
 =?utf-8?B?Mklpd2J3V3BVRVdXZnU4TnRXbXFDRXBRQk5YRjdyTDREU01DeWZTdXlOd24z?=
 =?utf-8?B?RTBCUFFVYkVnR2wyZUFPOHhYSklqaDduU1R4TUI1NDd2SUZobjF4ZjdmQWdU?=
 =?utf-8?B?SGJMRzd3M1Jta2dLbyszbitSMjdvQlNXcjBiaWNrQXhFcUcycmpjMGRTbXZy?=
 =?utf-8?B?bjZad3JqSlBlQnE3Q0E5ZmhpNE9vdDVSbUFxeUoyZ3hxM3FiVmZSNkFYVllq?=
 =?utf-8?B?V0dXQzRYMmg2MTBQd0xuajhVa2NRdmdxUUpDcC9jZW95SFd1K255clF5a1R6?=
 =?utf-8?B?b0YyQkU0MFRGRGd1ejFTL3JpaGNjcGRvdXJVNVNTUWJEdzE2S3lYeU9EOWVV?=
 =?utf-8?B?cDRqVHN1OUFSWWkwK2EraldMbTRqZVA0YjlPa2FnYXNqcGk1NlF3QjhtamQz?=
 =?utf-8?B?NUtQaVFoa3NFY2hycTNKVFdCUEZEOTBhRzNObmhNK3pnMUVqUjZKOGlIZTQ2?=
 =?utf-8?B?N1k2UlJ2eGEyeEloNEpubzNFWFVjcFcxRm9USnltQXl5Rm15WkdMMHFoM2Z2?=
 =?utf-8?B?QlE0MFBWOWFKMGpJMWpkNTczNFpvYlN5WXhPZ1pMQ0RvV0NqMzBvMnBXR240?=
 =?utf-8?B?OVVVOUR3T1lVNzdLUENvVWtVUTZTTHZ5VFRwTjJxaVhJMjFQUi9zcVlTUDRI?=
 =?utf-8?B?dnI0VjJOZS9neHNYRU1abTYvdVZ0c1ZHcGNrTGxYQUN0blNMWlp2MHFqV3R5?=
 =?utf-8?B?RVZOc2p2M2VoOE50czg1VjNUci8yOXFvMDlSZmpRcFBDZ0NIU0JaMFB3MG50?=
 =?utf-8?B?dklVZi9WM1ZrRzJNUXhZSzh0WDhGMVNZU3NGb1R2d0lBb1paaGYwRFZGeXl1?=
 =?utf-8?B?YU0wMlNFdng5NlhTRGU5OTVpd0Q1cFZhKzhIWnVQbVBPYnJLTk1aeTNhWjBj?=
 =?utf-8?B?ZklvaExrTWc4ZFljeHA1bE4wMTZXNklhWVJWenhzNGtDNUhSRGZyYVhRZ2lH?=
 =?utf-8?B?MzZxK2syVHliMXZhT3Q2T0JZNVFNNEVWZG1qS3h0VWR0elpmV3J1OERlb3lm?=
 =?utf-8?B?SkdYYlk1UjV4aUMyTXRwanpKVXhvL2IxNVM5L3F4N0pYWDFFVWoyRG5Yc3FW?=
 =?utf-8?B?bUlBbTA0TzJRbDRHNkdiNU9Gb1pqenZEQUxteU9MaG5tQUE4VHdsMnBkK0lI?=
 =?utf-8?B?d0JRMWxVQTBtVlMvTWhaMEV2M1VsSGVIMHV4UVFMeHJuMlBxbEpVSC9xanpZ?=
 =?utf-8?B?VWxOdFJWQjZMa2xMaG9xU2REaVBmSW56cEUyN0RaaTRncXA2MXllVnhCNnJ0?=
 =?utf-8?B?ajI1aW14VS80Zm9lcG9tK083VEVpbEgvQWhNN05LWHJkOFo1cUtaclVDUnZB?=
 =?utf-8?B?THZCaThyYW9TMm9TK3N3ZDU1WkJac1hFeTRuMnMwc1hKQ1lrTHpsbVFvbU9V?=
 =?utf-8?B?SEl4LzRheWZTSHFadXVmUUI5eitSZXhLbXdVWHdQd2J3c281Q1BLcEV5cUth?=
 =?utf-8?B?M2ljdjdUODRxbnd6NUhoOHYvUUt4S2JvQ3hDT1g2RnU0VEt3T01vSnk3QTBT?=
 =?utf-8?B?ZGhHRi9WbkVQdGRJMWt0RHZzZkd4eHB2SEh1VzBOcEdVcmRiM3BGeTZHU1Jz?=
 =?utf-8?B?dFhPV0dkcnRuSGtPNzVOOHppTGRBTzB4ZHR3Q0EzUC8vcXluRzlWU2RscmUx?=
 =?utf-8?B?VGVMZlVLSTJpc04vbjNIMnRPdWlXbDlRUnI0NmZnMngzK0tvbjZ5bmVIYW1k?=
 =?utf-8?B?NkEwL05Tc1VnUmtzMXFQaDFJVURoNGkxc2t4WHd5UFZPdzBtbjZHSXlCTVNl?=
 =?utf-8?B?VjBJb2FZbWcwRm54SXhvN3ArYzNLd1MrREh1VEhIbS85VDlldFdPRFl3NXMw?=
 =?utf-8?Q?+3FRwVGCNN3xVth+QnMedQU=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: f0638a66-d435-41a2-4796-08da010d05c5
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 14:07:47.0770
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: uPWbPpjgSPRLuj3f7ISw5xV6oPY56XX8PF/qmMDU/rwvVoTbGBjEgTChB9oZZGHbw5idAWc6pP2+cqGW4HizpA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB4853
X-OriginatorOrg: citrix.com

On Tue, Mar 08, 2022 at 01:34:06PM +0100, Jan Beulich wrote:
> On 08.03.2022 13:11, Roger Pau Monné wrote:
> > On Tue, Mar 08, 2022 at 12:15:04PM +0100, Jan Beulich wrote:
> >> On 08.03.2022 11:12, Roger Pau Monné wrote:
> >>> On Mon, Mar 07, 2022 at 02:53:32PM +0100, Jan Beulich wrote:
> >>>> @@ -179,6 +188,13 @@ SECTIONS
> >>>>  #endif
> >>>>  #endif
> >>>>  
> >>>> +#ifndef EFI
> >>>> +  /* Retain these just for the purpose of possible analysis tools. */
> >>>> +  DECL_SECTION(.note) {
> >>>> +       *(.note.*)
> >>>> +  } PHDR(note) PHDR(text)
> >>>
> >>> Wouldn't it be enough to place it in the note program header?
> >>>
> >>> The buildid note is already placed in .rodata, so any remaining notes
> >>> don't need to be in a LOAD section?
> >>
> >> All the notes will be covered by the NOTE phdr. I had this much later
> >> in the script originally, but then the NOTE phdr covered large parts of
> >> .init.*. Clearly that yields invalid notes, which analysis (or simple
> >> dumping) tools wouldn't be happy about. We might be able to add 2nd
> >> NOTE phdr, but mkelf32 assumes exactly 2 phdrs if it finds more than
> >> one, so changes there would likely be needed then (which I'd like to
> >> avoid for the moment). I'm also not sure in how far tools can be
> >> expected to look for multiple NOTE phdrs ...
> > 
> > But if we are adding a .note section now we might as well merge it
> > with .note.gnu.build-id:
> > 
> >   DECL_SECTION(.note) {
> >        __note_gnu_build_id_start = .;
> >        *(.note.gnu.build-id)
> >        __note_gnu_build_id_end = .;
> >        *(.note.*)
> >   } PHDR(note) PHDR(text)
> > 
> > And drop the .note.Xen section?
> 
> In an ideal world we likely could, yes. But do we know for sure that
> nothing recognizes the Xen notes by section name?

Wouldn't that be wrong? In the elfnotes.h file it's clearly specified
that Xen notes live in a PT_NOTE program header and have 'Xen' in the
name field. There's no requirement of them being in any specific
section.

> .note.gnu.build-id
> cannot be folded in any event - see the rule for generating note.o,
> to be used by xen.efi linking in certain cases.

Right, so we need to keep the .note.gnu.build-id section, but we could
likely fold .note.Xen into .note I think?

Or at least add a comment to mention that we don't want to fold
.note.Xen into .note in case there are tools that search for specific
Xen notes to be contained in .note.Xen.

> >>>> +#endif
> >>>> +
> >>>>    _erodata = .;
> >>>>  
> >>>>    . = ALIGN(SECTION_ALIGN);
> >>>> @@ -266,6 +282,32 @@ SECTIONS
> >>>>         __ctors_end = .;
> >>>>    } PHDR(text)
> >>>>  
> >>>> +#ifndef EFI
> >>>> +  /*
> >>>> +   * With --orphan-sections=warn (or =error) we need to handle certain linker
> >>>> +   * generated sections. These are all expected to be empty; respective
> >>>> +   * ASSERT()s can be found towards the end of this file.
> >>>> +   */
> >>>> +  DECL_SECTION(.got) {
> >>>> +       *(.got)
> >>>> +  } PHDR(text)
> >>>> +  DECL_SECTION(.got.plt) {
> >>>> +       *(.got.plt)
> >>>> +  } PHDR(text)
> >>>> +  DECL_SECTION(.igot.plt) {
> >>>> +       *(.igot.plt)
> >>>> +  } PHDR(text)
> >>>> +  DECL_SECTION(.iplt) {
> >>>> +       *(.iplt)
> >>>> +  } PHDR(text)
> >>>> +  DECL_SECTION(.plt) {
> >>>> +       *(.plt)
> >>>> +  } PHDR(text)
> >>>> +  DECL_SECTION(.rela) {
> >>>> +       *(.rela.*)
> >>>> +  } PHDR(text)
> >>>
> >>> Why do you need to explicitly place those in the text program header?
> >>
> >> I guess that's largely for consistency with all other directives. With the
> >> assertions that these need to be empty, we might get away without, as long
> >> as no linker would decide to set up another zero-size phdr for them.
> > 
> > We already set the debug sections to not be part of any program header
> > and seem to get away with it. I'm not sure how different the sections
> > handled below would be, linkers might indeed want to place them
> > regardless?
> 
> Simply because I don't know I'd like to be on the safe side. Debug sections
> can't really be taken as reference: At least GNU ld heavily special-cases
> them anyway.
> 
> > If so it might be good to add a comment that while those should be
> > empty (and thus don't end up in any program header) we assign them to
> > the text one in order to avoid the linker from creating a new program
> > header for them.
> 
> I'll add a sentence to the comment I'm already adding here.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 14:09:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 14:09:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286958.486686 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaWi-0005zB-Gx; Tue, 08 Mar 2022 14:09:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286958.486686; Tue, 08 Mar 2022 14:09:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaWi-0005z4-Dw; Tue, 08 Mar 2022 14:09:24 +0000
Received: by outflank-mailman (input) for mailman id 286958;
 Tue, 08 Mar 2022 14:09:23 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRaWh-0005yw-Ky
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 14:09:23 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 5a7826f2-9ee9-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 15:09:22 +0100 (CET)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04lp2053.outbound.protection.outlook.com [104.47.12.53]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-13-TBtekXNhMkKR5xkGE_ocWA-1; Tue, 08 Mar 2022 15:09:21 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM9PR04MB7587.eurprd04.prod.outlook.com (2603:10a6:20b:2d4::10)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Tue, 8 Mar
 2022 14:09:20 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 14:09:19 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5a7826f2-9ee9-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646748562;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=wqFpwMVaaHtBwxpxlT9zCnEHC4fQwNDo09WF5geo22A=;
	b=ZM+WIbaMvUZEC3UJvifcgpOp5UoLumial1H+rftz1nK+bDeuRkDxLH3bY/2YvRAb3W4TSB
	fZBWXSBBH7P1PBYEB73/XvXxgoC0quRaKgjl1uC0w2lX8WJU3NlLqzvIbFbxJh3it5ZA/l
	/qiT0ewvwnQty5RQXoBDFtcptJAxf64=
X-MC-Unique: TBtekXNhMkKR5xkGE_ocWA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=RH5VwSsqtXpEGZSHRhaE0zxf07333Ue6SPgpmyuWT/PwxhgCX3LJUSSE84Drhc5VIUPO3+NL5ySWJmt6REjE7AHrKzfF4eV9E6XnDeTtzF6kzn6MW+ckjdO1EwC5vBUqY20uiejxFVkcCmPg/DzFtQDySn5RaIs8fwvzX2DdEdPHRXB546iqoV3DUwEgDEIxO2SpnvG9Ebx2xczrBbKKEjEZxQHJ5nQE4qFvsMx7iMf6tPnPzCtlvQ4XRv+jPQGH4cl45vP1ZFGtaxOZKNoXu4l6M2VVD5YnbNe+Nz8WyfrNa8GI8luLjoVxfA6y+sX2eZXnSGIcZ6Mkl+Ysl/qEkQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=JK7dYbPoaOvY2W2fPUp4TZDuAmm380qLNAj/t/k07nE=;
 b=JA8PgQ7LuyRnpf3ctu2Xb/8FaIdAKAufJ8fUGc9anLMIixmMxfgpZTYwNEx/lPVYwbiGjaJcRx2t1TDC5AGP97brhE+hrXUHe2qd8oGYt+Ltgth/Z8Qx6tNUNhI2k2JvauMR4Cs11qOyMos40+M6+LwfzNIcBDpM9sRRBR8CveOoudbC8aBvsUbKobo8Cuto88FXFjop7RWzuDLH79UXyy9moXMOYZ4Z2+WnGzPuKoMQb1mjQ+RfQNzP5UsUVFvkFCucWFHXrZV9KoyNYFuYLwVBKDExfk2gLHyljkUpg5YZEw3CoxsGZYvc+xoLGHuIcO1ZwWXRoceGZVFSMyBZGQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <c35415ef-b3c1-cc1c-2fb2-aa2de2602cd5@suse.com>
Date: Tue, 8 Mar 2022 15:09:17 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v3 2/2] livepatch: set -f{function,data}-sections compiler
 option
Content-Language: en-US
To: Roger Pau Monne <roger.pau@citrix.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 xen-devel@lists.xenproject.org
References: <20220308134924.83616-1-roger.pau@citrix.com>
 <20220308134924.83616-3-roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220308134924.83616-3-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM5PR0502CA0004.eurprd05.prod.outlook.com
 (2603:10a6:203:91::14) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2253cdf9-e251-4ec9-bf2b-08da010d3d1c
X-MS-TrafficTypeDiagnostic: AM9PR04MB7587:EE_
X-Microsoft-Antispam-PRVS:
	<AM9PR04MB758752693A3ED0A07B93EF79B3099@AM9PR04MB7587.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(36756003)(5660300002)(31686004)(2616005)(508600001)(8936002)(53546011)(38100700002)(83380400001)(6506007)(54906003)(6916009)(8676002)(26005)(86362001)(31696002)(4326008)(6486002)(186003)(2906002)(66476007)(66946007)(6512007)(66556008)(316002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?jYbH0P59h8uumF7QgLTttIpkwwE/I/VAfJf3JNRgwYZEO9hqtfDGli857etV?=
 =?us-ascii?Q?yv6pPk4bKRYjX/QmjDRJ5+1K+BZe/TwF+BQyg7J13mO95d3xRZxCZSsf0pc7?=
 =?us-ascii?Q?Hme0jXVrpFKL6Tv8IiFyQpSnNGhkcn1hf7uHnM+OtNJuJySd0fDUUMaMzezJ?=
 =?us-ascii?Q?H8GjrtWAXQbc3SnRblDaIo4xVyTxoAWV9UKm3StJMxvScn7DjF7YMPPjmw/S?=
 =?us-ascii?Q?SXsmwRo1iLTFiFKRg/FYjJQXYj/9++b4tUka1ST0yiA0RNGMVr4+TRcOTZog?=
 =?us-ascii?Q?guJUCGQ4D1HfQZAFRFesGK8mLri63mDdxKgwOnzN7HOlFNSALd1htHAxd6ii?=
 =?us-ascii?Q?Gs4VvgzEIFupbIABbw/fPmJUGkYFXgdBjDzKL3C3RD6I42hZaUmvaE3ThqNq?=
 =?us-ascii?Q?aurPHQKtm5KHLs+35NA1WOxBO/M77wAAZVb38428K9DHOAsk5eG+G1AXYrg+?=
 =?us-ascii?Q?w8dqWMSWcGaTawWgpP7M0hIORYZBKWHsFtKHP0POPhXcy24lB+S+VSUGnhT6?=
 =?us-ascii?Q?Hb0xr/x0utr4ovYakVUbVeO1FM3e+vfyyIXDdAVKjvXl80SrNH9VH5U92D0o?=
 =?us-ascii?Q?AL6pU63rJ0aPpN5yWASBd0TT82CrQS+pJF/UehY7NhLEwEMTJMrFr7h2uneh?=
 =?us-ascii?Q?/8HEE/a7qyed91g7hkXOy7sk05Bp9UeZcZYe5SSlLA29l83ruz3oY+DJ7PvJ?=
 =?us-ascii?Q?UczvoS0KtoJMxtIKFNjkWEOZh3WIkemReWmoDJyA4DJA3+/dix7XTeWLjdiR?=
 =?us-ascii?Q?5lq60gp0qLDnjqLBSHxBaHoUS927p6aHJ8DWRRv8eYynC0xFrY4ooVPX7R9Q?=
 =?us-ascii?Q?8hBxjDWsV9fDp2hH2bMMiIWBRy8psx7hSEkNgsPxZ+3lLu8Ia8tGxLnY4PBe?=
 =?us-ascii?Q?IXwqU1wqyNFfMvy1JMxW1EofSet76eXfrdCBP3imRaKunhPObjdFB0xoCpDw?=
 =?us-ascii?Q?JDEpuVlF/hpR2qyQHfRn81IchM+IY+5ddG8YemTbGwF/N20gCeREBcE8cBPn?=
 =?us-ascii?Q?SRZIMlTD56UYyvUisLn8TeYd/lQ0Ta9QX7eTa0CklftvP51HZhhOYX99Jm7j?=
 =?us-ascii?Q?vr7/G6MyaiQPfYXndKyytSjIyVe1wr4cJvAE3eXCqZya1l3tb1bn5mP1hHJI?=
 =?us-ascii?Q?Z1sNQx8pfrUUY18gwa5zp3m4Gg3dfNCmGccWXsZr0cq04QoEd7e6n3v4TovJ?=
 =?us-ascii?Q?JbjC5qATOZfLJPTmMztIoT50gnAX4qbl6aRBfrDLruZE7Djsro9naIW0RRYT?=
 =?us-ascii?Q?AylQnAPcjNO04HDNR0vswK9InWPylEoqo3uFSFwEvnRfmnY1aArym45+asTV?=
 =?us-ascii?Q?9KnIqe2rpXd8Eajgst28/SE6kreM/cHX0VttcvdSvxK/FQamxF4k0Uw5JLtv?=
 =?us-ascii?Q?fY7GJySNWTpnP2HqTXv0WY2+nJvQ7/mogvLxtGrdJ16LYHZzTNMzVhAP4mZs?=
 =?us-ascii?Q?WFOLu0dfRAnA/Lze89QvKrs0YPZcVU8te3tDsuMYO4gcSkqiT+2x9KbOFnK4?=
 =?us-ascii?Q?8/G5u/FWkESyB06HdwmeUVdVbWWdt6l8Jy/uhupDjfpD5iNINTULWT4Pk1YC?=
 =?us-ascii?Q?KeUP/w+LqMVoo5EJM45iFXbXnr1MUf6ayexM3+JTj7K0rtzGRBReM4iu93AM?=
 =?us-ascii?Q?gFL3odG+IRemW2Wk9thniFc=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 2253cdf9-e251-4ec9-bf2b-08da010d3d1c
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 14:09:19.8780
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: uPgY6UiUbCzjTbZuBPSexHQUAiwJTHGTHO2rhIxPxi08sl2tE0ypVQ9CLQg6eT3fR4hkAD7a3f9u/rwFW4mtoQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR04MB7587

On 08.03.2022 14:49, Roger Pau Monne wrote:
> If livepatching support is enabled build the hypervisor with
> -f{function,data}-sections compiler options, which is required by the
> livepatching tools to detect changes and create livepatches.
>=20
> This shouldn't result in any functional change on the hypervisor
> binary image, but does however require some changes in the linker
> script in order to handle that each function and data item will now be
> placed into its own section in object files. As a result add catch-all
> for .text, .data and .bss in order to merge each individual item
> section into the final image.
>=20
> The main difference will be that .text.startup will end up being part
> of .text rather than .init, and thus won't be freed. .text.exit will
> also be part of .text rather than dropped. Overall this could make the
> image bigger, and package some .text code in a sub-optimal way.
>=20
> On Arm the .data.read_mostly needs to be moved ahead of the .data
> section like it's already done on x86, so the .data.* catch-all
> doesn't also include .data.read_mostly. The alignment of
> .data.read_mostly also needs to be set to PAGE_SIZE so it doesn't end
> up being placed at the tail of a read-only page from the previous
> section. While there move the alignment of the .data section ahead of
> the section declaration, like it's done for other sections.
>=20
> The benefit of having CONFIG_LIVEPATCH enable those compiler option
> is that the livepatch build tools no longer need to fiddle with the
> build system in order to enable them. Note the current livepatch tools
> are broken after the recent build changes due to the way they
> attempt to set  -f{function,data}-sections.
>=20
> Signed-off-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>

Reviewed-by: Jan Beulich <jbeulich@suse.com>

> --- a/xen/arch/x86/xen.lds.S
> +++ b/xen/arch/x86/xen.lds.S
> @@ -88,6 +88,9 @@ SECTIONS
>         *(.text.unlikely .text.*_unlikely .text.unlikely.*)
> =20
>         *(.text)
> +#ifdef CONFIG_CC_SPLIT_SECTIONS
> +       *(.text.*)
> +#endif
>         *(.text.__x86_indirect_thunk_*)
>         *(.text.page_aligned)

These last two now will not have any effect anymore when
CC_SPLIT_SECTIONS=3Dy. This may have undesirable effects on the
overall size when there is more than one object with a
.text.page_aligned contribution. In .data ...

> @@ -292,9 +295,7 @@ SECTIONS
> =20
>    DECL_SECTION(.data) {
>         *(.data.page_aligned)
> -       *(.data)
> -       *(.data.rel)
> -       *(.data.rel.*)
> +       *(.data .data.*)
>    } PHDR(text)

... this continues to be named first. I wonder whether we wouldn't
want to use SORT_BY_ALIGNMENT (if available) instead in both places.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 14:11:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 14:11:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286966.486697 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaYp-0007NN-Uk; Tue, 08 Mar 2022 14:11:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286966.486697; Tue, 08 Mar 2022 14:11:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaYp-0007NG-RH; Tue, 08 Mar 2022 14:11:35 +0000
Received: by outflank-mailman (input) for mailman id 286966;
 Tue, 08 Mar 2022 14:11:34 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LykH=TT=citrix.com=prvs=059d7c239=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nRaYo-0007NA-Hj
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 14:11:34 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a7530351-9ee9-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 15:11:33 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a7530351-9ee9-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646748692;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=aKETpxFH8LdGlgVFAiFjlAYzztfO/P4BKRnLtagc4Wg=;
  b=GQfXS+YUtnlTfB32nkjuuq0DbALdwMKbxvRHhiq4QRmAPJlGT9cH7wIT
   OwRpKVUTBcE+Ojy2/3BxUg3FxqY1B1K7LXqhNUJ7rybmYM9gyf3tubh+d
   H0dcUHmzf1wvL/zBNecPV1BW2G7KMUN2xGNDZdXZkQD/6ihKpkXhxF4hI
   E=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65639381
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:L7gPHKgNfVcbbU11FgdlvatIX161kxAKZh0ujC45NGQN5FlHY01je
 htvCGuCb/nfMDPzfNB1Ydy39kgEu8fdmNQwHAFq/HpkEn4b9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFvd4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YV07Z62Qt8s8bxsbMHFTbY9m/pXbMEHq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bklhmwSvUErANRpfbTr+RzdRZwC0xloZFGvO2i
 88xN2cxN0WbM0Qn1lE/DbthlsSRnmLFemdSrmyso/EmoHCN01kkuFTqGIWMIYHbLSlPpW6mo
 WbB83X8EwstHtWVwjqY8VqhnubK2yj8Xeo6Fre16/pri1273XEIBVsdUl7Tiea9ol6zXZRYM
 UN80iAjt7Qo/UqnCNz0RQSloWWstwQZHdFXFoUS+AyLj6bZ/QudLmwFVSJaLswrstcsQj4n3
 UPPmMnmbRR0q6GcQ3+Z8raSrBuxNDITIGtEYjULJSMH/t3irYcbnh/JCNF5H8aIYsbdQG+qh
 WrQ9W5n2utV3ZVjO7iHEU7v2SD1psTmYS8J5Eb0Dk/1zCN/TpK0Xtn9gbTE1spoIIGcR1iHm
 XELncmC8ewDZa2weDyxrPYlR+/wuavcWNHIqRs2RsR6qWzxk5K2Vd0IuFlDyFFV3tHokNMDS
 Gvaoktv6ZBaJxNGhocnMtvqW6zGIUUNfOkJt8w4jPITOvCdlyfdpUmCgHJ8OUi3yCDAdollZ
 f+mnT6EVypyNEie5GPeqx0h+bEq3Dsi4mjYWIr2yR+quZLHOiLLF+hVbQDXPr1ihE9hnOkz2
 4wEXydt408DONASnwGNqdJDRbz0BSJT6W/KRzx/KbfYf1sO9JAJAP7N27IxE7GJbIwO/tokC
 kqVAxcCoHKm3CWvAVzTNhhLNeO+Nb4i/ClTFXF9Yj6VN40LPN/HAFE3LMBsI9HKNYVLkJZJc
 hXyU5nYUqQVFGWdoGh1gFuUhNUKSSlHTDmmZkKNSDM+Y4RhV0rO/NrldRHo7y4AEmy8ss5Wn
 lFq/l2zrUYrL+i6MPvrVQ==
IronPort-HdrOrdr: A9a23:M9Wc9qFzZ4O/NAY7pLqFRpHXdLJyesId70hD6qkvc3Nom52j+/
 xGws536fatskdtZJkh8erwXZVp2RvnhNFICPoqTMuftW7dySWVxeBZnMffKljbdREWmdQtrJ
 uIH5IOa+EYSGIK9/oSgzPIUurIouP3iJxA7N22pxwGLGFXguNbnnxE426gYxZLrWJ9dP4E/e
 +nl6x6Tk2bCBMqh6qAdxs4dtmGg+eOuIPtYBYACRJiwhKJlymU5LnzFAXd9gsCUhtUqI1SsV
 Ttokjc3OGOovu7whjT2yv49JJNgubszdNFGYilltUVEDPxkQylDb4RGIFq/QpF4t1H2mxa1O
 UkkC1QePibLEmhOF1dlCGdnjUIFgxeskMKh2Xo2UcL6vaJOw7SQ/Ax+76xNCGpsXbI9esMoJ
 6ilQiixutqJAKFkyLn69fSURZ20kKyvHo5iOYWy2dSSI0EddZq3MciFW5uYd499RjBmcga+S
 hVfbXhzecTdUnfY2HSv2FpztDpVnMvHg2eSkxHvsCOyTBZkH1w0kNdnaUk7zo93YN4T4MB6/
 XPM6xumr0LRsgKbbhlDONERcesEGTCTR/FLWrXK1X6E6MMPW7LtvfMkf8IzfDvfIZNwIo5mZ
 zHXl8dvWkue1j2AcnLx5FP+gClehTKYd0s8LAo23FUgMyPeFOwC1zxdLkHqbrUn8ki
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="65639381"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=EIKNne3sdQDzw+Z2pRzpZOhjhPnZNh1DcKZIcw8R7oQseGf76cxid6iHEjimRBlFS0WmdE8iaaazuWS22li5FYDPMEtQQZqNhktOk06piu7h2HQvNzgAP/tLBvw77ZrODonosvmSQSNplDg+BZBeOkpZxrvuKlApHW/2EaYCefez6k2j6q6dVQsR9FsMUZkdsbU3i+Urx2uzN4m44DAnUSK/Iv16AFpRzJZ2ADyg52ijimlUTASfFUWK6RM+dy9IYeZoxywHnM4mYwPscgkXV1IHQRCEec8YwhjYef0A148tI7rpM2RUCRc+dnFgpiBbcE7tEN0otZHOB1UATPqYnw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=aKETpxFH8LdGlgVFAiFjlAYzztfO/P4BKRnLtagc4Wg=;
 b=Qwr4pBKw3ZyBUw8FZt8kkA4THM/+Ao+WtWQx9MudOmwPDHm32tR72DENqPL5X22oUwY4axLJJhh7aNa5S5MnIxvmKFLPSNe1sfaBjq2ZTYai3AEl5X2jfPA/fZxcH2LCC/QnGa+UztT080Qo27FQYLSayvVGE2OzZNNakkjEhfEX2xhRg+t/SkxOk++P0WPUgSuO0piHeVVfyxX0azeArKzUWY5cXbDsZEPM6zHFv0ufrIiqb5COpxC9oHPlX/BJCY07bLeT47v+3hx1eAsRnNI4AmQ7NhWMPugJFXs2+DU8mfgdX11sXuYkgUNQSAuAMh8Zw8rhAXuPI02iE0IB/g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=aKETpxFH8LdGlgVFAiFjlAYzztfO/P4BKRnLtagc4Wg=;
 b=ayt53CpVOwdeamo5tY3yX8m9WlZ5mz8HDx4+bQqSrKgyJ+XS/L6v8lc862RcYGPKpW5XNLnfTqyq6frspdtg3ia06T+zH2mDSPjPGpp8LDwcDPygyBC/rpRsShXkeMWBlq6TRA3hbFOTTI9IdlfmXdFHuJdsRcxDJiehJN0Qsy0=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Roger Pau Monne <roger.pau@citrix.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
	<julien@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>, "Volodymyr
 Babchuk" <Volodymyr_Babchuk@epam.com>, Jan Beulich <jbeulich@suse.com>, "Wei
 Liu" <wl@xen.org>
Subject: Re: [PATCH v3 1/2] xen/build: put image header into a separate
 section
Thread-Topic: [PATCH v3 1/2] xen/build: put image header into a separate
 section
Thread-Index: AQHYMvNuZ1BxBquPPEGLviSvK+ljSKy1huaA
Date: Tue, 8 Mar 2022 14:11:28 +0000
Message-ID: <3d08555a-2ee2-53be-d495-d3aaa6ec661e@citrix.com>
References: <20220308134924.83616-1-roger.pau@citrix.com>
 <20220308134924.83616-2-roger.pau@citrix.com>
In-Reply-To: <20220308134924.83616-2-roger.pau@citrix.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 51f4f5cc-cd89-42f3-bda0-08da010d89b7
x-ms-traffictypediagnostic: BN9PR03MB6073:EE_
x-microsoft-antispam-prvs: <BN9PR03MB6073FDE1EF74B4D23BA28376BA099@BN9PR03MB6073.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(31696002)(316002)(6506007)(86362001)(508600001)(36756003)(186003)(26005)(6512007)(31686004)(2616005)(66556008)(82960400001)(6486002)(91956017)(4326008)(66946007)(76116006)(66446008)(66476007)(38100700002)(64756008)(8676002)(2906002)(110136005)(38070700005)(8936002)(5660300002)(122000001)(54906003)(71200400001)(4744005)(53546011)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?cEFQRXBoaEZrNUxEZXJ2THNFeHJCUE5wNUoxOEUyTWJzNEd0THYvaGZJTmV6?=
 =?utf-8?B?dGdqVmg0ZEJIRWlSc1A2a0FuM1ZvZ3RFNlRZOS9JY2JQNTQzRVFvZWkyVWFz?=
 =?utf-8?B?RnhrZDl0WUtaZXNmRGNSYU1qdlUyWWFxZGpxTHB3ak9QeE5QVE94blBNRFVo?=
 =?utf-8?B?dGNSRDYwcGlKbkhydGI1Um1kcnpmbmQzYzJCS1VLMnRnc2JyOVBwMFdvQ1R3?=
 =?utf-8?B?SWVDLzQzbDNkQmJhdnRTZGNJbmc4SE5Fa3djcis2anpPWmtFc2RBaE1HV05D?=
 =?utf-8?B?K2poNUVLeUJreWlpL1h4UTRVakRjMWlxNFlhV2F4L3ZaQ0R5L0ZDTGNUOVdl?=
 =?utf-8?B?d1NkNGhZYjM4N3VsOCtZUGd6clJpY0phbjFpaDBkU0FWUVBOeGk0NVc4ejNF?=
 =?utf-8?B?YS9hVzFJZ2xsazlTc1orT1RkNGp6M25JbTdSOHhXb2E0NlJJY3k0RmxjUmZP?=
 =?utf-8?B?K0hidWtJSGFDM1JwcDV3Z2p6L2dmSGVQTUczTWFVZkUvdEwzcnplZnlrQ3hQ?=
 =?utf-8?B?Qy9SbnVWaEprRDQzQTVIekc2ODkweHo2TkRTRVU5bDZyVGZEQnFrRk1iSHpT?=
 =?utf-8?B?WDErZS9LVnNUdENDbVZ6TGVKdmU4OU1pYWMzOVI1MmZ6ZTFVNTJXd0czdVpQ?=
 =?utf-8?B?RnNxRjRUV0Z6MUtVNTEya2NzMUxBd3JreDdJcGxvSDVnRUVLbi9MQ3BKT2h4?=
 =?utf-8?B?cThCSFRlZHpIb3BnWHdJU3RFU005RFErUUc3QWdWNVNpcmswR1VFdUFUMlpZ?=
 =?utf-8?B?SmRrUnMxU2FqUUdmTldUMUlEZEc0M3BKdDFpYzVNeitUMmNST1JJSlM0eE5R?=
 =?utf-8?B?cG5Xc2ZHdjdET0JTenhXbEJCUVF5bldyYnpyWGc3MFg0M1BsTDRyQi9pQWFV?=
 =?utf-8?B?OXVFcUpqZjc0QTdHZWtYSUhDN3ZOUURDcDBCV0orcHR3dy9VYWx0NGN0R3kr?=
 =?utf-8?B?cHJEcWJUQmVZVi9sVFlpZXROd244UXF4aEQ3dVk0T1ZlNjQ5QktpOTlDaTRW?=
 =?utf-8?B?Z3RicllORlVOdmNqZGpoUUhibXZ3VWZOYXR2TlVHdjBBZGR2UXR2dU5jdXRl?=
 =?utf-8?B?VU9WRUxGQWVuQkw5OVZpd05IK2dBY3lxdTQ0SWNpcDVUZzcxWisxWC9ZcXgx?=
 =?utf-8?B?T0dTYS9RZktxbXZuaytyWUI5T09yVmFCYy9Sb2NqUmIzeHA3SE5QU0hzeTQz?=
 =?utf-8?B?dzRqOVZtY3UwMm9rd3UxRGZYd1VUOEttN1JLNCs3ay90OHJzNitUZHZBaEdS?=
 =?utf-8?B?eENWUi9XOXl2aFlrQzA0VFR0OGxsemNMWjlBSmVMZzRrNkFTRXp0VnJXU295?=
 =?utf-8?B?dFVpakVNaENGSXZjTVpPVnhqbXVRWkRiYlB5Zm9iWFVQUFhQdlRFVVdYQVQ0?=
 =?utf-8?B?ZVUwT2dwWWtIbmFUWmwyTml2V2lSdVpRb3ZQM2RIN00yUldxK0Z1UTR4b3Bt?=
 =?utf-8?B?cHJxOUV0THZHV2kwMlVrNHI1dlV5TytrZnFwNTIyemc5azF2MER1WE9tdmNU?=
 =?utf-8?B?N09STUlDSENvTk1LbytpSGJzckY5K2VGOUZCUjBvcGNYTFpOMUswY2tqUlp4?=
 =?utf-8?B?QTJYOHZJS3lENlpCc0R5SGRJODAvQ2IwbnZtenVjRDRkSU4xZWZTbEs3OGg1?=
 =?utf-8?B?V09BcThWTnZwVE80V0huZUs1SDBpYjJ4amZ3UE50TE5iZm9hdzF6d291V2ph?=
 =?utf-8?B?WTI3RFdrMmtQNDNvbFJxZm5VaTFvd2cyZG9zZW5icEZBWGNya3JqVW5BTkpL?=
 =?utf-8?B?cmZUc3hGRDMwdnd2T0JDd2xIWDQ2SGRiYnVjWmRoUTFGSUttbUF4ejdkT2lp?=
 =?utf-8?B?d05wRUtJUVpydVEwUmpHWExrbEp0b2pDVGdZRHUxZDlHV3c1MUtDcWkzRHVk?=
 =?utf-8?B?Mm9jcThmSXBLTXl6QVhQMjIwRkR4encvWWRtREpyRE9YOVAzNjB6Ym1CWmF6?=
 =?utf-8?B?WVplRkw3ajNRd0VwbUdDamIzbEZFRnBYQUgzUEhDc2lzQ0VIS2hTTndMU0dm?=
 =?utf-8?B?UWtJRE1CVUh0bDNKblExazdKMGY2eWQ2UkFSVWptMEd4eHh2QkZQalZ5VUQz?=
 =?utf-8?B?SHFzaE4vbDB1L1p1SVNudTdsZWhudlRuVVRGUHliNFY5T01kandPUUNzdmg2?=
 =?utf-8?B?NWZIOVlXTWw2VklWSm9lR3lEbEdXVUZGclBYTS8vZDc3b1lQMmkvRlY5NzVZ?=
 =?utf-8?B?a1J1L1JpcmR0SGxDV1dnTHZXT1hLcE9vSGJaWnVXQUdZTlFJYllpV3pCQUJO?=
 =?utf-8?B?dEp4UU92a0cxbTJQTlR2ZC83UG53PT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <CF712488C7E18A438CE4285AA422E835@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 51f4f5cc-cd89-42f3-bda0-08da010d89b7
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Mar 2022 14:11:28.1819
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Wnh1Xo4p4gZxwnSiW/gwIMVbl84cVepGA6RML5TVzLeE5d0+dIW9BaDLA7nUDpBo1bc8y/kSquprhiBJGyUWy1g4XLSygziHsLZyYHD0liU=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN9PR03MB6073
X-OriginatorOrg: citrix.com

T24gMDgvMDMvMjAyMiAxMzo0OSwgUm9nZXIgUGF1IE1vbm5lIHdyb3RlOg0KPiBkaWZmIC0tZ2l0
IGEveGVuL2FyY2gvYXJtL3hlbi5sZHMuUyBiL3hlbi9hcmNoL2FybS94ZW4ubGRzLlMNCj4gaW5k
ZXggMDgwMTY5NDhhYi4uNDdkMDlkNmNmMSAxMDA2NDQNCj4gLS0tIGEveGVuL2FyY2gvYXJtL3hl
bi5sZHMuUw0KPiArKysgYi94ZW4vYXJjaC9hcm0veGVuLmxkcy5TDQo+IEBAIC0zMCw5ICszMCwx
MyBAQCBTRUNUSU9OUw0KPiAgICBfc3RhcnQgPSAuOw0KPiAgICAudGV4dCA6IHsNCj4gICAgICAg
ICAgX3N0ZXh0ID0gLjsgICAgICAgICAgICAvKiBUZXh0IHNlY3Rpb24gKi8NCj4gKyAgICAgICAq
KC50ZXh0LmhlYWRlcikNCj4gKw0KPiArICAgICAgICooLnRleHQuY29sZCAudGV4dC5jb2xkLiop
DQo+ICsgICAgICAgKigudGV4dC51bmxpa2VseSAudGV4dC4qX3VubGlrZWx5IC50ZXh0LnVubGlr
ZWx5LiopDQo+ICsNCj4gICAgICAgICAqKC50ZXh0KQ0KPiAtICAgICAgICooLnRleHQuY29sZCkN
Cj4gLSAgICAgICAqKC50ZXh0LnVubGlrZWx5KQ0KPiArDQoNCk1vc3Qgb2YgdGhpcyBodW5rIHdh
bnRzIHRvIG1vdmUgaW50byBwYXRjaCAyLsKgIFBhdGNoIDEgc2hvdWxkIG9ubHkNCmludHJvZHVj
ZSAudGV4dC5oZWFkZXIuDQoNClNhbWUgZm9yIHg4Ni7CoCBDYW4gZml4IG9uIGNvbW1pdC4NCg0K
fkFuZHJldw0K


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 14:12:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 14:12:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286971.486708 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaaA-0007xS-9Q; Tue, 08 Mar 2022 14:12:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286971.486708; Tue, 08 Mar 2022 14:12:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRaaA-0007xL-6U; Tue, 08 Mar 2022 14:12:58 +0000
Received: by outflank-mailman (input) for mailman id 286971;
 Tue, 08 Mar 2022 14:12:56 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRaa8-0007xF-7t
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 14:12:56 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d92d91c2-9ee9-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 15:12:55 +0100 (CET)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04lp2058.outbound.protection.outlook.com [104.47.12.58]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-13-abiwVkvDNriLScoFT7xFqA-1; Tue, 08 Mar 2022 15:12:54 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DU2PR04MB8518.eurprd04.prod.outlook.com (2603:10a6:10:2d1::5) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Tue, 8 Mar
 2022 14:12:53 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 14:12:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d92d91c2-9ee9-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646748774;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=binHjUhMGNEw7NbqaJSal3Fyb8A5DoXGMU2cUeK2T/Q=;
	b=SMuA1hp9y5lzAAFEbZH/3vCtHG8W2uLcynlvIlCsvV7qf+bUKJG/3DWewMjwrMBu1oYCBh
	eCoEZ2dm8CcnNrf49zK1Ix53i+d/rGytp+bjciQiCU+SO0vCChWygRUlzsYcSPJDQx2S8w
	DCI3Oj81QH6inChLOGKg2aHusXx8cCA=
X-MC-Unique: abiwVkvDNriLScoFT7xFqA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=A9S3e4mV/PsLOdyE+71c6fH/F8IlB0bO8uGlwVJWvU6+zBgzUVHNceqZ+EFUyCWgtO5198BRkDMQj0oeb41FJEK1IKUY6+FjtUhgn+fm4K64ueuJ5C2jOxIrMhYPMenf8owFxYicGv8YS8/cKa238vc9AnZXaiVfhSdhfn0CYtbOfLnDdT2aVJuL2rOfcqVFli6iJMY61af/2S6uybyf/XD19qdxsPXjeUv1bE4RQe/SppIlDvU437wXcqv+RPSPL1Rt2b4EADohOfiM9ZSqIMjIQ3rTl07g9ep87/Ne6k6VY4GeFedkjcwFxEsXwPJ8AtkEnUDNXmkrBVtI0kleRg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=T2y8xxcOSPcKDydZaw+1PgpNc6QcandMyY0+iEtAYbI=;
 b=ogO10mR+3UTaZDTawDMgbT+LhkBeBgSBVTpUZkKej4GU5ZWMZiiYaiG8kLZcaEpWXTGIYpkUkIqI9pUcz9O3lvos4kP/CjL1WH/yc4f36tht/LRkyxzcF+UV2av23bEp/eG7IiFahiNXO0FyxPwbrbmh5of8vNQTZ2b31AY+wlgPuM9zQEvEDn2vPGKhnAZhqpIrYPemz2d2uWgwNDv/4b5Bw+B2qoJ33LUS19uTHGv/bQpFolYN7tdrf/rcMqdejE4OZ4/46fhatdpv54k12PQJuI7BOtkx7ay2L7RecXzcsLbHEnN6t8rsuwUEnGp4143yF4TsbIod2JM27cW2ZA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <cd3725d6-a155-f706-3dc2-a1dedb483cfc@suse.com>
Date: Tue, 8 Mar 2022 15:12:50 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v2] x86/build: use --orphan-handling linker option if
 available
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
References: <289684f6-fa73-bf02-137c-680ad8891640@suse.com>
 <YicsK8xqdcGZYaIn@Air-de-Roger>
 <0cde8972-b357-e2c0-ccc4-a0720cfb3501@suse.com>
 <YidH9La8I4X+M2S5@Air-de-Roger>
 <90124755-cd69-6352-e75f-80a1e53c93e8@suse.com>
 <YidjLL7xiBxUNtWx@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YidjLL7xiBxUNtWx@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR06CA0329.eurprd06.prod.outlook.com
 (2603:10a6:20b:45b::35) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: fc1ec6aa-9853-48a9-4321-08da010dbbff
X-MS-TrafficTypeDiagnostic: DU2PR04MB8518:EE_
X-Microsoft-Antispam-PRVS:
	<DU2PR04MB8518BCDB3261CFFB7773E006B3099@DU2PR04MB8518.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(8676002)(508600001)(53546011)(6512007)(6506007)(4326008)(6916009)(31696002)(316002)(86362001)(66946007)(66476007)(66556008)(6486002)(54906003)(38100700002)(26005)(186003)(2616005)(36756003)(5660300002)(2906002)(8936002)(31686004)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?+hHngSkbfTo0qn3fFPUXR+/S66PLNfBMDMRqEvAQxarOZ8ICOw2n8R1DZbdG?=
 =?us-ascii?Q?RlRIxrXtS0DNgFHj3utPoHoEMsI7qsfPUF8yff7ABqT7/9B2EC/jEeerfjI0?=
 =?us-ascii?Q?ZDiANT2NVunm69iWUA5IGJVtio6sUU1EC2/KexmiDMxUtz+7nFWcA/ntZKWX?=
 =?us-ascii?Q?6XExbX/x64pB60d18Y7/ljNacDXIxSB6sboBCB5HSqfQZLtxKsxF/IWcjL6B?=
 =?us-ascii?Q?E9QY84W8Tyg7ITVy1/jp/dORcFIVwq17tzE5Mme86I6p6E4FuQ1CsOC1hpjo?=
 =?us-ascii?Q?Nft7gwku0N4Gtd/aK0kY+zYaJPjTtNiH/iO+RrgB2M3xWqy9gh6apjb+P0Yz?=
 =?us-ascii?Q?pJaRShdT/pPGPOpicXgljCN1Tsu0QLjgvTjcKsOGjDissvckVAVLwyf5Y9DT?=
 =?us-ascii?Q?5V/fd1GIWkHx31Kj/00XuaY2A8M1wJ64vw1C8fWy60Ivy38rOQFLDM6pM3m0?=
 =?us-ascii?Q?k5l3ILA/kpSZec60iHfmT9om4xAFN7dH/S0WVYhZQdPg5TVWaRf/MdEnEHGg?=
 =?us-ascii?Q?ZDebcyxXRj4Lou7yIXPjb3/uURCbPdiJf183RPGQvtAiFLFRKZZLiwjAiTfS?=
 =?us-ascii?Q?8MLaVmYPKc0DCOothsYbgwSKMDgd9Izc44cAepcfXo50KGqbHmmptjAoM7vM?=
 =?us-ascii?Q?zVeXtaeFuVqabszy7b/GKqabzSOQn4dtelyDZlNft1PddnkqyTs8a0NwdKFa?=
 =?us-ascii?Q?zW/ipkX+44jGtGkzXtQ/zGDepKCG5kXq3kBwVh/dtS4QwPWq8jo2uA7EXake?=
 =?us-ascii?Q?TQ+o6x7d+R/Jwrdjz5DhN71s9Xmh43t1bebgXaMLjNMLiMLkSSN3gVHQlFVc?=
 =?us-ascii?Q?AEJ4qA3lcarsWbko3ZvhMzU8FbH9lThul840HcQzwf4TMd4q3TDDLnew48iB?=
 =?us-ascii?Q?Ll3ujh4dhlUBSE+MHCT211ohkShU15tDmWiIOEgfFp+Fc5uWhn40JBGx1e2n?=
 =?us-ascii?Q?Sv2UwwsuH22Om3NGkDo7kVVic4r1WUosOQgm5z/WqQ897YQHIE2YNqu7TPVO?=
 =?us-ascii?Q?W9eg8egcTiksUYHk2gkSQPiy2YoFjHI+CLZrJxzkCUd2fS/CyN7pxgyiiTqR?=
 =?us-ascii?Q?U4FVze9lr1jSnuoXTCIOHKZOEFbVOrX8POe8mAViK6duQTAAHchHo91LihF4?=
 =?us-ascii?Q?eyneNCb06lAkZyy0bXCCifukM348mMNlFE3NJ8qPha3+Tc7xjg8U20+n/iAU?=
 =?us-ascii?Q?1qAtNW8skXGKUYj3BzXdOcgO2S6mFw8bu1PFFpDc2LCNO3/tdbb4dm3oHvSl?=
 =?us-ascii?Q?xVBnj8o3aEJdm2qn2kvkXiJTynTRbu2JRf+C/jCChCKuE8Y4B+jzp+uo76Lj?=
 =?us-ascii?Q?GexeCOVByGOcl4HJFguMmzPprVRnci/DwgzAXErBZ653p5+Ue9+PTg5JHu4o?=
 =?us-ascii?Q?Rszot+U0psvqTCU6z9SXSH/S/VmDRkgx31VphZuqZjyzq6g86AvraSgt6Xh9?=
 =?us-ascii?Q?XXYzmfZDRXFVpBesHLlZTXEqGFTQbna0qILyzER2dT4s0g45Z9ZQ15JfnAIx?=
 =?us-ascii?Q?hb8D77pns/h6w7qwcHJQx4CGD23VZSoClu4p0W7GsR7jXvbNsqPDz9uDuscW?=
 =?us-ascii?Q?ymtHxG/fpwOSzqZsbmu0tFyK7wVCIQw0lOTsYMh7qan2czEVgFZxr0k3YW+z?=
 =?us-ascii?Q?+W3v8ERJBrqABtt2/h/qSsA=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: fc1ec6aa-9853-48a9-4321-08da010dbbff
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 14:12:52.7867
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 7fTyM7kzKumIMslwWnNB++OTttNY+GI8PaDaz6hS5VNtGU6MF96eXg8hHWenNZhvGc8tdUMoAayfBe+wCXXTgw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DU2PR04MB8518

On 08.03.2022 15:07, Roger Pau Monn=C3=A9 wrote:
> On Tue, Mar 08, 2022 at 01:34:06PM +0100, Jan Beulich wrote:
>> On 08.03.2022 13:11, Roger Pau Monn=C3=A9 wrote:
>>> On Tue, Mar 08, 2022 at 12:15:04PM +0100, Jan Beulich wrote:
>>>> On 08.03.2022 11:12, Roger Pau Monn=C3=A9 wrote:
>>>>> On Mon, Mar 07, 2022 at 02:53:32PM +0100, Jan Beulich wrote:
>>>>>> @@ -179,6 +188,13 @@ SECTIONS
>>>>>>  #endif
>>>>>>  #endif
>>>>>> =20
>>>>>> +#ifndef EFI
>>>>>> +  /* Retain these just for the purpose of possible analysis tools. =
*/
>>>>>> +  DECL_SECTION(.note) {
>>>>>> +       *(.note.*)
>>>>>> +  } PHDR(note) PHDR(text)
>>>>>
>>>>> Wouldn't it be enough to place it in the note program header?
>>>>>
>>>>> The buildid note is already placed in .rodata, so any remaining notes
>>>>> don't need to be in a LOAD section?
>>>>
>>>> All the notes will be covered by the NOTE phdr. I had this much later
>>>> in the script originally, but then the NOTE phdr covered large parts o=
f
>>>> .init.*. Clearly that yields invalid notes, which analysis (or simple
>>>> dumping) tools wouldn't be happy about. We might be able to add 2nd
>>>> NOTE phdr, but mkelf32 assumes exactly 2 phdrs if it finds more than
>>>> one, so changes there would likely be needed then (which I'd like to
>>>> avoid for the moment). I'm also not sure in how far tools can be
>>>> expected to look for multiple NOTE phdrs ...
>>>
>>> But if we are adding a .note section now we might as well merge it
>>> with .note.gnu.build-id:
>>>
>>>   DECL_SECTION(.note) {
>>>        __note_gnu_build_id_start =3D .;
>>>        *(.note.gnu.build-id)
>>>        __note_gnu_build_id_end =3D .;
>>>        *(.note.*)
>>>   } PHDR(note) PHDR(text)
>>>
>>> And drop the .note.Xen section?
>>
>> In an ideal world we likely could, yes. But do we know for sure that
>> nothing recognizes the Xen notes by section name?
>=20
> Wouldn't that be wrong? In the elfnotes.h file it's clearly specified
> that Xen notes live in a PT_NOTE program header and have 'Xen' in the
> name field. There's no requirement of them being in any specific
> section.

True. But ELF also tells us to not go from section names (only), but
to consider type and attribute as well. Yet what do most tools do?

>> .note.gnu.build-id
>> cannot be folded in any event - see the rule for generating note.o,
>> to be used by xen.efi linking in certain cases.
>=20
> Right, so we need to keep the .note.gnu.build-id section, but we could
> likely fold .note.Xen into .note I think?
>=20
> Or at least add a comment to mention that we don't want to fold
> .note.Xen into .note in case there are tools that search for specific
> Xen notes to be contained in .note.Xen.

I can add such a comment, sure.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 14:15:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 14:15:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286980.486718 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRacy-0000Du-Rb; Tue, 08 Mar 2022 14:15:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286980.486718; Tue, 08 Mar 2022 14:15:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRacy-0000Dn-Oa; Tue, 08 Mar 2022 14:15:52 +0000
Received: by outflank-mailman (input) for mailman id 286980;
 Tue, 08 Mar 2022 14:15:51 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=yKud=TT=citrix.com=prvs=05922dae9=ross.lagerwall@srs-se1.protection.inumbo.net>)
 id 1nRacx-0000Dh-Qa
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 14:15:51 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3f631ff3-9eea-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 15:15:50 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3f631ff3-9eea-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646748950;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-transfer-encoding:mime-version;
  bh=2HeHIKEdlrtjMXLcUpqnf2x/zartlFrxW/wUCgLAFu8=;
  b=TXyQB3zHS3lD0x2L31ZRpoauUsJbo84lesEYuiqS1hz0znayrLOGcwZr
   8kxV0Vyj3vQaXKPNEMS2w1RNU3/4ppy4qUZzFhIk5vuJWEbwS0CGZLxaa
   64evd7vyol05uEHWzeeQ+xGOKiId5F7aV0paOBMupze6/dnYJi80VdR7L
   E=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65715608
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:nZcmoK9uNKVLaJU7y3OfDrUDXX6TJUtcMsCJ2f8bNWPcYEJGY0x3z
 mJOCG/XOPfeM2OnLtkkOtm+oBgAu8OBy4drT1RlrSo8E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oDpW1nlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnZyuECUGJ5Dco9hHXQAHDH8gMKNgpZaSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFJkYoWomyTjWAOw5SJTHa67L+cVZzHE7gcUm8fP2O
 ZdGMGcxNESojxtnOnszJIsbkeqRgmDuYzdduGnOqvAryj2GpOB2+Oe0a4eEEjCQfu1OhVqRr
 G/C+2X/AzkZOcaZxD7D9Wij7sfQmQvrVYRUE6e3ntZph1uJz2BVFxwSVnO8u/CyjkP4UNVaQ
 2QE9yxroaUs+UiDStjmQwb+sHOCpgQbWddbD6s98g7l4qje7hudB2MEZiVcc9Fgv8gzLRQoy
 1uIktXBFTFp9rqPRhqgGqy89G3of3JPdClbOHFCHVBtD8TfTJ8bjgyWbPl6Lb6Osof7AG7vn
 W6Hog5jruBG5SIU7JmT8VfCijOqg5HGSA8p+wnaNl6YAhNFiJ2NPNLxtwWChRpUBMPAFwTa4
 iBY8ySLxL1WVfmweDqxrPLh9V1Dz9KMK3XijFFmBPHNHBz9qif4Lei8DNyTTXqF0/romxe0O
 Cc/WisLvfe/2UdGi4ctO+pd7OxwkcDd+SzNDKy8Uza3SsEZmPW71C9vf1WM+GvmjVIhl6oyU
 b/CL5ryUylKVP8+nGftLwv47VPN7nplrY80bcqnpylLLJLEPCLFIVv7GAHmgh8FAFOs/1yOr
 oc32zqiwBRDSuzuChQ7AqZIRW3m2UMTXMisw+QOL7brClM/RAkJVq+AqZt8KtcNt/kEyY/1E
 oSVBxYwJKzX3iacd21nqxlLNdvSYHqIhS5jbXx2YwfygCRLjETGxP53SqbbtIIPrYRL5fV1U
 +MEa4OHBPFOQS7A4DMTcd/2q4kKSfhhrVvm0/aNCNTnQ6Ndeg==
IronPort-HdrOrdr: A9a23:n25HNKjaHSOSGrK8c/xawMqqE3BQXuYji2hC6mlwRA09TyX+rb
 HLoB17726QtN9/YgBCpTntAsi9qBDnm6Kdg7NhWotKNTOO0AHEEGgL1/qF/9SKIVydygcy78
 ddmoFFeaTN5QcQt63HCXODfOrIauP3iJxA/t2z80tQ
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="65715608"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=TWhQRxtVV0/8q2MDZNU+624k49PhWKvEA+2caYLy/3ReA+iz+g1q7YHL1E6Rle22yCzhD+oQeo1ckRScaA1IcGIrZ6033VE/eWv9d79EqqJuYeI8ot3wUkMtdiHCEIoi6a4gLZg1kszYwIvusb3UfwWMcKxNrKQJC60A6aHcwdp45+v9IoL4LLULZNOINewLxp6KX4TM7Jq9/NjTOjq1qBSpin2FQjKglgSeTZZNqHgrhSZ4an5yRuhtQgSWDBoJTe4r7VAMVl/r1Ug72y5ToRGUlqTdvve88hUmDZWIdqIoUYQ5tZy5tdHkf5CQFbeFCc1PtUB3pNHkLNDcIGZJ3A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=f9iAbsB1s/A4KnLEnio5YFYI+jMcy7yQMqj8sr4/nNM=;
 b=m8w8JNXfQBgReBjSAKE6KRpjwYho3ReUV/9wIi3NreazSYx5W4q85zAuViA7uzj8gy6F4JOtw9r/htfZTObLfH7he1lcJOZgd0NoB20QinQwfkRdZ/MbS5TRYndiTvQSD+ixrkcmC6mXsPiX7Vh4yl9Hf06PRw19mmUemjzstd68Q9wsy5P9zItfcmq9a3WAPagZSwMjBLO8DtFU8lUZDbcxopUSAZZ2SHnvilnowCqvwzNwH3CrG5N1QA8HlM3grNZSFSxrC8l6q1mEs/QVk6DGUjxALy/90TzhremFkQ3YtoO428wsfoxogJEGhWPh9sjWdLkrQwHVg4B5lMnCmA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=f9iAbsB1s/A4KnLEnio5YFYI+jMcy7yQMqj8sr4/nNM=;
 b=HeQDdlKrhrsIZwN0MqtEv1siw3O9ztB3DYLTMRiBdNRvZHwep3pgML2YeJTAdVY1lrFCPK7onOtMOoXXoyi/9e9KkCCyt0eZhmjxUEcsGApNmLkyHNfD5UvSI8S2Ghq9zFBJDkCmNyeywxU1N08Q+F21YC1di5hUklTJWn9ACtY=
From: Ross Lagerwall <ross.lagerwall@citrix.com>
To: Anthony Perard <anthony.perard@citrix.com>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
CC: Jan Beulich <jbeulich@suse.com>, Andrew Cooper
	<Andrew.Cooper3@citrix.com>, George Dunlap <George.Dunlap@citrix.com>,
	"Julien Grall" <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>, Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Subject: Re: [XEN PATCH v9 06/30] build: rework test/livepatch/Makefile
Thread-Topic: [XEN PATCH v9 06/30] build: rework test/livepatch/Makefile
Thread-Index: AQHYEdsrj9o/gZSMNUai9NV68j69Pqy1yb8h
Date: Tue, 8 Mar 2022 14:15:43 +0000
Message-ID: <PH0PR03MB6382F515DBAB3C21DCA2FA59F0099@PH0PR03MB6382.namprd03.prod.outlook.com>
References: <20220125110103.3527686-1-anthony.perard@citrix.com>
 <20220125110103.3527686-7-anthony.perard@citrix.com>
In-Reply-To: <20220125110103.3527686-7-anthony.perard@citrix.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
suggested_attachment_session_id: 95a5186f-1154-a36f-bbea-4d05aab51bb6
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b56c0180-af77-44d4-1f2b-08da010e21ad
x-ms-traffictypediagnostic: DM8PR03MB6261:EE_
x-microsoft-antispam-prvs: <DM8PR03MB62615C8D4AB16EBBA258EB9BF0099@DM8PR03MB6261.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PH0PR03MB6382.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(7696005)(71200400001)(55016003)(53546011)(38100700002)(6506007)(2906002)(83380400001)(38070700005)(33656002)(82960400001)(5660300002)(316002)(91956017)(54906003)(26005)(8936002)(76116006)(66556008)(66946007)(52536014)(9686003)(44832011)(122000001)(86362001)(186003)(8676002)(66446008)(4326008)(508600001)(66476007)(110136005)(64756008);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?LOKu8rVF1KNdSCNRl+6mvP9EHsAcwVXk4hMJVRfq3ZjAVEcpsITT0FmOh9?=
 =?iso-8859-1?Q?nTgtn9lQipLGSngp27Xv9/r3u10hMjcdYKo+Tjw+2Ao0K1hjfKUP+TMElv?=
 =?iso-8859-1?Q?DG8eAGaItN9sNvLZOvI/2zRdIR5OjpkWuhBuyciXONkpfeULQ9sFXsvv0D?=
 =?iso-8859-1?Q?SpHitl9Lo57Ix26RJuj6GnuYQR5CzyW0CiT3kBbc01/c2kdBY0OfyUc1Ym?=
 =?iso-8859-1?Q?GXVs6yeHvw6PKAqD/evhESrnx2gI8kMiPgCk3qz6mPsSckKu2EQ35F5hIE?=
 =?iso-8859-1?Q?DhXijdpwtOn1n3pCZoxqtHBATxWsuMaNqUTwCsMfoNzEs8/KcRL0GfamXY?=
 =?iso-8859-1?Q?J+Jc85MQ6DcxqlKMlOuQbCrdTaiX2WUyPF3uipRg4webn9y9UokfQwjAFH?=
 =?iso-8859-1?Q?ea2oRVF/BVfzur8al1N6P/2lnWOoGplGnvolsRJo0NV2reqnJM4+4BPr0d?=
 =?iso-8859-1?Q?+UPxUfRbDk3hMeVJ2L2CLgoP/5L2b48/tDBvcWlkoQgQSVr/oDbeWKGLxr?=
 =?iso-8859-1?Q?04qR4k3Ms6Db9Hn5RQeuqTkrczcDO+8GuySSpDhHl3DVIA3UhW6Z1lnIZA?=
 =?iso-8859-1?Q?SlJXtM0ob4p04aswoDuvbZWJ+NPdpGUkPXZjCn8RMCgUI9lBWz3LtY3KJ7?=
 =?iso-8859-1?Q?j9fXWWtvTu591Mja4uCForu4wYkADlNQIp6POh2qns3sLnFbkKjNusrxDm?=
 =?iso-8859-1?Q?3uwCaRW0fyu3DPn3etrgaihqTfjNRmPvJjz4pnDw25ghkNHE9/iukTWGY8?=
 =?iso-8859-1?Q?zsEO0Wt5gAQA91AxKThFsFERxG5yTeGvKVVxuvdW65FRV3FQPlaOeci5XT?=
 =?iso-8859-1?Q?JkkfxkpUeJNr9dDb5K6S7wOkBhFA5xyPrVICcDo1DAjFLl2qPwGYSPPK3X?=
 =?iso-8859-1?Q?ZpLLPoaMyTWvhNTv1bWFde7JmVE9ZTe6+IhSL2VbmgawkFpBuNyvHW0EBN?=
 =?iso-8859-1?Q?mYoFZodRUy1CAB9cfMO++vRtmUVHWixmxfu5icj2eE7zdH2HytyNB924wR?=
 =?iso-8859-1?Q?ucgwzSeA01fIwPaP593yY8dryZgCN8PKoNyz27T9ZwM7Flq4iQvpa/bqZm?=
 =?iso-8859-1?Q?TvOrBuzK1epaQ+BXyLCHAX10Lkj17uMNDkP+Ys6wBUA3MUZMrfL7ILSQlb?=
 =?iso-8859-1?Q?KZhhmjlM3r9VTnuONkbwtBHHs8+8EfUm6kx6FQ6hIsuAe09wDZLj89PQxh?=
 =?iso-8859-1?Q?B6GOxrXLuPbEt0m0Jx4ENdQZWd3X82wdkk6NPD1hfuzU2h1qNSfTI8PpO3?=
 =?iso-8859-1?Q?9qhpa1g5l1rsRgJQBamtZ2siseOR0BUQtZ17+2pJwg0dUQ4sQgyg6Vcic7?=
 =?iso-8859-1?Q?NPL/Sj51XzwVtW7K+k6LcwY16rryEB8BMbur75Kx8/m01b+WPeSRENQiYR?=
 =?iso-8859-1?Q?ffJ5fucxphmCL+qXT1rgorS8yEcHB47taJi994wKwwqlznlz+mkGosbdau?=
 =?iso-8859-1?Q?eJ77PJswh21HrVaaPmpFlVv0DUPM8pctZ8CZVJEz+XEgrJE+clX6KmdFai?=
 =?iso-8859-1?Q?ca+lOLtHQSArV4fXdaKr126K/bgspw0bU2diei8EVAYiIN5TIQd6DCS47b?=
 =?iso-8859-1?Q?m6X+tflWmmjnDlaVkgEfQwBuvBZZ3QwHPVEJ9bGpiW73NAoOjCrDejdlyE?=
 =?iso-8859-1?Q?ecNN41rsdnlrlRL44v22l30SCJGDbyvuiv72JdhcwVOfxAL4VHCqvy9ylF?=
 =?iso-8859-1?Q?IFY2kyZH3+9HO/zwwAf7v8cbvPbtPQmv2EX2HlCqwFvHP7mclpt8NAKQmK?=
 =?iso-8859-1?Q?Y9EA=3D=3D?=
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR03MB6382.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b56c0180-af77-44d4-1f2b-08da010e21ad
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Mar 2022 14:15:43.1260
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 3dVe8Q68b2AAnj8L9mdLjLaqJrTTSKAMzjB9fYgpGlc1UbLdTxx+c0AqWw45IjtjLGlg9BUDi6KIXLD6e71XVY+rAXp4IstMSjY/B/lO9I4=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM8PR03MB6261
X-OriginatorOrg: citrix.com

> From: Anthony PERARD <anthony.perard@citrix.com>=0A=
> Sent: Tuesday, January 25, 2022 11:00 AM=0A=
> To: xen-devel@lists.xenproject.org <xen-devel@lists.xenproject.org>=0A=
> Cc: Anthony Perard <anthony.perard@citrix.com>; Jan Beulich <jbeulich@sus=
e.com>; Andrew Cooper <Andrew.Cooper3@citrix.com>; George Dunlap <George.Du=
nlap@citrix.com>; Julien Grall <julien@xen.org>; Stefano Stabellini <sstabe=
llini@kernel.org>; Wei Liu <wl@xen.org>; Konrad Rzeszutek Wilk <konrad.wilk=
@oracle.com>; Ross Lagerwall <ross.lagerwall@citrix.com>=0A=
> Subject: [XEN PATCH v9 06/30] build: rework test/livepatch/Makefile =0A=
>  =0A=
> This rework the livepatch/Makefile to make it less repetitive and make=0A=
> use of the facilities. All the targets to be built are now listed in=0A=
> $(extra-y) which will allow Rules.mk to build them without the need of=0A=
> a local target in a future patch.=0A=
> =0A=
> There are some changes/fixes in this patch:=0A=
> - when "xen-syms" is used for a target, it is added to the dependency=0A=
>   list of the target, which allow to rebuild the target when xen-syms=0A=
>   changes. But if "xen-syms" is missing, make simply fails.=0A=
> - modinfo.o wasn't removing it's $@.bin file like the other targets,=0A=
>   this is now done.=0A=
> - The command to build *.livepatch targets as been fixed to use=0A=
>   $(XEN_LDFLAGS) rather than just $(LDFLAGS) which is a fallout from=0A=
>   2740d96efdd3 ("xen/build: have the root Makefile generates the=0A=
>   CFLAGS")=0A=
> =0A=
> make will findout the dependencies of the *.livepatch files and thus=0A=
> what to built by "looking" at the objects listed in the *-objs=0A=
> variables. The actual dependencies is generated by the new=0A=
> "multi-depend" macro.=0A=
> =0A=
> "$(targets)" needs to be updated with the objects listed in the=0A=
> different *-objs variables to allow make to load the .*.cmd dependency=0A=
> files.=0A=
> =0A=
> This patch copies the macro "multi_depend" from Linux 5.12, and rename=0A=
> it to "multi-depend".=0A=
> =0A=
> Signed-off-by: Anthony PERARD <anthony.perard@citrix.com>=0A=
> Acked-by: Jan Beulich <jbeulich@suse.com>=0A=
> ---=0A=
> =0A=
=0A=
Acked-by: Ross Lagerwall <ross.lagerwall@citrix.com>=


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 14:18:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 14:18:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286986.486730 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRafs-00011M-B5; Tue, 08 Mar 2022 14:18:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286986.486730; Tue, 08 Mar 2022 14:18:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRafs-00011F-6T; Tue, 08 Mar 2022 14:18:52 +0000
Received: by outflank-mailman (input) for mailman id 286986;
 Tue, 08 Mar 2022 14:18:50 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fWwI=TT=citrix.com=prvs=059ab6e88=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRafq-000119-UF
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 14:18:50 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id abaed9be-9eea-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 15:18:49 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: abaed9be-9eea-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646749129;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=9Vn8Ovl3/4XvehyjdBHpoyFkQ4kaTi+gv9rdkF0v3NM=;
  b=E0zradq99zGn8bKBnfAl4Xbf+7p6yKSNs/7tSkPW2Vnn4bE1Wqm4vHg9
   U30TVh8zao/6lePDxDb7RiLJD6LU4buBPl4B1o5IzvkUj1nX1reNtvzoR
   IxsiImI0j0F6a+bXnaHAJvaKOBm03XxsVHAjgg5Q2B3x5MCy2OoIpDkxl
   0=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 68059526
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:nOUswq3fKKG3M8OWpPbD5Sdxkn2cJEfYwER7XKvMYLTBsI5bpzQCm
 zEcW2DTPK2Oa2OgKItyPISw/EpS7cOEyIdqQApppC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUw0YDja++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /0KsN+taS04IZfhwr1eDQt9KT0vN6h/reqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHxO4wSoDd4xCzxBvc6W5HTBa7N4Le02R9u1pgTTKuEO
 aL1bxIxUQjpaRtABm4rEaI9sryqjFjDaBlx/Qf9Sa0fvDGIkV0ZPKLWGOTSftuGVMBEhHGyr
 2jN/3n6KhwCPdnZwj2AmlqzgsffkCW9X5gdfJWo+/gvjFCNy2g7DBwNSUD9sfS/klS5Wd9UN
 woT4CVGhaI/7lCxR9/xGRixumeZvwU0UsBVVeY97WmlyKDZ/gKYDWgsVSNaZZots8pebScxy
 laDktftBDpumL6YU3SQ8vGTtzzaESoIKW4PYwcUQA1D5MPsyLzflTqWEIwlSvTsyISoR3egm
 FhmsRTSmZ1UiI0W94+q4mrq2Wvv+IrsdBJk7ADuCzfNAhxCWKapYImh6F7+5PlGLZqEQlTpg
 EXoi/Ry/8hVU8jTyXXlrPElWejwuq3baGG0bUtHQsF5nwlB7UJPamy5DNtWAE5yevgJdjbyC
 KM4kVMAvcQDVJdGgEIeXm5QNyjI5fW4fTgGfqqNBjarXnSXXFXflM2JTRTMt10BaGB2zckC1
 W6zKK5A90oyB6V91yaRTOwAy7ItzS1W7TqNGc6lkET6iuPOOSX9pVI53L2mNLtRAESs+lm9z
 jqiH5HSl0U3vBPWOEE7DrL/3XhVdCNmVPgaWuRcd/KZIxoOJY3SI6S5/F/VQKQ8x/49vr6Rp
 hmVAxYEoHKi1SyvAVjbMRhLNeKwNauTWFpmZETAy37zgCN9CWtuhY9CH6YKkU4PqLQznaQqH
 qNeJ61twJ1nE1z6xtjUVrGkxKRKfxW3nwOeeS2jZTk0ZZl7QALVvNTje2PSGOMmVUJbaeNWT
 2Wc6z7m
IronPort-HdrOrdr: A9a23:MFHjH6MXxgsY5sBcTv+jsMiBIKoaSvp037BN7TEXdfU1SL39qy
 nApoV46faZslYssRIb+OxoWpPwJ080nKQdieN9UYtKNDOWwVdAR7sSiLcKrQeQeBEW39QtrZ
 uJLMNFY+EYd2IVsS9R2njCLz9a+ra6zJw=
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="68059526"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=HHMncs3J3JjR9pVKyXDrXTEa4tqBuwZ1lOiX3mLmZY4XzPm+/XYgd5yXVbs6kM2BaJGLe52W8YIzNtRZKa6/1FOk9+XRjuOI1zuhO1igFI9CwlTwlW5wcKAzWmO/JfiEw3x4bEvz6zWO6MkjmfH+9KXIMJ0peiptuEb114VgwMUbcnwUILTaaHIqX6dEBuvSsLFRlaJmBJZLUGoZDUMEYOflMFEgiCgDvcqUrne6ph4MH/eRuB08uIwjCABz0WJcxG6WdVpWrfeEREdMVk6tcDLmNk+lVoAZHUyeoAQSy+AF0t3xZ4W/Uh69AvX0jvNs6HXFJEO6bhXSr1ITkpHzuA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=9dYHZzCskPECZ/u0jzKSWYdh4cwF3TIK6L8gW9zN508=;
 b=d1QX9xd7OAL0C9xJfl66m4kO8L8VQdsFIgGwPcobtzx4g3k46dqoLk/cZ5HLXWvZLkWWfVAhI4od6CzWxzQ+HzH8DH2QA46HELr8re/ikZs1LCN0uIRxWYV5RbEjAHOi/2822PmhI6/d/iIkGqPD9jAl+9aKUFUUMToPF+9zjY8bFI3/1ip5sKquTlGzgqLIKYZ+pqF7o0zbVnqPl8tWbRVn3IAUaz13NpBhSy4YSg+8K9Nhe9uC4z13ewxkpuhA0/0VXbUaCXC1D00FegtQccyOzieG9fVV0sqQO1XSXw0vgbPLCzCkvUsdsbrtKoxcpjE8tMMa0hQWtk2OSokgAQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=9dYHZzCskPECZ/u0jzKSWYdh4cwF3TIK6L8gW9zN508=;
 b=HWE7Gxgz0CR54Tt9EDuKuzXW5CKPWrkBFWvE3wPZ1DcNn2i1IbaxsAz2xQTT9soj1N+afStJSJY5ZhMbjH5Y1h3SRIAX/QNdjO2+W8xyXWr6pIMEDcxt9dCeidE7XL/pF90w5co2XjJFAp6bvLQi4fbsPEAvLVJCpdQGhGTc9PY=
Date: Tue, 8 Mar 2022 15:18:37 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
	<julien@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>, "Volodymyr
 Babchuk" <Volodymyr_Babchuk@epam.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v3 1/2] xen/build: put image header into a separate
 section
Message-ID: <YidlvWBauhcrAQa1@Air-de-Roger>
References: <20220308134924.83616-1-roger.pau@citrix.com>
 <20220308134924.83616-2-roger.pau@citrix.com>
 <c2e15d35-91b3-ba29-eed0-92fa19a692e8@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <c2e15d35-91b3-ba29-eed0-92fa19a692e8@suse.com>
X-ClientProxiedBy: LO2P265CA0345.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:d::21) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: d7d6b77a-4647-4fe9-2770-08da010e8cae
X-MS-TrafficTypeDiagnostic: BL1PR03MB6087:EE_
X-Microsoft-Antispam-PRVS: <BL1PR03MB608736F63FFE4213372AA5568F099@BL1PR03MB6087.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(33716001)(53546011)(38100700002)(6506007)(2906002)(83380400001)(82960400001)(5660300002)(6512007)(316002)(54906003)(26005)(8936002)(85182001)(66556008)(66946007)(9686003)(6486002)(86362001)(186003)(6916009)(6666004)(8676002)(4326008)(508600001)(66476007);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?WWJlSUZvbDNxVDhGUHRZa1pqSlpGQXQyZ1FsdUdyQTI5Zzd2cWQ0VlREcVRh?=
 =?utf-8?B?SzRqWVY5RTBmdWFuRzlBREoyNnF2OUFKQXNCcVpMckJGUGk3bmJlTnJrUUZ3?=
 =?utf-8?B?anI5Zm1HTjJpd25ydWpwR1d0NE9tNlk3TDJWbmM3czZSbVpmT2x5aTdZelg3?=
 =?utf-8?B?Q3hmZ1hYWEx2a1ZkSUlpdGttdWQzNlFzaEMxVU5BOWRPVWZWYVpJWEFqUnBm?=
 =?utf-8?B?elFkd2w0VFZTMnRNenNiQk9ObUdyV1RYS2VDK3hwZ095c3IvZHV5OTdzWDlw?=
 =?utf-8?B?ejkvbktDY0lobGVOM3M1WHpLY3I2WTMvUjNXL0hJZC9ya3RtWVV1WXh3ZjRJ?=
 =?utf-8?B?aExRR0VYZGNUUjVMVko2cjUweXo4U0l1ZzUzRnRsRmtRUVp0NlNkTGI5Sk45?=
 =?utf-8?B?bm9kSmZRZFhxczlZcGtoZlozWjQ4RXRsem83R2J4ZDB1NzZKTHZlMDM4ODZy?=
 =?utf-8?B?YnlMODNLRVE0THhxaUlnZnUrNWVnbnlwakwrVHZvT0hkWm8rVVg0ZS9WTkZN?=
 =?utf-8?B?RUpzdHRxMEY5WWYyeDlXRmduVU81V0d1WGZYSFdJbUVQTTgwNU4zeXhEWkVx?=
 =?utf-8?B?YW4vY3NOVXJ0VFhQTDc2L1YrNHBtQTgzN1ovd3B0WlkyTWQ3eEF3a05SNDhD?=
 =?utf-8?B?NlBpZ1Z3RDBnSXVMQVFiWCsvMjl5eEgvUy9GM3ZZMTlnblRpeTE3SFBpWlg2?=
 =?utf-8?B?NDlhK3JjeU5RTXB0OVlNQ2orKy90RWJJRGJicVRqalRnNEs3VzVLNUhIUjFU?=
 =?utf-8?B?OWlSRkdwR3FhNnRaRUFGNXR1QXVnUUVNT0pHS2Y1MWFXNWluRFlHRUN2ODgr?=
 =?utf-8?B?eE9kVE9kNUdQYy80Ui9VOTJEdE1CajErUi9sc3ppZHlaKzFiWXhZWGlKOUta?=
 =?utf-8?B?UEJKdko1Q1lXU2Rxdld5eGxUVUIzZ1cxRVVXamhqWkpwUXdiN2dUMUcvVUF5?=
 =?utf-8?B?ekxrbkI4eE03eE5tcS9RbzIycjd1UEVwRVU0clBNbXNwTzFrWm05a05jYlVK?=
 =?utf-8?B?RkJDbXhXMWZaVWpUdENPS3JvU3B4MVVzNGZDSEJIcFd2Z0ZCVFg4eUZyMjVu?=
 =?utf-8?B?Qk9pak9leThpRVpBUXhBclpjOG9PU0pYYURpUGdQQzFkblBrL2RmUm83TWdZ?=
 =?utf-8?B?MjlXcEZwTW5zKzNZK2FrZWRDWldpekhuMHVDSHFPayttMEVvVlB0cWxmaWM4?=
 =?utf-8?B?bU5aRGY5OWNOcWlPaUJHdGxuejBlNGdmRDJadTl5em5pTmlzVnBzNkk5di9O?=
 =?utf-8?B?WERxNlJPbFRiRzVVNTM1eVMzZVdJN2JCMTEvdjJZRmFJL09jYTJwbVZ5UEZO?=
 =?utf-8?B?N3FLeG1YdmtUaC9sdW9ab0VUSmprM21LaVE2TEZHajQzV21mcWR4Yi82Nkw5?=
 =?utf-8?B?Mk8rRHI4bFE3VHhxNjVwdFd2VFlmaWg0d2RXV0xYWlpFTGpmR1dzRVpOYW5S?=
 =?utf-8?B?VDluQXQ0aDAvekFsSDZlS2I1V2trSTBLeXV6RkR6WDhNQXNkUitYdGxvOVAw?=
 =?utf-8?B?L1VFemJ3SnVvWUtlTFNCUEpzWXFuQThWSGF3MFZibmNDQWd0M3k4MUF0cUpL?=
 =?utf-8?B?aHUyQ3ZEVHVUOWdjanVJOWhqNnJLeVlBcEpVQTlRa1o4dFhuMkhkVGxtV2VJ?=
 =?utf-8?B?THZtOU9lUWwwR0gyWG4zNmhmRUpkL2hyclRIcjQyaVdseVFzZDVhQlBSaDF4?=
 =?utf-8?B?SWg3Tkw5Vi9HNWpNcjJjaUlFRG1NTUN3L05sNlorbGV1TnppS1lncHlnWWlE?=
 =?utf-8?B?aHJsVGl1YitsenNYUFBXNFcvellDQ012Qm5Td2huRk9FQXlNM2pxTTd3Mktq?=
 =?utf-8?B?NVFKajkzc09CMCtSVmtVdUNYVDNmQ1ZsVGN1M3JVZ2MvekY4K1NEazBXN2tZ?=
 =?utf-8?B?bkJwQ0pweDZaVmc1THBseUtZdFkxRVFkc2JwaUFjS3VMeEsyQVdUUnBlZi9a?=
 =?utf-8?B?SEorTmpmMVpEbndTVjBNVVJTK3o3V0U5R3Z3cWpQSUZRODZ4clU1cTFzanI2?=
 =?utf-8?B?RjZzMzB0eXdDcjYydFFWZUszMXp6Nk9HVkdMY2xjZFJGNzN2N0dSeVZGWjB1?=
 =?utf-8?B?bXZVNDQyMkF2bnA1OGdjbkNLS2ZaM1RxbDdLNGV1cUhzbVpVWC9pbFZJTkRR?=
 =?utf-8?B?Y2kvVE1iUWZKVytuWXVseVllU1hGa3hFQk1lby9uM1ZIMUZCTWpXL3M3V0M3?=
 =?utf-8?Q?62V5hr5gajckyHO5ShNkE40=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: d7d6b77a-4647-4fe9-2770-08da010e8cae
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 14:18:42.9770
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: RX0729J0lndXS8ksCkb3HHcf1dGmbzSRphlIDgpZShiT1I8FHoo1dSCiNhTt5Pbvt+KUYp5MckMP8X6GrEp2Yg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL1PR03MB6087
X-OriginatorOrg: citrix.com

On Tue, Mar 08, 2022 at 02:57:23PM +0100, Jan Beulich wrote:
> On 08.03.2022 14:49, Roger Pau Monne wrote:
> > So it can be explicitly placed ahead of the rest of the .text content
> > in the linker script (and thus the resulting image). This is a
> > prerequisite for further work that will add a catch-all to the text
> > section (.text.*).
> > 
> > Note that placement of the sections inside of .text is also slightly
> > adjusted to be more similar to the position found in the default GNU
> > ld linker script.
> > 
> > The special handling of the object file containing the header data as
> > the first object file passed to the linker command line can also be
> > removed.
> > 
> > While there also remove the special handling of efi/ on x86. There's
> > no need for the resulting object file to be passed in any special
> > order to the linker.
> > 
> > Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
> 
> Looks good to me, but I have one question before feeling ready to
> offer R-b:
> 
> > @@ -86,8 +84,13 @@ SECTIONS
> >         *(.text.kexec)          /* Page aligned in the object file. */
> >         kexec_reloc_end = .;
> >  
> > -       *(.text.cold)
> > -       *(.text.unlikely)
> > +       *(.text.cold .text.cold.*)
> > +       *(.text.unlikely .text.*_unlikely .text.unlikely.*)
> 
> What generates .text.*_unlikely? And if anything really does, why
> would .text.cold not have a similar equivalent?

That matches what I saw in the default linker script from my version
of GNU ld:

    *(.text.unlikely .text.*_unlikely .text.unlikely.*)

I really don't know what could generate .text.*_unlikely, but since
it's part of the default linker script I assumed it was better to just
add it.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 14:26:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 14:26:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.286992.486740 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRamQ-0002Rd-14; Tue, 08 Mar 2022 14:25:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 286992.486740; Tue, 08 Mar 2022 14:25:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRamP-0002RW-UQ; Tue, 08 Mar 2022 14:25:37 +0000
Received: by outflank-mailman (input) for mailman id 286992;
 Tue, 08 Mar 2022 14:25:36 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fWwI=TT=citrix.com=prvs=059ab6e88=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRamO-0002RQ-7J
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 14:25:36 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 9d361968-9eeb-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 15:25:34 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9d361968-9eeb-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646749534;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=C5E7SwW8VUIqiJh+U2gAE6UYsz+6v7XFdWv3O68lJxg=;
  b=boRkJBCLj01u2+TKbPeeWO4t+7mz7W1WuafIyrvV6tHKsLsEynFAWX+m
   LYiO4KcWeCs0OanyOW31uKtbF36rEBy8/LtKb8vvjFQ2gNSRB5SziKyoL
   xD/HaBsd2KerjmmldmUNbttlaQu+ggsqdk7OTOCczvF9ohAFRS+DgfQRd
   M=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 68060263
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:Fwm+mKJm7of2nVCDFE+RJZUlxSXFcZb7ZxGr2PjKsXjdYENS1DUEm
 DdMXT+PMvyPYzbyetpzPtjn8RkH75fcz9MxHQVlqX01Q3x08seUXt7xwmUcns+xwm8vaGo9s
 q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUYYoAQgsA148IMsdoUg7wbRh2dY42YLR7z6l4
 rseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3fMldG0DQUIhMdtNWc
 s6YpF2PEsE1yD92Yj+tuu6TnkTn2dc+NyDW4pZdc/DKbhSvOkXee0v0XRYRQR4/ttmHozx+4
 MR2iaWSaVkoApHJl7teWQJDSC0lDZQTrdcrIVDn2SCS50jPcn+qyPRyFkAme4Yf/46bA0kXq
 6ZecmpUKEne2aTmm9pXScE17ignBNPsM44F/Glp0BnSDOo8QICFSKLPjTNd9Glg3p4WR6iFD
 yYfQQJydCXDbSV9AUw0LK4Tl8y0iWPvUwQN/Tp5ooJoujOOnWSdyoPFDt3RfdCbQNRPqWyRr
 GnG4mfRDwkTMZqUzj/t2nCmi/LLnCj7cJkPD7D+/flv6HWMwkQDBRtQUkG0ydGzh1SiQdtZJ
 woR8zA3sKkp3EWxS5/2WBjQiG6JuFsQVsRdF8U+6RqR0ezE7gCBHG8GQzVdLts8u6ceXic23
 1WEm9foAz1Hs7CPT3+ZsLCOoluaOzURLGIETT8JS00C+daLnW0opkuRFJA5Svfz14CrX2Grq
 9yXkMQgr6Qosfcp9/u6wWzCjG3vrIPSFQJu1jyCCwpJ8ThFTIKiYoWp733S4vBBMJuVQzG9g
 ZQUpySNxLtQVM/QzURhVM1IRej0vKjdbFUwlHYyR8FJyti7x5K0kWm8ChlaLVwhDMsLcCSBj
 KT76VIIv8870JdHgMZKj2ON5yYCkPCI+TfNDKm8gj9yjn5ZLlfvEMZGPxL44owVuBJw+ZzTw
 L/CGSpWMV4UCL580B29TPoH3Lkgy0gWnD2PG86kn0n8iOrDPxZ5rIvp1nPUNYjVC4ve/G3oH
 yt3bZPWm32zrsWkCsUozWLjBQ9TdiVqbXwHg8dWavSCMmJb9JIJUJfsLUcaU9U9xcx9z76Ql
 lnkAxMw4Aev1BXvdFTRAlg+OeyHYHqKhS9iVcDaFQ3zgCZLjEfGxPp3SqbbipF7rLwzl6AlF
 aJZEyhCa9wWIgn6F/0mRcCVhKRpdQixhBLIOCygYTMleIVnSRCP8djhFjYDPgFSZsZrnaPSe
 4Gd6z4=
IronPort-HdrOrdr: A9a23:TuM+TKv8TiaBUpQ41cPabD6S7skDctV00zEX/kB9WHVpm6uj5q
 eTdZUgpHvJYVMqM03I9urtBEDtexzhHP1OgbX5X43NYOCOggLBRuxfBODZogHIKmnT8fNcyL
 clU4UWMqyUMbGit7eY3OBvKadD/OW6
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="68060263"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Qol8O1aWTeKTgkjOBdGziA4SAL7MsAi3oQmeMqfd0P1z0BlPGXbMXZuFZpfNTswT+72dEYMLxu5DxGPbO63tYOWnlRpvd/MzCP66RBnpGDWfdpZ/rpKv21DFsbV5pnJMeHLkmdyEaYVzeWXubTfKBP+sUyjZ2aWYaXv3JM56WL80l8A4q/Uu5HgrPU+7zgwNyOseferUkcdWX5U+f9l0YoSaE1gWKJgaMiZd385mO6Ww+69U9TEnZWS+VT5pK9y+2+7stD4e/rzy5BLfEseCKa/EVZrx9QDezU9WZ2GwDL2V5SiEV5CEvjmGaNh4POAT5/PiI6AzpJJIBrnaEL/P0w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=K5ltZMPfb1En8ZRTwyaZ2htxvbkAIRqrbEdV8aWrCJk=;
 b=JSX91YG7gsvsoZwL+QGKK8hgNNAdePr95lzN0lqBhQs3TU1jMjqlxWt4EqBsyCWgYebnYovYHRfieYqOLKvg88acb1pzg7dehJJnuy7MTGmcNdijupgD5G3J43DOn4RLMfJe3F9ygfz88GX3eR7CZWbOLRrA7Tle1/sRIptSr7uI11fKKzBZwehUJbrOkK1jEdqzT0mXloVEQ9rLzjydFIOyfrewTXIubVTvVNVxurEfLBg/Ur9FiamALqdHeMP0eT6WsQiCNfbUfaz0JMLCz/n4Vw1DHdQ6OETdHEwLBvpFgZixgRtVG/Dq3aUxI7w8V4RMFbrFG2bF/PqjvK3K1Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=K5ltZMPfb1En8ZRTwyaZ2htxvbkAIRqrbEdV8aWrCJk=;
 b=tkU6J6TVby+MrYAeIdp4ZQj7DGZunc54WwMsrYzrdQkxn6YdlzPf1lH6ITO/FEuPY+chpgO1GpKzcGjgykzbs4QrBwp4/dYRLgCssPb7W/tVgAx9ZrLeZUTAIExbu0zaWt2LjFmUfK4HvxJPxkehKty+3mn9v6cMYJtXke5yLZk=
Date: Tue, 8 Mar 2022 15:25:23 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Stefano
 Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>, Bertrand
 Marquis <bertrand.marquis@arm.com>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>, Jan Beulich <jbeulich@suse.com>, Wei Liu
	<wl@xen.org>
Subject: Re: [PATCH v3 1/2] xen/build: put image header into a separate
 section
Message-ID: <YidnUwzaitqSKkwk@Air-de-Roger>
References: <20220308134924.83616-1-roger.pau@citrix.com>
 <20220308134924.83616-2-roger.pau@citrix.com>
 <3d08555a-2ee2-53be-d495-d3aaa6ec661e@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <3d08555a-2ee2-53be-d495-d3aaa6ec661e@citrix.com>
X-ClientProxiedBy: LO4P123CA0503.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:1ab::22) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c4d69788-1d29-47a7-e0b7-08da010f7df7
X-MS-TrafficTypeDiagnostic: SN2PR03MB2224:EE_
X-Microsoft-Antispam-PRVS: <SN2PR03MB2224DF6F4091EF0B6D4FE6EC8F099@SN2PR03MB2224.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(83380400001)(508600001)(2906002)(6506007)(53546011)(33716001)(6666004)(4744005)(6486002)(85182001)(5660300002)(26005)(8936002)(186003)(38100700002)(86362001)(66946007)(66476007)(6636002)(66556008)(8676002)(4326008)(6862004)(9686003)(6512007)(82960400001)(316002)(54906003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?QzNWR3k0ZmpFV2hDZTZObWk3dU9BM1MxMC92OHBKMWNhSG4vWTZzRUo5R28w?=
 =?utf-8?B?ZzY0MzF0L2Q5VFhadjI4ZGQ1NW1OZjNOdDgreW5Zb2pHVjhPbXNQajdxbXRC?=
 =?utf-8?B?emR6VmdoTWUwcHNSSWxlK2l6WlNiQkdKMklSZUxlNjg5LzJ5RWVndjBpVy9u?=
 =?utf-8?B?bWRsMTdkNXQ3d3ZYNU1uS0ROV0p1RGhTRW4xbjRLYklvNG5tWGM1V0ZRQzEx?=
 =?utf-8?B?QnFlYitPSlkzSGhIWjd4dnA4eHhIMklZREw1SkdMdkxkTHhPSVFWOHEyZ1Ju?=
 =?utf-8?B?Uzc5WFIwN1ZQOGJWREVGWGcyN0h2MTREQTFIOFdkQU0xTGo1NUo2UjRGS3FZ?=
 =?utf-8?B?MjJvRjJQeUhxdnUwNzNjbzFyN2RjU0NudU1iQS9HT1pCd1NwcmJ3cU5PN1FU?=
 =?utf-8?B?NHlIQmFNLy81NC9FclVIbEhJUjk0aWoySmhEM2Q0b3dmUHVIUktrTTRLWU9n?=
 =?utf-8?B?bHJkL3RNS2s0SFN6bSs2MXh6bWRkaHYvakVUbzM1d3ZOSlVIakZ3anJ3VzR6?=
 =?utf-8?B?cXdSRFlCR3VocDVmaWc1enBYRE1tMWVxSWUzY0ZqeVJjN01EeWJrNEpNd0lI?=
 =?utf-8?B?bllKOURvL0N2ZTloQS94cnB3NDYySDRRSnpMd0dwdkhLU1VMWDZKQzRMdzNZ?=
 =?utf-8?B?Njh0cXREdnhUQUNBSSsxNk1BWnZNS2xGZmRvVmtIRDNMcWN2MDV4RXVYZHl5?=
 =?utf-8?B?cTN1TDMwOG9Yb0NHS3BUcjdmZFg4ZEFGMW9wbjQwUTRSRk96Ulpyc2hRU3Zj?=
 =?utf-8?B?L3N0cENXc25yRFpqaTlFaTFLaFBJRS9zbndtcFR4SkxxMHcvQVdpNFFheCty?=
 =?utf-8?B?b2U4YkZDM0xlNE5xTG1XSGdVL3lFVXphQ2pxMFVNREZBWHBIRE00WEJNb1Y2?=
 =?utf-8?B?eWJFU2hXdmhCS1VGem0yL0RWV01xcTB3QTdxYmpWN2piYnYxeEJDZWFpbm84?=
 =?utf-8?B?TklRL1cxRnNyRlFYdThjZ2RvTndRbytQN29BMmRLMjRhOXErak9HSkV5NVZu?=
 =?utf-8?B?Y2I2THZyWHIwbzU4MWtwUnNDWnQremhiWU9kRmtDTE1oQWJwYlJwZk5Ka0sw?=
 =?utf-8?B?L0IyQmo0cCtYcEF2c3FDZEVMZkpjcW9nYkxRMVVveml5NFRDSFhUZ2hINmE2?=
 =?utf-8?B?MFBtRE1Zd3dTTnBNQkxXVzA4WThsamRqdTRudmRiaHJXNk45WlpmWERBMjBN?=
 =?utf-8?B?bURJZEFBSGVGRTEyY2pja1VDT0R5eG1QaVQreFFkcXBMaEZVbE1ZYnlXVHFT?=
 =?utf-8?B?bTVDVjNBcHhBenNUZzU4YlQvamkyOVl6NUdhbHRCa0dKcXNQdWZlN0tGNEJk?=
 =?utf-8?B?MCt6Zk9sU1IwSTI0QXMzZTRQR3ZqdmtJYWF6cHRpZ2N5QVVaNzRSQXRtSlBZ?=
 =?utf-8?B?SGxBdU5SVXFjV25tVVFzQnBLSTJqYXl0STQrbWRmdlhWN0tCSXJHQ2d4T1p3?=
 =?utf-8?B?cDFZQU9KMW5YVTFvLzRQQUorVDBYdndibks2c3I4dWdtVnV3U21kUEUxMmNx?=
 =?utf-8?B?WjFNMldkelFPNjlTbG1BcysrM08rU1Y2ckppR3FvaUdGeWxxNGUySWx0S2E1?=
 =?utf-8?B?WEhiaEt4ekYvaFFYblAxeVdEM2pqT3lMME9RN3AxaS9NU0kxRlNMc2tjcCtm?=
 =?utf-8?B?di9mK1UwQ2w1OVpNQzdPT2VnMnN6REtTR1RLUk1NT2JQbys4RzZ3ODFscG9o?=
 =?utf-8?B?MnBaSG5HNHV6QUhSdUMzblpBOGdEZC9VcHJJekpoNEYvUWVqSW0rdzNpMDVY?=
 =?utf-8?B?ZjVWRDd5b2FlNDAxNDRTRHhtNFpMa3dPWFJKdW1hLzFXT3ZNSjkwTFN2eTVL?=
 =?utf-8?B?VFYrbnRjNEhjbU9RMHB4eXRjWE4zRWZacWhSSXN5M1VEUnllWE5FYUh4LzhH?=
 =?utf-8?B?QkcvZktYK3pNalB6RGkrc25yTkNDRHZDSUh6RVJFdDRiOGtPM2lDT05Eb0c2?=
 =?utf-8?B?ekVQRVMwZVpKNlJWRUFORFNncWN1MHovOVpWeFZqWHhZK2JFMGdVVDJxNDBj?=
 =?utf-8?B?VTZkL3BVS0xjMTdlaXhpSnZZSHhyMEhZMzR1RXRieDlwQTRYRWRobDdTeVh0?=
 =?utf-8?B?dFFvZitDMEZSMmt2a2NkSVlrOWdGSlZWVC8vWVAvdGVqRUdxSk1wc2QyRlNm?=
 =?utf-8?B?Ri9XSEpUTDlrL0ZzdzdZcFkzUXBORU5QaGYxYnNNWENyU1pPTjB6YmF2Y0hC?=
 =?utf-8?Q?MhKA0zmGiMN/neNmFXcwDdA=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: c4d69788-1d29-47a7-e0b7-08da010f7df7
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 14:25:27.8067
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Ast+iOvPt6WrelALPiRKtFe5RsC1C5BgWZu0x/GJ9HuJ15/l2pu0/bITd45uMh1Ud1fJpHQdNjLZP58rSLq/1g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN2PR03MB2224
X-OriginatorOrg: citrix.com

On Tue, Mar 08, 2022 at 02:11:28PM +0000, Andrew Cooper wrote:
> On 08/03/2022 13:49, Roger Pau Monne wrote:
> > diff --git a/xen/arch/arm/xen.lds.S b/xen/arch/arm/xen.lds.S
> > index 08016948ab..47d09d6cf1 100644
> > --- a/xen/arch/arm/xen.lds.S
> > +++ b/xen/arch/arm/xen.lds.S
> > @@ -30,9 +30,13 @@ SECTIONS
> >    _start = .;
> >    .text : {
> >          _stext = .;            /* Text section */
> > +       *(.text.header)
> > +
> > +       *(.text.cold .text.cold.*)
> > +       *(.text.unlikely .text.*_unlikely .text.unlikely.*)
> > +
> >         *(.text)
> > -       *(.text.cold)
> > -       *(.text.unlikely)
> > +
> 
> Most of this hunk wants to move into patch 2.  Patch 1 should only
> introduce .text.header.
> 
> Same for x86.  Can fix on commit.

The justification for doing it here is to better match the ordering
used by the default linker script from GNU ld. Obviously this also
benefits the following patch. Feel free to move, but I think it's also
fine to do it here.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 14:31:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 14:31:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287000.486752 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRasH-00045f-Q6; Tue, 08 Mar 2022 14:31:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287000.486752; Tue, 08 Mar 2022 14:31:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRasH-00045Y-N3; Tue, 08 Mar 2022 14:31:41 +0000
Received: by outflank-mailman (input) for mailman id 287000;
 Tue, 08 Mar 2022 14:31:40 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ibIM=TT=citrix.com=prvs=059cca470=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nRasG-00045S-9g
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 14:31:40 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 763c1fe5-9eec-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 15:31:38 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 763c1fe5-9eec-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646749898;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=5fPvnwHyyFCD4wNyDl2CbyychIUceVDLqAVs7pZXZ1A=;
  b=N+oTJM0qYPTjFLNNZhwYgD8ii7w0VG6qdjYkBEsPhcv4lxqMHBXhJE1J
   TMnz++KO2iZVTAerELsMNaW6pb/zM/ABRBg4BUD2gGhuPJf0Mew5WCjqT
   cr9RU/srAgEwX4QLdcA7qF+daqfYlY2QLVkRTMm/sh2MAds08Z4O3T/of
   8=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65641485
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:2GvGFaivVyoPXlr+J/7ZhqhqX161mBAKZh0ujC45NGQN5FlHY01je
 htvUGiDM6zYZ2DzLtEgaYy38RhUu8Pcz9YwTFNuqi8wEnwb9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFvd4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YQQgF4LUqOUtaEgCMChDHJVh1/zNPEHq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bklNpyzyfKP8iSJTKRaji7t5ExjYgwMtJGJ4yY
 uJHNGQzNUiQPnWjPH8VLpUVncKmmEPhficBhmypu5o+s3nMmVkZPL/Fb4OOJ43iqd9utl2Du
 mvM8mD9AxcbHN+S0zyI9jSrnOCntSHmXIMfEpWo+/gsh0ecrkQtDxkRWUq+sOOOoEe0UNJCK
 GQZ4iMr66M18SSDQtDjUjWirXWDvxpaXMBfe8Uq5QfIxqfK7gKxAmkfUiUHeNEgrNUxRzEhy
 hmOhdyBLT5lvaCRSHmd3qyJtj70Mi8QRUcAajUDVhAt+MT4rcc4iRenZslnOL64iJvyAz6Y/
 tyRhHFg3fNJ15dNjvjluwCc696xmnTXZg08zyrPbmOV1VIjR4eYRrSPxhvR8M8Vee51UWK9l
 HQDnsGf6sUHApeMiDGBTY0xIV252xqWGGaC2AAyRvHN4xzooif+Jt4IvFmSMW80ap5sRNP/X
 KPEVeq9Drd3NWDiU6J4apnZ5y8Cnfm5ToSNuhw5g7NzjnlNmO2voXkGia24hTmFfK0QfUcXY
 8/znSGEVypyNEif5GDqL9rxKJdyrszE+UvdRIrg0zOs2qeEaXieRN8taQXSML5mvP7f+VWIq
 L6z0vdmLT0FC4UShQGNreYuwa0idyBnVfgaVeQNHgJ8HuaWMD54UKKAqV/QU4dkg75Uho/1E
 oKVASdlJK7ErSSfc22iMyk7AJu2BMoXhS9rbEQEYAfzs1B+MNnH0UvqX8ZuFVXR3Lc4lqAco
 jhsU5joP8mjvRybo2RNN8es9tc+HPlp7CrXVxeYjPEEV8cIbyTC+8P+fxup8y8LDyGtstA5r
 aHm3QTeKafvjSw7ZCoKQJpDF2+MgEU=
IronPort-HdrOrdr: A9a23:rSIPWqMf0urFJcBcT2j155DYdb4zR+YMi2TDiHoedfUFSKOlfp
 6V8MjzjSWE9Ar4WBkb6LS90DHpewKSyXcH2/hvAV7EZniphILIFvAv0WKG+Vzd8kLFh5ZgPM
 tbAspD4ZjLfCVHZKXBkUiF+rQbsaK6GcmT7I+0pRoMPGJXguNbnn1E426gYxZLrWJ9dP0E/e
 +nl7N6Tk2bCBIqh6qAdxw4dtmGg+eOuIPtYBYACRJiwhKJlymU5LnzFAXd9gsCUhtUqI1SsV
 Ttokjc3OGOovu7whjT2yv49JJNgubszdNFGYilltUVEDPxkQylDb4RGIFq/QpF4t1H2mxa1O
 UkkC1QePibLEmhOF1dlCGdnjUIFgxeskMKh2Xo2UcL6vaJOg7SQ/Ax9L6xNCGpsXbI9esMoJ
 5jziaXsYFaAgjHmzm479/UVwtynk7xunY6l/UP5kYvGrf2RYUh5LD3xnklWKvo3RiKnLwPAa
 1rFoXR9fxWeVSVYzTQuXRu2sWlWjA2Eg2dSkYPt8SJ23wO9UoJgncw1YgahDMN5Zg9Q55L66
 DNNblpjqhHSosTYbhmDOkMTMOrAijGQA7KMmiVPVP7fZt3cU7lutry+vE49euqcJsHwN87n4
 nASkpRsSood0fnGaS1ret2G9D2MRKAtBjWu7NjDsJCy87BrZLQQFi+dGw=
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="65641485"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Yi5HuH5UMk6s3usnOeHigcQu+FNB3kyptKhYH3eZrAIOXRFBXfWqMwdumwwkFGqRt8l+nbo2MRLA4GCTmAjK2yAIVmhXaCdO5/AbUWGnPEEudCxxrPKiL0xI3ABuvSuUZnLGkwSsMyQM7lJt3vw+oSOkPjo+dLK4OFjmm0arNFnreyZnvEq/CxdBgndYgdYAGSd1ga3Q8NvvgX6T2d93tyKKQQqFxPMfRHJMoXNgL4lEzU8WZqChI3dyUIoqi3tM9hkYIWlr6lNDQqBfmhDJK7SSF3b7FcMEx8PhsvW47pCKAYaVD/QqRtrTjUq9FZtrNOICVc3UQWjJCX1jY1MNcg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=5fPvnwHyyFCD4wNyDl2CbyychIUceVDLqAVs7pZXZ1A=;
 b=NYskjZ+T21KYuJ9dG1va/uJCmrcVaWoSAeGLIbWwR83dcQTOF1BmWNjkl1n9pmYVjWLA7L5B8I8p4pkjuzFrYSm7voUJfiq90xPPX4hW+17jth9ehia/sDpOK4c0M0Gy9e3kDmBAFiRLE+qHd8b49GXcTIHEmVduH3sZlvLOj5IY87zJ9IiMiemrw0hgmsm5J0TCSDs/RyPpGxadL9RSOmWVTSSBkYlog+FjxFXJJAYEtHI4ePb+Yitf1fT8RPtuq+NRoSRn9D8c14oSWUy8TYfUx3ib7VTKqsHQSjV0w0BYqm4ystzY7FSdksxddhtIx8nhTjeUim2feWSqYassyw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=5fPvnwHyyFCD4wNyDl2CbyychIUceVDLqAVs7pZXZ1A=;
 b=BcxoU4b/T2DgUE7ETwwMUxj9nop/QfwKvCYLhsYt3dmunAWT1w88OcoBFjRJL7c8GQpi0oF+CXIwwEK40FwvO6/d7mxcijGr0CuoZEQK9u+91WKM+ZaaQGHzQmYm6rY0DAbCwiuSZtBajKRkQvwhFiM9h39kzH1F08zM4hwAs00=
From: Jane Malalane <Jane.Malalane@citrix.com>
To: Roger Pau Monne <roger.pau@citrix.com>, Jan Beulich <jbeulich@suse.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, "Anthony
 Perard" <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, "Andrew
 Cooper" <Andrew.Cooper3@citrix.com>, George Dunlap
	<George.Dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Christian Lindig <christian.lindig@citrix.com>,
	David Scott <dave@recoil.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH v5 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Thread-Topic: [PATCH v5 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Thread-Index: AQHYMjUEaMoAwzVpzE69n4F8Ciyydqy1XcmAgAAMr4CAAAJqgIAAIRgA
Date: Tue, 8 Mar 2022 14:31:31 +0000
Message-ID: <81dc2758-accc-25a3-7b3c-d9988757dd0c@citrix.com>
References: <20220307150609.10662-1-jane.malalane@citrix.com>
 <20220307150609.10662-3-jane.malalane@citrix.com>
 <YidAU63TsVO/X1Q+@Air-de-Roger>
 <b633f92a-151f-c7ca-0d91-cfad8d2edcbe@suse.com>
 <YidM/Wu5lqF48zg2@Air-de-Roger>
In-Reply-To: <YidM/Wu5lqF48zg2@Air-de-Roger>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: c32fd340-9e8b-44e2-106f-08da011056e0
x-ms-traffictypediagnostic: BYAPR03MB3525:EE_
x-microsoft-antispam-prvs: <BYAPR03MB352569688CFF85C8763EEE9981099@BYAPR03MB3525.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: wDBVFGZPbudurFsxr/qfKlEagWke2mYlZ5hX5zoc3kesrY+we/BjUbFou4O6JP6+qXK3PduRVUSsGcTIt6L5p3SRR4XNqnhkDqVITz+17gc7ivtdJiNgdNuVXejGxMN7XvJdg3PxQn4RnlbKZrYLWlcrjNQaJ5KAGdKhxqSKir8T53kY8zMsuAvi+84lDTkUS1tn56YmWumc3wEbwGnkSfo+Gp5FWXjlJeu9XWCInOz/y6gYfwL4NPr8WzANb8l6VmePsIJMSaGiKr46LFFkd0IS58qGjn/zRyL39sj2501GlaCDiaakBLNxQwm4E2cIwVqRsjbsExDcjBH2Knnt8sG65CvbVj0HXOGxIKHa1sFz2ALE3tXFqKbgqZs+XEwYGZtWQrwljILYOPPsBBC1LdCpWt/iMzUCyk8fpf4EQg9YhQJlB0cEkOHqDjI4ZHox+1cTmmLNO9hoY7jhjqTML03aL9Hl2mchzxdx0JWFhr6HL/EMrvSCUMktemMFiDrAWuPfHN92iotCr1PC0R0Pb6Ds965Mo53lRiTbRZWrP7vtuqdzmscFqjBVylxpHKofDvp3uhWu97lxSEEBqMmL58g4xCUd+s3LniI4jzYC5w4+H+85+JuMNzxpg3Azrk7MSbc3ZnaP7MhFdnXCyhbIkuYmi+ky9bbHxe5DvVTnFNASzJ7VSjgbANWuBTkhcu22QOHhE/S8svRJrf6wpZzGPMb7vt5ZvYCNZuz6+zlPNDTbhL1IUZ46qmXUNeD/7h/3
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM5PR03MB3386.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(38070700005)(86362001)(6486002)(31696002)(2906002)(508600001)(2616005)(71200400001)(82960400001)(55236004)(6512007)(6506007)(53546011)(83380400001)(26005)(4326008)(5660300002)(186003)(91956017)(76116006)(8676002)(64756008)(66446008)(66476007)(66556008)(66946007)(54906003)(110136005)(31686004)(122000001)(38100700002)(316002)(8936002)(36756003)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?Ylk1V3RsUW0vdXN6QVhCVUp4WnFVb3FYR0drTnBXS3ZpaE16am43SThCaWx3?=
 =?utf-8?B?ZDg4OEVpMUtzeGRabklPNGNCQ1grUGRzMDFsemtNb0ZXNUpnaG02Y1lmTC9w?=
 =?utf-8?B?R1BYQnkyQ21SaXNDN0tEOEgrL0lPeTJ6aXpHVG9tVFRZWG5aR3drejV2UHRX?=
 =?utf-8?B?UE5VcWdud2s3S2NwZm94aVZtOUdCbHhEVzExckdLaDJ3Z0Q3dXowUWlhMkE1?=
 =?utf-8?B?aHYxTnkxbEdLbXI3N3ZJYzBaTk9mSmpHWVVaRFJLMDVZVXROY0VYQjc5ZHlF?=
 =?utf-8?B?dDZRTmhSNUsvdTBXN1NKTnNXMVB3NXdvSnVLVUNMM3crdk1OWkRyanpmYlF4?=
 =?utf-8?B?WWIzanREY0ZJckFhZ1FUQlNpUXNOelArVzRXdDRKTDRwR3MxaDJqRk42clJO?=
 =?utf-8?B?dnpqN3Z5SWRkZFA2MTlNT0ZJb3RpMWI4eSs1NWphZzZzTjlTNkdHdTUrS0Q3?=
 =?utf-8?B?TkhRaVFJSnRSQkZrcjR1Nk5ua00zbkthQi9GS0owRnNRd01zYnJoTGlBajJB?=
 =?utf-8?B?OUZoOWh0VlhRWVRmMkFNNXk2d0lXT1B6cFZUV1QybURzeTBYR1owN1l5M2Mr?=
 =?utf-8?B?Z1dzV1kxdkp6MHIwdUd6TUd5N0sxek1FL2lRUmV0MFVFV1NWd0d6U0p3S3Z2?=
 =?utf-8?B?TGVnaXVNckF1bmM5QmY5eWRsS2dJNEQwT01WRU5OVTFmSWFmdlpjdERQTkFv?=
 =?utf-8?B?NVZ6MHJZUFJEWUk2YnZ5RHZleW9IWjlKNzNIVjNlQlNvTFA3OGlFUzRXWldW?=
 =?utf-8?B?RXVSTTFDYjEzc3M3S3NhY09Bd0Q1VTVGU0RpWTNaSkVJT1QrRS9STVZ6bmk0?=
 =?utf-8?B?alFMc3BNWEpnaEg5WkVwQmlsSWhMSy9HbFhJQkJ5dlBFVEJCTzNZczFqK2Rj?=
 =?utf-8?B?WE5oMERWSmlsVWovYVFOM3BhMGtBY1BNMkFZTkRzbDB0K0drZEFEUnpiOHFO?=
 =?utf-8?B?ejhNTlI2Z1A2VXBOdmdzbi9mVGxONFc3bzZ0UG1uVEhONTN1V1BBQ1FGZ0JS?=
 =?utf-8?B?Qkd0NEU3UnlnNU1QRHp4V0pkbXg1Q3RKQVZ5U0ZBOTBYVFBGSkUvMmJFcDM5?=
 =?utf-8?B?M3M3WGVyYmpBUkdnaHVnczdzM3hHeGhKVGtyQlBISGFUS0l2WFRmZDc5dGVH?=
 =?utf-8?B?TmUyZ2ZaRi9ORStyWThTWXZjSWxHSFpKbkFMcm10OW5WM3E0N0NrWjZqSERL?=
 =?utf-8?B?VG5kTGxOU2k5TlVRQmJRcVJjL1lBQWZoVnI2RDVCUXBVSU5aZXBUcXpRWm9O?=
 =?utf-8?B?MTBTSUJoaFpRaWhXWTBMcm1LemJWUnh1ckQ0MXlMMW0zQ3V2ZDNucWF6UG42?=
 =?utf-8?B?OFl4ait5TXFnR0t6L2FEYUJVU3lOaVBMU1VzYnBXNGFZWG5MWGhQOStFNWg1?=
 =?utf-8?B?cWdJSlB1NjVuNXVjMUQ3bmQwYVJaZkZWdFZLV2Z4SVQ3Wk84MXY0NE5Tbnd0?=
 =?utf-8?B?bWQ3K1UxNU9jVzZ6RG53Y2FRV1NGajFMUHZIam16RDRtSkIyY3E0VDNwQVpY?=
 =?utf-8?B?NytWVllyKzJvNGRyVnNhZzVBSjQ3L3lvSU5WM3BjU0hUNml2RjZHUWd2KzZX?=
 =?utf-8?B?eHJYTExkWkJMbXRYanphcjF3anZxUEZ3OTE5Uk5BWEs0bG5kZmpKYmt1cTBE?=
 =?utf-8?B?SWV4bnM2NW5OM0tvSkxSNXBxSm5TSTNGSDV2elU0V2prUW9MbnhqVmdvUW5N?=
 =?utf-8?B?RTl0aXBBWW93cERaTjFrMyt2czd1R01RZnpEa1RqRzRoZUxXSjhqenhvNEZn?=
 =?utf-8?B?RmF6ZjF3elhER0JRNUU1ZW1sT3doQU94Y0tHS2tFSjUxaXBDbCtzUkhJZnNK?=
 =?utf-8?B?ZHA5NFBVWWZxU2U2T3RsL1JSazluSUdOd3ZXWEhmRkRRMk1FTVNERUc5Q3A0?=
 =?utf-8?B?MHgyYUpwbGExS2IrQ2lhNWR0MEMzaDQwN0NyMHdUdzIxK1ZpM1lGMW9LYlIw?=
 =?utf-8?B?SEEyZWRTVVo0b0wvM3UxUmZBMFFOVUpsVm9IKy9JUVNId2ROV1N6U3QrYnla?=
 =?utf-8?B?Ry9WVHkwdS9wRndZRW9TQUh4MTJmbXVhalVKUTM5ZUlvQnRVNkhpblU4NUNi?=
 =?utf-8?B?T2NCOXdMSUJ4VXhyUmFLbldlUUNYVnpKM0VIcjBGa0RqSVViY3N4UWcyMUlv?=
 =?utf-8?B?SHdEbzdlWGxwR1dId2J1MmFtMWZPSDc4TEpYQUZaU3N3dmF4Y25qOXVZVDBy?=
 =?utf-8?B?S0NJSWp2SzMyTnRsMENSMEdTVklhVHZEZWZwM2xiL0dmcDFqUUhTSEc5M2dm?=
 =?utf-8?Q?o+yZnHdgo2wT+D1LIK+fsG7SEsSQqLNHcnb7b9uSiU=3D?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <0981809DB8C3A849A753F2F795A92581@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM5PR03MB3386.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c32fd340-9e8b-44e2-106f-08da011056e0
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Mar 2022 14:31:31.4194
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: gCfQSOSDWlSguSX/SyaRGnv7SbtN6DhIqS51LzEfh/lYr+dyO3Vr4c8zgoIeq4ZkMLluCqL9q+E4Eq13zW4PuZL9ud/zo4H4jKzHMKO+NkQ=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB3525
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Tue Mar 08 14:33:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 14:33:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287006.486762 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRatw-0004fi-56; Tue, 08 Mar 2022 14:33:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287006.486762; Tue, 08 Mar 2022 14:33:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRatw-0004fb-21; Tue, 08 Mar 2022 14:33:24 +0000
Received: by outflank-mailman (input) for mailman id 287006;
 Tue, 08 Mar 2022 14:33:22 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=yKud=TT=citrix.com=prvs=05922dae9=ross.lagerwall@srs-se1.protection.inumbo.net>)
 id 1nRatu-0004fV-PZ
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 14:33:22 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b3597f83-9eec-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 15:33:21 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b3597f83-9eec-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646750001;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-transfer-encoding:mime-version;
  bh=ha1KRl/FXBnfbn8QksGEsyyyxpVpkX910k/W/zwJgyM=;
  b=VJIJeZyJsF/+/gI7aTjrkmIZp38RaiFhbVMGUt4ffCz/FcFGHQM+vd9o
   OQX+y8eFdHKtpvnZg6mP2F+nZ9h4GzimNKzvINsiKX/KW5ALhnxkt93Go
   EQbNN2EESKJ/GcbmQ2hO/kGulod6cMsdxla8PM3da/eJ9j8hGJiBUWdaa
   w=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 68061393
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:E3E4jqxnLdhYLNvMrpJ6t+f0xirEfRIJ4+MujC+fZmUNrF6WrkVUm
 zdJXmCGOfiKYDeje9pwPN/j/EgHv5aBn4BgSlZrqyAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2YjhWWthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 NplnKOPVyoAAJDwqP0NbAJJMgZjG/Jm9+qSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DJoQEoTdkxD7UF+kvRZTrSKTW/95Imjw3g6iiGN6AN
 5JHMGE+N3wsZTUVOHBICqoxg9yXi1DhKiBYjVKfvKQ4tj27IAtZj+G2bYu9lsaxbcBNmUacr
 2nF1238CwMdMpqTxFKt8XWqnObD2zz6XIE6E6ex/fpnxlaUwwQ7DR4LfVK+qOu+jAiyVrp3J
 0sZ8CcqhaE3/V6sSJ/xUnWQsHOC+xIRRddUO+k78x2WjLrZ5R6DAWoJRSIHb8Yp3PLaXhRzi
 AXPxYmwQ2Uy7vvFEhpx64t4sxubBhcLAEY8WBM0VBs6+MjCh5wV0TLAG4ML/LGOsvX5HjT5w
 javpSc4hqkOgcNj65hX7WwrkBr3+MGXE1ddChH/Gzv8s1gnPNLNi5mAtACDhcusOrp1WbVoU
 JIsv8GFpN4DApiW/MBmaLVcRer5jxpp3dC1vLKOI3XD32n1k5JAVdoJiN2bGKuPGpxcEdMOS
 BWP0T69HLcJYBOXgVZfOupd8fgCw6n6DsjCXfvJdNdIaZUZXFbZoH8wOh7NhDm9zRNEfUQD1
 XGzK53E4ZEyU/gP8dZLb71Fje9DKt4Wnws/uqwXPzz4iOHDNRZ5uJ8OMUeUb/BR0U93iF69z
 jqrDOPTk083eLSnOkH/qNdPRXhXfSlTLc2n8KR/K7/cSjeK7Ul8Upc9N5t6INc790mU/8+Vl
 kyAtrhwlAKv1SeZeF/RNhiOqtrHBP5CkJ7yBgR1VX6A0Hk/e4e/qqAZcpo8Z7488+J/i/VzS
 pE4lw+oW5yjlhyvF+whUKTA
IronPort-HdrOrdr: A9a23:UJjQhKrELLK5syTYdvfFnl0aV5t+LNV00zEX/kB9WHVpm5Oj+P
 xGzc526farslsssSkb6K290KnpewK4yXcH2/hsAV7EZniohILIFvAv0WKG+VPd8kLFh5dgPM
 tbAstD4ZjLfCJHZKXBkUeF+rQbsaG6GcmT7I+0pRYMcegpUdAa0+4QMHfCLqQcfngjOXNNLu
 v72iMxnUvGRZ14VLXYOlA1G8z44/HbnpPvZhALQzQ97hOVsD+u4LnmVzCFwxY3SVp0sPYf2F
 mAtza8yrSosvm9xBOZ/XTU9Y5qlNzozcYGLNCQi/ISNi7nhm+TFcRcsvy5zXMISdOUmRMXee
 r30lMd1gNImjTsl1SO0FnQMs/boXATAjHZuAalaDDY0LPErXoBerR8bMRiA0DkAgMbzaFB+b
 hW0WyUrYdaACXJgTn07dnNWxZ2oFC5u2Ajl+kkj3E3a/puVJZB6YMY509bC5EGAWbz750mCv
 BnCIXG6O9Rak7yVQGTgoBD+q3kYp0IJGbPfqHCgL3g7xFG2HRii0cIzs0WmXkNsJo7Vplf/u
 zBdqBljqtHQMMaZb90QL5pe7r7NkXdBRbXdG6CK1XuE68Kf3rLtp7s+b0woOWnYoYBwpc+kI
 nIFFlYqWkxcUTzDtDm5uwAzjndBGGmGTj9wMBX4JZ0/rX6WbrwKCWGDEsjlsOxys9vdPEzm8
 zDT66+L8WTX1cGQ7w5rDEWc6MiXEUjbA==
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="68061393"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=aKUajuY+N3iZs8rlfzYgaGty55Ch0hXXRxbkwlvPvoP5eNT4+vqhWjDkNCf4nOOEiLpriDZRiUzJjVOZOO606qH3ucBECu5HhIN58+lpH8H+gC2ywpyNllJP60dofNfJVTBLG/VFHO4XP2Qr4dDlnP3MdfuAJBRtrM/vlyem+sWw9n5tNKLIFz8JQQ3f3AstAo3ZwqI7tcsFidoR9lMMKVt2h0eNvqRdheZ2SjtknDjqh7qW0xqcYbIcs8em7q4CRWJv5G7CNMlxMcxr/lNV3o366yE1tmOS9hHjVVXyZOyqX8YdjX2Vm4XBsM+YrG4JrsBBjEqsD1e2RkyAiuC4QQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=2aTTN9KkmLe/89SdJcuhcVDK4rHqfC9Nq6ouy0DZJ9U=;
 b=cAR0mXe9pG482cnualwvoiu8cohbskG+lSDF+e0q/3QpWwwJYlbCkPO1wOdmz0psc+DyIvt3tAS13tm2hMckLtYGQ9Tus6/B0/iOwHkGBe6PgDZ9kD70SewLJhsxMswTZQDk5vfYaOj9WHUsmTgXBnNMDmFYWhG6YDLSAF5arOm2yXTdYgJyvi0Sl8JNWzsFTBtLiolbDDqqe7peB6BGC3WeOwp9QkESv6/yZ8kPNRkphok6Wiyzs7inH6R8jIp+3OiJahQ5LPYQEJ90r66A9q332uhSGbQz/nYtW1Eyq2BKnHWz1iwXVR/+4+WJEmgWoEZ61ZmFJO3ORUzYfILrqQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=2aTTN9KkmLe/89SdJcuhcVDK4rHqfC9Nq6ouy0DZJ9U=;
 b=P/eB8N9IWphbUDJ+ufF/nY8n0VfEjh6lZnBg0iSputvnBN1Q9u4KX8jzxA3p07MHvqu3R2j24PkDUBparMQOmdu0RK6V4lUgI44GgGwjq4Kn1xNodUwN5sdATBSkZws4mcr7lBM2H8EIAZ1P6vhT3NaI3J55wMMshSqHqCTohSE=
From: Ross Lagerwall <ross.lagerwall@citrix.com>
To: Bjoern Doebel <doebel@amazon.de>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, "Roger
 Pau Monne" <roger.pau@citrix.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Subject: Re: [PATCH 1/2] Livepatch: resolve old address before function
 verification
Thread-Topic: [PATCH 1/2] Livepatch: resolve old address before function
 verification
Thread-Index: AQHYMhoeZ5kcmjNdQkmxqYcmYis536y1jlWT
Date: Tue, 8 Mar 2022 14:33:16 +0000
Message-ID: <PH0PR03MB6382C404E350EC993C44559CF0099@PH0PR03MB6382.namprd03.prod.outlook.com>
References: <cover.1646653825.git.doebel@amazon.de>
 <15b092bb3af6e32f72ee8fca45317687d23b8be4.1646653825.git.doebel@amazon.de>
In-Reply-To: <15b092bb3af6e32f72ee8fca45317687d23b8be4.1646653825.git.doebel@amazon.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
suggested_attachment_session_id: 54994743-86bd-f76a-1355-5676f724ba4a
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: cb2563ab-81e6-44af-5d36-08da0110958f
x-ms-traffictypediagnostic: SA1PR03MB6370:EE_
x-microsoft-antispam-prvs: <SA1PR03MB637028273636C561BB16F8A5F0099@SA1PR03MB6370.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PH0PR03MB6382.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(15650500001)(71200400001)(44832011)(38100700002)(122000001)(26005)(5660300002)(186003)(8936002)(82960400001)(8676002)(33656002)(2906002)(52536014)(6506007)(86362001)(64756008)(53546011)(7696005)(91956017)(66946007)(9686003)(76116006)(66446008)(66556008)(66476007)(38070700005)(508600001)(4326008)(55016003)(83380400001)(110136005)(316002)(54906003);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?7aKCyXQCrTjDrslnm42Iqvc2qmsieiNNWTkND4VT+dUPvnKoPlX0BjM66C?=
 =?iso-8859-1?Q?r3UW7OQe5Q3c1/V46ONQ+kCoNb8Xa3+oZwXXAeWv27vfz40UWqbXGsdCW6?=
 =?iso-8859-1?Q?suqKLigI+m1zS1fsw8y+/7+nTt/6uQcXFR0OFTu8QDgwjq4DVkI02PKKeq?=
 =?iso-8859-1?Q?Csu7jKcQlfC0aLwExTY4Fi0dsZqn8vKwtjGkPJnca5QR4xQdcph9AxIZ0K?=
 =?iso-8859-1?Q?MMBxcN3a8r1h/dKHCIc7jCzfd4eMxFHM7sYRPb5BIdR9XQ778eXPUiYmek?=
 =?iso-8859-1?Q?p3/SdfZXN1M+QnC+q/d46LJ8EAho8DtYaqdjc1siPtAgDCbwJdT711kpJ/?=
 =?iso-8859-1?Q?suwJOTgOjebNhp7ZdTBhct/giVgpV95Y979asoOWZZpud7w5oIDBN9lp8Y?=
 =?iso-8859-1?Q?7ZMoDk16FiTn5CU+9ct06pmmu9y2AvbFgeaNhk/o+G6vZd21CCBexwgN1M?=
 =?iso-8859-1?Q?tAMUmfIvDZcK943K9JhLZma9w5dpoduMvJ/eTnOo7Adfevx0sGL5dM3egi?=
 =?iso-8859-1?Q?oxVGbasGHIfe86HzgGmYV455UW8PAyAIEVGZuwtlbJUdcxOtX6X39rWF1r?=
 =?iso-8859-1?Q?+LY/1RcmftuaCbl/fRuJ1DcgB7RqXJ9KWqUk2ehji5mQBjY/l9kMl71jw4?=
 =?iso-8859-1?Q?FQMf7ZLWall8k/spW3j3Ad248okoMk2Hi2WDdm+eZvl2D+bOGZFg9+rqei?=
 =?iso-8859-1?Q?UgG/xBZ8asU2glA1D87+onlh4j18M4vLOMUJc2KoWEPW9W9GdCYOQKfhgo?=
 =?iso-8859-1?Q?5XR0O0AEvYpwzYKrmsPvliV/HzNuK/xUEi995NIPl9r1iJZVFiZFCgAQc6?=
 =?iso-8859-1?Q?6eu5MRLYlzoJyO6ozL6nSA4c69ByJ7LsaYK0rX0wDaf506t4N7EG+/cykE?=
 =?iso-8859-1?Q?gpUPbNGwOjo6KZCC5eBjS43CYakz3NNYludeU/gDv5e9QHdL1ljTkd585s?=
 =?iso-8859-1?Q?Eub5TIuamnmRTvHNNyRvbzCFEtpuUzL1zBpLrpHwlIFnnHfxoaay5lrU6r?=
 =?iso-8859-1?Q?B1ktxaNyGUbi6xNwuLNBPBED7FvYPWsZDI0eVPnf3j3kNl2PzUNwtkMMOa?=
 =?iso-8859-1?Q?69oxOkVlp4I4VOrnuVpvn+lVJZz8RI9b0ykL2ECi+9s6IS9XoOtMnPG/qO?=
 =?iso-8859-1?Q?8gCKuk73z9UINfl4l+Zb+1FIQr440jAjl9CA58JC92gvDZcDAQhNwreCOk?=
 =?iso-8859-1?Q?3y1F+RcBwF7XIvZQ5qSAcFkJWTyvm6GZZOhBsbzcp/azYFh8fK/f0QqEWJ?=
 =?iso-8859-1?Q?oqfRUIFqd+Q8g4SCEczFHxQGOpzs1CoJ/msBYyQsyPK47/CNfEpJxccLYC?=
 =?iso-8859-1?Q?VN+TGDtxSOiXjWKvSMRnJcXLfcWAj4rXoSNYXxBSYgmbfh8pKmwqfJ+vH3?=
 =?iso-8859-1?Q?jdiFRP0UTFKMwwIZYbqs0SjPLX3gaglidqErvCPeOhtaUIjjTVVxGBNr04?=
 =?iso-8859-1?Q?D6I2bnhn8tAqkns42gldwZt9qp7CwVSE8DTgeh2j0WhVn0A5Z3YhQzdCDL?=
 =?iso-8859-1?Q?dBuaQ0UeVLYhnZBO8ukq6HbztORit9/XrkEi0+c4HI2trYxtmP7aAaXwuM?=
 =?iso-8859-1?Q?CYUTqUixCGix0K7wWuZcZVl4KrmpLmuYVY3uQkER5YniE0gb0QR0KS4lq5?=
 =?iso-8859-1?Q?s4/iVyKiC4XWG8eRXyK5Z6Q1lQTYWJ8jUZ+qP700H2aYOD9mCCZgoBhh2p?=
 =?iso-8859-1?Q?fmGr1PqQM2UWkpsLdRS76AdaHcOZTdCdE+M5TaR3fyjZa4j62RVITb+Trn?=
 =?iso-8859-1?Q?p5rQ=3D=3D?=
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR03MB6382.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: cb2563ab-81e6-44af-5d36-08da0110958f
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Mar 2022 14:33:16.6026
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: SNzYAVWl9hNWcjcAaCKyQ2sFbCkWiKYF09CLPtPIFDa7Z2ILpnF0gf1AOyrwJJO3xjEACK3ubE8OW8frl5GYlMmgNWoG6AIdxHb5kwn+mBk=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR03MB6370
X-OriginatorOrg: citrix.com

> From: Bjoern Doebel <doebel@amazon.de>=0A=
> Sent: Monday, March 7, 2022 11:53 AM=0A=
> To: xen-devel@lists.xenproject.org <xen-devel@lists.xenproject.org>=0A=
> Cc: Michael Kurth <mku@amazon.de>; Martin Pohlack <mpohlack@amazon.de>; R=
oger Pau Monne <roger.pau@citrix.com>; Andrew Cooper <Andrew.Cooper3@citrix=
.com>; Bjoern Doebel <doebel@amazon.de>; Konrad Rzeszutek Wilk <konrad.wilk=
@oracle.com>; Ross Lagerwall <ross.lagerwall@citrix.com>=0A=
> Subject: [PATCH 1/2] Livepatch: resolve old address before function verif=
ication =0A=
>  =0A=
> When verifying that a livepatch can be applied, we may as well want to=0A=
> inspect the target function to be patched. To do so, we need to resolve=
=0A=
> this function's address before running the arch-specific=0A=
> livepatch_verify hook.=0A=
> =0A=
> Signed-off-by: Bjoern Doebel <doebel@amazon.de>=0A=
> CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>=0A=
> CC: Ross Lagerwall <ross.lagerwall@citrix.com>=0A=
> ---=0A=
>  xen/common/livepatch.c | 4 ++--=0A=
>  1 file changed, 2 insertions(+), 2 deletions(-)=0A=
> =0A=
> diff --git a/xen/common/livepatch.c b/xen/common/livepatch.c=0A=
> index ec301a9f12..be2cf75c2d 100644=0A=
> --- a/xen/common/livepatch.c=0A=
> +++ b/xen/common/livepatch.c=0A=
> @@ -684,11 +684,11 @@ static int prepare_payload(struct payload *payload,=
=0A=
>                  return -EINVAL;=0A=
>              }=0A=
>  =0A=
> -            rc =3D arch_livepatch_verify_func(f);=0A=
> +            rc =3D resolve_old_address(f, elf);=0A=
>              if ( rc )=0A=
>                  return rc;=0A=
>  =0A=
> -            rc =3D resolve_old_address(f, elf);=0A=
> +            rc =3D arch_livepatch_verify_func(f);=0A=
>              if ( rc )=0A=
>                  return rc;=0A=
>  =0A=
> -- =0A=
> 2.32.0=0A=
=0A=
Reviewed-by: Ross Lagerwall <ross.lagerwall@citrix.com>=


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 14:37:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 14:37:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287012.486774 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRayF-0005VO-NQ; Tue, 08 Mar 2022 14:37:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287012.486774; Tue, 08 Mar 2022 14:37:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRayF-0005VH-K2; Tue, 08 Mar 2022 14:37:51 +0000
Received: by outflank-mailman (input) for mailman id 287012;
 Tue, 08 Mar 2022 14:37:50 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRayE-0005VB-LZ
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 14:37:50 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 53bf3612-9eed-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 15:37:49 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2170.outbound.protection.outlook.com [104.47.17.170]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-2-TLiBp7roPcaLgiXu49K6PQ-1; Tue, 08 Mar 2022 15:37:47 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AS8PR04MB9094.eurprd04.prod.outlook.com (2603:10a6:20b:445::22)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Tue, 8 Mar
 2022 14:37:41 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 14:37:40 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 53bf3612-9eed-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646750269;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=rmIB820mIJkMQVcBkt4Q3e7hNuolTUsMcT6sxtleA0w=;
	b=OOtGV5XYfm6aETb1sm8jI8wq30ueusQeLyvRdBUTkYv4DB3d4x3hkSea6YEyUR8eHapoVn
	1ph66jMyg5Miy5b5N3oSkA5c8cjXtDLzBlChsb19ERiFePoZ4ucy1H27yXnF+X/TuYThUQ
	VmnuRB2DfIlUFZOokdYaB9C6Yyi1fKU=
X-MC-Unique: TLiBp7roPcaLgiXu49K6PQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=cv9c7JF2wQlSX67PMnTvp18LGuSxuiBU1EDO76K/VeF2+nS/XSGcMSUkPyOgQJEMpXgC5krQ4NsPAowuKHrv5bnZ4Ip6Zno9m78DxfCjg+3vXm15FhoZcGNV6fSvFJdxN3DBjxeE5l6GdcG+qE+wgHos4ObW0VJsIu8Ee96In7OfGwO4Xiv3dnYBrWiBE9pOG3O9t32d3UWCXaMzJXYNuOSiTd9rTDUPz+8aPts3gcxKLz8cl4RjSoOgFplyQgSVN5uXQjAiLi5h071GcghIj8Ts/cBJNv/xZxMIe6VRtIIJ0IqN3JqOVtHm8R51z7qUdxUbMkDeEW2+jen9Oye8hA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=aYoeYTUrEsfdZN8EWGkJp4LDTrT0YyJ7/wR7cBQ7f5I=;
 b=iFD4Y2Vt5/9WnnL3+YXwvyzCXijeHcrc6LmLMoO5uxNJXP4i88HdCSTgw6DCxhWse2O9ruFJ6PBf50i/7pHG2X1pw4435hR1hISB8sq6slhokqshlhjAL4ccaKzCLabhizdFxSG8T9SPxYZaZ8nYnAxGFhRZzRvaCSdpb3wgKk2Fc7KAbGTBwWgEggZMBO0feMWR+dgBX3vg26UTz2vm8ViTR1/UwQdSJPG+HpS0ts251haf4Lrc1WNFy5p3spXljwfUpf/S75WrWSBdLPSOdJnUW2clueXvrk9vnE5zDDixJF5jxYpgpFR1r8myG1ZJWNUaKWOkY+TZe2ErPKuCWg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <18fb4115-94d8-16c2-e39b-1be895e254f4@suse.com>
Date: Tue, 8 Mar 2022 15:37:38 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH] x86/cet: Use dedicated NOP4 for cf_clobber
Content-Language: en-US
To: Andrew Cooper <andrew.cooper3@citrix.com>
CC: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Wei Liu <wl@xen.org>, Bjoern Doebel <doebel@amazon.de>,
 Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <20220308140126.8815-1-andrew.cooper3@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220308140126.8815-1-andrew.cooper3@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6PR05CA0027.eurprd05.prod.outlook.com
 (2603:10a6:20b:2e::40) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5d204083-8cfb-4125-402a-08da011132ea
X-MS-TrafficTypeDiagnostic: AS8PR04MB9094:EE_
X-Microsoft-Antispam-PRVS:
	<AS8PR04MB90945164530C9F36DF7184F7B3099@AS8PR04MB9094.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(8936002)(6486002)(86362001)(31696002)(38100700002)(2906002)(316002)(54906003)(6916009)(508600001)(5660300002)(8676002)(31686004)(66556008)(66476007)(4326008)(66946007)(6506007)(6512007)(36756003)(83380400001)(53546011)(186003)(26005)(2616005)(66574015)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?vCoMPziSL1b3d4jHwrgKxtrTruW3C9tn1945hg5JrsyfeaJh/EnjHDYRysgB?=
 =?us-ascii?Q?DnVyGNcqREOFJBp40r2e0Fq5KAenCkvCoHPiE09J3qhbdLoCgxReOzjaI6zW?=
 =?us-ascii?Q?Nu5cXtl/Q31/Yf0z3Tf4A1lv/eRBep9puZFFBiySyowjcVG6kJkz4PdQjLYO?=
 =?us-ascii?Q?B/qDhAdMpi+rz6UExRnDiFfNtv3PNq1SfxV8OHX4Ym7cwEXB3ej+/HvmqBtL?=
 =?us-ascii?Q?/Z0Y0+PhHpO2/HryG8zGArMGOgM0OXUgBDOsnBCzEpFGTMmr2ygCGESoA8lZ?=
 =?us-ascii?Q?KPcfBdfMbLBkrGCi2YMFNVMsbF7djPd4xtN/DKK5xtnyHuTAdZr3ZcOlHN9i?=
 =?us-ascii?Q?i6fzeRII2kfFlxFjeoHg0rvwfTtNCap9fQjLok+DVqYze4LGT6ui7h9xo/LC?=
 =?us-ascii?Q?ppSP5vl+sU/9G64HJd14GjNE6hJx31bLLzQA68iLXFxckqyXN/+VS/e2Vttr?=
 =?us-ascii?Q?bPYjnvjn17FOaqj1RzVUuq5EvARKkCT9MToA5z427lGDFskIBSQM0k01R79f?=
 =?us-ascii?Q?C+Hym4WIZv0LCrO1wg1mHCY4/PI928NCq18p3ZgqvjH2QBKhiBhzawtny6fk?=
 =?us-ascii?Q?OhVkyoQIBjgkexwGgyG4qon5GMgcKobP6g5nmgs7OAW9Ym9JL6uSRyeZTiXs?=
 =?us-ascii?Q?gMuFkM21D8ezm7G2f4K5f75qnj3oBmfCfQW4APqhq0B64vySQ5HRml9tJMBk?=
 =?us-ascii?Q?NK9HXqDcXge+whQFB1mWqGTblhn1nb3G+9ebuH68ZjdPeHRt2YpiOsp/cjt+?=
 =?us-ascii?Q?syY5yBzzg8/k2M7O36FoLaPEKYKKvhgmvE862EUkaP6e/380+ip+nG/OPZMg?=
 =?us-ascii?Q?XslNdYIBjBsCnemPZm78yxAIKXNTSptdzDkng4OXP36nYJtSIkpJFOR02C7F?=
 =?us-ascii?Q?zBSY51P14rGoIJ2JgCyAyqy8iqkgLFRRi5TPk2enIMUW5RAt4GXt7Hu0WQGv?=
 =?us-ascii?Q?OwcIqVqnW4a9sk7thBuUEShkXeA3OQv3PJOEnMbh2evkjyxMoWPCm5yS2sHC?=
 =?us-ascii?Q?GjSU9IXeq+is4rAeDOmpML+24lV2fwqzVYxpfBTVmucsXSvzeNwBGy1IAYKX?=
 =?us-ascii?Q?sHsTJCzF8qrzwSU81V4mhGe6O1N4WVT2yQMfOSP1KeJuVA+cEVjOIb+hCFiU?=
 =?us-ascii?Q?UVw5rPgozuFjOb3tPGN0fF1McknsnvjLRpqPWW09b7LRiXtTFNiFgh0Fn8Ih?=
 =?us-ascii?Q?CPZ/USDG8rKmUIyB2D9GaedT2jNo48Ok4loi15eaiKrXlxDzpYu68SH3G1BD?=
 =?us-ascii?Q?QqeluU8odysKfhu9XhhRNONHilBQCm+J5COSGBicggQoW+EKRy+u6vwPoxYh?=
 =?us-ascii?Q?s8kb1SqIWLjna8d9kycZD2OriMO+42jMPj7cu3HF+P0IGSylknR7uAAEWYUd?=
 =?us-ascii?Q?TfpI3NBT7SvynFf4xk8sRU32ThaFaGqRWE1a8Jq9eqGm4pYDtBj1qFNZBFB1?=
 =?us-ascii?Q?TWkDgtxPQqvuJzUG5/DfYOkPae9YM550Xs2S77MGbGuJsMTl75PZiYixn2/X?=
 =?us-ascii?Q?QGlobswfLm5PuvRvS5VRXk/wduV8Da40p3eKNKo0JE3E5eMueZh6sP2vExPO?=
 =?us-ascii?Q?lasiwwN+4Zi5BAnlBfyuBqIbLQUcqRUQ/7iyJNqF8E7rQ8/FLVg4i6s292DO?=
 =?us-ascii?Q?XoxchNBp1G69dSDHx+2iaZU=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5d204083-8cfb-4125-402a-08da011132ea
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 14:37:40.7880
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: eGeN5T05oSZj+O91H1o+8sLf588Aluc2VSZ8PO8rlELBjFId9FCDsI8tqVEKLOHyWnXktrfUPizL4Bsy7guZGQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR04MB9094

On 08.03.2022 15:01, Andrew Cooper wrote:
> For livepatching, we need to look at a potentially clobbered function and
> determine whether it used to have an ENDBR64 instruction.
>=20
> Use a non-default 4-byte P6 long nop, not emitted by toolchains, and intr=
oduce
> the was_endbr64() predicate.

Did you consider using ENDBR32 for this purpose? I'm worried that
the pattern you picked is still too close to what might be used
(down the road) by a tool chain. If ENDBR32 isn't suitable for
some reason, how about "nop %sp" or "nopw (%rsp)" (and then maybe
even "data16" substituted by rex, cs, ds, es, or ss)?

One neat thing about ENDBR32 would be that you wouldn't even
need memcpy() - you'd merely flip the low main opcode bit.

> Bjoern: For the livepatching code, I think you want:
>=20
>   if ( is_endbr64(...) || was_endbr64(...) )
>       needed +=3D ENDBR64_LEN;

Looks like I didn't fully understand the problem then from your
initial description. The adjustment here (and the one needed in
Bj=C3=B6rn's patch) is to compensate for the advancing of the
targets of altcalls past the ENDBR?

> --- a/xen/arch/x86/include/asm/endbr.h
> +++ b/xen/arch/x86/include/asm/endbr.h
> @@ -52,4 +52,16 @@ static inline void place_endbr64(void *ptr)
>      *(uint32_t *)ptr =3D gen_endbr64();
>  }
> =20
> +/*
> + * After clobbering ENDBR64, we may need to confirm that the site used t=
o
> + * contain an ENDBR64 instruction.  Use an encoding which isn't the defa=
ult
> + * P6_NOP4.
> + */
> +#define ENDBR64_POISON "\x66\x0f\x1f\x00" /* osp nopl (%rax) */

In case this remains as is - did you mean "opsz" instead of "osp"?
But this really is "nopw (%rax)" anyway.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 14:39:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 14:39:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287019.486785 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRazV-00068v-5D; Tue, 08 Mar 2022 14:39:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287019.486785; Tue, 08 Mar 2022 14:39:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRazV-00068o-1t; Tue, 08 Mar 2022 14:39:09 +0000
Received: by outflank-mailman (input) for mailman id 287019;
 Tue, 08 Mar 2022 14:39:07 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LykH=TT=citrix.com=prvs=059d7c239=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nRazS-00068d-Va
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 14:39:07 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 801225a0-9eed-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 15:39:05 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 801225a0-9eed-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646750345;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=OF7bA9OK9cexKqJFMgvhty+hNFt6bBzfp59jrkPuOMo=;
  b=RKwMYhaq00gOejuj35ix3l9h+1CISZoY3mBCIGnzpjn3XzbRrqz3PJX2
   vpkp91RKc08884Jl1F4EjV+6ZL6eis5MNyLZ0W252vMzKNwymTRZFeiGQ
   k07mxP7ZtzYN1Bcjc8IAyTdxVwus1wM+TajSansMqMMpct/U+B6/ZwpoD
   w=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65708776
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:OFzvKK8xHDJJtFJ9I2pXDrUDsX6TJUtcMsCJ2f8bNWPcYEJGY0x3z
 TBLD2qAbPaMazSme94ia4Tk8UNQ6JKGyYM2QQdoqi48E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oDpW1nlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnabqUh4oB5SdosIUcRBhHhpPZ5VP1qCSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFKoZtmtt0nfyCvE+TIqYa67L+cVZzHE7gcUm8fP2O
 ZdGMWowM0qojxtnAlNGFpQaxdaUm1L4XmdI8mKkm6oL7D2GpOB2+Oe0a4eEEjCQfu1ZmUuSq
 2bu9mHwEBYcctCSoRKH73ati+nnjS79HoUIG9WQ5vNsxVGe2GEXIBkXTkeg5+m0jFakXNBSI
 FBS/TAhxYAx80qxR9W7QBy8o1aDpBcXX9cWGOo/gDxh0YKNvVzfXDJdCGccNpp276faWADGy
 HezxcjwBAVW4YezQFCUz7qvnGmKMAYKeDpqiTA/cSMJ5NzqoYcWhx3JT8p+HKPdsuAZCQ0c0
 BjR8nFg2ux7YdojkvzioAuZ227ESo3hE1Ztjjg7SF5J+e+QiGSNQ4WzoWbW4v9bRGpyZgnQ5
 SNU8yRyAQ1nMH1sqMBvaLhVdF1Kz6zcWNE5vbKJN8N5n9hK0yT/Fb28GBkkeC9U3j8sIFcFm
 nP7twJL/4N0N3C3d6JxaI/ZI510kfa+SoS4DamEM4Emjn1NmOmvpnoGiam4hTyFraTRuftnZ
 cfznTiEVx729piLPBLpHrxAgNfHNwg1xH/JRICT8vhU+eH2WZJhcp9caAHmRrlgtMus+VyJm
 /4CZ5ri40gOC4XWP3iImbP/2HhXdBDX87it8JcJHgNCSyI7cFwc5wj5netxK9Y7zv4Oyo8lP
 BiVAydl9bY2vlWeQS2iYXF/crL/G5F5qHMwJys3Oli0nXMkZO6SAG03LsNfkWUPnAC78cNJc
 g==
IronPort-HdrOrdr: A9a23:RtbHhK9W4cgDv+RUCp1uk+F2db1zdoMgy1knxilNoENuHfBwxv
 rDoB1E73LJYW4qKQwdcdDpAtjkfZtFnaQFrrX5To3SIDUO31HYYr2KjLGSjwEIfheRygcz79
 YYT0ETMqySMbE+t7eB3ODaKadg/DDkytHRuQ629R4EJmsKC52IrT0JcTpzencGHzWubqBJcK
 Z0k/A3wQZIDk5nCfhTaEN1PdTrlpnurtbLcBQGDxko5E2lljWz8oP3FBCew1M3Ty5P6a1Kyx
 mEryXJooGY992rwB7V0GHeq75MnsH699dFDMuQzuAINzTXjBqybogJYczAgNl1mpDs1L8Zqq
 iJn/4SBbU115oXRBDynfLZ4Xik7N/p0Q669bbXuwq6nSWzfkNENyMIv/MmTvKe0Tt7gDg06t
 M644rS3aAnfC/ojWDz4cPFWAptkVfxqX0+kfQLh3gaSocGbqRNxLZvt3+9Pa1wVR4S0rpXWN
 WGzfuskMp+YBefdTTUr2NvyNujUjA6GQqHWFELvoiQ3yJNlH50wkMEzIhH901wua4VWt1B/a
 DJI65onLZBQosfar98Hv4IRY+yBnbWSRzBPWqOKRDsFb0BOXjKt5nriY9Frt2CadgN1t8/iZ
 7BWFRXuSo7fF/vE9SH2NlR/hXEUAyGLELQIwFllu9EU5HHNcjW2He4OSMTeuOb0oAiPvE=
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="65708776"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=N3HVZfxfi8LT09oY1KCbLmrmHKp/qqdkbIWcrw2NFM9pl/EjiVSh4W1vrZSYcrEcUl1uT+RdADLAX2FOQQ/IMNG7QY4KuWpjU4elq259Gfiud6Eg362v/tJTC/bx13nGiDhQ1LgeyRERKMhWiYYs3pPAUHBiMI4mmBQd8W6YoHPot1JJhJzrkkUeV02dgh+OWBfQPB4ZV/q9H61i2EA2JP0s5t/pRsiOfm+of0BkEKvK9Gy+0dtNSOKomW8C+J1Rrf0IU5YiQ+syZ6hqXn24v0tVFtSHHHrzTEyRrSEUanqgapFxrtSkBEghcfWt1oS+/K5lW5HuH2/khHZSBQ4z1w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=OF7bA9OK9cexKqJFMgvhty+hNFt6bBzfp59jrkPuOMo=;
 b=ReRqBIEg2DDroVr/XCWPuhiJjwqLOTZyWL1AdRVOzXE4P96VFbghugbmLs9Lx3CFexSKdOt9eDSjjNUrehigRUEdIeHMrsqekzs640p7NodQgX+HNJias+6kFid/+uBSX6Y4SKawgt863a2hXHrcK/i2WuAP9/MitFWKxH4oQiNHnLh+3t4ppgCAWMoUZ0bGujvCY+6pCm1Qh9P90Xn7yEOapFNcGSX9GOF8LsJ6dSA5dfHeEBnoNPpPwlD5KFKRn5M5kEd25Mk1RsjPb8ddWFuOil9IRYUPj9vNn3TwU9CcPAqH3pTQmWBH+XN/hHEJ6Gfv13+HsDvq8u9MgiMF5g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=OF7bA9OK9cexKqJFMgvhty+hNFt6bBzfp59jrkPuOMo=;
 b=DDbsoyo8UTJ5mxVOscr9wu1OVFPLTz2lYNWVBN2RfdQtwtIq2T60S/EKtfovM0j8A1uOz8FNYE0v/5Rkz5AxamnOAUa7rZpTIvvdBKLUvJa8bF9BNHm1KfdED4KjTXFKK4rJnlZTedQ5lCnvdwCYvRufKN+QTnuuq/yNwPFusqs=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Roger Pau Monne <roger.pau@citrix.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Ross Lagerwall <ross.lagerwall@citrix.com>, "konrad.wilk@oracle.com"
	<konrad.wilk@oracle.com>, "doebel@amazon.de" <doebel@amazon.de>,
	"julien@xen.org" <julien@xen.org>
Subject: Re: [PATCH 4/4] livepatch: differentiate between old and new build
 systems
Thread-Topic: [PATCH 4/4] livepatch: differentiate between old and new build
 systems
Thread-Index: AQHYLkHgSrb/iAL0mEi291/GjB3zE6y1l+sA
Date: Tue, 8 Mar 2022 14:38:47 +0000
Message-ID: <32b098c1-963f-2e03-84bb-c8db410c8554@citrix.com>
References: <20220302142711.38953-1-roger.pau@citrix.com>
 <20220302142711.38953-5-roger.pau@citrix.com>
In-Reply-To: <20220302142711.38953-5-roger.pau@citrix.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: f890e089-04fc-47a4-3288-08da01115abc
x-ms-traffictypediagnostic: CY1PR03MB2331:EE_
x-microsoft-antispam-prvs: <CY1PR03MB2331B40105D05E155DF6BB70BA099@CY1PR03MB2331.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(36756003)(64756008)(66446008)(316002)(66476007)(86362001)(2906002)(31696002)(8676002)(66946007)(91956017)(66556008)(122000001)(83380400001)(4326008)(31686004)(508600001)(71200400001)(6486002)(186003)(2616005)(8936002)(38070700005)(26005)(54906003)(6506007)(6512007)(38100700002)(82960400001)(110136005)(53546011)(5660300002)(76116006)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?WnpZdEdBNllxdENLWUlGMEVtRXpKMElIRmF0SXh3SkFjWi9DQzk0Q1FxdHY1?=
 =?utf-8?B?MlZUVTcyOHdTN29MZjlhaSs5RHc0dHBzbUdlcnNmRUdnMEtWcVgrVVRGaGd3?=
 =?utf-8?B?QVJyT0RSbzRkT1lNWDRwNVNQVkZ2SnlnUEs5KzBQRkk5bDFNOFEvQ2lnZ1N6?=
 =?utf-8?B?cjd5WExISjFCNDJCMDlqTi94cVJHbTdSSENvUU1aQkZoZ05oTlprRTN0QUcx?=
 =?utf-8?B?NlhmaHZoTWtaTU4vazhUZlFCMlNmbStacm1VVVFsT1NGdmp3cGdHTGthK2Y4?=
 =?utf-8?B?ZGJNbE9JakEvYWRwSHZ4dEd3MUVoaGh3OXlHT0xKZmVNSlZLMnZYYzl5NkYy?=
 =?utf-8?B?K1RVNzBUSDJoSkZXZkwxckNXRmdkdU1aeXVZRXV4YnNidFMvQ3E1ODVVODZO?=
 =?utf-8?B?ejNOSnFsbml6SGJhWDFKKzJUdVkvTGUvbzJzYU9xQzFqeVBWT0RiN3h5eGta?=
 =?utf-8?B?ZG5lK3dkdXdxQU9nOVA2NE5DREU1U3NLMlM5WThFSlk2T0NrSFQrMGVUMmY1?=
 =?utf-8?B?azBpQXVRNFZtT3IrTUwzMDNBNU5VOWxTMExCMXpxQlB5cjNLaWt5Y1A3OFZa?=
 =?utf-8?B?SDFIMVA2UEFnZkcwYzQ0YXd2TFlOMmRseFk2MkxzY2l4MWNubWNRZzE4VGh3?=
 =?utf-8?B?MFJCTlZJNE9SUnU3QlpPTHRmU095dnF6NytFOFh4WkU4UmN2cXdFbnB3TjNO?=
 =?utf-8?B?OVVhSmRHSmxEc0NicGJUeHh1QU1oZlBoMjdlUU0xdVE3RXplWWVLL2tDVWV5?=
 =?utf-8?B?Vyt6a21QSDdJenU4RWRuclY5UENiNklaNEUzQjREdTJCU2pTTlNydm1EV0dl?=
 =?utf-8?B?YlJ2ODh5YytPL1pRN285WUZNS0x0MWV3dy9PbTBseTcyeHlxdlE1NjVMTlY3?=
 =?utf-8?B?OElIZ2pQTFgzYUlOYXhGeEcwV3d1aUVJSmtIUjlzR0JoWVpoK2x0aXpPRVpy?=
 =?utf-8?B?b2s0TGt6U29aQUxIZy9VcUJaRk52MHVtSmdlYjY4YTMvb3J3amwyeXI4VXJV?=
 =?utf-8?B?Uk80WUxzREpncGRvbUFVQVB3RXVnWjFSS1pzRmFmVVhwbWpua1RPSUFQNnlQ?=
 =?utf-8?B?WHhYNUpwdllPSTY0alYwcE9Hbjg3OWxwakc1K1FwdGF0am8yU21JUGVSb01Y?=
 =?utf-8?B?bVptZE9OODFvaGFQNXNOUHVzb2lKNHFrTkd4NlRhb0czS1pva2pjOVNlRGsr?=
 =?utf-8?B?TWNIY0Z6WXl1T2haakVJaUtmSm5TbzQwNnI1a0syOFA5VHVLa3l2UDVlWUdW?=
 =?utf-8?B?SkpkaFZkSWg1WUk2clB2a1FFdFhLb0lxc1ZzdGgzTUNWMnZ6YzkxbkI4WVZI?=
 =?utf-8?B?bEdOakJJYlJFcmU4dE13MytyK05rMVY0aFV6bnp5bW9KSlkvNDc1N25kclJu?=
 =?utf-8?B?TTM0d0FIUFhKMXF0cTNHOGRsMWpvUjk3d25zV0pwMFdIdHVIQ3NwaVlHZDg3?=
 =?utf-8?B?Z2FMSTVCMzlIalpOa0xjaG04cmtnK2RVeTYzSi85d0lJckVLYThVZUFNUHEw?=
 =?utf-8?B?U25TWFRERzFVeFFlTCsvZ3Y2WTN4N3BKVit0TkVLdHZuR2lZMFNaMklyQ243?=
 =?utf-8?B?aW1zMWpIRGZwUTBwWXBmMnA4S050elhQREJTMDBXQVo2b2FOdm9naDRrU2dp?=
 =?utf-8?B?cURjRVFWVUllYXJMWjBURVNkellSQUpYQWRwbVJ6eUg5dXFtekRJYVR2Q2sx?=
 =?utf-8?B?Wlh1dkkzWFFML0F2VUhOd3EwR2FoWEFkRUllU0pNUitKbCtaSEszWTQzaTJk?=
 =?utf-8?B?QVlQZGZkSkFKcVpYYU9hZHVEMUJEZ3dmL1ZUVmtzVVRMT3F4NTh0TDQwaVBV?=
 =?utf-8?B?ZURwakV1QzBvRzFsSmRMNDlKUmVkY2VIZVZRb1VLOGJyUVNvTzlGVjhoR1lR?=
 =?utf-8?B?ZjVyVXFDUjFxbnBEd0dXeWdxcDUrMGZJSnMxR0RQSkg0WjRmcTZWN2MzZ08y?=
 =?utf-8?B?dHFLZUMvYVh5a2NWcTNqRE55SG9vR05ycytGV2lOWEZNN0RpQlRISGo1dXhy?=
 =?utf-8?B?RU1YdDk3WGhpaUUwTTNIczI4aEllbmlaSU1ZSzg0dG4xMmIybzI2Z2RSbmxO?=
 =?utf-8?B?MHB1L01MSzVJcFlyQlFSNG4yWXFhRGhoQk1sK1pXSkFGWUV0WGRNUHRLVjJv?=
 =?utf-8?B?UGFielZwRitJeEZDUUdPVzQvNkhkT1M0SDAzNG1QUzF0THZIZy9rYkJrbHFZ?=
 =?utf-8?B?NkJ4V01NMzVsT083TVhaZ1VCdGovaVRuTkk1NmdYUExlNXpWK21FSXhSTzYx?=
 =?utf-8?B?YUZsczBhRm0yUXVUYVU3TzkvZTBnPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <E3BF96ED1F8E0048BA7CDC2C80D70A8D@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f890e089-04fc-47a4-3288-08da01115abc
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Mar 2022 14:38:47.3295
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: bpJH80K2nhjG3vkXvjFCwLSWCkeZVTo0ay/vxnwn2GvHNbC7RprXkIvwIYAKfDQ6PJ6Vv2NCn08Z72PBMzKkuKP9TSO3qVZzJa9BchhzdvU=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY1PR03MB2331
X-OriginatorOrg: citrix.com

T24gMDIvMDMvMjAyMiAxNDoyNywgUm9nZXIgUGF1IE1vbm5lIHdyb3RlOg0KPiBkaWZmIC0tZ2l0
IGEvbGl2ZXBhdGNoLWJ1aWxkIGIvbGl2ZXBhdGNoLWJ1aWxkDQo+IGluZGV4IDM4YTkyYmUuLjY1
NmNkYWMgMTAwNzU1DQo+IC0tLSBhL2xpdmVwYXRjaC1idWlsZA0KPiArKysgYi9saXZlcGF0Y2gt
YnVpbGQNCj4gQEAgLTk4LDE0ICs5OCwyMCBAQCBmdW5jdGlvbiBidWlsZF9zcGVjaWFsKCkNCj4g
IA0KPiAgICAgICMgQnVpbGQgd2l0aCBzcGVjaWFsIEdDQyBmbGFncw0KPiAgICAgIGNkICIke1NS
Q0RJUn0veGVuIiB8fCBkaWUNCj4gLSAgICBzZWQgLWkgJ3MvQ0ZMQUdTICs9IC1ub3N0ZGluYy9D
RkxBR1MgKz0gLW5vc3RkaW5jIC1mZnVuY3Rpb24tc2VjdGlvbnMgLWZkYXRhLXNlY3Rpb25zLycg
UnVsZXMubWsNCj4gLSAgICBjcCAtcCBhcmNoL3g4Ni9NYWtlZmlsZSBhcmNoL3g4Ni9NYWtlZmls
ZS5iYWsNCj4gLSAgICBzZWQgLWkgJ3MvLS1zZWN0aW9uLWFsaWdubWVudD0weDIwMDAwMC8tLXNl
Y3Rpb24tYWxpZ25tZW50PTB4MTAwMC8nIGFyY2gveDg2L01ha2VmaWxlDQo+IC0gICAgIyBSZXN0
b3JlIHRpbWVzdGFtcHMgdG8gcHJldmVudCBzcHVyaW91cyByZWJ1aWxkaW5nDQo+IC0gICAgdG91
Y2ggLS1yZWZlcmVuY2U9YXJjaC94ODYvTWFrZWZpbGUuYmFrIGFyY2gveDg2L01ha2VmaWxlDQo+
IC0gICAgbWFrZSAiLWokQ1BVUyIgJFhFTl9ERUJVRyAmPiAiJHtPVVRQVVR9L2J1aWxkXyR7bmFt
ZX1fY29tcGlsZS5sb2ciIHx8IGRpZQ0KPiAtICAgIHNlZCAtaSAncy9DRkxBR1MgKz0gLW5vc3Rk
aW5jIC1mZnVuY3Rpb24tc2VjdGlvbnMgLWZkYXRhLXNlY3Rpb25zL0NGTEFHUyArPSAtbm9zdGRp
bmMvJyBSdWxlcy5taw0KPiAtICAgIG12IC1mIGFyY2gveDg2L01ha2VmaWxlLmJhayBhcmNoL3g4
Ni9NYWtlZmlsZQ0KPiArICAgIGlmIGdyZXAgLXEgJ25vc3RkaW5jJyBSdWxlcy5tazsgdGhlbg0K
PiArICAgICAgICAgIyBTdXBwb3J0IGZvciBvbGQgYnVpbGQgc3lzdGVtLCBhdHRlbXB0IHRvIHNl
dCAtZntmdW5jdGlvbixkYXRhfS1zZWN0aW9ucyBhbmQgcmVidWlsZA0KPiArICAgICAgICBzZWQg
LWkgJ3MvQ0ZMQUdTICs9IC1ub3N0ZGluYy9DRkxBR1MgKz0gLW5vc3RkaW5jIC1mZnVuY3Rpb24t
c2VjdGlvbnMgLWZkYXRhLXNlY3Rpb25zLycgUnVsZXMubWsNCj4gKyAgICAgICAgY3AgLXAgYXJj
aC94ODYvTWFrZWZpbGUgYXJjaC94ODYvTWFrZWZpbGUuYmFrDQo+ICsgICAgICAgIHNlZCAtaSAn
cy8tLXNlY3Rpb24tYWxpZ25tZW50PTB4MjAwMDAwLy0tc2VjdGlvbi1hbGlnbm1lbnQ9MHgxMDAw
LycgYXJjaC94ODYvTWFrZWZpbGUNCj4gKyAgICAgICAgIyBSZXN0b3JlIHRpbWVzdGFtcHMgdG8g
cHJldmVudCBzcHVyaW91cyByZWJ1aWxkaW5nDQo+ICsgICAgICAgIHRvdWNoIC0tcmVmZXJlbmNl
PWFyY2gveDg2L01ha2VmaWxlLmJhayBhcmNoL3g4Ni9NYWtlZmlsZQ0KPiArICAgICAgICBtYWtl
ICItaiRDUFVTIiAkWEVOX0RFQlVHICY+ICIke09VVFBVVH0vYnVpbGRfJHtuYW1lfV9jb21waWxl
LmxvZyIgfHwgZGllDQo+ICsgICAgICAgIHNlZCAtaSAncy9DRkxBR1MgKz0gLW5vc3RkaW5jIC1m
ZnVuY3Rpb24tc2VjdGlvbnMgLWZkYXRhLXNlY3Rpb25zL0NGTEFHUyArPSAtbm9zdGRpbmMvJyBS
dWxlcy5taw0KPiArICAgICAgICBtdiAtZiBhcmNoL3g4Ni9NYWtlZmlsZS5iYWsgYXJjaC94ODYv
TWFrZWZpbGUNCj4gKyAgICBlbHNlDQo+ICsgICAgICAgICMgLWZ7ZnVuY3Rpb24sZGF0YX0tc2Vj
dGlvbnMgc2V0IGJ5IENPTkZJR19MSVZFUEFUQ0gNCj4gKyAgICAgICAgbWFrZSAiLWokQ1BVUyIg
JFhFTl9ERUJVRyAmPiAiJHtPVVRQVVR9L2J1aWxkXyR7bmFtZX1fY29tcGlsZS5sb2ciIHx8IGRp
ZQ0KPiArICAgIGZpDQoNClRoaXMgcmVhbGx5IG91Z2h0IHRvIGJlIHRoZSBvdGhlciB3YXkgYXJv
dW5kLCBieSBzcG90dGluZyB0aGUgdGhpbmcgd2UNCmtub3cgaXMgZ29vZCwgYW5kIHRoZW4gZmFs
bGluZyBiYWNrIHRvIHRoZSBoZXVyaXN0aWNzLsKgIEluIGxpZ2h0IG9mIHRoZQ0KdXBkYXRlcyB0
byB0aGUgWGVuIHNpZGUsIHNvbWV0aGluZyBsaWtlOg0KDQppZiBncmVwIC1xIENDX1NQTElUX1NF
Q1RJT05TIEtjb25maWc7IHRoZW4NCsKgwqDCoCAjIC1me2Z1bmN0aW9uLGRhdGF9LXNlY3Rpb25z
IHNldCBieSBDT05GSUdfTElWRVBBVENIDQrCoMKgwqAgbWFrZSAiLWokQ1BVUyIgJFhFTl9ERUJV
RyAmPiAiJHtPVVRQVVR9L2J1aWxkXyR7bmFtZX1fY29tcGlsZS5sb2ciDQp8fCBkaWUNCmVsc2UN
CsKgwqDCoCAjIFN1cHBvcnQgZm9yIG9sZCBidWlsZCBzeXN0ZW0sIGF0dGVtcHQgdG8gc2V0DQot
ZntmdW5jdGlvbixkYXRhfS1zZWN0aW9ucyBhbmQgcmVidWlsZA0KwqDCoMKgIC4uLg0KZmkNCg0K
Pw0KfkFuZHJldw0KDQo=


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 14:41:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 14:41:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287026.486796 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRb22-0007XC-JP; Tue, 08 Mar 2022 14:41:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287026.486796; Tue, 08 Mar 2022 14:41:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRb22-0007X5-FR; Tue, 08 Mar 2022 14:41:46 +0000
Received: by outflank-mailman (input) for mailman id 287026;
 Tue, 08 Mar 2022 14:41:44 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRb20-0007Wz-Kf
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 14:41:44 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id df32c3d4-9eed-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 15:41:43 +0100 (CET)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur03lp2059.outbound.protection.outlook.com [104.47.8.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-34-sLsD5SIEPJWZaXxTb0Mhpg-2; Tue, 08 Mar 2022 15:41:41 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR0402MB3505.eurprd04.prod.outlook.com (2603:10a6:208:25::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.16; Tue, 8 Mar
 2022 14:41:38 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 14:41:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: df32c3d4-9eed-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646750502;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=+cgG0//hIHaspjE/CaTJsuSW09ANHbGVepaerfAXTuI=;
	b=ORe22/XbXOfMZryYSbjjGmoga6pLbTU1Y1fplzXwA0UUzx0Lh75eFBQWPDSm5aqmafJHgu
	xOmRKpqZw33d+JpyI87ZwsEiV1ASVhqTSdHeHdcj2NnQezAWa0+SaK3+efS/biyjQ+ajL8
	yjUGTbkzNUENvvr91gkfS2MLuhwvZx8=
X-MC-Unique: sLsD5SIEPJWZaXxTb0Mhpg-2
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=P0FrHZg8tmhoT1PXfF0Na8i+gH6HTA7MYs34R4Gcq4ra3nlbLaD6VA/bbTY7q/FSALXGnkcJb9dtSPVs/7Q9VuXtdmwQzY2KP+v9f+X447XnR9pbxKZvcy7JXQZjld17ixbk6O7eM1zPHIh68cgMyRMcKUYS0VSBuVh9/fRx5nBOnkXqXJPhtb0hbo+7GfmKqwzTK2DquZyT4NWVdqLJunlg9pEDdY7FS9akxhdocxI8cXLxD5xjqusaZPZTdtEd+Qh9Utp1J9Kbel+xwajk1acS+hBw7cQ7g1DfLeXE3aZhJmqb/3bKHKzSPoO0nFSp8/9zEel8Qe0EhFAcHMZObw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=dRJbbw8RKZBUsizhXOee5Nq2pKGJMFK/bDcUUObziAw=;
 b=Q/GhT4/VQEyxtt/J3NTbODD5XuuU+Cj+uiKM+E7zI3rW5c4fxhr3IGWSP6TmTH66KlNgr8z7Gb6wEyi3si/YcM2/7Xp0sFSqsNDUahvZBS2lvhDnc8Ty7Tji3RgSYIJomxnQL+eS3YLYjCKOh0nCSNaBP98gVytv/Q9wG3OD8o++HXyP1xY3n/YXgoKwWXNP+SVGTZJRwbM0sQaxipW+wqpz3LMUG0OBm5t29AtFMJJDqvhAAFDhWZyF4nonhfQnbZjPDNYJnUzWLAbbv760nak43nnmkrI3Bp3R5bUfE6zmGbtbCY1c2L2+8RdaiSO5aBaBDCmcO1HhA8FOfNJPtw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <6a0f4d8f-581d-20cc-07bc-ffbf9a04cfe0@suse.com>
Date: Tue, 8 Mar 2022 15:41:36 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v5 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Content-Language: en-US
To: Jane Malalane <Jane.Malalane@citrix.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>,
 Anthony Perard <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>,
 Andrew Cooper <Andrew.Cooper3@citrix.com>,
 George Dunlap <George.Dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Christian Lindig <christian.lindig@citrix.com>, David Scott
 <dave@recoil.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Roger Pau Monne <roger.pau@citrix.com>
References: <20220307150609.10662-1-jane.malalane@citrix.com>
 <20220307150609.10662-3-jane.malalane@citrix.com>
 <YidAU63TsVO/X1Q+@Air-de-Roger>
 <b633f92a-151f-c7ca-0d91-cfad8d2edcbe@suse.com>
 <YidM/Wu5lqF48zg2@Air-de-Roger>
 <81dc2758-accc-25a3-7b3c-d9988757dd0c@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <81dc2758-accc-25a3-7b3c-d9988757dd0c@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM7PR04CA0011.eurprd04.prod.outlook.com
 (2603:10a6:20b:110::21) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 39a19afd-4de3-4e28-ea20-08da0111c0c3
X-MS-TrafficTypeDiagnostic: AM0PR0402MB3505:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<AM0PR0402MB3505E33917EF3FD55F6FE2BDB3099@AM0PR0402MB3505.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6486002)(86362001)(7416002)(38100700002)(31696002)(508600001)(8936002)(66556008)(66946007)(5660300002)(36756003)(83380400001)(4326008)(31686004)(8676002)(54906003)(2906002)(66476007)(26005)(53546011)(6512007)(6916009)(186003)(2616005)(316002)(6506007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?3Y7EekIci+Dmk0999cWSys/w7WUhCg5ZHeNhVyBLlVKKaubjFkhb81pPpRaL?=
 =?us-ascii?Q?gLpJWPmgE7fd+92AeTpj+JsUShBaXppvrKT2LilQAMSbd4jIGElOon6asDcV?=
 =?us-ascii?Q?DSPqal9VZW+7oFWLdGKO/U1yEIRBGIwKFyrAFysXC9hhoGQffOaOeD4wXJgP?=
 =?us-ascii?Q?B1pN3T+IsaplThzD4LC1C9A9gqHfial0KMzqXBF/zEkrTrYwhGaZyOVfh+WC?=
 =?us-ascii?Q?uWfMdJLKQHNZq4vm0F15zPNmzcMq037mMjDD1HiFNjpH/duXttb9F3DnDsGz?=
 =?us-ascii?Q?64kRnvWje7YDyCnm6v1NLp6NyQ6yREZ1m97PMLp4VWLrhD9o3q96nlKRKxsw?=
 =?us-ascii?Q?xOCcKm/K4McCr3xrFSYjltEAXwODh2/GNl9hxSPe/EjsIKhVJeypL9UHC+NW?=
 =?us-ascii?Q?vmfKvej67mUPQPRmJRiFvUpuuQ7d/4vG3zQLnwEqqxIsU+oELAw+0WibSe7P?=
 =?us-ascii?Q?X01Nclc69OJXNIwzGn3HSIsYft7bUJ1ae32Xon+cC520FYNf80H3V90wc2jl?=
 =?us-ascii?Q?hmGAEAEX0rGsu7qEZ0CLyvWDKwpANNH2XQc9eILAaGT4JjmYiOetT9usbm9L?=
 =?us-ascii?Q?NxoOWTC5tNKlofZTK3gwSSrjIheHdgJoC/b8cSMM/jKQDiPdupMG+zDlR9xa?=
 =?us-ascii?Q?VRMCKRLcJKumEPGO3A6PLcxUM5LrzpZnfUcZ5QUuj1m3IJqao2JBmxaaVYVh?=
 =?us-ascii?Q?KXZKN/QZpvQrSnMZVZdBejYzKnW60l3FZNF3wNG7P9OleruK1GNwbJxT5A4M?=
 =?us-ascii?Q?RCwWJJZvN9zsgwHSWVSysvd9FHw459yJ8ilfo00EOnci5qzdnCLDahlWvgDQ?=
 =?us-ascii?Q?5ZU4LgJqaOey8CrSp6/8QeQbm23Wn9i8518BoS8n5JgHWvjjb/xx88Vc5L10?=
 =?us-ascii?Q?zOf+MNXnnOcbIv6KvD/CZjRQk7TlVye1+qqOieopq0nL3X8uwHZH2CGmigIr?=
 =?us-ascii?Q?LPJ4dbDuv9EV8se6ZJPVSraWoqtgqlU/2FAi2R+JePxXHYzAnuHTKBgQ64LT?=
 =?us-ascii?Q?h6AASpmS9YAY3/66v34rtIOHO1vat+Gath0H0ar9JPbUcyz77xGclLiGyjrs?=
 =?us-ascii?Q?+MVamIvj0TzFY8emEFUlJR6uqjVghwjy5P+BPFiY2b6Of8KXRh4McbOkBfrU?=
 =?us-ascii?Q?YRbuAhG9LkInN/fmND7caFR75ubLw42iI9q5g7ePg+DnRxQtYiz9leJq7yaA?=
 =?us-ascii?Q?4DOYWVcnfNw9SCIzZFKhLHc+Y8kWCjr37jFg9oSX5aGzB5g3Bkp0t5yuY3vV?=
 =?us-ascii?Q?Zy3ng9bTvD6F9//BRannZxcTBHro8O5C564Y144D2GT15OU/3pu+kAPWIhq9?=
 =?us-ascii?Q?LLyqCf38nox6t2ROq9FeqTFJFeDovQGPQuskbineefoq4Br7WXbdpYaBuEez?=
 =?us-ascii?Q?fDxXukPJcZxKeGppLUAsgL7/5pwEFR1kiyJl8Q6kJRbRQJiAxLTdGFkm/00q?=
 =?us-ascii?Q?DxNXet3sWpzQ8DXbo1Dr0Yf7WfcatTkDSUHh6+Ek6Ze4fkVjGxMp0rB/ZIi1?=
 =?us-ascii?Q?GGAvFb54l2Tyf3LGsaQoRIAM3zR8A92fN7N3rsE5ezQ7cWioayMpratBTy8k?=
 =?us-ascii?Q?6X+2TynblHtMqhFLAOksjqR3uVfgd+BuGZLn7/11349QkWsmJlyUo/odPNoY?=
 =?us-ascii?Q?CWRS9C0A5aGQx/0/OFQhCXw=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 39a19afd-4de3-4e28-ea20-08da0111c0c3
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 14:41:38.7889
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: s4I56YXh+tyn208k5NbBygouOY2zz7jbbxMTuRNClW90Netg6jPbTUyAAsMtzMILNHf3xqjUsONqFOJY+afgOQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR0402MB3505

On 08.03.2022 15:31, Jane Malalane wrote:
> On 08/03/2022 12:33, Roger Pau Monn=C3=A9 wrote:
>> On Tue, Mar 08, 2022 at 01:24:23PM +0100, Jan Beulich wrote:
>>> On 08.03.2022 12:38, Roger Pau Monn=C3=A9 wrote:
>>>> On Mon, Mar 07, 2022 at 03:06:09PM +0000, Jane Malalane wrote:
>>>>> @@ -685,13 +687,31 @@ int arch_sanitise_domain_config(struct xen_domc=
tl_createdomain *config)
>>>>>           }
>>>>>       }
>>>>>  =20
>>>>> -    if ( config->arch.misc_flags & ~XEN_X86_MSR_RELAXED )
>>>>> +    if ( config->arch.misc_flags & ~(XEN_X86_MSR_RELAXED |
>>>>> +                                     XEN_X86_ASSISTED_XAPIC |
>>>>> +                                     XEN_X86_ASSISTED_X2APIC) )
>>>>>       {
>>>>>           dprintk(XENLOG_INFO, "Invalid arch misc flags %#x\n",
>>>>>                   config->arch.misc_flags);
>>>>>           return -EINVAL;
>>>>>       }
>>>>>  =20
>>>>> +    if ( (assisted_xapic || assisted_x2apic) && !hvm )
>>>>> +    {
>>>>> +        dprintk(XENLOG_INFO,
>>>>> +                "Interrupt Controller Virtualization not supported f=
or PV\n");
>>>>> +        return -EINVAL;
>>>>> +    }
>>>>> +
>>>>> +    if ( (assisted_xapic && !assisted_xapic_available) ||
>>>>> +         (assisted_x2apic && !assisted_x2apic_available) )
>>>>> +    {
>>>>> +        dprintk(XENLOG_INFO,
>>>>> +                "Hardware assisted x%sAPIC requested but not availab=
le\n",
>>>>> +                assisted_xapic && !assisted_xapic_available ? "" : "=
2");
>>>>> +        return -EINVAL;
>>>>
>>>> I think for those two you could return -ENODEV if others agree.
>>>
>>> If by "two" you mean the xAPIC and x2APIC aspects here (and not e.g. th=
is
>>> and the earlier if()), then I agree. I'm always in favor of using disti=
nct
>>> error codes when possible and at least halfway sensible.
>>
>> I would be fine by using it for the !hvm if also. IMO it makes sense
>> as PV doesn't have an APIC 'device' at all, so ENODEV would seem
>> fitting. EINVAL is also fine as the caller shouldn't even attempt that
>> in the first place.
>>
>> So let's use it for the last if only.
> Wouldn't it make more sense to use -ENODEV particularly for the first? I=
=20
> agree that -ENODEV should be reported in the first case because it=20
> doesn't make sense to request acceleration of something that doesn't=20
> exist and I should have put that. But having a look at the hap code=20
> (since it resembles the second case), it returns -EINVAL when it is not=20
> available, unless you deem this to be different or, in retrospective,=20
> that the hap code should too have been coded to return -ENODEV.
>=20
> if ( hap && !hvm_hap_supported() )
>      {
>          dprintk(XENLOG_INFO, "HAP requested but not available\n");
>          return -EINVAL;
>      }

This is just one of the examples where using -ENODEV as you suggest
would introduce an inconsistency. We use -EINVAL also for other
purely guest-type dependent checks.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 14:46:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 14:46:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287032.486807 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRb6u-0008NE-6d; Tue, 08 Mar 2022 14:46:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287032.486807; Tue, 08 Mar 2022 14:46:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRb6u-0008N7-3V; Tue, 08 Mar 2022 14:46:48 +0000
Received: by outflank-mailman (input) for mailman id 287032;
 Tue, 08 Mar 2022 14:46:46 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fWwI=TT=citrix.com=prvs=059ab6e88=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRb6s-0008N1-K6
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 14:46:46 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 9236d3bf-9eee-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 15:46:45 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9236d3bf-9eee-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646750805;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=BainXa3cvDQhGc9K50Ki8EfFbUbKTlSpdwdoha6WAHY=;
  b=RDB3rGYqd43b64GIO+H1haSstMlviTNiuyvAL2igpmhgNapcrlQc/ual
   6E53819EeYGsm7XJ2uZmgfQ3oFpXeMvHTFlM1DyjPGlIzeyoHDDiNRmZG
   wSj7ol/DIMIKs131lWrZT1BiX6fQ9MJAX2Kx0dNaRLna2TzfxUIZJlAsn
   c=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66110360
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:o5MpCath3U5QDAGxmpj5I2glP+fnVKJeMUV32f8akzHdYApBsoF/q
 tZmKWHQOv6DMWHyKdB1btmw9EsB7Z/TzdBrSANp/i9jEy8U+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jV6
 YuoyyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi91JpfAp+4/CiMGDnpDO/BW/5zWGGCG5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AO
 ZNAMWExNHwsZTVfK0UFNa4Vk9uJrXvRKRpIqQmnt6w4tj27IAtZj+G2bYu9lsaxbc9YhFqCr
 2TKuWHwGAgHNce3wCCAtHmrg4fnoyT/X44DEayiwdRjilaT2287BQUfUB2wpvzRol6zXZdTJ
 lIZ/gIqrLMu7wq7Q9/lRRq6rXWY+BkGVLJ4DOkS+AyLjK3O7G6xBGIJUzpAY9wOr9ItSHoh0
 Vrht9H0AT1itpWFRHTb8a2bxRupIjQcJ2IGYS4CTCMG7sPlrYV1iQjAJuuPC4bs0IezQ2uph
 WnX8m5u3N3/kPLnyY3n5WrLvDiO/6KXU1UI4FjHWUG01xtAMdvNi5OT1XDX6vNJLYC8R1aHv
 WQZl8X20N3iHa1hhwTWHrxTQejBC+KtdWSF3AUxR8VJGyGFpib7Fb289g2SM6uA3iwsXTbyK
 HHetgpKjHO4FCv7NPQnC25d5ilD8EQBKTgHfq2MBjatSsIoHONiwM2ITRTIt4wKuBJw+ZzTw
 b/BLa6R4Y8yUMyLNgaeSeYHyqMMzSsj327VTp2T5035jeTAOy7IEu5VbQDmggUFAEWs+l69H
 zF3bZfi9vmieLemPnm/HXA7dzjm0kTX9bip8pcKJ4Zv0yJtGX07Cu+5/F/SU9cNokihrc+Rp
 ivVchYBkDLX3CSbQS3XOiELQO6+Bv5X8CNkVRHAyH71ghDPl670t/xBH3b2FJF6nNFeIQlcE
 6FVK5/eU64UFlwqOV01NPHAkWCrTzzy7SqmNCu5ejkvOZlmQg3C4Nj/eQXzsiIJC0KKWQEW+
 dVMCiuzrUI/ejlf
IronPort-HdrOrdr: A9a23:Sn+waK3SDQoKxjG7Gu3nOgqjBVByeYIsimQD101hICG9Lfb2qy
 n+ppgmPEHP5Qr5OEtApTiBUJPwJk800aQFm7X5Wo3SITUO2VHYV72KiLGN/9SOIVydygcw79
 YET0E6MqyNMbEYt7eK3ODbKadY/DDvysnB7o2/vhRQpENRGtldBm9Ce3im+yZNNW977PQCZf
 6hDp0tnUveRZ1bVLXyOlA1G8z44/HbnpPvZhALQzYh9Qm1lDutrJr3CQKR0BsyWy5Ghe5Kyx
 mOryXJooGY992rwB7V0GHeq7xQhdva09NGQOiBkNIcJDnAghuhIK5hR7qBljYop/zH0idgrP
 D85zMbe+hj4XLYeW+45TPrxgnbyT4rr0TvzFeJ6EGT1vDRdXYfMY5slIhZehzW5w4Lp9dnyp
 9G2Gqfqt5+EQ7AtD6V3amGazha0m6P5VYym+8aiHJSFaEEbqVKkIAZ9ERJVL8dASPB7pw9Gu
 UGNrCR2B9vSyLaU5nlhBgu/DT1NU5DXStuA3Jy9/B96gIm0kyQlCAjtY4idnRpzuNId3AL3Z
 WADk1SrsA8ciYnV9MMOA4/e7rENoXse2O7DIvAGyWvKEk4U0i93qIfpo9FoN2XRA==
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="66110360"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=TaPOWhLGJm8y/Pll84bVL0H6A7vKaSZv8of+Bi7zgAJmp09z4mjAwv7ubzDj1Zgn1ZlJAJHEb8manb98VnUsusfyXGBBSOT7iB1Hi3oH+DvSvBI4WtinjANFnZv0csDLvudXMfH36ryli/JV5igGOylwJaXawwHXPXcDHax9IqEJACCEzkI8PbJLp02BrsgwY6LZehPNr7HbdtLrVOFRoeZNpqnKns6wCBmuRmZeGeK9e6jlUenCp6uh2neAiRthLlLMLrrFWaY+7N9OCQhgriOFYNJsKaOY+jP+LOq+CgzNkQ4ph3An8xH7ujoFqZHcn6k193gi5Vn1lJg4WXiu/w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=kF/Y7x+EaR4NgtF/xj4yHlhreyRRqf4Q2AKZ4rRQWyI=;
 b=EuJgR6jKLTBGsq7bbwW8TCuusr8KRURwkeGfVLbWxOc+INhOLwIo8ve5aT/DoII/q2Ys6b6KOp/empc8JG9xQiZ2MEJs88lEOKsPzL59Ua684UYqaJhCGSHr91BH8fow92VLTvKCogHM3RDMBiCXY1DsjFCufJr/ihoQOu90VBu0w7bCLvlSO2xzypI4flSXmxDaUdL5JS1e11N8194iNTDE2T9Yk/13Ga8bw6AECp4sLJkICBaBEBgxIQfjplu3LxrPF7uuCwtRwUF5jM7iGwlk2Wao71Dh+GhGe554hq/RGYgnpU5ZtEgXbVWiSSE66diJ8wrre97zdOaLTe+5Lg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=kF/Y7x+EaR4NgtF/xj4yHlhreyRRqf4Q2AKZ4rRQWyI=;
 b=HaozPMwLbHjKIRy+1lmqkjISCRhdR4kCxnVB1xiHdnYz+9i4dUjE1OfJI1EYKPpw6uuzyjNSHyjGTyBka0nN/xIGK/wS1pLrjmnVx0P/QuksYpYp+UZp5eONdVth7OhpqkfoM7+pS81djcXB1T1GcAi5BFFhSGq4qE5X2N4pRrY=
Date: Tue, 8 Mar 2022 15:46:34 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v3 2/2] livepatch: set -f{function,data}-sections
 compiler option
Message-ID: <YidsSmPV1Pqulp+h@Air-de-Roger>
References: <20220308134924.83616-1-roger.pau@citrix.com>
 <20220308134924.83616-3-roger.pau@citrix.com>
 <c35415ef-b3c1-cc1c-2fb2-aa2de2602cd5@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <c35415ef-b3c1-cc1c-2fb2-aa2de2602cd5@suse.com>
X-ClientProxiedBy: LO2P265CA0087.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:8::27) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 4002a6d9-fe8b-4ee4-4d4f-08da0112738a
X-MS-TrafficTypeDiagnostic: MWHPR03MB2893:EE_
X-Microsoft-Antispam-PRVS: <MWHPR03MB2893D8814C80C4F3EAF3CC618F099@MWHPR03MB2893.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(6512007)(508600001)(6486002)(6666004)(8936002)(186003)(86362001)(53546011)(26005)(9686003)(82960400001)(83380400001)(5660300002)(6506007)(4326008)(66946007)(8676002)(66556008)(66476007)(33716001)(85182001)(2906002)(54906003)(6916009)(316002)(38100700002)(67856001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?TjVBK3Fnay9jKytLVm5Gd1c3M0VCdlNjOTRSTU9CWFROcmc5TzhrQjVxZktK?=
 =?utf-8?B?U2hETkFhT21Yb1dGY2JKa0tLMmtycGVKOUhSVHZBdU00cHFhekdrZ3d5M3Zz?=
 =?utf-8?B?T3VyN3I3bHNadFZ6ZDBkQXZzKzg1cGJoSWxvTkdGUWRjMWs3U0Z4U1V3MERG?=
 =?utf-8?B?azF1VkpqQmZLdURRa05JTkdxalRsTE96Zysxd0szdE1scURmQWxqMUVISHVw?=
 =?utf-8?B?bjMxOWdwMDBQOGRnanVLdDM2Z0xoUHpYbVFnZjFCV0IxdllkZjk5dFhqbGRD?=
 =?utf-8?B?d3g3MXIxR081bXhjYk5QWm5saXpJZTBKM24zMklRRCtnbzIvalVySFhyTjFI?=
 =?utf-8?B?SkdIUkYrNzQ0WmRQMStvb1JNVnpUVXBrdE9pUkNBVkw5Sy9XbmI5WE9MbTJn?=
 =?utf-8?B?MUdjd09rZllZL2pWdW56ZnFJYktCclI4bGJabTJQR1NlRlJHaHBPZHQ1OWI2?=
 =?utf-8?B?VTA2VHd3OStiRWlxdXM2T0dzYy9scWl5aFpZKzFhVTlZOWttNVg4NjF1d0hD?=
 =?utf-8?B?dlE4OVRyblBCRzFYczZMWG5kZElqTFJSd3IyZjdwalhkczZ0ZUVkbUVObnVP?=
 =?utf-8?B?WjJ1RThpWCtPeUpIei83ZHEzZXRJMkVlbnB5ZVdyUDlnL3haSEk0RFhOak1o?=
 =?utf-8?B?Vms0aTRSd1psRWVFckpNZCsxZ2o0TkhvU3llTEVWSHFMMUdIMHplV2Uya085?=
 =?utf-8?B?bTJlcDBBRm5SSFRPUHVLUHJSZGFBcFJGbTJMZjduMmt4bnpCUnhSZXVibC9D?=
 =?utf-8?B?Y2VsaU0vbU5UaXhwdEovVmliZGVPTU9HWnR1d0c3RE11WWpZcDFyOERpNU5j?=
 =?utf-8?B?YVEwT0VmbkYrbjJzaTJWbTNQZTE5N1l4MnlGSUh2TUdxWnhwZ2h0MkZPajh0?=
 =?utf-8?B?eWYwNktaT0R0b0tacUdUc1FyVFBsQXJMcXlIbEhDbmdvVloxMWxqTnI5L2w5?=
 =?utf-8?B?c0pKU3o0eFZzWk9wL1M3ellXNktVSTF2cWRrakFwYXJaRTRBT1p1aWNPZS9D?=
 =?utf-8?B?dzh2MWJzVlJKSmN0V0t4bzFIV1RRY0o5MzE5KzY2QnVDSzZwSEQvcXI5WGcw?=
 =?utf-8?B?dUsyNGNYRFF6UVhpTUZGeUhZVUt1aWRDbWZMbldKalJ2K0Jka09ETXQ2MXV2?=
 =?utf-8?B?QmwxQmU4Z0FObDk3Zy94OG1NeU9GVnFUM25jSDY4cFdiS1RmTHYzSzBZb1o1?=
 =?utf-8?B?dTBmY25YWlc0cTNidjI3WnVXVFFWL3NIYTF2UjRudFZibWdsRThPaU8xQUxk?=
 =?utf-8?B?WEtFcm0yeW5WWm9MTmJ5cjI2bTJnUHdka2ZramVPYjB5MmIwb3pDTUFuMzdP?=
 =?utf-8?B?MDhiVnlkUU12OVlyU1I0YjduZmxra2tNVmowdGhJRUJHVlI5Vkg3SzRKbXBh?=
 =?utf-8?B?RG41eXBxNjVwRzJmT0wxaFNGTGVlZG45RTA2VDJVRVZUeFdCUmNYVWd2bFcw?=
 =?utf-8?B?NUZZd2syWmVBQVE4YTBzbjlEc2F1M3F3RzRER24xbWhZZGhUSUJrNXprTDJv?=
 =?utf-8?B?QTFYMzR3MFNJU3ZnVVc4R0lsTkhPdnVnRHFGei9tTUpVTU83SU9KcDdyWDdH?=
 =?utf-8?B?STFuTlEyaEovSzNLU2tTTzVxQWF1MDhOMjBPRzBnTXZIdDRGb0o5Y0g3NWQy?=
 =?utf-8?B?a2RnZXF6VVZJeXRleWRUU3BEUjZvMDB3dVFGVEJCU09JTDF5emVIT244T1d0?=
 =?utf-8?B?d3gxdTk4WndKSGxZeGRsRlRFbGNPZkpJTE9BWTcrWEFoY2VOTjhrbmJHaHlD?=
 =?utf-8?B?WEFYblIrOVhKUDZ4Mms2R0RnVjBqTzdUNG5GUEFLMEhKTVZTbHphUDVoQXFT?=
 =?utf-8?B?cjlPS1Z4Z1RwOTY1S3RUM25xMXBkTmEvaVI3a3REMng2MGhYTEh6NTJtN1dJ?=
 =?utf-8?B?Qno4YW1TaWRRNms0WnZIRGs3YjYrbEM5YVJnT096dzZqYnZ0Q3ZTbnk1cE5D?=
 =?utf-8?B?OGpLRVZCSEVnUDUwbDZJY0xtVmQwVDNoY1BWaEVxM2VTOGxmalhqaTNyVEFj?=
 =?utf-8?B?N3lYa2h1b21ic0Q0NGszamxpWjJhM0lTQTM4NUcrcVM2aFBrcmZCQklCdFlY?=
 =?utf-8?B?ejh6R0w4V2ZOYWpRVVNXd1N1eE1KcytsaGhBNldjMXJjRS9hb2xjajgwRHQv?=
 =?utf-8?B?MlJwYWErUndoZisxUGZkM0cxdGFHSkpUZ2ZRTTJ4dGgrbFZJMW1oS0dhN05h?=
 =?utf-8?Q?FmA5C9uDAbz49HzdaY1gc1o=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 4002a6d9-fe8b-4ee4-4d4f-08da0112738a
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 14:46:38.7235
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: tvw3qwy2AGuEXbIOFJ35qYPRwGC7by4QVFKcyNjKTUBfSAgPIW3NaNAlH/nHJl2UDvXWd/w0Es51IpXKQnOrfQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR03MB2893
X-OriginatorOrg: citrix.com

On Tue, Mar 08, 2022 at 03:09:17PM +0100, Jan Beulich wrote:
> On 08.03.2022 14:49, Roger Pau Monne wrote:
> > If livepatching support is enabled build the hypervisor with
> > -f{function,data}-sections compiler options, which is required by the
> > livepatching tools to detect changes and create livepatches.
> > 
> > This shouldn't result in any functional change on the hypervisor
> > binary image, but does however require some changes in the linker
> > script in order to handle that each function and data item will now be
> > placed into its own section in object files. As a result add catch-all
> > for .text, .data and .bss in order to merge each individual item
> > section into the final image.
> > 
> > The main difference will be that .text.startup will end up being part
> > of .text rather than .init, and thus won't be freed. .text.exit will
> > also be part of .text rather than dropped. Overall this could make the
> > image bigger, and package some .text code in a sub-optimal way.
> > 
> > On Arm the .data.read_mostly needs to be moved ahead of the .data
> > section like it's already done on x86, so the .data.* catch-all
> > doesn't also include .data.read_mostly. The alignment of
> > .data.read_mostly also needs to be set to PAGE_SIZE so it doesn't end
> > up being placed at the tail of a read-only page from the previous
> > section. While there move the alignment of the .data section ahead of
> > the section declaration, like it's done for other sections.
> > 
> > The benefit of having CONFIG_LIVEPATCH enable those compiler option
> > is that the livepatch build tools no longer need to fiddle with the
> > build system in order to enable them. Note the current livepatch tools
> > are broken after the recent build changes due to the way they
> > attempt to set  -f{function,data}-sections.
> > 
> > Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
> 
> Reviewed-by: Jan Beulich <jbeulich@suse.com>
> 
> > --- a/xen/arch/x86/xen.lds.S
> > +++ b/xen/arch/x86/xen.lds.S
> > @@ -88,6 +88,9 @@ SECTIONS
> >         *(.text.unlikely .text.*_unlikely .text.unlikely.*)
> >  
> >         *(.text)
> > +#ifdef CONFIG_CC_SPLIT_SECTIONS
> > +       *(.text.*)
> > +#endif
> >         *(.text.__x86_indirect_thunk_*)
> >         *(.text.page_aligned)
> 
> These last two now will not have any effect anymore when
> CC_SPLIT_SECTIONS=y. This may have undesirable effects on the
> overall size when there is more than one object with a
> .text.page_aligned contribution. In .data ...

Agreed. I wondered whether to move those ahead of the main text
section, so likely:

       *(.text.unlikely .text.*_unlikely .text.unlikely.*)

       *(.text.page_aligned)
       *(.text.__x86_indirect_thunk_*)
       *(.text)
#ifdef CONFIG_CC_SPLIT_SECTIONS
       *(.text.*)
#endif

FWIW, Linux seems fine to package .text.page_aligned together with the
rest of .text using the .text.[0-9a-zA-Z_]* catch-all.

> > @@ -292,9 +295,7 @@ SECTIONS
> >  
> >    DECL_SECTION(.data) {
> >         *(.data.page_aligned)
> > -       *(.data)
> > -       *(.data.rel)
> > -       *(.data.rel.*)
> > +       *(.data .data.*)
> >    } PHDR(text)
> 
> ... this continues to be named first. I wonder whether we wouldn't
> want to use SORT_BY_ALIGNMENT (if available) instead in both places.

We could use the command line option if available
(--sort-section=alignment) to sort all wildcard sections?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 14:53:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 14:53:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287040.486818 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbCt-0001Ox-Vx; Tue, 08 Mar 2022 14:52:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287040.486818; Tue, 08 Mar 2022 14:52:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbCt-0001Oq-Sd; Tue, 08 Mar 2022 14:52:59 +0000
Received: by outflank-mailman (input) for mailman id 287040;
 Tue, 08 Mar 2022 14:52:58 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nRbCs-0001Ok-Ii
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 14:52:58 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRbCs-0002lP-4V; Tue, 08 Mar 2022 14:52:58 +0000
Received: from 54-240-197-236.amazon.com ([54.240.197.236]
 helo=[10.95.172.145]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRbCr-0000kX-UC; Tue, 08 Mar 2022 14:52:58 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=xAGpVn6ICxxQqGruhypNuS2n0r7aqLv7IlkJ+aRhPa8=; b=onrB034/fBRiTJo/ZudiDrLA/l
	zC6IVE3AMJ1/rHIp5vLKY+Yrka//hcAIDdH5zjMBpe+Ya4l0xSNiHVEFljH4LBmjuIXspRalYBSXA
	wWvk2OIdkE2yxHL4W1oJdctjIW5G3zbHh916zOGRuxTcdP3b9ATEptNs6gVW99ZlnKHU=;
Message-ID: <3dcefa20-829a-ca13-941b-ede25ef81813@xen.org>
Date: Tue, 8 Mar 2022 14:52:55 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH v3 0/2] livepatch: enable -f{function,data}-sections
 compiler option
To: Roger Pau Monne <roger.pau@citrix.com>, xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Jan Beulich <jbeulich@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>,
 Wei Liu <wl@xen.org>, George Dunlap <george.dunlap@citrix.com>
References: <20220308134924.83616-1-roger.pau@citrix.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220308134924.83616-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 08/03/2022 13:49, Roger Pau Monne wrote:
> Hello,
> 
> The content in v3 has been split in two patches, but is still mostly the
> same. The main difference is that first patch does a bit of cleanup of
> the build logic now that the header object file doesn't need to be the
> first one passed to the linker script.
> 
> Thanks, Roger.
> 
> Roger Pau Monne (2):
>    xen/build: put image header into a separate section
>    livepatch: set -f{function,data}-sections compiler option

For the Arm bits:

Acked-by: Julien Grall <jgrall@amazon.com> # xen/arm

Cheers,

> 
>   xen/Kconfig                 |  4 +++
>   xen/Makefile                |  2 ++
>   xen/arch/arm/arch.mk        |  2 --
>   xen/arch/arm/arm32/Makefile |  3 +--
>   xen/arch/arm/arm32/head.S   |  1 +
>   xen/arch/arm/arm64/Makefile |  3 +--
>   xen/arch/arm/arm64/head.S   |  1 +
>   xen/arch/arm/xen.lds.S      | 49 ++++++++++++++++++++-----------------
>   xen/arch/x86/Makefile       |  5 ++--
>   xen/arch/x86/arch.mk        |  2 --
>   xen/arch/x86/boot/head.S    |  2 +-
>   xen/arch/x86/xen.lds.S      | 22 ++++++++++-------
>   xen/common/Kconfig          |  1 +
>   13 files changed, 54 insertions(+), 43 deletions(-)
> 

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 14:53:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 14:53:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287041.486829 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbCw-0001f3-7k; Tue, 08 Mar 2022 14:53:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287041.486829; Tue, 08 Mar 2022 14:53:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbCw-0001ew-4Q; Tue, 08 Mar 2022 14:53:02 +0000
Received: by outflank-mailman (input) for mailman id 287041;
 Tue, 08 Mar 2022 14:53:00 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fWwI=TT=citrix.com=prvs=059ab6e88=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRbCu-0001R6-Ig
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 14:53:00 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 71157518-9eef-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 15:52:59 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 71157518-9eef-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646751179;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=I1WitbfWAxoZ0vvH/bHz2qmBA4KrfcaAqYYuhLVeTx8=;
  b=LptDJvfB9syc2kAFDUxoVSH2RxHP1GjJvIXXboMUcAshtTStEqgS/dpW
   4pvD0v/ejZt15SeXcrKDYrgRsmsgNMpGrN2oaA1vx4C4+TlUN5tPXbiiY
   dhzy8fLBmPlnBQf1Suu7LxU54g5VD9zn9Bav6t3Z403sTpn5f6+kcieZQ
   E=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65719511
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:21ZIKq3eMh84+9IbtfbD5fhxkn2cJEfYwER7XKvMYLTBsI5bp2cBz
 zMeUGqGPPneZjH3c4p0OoS38E1TvpLVmNJjHAc5pC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUw0YDja++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /1RhcOWERgjMZb9p/tATyhHHgZSAJ1JreqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHxO4wSoDd4xCzxBvc6W5HTBa7N4Le02R9u258XTKuHP
 qL1bxJAQRrPWBxRFmsvN6gwps6rnHbOQjRh/Qf9Sa0fvDGIkV0ZPKLWGNbSd9aHQe1cm0+Ko
 WSA82mRKhMHMN2SzxKV/3TqgfXA9QvrVYRXGLCm+/pChFyI2ndVGBAQTUG8o/Sylgi5Qd03A
 08T/DAnoe4t9UioZt7nVha8rTiPuRt0ZjZLO7RkskfXkPOSulvHQDhfJtJcVDA4nNMGGhpyy
 VWGpOLWGmFzgaKYbl6gxrjB+FteJhMpBWMFYCYFSy4M7N/ivJw/g3rzczpzLEKmpoarQG+tm
 lhmuAB73uxO1pBTi81X6Hia22rEm3TfcuIiCuw7tEqB5xgxWoOqbpfABbPzvacZd9bxorVsU
 RE5dymiAAImUMnleM+lGrxl8FSVCxCtamW0bblHRcVJythV0yT/Fb28GRknTKuTDu4KeCXyf
 GjYsh5L6ZlYMROCNPErPdzuW5lxlPi9TrwJs8w4iPIUOfCdkyfdoElTibO4hTixwCDAb4llU
 XtkTSpcJSlDUvk2pNZHb+wczaUq1kgDKZD7HvjGI+Cc+ePGPha9EO5dWHPXN7xRxP7U8W39r
 ocEX+PXmko3bQELSnSOmWLlBQtRdiZT6FGfg5E/S9Nv1SI6QDFxUaGAm+h9E2Gn9owM/tr1E
 riGchYw4HL0hGHdKBXMbXZmabj1Wo14o259NispVWtEEVB5CWpzxM/zr6cKQIQ=
IronPort-HdrOrdr: A9a23:aZ84GaF5b/Ts692wpLqFDJHXdLJyesId70hD6qkvc3Jom52j+P
 xGws526faVslYssHFJo6HnBEClewKgyXcT2/hsAV7CZnidhILMFuBfBOTZsljd8kHFh4pgPO
 JbAtdD4b7LfChHZKTBkXGF+r8bqbHtms3Y5pa9854ud3AQV0gJ1XYJNu/xKDwOeOApP+tfKH
 LKjfA32QZINE5nJfiTNz0gZazuttfLnJXpbVovAAMm0hCHiXeN5KThGxaV8x8CW3cXqI1SvF
 Ttokjc3OGOovu7whjT2yv66IlXosLozp9mCNaXgsYYBz3wgkKDZZhnWZeFoDcpydvfomoCoZ
 3pmVMNLs5z43TeciWcpgbs4RDp1HIU53rr2Taj8A3eiP28YAh/J9tKhIpffBecwVEnpstA3K
 VC2H/cn4ZLDDvb9R6NqeTgZlVPrA6ZsHAimekcgzh0So0FcoJcqoQZ4Qd8DIoAJiTn84oqed
 MeQ/003MwmMW9yUkqp/VWGmLeXLzYO91a9MwQ/U/WuonlrdCsT9Tpc+CQd9k1wg67VBaM0o9
 gsCZ4Y5o2mfvVmHp6VO91xNPdfKla9CC4kY1jiaWgOKsk8SgbwQtjMkfII2N0=
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="65719511"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=kUjw6t4YhYbxWV5ryWB8Gh5I7W283amLES/KCz8Yrvsvfb4gkAr9+3Xkl63uJKs7xAeMTqYx4jiYc87e+Cl9uaL73qZgQaro7rRKfuHXbi+XHNRF7Ginw3vJoT/KLe6GqlZVj7qXmL1nNeiD2wx3QOUWAuWgC3JKdMSQ0xQ0V6lUKn1ZwaonPYb2NkZQMjhz2jPz0p3NKOC90c99UXQlrnXVxC8fna582siold8h9Ec4aUghj8ZKJZ0miLAr7k9cWLvPjVwJGhlsAzBkq3gha48KfXO9oJ4D9zfdTdU535qX5atCFUZvUtqWEBTR/6jMm2uSMua+LkXAJP5Tdu0b1w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=nG0fC5JoZBpZSdRQVousvPLt3MTbVP6sArOWO3yEn7w=;
 b=aNuXL3xZFRGKyZGBUAmEXCOyve5ZOWAxvE/JmktfHqTKg2C3fKvz9tLbsXYwJbNQs15PmFCtf1OKR5fr6RCkK9J189oSYS2bMdXiVK6parhGjsc1zxYVfnUZOp2kEMHIp8ywnOKeH/1M4dY8L5uOScBDdI8hY6ZPqiL4gX24LTo3sXxFhtIxD5mF0Oe+SohtEJ5dZ86F9Z4Ze6bwzI1n/rfkNe8u1ECaYDL6gyTHx1WyqbU56oPFtKVkTeJH03dUINPmuiZCyAVE+W8jnb9d7zRhU0hpXjQmZ7X4GpPt26SB63ceU/jPt1jTgC5d+Ie3VoB15JNzy+EzO6C0FA3vrg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=nG0fC5JoZBpZSdRQVousvPLt3MTbVP6sArOWO3yEn7w=;
 b=M+k/iK/5CbvUoJOuVL5GbaL6KdzQpTn//9fiPHfJvTPw55wIiSOmbd4vKCWIlS4G82t4fxDEMSpG0aR5kBrWHpHl53BG1I2ictQYqM8cew2aQ6ZzcTOweaD1+gDXGoWA8NmESENM38V62vX0H96wxGoDlireh+Wo3qXNmWjTcvU=
Date: Tue, 8 Mar 2022 15:52:42 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "Ross
 Lagerwall" <ross.lagerwall@citrix.com>, "konrad.wilk@oracle.com"
	<konrad.wilk@oracle.com>, "doebel@amazon.de" <doebel@amazon.de>,
	"julien@xen.org" <julien@xen.org>
Subject: Re: [PATCH 4/4] livepatch: differentiate between old and new build
 systems
Message-ID: <Yidtuq8YUq+SbY7C@Air-de-Roger>
References: <20220302142711.38953-1-roger.pau@citrix.com>
 <20220302142711.38953-5-roger.pau@citrix.com>
 <32b098c1-963f-2e03-84bb-c8db410c8554@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <32b098c1-963f-2e03-84bb-c8db410c8554@citrix.com>
X-ClientProxiedBy: LO4P123CA0293.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:196::10) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c58324eb-7d23-43c1-5600-08da01134f95
X-MS-TrafficTypeDiagnostic: CO6PR03MB6306:EE_
X-Microsoft-Antispam-PRVS: <CO6PR03MB6306B4793F2C02628C21AB3B8F099@CO6PR03MB6306.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(8676002)(66946007)(6506007)(66556008)(66476007)(4326008)(6862004)(6486002)(5660300002)(6512007)(53546011)(6666004)(9686003)(86362001)(83380400001)(33716001)(316002)(186003)(26005)(8936002)(38100700002)(508600001)(85182001)(6636002)(82960400001)(2906002)(54906003)(67856001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?R21CalpwOStDTXdaNHUybXFqK29nV0E2b2FqUVZ1VC9jZXVTdHAreDcvOXlY?=
 =?utf-8?B?bDVZUkowdHdBQVJ0TkxONktZdEZ1c25NS3A2bHZ4bjFzV3ROWUhBR0M0R0tW?=
 =?utf-8?B?dHorMlFVS2d0eVVuWTJ3bk1QNklFS1ZKMW42Rlc3ZTkxV1d2MEVSSVc3b05Z?=
 =?utf-8?B?S2d6aEFqV3JXK0ZFSTVUeXNaYVJqSGVHTEhtdmM5VFVaeWZoWFBHMzFEVC9J?=
 =?utf-8?B?enIyR1lFaURXOEdCeDNBb0hHcVFkbFhmTW5ZcEpqWjg1dW1NY2Z5RW1ROXBS?=
 =?utf-8?B?YjBhTzBoT1V6MGk0SlNUbS9pYXpVYXlLT1MvT0t5dEpMWllKTTBjMHo4YVBr?=
 =?utf-8?B?aGhyNTQ3RlpQcmZLWVFHZUZ6dU11c0JieDhNVkhnYWpFeEhURE5TZys3ekxx?=
 =?utf-8?B?ell2VWpLNzBJM0tCV1RtNE4wQ1grMUtiTkN0cC93YldkN3pqK3h1ejVuYld5?=
 =?utf-8?B?RW5UcG0rRXp0Q3Q0WTBOWDZBaGJMbWlTWFdsOE5zYmxCYzlKcFlLUk4yTjRC?=
 =?utf-8?B?dkV3WXlobWtONUVSSXlBZENWSG5WM1ZRM2hLNU4rMnBMUlNrY1hlVkNRS2Ew?=
 =?utf-8?B?aE1hMkgzc25NK2Y1UktPSFE3MXRYc2ZrT1YzY2I0Tk1GTXpTTkZTeDVReW9F?=
 =?utf-8?B?NlBwcDZiaFVlODRJVDdBZktheEkza2dZd1NEdllmTzlKNWFUMEtpNlhyOVR4?=
 =?utf-8?B?aE8wUnYvSlkra0FQWC9GZG9VY1UxM1h3akljemRJeTE3MG15ZERNLzl5Z2c5?=
 =?utf-8?B?L3lzdFV0dDE1Ui9jZ25qMWZtTjNacVlxelZFTk1oUk11bVhJU3l5bk9Cc2lz?=
 =?utf-8?B?ak5xZHJ4U3Jra2pFWmYycUs5aHU4YXlLLzhreVhxUy9yTHhGbjVZNjAzVkNB?=
 =?utf-8?B?d3Rib2FNMUR4eTBIdDVCVDFuU1YyeC9DeEdCYmdMY2h1WEV0blFHZjQxUDc4?=
 =?utf-8?B?aTlpSFlPUG5WaVppYU9majlybXV3K2hpV1RBUUE4Vys4bm4rcndzTmEvMjZk?=
 =?utf-8?B?OTRONjV1T1h0aTFBOEc5N2wxV2NyeCtPNUI4dlVONUY5TjNKUUZ3Q1hISmQ3?=
 =?utf-8?B?bEVSejBXOGRDQUdmWG44QmVEK0xuNlBOemE4UUxaQWJ0c3RhcW1icWExSGtX?=
 =?utf-8?B?ZmFBUHp2YUEreHdMVlpTbGxybHZsMXB5SXVyRW9TSzRqOU5NbHJXVGZwa1hP?=
 =?utf-8?B?T2VsMTJrbHg1VEViUUNweXY0L0hSb2t2Q0s3dUhEQ3lDTGtkWEtvdk1GdzI5?=
 =?utf-8?B?TEhKZUVLU1pGbVhTdUpCa0x1cG9KOVpMRFczOUs2dVNXeE5FMG1hZnlNWEFP?=
 =?utf-8?B?dnFCU3h0QzNOTFZVSGl6aGhDNytweCs3YnhENFBBR1JFTFBxaTVvSTZYbmFj?=
 =?utf-8?B?QjZUSktYUWMycWhydjhHb3ozVjVlRjJqZEw2dVJlT3lPTVA5ZE10a1AzYjFY?=
 =?utf-8?B?T2ZVMnF5d2tYeXFUVlZ3OXZRTEpGK3I3QjhzVDVleTF6eHRZTWFwRWk5b1JE?=
 =?utf-8?B?eXNIeTNTR3o2eXh3MzJZb3QrM0tzN2lVem5LcFd0Tk9Ka1VQanlaYnNqNkNT?=
 =?utf-8?B?aUtrSTlKWmNpRjhMQldnYm9icVo1bU9FMjBQcFpYQlBldWhhZHZvcmNpaWR2?=
 =?utf-8?B?ZUh3cjF0WU1mejRQMzAwTktCMlA0ZUFUc3JYSVdIS1VIblJDR0dDcm5QRUxE?=
 =?utf-8?B?Vy9GTEthaitFSEE2UUM4Mi9yck5wM09HWGRSU2U5K3d2MXR6WWtmeUluMkpU?=
 =?utf-8?B?b2tPeTRnZjRqQ0o3Y2wyUVVJdDRXREl3M2l0SWtSSC9KdCswOVdTNkM5U2ZL?=
 =?utf-8?B?OUhEUGo5VVBET2hTZXRKaWwzNnA3MTMwSGpmT0hqV2hFVWh6azlLV1NGNkRQ?=
 =?utf-8?B?VVlDRTExZW04LzFrK2pHeURaUU8vRHlaS1lFV2F2OVpIWnh0dWNnemk0MkY3?=
 =?utf-8?B?b1FVNEdyRisyVkZzYXl6OTNpOTUvWXg1U1VnMmdBUTNpdDFtR2JQYjlIM2Qw?=
 =?utf-8?B?TXVPMzl1TDY2cStCOFplMnk3SVVqRzlXTHd6L3c0bVJNRDF0VjVQQzhjV2tw?=
 =?utf-8?B?eWhMOGZJWjUrL1RDaFYyM2N4emlCallzLytQQUFWcSttL1FZRmdxcjd4Zkdz?=
 =?utf-8?B?cW55WEQ3MU9SY1JoSGY3TUM5TVROb1VtRkM3Y2hCM0tHaFUrYlJVTm95THJ1?=
 =?utf-8?Q?p7APWkcDrkSbptlV3dJY1Qk=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: c58324eb-7d23-43c1-5600-08da01134f95
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 14:52:47.8945
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: PK2CNE7OnfQ81vwjGlrm8WiVOuvPvP+d5UlMReMAVlaOz8tZrvZe9fSbvN84+f10cBDUL+4aaHOCmg/JrVE1cQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO6PR03MB6306
X-OriginatorOrg: citrix.com

On Tue, Mar 08, 2022 at 02:38:47PM +0000, Andrew Cooper wrote:
> On 02/03/2022 14:27, Roger Pau Monne wrote:
> > diff --git a/livepatch-build b/livepatch-build
> > index 38a92be..656cdac 100755
> > --- a/livepatch-build
> > +++ b/livepatch-build
> > @@ -98,14 +98,20 @@ function build_special()
> >  
> >      # Build with special GCC flags
> >      cd "${SRCDIR}/xen" || die
> > -    sed -i 's/CFLAGS += -nostdinc/CFLAGS += -nostdinc -ffunction-sections -fdata-sections/' Rules.mk
> > -    cp -p arch/x86/Makefile arch/x86/Makefile.bak
> > -    sed -i 's/--section-alignment=0x200000/--section-alignment=0x1000/' arch/x86/Makefile
> > -    # Restore timestamps to prevent spurious rebuilding
> > -    touch --reference=arch/x86/Makefile.bak arch/x86/Makefile
> > -    make "-j$CPUS" $XEN_DEBUG &> "${OUTPUT}/build_${name}_compile.log" || die
> > -    sed -i 's/CFLAGS += -nostdinc -ffunction-sections -fdata-sections/CFLAGS += -nostdinc/' Rules.mk
> > -    mv -f arch/x86/Makefile.bak arch/x86/Makefile
> > +    if grep -q 'nostdinc' Rules.mk; then
> > +         # Support for old build system, attempt to set -f{function,data}-sections and rebuild
> > +        sed -i 's/CFLAGS += -nostdinc/CFLAGS += -nostdinc -ffunction-sections -fdata-sections/' Rules.mk
> > +        cp -p arch/x86/Makefile arch/x86/Makefile.bak
> > +        sed -i 's/--section-alignment=0x200000/--section-alignment=0x1000/' arch/x86/Makefile
> > +        # Restore timestamps to prevent spurious rebuilding
> > +        touch --reference=arch/x86/Makefile.bak arch/x86/Makefile
> > +        make "-j$CPUS" $XEN_DEBUG &> "${OUTPUT}/build_${name}_compile.log" || die
> > +        sed -i 's/CFLAGS += -nostdinc -ffunction-sections -fdata-sections/CFLAGS += -nostdinc/' Rules.mk
> > +        mv -f arch/x86/Makefile.bak arch/x86/Makefile
> > +    else
> > +        # -f{function,data}-sections set by CONFIG_LIVEPATCH
> > +        make "-j$CPUS" $XEN_DEBUG &> "${OUTPUT}/build_${name}_compile.log" || die
> > +    fi
> 
> This really ought to be the other way around, by spotting the thing we
> know is good, and then falling back to the heuristics.  In light of the
> updates to the Xen side, something like:

I'm not sure I agree. I do prefer to spot the 'bad' one, and just
fallback to expecting Xen to correctly set -f{function,data}-sections
otherwise.

> if grep -q CC_SPLIT_SECTIONS Kconfig; then

Because this logic ties us to not moving CC_SPLIT_SECTIONS from being
defined in xen/Kconfig (or even changing it's name), and gain ties the
livepatch tools to internal details about the Xen build system.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 15:09:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 15:09:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287053.486840 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbSQ-0003v0-Ev; Tue, 08 Mar 2022 15:09:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287053.486840; Tue, 08 Mar 2022 15:09:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbSQ-0003ut-Aq; Tue, 08 Mar 2022 15:09:02 +0000
Received: by outflank-mailman (input) for mailman id 287053;
 Tue, 08 Mar 2022 15:09:00 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRbSO-0003uX-MZ
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 15:09:00 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ae20d31f-9ef1-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 16:08:59 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2107.outbound.protection.outlook.com [104.47.18.107]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-19-sZjO3ipFPaiO3C4da1hBEg-1; Tue, 08 Mar 2022 16:08:57 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by GV1PR04MB9117.eurprd04.prod.outlook.com (2603:10a6:150:24::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Tue, 8 Mar
 2022 15:08:55 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 15:08:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ae20d31f-9ef1-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646752138;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=VDTNMt5+kzm3C7f8VQEZx8HbfVrBeviX92rPR2KqBZ0=;
	b=E+UtZHtXqq/LA6tNh4Lw8JWEafDbJhV81ocwqQ+r2ehGgAJ7Z19SbGy8JsQXTnn2QtFaUh
	CV/QLvHcpH02uvtY8fUvtRymrUeqFuq+/B83BGlOFFGZgCMuGuPcw4G6wt4VwlSROPDrzv
	La3xpNPeb+8xYZ9kuoqBcztGfpjeXDY=
X-MC-Unique: sZjO3ipFPaiO3C4da1hBEg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=dDE/+ni+530ahZto0ySYotFJ6gK7dKgPaCBFYH18xXlBYG62Y9ZlnThizumGjChgKfr8kwlv8q0diin+o3uaYa9kyJKEa70SbEuO9axyjR0LQnL3te+JwS2hqWL2/b44nFLa5n+KMjMK6XTIH2S2x1/kAXMh3p1aH8fc6IDbYgRTRnl6nf/1vuZ7QV8RKwwDqZQdTNKuqVA8huv1TQ7gh70IixGzETN25FzVBfKk0yjwgIru/N2r4GkkPFtg3XxkCxhlubru0yaUevOkrFjvNquSywMLiWsibWWzDal51iCRKhlNSLvxfEEmFvkF8uQPJtEW2GhDnrqp+RzGLO1kqA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=FCbFunXq3c2JMvBpJfTVRPoI07SaqOTI/5QgAngRxT4=;
 b=Y/r9C83GXzLcOFK7Y6GE7k6W4bF4z7pjoKl+p9RH5daY0s2dEklmv7PWJbUzLXEywyNnE0i/lFZdCBYpGj/gBqdrTnEDDEUOGKky9lmOuzoOL/277NLmvHrR/xwrBsbgRsU2tGLuRK8UH1XlG08PAemC/SsMh/GfNmojFdX3rZLp97UVG7mmwRsPwlRyymW04X78iZ32Ha4cNnISM539DqirlXdsPv3tN1VAWlTPXJB9Elzz0wu1HKK6HJjTk3jIPkw2JZJcTw1hVVreapVQBd3BWhtmDkmjZSP5eaAb+xHnjHKyfz7SCETksnvnORN+s5WCEClpuZ/dwF2NV+xhGQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <8f37e018-ab41-3e4d-14c7-1a25aa35e958@suse.com>
Date: Tue, 8 Mar 2022 16:08:53 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v3 1/2] xen/build: put image header into a separate
 section
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
 <julien@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220308134924.83616-1-roger.pau@citrix.com>
 <20220308134924.83616-2-roger.pau@citrix.com>
 <c2e15d35-91b3-ba29-eed0-92fa19a692e8@suse.com>
 <YidlvWBauhcrAQa1@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YidlvWBauhcrAQa1@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6PR02CA0001.eurprd02.prod.outlook.com
 (2603:10a6:20b:6e::14) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: cdc3cb6f-d85b-462b-be9c-08da0115906e
X-MS-TrafficTypeDiagnostic: GV1PR04MB9117:EE_
X-Microsoft-Antispam-PRVS:
	<GV1PR04MB91179CDB21CD167B8FE6F9BFB3099@GV1PR04MB9117.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(86362001)(26005)(186003)(31696002)(4326008)(8936002)(2616005)(316002)(5660300002)(83380400001)(508600001)(6512007)(6486002)(53546011)(6506007)(38100700002)(66556008)(66946007)(66476007)(8676002)(54906003)(6916009)(36756003)(31686004)(2906002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?dycEakbE75Fn9T7gvt8OA2iaqsv0Ikk6IWDRS1uXYnOKcGvm7dXdwh+GIHki?=
 =?us-ascii?Q?J4KgwuhXOiBSVu6xyIgBe77OTayY57MWQp/FYrwCOa5bX/HvfepXRRaU/9qa?=
 =?us-ascii?Q?Q4rOkxTpWIBSjxfyLs4GU6L1fQTm4cQ9almDy61O9iWp6eIVG+jZtiUl13D1?=
 =?us-ascii?Q?21DVbIrxh9bsSAmxgU8GmI1Zm8j7b/We/olUWA65gzs0Mf/jDOs3E4+fVbKR?=
 =?us-ascii?Q?7IOurauE/8ulcKxKoaQvj6MoLZjRmYK1U6risliYjAQdOjBbRbJapF737A3E?=
 =?us-ascii?Q?RIHK7H6eBRGDtfc5a0pg3XHc2ewb9b+SxFDAz/POdBeMDEiAPjKWa3mlAyXC?=
 =?us-ascii?Q?KL44KJ0/G4CP/VVAosuPSKARAMvDST4oe99bXifn91ui3/VaqnbvawXRd/92?=
 =?us-ascii?Q?rANUJFh6/QOrzC6orGpTK2/2Ild/IIeFvSXHtVQDAFSNSrlvw1ypfESocTxm?=
 =?us-ascii?Q?m3xsY8kibtb/jdUIAV854dHf+DrVejSczcDD1+JAz8bqceVtRCa5aFGlVhmS?=
 =?us-ascii?Q?uAKjea271S5BmT/pQa2Qj8AUkXrGkoanwkU8BNJwOsAVPMwxkQ8oH1BEqmCI?=
 =?us-ascii?Q?DUdMQvy2XJdO77T7gubL23NN4E37t9Em5tOEfv1tipdzSDaM2HaNGntVB44D?=
 =?us-ascii?Q?dq4YE9Fkjz4rtPTDLzKH+01vDTrUgNcWSJsxl8z//xzKsZPk58NJdmcpDVeD?=
 =?us-ascii?Q?xOJQJPMMZKOf3PkaOAvb0YhaqLazbUcMTaIK3f9Tdfu8snNMOzuCfcNN7Cee?=
 =?us-ascii?Q?PHBBWfxTERgpmReYvOyj8QR6SdvWi49lalupmGbjuAM03ws0CaQWnsSEkgdu?=
 =?us-ascii?Q?htaMJkwulPPJJ0wW6IlUn5xHt7M4pvB94Fdbxr5ziK4Sa/yLuwYg2VZMhZgK?=
 =?us-ascii?Q?y3dyNHRgWQluvOkelfPQB8PT4oZiYXBaBVM0xtOa6r5lbc+hV2I4iqx/5Lm7?=
 =?us-ascii?Q?UXiYXwyjVaTZL9x5gDRhhA4PMN2aDSEAf4/AvmzwSMT1Zk8MBFGSC2aCpAjJ?=
 =?us-ascii?Q?eQ/Jwhhg72DULHRJlPdRZd5va2Q7fc6oBS+bAa4u4imLPfYiTShkJzoWPLXy?=
 =?us-ascii?Q?H8HynLCN8lzI5ijChVtDzp9dBR45EKlZMKFDYSSxSTrVC1sRVtI2ksNSC0uY?=
 =?us-ascii?Q?7ZGmiLAEo6nFR0tBE/SmmuiBMesfobncNI7pMTxUrLUcArac4jr7Y3T9TuiO?=
 =?us-ascii?Q?ZjWaS4bx4XzaPDO6BjCyyASBfAcCtl6eq6RaoAuGPLBKu2Z/J7Jk1MY/10gw?=
 =?us-ascii?Q?/3YvkVyZ1qZlZnULRSxTaYVUygWpPG7tD2NZ2YIkFQYoG+A330LLK+YDznhm?=
 =?us-ascii?Q?NB/viwmhtnzhODE/2FAGLRHZWVmEZ4WJ6TOyHTW71CxBUzd1xCOwrlrgKlJO?=
 =?us-ascii?Q?FUoFVmbppekotoFpnsZA4fWVrnzcNVf36QwvupY6eST9Qq9FysvLIe2PNscv?=
 =?us-ascii?Q?a91LPKk9aY6YVU6fZzYf9yE3sfn6zx02uM8tr95WsSjEdl2AxZEVP+N76mQb?=
 =?us-ascii?Q?ulXwt48dh8Xx5EM5iYw5bcwpzSxS1Q9FL9xKFa0YW2PIZRo8/N/vsURDqQta?=
 =?us-ascii?Q?WcaeWxg669PxvMwgcuqqEMo1pIYq5ND4RlYdDPYogZu4XYuM1wPt1pKLQj+s?=
 =?us-ascii?Q?mmLQZlAGdtjBrWiHasa2Bck=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: cdc3cb6f-d85b-462b-be9c-08da0115906e
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 15:08:55.6558
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: B+kllrbcY6E8sbwAzO5D8XKbLHm2ocZJTksCXUnnm5g4nbAzr7sfnqYUfFKmzmUaZTqMIRHepbHeXE8R0luVNw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: GV1PR04MB9117

On 08.03.2022 15:18, Roger Pau Monn=C3=A9 wrote:
> On Tue, Mar 08, 2022 at 02:57:23PM +0100, Jan Beulich wrote:
>> On 08.03.2022 14:49, Roger Pau Monne wrote:
>>> So it can be explicitly placed ahead of the rest of the .text content
>>> in the linker script (and thus the resulting image). This is a
>>> prerequisite for further work that will add a catch-all to the text
>>> section (.text.*).
>>>
>>> Note that placement of the sections inside of .text is also slightly
>>> adjusted to be more similar to the position found in the default GNU
>>> ld linker script.
>>>
>>> The special handling of the object file containing the header data as
>>> the first object file passed to the linker command line can also be
>>> removed.
>>>
>>> While there also remove the special handling of efi/ on x86. There's
>>> no need for the resulting object file to be passed in any special
>>> order to the linker.
>>>
>>> Signed-off-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>
>>
>> Looks good to me, but I have one question before feeling ready to
>> offer R-b:
>>
>>> @@ -86,8 +84,13 @@ SECTIONS
>>>         *(.text.kexec)          /* Page aligned in the object file. */
>>>         kexec_reloc_end =3D .;
>>> =20
>>> -       *(.text.cold)
>>> -       *(.text.unlikely)
>>> +       *(.text.cold .text.cold.*)
>>> +       *(.text.unlikely .text.*_unlikely .text.unlikely.*)
>>
>> What generates .text.*_unlikely? And if anything really does, why
>> would .text.cold not have a similar equivalent?
>=20
> That matches what I saw in the default linker script from my version
> of GNU ld:
>=20
>     *(.text.unlikely .text.*_unlikely .text.unlikely.*)
>=20
> I really don't know what could generate .text.*_unlikely, but since
> it's part of the default linker script I assumed it was better to just
> add it.

I've checked - gcc up to 4.5.x would generate .text.*_unlikely; from
4.6.x. onwards it would be .text.unlikely.*.

As to the dissimilarity with .text.cold: I wonder why we have that in
the first place. It matches our __cold attribute, just that we don't
use that anywhere afaics.

In any event:
Reviewed-by: Jan Beulich <jbeulich@suse.com>
albeit preferably with .text.cold.* dropped again.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 15:14:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 15:14:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287059.486851 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbXH-0005Ix-2Z; Tue, 08 Mar 2022 15:14:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287059.486851; Tue, 08 Mar 2022 15:14:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbXG-0005Iq-VJ; Tue, 08 Mar 2022 15:14:02 +0000
Received: by outflank-mailman (input) for mailman id 287059;
 Tue, 08 Mar 2022 15:14:01 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRbXF-0005IQ-BX
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 15:14:01 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 61c443c9-9ef2-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 16:14:00 +0100 (CET)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2059.outbound.protection.outlook.com [104.47.14.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-36-aBzH7QdpOUiKyfcMDCCfIQ-1; Tue, 08 Mar 2022 16:13:58 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB3PR0402MB3835.eurprd04.prod.outlook.com (2603:10a6:8:3::30) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.16; Tue, 8 Mar
 2022 15:13:57 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 15:13:57 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 61c443c9-9ef2-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646752440;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=5OoU96Ap4k4K+NtTZdmEV9LXE0oO+QoeBpkhnraEBSs=;
	b=iZjntBRX46+gFAmGL3TOp3/iU+OYIyq4Bc1+7CKwuPMYxDXmoWN3qfJqswCHLfb1bCamLE
	F8T59dH1hDtWSrDQRwkBu9NVpCYyjkGQng7o2cYiOJpfw5jJI9ybuz/LA7j2dYp42EEZXW
	qaGTZxEtDKMtdgtvDmhXCunaYOUQoO0=
X-MC-Unique: aBzH7QdpOUiKyfcMDCCfIQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=C8+h7uaprwa5VAt8Rf5w0yYBRM/Icgalk8xJs7vArYwAW3vkhmS9F6ho7KtZHcQLSF0BkyI9lnXmJkBChBzRCyc3f00tJtuikM7bEsHl5j+4LxC3HxEVyYZmhQPgZTK5XPRyW4Mr2OdyVy2nzLzpzjSf4uybHE3A62G+xqTc9g4dpSPKPe3wMQPdlrfncVfOIpwDrOmNw5q/BFpeEPP/xNrJ+QwRGY/Zg8fPoZhZFqYtFoXCK6yT/RxjkJ7jhP2VN0k0FlhvoIUzBwRl+/EjJqWL+xzaJq6i1pkaqPlEpU977kUHH3uA2RuAAoeKrIoMLszxqrRWfafZvFFwK1fMjw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=oDJT662Xp0+WUPHCjz1OH2JmJiOiUBGXrTsFZh2EqGc=;
 b=BOe2yVxMPjoGdyhUz440wWM6DEiyyHcxQM1eBeUnANybVvbXX4VkWNhysTcldzIxbNUDc0kMBw1yjFA5upvvJHLFMwi3Iic8GHJotj8uHge+gEujFtUu86kP/PLLLkmWdO8Pqgly+NoSasfFmAgiW7K7WzJL5zDtuMbEiXY9a9k6wcBdRjIhOQhKTwWAd0c7OMKOffGXUTFoOPtQtDgUsnc3ctcqy13oJBLGAaMIxX4dAZJeFGZIMv5YNICi6qlINWFDfD4/PWNen9nNEgMgZf5FoNlgqfdTxgnOpe2dGr5dpbWRNT52PSiWck+fhE9BVa2sAH9uJCqYEwahGuO40g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <9cce44ca-3e31-bc13-3c56-2811efc36d5b@suse.com>
Date: Tue, 8 Mar 2022 16:13:55 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v3 2/2] livepatch: set -f{function,data}-sections compiler
 option
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 xen-devel@lists.xenproject.org
References: <20220308134924.83616-1-roger.pau@citrix.com>
 <20220308134924.83616-3-roger.pau@citrix.com>
 <c35415ef-b3c1-cc1c-2fb2-aa2de2602cd5@suse.com>
 <YidsSmPV1Pqulp+h@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YidsSmPV1Pqulp+h@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6P191CA0072.EURP191.PROD.OUTLOOK.COM
 (2603:10a6:209:7f::49) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: fa945712-bc74-4be3-6f5d-08da0116442f
X-MS-TrafficTypeDiagnostic: DB3PR0402MB3835:EE_
X-Microsoft-Antispam-PRVS:
	<DB3PR0402MB38353F28E321CD730AF70222B3099@DB3PR0402MB3835.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(31696002)(8936002)(5660300002)(53546011)(6506007)(86362001)(8676002)(4326008)(31686004)(36756003)(66476007)(316002)(38100700002)(2616005)(26005)(66946007)(83380400001)(66556008)(186003)(6512007)(6486002)(508600001)(6916009)(2906002)(54906003)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?iuKc9dF+3GkM5FUyEoZDpkA+JwDDrhYwzC8dzMImCt3+2SJseLrXljgNkRLC?=
 =?us-ascii?Q?qEPiKUAfk2h3c2eksabeD539JXsQWRXHdrRH0yPMyFP7ikw4rCjG8MmGdcKM?=
 =?us-ascii?Q?LWmsiZgzaTuKqRHX1IxcqMIX6npROX+OBr6tVXPghuiupgYjCKG0e5/FneJK?=
 =?us-ascii?Q?Si9367YiVYMRC4bCy799/fb3BdeZsicBCkt3mMX2OcYC+ahAH++4iOfATMBd?=
 =?us-ascii?Q?fSsyLWGs+eGl4k119Q6X6fOyeeip96+XZhEA9IC17pOBylULLuLwkpOr20/V?=
 =?us-ascii?Q?WK/CsCVhzj/7htGF6AoRdcNn/omZ9efN04VHSpxsVVQxmwQczid5kpInqv5/?=
 =?us-ascii?Q?WGn0fpZAkMmaIdtkRS+dORxB6JYQiZ568uRyMtdFG/sFMge3VlpUr9QigUyE?=
 =?us-ascii?Q?d98SWV7IkgWiNqCI3ZyaFO/KefjPiTLCVJ7cgjthY6DO2jQ3AKWSASyTBXmW?=
 =?us-ascii?Q?WocgTabfTzFdQl2PJTvCacctgbrkB1N+JUxi06jjvFmy5xJKczyI/1CsxqAu?=
 =?us-ascii?Q?HE92trdToN9VHaQ4ZzaRCrziuih81xlBxUKbut5MvL/nsPH/n6Myye2kS00W?=
 =?us-ascii?Q?pfYy3npM+1F9lx3xWIPep/msM7/5oI/lgQYuhYU1kQslinB8aVdloCpPN+ty?=
 =?us-ascii?Q?m2MP8vqDoZumuUOSMB4QRo4zTTkcjx+S/rXCW/4FipMibp/Qg9Btlw1KffGo?=
 =?us-ascii?Q?O5Opb1upRI53yOuBqiOX9/LuSsPwEihuT3hACvVejiuG9Aaj4/zXiAvbTXdF?=
 =?us-ascii?Q?oPoK6ZuE32CL4GrC4CAS4JLbUqXCfgClO7FE57eIeU6tj5Zr75KOEziLi09a?=
 =?us-ascii?Q?vSoyBP96HfCD8/ncQWcg8lDSCetG/aJT0MrqgKkK7pGh4D0dm2XIwHOy9Kyb?=
 =?us-ascii?Q?tQCJPPr6t6EWHzvQVrcpQlyKVG2pMSpMDMbphFIZ6RSi7Xu29hEaDC1fijhI?=
 =?us-ascii?Q?SdRsb0wzSg+cgBts9V5cPW3rifZkFIDemB2FGZu0BePwqKZyjTzyRAVShbTF?=
 =?us-ascii?Q?ZqEtKY9DhVmIRsIk3cTeLpCsjGArhHOv+mhIz49JSC/21Xnv7k/CyWYjpaMW?=
 =?us-ascii?Q?SchNV4GD778FxM2V4tMXIiD67YLznhkclq3mUdu/eLkcf9+tv3TQLYXtY3ve?=
 =?us-ascii?Q?YKjfM0pOOdNmDenlhXs2NLHe+NiXpoXKRwbjQ3LYxnRlx2uXY0TtcGRPckE6?=
 =?us-ascii?Q?KzSfyWRUfzQ+J149vUrHpb/NGJqz+qwODIkVWYVYpHRShnj75AoTn1tVYjWd?=
 =?us-ascii?Q?v+lxQmAqMxthjmAeFid/vLak0Z9P0EyvmPjMPy4Ci7SvEbD5YeTkC7Kn/FPi?=
 =?us-ascii?Q?eVdFgRQK6BZLT2IlBfwCirazoPQILr2U2zZllymOMYQTgiPq1AmwjTjJQIcK?=
 =?us-ascii?Q?k54R5ii5hrJvpsk+jZh78l44eL2k8TNR87z9mWvIvBRZ+Jh0RN1eENRxiYFj?=
 =?us-ascii?Q?qpO2lUBp+DQ1ezR8m2jYBeT2cSXnNV5XRJn1S9uT2jOwZ2SLvq6TH1fjJq2M?=
 =?us-ascii?Q?x+B3KoJis2k98/4FOFLbfr6uhYJtyQTDjiwfb/nieDfA8b7napmWDNGOzYj4?=
 =?us-ascii?Q?ejw0QnDvDT5zJ/ppiDoG+Kgedgz6drR9Hnw9M+naJA0SRYPwuz0U8cK48KIW?=
 =?us-ascii?Q?TRs4y+l+wwHj3vuKYGHPRIs=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: fa945712-bc74-4be3-6f5d-08da0116442f
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 15:13:57.3245
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: gxzSdVZt79gxUFfFjpbJuEV6v7Ozoayy0qXjyah2LJG9de9VaIngTvHd0oDc3VgXBwC675hU17Ey8iB9Sjn7HQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB3PR0402MB3835

On 08.03.2022 15:46, Roger Pau Monn=C3=A9 wrote:
> On Tue, Mar 08, 2022 at 03:09:17PM +0100, Jan Beulich wrote:
>> On 08.03.2022 14:49, Roger Pau Monne wrote:
>>> If livepatching support is enabled build the hypervisor with
>>> -f{function,data}-sections compiler options, which is required by the
>>> livepatching tools to detect changes and create livepatches.
>>>
>>> This shouldn't result in any functional change on the hypervisor
>>> binary image, but does however require some changes in the linker
>>> script in order to handle that each function and data item will now be
>>> placed into its own section in object files. As a result add catch-all
>>> for .text, .data and .bss in order to merge each individual item
>>> section into the final image.
>>>
>>> The main difference will be that .text.startup will end up being part
>>> of .text rather than .init, and thus won't be freed. .text.exit will
>>> also be part of .text rather than dropped. Overall this could make the
>>> image bigger, and package some .text code in a sub-optimal way.
>>>
>>> On Arm the .data.read_mostly needs to be moved ahead of the .data
>>> section like it's already done on x86, so the .data.* catch-all
>>> doesn't also include .data.read_mostly. The alignment of
>>> .data.read_mostly also needs to be set to PAGE_SIZE so it doesn't end
>>> up being placed at the tail of a read-only page from the previous
>>> section. While there move the alignment of the .data section ahead of
>>> the section declaration, like it's done for other sections.
>>>
>>> The benefit of having CONFIG_LIVEPATCH enable those compiler option
>>> is that the livepatch build tools no longer need to fiddle with the
>>> build system in order to enable them. Note the current livepatch tools
>>> are broken after the recent build changes due to the way they
>>> attempt to set  -f{function,data}-sections.
>>>
>>> Signed-off-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>
>>
>> Reviewed-by: Jan Beulich <jbeulich@suse.com>
>>
>>> --- a/xen/arch/x86/xen.lds.S
>>> +++ b/xen/arch/x86/xen.lds.S
>>> @@ -88,6 +88,9 @@ SECTIONS
>>>         *(.text.unlikely .text.*_unlikely .text.unlikely.*)
>>> =20
>>>         *(.text)
>>> +#ifdef CONFIG_CC_SPLIT_SECTIONS
>>> +       *(.text.*)
>>> +#endif
>>>         *(.text.__x86_indirect_thunk_*)
>>>         *(.text.page_aligned)
>>
>> These last two now will not have any effect anymore when
>> CC_SPLIT_SECTIONS=3Dy. This may have undesirable effects on the
>> overall size when there is more than one object with a
>> .text.page_aligned contribution. In .data ...
>=20
> Agreed. I wondered whether to move those ahead of the main text
> section, so likely:
>=20
>        *(.text.unlikely .text.*_unlikely .text.unlikely.*)
>=20
>        *(.text.page_aligned)
>        *(.text.__x86_indirect_thunk_*)
>        *(.text)
> #ifdef CONFIG_CC_SPLIT_SECTIONS
>        *(.text.*)
> #endif

Perhaps; I'm not really worried of .text.__x86_indirect_thunk_*,
though. When adding .text.* that one can likely go away.

> FWIW, Linux seems fine to package .text.page_aligned together with the
> rest of .text using the .text.[0-9a-zA-Z_]* catch-all.

There's no question this is functionally fine. The question is how
many extra padding areas are inserted because of this.

>>> @@ -292,9 +295,7 @@ SECTIONS
>>> =20
>>>    DECL_SECTION(.data) {
>>>         *(.data.page_aligned)
>>> -       *(.data)
>>> -       *(.data.rel)
>>> -       *(.data.rel.*)
>>> +       *(.data .data.*)
>>>    } PHDR(text)
>>
>> ... this continues to be named first. I wonder whether we wouldn't
>> want to use SORT_BY_ALIGNMENT (if available) instead in both places.
>=20
> We could use the command line option if available
> (--sort-section=3Dalignment) to sort all wildcard sections?

Depends on the scope of the sorting that would result when enabled
globally like this.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 15:20:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 15:20:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287068.486862 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbd5-0006Xq-TG; Tue, 08 Mar 2022 15:20:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287068.486862; Tue, 08 Mar 2022 15:20:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbd5-0006X0-PA; Tue, 08 Mar 2022 15:20:03 +0000
Received: by outflank-mailman (input) for mailman id 287068;
 Tue, 08 Mar 2022 15:20:02 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LykH=TT=citrix.com=prvs=059d7c239=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nRbd4-0006Kw-QK
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 15:20:02 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 37d8df5c-9ef3-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 16:20:00 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 37d8df5c-9ef3-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646752800;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=Do0+seH8JmTPVuWVnszBvv4ewmPEufWMTIktRX6Fiiw=;
  b=ep4O0tRwWQNZf2XdAdBdVgJr+NQGnr1ADP4tWg790hpFNVn1+capgTH0
   2eYaj5NjXy/5faKVeHWqTSwdcEB3NjSxTgO07rFJFEf/UIhK7UcHt9Zqe
   JOnVvGjSyfVn/R//GMMSUWblhK+hCJsz9e/w2hwcPasUztuxSWJhh9oL4
   8=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65713384
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:zT91YKDFvZ85NhVW/+Hjw5YqxClBgxIJ4kV8jS/XYbTApDtzgmQOm
 jZMDTiEb/yLYzSjLtl1a4S090JQ6MWBnYNhQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vh0tYy6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhfm
 Otzi6e+az0sEaz2x9w2dl4DCHthaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguwKKsXxMZxZkXZn1TzDVt4tQIzZQrWM7thdtNs1rp4TQq+FP
 JpFAdZpRA+DegNCGAxONKMBp+OvqVzcKx5hl2vA8MLb5ECMlVcsgdABKuH9f9+XbcxQl1Sfo
 CTK8gzRBwkdNNiWwjmt+3ellOjJ2y/2MKoCGbv9+vN0jVm7wm0IFAZQRVa9ueO+iEO1R5RYM
 UN80igkoLU29UerZsLgRBD+q3mB1jYDX/JAHut87xuCooLY5AuTC2wsRztIetsg8sM7LQHGz
 XfQwYmvX2Y29uTIFzTNrd94sA9eJwA7fVE8WxQKbzEAzNjZ/7kYq1WUVYx8RfvdYsLOJRn8x
 DWDrS4bjroVjNIW26jTwW0rkw5AtbCSEFdru1y/snaNq1ogOdX7P9DABU3zsK4YRLt1WGVtq
 5TtdyK2yOkVRa+AmyWWKAnmNOH4vq3VWNEwbLMGInXAy9hP0yP7FWyzyGsnTKuMDiriUWWxC
 KM0kVkNjKK/xFPwMcdKj3uZUqzGN5TIG9X/TezzZdFTeJV3fwLv1HgwORDOgDCwyxF8zPpX1
 XKnnSCEVy1y5UNPlmbeegvg+eVzmnBWKZ37H/gXMChLIZLBPSXIGN/pwXOFb/wj7bPsnekm2
 403Cid+8D0GCLeWSnCOqeY7dAlWRVBmVcGeg5EGLYarf1s5cFzN/teMmNvNjaQ+xP8L/goJl
 1ngMnJlJK3X2SWXeV/UOyo4NNsCn/9X9BoGAMDlBn7xs1ALaoez9qYPMZwxeLgs7ut4yvBoC
 fICfq297j5nE1wrJxx1gUHBkbFf
IronPort-HdrOrdr: A9a23:SJh/b6kzxPuamlB9i6fUzpbkpKfpDfOCimdD5ihNYBxZY6Wkfp
 +V88jzhCWZtN9OYhwdcIi7SdS9qXO1z+8R3WGIVY3SEzUOy1HYUL2KirGSjQEIeheOutK1sJ
 0PT0EQMqyIMbEXt7eY3OD8Kadb/DDlytHouQ699QYUcegCUcgJhG0ZajpzUHcGPzWubaBJT6
 Z0jfA3wwZIDE5nCPhTcUN1ONQryee79q7OUFojPVoK+QOOhTSn5PrRCB6DxCoTVDtJ3PML7X
 XFuxaR3NTij9iLjjvnk0PD5ZVfn9XsjvFZAtaXt8QTIjLwzi61eYVaXaGYtjxdmpDt1L9qqq
 iPn/4TBbU215rjRBDznfIr4Xin7N8a0Q6m9bZfuwq7nSW2fkNjNyMLv/MnTvKQ0TtfgDg76t
 MQ44vRjesmMfuL9h6NluTgRlVkkFG5rmEllvNWh3tDUZEGYLsUtoAH+lhJea1wVx4SxbpXWd
 WGNvusrMq+sGnqG0zxry1q2pihT34zFhCJTgwLvdGUySFfmDR8w1EDzMISk38c/NZlIqM0qt
 jsI+BtjvVDX8UWZaVyCKMIRta2EHXERVbJPHiJKVrqGakbMzbGqoLx4r8y+Oa2EaZ4hqcaid
 DEShdVpGQyc0XhBYmH24BK6AnERCGnUTHk2qhllu5EU33HNc3W2AG4OSITepGb0oYi6+XgKo
 OOBK4=
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="65713384"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=kZTqRkde/NdkZCtwO2Fcdohn+AdnfNL1AQaLqhT9GQwTILfe99cDaBqi9XcYxwE8+F7slPys5rLH99NdfFiaU14JkSfGo7x/mQfsnexQRD87dhSr8cNCQ/+FvsZixG4zvn8QGQiQWTyOK26AkMXMosGpzI4/WmcM31geDh2+INlU1yoIDRFr/NWaTV0f8VdVpTZ2GBaGyIN9ZttOqSr9Im9mdZ7KPImfsILsK5oafD/Vh7zYtM8rqC8P98T/Qz7KRGZNULzrV7AyUOIrO/VRUUK4KkTJZi97rQoenasJHza8Zz+gpA0oasuW6X7s6v+vu3Sj22MHnk4N/pAbkgCXAA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Do0+seH8JmTPVuWVnszBvv4ewmPEufWMTIktRX6Fiiw=;
 b=eqf+Rv3JaYOKML4dVUmb0FNtHa8mHQQRVgPN+tAXnO+Q3TS8zzR7y0/3Vw/ggGlBRkrQCjoGE7+Y2Cf1rKmdiihGrdC1ZJyCI+CdGx4eweH58qz3p7gG6+kU/wpx0CuL1WNcjKCVi8Su0+9u7Dquo1VwcojGWddA5BWABLGYa/xm6H1GTVJ12un0C+0/kAqWL3G6IDQVOEz+HUVmBImU0xAR3cJn2efBGXlC0xEtOlD6QyFL7AMNDkt4hsOWRLUiDhFo03Sg002jHkaDEgBIbwSHYxeT9+dqzJdSj6LUey+uccAX5NIjeRw7BQHgtkoe5Wj2v3qYZmij8vUpZPkK1g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Do0+seH8JmTPVuWVnszBvv4ewmPEufWMTIktRX6Fiiw=;
 b=ZiH0HJ8RKaUUXRZ2Pk6wMWt3zfddwYNonwxJhgj5TjfT+oq45WFUKRTAiMiUbh/x5UZ8tJzU0KF0aYlsRh8HcUbzqOnGKyWZgqfdg66Qb0Cm703bLfOuByfDhsFRps0BVGdvi5CoEa4Gcdj33w/zp+E83vR7H0Ej19AM9q8foxk=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>, "Bjoern
 Doebel" <doebel@amazon.de>, Michael Kurth <mku@amazon.de>, Martin Pohlack
	<mpohlack@amazon.de>, Xen-devel <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH] x86/cet: Use dedicated NOP4 for cf_clobber
Thread-Topic: [PATCH] x86/cet: Use dedicated NOP4 for cf_clobber
Thread-Index: AQHYMvUk0XiHSYNleUqdwHU2YHv5TKy1jjMAgAALzQA=
Date: Tue, 8 Mar 2022 15:19:52 +0000
Message-ID: <476a25f8-86eb-0df5-b481-fc4cd5ecbb18@citrix.com>
References: <20220308140126.8815-1-andrew.cooper3@citrix.com>
 <18fb4115-94d8-16c2-e39b-1be895e254f4@suse.com>
In-Reply-To: <18fb4115-94d8-16c2-e39b-1be895e254f4@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: c2ff0311-3fee-4166-5fd1-08da0117182b
x-ms-traffictypediagnostic: CO3PR03MB6789:EE_
x-microsoft-antispam-prvs: <CO3PR03MB67891E61E04C10EAFEA33EB5BA099@CO3PR03MB6789.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: FKl1kTTOqMyjdyhfSyQZlS40bKX/ZitK4HhWRV1rvtpMwmMfjjEeHWrWYFmR46schc0/OOB2GJP1yp9BtMJUnllP4tyfxRzuRC6U8VhPCaqAr2dja11wn+Q5r5iscoCa59es2A1jOo9M5OstdXFvhmIPr7cjNTDRI+6/UKSFSxBo30xyw3ImRy2YotCZ1s2uH84WW2dBxVQgkmeXdv271mvn5xnze5AnzLeV5TGVilsUnxeWppV1kUvpx8RV7BT9gU8ACtpyHrCtxPPJKv/GV31CMOgFyMopRSKW22MevFr0dQQ0pKEWG9xlk8Ew/L8bbyxGycZhjIM+REVLaSwjT+5OklULgsozALYZJW7dFv4WL+0OvKxdSdjcarkblnTnxKTdQxpJKq/XnJJbezJhHZ/s3SpjF5R66iM2ZptFAoyD/yF0XBYPs4xTSij6kIpL8BSrrZhCtvM7wlYVGIsnHOJYgdxUHq0v+ofXJ6pcdQQfcDmVnQ6EiCNLGUJxdBCsrjm+shUzhUOQswwfDq3u0Tj1SfNuAdEVwN/iM4MM/tl8IteXpStNYvqElud0lpJH2mZC9E+xQS3PJxLYAyR5y+3ZkuhLf1TO3JPinxsnEPohEal2HpNH81trEmlEkIGNed8Oo7l17dOW9Gb87Zgd1FkBouj+cPX2xXEOv6SCM/Rt5TbjoBBAvNSqurJk+jHiwKqlWgL0bdEc7e0CYRHBDxtpPCMYxB56kl64A2CxMjll7/Q8OgG6W7eNf2cgbUfTTXChRoDCOUMGKUTrct7qew==
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(66946007)(91956017)(6916009)(54906003)(66476007)(66556008)(66446008)(8676002)(86362001)(38070700005)(76116006)(6486002)(6512007)(316002)(6506007)(5660300002)(4326008)(82960400001)(53546011)(71200400001)(26005)(186003)(2616005)(66574015)(83380400001)(38100700002)(31696002)(2906002)(36756003)(8936002)(31686004)(64756008)(508600001)(122000001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?RzlaVWczRFFmSDRpeHFpZ1hBbEtxSGNma1pTbnBNdkhaWDhRQUljUXg3MUJJ?=
 =?utf-8?B?MVNacTE5OCtQdFNZZ3V3aXVNQnFaSDcyUXpHYWp4L3VWZlJHSk9ORTdVcjdX?=
 =?utf-8?B?QVJKNHc5OGJHZXJvekpqK21wWFpZejZwZS9XNW1uNC90bi82UThQZEVxeWNn?=
 =?utf-8?B?bm9qdEJKSGZpcndydGl5SWdjQUFJK0o1UldYZ3BJbHJYajVmeXpodUJXcldi?=
 =?utf-8?B?TDBla0J1cTVwZ0dEU01WSkh5OXdZR1RXWmVtOWlKQ0JFNVovbGRjaDFCZ3R2?=
 =?utf-8?B?T0xiSW1HQ21sRXV2Skl1ZGhYc3Y2MmI5ZklTVDFNejdNcDRjMngxd2VoMWdZ?=
 =?utf-8?B?RmYvQUNYUzkwY2drZ1dockgzSEhyeGdBVVNwT0hiOFVrVWsxWjBxNy9OelpI?=
 =?utf-8?B?L2hXS0VUZ2djd2ZydHBMazF3MUM5MUVRQ2tDaHRSd2FsUS9udjZRRG5hbEl0?=
 =?utf-8?B?VDBKaEdEQzA3TUEweUJsRHBSVkpPV1ZuMTl4YTl2U0MwT2I4bXlpWkNhU0lo?=
 =?utf-8?B?L3pMMXM4eHR2QTVnUkEySmF0aWRkZ085VzdYZTBUMU03N2tPbS9tQjZWcXNU?=
 =?utf-8?B?dk0xbEhGRlUrV0FWUkkrc1pPSWN3YnFuUFJ4a0tkcjhrZ0MrVmVHNGdnbXpq?=
 =?utf-8?B?U2w2cjZhWG95cjR3QnNWZU8vZUhRbU9OSHBlR3Y3d0hiNS9lNWFRL1lMaGFS?=
 =?utf-8?B?eDNOanViS0FxMDFUaW9BMFlXOHYxcFdvc1VsVnFwZDFRS29xeFBQSnNURkFM?=
 =?utf-8?B?RGU1NjdNaWtvRGNIaWhtNUpiLzRhc1FYUTV2ckt6K1BRMjc3UEtISGZRQXEv?=
 =?utf-8?B?dlVhUVd6VWlyaGlDeFh1RlQ4TEdUTDJhTFFURnB5Q2V5NmI2Q2dUMGMvdlBz?=
 =?utf-8?B?cllsNkxFYksyVWlSbzZzSGt5NEcxVk1KN0pJZzZPWGlzc0hDSTJ0dXIrSzJn?=
 =?utf-8?B?NGg2YzVMclRGMEdHTGp3RkNqQkwxYVAxMzFSMVpkZzZUeTRxWWZCcUdOdkdM?=
 =?utf-8?B?eWdIL3pQVERFK3BSUEJFSUowTXFUby9MRnV0U09VMzRvSE1UL3dFSm5RRHQv?=
 =?utf-8?B?MThFaFRrbnV6dHFPYU1JRXF6TzNqMHNTWXFpb2hiWERNZHRoSXBCY2pGaEF2?=
 =?utf-8?B?b2N3Q3dLeDJFT3lKRGxWNDZaYjVzdGw4U2RmaHo4TklpbmRENUVNTWRHYnJN?=
 =?utf-8?B?a3llMW5HdERjS0FmTVl1YXBJSFZ6MXNRZjV6V0d4ckxxRFY3OXVVOC9RdGNy?=
 =?utf-8?B?L09WVmJEb2g1NFNYUk1ZZ2xJV1R3SDRhaXFTcVRZcDhaQ0MrazhINzIzd3Br?=
 =?utf-8?B?ckpGczlGY3hReU9xbTZ1MGloelpvUFQrWTUyMEtjRVl1NW9QQS9iOElUcklP?=
 =?utf-8?B?bzlCcC9RblNrY1NYdzI4K2xZOGE4RFI0N2Z3RnV6M01wb2h2OWtsVkUya3BT?=
 =?utf-8?B?MWFMdXRleUFOZG9CcHdkM1FvcHhBcFRTNGFFTGRuSkxTYWtTeW5nYnJUczhn?=
 =?utf-8?B?ZzEyUDVhRDZ0cm5XbEQxNzh2bG42YVhCOStjTFp3Ly9Zam1HdTdxRE4vVDVr?=
 =?utf-8?B?azIvR2N3YXBsZjY2YXpOUkVFZ09HSGlkQitCWDIvU1BZTEtsUWQrTitNSldX?=
 =?utf-8?B?dWVHNm9tUmt3WlR4ZEoyZmRqaGhQakl5NloxSVR0MnprZnhtd0FWYmU2Y3Fp?=
 =?utf-8?B?cTRFZWlFekVqV3FoQjRidWl4MTRMWnNmV216VUlLa3lUNnNmdGw0R2N0M0Y0?=
 =?utf-8?B?UUZVNit2RUNQSzFMb2lrSzZvWlVScEo5UXhNaUFydWloelc1SUxWMXBTSGVa?=
 =?utf-8?B?bWVWRTc0d0tMNWJ1L2dzSkdtN1h6S0MzcXY5cXNpQzVUdmtTVjlyWnp5NzJH?=
 =?utf-8?B?ek5lMlhWdTM1TCs5MDB4SmM4M0Z5em9taWJ2ckUrYlFNTnNQZUpxOE4xZ1po?=
 =?utf-8?B?U3JvQmdPd1czM2tFclYzMk9KaW1HT0c5RHd5bEliSEtMbk4zSzFTbFRVVDRp?=
 =?utf-8?B?RGFUbEJUUVFKazZXU1hNbFI5cnkrVW1WRk0wd2NNdEhDekUxeWp6WTJTTVJq?=
 =?utf-8?B?V3J6Tnh1aG8ycEFOcUJueC9nSUNwR0NFMExpZDF4dlZBcE1lVklIM2l6Sk5z?=
 =?utf-8?B?V04wWnh6ZUJKcmNMYkRNOVY0dzJPYjVBUjZnN3lOcDBUbk12U2lvYWhWQkVJ?=
 =?utf-8?B?cCtvdmE1OXp2Z09XYzlhK0pvVDROZ2J5a1Zqc0NCWVBIMjFRcEs2ays5azd0?=
 =?utf-8?B?bmowMGE4UE1WeTdpY3VkN09DaTRRPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <B682F98855F0A94392677EF1C01ECB5A@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c2ff0311-3fee-4166-5fd1-08da0117182b
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Mar 2022 15:19:52.6311
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: IsqDJHINL+RLWi0T+HIwiyWdNXqnfZKm+HPX/tSfg2/GqfYL+6hTnOFYYxIyMKnKCNh0Ei39U4ca5m7eFuLuPR+an53icXK0BAXxNaQx650=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO3PR03MB6789
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Tue Mar 08 15:23:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 15:23:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287074.486873 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbgg-0007ah-CT; Tue, 08 Mar 2022 15:23:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287074.486873; Tue, 08 Mar 2022 15:23:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbgg-0007aa-9S; Tue, 08 Mar 2022 15:23:46 +0000
Received: by outflank-mailman (input) for mailman id 287074;
 Tue, 08 Mar 2022 15:23:45 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=JMfM=TT=amazon.de=prvs=0590b4220=doebel@srs-se1.protection.inumbo.net>)
 id 1nRbge-0007aT-Ng
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 15:23:45 +0000
Received: from smtp-fw-2101.amazon.com (smtp-fw-2101.amazon.com [72.21.196.25])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id bca01a70-9ef3-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 16:23:43 +0100 (CET)
Received: from iad12-co-svc-p1-lb1-vlan2.amazon.com (HELO
 email-inbound-relay-pdx-2a-92ba9394.us-west-2.amazon.com) ([10.43.8.2])
 by smtp-border-fw-2101.iad2.amazon.com with ESMTP; 08 Mar 2022 15:23:31 +0000
Received: from EX13D44EUB004.ant.amazon.com
 (pdx1-ws-svc-p6-lb9-vlan3.pdx.amazon.com [10.236.137.198])
 by email-inbound-relay-pdx-2a-92ba9394.us-west-2.amazon.com (Postfix) with
 ESMTPS id 5D173417EF; Tue,  8 Mar 2022 15:23:29 +0000 (UTC)
Received: from EX13MTAUWB001.ant.amazon.com (10.43.161.207) by
 EX13D44EUB004.ant.amazon.com (10.43.166.198) with Microsoft SMTP Server (TLS)
 id 15.0.1497.28; Tue, 8 Mar 2022 15:23:27 +0000
Received: from dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (10.13.240.106)
 by mail-relay.amazon.com (10.43.161.249) with Microsoft SMTP Server
 id
 15.0.1497.28 via Frontend Transport; Tue, 8 Mar 2022 15:23:26 +0000
Received: by dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (Postfix,
 from userid 3160037)
 id E06444EA9; Tue,  8 Mar 2022 15:23:25 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: bca01a70-9ef3-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646753023; x=1678289023;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=DagEakpqz6Dt5Y9fwUgvFiApWcxqurKY1A3qTM9nhpY=;
  b=OpntINO+n8kEI8d9KA9+7Iuou6EB0Ib/MZgIRZxBj26x/C1mfWyFD9+G
   RcsO+GuTqBLynzioEl6v+rjmgdQh3aUMyEfn5VszLF6awdgX4/EHzF99K
   QVv6Kmk1mKPfprlmRo0lza6rBZdUyJtSWw47PxJ1eFxUeVdcqEgE47BqB
   0=;
X-IronPort-AV: E=Sophos;i="5.90,165,1643673600"; 
   d="scan'208";a="179452231"
From: Bjoern Doebel <doebel@amazon.de>
To: <xen-devel@lists.xenproject.org>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, Roger
 Pau Monne <roger.pau@citrix.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
	Bjoern Doebel <doebel@amazon.de>, Konrad Rzeszutek Wilk
	<konrad.wilk@oracle.com>, Ross Lagerwall <ross.lagerwall@citrix.com>
Subject: [PATCH v4 1/2] Livepatch: resolve old address before function verification
Date: Tue, 8 Mar 2022 15:23:19 +0000
Message-ID: <7e547248b6c24b9f3761720f84919614af69c802.1646752948.git.doebel@amazon.de>
X-Mailer: git-send-email 2.32.0
MIME-Version: 1.0
Precedence: Bulk
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

When verifying that a livepatch can be applied, we may as well want to
inspect the target function to be patched. To do so, we need to resolve
this function's address before running the arch-specific
livepatch_verify hook.

Signed-off-by: Bjoern Doebel <doebel@amazon.de>
Acked-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Reviewed-by: Ross Lagerwall <ross.lagerwall@citrix.com>
---
 xen/common/livepatch.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/xen/common/livepatch.c b/xen/common/livepatch.c
index ec301a9f12..be2cf75c2d 100644
--- a/xen/common/livepatch.c
+++ b/xen/common/livepatch.c
@@ -684,11 +684,11 @@ static int prepare_payload(struct payload *payload,
                 return -EINVAL;
             }
 
-            rc = arch_livepatch_verify_func(f);
+            rc = resolve_old_address(f, elf);
             if ( rc )
                 return rc;
 
-            rc = resolve_old_address(f, elf);
+            rc = arch_livepatch_verify_func(f);
             if ( rc )
                 return rc;
 
-- 
2.32.0




Amazon Development Center Germany GmbH
Krausenstr. 38
10117 Berlin
Geschaeftsfuehrung: Christian Schlaeger, Jonathan Weiss
Eingetragen am Amtsgericht Charlottenburg unter HRB 149173 B
Sitz: Berlin
Ust-ID: DE 289 237 879





From xen-devel-bounces@lists.xenproject.org Tue Mar 08 15:23:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 15:23:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287075.486884 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbgl-0007tA-Kh; Tue, 08 Mar 2022 15:23:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287075.486884; Tue, 08 Mar 2022 15:23:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbgl-0007t3-Hc; Tue, 08 Mar 2022 15:23:51 +0000
Received: by outflank-mailman (input) for mailman id 287075;
 Tue, 08 Mar 2022 15:23:50 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=JMfM=TT=amazon.de=prvs=0590b4220=doebel@srs-se1.protection.inumbo.net>)
 id 1nRbgk-0007aT-0o
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 15:23:50 +0000
Received: from smtp-fw-33001.amazon.com (smtp-fw-33001.amazon.com
 [207.171.190.10]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id bf920d1c-9ef3-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 16:23:48 +0100 (CET)
Received: from iad12-co-svc-p1-lb1-vlan2.amazon.com (HELO
 email-inbound-relay-pdx-2a-92ba9394.us-west-2.amazon.com) ([10.43.8.2])
 by smtp-border-fw-33001.sea14.amazon.com with ESMTP; 08 Mar 2022 15:23:32 +0000
Received: from EX13D03EUA001.ant.amazon.com
 (pdx1-ws-svc-p6-lb9-vlan3.pdx.amazon.com [10.236.137.198])
 by email-inbound-relay-pdx-2a-92ba9394.us-west-2.amazon.com (Postfix) with
 ESMTPS id 1F6B841AD3; Tue,  8 Mar 2022 15:23:29 +0000 (UTC)
Received: from EX13MTAUWA001.ant.amazon.com (10.43.160.58) by
 EX13D03EUA001.ant.amazon.com (10.43.165.33) with Microsoft SMTP Server (TLS)
 id 15.0.1497.28; Tue, 8 Mar 2022 15:23:28 +0000
Received: from dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (10.13.240.106)
 by mail-relay.amazon.com (10.43.160.118) with Microsoft SMTP Server
 id
 15.0.1497.28 via Frontend Transport; Tue, 8 Mar 2022 15:23:27 +0000
Received: by dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (Postfix,
 from userid 3160037)
 id 8763F54CF; Tue,  8 Mar 2022 15:23:26 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: bf920d1c-9ef3-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646753029; x=1678289029;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=t2GRG3qC+EChIjAjEMa9qnXPMGK10DzsvMDsOutzQT8=;
  b=QB9VSZ5l2UDMGU0OX7K+5+uhypF2lUCVhUg9lZdIPZ0uFJ6avubJu9em
   12yRvYlxRK95NW1+zlV9X6vaedZOr1ftkqkXLfUqBSlCeuBd42ce4e8kg
   2/7KDqQVX9ENLryGo1qmsXbCbaiOLSumvR9acuFnE7EXtCtFoEzTugwtj
   E=;
X-IronPort-AV: E=Sophos;i="5.90,165,1643673600"; 
   d="scan'208";a="180564210"
From: Bjoern Doebel <doebel@amazon.de>
To: <xen-devel@lists.xenproject.org>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, Roger
 Pau Monne <roger.pau@citrix.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
	Bjoern Doebel <doebel@amazon.de>, Konrad Rzeszutek Wilk
	<konrad.wilk@oracle.com>, Ross Lagerwall <ross.lagerwall@citrix.com>
Subject: [PATCH v4 2/2] xen/x86: Livepatch: support patching CET-enhanced functions
Date: Tue, 8 Mar 2022 15:23:20 +0000
Message-ID: <7807aba5916fa4d983ec876ae560854093211cf0.1646752948.git.doebel@amazon.de>
X-Mailer: git-send-email 2.32.0
In-Reply-To: <7e547248b6c24b9f3761720f84919614af69c802.1646752948.git.doebel@amazon.de>
References: <7e547248b6c24b9f3761720f84919614af69c802.1646752948.git.doebel@amazon.de>
MIME-Version: 1.0
Precedence: Bulk
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

Xen enabled CET for supporting architectures. The control flow aspect of
CET expects functions that can be called indirectly (i.e., via function
pointers) to start with an ENDBR64 instruction. Otherwise a control flow
exception is raised.

This expectation breaks livepatching flows because we patch functions by
overwriting their first 5 bytes with a JMP + <offset>, thus breaking the
ENDBR64. We fix this by checking the start of a patched function for
being ENDBR64. In the positive case we move the livepatch JMP to start
behind the ENDBR64 instruction.

To avoid having to guess the ENDBR64 offset again on patch reversal
(which might race with other mechanisms adding/removing ENDBR
dynamically), use the livepatch metadata to store the computed offset
along with the saved bytes of the overwritten function.

Signed-off-by: Bjoern Doebel <doebel@amazon.de>
Acked-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
CC: Ross Lagerwall <ross.lagerwall@citrix.com>
----
Note that on top of livepatching functions, Xen supports an additional
mode where we can "remove" a function by overwriting it with NOPs. This
is only supported for functions up to 31 bytes in size and this patch
reduces this limit to 30 bytes.

Changes since r1:
* use sizeof_field() to avoid unused variable warning
* make metadata variable const in arch_livepatch_revert
* rebase on top and make use of Andrew Cooper's was_endbr64() patch
---
 xen/arch/x86/livepatch.c | 61 ++++++++++++++++++++++++++++++++++------
 1 file changed, 53 insertions(+), 8 deletions(-)

diff --git a/xen/arch/x86/livepatch.c b/xen/arch/x86/livepatch.c
index 65530c1e57..5380e18bd9 100644
--- a/xen/arch/x86/livepatch.c
+++ b/xen/arch/x86/livepatch.c
@@ -14,11 +14,29 @@
 #include <xen/vm_event.h>
 #include <xen/virtual_region.h>
 
+#include <asm/endbr.h>
 #include <asm/fixmap.h>
 #include <asm/nmi.h>
 #include <asm/livepatch.h>
 #include <asm/setup.h>
 
+/*
+ * CET hotpatching support: We may have functions starting with an ENDBR64
+ * instruction that MUST remain the first instruction of the function, hence
+ * we need to move any hotpatch trampoline further into the function. For that
+ * we need to keep track of the patching offset used for any loaded hotpatch
+ * (to avoid racing against other fixups adding/removing ENDBR64 or similar
+ * instructions).
+ *
+ * We do so by making use of the existing opaque metadata area. We use its
+ * first 4 bytes to track the offset into the function used for patching and
+ * the remainder of the data to store overwritten code bytes.
+ */
+struct x86_livepatch_meta {
+    uint8_t patch_offset;
+    uint8_t instruction[LIVEPATCH_OPAQUE_SIZE - sizeof(uint8_t)];
+};
+
 static bool has_active_waitqueue(const struct vm_event_domain *ved)
 {
     /* ved may be xzalloc()'d without INIT_LIST_HEAD() yet. */
@@ -104,18 +122,34 @@ void noinline arch_livepatch_revive(void)
 
 int arch_livepatch_verify_func(const struct livepatch_func *func)
 {
+    BUILD_BUG_ON(sizeof(struct x86_livepatch_meta) != LIVEPATCH_OPAQUE_SIZE);
+
     /* If NOPing.. */
     if ( !func->new_addr )
     {
         /* Only do up to maximum amount we can put in the ->opaque. */
-        if ( func->new_size > sizeof(func->opaque) )
+        if ( func->new_size > sizeof_field(struct x86_livepatch_meta,
+                                           instruction) )
             return -EOPNOTSUPP;
 
         if ( func->old_size < func->new_size )
             return -EINVAL;
     }
-    else if ( func->old_size < ARCH_PATCH_INSN_SIZE )
-        return -EINVAL;
+    else
+    {
+        /*
+         * Space needed now depends on whether the target function
+         * starts with an ENDBR64 instruction.
+         */
+        uint8_t needed;
+
+        needed = ARCH_PATCH_INSN_SIZE;
+        if ( is_endbr64(func->old_addr) || was_endbr64(func->old_addr) )
+            needed += ENDBR64_LEN;
+
+        if ( func->old_size < needed )
+            return -EINVAL;
+    }
 
     return 0;
 }
@@ -127,15 +161,21 @@ int arch_livepatch_verify_func(const struct livepatch_func *func)
 void noinline arch_livepatch_apply(struct livepatch_func *func)
 {
     uint8_t *old_ptr;
-    uint8_t insn[sizeof(func->opaque)];
+    struct x86_livepatch_meta *lp;
+    uint8_t insn[sizeof(lp->instruction)];
     unsigned int len;
 
+    lp = (struct x86_livepatch_meta *)func->opaque;
+    lp->patch_offset = 0;
     old_ptr = func->old_addr;
     len = livepatch_insn_len(func);
     if ( !len )
         return;
 
-    memcpy(func->opaque, old_ptr, len);
+    if ( is_endbr64(old_ptr) )
+        lp->patch_offset += ENDBR64_LEN;
+
+    memcpy(lp->instruction, old_ptr + lp->patch_offset, len);
     if ( func->new_addr )
     {
         int32_t val;
@@ -143,14 +183,15 @@ void noinline arch_livepatch_apply(struct livepatch_func *func)
         BUILD_BUG_ON(ARCH_PATCH_INSN_SIZE != (1 + sizeof(val)));
 
         insn[0] = 0xe9; /* Relative jump. */
-        val = func->new_addr - func->old_addr - ARCH_PATCH_INSN_SIZE;
+        val = func->new_addr - (func->old_addr + lp->patch_offset
+                                + ARCH_PATCH_INSN_SIZE);
 
         memcpy(&insn[1], &val, sizeof(val));
     }
     else
         add_nops(insn, len);
 
-    memcpy(old_ptr, insn, len);
+    memcpy(old_ptr + lp->patch_offset, insn, len);
 }
 
 /*
@@ -159,7 +200,11 @@ void noinline arch_livepatch_apply(struct livepatch_func *func)
  */
 void noinline arch_livepatch_revert(const struct livepatch_func *func)
 {
-    memcpy(func->old_addr, func->opaque, livepatch_insn_len(func));
+    const struct x86_livepatch_meta *lp;
+
+    lp = (struct x86_livepatch_meta *)func->opaque;
+
+    memcpy(func->old_addr + lp->patch_offset, lp->instruction, livepatch_insn_len(func));
 }
 
 /*
-- 
2.32.0




Amazon Development Center Germany GmbH
Krausenstr. 38
10117 Berlin
Geschaeftsfuehrung: Christian Schlaeger, Jonathan Weiss
Eingetragen am Amtsgericht Charlottenburg unter HRB 149173 B
Sitz: Berlin
Ust-ID: DE 289 237 879





From xen-devel-bounces@lists.xenproject.org Tue Mar 08 15:26:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 15:26:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287088.486895 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbiu-0000RK-61; Tue, 08 Mar 2022 15:26:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287088.486895; Tue, 08 Mar 2022 15:26:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbiu-0000RD-2q; Tue, 08 Mar 2022 15:26:04 +0000
Received: by outflank-mailman (input) for mailman id 287088;
 Tue, 08 Mar 2022 15:26:02 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=yKud=TT=citrix.com=prvs=05922dae9=ross.lagerwall@srs-se1.protection.inumbo.net>)
 id 1nRbis-0000R7-L3
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 15:26:02 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 0e6bdb33-9ef4-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 16:26:01 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0e6bdb33-9ef4-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646753161;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-transfer-encoding:mime-version;
  bh=xNFArvititNpIWWNSi3QNjAaXILkXkQHCtvRLD29jcY=;
  b=MrQ3LJJ2Bm0kjcbZ7BRnASvzzDrrnCGfsKuy87EfyWQ3Z+ciJBlXm8B8
   ZB7E3Uo3wKUtp+XVCF1YxfsGiYYyB+oiY5tY9LABCJ6p83/gi7GvIVZ2T
   1rnCOu90LRbiENG6ogHXk59QjfF1+kKtKpmFatV0BSUDflqnHNECi1z4r
   w=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 68067774
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:FO+cXq9jV0uCQRr9FC+sDrUDQ36TJUtcMsCJ2f8bNWPcYEJGY0x3z
 zMfX22DO/vcNzfwc9siat7i/U0OusKDzNdhS1Zvr3o8E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oDpW1nlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnbKSDiYWAr3govQASUQHOBAlGqJs/bCSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFJkYoWomyTjWAOw5SJTHa67L+cVZzHE7gcUm8fP2O
 ZpBN2UwM0iojxtnKl4IBs8Hgd6Tryfwb2Bdl0+/rLglyj2GpOB2+Oe0a4eEEjCQfu1QhkGYo
 mvN/EzwBxgIM9rZxTft2nGrgPXGkWXkWYYRPLqi//VujRuYwWl7IBgVSHOypPCrjUj4V983A
 0AT9yAjqYA78UW5Sd+7UxDQiG6JuFsQVsRdF8U+6RqR0ezE7gCBHG8GQzVdLts8u6cLqScCj
 wHT2YmzXHo27ePTGSn1GqqoQS2aFwpSDFA+dQM+XRYfvobIkdoUgTjKQYM2eEKqteHdFTb1y
 jGMiSExgbQPkMIGv5mGEUD7byGE/caQEFNsjunDdif8t14iOtb5D2C9wQWDtZ59wJClok5tV
 ZTus+yX96gwAJ6Ej0Rhq81dTejyt55p3NAx6GOD/qXNFRzwoxZPnqgKuVmSwXuF1O5eIVcFh
 2eJ5WtsCGd7ZifCUEOOS9vZ5z4W5abhD8/5cfvfc8BDZJN8HCfeon0wOxHAgju0wBV3+U3aB
 Xt9WZz3ZZr9If47pAdaus9HieN7rszA7Tm7qW/HI+SPjuPFOS/9pUYtO1qSdOEphJ5oUy2Om
 +uzw/Cikk0FOMWnO3G/2ddKcTgicChqbbir+pc/XrPSfWJb9JQJVqa5LUUJINc+wcy4V47go
 xmAZ6Ov4Aan1S2dd1TQMSwLhXGGdc8XkE/X9BcEZD6A83MifZyu/OEYcZ42dqMg7+tt0bh/S
 PxtRilKKq8npujvk9jFUaTAkQ==
IronPort-HdrOrdr: A9a23:0foDyakciddr3BmKn+S+dV9kt2XpDfN5iWdD5ihNYBxZY6Wkfp
 +V88jzhCWZtN9OYhwdcIi7SdS9qXO1z+8R3WBjB8bfYOCAghrmEGgC1/qv/9SEIUPDH4FmpN
 5dmsRFeb7N5B1B/LzHCWqDYpgdKbu8gdiVbI7lph8HJ2ALV0gj1XYDNu/yKDwveOAsP+tcKH
 Po3Lsgm9PWQwVxUi3UPAhmY8Hz4/nw0L72ax8PABAqrCOUiymz1bL8Gx+Emj8DTjJm294ZgC
 n4uj28wp/mn+Cwyxfa2WOWxY9RgsHdxtxKA9HJotQJKw/rlh2jaO1aKv2/VXEO0aKSAWQR4Z
 zxSiQbToBOArTqDyaISC7WqkvdOfAVmjnfIBGj8CLeSIfCNU0H4oJ69Pxkm13imhEdVZhHod
 J29niEuZRaFw7NkRL0+sXBXRBvmk2ol2Avi/QSiXtoUYZ2Us4hkaUPuExSC5sOByT89cQuF/
 RvFtjV4LJMfUqddG2xhBgl/DWAZAV7Iv69eDlLhiVV6UkjoFlpi08DgMAPlHYJ85wwD5FC+u
 TfK6xt0LVDVNUfY65xDPoIBZLfMB2BfTvcdGaJZVj3HqAOPHzA75bx/bUu/emvPJgF1oE7lp
 jNWE5R8WQyZ0XtA8uT24AjyGGGfEytGTD2js1O7ZlwvbPxALLtLC2YUVgr19Ctpv0Oa/erLc
 pb+KgmdMMLAVGea7qhhTeOKKW6AUNuJfEohg==
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="68067774"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=LP1iD3IeeCmcPd/qUdY/mXgIrrEOYJCStbVfbbjIvv4Jm5IiHdJEZzEjOSuU9XGuDmWyXAyzc6kR/cRPBRxmpDPNpy3EvJ7QuezuwTPhiCloklXBjAHrCxdsjLcCdUJerC+M/KAddJokzxFtj6UaGp8n800j7q36y88neam28hpRAJCjZ2c4zCPEbxlaaBkwEEJINLLi/Cv4ch2qWD/hpWVJWCRrde7m+gul/pVw4fcL/HBftqh7a3q7ZsUThAOzOGazlHAJF81XKLErQw5sp03uOTj0/OHm5qHaxzV8wBode+huL1VbRr1tiV6O+/wv8mAPDA6xwArUMNS/YqaV8g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=oPAv92jPuHB14ndvhEZ3S+svqIwXKnZgm+8ruqbnaOY=;
 b=X/h1Gg+NusAObW1coHPy8T/K0B18LAvp0l4837Qs3i8OBdAmJUN4cc6vtzjhOkPtPvQW+eyrrr6h8liyDLndNsdjzj+L8+lZ7axLH6DZLTEdAWcxP6RpAOrosgRgN836Mq6w31Ug0LchNprCXDzRCfN8coEDxJ/Y90mK4ZLKtQ4aSDlp2QelAZwbWZNQZzJ38oYj5iDdNrQ+UgBaxHol5w7bOrRFvSpg0gp/UQQCud9q68oQygrAVkxBy9bL9tAiuMxinbmMMsekIrNf8410xIJ02lUCuHL1M7J+421+ZF5zY3WH+ZfjUesHO4XkEC3F2VkG7/yxiuRuNIuEiym2UQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=oPAv92jPuHB14ndvhEZ3S+svqIwXKnZgm+8ruqbnaOY=;
 b=lQrQNv+S9hy+QzbfwmuEMHQ9GFQe6g+WDd8PYQjvIToZPfMIjDRYHPrduuulGAGrbytUwjPbZFOwhwhZ1xGvAkHZPoirMSpHo1Kd9Si5hT7M5unoMCF66c8iCS1L92v/1TJ9KdwxmKLrSpLsJOz4Wrkp5P+QJHuAWjM2FIbvyYc=
From: Ross Lagerwall <ross.lagerwall@citrix.com>
To: Bjoern Doebel <doebel@amazon.de>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, "Roger
 Pau Monne" <roger.pau@citrix.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Subject: Re: [PATCH v3 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
Thread-Topic: [PATCH v3 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
Thread-Index: AQHYMteGyv4uMb9n4kauwbWKAS/6qKy1mRGg
Date: Tue, 8 Mar 2022 15:25:50 +0000
Message-ID: <PH0PR03MB63822464CF42ECDC06A3510BF0099@PH0PR03MB6382.namprd03.prod.outlook.com>
References: <453c6e5decb315109a4fbf0065cc364129dca195.1646735357.git.doebel@amazon.de>
 <b91fc474832dd0ce07d223542316fba74afc35ee.1646735357.git.doebel@amazon.de>
In-Reply-To: <b91fc474832dd0ce07d223542316fba74afc35ee.1646735357.git.doebel@amazon.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
suggested_attachment_session_id: 9c74656d-553e-1bcc-9b84-b4b87c226532
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 4e509670-6b27-4863-eca4-08da0117ed93
x-ms-traffictypediagnostic: SA1PR03MB6593:EE_
x-microsoft-antispam-prvs: <SA1PR03MB65936945B83172180BF78C71F0099@SA1PR03MB6593.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PH0PR03MB6382.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(53546011)(26005)(9686003)(7696005)(316002)(54906003)(55016003)(186003)(83380400001)(6506007)(76116006)(38100700002)(91956017)(66476007)(4326008)(71200400001)(110136005)(8676002)(66446008)(66556008)(64756008)(66946007)(86362001)(2906002)(33656002)(38070700005)(82960400001)(8936002)(44832011)(52536014)(508600001)(5660300002)(122000001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?eraTYdwHMLJppSmZZNlAnDILiWNWVZDZVvdrrGwYMjGlTFMmXLL5b9WECb?=
 =?iso-8859-1?Q?7UI3xWYlT3koIGBl8CWBpQ9ZMyviHU2Q8gBpeFGnPG39k6pJBPwYF+3O7l?=
 =?iso-8859-1?Q?xW6cFJtqFF58ikA/yf9eEAf7G0+2EsQatyTV9enj/s+Mg0narscAD2Ap8x?=
 =?iso-8859-1?Q?CYTWVYx3fdl/1LgFc3OS0t+BUrBIVl9mMraG9J0YxbaeinIUle5XwiawZK?=
 =?iso-8859-1?Q?aHQ8bFZe270nsg0yZzIwzyvLCsoUKFRD8E3Jb+sHg5VdiCdvoTZ5OfgCXK?=
 =?iso-8859-1?Q?/AxA+bchW19RV1lx65XP0gvX4om4guUUI5A8CkEkldiLkxzfIUE7SUQVuO?=
 =?iso-8859-1?Q?7EGYr3V2ipEY5V2oewmUcZhi/OSZCYyGcewrcjpYoiL1cCxVp5YnnJBI7F?=
 =?iso-8859-1?Q?Ik9BZkg3MouAC15iB8fRgkT7DO73oBCevpVabrOiQUXkEyfwd4rgJgYe9m?=
 =?iso-8859-1?Q?deubjCFEoMhI42GGgo2t7yk99sLbj/WSmgLDvZCid1D86c/qOzh3wEnYN6?=
 =?iso-8859-1?Q?YvlUgTP63nUyHNjPx6+6JKh4FQ22bIIswNDgv0wkZMfKarLzF+G3zfdcpI?=
 =?iso-8859-1?Q?Fhdd8eoXmJN8VSXGt8WD9oum8gFtsYJZlA0oUQdJitAr6wQ/Ox3q3m5nBc?=
 =?iso-8859-1?Q?+j+xVR6mxrPR+A2KonVOkaAddVD8dXhquDd97EamvpH7Yf0t9hTMNKvZnG?=
 =?iso-8859-1?Q?GHqlr6ZP2Nw4rHQWLdY1jVoGWDKUUMYVE3W70ig4e4OAKYZltNXZzbWXmx?=
 =?iso-8859-1?Q?NRKL3+sXHg/Q2HFOnVBM9CX56tKdidMXKWPtXWS8ngLAZo3yNbyYcCipr8?=
 =?iso-8859-1?Q?epJGEhE4ywYoheMSt+sAm4FDmZGJSQyytR4KjLgVdyuK3eFGgAkuFnzyk+?=
 =?iso-8859-1?Q?0+D5H48XJF1a9EMPDvYhYVAz5s8JbG+CFhIbFWC5gkWXtuJJ7GsNF3HiU/?=
 =?iso-8859-1?Q?v24ywRsrNO0DdoMj6tFtL30BneooSsQgJJc2ADUERf3/84pzM2nPHzktWg?=
 =?iso-8859-1?Q?SEijs+SAeVZXeS4vTZL7EWxRg3zQz62zKBaxQrh18zjoIS2MageNVx3wq9?=
 =?iso-8859-1?Q?v5atCHB/XeRYIL9zf/7aTHOeH5NJMpErpUHZrQ9PyW05o/0hJMI611ECre?=
 =?iso-8859-1?Q?px6OPbq+/t+X04BijehHRrTsZcKXyiz0pCcHyHQpMvDeIaFGDRS94Wcrqy?=
 =?iso-8859-1?Q?0inCkhAtPx6aulo1kWHclMGVoiN2twOiKH1MkK+d3vy/6Bo2ULrBzLNI11?=
 =?iso-8859-1?Q?/E7Ed0cqIEjjgkObNH69WMbPdoM3xXbGUkeTZjXNSzfJkHo1g/MtpBm2jl?=
 =?iso-8859-1?Q?Nub3yCAkTErdYhb7qyVH3ECZzbQR+5B91pBcaiI3iCDn6x1EcLw6cwt+5u?=
 =?iso-8859-1?Q?DJUyb+JxA6Et+Nwy92HFmrtxVXqmy1PvBK4byftqi4KuaJXbyaax+Fh+Uv?=
 =?iso-8859-1?Q?+mXx5QjO76eztRAytTPQMBgaYWBaATfXklsxSSdNaDscWoaE+CyMuNmjZv?=
 =?iso-8859-1?Q?xHAvwrJUdTjLJOnaeg2lhPx653S9v47fCEEJ0D0vkkM1Vj1F0gBrasEVop?=
 =?iso-8859-1?Q?4Ta31PtlaPkUWeYbD6zevorkeXrUO/iyNe1bVsmoEhNQWzs0DNuxuTLY7s?=
 =?iso-8859-1?Q?wQVteV0Z74VOm1wugya6St1PUQ4NWrFW7o3dsiyib5Pvsj4n/BbjObQoPM?=
 =?iso-8859-1?Q?CL74ofsmz7gaF3CIEdHWT0NTXSsQkGabpGVL/FENMYM1rezWuuhM6TofVm?=
 =?iso-8859-1?Q?U7eA=3D=3D?=
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR03MB6382.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4e509670-6b27-4863-eca4-08da0117ed93
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Mar 2022 15:25:50.7491
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: koZCckeXD+T0BhCLwuTByFHae+Je+Y8tiafoN3Wp1Z0XjV2BP3cupyXjoezIzMjtWdYrRz63X0mpy7hRzVQfbmwh0ARNr18YEPiwUIxkoQE=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR03MB6593
X-OriginatorOrg: citrix.com

> From: Bjoern Doebel <doebel@amazon.de>=0A=
> Sent: Tuesday, March 8, 2022 10:29 AM=0A=
> To: xen-devel@lists.xenproject.org <xen-devel@lists.xenproject.org>=0A=
> Cc: Michael Kurth <mku@amazon.de>; Martin Pohlack <mpohlack@amazon.de>; R=
oger Pau Monne <roger.pau@citrix.com>; Andrew Cooper <Andrew.Cooper3@citrix=
.com>; Bjoern Doebel <doebel@amazon.de>; Konrad Rzeszutek Wilk <konrad.wilk=
@oracle.com>; Ross Lagerwall <ross.lagerwall@citrix.com>=0A=
> Subject: [PATCH v3 2/2] xen/x86: Livepatch: support patching CET-enhanced=
 functions =0A=
>  =0A=
> Xen enabled CET for supporting architectures. The control flow aspect of=
=0A=
> CET expects functions that can be called indirectly (i.e., via function=
=0A=
> pointers) to start with an ENDBR64 instruction. Otherwise a control flow=
=0A=
> exception is raised.=0A=
> =0A=
> This expectation breaks livepatching flows because we patch functions by=
=0A=
> overwriting their first 5 bytes with a JMP + <offset>, thus breaking the=
=0A=
> ENDBR64. We fix this by checking the start of a patched function for=0A=
> being ENDBR64. In the positive case we move the livepatch JMP to start=0A=
> behind the ENDBR64 instruction.=0A=
> =0A=
> To avoid having to guess the ENDBR64 offset again on patch reversal=0A=
> (which might race with other mechanisms adding/removing ENDBR=0A=
> dynamically), use the livepatch metadata to store the computed offset=0A=
> along with the saved bytes of the overwritten function.=0A=
> =0A=
> Signed-off-by: Bjoern Doebel <doebel@amazon.de>=0A=
> CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>=0A=
> CC: Ross Lagerwall <ross.lagerwall@citrix.com>=0A=
> ----=0A=
> Note that on top of livepatching functions, Xen supports an additional=0A=
> mode where we can "remove" a function by overwriting it with NOPs. This=
=0A=
> is only supported for functions up to 31 bytes in size and this patch=0A=
> reduces this limit to 30 bytes.=0A=
> =0A=
> Changes since r1:=0A=
> * use sizeof_field() to avoid unused variable warning=0A=
> * make metadata variable const in arch_livepatch_revert=0A=
> ---=0A=
>  xen/arch/x86/livepatch.c | 61 ++++++++++++++++++++++++++++++++++------=
=0A=
>  1 file changed, 53 insertions(+), 8 deletions(-)=0A=
> =0A=
> diff --git a/xen/arch/x86/livepatch.c b/xen/arch/x86/livepatch.c=0A=
> index 65530c1e57..0fd97f2a00 100644=0A=
> --- a/xen/arch/x86/livepatch.c=0A=
> +++ b/xen/arch/x86/livepatch.c=0A=
> @@ -14,11 +14,29 @@=0A=
>  #include <xen/vm_event.h>=0A=
>  #include <xen/virtual_region.h>=0A=
>  =0A=
> +#include <asm/endbr.h>=0A=
>  #include <asm/fixmap.h>=0A=
>  #include <asm/nmi.h>=0A=
>  #include <asm/livepatch.h>=0A=
>  #include <asm/setup.h>=0A=
>  =0A=
> +/*=0A=
> + * CET hotpatching support: We may have functions starting with an ENDBR=
64=0A=
> + * instruction that MUST remain the first instruction of the function, h=
ence=0A=
> + * we need to move any hotpatch trampoline further into the function. Fo=
r that=0A=
> + * we need to keep track of the patching offset used for any loaded hotp=
atch=0A=
> + * (to avoid racing against other fixups adding/removing ENDBR64 or simi=
lar=0A=
> + * instructions).=0A=
> + *=0A=
> + * We do so by making use of the existing opaque metadata area. We use i=
ts=0A=
> + * first 4 bytes to track the offset into the function used for patching=
 and=0A=
> + * the remainder of the data to store overwritten code bytes.=0A=
> + */=0A=
> +struct x86_livepatch_meta {=0A=
> +    uint8_t patch_offset;=0A=
> +    uint8_t instruction[LIVEPATCH_OPAQUE_SIZE - sizeof(uint8_t)];=0A=
> +};=0A=
> +=0A=
=0A=
I think it would make things a bit simpler to use one of the spare _pad bit=
s=0A=
from struct livepatch_func  ather than hacking it into the opaque area. Is=
=0A=
there a reason you chose this approach?=


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 15:27:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 15:27:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287093.486906 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbjv-0001BQ-GP; Tue, 08 Mar 2022 15:27:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287093.486906; Tue, 08 Mar 2022 15:27:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbjv-0001BJ-D6; Tue, 08 Mar 2022 15:27:07 +0000
Received: by outflank-mailman (input) for mailman id 287093;
 Tue, 08 Mar 2022 15:27:06 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRbju-0001B7-PF
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 15:27:06 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 35d3bb5c-9ef4-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 16:27:05 +0100 (CET)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur01lp2052.outbound.protection.outlook.com [104.47.2.52]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-13-39R90pkVMt-CHVmX-VWmMw-1; Tue, 08 Mar 2022 16:27:04 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM6PR04MB4792.eurprd04.prod.outlook.com (2603:10a6:20b:2::13) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.19; Tue, 8 Mar
 2022 15:27:02 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 15:27:01 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 35d3bb5c-9ef4-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646753225;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=bi41F84unF7k8jt/I9MJYkNADDQudK8erSyx/4BpEpI=;
	b=L4kyAodO7512kEBY64qZXeO6cwAWYm+iQqwsGOBKrZuAQ0F5b8WJwuStou1JM8sK6EG4ZQ
	r6Vtgww/MiOcG7nBpPHcve3O7z7ALy5z44I43n+4QABuM0yrrXKVA33R3SVrDV2iRjrFfv
	1h2682qK7D5yI1C1Mx69z8O4hvCrSoU=
X-MC-Unique: 39R90pkVMt-CHVmX-VWmMw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=VsgK1CJulYFy30pduwbL/qFCWgLYSse7cegho/cj6rDfVf/qKFS6LJWrd4rJRNyAbrIC08VVu/iYeVJgRUpXgAIxku/L7Vhb50LHQCKWwCnhTp0GWutvLti1DTEVWI646GVmhdfxIAdAa/p1GuhCKFRDCVHQQ2y5cAQSUvQpFqhv+Eqc4S3k7ijxe3mGHeg586Zstf+sUbcwUXLFj9S3EMq+7uITtaJJExB2ZPKwPtKl8wKA0a0P/g3cUIg9moovQZeWNpyC39H2eNBVzYEuuM2QdDmhvyKXRuFu6fOzm5kpC0sGJoB9WXhpUP6QmzL6WYhlfwnpUJUcahJrbpnSVg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=bi41F84unF7k8jt/I9MJYkNADDQudK8erSyx/4BpEpI=;
 b=eyaeXPppK0oph3OgreKbwOOQp2DV5hIum29LY06FYoUGzNxDrAC23U9tOTh0PxzI+WNRyZg9I9r4uWf2IED/u9vjoMvP8TDpqTFv9azaKJGJ7Si1AqMLiwCTugXGfWnPZZUYOyC/ZEYtVWSSpd3uDQpAgx7X+rpyXGf5hkowKQ9QusmTiYafV2J25qtI5WUu/rJfsQA2tO3Oee7JtFSgWcAb2UQDG9BpbIF0eEpLqg924J4ULg1S0J+QdnhZW75NSM48bAC3A1mpv8HYygyLoYSHifCjQLlaqKxL+p2dYN9a8QWjYO+gjVfFSD0hFrcECgjQ0WncB0BnFoOGWOdZAw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <c71ac406-15a9-6291-d670-0f965a59bebf@suse.com>
Date: Tue, 8 Mar 2022 16:27:00 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Content-Language: en-US
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Kevin Tian <kevin.tian@intel.com>, Paul Durrant <paul@xen.org>
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH 4.16] VT-d: drop undue address-of from
 check_cleanup_domid_map()
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: FRYP281CA0007.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10::17)
 To VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 30fd100e-076c-4de5-a96f-08da011817d6
X-MS-TrafficTypeDiagnostic: AM6PR04MB4792:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB479277BA20CB5A035CFB4ED7B3099@AM6PR04MB4792.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(26005)(186003)(6512007)(2906002)(4744005)(36756003)(2616005)(38100700002)(31696002)(86362001)(316002)(6506007)(8676002)(4326008)(6916009)(54906003)(66946007)(66556008)(66476007)(508600001)(31686004)(5660300002)(8936002)(6486002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?ZExnMFh6blpmbDVhME9YR0JrV240S3dQMjVybTNWd1dUdFVuQmhKWTJyRjRp?=
 =?utf-8?B?SGNnWDZYb2x6NlpvcytHdUJaa3lnbCs1eFZGWUdSVjlSREUxYlhvc2N4Q01L?=
 =?utf-8?B?Wk1jMUE3Qkw5VGF0UGFQZWNRK21IbSszUUEvVGdLd0xpNG9FSUtGY2V2L3Vl?=
 =?utf-8?B?dDFERnY0ZWNONHFnQkdOUXlHN09FQXFEeGc0QWo5QlVkZkp4YVEzNjdUMTRP?=
 =?utf-8?B?YTJLckJkSjcraXRMeWdEVEJ2Q25JT1JsTnZkWm5VazkwNVRHbzYyZ1Z6aFZC?=
 =?utf-8?B?ZDJabUM5MHgvRWkrVDN5RlZqZEowcEd4R0NUaEhDRWpvK1JwMVNHN0NJTjA3?=
 =?utf-8?B?UFF4c0s0TTNZT2NxN1hrQ2dxbm1uaEV0RXM5ZUZxdHNDdXpjTTd4T1hPV2dE?=
 =?utf-8?B?NGR6L2d2c0NCTVhJb3poN013MXByaWJQOGtjaTEzTnkwU3lpc250Z1dhdzJt?=
 =?utf-8?B?dngyRHUvVVVtVVNBa2p6dU82V1IyZGNLcnBVc0VXK3BQaWY5SGZtd2drMm5L?=
 =?utf-8?B?RlJjNTJyTTJDQXFrKzNteitJeHljeVAvTjhJTVU0MTUvTFhBS1N3V1l2MlV4?=
 =?utf-8?B?OFN4cDN4S3ovVVBXOFdvQ3g3L2NxRkVFbzYyc0QyOS9rUndxR080akVlUHh0?=
 =?utf-8?B?WnhvcmlNVmw2aHlaS3k4S2dKbnh5Wkl3dGREV2F4L0lmcFY4QU5aUVZZNStF?=
 =?utf-8?B?VGI0aXE0eHVJTjhzeGoyVkZtWjdXY1dzdStHenpNT1Yva2toTi9OMGMvS2hU?=
 =?utf-8?B?SDJxUVcxUnptNkxJK0ZzZko0Wi9RM3BYNHRuSkkxVUloVk1YWU1yRGRxNDdy?=
 =?utf-8?B?MkQ3OTdkNWJVMVM2QTcvTXZxUUFPTjRnMjI3dGNZejg5VW1RMUlJRkZDNStP?=
 =?utf-8?B?VzJJUWN0YWg0UFN6c2lZS2RIWW5JK0wvdlorbjBaM2l1cXM5eXZoQnM4aFJC?=
 =?utf-8?B?UUFQL2VIQ3FhNWhhZlBvL0trZmlrSXhJWHVkOVRwdVJBTnRPdkptVEV5VEZk?=
 =?utf-8?B?QzByM0xrbkg1em9Lc3ZVUHJBSVhDVXBhY2x3MzlCOHZ6UUxRcEdlMTVNN0pR?=
 =?utf-8?B?UGUxNm9zaUhsekVqN05IOTkzUmVGdjZ5VEdWcE52c0h3VmFta1NGY2cxc2ZD?=
 =?utf-8?B?UUZzbGI2T3kzYnZhcnZDKzNiVEhBU25jdFFxR3Fsek5BemZiYVB2cksvZlUw?=
 =?utf-8?B?OERmNCsyWkxONmJaNEsxVTFKVVNiaUYrUGhPUlVCZGhPa25MMmV1c2tkaElj?=
 =?utf-8?B?WjBucTRZbkZHWFN0ckZTYkdwMmpDa3FGcm5pTlJEb0hRdnRNb25oN2VWTm9B?=
 =?utf-8?B?V3dEK0ltV0RTWEc1bTlnb2x6Q3FDZkdsd2tIb01Oa1hTanA3cW1PdGE1VS9h?=
 =?utf-8?B?RDFqY25tbEkwTG9tNXNxK1h1SE5lTzJXdjU5V1VkTTVITUpSTk1iRVlCSVJa?=
 =?utf-8?B?WGFnemlPTkU3ZGFZTldMdEF2YnRSa0dmRCtNR1pJTlpCdEswbkt2MWNVb3FT?=
 =?utf-8?B?NkhWZkNJc0xlZitibGh2S21ncnRGTTFwVVY3VDFwTEFUZGRMUE4zc0Z1Vk5L?=
 =?utf-8?B?NHpVaHViN3g1RnRNT293U0toMG9SUi9KY0kvTCtUc3FLWlc1K1FGN2x4V2JW?=
 =?utf-8?B?U2d3elVJdlYzSVllbmhjUDI5R1VMbHpTSWNYa2lsNExrU2s1MGZ2RGlyalVN?=
 =?utf-8?B?YURsNlc0Z2x2Y3I1NVBnMm50ajdENzhsc21ZZC9LY0ZSczEwUWdTVzNxNVpB?=
 =?utf-8?B?WnFIYmlEQ2RSSS90MGpiYVVSL2pzWWdxcmhaMWxSa1lXMnBqcDM4Q0xHZnFO?=
 =?utf-8?B?NWdMVU1ZeExkMkd5ZHJ5MzBTSmZXS1Rnb0dzN2NKWnBaTHl6c05Vb2lLVzE4?=
 =?utf-8?B?ZUZCUlVZeHBHRTFTMjVlUC9VRUZNZXVBYVV6dTBaUENoa1U5M1ptUVlYTVB1?=
 =?utf-8?B?ZVdsNVVrcWlzaEJCejl5YzAxRFJlUUVGZXBCYUhHeStkcitURGxZRW1STks5?=
 =?utf-8?B?SkJYamJRUjU5bnpDbkV4ZklpOEJLc1gwT1ZHWUphWXRMczNSSmFkb3RsZWZ5?=
 =?utf-8?B?QnAvK3ZWYWgycFYzRmlLSk5KUDVKRitoWTFqckZlODdCeWtQenhhMmJqeEpT?=
 =?utf-8?B?a1FWdEJMMTd1R2NvdTljbGFyb1puNTAzUmpadFFWM1pIbVFHVU9ibGVWa3VV?=
 =?utf-8?Q?yctygHdwbnu2CXRvjN9utd4=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 30fd100e-076c-4de5-a96f-08da011817d6
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 15:27:01.8383
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: P8C8cm5NovRdtwJJZm6sdRWivnL4VEa5ZlOlqPTKbkHGy/8FffWb44ehu0CeEhNc2pKUi6jCXY8MALcHMm+2/w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB4792

For an unknown reason I added back the operator while backporting,
despite 4.16 having c06e3d810314 ("VT-d: per-domain IOMMU bitmap needs
to have dynamic size"). I can only assume that I mistakenly took the
4.15 backport as basis and/or reference.

Fixes: fa45f6b5560e ("VT-d: split domid map cleanup check into a function")
Signed-off-by: Jan Beulich <jbeulich@suse.com>

--- a/xen/drivers/passthrough/vtd/iommu.c
+++ b/xen/drivers/passthrough/vtd/iommu.c
@@ -197,7 +197,7 @@ static void check_cleanup_domid_map(stru
 
     if ( !found )
     {
-        clear_bit(iommu->index, &dom_iommu(d)->arch.vtd.iommu_bitmap);
+        clear_bit(iommu->index, dom_iommu(d)->arch.vtd.iommu_bitmap);
         cleanup_domid_map(d, iommu);
     }
 }



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 15:36:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 15:36:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287100.486916 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbso-0002gB-Cc; Tue, 08 Mar 2022 15:36:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287100.486916; Tue, 08 Mar 2022 15:36:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbso-0002g4-9h; Tue, 08 Mar 2022 15:36:18 +0000
Received: by outflank-mailman (input) for mailman id 287100;
 Tue, 08 Mar 2022 15:36:17 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRbsn-0002fy-QW
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 15:36:17 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 7e407a8a-9ef5-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 16:36:16 +0100 (CET)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur02lp2053.outbound.protection.outlook.com [104.47.5.53]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-3-QTYAuUePOI26YyWgtL5rdw-1; Tue, 08 Mar 2022 16:36:15 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR04MB5118.eurprd04.prod.outlook.com (2603:10a6:803:5f::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.20; Tue, 8 Mar
 2022 15:36:12 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 15:36:12 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 7e407a8a-9ef5-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646753776;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=rA65agIqEQQtH8bhn/O1o4MT5ndy2KkYpXVr0KSF/cs=;
	b=XmFQOTW+Ot/IA1SZVgsu5BXEFsp7bo8dDoEkeHIPmySp0awvLh47ATy7lZSRfYipgJxIGs
	rmcrZ3rifvbfbHhXQ8NydekgQoji+MW1XDkJOM10ESeUNTrP56VVCP+oT6tZyZN+f6yRnk
	GDV5j+LoH7HeukKGsPNqXxtzp+MOd9o=
X-MC-Unique: QTYAuUePOI26YyWgtL5rdw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=U1XcL4Row74TJnIJarQ8KcpOm6IW4VPfNky/o6WUcdv/tmrfdh2jalCsq9qkMPhBZJRZh8NdkvBNNs6pro0tUyO/0btWO4cijjI63UF63mgO1e925m5HMj6wm7WF/UwrAAzcaMm11SLlP5g6CfJ7bl6+rMor1LMQG+lGOxe0kNLfB/nMuONGBGJTA9ys1hGRV6actWvia9mdpvGO5yPgGlaFOHd6PK1x992pfGREIntZLw3d3SGXzIQRdKaz8oMhEK3oEk2ocHZocNzpMelJ5N2sCNCc0rm6tI+7y4SmdcOj+XeFqoP/MiSWrUdrB65e4z2GAt9XRe1nyCTiICMztw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=9w2AOTn8uytV+d9I02LqePSIlCotZTPrQqFmUBd59kc=;
 b=A8w+vn47VrD7fMIO6g7MOUrGwkh6kNTU7kdkEWK6znXntSRc65QuDcNRI/lqVKEY/oh5tBVB9dTmjkZ341sUhbQ8pv86myR48fmN2joaWMwxVvrJeAfXFTgSQFRcyc6tPw3QAAiFT/wi2T+Nb+AlM/VYm9KaR+sqhQOvtWi6qJCOUKDdFZZWMhgR02/ddxWVcEbikTrN4bSd3IMg8iOmkGR4FFm0zMXFkT1SLn8EXhBTQHcCq7YK/fGyKVdxW9hrF+DCAOthybmL5TESrZ9ppQSxzrr4VhkJeV/0QWMShEipK88frMdxKsd123/frk7WjS0bxDA3ba+BG6eBh3aqBw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <83fa28ce-f2db-2451-356f-0dc0266834f2@suse.com>
Date: Tue, 8 Mar 2022 16:36:10 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH] x86/cet: Use dedicated NOP4 for cf_clobber
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
 Bjoern Doebel <doebel@amazon.de>, Michael Kurth <mku@amazon.de>,
 Martin Pohlack <mpohlack@amazon.de>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <20220308140126.8815-1-andrew.cooper3@citrix.com>
 <18fb4115-94d8-16c2-e39b-1be895e254f4@suse.com>
 <476a25f8-86eb-0df5-b481-fc4cd5ecbb18@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <476a25f8-86eb-0df5-b481-fc4cd5ecbb18@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR0301CA0051.eurprd03.prod.outlook.com
 (2603:10a6:20b:469::28) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 9a67136b-db8b-46d2-9a6c-08da01196038
X-MS-TrafficTypeDiagnostic: VI1PR04MB5118:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB51182CE932A6C7A91402EE2BB3099@VI1PR04MB5118.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2616005)(6486002)(31686004)(6512007)(6506007)(36756003)(53546011)(66574015)(83380400001)(5660300002)(508600001)(31696002)(54906003)(26005)(8936002)(6916009)(186003)(86362001)(2906002)(38100700002)(8676002)(66556008)(66476007)(66946007)(316002)(4326008)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?/q8tM19xW+v5iz3OvGYzNzP2dBOhGMUTVQcgxzKAUcCgDk8qxqWxPoY0tDwf?=
 =?us-ascii?Q?OKhZY88TqQOqKisZRzTfXVDV/f6LMA6nI9qDazsNlPT7cNHO5oYKDvptx8MH?=
 =?us-ascii?Q?oEr2kpnPAgYDiUTR01Id3KVT5D5VDfqHcaocVH8v/ypaHlNXci/iCwA3FaOk?=
 =?us-ascii?Q?RwKnBPqLfKtFOSdgB0nXxeSUE5YSQGGW1E4gNwsjB2wQQ3BZTDSb8QZW/IQF?=
 =?us-ascii?Q?vQFTPBJgg3g5lU/wcslsbxkgrfvot1yeP/MFsGGDcfhj4C9LeQk4pPlrqo2Z?=
 =?us-ascii?Q?xW4Y1VhX9TPIIa/8QRX2W4sJXUVgkZTRhzXBukkCkYtoBinMatfkl4u5YAyr?=
 =?us-ascii?Q?SxCJSVGbrwlgBIcOFWf7PvfLM2jIy0439HC1I/TFxKAm1yr7dF7vq1mZwd7T?=
 =?us-ascii?Q?yER8PgJWklwEfHupaq4iH5D79DCIvPZa4MJJO3DossCVdM0JAIEdkFqbqSoo?=
 =?us-ascii?Q?6LotNvwHY3n7Nh6CJKapTgvA4xwSwJXQqxZU20eec9uc3SLNDL7X/yDe1LiL?=
 =?us-ascii?Q?NKVY9wsYGMcrcrO4QdzBpdAdt1znZppQB+T0TIH4AFcUmi/UzrIwgPWtP2bR?=
 =?us-ascii?Q?CFoxXqBdF1qkgDDljdDe22bgjoSfrGDTNdPJAuTLi3Fwe74Gaf86bWRWFAUV?=
 =?us-ascii?Q?w9ZA/YElveL4CNCrJBNqbapZZhNLjjqfwAnRiNwJoDAmneX9GSMbKBSBFuOQ?=
 =?us-ascii?Q?FBhuV8gBkGkmUmn3xGIDliyODaRMhY3HXV7w/fMvbFKOn77BWFyJ+aXwdWDW?=
 =?us-ascii?Q?5HCTF1dhxcfAGa8dxs97H1XRbXEISUV91CsvYysWEouG2SnJTQhD7Zz+gQyf?=
 =?us-ascii?Q?l6mQBSY1YDTylcQpoZnc329dalezDjDt6A8YfvKVQJPsIMZKR2ZrsllAfxZ2?=
 =?us-ascii?Q?WEmMYp6FYC437sVu5aO+iQEmWU+Jw9o9qlsXHOzRrw+v49m4iB+b/bkjtAO+?=
 =?us-ascii?Q?30jZAwURRUQ9bbR/pIKmPp4RT1umXQo2kH9PNQ6deYBm5IJlgoObwsmyRxwK?=
 =?us-ascii?Q?K/z6LELRRb2/gGTCDQtJPouGT34nVWdQ7B07AZWZwbY3aA8v89VhhT+QT1G3?=
 =?us-ascii?Q?efOC/QXdicHY6jnmuMBhg9to4JYHMoKu6m9sBVAU/70bG4HPTj5OBIslbwWV?=
 =?us-ascii?Q?7kX7CmX7rV8aok50BzEiOzgQShrCmI3t2eNtTEmOtwtq0PHOwsIotsBibvtv?=
 =?us-ascii?Q?LEZg4R7/5qiZ5Ao89Faqe6631GQ+ePtjp+ndjFv8rGZl5P3i5nYntpvV415S?=
 =?us-ascii?Q?ZXu5pqP5YIkNDQXFX791UbBk3UNgUWztF1RsTPq1QwGbCgAThGjYEShFqju6?=
 =?us-ascii?Q?h8B7q3+RCU8k6eTG+MWah6FJ8LBTDvvUcEZmHHSKHZm5G9ZazVvVvIp54kQy?=
 =?us-ascii?Q?Sy6OkfighiX0b+dQZaGcDDM5lsdcxbCKpJfcn5VdbPPOeqynmRutji8ywvRm?=
 =?us-ascii?Q?qZC297csUo+C43g8bex9EOUIpQ0DNeoE/l1JB4lwXS0D35P29oyb8APynd/c?=
 =?us-ascii?Q?10HtsUAdGsA1d93pH4YyMqrVz5WyQMc3jWZcsCnRF21ieS4c7cuZPocBQLmh?=
 =?us-ascii?Q?/IbZ0aJLRlSncrvmrObBpwR7t7spB5Mhqnrv7wUIxJBqu9HTVR3JqTvePKgG?=
 =?us-ascii?Q?9LSg+Z47K8cW6ZBERRzcOcE=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 9a67136b-db8b-46d2-9a6c-08da01196038
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 15:36:12.7572
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: GmF7exZoN7Lm4IZwQFNfjFz+cwOtLhttjhlmKfDAL3LiWR02QS2/YTQnhEXHRFlZgoF4ZA77jK8veZlosO3FZw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB5118

On 08.03.2022 16:19, Andrew Cooper wrote:
> On 08/03/2022 14:37, Jan Beulich wrote:
>> On 08.03.2022 15:01, Andrew Cooper wrote:
>>> For livepatching, we need to look at a potentially clobbered function a=
nd
>>> determine whether it used to have an ENDBR64 instruction.
>>>
>>> Use a non-default 4-byte P6 long nop, not emitted by toolchains, and in=
troduce
>>> the was_endbr64() predicate.
>> Did you consider using ENDBR32 for this purpose?
>=20
> No, and no because that's very short sighted.=C2=A0 Even 4 non-nops would=
 be
> better than ENDBR32, because they wouldn't create actually-usable
> codepaths in corner cases we care to exclude.

Well - I thought of ENDBR32 because elsewhere you said we don't
need to be worried about any byte sequence resembling that insn,
since for it to become "usable" an attacker would first need to
have managed to manufacture a 32-bit ring0 code segment. Now you
say effectively the opposite.

>> I'm worried that
>> the pattern you picked is still too close to what might be used
>> (down the road) by a tool chain.
>=20
> This is what Linux are doing too, but no - I'm not worried.=C2=A0 The
> encoding isn't the only protection; toolchains also have no reason to
> put a nop4 at the head of functions; nop5 is the common one to find.

Well, okay - let's hope for the best then.

>>> Bjoern: For the livepatching code, I think you want:
>>>
>>>   if ( is_endbr64(...) || was_endbr64(...) )
>>>       needed +=3D ENDBR64_LEN;
>> Looks like I didn't fully understand the problem then from your
>> initial description. The adjustment here (and the one needed in
>> Bj=C3=B6rn's patch) is to compensate for the advancing of the
>> targets of altcalls past the ENDBR?
>=20
> No.=C2=A0 Consider this scenario:
>=20
> callee:
> =C2=A0=C2=A0=C2=A0 endbr64
> =C2=A0=C2=A0=C2=A0 ...
>=20
> altcall:
> =C2=A0=C2=A0=C2=A0 call *foo(%rip)
>=20
> During boot, we rewrite altcall to be `call callee+4` and turn endbr64
> into nops, so it now looks like:
>=20
> callee:
> =C2=A0=C2=A0=C2=A0 nop4
> =C2=A0=C2=A0=C2=A0 ...
>=20
> altcall:
> =C2=A0=C2=A0=C2=A0 call callee+4
>=20
> Then we want to livepatch callee to callee_new, so we get
>=20
> callee_new:
> =C2=A0=C2=A0=C2=A0 endbr64
> =C2=A0=C2=A0=C2=A0 ...
>=20
> in the livepatch itself.
>=20
> Now, to actually patch, we need to memcpy(callee+4, "jmp callee_new", 5).
>=20
> The livepatch logic calling is_endbr(callee) doesn't work because it's
> now a nop4, which is why it needs a was_endbr64(callee) too.

Sounds like exactly what I was thinking of. Perhaps my description
wasn't sufficiently clear / unambiguous then.

>>> --- a/xen/arch/x86/include/asm/endbr.h
>>> +++ b/xen/arch/x86/include/asm/endbr.h
>>> @@ -52,4 +52,16 @@ static inline void place_endbr64(void *ptr)
>>>      *(uint32_t *)ptr =3D gen_endbr64();
>>>  }
>>> =20
>>> +/*
>>> + * After clobbering ENDBR64, we may need to confirm that the site used=
 to
>>> + * contain an ENDBR64 instruction.  Use an encoding which isn't the de=
fault
>>> + * P6_NOP4.
>>> + */
>>> +#define ENDBR64_POISON "\x66\x0f\x1f\x00" /* osp nopl (%rax) */
>> In case this remains as is - did you mean "opsz" instead of "osp"?
>> But this really is "nopw (%rax)" anyway.
>=20
> Oh, osp is the nasm name.=C2=A0 I'll switch to nopw.

Reviewed-by: Jan Beulich <jbeulich@suse.com>

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 15:37:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 15:37:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287107.486927 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbtT-0003Sa-RT; Tue, 08 Mar 2022 15:36:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287107.486927; Tue, 08 Mar 2022 15:36:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbtT-0003ST-O8; Tue, 08 Mar 2022 15:36:59 +0000
Received: by outflank-mailman (input) for mailman id 287107;
 Tue, 08 Mar 2022 15:36:58 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=JMfM=TT=amazon.de=prvs=0590b4220=doebel@srs-se1.protection.inumbo.net>)
 id 1nRbtS-0003PK-2r
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 15:36:58 +0000
Received: from smtp-fw-9102.amazon.com (smtp-fw-9102.amazon.com
 [207.171.184.29]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 955b8293-9ef5-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 16:36:56 +0100 (CET)
Received: from pdx4-co-svc-p1-lb2-vlan3.amazon.com (HELO
 email-inbound-relay-pdx-2b-28a78e3f.us-west-2.amazon.com) ([10.25.36.214])
 by smtp-border-fw-9102.sea19.amazon.com with ESMTP; 08 Mar 2022 15:36:40 +0000
Received: from EX13D03EUC002.ant.amazon.com
 (pdx1-ws-svc-p6-lb9-vlan2.pdx.amazon.com [10.236.137.194])
 by email-inbound-relay-pdx-2b-28a78e3f.us-west-2.amazon.com (Postfix) with
 ESMTPS id F2B04A099C; Tue,  8 Mar 2022 15:36:39 +0000 (UTC)
Received: from EX13MTAUWA001.ant.amazon.com (10.43.160.58) by
 EX13D03EUC002.ant.amazon.com (10.43.164.60) with Microsoft SMTP Server (TLS)
 id 15.0.1497.28; Tue, 8 Mar 2022 15:36:38 +0000
Received: from dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (10.13.240.106)
 by mail-relay.amazon.com (10.43.160.118) with Microsoft SMTP Server
 id
 15.0.1497.28 via Frontend Transport; Tue, 8 Mar 2022 15:36:36 +0000
Received: by dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (Postfix,
 from userid 3160037)
 id 40F714EA9; Tue,  8 Mar 2022 15:36:36 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 955b8293-9ef5-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646753817; x=1678289817;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=e3B/QchphUR9r3U95HGdbpFpeOj5wxOfzK3Uqh6+kQE=;
  b=lr0z+XBvRUe9xfbXsyXe28WL4jhKUMReKJaj+W7WXd3F0N3UaSrLeW/2
   q30yZz9/58VPeFIn3v/6IBYyOF3SrOJdpt654Iskv7rrKs/g7vismuukl
   ulMqTlmw5BJ50FJTxTfpbfeacMR6DQ6ya/UjXqaEq37nJOxwJlyZrtay5
   E=;
X-IronPort-AV: E=Sophos;i="5.90,165,1643673600"; 
   d="scan'208";a="200441366"
From: Bjoern Doebel <doebel@amazon.de>
To: <xen-devel@lists.xenproject.org>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, Roger
 Pau Monne <roger.pau@citrix.com>, Bjoern Doebel <doebel@amazon.de>, Konrad
 Rzeszutek Wilk <konrad.wilk@oracle.com>, Ross Lagerwall
	<ross.lagerwall@citrix.com>
Subject: [RFC PATCH v1] arch/x86: Livepatch: fix overflow check when computing ELF relocations
Date: Tue, 8 Mar 2022 15:36:34 +0000
Message-ID: <b74a68b038c31df4bb94a5b5e87453f5a249cfe2.1646753657.git.doebel@amazon.de>
X-Mailer: git-send-email 2.32.0
MIME-Version: 1.0
Precedence: Bulk
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

Comparing a signed 64bit integer to a signed 32 bit integer may lead to
unexpected overflows. Adjust the cast to use the same type.

Signed-off-by: Bjoern Doebel <doebel@amazon.de>
CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
CC: Ross Lagerwall <ross.lagerwall@citrix.com>
---
I need some input here. When testing the CET-BIT livepatch updates I
noticed that my generated livepatch would not load due to

(XEN) livepatch: vmx: Overflow in relocation 1 in .rela.altinstructions for .altinstructions

A deeper look revealed that the ELF relocation adjustment seems to be
going wrong and that in fact the lower 32bit of the compared values in
my case were identical, but that the cast to int64_t for the value
pulled in extra 32 bits, which turned out to be different.

Applying this patch fixed the issue for my example and I got a fully
working livepatch. However, I do not understand what is actually going
on here, so I'm sending this RFC to get extra eyes on the code.
---
 xen/arch/x86/livepatch.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/xen/arch/x86/livepatch.c b/xen/arch/x86/livepatch.c
index 59620b8a4f..5380e18bd9 100644
--- a/xen/arch/x86/livepatch.c
+++ b/xen/arch/x86/livepatch.c
@@ -339,7 +339,7 @@ int arch_livepatch_perform_rela(struct livepatch_elf *elf,
 
             val -= (uint64_t)dest;
             *(int32_t *)dest = val;
-            if ( (int64_t)val != *(int32_t *)dest )
+            if ( (int32_t)val != *(int32_t *)dest )
             {
                 printk(XENLOG_ERR LIVEPATCH "%s: Overflow in relocation %u in %s for %s\n",
                        elf->name, i, rela->name, base->name);
-- 
2.32.0




Amazon Development Center Germany GmbH
Krausenstr. 38
10117 Berlin
Geschaeftsfuehrung: Christian Schlaeger, Jonathan Weiss
Eingetragen am Amtsgericht Charlottenburg unter HRB 149173 B
Sitz: Berlin
Ust-ID: DE 289 237 879





From xen-devel-bounces@lists.xenproject.org Tue Mar 08 15:40:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 15:40:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287115.486939 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbx6-0004tQ-Bh; Tue, 08 Mar 2022 15:40:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287115.486939; Tue, 08 Mar 2022 15:40:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbx6-0004tJ-7X; Tue, 08 Mar 2022 15:40:44 +0000
Received: by outflank-mailman (input) for mailman id 287115;
 Tue, 08 Mar 2022 15:40:43 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRbx5-0004tD-4j
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 15:40:43 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 1c78aa2e-9ef6-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 16:40:42 +0100 (CET)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur01lp2057.outbound.protection.outlook.com [104.47.2.57]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-41-2iWYIUtpO02hgZC1zqwS3Q-2; Tue, 08 Mar 2022 16:40:40 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PAXPR04MB9155.eurprd04.prod.outlook.com (2603:10a6:102:22e::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Tue, 8 Mar
 2022 15:40:38 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 15:40:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1c78aa2e-9ef6-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646754041;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=klhwGBiEX68giHVeLF5GuUDfbg1XCXAVNjJ5rg2LPqI=;
	b=Lhf92BzBsI8nuWYG6XQmWnB75+EJwuHNLAFasha9FEAysiZ8PgeC8b/oSaKy8nghxYFwh/
	++elQ/1h/r/Rl91pJ/PsX6ooVdJ5166AkBoc8aWpCQ1o7RVI5d90bIdJ1fH6NC5aNJ/uj/
	Fs8I65daRgcN0rbZIxekpVMKDyEHpWI=
X-MC-Unique: 2iWYIUtpO02hgZC1zqwS3Q-2
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=mbWCK/Jw1MRIj1gQ3j0dwzNdTfa1UzU2NnZGzNFWM8uKVHX2BEXd4PHycksDWA/9vEseH8CfCdfANym4qoXh6cGuRyrtceC/H2jDaCSyZtm/HoQ9UCFZjxL+6FbJooQeDgTGEs/pks7IQ88BibayKvtU9MwYH0ZqOWtDprvW30kw5CGdg/YOD8C2qmUpRNTmU7XhsPTjwiPQv0wYmh09/12BZscj2g4BTNKWdxecDdHB4gmYcNFNLiTT8i9SmwBR8WIuVIfjDMzSwI9feiDe2E2jHufixYWgr/hbjOjYEsEb1FLjgl22E1xsARMqpBcjTUxmOa/vwI1Or0TGshvdPg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=klhwGBiEX68giHVeLF5GuUDfbg1XCXAVNjJ5rg2LPqI=;
 b=k/6241eh7EfNYb5ik5NFDsPqRGzjFV2ZfqldwKVu0+SOEuYalLTzPrE3R7PTj7aT5jF6Hc4cc5euWZLNBu4Sf6oGPe8QEZb8tQRX/BYERkz06zp480bYlL5CwD/N05ODJqoXztc2TXkb7J9bVg83gSXEO5uMoE6l0gpO//laijtEZkeo96kf5bBbwHaiXNFWg7MlxPRNl/q5KADoJiFU2w1LweJKRg4jxiuMaGovhN+8nNymPYaf0OvzHVTVIrtKKx/wXH0odHr465YyH0o9nayfteIV8lVR5gdpn0f7C6e/lEu6+3GD33draE1O/pYU4KQkUw1MEqdITTnfzgA8NA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <69a3f10a-f447-9510-8e3f-7a5fae42ab96@suse.com>
Date: Tue, 8 Mar 2022 16:40:35 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v4 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
Content-Language: en-US
To: Bjoern Doebel <doebel@amazon.de>
Cc: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>,
 Roger Pau Monne <roger.pau@citrix.com>,
 Andrew Cooper <Andrew.Cooper3@citrix.com>,
 Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
 Ross Lagerwall <ross.lagerwall@citrix.com>, xen-devel@lists.xenproject.org
References: <7e547248b6c24b9f3761720f84919614af69c802.1646752948.git.doebel@amazon.de>
 <7807aba5916fa4d983ec876ae560854093211cf0.1646752948.git.doebel@amazon.de>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <7807aba5916fa4d983ec876ae560854093211cf0.1646752948.git.doebel@amazon.de>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM5PR0602CA0001.eurprd06.prod.outlook.com
 (2603:10a6:203:a3::11) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c6a9cbaf-d20e-454e-f036-08da0119fe5b
X-MS-TrafficTypeDiagnostic: PAXPR04MB9155:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB91552B6F938852093DD77245B3099@PAXPR04MB9155.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6916009)(8936002)(2616005)(5660300002)(26005)(316002)(31696002)(38100700002)(6512007)(6506007)(6666004)(53546011)(4744005)(83380400001)(186003)(54906003)(508600001)(36756003)(6486002)(86362001)(31686004)(66476007)(66556008)(4326008)(8676002)(66946007)(2906002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?bW8xaVJoME1zS1o1ZkJCdGY0RVNrVE43Vk8vRjFjMVZVZXc1bFVLRjk0QnJB?=
 =?utf-8?B?YXZHemcraUlqUU5PdlNZTktnY3lSL2R2VitKN3YwN2I2d0p5bWx3NDh2Z3RL?=
 =?utf-8?B?REVwV2NveW05STd0WkNmdTRPOE8zc3ErYkdPSWRLZmxRaHAwT2Fua2dZR3BL?=
 =?utf-8?B?S1FTN3dTa1dpQS9naUVBRDZOOTF0RUNoc0FXVThORjh5SlpROVEyWGxpZHdY?=
 =?utf-8?B?R2JuN0NBMkxXM2lkc3VRNTNyaWk1ZWF3NTVWejVhL1YxY2xDUEJDTEUwM1pj?=
 =?utf-8?B?VEROY3dwbnVqL0tGdDNRVVhtVU40RHRZNitlZ0RVWTRuQkF1ZFdhR1ZzQ0Fl?=
 =?utf-8?B?V0xMWVZ1aTZzQjJhaXNabEVJaHZhc1VrdDNPR3hUdE53MjFLcktUQ21RQUxs?=
 =?utf-8?B?c2pQSXRCcFR0UEh0cU16SWtGV2g4bXhEQ2NiS3hwRTlyTTIveEZ1QmNBYmlx?=
 =?utf-8?B?bkFQeGxUR3lqTE5PT01qNWhrbm03eXVqeVNDK0VzbHlKWUpneWpxTWE3VGNU?=
 =?utf-8?B?MlQ1RUhzU3NkQUVNa0JpNjQremdCNko0YVBiTE03cEVCTEhsOGxGdHQ3dS9L?=
 =?utf-8?B?eHR5QkVaSkozWnBJa21XOFRncVdvaDJBR2J5dVdwd05nVXUzV1AzaFppYTJl?=
 =?utf-8?B?S2J4Ui8rVkpwV3A4RkpId0RQVDR2Nmk4ZjRWdmVockxtdGxMc1g1bjRhNTFo?=
 =?utf-8?B?cE1EYXJ5UFJEUDFGZnEwd2pJVW5yVWFaTmQzTzJNN2YxZmU4NlFKZmhPeStk?=
 =?utf-8?B?aEhwQ3prZFM1RHhaZG4yMUFHQll1NCtrYWFPYVFKdzB0Q3VPR2QzcEVMd25K?=
 =?utf-8?B?ejdPS2NTOFJOUUs3d1krSU9QUnpWcWphN0N2aEdWbUZGZFlINVZKSUZGRE1J?=
 =?utf-8?B?anhJSW8wU0xDNmFGV0MvYTdUcTFhMDhUVDZXWDN5bGdiblVaQ3pneG1xZDJL?=
 =?utf-8?B?Zys0RjFPSVVkTEdDYXI5RzNNMEV1OCs5ZVJNbkFVQU1vNUFFYTMwUkRlTWJ1?=
 =?utf-8?B?M05ad2lLaHpFTG9oTndMa281ZVJJVW5uVis5Z3ZVTE5ZUVNsOWNGVUhFNFRW?=
 =?utf-8?B?N0VzVWlwQVFkRzA1aStJL3VUbGlOcFl1Y0RENXhPRUViSE1rdStBR0pRYVZX?=
 =?utf-8?B?MEtud05IZjN1R01tSmFmN29zWUxoVkk0V0VRTk9nb3grbEo0bDBuci9EM3Vs?=
 =?utf-8?B?bW0xMzNqMDlnQU9naFY1MTc5RlFpSkZ4aW1zVFd3blZRbWpEVE52eE5uZGRH?=
 =?utf-8?B?YVRNZ0lJVGtNZGRlWnZyRklMTVhneWMxL0hHd3dQMjlUSmJRTVUwRHdsbEcv?=
 =?utf-8?B?am0zTXNDWFl1dFcvRlZ3U1NwcStlQXI1WmZBbm1vUGJHblRPZ2hpMkFBTUZs?=
 =?utf-8?B?c1JnQVNORy82akh2dFJxMWgwVThzOEF3eFdCWmpuWGtFdU82ZmJmM0tQRnlZ?=
 =?utf-8?B?SExma2pWSnV4UC9pdE54ZGZLdWNMNi9PS1NUdnBvc3YyUG1ZOVJoMlRHMkxE?=
 =?utf-8?B?aGJrZndxY0dVVForeFVpTkZNcFp1b0VrdjhMZmZpZjF4d25mZ2tMUjEybU52?=
 =?utf-8?B?dlRPTWNzY0VVRDFVTXlpUlcwL2xPMFc0K3dlY0IybUwxRktqelZZdDd3OCtJ?=
 =?utf-8?B?UExzeWF4Vk9vTXMwZk5YZUZnOFd2eWdqWmdLbmhmOXRNbmkwam9oSWd5V1JR?=
 =?utf-8?B?Wm1aTHZ4TjFmcFN5MWtZNlVpK0t6ejk1RWlXSEVWbW1tTGsxSVdHbDhIb1V1?=
 =?utf-8?B?NjZnaE82VC9nUXk4ZlRsaVRxeE1UL1BETTdLNEVsNXBHMmxudmQ5Q3JTSENp?=
 =?utf-8?B?YjdTSXZHS1ZOc2YwSXEzL0NjR01TTExMdkM4MFNvcjFzVTI5TmQzS0NBcTU1?=
 =?utf-8?B?eldpU0ZwRy82NzdObGM1ODlyNVFKdEZhdWxsdDFQZkJuc0puWnhwTnZBQ1JE?=
 =?utf-8?B?YjVsMU93TGlYTlNZVzlGelRGcHh0MG1OUzA5bysxRHZBNnZjd0lIVFlxZXc3?=
 =?utf-8?B?aVJnOHZ6Q1B5Z0o0MGxYSk9kNlE1M3R3Q090d1hoem9jWThiTVRXSURiK3V4?=
 =?utf-8?B?VThGUXFkQUwrQnlKbjRoYStuWUlkRGhLQ0JBWEhmS1hTTjdQL1VTUzRCVGdY?=
 =?utf-8?B?ZW1KaWhZZVZXdTdTb29adDlLa3FwMFp0bUEvRzR0TklWTmtURE9CcmpnVmI3?=
 =?utf-8?Q?qo2awEfvj3GCNiYqKiS/yyE=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c6a9cbaf-d20e-454e-f036-08da0119fe5b
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 15:40:38.1469
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: mVTln0XRJkszkNvvXCamPAyv44Kw3UUWqCpkHGWJej9fSsejGau2iMx4a7TuOlmRBiazZarRjmxjCxh2E2WPaA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB9155

On 08.03.2022 16:23, Bjoern Doebel wrote:
> @@ -127,15 +161,21 @@ int arch_livepatch_verify_func(const struct livepatch_func *func)
>  void noinline arch_livepatch_apply(struct livepatch_func *func)
>  {
>      uint8_t *old_ptr;
> -    uint8_t insn[sizeof(func->opaque)];
> +    struct x86_livepatch_meta *lp;
> +    uint8_t insn[sizeof(lp->instruction)];
>      unsigned int len;
>  
> +    lp = (struct x86_livepatch_meta *)func->opaque;
> +    lp->patch_offset = 0;
>      old_ptr = func->old_addr;
>      len = livepatch_insn_len(func);
>      if ( !len )
>          return;
>  
> -    memcpy(func->opaque, old_ptr, len);
> +    if ( is_endbr64(old_ptr) )
> +        lp->patch_offset += ENDBR64_LEN;

Don't you need to use was_endbr64() here as well?

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 15:42:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 15:42:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287121.486950 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbye-0005TZ-ME; Tue, 08 Mar 2022 15:42:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287121.486950; Tue, 08 Mar 2022 15:42:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRbye-0005TS-It; Tue, 08 Mar 2022 15:42:20 +0000
Received: by outflank-mailman (input) for mailman id 287121;
 Tue, 08 Mar 2022 15:42:19 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=JMfM=TT=amazon.de=prvs=0590b4220=doebel@srs-se1.protection.inumbo.net>)
 id 1nRbyc-0005TF-FS
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 15:42:19 +0000
Received: from smtp-fw-6002.amazon.com (smtp-fw-6002.amazon.com [52.95.49.90])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 53eb03ee-9ef6-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 16:42:16 +0100 (CET)
Received: from iad12-co-svc-p1-lb1-vlan2.amazon.com (HELO
 email-inbound-relay-pdx-2a-2dbf0206.us-west-2.amazon.com) ([10.43.8.2])
 by smtp-border-fw-6002.iad6.amazon.com with ESMTP; 08 Mar 2022 15:42:04 +0000
Received: from EX13D03EUC002.ant.amazon.com
 (pdx1-ws-svc-p6-lb9-vlan2.pdx.amazon.com [10.236.137.194])
 by email-inbound-relay-pdx-2a-2dbf0206.us-west-2.amazon.com (Postfix) with
 ESMTPS id 2A4B2A278E; Tue,  8 Mar 2022 15:42:03 +0000 (UTC)
Received: from [192.168.10.142] (10.43.164.135) by
 EX13D03EUC002.ant.amazon.com (10.43.164.60) with Microsoft SMTP Server (TLS)
 id 15.0.1497.28; Tue, 8 Mar 2022 15:41:59 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 53eb03ee-9ef6-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646754136; x=1678290136;
  h=message-id:date:mime-version:to:cc:references:from:
   in-reply-to:content-transfer-encoding:subject;
  bh=nznqvmyXKXWlS7v/k/49rRVcTeAnSNTd+dFv3pmeqOw=;
  b=qe/4bpI8DLpdpsT2kNc2KzccXFvrpAIk2B8OtVLiS7Jq873S8qDU9QN8
   JT9R1Qh+gD78wTi3RqPh3T1QsNHG4g3lPupIaStGi8vlqEGlfUqE7QuwY
   Qny9QF5/Cy0eoFOb0kbRIZwo/L0ALaJljlLsfKkLpVhlbFq6varaH6oLe
   k=;
X-IronPort-AV: E=Sophos;i="5.90,165,1643673600"; 
   d="scan'208";a="182691847"
Subject: Re: [PATCH v3 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
Message-ID: <e380b32a-2267-0514-53ef-00657c0ce46e@amazon.de>
Date: Tue, 8 Mar 2022 16:41:58 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Content-Language: en-US
To: Ross Lagerwall <ross.lagerwall@citrix.com>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, Roger
 Pau Monne <roger.pau@citrix.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
References: <453c6e5decb315109a4fbf0065cc364129dca195.1646735357.git.doebel@amazon.de>
 <b91fc474832dd0ce07d223542316fba74afc35ee.1646735357.git.doebel@amazon.de>
 <PH0PR03MB63822464CF42ECDC06A3510BF0099@PH0PR03MB6382.namprd03.prod.outlook.com>
From: "Doebel, Bjoern" <doebel@amazon.de>
In-Reply-To: <PH0PR03MB63822464CF42ECDC06A3510BF0099@PH0PR03MB6382.namprd03.prod.outlook.com>
X-Originating-IP: [10.43.164.135]
X-ClientProxiedBy: EX13D09EUC004.ant.amazon.com (10.43.164.115) To
 EX13D03EUC002.ant.amazon.com (10.43.164.60)
Precedence: Bulk
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: base64
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From xen-devel-bounces@lists.xenproject.org Tue Mar 08 15:44:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 15:44:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287127.486960 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRc0k-000657-37; Tue, 08 Mar 2022 15:44:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287127.486960; Tue, 08 Mar 2022 15:44:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRc0k-000650-03; Tue, 08 Mar 2022 15:44:30 +0000
Received: by outflank-mailman (input) for mailman id 287127;
 Tue, 08 Mar 2022 15:44:29 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ibIM=TT=citrix.com=prvs=059cca470=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nRc0i-00064u-Nt
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 15:44:29 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a0faf45e-9ef6-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 16:44:25 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a0faf45e-9ef6-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646754265;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=+MZNC1mBNJULrr9PRmhLctn7ElkC1szBjzc9mYPcQDo=;
  b=etDvtm43KvKJLpZ7wib1p4ToUOKMhds15VjR86ghpSMVLJVpzyBTKOD6
   HP4GRqetfK+gRMzb8EEF96wM4XrXvHripYsUZVIgzAe4udU2UW/wuRqUT
   +h5zlU9XZ2clC9OITIRhG5ThJkd6sUOSrVjUME92iuQrprDR0v4BqM2K+
   A=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65715952
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:xUQnSa2yUvj6bVyt4/bD5Stxkn2cJEfYwER7XKvMYLTBsI5bp2EOm
 zBLWW3TafqONmbyct52PYvn8E5VusTUz4JmTQpppC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUw0YDja++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /1jk6aITkAOG5GS285NaDppTgFXerZJreqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHJNYUS/FRpyTjdBPAraZvCX7/L9ZlT2zJYasVmQ6uBP
 pdINGAHgBLoPw0TBFsdBdUHoPqupSfiK2Nkin2Eqv9ii4TU5FMoi+W8WDbPQfSRXtlclEuco
 mPA/kz6DwscOdjZziCKmlqum+vOkCXTSI8UUrqi+ZZCvlqXwWACDQwMYnGyq/K5l02WVspWL
 gof/S9GhaQ76kGDVNT2WBy85nmesXY0RN54A+A8rgaXxcL88wufQ2QJUDNFQNgnr9MtAywn0
 EeTmNHkDiApt6eaIVqf/LqJqTK5OQAOMHQPIyQDSGMt4db5p5oopgnSVdslG6mw5uAZAhmpn
 WrM9nJnwexO04hbjM1X4GwrnRqCgKLxSUkSwzmJHUj11SBIOa6MIJenvA2zAel7EK6VSVyIv
 X4hkseY7fwTAZzlqBFhUNnhD5nyua/bbWS0bUpHWsB4qm/zoyLLkZV4vWkmTHqFJProbtMAj
 KX7nQpKrKFeM3KxBUOcS9LgUp96pUQM+DmMaxw1UjasSsUpHONk1Hs3DaJ144wLuBJ0+U3YE
 c3HGftA9V5AVcxaIMOeHo/xK4MDyCEk3n/0Tpvm1Rmh2rf2TCfLFelbbwvTNblpsfjsTODpH
 zB3bZDiJ/J3CrGWX8Uq2dRLcQBiwYYTX/gaVPC7hsbce1E7SQnN+tfawK87epwNokimvrygw
 51JYWcBkACXrSSecW2iMyk/AJuyDccXhS9qZkQEYAf3s0XPlK7ytc/zgbNsJuJ5nAGipNYpJ
 8Q4lzKoXqwfGm6Zqm5GMfEQbuVKLXyWuO5HBAL8CBAXdJ98XQ3ZvNjiewrk7i4VCSSr88A5p
 tWdOsnzGPLvmywK4B7qVc+S
IronPort-HdrOrdr: A9a23:ZTrRfKBduowdOXnlHegFsceALOsnbusQ8zAXPh9KJyC9I/b2qy
 nxppgmPEfP+UossHFJo6HlBEEZKUmsuqKdkrNhQotKOzOW9ldATbsSobcKpgeAJ8SQzJ8k6U
 4NSdkdNDS0NykGsS+Y2nj4Lz9D+qj9zEnAv463pB0BLXAIV0gj1XYCNu/yKDwseOAsP+tfKH
 Po3Ls/m9PWQwVwUi3UPAhhY8Hz4/nw0L72ax8PABAqrCOUiymz1bL8Gx+Emj8DTjJm294ZgC
 j4uj28wp/mn+Cwyxfa2WOWxY9RgsHdxtxKA9HJotQJKw/rlh2jaO1aKv6/VXEO0aOSAWQR4Z
 3xSiQbToNOArTqDyeISC7WqkzdOfAVmibfIBGj8CPeSIfCNUwH4oJ69PNkm13imhAdVZhHod
 J29nPcuJxNARzamiPho9DOShFxj0Kx5WEviOgJkhVkIMAjgZJq3MUiFXluYd899ePBmfQaOf
 grCNuZ6OddcFucYXyctm5zwMa0VnB2GhudWEANtsGczjATxRlCvgYl7d1amm1F+IM2SpFC6e
 iBOqN0lKtWRstTaa5mHu8OTca+F2SISxPRN2CZJ0jhCcg8Sjjwgo+y5K9w6PCheZQOwpd3kJ
 PdUElAvWp3YE7qAd3m5uw8zvkMehTLYd3A8LAt23EigMyOeFPCC1z3dGwT
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="65715952"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ocrOZ4uPzTcC6T2KjNX3WmYte5ednIPRnXDn9ItTUaxYo4Q7PmwLhYbnY5b4yAVa6bHhY7GOHQUSyza80wl3O+9kPxUPymuyDxYDIQ8TvWtpJYh7zwpYcVz7EK+439h/FLqu/0jVVkK/WQOKon/I0ewwP7Cvx9xjhSrshXglG8SR+Vxx9x1+zQPwKfYLnBebYH7PxbYg72Ct8cCwVLCwyEkz8HtkH8e0+bxeldqActHzWAd5NtT0yfFwvc4QKepi6Homfzi9izPZUr1XNVTZsDXhmqLwgEvyS4guqmonH5xpzWczz+lXhOLe0f5DUjW3w1Jw8atIkLiQYTw0E+2OxQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=+MZNC1mBNJULrr9PRmhLctn7ElkC1szBjzc9mYPcQDo=;
 b=cWKin29UIuxcEOOjWwrlleoXHxHNNiNq1Uzlqw/4AEQdv7FRhKrOkgtVpA/ZUo6QipwbwUmzXW0s5ihj8hwpeR67E4E/KmwpFmPjUdyjyWugT1JojL6alSWcAjfMihsAFVPOKTrodvf9ARD/DKHm1udQQL7tVGydt8xC9s2AVK7lcAI/Jr5qi+2bGcAQVbeY5UrerUBqYo1/EdKO/ivFkREkW46nQAaf2tQ3YNic298UjQmBBJ4sZDVPOBA91W3xh+ly3XygGwRKtJoPBkgX1einpNtTus1VPMAFRst8jr/cr7z+zewc+BzCIMR0mkgBlmAYwSKNfJiTnOpJH3tzug==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=+MZNC1mBNJULrr9PRmhLctn7ElkC1szBjzc9mYPcQDo=;
 b=VDwerrqBsn//yPOQcqzIBO/FDIHqBB/wIh3auZt8hI536X+/7v/a36L0dkLNyPEjtRkaMgEj8uSbM1w1N7DgZGqomv8UoCcaRC6Sg9AEJ/wbEXkddJYhy5h6ZPIasjzcCi/tRoEDaLkWsh1Z3GS11ED37l75NSk75QWbgBT+GT0=
From: Jane Malalane <Jane.Malalane@citrix.com>
To: Roger Pau Monne <roger.pau@citrix.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, "Anthony
 Perard" <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, "Andrew
 Cooper" <Andrew.Cooper3@citrix.com>, George Dunlap
	<George.Dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien Grall
	<julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, "Christian
 Lindig" <christian.lindig@citrix.com>, David Scott <dave@recoil.org>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH v5 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Thread-Topic: [PATCH v5 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Thread-Index: AQHYMjUEaMoAwzVpzE69n4F8Ciyydqy1XcmAgABEiAA=
Date: Tue, 8 Mar 2022 15:44:18 +0000
Message-ID: <c20a3e9f-770c-3d2a-a332-ce836a4192da@citrix.com>
References: <20220307150609.10662-1-jane.malalane@citrix.com>
 <20220307150609.10662-3-jane.malalane@citrix.com>
 <YidAU63TsVO/X1Q+@Air-de-Roger>
In-Reply-To: <YidAU63TsVO/X1Q+@Air-de-Roger>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 0ee9adcf-5eca-4262-b197-08da011a81d5
x-ms-traffictypediagnostic: MWHPR03MB2845:EE_
x-microsoft-antispam-prvs: <MWHPR03MB284587D9AC01B6769FC4C5A281099@MWHPR03MB2845.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM5PR03MB3386.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(38070700005)(122000001)(82960400001)(66556008)(38100700002)(66946007)(37006003)(36756003)(54906003)(6636002)(83380400001)(316002)(71200400001)(31686004)(2616005)(30864003)(508600001)(5660300002)(6506007)(66446008)(8936002)(86362001)(55236004)(53546011)(6512007)(186003)(26005)(2906002)(64756008)(31696002)(76116006)(6862004)(66476007)(91956017)(4326008)(8676002)(6486002)(45980500001)(559001)(579004);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?Q05jL2t5a0NRWnBhZ0Y4QkxoRitnaVRoZTdtdnd4dENoZTM3Y2hFeUhTR0FZ?=
 =?utf-8?B?OEoxaXRTNE9RRGMraFRPbld6cXRzNTBaZmJPbEVSN1V2RUpiNDR4dzhDL1FO?=
 =?utf-8?B?WlhpRHhOT2dPZjZpV3dKZmtHM2lKOFhjQzgybkVXTGtBS250VGZRVnNpb0ZO?=
 =?utf-8?B?MGgzRnkyZzI5b0F4WEJGMzkzbzh5cXNvaTJKOWJyZ0lybUdLelEwZkdaMElw?=
 =?utf-8?B?ZHExeFpKRHAzYjlhNlV6WnUwL3NuU2pDSHNYRERjaTR4M3BWSldJMVlaQXRp?=
 =?utf-8?B?SEIyeFNrRisxL1BZMFdhalArUHV0c044ZHk4UkZ6YjN4ck1sTlFsL3krTWFw?=
 =?utf-8?B?bmRkVWtVOXoxUU1TeC9HRVkwNisvTEVYSUdaWHlmSEtUU05zeC9BMDJPc2Fh?=
 =?utf-8?B?THY4dndzMVovN25VVHoyVnFlMDBncmIyRUZ3blBRdUo1cERlc1laVnA5OXBi?=
 =?utf-8?B?MERuSFZNUDQxc0p2d3QvWmVSWCtwQ2lkYm0xQlhuSGVNSEZUbzJyTGV1Ukky?=
 =?utf-8?B?ZWpiTDBQVW03THBEWXI5UVl2YzFUQjQxcXZ0dDRxQkJGcitJRDdHQVh2OEF2?=
 =?utf-8?B?UW9nVWRicllQVnBFdThhaHpWK0c4S1hhT2FITkwwRDhaWFFXU0d4bm9qZzlp?=
 =?utf-8?B?d3M5SnBDaDJmdFNUOUxLeW8vaXZrYXpyVUZOblhjbUYyWlpJS2IvVXVuVFZk?=
 =?utf-8?B?MG4rOEtyS2p2cnRKQVh3Q3RDZmU3U29laEtPMkx0WW40WGRWVy9vNDZuOGFU?=
 =?utf-8?B?cFRYakNSQmxick1LUDM1cmNNcWQ4WkRnUDFKSFJodGpMci9lS3FESzI4bXRO?=
 =?utf-8?B?YmJXMVRHblVvTWh0eFRPd3krVHIvWGROM1pEUEh3NlZ3MU9nMnhhTjI2K08z?=
 =?utf-8?B?dnd0cUJzVk5GcGZyODg5Zkg5SkM1RExVRjJ1STVqM0VjUHRqODZDWDUxeHVL?=
 =?utf-8?B?cXlaNHgwVDJzZFVPb1ZMVjlreithREVMWkMwK25VQ1Y4K0FuUWlXZ3ZKdXhV?=
 =?utf-8?B?MndEc1hsb0gxb1cvaDliTEEyQ3FUS2hJa3lXVU1vM2F5R25wYjdldlV4MExi?=
 =?utf-8?B?ZStpVm5vRkJUVjlLTFhyMmw5WUs5dktMckJ3TmU5bFFoUFhyYWlqTlBqU2d1?=
 =?utf-8?B?SU1RNmpuazIvdVpGUEZKQi85YTJHcmpJSmJyRmRiQUl5YWVkSHFHcWE2bnpM?=
 =?utf-8?B?TVlqK29yaWlua0FQZDZLOGFkcmlCbjJrbFQ5Y3E5cEhaZVcyU2lqRVFPQ2NF?=
 =?utf-8?B?SmcrNkl1cjdrSGMrTksvNWZHRzNnQkd4ZE1wV2dYQU9Qb1ZFcDVQNG1TZUh0?=
 =?utf-8?B?d1p6bXk5cWZjcGZSS1M5K0hhdERweFJTY1VZS09CVjVKVXJ4U0V4NzNMb2sy?=
 =?utf-8?B?ZTR6bU5BaDh4TWJRbkJ2UDdxUXRLeVE1R3RYQ1Y2aWozRGFuMlpzSnhVZCtl?=
 =?utf-8?B?MnNRYzRBdmlTSjFDOUlvaEhKZ3lHZVo4VFozYm5CT3BPVmVrUWU1eWRSOENQ?=
 =?utf-8?B?YTA4MmlrQlNUVHVjNHpNUE9kaTFqU1BrenZHd2VBdm9sQmltUUVVeGNjZ2xt?=
 =?utf-8?B?Z2xTZDJXcTNya2w2amxSZlNKQ1YzNzlxT3dlVmRkS2dSQ0ozajlYcFZEMUJJ?=
 =?utf-8?B?WW1ybVQyUWtWdWRvUmc5Z2lOYVFkdHBnN2VNL0dqd2ljM0xSOHpTWXJldDR4?=
 =?utf-8?B?bVl4T1YzRFhnUXpaWlBZTHlnWEhRcjJVOGtqc1dGTVM3UXpwRmZWdGZtTXZQ?=
 =?utf-8?B?OWxyUWFINnJzN0s3Q2hYTDcvQS9qNGc5em5wUnVraGlsZitDV3J1bnkxaG52?=
 =?utf-8?B?SVp1cHFCL2NqclB5b0NoUWdVQnpVOFJlc2NHb04vYUZ5bkYxVnZydHVDNkNT?=
 =?utf-8?B?bXNwVFh2dnh4UFRBcUpyWUlZaDZjMnc1NlFFMmQ3a3NscHdJUU9wdVJ2ZmlP?=
 =?utf-8?B?K2x5UlNVNDBtb1BaR1JxSmFmbkpBVGI2WkFHcm11T2tFazRtUWd5Y2N3QnJh?=
 =?utf-8?B?M05rMHQ0SXk1L1hBcy96MnlxQ3oyR3ZXaFR1RkxRN3N6MzVRNDA3S1AzR0V4?=
 =?utf-8?B?N2hDMkN1akEvdHowcDQ5VnlzYjBxaU0yQzM1L2FJSXNOcnRkYjdBVVVjM3lp?=
 =?utf-8?B?YUdaNmNCbENHeis3SHR5eXNaN3FmcmNQdzdsNkFzUUhHcXF0OTh6M2N5SWcw?=
 =?utf-8?B?WHk1a0owNzdZSVVKUnlVR3gxYllFSDd2akM2VEpIUzRHR3BiVnlkR1R2dkVM?=
 =?utf-8?Q?1Mcptt1FFxw8yQ1evuOVfZpxbLOZwAMse5ET53JgC0=3D?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <514AFFD88F61484D937627A015F79BC1@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM5PR03MB3386.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0ee9adcf-5eca-4262-b197-08da011a81d5
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Mar 2022 15:44:18.3827
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: zKM+jWN/S5jRqy3w61YwxtmeCGQ5SV7LnH7tgN4YC3662bQtXa+deA4EAFEfrBpU8/fa27WJB5/qtp4lJXYUAZ3tBOm8nkC2ZikI5xuqqU0=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR03MB2845
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Tue Mar 08 15:45:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 15:45:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287134.486972 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRc1t-0006jj-IG; Tue, 08 Mar 2022 15:45:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287134.486972; Tue, 08 Mar 2022 15:45:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRc1t-0006jc-EW; Tue, 08 Mar 2022 15:45:41 +0000
Received: by outflank-mailman (input) for mailman id 287134;
 Tue, 08 Mar 2022 15:45:40 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRc1s-0006jS-Gd
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 15:45:40 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id cdaf3d7c-9ef6-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 16:45:39 +0100 (CET)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur03lp2059.outbound.protection.outlook.com [104.47.8.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-13-dhf2GIfpPJSroUqeHyqXpA-1; Tue, 08 Mar 2022 16:45:38 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR04MB4770.eurprd04.prod.outlook.com (2603:10a6:208:cd::26)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.25; Tue, 8 Mar
 2022 15:45:36 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 15:45:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cdaf3d7c-9ef6-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646754339;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=03narhm58yymq5xYHn/zV15iRGoSxQQeNHULGpanEoo=;
	b=OTbz5S/vgXbRKlJSMfolEbYEUMSz5xWYSQSseRdcR10UBzjxXVa5INvC6PslMn4FbBYaoG
	8gt3Ui8ULwvyEpQSqCGudH8OeRYL46ExG0LrCyaxtV4jQJhNE6gB2TSDXvzp1FccMft1aR
	0zJdvivHVmVGxlIdlCTzwBduL9YKu2w=
X-MC-Unique: dhf2GIfpPJSroUqeHyqXpA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ELK4yED9EHgYea/ha8/+RjbGQD0phm3TnJB1rL/eVajachx6C69ZkhfPmcHm/sOiP0gXGk0s90/XHECz9bJaCc4ekQQatkBTqkMhJ9rfM4fcKsKQ0cuRgjjihXuiwJY2s1GCMLLoWWGxub9f94pn06gyyIbT4oBR/bz0KDiCQrhDOxo4Okc4BXuJ4p0aHyczHPY9X8d+Z1UDptkLbWqZXaqmi91tjq0nBzjlPq9PwvBnPlday+BrDNZ4nWj6kq4Unku/m3lyVOVksJB705Or3SrBQ0OKsOMGUCj4QW/IR+ZQ6s0gyWsnPJitCaxZajxYir2O0KOv/HTAwKBtWFeOEQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=03narhm58yymq5xYHn/zV15iRGoSxQQeNHULGpanEoo=;
 b=UH0fEfq0jlr4tE3l694Tr4xWPjCwsIQH/IRXKsUNq0wmhtgXOWoXUhBU+gmKdiy/QxdiACYI5EY6+r7BCHFEm1SKQVpo7FsYwlAzy+uFPdeLZXVL834FEdASMMlPUQ8WrM/zqVp5eMUaFcouXD2lsFrtjsGd0+KzTKxG/5oy9kKlqygYu3nInWA7IlcBdLwwlw1Ul2DDIdKZtjth/O82oycBM1L5yhai+vhIrNhG4vsAvBjdyJ59NAj+Ibn6B55+Q75is0BAodBJ7zgIwbAMhSoLh45v2memZMlNSdPYwJ8g6ww1hhscg1IGOiGP7tlW60dYfXvrtgx5IBucYg/d4w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <c625d90c-ec0b-a2c3-cf93-08c99cc2f3ce@suse.com>
Date: Tue, 8 Mar 2022 16:45:34 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [RFC PATCH v1] arch/x86: Livepatch: fix overflow check when
 computing ELF relocations
Content-Language: en-US
To: Bjoern Doebel <doebel@amazon.de>
Cc: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>,
 Roger Pau Monne <roger.pau@citrix.com>,
 Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
 Ross Lagerwall <ross.lagerwall@citrix.com>, xen-devel@lists.xenproject.org
References: <b74a68b038c31df4bb94a5b5e87453f5a249cfe2.1646753657.git.doebel@amazon.de>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <b74a68b038c31df4bb94a5b5e87453f5a249cfe2.1646753657.git.doebel@amazon.de>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR06CA0325.eurprd06.prod.outlook.com
 (2603:10a6:20b:45b::14) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 1b15a256-e615-48b5-0c68-08da011ab03b
X-MS-TrafficTypeDiagnostic: AM0PR04MB4770:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB477043BB2BF6AEB2E3AFBD58B3099@AM0PR04MB4770.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2616005)(6486002)(31686004)(6512007)(6506007)(36756003)(53546011)(83380400001)(5660300002)(508600001)(31696002)(54906003)(26005)(8936002)(6916009)(186003)(86362001)(2906002)(38100700002)(8676002)(4744005)(66556008)(66476007)(66946007)(316002)(4326008)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?d05DRWJ1TXJKOXU0ZXExeG1mVnlsUFJ4dEFienRQYVJSZ1ZVKzB1RHdLdzZK?=
 =?utf-8?B?YlR5V3Q5MW9uejNBTkd5Tmp1NFVJSTFPRFFSM3YxME1uWURCdTdyTElRTkpI?=
 =?utf-8?B?RFRkelVTbXJDS1huNldWdktWWWRaOEI4anhhWE1TQS9OTVRkM2MwOEwxakVT?=
 =?utf-8?B?L21hUzFVL2w0ZVZjaGowTlVEV1Z0T1c5eGpRZ1ZXNDgyTHQydC9raXVYVm1O?=
 =?utf-8?B?cE81UnpqSFlXdWRRd2JVZklWemttdTlWREJ3QnQzVmh0eHFzMkl6M0JOWU5y?=
 =?utf-8?B?R3JGUEF4SDZhWjlSZU93OUlYai9ZSWlLMzUwMFVNS3NpL3hlWlpUNThRT2R4?=
 =?utf-8?B?WGpQRmppclF4RDFUdjYvT0dQWURWVVZCdUl0eklIZzB4YnFJaUszd3pwTlR6?=
 =?utf-8?B?MTd1TWwxU3dML09FZ2M4bUlaeWY5THpmYU9rbGEzcENpRTFGMlVGQjZCTzIz?=
 =?utf-8?B?bXoxNXJiOW5mS0JyUGoydEpwQjVpbStDR21zRGd4WThEemYzNU9SdGxlUnN0?=
 =?utf-8?B?Ti90T1NwaE53NVEySlVidWErdGErenAxMk1YcE4xZnBSMk1rRThjaHAzSXhK?=
 =?utf-8?B?ckpzNUlLNHhwWGNvQTlvU1R6d1pNMkhmVHJuZkhlbjRVSWw5Y21JbEtQUzcx?=
 =?utf-8?B?M0YzbW1rbGI5V3ZCTnBPeUdqTm0vbUpHU3BCYmw3ckZEQkdRRWlwbEhrOVYr?=
 =?utf-8?B?Nm9HSVJqZlJNdENGamRCcjZybFcyZ3l0ODArRzVlc1d0RXlEZ3Nvd3JDdTBv?=
 =?utf-8?B?cGZBOTk0N0gxNVIrdDhadXhPckliT3lSR01pTXFhZ0ZpSHhSOVB0Zi80OWFG?=
 =?utf-8?B?Z3FDSi9WSHh3S3ROT2RpVnlMUnNpT3hhTFliMkpQdy9mUHQyTktreUFDUzNJ?=
 =?utf-8?B?dmhkWllIVEwwU1NRWEdwMkRZQjcwVHpzeEhSTUJXZTJLdGIzbmliajZ2Vk9r?=
 =?utf-8?B?NHdtMTZSSU1kSFpKR0xuVzdZdlQ0dFN6eDZXTmNSTmdQS1JQMnRFRXR1bXJi?=
 =?utf-8?B?K3h1MnhPVjBTSzB1ODZqd25XR2QraVBBNE9ORStmYjhKVHREVGpWU0ZkeEpU?=
 =?utf-8?B?RFR1TkpzU3IyLzNlcHJsV3FqQnUzVFdGeTdzTWhuNkdQZEMzMzZMZ2xmSERW?=
 =?utf-8?B?MG9aVHRtZUZURXphako2NzJReXRveU9DaVQvMWtMcE9TOWVCbm9JYVM4bVMx?=
 =?utf-8?B?YXc4aVBZY01hVjZFRW13cG1ETTFKRTZ1MEJ4dnpKZWZINGovYTQxa3NCSjh6?=
 =?utf-8?B?Yk9ETlBqaFJOYVJUb21yaHZTUEh6SHNmU2dWZ1dsMHRzTjhkcUVIRlJ4dUg4?=
 =?utf-8?B?dFg5RlBVTkNNaGxva3g3L2d3NlpoN0xUMkF4TFU1QmJEVU5xdEFiYVQrVjl5?=
 =?utf-8?B?N0ZDeXR3VmVCZm5hMzdtWW1YZEZVdXJEWUxQWHIzZDNKNERWSjBDTS9GdDRB?=
 =?utf-8?B?bjI4bExmNFA5S3gvTmh2OTh2SE82ZGZQM1plQmJXNU1ISUhSUGdvVExqQWlN?=
 =?utf-8?B?cEJINk9kVmluZkVINTFnSEF0aldERmdZcUEzRjBpRFJWVU1EWFh4NUhCalNU?=
 =?utf-8?B?U2xXeHN5UlFZeGZzOG5jOHNaaWJCWEZFOUJUejgvTTNxSjRQUGtBaDNaTy9j?=
 =?utf-8?B?VWMxQ1dacUxJdndiNXdmdEl4ZmlKWUxndE9lOFl3SkZHMW9wQ2FVbjhhSHN1?=
 =?utf-8?B?RGk0RDNkMWxmaE5LRnJHcEdFMVpTbGZHUDIzZnhlTWpVQlhlMnczZkxMZ3ZU?=
 =?utf-8?B?UldxRGRnNmZleW1peDZOTE16dmJ4akM0RlA3MjVtckNRNHY5R05pb3p5eUJW?=
 =?utf-8?B?NTV1VDFLdlFITFRUTDh4TFB0c3lXWU9oM2dnLzJwRThSb21ad1U4Y1BCcHk4?=
 =?utf-8?B?aXpURjNheEowUXZlNFNMWGsxbkwwVHJLL0NNajhsRHcyUHRBd25Gam1YZEt3?=
 =?utf-8?B?dUFNOUNjbzBZMHliQzIvYVA5dmtRUk0rbFRGUWs3aW1zM3ZMdWlweDRLQm1v?=
 =?utf-8?B?a2x4dTF6TVNHN2lIUm1LZ1FNcEpJNURpdXpJVVgwSllVYjh3WURNSVgvV3di?=
 =?utf-8?B?Wnl0L2VPWDVzSEM4UVpqU3RRVVpjd2pCUjlxL1lkQmkvRnd6WnpHdUJUejAv?=
 =?utf-8?B?akJUYzh3NEtacFd0dnlwMDM4S3pBeUcxVFlxZmFtaExUWGppNXVGQXF6dTZh?=
 =?utf-8?Q?YGXgiIyXx02kV7xZmPgPAWs=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1b15a256-e615-48b5-0c68-08da011ab03b
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 15:45:36.4721
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: wdDJjZgQhytZJnXSr5gj0aQg8HkwdXgbieTLRUL/s+qWIWG3QsY/ny/FqB532UGJ/eYnoOTFHQPHbWMikm+BCw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB4770

On 08.03.2022 16:36, Bjoern Doebel wrote:
> --- a/xen/arch/x86/livepatch.c
> +++ b/xen/arch/x86/livepatch.c
> @@ -339,7 +339,7 @@ int arch_livepatch_perform_rela(struct livepatch_elf *elf,
>  
>              val -= (uint64_t)dest;
>              *(int32_t *)dest = val;

Afaict after this assignment ...

> -            if ( (int64_t)val != *(int32_t *)dest )
> +            if ( (int32_t)val != *(int32_t *)dest )

... this condition can never be false. The cast really wants to be
to int64_t, and the overflow you saw being reported is quite likely
for a different reason. But from the sole message you did quote
it's not really possible to figure what else is wrong.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 16:01:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 16:01:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287141.486983 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRcH6-0001Z9-Tq; Tue, 08 Mar 2022 16:01:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287141.486983; Tue, 08 Mar 2022 16:01:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRcH6-0001Z2-Qg; Tue, 08 Mar 2022 16:01:24 +0000
Received: by outflank-mailman (input) for mailman id 287141;
 Tue, 08 Mar 2022 16:01:23 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=yKud=TT=citrix.com=prvs=05922dae9=ross.lagerwall@srs-se1.protection.inumbo.net>)
 id 1nRcH4-0001Yw-PW
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 16:01:23 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id fcb29208-9ef8-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 17:01:18 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fcb29208-9ef8-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646755278;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-transfer-encoding:mime-version;
  bh=zHhwl9oOMQGrQHzvKS89NqOSaxnPNzY8CMiv807CZts=;
  b=NuuUoXBmvWMPEsJhZYUbY/HiZFNFX/eAB25r6TRtmlv5nwkYPRm0RaK8
   /EJ7bf9k3Pk0Ng27683mdKBwYhWzEkFX6vhkYby18CZpnljByrkXtNIhG
   etcvI/fgu0ijr0iZTNwRSq49ubEeS59pk0jx3akLeqrtypPpyS0O6ZQ4O
   c=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65727463
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:UQjeyKO2Qnqwwq3vrR1ml8FynXyQoLVcMsEvi/4bfWQNrUpw1WdWn
 2UZWz3VPKnZZmT8LtFxbYuyoxxU7JLXy9VqSgto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi2t4w27BVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Z5
 dsK9pKqUCoQYKzMxLtFfABZEA5yIvgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALNs7wJ8Ubs35t1y7QCfIOSpHfWaTao9Rf2V/cg+gQQKmEO
 JZHMlKDajyeexNEEF4lMKkDt+6XhCD+aj9guQmK8P9fD2/7k1UqjemF3MDuUtmSQsVRl02bj
 mvD9nb+BFcWObS3yj2D6HugwPDOmSDTX5gbH7m1sPVthTW7w28OIBQTXEm8p7+1hyaWV9VSI
 UEQ0iMrpLo18gqnQ7HVTxC+5XKJoBMYc95RCPEhrhGAzLLO5ASUDXRCSSROAOHKr+dvG2Zsj
 AXQ2Yq0W3o/69V5VE5x6J+5o3TxNzIMAFZcZC9YElMq+tjgj40s20enoslYLIa5idj8GDfVy
 j+MrTQji7h7sfPnx5lX7nic3Wvy+8Ghohodo1yOAzn7tl8RiJuNOtTwgWU3+8qsO2pworOpm
 HEf0/aT4+kVZX1mvHzcGb5ddF1FChvsDdE9vbKNN8R5n9hO0yT6FWy13N2YDB0xWirjUWW1C
 HI/QSsLuPdu0IKCNMebmb6ZBcUw1rTHHt/4TP3SZdcmSsEvKFHZo3EzPhfAgjuFfK0QfUcXY
 8zznSGEVypyNEia5GDuG7d1PUEDnEjSOl8/tbiklk/6gNJylVaeSKsfMUvmUwzKxPjsnekhy
 P4Gb5Hi40wGCIXWO3CLmaZOfQFiBSVqXvje9p0IHtNv1yI7QQnN/deKmuh/E2Gk9owI/tr1E
 oaVBhcImACh1CecdW1nqBlLMdvSYHq2llpiVQQENle0wXkzJ4Gp6aYUbZwserc7sudkyJZJo
 zMtIa1s3twnpuz7xgkg
IronPort-HdrOrdr: A9a23:Nt461Ky7dgNOrhQwGsSsKrPxeegkLtp133Aq2lEZdPULSKOlfp
 GV8MjziyWYtN9IYgBcpTiBUJPwJE80hqQFnbX5Wo3SEzUO2VHYYL2KiLGN/9SOIVyGygcw79
 YCT0E6MqyLMbEYt7e13ODbKadZ/DDvysnB7o2+r0uFDzsaEJ2Ihz0JUjpzeXcGIDWucKBJcq
 Z0kfA3wAZIF05nDPiTNz0gZazuttfLnJXpbVotHBg88jSDijuu9frTDwWY9g12aUIP/Z4StU
 z+1yDp7KSqtP+2jjXG0XXI0phQkNz9jvNeGc23jNQPIDmEsHfpWG0hYczAgNkGmpDr1L8Yqq
 iJn/7mBbU115rlRBD2nfIq4Xin7N9h0Q669bbSuwqdnSWwfkNFNyMGv/MDTvKR0TtRgPhnzK
 xE03iFu5dgBQ7clC7949TOSidxmlCvoXwkp+4f5kYvILc2eftfq5cS81hSF4pFFCXm6Jo/GO
 0rF83E4u1KGGnqJEwxk1MfieBEZE5DVitug3JyzvC9wnxThjR03kEYzMsQkjMJ8488UYBN46
 DBPr5znL9DQ8cKZeYlbd1xDPefGyjIW1bBIWiSKVPoGOUOPG/MsYf+5PEw6PuxcJIFwZMukN
 DKUU9et2Q1Z0XyYPf+lqFj41TIWiGwTD7twsZR69xwvaD9XqPiNWmZRFUng6Kb0oMi6w3gKo
 GO0b5tco3exDHVaPV0NiXFKuxvFUU=
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="65727463"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=VgVgwiNd+ZM7HHvLw7J9s/h3ac7IoBXxtD/l6Kui6lku1/m/HL/ijaLTYp1iz/YaUGSXNDannaKyxxgUfVKQJKHin8asVlW++zfQlL3PNvT2rlTuLhPv7ICVMFbbXE4IgPd9XWtvCRCkWdegCXJFq9w2jECiCDOiOB4iRQ24aj54n+FegIs2DJHxGGxa3ggzj1bY6G6kJmdtNwv66/WbqW1bxZzb1gp3tc4+OpOneC/RlCrQBpHigeayAXAsn+3CR7CoBBc9zyX3vjTJv7x/SvXjfvbYzH6FL+3Vze1ZOGP2cHvvWMq/kb7CpGx8v9SFaBpJuQRfa6VL8cu2pdR6Rg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=cLI8XwUm361KPfZfHzF/rVWZ9+I9y0FLXC4erMvoFRA=;
 b=KnFPRiD1Y5axl+sqygDaxKwaccEw5sKYkc/9BxV/hF6B5r4oHF/a+y5RSjnf5ZMsAcMgu+p8a1ECArVDO6jZ26zVmlQDZf20h+QTkucTho9x7/Lip3LgINzBh430J1tclJcT2tZy3KE82yFoM5Aa5WFeM080Khv4gkFOCsvouJDAFBalSSdPr9IwscUXSrha5p2OMGK1NC8AVxbyofR2BXuPWznLGJbcGMNVGB3YhsFi9EQPYQRE6apmODejB3QAJmiqKVh1LsQOAflpw8rJ/GLxI6UL/lF7DYP0i9oIUPX2RJ2xYMzz2iz6CLhz2+y202plsap6cU1OUde74xaTnw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=cLI8XwUm361KPfZfHzF/rVWZ9+I9y0FLXC4erMvoFRA=;
 b=exJPVmStzKT19AydtBxf1GOl1flfGJFi2fw7xL/358XkJPrsmHdwJGR2YRFdWiVeo88DlGQ/zvQ81EWEfE+Tm9UDIkRCxXcpYU3EJ6UA6fed3q4U1vZVPZ1UQP0xTNfpMaJECn/RhieNplIz0BlgigINSKmeoGJNNt++Hl69K/0=
From: Ross Lagerwall <ross.lagerwall@citrix.com>
To: "Doebel, Bjoern" <doebel@amazon.de>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, "Roger
 Pau Monne" <roger.pau@citrix.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Subject: Re: [PATCH v3 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
Thread-Topic: [PATCH v3 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
Thread-Index: AQHYMteGyv4uMb9n4kauwbWKAS/6qKy1mRGggAAHVwCAAAGqhg==
Date: Tue, 8 Mar 2022 16:01:13 +0000
Message-ID: <PH0PR03MB63820AB55264C57717C81675F0099@PH0PR03MB6382.namprd03.prod.outlook.com>
References: <453c6e5decb315109a4fbf0065cc364129dca195.1646735357.git.doebel@amazon.de>
 <b91fc474832dd0ce07d223542316fba74afc35ee.1646735357.git.doebel@amazon.de>
 <PH0PR03MB63822464CF42ECDC06A3510BF0099@PH0PR03MB6382.namprd03.prod.outlook.com>
 <e380b32a-2267-0514-53ef-00657c0ce46e@amazon.de>
In-Reply-To: <e380b32a-2267-0514-53ef-00657c0ce46e@amazon.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
suggested_attachment_session_id: f0076554-7567-3c14-3226-d1dbe962566f
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: de9b17e8-1d71-4c8d-47a1-08da011cde9f
x-ms-traffictypediagnostic: BN6PR03MB3041:EE_
x-microsoft-antispam-prvs: <BN6PR03MB3041E847F50D06B19F68C47AF0099@BN6PR03MB3041.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PH0PR03MB6382.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(508600001)(55016003)(91956017)(54906003)(110136005)(316002)(26005)(83380400001)(86362001)(38070700005)(82960400001)(186003)(8676002)(4326008)(5660300002)(2906002)(8936002)(38100700002)(66946007)(64756008)(66446008)(66556008)(76116006)(6506007)(66476007)(71200400001)(52536014)(9686003)(33656002)(122000001)(44832011)(53546011)(7696005);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?BkUmieZebthMf870sAYuiztE543aL2+7sX2ENVUk0RI6NORszLQdpHFdLd?=
 =?iso-8859-1?Q?G6NyM/d+lvb4QF4+QhM034R8nGSHZMEVR4815pTNZJeH0NrNQXqdr1xxLT?=
 =?iso-8859-1?Q?AqkLMLZ80DNcbh3yxaiH/FMkDjka8NpyJojrs4TdaKzi8MrUnx343CpWs1?=
 =?iso-8859-1?Q?3U5mAbGVI+MugpVCalKba42ZXNuY+GdyCEtWhT7VqYQ9oPwVRcbTJUvzkE?=
 =?iso-8859-1?Q?usFBt2z5XXvoVkGDLY2mKxX9Fb/ec9e5CxOXIwbjXUBaGNdDZ2tY4VZBEQ?=
 =?iso-8859-1?Q?qDVSHRga1GY88SWVZgBYP7CWN+c1vAkGMMDTHtqH0LZWS6K3uT8xDJk+U1?=
 =?iso-8859-1?Q?qmkqp1/1B+S0ZGjlWxwT8wMIFXPe/po+4ImcSbpRw1zX4quyd86Gr5GA8H?=
 =?iso-8859-1?Q?tETdG7XB42dUpS8FYIYyngZwh1r7X2XltnqHrIFEXoHsy8HfHkZZeMgRWk?=
 =?iso-8859-1?Q?4nsAoWaMkzHyAqlAF/QypHh5EJr9jVelCsRZtpPoB68Uf8CWdTVsAT5EJf?=
 =?iso-8859-1?Q?LAHiRgPwnq0x1wh+WnAqATtWISPK5IORV/6p5aSeGOsTyv7jGzYxw59TQs?=
 =?iso-8859-1?Q?vN/mYXrE9WIGXsZJJPF9y61MwCeVLPbydB3v0L8iNnrV861R/ojlzGzr2a?=
 =?iso-8859-1?Q?wGiNxy0JZSOLtVdiFLGtq9T+a9P3P2nVXSIw7TlGBYXwd6vQXieXMuzUJh?=
 =?iso-8859-1?Q?MRpuCfpM//91zgGz3W0M2BsUg0a/JzWQBouhNr6DpDyGgrZXpFjHQkUJCA?=
 =?iso-8859-1?Q?HUGnEFdd968m6+pKuSU6/zdMbzR/2CHF0+oEgkfyi3JaqdtfJRVlCqSY6/?=
 =?iso-8859-1?Q?myYZOaYzp8Fthpw0wrX486Lxdnhb92wHuDpblAWmGaj87TR1zZyJrPQVZH?=
 =?iso-8859-1?Q?xcTGx7mR9LDP9ZhR6ae3R3qnp2HkWsGV86DFoLEWlU6GYV7/VZ3K8OsUrG?=
 =?iso-8859-1?Q?E25WGBqk2adHhMd/ZJyyig1Of7SKn5BEJNekQR4dRqEwKeKdPujWk37yw+?=
 =?iso-8859-1?Q?+o8latovkRGm5e2TCZTsLp0/qstjUHXM3J18VlBvVkUVg0M7j4Kwj6SSSk?=
 =?iso-8859-1?Q?iLqIJhdL8zUrGQVIw8QvS0Yw6c83+pMSWXLNTE63hXVTMQq3U6NwFXWEo/?=
 =?iso-8859-1?Q?4dwIThW5KFiPlkuLUL9/WYZSdfY/4xlo0JKJo42NqriI3o9a4UBTpo2Vlp?=
 =?iso-8859-1?Q?XGKD9yRVMBD8fo2d/HD47djZPdecwvO2qZm6oC2ZCtTrWaVe2y5wbep3Sf?=
 =?iso-8859-1?Q?8fnQCTeO0P29AJ5liuS9X8X6l9TEd724vJ194gY03D+m+9OiigE3pSVLQg?=
 =?iso-8859-1?Q?0BQHE7qSHg4QGN3QXnNFx7bz0Q6/FExMIdpOD/1DHxf4AklXafsS06KSiF?=
 =?iso-8859-1?Q?JTJeD2JUlpMnM0qqbAi8AGkDp+qos6K2MtDgQ0aVxhX9JtZl3b330Hr0o9?=
 =?iso-8859-1?Q?qhn0ZYZBTz04allKrACq8A8jdEl7w9HurcFuUAMBRfYuH4KP9wv5p0Ss06?=
 =?iso-8859-1?Q?OXoAwTh1dGLTzD1ThhdQrc6CbnTVQoX1/JWriUno99vbRMCfLtE+wczIs7?=
 =?iso-8859-1?Q?0qPytBfrb0AgrjZH0BCrB0nh2gFhdOQYzRfvt/jYUaUOar7aFomjmuNBg3?=
 =?iso-8859-1?Q?PY+KFP2tYxWKQkaX6bEw4Iiw84m23jAWxsldJg4/6/fWGwVghFp/eazj3D?=
 =?iso-8859-1?Q?pOekUDaZHHDcCJ9G68fu+wp0qEOj/ToYcd57BuyvUWyuHqTw1hpCj/b/yo?=
 =?iso-8859-1?Q?Bjvw=3D=3D?=
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR03MB6382.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: de9b17e8-1d71-4c8d-47a1-08da011cde9f
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Mar 2022 16:01:13.0945
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: HpAFH9lFpt40Hm7mSSEWE7WJWZcm89g7IMcVzoEustYtZKS94RWqn72LuyrQ7+Wg6eBqIuBvvLBWm7Qz9yQNCicYRpLdTWRcezqvtRe+5jY=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR03MB3041
X-OriginatorOrg: citrix.com

> From: Doebel, Bjoern <doebel@amazon.de>=0A=
> Sent: Tuesday, March 8, 2022 3:41 PM=0A=
> To: Ross Lagerwall <ross.lagerwall@citrix.com>; xen-devel@lists.xenprojec=
t.org <xen-devel@lists.xenproject.org>=0A=
> Cc: Michael Kurth <mku@amazon.de>; Martin Pohlack <mpohlack@amazon.de>; R=
oger Pau Monne <roger.pau@citrix.com>; Andrew Cooper <Andrew.Cooper3@citrix=
.com>; Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>=0A=
> Subject: Re: [PATCH v3 2/2] xen/x86: Livepatch: support patching CET-enha=
nced functions =0A=
>  =0A=
> =0A=
> On 08.03.22 16:25, Ross Lagerwall wrote:=0A=
> > CAUTION: This email originated from outside of the organization. Do not=
 click links or open attachments unless you can confirm the sender and know=
 the content is safe.=0A=
> > =0A=
> > =0A=
> > =0A=
> >> From: Bjoern Doebel <doebel@amazon.de>=0A=
> >> Sent: Tuesday, March 8, 2022 10:29 AM=0A=
> >> To: xen-devel@lists.xenproject.org <xen-devel@lists.xenproject.org>=0A=
> >> Cc: Michael Kurth <mku@amazon.de>; Martin Pohlack <mpohlack@amazon.de>=
; Roger Pau Monne <roger.pau@citrix.com>; Andrew Cooper <Andrew.Cooper3@cit=
rix.com>; Bjoern Doebel <doebel@amazon.de>; Konrad Rzeszutek Wilk <konrad.w=
ilk@oracle.com>; Ross Lagerwall <ross.lagerwall@citrix.com>=0A=
> >> Subject: [PATCH v3 2/2] xen/x86: Livepatch: support patching CET-enhan=
ced functions=0A=
> >>=0A=
> >> Xen enabled CET for supporting architectures. The control flow aspect =
of=0A=
> >> CET expects functions that can be called indirectly (i.e., via functio=
n=0A=
> >> pointers) to start with an ENDBR64 instruction. Otherwise a control fl=
ow=0A=
> >> exception is raised.=0A=
> >>=0A=
> >> This expectation breaks livepatching flows because we patch functions =
by=0A=
> >> overwriting their first 5 bytes with a JMP + <offset>, thus breaking t=
he=0A=
> >> ENDBR64. We fix this by checking the start of a patched function for=
=0A=
> >> being ENDBR64. In the positive case we move the livepatch JMP to start=
=0A=
> >> behind the ENDBR64 instruction.=0A=
> >>=0A=
> >> To avoid having to guess the ENDBR64 offset again on patch reversal=0A=
> >> (which might race with other mechanisms adding/removing ENDBR=0A=
> >> dynamically), use the livepatch metadata to store the computed offset=
=0A=
> >> along with the saved bytes of the overwritten function.=0A=
> >>=0A=
> >> Signed-off-by: Bjoern Doebel <doebel@amazon.de>=0A=
> >> CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>=0A=
> >> CC: Ross Lagerwall <ross.lagerwall@citrix.com>=0A=
> >> ----=0A=
> >> Note that on top of livepatching functions, Xen supports an additional=
=0A=
> >> mode where we can "remove" a function by overwriting it with NOPs. Thi=
s=0A=
> >> is only supported for functions up to 31 bytes in size and this patch=
=0A=
> >> reduces this limit to 30 bytes.=0A=
> >>=0A=
> >> Changes since r1:=0A=
> >> * use sizeof_field() to avoid unused variable warning=0A=
> >> * make metadata variable const in arch_livepatch_revert=0A=
> >> ---=0A=
> >>   xen/arch/x86/livepatch.c | 61 ++++++++++++++++++++++++++++++++++----=
--=0A=
> >>   1 file changed, 53 insertions(+), 8 deletions(-)=0A=
> >>=0A=
> >> diff --git a/xen/arch/x86/livepatch.c b/xen/arch/x86/livepatch.c=0A=
> >> index 65530c1e57..0fd97f2a00 100644=0A=
> >> --- a/xen/arch/x86/livepatch.c=0A=
> >> +++ b/xen/arch/x86/livepatch.c=0A=
> >> @@ -14,11 +14,29 @@=0A=
> >>   #include <xen/vm_event.h>=0A=
> >>   #include <xen/virtual_region.h>=0A=
> >>=0A=
> >> +#include <asm/endbr.h>=0A=
> >>   #include <asm/fixmap.h>=0A=
> >>   #include <asm/nmi.h>=0A=
> >>   #include <asm/livepatch.h>=0A=
> >>   #include <asm/setup.h>=0A=
> >>=0A=
> >> +/*=0A=
> >> + * CET hotpatching support: We may have functions starting with an EN=
DBR64=0A=
> >> + * instruction that MUST remain the first instruction of the function=
, hence=0A=
> >> + * we need to move any hotpatch trampoline further into the function.=
 For that=0A=
> >> + * we need to keep track of the patching offset used for any loaded h=
otpatch=0A=
> >> + * (to avoid racing against other fixups adding/removing ENDBR64 or s=
imilar=0A=
> >> + * instructions).=0A=
> >> + *=0A=
> >> + * We do so by making use of the existing opaque metadata area. We us=
e its=0A=
> >> + * first 4 bytes to track the offset into the function used for patch=
ing and=0A=
> >> + * the remainder of the data to store overwritten code bytes.=0A=
> >> + */=0A=
> >> +struct x86_livepatch_meta {=0A=
> >> +    uint8_t patch_offset;=0A=
> >> +    uint8_t instruction[LIVEPATCH_OPAQUE_SIZE - sizeof(uint8_t)];=0A=
> >> +};=0A=
> >> +=0A=
> > =0A=
> > I think it would make things a bit simpler to use one of the spare _pad=
 bits=0A=
> > from struct livepatch_func  ather than hacking it into the opaque area.=
 Is=0A=
> > there a reason you chose this approach?=0A=
> =0A=
> No specific reason. Are you suggesting updating the public livepatch =0A=
> interface to add a new member and reduce the padding size by 1 byte? I =
=0A=
> guess that will also require a patch to livepatch-build-tools?=0A=
> =0A=
> Bjoern=0A=
=0A=
struct livepatch_func contains info that the build tool needs to=0A=
communicate to Xen as well as space for Xen's internal book keeping=0A=
while the live patch is applied. This includes the array for storing=0A=
instructions, the applied flag, and now additionally the patch offset.=0A=
(It's a somewhat odd arrangement but it's what we've got...)=0A=
=0A=
The build tool does not need to know the details about any of Xen's interna=
l=0A=
book keeping. So my preference would be to have patch_offset as an addition=
al=0A=
member next to applied (reducing padding by 1) and then in livepatch-build-=
tools=0A=
replace:=0A=
=0A=
        unsigned char pad[MAX_REPLACEMENT_SIZE];=0A=
        uint8_t applied;=0A=
        uint8_t _pad[7];=0A=
=0A=
with simply:=0A=
=0A=
        uint8_t opaque[39];=0A=
=0A=
		=0A=
What do you think?=0A=
=0A=
Ross=


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 16:02:44 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 16:02:44 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287146.486994 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRcIN-00027U-AJ; Tue, 08 Mar 2022 16:02:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287146.486994; Tue, 08 Mar 2022 16:02:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRcIN-00027N-5q; Tue, 08 Mar 2022 16:02:43 +0000
Received: by outflank-mailman (input) for mailman id 287146;
 Tue, 08 Mar 2022 16:02:42 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fWwI=TT=citrix.com=prvs=059ab6e88=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRcIM-00027F-LM
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 16:02:42 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 2e1a1654-9ef9-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 17:02:41 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2e1a1654-9ef9-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646755361;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=DnrGlj75LbkaqJdpvIgSXzhxfGYb9qfticxcaO6s+qA=;
  b=giES7aOzVSfJieZFb9+Ew0SF+7ljq/e+RJX/MXeu846FSKOOtOfO6PcI
   BzUGsViPw8EtLs5GBbksgDF3kcprPSC3j4FCxyap29kiB8Mbk2L7J07eU
   WquhEzZeKaMhbxe/v7AziMNp++u12KhAqUpv5rUNtMjRiQCYmQzvOX5Ei
   E=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65718423
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:z3UFQawko7y3pkUp2656t+fLxirEfRIJ4+MujC+fZmUNrF6WrkUPx
 jYXUDqDParbZ2uhfdt2YISzpEoDv8fTy9RkQQpppCAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2YjhWWthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 Npl6aS5ey01ZLH3veUdXjhZHyJ6PKZq5+qSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DJoQQt2sm1TjEJf0nXYrCU+PB4towMDIY2J0RRKaCP
 ZFxhTxHPSb+fQEIFg8rV8gdmfuPhHrRIhtitwfAzUYwyzeKl1EguFT3C/LOYcCDT8hRmkeep
 0rF8n7/DxVcM8aQoRKH73ati+nnjS79HoUIG9WQyPluh1GCw30JPzcfX1C7vPqRh1a3XpRUL
 El80iYns6Ua7kGgSdj5GRqirxasoRo0S9dWVeog52ml2qfSpgqUGGUAZjpAc8A98t87QyQw0
 V2ElM+vAiZg2JWXQ3+A8rafrRupJDMYa2QFYEcsTwQf5ML4iJoulR+JRdFmeJNZlfWsR2u2m
 WrT6nFj2fND1qbnyplX43ibuzuejISTUjUQ5wXaf2Op7Qd4b6K6MtnABUfg0d5MK4OQT1+kt
 XcCmtSD4O1mMaxhhBBhU81WQuj3uq/t3Cn0xAc2QsJ/r2jFF2uLINgIiAySMnuFJSrtldXBR
 EbI8T1c65ZIVJdBRf8mOtnhYyjGIEWJKDgEahw2RocWCnSSXFXelM2LWaJ29zq1+KTLuftjU
 ap3ie72UR4n5V1PlVJavds1374x3TwZzmjOX539xBnP+ePAOCDLFudYawLeM7tRAEa4TOP9q
 Y032yyikUk3bQEDSnOPrd57wa4idxDX+qwaW+QIL7Xec2KK6UkqCuPLwKNJRmCWt/89qws8x
 VnkAhUw4AOm3RXvcFzWAlg+OOKHdcsu9hoTYH1zVWtELlB+OO5DGo9ELMBpFVTmncQ+pcNJo
 w4tJ53QUq4RG26cp1zwr/DV9eRfSfhivirXVwKNazkjZZ9wAQvP/97vZAz08ycSSCGwsKMDT
 3eIjGs3nbJrq9xeMfvr
IronPort-HdrOrdr: A9a23:G2thjaP/QGKsmsBcTyP155DYdb4zR+YMi2TDiHofdfUFSKClfp
 6V8cjztSWUtN4QMEtQ/uxoHJPwO080kqQFnLX5XI3SJzUO3VHHEGgM1/qB/9SNIVyaygcZ79
 YdT0EcMqyAMbEZt7eC3ODQKb9Jq7PmgcOVbKXlvg9QpGlRGt9dBmxCe2Cm+yNNNW177c1TLu
 vi2iMLnUvpRV0nKuCAQlUVVenKoNPG0LrgfB49HhYirC2Dlymh5rLWGwWRmk52aUIE/Z4StU
 z+1yDp7KSqtP+2jjfaym/o9pxT3P/s0MFKCsCggtUcbh/slgGrToJ8XKDqhkF/nMifrHIR1P
 XcqRYpOMp+r1vXY2GOuBPonzLt1T4/gkWSvmOwsD/Gm4jUVTg6A81OicZyaR3C8Xctu9l6ze
 Ziw3+Zn4A/N2KOoA3No/zzEz16nEu9pnQv1cQJiWZEbIcYYLhN6aQC4UJuFosaFi6S0vFqLA
 BXNrCc2B9qSyLbU5iA1VMfg+BEH05DUytue3Jy9PB8iFNt7TJEJ0hx/r1qop5PzuN5d3B+3Z
 W2Dk1ZrsA/ciYoV9MOOA4ge7rANoWfe2OEDIqtSW6XYZ3vfUi976LK3A==
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="65718423"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=OdaCB8X06GX3Zce0G+a6aRx1Qghhfk9JgmM76OxDmhkAohEo5J04OW1xtOc7yY3nyeJXCylDZxwDgTWNaIndsQ8LwIks0fI4NphEVXMvFYVFcPRu0IHIjnYuPQB5AYW9xn0hyJhIxFNCLaarjTqoa+C/KRGKHRvs1NzwkyspXGGJWgqMtDwkZknXt8Zp+QJEk26Ifqphtx3asXNMNHkZSh6dHBgCfXsbp5i3lKtgbpMBsJDWXYSbv2G5tGc9Ess35Q97nX1kMZNUz1rEZNRNuyzjBu1RUVH1OQ4eFbVLURxSDHA3qfWvWEObuc3qFDg8wvJE8OLTkUAZSJnD4eSJ6Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=hP5MYYqJ19dAI1jFhfiLZssLcY4DL4Hh0KobK7hBq8g=;
 b=gFS/GVw1QQhc9YsxnuL06v6j3FbQHtHdMOjwMkWqFRPXwB32ua/onbGILdgXj9AtehW5qwmAMpktvCJ6EAQrArH1XxLetoIJDWQvPcQegzshG9z/KE7rftmncEb6IdokbYkMBmiguLt+Q1PTU3eSIkMZrQjlH9zvio3cJgNh8hlpc3nFbUPlWlPMUYiRzgFcS5nBk93a3Xi3axvme04NsQNnHeGKJrxkgewT4v2eZs6ZvOHHgHfTpvByhZy9dPcyoSiqXJaK0RvXuWN9sSx+yTYqHsSqEQTAtbbPmzMwp6xyxm5hIr1bBxSrCmskxuh34iEGOKuts3IWP5VJ39WDeA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=hP5MYYqJ19dAI1jFhfiLZssLcY4DL4Hh0KobK7hBq8g=;
 b=DPe+4URzM5p/HlKxbxLt8jokAjQJpVIMbSXFXyMY2ujm/mnHNU+Y4ww4VTlObh71gNuuOhVySCDy8n4ofquAlIX4hjCXbCwxPyrJcRKIiW7eolbRrORHDZkMO6A61suq9z0OvZkxEjqJOkbG32fvHNwC3AbelahD0qWLVM2dMp8=
Date: Tue, 8 Mar 2022 17:02:31 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jane Malalane <Jane.Malalane@citrix.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, Anthony
 Perard <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, Andrew
 Cooper <Andrew.Cooper3@citrix.com>, George Dunlap <George.Dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>, Julien Grall <julien@xen.org>, Stefano
 Stabellini <sstabellini@kernel.org>, Christian Lindig
	<christian.lindig@citrix.com>, David Scott <dave@recoil.org>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH v5 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Message-ID: <Yid+F5LdtMhs01tM@Air-de-Roger>
References: <20220307150609.10662-1-jane.malalane@citrix.com>
 <20220307150609.10662-3-jane.malalane@citrix.com>
 <YidAU63TsVO/X1Q+@Air-de-Roger>
 <c20a3e9f-770c-3d2a-a332-ce836a4192da@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <c20a3e9f-770c-3d2a-a332-ce836a4192da@citrix.com>
X-ClientProxiedBy: LO2P265CA0314.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:a4::14) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 3f9acdb2-ac63-4007-d9c7-08da011d0ffa
X-MS-TrafficTypeDiagnostic: SJ0PR03MB6503:EE_
X-Microsoft-Antispam-PRVS: <SJ0PR03MB650303303384CC04703B1D478F099@SJ0PR03MB6503.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(53546011)(85182001)(6506007)(6486002)(38100700002)(508600001)(6666004)(2906002)(4326008)(33716001)(6862004)(66476007)(66556008)(9686003)(8676002)(6512007)(86362001)(82960400001)(54906003)(8936002)(26005)(83380400001)(316002)(186003)(66946007)(5660300002)(6636002)(67856001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?Tmh0b3phMTRjd2xwTDBsT0dOU0Qxb2RMQVF5Sjl0OElaNDU3VWlMRyt3eHd6?=
 =?utf-8?B?cUxjZjZFdU5pazRNZTFwN0Z0RGRWY0IvT0NrdkgweVRObnRnSE94NFBUZWlR?=
 =?utf-8?B?d3ArbzBhbVorbThLN0hyTTUzMkdBMVQwM3RDbUdueG5OdnRmOUgyMkR3MGVX?=
 =?utf-8?B?QjRGQlIvWTY3RFZka1B0OFlQMVppMVhpNzhoeGRvRlhPVU9MS1NiWS9ObXZP?=
 =?utf-8?B?ZDEyclJDMlNSZDNFOEpRMXFYcE55WmxWUTNGL2hOZHZRWXBDamhDVmI4RXZi?=
 =?utf-8?B?SGdLQkhKUVJtdHpNMjZKOFFKUUw2YWYrODV6cFEvZzBMZGFFRXU0R0JydFE2?=
 =?utf-8?B?L0o1d284WG1icmRNU3RRUmRiblJxR1dMblEwUGhiRkxRMEd5djYxV1VUazVU?=
 =?utf-8?B?dDRIWk5LVzZPTFJGUW1KNXpJcmN5U1FsbElBVjJ4N1NBS1AxNVViOHVGUjJ1?=
 =?utf-8?B?OEVoSFhtdDVPbzVHSElORmY3SWxZSE1uT0kyQzhjR3lmYks3U3llRVRRT0Vn?=
 =?utf-8?B?UlJZNlNvS3VmWnI1V045a1ZpYkkxUlMvRWJvWnp2L1F0cVpITjcweWNpV1RZ?=
 =?utf-8?B?ZEFHaTlRaDBvSThOaEEvL1E5bHRLd1BLa3pGczU3c1B1N3lVR0xjbjZWaGRa?=
 =?utf-8?B?L2FzNFFLZWNzRm1kcUNmUHpKNzA4aHZ4c1BXWk5WUi9BYnFmS25uTkIwRWZ3?=
 =?utf-8?B?QlFOR1hQam53ZW1vdk52cTQrUExUTGQ5Z2F0eHVwUTJ3THIyMXRxRDFYMVBH?=
 =?utf-8?B?SitQS1pEcXFTUXEyekQvLyt5R1JJZXhzUmN2WERuS21DR1FhcTQ4SmlsK2Y2?=
 =?utf-8?B?QVZtczBpVTFUWUdMTUxpN1JKczFNd2hOVDFJM1dOUVVvQURpV2hWUGxOb0Rz?=
 =?utf-8?B?S1J5aU9tTGRYSXBhQWQ3VVNvcGIzTjB3amxjQ1RVVFd0ZWVNOHBCOWNBOCtM?=
 =?utf-8?B?RkJ5VndsaEFwcUROSUlVUzlXMzdYQ2dRWGRDbmR1WENGek5YS0s4M1hlY3lT?=
 =?utf-8?B?RmVjUit2WnpQcEVEMmgzQXUrQXdlV0ppSStIMTVaYTJTY2R5ZVppTFlRNFBB?=
 =?utf-8?B?RW50Y3VPNVFqaUNEM0lWMENEMEZlQ1ZqTHlLTlRZTnB3R0R0STZpKzA3UCtv?=
 =?utf-8?B?Z21yYklCSjdaWmpCZi9VWVQwNU9kRy9DM2ZUVy9wT0M4amNOTENpR0N1VWh4?=
 =?utf-8?B?NzlZVW1aOGp5OEJ5cTNlcURicTdKNHZQaUFVS2xYWXlmT1M2eG5LQ2YzY2hi?=
 =?utf-8?B?TkZpcThjNmVRMFNIVmUxMjlsQVZqZDg3Z1BQZitvc2VZOUV3U2JPd0dYbDR2?=
 =?utf-8?B?Q1Jwd1IyL1VjRVYrMDdBckk2SHpuTnMzQi9uZEs5QkN6N2xzQjNQbmt3ZTNl?=
 =?utf-8?B?QS90SnEyM2dmODMwTXN5OWZuNnd4KzdYMGpsRjdOMnpETXRNdVB3Z3o0REND?=
 =?utf-8?B?aFoveHBIN3dXcng0TGVCbkw3UjlENk4veUJITVVadE1MTWJveXEwTEIxRGkr?=
 =?utf-8?B?T1pIWGlaYVZhTXpzK0lPdUFXZjFtQlc5WWVrR2FLSHBNSnNWVG1nMGI1WHBW?=
 =?utf-8?B?Zms1Q0NkYzA1K2dSRzJKQktZZ3BUVGtCaG5ndVZnVEFoejV3SUwvclhhN3RN?=
 =?utf-8?B?Sml2YWozaTFTeUl0S2liR08zQno4MnRKU2MzRVV0Ym9pcUN3aUd4LzloVDhW?=
 =?utf-8?B?RkpKRUxMMGZTTTRocit1WjZGazRVVjJ4UjJrQitsVlZjSnZac25jYUw5Mnlo?=
 =?utf-8?B?RG9Idk5WbVYwK1hhT1F1aGlHNG9JVGYxbmd1WHY3Vk15Q0hBZnFUZEY2dk9H?=
 =?utf-8?B?TVRjZzdQOS9wMnBnU214aUhJbHJtU0drSmdGOStIb1ZvN2FtZk84YnZDOHBY?=
 =?utf-8?B?dFpwajBweng1dGRydDFuYmhaYlc3RUNrbFhEdlR5RjlPcWZ4ampBSzJOZWNM?=
 =?utf-8?B?QUw1TWdmNWNEOHpndXJyc2dUSThQT3h3cFhFVEZGQlhyZVdqUjZONlNvSG5B?=
 =?utf-8?B?TFdVMzlrNWFNWWQwUkxKRUNlQWthdFdDT0pxOEJsNE1JVG9ZZFdIekx1K1Ns?=
 =?utf-8?B?MFB2L1JPbHdwT05TdmZuZG1rb1VuVTdHdEdPSWhwcGNKbjBJVHh4eWNSSTlj?=
 =?utf-8?B?bTVUcmRrREdEMllKd0NmSHExZFluWUFPWnVyN2FUMjFYcG9aeUZnMlg3NU1G?=
 =?utf-8?Q?CSM3taPZbw94t1bkEnreXUc=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 3f9acdb2-ac63-4007-d9c7-08da011d0ffa
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 16:02:36.2310
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: RpXx+czTeBivrMXlivEWMgw7FzP9cyW+yLCz/hSm6X/vkrpvZwIQrsUhVPR1frjxED+3dgU2BwzZnY6nF4ul+w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR03MB6503
X-OriginatorOrg: citrix.com

On Tue, Mar 08, 2022 at 03:44:18PM +0000, Jane Malalane wrote:
> On 08/03/2022 11:38, Roger Pau Monné wrote:
> > On Mon, Mar 07, 2022 at 03:06:09PM +0000, Jane Malalane wrote:
> >> diff --git a/xen/arch/x86/include/asm/hvm/vmx/vmcs.h b/xen/arch/x86/include/asm/hvm/vmx/vmcs.h
> >> index 9119aa8536..5b7d662ed7 100644
> >> --- a/xen/arch/x86/include/asm/hvm/vmx/vmcs.h
> >> +++ b/xen/arch/x86/include/asm/hvm/vmx/vmcs.h
> >> @@ -220,6 +220,9 @@ void vmx_vmcs_reload(struct vcpu *v);
> >>   #define CPU_BASED_ACTIVATE_SECONDARY_CONTROLS 0x80000000
> >>   extern u32 vmx_cpu_based_exec_control;
> >>   
> >> +#define has_assisted_xapic(d)   ((d)->arch.hvm.assisted_xapic)
> >> +#define has_assisted_x2apic(d)  ((d)->arch.hvm.assisted_x2apic)
> > 
> > Those macros should not be in an Intel specific header,
> > arch/x86/include/asm/hvm/domain.h is likely a better place.
> 
> Actually do you think hvm.h could be better?

I guess that's also fine, I did suggest hvm/domain.h because that's
where the fields get declared. I guess you prefer hvm.h because there
are other HVM related helpers in there?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 16:04:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 16:04:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287154.487005 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRcK0-0002oC-Nu; Tue, 08 Mar 2022 16:04:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287154.487005; Tue, 08 Mar 2022 16:04:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRcK0-0002o5-Kj; Tue, 08 Mar 2022 16:04:24 +0000
Received: by outflank-mailman (input) for mailman id 287154;
 Tue, 08 Mar 2022 16:04:23 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LykH=TT=citrix.com=prvs=059d7c239=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nRcJy-0002nu-Vt
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 16:04:23 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 695057bd-9ef9-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 17:04:21 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 695057bd-9ef9-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646755461;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=Bz9yh7zgs1IE033WKO97YRQC8oeZNSDFRXWb+0ig/NM=;
  b=MU8hZaKH2L2lVsHSW+nb0PT4GoX+Di6L6GXhIgOH0VcVLgMFRZk+Zqpv
   lhK/+pcA5coimY2TE/s6IEGE0RqAKQQKIYmavSAqkwJJUHH6XZm8WoTFD
   QbZy0IArqRksYiKn+FxOgTUT5xggW4lrkhOdk3MlUldHnhxDqB3pGXBwR
   s=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65652360
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:kinaWqgjMAqF/0YNlQBNfPXzX161qxAKZh0ujC45NGQN5FlHY01je
 htvXDiEOvuMNjekKNogadu09EJU6MLWzoJgTAJkrSs2Fiwb9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFvd4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YTcSLJHu29sRaghZKRlGPfF826frfWfq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bklhmwSvUErANRpfbTr+RzdRZwC0xloZFGvO2i
 88xN2cxMU6bPUUn1lE/VJt5vr+CtFrGUiBA7wytlfssvk+Kw1kkuFTqGIWMIYHbLSlPpW6dp
 X/u9mHwEBYcctCSoRKA6nWsgubEngvyXYsAE7v++vMCqE2ewCkfBQMbUXO/oOKlkQiuVtRHM
 UsW9yEy668o+ySDTNPwQhm5q36spQMHVpxbFOhSwB6J4rrZ5UCeHGdsZjJGZdYrsOc/QDU40
 VnPk96BONB0mOTLEzTHrO7S9G7sf3hORYMfWcMaZTs+8eXB474/twPOdO5bEPKPrcXZRS6ll
 lhmsxMCr7kUiMcK0YCy8lbGny+gq/D1c+Il2unEdjn7t10kPeZJc6TtsAGGtqgYcO51W3Hc5
 CBspiSI0AwZ4XhhfgSpSf5FIrym7u3t3Nb00Q82RMlJG9hAFheekWFsDNNWeR8B3iUsI2aBj
 KrvVeV5vsc70JyCN/MfXm5JI552pZUM7Py8PhwuUvJAY4JqaCiM9zx0aEib0gjFyRZwz/9ga
 crAKJbxVh727JiLKhLsHI/xNpdxmkgDKZ77H8inn3xLL5LEDJJqdVv1GATXNb1ohE91iA7U7
 8xeJ6O3J+Z3C4XDjt3s2ddLdzgidCFjbbiv8pA/XrPTc2JORTB6Y9eMkOxJRmCQt/kM/gs+1
 irmAREwJZuWrSCvFDhmnVg/MOO/B8gu9ylnVcHuVH7xs0UejU+UxP53X7M8fKU99fwlyvhxT
 vIffN6HDOgJQTPCkwnxp7Gh8eSOqDzDadqyAheY
IronPort-HdrOrdr: A9a23:+hCh265K7eYKnG9N5gPXwWiBI+orL9Y04lQ7vn2ZFiY6TiXIra
 +TdaoguSMc0AxhJE3Jmbi7Sc29qeu1z+863WBjB8bcYOCAghroEGgC1/qs/9SEIUzDH4FmpN
 9dmsRFeb/N5B1B/LvHCWqDYpYdKbu8gduVbI7lph8HJ2wLGsJdBkVCe3ym+yVNNVN77PECZf
 2hD7981kOdkAMsH6KG7xc+Lo3+juyOsKijTQ8NBhYh5gXLpyiv8qTGHx+R2Qpbey9TwJ85mF
 K10DDR1+GGibWW2xXc32jc49B9g9360OZOA8SKl4w8NijssAC1f45sMofy/gzd4dvfrWrCou
 O85CvIDP4DrU85uVvF+CcF7jOQlArGLUWSkWNwz0GT+vARDwhKdfapzbgpAycxrXBQ4e2UmZ
 g7rF5w/fBsfGP9tTW46N7SWx5wkE2o5XIkjO4IlnRaFZATcblLsOUkjQlo+bo7bWrHAbocYa
 JT5QDnlYFrWELfa2qcsnhkwdSqUHh2FhCaQlIassjQ1zRNhnh2w0YR2cRaxx47hd4AYogB4/
 6BPrVjlblIQMNTZaVhBP0ZSc/yDmDWWxrDPG+bPFyiHqAaPHDGrYLx/dwOlayXUY1NyIF3lI
 XKUVteu2J3c0XyCdeW1JkO6RzJSHXVZ0Wl9iif3ekOhlTRfsufDcTYciFdryKJmYRqPvHm
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="65652360"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=BBx2G0jxhSZY28HiQRKCmjmZtEoW/gVWPg1P0BqRE3Pfuh6DcEBIZ6VtG0efVWypdeyk4bPfM61rKg6IGxsxC/7ZdRvnTbXkzc7+iH1SW+Eb9Ad5hLvRONvOo/fC64iDWxAQu0rEKhToXZrlThRwb1ejvhApfonhgiz4ltTSPPYM85O1txqh+EPuUdwJpQiFIgfzFGWAoBxdJOA098aPkGHkkzOmRqELMpWvuyrUS1A48VJx3Qc2L/7yW2VKZw48utLgF19kxMnA5Z70O3ank31o/6agt2XRS7g1vpz0l60SVSt8Z36kw5VPqOkzhn9tNFU/LwpUJiH+8qiwF0tFZw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Bz9yh7zgs1IE033WKO97YRQC8oeZNSDFRXWb+0ig/NM=;
 b=AkdRV4Hn0fK0NL+cPGYhjmo5urXghRzYBseUo0gWLy0C8hZQAx0rXlqfc1v5P/0hSlMkuPJ9qABWYKZS9665eOPGqyNiliuRwePjLpffChWSrcnYVrQflCFx37vVFmDBPmI+ZLemkg0Tb2RcPQvDBhNKkMQCK6qvb2xZ24HQAFVKzxqn5tT+oLw0ShAt+ISDrO4TEF1prdooBa/hCfFh7W43WiCIsbNgLo+VOb5IF2qbDOgs71q13rdKjJ3faJ5TQK4XQ8ocUmG2NqVyEUBcU4UvOlqx0Iv8UEBVhufGsotFcazcb49CVIPTHQH1eeFGuxgaKfNHRYsroM0KejurgQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Bz9yh7zgs1IE033WKO97YRQC8oeZNSDFRXWb+0ig/NM=;
 b=MLxMNSsFxA9RuITyZO8R8nB3BKVG7H9HIDE711phLwjJMzcQuifHd51JA77qmRUKuTWuI0AFAWLal0gO2K+jcopgelVGFT6vxl9vvrBQxUs8g90pVpa93LpxOQoprPE+ggC8tzKlSrbtdBTCmRAhQxWbnI3Mi3SloBoaYrrgcGk=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>, "Bjoern
 Doebel" <doebel@amazon.de>, Michael Kurth <mku@amazon.de>, Martin Pohlack
	<mpohlack@amazon.de>, Xen-devel <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH] x86/cet: Use dedicated NOP4 for cf_clobber
Thread-Topic: [PATCH] x86/cet: Use dedicated NOP4 for cf_clobber
Thread-Index: AQHYMvUk0XiHSYNleUqdwHU2YHv5TKy1jjMAgAALzQCAAASOAIAAB8IA
Date: Tue, 8 Mar 2022 16:03:57 +0000
Message-ID: <48c6720a-070e-85db-f1c3-448714232946@citrix.com>
References: <20220308140126.8815-1-andrew.cooper3@citrix.com>
 <18fb4115-94d8-16c2-e39b-1be895e254f4@suse.com>
 <476a25f8-86eb-0df5-b481-fc4cd5ecbb18@citrix.com>
 <83fa28ce-f2db-2451-356f-0dc0266834f2@suse.com>
In-Reply-To: <83fa28ce-f2db-2451-356f-0dc0266834f2@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 3d1b7890-5cb1-4677-df5d-08da011d4064
x-ms-traffictypediagnostic: BYAPR03MB3606:EE_
x-microsoft-antispam-prvs: <BYAPR03MB36061096711B8EB832A16C43BA099@BYAPR03MB3606.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: Q0pRzSYwtlKkfB9rT4T0U6tuDS0LxyCWtbaA8VE3szhF6eqoRaH0hOstMuXlG4dlbMffab8QflLbMLkwQ0qu8vDYrBL940YljENyAdQljoFXNuFDmCVjmWUOuV4lnuHbMUBs9ytqFR5CpKoRtofbFr4WWsdrUZ+r4nY9s0ZUNmG4pgxzKeJorMnii2uYk9cqCeRILY2ZCCjCoUkjIuhG78rF47+4wGCsLorIGm88GFNCFH+93LZbxa4BAlujUucmaMH+FdYzQtRqnKaoapAinpBRhosdMnN9T6YlesPa+rPUqG/92NYKB8X0EDREiVbsOBGcb47TmVLP+Q5kjhj+fgxMzQNIyqLWAaHpEqjwzJKdJGyi0ojgdWb+mlsNB59bMIm5KzTauQGofGP9OdpHMvedFCXGOIabxRP3GphZ68tH9QMAp0Gt3q2emOOqr6dEqIXAQTqa9oWtQLpxzI/wuXz7qX51FTfgz9ujaWRmPeg0Z7SB21bdSTlJEgkYNHhCAL5LLBfNIiTcgZaz+Y3HGoUE/2OCv2CgqfTqOrnTgjNZDkoSUJA4b1J28KDlKFVQnFjI27D5EZVpLXTF+YRPVs+uUAE84F8LaBOa5S44r+TeYgCdWZZkkGlHHddWmZsKDsgbkXd62bLD/25M9MFoHnHVtfIlTG+/HGA86bkFepQAqOydgHsPjGAZqg48Y5ne9+FdvZgGZenMQ9EDlCdXGYpJGSLIUIhyME3T02PF23S1iuuGzZEzmlQ+dkolYF9PU8OafTirUz1zJw8vIFKIoQ==
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(64756008)(38070700005)(186003)(316002)(31686004)(76116006)(91956017)(54906003)(4326008)(36756003)(31696002)(83380400001)(6916009)(86362001)(66574015)(82960400001)(8676002)(2616005)(122000001)(5660300002)(66946007)(6506007)(53546011)(26005)(38100700002)(6486002)(6512007)(508600001)(8936002)(66446008)(66476007)(66556008)(2906002)(71200400001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?Q2JZR21IYU9CR1NPSkhHMERiSkhlUm56djFCTGxUQ1l6UUFSUzFoS095REdU?=
 =?utf-8?B?NGZEYmczaE9nR1RzWHc4VlB5RmE4VnZna2VwUG1xUzV3WWxKbzlyU2JjODlJ?=
 =?utf-8?B?VGd4eXBQUEFKZ1cxc01RSC81bWRid0V6WTVZQzJEWGVJaHY2ZHBoTTVZN0Vu?=
 =?utf-8?B?NEhMR0dSUGpGVmhqbEFLa3hTOEIxbUw0Y3JjRHFEVm1TN2JXVkp3MmlpalYy?=
 =?utf-8?B?TjZUTUF2aS9mdkhSczhZNkhMRzRMMXNQTFFrN2dSNmdNQkdtTWl2ZlVFRVRH?=
 =?utf-8?B?a0dtcCtueWJablpMMU1BVXhEZko3Z0xGWWx0MnJKWE1vM242bWpyMTBWSnZj?=
 =?utf-8?B?NUZIV2R3TUwva3UwaUNGUHljUVdKYndhQ2FiZVJGWGlSYWc1bldwbXRES3JH?=
 =?utf-8?B?NURLaFVZS2xZU01OVHVUMXVjamxyV2JNRGtOdEw5ZHorcmx6VGtIS3EzaWFN?=
 =?utf-8?B?bjcwSnRqcE94UFZWSHYxdTVGMmw0K0p5cVA3bFVhdkNndnR4eHF0YjFjR0V3?=
 =?utf-8?B?NEN2T081dmhtL3hXL1V2eVZpOFVUQVdYVzhjSE91MmI5bXpkbnFUQnU5S1g3?=
 =?utf-8?B?cnc4U2JjWnZ6UGR4bEtyZExHQTJ3U0NTZlVjdTRrUlN5MzV2aVpqVklNYTJv?=
 =?utf-8?B?cGJYTlZoN2xFOHVBdnRCSjU4RGF1TS9FSkJqcWUzL0JYbHN1Q3dLRzllc1lP?=
 =?utf-8?B?ZlNWQTYyTnozVTQ5ZE14Smpja3NtZUlDUlgyMUN5bkdTbStxVitKUjlGbnIr?=
 =?utf-8?B?emtDMFZjZ2pBSVREMGpGNGR2YTJQb3pmTFphYnFkZEVkRXpIZkpSejk3MU9D?=
 =?utf-8?B?NkJ0cUdqSEtSR3QwTzVENHE2MkFhRGtLV3h6MGp0S0tUVjZqckhWYTErTTZp?=
 =?utf-8?B?ZUFyR2wzRnMveGpEdUhsc2RreXdWVllEK0NsSE41RC9UL2JhclR6WDhOc3FW?=
 =?utf-8?B?MVRwbUtudzFNYlEvMzJXQ3Znb2ZvbEFiaFZIQjJBRW9hc21KQktVdGxWK3h4?=
 =?utf-8?B?R2kvMXYra2dFTU9Eb2pydzRDeCtibUxLZVp4MnY1R056eElOWHBtaGtsMDd6?=
 =?utf-8?B?dWxqVVdHOXNmdWpaTGJ6TWtubGdFcEQwSFJ4dTJKMjVkcVZVOEVSZURyZkcw?=
 =?utf-8?B?UEVxa0VkNFFvVXliWG1CRVdKbnZCVlhlc2pqdVBBalR2M3JMbi9vT0FLdEp4?=
 =?utf-8?B?VWhXbkN3TmxyYW00U3lhWlJSV1ZQZmNGTjIzWEtmUGhvS2RSNHBHWHREUEgw?=
 =?utf-8?B?eEVmcUlWdTVWdVFjVm84bmp0dm1ybUZlRktvempWbGhDL2hXbmRCaENpakJV?=
 =?utf-8?B?MnBTTG01eTBWUG9admFqTFBkWTJyNzBLYnphcGg5WkV3SExzODRyVU5FdFVp?=
 =?utf-8?B?OUFGdDZucVJuaUZrclo3Y1h3WU9pT1lJNWs5VE52TWh0cEtRd0N0bk5MRUVR?=
 =?utf-8?B?Yk12dkhpMVNqQ2lJSUpuWUFaaTJGMTZGbnBYOU92UEd4bmo1dlhObmVnV2Z6?=
 =?utf-8?B?Nnh5QXg0Y0VkMzREbWJpZWprL0hSRk1uU0I0OWk5azdOMU1ESlF6NjU4WVBq?=
 =?utf-8?B?WXdicEtqeWduOXhjQmE2R1VYWFRDNUJjK0g0ZkJROFhUN3JVbVhhc3ArczE1?=
 =?utf-8?B?eG5sWWJHQnh3bmhPSTJnWFFHV3YrYXhSTWlaTXBheWpFWmZyUWcrMFplV3Nm?=
 =?utf-8?B?eEV1S3k2byttQlVocG5sQ3VwWEhaZFBjeW91bE1QTUxRMllFdVZLbG1JVkc2?=
 =?utf-8?B?R1RZSXhLTWhnbjd1UlEvNWtJeCtkczNVMVBLaitRTUtES3ZFTDlhT2J1Qm1D?=
 =?utf-8?B?NGhQQmhaUjBuYlNaa1VUaWFCbmpneFhqSWp4NVpuSE54ZzNNUEFlRThFMURk?=
 =?utf-8?B?aW96b0Z4YkVHcFVYb21GNlpIWmlYQnQ0aW9vVW1YYnlZMnpuY0d3TEZ0VC90?=
 =?utf-8?B?MWo0VVJpYU91a3UvWTJIa2hVOU9JRDdvN3lwU2UyeEx0alI1dURuRlJqZDVK?=
 =?utf-8?B?WmFjVXh4MjNFdUd0UnhMcnBQa3crVjBCL0MyelU3OTF3SDFFZCtsOUlCY042?=
 =?utf-8?B?MXBZWmFTNjRDVE9FVHkvRDlkdzlORll3WG1oYitZYnFnOFplRWx5MFFvdlpx?=
 =?utf-8?B?OENRSmhReitTV0IvT2pjNVBHTmJTZnNRb3RwWVlsTnc5Y3JLVk9rUW5reFZV?=
 =?utf-8?B?SHJqckp0OXp4clZUYlA1VktTUHdnR3FEamlJMGN2OE1sdkh1cFQrR21xbmFa?=
 =?utf-8?B?YzMxM0huait1clFEWEE4QkNYbnZnPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <D4C4E87060360048A6880A7D2B09C11F@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3d1b7890-5cb1-4677-df5d-08da011d4064
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Mar 2022 16:03:57.1441
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: TFHc3qS16wTf1mzfwaAi6Gbe8vzAlLkaj9xokJ+GWNzUX3h8x5+ym4Jr1ZQ00vof1QbC6V1fdqDUvpOwCjeJ7HP3juu/Pg9pFpN0bUnFs14=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB3606
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Tue Mar 08 16:13:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 16:13:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287162.487016 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRcSW-0004SY-Kp; Tue, 08 Mar 2022 16:13:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287162.487016; Tue, 08 Mar 2022 16:13:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRcSW-0004SR-Hc; Tue, 08 Mar 2022 16:13:12 +0000
Received: by outflank-mailman (input) for mailman id 287162;
 Tue, 08 Mar 2022 16:13:10 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ibIM=TT=citrix.com=prvs=059cca470=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nRcSU-0004SL-Sl
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 16:13:10 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a4308a4d-9efa-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 17:13:09 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a4308a4d-9efa-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646755989;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=n2tesfGqKKQZ3sTBGGMzuzCB4pZuYikofZ3Le0PsZzA=;
  b=RfALWHs+pzvc0iS3/3icBrvurHM8A//G9dXwNOcB7sf8qz8sROvjXyef
   DCvyDX21Jh1gOD9i4bhSxWH+KqOZJ0yg+AQn3S1l5RrdvNUA6x9iY3WGi
   mRRhNqzuw3jld/SdWMpr2RbTkwackeMC9QSV2Ko4rB1SjkGVwc+tnWVSf
   k=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65729038
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:wN/I8qNmDVLSl/jvrR1dl8FynXyQoLVcMsEvi/4bfWQNrUoq1TVUz
 GJJWG3UM/eOMWKmf9t/at+woBlS7JDcz9NkHgto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi2t4w27BVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Z8
 Ml3mbexRl8SYvfGucAxdl4fFgVTBPgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALDsDtMcU6s3VpyTjfAN4tQIzZQrWM7thdtNs1rp4TQqyPP
 5FJAdZpRCrgOBASYQo0NLcVjNyW2yfwQjBa8k3A8MLb5ECMlVcsgdABKuH9YceWTM9YmkKZo
 GPu/GnjBBwectuFxlKt8G+oh+LJtTP2XsQVDrLQ3sBthFqf12kCEio8XFGwoeS6okOmUtcZI
 EsRkgIipLY/3FamRd78W1u/unHslgEYc8pdFas98g7l4rrZ5UOVC3YJShZFacc6r4kmSDoyz
 FiLktj1Qzt1v9W9S3iQ67OVpjOaIjUOICkJYipsZQkK+d74u6kokwnCCN1kFcaIYsbdQG+qh
 WrQ9W5n2utV3ZVjO7iHEU7vuy6WirPIQVYOul/df0aJy0Q+YaqIXtn9gbTE1spoIIGcR1iHm
 XELncmC8ewDZa2weDyxrPYlR+/wuavcWNHIqRs2RsR6qWzxk5K2Vd0IuFlDyFFV3tHokNMDS
 Gvaoktv6ZBaJxNGhocnMtvqW6zGIUUNfOkJt8w4jPITOvCdlyfdpUmCgHJ8OUi3yCDAdollZ
 f+mnT6EVypyNEie5GPeqx0h+bEq3Dsi4mjYWIr2yR+quZLHOiLLF+hVbQDXPr1ihE9hnOkz2
 4wEXydt408DONASnwGNqdJDRbz0BSJT6W/KRzx/KbfYf1sO9JAJAP7N27IxE7GJbIwO/tokC
 kqVAxcCoHKm3CWvAVzTNhhLNeO+Nb4i/ClTFXF9Yj6VN40LPN/HAFE3LMBsI9HKNYVLkJZJc
 hXyU5nYUqQVFGWdoGh1gFuUhNUKSSlHTDmmZkKNSDM+Y4RhV0rO/NrldRHo7y4AEmy8ss5Wn
 lFq/lmzrUYrL+i6MPvrVQ==
IronPort-HdrOrdr: A9a23:OffTl6Mi85eQXsBcT3b155DYdb4zR+YMi2TDiHofdfUFSKClfp
 6V8cjzjSWE9Qr4WBkb6LW90DHpewKRyXcH2/hsAV7EZniohILIFvAu0WKG+VPd8kLFh5dgPM
 tbAstD4ZjLfCJHZKXBkUeF+rQbsaG6GcmT7I+0pRYMcegpUdAa0+4QMHfCLqQcfngjOXNNLu
 v72iMxnUvGRZ14VLXYOlA1G8z44/HbnpPvZhALQzQ97hOVsD+u4LnmVzCFwxY3SVp0sPYf2F
 mAtza8yrSosvm9xBOZ/XTU9Y5qlNzozcYGLNCQi/ISNi7nhm+TFcRcsvy5zXMISdOUmRMXee
 r30lMd1gNImjTsl1SO0FnQMs/boXATAjHZuAalaDDY0LPErXoBerR8bMRiA0DkAgMbzaBB+b
 MO0GSDu5VNCxTc2Cz7+tjTThlv0lG5uHw4jIco/jRiuKYlGclsRLYkjQpo+VY7bVfHwZFiFP
 MrANDX5f5Qf1/fZ3fFvnN3yNjpWngoBB+JTkULp8TQilFt7TpE5lpdwNZakmYL9Zo7RZUB7+
 PYMr5wnLULSsMNd6pyCOoIXMPyAG3QRhDHNn6UPD3cZeo6EmOIr4Sy7KQ+5emsdpBNxJwumI
 7ZWFcdrmI2c1KGM7z44HSKyGG4fIyQZ0Wf9igF3ekIhlTVfsuYDRG+
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="65729038"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Rf8SSf5sAPGpSolnV28m2MYsfVMyJxVh3s7yk4fic+oYPR+ckdH+vG8DEZzPbq929OkvJF8weA0zZCtrgK7g4euWZLJNATlHMCGtYWMddSLa8qQ/1hbUphO4wGaqLFadJs3EkparW9tZQlQPENiNOBrmn4/hHUMjr8zbc/CnF6TMiQ92CA2cKjgib0phzkW7RbdnrEEeLguoyD1+SA4WJc9nXNRMRo0DYyaqQtIhjkR0Lo4u0Scj4kteNYc0ibxN7ijEQjnFtTa+iRrgAc4T3kx63X4dlnwq76rMzCNEik8CAi93XPrBl4FmwXdiraOHIZmQdjaKYGJ4SuAxOSKmjw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=n2tesfGqKKQZ3sTBGGMzuzCB4pZuYikofZ3Le0PsZzA=;
 b=i7qUKCVLSVF7LEjz1f5RqyRntT2PFmXA7OniTdNcw7+xRp/CDusvkJT4b19i3GxnxiKBfXN1pNDm/6i8BTPPTlQKutWdmhpxBDlraEtuVDXDr1BTU7ZmwHqwgXN3npdi6GqYHSLbiXkJlmNkRArA1ltJnUrqtmKzQXO7HiqOETU9iDKsYr49+L/PG7jw6If9MorR3dwdprm3DAVKXNW1wB4nMJsvipW5YeHvpReSccOsLf7+dRIFZWwn+rs8QAEJOHEFQLxtu4ma8Cptvb9WgMD4LuiunUDAp299G6xxfuMvQMEU4tBCkByVcYvvN9AXVX7lixlnq+daBwxRxWqVvQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=n2tesfGqKKQZ3sTBGGMzuzCB4pZuYikofZ3Le0PsZzA=;
 b=Pu+mN3bsF53cjs6VjDGUlD3fmf1z8tRZUkkQ3Nh2lD542a2CePWgdMqBFK1CvptceaDwOznh3Em7zj37aehKexWA7yZUCg4g6SYJJpAypuStD5q4Hl8I9pDK6AlM8MYnEqL9t1zbew6VUgpd70U5z7VTP+4wY1bXiYFKR/35joc=
From: Jane Malalane <Jane.Malalane@citrix.com>
To: Roger Pau Monne <roger.pau@citrix.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, "Anthony
 Perard" <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, "Andrew
 Cooper" <Andrew.Cooper3@citrix.com>, George Dunlap
	<George.Dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien Grall
	<julien@xen.org>, "Stefano Stabellini" <sstabellini@kernel.org>, Christian
 Lindig <christian.lindig@citrix.com>, David Scott <dave@recoil.org>,
	"Volodymyr Babchuk" <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH v5 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Thread-Topic: [PATCH v5 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Thread-Index: AQHYMjUEaMoAwzVpzE69n4F8Ciyydqy1XcmAgABEiACAAAUagIAAAtSA
Date: Tue, 8 Mar 2022 16:13:04 +0000
Message-ID: <18af493a-ce2d-60f6-bbca-2e163b924788@citrix.com>
References: <20220307150609.10662-1-jane.malalane@citrix.com>
 <20220307150609.10662-3-jane.malalane@citrix.com>
 <YidAU63TsVO/X1Q+@Air-de-Roger>
 <c20a3e9f-770c-3d2a-a332-ce836a4192da@citrix.com>
 <Yid+F5LdtMhs01tM@Air-de-Roger>
In-Reply-To: <Yid+F5LdtMhs01tM@Air-de-Roger>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 710c58ce-dc70-48cd-a7ec-08da011e86a7
x-ms-traffictypediagnostic: CY4PR03MB2645:EE_
x-microsoft-antispam-prvs: <CY4PR03MB26456E90F79DECD94FD072B981099@CY4PR03MB2645.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: ZXkjyQoT/iaLKtp7cUzgnT/Y5S5QJpC5XoqIw+TkI17MAyYfuld8+/rrkp7goAbDeLbhFPmwIGtVVQuYbs80g8Z4GEZGrFRbd12kCl3sVqi5uAZ6QVpOy5G8wE+vJ6RLnlfogCSHs9zASYCWg/BrH1+Jfcqwio4n0K6KiJ5PCll3IYp7T1YD42zJdTmPdTD8e62flgC8LPXkDs3Tg45OBWy2iLRrb1AKkA1iNkT7636691sTSYRAfkYsDbWGOjophp4sRRsu65nOjgVxafbkFn8Qf83oQ0pN9fbreDyc4J5ZX6DT72e/Y895pRguTIaN3vhJWa0dbAs5JCLyyEsX7t1HjfirmfWKHwAd7HMgAF4fb6Kc75kZfN+STT/cxYtp+9orXDfJkmEL9EjVs9lPBxBKjojLpmRQuzkpxRGtsqq+BPmwSqRRU5M+3Y7lM91HnehhShYp14rliaLmyeISicdtRaSCpljTm37NHpMvIACZWu1ITW6zKgHkIoQgdfUUsSCb5uzTaX5uT13asj/Ns+DWoNq+dveph+FYRIjdvAMEYN0V9vj3WMIfJ99PCBjnir2jNLHuE1xwHouZb9uQg+8/CGnaOnLc4prhi42vTwWlArnxgDg1mavy3fOfWAhJNpoO38RT9weGtFGBhs70U+wFiTAGH4OCxfZ/F3uFb9nE/yGJfxM8AEd2IHX1Wnm01Wdnbvu4YqGXR8oJwmyUGlBE3JmTCWjbAPuqaKFIMK03V6bog9Yb+kf2UEWgAO35
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM5PR03MB3386.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(2906002)(5660300002)(8676002)(6862004)(64756008)(66446008)(66476007)(66556008)(66946007)(91956017)(76116006)(4326008)(31686004)(316002)(8936002)(186003)(6636002)(37006003)(54906003)(122000001)(38100700002)(36756003)(86362001)(38070700005)(508600001)(6486002)(31696002)(82960400001)(71200400001)(6506007)(6512007)(53546011)(55236004)(26005)(2616005)(83380400001)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?YkdwQ1VadGtnb2orQjlKUmVtT2FFYS9vU3d1K1pJN1dncmwxOW1aQi91aXBF?=
 =?utf-8?B?UjRVQTJPNmxiVEVGTmF6ZjVRRktOMXN5OHpXamMyeWxLUWtxSExUM0NBVE5I?=
 =?utf-8?B?ZWtsMVRyVW1Tc09sS0RoZEZnaWFRb05iNGUwWlVxMU9aTlJHcUQ5aFo4RXl2?=
 =?utf-8?B?Nm9POFhnK091YkdRM0NCbXUvUEdYTTRoQ0liZ29ieVpDN1BqOUtYemo1UVhI?=
 =?utf-8?B?WXZuUXlTQzJlOXd6cnM4QTNHQjFUQ3NrU08wOWdEOXNlTjB4SFdNQmUyWFhQ?=
 =?utf-8?B?QzdwdzI0c3hSeWlsdDc3RUpVbXZkV0s2d0hiM0wwN29NcHd1NFRaSEIxemZE?=
 =?utf-8?B?SkZ5V1FycXZ1Q3E3TCtjTDk0bkQ1dVVjWkdVOFhpTmkvODFFdWpyam9FVXpl?=
 =?utf-8?B?cDZZRW1uaE9pTko0bDFjNGFOaGFPTzd2V21WK1hoVXp2L09NUEdkQ3lIb1N0?=
 =?utf-8?B?S0pQRHQrZFp5bFJSMlhQZzRkdDRYUTQwL053cmVKczRhcHJZeVoyY2YxK0Zt?=
 =?utf-8?B?OThCYXROdXJQck5CQ28zbGdCZXpJaXE3ekh4RHZQYmd6SjdqdU5ieWRWenY4?=
 =?utf-8?B?K3VRaXdMWjBsUjJDK0pmcGNGRk5vaWZsUmpReWlTRklZeTIwNGtSUDRMMzBm?=
 =?utf-8?B?T3ROWWRqUXg0VGVHbnA1a3JEQTdUTWRRMDRTQlY0NGFWdXE2SmY3dkJmUWtO?=
 =?utf-8?B?NEVta0NJNXVIbVdPSG0vV3RoSFBaNmhZNzVWQ0oxTWZmWTl6d3JLa3hWR1Rq?=
 =?utf-8?B?cjB1UVZwQmloemdqeHZ1dGZ3WmQ1RzBnUk9nMUpha0VscEoxZ2pZT21QVjVW?=
 =?utf-8?B?U3lVWDRJS0RhOVR4cnJ4Rmhua1V4a1ErdGtvSFBKVFhpT3d5Z1NlMTFYalpz?=
 =?utf-8?B?dXhJd3VoOHBRcDRFUTlad0NzdU0xRjlHT2hGcW5xNDN2NGJKVGJobE9rNXJH?=
 =?utf-8?B?dU9sckU5ZXZsNHdHNzlaVitqNlVGdnV1Nkt0dXo5VlJ1Q25idTR6bU40R3lI?=
 =?utf-8?B?MTljejdncEFQQVRLdlRWbHVkdHNWWXpZd3QvRi95eUpyRzRjdWtiRjBTWWZP?=
 =?utf-8?B?UjhZOFI0c0t3ZFV1M2E3dCthV0didW1BdDFnemdpMlA2N3J1NENRTDRlYVNu?=
 =?utf-8?B?SUcyVzQ4S1BBNUgzTjFLL2JRa0NUZTN6NWlDOGZocTdjSC9PZFpmNDBLcWVn?=
 =?utf-8?B?eDdNeEcrYk9JbDRRRXptT2N0SkpGdlZqNDhMcW9nL2QzZnZKUXlEaExoemRX?=
 =?utf-8?B?TFFzQkxFemxveDY4MWNIVDdscmd6ZDEzM2UyS3UzWDUxRWdSQ004bVdmU29t?=
 =?utf-8?B?MFZDOTNISnRyU01qeHgvTEJSWXhuSWZ4T1lIYUIwS1paZFJBUDB1U1ZjZlp3?=
 =?utf-8?B?bW0xWmxMeC8ySTZVTW9BQ3IyWXN2NzhPTC9MZWswMjFmVmdzTFFwaFp1SXZG?=
 =?utf-8?B?Z1BVd3lZb2VKbDRJWlcvNmw3SGoxdUVkeHdrbHJDNURWN05Yb3V0c3dnTVRS?=
 =?utf-8?B?WkthZjNMaFUvU2xiaTQzbmFnVXZrV3RWRkZIcDZOdldzVm5pOWlFT0VTR0FM?=
 =?utf-8?B?dnZGMVVQWlYvZlVnb3hUVE9NNjdTcDlhNVFUbEVvOHNDMnBDTzFkRVM1ZWFD?=
 =?utf-8?B?YkNEc0VWRkFMZjNKMm9DMTVBeGw4Skc1N3B2a3U2U0VjbFlPeVhqL3gycUUx?=
 =?utf-8?B?YnJ4Ny9DNVl2dTVOdzNQVWNkRTIxUDJ6Q0k4d1RhSVMva29nQ1BuVDdqNnJQ?=
 =?utf-8?B?QkRDVkpvamVBSmRvQkhDZzVSMm0yNmJOb2xDd1BIYzVWTnFQUTNpdU1ydEVZ?=
 =?utf-8?B?dGpmNkRTTkpnTkxtZldOTlNPNzRjUjlydDllMTZrYVNqbkhYcGZhUW1MUkNT?=
 =?utf-8?B?cTh3azNBVFFjbUpXOFVvNFJMNHVHTUVhT2lyZlZPUHZCdVBKKzhkY1ZzOG9D?=
 =?utf-8?B?NHBBenMwdzRhSW9OOGJpd0lWRjcrVWk1UG5jWDJhVnRGSFRNVURudmhTVE5I?=
 =?utf-8?B?Vitwbm1YNUtPa09yTURYclhWL3UyQ3F5bVIzODIrUFg4Nkp1RHdtNFRWbjht?=
 =?utf-8?B?dm5nazdROEVReGNHbk0wM1pwK3Jvb2lsS0ZHb3dPaTArNWUvVWlXQkpvTVNx?=
 =?utf-8?B?K2RYeWJ5aEpiRUUrTVMxSXpTS3h5VFNVQmVJajZXZzloRDhOL2VTWkJ0SFph?=
 =?utf-8?B?ZThvS21QT0FhWDBoeG1GMStoMUNhWmt0eWUyV0psZTRyNlZnSmZJSWRGRTg2?=
 =?utf-8?Q?02zhM7kFGxqFwCtQcuR2kk26FqkWmj3pbYaUxbHBHE=3D?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <02DD911907946342BEB1215B788037C6@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM5PR03MB3386.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 710c58ce-dc70-48cd-a7ec-08da011e86a7
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Mar 2022 16:13:04.4408
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: jd+PbL4XLsOIKcnGVltIkKMh855/xwwBi6b45oLEZuoL2S7Zqpv/mf3HE/ovENCC7iC2cXsOENOYvTNOvt77mkJLg5VJD3wbS0R5NhdECHU=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR03MB2645
X-OriginatorOrg: citrix.com

T24gMDgvMDMvMjAyMiAxNjowMiwgUm9nZXIgUGF1IE1vbm7DqSB3cm90ZToNCj4gT24gVHVlLCBN
YXIgMDgsIDIwMjIgYXQgMDM6NDQ6MThQTSArMDAwMCwgSmFuZSBNYWxhbGFuZSB3cm90ZToNCj4+
IE9uIDA4LzAzLzIwMjIgMTE6MzgsIFJvZ2VyIFBhdSBNb25uw6kgd3JvdGU6DQo+Pj4gT24gTW9u
LCBNYXIgMDcsIDIwMjIgYXQgMDM6MDY6MDlQTSArMDAwMCwgSmFuZSBNYWxhbGFuZSB3cm90ZToN
Cj4+Pj4gZGlmZiAtLWdpdCBhL3hlbi9hcmNoL3g4Ni9pbmNsdWRlL2FzbS9odm0vdm14L3ZtY3Mu
aCBiL3hlbi9hcmNoL3g4Ni9pbmNsdWRlL2FzbS9odm0vdm14L3ZtY3MuaA0KPj4+PiBpbmRleCA5
MTE5YWE4NTM2Li41YjdkNjYyZWQ3IDEwMDY0NA0KPj4+PiAtLS0gYS94ZW4vYXJjaC94ODYvaW5j
bHVkZS9hc20vaHZtL3ZteC92bWNzLmgNCj4+Pj4gKysrIGIveGVuL2FyY2gveDg2L2luY2x1ZGUv
YXNtL2h2bS92bXgvdm1jcy5oDQo+Pj4+IEBAIC0yMjAsNiArMjIwLDkgQEAgdm9pZCB2bXhfdm1j
c19yZWxvYWQoc3RydWN0IHZjcHUgKnYpOw0KPj4+PiAgICAjZGVmaW5lIENQVV9CQVNFRF9BQ1RJ
VkFURV9TRUNPTkRBUllfQ09OVFJPTFMgMHg4MDAwMDAwMA0KPj4+PiAgICBleHRlcm4gdTMyIHZt
eF9jcHVfYmFzZWRfZXhlY19jb250cm9sOw0KPj4+PiAgICANCj4+Pj4gKyNkZWZpbmUgaGFzX2Fz
c2lzdGVkX3hhcGljKGQpICAgKChkKS0+YXJjaC5odm0uYXNzaXN0ZWRfeGFwaWMpDQo+Pj4+ICsj
ZGVmaW5lIGhhc19hc3Npc3RlZF94MmFwaWMoZCkgICgoZCktPmFyY2guaHZtLmFzc2lzdGVkX3gy
YXBpYykNCj4+Pg0KPj4+IFRob3NlIG1hY3JvcyBzaG91bGQgbm90IGJlIGluIGFuIEludGVsIHNw
ZWNpZmljIGhlYWRlciwNCj4+PiBhcmNoL3g4Ni9pbmNsdWRlL2FzbS9odm0vZG9tYWluLmggaXMg
bGlrZWx5IGEgYmV0dGVyIHBsYWNlLg0KPj4NCj4+IEFjdHVhbGx5IGRvIHlvdSB0aGluayBodm0u
aCBjb3VsZCBiZSBiZXR0ZXI/DQo+IA0KPiBJIGd1ZXNzIHRoYXQncyBhbHNvIGZpbmUsIEkgZGlk
IHN1Z2dlc3QgaHZtL2RvbWFpbi5oIGJlY2F1c2UgdGhhdCdzDQo+IHdoZXJlIHRoZSBmaWVsZHMg
Z2V0IGRlY2xhcmVkLiBJIGd1ZXNzIHlvdSBwcmVmZXIgaHZtLmggYmVjYXVzZSB0aGVyZQ0KPiBh
cmUgb3RoZXIgSFZNIHJlbGF0ZWQgaGVscGVycyBpbiB0aGVyZT8NCg0KWWVhaCwgdGhhdCBpcyB3
aHkgLSB0c2Nfc2NhbGluZ19yYXRpbyBhbHNvIGdldHMgZGVmaW5lZCBpbiBkb21haW4uaCwgZm9y
IA0KZS5nLg0KVGhhbmsgeW91IGZvciBwb2ludGluZyB0aGlzIG91dCwNCg0KSmFuZS4=


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 16:15:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 16:15:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287170.487027 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRcV3-00058x-59; Tue, 08 Mar 2022 16:15:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287170.487027; Tue, 08 Mar 2022 16:15:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRcV3-00058q-1v; Tue, 08 Mar 2022 16:15:49 +0000
Received: by outflank-mailman (input) for mailman id 287170;
 Tue, 08 Mar 2022 16:15:47 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fWwI=TT=citrix.com=prvs=059ab6e88=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRcV1-00058j-FA
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 16:15:47 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 00bd0d27-9efb-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 17:15:44 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 00bd0d27-9efb-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646756144;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=vbSmVbnA8x/4/Y02BePB7RvH6v4Xp+9l2OFZvg43UP4=;
  b=MKqaqc7nBHo7JsGqrwQIIsP8LXr/V9owuOizIIwAkYp0lJ1G/ZfBU2Ks
   1m+RLAkxvOm9weXQTHH9aU3wkkX7LLt+zooMRBeW0XgJqzBoJfSrfIKhW
   ONZaVxnDX6/tLSEV4shVMNQPDb7CbkrbRfENA0RhX7DeuSMOYwzhCi1MT
   M=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66121252
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:sq99GqlMKBdGOVg3WgGxUtXo5gxQJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xIdDziBM63eNmegKYxybY7kpktXupbSzodqQAc/q3gyFiMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiW1PV4
 7senuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYUwVxAIn9pc8hfT5XAR85LYt35rvdGC3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3oHZvwCufFf87aZvCX7/L9ZlT2zJYasVmQ6iHP
 ZNDNGAHgBLofhwVGnM0WJkCs8yjgUPlcRoBkF7OnP9ii4TU5FMoi+W8WDbPQfSPXcJVmk+Tp
 UrP+m3rBRdcONH34TmC9GiliqnQnCf4cIUIHba8+7hhh1j77nweDlgaWEW2pdG9i1WiQJRPJ
 koM4C0soKMuskuxQbHVXRe1vXqFtR40QMdLHqsx7wTl4qbT7gyUAkANSzdTb9pguMJebTkpy
 3eAmtr7AjopvLD9dJ6G3u7K93XoY3FTdDJcI39fJecY3zX9iJsx1izrf+tILICSgc/LXiHW8
 i6OthFr0t3/kvU3/6m8+FnGhRelqZ7IUhM5623rY4610u9qTNX7PtL1sDA3+d4Fdd/EFQfZ4
 BDojuDDtLhmMH2bqMCarAzh9pmN7u3NDjDTiEUH83IJp2X0oC7LkWy9DVhDyKZV3iQsJGeBj
 Kz741o5CHpv0J2CN/cfj2WZUZhC8EQYPY65Ps04l/IXCnSLSCeJ/Tt1eWmb1H33nU4nnMkXY
 MnHL5jzXStBUPQ6l1JaotvxN5dxnUjSIkuJGfjGI+mPi+LCNBZ5t59fWLdxUgzJxPzd+1iEm
 zquH8CL1w9eQIXDjtr/quYuwaQxBSFjX/je8pUPHsbae1YOMDxxWpf5nOJ6E6Q4zvs9qws91
 izkMqOu4AGk3iOvxMTjQi0LVY4Dqr4j9SJrZ3J9Zw30s5XhCK72hJoim1IMVeBP3MRozOJuT
 ulDfMOFA/9VTS/A9ShbZp74xLGOvjzw7e5SF0JJuAQCQqM=
IronPort-HdrOrdr: A9a23:BzpC9ao46gnv+wCOhccNNm0aV5oDeYIsimQD101hICG9E/bo9f
 xG+c5x6faaslsssR0b9exoQZPwOk80rKQFmbX5Xo3SPzUO2lHIEGgK1+KLqQEIfReQygc378
 ddmsZFZuEYQmIK6foSpDPIderJ/bG8gcWVbdi39QYVcelJA5sQiDtENg==
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="66121252"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=d0y1kIf8KBf57b2XpBZNhurOMT6fHV7ILmXJv2NegUjxBElUtGdp9GFF9MlBbhFUociMYMIg64eXP8h1gikOL3WPSJayrL38IAfltoqX6JnF7CIJnaAkjbqxsNeCNdYq34rG3drUrTeQnwK7HRfiqkg3MHCc26k3isVd8dMrNLZud5hj/TBQvni9uXz9IuRt722Du7ldgVk7DSuph5IJXGe/jEO267A9MA7jz+Mxd/ZVADsqVx6vwRwpEzlZDkjoxhktoCyZcbJBDUbD3ZgJXOq6uflC30sr3H6inWRw2KfdrG5C3ZKM7k80/25Ml2fOV1oXbtVuqXX0w3hmjESpOQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=xRh513p/AsQY5XbW32P7IOjnQoyPaNleodqK+9PVZwo=;
 b=Ap5GlqYCob1BXLn3X9WYu9tpUyOq/ZGQU6BFcMp+DuFyXE4oCHCFbL2H7Ci5iKUfZV9w/IAcwexDL6XqXkrFJzqWenkY/oJaBaNHg4G+idDCEgkQHxPjVopXVj6Pgpr57YZGzbMP9IxNSg+GoJYfRBDwMWHpt7UcSDpfKCfE/n7NBnLTkFZ8eZ7aP0hIVkvB8X5KgMqNzjdrZAjxir/BWw2WR+7rJfeXylKUmoWOgpfs+W5F9nEPDrbZauH2SX4U1XI0M8RrGeym8wLJtew6qyHlLjsBiU/GpdBnnAnhc79qGJH9sVyyFscTZiPiq/I886xMVO8VVKOxp6LlGg0egQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=xRh513p/AsQY5XbW32P7IOjnQoyPaNleodqK+9PVZwo=;
 b=BzaHv/2UPVBXuEsC2TedTiSQWtLJQE4pS5EGQhHPzO5H/hK5bRNfyzOuFJEUUp2OFqeMCN6OSH364D9kq9YTWkMrptGY/EesIoP6kA268f12yvT4CLSBiPLCGrMjbpFcgrFsHvvKFkzX8P9PbzCmBOyLFORZeFBadf6nz/UwWgs=
Date: Tue, 8 Mar 2022 17:15:33 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Bjoern Doebel <doebel@amazon.de>, Michael Kurth <mku@amazon.de>, "Martin
 Pohlack" <mpohlack@amazon.de>, Konrad Rzeszutek Wilk
	<konrad.wilk@oracle.com>, Ross Lagerwall <ross.lagerwall@citrix.com>,
	<xen-devel@lists.xenproject.org>
Subject: Re: [RFC PATCH v1] arch/x86: Livepatch: fix overflow check when
 computing ELF relocations
Message-ID: <YieBJTHJBiUUqMCU@Air-de-Roger>
References: <b74a68b038c31df4bb94a5b5e87453f5a249cfe2.1646753657.git.doebel@amazon.de>
 <c625d90c-ec0b-a2c3-cf93-08c99cc2f3ce@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <c625d90c-ec0b-a2c3-cf93-08c99cc2f3ce@suse.com>
X-ClientProxiedBy: LO3P123CA0004.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:ba::9) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 88e566ce-c608-411b-b586-08da011ee206
X-MS-TrafficTypeDiagnostic: PH0PR03MB5832:EE_
X-Microsoft-Antispam-PRVS: <PH0PR03MB583249174AC051A6831099288F099@PH0PR03MB5832.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(82960400001)(83380400001)(5660300002)(66946007)(4326008)(2906002)(8676002)(85182001)(8936002)(66556008)(66476007)(508600001)(316002)(33716001)(6486002)(966005)(6916009)(186003)(26005)(38100700002)(54906003)(6666004)(6512007)(6506007)(53546011)(9686003)(86362001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?dXVwU09UYTZWQThjWGRSQ0pWblFCekRBMk9NUjFxK2Nib2ZENzNwSXhWWW5M?=
 =?utf-8?B?MkdlZVNNa1I5WEZHbHByRkhVMUdzYVloMGkrZWZocjJoOFN6cFZDeHllb01H?=
 =?utf-8?B?Z2hjYkZVRk1McG94cHNidlF2dHRLMnIvR2xDdWtvOHFBV0NDMUFpRmVsVFpQ?=
 =?utf-8?B?d3JhSFZXRHEvNW9GUEpsdmhZckdkNmcvVnA5QjA5YXA2RjdGMGtsaURYUE90?=
 =?utf-8?B?a29KYU9GZ1JSRXRScG03dHZTdFk4bE9XUGhYQktodDRPcmQxcHJiU051VkZi?=
 =?utf-8?B?aTNwLzZiSFdtY3pIZm1KT3dvS21tMFBtZXRnc0FoUVV2d2hEUFlnWnduRkI3?=
 =?utf-8?B?bzVEREZVSEwvMFg1cHc0WVU3WW1JajZWZ1BvVzN3eG9RTDJUVXNiYzBRb1Zq?=
 =?utf-8?B?dFZjUmdsdnVPR0ltS1ZNamhSa1NkeFkzbytJMlorMXN1SnFVcmpVVGhJU052?=
 =?utf-8?B?TVFJKytCTTNyM0lUQm85UU1aQTdiUjRUQlFKTDFmYms4VGVEejlybitSU2RX?=
 =?utf-8?B?NXIxN3V6Uk10L1ZiSmtURy9kdmdPcVo4TzY3RTRZaVhrRVI1QVVjQmhIODRN?=
 =?utf-8?B?L01Ia3N0c21rTDZPYnM1Q24rVzhjb29lNXFvV25PSjAzU1FJZTNIb2xETFM2?=
 =?utf-8?B?UDBmMEs4ZVBSUkx5cUsyZkZieFZnMCt1em42K2xQV0paNGFMeE1iWlFEZGg0?=
 =?utf-8?B?MlU1UmJZNDc2NTdWdEE0cGVWOGFUczhNcExYNGUyQ1NZUDlUcFZjbzNJUzk5?=
 =?utf-8?B?blJBeXJKTHkvYTI3clg1Ym8wSEcxb2tueUlQZ3U4d3VVSVRLUnNVNjJsWnNx?=
 =?utf-8?B?dmpZRjRDdG8yVm9lV1plL0NyN1hma2FCOWZablNpSmlUaEMrSUw5T3RlMG5r?=
 =?utf-8?B?QWV6a042QmRLZ1p6WE9RMzEvNDA2QTFweUErdFJqUHMvRDBGOCtZU0lRTkpE?=
 =?utf-8?B?Slc0c2s2bGQyM1d6Z0Y2cUNLQ3VEdkZqUkdNNEpQN1B0cDQ2QkNka1ZZc3Fw?=
 =?utf-8?B?bnJtbnhsMCtMNXZNdXpBaUd6ek1Vb2FyRFMyb0FWOXJKMThLaXFHcEdpekNn?=
 =?utf-8?B?VllYbm1SVWlYT0VmVG13QzYvYTJ3WncyNG9JWnRLSEpnUlh5aHlOcHErclpl?=
 =?utf-8?B?Ui83bGp4Q3FWRFBMZjYrbjVsU2FPeUQvbHFHdXFrRWZKaGtsT2RJMTlWNUhI?=
 =?utf-8?B?MWZtaUZMdmtxQUV3YXdlNU5XWEhDNForZ2JkNnl3L3E4Q2gwLzR3Z1pKVXQ5?=
 =?utf-8?B?NkY1ckQ4SEd6V096cFhZbGliaExhRC9aZEdKOW52WEthQjlkQWtxNlVwNkNO?=
 =?utf-8?B?aGhSbEtBL0VyTXd6NjBDTnVvYWR6RkZVSkRrNURoS1pmS040TWtvellzR2Fs?=
 =?utf-8?B?NXBlK0tKK3NwbC9rMEtkWXllTzJXSHJQVmZBN21jMGtKd2wyZDRhZXBDcGpF?=
 =?utf-8?B?SCtlMC9uYnE2d2RJZFRaWVBLMVp6L09sY3dMOXRnN1FmTVNldTd5bGdqMGEy?=
 =?utf-8?B?S2tuV0ZyOTk3U0lNbnZqYTFFRG1GcEhGMWVPdzVOWURjbCtqQ1VBZ0N2dHli?=
 =?utf-8?B?UGFHVTFQb3V3eTNIY2IwUnpLbjgrT05mYVRBOXhWc1F2TExncEc0VnEzYlJn?=
 =?utf-8?B?VVdZMEJ1Y2FnTjJLTER4OS9DVXJXeXlLcUJHRW5Ndys3K2U4MHAyZ3NpTyty?=
 =?utf-8?B?dklMcnJuOFB5RGVlYnFjazIvZ29GRlVXTk1FNEZaNXRYa2pNajNKRDk5U05D?=
 =?utf-8?B?ODJicGZiZ3FyU3A4cHhuU0RiUjVzUE4vMitJd2FyRnFibW91eDF1TE1GM3FJ?=
 =?utf-8?B?bEZ4Z2k5b1VKTFNMdEhBak8wd1JNSy9qZ0dSRGx2cndpZzcvMTUyQmZ4WmIy?=
 =?utf-8?B?RUROVmV0ZHNRSEJPTTc1T2N3bjBFd2h6T2syeDU3UVlLczZzdWxENmFQVFRZ?=
 =?utf-8?B?WERxVTg0TFl0S3JvWTVRREpmTitHMmo0NkVWdDZCbC9Dajd5WWFBbDBLMDMx?=
 =?utf-8?B?NnVoTGU3NmYyNDhUMVZKZmVZeTdCQjFuRFljUGNDSE9xQm8wUnN5Tk5nVEI1?=
 =?utf-8?B?TzlHYSt0ZVpzS3dLSi9Bd1h3b3Jkd2hkWWc3cjQ5MDVwa244c1NVdUhiK2Fv?=
 =?utf-8?B?MThzZlNFYldpU2FyZlMwbyt3T1IxRStVbjBiRkJFQVUvQmRxekdQVk9NNTdW?=
 =?utf-8?Q?6i4XjIKpSrmCfXe88ushr0Y=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 88e566ce-c608-411b-b586-08da011ee206
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 16:15:38.1270
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: s9ye4X6ma0uSLYOkbqwXzcG53Y/dbZzfXaVFazkSEPCZNuK26Ddq5koSiR077/J8CjWJJ/zcmvkUQE7fA5bu7g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR03MB5832
X-OriginatorOrg: citrix.com

On Tue, Mar 08, 2022 at 04:45:34PM +0100, Jan Beulich wrote:
> On 08.03.2022 16:36, Bjoern Doebel wrote:
> > --- a/xen/arch/x86/livepatch.c
> > +++ b/xen/arch/x86/livepatch.c
> > @@ -339,7 +339,7 @@ int arch_livepatch_perform_rela(struct livepatch_elf *elf,
> >  
> >              val -= (uint64_t)dest;
> >              *(int32_t *)dest = val;
> 
> Afaict after this assignment ...
> 
> > -            if ( (int64_t)val != *(int32_t *)dest )
> > +            if ( (int32_t)val != *(int32_t *)dest )
> 
> ... this condition can never be false. The cast really wants to be
> to int64_t, and the overflow you saw being reported is quite likely
> for a different reason. But from the sole message you did quote
> it's not really possible to figure what else is wrong.

It seems Linux has that check ifdef'ed [0], but there's no reference
as to why it's that way (I've tracked it back to the x86-64 import on
the historical tree, f3081f5b66a06175ff2dabfe885a53fb04e71076).

It's a 64bit relocation using a 32bit value, but it's unclear to me
that modifying the top 32bits is not allowed/intended.

Regards, Roger.

[0] https://elixir.bootlin.com/linux/latest/source/arch/x86/kernel/module.c#L190


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 16:16:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 16:16:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287176.487038 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRcVh-0005ux-F6; Tue, 08 Mar 2022 16:16:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287176.487038; Tue, 08 Mar 2022 16:16:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRcVh-0005uq-BM; Tue, 08 Mar 2022 16:16:29 +0000
Received: by outflank-mailman (input) for mailman id 287176;
 Tue, 08 Mar 2022 16:16:28 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ibIM=TT=citrix.com=prvs=059cca470=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nRcVg-0005t9-OA
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 16:16:28 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 1a12332e-9efb-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 17:16:27 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1a12332e-9efb-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646756186;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=9BrTw2P807BlUNiaWeVrBK2zTf7ICJnk2VvsQOBaIP4=;
  b=aPXgjM9tlSoY3KQSuxNiaKfOdjZR4YlGrYotJf1LkO/WqyjgENJny3/v
   7erJQvtzaNOeY0CyPvOGJumH1GmpHYWNpHqGMPIIP6qqvyzXyBKPct7ae
   7nIpcpHy+g3zlV7Hi6gfE9Vli3JOFR+pnXcXsu5ZenRhmDil0XbMpmjFk
   o=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66121364
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:8PWc+6LMF4oiA4HLFE+RKZUlxSXFcZb7ZxGr2PjKsXjdYENShjxRm
 GVKXjqBOPzcZWTzetoiOt+2oBlQupDQz9M1GQJlqX01Q3x08seUXt7xwmUcns+xwm8vaGo9s
 q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUYYoAQgsA148IMsdoUg7wbRh2dY42YLR7z6l4
 rseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3fMldG0DQUIhMdtNWc
 s6YpF2PEsE1yD92Yj+tuu6TnkTn2dc+NyDW4pZdc/DKbhSvOkXee0v0XRYRQR4/ttmHozx+4
 NoWhLGoQCcbBazFiLwgVTd0ISZ3FJQTrdcrIVDn2SCS50jPcn+qyPRyFkAme4Yf/46bA0kXq
 6ZecmpUKEne2aTmm9pXScE17ignBOviOo5Zn3hkxDXQC/sOSpHfWaTao9Rf2V/cg+gQQ6+EP
 pFHNVKDajzPWUMTA1NKJqs4s9qkvUnucy98lW+a8P9fD2/7k1UqjemF3MDuUseRWcxfk0Kcp
 2TH12f0GBcXMJqY0zXt2nCxgu7CmwvrVYRUE6e3ntZUh1mUyn0WGQchf1KxqvmkiWazQ9tab
 UcT/0IGoaEs+WSxQ9L6Xhn+p2SL1jYDX/JAHut87xuCooLE7gDcCmUaQzppbN09qNRwVTEsz
 kWOnd7iGXpoqrL9YXCX+6qQrDiyETMINmJEbigBJSMH7MPku5oblQ/UQ5BoF6vdszHuMWium
 XbQ9nF43uhNy55Qv0mmwbzZqz33l7XRRy4H3QTeTjqY6C1VVomsTrX9vDA38s18BIqeS1CAu
 l0NlM6f8P0CAPmxqcCdfAkeNOr3vqjYaVUwlXYqRsB8rGr1pxZPaKgNuGkWGat/DioTldYFi
 mf3sBgZ2pJcNWDCgURfM9PoUJRCIUQN+L3YuhHogjhmP8AZmOyvpngGiausM4bFyhBEfUYXY
 8vzTCpUJSxGYZmLNRLvLwvn7Zclxzol2UTYTo3hwhKs3NK2PSDJF+laYAbVN7Bkt8toRTk5F
 f4FbKNmLD0FDIXDjtT/q9ZPfTjm01BhbXwJlyCnXrHaeVc3cI3QI/TQ3akga+RYc1d9zY/1E
 oWGchYAkjLX3CSfQS3TMywLQO6/DP5X8CNgVQRxbAnA5pTWSdv2hEvpX8BsJudPGS0K5aMcc
 sTpjO3cWqQfEGqWoW9BBXQ/xaQ7HCmWacu1F3PNSBA0foJ6RhyP/dnhfwD18zIJADbxvsw7y
 4BMHCuBKXbfb2yO1PrrVc8=
IronPort-HdrOrdr: A9a23:riy47KpLFigVerZwSI08NQYaV5rReYIsimQD101hICG9Evb0qy
 lhppQmPH7P+VIssRQb8+xoV5PufZqxz/BICOoqTNKftWvdyQiVxehZhOOP/9SJIUbDH4VmpM
 VdmsZFaeEZDTJB/LvHCAvTKadd/DFQmprY+ts3zB1WPH9Xg7kL1XYfNu4CeHcGPzWvA/ACZf
 yhz/sCnRWMU1INYP+2A3EUNtKz3eEixPrdEGc77wdM0nj3sQ+V
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="66121364"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=U0IgoaBIbmBo/DKfUtYXlbVo/AGO+QmFTCrTDImG5po9Y4h+ft6Lx5zwxGs3ULTHjbwhYwJ+uZ3XTlnpehq7eURK1qTzjM8LTAGe38zd3vmCADvxkPtwgbr2M6fDTO+C6EPr943BQBfFDq7thwPSi8/eL58J4fE9mq6B2g4sQ/J9s7UDaNfrDzyILEvVWcl+9iSSL+FUI789rVDmz/VORN7lIdgxyduGJ7rAqi846Ff85K7L9W404pFcYX1DASW9vh36mqUHSc5v9R85GIXw+J0QkRR21mamCMteJF9MdO8ptlnT6mytU8abvSdTQUTOgrPeFZSWw+p9lJ26BsApLA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=9BrTw2P807BlUNiaWeVrBK2zTf7ICJnk2VvsQOBaIP4=;
 b=YKVPh6tc2bYp3i9Irz+k8uWl5B/8eBm7ACaUgDZPRQ8xE784Qt5MfvQquCxllLLRpEtPEVNxAZePpgpCrbmpI+I6S3Nf+nb0AO3x2xTwG2/ZArTt3T+NJ6LLcEjMoHAe0wPBAfoBoaCUKkaVuj1czveoWID1uygOxe5zrLPu7l91VDC1cwCocFxCZDdyxlJDBoVrCiREYllBiy8qk6p3uS53Wx+3juKFJw/SRSrGcPwHePonmYbDuk5xIFhMgr3Xq9KhWO10UJ7YORzGVGW7/aUFMWGfhrdi6h9G4Z80lGllMO5FuBHVltZYz7UVTW9cz2fRC0DlMPRO1B58kTRW8g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=9BrTw2P807BlUNiaWeVrBK2zTf7ICJnk2VvsQOBaIP4=;
 b=XRJI1rNHw3priDFn/Ka6kF+Regixmm21X3QkgCRaqEW6MxtyWhmXo9CSS/IcVBX6OpBsN4UjyBMN7CdFFbRq+PcL5zI498LfoyJGgTEjbjcuL2DoR4TMvI+IbeYuzOj+5VZMkzYdjMivZmZvxwhWpDo9cHLgObQnvAMIF1X/RIc=
From: Jane Malalane <Jane.Malalane@citrix.com>
To: Roger Pau Monne <roger.pau@citrix.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, "Anthony
 Perard" <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, "Andrew
 Cooper" <Andrew.Cooper3@citrix.com>, George Dunlap
	<George.Dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien Grall
	<julien@xen.org>, "Stefano Stabellini" <sstabellini@kernel.org>, Christian
 Lindig <christian.lindig@citrix.com>, David Scott <dave@recoil.org>,
	"Volodymyr Babchuk" <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH v5 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Thread-Topic: [PATCH v5 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Thread-Index: AQHYMjUEaMoAwzVpzE69n4F8Ciyydqy1XcmAgABEiACAAAUagIAAA9uA
Date: Tue, 8 Mar 2022 16:16:21 +0000
Message-ID: <07334c85-92af-4986-d8a0-7b61f785c22d@citrix.com>
References: <20220307150609.10662-1-jane.malalane@citrix.com>
 <20220307150609.10662-3-jane.malalane@citrix.com>
 <YidAU63TsVO/X1Q+@Air-de-Roger>
 <c20a3e9f-770c-3d2a-a332-ce836a4192da@citrix.com>
 <Yid+F5LdtMhs01tM@Air-de-Roger>
In-Reply-To: <Yid+F5LdtMhs01tM@Air-de-Roger>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 41248063-a34d-42f7-c621-08da011efc28
x-ms-traffictypediagnostic: BN8PR03MB4596:EE_
x-microsoft-antispam-prvs: <BN8PR03MB45966049C18DA5F20473050381099@BN8PR03MB4596.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM5PR03MB3386.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(508600001)(6636002)(26005)(2616005)(37006003)(186003)(31696002)(6486002)(55236004)(6512007)(6506007)(71200400001)(54906003)(38070700005)(122000001)(86362001)(53546011)(38100700002)(83380400001)(316002)(82960400001)(36756003)(2906002)(66946007)(76116006)(91956017)(66556008)(4326008)(66446008)(8936002)(8676002)(64756008)(66476007)(6862004)(5660300002)(31686004)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?ekRDK0YwTXUrM2IxczhUQjUyQ25IcUlZSDQvcmdYMkV1MWFodVZCYVJ4aGdE?=
 =?utf-8?B?NUFPTnMyYks3WUFLc3ZzMW5mL1Z0UnVxUDVvMzBZRjQreUJOcllYeE9waTdP?=
 =?utf-8?B?U1QvcjlCdzVKMTI2NkVWR3IweGJxcnVrUVpVUENqdEF5enpQd3ZoSElIak9P?=
 =?utf-8?B?Um9WTzVISEc0WlFtaVV4bElKVUdVRVJOSll5bjVYeVN2L2dCekNQWnVzZHlM?=
 =?utf-8?B?bjlUYmdUR1RFNENLK0VJcHRHL3FVU1hHd3hGNVFoeFJMODk1bHQyNlF6NERF?=
 =?utf-8?B?eUk3bUxZaWhZYjlCVVNXbzNhckFjN3VkQmM4ek9WSTVKS3JNRGZ0L0RrSitO?=
 =?utf-8?B?MDNFRFZybGtrMi9uaWR2bi9Dd0VDcURPSis0TXc2YW9zVmN2ZjEwR1ArMTVz?=
 =?utf-8?B?WFVPTTFLUlBFR09XbDAxSGROVFY1Nmdlc1IzTHZTVzNKVHE4ZHhhVlZtZW05?=
 =?utf-8?B?UFRXNkFIOFEzMk5rRm0vS3JxclduVzlORXlFenM5WWQvZUMzQTNxT1hRUlhm?=
 =?utf-8?B?VUZyNzdzcHdGbXhKUW9vODU3NUtQR3RacXVGSjR6bWpsYjFXYTllU205ZFBp?=
 =?utf-8?B?d0J6SVVRNnpGNDY4Qzk4Mit0RmU5RktkRFZGYldCaDBvY2ZEQXhSTDZqYUFN?=
 =?utf-8?B?cThrTHRqb01aRElqTkw2VVY5US82R2x4aTdQaS9helJBT0IvYjV4bTNpNGpB?=
 =?utf-8?B?RDNhWWJUQStiSzh0Q2E3dWVsOTVvaWJlcXd0VjhLNjBoaXBubDVqbTNPZXdu?=
 =?utf-8?B?bExhMjhOTWhGbVhNK3FpUVlkT0tISm5tVmtQcWxNR3BQZmJPRnZ4aVdGbXAw?=
 =?utf-8?B?UjZXZkt6bkdNNmkyV2s5NzFUYlk0SHE3dlptd0NqaUtDbktuWHVpYWNvR3h4?=
 =?utf-8?B?akZXZFZXeGJhcUR0TnFhM2ZneUZJUnlOdTRYeVZWRFJTdjlBVlNoN0xEV3g3?=
 =?utf-8?B?eklXZFAzekZUSjZlODBtMnl2eHNrbVQzODQ2K0VqVUo2M3EzUlRjWWovN2VT?=
 =?utf-8?B?U3k3R2pmcUQ2QkNYV1diWEphazhhMlBKQ0R4M091T2JyN2ZnazZwSFFrYUYw?=
 =?utf-8?B?NTYxTzJIQmtvUGhXOU11cDFGMktQR0pzdk1makMxNitWbm8yNSswcWliU0hI?=
 =?utf-8?B?aStlNmxBYVlSN3RpNjBWZG5nVXJEelNidmt5OEhZdGZCSExzd1V3SnJSb3Nj?=
 =?utf-8?B?dTRQQjRRK05PSmU4ZldCbjQ4YXVXMmxlY2NoVHVDM292dDRpLzR0OGpwZHFy?=
 =?utf-8?B?MEMvWWlISDhKbkcreTVZY1ZlNjhnUEV6c2k3bzBtemtxWXVvYU4yOVRWWkZR?=
 =?utf-8?B?akJKbDRzTG43aHFrdDY3c3dLV3czMVJtVm1OZWNycDZrWDZaSG4yKzdPa3kr?=
 =?utf-8?B?WW16NUR5TkQwNzZMbFlTbURsRmxyT1Q1SVNWYXVSQlc0UjUvVFFwWnhTcndv?=
 =?utf-8?B?aHZRT29IdzFReW80NlA4bE9QZ0J4QU1PUkxNTWg4SU5aTFgzWmdQNTc3NEFS?=
 =?utf-8?B?OEdaN3JxTTRhTWxoNFZOeWpFc3M3aEpnaVZIM1FCeEdpWkdtM1MzWmNQUlhh?=
 =?utf-8?B?NzExYm5KSmZ4dy9PaVZYM2VsS1JDbkVmVkYxNlZ0OGQxZnh4Q1p6c3Nlemg0?=
 =?utf-8?B?TzBrM1p6MElGbXErRTR1N3UwSWMzRENNTktuaGpYdTB0UGRrSFZHenB0OXJU?=
 =?utf-8?B?TWtaK1oxL3p4ck03UmJTUDd5dEExZmJ1eVZhWDkwUlh2YVlLSVVzT3Y0dVVR?=
 =?utf-8?B?Q3g4MmduVkVRbHRHVzAxSUVhektSdXY0S3pUakMvVkN1U01FQlFLM285UEEw?=
 =?utf-8?B?dG1nRDNXMUJZZXhaYTZkSzZIOXdlTktnTkF0cHNMNmoxMU11YjJuL29QZFM4?=
 =?utf-8?B?YnZURWNCQzRYZnBFeGorb1NrZUdUSS80bjZ0M2NSNUlnVGpwdWVlTEN0NlhN?=
 =?utf-8?B?WDhqdURrOHJqN09VNWIzeGE0M3MxOTZTYkJCZ21oNDU5SVAyV3h2RmM2L0pq?=
 =?utf-8?B?MHNkb0xtalZveWMzTzFNbUFiV3BTNjNndytUbXJJWUN1eDZvbHFrTE5TdkJJ?=
 =?utf-8?B?ZVc2ejVRVzgxa1l4MG9CMUhOMkVPTGhjckRyWTZTUjVob2ExY01vUklpVENY?=
 =?utf-8?B?RXJ2STVKU2s5Y2FzNGR6OFg2T05JMGYyaTh5L05Fa3hTN2R0NFpVMXdaSmpi?=
 =?utf-8?B?M2J4SUM3K21ZbFJ4ZC9kOEJIeHJ1QXBDWGdjVnkvZHMvdnYwOU1Fb2xiMHZH?=
 =?utf-8?Q?fEmZJqrBuqg1BpPCq/xUqaIwo0hoNAjo+RfGolGJGI=3D?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <D35FC727C236C24DBE31626773662C0B@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM5PR03MB3386.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 41248063-a34d-42f7-c621-08da011efc28
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Mar 2022 16:16:21.5961
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: k4puqCdLjbKNq3lkcq29T74HwnK2nFLO/rmv7GuANTEUDIsB86mccRLRLugKIJpelfNRXoy1X0cI/H1NTGVpblcuYfBXuenPaoOHDou8f3Q=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN8PR03MB4596
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Tue Mar 08 16:22:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 16:22:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287185.487049 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRcbP-0007Rj-4I; Tue, 08 Mar 2022 16:22:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287185.487049; Tue, 08 Mar 2022 16:22:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRcbO-0007Rc-WC; Tue, 08 Mar 2022 16:22:23 +0000
Received: by outflank-mailman (input) for mailman id 287185;
 Tue, 08 Mar 2022 16:22:21 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LykH=TT=citrix.com=prvs=059d7c239=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nRcbN-0007RV-Jw
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 16:22:21 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ebf4e2db-9efb-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 17:22:19 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ebf4e2db-9efb-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646756539;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=2tOxA7101Hx6xpBYG1rG8rx/WHUgXWK1sWB7SXyUwXc=;
  b=G7c3oXc3hetCl+Sv7/Rd0nI3OExAHvZeC4tSFyj/SFKb64VmHN/v9li0
   BuvldRnHF/MoxHD6mZt1E7l7+QPhYk4VD+xYXhAgVH91Y9o42nu3PbPEH
   nzdNrktN7HCAfHGzYpQn8F9sUTfzvVHsP7EP+KgZsb69boebHjiOxLIqs
   Y=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65721001
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:gJNeH61Lf6XWYXzp4PbD5fpxkn2cJEfYwER7XKvMYLTBsI5bpzAOm
 mcZUGqDOvyJZGr8Kop0bYjj9UoOvcTTx4c1GQU/pC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUw0YDja++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /1vj66SSlc0EpfolcEyfitaGi9mOfRZreqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHCOo8Ft24m5jbeFfs8GrjIQrnQ5M8e1zA17ixLNaiDO
 JBAMWI2BPjGSxNeGlsFGLs6peb2pkP6dH5FiGqShbVitgA/yyQuieOwYbI5YOeiSdtPl0yVo
 krN9mLlCxtcMtGDoRKV/3TpiuLRkCfTXIMJCKb+5vNsmEeUxGEYFFsRT1TTifuzh1O6WtlfA
 1cJ4Sdopq83nGS0SvHtUhv+p2SL1iPwQPIJTbd8slvUjPOJvUDJXQDoUwKtdvQEjv0URmw3+
 mWtkvbGKA5tubONTSuCo+L8QSyJBQAZKmoLZCkhRAQD4sX+rIxbsi8jXuqPA4bu0ISrRGiYL
 ySi6XFn2u5N1ZJjO7CToAif6w9AsKQlWeLcCu//emu+pj10a4e+D2BDwQiKtK0QRGp1o7Tog
 ZTlpyR8xL1WZX1uvHbUKAnoIF1Pz6zdWNE7qQQzd6TNDxz3pxaekXl4uVmS3ntBPMceYiPOa
 0TOow5X75I7FCL0MfEpPNLsUJ16kPOI+THZuhb8NIEmjn9ZLlPvwc2TTRTIgzCFfLYEy8nTx
 qt3ge7zVC1HWMyLPRK9RvsH0K9D+8zN7Ti7eHwP9Dz+ieD2TCfMEd8taQLSBshkvPLsiFiEq
 L53aprVoyizpcWjO0E7B6ZIdgtURZX6bLirw/FqmhmrflI2SDt/WqWKndvMueVNxsxoqwsBx
 VnkMmdww1vjn3zXbwKMb3FocrT0Wphj63k8OEQR0ZyAhxDPva7HAH8jSqYK
IronPort-HdrOrdr: A9a23:UbPPAKtNdk8YsWkADPYqMlbC7skC2IMji2hC6mlwRA09TyXGra
 +TdaUguSMc1gx9ZJh5o6H8BEGBKUmskKKceeEqTPiftXrdyReVxeZZnMXfKlzbamHDH4tmu5
 uIHJIOceEYYWIK7voSpTPIaerIo+P3sZxA592ut0uFJDsCA8oLjmdE40SgYzZLrWF9dMEE/f
 Gnl656Tk+bCBIqh7OAdx44tob41r/2vaOjRSRDKw8s6QGIgz/twqX9CQKk0hAXVC4K6as+8E
 De+jaJppmLgrWe8FvxxmXT55NZlJ/K0d1YHvGBjcATN3HFlhuoXoJ8QLeP1QpF491HqWxa0u
 UkkS1Qe/ib2EmhOV1dZiGdnTUI5QxerkMKD2Xo2EcL7/aJHA7SQPAx+r6xOiGplXbI+usMip
 6jlljpx6a+R3n77VXAzsmNWBdwmkWup30+1eYVknxESIMbLKRctIoF4SpuYdw99Q/Bmcka+d
 NVfYnhDTdtACenRmGcunMqzM2nX3w1EBvDSk8eutaN2zwTmHxi1UMXyMEWg39FrfsGOtR5zv
 WBNr4tmKBFT8cQY644DOAdQdGvAmiIRR7XKmqdLVnuCalCMXPQrJz85qkz+YiRCdY15Yp3nI
 6EXEJTtGY0dU6rAcqS3IdT+hSIW2m5VSSF8LAp23G4gMyKeFPGC1zwdLl1qbrSnxw2OLyvZ8
 qO
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="65721001"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=amE+oeYp+iuYqAEyVK7Z0LQ6ToAhmwvnNDes6iiTetEZIy5QKB6oZw2ebT+hfd/oDHZCvwrWvQxXzIZzOiDITNU/QborsnWUqlUuMmMIggZpOHhoPoylKWbtb+eHAnrvaGNck+WR/5iXn2iNOnLQnOCPUHwSv4LzPZiyLc4kAPZPOSAuSTBeV02J77vBRaYWcuhClmq/c7W2rAqSRzTNt0TMi1XFrWmzRCQ48cyJNgsSOcEG43pZNBRdb4wm0r5Pc51QZR9Rrjgil4VhbuHFE0G6shyU14tGy+wLMCSSHh9U2/WwqI9tniLvLQFdpiwnEMPEyvwenio8anhk5pW0Pw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=2tOxA7101Hx6xpBYG1rG8rx/WHUgXWK1sWB7SXyUwXc=;
 b=eBY3UF+/vTAjjUL0x7+bUZUzhemaIaIv/0zTETSc/rjH71R/LGlRjCOxA6BhW+/feuBp0LiWe+kCzTwaeOKo1Mu2UQezvJWtVNw53alu4DmpTTfNsRzG3juaUG4DoGN6klt3PwW5FfLDtyPri22uq8TgVDXJv7rX5nCjD7+EIpsocOvFsVWmqU4AY7jaclu+8d2NwB62/ikGkdjgVjd+zld6yUTq9rsEl9tIRgTAYjeEL33MvelJ/6vJLWfG87MzanIc++/sYtykV1zF1WoqHS5LtHNQ9V4mpspsJNRnvmsW9gualOJgspL66Ff6NCJ6BdjfWxDllp/twVyhikoYpA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=2tOxA7101Hx6xpBYG1rG8rx/WHUgXWK1sWB7SXyUwXc=;
 b=cJgAXXs+P5JYp73ekyjeIUYA0AqgFoNAjERCIGQLJJe4PQV20/PbY5eHC2eZjem8BTYbIwxzFe6cemH89ShcRRKEZDwPzicB+r1K8pPQmLDqtxWkWHoENLiWkhI/K2hn2GB5V8knhtY3VWsVMM7UdrsaQNzFHPApg1jktYDhH00=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>, David Vrabel
	<dvrabel@cantab.net>, Xen-devel <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH] x86/kexec: Fix kexec-reboot with CET active
Thread-Topic: [PATCH] x86/kexec: Fix kexec-reboot with CET active
Thread-Index: AQHYMmV+YpEym/vCiE+yJp1ocNsJiqy1JJaAgACH8wA=
Date: Tue, 8 Mar 2022 16:22:12 +0000
Message-ID: <d6112602-b488-0b63-0131-fedd39c05eae@citrix.com>
References: <20220307205313.31247-1-andrew.cooper3@citrix.com>
 <c3d9a1db-bda0-22f4-6733-11dfbb1bebfb@suse.com>
In-Reply-To: <c3d9a1db-bda0-22f4-6733-11dfbb1bebfb@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 4654875b-caf8-4133-d558-08da011fcd5c
x-ms-traffictypediagnostic: BN6PR03MB3217:EE_
x-microsoft-antispam-prvs: <BN6PR03MB3217054EC561D1E8814122D2BA099@BN6PR03MB3217.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: ncobkshmJRX5xsR7Gg9YxhWXh/eEhep1ZqBKViNMl+3hPy5wG8F9dp8lkVgX1TAyiKxdcXx82lq3angv5smYV7/6aAAQWt07MmuqHfvSIRZqLLeCXa8ha5/JX/QPbJeomxl7pdVGdM5oHmjuBYYBxRm8qDEJLky634YZSKZwhSbi6biRu0jxD6BU9h/BT1sfWM+h8pvNF2v0kABtpWWGKjZPe45OqrfIgattDQt/sao/017f0S6Tls80lDIGvxIRDNK3VkHar19wryWlPL2sqvQSAIdNTj5pI9EP0d63mlKEoeKAObRQu9PVL2r9eeizZ7qkN9crW5BPLlmm2P6YXhZmCQhEpw8OjkObyHZ4kHCN/2QJnuV2y7WCrr9XbKNjenx1yfIl7J3WdwaD+gdVj0QmqplGaUm3spfs2jHNQkRZLN3jVmhhZzGNpTElb74ggvvk/BXm2A7KSYgWvK+4040NCYVqqdOIDDtMQtvYfUG2XWr9sxO4KrOei9PHQxKxfRBfr+XrBQPegXaEJ7JXyp5b/mOqe/njGU1jPpyOpeI2laUDXlG70FlgoDFToxo87C3j3IwFal4U9NFH2iwvXOEmVV0yubpN+BemY3zB3rITfYPoXmYiU6w4BeBDgvpeRXCkQCNE97054iocrS1kPMCQ9byMWLp3ac/yNOTQWblWXHFyAMrmkr0UyAPR6ydLeuTGt7Grwv/bzqGwZdYlks5bHMxy6L9MdUbqiVR0zSKPfizevGh33utB7uk6dZLyEbywiBWZwOPw7E5il9FzEg==
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(91956017)(6916009)(66556008)(71200400001)(186003)(6486002)(8676002)(66476007)(66946007)(66446008)(4326008)(54906003)(316002)(508600001)(83380400001)(36756003)(6512007)(5660300002)(38100700002)(2906002)(76116006)(2616005)(26005)(8936002)(53546011)(6506007)(122000001)(82960400001)(38070700005)(31696002)(86362001)(31686004)(64756008)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?QXNRSnNFQ1NHckkwazBHK3RBYy9Eby9yT3VQcC9ZcHd2YTcvR1BuQzFHdjF6?=
 =?utf-8?B?Uys5eXNLSVdMWThFL3FYakQwVGZQNk9JOHNxWHlZL3F2dldsc2JWSVIyOUJC?=
 =?utf-8?B?d3hxbjQxa0gxaHQvMG51SGY4YkRqRXhvVGFRRUJ5OGVtVnliQ1FIcGZYZm5B?=
 =?utf-8?B?YnVmS3FpcUpxVTB6aFgvWTl5L2FoUHVLam5kdzJXOTJxdFkzQUJlaTJvSFJv?=
 =?utf-8?B?WFh4bXpQcWxjT1k2YVRTVTd1TmlKUzdaSGMxOWk4NmlLZUVWQkVSWFNGc1o2?=
 =?utf-8?B?SUJMMUFwWVRYU1RkQnhvdGU3cFdJdFg4QkNQYVpjSzI5WFUwSGtrRWZZTEdG?=
 =?utf-8?B?bEtNR3ZBc0lENEwxaFVWdXdFSGZlTExNU3dQQnc3ZEtob21qVWlhMFovQ2hS?=
 =?utf-8?B?eWdxREJzdXNuQURtSTJ3b3pYdWhXcksrTldhRkZ1M1FHRXlqMUsrZXZIdzZ2?=
 =?utf-8?B?U0MxcmRRaTVYSzJGMkxVeTRrVGpUaVBNSlFVU0ZJZ2U0Z3JkSTJhNHpsUnpE?=
 =?utf-8?B?TlpRZCtDQzFOcjV6NVhHTmgrOElGOTVjZ21OeDhXcTltR3ArU3JOT21LMDVx?=
 =?utf-8?B?RkVSeHVWL1FYOW5SanBZSWI5MFpvaWswTkcvc2RpdmpxNlowODdPTHhiUU9Q?=
 =?utf-8?B?QWkzWTZyMzIxNEM2TFVQcHJVN3dZWWphbjUvcFJERFAyMmQ1UjVCSWkwTVk5?=
 =?utf-8?B?dk9aV2xXaCtZMGdhNzAzTnJTRHJOLzBDeEdtc3FLVEZ2cWFmZ1cyQ0tDQncy?=
 =?utf-8?B?Uk5Bbmc5QkhJcjcwY2FyMGlneVBjTXptWDVGUi8zdUloU0ZSOGxKZ3lkdlVh?=
 =?utf-8?B?NVA1bi90THMyeWNLbFlKV2hXbUtINnpDSXZVOG4yV1g3SkRwUTNYZGplSWw1?=
 =?utf-8?B?UUVmZ0k0dGExVUdJYWNJWWcvM1BQOEYwUW5scTFyZ3AyRmZqKzdJcjRPMldN?=
 =?utf-8?B?em13aERKQ0o4Rm5wU1g4WlBjWGdZQ1B0aEdVZ2NzWGpqU2VkNUZQNklZbzk0?=
 =?utf-8?B?b2tOMExtcmRKQzU5aWpVZm8vUkJXcUxkR3hqRFc1eE1uK054ZmxEZ24vUFF0?=
 =?utf-8?B?OE44SFVnUjFOdUFVSngwalNQaHZlZ2tCSlZWMWQ0KzFoUVVVaU5mbGdsU0c3?=
 =?utf-8?B?UDJCYkFUak1acTlyREk0VWVPaGR2YU1DTmQvK2RUTGZZSk1Od2RYd1hYd1RM?=
 =?utf-8?B?QXREekpiWHE3UUJDUThxcjdMR0pjeW1IV3NyVTR6dG1JSXY0cFlSOS9Qa2Zm?=
 =?utf-8?B?dHhjNXRCMkpjd2hmOTN2cUZyTFFmczg4VmtCNFNXRlNTMFdLbnM2Rjl2S2Jt?=
 =?utf-8?B?c1I3bUVFcTk0L0RQZXl0YmtGWnZjanBxMG5oTmN1Z0pUWXdUbjc4TmdYYVQr?=
 =?utf-8?B?OVZPeDBnSkMxS2lrZ1p4Y0ZOc0J6U042QlRYMnRqVS94MWIxVUJKWmxmMjEz?=
 =?utf-8?B?eE9DZi9Bc2lRbXF3RjBZUXpUTFIyT1RCSk9mcXEyRWpXUVBmQjJva1U3ZHRx?=
 =?utf-8?B?azBUS0VxUndSS1pJSlJ1eFhaOEQrbHl2b09QcnlZbFUwd21COTMxa2NMUVh6?=
 =?utf-8?B?cldEVVhqTzExR21hVmlzVnM1Z05GaStrMWFSdEV1NjNVbkhRSTVxdHNFN04v?=
 =?utf-8?B?ODZ3WEFsc01Faytnd1Nya1dFekNoYzAySzNITjZPcUlDV0lMcXZnUWdFN1h3?=
 =?utf-8?B?NGhNd0dyQTk1cndtQzRoS2Y1amdTU3AwbGF1Uk1WV2VuR2ZyamlBc2RXY043?=
 =?utf-8?B?YzJCOG1HRXhzaTNaYmYvL0tPLzlVa28xNkJ5a2RiWkdnVEtqMTZlbjFBUFcx?=
 =?utf-8?B?VkYyUCtSRlFIU3BhdE1TN3B6anNNYk52eUd4akpzZllCVUd4RUllbHdlR0dr?=
 =?utf-8?B?RG5DR0FoTFZzVmVPYktFMVJrYjVnSUZGZlA3dG1IQ3NxU1ZNVWd2TWJkYjRD?=
 =?utf-8?B?NTQrZEVvTHJNNFMyMjdRWWRQMTZoZENPODRCSXFtRlNZQjdDSU5RK1FoYllq?=
 =?utf-8?B?NzlZa3Z4bVJUYmpJV3U5YWVIei9BSHprWG9Id0FWWWpxNFhLMmwwR2lRSkZn?=
 =?utf-8?B?bGdFaTZOR3JuMFFFckNobjNRTUVaNGo2ZWFnU2FlTmIyTGg3RHZmYy9PMSsv?=
 =?utf-8?B?MlRCbUVZVHRqYk8za3V2OERqME1TMXJIVnVGQm9Cd01kZjBMS2tOSTVHN0w4?=
 =?utf-8?B?dTZGa2VkMk1WZWMydkx3b3FvYTZFVnora2dKeU1MZlk3RUkreTJnYk9aU2Ri?=
 =?utf-8?B?NjJ0VGs3VDRIa1dDWkhJamY5aWZnPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <34FDFC36343EDD4887D2FBE0EC38C39E@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4654875b-caf8-4133-d558-08da011fcd5c
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Mar 2022 16:22:12.6434
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: FnLBzjKTIQy/dgHj+9IvDEhXquoDUykhYYdk4g84uYjo8dou9EVx8LVSiKWJtBhgWM46RoXhutZ0SHPJUtfdUZW7LH3VQq2VQrjjqtdAOVI=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR03MB3217
X-OriginatorOrg: citrix.com
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==


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 16:22:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 16:22:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287189.487060 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRcbo-0007zJ-Ex; Tue, 08 Mar 2022 16:22:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287189.487060; Tue, 08 Mar 2022 16:22:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRcbo-0007zC-BZ; Tue, 08 Mar 2022 16:22:48 +0000
Received: by outflank-mailman (input) for mailman id 287189;
 Tue, 08 Mar 2022 16:22:47 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fWwI=TT=citrix.com=prvs=059ab6e88=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRcbn-0007RV-2j
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 16:22:47 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id fbe5bb33-9efb-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 17:22:45 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fbe5bb33-9efb-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646756565;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=giRuNGlKMOFTyDSq4Rhj3syknhVT76PqgokL9W1J+F0=;
  b=Iew09La2T64WvbfOUvL2SRNxyqe1dBj2kWKU+BjUWvrCrIMZ/I9fGh97
   gSBcvqjDi2yjuV7Jb0BO6ESUR/qRBFjM1aq2cOHMYCzQZu5PSMPaJKf31
   laWuwdQP3TdGqofpYkwVg8/W7OCel/CpwEtABdU55wEZSmRcRQfUiEpDc
   M=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65201145
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:fePWpqhC69+/MUDOLpUb9QtiX161nBAKZh0ujC45NGQN5FlHY01je
 htvWz+OOvyPZTH3L4h1at6w9xgC75SHmIM3TFZv+StjQSob9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFvd4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YSUjZ/XeurwQakJVKTFaBJFi3Jn4P0Hq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bkmtnwjzDS+4vXLjIQrnQ5M8e1zA17ixLNaiDP
 ZJAMGYyBPjGSy9CNXMLGpkipceLn1LPfSd0hGO2+oNitgA/yyQuieOwYbI5YOeiXt5Jl0yVo
 mbH+WXRARwAMtGbjz2f/RqEhPLLnC79cJIfEvu/7PECqGOUwmsfGRgHT2yRqPOyilO9c99HI
 klS8S0rxYA+/VKmZsPwVBq5pDiDpBF0c8VUO/037keK0KW8yxaUAC0IQyBMbPQitdQqXno62
 1mRhdTrCDdz9rqPRhq19L2ZsDezMig9NnIZaGkPSg5ty9vsuoYolTrUU81uVqWyi7XI9SrYm
 m7Q6nJk3vNK0JBNh/7TEU37byyEhJKQFhwXvgjuBW+f/idAWKqBQbO20A2OhRpfF7qxQl6Et
 XkCvsGR6uESEJ2A/BCwrPUx8KKBvKjcbmCF6bJ7N9x4rmn2pSb/FWxFyGwmfC9U3tA4lSgFi
 aM5kSdY/9dtMXSjdsebiKrhWp1xncAM+TkIP804j+aigLAsLGdrHwk0PCZ8OlwBdmB2ycnT3
 r/BLa6R4Y4yU/gP8dZPb751PUUX7i4/33jPYpvw0g6q17GTDFbMF+tbbgTeM7tgvP7fyOkwz
 zq5H5HRo/m4eLeiChQ7DKZJdQxaRZTFLcqeRzNrmh6rfVM9RTBJ5w75yrI9YY1195m5Zc+Tl
 kxRrnRwkQKl7VWecF3iQik6NNvHAMYuxVpmbHdEFQv5hBAejXOHsf53m20fJuJ8qoSODJdcE
 pE4Ril3KqgXGmSdpWVHNsWVQU4LXE3DuD9i9hGNOVAXV5VhWxbI6pnjeA7u/zMJFS25qY01p
 LjI6+8RacBrq9hKZCoOVM+S8g==
IronPort-HdrOrdr: A9a23:7ZdYgKpYPv/6+C3NnggrmGkaV5vJL9V00zEX/kB9WHVpm5Oj+P
 xGzc526farslsssREb+OxpOMG7MBThHLpOkPMs1NCZLXTbUQqTXfpfBO7ZrQEIdBeOlNK1uZ
 0QFpSWTeeAcWSS7vyKkTVQcexQueVvmZrA7Yy1rwYPcegpUdAZ0+4QMHfkLqQcfnghOXNWLu
 v52iIRzADQBkj/I/7LTkUtbqzmnZnmhZjmaRkJC1oO7xSPtyqh7PrfHwKD1hkTfjtTyfN6mF
 K12TDR1+GGibWW2xXc32jc49B/n8bg8MJKAIiphtIOIjvhpw60bMBKWqGEvhoyvOazgWxa2+
 XkklMFBYBe+nnRdma6rV/E3BTh6i8n7zvYxVqRkRLY0LvEbQN/L/AEqZNScxPf5UZllsp7yr
 h302WQsIcSJQ/cnQzmjuK4GC1Cpw6Rmz4PgOQTh3tQXc81c7lKt7ES+0tTDdMpAD/60oY6C+
 NjZfusqMq+SWnqLkwxg1MfgOBFBh8Ib1S7qwk5y4GoOgFt7T5EJxBy/r1cop8CnKhNP6Wsqd
 60d5iAr4s+PfP+XZgNdNvpfvHHeFAlYSi8Rl56cm6XXZ3uBRr22uvKCfMOlaWXRKA=
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="65201145"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=GBSnIszL6TeG6MzsilOqWKq7yE/e6fpou60SfEzEIbgSQe4oU7m2l9Jd73dBxTbp+pJngxa2yDlfjMP6Rpr7nC7O0jul6mWjkwxFAw+y7J5azCBCoieYWf12FMuzhZYa/Z3cNdypEZp+kuzrnO94nwF/IzQt9HBOyJdlKx4AXAiTX7ULH8UtwkjilXhMPlIWsgqd2G/p80friPfyzvet8FwOhJBRZ5WVyQ2XcN+sMbh2DjzLH3xrzNvxYFAPrBX2AFOhI5BBnLIyw2T09k0JPPk6FjhOcRxWHm0hKg0g6ECmUtryT7nK1gYsQc4ZyhdjAZyUYrA6whaq1NJexPrQ9w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=sSfz3JrLBHR4TCcvnQS5kyjyxRvABmDE0EWhL3JGJxY=;
 b=ZHrFj9ZYznHVDMZrXQbo798LdN3wgW/48FFhHVZev9rBut96oXCYJqnW9swN7G352NHPd63kYzYI1DMxDIDn32vk0YdUXq7ds4wKm33MIs99P3V14BTx157Q9glnxc4SGW3hT8fCA1aSX+5LAHVSXpRLg31BLyyMIcY873nSLUueP5qUNSmv5dehSrQhitm6onVw/VYVs9Qm6r7CGlffcWLZZIoLkwIkryKmPiAFi07myIYDE17PWdZeVJjSi70M/RPa5BS6wYaHV6T5FrbDYpOjM1j/u1WjDqP2tGFGf3KuwxcK6Ul/UHx2z/Bs8nCV9Db32kTIcmF/R3lHgMMPBA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=sSfz3JrLBHR4TCcvnQS5kyjyxRvABmDE0EWhL3JGJxY=;
 b=YfOd6HJ0zu51LU8Wq3xN6YOa50rbDoZjvMSKE8ADk/onHweU8EdNTldDiHHBcSMxyke0sRBFO38tcQ/UMkYym/Yf/DtP3nUo2Zkj/uuQzmZCzVi6WjLsaTUUPo45OC7YWegINTTGOPthy9J7HzN46jS0uuVUKpbuvk0vIu9x+1w=
Date: Tue, 8 Mar 2022 17:22:36 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jane Malalane <Jane.Malalane@citrix.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, Anthony
 Perard <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, Andrew
 Cooper <Andrew.Cooper3@citrix.com>, George Dunlap <George.Dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>, Julien Grall <julien@xen.org>, Stefano
 Stabellini <sstabellini@kernel.org>, Christian Lindig
	<christian.lindig@citrix.com>, David Scott <dave@recoil.org>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH v5 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Message-ID: <YieCzN163roN8EcB@Air-de-Roger>
References: <20220307150609.10662-1-jane.malalane@citrix.com>
 <20220307150609.10662-3-jane.malalane@citrix.com>
 <YidAU63TsVO/X1Q+@Air-de-Roger>
 <c20a3e9f-770c-3d2a-a332-ce836a4192da@citrix.com>
 <Yid+F5LdtMhs01tM@Air-de-Roger>
 <07334c85-92af-4986-d8a0-7b61f785c22d@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <07334c85-92af-4986-d8a0-7b61f785c22d@citrix.com>
X-ClientProxiedBy: LNXP265CA0096.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:76::36) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5b4a7e1c-595f-41f9-eb3e-08da011fdda8
X-MS-TrafficTypeDiagnostic: BN7PR03MB3603:EE_
X-Microsoft-Antispam-PRVS: <BN7PR03MB3603060ECAC20D8F2C5DE1F78F099@BN7PR03MB3603.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(6862004)(66556008)(316002)(4326008)(53546011)(66946007)(54906003)(8676002)(38100700002)(86362001)(66476007)(8936002)(82960400001)(2906002)(5660300002)(33716001)(6636002)(9686003)(6512007)(26005)(186003)(6506007)(6486002)(6666004)(508600001)(83380400001)(85182001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?WDg2OHN3MThaZlZhNnF4elhrYkk1M29ROEdJRHE1UmJkYytPSU1ncXJjM2ZN?=
 =?utf-8?B?cTUxVnJlZFhFQ2lzRjQzOC9oeGZxSU5BNk54Qy9IdWdmczZxMjRGU0UxTzNV?=
 =?utf-8?B?Z253RWhqTTRYVGZUa2d6TFMybGNjcVNrNnUrNmxteVMvYnZjemg5SHhlR1ZT?=
 =?utf-8?B?VFVQRVFaRHVZU08yeG03eGMzR3BkRFlXTVpyUWFOTW91QlhzMTdlZnZwdUdj?=
 =?utf-8?B?SnNERHJaejMraVJlMC9DLzBJMjl1bVZJTlN4SXE2dDk0OXhZRVFwV01DZzlk?=
 =?utf-8?B?VXZKcDUydnBueVdZd3c1dEVWNndYME5UTVRFcFM0Q2RlMk5nNGo1ZzFHZGF6?=
 =?utf-8?B?cXhKd1MxbTNPZnI3MEJOSi9CNVVjWjhuOWZYNm9zWmZWbGl0ZDZVSmhIdzNS?=
 =?utf-8?B?TXRuRWJxTm9OcVFucXJJTzNoY010dlZWNExyRC8vREtwbHVrL3JMaE13dFVa?=
 =?utf-8?B?WlJlODZibkhGNlZRQ1M0bEdUc1YzT0FrR0w5bGpXNlJvMEtDdjVySFYwR3h5?=
 =?utf-8?B?bW53Uk1oZWdzUHJDN0FiNVBzUHg4RFRJSnQ4M0JWcURqVjZrOUVXUXRIVGhU?=
 =?utf-8?B?ajdZSlpxVk41cjRhamoyanNReDJDdFdwTGVKenpKN0o3T1l5ZDhXUlIrWnhw?=
 =?utf-8?B?OTF1bGQ0eGJGTWN2S2p6WlBIZHl4M0t6anpTRU03QWg2REZQMzFQUFRsS04r?=
 =?utf-8?B?czkyM0dQWXBnemNOUC84RmNtbGNBVGNoemQ5VmprNHBKNTc1ZTlQeVFKWUFl?=
 =?utf-8?B?dFF6WUlsbW1sTkdNK3FrRDFTV3FnMkEvYklOTnhmUWc2ZjBQejF0VVc5U0Vv?=
 =?utf-8?B?ZDh4VUU4QTJEVlg0V29pUUV2YkcxMFp0VkIrZDAxRUtYKzBTNHZxeEs1VFR0?=
 =?utf-8?B?VUZIL0pBWGhuYm5lR2hHVldvd2tkTU9wVGpvU1hycmVQb2gyZ1BsUTdPTllk?=
 =?utf-8?B?alRFSlhXMlBMUlBDN25zUzdDMEhJOFVEZ3JMOUdhK3B4WTAwZ3ZnUjNqdHRw?=
 =?utf-8?B?ajdUaEhTNzlvd0dVV0QyUXJjNldXMGt5M29vQWQ4dm5WOEFYZE5BWWdNMTlL?=
 =?utf-8?B?VlZ0YzhFL0EwTzZuSGk2K0haSWFoc0c5NFVPOVkyd3lwd2xxTEtacnFXamMw?=
 =?utf-8?B?clB3S3FvL3ZrRkRTN0tDWUlJUUc1clZvZWM2S2ZzZjlGT0dUMmY0OUlOYTRT?=
 =?utf-8?B?cVdFditsdG1SRlBXUEZoaVp3bW5iWGMvT3Y4NVo5enNvSVRqdmRqdzIxSUlE?=
 =?utf-8?B?aXoxL3lqV0t3czE3MjljSm5kbllHenRXZkpneE5oL2dhUUh2UytaMG4zZXVp?=
 =?utf-8?B?bEJHRGNCbmNXeGt5clQ3dWJXNDkrOFMvejFpcjB6b0Nnb2hsWERGcVVzZjVY?=
 =?utf-8?B?WnZLZUdIYWFLVUtWTVU0cldlc0k1d0U4dHBqYjhsS1I1Nks4aHh6bWNESkFH?=
 =?utf-8?B?REpDSFlUTzdsK0NIbW1YRll6Zkg2ZHRNanpEeVMyb3RYSzlWKzg1dzl3S29R?=
 =?utf-8?B?UGtwbmk3ZW5xMENkTWZJN2VTWTNmUDI5Nk10eld4ekJmS0NiRlE4Z1RCQmNW?=
 =?utf-8?B?VksrOUM1cU5mVFFlcCtHc0RFWmk2Yy9Sd3ZoMmZPblplYmJvUlBCckJLVjIz?=
 =?utf-8?B?Wm1YWmJwR24rLzZrZDRsZFYwQ3BHcXAvUmxFQnFIdWlkVExodlpDNnh5WHFr?=
 =?utf-8?B?aEpjT0VOV2dQamV0S3VXcFZBL05BT2ZhR3ZtaS9RbjY5SVkrWFR3NnVvcm9u?=
 =?utf-8?B?VFgxL2psOE1yalRnSG44bzE5TmdRMFhnS2VRUE5id2NBRTdqSWJvanI2NjVK?=
 =?utf-8?B?dGl5RU1KYmNnS2p6UXpKTG9HNU5sYmxwNkNhaXhxWkd2NGZvcEozNEF2TGpX?=
 =?utf-8?B?UUhyTE5PMlJiQzJWbDU3Tk9QVFNFODRKMkF6WHZEZXlOazVwUStnVmdkUGNv?=
 =?utf-8?B?ZXJLWjQ2eFhtNDBOMzBhSjNYd1Q4bUQ2ZVVRU3gvUVlzc2NwZEJiaC9yd0Vv?=
 =?utf-8?B?SjlNUWFpTm82aGxFdXNEOFJ4bzF0T01lTVJrMG1nbjFWL0xsODN5TDJoRzg4?=
 =?utf-8?B?Qk1HNWwvc2lpeWNtU2xRazlNSjVYUkgyRGpWZE5DTWE1TWVWR0pIM3JMVGJ0?=
 =?utf-8?B?RWthVEdjTXpNSmdhc1FYa09tdHFNUUc1aktBOEsvNkFuOWU5WGpPM2REMnVM?=
 =?utf-8?Q?8yDpQHU49mkiRznmldAYEiE=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 5b4a7e1c-595f-41f9-eb3e-08da011fdda8
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 16:22:40.2982
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: dfwtyb1BhK6XaXECbgPqkdU5kcV2KUgpEcJuSHQVpUdkUyeqNxPJoJ7+KQh79jm4PfgbzMZLqt5kV91gut+ZVg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN7PR03MB3603
X-OriginatorOrg: citrix.com

On Tue, Mar 08, 2022 at 04:16:21PM +0000, Jane Malalane wrote:
> On 08/03/2022 16:02, Roger Pau Monné wrote:
> > On Tue, Mar 08, 2022 at 03:44:18PM +0000, Jane Malalane wrote:
> >> On 08/03/2022 11:38, Roger Pau Monné wrote:
> >>> On Mon, Mar 07, 2022 at 03:06:09PM +0000, Jane Malalane wrote:
> >>>> diff --git a/xen/arch/x86/include/asm/hvm/vmx/vmcs.h b/xen/arch/x86/include/asm/hvm/vmx/vmcs.h
> >>>> index 9119aa8536..5b7d662ed7 100644
> >>>> --- a/xen/arch/x86/include/asm/hvm/vmx/vmcs.h
> >>>> +++ b/xen/arch/x86/include/asm/hvm/vmx/vmcs.h
> >>>> @@ -220,6 +220,9 @@ void vmx_vmcs_reload(struct vcpu *v);
> >>>>    #define CPU_BASED_ACTIVATE_SECONDARY_CONTROLS 0x80000000
> >>>>    extern u32 vmx_cpu_based_exec_control;
> >>>>    
> >>>> +#define has_assisted_xapic(d)   ((d)->arch.hvm.assisted_xapic)
> >>>> +#define has_assisted_x2apic(d)  ((d)->arch.hvm.assisted_x2apic)
> >>>
> >>> Those macros should not be in an Intel specific header,
> >>> arch/x86/include/asm/hvm/domain.h is likely a better place.
> >>
> >> Actually do you think hvm.h could be better?
> > 
> > I guess that's also fine, I did suggest hvm/domain.h because that's
> > where the fields get declared. I guess you prefer hvm.h because there
> > are other HVM related helpers in there?
> 
> Yeah, that is why - tsc_scaling_ratio also gets defined in domain.h for e.g.

I'm fine with placing it in hvm.h.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 16:26:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 16:26:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287199.487071 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRcfZ-0000TL-01; Tue, 08 Mar 2022 16:26:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287199.487071; Tue, 08 Mar 2022 16:26:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRcfY-0000TE-Sv; Tue, 08 Mar 2022 16:26:40 +0000
Received: by outflank-mailman (input) for mailman id 287199;
 Tue, 08 Mar 2022 16:26:39 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fWwI=TT=citrix.com=prvs=059ab6e88=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRcfX-0000T8-Ku
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 16:26:39 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 8695cd4c-9efc-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 17:26:38 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8695cd4c-9efc-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646756798;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=rIcU2BgkZRl8fRY1ndnEecmqWTiybJTozKJpdvtqfN0=;
  b=eobtiV7LHxh+PEm/IExFKwzmW56wfHqRRqUkBEvXILJ3cCx4iYHn+5cU
   jAOf3MTGOputkTroGeljXPGFe3nv7DHuOElpUDV+t3arKn1t39TBqSMFq
   uQ5IN2tkADZEo8gGtc+7HK6xyDrpcktfug7b6JpBS4sLpQB+FvgRXjgsM
   E=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66122386
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:B96+wqLlufQZb2FAFE+RAJUlxSXFcZb7ZxGr2PjKsXjdYENShWYBn
 TFKUWnSbv+IYjGmKN5+OoSz8kpUu8TRytExSldlqX01Q3x08seUXt7xwmUcns+xwm8vaGo9s
 q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUYYoAQgsA148IMsdoUg7wbRh2dY42YLR7z6l4
 rseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3fMldG0DQUIhMdtNWc
 s6YpF2PEsE1yD92Yj+tuu6TnkTn2dc+NyDW4pZdc/DKbhSvOkXee0v0XRYRQR4/ttmHozx+4
 PtWjbmhVCUxBLfNs9pNWgZESg4iIaITrdcrIVDn2SCS50jPcn+qyPRyFkAme4Yf/46bA0kXq
 6ZecmpUKEne2aTmm9pXScE17ignBNPsM44F/Glp0BnSDOo8QICFSKLPjTNd9Glu35oURqaAD
 yYfQWtWSwaebRpEAQgOErAsu8vwhF76LxQN/Tp5ooJoujOOnWSdyoPFNcLSetiDTsZ9l0ORt
 GXAuWj0ajkZM9qFwDbD7XOohcfIhyrwXI9UH7q9ntZ6jVvWymENBRk+UVqgveL/mkO4Q8hYK
 UEf5mwpt6da3ECsQ9PwWzWxpXeWuRhaV9c4O+8w5RyJy6HUyx2EHWVCRTlEAPQjt9IeTDkjx
 FiP2d/kbQGDq5XMFyjbrO3N62rvZ25FdgfueBPoUyMr+OHGsZwRlijVT/1dQKeqkoTaRS3/l
 mXiQDcFu50fissC1qOe9F/Bgi6xqpWhcjPZ9jk7TUr+sFonOdfNi5iArAGCsK0edNrxokyp4
 SBc8/Vy+tziGn1keMalZOwWVI+k6P+eWNE3qQ4+RsJxn9hBFpPKQGyx3N2cDBoxWirnUWWwC
 KM2he+3zMULVJdNRfUrC79d8+xwkcDd+S3ND5g4lOZmbJlrbxOg9ypzf0OW1G2FuBFyzf9hZ
 sfGKp/8UC1y5UFbINyeHbx1PVgDnHxW+I8ubcqjk0TPPUS2PhZ5tovpwHPRN7tkvctoUS3e8
 spFNtvi9vmseLaWX8UjyqZKdQpiBSFiXfje8pULHsbeclsOMDxwUJf5nOJ+E7GJaowIz48kC
 FnmARQGoLc+7FWaQTi3hodLNOu/Dcwh/ChgYUTB/z+AghAeXGpm149GH7Mfdrg77u1zi/lyS
 vgOYcKbBfpTDD/A/lwggVPV9uSOqDzDadqyAheY
IronPort-HdrOrdr: A9a23:HmNl/K5f4pGbT34BeAPXwSqBI+orL9Y04lQ7vn2ZFiY7TiXIra
 yTdaoguCMc6AxxZJkh8erwX5VoZUmsj6KdhrNhQItKPTOWw1dASbsN0WKM+UyDJ8STzJ856U
 4kSdkDNDSSNykKsS+Z2njALz9I+rDum8rJ9ITjJjVWPHlXgslbnnlE422gYytLrWd9dP4E/M
 323Ls5m9PsQwVeUu2LQl0+G8TTrdzCk5zrJTYAGh4c8QGLyRel8qTzHRS01goXF2on+8ZpzU
 H11yjCoomzufCyzRHRk0fV8pRtgdPkjv9OHtaFhMQ5IijlziyoeINicbufuy1dmpDl1H8a1P
 335zswNcV67H3cOkmzvBvWwgHllA0j7nfzoGXo9kfLkIjcfnYXGsBBjYVWfl/y8Ew7puxx16
 pNwiawq4dXJQmoplWz2/H4EzVR0makq3srluAey1ZFV5EFVbNXpYsDuGtIDZY7Gj7g4oxPKp
 gjMCjl3ocWTbqmVQGYgoE2q+bcHUjbXy32D3Tqg/blnQS/xxtCvgklLM92pAZ1yHtycegA2w
 3+CNUaqFh/dL5nUUtDPpZyfSKWMB26ffueChPaHbzYfJt3Tk4l7aSHpIkI2A==
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="66122386"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=iDU2SmatGVXB6RI5+S8x2f9VFpYcpd5Gv6EuHpmP98QITNV8UbkknyLkug2hIxhyQ1uHXF4WfMTwwtHBSUEMghy+XmPII8ZwkGLlgcfoao10AdNMN3tUHL3NZmYgdD0e0NiFHW05ZdYcMsmqFttGELx0jioIF6RpLQjOHVC0GDlUH+5kMrX/mpPNgtL3jcpF+owChQlfxev44Lgzuv/RzOEVRft7venIkzDUrTznZunxYrxFaATClQTiFvKApv1hRsrI/dB70qTz6mJt7XV5UP/FQHQyL4zRDiMsX8L316D/qsOrR7swKqzlYCwU/BMBxs0dxiL/GKxGQoI1wdJv3w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=3Oq0OdXfVksZyvOggS7TMo2kZKfvcx2V8FsRAvDgCj4=;
 b=FwPXILRc11VDYizwdAYLytJYMl/3N2HZJmFMZBPqUA9gYu50NMMPrapZL4I2ZlJuI1PRB3Kb3crJ5WJ23Fv5hqCb52gnAfT7bvYAA3N35xRzklZZqGUSsOcHRjQYCiOrSFD6HE83bp+SeCBGqqOo1ksv1JLIHLag1Wr8Okn6sKEvLJhMT2161/jwG9YbfDiHtwJqcJRpmurvgeMGrpBICk7sv+BgeFpFH7cqpwP3uMaAhP9nanckS4uQ9zX7eKm0NUA2OSz5aJ67YV38d7rzqq6JLP+/L0ciM9gsoa3GJ3YShXp66vixuHf3aZjge2sBzn0srY5CVSu5YQ14sDP0sA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=3Oq0OdXfVksZyvOggS7TMo2kZKfvcx2V8FsRAvDgCj4=;
 b=K2k+iqspEp/TIey2r0acLcvjcbOxE5NtJ8FHqV2WkdSwI1FNTS5IqCByzjbK3IfPHYVjtH2Wdbt/DSUkYzqb5JftAfziEprYG4g4oIMkRkBGdhaFrhoR6sYl3D9KuCYGTsG0rfZdbH9LIX38ga2HliXLsacyQByaCtJIRb4zF7Y=
Date: Tue, 8 Mar 2022 17:26:28 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Bjoern Doebel <doebel@amazon.de>, Jan Beulich <jbeulich@suse.com>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, Konrad
 Rzeszutek Wilk <konrad.wilk@oracle.com>, Ross Lagerwall
	<ross.lagerwall@citrix.com>, <xen-devel@lists.xenproject.org>
Subject: Re: [RFC PATCH v1] arch/x86: Livepatch: fix overflow check when
 computing ELF relocations
Message-ID: <YieDtMqn+z5Aydkp@Air-de-Roger>
References: <b74a68b038c31df4bb94a5b5e87453f5a249cfe2.1646753657.git.doebel@amazon.de>
 <c625d90c-ec0b-a2c3-cf93-08c99cc2f3ce@suse.com>
 <YieBJTHJBiUUqMCU@Air-de-Roger>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <YieBJTHJBiUUqMCU@Air-de-Roger>
X-ClientProxiedBy: LO4P123CA0064.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:153::15) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 320d3e94-72c7-4a9f-aea7-08da01206858
X-MS-TrafficTypeDiagnostic: BN7PR03MB3924:EE_
X-Microsoft-Antispam-PRVS: <BN7PR03MB39243BDE1FDC503B11AE66C38F099@BN7PR03MB3924.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(33716001)(38100700002)(66946007)(2906002)(53546011)(66556008)(82960400001)(8676002)(66476007)(4326008)(54906003)(110136005)(8936002)(5660300002)(86362001)(508600001)(316002)(6486002)(6506007)(186003)(26005)(85182001)(6512007)(9686003)(83380400001)(6666004)(67856001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?WHcwU21MSE43L0ZxS1JPYmVvNy96aFpWVDVxWDdYeHEwcWhPTk5tOU01aDBY?=
 =?utf-8?B?a0E3b1ZQdkxnRmFwSXlaWGZuWGdGdmdxTjRQSWg0anNOVEIwckxpMHdjcVAy?=
 =?utf-8?B?ZEN1M1ZWSGN3L0d4bWc2dEpPcUtxeW5GM1hwRGhSUHZjUFhlU01Ua0toOWo4?=
 =?utf-8?B?TDNJbU9HTkpwN2hoWXdpeHdFM09tdkdWVWJHbWNyZEx6SVdEbmtjVUtWOHZh?=
 =?utf-8?B?NHpLM2hDZmxCWDkveEg2MEwxYlpobDZCaHNHODRoYWkzanVUblNMSG1ObXMz?=
 =?utf-8?B?NzVvSXMvV09ZUTlDR3pLZUxEVko4eE9vdlVDRkZTdnl3ck1heGpsSkhIaHBJ?=
 =?utf-8?B?RmVUa2tTOUZMaytZZE1wb2c5bmNIMmRrR0lPRU9TVGdNNy91TDhhQXRhVGM1?=
 =?utf-8?B?d0JaWFlET0s3RWJJTG9Tc3BNOEVBbDNibFU3WDh6eVdXS05BTVA4RlFqVXQz?=
 =?utf-8?B?TWdJT05VZUlDd2I4enBpSWREU0U2UXZ0a3RDKzF2OFFXcStyMHRUa3BFaUFu?=
 =?utf-8?B?dkREekl0Tm5YaXI0WHJQcjN1ajRSbWJIMGhDcE5pOXFxN2NhRjJDMURqQ0dV?=
 =?utf-8?B?VVlXaVV2WXV4emxoem91K1RDNTJHUmpsSWN6S0xtT3NpYVZtZDFISE5KU29u?=
 =?utf-8?B?cXZRUWpZeS9qRmJCajlTeXVlVllGT2IrdWd0d29UcmlGc0F4dVNEMzA5dXJQ?=
 =?utf-8?B?Ly8vaWFFQXRYR0E2bWphOEFyZnBvb3NLZitjOVRZR2dTSmRLdWhFYVpxcklY?=
 =?utf-8?B?dUhTY1plV1J3UEwvQ0MxVVB3SytNTkZnNU8rZzNmY2k5VmVsNVByQXQ3dFNV?=
 =?utf-8?B?ZHNOSGEwOFBIMXFpcjJqM0pSQW9EeHhjeU50TUlpdXhVUVN6STMrMEpZZDBE?=
 =?utf-8?B?azluNk56aTNHL09jd2xvSjd2Qy9EWmtkQTB3UGp6ZjZtSHNCekhFM1RaaTZq?=
 =?utf-8?B?MVUvNUd0V214R3BYZVRuWWczbzhzbHFURUUwcTlERXBTMVFycnFTTmgxZXQv?=
 =?utf-8?B?bC9yT0czK1dXU2V4NVJpc2dYV0puTklieGgyaGhrVi9MamIyYTI5cXZnbjBV?=
 =?utf-8?B?dm9sUzU0K09BVWpqUThCN21hUGtzZldxeGZuaXdHMDA5MnJLS3czWldmRGll?=
 =?utf-8?B?S0FKd0MvZVF4QkJSR29UMXQzOE9EaVlmTkhLSjdmSEdZSlpkUG5DbGxudXVt?=
 =?utf-8?B?Z3RobXlFODNVWEpnN08vc3ZxV2tmTzJudzNPZDZreEpCUlNlVHJaYW1aMVZR?=
 =?utf-8?B?MUtMMjQzTkptOFFydEd3bTdXdzVtT3kzQUhSdDVKemxCeWtBcmVjSXRtempp?=
 =?utf-8?B?V1hhalppWmhybnc2T3NRdk5qODdlTTkzT2FoODBCKzNFU1RFVXloeHV1VFIy?=
 =?utf-8?B?NWJtNC9Kak9tMHd4S082RnQyTUJUbmF1WlRoSjBKV2pPaHlBcFlsaWxaMmJL?=
 =?utf-8?B?SS96alpiYUlYckJnWWptOW9FRTBhTzhoTnRVWXNUeFI4TnNSZlVqV0NvaUdR?=
 =?utf-8?B?RDNERE4wam8wcjZRNzZlYmVRbWNNTTdrUmh4ZGxhTVllN2VEY2tsWDNMSDlq?=
 =?utf-8?B?SHJkQnFSUFYrTnR1Y3BtcnV6dWpsWEh4RjZUWnpDNWxjZXpBVTk2VUpTMlhq?=
 =?utf-8?B?Sm5mN2VROGJjK2dGbkFwRkVzN2NGYkxQSjltV2Zyd0lydWdhQng4UVFmYmhV?=
 =?utf-8?B?SHNoSkp0SWI0eitWaFVnS0g2RXNjU1Qva1RKZGR2T3pJUEJBY1UyV2M4NkdZ?=
 =?utf-8?B?ZUplenVhVlFnVWhnaW9Qc3QvS2NHYitHanJJeHlaemVnUVcvMjNLT2EwT2t1?=
 =?utf-8?B?dFN4Z3pwYlZNZFM5WkhiRHZEQkthWkoxSG1GZFE0KzcvT2c4SWhwUnpJNEFM?=
 =?utf-8?B?bkoyVzFudWw0aiswZFpCT2J5UC96TU05T080NllicVVsbjFQeGlkakNhV05i?=
 =?utf-8?B?RnhvOHQ4bWhaYzRGSEhoa3RHbGJ4RGJqVXFuN1lBUnQrM1hHMm5Xb2Nva29v?=
 =?utf-8?B?N0g4YndJaVRaZU9ZQ214azIyaW1KZ3RzeXc3QjJINituaFFOdlI1Z2xYTU4x?=
 =?utf-8?B?bnNOOExvSG1STjJ0c2p6M1h4clBaR2EyQVpEL01ZMWZrZmQ3a0tUTThYUzR5?=
 =?utf-8?B?dGZudUQ2ZjZSWkVmN2pGZFJsNkFmS3lRZVdMaEYrZmRuazQ5NitrcW4wbFU3?=
 =?utf-8?Q?5JdslpFv9mbe9nhiHRt2Bbw=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 320d3e94-72c7-4a9f-aea7-08da01206858
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 16:26:32.9601
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Eus65RRF3R6xDZTVHc6vAg/QcjA+mM0DeV1cP/U/IUypf6Iz2eApfejCjLK6WcWpoNGoq2ZJ+/wGS5dgyMryyg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN7PR03MB3924
X-OriginatorOrg: citrix.com

On Tue, Mar 08, 2022 at 05:15:33PM +0100, Roger Pau Monné wrote:
> On Tue, Mar 08, 2022 at 04:45:34PM +0100, Jan Beulich wrote:
> > On 08.03.2022 16:36, Bjoern Doebel wrote:
> > > --- a/xen/arch/x86/livepatch.c
> > > +++ b/xen/arch/x86/livepatch.c
> > > @@ -339,7 +339,7 @@ int arch_livepatch_perform_rela(struct livepatch_elf *elf,
> > >  
> > >              val -= (uint64_t)dest;
> > >              *(int32_t *)dest = val;
> > 
> > Afaict after this assignment ...
> > 
> > > -            if ( (int64_t)val != *(int32_t *)dest )
> > > +            if ( (int32_t)val != *(int32_t *)dest )
> > 
> > ... this condition can never be false. The cast really wants to be
> > to int64_t, and the overflow you saw being reported is quite likely
> > for a different reason. But from the sole message you did quote
> > it's not really possible to figure what else is wrong.
> 
> It seems Linux has that check ifdef'ed [0], but there's no reference
> as to why it's that way (I've tracked it back to the x86-64 import on
> the historical tree, f3081f5b66a06175ff2dabfe885a53fb04e71076).
> 
> It's a 64bit relocation using a 32bit value, but it's unclear to me
> that modifying the top 32bits is not allowed/intended.

Urg, I've worded this very badly. It's a 64bit relocation using a
32bit value, but it's unclear to me that modifying the top 32bits is
not allowed/intended and fine to be dropped.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 16:34:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 16:34:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287205.487082 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRcnR-0001vE-Qp; Tue, 08 Mar 2022 16:34:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287205.487082; Tue, 08 Mar 2022 16:34:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRcnR-0001v6-MZ; Tue, 08 Mar 2022 16:34:49 +0000
Received: by outflank-mailman (input) for mailman id 287205;
 Tue, 08 Mar 2022 16:34:48 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fWwI=TT=citrix.com=prvs=059ab6e88=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRcnQ-0001v0-Rr
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 16:34:48 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a9ec5108-9efd-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 17:34:47 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a9ec5108-9efd-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646757287;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=vQ4BzFeOTQR7uBAQkHp3RWZ+NsdVAgwkmzpJ3kKMhbg=;
  b=Ab9WiVaiIrb7WAHprYhN+AtdJQ0Iwrz+zDeKNqquU1N3/27uzUnUibyf
   Bxnfny4yG1QGsJ3Zv1yDPD+AKQWOLbTY8jDTq8VJ89e4jVYhGYJ9YVtXH
   XOhxk+StzQ69nF0saJnb6gnQQY+f0zaPtAD9OKsnezNNrxfpStZUPxv1q
   k=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65655831
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:QfeJe6tjup5dzSWCM/+Y/jqtoufnVH9eMUV32f8akzHdYApBsoF/q
 tZmKWjTO6zfa2v3e48jPtjj80wEupfXz9A3GVNo+383H3lE+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jV6
 YuoyyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi92Z5eSvMoUdSJlHn49APx41Y34KEqg5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AO
 pRENGo0NXwsZTVFIVcMT6AnpN2xxWLNfwRW9hXPl/Qetj27IAtZj+G2bYu9lsaxbcZYgEee4
 H7H9mLRAxcGOdjZwj2Amlq0j/LLtTP2XsQVDrLQ3vxgjUCXx2cTIAYLTlb9qv684mauVtQaJ
 0EK9y4Gqakp6FftXtT7Rwe/onOPolgbQdU4LgEhwFjTkOyOuV/fXzVaCG4aADA7iCMobWNz7
 AGtsdrPPgFi7/6oGEywxIidnyznbED5MlQ+TSMDSAIE5fzqr4cykg/DQ75fLUKlsjHmMWqum
 m7X9UDSk51W1JdWjPvjoTgrlhrx/sChc+Ij2unAsotJBCtdbZXtWYGn4EOzAR1ofNfAFQnpU
 JTpdqGjAAEy4XOlyXTlrAYlRujBCxO53Nv02wYH834JrWjFxpJbVdoMiAyS3W8wWir+RRfnY
 VXIpSRa74JJMX2hYMdfOtztVZp1nfW7TIS4DZg4i+aihLArL2drGwk0OSatM53FyhBwwcnTx
 7/BGSpTMZrqIfs+l2fnLwvs+bQq2jo/1QvuqWPTlHyaPU6lTCfNE98taQLWBshgtf/siFiFo
 r53aprRoz0CAbKWX8Ui2dNKRbz8BSNgXs6eRg0+XrPrHzeK70l9U6+Bm+1wIdc590mX/8+Rl
 kyAtoZj4AOXrVXMKBmQa2Alb7XqXJ1lqmk8MzBqNlGts0XPq670ts/zq7NfkWEbydFe
IronPort-HdrOrdr: A9a23:sRD1m6gnZ/KI6GizcpYfxAkvwHBQX0N13DAbv31ZSRFFG/FwyP
 rAoB1L73PJYWgqNU3I+ergBEGBKUmskqKdxbNhR4tKOzOWxVdATbsSlrcKpgePJ8SQzJ8+6U
 4NSdkaNDS0NykHsS+Y2njILz9D+qj/zEnAv463pB0MPGJXguNbnn9E426gYzNLrWJ9dPwE/f
 Snl656T23KQwVpUi33PAhPYwCFzOe74a7OUFojPVoK+QOOhTSn5PrTFAWZ5A4XV3dqza05+W
 bIvgTl7uH72svLhyP05iv21dB7idHhwtxMCIiljdUUECzljkKNaJ56U7OPkTgpqKWE6Uoskv
 PLvxA8Vv4DoU/5TyWQm1/AygPg2DEh5zvLzkKZu2LqpYjDSDczG6N69PRkWyqcz3BlkMB30a
 pN0W7cnYFQFwn8kCP04MWNfw12l2KvyEBS39I7vjh6a88zebVRpYsQ8Ad+C5EbBh/374ghDa
 1HENzc3vBLalmXBkqp8VWH+ObcHkjbIy32AXTr4qeuonprdTFCvgclLfUk7zY9HMlXcegA2w
 zGWp4Y442mAPVmKZ6VP91xMvdfOla9MS4kD1jiU2gPNJt3ck4l+KSHqInc2omRCeg1Jd0J6d
 P8bG8=
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="65655831"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=L8aL2ziF8yP0BiZ/MsIehvqi5hoMfZWyRMICp4zK1svZMdAwQKlyHAWAJgpjp3VNOjzj5dkK0o6FvxCiBDiQ/wBPML06hfAQMlHVmv132Dquvoy4uNo87QMiSLxxclUpboxRH2gFafxji0aVGr9gHRsjtsVmXUVApmO/6n3b8wqKeDyttTtBfnVmRViF0IoZBKGTMI68EeJwbzRTZxvaWj36FotMIw6Ka2nxptxlJ3ps9Rj9V1WaVKj8ruB1ZyHZc/uUpvCra9cPj7lYbPN8ddB4SdFm654p+hoUNEd60PTdjuGSyrr27n+4IFfTBx/eyYdnvZKcuu5cfg2g6uAbzg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=qNmL+PPxy6fETeDnzvWMEvu9lNgzZTnt+fv0P6Iotqs=;
 b=M6R4UItWBZ3OoIoWCn6J4X5g88Yvv0/bJPspB44557Bqmi5AoI7r17W2j6NpLtDiwvFoAqg9f2DVDBvr2H6KCk/GmunAvy2EUvKLvnxkhUuCA1zoM2fqR9BB56IaMBJHurJokjpgZW4Q6QrQj+TcspbY1xWitgRf88hyRFvaDMKUQtZzCLVGxVFU/IZTYPoHRzzY/HLILKPWN27rVo2D3dtQArphBsjhwNukHxS7/oik02PxnbhlXd12u+0rz7BHlbWO+yqdNArE6FNwksYEV7o44P48PR232BFEs4J5Yp7HYz+hhxVixsHe0PLWXelr6Dc9A9erUarjFKX7pmhsOw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=qNmL+PPxy6fETeDnzvWMEvu9lNgzZTnt+fv0P6Iotqs=;
 b=HGiIoEpwYYMmPneclMimLQ8VtGiFL/9MXPZV3jsjWS4HOtiJ8p7svNqMLzyIv/XwCA2pzMX52UDIcuAu6mQJgKztjP+aydqhh0Lii8czEjKPUiNQQ8jc8c0Wz/SbZS/D8nIW7pdZB9evYLTExw+b0NSY7un7y4OpKWlJw9dcKc4=
Date: Tue, 8 Mar 2022 17:34:34 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Kevin
 Tian <kevin.tian@intel.com>, Paul Durrant <paul@xen.org>
Subject: Re: [PATCH 4.16] VT-d: drop undue address-of from
 check_cleanup_domid_map()
Message-ID: <YieFmi1EsfxPojy/@Air-de-Roger>
References: <c71ac406-15a9-6291-d670-0f965a59bebf@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <c71ac406-15a9-6291-d670-0f965a59bebf@suse.com>
X-ClientProxiedBy: LO4P123CA0261.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:194::14) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c68ffd6d-6f27-41bf-5d93-08da01218a40
X-MS-TrafficTypeDiagnostic: BYAPR03MB3415:EE_
X-LD-Processed: 335836de-42ef-43a2-b145-348c2ee9ca5b,ExtAddr
X-Microsoft-Antispam-PRVS: <BYAPR03MB34156BE7441C55932F2CC2278F099@BYAPR03MB3415.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(8676002)(82960400001)(4326008)(38100700002)(5660300002)(8936002)(4744005)(66476007)(66556008)(66946007)(85182001)(2906002)(33716001)(6506007)(6512007)(6666004)(9686003)(26005)(186003)(54906003)(6916009)(316002)(508600001)(86362001)(6486002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?VWErcmYwaisrWWhCcVoyK1gzSFZqank2bHNUMUZUUmx3UnMxd3Q2cGZVMTkz?=
 =?utf-8?B?SDZOdk83a29XSFByMGV5bDJnVkJ4RTRtQXY3MG5kRzlsalZYZThXUlpSKzFk?=
 =?utf-8?B?cnhDYzZyTmVIRmdmTzdqUmEyYVJlZ3ZibWtDSVo3d2xvWVpDN3V1UDRaa2xo?=
 =?utf-8?B?cEZ5emFRSGxLQi9SQitPM1MzZzZLSHhhQTI1VFFvRkFpY0NhL1phVStja2xQ?=
 =?utf-8?B?bjJ4M3pyZU5seVZDVTYvSDVkOUxjRDgxYlBSc3R5Uk9qaXluVXdjWElOMUdB?=
 =?utf-8?B?Y1YvVEdSUXE2b3RqMUNsM0RLdVNEaXMxZTROT3VFWVFJR2JOcHNKU2dRdWNp?=
 =?utf-8?B?SkNkSnVubEdhcGdjSktBaldoSHhEdWlVT3U2K21iSzBYZmZkakpEQS8zVEIz?=
 =?utf-8?B?Y2tZNnpibGgyUEwrTlhkaDUwalJQcWFqamRvdDFCZjBzMzZ4YUVzYmxoL3U0?=
 =?utf-8?B?Sm1lcVVUbGJLb3hvV0hNb1ZleXJkdXV5Yzc0L2xvNE5BSkZVOGtuMllyeHBn?=
 =?utf-8?B?am50bEVwR2hHYTI5ZkRIU1RjTTBoR21zOGR5b0ZLSGhSNlp4cWFaWGxnYTM0?=
 =?utf-8?B?b3lRWU4xVlpicnYwNGFiVG5mR09ZU0l6bGVBb1kvQ2lnblZKWXNBRDZtZnNO?=
 =?utf-8?B?aDBYNlRYdFFCNmJhblZadXl4VndoRWE4Z1VIS25XQmtoSHorckdGaTFQTTdq?=
 =?utf-8?B?Qy9ZcWI5VzJDdSt4Nkp6aHlzN2t2SE1xZVJ6T284bVp2SUVsMXZlTlVHV3pp?=
 =?utf-8?B?ZklycGdTZG9HZldHaE9UQUFWUk96MUVtbWp3SFgxeittdFNFRG9FMHFjQXlT?=
 =?utf-8?B?TklPZHFxOXlXMDJmd0NYRk4rQlREU002TFlwNGp1SnNlZ21zbm5GMUxGSUFT?=
 =?utf-8?B?Tjd3V3diUHF3cjg5T0M5cElRVU5udVp6TkxDTWZncjFPdktxTWl4c0h3dUor?=
 =?utf-8?B?SnZmcTVCa1JmWVlyK0Z3SUhHMXhad0FJTTBacU54aWF5Mm9QUjlrdE1aeDNs?=
 =?utf-8?B?VDR1SkNiN3dCeWZ4MGRqb0pyczYwWG9BUzlNMmN4aGl4Qi85b1pBbGpKM3Bj?=
 =?utf-8?B?WHpDa2VObzdjV1F2NHZNcVlqK2gzc0FtQ2NwbHhhRjhNb2cwNFVreTVhNG5w?=
 =?utf-8?B?NEpwT096RWdLYlAycE9KWjBrOUtZaWI0RUVPMzcvMWFNNkVNQTFUellqVjlr?=
 =?utf-8?B?T1lxR0hhZkpBdTRaeDlGbldLSzFjQ3krQlZCTWd6OGg2NVJBL1ZybGNZVW5Q?=
 =?utf-8?B?L0Nyc01EOWFET3p3NmlQMmRJZm1PbzBrYUVJaTNJR3lnYlZRRyswWkhnNm9P?=
 =?utf-8?B?N2lmVllFUjdKUjVWWHdzNi81dDJrRERyWC9RaHBtbHFlT21VQUZHeTE3aHhh?=
 =?utf-8?B?cjJnWEhTelhIeTZxb1ZidEkxU1pqNThTUFAwQTJGWEJHSGNjTFNYL0pWeUNk?=
 =?utf-8?B?Q0U0ekFNanE3Z3VoMlJMUHQzdlpDdXR5bWIrVFY3azErMzdPcXAyYTFpSEh0?=
 =?utf-8?B?enZ6MkdWTXBSYkNxcGRGYm5YQnRCMUJFaUh4U2dOQnJLN2ZtQ3RTcWhIclY1?=
 =?utf-8?B?ODRITnR5L2FabzVOeko3RldQNXR3ekVkZ0NVYTlmZ1FTR1IzOW9FMzQvS0VW?=
 =?utf-8?B?QXJ2aExHbUhiVFhValN2Uy9GVFFSbUdlVjNBSmo1ZGV3OUZ2Vkpib05keDgx?=
 =?utf-8?B?eXRyeWVLMHB3R0NOeWJpcXhsaDFWSEd1L0orR3J0dlpadFNwUGt2NmZIems1?=
 =?utf-8?B?aUNwb1QxdlgxZUJobS9SR29KTjAxbStFOFZsRDJTYzZVTW5IN1Fpa2IrMXE3?=
 =?utf-8?B?UzdkSW1iM1lnOFZqT3RSb0xBNVdHYkpLZmIyb0JERENiVHRIVnhqRTJLMlNW?=
 =?utf-8?B?THJoMkNjMW1mUm9XSnpXZHEzODQ4Z2pXUm5mbElNYXVIa2x1bWNYVTNSMDJ0?=
 =?utf-8?B?bGxrVVNyVU90R3RsNVdpbWZBTnpUS1dCZWJkRm5acDQ4dlJMTUpBUFhhRVJp?=
 =?utf-8?B?dW9tcjRVMTVXb0V3ZG1EOTAwY0hlei90MTBWTnp3bmVYN3ZIQjZIYkFUU3pu?=
 =?utf-8?B?TnVPbFIwNGdqMEthc3NBSW1kL0RpbjZCUjVNaEZNYzRDQ1JoTHQ2YnlGNGor?=
 =?utf-8?B?SGJReTdOSnZsNlJiNjFsdm93eHhQWi8wOGlsWjhCaEkySjNuOEZFeXBKanp0?=
 =?utf-8?Q?QUxrqtD4uOeL5uM/Ugh5IU4=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: c68ffd6d-6f27-41bf-5d93-08da01218a40
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 16:34:39.2462
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 5EI7MMiBodGGdrxLFlSZ6g/ECNBpMUw9GDTYFr4t4OZWXyTRznhhxNdSBo/bbJ2OTMmjuKFx71S9zzLR5mt23Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB3415
X-OriginatorOrg: citrix.com

On Tue, Mar 08, 2022 at 04:27:00PM +0100, Jan Beulich wrote:
> For an unknown reason I added back the operator while backporting,
> despite 4.16 having c06e3d810314 ("VT-d: per-domain IOMMU bitmap needs
> to have dynamic size"). I can only assume that I mistakenly took the
> 4.15 backport as basis and/or reference.
> 
> Fixes: fa45f6b5560e ("VT-d: split domid map cleanup check into a function")
> Signed-off-by: Jan Beulich <jbeulich@suse.com>

Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 16:36:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 16:36:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287213.487093 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRcpQ-0002oV-8v; Tue, 08 Mar 2022 16:36:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287213.487093; Tue, 08 Mar 2022 16:36:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRcpQ-0002oO-5Z; Tue, 08 Mar 2022 16:36:52 +0000
Received: by outflank-mailman (input) for mailman id 287213;
 Tue, 08 Mar 2022 16:36:50 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fWwI=TT=citrix.com=prvs=059ab6e88=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRcpO-0002oF-Ky
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 16:36:50 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f2c9cbfb-9efd-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 17:36:49 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f2c9cbfb-9efd-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646757409;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=hMkY17anhtiIP0RMlRHoc+BIVCHFpx5t6rE3b327IYI=;
  b=esLVVS8HTbXnVLeKwWM7KxrB1pUVVIfPC2jcgWYgLpKElphSXaNanEOX
   PfczLmIoZvN1TwgHjbzqhwR32/c9LrK8934U+CMbRf6hD0fvCd6TABrM0
   3As6gm0ml/ED93NzePDmuJR9DF91i05DDUKbYjZXIDrBjCTLvCWlQsbSF
   M=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65731604
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:pJogk6hmO/45N0T3wn/kkTKdX161lBAKZh0ujC45NGQN5FlHY01je
 htvXT2COfeJMDD8ft93bY21/EtSsZeGyIc2TAVkqCA3RH4b9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFvd4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YQVwNa6SqLgjaEZZHi96YP1F6Z/jeUHq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bkmtnwjzDS+4vXLjIQrnQ5M8e1zA17ixLNaiDO
 JFAN2IzBPjGSyVfIU44NZtkoKDyjFnGUCdep2uHh7VitgA/yyQuieOwYbI5YOeie8JRmUqJo
 3PcyE7wCBoaKd+3xCKM9zSngeqntTz/cJIfEvu/7PECqE2ewCkfBQMbUXO/oOKlkQiuVtRHM
 UsW9yEy668o+ySDRNTnQwexpnLCuxcGQsdRCMUz8gTLwa3Riy6bDGUZSj9KaPQ9qdQ7Azct0
 zehhMj1DDZitLmUT3O19bqOqz62fy8PIgcqZzIATAYDy8nupsc0lB2nczp4OPfr1JuvQ2i2m
 m3U6nhl71kOsSIV/6fi9lOZs26SncfIQwAxu1XUT0KBtjosMeZJeLeUwVTc6P9BKqOQQV+Ao
 GUIlqCi0QweMX2evHfTGbtQRdlF897AaWSB2gA3Q/HN4hzwoybLQGxG3N1pyK6F2O4gcCShX
 kLcsBg5CHR7bCrzNv8fj25c5q0XIUnc+TbNC6i8gjlmOMEZmOq7EMdGPxb4M4fFyhRErE3HE
 c3HGftA9F5DYUid8BK4Rv0GzZggzT0kyGXYSPjTlkr7j+TBNCPOEOdYazNii9zVCove+205F
 P4Fa6O3J+h3CrWiMkE7D6ZJRbz1EZTLLc+v8JEGHgJyCgFnBHsgG5fsLUAJIORYc1Buvr6Qp
 BmVAxYAoHKm3CGvAVjaOxhLNeK0Nb4i/C1TAMDZFQvxs5TVSd30t/l3mlpeVeRPydGPOtYoF
 6lVIZvRWK8TItkFkhxEBaTAQEVZXE3DrSqFPja/YSh5eJhlRgfT/cTjcBep/y4LZhdbf+Nky
 1F8/ms3maY+ejk=
IronPort-HdrOrdr: A9a23:8weupqq6S7FDLNJCX98E2RYaV5vJL9V00zEX/kB9WHVpm5Oj+P
 xGzc526farslsssREb+OxpOMG7MBThHLpOkPMs1NCZLXTbUQqTXfpfBO7ZrQEIdBeOlNK1uZ
 0QFpSWTeeAcWSS7vyKkTVQcexQueVvmZrA7Yy1rwYPcegpUdAZ0+4QMHfkLqQcfnghOXNWLu
 v52iIRzADQBkj/I/7LTkUtbqzmnZnmhZjmaRkJC1oO7xSPtyqh7PrfHwKD1hkTfjtTyfN6mF
 K12TDR1+GGibWW2xXc32jc49B/n8bg8MJKAIiphtIOIjvhpw60bMBKWqGEvhoyvOazgWxa2+
 XkklMFBYBe+nnRdma6rV/E3BTh6i8n7zvYxVqRkRLY0LvEbQN/L/AEqZNScxPf5UZllsp7yr
 h302WQsIcSJQ/cnQzmjuK4GC1Cpw6Rmz4PgOQTh3tQXc81c7lKt7ES+0tTDdMpAD/60oY6C+
 NjZfusqMq+SWnqLkwxg1MfgOBFBh8Ib1S7qwk5y4GoOgFt7T5EJxBy/r1cop8CnKhNP6Wsqd
 60d5iAr4s+PfP+XZgNdNvpfvHHeFAlYSi8Rl56cm6XXZ3uBRr22uvKCfMOlaWXRKA=
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="65731604"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=it5xyaM7s4yPDITE+mVH+PpsgpbSNSe1cMl07qBem0EvDubJwA7eWfOuUYuCp8NKN9hTDURHkWctpnTwoP5jtgcsQHSHWD81QbA4oKOJBzhr03XPq5mItgNoVX3sSKN05FnIqwBJPBpjvmaZuAXssVBa0W9o8IdWmcSgVYGnQw9TgKBgSoAP2gjTby0rsKo9+ulsgPHCkxK36DFNlWp5zIZ1wZQgUhSAMj3XbnSG4O53Jdb/zyiYotQ//1ptTC47DQ+KbTyhQ2gmcMVG1UoBrHduDj85aRY9S21lr65rjwyDB0usC8ikQTpol9EeKtCgtG6g7AnaRUaIK/SdIiFxEQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=q2epvDYDmvwwx2rWMia+8CgjnbWJoTuQTzI7d4mYO1g=;
 b=gKBkz7KXovjwaZi+8JU+gQPrlzNNf7gt5hNqTi2Je2QlSc18QeGe0zPqn/TDkVPms628Tihw9eaKf8qUvi6s6I7c4500OcCe23bKyi8Lu1oc+bznX5DIIEerW/icpaJL9hTG96kJ9elYOWSVTFWOhg6ZRq4q7bnqmGIE7iiUSiPpBd8UkCL/GB18J9TgNNBaMvtJOk3O3B9PKklqzcf2oGuvdhZYznb2yF9RF/QD6bDC1gxXq6ZfmCzAhg0t8yCJ5529x95n+Nmuw+IZ4FPae9lpNw5KMpfg27TrQ8HoQI+2rlt9ujIkNnI1c2zzB47V4f+RhSq3d33gionHU/L0fQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=q2epvDYDmvwwx2rWMia+8CgjnbWJoTuQTzI7d4mYO1g=;
 b=xex6OVkQU1O5VFP+wIKfRaG9wBChda1bYdWI5nABBMsVbP/FaO2jiIKDGF0FEtY2xL3KuQiWHJDtITmbYkf8fQ9afUY1UMAZ2I8ZXuA3w/6zO3tBOsPKThjESWF60WnNEgIcJSMorxV1teEZ0vs/c4I4q9efgzjDfxXXgGeMYFU=
Date: Tue, 8 Mar 2022 17:36:32 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
	<julien@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v3 1/2] xen/build: put image header into a separate
 section
Message-ID: <YieGEMpcSl+qdZ1e@Air-de-Roger>
References: <20220308134924.83616-1-roger.pau@citrix.com>
 <20220308134924.83616-2-roger.pau@citrix.com>
 <c2e15d35-91b3-ba29-eed0-92fa19a692e8@suse.com>
 <YidlvWBauhcrAQa1@Air-de-Roger>
 <8f37e018-ab41-3e4d-14c7-1a25aa35e958@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <8f37e018-ab41-3e4d-14c7-1a25aa35e958@suse.com>
X-ClientProxiedBy: LO3P123CA0018.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:ba::23) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 515b77a8-4570-49a3-fde5-08da0121d080
X-MS-TrafficTypeDiagnostic: BN8PR03MB4868:EE_
X-Microsoft-Antispam-PRVS: <BN8PR03MB4868DD054500531E71A475A88F099@BN8PR03MB4868.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(66556008)(4326008)(8676002)(26005)(186003)(86362001)(66946007)(66476007)(6512007)(9686003)(8936002)(6666004)(6506007)(53546011)(5660300002)(83380400001)(508600001)(38100700002)(85182001)(316002)(54906003)(6916009)(2906002)(33716001)(82960400001)(6486002)(67856001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?QnhMYTJMbUs0VmxXbkVGZ0M4WGMwVDAyUlBvN2RQbGYvV0xIV2pFaGFtdXo0?=
 =?utf-8?B?TGtndFQ0V0traUI0L3JIdmN3Z08vZHpBTjdsOXlIMndNZXNqRVVCN0VoUDM1?=
 =?utf-8?B?UzhWalZQWHFrL2lnMzZMajZ2T1A2K0dTdEhsTFhjbmNZTTRycHBCT1p2bEdK?=
 =?utf-8?B?eWtzeEM2NFZ4ejhFbFdKVUJMN05tYzJ0cmhoUGpMYk9EenFCcjdBVEgxcVF6?=
 =?utf-8?B?Y1J4MmlYbWJzaUlPNjgva1RCOVY4TFJqYlZUeTNpN1hkOFZITGFNYVBNdjFt?=
 =?utf-8?B?RjhRd0VNWUU3cm51czB4TjNuY256R2xlVklpSFNJTHpFMU5KVHFKTGorZDVF?=
 =?utf-8?B?ZWF1TDZ3U3lKNVpPY3ArSHd2T2xQTytxdE9ZVjZnVlFWNkVlVWFtZjdSbnQx?=
 =?utf-8?B?N0RlOFR6K0dTWVZJS002eHk0R1E4VkU4ZHB1aFRXWWhrT3JzWUdFSzd2K284?=
 =?utf-8?B?TCt5cEhrblA3Z05LRDB5YjRZM2dIU216S014RTBUMWhOYmdZQ0YrYkM1bGMr?=
 =?utf-8?B?QTBjRlhUTk50UTZJYlJjN3hiSi95NTF3RWRNVVNBTWZqRzMzNkhxRGIvZmJ2?=
 =?utf-8?B?S29iT09KaGpBRUdKZ2NYY3gzajNLOHJnbXpkMkF3NkhOU1dOR3Z2M08xM3Fn?=
 =?utf-8?B?UkFRYTVwUUZmVG5zNDJOellHNTBrak1ZTXlYTlMzTWVpYlVPRFFjN0hGeGZw?=
 =?utf-8?B?SzZvMU14emc5TmRSUlJ3VFMvazV2b2dxdUlIUXRFSEJTaFpBalFaMTZXQlNw?=
 =?utf-8?B?WUZBbnRadXI5RXl6VUFZcGtuSGVqSnNQYysvUTVNdHZXbklZazlqd2c2cDBC?=
 =?utf-8?B?WWtLVEMxUGFFZkIyZGduVXp0TExESGNRZld4b0w5RS9hd0ZCNC9tdHpib1RK?=
 =?utf-8?B?aUoyNko3OGpESXZSVmkrU0ROeEd2TGFpdC9FUE12Y2N4MFc4RGdzb2pWTG1T?=
 =?utf-8?B?S0ZXTU9KVDFCdmhFeERjSnBUSktwMEJWRE1wdm1ZeW1IdUgvWFloQld3S0dT?=
 =?utf-8?B?LzlRS0hiSWRsTE5nYmx0UWVuS1hKSEF0Ykc5MFNkL1RCOFpVaGVBRXNkdlo5?=
 =?utf-8?B?YVR3UnIzV2U5Qkx5bWQ0U1paT3RMSVA2WHZidkVsWWYycXlEVUhvWE43WUIv?=
 =?utf-8?B?QWJuTnV1MXRYQVFyenJBaWhoZUx5dHQ3Y0NaOWJZbTBOQmVIQ3cxT1ByTW9t?=
 =?utf-8?B?RGM2ZERuaFJjRTNIeVJLMDY4OVgxclBkYW1leitrR09xMXhoTm0vdVhOQUpo?=
 =?utf-8?B?NDQyVkprNEhyNERScXdmQ3lpdHNRVlQrK0lCNjF2YXdobWNROXBXdTBPNnVu?=
 =?utf-8?B?aExYVzNOS0dnNWhwYVJPQ3dTZUVZQWRNWmxrRmEyQzFrRERTaHJQRjc1NEgx?=
 =?utf-8?B?amRzM0xBRTRHZ1hkbVFDQTVyL3NMeUM3dW1KbUU4STg2UDhDakFWNmtGblE4?=
 =?utf-8?B?OVFDcEptbDZ4cmNMMSswejZwZDRSU1NsbVgyQW5tK0NyRVoxNEFIUkQrT2w3?=
 =?utf-8?B?SWZocHdTSGdHUHcrSnkycnhoSGE4dmlCR3NveTZRY0RWQzhVdGFZTmJHbm00?=
 =?utf-8?B?cVIyb2xmczdYbmpqa3ZvTmI5aXFQRWhFRUlQaDQzMmNMMkJoUlluWlRLd2lU?=
 =?utf-8?B?NzdRTmxsUDVKRW1VaDh1YTJQVUpyQWhCcDlBbENOMWhDZCt0a3BCT3hHc1FP?=
 =?utf-8?B?MnhXT01neVo1aVJPQ2tTQm8zQmszQnZMTGF2SC92TklyWmZScC9IbjBCMXVG?=
 =?utf-8?B?a0IwcjI5bHpDL0JXSWs4b0YyeTl1bE9sYTNXUFhPcVUrVWxYK1NZUlEyRFN1?=
 =?utf-8?B?c2V1ZVBTRXBzMW5CbDJwOUt4dWVVWWJwRUFSLy9JaWxUWG9HaUwxUTVOeEsy?=
 =?utf-8?B?azF1Y3Z6V203eTFTM2p0TFg1T3M5QUdkUXpYZ1pwWENLcFh2SlJSc20vSGw5?=
 =?utf-8?B?Tm5LVHRCT0FvbUxxSmpMa2E2UEZadzlTTWVHRzd0YTE4Y3dnSTZvUGlBNXI4?=
 =?utf-8?B?bE0zUHk2RFZHOEF5Ny9zY016cDVNdVdleXdTOStabkd4a0JWYjEvYkdQTngw?=
 =?utf-8?B?VXhuZFc5RXdUMmtpTGNuY0k0MXZMaWZiampvMlN0ODFVYk91Y1lhUk1TZ2pX?=
 =?utf-8?B?VElobE1iNmdSc1RpKzlxY0lQOU80MzIxd0hUTUNkalEraU9tcS9NczJnUHZy?=
 =?utf-8?Q?hfsw3lN7CX5o38mDBHOS4E0=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 515b77a8-4570-49a3-fde5-08da0121d080
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 16:36:37.1571
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 61lFfKptwnHtvaafVzHUP7cthOCDG4JtMVeh2SFfHCL2drGJAGYQHZstpVu0x+F7597ou6PQNyNZG893BSfRKA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN8PR03MB4868
X-OriginatorOrg: citrix.com

On Tue, Mar 08, 2022 at 04:08:53PM +0100, Jan Beulich wrote:
> On 08.03.2022 15:18, Roger Pau Monné wrote:
> > On Tue, Mar 08, 2022 at 02:57:23PM +0100, Jan Beulich wrote:
> >> On 08.03.2022 14:49, Roger Pau Monne wrote:
> >>> So it can be explicitly placed ahead of the rest of the .text content
> >>> in the linker script (and thus the resulting image). This is a
> >>> prerequisite for further work that will add a catch-all to the text
> >>> section (.text.*).
> >>>
> >>> Note that placement of the sections inside of .text is also slightly
> >>> adjusted to be more similar to the position found in the default GNU
> >>> ld linker script.
> >>>
> >>> The special handling of the object file containing the header data as
> >>> the first object file passed to the linker command line can also be
> >>> removed.
> >>>
> >>> While there also remove the special handling of efi/ on x86. There's
> >>> no need for the resulting object file to be passed in any special
> >>> order to the linker.
> >>>
> >>> Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
> >>
> >> Looks good to me, but I have one question before feeling ready to
> >> offer R-b:
> >>
> >>> @@ -86,8 +84,13 @@ SECTIONS
> >>>         *(.text.kexec)          /* Page aligned in the object file. */
> >>>         kexec_reloc_end = .;
> >>>  
> >>> -       *(.text.cold)
> >>> -       *(.text.unlikely)
> >>> +       *(.text.cold .text.cold.*)
> >>> +       *(.text.unlikely .text.*_unlikely .text.unlikely.*)
> >>
> >> What generates .text.*_unlikely? And if anything really does, why
> >> would .text.cold not have a similar equivalent?
> > 
> > That matches what I saw in the default linker script from my version
> > of GNU ld:
> > 
> >     *(.text.unlikely .text.*_unlikely .text.unlikely.*)
> > 
> > I really don't know what could generate .text.*_unlikely, but since
> > it's part of the default linker script I assumed it was better to just
> > add it.
> 
> I've checked - gcc up to 4.5.x would generate .text.*_unlikely; from
> 4.6.x. onwards it would be .text.unlikely.*.
> 
> As to the dissimilarity with .text.cold: I wonder why we have that in
> the first place. It matches our __cold attribute, just that we don't
> use that anywhere afaics.
> 
> In any event:
> Reviewed-by: Jan Beulich <jbeulich@suse.com>
> albeit preferably with .text.cold.* dropped again.

Would you mind dropping the .text.cold.* at commit? Otherwise I can
resend.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 16:42:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 16:42:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287219.487103 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRcuZ-0004Cw-SV; Tue, 08 Mar 2022 16:42:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287219.487103; Tue, 08 Mar 2022 16:42:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRcuZ-0004Cp-PZ; Tue, 08 Mar 2022 16:42:11 +0000
Received: by outflank-mailman (input) for mailman id 287219;
 Tue, 08 Mar 2022 16:42:10 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fWwI=TT=citrix.com=prvs=059ab6e88=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRcuY-0004Cj-73
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 16:42:10 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id b11fd474-9efe-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 17:42:08 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b11fd474-9efe-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646757728;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=gA3lg178OSC/RArSw+zUcNzQejhkRe275EnSUlVb1zw=;
  b=VPnO6bHkmmrBZhCZhPbMqiUW3/wADrzjNJcV8Sy/suKLpk5+7QyEXe0g
   3tkQehe/nJSwc7mRxaTcF/m4ixGG+jTcw1s+Tp7X6T2gcIeiR83oX5tdA
   yyw1fVQpLdLTUZPuqrw1Jn0+peLwxYQDTkeda1D58P9hvxVT27eUtjZMK
   4=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65732036
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:OECl6aiB5Gfm6q57Z6n6eQ8aX161lBAKZh0ujC45NGQN5FlHY01je
 htvXWCCM/mKNGTxeN4kYdu19x4AsZPTnIA1TAs+qihmFygb9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFvd4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YV4ZPIPBqfYgaDMbFCojIY1m5ubDIXfq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bkmtnwjzDS+4vXLjIQrnQ5M8e1zA17ixLNaiDO
 JFDMWExBPjGSzAMJG9LLLRvp+fyhynta3pIo3HOgLVitgA/yyQuieOwYbI5YOeiT8hPglyRo
 G6A+m3jGwwbL/SW0z/D+XWp7sfxmif8VJMXBaeP3Pdgi12OxUQeEBQTE1C8pJGRmkO4Ht5SN
 UEQ0i4vtrQpslymSMHnWB+1q2LCuQQTM/JPF8Uq5QfLzbDbiy6bDGUZSj9KaPQ9qdQ7Azct0
 zehnc7tBDFpmK2YTzSa7Lj8hSipJSEfIGsGZCkFZQgI+d/upMc0lB2nczp4OPfr1JuvQ2i2m
 m3U6nhl71kOsSIV//yL/37KsiCRnbKKSQVo+iX3QDuh7gwsMeZJeLeUwVTc6P9BKqOQQV+Ao
 GUIlqCi0QweMX2evHfTGbtQRdlF897AaWSB2gA3Q/HN4hzwoybLQGxG3N1pyK6F2O4gcCShX
 kLcsBg5CHR7bCrzNv8fj25c5q0XIUnc+TbNC6i8gjlmOMEZmOq7EMdGPxb4M4fFyhRErE3HE
 c3HGftA9F5DYUid8BK4Rv0GzZggzT0kyGXYSPjTlkr7j+TBNCPOEOdYazNii9zVCove+205F
 P4Fa6O3J+h3CrWiMkE7D6ZJRbz1EZTLLc+v8JEGHgJyCgFnBHsgG5fsLUAJIORYc1Buvr6Qp
 BmVAxYAoHKm3CGvAVjaOxhLNeK0Nb4i/C1TAMDZFQvxs5TVSd30t/l3mlpeVeRPydGPOtYoF
 6lVIZvRWK8TItkFkhxEBaTAQEVZXE3DrSqFPja/YSh5eJhlRgfT/cTjcBep/y4LZhdbf+Nny
 1F8/ms3maY+ejk=
IronPort-HdrOrdr: A9a23:5eu4Z6xhYPffGo4Bjj4NKrPwKL1zdoMgy1knxilNoHtuA6ulfq
 GV7ZAmPHrP4wr5N0tNpTntAsa9qBDnlaKdg7N+AV7KZmCP0gaVxepZjLfK8nnNHDD/6/4Y9Y
 oISdkaNDQoNykYsS8t2njbL+od
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="65732036"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=gCvj+h00Np6vppn6MihZ4d+XagjxKonUze5xwd5z2iNtDdUD4Y112nnjy78VXfzT57CRDEuUfd7HktTlJrmmEJ52Wiqp1RchOAVMfebWPZ79QqPLn0fXC0lGk19bWrBl3jbGXF9vQ3Pnp0x5Hd4KdLICTv4JmXqo6M5+sqPlGVIdNVUzfwiK69im2mr7P5B9SnEs4LSVNk7WeeoptGeiEobhCjMzxZuxbODcyvxUDxqwhO+HfVWijDoTDpM0MJNPM+A8bZCibypRrSeUqZjDI/TbkfMSnxV2gXO5N+ipUpkgQvAC6FK774EugohCJ4CTh/6921jKeBMUn1p7d1IM1w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=8FpsNgGd4pW12nUfLqrWEI0Fl+hLrQ10LohQqvbxOoM=;
 b=N14wETthtrijQEYENdXdEHMKQKdjV8OfnLg8FpkkEvMK2slnd8KYQdQ6lRbEggvC+w6CH4xZwggKOoYOAbDR1HSKjGvrOHNU/7NLo5CgypxA2QocciV6J4YOXAeeBaFEFVvs1zmIDjf4POWWHkjgDf6imvWI4oGe7Iqz4cJdpOQ2Ysiz0NpEKd22gXW2heB/p3oswXAGQW2GTEQmqEtssVxWKBQ00aGbtcyQgs2nHnqUrRx0s1ve3jVIFqLx/5kjTbqLb0q50fEpqzOXRFdzKh4sr+OFTbb1PRTmpRAOtwXy6JnVieFwRkY7s1ygwbyLN02spANhiBHysQzlSjuxEA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=8FpsNgGd4pW12nUfLqrWEI0Fl+hLrQ10LohQqvbxOoM=;
 b=pyoj4TKlukta5uSDCQ3GCEFUd5ilDW3lDyu/IDIvMD4mOtqduynkcaC5cg1a0gC3VEqqUvXqTIjG2mgRi9WhwAU+nXEC3xgdKLvO10kpQlJxSXDJ6QKHOJG36cEK6WHAkGG9U4aw2ZNfPoKdon/BxJ/S6UolluOXCdKSODw8P0A=
Date: Tue, 8 Mar 2022 17:41:57 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v3 2/2] livepatch: set -f{function,data}-sections
 compiler option
Message-ID: <YieHVbKjtXY8vpOn@Air-de-Roger>
References: <20220308134924.83616-1-roger.pau@citrix.com>
 <20220308134924.83616-3-roger.pau@citrix.com>
 <c35415ef-b3c1-cc1c-2fb2-aa2de2602cd5@suse.com>
 <YidsSmPV1Pqulp+h@Air-de-Roger>
 <9cce44ca-3e31-bc13-3c56-2811efc36d5b@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <9cce44ca-3e31-bc13-3c56-2811efc36d5b@suse.com>
X-ClientProxiedBy: LO2P265CA0113.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:c::29) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ebf2c977-3868-4f4a-ba65-08da01229277
X-MS-TrafficTypeDiagnostic: SN6PR03MB4592:EE_
X-Microsoft-Antispam-PRVS: <SN6PR03MB4592EE9212348FEEA41F31098F099@SN6PR03MB4592.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(86362001)(6486002)(508600001)(33716001)(186003)(26005)(83380400001)(6506007)(53546011)(82960400001)(9686003)(6512007)(6666004)(2906002)(5660300002)(4326008)(8676002)(66476007)(66556008)(66946007)(38100700002)(54906003)(316002)(6916009)(8936002)(85182001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?TG9aZlZNeHNwWWh3UkJwMGZBRDlKalF2UkhLT2F1dVQ0Z2ZSVWtRdkJGL1ln?=
 =?utf-8?B?K3pqb1hyd2lETncwaFpZSUZIZkdiMnRBS3BHdG1YUFNZNnRvb2h5cW9iWjUr?=
 =?utf-8?B?MnY5WEdMVmhUOTE5emlVS0VBaEl3aEpSYWltcms2Y1UrcGc5T0RpMGRnT1lH?=
 =?utf-8?B?M3g0YTdVQ3RRY0dNYnhoUkMrY2Z2d3dFSVZNQUZZM1MxQmlaeVhzMnhURDY3?=
 =?utf-8?B?ZSt4cWcrWnJyZ2pjYjhLaDZHeDhacTNVV01wMmFodmFWUlprcElsZ21SdUsr?=
 =?utf-8?B?VDY1bEwxelM0UGd6bGd4dTNscEJVZkgwc2hTcUk0TGpUMW9tWlRDQjRNM2o1?=
 =?utf-8?B?VFRIellSaTVrQVIxL0JzN21ydDBlaUFhQ1dnMUZDUVZ3bzJDRmFmWFVpUFhy?=
 =?utf-8?B?TEdWdEhkT09MWEVWQTBSTnlKekhaQkF2dkl4TnYvUjBoVzVEQzFGeWdnY3NH?=
 =?utf-8?B?Y1dvQ1BLM0crb1hjRnJVVUZ4OGN6RFBMbTRrakc4WHFiektBSWthckpWY05Q?=
 =?utf-8?B?dENJaHgrRU5KWFl4S0ZURjAxdEd6ZmJHM2s1dTVwVGlBaDI1dGp5cDJKcExo?=
 =?utf-8?B?dmdTOWFhRFVtaE9Sa1pKZGVmYy8zNWVIWW00ZTFXWXNzVGQ0eTBqSEVRTUJ5?=
 =?utf-8?B?a1pGWkhYS1lMWVg1ankrYTJkOC83N0RPQmRRdXFacG5FZEF4ZWNQajJTVGZR?=
 =?utf-8?B?UXdFNkk0WHdLRTh3TmV6MjRCM2crOXIva2lMcGxtR2luVE1LenY0NnFySGpO?=
 =?utf-8?B?YWJzYUxZSFR1b1dDRG9ndUwySjlQek83N0c0TGlkTWg0aHpCbHV0RVRsNy9i?=
 =?utf-8?B?S05jcTd0S0RjUkVMWVFOMkRMclN4Ym5URTNrTytrQUIxQXAzQ3JIK3N2cmdk?=
 =?utf-8?B?blJjdmtkVEt2MGs4aklockdKTjNUaDRHVk5oTjlmWWdRbEtaTXY3VklDajU4?=
 =?utf-8?B?bWlpbStKbzBLdXVPa0k0R3paVFVSWjMvc2xnL0tRNkJ1cUpDNnhRaUttWlBE?=
 =?utf-8?B?cmRiSm5Ra0E1aU55dGtZTFhmMTFMT0xzY2FnUElUOFR5U1dhOGI5d0tEZnFE?=
 =?utf-8?B?Nlp0K1kwTHZGNWt4RU9iV2J2czJiVStMaE52Wk9qWDJVT3FhYVMyTFd0ZEUz?=
 =?utf-8?B?TEovS3dLcmFrUGppQWY1bkdSK2FJRStFSVhSWEsvOFUxb2NyY056ZmFHRGts?=
 =?utf-8?B?NDN2S3Ryb0ZLTEZxajdMOXhOc0hyR2pQZDY3SzFnSTV0VTBNOVVtcE5WQjE1?=
 =?utf-8?B?Rjk5RWc4UmYwanNTQU1TSTlDWTdJZUZhQnh3dzBYWTg5djdMZWRBdms3Vmcr?=
 =?utf-8?B?aXdhMWNYT3o4ckt3WUhKQXlUcE8zNXRySEdaZ3hBM2J5RFJqZlVxSm9oUC9C?=
 =?utf-8?B?ajJFbGkzaHJGS0R2clBUa2gwTnNERXprQ2o4ZkJJS1pYL2VpVFZlaXQyOUdO?=
 =?utf-8?B?akNXeUNSaUJkVTA5aUxJTGk2dk1mWnpHU3hzTVNkdGdWNy9wTkVFS1NYU0Na?=
 =?utf-8?B?TGJ3NXZGVGlUT0piVGRTaXpxeHl4c3RoQ2hKTEg5WVBpZWgzSjNLRC9DWXJE?=
 =?utf-8?B?TnAySlhScmxlRWVUUzlxcmE1cjg2YXRXMXF0eXlxbm5idEJEcE56VUdENW1w?=
 =?utf-8?B?M1kzYlN5NURsVDhmdTdEUzNXc3BDcVlOOFVBUU1sa1ZrbFdRMkM2QXpBR3Y5?=
 =?utf-8?B?RXBqdWcrbXVwSUw5NHh2Ykh4b3U3RUZJSEY1YmFwcUI4QlZPeU5YQjJMU2lz?=
 =?utf-8?B?Z3ZPZVRtcjY1VW1xSWYzTDVCV2QvUzJNMEFZUC9zU201c1Jubi9sbDV3VGg0?=
 =?utf-8?B?NXcrTjAwaEJwdGJKMEJaaFBobndpLzFpZnFuOGpBOWdoZTlYS0hiYWs1d3NG?=
 =?utf-8?B?bkthNWFjTGNGTXlwUUphZXA4Z2pheXhtSTU4RnZrTnExWDFMV2JBVWljM0Nw?=
 =?utf-8?B?NU5UNnd3dlQ5MGp0ZGR1bmtuQTFtK3VHK0gzVXUydVJCZjJWSnkraHo1T2Vq?=
 =?utf-8?B?SkhjVit1RGNUb3gzL0E2VkJIRDkrdkwrM05CS2M5TVlzVjZDYzh4SzdOTmU1?=
 =?utf-8?B?cFdNNjRhcEtycTV4WE92MndsZ1pYSUdJSkJrZ1JPeU5MK01pb0tPYll3K3dy?=
 =?utf-8?B?Wi9DNEtPSGZtbGZBSStzRUpHa0Y5djM4bVB0MWFvVVgyMnFwUE5Cb2JwS3RZ?=
 =?utf-8?Q?STKuaUz7YN43D94Vd/HItgM=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: ebf2c977-3868-4f4a-ba65-08da01229277
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 16:42:02.8556
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Yb5xglcUW2cKCAVCKzZIucwdSTRTLFtqJ0TVkzZM+mfPVWR//79WHx5fta2h8teB3M/MQgmHuDFiRoTbERx6kA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR03MB4592
X-OriginatorOrg: citrix.com

On Tue, Mar 08, 2022 at 04:13:55PM +0100, Jan Beulich wrote:
> On 08.03.2022 15:46, Roger Pau Monné wrote:
> > On Tue, Mar 08, 2022 at 03:09:17PM +0100, Jan Beulich wrote:
> >> On 08.03.2022 14:49, Roger Pau Monne wrote:
> >>> If livepatching support is enabled build the hypervisor with
> >>> -f{function,data}-sections compiler options, which is required by the
> >>> livepatching tools to detect changes and create livepatches.
> >>>
> >>> This shouldn't result in any functional change on the hypervisor
> >>> binary image, but does however require some changes in the linker
> >>> script in order to handle that each function and data item will now be
> >>> placed into its own section in object files. As a result add catch-all
> >>> for .text, .data and .bss in order to merge each individual item
> >>> section into the final image.
> >>>
> >>> The main difference will be that .text.startup will end up being part
> >>> of .text rather than .init, and thus won't be freed. .text.exit will
> >>> also be part of .text rather than dropped. Overall this could make the
> >>> image bigger, and package some .text code in a sub-optimal way.
> >>>
> >>> On Arm the .data.read_mostly needs to be moved ahead of the .data
> >>> section like it's already done on x86, so the .data.* catch-all
> >>> doesn't also include .data.read_mostly. The alignment of
> >>> .data.read_mostly also needs to be set to PAGE_SIZE so it doesn't end
> >>> up being placed at the tail of a read-only page from the previous
> >>> section. While there move the alignment of the .data section ahead of
> >>> the section declaration, like it's done for other sections.
> >>>
> >>> The benefit of having CONFIG_LIVEPATCH enable those compiler option
> >>> is that the livepatch build tools no longer need to fiddle with the
> >>> build system in order to enable them. Note the current livepatch tools
> >>> are broken after the recent build changes due to the way they
> >>> attempt to set  -f{function,data}-sections.
> >>>
> >>> Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
> >>
> >> Reviewed-by: Jan Beulich <jbeulich@suse.com>
> >>
> >>> --- a/xen/arch/x86/xen.lds.S
> >>> +++ b/xen/arch/x86/xen.lds.S
> >>> @@ -88,6 +88,9 @@ SECTIONS
> >>>         *(.text.unlikely .text.*_unlikely .text.unlikely.*)
> >>>  
> >>>         *(.text)
> >>> +#ifdef CONFIG_CC_SPLIT_SECTIONS
> >>> +       *(.text.*)
> >>> +#endif
> >>>         *(.text.__x86_indirect_thunk_*)
> >>>         *(.text.page_aligned)
> >>
> >> These last two now will not have any effect anymore when
> >> CC_SPLIT_SECTIONS=y. This may have undesirable effects on the
> >> overall size when there is more than one object with a
> >> .text.page_aligned contribution. In .data ...
> > 
> > Agreed. I wondered whether to move those ahead of the main text
> > section, so likely:
> > 
> >        *(.text.unlikely .text.*_unlikely .text.unlikely.*)
> > 
> >        *(.text.page_aligned)
> >        *(.text.__x86_indirect_thunk_*)
> >        *(.text)
> > #ifdef CONFIG_CC_SPLIT_SECTIONS
> >        *(.text.*)
> > #endif
> 
> Perhaps; I'm not really worried of .text.__x86_indirect_thunk_*,
> though. When adding .text.* that one can likely go away.
> 
> > FWIW, Linux seems fine to package .text.page_aligned together with the
> > rest of .text using the .text.[0-9a-zA-Z_]* catch-all.
> 
> There's no question this is functionally fine. The question is how
> many extra padding areas are inserted because of this.
> 
> >>> @@ -292,9 +295,7 @@ SECTIONS
> >>>  
> >>>    DECL_SECTION(.data) {
> >>>         *(.data.page_aligned)
> >>> -       *(.data)
> >>> -       *(.data.rel)
> >>> -       *(.data.rel.*)
> >>> +       *(.data .data.*)
> >>>    } PHDR(text)
> >>
> >> ... this continues to be named first. I wonder whether we wouldn't
> >> want to use SORT_BY_ALIGNMENT (if available) instead in both places.
> > 
> > We could use the command line option if available
> > (--sort-section=alignment) to sort all wildcard sections?
> 
> Depends on the scope of the sorting that would result when enabled
> globally like this.

I'm not sure I'm following. Don't we generally want to sort by
alignment in order to avoid adding unnecessary padding as much as
possible?

For any wildcard sections we really don't care anymore how they are
sorted?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 16:48:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 16:48:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287225.487115 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRd0c-00054J-IQ; Tue, 08 Mar 2022 16:48:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287225.487115; Tue, 08 Mar 2022 16:48:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRd0c-00054C-FD; Tue, 08 Mar 2022 16:48:26 +0000
Received: by outflank-mailman (input) for mailman id 287225;
 Tue, 08 Mar 2022 16:48:25 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRd0b-000546-6J
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 16:48:25 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 9154a96e-9eff-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 17:48:23 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2111.outbound.protection.outlook.com [104.47.18.111]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-4-tCKCkwzANDyED-vt4bzypA-1; Tue, 08 Mar 2022 17:48:22 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR0402MB3603.eurprd04.prod.outlook.com (2603:10a6:208:26::22)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Tue, 8 Mar
 2022 16:48:21 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 16:48:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9154a96e-9eff-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646758103;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=RN1IwbWPZceqhd2HFBYkWltsZcbgxVL2260vwu1Q87s=;
	b=JAVRJKKSxIGAaxY4LXIEzlAOjJUS1mCBFeVqFoKDZ8cPGELpZw5bbN3CTSDEeCxL64APAQ
	BaOT0hqfoiEiZmeAEYpjEa5WzluP9XmkiJZSNT8N9OMy7B6L5pJruVqaZuNeSSGJZ8PyDt
	tTVDov2hwbo89vFiwz/F/YqAXfeyxSQ=
X-MC-Unique: tCKCkwzANDyED-vt4bzypA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=LjraGMx8suFMv4N25FYFBD6lWv1YLBejdaKISdEy14ggfpDFyQJIQo8pr8Nq3daOLwTO8rSDla2+ImbBIcubIvMBBNdUN1FLouvSVftX0lJmSvSmeNYQ47lmxmCp5ERMFLDiXz7qeIPbWHn8xWZ3DBJXSNCh70AyMOD3MNGgm7T3llnq7j8AoQ+Lh1N5BlEcDbde4LNMdmcYxKGFxuiuRQlbGFbL+xg15NJnwaNUKKR6sAuAYObQIfee8mFMaNaRJ3ojp16zpA/VD2vlrKlnNh3FD9m2vr8sR/OTmbjIgspqN+BZwDHeNtdiwuZs/Ck8alhRGggrkGP+jC5+R7PVDQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=M3CUNcJZnIcenVxqE9hGpM55RqJyLk7VV5qHTzznDBY=;
 b=IoNhsawZSWcU9aQvVBYNbm023QLo0BciPuhGyoODzzrJ1gZBBzCO7DuRvI2fXO2U61XRnYsqhgkBwYQuYnzbhH/o0txE1Dl4bfuau0MxU2kBkMKwIAmUkGQvQtF/3nbRXQDJeLEJoowjXz1qfqxm1+dwEHJRAU2PEajs9VXIvbK1kbboTFjpqZiW6HZ+bty5uv/knsXrTEYVz4CS3df9tuvijv6wM9ICSz78KP8Rt4F8uCEWpWt5WNw5bYl3KKC+UOsJvRLqypl6juWcINST5UGNFO+nFSJIL28HxWWLiLX9HkKHi9lLDTiUH3LcFVgeodsF9wJjcIx3ZbpGl/setg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <85db9418-0452-d07f-b8bd-3713cb94dbbf@suse.com>
Date: Tue, 8 Mar 2022 17:48:18 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH] x86/kexec: Fix kexec-reboot with CET active
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
 David Vrabel <dvrabel@cantab.net>, Xen-devel <xen-devel@lists.xenproject.org>
References: <20220307205313.31247-1-andrew.cooper3@citrix.com>
 <c3d9a1db-bda0-22f4-6733-11dfbb1bebfb@suse.com>
 <d6112602-b488-0b63-0131-fedd39c05eae@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <d6112602-b488-0b63-0131-fedd39c05eae@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS8PR05CA0013.eurprd05.prod.outlook.com
 (2603:10a6:20b:311::18) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 963aa1b1-6796-407d-f914-08da012373a0
X-MS-TrafficTypeDiagnostic: AM0PR0402MB3603:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR0402MB3603CBBF926F069CE96B4118B3099@AM0PR0402MB3603.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(83380400001)(54906003)(8676002)(66556008)(66476007)(66946007)(31686004)(186003)(26005)(4326008)(316002)(6916009)(31696002)(36756003)(2616005)(8936002)(6506007)(53546011)(6512007)(86362001)(2906002)(38100700002)(5660300002)(6486002)(508600001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?V5bRVTRlAafNnkoMgFReMiKdNiWQS0FkKwmUrnvvU/RytOe47SkGIJU5Um+z?=
 =?us-ascii?Q?5ktqfexGAsLrV0AZPhcQ2BM05dSG0lHnLWFOFP2VO5GTB05ftWYxkU1PfcFo?=
 =?us-ascii?Q?wekTGy7vKj+92xPwwEzrIBYgg+HGzmiAdZszKGOMccEWox7drcHMvMPVwr3+?=
 =?us-ascii?Q?Y7xtm0jvQgwrx8uXTgKreB0FxqqsC3AUhAetTWRMxN5fiOt1oxwokOOk5GmY?=
 =?us-ascii?Q?jgopQO6e80PD/thbz0ITqhQnGaLwgL590By4SFy/TAoPCx+p0ZZnpHdtx5GK?=
 =?us-ascii?Q?U5Gg43gw9swwy6ogFkngI0fiqpCXghohu6pBgPWyQBSpOTMRL5cJpPu/DLWK?=
 =?us-ascii?Q?7nPo8SVyce6TuLgL2rHFJvq08M69CWRploHapm1DPZmJhUq5+HRULTSD6GXX?=
 =?us-ascii?Q?WPmuiDE7MDUCeZADwNWho1tLwRcPEd6m4P1QTdX+cYVr7EJD76iIOWNln1bL?=
 =?us-ascii?Q?z8r7vD9cu8mWFcbwQJrIsdj6aMCny5nc8ypSqy3ywKN/z82F6DrMElq2tgjI?=
 =?us-ascii?Q?xSGSfgEIBL941chYaLB4qKQPNraCkLtQqQEonHrUT6+0idGoCQSlFtsu2Oyc?=
 =?us-ascii?Q?p2n/fE5aSxK+42mZ9a4oF0IKwUEw+lDs5r8jDl1B/HhfwRXv7nGv8MNafWRs?=
 =?us-ascii?Q?svgyDv5C1B9B8XbMqJt1P80r3l81sA9q3LDTBOwulRiRuyqPD0H1XviA3e2z?=
 =?us-ascii?Q?SCc0yPSbQ/C48Y/ZdoLTGYBOmZbHCwT7RpUNoX0LXSNF0Khex5eO3uadIS5i?=
 =?us-ascii?Q?TAcTjeSKyEdKhtz3+FvHiJ4KOgEPSXw+0B2GFDGzeZpJCtNJP+dsSqFpG1Re?=
 =?us-ascii?Q?uBHYSxyvbcbal0mg9ISL0cYIBCEoNDwCDx8KxWHM9q/fRMw9vhPvSTEJll3x?=
 =?us-ascii?Q?T04BLLUlrxlvRDUvFvHO9HAmzQle5164rtO630depea4oQ0VN9sDcDoW3kqD?=
 =?us-ascii?Q?cS239+XCZiRpjWf3chSDXCCZaeLsFIigjfn1y5z3+GDM2ByLCZsXMC6uTu3M?=
 =?us-ascii?Q?DPTiky711v6lp1FuUV0cA9hEpvJCR6N5nmFreXcKF8l8K3+izFMKTiliY79J?=
 =?us-ascii?Q?9IaHdYnejARK5+WHbs8qxUystiqsonqv23Ijhli7yVSwCrZTXSxlHYQr5rK/?=
 =?us-ascii?Q?716ykSBbsMuN1cbuoooIYbNJFQ7WeJ2m0vm2YNV9XzujftntHWBA9gWNVKod?=
 =?us-ascii?Q?HSM1uoQ/5ybqBSuvDcG/8Avi81vTaSU0SYohA7dWgL466UeK280bWOK1cOo4?=
 =?us-ascii?Q?0N0HYhgVPFhXOWGezVrclyIz+ObN2/nF9yZVvaPVAQqU81dAU/xhwluWg7PY?=
 =?us-ascii?Q?ewd4a0K0dK1WvZ5NgSQRPqoFNubtTgTeInW+Q7RQ4o2AScCEguCxOJSgQmda?=
 =?us-ascii?Q?LqsUMMskqRNGNcGWtDOTUeB0Ztu36Qo2jEqwni6b5UKvYs9Cn1AlRVR1NoQO?=
 =?us-ascii?Q?G38eQ/bCAqtIq+GJdfBJ68R9zBaeDmoZe7wm+jlEnhGbixPtSkbLUIeMN1zI?=
 =?us-ascii?Q?cpNuiEat3SHbtqe4QPABxDxOVq8eozgjb8EjgEEcNRiDNb/mUHajRGYROssw?=
 =?us-ascii?Q?JPlUBGQKDvd5VCm3M6yTZTO/vc1w1OeNzeiSkd5iT+DwMOt8VeCwWPaX49Nz?=
 =?us-ascii?Q?JUT0HWpmxv7IbR7zC5VrYmE=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 963aa1b1-6796-407d-f914-08da012373a0
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 16:48:20.6914
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Wq6/tJxO7e0ANztSSQ88oVPYOW7K8xab80W9AA1I+Jo9t5Vd/heuB0KO9Dh1arheGCjeGNDHTFZPyBiVSy3gKw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR0402MB3603

On 08.03.2022 17:22, Andrew Cooper wrote:
> On 08/03/2022 08:15, Jan Beulich wrote:
>> On 07.03.2022 21:53, Andrew Cooper wrote:
>>> --- a/xen/arch/x86/machine_kexec.c
>>> +++ b/xen/arch/x86/machine_kexec.c
>>> @@ -156,6 +156,16 @@ void machine_kexec(struct kexec_image *image)
>>>       */
>>>      local_irq_disable();
>>> =20
>>> +    /* Reset CPUID masking and faulting to the host's default. */
>>> +    ctxt_switch_levelling(NULL);
>>> +
>>> +    /* Disable CET. */
>>> +    if ( read_cr4() & X86_CR4_CET )
>>> +    {
>>> +        wrmsrl(MSR_S_CET, 0);
>>> +        write_cr4(read_cr4() & ~X86_CR4_CET);
>>> +    }
>>> +
>>>      /* Now regular interrupts are disabled, we need to reduce the impa=
ct
>>>       * of interrupts not disabled by 'cli'.
>>>       *
>> Besides introducing somewhat of a disconnect between the comment in
>> context here and the earlier local_irq_disable(), is it really
>> necessary to do both actions with IRQs off?
>=20
> We are a handful of instructions away from discarding Xen's context
> entirely.=C2=A0 IRQs are not a relevant concern.

Well, as said - the comment was what caught my eye. But as you appear to
think that slight disconnect is not an issue: I don't mean my remark to
be an objection. Feel free to commit with David's R-b.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 16:53:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 16:53:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287232.487126 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRd5J-0006Vt-88; Tue, 08 Mar 2022 16:53:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287232.487126; Tue, 08 Mar 2022 16:53:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRd5J-0006Vm-51; Tue, 08 Mar 2022 16:53:17 +0000
Received: by outflank-mailman (input) for mailman id 287232;
 Tue, 08 Mar 2022 16:53:16 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRd5I-0006Vg-Pu
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 16:53:16 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 3f8bd68e-9f00-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 17:53:15 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2104.outbound.protection.outlook.com [104.47.18.104]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-30-W9PLVU0EP1ecIuuhKrcu2A-2; Tue, 08 Mar 2022 17:53:14 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR0402MB3603.eurprd04.prod.outlook.com (2603:10a6:208:26::22)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Tue, 8 Mar
 2022 16:53:13 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 16:53:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3f8bd68e-9f00-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646758395;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=EZPpb1l88JCp3Kq6/UAR63UxqDeOO39F/yVuML7gkHM=;
	b=Ii0u3Cyxu07RHSLxf9m1YfpraDwpHLQBvSXzqDlTOOh9aUjFwx1p/CdC4DWKMpPFBQkFMw
	xRfoYt4uuEXKn6KXb3ACwf9UvrqJM4cdHH0m1cmNZ5cvR19KzJjjuS+nup3MT3wMzOhE+h
	qouCgiAtOAS74N6IXAI2LlHSqIr8Rck=
X-MC-Unique: W9PLVU0EP1ecIuuhKrcu2A-2
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ntuCSXI+b+C6Mp8vGGsUYBoQF4omQzJnz1fhHstYjKapppnzah9qp4QhEAnJd3bwOxGMDAPeLhpHuUm2iVIRVNzmu3e+fGP35BuFMz69HmzFbHUEmzixjqZeEQxSCrLxCJwPPXu0gJHd8qOY5NuEn8h92h8ITsJBd22tDr7x5BuusZ+6JSDewLqzl1WLPNyb2qmi+cEJJjuHun/2C5TbcFBIiERkm8oz3W6lVG/ShkWWC+NiXAXcXwqYv4Qke+PUadVcr4oYABrQuI8JfW4w4T9YxLlFrA9YgskxWPRuslwVI3cta0A+PTGB6VPaQMCwBfFy88U7aZvXPsmMQeSGiw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=n+2Ls0OgjiwbyRerevIP0KKIiPnSbGETld3+mPdUBRU=;
 b=B3Iey5BPDCJW40hsyF3DdLAZIbnq2b2o8HaQxm3szDY9jdoqsMNqhob1YPjdb7a7P/VKyjEMSn0BcAVZpsLDpWX6QV1GiBtz5eb5v40NDEMTDTrYkoTgNcFKs5M5/q4U1joSCLgAplb1/SHYjG7BZdGcLK4GGHUENRrccQPztKipnP3mIbG0rMxuf88JQSmzSs6BNhnpkesP0u3q2v6TQyDHlyWHDmvrOLqzC1LBrU/OJjWKXY5r7GRP7qc3J5Q/ksd0E34oFshFtWIjzTG1VP8IH7YYZzyNwWnb4X9CNq1VqNOctyn3Aw6U2Clb1ITeAt4BOUNhA7BH8mU4I5nGTA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <be4b48a8-fadc-4f6e-4493-51e9376a2028@suse.com>
Date: Tue, 8 Mar 2022 17:53:11 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [RFC PATCH v1] arch/x86: Livepatch: fix overflow check when
 computing ELF relocations
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>,
 Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
 Ross Lagerwall <ross.lagerwall@citrix.com>, xen-devel@lists.xenproject.org,
 Bjoern Doebel <doebel@amazon.de>
References: <b74a68b038c31df4bb94a5b5e87453f5a249cfe2.1646753657.git.doebel@amazon.de>
 <c625d90c-ec0b-a2c3-cf93-08c99cc2f3ce@suse.com>
 <YieBJTHJBiUUqMCU@Air-de-Roger> <YieDtMqn+z5Aydkp@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YieDtMqn+z5Aydkp@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6PR04CA0052.eurprd04.prod.outlook.com
 (2603:10a6:20b:f0::29) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5fd429e2-babc-41b7-990a-08da01242268
X-MS-TrafficTypeDiagnostic: AM0PR0402MB3603:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR0402MB36038BEF21B3546052AEFA0EB3099@AM0PR0402MB3603.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(83380400001)(54906003)(8676002)(66556008)(66476007)(66946007)(31686004)(186003)(26005)(4326008)(316002)(6916009)(31696002)(36756003)(2616005)(8936002)(6506007)(53546011)(6512007)(86362001)(2906002)(38100700002)(5660300002)(6486002)(508600001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?kEa9O9Mo+jVyVBQIQtN4Vr/w8b4SH3yXlQG3gIMwVVEmgEg7EaWe/hLIajAm?=
 =?us-ascii?Q?UYzeE3e7AF6UdmIpux9I/C4l9olM63hf83qwzi+y7BuOc6KvllCagp4nbT91?=
 =?us-ascii?Q?wXQdxfkg2FRW72Uqie8c1Uj66yuRzT80F3GaXFhlnpy+DIMePB2D+O3McBJ9?=
 =?us-ascii?Q?XGhxFrxt+rxg0R3EdrVID0oWvThby58cJE8NRoaHDThS7bPPko6V2JJqIoDD?=
 =?us-ascii?Q?lzf4L4w9NefLr5n8jM4b7SRyswi/b34H7AG/B8jdanJ0NPvOvjmI/k+u07Dn?=
 =?us-ascii?Q?CYzoZKZNkA/Ri+zB1B/L0QDAv2naNVISREi12gB1lnEPifo3KT+xXp9lYRpj?=
 =?us-ascii?Q?Mv2ZhdKmbtpj4+jg2T0qm98mAevK35y78hyrxHEh7ZjY7qIvM+OZMkNy0zN+?=
 =?us-ascii?Q?s1neGYDCCeT4+0YEUzAb0ze6gr7rVUKiT0RZ0BWQjBfFVDhHvDWmXmAVp4eZ?=
 =?us-ascii?Q?5furUAjZXe2Q7OD2wb4pQdXOBznibq9JvK5jE+CIwQJf7M4mv37deIEDV0w4?=
 =?us-ascii?Q?4p5YHqZJab9bNn2d/3an0C9oXkNficTPejkQVlnLVxQd7+NnwU3xEqn8NhYs?=
 =?us-ascii?Q?XGQ3laJa1BbYI7xegoT6gpm42z6Z4dHFbnDDQtt/ab/o+5+8JiwwxZYFpF3X?=
 =?us-ascii?Q?ymNKMq4Q1apQxXReK8zIxCCyZtcT+n8agnMgXnmAL8fDTR6XuAoTaQ7SQZLG?=
 =?us-ascii?Q?LgAmLTEAGULapEUqfCnfzMNf+dc4pTnq6Tn1CgtUekVNhJE2+7wDhFWU/OBQ?=
 =?us-ascii?Q?3LPl1WI/lJ8JD9vBaQTpu80CriuRd0At1VA7q7UZgEponPpWEd93CyALLmxk?=
 =?us-ascii?Q?ftYcusnBe6ZkiY/feO4H2prW7STRyaNOEuTIbhkeCf9KcVYQp8tcAyQm8yYg?=
 =?us-ascii?Q?OmsYr6whm5Zo3uHnb1/yN28JDXNfsF/k8avwOKYR+xFr5lndT+4SvVf88xcI?=
 =?us-ascii?Q?jZeAoEdzi8uQWXUMKMuJS/JKwa8Ls1Ls46Jot6QkX6mY9Xztn/0Dj38DjBaN?=
 =?us-ascii?Q?Lp+pyjy6oj1eewIglgnd8Jr654sacRJtVcaOKrlDnfm1/VZF7cDiDM5GL4Xx?=
 =?us-ascii?Q?Fci6/tp3K24xcqevrZCTVavsqVPCqQ+KhR/4NNrMqbFQS19eqzJGscHKos8e?=
 =?us-ascii?Q?IECt6maZlLbf5ciSjm6Jdy2sNIaarcIt6nG2AxmX8mTiUy89Zl3Ri4dNC4Vj?=
 =?us-ascii?Q?sMrIGWrMhY1DP/HJpPN6XAc3ZalJRIgzuwQ79X2rlNmI1Xhe3bxPQAHRXYei?=
 =?us-ascii?Q?tKRVH433dvOicnKtIcc3HGguSiaxPm7QAkQG376sDMg4tv/3Iri+Hrl0hLWB?=
 =?us-ascii?Q?f+lOhGzIxwMe0I+hsFTQLItj3HP2H/h/gKdCI5ZN7zj13ep6qUUWpPSEIGS3?=
 =?us-ascii?Q?99IAu+WOjRysOaPtZEuUld3ylk4H6vTr/wK0x8YDUFVTr5JcTTzI84RAFvsr?=
 =?us-ascii?Q?Ar2VM7I0QekVXpHurKZc1nfWwq09IUnM2YDtAmt14H6Xru9Og4yMI+yeVoXI?=
 =?us-ascii?Q?GMiY1IPRI6kSjqjP50UhM4gh2qmuoZbJ7KPkrSJENzsDnfuA2cjs9XdKlwJr?=
 =?us-ascii?Q?2RBFLkXX/Xl6kiuKEqVoto7TuhAR9AvmqkYtppjNsSnXyfmgWq7HPawkIA7f?=
 =?us-ascii?Q?xVkUG+IO7knUnaGjSLuUir4=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5fd429e2-babc-41b7-990a-08da01242268
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 16:53:13.5014
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: JnhIA4gSY2gEHc0yK/jENUh0lTiS3+0wVMZwchOdceHrzxe3Ny4R29hYCl2IJLd1yKlGnMX4vlIxtEWc6k40hQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR0402MB3603

On 08.03.2022 17:26, Roger Pau Monn=C3=A9 wrote:
> On Tue, Mar 08, 2022 at 05:15:33PM +0100, Roger Pau Monn=C3=A9 wrote:
>> On Tue, Mar 08, 2022 at 04:45:34PM +0100, Jan Beulich wrote:
>>> On 08.03.2022 16:36, Bjoern Doebel wrote:
>>>> --- a/xen/arch/x86/livepatch.c
>>>> +++ b/xen/arch/x86/livepatch.c
>>>> @@ -339,7 +339,7 @@ int arch_livepatch_perform_rela(struct livepatch_e=
lf *elf,
>>>> =20
>>>>              val -=3D (uint64_t)dest;
>>>>              *(int32_t *)dest =3D val;
>>>
>>> Afaict after this assignment ...
>>>
>>>> -            if ( (int64_t)val !=3D *(int32_t *)dest )
>>>> +            if ( (int32_t)val !=3D *(int32_t *)dest )
>>>
>>> ... this condition can never be false. The cast really wants to be
>>> to int64_t, and the overflow you saw being reported is quite likely
>>> for a different reason. But from the sole message you did quote
>>> it's not really possible to figure what else is wrong.
>>
>> It seems Linux has that check ifdef'ed [0], but there's no reference
>> as to why it's that way (I've tracked it back to the x86-64 import on
>> the historical tree, f3081f5b66a06175ff2dabfe885a53fb04e71076).
>>
>> It's a 64bit relocation using a 32bit value, but it's unclear to me
>> that modifying the top 32bits is not allowed/intended.
>=20
> Urg, I've worded this very badly. It's a 64bit relocation using a
> 32bit value, but it's unclear to me that modifying the top 32bits is
> not allowed/intended and fine to be dropped.

I'm still confused: Afaics this is in the handling of R_X86_64_PC32,
which is a 32-bit relocation. Only a 32-bit field in memory is to be
modified, and the resulting value needs to fit such that when the
CPU fetches it and sign-extends it to 64 bits, the original value is
re-established. Hence the check, aiui.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 16:54:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 16:54:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287237.487137 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRd6T-00075W-IT; Tue, 08 Mar 2022 16:54:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287237.487137; Tue, 08 Mar 2022 16:54:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRd6T-00075P-FD; Tue, 08 Mar 2022 16:54:29 +0000
Received: by outflank-mailman (input) for mailman id 287237;
 Tue, 08 Mar 2022 16:54:28 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRd6S-00073Z-DB
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 16:54:28 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 6a22bf52-9f00-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 17:54:27 +0100 (CET)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur02lp2050.outbound.protection.outlook.com [104.47.4.50]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-11-5mKv7_ueNaeumMiCnW44Yw-1; Tue, 08 Mar 2022 17:54:26 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM6PR04MB4613.eurprd04.prod.outlook.com (2603:10a6:20b:21::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.16; Tue, 8 Mar
 2022 16:54:24 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 16:54:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6a22bf52-9f00-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646758467;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=46rokF3Lxsgt/ZR3Ph9clZAayFv0/8XlMx+LgRvaLOo=;
	b=RUHybXpUmDrAX3PmfqjA2aFvJb6O8bv66c9rdQHFg2MyfX+HSPrWdz/PmoQ9rasr7V0FiP
	6pVc3CJzMjFxr0Qhk8Tx6os1dg/O+3D5eiriR5yTroUd60mwLZmJ9mQNE4MxTQngCJBidS
	+7QTXInC7Zr1ytoVoVCv+pDro0ONtD4=
X-MC-Unique: 5mKv7_ueNaeumMiCnW44Yw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=YAyow/pHDP8SZKy7/9zFIdVXTB0irYMRdSaATz4Lva3b1+pRDy0wZEIblsP+tev+iX+RJO8td2cOmfBbIaVXgdNvXTS/XXYfK/Z/tqwmooaChKpg6BdIITa3AyJEYeK82hO+YZZzYSaBLWQZHGt4j22dV7QGRFld7zCeNcTn3CTJB+Uro3ouuGfnoCcDVzVKt+AeJ/A65VHWnQVnmIoNvoxbMjm+yCwFXicaGvKHNtRCZMMaV0QYT0GZFnuROJx6sWEUCPdWwefJsjRVKQFRJuRqXSzbbuDM/Z/ElJTCg7SzQEiAv6pkL0gbiB+Wqwz4TeM56QwgRy/b5Dx4EJE2vA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Das1Cc0UZsMKw8U+GV+gAfi+gqzVBn1FjHp8HOYO4p0=;
 b=WsxGgl0yenSWWPFo1pzGfVWvUXOi39eZZTPOzI4ScmpMBuLHkknjklkMRMOjV2rKSih13BmjvrsI/MNJAj6RQTLTxl/94R/YOBm+L1azb5OcAiWeeuqiXi9BQq3SgGfl04/8Uos8WDxZqvzQfHBfvJVbvqPF9Hlkir0XbzI96plL7fOSeVI7y/xUudP835gPB3ZFfWS6apoub11nFumuHtY/QQ6ukq6+U0Pou8ZiqpblmCdayxskkegmrpE31H1pnPjlDBXnmSb5Tg+XhBmAiEctXUJBFfIyNAgehcSTSERZuC6LWtUziS3wgfuF2XIQbynej80yot+QB82AfWjqtQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <fc643a5b-4025-a9bd-ded6-6a5d831c1d05@suse.com>
Date: Tue, 8 Mar 2022 17:54:22 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v3 1/2] xen/build: put image header into a separate
 section
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
 <julien@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220308134924.83616-1-roger.pau@citrix.com>
 <20220308134924.83616-2-roger.pau@citrix.com>
 <c2e15d35-91b3-ba29-eed0-92fa19a692e8@suse.com>
 <YidlvWBauhcrAQa1@Air-de-Roger>
 <8f37e018-ab41-3e4d-14c7-1a25aa35e958@suse.com>
 <YieGEMpcSl+qdZ1e@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YieGEMpcSl+qdZ1e@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6P195CA0063.EURP195.PROD.OUTLOOK.COM
 (2603:10a6:209:87::40) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 812add7b-cb15-4f15-212e-08da01244cb0
X-MS-TrafficTypeDiagnostic: AM6PR04MB4613:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB4613D8135E94EE8D657819A7B3099@AM6PR04MB4613.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(186003)(316002)(31686004)(54906003)(4326008)(36756003)(31696002)(83380400001)(6916009)(86362001)(8676002)(2616005)(5660300002)(66946007)(53546011)(6486002)(26005)(38100700002)(6512007)(6506007)(508600001)(8936002)(66476007)(66556008)(2906002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?aOZW0f9j+G47izK6mwRRivqsl+4co+VgsmrQLVn5G8U5hMVHrjoCHzveaOa1?=
 =?us-ascii?Q?s/n3Rpjjte97hyde7ULODBEYH0kcGjXlhOYRVdN0Ndroxr8aVI+OKLzPAJ6S?=
 =?us-ascii?Q?P9wc0BAvBTe8q8GhhRbMgYFM04fJoUMbXx6QQNAaLxBxL+ddQQn7fmd8Rfa0?=
 =?us-ascii?Q?VuWEz7f8XI9RSa1brFeURdGbagQeXJRnvRFgsVuXRkfKYy7le7XIrIe6Qo2j?=
 =?us-ascii?Q?4LTttIBHLsCesRB+LHc9ZVVWsYcHybMzCUTQTJROq2+VbrAduxEoJZ98l2L0?=
 =?us-ascii?Q?JvZ1NAXVYc9gdzuU4IpDOyks1sM6F/Ggjp2AmQksrqyz7XHQdYB6nFuttT0B?=
 =?us-ascii?Q?FVqsIouV4yLQCm/kwgPjHcPLYQ4OoocN8rmUJbmrqxAB5HY1A00bUFIMcCw4?=
 =?us-ascii?Q?k+7GT4YS0vAkelsUfC4Ps2mqCUJbDw9emAubH7aQj6EcDudd4d9CXvVqTyMi?=
 =?us-ascii?Q?AzjrdmMOSIYAHD2rOo5q3r1KPwwYIzzoIC0AAeB6+0ZqRcaFnmSpJwYxW5Fn?=
 =?us-ascii?Q?VCQ28h/5tBvueTcqCq8WJvZzcRPGEurh1/nAET2uc2chc+fCrXTcHA/CZdjw?=
 =?us-ascii?Q?0Uv5ax99AVbGJaQv6+GI1u68V6A8j2qgAdT8Zt2Joh6eYcWuWEQ40vGsi8h8?=
 =?us-ascii?Q?irD2AgaPao2pq/dZ69EeE+nnUurAD8xYwFzOY955ZnQNlWorx/mwyB6vusn4?=
 =?us-ascii?Q?fD0PX9tB05S5duk7CjIlhIjbLeVZGEPOP/uTm9pmqWz6w80COv4XkP6btejm?=
 =?us-ascii?Q?Sq0Q4xzJcmnCmWtvXUwcwM8WVn6tn1ry2tv50/Gxp1vE78na4Kd4OnnM3Fzt?=
 =?us-ascii?Q?no9fymkXrP1uz/xKM8AbkjADDT1o7qD4Tnju6gBUCDLXdxDnz30SqOQEHdJY?=
 =?us-ascii?Q?8KvdSf/F+Uyq2ynvXa0y6AKEHBz5p2L2wxy8eYZKntBSI6LsqYaBI7gUnSYw?=
 =?us-ascii?Q?Pgcb0TtmPFvGHs/AfJ93d6cexBIIwm6VE2qi9WF65ssrfjjJB3C16C1FUQVK?=
 =?us-ascii?Q?BoY/L92z1oySsbx6y6kAqU3Gbpba9y7Whv9cRjbtGGZgRlFA0wlRIDYEGybZ?=
 =?us-ascii?Q?Vq4RxQ6ycpDI1LPV0jdydFUT7NP8X0DfnFY6vxNS/JF1RmmVoe9lFe4hS+9c?=
 =?us-ascii?Q?mFEvtoMCrocaLEEwEkUvb9aK1Uxaq16ligAJciK47x+eRFcWoATcMMMCzML2?=
 =?us-ascii?Q?3ANOIO6yqeQ2i5Fz8gedaRHLBe5TIeqQRWZ8r/fmAOvKj4VqbS7HZfN8+Ma3?=
 =?us-ascii?Q?yKt5T0X6nNOZe89mnGMz4VDD/kiIGfibK2FCkC8tsbG2EnDj68QTTEG1FgTV?=
 =?us-ascii?Q?CFQX1eVU0gd87oFu7lf0Hry+NkhE4RMNkIh44mmYhARhP2GsxaA88N/79ADR?=
 =?us-ascii?Q?oEHWhY8u+bNWdt/i1d0VQuGzzr3Fe9jOHQ2n/4v0HGR9R3MtfTrdVMm0LKTw?=
 =?us-ascii?Q?KBfbL5q2uo6wAcdH1Jonj298P8kWSOz3q2WgbhwMit54lbmmE/WoReq/7Uwa?=
 =?us-ascii?Q?uMavFGq9lIsuK3YaHFeNK7LYE/L8UcSIUjq4LUxm5nB7S/SedQFvVY7BrYF+?=
 =?us-ascii?Q?On2bgJmf/4GQClAtoEB5MuKuxMCCqrnqzP9eqp2cIX5g+QuGe4XSQ1rGZnMe?=
 =?us-ascii?Q?5fzTYZqftLj7F2AaaM/pNYI=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 812add7b-cb15-4f15-212e-08da01244cb0
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 16:54:24.4658
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: fAbc+g1SL6bRN6QvvcPr9s2xop2A81aCEQHAQvgq6dMm4XuUAEGZPTZ4A34lvP/fbDjt4dow7ls55c0UYIfoHA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB4613

On 08.03.2022 17:36, Roger Pau Monn=C3=A9 wrote:
> On Tue, Mar 08, 2022 at 04:08:53PM +0100, Jan Beulich wrote:
>> On 08.03.2022 15:18, Roger Pau Monn=C3=A9 wrote:
>>> On Tue, Mar 08, 2022 at 02:57:23PM +0100, Jan Beulich wrote:
>>>> On 08.03.2022 14:49, Roger Pau Monne wrote:
>>>>> So it can be explicitly placed ahead of the rest of the .text content
>>>>> in the linker script (and thus the resulting image). This is a
>>>>> prerequisite for further work that will add a catch-all to the text
>>>>> section (.text.*).
>>>>>
>>>>> Note that placement of the sections inside of .text is also slightly
>>>>> adjusted to be more similar to the position found in the default GNU
>>>>> ld linker script.
>>>>>
>>>>> The special handling of the object file containing the header data as
>>>>> the first object file passed to the linker command line can also be
>>>>> removed.
>>>>>
>>>>> While there also remove the special handling of efi/ on x86. There's
>>>>> no need for the resulting object file to be passed in any special
>>>>> order to the linker.
>>>>>
>>>>> Signed-off-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>
>>>>
>>>> Looks good to me, but I have one question before feeling ready to
>>>> offer R-b:
>>>>
>>>>> @@ -86,8 +84,13 @@ SECTIONS
>>>>>         *(.text.kexec)          /* Page aligned in the object file. *=
/
>>>>>         kexec_reloc_end =3D .;
>>>>> =20
>>>>> -       *(.text.cold)
>>>>> -       *(.text.unlikely)
>>>>> +       *(.text.cold .text.cold.*)
>>>>> +       *(.text.unlikely .text.*_unlikely .text.unlikely.*)
>>>>
>>>> What generates .text.*_unlikely? And if anything really does, why
>>>> would .text.cold not have a similar equivalent?
>>>
>>> That matches what I saw in the default linker script from my version
>>> of GNU ld:
>>>
>>>     *(.text.unlikely .text.*_unlikely .text.unlikely.*)
>>>
>>> I really don't know what could generate .text.*_unlikely, but since
>>> it's part of the default linker script I assumed it was better to just
>>> add it.
>>
>> I've checked - gcc up to 4.5.x would generate .text.*_unlikely; from
>> 4.6.x. onwards it would be .text.unlikely.*.
>>
>> As to the dissimilarity with .text.cold: I wonder why we have that in
>> the first place. It matches our __cold attribute, just that we don't
>> use that anywhere afaics.
>>
>> In any event:
>> Reviewed-by: Jan Beulich <jbeulich@suse.com>
>> albeit preferably with .text.cold.* dropped again.
>=20
> Would you mind dropping the .text.cold.* at commit? Otherwise I can
> resend.

Sure; no need to resend just for this.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 16:54:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 16:54:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287238.487148 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRd6X-0007N0-Rr; Tue, 08 Mar 2022 16:54:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287238.487148; Tue, 08 Mar 2022 16:54:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRd6X-0007Mn-N8; Tue, 08 Mar 2022 16:54:33 +0000
Received: by outflank-mailman (input) for mailman id 287238;
 Tue, 08 Mar 2022 16:54:32 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=yKud=TT=citrix.com=prvs=05922dae9=ross.lagerwall@srs-se1.protection.inumbo.net>)
 id 1nRd6W-00073Z-6L
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 16:54:32 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 6b668884-9f00-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 17:54:30 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6b668884-9f00-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646758470;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-transfer-encoding:mime-version;
  bh=l2iltLf4HeKt6xE+aeGurQUsh4MNyRok8JiraI8Ft+g=;
  b=RPEyhkSf5Rgz9ne1TkXgZ7g6IRwtG4+qgIgpeCu2Hh7V2qe3MYXwmDE5
   1mv3C0LvpnpDo4y48GMknS6AmoNhrbNCfEKraOgZupCo1F9Howwx/un0s
   HLiUVyN30JaqhP7zNBEVF4pkj/B4ZvzlpwhYRO5TKvLKQBbVSfK7wGR3t
   8=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66125100
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:EuEP5aJuOuNt+i0QFE+RDpUlxSXFcZb7ZxGr2PjKsXjdYENS1mYHy
 TQfXWmGbvaCMGfwLY0nbdjk/R4AuZHSyNFiT1FlqX01Q3x08seUXt7xwmUcns+xwm8vaGo9s
 q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUYYoAQgsA148IMsdoUg7wbRh2dY42YLR7z6l4
 rseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3fMldG0DQUIhMdtNWc
 s6YpF2PEsE1yD92Yj+tuu6TnkTn2dc+NyDW4pZdc/DKbhSvOkXee0v0XRYRQR4/ttmHozx+4
 IkRss3hcFkKBerzqupDDCJVCx16GIQTrdcrIVDn2SCS50jPcn+qyPRyFkAme4Yf/46bA0kXq
 6ZecmpUKEne2aTmm9pXScE17ignBNPsJ5hZvnhvwCvGBPIiaZvCX7/L9ZlT2zJYasVmQ6iHP
 ZdAMWIHgBLoTh8QYlE1Ms8EnPqaiHjGaj0ImRWfuv9ii4TU5FMoi+W8WDbPQfSPXcJVmk+Tp
 UrP+m3rBRdcONH34TmC9GiliqnQnCf4cIUIHba8+7hhh1j77nweDlgaWEW2pdG9i1WiQJRPJ
 koM4C0soKMuskuxQbHVUxq1qnOAlhcZUshXFas25WmlyKDZ/gKYDWgsVSNaZZots8pebTkpy
 3eAmtr7AjopvLD9dJ6G3u7K93XoY3FTdDJcI39fJecY3zX9iN1viUOed4hAK+mKvNOrRgr92
 wyOiQFr0t3/kvU3/6m8+FnGhRelqZ7IUhM5623rY4610u9qTNX7PtL1sDA3+d4Fdd/EFQfZ4
 BDojuDDtLhmMH2bqMCarAzh9pmN7u3NDjDTiEUH83IJp2X0oC7LkWy9DVhDyKZV3iQsJGeBj
 Kz741o5CHpv0J2CN/cfj2WZUZhC8EQYPY65Ps04l/IXCnSLSCeJ/Tt1eWmb1H33nU4nnMkXY
 MnHL5jzXStBUPQ6l1JaotvxN5dxnUjSIkuJGfjGI+mPi+LCNBZ5t59fWLdxUgzJxPzd+1iEm
 zquH8CL1w9eQIXDjtr/quYuwaQxBSFjX/je8pUPHsbae1YOMDxxWpf5nOJ6E6Q4zvs9qws91
 izkMqOu4AGk3iOvxMTjQi0LVY4Dqr4j9SJrZ3J9Zw30s5XhCK72hJoim1IMVeBP3MRozOJuT
 ulDfMOFA/9VTS/A9ShbZp74xLGOvjzx32pi4wLNjOADQqNd
IronPort-HdrOrdr: A9a23:AqIaa6ogzJ8ssvT9tIjiXFYaV5t8LNV00zEX/kB9WHVpm5Oj+f
 xGzc516farslossSkb6Ky90KnpewK5yXcH2/hvAV7EZniphILIFvAs0WKG+Vzd8kLFh5ZgPM
 tbAspD4ZjLfCVHZKXBkUiF+rQbsaK6GcmT7I+0pRoMPGJXguNbnn1E426gYxZLrWJ9dP0E/e
 +nl7N6Tk2bCBIqh6qAdxw4dtmGg+eOuIPtYBYACRJiwhKJlymU5LnzFAXd9gsCUhtUqI1SsV
 Ttokjc3OGOovu7whjT2yv49JJNgubszdNFGYilltUVEDPxkQylDb4RGIFq/QpF4t1H2mxa1O
 UkkC1QePibLEmhOF1dlCGdnjUIFgxeskMKh2Xo2UcL6vaJOg7SQ/Ax9L6xNCGpsXbI9esMo5
 5jxX6WuZZMEB/Mqizh+tDDVhVnkVeDu3Y5i+4UiEpeXOIlGc9shJ1a80VPHJgaGiXmrIghDe
 l1FcnZoO1baFWAchnizyNSKfGXLzwO9y29MwM/Uw2uok9rtWE8y1FdyN0Un38G+p54Q55Y5/
 7cOqAtkL1VVMcZYa90Ge9EGKKMeyDwaAOJNHjXLUXsFakBNX6Io5nr4K8t7OXvfJAT1pM9lJ
 nITVsdv28vfEDlD9GIwfRwg13waXT4WS6oxtBV5pB/tLG5TL33MTebQFRriMekq+V3OLyTZx
 9yAuMhPxbOFxqaJW8S5XyNZ3B7EwhrbPEo
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="66125100"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=CQRGOmRNat2PcHaKC2hCl1G3SdGYh50yCzAv7Ynu+p0nVrkX4Yo4+PzeO7EewafBnIKhsfYL559ucgWXVIsjySPU2wJYI0hBL2Cf6DgIwyFHGs3CdbesCtI9VWBU4GFZU5RmK4QvrQcuFr/jNMfaHPZJmFOnJMVsRHpLuZ3oNsLYfUhi0PbHk+DR9eEhKH4Ti5zXPHKRPBqDMMqshufwAinKAh3KWth/hSmZ6FAkRk8ZQpNuRsBYz3u2Avulf2zBcgr4qMIOJwYxf6Z0CPqL+SWGiNvIiJbmj4LPrsmbUj4NkJ48mXqV1N8a93MJGP7xuWDeTsNTb6mlhxfYQe+HQw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=FC7QdKjT9i5NWBaZkVCaWzT+y7FpGPy85enFCASv+WA=;
 b=YlJs377b5JwXiAGTqsABv+Wtq2ixhrbjafFftmT0IZbFf1267JPMZtfqRds0gR6P0bFDbOzlKgwp2ntMusmgHT9IgnBRyZAX5s5Sj+1XAfJ70j8Y5vbneuM17QAYDIR/os1kK5DR1j/PB9nMergqhmtuklO5ERAiIC3mCXtmm+RjN+G5W5TVG6/Bkcf5wLP1vk4TZrlBSfha3iutaR2sPfvOaJ7CP2PkqUmqEOjMRVSQSFbg2ymeHAd0XdoLXcT2lPsyCtu9aDwhQqSBT4Uk4pwEIt9cmea3HQ8ViWYaTjqEUOPsJGpxr0NXkleINVeemTvmolcLmRhLZyI9BIMs1w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=FC7QdKjT9i5NWBaZkVCaWzT+y7FpGPy85enFCASv+WA=;
 b=YV2S8YvkW4zTbOt0OlDiOHnfEkqlQT3ZFBzMYIwQzTuHHc+rixx6t33Wpw6ns8KCnACsQpeCcZmwg9HDuwVye8HeVuOoBeMq6LJ7anyU4Vp2RsJ3ds/Te7bCmcca6inMX6xU2D9eC0qhrogqbfM8dsNwILiRzoWwFm0Wouch2oU=
From: Ross Lagerwall <ross.lagerwall@citrix.com>
To: Roger Pau Monne <roger.pau@citrix.com>, Bjoern Doebel <doebel@amazon.de>,
	Jan Beulich <jbeulich@suse.com>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, Konrad
 Rzeszutek Wilk <konrad.wilk@oracle.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
Subject: Re: [RFC PATCH v1] arch/x86: Livepatch: fix overflow check when
 computing ELF relocations
Thread-Topic: [RFC PATCH v1] arch/x86: Livepatch: fix overflow check when
 computing ELF relocations
Thread-Index: AQHYMwJZT6OrTo6ebU64Rq0PJcoA5qy1oRQAgAAIYICAAAMNAIAABoB6
Date: Tue, 8 Mar 2022 16:54:11 +0000
Message-ID: <PH0PR03MB6382C8D14D8923497D8899ABF0099@PH0PR03MB6382.namprd03.prod.outlook.com>
References: <b74a68b038c31df4bb94a5b5e87453f5a249cfe2.1646753657.git.doebel@amazon.de>
 <c625d90c-ec0b-a2c3-cf93-08c99cc2f3ce@suse.com>
 <YieBJTHJBiUUqMCU@Air-de-Roger> <YieDtMqn+z5Aydkp@Air-de-Roger>
In-Reply-To: <YieDtMqn+z5Aydkp@Air-de-Roger>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
suggested_attachment_session_id: 66eece14-4597-27b6-5bde-ba02e6652242
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 204a603f-86e3-4509-8b27-08da01244554
x-ms-traffictypediagnostic: SJ0PR03MB5471:EE_
x-microsoft-antispam-prvs: <SJ0PR03MB5471B5E5066B25B437B54260F0099@SJ0PR03MB5471.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: LxzEIZg4m0khy42vpqp71v0N7AwkIA+/zGKntLr4ZjXoRSSLdIwZoJrUZg/McM+8ShRvnEQ2fFspAJhjoZoYdRVBAIg7vDmEsGbCAmzDRMhkB9ahk8oXJKhABuUeHNdCFsVaD2vYQHhB/HN+oZG+wtZE0KZcsOS8nsTyXdDdIwGHb7Inm1iA6OmHOL8KMl47tPutFn/IkKCb6qH7U5YtbQA1xCqAQQaPduPK/sNhSQik66aFr/oV34lHRxo4fI2FGZcJAFkHR78CUgbfVpF46XpjZUxuNYbDJS3Dyu/xmdaCuweKq7ekUKGbzjY3byjng8xkCyIv29ec2LKikhaBWUpaHtfyl9BHiiLFmGy0s7aXmrefnYO1GlMqwr8BVJHq+/Mxu7Gls4i1U2AgWrbu+JZpy89vx5/Y9nOrmWqA/UrFuChycAnrhTYlw+J/vBEzJ9qjhTDAPxe0YIdFMzzzkOlq0wOmFyqJP1/U8cEu/VN7vorBjfMUTsGYc+yloWI7N3ppPk8WXAgiWLqv0y2HF7K2cfcGrS2bKrROHdQh35aHI4dgjQhl0WLOQQrsSSktXlHOvk17VgpGAQUn4pieqXFECmT1WN8G1XGeT5JwTpleDI8yQY2vLQ9IT8LtPDUrJBb9/4WeW8nWuSj30uQ5QlnawevgQzNkuuv/PMo8/5zFe9edWhejptPQzaDhEQteJ0r1/VerSkEXIfaYq2m+PA==
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PH0PR03MB6382.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(8936002)(508600001)(71200400001)(38070700005)(7696005)(6506007)(76116006)(54906003)(110136005)(38100700002)(86362001)(66476007)(66946007)(64756008)(66446008)(8676002)(91956017)(4326008)(66556008)(53546011)(122000001)(9686003)(82960400001)(186003)(26005)(316002)(33656002)(55016003)(44832011)(2906002)(83380400001)(5660300002)(52536014);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?ujl48eF/0cFlWtGTYxOwrL6w7FDsbaQOwQlrks+NFSU6cWKqPIDL0cQzGb?=
 =?iso-8859-1?Q?tlrLQ6gU8XOZbpgsunj1wh0Q8Va5QBkgCyUI0SGZvEP7JiRPqyC8rtveLq?=
 =?iso-8859-1?Q?o6qzpZgWNQJhdc5YGXw2B7JAgbZxhYddD/qX2bhXb3dTFnM0YoieKxpgbb?=
 =?iso-8859-1?Q?uU047gKVivNQKr1YB2yTRY2O8XAD5RrhbBnERFjXlX0/GMQmhQf1TJpV+n?=
 =?iso-8859-1?Q?MFBRAuf2IxesUUfZo251q4r5JL2yIih8W2eH6Nx8HoxSQepZ/VmwUC3ZDv?=
 =?iso-8859-1?Q?nruxRcsTWqPub9Cv6rTWJ7GW9+tW2fi5GVkQ3GTQfYA1plkRXLo/7Hokgn?=
 =?iso-8859-1?Q?G4s7xyysXQpF7JvfJ+Zb5Fcs5Okgc+ZMxPElrfTGJdO8o++QcwOutMuhzC?=
 =?iso-8859-1?Q?adqClXUN7mRq//KIf5AHLkzKMPCS8K2aNWJsAfi2Z+zHz3Ezw3x3CErrsk?=
 =?iso-8859-1?Q?wQldmOyM43GWZ6ZUqFX542YA+1PF0PZY3/yppx6Oyf6q0v67OBItW3vb73?=
 =?iso-8859-1?Q?Pfwu2k4BFG2EEzGDTbnRewU59bXAMV9oG8IsXYdj0AFpjWcEDkzSEClcZI?=
 =?iso-8859-1?Q?n6hXqX0K18I+hKA6SG/5YQRiWFsUmt0jjYvNjjgQiJ6yRVT02hB4Rid73D?=
 =?iso-8859-1?Q?GSJR6PBF0n4RTSG6pUaN9cR5FZQnTZ3vG+4i3W/XXrlxW9SnSzmqxfyWDD?=
 =?iso-8859-1?Q?/xtML+/BqbTetFjv6PzV6KCa0oRkE/xGSs0mzvjcn9KXUaD1wfHiSN65TB?=
 =?iso-8859-1?Q?V2qORZfzS4eFyZeFf4ufk94Fpp9PoRltmNYcQpqL8LsP8syWoyV4c/D8Mi?=
 =?iso-8859-1?Q?SpATczDA6BBJM91pGNrla7SvMaceYzNWP8W/cHTZy3NdWsN/iXfh400kn4?=
 =?iso-8859-1?Q?dYLu76Eb0m8aUMl2WNjKC56PNnhHm9FR+Cdh0BjrCwvdtlepQXpYtMZUSJ?=
 =?iso-8859-1?Q?7JzsPWC9T4u+mYFojRUz+v0WpMZT/LEURk9x5DCHEhbYcN4P+8fNav4Wwx?=
 =?iso-8859-1?Q?8LWu3UYVwiEq9Y1vpNEw4gHSZqVXAcJwVuziofR8tGIOBHw/fv+uicd1cy?=
 =?iso-8859-1?Q?ldoTlbMlqGmlmhPz15t6LdemWzXDa1oXR0Wi1K8hA6htXJyPA4D7uUJ4ef?=
 =?iso-8859-1?Q?YbptXR6ay8rTkDGDaaTKg1smlZt9v8Ybse9ocANPutF07mattI7gNJRHVF?=
 =?iso-8859-1?Q?/R4HzmwgdSWHGsMAVUKbtMYf168oXkKCLy6wND64oeG9qledH3AGAkaRmW?=
 =?iso-8859-1?Q?KYyRBPZ8o8g5fjlIJXxvxh5SpTdLfxqFJEnOOq5IMBGiEEJi1ZfpkVUPYa?=
 =?iso-8859-1?Q?WGbzb+hk9pk7lK2dKdRPFw6ojeGiwEOmDpChzEnRuvULSrx4gPil0LtU06?=
 =?iso-8859-1?Q?/yuK5oeBrPWgD8TUmKVEKOG8X9Lfv1CKzy1uzWDyT0Zu4oSm04Kz+Yqbj4?=
 =?iso-8859-1?Q?UlMc3PHqGDJu409xZ3yycIopSSfWAQNa93RcW7pBogSpmp4zdQOqu01i5D?=
 =?iso-8859-1?Q?6rcXJS4MjAOoOxljmWUUooeouO+4Zs7ggj5A+PNG9EJZjwq6ZhLTY0ZBSn?=
 =?iso-8859-1?Q?p1IWSXziNJSuIC4ULPR7E4oo14DIb+AnIazjavuQfLRIzd/5rImDHUB+HL?=
 =?iso-8859-1?Q?pdHVtEHNgxT4LDcrLr3tAth6M3yuii4mU6EfRcaaWCXQToZS7YurBfzbQS?=
 =?iso-8859-1?Q?s1+U0aI0KkOQzVJZHGIluoYDuWrSQIn3Ahr+5pjIw4GvboAKBxj/Dcl2Dy?=
 =?iso-8859-1?Q?iIEg=3D=3D?=
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR03MB6382.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 204a603f-86e3-4509-8b27-08da01244554
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Mar 2022 16:54:11.8703
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 8ciixVHZGMgIcnVSgjX5dkoOrGEyaCHkbTYTNl6x+qad6lNlRE3V6AWBou3sUYToxWFQ2u71otWSeOthO/hpSM08AFzbIM0kWZTxnmUCb7c=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR03MB5471
X-OriginatorOrg: citrix.com

> From: Roger Pau Monne <roger.pau@citrix.com>=0A=
> Sent: Tuesday, March 8, 2022 4:26 PM=0A=
> To: Bjoern Doebel <doebel@amazon.de>; Jan Beulich <jbeulich@suse.com>=0A=
> Cc: Michael Kurth <mku@amazon.de>; Martin Pohlack <mpohlack@amazon.de>; K=
onrad Rzeszutek Wilk <konrad.wilk@oracle.com>; Ross Lagerwall <ross.lagerwa=
ll@citrix.com>; xen-devel@lists.xenproject.org <xen-devel@lists.xenproject.=
org>=0A=
> Subject: Re: [RFC PATCH v1] arch/x86: Livepatch: fix overflow check when =
computing ELF relocations =0A=
>  =0A=
> On Tue, Mar 08, 2022 at 05:15:33PM +0100, Roger Pau Monn=E9 wrote:=0A=
> > On Tue, Mar 08, 2022 at 04:45:34PM +0100, Jan Beulich wrote:=0A=
> > > On 08.03.2022 16:36, Bjoern Doebel wrote:=0A=
> > > > --- a/xen/arch/x86/livepatch.c=0A=
> > > > +++ b/xen/arch/x86/livepatch.c=0A=
> > > > @@ -339,7 +339,7 @@ int arch_livepatch_perform_rela(struct livepatc=
h_elf *elf,=0A=
> > > >  =0A=
> > > >              val -=3D (uint64_t)dest;=0A=
> > > >              *(int32_t *)dest =3D val;=0A=
> > > =0A=
> > > Afaict after this assignment ...=0A=
> > > =0A=
> > > > -            if ( (int64_t)val !=3D *(int32_t *)dest )=0A=
> > > > +            if ( (int32_t)val !=3D *(int32_t *)dest )=0A=
> > > =0A=
> > > ... this condition can never be false. The cast really wants to be=0A=
> > > to int64_t, and the overflow you saw being reported is quite likely=
=0A=
> > > for a different reason. But from the sole message you did quote=0A=
> > > it's not really possible to figure what else is wrong.=0A=
> > =0A=
> > It seems Linux has that check ifdef'ed [0], but there's no reference=0A=
> > as to why it's that way (I've tracked it back to the x86-64 import on=
=0A=
> > the historical tree, f3081f5b66a06175ff2dabfe885a53fb04e71076).=0A=
> > =0A=
> > It's a 64bit relocation using a 32bit value, but it's unclear to me=0A=
> > that modifying the top 32bits is not allowed/intended.=0A=
> =0A=
> Urg, I've worded this very badly. It's a 64bit relocation using a=0A=
> 32bit value, but it's unclear to me that modifying the top 32bits is=0A=
> not allowed/intended and fine to be dropped.=0A=
> =0A=
> Thanks, Roger.=0A=
=0A=
I'm not sure what you mean by that. The value is computed based on the=0A=
load address and the address of the target symbol - i.e. it is a=0A=
PC-relative relocation, and the code is checking that the computed=0A=
relative value hasn't overflowed the 32-bit destination in memory=0A=
e.g. in the unlikely case that the live patch is loaded far away in=0A=
memory from the hypervisor.=0A=
=0A=
The code looks correct to me. It needs investigation to find out why this=
=0A=
particular patch is causing an issue since the code is unchanged since v7=
=0A=
of the original xSplice patch series.=0A=
=0A=
Ross=


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 16:54:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 16:54:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287239.487159 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRd6c-0007i4-8n; Tue, 08 Mar 2022 16:54:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287239.487159; Tue, 08 Mar 2022 16:54:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRd6c-0007hx-5M; Tue, 08 Mar 2022 16:54:38 +0000
Received: by outflank-mailman (input) for mailman id 287239;
 Tue, 08 Mar 2022 16:54:36 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=JMfM=TT=amazon.de=prvs=0590b4220=doebel@srs-se1.protection.inumbo.net>)
 id 1nRd6Z-0007eg-Q0
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 16:54:36 +0000
Received: from smtp-fw-9102.amazon.com (smtp-fw-9102.amazon.com
 [207.171.184.29]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6d1c327c-9f00-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 17:54:33 +0100 (CET)
Received: from pdx4-co-svc-p1-lb2-vlan3.amazon.com (HELO
 email-inbound-relay-pdx-2b-22c2b493.us-west-2.amazon.com) ([10.25.36.214])
 by smtp-border-fw-9102.sea19.amazon.com with ESMTP; 08 Mar 2022 16:54:18 +0000
Received: from EX13D03EUC002.ant.amazon.com
 (pdx1-ws-svc-p6-lb9-vlan2.pdx.amazon.com [10.236.137.194])
 by email-inbound-relay-pdx-2b-22c2b493.us-west-2.amazon.com (Postfix) with
 ESMTPS id 22F8141C6A; Tue,  8 Mar 2022 16:54:17 +0000 (UTC)
Received: from [192.168.10.142] (10.43.164.135) by
 EX13D03EUC002.ant.amazon.com (10.43.164.60) with Microsoft SMTP Server (TLS)
 id 15.0.1497.28; Tue, 8 Mar 2022 16:54:15 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6d1c327c-9f00-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646758474; x=1678294474;
  h=message-id:date:mime-version:to:cc:references:from:
   in-reply-to:content-transfer-encoding:subject;
  bh=sCms4UFIgp3AvYArXWOLb19sRjUgKO1qpX48hNXz3gs=;
  b=cBXypmsp6fVg2wOLir/gS01zZhArmsWYvB1jVjdGMq3zwbsibKByU6jG
   /MrEc0iOCxGmfyXdmJvYOzvEbViVWBPpG+7CHtLtsRPvdCare47Zf/fs2
   tbai+3Xxb3Dz5QPx7d+xxMxhrtSurDqOF/VxQra1N/wUe0vPArG4epRJD
   s=;
X-IronPort-AV: E=Sophos;i="5.90,165,1643673600"; 
   d="scan'208";a="200464889"
Subject: Re: [PATCH v3 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
Message-ID: <5b60cbd1-6e15-e07f-d747-edded14e710a@amazon.de>
Date: Tue, 8 Mar 2022 17:54:14 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Content-Language: en-US
To: Ross Lagerwall <ross.lagerwall@citrix.com>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, Roger
 Pau Monne <roger.pau@citrix.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
References: <453c6e5decb315109a4fbf0065cc364129dca195.1646735357.git.doebel@amazon.de>
 <b91fc474832dd0ce07d223542316fba74afc35ee.1646735357.git.doebel@amazon.de>
 <PH0PR03MB63822464CF42ECDC06A3510BF0099@PH0PR03MB6382.namprd03.prod.outlook.com>
 <e380b32a-2267-0514-53ef-00657c0ce46e@amazon.de>
 <PH0PR03MB63820AB55264C57717C81675F0099@PH0PR03MB6382.namprd03.prod.outlook.com>
From: "Doebel, Bjoern" <doebel@amazon.de>
In-Reply-To: <PH0PR03MB63820AB55264C57717C81675F0099@PH0PR03MB6382.namprd03.prod.outlook.com>
X-Originating-IP: [10.43.164.135]
X-ClientProxiedBy: EX13D33EUC001.ant.amazon.com (10.43.164.13) To
 EX13D03EUC002.ant.amazon.com (10.43.164.60)
Precedence: Bulk
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: base64
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From xen-devel-bounces@lists.xenproject.org Tue Mar 08 16:59:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 16:59:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287258.487170 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRdAr-0000lU-SD; Tue, 08 Mar 2022 16:59:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287258.487170; Tue, 08 Mar 2022 16:59:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRdAr-0000lN-Nf; Tue, 08 Mar 2022 16:59:01 +0000
Received: by outflank-mailman (input) for mailman id 287258;
 Tue, 08 Mar 2022 16:59:01 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=KW+D=TT=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRdAq-0000lH-V6
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 16:59:00 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 0c401015-9f01-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 17:58:59 +0100 (CET)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur02lp2056.outbound.protection.outlook.com [104.47.4.56]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-16-jbY1DcciP5-adSmzYen8sg-1; Tue, 08 Mar 2022 17:58:58 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM6PR04MB4613.eurprd04.prod.outlook.com (2603:10a6:20b:21::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.16; Tue, 8 Mar
 2022 16:58:56 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 16:58:57 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0c401015-9f01-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646758739;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=YroyeSNVD2WfZaM1moAoDqtewW2FbFcWokVtkyLnVK4=;
	b=GGhVLQHWu7uzJjUyYMkQs5s3KOmUVm3vOGp7orbGoSjQc6RkQVDOyXY6doxXCoYFRsBZoB
	yvRMx3gtkZVL0g4gEz86YpewsoiegMvd5DpsWrSlwegWSrq6D2uD49U+yhNa8HKSVBc0BC
	aWKtnwyu4nkNMCAib6odeUvz3qmdLKE=
X-MC-Unique: jbY1DcciP5-adSmzYen8sg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=YW9yFGd8P8ISdFjfXC99k9vJJ/g5O8po0E4cxx6yBHICW4VMmMziuNvj6SFiL0kAU9kGSEhX/oNQLgFv2zyDDdRuoHwDoPW4gHYGJRA31orSw1jtFmIwlF3SH9A6U8bc9m8aLM9SNvsO1NwE7rPkHwMTP41ivX1ftRC+7kI1C8IKDi5QHHSV0T9EIK61+FL+ejjRBAOPXomnfAT7HFEyCW028Yw6VWo6TI+frKjmgkPmBWbzejUeBxIsNHNfXdycBip6Gi0RapyqZwKUEwYZNHm0Ci2UoQBL+iigxzgUxiUt3a9AcQUzbxjDWpEFJWG99gMkMeZFAtuNPx7bO/wdIg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ymkM/QvlWViNXLz+BD43jTuKIk42fHJh3wM19X0MRSE=;
 b=Hh7PBpWgMoehCunNIdmVvrpeZtGqwRBq9ZHC/YwKw0D6qPp3uSIig3O+dcIW5YVtDUle9uyKYLbma4hGcSdpmoJb6VpawwPLltzU8/GxM64VtuXNGc3g+UE0PNNwE8q8dxfLNiplEequkwS1baJsx1OY5n6CY3LrM1nf9URWk+J4QkV2zNW96PZVA0C39D8ullCofguTfxguHzjDpYCyZLZ9K6tuUYB58CAhRtWoqU1gGKZ/3ngAxpegf3a5PwCFhnlsh2b7aHG4zHQcaUdU6A1bmphRQolI/b6f0LI4AigY1626qPJB0h/+G3wdHxh9oF4ae5VJCCkUe933gcS6wQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <d400722d-d5a2-5bc6-8c16-be1d8e8ee046@suse.com>
Date: Tue, 8 Mar 2022 17:58:49 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v3 2/2] livepatch: set -f{function,data}-sections compiler
 option
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 xen-devel@lists.xenproject.org
References: <20220308134924.83616-1-roger.pau@citrix.com>
 <20220308134924.83616-3-roger.pau@citrix.com>
 <c35415ef-b3c1-cc1c-2fb2-aa2de2602cd5@suse.com>
 <YidsSmPV1Pqulp+h@Air-de-Roger>
 <9cce44ca-3e31-bc13-3c56-2811efc36d5b@suse.com>
 <YieHVbKjtXY8vpOn@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YieHVbKjtXY8vpOn@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM7PR03CA0005.eurprd03.prod.outlook.com
 (2603:10a6:20b:130::15) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f979a6f0-b2c7-47c7-8563-08da0124ef1e
X-MS-TrafficTypeDiagnostic: AM6PR04MB4613:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB4613C3A4A88E3F11034369ECB3099@AM6PR04MB4613.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6666004)(53546011)(6506007)(6512007)(6486002)(26005)(38100700002)(8676002)(2616005)(66946007)(5660300002)(508600001)(2906002)(8936002)(66556008)(66476007)(31686004)(186003)(316002)(54906003)(36756003)(4326008)(6916009)(86362001)(83380400001)(31696002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?3v9jWH8XgfSdnF/tBdCOdjOaDGW7TQuhmLgdJvGhoCKRek7y7P7Yrbc5zt2j?=
 =?us-ascii?Q?lArx1JIY9XuhrDI2ZfY0PdmjUcqUIpAmoCDYZpzLiTyW75VcpLBQlQgmDQ7M?=
 =?us-ascii?Q?Gx6CtXS5a5rvo6LsrVJ9YLWUeGApEmU8xedTIImiNEKSGCGnAsZoN/inDhjb?=
 =?us-ascii?Q?LobBs4XAYwlKlgu1E7SGSuN1Kr94UvernziAOllS+HVBemIx/+tqYGgtIhet?=
 =?us-ascii?Q?wn0QGD6SA4KZq8P663n/DZyPqhL62GunUu4hrXKQYmBJxCXCuk4Zao/MFOkY?=
 =?us-ascii?Q?CrYJXavWiAS7PFg5/kMpdUeuyugMfIJNgAuOmFUBZHUn96VK6Qo5LzAFcuDF?=
 =?us-ascii?Q?q60kd+f8r/cK0UgfmvG1uTrWd3A+JCLsOchKS2Fwxfpu/V571Nwf2t/JKYQK?=
 =?us-ascii?Q?OjMcQU9FMmBqNjjnlnlLnqeMTH0vLI9loRp2UY1rpTMxt/UDuepUAtowvW4c?=
 =?us-ascii?Q?zyzlLZxaemEuWhv90gDKJ/SsbOeA0PUU4BdktFlpXJa7bmAkAA47hNZbK0N1?=
 =?us-ascii?Q?RrTXzTiZXPD7qoCkEsH/NqQ7if4zHoY7DocP0keuNRct7fBdQ8MPzNj+cgLG?=
 =?us-ascii?Q?1yuvDsMgkyZEMGdyaYVaUVVMTS1ug3Y5WXl3lMFbxvh7iF6cxoE5MaFt1S12?=
 =?us-ascii?Q?8YZ0xu0j8v/FZO+hUJLuUv1rFkKEGW89vsMvUdErvJeeBEZFnkgkt4rZsrhu?=
 =?us-ascii?Q?1IyVAbJTWo6/dsiMAWIvbIB/Dk0WVWzxLCIoAQ6klSPBJFARKxn9O2mLcUqX?=
 =?us-ascii?Q?sPlvKvuvAaUGRxMYH1NThsrF0OXacOgaKdSm4kHeBIXeXZXyLk8brIuA6yx9?=
 =?us-ascii?Q?kXjMcXSdI/8N8vrQL79++7MsZjjW3TAfNtE/nIhAb3x4l/A2Pw8m3DUNbeQU?=
 =?us-ascii?Q?yybmlsAMsJvsdRYLpINrN84lSc5SYj70wOrERh8ljZr8VOsU74kf+t5VqjdE?=
 =?us-ascii?Q?cicMuf2s0pb0gt75gjFtc2YTJtw9BvG5g0476JLcYxoGma5j6CIYcKyZvANH?=
 =?us-ascii?Q?QQpAbDp7urYv2c7Y3JEv8vuWl62gN1LWfAPDuzhtSobNI/oPPSQDcvXo/Pcl?=
 =?us-ascii?Q?WqmpW+jX9JcfJyiSFpmHC5KiLSvLPZREWRLZtLYxgCcYxij4Oqo79ybDOwXd?=
 =?us-ascii?Q?UrPQQ/CXpXMSUI+E8LE8sZ4n/2G1SWG3a3yAj689BXqQVH24gBp8Smk6PBF9?=
 =?us-ascii?Q?/Jx7MFtJa11uF9htRmpw9+l/UdVMKoeJvUo8o5gFYNXfjR1iiAV/+UAiDZf7?=
 =?us-ascii?Q?WcBE+JYPGi+Mic1cHMV/JI6dD8qJkxboSLRYRhznigsc+EQ5eCxckFo+xncz?=
 =?us-ascii?Q?r/yDiCitoeG3HgjZWTpFG9NgFVWUJyRwejNjkbxSkRZ2+/HdqqOVsY/yVTnT?=
 =?us-ascii?Q?J+dp/AR/8l7vbKtTsdFhkxaDVfMBqUBg37nNmmzcKUdBg99niUkJd03V8v86?=
 =?us-ascii?Q?YJtrbsHbHMCpk4GAV/E7X7UMSLeBvumUSzphJpfCBqJgPO/o6FNJY28p4HH/?=
 =?us-ascii?Q?qGm5l8cxAIu1HLWvYVr73FeM0TVp2Pa4zkJnFVrHRAzGULLv8Qb9793Wit7h?=
 =?us-ascii?Q?zb8U8UA1uvVp40IUDwDjlAMA2dYlJBfEdsS+bNWKoYYX4T48NEBaoFR7tmqy?=
 =?us-ascii?Q?9sMO7YDmrFt8fGNYGjjhJJQ=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f979a6f0-b2c7-47c7-8563-08da0124ef1e
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 16:58:56.9801
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: myIJDCVwGhSTd4Gw/a2EMg9vi37e7aoLHSSzGv3QdYYj1bC+fq4PGur5FL318wPmq3gNzOP7wjmdacYbMYgVAg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB4613

On 08.03.2022 17:41, Roger Pau Monn=C3=A9 wrote:
> On Tue, Mar 08, 2022 at 04:13:55PM +0100, Jan Beulich wrote:
>> On 08.03.2022 15:46, Roger Pau Monn=C3=A9 wrote:
>>> On Tue, Mar 08, 2022 at 03:09:17PM +0100, Jan Beulich wrote:
>>>> On 08.03.2022 14:49, Roger Pau Monne wrote:
>>>>> If livepatching support is enabled build the hypervisor with
>>>>> -f{function,data}-sections compiler options, which is required by the
>>>>> livepatching tools to detect changes and create livepatches.
>>>>>
>>>>> This shouldn't result in any functional change on the hypervisor
>>>>> binary image, but does however require some changes in the linker
>>>>> script in order to handle that each function and data item will now b=
e
>>>>> placed into its own section in object files. As a result add catch-al=
l
>>>>> for .text, .data and .bss in order to merge each individual item
>>>>> section into the final image.
>>>>>
>>>>> The main difference will be that .text.startup will end up being part
>>>>> of .text rather than .init, and thus won't be freed. .text.exit will
>>>>> also be part of .text rather than dropped. Overall this could make th=
e
>>>>> image bigger, and package some .text code in a sub-optimal way.
>>>>>
>>>>> On Arm the .data.read_mostly needs to be moved ahead of the .data
>>>>> section like it's already done on x86, so the .data.* catch-all
>>>>> doesn't also include .data.read_mostly. The alignment of
>>>>> .data.read_mostly also needs to be set to PAGE_SIZE so it doesn't end
>>>>> up being placed at the tail of a read-only page from the previous
>>>>> section. While there move the alignment of the .data section ahead of
>>>>> the section declaration, like it's done for other sections.
>>>>>
>>>>> The benefit of having CONFIG_LIVEPATCH enable those compiler option
>>>>> is that the livepatch build tools no longer need to fiddle with the
>>>>> build system in order to enable them. Note the current livepatch tool=
s
>>>>> are broken after the recent build changes due to the way they
>>>>> attempt to set  -f{function,data}-sections.
>>>>>
>>>>> Signed-off-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>
>>>>
>>>> Reviewed-by: Jan Beulich <jbeulich@suse.com>
>>>>
>>>>> --- a/xen/arch/x86/xen.lds.S
>>>>> +++ b/xen/arch/x86/xen.lds.S
>>>>> @@ -88,6 +88,9 @@ SECTIONS
>>>>>         *(.text.unlikely .text.*_unlikely .text.unlikely.*)
>>>>> =20
>>>>>         *(.text)
>>>>> +#ifdef CONFIG_CC_SPLIT_SECTIONS
>>>>> +       *(.text.*)
>>>>> +#endif
>>>>>         *(.text.__x86_indirect_thunk_*)
>>>>>         *(.text.page_aligned)
>>>>
>>>> These last two now will not have any effect anymore when
>>>> CC_SPLIT_SECTIONS=3Dy. This may have undesirable effects on the
>>>> overall size when there is more than one object with a
>>>> .text.page_aligned contribution. In .data ...
>>>
>>> Agreed. I wondered whether to move those ahead of the main text
>>> section, so likely:
>>>
>>>        *(.text.unlikely .text.*_unlikely .text.unlikely.*)
>>>
>>>        *(.text.page_aligned)
>>>        *(.text.__x86_indirect_thunk_*)
>>>        *(.text)
>>> #ifdef CONFIG_CC_SPLIT_SECTIONS
>>>        *(.text.*)
>>> #endif
>>
>> Perhaps; I'm not really worried of .text.__x86_indirect_thunk_*,
>> though. When adding .text.* that one can likely go away.
>>
>>> FWIW, Linux seems fine to package .text.page_aligned together with the
>>> rest of .text using the .text.[0-9a-zA-Z_]* catch-all.
>>
>> There's no question this is functionally fine. The question is how
>> many extra padding areas are inserted because of this.
>>
>>>>> @@ -292,9 +295,7 @@ SECTIONS
>>>>> =20
>>>>>    DECL_SECTION(.data) {
>>>>>         *(.data.page_aligned)
>>>>> -       *(.data)
>>>>> -       *(.data.rel)
>>>>> -       *(.data.rel.*)
>>>>> +       *(.data .data.*)
>>>>>    } PHDR(text)
>>>>
>>>> ... this continues to be named first. I wonder whether we wouldn't
>>>> want to use SORT_BY_ALIGNMENT (if available) instead in both places.
>>>
>>> We could use the command line option if available
>>> (--sort-section=3Dalignment) to sort all wildcard sections?
>>
>> Depends on the scope of the sorting that would result when enabled
>> globally like this.
>=20
> I'm not sure I'm following. Don't we generally want to sort by
> alignment in order to avoid adding unnecessary padding as much as
> possible?
>=20
> For any wildcard sections we really don't care anymore how they are
> sorted?

Sure. Question is whether sorting is limited to within any single
*(...) construct, or whether it could extend to adjacent ones. IOW
whether the command line option strictly is a replacement of adding
SORT_BY_ALIGNMENT to every one of these constructs.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 17:32:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 17:32:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287266.487182 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRdhT-0005Pv-FC; Tue, 08 Mar 2022 17:32:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287266.487182; Tue, 08 Mar 2022 17:32:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRdhT-0005Po-9W; Tue, 08 Mar 2022 17:32:43 +0000
Received: by outflank-mailman (input) for mailman id 287266;
 Tue, 08 Mar 2022 17:32:42 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ibIM=TT=citrix.com=prvs=059cca470=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nRdhR-0005Pi-UD
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 17:32:42 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id becbf6bd-9f05-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 18:32:38 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: becbf6bd-9f05-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646760760;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=IFdawkXucbLE5RnKcmqNrQTkRWGbDec229WZfYe8ObM=;
  b=RzFOHStnv9VVnmXNZQGJGFpdON8wyWdL9bKRH5jLEMjhwbT92tWe/H9s
   MG51/UTeJYo8c/ROlq3uMOZhNylzLMCCR+DgYb3OpSiIDXdBsG0Yu7oxY
   W3xaeP8L9YwS6Q3lmcy+eDn0eKuomTXhpUcKr4gKyWPXcB6/eW58KtyGv
   Q=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 66128887
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:W/1Uua3J0JNS9ay63/bD5Utxkn2cJEfYwER7XKvMYLTBsI5bpzIEx
 jcWD2qEPPiLa2Lxft9/YY7n8h8B6sLcx9YwHQs+pC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUw0YDja++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /11qI6WcCstMZfzleoGahxhLGJ6Gr1ZreqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHJNYUS/FRpyTjdBPAraZvCX7/L9ZlT2zJYasVmQ6iHP
 ZpJOWUHgBLoPjFBZVgqJJkCvaSpi1L/TwdYmluXqv9ii4TU5FMoi+W8WDbPQfS0QsFSkledt
 3jx1W3zCREHN/SS0TOAtHmrg4fnhjjnUYgfELm58P9Cg1CJwGEXThoMWjOTq/SjllS3Xd4ZL
 kUO4zcvtoA77kntRd74NzW7rWCFuFgAWtNWO+w89AyJjKHT5m6xBHUCCDhIa9Uktco/bT0sy
 lKN2djuAFRHsrKPTmmG3qyJtj70Mi8QRUcSaClBQQYb7t3LpIAokgmJXttlCLSyjND+BXf32
 T/ihCo0iqgXjMUL/76m5l2BiDWpzrDLUwo06wP/Tm+jqARja+aNeIiA+VXdq/FaI+6kokKp5
 SZe3ZLEtaZXUM/LxHflrPgx8K+B3+uXFgTwhVFVIJQv7A2owkHgeadA/2QrTKt2CfosdTjsa
 U7VnApe4p5PIXenBZNKj5KN59cClva5S4m8PhzARp8XO8UqKlfblM17TRPIhwjQfF4QfbbT0
 HtxWeKlFj4kBKtu11JarM9NgOZwlkjSKY4+LK0XLihLM5LDPBZ5qp9faTNii9zVCove+G05F
 P4Fa6O3J+13CrGWX8Uu2dd7wao2BXY6H4vqjMdca/SOJAFrcEl4VaOPn+xxJtc8z/kO/gstw
 p1bchUDoLYYrSebQThml1g5MO+/NXqBhShT0dMQ0aaAhCF4PNfHAFY3fJorZ7g3nNGPPtYvJ
 8Tpj/6oW6wVIhyeomx1RcCk8ORKKUT67SrTbnHNSGVuIPZdq/nhp4aMkv3Hr3JVUEJadKIW/
 tWd6+8sacZbF1Q4UpeMM67HIpHYlSF1pd+elnDgerF7EHgAOqAzQ8Atppfb+/0xFCg=
IronPort-HdrOrdr: A9a23:PGnGvqFWnTv945c3pLqE0MeALOsnbusQ8zAXP0AYc3Jom6uj5r
 mTdZUgpHnJYVkqOE3I9ertBEDEewK4yXcX2/h3AV7BZniEhILAFugLhuGO/9SjIVybygc079
 YZT0EUMrzN5DZB4voSmDPIceod/A==
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="66128887"
From: Jane Malalane <jane.malalane@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Jane Malalane <jane.malalane@citrix.com>, Wei Liu <wl@xen.org>, "Anthony
 PERARD" <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien Grall
	<julien@xen.org>, "Stefano Stabellini" <sstabellini@kernel.org>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian
	<kevin.tian@intel.com>, =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?=
	<roger.pau@citrix.com>
Subject: [PATCH v6 1/2] xen+tools: Report Interrupt Controller Virtualization capabilities on x86
Date: Tue, 8 Mar 2022 17:31:17 +0000
Message-ID: <20220308173118.31490-1-jane.malalane@citrix.com>
X-Mailer: git-send-email 2.11.0
In-Reply-To: <20220307150609.10662-2-jane.malalane@citrix.com>
References: <20220307150609.10662-2-jane.malalane@citrix.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

Add XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC and
XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC to report accelerated xapic
and x2apic, on x86 hardware.
No such features are currently implemented on AMD hardware.

HW assisted xAPIC virtualization will be reported if HW, at the
minimum, supports virtualize_apic_accesses as this feature alone means
that an access to the APIC page will cause an APIC-access VM exit. An
APIC-access VM exit provides a VMM with information about the access
causing the VM exit, unlike a regular EPT fault, thus simplifying some
internal handling.

HW assisted x2APIC virtualization will be reported if HW supports
virtualize_x2apic_mode and, at least, either apic_reg_virt or
virtual_intr_delivery. This also means that
sysctl follows the conditionals in vmx_vlapic_msr_changed().

For that purpose, also add an arch-specific "capabilities" parameter
to struct xen_sysctl_physinfo.

Note that this interface is intended to be compatible with AMD so that
AVIC support can be introduced in a future patch. Unlike Intel that
has multiple controls for APIC Virtualization, AMD has one global
'AVIC Enable' control bit, so fine-graining of APIC virtualization
control cannot be done on a common interface.

Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Jane Malalane <jane.malalane@citrix.com>
---
CC: Wei Liu <wl@xen.org>
CC: Anthony PERARD <anthony.perard@citrix.com>
CC: Juergen Gross <jgross@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>
CC: George Dunlap <george.dunlap@citrix.com>
CC: Jan Beulich <jbeulich@suse.com>
CC: Julien Grall <julien@xen.org>
CC: Stefano Stabellini <sstabellini@kernel.org>
CC: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
CC: Bertrand Marquis <bertrand.marquis@arm.com>
CC: Jun Nakajima <jun.nakajima@intel.com>
CC: Kevin Tian <kevin.tian@intel.com>
CC: "Roger Pau Monné" <roger.pau@citrix.com>

v6:
 * Limit abi check to x86
 * Fix coding style issue

v5:
 * Have assisted_xapic_available solely depend on
   cpu_has_vmx_virtualize_apic_accesses and assisted_x2apic_available
   depend on cpu_has_vmx_virtualize_x2apic_mode and
   cpu_has_vmx_apic_reg_virt OR cpu_has_vmx_virtual_intr_delivery

v4:
 * Fallback to the original v2/v1 conditions for setting
   assisted_xapic_available and assisted_x2apic_available so that in
   the future APIC virtualization can be exposed on AMD hardware
   since fine-graining of "AVIC" is not supported, i.e., AMD solely
   uses "AVIC Enable". This also means that sysctl mimics what's
   exposed in CPUID

v3:
 * Define XEN_SYSCTL_PHYSCAP_ARCH_MAX for ABI checking and actually
   set "arch_capbilities", via a call to c_bitmap_to_ocaml_list()
 * Have assisted_x2apic_available only depend on
   cpu_has_vmx_virtualize_x2apic_mode

v2:
 * Use one macro LIBXL_HAVE_PHYSINFO_ASSISTED_APIC instead of two
 * Pass xcpyshinfo as a pointer in libxl__arch_get_physinfo
 * Set assisted_x{2}apic_available to be conditional upon "bsp" and
   annotate it with __ro_after_init
 * Change XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_X{2}APIC to
   _X86_ASSISTED_X{2}APIC
 * Keep XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X{2}APIC contained within
   sysctl.h
 * Fix padding introduced in struct xen_sysctl_physinfo and bump
   XEN_SYSCTL_INTERFACE_VERSION
---
 tools/golang/xenlight/helpers.gen.go |  4 ++++
 tools/golang/xenlight/types.gen.go   |  2 ++
 tools/include/libxl.h                |  7 +++++++
 tools/libs/light/libxl.c             |  3 +++
 tools/libs/light/libxl_arch.h        |  4 ++++
 tools/libs/light/libxl_arm.c         |  5 +++++
 tools/libs/light/libxl_types.idl     |  2 ++
 tools/libs/light/libxl_x86.c         | 11 +++++++++++
 tools/ocaml/libs/xc/xenctrl.ml       |  5 +++++
 tools/ocaml/libs/xc/xenctrl.mli      |  5 +++++
 tools/ocaml/libs/xc/xenctrl_stubs.c  | 15 +++++++++++++--
 tools/xl/xl_info.c                   |  6 ++++--
 xen/arch/x86/hvm/vmx/vmcs.c          |  9 +++++++++
 xen/arch/x86/include/asm/domain.h    |  3 +++
 xen/arch/x86/sysctl.c                |  7 +++++++
 xen/include/public/sysctl.h          | 11 ++++++++++-
 16 files changed, 94 insertions(+), 5 deletions(-)

diff --git a/tools/golang/xenlight/helpers.gen.go b/tools/golang/xenlight/helpers.gen.go
index b746ff1081..dd4e6c9f14 100644
--- a/tools/golang/xenlight/helpers.gen.go
+++ b/tools/golang/xenlight/helpers.gen.go
@@ -3373,6 +3373,8 @@ x.CapVmtrace = bool(xc.cap_vmtrace)
 x.CapVpmu = bool(xc.cap_vpmu)
 x.CapGnttabV1 = bool(xc.cap_gnttab_v1)
 x.CapGnttabV2 = bool(xc.cap_gnttab_v2)
+x.CapAssistedXapic = bool(xc.cap_assisted_xapic)
+x.CapAssistedX2Apic = bool(xc.cap_assisted_x2apic)
 
  return nil}
 
@@ -3407,6 +3409,8 @@ xc.cap_vmtrace = C.bool(x.CapVmtrace)
 xc.cap_vpmu = C.bool(x.CapVpmu)
 xc.cap_gnttab_v1 = C.bool(x.CapGnttabV1)
 xc.cap_gnttab_v2 = C.bool(x.CapGnttabV2)
+xc.cap_assisted_xapic = C.bool(x.CapAssistedXapic)
+xc.cap_assisted_x2apic = C.bool(x.CapAssistedX2Apic)
 
  return nil
  }
diff --git a/tools/golang/xenlight/types.gen.go b/tools/golang/xenlight/types.gen.go
index b1e84d5258..87be46c745 100644
--- a/tools/golang/xenlight/types.gen.go
+++ b/tools/golang/xenlight/types.gen.go
@@ -1014,6 +1014,8 @@ CapVmtrace bool
 CapVpmu bool
 CapGnttabV1 bool
 CapGnttabV2 bool
+CapAssistedXapic bool
+CapAssistedX2Apic bool
 }
 
 type Connectorinfo struct {
diff --git a/tools/include/libxl.h b/tools/include/libxl.h
index 51a9b6cfac..94e6355822 100644
--- a/tools/include/libxl.h
+++ b/tools/include/libxl.h
@@ -528,6 +528,13 @@
 #define LIBXL_HAVE_MAX_GRANT_VERSION 1
 
 /*
+ * LIBXL_HAVE_PHYSINFO_ASSISTED_APIC indicates that libxl_physinfo has
+ * cap_assisted_xapic and cap_assisted_x2apic fields, which indicates
+ * the availability of x{2}APIC hardware assisted virtualization.
+ */
+#define LIBXL_HAVE_PHYSINFO_ASSISTED_APIC 1
+
+/*
  * libxl ABI compatibility
  *
  * The only guarantee which libxl makes regarding ABI compatibility
diff --git a/tools/libs/light/libxl.c b/tools/libs/light/libxl.c
index a0bf7d186f..6d699951e2 100644
--- a/tools/libs/light/libxl.c
+++ b/tools/libs/light/libxl.c
@@ -15,6 +15,7 @@
 #include "libxl_osdeps.h"
 
 #include "libxl_internal.h"
+#include "libxl_arch.h"
 
 int libxl_ctx_alloc(libxl_ctx **pctx, int version,
                     unsigned flags, xentoollog_logger * lg)
@@ -410,6 +411,8 @@ int libxl_get_physinfo(libxl_ctx *ctx, libxl_physinfo *physinfo)
     physinfo->cap_gnttab_v2 =
         !!(xcphysinfo.capabilities & XEN_SYSCTL_PHYSCAP_gnttab_v2);
 
+    libxl__arch_get_physinfo(physinfo, &xcphysinfo);
+
     GC_FREE;
     return 0;
 }
diff --git a/tools/libs/light/libxl_arch.h b/tools/libs/light/libxl_arch.h
index 1522ecb97f..207ceac6a1 100644
--- a/tools/libs/light/libxl_arch.h
+++ b/tools/libs/light/libxl_arch.h
@@ -86,6 +86,10 @@ int libxl__arch_extra_memory(libxl__gc *gc,
                              uint64_t *out);
 
 _hidden
+void libxl__arch_get_physinfo(libxl_physinfo *physinfo,
+                              const xc_physinfo_t *xcphysinfo);
+
+_hidden
 void libxl__arch_update_domain_config(libxl__gc *gc,
                                       libxl_domain_config *dst,
                                       const libxl_domain_config *src);
diff --git a/tools/libs/light/libxl_arm.c b/tools/libs/light/libxl_arm.c
index eef1de0939..39fdca1b49 100644
--- a/tools/libs/light/libxl_arm.c
+++ b/tools/libs/light/libxl_arm.c
@@ -1431,6 +1431,11 @@ int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
     return rc;
 }
 
+void libxl__arch_get_physinfo(libxl_physinfo *physinfo,
+                              const xc_physinfo_t *xcphysinfo)
+{
+}
+
 void libxl__arch_update_domain_config(libxl__gc *gc,
                                       libxl_domain_config *dst,
                                       const libxl_domain_config *src)
diff --git a/tools/libs/light/libxl_types.idl b/tools/libs/light/libxl_types.idl
index 2a42da2f7d..42ac6c357b 100644
--- a/tools/libs/light/libxl_types.idl
+++ b/tools/libs/light/libxl_types.idl
@@ -1068,6 +1068,8 @@ libxl_physinfo = Struct("physinfo", [
     ("cap_vpmu", bool),
     ("cap_gnttab_v1", bool),
     ("cap_gnttab_v2", bool),
+    ("cap_assisted_xapic", bool),
+    ("cap_assisted_x2apic", bool),
     ], dir=DIR_OUT)
 
 libxl_connectorinfo = Struct("connectorinfo", [
diff --git a/tools/libs/light/libxl_x86.c b/tools/libs/light/libxl_x86.c
index 1feadebb18..e0a06ecfe3 100644
--- a/tools/libs/light/libxl_x86.c
+++ b/tools/libs/light/libxl_x86.c
@@ -866,6 +866,17 @@ int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
     return rc;
 }
 
+void libxl__arch_get_physinfo(libxl_physinfo *physinfo,
+                              const xc_physinfo_t *xcphysinfo)
+{
+    physinfo->cap_assisted_xapic =
+        !!(xcphysinfo->arch_capabilities &
+           XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC);
+    physinfo->cap_assisted_x2apic =
+        !!(xcphysinfo->arch_capabilities &
+           XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC);
+}
+
 void libxl__arch_update_domain_config(libxl__gc *gc,
                                       libxl_domain_config *dst,
                                       const libxl_domain_config *src)
diff --git a/tools/ocaml/libs/xc/xenctrl.ml b/tools/ocaml/libs/xc/xenctrl.ml
index 7503031d8f..712456e098 100644
--- a/tools/ocaml/libs/xc/xenctrl.ml
+++ b/tools/ocaml/libs/xc/xenctrl.ml
@@ -127,6 +127,10 @@ type physinfo_cap_flag =
 	| CAP_Gnttab_v1
 	| CAP_Gnttab_v2
 
+type physinfo_arch_cap_flag =
+	| CAP_X86_ASSISTED_XAPIC
+	| CAP_X86_ASSISTED_X2APIC
+
 type physinfo =
 {
 	threads_per_core : int;
@@ -140,6 +144,7 @@ type physinfo =
 	(* XXX hw_cap *)
 	capabilities     : physinfo_cap_flag list;
 	max_nr_cpus      : int;
+	arch_capabilities : physinfo_arch_cap_flag list;
 }
 
 type version =
diff --git a/tools/ocaml/libs/xc/xenctrl.mli b/tools/ocaml/libs/xc/xenctrl.mli
index d1d9c9247a..b034434f68 100644
--- a/tools/ocaml/libs/xc/xenctrl.mli
+++ b/tools/ocaml/libs/xc/xenctrl.mli
@@ -112,6 +112,10 @@ type physinfo_cap_flag =
   | CAP_Gnttab_v1
   | CAP_Gnttab_v2
 
+type physinfo_arch_cap_flag =
+  | CAP_X86_ASSISTED_XAPIC
+  | CAP_X86_ASSISTED_X2APIC
+
 type physinfo = {
   threads_per_core : int;
   cores_per_socket : int;
@@ -123,6 +127,7 @@ type physinfo = {
   scrub_pages      : nativeint;
   capabilities     : physinfo_cap_flag list;
   max_nr_cpus      : int; (** compile-time max possible number of nr_cpus *)
+  arch_capabilities : physinfo_arch_cap_flag list;
 }
 type version = { major : int; minor : int; extra : string; }
 type compile_info = {
diff --git a/tools/ocaml/libs/xc/xenctrl_stubs.c b/tools/ocaml/libs/xc/xenctrl_stubs.c
index 5b4fe72c8d..7e9c32ad1b 100644
--- a/tools/ocaml/libs/xc/xenctrl_stubs.c
+++ b/tools/ocaml/libs/xc/xenctrl_stubs.c
@@ -712,7 +712,7 @@ CAMLprim value stub_xc_send_debug_keys(value xch, value keys)
 CAMLprim value stub_xc_physinfo(value xch)
 {
 	CAMLparam1(xch);
-	CAMLlocal2(physinfo, cap_list);
+	CAMLlocal3(physinfo, cap_list, arch_cap_list);
 	xc_physinfo_t c_physinfo;
 	int r;
 
@@ -731,7 +731,7 @@ CAMLprim value stub_xc_physinfo(value xch)
 		/* ! XEN_SYSCTL_PHYSCAP_ XEN_SYSCTL_PHYSCAP_MAX max */
 		(c_physinfo.capabilities);
 
-	physinfo = caml_alloc_tuple(10);
+	physinfo = caml_alloc_tuple(11);
 	Store_field(physinfo, 0, Val_int(c_physinfo.threads_per_core));
 	Store_field(physinfo, 1, Val_int(c_physinfo.cores_per_socket));
 	Store_field(physinfo, 2, Val_int(c_physinfo.nr_cpus));
@@ -743,6 +743,17 @@ CAMLprim value stub_xc_physinfo(value xch)
 	Store_field(physinfo, 8, cap_list);
 	Store_field(physinfo, 9, Val_int(c_physinfo.max_cpu_id + 1));
 
+#if defined(__i386__) || defined(__x86_64__)
+	/*
+	 * arch_capabilities: physinfo_arch_cap_flag list;
+	 */
+	arch_cap_list = c_bitmap_to_ocaml_list
+		/* ! physinfo_arch_cap_flag CAP_ none */
+		/* ! XEN_SYSCTL_PHYSCAP_ XEN_SYSCTL_PHYSCAP_X86_MAX max */
+		(c_physinfo.arch_capabilities);
+	Store_field(physinfo, 10, arch_cap_list);
+#endif
+
 	CAMLreturn(physinfo);
 }
 
diff --git a/tools/xl/xl_info.c b/tools/xl/xl_info.c
index 712b7638b0..3205270754 100644
--- a/tools/xl/xl_info.c
+++ b/tools/xl/xl_info.c
@@ -210,7 +210,7 @@ static void output_physinfo(void)
          info.hw_cap[4], info.hw_cap[5], info.hw_cap[6], info.hw_cap[7]
         );
 
-    maybe_printf("virt_caps              :%s%s%s%s%s%s%s%s%s%s%s\n",
+    maybe_printf("virt_caps              :%s%s%s%s%s%s%s%s%s%s%s%s%s\n",
          info.cap_pv ? " pv" : "",
          info.cap_hvm ? " hvm" : "",
          info.cap_hvm && info.cap_hvm_directio ? " hvm_directio" : "",
@@ -221,7 +221,9 @@ static void output_physinfo(void)
          info.cap_vmtrace ? " vmtrace" : "",
          info.cap_vpmu ? " vpmu" : "",
          info.cap_gnttab_v1 ? " gnttab-v1" : "",
-         info.cap_gnttab_v2 ? " gnttab-v2" : ""
+         info.cap_gnttab_v2 ? " gnttab-v2" : "",
+         info.cap_assisted_xapic ? " assisted_xapic" : "",
+         info.cap_assisted_x2apic ? " assisted_x2apic" : ""
         );
 
     vinfo = libxl_get_version_info(ctx);
diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
index e1e1fa14e6..77ce0b2121 100644
--- a/xen/arch/x86/hvm/vmx/vmcs.c
+++ b/xen/arch/x86/hvm/vmx/vmcs.c
@@ -343,6 +343,15 @@ static int vmx_init_vmcs_config(bool bsp)
             MSR_IA32_VMX_PROCBASED_CTLS2, &mismatch);
     }
 
+    /* Check whether hardware supports accelerated xapic and x2apic. */
+    if ( bsp )
+    {
+        assisted_xapic_available = cpu_has_vmx_virtualize_apic_accesses;
+        assisted_x2apic_available = cpu_has_vmx_virtualize_x2apic_mode &&
+                                    (cpu_has_vmx_apic_reg_virt ||
+                                     cpu_has_vmx_virtual_intr_delivery);
+    }
+
     /* The IA32_VMX_EPT_VPID_CAP MSR exists only when EPT or VPID available */
     if ( _vmx_secondary_exec_control & (SECONDARY_EXEC_ENABLE_EPT |
                                         SECONDARY_EXEC_ENABLE_VPID) )
diff --git a/xen/arch/x86/include/asm/domain.h b/xen/arch/x86/include/asm/domain.h
index e62e109598..72431df26d 100644
--- a/xen/arch/x86/include/asm/domain.h
+++ b/xen/arch/x86/include/asm/domain.h
@@ -756,6 +756,9 @@ static inline void pv_inject_sw_interrupt(unsigned int vector)
                       : is_pv_32bit_domain(d) ? PV32_VM_ASSIST_MASK \
                                               : PV64_VM_ASSIST_MASK)
 
+extern bool assisted_xapic_available;
+extern bool assisted_x2apic_available;
+
 #endif /* __ASM_DOMAIN_H__ */
 
 /*
diff --git a/xen/arch/x86/sysctl.c b/xen/arch/x86/sysctl.c
index f82abc2488..ad95c86aef 100644
--- a/xen/arch/x86/sysctl.c
+++ b/xen/arch/x86/sysctl.c
@@ -69,6 +69,9 @@ struct l3_cache_info {
     unsigned long size;
 };
 
+bool __ro_after_init assisted_xapic_available;
+bool __ro_after_init assisted_x2apic_available;
+
 static void cf_check l3_cache_get(void *arg)
 {
     struct cpuid4_info info;
@@ -135,6 +138,10 @@ void arch_do_physinfo(struct xen_sysctl_physinfo *pi)
         pi->capabilities |= XEN_SYSCTL_PHYSCAP_hap;
     if ( IS_ENABLED(CONFIG_SHADOW_PAGING) )
         pi->capabilities |= XEN_SYSCTL_PHYSCAP_shadow;
+    if ( assisted_xapic_available )
+        pi->arch_capabilities |= XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC;
+    if ( assisted_x2apic_available )
+        pi->arch_capabilities |= XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC;
 }
 
 long arch_do_sysctl(
diff --git a/xen/include/public/sysctl.h b/xen/include/public/sysctl.h
index 55252e97f2..7fe05be0c9 100644
--- a/xen/include/public/sysctl.h
+++ b/xen/include/public/sysctl.h
@@ -35,7 +35,7 @@
 #include "domctl.h"
 #include "physdev.h"
 
-#define XEN_SYSCTL_INTERFACE_VERSION 0x00000014
+#define XEN_SYSCTL_INTERFACE_VERSION 0x00000015
 
 /*
  * Read console content from Xen buffer ring.
@@ -111,6 +111,13 @@ struct xen_sysctl_tbuf_op {
 /* Max XEN_SYSCTL_PHYSCAP_* constant.  Used for ABI checking. */
 #define XEN_SYSCTL_PHYSCAP_MAX XEN_SYSCTL_PHYSCAP_gnttab_v2
 
+/* The platform supports x{2}apic hardware assisted emulation. */
+#define XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC  (1u << 0)
+#define XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC (1u << 1)
+
+/* Max XEN_SYSCTL_PHYSCAP_X86__* constant. Used for ABI checking. */
+#define XEN_SYSCTL_PHYSCAP_X86_MAX XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC
+
 struct xen_sysctl_physinfo {
     uint32_t threads_per_core;
     uint32_t cores_per_socket;
@@ -120,6 +127,8 @@ struct xen_sysctl_physinfo {
     uint32_t max_node_id; /* Largest possible node ID on this host */
     uint32_t cpu_khz;
     uint32_t capabilities;/* XEN_SYSCTL_PHYSCAP_??? */
+    uint32_t arch_capabilities;/* XEN_SYSCTL_PHYSCAP_X86{ARM}_??? */
+    uint32_t pad;
     uint64_aligned_t total_pages;
     uint64_aligned_t free_pages;
     uint64_aligned_t scrub_pages;
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 17:37:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 17:37:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287274.487192 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRdlm-0006Km-3R; Tue, 08 Mar 2022 17:37:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287274.487192; Tue, 08 Mar 2022 17:37:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRdll-0006Kf-V0; Tue, 08 Mar 2022 17:37:09 +0000
Received: by outflank-mailman (input) for mailman id 287274;
 Tue, 08 Mar 2022 17:37:09 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ibIM=TT=citrix.com=prvs=059cca470=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nRdlk-0006KZ-VS
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 17:37:09 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 5ea8f63a-9f06-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 18:37:06 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5ea8f63a-9f06-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646761026;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=PuVF+5M7HHdRXwWAxurkiC/Vp4T8SRmRHmS44tLJrbI=;
  b=HNP4ZhqUWQyBVbRWtt8QBUrkLQrsHp3UWGFjgB7r+XWrGWtODAef30VS
   jz/rHti6ReWmon6HHSYo7Z2loNqW7CXKgUcaGjk1sjaJZwTgXmmoGz/+b
   NJfGUjjGXJgFqyeEZ+Z+mt7EYqcEIVtgrgyxvX0cLREOPPcxK7KWi9Fy/
   Y=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 65661895
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:+1NwOK/NmyEO0ZyTfZQnDrUDY36TJUtcMsCJ2f8bNWPcYEJGY0x3x
 jBJWGuGaf7eYTTyKdwjbN63/E0GsMTczIMyTFRprno8E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oDpW1nlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnYy8DgkTObDXodZDSTIJVH89YLZ+3rCSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFKEWvHwm6DjdBPIvR53rSKTW/95Imjw3g6iiGN6AO
 pRHMGo+MXwsZTVhKnIlGrMOmtumrWvzWi8Gp0+Erqo4tj27IAtZj+G2bYu9lsaxbd5Ogk+Sq
 2bC/mL4KhIXLtqSzXyC6H3Eru3SmSL2XqoCGbv+8eRl6HWtwWgUBAwTREGMi/CzgU6jWPpSM
 0URvCEpqMAa+EW1Q/HnUha/oXrCuQQTM/JSHPc98xql0bfP7kCSAW1sZi5MbpkqudE7QRQu1
 0SVhJX5CDp3qrqXRHmBsLCOoluaJiw9PWIEIygeQmMt4dPuvYUyhRLnVct4Hei+ididJN3r6
 2nU9m5k3exV1JNVkfXglbzav96yjojFCQAP4RjMZ1D79CgoI9DmOpeQz1eOuJ6sM72lZlWGu
 XEFne2X4+YPEYyBmUSxfQkdIF26z63baWOB2DaDC7Fkrm3woCD7Iei89RkjfB8BDyoSRdP+j
 KY/Uyt17YQbAnalZLQfj2mZW5VzlviI+TgIu5npgjtyjnpZKVfvEMJGPxf4M4XRfK4Ey/lX1
 XCzK5rEMJriIf47pAdavs9EuVPR+ggwxHnIWbfwxAm93LyVaRa9EOlZbgXRPr1itfPZ+205F
 uqz0ePQkH2zt8WkPkHqHXM7dwhWfRDX+7iswyCoSgJzClU/QzxwYxMg6bggZ5Zkj8xoehTgp
 RmAtrtj4AOn3xXvcFzSAlg6Me+Hdcsv/BoTYH13VX71iidLXGpaxPpGH3fBVeJ8r7ILID8dZ
 6RtRvhs9dwTEmSXoWpMN8KhxGGgHTzy7T+z0+OeSGBXV/Zdq8bhoLcIoiOHGPEyMxeK
IronPort-HdrOrdr: A9a23:ILOjXayjG6j1RaUkj2S1KrPwFL1zdoMgy1knxilNoRw8SKKlfq
 eV7Y0mPH7P+VAssR4b+exoVJPtfZqYz+8R3WBzB8bEYOCFghrKEGgK1+KLqFeMJ8S9zJ846U
 4JSdkHNDSaNzlHZKjBjzVQa+xQouW6zA==
X-IronPort-AV: E=Sophos;i="5.90,165,1643691600"; 
   d="scan'208";a="65661895"
From: Jane Malalane <jane.malalane@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Jane Malalane <jane.malalane@citrix.com>, Wei Liu <wl@xen.org>, "Anthony
 PERARD" <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien Grall
	<julien@xen.org>, "Stefano Stabellini" <sstabellini@kernel.org>, Christian
 Lindig <christian.lindig@citrix.com>, David Scott <dave@recoil.org>,
	"Volodymyr Babchuk" <Volodymyr_Babchuk@epam.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>
Subject: [PATCH v6 2/2] x86/xen: Allow per-domain usage of hardware virtualized APIC
Date: Tue, 8 Mar 2022 17:36:43 +0000
Message-ID: <20220308173643.2929-1-jane.malalane@citrix.com>
X-Mailer: git-send-email 2.11.0
In-Reply-To: <20220307150609.10662-3-jane.malalane@citrix.com>
References: <20220307150609.10662-3-jane.malalane@citrix.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

Introduce a new per-domain creation x86 specific flag to
select whether hardware assisted virtualization should be used for
x{2}APIC.

A per-domain option is added to xl in order to select the usage of
x{2}APIC hardware assisted virtualization, as well as a global
configuration option.

Having all APIC interaction exit to Xen for emulation is slow and can
induce much overhead. Hardware can speed up x{2}APIC by decoding the
APIC access and providing a VM exit with a more specific exit reason
than a regular EPT fault or by altogether avoiding a VM exit.

On the other hand, being able to disable x{2}APIC hardware assisted
virtualization can be useful for testing and debugging purposes.

Note: vmx_install_vlapic_mapping doesn't require modifications
regardless of whether the guest has "Virtualize APIC accesses" enabled
or not, i.e., setting the APIC_ACCESS_ADDR VMCS field is fine so long
as virtualize_apic_accesses is supported by the CPU.

Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Jane Malalane <jane.malalane@citrix.com>
---
CC: Wei Liu <wl@xen.org>
CC: Anthony PERARD <anthony.perard@citrix.com>
CC: Juergen Gross <jgross@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>
CC: George Dunlap <george.dunlap@citrix.com>
CC: Jan Beulich <jbeulich@suse.com>
CC: Julien Grall <julien@xen.org>
CC: Stefano Stabellini <sstabellini@kernel.org>
CC: Christian Lindig <christian.lindig@citrix.com>
CC: David Scott <dave@recoil.org>
CC: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
CC: "Roger Pau Monné" <roger.pau@citrix.com>

v6:
 * Use ENODEV instead of EINVAL when rejecting assisted_x{2}apic
   for PV guests
 * Move has_assisted_x{2}apic macros out of an Intel specific header
 * Remove references to Intel specific features in documentation

v5:
 * Revert v4 changes in vmx_vlapic_msr_changed(), preserving the use of
   the has_assisted_x{2}apic macros
 * Following changes in assisted_x{2}apic_available definitions in
   patch 1, retighten conditionals for setting
   XEN_HVM_CPUID_APIC_ACCESS_VIRT and XEN_HVM_CPUID_X2APIC_VIRT in
   cpuid_hypervisor_leaves()

v4:
 * Add has_assisted_x{2}apic macros and use them where appropriate
 * Replace CPU checks with per-domain assisted_x{2}apic control
   options in vmx_vlapic_msr_changed() and cpuid_hypervisor_leaves(),
   following edits to assisted_x{2}apic_available definitions in
   patch 1
   Note: new assisted_x{2}apic_available definitions make later
   cpu_has_vmx_apic_reg_virt and cpu_has_vmx_virtual_intr_delivery
   checks redundant in vmx_vlapic_msr_changed()

v3:
 * Change info in xl.cfg to better express reality and fix
   capitalization of x{2}apic
 * Move "physinfo" variable definition to the beggining of
   libxl__domain_build_info_setdefault()
 * Reposition brackets in if statement to match libxl coding style
 * Shorten logic in libxl__arch_domain_build_info_setdefault()
 * Correct dprintk message in arch_sanitise_domain_config()
 * Make appropriate changes in vmx_vlapic_msr_changed() and
   cpuid_hypervisor_leaves() for amended "assisted_x2apic" bit
 * Remove unneeded parantheses

v2:
 * Add a LIBXL_HAVE_ASSISTED_APIC macro
 * Pass xcpyshinfo as a pointer in libxl__arch_get_physinfo
 * Add a return statement in now "int"
   libxl__arch_domain_build_info_setdefault()
 * Preserve libxl__arch_domain_build_info_setdefault 's location in
   libxl_create.c
 * Correct x{2}apic default setting logic in
   libxl__arch_domain_prepare_config()
 * Correct logic for parsing assisted_x{2}apic host/guest options in
   xl_parse.c and initialize them to -1 in xl.c
 * Use guest options directly in vmx_vlapic_msr_changed
 * Fix indentation of bool assisted_x{2}apic in struct hvm_domain
 * Add a change in xenctrl_stubs.c to pass xenctrl ABI checks
---
 docs/man/xl.cfg.5.pod.in              | 15 +++++++++++++++
 docs/man/xl.conf.5.pod.in             | 12 ++++++++++++
 tools/golang/xenlight/helpers.gen.go  | 12 ++++++++++++
 tools/golang/xenlight/types.gen.go    |  2 ++
 tools/include/libxl.h                 |  7 +++++++
 tools/libs/light/libxl_arch.h         |  5 +++--
 tools/libs/light/libxl_arm.c          |  7 +++++--
 tools/libs/light/libxl_create.c       | 22 +++++++++++++---------
 tools/libs/light/libxl_types.idl      |  2 ++
 tools/libs/light/libxl_x86.c          | 27 +++++++++++++++++++++++++--
 tools/ocaml/libs/xc/xenctrl.ml        |  2 ++
 tools/ocaml/libs/xc/xenctrl.mli       |  2 ++
 tools/ocaml/libs/xc/xenctrl_stubs.c   |  2 +-
 tools/xl/xl.c                         |  8 ++++++++
 tools/xl/xl.h                         |  2 ++
 tools/xl/xl_parse.c                   | 16 ++++++++++++++++
 xen/arch/x86/domain.c                 | 28 +++++++++++++++++++++++++++-
 xen/arch/x86/hvm/vmx/vmcs.c           |  4 ++++
 xen/arch/x86/hvm/vmx/vmx.c            | 13 ++++---------
 xen/arch/x86/include/asm/hvm/domain.h |  6 ++++++
 xen/arch/x86/include/asm/hvm/hvm.h    |  6 ++++++
 xen/arch/x86/traps.c                  |  5 +++--
 xen/include/public/arch-x86/xen.h     |  2 ++
 23 files changed, 179 insertions(+), 28 deletions(-)

diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in
index b98d161398..b4239fcc5e 100644
--- a/docs/man/xl.cfg.5.pod.in
+++ b/docs/man/xl.cfg.5.pod.in
@@ -1862,6 +1862,21 @@ firmware tables when using certain older guest Operating
 Systems. These tables have been superseded by newer constructs within
 the ACPI tables.
 
+=item B<assisted_xapic=BOOLEAN>
+
+B<(x86 only)> Enables or disables hardware assisted virtualization for
+xAPIC. With this option enabled, a memory-mapped APIC access will be
+decoded by hardware and either issue a more specific VM exit than just
+an EPT fault, or altogether avoid a VM exit. The
+default is settable via L<xl.conf(5)>.
+
+=item B<assisted_x2apic=BOOLEAN>
+
+B<(x86 only)> Enables or disables hardware assisted virtualization for
+x2APIC. With this option enabled, certain accesses to MSR APIC
+registers will avoid a VM exit into the hypervisor. The default is
+settable via L<xl.conf(5)>.
+
 =item B<nx=BOOLEAN>
 
 B<(x86 only)> Hides or exposes the No-eXecute capability. This allows a guest
diff --git a/docs/man/xl.conf.5.pod.in b/docs/man/xl.conf.5.pod.in
index df20c08137..95d136d1ea 100644
--- a/docs/man/xl.conf.5.pod.in
+++ b/docs/man/xl.conf.5.pod.in
@@ -107,6 +107,18 @@ Sets the default value for the C<max_grant_version> domain config value.
 
 Default: maximum grant version supported by the hypervisor.
 
+=item B<assisted_xapic=BOOLEAN>
+
+If enabled, domains will use xAPIC hardware assisted virtualization by default.
+
+Default: enabled if supported.
+
+=item B<assisted_x2apic=BOOLEAN>
+
+If enabled, domains will use x2APIC hardware assisted virtualization by default.
+
+Default: enabled if supported.
+
 =item B<vif.default.script="PATH">
 
 Configures the default hotplug script used by virtual network devices.
diff --git a/tools/golang/xenlight/helpers.gen.go b/tools/golang/xenlight/helpers.gen.go
index dd4e6c9f14..dece545ee0 100644
--- a/tools/golang/xenlight/helpers.gen.go
+++ b/tools/golang/xenlight/helpers.gen.go
@@ -1120,6 +1120,12 @@ x.ArchArm.Vuart = VuartType(xc.arch_arm.vuart)
 if err := x.ArchX86.MsrRelaxed.fromC(&xc.arch_x86.msr_relaxed);err != nil {
 return fmt.Errorf("converting field ArchX86.MsrRelaxed: %v", err)
 }
+if err := x.ArchX86.AssistedXapic.fromC(&xc.arch_x86.assisted_xapic);err != nil {
+return fmt.Errorf("converting field ArchX86.AssistedXapic: %v", err)
+}
+if err := x.ArchX86.AssistedX2Apic.fromC(&xc.arch_x86.assisted_x2apic);err != nil {
+return fmt.Errorf("converting field ArchX86.AssistedX2Apic: %v", err)
+}
 x.Altp2M = Altp2MMode(xc.altp2m)
 x.VmtraceBufKb = int(xc.vmtrace_buf_kb)
 if err := x.Vpmu.fromC(&xc.vpmu);err != nil {
@@ -1605,6 +1611,12 @@ xc.arch_arm.vuart = C.libxl_vuart_type(x.ArchArm.Vuart)
 if err := x.ArchX86.MsrRelaxed.toC(&xc.arch_x86.msr_relaxed); err != nil {
 return fmt.Errorf("converting field ArchX86.MsrRelaxed: %v", err)
 }
+if err := x.ArchX86.AssistedXapic.toC(&xc.arch_x86.assisted_xapic); err != nil {
+return fmt.Errorf("converting field ArchX86.AssistedXapic: %v", err)
+}
+if err := x.ArchX86.AssistedX2Apic.toC(&xc.arch_x86.assisted_x2apic); err != nil {
+return fmt.Errorf("converting field ArchX86.AssistedX2Apic: %v", err)
+}
 xc.altp2m = C.libxl_altp2m_mode(x.Altp2M)
 xc.vmtrace_buf_kb = C.int(x.VmtraceBufKb)
 if err := x.Vpmu.toC(&xc.vpmu); err != nil {
diff --git a/tools/golang/xenlight/types.gen.go b/tools/golang/xenlight/types.gen.go
index 87be46c745..253c9ad93d 100644
--- a/tools/golang/xenlight/types.gen.go
+++ b/tools/golang/xenlight/types.gen.go
@@ -520,6 +520,8 @@ Vuart VuartType
 }
 ArchX86 struct {
 MsrRelaxed Defbool
+AssistedXapic Defbool
+AssistedX2Apic Defbool
 }
 Altp2M Altp2MMode
 VmtraceBufKb int
diff --git a/tools/include/libxl.h b/tools/include/libxl.h
index 94e6355822..cdcccd6d01 100644
--- a/tools/include/libxl.h
+++ b/tools/include/libxl.h
@@ -535,6 +535,13 @@
 #define LIBXL_HAVE_PHYSINFO_ASSISTED_APIC 1
 
 /*
+ * LIBXL_HAVE_ASSISTED_APIC indicates that libxl_domain_build_info has
+ * assisted_xapic and assisted_x2apic fields for enabling hardware
+ * assisted virtualization for x{2}apic per domain.
+ */
+#define LIBXL_HAVE_ASSISTED_APIC 1
+
+/*
  * libxl ABI compatibility
  *
  * The only guarantee which libxl makes regarding ABI compatibility
diff --git a/tools/libs/light/libxl_arch.h b/tools/libs/light/libxl_arch.h
index 207ceac6a1..03b89929e6 100644
--- a/tools/libs/light/libxl_arch.h
+++ b/tools/libs/light/libxl_arch.h
@@ -71,8 +71,9 @@ void libxl__arch_domain_create_info_setdefault(libxl__gc *gc,
                                                libxl_domain_create_info *c_info);
 
 _hidden
-void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
-                                              libxl_domain_build_info *b_info);
+int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
+                                             libxl_domain_build_info *b_info,
+                                             const libxl_physinfo *physinfo);
 
 _hidden
 int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
diff --git a/tools/libs/light/libxl_arm.c b/tools/libs/light/libxl_arm.c
index 39fdca1b49..ba5b8f433f 100644
--- a/tools/libs/light/libxl_arm.c
+++ b/tools/libs/light/libxl_arm.c
@@ -1384,8 +1384,9 @@ void libxl__arch_domain_create_info_setdefault(libxl__gc *gc,
     }
 }
 
-void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
-                                              libxl_domain_build_info *b_info)
+int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
+                                             libxl_domain_build_info *b_info,
+                                             const libxl_physinfo *physinfo)
 {
     /* ACPI is disabled by default */
     libxl_defbool_setdefault(&b_info->acpi, false);
@@ -1399,6 +1400,8 @@ void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
     memset(&b_info->u, '\0', sizeof(b_info->u));
     b_info->type = LIBXL_DOMAIN_TYPE_INVALID;
     libxl_domain_build_info_init_type(b_info, LIBXL_DOMAIN_TYPE_PVH);
+
+    return 0;
 }
 
 int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
diff --git a/tools/libs/light/libxl_create.c b/tools/libs/light/libxl_create.c
index 15ed021f41..88d08d7277 100644
--- a/tools/libs/light/libxl_create.c
+++ b/tools/libs/light/libxl_create.c
@@ -75,6 +75,7 @@ int libxl__domain_build_info_setdefault(libxl__gc *gc,
                                         libxl_domain_build_info *b_info)
 {
     int i, rc;
+    libxl_physinfo info;
 
     if (b_info->type != LIBXL_DOMAIN_TYPE_HVM &&
         b_info->type != LIBXL_DOMAIN_TYPE_PV &&
@@ -264,7 +265,18 @@ int libxl__domain_build_info_setdefault(libxl__gc *gc,
     if (!b_info->event_channels)
         b_info->event_channels = 1023;
 
-    libxl__arch_domain_build_info_setdefault(gc, b_info);
+    rc = libxl_get_physinfo(CTX, &info);
+    if (rc) {
+        LOG(ERROR, "failed to get hypervisor info");
+        return rc;
+    }
+
+    rc = libxl__arch_domain_build_info_setdefault(gc, b_info, &info);
+    if (rc) {
+        LOG(ERROR, "unable to set domain arch build info defaults");
+        return rc;
+    }
+
     libxl_defbool_setdefault(&b_info->dm_restrict, false);
 
     if (b_info->iommu_memkb == LIBXL_MEMKB_DEFAULT)
@@ -457,14 +469,6 @@ int libxl__domain_build_info_setdefault(libxl__gc *gc,
     }
 
     if (b_info->max_grant_version == LIBXL_MAX_GRANT_DEFAULT) {
-        libxl_physinfo info;
-
-        rc = libxl_get_physinfo(CTX, &info);
-        if (rc) {
-            LOG(ERROR, "failed to get hypervisor info");
-            return rc;
-        }
-
         if (info.cap_gnttab_v2)
             b_info->max_grant_version = 2;
         else if (info.cap_gnttab_v1)
diff --git a/tools/libs/light/libxl_types.idl b/tools/libs/light/libxl_types.idl
index 42ac6c357b..db5eb0a0b3 100644
--- a/tools/libs/light/libxl_types.idl
+++ b/tools/libs/light/libxl_types.idl
@@ -648,6 +648,8 @@ libxl_domain_build_info = Struct("domain_build_info",[
                                ("vuart", libxl_vuart_type),
                               ])),
     ("arch_x86", Struct(None, [("msr_relaxed", libxl_defbool),
+                               ("assisted_xapic", libxl_defbool),
+                               ("assisted_x2apic", libxl_defbool),
                               ])),
     # Alternate p2m is not bound to any architecture or guest type, as it is
     # supported by x86 HVM and ARM support is planned.
diff --git a/tools/libs/light/libxl_x86.c b/tools/libs/light/libxl_x86.c
index e0a06ecfe3..c7f9f3774f 100644
--- a/tools/libs/light/libxl_x86.c
+++ b/tools/libs/light/libxl_x86.c
@@ -23,6 +23,14 @@ int libxl__arch_domain_prepare_config(libxl__gc *gc,
     if (libxl_defbool_val(d_config->b_info.arch_x86.msr_relaxed))
         config->arch.misc_flags |= XEN_X86_MSR_RELAXED;
 
+    if (d_config->c_info.type != LIBXL_DOMAIN_TYPE_PV)
+    {
+        if (libxl_defbool_val(d_config->b_info.arch_x86.assisted_xapic))
+            config->arch.misc_flags |= XEN_X86_ASSISTED_XAPIC;
+
+        if (libxl_defbool_val(d_config->b_info.arch_x86.assisted_x2apic))
+            config->arch.misc_flags |= XEN_X86_ASSISTED_X2APIC;
+    }
     return 0;
 }
 
@@ -819,11 +827,26 @@ void libxl__arch_domain_create_info_setdefault(libxl__gc *gc,
 {
 }
 
-void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
-                                              libxl_domain_build_info *b_info)
+int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
+                                             libxl_domain_build_info *b_info,
+                                             const libxl_physinfo *physinfo)
 {
     libxl_defbool_setdefault(&b_info->acpi, true);
     libxl_defbool_setdefault(&b_info->arch_x86.msr_relaxed, false);
+
+    if (b_info->type != LIBXL_DOMAIN_TYPE_PV) {
+        libxl_defbool_setdefault(&b_info->arch_x86.assisted_xapic,
+                             physinfo->cap_assisted_xapic);
+        libxl_defbool_setdefault(&b_info->arch_x86.assisted_x2apic,
+                             physinfo->cap_assisted_x2apic);
+    }
+    else if (!libxl_defbool_is_default(b_info->arch_x86.assisted_xapic) ||
+             !libxl_defbool_is_default(b_info->arch_x86.assisted_x2apic)) {
+        LOG(ERROR, "Interrupt Controller Virtualization not supported for PV");
+        return ERROR_INVAL;
+    }
+
+    return 0;
 }
 
 int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
diff --git a/tools/ocaml/libs/xc/xenctrl.ml b/tools/ocaml/libs/xc/xenctrl.ml
index 712456e098..32f3028828 100644
--- a/tools/ocaml/libs/xc/xenctrl.ml
+++ b/tools/ocaml/libs/xc/xenctrl.ml
@@ -50,6 +50,8 @@ type x86_arch_emulation_flags =
 
 type x86_arch_misc_flags =
 	| X86_MSR_RELAXED
+	| X86_ASSISTED_XAPIC
+	| X86_ASSISTED_X2APIC
 
 type xen_x86_arch_domainconfig =
 {
diff --git a/tools/ocaml/libs/xc/xenctrl.mli b/tools/ocaml/libs/xc/xenctrl.mli
index b034434f68..d0fcbc8866 100644
--- a/tools/ocaml/libs/xc/xenctrl.mli
+++ b/tools/ocaml/libs/xc/xenctrl.mli
@@ -44,6 +44,8 @@ type x86_arch_emulation_flags =
 
 type x86_arch_misc_flags =
   | X86_MSR_RELAXED
+  | X86_ASSISTED_XAPIC
+  | X86_ASSISTED_X2APIC
 
 type xen_x86_arch_domainconfig = {
   emulation_flags: x86_arch_emulation_flags list;
diff --git a/tools/ocaml/libs/xc/xenctrl_stubs.c b/tools/ocaml/libs/xc/xenctrl_stubs.c
index 7e9c32ad1b..5df8aaa58f 100644
--- a/tools/ocaml/libs/xc/xenctrl_stubs.c
+++ b/tools/ocaml/libs/xc/xenctrl_stubs.c
@@ -239,7 +239,7 @@ CAMLprim value stub_xc_domain_create(value xch, value wanted_domid, value config
 
 		cfg.arch.misc_flags = ocaml_list_to_c_bitmap
 			/* ! x86_arch_misc_flags X86_ none */
-			/* ! XEN_X86_ XEN_X86_MSR_RELAXED all */
+			/* ! XEN_X86_ XEN_X86_ASSISTED_X2APIC max */
 			(VAL_MISC_FLAGS);
 
 #undef VAL_MISC_FLAGS
diff --git a/tools/xl/xl.c b/tools/xl/xl.c
index 2d1ec18ea3..31eb223309 100644
--- a/tools/xl/xl.c
+++ b/tools/xl/xl.c
@@ -57,6 +57,8 @@ int max_grant_frames = -1;
 int max_maptrack_frames = -1;
 int max_grant_version = LIBXL_MAX_GRANT_DEFAULT;
 libxl_domid domid_policy = INVALID_DOMID;
+int assisted_xapic = -1;
+int assisted_x2apic = -1;
 
 xentoollog_level minmsglevel = minmsglevel_default;
 
@@ -201,6 +203,12 @@ static void parse_global_config(const char *configfile,
     if (!xlu_cfg_get_long (config, "claim_mode", &l, 0))
         claim_mode = l;
 
+    if (!xlu_cfg_get_long (config, "assisted_xapic", &l, 0))
+        assisted_xapic = l;
+
+    if (!xlu_cfg_get_long (config, "assisted_x2apic", &l, 0))
+        assisted_x2apic = l;
+
     xlu_cfg_replace_string (config, "remus.default.netbufscript",
         &default_remus_netbufscript, 0);
     xlu_cfg_replace_string (config, "colo.default.proxyscript",
diff --git a/tools/xl/xl.h b/tools/xl/xl.h
index c5c4bedbdd..528deb3feb 100644
--- a/tools/xl/xl.h
+++ b/tools/xl/xl.h
@@ -286,6 +286,8 @@ extern libxl_bitmap global_vm_affinity_mask;
 extern libxl_bitmap global_hvm_affinity_mask;
 extern libxl_bitmap global_pv_affinity_mask;
 extern libxl_domid domid_policy;
+extern int assisted_xapic;
+extern int assisted_x2apic;
 
 enum output_format {
     OUTPUT_FORMAT_JSON,
diff --git a/tools/xl/xl_parse.c b/tools/xl/xl_parse.c
index 117fcdcb2b..0ab9b145fe 100644
--- a/tools/xl/xl_parse.c
+++ b/tools/xl/xl_parse.c
@@ -1681,6 +1681,22 @@ void parse_config_data(const char *config_source,
         xlu_cfg_get_defbool(config, "vpt_align", &b_info->u.hvm.vpt_align, 0);
         xlu_cfg_get_defbool(config, "apic", &b_info->apic, 0);
 
+        e = xlu_cfg_get_long(config, "assisted_xapic", &l , 0);
+        if ((e == ESRCH && assisted_xapic != -1)) /* use global default if present */
+            libxl_defbool_set(&b_info->arch_x86.assisted_xapic, assisted_xapic);
+        else if (!e)
+            libxl_defbool_set(&b_info->arch_x86.assisted_xapic, l);
+        else
+            exit(1);
+
+        e = xlu_cfg_get_long(config, "assisted_x2apic", &l, 0);
+        if ((e == ESRCH && assisted_x2apic != -1)) /* use global default if present */
+            libxl_defbool_set(&b_info->arch_x86.assisted_x2apic, assisted_x2apic);
+        else if (!e)
+            libxl_defbool_set(&b_info->arch_x86.assisted_x2apic, l);
+        else
+            exit(1);
+
         switch (xlu_cfg_get_list(config, "viridian",
                                  &viridian, &num_viridian, 1))
         {
diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c
index a5048ed654..b18d5c9b52 100644
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -619,6 +619,8 @@ int arch_sanitise_domain_config(struct xen_domctl_createdomain *config)
     bool hvm = config->flags & XEN_DOMCTL_CDF_hvm;
     bool hap = config->flags & XEN_DOMCTL_CDF_hap;
     bool nested_virt = config->flags & XEN_DOMCTL_CDF_nested_virt;
+    bool assisted_xapic = config->arch.misc_flags & XEN_X86_ASSISTED_XAPIC;
+    bool assisted_x2apic = config->arch.misc_flags & XEN_X86_ASSISTED_X2APIC;
     unsigned int max_vcpus;
 
     if ( hvm ? !hvm_enabled : !IS_ENABLED(CONFIG_PV) )
@@ -685,13 +687,31 @@ int arch_sanitise_domain_config(struct xen_domctl_createdomain *config)
         }
     }
 
-    if ( config->arch.misc_flags & ~XEN_X86_MSR_RELAXED )
+    if ( config->arch.misc_flags & ~(XEN_X86_MSR_RELAXED |
+                                     XEN_X86_ASSISTED_XAPIC |
+                                     XEN_X86_ASSISTED_X2APIC) )
     {
         dprintk(XENLOG_INFO, "Invalid arch misc flags %#x\n",
                 config->arch.misc_flags);
         return -EINVAL;
     }
 
+    if ( (assisted_xapic || assisted_x2apic) && !hvm )
+    {
+        dprintk(XENLOG_INFO,
+                "Interrupt Controller Virtualization not supported for PV\n");
+        return -ENODEV;
+    }
+
+    if ( (assisted_xapic && !assisted_xapic_available) ||
+         (assisted_x2apic && !assisted_x2apic_available) )
+    {
+        dprintk(XENLOG_INFO,
+                "Hardware assisted x%sAPIC requested but not available\n",
+                assisted_xapic && !assisted_xapic_available ? "" : "2");
+        return -EINVAL;
+    }
+
     return 0;
 }
 
@@ -864,6 +884,12 @@ int arch_domain_create(struct domain *d,
 
     d->arch.msr_relaxed = config->arch.misc_flags & XEN_X86_MSR_RELAXED;
 
+    d->arch.hvm.assisted_xapic =
+        config->arch.misc_flags & XEN_X86_ASSISTED_XAPIC;
+
+    d->arch.hvm.assisted_x2apic =
+        config->arch.misc_flags & XEN_X86_ASSISTED_X2APIC;
+
     return 0;
 
  fail:
diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
index 77ce0b2121..7adb043ab7 100644
--- a/xen/arch/x86/hvm/vmx/vmcs.c
+++ b/xen/arch/x86/hvm/vmx/vmcs.c
@@ -1157,6 +1157,10 @@ static int construct_vmcs(struct vcpu *v)
         __vmwrite(PLE_WINDOW, ple_window);
     }
 
+    if ( !has_assisted_xapic(v->domain) )
+        v->arch.hvm.vmx.secondary_exec_control &=
+            ~SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES;
+
     if ( cpu_has_vmx_secondary_exec_control )
         __vmwrite(SECONDARY_VM_EXEC_CONTROL,
                   v->arch.hvm.vmx.secondary_exec_control);
diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
index c075370f64..949ddd684c 100644
--- a/xen/arch/x86/hvm/vmx/vmx.c
+++ b/xen/arch/x86/hvm/vmx/vmx.c
@@ -3344,16 +3344,11 @@ static void vmx_install_vlapic_mapping(struct vcpu *v)
 
 void vmx_vlapic_msr_changed(struct vcpu *v)
 {
-    int virtualize_x2apic_mode;
     struct vlapic *vlapic = vcpu_vlapic(v);
     unsigned int msr;
 
-    virtualize_x2apic_mode = ( (cpu_has_vmx_apic_reg_virt ||
-                                cpu_has_vmx_virtual_intr_delivery) &&
-                               cpu_has_vmx_virtualize_x2apic_mode );
-
-    if ( !cpu_has_vmx_virtualize_apic_accesses &&
-         !virtualize_x2apic_mode )
+    if ( !has_assisted_xapic(v->domain) &&
+         !has_assisted_x2apic(v->domain) )
         return;
 
     vmx_vmcs_enter(v);
@@ -3363,7 +3358,7 @@ void vmx_vlapic_msr_changed(struct vcpu *v)
     if ( !vlapic_hw_disabled(vlapic) &&
          (vlapic_base_address(vlapic) == APIC_DEFAULT_PHYS_BASE) )
     {
-        if ( virtualize_x2apic_mode && vlapic_x2apic_mode(vlapic) )
+        if ( has_assisted_x2apic(v->domain) && vlapic_x2apic_mode(vlapic) )
         {
             v->arch.hvm.vmx.secondary_exec_control |=
                 SECONDARY_EXEC_VIRTUALIZE_X2APIC_MODE;
@@ -3384,7 +3379,7 @@ void vmx_vlapic_msr_changed(struct vcpu *v)
                 vmx_clear_msr_intercept(v, MSR_X2APIC_SELF, VMX_MSR_W);
             }
         }
-        else
+        else if ( has_assisted_xapic(v->domain) )
             v->arch.hvm.vmx.secondary_exec_control |=
                 SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES;
     }
diff --git a/xen/arch/x86/include/asm/hvm/domain.h b/xen/arch/x86/include/asm/hvm/domain.h
index 698455444e..92bf53483c 100644
--- a/xen/arch/x86/include/asm/hvm/domain.h
+++ b/xen/arch/x86/include/asm/hvm/domain.h
@@ -117,6 +117,12 @@ struct hvm_domain {
 
     bool                   is_s3_suspended;
 
+    /* xAPIC hardware assisted virtualization. */
+    bool                   assisted_xapic;
+
+    /* x2APIC hardware assisted virtualization. */
+    bool                   assisted_x2apic;
+
     /* hypervisor intercepted msix table */
     struct list_head       msixtbl_list;
 
diff --git a/xen/arch/x86/include/asm/hvm/hvm.h b/xen/arch/x86/include/asm/hvm/hvm.h
index 5b7ec0cf69..65a978f670 100644
--- a/xen/arch/x86/include/asm/hvm/hvm.h
+++ b/xen/arch/x86/include/asm/hvm/hvm.h
@@ -373,6 +373,12 @@ int hvm_get_param(struct domain *d, uint32_t index, uint64_t *value);
 #define hvm_tsc_scaling_ratio(d) \
     ((d)->arch.hvm.tsc_scaling_ratio)
 
+#define has_assisted_xapic(d) \
+    ((d)->arch.hvm.assisted_xapic)
+
+#define has_assisted_x2apic(d) \
+    ((d)->arch.hvm.assisted_x2apic)
+
 #define hvm_get_guest_time(v) hvm_get_guest_time_fixed(v, 0)
 
 #define hvm_paging_enabled(v) \
diff --git a/xen/arch/x86/traps.c b/xen/arch/x86/traps.c
index a2278d9499..a8dba88916 100644
--- a/xen/arch/x86/traps.c
+++ b/xen/arch/x86/traps.c
@@ -1121,7 +1121,8 @@ void cpuid_hypervisor_leaves(const struct vcpu *v, uint32_t leaf,
         if ( !is_hvm_domain(d) || subleaf != 0 )
             break;
 
-        if ( cpu_has_vmx_apic_reg_virt )
+        if ( cpu_has_vmx_apic_reg_virt &&
+             has_assisted_xapic(d) )
             res->a |= XEN_HVM_CPUID_APIC_ACCESS_VIRT;
 
         /*
@@ -1130,7 +1131,7 @@ void cpuid_hypervisor_leaves(const struct vcpu *v, uint32_t leaf,
          * and wrmsr in the guest will run without VMEXITs (see
          * vmx_vlapic_msr_changed()).
          */
-        if ( cpu_has_vmx_virtualize_x2apic_mode &&
+        if ( has_assisted_x2apic(d) &&
              cpu_has_vmx_apic_reg_virt &&
              cpu_has_vmx_virtual_intr_delivery )
             res->a |= XEN_HVM_CPUID_X2APIC_VIRT;
diff --git a/xen/include/public/arch-x86/xen.h b/xen/include/public/arch-x86/xen.h
index 7acd94c8eb..9da32c6239 100644
--- a/xen/include/public/arch-x86/xen.h
+++ b/xen/include/public/arch-x86/xen.h
@@ -317,6 +317,8 @@ struct xen_arch_domainconfig {
  * doesn't allow the guest to read or write to the underlying MSR.
  */
 #define XEN_X86_MSR_RELAXED (1u << 0)
+#define XEN_X86_ASSISTED_XAPIC (1u << 1)
+#define XEN_X86_ASSISTED_X2APIC (1u << 2)
     uint32_t misc_flags;
 };
 
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 17:39:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 17:39:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287282.487202 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRdnb-0006z4-Ha; Tue, 08 Mar 2022 17:39:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287282.487202; Tue, 08 Mar 2022 17:39:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRdnb-0006yx-Ef; Tue, 08 Mar 2022 17:39:03 +0000
Received: by outflank-mailman (input) for mailman id 287282;
 Tue, 08 Mar 2022 17:39:02 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nRdna-0006yY-5r
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 17:39:02 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRdnZ-0006EC-Ho; Tue, 08 Mar 2022 17:39:01 +0000
Received: from 54-240-197-236.amazon.com ([54.240.197.236]
 helo=[10.95.172.145]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRdnZ-00009m-BD; Tue, 08 Mar 2022 17:39:01 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=2reJbuTMJC4TlKJOP1pbyvyl/X11GzIAYnQf0fvyJMw=; b=IMnrltiE/oImxQywwGV5FnDeWV
	cVFyBtZxGlptDXKX7tjfCab+4+EgV8AWecuAOYWAOqcp53YKD8lYOS6wFxWWLpY3uW58Km0URwzA9
	CEDXqM1E2l+887p75YQFulZObMSc5/AA82HrJXB7B3pE98xQcL7BwtcRQkzAaTg7nQ5o=;
Message-ID: <bdebfad7-23f0-b0a9-4e70-7e84ebb88b53@xen.org>
Date: Tue, 8 Mar 2022 17:38:58 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [XEN v9 3/4] xen/arm64: io: Handle the abort due to access to
 stage1 translation table
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>,
 xen-devel@lists.xenproject.org
Cc: sstabellini@kernel.org, stefanos@xilinx.com, Volodymyr_Babchuk@epam.com,
 bertrand.marquis@arm.com, andrew.cooper3@citrix.com,
 george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org,
 roger.pau@citrix.com
References: <20220301124022.10168-1-ayankuma@xilinx.com>
 <20220301124022.10168-4-ayankuma@xilinx.com>
 <68acfbf0-f2c1-c52e-93a3-632f1286d90f@xen.org>
 <5d5b0fc1-6f47-dfc0-dca3-5d60483a6eae@xilinx.com>
 <3e9d5d0c-f68f-004e-06b7-c4f0452f1e64@xen.org>
 <124726df-eafe-014a-ea9a-f97e0921eccc@xilinx.com>
 <6c4e63e4-4f9f-68f4-5e4e-f69cf6567e1a@xen.org>
 <b6e2a7eb-9d14-077d-c2d9-04528ffaa53a@xilinx.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <b6e2a7eb-9d14-077d-c2d9-04528ffaa53a@xilinx.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi,

On 08/03/2022 11:22, Ayan Kumar Halder wrote:
> Hi Julien,
> 
> On 07/03/2022 23:59, Julien Grall wrote:
>> Hi,
>>
>> On 07/03/2022 22:23, Ayan Kumar Halder wrote:
>>>
>>> On 07/03/2022 19:37, Julien Grall wrote:
>>>>
>>>>
>>>> On 07/03/2022 14:27, Ayan Kumar Halder wrote:
>>>>> Hi Julien,
>>>>
>>>> Hi Ayan,
>>>
>>> Hi Julien,
>>>
>>> I need a bit of clarification to understand this.
>>>
>>>>
>>>>>
>>>>> One clarification.
>>>>>
>>>>> On 04/03/2022 10:39, Julien Grall wrote:
>>>>>> Hi Ayan,
>>>>>>
>>>>>> On 01/03/2022 12:40, Ayan Kumar Halder wrote:
>>>>>>> If the abort was caused due to access to stage1 translation 
>>>>>>> table, Xen
>>>>>>> will assume that the stage1 translation table is in the non MMIO 
>>>>>>> region.
>>>>
>>>> Reading this commit message again. I think you want to explain why 
>>>> we want to do that because, from my understanding, this is 
>>>> technically not forbidden by the Arm Arm.
>>>>
>>>> From the previous discussion, we want to do this because we can't 
>>>> easily handle such fault on emulated region (we have no away to the 
>>>> walker the value read).
>>>
>>> Sorry, Can you explain this a bit more ? Do you mean that if the page 
>>> table is located in the emulated region, map_domain_page() (called 
>>> from p2m_next_level()) will fail.
>>
>> For data abort with valid syndrome, you will have a register to write 
>> back the value read. When the data abort has s1ptw == 1, AFAICT, we 
>> have no information how to return the value.
> 
> Do you mean that for s1ptw, we get an intermediate physical address ?
> 
>      if ( hpfar_is_valid(xabt.s1ptw, fsc) )
>          gpa = get_faulting_ipa(gva);

No. That's not relevant here. We always need a IPA in order to deal with 
the fault.

> 
> If the IPA corresponds to an emulated region, then Xen can read the 
> emulated address, but can't return the value to the guest OS.
That wouldn't be the guest OS. But the page-table walker in the CPU.

>>> Can Linux or any OS keep its page tables in the direct MMIO space ? 
>>> If yes, then try_map_mmio() needs to be invoked to map the region, so 
>>> that OS can access it. If not, then Xen needs to return abort because 
>>> the OS may be behaving maliciously.
>>
>> I think what matters is whether the Arm Arm would or would not allow 
>> it. From what I can tell there are no such restriction. So we would 
>> need to be cautious to restrict it further than necessary.
>>
>>>
>>> My understanding from previous discussion was that it does not make 
>>> sense for linux or any OS to keep its page tables in any MMIO region 
>>> (emulated or direct). Please correct me if mistaken.
>>
>> At the moment, none of the regions emulated by Xen could be used for 
>> page-tables. I am also not sure how we should handle such access if 
>> they arise. So it is more convenient to simply forbid them.
>>
>> Regarding direct MMIO, see above. Correct me if I am wrong, but it 
>> should not be a problem for Xen to deal with them. So while I agree 
>> this doesn't seem to make sense, the restriction seems unnecessary.
> 
> So the behavior will be :-
> 
> 1. If the stage1 translation table is in the non MMIO region or 'direct 
> mapped' MMIO region, then invoke p2m_resolve_translation_fault() and 
> try_map_mmio() to resolve the fault. If it succeeds, then return to the 
> guest to retry.

When 1. happens we don't know yet if the stage1 will be a non MMIO 
region or 'direct mapped'. Instead, we only know that the ISS syndrome 
is invalid.

If it is a prefetch abort or the syndrome is invalid, then we should 
call check_p2m().

> 
> 2. If the previous step fails and for any other scenario (ie stage1 
> translation table is in emulated MMIO region or the address is invalid), 
> return the abort to the guest.

If check_p2m() didn't success and it is a fault on stage-1 walk, then we 
should send an abort.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 18:17:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 18:17:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287327.487373 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nReON-0005RE-1E; Tue, 08 Mar 2022 18:17:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287327.487373; Tue, 08 Mar 2022 18:17:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nReOM-0005Py-Po; Tue, 08 Mar 2022 18:17:02 +0000
Received: by outflank-mailman (input) for mailman id 287327;
 Tue, 08 Mar 2022 18:17:01 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=aaaq=TT=xenbits.xen.org=julieng@srs-se1.protection.inumbo.net>)
 id 1nReOK-0005BD-Lt
 for xen-devel@lists.xen.org; Tue, 08 Mar 2022 18:17:01 +0000
Received: from mail.xenproject.org (mail.xenproject.org [104.130.215.37])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ee3d4709-9f0b-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 19:16:55 +0100 (CET)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julieng@xenbits.xen.org>)
 id 1nReO3-00070x-51; Tue, 08 Mar 2022 18:16:43 +0000
Received: from julieng by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <julieng@xenbits.xen.org>)
 id 1nReO3-0003Ap-3Q; Tue, 08 Mar 2022 18:16:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ee3d4709-9f0b-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
	Content-Transfer-Encoding:Content-Type;
	bh=xkB31A/yPgikOkwHJiwdvsrDRjuwJ3VaTiWBLfbxbr4=; b=ks7hrkNwM1F7+Hd7SUZVOsHNxy
	CIgCwLuJ1JI8wdLXh6Pm86B8aIqb85NedCTUag3e2ac4iKke7cnIyR4T+36LH29u4avnPMr9HzZoh
	u7PV81awm+v/O8guCgG016n+c2mvaze54v/QPjpYR5UCu3YvZcKaxcG+8Cw4pzHhmopw=;
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
CC: Xen.org security team <security-team-members@xen.org>
Subject: Xen Security Advisory 398 v1 - Multiple speculative security issues
Message-Id: <E1nReO3-0003Ap-3Q@xenbits.xenproject.org>
Date: Tue, 08 Mar 2022 18:16:43 +0000

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

                    Xen Security Advisory XSA-398

                  Multiple speculative security issues

ISSUE DESCRIPTION
=================

Note: Multiple issues are contained in this XSA due to their interactions.

1) Researchers at VU Amsterdam have discovered Spectre-BHB, pertaining
   to the use of Branch History between privilege levels.

   ARM have assigned CVE-2022-23960.  Intel have assigned CVE-2022-0001
   (Branch History Injection) and CVE-2022-0002 (Intra-mode BTI).  AMD
   have no statement at the time of writing.

   For more details, see:
     https://vusec.net/projects/bhi-spectre-bhb
     https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
     https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html

2) Researchers at Open Source Security, Inc. have discovered that AMD
   CPUs may speculate beyond direct branches.

   AMD have assigned CVE-2021-26341.

   For more details, see:
     https://grsecurity.net/amd_branch_mispredictor_part_2_where_no_cpu_has_gone_before
     https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1026

3) Researchers at Intel have discovered that previous Spectre-v2
   recommendations of using lfence/jmp is incomplete.

   AMD have assigned CVE-2021-26401.

   For more details, see:
     https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036

IMPACT
======

An attacker might be able to infer the contents of arbitrary host
memory, including memory assigned to other guests.

VULNERABLE SYSTEMS
==================

Systems running all versions of Xen are affected.

Whether a CPU is potentially vulnerable depends on its
microarchitecture.  Consult your hardware vendor.

Xen does not have a managed runtime environment, so is not believed to
be vulnerable to CVE-2022-0002 irrespective of any hardware
susceptibility.

Xen does not have any known gadgets vulnerable to Direct Branch Straight
Line Speculation.  Therefore, no changes for CVE-2021-26341 are being
provided at this time.

The AMD BTI (Spectre v2) protections do not depend on isolating
predictions between different privileges, so the fact that Branch
History is shared (just like the Branch Target Buffer) is not believed
to be relevant to existing mitigations.  Therefore, there is no believed
impact from Spectre-BHB on AMD hardware.

Patches to mitigate CVE-2022-23960 on affected ARM CPUs are provided.

Intel have recommended not making any changes by default for
CVE-2022-0001.  Existing Spectre-v2 mitigations on pre-eIBRS hardware
are believed to be sufficient.  On eIBRS capable hardware, there is
uncertainty over the utility of Branch History Injection to an
adversary.  However, the risk can be removed by using eIBRS in
combination with retpoline.

For CVE-2021-26401, AMD have recommended using retpoline in preference
to lfence/jmp as previously recommended to mitigate Spectre-v2.  This
recommendation also mitigates any risk from Branch History Injection.

For both CVE-2022-0001 on Intel, and CVE-2021-26401 on AMD, the
suggestion to use retpoline is incompatible with CET Shadow Stacks as
implemented in Xen 4.14 and later.  The security team has decided that
disabling CET Shadow Stacks to work around speculation problems is not a
reasonable option for downstreams and end users.

Therefore, patches are also provided to:
 * Use IBRS on capable AMD hardware.  This also mitigates
   CVE-2021-26401.
 * Use CET Indirect Branch Tracking on capable Intel hardware.  CET-IBT
   has architectural guarantees about halting speculation, on top of
   being a hardware mechanism to protect against Call/Jump Oriented
   Programming attacks.

Both provide CET Shadow Stack compatible mitigations to these issues.  A
practical consequence of this decision is that CET Shadow Stacks are now
considered security supported, upgraded from Tech Preview previously.

Note: CET-IBT patches are incomplete and will be backported at a later date.

MITIGATION
==========

On AMD systems, CVE-2021-26401 can be mitigated by specifying:

 With CET-SS,    `spec-ctrl=bti-thunk=jmp,ibrs`
 Without CET-SS, `spec-ctrl=bti-thunk=retpoline`

on Xen's command line, and rebooting.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

Note that patches for released versions are generally prepared to
apply to the stable branches, and may not apply cleanly to the most
recent release tarball.  Downstreams are encouraged to update to the
tip of the stable branch before applying these patches.

xsa398/xsa398-*.patch           xen-unstable
xsa398/xsa398-4.16-*.patch      Xen 4.16.x
xsa398/xsa398-4.15-*.patch      Xen 4.15.x
xsa398/xsa398-4.14-*.patch      Xen 4.14.x
xsa398/xsa398-4.13-*.patch      Xen 4.13.x
xsa398/xsa398-4.12-*.patch      Xen 4.12.x

$ sha256sum xsa398* xsa398*/*
9219c48d103a7eeda0fa9cbb5fc5b2265713589e29a9a483d0f3fb6523859903  xsa398.meta
32e7a7627609de2273fe474979e339f6a578cbcf7ce007b6a047954a31aec135  xsa398/xsa398-1-xen-arm-Introduce-new-Arm-processors.patch
ef701fd64cfdd838299391cd736749db70ac3b18251d17768d42f4a610dda1be  xsa398/xsa398-2-xen-arm-move-errata-CSV2-check-earlier.patch
4d574bc40555f068608a595ade23ecdc224f8c0af86f447cba6e765d4ccde3ad  xsa398/xsa398-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch
29a2880ab4fa492deecd2f3dc590609d0df5e9210565ab4121be0d731c4140b0  xsa398/xsa398-4.12-1-xen-arm-Introduce-new-Arm-processors.patch
b81eb6a0f8ecde53318eeff1ec8bf1b3fd5f1b211a499317f6c596e831a90101  xsa398/xsa398-4.12-2-xen-arm-move-errata-CSV2-check-earlier.patch
a9f5adc44eeeaf5a694f94c91a32e714c765bbcf61066a03e3c52d79d28a3366  xsa398/xsa398-4.12-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch
e70d4c06f789c8f5f45c7e27289f8c7aa4c448a6e33f67fb113630ed79382fd9  xsa398/xsa398-4.12-4-xen-arm-Add-Spectre-BHB-handling.patch
6766c0b0d89f3be90046c05358e8b7c43c87b3e1012118af013faa098e783e74  xsa398/xsa398-4.12-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch
fd047878fd53e130cd7d8cfd1d50334a958e7e962606afaacd5aa1da186f6341  xsa398/xsa398-4.12-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch
1ef4fae89d2bc75e33eb6c8e5f55d0b6f5ba45a274f6d3b5ea7e2eef4c08ad63  xsa398/xsa398-4.13-1-xen-arm-Introduce-new-Arm-processors.patch
b0c25a34055dd5401dff1686f4f7ab978c6a449a76aa0e1b369f483fa184851a  xsa398/xsa398-4.13-2-xen-arm-move-errata-CSV2-check-earlier.patch
c6ffa2818480740dc30e232215531ab69c252e564df365c466e759886b207450  xsa398/xsa398-4.13-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch
a272621b1f03b2096a41d675b3ed46ff2c737cd2afcb3e2156a7ec2f8c31748b  xsa398/xsa398-4.13-4-xen-arm-Add-Spectre-BHB-handling.patch
8df9f4d3e7bd154246ebe7cd1bc0908ead1076aa35c0a183cd95359aa2173ad0  xsa398/xsa398-4.13-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch
02c3a3c45bf3c2592bbc809ce4a8eb24d0b9d31856e9641d5566af68ebf2b476  xsa398/xsa398-4.13-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch
59edd0b8303a39451893d425b8e7ab8aeacf3e6d0bf460ba66a3a323dc0e3145  xsa398/xsa398-4.14-1-xen-arm-Introduce-new-Arm-processors.patch
60bd3003759404b60fd8a7dcf0de87a13463bf64c3724f8fe6570e07c515cecb  xsa398/xsa398-4.14-2-xen-arm-move-errata-CSV2-check-earlier.patch
138511c69d00ef1dc0dfe5432af06d744e7b66945bada78024e343943fc001f2  xsa398/xsa398-4.14-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch
9c1b338511422629c98f11c42da27b1cd82435decc0531bca6b8a51218909101  xsa398/xsa398-4.14-4-xen-arm-Add-Spectre-BHB-handling.patch
1a212de641ac1cebfc1aee32c55e9f8bfac6b059f5419ed62589eed99cc0dea5  xsa398/xsa398-4.14-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch
da382a5baee60ecdf8b4cb0da2c1901b23f324b03dbbe33018fb825e70f78446  xsa398/xsa398-4.14-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch
296e5fdd53328e768908a4e790959841264a410548b4f52f7ccdcf793e9aca7a  xsa398/xsa398-4.15-1-xen-arm-Introduce-new-Arm-processors.patch
4498957a1f91c69e2a72cfcfb88804537ee0c05f05fa5d898f452a4dc8205f9e  xsa398/xsa398-4.15-2-xen-arm-move-errata-CSV2-check-earlier.patch
2f2b9ec3945283e48486cfd32d5b4343892040d48adc105a89e15953a128df3d  xsa398/xsa398-4.15-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch
6d0ade4dfb59fc87c7ae22e4faa333fb5ccef5ecc595de58ef9bcf35f4e3eb26  xsa398/xsa398-4.15-4-xen-arm-Add-Spectre-BHB-handling.patch
77a0a93cd9617c8f0ec0bab1b79f6ed60cab20f5b6ea76a9b6158c4d3a1d0d89  xsa398/xsa398-4.15-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch
7df5b320c5887c72c8ed4ffe5b4bcdce9263fde76fe6a67e0876933f8d1ebcff  xsa398/xsa398-4.15-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch
92bdba8102f88a2c9d71b46df4db43176fbf0082f9d438101407dbb7e6d458c6  xsa398/xsa398-4.16-1-xen-arm-Introduce-new-Arm-processors.patch
0c9a6fbebc13a0dee288d67a94562fd76e3c6aec20b543c66ac2c16a812973ee  xsa398/xsa398-4.16-2-xen-arm-move-errata-CSV2-check-earlier.patch
4f084857ed79af49d2814c02ff6e090a14d77bb0f0d29ac6ddce3576fdb98c68  xsa398/xsa398-4.16-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch
8032757effe8dbc5ef8479403461e604b1520f007489620eace3857b467a4fe2  xsa398/xsa398-4.16-4-xen-arm-Add-Spectre-BHB-handling.patch
3763998bb62d9b251b9358edff220fd22847729768c98dbd46362c290041025b  xsa398/xsa398-4.16-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch
114f07da2d79f45e0fa45c826c308b273e8c29b6d458bac10fe1aa231a3c2748  xsa398/xsa398-4.16-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch
1bedca674ecee5437e492e2f71275cd32e799d839d26a8f0d75ddee44db2e4d2  xsa398/xsa398-4-xen-arm-Add-Spectre-BHB-handling.patch
6d63089af3eca863599bbe20e26f1f12d2d9c9b637317e7af44fc59750b09f77  xsa398/xsa398-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch
f79e357079744bbee3e1f7d99d93196e925739297a16fdd8bc1cc86d3b846ce3  xsa398/xsa398-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch
$
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmInnKUMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZ6XQIAIpVmnShgCYyb51BWYzZJ1yG2elg2sVPByc7NF2C
5VcIVOpE3QHRxmJzMIM01peHrfIbY61ZFfD76pKaBaSxUjkvWII+9Q7Qir+q9I4+
X6Kwmf7pbjX2AsFR08TQoYyNMWKFwf0fhc4AK0BtDe83FuEu0wg3EY0sThzS32jf
WcBSVf29KOlh7dVEbBHKQsaGGjVJsgdloIK3z8XX4ACRpku+eUrl/7O7lJBtT0Zo
BxBPObMteh9IA3Pt0UqHqB8XZWLP95XDAq/FvLGts/EqxxKQAlfIm9hN8MJeDQUl
4Sh0dAE1Ab2eGdQSl5OeqXdvs+ZTBqlDbbLD/grIfJcYHUg=
=qv9D
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa398.meta"
Content-Disposition: attachment; filename="xsa398.meta"
Content-Transfer-Encoding: base64

ewogICJYU0EiOiAzOTgsCiAgIlN1cHBvcnRlZFZlcnNpb25zIjogWwogICAg
Im1hc3RlciIsCiAgICAiNC4xNiIsCiAgICAiNC4xNSIsCiAgICAiNC4xNCIs
CiAgICAiNC4xMyIsCiAgICAiNC4xMiIKICBdLAogICJUcmVlcyI6IFsKICAg
ICJ4ZW4iCiAgXSwKICAiUmVjaXBlcyI6IHsKICAgICI0LjEyIjogewogICAg
ICAiUmVjaXBlcyI6IHsKICAgICAgICAieGVuIjogewogICAgICAgICAgIlN0
YWJsZVJlZiI6ICI3MWU5ZDBjOTRkZDcxMGJmMjZhZGYxMTVlZTBhMmRiZWUz
MGJiOGMxIiwKICAgICAgICAgICJQcmVyZXFzIjogW10sCiAgICAgICAgICAi
UGF0Y2hlcyI6IFsKICAgICAgICAgICAgInhzYTM5OC94c2EzOTgtNC4xMi0q
LnBhdGNoIgogICAgICAgICAgXQogICAgICAgIH0KICAgICAgfQogICAgfSwK
ICAgICI0LjEzIjogewogICAgICAiUmVjaXBlcyI6IHsKICAgICAgICAieGVu
IjogewogICAgICAgICAgIlN0YWJsZVJlZiI6ICJjZTQ5YTFkNmQ4MTlmNDU4
NzQzNmI0ZmY3MzMzNGQzNjc2YzFhYWI2IiwKICAgICAgICAgICJQcmVyZXFz
IjogW10sCiAgICAgICAgICAiUGF0Y2hlcyI6IFsKICAgICAgICAgICAgInhz
YTM5OC94c2EzOTgtNC4xMy0qLnBhdGNoIgogICAgICAgICAgXQogICAgICAg
IH0KICAgICAgfQogICAgfSwKICAgICI0LjE0IjogewogICAgICAiUmVjaXBl
cyI6IHsKICAgICAgICAieGVuIjogewogICAgICAgICAgIlN0YWJsZVJlZiI6
ICI0OTZmYjBiZTkzOGEzMDk3MWFmMDVmZmUwZTU4YmI2NTY0M2EwOTcxIiwK
ICAgICAgICAgICJQcmVyZXFzIjogW10sCiAgICAgICAgICAiUGF0Y2hlcyI6
IFsKICAgICAgICAgICAgInhzYTM5OC94c2EzOTgtNC4xNC0qLnBhdGNoIgog
ICAgICAgICAgXQogICAgICAgIH0KICAgICAgfQogICAgfSwKICAgICI0LjE1
IjogewogICAgICAiUmVjaXBlcyI6IHsKICAgICAgICAieGVuIjogewogICAg
ICAgICAgIlN0YWJsZVJlZiI6ICIwODRiZjZiMTlhNzY0NWUwNTg3OGFmY2Jh
ODgzNzM1MzRiMDZiYjE4IiwKICAgICAgICAgICJQcmVyZXFzIjogW10sCiAg
ICAgICAgICAiUGF0Y2hlcyI6IFsKICAgICAgICAgICAgInhzYTM5OC94c2Ez
OTgtNC4xNS0qLnBhdGNoIgogICAgICAgICAgXQogICAgICAgIH0KICAgICAg
fQogICAgfSwKICAgICI0LjE2IjogewogICAgICAiUmVjaXBlcyI6IHsKICAg
ICAgICAieGVuIjogewogICAgICAgICAgIlN0YWJsZVJlZiI6ICIwOTQxZDZj
YjIzODNjNGU4N2Q3ZjUzZjFkZjc0ZTg4NTBlMTY0OWJjIiwKICAgICAgICAg
ICJQcmVyZXFzIjogW10sCiAgICAgICAgICAiUGF0Y2hlcyI6IFsKICAgICAg
ICAgICAgInhzYTM5OC94c2EzOTgtNC4xNi0qLnBhdGNoIgogICAgICAgICAg
XQogICAgICAgIH0KICAgICAgfQogICAgfSwKICAgICJtYXN0ZXIiOiB7CiAg
ICAgICJSZWNpcGVzIjogewogICAgICAgICJ4ZW4iOiB7CiAgICAgICAgICAi
U3RhYmxlUmVmIjogIjlkNGE0NDM4MGQyNzNkZTIyZDU3NTM4ODNjYmY1NTgx
Nzk1ZmYyNGQiLAogICAgICAgICAgIlByZXJlcXMiOiBbXSwKICAgICAgICAg
ICJQYXRjaGVzIjogWwogICAgICAgICAgICAieHNhMzk4L3hzYTM5OC0/LSou
cGF0Y2giCiAgICAgICAgICBdCiAgICAgICAgfQogICAgICB9CiAgICB9CiAg
fQp9

--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-1-xen-arm-Introduce-new-Arm-processors.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-1-xen-arm-Introduce-new-Arm-processors.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-2-xen-arm-move-errata-CSV2-check-earlier.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-2-xen-arm-move-errata-CSV2-check-earlier.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.12-1-xen-arm-Introduce-new-Arm-processors.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.12-1-xen-arm-Introduce-new-Arm-processors.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.12-2-xen-arm-move-errata-CSV2-check-earlier.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.12-2-xen-arm-move-errata-CSV2-check-earlier.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.12-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.12-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.12-4-xen-arm-Add-Spectre-BHB-handling.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.12-4-xen-arm-Add-Spectre-BHB-handling.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.12-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.12-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch"
Content-Transfer-Encoding: base64

RnJvbSAyMWY1YTdiMjI2ODdhYTFlMzg0NzgyYzhhMWMwNDE0OGYyODhhZDlm
IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCZXJ0cmFuZCBNYXJx
dWlzIDxiZXJ0cmFuZC5tYXJxdWlzQGFybS5jb20+CkRhdGU6IFRodSwgMTcg
RmViIDIwMjIgMTQ6NTI6NTQgKzAwMDAKU3ViamVjdDogeGVuL2FybTogQWxs
b3cgdG8gZGlzY292ZXIgYW5kIHVzZSBTTUNDQ19BUkNIX1dPUktBUk9VTkRf
MwoKQWxsb3cgZ3Vlc3QgdG8gZGlzY292ZXIgd2hldGhlciBvciBub3QgU01D
Q0NfQVJDSF9XT1JLQVJPVU5EXzMgaXMKc3VwcG9ydGVkIGFuZCBjcmVhdGUg
YSBmYXN0cGF0aCBpbiB0aGUgY29kZSB0byBoYW5kbGUgZ3Vlc3RzIHJlcXVl
c3QgdG8KZG8gdGhlIHdvcmthcm91bmQuCgpUaGUgZnVuY3Rpb24gU01DQ0Nf
QVJDSF9XT1JLQVJPVU5EXzMgd2lsbCBiZSBjYWxsZWQgYnkgdGhlIGd1ZXN0
IGZvcgpmbHVzaGluZyB0aGUgYnJhbmNoIGhpc3RvcnkuIFNvIHdlIHdhbnQg
dGhlIGhhbmRsaW5nIHRvIGJlIGFzIGZhc3QgYXMKcG9zc2libGUuCgpBcyB0
aGUgbWl0aWdhdGlvbiBpcyBhcHBsaWVkIG9uIGV2ZXJ5IGd1ZXN0IGV4aXQs
IHdlIGNhbiBjaGVjayBmb3IgdGhlCmNhbGwgYmVmb3JlIHNhdmluZyBhbGwg
Y29udGV4dCBhbmQgcmV0dXJuIHZlcnkgZWFybHkuCgpUaGlzIGlzIHBhcnQg
b2YgWFNBLTM5OCAvIENWRS0yMDIyLTIzOTYwLgoKU2lnbmVkLW9mZi1ieTog
QmVydHJhbmQgTWFycXVpcyA8YmVydHJhbmQubWFycXVpc0Bhcm0uY29tPgpS
ZXZpZXdlZC1ieTogSnVsaWVuIEdyYWxsIDxqdWxpZW5AeGVuLm9yZz4KKGNo
ZXJyeSBwaWNrZWQgZnJvbSBjb21taXQgYzBhNTZlYTBmZDkyZWNiNDcxOTM2
YjczNTVkZGJlY2JhZWEzNzA3YykKCmRpZmYgLS1naXQgYS94ZW4vYXJjaC9h
cm0vYXJtNjQvZW50cnkuUyBiL3hlbi9hcmNoL2FybS9hcm02NC9lbnRyeS5T
CmluZGV4IDk3YmQwNjIxN2JjZC4uNzg4ZDBhMTkxMmYwIDEwMDY0NAotLS0g
YS94ZW4vYXJjaC9hcm0vYXJtNjQvZW50cnkuUworKysgYi94ZW4vYXJjaC9h
cm0vYXJtNjQvZW50cnkuUwpAQCAtMzQzLDE2ICszNDMsMjYgQEAgZ3Vlc3Rf
c3luYzoKICAgICAgICAgY2JueiAgICB4MSwgZ3Vlc3Rfc3luY19zbG93cGF0
aCAgICAgICAgIC8qIHNob3VsZCBiZSAwIGZvciBIVkMgIzAgKi8KIAogICAg
ICAgICAvKgotICAgICAgICAgKiBGYXN0ZXN0IHBhdGggcG9zc2libGUgZm9y
IEFSTV9TTUNDQ19BUkNIX1dPUktBUk9VTkRfMS4KLSAgICAgICAgICogVGhl
IHdvcmthcm91bmQgaGFzIGFscmVhZHkgYmVlbiBhcHBsaWVkIG9uIHRoZSBl
eGNlcHRpb24KKyAgICAgICAgICogRmFzdGVzdCBwYXRoIHBvc3NpYmxlIGZv
ciBBUk1fU01DQ0NfQVJDSF9XT1JLQVJPVU5EXzEgYW5kCisgICAgICAgICAq
IEFSTV9TTUNDQ19BUkNIX1dPUktBUk9VTkRfMy4KKyAgICAgICAgICogVGhl
IHdvcmthcm91bmQgbmVlZGVkIGhhcyBhbHJlYWR5IGJlZW4gYXBwbGllZCBv
biB0aGUgZXhjZXB0aW9uCiAgICAgICAgICAqIGVudHJ5IGZyb20gdGhlIGd1
ZXN0LCBzbyBsZXQncyBxdWlja2x5IGdldCBiYWNrIHRvIHRoZSBndWVzdC4K
ICAgICAgICAgICoKICAgICAgICAgICogTm90ZSB0aGF0IGVvciBpcyB1c2Vk
IGJlY2F1c2UgdGhlIGZ1bmN0aW9uIGlkZW50aWZpZXIgY2Fubm90CiAgICAg
ICAgICAqIGJlIGVuY29kZWQgYXMgYW4gaW1tZWRpYXRlIGZvciBjbXAuCiAg
ICAgICAgICAqLwogICAgICAgICBlb3IgICAgIHcwLCB3MCwgI0FSTV9TTUND
Q19BUkNIX1dPUktBUk9VTkRfMV9GSUQKLSAgICAgICAgY2JueiAgICB3MCwg
Y2hlY2tfd2EyCisgICAgICAgIGNieiAgICAgdzAsIGZhc3RwYXRoX291dF93
b3JrYXJvdW5kCiAKKyAgICAgICAgLyogQVJNX1NNQ0NDX0FSQ0hfV09SS0FS
T1VORF8yIGhhbmRsaW5nICovCisgICAgICAgIGVvciAgICAgdzAsIHcwLCAj
KEFSTV9TTUNDQ19BUkNIX1dPUktBUk9VTkRfMV9GSUQgXiBBUk1fU01DQ0Nf
QVJDSF9XT1JLQVJPVU5EXzJfRklEKQorICAgICAgICBjYnogICAgIHcwLCB3
YTJfc3NiZAorCisgICAgICAgIC8qIEZhc3RwYXRoIG91dCBmb3IgQVJNX1NN
Q0NDX0FSQ0hfV09SS0FST1VORF8zICovCisgICAgICAgIGVvciAgICAgdzAs
IHcwLCAjKEFSTV9TTUNDQ19BUkNIX1dPUktBUk9VTkRfMl9GSUQgXiBBUk1f
U01DQ0NfQVJDSF9XT1JLQVJPVU5EXzNfRklEKQorICAgICAgICBjYm56ICAg
IHcwLCBndWVzdF9zeW5jX3Nsb3dwYXRoCisKK2Zhc3RwYXRoX291dF93b3Jr
YXJvdW5kOgogICAgICAgICAvKgogICAgICAgICAgKiBDbG9iYmVyIGJvdGgg
eDAgYW5kIHgxIHRvIHByZXZlbnQgbGVha2FnZS4gTm90ZSB0aGF0IHRoYW5r
cwogICAgICAgICAgKiB0aGUgZW9yLCB4MCA9IDAuCkBAIC0zNjEsMTAgKzM3
MSw3IEBAIGd1ZXN0X3N5bmM6CiAgICAgICAgIGVyZXQKICAgICAgICAgc2IK
IAotY2hlY2tfd2EyOgotICAgICAgICAvKiBBUk1fU01DQ0NfQVJDSF9XT1JL
QVJPVU5EXzIgaGFuZGxpbmcgKi8KLSAgICAgICAgZW9yICAgICB3MCwgdzAs
ICMoQVJNX1NNQ0NDX0FSQ0hfV09SS0FST1VORF8xX0ZJRCBeIEFSTV9TTUND
Q19BUkNIX1dPUktBUk9VTkRfMl9GSUQpCi0gICAgICAgIGNibnogICAgdzAs
IGd1ZXN0X3N5bmNfc2xvd3BhdGgKK3dhMl9zc2JkOgogI2lmZGVmIENPTkZJ
R19BUk1fU1NCRAogYWx0ZXJuYXRpdmVfY2IgYXJtX2VuYWJsZV93YTJfaGFu
ZGxpbmcKICAgICAgICAgYiAgICAgICB3YTJfZW5kCmRpZmYgLS1naXQgYS94
ZW4vYXJjaC9hcm0vdnNtYy5jIGIveGVuL2FyY2gvYXJtL3ZzbWMuYwppbmRl
eCBlY2Y0ZmFhMTNkYTMuLjY0Mzk3NmRiNjUzNyAxMDA2NDQKLS0tIGEveGVu
L2FyY2gvYXJtL3ZzbWMuYworKysgYi94ZW4vYXJjaC9hcm0vdnNtYy5jCkBA
IC0xMjMsNiArMTIzLDEwIEBAIHN0YXRpYyBib29sIGhhbmRsZV9hcmNoKHN0
cnVjdCBjcHVfdXNlcl9yZWdzICpyZWdzKQogICAgICAgICAgICAgICAgIGJy
ZWFrOwogICAgICAgICAgICAgfQogICAgICAgICAgICAgYnJlYWs7CisgICAg
ICAgIGNhc2UgQVJNX1NNQ0NDX0FSQ0hfV09SS0FST1VORF8zX0ZJRDoKKyAg
ICAgICAgICAgIGlmICggY3B1c19oYXZlX2NhcChBUk1fV09SS0FST1VORF9C
SEJfU01DQ18zKSApCisgICAgICAgICAgICAgICAgcmV0ID0gMDsKKyAgICAg
ICAgICAgIGJyZWFrOwogICAgICAgICB9CiAKICAgICAgICAgc2V0X3VzZXJf
cmVnKHJlZ3MsIDAsIHJldCk7CkBAIC0xMzEsNiArMTM1LDcgQEAgc3RhdGlj
IGJvb2wgaGFuZGxlX2FyY2goc3RydWN0IGNwdV91c2VyX3JlZ3MgKnJlZ3Mp
CiAgICAgfQogCiAgICAgY2FzZSBBUk1fU01DQ0NfQVJDSF9XT1JLQVJPVU5E
XzFfRklEOgorICAgIGNhc2UgQVJNX1NNQ0NDX0FSQ0hfV09SS0FST1VORF8z
X0ZJRDoKICAgICAgICAgLyogTm8gcmV0dXJuIHZhbHVlICovCiAgICAgICAg
IHJldHVybiB0cnVlOwogCg==

--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.12-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.12-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.13-1-xen-arm-Introduce-new-Arm-processors.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.13-1-xen-arm-Introduce-new-Arm-processors.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.13-2-xen-arm-move-errata-CSV2-check-earlier.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.13-2-xen-arm-move-errata-CSV2-check-earlier.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.13-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.13-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.13-4-xen-arm-Add-Spectre-BHB-handling.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.13-4-xen-arm-Add-Spectre-BHB-handling.patch"
Content-Transfer-Encoding: base64

RnJvbSA0NzEyNWY1ZmIyMDczYWJiOWQ1ZDNmNjU4MjRjZDA2NmU3ZWM2MmYx
IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBSYWh1bCBTaW5naCA8
cmFodWwuc2luZ2hAYXJtLmNvbT4KRGF0ZTogTW9uLCAxNCBGZWIgMjAyMiAx
ODo0NzozMiArMDAwMApTdWJqZWN0OiB4ZW4vYXJtOiBBZGQgU3BlY3RyZSBC
SEIgaGFuZGxpbmcKClRoaXMgY29tbWl0IGlzIGFkZGluZyBTcGVjdHJlIEJI
QiBoYW5kbGluZyB0byBYZW4gb24gQXJtLgpUaGUgY29tbWl0IGlzIGludHJv
ZHVjaW5nIG5ldyBhbHRlcm5hdGl2ZSBjb2RlIHRvIGJlIGV4ZWN1dGVkIGR1
cmluZwpleGNlcHRpb24gZW50cnk6Ci0gU01DQyB3b3JrYXJvdW5kIDMgY2Fs
bAotIGxvb3Agd29ya2Fyb3VuZCAod2l0aCA4LCAyNCBvciAzMiBpdGVyYXRp
b25zKQotIHVzZSBvZiBuZXcgY2xlYXJiaGIgaW5zdHJ1Y3Rpb24KCkNwdWVy
cmF0YSBpcyBtb2RpZmllZCBieSB0aGlzIHBhdGNoIHRvIGFwcGx5IHRoZSBy
ZXF1aXJlZCB3b3JrYXJvdW5kIGZvcgpDUFUgYWZmZWN0ZWQgYnkgU3BlY3Ry
ZSBCSEIgd2hlbiBDT05GSUdfQVJNNjRfSEFSREVOX0JSQU5DSF9QUkVESUNU
T1IgaXMKZW5hYmxlZC4KClRvIGRvIHRoaXMgdGhlIHN5c3RlbSBwcmV2aW91
c2x5IHVzZWQgdG8gYXBwbHkgc21jYyB3b3JrYXJvdW5kIDEgaXMKcmV1c2Vk
IGFuZCBuZXcgYWx0ZXJuYXRpdmUgY29kZSB0byBiZSBjb3BpZWQgaW4gdGhl
IGV4Y2VwdGlvbiBoYW5kbGVyIGlzCmludHJvZHVjZWQuCgpUbyBkZWZpbmUg
dGhlIHR5cGUgb2Ygd29ya2Fyb3VuZCByZXF1aXJlZCBieSBhIHByb2Nlc3Nv
ciwgNCBuZXcgY3B1CmNhcGFiaWxpdGllcyBhcmUgaW50cm9kdWNlZCAoZm9y
IGVhY2ggbnVtYmVyIG9mIGxvb3AgYW5kIGZvciBzbWNjCndvcmthcm91bmQg
MykuCgpXaGVuIGEgcHJvY2Vzc29yIGlzIGFmZmVjdGVkLCBlbmFibGVfc3Bl
Y3RyZV9iaGJfd29ya2Fyb3VuZCBpcyBjYWxsZWQKYW5kIGlmIHRoZSBwcm9j
ZXNzb3IgZG9lcyBub3QgaGF2ZSBDU1YyIHNldCB0byAzIG9yIEVDQkhCIGZl
YXR1cmUgKHdoaWNoCndvdWxkIG1lYW4gdGhhdCB0aGUgcHJvY2Vzc29yIGlz
IGRvaW5nIHdoYXQgaXMgcmVxdWlyZWQgaW4gaGFyZHdhcmUpLAp0aGUgcHJv
cGVyIGNvZGUgaXMgZW5hYmxlZCBhdCBleGNlcHRpb24gZW50cnkuCgpJbiB0
aGUgY2FzZSB3aGVyZSB3b3JrYXJvdW5kIDMgaXMgbm90IHN1cHBvcnRlZCBi
eSB0aGUgZmlybXdhcmUsIHdlCmVuYWJsZSB3b3JrYXJvdW5kIDEgd2hlbiBw
b3NzaWJsZSBhcyBpdCB3aWxsIGFsc28gbWl0aWdhdGUgU3BlY3RyZSBCSEIK
b24gc3lzdGVtcyB3aXRob3V0IENTVjIuCgpUaGlzIGlzIHBhcnQgb2YgWFNB
LTM5OCAvIENWRS0yMDIyLTIzOTYwLgoKU2lnbmVkLW9mZi1ieTogQmVydHJh
bmQgTWFycXVpcyA8YmVydHJhbmQubWFycXVpc0Bhcm0uY29tPgpTaWduZWQt
b2ZmLWJ5OiBSYWh1bCBTaW5naCA8cmFodWwuc2luZ2hAYXJtLmNvbT4KQWNr
ZWQtYnk6IEp1bGllbiBHcmFsbCA8anVsaWVuQHhlbi5vcmc+CihjaGVycnkg
cGlja2VkIGZyb20gY29tbWl0IDYyYzkxZWI2NmEyOTA0ZWVmYjFkMWQ5NjQy
ZTM2OTdhMWUzYzNhM2MpCgpkaWZmIC0tZ2l0IGEveGVuL2FyY2gvYXJtL2Fy
bTY0L2JwaS5TIGIveGVuL2FyY2gvYXJtL2FybTY0L2JwaS5TCmluZGV4IGQ4
NzQzZDk1NWM0YS4uNGU2MzgyNTIyMDQ4IDEwMDY0NAotLS0gYS94ZW4vYXJj
aC9hcm0vYXJtNjQvYnBpLlMKKysrIGIveGVuL2FyY2gvYXJtL2FybTY0L2Jw
aS5TCkBAIC01OCwxNiArNTgsNDIgQEAgRU5UUlkoX19icF9oYXJkZW5faHlw
X3ZlY3Nfc3RhcnQpCiAgICAgLmVuZHIKIEVOVFJZKF9fYnBfaGFyZGVuX2h5
cF92ZWNzX2VuZCkKIAotRU5UUlkoX19zbWNjY193b3JrYXJvdW5kXzFfc21j
X3N0YXJ0KQorLm1hY3JvIG1pdGlnYXRlX3NwZWN0cmVfYmhiX2xvb3AgY291
bnQKK0VOVFJZKF9fbWl0aWdhdGVfc3BlY3RyZV9iaGJfbG9vcF9zdGFydF9c
Y291bnQpCisgICAgc3RwICAgICB4MCwgeDEsIFtzcCwgIy0xNl0hCisgICAg
bW92ICAgICB4MCwgXGNvdW50CisuTHNwZWN0cmVfYmhiX2xvb3BcQDoKKyAg
ICBiICAgLiArIDQKKyAgICBzdWJzICAgIHgwLCB4MCwgIzEKKyAgICBiLm5l
ICAgIC5Mc3BlY3RyZV9iaGJfbG9vcFxACisgICAgc2IKKyAgICBsZHAgICAg
IHgwLCB4MSwgW3NwXSwgIzE2CitFTlRSWShfX21pdGlnYXRlX3NwZWN0cmVf
YmhiX2xvb3BfZW5kX1xjb3VudCkKKy5lbmRtCisKKy5tYWNybyBzbWNjY193
b3JrYXJvdW5kIG51bSBzbWNjX2lkCitFTlRSWShfX3NtY2NjX3dvcmthcm91
bmRfc21jX3N0YXJ0X1xudW0pCiAgICAgc3ViICAgICBzcCwgc3AsICMoOCAq
IDQpCiAgICAgc3RwICAgICB4MCwgeDEsIFtzcCwgIyg4ICogMildCiAgICAg
c3RwICAgICB4MiwgeDMsIFtzcCwgIyg4ICogMCldCi0gICAgbW92ICAgICB3
MCwgI0FSTV9TTUNDQ19BUkNIX1dPUktBUk9VTkRfMV9GSUQKKyAgICBtb3Yg
ICAgIHcwLCBcc21jY19pZAogICAgIHNtYyAgICAgIzAKICAgICBsZHAgICAg
IHgyLCB4MywgW3NwLCAjKDggKiAwKV0KICAgICBsZHAgICAgIHgwLCB4MSwg
W3NwLCAjKDggKiAyKV0KICAgICBhZGQgICAgIHNwLCBzcCwgIyg4ICogNCkK
LUVOVFJZKF9fc21jY2Nfd29ya2Fyb3VuZF8xX3NtY19lbmQpCitFTlRSWShf
X3NtY2NjX3dvcmthcm91bmRfc21jX2VuZF9cbnVtKQorLmVuZG0KKworRU5U
UlkoX19taXRpZ2F0ZV9zcGVjdHJlX2JoYl9jbGVhcl9pbnNuX3N0YXJ0KQor
ICAgIGNsZWFyYmhiCisgICAgaXNiCitFTlRSWShfX21pdGlnYXRlX3NwZWN0
cmVfYmhiX2NsZWFyX2luc25fZW5kKQorCittaXRpZ2F0ZV9zcGVjdHJlX2Jo
Yl9sb29wIDgKK21pdGlnYXRlX3NwZWN0cmVfYmhiX2xvb3AgMjQKK21pdGln
YXRlX3NwZWN0cmVfYmhiX2xvb3AgMzIKK3NtY2NjX3dvcmthcm91bmQgMSwg
I0FSTV9TTUNDQ19BUkNIX1dPUktBUk9VTkRfMV9GSUQKK3NtY2NjX3dvcmth
cm91bmQgMywgI0FSTV9TTUNDQ19BUkNIX1dPUktBUk9VTkRfM19GSUQKIAog
LyoKICAqIExvY2FsIHZhcmlhYmxlczoKZGlmZiAtLWdpdCBhL3hlbi9hcmNo
L2FybS9jcHVlcnJhdGEuYyBiL3hlbi9hcmNoL2FybS9jcHVlcnJhdGEuYwpp
bmRleCA3OTYyMDg4OWI0OWUuLjhkOWU5NzdiNzczNyAxMDA2NDQKLS0tIGEv
eGVuL2FyY2gvYXJtL2NwdWVycmF0YS5jCisrKyBiL3hlbi9hcmNoL2FybS9j
cHVlcnJhdGEuYwpAQCAtMTQ0LDcgKzE0NCwxNiBAQCBpbnN0YWxsX2JwX2hh
cmRlbmluZ192ZWMoY29uc3Qgc3RydWN0IGFybV9jcHVfY2FwYWJpbGl0aWVz
ICplbnRyeSwKICAgICByZXR1cm4gcmV0OwogfQogCi1leHRlcm4gY2hhciBf
X3NtY2NjX3dvcmthcm91bmRfMV9zbWNfc3RhcnRbXSwgX19zbWNjY193b3Jr
YXJvdW5kXzFfc21jX2VuZFtdOworZXh0ZXJuIGNoYXIgX19zbWNjY193b3Jr
YXJvdW5kX3NtY19zdGFydF8xW10sIF9fc21jY2Nfd29ya2Fyb3VuZF9zbWNf
ZW5kXzFbXTsKK2V4dGVybiBjaGFyIF9fc21jY2Nfd29ya2Fyb3VuZF9zbWNf
c3RhcnRfM1tdLCBfX3NtY2NjX3dvcmthcm91bmRfc21jX2VuZF8zW107Citl
eHRlcm4gY2hhciBfX21pdGlnYXRlX3NwZWN0cmVfYmhiX2NsZWFyX2luc25f
c3RhcnRbXSwKKyAgICAgICAgICAgIF9fbWl0aWdhdGVfc3BlY3RyZV9iaGJf
Y2xlYXJfaW5zbl9lbmRbXTsKK2V4dGVybiBjaGFyIF9fbWl0aWdhdGVfc3Bl
Y3RyZV9iaGJfbG9vcF9zdGFydF84W10sCisgICAgICAgICAgICBfX21pdGln
YXRlX3NwZWN0cmVfYmhiX2xvb3BfZW5kXzhbXTsKK2V4dGVybiBjaGFyIF9f
bWl0aWdhdGVfc3BlY3RyZV9iaGJfbG9vcF9zdGFydF8yNFtdLAorICAgICAg
ICAgICAgX19taXRpZ2F0ZV9zcGVjdHJlX2JoYl9sb29wX2VuZF8yNFtdOwor
ZXh0ZXJuIGNoYXIgX19taXRpZ2F0ZV9zcGVjdHJlX2JoYl9sb29wX3N0YXJ0
XzMyW10sCisgICAgICAgICAgICBfX21pdGlnYXRlX3NwZWN0cmVfYmhiX2xv
b3BfZW5kXzMyW107CiAKIHN0YXRpYyBpbnQgZW5hYmxlX3NtY2NjX2FyY2hf
d29ya2Fyb3VuZF8xKHZvaWQgKmRhdGEpCiB7CkBAIC0xNzYsOCArMTg1LDgg
QEAgc3RhdGljIGludCBlbmFibGVfc21jY2NfYXJjaF93b3JrYXJvdW5kXzEo
dm9pZCAqZGF0YSkKICAgICBpZiAoIChpbnQpcmVzLmEwIDwgMCApCiAgICAg
ICAgIGdvdG8gd2FybjsKIAotICAgIHJldHVybiAhaW5zdGFsbF9icF9oYXJk
ZW5pbmdfdmVjKGVudHJ5LF9fc21jY2Nfd29ya2Fyb3VuZF8xX3NtY19zdGFy
dCwKLSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBfX3Nt
Y2NjX3dvcmthcm91bmRfMV9zbWNfZW5kLAorICAgIHJldHVybiAhaW5zdGFs
bF9icF9oYXJkZW5pbmdfdmVjKGVudHJ5LF9fc21jY2Nfd29ya2Fyb3VuZF9z
bWNfc3RhcnRfMSwKKyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICBfX3NtY2NjX3dvcmthcm91bmRfc21jX2VuZF8xLAogICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICJjYWxsIEFSTV9TTUNDQ19B
UkNIX1dPUktBUk9VTkRfMSIpOwogCiB3YXJuOgpAQCAtMTkyLDYgKzIwMSw5
MyBAQCBzdGF0aWMgaW50IGVuYWJsZV9zbWNjY19hcmNoX3dvcmthcm91bmRf
MSh2b2lkICpkYXRhKQogICAgIHJldHVybiAwOwogfQogCisvKgorICogU3Bl
Y3RyZSBCSEIgTWl0aWdhdGlvbgorICoKKyAqIENQVSBpcyBlaXRoZXI6Cisg
KiAtIEhhdmluZyBDVlMyLjMgc28gaXQgaXMgbm90IGFmZmVjdGVkLgorICog
LSBIYXZpbmcgRUNCSEIgYW5kIGlzIGNsZWFyaW5nIHRoZSBicmFuY2ggaGlz
dG9yeSBidWZmZXIgd2hlbiBhbiBleGNlcHRpb24KKyAqICAgdG8gYSBkaWZm
ZXJlbnQgZXhjZXB0aW9uIGxldmVsIGlzIGhhcHBlbmluZyBzbyBubyBtaXRp
Z2F0aW9uIGlzIG5lZWRlZC4KKyAqIC0gTWl0aWdhdGluZyB1c2luZyBhIGxv
b3Agb24gZXhjZXB0aW9uIGVudHJ5IChudW1iZXIgb2YgbG9vcCBkZXBlbmRp
bmcgb24KKyAqICAgdGhlIENQVSkuCisgKiAtIE1pdGlnYXRpbmcgdXNpbmcg
dGhlIGZpcm13YXJlLgorICovCitzdGF0aWMgaW50IGVuYWJsZV9zcGVjdHJl
X2JoYl93b3JrYXJvdW5kKHZvaWQgKmRhdGEpCit7CisgICAgY29uc3Qgc3Ry
dWN0IGFybV9jcHVfY2FwYWJpbGl0aWVzICplbnRyeSA9IGRhdGE7CisKKyAg
ICAvKgorICAgICAqIEVuYWJsZSBjYWxsYmFja3MgYXJlIGNhbGxlZCBvbiBl
dmVyeSBDUFUgYmFzZWQgb24gdGhlIGNhcGFiaWxpdGllcywgc28KKyAgICAg
KiBkb3VibGUtY2hlY2sgd2hldGhlciB0aGUgQ1BVIG1hdGNoZXMgdGhlIGVu
dHJ5LgorICAgICAqLworICAgIGlmICggIWVudHJ5LT5tYXRjaGVzKGVudHJ5
KSApCisgICAgICAgIHJldHVybiAwOworCisgICAgaWYgKCBjcHVfZGF0YVtz
bXBfcHJvY2Vzc29yX2lkKCldLnBmcjY0LmNzdjIgPT0gMyApCisgICAgICAg
IHJldHVybiAwOworCisgICAgaWYgKCBjcHVfZGF0YVtzbXBfcHJvY2Vzc29y
X2lkKCldLm1tNjQuZWNiaGIgKQorICAgICAgICByZXR1cm4gMDsKKworICAg
IGlmICggY3B1X2RhdGFbc21wX3Byb2Nlc3Nvcl9pZCgpXS5pc2E2NC5jbGVh
cmJoYiApCisgICAgICAgIHJldHVybiAhaW5zdGFsbF9icF9oYXJkZW5pbmdf
dmVjKGVudHJ5LAorICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgX19taXRpZ2F0ZV9zcGVjdHJlX2JoYl9jbGVhcl9pbnNuX3N0YXJ0LAor
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgX19taXRpZ2F0
ZV9zcGVjdHJlX2JoYl9jbGVhcl9pbnNuX2VuZCwKKyAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAidXNlIGNsZWFyQkhCIGluc3RydWN0
aW9uIik7CisKKyAgICAvKiBBcHBseSBzb2x1dGlvbiBkZXBlbmRpbmcgb24g
aHdjYXBzIHNldCBvbiBhcm1fZXJyYXRhICovCisgICAgaWYgKCBjcHVzX2hh
dmVfY2FwKEFSTV9XT1JLQVJPVU5EX0JIQl9MT09QXzgpICkKKyAgICAgICAg
cmV0dXJuICFpbnN0YWxsX2JwX2hhcmRlbmluZ192ZWMoZW50cnksCisgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIF9fbWl0aWdh
dGVfc3BlY3RyZV9iaGJfbG9vcF9zdGFydF84LAorICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICBfX21pdGlnYXRlX3NwZWN0cmVf
YmhiX2xvb3BfZW5kXzgsCisgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICJ1c2UgOCBsb29wcyB3b3JrYXJvdW5kIik7CisKKyAg
ICBpZiAoIGNwdXNfaGF2ZV9jYXAoQVJNX1dPUktBUk9VTkRfQkhCX0xPT1Bf
MjQpICkKKyAgICAgICAgcmV0dXJuICFpbnN0YWxsX2JwX2hhcmRlbmluZ192
ZWMoZW50cnksCisgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgIF9fbWl0aWdhdGVfc3BlY3RyZV9iaGJfbG9vcF9zdGFydF8yNCwK
KyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgX19t
aXRpZ2F0ZV9zcGVjdHJlX2JoYl9sb29wX2VuZF8yNCwKKyAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgInVzZSAyNCBsb29wcyB3
b3JrYXJvdW5kIik7CisKKyAgICBpZiAoIGNwdXNfaGF2ZV9jYXAoQVJNX1dP
UktBUk9VTkRfQkhCX0xPT1BfMzIpICkKKyAgICAgICAgcmV0dXJuICFpbnN0
YWxsX2JwX2hhcmRlbmluZ192ZWMoZW50cnksCisgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgIF9fbWl0aWdhdGVfc3BlY3RyZV9i
aGJfbG9vcF9zdGFydF8zMiwKKyAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgX19taXRpZ2F0ZV9zcGVjdHJlX2JoYl9sb29wX2Vu
ZF8zMiwKKyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgInVzZSAzMiBsb29wcyB3b3JrYXJvdW5kIik7CisKKyAgICBpZiAoIGNw
dXNfaGF2ZV9jYXAoQVJNX1dPUktBUk9VTkRfQkhCX1NNQ0NfMykgKQorICAg
IHsKKyAgICAgICAgc3RydWN0IGFybV9zbWNjY19yZXMgcmVzOworCisgICAg
ICAgIGlmICggc21jY2NfdmVyIDwgU01DQ0NfVkVSU0lPTigxLCAxKSApCisg
ICAgICAgICAgICBnb3RvIHdhcm47CisKKyAgICAgICAgYXJtX3NtY2NjXzFf
MV9zbWMoQVJNX1NNQ0NDX0FSQ0hfRkVBVFVSRVNfRklELAorICAgICAgICAg
ICAgICAgICAgICAgICAgICBBUk1fU01DQ0NfQVJDSF9XT1JLQVJPVU5EXzNf
RklELCAmcmVzKTsKKyAgICAgICAgLyogVGhlIHJldHVybiB2YWx1ZSBpcyBp
biB0aGUgbG93ZXIgMzItYml0cy4gKi8KKyAgICAgICAgaWYgKCAoaW50KXJl
cy5hMCA8IDAgKQorICAgICAgICB7CisgICAgICAgICAgICAvKgorICAgICAg
ICAgICAgICogT24gcHJvY2Vzc29yIGFmZmVjdGVkIHdpdGggQ1NWMj0wLCB3
b3JrYXJvdW5kIDEgd2lsbCBtaXRpZ2F0ZQorICAgICAgICAgICAgICogYm90
aCBTcGVjdHJlIHYyIGFuZCBCSEIgc28gdXNlIGl0IHdoZW4gYXZhaWxhYmxl
CisgICAgICAgICAgICAgKi8KKyAgICAgICAgICAgIGlmICggZW5hYmxlX3Nt
Y2NjX2FyY2hfd29ya2Fyb3VuZF8xKGRhdGEpICkKKyAgICAgICAgICAgICAg
ICByZXR1cm4gMTsKKworICAgICAgICAgICAgZ290byB3YXJuOworICAgICAg
ICB9CisKKyAgICAgICAgcmV0dXJuICFpbnN0YWxsX2JwX2hhcmRlbmluZ192
ZWMoZW50cnksX19zbWNjY193b3JrYXJvdW5kX3NtY19zdGFydF8zLAorICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBfX3NtY2Nj
X3dvcmthcm91bmRfc21jX2VuZF8zLAorICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAiY2FsbCBBUk1fU01DQ0NfQVJDSF9XT1JL
QVJPVU5EXzMiKTsKKyAgICB9CisKK3dhcm46CisgICAgcHJpbnRrX29uY2Uo
IioqKiogTm8gc3VwcG9ydCBmb3IgYW55IHNwZWN0cmUgQkhCIHdvcmthcm91
bmQuICAqKioqXG4iCisgICAgICAgICAgICAgICAgIioqKiogUGxlYXNlIHVw
ZGF0ZSB5b3VyIGZpcm13YXJlLiAgICAgICAgICAgICAgICAqKioqXG4iKTsK
KworICAgIHJldHVybiAwOworfQorCiAjZW5kaWYgLyogQ09ORklHX0FSTTY0
X0hBUkRFTl9CUkFOQ0hfUFJFRElDVE9SICovCiAKIC8qIEhhcmRlbmluZyBC
cmFuY2ggcHJlZGljdG9yIGNvZGUgZm9yIEFybTMyICovCkBAIC00MzcsMTkg
KzUzMyw3NyBAQCBzdGF0aWMgY29uc3Qgc3RydWN0IGFybV9jcHVfY2FwYWJp
bGl0aWVzIGFybV9lcnJhdGFbXSA9IHsKICAgICB9LAogICAgIHsKICAgICAg
ICAgLmNhcGFiaWxpdHkgPSBBUk1fSEFSREVOX0JSQU5DSF9QUkVESUNUT1Is
Ci0gICAgICAgIE1JRFJfQUxMX1ZFUlNJT05TKE1JRFJfQ09SVEVYX0E3Miks
CisgICAgICAgIE1JRFJfUkFOR0UoTUlEUl9DT1JURVhfQTcyLCAwLCAxIDw8
IE1JRFJfVkFSSUFOVF9TSElGVCksCiAgICAgICAgIC5lbmFibGUgPSBlbmFi
bGVfc21jY2NfYXJjaF93b3JrYXJvdW5kXzEsCiAgICAgfSwKICAgICB7Ci0g
ICAgICAgIC5jYXBhYmlsaXR5ID0gQVJNX0hBUkRFTl9CUkFOQ0hfUFJFRElD
VE9SLAorICAgICAgICAuY2FwYWJpbGl0eSA9IEFSTV9XT1JLQVJPVU5EX0JI
Ql9TTUNDXzMsCiAgICAgICAgIE1JRFJfQUxMX1ZFUlNJT05TKE1JRFJfQ09S
VEVYX0E3MyksCi0gICAgICAgIC5lbmFibGUgPSBlbmFibGVfc21jY2NfYXJj
aF93b3JrYXJvdW5kXzEsCisgICAgICAgIC5lbmFibGUgPSBlbmFibGVfc3Bl
Y3RyZV9iaGJfd29ya2Fyb3VuZCwKICAgICB9LAogICAgIHsKLSAgICAgICAg
LmNhcGFiaWxpdHkgPSBBUk1fSEFSREVOX0JSQU5DSF9QUkVESUNUT1IsCisg
ICAgICAgIC5jYXBhYmlsaXR5ID0gQVJNX1dPUktBUk9VTkRfQkhCX1NNQ0Nf
MywKICAgICAgICAgTUlEUl9BTExfVkVSU0lPTlMoTUlEUl9DT1JURVhfQTc1
KSwKLSAgICAgICAgLmVuYWJsZSA9IGVuYWJsZV9zbWNjY19hcmNoX3dvcmth
cm91bmRfMSwKKyAgICAgICAgLmVuYWJsZSA9IGVuYWJsZV9zcGVjdHJlX2Jo
Yl93b3JrYXJvdW5kLAorICAgIH0sCisgICAgLyogc3BlY3RyZSBCSEIgKi8K
KyAgICB7CisgICAgICAgIC5jYXBhYmlsaXR5ID0gQVJNX1dPUktBUk9VTkRf
QkhCX0xPT1BfOCwKKyAgICAgICAgTUlEUl9SQU5HRShNSURSX0NPUlRFWF9B
NzIsIDEgPDwgTUlEUl9WQVJJQU5UX1NISUZULAorICAgICAgICAgICAgICAg
ICAgIChNSURSX1ZBUklBTlRfTUFTSyB8IE1JRFJfUkVWSVNJT05fTUFTSykp
LAorICAgICAgICAuZW5hYmxlID0gZW5hYmxlX3NwZWN0cmVfYmhiX3dvcmth
cm91bmQsCisgICAgfSwKKyAgICB7CisgICAgICAgIC5jYXBhYmlsaXR5ID0g
QVJNX1dPUktBUk9VTkRfQkhCX0xPT1BfMjQsCisgICAgICAgIE1JRFJfQUxM
X1ZFUlNJT05TKE1JRFJfQ09SVEVYX0E3NiksCisgICAgICAgIC5lbmFibGUg
PSBlbmFibGVfc3BlY3RyZV9iaGJfd29ya2Fyb3VuZCwKKyAgICB9LAorICAg
IHsKKyAgICAgICAgLmNhcGFiaWxpdHkgPSBBUk1fV09SS0FST1VORF9CSEJf
TE9PUF8yNCwKKyAgICAgICAgTUlEUl9BTExfVkVSU0lPTlMoTUlEUl9DT1JU
RVhfQTc3KSwKKyAgICAgICAgLmVuYWJsZSA9IGVuYWJsZV9zcGVjdHJlX2Jo
Yl93b3JrYXJvdW5kLAorICAgIH0sCisgICAgeworICAgICAgICAuY2FwYWJp
bGl0eSA9IEFSTV9XT1JLQVJPVU5EX0JIQl9MT09QXzMyLAorICAgICAgICBN
SURSX0FMTF9WRVJTSU9OUyhNSURSX0NPUlRFWF9BNzgpLAorICAgICAgICAu
ZW5hYmxlID0gZW5hYmxlX3NwZWN0cmVfYmhiX3dvcmthcm91bmQsCisgICAg
fSwKKyAgICB7CisgICAgICAgIC5jYXBhYmlsaXR5ID0gQVJNX1dPUktBUk9V
TkRfQkhCX0xPT1BfMzIsCisgICAgICAgIE1JRFJfQUxMX1ZFUlNJT05TKE1J
RFJfQ09SVEVYX0E3OEMpLAorICAgICAgICAuZW5hYmxlID0gZW5hYmxlX3Nw
ZWN0cmVfYmhiX3dvcmthcm91bmQsCisgICAgfSwKKyAgICB7CisgICAgICAg
IC5jYXBhYmlsaXR5ID0gQVJNX1dPUktBUk9VTkRfQkhCX0xPT1BfMzIsCisg
ICAgICAgIE1JRFJfQUxMX1ZFUlNJT05TKE1JRFJfQ09SVEVYX1gxKSwKKyAg
ICAgICAgLmVuYWJsZSA9IGVuYWJsZV9zcGVjdHJlX2JoYl93b3JrYXJvdW5k
LAorICAgIH0sCisgICAgeworICAgICAgICAuY2FwYWJpbGl0eSA9IEFSTV9X
T1JLQVJPVU5EX0JIQl9MT09QXzMyLAorICAgICAgICBNSURSX0FMTF9WRVJT
SU9OUyhNSURSX0NPUlRFWF9YMiksCisgICAgICAgIC5lbmFibGUgPSBlbmFi
bGVfc3BlY3RyZV9iaGJfd29ya2Fyb3VuZCwKKyAgICB9LAorICAgIHsKKyAg
ICAgICAgLmNhcGFiaWxpdHkgPSBBUk1fV09SS0FST1VORF9CSEJfTE9PUF8z
MiwKKyAgICAgICAgTUlEUl9BTExfVkVSU0lPTlMoTUlEUl9DT1JURVhfQTcx
MCksCisgICAgICAgIC5lbmFibGUgPSBlbmFibGVfc3BlY3RyZV9iaGJfd29y
a2Fyb3VuZCwKICAgICB9LAorICAgIHsKKyAgICAgICAgLmNhcGFiaWxpdHkg
PSBBUk1fV09SS0FST1VORF9CSEJfTE9PUF8yNCwKKyAgICAgICAgTUlEUl9B
TExfVkVSU0lPTlMoTUlEUl9ORU9WRVJTRV9OMSksCisgICAgICAgIC5lbmFi
bGUgPSBlbmFibGVfc3BlY3RyZV9iaGJfd29ya2Fyb3VuZCwKKyAgICB9LAor
ICAgIHsKKyAgICAgICAgLmNhcGFiaWxpdHkgPSBBUk1fV09SS0FST1VORF9C
SEJfTE9PUF8zMiwKKyAgICAgICAgTUlEUl9BTExfVkVSU0lPTlMoTUlEUl9O
RU9WRVJTRV9OMiksCisgICAgICAgIC5lbmFibGUgPSBlbmFibGVfc3BlY3Ry
ZV9iaGJfd29ya2Fyb3VuZCwKKyAgICB9LAorICAgIHsKKyAgICAgICAgLmNh
cGFiaWxpdHkgPSBBUk1fV09SS0FST1VORF9CSEJfTE9PUF8zMiwKKyAgICAg
ICAgTUlEUl9BTExfVkVSU0lPTlMoTUlEUl9ORU9WRVJTRV9WMSksCisgICAg
ICAgIC5lbmFibGUgPSBlbmFibGVfc3BlY3RyZV9iaGJfd29ya2Fyb3VuZCwK
KyAgICB9LAorCiAjZW5kaWYKICNpZmRlZiBDT05GSUdfQVJNMzJfSEFSREVO
X0JSQU5DSF9QUkVESUNUT1IKICAgICB7CmRpZmYgLS1naXQgYS94ZW4vaW5j
bHVkZS9hc20tYXJtL2FybTY0L21hY3Jvcy5oIGIveGVuL2luY2x1ZGUvYXNt
LWFybS9hcm02NC9tYWNyb3MuaAppbmRleCBmOTgxYjRmNDNlODQuLjUxMDBh
ZWQ2ZTNlYyAxMDA2NDQKLS0tIGEveGVuL2luY2x1ZGUvYXNtLWFybS9hcm02
NC9tYWNyb3MuaAorKysgYi94ZW4vaW5jbHVkZS9hc20tYXJtL2FybTY0L21h
Y3Jvcy5oCkBAIC0yMSw2ICsyMSwxMSBAQAogICAgIGxkciAgICAgXGRzdCwg
W1xkc3QsIFx0bXBdCiAgICAgLmVuZG0KIAorICAgIC8qIGNsZWFyYmhiIGlu
c3RydWN0aW9uIGNsZWFyaW5nIHRoZSBicmFuY2ggaGlzdG9yeSAqLworICAg
IC5tYWNybyBjbGVhcmJoYgorICAgICAgICBoaW50ICAgICMyMgorICAgIC5l
bmRtCisKIC8qCiAgKiBSZWdpc3RlciBhbGlhc2VzLgogICovCmRpZmYgLS1n
aXQgYS94ZW4vaW5jbHVkZS9hc20tYXJtL2NwdWZlYXR1cmUuaCBiL3hlbi9p
bmNsdWRlL2FzbS1hcm0vY3B1ZmVhdHVyZS5oCmluZGV4IDg1MTlkMjk4N2Jk
ZS4uYTFmYTNiYzFjZjU4IDEwMDY0NAotLS0gYS94ZW4vaW5jbHVkZS9hc20t
YXJtL2NwdWZlYXR1cmUuaAorKysgYi94ZW4vaW5jbHVkZS9hc20tYXJtL2Nw
dWZlYXR1cmUuaApAQCAtNDYsOCArNDYsMTIgQEAKICNkZWZpbmUgQVJNX1NN
Q0NDXzFfMSA4CiAjZGVmaW5lIEFSTTY0X1dPUktBUk9VTkRfQVRfU1BFQ1VM
QVRFIDkKICNkZWZpbmUgQVJNX1dPUktBUk9VTkRfODU4OTIxIDEwCisjZGVm
aW5lIEFSTV9XT1JLQVJPVU5EX0JIQl9MT09QXzggMTEKKyNkZWZpbmUgQVJN
X1dPUktBUk9VTkRfQkhCX0xPT1BfMjQgMTIKKyNkZWZpbmUgQVJNX1dPUktB
Uk9VTkRfQkhCX0xPT1BfMzIgMTMKKyNkZWZpbmUgQVJNX1dPUktBUk9VTkRf
QkhCX1NNQ0NfMyAxNAogCi0jZGVmaW5lIEFSTV9OQ0FQUyAgICAgICAgICAg
MTEKKyNkZWZpbmUgQVJNX05DQVBTICAgICAgICAgICAxNQogCiAjaWZuZGVm
IF9fQVNTRU1CTFlfXwogCmRpZmYgLS1naXQgYS94ZW4vaW5jbHVkZS9hc20t
YXJtL3NtY2NjLmggYi94ZW4vaW5jbHVkZS9hc20tYXJtL3NtY2NjLmgKaW5k
ZXggMTI2Mzk5ZGQ3MDg4Li4yYWJiZmZjM2JkOGEgMTAwNjQ0Ci0tLSBhL3hl
bi9pbmNsdWRlL2FzbS1hcm0vc21jY2MuaAorKysgYi94ZW4vaW5jbHVkZS9h
c20tYXJtL3NtY2NjLmgKQEAgLTMzNCw2ICszMzQsMTIgQEAgdm9pZCBfX2Fy
bV9zbWNjY18xXzBfc21jKHJlZ2lzdGVyX3QgYTAsIHJlZ2lzdGVyX3QgYTEs
IHJlZ2lzdGVyX3QgYTIsCiAgICAgICAgICAgICAgICAgICAgICAgIEFSTV9T
TUNDQ19PV05FUl9BUkNILCAgICAgICAgXAogICAgICAgICAgICAgICAgICAg
ICAgICAweDdGRkYpCiAKKyNkZWZpbmUgQVJNX1NNQ0NDX0FSQ0hfV09SS0FS
T1VORF8zX0ZJRCAgICAgICAgICAgICBcCisgICAgQVJNX1NNQ0NDX0NBTExf
VkFMKEFSTV9TTUNDQ19GQVNUX0NBTEwsICAgICAgICAgXAorICAgICAgICAg
ICAgICAgICAgICAgICBBUk1fU01DQ0NfQ09OVl8zMiwgICAgICAgICAgIFwK
KyAgICAgICAgICAgICAgICAgICAgICAgQVJNX1NNQ0NDX09XTkVSX0FSQ0gs
ICAgICAgICBcCisgICAgICAgICAgICAgICAgICAgICAgIDB4M0ZGRikKKwog
LyogU01DQ0MgZXJyb3IgY29kZXMgKi8KICNkZWZpbmUgQVJNX1NNQ0NDX05P
VF9SRVFVSVJFRCAgICAgICAgICAoLTIpCiAjZGVmaW5lIEFSTV9TTUNDQ19F
UlJfVU5LTk9XTl9GVU5DVElPTiAgKC0xKQo=

--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.13-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.13-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.13-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.13-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.14-1-xen-arm-Introduce-new-Arm-processors.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.14-1-xen-arm-Introduce-new-Arm-processors.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.14-2-xen-arm-move-errata-CSV2-check-earlier.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.14-2-xen-arm-move-errata-CSV2-check-earlier.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.14-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.14-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.14-4-xen-arm-Add-Spectre-BHB-handling.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.14-4-xen-arm-Add-Spectre-BHB-handling.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.14-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.14-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch"
Content-Transfer-Encoding: base64

RnJvbSA3Y2ViZDc3YzgwY2U4N2Y4NGM2M2E2MDQzYTVhZDcxMTVjY2FiOWQ1
IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCZXJ0cmFuZCBNYXJx
dWlzIDxiZXJ0cmFuZC5tYXJxdWlzQGFybS5jb20+CkRhdGU6IFRodSwgMTcg
RmViIDIwMjIgMTQ6NTI6NTQgKzAwMDAKU3ViamVjdDogeGVuL2FybTogQWxs
b3cgdG8gZGlzY292ZXIgYW5kIHVzZSBTTUNDQ19BUkNIX1dPUktBUk9VTkRf
MwoKQWxsb3cgZ3Vlc3QgdG8gZGlzY292ZXIgd2hldGhlciBvciBub3QgU01D
Q0NfQVJDSF9XT1JLQVJPVU5EXzMgaXMKc3VwcG9ydGVkIGFuZCBjcmVhdGUg
YSBmYXN0cGF0aCBpbiB0aGUgY29kZSB0byBoYW5kbGUgZ3Vlc3RzIHJlcXVl
c3QgdG8KZG8gdGhlIHdvcmthcm91bmQuCgpUaGUgZnVuY3Rpb24gU01DQ0Nf
QVJDSF9XT1JLQVJPVU5EXzMgd2lsbCBiZSBjYWxsZWQgYnkgdGhlIGd1ZXN0
IGZvcgpmbHVzaGluZyB0aGUgYnJhbmNoIGhpc3RvcnkuIFNvIHdlIHdhbnQg
dGhlIGhhbmRsaW5nIHRvIGJlIGFzIGZhc3QgYXMKcG9zc2libGUuCgpBcyB0
aGUgbWl0aWdhdGlvbiBpcyBhcHBsaWVkIG9uIGV2ZXJ5IGd1ZXN0IGV4aXQs
IHdlIGNhbiBjaGVjayBmb3IgdGhlCmNhbGwgYmVmb3JlIHNhdmluZyBhbGwg
Y29udGV4dCBhbmQgcmV0dXJuIHZlcnkgZWFybHkuCgpUaGlzIGlzIHBhcnQg
b2YgWFNBLTM5OCAvIENWRS0yMDIyLTIzOTYwLgoKU2lnbmVkLW9mZi1ieTog
QmVydHJhbmQgTWFycXVpcyA8YmVydHJhbmQubWFycXVpc0Bhcm0uY29tPgpS
ZXZpZXdlZC1ieTogSnVsaWVuIEdyYWxsIDxqdWxpZW5AeGVuLm9yZz4KKGNo
ZXJyeSBwaWNrZWQgZnJvbSBjb21taXQgYzBhNTZlYTBmZDkyZWNiNDcxOTM2
YjczNTVkZGJlY2JhZWEzNzA3YykKCmRpZmYgLS1naXQgYS94ZW4vYXJjaC9h
cm0vYXJtNjQvZW50cnkuUyBiL3hlbi9hcmNoL2FybS9hcm02NC9lbnRyeS5T
CmluZGV4IDE3NWVhMjk4MWU3Mi4uYThjMjE0NTA2Nzg2IDEwMDY0NAotLS0g
YS94ZW4vYXJjaC9hcm0vYXJtNjQvZW50cnkuUworKysgYi94ZW4vYXJjaC9h
cm0vYXJtNjQvZW50cnkuUwpAQCAtMzM4LDE2ICszMzgsMjYgQEAgZ3Vlc3Rf
c3luYzoKICAgICAgICAgY2JueiAgICB4MSwgZ3Vlc3Rfc3luY19zbG93cGF0
aCAgICAgICAgIC8qIHNob3VsZCBiZSAwIGZvciBIVkMgIzAgKi8KIAogICAg
ICAgICAvKgotICAgICAgICAgKiBGYXN0ZXN0IHBhdGggcG9zc2libGUgZm9y
IEFSTV9TTUNDQ19BUkNIX1dPUktBUk9VTkRfMS4KLSAgICAgICAgICogVGhl
IHdvcmthcm91bmQgaGFzIGFscmVhZHkgYmVlbiBhcHBsaWVkIG9uIHRoZSBl
eGNlcHRpb24KKyAgICAgICAgICogRmFzdGVzdCBwYXRoIHBvc3NpYmxlIGZv
ciBBUk1fU01DQ0NfQVJDSF9XT1JLQVJPVU5EXzEgYW5kCisgICAgICAgICAq
IEFSTV9TTUNDQ19BUkNIX1dPUktBUk9VTkRfMy4KKyAgICAgICAgICogVGhl
IHdvcmthcm91bmQgbmVlZGVkIGhhcyBhbHJlYWR5IGJlZW4gYXBwbGllZCBv
biB0aGUgZXhjZXB0aW9uCiAgICAgICAgICAqIGVudHJ5IGZyb20gdGhlIGd1
ZXN0LCBzbyBsZXQncyBxdWlja2x5IGdldCBiYWNrIHRvIHRoZSBndWVzdC4K
ICAgICAgICAgICoKICAgICAgICAgICogTm90ZSB0aGF0IGVvciBpcyB1c2Vk
IGJlY2F1c2UgdGhlIGZ1bmN0aW9uIGlkZW50aWZpZXIgY2Fubm90CiAgICAg
ICAgICAqIGJlIGVuY29kZWQgYXMgYW4gaW1tZWRpYXRlIGZvciBjbXAuCiAg
ICAgICAgICAqLwogICAgICAgICBlb3IgICAgIHcwLCB3MCwgI0FSTV9TTUND
Q19BUkNIX1dPUktBUk9VTkRfMV9GSUQKLSAgICAgICAgY2JueiAgICB3MCwg
Y2hlY2tfd2EyCisgICAgICAgIGNieiAgICAgdzAsIGZhc3RwYXRoX291dF93
b3JrYXJvdW5kCiAKKyAgICAgICAgLyogQVJNX1NNQ0NDX0FSQ0hfV09SS0FS
T1VORF8yIGhhbmRsaW5nICovCisgICAgICAgIGVvciAgICAgdzAsIHcwLCAj
KEFSTV9TTUNDQ19BUkNIX1dPUktBUk9VTkRfMV9GSUQgXiBBUk1fU01DQ0Nf
QVJDSF9XT1JLQVJPVU5EXzJfRklEKQorICAgICAgICBjYnogICAgIHcwLCB3
YTJfc3NiZAorCisgICAgICAgIC8qIEZhc3RwYXRoIG91dCBmb3IgQVJNX1NN
Q0NDX0FSQ0hfV09SS0FST1VORF8zICovCisgICAgICAgIGVvciAgICAgdzAs
IHcwLCAjKEFSTV9TTUNDQ19BUkNIX1dPUktBUk9VTkRfMl9GSUQgXiBBUk1f
U01DQ0NfQVJDSF9XT1JLQVJPVU5EXzNfRklEKQorICAgICAgICBjYm56ICAg
IHcwLCBndWVzdF9zeW5jX3Nsb3dwYXRoCisKK2Zhc3RwYXRoX291dF93b3Jr
YXJvdW5kOgogICAgICAgICAvKgogICAgICAgICAgKiBDbG9iYmVyIGJvdGgg
eDAgYW5kIHgxIHRvIHByZXZlbnQgbGVha2FnZS4gTm90ZSB0aGF0IHRoYW5r
cwogICAgICAgICAgKiB0aGUgZW9yLCB4MCA9IDAuCkBAIC0zNTYsMTAgKzM2
Niw3IEBAIGd1ZXN0X3N5bmM6CiAgICAgICAgIGVyZXQKICAgICAgICAgc2IK
IAotY2hlY2tfd2EyOgotICAgICAgICAvKiBBUk1fU01DQ0NfQVJDSF9XT1JL
QVJPVU5EXzIgaGFuZGxpbmcgKi8KLSAgICAgICAgZW9yICAgICB3MCwgdzAs
ICMoQVJNX1NNQ0NDX0FSQ0hfV09SS0FST1VORF8xX0ZJRCBeIEFSTV9TTUND
Q19BUkNIX1dPUktBUk9VTkRfMl9GSUQpCi0gICAgICAgIGNibnogICAgdzAs
IGd1ZXN0X3N5bmNfc2xvd3BhdGgKK3dhMl9zc2JkOgogI2lmZGVmIENPTkZJ
R19BUk1fU1NCRAogYWx0ZXJuYXRpdmVfY2IgYXJtX2VuYWJsZV93YTJfaGFu
ZGxpbmcKICAgICAgICAgYiAgICAgICB3YTJfZW5kCmRpZmYgLS1naXQgYS94
ZW4vYXJjaC9hcm0vdnNtYy5jIGIveGVuL2FyY2gvYXJtL3ZzbWMuYwppbmRl
eCBhMzZkYjE1ZmZmYzAuLmI2MzNmZjJmZTg5NyAxMDA2NDQKLS0tIGEveGVu
L2FyY2gvYXJtL3ZzbWMuYworKysgYi94ZW4vYXJjaC9hcm0vdnNtYy5jCkBA
IC0xMjQsNiArMTI0LDEwIEBAIHN0YXRpYyBib29sIGhhbmRsZV9hcmNoKHN0
cnVjdCBjcHVfdXNlcl9yZWdzICpyZWdzKQogICAgICAgICAgICAgICAgIGJy
ZWFrOwogICAgICAgICAgICAgfQogICAgICAgICAgICAgYnJlYWs7CisgICAg
ICAgIGNhc2UgQVJNX1NNQ0NDX0FSQ0hfV09SS0FST1VORF8zX0ZJRDoKKyAg
ICAgICAgICAgIGlmICggY3B1c19oYXZlX2NhcChBUk1fV09SS0FST1VORF9C
SEJfU01DQ18zKSApCisgICAgICAgICAgICAgICAgcmV0ID0gMDsKKyAgICAg
ICAgICAgIGJyZWFrOwogICAgICAgICB9CiAKICAgICAgICAgc2V0X3VzZXJf
cmVnKHJlZ3MsIDAsIHJldCk7CkBAIC0xMzIsNiArMTM2LDcgQEAgc3RhdGlj
IGJvb2wgaGFuZGxlX2FyY2goc3RydWN0IGNwdV91c2VyX3JlZ3MgKnJlZ3Mp
CiAgICAgfQogCiAgICAgY2FzZSBBUk1fU01DQ0NfQVJDSF9XT1JLQVJPVU5E
XzFfRklEOgorICAgIGNhc2UgQVJNX1NNQ0NDX0FSQ0hfV09SS0FST1VORF8z
X0ZJRDoKICAgICAgICAgLyogTm8gcmV0dXJuIHZhbHVlICovCiAgICAgICAg
IHJldHVybiB0cnVlOwogCg==

--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.14-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.14-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.15-1-xen-arm-Introduce-new-Arm-processors.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.15-1-xen-arm-Introduce-new-Arm-processors.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.15-2-xen-arm-move-errata-CSV2-check-earlier.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.15-2-xen-arm-move-errata-CSV2-check-earlier.patch"
Content-Transfer-Encoding: base64

RnJvbSA5YTRhNGFiYjU5NWU2NjAwYWIzYjY1MjY3NmE5OThmNWJiYzU4MGQ1
IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCZXJ0cmFuZCBNYXJx
dWlzIDxiZXJ0cmFuZC5tYXJxdWlzQGFybS5jb20+CkRhdGU6IFR1ZSwgMTUg
RmViIDIwMjIgMTA6Mzk6NDcgKzAwMDAKU3ViamVjdDogeGVuL2FybTogbW92
ZSBlcnJhdGEgQ1NWMiBjaGVjayBlYXJsaWVyCgpDU1YyIGF2YWlsYWJpbGl0
eSBjaGVjayBpcyBkb25lIGFmdGVyIHByaW50aW5nIHRvIHRoZSB1c2VyIHRo
YXQKd29ya2Fyb3VuZCAxIHdpbGwgYmUgdXNlZC4gTW92ZSB0aGUgY2hlY2sg
YmVmb3JlIHRvIHByZXZlbnQgc2F5aW5nIHRvIHRoZQp1c2VyIHRoYXQgd29y
a2Fyb3VuZCAxIGlzIHVzZWQgd2hlbiBpdCBpcyBub3QgYmVjYXVzZSBpdCBp
cyBub3QgbmVlZGVkLgpUaGlzIHdpbGwgYWxzbyBhbGxvdyB0byByZXVzZSBp
bnN0YWxsX2JwX2hhcmRlbmluZ192ZWMgZnVuY3Rpb24gZm9yCm90aGVyIHVz
ZSBjYXNlcy4KCkNvZGUgcHJldmlvdXNseSByZXR1cm5pbmcgInRydWUiLCBu
b3cgcmV0dXJucyAiMCIgdG8gY29uZm9ybSB0bwplbmFibGVfc21jY2NfYXJj
aF93b3JrYXJvdW5kXzEgcmV0dXJuaW5nIGFuIGludCBhbmQgc3Vycm91bmRp
bmcgY29kZQpkb2luZyBhICJyZXR1cm4gMCIgaWYgd29ya2Fyb3VuZCBpcyBu
b3QgbmVlZGVkLgoKVGhpcyBpcyBwYXJ0IG9mIFhTQS0zOTggLyBDVkUtMjAy
Mi0yMzk2MC4KClNpZ25lZC1vZmYtYnk6IEJlcnRyYW5kIE1hcnF1aXMgPGJl
cnRyYW5kLm1hcnF1aXNAYXJtLmNvbT4KUmV2aWV3ZWQtYnk6IEp1bGllbiBH
cmFsbCA8anVsaWVuQHhlbi5vcmc+CihjaGVycnkgcGlja2VkIGZyb20gY29t
bWl0IDU5OTYxNmQ3MGViODg2YjlhZDBlZjlkNmI1MTY5M2NlNzkwNTA0YmEp
CgpkaWZmIC0tZ2l0IGEveGVuL2FyY2gvYXJtL2NwdWVycmF0YS5jIGIveGVu
L2FyY2gvYXJtL2NwdWVycmF0YS5jCmluZGV4IGIzOThkNDgwZjExMy4uMDBm
OWViZTljZWUwIDEwMDY0NAotLS0gYS94ZW4vYXJjaC9hcm0vY3B1ZXJyYXRh
LmMKKysrIGIveGVuL2FyY2gvYXJtL2NwdWVycmF0YS5jCkBAIC0xMDMsMTMg
KzEwMyw2IEBAIGluc3RhbGxfYnBfaGFyZGVuaW5nX3ZlYyhjb25zdCBzdHJ1
Y3QgYXJtX2NwdV9jYXBhYmlsaXRpZXMgKmVudHJ5LAogICAgIHByaW50ayhY
RU5MT0dfSU5GTyAiQ1BVJXUgd2lsbCAlcyBvbiBleGNlcHRpb24gZW50cnlc
biIsCiAgICAgICAgICAgIHNtcF9wcm9jZXNzb3JfaWQoKSwgZGVzYyk7CiAK
LSAgICAvKgotICAgICAqIE5vIG5lZWQgdG8gaW5zdGFsbCBoYXJkZW5lZCB2
ZWN0b3Igd2hlbiB0aGUgcHJvY2Vzc29yIGhhcwotICAgICAqIElEX0FBNjRQ
UkYwX0VMMS5DU1YyIHNldC4KLSAgICAgKi8KLSAgICBpZiAoIGNwdV9kYXRh
W3NtcF9wcm9jZXNzb3JfaWQoKV0ucGZyNjQuY3N2MiApCi0gICAgICAgIHJl
dHVybiB0cnVlOwotCiAgICAgc3Bpbl9sb2NrKCZicF9sb2NrKTsKIAogICAg
IC8qCkBAIC0xNjcsNiArMTYwLDEzIEBAIHN0YXRpYyBpbnQgZW5hYmxlX3Nt
Y2NjX2FyY2hfd29ya2Fyb3VuZF8xKHZvaWQgKmRhdGEpCiAgICAgaWYgKCAh
ZW50cnktPm1hdGNoZXMoZW50cnkpICkKICAgICAgICAgcmV0dXJuIDA7CiAK
KyAgICAvKgorICAgICAqIE5vIG5lZWQgdG8gaW5zdGFsbCBoYXJkZW5lZCB2
ZWN0b3Igd2hlbiB0aGUgcHJvY2Vzc29yIGhhcworICAgICAqIElEX0FBNjRQ
UkYwX0VMMS5DU1YyIHNldC4KKyAgICAgKi8KKyAgICBpZiAoIGNwdV9kYXRh
W3NtcF9wcm9jZXNzb3JfaWQoKV0ucGZyNjQuY3N2MiApCisgICAgICAgIHJl
dHVybiAwOworCiAgICAgaWYgKCBzbWNjY192ZXIgPCBTTUNDQ19WRVJTSU9O
KDEsIDEpICkKICAgICAgICAgZ290byB3YXJuOwogCg==

--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.15-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.15-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch"
Content-Transfer-Encoding: base64

RnJvbSA3MjU5ZTg3OTg0YTAwYzZhNDgxYjg5ZTFiM2RhODM5Mjc1MGJjYzM2
IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCZXJ0cmFuZCBNYXJx
dWlzIDxiZXJ0cmFuZC5tYXJxdWlzQGFybS5jb20+CkRhdGU6IFdlZCwgMjMg
RmViIDIwMjIgMDk6NDI6MTggKzAwMDAKU3ViamVjdDogeGVuL2FybTogQWRk
IEVDQkhCIGFuZCBDTEVBUkJIQiBJRCBmaWVsZHMKCkludHJvZHVjZSBJRCBj
b3Byb2Nlc3NvciByZWdpc3RlciBJRF9BQTY0SVNBUjJfRUwxLgpBZGQgZGVm
aW5pdGlvbnMgaW4gY3B1ZmVhdHVyZSBhbmQgc3lzcmVncyBvZiBFQ0JIQiBm
aWVsZCBpbiBtbWZyMSBhbmQKQ0xFQVJCSEIgaW4gaXNhcjIgSUQgY29wcm9j
ZXNzb3IgcmVnaXN0ZXJzLgoKVGhpcyBpcyBwYXJ0IG9mIFhTQS0zOTggLyBD
VkUtMjAyMi0yMzk2MC4KClNpZ25lZC1vZmYtYnk6IEJlcnRyYW5kIE1hcnF1
aXMgPGJlcnRyYW5kLm1hcnF1aXNAYXJtLmNvbT4KQWNrZWQtYnk6IEp1bGll
biBHcmFsbCA8anVsaWVuQHhlbi5vcmc+CihjaGVycnkgcGlja2VkIGZyb20g
Y29tbWl0IDRiNjhkMTJkOThiODc5MGQ4MDAyZmNjMmMyNWE5ZDcxMzM3NGE0
ZDcpCgpkaWZmIC0tZ2l0IGEveGVuL2FyY2gvYXJtL2NwdWZlYXR1cmUuYyBi
L3hlbi9hcmNoL2FybS9jcHVmZWF0dXJlLmMKaW5kZXggMWQ4ODc4MzgwOWUy
Li42YjdiNTEwZDI2YTkgMTAwNjQ0Ci0tLSBhL3hlbi9hcmNoL2FybS9jcHVm
ZWF0dXJlLmMKKysrIGIveGVuL2FyY2gvYXJtL2NwdWZlYXR1cmUuYwpAQCAt
MTIyLDYgKzEyMiw3IEBAIHZvaWQgaWRlbnRpZnlfY3B1KHN0cnVjdCBjcHVp
bmZvX2FybSAqYykKIAogICAgIGMtPmlzYTY0LmJpdHNbMF0gPSBSRUFEX1NZ
U1JFRyhJRF9BQTY0SVNBUjBfRUwxKTsKICAgICBjLT5pc2E2NC5iaXRzWzFd
ID0gUkVBRF9TWVNSRUcoSURfQUE2NElTQVIxX0VMMSk7CisgICAgYy0+aXNh
NjQuYml0c1syXSA9IFJFQURfU1lTUkVHKElEX0FBNjRJU0FSMl9FTDEpOwog
CiAgICAgYy0+emZyNjQuYml0c1swXSA9IFJFQURfU1lTUkVHKElEX0FBNjRa
RlIwX0VMMSk7CiAKZGlmZiAtLWdpdCBhL3hlbi9pbmNsdWRlL2FzbS1hcm0v
YXJtNjQvc3lzcmVncy5oIGIveGVuL2luY2x1ZGUvYXNtLWFybS9hcm02NC9z
eXNyZWdzLmgKaW5kZXggMDc3ZmQ5NWZiNzY4Li4zMTE1YzgxOTcwNWQgMTAw
NjQ0Ci0tLSBhL3hlbi9pbmNsdWRlL2FzbS1hcm0vYXJtNjQvc3lzcmVncy5o
CisrKyBiL3hlbi9pbmNsdWRlL2FzbS1hcm0vYXJtNjQvc3lzcmVncy5oCkBA
IC04NCw2ICs4NCw5IEBACiAjaWZuZGVmIElEX0RGUjFfRUwxCiAjZGVmaW5l
IElEX0RGUjFfRUwxICAgICAgICAgICAgICAgICBTM18wX0MwX0MzXzUKICNl
bmRpZgorI2lmbmRlZiBJRF9BQTY0SVNBUjJfRUwxCisjZGVmaW5lIElEX0FB
NjRJU0FSMl9FTDEgICAgICAgICAgICBTM18wX0MwX0M2XzIKKyNlbmRpZgog
CiAvKiBBY2Nlc3MgdG8gc3lzdGVtIHJlZ2lzdGVycyAqLwogCmRpZmYgLS1n
aXQgYS94ZW4vaW5jbHVkZS9hc20tYXJtL2NwdWZlYXR1cmUuaCBiL3hlbi9p
bmNsdWRlL2FzbS1hcm0vY3B1ZmVhdHVyZS5oCmluZGV4IDllYTM5NzBjNzAw
My4uNTM4MTQ1ZjI2MGJmIDEwMDY0NAotLS0gYS94ZW4vaW5jbHVkZS9hc20t
YXJtL2NwdWZlYXR1cmUuaAorKysgYi94ZW4vaW5jbHVkZS9hc20tYXJtL2Nw
dWZlYXR1cmUuaApAQCAtMjA2LDE0ICsyMDYsMTUgQEAgc3RydWN0IGNwdWlu
Zm9fYXJtIHsKICAgICAgICAgICAgIHVuc2lnbmVkIGxvbmcgbG86NDsKICAg
ICAgICAgICAgIHVuc2lnbmVkIGxvbmcgcGFuOjQ7CiAgICAgICAgICAgICB1
bnNpZ25lZCBsb25nIF9fcmVzMTo4OwotICAgICAgICAgICAgdW5zaWduZWQg
bG9uZyBfX3JlczI6MzI7CisgICAgICAgICAgICB1bnNpZ25lZCBsb25nIF9f
cmVzMjoyODsKKyAgICAgICAgICAgIHVuc2lnbmVkIGxvbmcgZWNiaGI6NDsK
IAogICAgICAgICAgICAgdW5zaWduZWQgbG9uZyBfX3JlczM6NjQ7CiAgICAg
ICAgIH07CiAgICAgfSBtbTY0OwogCiAgICAgdW5pb24gewotICAgICAgICB1
aW50NjRfdCBiaXRzWzJdOworICAgICAgICB1aW50NjRfdCBiaXRzWzNdOwog
ICAgICAgICBzdHJ1Y3QgewogICAgICAgICAgICAgLyogSVNBUjAgKi8KICAg
ICAgICAgICAgIHVuc2lnbmVkIGxvbmcgX19yZXMwOjQ7CkBAIC0yNDksNiAr
MjUwLDEyIEBAIHN0cnVjdCBjcHVpbmZvX2FybSB7CiAgICAgICAgICAgICB1
bnNpZ25lZCBsb25nIGRnaDo0OwogICAgICAgICAgICAgdW5zaWduZWQgbG9u
ZyBpOG1tOjQ7CiAgICAgICAgICAgICB1bnNpZ25lZCBsb25nIF9fcmVzMjo4
OworCisgICAgICAgICAgICAvKiBJU0FSMiAqLworICAgICAgICAgICAgdW5z
aWduZWQgbG9uZyBfX3JlczM6Mjg7CisgICAgICAgICAgICB1bnNpZ25lZCBs
b25nIGNsZWFyYmhiOjQ7CisKKyAgICAgICAgICAgIHVuc2lnbmVkIGxvbmcg
X19yZXM0OjMyOwogICAgICAgICB9OwogICAgIH0gaXNhNjQ7CiAK

--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.15-4-xen-arm-Add-Spectre-BHB-handling.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.15-4-xen-arm-Add-Spectre-BHB-handling.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.15-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.15-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.15-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.15-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.16-1-xen-arm-Introduce-new-Arm-processors.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.16-1-xen-arm-Introduce-new-Arm-processors.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.16-2-xen-arm-move-errata-CSV2-check-earlier.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.16-2-xen-arm-move-errata-CSV2-check-earlier.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.16-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.16-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.16-4-xen-arm-Add-Spectre-BHB-handling.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.16-4-xen-arm-Add-Spectre-BHB-handling.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.16-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.16-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.16-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.16-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4-xen-arm-Add-Spectre-BHB-handling.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4-xen-arm-Add-Spectre-BHB-handling.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch"
Content-Transfer-Encoding: base64

RnJvbSA4ZDAzMDgwZDJhMzM5ODQwZDNhNTllMDkzMmE5NGY4MDRlNDUxMTBk
IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBbmRyZXcgQ29vcGVy
IDxhbmRyZXcuY29vcGVyM0BjaXRyaXguY29tPgpEYXRlOiBNb24sIDcgTWFy
IDIwMjIgMTY6MzU6NTIgKzAwMDAKU3ViamVjdDogeDg2L3NwZWMtY3RybDog
Q2Vhc2UgdXNpbmcgdGh1bms9bGZlbmNlIG9uIEFNRAoKQU1EIGhhdmUgdXBk
YXRlZCB0aGVpciBTcGVjdHJlIHYyIGd1aWRhbmNlLCBhbmQgbGZlbmNlL2pt
cCBpcyBubyBsb25nZXIKY29uc2lkZXJlZCBzYWZlLiAgQU1EIGFyZSByZWNv
bW1lbmRpbmcgdXNpbmcgcmV0cG9saW5lIGV2ZXJ5d2hlcmUuCgpSZXRwb2xp
bmUgaXMgaW5jb21wYXRpYmxlIHdpdGggQ0VULiAgQWxsIENFVC1jYXBhYmxl
IGhhcmR3YXJlIGhhcyBlZmZpY2llbnQKSUJSUyAoc3BlY2lmaWNhbGx5LCBu
b3Qgc29tZXRoaW5nIHJldHJvZml0dGVkIGluIG1pY3JvY29kZSksIHNvIHVz
ZSBJQlJTIChhbmQKU1RJQlAgZm9yIGNvbnNpc3RlbmN5IHNha2UpLgoKVGhp
cyBpcyBhIGxvZ2ljYWwgY2hhbmdlIG9uIEFNRCwgYnV0IG5vdCBvbiBJbnRl
bCBhcyB0aGUgZGVmYXVsdCBjYWxjdWxhdGlvbnMKd291bGQgZW5kIHVwIHdp
dGggdGhlc2Ugc2V0dGluZ3MgYW55d2F5LiAgTGVhdmUgYmVoaW5kIGEgbWVz
c2FnZSBpZiBJQlJTIGlzCmZvdW5kIHRvIGJlIG1pc3NpbmcuCgpBbHNvIHVw
ZGF0ZSB0aGUgZGVmYXVsdCBoZXVyaXN0aWNzIHRvIG5ldmVyIHNlbGVjdCBU
SFVOS19MRkVOQ0UuICBUaGlzIGNhdXNlcwpBTUQgQ1BVcyB0byBjaGFuZ2Ug
dGhlaXIgZGVmYXVsdCB0byByZXRwb2xpbmUuCgpBbHNvIHVwZGF0ZSB0aGUg
cHJpbnRlZCBtZXNzYWdlIHRvIGluY2x1ZGUgdGhlIEFNRCBNU1JfU1BFQ19D
VFJMIHNldHRpbmdzLCBhbmQKU1RJQlAgbm93IHRoYXQgd2Ugc2V0IGl0IGZv
ciBjb25zaXN0ZW5jeSBzYWtlLgoKVGhpcyBpcyBwYXJ0IG9mIFhTQS0zOTgg
LyBDVkUtMjAyMS0yNjQwMS4KClNpZ25lZC1vZmYtYnk6IEFuZHJldyBDb29w
ZXIgPGFuZHJldy5jb29wZXIzQGNpdHJpeC5jb20+ClJldmlld2VkLWJ5OiBK
YW4gQmV1bGljaCA8amJldWxpY2hAc3VzZS5jb20+CgpkaWZmIC0tZ2l0IGEv
ZG9jcy9taXNjL3hlbi1jb21tYW5kLWxpbmUucGFuZG9jIGIvZG9jcy9taXNj
L3hlbi1jb21tYW5kLWxpbmUucGFuZG9jCmluZGV4IGVkYTkyY2UyOWUwOC4u
MWRjN2UxY2EwNzA2IDEwMDY0NAotLS0gYS9kb2NzL21pc2MveGVuLWNvbW1h
bmQtbGluZS5wYW5kb2MKKysrIGIvZG9jcy9taXNjL3hlbi1jb21tYW5kLWxp
bmUucGFuZG9jCkBAIC0yMjk3LDkgKzIyOTcsOSBAQCB0byB1c2UuCiAKIElm
IFhlbiB3YXMgY29tcGlsZWQgd2l0aCBJTkRJUkVDVF9USFVOSyBzdXBwb3J0
LCBgYnRpLXRodW5rPWAgY2FuIGJlIHVzZWQgdG8KIHNlbGVjdCB3aGljaCBv
ZiB0aGUgdGh1bmtzIGdldHMgcGF0Y2hlZCBpbnRvIHRoZSBgX194ODZfaW5k
aXJlY3RfdGh1bmtfJXJlZ2AKLWxvY2F0aW9ucy4gIFRoZSBkZWZhdWx0IHRo
dW5rIGlzIGByZXRwb2xpbmVgIChnZW5lcmFsbHkgcHJlZmVycmVkIGZvciBJ
bnRlbAotaGFyZHdhcmUpLCB3aXRoIHRoZSBhbHRlcm5hdGl2ZXMgYmVpbmcg
YGptcGAgKGEgYGptcCAqJXJlZ2AgZ2FkZ2V0LCBtaW5pbWFsCi1vdmVyaGVh
ZCksIGFuZCBgbGZlbmNlYCAoYW4gYGxmZW5jZTsgam1wIColcmVnYCBnYWRn
ZXQsIHByZWZlcnJlZCBmb3IgQU1EKS4KK2xvY2F0aW9ucy4gIFRoZSBkZWZh
dWx0IHRodW5rIGlzIGByZXRwb2xpbmVgIChnZW5lcmFsbHkgcHJlZmVycmVk
KSwgd2l0aCB0aGUKK2FsdGVybmF0aXZlcyBiZWluZyBgam1wYCAoYSBgam1w
IColcmVnYCBnYWRnZXQsIG1pbmltYWwgb3ZlcmhlYWQpLCBhbmQKK2BsZmVu
Y2VgIChhbiBgbGZlbmNlOyBqbXAgKiVyZWdgIGdhZGdldCkuCiAKIE9uIGhh
cmR3YXJlIHN1cHBvcnRpbmcgSUJSUyAoSW5kaXJlY3QgQnJhbmNoIFJlc3Ry
aWN0ZWQgU3BlY3VsYXRpb24pLCB0aGUKIGBpYnJzPWAgb3B0aW9uIGNhbiBi
ZSB1c2VkIHRvIGZvcmNlIG9yIHByZXZlbnQgWGVuIHVzaW5nIHRoZSBmZWF0
dXJlIGl0c2VsZi4KZGlmZiAtLWdpdCBhL3hlbi9hcmNoL3g4Ni9zcGVjX2N0
cmwuYyBiL3hlbi9hcmNoL3g4Ni9zcGVjX2N0cmwuYwppbmRleCAxMmJmMWM1
NzIyZjkuLjE0MDhlNGM3YWJkMCAxMDA2NDQKLS0tIGEveGVuL2FyY2gveDg2
L3NwZWNfY3RybC5jCisrKyBiL3hlbi9hcmNoL3g4Ni9zcGVjX2N0cmwuYwpA
QCAtMzY3LDE0ICszNjcsMTkgQEAgc3RhdGljIHZvaWQgX19pbml0IHByaW50
X2RldGFpbHMoZW51bSBpbmRfdGh1bmsgdGh1bmssIHVpbnQ2NF90IGNhcHMp
CiAgICAgICAgICAgICAgICAiXG4iKTsKIAogICAgIC8qIFNldHRpbmdzIGZv
ciBYZW4ncyBwcm90ZWN0aW9uLCBpcnJlc3BlY3RpdmUgb2YgZ3Vlc3RzLiAq
LwotICAgIHByaW50aygiICBYZW4gc2V0dGluZ3M6IEJUSS1UaHVuayAlcywg
U1BFQ19DVFJMOiAlcyVzJXMsIE90aGVyOiVzJXMlcyVzJXNcbiIsCisgICAg
cHJpbnRrKCIgIFhlbiBzZXR0aW5nczogQlRJLVRodW5rICVzLCBTUEVDX0NU
Ukw6ICVzJXMlcyVzLCBPdGhlcjolcyVzJXMlcyVzXG4iLAogICAgICAgICAg
ICB0aHVuayA9PSBUSFVOS19OT05FICAgICAgPyAiTi9BIiA6CiAgICAgICAg
ICAgIHRodW5rID09IFRIVU5LX1JFVFBPTElORSA/ICJSRVRQT0xJTkUiIDoK
ICAgICAgICAgICAgdGh1bmsgPT0gVEhVTktfTEZFTkNFICAgID8gIkxGRU5D
RSIgOgogICAgICAgICAgICB0aHVuayA9PSBUSFVOS19KTVAgICAgICAgPyAi
Sk1QIiA6ICI/IiwKLSAgICAgICAgICAgIWJvb3RfY3B1X2hhcyhYODZfRkVB
VFVSRV9JQlJTQikgICAgICAgICAgPyAiTm8iIDoKKyAgICAgICAgICAgKCFi
b290X2NwdV9oYXMoWDg2X0ZFQVRVUkVfSUJSU0IpICYmCisgICAgICAgICAg
ICAhYm9vdF9jcHVfaGFzKFg4Nl9GRUFUVVJFX0lCUlMpKSAgICAgICAgID8g
Ik5vIiA6CiAgICAgICAgICAgIChkZWZhdWx0X3hlbl9zcGVjX2N0cmwgJiBT
UEVDX0NUUkxfSUJSUykgID8gIklCUlMrIiA6ICAiSUJSUy0iLAotICAgICAg
ICAgICAhYm9vdF9jcHVfaGFzKFg4Nl9GRUFUVVJFX1NTQkQpICAgICAgICAg
ICA/ICIiIDoKKyAgICAgICAgICAgKCFib290X2NwdV9oYXMoWDg2X0ZFQVRV
UkVfU1RJQlApICYmCisgICAgICAgICAgICAhYm9vdF9jcHVfaGFzKFg4Nl9G
RUFUVVJFX0FNRF9TVElCUCkpICAgID8gIiIgOgorICAgICAgICAgICAoZGVm
YXVsdF94ZW5fc3BlY19jdHJsICYgU1BFQ19DVFJMX1NUSUJQKSA/ICIgU1RJ
QlArIiA6ICIgU1RJQlAtIiwKKyAgICAgICAgICAgKCFib290X2NwdV9oYXMo
WDg2X0ZFQVRVUkVfU1NCRCkgJiYKKyAgICAgICAgICAgICFib290X2NwdV9o
YXMoWDg2X0ZFQVRVUkVfQU1EX1NTQkQpKSAgICAgPyAiIiA6CiAgICAgICAg
ICAgIChkZWZhdWx0X3hlbl9zcGVjX2N0cmwgJiBTUEVDX0NUUkxfU1NCRCkg
ID8gIiBTU0JEKyIgOiAiIFNTQkQtIiwKICAgICAgICAgICAgIShjYXBzICYg
QVJDSF9DQVBTX1RTWF9DVFJMKSAgICAgICAgICAgICAgPyAiIiA6CiAgICAg
ICAgICAgIChvcHRfdHN4ICYgMSkgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgID8gIiBUU1grIiA6ICIgVFNYLSIsCkBAIC05NDcsMTAgKzk1MiwyMyBA
QCB2b2lkIF9faW5pdCBpbml0X3NwZWN1bGF0aW9uX21pdGlnYXRpb25zKHZv
aWQpCiAgICAgICogRmlyc3QsIGRpc2FibGUgdGhlIHVzZSBvZiByZXRwb2xp
bmVzIGlmIFhlbiBpcyB1c2luZyBDRVQuICBSZXRwb2xpbmVzCiAgICAgICog
YXJlIGEgUk9QIGdhZGdldCBzbyBpbmNvbXBhdGJpbGUgd2l0aCBTaGFkb3cg
U3RhY2tzLCB3aGlsZSBJQlQgZGVwZW5kcwogICAgICAqIG9uIGV4ZWN1dGlu
ZyBpbmRpcmVjdCBicmFuY2hlcyBmb3IgdGhlIHNhZmV0eSBwcm9wZXJ0aWVz
IHRvIGFwcGx5LgorICAgICAqCisgICAgICogSW4gdGhlIGFic2VuY2Ugb2Yg
cmV0cG9saW5lcywgSUJSUyBuZWVkcyB0byBiZSB1c2VkIGZvciBzcGVjdWxh
dGl2ZQorICAgICAqIHNhZmV0eS4gIEFsbCBDRVQtY2FwYWJsZSBoYXJkd2Fy
ZSBoYXMgZWZmaWNpZW50IElCUlMuCiAgICAgICovCi0gICAgaWYgKCAocmVh
ZF9jcjQoKSAmIFg4Nl9DUjRfQ0VUKSAmJgotICAgICAgICAgKG9wdF90aHVu
ayA9PSBUSFVOS19ERUZBVUxUIHx8IG9wdF90aHVuayA9PSBUSFVOS19SRVRQ
T0xJTkUpICkKLSAgICAgICAgdGh1bmsgPSBUSFVOS19KTVA7CisgICAgaWYg
KCByZWFkX2NyNCgpICYgWDg2X0NSNF9DRVQgKQorICAgIHsKKyAgICAgICAg
aWYgKCAhaGFzX3NwZWNfY3RybCApCisgICAgICAgICAgICBwcmludGsoWEVO
TE9HX1dBUk5JTkcgIj8hPyBDRVQgYWN0aXZlLCBidXQgbm8gTVNSX1NQRUNf
Q1RSTD9cbiIpOworICAgICAgICBlbHNlIGlmICggb3B0X2licnMgPT0gLTEg
KQorICAgICAgICB7CisgICAgICAgICAgICBvcHRfaWJycyA9IGlicnMgPSB0
cnVlOworICAgICAgICAgICAgZGVmYXVsdF94ZW5fc3BlY19jdHJsIHw9IFNQ
RUNfQ1RSTF9JQlJTIHwgU1BFQ19DVFJMX1NUSUJQOworICAgICAgICB9CisK
KyAgICAgICAgaWYgKCBvcHRfdGh1bmsgPT0gVEhVTktfREVGQVVMVCB8fCBv
cHRfdGh1bmsgPT0gVEhVTktfUkVUUE9MSU5FICkKKyAgICAgICAgICAgIHRo
dW5rID0gVEhVTktfSk1QOworICAgIH0KIAogICAgIC8qCiAgICAgICogSGFz
IHRoZSB1c2VyIHNwZWNpZmllZCBhbnkgY3VzdG9tIEJUSSBtaXRpZ2F0aW9u
cz8gIElmIHNvLCBmb2xsb3cgdGhlaXIKQEAgLTk3MCwxNiArOTg4LDEwIEBA
IHZvaWQgX19pbml0IGluaXRfc3BlY3VsYXRpb25fbWl0aWdhdGlvbnModm9p
ZCkKICAgICAgICAgaWYgKCBJU19FTkFCTEVEKENPTkZJR19JTkRJUkVDVF9U
SFVOSykgKQogICAgICAgICB7CiAgICAgICAgICAgICAvKgotICAgICAgICAg
ICAgICogQU1EJ3MgcmVjb21tZW5kZWQgbWl0aWdhdGlvbiBpcyB0byBzZXQg
bGZlbmNlIGFzIGJlaW5nIGRpc3BhdGNoCi0gICAgICAgICAgICAgKiBzZXJp
YWxpc2luZywgYW5kIHRvIHVzZSBJTkRfVEhVTktfTEZFTkNFLgotICAgICAg
ICAgICAgICovCi0gICAgICAgICAgICBpZiAoIGNwdV9oYXNfbGZlbmNlX2Rp
c3BhdGNoICkKLSAgICAgICAgICAgICAgICB0aHVuayA9IFRIVU5LX0xGRU5D
RTsKLSAgICAgICAgICAgIC8qCi0gICAgICAgICAgICAgKiBPbiBJbnRlbCBo
YXJkd2FyZSwgd2UnZCBsaWtlIHRvIHVzZSByZXRwb2xpbmUgaW4gcHJlZmVy
ZW5jZSB0bworICAgICAgICAgICAgICogT24gYWxsIGhhcmR3YXJlLCB3ZSdk
IGxpa2UgdG8gdXNlIHJldHBvbGluZSBpbiBwcmVmZXJlbmNlIHRvCiAgICAg
ICAgICAgICAgKiBJQlJTLCBidXQgb25seSBpZiBpdCBpcyBzYWZlIG9uIHRo
aXMgaGFyZHdhcmUuCiAgICAgICAgICAgICAgKi8KLSAgICAgICAgICAgIGVs
c2UgaWYgKCByZXRwb2xpbmVfc2FmZShjYXBzKSApCisgICAgICAgICAgICBp
ZiAoIHJldHBvbGluZV9zYWZlKGNhcHMpICkKICAgICAgICAgICAgICAgICB0
aHVuayA9IFRIVU5LX1JFVFBPTElORTsKICAgICAgICAgICAgIGVsc2UgaWYg
KCBoYXNfc3BlY19jdHJsICkKICAgICAgICAgICAgICAgICBpYnJzID0gdHJ1
ZTsK

--=separator--


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 18:26:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 18:26:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287387.487404 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nReXp-0000cx-R3; Tue, 08 Mar 2022 18:26:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287387.487404; Tue, 08 Mar 2022 18:26:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nReXp-0000cq-Nz; Tue, 08 Mar 2022 18:26:49 +0000
Received: by outflank-mailman (input) for mailman id 287387;
 Tue, 08 Mar 2022 18:26:48 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=xpw2=TT=gmail.com=this.is.a0lson@srs-se1.protection.inumbo.net>)
 id 1nReR3-0006RJ-TD
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 18:19:50 +0000
Received: from mail-qk1-x731.google.com (mail-qk1-x731.google.com
 [2607:f8b0:4864:20::731])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 56c711b4-9f0c-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 19:19:49 +0100 (CET)
Received: by mail-qk1-x731.google.com with SMTP id r127so4559190qke.13
 for <xen-devel@lists.xenproject.org>; Tue, 08 Mar 2022 10:19:49 -0800 (PST)
Received: from development (c-73-166-253-254.hsd1.tx.comcast.net.
 [73.166.253.254]) by smtp.gmail.com with ESMTPSA id
 h10-20020a05620a10aa00b0067b117eba82sm4230550qkk.124.2022.03.08.10.19.47
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Tue, 08 Mar 2022 10:19:47 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 56c711b4-9f0c-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=message-id:subject:from:to:cc:date:in-reply-to:references
         :user-agent:mime-version:content-transfer-encoding;
        bh=s7HWQFOc18zq/O7uEQF7Z6moCg95Ml6WM+p6yiwaXqI=;
        b=oXJlqkI44MmKT9aHPPUfT9lAlZHQm3zuiGzX9kslGzvFMW+JlCcIld+l+aFtR9RpG+
         Ui8vVuV6+eSNmKq0JK0CpXO1bzrw27iUuNIzoVxsg3rkty6DXSRoI9J83un55jryfU4/
         kaMsopQ6eUkD3NHtezf4iwYgx5VRvO+W7vUVX/HZglH1037ZqgUx/EUwhGbpdKkHu+XP
         QWC3w+Wpd7euyvmqrpzoidYcm8mxaPXtmviBSMR07V7WwTtwXYdUs9k3Ms8IjbCqpYwY
         /441weuUU5xxgPD9N1f6ojwfWAE4z22dJAG4zbDXYgyfl+LMFI5mH6Vqbk1ega+kBJ00
         Au0Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:message-id:subject:from:to:cc:date:in-reply-to
         :references:user-agent:mime-version:content-transfer-encoding;
        bh=s7HWQFOc18zq/O7uEQF7Z6moCg95Ml6WM+p6yiwaXqI=;
        b=cT+YUiu5FRgfKct61MWl6E4N4E0WxZQzVcyNmmAnkTb8/ieQPICIKj0Hua3ARSN6Nc
         xgzChhNwM5Vbb9bwLZMUhzQS07UpUAwzTK/8GkcpwCrFmxUVRo0Ra1Gp9u0lv5d3TBqN
         JE4IxyHZFzDrCIsASeN2zny7J01crldG7tC0yUgNZeesneKoipRPLKu4MEK8NggghPFq
         V4cbzdE3gvmocASwn+rRLac6Gbd321I8YvbSRWIyg/0tvw1brU2xY8+2GM5lNufMj94x
         T0WyudS4KZpPzyeOQwCvbYAufDDLUxhOq/ypeHUVvVC381SQDk7GdlyGhS1OHfLnlZ4B
         +ixQ==
X-Gm-Message-State: AOAM530IvFL+ANmS5G94GHdWVdaBgVuTEOJIJfQ26EpSU1C6p37GqbaI
	AQxDlhqHTscbQhx9JrtNczE=
X-Google-Smtp-Source: ABdhPJx9CNVZdKgczTol7V2Gw+3miaU4v2NUbgnX5BRGOqBiI3vNJBvzN+9qSZnusTu+Q7460VvwSA==
X-Received: by 2002:a05:620a:1426:b0:67b:467e:a626 with SMTP id k6-20020a05620a142600b0067b467ea626mr5300879qkj.261.1646763588133;
        Tue, 08 Mar 2022 10:19:48 -0800 (PST)
Message-ID: <5460431ac2cba237f95dfef8890381767d2242ae.camel@gmail.com>
Subject: Re: [PATCH v4] vpci/msix: fix PBA accesses
From: Alex Olson <this.is.a0lson@gmail.com>
To: Jan Beulich <jbeulich@suse.com>, Roger Pau Monne <roger.pau@citrix.com>
Cc: xen-devel@lists.xenproject.org
Date: Tue, 08 Mar 2022 12:19:46 -0600
In-Reply-To: <fbc1388e-8211-f498-b134-4df5b1ccd003@suse.com>
References: <20220307163744.74030-1-roger.pau@citrix.com>
	 <fbc1388e-8211-f498-b134-4df5b1ccd003@suse.com>
Content-Type: text/plain; charset="UTF-8"
User-Agent: Evolution 3.36.5-0ubuntu1 
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

On Tue, 2022-03-08 at 09:31 +0100, Jan Beulich wrote:
> On 07.03.2022 17:37, Roger Pau Monne wrote:
> > Map the PBA in order to access it from the MSI-X read and write
> > handlers. Note that previously the handlers would pass the physical
> > host address into the {read,write}{l,q} handlers, which is wrong as
> > those expect a linear address.
> > 
> > Map the PBA using ioremap when the first access is performed. Note
> > that 32bit arches might want to abstract the call to ioremap into a
> > vPCI arch handler, so they can use a fixmap range to map the PBA.
> > 
> > Reported-by: Jan Beulich <jbeulich@suse.com>
> > Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
> 
> Reviewed-by: Jan Beulich <jbeulich@suse.com>
> 
> > Cc: Alex Olson <this.is.a0lson@gmail.com>
> 
> I'll wait a little with committing, in the hope for Alex to re-provide
> a Tested-by.

It works fine for me, you can add "Tested-by: Alex.Olson@starlab.io" to the
commit.

> 
> > --- a/xen/drivers/vpci/msix.c
> > +++ b/xen/drivers/vpci/msix.c
> > @@ -182,6 +182,38 @@ static struct vpci_msix_entry *get_entry(struct
> > vpci_msix *msix,
> >      return &msix->entries[(addr - start) / PCI_MSIX_ENTRY_SIZE];
> >  }
> >  
> > +static void __iomem *get_pba(struct vpci *vpci)
> > +{
> > +    struct vpci_msix *msix = vpci->msix;
> > +    /*
> > +     * PBA will only be unmapped when the device is deassigned, so access
> > it
> > +     * without holding the vpci lock.
> > +     */
> > +    void __iomem *pba = read_atomic(&msix->pba);
> > +
> > +    if ( likely(pba) )
> > +        return pba;
> > +
> > +    pba = ioremap(vmsix_table_addr(vpci, VPCI_MSIX_PBA),
> > +                  vmsix_table_size(vpci, VPCI_MSIX_PBA));
> > +    if ( !pba )
> > +        return read_atomic(&msix->pba);
> > +
> > +    spin_lock(&vpci->lock);
> > +    if ( !msix->pba )
> > +    {
> > +        write_atomic(&msix->pba, pba);
> > +        spin_unlock(&vpci->lock);
> > +    }
> > +    else
> > +    {
> > +        spin_unlock(&vpci->lock);
> > +        iounmap(pba);
> > +    }
> 
> TBH I had been hoping for just a single spin_unlock(), but you're
> the maintainer of this code ...
> 
> Jan
> 
Thanks

-Alex



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 18:29:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 18:29:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287397.487415 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nReaj-0001Hq-9t; Tue, 08 Mar 2022 18:29:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287397.487415; Tue, 08 Mar 2022 18:29:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nReaj-0001Hj-6E; Tue, 08 Mar 2022 18:29:49 +0000
Received: by outflank-mailman (input) for mailman id 287397;
 Tue, 08 Mar 2022 18:29:48 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nReah-0001Hd-VU
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 18:29:47 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nReab-0007G5-DD; Tue, 08 Mar 2022 18:29:41 +0000
Received: from 54-240-197-236.amazon.com ([54.240.197.236]
 helo=[10.95.172.145]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nReab-0005zu-5P; Tue, 08 Mar 2022 18:29:41 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=s5UqKdjgrMyrK+m2hTM5gbUGSlLhrzWAPN6n+z4EeVo=; b=e49mUC2XqhsPnXPl7k8NI5XBCX
	QXvjry2RZs3cmpS2G3hevO9BgSwEPw8la0WmTwS1VgMcP30hU2M7XQE1TPnPV5zNwqoDU8D16KkWX
	4zQZy2TO+tgEvu8e2mFRbsAi7iktQ7R70atSVoP6MitvQOjypajRE33V6nOTrD3XGK1Q=;
Message-ID: <60744f25-55ff-0a07-bc06-c1a6dc19343e@xen.org>
Date: Tue, 8 Mar 2022 18:29:38 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH 1/3] xen/arm: Add i.MX lpuart driver
To: Peng Fan <peng.fan@nxp.com>, "Peng Fan (OSS)" <peng.fan@oss.nxp.com>,
 "sstabellini@kernel.org" <sstabellini@kernel.org>,
 "Volodymyr_Babchuk@epam.com" <Volodymyr_Babchuk@epam.com>,
 "bertrand.marquis@arm.com" <bertrand.marquis@arm.com>
Cc: "andrew.cooper3@citrix.com" <andrew.cooper3@citrix.com>,
 "george.dunlap@citrix.com" <george.dunlap@citrix.com>,
 "jbeulich@suse.com" <jbeulich@suse.com>, "wl@xen.org" <wl@xen.org>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 "van.freenix@gmail.com" <van.freenix@gmail.com>
References: <20220228010711.11566-1-peng.fan@oss.nxp.com>
 <20220228010711.11566-2-peng.fan@oss.nxp.com>
 <16bef21e-42b3-c271-81ab-1d87453a0fdb@xen.org>
 <DU0PR04MB94177B6A7BC34EA6590FF37B88019@DU0PR04MB9417.eurprd04.prod.outlook.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <DU0PR04MB94177B6A7BC34EA6590FF37B88019@DU0PR04MB9417.eurprd04.prod.outlook.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit



On 28/02/2022 09:27, Peng Fan wrote:
> Hi Julien,

Hi Peng,

>> Subject: Re: [PATCH 1/3] xen/arm: Add i.MX lpuart driver
>>
>> Hi Peng,
>>
>> On 28/02/2022 01:07, Peng Fan (OSS) wrote:
>>> From: Peng Fan <peng.fan@nxp.com>
>>
>> Can you give me a link to the specification and/or a similar driver in Linux?
> 
> https://www.nxp.com/webapp/Download?colCode=IMX8QMIEC
> Chatper 13.6 Low Power Universal Asynchronous Receiver/
> Transmitter (LPUART)
> But this requires registration to access.
Ok. I think it would still be valuable to add the link of to the spec in 
the commit message.

> 
> Linux driver:
> https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/drivers/tty/serial/fsl_lpuart.c

I would also add a link to the Linux code just as a reference (if one 
doesn't want to register).

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 18:44:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 18:44:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287426.487425 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nReoa-0003sY-JC; Tue, 08 Mar 2022 18:44:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287426.487425; Tue, 08 Mar 2022 18:44:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nReoa-0003sR-GK; Tue, 08 Mar 2022 18:44:08 +0000
Received: by outflank-mailman (input) for mailman id 287426;
 Tue, 08 Mar 2022 18:44:08 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nReoa-0003sH-4e; Tue, 08 Mar 2022 18:44:08 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nReoa-0007Ua-27; Tue, 08 Mar 2022 18:44:08 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nReoZ-0004Ta-Aj; Tue, 08 Mar 2022 18:44:07 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nReoZ-0000Mt-A4; Tue, 08 Mar 2022 18:44:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=8fkCnoTphqI8HfKv+AzVJL/z51wZVfZcUZnwb85vBAk=; b=DKStRVQAudpFjf806zJW8Sq0t/
	0ap9ZEt6+Xy30diq4NrcmYhvQJ1AYFCuCA46etqGnoNHrm3clK3FLUoa5hrMsxvfHTgkMOOc/8XwZ
	a2AT+zoQO9mdThn/ohq5Hd+D/VnUsE5613bpFT73XD4ZeYvay3sgWO3sl2SJv9jCXQQ8=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168474-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168474: regressions - trouble: broken/fail/pass
X-Osstest-Failures:
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:<job status>:broken:regression
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:host-install(5):broken:regression
    qemu-mainline:test-armhf-armhf-libvirt-raw:debian-di-install:fail:regression
    qemu-mainline:test-amd64-amd64-xl-rtds:guest-localmigrate/x10:fail:allowable
    qemu-mainline:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:allowable
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=99c4a9e68eafade057e33906d23b2face24ca1ff
X-Osstest-Versions-That:
    qemuu=b49872aa8fc0f3f5a3036cc37aa2cb5c92866f33
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 08 Mar 2022 18:44:07 +0000

flight 168474 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168474/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-armhf-armhf-libvirt-qcow2    <job status>                 broken
 test-armhf-armhf-libvirt-qcow2  5 host-install(5)      broken REGR. vs. 168465
 test-armhf-armhf-libvirt-raw 12 debian-di-install        fail REGR. vs. 168465

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-rtds     20 guest-localmigrate/x10   fail REGR. vs. 168465
 test-armhf-armhf-xl-rtds    18 guest-start/debian.repeat fail REGR. vs. 168465

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168465
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168465
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168465
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168465
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168465
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168465
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 qemuu                99c4a9e68eafade057e33906d23b2face24ca1ff
baseline version:
 qemuu                b49872aa8fc0f3f5a3036cc37aa2cb5c92866f33

Last test of basis   168465  2022-03-07 19:37:00 Z    0 days
Testing same since   168474  2022-03-08 09:38:14 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Paolo Bonzini <pbonzini@redhat.com>
  Peter Maydell <peter.maydell@linaro.org>
  Philippe Mathieu-Daudé <f4bug@amsat.org>
  Taylor Simpson <tsimpson@quicinc.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               broken  
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 fail    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     fail    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job test-armhf-armhf-libvirt-qcow2 broken
broken-step test-armhf-armhf-libvirt-qcow2 host-install(5)

Not pushing.

(No revision log; it would be 520 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 18:52:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 18:52:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287437.487436 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRewr-0005eY-F1; Tue, 08 Mar 2022 18:52:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287437.487436; Tue, 08 Mar 2022 18:52:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRewr-0005eR-C3; Tue, 08 Mar 2022 18:52:41 +0000
Received: by outflank-mailman (input) for mailman id 287437;
 Tue, 08 Mar 2022 18:52:40 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nRewq-0005eL-QD
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 18:52:40 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRewl-0007f8-91; Tue, 08 Mar 2022 18:52:35 +0000
Received: from 54-240-197-236.amazon.com ([54.240.197.236]
 helo=[10.95.172.145]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRewk-0007fi-U6; Tue, 08 Mar 2022 18:52:35 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=E0BI8zreMuP/aQlRlI9Vo+Os7Z+KOA6bRJflHy5Xmq0=; b=3mLEXPGLkmwHOQ0QJboNgmI2my
	7Or6r2lrJcOl44s2Ns42p+DguHXoZXgtFJvwwsAw+yUYY2noKZJyq/bSSsaN5nsoegLvo34miI51H
	J7Bn2ug/awGeIfAcNzM9Ycf2dxO5ATEN0XCvNPV4xxKMIKFZ3Y6+b8B2TPRztjBLqOU0=;
Message-ID: <5fc8a6a2-450a-d9c3-b241-e1a950ac2933@xen.org>
Date: Tue, 8 Mar 2022 18:52:32 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH 1/3] xen/arm: Add i.MX lpuart driver
To: "Peng Fan (OSS)" <peng.fan@oss.nxp.com>, sstabellini@kernel.org,
 Volodymyr_Babchuk@epam.com, bertrand.marquis@arm.com
Cc: andrew.cooper3@citrix.com, george.dunlap@citrix.com, jbeulich@suse.com,
 wl@xen.org, xen-devel@lists.xenproject.org, van.freenix@gmail.com,
 Peng Fan <peng.fan@nxp.com>
References: <20220228010711.11566-1-peng.fan@oss.nxp.com>
 <20220228010711.11566-2-peng.fan@oss.nxp.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220228010711.11566-2-peng.fan@oss.nxp.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Peng,

On 28/02/2022 01:07, Peng Fan (OSS) wrote:
> From: Peng Fan <peng.fan@nxp.com>
> 
> Signed-off-by: Peng Fan <peng.fan@nxp.com>
> ---
>   xen/drivers/char/Kconfig      |   8 +
>   xen/drivers/char/Makefile     |   1 +
>   xen/drivers/char/imx-lpuart.c | 303 ++++++++++++++++++++++++++++++++++
>   xen/include/xen/imx-lpuart.h  |  64 +++++++
>   4 files changed, 376 insertions(+)
>   create mode 100644 xen/drivers/char/imx-lpuart.c
>   create mode 100644 xen/include/xen/imx-lpuart.h
> 
> diff --git a/xen/drivers/char/Kconfig b/xen/drivers/char/Kconfig
> index 2ff5b288e2..0efdb2128f 100644
> --- a/xen/drivers/char/Kconfig
> +++ b/xen/drivers/char/Kconfig
> @@ -13,6 +13,14 @@ config HAS_CADENCE_UART
>   	  This selects the Xilinx Zynq Cadence UART. If you have a Xilinx Zynq
>   	  based board, say Y.
>   
> +config HAS_IMX_LPUART
> +	bool "i.MX LPUART driver"
> +	default y
> +	depends on ARM_64
> +	help
> +	  This selects the i.MX LPUART. If you have a i.MX8QM based board,
> +	  say Y.
> +
>   config HAS_MVEBU
>   	bool "Marvell MVEBU UART driver"
>   	default y
> diff --git a/xen/drivers/char/Makefile b/xen/drivers/char/Makefile
> index 7c646d771c..14e67cf072 100644
> --- a/xen/drivers/char/Makefile
> +++ b/xen/drivers/char/Makefile
> @@ -8,6 +8,7 @@ obj-$(CONFIG_HAS_MVEBU) += mvebu-uart.o
>   obj-$(CONFIG_HAS_OMAP) += omap-uart.o
>   obj-$(CONFIG_HAS_SCIF) += scif-uart.o
>   obj-$(CONFIG_HAS_EHCI) += ehci-dbgp.o
> +obj-$(CONFIG_HAS_IMX_LPUART) += imx-lpuart.o
>   obj-$(CONFIG_ARM) += arm-uart.o
>   obj-y += serial.o
>   obj-$(CONFIG_XEN_GUEST) += xen_pv_console.o
> diff --git a/xen/drivers/char/imx-lpuart.c b/xen/drivers/char/imx-lpuart.c
> new file mode 100644
> index 0000000000..2a30e3f21a
> --- /dev/null
> +++ b/xen/drivers/char/imx-lpuart.c
> @@ -0,0 +1,303 @@
> +/*
> + * xen/drivers/char/imx-lpuart.c
> + *
> + * Driver for i.MX LPUART.
> + *
> + * Peng Fan <peng.fan@nxp.com>
> + * Copyright 2022 NXP
> + *
> + * This program is free software; you can redistribute it and/or modify
> + * it under the terms of the GNU General Public License as published by
> + * the Free Software Foundation; either version 2 of the License, or
> + * (at your option) any later version.
> + *
> + * This program is distributed in the hope that it will be useful,
> + * but WITHOUT ANY WARRANTY; without even the implied warranty of
> + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
> + * GNU General Public License for more details.
> + */
> +
> +#include <xen/console.h>

This should not be necessary.h

> +#include <xen/serial.h>
> +#include <xen/imx-lpuart.h>
> +#include <xen/init.h>
> +#include <xen/irq.h>
> +#include <xen/errno.h>
> +#include <xen/mm.h>

Please order the <xen/*> alphabetically.h

> +#include <asm/device.h>
> +#include <asm/io.h>
> +
> +#define imx_lpuart_read(uart, off)       readl((uart)->regs + off)
> +#define imx_lpuart_write(uart, off, val) writel((val), (uart)->regs + off)
> +
> +static struct imx_lpuart {
> +    unsigned int baud, clock_hz, data_bits, parity, stop_bits, fifo_size;
> +    unsigned int irq;
> +    char __iomem *regs;
> +    struct irqaction irqaction;
> +    struct vuart_info vuart;
> +} imx8_com = {0};

This will be initialized to 0 by default. So I would drop {0}.

> +
> +static void imx_lpuart_interrupt(int irq, void *data,
> +                                  struct cpu_user_regs *regs)

Coding style: 'struct' should be aligned with 'int'.

> +{
> +    struct serial_port *port = data;
> +    struct imx_lpuart *uart = port->uart;
> +    unsigned int sts, rxcnt;
> +
> +    sts = imx_lpuart_read(uart, UARTSTAT);
> +    rxcnt = imx_lpuart_read(uart, UARTWATER) >> UARTWATER_RXCNT_OFF;
> +
> +    if ((sts & UARTSTAT_RDRF) || (rxcnt > 0)) {

Coding style:

if ( ... )
{

But for single line block, we tend to avoid {}.

> +	    serial_rx_interrupt(port, regs);
> +    }
> +
> +    if ((sts & UARTSTAT_TDRE) &&
> +        !(imx_lpuart_read(uart, UARTBAUD) & UARTBAUD_TDMAE))

Looking at imx_lpuart_init_preirq(), you will always clear 
UARTBAUD_TDMAE. So it is necessary to check the value for every interrupt?

> +	    serial_tx_interrupt(port, regs);
> +
> +    imx_lpuart_write(uart, UARTSTAT, sts);
> +}
> +
> +static void __init imx_lpuart_init_preirq(struct serial_port *port)
> +{
> +    struct imx_lpuart *uart = port->uart;
> +    u32 sbr, osr;
> +    u32 ctrl, old_ctrl, bd;
> +    u32 baud;

In Xen we are phasing out the use of u* in favor of uint*_t. Can you 
convert your code to use uint*_t?

> +
> +    ctrl = old_ctrl = imx_lpuart_read(uart, UARTCTRL);
> +    ctrl = (old_ctrl & ~UARTCTRL_M) | UARTCTRL_TE | UARTCTRL_RE;
> +    bd = imx_lpuart_read(uart, UARTBAUD);
> +    baud = uart->baud;
> +
> +    while ( !(imx_lpuart_read(uart, UARTSTAT) & UARTSTAT_TC))

Coding style: missing space before the last ).

> +	    barrier();

I think this wants to be cpu_relax(). At the moment, it is implemented 
as a barrier() but this may change in the future.

> +
> +    /* Disable trasmit and receive */

Typo: s/trasmit/transmit/

> +    imx_lpuart_write(uart, UARTCTRL, old_ctrl & ~(UARTCTRL_TE | UARTCTRL_RE));
> +
> +    osr = (bd >> UARTBAUD_OSR_SHIFT) & UARTBAUD_OSR_MASK;
> +    sbr = uart->clock_hz / (baud * (osr + 1));

For earlyprintk() patch you rely on the baud rate set by the firmware. 
Looking at the code below, you will also hardocode the baud rate. So 
couldn't we simply reply on the firmware to set the baud correctly?

> +
> +    bd &= ~ UARTBAUD_SBR_MASK;
> +    bd |= sbr & UARTBAUD_SBR_MASK;
> +    bd |= UARTBAUD_BOTHEDGE;

In the Linux driver, the bit will only be set when osr is between 3 and 
8. Shouldn't we do the same?

> +    bd &= ~(UARTBAUD_TDMAE | UARTBAUD_RDMAE);

Can you document why we clear the flag?

> +
> +    imx_lpuart_write(uart, UARTMODIR, 0);
> +    imx_lpuart_write(uart, UARTBAUD, bd);
> +    imx_lpuart_write(uart, UARTCTRL, ctrl);
> +}
> +
> +static void __init imx_lpuart_init_postirq(struct serial_port *port)
> +{
> +    struct imx_lpuart *uart = port->uart;
> +    unsigned int temp;
> +
> +    uart->irqaction.handler = imx_lpuart_interrupt;
> +    uart->irqaction.name = "imx_lpuart";
> +    uart->irqaction.dev_id = port;
> +
> +    if ( setup_irq(uart->irq, 0, &uart->irqaction) != 0 )
> +    {
> +        dprintk(XENLOG_ERR, "Failed to allocate imx_lpuart IRQ %d\n",
> +                uart->irq);
> +        return;
> +    }
> +
> +    /* Enable interrupte */

Typo: s/interrupte/interrupts/

> +    temp = imx_lpuart_read(uart, UARTCTRL);
> +    temp |= (UARTCTRL_RIE | UARTCTRL_TIE);
> +    temp |= UARTCTRL_ILIE;
> +    imx_lpuart_write(uart, UARTCTRL, temp);
> +}
> +
> +static void imx_lpuart_suspend(struct serial_port *port)
> +{
> +    BUG();
> +}
> +
> +static void imx_lpuart_resume(struct serial_port *port)
> +{
> +    BUG();
> +}
> +
> +static int imx_lpuart_tx_ready(struct serial_port *port)
> +{
> +    struct imx_lpuart *uart = port->uart;
> +
> +    return (imx_lpuart_read(uart, UARTSTAT) & UARTSTAT_TC) ? 1 : 0;

This can be simply:

return imx_lpuart_read(uart, UARTSTAT) & UARTSTAT_TC;

> +}
> +
> +static void imx_lpuart_putc(struct serial_port *port, char c)
> +{
> +    struct imx_lpuart *uart = port->uart;
> +
> +    while ( !(imx_lpuart_read(uart, UARTSTAT) & UARTSTAT_TDRE))
> +        barrier();

Same remark about the barrier.

> +
> +    imx_lpuart_write(uart, UARTDATA, c);
> +}
> +
> +static int imx_lpuart_getc(struct serial_port *port, char *pc)
> +{
> +    struct imx_lpuart *uart = port->uart;
> +    int ch;
> +
> +    while ( !(imx_lpuart_read(uart, UARTSTAT) & UARTSTAT_RDRF))
> +        barrier();

Same remark about the barrier.

However, rather than waiting, shouldn't we check the watermark instead 
and return 0 if there are no character to read?

> +
> +    ch = imx_lpuart_read(uart, UARTDATA);
> +    *pc = ch & 0xff;
> +
> +    if (imx_lpuart_read(uart, UARTSTAT) &  UARTSTAT_OR)
> +        imx_lpuart_write(uart, UARTSTAT, UARTSTAT_OR);
> +
> +    return 1;
> +}
> +
> +static int __init imx_lpuart_irq(struct serial_port *port)
> +{
> +    struct imx_lpuart *uart = port->uart;
> +
> +    return ((uart->irq >0) ? uart->irq : -1);

Coding style: Missing space after >.

> +}
> +
> +static const struct vuart_info *imx_lpuart_vuart_info(struct serial_port *port)
> +{
> +    struct imx_lpuart *uart = port->uart;
> +
> +    return &uart->vuart;
> +}
> +
> +static void imx_lpuart_start_tx(struct serial_port *port)
> +{
> +    struct imx_lpuart *uart = port->uart;
> +    unsigned int temp;
> +
> +    temp = imx_lpuart_read(uart, UARTSTAT);
> +    /* Wait until empty */
> +    while (!(temp & UARTSTAT_TDRE))

Coding style: while ( ... )

> +	    barrier();

Same remark about the barrier.

> +
> +    temp = imx_lpuart_read(uart, UARTCTRL);
> +    imx_lpuart_write(uart, UARTCTRL, (temp | UARTCTRL_TIE));
> +
> +    return;

There is no need for an explicit return here.

> +}
> +
> +static void imx_lpuart_stop_tx(struct serial_port *port)
> +{
> +    struct imx_lpuart *uart = port->uart;
> +    unsigned int temp;
> +
> +    temp = imx_lpuart_read(uart, UARTCTRL);
> +    temp &= ~(UARTCTRL_TIE | UARTCTRL_TCIE);
> +    imx_lpuart_write(uart, UARTCTRL, temp);
> +
> +    return;

There is no need for an explicit return here.

> +}
> +
> +static struct uart_driver __read_mostly imx_lpuart_driver = {
> +    .init_preirq = imx_lpuart_init_preirq,
> +    .init_postirq = imx_lpuart_init_postirq,
> +    .endboot = NULL,
> +    .suspend = imx_lpuart_suspend,
> +    .resume = imx_lpuart_resume,
> +    .tx_ready = imx_lpuart_tx_ready,
> +    .putc = imx_lpuart_putc,
> +    .getc = imx_lpuart_getc,
> +    .irq = imx_lpuart_irq,
> +    .start_tx = imx_lpuart_start_tx,
> +    .stop_tx = imx_lpuart_stop_tx,
> +    .vuart_info = imx_lpuart_vuart_info,
> +};
> +
> +static int __init imx_lpuart_init(struct dt_device_node *dev,
> +                                     const void *data)
> +{
> +    const char *config = data;
> +    struct imx_lpuart *uart;
> +    u32 clkspec;
> +    int res;
> +    u64 addr, size;
> +
> +    if ( strcmp(config, "") )
> +        printk("WARNING: UART configuration is not supported\n");
> +
> +    uart = &imx8_com;
> +
> +    res = dt_property_read_u32(dev, "clock-frequency", &clkspec);
> +    if ( !res )
> +    {
> +	res = dt_property_read_u32(dev, "assigned-clock-rates", &clkspec);
> +	if ( !res )
> +	{
> +		printk("imx-uart: Unable to retrieve the clock frequency\n");
> +		return -EINVAL;
> +	}
> +    }
> +
> +    uart->clock_hz = clkspec;
> +    uart->baud = 115200;
> +    uart->data_bits = 8;
> +    uart->parity = 0;
> +    uart->stop_bits = 1;
> +
> +    res = dt_device_get_address(dev, 0, &addr, &size);
> +    if ( res )
> +    {
> +        printk("imx8-lpuart: Unable to retrieve the base"
> +               " address of the UART\n");
> +        return res;
> +    }
> +
> +    res = platform_get_irq(dev, 0);
> +    if ( res < 0 )
> +    {
> +        printk("imx8-lpuart: Unable to retrieve the IRQ\n");
> +        return -EINVAL;
> +    }
> +    uart->irq = res;
> +
> +    uart->regs = ioremap_nocache(addr, size);
> +    if ( !uart->regs )
> +    {
> +        printk("imx8-lpuart: Unable to map the UART memory\n");
> +        return -ENOMEM;
> +    }
> +
> +    uart->vuart.base_addr = addr;
> +    uart->vuart.size = size;
> +    uart->vuart.data_off = UARTDATA;
> +    /* tmp from uboot */
> +    uart->vuart.status_off = UARTSTAT;
> +    uart->vuart.status = UARTSTAT_TDRE;
> +
> +    /* Register with generic serial driver */
> +    serial_register_uart(SERHND_DTUART, &imx_lpuart_driver, uart);
> +
> +    dt_device_set_used_by(dev, DOMID_XEN);
> +
> +    return 0;
> +}
> +
> +static const struct dt_device_match imx_lpuart_dt_compat[] __initconst =
> +{
> +    DT_MATCH_COMPATIBLE("fsl,imx8qm-lpuart"),
> +    {},
> +};
> +
> +DT_DEVICE_START(imx_lpuart, "i.MX LPUART", DEVICE_SERIAL)
> +    .dt_match = imx_lpuart_dt_compat,
> +    .init = imx_lpuart_init,
> +DT_DEVICE_END
> +/*
> + * Local variables:
> + * mode: C
> + * c-file-style: "BSD"
> + * c-basic-offset: 4
> + * indent-tabs-mode: nil
> + * End:
> + */
> diff --git a/xen/include/xen/imx-lpuart.h b/xen/include/xen/imx-lpuart.h
> new file mode 100644
> index 0000000000..945ab1c4fa
> --- /dev/null
> +++ b/xen/include/xen/imx-lpuart.h
> @@ -0,0 +1,64 @@
> +/*
> + * xen/include/asm-arm/imx-lpuart.h
> + *
> + * Common constant definition between early printk and the LPUART driver
> + *
> + * Peng Fan <peng.fan@nxp.com>
> + * Copyright 2022 NXP
> + *
> + * This program is free software; you can redistribute it and/or modify
> + * it under the terms of the GNU General Public License as published by
> + * the Free Software Foundation; either version 2 of the License, or
> + * (at your option) any later version.
> + *
> + * This program is distributed in the hope that it will be useful,
> + * but WITHOUT ANY WARRANTY; without even the implied warranty of
> + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
> + * GNU General Public License for more details.
> + */
> +
> +#ifndef __ASM_ARM_IMX_LPUART_H
> +#define __ASM_ARM_IMX_LPUART_H
> +
> +/* 32-bit register definition */
> +#define UARTBAUD          (0x10)
> +#define UARTSTAT          (0x14)
> +#define UARTCTRL          (0x18)
> +#define UARTDATA          (0x1C)
> +#define UARTMATCH         (0x20)
> +#define UARTMODIR         (0x24)
> +#define UARTFIFO          (0x28)
> +#define UARTWATER         (0x2c)
> +
> +#define UARTSTAT_TDRE     (1 << 23)
> +#define UARTSTAT_TC       (1 << 22)
> +#define UARTSTAT_RDRF     (1 << 21)
> +#define UARTSTAT_OR       (1 << 19)
> +
> +#define UARTBAUD_OSR_SHIFT (24)
> +#define UARTBAUD_OSR_MASK (0x1f)
> +#define UARTBAUD_SBR_MASK (0x1fff)
> +#define UARTBAUD_BOTHEDGE (0x00020000)
> +#define UARTBAUD_TDMAE    (0x00800000)
> +#define UARTBAUD_RDMAE    (0x00200000)

NIT: For single bit, I find easier to reason when using shift. I.e:

1U << X

or

BIT(X).

> +
> +#define UARTCTRL_TIE      (1 << 23)
> +#define UARTCTRL_TCIE     (1 << 22)
> +#define UARTCTRL_RIE      (1 << 21)
> +#define UARTCTRL_ILIE     (1 << 20)
> +#define UARTCTRL_TE       (1 << 19)
> +#define UARTCTRL_RE       (1 << 18)
> +#define UARTCTRL_M        (1 << 4)
> +
> +#define UARTWATER_RXCNT_OFF     24
> +
> +#endif /* __ASM_ARM_IMX_LPUART_H */
> +
> +/*
> + * Local variables:
> + * mode: C
> + * c-file-style: "BSD"
> + * c-basic-offset: 4
> + * indent-tabs-mode: nil
> + * End:
> + */

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 19:38:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 19:38:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287445.487447 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRffK-0002OF-3r; Tue, 08 Mar 2022 19:38:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287445.487447; Tue, 08 Mar 2022 19:38:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRffK-0002O8-0d; Tue, 08 Mar 2022 19:38:38 +0000
Received: by outflank-mailman (input) for mailman id 287445;
 Tue, 08 Mar 2022 19:38:36 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRffI-0002Ny-Hq; Tue, 08 Mar 2022 19:38:36 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRffI-0008QO-FI; Tue, 08 Mar 2022 19:38:36 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRffI-00060e-15; Tue, 08 Mar 2022 19:38:36 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRffI-0006V2-0e; Tue, 08 Mar 2022 19:38:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=nBplBaZxYqFSsQWMuYVQ3szC4gTwp7Az6/0lktMqqIg=; b=o7xUFKuSt0LQTnpDGTz93LaDnR
	VLeAW1I6kj347K3sXUHN3dN6cMYc78rsfZy4aKGbaI0gsamPIcHTeYri1eW2o41eBqGkcSkPTf/44
	U3di/6TfHL0+ld0ZpPMhpOHhRxs8HLfykreJbDdb/+MXUtrn699CaRJQbbTVLPv38gCU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168479-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168479: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=62fa37fe7b9df3c54a2d9d90aed9ff0e817ee0c6
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 08 Mar 2022 19:38:36 +0000

flight 168479 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168479/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 62fa37fe7b9df3c54a2d9d90aed9ff0e817ee0c6
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    8 days
Failing since        168258  2022-03-01 01:55:31 Z    7 days   80 attempts
Testing same since   168469  2022-03-07 23:11:34 Z    0 days    6 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 468 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 19:47:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 19:47:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287457.487470 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfns-0004Xm-9a; Tue, 08 Mar 2022 19:47:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287457.487470; Tue, 08 Mar 2022 19:47:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfns-0004Xf-65; Tue, 08 Mar 2022 19:47:28 +0000
Received: by outflank-mailman (input) for mailman id 287457;
 Tue, 08 Mar 2022 19:47:27 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RGf4=TT=xilinx.com=fnuv@srs-se1.protection.inumbo.net>)
 id 1nRfnr-0004Om-2N
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 19:47:27 +0000
Received: from NAM12-MW2-obe.outbound.protection.outlook.com
 (mail-mw2nam12on20629.outbound.protection.outlook.com
 [2a01:111:f400:fe5a::629])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 931f53e8-9f18-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 20:47:25 +0100 (CET)
Received: from SN1PR12CA0077.namprd12.prod.outlook.com (2603:10b6:802:20::48)
 by SA2PR02MB7532.namprd02.prod.outlook.com (2603:10b6:806:142::9)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Tue, 8 Mar
 2022 19:47:21 +0000
Received: from SN1NAM02FT0043.eop-nam02.prod.protection.outlook.com
 (2603:10b6:802:20:cafe::8a) by SN1PR12CA0077.outlook.office365.com
 (2603:10b6:802:20::48) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Tue, 8 Mar 2022 19:47:21 +0000
Received: from xsj-pvapexch01.xlnx.xilinx.com (149.199.62.198) by
 SN1NAM02FT0043.mail.protection.outlook.com (10.97.5.57) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5038.14 via Frontend Transport; Tue, 8 Mar 2022 19:47:20 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) by
 xsj-pvapexch01.xlnx.xilinx.com (172.19.86.40) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 8 Mar 2022 11:47:17 -0800
Received: from smtp.xilinx.com (172.19.127.95) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 8 Mar 2022 11:47:17 -0800
Received: from [172.19.2.115] (port=58782 helo=xsjfnuv50.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <fnu.vikram@xilinx.com>)
 id 1nRfnh-000Cws-Sd; Tue, 08 Mar 2022 11:47:17 -0800
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 931f53e8-9f18-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=B+tSBFRZX0M2Ka1jVzjwPBfEsexw/LMPuSyrjcHh844AtifyZ1nNzfjYqnr6xSZzsqxH5HO2m4V3D4uy7MK5groI/UIRdczo+OQWEZ/73BmbPJg1Z5qJnNwcyO88wdkyeR17r5Hm6eaMufGifUdyRV8vTx0lrxAXL1H7cWltqC1kLpH18oPymfItJNPl/WhVsR7inMyledKJgo1+ai2GF1JRqYFbOCaHQCpIPuWSjcmBNNeXNSvkJFQfY6lYwNHIbpkAisYzHnDVyiUpDx0huQZwykCBcG8yaYTPC0ApsnKZ1rOualxGIGxe0h6Mi3J20Hkzu4Spr/ia2z1kcHIanw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=o2me5A34S/CA57rO9JX2LJVZGCsANGo9EZ0shS6bP8E=;
 b=XQA3OqMDMBFxxfkfPdYJthY1/d6wFcin+7qc1B+OJVhKSmFY5IOV4zxZobGrH8HMiQBErB2UII+WYT73alYcMcElwQXiMANHatxe5CD6c0zJmwtIRoBdwehcF0bxJshnGtt9UJ2W5kFQQQQcjaToOT8PfoHu/JZNrfqH4ZJFjHiZaOkEievd+GQpADVyGdOGie9pR0TaPuxbfmuE99sPDWE5hTuTGHd6C2LgPOW2tr92EJtJkhLRn3tx7Hrrq1mZh7EQ6NJ1zGSEqpR1+vvYR/G1Mrj66UuP1j0+Mf6bDFATDKpe4wr4+RBjwpAtp/FTpycYhA4SF80cizvul5GSBQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.62.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=o2me5A34S/CA57rO9JX2LJVZGCsANGo9EZ0shS6bP8E=;
 b=FJ6EUcmwNeZZIIZ9c/GZrH1RK5N3T8Q30fLs4xcQuAo3fanqNVvcPm+5oi70bMhZO5KjbBGWLnQvjSUVyWCMigTp2FHDNpGNhcfktUnsJqxMs85TPRPyR8KpX1PwEGBILJ2tURst2Ge4F99fiYsHU7NIPZUCx+CSvROTLlrMDx8=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.62.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.62.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.62.198; helo=xsj-pvapexch01.xlnx.xilinx.com;
From: Vikram Garhwal <fnu.vikram@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <julien@xen.org>, <bertrand.marquis@arm.com>,
	<volodymyr_babchuk@epam.com>, Vikram Garhwal <fnu.vikram@xilinx.com>
Subject: [XEN][RFC PATCH v3 03/14] libfdt: Keep fdt functions after init for CONFIG_OVERLAY_DTB.
Date: Tue, 8 Mar 2022 11:46:53 -0800
Message-ID: <20220308194704.14061-4-fnu.vikram@xilinx.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220308194704.14061-1-fnu.vikram@xilinx.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: fefc3967-106b-45a4-ba6a-08da013c75a8
X-MS-TrafficTypeDiagnostic: SA2PR02MB7532:EE_
X-Microsoft-Antispam-PRVS:
	<SA2PR02MB7532E79671F1FBF43596AECBBC099@SA2PR02MB7532.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.62.198;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:xsj-pvapexch01.xlnx.xilinx.com;PTR:unknown-62-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(4744005)(4326008)(8676002)(336012)(426003)(26005)(47076005)(316002)(7636003)(186003)(6916009)(82310400004)(5660300002)(54906003)(8936002)(70206006)(70586007)(1076003)(7696005)(36756003)(2616005)(356005)(107886003)(36860700001)(508600001)(40460700003)(83380400001)(2906002)(6666004)(9786002)(102446001);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 19:47:20.9066
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: fefc3967-106b-45a4-ba6a-08da013c75a8
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.62.198];Helo=[xsj-pvapexch01.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	SN1NAM02FT0043.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA2PR02MB7532

This is done to access fdt library function which are required for adding device
tree overlay nodes for dynamic programming of nodes.

Acked-by: Julien Grall <jgrall@amazon.com>
Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com>
---
 xen/common/libfdt/Makefile | 4 ++++
 1 file changed, 4 insertions(+)

diff --git a/xen/common/libfdt/Makefile b/xen/common/libfdt/Makefile
index 6708af12e5..86faa90f79 100644
--- a/xen/common/libfdt/Makefile
+++ b/xen/common/libfdt/Makefile
@@ -1,7 +1,11 @@
 include $(src)/Makefile.libfdt
 
 SECTIONS := text data $(SPECIAL_DATA_SECTIONS)
+
+# For CONFIG_OVERLAY_DTB, libfdt functionalities will be needed during runtime.
+ifneq ($(CONFIG_OVERLAY_DTB),y)
 OBJCOPYFLAGS := $(foreach s,$(SECTIONS),--rename-section .$(s)=.init.$(s))
+endif
 
 obj-y += libfdt.o
 nocov-y += libfdt.o
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 19:47:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 19:47:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287456.487460 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfnq-0004Ds-2p; Tue, 08 Mar 2022 19:47:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287456.487460; Tue, 08 Mar 2022 19:47:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfnp-0004Dl-UG; Tue, 08 Mar 2022 19:47:25 +0000
Received: by outflank-mailman (input) for mailman id 287456;
 Tue, 08 Mar 2022 19:47:24 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RGf4=TT=xilinx.com=fnuv@srs-se1.protection.inumbo.net>)
 id 1nRfnn-0004Df-Tx
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 19:47:24 +0000
Received: from NAM11-BN8-obe.outbound.protection.outlook.com
 (mail-bn8nam11on20625.outbound.protection.outlook.com
 [2a01:111:f400:7eae::625])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 913bbe21-9f18-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 20:47:22 +0100 (CET)
Received: from DS7P222CA0001.NAMP222.PROD.OUTLOOK.COM (2603:10b6:8:2e::7) by
 CH0PR02MB8167.namprd02.prod.outlook.com (2603:10b6:610:10c::23) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.17; Tue, 8 Mar
 2022 19:47:18 +0000
Received: from DM3NAM02FT042.eop-nam02.prod.protection.outlook.com
 (2603:10b6:8:2e:cafe::b9) by DS7P222CA0001.outlook.office365.com
 (2603:10b6:8:2e::7) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Tue, 8 Mar 2022 19:47:18 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (149.199.62.198) by
 DM3NAM02FT042.mail.protection.outlook.com (10.13.4.213) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5038.14 via Frontend Transport; Tue, 8 Mar 2022 19:47:18 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 8 Mar 2022 11:47:14 -0800
Received: from smtp.xilinx.com (172.19.127.95) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 8 Mar 2022 11:47:09 -0800
Received: from [172.19.2.115] (port=58782 helo=xsjfnuv50.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <fnu.vikram@xilinx.com>)
 id 1nRfnZ-000Cws-7i; Tue, 08 Mar 2022 11:47:09 -0800
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 913bbe21-9f18-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=UufaNjrwDWWZRE0OTTdJdFJKp8lywPftpNXOgfoQplQfZtVW7XiBGP9OSv4GMItfwpo2Yxx2s3msPdU+xornPmqz+EXXvN9sd0NMjEtqs146XnxBolX6m0vadarsEfLafYxoYecRDUJlr/D629EbuH/3HKCYrBIuYBnpi8+zWhXa1/m6jwHmnbX6GObmslubMYdGRwJS3XIc4oY2NwQdsFHMY2A2KMdzON93grzgDlnqwzdJtWHvaVHI94VaiP5PzhwMfrTfWCO91jSd8SL0ohNSKVyfDA0qWfr6O/kg3rDYe4TZRu7rm6BWMnCJoBVFzKx8EUPcAY7CXCk8oWQY/g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=SyXrmvae9ZhJvDuYQW5hF8OcaoYJpoiDhlbnsCshAsY=;
 b=bK3lbq0H347BJP5vyUy5VRNkU9mt2GL296jRvq9+iy8TVhY/7us4Q0F/+/UHc2TURvpIRxg/4B5SdXzumoMr1Yj7SQcSapgG774QKNPCbU9dbUbsUGPfZe3M8zE6ro1RUoUwwwaE21WbfFLPkpTQXUIHxlhbXXEqFaKtHSF5jZxJ20H5uiLpOqQrsMUUZh2qslE/9g3+rflHRN/1ltKFHpQLLKtvtfWACTThSJ6Z6GYz/KBMoA5sD5QthkGjy5ojARaxWl3Ok/ror5xbDQqc2S8YJJE/NFYZswTxtoGNYrr8xfha3iiU5W4dhcNymf5ZbFdgLJXpTuBV8iraOadfiQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.62.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=SyXrmvae9ZhJvDuYQW5hF8OcaoYJpoiDhlbnsCshAsY=;
 b=WBdAqp2dUnClGdS46gEoHeCHSmnekwzOmLV9DwFBmu/7d1LwqXrIHhy8Co1SYUwm0K3BVbJ0aSDnkcOMJbKVvzfelsWe/mYnYd4Sji9xHQqLoiAdIoe2DwCJr9yOXqwG0tfufnPTwHkalH1o1NWYKDs7viws7/EtxVCfrjCdmxA=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.62.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.62.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.62.198; helo=xsj-pvapexch02.xlnx.xilinx.com;
From: Vikram Garhwal <fnu.vikram@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <julien@xen.org>, <bertrand.marquis@arm.com>,
	<volodymyr_babchuk@epam.com>, Vikram Garhwal <fnu.vikram@xilinx.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, Jan Beulich
	<jbeulich@suse.com>, Paul Durrant <paul@xen.org>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, Wei
 Liu <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>, Juergen Gross
	<jgross@suse.com>
Subject: [XEN][RFC PATCH v3 00/14] dynamic node programming using overlay dtbo
Date: Tue, 8 Mar 2022 11:46:50 -0800
Message-ID: <20220308194704.14061-1-fnu.vikram@xilinx.com>
X-Mailer: git-send-email 2.17.1
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: bc7fdb7e-4780-4338-9110-08da013c742a
X-MS-TrafficTypeDiagnostic: CH0PR02MB8167:EE_
X-Microsoft-Antispam-PRVS:
	<CH0PR02MB81671F469A26730014ECC793BC099@CH0PR02MB8167.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	0myKYlPY6R+eYGVaGF2KApF6hvKsj24gT7oc/kohVVSAnW4TT9cNT8LgmBVXCJTkfms5k1bDZFTiZBVItj1xkHCwLBtwRdjjEEXk8jEf8jLK4MZagiwIXYi2yol2mJlhqzYf/siJgCQtpE+Kf6znFkGsCg9bLbvIkj9smFTHhB6XhiT8gP32K+jZKmszyvIliz0E5HtlfJiE5WyhWhzs8cPR0DnKiWZKQHYTId6Y1aVoqtS33mbfcNV78wsS10KAnyckKUaWTrXIY18ZUhSOX7RT+4eF4CtijF7rQMFVBhT6tNIKG6cjVeBsTm7RGo1KeldnnHqwZY0PgqQU+crJInDXQ9qm4+APpDKncvFPT2RXfC7oTqy+UmjIBH4Cza0v/+2DNdaqOQ6m+20vJ4DM/uVnVeafP3QIolCMf0OB5xoWzOHeWG03ADcCxXwIOo7ZZWaGgarrWS82vWpxgfXkZb8Z+EJPRaW0K5t9z8Sfz71Z0lFbAXBh+9rYZpglgwA4XiyheXUHtDPCyL3kkzGg0iMwoU4T5mA26qpLL4lioW6qyk+XUJCOXfeNNmQlkyVXirMx6GpnqvRleotbZ+mrVfk8VLcAverehBhgMc7sUFSQyu4MnfgBz7Xcqzn+LhilBrFrQAYTiQrc47PnkT7q8oaTbpm5wvSrAcXNgrMXoauzatshhn64e5mU5wslaue1nrTmHZGCLBHWNNPepttZnw==
X-Forefront-Antispam-Report:
	CIP:149.199.62.198;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:xsj-pvapexch02.xlnx.xilinx.com;PTR:unknown-62-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(336012)(6666004)(356005)(7636003)(7416002)(26005)(8676002)(40460700003)(2616005)(1076003)(7696005)(5660300002)(508600001)(2906002)(426003)(36860700001)(8936002)(9786002)(70586007)(70206006)(82310400004)(186003)(316002)(47076005)(54906003)(36756003)(4326008)(6916009)(83380400001)(102446001);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 19:47:18.4021
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: bc7fdb7e-4780-4338-9110-08da013c742a
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.62.198];Helo=[xsj-pvapexch02.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DM3NAM02FT042.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH0PR02MB8167

Hi,
This RFC patch series is for introducing dynamic programming i.e. add/remove the
devices during run time. Using "xl overlay" a device can be added/removed with dtbo.

For adding a node using dynamic programming:
    1. flatten device tree overlay node will be added to a fdt
    2. Updated fdt will be unflattened to a new dt_host_new
    3. Extract the newly added node information from dt_host_new
    4. Add the added node under correct parent in original dt_host.
    3. Map/Permit interrupt and iomem region as required.

For removing a node:
    1. Find the node with given path.
    2. Check if the node is used by any of domus. Removes the node only when
        it's not used by any domain.
    3. Removes IRQ permissions and MMIO access.
    5. Find the node in dt_host and delete the device node entry from dt_host.
    6. Free the overlay_tracker entry which means free dt_host_new also(created
in adding node step).

Change Log:
 v2 -> v3:
    Moved overlay functionalities to dt_overlay.c file.
    Renamed XEN_SYSCTL_overlay to XEN_SYSCTL_dt_overlay.
    Add dt_* prefix to overlay_add/remove_nodes.
    Added dtdevs_lock to protect iommu_add_dt_device().
    For iommu, moved spin_lock to caller.
    Address code issue from v2 review.

 v1 -> v2:
    Add support for multiple node addition/removal using dtbo.
    Replaced fpga-add and fpga-remove with one hypercall overlay_op.
    Moved common domain_build.c function to device.c
    Add OVERLAY_DTB configuration.
    Renamed overlay_get_target() to fdt_overlay_get_target().
    Split remove_device patch into two patches.
    Moved overlay_add/remove code to sysctl and changed it from domctl to sysctl.
    Added all overlay code under CONFIG_OVERLAY_DTB
    Renamed all tool domains fpga function to overlay
    Addressed code issues from v1 review.

Regards,
Vikram

Vikram Garhwal (14):
  xen/arm/device: Remove __init from function type
  xen/arm: Add CONFIG_OVERLAY_DTB
  libfdt: Keep fdt functions after init for CONFIG_OVERLAY_DTB.
  libfdt: overlay: change overlay_get_target()
  xen/device-tree: Add _dt_find_node_by_path() to find nodes in device
    tree
  xen/smmu: Add remove_device callback for smmu_iommu ops
  xen/iommu: Move spin_lock from iommu_dt_device_is_assigned to caller
  xen/iommu: protect iommu_add_dt_device() with dtdevs_lock
  xen/iommu: Introduce iommu_remove_dt_device()
  xen/arm: Implement device tree node removal functionalities
  xen/arm: Implement device tree node addition functionalities
  tools/libs/ctrl: Implement new xc interfaces for dt overlay
  tools/libs/light: Implement new libxl functions for device tree
    overlay ops
  tools/xl: Add new xl command overlay for device tree overlay support

 tools/include/libxl.h                 |   3 +
 tools/include/xenctrl.h               |   3 +
 tools/libs/ctrl/Makefile              |   1 +
 tools/libs/ctrl/xc_overlay.c          |  51 ++
 tools/libs/light/Makefile             |   1 +
 tools/libs/light/libxl_overlay.c      |  67 +++
 tools/xl/xl.h                         |   4 +
 tools/xl/xl_cmdtable.c                |   6 +
 tools/xl/xl_vmcontrol.c               |  45 ++
 xen/arch/arm/Kconfig                  |   6 +
 xen/arch/arm/device.c                 | 136 +++++
 xen/arch/arm/domain_build.c           | 142 -----
 xen/arch/arm/include/asm/setup.h      |   3 +
 xen/common/Makefile                   |   1 +
 xen/common/device_tree.c              |  30 +-
 xen/common/dt_overlay.c               | 771 ++++++++++++++++++++++++++
 xen/common/libfdt/Makefile            |   4 +
 xen/common/libfdt/fdt_overlay.c       |  29 +-
 xen/common/libfdt/version.lds         |   1 +
 xen/common/sysctl.c                   |  10 +
 xen/drivers/passthrough/arm/smmu.c    |  56 ++
 xen/drivers/passthrough/device_tree.c |  58 +-
 xen/include/public/sysctl.h           |  19 +
 xen/include/xen/device_tree.h         |  14 +
 xen/include/xen/dt_overlay.h          |  47 ++
 xen/include/xen/iommu.h               |   2 +
 xen/include/xen/libfdt/libfdt.h       |  18 +
 27 files changed, 1347 insertions(+), 181 deletions(-)
 create mode 100644 tools/libs/ctrl/xc_overlay.c
 create mode 100644 tools/libs/light/libxl_overlay.c
 create mode 100644 xen/common/dt_overlay.c
 create mode 100644 xen/include/xen/dt_overlay.h

-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 19:47:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 19:47:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287458.487481 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfnu-0004p5-IJ; Tue, 08 Mar 2022 19:47:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287458.487481; Tue, 08 Mar 2022 19:47:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfnu-0004ow-Eb; Tue, 08 Mar 2022 19:47:30 +0000
Received: by outflank-mailman (input) for mailman id 287458;
 Tue, 08 Mar 2022 19:47:29 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RGf4=TT=xilinx.com=fnuv@srs-se1.protection.inumbo.net>)
 id 1nRfnt-0004Om-3w
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 19:47:29 +0000
Received: from NAM12-BN8-obe.outbound.protection.outlook.com
 (mail-bn8nam12on20613.outbound.protection.outlook.com
 [2a01:111:f400:fe5b::613])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 954be4e0-9f18-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 20:47:28 +0100 (CET)
Received: from SN1PR12CA0071.namprd12.prod.outlook.com (2603:10b6:802:20::42)
 by SJ0PR02MB7230.namprd02.prod.outlook.com (2603:10b6:a03:29a::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Tue, 8 Mar
 2022 19:47:24 +0000
Received: from SN1NAM02FT0043.eop-nam02.prod.protection.outlook.com
 (2603:10b6:802:20:cafe::57) by SN1PR12CA0071.outlook.office365.com
 (2603:10b6:802:20::42) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.17 via Frontend
 Transport; Tue, 8 Mar 2022 19:47:24 +0000
Received: from xsj-pvapexch01.xlnx.xilinx.com (149.199.62.198) by
 SN1NAM02FT0043.mail.protection.outlook.com (10.97.5.57) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5038.14 via Frontend Transport; Tue, 8 Mar 2022 19:47:24 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) by
 xsj-pvapexch01.xlnx.xilinx.com (172.19.86.40) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 8 Mar 2022 11:47:20 -0800
Received: from smtp.xilinx.com (172.19.127.95) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 8 Mar 2022 11:47:15 -0800
Received: from [172.19.2.115] (port=58782 helo=xsjfnuv50.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <fnu.vikram@xilinx.com>)
 id 1nRfnf-000Cws-Pa; Tue, 08 Mar 2022 11:47:15 -0800
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 954be4e0-9f18-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=JjYCbAC33fZjBExGYzn6KfLfJpuUjoJyfUdNTSq1nd8MnbdRjhQxh7yEc9LcTwkRPJkgfwWp9GBIJ9lB7B997wU6o9mN1CeTYNyGXkHniMlJDgg/TB9iJLfFs24YYb9PFwj7ckP++IMAJ+SLMN757ibS7d9avqwRraum7kGuhC7AtiB7hM3Satqwk3pSxfgiRNJubcVlz4hq8J7CmxhQ6OZBQn2DrtWtSk4kzXiabbJLNRG0E/Oyx3cXNWhE9VgGsGcTzEFEZtGbKTfpuUxHzrZprIbhB+OQaE5lBliZXABQqIfSegDHo4R7/g8qKJOhAqlZUsPATylqA+QW09p8PA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=KrNaJDTXo0BfvUNG8uMhFTZZ7d11YwLQSgOOIsuxOC4=;
 b=KoBQsYvemfLaZ06U7SHKhiWQzJtPm4FQTkSpaoVfAkgppwFvpsXx9Y69iFdDeW8yQ99UwniyCAu58AFKaf+tPAg+85tWrQRW9CBnh9lbY8ifda6GPDHoqiyHR23sCMEhWlBo1Wy7rOBvT8338WRPCRkg6836NG1k8sXZ1mj9A38T9l9I2QCT+sjfn+go9imc7nNPzAqQRdH8y7SEerCnNpgNA//46STvAGCgA+aV3NTbzWB2TXDUzXJJDP4LfrpqNyty/0d543RoCZwJ3xXzSkEcGR7UoCL5It2n94uc03h1YxA93gwsgPH7WA8pg3HxN01SKQi4fI0+xyhPbu/C2g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.62.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=KrNaJDTXo0BfvUNG8uMhFTZZ7d11YwLQSgOOIsuxOC4=;
 b=G65kcUVgrti9rwVDnyMxwV+arSsqCEqzgc8+6pslZJF6ySc+6CC3+8tUSubxqivQxwrtICdgA3NKUGM1Py5o3E/rMAK3DcKXHt+hpjp2jscHu22gwzs2EUPTQUIJV5hjOu+vk8au/84j59BEsInoCyqeg4ftvWzFuiHZ61XK1xw=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.62.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.62.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.62.198; helo=xsj-pvapexch01.xlnx.xilinx.com;
From: Vikram Garhwal <fnu.vikram@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <julien@xen.org>, <bertrand.marquis@arm.com>,
	<volodymyr_babchuk@epam.com>, Vikram Garhwal <fnu.vikram@xilinx.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [XEN][RFC PATCH v3 02/14] xen/arm: Add CONFIG_OVERLAY_DTB
Date: Tue, 8 Mar 2022 11:46:52 -0800
Message-ID: <20220308194704.14061-3-fnu.vikram@xilinx.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220308194704.14061-1-fnu.vikram@xilinx.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: b671b5af-4179-454e-6f7b-08da013c77b0
X-MS-TrafficTypeDiagnostic: SJ0PR02MB7230:EE_
X-Microsoft-Antispam-PRVS:
	<SJ0PR02MB7230BA38C6DECDA98A703155BC099@SJ0PR02MB7230.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.62.198;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:xsj-pvapexch01.xlnx.xilinx.com;PTR:unknown-62-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(26005)(8676002)(1076003)(70206006)(356005)(70586007)(82310400004)(336012)(426003)(186003)(47076005)(8936002)(9786002)(40460700003)(36860700001)(5660300002)(7636003)(4326008)(4744005)(2906002)(54906003)(6916009)(508600001)(316002)(7696005)(6666004)(36756003)(2616005)(102446001);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 19:47:24.3126
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: b671b5af-4179-454e-6f7b-08da013c77b0
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.62.198];Helo=[xsj-pvapexch01.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	SN1NAM02FT0043.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR02MB7230

Introduce a config option where the user can enable support for adding/removing
device tree nodes using a device tree binary overlay.

Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com>
---
 xen/arch/arm/Kconfig | 6 ++++++
 1 file changed, 6 insertions(+)

diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig
index ecfa6822e4..0159fbe27a 100644
--- a/xen/arch/arm/Kconfig
+++ b/xen/arch/arm/Kconfig
@@ -46,6 +46,12 @@ config HAS_ITS
         bool "GICv3 ITS MSI controller support (UNSUPPORTED)" if UNSUPPORTED
         depends on GICV3 && !NEW_VGIC
 
+config OVERLAY_DTB
+    bool "DTB overlay support (UNSUPPORTED)" if UNSUPPORTED
+    ---help---
+
+    Dynamic addition/removal of Xen device tree nodes using a dtbo.
+
 config HVM
         def_bool y
 
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 19:47:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 19:47:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287459.487486 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfnu-0004su-To; Tue, 08 Mar 2022 19:47:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287459.487486; Tue, 08 Mar 2022 19:47:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfnu-0004sK-Oq; Tue, 08 Mar 2022 19:47:30 +0000
Received: by outflank-mailman (input) for mailman id 287459;
 Tue, 08 Mar 2022 19:47:29 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RGf4=TT=xilinx.com=fnuv@srs-se1.protection.inumbo.net>)
 id 1nRfnt-0004Df-7o
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 19:47:29 +0000
Received: from NAM12-DM6-obe.outbound.protection.outlook.com
 (mail-dm6nam12on2060b.outbound.protection.outlook.com
 [2a01:111:f400:fe59::60b])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 94df3c0a-9f18-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 20:47:28 +0100 (CET)
Received: from SN1PR12CA0050.namprd12.prod.outlook.com (2603:10b6:802:20::21)
 by PH0PR02MB7448.namprd02.prod.outlook.com (2603:10b6:510:15::7) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Tue, 8 Mar
 2022 19:47:24 +0000
Received: from SN1NAM02FT0043.eop-nam02.prod.protection.outlook.com
 (2603:10b6:802:20::4) by SN1PR12CA0050.outlook.office365.com
 (2603:10b6:802:20::21) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.19 via Frontend
 Transport; Tue, 8 Mar 2022 19:47:23 +0000
Received: from xsj-pvapexch01.xlnx.xilinx.com (149.199.62.198) by
 SN1NAM02FT0043.mail.protection.outlook.com (10.97.5.57) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5038.14 via Frontend Transport; Tue, 8 Mar 2022 19:47:23 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) by
 xsj-pvapexch01.xlnx.xilinx.com (172.19.86.40) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 8 Mar 2022 11:47:19 -0800
Received: from smtp.xilinx.com (172.19.127.95) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 8 Mar 2022 11:47:19 -0800
Received: from [172.19.2.115] (port=58782 helo=xsjfnuv50.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <fnu.vikram@xilinx.com>)
 id 1nRfnj-000Cws-Hh; Tue, 08 Mar 2022 11:47:19 -0800
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 94df3c0a-9f18-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=HmJL+E1gcn2t7gqHBgKEsXEd+xRdLjuu2iyEPkCjBTexdygU6p3IwPIZbfmT0Knj4m3CZQ1C3Gbf7W8XGrP+axY+ZOLtRXtgT9QKwr9FXILfUuEeBcC1WzHLjtwt+i1u2SQJsLwJVtvcCTnHXOxRps6NkHRLdLWwumQrM/ud5RuYnpcLLFZYHCOUa6YAoiiCF8pec28urwf4+o3myXSifjD2p6+IawnTHguQPXHl33Eb2PK0Yyt+p8xstodZqkiOZDYEukUhchzJqHF+qLWIqF4kWdpBseHozCaGhzbuAXBz5KRo0kCX7Hh0ZZnprS0ySB/dq3OpwHettrcnPjRwCA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=S/DNwe4q4N3MUz/sgnELcNL1mBi4irU86Q0dfHBdLwk=;
 b=ZVbbf34t5wxWGEw/F/zaamR/1GKx/goeRZJO2NS/2RFHRDmHrROyGGNqSnAEtAeSuCHN4Gqpcw+GMvsTzY0YTwtOy2exdpq1cJNz+8ySo8KJMva0wYkXicYuS9j+njrmtmOvj7eJuYrHsrDWtj1ut7/muIOLkkn1VOeb0wcMz4QpYaItvwJU9dzugKGnu+tsWK7VJqhFilDE/RHwjeTrISoHeKF3U7vXQanMyNEssyOQnuxYqKSxXGQ9UpWAZqnCX2kE/Ows/T8CHNTD8nGQA3BbahWG4Oz+QfOe0MNpl5kn9KrmeUxSZPW8KQivaK62aDZJm0yRIm7839DVokj7CQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.62.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=S/DNwe4q4N3MUz/sgnELcNL1mBi4irU86Q0dfHBdLwk=;
 b=HKmHXv2R0Qk6O9/TmJBT0VcglglOphz6s9SmiW8XlzDpFafRKhpi8quqEaJYI6fE7TslYnSkOvKeVm2gf8Gkhi8vQzYvH2X/3FpE6lHKZibc7yO6ITmHYfaJmRwXysvJI/0DdGQ37mOgHXeM/iNBR9XI7JS7R4FUxwOtEkjwO8M=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.62.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.62.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.62.198; helo=xsj-pvapexch01.xlnx.xilinx.com;
From: Vikram Garhwal <fnu.vikram@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <julien@xen.org>, <bertrand.marquis@arm.com>,
	<volodymyr_babchuk@epam.com>, Vikram Garhwal <fnu.vikram@xilinx.com>
Subject: [XEN][RFC PATCH v3 04/14] libfdt: overlay: change overlay_get_target()
Date: Tue, 8 Mar 2022 11:46:54 -0800
Message-ID: <20220308194704.14061-5-fnu.vikram@xilinx.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220308194704.14061-1-fnu.vikram@xilinx.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 28ca5c7b-9d87-4eb1-c3a2-08da013c7761
X-MS-TrafficTypeDiagnostic: PH0PR02MB7448:EE_
X-Microsoft-Antispam-PRVS:
	<PH0PR02MB7448EAF94576D02B18AA94ABBC099@PH0PR02MB7448.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.62.198;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:xsj-pvapexch01.xlnx.xilinx.com;PTR:unknown-62-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(36860700001)(8676002)(4326008)(316002)(54906003)(6916009)(107886003)(70206006)(70586007)(508600001)(40460700003)(47076005)(9786002)(5660300002)(8936002)(356005)(36756003)(26005)(2616005)(1076003)(426003)(336012)(186003)(7636003)(2906002)(83380400001)(6666004)(7696005)(82310400004)(102446001);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 19:47:23.7970
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 28ca5c7b-9d87-4eb1-c3a2-08da013c7761
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.62.198];Helo=[xsj-pvapexch01.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	SN1NAM02FT0043.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR02MB7448

Rename overlay_get_target() to fdt_overlay_target_offset() and remove static
function type.

This is done to get the target path for the overlay nodes which is very useful
in many cases. For example, Xen hypervisor needs it when applying overlays
because Xen needs to do further processing of the overlay nodes, e.g. mapping of
resources(IRQs and IOMMUs) to other VMs, creation of SMMU pagetables, etc.

This commit is also applied to git://github.com/dgibson/dtc:
    commit: ad9cf6bde5b90d4c1e5a79a2803e98d6344c27d7.

Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com>
---
 xen/common/libfdt/fdt_overlay.c | 29 +++++++----------------------
 xen/common/libfdt/version.lds   |  1 +
 xen/include/xen/libfdt/libfdt.h | 18 ++++++++++++++++++
 3 files changed, 26 insertions(+), 22 deletions(-)

diff --git a/xen/common/libfdt/fdt_overlay.c b/xen/common/libfdt/fdt_overlay.c
index 7b95e2b639..acf0c4c2a6 100644
--- a/xen/common/libfdt/fdt_overlay.c
+++ b/xen/common/libfdt/fdt_overlay.c
@@ -41,37 +41,22 @@ static uint32_t overlay_get_target_phandle(const void *fdto, int fragment)
 	return fdt32_to_cpu(*val);
 }
 
-/**
- * overlay_get_target - retrieves the offset of a fragment's target
- * @fdt: Base device tree blob
- * @fdto: Device tree overlay blob
- * @fragment: node offset of the fragment in the overlay
- * @pathp: pointer which receives the path of the target (or NULL)
- *
- * overlay_get_target() retrieves the target offset in the base
- * device tree of a fragment, no matter how the actual targeting is
- * done (through a phandle or a path)
- *
- * returns:
- *      the targeted node offset in the base device tree
- *      Negative error code on error
- */
-static int overlay_get_target(const void *fdt, const void *fdto,
-			      int fragment, char const **pathp)
+int fdt_overlay_target_offset(const void *fdt, const void *fdto,
+			      int fragment_offset, char const **pathp)
 {
 	uint32_t phandle;
 	const char *path = NULL;
 	int path_len = 0, ret;
 
 	/* Try first to do a phandle based lookup */
-	phandle = overlay_get_target_phandle(fdto, fragment);
+	phandle = overlay_get_target_phandle(fdto, fragment_offset);
 	if (phandle == (uint32_t)-1)
 		return -FDT_ERR_BADPHANDLE;
 
 	/* no phandle, try path */
 	if (!phandle) {
 		/* And then a path based lookup */
-		path = fdt_getprop(fdto, fragment, "target-path", &path_len);
+		path = fdt_getprop(fdto, fragment_offset, "target-path", &path_len);
 		if (path)
 			ret = fdt_path_offset(fdt, path);
 		else
@@ -638,7 +623,7 @@ static int overlay_merge(void *fdt, void *fdto)
 		if (overlay < 0)
 			return overlay;
 
-		target = overlay_get_target(fdt, fdto, fragment, NULL);
+		target = fdt_overlay_target_offset(fdt, fdto, fragment, NULL);
 		if (target < 0)
 			return target;
 
@@ -781,7 +766,7 @@ static int overlay_symbol_update(void *fdt, void *fdto)
 			return -FDT_ERR_BADOVERLAY;
 
 		/* get the target of the fragment */
-		ret = overlay_get_target(fdt, fdto, fragment, &target_path);
+		ret = fdt_overlay_target_offset(fdt, fdto, fragment, &target_path);
 		if (ret < 0)
 			return ret;
 		target = ret;
@@ -803,7 +788,7 @@ static int overlay_symbol_update(void *fdt, void *fdto)
 
 		if (!target_path) {
 			/* again in case setprop_placeholder changed it */
-			ret = overlay_get_target(fdt, fdto, fragment, &target_path);
+			ret = fdt_overlay_target_offset(fdt, fdto, fragment, &target_path);
 			if (ret < 0)
 				return ret;
 			target = ret;
diff --git a/xen/common/libfdt/version.lds b/xen/common/libfdt/version.lds
index 7ab85f1d9d..cbce5d4a8b 100644
--- a/xen/common/libfdt/version.lds
+++ b/xen/common/libfdt/version.lds
@@ -77,6 +77,7 @@ LIBFDT_1.2 {
 		fdt_appendprop_addrrange;
 		fdt_setprop_inplace_namelen_partial;
 		fdt_create_with_flags;
+		fdt_overlay_target_offset;
 	local:
 		*;
 };
diff --git a/xen/include/xen/libfdt/libfdt.h b/xen/include/xen/libfdt/libfdt.h
index c71689e2be..fabddbee8c 100644
--- a/xen/include/xen/libfdt/libfdt.h
+++ b/xen/include/xen/libfdt/libfdt.h
@@ -2109,6 +2109,24 @@ int fdt_del_node(void *fdt, int nodeoffset);
  */
 int fdt_overlay_apply(void *fdt, void *fdto);
 
+/**
+ * fdt_overlay_target_offset - retrieves the offset of a fragment's target
+ * @fdt: Base device tree blob
+ * @fdto: Device tree overlay blob
+ * @fragment_offset: node offset of the fragment in the overlay
+ * @pathp: pointer which receives the path of the target (or NULL)
+ *
+ * fdt_overlay_target_offset() retrieves the target offset in the base
+ * device tree of a fragment, no matter how the actual targeting is
+ * done (through a phandle or a path)
+ *
+ * returns:
+ *      the targeted node offset in the base device tree
+ *      Negative error code on error
+ */
+int fdt_overlay_target_offset(const void *fdt, const void *fdto,
+			      int fragment_offset, char const **pathp);
+
 /**********************************************************************/
 /* Debugging / informational functions                                */
 /**********************************************************************/
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 19:47:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 19:47:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287460.487503 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfnw-0005MO-Fh; Tue, 08 Mar 2022 19:47:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287460.487503; Tue, 08 Mar 2022 19:47:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfnw-0005MH-Bi; Tue, 08 Mar 2022 19:47:32 +0000
Received: by outflank-mailman (input) for mailman id 287460;
 Tue, 08 Mar 2022 19:47:31 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RGf4=TT=xilinx.com=fnuv@srs-se1.protection.inumbo.net>)
 id 1nRfnv-0004Om-9Q
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 19:47:31 +0000
Received: from NAM12-BN8-obe.outbound.protection.outlook.com
 (mail-bn8nam12on2062c.outbound.protection.outlook.com
 [2a01:111:f400:fe5b::62c])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 96a8cb47-9f18-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 20:47:30 +0100 (CET)
Received: from SN6PR16CA0062.namprd16.prod.outlook.com (2603:10b6:805:ca::39)
 by CH0PR02MB8092.namprd02.prod.outlook.com (2603:10b6:610:10c::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Tue, 8 Mar
 2022 19:47:27 +0000
Received: from SN1NAM02FT0027.eop-nam02.prod.protection.outlook.com
 (2603:10b6:805:ca:cafe::5c) by SN6PR16CA0062.outlook.office365.com
 (2603:10b6:805:ca::39) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Tue, 8 Mar 2022 19:47:27 +0000
Received: from xsj-pvapexch01.xlnx.xilinx.com (149.199.62.198) by
 SN1NAM02FT0027.mail.protection.outlook.com (10.97.4.212) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5038.14 via Frontend Transport; Tue, 8 Mar 2022 19:47:27 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) by
 xsj-pvapexch01.xlnx.xilinx.com (172.19.86.40) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 8 Mar 2022 11:47:22 -0800
Received: from smtp.xilinx.com (172.19.127.95) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 8 Mar 2022 11:47:22 -0800
Received: from [172.19.2.115] (port=58782 helo=xsjfnuv50.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <fnu.vikram@xilinx.com>)
 id 1nRfnm-000Cws-Ei; Tue, 08 Mar 2022 11:47:22 -0800
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 96a8cb47-9f18-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ETL0EnEm8zZvceHCk9Sc4USiDH9/QC18lc6pSqjuz/35oSSQjpuMi533y+I/hXd8+9KituXkPncfRdmBUh02HNuOxP3DC0ClJnuCkjo1+rzOkI4QXsqYjGDpkydGeP26AQ2d7bwIHxHWBuuTxNbFWdBBM0LTyvfOL7tIKFnOCvk/ix6YZwARL9T+1q3hkIkSP48DNXtwzfjZYpgti8bOzntiU42RmC2C/ceBbPjY6PRnljA04Cqy/uznAgkD3izPri/9fSOh30L7g47EqrOFJEwkcIvMQYkERQlC0VRWHawqeaFwiDWvDrB5EhYaSHPf6XFDtLQ1nXAvYAr0oZt2eQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=3IWMUDk1B29LOn60YW7dkrnq4Tu3150fXZJyXETxs0g=;
 b=QET60cJxqjQyKmYqU66ZH7Tya0UYonhuDYyuvLRv4Krkuc2D7vqMcOBftloMXqbF1Baw4YD8sijq7ZOE8OeArC8HWeKifB5AM4/ACub/TeJkhrvw8uU9K0yhpzMbHhlflAWg1jY+GMvNjM70ClzsFCpeX2L07e85shu8pQ/5P+5j/420tskQBQ1L6jc3OnUMkyfKPZ/cOz+KenZwW5LD20yFtPSNKAhvtzvBVFnDUEIZJn+nbyVaRkx4vlW8EdUenpmCeq2X7kWZI3fZfpFZtbAsyac5PFfAHFeRh1Fsi9EYsjmDIzMYm369BbWS2FXTaC8+XnJyYwjncwluKPwQKg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.62.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=3IWMUDk1B29LOn60YW7dkrnq4Tu3150fXZJyXETxs0g=;
 b=PcToAz9Lv2wQUk+Qqi/uwDz80/MozqmOVAz8mMwDq1Xc+v7YpFFTfrU2T2j7mUsNiHE9iSNigykLwzDvtUkF/VM0IXZ/AFhX+Oc/4CelRp3Ix8hvU33GrGOvSZkx38/5TBU+SIKmwFd5GwquVjUG4/yTz5LBoWncbpulo7qn1u8=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.62.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.62.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.62.198; helo=xsj-pvapexch01.xlnx.xilinx.com;
From: Vikram Garhwal <fnu.vikram@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <julien@xen.org>, <bertrand.marquis@arm.com>,
	<volodymyr_babchuk@epam.com>, Vikram Garhwal <fnu.vikram@xilinx.com>
Subject: [XEN][RFC PATCH v3 08/14] xen/iommu: protect iommu_add_dt_device() with dtdevs_lock
Date: Tue, 8 Mar 2022 11:46:58 -0800
Message-ID: <20220308194704.14061-9-fnu.vikram@xilinx.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220308194704.14061-1-fnu.vikram@xilinx.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f23ba2e9-c30a-4b02-1b46-08da013c795f
X-MS-TrafficTypeDiagnostic: CH0PR02MB8092:EE_
X-Microsoft-Antispam-PRVS:
	<CH0PR02MB80928F1E679C2B3EF0355F54BC099@CH0PR02MB8092.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.62.198;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:xsj-pvapexch01.xlnx.xilinx.com;PTR:unknown-62-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(8676002)(508600001)(7696005)(6666004)(82310400004)(4326008)(6916009)(316002)(70206006)(70586007)(54906003)(47076005)(40460700003)(36860700001)(26005)(7636003)(83380400001)(336012)(356005)(2616005)(426003)(186003)(1076003)(107886003)(36756003)(5660300002)(2906002)(8936002)(9786002)(102446001);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 19:47:27.1350
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: f23ba2e9-c30a-4b02-1b46-08da013c795f
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.62.198];Helo=[xsj-pvapexch01.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	SN1NAM02FT0027.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH0PR02MB8092

Protect iommu_add_dt_device() with dtdevs_lock to prevent concurrent access add.

Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com>
---
 xen/drivers/passthrough/device_tree.c | 9 ++++++++-
 1 file changed, 8 insertions(+), 1 deletion(-)

diff --git a/xen/drivers/passthrough/device_tree.c b/xen/drivers/passthrough/device_tree.c
index b3b04f8e03..776809a8f2 100644
--- a/xen/drivers/passthrough/device_tree.c
+++ b/xen/drivers/passthrough/device_tree.c
@@ -145,6 +145,8 @@ int iommu_add_dt_device(struct dt_device_node *np)
     if ( dev_iommu_fwspec_get(dev) )
         return 0;
 
+    spin_lock(&dtdevs_lock);
+
     /*
      * According to the Documentation/devicetree/bindings/iommu/iommu.txt
      * from Linux.
@@ -157,7 +159,10 @@ int iommu_add_dt_device(struct dt_device_node *np)
          * these callback implemented.
          */
         if ( !ops->add_device || !ops->dt_xlate )
-            return -EINVAL;
+        {
+            rc = -EINVAL;
+            goto fail;
+        }
 
         if ( !dt_device_is_available(iommu_spec.np) )
             break;
@@ -188,6 +193,8 @@ int iommu_add_dt_device(struct dt_device_node *np)
     if ( rc < 0 )
         iommu_fwspec_free(dev);
 
+fail:
+    spin_unlock(&dtdevs_lock);
     return rc;
 }
 
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 19:47:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 19:47:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287461.487514 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfny-0005iC-Ru; Tue, 08 Mar 2022 19:47:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287461.487514; Tue, 08 Mar 2022 19:47:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfny-0005hz-Mv; Tue, 08 Mar 2022 19:47:34 +0000
Received: by outflank-mailman (input) for mailman id 287461;
 Tue, 08 Mar 2022 19:47:33 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RGf4=TT=xilinx.com=fnuv@srs-se1.protection.inumbo.net>)
 id 1nRfnx-0004Om-16
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 19:47:33 +0000
Received: from NAM11-CO1-obe.outbound.protection.outlook.com
 (mail-co1nam11on2060c.outbound.protection.outlook.com
 [2a01:111:f400:7eab::60c])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 974e7593-9f18-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 20:47:32 +0100 (CET)
Received: from SN6PR16CA0066.namprd16.prod.outlook.com (2603:10b6:805:ca::43)
 by PH0PR02MB8732.namprd02.prod.outlook.com (2603:10b6:510:db::9) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Tue, 8 Mar
 2022 19:47:28 +0000
Received: from SN1NAM02FT0027.eop-nam02.prod.protection.outlook.com
 (2603:10b6:805:ca:cafe::33) by SN6PR16CA0066.outlook.office365.com
 (2603:10b6:805:ca::43) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Tue, 8 Mar 2022 19:47:28 +0000
Received: from xsj-pvapexch01.xlnx.xilinx.com (149.199.62.198) by
 SN1NAM02FT0027.mail.protection.outlook.com (10.97.4.212) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5038.14 via Frontend Transport; Tue, 8 Mar 2022 19:47:28 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) by
 xsj-pvapexch01.xlnx.xilinx.com (172.19.86.40) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 8 Mar 2022 11:47:25 -0800
Received: from smtp.xilinx.com (172.19.127.95) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 8 Mar 2022 11:47:25 -0800
Received: from [172.19.2.115] (port=58782 helo=xsjfnuv50.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <fnu.vikram@xilinx.com>)
 id 1nRfnp-000Cws-8n; Tue, 08 Mar 2022 11:47:25 -0800
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 974e7593-9f18-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=SW6n1ovMxpxPmckryBrLGZY6+5lXFjpDr1XbY58aLAgFaciVcePgo09O88u/CDqc1y5nKenQstGng+tt6F1WbwrU5/IsEBJeYOVwjOVUsrl3dWecR49n3lacyYXzq5LI91BP0V6u9IVBgv0XckWMrqiMCGXkjVvzLsZiES9HsNjxlc9aFLYAXCwVfW8VMkrJoaewcnxL367SGeg2FW9Fls0dON7xHiN9k+CFbv3JVQP/uN6UOZagcxoz7PiiEIFUbFpPRe8REago3Fc6O/SzFcuZv1vhht9P7UNtqrHXHc7RNNfAysQ201JlvKuIqKUlaRLp4tvEExgv7BNeonLZtA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=gfEqKpmJRR5O6DgmlR17CSpSZiZGd6fXDbnnsIWjXck=;
 b=huzsMQmbP/wzhvrRzEyVd396KlOwbWmFHFqWXm3FdTUE4lfgMpszmvy5ecv6/1c6a70ANnpNRopYinUOpm/BcYpoQ4HZ1mvsVXx3ftvRTVm7AE76fywjzs99/Dby7cy5zCpvNl0LZjEtjR4tQ4/RfqB9ObVqoLBtVOjjF6qSf2xYlmhV3d7CRFofnglMBw1IQxoFOTCU7tB53o98oMu1MnAGPH/2p6YEZMmU9feWku6am5pj8fgdpmPj1Kg39PQONResJezBOT0Qmarct0CfUxwCl2+FA3EIRmtOCDi/sMr+L8XmnZPMhxSuk20a2P1o+4t02u+mGq+T0tPPdpyoKg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.62.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=gfEqKpmJRR5O6DgmlR17CSpSZiZGd6fXDbnnsIWjXck=;
 b=kkESmhVov3/WUVgzrBubA+XlXU/w+X7ojt2ijb8aU4OaMP5rxjwhoeVsmjimFHDtnS+ILbfjM46IEahd7NOJEhju2Qm6ptXk+lZMHTkAMOrvI7ku43hsMR/a+5l2H1ELVJWH7LhabIsat39YV2TvldX2KJIVfNd7IWNK3LNJs2Y=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.62.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.62.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.62.198; helo=xsj-pvapexch01.xlnx.xilinx.com;
From: Vikram Garhwal <fnu.vikram@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <julien@xen.org>, <bertrand.marquis@arm.com>,
	<volodymyr_babchuk@epam.com>, Vikram Garhwal <fnu.vikram@xilinx.com>, Wei Liu
	<wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>, Juergen Gross
	<jgross@suse.com>
Subject: [XEN][RFC PATCH v3 12/14] tools/libs/ctrl: Implement new xc interfaces for dt overlay
Date: Tue, 8 Mar 2022 11:47:02 -0800
Message-ID: <20220308194704.14061-13-fnu.vikram@xilinx.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220308194704.14061-1-fnu.vikram@xilinx.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0f6aaedb-1a4b-4154-736a-08da013c79fc
X-MS-TrafficTypeDiagnostic: PH0PR02MB8732:EE_
X-Microsoft-Antispam-PRVS:
	<PH0PR02MB8732C9DC00376589C1C51141BC099@PH0PR02MB8732.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	QhO8XzGx9rykcAndvVDyOtxgbWPAt8XNRO/730uxTPPV2tBhthZ2q1blWJ9s2PXsfMobQ97am8n9XmEq2CSH95X1IOIExZ1g+DoTys7RxxbZYI8XSNBFKXNomdtK3vFAUp7+1ZaCbdTdvfnttwbDaAPF3lW+ykFx/Uwd4+pp5wWNgYwfLwmu+AlHD5IAMOca493dsqFEZ6+E28Nh1e0gYeqV/8SpchK54hi+nk+rySHGYs9G5YDUdPwHcVUqQEg7DfTnab4TzVjkbV555atRQtfC2DoyOb/AicjuaT+BJ+n1Dvqxgwwj7WKlKpZBgC5qiv8/QYDVCeuKFOMT1bE1vdlN8ydm8KmbQEpHGF2r2EvCocrIrDidWkbaXPHSVanO6fckccVkzB1zeJdtDTyNtBdS5wN3VrDLu99tKvdqCEhMBeG/SIOmSecP8egjTMwG5VNjZGIM02uk2++EdQQL36z195N2Im5IJvTrEMZ+h46pRpVxhvoaQd8zwPOPofi4Ymj5nPv9BZwGI8rgG/njbbKCr6jVJgKvmqHkTF9lBKuosE6SewPcMFKyIm7a0YgndCBD3vEerdhbFgO5SljBrh508zh75btW/hqGdsSMkkoQCuZAVHfDC1vp2fObax5xrB9VkJW2Jad7i47Ky+6Zvd9SUlb8CnFRXe7QjRQeG5jwucjTmr9DiRqo2bnHSLYiRVLg9zBgzvyC8SJJgaT+TSdOHBXWeWnGbQ4qjqmYHIHnIBXuNY8Nd4agIKTNYt36t6KxvhUpRhp0OioZYzB9weYICRJadAs+5gJ3vbcZrfm/4opj96n6So+pMOACko6s
X-Forefront-Antispam-Report:
	CIP:149.199.62.198;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:xsj-pvapexch01.xlnx.xilinx.com;PTR:unknown-62-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(508600001)(6666004)(82310400004)(7696005)(9786002)(1076003)(47076005)(186003)(26005)(36860700001)(426003)(356005)(7636003)(336012)(2616005)(5660300002)(8936002)(4326008)(8676002)(70586007)(70206006)(36756003)(2906002)(54906003)(6916009)(40460700003)(316002)(102446001)(2004002);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 19:47:28.1662
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 0f6aaedb-1a4b-4154-736a-08da013c79fc
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.62.198];Helo=[xsj-pvapexch01.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	SN1NAM02FT0027.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR02MB8732

xc_dt_overlay() sends the device tree binary overlay, size of .dtbo and overlay
operation type i.e. add or remove to xen.

Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com>
---
 tools/include/xenctrl.h      |  3 +++
 tools/libs/ctrl/Makefile     |  1 +
 tools/libs/ctrl/xc_overlay.c | 51 ++++++++++++++++++++++++++++++++++++
 3 files changed, 55 insertions(+)
 create mode 100644 tools/libs/ctrl/xc_overlay.c

diff --git a/tools/include/xenctrl.h b/tools/include/xenctrl.h
index 95bd5eca67..b7552d0d9c 100644
--- a/tools/include/xenctrl.h
+++ b/tools/include/xenctrl.h
@@ -2629,6 +2629,9 @@ int xc_livepatch_replace(xc_interface *xch, char *name, uint32_t timeout, uint32
 int xc_domain_cacheflush(xc_interface *xch, uint32_t domid,
                          xen_pfn_t start_pfn, xen_pfn_t nr_pfns);
 
+int xc_dt_overlay(xc_interface *xch, void *overlay_fdt, int overlay_fdt_size,
+                  uint8_t overlay_op);
+
 /* Compat shims */
 #include "xenctrl_compat.h"
 
diff --git a/tools/libs/ctrl/Makefile b/tools/libs/ctrl/Makefile
index ef7362327f..848a8737c7 100644
--- a/tools/libs/ctrl/Makefile
+++ b/tools/libs/ctrl/Makefile
@@ -3,6 +3,7 @@ include $(XEN_ROOT)/tools/Rules.mk
 
 SRCS-y       += xc_altp2m.c
 SRCS-y       += xc_cpupool.c
+SRCS-y       += xc_overlay.c
 SRCS-y       += xc_domain.c
 SRCS-y       += xc_evtchn.c
 SRCS-y       += xc_gnttab.c
diff --git a/tools/libs/ctrl/xc_overlay.c b/tools/libs/ctrl/xc_overlay.c
new file mode 100644
index 0000000000..8fe780d75a
--- /dev/null
+++ b/tools/libs/ctrl/xc_overlay.c
@@ -0,0 +1,51 @@
+/*
+ *
+ * Overlay control functions.
+ * Copyright (C) 2021 Xilinx Inc.
+ * Author Vikram Garhwal <fnu.vikram@xilinx.com>
+ *
+ * This library is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License as published by the Free Software Foundation;
+ * version 2.1 of the License.
+ *
+ * This library is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public
+ * License along with this library; If not, see <http://www.gnu.org/licenses/>.
+ */
+
+#include "xc_bitops.h"
+#include "xc_private.h"
+#include <xen/hvm/hvm_op.h>
+#include <libfdt.h>
+
+int xc_dt_overlay(xc_interface *xch, void *overlay_fdt, int overlay_fdt_size,
+                  uint8_t overlay_op)
+{
+    int err;
+    DECLARE_SYSCTL;
+
+    DECLARE_HYPERCALL_BOUNCE(overlay_fdt, overlay_fdt_size,
+                        XC_HYPERCALL_BUFFER_BOUNCE_IN);
+
+    if ( (err = xc_hypercall_bounce_pre(xch, overlay_fdt)) )
+        goto err;
+
+    sysctl.cmd = XEN_SYSCTL_dt_overlay;
+    sysctl.u.dt_overlay.overlay_op = overlay_op;
+    sysctl.u.dt_overlay.overlay_fdt_size = overlay_fdt_size;
+
+    set_xen_guest_handle(sysctl.u.dt_overlay.overlay_fdt, overlay_fdt);
+
+    if ( (err = do_sysctl(xch, &sysctl)) != 0 )
+        PERROR("%s failed\n", __func__);
+
+err:
+    xc_hypercall_bounce_post(xch, overlay_fdt);
+
+    return err;
+}
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 19:47:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 19:47:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287465.487525 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfoA-0006hw-DZ; Tue, 08 Mar 2022 19:47:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287465.487525; Tue, 08 Mar 2022 19:47:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfoA-0006hd-8G; Tue, 08 Mar 2022 19:47:46 +0000
Received: by outflank-mailman (input) for mailman id 287465;
 Tue, 08 Mar 2022 19:47:45 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RGf4=TT=xilinx.com=fnuv@srs-se1.protection.inumbo.net>)
 id 1nRfo8-0004Df-Tb
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 19:47:45 +0000
Received: from NAM10-MW2-obe.outbound.protection.outlook.com
 (mail-mw2nam10on20613.outbound.protection.outlook.com
 [2a01:111:f400:7e89::613])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 9db42aac-9f18-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 20:47:44 +0100 (CET)
Received: from DS7PR06CA0052.namprd06.prod.outlook.com (2603:10b6:8:54::30) by
 DM6PR02MB5868.namprd02.prod.outlook.com (2603:10b6:5:150::18) with
 Microsoft
 SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5038.17; Tue, 8 Mar 2022 19:47:39 +0000
Received: from DM3NAM02FT023.eop-nam02.prod.protection.outlook.com
 (2603:10b6:8:54:cafe::83) by DS7PR06CA0052.outlook.office365.com
 (2603:10b6:8:54::30) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Tue, 8 Mar 2022 19:47:39 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (149.199.62.198) by
 DM3NAM02FT023.mail.protection.outlook.com (10.13.5.127) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5038.14 via Frontend Transport; Tue, 8 Mar 2022 19:47:39 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 8 Mar 2022 11:47:20 -0800
Received: from smtp.xilinx.com (172.19.127.95) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 8 Mar 2022 11:47:20 -0800
Received: from [172.19.2.115] (port=58782 helo=xsjfnuv50.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <fnu.vikram@xilinx.com>)
 id 1nRfnk-000Cws-DA; Tue, 08 Mar 2022 11:47:20 -0800
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9db42aac-9f18-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ckjGEXAKtYf2+ownQ1TlKXrAbMXYFIFMLtaBVqmflU0FaELV47fqPSz4+STLwDge0ub+PpsbfdcLGESMzd2Z2CLAJrdFDx6YNn2vhM3+W5n3FT+Illb7D0unQwxShSv/hnRu+IBc47ZfeMkF4bo5XK/a0a4IhAIXJK1psyROFuqVIiwAVjbQstN/zHiJmCXrG1ja+o+YkNw5KLZCd81O4e8cphv6mjTw2jV25iM1+oxV1tlQ2GkfWvW+IKUnpwWsJnxxFZUs2AxN3nf/t1awa8jo8q8nwEpH023yYxA6Uq0561TLRBMC4lobP29E3PI5qc/wGmA1gk4DLOb6/emUiw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ktbSIbgnDy4Elv8mz8USxfaqVJQB12rlhbrwf9cRzXw=;
 b=iO9sRq5R4pjqDo6w0BLmKxJT/QHUDE0Vo//7Wkq1E7y9LPNOXaeYhHl745j4Fu6GK1OqP/o4FgzGu095AYBPSZkVRxqgaHy0IyIijzIsrs3gQ8HSCY68ZaFMBzAhSopSMU8WWJjvyDEz12zirswoA3qAAHelFdOFshQvMhW9JLcqUyw7D3s4YuTpdDaD1lplVDmwqVnC38AgYxTnAKFPzWq6bTPQ96UPbJRRtiTWWtH3GZU5XJStmauV4WbMyO0pdVJeEZBOBWSXJltidLfNu5cWui5wpY1WRlw6U2udr5CrrF/cd78rNVPSOXO0JX9vZzSQd77zfiEz4LTRa0vQ+A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.62.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=ktbSIbgnDy4Elv8mz8USxfaqVJQB12rlhbrwf9cRzXw=;
 b=I1xz+qdYktOMasdMfGSa63VypE49vBF7oimq0cETEcKTZJxZU2QRxbd3wwX1YSZC7xrBH0xMiX3WuLp7h4DeJMQOGsjoxZwK147BMDp2ih8V3wK8LaBk2CNqwDdaFN+Z2R58L5vRsdg3602wNI2rwHC0tg6tPdvdTC9LBBg7nnk=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.62.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.62.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.62.198; helo=xsj-pvapexch02.xlnx.xilinx.com;
From: Vikram Garhwal <fnu.vikram@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <julien@xen.org>, <bertrand.marquis@arm.com>,
	<volodymyr_babchuk@epam.com>, Vikram Garhwal <fnu.vikram@xilinx.com>
Subject: [XEN][RFC PATCH v3 05/14] xen/device-tree: Add _dt_find_node_by_path() to find nodes in device tree
Date: Tue, 8 Mar 2022 11:46:55 -0800
Message-ID: <20220308194704.14061-6-fnu.vikram@xilinx.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220308194704.14061-1-fnu.vikram@xilinx.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 7ff52281-8d79-4c1f-13d2-08da013c80a6
X-MS-TrafficTypeDiagnostic: DM6PR02MB5868:EE_
X-Microsoft-Antispam-PRVS:
	<DM6PR02MB58680FBA59B5EF703AAFFCC0BC099@DM6PR02MB5868.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.62.198;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:xsj-pvapexch02.xlnx.xilinx.com;PTR:unknown-62-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(336012)(6666004)(356005)(7636003)(26005)(8676002)(40460700003)(2616005)(1076003)(7696005)(5660300002)(508600001)(2906002)(426003)(36860700001)(8936002)(9786002)(70586007)(70206006)(82310400004)(186003)(316002)(47076005)(107886003)(54906003)(36756003)(4326008)(6916009)(83380400001)(102446001)(37363002);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 19:47:39.3442
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 7ff52281-8d79-4c1f-13d2-08da013c80a6
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.62.198];Helo=[xsj-pvapexch02.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DM3NAM02FT023.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR02MB5868

Add _dt_find_by_path() to find a matching node with path for a dt_device_node.

Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com>
---
 xen/common/device_tree.c      | 10 ++++++++--
 xen/include/xen/device_tree.h |  9 +++++++++
 2 files changed, 17 insertions(+), 2 deletions(-)

diff --git a/xen/common/device_tree.c b/xen/common/device_tree.c
index f43d66a501..2e334f949e 100644
--- a/xen/common/device_tree.c
+++ b/xen/common/device_tree.c
@@ -358,17 +358,23 @@ struct dt_device_node *dt_find_node_by_type(struct dt_device_node *from,
     return np;
 }
 
-struct dt_device_node *dt_find_node_by_path(const char *path)
+struct dt_device_node *_dt_find_node_by_path(struct dt_device_node *dt,
+                                             const char *path)
 {
     struct dt_device_node *np;
 
-    dt_for_each_device_node(dt_host, np)
+    dt_for_each_device_node(dt, np)
         if ( np->full_name && (dt_node_cmp(np->full_name, path) == 0) )
             break;
 
     return np;
 }
 
+struct dt_device_node *dt_find_node_by_path(const char *path)
+{
+    return _dt_find_node_by_path(dt_host, path);
+}
+
 int dt_find_node_by_gpath(XEN_GUEST_HANDLE(char) u_path, uint32_t u_plen,
                           struct dt_device_node **node)
 {
diff --git a/xen/include/xen/device_tree.h b/xen/include/xen/device_tree.h
index 06d7866c10..9da32a851e 100644
--- a/xen/include/xen/device_tree.h
+++ b/xen/include/xen/device_tree.h
@@ -525,6 +525,15 @@ struct dt_device_node *dt_find_node_by_alias(const char *alias);
  */
 struct dt_device_node *dt_find_node_by_path(const char *path);
 
+/**
+ * _dt_find_node_by_path - Find a node matching a full DT path
+ * @dt_node: The device tree to search
+ * @path: The full path to match
+ *
+ * Returns a node pointer.
+ */
+struct dt_device_node *_dt_find_node_by_path(struct dt_device_node *dt,
+                                             const char *path);
 
 /**
  * dt_find_node_by_gpath - Same as dt_find_node_by_path but retrieve the
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 19:47:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 19:47:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287466.487530 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfoA-0006mF-Tr; Tue, 08 Mar 2022 19:47:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287466.487530; Tue, 08 Mar 2022 19:47:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfoA-0006lx-M0; Tue, 08 Mar 2022 19:47:46 +0000
Received: by outflank-mailman (input) for mailman id 287466;
 Tue, 08 Mar 2022 19:47:45 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RGf4=TT=xilinx.com=fnuv@srs-se1.protection.inumbo.net>)
 id 1nRfo9-0004Om-9D
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 19:47:45 +0000
Received: from NAM12-DM6-obe.outbound.protection.outlook.com
 (mail-dm6nam12on2060d.outbound.protection.outlook.com
 [2a01:111:f400:fe59::60d])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 9e3e1468-9f18-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 20:47:44 +0100 (CET)
Received: from DS7PR06CA0029.namprd06.prod.outlook.com (2603:10b6:8:54::29) by
 SN6PR02MB4222.namprd02.prod.outlook.com (2603:10b6:805:35::22) with
 Microsoft
 SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5038.25; Tue, 8 Mar 2022 19:47:40 +0000
Received: from DM3NAM02FT023.eop-nam02.prod.protection.outlook.com
 (2603:10b6:8:54:cafe::82) by DS7PR06CA0029.outlook.office365.com
 (2603:10b6:8:54::29) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Tue, 8 Mar 2022 19:47:40 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (149.199.62.198) by
 DM3NAM02FT023.mail.protection.outlook.com (10.13.5.127) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5038.14 via Frontend Transport; Tue, 8 Mar 2022 19:47:40 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 8 Mar 2022 11:47:23 -0800
Received: from smtp.xilinx.com (172.19.127.95) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 8 Mar 2022 11:47:23 -0800
Received: from [172.19.2.115] (port=58782 helo=xsjfnuv50.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <fnu.vikram@xilinx.com>)
 id 1nRfnn-000Cws-52; Tue, 08 Mar 2022 11:47:23 -0800
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9e3e1468-9f18-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ldUdEaGswBbDtujp2DwHiW9MsZxSMSw9dv8eJW3h+o/vdVRpOUVzRHcljLXEpXVYo6cNag64sS/DaraIMRk1eFBVq1wbau1vzT737ELklqoJITzXiXsmgYf17ZVTL5HcqLAzq+btsPz2+WgaQPpiUPUgHTfK5qqgBSjMrn2ddYixa3rj3ied+P2fbzP0jvaQJ6jQsnGMSG2L/qOMldYFRdx4OhqiE3NejHCm48T/ed9da1kHMEFb/TCzoFcamm1w2GbaNztxRwEGnXZBN4CW7vr9eNbGTsJppqPwX+eNoFdSviII7T3rK5YOZH+V1NVa2GcKf2/eEW+k4p+8qF1ZfA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=2hiYAAnRJSQ97HoN+W3p3cdTXxnyKZvARJ1IXwEqMPM=;
 b=bQd8aM+ebjaAE8OXf+SMczAKEo0tzaLLPAeSu7J5PoEMaHnKc9eecJphouJiBkZ8fWsUVwdZj7RDzg+cS0UkLGinoaUZctx+GNR6LoxiY58OKJzqSI7vl2uYxC1cVEs2NAW9xC0e8EfcQR4DGzMWFt2PdTULhEnDLSP/en6L6pHyG/x6liFD7rntuJAz3sRjYBtwBcuMT2haHHFGNdhCLY4HOGEfAKVHeKK15+/5xhZORT6ILvi1E/PzsZDcwPH04uMXhcWJlsMhkxYv6eZgkzs8W6wwJq1RxpRjvLNe7FU1MakzvJI+Q2trYNctu2/0b40HEaIP3saVpmxDLdQG5w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.62.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=2hiYAAnRJSQ97HoN+W3p3cdTXxnyKZvARJ1IXwEqMPM=;
 b=cw/3WSoAJl73LKZPmd/Gmv/mB0ewwY6/7iZ1Pm8qlV8getsWibNYVVA3v5+K23WO3t5u9Q13uAoDqafHJiWs1muqn+bIerrJEaykrrWyDmfMuJy+wOKsmMVVvE6q334cKWJULvhY8HmEMA/k/kt7qjbytFoTav/mnr+36v+5s0w=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.62.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.62.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.62.198; helo=xsj-pvapexch02.xlnx.xilinx.com;
From: Vikram Garhwal <fnu.vikram@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <julien@xen.org>, <bertrand.marquis@arm.com>,
	<volodymyr_babchuk@epam.com>, Vikram Garhwal <fnu.vikram@xilinx.com>, Jan
 Beulich <jbeulich@suse.com>, Paul Durrant <paul@xen.org>
Subject: [XEN][RFC PATCH v3 09/14] xen/iommu: Introduce iommu_remove_dt_device()
Date: Tue, 8 Mar 2022 11:46:59 -0800
Message-ID: <20220308194704.14061-10-fnu.vikram@xilinx.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220308194704.14061-1-fnu.vikram@xilinx.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 9124e229-8348-42cf-476b-08da013c811d
X-MS-TrafficTypeDiagnostic: SN6PR02MB4222:EE_
X-Microsoft-Antispam-PRVS:
	<SN6PR02MB42226E06C7DB016BD7704092BC099@SN6PR02MB4222.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.62.198;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:xsj-pvapexch02.xlnx.xilinx.com;PTR:unknown-62-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(508600001)(9786002)(5660300002)(54906003)(316002)(426003)(336012)(7636003)(83380400001)(8936002)(7696005)(6666004)(82310400004)(8676002)(70586007)(70206006)(4326008)(356005)(2616005)(6916009)(1076003)(40460700003)(26005)(47076005)(36756003)(2906002)(186003)(36860700001)(102446001);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 19:47:40.1410
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 9124e229-8348-42cf-476b-08da013c811d
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.62.198];Helo=[xsj-pvapexch02.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DM3NAM02FT023.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR02MB4222

Remove master device from the IOMMU.

Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com>
---
 xen/drivers/passthrough/device_tree.c | 38 +++++++++++++++++++++++++++
 xen/include/xen/iommu.h               |  2 ++
 2 files changed, 40 insertions(+)

diff --git a/xen/drivers/passthrough/device_tree.c b/xen/drivers/passthrough/device_tree.c
index 776809a8f2..5cd0b20c77 100644
--- a/xen/drivers/passthrough/device_tree.c
+++ b/xen/drivers/passthrough/device_tree.c
@@ -125,6 +125,44 @@ int iommu_release_dt_devices(struct domain *d)
     return 0;
 }
 
+int iommu_remove_dt_device(struct dt_device_node *np)
+{
+    const struct iommu_ops *ops = iommu_get_ops();
+    struct device *dev = dt_to_dev(np);
+    int rc;
+
+    if ( !ops )
+        return -EOPNOTSUPP;
+
+    spin_lock(&dtdevs_lock);
+
+    if ( iommu_dt_device_is_assigned_lock(np) ) {
+        rc = -EBUSY;
+        goto fail;
+    }
+
+    /*
+     * The driver which supports generic IOMMU DT bindings must have
+     * these callback implemented.
+     */
+    if ( !ops->remove_device ) {
+        rc = -EOPNOTSUPP;
+        goto fail;
+    }
+
+    /*
+     * Remove master device from the IOMMU if latter is present and available.
+     */
+    rc = ops->remove_device(0, dev);
+
+    if ( rc == 0 )
+        iommu_fwspec_free(dev);
+
+fail:
+    spin_unlock(&dtdevs_lock);
+    return rc;
+}
+
 int iommu_add_dt_device(struct dt_device_node *np)
 {
     const struct iommu_ops *ops = iommu_get_ops();
diff --git a/xen/include/xen/iommu.h b/xen/include/xen/iommu.h
index b18e7760a2..64871e5cb8 100644
--- a/xen/include/xen/iommu.h
+++ b/xen/include/xen/iommu.h
@@ -215,6 +215,8 @@ int iommu_release_dt_devices(struct domain *d);
  */
 int iommu_add_dt_device(struct dt_device_node *np);
 
+int iommu_remove_dt_device(struct dt_device_node *np);
+
 int iommu_do_dt_domctl(struct xen_domctl *, struct domain *,
                        XEN_GUEST_HANDLE_PARAM(xen_domctl_t));
 
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 19:47:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 19:47:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287467.487536 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfoB-0006sR-EG; Tue, 08 Mar 2022 19:47:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287467.487536; Tue, 08 Mar 2022 19:47:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfoA-0006op-Vp; Tue, 08 Mar 2022 19:47:46 +0000
Received: by outflank-mailman (input) for mailman id 287467;
 Tue, 08 Mar 2022 19:47:46 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RGf4=TT=xilinx.com=fnuv@srs-se1.protection.inumbo.net>)
 id 1nRfo9-0004Df-Td
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 19:47:46 +0000
Received: from NAM10-MW2-obe.outbound.protection.outlook.com
 (mail-mw2nam10on20624.outbound.protection.outlook.com
 [2a01:111:f400:7e89::624])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 9d6bb113-9f18-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 20:47:43 +0100 (CET)
Received: from DS7PR06CA0032.namprd06.prod.outlook.com (2603:10b6:8:54::17) by
 DM5PR02MB3896.namprd02.prod.outlook.com (2603:10b6:4:b7::13) with
 Microsoft
 SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5038.19; Tue, 8 Mar 2022 19:47:39 +0000
Received: from DM3NAM02FT023.eop-nam02.prod.protection.outlook.com
 (2603:10b6:8:54:cafe::64) by DS7PR06CA0032.outlook.office365.com
 (2603:10b6:8:54::17) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Tue, 8 Mar 2022 19:47:39 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (149.199.62.198) by
 DM3NAM02FT023.mail.protection.outlook.com (10.13.5.127) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5038.14 via Frontend Transport; Tue, 8 Mar 2022 19:47:38 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 8 Mar 2022 11:47:18 -0800
Received: from smtp.xilinx.com (172.19.127.95) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 8 Mar 2022 11:47:13 -0800
Received: from [172.19.2.115] (port=58782 helo=xsjfnuv50.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <fnu.vikram@xilinx.com>)
 id 1nRfnd-000Cws-Eq; Tue, 08 Mar 2022 11:47:13 -0800
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9d6bb113-9f18-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ZYtKFWu1scH24pEV6+3pn2Hh5fjHeU+xk2aIt0gL24+HQnSTok66G/FIBZvSeUl+sREj+g/0xnG9ZPCpDNyAqVg7imSiGmcj9/8b2yW29YCkY6QMon92nsH99BE5YQjdq6DWrcr/C/fBqP3aZG+SCe6KJNPCX1dcEq8ISlwuUTAuFp4VQieSyXIuQ7pD2HFHkh2f6KtXmZ9eK1VARTPl2w9CiExqe59Ki48ZC6hXR5b5RcicMyBBE3qIQlJymZXdM+vw4EvD4xZji6bSqSEDQ99E+9ur74BeQGHsl3AJ6NSLPOGzcsNPD/jE10szSTAINKrK3EMfrDN0w2C6eZwffw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=BGOLVwYIhgLxJ0FfO3ayOZRIIs0BtuO6sjO2GpK4r3o=;
 b=myb3fS3ippQYdiWr5UhtR2sWeP6gVPADl0Dzd7ibwEIJfWDEYhNg0FAeD/muNlF6iCoN9GJ6238FAHvA+Ef8YEfeeX5X6frvM/Yjov5zZHNtkhFB99GuIBfXnzR92gGHCDjIYWIoQH78J5/qiein2dliaaudaOoZLLl76OCTEIQEkGwtWj3SD54KS4/r+m2fXZ2h35fV+mzmXfkJ2KtHuMxmXBnBQ+b4rMwq/lEmFrq8X2PgKiF6vO/R/t/mv9cWncOKFHkx4xqKKxmC2Vd6nGrxNVBhVhdwQH77F4xjhmFmecIJZXat26mNkptyRbR19n5V0mEoAGRjv3/4L2ErUw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.62.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=BGOLVwYIhgLxJ0FfO3ayOZRIIs0BtuO6sjO2GpK4r3o=;
 b=lBnJKRZ4+KligpCfMabgh2jHuqO7BCVfA/IiQ3VfhqMd7zmuaAYoT/ZI9u8KrfKVn/KA60VrfX/r5TNUH+Q/c+vgQSncXThD2jRIOOzrzBQIUaOfFrw40GtxNNlwN/VTuCJVzDg45NFXv7DG1+ZmF5aRAlcL3Qyhn1GvigP/crg=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.62.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.62.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.62.198; helo=xsj-pvapexch02.xlnx.xilinx.com;
From: Vikram Garhwal <fnu.vikram@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <julien@xen.org>, <bertrand.marquis@arm.com>,
	<volodymyr_babchuk@epam.com>, Vikram Garhwal <fnu.vikram@xilinx.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [XEN][RFC PATCH v3 01/14] xen/arm/device: Remove __init from function type
Date: Tue, 8 Mar 2022 11:46:51 -0800
Message-ID: <20220308194704.14061-2-fnu.vikram@xilinx.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220308194704.14061-1-fnu.vikram@xilinx.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ef5bf915-62d3-47c2-de44-08da013c804d
X-MS-TrafficTypeDiagnostic: DM5PR02MB3896:EE_
X-Microsoft-Antispam-PRVS:
	<DM5PR02MB38965DF44C7FC9809E492E24BC099@DM5PR02MB3896.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.62.198;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:xsj-pvapexch02.xlnx.xilinx.com;PTR:unknown-62-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(26005)(186003)(83380400001)(36756003)(82310400004)(2906002)(2616005)(356005)(7636003)(336012)(426003)(40460700003)(47076005)(36860700001)(1076003)(316002)(8676002)(4326008)(6916009)(54906003)(6666004)(70206006)(70586007)(30864003)(508600001)(7696005)(8936002)(9786002)(5660300002)(102446001);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 19:47:38.7661
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: ef5bf915-62d3-47c2-de44-08da013c804d
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.62.198];Helo=[xsj-pvapexch02.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DM3NAM02FT023.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR02MB3896

Change function type of following function to access during runtime:
    1. map_irq_to_domain()
    2. handle_device_interrupt()
    3. map_range_to_domain()
    4. unflatten_dt_node()
    5. unflatten_device_tree()

Move map_irq_to_domain(), handle_device_interrupt() and map_range_to_domain() to
device.c.

These changes are done to support the dynamic programming of a nodes where an
overlay node will be added to fdt and unflattened node will be added to dt_host.
Furthermore, IRQ and mmio mapping will be done for the added node.

Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com>
---
 xen/arch/arm/device.c            | 136 +++++++++++++++++++++++++++++
 xen/arch/arm/domain_build.c      | 142 -------------------------------
 xen/arch/arm/include/asm/setup.h |   3 +
 xen/common/device_tree.c         |  20 ++---
 xen/include/xen/device_tree.h    |   5 ++
 5 files changed, 154 insertions(+), 152 deletions(-)

diff --git a/xen/arch/arm/device.c b/xen/arch/arm/device.c
index 70cd6c1a19..0dfd33b33e 100644
--- a/xen/arch/arm/device.c
+++ b/xen/arch/arm/device.c
@@ -21,6 +21,9 @@
 #include <xen/errno.h>
 #include <xen/init.h>
 #include <xen/lib.h>
+#include <xen/iocap.h>
+#include <asm/domain_build.h>
+#include <asm/setup.h>
 
 extern const struct device_desc _sdevice[], _edevice[];
 extern const struct acpi_device_desc _asdevice[], _aedevice[];
@@ -84,6 +87,139 @@ enum device_class device_get_class(const struct dt_device_node *dev)
     return DEVICE_UNKNOWN;
 }
 
+int map_irq_to_domain(struct domain *d, unsigned int irq,
+                      bool need_mapping, const char *devname)
+{
+    int res;
+
+    res = irq_permit_access(d, irq);
+    if ( res )
+    {
+        printk(XENLOG_ERR "Unable to permit to dom%u access to IRQ %u\n",
+               d->domain_id, irq);
+        return res;
+    }
+
+    if ( need_mapping )
+    {
+        /*
+         * Checking the return of vgic_reserve_virq is not
+         * necessary. It should not fail except when we try to map
+         * the IRQ twice. This can legitimately happen if the IRQ is shared
+         */
+        vgic_reserve_virq(d, irq);
+
+        res = route_irq_to_guest(d, irq, irq, devname);
+        if ( res < 0 )
+        {
+            printk(XENLOG_ERR "Unable to map IRQ%"PRId32" to dom%d\n",
+                   irq, d->domain_id);
+            return res;
+        }
+    }
+
+    dt_dprintk("  - IRQ: %u\n", irq);
+    return 0;
+}
+
+int map_range_to_domain(const struct dt_device_node *dev,
+                        u64 addr, u64 len, void *data)
+{
+    struct map_range_data *mr_data = data;
+    struct domain *d = mr_data->d;
+    int res;
+
+    res = iomem_permit_access(d, paddr_to_pfn(addr),
+            paddr_to_pfn(PAGE_ALIGN(addr + len - 1)));
+    if ( res )
+    {
+        printk(XENLOG_ERR "Unable to permit to dom%d access to"
+                " 0x%"PRIx64" - 0x%"PRIx64"\n",
+                d->domain_id,
+                addr & PAGE_MASK, PAGE_ALIGN(addr + len) - 1);
+        return res;
+    }
+
+    if ( !mr_data->skip_mapping )
+    {
+        res = map_regions_p2mt(d,
+                               gaddr_to_gfn(addr),
+                               PFN_UP(len),
+                               maddr_to_mfn(addr),
+                               mr_data->p2mt);
+
+        if ( res < 0 )
+        {
+            printk(XENLOG_ERR "Unable to map 0x%"PRIx64
+                   " - 0x%"PRIx64" in domain %d\n",
+                   addr & PAGE_MASK, PAGE_ALIGN(addr + len) - 1,
+                   d->domain_id);
+            return res;
+        }
+    }
+
+    dt_dprintk("  - MMIO: %010"PRIx64" - %010"PRIx64" P2MType=%x\n",
+               addr, addr + len, mr_data->p2mt);
+
+    return 0;
+}
+
+/*
+ * handle_device_interrupts retrieves the interrupts configuration from
+ * a device tree node and maps those interrupts to the target domain.
+ *
+ * Returns:
+ *   < 0 error
+ *   0   success
+ */
+int handle_device_interrupts(struct domain *d,
+                             struct dt_device_node *dev,
+                             bool need_mapping)
+{
+    unsigned int i, nirq;
+    int res;
+    struct dt_raw_irq rirq;
+
+    nirq = dt_number_of_irq(dev);
+
+    /* Give permission and map IRQs */
+    for ( i = 0; i < nirq; i++ )
+    {
+        res = dt_device_get_raw_irq(dev, i, &rirq);
+        if ( res )
+        {
+            printk(XENLOG_ERR "Unable to retrieve irq %u for %s\n",
+                   i, dt_node_full_name(dev));
+            return res;
+        }
+
+        /*
+         * Don't map IRQ that have no physical meaning
+         * ie: IRQ whose controller is not the GIC
+         */
+        if ( rirq.controller != dt_interrupt_controller )
+        {
+            dt_dprintk("irq %u not connected to primary controller. Connected to %s\n",
+                      i, dt_node_full_name(rirq.controller));
+            continue;
+        }
+
+        res = platform_get_irq(dev, i);
+        if ( res < 0 )
+        {
+            printk(XENLOG_ERR "Unable to get irq %u for %s\n",
+                   i, dt_node_full_name(dev));
+            return res;
+        }
+
+        res = map_irq_to_domain(d, res, need_mapping, dt_node_name(dev));
+        if ( res )
+            return res;
+    }
+
+    return 0;
+}
+
 /*
  * Local variables:
  * mode: C
diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index 8be01678de..b06770a2af 100644
--- a/xen/arch/arm/domain_build.c
+++ b/xen/arch/arm/domain_build.c
@@ -1794,41 +1794,6 @@ int __init make_chosen_node(const struct kernel_info *kinfo)
     return res;
 }
 
-int __init map_irq_to_domain(struct domain *d, unsigned int irq,
-                             bool need_mapping, const char *devname)
-{
-    int res;
-
-    res = irq_permit_access(d, irq);
-    if ( res )
-    {
-        printk(XENLOG_ERR "Unable to permit to dom%u access to IRQ %u\n",
-               d->domain_id, irq);
-        return res;
-    }
-
-    if ( need_mapping )
-    {
-        /*
-         * Checking the return of vgic_reserve_virq is not
-         * necessary. It should not fail except when we try to map
-         * the IRQ twice. This can legitimately happen if the IRQ is shared
-         */
-        vgic_reserve_virq(d, irq);
-
-        res = route_irq_to_guest(d, irq, irq, devname);
-        if ( res < 0 )
-        {
-            printk(XENLOG_ERR "Unable to map IRQ%"PRId32" to dom%d\n",
-                   irq, d->domain_id);
-            return res;
-        }
-    }
-
-    dt_dprintk("  - IRQ: %u\n", irq);
-    return 0;
-}
-
 static int __init map_dt_irq_to_domain(const struct dt_device_node *dev,
                                        const struct dt_irq *dt_irq,
                                        void *data)
@@ -1860,57 +1825,6 @@ static int __init map_dt_irq_to_domain(const struct dt_device_node *dev,
     return 0;
 }
 
-int __init map_range_to_domain(const struct dt_device_node *dev,
-                               u64 addr, u64 len, void *data)
-{
-    struct map_range_data *mr_data = data;
-    struct domain *d = mr_data->d;
-    int res;
-
-    /*
-     * reserved-memory regions are RAM carved out for a special purpose.
-     * They are not MMIO and therefore a domain should not be able to
-     * manage them via the IOMEM interface.
-     */
-    if ( strncasecmp(dt_node_full_name(dev), "/reserved-memory/",
-                     strlen("/reserved-memory/")) != 0 )
-    {
-        res = iomem_permit_access(d, paddr_to_pfn(addr),
-                paddr_to_pfn(PAGE_ALIGN(addr + len - 1)));
-        if ( res )
-        {
-            printk(XENLOG_ERR "Unable to permit to dom%d access to"
-                    " 0x%"PRIx64" - 0x%"PRIx64"\n",
-                    d->domain_id,
-                    addr & PAGE_MASK, PAGE_ALIGN(addr + len) - 1);
-            return res;
-        }
-    }
-
-    if ( !mr_data->skip_mapping )
-    {
-        res = map_regions_p2mt(d,
-                               gaddr_to_gfn(addr),
-                               PFN_UP(len),
-                               maddr_to_mfn(addr),
-                               mr_data->p2mt);
-
-        if ( res < 0 )
-        {
-            printk(XENLOG_ERR "Unable to map 0x%"PRIx64
-                   " - 0x%"PRIx64" in domain %d\n",
-                   addr & PAGE_MASK, PAGE_ALIGN(addr + len) - 1,
-                   d->domain_id);
-            return res;
-        }
-    }
-
-    dt_dprintk("  - MMIO: %010"PRIx64" - %010"PRIx64" P2MType=%x\n",
-               addr, addr + len, mr_data->p2mt);
-
-    return 0;
-}
-
 /*
  * For a node which describes a discoverable bus (such as a PCI bus)
  * then we may need to perform additional mappings in order to make
@@ -1938,62 +1852,6 @@ static int __init map_device_children(const struct dt_device_node *dev,
     return 0;
 }
 
-/*
- * handle_device_interrupts retrieves the interrupts configuration from
- * a device tree node and maps those interrupts to the target domain.
- *
- * Returns:
- *   < 0 error
- *   0   success
- */
-static int __init handle_device_interrupts(struct domain *d,
-                                           struct dt_device_node *dev,
-                                           bool need_mapping)
-{
-    unsigned int i, nirq;
-    int res;
-    struct dt_raw_irq rirq;
-
-    nirq = dt_number_of_irq(dev);
-
-    /* Give permission and map IRQs */
-    for ( i = 0; i < nirq; i++ )
-    {
-        res = dt_device_get_raw_irq(dev, i, &rirq);
-        if ( res )
-        {
-            printk(XENLOG_ERR "Unable to retrieve irq %u for %s\n",
-                   i, dt_node_full_name(dev));
-            return res;
-        }
-
-        /*
-         * Don't map IRQ that have no physical meaning
-         * ie: IRQ whose controller is not the GIC
-         */
-        if ( rirq.controller != dt_interrupt_controller )
-        {
-            dt_dprintk("irq %u not connected to primary controller. Connected to %s\n",
-                      i, dt_node_full_name(rirq.controller));
-            continue;
-        }
-
-        res = platform_get_irq(dev, i);
-        if ( res < 0 )
-        {
-            printk(XENLOG_ERR "Unable to get irq %u for %s\n",
-                   i, dt_node_full_name(dev));
-            return res;
-        }
-
-        res = map_irq_to_domain(d, res, need_mapping, dt_node_name(dev));
-        if ( res )
-            return res;
-    }
-
-    return 0;
-}
-
 /*
  * For a given device node:
  *  - Give permission to the guest to manage IRQ and MMIO range
diff --git a/xen/arch/arm/include/asm/setup.h b/xen/arch/arm/include/asm/setup.h
index 7a1e1d6798..8a26f1845c 100644
--- a/xen/arch/arm/include/asm/setup.h
+++ b/xen/arch/arm/include/asm/setup.h
@@ -134,6 +134,9 @@ void device_tree_get_reg(const __be32 **cell, u32 address_cells,
 u32 device_tree_get_u32(const void *fdt, int node,
                         const char *prop_name, u32 dflt);
 
+int handle_device_interrupts(struct domain *d, struct dt_device_node *dev,
+                             bool need_mapping);
+
 int map_range_to_domain(const struct dt_device_node *dev,
                         u64 addr, u64 len, void *data);
 
diff --git a/xen/common/device_tree.c b/xen/common/device_tree.c
index 4aae281e89..f43d66a501 100644
--- a/xen/common/device_tree.c
+++ b/xen/common/device_tree.c
@@ -1811,12 +1811,12 @@ int dt_count_phandle_with_args(const struct dt_device_node *np,
  * @allnextpp: pointer to ->allnext from last allocated device_node
  * @fpsize: Size of the node path up at the current depth.
  */
-static unsigned long __init unflatten_dt_node(const void *fdt,
-                                              unsigned long mem,
-                                              unsigned long *p,
-                                              struct dt_device_node *dad,
-                                              struct dt_device_node ***allnextpp,
-                                              unsigned long fpsize)
+static unsigned long unflatten_dt_node(const void *fdt,
+                                       unsigned long mem,
+                                       unsigned long *p,
+                                       struct dt_device_node *dad,
+                                       struct dt_device_node ***allnextpp,
+                                       unsigned long fpsize)
 {
     struct dt_device_node *np;
     struct dt_property *pp, **prev_pp = NULL;
@@ -2047,7 +2047,7 @@ static unsigned long __init unflatten_dt_node(const void *fdt,
 }
 
 /**
- * __unflatten_device_tree - create tree of device_nodes from flat blob
+ * unflatten_device_tree - create tree of device_nodes from flat blob
  *
  * unflattens a device-tree, creating the
  * tree of struct device_node. It also fills the "name" and "type"
@@ -2056,8 +2056,8 @@ static unsigned long __init unflatten_dt_node(const void *fdt,
  * @fdt: The fdt to expand
  * @mynodes: The device_node tree created by the call
  */
-static void __init __unflatten_device_tree(const void *fdt,
-                                           struct dt_device_node **mynodes)
+void unflatten_device_tree(const void *fdt,
+                           struct dt_device_node **mynodes)
 {
     unsigned long start, mem, size;
     struct dt_device_node **allnextp = mynodes;
@@ -2179,7 +2179,7 @@ dt_find_interrupt_controller(const struct dt_device_match *matches)
 
 void __init dt_unflatten_host_device_tree(void)
 {
-    __unflatten_device_tree(device_tree_flattened, &dt_host);
+    unflatten_device_tree(device_tree_flattened, &dt_host);
     dt_alias_scan();
 }
 
diff --git a/xen/include/xen/device_tree.h b/xen/include/xen/device_tree.h
index fd6cd00b43..06d7866c10 100644
--- a/xen/include/xen/device_tree.h
+++ b/xen/include/xen/device_tree.h
@@ -177,6 +177,11 @@ int device_tree_for_each_node(const void *fdt, int node,
  */
 void dt_unflatten_host_device_tree(void);
 
+/*
+ * unflatten any device tree.
+ */
+void unflatten_device_tree(const void *fdt, struct dt_device_node **mynodes);
+
 /**
  * IRQ translation callback
  * TODO: For the moment we assume that we only have ONE
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 19:47:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 19:47:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287468.487553 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfoD-0007OF-5O; Tue, 08 Mar 2022 19:47:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287468.487553; Tue, 08 Mar 2022 19:47:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfoC-0007NM-Lf; Tue, 08 Mar 2022 19:47:48 +0000
Received: by outflank-mailman (input) for mailman id 287468;
 Tue, 08 Mar 2022 19:47:47 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RGf4=TT=xilinx.com=fnuv@srs-se1.protection.inumbo.net>)
 id 1nRfoA-0004Df-Tl
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 19:47:47 +0000
Received: from NAM11-CO1-obe.outbound.protection.outlook.com
 (mail-co1nam11on20613.outbound.protection.outlook.com
 [2a01:111:f400:7eab::613])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 9dc8150a-9f18-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 20:47:44 +0100 (CET)
Received: from DS7PR06CA0038.namprd06.prod.outlook.com (2603:10b6:8:54::19) by
 BL3PR02MB8161.namprd02.prod.outlook.com (2603:10b6:208:35c::6) with
 Microsoft
 SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5038.15; Tue, 8 Mar 2022 19:47:39 +0000
Received: from DM3NAM02FT023.eop-nam02.prod.protection.outlook.com
 (2603:10b6:8:54:cafe::f5) by DS7PR06CA0038.outlook.office365.com
 (2603:10b6:8:54::19) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Tue, 8 Mar 2022 19:47:39 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (149.199.62.198) by
 DM3NAM02FT023.mail.protection.outlook.com (10.13.5.127) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5038.14 via Frontend Transport; Tue, 8 Mar 2022 19:47:39 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 8 Mar 2022 11:47:21 -0800
Received: from smtp.xilinx.com (172.19.127.95) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 8 Mar 2022 11:47:21 -0800
Received: from [172.19.2.115] (port=58782 helo=xsjfnuv50.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <fnu.vikram@xilinx.com>)
 id 1nRfnl-000Cws-Px; Tue, 08 Mar 2022 11:47:21 -0800
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9dc8150a-9f18-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=dZ/5wE7D9jBOwYwBEyQgN5cHRcTrRomQr0ye7YjnVC/Ed4oTfmSlNb2Wf4pkS5WW+IGw1D+qWY0DY4WBmVMC7v5ofnLCDD8dGvUpKRhu7z8P9UHuVm1929hI1PchcGes06yJh06+YekQTtlCHuDMOsk9V+JQwyEsS9ukDiOdZK/QOz/efCKgxCVVSZ07J2ySwx2mVkpgMOlGR3PTnnRjToKZdfPXH1NY9IQytQ96k53VkIYPO8J5TYvWZsrPhsDb/WLBnf6isxfL/WTQrGrTat0tCcSLcCbXgqC9YjS7lG8pB9lHHMekvEUvqPn3f5pk+vLYjwA8a7gUbsG3X7TIqg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=c4E5KeTGHuyUkTzR8/a8yq2xjltDv0G0kEA7U7nbO7M=;
 b=bry9dVVFKrnyNLLm13blu/q7Pn6UMNdF8ACy6ZndOcHwgMmxNSaKK1S+7mhqTsww0sULTh3m7IceRlWPWlJsbuq8OuDN/bS8ueKi+dtoKMDCHEHJLFfnyVRK2shNiZNu0RepG9Dv5fxuQuSO4hoEXqtjq3fdEHSSAz6sA2bXsj1KU2SZ0Hc0NY7U7oglL8bC1vUsrfER5S2Yaeh8GlVfHzx2CheqV8Ao+ydN3AcXhKVnGGe5xvB+CjuAYo9C4azcepLHdrtRcUPEYyb3408MOrBucGNrsNluljKDlKnuClXM078a7rvHtVVHcs9XoJxuPb++SeG/AWQRM3xCx+3NNQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.62.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=c4E5KeTGHuyUkTzR8/a8yq2xjltDv0G0kEA7U7nbO7M=;
 b=d659+CeKBo0KqQL4JG/FwUOalGibM+BEQYq2w8vXyy/NOYthdTAnCCC0O3sODCb13yLpbDWOXZMV1ERs2FaeKTs7Kt+MpqJLhoqLtx4sJaBe840JOjSlOH7yO0CuckOdMGwt1X/Io7udXrHi21mUQim90u7zrPEnjkZoFBLWTPc=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.62.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.62.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.62.198; helo=xsj-pvapexch02.xlnx.xilinx.com;
From: Vikram Garhwal <fnu.vikram@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <julien@xen.org>, <bertrand.marquis@arm.com>,
	<volodymyr_babchuk@epam.com>, Vikram Garhwal <fnu.vikram@xilinx.com>
Subject: [XEN][RFC PATCH v3 07/14] xen/iommu: Move spin_lock from iommu_dt_device_is_assigned to caller
Date: Tue, 8 Mar 2022 11:46:57 -0800
Message-ID: <20220308194704.14061-8-fnu.vikram@xilinx.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220308194704.14061-1-fnu.vikram@xilinx.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 66a19008-cac4-4baf-c20c-08da013c80d5
X-MS-TrafficTypeDiagnostic: BL3PR02MB8161:EE_
X-Microsoft-Antispam-PRVS:
	<BL3PR02MB816194BE3154489DAC1E02C0BC099@BL3PR02MB8161.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.62.198;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:xsj-pvapexch02.xlnx.xilinx.com;PTR:unknown-62-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(40460700003)(36860700001)(356005)(7636003)(6916009)(70206006)(70586007)(4326008)(54906003)(316002)(2906002)(9786002)(8936002)(5660300002)(426003)(336012)(8676002)(107886003)(1076003)(186003)(26005)(47076005)(83380400001)(2616005)(508600001)(7696005)(6666004)(82310400004)(36756003)(102446001);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 19:47:39.6567
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 66a19008-cac4-4baf-c20c-08da013c80d5
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.62.198];Helo=[xsj-pvapexch02.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DM3NAM02FT023.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL3PR02MB8161

Rename iommu_dt_device_is_assigned() to iommu_dt_device_is_assigned_lock().

Moving spin_lock to caller was done to prevent the concurrent access to
iommu_dt_device_is_assigned while doing add/remove/assign/deassign.

Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com>
---
 xen/drivers/passthrough/device_tree.c | 11 +++++++----
 1 file changed, 7 insertions(+), 4 deletions(-)

diff --git a/xen/drivers/passthrough/device_tree.c b/xen/drivers/passthrough/device_tree.c
index 98f2aa0dad..b3b04f8e03 100644
--- a/xen/drivers/passthrough/device_tree.c
+++ b/xen/drivers/passthrough/device_tree.c
@@ -83,16 +83,14 @@ fail:
     return rc;
 }
 
-static bool_t iommu_dt_device_is_assigned(const struct dt_device_node *dev)
+static bool_t iommu_dt_device_is_assigned_lock(const struct dt_device_node *dev)
 {
     bool_t assigned = 0;
 
     if ( !dt_device_is_protected(dev) )
         return 0;
 
-    spin_lock(&dtdevs_lock);
     assigned = !list_empty(&dev->domain_list);
-    spin_unlock(&dtdevs_lock);
 
     return assigned;
 }
@@ -225,12 +223,17 @@ int iommu_do_dt_domctl(struct xen_domctl *domctl, struct domain *d,
 
         if ( domctl->cmd == XEN_DOMCTL_test_assign_device )
         {
-            if ( iommu_dt_device_is_assigned(dev) )
+            spin_lock(&dtdevs_lock);
+
+            if ( iommu_dt_device_is_assigned_lock(dev) )
             {
                 printk(XENLOG_G_ERR "%s already assigned.\n",
                        dt_node_full_name(dev));
                 ret = -EINVAL;
             }
+
+            spin_unlock(&dtdevs_lock);
+
             break;
         }
 
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 19:47:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 19:47:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287473.487568 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfoF-00082v-Cv; Tue, 08 Mar 2022 19:47:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287473.487568; Tue, 08 Mar 2022 19:47:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfoF-00081d-6O; Tue, 08 Mar 2022 19:47:51 +0000
Received: by outflank-mailman (input) for mailman id 287473;
 Tue, 08 Mar 2022 19:47:50 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RGf4=TT=xilinx.com=fnuv@srs-se1.protection.inumbo.net>)
 id 1nRfoD-0004Om-P4
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 19:47:50 +0000
Received: from NAM10-BN7-obe.outbound.protection.outlook.com
 (mail-bn7nam10on2062b.outbound.protection.outlook.com
 [2a01:111:f400:7e8a::62b])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a13ebabf-9f18-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 20:47:48 +0100 (CET)
Received: from DS7PR06CA0033.namprd06.prod.outlook.com (2603:10b6:8:54::15) by
 BY5PR02MB6452.namprd02.prod.outlook.com (2603:10b6:a03:1b6::20) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.17; Tue, 8 Mar
 2022 19:47:42 +0000
Received: from DM3NAM02FT023.eop-nam02.prod.protection.outlook.com
 (2603:10b6:8:54:cafe::ff) by DS7PR06CA0033.outlook.office365.com
 (2603:10b6:8:54::15) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Tue, 8 Mar 2022 19:47:42 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (149.199.62.198) by
 DM3NAM02FT023.mail.protection.outlook.com (10.13.5.127) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5038.14 via Frontend Transport; Tue, 8 Mar 2022 19:47:42 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 8 Mar 2022 11:47:24 -0800
Received: from smtp.xilinx.com (172.19.127.95) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 8 Mar 2022 11:47:24 -0800
Received: from [172.19.2.115] (port=58782 helo=xsjfnuv50.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <fnu.vikram@xilinx.com>)
 id 1nRfno-000Cws-CG; Tue, 08 Mar 2022 11:47:24 -0800
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a13ebabf-9f18-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=csH/2uVh0owjvzpQq0bEkynkriDNS5ewgniFxH+RClBE5IkVDZ0EXNM3QWQoL6LRBJqiCU5usL+qj4vAHwvPkOJez6zyHXT78N2Dp3G0QbDZOCvtWI1fZHm/SZHkvkMBV7nBC7qqN6nZQcf7ErZHlecAVefahez8vQo7p83l0N82oaUL6zZSamYRiTDtrAC1wqDF34ayXPahd0dX6h/4tRrStWgJ8DveBKEZ/AgLklx8eBN7AWjpdcrQcOSfUEo+BO+gfd188H6SyAmmKDFaPvdp6fh4xQnSwd8sNRflTLdBOtaFaaVdGKREIVZiHpnIBkCO+JXAZKW+W9yqWVRplA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=g1gi60PB1fCf6Gz/jhEFM/GsLELukVETFiTkGYpX/Lk=;
 b=YdhItRRo6THX2lyxNo1/1rac3NsU2bYJ5OxcUX9opjXHsFiKFL1CKieYhBn4KA1ViKG19+P+r2n4MQgbWRdXwrpKFtgQZfIOHq2EHE5hmHAhKJTX3PfeSO73MeseoPeBTjjxs06Y34GR3+qRMjG62lgtjV2K/zWZmBxMpGYafMJWD7HBRS/t/hxb9x8/baIVvchN75c93EsSuaVWW9Dy/fmcoIKTRFy8VlvOQnEv4DlcbKXtfF+HtBz3cx1bx4Z7sDejrA+b6UvOGlSk27fIcr7JpqO2OAtCDmxuNdcO/KgDIOe50HMxy2J1cjCbG1BsFkHp9b01rjLq+OnQuzrcCA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.62.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=g1gi60PB1fCf6Gz/jhEFM/GsLELukVETFiTkGYpX/Lk=;
 b=iYtVWejklPcrJTweZwKJjMK6fxo0i4pX5Ci0NQxZREIkTdnaqQkuAcUuROtm72cewmI3k7/f6mK1XnUCS5aNQfJnIMgw8TwZDAHUGHMedNss40BHw+Z1Z40U8OUck09BqX/o+rs0HIMMJY91Kg0rHVZN5SuLzhWM+gjPvvDUvfY=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.62.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.62.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.62.198; helo=xsj-pvapexch02.xlnx.xilinx.com;
From: Vikram Garhwal <fnu.vikram@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <julien@xen.org>, <bertrand.marquis@arm.com>,
	<volodymyr_babchuk@epam.com>, Vikram Garhwal <fnu.vikram@xilinx.com>, Andrew
 Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>, Wei Liu <wl@xen.org>
Subject: [XEN][RFC PATCH v3 11/14] xen/arm: Implement device tree node addition functionalities
Date: Tue, 8 Mar 2022 11:47:01 -0800
Message-ID: <20220308194704.14061-12-fnu.vikram@xilinx.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220308194704.14061-1-fnu.vikram@xilinx.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 6628726e-b0a2-4795-1fa2-08da013c825f
X-MS-TrafficTypeDiagnostic: BY5PR02MB6452:EE_
X-Microsoft-Antispam-PRVS:
	<BY5PR02MB64529BEF24DAE2BF6F3F358CBC099@BY5PR02MB6452.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.62.198;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:xsj-pvapexch02.xlnx.xilinx.com;PTR:unknown-62-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(336012)(6666004)(356005)(7636003)(26005)(8676002)(2616005)(1076003)(7696005)(5660300002)(508600001)(2906002)(426003)(36860700001)(8936002)(9786002)(70586007)(70206006)(82310400004)(186003)(316002)(47076005)(54906003)(36756003)(4326008)(6916009)(83380400001)(102446001)(403724002);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 19:47:42.2346
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 6628726e-b0a2-4795-1fa2-08da013c825f
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.62.198];Helo=[xsj-pvapexch02.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DM3NAM02FT023.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR02MB6452

Update sysctl XEN_SYSCTL_dt_overlay to enable support for dtbo nodes addition
using device tree overlay.

xl overlay add file.dtbo:
    Each time overlay nodes are added using .dtbo, a new fdt(memcpy of
    device_tree_flattened) is created and updated with overlay nodes. This
    updated fdt is further unflattened to a dt_host_new. Next, it checks if any
    of the overlay nodes already exists in the dt_host. If overlay nodes doesn't
    exist then find the overlay nodes in dt_host_new, find the overlay node's
    parent in dt_host and add the nodes as child under their parent in the
    dt_host. The node is attached as the last node under target parent.

    Finally, add IRQs, add device to IOMMUs, set permissions and map MMIO for the
    overlay node.

When a node is added using overlay, a new entry is allocated in the
overlay_track to keep the track of memory allocation due to addition of overlay
node. This is helpful for freeing the memory allocated when a device tree node
is removed.

Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com>
---
 xen/common/dt_overlay.c     | 324 ++++++++++++++++++++++++++++++++++++
 xen/include/public/sysctl.h |   1 +
 2 files changed, 325 insertions(+)

diff --git a/xen/common/dt_overlay.c b/xen/common/dt_overlay.c
index fcb31de495..01aed62d74 100644
--- a/xen/common/dt_overlay.c
+++ b/xen/common/dt_overlay.c
@@ -82,6 +82,64 @@ static int dt_overlay_remove_node(struct dt_device_node *device_node)
     return 0;
 }
 
+static int dt_overlay_add_node(struct dt_device_node *device_node,
+                  const char *parent_node_path)
+{
+    struct dt_device_node *parent_node;
+    struct dt_device_node *np;
+    struct dt_device_node *next_node;
+    struct dt_device_node *new_node;
+
+    parent_node = dt_find_node_by_path(parent_node_path);
+
+    new_node = device_node;
+
+    if ( new_node == NULL )
+        return -EINVAL;
+
+    if ( parent_node == NULL )
+    {
+        dt_dprintk("Node not found. Partial dtb will not be added");
+        return -EINVAL;
+    }
+
+    /*
+     * If node is found. We can attach the device_node as a child of the
+     * parent node.
+     */
+
+    /* If parent has no child. */
+    if ( parent_node->child == NULL )
+    {
+        next_node = parent_node->allnext;
+        new_node->parent = parent_node;
+        parent_node->allnext = new_node;
+        parent_node->child = new_node;
+        /* Now plug next_node at the end of device_node. */
+        new_node->allnext = next_node;
+    } else {
+        /* If parent has at least one child node. */
+
+        /*
+         *  Iterate to the last child node of parent.
+         */
+        for ( np = parent_node->child; np->sibling != NULL; np = np->sibling )
+        {
+        }
+
+        next_node = np->allnext;
+        new_node->parent = parent_node;
+        np->sibling = new_node;
+        np->allnext = new_node;
+        /* Now plug next_node at the end of device_node. */
+        new_node->sibling = next_node;
+        new_node->allnext = next_node;
+        np->sibling->sibling = NULL;
+    }
+
+    return 0;
+}
+
 /* Basic sanity check for the dtbo tool stack provided to Xen. */
 static int check_overlay_fdt(const void *overlay_fdt, uint32_t overlay_fdt_size)
 {
@@ -377,6 +435,267 @@ out:
     return rc;
 }
 
+/*
+ * Adds device tree nodes under target node.
+ * We use dt_host_new to unflatten the updated device_tree_flattened. This is
+ * done to avoid the removal of device_tree generation, iomem regions mapping to
+ * hardware domain done by handle_node().
+ */
+static long handle_add_overlay_nodes(void *overlay_fdt,
+                                     uint32_t overlay_fdt_size)
+{
+    int rc = 0;
+    struct dt_device_node *overlay_node;
+    char **nodes_full_path = NULL;
+    int **nodes_irq = NULL;
+    int *node_num_irq = NULL;
+    void *fdt = NULL;
+    struct dt_device_node *dt_host_new = NULL;
+    struct domain *d = hardware_domain;
+    struct overlay_track *tr = NULL;
+    unsigned int naddr;
+    unsigned int num_irq;
+    unsigned int i, j, k;
+    unsigned int num_overlay_nodes;
+    u64 addr, size;
+
+    fdt = xmalloc_bytes(fdt_totalsize(device_tree_flattened));
+    if ( fdt == NULL )
+        return -ENOMEM;
+
+    num_overlay_nodes = overlay_node_count(overlay_fdt);
+    if ( num_overlay_nodes == 0 )
+    {
+        xfree(fdt);
+        return -ENOMEM;
+    }
+
+    spin_lock(&overlay_lock);
+
+    memcpy(fdt, device_tree_flattened, fdt_totalsize(device_tree_flattened));
+
+    rc = check_overlay_fdt(overlay_fdt, overlay_fdt_size);
+    if ( rc )
+    {
+        xfree(fdt);
+        return rc;
+    }
+
+    /*
+     * overlay_get_nodes_info is called to get the node information from dtbo.
+     * This is done before fdt_overlay_apply() because the overlay apply will
+     * erase the magic of overlay_fdt.
+     */
+    rc = overlay_get_nodes_info(overlay_fdt, &nodes_full_path,
+                                num_overlay_nodes);
+    if ( rc )
+    {
+        printk(XENLOG_ERR "Getting nodes information failed with error %d\n",
+               rc);
+        goto err;
+    }
+
+    nodes_irq = xmalloc_bytes(num_overlay_nodes * sizeof(int *));
+
+    if ( nodes_irq == NULL )
+    {
+        rc = -ENOMEM;
+        goto err;
+    }
+    memset(nodes_irq, 0x0, num_overlay_nodes * sizeof(int *));
+
+    node_num_irq = xmalloc_bytes(num_overlay_nodes * sizeof(int));
+    if ( node_num_irq == NULL )
+    {
+        rc = -ENOMEM;
+        goto err;
+    }
+    memset(node_num_irq, 0x0, num_overlay_nodes * sizeof(int));
+
+    rc = fdt_overlay_apply(fdt, overlay_fdt);
+    if ( rc )
+    {
+        printk(XENLOG_ERR "Adding overlay node failed with error %d\n", rc);
+        goto err;
+    }
+
+    for ( j = 0; j < num_overlay_nodes; j++ )
+    {
+        /* Check if any of the node already exists in dt_host. */
+        overlay_node = dt_find_node_by_path(nodes_full_path[j]);
+        if ( overlay_node != NULL )
+        {
+            printk(XENLOG_ERR "node %s exists in device tree\n",
+                   nodes_full_path[j]);
+            rc = -EINVAL;
+            goto err;
+        }
+    }
+
+    /* Unflatten the fdt into a new dt_host. */
+    unflatten_device_tree(fdt, &dt_host_new);
+
+    for ( j = 0; j < num_overlay_nodes; j++ )
+    {
+        dt_dprintk("Adding node: %s\n", nodes_full_path[j]);
+
+        /* Find the newly added node in dt_host_new by it's full path. */
+        overlay_node = _dt_find_node_by_path(dt_host_new, nodes_full_path[j]);
+        if ( overlay_node == NULL )
+        {
+            dt_dprintk("%s node not found\n", nodes_full_path[j]);
+            rc = -EFAULT;
+            goto remove_node;
+        }
+
+        /* Add the node to dt_host. */
+        rc = dt_overlay_add_node(overlay_node, overlay_node->parent->full_name);
+        if ( rc )
+        {
+            /* Node not added in dt_host. */
+            goto remove_node;
+        }
+
+        overlay_node = dt_find_node_by_path(overlay_node->full_name);
+        if ( overlay_node == NULL )
+        {
+            /* Sanity check. But code will never come here. */
+            printk(XENLOG_ERR "Cannot find %s node under updated dt_host\n",
+                   overlay_node->name);
+            goto remove_node;
+        }
+
+        /* First let's handle the interrupts. */
+        rc = handle_device_interrupts(d, overlay_node, false);
+        if ( rc )
+        {
+            printk(XENLOG_ERR "Interrupt failed\n");
+            goto remove_node;
+        }
+
+        /* Store IRQs for each node. */
+        num_irq = dt_number_of_irq(overlay_node);
+        node_num_irq[j] = num_irq;
+        nodes_irq[j] = xmalloc_bytes(num_irq * sizeof(int));
+        if ( nodes_irq[j] == NULL )
+        {
+            rc = -ENOMEM;
+            goto remove_node;
+        }
+
+        for ( k = 0; k < num_irq; k++ )
+        {
+             nodes_irq[j][k] = platform_get_irq(overlay_node, k);
+        }
+
+        /* Add device to IOMMUs */
+        rc = iommu_add_dt_device(overlay_node);
+        if ( rc < 0 )
+        {
+            printk(XENLOG_ERR "Failed to add %s to the IOMMU\n",
+                   dt_node_full_name(overlay_node));
+            goto remove_node;
+        }
+
+        /* Set permissions. */
+        naddr = dt_number_of_address(overlay_node);
+
+        dt_dprintk("%s passthrough = %d naddr = %u\n",
+                   dt_node_full_name(overlay_node), false, naddr);
+
+        /* Give permission for map MMIOs */
+        for ( i = 0; i < naddr; i++ )
+        {
+            struct map_range_data mr_data = { .d = d,
+                                              .p2mt = p2m_mmio_direct_c,
+                                              .skip_mapping = true };
+            rc = dt_device_get_address(overlay_node, i, &addr, &size);
+            if ( rc )
+            {
+                printk(XENLOG_ERR "Unable to retrieve address %u for %s\n",
+                       i, dt_node_full_name(overlay_node));
+                goto remove_node;
+            }
+
+            rc = map_range_to_domain(overlay_node, addr, size, &mr_data);
+            if ( rc )
+                goto remove_node;
+        }
+    }
+
+    /* This will happen if everything above goes right. */
+    tr = xzalloc(struct overlay_track);
+    if ( tr == NULL )
+    {
+        rc = -ENOMEM;
+        goto remove_node;
+    }
+
+    tr->dt_host_new = dt_host_new;
+    tr->fdt = fdt;
+    tr->nodes_fullname = nodes_full_path;
+    tr->num_nodes = num_overlay_nodes;
+    tr->nodes_irq = nodes_irq;
+    tr->node_num_irq = node_num_irq;
+
+    if ( tr->nodes_fullname == NULL )
+    {
+        rc = -ENOMEM;
+        goto remove_node;
+    }
+
+    INIT_LIST_HEAD(&tr->entry);
+    list_add_tail(&tr->entry, &overlay_tracker);
+
+    spin_unlock(&overlay_lock);
+    return rc;
+
+/*
+ * Failure case. We need to remove the nodes, free tracker(if tr exists) and
+ * dt_host_new.
+ */
+remove_node:
+    rc = remove_nodes(nodes_full_path, nodes_irq, node_num_irq, j);
+
+    if ( rc )
+    {
+        printk(XENLOG_ERR "Removing node failed\n");
+        spin_unlock(&overlay_lock);
+        return rc;
+    }
+
+err:
+    spin_unlock(&overlay_lock);
+
+    xfree(dt_host_new);
+    xfree(fdt);
+
+    if ( nodes_full_path != NULL )
+    {
+        for ( i = 0; i < num_overlay_nodes && nodes_full_path[i] != NULL; i++ )
+        {
+            xfree(nodes_full_path[i]);
+        }
+        xfree(nodes_full_path);
+    }
+
+    if ( nodes_irq != NULL )
+    {
+        for ( i = 0; i < num_overlay_nodes && nodes_irq[i] != NULL; i++ )
+        {
+            xfree(nodes_irq[i]);
+        }
+        xfree(nodes_irq);
+    }
+
+    if ( node_num_irq )
+        xfree(node_num_irq);
+
+    xfree(tr);
+
+    return rc;
+}
+
 long dt_sysctl(struct xen_sysctl *op)
 {
     long ret = 0;
@@ -404,6 +723,11 @@ long dt_sysctl(struct xen_sysctl *op)
 
     switch ( op->u.dt_overlay.overlay_op )
     {
+    case XEN_SYSCTL_DT_OVERLAY_ADD:
+        ret = handle_add_overlay_nodes(overlay_fdt,
+                                       op->u.dt_overlay.overlay_fdt_size);
+        break;
+
     case XEN_SYSCTL_DT_OVERLAY_REMOVE:
         ret = check_overlay_fdt(overlay_fdt,
                                 op->u.dt_overlay.overlay_fdt_size);
diff --git a/xen/include/public/sysctl.h b/xen/include/public/sysctl.h
index e256aeb7c6..bb3ef44989 100644
--- a/xen/include/public/sysctl.h
+++ b/xen/include/public/sysctl.h
@@ -1069,6 +1069,7 @@ typedef struct xen_sysctl_cpu_policy xen_sysctl_cpu_policy_t;
 DEFINE_XEN_GUEST_HANDLE(xen_sysctl_cpu_policy_t);
 #endif
 
+#define XEN_SYSCTL_DT_OVERLAY_ADD                   1
 #define XEN_SYSCTL_DT_OVERLAY_REMOVE                2
 
 /*
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 19:47:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 19:47:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287474.487572 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfoF-00087o-W0; Tue, 08 Mar 2022 19:47:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287474.487572; Tue, 08 Mar 2022 19:47:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfoF-00086L-Le; Tue, 08 Mar 2022 19:47:51 +0000
Received: by outflank-mailman (input) for mailman id 287474;
 Tue, 08 Mar 2022 19:47:50 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RGf4=TT=xilinx.com=fnuv@srs-se1.protection.inumbo.net>)
 id 1nRfoD-0004Df-Ui
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 19:47:50 +0000
Received: from NAM10-BN7-obe.outbound.protection.outlook.com
 (mail-bn7nam10on20621.outbound.protection.outlook.com
 [2a01:111:f400:7e8a::621])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 9f2d93f8-9f18-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 20:47:47 +0100 (CET)
Received: from DS7PR06CA0035.namprd06.prod.outlook.com (2603:10b6:8:54::9) by
 DM6PR02MB6122.namprd02.prod.outlook.com (2603:10b6:5:1f9::26) with
 Microsoft
 SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5038.15; Tue, 8 Mar 2022 19:47:41 +0000
Received: from DM3NAM02FT023.eop-nam02.prod.protection.outlook.com
 (2603:10b6:8:54:cafe::4) by DS7PR06CA0035.outlook.office365.com
 (2603:10b6:8:54::9) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Tue, 8 Mar 2022 19:47:41 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (149.199.62.198) by
 DM3NAM02FT023.mail.protection.outlook.com (10.13.5.127) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5038.14 via Frontend Transport; Tue, 8 Mar 2022 19:47:41 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 8 Mar 2022 11:47:23 -0800
Received: from smtp.xilinx.com (172.19.127.95) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 8 Mar 2022 11:47:23 -0800
Received: from [172.19.2.115] (port=58782 helo=xsjfnuv50.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <fnu.vikram@xilinx.com>)
 id 1nRfnn-000Cws-QH; Tue, 08 Mar 2022 11:47:23 -0800
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9f2d93f8-9f18-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Z5TNxbQUIim6w3W4ZjYPL66AY59IwxnlczCY/GUo+Bn/xpow9ncfSFFq61lCNJD/G2wKiWVXw2JuJgNkGx46cajke2+ataR8Ahf6x3DiHhL7f6b94w837KfvyI6FPYCcQopv3+29g0JHwKfUb3s4jIaOfCFKjv1I1R6NkvfzOu7rnfO8fax+vdvfUFWGriCUD4yRyKlMyzFoI5RCFHNRx5rEQhGG7Oy8BDDnPO6LPEQx/o5xQTbBsmM2HJd9Ceopa3f6R/lV7t6cX1Ycub2MSHieISpjAJ6aDgTqsJ2qnmkjAbFb7gdjhu4UlvQaMK/bXmn2CwS02njAFYQTSdX1aQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=6bEthf9q3/3acjkmaRhHs4J03T9SMN4B3DkYAhksGq4=;
 b=cvfeK9x+rJ79ff/TRqqyZw4ILx4dg9xZjJqjidL8yigiEVHOiRuJoICD1NrYYsF+1tTSCWofQnaq3TkiTdyZbBhfsaA3Hz+g6t4bTUHlOUlwCOjSuKKbDGEeHMMgGpAnF+iCD91nKhawJNj/risV46FmSgfhJn4iVK30rs4z8gvLBx8we0iQl8DTDgguGRPLo65LK5XLJF9r1OaU3ZjTOg8Dpbk+LOhTlRFggtZmqt3mqDoOW/OVACGtnLNAKMI70OHY8TKfeyvfuL0Ube1FPKmUb0S3+VX73aZRcCQAqvT8Abgmk5P+hkY4wO3xP3w6a0qZKXBU2MZ+6MhadB/B1Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.62.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=6bEthf9q3/3acjkmaRhHs4J03T9SMN4B3DkYAhksGq4=;
 b=tFDJlqmoHgmPswEjQ8goO1uuTd73Wn2he5+v+ZDN2y0hYG3Afeoyz2eKOMBTcUWyXcjI60nJjPL+w9FfvUd4XJBA3ZzyLYr/Mn9ygMDjAwzKbPwl2QIxhIrya/gySLtxZoYSjWp/A7m6Wj7zYHlzPL6vxx+LDS195kZOr2dnpkQ=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.62.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.62.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.62.198; helo=xsj-pvapexch02.xlnx.xilinx.com;
From: Vikram Garhwal <fnu.vikram@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <julien@xen.org>, <bertrand.marquis@arm.com>,
	<volodymyr_babchuk@epam.com>, Vikram Garhwal <fnu.vikram@xilinx.com>, Andrew
 Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>, Wei Liu <wl@xen.org>
Subject: [XEN][RFC PATCH v3 10/14] xen/arm: Implement device tree node removal functionalities
Date: Tue, 8 Mar 2022 11:47:00 -0800
Message-ID: <20220308194704.14061-11-fnu.vikram@xilinx.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220308194704.14061-1-fnu.vikram@xilinx.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 7fa4e145-f812-4fbd-b479-08da013c81ae
X-MS-TrafficTypeDiagnostic: DM6PR02MB6122:EE_
X-Microsoft-Antispam-PRVS:
	<DM6PR02MB612216B5AA44F177C95108D9BC099@DM6PR02MB6122.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.62.198;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:xsj-pvapexch02.xlnx.xilinx.com;PTR:unknown-62-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(4326008)(8676002)(336012)(426003)(26005)(30864003)(47076005)(316002)(7636003)(186003)(6916009)(82310400004)(5660300002)(54906003)(8936002)(70206006)(70586007)(1076003)(7696005)(36756003)(2616005)(356005)(36860700001)(508600001)(40460700003)(83380400001)(2906002)(6666004)(9786002)(102446001)(403724002)(2004002);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 19:47:41.0784
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 7fa4e145-f812-4fbd-b479-08da013c81ae
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.62.198];Helo=[xsj-pvapexch02.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DM3NAM02FT023.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR02MB6122

Introduce sysctl XEN_SYSCTL_dt_overlay to remove device-tree nodes added using
device tree overlay.

xl overlay remove file.dtbo:
    Removes all the nodes in a given dtbo.
    First, removes IRQ permissions and MMIO accesses. Next, it finds the nodes
    in dt_host and delete the device node entries from dt_host.

    The nodes get removed only if it is not used by any of dom0 or domio.

Also, added overlay_track struct to keep the track of added node through device
tree overlay. overlay_track has dt_host_new which is unflattened form of updated
fdt and name of overlay nodes. When a node is removed, we also free the memory
used by overlay_track for the particular overlay node.

Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com>
---
 xen/common/Makefile          |   1 +
 xen/common/dt_overlay.c      | 447 +++++++++++++++++++++++++++++++++++
 xen/common/sysctl.c          |  10 +
 xen/include/public/sysctl.h  |  18 ++
 xen/include/xen/dt_overlay.h |  47 ++++
 5 files changed, 523 insertions(+)
 create mode 100644 xen/common/dt_overlay.c
 create mode 100644 xen/include/xen/dt_overlay.h

diff --git a/xen/common/Makefile b/xen/common/Makefile
index dc8d3a13f5..2eb5734f8e 100644
--- a/xen/common/Makefile
+++ b/xen/common/Makefile
@@ -54,6 +54,7 @@ obj-y += wait.o
 obj-bin-y += warning.init.o
 obj-$(CONFIG_XENOPROF) += xenoprof.o
 obj-y += xmalloc_tlsf.o
+obj-$(CONFIG_OVERLAY_DTB) += dt_overlay.o
 
 obj-bin-$(CONFIG_X86) += $(foreach n,decompress bunzip2 unxz unlzma lzo unlzo unlz4 unzstd earlycpio,$(n).init.o)
 
diff --git a/xen/common/dt_overlay.c b/xen/common/dt_overlay.c
new file mode 100644
index 0000000000..fcb31de495
--- /dev/null
+++ b/xen/common/dt_overlay.c
@@ -0,0 +1,447 @@
+/*
+ * xen/common/dt_overlay.c
+ *
+ * Device tree overlay support in Xen.
+ *
+ * Copyright (c) 2021 Xilinx Inc.
+ * Written by Vikram Garhwal <fnu.vikram@xilinx.com>
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms and conditions of the GNU General Public
+ * License, version 2, as published by the Free Software Foundation.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ * GNU General Public License for more details.
+ */
+#include <xen/iocap.h>
+#include <xen/xmalloc.h>
+#include <asm/domain_build.h>
+#include <xen/dt_overlay.h>
+#include <xen/guest_access.h>
+
+static LIST_HEAD(overlay_tracker);
+static DEFINE_SPINLOCK(overlay_lock);
+
+static int dt_overlay_remove_node(struct dt_device_node *device_node)
+{
+    struct dt_device_node *np;
+    struct dt_device_node *parent_node;
+    struct dt_device_node *current_node;
+
+    parent_node = device_node->parent;
+
+    current_node = parent_node;
+
+    if ( parent_node == NULL )
+    {
+        dt_dprintk("%s's parent node not found\n", device_node->name);
+        return -EFAULT;
+    }
+
+    np = parent_node->child;
+
+    if ( np == NULL )
+    {
+        dt_dprintk("parent node %s's not found\n", parent_node->name);
+        return -EFAULT;
+    }
+
+    /* If node to be removed is only child node or first child. */
+    if ( !dt_node_cmp(np->full_name, device_node->full_name) )
+    {
+        current_node->allnext = np->allnext;
+
+        /* If node is first child but not the only child. */
+        if ( np->sibling != NULL )
+            current_node->child = np->sibling;
+        else
+            /* If node is only child. */
+            current_node->child = NULL;
+        return 0;
+    }
+
+    for ( np = parent_node->child; np->sibling != NULL; np = np->sibling )
+    {
+        current_node = np;
+        if ( !dt_node_cmp(np->sibling->full_name, device_node->full_name) )
+        {
+            /* Found the node. Now we remove it. */
+            current_node->allnext = np->allnext->allnext;
+
+            if ( np->sibling->sibling )
+                current_node->sibling = np->sibling->sibling;
+            else
+                current_node->sibling = NULL;
+
+            break;
+        }
+    }
+
+    return 0;
+}
+
+/* Basic sanity check for the dtbo tool stack provided to Xen. */
+static int check_overlay_fdt(const void *overlay_fdt, uint32_t overlay_fdt_size)
+{
+    if ( (fdt_totalsize(overlay_fdt) != overlay_fdt_size) ||
+          fdt_check_header(overlay_fdt) )
+    {
+        printk(XENLOG_ERR "The overlay FDT is not a valid Flat Device Tree\n");
+        return -EINVAL;
+    }
+
+    return 0;
+}
+
+static unsigned int overlay_node_count(void *fdto)
+{
+    unsigned int num_overlay_nodes = 0;
+    int fragment;
+
+    fdt_for_each_subnode(fragment, fdto, 0)
+    {
+
+        int subnode;
+        int overlay;
+
+        overlay = fdt_subnode_offset(fdto, fragment, "__overlay__");
+
+        /*
+         * Overlay value can be < 0. But fdt_for_each_subnode() loop checks for
+         * overlay >= 0. So, no need for a overlay>=0 check here.
+         */
+
+        fdt_for_each_subnode(subnode, fdto, overlay)
+        {
+            num_overlay_nodes++;
+        }
+    }
+
+    return num_overlay_nodes;
+}
+
+/*
+ * overlay_get_nodes_info will get the all node's full name with path. This is
+ * useful when checking node for duplication i.e. dtbo tries to add nodes which
+ * already exists in device tree.
+ */
+static int overlay_get_nodes_info(const void *fdto, char ***nodes_full_path,
+                                  unsigned int num_overlay_nodes)
+{
+    int fragment;
+    unsigned int node_num = 0;
+
+    *nodes_full_path = xmalloc_bytes(num_overlay_nodes * sizeof(char *));
+
+    if ( *nodes_full_path == NULL )
+        return -ENOMEM;
+    memset(*nodes_full_path, 0x0, num_overlay_nodes * sizeof(char *));
+
+    fdt_for_each_subnode(fragment, fdto, 0)
+    {
+        int target;
+        int overlay;
+        int subnode;
+        const char *target_path;
+
+        target = fdt_overlay_target_offset(device_tree_flattened, fdto,
+                                           fragment, &target_path);
+        if ( target < 0 )
+            return target;
+
+        overlay = fdt_subnode_offset(fdto, fragment, "__overlay__");
+
+        /*
+         * Overlay value can be < 0. But fdt_for_each_subnode() loop checks for
+         * overlay >= 0. So, no need for a overlay>=0 check here.
+         */
+        fdt_for_each_subnode(subnode, fdto, overlay)
+        {
+            const char *node_name = NULL;
+            unsigned int node_name_len = 0;
+            unsigned int target_path_len = strlen(target_path);
+            unsigned int node_full_name_len = 0;
+
+            node_name = fdt_get_name(fdto, subnode, &node_name_len);
+
+            if ( node_name == NULL )
+                return -EINVAL;
+
+            /*
+             * Magic number 2 is for adding '/'. This is done to keep the
+             * node_full_name in the correct full node name format.
+             */
+            node_full_name_len = target_path_len + node_name_len + 2;
+
+            (*nodes_full_path)[node_num] = xmalloc_bytes(node_full_name_len);
+
+            if ( (*nodes_full_path)[node_num] == NULL )
+                return -ENOMEM;
+
+            memcpy((*nodes_full_path)[node_num], target_path, target_path_len);
+
+            (*nodes_full_path)[node_num][target_path_len] = '/';
+
+            memcpy((*nodes_full_path)[node_num] + target_path_len + 1, node_name,
+                   node_name_len);
+
+            (*nodes_full_path)[node_num][node_full_name_len - 1] = '\0';
+
+            node_num++;
+        }
+    }
+
+    return 0;
+}
+
+/* Remove nodes from dt_host. */
+static int remove_nodes(char **full_dt_node_path, int **nodes_irq,
+                        int *node_num_irq, unsigned int num_nodes)
+{
+    struct domain *d = hardware_domain;
+    int rc = 0;
+    struct dt_device_node *overlay_node;
+    unsigned int naddr;
+    unsigned int i, j, nirq;
+    u64 addr, size;
+    domid_t domid = 0;
+
+    for ( j = 0; j < num_nodes; j++ )
+    {
+        dt_dprintk("Finding node %s in the dt_host\n", full_dt_node_path[j]);
+
+        overlay_node = dt_find_node_by_path(full_dt_node_path[j]);
+
+        if ( overlay_node == NULL )
+        {
+            printk(XENLOG_ERR "Device %s is not present in the tree. Removing nodes failed\n",
+                   full_dt_node_path[j]);
+            return -EINVAL;
+        }
+
+        domid = dt_device_used_by(overlay_node);
+
+        dt_dprintk("Checking if node %s is used by any domain\n",
+                   full_dt_node_path[j]);
+
+        /* Remove the node iff it's assigned to domain 0 or domain io. */
+        if ( domid != 0 && domid != DOMID_IO )
+        {
+            printk(XENLOG_ERR "Device %s as it is being used by domain %d. Removing nodes failed\n",
+                   full_dt_node_path[j], domid);
+            return -EINVAL;
+        }
+
+        dt_dprintk("Removing node: %s\n", full_dt_node_path[j]);
+
+        nirq = node_num_irq[j];
+
+        /* Remove IRQ permission */
+        for ( i = 0; i < nirq; i++ )
+        {
+            rc = nodes_irq[j][i];
+            /*
+             * TODO: We don't handle shared IRQs for now. So, it is assumed that
+             * the IRQs was not shared with another domain.
+             */
+            rc = irq_deny_access(d, rc);
+            if ( rc )
+            {
+                printk(XENLOG_ERR "unable to revoke access for irq %u for %s\n",
+                       i, dt_node_full_name(overlay_node));
+                return rc;
+            }
+        }
+
+        rc = iommu_remove_dt_device(overlay_node);
+        if ( rc != 0 && rc != -ENXIO )
+            return rc;
+
+        naddr = dt_number_of_address(overlay_node);
+
+        /* Remove mmio access. */
+        for ( i = 0; i < naddr; i++ )
+        {
+            rc = dt_device_get_address(overlay_node, i, &addr, &size);
+            if ( rc )
+            {
+                printk(XENLOG_ERR "Unable to retrieve address %u for %s\n",
+                       i, dt_node_full_name(overlay_node));
+                return rc;
+            }
+
+            rc = iomem_deny_access(d, paddr_to_pfn(addr),
+                                   paddr_to_pfn(PAGE_ALIGN(addr + size - 1)));
+            if ( rc )
+            {
+                printk(XENLOG_ERR "Unable to remove dom%d access to"
+                        " 0x%"PRIx64" - 0x%"PRIx64"\n",
+                        d->domain_id,
+                        addr & PAGE_MASK, PAGE_ALIGN(addr + size) - 1);
+                return rc;
+            }
+        }
+
+        rc = dt_overlay_remove_node(overlay_node);
+        if ( rc )
+            return rc;
+    }
+
+    return rc;
+}
+
+/*
+ * First finds the device node to remove. Check if the device is being used by
+ * any dom and finally remove it from dt_host. IOMMU is already being taken care
+ * while destroying the domain.
+ */
+static long handle_remove_overlay_nodes(char **full_dt_nodes_path,
+                                        unsigned int num_nodes)
+{
+    int rc = 0;
+    struct overlay_track *entry, *temp, *track;
+    bool found_entry = false;
+    unsigned int i;
+
+    spin_lock(&overlay_lock);
+
+    /*
+     * First check if dtbo is correct i.e. it should one of the dtbo which was
+     * used when dynamically adding the node.
+     * Limitation: Cases with same node names but different property are not
+     * supported currently. We are relying on user to provide the same dtbo
+     * as it was used when adding the nodes.
+     */
+    list_for_each_entry_safe( entry, temp, &overlay_tracker, entry )
+    {
+        /* Checking the num of nodes first. If not same skip to next entry. */
+        if ( num_nodes == entry->num_nodes )
+        {
+            for ( i = 0; i < num_nodes; i++ )
+            {
+                if ( strcmp(full_dt_nodes_path[i], entry->nodes_fullname[i]) )
+                {
+                    /* Node name didn't match. Skip to next entry. */
+                    break;
+                }
+            }
+
+            /* Found one tracker with all node name matching. */
+            track = entry;
+            found_entry = true;
+            break;
+        }
+    }
+
+    if ( found_entry == false )
+    {
+        rc = -EINVAL;
+
+        printk(XENLOG_ERR "Cannot find any matching tracker with input dtbo."
+               " Removing nodes is supported for only prior added dtbo. Please"
+               " provide a valid dtbo which was used to add the nodes.\n");
+        goto out;
+
+    }
+
+    rc = remove_nodes(full_dt_nodes_path, entry->nodes_irq, entry->node_num_irq,
+                      num_nodes);
+
+    if ( rc )
+    {
+        printk(XENLOG_ERR "Removing node failed\n");
+        goto out;
+    }
+
+    list_del(&entry->entry);
+
+    for ( i = 0; i < entry->num_nodes && entry->nodes_fullname[i] != NULL; i++ )
+    {
+        xfree(entry->nodes_fullname[i]);
+    }
+    xfree(entry->nodes_fullname);
+    for ( i = 0; i < entry->num_nodes && entry->nodes_irq[i] != NULL; i++ )
+    {
+        xfree(entry->nodes_irq[i]);
+    }
+    xfree(entry->nodes_irq);
+    xfree(entry->node_num_irq);
+    xfree(entry->dt_host_new);
+    xfree(entry->fdt);
+    xfree(entry);
+
+out:
+    spin_unlock(&overlay_lock);
+    return rc;
+}
+
+long dt_sysctl(struct xen_sysctl *op)
+{
+    long ret = 0;
+    void *overlay_fdt;
+    char **nodes_full_path = NULL;
+    unsigned int num_overlay_nodes = 0;
+
+    if ( op->u.dt_overlay.overlay_fdt_size <= 0 )
+        return -EINVAL;
+
+    overlay_fdt = xmalloc_bytes(op->u.dt_overlay.overlay_fdt_size);
+
+    if ( overlay_fdt == NULL )
+        return -ENOMEM;
+
+    ret = copy_from_guest(overlay_fdt, op->u.dt_overlay.overlay_fdt,
+                         op->u.dt_overlay.overlay_fdt_size);
+    if ( ret )
+    {
+        gprintk(XENLOG_ERR, "copy from guest failed\n");
+        xfree(overlay_fdt);
+
+        return -EFAULT;
+    }
+
+    switch ( op->u.dt_overlay.overlay_op )
+    {
+    case XEN_SYSCTL_DT_OVERLAY_REMOVE:
+        ret = check_overlay_fdt(overlay_fdt,
+                                op->u.dt_overlay.overlay_fdt_size);
+        if ( ret )
+        {
+            ret = -EFAULT;
+            break;
+        }
+
+        num_overlay_nodes = overlay_node_count(overlay_fdt);
+        if ( num_overlay_nodes == 0 )
+        {
+            ret = -ENOMEM;
+            break;
+        }
+
+        ret = overlay_get_nodes_info(overlay_fdt, &nodes_full_path,
+                                     num_overlay_nodes);
+        if ( ret )
+             break;
+
+        ret = handle_remove_overlay_nodes(nodes_full_path,
+                                          num_overlay_nodes);
+        break;
+
+    default:
+        break;
+    }
+
+    if ( nodes_full_path != NULL )
+    {
+        int i;
+        for ( i = 0; i < num_overlay_nodes && nodes_full_path[i] != NULL; i++ )
+        {
+            xfree(nodes_full_path[i]);
+        }
+        xfree(nodes_full_path);
+    }
+
+    return ret;
+}
diff --git a/xen/common/sysctl.c b/xen/common/sysctl.c
index fc4a0b31d6..d685c07159 100644
--- a/xen/common/sysctl.c
+++ b/xen/common/sysctl.c
@@ -29,6 +29,10 @@
 #include <xen/livepatch.h>
 #include <xen/coverage.h>
 
+#ifdef CONFIG_OVERLAY_DTB
+#include <xen/dt_overlay.h>
+#endif
+
 long cf_check do_sysctl(XEN_GUEST_HANDLE_PARAM(xen_sysctl_t) u_sysctl)
 {
     long ret = 0;
@@ -482,6 +486,12 @@ long cf_check do_sysctl(XEN_GUEST_HANDLE_PARAM(xen_sysctl_t) u_sysctl)
             copyback = 1;
         break;
 
+#ifdef CONFIG_OVERLAY_DTB
+    case XEN_SYSCTL_overlay:
+        ret = dt_sysctl(op);
+        break;
+#endif
+
     default:
         ret = arch_do_sysctl(op, u_sysctl);
         copyback = 0;
diff --git a/xen/include/public/sysctl.h b/xen/include/public/sysctl.h
index 55252e97f2..e256aeb7c6 100644
--- a/xen/include/public/sysctl.h
+++ b/xen/include/public/sysctl.h
@@ -1069,6 +1069,22 @@ typedef struct xen_sysctl_cpu_policy xen_sysctl_cpu_policy_t;
 DEFINE_XEN_GUEST_HANDLE(xen_sysctl_cpu_policy_t);
 #endif
 
+#define XEN_SYSCTL_DT_OVERLAY_REMOVE                2
+
+/*
+ * XEN_SYSCTL_dt_overlay
+ * Performs addition/removal of device tree nodes under parent node using dtbo.
+ * This does in three steps:
+ *  - Adds/Removes the nodes from dt_host.
+ *  - Adds/Removes IRQ permission for the nodes.
+ *  - Adds/Removes MMIO accesses.
+ */
+struct xen_sysctl_dt_overlay {
+    XEN_GUEST_HANDLE_64(void) overlay_fdt;
+    uint32_t overlay_fdt_size;  /* Overlay dtb size. */
+    uint8_t overlay_op; /* Add or remove. */
+};
+
 struct xen_sysctl {
     uint32_t cmd;
 #define XEN_SYSCTL_readconsole                    1
@@ -1099,6 +1115,7 @@ struct xen_sysctl {
 #define XEN_SYSCTL_livepatch_op                  27
 /* #define XEN_SYSCTL_set_parameter              28 */
 #define XEN_SYSCTL_get_cpu_policy                29
+#define XEN_SYSCTL_dt_overlay                    30
     uint32_t interface_version; /* XEN_SYSCTL_INTERFACE_VERSION */
     union {
         struct xen_sysctl_readconsole       readconsole;
@@ -1129,6 +1146,7 @@ struct xen_sysctl {
 #if defined(__i386__) || defined(__x86_64__)
         struct xen_sysctl_cpu_policy        cpu_policy;
 #endif
+        struct xen_sysctl_dt_overlay        dt_overlay;
         uint8_t                             pad[128];
     } u;
 };
diff --git a/xen/include/xen/dt_overlay.h b/xen/include/xen/dt_overlay.h
new file mode 100644
index 0000000000..525818b77c
--- /dev/null
+++ b/xen/include/xen/dt_overlay.h
@@ -0,0 +1,47 @@
+/*
+ * xen/common/dt_overlay.c
+ *
+ * Device tree overlay suppoert in Xen.
+ *
+ * Copyright (c) 2021 Xilinx Inc.
+ * Written by Vikram Garhwal <fnu.vikram@xilinx.com>
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms and conditions of the GNU General Public
+ * License, version 2, as published by the Free Software Foundation.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ * GNU General Public License for more details.
+ */
+#ifndef __XEN_DT_SYSCTL_H__
+#define __XEN_DT_SYSCTL_H__
+
+#include <xen/list.h>
+#include <xen/libfdt/libfdt.h>
+#include <xen/device_tree.h>
+#include <public/sysctl.h>
+
+/*
+ * overlay_node_track describes information about added nodes through dtbo.
+ * @entry: List pointer.
+ * @dt_host_new: Pointer to the updated dt_host_new unflattened 'updated fdt'.
+ * @fdt: Stores the fdt.
+ * @nodes_fullname: Stores the full name of nodes.
+ * @nodes_irq: Stores the IRQ added from overlay dtb.
+ * @node_num_irq: Stores num of IRQ for each node in overlay dtb.
+ * @num_nodes: Stores total number of nodes in overlay dtb.
+ */
+struct overlay_track {
+    struct list_head entry;
+    struct dt_device_node *dt_host_new;
+    void *fdt;
+    char **nodes_fullname;
+    int **nodes_irq;
+    int *node_num_irq;
+    unsigned int num_nodes;
+};
+
+long dt_sysctl(struct xen_sysctl *op);
+#endif
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 19:47:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 19:47:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287475.487580 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfoH-0008IP-Cl; Tue, 08 Mar 2022 19:47:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287475.487580; Tue, 08 Mar 2022 19:47:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfoG-0008Fd-JZ; Tue, 08 Mar 2022 19:47:52 +0000
Received: by outflank-mailman (input) for mailman id 287475;
 Tue, 08 Mar 2022 19:47:51 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RGf4=TT=xilinx.com=fnuv@srs-se1.protection.inumbo.net>)
 id 1nRfoE-0004Df-UX
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 19:47:51 +0000
Received: from NAM11-BN8-obe.outbound.protection.outlook.com
 (mail-bn8nam11on2062a.outbound.protection.outlook.com
 [2a01:111:f400:7eae::62a])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a0fb9c64-9f18-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 20:47:48 +0100 (CET)
Received: from DS7PR06CA0052.namprd06.prod.outlook.com (2603:10b6:8:54::30) by
 MWHPR0201MB3626.namprd02.prod.outlook.com (2603:10b6:301:77::39) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.17; Tue, 8 Mar
 2022 19:47:45 +0000
Received: from DM3NAM02FT023.eop-nam02.prod.protection.outlook.com
 (2603:10b6:8:54:cafe::f2) by DS7PR06CA0052.outlook.office365.com
 (2603:10b6:8:54::30) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Tue, 8 Mar 2022 19:47:45 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (149.199.62.198) by
 DM3NAM02FT023.mail.protection.outlook.com (10.13.5.127) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5038.14 via Frontend Transport; Tue, 8 Mar 2022 19:47:45 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 8 Mar 2022 11:47:26 -0800
Received: from smtp.xilinx.com (172.19.127.95) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 8 Mar 2022 11:47:26 -0800
Received: from [172.19.2.115] (port=58782 helo=xsjfnuv50.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <fnu.vikram@xilinx.com>)
 id 1nRfnp-000Cws-Ux; Tue, 08 Mar 2022 11:47:25 -0800
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a0fb9c64-9f18-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=PJ/9LP3IjTq1HpjojWR4DRKOH/RiiupFn8vgqXYhr69OIC+KKWf10dcdFVs0ClEVzuQcsu/kutMOurD0mYh95anFF9kVn4Ypo/e+BQ9B9cL+UXox7z/pJ8B83UbV47mjbyEOEhOJ+mqZOBHDThpmdReFejheTBvNBRweUyZvuKWhMCWgFUQmYiILAy5cwM/jDJDvjeLeQWKp9mX7SNAxk/YHVNCiFfVnWLjnK/IJ07xxjCe183vEFSFGq6zTZOMzzrLJRICJjCi+DMTAFveGe2jjx5Z87zpkT2b0F3FkbgtVUmlYUgmRbbjMtacT+iy1Tkb1eqpTEqEmlNPws0UGPA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=n0mw2y4BYfrLOmQKhWhdHmTRvK5Ny8UEy4PO2h9XNts=;
 b=E7YLZo25We6jEghN5JYnGXlhdi+DVL9Qz3y2ttEPrDINduLLQ54wenb9CEQfB8TtTNpuE31rMW3HuaVVec+lGSNIHOa0GUxWDjepeeeDaBBkwJh9TYnolnAkAyP5x4fsHgVCxLMbw2q77k4SnVNxTHtwk+vtR9SiiTN1Uyd1+jTXuPJGLem5U9Jv1UFyCu+SNVRdg29O4wOAr/AfO71HXxeTPEoJJnDdyrPenL3Eoql2OcqYBPofvcZ3hb+cmfaWq0uHfrrWfieSsLFa8OycB7n0Id8GSTZ0LLlgh2CnS9zeVT/Kf4v7jx9KYzpp9JBfdEMh+68ztzbXigA95y1qog==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.62.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=n0mw2y4BYfrLOmQKhWhdHmTRvK5Ny8UEy4PO2h9XNts=;
 b=eM6utED1MC17LS6pwcCgYaHiSIiTR4ME+F6uLz9f5snLuWdxMeszEWsw0YH5npBhBFrX/GApPEsaytrllxMaa/BJ6I6y7vAoPUpDr+usf8j81erxy4h9lZHybQaF79Mb6CQ40o6liALWdB6Dd0EUW85L/l8TVf3TixD+wvG5zic=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.62.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.62.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.62.198; helo=xsj-pvapexch02.xlnx.xilinx.com;
From: Vikram Garhwal <fnu.vikram@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <julien@xen.org>, <bertrand.marquis@arm.com>,
	<volodymyr_babchuk@epam.com>, Vikram Garhwal <fnu.vikram@xilinx.com>, Wei Liu
	<wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>, Juergen Gross
	<jgross@suse.com>
Subject: [XEN][RFC PATCH v3 13/14] tools/libs/light: Implement new libxl functions for device tree overlay ops
Date: Tue, 8 Mar 2022 11:47:03 -0800
Message-ID: <20220308194704.14061-14-fnu.vikram@xilinx.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220308194704.14061-1-fnu.vikram@xilinx.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 95d1b2e3-fbf6-4ac7-3fcf-08da013c840c
X-MS-TrafficTypeDiagnostic: MWHPR0201MB3626:EE_
X-Microsoft-Antispam-PRVS:
	<MWHPR0201MB3626E6CB5462EDC4F844FCA1BC099@MWHPR0201MB3626.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.62.198;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:xsj-pvapexch02.xlnx.xilinx.com;PTR:unknown-62-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(8676002)(36756003)(36860700001)(2906002)(40460700003)(4326008)(82310400004)(70206006)(508600001)(26005)(186003)(426003)(336012)(1076003)(2616005)(70586007)(356005)(7636003)(8936002)(5660300002)(6916009)(54906003)(316002)(6666004)(9786002)(47076005)(7696005)(102446001)(2004002);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 19:47:45.0313
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 95d1b2e3-fbf6-4ac7-3fcf-08da013c840c
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.62.198];Helo=[xsj-pvapexch02.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DM3NAM02FT023.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR0201MB3626

Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com>
---
 tools/include/libxl.h            |  3 ++
 tools/libs/light/Makefile        |  1 +
 tools/libs/light/libxl_overlay.c | 67 ++++++++++++++++++++++++++++++++
 3 files changed, 71 insertions(+)
 create mode 100644 tools/libs/light/libxl_overlay.c

diff --git a/tools/include/libxl.h b/tools/include/libxl.h
index 51a9b6cfac..b31e17c2ce 100644
--- a/tools/include/libxl.h
+++ b/tools/include/libxl.h
@@ -2419,6 +2419,9 @@ libxl_device_pci *libxl_device_pci_list(libxl_ctx *ctx, uint32_t domid,
                                         int *num);
 void libxl_device_pci_list_free(libxl_device_pci* list, int num);
 
+int libxl_dt_overlay(libxl_ctx *ctx, void *overlay,
+                     int overlay_size, uint8_t overlay_op);
+
 /*
  * Turns the current process into a backend device service daemon
  * for a driver domain.
diff --git a/tools/libs/light/Makefile b/tools/libs/light/Makefile
index 453bea0067..405115c13c 100644
--- a/tools/libs/light/Makefile
+++ b/tools/libs/light/Makefile
@@ -116,6 +116,7 @@ SRCS-y += libxl_genid.c
 SRCS-y += _libxl_types.c
 SRCS-y += libxl_flask.c
 SRCS-y += _libxl_types_internal.c
+SRCS-y += libxl_overlay.o
 
 ifeq ($(CONFIG_LIBNL),y)
 CFLAGS_LIBXL += $(LIBNL3_CFLAGS)
diff --git a/tools/libs/light/libxl_overlay.c b/tools/libs/light/libxl_overlay.c
new file mode 100644
index 0000000000..e370e8cac8
--- /dev/null
+++ b/tools/libs/light/libxl_overlay.c
@@ -0,0 +1,67 @@
+/*
+ * Copyright (C) 2021 Xilinx Inc.
+ * Author Vikram Garhwal <fnu.vikram@xilinx.com>
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU Lesser General Public License as published
+ * by the Free Software Foundation; version 2.1 only. with the special
+ * exception on linking described in file LICENSE.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ * GNU Lesser General Public License for more details.
+ */
+
+#include "libxl_osdeps.h" /* must come before any other headers */
+#include "libxl_internal.h"
+#include <libfdt.h>
+#include <xenguest.h>
+#include <xenctrl.h>
+
+static int check_overlay_fdt(libxl__gc *gc, void *fdt, size_t size)
+{
+    int r;
+
+    if (fdt_magic(fdt) != FDT_MAGIC) {
+        LOG(ERROR, "Overlay FDT is not a valid Flat Device Tree");
+        return ERROR_FAIL;
+    }
+
+    r = fdt_check_header(fdt);
+    if (r) {
+        LOG(ERROR, "Failed to check the overlay FDT (%d)", r);
+        return ERROR_FAIL;
+    }
+
+    if (fdt_totalsize(fdt) > size) {
+        LOG(ERROR, "Overlay FDT totalsize is too big");
+        return ERROR_FAIL;
+    }
+
+    return 0;
+}
+
+int libxl_dt_overlay(libxl_ctx *ctx, void *overlay_dt, int overlay_dt_size,
+                     uint8_t overlay_op)
+{
+    int rc = 0;
+    GC_INIT(ctx);
+
+    if (check_overlay_fdt(gc, overlay_dt, overlay_dt_size)) {
+        LOG(ERROR, "Overlay DTB check failed\n");
+        GC_FREE;
+        return ERROR_FAIL;
+    } else
+        LOG(DEBUG, "Overlay DTB check passed\n");
+
+    /* We don't need to do  xc_interface_open here. */
+    rc = xc_dt_overlay(ctx->xch, overlay_dt, overlay_dt_size, overlay_op);
+
+    if (rc)
+        LOG(ERROR, "%s: Adding/Removing overlay dtb failed.\n", __func__);
+
+    GC_FREE;
+    return rc;
+}
+
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 19:47:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 19:47:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287478.487586 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfoH-0008Qo-TB; Tue, 08 Mar 2022 19:47:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287478.487586; Tue, 08 Mar 2022 19:47:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfoH-0008PA-81; Tue, 08 Mar 2022 19:47:53 +0000
Received: by outflank-mailman (input) for mailman id 287478;
 Tue, 08 Mar 2022 19:47:52 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RGf4=TT=xilinx.com=fnuv@srs-se1.protection.inumbo.net>)
 id 1nRfoF-0004Om-Pl
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 19:47:51 +0000
Received: from NAM11-CO1-obe.outbound.protection.outlook.com
 (mail-co1nam11on20618.outbound.protection.outlook.com
 [2a01:111:f400:7eab::618])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a252d0fa-9f18-11ec-8eba-a37418f5ba1a;
 Tue, 08 Mar 2022 20:47:49 +0100 (CET)
Received: from DS7PR06CA0029.namprd06.prod.outlook.com (2603:10b6:8:54::29) by
 SJ0PR02MB8784.namprd02.prod.outlook.com (2603:10b6:a03:3e1::10) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Tue, 8 Mar
 2022 19:47:46 +0000
Received: from DM3NAM02FT023.eop-nam02.prod.protection.outlook.com
 (2603:10b6:8:54:cafe::92) by DS7PR06CA0029.outlook.office365.com
 (2603:10b6:8:54::29) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Tue, 8 Mar 2022 19:47:45 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (149.199.62.198) by
 DM3NAM02FT023.mail.protection.outlook.com (10.13.5.127) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5038.14 via Frontend Transport; Tue, 8 Mar 2022 19:47:45 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 8 Mar 2022 11:47:26 -0800
Received: from smtp.xilinx.com (172.19.127.95) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 8 Mar 2022 11:47:21 -0800
Received: from [172.19.2.115] (port=58782 helo=xsjfnuv50.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <fnu.vikram@xilinx.com>)
 id 1nRfnl-000Cws-5e; Tue, 08 Mar 2022 11:47:21 -0800
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a252d0fa-9f18-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=evO+N4/NqQj5VI5dAlaM6O4Yo2tX0jJQ8SDjFtHSF8I+OiR2/+vGinMiMDYOgWI4qZ//eg2wjwblNMzG06946MDLv00u3JZ74N6gu3F5lyOGjjVGe/r/gC9+IrkvdsrE2CSgxQGigWcodanRl8w3AZ5hBvyzjZAVtOxQPsHh7uPo89e/kCSvJ5N+7enyhmw80IPl2v8h6CXNo1KxsmCaYYzVIxjW/nilXLx/oMTExKnOAQxc7/y9r4haqHE+pFvfGOMxASYjx2fJV2KeOhi9SdV72dznYBfHsxR3cJq4xad5CURst/TPjl2MbulRR0hnNWKiKaZ6p7BrH09931Sgkg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=W7qfG/E62ZPUQLKP3CMDSNtZWZYJXpDeF3V5RfWzOVc=;
 b=k7MyJrWg39HGU/4vZC1XRjnzJWQDtBTJiqfAHhEgMqanlqk2bY0ypKeQVHzNcmRm0WtKWUzp8wGDMF53NFQqhnlXglR3sZFIwXhHUmc+SwEaP6rg36rPp9T359o9q10FxeI8ABKCrCbJ3GVBEE6l3Iy7sTFPEz7fmMYengLI1Nc+WjLbIP+O5DLSOBf2EqyenmsiRGPquhAuQ7OLnW99aPqry9bOCX0A3v6Lf8YmkPpUAL23kj38IgiCjPgCuZ28y1loAm3RT6E8ix9xcS073rThqEjaZz6AWvTXIgqqVU4oC2HmpEX8afN+O0WZvur73AdAxYaWW+qrgEDT7JSNmA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.62.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=W7qfG/E62ZPUQLKP3CMDSNtZWZYJXpDeF3V5RfWzOVc=;
 b=QbgF+U/E95WZso4QCEbIj/KlZ4pc452OiDNG4SDGpcXAPHihjXoTrZFdl9NgYdZx+0nSiacUh0u2kKfZtS91YOCxnOFHJqcDeCyKBkk+mUjwzb0qkLurzoJhEKoOGuBUOV/tnSa238ql2f2zCEvd9jjCLjs8Uw+hpXwy7+FlVzs=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.62.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.62.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.62.198; helo=xsj-pvapexch02.xlnx.xilinx.com;
From: Vikram Garhwal <fnu.vikram@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <julien@xen.org>, <bertrand.marquis@arm.com>,
	<volodymyr_babchuk@epam.com>, Vikram Garhwal <fnu.vikram@xilinx.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [XEN][RFC PATCH v3 06/14] xen/smmu: Add remove_device callback for smmu_iommu ops
Date: Tue, 8 Mar 2022 11:46:56 -0800
Message-ID: <20220308194704.14061-7-fnu.vikram@xilinx.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220308194704.14061-1-fnu.vikram@xilinx.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: bef838d3-10fd-4806-fe9a-08da013c846d
X-MS-TrafficTypeDiagnostic: SJ0PR02MB8784:EE_
X-Microsoft-Antispam-PRVS:
	<SJ0PR02MB8784A51BCB98DC45C0BB1EF7BC099@SJ0PR02MB8784.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.62.198;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:xsj-pvapexch02.xlnx.xilinx.com;PTR:unknown-62-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(6666004)(2616005)(8936002)(8676002)(4326008)(508600001)(70586007)(70206006)(5660300002)(36756003)(1076003)(9786002)(26005)(2906002)(316002)(186003)(7696005)(36860700001)(6916009)(54906003)(47076005)(336012)(426003)(40460700003)(7636003)(356005)(82310400004)(102446001);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 19:47:45.6875
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: bef838d3-10fd-4806-fe9a-08da013c846d
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.62.198];Helo=[xsj-pvapexch02.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DM3NAM02FT023.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR02MB8784

Add remove_device callback for removing the device entry from smmu-master using
following steps:
1. Find if SMMU master exists for the device node.
2. Remove the SMMU master

Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com>
---
 xen/drivers/passthrough/arm/smmu.c | 56 ++++++++++++++++++++++++++++++
 1 file changed, 56 insertions(+)

diff --git a/xen/drivers/passthrough/arm/smmu.c b/xen/drivers/passthrough/arm/smmu.c
index b186c28dff..8b3b8b9850 100644
--- a/xen/drivers/passthrough/arm/smmu.c
+++ b/xen/drivers/passthrough/arm/smmu.c
@@ -816,6 +816,19 @@ static int insert_smmu_master(struct arm_smmu_device *smmu,
 	return 0;
 }
 
+static int remove_smmu_master(struct arm_smmu_device *smmu,
+			      struct arm_smmu_master *master)
+{
+	if (!smmu->masters.rb_node) {
+		ASSERT_UNREACHABLE();
+		return -ENOENT;
+	}
+
+	rb_erase(&master->node, &smmu->masters);
+
+	return 0;
+}
+
 static int arm_smmu_dt_add_device_legacy(struct arm_smmu_device *smmu,
 					 struct device *dev,
 					 struct iommu_fwspec *fwspec)
@@ -853,6 +866,32 @@ static int arm_smmu_dt_add_device_legacy(struct arm_smmu_device *smmu,
 	return insert_smmu_master(smmu, master);
 }
 
+static int arm_smmu_dt_remove_device_legacy(struct arm_smmu_device *smmu,
+					 struct device *dev)
+{
+	struct arm_smmu_master *master;
+	struct device_node *dev_node = dev_get_dev_node(dev);
+	int ret;
+
+	master = find_smmu_master(smmu, dev_node);
+	if (master == NULL) {
+		dev_err(dev,
+			"No registrations found for master device %s\n",
+			dev_node->name);
+		return -EINVAL;
+	}
+
+	ret = remove_smmu_master(smmu, master);
+
+	if (ret)
+		return ret;
+
+	dev_node->is_protected = false;
+
+	kfree(master);
+	return 0;
+}
+
 static int register_smmu_master(struct arm_smmu_device *smmu,
 				struct device *dev,
 				struct of_phandle_args *masterspec)
@@ -876,6 +915,22 @@ static int register_smmu_master(struct arm_smmu_device *smmu,
 					     fwspec);
 }
 
+static int arm_smmu_dt_remove_device_generic(u8 devfn, struct device *dev)
+{
+	struct arm_smmu_device *smmu;
+	struct iommu_fwspec *fwspec;
+
+	fwspec = dev_iommu_fwspec_get(dev);
+	if (fwspec == NULL)
+		return -ENXIO;
+
+	smmu = find_smmu(fwspec->iommu_dev);
+	if (smmu == NULL)
+		return -ENXIO;
+
+	return arm_smmu_dt_remove_device_legacy(smmu, dev);
+}
+
 static int arm_smmu_dt_add_device_generic(u8 devfn, struct device *dev)
 {
 	struct arm_smmu_device *smmu;
@@ -2861,6 +2916,7 @@ static const struct iommu_ops arm_smmu_iommu_ops = {
     .init = arm_smmu_iommu_domain_init,
     .hwdom_init = arch_iommu_hwdom_init,
     .add_device = arm_smmu_dt_add_device_generic,
+    .remove_device = arm_smmu_dt_remove_device_generic,
     .teardown = arm_smmu_iommu_domain_teardown,
     .iotlb_flush = arm_smmu_iotlb_flush,
     .iotlb_flush_all = arm_smmu_iotlb_flush_all,
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 19:47:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 19:47:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287479.487604 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfoK-0000ft-Di; Tue, 08 Mar 2022 19:47:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287479.487604; Tue, 08 Mar 2022 19:47:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfoJ-0000eO-U7; Tue, 08 Mar 2022 19:47:55 +0000
Received: by outflank-mailman (input) for mailman id 287479;
 Tue, 08 Mar 2022 19:47:54 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RGf4=TT=xilinx.com=fnuv@srs-se1.protection.inumbo.net>)
 id 1nRfoH-0004Df-Af
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 19:47:53 +0000
Received: from NAM04-BN8-obe.outbound.protection.outlook.com
 (mail-bn8nam08on2061c.outbound.protection.outlook.com
 [2a01:111:f400:7e8d::61c])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a364e957-9f18-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 20:47:52 +0100 (CET)
Received: from DS7PR06CA0046.namprd06.prod.outlook.com (2603:10b6:8:54::13) by
 SN6PR02MB4720.namprd02.prod.outlook.com (2603:10b6:805:98::18) with
 Microsoft
 SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5038.14; Tue, 8 Mar 2022 19:47:48 +0000
Received: from DM3NAM02FT023.eop-nam02.prod.protection.outlook.com
 (2603:10b6:8:54:cafe::18) by DS7PR06CA0046.outlook.office365.com
 (2603:10b6:8:54::13) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.13 via Frontend
 Transport; Tue, 8 Mar 2022 19:47:48 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (149.199.62.198) by
 DM3NAM02FT023.mail.protection.outlook.com (10.13.5.127) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5038.14 via Frontend Transport; Tue, 8 Mar 2022 19:47:48 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 8 Mar 2022 11:47:26 -0800
Received: from smtp.xilinx.com (172.19.127.95) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 8 Mar 2022 11:47:26 -0800
Received: from [172.19.2.115] (port=58782 helo=xsjfnuv50.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <fnu.vikram@xilinx.com>)
 id 1nRfnq-000Cws-QV; Tue, 08 Mar 2022 11:47:26 -0800
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a364e957-9f18-11ec-8539-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=mmOAUVnNBNpPZc7bqD88t0rW5jGi+VG1IRkGjhzyurV8IkaGa0crf14DLDN/YwPhuEaUGQuPdwKVp1mbPpPkZNFJWtyv8bdeyPeRNbe5nchPmEJGWBUWy5xQ9ZXOHiZGP2SRZXJY3csfVohvz4bJmZ3NBpv+N0s+nr8s6r3iY0UOQe1F+qjMxdq4vnWoYaQiyRMvAliOBApZ07EItC6OEQjM6mKmQeiAk7eHFojY1YSLBtXGQtBuJtHB6ddM6w/Wtk3O8W0qJkK6EYUbP9eRvdHsO9ucaLhJtun+4376ZOhuP2sWFRL4/p8j5P7AQ0wahXU6TicIDyAERo01QedCUg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=T7zkeDAGnOQcMYph4tEAaHti6ByfmmWahNuniPhChE4=;
 b=j6VTeevhv8Ds29dPFOh6SBhLMorR+xVuecgRh9WcJH4ZH0ujXf60G4TWhQaXjABPGMpTcQFKxauBclqNWnoi/GQPVyO7Q1tPefsrQFwc/gU0F8vRGZoxTBCGYlcuDNCpYSZsoFGchwRyvPSLtjPFVb3m5aLumz0iUc1UOkulW7NxZMEzf3dZuQ5NNgTqWllOqx04ntH0SZAHELlkSONVrMQ5nD7BFEfI5HbCrhSOAZBagkqsoLMmRei1lWPuE85HTivVM1Rt5D3pPfhpeMCuV2yBAMH88g7sC6cZUOMlTHVCiUKJCJinnKfRgKMmNKsBJDJN8MJj/1DkQIQpzjuGPA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.62.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=T7zkeDAGnOQcMYph4tEAaHti6ByfmmWahNuniPhChE4=;
 b=UYbIbwfV4/YBCkzOo5HGokNt3G2dQAxDI3NNaWF8oX4LySY3/6UoZgTsvMZJ4BLmu+zEjKwlMfnI9mPHcSPGe3IYK2E06oJNOHRiWvLX7TzwL+K7RjWGiQu2OP0EvNhVvnZB0onzu8M4hWv40qdVNbzBqD4egCCxUVpFRUfeNRM=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.62.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.62.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.62.198; helo=xsj-pvapexch02.xlnx.xilinx.com;
From: Vikram Garhwal <fnu.vikram@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <julien@xen.org>, <bertrand.marquis@arm.com>,
	<volodymyr_babchuk@epam.com>, Vikram Garhwal <fnu.vikram@xilinx.com>, Wei Liu
	<wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>
Subject: [XEN][RFC PATCH v3 14/14] tools/xl: Add new xl command overlay for device tree overlay support
Date: Tue, 8 Mar 2022 11:47:04 -0800
Message-ID: <20220308194704.14061-15-fnu.vikram@xilinx.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220308194704.14061-1-fnu.vikram@xilinx.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 280302db-73eb-4084-5c27-08da013c85f7
X-MS-TrafficTypeDiagnostic: SN6PR02MB4720:EE_
X-Microsoft-Antispam-PRVS:
	<SN6PR02MB472095D65DC38B74500A2600BC099@SN6PR02MB4720.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.62.198;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:xsj-pvapexch02.xlnx.xilinx.com;PTR:unknown-62-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(8936002)(36756003)(2906002)(9786002)(316002)(508600001)(54906003)(6916009)(7696005)(5660300002)(6666004)(356005)(2616005)(47076005)(7636003)(36860700001)(82310400004)(40460700003)(1076003)(186003)(26005)(8676002)(4326008)(70206006)(70586007)(83380400001)(426003)(336012)(102446001);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 19:47:48.2655
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 280302db-73eb-4084-5c27-08da013c85f7
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.62.198];Helo=[xsj-pvapexch02.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DM3NAM02FT023.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR02MB4720

Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com>
---
 tools/xl/xl.h           |  4 ++++
 tools/xl/xl_cmdtable.c  |  6 ++++++
 tools/xl/xl_vmcontrol.c | 45 +++++++++++++++++++++++++++++++++++++++++
 3 files changed, 55 insertions(+)

diff --git a/tools/xl/xl.h b/tools/xl/xl.h
index c5c4bedbdd..604fd5bb94 100644
--- a/tools/xl/xl.h
+++ b/tools/xl/xl.h
@@ -97,6 +97,9 @@ struct save_file_header {
 
 #define SAVEFILE_BYTEORDER_VALUE ((uint32_t)0x01020304UL)
 
+#define XL_DT_OVERLAY_ADD                   1
+#define XL_DT_OVERLAY_REMOVE                2
+
 void save_domain_core_begin(uint32_t domid,
                             int preserve_domid,
                             const char *override_config_file,
@@ -139,6 +142,7 @@ int main_shutdown(int argc, char **argv);
 int main_reboot(int argc, char **argv);
 int main_list(int argc, char **argv);
 int main_vm_list(int argc, char **argv);
+int main_dt_overlay(int argc, char **argv);
 int main_create(int argc, char **argv);
 int main_config_update(int argc, char **argv);
 int main_button_press(int argc, char **argv);
diff --git a/tools/xl/xl_cmdtable.c b/tools/xl/xl_cmdtable.c
index 661323d488..5812d19db8 100644
--- a/tools/xl/xl_cmdtable.c
+++ b/tools/xl/xl_cmdtable.c
@@ -20,6 +20,12 @@
 #include "xl.h"
 
 const struct cmd_spec cmd_table[] = {
+    { "overlay",
+      &main_dt_overlay, 1, 1,
+      "Add/Remove a device tree overlay",
+      "add/remove <.dtbo>"
+      "-h print this help\n"
+    },
     { "create",
       &main_create, 1, 1,
       "Create a domain from config file <filename>",
diff --git a/tools/xl/xl_vmcontrol.c b/tools/xl/xl_vmcontrol.c
index 435155a033..76b969dc33 100644
--- a/tools/xl/xl_vmcontrol.c
+++ b/tools/xl/xl_vmcontrol.c
@@ -1262,6 +1262,51 @@ int main_create(int argc, char **argv)
     return 0;
 }
 
+int main_dt_overlay(int argc, char **argv)
+{
+    const char *overlay_ops = argv[1];
+    const char *overlay_config_file = argv[2];
+    void *overlay_dtb = NULL;
+    int rc;
+    uint8_t op;
+    int overlay_dtb_size = 0;
+
+    if (overlay_ops == NULL) {
+        fprintf(stderr, "No overlay operation mode provided\n");
+        return ERROR_FAIL;
+    }
+
+    if (strcmp(overlay_ops, "add") == 0)
+        op = XL_DT_OVERLAY_ADD;
+    else if (strcmp(overlay_ops, "remove") == 0)
+        op = XL_DT_OVERLAY_REMOVE;
+    else {
+        fprintf(stderr, "Invalid dt overlay operation\n");
+        return ERROR_FAIL;
+    }
+
+    if (overlay_config_file) {
+        rc = libxl_read_file_contents(ctx, overlay_config_file,
+                                      &overlay_dtb, &overlay_dtb_size);
+
+        if (rc) {
+            fprintf(stderr, "failed to read the overlay device tree file %s\n",
+                    overlay_config_file);
+            free(overlay_dtb);
+            return ERROR_FAIL;
+        }
+    } else {
+        fprintf(stderr, "overlay dtbo file not provided\n");
+        return ERROR_FAIL;
+    }
+
+    rc = libxl_dt_overlay(ctx, overlay_dtb, overlay_dtb_size, op);
+    if (rc)
+        fprintf(stderr, "Overlay operation failed\n");
+
+    free(overlay_dtb);
+    return rc;
+}
 /*
  * Local variables:
  * mode: C
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 19:49:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 19:49:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287515.487624 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfpb-0004hS-Np; Tue, 08 Mar 2022 19:49:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287515.487624; Tue, 08 Mar 2022 19:49:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRfpb-0004hL-KC; Tue, 08 Mar 2022 19:49:15 +0000
Received: by outflank-mailman (input) for mailman id 287515;
 Tue, 08 Mar 2022 19:49:15 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=V7dW=TT=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nRfpa-0004gp-Vg
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 19:49:14 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org
 [2604:1380:4601:e00::1])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d450a296-9f18-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 20:49:13 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 76EE7B81D3F;
 Tue,  8 Mar 2022 19:49:12 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id BB1F8C340F5;
 Tue,  8 Mar 2022 19:49:10 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d450a296-9f18-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646768951;
	bh=MhfF0cS09iq6EtjeHIdgTWVEssMD6YdhH3cFEPK33FY=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=Ve5bDxeSsMIODH01x3gFsE+dTRgfO9AtXa1NNzosZKN+CQ6qHvlUhEuf4tN5UxqDq
	 kYMDNB7ComXmWlVoLuZbOUCYiZcnFPZuz+MByy1NHQAeoG8qIJM0QdqUrSaJRWGZkp
	 yQbzD1+eUIQBLpKXpdC+yFEJgMLRe2P7jZKJndIooMkWUR7bncnarhB49iJl+SLxU+
	 SwBlQI7T0weHrksUKkXance9yy2z4RC/+1mFstgMoVN+MxEoU5NOFabh4tvGd1eibd
	 zXrGdGK5ehcnCtNYkHW3+l1iS936n1Vq2uWRUVb9+Kv8QS44szG7xUnlVO/KXmxeE5
	 FQ0I7Hv+k/JHg==
Date: Tue, 8 Mar 2022 11:49:10 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Wei Chen <Wei.Chen@arm.com>
cc: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>, 
    "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, 
    Bertrand Marquis <Bertrand.Marquis@arm.com>, 
    Penny Zheng <Penny.Zheng@arm.com>, Henry Wang <Henry.Wang@arm.com>, 
    nd <nd@arm.com>
Subject: RE: Proposal for Porting Xen to Armv8-R64 - DraftA
In-Reply-To: <PAXPR08MB7420DDE732B24C541B254E699E099@PAXPR08MB7420.eurprd08.prod.outlook.com>
Message-ID: <alpine.DEB.2.22.394.2203081148410.3261@ubuntu-linux-20-04-desktop>
References: <PAXPR08MB7420A01809B84E04E196793F9E3D9@PAXPR08MB7420.eurprd08.prod.outlook.com> <04db7e8b-2f04-41d7-1deb-d8bda3625c04@xen.org> <PAXPR08MB7420BF1299A1577B98211C1A9E029@PAXPR08MB7420.eurprd08.prod.outlook.com> <1f0bba54-158b-d171-6f99-0c29e0547f8a@xen.org>
 <PAXPR08MB742067028155B11528C5CCA39E049@PAXPR08MB7420.eurprd08.prod.outlook.com> <PAXPR08MB7420827063D47932F428CEC89E089@PAXPR08MB7420.eurprd08.prod.outlook.com> <alpine.DEB.2.22.394.2203071348220.3261@ubuntu-linux-20-04-desktop>
 <PAXPR08MB7420DDE732B24C541B254E699E099@PAXPR08MB7420.eurprd08.prod.outlook.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Tue, 8 Mar 2022, Wei Chen wrote:
> > On Mon, 7 Mar 2022, Wei Chen wrote:
> > > > > On 01/03/2022 07:51, Wei Chen wrote:
> > > > > >>> ### 1.2. Xen Challenges with PMSA Virtualization
> > > > > >>> Xen is PMSA unaware Type-1 Hypervisor, it will need
> > modifications to
> > > > > run
> > > > > >>> with an MPU and host multiple guest OSes.
> > > > > >>>
> > > > > >>> - No MMU at EL2:
> > > > > >>>       - No EL2 Stage 1 address translation
> > > > > >>>           - Xen provides fixed ARM64 virtual memory layout as
> > basis
> > > > of
> > > > > >> EL2
> > > > > >>>             stage 1 address translation, which is not applicable
> > on
> > > > > MPU
> > > > > >> system,
> > > > > >>>             where there is no virtual addressing. As a result,
> > any
> > > > > >> operation
> > > > > >>>             involving transition from PA to VA, like ioremap,
> > needs
> > > > > >> modification
> > > > > >>>             on MPU system.
> > > > > >>>       - Xen's run-time addresses are the same as the link time
> > > > > addresses.
> > > > > >>>           - Enable PIC (position-independent code) on a real-
> > time
> > > > > target
> > > > > >>>             processor probably very rare.
> > > > > >>
> > > > > >> Aside the assembly boot code and UEFI stub, Xen already runs at
> > the
> > > > > same
> > > > > >> address as it was linked.
> > > > > >>
> > > > > >
> > > > > > But the difference is that, base on MMU, we can use the same link
> > > > > address
> > > > > > for all platforms. But on MPU system, we can't do it in the same
> > way.
> > > > >
> > > > > I agree that we currently use the same link address for all the
> > > > > platforms. But this is also a problem when using MMU because EL2 has
> > a
> > > > > single TTBR.
> > > > >
> > > > > At the moment we are switching page-tables with the MMU which is not
> > > > > safe. Instead we need to turn out the MMU off, switch page-tables
> > and
> > > > > then turn on the MMU. This means we need to have an identity mapping
> > of
> > > > > Xen in the page-tables. Assuming Xen is not relocated, the identity
> > > > > mapping may clash with Xen (or the rest of the virtual address map).
> > > > >
> > > >
> > > > Is this the same reason we create a dummy reloc section for EFI loader?
> > > >
> > > > > My initial idea was to enable PIC and update the relocation at boot
> > > > > time. But this is a bit cumbersome to do. So now I am looking to
> > have a
> > > > > semi-dynamic virtual layout and find some place to relocate part of
> > Xen
> > > > > to use for CPU bring-up.
> > > > >
> > > > > Anyway, my point is we possibly could look at PIC if that could
> > allow
> > > > > generic Xen image.
> > > > >
> > > >
> > > > I understand your concern. IMO, PIC is possible to do this, but
> > obviously,
> > > > it's not a small amount of work. And I want to hear some suggestions
> > from
> > > > Stefano, because he also has some solutions in previous thread.
> > > >
> > >
> > > Can you have a look at the PIC discussion between Julien and me?
> > > I think we may need some inputs from your view.
> > 
> > If we have to have a build-time device tree anyway, we could
> > automatically generate the link address, together with other required
> > addresses. There would little benefit to do PIC if we have to have a
> > build-time device tree in any case.
> > 
> > On the other hand, if we could get rid of the build-time device tree
> > altogether, then yes doing PIC provides some benefits. It would allow us
> > to have single Xen binary working on multiple Cortex-R boards. However,
> > I don't think that would be important from a user perspective. People
> > will not install Ubuntu on a Cortex-R and apt-get xen.  The target is
> > embedded: users will know from the start the board they will target, so
> > it would not be a problem for them to build Xen for a specific board.
> > ImageBuilder (or something like it) will still be required to generate
> > boot scripts and boot info. In other words, although it would be
> > convenient to produce a generic binary, it is not a must-have feature
> > and I would consider it low-priority compared to others.
> 
> I tend to agree with your opinion. We can get some benefit from PIC,
> but the priority may be low. We have encountered a problem when we're
> trying to use EFI loader to boot xen.efi on v8R. Due to lack of relocation
> capability, the EFI loader could not launch xen.efi on V8R. But Xen EFI
> boot capability is a requirement of Arm EBBR [1]. In order to support Xen
> EFI boot on V8R, may be we still need a partially supported PIC. Only some
> boot code support PIC to make EFI relocation happy. This boot code will
> help Xen to check its loaded address and relocate Xen image to Xen's
> run-time address if need.
> 
> How about we place PIC support to TODO list for further discussion,
> I don't think we can include so many items in day1 : ) 
> 
> [1]https://arm-software.github.io/ebbr/index.html

Sounds good to me :-)


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 20:32:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 20:32:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287564.487635 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRgVU-0002QT-U6; Tue, 08 Mar 2022 20:32:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287564.487635; Tue, 08 Mar 2022 20:32:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRgVU-0002QM-Qx; Tue, 08 Mar 2022 20:32:32 +0000
Received: by outflank-mailman (input) for mailman id 287564;
 Tue, 08 Mar 2022 20:32:31 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRgVT-0002QC-SY; Tue, 08 Mar 2022 20:32:31 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRgVT-00016K-PO; Tue, 08 Mar 2022 20:32:31 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRgVT-0007cb-Bw; Tue, 08 Mar 2022 20:32:31 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRgVT-0001qk-BR; Tue, 08 Mar 2022 20:32:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=aQHesQ5QjRYBU9OTmcfwTXOgMpY15Mv9fJh7T9LjW4k=; b=GEuM2JleR212VptigmMzvfFMj6
	Da1cXtp7yEWYrnOJnyL52naCbIR/suJgWWo6rxRBk36OkDajaIwHOxDJuk5BL4VWwPy+bNunoRvap
	vAfGkfmV272LMZozasCCXigsnYf/8GweECDJ+rBDGtaXD5RAc6vSV+Fw9/2HqmlJhClc=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168476-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168476: tolerable FAIL
X-Osstest-Failures:
    xen-unstable:test-amd64-i386-xl-qemuu-ovmf-amd64:guest-localmigrate/x10:fail:heisenbug
    xen-unstable:test-armhf-armhf-libvirt-raw:debian-di-install:fail:heisenbug
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=9d4a44380d273de22d5753883cbf5581795ff24d
X-Osstest-Versions-That:
    xen=9d4a44380d273de22d5753883cbf5581795ff24d
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 08 Mar 2022 20:32:31 +0000

flight 168476 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168476/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-i386-xl-qemuu-ovmf-amd64 18 guest-localmigrate/x10 fail pass in 168470
 test-armhf-armhf-libvirt-raw 12 debian-di-install          fail pass in 168470

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check fail in 168470 blocked in 168476
 test-armhf-armhf-libvirt-raw 14 migrate-support-check fail in 168470 never pass
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168470
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168470
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168470
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168470
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168470
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168470
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168470
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168470
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168470
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168470
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168470
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  9d4a44380d273de22d5753883cbf5581795ff24d
baseline version:
 xen                  9d4a44380d273de22d5753883cbf5581795ff24d

Last test of basis   168476  2022-03-08 09:45:55 Z    0 days
Testing same since                          (not found)         0 attempts

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          fail    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 fail    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Published tested tree is already up to date.



From xen-devel-bounces@lists.xenproject.org Tue Mar 08 21:03:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 21:03:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287577.487645 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRgzN-0006S3-Hx; Tue, 08 Mar 2022 21:03:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287577.487645; Tue, 08 Mar 2022 21:03:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRgzN-0006Rw-F1; Tue, 08 Mar 2022 21:03:25 +0000
Received: by outflank-mailman (input) for mailman id 287577;
 Tue, 08 Mar 2022 21:03:24 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRgzM-0006Rk-7u; Tue, 08 Mar 2022 21:03:24 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRgzM-0001c6-4D; Tue, 08 Mar 2022 21:03:24 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRgzL-0008T2-Pq; Tue, 08 Mar 2022 21:03:23 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRgzL-00005h-PN; Tue, 08 Mar 2022 21:03:23 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=RurQPVKgGfuxl0xBGhztZc90AQqsxT3xxnRgv4SHjWI=; b=1Fs3iZQYf5FGXiJu9Xbm78x4yc
	ca3eLbvB6+hzjOmzq9Hc9b2asmXO42bN0eHPtCwl8D1PhyrfqOD4OdTiywZOmWRgjtJjFlsYDRk6M
	qoGrXIpUdNTk9KBpxpP4A7hn1GOGdDT8b/BJjDOyZJQb8a6QIttK+Ua6YHJmUnBCU7BQ=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168489-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168489: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=56530dec1105f17455752675e4c90fb859c64836
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 08 Mar 2022 21:03:23 +0000

flight 168489 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168489/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 56530dec1105f17455752675e4c90fb859c64836
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    8 days
Failing since        168258  2022-03-01 01:55:31 Z    7 days   81 attempts
Testing same since   168489  2022-03-08 19:42:15 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 493 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 08 21:39:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 08 Mar 2022 21:39:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287587.487657 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRhYG-0001j4-2e; Tue, 08 Mar 2022 21:39:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287587.487657; Tue, 08 Mar 2022 21:39:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRhYF-0001ix-Ui; Tue, 08 Mar 2022 21:39:27 +0000
Received: by outflank-mailman (input) for mailman id 287587;
 Tue, 08 Mar 2022 21:39:27 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fBt2=TT=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nRhYE-0001ir-MX
 for xen-devel@lists.xenproject.org; Tue, 08 Mar 2022 21:39:27 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 38640293-9f28-11ec-8539-5f4723681683;
 Tue, 08 Mar 2022 22:39:24 +0100 (CET)
Received: from pps.filterd (m0246631.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 228LDuVo027923; 
 Tue, 8 Mar 2022 21:38:36 GMT
Received: from userp3030.oracle.com (userp3030.oracle.com [156.151.31.80])
 by mx0b-00069f02.pphosted.com with ESMTP id 3ekxn2gc2b-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Tue, 08 Mar 2022 21:38:36 +0000
Received: from pps.filterd (userp3030.oracle.com [127.0.0.1])
 by userp3030.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 228LaPoO120217;
 Tue, 8 Mar 2022 21:38:35 GMT
Received: from nam11-bn8-obe.outbound.protection.outlook.com
 (mail-bn8nam11lp2177.outbound.protection.outlook.com [104.47.58.177])
 by userp3030.oracle.com with ESMTP id 3ekvyv9uh4-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Tue, 08 Mar 2022 21:38:35 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
 by BYAPR10MB2710.namprd10.prod.outlook.com (2603:10b6:a02:b5::27)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.19; Tue, 8 Mar
 2022 21:38:31 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::6d20:6694:a16:56f7]) by BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::6d20:6694:a16:56f7%3]) with mapi id 15.20.5038.027; Tue, 8 Mar 2022
 21:38:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 38640293-9f28-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=DhFtv67WuVLsRFNLT222tZVmBbgE3btJpR6JDsNZ8QI=;
 b=F7g+Ykh4y2SAP+9SwGCDIwemS8we9hH5tG+VkEC9K3yRz2WB9SfQ6ZzmfDJ+SQ6pt35p
 7PTEbFF8xivElUrKRDWDlmc6AamyVC8WJNyu3qzb1epAV96jHU0ZpzwX5SqUzlALettP
 K3vStBpQTfZfODZzReCRi/G9SpNT5MQUkiBork64AIOBBPKOQuj47TrbpZv+T/nKeeEK
 fbnsrRovHQLjS/3Vlu0F61lJcCncYN+SzsKStVmZaRJTfLVbDjbEJ/R5uUUZhf6c16af
 b34sWpT5W0aZzdfX5Dg+wJYA/4nX5zN2mircGRKSOsfeMX/V6o0G6f5FY1kAhhQRKLQR Cg== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=B4eUYEiuVLxfAIFoLTUKkT6HBej2c7szDrRteYJhwqZG7ul4gy2G8IWCtOgy5wYYJTSPsdwiW52UIjvk7Y/Vww7s0fEicgrl/S27DIWHzrTUEf8fhL6tBbG54R4zmozFWb3UPdQKpo/Y25/1tV5l1aahmaGw2MgsjU9RtFlI9MZiXpQuPjsalG1ykwa67flbHKLtBfXFkIozcVAeki6Q6cvBZRuqoC7ntJJMvjqhd/1YvCqyOE2Qe3SQpi/3jFb9e5v1SHObU4K7q8fQEvA5SDuz/Uuo108jEkYwkntjVN0P3s66aFE464dNVSbwDlZvNLwUiRVMTK0hLvlYHcUhVw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=DhFtv67WuVLsRFNLT222tZVmBbgE3btJpR6JDsNZ8QI=;
 b=ORl8TmJJ5gQ34Fw4sklC1lmnScrYpHAAZGpfhSKsUme+lYH6isd7FKfBi8j/iDnlZHGc/HqX071HUBS04NUPYITMVo9JlwyV/CEvc3KJFPc/oOpJrPUeWQMlPxFp/AsEaH8F642DgkgLSXNdmBtS8/d66iUwyFU8KqFnhiz6j6W8A6HrFocvjmbyzKFPT8rzhAc9GmaYQp5yt4316miKX+/kZebFtbYj85vHMVCrtVyg2ypSH3HWoETHqZkw2UntUQKmLFWfCmFjYAE6vusjKy96mjajBLFOyxEppW2o30pXDP81983MjvtCrbwln1yezuGpgBHeveEVKa6zplp7cg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=DhFtv67WuVLsRFNLT222tZVmBbgE3btJpR6JDsNZ8QI=;
 b=dweFUTWPrTn8YHb6QoS3/Czf8M9GYhX8dEH8+GYE7n/9g4TDEDKfJS08X6Ki8oBC7iDsxStZtBpeKd1O1fwcBGgTsB4fPbh3q4nGJ7FtV/WJj0fVhTd/KVNoxw6PEE/Kea6MwCrf/dlzZJy9EwuP5SBuJ8IZSmup7uZaIA3HybA=
Message-ID: <6a22ea1e-4823-5c3b-97ee-a29155404a0d@oracle.com>
Date: Tue, 8 Mar 2022 16:38:21 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH 11/12] swiotlb: merge swiotlb-xen initialization into
 swiotlb
Content-Language: en-US
To: Christoph Hellwig <hch@lst.de>, iommu@lists.linux-foundation.org
Cc: x86@kernel.org, Anshuman Khandual <anshuman.khandual@arm.com>,
        Tom Lendacky <thomas.lendacky@amd.com>,
        Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
        Stefano Stabellini <sstabellini@kernel.org>,
        Juergen Gross
 <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
        David Woodhouse <dwmw2@infradead.org>,
        Lu Baolu <baolu.lu@linux.intel.com>,
        Robin Murphy <robin.murphy@arm.com>,
        linux-arm-kernel@lists.infradead.org, xen-devel@lists.xenproject.org,
        linux-ia64@vger.kernel.org, linux-mips@vger.kernel.org,
        linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org,
        linux-s390@vger.kernel.org, linux-hyperv@vger.kernel.org,
        tboot-devel@lists.sourceforge.net, linux-pci@vger.kernel.org
References: <20220301105311.885699-1-hch@lst.de>
 <20220301105311.885699-12-hch@lst.de>
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
In-Reply-To: <20220301105311.885699-12-hch@lst.de>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: BYAPR01CA0036.prod.exchangelabs.com (2603:10b6:a02:80::49)
 To BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: a5497499-5231-4669-a72e-08da014bfd50
X-MS-TrafficTypeDiagnostic: BYAPR10MB2710:EE_
X-Microsoft-Antispam-PRVS: 
	<BYAPR10MB2710B19FF89408863850F5508A099@BYAPR10MB2710.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BLAPR10MB5009.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(53546011)(54906003)(31696002)(6666004)(86362001)(8676002)(66946007)(66476007)(66556008)(5660300002)(508600001)(7416002)(4326008)(6512007)(44832011)(316002)(8936002)(6506007)(6486002)(38100700002)(2616005)(26005)(31686004)(186003)(36756003)(83380400001)(2906002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?ZEs5MDBsbXY4eU9GSCtNNmRhaFNsK05lM1BCVEpNMmI2KzkyUUdKY2RWRWUv?=
 =?utf-8?B?Z01DaVc5UG4vWWNiSzBXK2VEVnZvU2k2OEZjOCsrRFJUL2g3NkFKdjFGcVdC?=
 =?utf-8?B?ZFd5Q3VNWUxaMHlyenVkNk1oU0Nrb3RqVUlwaGpTYlZOd2wwR1liYW5abmlz?=
 =?utf-8?B?cHlKYUxzNFNteVFjZkl2OG1sVXl2VlpuZmplRDYyTWZ2V1dZNmkvNVlsWDBa?=
 =?utf-8?B?SE5qSnNzZTFRMFdpajdTWUtGSk9RNzJPOTdOcitQQzc4dzNVelNJY000RW15?=
 =?utf-8?B?ZndjdmJ5Z2l4RjhzemVwRWM0RHNkY0o5c0FXRnJhS25jVlJZbzhVNUxPT2E4?=
 =?utf-8?B?ZjFyTkxLN21mTTJESFBLWnA3UzA4MnZMdjBhdEpIMUxNLy90WDZ2ZUNja3VW?=
 =?utf-8?B?M1h0eWNpbnU0bXBaNGVFK2Z0TUNnSklUZXRER2huLzZWb0ZqelZrVFBGZHVo?=
 =?utf-8?B?T1kxWjNmZ3V1SUIzUmptNmZXVDFBeG9hNzlvUW9VdXZzV2oxcy9Nck1UZElL?=
 =?utf-8?B?aVh5VTlhVHJLUGtYUVhoQVpMRVV4NmpDaHp3dktXRlRZcUxISnY0eEFiQUl1?=
 =?utf-8?B?QlBFSWN5VGg1ZUhxVEtwNEhtSGNtOUlSaVhNakZjNDYwRGpMSkRVMXlKSTZH?=
 =?utf-8?B?YVk1MHVmRHhZSWZDSTdLcXdRdDkxNklWTUlQeURkQWRReDRuNERCTGh2ejVp?=
 =?utf-8?B?RUcwckQvdTdsZXdaTDJJanExMFZCaWRHcVh1bjVVcCs3VVFzZitablpBQ1RM?=
 =?utf-8?B?WFRKN01EcWtEK3dHWklROU85OWJjcEhTMUNnejJ4U2JMRXJPUnJjUFJnL2Ju?=
 =?utf-8?B?aEw1ekhvbHJpYy9kckVHbTBITHQ1RFFzQTczM1JFTFluSlpEeHBRa1l6emJ5?=
 =?utf-8?B?MHFJYVVKYUEyODVVZEFmTHRjZCtOVkxWRUNoRUdldGF6ZXVRL1dJODVEcVpq?=
 =?utf-8?B?cklUK3R4K2w2U24vd04vVEJlVlplblhYZHNRL1FwRm9aaXpGR09mT1FnSUZ3?=
 =?utf-8?B?SENxZVZkRWw2bFJMbHFEYVJzSTBLbkZGTU9KOWdPbU4xc0o1dUxkOHgrcXpw?=
 =?utf-8?B?bEFLRm8vRk81SFMyem1USkZUUERoaGVodldicXl1VHc2UG9ISUNtMUJSRDBE?=
 =?utf-8?B?UnBiWjZjWU1qeXJyYmZiZHdieGQvZktCOFc2Sko5ZWtra1U0cWZwQUYwQUd0?=
 =?utf-8?B?eHZtaWJmbUdyRFR4c2FuZmt5NTN3TkVNcnM4SG53OXFQOHZSQWxKWjRGZFdZ?=
 =?utf-8?B?bE9RbXdnUEJXZWM3RkMvQU9RWDRXaTFDeWlKaFE5TTVDc0dIU05UTHN3YnNX?=
 =?utf-8?B?NmQ2NExrL0swUTlsWDZPbWFPbEROREZ2ekk3cGt6T1RWakl0K0NSejYvQlJq?=
 =?utf-8?B?THBCU0s3VXgvOW1QR1kzTzVIN29NTGZjWERaKzV5dGJ2SHE4VDk0VzBrS1d0?=
 =?utf-8?B?SWVFYmhHblVvdys5OGM1dkhETTdBOHJOVzZrSFgxREQ5b0V3NFJBb1Z4dnIy?=
 =?utf-8?B?dlFBTHZYZ0JaS0xQbE1IT0l1OTVDUlM2Z3NDRkJ4QmROTjEvcDdrNlk5UC8r?=
 =?utf-8?B?MGFLWmthOHJrR21BVnRWTTJqclR6eUFXMjh5Q3d1NG40d2FyZmFwOFRMYkYz?=
 =?utf-8?B?NS81ZHgxNkU4bEFjWHlPZzZhbnFNNUZuV1pzL09RQm5mbG9mZzdXUXVSL3ZI?=
 =?utf-8?B?bDVWRkZJQWVsMXM3NVNUd0lGbzQzc1RtaXZXUlpCZmhRRGd6VCtCMVZNR3Vk?=
 =?utf-8?B?SHl3WmRUbjM2ZVNndlB4MnQyelJMRVpwL0tQY1pPa0VqTTFWdStNdXQ2UTh0?=
 =?utf-8?B?RE9KMVlHVGJqWkpSTjkxbmdYS1o1bmJHbnU1TUg5bnBMbWVuek5MMWlXOUQ2?=
 =?utf-8?B?aFcycHpoYmNaQ0dQdllwb05YM3c5QTNsZy9YcmRpdlZDanZNMCswUUV3dFJM?=
 =?utf-8?B?a1BDZXdSRE1DY25IR0ZLb0xyRTJRQmVTNHBRSkphalU1KzJIei8reUxMZVM2?=
 =?utf-8?B?bGszTVpxY2xsMXVmcURFdWxUdENCUHlxSEVucGh3V1JxbFNBak56QmVQbkJI?=
 =?utf-8?B?Z1hQKzRhNGJkdmR2eGErQzBWZGpFYUkzYU81RHlhZFhmWnByanIvbkRoTU9p?=
 =?utf-8?B?dnE2SWFldGdRYkJVNStmR2pFMys2cllGQytMRkd5NTZpQUxHZnVUaXdINkhU?=
 =?utf-8?B?V0R4ajlSMW5tMUZjeEdpdklGb1ZXWi82dXFYSDUwcytUdUpHcS9MRnpwRzd1?=
 =?utf-8?B?T242c2tIcmZ5WkNkNXpNUitWNS9RPT0=?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a5497499-5231-4669-a72e-08da014bfd50
X-MS-Exchange-CrossTenant-AuthSource: BLAPR10MB5009.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Mar 2022 21:38:31.2786
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: vb92VElZb1vD5AEwKvnEjGDwvHfwNocegSuRX2xflLeDODXD1huAuFsmO0Pa3qhKq4HDCzfnKvJCrt0pwrw1AeQHidhPaPQDQ0TN3abVtA8=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR10MB2710
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10280 signatures=690848
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 malwarescore=0 mlxscore=0
 suspectscore=0 bulkscore=0 mlxlogscore=769 adultscore=0 spamscore=0
 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1
 engine=8.12.0-2202240000 definitions=main-2203080110
X-Proofpoint-ORIG-GUID: IPRsMW4fSjoQvfjcYGaso-sG-LdxRZL7
X-Proofpoint-GUID: IPRsMW4fSjoQvfjcYGaso-sG-LdxRZL7


On 3/1/22 5:53 AM, Christoph Hellwig wrote:
> Allow to pass a remap argument to the swiotlb initialization functions
> to handle the Xen/x86 remap case.  ARM/ARM64 never did any remapping
> from xen_swiotlb_fixup, so we don't even need that quirk.


Any chance this patch could be split? Lots of things are happening here and it's somewhat hard to review. (Patch 7 too BTW but I think I managed to get through it)


> diff --git a/arch/x86/kernel/pci-dma.c b/arch/x86/kernel/pci-dma.c
> index e0def4b1c3181..2f2c468acb955 100644
> --- a/arch/x86/kernel/pci-dma.c
> +++ b/arch/x86/kernel/pci-dma.c
> @@ -71,15 +71,12 @@ static inline void __init pci_swiotlb_detect(void)
>   #endif /* CONFIG_SWIOTLB */
>   
>   #ifdef CONFIG_SWIOTLB_XEN
> -static bool xen_swiotlb;
> -
>   static void __init pci_xen_swiotlb_init(void)
>   {
>   	if (!xen_initial_domain() && !x86_swiotlb_enable)
>   		return;


Now that there is a single call site for this routine I think this check can be dropped. We are only called here for xen_initial_domain()==true.


-boris


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 01:02:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 01:02:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287596.487668 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRki7-0005t2-Ly; Wed, 09 Mar 2022 01:01:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287596.487668; Wed, 09 Mar 2022 01:01:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRki7-0005si-Ic; Wed, 09 Mar 2022 01:01:51 +0000
Received: by outflank-mailman (input) for mailman id 287596;
 Wed, 09 Mar 2022 01:01:49 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRki5-00051v-JW; Wed, 09 Mar 2022 01:01:49 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRki5-0007kE-HA; Wed, 09 Mar 2022 01:01:49 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRki5-0005aj-2y; Wed, 09 Mar 2022 01:01:49 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRki4-0001oh-Vz; Wed, 09 Mar 2022 01:01:48 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=rZVxNa9Zk+82QDHRB3zLteSD/BzGqNAX4zAPHo38FvA=; b=sE10ZT+JTrlOG8pPgMHdmuSG8I
	Z1wSVYepVTPUieWmqS79hEq5CoilDbRz/Yfie/cirr57rpcOkiwETGEwbizrNOD1Xqu9a2v0Z498p
	0jZ7tGf/98wZAaBwDpVqctkcs1R54vycSWxnC8y2ldQhqPEA8ZI3sN1JuGehwM9Wenz8=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168487-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168487: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=8d03080d2a339840d3a59e0932a94f804e45110d
X-Osstest-Versions-That:
    xen=9d4a44380d273de22d5753883cbf5581795ff24d
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 09 Mar 2022 01:01:48 +0000

flight 168487 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168487/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  8d03080d2a339840d3a59e0932a94f804e45110d
baseline version:
 xen                  9d4a44380d273de22d5753883cbf5581795ff24d

Last test of basis   168463  2022-03-07 15:00:26 Z    1 days
Testing same since   168487  2022-03-08 19:02:58 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bertrand Marquis <bertrand.marquis@arm.com>
  Julien Grall <julien@xen.org>
  Rahul Singh <rahul.singh@arm.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   9d4a44380d..8d03080d2a  8d03080d2a339840d3a59e0932a94f804e45110d -> smoke


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 06:19:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 06:19:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287614.487679 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRper-0003Px-7K; Wed, 09 Mar 2022 06:18:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287614.487679; Wed, 09 Mar 2022 06:18:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRper-0003Pp-1u; Wed, 09 Mar 2022 06:18:49 +0000
Received: by outflank-mailman (input) for mailman id 287614;
 Wed, 09 Mar 2022 06:18:47 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=360z=TU=lst.de=hch@srs-se1.protection.inumbo.net>)
 id 1nRpep-0003Pf-Cl
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 06:18:47 +0000
Received: from verein.lst.de (verein.lst.de [213.95.11.211])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id c5d7925a-9f70-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 07:18:45 +0100 (CET)
Received: by verein.lst.de (Postfix, from userid 2407)
 id A4A1568AFE; Wed,  9 Mar 2022 07:18:40 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c5d7925a-9f70-11ec-8eba-a37418f5ba1a
Date: Wed, 9 Mar 2022 07:18:40 +0100
From: Christoph Hellwig <hch@lst.de>
To: Boris Ostrovsky <boris.ostrovsky@oracle.com>
Cc: Christoph Hellwig <hch@lst.de>, iommu@lists.linux-foundation.org,
	x86@kernel.org, Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org, linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org, tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: Re: [PATCH 11/12] swiotlb: merge swiotlb-xen initialization into
 swiotlb
Message-ID: <20220309061840.GA31435@lst.de>
References: <20220301105311.885699-1-hch@lst.de> <20220301105311.885699-12-hch@lst.de> <6a22ea1e-4823-5c3b-97ee-a29155404a0d@oracle.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <6a22ea1e-4823-5c3b-97ee-a29155404a0d@oracle.com>
User-Agent: Mutt/1.5.17 (2007-11-01)

On Tue, Mar 08, 2022 at 04:38:21PM -0500, Boris Ostrovsky wrote:
>
> On 3/1/22 5:53 AM, Christoph Hellwig wrote:
>> Allow to pass a remap argument to the swiotlb initialization functions
>> to handle the Xen/x86 remap case.  ARM/ARM64 never did any remapping
>> from xen_swiotlb_fixup, so we don't even need that quirk.
>
>
> Any chance this patch could be split? Lots of things are happening here and it's somewhat hard to review. (Patch 7 too BTW but I think I managed to get through it)

What would be your preferred split?

>> diff --git a/arch/x86/kernel/pci-dma.c b/arch/x86/kernel/pci-dma.c
>> index e0def4b1c3181..2f2c468acb955 100644
>> --- a/arch/x86/kernel/pci-dma.c
>> +++ b/arch/x86/kernel/pci-dma.c
>> @@ -71,15 +71,12 @@ static inline void __init pci_swiotlb_detect(void)
>>   #endif /* CONFIG_SWIOTLB */
>>     #ifdef CONFIG_SWIOTLB_XEN
>> -static bool xen_swiotlb;
>> -
>>   static void __init pci_xen_swiotlb_init(void)
>>   {
>>   	if (!xen_initial_domain() && !x86_swiotlb_enable)
>>   		return;
>
>
> Now that there is a single call site for this routine I think this check can be dropped. We are only called here for xen_initial_domain()==true.

The callsite just checks xen_pv_domain() and itself is called
unconditionally during initialization.


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 09:08:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 09:08:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287629.487690 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRsIf-0003To-OD; Wed, 09 Mar 2022 09:08:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287629.487690; Wed, 09 Mar 2022 09:08:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRsIf-0003Th-KV; Wed, 09 Mar 2022 09:08:05 +0000
Received: by outflank-mailman (input) for mailman id 287629;
 Wed, 09 Mar 2022 09:08:04 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRsIe-0003TX-6g; Wed, 09 Mar 2022 09:08:04 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRsIe-0000II-3D; Wed, 09 Mar 2022 09:08:04 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRsId-0006cP-Oq; Wed, 09 Mar 2022 09:08:03 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRsId-0004i7-JY; Wed, 09 Mar 2022 09:08:03 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Uj10cFNbAMND4RZhTLkj39kqRkv1msi7lXB9t+bEBZM=; b=pBMzbnZ5Bx9oGdcwnv6xfgR9I0
	AW0tPOMF5ZVh5tCkckPkfFFd66VHZfpAYi2/Lf7hhjzVtzTIEGRoMxmzv9RJBhkZtpXVnHj4kIQ2j
	2D4bSQi7gphuKFkgKsl1pW8THf6W8tqgDMSVHGgirDNnTk9AgQNOQhuRn2iHIVtaBv2g=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168482-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.14-testing test] 168482: regressions - trouble: broken/fail/pass
X-Osstest-Failures:
    xen-4.14-testing:test-armhf-armhf-xl-vhd:<job status>:broken:regression
    xen-4.14-testing:test-armhf-armhf-xl-vhd:host-install(5):broken:regression
    xen-4.14-testing:test-amd64-i386-xl-qemut-debianhvm-i386-xsm:debian-hvm-install:fail:regression
    xen-4.14-testing:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=ca304edd3ba8c19211107fd2e898249987557ce5
X-Osstest-Versions-That:
    xen=496fb0be938a30971af05ffe0e58bb65643a0971
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 09 Mar 2022 09:08:03 +0000

flight 168482 xen-4.14-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168482/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-armhf-armhf-xl-vhd         <job status>                 broken
 test-armhf-armhf-xl-vhd       5 host-install(5)        broken REGR. vs. 168061
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm 12 debian-hvm-install fail REGR. vs. 168061

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168061
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168061
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168061
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168061
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168061
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168061
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168061
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168061
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168061
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168061
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168061
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168061
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  ca304edd3ba8c19211107fd2e898249987557ce5
baseline version:
 xen                  496fb0be938a30971af05ffe0e58bb65643a0971

Last test of basis   168061  2022-02-08 18:37:46 Z   28 days
Testing same since   168482  2022-03-08 18:07:22 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bertrand Marquis <bertrand.marquis@arm.com>
  Julien Grall <julien@xen.org>
  Rahul Singh <rahul.singh@arm.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  fail    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      broken  
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job test-armhf-armhf-xl-vhd broken
broken-step test-armhf-armhf-xl-vhd host-install(5)

Not pushing.

------------------------------------------------------------
commit ca304edd3ba8c19211107fd2e898249987557ce5
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date:   Mon Mar 7 16:35:52 2022 +0000

    x86/spec-ctrl: Cease using thunk=lfence on AMD
    
    AMD have updated their Spectre v2 guidance, and lfence/jmp is no longer
    considered safe.  AMD are recommending using retpoline everywhere.
    
    Retpoline is incompatible with CET.  All CET-capable hardware has efficient
    IBRS (specifically, not something retrofitted in microcode), so use IBRS (and
    STIBP for consistency sake).
    
    This is a logical change on AMD, but not on Intel as the default calculations
    would end up with these settings anyway.  Leave behind a message if IBRS is
    found to be missing.
    
    Also update the default heuristics to never select THUNK_LFENCE.  This causes
    AMD CPUs to change their default to retpoline.
    
    Also update the printed message to include the AMD MSR_SPEC_CTRL settings, and
    STIBP now that we set it for consistency sake.
    
    This is part of XSA-398 / CVE-2021-26401.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
    Reviewed-by: Jan Beulich <jbeulich@suse.com>
    (cherry picked from commit 8d03080d2a339840d3a59e0932a94f804e45110d)

commit 7cebd77c80ce87f84c63a6043a5ad7115ccab9d5
Author: Bertrand Marquis <bertrand.marquis@arm.com>
Date:   Thu Feb 17 14:52:54 2022 +0000

    xen/arm: Allow to discover and use SMCCC_ARCH_WORKAROUND_3
    
    Allow guest to discover whether or not SMCCC_ARCH_WORKAROUND_3 is
    supported and create a fastpath in the code to handle guests request to
    do the workaround.
    
    The function SMCCC_ARCH_WORKAROUND_3 will be called by the guest for
    flushing the branch history. So we want the handling to be as fast as
    possible.
    
    As the mitigation is applied on every guest exit, we can check for the
    call before saving all context and return very early.
    
    This is part of XSA-398 / CVE-2022-23960.
    
    Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com>
    Reviewed-by: Julien Grall <julien@xen.org>
    (cherry picked from commit c0a56ea0fd92ecb471936b7355ddbecbaea3707c)

commit fc56dd212e4574c5fd77f830d077036b330dc1b5
Author: Rahul Singh <rahul.singh@arm.com>
Date:   Mon Feb 14 18:47:32 2022 +0000

    xen/arm: Add Spectre BHB handling
    
    This commit is adding Spectre BHB handling to Xen on Arm.
    The commit is introducing new alternative code to be executed during
    exception entry:
    - SMCC workaround 3 call
    - loop workaround (with 8, 24 or 32 iterations)
    - use of new clearbhb instruction
    
    Cpuerrata is modified by this patch to apply the required workaround for
    CPU affected by Spectre BHB when CONFIG_ARM64_HARDEN_BRANCH_PREDICTOR is
    enabled.
    
    To do this the system previously used to apply smcc workaround 1 is
    reused and new alternative code to be copied in the exception handler is
    introduced.
    
    To define the type of workaround required by a processor, 4 new cpu
    capabilities are introduced (for each number of loop and for smcc
    workaround 3).
    
    When a processor is affected, enable_spectre_bhb_workaround is called
    and if the processor does not have CSV2 set to 3 or ECBHB feature (which
    would mean that the processor is doing what is required in hardware),
    the proper code is enabled at exception entry.
    
    In the case where workaround 3 is not supported by the firmware, we
    enable workaround 1 when possible as it will also mitigate Spectre BHB
    on systems without CSV2.
    
    This is part of XSA-398 / CVE-2022-23960.
    
    Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com>
    Signed-off-by: Rahul Singh <rahul.singh@arm.com>
    Acked-by: Julien Grall <julien@xen.org>
    (cherry picked from commit 62c91eb66a2904eefb1d1d9642e3697a1e3c3a3c)

commit ee4b53ae1b95966fd9a491668f0eca73028925e1
Author: Bertrand Marquis <bertrand.marquis@arm.com>
Date:   Wed Feb 23 09:42:18 2022 +0000

    xen/arm: Add ECBHB and CLEARBHB ID fields
    
    Introduce ID coprocessor register ID_AA64ISAR2_EL1.
    Add definitions in cpufeature and sysregs of ECBHB field in mmfr1 and
    CLEARBHB in isar2 ID coprocessor registers.
    
    This is part of XSA-398 / CVE-2022-23960.
    
    Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com>
    Acked-by: Julien Grall <julien@xen.org>
    (cherry picked from commit 4b68d12d98b8790d8002fcc2c25a9d713374a4d7)

commit 6da7a845fb476ef7395185ec08a58c76ebd8c442
Author: Bertrand Marquis <bertrand.marquis@arm.com>
Date:   Tue Feb 15 10:39:47 2022 +0000

    xen/arm: move errata CSV2 check earlier
    
    CSV2 availability check is done after printing to the user that
    workaround 1 will be used. Move the check before to prevent saying to the
    user that workaround 1 is used when it is not because it is not needed.
    This will also allow to reuse install_bp_hardening_vec function for
    other use cases.
    
    Code previously returning "true", now returns "0" to conform to
    enable_smccc_arch_workaround_1 returning an int and surrounding code
    doing a "return 0" if workaround is not needed.
    
    This is part of XSA-398 / CVE-2022-23960.
    
    Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com>
    Reviewed-by: Julien Grall <julien@xen.org>
    (cherry picked from commit 599616d70eb886b9ad0ef9d6b51693ce790504ba)

commit 021466aa73caaa0c5983f02203678e649dd4d22c
Author: Bertrand Marquis <bertrand.marquis@arm.com>
Date:   Tue Feb 15 10:37:51 2022 +0000

    xen/arm: Introduce new Arm processors
    
    Add some new processor identifiers in processor.h and sync Xen
    definitions with status of Linux 5.17 (declared in
    arch/arm64/include/asm/cputype.h).
    
    This is part of XSA-398 / CVE-2022-23960.
    
    Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com>
    Acked-by: Julien Grall <julien@xen.org>
    (cherry picked from commit 35d1b85a6b43483f6bd007d48757434e54743e98)
(qemu changes not included)


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 09:30:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 09:30:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287636.487700 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRseW-0006iJ-Qb; Wed, 09 Mar 2022 09:30:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287636.487700; Wed, 09 Mar 2022 09:30:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRseW-0006iC-NX; Wed, 09 Mar 2022 09:30:40 +0000
Received: by outflank-mailman (input) for mailman id 287636;
 Wed, 09 Mar 2022 09:30:39 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=QNbA=TU=citrix.com=prvs=060736ad3=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRseU-0006i6-U8
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 09:30:39 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 9265799f-9f8b-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 10:30:36 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9265799f-9f8b-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646818236;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=wrb8EwCvtfaRtEy1Xz+zeCr3teKI9d0kzJIWyUlZhoM=;
  b=Hr5nxaIQePJqrpSTqxuPQIl+V47MrRAferymGMkeW+TytNVroJKtE8e0
   YImTarRt9XFd36FiKUNtTk+cJOIQRuHo0s8XfBH4qNHukgc1Jgza0WwlY
   XVMQIhaHbjuc4f/AI/zT9mpCZsBODLb4k4Bj4pAV//V4dt1+k1spFXpwZ
   U=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66186688
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:t9OJLKjyTX+vjdJ8hQEMTQcAX161lBAKZh0ujC45NGQN5FlHY01je
 htvCGCCP/nZY2OkfYp3bIWy9UMCuJfTz4cyQAdrrC5nRisb9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFvc4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YSwoHbTcgsVGaUBZKRNuAqFEwprkHGfq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bkmtnwjzDS+4vXLjIQrnQ5M8e1zA17ixLNaiAP
 ppHN2o/BPjGSyZwCl4IDo4/pfiTuUnBMCF3oQuYgYNitgA/yyQuieOwYbI5YOeiT8hPglyRo
 G6A+m3jGwwbL/SW0z/D+XWp7sfxmif8VJMXBaeP3Pdgi12OxUQeEBQTE1C8pJGRmkO4Ht5SN
 UEQ0i4vtrQpslymSMHnWB+1q2LCuQQTM/JPF8Uq5QfLzbDbiy6bDGUZSj9KaPQ9qdQ7Azct0
 zehnc7tBDFpmK2YTzSa7Lj8hSipJSEfIGsGZCkFZQgI+d/upMc0lB2nczp4OPfr1JuvQ2i2m
 m3U6nhl71kOsSIV/4663knXmRP3nMHIdDwl2QnVZEeG0xwsMeZJeLeUwVTc6P9BKqOQQV+Ao
 GUIlqCi0QweMX2evHfTGbtQRdlF897AaWSB2gA3Q/HN4hzwoybLQGxG3N1pyK6F2O4gcCShX
 kLcsBg5CHR7bCrzNv8fj25c5q0XIUnc+TbNC6i8gjlmOMEZmOq7EMdGPxD4M4fFyhRErE3HE
 c3HGftA9F5DYUid8BK4Rv0GzZggzT0kyGXYSPjTlkr7j+XAOCTFFetZbjNii9zVCove8G05F
 P4Fa6O3J+h3CrWiMkE7D6ZIRbz1EZTLLc+v8JEGHgJyCgFnBHsgG5fsLUAJIORYc1Buvr6Qp
 BmVAxYAoHKm3CGvAVjaOxhLNeK0Nb4i/C1TAMDZFQvxs5TVSd30t/l3mlpeVeRPydGPOtYvF
 qhbIZrcWqoTItkFkhxEBaTAQEVZXE3DrSqFPja/YSh5eJhlRgfT/cTjcBep/y4LZhdbf+Nny
 1F8/ms3maY+ejk=
IronPort-HdrOrdr: A9a23:n0Ql9qG2EExQGYf/pLqE0seALOsnbusQ8zAXPwsbc20xTiX4rb
 HMoB1173HJYVoqNU3IuOrwXJVoIkm9yXcW2+gs1bbLZniAhILAFugL0WKI+VLd8lrFnNK1u5
 0NT0EHMqyTMbEnt7ed3OEEeOxK/OW6
X-IronPort-AV: E=Sophos;i="5.90,167,1643691600"; 
   d="scan'208";a="66186688"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=jqRlv7ZCiKGyRajU1rYsPHEH2uZjU7vtXGmmUCamhoJgTVgGVA68uLM92UZ8kiP0cI/mbi27/PD5I/Ed1MEubLVUADeQQ92WEvwMD4b15HV+A6xT295ihT+8xolTSAMfy999wLqZ74Ch+NXeqi2vbAjt9zLXY+Q9NN6weoeGRiynwPCvvkQGqu40Sy6FRy7gbqSEEGpfTgYXnE2WlO0wOHoadGi5BVTLYwz3BUvfIqvUnxeLgGQVC3cZ3eOGOUY7MXVTBxbjTnK1Fx9Fko1CCiO3rllHvHIqRK0iV94jAblesK2UPAgbgG3GjljLmr92oOJ4SSRf5/7F0pVKrHNdnA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=IRUR0BQlI+2WAPs+USRy45dRGW17w2QpTl/ymfJaIGs=;
 b=Gpi+3IisQ/UO6uIzDpBPKHyT0xhXtRqKz5JGIMCQDUsF/7HVCEnaJFaWVCOjZgg16PCla9CcNrJGZkt9nonvcAWWv2R9dTSStdM5//B3fpUD4Qh0JOPg/4QeDeqdWdmVH49l1QvvhAl3AMCWsxxIdFcmO3b+CTEUsHVH1UfrzE6k1H9DUyRkbgn+FQ53hLYQO9d9lMinHOEEFdgPAlWfVbjIc3F8Ka9ZIbK5BSBqyASl0KDH4dk5XbrBCgSi25lzHOYDKe07cWokPWHtOPtbTAnS/2iyB7GRIpvNe7pHpYYz1xQhPa+NUaeqrNF16uhrDMBhVRtUDvtJv33fYTvo7g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=IRUR0BQlI+2WAPs+USRy45dRGW17w2QpTl/ymfJaIGs=;
 b=kW+UsiqKwT/00vo0G7nUSanClmP1YdjH8NLqWH/hfN9BEJkgVfx30CFRt/MSsy1xEf8CTV8lLzvOAoUfzGkCcjUk0pyk73jUGmWJ0s8sdWtq/GklrJjAlbbl1z5Z13LsY3gD53f5kjxNb6UqKeoEgGmphxDV/9dXBHFVi1IR/jY=
Date: Wed, 9 Mar 2022 10:30:24 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v3 2/2] livepatch: set -f{function,data}-sections
 compiler option
Message-ID: <YihzsHCgjVd0g4b5@Air-de-Roger>
References: <20220308134924.83616-1-roger.pau@citrix.com>
 <20220308134924.83616-3-roger.pau@citrix.com>
 <c35415ef-b3c1-cc1c-2fb2-aa2de2602cd5@suse.com>
 <YidsSmPV1Pqulp+h@Air-de-Roger>
 <9cce44ca-3e31-bc13-3c56-2811efc36d5b@suse.com>
 <YieHVbKjtXY8vpOn@Air-de-Roger>
 <d400722d-d5a2-5bc6-8c16-be1d8e8ee046@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <d400722d-d5a2-5bc6-8c16-be1d8e8ee046@suse.com>
X-ClientProxiedBy: LO4P123CA0161.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:188::22) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0cafa82e-a3f3-48c4-3fbb-08da01af7360
X-MS-TrafficTypeDiagnostic: MN2PR03MB5325:EE_
X-Microsoft-Antispam-PRVS: <MN2PR03MB53259891FF54F65B391737A08F0A9@MN2PR03MB5325.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(33716001)(6666004)(508600001)(9686003)(6512007)(38100700002)(85182001)(83380400001)(26005)(54906003)(186003)(6916009)(4326008)(316002)(6506007)(53546011)(66946007)(5660300002)(66476007)(6486002)(66556008)(8676002)(82960400001)(86362001)(2906002)(8936002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?bHRDWGZObXA4UmJIdWtnR01FNHNuRHduN0FuNXI0QVBBUVV1cC9yaWpNayt4?=
 =?utf-8?B?MXBNeCtyVVNKSVAyTGtBSWYrdEIrOWRSZ3QwWGVsaUtSNXBoUVdndlRxZEJs?=
 =?utf-8?B?OEZqOWp0TTBSSXlBcm1OK3FzS09nRU9yWUlNTVlwYjJubWRWdFRiVUFUeFlU?=
 =?utf-8?B?aWpCMmcrMkdxQVZqNVZjMVZjZXZhcTcxMW1pTlF2czJlZEs3cVR6MVppc0lR?=
 =?utf-8?B?djRINXVVWWEwbXM1eUlLSi84K1QwSFovdzgzb3lUUmtqQTRWbGpGdDhLV1Yv?=
 =?utf-8?B?bmVyZW1tdmhSQUVpbVZkaDdPZndwNHRoU0hRQ1kxNzNHTW1KdThmSkR6WjVR?=
 =?utf-8?B?YWNBRytrN25Ka29SWEJIeGJMbDE4S3g3S2FiWEpLWjBmdm02UVAwYjRtZXMw?=
 =?utf-8?B?dHVTK3d1ZkZ4L25WMndGZ1B1QmZxTDJiUmRPNWQxZHl0UU0xVzdTTTE5Zk5W?=
 =?utf-8?B?aEs0YjVkTmxTdlNVMlozRlJvZSsyd1BjOWo2UVk4MHFxU1haV1pnTEsraTZ2?=
 =?utf-8?B?Q1E0NTljTjRDZmhWQmx3MnpWdDJOL2NuUjVjUG1VbUhkVHlKSS9rZ2w4VmFn?=
 =?utf-8?B?T0FJVlNENlFTR25uYSsyaHV0Mi8xUnFERTBEeGI0QTg3SVBTLzV2SXlCalB5?=
 =?utf-8?B?UUpnVmllbDlucUN4ZDZIMXo3c1FTOXdrUzFRL1BROGxEY29VbzdwUXpLOHpt?=
 =?utf-8?B?ZWlWMnpHU3E3Z083KzhaWndQblZ6cXI5TE04K2JqdCtEMkN1YUwweURrZk5k?=
 =?utf-8?B?allVcDBPMkd3eXBXRHFCY0lQZnJaQUdJSGFDRFJCQzV6Q2xJTEdEOEZwL1Vn?=
 =?utf-8?B?aHd0cUllMFQwQmRFdWNlbWgrRUVON0tQaTNGNnNLRzJnU2tGZng1cmdRUm9s?=
 =?utf-8?B?Qmw4SGp2RklXd0d4UmZPV0xpV3M0KzZBbEtwRmE4WG02TUkveGRzNWljZXFz?=
 =?utf-8?B?RklYcTN4VTJJMGxLbEJwY3FIWEdTbmN1UDFRS0I3SXppaGo2VlZ1azVRUzc0?=
 =?utf-8?B?Zkt0UUFjQ1JDNmVpc200b2kyblYyY0V2aitaclRVSHFLcGQ0ekcyK1BuNE13?=
 =?utf-8?B?c2FzSDBrdDdnSURjY1BSeHNtSUsyYTRwQXhYNWxGam1wdmwwM0ZRMVVnRVkz?=
 =?utf-8?B?a0VOTGxLTmdTNXBYdVU0bTVpbXFsR3Jod0dVbVRJR3kxYXFJVStXem9GZlE2?=
 =?utf-8?B?RFk1bTFISkpUOGZaK3ZjOTVwdWpuRktoVi8yQmFhZjBjSkYxbTVMSTByZkFl?=
 =?utf-8?B?VjJ2L0xHMXYyMVBQbksxRE5qeU9GRjJOcmUzZXRvUFQxV1h1WS9aT2VHd1gy?=
 =?utf-8?B?bXFZekV5UFI3THVpZ1lLOUYyVndqcFVxZm5UVXJOYkpQcG4rT1ZsbUhkekM5?=
 =?utf-8?B?ZWxUdkF5T2FtN2QyenpKR1FubzBWSmJuQmpuaFlId25VQi94Mk1aa1ljdUVG?=
 =?utf-8?B?Ni9uVjZVVmJUaEI5bmVMRFBTVFNESmxLdWx6Qy9mV1RldDdVN2dReDRLTFJY?=
 =?utf-8?B?d3dVZC9UanZCSEVCNHBhbkVYTGR0dDlSRXNOTGpDQkJkWTZpMC94bjl2c3VL?=
 =?utf-8?B?aWJuMjVsc29keDlqQWNLeUs5bjNDQXozakhEdS9LK2oxWHoreFBzUytVMnBX?=
 =?utf-8?B?SkZVdVhiZXQvQmptNXB2bEdTY1gzcU90U2JLZTd2VGQ1YVVVdHZ6Z3M5bzBy?=
 =?utf-8?B?WGFvcVh6ZVhBZnNEc3RtTVI3TCtLaUNJRlFJV2lMcms0cHR5TG1MN0toSllu?=
 =?utf-8?B?eUtYMUZ1N0xLZFd6QjVVUzVhNzlKTnYyaS85cTUrL2NqRlFOWjNRaXoycEhK?=
 =?utf-8?B?SzFlaUFsQVZ4UCtFdEdMYjc1THEzR1RKK3kwVmpiZ1NPcjZDUVNNY1dhSkxG?=
 =?utf-8?B?dEo4R3FmcVp2TVJSbjZFNUtvZGpHaEx5c2l2VmI2aFh0cW4xQVNaaW1yaXJo?=
 =?utf-8?B?ZWYwS2JiM2E1alpJbXdEZDdiUE55dmpSRDBqVG15RS9yQkZEdHRmUXo2Q0k4?=
 =?utf-8?B?c2pIbkdKblU0QkZTSW1JRjJOQzVBOWd4Y3dyRXRmYnJacC93cUE2Q2tjRk5v?=
 =?utf-8?B?MDBYZlZXZG5qNTdrKzFsWWNzRkRVVitmQ1p2bDlzdlIrQjNMSnE5TytoeVY1?=
 =?utf-8?B?WGVHSDFkbENxNlNzTEE3VFZ2ejczdlYvWnZqTURSM2hWN25lVHVXSGxibzND?=
 =?utf-8?Q?IlUR/Crb/h7kzsf2XDe+Zp8=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 0cafa82e-a3f3-48c4-3fbb-08da01af7360
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 09:30:29.4345
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: nQ2NakxW5pFHFwvRtkaQ/9qTyfVJq8k5tiTdb+RAW6Sxot+L0WioT9/TO6vzLbxnYh2MNFYsQFEF4rGLhVxxQA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR03MB5325
X-OriginatorOrg: citrix.com

On Tue, Mar 08, 2022 at 05:58:49PM +0100, Jan Beulich wrote:
> On 08.03.2022 17:41, Roger Pau Monné wrote:
> > On Tue, Mar 08, 2022 at 04:13:55PM +0100, Jan Beulich wrote:
> >> On 08.03.2022 15:46, Roger Pau Monné wrote:
> >>> On Tue, Mar 08, 2022 at 03:09:17PM +0100, Jan Beulich wrote:
> >>>> On 08.03.2022 14:49, Roger Pau Monne wrote:
> >>>>> If livepatching support is enabled build the hypervisor with
> >>>>> -f{function,data}-sections compiler options, which is required by the
> >>>>> livepatching tools to detect changes and create livepatches.
> >>>>>
> >>>>> This shouldn't result in any functional change on the hypervisor
> >>>>> binary image, but does however require some changes in the linker
> >>>>> script in order to handle that each function and data item will now be
> >>>>> placed into its own section in object files. As a result add catch-all
> >>>>> for .text, .data and .bss in order to merge each individual item
> >>>>> section into the final image.
> >>>>>
> >>>>> The main difference will be that .text.startup will end up being part
> >>>>> of .text rather than .init, and thus won't be freed. .text.exit will
> >>>>> also be part of .text rather than dropped. Overall this could make the
> >>>>> image bigger, and package some .text code in a sub-optimal way.
> >>>>>
> >>>>> On Arm the .data.read_mostly needs to be moved ahead of the .data
> >>>>> section like it's already done on x86, so the .data.* catch-all
> >>>>> doesn't also include .data.read_mostly. The alignment of
> >>>>> .data.read_mostly also needs to be set to PAGE_SIZE so it doesn't end
> >>>>> up being placed at the tail of a read-only page from the previous
> >>>>> section. While there move the alignment of the .data section ahead of
> >>>>> the section declaration, like it's done for other sections.
> >>>>>
> >>>>> The benefit of having CONFIG_LIVEPATCH enable those compiler option
> >>>>> is that the livepatch build tools no longer need to fiddle with the
> >>>>> build system in order to enable them. Note the current livepatch tools
> >>>>> are broken after the recent build changes due to the way they
> >>>>> attempt to set  -f{function,data}-sections.
> >>>>>
> >>>>> Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
> >>>>
> >>>> Reviewed-by: Jan Beulich <jbeulich@suse.com>
> >>>>
> >>>>> --- a/xen/arch/x86/xen.lds.S
> >>>>> +++ b/xen/arch/x86/xen.lds.S
> >>>>> @@ -88,6 +88,9 @@ SECTIONS
> >>>>>         *(.text.unlikely .text.*_unlikely .text.unlikely.*)
> >>>>>  
> >>>>>         *(.text)
> >>>>> +#ifdef CONFIG_CC_SPLIT_SECTIONS
> >>>>> +       *(.text.*)
> >>>>> +#endif
> >>>>>         *(.text.__x86_indirect_thunk_*)
> >>>>>         *(.text.page_aligned)
> >>>>
> >>>> These last two now will not have any effect anymore when
> >>>> CC_SPLIT_SECTIONS=y. This may have undesirable effects on the
> >>>> overall size when there is more than one object with a
> >>>> .text.page_aligned contribution. In .data ...
> >>>
> >>> Agreed. I wondered whether to move those ahead of the main text
> >>> section, so likely:
> >>>
> >>>        *(.text.unlikely .text.*_unlikely .text.unlikely.*)
> >>>
> >>>        *(.text.page_aligned)
> >>>        *(.text.__x86_indirect_thunk_*)
> >>>        *(.text)
> >>> #ifdef CONFIG_CC_SPLIT_SECTIONS
> >>>        *(.text.*)
> >>> #endif
> >>
> >> Perhaps; I'm not really worried of .text.__x86_indirect_thunk_*,
> >> though. When adding .text.* that one can likely go away.
> >>
> >>> FWIW, Linux seems fine to package .text.page_aligned together with the
> >>> rest of .text using the .text.[0-9a-zA-Z_]* catch-all.
> >>
> >> There's no question this is functionally fine. The question is how
> >> many extra padding areas are inserted because of this.
> >>
> >>>>> @@ -292,9 +295,7 @@ SECTIONS
> >>>>>  
> >>>>>    DECL_SECTION(.data) {
> >>>>>         *(.data.page_aligned)
> >>>>> -       *(.data)
> >>>>> -       *(.data.rel)
> >>>>> -       *(.data.rel.*)
> >>>>> +       *(.data .data.*)
> >>>>>    } PHDR(text)
> >>>>
> >>>> ... this continues to be named first. I wonder whether we wouldn't
> >>>> want to use SORT_BY_ALIGNMENT (if available) instead in both places.
> >>>
> >>> We could use the command line option if available
> >>> (--sort-section=alignment) to sort all wildcard sections?
> >>
> >> Depends on the scope of the sorting that would result when enabled
> >> globally like this.
> > 
> > I'm not sure I'm following. Don't we generally want to sort by
> > alignment in order to avoid adding unnecessary padding as much as
> > possible?
> > 
> > For any wildcard sections we really don't care anymore how they are
> > sorted?
> 
> Sure. Question is whether sorting is limited to within any single
> *(...) construct, or whether it could extend to adjacent ones. IOW
> whether the command line option strictly is a replacement of adding
> SORT_BY_ALIGNMENT to every one of these constructs.

AFAICT the command line option will have the effect of setting the
sorting of any wildcard containing sections to use SORT_BY_ALIGNMENT.
Ie: .data.* would become SORT_BY_ALIGNMENT(.data.*):

*(.data SORT_BY_ALIGNMENT(.data.*))

I've taken a look at the binutils ld source and that seems to be the
case, any wildcard containing enum will get it's sorting set to by
alignment (but I'm not familiar with ld code so I might be missing
pieces).

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 09:42:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 09:42:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287639.487712 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRsq1-0008Dg-Ub; Wed, 09 Mar 2022 09:42:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287639.487712; Wed, 09 Mar 2022 09:42:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRsq1-0008DZ-QM; Wed, 09 Mar 2022 09:42:33 +0000
Received: by outflank-mailman (input) for mailman id 287639;
 Wed, 09 Mar 2022 09:42:31 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRspz-0008DP-RU; Wed, 09 Mar 2022 09:42:31 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRspz-0000rE-M4; Wed, 09 Mar 2022 09:42:31 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRspz-0008JS-3n; Wed, 09 Mar 2022 09:42:31 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRspz-0000kd-3L; Wed, 09 Mar 2022 09:42:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=+cAncOiGh2VvKcyB8wqgAaIf3tuX8acIsTnySoPb1gE=; b=eQCKUdFIWAYrJ4HMeRosArLC2h
	13THN00tEJwpaJVb6U5B7hTxvFFQgCpvhgxGcLfU4V8C4b7TUiOXoUTMBKa9+GacwqtoTFP0HsZ2o
	6jX8/1+I6+zIBUcJrpg5pwI7CbpNS6/wFoW0tUij6e61wZIpyURYN4+TAxnx+mLimnjE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168481-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.13-testing test] 168481: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-4.13-testing:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.13-testing:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-4.13-testing:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.13-testing:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-4.13-testing:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.13-testing:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.13-testing:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-4.13-testing:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.13-testing:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.13-testing:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.13-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.13-testing:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.13-testing:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-4.13-testing:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-4.13-testing:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-4.13-testing:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-4.13-testing:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.13-testing:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-4.13-testing:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-4.13-testing:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.13-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.13-testing:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.13-testing:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.13-testing:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.13-testing:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-4.13-testing:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.13-testing:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-4.13-testing:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-4.13-testing:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-4.13-testing:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-4.13-testing:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-4.13-testing:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=7b9814b250a5a28277bd0866d341a5cfc0f4c1ac
X-Osstest-Versions-That:
    xen=ce49a1d6d819f4587436b4ff73334d3676c1aab6
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 09 Mar 2022 09:42:31 +0000

flight 168481 xen-4.13-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168481/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 167817
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 167817
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 167817
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 167817
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 167817
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 167817
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 167817
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 167817
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 167817
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 167817
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 167817
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 167817
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  7b9814b250a5a28277bd0866d341a5cfc0f4c1ac
baseline version:
 xen                  ce49a1d6d819f4587436b4ff73334d3676c1aab6

Last test of basis   167817  2022-01-25 14:06:12 Z   42 days
Testing same since   168481  2022-03-08 18:07:22 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bertrand Marquis <bertrand.marquis@arm.com>
  Julien Grall <julien@xen.org>
  Rahul Singh <rahul.singh@arm.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   ce49a1d6d8..7b9814b250  7b9814b250a5a28277bd0866d341a5cfc0f4c1ac -> stable-4.13


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 10:08:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 10:08:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287664.487747 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRtFB-0002hV-Gn; Wed, 09 Mar 2022 10:08:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287664.487747; Wed, 09 Mar 2022 10:08:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRtFB-0002hO-Cb; Wed, 09 Mar 2022 10:08:33 +0000
Received: by outflank-mailman (input) for mailman id 287664;
 Wed, 09 Mar 2022 10:08:32 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=l1b7=TU=arm.com=Rahul.Singh@srs-se1.protection.inumbo.net>)
 id 1nRtFA-0002hI-5H
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 10:08:32 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on20618.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::618])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id de1fe077-9f90-11ec-8539-5f4723681683;
 Wed, 09 Mar 2022 11:08:29 +0100 (CET)
Received: from DB6P195CA0008.EURP195.PROD.OUTLOOK.COM (2603:10a6:4:cb::18) by
 AS8PR08MB6198.eurprd08.prod.outlook.com (2603:10a6:20b:29f::20) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Wed, 9 Mar
 2022 10:08:27 +0000
Received: from DB5EUR03FT043.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:4:cb:cafe::23) by DB6P195CA0008.outlook.office365.com
 (2603:10a6:4:cb::18) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.27 via Frontend
 Transport; Wed, 9 Mar 2022 10:08:27 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT043.mail.protection.outlook.com (10.152.20.236) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Wed, 9 Mar 2022 10:08:27 +0000
Received: ("Tessian outbound 741ca6c82739:v113");
 Wed, 09 Mar 2022 10:08:27 +0000
Received: from b7ff1ce5404b.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 EC92B02E-62D2-4054-8D2D-02D7C996756E.1; 
 Wed, 09 Mar 2022 10:08:16 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id b7ff1ce5404b.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Wed, 09 Mar 2022 10:08:16 +0000
Received: from AM5PR0801MB2020.eurprd08.prod.outlook.com
 (2603:10a6:203:4c::14) by AM0PR08MB4497.eurprd08.prod.outlook.com
 (2603:10a6:208:146::21) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Wed, 9 Mar
 2022 10:08:12 +0000
Received: from AM5PR0801MB2020.eurprd08.prod.outlook.com
 ([fe80::253a:4d6c:61c9:af60]) by AM5PR0801MB2020.eurprd08.prod.outlook.com
 ([fe80::253a:4d6c:61c9:af60%10]) with mapi id 15.20.5038.027; Wed, 9 Mar 2022
 10:08:12 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: de1fe077-9f90-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=1NqrgC1THxgaW5C43pa9FzKLabTMVFbpvPR9iPIaIW8=;
 b=N8678q6FFGjZIqBF6CHc68m7b+jasxU9MEwoUdZ/bFoN27xyq+eKH7t6+2nKbbkkCrD9jXfpgbQRu0oPJuQA8kBNCVhMPudk/5Lc1EkXPYrKlquUJStA+XqFxqcwYMeDH6DmajKFcIB0d7noNSNFlcP9bp1w9Eq79rJ8QmGJNNU=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 44af579204173c4e
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=lBV540qrPSxiKGWKFm3X7oXplc2djqWjqGZ1WDstXYMR9eeFrOk1fWcvVKa37TN8wHtrtRhl5x+bSNxrgUF1yH31L8tD7LUBYQSrk0dG19d36Ca+LRB1tzhqEqIpYWJOCt3JGlcm4+oU1rGsCogjtsqfqRG3/ott2EBeeme3v6QeCIp4DK0aASzSPPpt6UkKV4WZZJmOeyNRyQtmnSl9lSLVn9J98oJ8+m5yKciE5Qs1ktwUsdaK3pwwm+9ZllVwWEjgGYcY8eBGoKU7m9idQMnbx/7rw0iD4j1ja83lKYE49PIWBVeBYNPwHPBGhq9pysGNZuIsjaKt/QZJ9DOG/g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=1NqrgC1THxgaW5C43pa9FzKLabTMVFbpvPR9iPIaIW8=;
 b=M029LXHAqoID5CIiw8O3A1I7w1lhYAo9lh5d3sEnUNsLogX44X3Cm19npPNkOoQrWbyVXCVaa5Y3GljtM4lkH1xC6+BrB9BaoVwWycB07D5HWs1QeMfMdOWmXwHEjpydaT8WbvJqF6lNUOWgGS9xVMmEmrChU9dtnoYqqNLfjns1yGt3RWFzBAfuVtPqSQFuyoXEdj9dodfBzts7ndjLS+/oMzY0nBfhVw/1TYG/1WraUrqtuZiIeJYJ4wLNPluaf5KdWlSwMXbfyubcmJA6S738l9lONPkOnU5h/HUsl5ZdLoomG2aDJjMIEENcg/PspvR8CHH51EkAN4taDTSeYg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=1NqrgC1THxgaW5C43pa9FzKLabTMVFbpvPR9iPIaIW8=;
 b=N8678q6FFGjZIqBF6CHc68m7b+jasxU9MEwoUdZ/bFoN27xyq+eKH7t6+2nKbbkkCrD9jXfpgbQRu0oPJuQA8kBNCVhMPudk/5Lc1EkXPYrKlquUJStA+XqFxqcwYMeDH6DmajKFcIB0d7noNSNFlcP9bp1w9Eq79rJ8QmGJNNU=
From: Rahul Singh <Rahul.Singh@arm.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Bertrand Marquis <Bertrand.Marquis@arm.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, =?utf-8?B?Um9nZXIgUGF1IE1vbm7DqQ==?=
	<roger.pau@citrix.com>, Wei Liu <wl@xen.org>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>, Paul Durrant <paul@xen.org>
Subject: Re: [PATCH v2 1/3] xen/vpci: msix: move x86 specific code to x86 file
Thread-Topic: [PATCH v2 1/3] xen/vpci: msix: move x86 specific code to x86
 file
Thread-Index:
 AQHYIoBoEZVl6/zkE0mK7dGMpvA2Zqyi2K6AgAfEbQCAAAXLAIADUEkAgAD5MYCACAnKAA==
Date: Wed, 9 Mar 2022 10:08:12 +0000
Message-ID: <1205992D-ACE4-4E94-B554-3B14F6D9697E@arm.com>
References: <cover.1644937405.git.rahul.singh@arm.com>
 <4d2a727ba218468e4f347dc12ca051a0534fe205.1644937405.git.rahul.singh@arm.com>
 <6e188f87-7e4c-00ee-dd0c-373d42acec34@suse.com>
 <6BFB9B87-D8A1-442D-B4DC-18760C59D7BF@arm.com>
 <c11278f4-c902-0eb9-ac59-e27c0f2ba912@suse.com>
 <41F03A07-F8D6-423D-9E40-F4B89C611C87@arm.com>
 <175a55cc-70b4-4832-9a78-0db57a9ae4a4@suse.com>
In-Reply-To: <175a55cc-70b4-4832-9a78-0db57a9ae4a4@suse.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 1b7a4801-03ae-442c-10db-08da01b4c12e
x-ms-traffictypediagnostic:
	AM0PR08MB4497:EE_|DB5EUR03FT043:EE_|AS8PR08MB6198:EE_
X-Microsoft-Antispam-PRVS:
	<AS8PR08MB61984122C0D8E252612FFDF9FC0A9@AS8PR08MB6198.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM5PR0801MB2020.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(26005)(186003)(2906002)(66446008)(66946007)(316002)(2616005)(6916009)(54906003)(33656002)(8676002)(38070700005)(36756003)(71200400001)(508600001)(53546011)(6512007)(6506007)(64756008)(66476007)(66556008)(4326008)(122000001)(83380400001)(38100700002)(6486002)(76116006)(91956017)(5660300002)(8936002)(86362001)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <20F843390214B24B9C219C8F9C74529A@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB4497
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT043.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	c813de09-aee6-4c0b-faa1-08da01b4b886
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(6862004)(8676002)(86362001)(356005)(54906003)(316002)(70206006)(81166007)(70586007)(36756003)(6486002)(36860700001)(508600001)(40460700003)(4326008)(186003)(26005)(5660300002)(2616005)(83380400001)(33656002)(47076005)(8936002)(336012)(53546011)(6506007)(2906002)(82310400004)(6512007);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 10:08:27.3109
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 1b7a4801-03ae-442c-10db-08da01b4c12e
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT043.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR08MB6198

SGkgSmFuLA0KDQo+IE9uIDQgTWFyIDIwMjIsIGF0IDc6MjMgYW0sIEphbiBCZXVsaWNoIDxqYmV1
bGljaEBzdXNlLmNvbT4gd3JvdGU6DQo+IA0KPiBPbiAwMy4wMy4yMDIyIDE3OjMxLCBSYWh1bCBT
aW5naCB3cm90ZToNCj4+PiBPbiAxIE1hciAyMDIyLCBhdCAxOjU1IHBtLCBKYW4gQmV1bGljaCA8
amJldWxpY2hAc3VzZS5jb20+IHdyb3RlOg0KPj4+IE9uIDAxLjAzLjIwMjIgMTQ6MzQsIFJhaHVs
IFNpbmdoIHdyb3RlOg0KPj4+Pj4gT24gMjQgRmViIDIwMjIsIGF0IDI6NTcgcG0sIEphbiBCZXVs
aWNoIDxqYmV1bGljaEBzdXNlLmNvbT4gd3JvdGU6DQo+Pj4+PiBPbiAxNS4wMi4yMDIyIDE2OjI1
LCBSYWh1bCBTaW5naCB3cm90ZToNCj4+Pj4+PiAtLS0gYS94ZW4vYXJjaC94ODYvaHZtL3Ztc2ku
Yw0KPj4+Pj4+ICsrKyBiL3hlbi9hcmNoL3g4Ni9odm0vdm1zaS5jDQo+Pj4+Pj4gQEAgLTkyNSw0
ICs5MjUsMTA2IEBAIGludCB2cGNpX21zaXhfYXJjaF9wcmludChjb25zdCBzdHJ1Y3QgdnBjaV9t
c2l4ICptc2l4KQ0KPj4+Pj4+IA0KPj4+Pj4+ICAgcmV0dXJuIDA7DQo+Pj4+Pj4gfQ0KPj4+Pj4+
ICsNCj4+Pj4+PiAraW50IHZwY2lfbWFrZV9tc2l4X2hvbGUoY29uc3Qgc3RydWN0IHBjaV9kZXYg
KnBkZXYpDQo+Pj4+Pj4gK3sNCj4+Pj4+PiArICAgIHN0cnVjdCBkb21haW4gKmQgPSBwZGV2LT5k
b21haW47DQo+Pj4+Pj4gKyAgICB1bnNpZ25lZCBpbnQgaTsNCj4+Pj4+PiArDQo+Pj4+Pj4gKyAg
ICBpZiAoICFwZGV2LT52cGNpLT5tc2l4ICkNCj4+Pj4+PiArICAgICAgICByZXR1cm4gMDsNCj4+
Pj4+PiArDQo+Pj4+Pj4gKyAgICAvKiBNYWtlIHN1cmUgdGhlcmUncyBhIGhvbGUgZm9yIHRoZSBN
U0lYIHRhYmxlL1BCQSBpbiB0aGUgcDJtLiAqLw0KPj4+Pj4+ICsgICAgZm9yICggaSA9IDA7IGkg
PCBBUlJBWV9TSVpFKHBkZXYtPnZwY2ktPm1zaXgtPnRhYmxlcyk7IGkrKyApDQo+Pj4+Pj4gKyAg
ICB7DQo+Pj4+Pj4gKyAgICAgICAgdW5zaWduZWQgbG9uZyBzdGFydCA9IFBGTl9ET1dOKHZtc2l4
X3RhYmxlX2FkZHIocGRldi0+dnBjaSwgaSkpOw0KPj4+Pj4+ICsgICAgICAgIHVuc2lnbmVkIGxv
bmcgZW5kID0gUEZOX0RPV04odm1zaXhfdGFibGVfYWRkcihwZGV2LT52cGNpLCBpKSArDQo+Pj4+
Pj4gKyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB2bXNpeF90YWJsZV9zaXpl
KHBkZXYtPnZwY2ksIGkpIC0gMSk7DQo+Pj4+Pj4gKw0KPj4+Pj4+ICsgICAgICAgIGZvciAoIDsg
c3RhcnQgPD0gZW5kOyBzdGFydCsrICkNCj4+Pj4+PiArICAgICAgICB7DQo+Pj4+Pj4gKyAgICAg
ICAgICAgIHAybV90eXBlX3QgdDsNCj4+Pj4+PiArICAgICAgICAgICAgbWZuX3QgbWZuID0gZ2V0
X2dmbl9xdWVyeShkLCBzdGFydCwgJnQpOw0KPj4+Pj4+ICsNCj4+Pj4+PiArICAgICAgICAgICAg
c3dpdGNoICggdCApDQo+Pj4+Pj4gKyAgICAgICAgICAgIHsNCj4+Pj4+PiArICAgICAgICAgICAg
Y2FzZSBwMm1fbW1pb19kbToNCj4+Pj4+PiArICAgICAgICAgICAgY2FzZSBwMm1faW52YWxpZDoN
Cj4+Pj4+PiArICAgICAgICAgICAgICAgIGJyZWFrOw0KPj4+Pj4+ICsgICAgICAgICAgICBjYXNl
IHAybV9tbWlvX2RpcmVjdDoNCj4+Pj4+PiArICAgICAgICAgICAgICAgIGlmICggbWZuX3gobWZu
KSA9PSBzdGFydCApDQo+Pj4+Pj4gKyAgICAgICAgICAgICAgICB7DQo+Pj4+Pj4gKyAgICAgICAg
ICAgICAgICAgICAgY2xlYXJfaWRlbnRpdHlfcDJtX2VudHJ5KGQsIHN0YXJ0KTsNCj4+Pj4+PiAr
ICAgICAgICAgICAgICAgICAgICBicmVhazsNCj4+Pj4+PiArICAgICAgICAgICAgICAgIH0NCj4+
Pj4+PiArICAgICAgICAgICAgICAgIC8qIGZhbGx0aHJvdWdoLiAqLw0KPj4+Pj4+ICsgICAgICAg
ICAgICBkZWZhdWx0Og0KPj4+Pj4+ICsgICAgICAgICAgICAgICAgcHV0X2dmbihkLCBzdGFydCk7
DQo+Pj4+Pj4gKyAgICAgICAgICAgICAgICBncHJpbnRrKFhFTkxPR19XQVJOSU5HLA0KPj4+Pj4+
ICsgICAgICAgICAgICAgICAgICAgICAgICAiJXBwOiBleGlzdGluZyBtYXBwaW5nIChtZm46ICUi
IFBSSV9tZm4NCj4+Pj4+PiArICAgICAgICAgICAgICAgICAgICAgICAgInR5cGU6ICVkKSBhdCAl
I2x4IGNsb2JiZXJzIE1TSVggTU1JTyBhcmVhXG4iLA0KPj4+Pj4+ICsgICAgICAgICAgICAgICAg
ICAgICAgICAmcGRldi0+c2JkZiwgbWZuX3gobWZuKSwgdCwgc3RhcnQpOw0KPj4+Pj4+ICsgICAg
ICAgICAgICAgICAgcmV0dXJuIC1FRVhJU1Q7DQo+Pj4+Pj4gKyAgICAgICAgICAgIH0NCj4+Pj4+
PiArICAgICAgICAgICAgcHV0X2dmbihkLCBzdGFydCk7DQo+Pj4+Pj4gKyAgICAgICAgfQ0KPj4+
Pj4+ICsgICAgfQ0KPj4+Pj4+ICsNCj4+Pj4+PiArICAgIHJldHVybiAwOw0KPj4+Pj4+ICt9DQo+
Pj4+PiANCj4+Pj4+IC4uLiBub3RoaW5nIGluIHRoaXMgZnVuY3Rpb24gbG9va3MgdG8gYmUgeDg2
LXNwZWNpZmljLCBleGNlcHQgbWF5YmUNCj4+Pj4+IGZ1bmN0aW9ucyBsaWtlIGNsZWFyX2lkZW50
aXR5X3AybV9lbnRyeSgpIG1heSBub3QgY3VycmVudGx5IGJlIGF2YWlsYWJsZQ0KPj4+Pj4gb24g
QXJtLiBCdXQgdGhpcyBkb2Vzbid0IG1ha2UgdGhlIGNvZGUgeDg2LXNwZWNpZmljLg0KPj4+PiAN
Cj4+Pj4gSSB3aWxsIG1heWJlIGJlIHdyb25nIGJ1dCB3aGF0IEkgdW5kZXJzdGFuZCBmcm9tIHRo
ZSBjb2RlIGlzIHRoYXQgZm9yIHg4NiANCj4+Pj4gaWYgdGhlcmUgaXMgbm8gcDJtIGVudHJpZXMg
c2V0dXAgZm9yIHRoZSByZWdpb24sIGFjY2Vzc2VzIHRvIHRoZW0gd2lsbCBiZSB0cmFwcGVkIA0K
Pj4+PiBpbnRvIHRoZSBoeXBlcnZpc29yIGFuZCBjYW4gYmUgaGFuZGxlZCBieSBzcGVjaWZpYyBN
TUlPIGhhbmRsZXIuDQo+Pj4+IA0KPj4+PiBCdXQgZm9yIEFSTSB3aGVuIHdlIGFyZSByZWdpc3Rl
cmluZyB0aGUgTU1JTyBoYW5kbGVyIHdlIGhhdmUgdG8gcHJvdmlkZSANCj4+Pj4gdGhlIEdQQSBh
bHNvIGZvciB0aGUgTU1JTyBoYW5kbGVyLiANCj4+PiANCj4+PiBRdWVzdGlvbiBpczogSXMgdGhp
cyBqdXN0IGFuIGVmZmVjdCByZXN1bHRpbmcgZnJvbSBkaWZmZXJlbnQgaW1wbGVtZW50YXRpb24s
DQo+Pj4gb3IgYW4gaW5oZXJlbnQgcmVxdWlyZW1lbnQ/IEluIHRoZSBmb3JtZXIgY2FzZSwgaGFy
bW9uaXppbmcgdGhpbmdzIG1heSBiZSBhbg0KPj4+IGFsdGVybmF0aXZlIG9wdGlvbi4NCj4+IA0K
Pj4gVGhpcyBpcyBhbiBpbmhlcmVudCByZXF1aXJlbWVudCB0byBwcm92aWRlIGEgR1BBIHdoZW4g
cmVnaXN0ZXJpbmcgdGhlIE1NSU8gaGFuZGxlci4NCj4gDQo+IFNvIHlvdSBmaXJzdCBzYXkgeWVz
IHRvIG15ICJpbmhlcmVudCIgcXVlc3Rpb24sIGJ1dCB0aGVuIC4uLg0KPiANCj4+IEZvciB4ODYg
bXNpeCBtbWlvIGhhbmRsZXJzIGlzIHJlZ2lzdGVyZWQgaW4gaW5pdF9tc2l4KC4uKSBmdW5jdGlv
biBhcyB0aGVyZSBpcyBubyByZXF1aXJlbWVudA0KPj4gb24geDg2IHRvIHByb3ZpZGUgR1BBIHdo
ZW4gcmVnaXN0ZXJpbmcgdGhlIGhhbmRsZXIuIExhdGVyIHBvaW50IG9mIHRpbWUgd2hlbiBCQVJz
IGFyZSBjb25maWd1cmVkDQo+PiBhbmQgbWVtb3J5IGRlY29kaW5nIGJpdCBpcyBlbmFibGVkIHZw
Y2lfbWFrZV9tc2l4X2hvbGUoKSB3aWxsIGNsZWFyIHRoZSBpZGVudGl0eSBtYXBwaW5nIGZvciBt
c2l4DQo+PiBiYXNlIHRhYmxlIGFkZHJlc3Mgc28gdGhhdCBhY2Nlc3MgdG8gbXNpeCB0YWJsZXMg
d2lsbCBiZSB0cmFwcGVkLg0KPj4gDQo+PiBPbiBBUk0gd2UgbmVlZCB0byBwcm92aWRlIEdQQSB0
byByZWdpc3RlciB0aGUgbW1pbyBoYW5kbGVyIGFuZCBNU0lYIHRhYmxlIGJhc2UNCj4+IGFkZHJl
c3MgaXMgbm90IHZhbGlkIHdoZW4gaW5pdF9tc2l4KCkgaXMgY2FsbGVkIGFzIEJBUiB3aWxsIGJl
IGNvbmZpZ3VyZWQgbGF0ZXIgcG9pbnQgaW4gdGltZS4NCj4+IFRoZXJlZm9yZSBvbiBBUk0gbW1p
byBoYW5kbGVyIHdpbGwgYmUgcmVnaXN0ZXJlZCBpbiBmdW5jdGlvbiB2cGNpX21ha2VfbXNpeF9o
b2xlKCkgd2hlbg0KPj4gbWVtb3J5IGRlY29kaW5nIGJpdCBpcyBlbmFibGVkLg0KPiANCj4gLi4u
IHlvdSBleHBsYWluIGl0J3MgYW4gaW1wbGVtZW50YXRpb24gZGV0YWlsLiBJJ20gaW5jbGluZWQg
dG8NCj4gc3VnZ2VzdCB0aGF0IHg4NiBhbHNvIHBhc3MgdGhlIEdQQSB3aGVyZSBwb3NzaWJsZS4g
SGFuZGxlciBsb29rdXANCj4gcmVhbGx5IHdvdWxkIGJlbmVmaXQgZnJvbSBub3QgbmVlZGluZyB0
byBpdGVyYXRlIG92ZXIgYWxsIHJlZ2lzdGVyZWQNCj4gaGFuZGxlcnMsIHVudGlsIG9uZSBjbGFp
bXMgdGhlIGFjY2Vzcy4gVGhlIG9wdGltaXphdGlvbiBwYXJ0IG9mIHRoaXMNCj4gb2YgY291cnNl
IGRvZXNuJ3QgbmVlZCB0byBiZSBkb25lIHJpZ2h0IGhlcmUsIGJ1dCBoYXJtb25pemluZw0KPiBy
ZWdpc3Rlcl9tbWlvX2hhbmRsZXIoKSBiZXR3ZWVuIGJvdGggYXJjaGl0ZWN0dXJlcyB3b3VsZCBz
ZWVtIHRvIGJlDQo+IGEgcmVhc29uYWJsZSBwcmVyZXEgc3RlcC4NCg0KSSBhZ3JlZSB3aXRoIHlv
dSB0aGF0IGlmIHdlIG1vZGlmeSB0aGUgcmVnaXN0ZXJfbW1pb19oYW5kbGVyKCkgZm9yIHg4NiB0
byBwYXNzIEdQQQ0Kd2UgY2FuIGhhdmUgdGhlIGNvbW1vbiBjb2RlIGZvciB4ODYgYW5kIEFSTSBh
bmQgYWxzbyB3ZSBjYW4gb3B0aW1pemUgdGhlIE1NSU8NCnRyYXAgaGFuZGxpbmcgZm9yIHg4Ni4N
Cg0KV2hhdCBJIHVuZGVyc3RhbmQgZnJvbSB0aGUgY29kZSBpcyB0aGF0IG1vZGlmeWluZyB0aGUg
cmVnaXN0ZXJfbW1pb19oYW5kbGVyKCkgZm9yDQp4ODYgdG8gcGFzcyBHUEEgcmVxdWlyZXMgYSBs
b3Qgb2YgZWZmb3J0IGFuZCB0ZXN0aW5nLg0KDQpVbmZvcnR1bmF0ZWx5LCBJIGhhdmUgYW5vdGhl
ciBoaWdoIHByaW9yaXR5IHRhc2sgdGhhdCBJIGhhdmUgdG8gY29tcGxldGUgSSBkb27igJl0IGhh
dmUgdGltZQ0KdG8gb3B0aW1pc2UgdGhlIHJlZ2lzdGVyX21taW9faGFuZGxlcigpIGZvciB4ODYg
YXQgdGhpcyB0aW1lLg0KDQpJZiB5b3UgYXJlIG9rIGlmIHdlIGNhbiBtYWtlIHZwY2lfbWFrZV9t
c2l4X2hvbGUoKSBmdW5jdGlvbiBhcmNoLXNwZWNpZmljIHNvbWV0aGluZyBsaWtlDQp2cGNpX21z
aXhfYXJjaF9jaGVja19tbWlvKCkgYW5kIGdldCB0aGlzIHBhdGNoIG1lcmdlZC4NCg0KUmVnYXJk
cywNClJhaHVsDQo+IA0KPiBJJ20gYWRkaW5nIFBhdWwgdG8gQ2MgaW4gY2FzZSBoZSB3YW50cyB0
byBjb21tZW50LCBhcyB0aGlzIHdvdWxkDQo+IHRvdWNoIGhpcyB0ZXJyaXRvcnkgb24gdGhlIHg4
NiBzaWRlLg0KPiANCj4gSmFuDQo+IA0KDQo=


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 10:16:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 10:16:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287669.487757 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRtMu-00049B-9f; Wed, 09 Mar 2022 10:16:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287669.487757; Wed, 09 Mar 2022 10:16:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRtMu-000494-6e; Wed, 09 Mar 2022 10:16:32 +0000
Received: by outflank-mailman (input) for mailman id 287669;
 Wed, 09 Mar 2022 10:16:30 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=QNbA=TU=citrix.com=prvs=060736ad3=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRtMs-00048y-Lr
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 10:16:30 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id faac0bd4-9f91-11ec-8539-5f4723681683;
 Wed, 09 Mar 2022 11:16:28 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: faac0bd4-9f91-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646820988;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=E0CjDe5uKYEYDSvaiT+zPosQ6lvbgBG37goKydJ1mss=;
  b=VQsit1wLAyD+TtM67IqCOpZlht2+MHJw+ZHRr+4RTxhh7sgHcfKXUybE
   CNgWTyV4+KuxbSSwm+SwW28zU4ozpYu411HqMolI5oEYQxvqeHy3jQ5vZ
   VFLyc3bmXiqiT3v8XeUDYZrcGn2ZlEQ254v4xvRX0DASEnSqri7wvPskO
   M=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65724506
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:jlgJHKBd+ES+uRVW/9Xjw5YqxClBgxIJ4kV8jS/XYbTApDkm0GAEn
 DBMWGzUbvmLZjCneNxxPdyxphwEv5KEytA2QQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vh09Yy6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhhm
 IsdrIOuRjsKAbzrn7QWAz9HSSVHaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguw5K8bmJsUHs2xIxjDFF/c2B5vERs0m4PcGgWhq2p0WQ54yY
 eI5UzNVSU/BaidTK1k1Mo4FmO2DnWfwJmgwRFW9+vNsvjm7IBZK+KP2LNPfd9iORMNUtkWVv
 GTL+yL+GB5yHN6CzTuI9Fq8i+mJmjn0MKoKHaC83u5nhhuU3GN7IA0bUx63rOe0jma6WslDM
 AoE9yw2t68w+Ue3CN7nUHWQonSJoxodUNp4CPAh5UeGza+8yzyQBnUACAVAbtMmnMYsQHoh0
 Vrht8ztLSxitvuSU3313p2Zty+oMC4Za0oLfzYZTBAt6sPm5oo0i3ryos1LSfDvyIevQHepn
 m7M/HNWa6gvYdAjx/XlrUnYnT2QhafYaQll7VXxQTih11YsDGK6XLCA5V/e5PdGCY+WSFido
 XQJ8/SjAPAy4YKlz3LUHrhUdF29z7PcaWCH3wYzd3U032n1oxaekZZsDCaSzauDGuINYnfXb
 UDaomu9D7cDbSLxPcebj29cYvnGLJQM9/y4Dpg4jfIUO/CdkTNrGgk0OyZ8OEi3zCARfVkXY
 8vzTCpVJS9y5V5b5DS3XfwB9rQg2zozw2jeLbiikUj5juTCPi7JFetbWLdrUgzfxPnUyOky2
 4wDX/ZmNj0FCLGuCsUp2dV7wa82wYgTWsmt9p0/mh+rKQt6AmAxY8I9Mpt6E7GJa599z7+Sl
 lnkAxcw4AOm2RXvdFXbAlg+OeiHdcsu8hoG0dkEYA/AN44LOt30ss/ytvIfINEayQCU5aUtH
 qdfJJnYXKgnp/au0211UKQRZbdKLXyDrQmPIzCkcH44eZthTBbO4djqYk3k8yxmM8Z9nZFmy
 1F8/ms3maY+ejk=
IronPort-HdrOrdr: A9a23:1J0HRKAa4bsEkiLlHehAsceALOsnbusQ8zAXPh9KJiC9I/b1qy
 nxppkmPH/P6Qr4WBkb6Le90Y27MAnhHP9OkPIs1NKZMjUO11HYTr2KgbGSpgEIXheOi9K1tp
 0QDZSWaueAdGSS5PySiGLTc6dC/DDEytHRuQ639QYTcegAUdAH0+4WMHf+LqUgLzM2eabRWa
 Dsr/Zvln6FQzA6f867Dn4KU6zqoMDKrovvZVojCwQ84AeDoDu04PqieiLolSs2Yndq+/MP4G
 LFmwv26uGKtOy68AbV0yv2445NkNXs59NfDIini9QTKB/rlgG0Db4RE4GqjXQQmqWC+VwqmN
 7Dr1MJONly0WrYeiWPrR7ky2DboUITwk6n7WXdrWrooMT/Sj5/IdFGn5hlfhzQ7FdllM1g0Y
 pQtljp+6Z/PFflpmDQ9tLIXxZlmg6funw5i9MeiHRZTM83dKJRl4oC50lYea1wUR4S0LpXXt
 WGMfuspcq/KTihHjDkVyhUsZaRt00Ib1i7qhNogL3X79BU9EoJunfwivZv3Evoz6hNO6Ws19
 60Q5iAq4s+PfP+TZgNc9vpEvHHfFAkf3r3QRCvyBLcZeQ6B04=
X-IronPort-AV: E=Sophos;i="5.90,167,1643691600"; 
   d="scan'208";a="65724506"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Kbvi+66Sgc1qyfc3RGaqN9q0efesQTzMFKNyYutD8HYTpovhZeTL6pEGuzKY68S4L4K18L8dqIaDLSqNvawpmf38JFfB5TtN3qsD8SzVTw1dmCDe6Dl9Zxz1NOw5Dgr9eMa14XE5OHEZKxncqYYYPzDEkuiuLXpxF9pUUiLzk3BPDab06heyjEQCPPDOBki8cvAHEbnz5GwwVBwhdR3g0FiMltz1bQgf7HSW6TFs+2xOWLiSoOfw0QxtCqQLXaFhlS9eblD8EMlDgKipRopBcWDggx0PVpuciyW9I6KKSpmHxyqL4MhOD+hWIhxjLNP89LTqz80CrttUXtLefjzIIQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=buEnencRc6gurbkDDOchaLWP2QtAK1NPFLb2PKOhETE=;
 b=OyvB0lhwixbv1r0ypLdNEtLzH2dgFzS078GZAiSk8fEVz3X6noRi0Iy/W/5Z8xVkG1l5UfV+rgUnlJCzpRAcPJRpPBCslMrj9ilkGkvvetRUK3FPJ6Nkgoe6wB06/JdYmwkdYS2ZwD7AFpasKLNDk+MQJQRKR8a64cjZL6GcE2Fj01aDfmW1UYlDUqQYRp7qV6Bd4YmZDq66WACL+FBLyhTNd2IXg+M07TmbYLGV1M8QZVneTiiQGRDtJKPrNyO0wIi6E79oJSXmpC+TYy+cJSt+T8AnKCbQEO4Q5iabuKYqKzIRDoiAz+zEzMYtI4EGoArKQZ326+E4dX+oDuRoPQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=buEnencRc6gurbkDDOchaLWP2QtAK1NPFLb2PKOhETE=;
 b=AkaXGQTA6yUSLzW+1c6wfTIRrNgpvT+IcAP41gOtLmP9iu2zgqBb5FMyVHhoP7rUk8aGsLzhdHn/ns9PI7OI+/nAk5n7PYLevGo+6+yhfFbrRNJjaQ20cvcNtcoz0incoISzmG7SH27WPauA/yS7DFoK5cIt8FPsxGkKjSRkP6c=
Date: Wed, 9 Mar 2022 11:16:06 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Rahul Singh <Rahul.Singh@arm.com>
CC: Jan Beulich <jbeulich@suse.com>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, Andrew Cooper <andrew.cooper3@citrix.com>, Wei
 Liu <wl@xen.org>, George Dunlap <george.dunlap@citrix.com>, Julien Grall
	<julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Paul
 Durrant <paul@xen.org>
Subject: Re: [PATCH v2 1/3] xen/vpci: msix: move x86 specific code to x86 file
Message-ID: <Yih+ZjxKz0SMOXef@Air-de-Roger>
References: <cover.1644937405.git.rahul.singh@arm.com>
 <4d2a727ba218468e4f347dc12ca051a0534fe205.1644937405.git.rahul.singh@arm.com>
 <6e188f87-7e4c-00ee-dd0c-373d42acec34@suse.com>
 <6BFB9B87-D8A1-442D-B4DC-18760C59D7BF@arm.com>
 <c11278f4-c902-0eb9-ac59-e27c0f2ba912@suse.com>
 <41F03A07-F8D6-423D-9E40-F4B89C611C87@arm.com>
 <175a55cc-70b4-4832-9a78-0db57a9ae4a4@suse.com>
 <1205992D-ACE4-4E94-B554-3B14F6D9697E@arm.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <1205992D-ACE4-4E94-B554-3B14F6D9697E@arm.com>
X-ClientProxiedBy: LO2P123CA0083.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:138::16) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 13078490-51c7-447c-3d84-08da01b5d5d6
X-MS-TrafficTypeDiagnostic: SN6PR03MB3632:EE_
X-Microsoft-Antispam-PRVS: <SN6PR03MB3632DCE92F9702FAE7F11B068F0A9@SN6PR03MB3632.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(2906002)(508600001)(6512007)(8676002)(38100700002)(6666004)(66476007)(186003)(26005)(53546011)(9686003)(66556008)(6506007)(82960400001)(8936002)(86362001)(5660300002)(316002)(83380400001)(85182001)(6916009)(54906003)(33716001)(6486002)(4326008)(66946007)(67856001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?bTdITnMwbUZaVWJXWFh2T0FydEhZcTNzODJndkhqd1Y3cEc5MkNHeWtqN0FU?=
 =?utf-8?B?SDVCNVpBeVhTb3BFZTlnN2JvN3hpR0YrNStabTc5ajE4TysrYzVxdmtMQkYz?=
 =?utf-8?B?MTg2ampPNEIvb2lrWFdmUXZpVzhWVUl3THFLYmtyRGo5cW9rWHlwcGt0SU5M?=
 =?utf-8?B?OTFoNnRKRGlEaWpZMldETlNycDNqcGFXVGcvaXdwam5TVHNybmlPc1U3YU84?=
 =?utf-8?B?YW1PeUw3VGlZUVVIY1hWR1pXZmU3c3lqQnlGMVNCcUhVcVBhKytvZjU2Rm1Y?=
 =?utf-8?B?ZTlQWm9lYXl5TG9JNHZsbXUvaE5iTllaWkdWNmp6ak5DMG9Ed3NYY1hzU3VP?=
 =?utf-8?B?ckY0dFM3WFRpb0JMakUvSXlGMk9FRjE5d2JqUTdUTE92dHZtdmtSYjI5L1Vs?=
 =?utf-8?B?L2VSUnB6K3NjQUZPZ09qblZCZXpob0ZHTG85Z0w5N3NjUmtUL0xHbzlPMWh6?=
 =?utf-8?B?MTVHUWlTck5ZRVovcEVHL00yR2dVU0toN1NSUzNrODBjeGVYYXhXemtLZEVE?=
 =?utf-8?B?RmdCOUU1YTdOZTBwZGdLTm1BbzhJdVplcWdrRkFxdTd1NEhmclAxL0VMVi8w?=
 =?utf-8?B?RjZzWnlGN1F4QzQyY2l4N1hFU0p6Q0tOYTFUNjl0V3BreExwZDJhYUFJcUl5?=
 =?utf-8?B?UGMxS0hEVEtxNWs4VXFzVlpaNUtkdFlJSkdja3JTaVBYYlYyT3lmVzVlYmlz?=
 =?utf-8?B?Q3U0QjlFcnYvd3NUdkg3cnNZQ2twNlZDd3BJam1mb0RzTGxwQTJaMkEydUlH?=
 =?utf-8?B?d2VQZnF6bFpZWGxkUlVPZVQ5d3hPcng0NUpGQlVCL2h2ZEY4RENzd2FFQlF6?=
 =?utf-8?B?KzU2SGh4TXNEOWFnMXZITXMxZ3ZJdFdKa2x4VDR5QTQ5RElKTjJ5Nk9weEhE?=
 =?utf-8?B?V2E2bWFYTC9LeDkyVHJBZEZ1ZUZPay9sdnhtTEhDWmR2Nk5RYVhGWVNqcS83?=
 =?utf-8?B?cnhMSUIySTNQaGVXaDhjUGVYM3k2QjRtangrUjQvbUUvY1FDM2I2NXJBUXE4?=
 =?utf-8?B?eWE5eXJrTU1MY3B5c2FrblZvOXdWMUp3MEZOMWhrdlZBZGQ1ZFJCanh5T1Np?=
 =?utf-8?B?QVFnRTZyejlpMkJPM3lHOUJvZ2h6RW5kTjNZNXBxdWM3dkg3LzMvNGNBWHBR?=
 =?utf-8?B?N2xpc0hOd0o0eDNQT21jQlcvWXhDc25qMXpwL1ZYNWZBbno5YzI0MXlGQWdJ?=
 =?utf-8?B?SmYvWWFMYjhpUHhDRVRYMUlWUjFXMEJFRmI1RDNrbnlsSDRPRkx6MFVlb0ti?=
 =?utf-8?B?SzNoUGRQRGE2anQ5STVOWDBUK3hldXpPUU9ZL2pSVk5jT1JHMUM3K0J1dk1p?=
 =?utf-8?B?UUY2OXMvcUNlVTY2amhKNGJwUElqVzQwc0tSNS9BWjE1dWRhancwRUtRQ09s?=
 =?utf-8?B?aUZqWGladFhzaHEyRUtzalhCUW9EbVFyeG04anpMREZIQzJMQzNyS3dzWkhE?=
 =?utf-8?B?MEY1S2lOTWxUelVTaXRwYzM2TkE4MU44NkM5QkcxK1lKMEYxZHdmWHEwR0Ry?=
 =?utf-8?B?ck9zUTF6YWxmRUUwVmNRZ2tsU2RZbFlVOVRqdW9TNEhQTVRCcVpmUkw5UkJP?=
 =?utf-8?B?Zks3Wkxrd0JjOVhFSTZJMGlHeUlLbkd0bW1RMXp3TEluZjhKeWlidzY4dG15?=
 =?utf-8?B?b3FzaUtzV1RPTXN6TzlhSFlZUHNBdG5lL29CUFVMaFFQb2x6akovNkNRQ1F5?=
 =?utf-8?B?ZVJMWEx0YWZncEpxdHp5aFZWYlNkMVgxR2JFRkVxRkF6TEduTk10Ylc2SkFC?=
 =?utf-8?B?WThUc3hiVkVNREJoYnV1N1Z0cmpCU29ITS9TaXRTUWJqVjQ3THVGUExSOEpC?=
 =?utf-8?B?SEw0anJ4aGNQa3pHZThtOEU4b25CbzRwazYya3AvN3pjdlhTMVNBWjdIOWhG?=
 =?utf-8?B?YTJjby9BTlpJdk5jTTJ2UGtKTXlzQVBVTDBDQmtUb3BMeFFRTGNEVHFYazNQ?=
 =?utf-8?B?NXVkMlF5N1JyS2xzb3BKeGE4aS94MGlmdlJLODFLSTBNR0t0bXNCUlNTdmoy?=
 =?utf-8?B?VVY2MEFFSXRqRTJldXZqNDVNa1p3RVlmbzRRSUozMWwxV1UxWHg1N1FFanp2?=
 =?utf-8?B?NDBSZnJkSVdEZm1VRC9QWkU3ODk3eFdGeXlwNEJXaE1udTF0T3NtNUJBSk9I?=
 =?utf-8?B?UTE3emthdjZld2grZ1pzbkxLOUc4NWJHbVh4WHE4UEdLVTJUZm5nektFdGVU?=
 =?utf-8?Q?LlgvPBYXPvKOgndalfKgBYU=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 13078490-51c7-447c-3d84-08da01b5d5d6
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 10:16:11.5891
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: ADRkO53R+xrZ4XxolAb/lrxGZZsSWmo87V1TsXnFyfRix/XI7ic4j2IidFI74qgRcFKzo7tZAcig52hMahFiig==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR03MB3632
X-OriginatorOrg: citrix.com

On Wed, Mar 09, 2022 at 10:08:12AM +0000, Rahul Singh wrote:
> Hi Jan,
> 
> > On 4 Mar 2022, at 7:23 am, Jan Beulich <jbeulich@suse.com> wrote:
> > 
> > On 03.03.2022 17:31, Rahul Singh wrote:
> >>> On 1 Mar 2022, at 1:55 pm, Jan Beulich <jbeulich@suse.com> wrote:
> >>> On 01.03.2022 14:34, Rahul Singh wrote:
> >>>>> On 24 Feb 2022, at 2:57 pm, Jan Beulich <jbeulich@suse.com> wrote:
> >>>>> On 15.02.2022 16:25, Rahul Singh wrote:
> >>>>>> --- a/xen/arch/x86/hvm/vmsi.c
> >>>>>> +++ b/xen/arch/x86/hvm/vmsi.c
> >>>>>> @@ -925,4 +925,106 @@ int vpci_msix_arch_print(const struct vpci_msix *msix)
> >>>>>> 
> >>>>>>   return 0;
> >>>>>> }
> >>>>>> +
> >>>>>> +int vpci_make_msix_hole(const struct pci_dev *pdev)
> >>>>>> +{
> >>>>>> +    struct domain *d = pdev->domain;
> >>>>>> +    unsigned int i;
> >>>>>> +
> >>>>>> +    if ( !pdev->vpci->msix )
> >>>>>> +        return 0;
> >>>>>> +
> >>>>>> +    /* Make sure there's a hole for the MSIX table/PBA in the p2m. */
> >>>>>> +    for ( i = 0; i < ARRAY_SIZE(pdev->vpci->msix->tables); i++ )
> >>>>>> +    {
> >>>>>> +        unsigned long start = PFN_DOWN(vmsix_table_addr(pdev->vpci, i));
> >>>>>> +        unsigned long end = PFN_DOWN(vmsix_table_addr(pdev->vpci, i) +
> >>>>>> +                                     vmsix_table_size(pdev->vpci, i) - 1);
> >>>>>> +
> >>>>>> +        for ( ; start <= end; start++ )
> >>>>>> +        {
> >>>>>> +            p2m_type_t t;
> >>>>>> +            mfn_t mfn = get_gfn_query(d, start, &t);
> >>>>>> +
> >>>>>> +            switch ( t )
> >>>>>> +            {
> >>>>>> +            case p2m_mmio_dm:
> >>>>>> +            case p2m_invalid:
> >>>>>> +                break;
> >>>>>> +            case p2m_mmio_direct:
> >>>>>> +                if ( mfn_x(mfn) == start )
> >>>>>> +                {
> >>>>>> +                    clear_identity_p2m_entry(d, start);
> >>>>>> +                    break;
> >>>>>> +                }
> >>>>>> +                /* fallthrough. */
> >>>>>> +            default:
> >>>>>> +                put_gfn(d, start);
> >>>>>> +                gprintk(XENLOG_WARNING,
> >>>>>> +                        "%pp: existing mapping (mfn: %" PRI_mfn
> >>>>>> +                        "type: %d) at %#lx clobbers MSIX MMIO area\n",
> >>>>>> +                        &pdev->sbdf, mfn_x(mfn), t, start);
> >>>>>> +                return -EEXIST;
> >>>>>> +            }
> >>>>>> +            put_gfn(d, start);
> >>>>>> +        }
> >>>>>> +    }
> >>>>>> +
> >>>>>> +    return 0;
> >>>>>> +}
> >>>>> 
> >>>>> ... nothing in this function looks to be x86-specific, except maybe
> >>>>> functions like clear_identity_p2m_entry() may not currently be available
> >>>>> on Arm. But this doesn't make the code x86-specific.
> >>>> 
> >>>> I will maybe be wrong but what I understand from the code is that for x86 
> >>>> if there is no p2m entries setup for the region, accesses to them will be trapped 
> >>>> into the hypervisor and can be handled by specific MMIO handler.
> >>>> 
> >>>> But for ARM when we are registering the MMIO handler we have to provide 
> >>>> the GPA also for the MMIO handler. 

Right, but you still need those regions to not be mapped on the second
stage translation, or else no trap will be triggered and thus the
handlers won't run?

Regardless of whether the way to register the handlers is different on
Arm and x86, you still need to assure that the MSI-X related tables
are not mapped on the guest second stage translation, or else you are
just allowing guest access to the native ones.

So you do need this function on Arm in order to prevent hardware MSI-X
tables being accessed by the guest. Or are you suggesting it's
intended for Arm guest to access the native MSI-X tables?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 10:17:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 10:17:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287675.487768 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRtO9-0004lg-O0; Wed, 09 Mar 2022 10:17:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287675.487768; Wed, 09 Mar 2022 10:17:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRtO9-0004lZ-L7; Wed, 09 Mar 2022 10:17:49 +0000
Received: by outflank-mailman (input) for mailman id 287675;
 Wed, 09 Mar 2022 10:17:48 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=gSYI=TU=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRtO8-0004lR-9N
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 10:17:48 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2a699652-9f92-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 11:17:47 +0100 (CET)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur02lp2054.outbound.protection.outlook.com [104.47.4.54]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-8-E76_nBlrP9GysqIF1Lz1Dw-1; Wed, 09 Mar 2022 11:17:45 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PAXPR04MB8096.eurprd04.prod.outlook.com (2603:10a6:102:1c7::19)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Wed, 9 Mar
 2022 10:17:44 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Wed, 9 Mar 2022
 10:17:44 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2a699652-9f92-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646821066;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=t/gMHvXM1DSzQjhLY3u5lQ8uHgRWvz92nnasTau0o5U=;
	b=gHU/xgtkSmNknkF1+8Qs5Qx6kqx8iSIZ8bfsee6bfrs7t9Eb/lJiAG0Pq2g+rVinC7FY0M
	o6FHTmEpaMc68cDZn/oCbKKeazUvmgvAxq+ykgAZRH+xyWsDgGBlcy5CSsNI3GNWPYOCjr
	dzkWakJ05rdh8oCy/X424o981EZS3L8=
X-MC-Unique: E76_nBlrP9GysqIF1Lz1Dw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Uy8cJ4STCTlpsTKN6kEdXqyy03pefyuTiMzXlZTNWz9FJqagQBdaROMpS1Fa+PA5w8I8f1PPfJtY1lRn76j/kW8oEcx+Rw39uiWx7Mx643ihqu3vWoquIHER+1pyXCS6n2pfLEAXYcdjh/cD3Dc9k2TkU5L8hcx/Q1UnzHg7Vpc1kqQv50nByy3Bc0DHG3W0bz864HZxaAFyd5QynaR4Y/9AGS6NUXVSnhwjiwPwvNruZFHUqqt/4Pezuq6nyugINKnTv5tq37j1RZRJLgZx2E1pFJsNrl60PkMwSBmiShPvMuWzCzFqQF8YpibLwaJjKwyJSZTyu8dHiFlbjfOnJw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=XMs8XTQk+K6cRRuQPDefSTTSfTrFJkP5qBeI/gBQFRA=;
 b=LO4SWvmGAA51hPiD1HPcD4XxkCDXiaovAdSIvWjrf+jfWZ9lvYg/uHfMBVOIQUZB446rZrnfYmDRmrEH/TGkn5LMkKMqIUF06ILT7i0mKXpOYw1FFLZm1T/jLHXnCGc+BSV9Xg4l7oCn4crFuvWao9v3Dr2ndjqgLhbUrKzGGPcamEn5OFR+2IVEApp3/AbJ5WjigBUpCEjSUsAyOy/11a4sY0XuEv0p+xXYWiHqHWi88IDIHp0hCn4Z1QEpMP1U/Te2PVf3/RkOj/iFHpAHyIIt6P8OI2LqKXoxdr+2nj2aoG6aVQpYhgZNyKg60HDppQWKg9KE/0RxXBWEfvbwtQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <35ad9273-956b-86d6-55a3-c737575a7880@suse.com>
Date: Wed, 9 Mar 2022 11:17:41 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v2 1/3] xen/vpci: msix: move x86 specific code to x86 file
Content-Language: en-US
To: Rahul Singh <Rahul.Singh@arm.com>
CC: Bertrand Marquis <Bertrand.Marquis@arm.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>, Wei Liu
 <wl@xen.org>, George Dunlap <george.dunlap@citrix.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Paul Durrant <paul@xen.org>
References: <cover.1644937405.git.rahul.singh@arm.com>
 <4d2a727ba218468e4f347dc12ca051a0534fe205.1644937405.git.rahul.singh@arm.com>
 <6e188f87-7e4c-00ee-dd0c-373d42acec34@suse.com>
 <6BFB9B87-D8A1-442D-B4DC-18760C59D7BF@arm.com>
 <c11278f4-c902-0eb9-ac59-e27c0f2ba912@suse.com>
 <41F03A07-F8D6-423D-9E40-F4B89C611C87@arm.com>
 <175a55cc-70b4-4832-9a78-0db57a9ae4a4@suse.com>
 <1205992D-ACE4-4E94-B554-3B14F6D9697E@arm.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <1205992D-ACE4-4E94-B554-3B14F6D9697E@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR06CA0305.eurprd06.prod.outlook.com
 (2603:10a6:20b:45b::24) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ea136fb3-1195-4834-5e9b-08da01b60ce2
X-MS-TrafficTypeDiagnostic: PAXPR04MB8096:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB80960899CC167BD90B986B98B30A9@PAXPR04MB8096.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	gCmW0w0DrX/PtnmHKr2tzpI5wpXQc8FiJ/tW69TCOdnFvS96hVfrhGXUkY683UjutvHkAI8Kkr6hUvOOhaoB77E7P387eyBeztLK4ykti2w6ZZDTi6s1RT9tA33WpPwaYh5szDbTXyf+SRsSsaz8mY5uqmRC6Qa/73Rx9h4Rn04pPxk490oHKxGtY6ZP9gOsmVMmaWKu4cpvGaE7PXmNWO0PZaawz4k57Swcq9zu2daPp0LFgff7m2e3Sd78Z8DubZEBpV0jAiPDW4NBzTjlXMBJvGDw43EsTBajjK3tPhUUJlXdgTX4lmHWw5dQWqZVXK5mit7ZBE7tQELxNfNVaizJqcZk7w044izNl8a8DZatEThd8CksDyR2tk1TTmkz51h4cmrW6TjaNHYkcJTg4Y59v/RgaYlGojQBxd0Nd3RJDyWPyn0SIhmybcKjaL2UnKYYZQOCXPxC+D0/ENt1YwuQRKbQgwfsfLhrgdCqDoBPvk3veFNIzq/OLEquvBbfu1ayRSn+nFIaxZuxV+mQMgdB+IG03u4n+ku0OxinOhKy9h6QJh02z99c27xRPtnFMvjFipXcUxyXvdxHnvsm0iVPWBCKGodYjjPbI5qVjMkoGqThwmLN0K6IbPmH0dG6yRb+Y80+7VIfMUzsmcuT6pdG04e+t46hdz6FFAiXzc5NwItAsCmm51hD/YrbVCdNsG2M15x6vBDRnXXJKdDHYAQfQE3R/kUixPGEXRjpPKo=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(54906003)(6666004)(6506007)(8676002)(66476007)(316002)(66946007)(66556008)(4326008)(5660300002)(7416002)(2906002)(2616005)(186003)(6512007)(26005)(8936002)(31696002)(53546011)(83380400001)(38100700002)(86362001)(31686004)(508600001)(36756003)(6916009)(6486002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?ruiC34Na05+P8uVBkuccI22BpD5bnY22kkuXCi8Y8YmuNLr6Zw15VBQWePkK?=
 =?us-ascii?Q?utfu5vzwTZzQUpm5bLhG5Fb0MEx4WYqek5O+PwUh083NoIyGbjxNx3sz4L5c?=
 =?us-ascii?Q?dqy6MzcCaXPqPve7lRnXv/mu2ZZh8ncncVNtFm33m1yRSMKaTnzi9ewavQwS?=
 =?us-ascii?Q?IsnagHQ8upEdDb9pwWWgKCwqI1CskRZXX1sj085J+P8qGoYeO/P8tCfMjYSo?=
 =?us-ascii?Q?QTHZV4Xfo2wXjYFMUyTlYhQi7rosSfonWDZjgzEv5aa8OC2c64GaEU8n/2FO?=
 =?us-ascii?Q?pYVG1suuvX+YSaMP3un2BltqfhorJxmg2MYV+MURbmFmBY9sapOkT9k3+Amm?=
 =?us-ascii?Q?7KPA2BQOZUFuDppjrwBrcEzmlFdN1H7nY5b2O/ITKxeXpOiFiwsma5qzXoj6?=
 =?us-ascii?Q?+R5jxPsT0BnT2i6LGkrio5pyfpPTW8OqRIzc157t4hZibSlnnZgg8nY91jMv?=
 =?us-ascii?Q?5kk4uWRI6YgkTH4nCqcUYikoGyQCsiJvL/fRB3IwYigUx8m9Xjjj/i7VUS/x?=
 =?us-ascii?Q?wHuxVIXSSDDaOLTHo4ic9/YnOHjTJOeGWYwP67BhKlU389tyYlWAmWWcS0vT?=
 =?us-ascii?Q?8J37kSfa9IV7ifoKehpDCXEwXEa/Oncj6QMuAMKaB3oRpDDbG8RVK7K+0hHI?=
 =?us-ascii?Q?crSt6iYcTroZnR6fKVbMeb2WdnNTRRfVbmBwfv/5C0k0CYzbjzk+jR37ZK0a?=
 =?us-ascii?Q?3O7IO4hUmmVRfiGWHJwKjbhvx5RrnLxw/ObObYDBS9KSuS1F9mbiDSdfiuMe?=
 =?us-ascii?Q?LMxVeE11zER6yq/tUBrYU2AnCuXMs+5wIYkolWrXKydGjxU82eT25kxln4KN?=
 =?us-ascii?Q?I1/iVQxTFKx1ktuYCtKGiEM9q7Kvqfs+l5WXkiEojPNofj3uWxSUUJ6H3z26?=
 =?us-ascii?Q?2jBRRtXm5eWyL+gXMYiR47apFbiZ9gvGLTN7mQvex+qUi7Ewi71AchS/uQ56?=
 =?us-ascii?Q?D7K4faKcIiqwLvtQ1g0RNpoIvxf0ukqsRAi31Pa0WPjzNQZRAEo8swM7TICT?=
 =?us-ascii?Q?3TmoaYhVz3xyk+5sSw2w1jXL6oz6PvpN3z/uFYCyU62RahqCh60PIHlhz82e?=
 =?us-ascii?Q?szZN816NtmWhBKU5xXUIbSbG8O5py42tNNe7hcEtRqylGv0OMcWMt3YfjSvc?=
 =?us-ascii?Q?4QfTO2XqyFnwH9Wd7Qk8hX+JiBw9TaKg3TASeSzFUK/eqO6LLUkBWECcKSiD?=
 =?us-ascii?Q?GurACm0kpubRIUqN2t2KaWCJWYamWILcjd4Pw3NmYSa1wnNkTf/504ym1I54?=
 =?us-ascii?Q?QMxZITxLjzr3a+EO0pim7SulEUvGoUT7oI+RJrvdf+gqEuzAwghUvHAtldiO?=
 =?us-ascii?Q?YY3CUtKRcKg7vmSGSEF4nnEO63HD4C7LQ9Y9pp195TQuCXyTq0twBdtCzSHq?=
 =?us-ascii?Q?iegWlKq3qq21/CNPNQOf7TSDBkS4a99mBkbjZolThblm8j6rudiF4la+S1kp?=
 =?us-ascii?Q?W0CDT66hSfinVdnNzg7FQdfq0pNbOcrDM7iDny56YTnyf2zFLk1rZIK6tB48?=
 =?us-ascii?Q?pExE0EtHzCKBHptgKgJt0h5lBrhbW0GZV6J0DOUPO/QVDLivsW9bofjxJo7j?=
 =?us-ascii?Q?Mea3wGNk5QVVE1BoCBxWg3Ql+bVSbNLDJAF6hXxpj+zLEVj5983qfj9sLA/1?=
 =?us-ascii?Q?fEEQpgqz0Z7JuTc7KcBbuzY=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ea136fb3-1195-4834-5e9b-08da01b60ce2
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 10:17:44.0371
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 0C6xvutpX9TIStImXdINGvdB4qRWk9aIUWwwSoC5u1QaM/x4kJFE0YR23Ec/fdqVVk5IZjwh2+2VmXor+gJEsA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB8096

On 09.03.2022 11:08, Rahul Singh wrote:
> Hi Jan,
>=20
>> On 4 Mar 2022, at 7:23 am, Jan Beulich <jbeulich@suse.com> wrote:
>>
>> On 03.03.2022 17:31, Rahul Singh wrote:
>>>> On 1 Mar 2022, at 1:55 pm, Jan Beulich <jbeulich@suse.com> wrote:
>>>> On 01.03.2022 14:34, Rahul Singh wrote:
>>>>>> On 24 Feb 2022, at 2:57 pm, Jan Beulich <jbeulich@suse.com> wrote:
>>>>>> On 15.02.2022 16:25, Rahul Singh wrote:
>>>>>>> --- a/xen/arch/x86/hvm/vmsi.c
>>>>>>> +++ b/xen/arch/x86/hvm/vmsi.c
>>>>>>> @@ -925,4 +925,106 @@ int vpci_msix_arch_print(const struct vpci_ms=
ix *msix)
>>>>>>>
>>>>>>>   return 0;
>>>>>>> }
>>>>>>> +
>>>>>>> +int vpci_make_msix_hole(const struct pci_dev *pdev)
>>>>>>> +{
>>>>>>> +    struct domain *d =3D pdev->domain;
>>>>>>> +    unsigned int i;
>>>>>>> +
>>>>>>> +    if ( !pdev->vpci->msix )
>>>>>>> +        return 0;
>>>>>>> +
>>>>>>> +    /* Make sure there's a hole for the MSIX table/PBA in the p2m.=
 */
>>>>>>> +    for ( i =3D 0; i < ARRAY_SIZE(pdev->vpci->msix->tables); i++ )
>>>>>>> +    {
>>>>>>> +        unsigned long start =3D PFN_DOWN(vmsix_table_addr(pdev->vp=
ci, i));
>>>>>>> +        unsigned long end =3D PFN_DOWN(vmsix_table_addr(pdev->vpci=
, i) +
>>>>>>> +                                     vmsix_table_size(pdev->vpci, =
i) - 1);
>>>>>>> +
>>>>>>> +        for ( ; start <=3D end; start++ )
>>>>>>> +        {
>>>>>>> +            p2m_type_t t;
>>>>>>> +            mfn_t mfn =3D get_gfn_query(d, start, &t);
>>>>>>> +
>>>>>>> +            switch ( t )
>>>>>>> +            {
>>>>>>> +            case p2m_mmio_dm:
>>>>>>> +            case p2m_invalid:
>>>>>>> +                break;
>>>>>>> +            case p2m_mmio_direct:
>>>>>>> +                if ( mfn_x(mfn) =3D=3D start )
>>>>>>> +                {
>>>>>>> +                    clear_identity_p2m_entry(d, start);
>>>>>>> +                    break;
>>>>>>> +                }
>>>>>>> +                /* fallthrough. */
>>>>>>> +            default:
>>>>>>> +                put_gfn(d, start);
>>>>>>> +                gprintk(XENLOG_WARNING,
>>>>>>> +                        "%pp: existing mapping (mfn: %" PRI_mfn
>>>>>>> +                        "type: %d) at %#lx clobbers MSIX MMIO area=
\n",
>>>>>>> +                        &pdev->sbdf, mfn_x(mfn), t, start);
>>>>>>> +                return -EEXIST;
>>>>>>> +            }
>>>>>>> +            put_gfn(d, start);
>>>>>>> +        }
>>>>>>> +    }
>>>>>>> +
>>>>>>> +    return 0;
>>>>>>> +}
>>>>>>
>>>>>> ... nothing in this function looks to be x86-specific, except maybe
>>>>>> functions like clear_identity_p2m_entry() may not currently be avail=
able
>>>>>> on Arm. But this doesn't make the code x86-specific.
>>>>>
>>>>> I will maybe be wrong but what I understand from the code is that for=
 x86=20
>>>>> if there is no p2m entries setup for the region, accesses to them wil=
l be trapped=20
>>>>> into the hypervisor and can be handled by specific MMIO handler.
>>>>>
>>>>> But for ARM when we are registering the MMIO handler we have to provi=
de=20
>>>>> the GPA also for the MMIO handler.=20
>>>>
>>>> Question is: Is this just an effect resulting from different implement=
ation,
>>>> or an inherent requirement? In the former case, harmonizing things may=
 be an
>>>> alternative option.
>>>
>>> This is an inherent requirement to provide a GPA when registering the M=
MIO handler.
>>
>> So you first say yes to my "inherent" question, but then ...
>>
>>> For x86 msix mmio handlers is registered in init_msix(..) function as t=
here is no requirement
>>> on x86 to provide GPA when registering the handler. Later point of time=
 when BARs are configured
>>> and memory decoding bit is enabled vpci_make_msix_hole() will clear the=
 identity mapping for msix
>>> base table address so that access to msix tables will be trapped.
>>>
>>> On ARM we need to provide GPA to register the mmio handler and MSIX tab=
le base
>>> address is not valid when init_msix() is called as BAR will be configur=
ed later point in time.
>>> Therefore on ARM mmio handler will be registered in function vpci_make_=
msix_hole() when
>>> memory decoding bit is enabled.
>>
>> ... you explain it's an implementation detail. I'm inclined to
>> suggest that x86 also pass the GPA where possible. Handler lookup
>> really would benefit from not needing to iterate over all registered
>> handlers, until one claims the access. The optimization part of this
>> of course doesn't need to be done right here, but harmonizing
>> register_mmio_handler() between both architectures would seem to be
>> a reasonable prereq step.
>=20
> I agree with you that if we modify the register_mmio_handler() for x86 to=
 pass GPA
> we can have the common code for x86 and ARM and also we can optimize the =
MMIO
> trap handling for x86.
>=20
> What I understand from the code is that modifying the register_mmio_handl=
er() for
> x86 to pass GPA requires a lot of effort and testing.
>=20
> Unfortunately, I have another high priority task that I have to complete =
I don=E2=80=99t have time
> to optimise the register_mmio_handler() for x86 at this time.

Actually making use of the parameter is nothing I would expect you to
do. But is just adding the extra parameter similarly out of scope for
you?

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 10:23:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 10:23:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287681.487780 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRtT6-0006CA-BY; Wed, 09 Mar 2022 10:22:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287681.487780; Wed, 09 Mar 2022 10:22:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRtT6-0006C3-79; Wed, 09 Mar 2022 10:22:56 +0000
Received: by outflank-mailman (input) for mailman id 287681;
 Wed, 09 Mar 2022 10:22:55 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=gSYI=TU=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRtT5-0006Bx-9Y
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 10:22:55 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id e1795cce-9f92-11ec-8539-5f4723681683;
 Wed, 09 Mar 2022 11:22:54 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2108.outbound.protection.outlook.com [104.47.18.108]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-8-asDt2nIJOwWrIsndu0hbVA-1; Wed, 09 Mar 2022 11:22:52 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR04MB6128.eurprd04.prod.outlook.com (2603:10a6:803:ff::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Wed, 9 Mar
 2022 10:22:51 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Wed, 9 Mar 2022
 10:22:50 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e1795cce-9f92-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646821373;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=8zZxUIGz90owRPjSPHMX+0Ekmd7aZzKBfkVxIeHqlVM=;
	b=WOWPOzUhFnH71iFsbygdYYoXQawd+nOlFVgeGQ1tFb62+9/gAvDbVSDjCnGM1rcBMKEVDg
	WNCzSvATy+OQ+QW+NCPjoGdkHfGl+ZmdEelv85P7LCLgfq5V8OgElA4NS+2BhceGH8uNQP
	r9PH0b6QK1YvKsXR0NDW66vlclO4JRU=
X-MC-Unique: asDt2nIJOwWrIsndu0hbVA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=OZYvNutg89wb7RCHiUdadQPYv9A8W9+S9y7pTmPSSCbbSH9JqluNG0+IZky0x0xIhBHwN0yoLBIYjSxdZOLZafS4jri+aE1aF8VqzMjR2J4lJ44fS3xvIMnTGvC8PXwgrVdsx4wNwDo52kzLanbbZy+LvzM5EX0SZnAl1lI3EiagUpFdpCHFeMXXwWFBcRGxeVK0NNaOuPsdLZ04o/tZRs0G/yXxnLLdDgfIvlZCqRjVl5ckHgDHtpVMyjkO5EV7MiEhFpT2jDuvQMVVWGiq+P5rbtxLy8tJrOo+tXMOROI+bLIi3jRUHHmkn1W6dVDIfRrw22/Cl4Poa+HXjTeTmQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=bOPriPz1CXUTNJX0y+D5Vl5H3iHJHiAJV/OvcWzFC70=;
 b=i3TD+0UAgmN5rOmcIXUEccetDL63QkUDA3iO5uAqKr+K62TCWhZ7yqeW5qjUDm5bJVKAlIAX4ZHkuLpvXCr0N2ObGdqTFc2Hk9KSb5SWw2/zkZUj0giPrQAJTGqnMZ+KzSSQQwHI/c9ApA9kGvdlPq6q1zsz2yR/WdSv+YM1KRwRUvGeGosxyrZjwE5yYHpdlRclVrrDlH8bpCZy8HuvfBYGv1uA21HDNTVjvkpoZzVAkmsKcRr0uWVPtnzuSALgeW6o6SA66UvmYoUAdUFt5uYPN3bfPeY4/39OvFoN3B+do7KptFM5YqOleFJ5itrValWAR+cScwgxUMBR+sZBtw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <b0f67b74-3443-2b10-ae94-80a284269265@suse.com>
Date: Wed, 9 Mar 2022 11:22:43 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v3 2/2] livepatch: set -f{function,data}-sections compiler
 option
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 xen-devel@lists.xenproject.org
References: <20220308134924.83616-1-roger.pau@citrix.com>
 <20220308134924.83616-3-roger.pau@citrix.com>
 <c35415ef-b3c1-cc1c-2fb2-aa2de2602cd5@suse.com>
 <YidsSmPV1Pqulp+h@Air-de-Roger>
 <9cce44ca-3e31-bc13-3c56-2811efc36d5b@suse.com>
 <YieHVbKjtXY8vpOn@Air-de-Roger>
 <d400722d-d5a2-5bc6-8c16-be1d8e8ee046@suse.com>
 <YihzsHCgjVd0g4b5@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YihzsHCgjVd0g4b5@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6PR01CA0071.eurprd01.prod.exchangelabs.com
 (2603:10a6:20b:e0::48) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 4a09f847-5640-489d-cade-08da01b6c3d4
X-MS-TrafficTypeDiagnostic: VI1PR04MB6128:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB612890B5C4C333FFD50E5EF3B30A9@VI1PR04MB6128.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	5CY8od/swQS3CDv8zV1PQhCa2S+0rpzp5+UxuCekO83fvv68r2i+u/ZQOw4697E6z5vI8NXLvUeZ8CbrYqN20FNW8HFAa/PfL/HGXB6mXFbLBED+NTKAVUDygPAx9jPmCxU+KEKrdgA5Wa1Kzy0DuOKEAfNFR72H45eJC5J9CRPpF8ECGaJWWnCU7vVDSOY5PWGi5rUYWgNzbZi5HUoQvJCB0R//E2Dk2k0ejquEVl83WmItDrlBxLkhCuzhFHTfVG0lGKJCVRAuYtB9aGzCHkV9MqwlLhO91esQ11uPVbKSnamY1JP9xg/yFawpR9XZIaK7aRBvsmTVcF/SBtDtV04TYxj75CUr2VS4jqZPqp60o9dnxmGJCDG5HyvY1Z16Z91/Du2tqwItCIu9mJeAu1wyvyz8+YYCbDRhiTWwIMoFCwOajcA67gq7qQM+hZECaG4sSG9CpCrrBH/4hDbtcfqxI5KanD0/F+pv4G5XBMZkI+vBoY+Sf6X1pyYxao6Fk6Um4V+qRbiovWF5FSV6NRF+h2SUOXlXhHMGCGJzPNV+et8sIbdC5WvsAUJC6o4GIngv7fSkVLYZ7UYjga9CaRPsPqg3eWziLFuZCT+StCA0xpTWBqXXbU0OZ4Cyyl+g4SvdAehGCZvZs9X4TqlwVLrdLqEQIEbRw+82RU6REZcca+SC3vSsbpnce+tY6YQfdDjFGlRMGExPqIFbBlqSaz5DnEWhnYX+FxArDmoSxwBvH6HuNOzrORnS+xR4vdWv
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6512007)(316002)(31686004)(6486002)(66476007)(66556008)(36756003)(6506007)(8936002)(54906003)(6916009)(5660300002)(83380400001)(508600001)(6666004)(53546011)(26005)(86362001)(2906002)(31696002)(186003)(38100700002)(4326008)(2616005)(8676002)(66946007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?fmCoKYsi7xdHriUm0Ca/gLkMipiObOks1vr8rP4PQWW4z71EkIFF5pkUX7ch?=
 =?us-ascii?Q?d9XSKpCMRQHo2ouJINFjbQ6bwyYi9Ot85q2L/9WjTXWijaTwLq7odLyPtjgt?=
 =?us-ascii?Q?hSSSAilBZOdipbMB0+eRB+cTsP6xei0nMCVq/0KhfLES98RgVVsGt0ucoEb6?=
 =?us-ascii?Q?qXwfaQE6eZj1zk7Mf7T4hTYmyhpKq+y/98Q5BCktgrMHtRwn/8k71qUzVjpy?=
 =?us-ascii?Q?9qLAFdPbad07Yu0kASpXAOTZJkiBYbCS9sDkV8+oJKm5oyRNZJqlbPUYT2Gx?=
 =?us-ascii?Q?mCnZWDeSXpBC5ANHAK2bZHjjHE7PKqwH3ulTznlXIyzc7gL8Nut6rOm5WlXE?=
 =?us-ascii?Q?6nPpnMpZSMhJGH4vk+vs0hTV39TwlfiFONfn8c2gd9DRd/5d4Hh3ay7qY3Bd?=
 =?us-ascii?Q?ryByOz+yviOOrCYt7RMW3wlYLPbgxrX+Sbmq24EZw+jxBvs+4fvxBk2u2SQ3?=
 =?us-ascii?Q?THDDczYHXU76YO35fNrU6q4JNO+a2fkJYwvLIBjop/qNp5ybOi8LagSnc0MZ?=
 =?us-ascii?Q?XK3ri6kXQUJIpAnVCK/0dNv2wCR1nUKlD8BhFDcZZ9wx92hHW1kDWNTdiULs?=
 =?us-ascii?Q?yvG+h0qXa5wuh4H9v7F9Y4n4FRINrR3mQWgk3vgglWwYjjJ3PGO4tRUeKq7o?=
 =?us-ascii?Q?4hF3QN9It1zUne6LpU7tTnoYj1+s563Mp6qKr2auZph6uzkdpKLlKikOlUjA?=
 =?us-ascii?Q?isPuPUoF7SNyMc8WsyzRXn1Jg3qSwP5Q4NQ4nUhiC1Y23rqGyfUFdIqcDoi/?=
 =?us-ascii?Q?HDIm9N5XnvPB6cCf6aCy5g3GNdO/mVDf/YzBZoob4FzGiRo4T4sr2rcGAcRq?=
 =?us-ascii?Q?51N3En/yG6PSG9fUh4zz4bQuB4lAkdDcCj6jybWAZVvO1QLNZVW+lBmrtb2x?=
 =?us-ascii?Q?EW7pXVwO4dJaNTz209CLew/OqleezQODFZE5qDW8KCp0YFanmxxxvKlPo/TU?=
 =?us-ascii?Q?6KVtyP8NO6ZFccglHZWpZwxCTFxtV2Nzh/1FsGHf7LI8VUzn1GnKVDobjDkZ?=
 =?us-ascii?Q?H7hshrpTga5lmUw1gpGnl5PFN+m9Hiq8dDtY038hTdJ0B3k4sZ0WSdZHzhev?=
 =?us-ascii?Q?bc2ID9mK8MFoj5Nv0tx+SQk5OKkbTDQJxS++jfqcOYiiKDKQITS0MihKtvQU?=
 =?us-ascii?Q?sdBgxSsRyL5YI5FH9vEhwx1CxxYHLnuZMbxrREeu58iTOaxOMsZWepZC0KT8?=
 =?us-ascii?Q?CJ9fF4V57IpH9damdaxojMIjFy5JKU/JK1/fOgSd4WBnen4E+r3tkXA8oh8V?=
 =?us-ascii?Q?9mJ+CHsm381XaWNB/YISJC2Np6SerAL1c45bOO+RsvAZAAbOySaHI+1Hu1xo?=
 =?us-ascii?Q?cBS/Zo0/GgTm2Nm5qKzS7shp0sIwZKCdc5XtxoZVvhoaKh25Jq/c65Sr42Hp?=
 =?us-ascii?Q?Fh4aJDHjkba+GRbOz/6YHU+XfE4RSccMyCc1tRsT+J21oLle1lf2Gxyn8Bzb?=
 =?us-ascii?Q?Z3pP3ptpKsC1uYID5+Dj9xhwILSoddPWfX5AFVZ8YYmSlD4/ct0fuUmWLvKZ?=
 =?us-ascii?Q?d7NB8GmSVoIZtltHSz++PudsKJgb1FL7hvlyBhPY7ZWdqyRTu8Ncr5rjHU/Q?=
 =?us-ascii?Q?z00V4+TmZXwIqVn5n3qFb0fXVzL2YYhtfLjncx1xQRbGUdR8lCPbDSbEgZx+?=
 =?us-ascii?Q?Y53YsIFFdnCvmEqIfBQRdWs=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4a09f847-5640-489d-cade-08da01b6c3d4
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 10:22:50.8930
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: wkAfWzcdPzxD+gziBh3QrDK+b9Zl7JE1g8Ow7FYauXSbvFl1qNf+OQ3lRb7sfuiyNDYVj7cEYjrRD4+/Urv4DA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB6128

On 09.03.2022 10:30, Roger Pau Monn=C3=A9 wrote:
> On Tue, Mar 08, 2022 at 05:58:49PM +0100, Jan Beulich wrote:
>> On 08.03.2022 17:41, Roger Pau Monn=C3=A9 wrote:
>>> On Tue, Mar 08, 2022 at 04:13:55PM +0100, Jan Beulich wrote:
>>>> On 08.03.2022 15:46, Roger Pau Monn=C3=A9 wrote:
>>>>> On Tue, Mar 08, 2022 at 03:09:17PM +0100, Jan Beulich wrote:
>>>>>> On 08.03.2022 14:49, Roger Pau Monne wrote:
>>>>>>> If livepatching support is enabled build the hypervisor with
>>>>>>> -f{function,data}-sections compiler options, which is required by t=
he
>>>>>>> livepatching tools to detect changes and create livepatches.
>>>>>>>
>>>>>>> This shouldn't result in any functional change on the hypervisor
>>>>>>> binary image, but does however require some changes in the linker
>>>>>>> script in order to handle that each function and data item will now=
 be
>>>>>>> placed into its own section in object files. As a result add catch-=
all
>>>>>>> for .text, .data and .bss in order to merge each individual item
>>>>>>> section into the final image.
>>>>>>>
>>>>>>> The main difference will be that .text.startup will end up being pa=
rt
>>>>>>> of .text rather than .init, and thus won't be freed. .text.exit wil=
l
>>>>>>> also be part of .text rather than dropped. Overall this could make =
the
>>>>>>> image bigger, and package some .text code in a sub-optimal way.
>>>>>>>
>>>>>>> On Arm the .data.read_mostly needs to be moved ahead of the .data
>>>>>>> section like it's already done on x86, so the .data.* catch-all
>>>>>>> doesn't also include .data.read_mostly. The alignment of
>>>>>>> .data.read_mostly also needs to be set to PAGE_SIZE so it doesn't e=
nd
>>>>>>> up being placed at the tail of a read-only page from the previous
>>>>>>> section. While there move the alignment of the .data section ahead =
of
>>>>>>> the section declaration, like it's done for other sections.
>>>>>>>
>>>>>>> The benefit of having CONFIG_LIVEPATCH enable those compiler option
>>>>>>> is that the livepatch build tools no longer need to fiddle with the
>>>>>>> build system in order to enable them. Note the current livepatch to=
ols
>>>>>>> are broken after the recent build changes due to the way they
>>>>>>> attempt to set  -f{function,data}-sections.
>>>>>>>
>>>>>>> Signed-off-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>
>>>>>>
>>>>>> Reviewed-by: Jan Beulich <jbeulich@suse.com>
>>>>>>
>>>>>>> --- a/xen/arch/x86/xen.lds.S
>>>>>>> +++ b/xen/arch/x86/xen.lds.S
>>>>>>> @@ -88,6 +88,9 @@ SECTIONS
>>>>>>>         *(.text.unlikely .text.*_unlikely .text.unlikely.*)
>>>>>>> =20
>>>>>>>         *(.text)
>>>>>>> +#ifdef CONFIG_CC_SPLIT_SECTIONS
>>>>>>> +       *(.text.*)
>>>>>>> +#endif
>>>>>>>         *(.text.__x86_indirect_thunk_*)
>>>>>>>         *(.text.page_aligned)
>>>>>>
>>>>>> These last two now will not have any effect anymore when
>>>>>> CC_SPLIT_SECTIONS=3Dy. This may have undesirable effects on the
>>>>>> overall size when there is more than one object with a
>>>>>> .text.page_aligned contribution. In .data ...
>>>>>
>>>>> Agreed. I wondered whether to move those ahead of the main text
>>>>> section, so likely:
>>>>>
>>>>>        *(.text.unlikely .text.*_unlikely .text.unlikely.*)
>>>>>
>>>>>        *(.text.page_aligned)
>>>>>        *(.text.__x86_indirect_thunk_*)
>>>>>        *(.text)
>>>>> #ifdef CONFIG_CC_SPLIT_SECTIONS
>>>>>        *(.text.*)
>>>>> #endif
>>>>
>>>> Perhaps; I'm not really worried of .text.__x86_indirect_thunk_*,
>>>> though. When adding .text.* that one can likely go away.
>>>>
>>>>> FWIW, Linux seems fine to package .text.page_aligned together with th=
e
>>>>> rest of .text using the .text.[0-9a-zA-Z_]* catch-all.
>>>>
>>>> There's no question this is functionally fine. The question is how
>>>> many extra padding areas are inserted because of this.
>>>>
>>>>>>> @@ -292,9 +295,7 @@ SECTIONS
>>>>>>> =20
>>>>>>>    DECL_SECTION(.data) {
>>>>>>>         *(.data.page_aligned)
>>>>>>> -       *(.data)
>>>>>>> -       *(.data.rel)
>>>>>>> -       *(.data.rel.*)
>>>>>>> +       *(.data .data.*)
>>>>>>>    } PHDR(text)
>>>>>>
>>>>>> ... this continues to be named first. I wonder whether we wouldn't
>>>>>> want to use SORT_BY_ALIGNMENT (if available) instead in both places.
>>>>>
>>>>> We could use the command line option if available
>>>>> (--sort-section=3Dalignment) to sort all wildcard sections?
>>>>
>>>> Depends on the scope of the sorting that would result when enabled
>>>> globally like this.
>>>
>>> I'm not sure I'm following. Don't we generally want to sort by
>>> alignment in order to avoid adding unnecessary padding as much as
>>> possible?
>>>
>>> For any wildcard sections we really don't care anymore how they are
>>> sorted?
>>
>> Sure. Question is whether sorting is limited to within any single
>> *(...) construct, or whether it could extend to adjacent ones. IOW
>> whether the command line option strictly is a replacement of adding
>> SORT_BY_ALIGNMENT to every one of these constructs.
>=20
> AFAICT the command line option will have the effect of setting the
> sorting of any wildcard containing sections to use SORT_BY_ALIGNMENT.
> Ie: .data.* would become SORT_BY_ALIGNMENT(.data.*):
>=20
> *(.data SORT_BY_ALIGNMENT(.data.*))
>=20
> I've taken a look at the binutils ld source and that seems to be the
> case, any wildcard containing enum will get it's sorting set to by
> alignment (but I'm not familiar with ld code so I might be missing
> pieces).

Okay - why don't we try that then (in a separate patch, so it's going
to be easy to revert)? For the patch here all I'd like to ask for is
to keep .text.page_aligned enumerated explicitly (and the wildcard
placed after it, obviously).

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 10:35:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 10:35:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287688.487791 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRtem-0007lp-JS; Wed, 09 Mar 2022 10:35:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287688.487791; Wed, 09 Mar 2022 10:35:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRtem-0007li-G8; Wed, 09 Mar 2022 10:35:00 +0000
Received: by outflank-mailman (input) for mailman id 287688;
 Wed, 09 Mar 2022 10:24:50 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=CYBH=TU=gmail.com=linmq006@srs-se1.protection.inumbo.net>)
 id 1nRtUv-0006pr-Ur
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 10:24:50 +0000
Received: from mail-pf1-x436.google.com (mail-pf1-x436.google.com
 [2607:f8b0:4864:20::436])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2582514f-9f93-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 11:24:48 +0100 (CET)
Received: by mail-pf1-x436.google.com with SMTP id g19so1829788pfc.9
 for <xen-devel@lists.xenproject.org>; Wed, 09 Mar 2022 02:24:48 -0800 (PST)
Received: from localhost.localdomain ([159.226.95.43])
 by smtp.googlemail.com with ESMTPSA id
 a38-20020a056a001d2600b004f70d5e92basm2369076pfx.34.2022.03.09.02.24.45
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Wed, 09 Mar 2022 02:24:47 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2582514f-9f93-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id;
        bh=Ce2OWqbOvhVGvkh9CKalayGwAHAmYG9YoQa70H7zwHk=;
        b=nhsB643oL1z7gSz9OhPKaYTp92GH9sg+/1DuFdJZk1fKbP62NAfuUgyhqycQ1FqFo+
         5rmoZlZtyivfZVAfYIzmCykCkAF7VU1tcpTtbcye+FzMNUMSpsDn1HqQQBeUEfkEWQYp
         phjIaBxXla2Fnmq5PQsLvQJ35lNRalRiFJpTO3Ize16CEx26rLuoCAWTk4XyO7syLutA
         J3tc9yg10WtAbYAUMBfgpJ+sR6FFaDtRA436mFodx2KdMVDsvM4z+cFoBv+/3JIWLk8M
         LpVMxj0oNuGCkXxkgBd9K3GEPtyHQUZeXY/NhLKujU7sDdSUUiB/QiXt1QbA8U9hCvIC
         UjkQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id;
        bh=Ce2OWqbOvhVGvkh9CKalayGwAHAmYG9YoQa70H7zwHk=;
        b=ipQZ++0u6xI7USPQF4NrwMOTHqO6dJdfOqcgmoStcVDR633et0KsZSdpgVEdJSysDd
         9m5nEuzR4VxCzWCH8so012w4Mrkcw3bLyXMygkQFwuRuzOs8L0SLef/nWpgSZOGINyOr
         e0Y9pMivvI1bOFDclp8e+3Y4wSukatb8bLaKUc6C4vUNBHFCJx1u0GLBEQIfuDxvBk64
         aPkfcPPtA28+QPb2GELsRPqTsUIYEkiDrcxmgH/mLTJ88fZTtkgGHMMDz6LVYV5zlxSp
         DuS8smvOtPoNFfq2Ke7p1Oms+uZyTUIXNi50dvG0mASzUJUCUloOAp3R2A3Yn2dPU/Kj
         PhLQ==
X-Gm-Message-State: AOAM531eGmV0vKp9Vg0LjWAUW6fCs3X1E5BJRUbw+TaJnHhc7q+sUQXn
	pqtRi3U9f2jRif/Tn6/xN7Y=
X-Google-Smtp-Source: ABdhPJwWk0jNGLAAdDoKZXq4XIQ1YkfcmM4HG7VGwMH/fxjxX2ftGdpC0zjfa6zFKyVMKy6b1+9O+g==
X-Received: by 2002:a63:3d48:0:b0:374:4b15:76e4 with SMTP id k69-20020a633d48000000b003744b1576e4mr17404308pga.593.1646821487378;
        Wed, 09 Mar 2022 02:24:47 -0800 (PST)
From: Miaoqian Lin <linmq006@gmail.com>
To: Stefano Stabellini <sstabellini@kernel.org>,
	Russell King <linux@armlinux.org.uk>,
	Catalin Marinas <catalin.marinas@arm.com>,
	Shannon Zhao <shannon.zhao@linaro.org>,
	Julien Grall <julien.grall@arm.com>,
	xen-devel@lists.xenproject.org,
	linux-arm-kernel@lists.infradead.org,
	linux-kernel@vger.kernel.org
Cc: linmq006@gmail.com
Subject: [PATCH] arm/xen: Fix refcount leak in xen_dt_guest_init
Date: Wed,  9 Mar 2022 10:24:41 +0000
Message-Id: <20220309102442.14726-1-linmq006@gmail.com>
X-Mailer: git-send-email 2.17.1

The of_find_compatible_node() function returns a node pointer with
refcount incremented, We should use of_node_put() on it when done
Add the missing of_node_put() to release the refcount.

Fixes: 9b08aaa3199a ("ARM: XEN: Move xen_early_init() before efi_init()")
Signed-off-by: Miaoqian Lin <linmq006@gmail.com>
---
 arch/arm/xen/enlighten.c | 1 +
 1 file changed, 1 insertion(+)

diff --git a/arch/arm/xen/enlighten.c b/arch/arm/xen/enlighten.c
index ec5b082f3de6..262f45f686b6 100644
--- a/arch/arm/xen/enlighten.c
+++ b/arch/arm/xen/enlighten.c
@@ -424,6 +424,7 @@ static void __init xen_dt_guest_init(void)
 
 	if (of_address_to_resource(xen_node, GRANT_TABLE_INDEX, &res)) {
 		pr_err("Xen grant table region is not found\n");
+		of_node_put(xen_node);
 		return;
 	}
 	xen_grant_frames = res.start;
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 10:36:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 10:36:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287693.487802 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRtgF-0008Nf-UG; Wed, 09 Mar 2022 10:36:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287693.487802; Wed, 09 Mar 2022 10:36:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRtgF-0008NY-R8; Wed, 09 Mar 2022 10:36:31 +0000
Received: by outflank-mailman (input) for mailman id 287693;
 Wed, 09 Mar 2022 10:36:30 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=QNbA=TU=citrix.com=prvs=060736ad3=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRtgE-0008NO-9z
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 10:36:30 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id c60ba64d-9f94-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 11:36:28 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c60ba64d-9f94-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646822188;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=CsPJlfO/GHIJxoKbH8IOB0uUxTOThLRqur4WRoxVZKQ=;
  b=A0mlrhrj3It4LG7rOZ8EVsNCP7L2UXbHKKRjXark1Cnz2N/ORwYVigR5
   2pArue2ZYsBrABADl9TA9f1nKt9TuPu47/DiftLWe1B4gX7gEgp5FjxH8
   HiqtiZ36W1NZLswppn/uMzGFuvz6GZTFnMBucv++buyO4onhicAK7e6dU
   0=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65799152
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:14z7EKwmwsPXlrgl6hV6t+eCxirEfRIJ4+MujC+fZmUNrF6WrkVWm
 zFKXGDUb/aPYmf3L9lzOdiz8E8H6JHdzdIwSwBs/CAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2YnhWWthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 NpljLqsQ18nI/X1yMcDFD5DNTxiLbx40eqSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DJoQQt2sm1TjEJf0nXYrCU+PB4towMDIY2J0RTKeHO
 pBxhTxHVDDOSQZMGG0uUYMfw+vrpGavVTBSpwfAzUYwyzeKl1EguFT3C/LrfdiNSdRQj1yvj
 GvM9GTkATkXLNWajzGC9xqEnfTTlCn2XIYTEryQ9fNwhlCXgGsJB3U+X1ahveOwjEL4XttFM
 lEV4QInt610/0uuJvH+UgO5pjiYvxcac9tWD+A+rgqKz8L84RufQG4NTTdDadkvnM4wWTEuk
 FSOmrvBGjhHoLCTD3WH+d+8vT60fCQYM2IGTSsFVhcepcnuppkpiRDCRcolF7S65vX3Fiv32
 CuitzUlivMYistj/6em+VHKhRq8q56PSRQ6ji3VVG+46gJyZKa+epelr1Pc6J59wJ2xFwfb+
 iJewo7Hsb5IXcrleDGxrPslJZe17a6LLWXl0X1xWL460Smx62+dVNUFiN1hH3tBPsEBcD7vR
 UbcvwJN+ZNeVEeXgb9Lj5GZUJpzk/W5fTjxfrWNN4cVPMAtHOOS1Hw2PSatM3bRfF/AeE3VE
 bOSao6SAHkTEsyLJxLmFr5GgdfHKs3TrF4/pKwXLTz6idJyh1bPEN/p1WdiiMhjsstoRy2Pr
 75i2zOikUk3bQEHSnC/HXQvBV4LN2MnIpv9ttZacOWOSiI/Rj1/VKGNm+N9J9A790iwqgsu1
 ivtMqO/4ACj7UAr1C3QMiwzAF8Rdc0XQY0H0dwEYg/zhilLjXeH56YDbZonFYTLB8Q4pcOYu
 8ItIp3aatwWE2yv021EMfHV8dwzHDz21FnmF3f0P1ACk2tIGlWhFinMJVC0qkHjz0Of6KMDn
 lFX/liCEMRZGFg6Upq+hTDG5wrZgEXxUdlaBiPgCtJSZF/t4M5tLSnwheUwOMYCNVPIwT7y6
 upcKU5wSTXly2PtzOT0uA==
IronPort-HdrOrdr: A9a23:jeVSTKvhQGsEiWskHsgY2gwI7skClYMji2hC6mlwRA09TyXGra
 +TdaUguSMc1gx9ZJhBo7G90KnpewK6yXdQ2/hqAV7CZnichILMFu9fBOTZsl/d8kHFh4tgPO
 JbAtVD4b7LfCZHZKTBkXCF+r8bqbHtmsDY5ts2jU0dNT2CA5sQkDuRYTzrdHGeKjM2YabQQ/
 Gnl7Z6TnebCDwqhoPRPAh2Y8Hz4/nw0L72ax8PABAqrCGIkDOT8bb/VzyVxA0XXT9jyaortT
 GtqX2y2oyT99WAjjPM3W7a6Jpb3PPn19t4HcSJzuwYMC/lhAqEbJloH5eCoDc2iuey70tCqq
 iGnz4Qe+BIr1/BdGC8phXgnyHmzTYV8nfnjWSVhHPyyPaJMw4SOo5kv8Z0YxHZ400vsJVXy6
 RQxV+UsJJREFfpgDn9z8KgbWAkqmOE5V4Z1cIDhX1WVoUTLJVLq5YEwU9TGJAcWArn9YEcFv
 V0Bs203ocbTbqjVQGZgoBT+q3tYpxqdS32AXTq+/blngS+pUoJgXfxn6ck7zU9HJFUcegx2w
 2LCNUsqFh0dL5nUUtMPpZxfSKJMB2/ffvtChPlHb21LtBPB5ryw6SHlYndotvaPKA18A==
X-IronPort-AV: E=Sophos;i="5.90,167,1643691600"; 
   d="scan'208";a="65799152"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=G0zX7E/ChRvWqJJDcAqDQINf3QSCtgO/vC90Ru9qYUbs/Pjd3+XEbik3AjwImCxj4Su6CY75gJZeuJsH4w44MYjQ4fjw6wcZ4YVbcY4CvSXz6+mCNQwJRRjIasN947cZb43cAlMk8CGfhnwx8Fwwu8jTHcX3XmvClUzixgeLVgCbtW6grJ3seOR3kMlGqoHNYAaBA0dNq5VpKdWFQid3Y0PlWn+2Lbw/SBW0Fl+PmLvca8ZQODliUXoQauncpKqOuW0dHV6tb60daBDXuA06xNp2C1k5I74b7szKKEFCEI2xOdkEUfNH3jE4O6k91BQK+bC6tjYY3HkkXK8o2hAJUw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=J7pJyileA/tpK9ap+hGFdWh0M1RALSvNlLeh7PsR5uk=;
 b=Q0hxSENvBlLfdwD3cVVV0+akiCykZypJwncs5bbtnDu4HfBlEaYsIRC321NA6de1u2ezzcOyYIFL8DtfwZa54Hl9SHZgLppSGFO61YX6HVSjlvjCR/9ZCzNXOE81hW0FVVFIebW90glH5R5eG8UbmT0yl0yecmDY4XwqNISQJ2rwK2UZcHe5xyXjUQp/HDJWuntAX+y6UUoHr8hlmWhfE+GD0OUhy2AgoHhx8P/pMPscRg+q7FJlwYxhsP7oGb9axCnFWr+dqLH7mmIe2cfye/hkxtvOwfkCagkx4e3a1N3EposTHnFHFbfSNZRQTkv6zmMHIQp2juZ8tcZ1jrxlkA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=J7pJyileA/tpK9ap+hGFdWh0M1RALSvNlLeh7PsR5uk=;
 b=H6I+RkJXsmDKyJMeqSX7EZIzoA6pWanpmfzWZMmpHY+iedn1JzknV6vekWoMJIiHFhKgBhTMb41GZWox1McDeSKhorN9wNSUUXZqLURqQk2ThmR7JBJZ/gZXzO5Ft2Gq71xKNW050gerR6x+l1lwuIA/6cZN5QixyjLo/CQkTxQ=
Date: Wed, 9 Mar 2022 11:36:17 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jane Malalane <jane.malalane@citrix.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, Anthony
 PERARD <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, Andrew
 Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>, Julien Grall <julien@xen.org>, Stefano
 Stabellini <sstabellini@kernel.org>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>, Bertrand Marquis <bertrand.marquis@arm.com>,
	Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian <kevin.tian@intel.com>
Subject: Re: [PATCH v6 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Message-ID: <YiiDIQY11N4hmmhv@Air-de-Roger>
References: <20220307150609.10662-2-jane.malalane@citrix.com>
 <20220308173118.31490-1-jane.malalane@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <20220308173118.31490-1-jane.malalane@citrix.com>
X-ClientProxiedBy: LNXP265CA0079.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:76::19) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: e99118b8-4974-4f99-d30e-08da01b8a765
X-MS-TrafficTypeDiagnostic: MWHPR03MB2734:EE_
X-LD-Processed: 335836de-42ef-43a2-b145-348c2ee9ca5b,ExtAddr
X-Microsoft-Antispam-PRVS: <MWHPR03MB273404E5AD87FAA66B0B62488F0A9@MWHPR03MB2734.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 9F5l08l3z4L05BjdEG/W65e3vkfK9KvqjYrZirx5IV6y9DUHNVvj7XTDNN5XCxiDeHXnbiiIMgkWdJ5ikfRJeY4C3T5DRBL/irr9EdYUds/21Dsdzzn7jRoXU8NObjuJw+9cU+dZXBYtf7nJUzb78YnvG0aWPeT1fiyJOA4uMw0Iv5u8OkVFUb0yabQSIR2Z/hdS0ZyWIPTYNfWuLlBAHruVR5+lK/tipiMrLmVoPI4Q0X6IJqyLczIyLCIzQ8iEQMG+qu+HtwPOlInzrrWcnsHtqYrv9Q2H+s7OIqmtbq+lXz2lZrli/xq+/GM68ufwdL7gWY1Is198NzK8PTlUhdT0erlbv0EKxWKEKbEHTY19KmOFrC5Fd5Vm4whjaj04DrhqtGcVutK4g5gVnByHh+GoJ7zPAIvzjhBqoppQlzC1NxUwpTYkBB9YQYdvmjbx9i9k85Nj1xppXsyHR3O3MnW2PbC622w4YLVcX0v8V0MTDmZ4a2npawnbG+6rOKyQ62LnJjUGVFu/8irfejWXsHKTg/52c2Wvz4OcSRnk43cOx24V0TqLsPkCKOyVxkCm30JtNo5BeWJDtWYULI3cl1C85NcjWFNZc0+TBhdoyCChIhHMb4iIEmGDhmGpWWmiLJ3EgTFkj+0eIWW8JmXllw==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(83380400001)(6512007)(6666004)(9686003)(5660300002)(7416002)(6506007)(82960400001)(186003)(26005)(2906002)(86362001)(38100700002)(8936002)(85182001)(316002)(6486002)(508600001)(54906003)(6636002)(33716001)(6862004)(4326008)(66556008)(66476007)(66946007)(8676002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?NHFhbENXVFhTYTlRSktwcEFrNWg4TmlMaVRXVWVWSUIvQjF3L3NHazNTSmIv?=
 =?utf-8?B?UUtOVlVOeXVvWXhzYy9VdE1KSVd3T2Nyd0VlNUhyUkJOZTFyN3pFek5LNFFH?=
 =?utf-8?B?aC8wZ2d5RVdqVm1IMVVEaVNBaWVaaUhBS3BsNy9rMyt5VkFSc2d0cDJWNS84?=
 =?utf-8?B?WDIyeUg5UnNBVlFsVURVelJkamh0NlBQUTNVK1NzZ2Zma0NIaFpZa2FObTB5?=
 =?utf-8?B?NTlTb3hVZVExZzVBcm1ndWFYL3VpbkYvcVErZ2U0b1hzYllWU0hsVmtyMEhM?=
 =?utf-8?B?d0hNR09YZG5CZHVRVmRza2tkdlhwUzBHK2dtRmQ5UVRueHQ2cEZHMThkMXJm?=
 =?utf-8?B?WTFzejBhRVRUbHNvU2pTd1c3VnlKZFl6U1FsUzE2VDVHSmVHdjROU0FzbzE4?=
 =?utf-8?B?R0tRcFN1YUhNaVhxdmRiWUZEcVFtdGxNQmhpTWMxSll4ajdoaTF3TlBCd3Vy?=
 =?utf-8?B?YWRYSFNjY0NlMS9rbFU2S21raWdGNkY1aVhlSjBKY1l4dzlySG45aHY5WHlX?=
 =?utf-8?B?aVJsRzFic1dMc0JrUGxzQ245aHBnVUptY2phckdsQ1lDZWZyMUZkTlBhOWZC?=
 =?utf-8?B?MXNWSWRCdzRvSFZ6dkc0bU4waUdHRVI0SnVPYUxXRGpUZjlTZkpUdTY0bjFQ?=
 =?utf-8?B?Z2tJalI2Y3kxckN4YXFmZ2dlOVN6MjNkdjMwdmZYRDU1OGpuNlZzbXYwVUps?=
 =?utf-8?B?YWIzWFNhbDNuZC83ZEgzY2J3QnhLemJ6Q0dtbVU4SE9JUTlSc0hDM0hZMWJt?=
 =?utf-8?B?N3h2N2JUSTFpTXp4cnpzb2RZb3BROVVrS3VpL29uY1pibWJ0ZlVLMTk2cHQz?=
 =?utf-8?B?akNrRW5TeWx4ak1UdXNhNUZ3NFBXTTEzUmxzQ1ZuYTdIckdQQ2tPM0NGUFJM?=
 =?utf-8?B?RVBFRENqUjZKcDRYa1M0YlRTZythTk5ldU1UYWZTdC9Qb2RrSUZZLzExVnJ1?=
 =?utf-8?B?aHJDYWVnYmJtejJUbE5pUmpyN3ZiUG1Cazh0UTFPUUk4ZGpxV05DMTRia2VY?=
 =?utf-8?B?TkliWVhaM2FnNUhiRlVoTGM3YnV0RGpUcEdLRFdobVY3RUtUSy9QNkFBTC84?=
 =?utf-8?B?VHZwMlo0R2JuVXFYSlpNeDQ5alNhS0tBVmhoZU12Q2U5aHNxMkpDVEF5Tkgz?=
 =?utf-8?B?MHlSTnF5NTBMbXQ5NG54SGlmYzErK2tkWHVrQXdiekYwUmtpY1ptMWJrbmZq?=
 =?utf-8?B?SlRHQmN1eitZZDRVZHZCUEpmYk5lZ2lRVndPOVZXMmI1MlNVT1dtMjZkb1Q2?=
 =?utf-8?B?TXJXTzY1NnRXZnhER2htOHFhSEtJbkhGZHFERXFKZ0c1dzZoNWdtbE5xR25F?=
 =?utf-8?B?Tk13NWdaaFlDb1dLSjNvSXp2a1pHY2RPYmVySzVJNGx3SSs4STBvQTlKanZK?=
 =?utf-8?B?aThYQTIxOHA5UEwxTUI5U0FrZjJQcG9aZldtaGF3d0NURC9aSHhXQWtjYVlM?=
 =?utf-8?B?LzJFYnBENjNGdXBtMC9keHJFekZrZ3NraThVeDd0bVNmM3djd3FZUTF6a1Fk?=
 =?utf-8?B?QUxTcUEwaG1SNXlUNkYxSFE0OEZlcHA1cDFKbUVyRm9RUXltcjlObG8yamFy?=
 =?utf-8?B?cDJGbHBVSmxjSnJ2ZHg5enE0S0ZCTnEwbGkzVWRCZnU5eU5lTzk5OTZCdHpr?=
 =?utf-8?B?M2hMOFh6ZjZyUHEvaWxBZ3J4NWxGREpFQkt4RUVJRmNhTDlBS29xN1F1QktY?=
 =?utf-8?B?M0lYOERHbUM1QnNGWFRxeTVvUmJvaVh6TGxlZ0o2MHA0eXJ6TS9MQWxqZmlh?=
 =?utf-8?B?L2hNWFMzenhzWnhUaGF6VmlWc3JvZ25xSDVVNnlMT0FIY0ZjUkRNcWZ3L2Nn?=
 =?utf-8?B?UFRybmJBTTROZHltUlVKV2wxQkNDZUhNdVlLQkFPdVJBVkI4SnBkVFBLNXZk?=
 =?utf-8?B?K0lwZkRXY2FSTUV1a2JGcEF6V01KWVdHdkM4VzVkZWxBQjdNOTh5THlvdkx2?=
 =?utf-8?B?TmtPRTAxNWRQUGNueTdLeTJVdXo3UDFlbEVZU3ludDFucmhPcUdxM25nVkkz?=
 =?utf-8?B?dlFiazB1UXhHNkFmUmdReW0rTDNvTkY4MURKY2ZHakpFbEZYUW1MTmxJdk5m?=
 =?utf-8?B?Y01nUjk5OGZFbDk0WEdWbXFvenNMTWUweFlZdENWeDZ1UVVBRVFqb1l5MzhU?=
 =?utf-8?B?MldUeUF2UHg1MXU0NW9PUzlvZkNKVEtaMCtNUjJ3Q3JGU1RCYTBsbkJGMDJI?=
 =?utf-8?Q?kY4A5IO2tMwJR0h3kATYKy4=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: e99118b8-4974-4f99-d30e-08da01b8a765
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 10:36:22.2455
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: lpuagAoKvWAuOwm7baDiCaS9Q8kRs0YdJ/QHS5Xv8pTcRedMnDJlfojJgLz3IvK1ubt6GO8IUNgP0zShuEKTiw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR03MB2734
X-OriginatorOrg: citrix.com

On Tue, Mar 08, 2022 at 05:31:17PM +0000, Jane Malalane wrote:
> Add XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC and
> XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC to report accelerated xapic
> and x2apic, on x86 hardware.
> No such features are currently implemented on AMD hardware.
> 
> HW assisted xAPIC virtualization will be reported if HW, at the
> minimum, supports virtualize_apic_accesses as this feature alone means
> that an access to the APIC page will cause an APIC-access VM exit. An
> APIC-access VM exit provides a VMM with information about the access
> causing the VM exit, unlike a regular EPT fault, thus simplifying some
> internal handling.
> 
> HW assisted x2APIC virtualization will be reported if HW supports
> virtualize_x2apic_mode and, at least, either apic_reg_virt or
> virtual_intr_delivery. This also means that
> sysctl follows the conditionals in vmx_vlapic_msr_changed().
> 
> For that purpose, also add an arch-specific "capabilities" parameter
> to struct xen_sysctl_physinfo.
> 
> Note that this interface is intended to be compatible with AMD so that
> AVIC support can be introduced in a future patch. Unlike Intel that
> has multiple controls for APIC Virtualization, AMD has one global
> 'AVIC Enable' control bit, so fine-graining of APIC virtualization
> control cannot be done on a common interface.
> 
> Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
> Signed-off-by: Jane Malalane <jane.malalane@citrix.com>

Overall LGTM, just one question and one nit.

> diff --git a/tools/ocaml/libs/xc/xenctrl_stubs.c b/tools/ocaml/libs/xc/xenctrl_stubs.c
> index 5b4fe72c8d..7e9c32ad1b 100644
> --- a/tools/ocaml/libs/xc/xenctrl_stubs.c
> +++ b/tools/ocaml/libs/xc/xenctrl_stubs.c
> @@ -712,7 +712,7 @@ CAMLprim value stub_xc_send_debug_keys(value xch, value keys)
>  CAMLprim value stub_xc_physinfo(value xch)
>  {
>  	CAMLparam1(xch);
> -	CAMLlocal2(physinfo, cap_list);
> +	CAMLlocal3(physinfo, cap_list, arch_cap_list);
>  	xc_physinfo_t c_physinfo;
>  	int r;
>  
> @@ -731,7 +731,7 @@ CAMLprim value stub_xc_physinfo(value xch)
>  		/* ! XEN_SYSCTL_PHYSCAP_ XEN_SYSCTL_PHYSCAP_MAX max */
>  		(c_physinfo.capabilities);
>  
> -	physinfo = caml_alloc_tuple(10);
> +	physinfo = caml_alloc_tuple(11);
>  	Store_field(physinfo, 0, Val_int(c_physinfo.threads_per_core));
>  	Store_field(physinfo, 1, Val_int(c_physinfo.cores_per_socket));
>  	Store_field(physinfo, 2, Val_int(c_physinfo.nr_cpus));
> @@ -743,6 +743,17 @@ CAMLprim value stub_xc_physinfo(value xch)
>  	Store_field(physinfo, 8, cap_list);
>  	Store_field(physinfo, 9, Val_int(c_physinfo.max_cpu_id + 1));
>  
> +#if defined(__i386__) || defined(__x86_64__)
> +	/*
> +	 * arch_capabilities: physinfo_arch_cap_flag list;
> +	 */
> +	arch_cap_list = c_bitmap_to_ocaml_list
> +		/* ! physinfo_arch_cap_flag CAP_ none */
> +		/* ! XEN_SYSCTL_PHYSCAP_ XEN_SYSCTL_PHYSCAP_X86_MAX max */
> +		(c_physinfo.arch_capabilities);
> +	Store_field(physinfo, 10, arch_cap_list);
> +#endif

Have you tried to build this on Arm? I wonder whether the compiler
will complain about arch_cap_list being unused there?

> +
>  	CAMLreturn(physinfo);
>  }
>  
> diff --git a/tools/xl/xl_info.c b/tools/xl/xl_info.c
> index 712b7638b0..3205270754 100644
> --- a/tools/xl/xl_info.c
> +++ b/tools/xl/xl_info.c
> @@ -210,7 +210,7 @@ static void output_physinfo(void)
>           info.hw_cap[4], info.hw_cap[5], info.hw_cap[6], info.hw_cap[7]
>          );
>  
> -    maybe_printf("virt_caps              :%s%s%s%s%s%s%s%s%s%s%s\n",
> +    maybe_printf("virt_caps              :%s%s%s%s%s%s%s%s%s%s%s%s%s\n",
>           info.cap_pv ? " pv" : "",
>           info.cap_hvm ? " hvm" : "",
>           info.cap_hvm && info.cap_hvm_directio ? " hvm_directio" : "",
> @@ -221,7 +221,9 @@ static void output_physinfo(void)
>           info.cap_vmtrace ? " vmtrace" : "",
>           info.cap_vpmu ? " vpmu" : "",
>           info.cap_gnttab_v1 ? " gnttab-v1" : "",
> -         info.cap_gnttab_v2 ? " gnttab-v2" : ""
> +         info.cap_gnttab_v2 ? " gnttab-v2" : "",
> +         info.cap_assisted_xapic ? " assisted_xapic" : "",
> +         info.cap_assisted_x2apic ? " assisted_x2apic" : ""
>          );
>  
>      vinfo = libxl_get_version_info(ctx);
> diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
> index e1e1fa14e6..77ce0b2121 100644
> --- a/xen/arch/x86/hvm/vmx/vmcs.c
> +++ b/xen/arch/x86/hvm/vmx/vmcs.c
> @@ -343,6 +343,15 @@ static int vmx_init_vmcs_config(bool bsp)
>              MSR_IA32_VMX_PROCBASED_CTLS2, &mismatch);
>      }
>  
> +    /* Check whether hardware supports accelerated xapic and x2apic. */
> +    if ( bsp )
> +    {
> +        assisted_xapic_available = cpu_has_vmx_virtualize_apic_accesses;
> +        assisted_x2apic_available = cpu_has_vmx_virtualize_x2apic_mode &&
> +                                    (cpu_has_vmx_apic_reg_virt ||
> +                                     cpu_has_vmx_virtual_intr_delivery);
> +    }
> +
>      /* The IA32_VMX_EPT_VPID_CAP MSR exists only when EPT or VPID available */
>      if ( _vmx_secondary_exec_control & (SECONDARY_EXEC_ENABLE_EPT |
>                                          SECONDARY_EXEC_ENABLE_VPID) )
> diff --git a/xen/arch/x86/include/asm/domain.h b/xen/arch/x86/include/asm/domain.h
> index e62e109598..72431df26d 100644
> --- a/xen/arch/x86/include/asm/domain.h
> +++ b/xen/arch/x86/include/asm/domain.h
> @@ -756,6 +756,9 @@ static inline void pv_inject_sw_interrupt(unsigned int vector)
>                        : is_pv_32bit_domain(d) ? PV32_VM_ASSIST_MASK \
>                                                : PV64_VM_ASSIST_MASK)
>  
> +extern bool assisted_xapic_available;
> +extern bool assisted_x2apic_available;
> +
>  #endif /* __ASM_DOMAIN_H__ */
>  
>  /*
> diff --git a/xen/arch/x86/sysctl.c b/xen/arch/x86/sysctl.c
> index f82abc2488..ad95c86aef 100644
> --- a/xen/arch/x86/sysctl.c
> +++ b/xen/arch/x86/sysctl.c
> @@ -69,6 +69,9 @@ struct l3_cache_info {
>      unsigned long size;
>  };
>  
> +bool __ro_after_init assisted_xapic_available;
> +bool __ro_after_init assisted_x2apic_available;
> +
>  static void cf_check l3_cache_get(void *arg)
>  {
>      struct cpuid4_info info;
> @@ -135,6 +138,10 @@ void arch_do_physinfo(struct xen_sysctl_physinfo *pi)
>          pi->capabilities |= XEN_SYSCTL_PHYSCAP_hap;
>      if ( IS_ENABLED(CONFIG_SHADOW_PAGING) )
>          pi->capabilities |= XEN_SYSCTL_PHYSCAP_shadow;
> +    if ( assisted_xapic_available )
> +        pi->arch_capabilities |= XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC;
> +    if ( assisted_x2apic_available )
> +        pi->arch_capabilities |= XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC;
>  }
>  
>  long arch_do_sysctl(
> diff --git a/xen/include/public/sysctl.h b/xen/include/public/sysctl.h
> index 55252e97f2..7fe05be0c9 100644
> --- a/xen/include/public/sysctl.h
> +++ b/xen/include/public/sysctl.h
> @@ -35,7 +35,7 @@
>  #include "domctl.h"
>  #include "physdev.h"
>  
> -#define XEN_SYSCTL_INTERFACE_VERSION 0x00000014
> +#define XEN_SYSCTL_INTERFACE_VERSION 0x00000015
>  
>  /*
>   * Read console content from Xen buffer ring.
> @@ -111,6 +111,13 @@ struct xen_sysctl_tbuf_op {
>  /* Max XEN_SYSCTL_PHYSCAP_* constant.  Used for ABI checking. */
>  #define XEN_SYSCTL_PHYSCAP_MAX XEN_SYSCTL_PHYSCAP_gnttab_v2
>  
> +/* The platform supports x{2}apic hardware assisted emulation. */
> +#define XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC  (1u << 0)
> +#define XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC (1u << 1)
> +
> +/* Max XEN_SYSCTL_PHYSCAP_X86__* constant. Used for ABI checking. */
> +#define XEN_SYSCTL_PHYSCAP_X86_MAX XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC
> +
>  struct xen_sysctl_physinfo {
>      uint32_t threads_per_core;
>      uint32_t cores_per_socket;
> @@ -120,6 +127,8 @@ struct xen_sysctl_physinfo {
>      uint32_t max_node_id; /* Largest possible node ID on this host */
>      uint32_t cpu_khz;
>      uint32_t capabilities;/* XEN_SYSCTL_PHYSCAP_??? */
> +    uint32_t arch_capabilities;/* XEN_SYSCTL_PHYSCAP_X86{ARM}_??? */

Nit: comment should likely be:

XEN_SYSCTL_PHYSCAP_{X86,ARM,...}_???

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 10:47:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 10:47:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287699.487813 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRtqp-0001T4-02; Wed, 09 Mar 2022 10:47:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287699.487813; Wed, 09 Mar 2022 10:47:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRtqo-0001Sx-ST; Wed, 09 Mar 2022 10:47:26 +0000
Received: by outflank-mailman (input) for mailman id 287699;
 Wed, 09 Mar 2022 10:47:26 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=l1b7=TU=arm.com=Rahul.Singh@srs-se1.protection.inumbo.net>)
 id 1nRtqo-0001Sr-0S
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 10:47:26 +0000
Received: from EUR03-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur03on0604.outbound.protection.outlook.com
 [2a01:111:f400:fe09::604])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4da3f15a-9f96-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 11:47:24 +0100 (CET)
Received: from AS8PR05CA0014.eurprd05.prod.outlook.com (2603:10a6:20b:311::19)
 by PA4PR08MB6048.eurprd08.prod.outlook.com (2603:10a6:102:e6::11)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Wed, 9 Mar
 2022 10:47:21 +0000
Received: from VE1EUR03FT025.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:311:cafe::78) by AS8PR05CA0014.outlook.office365.com
 (2603:10a6:20b:311::19) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Wed, 9 Mar 2022 10:47:21 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT025.mail.protection.outlook.com (10.152.18.74) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Wed, 9 Mar 2022 10:47:20 +0000
Received: ("Tessian outbound 826a6d8e58c3:v113");
 Wed, 09 Mar 2022 10:47:19 +0000
Received: from a7f8fe284382.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 0CBD5875-31C0-4848-ADB8-7631C89C330D.1; 
 Wed, 09 Mar 2022 10:47:08 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id a7f8fe284382.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Wed, 09 Mar 2022 10:47:08 +0000
Received: from AM5PR0801MB2020.eurprd08.prod.outlook.com
 (2603:10a6:203:4c::14) by AM5PR0802MB2403.eurprd08.prod.outlook.com
 (2603:10a6:203:9f::8) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.26; Wed, 9 Mar
 2022 10:47:07 +0000
Received: from AM5PR0801MB2020.eurprd08.prod.outlook.com
 ([fe80::253a:4d6c:61c9:af60]) by AM5PR0801MB2020.eurprd08.prod.outlook.com
 ([fe80::253a:4d6c:61c9:af60%10]) with mapi id 15.20.5038.027; Wed, 9 Mar 2022
 10:47:06 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4da3f15a-9f96-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=+AbVK641f4jYbZCLdtSy5BQ6floHaZ/eRwK4bP+9qQE=;
 b=USesYiSbhGrKpd0aQ18PGG9IoaMWvuRzosNExHDCnNh/VsE52Hx2q7jBPQw5J5ajKlC5/G1UBLmlW729ZNojoJrUc89XztqpocYi7XFBNafioFMPGGQV8bVwkGRHdP8/WG4aBlslctpHTnEaRuAvH/HYiH6/HwmETXPFy2zYCNU=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 4a60888c56b89826
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=YL3gOUH3zfEovvL8KAGeVcrQr+WUWsoCPmIfUwEQdHlXIBWkz/WOT8cmgatY+10P5XKzXJ+VBpye1sVOYwDpFEqvSoPFmPXlWlOsU4pt+8avf/VjfP0k1GrRpv4O66nCGEPP3LnSnKmooeBgY+6zbtm9kmWkV5+oqdc3TTY43VBtvpOSWhQ4OYsp42Y1vtJYywXb9nPzJzG8BL8N4tSbDbKy/sWSlTWjEkYWGUso9Lh3a/gaCZqhEyyoijSN01xjBk+mu/PhklRoN7CawavDrVG9W9bFVcdU9ASrEF/glQRkot5jhsGev+Vh6FHWUf6TgdD+Xw67fz1gSPe4qkZYjg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=+AbVK641f4jYbZCLdtSy5BQ6floHaZ/eRwK4bP+9qQE=;
 b=XXeQ/uH1V/eDx5a/7e1/l0TqAU3vf0OigdCDhkdRdzy1ZZAgwWjfD5Wh+p7Wwsb4cg5NHmX2e+njQUrHYirslmutZIK1BEdiSoUazbK7OQg3+/2vOA+/3u4UwA5CptDCF1UBJi1+m575VGC5N0tmyaTQUQryToGeeCLr3ltGSbHrrDFfJPeLkTlbbo/n9/KGk/p6X16oMSKvdVeqn5RJSRt05HC02EG6QyT7VGNsf8z8ZEYWfYr4yQJRUWEoKSDin0GRO2rswRUSFqGymSg2osmnbP6F8JgvYzv7VFx4+rr+BjrqT+RJtIKHPvcpWOMNT7CwRaNsngxERYq6tigOrw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=+AbVK641f4jYbZCLdtSy5BQ6floHaZ/eRwK4bP+9qQE=;
 b=USesYiSbhGrKpd0aQ18PGG9IoaMWvuRzosNExHDCnNh/VsE52Hx2q7jBPQw5J5ajKlC5/G1UBLmlW729ZNojoJrUc89XztqpocYi7XFBNafioFMPGGQV8bVwkGRHdP8/WG4aBlslctpHTnEaRuAvH/HYiH6/HwmETXPFy2zYCNU=
From: Rahul Singh <Rahul.Singh@arm.com>
To: =?utf-8?B?Um9nZXIgUGF1IE1vbm7DqQ==?= <roger.pau@citrix.com>
CC: Jan Beulich <jbeulich@suse.com>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, Andrew Cooper <andrew.cooper3@citrix.com>, Wei
 Liu <wl@xen.org>, George Dunlap <george.dunlap@citrix.com>, Julien Grall
	<julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Paul
 Durrant <paul@xen.org>
Subject: Re: [PATCH v2 1/3] xen/vpci: msix: move x86 specific code to x86 file
Thread-Topic: [PATCH v2 1/3] xen/vpci: msix: move x86 specific code to x86
 file
Thread-Index:
 AQHYIoBoEZVl6/zkE0mK7dGMpvA2Zqyi2K6AgAfEbQCAAAXLAIADUEkAgAD5MYCACAnKAIAAAjUAgAAIqIA=
Date: Wed, 9 Mar 2022 10:47:06 +0000
Message-ID: <D73324F4-180F-472E-B2A4-14305D3D764B@arm.com>
References: <cover.1644937405.git.rahul.singh@arm.com>
 <4d2a727ba218468e4f347dc12ca051a0534fe205.1644937405.git.rahul.singh@arm.com>
 <6e188f87-7e4c-00ee-dd0c-373d42acec34@suse.com>
 <6BFB9B87-D8A1-442D-B4DC-18760C59D7BF@arm.com>
 <c11278f4-c902-0eb9-ac59-e27c0f2ba912@suse.com>
 <41F03A07-F8D6-423D-9E40-F4B89C611C87@arm.com>
 <175a55cc-70b4-4832-9a78-0db57a9ae4a4@suse.com>
 <1205992D-ACE4-4E94-B554-3B14F6D9697E@arm.com>
 <Yih+ZjxKz0SMOXef@Air-de-Roger>
In-Reply-To: <Yih+ZjxKz0SMOXef@Air-de-Roger>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: f7ff3b02-d993-491c-b751-08da01ba2fea
x-ms-traffictypediagnostic:
	AM5PR0802MB2403:EE_|VE1EUR03FT025:EE_|PA4PR08MB6048:EE_
X-Microsoft-Antispam-PRVS:
	<PA4PR08MB604807F47E2BB91ED4E63D57FC0A9@PA4PR08MB6048.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM5PR0801MB2020.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(33656002)(71200400001)(508600001)(6486002)(54906003)(6916009)(316002)(38070700005)(38100700002)(66556008)(66476007)(66446008)(8676002)(4326008)(966005)(64756008)(86362001)(122000001)(91956017)(76116006)(66946007)(53546011)(6512007)(8936002)(36756003)(6506007)(2906002)(186003)(26005)(83380400001)(5660300002)(2616005)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <4D414FA2C17DC94EADF4273E25E88D7F@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0802MB2403
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT025.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	d91c7322-a297-47e0-4010-08da01ba27cc
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	cGttTMfJGylFSSURuEQr7lduCJcM31OdTRX9qGquH5TIMoFtGy4nlIt86nk/SCSRf87nMeeYebz1WQXxHOrRSwcKx6CdEqCDWlZ+/Mz6ERx49XiDRPhL1cfj5Bj8log/1vMXumrp8B14pJtMtLN3VlzCoLe1hnP4hU5O1Z4i1IykeC4vmZ0ZGjXrUPaJzkiQPWsQ0DUjAGYmpM9oID7Xge1u3CWm78zHk728gIuFzA/2a+IWEycXFnb0EO5mWg4bvejetfMJEO4giUxGdSmgEWIkLJhJ/4dYXVrXifhxKNjGNuQBkmv9LhvSRTTgI6Bi7+Eej44KK4zvy9pq/qEbtye+HuJafyy6ctfnI3AQuKQnFpcMvAGMjyzJolGGTCsLcP7+GH7WY2VpMWtAhwWy4tA8N3g4uTiqK/7jdXNDLwxw/GKgDkOe3bMw1R4rjwR67S6+9kmMsEjL09shf+N8Np3WkJqmdQpprF9feHu7wZhJQgsMWnhcmBNf4vmLeJk5A9BXC++GtY/mqNc1/OSIRs4FwF5xm/b2Y5/D+I1GvRza2MrewC/Jcn7FpeHrK7CB4VyEzaNtR5eR/myiOutokYx/X2z57049fkkPE5+mjfxbtyW7DkWuZbi5xA2Iruz4Nmxe+DkMiT5X9YBxQhN2ROFXGxalp3aERzGZO0/dB7W2FCJEt7RJe5d6nfxjY6TCjanfuRM+iFs6zL5F9cZQ6AmxQwCFjG4+RmanaTjQkhqApLZaj58VysmzBtD3SYWn
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(6506007)(316002)(8676002)(6862004)(70206006)(70586007)(47076005)(4326008)(5660300002)(40460700003)(336012)(82310400004)(2906002)(36860700001)(2616005)(26005)(33656002)(186003)(6512007)(83380400001)(8936002)(53546011)(356005)(508600001)(86362001)(36756003)(966005)(6486002)(81166007)(54906003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 10:47:20.4396
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: f7ff3b02-d993-491c-b751-08da01ba2fea
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT025.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR08MB6048
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From xen-devel-bounces@lists.xenproject.org Wed Mar 09 11:10:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 11:10:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287707.487823 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRuDD-0004kp-U6; Wed, 09 Mar 2022 11:10:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287707.487823; Wed, 09 Mar 2022 11:10:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRuDD-0004ki-Qx; Wed, 09 Mar 2022 11:10:35 +0000
Received: by outflank-mailman (input) for mailman id 287707;
 Wed, 09 Mar 2022 11:10:35 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRuDD-0004kY-6L; Wed, 09 Mar 2022 11:10:35 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRuDC-0002Vo-U5; Wed, 09 Mar 2022 11:10:34 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRuDC-0005ym-IP; Wed, 09 Mar 2022 11:10:34 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRuDC-0005Pj-HW; Wed, 09 Mar 2022 11:10:34 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=H1j814PKvekTehSo+I44tr8RpgRID8ZJzSWuD9QN5uI=; b=TFV5mHAhWRxRV8fvbkczMuV5ZE
	Ss+czdqiG9hlgR9KrugRi86lYh/HNu7nS5NiaupW2oSfdHpbvCXULrDP5e15zWololPjxMMfhYe9P
	3QAxcEUPRv4BU/dvGCc6PYNe9WiCJhJJCSvEvsUh03sblVFgD4YX/z7JyYY3GKn3lsTA=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168480-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.12-testing test] 168480: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-4.12-testing:test-arm64-arm64-libvirt-xsm:xen-boot:fail:heisenbug
    xen-4.12-testing:test-amd64-amd64-xl-qcow2:guest-saverestore.2:fail:heisenbug
    xen-4.12-testing:test-amd64-amd64-xl-qcow2:guest-localmigrate/x10:fail:nonblocking
    xen-4.12-testing:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-4.12-testing:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-4.12-testing:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-4.12-testing:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.12-testing:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-4.12-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.12-testing:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.12-testing:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.12-testing:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.12-testing:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.12-testing:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.12-testing:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.12-testing:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.12-testing:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-4.12-testing:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-4.12-testing:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.12-testing:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-4.12-testing:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-4.12-testing:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-4.12-testing:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.12-testing:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.12-testing:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-4.12-testing:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-4.12-testing:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.12-testing:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-4.12-testing:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.12-testing:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.12-testing:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.12-testing:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-4.12-testing:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-4.12-testing:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-4.12-testing:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=944afa38d9339a67f0164d07fb7ac8a54e9a4c60
X-Osstest-Versions-That:
    xen=71e9d0c94dd710bf26adf115ee0a2dbee30bb8c1
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 09 Mar 2022 11:10:34 +0000

flight 168480 xen-4.12-testing real [real]
flight 168494 xen-4.12-testing real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168480/
http://logs.test-lab.xenproject.org/osstest/logs/168494/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-arm64-arm64-libvirt-xsm  8 xen-boot            fail pass in 168494-retest
 test-amd64-amd64-xl-qcow2    18 guest-saverestore.2 fail pass in 168494-retest

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qcow2 19 guest-localmigrate/x10 fail in 168494 like 167816
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check fail in 168494 never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check fail in 168494 never pass
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 167816
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 167816
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 167816
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 167816
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 167816
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 167816
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 167816
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 167816
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 167816
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 167816
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 167816
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 167816
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  944afa38d9339a67f0164d07fb7ac8a54e9a4c60
baseline version:
 xen                  71e9d0c94dd710bf26adf115ee0a2dbee30bb8c1

Last test of basis   167816  2022-01-25 14:06:00 Z   42 days
Testing same since   168480  2022-03-08 18:07:22 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bertrand Marquis <bertrand.marquis@arm.com>
  Julien Grall <julien@xen.org>
  Rahul Singh <rahul.singh@arm.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 fail    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    fail    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   71e9d0c94d..944afa38d9  944afa38d9339a67f0164d07fb7ac8a54e9a4c60 -> stable-4.12


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 11:18:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 11:18:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287722.487859 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRuKV-0005jE-0W; Wed, 09 Mar 2022 11:18:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287722.487859; Wed, 09 Mar 2022 11:18:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRuKU-0005j7-TT; Wed, 09 Mar 2022 11:18:06 +0000
Received: by outflank-mailman (input) for mailman id 287722;
 Wed, 09 Mar 2022 11:18:05 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=QNbA=TU=citrix.com=prvs=060736ad3=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRuKS-0005j1-Qj
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 11:18:05 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 9459ba34-9f9a-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 12:18:02 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9459ba34-9f9a-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646824682;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=WPUjYX9bugbRPq6ux/eRYhso4JsCF2T4Qrs3V2ye7dI=;
  b=W1LatPV+Ix5mCnQF0r118NiPqsfN4RJVlR3XhvuWus1/NhrC2tK6nOOv
   Lr5DPKBBZfZiIa5ppL2pAjny4WPLe3pqAkCYl+vNf/Ytt5h7GDRfJwsjP
   0iixHdvTvy//MTKH+T99H08NrsGxwcPfy7kmR6AyPVyPlEN3Jf6o+sPPS
   A=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65801515
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:l/M6nq0PkV2BDTIIv/bD5S9xkn2cJEfYwER7XKvMYLTBsI5bpzAHy
 GFNC2GHP6rbNGfwLYpyYNmw/ElUu5XUyoVrHlBqpC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUw0IDja++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /1qtr2WSDkvO5fwt+BaSDNIShNAZYNJreqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHxO4wSoDd4xCzxBvc6W5HTBa7N4Le02R9u25AWRKuHO
 qL1bxJRfDnNZixLOWxIN8MUvsmRjV38YwJx/Qf9Sa0fvDGIkV0ZPKLWGMHOZtWASMFRn0CZj
 mHL5WL0BlcdLtP34TiY9nOhgMffkCW9X5gdfJWg/+NuqE2ewCoUEhJ+fUu2p7y1h1CzX/pbK
 lcI4Ww+oK4q7kupQ9LhGRqirxasvBQRRt5RGO0S8xyWx+zf5APxLlINTiNFLucnssA2bTUw0
 xmCmNaBLSNrmK2YTzSa7Lj8hRm/IzQPJGkOIwoNVxIY4sLLqZs2yBnIS75e/LWd14OvX2uqm
 nbT8XZ41+57YdM3O7uT2lPmpTOSoJ3zciExoR79TjuX0FtXa9vwD2C30mTz4fFFJYefa1COu
 nkYhsSThNwz4YGxeD+lG7tUQuzwjxqRGHiF2AM0QcF9n9i40yP7JehtDCdCyFCF2yruURvge
 wfttAxY//e/11P6PPYsM+pd5ynHpJUM9OgJtNiJNrKigbArLWdrGR2Cg2bKgQgBd2B2zckC1
 W+zK5rEMJrjIf0PIMCKb+kcy6Q34Ss12HneQ5v2pzz+j+bAOyDJE+dZbAfQBgzc0E9iiF+Fm
 zq4H5HWoyizrcWkOnWHmWLtBQtiwYcH6WDe9JUMK7/rzvtOE2A9Ef7BqY7NiKQ+95m5Ytzgp
 ynnMmcBkQKXrSSedW2iNyAyAJuyDM0XhS9qYkQR0aOAhiFLjXCHt/xEKfPavNAPqYRe8BKDZ
 6JcKpvaXagXFGivFvZ0RcCVkbGOvS+D3GqmFyGkfCI+b9hnQQnI8cXjZQzh6G8FCS/fiCf0i
 +f5vu8HafLvnzhfMfs=
IronPort-HdrOrdr: A9a23:rtjoBK1nGvvEiKgS7OqXdwqjBVByeYIsimQD101hICG9Lfb2qy
 n+ppgmPEHP5Qr5OEtApTiBUJPwJk800aQFm7X5Wo3SITUO2VHYV72KiLGN/9SOIVydygcw79
 YET0E6MqyNMbEYt7eK3ODbKadY/DDvysnB7o2/vhRQpENRGtldBm9Ce3im+yZNNW977PQCZf
 6hDp0tnUveRZ1bVLXyOlA1G8z44/HbnpPvZhALQzYh9Qm1lDutrJr3CQKR0BsyWy5Ghe5Kyx
 mOryXJooGY992rwB7V0GHeq7xQhdva09NGQOiBkNIcJDnAghuhIK5hR7qBljYop/zH0idgrP
 D85zMbe+hj4XLYeW+45TPrxgnbyT4rr0TvzFeJ6EGT1vDRdXYfMY5slIhZehzW5w4Lp9dnyp
 9G2Gqfqt5+EQ7AtD6V3amGazha0m6P5VYym+8aiHJSFaEEbqVKkIAZ9ERJVL8dASPB7pw9Gu
 UGNrCR2B9vSyLaU5nlhBgu/DT1NU5DXStuA3Jy9/B96gIm0kyQlCAjtY4idnRpzuNId3AL3Z
 WADk1SrsA8ciYnV9MMOA4/e7rENoXse2O7DIvAGyWvKEk4U0i93qIfpo9FoN2XRA==
X-IronPort-AV: E=Sophos;i="5.90,167,1643691600"; 
   d="scan'208";a="65801515"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Q0GYg9NMBiC3VpSzni7hyFMiynsLV9JxYSfi7SHkFlotme9WOhTpN++3P/jUs0g9oaRBpBxlYGnZiOosh5Owx0hva1y7/5RBaQvapL3+qzdQcTqG6cWovImIkYMHRaIE0ixyZ39LwTKBD/037P5faTKIF72jlyX761rQKdaKDIvY1Dv0ubjSCCDNGtRNx8NbC2j42niU9MWJ3O/zgzDFBBdSeS+n84lT1rOJd51765LjLzckkzEt92/sy872W14z2GlecJM7FIvfKL+z+vXsRiReICSXV0j/X3lCxtTxjAKIfZsRiE3hh5gbiyhYGrBVHfqk8KtTtt4wBcsZSZppRA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=+Nah9IVu+bsiNX23p3/K8fCHUk1qdH8r7XMO3YfzH5M=;
 b=Yhuq8qGZdDzjxJC9/BHeK+m/G+QB0JF4KnX/oykHOMeBXdgwx9UF41mR+amKPNagcHEntfeAhiEgoruXbxYw6g7yriPiAng/C4RLCFNJ3Nv6+FFeYdaUtjOpzPYmBuNe7Yo8zbtE3OHOL1irwy/0+xLCZXadngXZbpyYGbjHdHttVbJP5vjPxt7CH6L7+ils+L69XE3X6htODrEg9PolnbxlM4Gm/3jOIl0tXsIyUzX+H7YcXxhkJ5uTDLGr8h1sL/YV+jgQgk9rkIGVahy11HP53ZXBA+QhkKM5J1AtwzhqmJwrp02wrKDvXG1dmpFpClKcHLmcFqTaPi5/+kUv5g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=+Nah9IVu+bsiNX23p3/K8fCHUk1qdH8r7XMO3YfzH5M=;
 b=ub43VARB6y6edJDxUAoddDej9CAYKwHUC1vR/6SVfoIjiapW3VSYTETqXVVsGQLVOfV7HbjCpxbu+qm0U+p909wcovU6YTYf4HAKX/fnpdBxiusDA7468aHL3kjX3xQElgtM1kqDYkA19RsB9A7ex7w5qdqhHk9obK9samga+Tc=
Date: Wed, 9 Mar 2022 12:17:42 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Rahul Singh <Rahul.Singh@arm.com>
CC: Jan Beulich <jbeulich@suse.com>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, Andrew Cooper <andrew.cooper3@citrix.com>, Wei
 Liu <wl@xen.org>, George Dunlap <george.dunlap@citrix.com>, Julien Grall
	<julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Paul
 Durrant <paul@xen.org>
Subject: Re: [PATCH v2 1/3] xen/vpci: msix: move x86 specific code to x86 file
Message-ID: <YiiM1vdbJ+51Lyvq@Air-de-Roger>
References: <cover.1644937405.git.rahul.singh@arm.com>
 <4d2a727ba218468e4f347dc12ca051a0534fe205.1644937405.git.rahul.singh@arm.com>
 <6e188f87-7e4c-00ee-dd0c-373d42acec34@suse.com>
 <6BFB9B87-D8A1-442D-B4DC-18760C59D7BF@arm.com>
 <c11278f4-c902-0eb9-ac59-e27c0f2ba912@suse.com>
 <41F03A07-F8D6-423D-9E40-F4B89C611C87@arm.com>
 <175a55cc-70b4-4832-9a78-0db57a9ae4a4@suse.com>
 <1205992D-ACE4-4E94-B554-3B14F6D9697E@arm.com>
 <Yih+ZjxKz0SMOXef@Air-de-Roger>
 <D73324F4-180F-472E-B2A4-14305D3D764B@arm.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <D73324F4-180F-472E-B2A4-14305D3D764B@arm.com>
X-ClientProxiedBy: LO2P123CA0065.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:1::29) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 998a9efb-6718-4f4e-bbb2-08da01be70d7
X-MS-TrafficTypeDiagnostic: BN6PR03MB3043:EE_
X-Microsoft-Antispam-PRVS: <BN6PR03MB3043603F9FE8C8FDF674CDB38F0A9@BN6PR03MB3043.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(53546011)(66946007)(6506007)(66556008)(9686003)(966005)(6486002)(6512007)(4326008)(54906003)(508600001)(8676002)(66476007)(316002)(86362001)(6666004)(82960400001)(83380400001)(186003)(26005)(38100700002)(6916009)(2906002)(8936002)(33716001)(85182001)(5660300002)(67856001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?b0JIYW15RDg4RlZSaEd5LzV0UUhGSFVLWnJ3dGltRXJXVUMzZXgwQlZ6ZVll?=
 =?utf-8?B?cjZhdzRoT0FaSDZkRVBKZ1hLL2lmY2pqeWVXSlpWVXczTm5UbzNnTFlqdXlr?=
 =?utf-8?B?M2szT2lhZWJybk9nNllFSXUyUVpDejVCVEc1b1ZFTmhRTUNRQkVvNUt0R3gw?=
 =?utf-8?B?WVAxa2tvakpuZGxiSTh5V0xkT3NOM0VWcEtlbGgyRXhMdUhkT1V4c3hFMS9x?=
 =?utf-8?B?MlhEdG42M1BHK1N4SGhvbXZLK2VTZnFLbkFvdHdIME5idnh2cGt1RTV4TmM2?=
 =?utf-8?B?L0lmcEgyME5VUDZKdkd2NTd2bjVKZ3RvQndPbzV4UlBoVy9VaXU0eWkyK2Y3?=
 =?utf-8?B?dmJrZWlLQzQ5c1BHME5vZWlsdk8vM0phNHE2dDk0dDRpTTY4a1N2ZnFFcTMw?=
 =?utf-8?B?SEw0alBtOXFDR090K1BsblJ2NlRFQXZoZlB6TXRORnpiMzE1WmN4elV1ampH?=
 =?utf-8?B?U01zOEpOdzhZdWZRaWh4TE9KRnowbzN1V1hTZkNzVUJlUWw1bnE3aXRlSHgx?=
 =?utf-8?B?djVlVCs5UmNEQWRXZ0haSTBDaE1uWmIvME83WEVaU3RLclFlb29TeVFzV1Vp?=
 =?utf-8?B?cWd3ZE9iWGxKaUdsOUpUZmdReWthaGpLYW9CWEZxZE10cDY2OUR0T1I4WWlp?=
 =?utf-8?B?VFFBdVd6a3NKcDRNS3FpU2dBSStXYUF1K3R4YUlxajQvU1NtdGpuVXAyYXMr?=
 =?utf-8?B?eFFFcUZkN3VSdXJmMW9NaEZKRjdYNUdXaVl5WHFIR3A2dUc4V012WlJyRXBX?=
 =?utf-8?B?cm5VbDE2WTFxUmJNNG52emtHNmVpMFVvcWFMZ3IzSkt4Uk9oSCttUE1MSGZv?=
 =?utf-8?B?Sm5malpCTnNobkY5K0xtdkFBRXQ3a3ZNT0JFeFRTcE5OT0NJYlQrU2NEcEtu?=
 =?utf-8?B?ZzgzL0tjZXR1WUJFMVRlb3lEM0Z2UkFiV0ovQzJBOVZ6eElER25uKzY3cTBD?=
 =?utf-8?B?cnpESFRtcnhSWHdIMERrTjNHUHNGQThROWVraFFZSmt5Z3VaN2tyeUl6QXRF?=
 =?utf-8?B?ZW90WlJBUkNDM1dUSzgrekF5ZmNoQlVZOGszZjA2eG9qWHMrVTZqTUZyRzJY?=
 =?utf-8?B?Vmlha3FwTGlVZnVPTmp3R1gyUitRdVNHTmROd2FhVHB0UjZadFZKcFhVMXk0?=
 =?utf-8?B?aC9DRVpZY3NPNHdRUS9OK0luckxQdU5iNVNhbGJ1TGtaaCtreEFMNTVjbUxB?=
 =?utf-8?B?dXpldDlNSEdmZEVTUklVUVpmWXREK05ZbVhkMUFuQkZPQmU5L3dCREQrck42?=
 =?utf-8?B?ak44bTY5RUZiYlAvbDFGaUkrZEhzYno5OTAySmZHdUtCcDFvdFVpR0phWEl5?=
 =?utf-8?B?MGRvQmRPZHlXSFRTcWp4THp0Q0VjUXQ3SkVOcDFUVUtLSnpzenlYeXZjeGxS?=
 =?utf-8?B?VmR0M0dmZFRwWlJNMGZ6VGtrY09tMmNNMmNkYkJRQklSeGZsaG54R1J5Y1NS?=
 =?utf-8?B?THB2enV4MU5pMjNwT3BsVUVsRVJFL0JNK2tuaFBuU1EweWJVTEUwcnlIWEor?=
 =?utf-8?B?WlI4REpKQmZVc0I1TmtFdzArcnpBUEhQc2dycy9CV2dMaHBBekdPemJnaVBa?=
 =?utf-8?B?UENPbVF0R1haNkFmUDUxZnFjK3lyM1l4SkhUQm5FeDJLNy96Y2IxUGlTM1dR?=
 =?utf-8?B?RUZTT1hqUXVMYWhiVjdtVjljaTZOSm9oWUtyallnQ2pzTTBWNDFHSkxMMXdx?=
 =?utf-8?B?N3FDZ2ljMWZFbUVzbk4rYi8yamZXTXFraVpLa2FWQnVKRmE5ektuRmFLR2JK?=
 =?utf-8?B?cVB5TnJvN2ZYVEoyMUV4YzBGWFh0dHBUM1ZNL0N3QzNLNmhnQjY1aVJCeWts?=
 =?utf-8?B?bUNlRWhpekZObTJzb1BUY0ZYK3RxWTVjditHTlBucEZybHpPSm9WcnZtM2h0?=
 =?utf-8?B?R09kNVA3ZFh5d0puYjNOUVorVklGUnlpRFZ5bjZySUtPQWVpMzhnRjN6Y1Bz?=
 =?utf-8?B?VHNCRW1QS3RYWFZWZ1Zkb3lwTVVuRUNpUWpWR21GOUpGRkxkRWhabXhGd2Uz?=
 =?utf-8?B?eGhWNldiR2IzaWNOdGVrL1RWTnRlQzkySTd3VDJuZlZlbktTQjM5Qktud3Zh?=
 =?utf-8?B?dzAvRjdxQkZ1Sm9GRUM1eldHWXlIUTRrdWx3VEZiL29Sa1VFWm5XSENVMWJY?=
 =?utf-8?B?SmZjbE9GYklpdExFWjl1dXNBeVZHZmNYaDdjUlQ5bjVTeGgwWGRiOVRPWmtD?=
 =?utf-8?Q?iyEK7B1eaSblV7zg3uB+r5Y=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 998a9efb-6718-4f4e-bbb2-08da01be70d7
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 11:17:47.6040
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: CUx12nspI1kRGNEYrM2NKnoNxKYXUNpJ+6zTs+SuJiqT68rrbCkhYx9sgUjxAovubsITyFIWaIf2GmEtjV9HPA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR03MB3043
X-OriginatorOrg: citrix.com

On Wed, Mar 09, 2022 at 10:47:06AM +0000, Rahul Singh wrote:
> Hi Roger,
> 
> > On 9 Mar 2022, at 10:16 am, Roger Pau Monné <roger.pau@citrix.com> wrote:
> > 
> > On Wed, Mar 09, 2022 at 10:08:12AM +0000, Rahul Singh wrote:
> >> Hi Jan,
> >> 
> >>> On 4 Mar 2022, at 7:23 am, Jan Beulich <jbeulich@suse.com> wrote:
> >>> 
> >>> On 03.03.2022 17:31, Rahul Singh wrote:
> >>>>> On 1 Mar 2022, at 1:55 pm, Jan Beulich <jbeulich@suse.com> wrote:
> >>>>> On 01.03.2022 14:34, Rahul Singh wrote:
> >>>>>>> On 24 Feb 2022, at 2:57 pm, Jan Beulich <jbeulich@suse.com> wrote:
> >>>>>>> On 15.02.2022 16:25, Rahul Singh wrote:
> >>>>>>>> --- a/xen/arch/x86/hvm/vmsi.c
> >>>>>>>> +++ b/xen/arch/x86/hvm/vmsi.c
> >>>>>>>> @@ -925,4 +925,106 @@ int vpci_msix_arch_print(const struct vpci_msix *msix)
> >>>>>>>> 
> >>>>>>>>  return 0;
> >>>>>>>> }
> >>>>>>>> +
> >>>>>>>> +int vpci_make_msix_hole(const struct pci_dev *pdev)
> >>>>>>>> +{
> >>>>>>>> +    struct domain *d = pdev->domain;
> >>>>>>>> +    unsigned int i;
> >>>>>>>> +
> >>>>>>>> +    if ( !pdev->vpci->msix )
> >>>>>>>> +        return 0;
> >>>>>>>> +
> >>>>>>>> +    /* Make sure there's a hole for the MSIX table/PBA in the p2m. */
> >>>>>>>> +    for ( i = 0; i < ARRAY_SIZE(pdev->vpci->msix->tables); i++ )
> >>>>>>>> +    {
> >>>>>>>> +        unsigned long start = PFN_DOWN(vmsix_table_addr(pdev->vpci, i));
> >>>>>>>> +        unsigned long end = PFN_DOWN(vmsix_table_addr(pdev->vpci, i) +
> >>>>>>>> +                                     vmsix_table_size(pdev->vpci, i) - 1);
> >>>>>>>> +
> >>>>>>>> +        for ( ; start <= end; start++ )
> >>>>>>>> +        {
> >>>>>>>> +            p2m_type_t t;
> >>>>>>>> +            mfn_t mfn = get_gfn_query(d, start, &t);
> >>>>>>>> +
> >>>>>>>> +            switch ( t )
> >>>>>>>> +            {
> >>>>>>>> +            case p2m_mmio_dm:
> >>>>>>>> +            case p2m_invalid:
> >>>>>>>> +                break;
> >>>>>>>> +            case p2m_mmio_direct:
> >>>>>>>> +                if ( mfn_x(mfn) == start )
> >>>>>>>> +                {
> >>>>>>>> +                    clear_identity_p2m_entry(d, start);
> >>>>>>>> +                    break;
> >>>>>>>> +                }
> >>>>>>>> +                /* fallthrough. */
> >>>>>>>> +            default:
> >>>>>>>> +                put_gfn(d, start);
> >>>>>>>> +                gprintk(XENLOG_WARNING,
> >>>>>>>> +                        "%pp: existing mapping (mfn: %" PRI_mfn
> >>>>>>>> +                        "type: %d) at %#lx clobbers MSIX MMIO area\n",
> >>>>>>>> +                        &pdev->sbdf, mfn_x(mfn), t, start);
> >>>>>>>> +                return -EEXIST;
> >>>>>>>> +            }
> >>>>>>>> +            put_gfn(d, start);
> >>>>>>>> +        }
> >>>>>>>> +    }
> >>>>>>>> +
> >>>>>>>> +    return 0;
> >>>>>>>> +}
> >>>>>>> 
> >>>>>>> ... nothing in this function looks to be x86-specific, except maybe
> >>>>>>> functions like clear_identity_p2m_entry() may not currently be available
> >>>>>>> on Arm. But this doesn't make the code x86-specific.
> >>>>>> 
> >>>>>> I will maybe be wrong but what I understand from the code is that for x86 
> >>>>>> if there is no p2m entries setup for the region, accesses to them will be trapped 
> >>>>>> into the hypervisor and can be handled by specific MMIO handler.
> >>>>>> 
> >>>>>> But for ARM when we are registering the MMIO handler we have to provide 
> >>>>>> the GPA also for the MMIO handler. 
> > 
> > Right, but you still need those regions to not be mapped on the second
> > stage translation, or else no trap will be triggered and thus the
> > handlers won't run?
> > 
> > Regardless of whether the way to register the handlers is different on
> > Arm and x86, you still need to assure that the MSI-X related tables
> > are not mapped on the guest second stage translation, or else you are
> > just allowing guest access to the native ones.
> 
> What I understand from the VPCI code we are not mapping the MSI-X related tables/BAR
> to Stage-2 translation therefore no need to remove the mapping.
> 
> http://xenbits.xen.org/gitweb/?p=xen.git;a=blob;f=xen/drivers/vpci/header.c;h=a1c928a0d26f5cefd98727ee37f5dc43ceba80a6;hb=HEAD#l248

Right, sorry, was slightly confused. So this is indeed only needed if
Arm does some kind of pre-mapping of non-RAM regions. For example an
x86 PVH dom0 will add the regions marked as 'reserved' to the second
stage translation, and we need vpci_make_msix_hole in order to punch
holes there if those pre-mapped regions happen to overlap with any
MSI-X table.

If there aren't any non-RAM regions mapped on Arm for it's hardware
domain by default then I guess it's safe to make this arch-specific.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 11:21:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 11:21:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287729.487869 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRuNn-0007Ah-Ia; Wed, 09 Mar 2022 11:21:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287729.487869; Wed, 09 Mar 2022 11:21:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRuNn-0007Aa-Fh; Wed, 09 Mar 2022 11:21:31 +0000
Received: by outflank-mailman (input) for mailman id 287729;
 Wed, 09 Mar 2022 11:21:29 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nRuNl-0007AO-Q1
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 11:21:29 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRuNl-0002k8-93; Wed, 09 Mar 2022 11:21:29 +0000
Received: from 54-240-197-224.amazon.com ([54.240.197.224]
 helo=dev-dsk-jgrall-1b-035652ec.eu-west-1.amazon.com)
 by xenbits.xenproject.org with esmtpsa
 (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRuNl-0004wn-0o; Wed, 09 Mar 2022 11:21:29 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:MIME-Version:Message-Id:Date:
	Subject:Cc:To:From; bh=YDBOygF2/EnnHsZrv2Io8p/Me0uGA7yPiBzzvhLw+V0=; b=R1DkAG
	a6B6pvBnRh/pDhaGzYCN17qFzXSrS6QDn8Hjkp6UqoV6HSzsC0DHIHZsw/J3qR2L8vjnZ7O/g59+T
	FAW/Oyuv0vjns157YFku5RaD0ezQ2VhjrOJ3r4z50gyXV22MVkTfwGgX9f5I3YYWqJ5OQdBxtQj/f
	Ng7GykwUoJQ=;
From: Julien Grall <julien@xen.org>
To: xen-devel@lists.xenproject.org
Cc: marco.solieri@minervasys.tech,
	lucmiccio@gmail.com,
	Julien Grall <jgrall@amazon.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH early-RFC 0/5] xen/arm: Don't switch TTBR while the MMU is on
Date: Wed,  9 Mar 2022 11:20:43 +0000
Message-Id: <20220309112048.17377-1-julien@xen.org>
X-Mailer: git-send-email 2.32.0
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Julien Grall <jgrall@amazon.com>

Hi all,

Currently, Xen on Arm will switch TTBR whilst the MMU is on. This is
similar to replacing existing mappings with new ones. So we need to
follow a break-before-make sequence.

When switching the TTBR, we need to temporary disable the MMU
before update the TTBR. This means the page-tables must contain an
identity mapping.

The current memory layout is not very flexible and has an higher chance
to clash with the identity mapping.

On Arm64, we have plenty of unused virtual address space Therefore, we can
simply reshuffle the layout to leave the first part of the virtual
address space empty.

On Arm32, the virtual address space is already quite full. That said,
we are currently reserving 2GB for the temporary mapping. This is far
too much given those mappings are temporary. It would be sufficient
to only reserve a few MBs.

The Arm32 part is not yet addressed in this version. The series is
sent as an early RFC to gather some feedback on the approach.

After this series, most of Xen page-table code should be compliant
with the Arm Arm. The last two issues I am aware of are:
 - domheap: Mappings are replaced without using the Break-Before-Make
   approach.
 - The cache is not cleaned/invalidated when updating the page-tables
   with Data cache off (like during early boot).

This series is based on "xen/arm: mm: Remove open-coding mappings"
along with some extra small patches. Some of them are already merged.
For convience, I pushed a branch with everything applied:

https://xenbits.xen.org/git-http/people/julieng/xen-unstable.git
branch boot-pt-rework-v1

Note the build for arm32 is likely broken. This will be addressed
on the next version.

Cheers,

Julien GralL (1):
  xen/arm: mm: Introduce helpers to prepare/enable/disable the identity
    mapping

Julien Grall (4):
  xen/arm: Clean-up the memory layout
  xen/arm64: Rework the memory layout
  xen/arm: mm: Rework switch_ttbr()
  xen/arm: smpboot: Directly switch to the runtime page-tables

 xen/arch/arm/arm64/head.S         |  63 ++++++++--------
 xen/arch/arm/include/asm/config.h |  44 +++++++----
 xen/arch/arm/include/asm/mm.h     |   2 +
 xen/arch/arm/mm.c                 | 120 +++++++++++++++++++++++-------
 xen/arch/arm/smpboot.c            |   3 +
 5 files changed, 160 insertions(+), 72 deletions(-)

-- 
2.32.0



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 11:21:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 11:21:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287730.487875 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRuNn-0007Ck-SH; Wed, 09 Mar 2022 11:21:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287730.487875; Wed, 09 Mar 2022 11:21:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRuNn-0007CS-N1; Wed, 09 Mar 2022 11:21:31 +0000
Received: by outflank-mailman (input) for mailman id 287730;
 Wed, 09 Mar 2022 11:21:31 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nRuNm-0007AU-VH
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 11:21:30 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRuNm-0002kI-Eh; Wed, 09 Mar 2022 11:21:30 +0000
Received: from 54-240-197-224.amazon.com ([54.240.197.224]
 helo=dev-dsk-jgrall-1b-035652ec.eu-west-1.amazon.com)
 by xenbits.xenproject.org with esmtpsa
 (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRuNm-0004wn-6U; Wed, 09 Mar 2022 11:21:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:MIME-Version:References:
	In-Reply-To:Message-Id:Date:Subject:Cc:To:From;
	bh=8Ia0Jnbi/QUOonrg8XOxt2CtfmBWEI2enlPU5FZKhQo=; b=gCBf5W05J34Vo7gLWv0PbgzeQK
	35rH3yeNxuOHfEYgvJbciWMHAF2nflPFQcLZZ0LJEn7XQ2+tJjqMfTuKaD4WvQ0NPxoGO6maIxq5H
	C3wUowuue0jN9Iou6WPDyJA5UJ5+lHfuCTnhUpjvSfLSbLaB8iRs0GsQV2L3rj5t36SA=;
From: Julien Grall <julien@xen.org>
To: xen-devel@lists.xenproject.org
Cc: marco.solieri@minervasys.tech,
	lucmiccio@gmail.com,
	Julien Grall <jgrall@amazon.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH early-RFC 1/5] xen/arm: Clean-up the memory layout
Date: Wed,  9 Mar 2022 11:20:44 +0000
Message-Id: <20220309112048.17377-2-julien@xen.org>
X-Mailer: git-send-email 2.32.0
In-Reply-To: <20220309112048.17377-1-julien@xen.org>
References: <20220309112048.17377-1-julien@xen.org>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Julien Grall <jgrall@amazon.com>

In a follow-up patch, the base address for the common mappings will
vary between arm32 and arm64. To avoid any duplication, define
every mapping in the common region from the previous one.

Take the opportunity to add mising *_SIZE for some mappings.

Signed-off-by: Julien Grall <jgrall@amazon.com>

---

After the next patch, the term "common" will sound strange because
the base address is different. Any better suggestion?
---
 xen/arch/arm/include/asm/config.h | 24 +++++++++++++++++-------
 1 file changed, 17 insertions(+), 7 deletions(-)

diff --git a/xen/arch/arm/include/asm/config.h b/xen/arch/arm/include/asm/config.h
index aedb586c8d27..5db28a8dbd56 100644
--- a/xen/arch/arm/include/asm/config.h
+++ b/xen/arch/arm/include/asm/config.h
@@ -107,16 +107,26 @@
  *  Unused
  */
 
-#define XEN_VIRT_START         _AT(vaddr_t,0x00200000)
-#define FIXMAP_ADDR(n)        (_AT(vaddr_t,0x00400000) + (n) * PAGE_SIZE)
+#define COMMON_VIRT_START       _AT(vaddr_t, 0)
 
-#define BOOT_FDT_VIRT_START    _AT(vaddr_t,0x00600000)
-#define BOOT_FDT_SLOT_SIZE     MB(4)
-#define BOOT_FDT_VIRT_END      (BOOT_FDT_VIRT_START + BOOT_FDT_SLOT_SIZE)
+#define XEN_VIRT_START          (COMMON_VIRT_START + MB(2))
+#define XEN_SLOT_SIZE           MB(2)
+#define XEN_VIRT_END            (XEN_VIRT_START + XEN_SLOT_SIZE)
+
+#define FIXMAP_VIRT_START       XEN_VIRT_END
+#define FIXMAP_SLOT_SIZE        MB(2)
+#define FIXMAP_VIRT_END         (FIXMAP_VIRT_START + FIXMAP_SLOT_SIZE)
+
+#define FIXMAP_ADDR(n)          (FIXMAP_VIRT_START + (n) * PAGE_SIZE)
+
+#define BOOT_FDT_VIRT_START     FIXMAP_VIRT_END
+#define BOOT_FDT_SLOT_SIZE      MB(4)
+#define BOOT_FDT_VIRT_END       (BOOT_FDT_VIRT_START + BOOT_FDT_SLOT_SIZE)
 
 #ifdef CONFIG_LIVEPATCH
-#define LIVEPATCH_VMAP_START   _AT(vaddr_t,0x00a00000)
-#define LIVEPATCH_VMAP_END     (LIVEPATCH_VMAP_START + MB(2))
+#define LIVEPATCH_VMAP_START   BOOT_FDT_VIRT_END
+#define LIVEPATCH_SLOT_SIZE    MB(2)
+#define LIVEPATCH_VMAP_END     (LIVEPATCH_VMAP_START + LIVEPATCH_SLOT_SIZE)
 #endif
 
 #define HYPERVISOR_VIRT_START  XEN_VIRT_START
-- 
2.32.0



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 11:21:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 11:21:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287731.487891 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRuNp-0007g4-26; Wed, 09 Mar 2022 11:21:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287731.487891; Wed, 09 Mar 2022 11:21:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRuNo-0007fE-Uk; Wed, 09 Mar 2022 11:21:32 +0000
Received: by outflank-mailman (input) for mailman id 287731;
 Wed, 09 Mar 2022 11:21:32 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nRuNo-0007Kl-1H
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 11:21:32 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRuNn-0002kV-Jy; Wed, 09 Mar 2022 11:21:31 +0000
Received: from 54-240-197-224.amazon.com ([54.240.197.224]
 helo=dev-dsk-jgrall-1b-035652ec.eu-west-1.amazon.com)
 by xenbits.xenproject.org with esmtpsa
 (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRuNn-0004wn-CE; Wed, 09 Mar 2022 11:21:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:MIME-Version:References:
	In-Reply-To:Message-Id:Date:Subject:Cc:To:From;
	bh=dYgEWr81tlTzWi28Pdn1NFHJfMGO9dd29hy4ZTHlKlQ=; b=nCGiFSchNCffHryZ9zn6E4ovmE
	qeyTdgG1TVW0VfYQcAHo5MD0Baz2sqTtvX87CZV9WBcOcrmiTBZFPN7U4bF0i2yihphkS6o1t0w4K
	P4MJtr7CjEeAOW124yqnZTiSU0thzSEtvEg+Yr7GQKX5L1ebFV6OZhlg8ocgVdrrHEUc=;
From: Julien Grall <julien@xen.org>
To: xen-devel@lists.xenproject.org
Cc: marco.solieri@minervasys.tech,
	lucmiccio@gmail.com,
	Julien Grall <jgrall@amazon.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH early-RFC 2/5] xen/arm64: Rework the memory layout
Date: Wed,  9 Mar 2022 11:20:45 +0000
Message-Id: <20220309112048.17377-3-julien@xen.org>
X-Mailer: git-send-email 2.32.0
In-Reply-To: <20220309112048.17377-1-julien@xen.org>
References: <20220309112048.17377-1-julien@xen.org>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Julien Grall <jgrall@amazon.com>

Xen is currently not fully compliant with the Arm because it will
switch the TTBR with the MMU on.

In order to be compliant, we need to disable the MMU before
switching the TTBR. The implication is the page-tables should
contain an identity mapping of the code switching the TTBR.

If we don't rework the memory layout, we would need to find a
virtual address that matches a physical address and doesn't clash
with the static virtual regions. This can be a bit tricky.

On arm64, the memory layout  has plenty of unused space. In most of
the case we expect Xen to be loaded in low memory.

The memory layout is reshuffled to keep the 0th slot free. Xen will now
be loaded at (512GB + 2MB). This requires a slight tweak of the boot
code as XEN_VIRT_START cannot be used as an immediate.

Signed-off-by: Julien Grall <jgrall@amazon.com>

---

    TODO:
        - I vaguely recall that one of the early platform we supported add
          the memory starting in high memory (> 1TB). I need to check
          whether the new layout will be fine.
        - Update the documentation to reflect the new layout
---
 xen/arch/arm/arm64/head.S         |  3 ++-
 xen/arch/arm/include/asm/config.h | 20 ++++++++++++++------
 xen/arch/arm/mm.c                 | 14 +++++++-------
 3 files changed, 23 insertions(+), 14 deletions(-)

diff --git a/xen/arch/arm/arm64/head.S b/xen/arch/arm/arm64/head.S
index 66d862fc8137..878649280d73 100644
--- a/xen/arch/arm/arm64/head.S
+++ b/xen/arch/arm/arm64/head.S
@@ -594,7 +594,8 @@ create_page_tables:
          * need an additional 1:1 mapping, the virtual mapping will
          * suffice.
          */
-        cmp   x19, #XEN_VIRT_START
+        ldr   x0, =XEN_VIRT_START
+        cmp   x19, x0
         bne   1f
         ret
 1:
diff --git a/xen/arch/arm/include/asm/config.h b/xen/arch/arm/include/asm/config.h
index 5db28a8dbd56..b2f31a914103 100644
--- a/xen/arch/arm/include/asm/config.h
+++ b/xen/arch/arm/include/asm/config.h
@@ -107,8 +107,20 @@
  *  Unused
  */
 
+#ifdef CONFIG_ARM_32
+
 #define COMMON_VIRT_START       _AT(vaddr_t, 0)
 
+#else
+
+#define SLOT0_ENTRY_BITS  39
+#define SLOT0(slot) (_AT(vaddr_t,slot) << SLOT0_ENTRY_BITS)
+#define SLOT0_ENTRY_SIZE  SLOT0(1)
+
+#define COMMON_VIRT_START       SLOT(1)
+
+#endif
+
 #define XEN_VIRT_START          (COMMON_VIRT_START + MB(2))
 #define XEN_SLOT_SIZE           MB(2)
 #define XEN_VIRT_END            (XEN_VIRT_START + XEN_SLOT_SIZE)
@@ -161,14 +173,10 @@
 
 #else /* ARM_64 */
 
-#define SLOT0_ENTRY_BITS  39
-#define SLOT0(slot) (_AT(vaddr_t,slot) << SLOT0_ENTRY_BITS)
-#define SLOT0_ENTRY_SIZE  SLOT0(1)
-
-#define VMAP_VIRT_START  GB(1)
+#define VMAP_VIRT_START  (SLOT0(1) + GB(1))
 #define VMAP_VIRT_END    (VMAP_VIRT_START + GB(1))
 
-#define FRAMETABLE_VIRT_START  GB(32)
+#define FRAMETABLE_VIRT_START  (SLOT0(1) + GB(32))
 #define FRAMETABLE_SIZE        GB(32)
 #define FRAMETABLE_NR          (FRAMETABLE_SIZE / sizeof(*frame_table))
 #define FRAMETABLE_VIRT_END    (FRAMETABLE_VIRT_START + FRAMETABLE_SIZE - 1)
diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
index 6b7c41d827ca..75ed9a3ce249 100644
--- a/xen/arch/arm/mm.c
+++ b/xen/arch/arm/mm.c
@@ -187,11 +187,10 @@ static void __init __maybe_unused build_assertions(void)
     BUILD_BUG_ON(DIRECTMAP_VIRT_START & ~FIRST_MASK);
 #endif
     /* Page table structure constraints */
-#ifdef CONFIG_ARM_64
-    BUILD_BUG_ON(zeroeth_table_offset(XEN_VIRT_START));
-#endif
     BUILD_BUG_ON(first_table_offset(XEN_VIRT_START));
+#ifdef CONFIG_ARM_32
     BUILD_BUG_ON(second_linear_offset(XEN_VIRT_START) >= XEN_PT_LPAE_ENTRIES);
+#endif
 #ifdef CONFIG_DOMAIN_PAGE
     BUILD_BUG_ON(DOMHEAP_VIRT_START & ~FIRST_MASK);
 #endif
@@ -611,10 +610,11 @@ void __init setup_pagetables(unsigned long boot_phys_offset)
     phys_offset = boot_phys_offset;
 
 #ifdef CONFIG_ARM_64
-    p = (void *) xen_pgtable;
-    p[0] = pte_of_xenaddr((uintptr_t)xen_first);
-    p[0].pt.table = 1;
-    p[0].pt.xn = 0;
+    pte = pte_of_xenaddr((uintptr_t)xen_first);
+    pte.pt.table = 1;
+    pte.pt.xn = 0;
+    xen_pgtable[zeroeth_table_offset(XEN_VIRT_START)] = pte;
+
     p = (void *) xen_first;
 #else
     p = (void *) cpu0_pgtable;
-- 
2.32.0



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 11:21:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 11:21:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287732.487903 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRuNq-0007yb-Dt; Wed, 09 Mar 2022 11:21:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287732.487903; Wed, 09 Mar 2022 11:21:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRuNq-0007xo-8Y; Wed, 09 Mar 2022 11:21:34 +0000
Received: by outflank-mailman (input) for mailman id 287732;
 Wed, 09 Mar 2022 11:21:33 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nRuNp-0007im-5J
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 11:21:33 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRuNo-0002kn-PP; Wed, 09 Mar 2022 11:21:32 +0000
Received: from 54-240-197-224.amazon.com ([54.240.197.224]
 helo=dev-dsk-jgrall-1b-035652ec.eu-west-1.amazon.com)
 by xenbits.xenproject.org with esmtpsa
 (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRuNo-0004wn-Hu; Wed, 09 Mar 2022 11:21:32 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:MIME-Version:References:
	In-Reply-To:Message-Id:Date:Subject:Cc:To:From;
	bh=NfNSrIckdE3c1nYMf9yFQfxMFGcsuGH78c6BN9VFgpI=; b=QqRZkqbbN4TKLagpHWGkx8ciZi
	fpZhsQ23TTWc33JIMoCrCdAyH9uK+TsoLvXfZK4sYPJJ2nhg+eQceoIh5Nc01MbA3TopF8WpEE0se
	Sk9dkXqp5h3foYY0GLlT0A0a+rX265+Co5wYI26N6znioRNEyPn/3DBs5HHbuTbWpEw0=;
From: Julien Grall <julien@xen.org>
To: xen-devel@lists.xenproject.org
Cc: marco.solieri@minervasys.tech,
	lucmiccio@gmail.com,
	Julien GralL <jgrall@amazon.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH early-RFC 3/5] xen/arm: mm: Introduce helpers to prepare/enable/disable the identity mapping
Date: Wed,  9 Mar 2022 11:20:46 +0000
Message-Id: <20220309112048.17377-4-julien@xen.org>
X-Mailer: git-send-email 2.32.0
In-Reply-To: <20220309112048.17377-1-julien@xen.org>
References: <20220309112048.17377-1-julien@xen.org>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Julien GralL <jgrall@amazon.com>

In follow-up patches we will need to have part of Xen identity mapped in
order to safely switch the TTBR.

On some platform, the identity mapping may have to start at 0. If we always
keep the identity region mapped, NULL pointer ference would lead to access
to valid mapping.

It would be possible to relocate Xen to avoid clashing with address 0.
However the identity mapping is only meant to be used in very limited
places. Therefore it would be better to keep the identity region invalid
for most of the time.

Two new helpers are introduced:
    - prepare_identity_mapping() will setup the page-tables so it is
      easy to create the mapping afterwards.
    - update_identity_mapping() will create/remove the identity mapping

Signed-off-by: Julien Grall <jgrall@amazon.com>
---
 xen/arch/arm/include/asm/mm.h |  2 +
 xen/arch/arm/mm.c             | 73 +++++++++++++++++++++++++++++++++++
 2 files changed, 75 insertions(+)

diff --git a/xen/arch/arm/include/asm/mm.h b/xen/arch/arm/include/asm/mm.h
index 045a8ba4bb63..76973ea9a0ff 100644
--- a/xen/arch/arm/include/asm/mm.h
+++ b/xen/arch/arm/include/asm/mm.h
@@ -177,6 +177,8 @@ extern unsigned long total_pages;
 
 /* Boot-time pagetable setup */
 extern void setup_pagetables(unsigned long boot_phys_offset);
+/* Enable/disable the identity mapping */
+extern void update_identity_mapping(bool enable);
 /* Map FDT in boot pagetable */
 extern void *early_fdt_map(paddr_t fdt_paddr);
 /* Remove early mappings */
diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
index 75ed9a3ce249..5c4dece16f7f 100644
--- a/xen/arch/arm/mm.c
+++ b/xen/arch/arm/mm.c
@@ -138,6 +138,12 @@ static DEFINE_PAGE_TABLE(cpu0_pgtable);
 static DEFINE_PAGE_TABLES(cpu0_dommap, DOMHEAP_SECOND_PAGES);
 #endif
 
+#ifdef CONFIG_ARM_64
+static DEFINE_PAGE_TABLE(xen_first_id);
+static DEFINE_PAGE_TABLE(xen_second_id);
+static DEFINE_PAGE_TABLE(xen_third_id);
+#endif
+
 /* Common pagetable leaves */
 /* Second level page tables.
  *
@@ -573,6 +579,70 @@ void __init remove_early_mappings(void)
     BUG_ON(rc);
 }
 
+/*
+ * The identity mapping may start at physical address 0. So don't want
+ * to keep it mapped longer than necessary.
+ *
+ * When this is called, we are still using the boot_pgtable.
+ *
+ * XXX: Handle Arm32 properly.
+ */
+static void prepare_identity_mapping(void)
+{
+    paddr_t id_addr = virt_to_maddr(_start);
+    lpae_t pte;
+    DECLARE_OFFSETS(id_offsets, id_addr);
+
+    printk("id_addr 0x%lx\n", id_addr);
+#ifdef CONFIG_ARM_64
+    if ( id_offsets[0] != 0 )
+        panic("Cannot handled ID mapping above 512GB\n");
+#endif
+
+    /* Link first ID table */
+    pte = pte_of_xenaddr((vaddr_t)xen_first_id);
+    pte.pt.table = 1;
+    pte.pt.xn = 0;
+
+    write_pte(&boot_pgtable[id_offsets[0]], pte);
+
+    /* Link second ID table */
+    pte = pte_of_xenaddr((vaddr_t)xen_second_id);
+    pte.pt.table = 1;
+    pte.pt.xn = 0;
+
+    write_pte(&xen_first_id[id_offsets[1]], pte);
+
+    /* Link third ID table */
+    pte = pte_of_xenaddr((vaddr_t)xen_third_id);
+    pte.pt.table = 1;
+    pte.pt.xn = 0;
+
+    write_pte(&xen_second_id[id_offsets[2]], pte);
+
+    /* The mapping in the third table will be created at a later stage */
+
+    /*
+     * Link the identity mapping in the runtime Xen page tables. No need to
+     * use write_pte here as they are not live yet.
+     */
+    xen_pgtable[id_offsets[0]] = boot_pgtable[id_offsets[0]];
+}
+
+void update_identity_mapping(bool enable)
+{
+    paddr_t id_addr = virt_to_maddr(_start);
+    int rc;
+
+    if ( enable )
+        rc = map_pages_to_xen(id_addr, maddr_to_mfn(id_addr), 1,
+                              PAGE_HYPERVISOR_RX);
+    else
+        rc = destroy_xen_mappings(id_addr, id_addr + PAGE_SIZE);
+
+    BUG_ON(rc);
+}
+
 /*
  * After boot, Xen page-tables should not contain mapping that are both
  * Writable and eXecutables.
@@ -609,6 +679,9 @@ void __init setup_pagetables(unsigned long boot_phys_offset)
 
     phys_offset = boot_phys_offset;
 
+    /* XXX: Find a better place to call it */
+    prepare_identity_mapping();
+
 #ifdef CONFIG_ARM_64
     pte = pte_of_xenaddr((uintptr_t)xen_first);
     pte.pt.table = 1;
-- 
2.32.0



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 11:21:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 11:21:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287733.487914 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRuNr-0008Eq-Pc; Wed, 09 Mar 2022 11:21:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287733.487914; Wed, 09 Mar 2022 11:21:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRuNr-0008Eb-Ig; Wed, 09 Mar 2022 11:21:35 +0000
Received: by outflank-mailman (input) for mailman id 287733;
 Wed, 09 Mar 2022 11:21:34 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nRuNq-0007wX-5q
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 11:21:34 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRuNp-0002l7-VM; Wed, 09 Mar 2022 11:21:33 +0000
Received: from 54-240-197-224.amazon.com ([54.240.197.224]
 helo=dev-dsk-jgrall-1b-035652ec.eu-west-1.amazon.com)
 by xenbits.xenproject.org with esmtpsa
 (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRuNp-0004wn-NY; Wed, 09 Mar 2022 11:21:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:MIME-Version:References:
	In-Reply-To:Message-Id:Date:Subject:Cc:To:From;
	bh=XzfP7FQZiQKfC2eU/eNRTo46unTVwCIHpPRL2SVGKE0=; b=JCOWKXWOV6mJbdieoB0sminCOz
	D98HJX2ducw2mQe2Gz3a9NCcf8wz8YqEZmYTn/8cifvZ2bf43XHTMLElNMoSvSbAMOKTztL4msko8
	0OM2xKiuei5kMRDPctFD+70qdA1KLU+vLbrCFFukPqTL8CgtA/0W/hdYVBw1FbZ6MTJU=;
From: Julien Grall <julien@xen.org>
To: xen-devel@lists.xenproject.org
Cc: marco.solieri@minervasys.tech,
	lucmiccio@gmail.com,
	Julien Grall <jgrall@amazon.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH early-RFC 4/5] xen/arm: mm: Rework switch_ttbr()
Date: Wed,  9 Mar 2022 11:20:47 +0000
Message-Id: <20220309112048.17377-5-julien@xen.org>
X-Mailer: git-send-email 2.32.0
In-Reply-To: <20220309112048.17377-1-julien@xen.org>
References: <20220309112048.17377-1-julien@xen.org>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Julien Grall <jgrall@amazon.com>

At the moment, switch_ttbr() is switching the TTBR whilst the MMU is
still on.

Switching TTBR is like replacing existing mappings with new ones. So
we need to follow the break-before-make sequence.

In this case, it means the MMU needs to be switched off while the
TTBR is updated. In order to disable the MMU, we need to first
jump to an identity mapping.

Rename switch_ttbr() to switch_ttbr_id() and create an helper on
top to temporary map the identity mapping and call switch_ttbr()
via the identity address.

switch_ttbr_id() is now reworked to temporarily turn off the MMU
before updating the TTBR.

We also need to make sure the helper switch_ttbr() is part of the
identity mapping. So move _end_boot past it.

Take the opportunity to instruction cache flush as the operation is
only necessary when the memory is updated.

Signed-off-by: Julien Grall <jgrall@amazon.com>

---

    TODO:
        * Rename _end_boot to _end_id_mapping or similar
        * Check the memory barriers
        * I suspect the instruction cache flush will be necessary
          for cache coloring.
---
 xen/arch/arm/arm64/head.S | 31 ++++++++++++++++++++-----------
 xen/arch/arm/mm.c         | 14 +++++++++++++-
 2 files changed, 33 insertions(+), 12 deletions(-)

diff --git a/xen/arch/arm/arm64/head.S b/xen/arch/arm/arm64/head.S
index 878649280d73..c5cc72b8fe6f 100644
--- a/xen/arch/arm/arm64/head.S
+++ b/xen/arch/arm/arm64/head.S
@@ -803,36 +803,45 @@ fail:   PRINT("- Boot failed -\r\n")
         b     1b
 ENDPROC(fail)
 
-GLOBAL(_end_boot)
-
 /*
  * Switch TTBR
  *
  * x0    ttbr
  *
- * TODO: This code does not comply with break-before-make.
+ * XXX: Check the barriers
  */
-ENTRY(switch_ttbr)
+ENTRY(switch_ttbr_id)
         dsb   sy                     /* Ensure the flushes happen before
                                       * continuing */
         isb                          /* Ensure synchronization with previous
                                       * changes to text */
+
+        /* Turn off MMU */
+        mrs    x1, SCTLR_EL2
+        bic    x1, x1, #SCTLR_Axx_ELx_M
+        msr    SCTLR_EL2, x1
+        dsb    sy
+        isb
+
         tlbi   alle2                 /* Flush hypervisor TLB */
-        ic     iallu                 /* Flush I-cache */
         dsb    sy                    /* Ensure completion of TLB flush */
         isb
 
-        msr    TTBR0_EL2, x0
+        msr   TTBR0_EL2, x0
+
+        mrs   x1, SCTLR_EL2
+        orr   x1, x1, #SCTLR_Axx_ELx_M  /* Enable MMU */
+        msr   SCTLR_EL2, x1
 
         isb                          /* Ensure synchronization with previous
                                       * changes to text */
-        tlbi   alle2                 /* Flush hypervisor TLB */
-        ic     iallu                 /* Flush I-cache */
-        dsb    sy                    /* Ensure completion of TLB flush */
-        isb
+        /* Turn on the MMU */
+
 
         ret
-ENDPROC(switch_ttbr)
+ENDPROC(switch_ttbr_id)
+
+GLOBAL(_end_boot)
 
 #ifdef CONFIG_EARLY_PRINTK
 /*
diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
index 5c4dece16f7f..a53760af7af0 100644
--- a/xen/arch/arm/mm.c
+++ b/xen/arch/arm/mm.c
@@ -660,7 +660,19 @@ static void xen_pt_enforce_wnx(void)
     flush_xen_tlb_local();
 }
 
-extern void switch_ttbr(uint64_t ttbr);
+extern void switch_ttbr_id(uint64_t ttbr);
+
+typedef void (switch_ttbr_fn)(uint64_t ttbr);
+
+static void switch_ttbr(uint64_t ttbr)
+{
+    vaddr_t id_addr = virt_to_maddr(switch_ttbr_id);
+    switch_ttbr_fn *fn = (switch_ttbr_fn *)id_addr;
+
+    update_identity_mapping(true);
+    fn(ttbr);
+    update_identity_mapping(false);
+}
 
 /* Clear a translation table and clean & invalidate the cache */
 static void clear_table(void *table)
-- 
2.32.0



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 11:21:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 11:21:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287734.487919 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRuNs-0008K2-7d; Wed, 09 Mar 2022 11:21:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287734.487919; Wed, 09 Mar 2022 11:21:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRuNr-0008IY-Uq; Wed, 09 Mar 2022 11:21:35 +0000
Received: by outflank-mailman (input) for mailman id 287734;
 Wed, 09 Mar 2022 11:21:35 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nRuNr-0008Bi-8i
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 11:21:35 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRuNr-0002lS-4Y; Wed, 09 Mar 2022 11:21:35 +0000
Received: from 54-240-197-224.amazon.com ([54.240.197.224]
 helo=dev-dsk-jgrall-1b-035652ec.eu-west-1.amazon.com)
 by xenbits.xenproject.org with esmtpsa
 (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRuNq-0004wn-TC; Wed, 09 Mar 2022 11:21:35 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:MIME-Version:References:
	In-Reply-To:Message-Id:Date:Subject:Cc:To:From;
	bh=tjGVNBl+p1ZPAg1oGbm6UDq0DOV0mnkoPMAmBc++mKs=; b=Tk8L3eXtygKmHrlWShbwQR/9CN
	ZyDrKFjTNTZ1zyfZtb9WFiVFlbnGERbyaKr8D2PcVieZ3IM1d+8j6sRHreaXdmrC1AuQ0pMeF4DAr
	YvRfOBwqudW/lJTnvnf+C7vTQO689XUu1GgHIkCALBSk6U9yqJJaFB52XkiADamDmIs8=;
From: Julien Grall <julien@xen.org>
To: xen-devel@lists.xenproject.org
Cc: marco.solieri@minervasys.tech,
	lucmiccio@gmail.com,
	Julien Grall <jgrall@amazon.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH early-RFC 5/5] xen/arm: smpboot: Directly switch to the runtime page-tables
Date: Wed,  9 Mar 2022 11:20:48 +0000
Message-Id: <20220309112048.17377-6-julien@xen.org>
X-Mailer: git-send-email 2.32.0
In-Reply-To: <20220309112048.17377-1-julien@xen.org>
References: <20220309112048.17377-1-julien@xen.org>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Julien Grall <jgrall@amazon.com>

Switching TTBR while the MMU is on is not safe. Now that the identity
mapping will not clash with the rest of the memory layout, we can avoid
creating temporary page-tables every time a CPU is brought up.

Signed-off-by: Julien Grall <jgrall@amazon.com>
---
 xen/arch/arm/arm64/head.S | 29 +++++++++--------------------
 xen/arch/arm/mm.c         | 19 -------------------
 xen/arch/arm/smpboot.c    |  3 +++
 3 files changed, 12 insertions(+), 39 deletions(-)

diff --git a/xen/arch/arm/arm64/head.S b/xen/arch/arm/arm64/head.S
index c5cc72b8fe6f..f0ac5a3295cc 100644
--- a/xen/arch/arm/arm64/head.S
+++ b/xen/arch/arm/arm64/head.S
@@ -309,6 +309,7 @@ real_start_efi:
         bl    check_cpu_mode
         bl    cpu_init
         bl    create_page_tables
+        load_paddr x0, boot_pgtable
         bl    enable_mmu
 
         /* We are still in the 1:1 mapping. Jump to the runtime Virtual Address. */
@@ -368,29 +369,14 @@ GLOBAL(init_secondary)
 #endif
         bl    check_cpu_mode
         bl    cpu_init
-        bl    create_page_tables
+        load_paddr x0, init_ttbr
+        ldr   x0, [x0]
         bl    enable_mmu
 
         /* We are still in the 1:1 mapping. Jump to the runtime Virtual Address. */
         ldr   x0, =secondary_switched
         br    x0
 secondary_switched:
-        /*
-         * Non-boot CPUs need to move on to the proper pagetables, which were
-         * setup in init_secondary_pagetables.
-         *
-         * XXX: This is not compliant with the Arm Arm.
-         */
-        ldr   x4, =init_ttbr         /* VA of TTBR0_EL2 stashed by CPU 0 */
-        ldr   x4, [x4]               /* Actual value */
-        dsb   sy
-        msr   TTBR0_EL2, x4
-        dsb   sy
-        isb
-        tlbi  alle2
-        dsb   sy                     /* Ensure completion of TLB flush */
-        isb
-
 #ifdef CONFIG_EARLY_PRINTK
         /* Use a virtual address to access the UART. */
         ldr   x23, =EARLY_UART_VIRTUAL_ADDRESS
@@ -661,9 +647,13 @@ ENDPROC(create_page_tables)
  * mapping. In other word, the caller is responsible to switch to the runtime
  * mapping.
  *
- * Clobbers x0 - x3
+ * Inputs:
+ *   x0 : Physical address of the page tables.
+ *
+ * Clobbers x0 - x4
  */
 enable_mmu:
+        mov   x4, x0
         PRINT("- Turning on paging -\r\n")
 
         /*
@@ -674,8 +664,7 @@ enable_mmu:
         dsb   nsh
 
         /* Write Xen's PT's paddr into TTBR0_EL2 */
-        load_paddr x0, boot_pgtable
-        msr   TTBR0_EL2, x0
+        msr   TTBR0_EL2, x4
         isb
 
         mrs   x0, SCTLR_EL2
diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
index a53760af7af0..be808073844a 100644
--- a/xen/arch/arm/mm.c
+++ b/xen/arch/arm/mm.c
@@ -771,26 +771,9 @@ void __init setup_pagetables(unsigned long boot_phys_offset)
 #endif
 }
 
-static void clear_boot_pagetables(void)
-{
-    /*
-     * Clear the copy of the boot pagetables. Each secondary CPU
-     * rebuilds these itself (see head.S).
-     */
-    clear_table(boot_pgtable);
-#ifdef CONFIG_ARM_64
-    clear_table(boot_first);
-    clear_table(boot_first_id);
-#endif
-    clear_table(boot_second);
-    clear_table(boot_third);
-}
-
 #ifdef CONFIG_ARM_64
 int init_secondary_pagetables(int cpu)
 {
-    clear_boot_pagetables();
-
     /* Set init_ttbr for this CPU coming up. All CPus share a single setof
      * pagetables, but rewrite it each time for consistency with 32 bit. */
     init_ttbr = (uintptr_t) xen_pgtable + phys_offset;
@@ -833,8 +816,6 @@ int init_secondary_pagetables(int cpu)
     per_cpu(xen_pgtable, cpu) = first;
     per_cpu(xen_dommap, cpu) = domheap;
 
-    clear_boot_pagetables();
-
     /* Set init_ttbr for this CPU coming up */
     init_ttbr = __pa(first);
     clean_dcache(init_ttbr);
diff --git a/xen/arch/arm/smpboot.c b/xen/arch/arm/smpboot.c
index 7bfd0a73a7d2..72931d0cef93 100644
--- a/xen/arch/arm/smpboot.c
+++ b/xen/arch/arm/smpboot.c
@@ -457,12 +457,14 @@ int __cpu_up(unsigned int cpu)
     smp_up_cpu = cpu_logical_map(cpu);
     clean_dcache(smp_up_cpu);
 
+    update_identity_mapping(true);
     rc = arch_cpu_up(cpu);
 
     console_end_sync();
 
     if ( rc < 0 )
     {
+        update_identity_mapping(false);
         printk("Failed to bring up CPU%d\n", cpu);
         return rc;
     }
@@ -493,6 +495,7 @@ int __cpu_up(unsigned int cpu)
     init_data.cpuid = ~0;
     smp_up_cpu = MPIDR_INVALID;
     clean_dcache(smp_up_cpu);
+    update_identity_mapping(false);
 
     if ( !cpu_online(cpu) )
     {
-- 
2.32.0



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 11:28:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 11:28:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287761.487936 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRuUq-0002Oh-8f; Wed, 09 Mar 2022 11:28:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287761.487936; Wed, 09 Mar 2022 11:28:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRuUq-0002Oa-4v; Wed, 09 Mar 2022 11:28:48 +0000
Received: by outflank-mailman (input) for mailman id 287761;
 Wed, 09 Mar 2022 11:28:46 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nRuUo-0002OU-2r
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 11:28:46 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRuUn-0002tI-9o; Wed, 09 Mar 2022 11:28:45 +0000
Received: from 54-240-197-225.amazon.com ([54.240.197.225]
 helo=[10.95.155.231]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRuUn-0005V0-2a; Wed, 09 Mar 2022 11:28:45 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:
	References:Cc:To:From:Subject:MIME-Version:Date:Message-ID;
	bh=/hyHObLT4O9gy2Yv+db9HU+L/wJn3ggWRdnCkxPX4iw=; b=sBB/Wl/pfbYMcY8ps2/Ei0/5PC
	zXV5vmpj3+unVLtVw9EmGQ0KmX3jBK7aUvGcmrpmZGbdBqGXGhtrqvBTIh03A6ZUJLQ4vGC2Kz399
	kF54tARBztJWgQEoLdRagas1lpGza4z5Z7vNYvQnh9TnsgTgE20lIWLpLO26XaLKDe8E=;
Message-ID: <18d7c9a9-fec6-f430-dd81-863247ceba7e@xen.org>
Date: Wed, 9 Mar 2022 11:28:42 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH 27/36] xen/arch: add coloring support for Xen
From: Julien Grall <julien@xen.org>
To: Marco Solieri <marco.solieri@minervasys.tech>,
 xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-28-marco.solieri@minervasys.tech>
 <d6216110-7cf0-b647-8a5d-ec5f8f437941@xen.org>
In-Reply-To: <d6216110-7cf0-b647-8a5d-ec5f8f437941@xen.org>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi,

On 04/03/2022 19:47, Julien Grall wrote:
> On 04/03/2022 17:46, Marco Solieri wrote:
>> From: Luca Miccio <lucmiccio@gmail.com>
>>
>> Introduce a new implementation of setup_pagetables that uses coloring
>> logic in order to isolate Xen code using its color selection.
>> Page tables construction is essentially copied, except for the xenmap
>> table, where coloring logic is needed.  Given the absence of a contiguous
>> physical mapping, pointers to next level tables need to be manually
>> calculated.
> 
> The implementation of setup_pagetables() is not compliant to the Arm 
> Arm. And I have plan to completely get rid of it.
> 
> The main part that is not compliant is switch_ttbr() because it keeps 
> the MMU on. We should switch the MMU off, update the TTBR and then 
> switch on the MMU. This implies that we need an identity mapping of the 
> part of Xen that will run with MMU off.
> 
> I understand that rebuilding the page-tables and therefore switching the 
> TTBR will be necessary for cache coloring. So before any new use, I 
> would like the implementation of switch_ttbr() to be fixed.
> 
> What we will need to do is find space in the virtual layout that also 
> match a physical address. With that in place, we could use the mapping 
> to switch between TTBR.

I have posted an early RFC [1] to reshuffle the memory layout on Arm so 
we have space to for the identity mapping. I have also reworked 
switch_ttbr() to turn off/on the MMU before/after updating the TTBR.

The series should work on arm64. The arm32 effort requires a bit more 
effort as we have less virtual space.

I haven't killed setup_pagetables() yet so you have a base to write the 
cache coloring version. There may be also some tweak necessary for cache 
coloring (e.g. flush the instruction cache).

Cheers,

[1] https://lore.kernel.org/xen-devel/20220309112048.17377-1-julien@xen.org/

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 11:34:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 11:34:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287766.487947 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRuaf-0003na-0H; Wed, 09 Mar 2022 11:34:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287766.487947; Wed, 09 Mar 2022 11:34:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRuae-0003nT-Sk; Wed, 09 Mar 2022 11:34:48 +0000
Received: by outflank-mailman (input) for mailman id 287766;
 Wed, 09 Mar 2022 11:34:48 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=MORj=TU=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nRuae-0003nN-61
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 11:34:48 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ec02f229-9f9c-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 12:34:46 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 4DA1B1F380;
 Wed,  9 Mar 2022 11:34:46 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 12BC413B71;
 Wed,  9 Mar 2022 11:34:46 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id cxVRA9aQKGLTZwAAMHmgww
 (envelope-from <jgross@suse.com>); Wed, 09 Mar 2022 11:34:46 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ec02f229-9f9c-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646825686; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:  content-transfer-encoding:content-transfer-encoding;
	bh=EaW2Rn3nSwafRMyKlhwOnRqR+P68wtH+4aeBkRvz8RA=;
	b=N5HN3htVwOzb/U332tyS/LASi4PDOt1MCVcxqt/xBYte7ZjfWISiN5plg149//hnF02QP1
	ioAjM+CRAQGej01IpQyWYaSvOqk185Ex7eQAKBTC2T+0q3kiuSy0Jz1DL37dIL/0bd5b5a
	9PGwerIDcLWv/K20O9Mw3l70qf/OP0o=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>
Subject: [PATCH] xen/x86: drop dependency of XEN_SHSTK on EXPERT
Date: Wed,  9 Mar 2022 12:34:41 +0100
Message-Id: <20220309113441.22746-1-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

XEN_SHSTK should be on per default now that it is supported officially.
Only let the prompt depend on EXPERT.

Signed-off-by: Juergen Gross <jgross@suse.com>
---
 xen/arch/x86/Kconfig | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/xen/arch/x86/Kconfig b/xen/arch/x86/Kconfig
index 83d0f317ec..c166db3499 100644
--- a/xen/arch/x86/Kconfig
+++ b/xen/arch/x86/Kconfig
@@ -117,8 +117,8 @@ config HVM
 	  If unsure, say Y.
 
 config XEN_SHSTK
-	bool "Supervisor Shadow Stacks (EXPERT)"
-	depends on HAS_AS_CET_SS && EXPERT
+	bool "Supervisor Shadow Stacks" if EXPERT
+	depends on HAS_AS_CET_SS
 	default y
 	---help---
 	  Control-flow Enforcement Technology (CET) is a set of features in
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 11:49:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 11:49:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287772.487958 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRuoK-0005Mc-8U; Wed, 09 Mar 2022 11:48:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287772.487958; Wed, 09 Mar 2022 11:48:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRuoK-0005MV-5M; Wed, 09 Mar 2022 11:48:56 +0000
Received: by outflank-mailman (input) for mailman id 287772;
 Wed, 09 Mar 2022 11:48:55 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=QNbA=TU=citrix.com=prvs=060736ad3=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRuoJ-0005MO-6j
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 11:48:55 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e3b66181-9f9e-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 12:48:53 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e3b66181-9f9e-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646826533;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=qq282kR+O+LyI9SAHGY04k/U0kEqEwhe8YwoC3OZ6Fo=;
  b=VYVnnFOZgCQ5bihKxENaHoQfI58swbxiO9FdxtcnRYkCzsU3QfNPcWcu
   AOGp+P4c5v0R18bCCiYjsWyQ6Ja4JIMSqG72G+RnpkXuriH09U9YypO1F
   kbf9pg/uWOXZT5SW4pSkk3IgN8jMPYerHre5jAlmYXisFlI2GRU6RIFyY
   w=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 68156449
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:d0e6L6umh8LecSd+W0XzdG0X4+fnVKpeMUV32f8akzHdYApBsoF/q
 tZmKWnSb/uMMGKkeNhyb4uy9U4CsMOBz9FkSgY9qXo9QyIa+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jV6
 IuoyyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi81D7P3vsBCcyNDSSZPDKpcpJj6E3Kw5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AN
 5NEN2YzPXwsZTUXNAhHMq9nvdyinz7VbztFuULKiZootj27IAtZj+G2bYu9lsaxbd5Ogk+Sq
 2bC/mL4KhIXLtqSzXyC6H3Eru3SmSL2XqoCGbv+8eRl6HWtwWgUBAwTREGMi/CzgU6jWPpSM
 0URvCEpqMAa+EW1Q/HnUha/oXrCuQQTM/JPF8Uq5QfLzbDbiy6JC25BQjNfZdgOsM4tWSdsx
 lKPh8nuBzFkrPuSU3313rWeoC62OCMVBXQffiJCRgwAi/Hhr5s0lQnnVct4Hei+ididJN3r6
 2nU9m5k3exV1JNVkfXglbzav96yjoT4UDUTwlr3ZHn/6TJIY5T5QLGa41eOuJ6sM72lZlWGu
 XEFne2X4+YPEYyBmUSxfQkdIF26z63baWOB2DaDC7Fkrm3woCD7Iei89RkjfB8BDyoSRdP+j
 KY/Uyt17YQbAnalZLQfj2mZW5VzlviI+TgIu5npgjtyjnpZKVfvEMJGPxf4M4XRfK4Ey/9X1
 XCzK5rEMJriIf47pAdavs9EuVPR+ggwxHnIWbfwxAm93LyVaRa9EOlZbgTQMrppsP/Y/m05F
 uqz0ePQm32zt8WkPkHqHXM7dwhWfRDX+7itwyCoSgJzClU/QzxwYxMg6bggZ5Zkj8xoehTgp
 RmAtrtj4AOn3xXvcFzSAlg6Me+Hdcsv/BoTYH13VX71iidLXGpaxPpGH3fBVeJ8r7ILID8dZ
 6RtRvhs9dwUE2WZoWtBNcehxGGgHTzy7T+z0+OeSGFXV7ZrRhDT+8+ieQ3q9SIUCTGwu9d4q
 Lqlvj43i7JaL+i+JK46sM6S8m4=
IronPort-HdrOrdr: A9a23:r5qPfqPFWYdByMBcTv+jsMiBIKoaSvp037BN7TESdfU1SL36qy
 nKpp8mPHDP6Qr5NEtOpTniAsW9qBHnmKKdiLN5VYtKNDOW3VdAR7sD0WKN+VPd84uVzJ846Y
 5QN4xFTP3qDUI/qcrm6CSxDt5I+rO6zJw=
X-IronPort-AV: E=Sophos;i="5.90,167,1643691600"; 
   d="scan'208";a="68156449"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=FPR4vL8NzEnb8IMDBWYI64eeOhnACecjHxnqD1GosAkJd4Fey4DSSFtRLIgF66bsG7A17ZPeiYYKqCbW1JMwqdmBQD8bLBHAG280R8lVdz0XT7yEUbQ00G2UNPk1RXdQoxXlM/0B5BDXzGYUYN/JNb3DKbHeR9P50bSLWbjcRxGa5c4JQbkUYEijUnkUYHjnxagPvRmCw5hTT76g/yi6Sx1xtkv0PX4ZwPLvVc+4YOR+zkInqWq7dptlXb+Jv2JkgRvbenWspD4ebZ3BEJ5Ca1cNKd/8Za/xGB65jxZYMz/UafDvyIVUYEd5oz9cfIw+Zy8uGJUBRyIhA7/yyNPyBw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=DwwwUhMaiDNgYuQonNBuzkl8KkvZt82BFOGVZHxMOHE=;
 b=jhH5iqjqonnpbYMGFOHejKlcw1kp7BIgH1uWTYVs2IV6HdBIEO//it95Ac6U1ZtKYGsYKEKVqwX7nkZ9gp7VjchcJ7KiKXyOfsGsaJTigp7TZMsSd3f2DZcnORaZtTceB2koc7I+Uc2G73f4HMijy0wgwwHHUhYPtpBMw99jCKs1Au5JS8SF2PKmx+PrBNsLD87ZRmdskE2sbJBgqSauXw50y4VmvDtN2oe4zeai9hNBlC7wA52EEIb2BV/euUVpgrwejgg4Z7com5Zy68iKyEtLmQVq4UUNOUhfAcww0gdkm2pGTf8XJ/ZvdIhm9CRzA7ulhpv1LbvtM+a7KEMDhA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=DwwwUhMaiDNgYuQonNBuzkl8KkvZt82BFOGVZHxMOHE=;
 b=LwLNXeerzkIxQnmxEWh9F5U3MiZZA2e/MWx7GcvpnIFzO4nAxJpxU+uK7D6rZm24H+r5cvTQwSCcRHQhTwNiHkrLSsfKRFEpbungk1rzHCp1FAzj0FFKfYq4pMP7txnJmkhZwcwV3iT8r+geSqdO21vKAYkg8CaR/oCnIaXwnC8=
Date: Wed, 9 Mar 2022 12:48:37 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jane Malalane <jane.malalane@citrix.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, Anthony
 PERARD <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, Andrew
 Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>, Julien Grall <julien@xen.org>, Stefano
 Stabellini <sstabellini@kernel.org>, Christian Lindig
	<christian.lindig@citrix.com>, David Scott <dave@recoil.org>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH v6 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Message-ID: <YiiUFSefL0bw9XSx@Air-de-Roger>
References: <20220307150609.10662-3-jane.malalane@citrix.com>
 <20220308173643.2929-1-jane.malalane@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <20220308173643.2929-1-jane.malalane@citrix.com>
X-ClientProxiedBy: LO2P265CA0148.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:9::16) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 94bc8295-dc34-4f16-7272-08da01c2c211
X-MS-TrafficTypeDiagnostic: SJ0PR03MB6676:EE_
X-Microsoft-Antispam-PRVS: <SJ0PR03MB667632A310B7C4BBC02ABC1B8F0A9@SJ0PR03MB6676.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(66946007)(8936002)(6506007)(82960400001)(66476007)(66556008)(6862004)(6666004)(4326008)(8676002)(26005)(83380400001)(9686003)(6512007)(86362001)(5660300002)(2906002)(6636002)(33716001)(54906003)(508600001)(38100700002)(316002)(85182001)(6486002)(186003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?N0prT0JJdVZybDFsTkNSbTVNOEgvSUdwOTVzK0xvamxwaDNuUWNiTkxYcGZR?=
 =?utf-8?B?Nk1kNmVvTG5sUnlwaTRJZzhSc3M3eEg5TGZYL0VHeUJRNXRYS3V2OWFMN1Jv?=
 =?utf-8?B?TFJ3U0hrMjU3bndXcEFDMUVwUVJQN2VxUmNERUhoNzltaTFmaWR1SFk1N3p1?=
 =?utf-8?B?bkJPRnVsWnVQcWQxSWU2MkVieDdCT0tFbDZVN0tiQUg0YVFrL29sREVTemw4?=
 =?utf-8?B?aDlhbnY5c2oveDRtU0RhR29CZEZsaEhnaFNNRDZLOFhRZnpXZjgxMHEyaW9G?=
 =?utf-8?B?ckpoWlFmTUl5NC9wQ3NmSmh2WGo3cWNBNDRzR2dQTENqTGI3MnhlUkEyQVRS?=
 =?utf-8?B?QUVVeFo5ZlQvc29OVFNCaXhJcTBWMndiZWdqZHRrMnJnRXc5YUUvUmpnelVh?=
 =?utf-8?B?UVRXMVJwWk4vK3lreDJqem5qQUNlVVJiS2I3NG9aZm03T3pRMEY0UGZ0WUp5?=
 =?utf-8?B?anQ2L2Q0N0NpN2pzSmxIK1pKdDNFU1FubTZaMWVlNHFCMXlCSldSaDZNa2J3?=
 =?utf-8?B?UlM0bjNEMUc3cmE0RC9oRlNVeGIwaFduWnBpYlpxcDlwL255WkxzdkRNWm03?=
 =?utf-8?B?MElaOHpQQi9pWjdTUkFzMlgybDI5MWhuelNGcnlmbnA0YkRvdTI3VFdISXZr?=
 =?utf-8?B?eEdNaWZmOXN2R3VZd2pvYkZpcjI3d2grSkZWTGY2TmVqVUxvRVlmUFdaYVo5?=
 =?utf-8?B?WHBMYmlEdnUwZTdhaTFHRjU5Ymk1T3ZDUS9NZ2wxSWszZk1jYnRsVXFYSERa?=
 =?utf-8?B?Q3JRb1NsNElrbVJzZ0hTK1FxVTFCK3NiT2Y1ZmZYMnlEOUVmU3FFTU9JU21E?=
 =?utf-8?B?T3VaOUoyL1dqSXQveVFkdyt3Yk12MHEyRkFHSStYVSthcFZVZXE3U09PTWsx?=
 =?utf-8?B?NEhEWmN0aFhLOXZkaUpHcnJyYmsrbnhheHppdFc0M0FkY0RMbVlMNnJ6MU03?=
 =?utf-8?B?YXZrSzgvVWgyWmhRT0NPRTVMWVRvM0hMcWtEbDlZNXd4ZGdzOUtKSlNTRldi?=
 =?utf-8?B?Z0FtLzV3SE0rRTA3MWN3bC9GVVBESlFkYm10UklBRFV0MXNYc09oeElTOHI2?=
 =?utf-8?B?a3pPVURNc2I5YXdiWXZpbEMzcHpoREhuQ3BmOW16cTI5Z2RacDYva2U0bEt0?=
 =?utf-8?B?dmN3MlFNQ3JWbmR5YVB4TlFMdkQxQnNXRmlmM3orZjhmaXB6S2hyaGgya0dY?=
 =?utf-8?B?VFZYQW5qNlNQWGt4TnVjNGcrc0RXNDVhS2VyZWRMVCtVYnYvSzhrU1llaUFG?=
 =?utf-8?B?MklnOE1sNDVZMWl4OWVMN2NmcVArVGhoelg0Qk5DcVgxZERiQmg1SHVRK2VL?=
 =?utf-8?B?VDhRVUF6Vlg4ZzZkTFRiQTE0bXJFbGIybDNoaytwMDNKb3MwMjV2TkF4MUhv?=
 =?utf-8?B?eFNhaWVvQjRrN2sySEU4UG1ZVWVheGpBTDJLc3NqNnNmcHJ5ZDRQTFBha3g3?=
 =?utf-8?B?WVIwbElKQmk4VFAxNGdKZGJrb3ArZXB6ckR3OG5zTnF5R3NsU1YzV3hWb2cy?=
 =?utf-8?B?Q0FHMWFkNlNDM2x0Sk9RbnNPL1RrOWtMSHZOWDkvZTBqb1Byek5HT1ByWUcy?=
 =?utf-8?B?c2MwVGFPUXNudklJd0FjY2hqK0FUY0w3NkphcWdpZHdGYzVMWk5jWUV3RmN1?=
 =?utf-8?B?VmJ3OGJpMHVnN0s5Yi9YZ2xHbWQ1R2dRRC91cnAyVWZOYXp6Unh6N2p2d25R?=
 =?utf-8?B?ZEt4KzJaYXNnWkdGY29vWUtvQWJsWm02Uy9CMitGQ2dvcU5Mdm5NVVJGK3Q3?=
 =?utf-8?B?cUpRcGk1MndrRmRoYWxtVzB5RVgzRWJBMVE2NDlSSU9LbUNSMDFLcStSN1J6?=
 =?utf-8?B?dlU5Q2ZQaStGeWo1M3hOeDMyeThNZFVmUzB2SWUxUTAxY1p3Ykk4TXY2VUhx?=
 =?utf-8?B?dVhIa2V5Y0ZBY2dvakIxZG9ELzFJMG9hSytMcERkdjBjMXIrZVIzR1VxY0R1?=
 =?utf-8?B?TlpDRGY3Mi9vOFI2cmxlNmxtbzVxUyt3RkNJR3plWGd0VTI3Z3gzTnJpbXFM?=
 =?utf-8?B?WlM3NjZQYkFNY013R1NnOTJ4dnM1b09yWm9oT3ZaeXY4dFQvcUtYNTY0a29L?=
 =?utf-8?B?amFYek5UOVJvM212TmJoMHVhdWV2R0hnS2Z5TEdnM3lsaHRWTzVzUzVXTVBF?=
 =?utf-8?B?Ri9qREd0VURnOVdmeVZtMXY1UStoa0RoRGZMOXNVTXRyRDVpdTV5MFhSLzFy?=
 =?utf-8?Q?G32F0kvuWyTc0QtwAytADWg=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 94bc8295-dc34-4f16-7272-08da01c2c211
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 11:48:41.8646
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: efp+H+LUvZO28ZcNW9NY7KAu4uv7Azl3xnt6ph+pp+x1ATtDz5E6JOjp1NdoKOHgP4/zYWYZ4ACgjJozL9ht9A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR03MB6676
X-OriginatorOrg: citrix.com

On Tue, Mar 08, 2022 at 05:36:43PM +0000, Jane Malalane wrote:
> diff --git a/tools/libs/light/libxl_arm.c b/tools/libs/light/libxl_arm.c
> index 39fdca1b49..ba5b8f433f 100644
> --- a/tools/libs/light/libxl_arm.c
> +++ b/tools/libs/light/libxl_arm.c
> @@ -1384,8 +1384,9 @@ void libxl__arch_domain_create_info_setdefault(libxl__gc *gc,
>      }
>  }
>  
> -void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
> -                                              libxl_domain_build_info *b_info)
> +int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
> +                                             libxl_domain_build_info *b_info,
> +                                             const libxl_physinfo *physinfo)
>  {
>      /* ACPI is disabled by default */
>      libxl_defbool_setdefault(&b_info->acpi, false);
> @@ -1399,6 +1400,8 @@ void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
>      memset(&b_info->u, '\0', sizeof(b_info->u));
>      b_info->type = LIBXL_DOMAIN_TYPE_INVALID;
>      libxl_domain_build_info_init_type(b_info, LIBXL_DOMAIN_TYPE_PVH);
> +
> +    return 0;

There's a void return above the memset (out of context in the diff)
that you also need to patch to 'return 0;'.


> diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
> index 77ce0b2121..7adb043ab7 100644
> --- a/xen/arch/x86/hvm/vmx/vmcs.c
> +++ b/xen/arch/x86/hvm/vmx/vmcs.c
> @@ -1157,6 +1157,10 @@ static int construct_vmcs(struct vcpu *v)
>          __vmwrite(PLE_WINDOW, ple_window);
>      }
>  
> +    if ( !has_assisted_xapic(v->domain) )

Nit: you already have a local 'd' variable here that's v->domain, so
please use that.

> diff --git a/xen/arch/x86/include/asm/hvm/hvm.h b/xen/arch/x86/include/asm/hvm/hvm.h
> index 5b7ec0cf69..65a978f670 100644
> --- a/xen/arch/x86/include/asm/hvm/hvm.h
> +++ b/xen/arch/x86/include/asm/hvm/hvm.h
> @@ -373,6 +373,12 @@ int hvm_get_param(struct domain *d, uint32_t index, uint64_t *value);
>  #define hvm_tsc_scaling_ratio(d) \
>      ((d)->arch.hvm.tsc_scaling_ratio)
>  
> +#define has_assisted_xapic(d) \
> +    ((d)->arch.hvm.assisted_xapic)
> +
> +#define has_assisted_x2apic(d) \
> +    ((d)->arch.hvm.assisted_x2apic)

Nit: I think there's no need to split those into two lines, ie:

#define has_assisted_xapic(d) ((d)->arch.hvm.assisted_xapic)

Is well below the 80 column limit.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 12:09:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 12:09:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287783.487968 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRv8T-0007tT-68; Wed, 09 Mar 2022 12:09:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287783.487968; Wed, 09 Mar 2022 12:09:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRv8T-0007tM-3D; Wed, 09 Mar 2022 12:09:45 +0000
Received: by outflank-mailman (input) for mailman id 287783;
 Wed, 09 Mar 2022 12:09:44 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=gSYI=TU=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRv8S-0007tE-1X
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 12:09:44 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ccd38dec-9fa1-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 13:09:42 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2168.outbound.protection.outlook.com [104.47.17.168]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-35-WNUHplxVN1mzsui9a4_ggw-1; Wed, 09 Mar 2022 13:09:40 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM9PR04MB8892.eurprd04.prod.outlook.com (2603:10a6:20b:40b::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Wed, 9 Mar
 2022 12:09:39 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Wed, 9 Mar 2022
 12:09:39 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ccd38dec-9fa1-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646827781;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=43CBGkhx7StwR/bMCXqT2YSeEoImjRJwYH5Z++BxDOo=;
	b=jYMrxh+Rk0EqOhj3Mb3O1CHICnNgjlApKbARKV9QmfSm3QoZqy8ukgcg8Is/ztE3kxQqX5
	ij5sP6YPdu+wR/x3We1L6LLFe579x6UqaI28E35uZEZBMWb+Cco2CcRZAdMS6Wb4bzXMmo
	sPNxf7SLR3ZXTl84jBC19kldN1kDSZY=
X-MC-Unique: WNUHplxVN1mzsui9a4_ggw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=i8HEBCiWUQdM45wBC9N63DycFPRUSSNaXfaBTn4LDDuq6I5y+iqsl4EEOQsPgQuPQ5hsk9yzv141d0u8hi8CnDPyUC1kNC43N5TylxvGOtXWXOgA9l8golLkC9lEBv0Xq0rirr/B2WmGvD4bLAx8fQ0PnkSBIgORiUfVWqGnIBSDp3sQZVg38EbhfFzDWGZZELPuK2jiRWv+sCJeZUzaOh0AFPY3Zcc5egYvljy0teaoZPKS97We32gRBELPAqASNqZiS86BY979CcUxsOmMv+dppzGESpCcgCPhhTCg1XDIcTHAC2e7/yByMQhVr689EtuYk8bYVZH2v07yuSZCdQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=43CBGkhx7StwR/bMCXqT2YSeEoImjRJwYH5Z++BxDOo=;
 b=Jiz+mtDgLpYmV7i/idwejsXITNDC09rjCfqKneSGWzY6zUdAcGY13sTtoXDIQV/84xHR4rKAtVfcKpWwUnE7MNaFUaIGbDk+6BsOuvRw9ng1N1oI0274MVgT5aF+xOGGDe0tTvK0rH43o6DHJmM65Zu42nlnYCUkwI8WQ7L/Qxq/LrGgjhhjV6XM6EsIvXxf6ADCjp6IkowSZGcqDgna0m+Fko0u09XE5GGTv/ZYuNqmApFl6QPlG68H4NtIffDB/YAjXtPzhQgB+Iuuqnqc8ow8aRyzlW/bAF0JERiXnzBw27CuhhitdrIauIZwMr3HY3VO+ydwF3Q0QNsuckqdGg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <5655afd7-2116-2a9d-4c34-4e7031e39df5@suse.com>
Date: Wed, 9 Mar 2022 13:09:37 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH] xen/x86: drop dependency of XEN_SHSTK on EXPERT
Content-Language: en-US
To: Juergen Gross <jgross@suse.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>, Wei Liu
 <wl@xen.org>, xen-devel@lists.xenproject.org
References: <20220309113441.22746-1-jgross@suse.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220309113441.22746-1-jgross@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9P194CA0020.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:20b:46d::20) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 8fa8314c-2a77-4a81-839a-08da01c5af73
X-MS-TrafficTypeDiagnostic: AM9PR04MB8892:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<AM9PR04MB8892AD8E2E8BFFA4953101F3B30A9@AM9PR04MB8892.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2906002)(6512007)(508600001)(66556008)(38100700002)(2616005)(4744005)(53546011)(26005)(186003)(5660300002)(8936002)(6506007)(31696002)(86362001)(316002)(66476007)(36756003)(31686004)(37006003)(6636002)(54906003)(6486002)(6862004)(4326008)(66946007)(8676002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?M1gxVHpmNVdlUldPODBtOGc1WGluVXpuWEpaeWQrUkxxekJIRTBIL1c0Umx1?=
 =?utf-8?B?OU1Ld1Y1bi91MFphR3dNc0FqL0RTT0VhdmUrNVJmUzh2UGlFa0doWUxReldJ?=
 =?utf-8?B?STRFdGQxank4cWRxSk5ueldibkcycUtxTVZKVlBHVDE4N2xhbXpZL0V3L0Fl?=
 =?utf-8?B?cm5zVFEyRW9McDBLSXdFYStqbWZUbzMwK0pjcEFRcDdFRVlid3V0bG9RV0kw?=
 =?utf-8?B?OWJBVzF3M041aGZOTnNEVFBYazN4Q0NBeGkyNlE3WnVBOXdtOHZWc3hMWlFl?=
 =?utf-8?B?bW8vMkw4aFlQZHk3VjUyVGl5OWdPeFZYVStheUZNeERTZzRoMEpjbWd0QWtX?=
 =?utf-8?B?eFRoTUNSWDIyTFFuT0NyT21iWThTY3N5RjdvYUkrR3kwTVllQmF2dUE2bmFp?=
 =?utf-8?B?RU1DYVMwZEVVL2t6WHd0U2tpeVRjV3pwc3ZmcFF1NU1VaGhKamIrY1BoMnRL?=
 =?utf-8?B?WitjeUxPWGlTRFVvRGFJQStpbUl5QXdRT1NGOThyOVVQZnErZUlDNUhRK3Nw?=
 =?utf-8?B?NVcva3diM21DUy94K3FOM2hSTGNtMGJ2c09QeEJyWlhnazBPdE9MMzRhaU9O?=
 =?utf-8?B?NHJvanlteFN0cDc5YVBhdGtyck9NQWdqaEs5Nmc2bHJ2eVBiWmVjZFI0ZktM?=
 =?utf-8?B?K3k1cXVFTXo4NVp6YmZrdXlVQzA1eG5aVS9ZNXhRUU5qRXBkU20yUE5rdmM4?=
 =?utf-8?B?VEVISGJZNGRZWEFHaDUrUGliYlVQL3JuVzkzQUp1c0Z5UUJKTzBtMExYUFVm?=
 =?utf-8?B?c2JneU1ZZVVQSHJUSjNyZlpPY012b0hlYmRUSGw4Wi9XelVKWjNlNis5RXhi?=
 =?utf-8?B?ZHNKL1BjOG8vRWRwSEJYeTdxSiswTG1BWmVhNFlmTHpycEZodVMxUjF6N3ZJ?=
 =?utf-8?B?dE5lUy9iam8xeCtETnlYTXo3V3dQTjJRKzkrOTFlWDRaZ0xOMXZKMFYxaVZZ?=
 =?utf-8?B?Z1lhMTJBYW5wdnBLUFkrR25uYm85Mk0ydGY5R2tRQkdVUDF1YUY0WEgwVGhy?=
 =?utf-8?B?a3JyVVV1a0RoVEx3RlQrMU1FbUFFZm9KQ2loaUEzdEcwd1pBOHcyOUozQVp4?=
 =?utf-8?B?a3dPdWNlTC9jRmVHSDJVa2c1VXpVbklYNDdFKzhuYWNIb1pJZTdyaVVsYkht?=
 =?utf-8?B?ZTZSYlJIaUFNWnRYWU1WWVRFRDhvdDU0akZPZEVCWHFBR09KQ0FjdThMN01M?=
 =?utf-8?B?RDNmYmliTkF1M282cmFsYnpxYlZjNStrK29SQjVDN1Zndm5JUHBTVDYzQjll?=
 =?utf-8?B?TDkvc0tNOGV4Q2dtYVRTN1pqbVlvbVR5RDEwZlhYbGFVcGlJL1VYdlowako0?=
 =?utf-8?B?cUFQZkNhVUdIYUtHTmlYRExIaHNmMlBZM3B2REtDMjNqRVA0a3hhc3dkTFp6?=
 =?utf-8?B?QzA2OVkrb25vSDdBcktMdFRFRnF0aTl4TVNZTU9tcGN5ei9KcmtaRm44QlA3?=
 =?utf-8?B?QTdyOHhxcDRyODFmbG5WWWJvOXJzM0ZyVVpwKzY3SldWVC9FZkNGUG9wcnla?=
 =?utf-8?B?bTh1S3hDQjlyY2YxYmR6S0dnSmlGYWwwd2NZMWJJWWU0WmxCclJFaGZUVHJa?=
 =?utf-8?B?ZDkxU2svYWJtTFVVY0UvMXlaMUZjYlZMYy91ZlBiZEdyalJxcmRoYXRsYmM2?=
 =?utf-8?B?N1dVR0p5TFpib3ZLT0ovUFFWR0xUdVZyRnp2dGJjOEZoQlpqcm1JQVpSRkpo?=
 =?utf-8?B?THV5M0VpQVJ4NlBDVUk1UDBhM2cyYWkzaVM3S0xGREZscSs2Q1NaTjZpamFj?=
 =?utf-8?B?eUcwdVVVZmdUL1lUSFAvT3Jzc1dVVE5NY1M3Tmk2UkZoZW1lTDNicnJOZmU1?=
 =?utf-8?B?ZEJGNk9Bd3pTR1dRa3dveFRyc3NMM01SQ29rQ3JpVXduRjFKbUlHanZkZ2Qy?=
 =?utf-8?B?MVlnYzVzZStKOGRLdWF6eWViQjcvam13NHpZZDF3SHdMTTRIRjljc2RVd1pS?=
 =?utf-8?B?aVNmMGxXUk9WdmRhczBKaEVTSTVoS0o3K1p6UDB5TnlkTHYrZStoTldIM1BR?=
 =?utf-8?B?UlpJN09xUXRnU054VTJQOGh6ZnVKaDdJaXlPMTVhTU5iNDZhNm83RTJNTGhZ?=
 =?utf-8?B?eTlyN2lQZTRFM1l0MjBRR2RZRUNpMjFlbHA2MVhTbHk2MUlyN3IxcUFoQk5z?=
 =?utf-8?B?dFZjR3pRYVdBeGdlSXlJQTNWSGkxTkVqMlpKNzhla0dEcHppdWV0WGp1OEJP?=
 =?utf-8?Q?ZiqsFXC+6BiASO5Ry9EtcQk=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8fa8314c-2a77-4a81-839a-08da01c5af73
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 12:09:39.1520
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 4KneK7TF5swo2L29HyipFzBsTFe3KpkTIXbXdsKjR9cw2yBi4oO5LnIYnA9CY2aWaesSC4AUpfTZibMk/Fn8bg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR04MB8892

On 09.03.2022 12:34, Juergen Gross wrote:
> XEN_SHSTK should be on per default now that it is supported officially.
> Only let the prompt depend on EXPERT.
> 
> Signed-off-by: Juergen Gross <jgross@suse.com>

Reviewed-by: Jan Beulich <jbeulich@suse.com>

> --- a/xen/arch/x86/Kconfig
> +++ b/xen/arch/x86/Kconfig
> @@ -117,8 +117,8 @@ config HVM
>  	  If unsure, say Y.
>  
>  config XEN_SHSTK
> -	bool "Supervisor Shadow Stacks (EXPERT)"
> -	depends on HAS_AS_CET_SS && EXPERT
> +	bool "Supervisor Shadow Stacks" if EXPERT
> +	depends on HAS_AS_CET_SS

While I think it's better this way, if others thought the dependency
should be dropped altogether, I wouldn't mind.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 12:29:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 12:29:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287788.487979 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRvR0-0001pj-PQ; Wed, 09 Mar 2022 12:28:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287788.487979; Wed, 09 Mar 2022 12:28:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRvR0-0001pc-MI; Wed, 09 Mar 2022 12:28:54 +0000
Received: by outflank-mailman (input) for mailman id 287788;
 Wed, 09 Mar 2022 12:28:53 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=QNbA=TU=citrix.com=prvs=060736ad3=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRvQz-0001pW-Lq
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 12:28:53 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 783c8599-9fa4-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 13:28:51 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 783c8599-9fa4-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646828931;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=P67N1ZTTgEkSaeRsVd6VH9tLrg2gd+J93oVT+KeOBWU=;
  b=WJSE49UguD/QZhs0h7OpY/3a7ICW/FEl+9RbN7q+9NV/l5KbW4MlXq49
   BPuyKNWrOszeGVuMB0X25fD0QisMkDmOKPCRLeYcvBRRaxk7hw0BDbCXm
   mja3P5eT2ILDUldCMdqN3aAI1Xw1J43/wu7SN95FMiYJDZCY1D4q9j0dX
   4=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65807213
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:0yf62qxhybXGf+RSxtl6t+fDxirEfRIJ4+MujC+fZmUNrF6WrkVTy
 WsaC2mDOP2MM2Hzed5/btnn9E9TsZbUyII3HAJppSAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2YnhWWthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 NplspDpCl4CM/z2h+1ef0F/CXguY4NL0eqSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DJoQQt2sm1TjEJf0nXYrCU+PB4towMDIY2J0eRamEP
 pFxhTxHKzPDZxR1HHYsV5MRo9iEikn/cyRXpwfAzUYwyzeKl1EguFT3C/LrfdiNSdRQj1yvj
 GvM9GTkATkXLNWajzGC9xqEhOXCgCf6U4I6D6Cj+7hhh1j77nMXIA0bUx28u/bRokSzQc5FI
 koYvC8nt7Ev9VeDR8P4GRa/pRasvAMYWtdWO/037keK0KW8yxaUAC0IQyBMbPQitdQqXno62
 1mRhdTrCDdz9rqPRhq17ayIpDm/PSwUK24qZiIeSwYBpd75r+kOYgnnF4g5VvTv15usRG+2k
 2viQDUCa6s7isJSlPyQ8AH9nDvvisDuVFdluCvadzfwhu9mX7KNa4ut4FndyP9PKoeFU1WM1
 EQ5d9iiAPMmVs/UynHUKAkZNPTwvqvebmWA6bJ6N8R5r1yQF2ifkZe8Cd2UDGNgKY46dDDge
 yc/UisBtcYIbBNGgUKaCr9d6vjGL4C9TbwJtdiON7Kih6SdkifdokmCgmbKgwjQfLAEy/1XB
 HtiWZ/E4YwmIapm1iGqYOwWzKUmwCszrUuKG8ylkEr7i+rCOCLLIVvgDLdoRrpphE9jiF+Jm
 +uzyuPQk0kPOAEASnK/HXEvwaAiciFgWMGeRz1/fe+fOAt2cFzN+NeKqY7Nj7dNxvwP/s+Rp
 ynVchYBlDLX2C2WQS3XOysLQO6+Av5CQYcTYHVE0aCAgCN4P+5CLc43KvMKQFXQ3Lc6nKAuE
 KVdJZno7zYmYm2vxgnxpKLV9eRKXB+qmRiPL2yiZj0+dIRnXAvH5pnveQ6HycXEJnHfWRcWy
 1F46j7mfA==
IronPort-HdrOrdr: A9a23:+5gWwqk0dK+nAM9oWP4Ev2jvRUXpDfPCimdD5ihNYBxZY6Wkfp
 +V8sjzhCWatN9OYh0dcLC7WJVpQRvnhPhICK0qTMqftWjdyRGVxeRZjLcKrAeQfhEWmtQtsZ
 uINpIOdOEYbmIK/PoSgjPIa+rIqePvmMvD6Ja8vhVQpENRGtpdBm9Ce3im+yZNNXB77PQCZf
 2hDp0tnUveRZ1bVLXyOlA1G8z44/HbnpPvZhALQzYh9Qm1lDutrJr3CQKR0BsyWy5Ghe5Kyx
 mOryXJooGY992rwB7V0GHeq7xQhdva09NGQOiBkNIcJDnAghuhIK5hR7qBljYop/zH0idgrP
 D85zMbe+hj4XLYeW+45TPrxgnbyT4rr0TvzFeJ6EGT1vDRdXYfMY5slIhZehzW5w4Lp9dnyp
 9G2Gqfqt5+EQ7AtD6V3amGazha0m6P5VYym+8aiHJSFaEEbqVKkIAZ9ERJVL8dASPB7pw9Gu
 UGNrCR2B9vSyLaU5nlhBgu/DT1NU5DXStuA3Jy9/B96gIm0kyQlCAjtY4idnRpzuNId3AL3Z
 WADk1SrsA8ciYnV9MMOA4/e7rENoXse2O7DIvAGyWvKEk4U0i93qIfpo9FoN2XRA==
X-IronPort-AV: E=Sophos;i="5.90,167,1643691600"; 
   d="scan'208";a="65807213"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=em2rBtJuvG44AIN4t+W8ZwnymOynFu4DKXWimma7nTQUqQrQU7nPGr64GQbZhMGvmBBpu4eXujgHSAcO7mV638UDeiP1ziBRdo1MmtfBJZcQU/j8B7pAA/FetInmfq9dhWHoALdqEKuiNDcqQi4K040jCRh5bUQN+Z8Uf4tutVksmxbA0KiIQKoIybSXfdVLT+gXlOyR/PgB7XjvygdANLAGyPo9qOtba2E2AmyfGzdsGZ79WIWGytWBNnTToyCsPjn8hvvPahnvSK31H9E8AS3aMAP8kXZbLFptVrO7Pbkh7lUaO9HlNH8Xlk0psMMmorZpUD6byg9Ex4OfoO/Cyw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=1dY8amo89ajKpys5sAOASBo6UmFGefJUev3QWXdCOhg=;
 b=P/a2ff13qOMtLT337uBu+nChuhNNqbKtQpCLYB5Yrf0UIqGU+EoB2rJoqMeNOBjcAO1Tmpqp/nEbPZBnYbHUNldkrFM+clEnN0JeymMqKx39rRxw320NXQG0ymnmYJG5ksCM/EBHhIzcmuC3bgh9RYHeYCh7qosU9S4yW4y5ZoIoFTFAtpzH6DvsKZtFmpb3xzitHLIr8nvpsDJhGInkLdBl7a0XMUF9Uad1FBQSwBKwEPu/DJhOrsMLtNv9Az3rjQmxkUfKPYKsQRygxhNrB6Cn//PMQ2SopIq5WHhKbmE7NP7l3IUn6qvnwpanAL+adlS7v8QXmZ/XOXnAtKWgWg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=1dY8amo89ajKpys5sAOASBo6UmFGefJUev3QWXdCOhg=;
 b=W613nLlbGijlp51yMeIJk0J9ADcqgNphYdgHEY3faTkE/jdGwSEUHpc0gzhtLTNwyBq7RmAFhYVSfj4f4V5S2oy/KouIx0waJ6Ur2WJBIIvZzwAzDvzmfeX6T0O9eRMphI2yOCCnJDmBUXjHDpc/+KgBH7FBTh7GZTdYpG3+yYA=
Date: Wed, 9 Mar 2022 13:28:38 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Julien Grall <julien@xen.org>
CC: <xen-devel@lists.xenproject.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, Jan Beulich
	<jbeulich@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu
	<wl@xen.org>, George Dunlap <george.dunlap@citrix.com>
Subject: Re: [PATCH v3 0/2] livepatch: enable -f{function,data}-sections
 compiler option
Message-ID: <YiiddqMEBtpI0W65@Air-de-Roger>
References: <20220308134924.83616-1-roger.pau@citrix.com>
 <3dcefa20-829a-ca13-941b-ede25ef81813@xen.org>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <3dcefa20-829a-ca13-941b-ede25ef81813@xen.org>
X-ClientProxiedBy: LO2P265CA0060.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:60::24) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 3a8acab4-ac5f-4d79-4d93-08da01c85956
X-MS-TrafficTypeDiagnostic: DM6PR03MB3596:EE_
X-Microsoft-Antispam-PRVS: <DM6PR03MB35969AA333BEBC22D9D81AC88F0A9@DM6PR03MB3596.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(4744005)(6506007)(83380400001)(6666004)(66946007)(6512007)(6486002)(26005)(38100700002)(9686003)(53546011)(5660300002)(2906002)(8936002)(508600001)(66556008)(33716001)(66476007)(8676002)(316002)(107886003)(82960400001)(54906003)(4326008)(85182001)(6916009)(86362001)(186003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?YXdBeUp5Sm1UK0FUZ2lZMXQvOU1mRUpySEk4NjJtcE14cEYyaHFrRTVjNFhq?=
 =?utf-8?B?anAyUUQzRFEvYnNISDFXRnF2ZHBYa0REVS9IT2hMVWJHM2ZvYTFYbFkxbXZj?=
 =?utf-8?B?NkhaT3JtaUI2amtVSGp2cXN2ZStFaWQ2TlpTZkp0QlRtcDRrQXpjOGlUYzNJ?=
 =?utf-8?B?d1ZQNWVCQVNnU3B0bXREN1JOMWJYYWVYcDQ2T3pTK2gvZk1qalhHcVNTSjFw?=
 =?utf-8?B?cW9oa01UK3ZOY1RWNWZWODRJazNtK3h5a1NSL3ZaWWdWSkZoWEpoYytJOW1i?=
 =?utf-8?B?YitNamppVnAraDMrazcrcVFQM2MwWDB3L1UrNDc4NWNDWkV3TTdDOW5OTEEw?=
 =?utf-8?B?dXQwUTZSZlltNnRCRk5mL2huWExnbGt0REEvcG83T2h5N3cxL2d6bG82SFBD?=
 =?utf-8?B?Sk9lUUdZL21SVVcvbE9mRXBFT3hNaXpkVmc1SlRsOE92TSsxUnRneVdaVjk1?=
 =?utf-8?B?bUpPTWVuaGtsRzlhMTI4b2RKcC9aM0U5S0g1QkZ6L0tKbjFvZ2xra3dBalVG?=
 =?utf-8?B?Z2E5WEZ1aFhHckFhUXZZMjZrYUdwcW1Id1lVQU9qL2pwbDJaRnBVZ2ZNMlkz?=
 =?utf-8?B?dnpnOFg3L0NWMFl0ZGFnUU5Oejdza0FueW9ZWUIwNy9UZExrUWU2M252Rjdj?=
 =?utf-8?B?WGI1ekk1WjZvYjNZY2pVVlhtNnJxaVJ3ZVREREFJeDJSL01vc3RwUUMvTlhq?=
 =?utf-8?B?QlpML0N0ZkhkVE5QcEZ2WUt1RGp5czdLVXpydXBPMGVoOWZBd2RvUFkweGlr?=
 =?utf-8?B?Q0YyWTBUOWxaUUJxMGJucGlUcFkyYm1DKzBzKzV2bVNnOFhxcFlNT1BPc08v?=
 =?utf-8?B?RU9oN1piOFJWQ0lSazVTSWdrZmQwbnlVVDVqNzEza3VxYWxKYjF0eWg3WnlR?=
 =?utf-8?B?aUZxTEZwWE1VeURaSk10U2hJZXZKdGI4NzlLK25zeExKcjRZSnQ1K0UwQUg5?=
 =?utf-8?B?bHdvU25nVnlrWitTSTloaTdqUWJjandnQzg4UnlJdHhOQ29lSDBKZHZGS3h5?=
 =?utf-8?B?RWZ0R0RWenN3eDVLTUVRRk42ZXAvcXlBVlV6WHBtOGJzV2F1ME1UbVJIR0Rs?=
 =?utf-8?B?b2tzcU5IVmgzUjc1L2Z5U09tdkplWlN6SnNXckh3YWE4aHMycURCZFdXcy9K?=
 =?utf-8?B?Tm1Yalc0UXBWNWpiUnpXZ2J6emxrNjNWb09pY0xWelU2cUN4Ym5sSzJacktS?=
 =?utf-8?B?V21ybFc5RHRNZ2VRUllVeFo5dmV4MVAxai90UHdqVkdRRE9aekRUaEpRMUVN?=
 =?utf-8?B?TkxEN2VMNTZ6Sys1ZUtNRlhFeXZIL3RVRGpxeGI5amN2RGhuNXo4MmlqVmRZ?=
 =?utf-8?B?VEFqUnhNTXhGcU0xSWs2NVl5QitXdWs4RnpoTlpSY3p6aTFhbGw1d3IyUW5v?=
 =?utf-8?B?L2lreXlyOEV5NTlVQWhyT1g2aDlqRTJmdHlpWnlndmNnUE0yNURtZGNXYkE5?=
 =?utf-8?B?dHhkcUNEakRHUDRPWXRoNHRpVzhhbTlYMlc0Zno4R0JvRStVMlNtOTVHUTNz?=
 =?utf-8?B?anRrRlZqcHRYRE1NelVkNW1tanpIQ0JyTno3YkY4WVlrRVFLVUR0WkZTcVpi?=
 =?utf-8?B?RGtBZUtvM2dHVHlUYXFpSk1HUTcxV21NZEdLeWlTNldUZUtOQ3dkM2xUVlU5?=
 =?utf-8?B?S25aZFBLQmNYT0FEZ2MvMkZoUVVYUW41SWpqMlRKTVhwcnh5VkkvSlpPOHFI?=
 =?utf-8?B?T0p1N3lncmloWUlmdXF4YTdMcjA2ZWIvdG53Um1LQWlPL3d2T1FkUVUwek5K?=
 =?utf-8?B?RzRKSkFPRFI3M05WUG9yc1RXOWllMElETmtJWjE2Y2ZMbm1RTWVteFpvMVlX?=
 =?utf-8?B?cXdoQ09mRkNYdmgzZWg0MFQwQjhkdTlDYjVsNUllUk1PUFgrNU12OWhaTGli?=
 =?utf-8?B?eFUzdkFvQmdQZzZHN2d6blU3K2NmSnlFRm5UWWtKcFNtbFhOcHJxUE9Vdzk5?=
 =?utf-8?B?MnF0T0R0WHdYM2tsZ0ErOWRXVzdHcnp2TThQUTQ5TXZ5Y2Y0Y1JNYnJLemlW?=
 =?utf-8?B?c3BXbkg4d3VTYSt2QVZXTXZnNHEzUkJnVXV0SVVyMkp6NlA1ZCszRFBMck53?=
 =?utf-8?B?VUFHSERrb1F5bGlTcXk1WVpZK1NTN1BOUzJGM3pIUSt6MDl6OXdlNHVKT2Iv?=
 =?utf-8?B?YmNpVjRUK2M4R2NHZGw2RjhkR00zT3BnVmZNRlZtZHRPUGNMR0pyYXh0UzFO?=
 =?utf-8?Q?Yw03I94h3lIUOfC97par5Mo=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 3a8acab4-ac5f-4d79-4d93-08da01c85956
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 12:28:43.3073
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: TGjsczImLw0ySND1DNwDHrC95DCePflZ6p6Li0PesjWGOlx+fotuUwlthYt7rKzmYbxWBTAhcwvamyYZaqcIPw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR03MB3596
X-OriginatorOrg: citrix.com

On Tue, Mar 08, 2022 at 02:52:55PM +0000, Julien Grall wrote:
> Hi,
> 
> On 08/03/2022 13:49, Roger Pau Monne wrote:
> > Hello,
> > 
> > The content in v3 has been split in two patches, but is still mostly the
> > same. The main difference is that first patch does a bit of cleanup of
> > the build logic now that the header object file doesn't need to be the
> > first one passed to the linker script.
> > 
> > Thanks, Roger.
> > 
> > Roger Pau Monne (2):
> >    xen/build: put image header into a separate section
> >    livepatch: set -f{function,data}-sections compiler option
> 
> For the Arm bits:
> 
> Acked-by: Julien Grall <jgrall@amazon.com> # xen/arm

Thanks!

I don't think Acks require a scope tag, as you can only Ack changes to
the code you are a maintainer for?

OTOH a 'Reviewed-by:' tag would indeed need to be limited if it only
means to cover xen/arm bits.

In any case I've added the tag as provided to v4.

Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 12:30:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 12:30:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287792.487990 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRvSe-00039z-4n; Wed, 09 Mar 2022 12:30:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287792.487990; Wed, 09 Mar 2022 12:30:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRvSe-00039s-1r; Wed, 09 Mar 2022 12:30:36 +0000
Received: by outflank-mailman (input) for mailman id 287792;
 Wed, 09 Mar 2022 12:30:35 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=QNbA=TU=citrix.com=prvs=060736ad3=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRvSd-00039g-7Z
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 12:30:35 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b5f59ecf-9fa4-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 13:30:33 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b5f59ecf-9fa4-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646829033;
  h=from:to:cc:subject:date:message-id:
   content-transfer-encoding:mime-version;
  bh=jn996H0UodBbzF0NdWN/tz8IvosBKCSnpUrq0gK8r6U=;
  b=JC0ZdQwzSRG29m/xNPmO/j9+uFrEHIy5PuFu5dtvAcB0UMjdMY6sQkw9
   flq64A6JMgUYmDERaHjOF+QoepCE2WH9TCEEkJ+0Mb86AznrZ367EgH4G
   C1flRCgxcMbLjltd6UvzwgaJwArLC63hm7PS35Ru75oiNYT6K1TGr0v5f
   8=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65815390
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:N6ARpaxp+ECnHgqGVIt6t+fDxirEfRIJ4+MujC+fZmUNrF6WrkVVm
 jdOUGyAOfyINmX0Ld8kb4iwpkMPv5TTnYJnHVRprCAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2YnhWWthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 NplvNvsYxkkI6f2u7osU0l3MyV3DL9H0eqSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DJoQQt2sm1TjEJf0nXYrCU+PB4towMDIY2J0eRKuFN
 pJxhTxHNkqfZkQeG3IsKsgaveyTolSgYwZgkQfAzUYwyzeKl1EguFT3C/LrfdiNSdRQj1yvj
 GvM9GTkATkXLNWajzGC9xqEhOXCgCf6U4I6D6Cj+7hhh1j77nMXIA0bUx28u/bRokSzQc5FI
 koYvC8nt7Ev9VeDR8P4GRa/pRasrhMaHtZdDeA+wAWM0bbPpRaUAHAeSTxMY8Bgs9U5LRQxz
 UOAld7tAT1psZWWRGib+7PSqim9UQAXMGsDaCksXQYDpd75r+kOYgnnF4g5VvTv15usRG+2k
 2viQDUCa6s7hIlX/bu24Fr9oGydpsjmbgo81xfWdzfwhu9mX7KNa4ut4FndyP9PKoeFU1WM1
 EQ5d9iiAPMmVs/UynHUKAkZNPTwvqvebmWA6bJ6N8R5r1yQF2ifkZe8Cd2UDGNgKY46dDDge
 yc/UisBtcYIbBNGgUKaCr9d6vjGL4C9TbwJtdiON7Kih6SdkifdokmCgmbKgwjQfLAEy/1XB
 HtiWZ/E4YwmIapm1iGqYOwWzKUmwCszrUuKG8ylkEr7i+rCOCLLIVvgDLdoRrpphE9jiF+Jm
 +uzyuPQk0kPOAEASnK/HXEvwaAiciFgWMGeRz1/fe+fOAt2cFzN+NeKqY7Nj7dNxvwP/s+Rp
 ynVchYBlDLX2C2WQS3XOysLQO6+Av5CQYcTYHVE0aCAgCN4P+5CLc43KvMKQFXQ3Lc6nKAuE
 KVdJZno7zYmYm2vxgnxpKLV9eRKXB+qmRiPL2yiZj0+dIRnXAvH5pnveQ6HycXEJnHfWRcWy
 1F46j7mfA==
IronPort-HdrOrdr: A9a23:U/fXi66nXxcmRV7+MgPXwT6BI+orL9Y04lQ7vn2ZFiY7TiXIra
 yTdaoguCMc6AxxZJkh8erwXJVoJkmsj6KdgLNhRotKOTOJhILGFvAF0WKP+UyDJ8SczJ8j6U
 4DSdkGNDSYNzET5qybkWqF+r4bsaW6GcuT9IDjJhlWPGRXg/YK1XYFNu/XKDwBeCB2Qb4CUL
 aM7MtOoDStPVwRc8SAH3EAG8zOvcfCmp7KaQMPQ0dP0njHsRqYrJrBVzSI1BYXVD1ChZ8k7G
 j+igT8ooGuqeuyxBPw33Laq75WhNzi4N1eA9HksLldFhzcziKTIKhxUbyLuz445Mmp9VYRid
 HJ5ywtOsxigkmhC12dkF/I4U3NwTwu43jtxRuzmn34u/H0Qzo8Fo5omZ9ZWgGx0TtsgPhMlI
 Zwm06JvZteCh3N2A7n4cLTah1snk2o5VI/jO8oiWBFW4d2Us4akWUmxjIbLH48JlO11Gh+e9
 MeTf00pcwmOm9yVkqp8lWGm7eXLzQO9hTveDlxhiXa6UkUoJlD9Tpo+CUupAZ/yHsDceg12w
 29CNURqFhvdL5jUUsvPpZ3fSOIYla9Mi4kdljiY2jaKA==
X-IronPort-AV: E=Sophos;i="5.90,167,1643691600"; 
   d="scan'208";a="65815390"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=FwpMfh6Wk12Kt4AFcsFHc4oVysprAVnUovEdd6BcPAlr0QQj9xiCkLaPnbmP2g+QqSS9f6erAgaxghIGjiIoDP+9o4k77PjAVYFm3MqwPbNEW0DQ34I5WsWPWmZNvIUYKyc9RUxuHXMc86Mt/kvyIxDz31EGE8xNNe/VDkz3zfNUE5fvTaRKBuXzhEb8pdrQT2KUhN2eXCHPUTDQSHKndwMH1lB6CtKgNE4Asa/Ajqx2pHb3PyNgNP5JiSrlmRUTrMiGSl25HwhgXQvfs5+RZ9JY44mP/CxGGtIobfgKsFoRoVRCPtsBRBA/zEEboqMzSXobEL6Ji7rpZxkBQz3yTw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=SP8l3Y6EvHr8ZL+9KA8yAnkl33yvaCRA0iYuYR7ZPcg=;
 b=iVFJfL0Wul5Vt1pbEZaQq3OoScyPq44BUo6ozFyyRm04dVO0LmG6m4RNLRf/ORcMJGW4kPxaZNO+3E/4qifCNh21NX18CvSODQ9ZOdUnWNUF1JIvFLHkfNUgMzSdMynbFJk98heAjg3uaOoi10yMpOSUKQcuNAgYDlprMsbCJYugzEh1qP3R0/fc7/Hgb17uOUYDENgI8fQzFM9LhpnBAkDLYmPng8m+AMp4nnRXM0HMO6iCM7VXm0ZSDxmmA318pfUnA2d26Ab5x/xoZUFrFIyQhxI5GRIiHKvuXCKlMAqAvrVvs3akQnHpxRNHivbswOOE5a8xrynVMM5hOakLNQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=SP8l3Y6EvHr8ZL+9KA8yAnkl33yvaCRA0iYuYR7ZPcg=;
 b=DwmMxX1iziTDdk2l9ZuTKx1aL2B7EuzkL3hW07tR3QXB+xw79F35eZYCYCLL2wQOM0LI866dUZu8UOTr94sMgAxM1ThFWhFur3Zeyiyl20iWZGkhcUS0r8bKBFQoxtJcnXvgferBvUD6ujGR6vc3hnlXuS3sKHKu8426WTuBDOk=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Julien Grall <julien@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Jan Beulich <jbeulich@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>,
	Wei Liu <wl@xen.org>, George Dunlap <george.dunlap@citrix.com>
Subject: [PATCH v4 0/2] livepatch: enable -f{function,data}-sections compiler option
Date: Wed,  9 Mar 2022 13:28:44 +0100
Message-ID: <20220309122846.89696-1-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO2P265CA0456.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:e::36) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f38f626f-ea10-4653-4ae9-08da01c89467
X-MS-TrafficTypeDiagnostic: DM6PR03MB3596:EE_
X-Microsoft-Antispam-PRVS: <DM6PR03MB35968DF1F4FF4CB31C90D9EA8F0A9@DM6PR03MB3596.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(4744005)(6506007)(83380400001)(6666004)(66946007)(6512007)(6486002)(26005)(38100700002)(2616005)(1076003)(5660300002)(2906002)(8936002)(508600001)(66556008)(66476007)(8676002)(316002)(107886003)(82960400001)(54906003)(36756003)(4326008)(6916009)(86362001)(186003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?U2xnNDRQUHZXV1dHdVQ0V1ZxQmhsVDY0WW9tS1V3cmYwcVlqSmRiM1gwMlVr?=
 =?utf-8?B?eWFUL3R5UzhtelVacWpQZnJjOE1ZalZjdStGbzFPT1NtWmJTczNFYVVxRExs?=
 =?utf-8?B?T050bk1QUGVlcWdCUFpGOGxhUXpqeWcxd2hnd0laOVJpQ3RlRElyRnZzeFVq?=
 =?utf-8?B?RE5tMHNjMzVrdTlxOFR1WGM1MDhjUldOaGFrdEtPVmpQUzROQ0wyVnVFa01S?=
 =?utf-8?B?dkpEZElockNsL2ROcUlvMm92ZjNybzdmSHA3VXo2cHNJS1JuT284ODRaNXEr?=
 =?utf-8?B?UHlQRlVMa2lFTExhQWE1U1JjVjB5SmRZcVBaTGZnamxDT2J5VVVhOGMxYVV4?=
 =?utf-8?B?S0ZFMi9rTldLYVlldE9iaG8yeDJMbTcwclVETGFBejJubGpyZFZ5a2xrRW5M?=
 =?utf-8?B?OHAxdk1KbEw3V2dhT0RnSjBwZndicUVibytWbThVTndRMVJhUVF4THBtRUEx?=
 =?utf-8?B?YmpEZThZaW02UnlvdHpFajB0a2E5Y21RSFdSM1JQL2xJK2gxNS9BKzMvNEkr?=
 =?utf-8?B?bnZzZ2ltWVV5a1JveElFaW1uV2Z3UUZma1hqRlBmcm5SQU9oRWZRcUNEckhI?=
 =?utf-8?B?N0RKUHdnS0o3UFgxNGpqMmpSL25GU1dTZFVrWXd6N1VJVUNUQXJ3TldXWURW?=
 =?utf-8?B?VjIvc0RHZzlQcTBuS1ZPaTlYZmVXTFFlVWtVSmVyL01iSWtKNlZnakxiWTFI?=
 =?utf-8?B?N3NzNHp6SzZjajVOWksvci91eWFwMEpYVzUwUWxSUnpVd1JsUkFielQwSXFa?=
 =?utf-8?B?S0NXYTRxd2hJY1lvZFNoa3QvK3dFUDNIcHZqOG90NDhheW1relRZU3hEc2FL?=
 =?utf-8?B?MXorTFVuQ2xmajlCN2NRK3lTYnlNbEZ5ang3WW1tRjVvR0kzdy9Ca0tId2Jt?=
 =?utf-8?B?NWdVSTNKcHhNOEhBZVY4YUtLczNlMlYvdmdwZjhNQnRUU1F0aTVBU0VKQkRa?=
 =?utf-8?B?N0hobm4rTng1eXErQ0xyN2oxUDdNTjdKQSsxMEgyVTZLcnBCajJGaWRIZHBM?=
 =?utf-8?B?WHAzYXVBUEQvVmVtRDA0Q0xwMzgreURIdG5tVFdSRUozYno4VHRNb003Y1M5?=
 =?utf-8?B?RUZJMzJsT1M1emV5c0lrQjhoU21FQTJadlVSVVdVSjB3MHNSOXIyTUlxWU5J?=
 =?utf-8?B?c3R2bDNaRUk3OENPN2NodldmY2hXa2NueFlUbFlMM3JIWlRTUFk3QVdGSVlL?=
 =?utf-8?B?VmFNNHhBTFh2c25GNXUxY0paYkVXbGpQTXdpZGo0VlI1QjZPMHYxSnVNTFY5?=
 =?utf-8?B?TmJzVXBxUlJQK0MwSzNBTlduVHJaRWJYTkl2b0krNTF5T2ZOeUV0TktyZEhw?=
 =?utf-8?B?eWlWd3I0b0dZWkk2Z0pVckZncGFqc3RlR0FPeGF1aEcvMWNWOVFzUFF5UEww?=
 =?utf-8?B?MUxhME9YNE8zZ1ZzVSsvZVFINjFSdHc1NGl3NmhlbXkyMlY3dVdTekdici9L?=
 =?utf-8?B?dkpDRXRBQVJZRlp2YUhEY3MxSjhiSTQ0TGdUUTlkWUVuSExoU3NKcXpzWW12?=
 =?utf-8?B?MDhjMHEwOERhVXVCTjdiVnhzV1hlOEFnTmx5dzNFMHI0anhoT3E3VEQyR3NS?=
 =?utf-8?B?VWNYdUNRQkVkcm9ETmNzbnNNdmJBSzlKU3dRYkRwVEtuVlJzUzNZVm5wWUtk?=
 =?utf-8?B?b0RlWHRYUzJwNGNYVXpuSFM1cEJubVFXaHNFMTF5czlvaEswQ24xazYwRGxv?=
 =?utf-8?B?VEQ1UVQvckdjTlFFOW9mNURra0pkU2JxdkVteEVabk00VEtZcG5ERDBOaDBO?=
 =?utf-8?B?MG9yMFJTQ1UwSlBHVVJEK21CT21XY2FuQ0VSa3EyV0U4RUNGUS9zdUlYeElJ?=
 =?utf-8?B?R0NzR0F5R1UwaHNhbnBSOWF2Smw0VllUWDRURDcycHBNSDlXN0pIK0xMTUlx?=
 =?utf-8?B?c3BVcGVqRnFUdVZ2emlFM1J4dFp4ZUd0bmRMOFVuN2FrbTRkN2tacEd2Wklz?=
 =?utf-8?B?cUltWUtQenFudEpaQ0pLd3J4RDhJdEhFQkswbDZSSE92cW8vUFljQ21ROE0x?=
 =?utf-8?B?ZGpFQUNDM0RvMlZyakgzaHM5SFMzWmFISjhOT1FBVElCTkd5V0RpRG1wbThY?=
 =?utf-8?B?eVB5UlJXWm83WC9vYkVFU1V0ZndzOExEeW9LMUhFRldNa3VPN3dYaTJ2Ri9h?=
 =?utf-8?B?bXFRbGd1RHdEOVZmZ0hFTVJ0cFUwaHA1c1V6K0JYSndFREtrckZqMkZGUXc0?=
 =?utf-8?Q?RZVHUzWQ3LkS7/CGBwnGx20=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: f38f626f-ea10-4653-4ae9-08da01c89467
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 12:30:22.4042
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: FkUoptdasW9scB479aCqNT0woXEA8Ni+S6qhs+FZVYSrEBDPNs4VzG3V7EGpYJ3Hw8aKd753BlDM0iaewDF2pQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR03MB3596
X-OriginatorOrg: citrix.com

Hello,

The content in v3 has been split in two patches, but is still mostly the
same. The main difference is that first patch does a bit of cleanup of
the build logic now that the header object file doesn't need to be the
first one passed to the linker script.

Thanks, Roger.

Roger Pau Monne (2):
  xen/build: put image header into a separate section
  livepatch: set -f{function,data}-sections compiler option

 xen/Kconfig                 |  4 +++
 xen/Makefile                |  2 ++
 xen/arch/arm/arch.mk        |  2 --
 xen/arch/arm/arm32/Makefile |  3 +--
 xen/arch/arm/arm32/head.S   |  1 +
 xen/arch/arm/arm64/Makefile |  3 +--
 xen/arch/arm/arm64/head.S   |  1 +
 xen/arch/arm/xen.lds.S      | 49 ++++++++++++++++++++-----------------
 xen/arch/x86/Makefile       |  5 ++--
 xen/arch/x86/arch.mk        |  2 --
 xen/arch/x86/boot/head.S    |  2 +-
 xen/arch/x86/xen.lds.S      | 20 +++++++++------
 xen/common/Kconfig          |  1 +
 13 files changed, 53 insertions(+), 42 deletions(-)

-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 12:30:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 12:30:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287793.488002 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRvSk-0003TP-JD; Wed, 09 Mar 2022 12:30:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287793.488002; Wed, 09 Mar 2022 12:30:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRvSk-0003TI-Fs; Wed, 09 Mar 2022 12:30:42 +0000
Received: by outflank-mailman (input) for mailman id 287793;
 Wed, 09 Mar 2022 12:30:40 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=QNbA=TU=citrix.com=prvs=060736ad3=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRvSi-00039g-JK
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 12:30:40 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b989fbf1-9fa4-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 13:30:39 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b989fbf1-9fa4-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646829039;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:content-transfer-encoding:mime-version;
  bh=vpZWRX4Vwa+gsM2ifVy160bm35BDOYv4eSobTOLsP8U=;
  b=f3nGzjo/WzrVWpS8Gx5BFVxL8wWQyBL5UnTOBr5oLaWkRsazJucX9vOz
   33lANU7LC6EY9se+h3j+uoNkQwIIqcu7cmZ7bQaLwyUsYTSdsSekKbOax
   q1c2Ln52kjCkg3sBSnKD7ywdcDXU+WyQGGxaPjAjHPTPxh7shqc/dc1M1
   I=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 68162922
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:rwXmzqjjSkjHXWgEMdDsGpXbX1614RAKZh0ujC45NGQN5FlHY01je
 htvW2+EOPzeYzahKI13bYvgoE1V6p7SyN5jQQRuqHxkEHgb9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFvc4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YQQkJLTlhuYCbzlZMj9xZPx7w5r3Hmfq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bkmtnwjzDS+4vXLjIQrnQ5M8e1zA17ixLNaiOP
 pRDOGA1BPjGS0AVJ003MIISpeH2u2n/ayMGmFSRlINitgA/yyQuieOwYbI5YOeiT8hPglyRo
 G6A+m3jGwwbL/SW0z/D+XWp7sfQmQvrVYRUE6e3ntZoj0eawmg7ARgfR1y95/K+jyaWZdVbL
 EAF/zs0moI7/kerU9rVUgWxpTiPuRt0c9haHvA+6QqN4rHJ+AvfDW8BJhZRZdpjuMIoSDgC0
 l6Sg8ivFTFpqKeSS3+W6vGTtzzaETMOMWYIaCsATA0Ey9ruuoc+ilTIVNkLOKyoitz4Hxngz
 jbMqzIx74j/luZSif/9pwqexWvx+N6ZFWbZ+zk7QEqm4xlgTZCneLCI6HnF4q8REb28fmae6
 S1sd9el0MgCCpSElSqoSeoLHa206/vtDAAwkWKDDLF6qW3zpifLkZR4pWgneRw3appslSrBP
 ReL0T698qO/K5dDgUVfR4uqQ/onwqH7fTgOfqCFN4EeCnSdmeLuwc2PWaJy9z21+KTPuftmU
 Xt+TSpKJSxEYUiA5GDqL9rxKZdxmkgDKZr7HPgXNSiP37uEf2KyQrwYKlaIZe1RxPra/FuKr
 YoFZ5fWl0s3vAjCjs//q957wbcidyRTOHwLg5YPKr7rzvROQwnN9MM9MZt+Itc4zsy5Z8/D/
 22nW18w9bYMrSavFOl+UVg6MOmHdc8m9RoTZHVwVX71iylLSdv+t883KspoFYTLAcQ+lJaYu
 dFeIJ7eahmOIxyakwkggW7V99UzKk702VrQY0JIolEXJvZdeuAAwfe9FiPH/ygSFCun88w4p
 ryrzATARpQfAQ9lCa7rhDiHljtdYVB1dDpOYnb1
IronPort-HdrOrdr: A9a23:Hhu2GK/Wql77SkLLbStuk+E8db1zdoMgy1knxilNoENuHPBwxv
 rAoB1E73PJYVYqOE3Jmbi7Sc69qBTnhOFICOgqTMuftWzd2VdAQ7sSlLcKrweQfhEWs9Qtr5
 uIEJIOeOEYb2IK9foSiTPQe71LrajlgcKVbKXlvgpQpGlRGtBdBmxCe2Cm+yNNNW177c1TLu
 vj2iMLnUvqRV0nKuCAQlUVVenKoNPG0LrgfB49HhYirC2Dlymh5rLWGwWRmk52aUID/Z4StU
 z+1yDp7KSqtP+2jjfaym/o9pxT3P/s0MFKCsCggtUcbh/slgGrToJ8XKDqhkF+nMifrHIR1P
 XcqRYpOMp+r1vXY2GOuBPonzLt1T4/gkWSv2OwsD/Gm4jUVTg6A81OicZyaR3C8Xctu9l6ze
 Ziw3+Zn4A/N2KPoA3No/zzEz16nEu9pnQv1cQJiWZEbIcYYLhN6aQC4UJuFosaFi6S0vFpLA
 BXNrCd2B9qSyLYU5iA1VMfguBEH05DUitue3Jy+/B8iFNt7TVEJ0hx/r1pop5PzuN4d3B+3Z
 W3Dk1ZrsA8ciYoV9MJOA54e7rNNoXse2OEDIvAGyWuKEk4U0i936Ifpo9Fo92XRA==
X-IronPort-AV: E=Sophos;i="5.90,167,1643691600"; 
   d="scan'208";a="68162922"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=V59PGV6k7gOSgG1VMNV1lmwnIm7jyKh1M22cgkpKvzU5PiIQYK6sE4MpF8Ohw5PJxXCfdUsxmwMYmQyctovxc2GT71Y1cGs8qZKVCdLu09UAnak/+StVttd5ITd4APvP3WXQS9OZTDVXBp0AWnDibnVKs1hZyomuSnPnXsm7mwMz/gtgke0fMniEw8gE9KdQPEX1+SPDa8lonIPMTv84GfZpzOeXp3f4/nrGwfpqFl45UvtAE9s4fMDGN8Z6uMAaO5vgT0Vu9ZyeUgWCK9fUG1T8ISDXiIAVYAxqsl3m+u0Bp6nkttQ1tkSFzVc9PqwnGgEY2jqBSGrth1NabxFqhA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=FuSbsghuNb3YWyNl9xxHsiwvDb+ewABgs4/F+WArUBg=;
 b=iNUMATBLPCuEHesSEFX0BL4QRSv6B349hn6Ri4cbLRBVyiqVTeq5Anl15FvXD9mdYzPcQk093EqAypYsTGeEC94kg0bz+k/aQElX4AYGIdAH/JdghSpsAOiwkvCgaE4to8kt6GEzDwJ1/sKTdtzZ+yCqf1OBWsvsVVWcsir71e6qBLs9vjl5fRRRVD/JxArmlWeoKAUo0UgjRd0XaRViqigtpKsPfhtHkn/U/Zn9gW56embIiABV9TWapA4seh55apOlD78yrn+h8Xl7fCFLuscEXriTdRvpsi3gs8J/wxg+KWG5H9dduFAKsj50p3klmA2y88VUiE7AEJOUD6vdIQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=FuSbsghuNb3YWyNl9xxHsiwvDb+ewABgs4/F+WArUBg=;
 b=ViI2bgUo5UzelbtN2TfxJ2yOc1iU3nPeQMSTt7OC00Ij7AAMmkPewTxSSK/U65swsQlRwGTCZO7bpFXCbdHxTIrS76SMISn2RJFk5w8bU2DqTjd70U6k9m9ccVAg+/iNDxlzAIhiA4umIMUdg2r7DpOhZc6rLwbg+3lf73xZJ2M=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, "Jan
 Beulich" <jbeulich@suse.com>, Julien Grall <julien@xen.org>, "Stefano
 Stabellini" <sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Julien Grall <jgrall@amazon.com>
Subject: [PATCH v4 2/2] livepatch: set -f{function,data}-sections compiler option
Date: Wed,  9 Mar 2022 13:28:46 +0100
Message-ID: <20220309122846.89696-3-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220309122846.89696-1-roger.pau@citrix.com>
References: <20220309122846.89696-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO2P265CA0099.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:c::15) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: b5a89d11-db37-493f-be11-08da01c89aba
X-MS-TrafficTypeDiagnostic: BYAPR03MB4359:EE_
X-Microsoft-Antispam-PRVS: <BYAPR03MB43590EF97F2B524D12919DD58F0A9@BYAPR03MB4359.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: xtyRz2w9IA+CtcaLqjCLLPe3OLYIY8FF/GD7bGtHwYK1aUyyg6e2IP1OJEHP6aTi7qY/wWiqU2d3r8fknJY4DLi8yUnXRzpAF6OvoNDxw/JLjqL5LwVUFM4/JuABdj/jKx0pNfkVUe5M5gxEUxD/gY6ADqJNlYrWhwpzT5wRWJgBuFwmyZE0Elpdg9KNAiBDr3+E20XdTFtwqWFDkPnjFSzSOzjeZBPikbI30x7nMdvtUadsVhKLl/P1vnfBcb1SFntLeC/qcqIXHJQfYDt/mMKO4O3b9Fzh2OeuulwKT5ctT81TorxP5SrAPuFd9s3IkxrHzvPHus0+XxzydkmfklZqeTg9bJ2ErQee20zOOFdq8gD19plPX6r/WdEP1CqTZittE2FSUGU0nQKX1Lstn6owRDQ5/1L8IrYDugtLGlJow3Kt5l2+i7PEcK/LW/IDXEOl7pho2jBAXQ/YlQE3WKj46g+xgKp/iYEEfa8SVKP6Ny3Hc4YK8UQUHFORB/HVWpe/wZLZbxV1RoBPXnUUSeDD/qhrLjFhIJVNFq8xPtf4d4pMruizFzDHLbOSSKViWDlFH0cbtIyzW/EFF/vNJqkVmrIB1Rqj1DHh6TqslmnKc1QmVSUYov/ex9ZEX9G+hb4Fer5QbrDbUqqImY3Gqw==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(26005)(66556008)(4326008)(66946007)(1076003)(8676002)(6666004)(86362001)(83380400001)(2906002)(38100700002)(66476007)(82960400001)(5660300002)(8936002)(6486002)(6916009)(6506007)(36756003)(54906003)(508600001)(2616005)(316002)(6512007)(186003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?eHpwTzQ1NDJnblUwV3NzZFg5L2ZoYW1obFBmSDBGRmJZYlJzR3JISktJY3Z6?=
 =?utf-8?B?ME8yVlNQeGtlYXJlakZFQVVJZlQrMWlRUlY2d01NeUZza2phUWRGcFBOZUYy?=
 =?utf-8?B?UFgwa2FNRXJpZzJ2L0w4L1BlQU5rVXdBMWVldmVRVjYrRUI2cWkxOE9seHVl?=
 =?utf-8?B?MWQ2RWVNcTlKeUhoT3BkSUJKcVZaK2NNajduZXZlcUQ4NEdpaVNvOFFUZ3BL?=
 =?utf-8?B?MDc5Q2lkWU9sYXBLYWRrZXR3NUVrK3pScnJOUUI4aEV6T2grZU1STzdhamxq?=
 =?utf-8?B?S1FvSUxYWGJpWE9MdlR1Z0lCU1N0aWtkb3E4MFFvZ1ZORHZiT042bzNSckVu?=
 =?utf-8?B?YWJJVERCbFZJZGtUeERTT0IxSUhlR1d0Y3hJZm1vbnFla00yc2tHQVBCNGN2?=
 =?utf-8?B?V3Rva2drRzR0R3lZOERQc3ZhVTRKYzc5V0dBSlI0Y2tieGFWQnJGSGx3Z0h3?=
 =?utf-8?B?ZVFERzExRG50TWtKN3Z5R3ltZWVseHY3cUF1aTZPeUsweC8wR1pYbVJ0NkIx?=
 =?utf-8?B?VVpuNzZRZzl3ZXhiZitPb3pzcVorVkRKbFhLd0NhV05WSVQyNlFETDR4MFlQ?=
 =?utf-8?B?cWtDZkNRZ1NkbzUrcFQ5Uit6bnNkcDVtL2NsT3VaZlZibDhNSE9RK1NiVE9T?=
 =?utf-8?B?SzcxaU5ucGFpOGF6ZzhUTi9FTTlJZ1E5R2JFWjJWU2FtRGNYaWRKMyt0SDhR?=
 =?utf-8?B?eHZqb2l1VGZSWEw5K0t4NHpHMkdJeDE4WjNrWlY2dG1YelkvS0hmNzdCTDRl?=
 =?utf-8?B?RVpwUlYybGplZDkrZTFQMU9kSjZqY1BYb1FuTXVQYmgyQVpCekFzVzJMemty?=
 =?utf-8?B?dEZHZmh3RzhyeVp5anhUNWJlQTNubWV3VWxrY1FLVmpvQjZKRjUxbjR0dUs3?=
 =?utf-8?B?WlByN25LOThlUFRZOXp2bDdkUENoVml0a1JGZS9DZ2tqN3VoSXFORmFxalF2?=
 =?utf-8?B?RkpQV0JiNUxtZ2xaZEJFanU4SGh0S0owUzVtODU2L2JZd2N1MU8vNmREUWt1?=
 =?utf-8?B?MmJyVmIyTGR5L0xxbHNhamN0OUswYTEzeEVSd0NFdHpiNGEvZDcybGRJcnJ1?=
 =?utf-8?B?cFhVMGdicUltMWMxRXhuVzFoY2JiVXZnV29LWTFUSWNMQVVXM2Y2d2NUNCta?=
 =?utf-8?B?Ry93RHl1ZHYxTlIvcW54NDV0cWh6SzNEMUlKNENXMDd3RzFsdmZKdjdQYjNi?=
 =?utf-8?B?MHZ5YjRyRmNWa0ZyS1FtRUJhOHJPWU0yOEc0REZldzZZQy9BdUpqUHp6a25q?=
 =?utf-8?B?ckgzbTVzd25RVXp1cjliYlErbGNHS21lVW82cjJIOE02VWhVcUZjMzFOQSt0?=
 =?utf-8?B?bTY4OEhzM0VTeVB1dHIvOUlWYlNVeEhSSkFibE9GYm9qM01pN3lsK1QyZDJr?=
 =?utf-8?B?cStnOC85TERVTDh6S2xyRGZ5WW5yY2toVnBRNENXdnlCbnBSMDltbXNiZngx?=
 =?utf-8?B?RHlZVDYrak9GMUZGUjZzTHY2QlBtb1F5Yml3QW44UlpSdGhneFJiK0dQMGhw?=
 =?utf-8?B?dU1MdXc0andtQ2d0QXlYOGVxbzJMUG81TEVMSnNLc1phbWxoVy94NXFEUGVx?=
 =?utf-8?B?Um9JVzQ4dXlmUndPbXlBQWQ0eithZ1dWeWdpeVR6eDNjTmNRdmNuQ2NkbGlY?=
 =?utf-8?B?QmEycWpjdWo5OFlYRWJ1L05KbzJiVi92NVVOd1RNZmxva3FRamw1Smxtc0R3?=
 =?utf-8?B?S2FzRGVXNjFrc0FMZnFMTW9zd3RyZ2ZGak50bEVVNHFiN2tuakVLd216dENy?=
 =?utf-8?B?K0xYdDBPWHluNDlJb0phbDdZVjVOQlBzYkp3VzNiS0lsdDltSmR5Zm9keFAz?=
 =?utf-8?B?bmFxN1ZsK0Q5dklKeTVnOW9rVEh5STd5aEFqSTFaNkVUU21QMVdvVGNxMmpm?=
 =?utf-8?B?K2dlRER4KzNydnpaTXgza0pQNkZjUHo4eVoxWmtCOEVvS3JjbTNiS1JXVVpE?=
 =?utf-8?B?R2Z2aFBrUWlSZzh3aitzamZ0ODZwOWtRNWhWbFduekJHN2haRHAxbmQ3Z0hX?=
 =?utf-8?B?MGp5UWtPZis2SlBHeGRBREcvcnR3NithTFRHVlJldzVOcEdiMUJFbDhyakxG?=
 =?utf-8?B?YTQyTUxpSGU1UlNKQ2JNOUNScEtlVXBYMHpyT3ArakNKVjVhNFd3UGVUa1JG?=
 =?utf-8?B?TWlFcTh4NmxCdUlOQ0pnc29hcWlnY3U2ZFJPTmQ5dzM2TXlpVS9jVXBXWUhI?=
 =?utf-8?Q?ZJ1XZH+jIWa8D4W2LvCt8eA=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: b5a89d11-db37-493f-be11-08da01c89aba
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 12:30:32.8769
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: J5gerJdVjPo/Rqd8NPfXul54Zyu8/jC8XJxBMZvYFJ6gETCGfbsXsYrWIqB/FKGhwoyjjWRol9XC8MGQ3gL1SQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB4359
X-OriginatorOrg: citrix.com

If livepatching support is enabled build the hypervisor with
-f{function,data}-sections compiler options, which is required by the
livepatching tools to detect changes and create livepatches.

This shouldn't result in any functional change on the hypervisor
binary image, but does however require some changes in the linker
script in order to handle that each function and data item will now be
placed into its own section in object files. As a result add catch-all
for .text, .data and .bss in order to merge each individual item
section into the final image.

The main difference will be that .text.startup will end up being part
of .text rather than .init, and thus won't be freed. .text.exit will
also be part of .text rather than dropped. Overall this could make the
image bigger, and package some .text code in a sub-optimal way.

On Arm the .data.read_mostly needs to be moved ahead of the .data
section like it's already done on x86, so the .data.* catch-all
doesn't also include .data.read_mostly. The alignment of
.data.read_mostly also needs to be set to PAGE_SIZE so it doesn't end
up being placed at the tail of a read-only page from the previous
section. While there move the alignment of the .data section ahead of
the section declaration, like it's done for other sections.

The benefit of having CONFIG_LIVEPATCH enable those compiler option
is that the livepatch build tools no longer need to fiddle with the
build system in order to enable them. Note the current livepatch tools
are broken after the recent build changes due to the way they
attempt to set  -f{function,data}-sections.

Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
Acked-by: Julien Grall <jgrall@amazon.com> # xen/arm
---
Changes since v3:
 - Place .text.page_aligned ahead of the .text.* catch-all.

Changes since v2:
 - Split the placing of the header code in a separate section to a
   pre-patch.
 - Move Kconfig option to xen/Kconfig.
 - Expand reasoning why .data.read_mostly needs to be moved on Arm.

Changes since v1:
 - Introduce CC_SPLIT_SECTIONS for selecting the compiler options.
 - Drop check for compiler options, all supported versions have them.
 - Re-arrange section placement in .text, to match the default linker
   script.
 - Introduce .text.header to contain the headers bits that must appear
   first in the final binary.
---
It seems on Arm the schedulers and hypfs .data sections should be
moved into read_mostly.
---
Tested by gitlab in order to assert I didn't introduce any regression
on Arm specially.
---
 xen/Kconfig            |  4 ++++
 xen/Makefile           |  2 ++
 xen/arch/arm/xen.lds.S | 41 +++++++++++++++++++++--------------------
 xen/arch/x86/xen.lds.S | 11 ++++++-----
 xen/common/Kconfig     |  1 +
 5 files changed, 34 insertions(+), 25 deletions(-)

diff --git a/xen/Kconfig b/xen/Kconfig
index bcbd2758e5..d134397a0b 100644
--- a/xen/Kconfig
+++ b/xen/Kconfig
@@ -27,6 +27,10 @@ config CLANG_VERSION
 config CC_HAS_VISIBILITY_ATTRIBUTE
 	def_bool $(cc-option,-fvisibility=hidden)
 
+# Use -f{function,data}-sections compiler parameters
+config CC_SPLIT_SECTIONS
+	bool
+
 source "arch/$(SRCARCH)/Kconfig"
 
 config DEFCONFIG_LIST
diff --git a/xen/Makefile b/xen/Makefile
index 5c21492d6f..18a4f7e101 100644
--- a/xen/Makefile
+++ b/xen/Makefile
@@ -273,6 +273,8 @@ else
 CFLAGS += -fomit-frame-pointer
 endif
 
+CFLAGS-$(CONFIG_CC_SPLIT_SECTIONS) += -ffunction-sections -fdata-sections
+
 CFLAGS += -nostdinc -fno-builtin -fno-common
 CFLAGS += -Werror -Wredundant-decls -Wno-pointer-arith
 $(call cc-option-add,CFLAGS,CC,-Wvla)
diff --git a/xen/arch/arm/xen.lds.S b/xen/arch/arm/xen.lds.S
index 743455a5f9..7921d8fa28 100644
--- a/xen/arch/arm/xen.lds.S
+++ b/xen/arch/arm/xen.lds.S
@@ -36,6 +36,9 @@ SECTIONS
        *(.text.unlikely .text.*_unlikely .text.unlikely.*)
 
        *(.text)
+#ifdef CONFIG_CC_SPLIT_SECTIONS
+       *(.text.*)
+#endif
 
        *(.fixup)
        *(.gnu.warning)
@@ -82,10 +85,24 @@ SECTIONS
 #endif
   _erodata = .;                /* End of read-only data */
 
+  . = ALIGN(PAGE_SIZE);
+  .data.read_mostly : {
+       /* Exception table */
+       __start___ex_table = .;
+       *(.ex_table)
+       __stop___ex_table = .;
+
+       /* Pre-exception table */
+       __start___pre_ex_table = .;
+       *(.ex_table.pre)
+       __stop___pre_ex_table = .;
+
+       *(.data.read_mostly)
+  } :text
+
+  . = ALIGN(SMP_CACHE_BYTES);
   .data : {                    /* Data */
-       . = ALIGN(PAGE_SIZE);
        *(.data.page_aligned)
-       *(.data)
        . = ALIGN(8);
        __start_schedulers_array = .;
        *(.data.schedulers)
@@ -98,26 +115,10 @@ SECTIONS
        __paramhypfs_end = .;
 #endif
 
-       *(.data.rel)
-       *(.data.rel.*)
+       *(.data .data.*)
        CONSTRUCTORS
   } :text
 
-  . = ALIGN(SMP_CACHE_BYTES);
-  .data.read_mostly : {
-       /* Exception table */
-       __start___ex_table = .;
-       *(.ex_table)
-       __stop___ex_table = .;
-
-       /* Pre-exception table */
-       __start___pre_ex_table = .;
-       *(.ex_table.pre)
-       __stop___pre_ex_table = .;
-
-       *(.data.read_mostly)
-  } :text
-
   . = ALIGN(8);
   .arch.info : {
       _splatform = .;
@@ -211,7 +212,7 @@ SECTIONS
        *(.bss.percpu.read_mostly)
        . = ALIGN(SMP_CACHE_BYTES);
        __per_cpu_data_end = .;
-       *(.bss)
+       *(.bss .bss.*)
        . = ALIGN(POINTER_ALIGN);
        __bss_end = .;
   } :text
diff --git a/xen/arch/x86/xen.lds.S b/xen/arch/x86/xen.lds.S
index 960c51eb4c..4103763f63 100644
--- a/xen/arch/x86/xen.lds.S
+++ b/xen/arch/x86/xen.lds.S
@@ -87,9 +87,12 @@ SECTIONS
        *(.text.cold)
        *(.text.unlikely .text.*_unlikely .text.unlikely.*)
 
+       *(.text.page_aligned)
        *(.text)
+#ifdef CONFIG_CC_SPLIT_SECTIONS
+       *(.text.*)
+#endif
        *(.text.__x86_indirect_thunk_*)
-       *(.text.page_aligned)
 
        *(.fixup)
        *(.gnu.warning)
@@ -292,9 +295,7 @@ SECTIONS
 
   DECL_SECTION(.data) {
        *(.data.page_aligned)
-       *(.data)
-       *(.data.rel)
-       *(.data.rel.*)
+       *(.data .data.*)
   } PHDR(text)
 
   DECL_SECTION(.bss) {
@@ -309,7 +310,7 @@ SECTIONS
        *(.bss.percpu.read_mostly)
        . = ALIGN(SMP_CACHE_BYTES);
        __per_cpu_data_end = .;
-       *(.bss)
+       *(.bss .bss.*)
        . = ALIGN(POINTER_ALIGN);
        __bss_end = .;
   } PHDR(text)
diff --git a/xen/common/Kconfig b/xen/common/Kconfig
index 6443943889..d921c74d61 100644
--- a/xen/common/Kconfig
+++ b/xen/common/Kconfig
@@ -354,6 +354,7 @@ config LIVEPATCH
 	bool "Live patching support"
 	default X86
 	depends on "$(XEN_HAS_BUILD_ID)" = "y"
+	select CC_SPLIT_SECTIONS
 	---help---
 	  Allows a running Xen hypervisor to be dynamically patched using
 	  binary patches without rebooting. This is primarily used to binarily
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 12:30:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 12:30:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287794.488013 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRvSl-0003jv-TT; Wed, 09 Mar 2022 12:30:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287794.488013; Wed, 09 Mar 2022 12:30:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRvSl-0003jh-P9; Wed, 09 Mar 2022 12:30:43 +0000
Received: by outflank-mailman (input) for mailman id 287794;
 Wed, 09 Mar 2022 12:30:41 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=QNbA=TU=citrix.com=prvs=060736ad3=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRvSj-00039g-Jb
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 12:30:41 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b9c62885-9fa4-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 13:30:39 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b9c62885-9fa4-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646829039;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:content-transfer-encoding:mime-version;
  bh=9n5J/SLlazG5OkZb6XiFpdMz0tZKAWZaKoaZX6MjJqU=;
  b=GUMTuAtdaO4rGxTGrN55r/Pav/tELktoEnL00v5VEZDdD0zsu6ZDhD2I
   iQhKZX6tuG6AH5m2koz8fWJ660Ut0HsvWygc8c0b1hqNMR91N7J29vo5w
   N7sXpDjazdDLG4H9yP6gIUh03zAS56fOs37M7ZEc8yTdLLZlIMNxh6Znl
   8=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65807411
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:cX6ByqufSQXZVZWYaU8iuyRAmufnVNdeMUV32f8akzHdYApBsoF/q
 tZmKWuFMq6NNjbweowgaNm+90wBu57WmtQwHgo4pC9jEn8Q+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jV6
 IuoyyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi94J43emOkcdCBGAiJVZfFe877sPFKw5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AO
 ppBNmY2NXwsZTVxJggLGZgBmtv0qV3wLhFCkVeTtbsetj27IAtZj+G2bYu9lsaxbcdfk1ucp
 2nG13/kGRxcP9uaoRK79Xariv7KjDnMcosYH72l9dZnmFSWgGcUDXU+V1ShqP29oke7UsBYL
 Qof/S9Ghbc23FymSJ/6RRLQiGWfohcWVt5UEus7wAKA0KzZ50CeHGdsZi5MbpkqudE7QRQu1
 0SVhJX5CDp3qrqXRHmBsLCOoluaMyUPMXULYyNCSAIf+sTiu6k6lBeJRdFmeIa3k9n0FDfY0
 z2M6i8kiN0uYdUjjvvhuwqd2nT1+8aPHlVdChjrsnyNvxpZdo6oZquR90nYxq4cNI2YZUSrs
 y1R8ySB19wmAZaInS2LZewCGrC1+vqIWAHhbU5T84oJrGr0pSP6FWxEyHQnfRoybJ5YEdP8S
 BKL4WtsCIlv0GxGhEOdS6a4EIwUwKfpDrwJvdiEP4MVMvCdmOJqlRyChHJ8PUiwyCDAcollY
 P93lPpA615AV8yLKxLsG48gPUcDnHxW+I8qbcmTI+6b+bSffmWJbrwOLUGDaOs0hIvd/lmLr
 IgDbZvWl0kBOAEbXsUx2dRDRbztBSJnba0aVuQNLrLTSuaYMDpJ5wDtLUMJJNU+wvU9ehbg9
 XChQE5IoGcTdlWcQThmnktLMeu1Nb4m9CpTFXV1YT6AhihyCa7yvfx3X8ZmItEaGBlLkKcco
 w8tIJ7bXJyii13vplwgUHUKhNc7JUrx2l7WYXbNjfpWV8cIejElM+TMJ2PH3CIPEjC2pY05p
 bih3RncWp0NW0JpC8O+VR5l5wrZUaQ18A6qY3b1Hw==
IronPort-HdrOrdr: A9a23:xK2uj6thJSs9yEz4KkeBwTH57skClIMji2hC6mlwRA09TyXGra
 +TdaUguSMc1gx9ZJhBo7G90KnpewK5yXcT2/hsAV7CZniahILMFu9fBOTZslvd8kHFh4xgPO
 JbAtND4b7LfClHZKTBkXCF+r8bqbHtmsDY5ts2jU0dNz2CA5sQkTuRYTzrdXGeKjM2YKbQQ/
 Gnl7V6TnebCDwqR/X+IkNAc/nIptXNmp6jSRkaByQ/4A3LqT+z8rb1HzWRwx9bClp0sP0f2F
 mAtza8yrSosvm9xBOZ/2jP765OkN+k7tdYHsSDhuUcNz2poAe1Y4ZKXaGEoVkO0aqSwWdvtO
 OJjwYrPsx15X+UVmapoSH10w2l6zoq42+K8y7uvVLT5ejCAB4qActIgoxUNjHD7VA7gd162K
 VXm0qEqpt+F3r77WvAzumNcysvulu/oHIkn+JWpWdYS5EiZLhYqpFa1F9JEa0HADnx5OkcYa
 VT5fnnlbdrmG6hHjDkVjEF+q3uYp1zJGbKfqE6gL3a79AM90oJjXfxx6Qk7wM9HdwGOtx5Dt
 //Q9dVfYF1P78rhJ1GdZU8qLOMexTwqDL3QRSvyAfcZeg600ykke+D3Fxy3pDvRKA1
X-IronPort-AV: E=Sophos;i="5.90,167,1643691600"; 
   d="scan'208";a="65807411"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=YAGMM5H9N2vt2BURr1GKfuyHuNEVnI76fRYF23v8whSwtazgy9ZjgDgxqZ/hKllupgHdwBdmvYVSbL4J42UqEqv3MtB5lhO2QxyEJpmN/0OVkLBOVetHjfb21UEYrd1spcBUtGvXjvc31oJJBkYUZJ8poJ0292Z38V4AEKzP6oKxg2wak/gotHttIJouzTHm4eW4zmUEKHSQLynznCRFOo4dlGlwgTDKwq32HuQtUxyMpDTXViORswFidiNvRDCX6MILybhwCr/8Am0A7gU510HqsnL8Gix8fVw2upSpJtQ7cUAhqFRzzbwcZpt2FB/Oj/L/o+Z69wYyX3zvDNlXWA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=jfLEQnh7siEH8oE4+sQ6IzMnA97R6ZK1oefy+4uZXVI=;
 b=EdRkYGHBU1JIOBcgotvFDUVRvn+MBy/9Mtg6SajhV1OYg2K0rL50qNYfRcPn/V00u5aHvyVdGOxmBt5tGtl070a55ysxJMl3/0vc+vtWnQ5YRzGl5PA6jKpNbvX9pXm71I0jX9xWnYQ25jasljCJNJOlcGLrYx/0NB/2DTFURuG63GIe3f/H+phiHgNzst+S1lcrN/W6v/z2ohfYxbcYFyeuCN03DQ6ygxV5Jm39gHVu3V4m1gIrCgMuoxhRyK89Vx4TI+ibJ3spbjposiApCBf3FH22wPmGdnfSL2RchN0Qo4dgYrBRqMTU4CCwa7QV19qf60Knivx6wBYe11m0iQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=jfLEQnh7siEH8oE4+sQ6IzMnA97R6ZK1oefy+4uZXVI=;
 b=HVT362XLc3xn2RNNHoYaLKrJcOy1Eapht6iMPQUDpqYZK6k8iDMHP2abN6GJEU8Oz3a7ac1QQ/Jv+wPyBKtcw09L+2F2NCH4X9pUEAi9g8MdDYwmdpmvfanVbD4eRMRO3/A/3HiwXeu+4di6tDkC5cwGUPrkNcPXfprLGyThNls=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Julien Grall <julien@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Jan Beulich <jbeulich@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>,
	Wei Liu <wl@xen.org>, Julien Grall <jgrall@amazon.com>
Subject: [PATCH v4 1/2] xen/build: put image header into a separate section
Date: Wed,  9 Mar 2022 13:28:45 +0100
Message-ID: <20220309122846.89696-2-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220309122846.89696-1-roger.pau@citrix.com>
References: <20220309122846.89696-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO4P123CA0029.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:151::16) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 92357126-b1c5-49fc-377e-08da01c897b1
X-MS-TrafficTypeDiagnostic: BYAPR03MB4359:EE_
X-Microsoft-Antispam-PRVS: <BYAPR03MB4359F983D122F7C5EE92559C8F0A9@BYAPR03MB4359.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(26005)(66556008)(4326008)(66946007)(1076003)(8676002)(6666004)(86362001)(83380400001)(2906002)(38100700002)(66476007)(82960400001)(5660300002)(8936002)(6486002)(6916009)(6506007)(36756003)(54906003)(508600001)(2616005)(316002)(6512007)(186003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?WEd1Q3EyUVlKNjJ1L1hKeTByRW0rWEgrUjBQOWJiVU5TV3dGUjhveFZsY0Jk?=
 =?utf-8?B?UGpRNkc4ZStySU9UQnNsRXBpQ3FJUTJ0UG5JOXppeHNEdTNaLzNtdWNRS3lL?=
 =?utf-8?B?K0VFdUh1S0JmTm5XTWtHcitXK3R1ZXBVdWVKTEZmaFFlWDhaMmhJcXU3ZFlH?=
 =?utf-8?B?MTBRMWN2MVJaYXA4bkZESHRQR1BaTXBBVHQ1cHBUQ1grbUlVYnFGWlZpM3Nj?=
 =?utf-8?B?RXZiYXR4SGY5TDI2a1RSc1d5Y0NKQ0kvc3ZMS3pUTUtQMm9Mcy9HQURucXhK?=
 =?utf-8?B?anNrb1NUMjVaM0l3R2Noc1kvbXRRREY1UVBHQUlsUUl1dlY0WTVvb0JRZ0pL?=
 =?utf-8?B?UDk4VWN3dk1UazZrNHVlMG5TNzZwc1pjRXljNExibnVvQzk2b1AwQlBDV1Jk?=
 =?utf-8?B?RUNoNG9sNElDQmtxSEhmMllRcng3ZzdKaGZBcHZ0ZVlxMkJ2bmZnQjhYUUZJ?=
 =?utf-8?B?V2xiTHVyTytyeFhYV0xvTktOMzFoZC9xNkdHTDJnSGlHYzJ4eTJvWlZIcFc3?=
 =?utf-8?B?WWJPKzdqakdzMU1wUGo3eWdhRlMyNVNwNG53ZmhWR2xyMnRweTBucUFaQWk0?=
 =?utf-8?B?TDVNTHVCeVhuWWY0VzV3cWtqNGNPbFlMN3pJUlczVFNHeDBzVHJGRDY1cHA5?=
 =?utf-8?B?NEVldkh0VFVYY1hraG5ULy9PSGtCWXBaWEo4V1Nmb2FRSEpzRTRaREYzd3Fp?=
 =?utf-8?B?MU55OWR6K29Ka1hYbDBOb1UwNjVNRmR1enRzSlVUWFFYWE9FcDRoVlpXN2h6?=
 =?utf-8?B?eVdSUWEyK0dPMGY5WEoyMU93SFg2ZEUzbDJ2bll3MlNtM3MrZXhTamRzeVJL?=
 =?utf-8?B?R09KVDY0VG13K1FNYks0R0I4b1pUNitvdmJNTkVQUm5ldmY5ZEdiNVRwL0dT?=
 =?utf-8?B?cmlPb3lGK3dnZlNFaU0rWHlDZDZGbVdWeWQwV0xJWTJyT052YnFkcG4xd2dU?=
 =?utf-8?B?T1l1aUJkZ28wU1JVT3NPTGYwd2s2VHpRdWRvd3dvNEpKZXA2TElMSzdmOFJZ?=
 =?utf-8?B?US9GQXhPRVVsVjJudUUrMzFZUFB1dG5Da0wvUFJ6ZUJ6OERBaXh2cVpNcFN0?=
 =?utf-8?B?NU44YzBpSzRwT3E3eEl0VDNJSnh4V2RJd0tXZzk0RXc0ejhJdHdBV2dyY2VF?=
 =?utf-8?B?bGRUL0dPcjZwZ29wRnRGVU95c0ZsaTk3T0IrbVNkQzlVcjAxMFFsd3RXMHkr?=
 =?utf-8?B?TGllNWd0R1JPSDZjKzg5RFdWeE81b2hPN1JaYWI5bWY3MUQ2eDR3VVpoTzZT?=
 =?utf-8?B?ZlNYRU9GemVRYzNLalY4NHB5aEwyYVBsWVJhay8xT0lqZWNibWJIS092UXl6?=
 =?utf-8?B?YWhnTlp5RmZRemNPa1dPbGc1TTFaNnpjQWJWYzUyUzNvMjZacFZMZC9kZTVP?=
 =?utf-8?B?ZGZ6ekE2ZjZkamMrZnl5SVl0VXpOR2xjUzkzbFh2bWNXWU5YMStRWHJuazVR?=
 =?utf-8?B?Umk3NlRLWkU0d3JnT29DUFZjQjgrZ2F4T1VZMjRwMlYvV1pYbm9YQ0NGamp5?=
 =?utf-8?B?RVpMYlFETlZ2SnBGOFVKRTk3R3ExN2RjUjc4ZU03YUo1T3lyZTZ0SzJDWDlS?=
 =?utf-8?B?ZUgwTHpPZlZoanM3NXo4SWYxa0NVSU10Z3FSZUFmRk1YdGd0QjUyNmpMc0VH?=
 =?utf-8?B?VVdPQnNGbVZBNFdFcHpPSGhGY0UzdWw3ZFN4QlFaR0RjRjRFVUJiY2RScmt4?=
 =?utf-8?B?ZjN6Vk5DbHQ2anhUbkxaaTFDV1I2Zlp6Q2k4cEh6UDJzekxDY09hM0FlU2pP?=
 =?utf-8?B?L0svKzl4NWRaZjlyU3Q2dzU5K3l3Q3k5YVF2N0F6TUh0SW9EZmtnWFJLNDk2?=
 =?utf-8?B?RjFXbDJFNlNqN3hlWFF3QWVLMlFrMGdaQkpkMzIyMWRJbm1XU1NIZXpaVGxR?=
 =?utf-8?B?NXdyclJQT1ZYclgzeHR5ZEtHalIwbXJaVE9pZmRjTUdrOUNGMkxmZms3S1Vx?=
 =?utf-8?B?aGVLc3R6eXRVemEwdExWdUV1dU40ZkJPRDNuZDY5amJKL0RiN2dkdklGWWF6?=
 =?utf-8?B?dWNEL2xlMTFoa1N6NmZxTFM4WnA5Ny9UQTdKRXlOajdOeWVXSUorSGpoamE5?=
 =?utf-8?B?UXlGUjdmcDF3Q3l5RnpDVkVJa0lqelBqdDhzWTlmVFpHWjBRVlhhWk5aNHFF?=
 =?utf-8?B?RVBtZ1p4Y3NsSElBV0FFUWNhVnIzQnhnL1RIa0RFNThubk5ucjNYWDk3VFRu?=
 =?utf-8?Q?Akmv2RlHOVyUAXm7VK/DAF4=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 92357126-b1c5-49fc-377e-08da01c897b1
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 12:30:27.7982
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: lrnMYLF+lruE/J5u7p+kRph3ujArnCghrlRc0vXw1U1nqPtScn7M7TRVFRQHZFIsq53PmRKhPUApBz6/vjBHug==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB4359
X-OriginatorOrg: citrix.com

So it can be explicitly placed ahead of the rest of the .text content
in the linker script (and thus the resulting image). This is a
prerequisite for further work that will add a catch-all to the text
section (.text.*).

Note that placement of the sections inside of .text is also slightly
adjusted to be more similar to the position found in the default GNU
ld linker script.

The special handling of the object file containing the header data as
the first object file passed to the linker command line can also be
removed.

While there also remove the special handling of efi/ on x86. There's
no need for the resulting object file to be passed in any special
order to the linker.

Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Julien Grall <jgrall@amazon.com> # xen/arm
---
Changes since v3:
 - Drop .text.cold.* handling.

Changes since v2:
 - New in this version (split from patch 2).
---
 xen/arch/arm/arch.mk        |  2 --
 xen/arch/arm/arm32/Makefile |  3 +--
 xen/arch/arm/arm32/head.S   |  1 +
 xen/arch/arm/arm64/Makefile |  3 +--
 xen/arch/arm/arm64/head.S   |  1 +
 xen/arch/arm/xen.lds.S      |  8 ++++++--
 xen/arch/x86/Makefile       |  5 ++---
 xen/arch/x86/arch.mk        |  2 --
 xen/arch/x86/boot/head.S    |  2 +-
 xen/arch/x86/xen.lds.S      | 11 +++++++----
 10 files changed, 20 insertions(+), 18 deletions(-)

diff --git a/xen/arch/arm/arch.mk b/xen/arch/arm/arch.mk
index 094b670723..58db76c4e1 100644
--- a/xen/arch/arm/arch.mk
+++ b/xen/arch/arm/arch.mk
@@ -23,5 +23,3 @@ ifeq ($(CONFIG_ARM64_ERRATUM_843419),y)
         LDFLAGS += --fix-cortex-a53-843419
     endif
 endif
-
-ALL_OBJS-y := arch/arm/$(TARGET_SUBARCH)/head.o $(ALL_OBJS-y)
diff --git a/xen/arch/arm/arm32/Makefile b/xen/arch/arm/arm32/Makefile
index 3040eabce3..520fb42054 100644
--- a/xen/arch/arm/arm32/Makefile
+++ b/xen/arch/arm/arm32/Makefile
@@ -4,11 +4,10 @@ obj-$(CONFIG_EARLY_PRINTK) += debug.o
 obj-y += domctl.o
 obj-y += domain.o
 obj-y += entry.o
+obj-y += head.o
 obj-y += insn.o
 obj-$(CONFIG_LIVEPATCH) += livepatch.o
 obj-y += proc-v7.o proc-caxx.o
 obj-y += smpboot.o
 obj-y += traps.o
 obj-y += vfp.o
-
-extra-y += head.o
diff --git a/xen/arch/arm/arm32/head.S b/xen/arch/arm/arm32/head.S
index 7a906167ef..c837d3054c 100644
--- a/xen/arch/arm/arm32/head.S
+++ b/xen/arch/arm/arm32/head.S
@@ -120,6 +120,7 @@
 
 #endif /* !CONFIG_EARLY_PRINTK */
 
+        .section .text.header, "ax", %progbits
         .arm
 
         /*
diff --git a/xen/arch/arm/arm64/Makefile b/xen/arch/arm/arm64/Makefile
index baa87655fa..6d507da0d4 100644
--- a/xen/arch/arm/arm64/Makefile
+++ b/xen/arch/arm/arm64/Makefile
@@ -7,6 +7,7 @@ obj-$(CONFIG_EARLY_PRINTK) += debug.o
 obj-y += domctl.o
 obj-y += domain.o
 obj-y += entry.o
+obj-y += head.o
 obj-y += insn.o
 obj-$(CONFIG_LIVEPATCH) += livepatch.o
 obj-y += smc.o
@@ -14,5 +15,3 @@ obj-y += smpboot.o
 obj-y += traps.o
 obj-y += vfp.o
 obj-y += vsysreg.o
-
-extra-y += head.o
diff --git a/xen/arch/arm/arm64/head.S b/xen/arch/arm/arm64/head.S
index 66d862fc81..e62c48ec1c 100644
--- a/xen/arch/arm/arm64/head.S
+++ b/xen/arch/arm/arm64/head.S
@@ -133,6 +133,7 @@
         add \xb, \xb, x20
 .endm
 
+        .section .text.header, "ax", %progbits
         /*.aarch64*/
 
         /*
diff --git a/xen/arch/arm/xen.lds.S b/xen/arch/arm/xen.lds.S
index 08016948ab..743455a5f9 100644
--- a/xen/arch/arm/xen.lds.S
+++ b/xen/arch/arm/xen.lds.S
@@ -30,9 +30,13 @@ SECTIONS
   _start = .;
   .text : {
         _stext = .;            /* Text section */
-       *(.text)
+       *(.text.header)
+
        *(.text.cold)
-       *(.text.unlikely)
+       *(.text.unlikely .text.*_unlikely .text.unlikely.*)
+
+       *(.text)
+
        *(.fixup)
        *(.gnu.warning)
        _etext = .;             /* End of text section */
diff --git a/xen/arch/x86/Makefile b/xen/arch/x86/Makefile
index 9c40e0b4d7..04065a7310 100644
--- a/xen/arch/x86/Makefile
+++ b/xen/arch/x86/Makefile
@@ -1,5 +1,7 @@
 obj-y += acpi/
+obj-y += boot/
 obj-y += cpu/
+obj-y += efi/
 obj-y += genapic/
 obj-$(CONFIG_GUEST) += guest/
 obj-$(CONFIG_HVM) += hvm/
@@ -77,9 +79,6 @@ obj-$(CONFIG_COMPAT) += x86_64/platform_hypercall.o
 obj-y += sysctl.o
 endif
 
-# Allows "clean" to descend into boot/
-subdir- += boot
-
 extra-y += asm-macros.i
 extra-y += xen.lds
 
diff --git a/xen/arch/x86/arch.mk b/xen/arch/x86/arch.mk
index 8e57476d65..c90e56aeab 100644
--- a/xen/arch/x86/arch.mk
+++ b/xen/arch/x86/arch.mk
@@ -117,5 +117,3 @@ endif
 
 # Set up the assembler include path properly for older toolchains.
 CFLAGS += -Wa,-I$(srctree)/include
-
-ALL_OBJS-y := arch/x86/boot/built_in.o arch/x86/efi/built_in.o $(ALL_OBJS-y)
diff --git a/xen/arch/x86/boot/head.S b/xen/arch/x86/boot/head.S
index dd1bea0d10..92d73345f0 100644
--- a/xen/arch/x86/boot/head.S
+++ b/xen/arch/x86/boot/head.S
@@ -9,7 +9,7 @@
 #include <asm/cpufeature.h>
 #include <public/elfnote.h>
 
-        .text
+        .section .text.header, "ax", @progbits
         .code32
 
 #define sym_offs(sym)     ((sym) - __XEN_VIRT_START)
diff --git a/xen/arch/x86/xen.lds.S b/xen/arch/x86/xen.lds.S
index 506bc8e404..960c51eb4c 100644
--- a/xen/arch/x86/xen.lds.S
+++ b/xen/arch/x86/xen.lds.S
@@ -73,9 +73,7 @@ SECTIONS
   _start = .;
   DECL_SECTION(.text) {
         _stext = .;            /* Text and read-only data */
-       *(.text)
-       *(.text.__x86_indirect_thunk_*)
-       *(.text.page_aligned)
+       *(.text.header)
 
        . = ALIGN(PAGE_SIZE);
        _stextentry = .;
@@ -87,7 +85,12 @@ SECTIONS
        kexec_reloc_end = .;
 
        *(.text.cold)
-       *(.text.unlikely)
+       *(.text.unlikely .text.*_unlikely .text.unlikely.*)
+
+       *(.text)
+       *(.text.__x86_indirect_thunk_*)
+       *(.text.page_aligned)
+
        *(.fixup)
        *(.gnu.warning)
        _etext = .;             /* End of text section */
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 12:39:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 12:39:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287813.488024 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRvba-0005C0-Si; Wed, 09 Mar 2022 12:39:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287813.488024; Wed, 09 Mar 2022 12:39:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRvba-0005Bt-PY; Wed, 09 Mar 2022 12:39:50 +0000
Received: by outflank-mailman (input) for mailman id 287813;
 Wed, 09 Mar 2022 12:39:50 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=d6dl=TU=citrix.com=prvs=060aafcb7=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nRvba-0005Bn-5I
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 12:39:50 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 0135b684-9fa6-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 13:39:49 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0135b684-9fa6-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646829589;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=PKVg7PMP+xMVPMk4Xr0teJAyqGhLvdHNRwbCgwBnSjE=;
  b=X9qphh21FSuVLx6+gR6lqIefjwmnbHWskF/2J7Bk4LGWFMgSXlkBlshJ
   QZMrhjQuc281aVgnU93E3psVEOofUjBpiG0oVMRJH2+HdynOsuRk2bpTl
   p2Qdh/aNDgAAtfwkhtiBKJGhwDM2MaXrOoEyi5fCnUxa/RRiaX7zCTTPS
   M=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 68164424
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:llsvi6g6d2xCoKG23lBQG5EMX161BxAKZh0ujC45NGQN5FlHY01je
 htvUWyEMv7YNGahKd1+PIyypEsH65KHzNdnGwZvry4wFyob9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFvc4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YVsXGYyRyKdEajt3QnhGBKNXp6fpAUHq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bklhmwSvUErANRpfbTr+RzdRZwC0xloZFGvO2i
 88xN2o2MkicOUEn1lE/M51mlejx2GDFaB4Dhli/tZd083rjw1kkuFTqGIWMIYHbLSlPpW6Iq
 2SD82nnDxUyMN2E1SHD4n+qnvXIny7wRMQVDrLQyxJxqATNnCpJUkRQDAbl56ni4qKjZz5BA
 xAq3Qtz/etrzW6EH4DFZhOp/2aqnidJDrK8DNYGwA2Kz6PV5SOQCW4FUiNNZbQaiSMmedA5/
 gTXxo20XFSDpJXQECvArenM8VteLABIdTdqWMMScecSDzAPSqkXhwmHcNtsGbXdYjbdSWCpm
 GDiQMTTatwuYS83O0eToAivb9GE/MGhousJCuP/BDzNAuRRPtLNWmBQwQKHhcus1a7AJrV7g
 FAKmtKF8McFBoyXmSqGTY0lRe/1uanbbGeM3QIzQfHNEghBHVb5Lei8BxkkeC9U3jssI2e1M
 Cc/RysKjHOsAJdaRfAuON/gYyjb5aPhCc7kRpjpgilmOfBMmPu81Hg2Pya4hjm1+GB1yP1XE
 crLIK6EUCdBYYw6nWXeegvo+eJyrszI7TiIHs6TItXO+ef2WUN5vp9eaQrQNL9ltP3YyOgXm
 v4GX/a3J9xkeLWWSkHqHUQ7cTjm8VBT6UjKlvFq
IronPort-HdrOrdr: A9a23:zebVGKOmh4YvccBcTs2jsMiBIKoaSvp037Eqv3oedfUzSL3+qy
 nOpoV+6faaslYssR0b9exoW5PwJE80l6QFgrX5VI3KNGKN1VdARLsSi7cKqAeAJ8SRzIFgPN
 9bAspDNOE=
X-IronPort-AV: E=Sophos;i="5.90,167,1643691600"; 
   d="scan'208";a="68164424"
From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>
Subject: [PATCH 0/2] XSA-398 Followup
Date: Wed, 9 Mar 2022 12:39:34 +0000
Message-ID: <20220309123936.16991-1-andrew.cooper3@citrix.com>
X-Mailer: git-send-email 2.11.0
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

Andrew Cooper (2):
  x86/CET: Remove XEN_SHSTK's dependency on EXPERT
  Changelog: Add __ro_after_init and CET

 CHANGELOG.md         | 6 ++++++
 xen/arch/x86/Kconfig | 4 ++--
 2 files changed, 8 insertions(+), 2 deletions(-)

-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 12:39:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 12:39:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287814.488035 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRvbc-0005RY-4p; Wed, 09 Mar 2022 12:39:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287814.488035; Wed, 09 Mar 2022 12:39:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRvbc-0005RR-0e; Wed, 09 Mar 2022 12:39:52 +0000
Received: by outflank-mailman (input) for mailman id 287814;
 Wed, 09 Mar 2022 12:39:51 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=d6dl=TU=citrix.com=prvs=060aafcb7=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nRvba-0005Bn-Ul
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 12:39:50 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 027e3d6e-9fa6-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 13:39:50 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 027e3d6e-9fa6-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646829589;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=WF7VI67OSsAZQRpJlsfAPEjrr4Q7HY425itKcbMGzsw=;
  b=eT3mpT0VSkFl7AldrtKBAsUSCncV1ft+77yxb54DquAwSOaD80jRROz+
   G6M1v5XK1C6sbmsuOWA03vyp/s8kDAf8WFqRNg6rxHOYpdW5jto+2oPFS
   VkVBrojF0wVaWD0G7bI96pBgXua9HjnuZpakx2FZSvrOcFFDMQSIinJOd
   8=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 68164423
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:DlQqCagHwgaPlooMdAndXhxkX161ZBAKZh0ujC45NGQN5FlHY01je
 htvXD+AOqvbazSje4p0OYu1ox5UuJTdztNkQAs9qCA3RC8b9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFvc4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YVsXGYyRyKdEajt3QnhGBKNXp6fpAUHq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bklhmwSvUErANRpfbTr+RzdRZwC0xloZFGvO2i
 88xN2o2MkicOUYn1lE/DL47gbyWh1rEWn5mlFeb/IoZzHeDw1kkuFTqGIWMIYHbLSlPpW6Ho
 krW8mK/BQsVXPS94zeY9nOnhsfUgDj2HokVEdWQ5vNsxVGe2GEXIBkXTkeg5+m0jFakXNBSI
 FBS/TAhxZXe72TyEIO7BUfh5ifZ4FhMALK8DtHW9inR9I31vlbaX1EmYW8YUOUopZAuaxwTg
 wrhc8zSORRjt7icSHS4/7iSrC+vNSV9EVLudRPoXiNevYC9/dhbYgbnC486TfXr1oGd9STYn
 mjSxBXSkYn/miLiO0+T2VncywyhqZHSJuLezlWGBzn1hu+ViWPMWmBJ1bQ5xasYRGp6ZgPY1
 JThpyR4xLpQZX1qvHbRKNjh5Jnzu5643MT02DaD5aUJ+TW34GKEdotN+jx4L0oBGp9aJWG2P
 hOJ6V8NuME70J6WgUlfOdLZ5yMCl/SIKDgYfqqMMoomjmZZL2drAx2ClWbPhjuwwSDAYIk0O
 IuBcNbEMJrpIf8P8dZCfM9EieVD7nlnnQv7HMmnpzz6gev2TCPEEt8tbQrRBt3VGYvZ+W05B
 f4EbJDUo/ieOcWjChTqHXk7dglbcyJkWcio96S6tIere2JbJY3oMNeJqZtJRmCvt/g9ejvgl
 p1lZnJl9Q==
IronPort-HdrOrdr: A9a23:X1x/mKBMhCGLJBblHemU55DYdb4zR+YMi2TC1yhKJyC9Ffbo7v
 xG/c5rsyMc5wxwZJhNo7y90ey7MBbhHP1OkO4s1NWZLWrbUQKTRekIh+bfKn/baknDH4ZmpN
 9dmsNFaeEYY2IUsS+D2njbL+od
X-IronPort-AV: E=Sophos;i="5.90,167,1643691600"; 
   d="scan'208";a="68164423"
From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Jan Beulich
	<JBeulich@suse.com>, =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?=
	<roger.pau@citrix.com>, Wei Liu <wl@xen.org>
Subject: [PATCH 2/2] Changelog: Add __ro_after_init and CET
Date: Wed, 9 Mar 2022 12:39:36 +0000
Message-ID: <20220309123936.16991-3-andrew.cooper3@citrix.com>
X-Mailer: git-send-email 2.11.0
In-Reply-To: <20220309123936.16991-1-andrew.cooper3@citrix.com>
References: <20220309123936.16991-1-andrew.cooper3@citrix.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
---
CC: Jan Beulich <JBeulich@suse.com>
CC: Roger Pau Monné <roger.pau@citrix.com>
CC: Wei Liu <wl@xen.org>
---
 CHANGELOG.md | 6 ++++++
 1 file changed, 6 insertions(+)

diff --git a/CHANGELOG.md b/CHANGELOG.md
index 83d85fad5bbc..577517383ec9 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -6,6 +6,12 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/)
 
 ## [unstable UNRELEASED](https://xenbits.xen.org/gitweb/?p=xen.git;a=shortlog;h=staging) - TBD
 
+### Added
+ - __ro_after_init support on x86, for marking data as immutable after boot.
+ - Support for Xen using x86 Control Flow Enforcement technology for its own
+   protection.  Both Shadow Stacks (ROP protection) and Indirect Branch
+   Tracking (COP/JOP protection).
+
 ### Removed / support downgraded
  - dropped support for the (x86-only) "vesa-mtrr" and "vesa-remap" command line options
 
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 12:40:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 12:40:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287815.488046 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRvbq-0006cQ-FI; Wed, 09 Mar 2022 12:40:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287815.488046; Wed, 09 Mar 2022 12:40:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRvbq-0006bB-8y; Wed, 09 Mar 2022 12:40:06 +0000
Received: by outflank-mailman (input) for mailman id 287815;
 Wed, 09 Mar 2022 12:40:04 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=d6dl=TU=citrix.com=prvs=060aafcb7=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nRvbo-0005Bn-NV
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 12:40:04 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 098d7ac6-9fa6-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 13:40:03 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 098d7ac6-9fa6-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646829603;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=Eg/ifCx2kE6sAtZ1kPwmImh59SmF+XQTuUTtEX5um+U=;
  b=FBIwznuJJzEI2laV2mso3cY5DWyRcx2q2NGRNLvZqsyr5rVOGvkjQwfH
   VZsPHI5zF2b5lk9M6Spc1KoC9cS7o3dqEndxTttG8SLAh7i4Hdx6IDwgu
   SaCByw+OwKH/ARz3UJJq9h13Z0XldTCuBpask+tJagSPKwEUppH1L1InW
   c=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 65285147
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:p9N2jKvYBkC5g71x9odXgq5tmufnVFFeMUV32f8akzHdYApBsoF/q
 tZmKTjVP/jcajHwL9x2OYXgoU0OvZWHzNJqHVdqqClmEH4Q+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jV6
 IuoyyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi8xHoSWm88PCyJ/EhNdZYF46K/mHHOW5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvllJyz3DAOlgapfEW6jQvvdT3Ssqh9AIFvHbD
 yYcQWQyNkSdOkEQUrsRIM8RmN6vlnfvT2RVsGqX+akYwlXuzjUkhdABN/KKI4fXFK25hH2wu
 Wbu72n/RBYAO7S36xCI73atje/nhj7gVcQZE7jQ3u5nhhify3IeDDUSVECnur+ph0imQdVdJ
 kcIvC00osAPGFeDF4enGUfi+Tjd40BaC4E4//AGBB+l0or9uQWyFDA/aT9zS4QKit8mZAEh/
 wrc9z/2PgBHvLqQQHOb076bqzKuJCQYRVM/iT84oRgtuIe6/txq5v7bZpM6SfPu0IWpcd3l6
 23S9EADa6MvYdnnPklR1XTOmHqSq5fAVWbZDS2HDzv+vmuViGNIDrFECGQ3D94ddO51rXHb5
 RDofvRyCshUU/lhcwTXHI0w8EmBvartDdElqQcH82Md3zqs4WW/Wotb/StzIkxkWu5dJ2O3P
 xGP41MNuMMNVJdPUUORS9jhYyjN5fK8fekJq9iONoYeCnSPXFTvEN5Sib64gDm2zRlEfVAXM
 paHa8e8ZUv2+ow8pAdas9w1iOdxrghnnDu7bcmik3yPjOrPDFbIGOxtGAbfMYgEAFas/Vy9H
 yB3bJDRlX2ykYTWP0HqzGLkBQtTfCZhWsyu9ZA/myzqClMOJVzNwsT5mdsJE7GJVYwJyY8kI
 lnVtpdk9WfC
IronPort-HdrOrdr: A9a23:5vsT0a+8jJIFOwkZr7duk+FRdb1zdoMgy1knxilNoENuH/Bwxv
 rFoB1E73TJYW4qKQkdcKO7SdK9qBLnhNZICOwqUYtKMzOW3FdAQLsC0WKm+UyYJ8SczJ8X6U
 4DSdkYNDSYNzET4qjHCUuDYrAdKbK8gcOVbJLlvhJQpHZRGsNdBmlCajqzIwlTfk1rFJA5HJ
 2T6o5svDy7Y0kaacy9Gz0sQ/XDj8ejruOqXTc2QzocrCWehzKh77D3VzKC2A0Fbj9JybA+tU
 DYjg3C4Lm5uf3T8G6R64aT1eUYpDLS8KoDOCW+sLlUFtwqsHfqWG1VYczNgNnympDs1L9lqq
 iIn/5qBbUI15qYRBDJnfKq4Xir7N9m0Q6f9XaIxXTkusD3XzQ8Fo5Igp9YaALQ7w46sMh7y7
 8j5RPvi3N7N2K0oM3G3am9a/iqrDvFnVMy1eoIy3BPW4oXb7Fc6YQZ4UNOCZ8FWCb38pouHu
 ViBNzVoK8+SyLSU1nJ+m10hNC8VHU6GRmLBkAEp8yOyjBT2HR01VERysATlmoJsJg9V55H7e
 LZNbkArsA5cuYGKaZmQOsRS8q+DWLABRrKLWKJOFziULoKPnrcwqSHkondJNvaC6Dg4KFC5q
 gpCmkoylLaU3ieePGz4A==
X-IronPort-AV: E=Sophos;i="5.90,167,1643691600"; 
   d="scan'208";a="65285147"
From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Jan Beulich
	<JBeulich@suse.com>, =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?=
	<roger.pau@citrix.com>, Wei Liu <wl@xen.org>
Subject: [PATCH 1/2] x86/CET: Remove XEN_SHSTK's dependency on EXPERT
Date: Wed, 9 Mar 2022 12:39:35 +0000
Message-ID: <20220309123936.16991-2-andrew.cooper3@citrix.com>
X-Mailer: git-send-email 2.11.0
In-Reply-To: <20220309123936.16991-1-andrew.cooper3@citrix.com>
References: <20220309123936.16991-1-andrew.cooper3@citrix.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

CET-SS hardware is now available from multiple vendors, and the feature has
downstream users.  Enable it by default.

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
---
CC: Jan Beulich <JBeulich@suse.com>
CC: Roger Pau Monné <roger.pau@citrix.com>
CC: Wei Liu <wl@xen.org>
---
 xen/arch/x86/Kconfig | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/xen/arch/x86/Kconfig b/xen/arch/x86/Kconfig
index 83d0f317ecf9..06d6fbc86478 100644
--- a/xen/arch/x86/Kconfig
+++ b/xen/arch/x86/Kconfig
@@ -117,8 +117,8 @@ config HVM
 	  If unsure, say Y.
 
 config XEN_SHSTK
-	bool "Supervisor Shadow Stacks (EXPERT)"
-	depends on HAS_AS_CET_SS && EXPERT
+	bool "Supervisor Shadow Stacks"
+	depends on HAS_AS_CET_SS
 	default y
 	---help---
 	  Control-flow Enforcement Technology (CET) is a set of features in
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 12:59:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 12:59:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287829.488056 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRvun-0000Iv-21; Wed, 09 Mar 2022 12:59:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287829.488056; Wed, 09 Mar 2022 12:59:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRvum-0000Io-VC; Wed, 09 Mar 2022 12:59:40 +0000
Received: by outflank-mailman (input) for mailman id 287829;
 Wed, 09 Mar 2022 12:59:39 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=gSYI=TU=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRvul-0000Ih-1T
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 12:59:39 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id c66f7b2a-9fa8-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 13:59:37 +0100 (CET)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur03lp2055.outbound.protection.outlook.com [104.47.9.55]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-41-lHRD8MfFP66uD_nL3zMIpg-1; Wed, 09 Mar 2022 13:59:36 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PAXPR04MB8720.eurprd04.prod.outlook.com (2603:10a6:102:21f::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Wed, 9 Mar
 2022 12:59:34 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Wed, 9 Mar 2022
 12:59:34 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c66f7b2a-9fa8-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646830777;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=sRHmyOeXY3QNuRZ1mSvfumwXSHmstvxjzZU7oIlaH7c=;
	b=DU9kzFEXrI2opYeaiQPnI0D0RoE5ln4EYTr7MhQaaiDw5TxS0OjnhMpNCljdSO16JxqMei
	S5lwn77/D/f7w5n5iaiH3y6ILOCa8+Xw2CW/ImMKxF/WcdQ9k7YhRO9WUlDEpQ9N5zS0wZ
	oLWQU5hBb9ntADn8wrMQ8xjwddB//yo=
X-MC-Unique: lHRD8MfFP66uD_nL3zMIpg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Vl9/pH1U0DZv5SI9HUdaFY/QVMMba+j4V/48piyHIy8inPInhJ0gOBsoOGfUqP8TnQpdoG+lzVIHoxNKlEFuU5xWO8v01BLdXaiVwesnGIFpfKn/S8PBOzyumaDRU4kJQ9KpT7ePMP5sAe12Nwp4KDcHgAPa/TnjtCrK1Kd4Xhglk2x/jVlWIQi4Miw8oEpq0wgkxCylqVqhPlfKKkk2gYlhm+l/C1k/DNi4pQwCfE0C7LXG+djglM5mz+yGsGGDK+2NamT5UmurEanNO99l+jr3e9oZepgLmuIZHCzgAoOKzUPgaLhwn0hE+eiTWTwS8fqR75anRuil+4hy03/c/w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=7fHboFt1H1F2EmKeBCsatrn7S9iPmBTgvX5W9kJE2WM=;
 b=UUg7qbR7E579TjOYx7xX5319oaF0keX7/hk03TXCvbMXQkYGfyb0kZj/s/70fS4n0N2n5W7L1Qc6c+vDAiWel9SHNE41X3cJTQdS8tuQ94cq7Ia4RvpE1SNmGUCUKjNN1o/YoyB6IxPqAK2QPT0YDSpH1lRL0xJ4b6OX08t37R9vDZ3L/FrsbDtFCMPM7nPMUDW/YilDQywyaWjtEF4+DIV8cu/jKpzj/VXriQ28JySjo5t4V/swZuqVPWc8NU3qC/j8Bb24c8E9TnJfPZRbkb/0sGdKexmowgJxzgZS6pcQG/Ttk05zCpBq7wWotebJV1aCemZ7lIoKxX/hGdnK4Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <39454ee5-4d29-995c-859a-f058d3383295@suse.com>
Date: Wed, 9 Mar 2022 13:59:31 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v4 2/2] livepatch: set -f{function,data}-sections compiler
 option
Content-Language: en-US
To: Roger Pau Monne <roger.pau@citrix.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Julien Grall <jgrall@amazon.com>, xen-devel@lists.xenproject.org
References: <20220309122846.89696-1-roger.pau@citrix.com>
 <20220309122846.89696-3-roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220309122846.89696-3-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6P192CA0068.EURP192.PROD.OUTLOOK.COM
 (2603:10a6:209:82::45) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 02183ce0-7753-4ccc-08a2-08da01cca8c5
X-MS-TrafficTypeDiagnostic: PAXPR04MB8720:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB87205A4A5CB7C74FB5F90D8EB30A9@PAXPR04MB8720.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	rmt4RP0xDC2M9DQCR3luyO4yx2wdrlleiNdTHtoD4Hd5QUrNvj3Cz5TmDLFtZb77hKs5itnGxEWltMA6YX5/hBAbvy2NV6KyBCIXG5okgtgyyhzb4Aj6NaKGpFAVz9WsLwYB2MyZX9Wady/7oh98NWPibrS39Y0/A++/IAqay0nmwyMH48k2HXERc/XYgtgrfSH+1fGQUjFpdkD5CWCtOMH26BNp2vg7mPD2WGvZesqwVV88PHfYfDp9TvQ0xY1sdYszeNuiKgTvk+A98kkGUD68dePDDkNyZEBezNeqyIHwUMuADZoCRbq2HXTtvV+i5fmemFiKckyAkNCMvOu3mUYgJVNvea0SBmIcGwyxrC669jPuRYwVlaUFHdRs/1Uif6b832yXNU5QRMeNUqxowmbz5YAp1GIBSzkFuxH/u3V/CKXuWufopDHf9CQgktxs6n6Y5SlUCtT/3Q3tbgJzt+AAy5qtowOWIBAnTc+q+Y/IENHIRXlAx3u1AoHUA2Ip4/njrdI9anyq3qtuNNVD9IIo6UDY81aap6ty1E+4p+nQn+8MYOqnQFRnItVQr63kKoZji9OA73ETVwmpbhDaEydxABf4eWOZTlBVaI8Vx6QP0fwPn/51fD8E/sGzbU0YQCUfHH8W0SXbIykFCjFr9qldUq7ZjSnKv4eF7AyNGD4EBeq81LXPwNWh0A9b99JyTANJNDqsHY/WXab2J4MGTIKpL8utN/Mzcvguuglc+zU=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6486002)(2616005)(31696002)(86362001)(316002)(6916009)(54906003)(2906002)(38100700002)(508600001)(8936002)(4326008)(7416002)(31686004)(5660300002)(8676002)(66556008)(66476007)(66946007)(6666004)(6506007)(6512007)(83380400001)(36756003)(53546011)(26005)(186003)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?8cl1ATJA41wreBNSfnOoHUekajKCDzfkrhfxMvCJIPsNfYR4MSfG6EMwCiDj?=
 =?us-ascii?Q?431h6ua1JXIqXWuzha/W1RvWAlsswQX8C+ColYms3YlCKsQl9B3BFtggtXKi?=
 =?us-ascii?Q?NDjBYlXizUw+pITAIXobMuWJNRkFiILRo8JHhKSwUx16h+FNxvZe+7P7P6PV?=
 =?us-ascii?Q?ZpqRxW34gRbi/TZe8QxiAhClvc6HcoCOKVgUTuXw/AJqs/zlin0xYlOH/UaG?=
 =?us-ascii?Q?bhNm4Oq98ALkIHyZeG5mNm8Hc6O5XbgxwPlDDkwKeqM4ZoJyvYtR4xaGamxk?=
 =?us-ascii?Q?Xea88PqZyKOW+HMxtuDNV9boeA6DZH7hzDf92pSq/dZQGCCW2nmXbFx3H0wZ?=
 =?us-ascii?Q?eLnVBy8hbFnLB2E95XqNfzljg7h9HvyJ5ZfEaNptUgB/eQVZW+GXvSORchD0?=
 =?us-ascii?Q?OnJ0TeQtqXAQxSlXCCVRpjjDn/kBsScEmwH38iHrBbK093wcxTIyIGJZ0xst?=
 =?us-ascii?Q?Kw7+43t88w9Ztp5xrq6VhYF+Ia+YBhqZrO55iPXhJp1q9COsxeuajXE9dGzq?=
 =?us-ascii?Q?NonkgJcXJaoeRr1qcgeL5CzzKN2rar/206b20is5rfifq4Ans7rAvN0uisEV?=
 =?us-ascii?Q?XabNrtIrXt6r61L2yBcur8nLg/tjnrkwz6NCUkYQ8F2eRILsXrIAE78RSdzF?=
 =?us-ascii?Q?m/vw3mYlwS5tr4etjS5AgNJ6OeOGZSIR2YZNqgg4Hb0BQKzIyz+tjMjRrV5N?=
 =?us-ascii?Q?u3KTEpI+VKKecm2Jt/0rOmhzlJxutVyHZKuWOzHoKBjs+Jyuwetp63PikflA?=
 =?us-ascii?Q?5Wc98naJv+XDsis69yOpJ2XJ/NFQBD1tPjacYjMoUaD/xKQ09oRQTLKspqxQ?=
 =?us-ascii?Q?UFiNflLW5FgLbOgTVBPkOgVR+7Y96w79BpWsAr3GWxFZcWP7SlVeZVpISrme?=
 =?us-ascii?Q?QmRBicFcqY/sNXMmKrBbHFKh6qWvqtYwmOsWOmbGRybcZ+WiDtMsiJG2Z585?=
 =?us-ascii?Q?Z9GfLbA8yeN+x0ldqRIqvdvrR2QFj89QmPPhZb6TNjdMR0Y7NV8mFQPmb0FS?=
 =?us-ascii?Q?NLhJOpAm8Bvlw2H9iOZWhWqdP4pnBjOmq8etnFr/XF78DRhhxHQIjYunHOZC?=
 =?us-ascii?Q?pHMuZz/YvnBLRc18JXkfVxFuwwsFbB3jIwvKNTadQd05hnQzhtRNZ1OgCThm?=
 =?us-ascii?Q?YjICDthkGSjKxRxO+zyEgtNBRDUYtBBLdn5+9SWUbvM5CrQZv8tG7EwRVta2?=
 =?us-ascii?Q?/h0anjBM6r4AKP3XsBX6B85b8hwXBT16hQkBv/eV+ZXGYkpkOLM/f30d4ZZL?=
 =?us-ascii?Q?k9iwq8KUcDjTyDQ/f99Xv7M2TimA6YWu7+mkBsqXExLh0E+F64MqK/dtMTVB?=
 =?us-ascii?Q?Y+BQEM4LReZ1bTrRKsFMcHqwZwCnGjS5lG4ItWchXzWW5uTI4QIIUOuSIVeK?=
 =?us-ascii?Q?yQXFDzyFFumRbExLQ84PZOMHFMOExsyxOaI5/Wfk64DPvOL8LaVxkaEulhFd?=
 =?us-ascii?Q?VkbJWEtu0J4/NCdJNohese5u0uYjFVWey07SJiBJl8Jy8OIodbZvyyQ9LPgB?=
 =?us-ascii?Q?Eh6LV9dZdoLPkQhBO8E4cXsKs8UIjtwN8lomxHEr6QuVT+LpIOD/vLT9SwVM?=
 =?us-ascii?Q?eTaKZB9lqGRHyTBl/uZ2bHITiGaQzA1CR2Gj857ViksSKITktfmxTfDOtvdx?=
 =?us-ascii?Q?tB64KAK3f4pxKflJuWBfo7w=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 02183ce0-7753-4ccc-08a2-08da01cca8c5
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 12:59:34.4662
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Ko5bv0OPMFRLhHVc9mryOzden+vC1hJ82MIt9lvzt/P7v2L9QQRNUiwEzQkECHFScI/5d+/QpIg6xXrWD+ZTsg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB8720

On 09.03.2022 13:28, Roger Pau Monne wrote:
> If livepatching support is enabled build the hypervisor with
> -f{function,data}-sections compiler options, which is required by the
> livepatching tools to detect changes and create livepatches.
>=20
> This shouldn't result in any functional change on the hypervisor
> binary image, but does however require some changes in the linker
> script in order to handle that each function and data item will now be
> placed into its own section in object files. As a result add catch-all
> for .text, .data and .bss in order to merge each individual item
> section into the final image.
>=20
> The main difference will be that .text.startup will end up being part
> of .text rather than .init, and thus won't be freed. .text.exit will
> also be part of .text rather than dropped. Overall this could make the
> image bigger, and package some .text code in a sub-optimal way.
>=20
> On Arm the .data.read_mostly needs to be moved ahead of the .data
> section like it's already done on x86, so the .data.* catch-all
> doesn't also include .data.read_mostly. The alignment of
> .data.read_mostly also needs to be set to PAGE_SIZE so it doesn't end
> up being placed at the tail of a read-only page from the previous
> section. While there move the alignment of the .data section ahead of
> the section declaration, like it's done for other sections.
>=20
> The benefit of having CONFIG_LIVEPATCH enable those compiler option
> is that the livepatch build tools no longer need to fiddle with the
> build system in order to enable them. Note the current livepatch tools
> are broken after the recent build changes due to the way they
> attempt to set  -f{function,data}-sections.
>=20
> Signed-off-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>
> Acked-by: Julien Grall <jgrall@amazon.com> # xen/arm

Reviewed-by: Jan Beulich <jbeulich@suse.com>



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 13:01:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 13:01:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287834.488068 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRvwZ-0001gT-Dd; Wed, 09 Mar 2022 13:01:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287834.488068; Wed, 09 Mar 2022 13:01:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRvwZ-0001gK-AR; Wed, 09 Mar 2022 13:01:31 +0000
Received: by outflank-mailman (input) for mailman id 287834;
 Wed, 09 Mar 2022 13:01:30 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=gSYI=TU=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRvwY-0001gE-2n
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 13:01:30 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 085deb7e-9fa9-11ec-8539-5f4723681683;
 Wed, 09 Mar 2022 14:01:29 +0100 (CET)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur02lp2053.outbound.protection.outlook.com [104.47.4.53]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-14-MBHgqm86Ng6zHfiG9q0ytg-1; Wed, 09 Mar 2022 14:01:26 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM6PR04MB6757.eurprd04.prod.outlook.com (2603:10a6:20b:fb::33)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.16; Wed, 9 Mar
 2022 13:01:25 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Wed, 9 Mar 2022
 13:01:25 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 085deb7e-9fa9-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646830888;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=XQX5kbC3fuZVqVj9z99ObU3Hu1iNiLCQjM5+eovw6fA=;
	b=CI5WoN9jt4NjTrsV1nJqctLWwb7uePGOShL9QGgZJB94fCb4nO+m2FiXMYwvVfG5JNVgrU
	S0jvdWfJ+7/VkQ4z+am0el0ALHOTqLG2si/7o7FT2kxBLashAspWtRGKHAg12D+rUvGtTB
	3e9vlYx6UBE+UEMSzfYMQBUkYnUP3LI=
X-MC-Unique: MBHgqm86Ng6zHfiG9q0ytg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Skjn/SlC5qvvkrb2kysyMMoPKr1rtH52oifecTQ38mGk9gtzcssDY2c9uz240Dd3SCzYpzZzSSUNhUp+4JM99CWFCU9inHz7wSpxTF1db79ZNzpFfPpOpZBrjiNefglUc5cJeKm9f3tjSU1uHEj07EKOqwwDrsQmF6Ss+ByARq3S5Q+qaVNL5AnvTZcA+1TvYzpoEd1KSnSrSthk/D/we11V+6RiU4FvfrriT3ODWdeqG9CAo7iC6nhDUb0ryWdsxHqeDIHui1CeztpJlxHZ9cXmMffMLEw04yr6x3XYjLxetuN7VXWFGtVLM6ewmrJOcPCtdQY0eHHc0C5Swl4s8A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=4zv6pipt6bohpm2pccPj4I9JydfDlQq9W59tUKYPRG4=;
 b=Nr0x0eblPpZ714p1sbi9C+BDDVxIbir89nLrLc205ISZXgxvD1rZz7V2WFxjBx5TFy4lWz3rFPro1QgDg3RjzmVO1QK2r7UcDklVv+1KNGkY7D2SEwTOogN+SoD8WPKcpZnWKgMbnMoWR5w/xX6Il8tF2FKh5oMW7JZg/F2SdDsI36VRRLhB/xtHPPcZHMbgAfjse9pn5FqfDjUMWZd6zVqcmMCcaSowest19ZWliVRXXA46TtbZqnrYLi1H4Cj9JwIykdDze1gfrlVN6H1OGxUQylHoy36pqRxiHKY1yMiXTo5qxZfRSI/t9wH5RLtEira14sRlgtEePsDve1W71g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <f5dcc752-20e8-91f3-54b1-f356b33c9721@suse.com>
Date: Wed, 9 Mar 2022 14:01:23 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH 1/2] x86/CET: Remove XEN_SHSTK's dependency on EXPERT
Content-Language: en-US
To: Andrew Cooper <andrew.cooper3@citrix.com>
CC: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Wei Liu <wl@xen.org>, Xen-devel <xen-devel@lists.xenproject.org>
References: <20220309123936.16991-1-andrew.cooper3@citrix.com>
 <20220309123936.16991-2-andrew.cooper3@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220309123936.16991-2-andrew.cooper3@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR04CA0071.eurprd04.prod.outlook.com
 (2603:10a6:20b:48b::20) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: e86c8267-dae6-4c19-28cc-08da01cceaf9
X-MS-TrafficTypeDiagnostic: AM6PR04MB6757:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB6757132C39FCE6E3C5A950A3B30A9@AM6PR04MB6757.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	IzqjJ4AoQbgNcO1u2MTaLvEfUWVidLBjZsvuVLBBEpNqAdu0mEa/3Oh3zahPRaOXPqg4pdK5bcmDb5J6RHMUtHMsSZ3isLEoNrKNDex2bHgpQamOuOaYPiavs3l6S8kbW3h+MIwRzWbbRHrk7gX29lvH/X0JYqqt6dmvNgx5Frzp2T4DL4eRntLpX5G5Voy/RVJ7jnc1VLdueJwleWwHCoMXCisBvUcAGmAbZnUA7QCxBdN/1aGdqV0mvd3OXtGypMDk+p+C8IqGZGrru0lNCl8DIpESgIGusIwGXIWTUv6L46bQeoGMh6p5UzJ57r46dUSzXqCFso4yNVSOgXQAnbyOI/Odj9FCFCtcjZRmCpZ5icwAoEbllF6vLaP0flrr26w6neIzEleWZ8yyVCUZJ/PAjMEG8Fx8HlFVBQ2alRllQB8ApAvt+MLJPN63BQL8IWOCh9C4Orf/YoHRnjXDgcbGQu/yU3EONZWiWhyrWLVLBY7aZVNwf2ZBvva2jzBzbfWTcQ3CJwwD9yCCPltI5LW8GlApuU5jZAC0FZhnM5qm1qq60fG7VSAbZDl5jDvwsf0SjveEUD90twvF5hANWQCs4R9+bIXUojL13GWnt6uVlLlA/jhjJwLrVlLdAJVBUrHZJhX7yU3fnI2SJqIfYW5Yz0YxPhAYGqcG8HMh8Imzzf9hjaIciNZa102RdbAI9rnXZbNEIfK7rJrWRItyy+iysvvWkaSCkbqwbb2a2mzHi+h6/bvuRAvQK0P8t3j3
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(8936002)(5660300002)(36756003)(38100700002)(2906002)(4744005)(66476007)(66556008)(66946007)(316002)(6916009)(508600001)(54906003)(31696002)(86362001)(6486002)(31686004)(6506007)(186003)(6512007)(26005)(2616005)(53546011)(4326008)(8676002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?3XzXAdQJhxeQKVJdD7eOPefhazjqMyjH4wg4GRZlDTUNZdu5Kyc9IkUfATyx?=
 =?us-ascii?Q?hxe4zt10Pevlln9PUjHrwEsnqcEwsRBCUa/h8Cqm/9sRp3ofMoY+RC7xRfps?=
 =?us-ascii?Q?F6AIaMC3gl7t2ortVdxd+y6aywPZeHLncEWL4NrbPrcQL2vHXrSD7kle5LBt?=
 =?us-ascii?Q?pXlrc77jKoQIBHSBo3acE0Mp2zqdHzWjmBoUaOnaKD6Wvtha/l9czjoOxvKV?=
 =?us-ascii?Q?5pyPHwvrMbcNGAukx9AM2zrHKJ5IGDJ8gpZJrmjpUDsSqy56KHYQiX8LSYoo?=
 =?us-ascii?Q?XOJm7MdzPiQgtOAJH9CWcTg0DQ7mG97Gtov7iOyB7fwl3SAh7LErpSiiYk5t?=
 =?us-ascii?Q?ADR+JE8JtCb6NDyECBvwDKBbia0CbvlPUkrN4QRcYetE75ExN7HECAMZBNi6?=
 =?us-ascii?Q?Eykjan7+C9xFi4Z1WOYOlEpDPRYta1aBalXAk1DIIbHWdLUR5wsmd1ZOtGg9?=
 =?us-ascii?Q?KB3NTDmRa9njzzUy04C7EG/F/kK9RAGivdzfUd8dQRsqGflhK6fS+HRkmzgg?=
 =?us-ascii?Q?X5abw5c5DuF/mBU+AWEpgxeWE2aYqGkqUHL+yuUoN0CLATyq11Z+XvSWzIHe?=
 =?us-ascii?Q?AZPv9830O/ZHW5CpnJDhpvJPRnPSxSedD4QaNgykmD6wZb+XdoGH/Sq6wfjY?=
 =?us-ascii?Q?cVsyRoOWBN2exhglI2lsbhzxwJJoOiy2DXB5g+Mk8RGGBfUeecd0RzFocTHT?=
 =?us-ascii?Q?o/ZkYKwQyXcVYUUDFZpe+auyPxoloxifkSwYrpAR7OZ9ZohtBXCiLsEM8UWr?=
 =?us-ascii?Q?CddHFk5snBxBcr9N1zGqu9WuxFU9TaqPbJ9y2AX9fFXmII434sBIr/D3bCcu?=
 =?us-ascii?Q?s5hungfGC8NZrAgSRHUuOZZGw3ReeWRH0ifPZwe7O6iINIC7ELahVPNOV8VO?=
 =?us-ascii?Q?/0b4LdEIavwkkVw3w+iFAf6l+KpFT4npjJUXQLSgWZSE8czy8GRfc19iPqve?=
 =?us-ascii?Q?kAuwVJlfYn/es2P/SbUansJj7k33TZQGTcviJjYP3VPCno7YXBLEjk8R9sdh?=
 =?us-ascii?Q?egPJyTAUqqdZQ05SrK+6FrRqR7udd2570mmAmB0IjovtzZJdp6fC9P6k8iAv?=
 =?us-ascii?Q?QMRXH7eT8BHGs9aaiddK9d3X54/+vEhbHiAGieZbru3lwY+nIJPVRiP8ghkY?=
 =?us-ascii?Q?JZImURjvwH1WcjCRrT1mzh7zS0StLySymz53DaZz51u4eUPfGzqbDtnEZnEC?=
 =?us-ascii?Q?kObvvYnvCZhpcOxmb9sOMRUhLbEk7DO7ZtlEcHcRS8azzexXVCtfw4NsD7gC?=
 =?us-ascii?Q?c7oIMWhbWY+gSTheFpqcz3OfB5Cnm6/RKXtgHXYEnm9B6WAY17GQ4T10u4Y5?=
 =?us-ascii?Q?OJ7oMbV7sHidj359eMtddgkosIF52XTepqX47dozLvE3kfjZqHUddNFoPsIU?=
 =?us-ascii?Q?hv82dZMdDZyf+rpYR7MymXNgcJAek3LtdaHHql446W+tw4WoDTclBXL5pjt4?=
 =?us-ascii?Q?ZevXCCYn0CZAGc4G2bNM/j1qykRQmpDX0nRQtOXntgZ6meIRJ7RkqSx0Ptip?=
 =?us-ascii?Q?+OQJ24cdiVFSvWt35uFtGdwzBdUzqzsUOzrLrcjGUdlVNU9e8QOb3RmUtOBS?=
 =?us-ascii?Q?pX3P7Wn1s+TmdS3L762tquDD3go1qDp++DFOiyXiMI3WMTGMKrOg3YtjteB3?=
 =?us-ascii?Q?OQPUavDmKo+UTlStQpV3R8Y=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e86c8267-dae6-4c19-28cc-08da01cceaf9
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 13:01:25.5218
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: rm1kvp5354OjBIrWR8EamvNOfnRU9kVptPW0Uhq/YevwzMIYY7giPZmrUiRE/eufOy5ttnePw1jwSzwAp2yw2g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB6757

On 09.03.2022 13:39, Andrew Cooper wrote:
> --- a/xen/arch/x86/Kconfig
> +++ b/xen/arch/x86/Kconfig
> @@ -117,8 +117,8 @@ config HVM
>  	  If unsure, say Y.
> =20
>  config XEN_SHSTK
> -	bool "Supervisor Shadow Stacks (EXPERT)"
> -	depends on HAS_AS_CET_SS && EXPERT
> +	bool "Supervisor Shadow Stacks"
> +	depends on HAS_AS_CET_SS

We'll need to settle on whether to use your or J=C3=BCrgen's variant.
As said there I'm in favor of his, but wouldn't mind this
alternative one.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 13:03:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 13:03:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287841.488079 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRvyS-0002K8-ST; Wed, 09 Mar 2022 13:03:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287841.488079; Wed, 09 Mar 2022 13:03:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRvyS-0002K1-PU; Wed, 09 Mar 2022 13:03:28 +0000
Received: by outflank-mailman (input) for mailman id 287841;
 Wed, 09 Mar 2022 13:03:28 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=gSYI=TU=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRvyS-0002Jt-1r
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 13:03:28 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4f20de09-9fa9-11ec-8539-5f4723681683;
 Wed, 09 Mar 2022 14:03:27 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2112.outbound.protection.outlook.com [104.47.18.112]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-31-LjZmMdUkND-yU_UQwyAfJQ-1; Wed, 09 Mar 2022 14:03:25 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by HE1PR0402MB2905.eurprd04.prod.outlook.com (2603:10a6:3:db::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Wed, 9 Mar
 2022 13:03:23 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Wed, 9 Mar 2022
 13:03:23 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4f20de09-9fa9-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646831006;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=bTnYUFjMN8oXDhJmKE3Pv8nL6NANXMODzuTXiH20BCE=;
	b=EeXcmXnOpsJ2L5MJgonnH+Y4aBfC2Ytx0YA0RKm6/5vjOkg/xMgT8fsYXfav/lv5qyBRQC
	Sf5JD4G/6L5xBUUYwlfK0lAp3XDh0U898XJLo0SFRFJuWo5d+5FcsnGXOWMlgQyZhT0dfi
	UczM5GBSwPm59tzBCrFB1cbYRTvjCjk=
X-MC-Unique: LjZmMdUkND-yU_UQwyAfJQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Tmcbl+GoUH4UNw1/0p0BF7ZALDpqIiFTBgi8ecsB3cMIIENLoC8SEYvDaqD7yXqseO86K0XPVWaKm93+zLZreTtKGmyjYQWCKo7hMWA1gVdtWnQEL9/yRKdvIt1ApDEDnxbCsa9T+IIUxkCfeDS7wLYuoG1i9vH4z9GMNewcWByEhkIIvZuVeBGg6Nb8QbsSVFuY2JWVbWruEg+MmAWbuHbB5DAwH+lK1wCzzpzuq4jlgviL2x40x2edYQbDY/8w6lsAJDrXUpSw8TF50/2lqwuXayqRBPjxRP2JFO2ZU3R8YnUhtP7vqyDEdo5OKtHPJre+ypJcHFNF4bQQUEjIzA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=bTnYUFjMN8oXDhJmKE3Pv8nL6NANXMODzuTXiH20BCE=;
 b=BfxJZLAbaLgA0nYw4BBVf7JV009FjGZ5KGLoeHFl2/nJx6ZX+nIBObxlwZDOMZ4LlqhZrg86qmereDDcZX3QG2XwYeYA/HMTajDWKvg3zqYlLF/QhG/FFoX5fK7OFeFxtFg6nET+1oY2cllzN2oVWDQrtKF22rssC7LKUXReqT8Skb7ghWS2kw0Z7cCvN1/25VoU33DKWr3BjlKebdqPu/mNHeyMZNcpCrc7U0NE6yzbaO5Zk/O/LVFODLn+XQxRPwW8MqqTXmrszMUgcT2TOw/TtPYrVjxkWVvl1ZZH0ImP2lU48ei0eMebhQZ9jATUzxNUSILXrCfmuTb4YIQ8Hg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <c5b13e54-8868-3d30-70ee-1d1daa082ec6@suse.com>
Date: Wed, 9 Mar 2022 14:03:21 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH 2/2] Changelog: Add __ro_after_init and CET
Content-Language: en-US
To: Andrew Cooper <andrew.cooper3@citrix.com>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Wei Liu <wl@xen.org>, Xen-devel <xen-devel@lists.xenproject.org>
References: <20220309123936.16991-1-andrew.cooper3@citrix.com>
 <20220309123936.16991-3-andrew.cooper3@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220309123936.16991-3-andrew.cooper3@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM5PR0201CA0020.eurprd02.prod.outlook.com
 (2603:10a6:203:3d::30) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f51872a6-2c8d-4f60-69bb-08da01cd314d
X-MS-TrafficTypeDiagnostic: HE1PR0402MB2905:EE_
X-Microsoft-Antispam-PRVS:
	<HE1PR0402MB2905050638386714DAA179A7B30A9@HE1PR0402MB2905.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2616005)(66476007)(8676002)(2906002)(66556008)(66946007)(4326008)(8936002)(31696002)(26005)(4744005)(86362001)(186003)(36756003)(38100700002)(508600001)(6486002)(31686004)(6512007)(5660300002)(6506007)(54906003)(53546011)(316002)(6916009)(59356011)(207903002)(219803003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?ZFdtVTk3cXROOTB4UmsxYVNwTmhYc09rZ1ByYms5dDg0aGxPSUtZUjJhMXRD?=
 =?utf-8?B?eXdKMFcvTm5NNEx5cnF3YWNVUVNWZXoyTzNxZnpRUWl1dWNIZ3FUSkJpN0Np?=
 =?utf-8?B?aDl6b28vYWRMQ2lVQmt2Ui9NTHp3TjdueU1ZMzVZY2JiUWJWTVpMSUl6YUxV?=
 =?utf-8?B?TFF2WVR5ZFFLcndCMVhzTUhIbkFvbk8zM0dVQnRuMVhMMFdUREt0NTRTeGpD?=
 =?utf-8?B?M1VreFR1SS9ZSzVkcFBkdmFOSVVQNUJzMW1iYW8ycEF6anIrLy9WQmtKUnpH?=
 =?utf-8?B?UmJVbVpDZlFRZ1lORTJGYkFzTmxZMTlrM00zajNZUnJvMDh0Q0ZPbG8zbS9y?=
 =?utf-8?B?ZnFadHJFOXQzWjhFNWZDbU95V2Q5YnZ3blVWMXpubW5FenJwdXBlTkhFZ251?=
 =?utf-8?B?UTVYOGo5ZzVUZXc4eVcraCt6UWc4YlZEUERDcVVmbVJkVUhrbXM4a0hjRFZr?=
 =?utf-8?B?ajUwQUZlZ0dFNHJEQUlDRlZDTlBvWHFkK0hpemxkZUd3U0V2bzMzVUtmTUtO?=
 =?utf-8?B?Wk1iUjZOUi9DWVRHaENBeWY5WHhGZGdDYlhaQ3lDdVlxUHV3c2F2SzA1cWZl?=
 =?utf-8?B?SnAyaXRQRlhzenhaMFh6eGJIa1BHRnZDNVNFV3p5YVZRZjhqMXVLaEErOUJL?=
 =?utf-8?B?VndkN29TdmhzMDBPUWpjc3E3aWJuM1lJS2RybnV1Rk03ektZdVdaYktrUDFQ?=
 =?utf-8?B?VEtmbVpVUXZDeGZ2MHQwZ3JVMHptN1QvaFJtWjdoeVlTVWZUeW04aW1CQ21M?=
 =?utf-8?B?R1B5TlV6YnA2Qkx3cHRpL0ZQd245UVJnSUx5aUFmNWpEOVFwMGZ1OHp6ZFVG?=
 =?utf-8?B?alpvclhBeXRZRVdOZGYrNHFqM2NmV1ZlME5CT2U1K3FMWkcwWFRYQ3Q4c0lX?=
 =?utf-8?B?aW5MZG9yTXA0WVNSa0QrWGRTT3hHcDdHV2NqRTFjYmJlRmpqR1dPK3U1Z0JQ?=
 =?utf-8?B?dXk4V1JIZW9jNXpjWUJpZ3A5ZkphMkFETXNRRGFIdzRhZEh3WDIrV2JlNHdr?=
 =?utf-8?B?YzBFSTN5ZzlJSzJhY3pyNUttcFUreC9IaHk2Q3BUdWZqWTlYZ00wOWlrMmI0?=
 =?utf-8?B?QUtnY3llYmtUcFFVZ1ptRVlFajhhUEwwcGVoRzlzR0swSkVSeVBqRW4zcCsr?=
 =?utf-8?B?TyswM2JqeWpCRy9hWTRqNlM2ZCtub0dRdGk1RVM4VnhHRHFhYlZYemlKejhY?=
 =?utf-8?B?dTZhMDZMc0lPemU5UGdBRDBBVjBOZnJkL256cXVXK0ppd2hiN3ZZY3p3bzJq?=
 =?utf-8?B?dG1Edjl1YmJGeGkzV0phRXAwRFlQUE5VdzNIUkUrZG5NSk9WSEJaaUQ2MjhP?=
 =?utf-8?B?SWhXZkFVcHZCSGhualpmSjczTkRPLzZhRFNWOHNuNW1SaCs1ZGdtN0ptWVl0?=
 =?utf-8?B?RXh0VUJtOTdBakNIWDhLTkFhTkwvU3RlN2xtbnd4dGdoVVRRSUZpOENGSEs0?=
 =?utf-8?B?S0RlYjhMZ3BnMDFmSEpFS1U1cWxMMy9yNHZ3UGhTQmd2dVFnaWduWElXQzVV?=
 =?utf-8?B?VXNNSVhjRWdpY0RZbHhTdXBOanNqSHVVcmhNOXlmcDFhbzA0cHVyUkRIMWd3?=
 =?utf-8?B?NHNOUWRvY250MGtob1dCUmQ0aVhWT09Zd0FaTENTdnIrbUp1K3JEVFhNLyt1?=
 =?utf-8?B?dFE5d0lnQmVWekh2N29PUjgwR1FFenVFK2VSYWpUUVVoMTRFS3RuTU93THNB?=
 =?utf-8?B?d3ROQ1IzWlpBenhPazYrQTBuamkzckdGN2EwcDdqejNWOEpiUGR2cHVmdWZr?=
 =?utf-8?B?UmJzeVRuc0R0Y3BKZEFKMnhYR1RCYWRqTDZxWklUVG9JK2ZFeDFmQ1VpaGl1?=
 =?utf-8?B?SHo4Umhsdk5CZWFJdUNINXp1MERUaUE1Q0tGMXRzM3lYQVdwOTh6akYrb29o?=
 =?utf-8?B?UG5tdTlQS3NrV2xNZlJ5ckJsYnJuaVNNQjV5TVBWR1N5cGo3dGl6dFc3RWNE?=
 =?utf-8?B?ZFZYT1FXbkN5THRVUlJOYURzU2NhTnBwck1zQ2M2YllBd2g2ZXJLcTlJY2sy?=
 =?utf-8?B?eStpMERWK3FYSEtqQ3M0N2NoWDVuc2U5em8yMDBUWjJXOUFYWVBlcHJHc2k3?=
 =?utf-8?B?akFZQlZTdElUeXBRQjZPUDVRaGhhWVlHcFBlT3BlNXhTWU1RaUVvSm9wOUtu?=
 =?utf-8?B?L1ozZ2FBYjdKVmpldE5lZkJsbGh2ZW1xOEVQUEpLWk9mVG1pR3RSZGVLOW1B?=
 =?utf-8?Q?ADDd9PMuEzisDxvj0zuF41Q=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f51872a6-2c8d-4f60-69bb-08da01cd314d
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 13:03:23.4676
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: CO2AgnRKmT2McacBnpCn/LGdPpYECAcYlL2rTucUjl1Yfrr0F6nasviO18qRI+l9rTU8+OPf7qQsCpVDSXDqzg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0402MB2905

On 09.03.2022 13:39, Andrew Cooper wrote:
> --- a/CHANGELOG.md
> +++ b/CHANGELOG.md
> @@ -6,6 +6,12 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/)
>  
>  ## [unstable UNRELEASED](https://xenbits.xen.org/gitweb/?p=xen.git;a=shortlog;h=staging) - TBD
>  
> +### Added
> + - __ro_after_init support on x86, for marking data as immutable after boot.

I'm not sure something like this (being an implementation detail) belongs
here.

> + - Support for Xen using x86 Control Flow Enforcement technology for its own
> +   protection.  Both Shadow Stacks (ROP protection) and Indirect Branch
> +   Tracking (COP/JOP protection).

This, of course, does.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 13:23:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 13:23:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287847.488090 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRwHe-0004jC-F5; Wed, 09 Mar 2022 13:23:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287847.488090; Wed, 09 Mar 2022 13:23:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRwHe-0004j5-Bc; Wed, 09 Mar 2022 13:23:18 +0000
Received: by outflank-mailman (input) for mailman id 287847;
 Wed, 09 Mar 2022 13:23:16 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=gSYI=TU=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRwHc-0004ij-Pg
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 13:23:16 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 139255d8-9fac-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 14:23:15 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2108.outbound.protection.outlook.com [104.47.17.108]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-20-GdfsXvOQPxuC3sMzOsz-Hg-2; Wed, 09 Mar 2022 14:23:14 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM9PR04MB8604.eurprd04.prod.outlook.com (2603:10a6:20b:43b::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.13; Wed, 9 Mar
 2022 13:23:11 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Wed, 9 Mar 2022
 13:23:11 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 139255d8-9fac-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646832195;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=t6wfWfh1Q3I4yPNq/WpipMeqY+xy9cpYPKhae/68H+w=;
	b=Rp2fxVqH5leq2/4z3l2x73j8FA9UyvR80QN9Zt42ecAw3FVhemjX9KMW0F9sF7rkwAoS3k
	deZ8QI4Nodm8hVNonsWD+9Y/4ewaerC+YS9EsaQJPfLYPzEKYxFjIyDU9SpGL9cKN6vmJj
	jVlD3YmZ9A06q3EafpA4kv5Urbv4/6I=
X-MC-Unique: GdfsXvOQPxuC3sMzOsz-Hg-2
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=CxFIfXruC3VsWZjxmGQdkO26zqgl75AH5ejB1rDVKfklmMQHksbBgzh02XanuRiBMM7UwBJCbpJUe1Tw8dY6t9DqS4r5W3dDkiDAdQoJ4GxtHF3TlrrvhjdA7CPzVgK7EusrVkSyepQG53lFluGo+8c+pbem5Ny3oiSUmmSgG2d9cbFkUleOefXJz8XnnNrsP8/0OxftAg5ABLoItuMH1zQz/IwW840bMZ8RjFoJqS9hh8FgYgtNPX4YTciKboPGO3jbLm4vlHqq5RKKNZEq70z9wU8TCExm1WgZNOnxhjmORpknwTZJGj2OHY9rp+3I+RL3lqw6znBY+vKC7lLkKg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=t6wfWfh1Q3I4yPNq/WpipMeqY+xy9cpYPKhae/68H+w=;
 b=OIRheWWLrqmUmB7F6DJ/GOpgqU2o0NMq2gCd5uHqOEjCUsz0lJe5t1NVN/h7Bzm/ZJcqJ4FUgz9y18QMhgBbOrZmRMCk5tmndDWqvPoPdMaHIvHtbG4SitzME8NW9lzOxLFSxPKP+9sxIlESVMOXx04oKF47Dklvth/jJ5W0p1CEZCfqiJYHuCvptx9+MVRhSp+HiACp23iH3duHw5/CbIzggzgXPnMl/ea3A6sTJoktthqjbmPv8XlrSH7OtGgZv03/CQYX2h/nGlyhkL9pb1RhE6hgOewlQuJZXvBg+o8PUHZsjnoyugtzQDpU5Tm5UiTVfJuufiMy98NO2tqewQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <2dce76d2-e988-dd9f-4597-0f1e4fba22cd@suse.com>
Date: Wed, 9 Mar 2022 14:23:08 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v6 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Content-Language: en-US
To: Jane Malalane <jane.malalane@citrix.com>
Cc: Wei Liu <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>,
 Juergen Gross <jgross@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Christian Lindig <christian.lindig@citrix.com>, David Scott
 <dave@recoil.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <20220307150609.10662-3-jane.malalane@citrix.com>
 <20220308173643.2929-1-jane.malalane@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220308173643.2929-1-jane.malalane@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR05CA0003.eurprd05.prod.outlook.com
 (2603:10a6:20b:488::29) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 10662c1a-0eb7-41fa-84b7-08da01cff549
X-MS-TrafficTypeDiagnostic: AM9PR04MB8604:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<AM9PR04MB8604A89990C339368B0C43AEB30A9@AM9PR04MB8604.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	UaZJtNTvcRbbzKkKh9PDo3asVQZbZPSlk+ZOGf4r8qarCZBuEimL02gBwXRzsQR/DQspCY9MDwMT17ixE27Ezo+AqfxSBAmM/VdCJUnjBYktW8l3gDHZPoays13ExKX8tjhpsHbhihqORWRusedDT0MIcaS9bjA3ZO/62K6Yd4ODVHFOoS7QCc/eOehOATcirQQky8+xT31BqhuhuUK7WEAX2C2morK+vFLvgAaSm8wynZM6hNoAYEKgr42tpPgt8WHW+G9D+Wt5fF4kogHRMCixK967bx+wB3LIR+aUyqfRxQpoEo7K+A7gJRPae4WtuV/790P0Sdnkp2nO8DMEkoBHXBcNY+6Erju8bDvm+rUGTe9pL8kPIRhf30Ok2iQchFbHsDYLHfW2D/W3DavI2dcV4BMe3yODdL31tHhSo9EygmNFacuskgeVHMUgSxJuCplVW7yQ6tNvUa6NxkTKbXkDFqmi82r8uY5Box1H62rAqq42oVO6WQmUCqqzYW5SJO7v9lvF0I/cTQsvSN4LlNTGonOwzTKZXzSpIyggBgQB2przBqzeTlfTPv073UvtJmUuxJcV3pnPDQZlT04/B12cIDB5/VMyvUWk/+7ISd+LzcSNK34SyZHZXO4tfzlQd0gBhshupHdQ5/7mdTuGT4CQNmk7PhxxRuYk1m+Eq7dyLItDf5bVLFR7GBnkTHf9Z7mVc/BWbnWYgLkOBKGhTe4acOMah2LZG9Kvq5UoRNY=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(54906003)(36756003)(66556008)(8676002)(4326008)(83380400001)(66476007)(31696002)(66946007)(2906002)(86362001)(8936002)(316002)(31686004)(6506007)(6512007)(53546011)(7416002)(6666004)(186003)(5660300002)(26005)(38100700002)(2616005)(6916009)(6486002)(508600001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?NGw2SlFIejdYSTcvSDZacDArTjBmWlU1bGdFbm8zd3Y2clZybDhqTUZwZVBt?=
 =?utf-8?B?d2IyTGpOaEQxcWU3U2VEdDFEWE9LVitKVWVWWEh5UUhlNllNNlA0ZVZDN1VM?=
 =?utf-8?B?OE5HS25DWjdKYk9Lam5VQkM5Y28vbFNYZXFUV0lmbUNuMW81Zkw3SHFxQXA3?=
 =?utf-8?B?MlpFbGZpTWQyeG1vNGpOZjBQbGtWWWJvQk9zK2ZOTkFheE1aY0w0QTVDU2tP?=
 =?utf-8?B?THJNbDFldkFCRGFxekRUNWE1SGF2dlFwL215UFFzQWcrSmR2czRWVjEzOUs4?=
 =?utf-8?B?WWI2ejZzV1h3RkQ0d1N6K25BZlRyWUE3SFZTY2k2UXRBM3dJSEN5QVFaMzVz?=
 =?utf-8?B?UnhJL1hzZlpWTVlJRUFBcmFUZm1vVm50MmN5VldZNXZQZmZHVmlsTUJJcWFR?=
 =?utf-8?B?eHB6c1Iwb3JUUWpHUzN5SEs1dnBIU3ZyWDdrYjRLbWluUXgrYThSYXpuMkww?=
 =?utf-8?B?UVVwYmlIUkc1YVYrNE9yQTVXUlEwOVR6ZllRb0JCVzZqNG9BYWdDaFR4N2pY?=
 =?utf-8?B?TmR1UjJ6a2xlUjg4Ni9iUWk5bDlibk9uTldZd2hZeG5ROFMwSWlqclhINkp0?=
 =?utf-8?B?OEh5KzRjSkRhZis0bTVkK3ZYWWFFRDlmZlZnTkFqaXlxaklnYmdBY1JHMW5N?=
 =?utf-8?B?UGwvSDVlQVIvOVZDaUFTcG5FRVEvS1ZzT1F5TlVKRjdJcU5HLzhiNEx2VmVF?=
 =?utf-8?B?Q3Y5bEtqYnJDMDB0cTJaVU1LYlNEN1NHNkY2TlU4WHh2QmhFUGM5NitjNlNL?=
 =?utf-8?B?OXBEVTdzMWErMVhKV1BROEd3emJLcVREdU5UTkR1YnE3K1FkYm13Nmp0YnMv?=
 =?utf-8?B?TzRjUTB2R2loSmt6S0ROYUI1WmFuN01sam1LYTRWSDZQazlhd0wzOFhCRytW?=
 =?utf-8?B?VEt5V0tHcmFTRHFGa0htM1NMdDR4bXZHNkJxblNsK3c5WW5wblJOZS9hSVo5?=
 =?utf-8?B?VUJETTdOcmpCUjNsN3V3eEF4TTFnaWFoUWwrWEQxWHBLRUlIbm5IWU1Ib1lN?=
 =?utf-8?B?VloxbTFNeUVvSmV1dXpRWUJKWEVUMGs2NlVtcHBXTFppRTBtN2R6OEc2Vmk2?=
 =?utf-8?B?VWxwUDVYQ0JoSWwxNVhPNTdOeDdiN3RaNWc2dTBVUUpwWkhFT0RVZ1h1YzVp?=
 =?utf-8?B?NHVhem5DNmh6LzFVZGx6OVdrWEZscTJBVzJFRExjSTB5eEI0OHpTTjNEVVRa?=
 =?utf-8?B?aXE5cDlLaXZ1cFdnRFpGY2RpYXlaYlV5T3JkelFKK1ZKV01pbnJlSFpITDZB?=
 =?utf-8?B?aUt3T2M3YUVJYjVNYkFNZ0NyMWh6UXJ6cy9kRFBLRDh4Q2lmNk5DMHVxWEN4?=
 =?utf-8?B?QmRNbVF4SVRaTXhscHhud2IybVRkd2xIemNSYm1JczhqQzdQSnFIendzWDVF?=
 =?utf-8?B?SnVDT0RZOHU0OFRhWGhmT2ttVlgwdnQ5R0FnSExVUUlwZEFlZk1ERjhxU0xz?=
 =?utf-8?B?b29yQkc3cm5IcmcxRy8vanlFUkhKbWgyQ09EWkZPTmJ2MTR4YjFrWER6aUNW?=
 =?utf-8?B?N2FaYWFTTTNtd1JlSmdoYVpzM3hvbVEzQzVUUG9NZ1h0aml2QlJuK242TnNi?=
 =?utf-8?B?andXTXlIRVJKaWVrYjAyaUZ0N1BPVWtKemowM3BVdzF1LzNrb0M0d2puNzZP?=
 =?utf-8?B?TGw3cWVLSjZUMVFDaFpmVTVHZ2FJOXVDU1hZYlBMVGRtUDczQU1pSnY1NVNi?=
 =?utf-8?B?YytOdE5WMGNITHFoWG1NMjI3OVViSGpzaWk4aU5QOEVYTk5UTlVoeHFYOWVB?=
 =?utf-8?B?d0MyL3B2VzJzL2dUdGF5OGgyTjVLRVdtaWJPRCt6aXV1ZmNkN1pibFVZZlR2?=
 =?utf-8?B?VWh1Q2xGYXc0d0ZaN21CdkZwN2RLeWtURlZTRytNSGpoS1hxZGhjdC9DSEhS?=
 =?utf-8?B?c0NyZTVJRWtrb2lOKzFkd1NFNkxJdi9RRlFVbElQdG1FR1NQb3VLdUV4eW42?=
 =?utf-8?B?RUZyVEQ3bTVWS1d1NDVZdWc5cndOU3pLSWdDOHBZWXA4Z3phNjJzU0lQVGdC?=
 =?utf-8?B?T080S0NFbk80eXd3YklRaUdvb1NHMFFrOHlyLzlQUXVNZWZYYlI0V0dEcVcx?=
 =?utf-8?B?eHVHN2F4RVkxYTFKREJYa2lGOWd4ZHVrOHhQWGJLZ0FKVWl5T3liMVJrdmEy?=
 =?utf-8?B?dm1RdWRaeHp0RE83L2lGRVZQVDh6ZG84WGdqSS9EMFBqQlp1d3ZmbEo1THFP?=
 =?utf-8?Q?uG4GLT/bK/3Yz0QXRgFPKLo=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 10662c1a-0eb7-41fa-84b7-08da01cff549
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 13:23:11.6127
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Q9QmM3uP3yTni6oSdt0HmZm6MM6fCaz34ce4UHCDJtZHtuww3AOG3ReJjmQr60PHt3IOIpXp9rtuNKZ98ZbQNQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR04MB8604

On 08.03.2022 18:36, Jane Malalane wrote:
> @@ -685,13 +687,31 @@ int arch_sanitise_domain_config(struct xen_domctl_createdomain *config)
>          }
>      }
>  
> -    if ( config->arch.misc_flags & ~XEN_X86_MSR_RELAXED )
> +    if ( config->arch.misc_flags & ~(XEN_X86_MSR_RELAXED |
> +                                     XEN_X86_ASSISTED_XAPIC |
> +                                     XEN_X86_ASSISTED_X2APIC) )
>      {
>          dprintk(XENLOG_INFO, "Invalid arch misc flags %#x\n",
>                  config->arch.misc_flags);
>          return -EINVAL;
>      }
>  
> +    if ( (assisted_xapic || assisted_x2apic) && !hvm )
> +    {
> +        dprintk(XENLOG_INFO,
> +                "Interrupt Controller Virtualization not supported for PV\n");
> +        return -ENODEV;
> +    }
> +
> +    if ( (assisted_xapic && !assisted_xapic_available) ||
> +         (assisted_x2apic && !assisted_x2apic_available) )
> +    {
> +        dprintk(XENLOG_INFO,
> +                "Hardware assisted x%sAPIC requested but not available\n",
> +                assisted_xapic && !assisted_xapic_available ? "" : "2");
> +        return -EINVAL;
> +    }

My understanding of the outcome of the prior discussion was the opposite
use of EINVAL and ENODEV respectively.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 13:47:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 13:47:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287852.488101 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRwf2-0007BF-CE; Wed, 09 Mar 2022 13:47:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287852.488101; Wed, 09 Mar 2022 13:47:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRwf2-0007B8-9A; Wed, 09 Mar 2022 13:47:28 +0000
Received: by outflank-mailman (input) for mailman id 287852;
 Wed, 09 Mar 2022 13:47:27 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=QNbA=TU=citrix.com=prvs=060736ad3=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRwf0-0007B2-VD
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 13:47:27 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 71da9914-9faf-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 14:47:23 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 71da9914-9faf-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646833643;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=xP3SB47gaxpdsgpRPf3DVu8gE1mhj/p8VR8pA+3r6/4=;
  b=LGQJlEKwdOg7ezRNRHgrj4/d1ssjm+SL6reln68hNFQCtxZQWfPmvoTA
   /1XUeVtlWLDkfBg8V/AhC431R21GGliuHWTdsbK5sDmiP2K+a+aJBrBFT
   muZNW8WD/KmPn1F8Jvu9iK5GM8Ww9CwLPZ461+jBpEV+NQoxKd+dPJ46b
   8=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65747535
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:Oawd/6gfDuk6VyVtuYYUfuZQX1611RAKZh0ujC45NGQN5FlHY01je
 htvXTvSb/6CNzOgcooiaI23/E0F78DWzdE2Hlc9+Ho9H38b9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFvc4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YQcqHJPJodYYaT9BHzAlfvFr1obtHEHq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bkmtnwjzDS+4vXLjIQrnQ5M8e1zA17ixLNaiDO
 JZGNGEyBPjGSyFmJXM8Bcw8pb6Pr3P8IxdjkQOfr6VitgA/yyQuieOwYbI5YOeie8JRmUqJo
 3PcyE7wCBoaKd+3xCKM9zSngeqntTjgRIsYGbm89/hrqF6e3GoeDFsRT1TTifO0kFKkUtRTb
 Ukd4DMzrLMa/VauCNL6WnWQo3OavxhaR9tZFcU77h2Azuzf5APxLmoZSHhHYd8vts4zTBQr0
 EOEm5XiAjkHmK2YTzeR+6mZqRu2ODMJNikSaCkcVwwH7tL/5oYpgXrnTNxuDaq0hd3dAizrz
 naBqy1Wr6oXpd4G0eO851+vqzCxopnESCYl6wORWXiqhit7a5SifJeA8kXA4LBLK4Pxc7Wal
 CFawY7EtrlIVMzT0nzWKAkQIF23z/aGEgPZuGxqJb84+yX2uCKOU7l63QgrcS+FLf04UTPuZ
 UbSvyZY65lSIGamYMdLXm6hNyg55fO+TIq4D5g4evILO8EsL1HfoEmCcGbNhziFraQ6rU0o1
 X53m+6IBG1SN6loxSHeqww1ge5ynXBWKY8+qPnGI/WbPVi2OSb9pVQtagLmggUFAEWs+lu9H
 zF3bZfi9vmneLeiChQ7CKZKRbzwEVA1BIrtt+tcffOZLwxtFQkJUqGNn+x/J9Y1w/gJyI8kG
 01RvGcCmDITYlWddW23ho1LMuuzDf6TU1pgVcDTAbpY8yd6Otv+hEvuX5A2YaMm5IReIQ1cF
 JE4lzG7Kq0XEFzvom1FBbGk9dAKXEn71GqmYnv+CBBiLsEIeuA80oK9FucZ3HJVVXTfWApXi
 +DI6z43trJYHlU8VpmKMKzzp75z1FBE8N9Ps4LzCoA7UG3n8ZRwKjy3ifkyIsoWLg7EyCfc3
 AGTaSr0b8GUy2Pp2LElXZy5kro=
IronPort-HdrOrdr: A9a23:lzifUaut7jnNrsggQfp31MWx7skC74Mji2hC6mlwRA09TyXGra
 +TdaUguSMc1gx9ZJhBo7G90KnpewK6yXdQ2/hqAV7EZniahILIFvAY0WKG+VPd8kLFh4xgPM
 tbAs1D4ZjLfCRHZKXBkXiF+rQbsaC6GcmT7I+0pRcdLj2CKZsQlzuRYjzrbHGeLzM2Y6bReq
 Dsgvau8FGbCAsqh4mAdzI4t6+pnay/qLvWJTo9QzI34giHij2lrJb8Dhijxx8bFxdC260r/2
 TpmxHwovzLiYD39jbsk0voq7hGktrozdVOQOSKl8guMz3pziKlfp5oVbGutC085Muv9FEput
 /RpApIBbU411rhOkWO5Tf90Qjp1zgjr1fk1F+jmHPm5ff0QTorYvAx875xQ1/80Q4Nrdt82K
 VE0yayrJxMFy7Nmyz7+pzhSwxqvlDcmwttrccjy1hkFacOYr5YqoISuGlPFo0bIS784Ic7VM
 FzEcDn4upMe1/yVQGXgoBW+q3tYp0PJGbEfqBb0fblkQS+3UoJg3fw/fZv30vpr/kGOtx5D+
 etCNUeqFgBdL5TUUtHPpZzfSKGMB28ffvyChPhHb3GLtBPB5ufke++3F0KjNvaDKDgiqFC36
 j8bA==
X-IronPort-AV: E=Sophos;i="5.90,167,1643691600"; 
   d="scan'208";a="65747535"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=JpXyfCFNv+b5J1zCwYtrbTBJ0DZyUGw7t8y5Xb6w0X/+0cmEE/r9RArqt7SDnB+nxBABVnxm1hzVqwoZramGV+QEsJ4vWrD4TCBkbW+mJeABnqewiOMRU55utFcKntsxoHhblauZAK282XShKzCHR8eKB/+6pFqYShqwVeqUeotGw2xs4JLva7OO6YKwaarZW49CpxSa3uvgikVy6cPwB9omQ6McMDzP/78SNrJE2YPHoof1Tq20rLi0MYH+cEageaVJZgjvzdPHnkmz+gq1w9ZcfMeqUaD2IBI1GtL3zt9DJGB9px0u/SIAcW9c/T528G85p8R8qR/M66JzOMyO9A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=XnTbjgBXoif7SBkZOFFifYDL3Y/a2m5voGNF2Uq7qwk=;
 b=c7hxYvyKikk7nTXFGTt3xbxbHhWec4QIPIqMQRriLAX5xaY0syYbwjo7Xpblb2krPkOJfNQiPmRz0vI/juLjAap/T2ot8D19k1WK7D223zz2PHAX1rRaHAuBFBiYFpHkI/Bj51wXHA7h2QS0VIkdeyCQkgeEvDYri75IfS8ytI4bmc1aPpyZvKVKzmDbCQuPq+wQzxOnOjrvd1yIDKEUTZITUNX3e3Iju6pNArKGs8r10fzXwQeiYtrwBpnJQxC05bxKzKpf3MgK+hpapMAjfGHTHU+k1tHq3eJ0MMGiCOT85j/13tDFU76f/eMfTbs4OrAtBHvEde9JACsjgD5p5w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=XnTbjgBXoif7SBkZOFFifYDL3Y/a2m5voGNF2Uq7qwk=;
 b=aLWZhWCLNqUrehugAGodMWNDlrKZiOZM83Gpkd8mgxJuvNnJml8ZcbCDu7S/RNMpB7G5pegbLPub3vreALUpcAglXrlZuQfTi8nEyAiF+h6f1LqpPVIfJmKi7D293+3ZT6vQMO1J5JxIrsi0dt40JkEraN3maCBa3cq+fX0qWf8=
Date: Wed, 9 Mar 2022 14:47:11 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jane Malalane <Jane.Malalane@citrix.com>
CC: Jan Beulich <jbeulich@suse.com>, Xen-devel
	<xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, Anthony Perard
	<anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, George Dunlap
	<George.Dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Bertrand Marquis <bertrand.marquis@arm.com>, Jun Nakajima
	<jun.nakajima@intel.com>, Kevin Tian <kevin.tian@intel.com>, Andrew Cooper
	<Andrew.Cooper3@citrix.com>
Subject: Re: [PATCH v2 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Message-ID: <Yiiv35mWhEpprns4@Air-de-Roger>
References: <6d924061-f2fd-5f3d-0f98-79e76398b908@suse.com>
 <6c9400b8-7c76-34c8-f69e-3fad1eb53b8c@citrix.com>
 <101b0950-b7f2-119b-b654-574a71cec3bc@suse.com>
 <1bac0507-9420-f0b9-f846-f1c73bf9678d@citrix.com>
 <42fb3257-0c36-c156-c81b-f70dd5f247aa@suse.com>
 <9721222d-1c0d-ddaf-fbc6-801f5d9445f5@citrix.com>
 <12727658-68f4-1785-9b37-c948eb2cba71@suse.com>
 <9ed50d7a-23c7-2405-ff5e-15cc02b0c67f@citrix.com>
 <7fbc16f6-4175-06e8-742c-9aa8c7eb3e91@suse.com>
 <c548b7cb-dc83-b591-d82e-0c70490a38d2@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <c548b7cb-dc83-b591-d82e-0c70490a38d2@citrix.com>
X-ClientProxiedBy: LO4P265CA0003.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:2ad::6) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 681fed1b-0544-4cd5-e243-08da01d352f7
X-MS-TrafficTypeDiagnostic: BYAPR03MB3413:EE_
X-LD-Processed: 335836de-42ef-43a2-b145-348c2ee9ca5b,ExtAddr
X-Microsoft-Antispam-PRVS: <BYAPR03MB34133A1BFD73DA1009E723308F0A9@BYAPR03MB3413.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 5hAFKnSkWWoAuroCW/yGz+lfSfO2NY3GaHVc19L2uBAtb6PsPVL+5u0DpdR/aueUEfSsWCX0SlUTJclnSXLlD15cS/fwJRGGNmElAGwZdsqhhvJ1VHJaC4tAsMLWR9HAtKDmo8Ju7iTl095ZCD9JM7VjR79Ams/j8qVqk/CQMXmdBTt7qNbjo4rcVkr3ocApr3ArjJO/QCw/ALIC5h5+ugSHOCpiwMJpz5ZX6tWv0Tfrq9dTs5pVcxwHFy0cReRXPMD74VQ51f3pkmlMC7AlLfQJR4rxmra/jafWW0w5hIg0SnKThpWuvtwTdZjO1hqtMlgYzCH33AAP2cB25s3UR6fyKbhzkkmTTa0qwCHxsGd9K9MjvsQirL5JyAO2j+OodDudd6ALVn9iSgxydSW7vGnvaih4KFJI0fBBXMBjvt6GPcIsDxMqj7otK1UmmqOlHz3jU9e6n1hwnIKHp8vTDShfed/MR/W2CtR1vxuVm+LhN6MC5H8+kZVjwr8FL5Kh8yoNs2dpcTMmMMc2dD+uDhHyK1ASbZo5V36/ewzJzjwHxzJoX8Xz9vky1GOXfkEEWbjEs2B17VHLRdJiaGfbQmT8Tjtyy3EoRsFCnt+notyRgn5BpVbia+3Q2NzLL5GXzzEO1+O01xQNWRsgZpt7eQ==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(66946007)(4326008)(6862004)(8676002)(66476007)(66556008)(508600001)(2906002)(5660300002)(316002)(8936002)(85182001)(54906003)(7416002)(38100700002)(6636002)(6486002)(86362001)(186003)(33716001)(82960400001)(107886003)(53546011)(6506007)(6512007)(9686003)(6666004)(83380400001)(26005);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?TUJHbDh5cysrcWZkbzh1M2NRMTJlZENrdk1QWW5iRWt1KzBpTXlnSUZCNE5K?=
 =?utf-8?B?UW1Hb0wxeFdwZGRjdS83Z3RBRTQvcHAvZUNSaXA2S0wwdm1BOVJVam1aSmh4?=
 =?utf-8?B?Q1A0ZHMrRVRCV01CdlNXOTBtbUJWUzlBcHdwaDhGODArWVhpakpNY2RRcEdt?=
 =?utf-8?B?aStVR2hlYTNLaEVzVDNrcGlRb1NxdEl4NXMrYW1sTWt0b2E0eTRIeFhiajFo?=
 =?utf-8?B?TWZiZkRWVlh0TVZFdGVTZTRyN0hBSW9xeVQzVzdaV1Jsd1k2THpOYmJTOTRD?=
 =?utf-8?B?NWYydklCT0UxU0pZYWFMWXpSR0RtVWc3K2w0cGhPZk8yaFYwTjZuSDMxYmt6?=
 =?utf-8?B?MGloSStBUXg1YWVXV0FwWFMycVExWFQveENBNElMRklkYTd2NEZHN2VPcHha?=
 =?utf-8?B?TS93MFVzaVF1TWFMUjdINkF6dHdtMWJpVXpOWDI0S0JyQjhxRlU1UWM3MlQ0?=
 =?utf-8?B?Y0VRTTJ4cCtuRC82dHFiK3RnOUJqaWRHQUswUVFoanJmeUFwc0toQmJQUUpv?=
 =?utf-8?B?VTNUSk5YZVVqbUFGd0tsTER2dE9xNXE2TndKclNTUEdFUGprZnpMQTNuaDFU?=
 =?utf-8?B?RVpDQ2YvNmF4OTVJREs1Zkh4TG04NHNXcmVNWkVwUDYvR1VCai9nRGh0M1hk?=
 =?utf-8?B?K21zTHV3cnpDQzRIdlgrc0F3dXNCbS9KdmpuNmxKdCtBekVjR24zdHVEaUFt?=
 =?utf-8?B?U3FwSk9KamJ4clUya3E4VytKYUppZGVOdFNqLzhmZTlTQlVLV3hVcHNQZmVD?=
 =?utf-8?B?TkpUZmlVZXpFek84dytXZHgvYklEWlRrTzNjQnlCckF1TE5zRlhFeWkvWWt4?=
 =?utf-8?B?RDNYalhJTWlROXV3NHhyRzY0VWxPdnVGaiswL2NVWjFJK1pvWUtQdjhGcWJi?=
 =?utf-8?B?TDA0Zk1wV21VVlJVTDJiTXVCd3gyQWxNeEVFYy9MWGJFeVVQRzQrWTZuc2lM?=
 =?utf-8?B?alF1MVU1RG1JVzU1RHEveGVqMmVDeEpoR2ZOVERza2g5WVVBdTM0ZXA0aU1B?=
 =?utf-8?B?aFhtNWRsTStLTjdrUkFiYk5aSmtqRUNVYmVlQ3FmcTdYSDF3TjJIQmhVM1Qw?=
 =?utf-8?B?Z0xZSnNZSWJXS1JKZ2w5SUJFVWVBdURGR25kK2VWNCtvV2htODRnOGx4cmFW?=
 =?utf-8?B?VHdFRkN6VklvOGJLeW9qa2JadmFEUDJtbjMwVllCMUlLblZmdkJZWUpWKzFh?=
 =?utf-8?B?YUdyckZheW8ycHcvcnpPWm5QdFk2aWo4YWZkY2FCcC9ZV0FYY3hJVy8waUgr?=
 =?utf-8?B?RE54ZldTYjJHNy9OK0txNlRJeEM5K2FRM2MzQmVSZTM2ejg5L0hkZ2dud3pk?=
 =?utf-8?B?cFZ4b2c4N1MzNjJSUmpaVWxsakZBUkxMLzFtNWMvZ0ZuUlJuZCttYmlkY3BF?=
 =?utf-8?B?cnErOThTMmloajhVcFFBYTJqeHVxRStKYkF6L04yb2lCQzM3R1hQSTRoMmRB?=
 =?utf-8?B?Y1ZJN1pCenlCU0JiaUNOR0RuQll1cGhLL0wrYS9WSjAzVmZMV0JZYnZvSldW?=
 =?utf-8?B?VGZRR0VTVEV0Q1d2L0RtekExdUtjWFBYVTJ5RXVCNCtGY09Ld0JJYVNqSjFa?=
 =?utf-8?B?OE15YVlGSis4SzlEUjJHN2F4NnBTMGxBTmFYUzVmSmJGd3IyN0pvemVsYUFs?=
 =?utf-8?B?WTdNckd5WmVrQkxYa0ZkVnZCU0lzZHNZbUVRMFp4ckkyaVFzQmM4RVh0RG1W?=
 =?utf-8?B?QWxLRVJ6M3gvZGFBRlZlNEZRMjBOQUZRbUdSZlNYb0wyTlYxcEJtSk9UMmFy?=
 =?utf-8?B?b2drWU90cDNleFJFNng5Rkk3RUp4SGhPZTBFVjg3Z3VhWGpDdHdydndlYmtO?=
 =?utf-8?B?eHh3aWFySWpPSmpULytZMVorK0ROVTRkZFh3RkV2ZEFLUkRMbXdwUkRkVnlk?=
 =?utf-8?B?UWF6NjdGQnNaSXZqcGp3NzI0L3ZzM3FIcVJlVlhZSUVBNFgwMFVPbmRJMHJz?=
 =?utf-8?B?bFJtV0V5VTJxaXNibUZKZTBqTDY1bExsalh1aTdkWTF0QUQ1VUpLdFY5bGJW?=
 =?utf-8?B?eWNySGw0ODlmQnhOWUxRSXYvSVVRZEtQY0VtU3QyRWRpZ2hzUXppbWp0UFo4?=
 =?utf-8?B?cGI4dXNFc2Z3czhleHFsTEhyTmt5aXp3Z1k4bGcxQm9QM0VwTHRGeDEyNWF4?=
 =?utf-8?B?eTJwRDNyQTBsRDV2anphUVVoaDQrSktnZUFXaFByTEgrNFBmTzRFUHRmY2Ju?=
 =?utf-8?Q?ZfQVYJe84HzaSgqkK/RflQw=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 681fed1b-0544-4cd5-e243-08da01d352f7
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 13:47:17.0081
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: GybVlQaVkFbb3MZ0JKOK5aEfJk6s2fVESVCe0rYf8fBQREdJq+tAkZ2fCKzMlAgcWslApuZF40HuxxUY5hriVw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB3413
X-OriginatorOrg: citrix.com

On Tue, Feb 15, 2022 at 04:33:15PM +0000, Jane Malalane wrote:
> On 15/02/2022 15:21, Jan Beulich wrote:
> > [CAUTION - EXTERNAL EMAIL] DO NOT reply, click links, or open attachments unless you have verified the sender and know the content is safe.
> > 
> > On 15.02.2022 16:10, Jane Malalane wrote:
> >> On 15/02/2022 10:19, Jan Beulich wrote:
> >>> [CAUTION - EXTERNAL EMAIL] DO NOT reply, click links, or open attachments unless you have verified the sender and know the content is safe.
> >>>
> >>> On 15.02.2022 11:14, Jane Malalane wrote:
> >>>> On 15/02/2022 07:09, Jan Beulich wrote:
> >>>>> [CAUTION - EXTERNAL EMAIL] DO NOT reply, click links, or open attachments unless you have verified the sender and know the content is safe.
> >>>>>
> >>>>> On 14.02.2022 18:09, Jane Malalane wrote:
> >>>>>> On 14/02/2022 13:18, Jan Beulich wrote:
> >>>>>>> [CAUTION - EXTERNAL EMAIL] DO NOT reply, click links, or open attachments unless you have verified the sender and know the content is safe.
> >>>>>>>
> >>>>>>> On 14.02.2022 14:11, Jane Malalane wrote:
> >>>>>>>> On 11/02/2022 11:46, Jan Beulich wrote:
> >>>>>>>>> [CAUTION - EXTERNAL EMAIL] DO NOT reply, click links, or open attachments unless you have verified the sender and know the content is safe.
> >>>>>>>>>
> >>>>>>>>> On 11.02.2022 12:29, Roger Pau Monné wrote:
> >>>>>>>>>> On Fri, Feb 11, 2022 at 10:06:48AM +0000, Jane Malalane wrote:
> >>>>>>>>>>> On 10/02/2022 10:03, Roger Pau Monné wrote:
> >>>>>>>>>>>> On Mon, Feb 07, 2022 at 06:21:00PM +0000, Jane Malalane wrote:
> >>>>>>>>>>>>> diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
> >>>>>>>>>>>>> index 7ab15e07a0..4060aef1bd 100644
> >>>>>>>>>>>>> --- a/xen/arch/x86/hvm/vmx/vmcs.c
> >>>>>>>>>>>>> +++ b/xen/arch/x86/hvm/vmx/vmcs.c
> >>>>>>>>>>>>> @@ -343,6 +343,15 @@ static int vmx_init_vmcs_config(bool bsp)
> >>>>>>>>>>>>>                    MSR_IA32_VMX_PROCBASED_CTLS2, &mismatch);
> >>>>>>>>>>>>>            }
> >>>>>>>>>>>>>        
> >>>>>>>>>>>>> +    /* Check whether hardware supports accelerated xapic and x2apic. */
> >>>>>>>>>>>>> +    if ( bsp )
> >>>>>>>>>>>>> +    {
> >>>>>>>>>>>>> +        assisted_xapic_available = cpu_has_vmx_virtualize_apic_accesses;
> >>>>>>>>>>>>> +        assisted_x2apic_available = (cpu_has_vmx_apic_reg_virt ||
> >>>>>>>>>>>>> +                                     cpu_has_vmx_virtual_intr_delivery) &&
> >>>>>>>>>>>>> +                                    cpu_has_vmx_virtualize_x2apic_mode;
> >>>>>>>>>>>>
> >>>>>>>>>>>> I've been think about this, and it seems kind of asymmetric that for
> >>>>>>>>>>>> xAPIC mode we report hw assisted support only with
> >>>>>>>>>>>> virtualize_apic_accesses available, while for x2APIC we require
> >>>>>>>>>>>> virtualize_x2apic_mode plus either apic_reg_virt or
> >>>>>>>>>>>> virtual_intr_delivery.
> >>>>>>>>>>>>
> >>>>>>>>>>>> I think we likely need to be more consistent here, and report hw
> >>>>>>>>>>>> assisted x2APIC support as long as virtualize_x2apic_mode is
> >>>>>>>>>>>> available.
> >>>>>>>>>>>>
> >>>>>>>>>>>> This will likely have some effect on patch 2 also, as you will have to
> >>>>>>>>>>>> adjust vmx_vlapic_msr_changed.
> >>>>>>>>>>>>
> >>>>>>>>>>>> Thanks, Roger.
> >>>>>>>>>>>
> >>>>>>>>>>> Any other thoughts on this? As on one hand it is asymmetric but also
> >>>>>>>>>>> there isn't much assistance with only virtualize_x2apic_mode set as, in
> >>>>>>>>>>> this case, a VM exit will be avoided only when trying to access the TPR
> >>>>>>>>>>> register.
> >>>>>>>>>>
> >>>>>>>>>> I've been thinking about this, and reporting hardware assisted
> >>>>>>>>>> x{2}APIC virtualization with just
> >>>>>>>>>> SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES or
> >>>>>>>>>> SECONDARY_EXEC_VIRTUALIZE_X2APIC_MODE doesn't seem very helpful. While
> >>>>>>>>>> those provide some assistance to the VMM in order to handle APIC
> >>>>>>>>>> accesses, it will still require a trap into the hypervisor to handle
> >>>>>>>>>> most of the accesses.
> >>>>>>>>>>
> >>>>>>>>>> So maybe we should only report hardware assisted support when the
> >>>>>>>>>> mentioned features are present together with
> >>>>>>>>>> SECONDARY_EXEC_APIC_REGISTER_VIRT?
> >>>>>>>>>
> >>>>>>>>> Not sure - "some assistance" seems still a little better than none at all.
> >>>>>>>>> Which route to go depends on what exactly we intend the bit to be used for.
> >>>>>>>>>
> >>>>>>>> True. I intended this bit to be specifically for enabling
> >>>>>>>> assisted_x{2}apic. So, would it be inconsistent to report hardware
> >>>>>>>> assistance with just VIRTUALIZE_APIC_ACCESSES or VIRTUALIZE_X2APIC_MODE
> >>>>>>>> but still claim that x{2}apic is virtualized if no MSR accesses are
> >>>>>>>> intercepted with XEN_HVM_CPUID_X2APIC_VIRT (in traps.c) so that, as you
> >>>>>>>> say, the guest gets at least "some assistance" instead of none but we
> >>>>>>>> still claim x{2}apic virtualization when it is actually complete? Maybe
> >>>>>>>> I could also add a comment alluding to this in the xl documentation.
> >>>>>>>
> >>>>>>> To rephrase my earlier point: Which kind of decisions are the consumer(s)
> >>>>>>> of us reporting hardware assistance going to take? In how far is there a
> >>>>>>> risk that "some assistance" is overall going to lead to a loss of
> >>>>>>> performance? I guess I'd need to see comment and actual code all in one
> >>>>>>> place ...
> >>>>>>>
> >>>>>> So, I was thinking of adding something along the lines of:
> >>>>>>
> >>>>>> +=item B<assisted_xapic=BOOLEAN> B<(x86 only)>
> >>>>>> +Enables or disables hardware assisted virtualization for xAPIC. This
> >>>>>> +allows accessing APIC registers without a VM-exit. Notice enabling
> >>>>>> +this does not guarantee full virtualization for xAPIC, as this can
> >>>>>> +only be achieved if hardware supports “APIC-register virtualization”
> >>>>>> +and “virtual-interrupt delivery”. The default is settable via
> >>>>>> +L<xl.conf(5)>.
> >>>>>
> >>>>> But isn't this contradictory? Doesn't lack of APIC-register virtualization
> >>>>> mean VM exits upon (most) accesses?
> >>>>
> >>>> Yes, it does mean. I guess the alternative wouuld be then to require
> >>>> APIC-register virtualization for enabling xAPIC. But also, although this
> >>>> doesn't provide much acceleration, even getting a VM exit is some
> >>>> assistance if compared to instead getting an EPT fault and having to
> >>>> decode the access.
> >>>
> >>> I agree here, albeit I'd like to mention that EPT faults are also VM
> >>> exits. All my earlier comment was about is that this piece of doc
> >>> wants to express reality, whichever way it is that things end up
> >>> being implemented.
> >>
> >> Oh yes. Right, I see how this info could be misleading.
> >>
> >> How about this?...
> > 
> > Getting close. The thing I can't judge is whether this level of technical
> > detail is suitable for this doc. Just one further remark:
> 
> Unsure too.
> 
> >> +=item B<assisted_xapic=BOOLEAN> B<(x86 only)>
> >> +
> >> +B<(x86 only)> Enables or disables hardware assisted virtualization for
> >> +xAPIC. With this option enabled, a memory-mapped APIC access will be
> >> +decoded by hardware and either issue a VM exit with an exit reason
> >> +instead of an EPT fault or altogether avoid a VM exit. Notice
> > 
> > As said before, EPT faults also are VM exits and also provide an exit
> > reason. Therefore maybe "... and either issue a VM exit with a more
> > specific exit reason than an EPT fault would provide, or altogether
> > avoid a VM exit" or "... and either issue a more specific VM exit than
> > just an EPT fault, or altogether avoid a VM exit"?
> 
> Yes, that's better.

I would avoid mentioning EPT, as that's an Intel specific technology.
Could we instead use 'p2m fault'?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 13:52:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 13:52:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287859.488112 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRwje-0000CP-3F; Wed, 09 Mar 2022 13:52:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287859.488112; Wed, 09 Mar 2022 13:52:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRwjd-0000CI-VW; Wed, 09 Mar 2022 13:52:13 +0000
Received: by outflank-mailman (input) for mailman id 287859;
 Wed, 09 Mar 2022 13:52:12 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=QNbA=TU=citrix.com=prvs=060736ad3=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRwjb-0000CC-Vw
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 13:52:12 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 1c738d24-9fb0-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 14:52:10 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1c738d24-9fb0-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646833929;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=xtdrIpQWSDXHbzOFZtUcsP0JgHhcfup69P6OLR5ddh8=;
  b=Z3xDTvqg3QDFLeJxH17/vCIHVUczd8JLpo7rMy6pJIWb2S8i+cDVJ/aB
   hPil9X+0ILZ1DEQw7WADldKxoeMQNIwDze8ocxAM8/NmVt2j5EeiD+J6b
   W49hpdfK9sayDO4ycmDokL6PMV9cJSi4uLqsuK8KkVv0V0iFBib++A8m0
   M=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65815752
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:YktUHKsEDMOLiNZMDWsFCJvsX+fnVKpeMUV32f8akzHdYApBsoF/q
 tZmKT2DP/mCYmGjKIwkbYywphgO6JSHzNRrQAJsqCw8FiJD+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jV6
 IuoyyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi8MBZaVg8kmbiJFFnEgB59h1J76I3qg5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AO
 ppANGUyNnwsZTViFkwxKYkGzd2BiyfATDNHlhGRt44Otj27IAtZj+G2bYu9lsaxbd5Ogk+Sq
 2bC/mL4KhIXLtqSzXyC6H3Eru3SmSL2XqoCGbv+8eRl6HWtwWgUBAwTREGMi/CzgU6jWPpSM
 0URvCEpqMAa+EW1Q/HnUha/oXrCuQQTM/JPF8Uq5QfLzbDbiy6JC25BQjNfZdgOsM4tWSdsx
 lKPh8nuBzFkrPuSU3313rWeoC62OCMVBXQffiJCRgwAi/Hhr5s0lQnnVct4Hei+ididJN3r6
 2nU9m5k3exV1JNVkfXglbzav96yjr3ydVcuyz7qZX+gvl1DVqmJRrGq60eOuJ6sM72lZlWGu
 XEFne2X4+YPEYyBmUSxfQkdIF26z63baWOB2DaDC7Fkrm3woCD7Iei89RkjfB8BDyoSRdP+j
 KY/Uyt17YQbAnalZLQfj2mZW5VzlviI+TgIu5npgjtyjnpZKVfvEMJGPxf4M4XRfK4Ey/9X1
 XCzK5rEMJriIf47pAdavs9EuVPR+ggwxHnIWbfwxAm93LyVaRa9EOlZbgTQMrppsP/Y/m05F
 uqz0ePQm32zt8WkPkHqHXM7dwhWfRDX+7itwyCoSgJzClU/QzxwYxMg6bggZ5Zkj8xoehTgp
 RmAtrtj4AOn3xXvcFzSAlg6Me+Hdcsv/BoTYH13VX71iidLXGpaxPpGH3fBVeJ8r7ILID8dZ
 6RtRvhs9dwUE2WZoWtBNcehxGGgHTzy7T+z0+OeSGFXV7ZrRhDT+8+ieQ3q9SIUCTGwu9d4q
 Lqlvj43i7JSL+i+JK46sM6S8m4=
IronPort-HdrOrdr: A9a23:NcOePKNuMUFj18BcTyX155DYdb4zR+YMi2TDiHoedfUFSKOlfp
 6V8MjztSWVtN4QMEtQ/+xoHJPwPE80kqQFnbX5XI3SJjUO3VHIEGgM1/qG/9SNIVybygcZ79
 YeT0EcMqyBMbEZt7eD3ODQKb9Jq7PrgcPY59s2jU0dNj2CA5sQnjuRYTzra3GeKjM2YqbQQ/
 Gnl7R6TnebCD8qR/X+IkNAc/nIptXNmp6jSRkaByQ/4A3LqT+z8rb1HzWRwx9bClp0sPof2F
 mAtza8yrSosvm9xBOZ/2jP765OkN+k7tdYHsSDhuUcNz2poAe1Y4ZKXaGEoVkO0auSwWdvtO
 OJjwYrPsx15X+UVmapoSH10w2l6zoq42+K8y7vvVLT5ejCAB4qActIgoxUNjHD7VA7gd162K
 VXm0qEqpt+F3r77WrAzumNcysvulu/oHIkn+JWpWdYS5EiZLhYqpFa1F9JEa0HADnx5OkcYa
 ZT5fnnlbZrmG6hHjPkVjEF+q3vYp1zJGbLfqE6gL3V79AM90oJinfxx6Qk7wA9HdwGOt15Dt
 //Q9ZVfYF1P7wrhJ1GdZI8qOuMeyXwqEH3QSqvyWqOLtByB5uKke+x3IkI
X-IronPort-AV: E=Sophos;i="5.90,167,1643691600"; 
   d="scan'208";a="65815752"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=BJme9gxoULf0zTE07leIh3Z/gPfFLy5sFWuol3YMP6LVVu3ixuRxM0q9DXLsjk8ETLwib4jZXHq79OlYl0UkuLqnFEtSY1KEklJrBsW3gNSdAQ5GL+V92N44DE+xw1Ps+DzSbvvOWrwuT6J75vHggjWYp6/AqOE5j/ze/MHgTXxuGptPHad2RkfSL3H6eWkRjf6cP546WCgL/Xurvd6xJF9R4lvYDfWrXlt89jSH6vtsaBwyYB+KkeN8NzjrHg1IxS0KqFfO6CfRpmFV5139/jXMFFgL/KkTLLpCaYaH1jR9IkaUmhtYu6u/LHFjZ3IP/DtI8gfnETVgJ6Fs5XYRdw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=zwAvxd5DQWuO656Ujwbi0719LLOXT2qm5Gef/YBdiQc=;
 b=NVLcZ4XLSH75ips09xSOmqdagHBxHZp4JTXr0nkLQf98i+zhjbUItG7dtFo0e3jnXrrHQcs5kkath4K426x8P9Lt1XKEq+ALNSOOOIEmlhhBttkSJHPssWEsn2nie7GPTAPAWJqFY6yvu8hZWTunv4ySGzyPWdyhm5mn61tUS7ntrYB5DYodApqYiIolvEC/LEwqWnHEn8HXCzJwrX2DPLRdDr9WrLiFd7cdYnjYikS4ZdJ+3uwlfp+k6LG6kAOD0OkeVCr270qcrDhEXFONuGDEEZZQJPcs5/glITJ2jZ0+qLw7w4XEqV3Wl+tTRRee4uBMgiFgQklH1s2BWVxIBw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=zwAvxd5DQWuO656Ujwbi0719LLOXT2qm5Gef/YBdiQc=;
 b=iEew/Fd/fMMf4QICG8Ggd/UYXnNzJa3QLgEAVJ5F6FHn4x1hmknhBZN+mX7wfEJ32w+WqYQ3MdXi070GIIHhS4B2C4msXp1wO/RWryr53QWk9VTp2xFUwrKlUb/Gyo5W7KzsyxoRijHlq45EI+UaQFF4r06WbHYr3m8T9ObeOf4=
Date: Wed, 9 Mar 2022 14:51:37 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jane Malalane <jane.malalane@citrix.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, "Anthony
 PERARD" <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien Grall
	<julien@xen.org>, "Stefano Stabellini" <sstabellini@kernel.org>, Christian
 Lindig <christian.lindig@citrix.com>, David Scott <dave@recoil.org>,
	"Volodymyr Babchuk" <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH v6 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Message-ID: <Yiiw6fFxWglR7bWL@Air-de-Roger>
References: <20220307150609.10662-3-jane.malalane@citrix.com>
 <20220308173643.2929-1-jane.malalane@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <20220308173643.2929-1-jane.malalane@citrix.com>
X-ClientProxiedBy: LO3P265CA0011.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:bb::16) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 7d977da1-ed8a-489b-0e09-08da01d3f0ea
X-MS-TrafficTypeDiagnostic: SN6PR03MB4381:EE_
X-Microsoft-Antispam-PRVS: <SN6PR03MB4381F06897654A3906BA58DF8F0A9@SN6PR03MB4381.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(186003)(83380400001)(38100700002)(26005)(8676002)(8936002)(33716001)(2906002)(5660300002)(85182001)(66476007)(6862004)(82960400001)(66556008)(6636002)(316002)(66946007)(4326008)(86362001)(6666004)(6512007)(9686003)(6506007)(54906003)(6486002)(508600001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?NVBFb1g0Q0E0M3NWY3N4cWJZRmV1TXlsUkpqT1huelBxZCsySWs0M2dTMlBj?=
 =?utf-8?B?ODczcUREenArNlNmTURscndaK1VjSEg2VUROWVNVV2NheGF2QkNwdnJUV0hs?=
 =?utf-8?B?T2NnbVNmZGpuc2NBcXFYSmxReUdSMGZxbnlEVkdrL1h2a2VKY3hwSDdIaTcx?=
 =?utf-8?B?cGNoVHdsbUxIMi9YekxoWVRwelZ2dC9PcEN5MXJkOGxJci9sVS9UQUxjbkZq?=
 =?utf-8?B?SWMxQmpqbFI3Y2IzUHNKZ0lBVndtSStZU1ExbTB3TzQvS2YwcHdkb2EyeVQ4?=
 =?utf-8?B?d2FBYWFmbFlvZmNsYllTWnQySkxRQTFpTjFXTXRQK1gveU8vN3h0RDF5RHpa?=
 =?utf-8?B?NkM0U3JqZURpVFFHNnE4SFRGaGFhR0hoU0ZMSEtyVEFyaWIyMzVsVm94N0R0?=
 =?utf-8?B?K1RBWGQwdlNCUWhFY0N6TlRKQ0t4VTZGUXZMcnlHODA3OFE2YkowVlc4b2Ru?=
 =?utf-8?B?VW1sQW5MSVlwd25qRjFoR3c1RVFTR1o0cjBJMS80T3BaVll2UzlWdmFFekJJ?=
 =?utf-8?B?MGdiMG1zbSswSUU3b1BVbTVWV1FtTUZZTFF4WWNGcVFkQ2dOQ1dIL2tQL3hq?=
 =?utf-8?B?cWo4Y3dCTHJmNEVWZ0huQ2VxUTFnbFNNOEYyaEcvZjk2QkdJQ3hKSHVhN3I2?=
 =?utf-8?B?WGdzeXZyRUFrSXlXNC80dHQ5aXFiamlMUmwxYzlNRDJqNStpMWtYSmtZRDJr?=
 =?utf-8?B?OXdvYTNNNWttKzV6RFJlWEJnQXEyZEVVZXBnZEV2UUxlak1TZGZRektWSXMw?=
 =?utf-8?B?OEdUT1dIQk1hNzJ0OHphU3N5ODZMc3FuMytPZkxRNjJ4ZjI1MGg2Z0syRWlp?=
 =?utf-8?B?RXhvd3BxYVIvVUY1MVcvcnhTelFRWFI3WVRMUnR6eWRDdDluc25ud05QRXVK?=
 =?utf-8?B?UXNJeEVXSkp6OWgvUlozdVJoZm8weUNwZFRqNlJ2cmlzTEJsVWkxSlVGaEJa?=
 =?utf-8?B?UldDTk8rb0plN0JsbFhydDYwdWpWbjl0VlFmRGJ4L1ZGSGMvcEhHRE0rWVNF?=
 =?utf-8?B?UmNLOExrM29PUkNRTXdlODRKOE5KTkhsOUZqMklvajZLOG9FSWFYYVY4V1RL?=
 =?utf-8?B?eHhaZ0lFR2dLMEU3ZjRLbmQ2by9jdUMwOHFSbE9MaW0rNjBta2xZVW9CQXdn?=
 =?utf-8?B?MjE3b1dYeW5rdWtjL05XRmhnQjJpa1J5R3dzdkwvZkxXNTMwQlpkTjFRaHVB?=
 =?utf-8?B?aUFWSFhZdUR4bFc4ZXozOGRIelhYcTBNT1VUUEZKNnRiZGhPbGl0Zmc2a0hU?=
 =?utf-8?B?amhJanA5bjIvOHo1bCs1UmpIby9zY1FKZmpnZTVGN2N5aW5LM0FJa0FIYmVj?=
 =?utf-8?B?bnNpUGMwRnVOZXBLMGtRdnFBOWtQSDF4MUpuS01WVHM2MUxFdUVYQWFTNjdr?=
 =?utf-8?B?eUxnVHFkV2pLaDhGUm1oUERBcWxMYnowMXd0VVNjL3MzeU5kWllhVXJ3dW9N?=
 =?utf-8?B?VmVqNXlpTEFDREVSQytyMlk0OVJXNWpEb2NMWFVqb2FXVWV2aHV4d3lSbWZ0?=
 =?utf-8?B?eldjRTNuSFNFc0lJbWpJc2NTeDVkVG5wbXFWQ3BLc3RuNyszUUdMM2hWRnB2?=
 =?utf-8?B?cXM0NjVrdDhUZzA1UkhpaXVYLzZiMUhuanhkM2w5RkhXdUdqdFZ2VXpndFdi?=
 =?utf-8?B?cVBTbWhqM25HeDI4eW4zT1BuTVBNRnM4b1lLK2lja2t5R2I3Ry9rMHM0VXY1?=
 =?utf-8?B?VEhmcWNpbWVtakczSU1LbTJWK3dURjJ0RlpSV05TNVphaFcyQmllRXoyZDlv?=
 =?utf-8?B?WkgyS2dGeWF6dEJsMjlvUFZNdUlIV2ZKVVhnMDBJbWMxTVlEZjVzQzdHMVRV?=
 =?utf-8?B?d2lFSnZSUURNQ1pIZUk3ZGZ1WVFGcm5ZZEdWYjBSVzUxUGZlckh3aWY2dzVO?=
 =?utf-8?B?bHhwMlMzN1JrWVJvWjRLS1RCSzgzZDczb2lPZEJVRjdGcjFNNzFxbnJLN0k0?=
 =?utf-8?B?NUFlVXJTSVAvREpQdkVSM2R0Y09FQXdPdS9GU1FaOXJiT3lYZFdabjlCMnp0?=
 =?utf-8?B?RGRiRWNqREZoN1I0UC9QdEZKKzE3MllzMGpkd1JrOGVydmZvcldqN24vR2Vp?=
 =?utf-8?B?UDRnM2F5WkU0OXJDemlMcGhRRG1XamdBTEMxNis2MGhTWGlxcHJqSWY0V1RH?=
 =?utf-8?B?dit2V01KMU5Qc1JmRkpLWXlkWlJUeUxiVXhNV2dEaUxid2FpckMxWVBWSDUz?=
 =?utf-8?Q?k0ezSGvuYqxwhBPYwXKt7Pw=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 7d977da1-ed8a-489b-0e09-08da01d3f0ea
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 13:51:41.9662
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: UyLQdNL7vxCEmeHQtVlVawDAumm7ur5Fyh0m4bO8h2Q8fKWRJos8WE87O3iyupvHg8FYfIClsWvOCiMGNFDSbw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR03MB4381
X-OriginatorOrg: citrix.com

On Tue, Mar 08, 2022 at 05:36:43PM +0000, Jane Malalane wrote:
> Introduce a new per-domain creation x86 specific flag to
> select whether hardware assisted virtualization should be used for
> x{2}APIC.
> 
> A per-domain option is added to xl in order to select the usage of
> x{2}APIC hardware assisted virtualization, as well as a global
> configuration option.
> 
> Having all APIC interaction exit to Xen for emulation is slow and can
> induce much overhead. Hardware can speed up x{2}APIC by decoding the
> APIC access and providing a VM exit with a more specific exit reason
> than a regular EPT fault or by altogether avoiding a VM exit.
> 
> On the other hand, being able to disable x{2}APIC hardware assisted
> virtualization can be useful for testing and debugging purposes.
> 
> Note: vmx_install_vlapic_mapping doesn't require modifications
> regardless of whether the guest has "Virtualize APIC accesses" enabled
> or not, i.e., setting the APIC_ACCESS_ADDR VMCS field is fine so long
> as virtualize_apic_accesses is supported by the CPU.
> 
> Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
> Signed-off-by: Jane Malalane <jane.malalane@citrix.com>
> ---
> CC: Wei Liu <wl@xen.org>
> CC: Anthony PERARD <anthony.perard@citrix.com>
> CC: Juergen Gross <jgross@suse.com>
> CC: Andrew Cooper <andrew.cooper3@citrix.com>
> CC: George Dunlap <george.dunlap@citrix.com>
> CC: Jan Beulich <jbeulich@suse.com>
> CC: Julien Grall <julien@xen.org>
> CC: Stefano Stabellini <sstabellini@kernel.org>
> CC: Christian Lindig <christian.lindig@citrix.com>
> CC: David Scott <dave@recoil.org>
> CC: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
> CC: "Roger Pau Monné" <roger.pau@citrix.com>
> 
> v6:
>  * Use ENODEV instead of EINVAL when rejecting assisted_x{2}apic
>    for PV guests
>  * Move has_assisted_x{2}apic macros out of an Intel specific header
>  * Remove references to Intel specific features in documentation
> 
> v5:
>  * Revert v4 changes in vmx_vlapic_msr_changed(), preserving the use of
>    the has_assisted_x{2}apic macros
>  * Following changes in assisted_x{2}apic_available definitions in
>    patch 1, retighten conditionals for setting
>    XEN_HVM_CPUID_APIC_ACCESS_VIRT and XEN_HVM_CPUID_X2APIC_VIRT in
>    cpuid_hypervisor_leaves()
> 
> v4:
>  * Add has_assisted_x{2}apic macros and use them where appropriate
>  * Replace CPU checks with per-domain assisted_x{2}apic control
>    options in vmx_vlapic_msr_changed() and cpuid_hypervisor_leaves(),
>    following edits to assisted_x{2}apic_available definitions in
>    patch 1
>    Note: new assisted_x{2}apic_available definitions make later
>    cpu_has_vmx_apic_reg_virt and cpu_has_vmx_virtual_intr_delivery
>    checks redundant in vmx_vlapic_msr_changed()
> 
> v3:
>  * Change info in xl.cfg to better express reality and fix
>    capitalization of x{2}apic
>  * Move "physinfo" variable definition to the beggining of
>    libxl__domain_build_info_setdefault()
>  * Reposition brackets in if statement to match libxl coding style
>  * Shorten logic in libxl__arch_domain_build_info_setdefault()
>  * Correct dprintk message in arch_sanitise_domain_config()
>  * Make appropriate changes in vmx_vlapic_msr_changed() and
>    cpuid_hypervisor_leaves() for amended "assisted_x2apic" bit
>  * Remove unneeded parantheses
> 
> v2:
>  * Add a LIBXL_HAVE_ASSISTED_APIC macro
>  * Pass xcpyshinfo as a pointer in libxl__arch_get_physinfo
>  * Add a return statement in now "int"
>    libxl__arch_domain_build_info_setdefault()
>  * Preserve libxl__arch_domain_build_info_setdefault 's location in
>    libxl_create.c
>  * Correct x{2}apic default setting logic in
>    libxl__arch_domain_prepare_config()
>  * Correct logic for parsing assisted_x{2}apic host/guest options in
>    xl_parse.c and initialize them to -1 in xl.c
>  * Use guest options directly in vmx_vlapic_msr_changed
>  * Fix indentation of bool assisted_x{2}apic in struct hvm_domain
>  * Add a change in xenctrl_stubs.c to pass xenctrl ABI checks
> ---
>  docs/man/xl.cfg.5.pod.in              | 15 +++++++++++++++
>  docs/man/xl.conf.5.pod.in             | 12 ++++++++++++
>  tools/golang/xenlight/helpers.gen.go  | 12 ++++++++++++
>  tools/golang/xenlight/types.gen.go    |  2 ++
>  tools/include/libxl.h                 |  7 +++++++
>  tools/libs/light/libxl_arch.h         |  5 +++--
>  tools/libs/light/libxl_arm.c          |  7 +++++--
>  tools/libs/light/libxl_create.c       | 22 +++++++++++++---------
>  tools/libs/light/libxl_types.idl      |  2 ++
>  tools/libs/light/libxl_x86.c          | 27 +++++++++++++++++++++++++--
>  tools/ocaml/libs/xc/xenctrl.ml        |  2 ++
>  tools/ocaml/libs/xc/xenctrl.mli       |  2 ++
>  tools/ocaml/libs/xc/xenctrl_stubs.c   |  2 +-
>  tools/xl/xl.c                         |  8 ++++++++
>  tools/xl/xl.h                         |  2 ++
>  tools/xl/xl_parse.c                   | 16 ++++++++++++++++
>  xen/arch/x86/domain.c                 | 28 +++++++++++++++++++++++++++-
>  xen/arch/x86/hvm/vmx/vmcs.c           |  4 ++++
>  xen/arch/x86/hvm/vmx/vmx.c            | 13 ++++---------
>  xen/arch/x86/include/asm/hvm/domain.h |  6 ++++++
>  xen/arch/x86/include/asm/hvm/hvm.h    |  6 ++++++
>  xen/arch/x86/traps.c                  |  5 +++--
>  xen/include/public/arch-x86/xen.h     |  2 ++
>  23 files changed, 179 insertions(+), 28 deletions(-)
> 
> diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in
> index b98d161398..b4239fcc5e 100644
> --- a/docs/man/xl.cfg.5.pod.in
> +++ b/docs/man/xl.cfg.5.pod.in
> @@ -1862,6 +1862,21 @@ firmware tables when using certain older guest Operating
>  Systems. These tables have been superseded by newer constructs within
>  the ACPI tables.
>  
> +=item B<assisted_xapic=BOOLEAN>
> +
> +B<(x86 only)> Enables or disables hardware assisted virtualization for
> +xAPIC. With this option enabled, a memory-mapped APIC access will be
> +decoded by hardware and either issue a more specific VM exit than just
> +an EPT fault, or altogether avoid a VM exit. The
> +default is settable via L<xl.conf(5)>.

Sorry, replied to a v2 version of the patch instead of this one. Could
we use 'p2m fault' or maybe 'guest physmap fault' intead of EPT (as
that's Intel specific).

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 14:01:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 14:01:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287870.488147 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRwsm-00022G-AN; Wed, 09 Mar 2022 14:01:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287870.488147; Wed, 09 Mar 2022 14:01:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRwsm-000229-7B; Wed, 09 Mar 2022 14:01:40 +0000
Received: by outflank-mailman (input) for mailman id 287870;
 Wed, 09 Mar 2022 14:01:38 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRwsk-00021z-L2; Wed, 09 Mar 2022 14:01:38 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRwsk-0005fV-Jb; Wed, 09 Mar 2022 14:01:38 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nRwsk-0005oZ-1H; Wed, 09 Mar 2022 14:01:38 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nRwsj-0002zG-UR; Wed, 09 Mar 2022 14:01:37 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=GyLV7MncUkVuZIT3DbIhgFCzYCMEVsl8kCzmqvHZVd0=; b=UZNtrlVSir0X4ltHUy0YGHfRQM
	1DuWR5F8ZkYVYgWTye0FyZLm3Dg/C+49i7GsIr/RmyzoY2Byq3XzFPo13PLyf7Vsxteu/Nh1zspnK
	6v7il2/B1D+nJJ6H0LO7Ya2oZhrcIrC0pGCvzvCXNa8LXpTv1eTR+EG+14ykqLJqHDmY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168484-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.16-testing test] 168484: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-4.16-testing:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=c374a8c5cc74535e16410b7a0d9e92bf5de54f79
X-Osstest-Versions-That:
    xen=0941d6cb2383c4e87d7f53f1df74e8850e1649bc
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 09 Mar 2022 14:01:37 +0000

flight 168484 xen-4.16-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168484/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168136
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168136
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168136
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168136
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168136
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168136
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168136
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168136
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168136
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168136
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168136
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168136
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  c374a8c5cc74535e16410b7a0d9e92bf5de54f79
baseline version:
 xen                  0941d6cb2383c4e87d7f53f1df74e8850e1649bc

Last test of basis   168136  2022-02-16 15:11:54 Z   20 days
Testing same since   168484  2022-03-08 18:08:10 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bertrand Marquis <bertrand.marquis@arm.com>
  Julien Grall <julien@xen.org>
  Rahul Singh <rahul.singh@arm.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   0941d6cb23..c374a8c5cc  c374a8c5cc74535e16410b7a0d9e92bf5de54f79 -> stable-4.16


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 14:36:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 14:36:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287881.488158 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRxQ3-0005RD-5X; Wed, 09 Mar 2022 14:36:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287881.488158; Wed, 09 Mar 2022 14:36:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRxQ3-0005R6-1i; Wed, 09 Mar 2022 14:36:03 +0000
Received: by outflank-mailman (input) for mailman id 287881;
 Wed, 09 Mar 2022 14:36:01 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=gSYI=TU=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRxQ1-0005R0-A0
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 14:36:01 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 36d22fea-9fb6-11ec-8539-5f4723681683;
 Wed, 09 Mar 2022 15:35:49 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2113.outbound.protection.outlook.com [104.47.18.113]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-28-ii-71dT0Oput7F-Bez3AGg-1; Wed, 09 Mar 2022 15:35:57 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB8PR04MB6764.eurprd04.prod.outlook.com (2603:10a6:10:10d::31)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Wed, 9 Mar
 2022 14:35:55 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Wed, 9 Mar 2022
 14:35:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 36d22fea-9fb6-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646836558;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=/69ovZYZIr5K1Q61KTBcqWMzdtZcA0k2GbH+a2AQAus=;
	b=Ssfg0VqoGFgUyXjx6R/PFv2pmq2hgX5+c4Vm9gw1666l5OX6MjAERPXDDLZ7MkG78SHkeL
	UI887MOPRY14Abo7k26GyrnhceD/cNnj3rzTjX3i4Tcg2zFhsMemllJIi1idq4Eyeb5k8t
	6PBaci5tRmucXW2bR/EjdUVtOuh7QM4=
X-MC-Unique: ii-71dT0Oput7F-Bez3AGg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=L7ALvTQre29P4uR6ya5uY190TIPWemUoYan0Cbf6uuvS8GPl5hkpA1qo8Y3p0pZYqWhmGAlCcTWt9pDaFSdZbOBrdVXszgXQY54ejw72ZRL5ROBtK6Rvw5WkhJl6yr2MyeJYF0N6UVN8aNa5BWqDLFTmGCl+IbS650sr5x61WbpKMKgAGPH3R0J0iitDfhAezTyHArqs6EQFydk0srUbHifVd25cU60dwKotH6Y+f+0Cbe69oubSLC/jiuqe4cSYccUCpVYBju2aYbJNxTBvW7EXoZZeL4pfryfq+uumeYtdAxonMa3PwgfY/hX2+/iiN1VZmmlZ0L53iGfmxRhS2A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=/69ovZYZIr5K1Q61KTBcqWMzdtZcA0k2GbH+a2AQAus=;
 b=KePb0yY+ndppQ6lsGou0D1qEW46sfjrdNYsWdTFkm4Us7gqopE1z4Nr2aew0FgZ3Gh5Ch/XJ3MgUhScA/eZbO7BWu1OwARkWklcAl71JI//04e80oWHIeB/WHxBMMYZopHXmcUGiJd/WTVhAzvVbZgdUIz+EyBdP+Rkmhz7Rc7szV6EsV31pimPSvbyarcvjpTG9MHPv5VhVLikiok4RMiLGfIvCttzKZ20UX5FwKMk1S/Rw12JhMAKlO0/dMwhYSIkvReDpsUcueORlFuWxAouhpPNChBLdv1LUTyEr7+eQBMHyvkT1xojfrZkuxd3GGf8HJVmI6spBmCYl2AQnqA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <b2448d6b-ed8b-5c83-b49e-4f8f2582a0c0@suse.com>
Date: Wed, 9 Mar 2022 15:35:52 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH 19/36] xen/arch: introduce cache-coloring allocator
Content-Language: en-US
To: Marco Solieri <marco.solieri@minervasys.tech>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>, xen-devel@lists.xenproject.org
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-20-marco.solieri@minervasys.tech>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220304174701.1453977-20-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM5PR0601CA0083.eurprd06.prod.outlook.com
 (2603:10a6:206::48) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 24f8faee-31eb-486e-a2a1-08da01da1e5d
X-MS-TrafficTypeDiagnostic: DB8PR04MB6764:EE_
X-Microsoft-Antispam-PRVS:
	<DB8PR04MB6764D83D65F2094A86F81CD7B30A9@DB8PR04MB6764.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2616005)(186003)(2906002)(26005)(316002)(508600001)(53546011)(6512007)(5660300002)(6666004)(83380400001)(86362001)(6506007)(8936002)(6916009)(30864003)(38100700002)(31696002)(36756003)(31686004)(7416002)(6486002)(4326008)(8676002)(66556008)(66946007)(66476007)(54906003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?QVFKSTFPalh2d0JKODFFdHhsUTZBcHdXRi9tT0hFVXBhT1FWNmdVWmRRWWtX?=
 =?utf-8?B?V3hXRnpIVGJWUnh1bG8yTjhSZEtsWW83ejd4NHVGVk9LVEw5aDJVcmxZbFpw?=
 =?utf-8?B?alFyS2VCNkw3MG05SWVldmNacUNMcDRiWEIyNk1SOXR2MU40dmtZREF0cHEw?=
 =?utf-8?B?UjAza0dxY05kMHVra0wwMEZ6UXBmYUlBUmtrelFBakJyYnBtZFB5dXQ3ZkpN?=
 =?utf-8?B?WXhndnViOXlvSEV1L01iMEJ4dm1MUExGK2IwT25iK1NCZU1ZVHltb3NSdXg0?=
 =?utf-8?B?alhCUW1INlRPSStvc0QzUklOakVDdFN4em11RTdTT2s0c3ZFeGtMcUlaMG1E?=
 =?utf-8?B?Wk55emZxMVYvRkVhY0lHcE16d3M0RUkrcFZFb3FkRHdINXM5WDBmc0xGMEd3?=
 =?utf-8?B?b25SdGphVGI4eHdqVzhDWm4zQnBnbVIrb0xyejRoTnhBOVpGYkdTZnpCTXd5?=
 =?utf-8?B?eW5zUmZKRXYwWjd3M3JZeHU2eFZJeDNqaGRFR1JXeTdoQ00raERyMlBBTnRS?=
 =?utf-8?B?UEIzdEZlaFJiKzlkbW8rY1RBR2lacEFoM25ZWlJtSWwvZDhmaHJoQ1JDcjhF?=
 =?utf-8?B?dVgydjY2Skg0S2hXNks0Vnk3Y2FKbHlicUMrWHBOQ1Y1aHVsSlkzRG5aV3Zi?=
 =?utf-8?B?YjFqVHNsZWNNeXUvcmNsWEVnbEtGT1NJQkpBeFVvSUFMeHlKc0RGZVdLM1dK?=
 =?utf-8?B?Q1NtMmNKdU5mdDR0UXRTWW0vQnkzN0g3aHhwSUNMUDg1b21pQ3FLbW10ZFNS?=
 =?utf-8?B?UHpyU0dPdGhVWXgybS9ibGFNeEd4dzRWdmt4dUJqdktTaGordTBzcjNBcW5L?=
 =?utf-8?B?NWtDL0ZNTGV0K243aU9ONyt4Si9sdFFyOG16ODJFQWREZ1FrVEpXdFRtSThS?=
 =?utf-8?B?eUsxVGNkclVhOGRiT0RuMXZKVzJ0SEFvcU9iSlZBRlR0cnBiamNLMW1kNXB3?=
 =?utf-8?B?bGt3LzNqY2NoTXpvWWJody8vTDNJMm1SNVpnUmdMWEpuNUNOOHNVYmY0VWhJ?=
 =?utf-8?B?aWhqRW9GNHJnQ0xMQVVMK1FnSnRMcGNHZnNTM25RUkhETmlpQXhGK1diWHNn?=
 =?utf-8?B?aFlHcGwwdEJGTVBJRUxLY1FsVWloRjlPc2RlUjVGY1p1Ni9XckZ1WThUS2Yz?=
 =?utf-8?B?Y2RJRXFJUFJ1eUpwVkplbEZqNVBqSUNCRkFrVTA3ZnJkcEVZdnpVTjNMK0s4?=
 =?utf-8?B?VEorbms1NUVSQnZyZ0twSTNjK20wbkw0Q0sraDJZMjlTV3BjMDdKN1dWbWx2?=
 =?utf-8?B?c2NxMVNCUHJWc0Q5YUlUYVRWRUdTMERndml5RW5ha0N5cjNKR2JlME9sbjNm?=
 =?utf-8?B?U09aZjZ6dCtzaklmOFd5QVk3RnpFY1huenIyUWxkVmdFNlJRMkNMYk94RmZS?=
 =?utf-8?B?aW1LZnBzS1lRSmM2YWFRVFd5bkhGOWkrcXM0L0NNZVphbVRXQmNFSWN4T2ZP?=
 =?utf-8?B?clhmc3JYRDJrZXVCOTRaOE0rcDJvS0tYUEpBYi9OUWsxZlZ5OVVDdHNLOEp1?=
 =?utf-8?B?ei9HNXlqWjRobWFBeHVhb0RyS0Q1d0p1TEJHNEN4M2FtRjJ1T3JQZnIvMGFh?=
 =?utf-8?B?REtXZlQzVWhvOU5iVjNoNDJjd3B0SGpoYUMvSUdHQzBjRXpQaHI2L2NHSEtD?=
 =?utf-8?B?eSt3MkhKVXVwb0JacERvUW1DTFF5M2t3STlPT3RoN3JiZzNGb040UXFZaTN1?=
 =?utf-8?B?cnE2d1l5NGt5Z0hxMGJiQkJ0eXJmbVVaVE1ZL2RGekVTSzNvWGtkeVZIZjkr?=
 =?utf-8?B?ZG9YRXZEblVwWHMybXM3c1VlU0wwUTd4bkdWQ0VRbnk2dDB6TUlGOS9wK3dm?=
 =?utf-8?B?QUU3cnFVOGg0V3RsbU1ueHE1T3BqNFYzRkIwRUdEVlJIRlNRR0d4WEw5SXVs?=
 =?utf-8?B?NjZVOFhkUUpLZkk0T2VxYjhZOEVJTXozZjhsSUQ5TnNSTTBSZHRIKzM4WklO?=
 =?utf-8?B?M0lJZVN1Q1RiMjlBeUtKOTJ6Uk9WWk43ckZnbHQ0NU9Va2lnSUdmYlRUcHBI?=
 =?utf-8?B?d1N2Rm9wMVp6UnpYdkJ0THpTZVFPOUVWM1pKTUxiTXlnRmpSR2FUTitPcXI4?=
 =?utf-8?B?VUFGT240RUc3QVBzNGJYc3hUd0lYanVkRUo1L295WEVjM0ZpQVEzWWFJbmU3?=
 =?utf-8?B?MkJmYnpSbUo0TW9wYmhMOExWVitGTmxSaFVjZE5vejIxZU83VlN3QU85WTJK?=
 =?utf-8?Q?mYKLdHk+FZUWaTtTUI540T4=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 24f8faee-31eb-486e-a2a1-08da01da1e5d
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 14:35:55.3422
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: MB7UUt7+RfdHimDtfUK7mYl+R4AmSWe10RRbfGw1j5I3SnSxiAJsx7OjYTC6qwRRA2qgYx8/wUPA9C598TM9zw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR04MB6764

On 04.03.2022 18:46, Marco Solieri wrote:
> @@ -438,6 +441,263 @@ mfn_t __init alloc_boot_pages(unsigned long nr_pfns, unsigned long pfn_align)
>  
>  
>  
> +static DEFINE_SPINLOCK(heap_lock);

Please take the opportunity and shrink the number of consecutive blank lines
above here.

> +
> +#ifdef CONFIG_COLORING
> +/*************************
> + * COLORED SIDE-ALLOCATOR
> + *
> + * Pages are stored by their color in separated lists. Each list defines a color
> + * and it is initialized during end_boot_allocator, where each page's color
> + * is calculated and the page itself is put in the correct list.
> + * After initialization we have N list where N is the number of maximum
> + * available colors on the platform.
> + * All the lists' heads are stored as element in an array with size N-1 using
> + * the following schema:
> + * array[X] = head of color X, where X goes from 0 to N-1
> + */
> +typedef struct page_list_head color_list;

color_list_t, to make it easy to recognize this as a type (rather than
a variable name)?

> +static color_list *color_heap;

__ro_after_init or, if Arm still hasn't got support for  that, at least
__read_mostly.

> +static long total_avail_col_pages;

Can this go negative? If not, unsigned long please.

> +static u64 col_num_max;

No new uses of u<N> or s<N> please. They're being phased out, and C99
types should be used instead.

> +static bool color_init_state = true;

This variable looks to be local to init_col_heap_pages() - please move
it there (provided it's needed in the first place: it's no clear why
you don't use an initcall instead).

> +#define page_to_head(pg) (&color_heap[color_from_page(pg)])
> +#define color_to_head(col) (&color_heap[col])
> +
> +/* Add page in list in order depending on its physical address. */
> +static void page_list_add_order(struct page_info *pg, struct list_head *head)

I guess you mean struct page_list_head * here?

> +{
> +    struct page_info *pos;
> +
> +    /* Add first page after head */
> +    if ( page_list_empty(head) )
> +    {
> +        page_list_add(pg, head);
> +        return;
> +    }
> +
> +    /* Add non-first page in list in ascending order */
> +    page_list_for_each_reverse(pos, head)
> +    {
> +        /* Get pg position */
> +        if ( page_to_maddr(pos) <= page_to_maddr(pg) )

Wouldn't it be a bug if the two were equal? If so, perhaps better
ASSERT() or even BUG_ON() accordingly?

> +        {
> +            /* Insert pg between pos and pos->list.next */
> +            page_list_add(pg, &pos->list);

The 2nd parameter of page_list_add() is struct page_list_head *, not
struct page_list_entry *. I guess you won't get away without introducing
a new accessor.

> +            break;
> +        }
> +
> +        /*
> +         * If pos is the first element it means that pg <= pos so we have
> +         * to insert pg after head.
> +         */
> +        if ( page_list_first(head) == pos )
> +        {
> +            page_list_add(pg, head);
> +            break;
> +        }

The way it's written it's not immediately obvious that the passed in page
would actually be put anywhere on the list by the time the function
returns. Furthermore this if() doesn't look to be necessary to be
evaluated on every loop iteration. Instead it could apparently live
_after_ the loop, requiring use of "return" instead of "break" further up.

> +    }
> +}

This function dealing with a page at a time while linearly scanning the
list looks to be pretty inefficient, the more that it'll be a common
case that callers have to deal with multiple pages at a time. Sadly it is
not clear how many colors there may be (without hunting down the origin
of max_col_num, which get_max_colors() returns, in the earlier 18
patches), and hence how long these lists may grow.

> +/* Alloc one page based on domain color configuration */
> +static struct page_info *alloc_col_heap_page(
> +    unsigned int memflags, struct domain *d)
> +{
> +    struct page_info *pg, *tmp;
> +    bool need_tlbflush = false;
> +    uint32_t cur_color;
> +    uint32_t tlbflush_timestamp = 0;
> +    uint32_t *colors = 0;

Please consult ./CODING_STYLE for when it is appropriate to use fixed-
width types.

> +    int max_colors;
> +    int i;

I don't suppose either of these can go negative, so unsigned int please.
(Just like other remarks - please consider applicable to the entire
series.)

> +    colors = d->colors;
> +    max_colors = d->max_colors;

Please make these the initializers of the variables, which will also
avoid using 0 where NULL is meant above. It also looks as if these were
the only two uses of "d" in the function. If so, please consider making
colors and max_colors the function parameters instead. Or else d likely
wants to be pointer to const (and colors as well as it looks; generally
please use const on pointed-to types wherever possible).

> +    spin_lock(&heap_lock);
> +
> +    tmp = pg = NULL;
> +
> +    /* Check for the first pg on non-empty list */
> +    for ( i = 0; i < max_colors; i++ )
> +    {
> +        if ( !page_list_empty(color_to_head(colors[i])) )
> +        {
> +            tmp = pg = page_list_last(color_to_head(colors[i]));
> +            cur_color = d->colors[i];
> +            break;
> +        }
> +    }
> +
> +    /* If all lists are empty, no requests can be satisfied */
> +    if ( !pg )
> +    {
> +        spin_unlock(&heap_lock);
> +        return NULL;
> +    }

I'm not convinced this is a useful thing to have. The identical
construct below the subsequent loop will deal with this case quite fine
afaict.

> +    /* Get the highest page from the lists compliant to the domain color(s) */
> +    for ( i += 1; i < max_colors; i++ )

Perhaps easier as

    while ( ++i < max_colors )

?

> +    {
> +        if ( page_list_empty(color_to_head(colors[i])) )
> +        {
> +            printk(XENLOG_INFO "List empty\n");

This is liable to be too noisy even if converted to dprintk(). Please
drop.

> +            continue;
> +        }
> +        tmp = page_list_last(color_to_head(colors[i]));
> +        if ( page_to_maddr(tmp) > page_to_maddr(pg) )
> +        {
> +            pg = tmp;
> +            cur_color = colors[i];

You only ever write this variable - please drop such, or introduce them
only once actually needed (if e.g. in a later patch).

> +        }
> +    }
> +
> +    if ( !pg )
> +    {
> +        spin_unlock(&heap_lock);
> +        return NULL;
> +    }
> +
> +    pg->count_info = PGC_state_inuse;
> +
> +    if ( !(memflags & MEMF_no_tlbflush) )
> +        accumulate_tlbflush(&need_tlbflush, pg,
> +                            &tlbflush_timestamp);
> +
> +    /* Initialise fields which have other uses for free pages. */
> +    pg->u.inuse.type_info = 0;
> +    page_set_owner(pg, NULL);

This would now become the 3rd instance - time to consider a small
helper function?

> +    flush_page_to_ram(mfn_x(page_to_mfn(pg)),
> +                      !(memflags & MEMF_no_icache_flush));
> +
> +    page_list_del(pg, page_to_head(pg));
> +    total_avail_col_pages--;
> +
> +    spin_unlock(&heap_lock);
> +
> +    if ( need_tlbflush )
> +        filtered_flush_tlb_mask(tlbflush_timestamp);
> +
> +    return pg;
> +}
> +
> +struct page_info *alloc_col_domheap_page(
> +    struct domain *d, unsigned int memflags)
> +{
> +    struct page_info *pg;
> +
> +    ASSERT(!in_irq());
> +
> +    /* Get page based on color selection */
> +    pg = alloc_col_heap_page(memflags, d);
> +
> +    if ( !pg )
> +    {
> +        printk(XENLOG_INFO "ERROR: Colored Page is null\n");
> +        return NULL;
> +    }
> +
> +    /* Assign page to domain */
> +    if ( d && !(memflags & MEMF_no_owner) &&
> +        assign_page(pg, 0, d, memflags) )
> +    {
> +        free_col_heap_page(pg);
> +        return NULL;
> +    }
> +
> +    return pg;
> +}

So this is really only providing a single order-0 page. From the cover
letter it didn't sound like you were aiming at such a limited use case.
It's also not listed under "Known limitations" there that large pages
don't even have provisions made for.

> +void free_col_heap_page(struct page_info *pg)
> +{
> +    /* This page is not a guest frame any more. */
> +    pg->count_info = PGC_state_free;
> +
> +    page_set_owner(pg, NULL);
> +    total_avail_col_pages++;
> +    page_list_add_order( pg, page_to_head(pg) );

Nit: Stray blanks immediately inside the parentheses.

> +}

How does this fit into the get_page() / put_page() machinery? You
don't alter free_domheap_pages(), after all.

> +static inline void init_col_heap_pages(struct page_info *pg, unsigned long nr_pages)

Why inline? I guess this might be to silence the compiler warning
about the function being unused, but then this only means that you
want to introduce the function once it's needed. Then it would
also be possible to tell whether the function wants to be __init.

Additionally the line is too long.

> +{
> +    int i;
> +
> +    if ( color_init_state )
> +    {
> +        col_num_max = get_max_colors();
> +        color_heap = xmalloc_array(color_list, col_num_max);
> +        BUG_ON(!color_heap);
> +
> +        for ( i = 0; i < col_num_max; i++ )
> +        {
> +            printk(XENLOG_INFO "Init list for color: %u\n", i);

Again too noisy. Such may be okay in a RFC series, but should have been
dropped for a "normal" submission.

> +            INIT_PAGE_LIST_HEAD(&color_heap[i]);
> +        }
> +
> +        color_init_state = false;
> +    }
> +
> +    printk(XENLOG_INFO "Init color heap pages with %lu pages for a given size of 0x%"PRIx64"\n",

While you shouldn't split the format string across lines, you should
take all other available measures to limit line length. Furthermore
please consider using the shorter %#x form here and elsewhere. Overall:

    printk(XENLOG_INFO
           "Init color heap with %lu pages for a given size of 0x%"PRIx64"\n",

And even then the two values logged are redundant with one another,
so things can further be shortened here.

> +            nr_pages, nr_pages * PAGE_SIZE);

Nit: Indentation.

> +    printk(XENLOG_INFO "Paging starting from: 0x%"PRIx64"\n", page_to_maddr(pg));
> +    total_avail_col_pages += nr_pages;
> +
> +    for ( i = 0; i < nr_pages; i++ )
> +    {
> +        pg->colored = true;
> +        page_list_add_order(pg, page_to_head(pg));
> +        pg++;
> +    }
> +}
> +
> +static inline bool is_page_colored(struct page_info *pg)
> +{
> +        return pg->colored;

Nit: Indentation again (and more instance below).

> +}
> +
> +static void dump_col_heap(unsigned char key)
> +{
> +    struct page_info *pg;
> +    unsigned long size;
> +    unsigned int i;
> +
> +    printk("Colored heap info\n");
> +    for ( i = 0; i < col_num_max; i++ )
> +    {
> +        printk("Heap[%u]: ", i);
> +        size = 0;
> +        page_list_for_each( pg, color_to_head(i) )
> +        {
> +            BUG_ON(!(color_from_page(pg) == i));
> +            size++;
> +        }

How long is this going to take on a decently sized system? At the
very least you'll need to call process_pending_softirqs() every
once in a while. But this may be taking too long this way anyway.

> +        printk("%lu pages -> %lukB free\n", size, size << (PAGE_SHIFT - 10));

Again the same information is being logged twice.

> +    }
> +
> +    printk("Total number of pages: %lu\n", total_avail_col_pages);

Since the value logged isn't calculated locally, may I suggest to
merge this into the initial printk()?

> +}
> +#else /* !CONFIG_COLORING */
> +#define init_col_heap_pages(x, y) init_heap_pages(x, y)
> +
> +inline struct page_info *alloc_col_domheap_page(
> +	struct domain *d, unsigned int memflags)
> +{
> +	return NULL;
> +}
> +
> +inline void free_col_heap_page(struct page_info *pg)
> +{
> +	return;
> +}
> +
> +static inline bool is_page_colored(struct page_info *pg)
> +{
> +        return false;
> +}

Why are any of these needed? And if any are needed, please drop
inline once again.

> @@ -2600,6 +2859,9 @@ static void cf_check dump_heap(unsigned char key)
>  static __init int cf_check register_heap_trigger(void)
>  {
>      register_keyhandler('H', dump_heap, "dump heap info", 1);
> +#ifdef CONFIG_COLORING
> +    register_keyhandler('c', dump_col_heap, "dump coloring heap info", 1);

'c' already has a use on x86. Please avoid such collisions, even if
initially you're targeting Arm only. I don't see why a separate key
is needed anyway - can't you just extend dump_heap()?

> --- a/xen/include/xen/mm.h
> +++ b/xen/include/xen/mm.h
> @@ -131,6 +131,11 @@ unsigned int online_page(mfn_t mfn, uint32_t *status);
>  int offline_page(mfn_t mfn, int broken, uint32_t *status);
>  int query_page_offline(mfn_t mfn, uint32_t *status);
>  
> +/* Colored suballocator. */
> +struct page_info *alloc_col_domheap_page(
> +    struct domain *d, unsigned int memflags);
> +void free_col_heap_page(struct page_info *pg);

These two should imo represent a pair, i.e. be named similarly.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 14:45:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 14:45:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287888.488169 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRxZE-0006ve-2v; Wed, 09 Mar 2022 14:45:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287888.488169; Wed, 09 Mar 2022 14:45:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRxZD-0006vX-W9; Wed, 09 Mar 2022 14:45:31 +0000
Received: by outflank-mailman (input) for mailman id 287888;
 Wed, 09 Mar 2022 14:45:30 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=gSYI=TU=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRxZC-0006vQ-FS
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 14:45:30 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 90820e00-9fb7-11ec-8539-5f4723681683;
 Wed, 09 Mar 2022 15:45:29 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2113.outbound.protection.outlook.com [104.47.17.113]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-38-EFg7FMO2NBO-dO3E8qdqDg-1; Wed, 09 Mar 2022 15:45:27 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM6PR04MB4293.eurprd04.prod.outlook.com (2603:10a6:209:42::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Wed, 9 Mar
 2022 14:45:26 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Wed, 9 Mar 2022
 14:45:26 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 90820e00-9fb7-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646837129;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=S8FjfXobxanBccpWmkWYP1b5RdC8oUZVydx3gvwbpUk=;
	b=brGSJBqAFAAeRFSP1sfxhj77aBGwu0m0ZPsRqxrAG4XvDTGLUqDYDfgGuKH1aerDb+LNrR
	Atlc2NyfHjOFfdN/QM9JDrH3wvFJ2+qqLyWrneJY1GjYFlqFbP36FrCxnKevV7vyP6612O
	2k4xaMLr/zXcgp5J+PnRgOIUexplX4A=
X-MC-Unique: EFg7FMO2NBO-dO3E8qdqDg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=UtaOlNLMH8ilsewrf2j88xFLE8WaAhKg2mAQo5T04/CVlQQZboPSQa6JkUquI6ki9CLrd9XkusNz0XV7ceYKJCo0OQG1Evds73PMSaV4KjCGL6etuzaWfqrTspQwygVDQ3573vZFZorQ9aWxF/Tm3j6oV1WRM5Fmn9IF1R073ECneno49qcA+1va+GARBjBgMwEQmbcmGpjAp2pvQZknI0m10egbRgCAnsZIUux9CQwJwQBi7hK1CJbqPbwbsHWsLWnXBJIOtBBklu9GINnEClIE5IqKyLmBJiE9DrZqRe6RxLkOHY54+i6ITjlGxXJDHJwyM+vi3oD+BtPiVCUsFg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=S8FjfXobxanBccpWmkWYP1b5RdC8oUZVydx3gvwbpUk=;
 b=d0hm5wxLZGLjWW4Cd6zvBhPkjiqX8V/tlPZS1hYpHgjbcB4PR96DwuLkRvUVScaF2MYuheI5H5XX46fxN0DlOSUeZ9EwIAuat5aNMy/gwRxxzUs5m70Ww1t1IdriWuSQ7jygQJdfRNCOdNQj6ufYgY2IOAuHHCxeRC580SM9F8zTmAWtaXGN41zCDKw8VgoCdCgEYWIPCHWkt8eFJNFFrXTOwCJo4drcMDaVuCLQVgr4REyiAccLyeBNZBTJwZJ7/nMkGNObc2MYE/VbOSsNuO1vK7UzIIRVaB/Wj0NYDJVwcc9AnzKAP+4BMILwAvmrfSqeFJ1JWc8xWOpBF8bGPw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <438cd24f-cbe4-5406-ab7f-3a6e599907c3@suse.com>
Date: Wed, 9 Mar 2022 15:45:24 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH 20/36] xen/common: introduce buddy required reservation
Content-Language: en-US
To: Marco Solieri <marco.solieri@minervasys.tech>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>, xen-devel@lists.xenproject.org
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-21-marco.solieri@minervasys.tech>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220304174701.1453977-21-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR06CA0361.eurprd06.prod.outlook.com
 (2603:10a6:20b:460::13) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 542c362a-910d-4162-806d-08da01db72eb
X-MS-TrafficTypeDiagnostic: AM6PR04MB4293:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB4293C45A37EF6FFC49156AC1B30A9@AM6PR04MB4293.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(26005)(2616005)(508600001)(186003)(6512007)(6506007)(4326008)(66946007)(86362001)(31686004)(53546011)(31696002)(5660300002)(6486002)(36756003)(54906003)(8936002)(7416002)(8676002)(2906002)(66476007)(66556008)(38100700002)(6916009)(316002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?TVVTM3kzVWorQ245ZlJiMWpXT2lVUC8veG5XOGM1bGc1Z2c4NlMxbTg2MFVT?=
 =?utf-8?B?c00wdERaTFZ2VnRaK3diNnp6cHlEZkQzaTliL1NJWi9DTUM5WTgxK3hqTlhN?=
 =?utf-8?B?SC8wMHloWmZ6T2VQelBRNlFJcExQVE5TQk9Yak5WR090cEJIZ3ZBSzV5Mmt1?=
 =?utf-8?B?NDc1b25ITWRNdVl2TFdvaU10d1Y0alJZNVZaaFZxR0l5S0VTVW9vUFdMRldr?=
 =?utf-8?B?RXpIYmVzZ0NVM0Y2dmVrVFVrcFczUHprd3pVb0RKV3NLSy9yN2wvamkxUmI1?=
 =?utf-8?B?SzlGbVdYNWFMcnlHRHFPbHZNL3ZBYUVzQ0FLMndUeWJsTEpSbzVsWHUzWG1h?=
 =?utf-8?B?NUdXUjVFTzhUdlJlUXhSY2doV0F5SFlNdVdQNkw5UjVpSWdsenFvcGozcHZa?=
 =?utf-8?B?TGZUV3p2aG9ja2VUMlVtemUxd2hUOG5wemVHU0t2UURNa2MwbXRJdDNMVVNT?=
 =?utf-8?B?NVBQOWtZTjNrVnQ2VGh6bllMdjVkN2FseFZsTW9ZRWlLTXpRMWY4RnQyNGNS?=
 =?utf-8?B?bzJIL1pHakJ3UzhzbWJpSkZCTHpHbG9HVmdIcWlaT0xDLy9ORnJzRUMzOFVR?=
 =?utf-8?B?R0x0T2NGUXZWL0M4SGZpZWRhQ1FFSUxtT1ZPTEw1ZHRmSzhDRXpkNFVZbkN1?=
 =?utf-8?B?dkk4WmFnVHIrak5DOXBxaGZvV1dQYTNDTjlTNHMyWU5KRmx5SzRCZ25JdEtz?=
 =?utf-8?B?YjNVckJSdHpQMFVRTC9ScUtVYmo1WnR3d29NYW0xSjNzT2hYK0hwM2hJRlFq?=
 =?utf-8?B?dGwwbFZWMkxNR2tGa2VxdEUxMFN4aDNDZnBmRnYrU0ZQb21PQ1FFK2tEUkc2?=
 =?utf-8?B?M2FTU1AwZ0pzL01WTWJnVk42WVZRUWUvVUt0MWswellWakduMndYK0wzRmln?=
 =?utf-8?B?YlJ5dEgrbEs0alQydEVDVTF1cVY4eTBFNGdEMHRHTldjRG5VWnRoN2VXOXVY?=
 =?utf-8?B?S0RHSGJaOHk5NFREZjlGdGQrb2hBREU2RmZQekNvZWtGMkdQM01IZVVoaHZR?=
 =?utf-8?B?SVhoNzNvWk5mV3p0cFk0ZEtMaktnaUJLbnEwaHpQQ2N3a2NvSXAraXhaTmJs?=
 =?utf-8?B?YmZqc0lJSmdSY3d4MUlmQldwb1Rhb3d2VXFTMWNzVGdQNlRCN2tNd1JuUjlZ?=
 =?utf-8?B?RWNucHdnTVlDKzkwY1huZUlJd29wUXhCdHlZek1YakVRNnhBblFrbmlJWG1i?=
 =?utf-8?B?dFhUQjZLTDhLY1ZocDFKeDFUK2J4TjNpcnRLMG9Fc2lrWCtVMHd2NFAvMUZP?=
 =?utf-8?B?TGdpL1plcHpvZzJWRXNNcVYycHFyVEJFS0krMDZWM05JYVdYNWhHaFJUc01L?=
 =?utf-8?B?QXJ4RVNxZ0g5bC83Unhid0VncGNCVysvSThMYllFVXFaMktGa2RMWW5UdnBT?=
 =?utf-8?B?M200MTVEaStWRlJsNUpnQlV4YmpyRFNDbENEbTQ2V3B4TEN5bWVGdDVaNXU0?=
 =?utf-8?B?Y1QzdklZUU0vSitWT1l1S2tGYUs1dllHcWJoekJhcEJnY0J3WHlUa085SlpW?=
 =?utf-8?B?Z0ZncEI5Zkx1MVNNR29CdS85c1BuUHZtTDBBWEVOSzl0SHd0TVNkZ1RGTVhK?=
 =?utf-8?B?K1E3TlBjMFRJa0VQaHd5cTdLN0hycWNGbllxZnFQck1Nd3ZXOWxNcjRlVURz?=
 =?utf-8?B?dEZYb1k2MCtSRU9JTllyMmRhc3hKdEJsVnZnZTdWY05QYUlZRVBCZkd4V3FX?=
 =?utf-8?B?enlCalNwZWQvTzNLUXg2ekRUU0FESnZ3VXlrWXNJMjAzT3BCMlYzZ1QvN0o2?=
 =?utf-8?B?eDVSUWVsV2ZiQkI2WlBna2k3K0pnRTI1MGVIZDR3NDg2RjFlWlFKR2lpRlMw?=
 =?utf-8?B?OVpxc21SUDNDVDM0d3l0SlN1NTdiMUhVSWhQZUtlQkszclZTVWdLUGFTWVNr?=
 =?utf-8?B?L1RQRUFaQWRtR2tnZUgxODY1dmpJSnJqd1VpdklYdk1KZUdDU2pNRTZocnNF?=
 =?utf-8?B?ZG1zeFozcHNBZmVHQ2NKN1dUa2YyQmRLQWI4QUpDYXhFV0pLUVlhZlFtSU4r?=
 =?utf-8?B?ZDVsOE8wODZQQXZMSnFGYXhET3plbmswNkJ4bWd6YSthT1o3aHBScGdVSVVt?=
 =?utf-8?B?elBEMXZoUTlvdEFlMDd6VTgremd3dVhhb0NhdGhkbTZBV0JKcjFMekZORU1B?=
 =?utf-8?B?WWhtVVpiS0tvSmJPdU1wVldDRjQ2aXU5QjAyNGpxM05RQ2RvNkY3N1ZUNGZr?=
 =?utf-8?Q?BJF9NKPsUatczDP4aI913ZI=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 542c362a-910d-4162-806d-08da01db72eb
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 14:45:26.5254
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Sd552zK+an56D1Clw7cC+dlMpW41CW+dSFlmmUqgl3Y3VqISZDuiJoR82GSWkFeGjPlkudqTp1DuyCFoLMhYtA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB4293

On 04.03.2022 18:46, Marco Solieri wrote:
> --- a/xen/common/page_alloc.c
> +++ b/xen/common/page_alloc.c
> @@ -230,6 +230,13 @@ static bool __read_mostly scrub_debug;
>  #define scrub_debug    false
>  #endif
>  
> +#ifdef CONFIG_COLORING
> +/* Minimum size required for buddy allocator to work with colored one */
> +unsigned long buddy_required_size __read_mostly = MB(64);
> +#else
> +unsigned long buddy_required_size __read_mostly = 0;
> +#endif

Please avoid such redundancy when possible. Here perhaps easiest
by having the value come from Kconfig. By giving that separate
option a prompt, it would even become configurable at build time.

> @@ -678,6 +685,13 @@ static void dump_col_heap(unsigned char key)
>  
>      printk("Total number of pages: %lu\n", total_avail_col_pages);
>  }
> +static int __init parse_buddy_required_size(const char *s)
> +{
> +    buddy_required_size = simple_strtoull(s, &s, 0);
> +
> +    return *s ? -EINVAL : 0;
> +}
> +custom_param("buddy_size", parse_buddy_required_size);

Why not integer_param() or, even better fitting the purpose,
size_param()? Also (I may have said so elsewhere already) please
prefer - over _ in new command line option names. And of course
the name needs to be unambiguous enough for it to be easy to
associate the purpose.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 14:48:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 14:48:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287895.488179 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRxbW-0007dM-JO; Wed, 09 Mar 2022 14:47:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287895.488179; Wed, 09 Mar 2022 14:47:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRxbW-0007dF-GJ; Wed, 09 Mar 2022 14:47:54 +0000
Received: by outflank-mailman (input) for mailman id 287895;
 Wed, 09 Mar 2022 14:47:53 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=gSYI=TU=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRxbV-0007d9-5V
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 14:47:53 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e55615b5-9fb7-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 15:47:52 +0100 (CET)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur01lp2051.outbound.protection.outlook.com [104.47.0.51]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-41-XyGGK6VUNMqCrhKWmPySqw-1; Wed, 09 Mar 2022 15:47:50 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR04MB6707.eurprd04.prod.outlook.com (2603:10a6:208:16f::13)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Wed, 9 Mar
 2022 14:47:48 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Wed, 9 Mar 2022
 14:47:48 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e55615b5-9fb7-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646837271;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=T53xnU4a/GGcxOM16qpKB8AnLIKiqNrKNO5PjcXhuIY=;
	b=WMVcb9u2bBOTIe7y+h2wPZisaw96IDtgeJ2BT3jhxE12+uiXlMVsRgDgf7ZRQBMgeYpEkh
	RcuTd9zQIg71kOCM1kGObrhTeWwBLD5nuEh4GTvvsCjrFFilmrMtiz4P0BzRdw0zJ6TAH6
	r5+UlRikqG68g7BSN2yt5HrBnpEQxTA=
X-MC-Unique: XyGGK6VUNMqCrhKWmPySqw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=fOVhtZMsCi/TqCHs7xZrcOthq0z6eG7egpJfhkcUXMJ/Xb9U3OR/C/Kptwrp0yx6Nbj+TU+lQvRGHidI6xHc6/JiL4pDON5Va5or+l4BRfsDJkHOcRRrT8WBkN3OJzv/YzH75N/AbQPxctCuC56hKKsliMiJTnBc2AUFzkuKq7ej8L3VtZpAqb/QqrZxKP5zoUUUOGvhrXTnu13Y5tl7fWdKA3l1uGCGd8tpzR722Hl1H55pUbjoHhOOVQ0FUoqADa5yOcLkmknpJexybWxb0QkI3nho7V1wDFcti5z6ABFT+Pqh2hez9KbOPh5nCAAelrcRVFPn7PgpgKpQPZwClg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=T53xnU4a/GGcxOM16qpKB8AnLIKiqNrKNO5PjcXhuIY=;
 b=lLTSLFibPV0yVDnbMgXIP4WK2VQ5aI8Ndh7WYle0btDQS9lytWQS+1q6UrREM6zjiUDDgPaYjqBc/VMboE1pxM8yiGtAMFFGLv/iQHjhtCPRo4mVE+QUB6Pg0VvOoNGIvNtQu0zP10qd75gYuCBkaCF9yWdN76QSna+lISKbzKy7RRtmo5k6Z3f4dI5FFtmhT4cTJkSE/5A9OlDhhk5OenmRcQQmhTM1+Bj/Z26RnUqHf284KO2x7KEsxBa8sjmIIW/NTfTcBRnNH9NO3FccsvW6GUtAMdekGCO6CF5ROjOefKQJMrER/CTvSPanHExOC3jp0a6rrqW7gjoiJClfUw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <30e21992-8476-c0c2-4d20-206af5eba2fd@suse.com>
Date: Wed, 9 Mar 2022 15:47:45 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH 20/36] xen/common: introduce buddy required reservation
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: Marco Solieri <marco.solieri@minervasys.tech>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>, xen-devel@lists.xenproject.org
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-21-marco.solieri@minervasys.tech>
 <438cd24f-cbe4-5406-ab7f-3a6e599907c3@suse.com>
In-Reply-To: <438cd24f-cbe4-5406-ab7f-3a6e599907c3@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6PR04CA0065.eurprd04.prod.outlook.com
 (2603:10a6:20b:f0::42) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: cc9fabb3-ce7b-4204-1b68-08da01dbc765
X-MS-TrafficTypeDiagnostic: AM0PR04MB6707:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB670783536957C9E9017BE7D9B30A9@AM0PR04MB6707.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(53546011)(6506007)(2906002)(6512007)(66476007)(66946007)(66556008)(8676002)(4326008)(6486002)(508600001)(38100700002)(316002)(6666004)(31696002)(6916009)(86362001)(54906003)(186003)(31686004)(4744005)(2616005)(7416002)(36756003)(5660300002)(8936002)(26005)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?NXMxZUI4enFSSnBLME5nNWRGTHBlOHpUMzFYV3RTWUFIcmdHSUFzTjFwbnp1?=
 =?utf-8?B?UGR0YVE1RDB1OTVhUlFlUm4zZFEvOUlsQk80NDR1VXBFWllHY2tEemU1SXlG?=
 =?utf-8?B?djdTVUFSQ01tbDhCd01FRXhzTDkyTnVwdnZMaFdURkdZcEdUeDROU3NhS0lB?=
 =?utf-8?B?emtHR0pWNUd3S2dnVWlVTWdWZDhSd1VkVW56ZDZ2QThYcUtqNVh4V3o3blk5?=
 =?utf-8?B?TWRBdXIvbTFLQWo4RlBmTEJuc1VzcjlUM0ZXd3ZLaVF4WXY3MlhtQlZIYzFE?=
 =?utf-8?B?VVZmQTJPY2hvRU1IQUxIelg1R2dDUitaS0huNkE4WXhSNGtDL3dUVDlobzk3?=
 =?utf-8?B?dTBIblUvRUpJTEYrd1BRVldKUjZRakJ6MVRHMWExeXoycXBSZWZjVkcrRjhS?=
 =?utf-8?B?cXZ1QS9GVGNZUTBmYVQwdzdOMnF1di9WbWN5U3liQTZmVnkwbEoxZkViaHp1?=
 =?utf-8?B?TkFhb1NnT1JJdnpESERuWnNnYWJzc3ZPTGl3S1ppWlJEMjh1MTE3TkwzK0Zn?=
 =?utf-8?B?WTRUS2xTbGQxb0VYYkpZd2tPTHA1UTJJQWQyMFkxaSszQlRiK1FpOEVZbnVD?=
 =?utf-8?B?dEVOSUFGaW4zY0RpcmRtRkpremlTZitGTWQ4VmFvQUlVdFRxY2RpcWcya0Y4?=
 =?utf-8?B?dkMvVytCcm9KZUtTSkdEd0F3M2M1VTdMS0liUzNmSXMwNENHbGtEWld3ZzNp?=
 =?utf-8?B?ZGFnUzNLZjZWYW45TU5CTlF4ZWc0YTZMWDJ2Mm10dkhFSnVOVTVHZGlucDNw?=
 =?utf-8?B?MU43Q1FnMENpWEFZUUg3VjRaTWhDODM0eEJOYm1UdlZ1eWdjbFBPZ0Fjak80?=
 =?utf-8?B?ckNrMUJMb1ZVUjREYmdTNXZQTVZFYzh0dFMyekw0b0g3ZVlvcktYOXBCWi9N?=
 =?utf-8?B?K1NLeHVQd1BqbzBoM09xSG5wQmgydFFRYlA3L1doVDRSMFlFTjBSK3V5bnJI?=
 =?utf-8?B?UnJvbUQxdjhaSWRhMWUyS0pNWEZwaEl6VDgrNFlHZXZJUGJxVjRFaFFtd1dT?=
 =?utf-8?B?M2V3STZtODdNOElXS3VzNGlReE5KV2FUSFVsdTRMa2JLMDFveFFsdTVhNzVM?=
 =?utf-8?B?c3BKY3Y3TFFqOWttbEtRMlE3ZTdXYzdLakJsb1U3cVhJZnlWWFA2WkVZYlFu?=
 =?utf-8?B?MmRROExIRjVDbVdoTGd4TGcwclVPWGYrRmlsRlZZczFOWUFjbDJaMVJueXZl?=
 =?utf-8?B?bjE3Y3YwWVpvWkU0UFNYZ0JDZ2pHVUE0SnRaU3U5SWZtMVFuWU5IOTFyNTdC?=
 =?utf-8?B?bFc5aXdiNGQzcFFUSUlOR3ZPOGdWaHI0aWNTYSticm5rZ0RKU0dLdzhMK2lM?=
 =?utf-8?B?QlJWdHpzVUR4MTExajNVQjhxUXJVZ2I1R2tWOWJkcm9WelZ0YzdBQWhSTnhZ?=
 =?utf-8?B?a0g1Zko1V1dHRG5PODhtZTlueTRVYTNzeWRlL1h4TUNJamUveW82dXMwMnFY?=
 =?utf-8?B?Vk1uSy9mR1dGMjJuZVRTRkpMQXdxSGdFUENtRkdGUnBmZW1DWmxqSzlNUWVI?=
 =?utf-8?B?OXNadzZ6ZXpwSEtRYVdrVXRBMEkxdlJaVEdmenlFZ0J6bFlJM2dpR2VWRjg5?=
 =?utf-8?B?Ymh3dkExYTJaUDBIWjV4bUhXU28yakFHWXhQcEtlZGtlNnBDWHhURlY1TFEx?=
 =?utf-8?B?ZHRCYkRKMlhqeVlOZWthS0pqZDR4eWhWZ0FYSDdMUk1oSkQxajVRRHRyV3BN?=
 =?utf-8?B?RUxLYlk3NW1wR1dHTnJna0JrVUlPL1N0UkwycHppMVZqS3U4YThGZFVYd0xR?=
 =?utf-8?B?Z2drVGRqL0t4Yk1OQlBtRkFSaFNDckFMUjlJSzNzMmJ2ZnZHazN6bWtNZjRE?=
 =?utf-8?B?UUJQeis2dTJralUrT3lwS08ybDlFWXVyc3l2Z1E1VWpGTWFnOU84a1NxV0hw?=
 =?utf-8?B?ck5BTU9VR3M1YVFCNVZCMTFZRjIvNlpZZHIzdGplcTFhRm5PazRlRUJIWHAr?=
 =?utf-8?B?UTk0R3BhQy8yTlZpeVFram9UZVdxaTIyOVFXb1JnYmRGRmdXY01jYWZGbk1S?=
 =?utf-8?B?OVFPNG1DcVRJbDh4TzM5Rk9oWWtqejRWY2VPejRjTmZTbytHaGRqUlVhY3p5?=
 =?utf-8?B?dy90bW01b2h0ME0vWlRoSUtWZ2hjUFlPNXQ3VExJWkEwU0l5V013SXgzV3hh?=
 =?utf-8?B?RTNHMGxNNTViY1lrZzZjVVhENk1yL0EzYVVSb2poQlRDTXFISWJ2a2p2YWt5?=
 =?utf-8?Q?Hs0qCQIgIxqZwP2aCU7uKL0=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: cc9fabb3-ce7b-4204-1b68-08da01dbc765
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 14:47:48.2354
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: hwMcz3aMq9gtMmG7coOR8F1+i4YYZ7DRq/XOZGNt3K5mz9iN8M39YrkgeHAMfczn+7XOfpER5CyK0R9b7qJcOw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB6707

On 09.03.2022 15:45, Jan Beulich wrote:
> On 04.03.2022 18:46, Marco Solieri wrote:
>> --- a/xen/common/page_alloc.c
>> +++ b/xen/common/page_alloc.c
>> @@ -230,6 +230,13 @@ static bool __read_mostly scrub_debug;
>>  #define scrub_debug    false
>>  #endif
>>  
>> +#ifdef CONFIG_COLORING
>> +/* Minimum size required for buddy allocator to work with colored one */
>> +unsigned long buddy_required_size __read_mostly = MB(64);
>> +#else
>> +unsigned long buddy_required_size __read_mostly = 0;
>> +#endif
> 
> Please avoid such redundancy when possible. Here perhaps easiest
> by having the value come from Kconfig. By giving that separate
> option a prompt, it would even become configurable at build time.

Oh, and: Why is this not static? And without seeing what it's going
to be used for it's quite hard to judge whether the initial value
chosen is actually sufficient. I could imagine that this would
rather want to be derived from total memory size.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 14:53:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 14:53:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287900.488191 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRxgk-0000cp-6v; Wed, 09 Mar 2022 14:53:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287900.488191; Wed, 09 Mar 2022 14:53:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRxgk-0000ci-3r; Wed, 09 Mar 2022 14:53:18 +0000
Received: by outflank-mailman (input) for mailman id 287900;
 Wed, 09 Mar 2022 14:53:17 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=/5Wz=TU=amazon.de=prvs=06034e0c2=doebel@srs-se1.protection.inumbo.net>)
 id 1nRxgh-0000cL-Qc
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 14:53:17 +0000
Received: from smtp-fw-2101.amazon.com (smtp-fw-2101.amazon.com [72.21.196.25])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a476d377-9fb8-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 15:53:13 +0100 (CET)
Received: from iad12-co-svc-p1-lb1-vlan2.amazon.com (HELO
 email-inbound-relay-pdx-2a-2dbf0206.us-west-2.amazon.com) ([10.43.8.2])
 by smtp-border-fw-2101.iad2.amazon.com with ESMTP; 09 Mar 2022 14:53:12 +0000
Received: from EX13D44EUC003.ant.amazon.com
 (pdx1-ws-svc-p6-lb9-vlan2.pdx.amazon.com [10.236.137.194])
 by email-inbound-relay-pdx-2a-2dbf0206.us-west-2.amazon.com (Postfix) with
 ESMTPS id C75DDA277E; Wed,  9 Mar 2022 14:53:10 +0000 (UTC)
Received: from EX13MTAUEA001.ant.amazon.com (10.43.61.82) by
 EX13D44EUC003.ant.amazon.com (10.43.164.229) with Microsoft SMTP Server (TLS)
 id 15.0.1497.28; Wed, 9 Mar 2022 14:53:08 +0000
Received: from dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (10.13.240.106)
 by mail-relay.amazon.com (10.43.61.243) with Microsoft SMTP Server id
 15.0.1497.28 via Frontend Transport; Wed, 9 Mar 2022 14:53:06 +0000
Received: by dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (Postfix,
 from userid 3160037)
 id 65C2A4E79; Wed,  9 Mar 2022 14:53:06 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a476d377-9fb8-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646837594; x=1678373594;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=DagEakpqz6Dt5Y9fwUgvFiApWcxqurKY1A3qTM9nhpY=;
  b=RrZFIFpWIHtjTyQq8sHNjwqMPRppUEDdUfmU0pfzrW4kksr+EXlEI6pO
   6Upyu+qs8xc3V2LlUTbLYYjq7lYsbYiMA1B8CX1/35FymxKdh+xmdhJ/9
   k2JDB6W9L8vzs+TIHPIYdWvZmZM5TnmDA0fiVzGqaNiUKadwUu4mLw7jl
   A=;
X-IronPort-AV: E=Sophos;i="5.90,167,1643673600"; 
   d="scan'208";a="179765667"
From: Bjoern Doebel <doebel@amazon.de>
To: <xen-devel@lists.xenproject.org>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, Roger
 Pau Monne <roger.pau@citrix.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
	Bjoern Doebel <doebel@amazon.de>, Konrad Rzeszutek Wilk
	<konrad.wilk@oracle.com>, Ross Lagerwall <ross.lagerwall@citrix.com>
Subject: [PATCH v5 1/2] Livepatch: resolve old address before function verification
Date: Wed, 9 Mar 2022 14:52:59 +0000
Message-ID: <03798b67ec3a892a302e6be5d87ea676e6376036.1646837462.git.doebel@amazon.de>
X-Mailer: git-send-email 2.32.0
MIME-Version: 1.0
Precedence: Bulk
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

When verifying that a livepatch can be applied, we may as well want to
inspect the target function to be patched. To do so, we need to resolve
this function's address before running the arch-specific
livepatch_verify hook.

Signed-off-by: Bjoern Doebel <doebel@amazon.de>
Acked-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Reviewed-by: Ross Lagerwall <ross.lagerwall@citrix.com>
---
 xen/common/livepatch.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/xen/common/livepatch.c b/xen/common/livepatch.c
index ec301a9f12..be2cf75c2d 100644
--- a/xen/common/livepatch.c
+++ b/xen/common/livepatch.c
@@ -684,11 +684,11 @@ static int prepare_payload(struct payload *payload,
                 return -EINVAL;
             }
 
-            rc = arch_livepatch_verify_func(f);
+            rc = resolve_old_address(f, elf);
             if ( rc )
                 return rc;
 
-            rc = resolve_old_address(f, elf);
+            rc = arch_livepatch_verify_func(f);
             if ( rc )
                 return rc;
 
-- 
2.32.0




Amazon Development Center Germany GmbH
Krausenstr. 38
10117 Berlin
Geschaeftsfuehrung: Christian Schlaeger, Jonathan Weiss
Eingetragen am Amtsgericht Charlottenburg unter HRB 149173 B
Sitz: Berlin
Ust-ID: DE 289 237 879





From xen-devel-bounces@lists.xenproject.org Wed Mar 09 14:53:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 14:53:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287901.488202 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRxh1-00011B-EU; Wed, 09 Mar 2022 14:53:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287901.488202; Wed, 09 Mar 2022 14:53:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRxh1-000112-BQ; Wed, 09 Mar 2022 14:53:35 +0000
Received: by outflank-mailman (input) for mailman id 287901;
 Wed, 09 Mar 2022 14:53:33 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=/5Wz=TU=amazon.de=prvs=06034e0c2=doebel@srs-se1.protection.inumbo.net>)
 id 1nRxgz-0000yq-Im
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 14:53:33 +0000
Received: from smtp-fw-9103.amazon.com (smtp-fw-9103.amazon.com
 [207.171.188.200]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id aee52d75-9fb8-11ec-8539-5f4723681683;
 Wed, 09 Mar 2022 15:53:32 +0100 (CET)
Received: from pdx4-co-svc-p1-lb2-vlan2.amazon.com (HELO
 email-inbound-relay-iad-1d-7a21ed79.us-east-1.amazon.com) ([10.25.36.210])
 by smtp-border-fw-9103.sea19.amazon.com with ESMTP; 09 Mar 2022 14:53:13 +0000
Received: from EX13D03EUC004.ant.amazon.com
 (iad12-ws-svc-p26-lb9-vlan3.iad.amazon.com [10.40.163.38])
 by email-inbound-relay-iad-1d-7a21ed79.us-east-1.amazon.com (Postfix) with
 ESMTPS id E25B22217FB; Wed,  9 Mar 2022 14:53:11 +0000 (UTC)
Received: from EX13MTAUEE002.ant.amazon.com (10.43.62.24) by
 EX13D03EUC004.ant.amazon.com (10.43.164.33) with Microsoft SMTP Server (TLS)
 id 15.0.1497.28; Wed, 9 Mar 2022 14:53:09 +0000
Received: from dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (10.13.240.106)
 by mail-relay.amazon.com (10.43.62.224) with Microsoft SMTP Server id
 15.0.1497.28 via Frontend Transport; Wed, 9 Mar 2022 14:53:07 +0000
Received: by dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (Postfix,
 from userid 3160037)
 id 994AD4E7F; Wed,  9 Mar 2022 14:53:07 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: aee52d75-9fb8-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646837612; x=1678373612;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=3/k2kvEImrHIXI5QhPO8pqI+rGf36IXCF/vzbmeE/gY=;
  b=ugrAiGwWr1cPdwtKhmf462ghco+M78ijyrsRGweKuv2GAnb8r3hSQI+E
   GVYFco34crgvhgErFsVccxKByqArNcG6VvS7ko49c+gP9FPI/LnAs/C5I
   MQVQGHxyqBT7HykAe0oepVK68V98iD7z/SiKYNmp+2/Ese/niItCdFUoK
   A=;
X-IronPort-AV: E=Sophos;i="5.90,167,1643673600"; 
   d="scan'208";a="997927067"
From: Bjoern Doebel <doebel@amazon.de>
To: <xen-devel@lists.xenproject.org>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, Roger
 Pau Monne <roger.pau@citrix.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
	Bjoern Doebel <doebel@amazon.de>, Konrad Rzeszutek Wilk
	<konrad.wilk@oracle.com>, Ross Lagerwall <ross.lagerwall@citrix.com>
Subject: [PATCH v5 2/2] xen/x86: Livepatch: support patching CET-enhanced functions
Date: Wed, 9 Mar 2022 14:53:00 +0000
Message-ID: <5cdd27addcec926eb48fdeab08ad3371e7c3fd7c.1646837462.git.doebel@amazon.de>
X-Mailer: git-send-email 2.32.0
In-Reply-To: <03798b67ec3a892a302e6be5d87ea676e6376036.1646837462.git.doebel@amazon.de>
References: <03798b67ec3a892a302e6be5d87ea676e6376036.1646837462.git.doebel@amazon.de>
MIME-Version: 1.0
Precedence: Bulk
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

Xen enabled CET for supporting architectures. The control flow aspect of
CET expects functions that can be called indirectly (i.e., via function
pointers) to start with an ENDBR64 instruction. Otherwise a control flow
exception is raised.

This expectation breaks livepatching flows because we patch functions by
overwriting their first 5 bytes with a JMP + <offset>, thus breaking the
ENDBR64. We fix this by checking the start of a patched function for
being ENDBR64. In the positive case we move the livepatch JMP to start
behind the ENDBR64 instruction.

To avoid having to guess the ENDBR64 offset again on patch reversal
(which might race with other mechanisms adding/removing ENDBR
dynamically), use the livepatch metadata to store the computed offset
along with the saved bytes of the overwritten function.

Signed-off-by: Bjoern Doebel <doebel@amazon.de>
Acked-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
CC: Ross Lagerwall <ross.lagerwall@citrix.com>
----
Changes since r1:
* use sizeof_field() to avoid unused variable warning
* make metadata variable const in arch_livepatch_revert
* rebase on top and make use of Andrew Cooper's was_endbr64() patch
* use padding byte to store offset rather than reducing opaque area
---
 xen/arch/x86/livepatch.c    | 39 +++++++++++++++++++++++++++++++------
 xen/include/public/sysctl.h |  3 ++-
 2 files changed, 35 insertions(+), 7 deletions(-)

diff --git a/xen/arch/x86/livepatch.c b/xen/arch/x86/livepatch.c
index 37c9b8435e..e71741743a 100644
--- a/xen/arch/x86/livepatch.c
+++ b/xen/arch/x86/livepatch.c
@@ -14,6 +14,7 @@
 #include <xen/vm_event.h>
 #include <xen/virtual_region.h>
 
+#include <asm/endbr.h>
 #include <asm/fixmap.h>
 #include <asm/nmi.h>
 #include <asm/livepatch.h>
@@ -114,8 +115,21 @@ int arch_livepatch_verify_func(const struct livepatch_func *func)
         if ( func->old_size < func->new_size )
             return -EINVAL;
     }
-    else if ( func->old_size < ARCH_PATCH_INSN_SIZE )
-        return -EINVAL;
+    else
+    {
+        /*
+         * Space needed now depends on whether the target function
+         * start{s,ed} with an ENDBR64 instruction.
+         */
+        uint8_t needed;
+
+        needed = ARCH_PATCH_INSN_SIZE;
+        if ( is_endbr64(func->old_addr) || was_endbr64(func->old_addr) )
+            needed += ENDBR64_LEN;
+
+        if ( func->old_size < needed )
+            return -EINVAL;
+    }
 
     return 0;
 }
@@ -130,12 +144,24 @@ void noinline arch_livepatch_apply(struct livepatch_func *func)
     uint8_t insn[sizeof(func->opaque)];
     unsigned int len;
 
+    func->patch_offset = 0;
     old_ptr = func->old_addr;
     len = livepatch_insn_len(func);
     if ( !len )
         return;
 
-    memcpy(func->opaque, old_ptr, len);
+    /*
+    * CET hotpatching support: We may have functions starting with an ENDBR64
+    * instruction that MUST remain the first instruction of the function, hence
+    * we need to move any hotpatch trampoline further into the function. For that
+    * we need to keep track of the patching offset used for any loaded hotpatch
+    * (to avoid racing against other fixups adding/removing ENDBR64 or similar
+    * instructions).
+    */
+    if ( is_endbr64(old_ptr)  || was_endbr64(func->old_addr) )
+        func->patch_offset += ENDBR64_LEN;
+
+    memcpy(func->opaque, old_ptr + func->patch_offset, len);
     if ( func->new_addr )
     {
         int32_t val;
@@ -143,14 +169,15 @@ void noinline arch_livepatch_apply(struct livepatch_func *func)
         BUILD_BUG_ON(ARCH_PATCH_INSN_SIZE != (1 + sizeof(val)));
 
         insn[0] = 0xe9; /* Relative jump. */
-        val = func->new_addr - func->old_addr - ARCH_PATCH_INSN_SIZE;
+        val = func->new_addr - (func->old_addr + func->patch_offset
+                                + ARCH_PATCH_INSN_SIZE);
 
         memcpy(&insn[1], &val, sizeof(val));
     }
     else
         add_nops(insn, len);
 
-    memcpy(old_ptr, insn, len);
+    memcpy(old_ptr + func->patch_offset, insn, len);
 }
 
 /*
@@ -159,7 +186,7 @@ void noinline arch_livepatch_apply(struct livepatch_func *func)
  */
 void noinline arch_livepatch_revert(const struct livepatch_func *func)
 {
-    memcpy(func->old_addr, func->opaque, livepatch_insn_len(func));
+    memcpy(func->old_addr + func->patch_offset, func->opaque, livepatch_insn_len(func));
 }
 
 /*
diff --git a/xen/include/public/sysctl.h b/xen/include/public/sysctl.h
index 55252e97f2..b0a4af8789 100644
--- a/xen/include/public/sysctl.h
+++ b/xen/include/public/sysctl.h
@@ -876,7 +876,8 @@ struct livepatch_func {
     uint8_t version;        /* MUST be LIVEPATCH_PAYLOAD_VERSION. */
     uint8_t opaque[LIVEPATCH_OPAQUE_SIZE];
     uint8_t applied;
-    uint8_t _pad[7];
+    uint8_t patch_offset;
+    uint8_t _pad[6];
     livepatch_expectation_t expect;
 };
 typedef struct livepatch_func livepatch_func_t;
-- 
2.32.0




Amazon Development Center Germany GmbH
Krausenstr. 38
10117 Berlin
Geschaeftsfuehrung: Christian Schlaeger, Jonathan Weiss
Eingetragen am Amtsgericht Charlottenburg unter HRB 149173 B
Sitz: Berlin
Ust-ID: DE 289 237 879





From xen-devel-bounces@lists.xenproject.org Wed Mar 09 14:58:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 14:58:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287909.488213 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRxlX-0001sV-3E; Wed, 09 Mar 2022 14:58:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287909.488213; Wed, 09 Mar 2022 14:58:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRxlW-0001sO-Va; Wed, 09 Mar 2022 14:58:14 +0000
Received: by outflank-mailman (input) for mailman id 287909;
 Wed, 09 Mar 2022 14:58:13 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=d6dl=TU=citrix.com=prvs=060aafcb7=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nRxlV-0001sH-EB
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 14:58:13 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 55ddf408-9fb9-11ec-8539-5f4723681683;
 Wed, 09 Mar 2022 15:58:11 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 55ddf408-9fb9-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646837891;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=e7+AyKssidMZLDWEY6cz/4eglHEFeDKP/Lmw/ANVxT8=;
  b=ammBohj3zkKQnsmcDhpc2o68LRsph5fXWZRNj5SvMxUhuSRcTMzBj12o
   JEkgnzQQ4cRfza9FC57IBoZaSDqEaj5w0hxrBww6B7DpiqcjwIHhcdZVN
   BMtcKNcTO+hG6NMSN2qbJLhy1ojx389X1Ex39dTTPmbt+PA2rgabdQrzX
   8=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65298670
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:+1T4aKBuGbX5AxVW/6Xjw5YqxClBgxIJ4kV8jS/XYbTApDIm1WZRy
 2IaXjrXPPyPZmLyfdx+aYTi/R9T6MLVxtVnQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vh09Yy6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPgy5
 e9L5b6BVTx0O5SP39QncEJzC35xaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguwKKsXxMZxZkXZn1TzDVt4tQIzZQrWM7thdtNs1rp4TR6eOO
 ZVBAdZpRDr7bRpjPGcoNKgnt8uIukjvdQUB+WvA8MLb5ECMlVcsgdABKuH9cNGQWd9cmEreo
 2vc5nn4GTkTLtnZwj2AmlqzgsffkCW9X5gdfJW6+eRjhFm7z2kaGhoQE1C8pJGRtEm6XN5OL
 l0OzQAnp6My6U+DQ8H0Wluzp3vslhwWVsdUEuY6wBqQ0aeS6AGcbkAUQzgEZNE4ucseQT0xy
 kTPj97vHSZosrCeVTSa7Lj8hSipJSEfIGsGZCkFZQgI+d/upMc0lB2nZtR+FK+4iPXlFDe2x
 CqFxBXSnJ1K05RNjf/iuwma3XT8/fAlUzLZ+C2Uc1ijviFIeLX4YrXrrmjhzq1rNNmWGwzpU
 Gc/p+CS6+UHDJeonSOLQfkQELzB28tpIAEwknY0QcB/qm3FF2qLONkJvWogfBsB3tMsJGexC
 HI/rz+983O60JGCSaZsK7y8BM0xpUQLPYS0D6uEBjaij3UYSeNmwM2MTRPIt4wOuBJ1+U3aB
 Xt9WZzyZZr9If47pAdav89HjdcWKtkWnAs/v6zTwRW9yqa5b3WIU7oDO1bmRrlnsP3b/lmPo
 4oDa5XiJ/BjvAvWOHm/HWk7dwxiEJTGLcqu95w/mhCreWKK513N+9eOmOh8KuSJboxel/vS/
 2HVZ6Or4AGXuJEzEi3TMioLQOq2Bf5X9CtnVQRxbQfA8yVyOu6HsfZAH6bbiJF6rYSPO9YvF
 KJbEyhBa9wSIgn6F8M1NsCs8tY9KEz12Wpj/UONOVACQnKpfCSQkvfMdQrz7igeSC2xsMo1u
 bq70Q3HB5EEQmxf4Az+M5pDE3vZUaAhpd9P
IronPort-HdrOrdr: A9a23:WGVpha3PvfR3NC7rRHxgvAqjBRxyeYIsimQD101hICG9Lfb2qy
 n+ppgmPEHP5Qr5AEtQ5OxpOMG7MBbhHQYc2/hfAV7QZnibhILOFvAt0WKC+UytJ8SazIBgPM
 hbAtFD4bHLfDtHZIPBkXOF+rUbsZi6GcKT9J/jJh5WJGkAAcAB0+46MHfhLqQffngcOXNTLu
 v52iMznUvHRZ1hVLXdOpBqZZmgm/T70LbdJTIWDR8u7weDyRmy7qThLhSe1hACFxtS3LYL6w
 H+4kzEz5Tml8v+5g7X1mfV4ZgTssDm0MF/CMuFjdVQAinwizyveJ9qV9S5zXMISaCUmRQXee
 v30lMd1vdImjTsl6aO0F3QMjzboXMTArnZuAalaDXY0JTErXkBerV8bMpiA2XkAgwbzYtBOe
 twrhKkX9A8N2KwoA3to9fPTB1kjUyyvD4rlvMSlWVWVc8EZKZWtpF3xjIfLH4sJlOy1GkcKp
 gnMCgc3ocjTXqKK3TC+mV/yt2lWXo+Wh+AX0gZo8SQlzxbhmpwwUcUzNEW2i5ozuNxd7BUo+
 Dfdqh4nrBHScEbKap7GecaWMOyTmjAWwjFPm6eKUnuUKsHJ3XOoZjq56hd3pDhRLUYiJ8p3J
 jRWlJRsmA/P0roFM2VxZVOtgvARW2sNA6dvP22J6IJzYEUaICbQxFrEmpe4PdIi89vd/HmZw
 ==
X-IronPort-AV: E=Sophos;i="5.90,167,1643691600"; 
   d="scan'208";a="65298670"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=IvkOWfKUVFZOxFm2IYt43anls8jabEXaf5iPxEm/UxE64aTHOGhO9yy3xaSKdyEEqhDVxKiT/Qx4XPyT/H8kquRPC3JsnJEgFa6XJQ2rSVLtBnvaOv2vV3URHvB8XqNNzF9IIpboXT+c4yQ0nkMtxAzZCJHh7J/G7imFY2J37zy13g2VNejMO4t4KAxKHfcE873gV0MjAj+KU9BP7/9i4KShGibjeiK51/ytuRZNwdF+nHlGtS6CqTeZhZFy9ac8nQ2U1s4GKxEnUfF/SzCFL5WS060ghVux89b28LHar3tO/SzsK6RZw4GKDOsjhTTWEwfCDxBg4AUpN9a89iv40Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=e7+AyKssidMZLDWEY6cz/4eglHEFeDKP/Lmw/ANVxT8=;
 b=l3X9apjkQ3oFG72fDesEg65rlpDWMe4S+g0YGALEuzXABvx7N25jh6FhIsUuMAwaWZ7CYsUPr/ENYCOUCLpgsr5e96CAWVvdleLL2XGITIFpHvTgq5zeBy/4pdifEDNYeEYwCt9VBZef3HwyN2+Y76M+0hTPaMhvWCyOoBW2bP3NgKlYgLZ76IJZXaqJS1CUEGY2Nc8wmsoTyKUSmcqnInCH6aYzonqzny9iC0t2HclfWO8QzSSJZUmPHkgputHY4QlCyg6meUuk6fNG87S99MsnPIhri+eDf4uqT2yxAbgKRgmi9d/uAY4GWIVwgia3R50766SZjiUHVtd41JgxYQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=e7+AyKssidMZLDWEY6cz/4eglHEFeDKP/Lmw/ANVxT8=;
 b=hnl4UTvqlY+BEeuygQkf/tMvSE+xX/Qd6U32ew1G+tw0BcrwR4M5g61ZKs5Ha54eRZ48bNEq6L/Due6bY6q4bi3ygJMMoyRyono3YBv3eErLbVG8a3vBV+ERGHRhkEG3EkljDOjsaOSRz4k2TdK70uK3Cu9/uG70PPGcFVW3+o8=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Roger Pau Monne <roger.pau@citrix.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: George Dunlap <George.Dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>, "Volodymyr
 Babchuk" <Volodymyr_Babchuk@epam.com>, Julien Grall <jgrall@amazon.com>
Subject: Re: [PATCH v4 2/2] livepatch: set -f{function,data}-sections compiler
 option
Thread-Topic: [PATCH v4 2/2] livepatch: set -f{function,data}-sections
 compiler option
Thread-Index: AQHYM7F5J3x9C8ot2EWO/SfgpDadpqy3JMcA
Date: Wed, 9 Mar 2022 14:58:06 +0000
Message-ID: <48528d19-d6ab-d8ae-498c-091b5b719250@citrix.com>
References: <20220309122846.89696-1-roger.pau@citrix.com>
 <20220309122846.89696-3-roger.pau@citrix.com>
In-Reply-To: <20220309122846.89696-3-roger.pau@citrix.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 544baed5-5eb4-4de1-a155-08da01dd3817
x-ms-traffictypediagnostic: DM4PR03MB6191:EE_
x-microsoft-antispam-prvs: <DM4PR03MB6191D12B60D8E4EB358CCFBDBA0A9@DM4PR03MB6191.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(508600001)(66446008)(53546011)(6506007)(86362001)(8936002)(83380400001)(5660300002)(4744005)(6486002)(6512007)(76116006)(2906002)(186003)(26005)(4326008)(66476007)(64756008)(31696002)(8676002)(91956017)(66556008)(2616005)(38070700005)(38100700002)(110136005)(122000001)(82960400001)(31686004)(316002)(71200400001)(54906003)(36756003)(66946007)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?N282Z2hWOVF0eFZrbmVMRnI2TmZHNlQ3d21XaGZSZFFHRUwzRWlsNUtDTDNM?=
 =?utf-8?B?aHgwNDVENS9Gc3lVMkhvSVJ3M200bGt2NUV6WFptN0w2NER5OUJ4NWdIZU4r?=
 =?utf-8?B?a0U3bW5RcUI2MEs3SnZKSjBJWER2UmMzYlV0aXN2NVhPOWs2WXlxY21TU3hT?=
 =?utf-8?B?Smc2Q0lndng0ZmdCWE1uenZYNksrQTFVMUZNWkxna1ZKL2d2eXpVa2p4WUMz?=
 =?utf-8?B?U2pWTDdwc0RuRmZROE13eEt5bCtkMVp2anBrNTZCa1JRaHVKUTNSYVZVSWE0?=
 =?utf-8?B?S1hPMXFGbVpMZVVVdTc5cG45Uk0rMy9JTnIwUXZSSi9jR1NHcmdhbndBdzBW?=
 =?utf-8?B?clFqUmY0ZHlaRmdkRWZxc05BVllsTEVxNDJrMy9BWjhaM0pZRVY4NExiRm51?=
 =?utf-8?B?bFNlTE5yeTgrZ3g1VmN6QWY5c0svNlZrb083NXgrVjh6cTNhLzcxSXJwb0pj?=
 =?utf-8?B?YzMweTdQK1hWNkpQRGFTNTIvZmlBbnRnWnZtaGFPbnhkbzhWZmNMbmF2U2x0?=
 =?utf-8?B?Vy9QSWQ4M0djVUJuTkF5SmhhOHZkK3BCVmxINEtHVGNka1EvV3dVL0l3a0pY?=
 =?utf-8?B?bndtYTdVSlFyWnJoUW9ZZUdYSnV3Vjh5Y1RrR2Nwb3FQTnhwVWF1bjNHb0l4?=
 =?utf-8?B?cWYwNXhwbkZub2J3V2ZUR3V6VGE4VnN2WGJEQnFleG05Rm9wa29WS1VPMlBB?=
 =?utf-8?B?M1RuZlFuKzlpcXZzbHdFcXRjOVZmekhIYVovamF6S3hRbENJVFFkcnFWNDBU?=
 =?utf-8?B?ZjNJZkpiRGtHVm5hTlY5am1WMVpUQjI4RkNSaHpEbTUwdVFDZEFaTFVwK3RF?=
 =?utf-8?B?cUxRWFcwZXRTcWFBYlZibVMzVmJyeXI4N3plQmpmWUhZeGpYVElIVDhMUWRE?=
 =?utf-8?B?MkRNZ0lrZUt1Zk1jYmRNaDNTV2VXR01pNE84dEFXekNPS3F4aC9Xcm9nV3Rj?=
 =?utf-8?B?T0xwbjRub04rb3Z2eU5UMEhMQ3kwOXFac2psOTU0bnBjTnB5L0lSZGlUVENJ?=
 =?utf-8?B?OWdrWkxWbENPM2J6cjcxb2ZwUU12MDV1M3dMd1FWMXZVQXplb3VDc3JHYUVJ?=
 =?utf-8?B?ZlRZOE85RjZXaFpuc1RxK3hMdjY5N3ZXL1JBUS8wREsreFdmUzcva1hiMDUv?=
 =?utf-8?B?NzB6UnMwUkJBamtrbTRvbkhqak5EUWJuSjNaS04rWG5sbWR6UVhhalY4aWdq?=
 =?utf-8?B?UzVNNlRFRWxJYXRobU54a0kxZWE3NXNIK0pGd05LZXBGL2RUNjdiUFBNMnJk?=
 =?utf-8?B?a01HUkhwNjdwYlRtRGtXNWdwaHZ1cnB0R1UrV2xZTmI0WlBIZkZ6QzJTN1E3?=
 =?utf-8?B?S2hrYkJ0Y3NSOXJEWU1EYmdXQmo0SFBQa2h6aDRIWlUwanBzMGJCN3ZYS3Nz?=
 =?utf-8?B?WVBhZ0pLb0lXN0RkNTZxbUQ1V2o4dTY1QkU5UTFDSjBHTkFDeE9mWEc4YTNW?=
 =?utf-8?B?Tm5RenkyWjJrTGFEV0I3WXpBUnY4UXJJTnNJNUNJN0NzdzJYMVZOYTZvUEtj?=
 =?utf-8?B?SndzTzUycnZwYjlHRzEyTGI0c0MwS0VTTE5tQjNxa3JRV0dRV2ZIZjM5bWNG?=
 =?utf-8?B?QUZOb1Q0blRVZlpVbFYrRWhEMnlrRmNkNTlRY2p0Vm8yelBzUFV6clRHRkFz?=
 =?utf-8?B?MWNxN1czVm9YQlRLREpkakI5QytwTUo4akF6dzdTTDhBRGF4Y0JUV2kyNkpk?=
 =?utf-8?B?c2c3MWhQa0Y5bDVIUUtOa1FuSXlxMmw0b0UrTkFIZ2lrbFhsQWNzeDdUc3Bo?=
 =?utf-8?B?NVNPbytwWlRENjZsN0d0ZHRnS296QmpTUkVzbnhQUjFsOW0wR2UxQ0RocTdR?=
 =?utf-8?B?ZVgxVlNRWERlUEJKVEZhNDNLbkZhL05hUlp4dmoyczBMUmZ0eThRbEp6Y3ZE?=
 =?utf-8?B?cnhUT1ArY0U0TkIzRmNJVzM4R2RwL0c3UXk0MmhUc1I5VDE4U21pQzhXcTg3?=
 =?utf-8?B?cEo2dWJuZEx2TkVNRjh3UWJRbHc2V1U2TzFEekpmd3ZsS25jQkVNMTk1TXNi?=
 =?utf-8?B?YVEvNTViOXJPeUkrZ3ZhY2tGUW9wa1ZBK0tqaE1JZmJ2eGllVE9EbzEzRmxL?=
 =?utf-8?B?TExHMEk0RWZMUnQ0NVp5UmpvNkhMQU5NL3A5aG1MRXJ2V3cyU3JlRFZ3TURm?=
 =?utf-8?B?Q1ZOaUVEWW54NUZBRDYvODJFSlA1cm1kSjhVYldBVllZMDExVVd3ZmVqckFX?=
 =?utf-8?B?dUVRTVV2c2lIWWljQ2Rob0RZRUQ0a2NGZ2dnMUx2dVRSdkg0YjNzZUdpaXAv?=
 =?utf-8?B?aTdlZ1FHTzcyM1NtZ04rL1NYSDZRPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <1BE9BF75B2045040A9433921EC86D4A1@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 544baed5-5eb4-4de1-a155-08da01dd3817
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Mar 2022 14:58:06.6038
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: vCfn6b3yqLhPQb4wGwk7UHIyMsChpgiekwkp1nrVS1xM9E+CQhCHYfPId9Mbo3ZqmBMpQryZqK8D7iE3QsGAYE2aQN+2tA982u2cVwV80ko=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR03MB6191
X-OriginatorOrg: citrix.com
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=


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 14:58:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 14:58:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287916.488224 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRxm6-0002QN-Fl; Wed, 09 Mar 2022 14:58:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287916.488224; Wed, 09 Mar 2022 14:58:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRxm6-0002QG-Cd; Wed, 09 Mar 2022 14:58:50 +0000
Received: by outflank-mailman (input) for mailman id 287916;
 Wed, 09 Mar 2022 14:58:49 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=gSYI=TU=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRxm5-0002E2-KA
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 14:58:49 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6cc8dd8a-9fb9-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 15:58:48 +0100 (CET)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04lp2058.outbound.protection.outlook.com [104.47.13.58]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-24-vdhhtt3QNFmst6Swu22opA-1; Wed, 09 Mar 2022 15:58:47 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PAXPR04MB9140.eurprd04.prod.outlook.com (2603:10a6:102:22f::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Wed, 9 Mar
 2022 14:58:45 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Wed, 9 Mar 2022
 14:58:45 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6cc8dd8a-9fb9-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646837928;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=2DDYZ1HkK7B0NjXMi72+t7QXaFJlZEG9PQd31XCZQ2Y=;
	b=c7M+HrIJxPBl/0Yn3UTdzsXWRd5LdppeWk1+ySQTryaTj9t0P62Q6zkUwi+XoefHjXo1e1
	9Z3OuJ1XEErdsWuGq/R+llhcN8P9XwCTBcTQl1Dy+lQNfRtUODWUlHLkncK4ZEfLeyPiSl
	Y0vtnBPolLUp5/VHxC/X40e6ovlTWOg=
X-MC-Unique: vdhhtt3QNFmst6Swu22opA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=WDY1vvFG9ggq0m5hdGKvmjNSctthLR/PuUmv+3icxVxXMIAW9jgqWdFCsLGgQnPoStFHuTNz3dN6zVP6TIlfmUbeVsRY9Zcw7eP2b8D180Y6nP7UkYTb7L3TeEy8rFiByCM1wy8jWz9rzUg3OtYUUuqiI7ofy9/un+9QZe4h+OeAnfip+oUrvVc8PKCO+/GCgD+9Pfcj9WySOcRenTvMZWaZ/mFWhEaetGHA4Cd+uqzPuOo7L5xMx+L77jr+myqsiuVyCKZYg1ityi6ywTFyx9QuUNkTQAKlKHkeRXlEuqxZ+GGSq2up4iHtu0+xIHhlCGqAQcPKQSV79ddLAlA7Aw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=2DDYZ1HkK7B0NjXMi72+t7QXaFJlZEG9PQd31XCZQ2Y=;
 b=Z4wF0S7WiHFbjdIMAN7jEcPrTUgiz1lT+chieXngBGtPXP/NK5AH7xbBd986wLxjHOpGhcv9COemBZeT98EwtrlY6SBxh0jQExrPaUsuDpYU9MJvzi8RTCruuJE6ezKzFwnh/jW2cCsBeQ+8/HsFkpDV1Q9oLiUdVfrkpNp0kCZYGH69XLx9EWTwtShBV97DmNtglxqYxBNjIW/iyFgH9ihOZs/OaaSw6ITr20b5hkoynRT+NBjqTUG8PrPDqhJTQ9GI1tCkfD8jpcUy1WLpeRs7HXlXrzcYLCMnoqSsGJO7LlmzoWD20c5u70KICxXPLHTqzp76gMppFXtPfvsUdw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <7f28f72b-291a-2b1c-c3fe-1c4bc882a203@suse.com>
Date: Wed, 9 Mar 2022 15:58:42 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH 21/36] xen/common: add colored allocator initialization
Content-Language: en-US
To: Marco Solieri <marco.solieri@minervasys.tech>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>, Luca Miccio <206497@studenti.unimore.it>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>,
 xen-devel@lists.xenproject.org
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-22-marco.solieri@minervasys.tech>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220304174701.1453977-22-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM5PR0601CA0058.eurprd06.prod.outlook.com
 (2603:10a6:206::23) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 794af318-4aa4-4ced-e794-08da01dd4ede
X-MS-TrafficTypeDiagnostic: PAXPR04MB9140:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB9140CE64F3267F65AA19FEA8B30A9@PAXPR04MB9140.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66476007)(38100700002)(6916009)(66946007)(31696002)(8936002)(5660300002)(86362001)(2906002)(316002)(8676002)(4326008)(54906003)(66556008)(6666004)(31686004)(6512007)(7416002)(53546011)(6506007)(36756003)(83380400001)(186003)(6486002)(26005)(508600001)(2616005)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?Nk9RcnZaSG5saUM1T1NrMFRHd3kxNmYyRU1WWUY4MG82NWJ0T2I1QTg5d3M1?=
 =?utf-8?B?bkwxRWhFZzRFdlJ5K1dzaEsyWFlXZlNEb2gyeEVVajc1R3ZkZEpHUzR1NlVO?=
 =?utf-8?B?U1l4Q3NkUisvZ3Q4WklqZFJSVlIxYmNSdE9SVDJTY3M5ZVpUZlZwSGdFR3dN?=
 =?utf-8?B?RHZHOVhEcWRaMGNLcm1FR1p0bE5MQm0ySWxZcUxWWkQ5a3hzajEyeVZKOS9Y?=
 =?utf-8?B?NjJocWhZUzU0N1k0RXZLUlQrbjV6ckNDUTdRaUhKMHVKOHlVMUNaUVJnYUN6?=
 =?utf-8?B?YVFrZ3ZGQlRxOE1udVdoeXovVHg4bEdNY1FjM0dKNSs4VUdOT2FvNllROVJF?=
 =?utf-8?B?YUY1aUNna1ZhRSthem04NHhodDVsbWlMUnRMUGVySXVRaGEvOG1BVURTdW83?=
 =?utf-8?B?MGh0dDFBdlpScm5LbzhVYVdLVDM0R0ZsQzZSbk42TUphalM5bU8vbUZ5KzFO?=
 =?utf-8?B?R2pjUHQwNFNDZEwrbmFCK3BxMjdkcTI4eGtjZEdXWGJ0ZWpOSkNTMjI3UkRM?=
 =?utf-8?B?WGtHK1VGRWdPb3RiVFhNWFpWTTdzVE1FYy9rWHpwdnU1TnFxbkN6TEo5VkRi?=
 =?utf-8?B?ZWZUdG9IbTl4WWlWQ3hTeStxVVo4ekhuSmlTTm9hZG1WZ0ZYRUtRTys2a281?=
 =?utf-8?B?WUllUDdHQTFRcWJPRmM5RzE3SklNdVEyNnF4ZXBwbU9VamloQVVKWFVHcnh1?=
 =?utf-8?B?Szl5eVE1bGpaTVVCRTdRYkdJOWdXUUt4ZzlrVWxaSU5JYzBWRzNISzljUUt0?=
 =?utf-8?B?VVo5YzhxRHFUK1BPNEN0NUpvSFdtVWpXOHpXbWlIM1JmK3NJYVRIb1BsWmhW?=
 =?utf-8?B?TWQyRjFFblh2eUs0M2JCRUpRSmx6dExxbkxmaWhsc0s4MFRLcEYvVEtFQXlP?=
 =?utf-8?B?WUgrOStQaHMxZWh1QXkvcmdFemhWTHVtUjIwUVVoMlNYaG5WdlNuQ2J6dFE4?=
 =?utf-8?B?and3UG1ReHM0YThGdXkrQ0p4M1QzYlNoV2ZWVnFjWm9VYjdSTG9sdnYyQVp5?=
 =?utf-8?B?OVNkU3BNc3Z4a1dMNk5yMXRXN0JESHJpUlpvNHA4VEVrN1RENHh0NVZ3Z256?=
 =?utf-8?B?aXBUSTc0VGw4OGJLMDBMU0hqY1Q3T01JSC9jenJlWnYzT2E0QU1ldTBPK1oy?=
 =?utf-8?B?OHFXOFo0T21qVUVjVEJwRTRmSDVmVDI0ZnV1amhNYW1yUWNFL3FuQWYyMnNM?=
 =?utf-8?B?ZlllU2pkQU0xcWdnQUhxd1BZODAyd1hScFNETkVOK0k2dVZwK2RJRjhKRFFJ?=
 =?utf-8?B?L3ZoN2NaMUZ0VktVVzA2Sy9QSVNScGE2b0FnL0ZHTXlZMkhLTDJZL1VBREZE?=
 =?utf-8?B?MHZUYy9uaVBkMTVkQS9PcVZyRFd1eXVXRXNKSXFVdy9PTHRFQlBVZDJBWVNE?=
 =?utf-8?B?Z3FvOWpXdm9OUjdkeU1WY0NVam5oTldQOWMrRlB2ZWFZVzA1RTdQNzg1WHRB?=
 =?utf-8?B?OXRWdjh0NXoydzN3MTQ0V3Fqa3p2TUkxa2dyTXkzWUhLUmxxb2ozekZBMG0y?=
 =?utf-8?B?MDZWMklNekpOWUcvN29xM1lJcEtMMVZ5eEp1cjF3V2Ixclg1eUNwV2VBTHVv?=
 =?utf-8?B?MFVTWXcrdjExOVp1TStHaHc3eXhQWmVZSlNvTmtNNjdHRk5HRkkvT3BKNVJ3?=
 =?utf-8?B?WDJvSEExTVNzNjFrZ21IKzNEQ0YzOVAzTEpjam1CNDlOUWJVSDBrdGJHRXM1?=
 =?utf-8?B?V05KTFlRRzRyRit3bHhocW90Qnk5cXdPTlFNS0xDZzNzZ2lzVUlNaCtFR2FQ?=
 =?utf-8?B?WnI5akgyQTVjMHRZTWJxcUpOcHVjcDhqT3NEM3R4VXFvRFkxSVFoRmpQMzRr?=
 =?utf-8?B?NkxSZktaUS9zTXN3eGRESkpuZjVmTjV4MVN5Nzk3NDZYTStYak9nMEU0NnVS?=
 =?utf-8?B?ak9TSnh5QVRrRC9MRkFCSkRDRmNiMXFLdk1Udmt0cVVQaU9MODczYXFDZmRo?=
 =?utf-8?B?Ty9yRllzZG9vMW1LMWxVd2xuSXdmZ2VCNi8rL1FUT2ZmZnViK2tSOER4NUVp?=
 =?utf-8?B?RVNFMWlwSDk1M0FPRmx0ZEs0RXcya1NiSFJMVXFYNUNqcVo0djB5M2ZmM1U1?=
 =?utf-8?B?ZTlJV2pvSC9IeFBFcjlWR0M5ZHQzMVA0VmhFN1hoaDZRQncwb0xxdGp5Q2kz?=
 =?utf-8?B?YTFNUUpXaEFNNVhKSW8vOWpGWTZkUC8vTGhCT0hXQ0M2akp2eW9RbzU1Y1Vl?=
 =?utf-8?Q?3AmqyWf4LFOniRvmp0lWk94=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 794af318-4aa4-4ced-e794-08da01dd4ede
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 14:58:45.0540
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: tl7PC9hLvEj/bgOlDe/1QJsgFOH9oJzGDEbgW9pv7bc0qT+W2bkRG9HIMvqgUDrxxL6+bzAboh+nGW5RCzJi4w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB9140

On 04.03.2022 18:46, Marco Solieri wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> Initialize colored heap and allocator data structures. It is assumed
> that pages are given to the init function is in ascending order.

I don't think this is a good assumption to make.

> To
> ensure that, pages are retrieved from bootmem_regions starting from the
> first one. Moreover, this allows quickly insertion of freed pages into
> the colored allocator's internal data structures -- sorted lists.

I wouldn't call insertion by linear scan "quick", to be honest.

> --- a/xen/common/page_alloc.c
> +++ b/xen/common/page_alloc.c
> @@ -2154,11 +2154,26 @@ void __init end_boot_allocator(void)
>              break;
>          }
>      }
> -    for ( i = nr_bootmem_regions; i-- > 0; )
> +
> +    for ( i = 0; i < nr_bootmem_regions; i++ )
>      {
>          struct bootmem_region *r = &bootmem_region_list[i];
> -        if ( r->s < r->e )
> -            init_heap_pages(mfn_to_page(_mfn(r->s)), r->e - r->s);
> +
> +        /*
> +         * Find the first region that can fill the buddy allocator memory
> +         * specified by buddy_required_size.
> +         */

Why would all of this memory need to come from a single region? And
why would any region - regardless of address - be okay?

> +        if ( buddy_required_size && (r->e - r->s) >
> +            PFN_DOWN(buddy_required_size) )

I think >= will do here?

Also - nit: Indentation.

> +        {
> +            init_heap_pages(mfn_to_page(_mfn(r->s)),
> +                PFN_DOWN(buddy_required_size));

And again - indentation.

> +            r->s += PFN_DOWN(buddy_required_size);
> +            buddy_required_size = 0;
> +        }
> +
> +        init_col_heap_pages(mfn_to_page(_mfn(r->s)), r->e - r->s);

Judging from this, buddy_required_size can actually be __initdata in
the previous patch. Being able to spot such is another reason to not
split patches like this.

> @@ -2619,9 +2634,12 @@ int assign_pages(
>          page_set_owner(&pg[i], d);
>          smp_wmb(); /* Domain pointer must be visible before updating refcnt. */
>          pg[i].count_info =
> -            (pg[i].count_info & (PGC_extra | PGC_reserved)) | PGC_allocated | 1;
> +             (pg[i].count_info & (PGC_extra | PGC_reserved)) | PGC_allocated | 1;

Why the change?

> @@ -2642,6 +2660,15 @@ struct page_info *alloc_domheap_pages(
>      unsigned int bits = memflags >> _MEMF_bits, zone_hi = NR_ZONES - 1;
>      unsigned int dma_zone;
>  
> +    /* Only Dom0 and DomUs are supported for coloring */
> +    if ( d && d->max_colors > 0 )
> +    {
> +        /* Colored allocation must be done on 0 order */
> +        if (order)

Nit: Missing blanks.

> @@ -2761,8 +2788,10 @@ void free_domheap_pages(struct page_info *pg, unsigned int order)
>              scrub = 1;
>          }
>  
> -        free_heap_pages(pg, order, scrub);
> -    }
> +        if ( is_page_colored(pg) )
> +            free_col_heap_page(pg);
> +        else
> +            free_heap_pages(pg, order, scrub);}

Very interesting brace placement.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 15:03:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 15:03:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287922.488235 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRxqR-0003wS-4l; Wed, 09 Mar 2022 15:03:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287922.488235; Wed, 09 Mar 2022 15:03:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRxqR-0003wL-0D; Wed, 09 Mar 2022 15:03:19 +0000
Received: by outflank-mailman (input) for mailman id 287922;
 Wed, 09 Mar 2022 15:03:18 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=QNbA=TU=citrix.com=prvs=060736ad3=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRxqQ-0003wF-5p
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 15:03:18 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 0b4a7872-9fba-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 16:03:15 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0b4a7872-9fba-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646838195;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=Rfkgl5pbtknnHgpCb817qfNCozg44OusL0wK0zpm8o4=;
  b=JogTApOnlPxZYLcjbJ9NOJdMCPw/iQpHw3DR85Q2pagG0lCx3JwJDbiH
   3QC3u03vLyU7sJxjb2BNoIoiRZycwUunGSVnae2vtePNzN5L25i40vMgZ
   IOfzTNA0aZ9MCSeOJyirJSnJcy5PB0BOOy03QMgE8UwTHc48q5pwtYsqO
   0=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 68179361
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:WMjG06CHiWF5phVW/xfjw5YqxClBgxIJ4kV8jS/XYbTApG9x3jIPy
 mEaXT3SMqzeMGr2eowibYq080JQuZKAyNFgQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vh09Yy6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhqi
 8Vvl5+zQDwMBYrnwMAXcyRzPzhXaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguw5K8bmJsUHs2xIxjDFF/c2B5vERs0m4PcGjG5v15sQRJ4yY
 eI1YBU0XSvxRiF0M3MxGsgUv/+0gCfgJmgwRFW9+vNsvjm7IBZK+KfpGMrYfJqNX8o9tlaVo
 CfK8nr0BjkeNceD0nyV/3S0nOjNkCjnHoUIG9WQ7eV2iVeewmgSDhw+Vlahp/S9zEmkVLp3K
 UYZ5y4vpqga71GwQ5/2WBjQiHyZuh8RXfJAHut87xuCopc4+C7AWDJCFGQYLoV76olmHlTGy
 2NlgfvyRixNkr6WQEm4zZC/9Re4GRU+AXYrMHpsoRQ+3/Hvp4Q6jxTqR9llEbKogtCdJQwc0
 wxmvwBl2exN0JdjO7GTuAme3mny/sShohsdu12PNl9J+D+Vc2JMi2aAzVHApchNI4+CJrVql
 ChVwpPOhAzi4HzkqcBsfAnvNOzxjxpmGGeF6bKKI3XH327zk5JEVdoMiAyS3G8zbq45lcbBO
 Sc/Qz956p5JJ2eNZqRqeY+3AMlC5fG+SYq6CKyOPoYSPsYZmOq7EMdGPx74M4fFyhRErE3CE
 c3DLZbE4YgyUsyLMwZat89CiOR2l0jSNEvYRIzhzgTP7FZtTCX9dFvxC3PXNrpRxPrd+G39q
 o8DX+PXm0Q3eLCvOUH/rN9MRW3m2FBmXPgaXeQMLbXdSuencUl8Y8LsLUQJINU0wf4Kyr+Wo
 hlQmCZwkTLCuJEOEi3TAlhLY7LzR5dv63U9OC0nJ1Gz3HY/J42o6c8im1EfIdHLKMQLISZIc
 sQ4
IronPort-HdrOrdr: A9a23:a3bJ36ifCFgVuVc2UCBiZfasWXBQXzR13DAbv31ZSRFFG/FwyP
 rBoB1L73DJYWgqNE3I+erhBEGBKUmsk6KdxbNhQItKPTOWwldASbsC0WKM+UyEJ8STzJ846U
 4kSdkDNDSSNykKsS+Z2njBLz9I+rDum8rE9ISurUuFDzsaEJ2Ihz0JdDpzeXcGPTWua6BJc6
 Z1saF81kWdkDksH4yGL0hAe9KGi8zAlZrgbxJDLxk76DOWhTftzLLhCRCX0joXTjsKmN4ZgC
 L4uj28wp/mn+Cwyxfa2WOWx5NKmOH5wt8GIMCXkMAaJhjllw7tToV8XL+puiwzvYiUmR0Xue
 iJhy1lE9V46nvXcG3wiRzx2zP42DJr0HPmwU/wuwqVneXJABYBT+ZRj4NQdRXUr2A6ustn7a
 5N12WF87JKEBLphk3Glpf1fiAvsnDxjWspkOYVgXAae5AZcqVtoYsW+14QOIscHRj99JssHI
 BVfY3hDc5tABKnhk3izylSKITGZAVxIv7GeDlOhiWt6UkZoJgjpHFohvD2nR87heYAotd/lq
 H5259T5cJzp/8tHNJA7dg6MLmK40z2MGTx2TGpUB3a/J9uAQO5l3ew2sRw2N2X
X-IronPort-AV: E=Sophos;i="5.90,167,1643691600"; 
   d="scan'208";a="68179361"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=K6OuQV8TktSazQ6BFZDGYd3cujhd0ZD3pmuUu1cSuopx1BML87/gtoZky0StvRdOZ8einYzI8wDCzBENI2YzmsgjlIUClDUg1+j4Ll31hhqRiT0DNiuacja9Gk/sHxEyS7BUEQHXqIGfiQHTR2du/tyFrl+3hXecvw5TveeEKr4xc3bC/giiJc2XNl5iRRzW/Bc5reBURk6MZsVSa3GAa5id/keLheCjCQ1YlXj7M/KbrsMVh+QRgcMd/gDI5anAuahWKQjRjO4ihGs3SV+xng18Bhavnqtwx/auRvR3f5e7jh6fzDTWAAVGUF4tGftm3YZkuASD7boZasBeG/48BA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Q+vAzNBy6urDMsrnB4U3tX+JhRiocWedB//5xLBc98k=;
 b=TCLgNvmK2Q+2pd80mIIbsujKqBqO09HwmFeztjRdaHpBDH08dmkjH0H0vGubqvKDNHW4CC2YFH7jdn4y4OvV8iAW2wP1p9RQdmk4YmVGp1z2NhuZzRBRIQz+aorXVjxr9LVnRuBmA6QJzpxQZQiYp1o/jWQilizDafTGyXfTqTt+WPTmhDkdqnhAi4CDAIc10yxALR4qd/GVfZldaatv1sVejheBDfMI466Evcao22oEd1t4YTHOTwBfxpKluZzemxB67XLwsCRw0nybeGi7eKvxrpjO1xZ6eI2Rh3DaESHBTBgIDzg5Df6TIedbn584EraoBPMapbvK/g7nUSAwYA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Q+vAzNBy6urDMsrnB4U3tX+JhRiocWedB//5xLBc98k=;
 b=cyMTUSkRxAkTrjnmZH1IjFOFip9I65ds0HHwiLn8JXdRD5yRVJ/qvVgOxn+SFj9arK1Y0jYll5ndX87HPZuz5K6Sa7UFpgoB99aGSg+OpFenUY0WIKpB2Ef9n6+oM9GpQumyRzr9AbzzoSsWWEldxfoCt+2+bsAqC4GP76DN+pQ=
Date: Wed, 9 Mar 2022 16:03:03 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH 1/3] amd/msr: implement VIRT_SPEC_CTRL for HVM guests on
 top of SPEC_CTRL
Message-ID: <YijBpyOlmTA7tIUl@Air-de-Roger>
References: <20220201164651.6369-1-roger.pau@citrix.com>
 <20220201164651.6369-2-roger.pau@citrix.com>
 <8e7f3193-dee6-1ff4-0c68-081032e240d2@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <8e7f3193-dee6-1ff4-0c68-081032e240d2@suse.com>
X-ClientProxiedBy: LNXP265CA0009.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:5e::21) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 08e21687-8a77-49db-74dd-08da01ddec10
X-MS-TrafficTypeDiagnostic: SN6PR03MB3968:EE_
X-Microsoft-Antispam-PRVS: <SN6PR03MB396863BD4AC7DCA4673C14958F0A9@SN6PR03MB3968.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: g4aopYaLxv/9iQlhbAAJeCO8Yy44vpEkCupERwGLq4cO7aEuzVWStNlvoYT2VD0Jkq2PTNgrLu1ba+qvwJaVLZjD+lxxZNKHtcHr7ap+yB2LjiBAb9GpYhqR2lZpODf8fpkJRGs9CqTkPqK3GxlWXgVRVYG0aPtBnjgkmdNa+iyAmoHNkd6hZYG1RncFVChCsONubNFgMx3t1KYBKtS/VEZYB6Nii6H0vFVpkcJGIwPo0LZbmGeUuAbArnmFXRfURpwOaXiKTHAfH1OJPdR9fzhm4ZEQeejxD9ixWpbPrYy2ecFRtxpHgW6ShX7oCR2df9ani+5u2cJIBFa0jyp8DVr/GxOFQfbEzjiHXmGoknJ1wdIRcCS5wxC3K3aVTvOtKUETASKWvgkgQVwyLoCYpXtJO2hqwcI6kOfv1wdq/9osUqiGm3LFmFuJkcQe5iRBs6bcf6uq/sZmvxD2Ou1NkcxqrCRwY5W+XkPPLl1mLQelmZhLp7HJVHKKuD/K60Y6qKMF10k3qQz8zteY/5C2j3O4WuYNM09A9YkwQzpFEEkz2RLqCQ1awDd8U6xEyN4rNNcOLRwEAz0Y08kaQa7m0NZMsJMxez0EOa2ZhDE8OtzOJZfry8mBSsshHZ2khDscOzFQv3kA/nGHtQ836zBCrQ==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(33716001)(4326008)(66556008)(66946007)(8676002)(6666004)(26005)(83380400001)(86362001)(38100700002)(2906002)(66476007)(82960400001)(5660300002)(8936002)(6486002)(6916009)(6506007)(54906003)(85182001)(508600001)(9686003)(6512007)(316002)(186003)(53546011);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?QjEvSnB3cGIwQ2pZWGs4L0ZuNGlwWHBMV3JLRm5PTC81M09vM2ZBaGNjQU1j?=
 =?utf-8?B?TVUzTGloWmhWbmVVQ2xtSk9BQUVIZkRuNmgvL3ZuaGpCTC84ZGh0cVNZejJU?=
 =?utf-8?B?OU5MNk9tT3I4SVNlWklySGh0OSsyV0dzeFArZlZiT1B0VkovSUpMUVlYTzhZ?=
 =?utf-8?B?bnZ3Z2VCYU5kVGRmUlN4TWozNTV1c0prWDFZaSs3Yit1RXRwVVlSZnFEQjZu?=
 =?utf-8?B?K0ZnbXNjakJuTmgwYnRaeWdaMFdMakViQUErOElaSk9RL3crY3VjeFdKNUlq?=
 =?utf-8?B?TlBzYStDd01CWTJmMlFPREVIUU1sSmhUM2JHM1Bhc2c1S283SHV6TlF4Ly9F?=
 =?utf-8?B?cVZDaHNzMVEzODVsQ2QvRERRN2ZWWDB3U0RHOWRNcmpkdkdacnorRmhHa0NN?=
 =?utf-8?B?TDFFZE5xcWVGOHZBVUluM2t6U3I4LzhJdTVCR212aTFHOURkaVN1dXo0TXZh?=
 =?utf-8?B?VC92Y0FrYVdRNUZuOVNXOWQ3VG5IcTF0WWdBNXdoeFBOYVNWYTJTZC9nN0pW?=
 =?utf-8?B?QXZLcGNIR2E3MDlyL053dTFCM1JYV1V6cG1zeTdxOEVjSFJSRXhDZ1NiN1lM?=
 =?utf-8?B?VUVmbDNlMzFOUnp0RjdNZWI4ZXJDL0xVOWhWUHQwakRBUHJzOSt2bHBGemVz?=
 =?utf-8?B?MDlIcHhkL2R6UFZLcVlvRnQrYzFuVVBEM0VxWkZ2Y29sQ2JrdmhDN2hhN1Jx?=
 =?utf-8?B?QmJLU3kwdmJhSVRIQjNvUGNKMVhTUHdLYkRneFZWMVd5bHZWL0tYbW15Z1VY?=
 =?utf-8?B?OVExTUxtaHBlSEVSZG9mU29xdjJnN0grYkhmbTM4aWNISEhrNTNVUHFhOEhv?=
 =?utf-8?B?WTlrVWNmbTN1YVBIVkc0T0o0aXBYR0Z2YlBidHBpaEdqTUhFRkF4WE5peVIw?=
 =?utf-8?B?VjN3LzZuNGlFRnJVck9heEFnZm9yNTFuMlY4cHNrK1RxRERpNi9VdURzRGhB?=
 =?utf-8?B?ZVVNbUxMSFI4SHpJSDRqa2ducUFEcVBmVUErSFNvWDBwUkJUT1FrNkxuSTZH?=
 =?utf-8?B?TmFpK0xkWCtBRHYrbWsxTVl3RkNtblVpZVVHZXJGV0Fta1hyZ0JDVUF2Rm9w?=
 =?utf-8?B?VUtXamc5YmMwenNqN0J2Qjc0TFJDeDVWNy83UmFMWTVxdWtRUlJCcVI1OW1J?=
 =?utf-8?B?THQ4TzR6VFhzZVNTVk1YOERORVdnalAwT3EwRzE1aUdKNTk2TFRieXNQZW9H?=
 =?utf-8?B?NXJHbVMyZTdSVHZjNmNVaExTdlJYQmgxRjd5N093TWJNYXRYcVpUUVdrNktI?=
 =?utf-8?B?aTBidmZ2N0xRT0MzRDlTTmZtWWM2ZE1IZTFxaTR5VVVwYnhmUUxnUzczL3Ex?=
 =?utf-8?B?eElUZTBTQk1QRTJFdnNBd0FNU05rbHpKbFkyUzRRc0w1WkYzODJweDIxd2c1?=
 =?utf-8?B?M0E1b2xBTlZNdm1ZZ2ttaWEwUFRZem5DQ01SNWliMFhwWXFoSzJ2d0RLSGZJ?=
 =?utf-8?B?UVpZT0FjQVVhN3BISHE0YXpEUXhSNGNSN1dyR2RVU082Y2szb21YVm1JZTRm?=
 =?utf-8?B?NXBaTzNVNHZXdHYydHhpblZ4SlpqM05RZC9xeUhwUER2cmtNdnQyU0s5ajlu?=
 =?utf-8?B?d0hVMjZlN2RTbTlFYUZzcUtSNE03QjUyK3dGRHVuNkpvZUFkVXloOEk0OXdR?=
 =?utf-8?B?U0cyamxuM2NRSGZ2T2RGdkprY1IwN1RvRmRKUVRVRG1ZYll2aEptYWFLU2Fs?=
 =?utf-8?B?dmc5QjRGclgvR2lMT2I3aFJWbUhyTWJiS0M1bzFEek9hNjB2NTNvUEVaU1Js?=
 =?utf-8?B?dEM4MFJGVXpDWFFiOXN3ckh6OThIR3V4a2tic3R0aE1OOUhzQ0Q2UXlOV1NE?=
 =?utf-8?B?ZlZTTFpqeEtkdWxRckhlcWd2a3FzWXBCbmhFRVZjRVExWnpQRnNxZ2NQTjky?=
 =?utf-8?B?cVBqVi92NUtHRWk1QVRMMDEwMXlyNGlhMnZFdE5XTWtYcDdOM3Z4dTdrUXNU?=
 =?utf-8?B?WHRlL0hPaWNXRmtXODFlRWJqQ001V09uVWZaK2RmaXY5aFF2RUFjUnZjTkda?=
 =?utf-8?B?bkM4SGhDWVd1UUs2UVJyYUwzWGJKMWVWdnBSMHV5eWpQZDJXN0lnZG1BODNB?=
 =?utf-8?B?VVFDdFVqK1BxZ2VYSFFPMko4UU1jaXNSVjk5TTB1T2YxTVAwV09sdDJ3YjBp?=
 =?utf-8?B?NEE4ZUlrTHBHM3VxeVBGM2lEckp3eE9ZcEdmY3Y5ZkJYTVI2NUtBSElGOWo0?=
 =?utf-8?Q?I7EUiQMPypudbuklagr5IoU=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 08e21687-8a77-49db-74dd-08da01ddec10
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 15:03:09.2509
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: yShx9DOGh7hwx+dLooryfYoiZvlYQvvSva0M6b1gHwmr36Pjil9DxT6K5qtWpD2HB98A/UW3xSZOzWf1aTJ1AA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR03MB3968
X-OriginatorOrg: citrix.com

On Mon, Feb 14, 2022 at 04:07:09PM +0100, Jan Beulich wrote:
> On 01.02.2022 17:46, Roger Pau Monne wrote:
> > Use the logic to set shadow SPEC_CTRL values in order to implement
> > support for VIRT_SPEC_CTRL (signaled by VIRT_SSBD CPUID flag) for HVM
> > guests. This includes using the spec_ctrl vCPU MSR variable to store
> > the guest set value of VIRT_SPEC_CTRL.SSBD.
> 
> This leverages the guest running on the OR of host and guest values,
> aiui. If so, this could do with spelling out.
> 
> > Note that VIRT_SSBD is only set in the HVM max CPUID policy, as the
> > default should be to expose SPEC_CTRL only and support VIRT_SPEC_CTRL
> > for migration compatibility.
> 
> I'm afraid I don't understand this last statement: How would this be
> about migration compatibility? No guest so far can use VIRT_SPEC_CTRL,
> and a future guest using it is unlikely to be able to cope with the
> MSR "disappearing" during migration.

Maybe I didn't express this correctly. What I meant to explain is that
on hardware having SPEC_CTRL VIRT_SPEC_CTRL will not be offered by
default to guests. VIRT_SPEC_CTRL will only be part of the max CPUID
policy so it can be enabled for compatibility purposes. Does this make
sense?

> > --- a/docs/misc/xen-command-line.pandoc
> > +++ b/docs/misc/xen-command-line.pandoc
> > @@ -2273,8 +2273,9 @@ to use.
> >  * `pv=` and `hvm=` offer control over all suboptions for PV and HVM guests
> >    respectively.
> >  * `msr-sc=` offers control over Xen's support for manipulating `MSR_SPEC_CTRL`
> > -  on entry and exit.  These blocks are necessary to virtualise support for
> > -  guests and if disabled, guests will be unable to use IBRS/STIBP/SSBD/etc.
> > +  and/or `MSR_VIRT_SPEC_CTRL` on entry and exit.  These blocks are necessary to
> 
> Why would Xen be manipulating an MSR it only brings into existence for its
> guests?

Well, that's not exactly true. Xen does use VIRT_SPEC_CTRL (see
amd_init_ssbd).

I'm unsure how to express support for VIRT_SPEC_CTRL, as it does rely
on SPEC_CTRL when available.

> > --- a/xen/arch/x86/cpuid.c
> > +++ b/xen/arch/x86/cpuid.c
> > @@ -543,6 +543,13 @@ static void __init calculate_hvm_max_policy(void)
> >          __clear_bit(X86_FEATURE_IBRSB, hvm_featureset);
> >          __clear_bit(X86_FEATURE_IBRS, hvm_featureset);
> >      }
> > +    else
> > +        /*
> > +         * If SPEC_CTRL is available VIRT_SPEC_CTRL can also be implemented as
> > +         * it's a subset of the controls exposed in SPEC_CTRL (SSBD only).
> > +         * Expose in the max policy for compatibility migration.
> > +         */
> > +        __set_bit(X86_FEATURE_VIRT_SSBD, hvm_featureset);
> 
> This means even Intel guests can use the feature then? I thought it was
> meanwhile deemed bad to offer such cross-vendor features?

No, we shouldn't expose to Intel.

> Additionally, is SPEC_CTRL (i.e. IBRS) availability enough? Don't you
> need AMD_SSBD as a prereq (which may want expressing in gen-cpuid.py)?

We need AMD_SSBD if we implement VIRT_SPEC_CTRL on top of SPEC_CTRL,
but we could also implement it on top of VIRT_SPEC_CTRL (if Xen runs
virtualized) or even using the legacy SSBD setting mechanisms found in
amd_init_ssbd, so I don't think VIRT_SSBD should explicitly depend on
AMD_SSBD in gen-cpuid.py.

> > --- a/xen/arch/x86/include/asm/msr.h
> > +++ b/xen/arch/x86/include/asm/msr.h
> > @@ -291,6 +291,7 @@ struct vcpu_msrs
> >  {
> >      /*
> >       * 0x00000048 - MSR_SPEC_CTRL
> > +     * 0xc001011f - MSR_VIRT_SPEC_CTRL
> >       *
> >       * For PV guests, this holds the guest kernel value.  It is accessed on
> >       * every entry/exit path.
> > @@ -301,7 +302,10 @@ struct vcpu_msrs
> >       * For SVM, the guest value lives in the VMCB, and hardware saves/restores
> >       * the host value automatically.  However, guests run with the OR of the
> >       * host and guest value, which allows Xen to set protections behind the
> > -     * guest's back.
> > +     * guest's back.  Use such functionality in order to implement support for
> > +     * VIRT_SPEC_CTRL as a shadow value of SPEC_CTRL and thus store the value
> > +     * of VIRT_SPEC_CTRL in this field, taking advantage of both MSRs having
> > +     * compatible layouts.
> 
> I guess "shadow value" means more like an alternative value, but
> (see above) this is about setting for now just one bit behind the
> guest's back.

Well, the guest sets the bit in VIRT_SPEC_CTRL and Xen sets it on
SPEC_CTRL in order for it to have effect. I can use 'alternative
value' if that's clearer.

> > --- a/xen/arch/x86/spec_ctrl.c
> > +++ b/xen/arch/x86/spec_ctrl.c
> > @@ -395,12 +395,13 @@ static void __init print_details(enum ind_thunk thunk, uint64_t caps)
> >       * mitigation support for guests.
> >       */
> >  #ifdef CONFIG_HVM
> > -    printk("  Support for HVM VMs:%s%s%s%s%s\n",
> > +    printk("  Support for HVM VMs:%s%s%s%s%s%s\n",
> >             (boot_cpu_has(X86_FEATURE_SC_MSR_HVM) ||
> >              boot_cpu_has(X86_FEATURE_SC_RSB_HVM) ||
> >              boot_cpu_has(X86_FEATURE_MD_CLEAR)   ||
> >              opt_eager_fpu)                           ? ""               : " None",
> >             boot_cpu_has(X86_FEATURE_SC_MSR_HVM)      ? " MSR_SPEC_CTRL" : "",
> > +           boot_cpu_has(X86_FEATURE_SC_MSR_HVM)      ? " MSR_VIRT_SPEC_CTRL" : "",
> >             boot_cpu_has(X86_FEATURE_SC_RSB_HVM)      ? " RSB"           : "",
> >             opt_eager_fpu                             ? " EAGER_FPU"     : "",
> >             boot_cpu_has(X86_FEATURE_MD_CLEAR)        ? " MD_CLEAR"      : "");
> 
> The output getting longish, can the two SC_MSR_HVM dependent items
> perhaps be folded, e.g. by making it "MSR_{,VIRT_}SPEC_CTRL"?

OK, but further patches will add MSR_VIRT_SPEC_CTRL to hardware that
doesn't expose MSR_SPEC_CTRL to guests, at which point it could be
confusing?

> > --- a/xen/include/public/arch-x86/cpufeatureset.h
> > +++ b/xen/include/public/arch-x86/cpufeatureset.h
> > @@ -265,7 +265,7 @@ XEN_CPUFEATURE(IBRS_SAME_MODE, 8*32+19) /*S  IBRS provides same-mode protection
> >  XEN_CPUFEATURE(NO_LMSL,       8*32+20) /*S  EFER.LMSLE no longer supported. */
> >  XEN_CPUFEATURE(AMD_PPIN,      8*32+23) /*   Protected Processor Inventory Number */
> >  XEN_CPUFEATURE(AMD_SSBD,      8*32+24) /*S  MSR_SPEC_CTRL.SSBD available */
> > -XEN_CPUFEATURE(VIRT_SSBD,     8*32+25) /*   MSR_VIRT_SPEC_CTRL.SSBD */
> > +XEN_CPUFEATURE(VIRT_SSBD,     8*32+25) /*!s MSR_VIRT_SPEC_CTRL.SSBD */
> 
> What is the ! intended to cover here? From guest perspective the
> MSR acts entirely normally afaict.

I've used the ! to note that VIRT_SSBD might be exposed on hardware
whether it's not available as part of the host featureset. It did seem
to me that using just 's' didn't reflect this properly.

According to my reading of the comment at the top '!' is not used to
signal that the feature might act differently, but just that it's
presence cannot be properly expressed with just the A, S, H flags,
which would be the case for VIRT_SSBD I think.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 15:08:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 15:08:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287929.488245 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRxv2-0004fN-PJ; Wed, 09 Mar 2022 15:08:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287929.488245; Wed, 09 Mar 2022 15:08:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRxv2-0004fG-M9; Wed, 09 Mar 2022 15:08:04 +0000
Received: by outflank-mailman (input) for mailman id 287929;
 Wed, 09 Mar 2022 15:08:03 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=QNbA=TU=citrix.com=prvs=060736ad3=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRxv1-0004fA-E6
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 15:08:03 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b570fe41-9fba-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 16:08:01 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b570fe41-9fba-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646838481;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=MRcc3SMMzIOe17Ity2K289oP/AuYescw4pPRiIvdLSM=;
  b=WhgC0zatNMxHx8mLx3aWDajHvJHQo03TJOHmE7JzIF8lgLqO0sDzG4Re
   zkneV07yPCKrbSeUVnpnNI/9rR2ixGtTpsBVTNgu9qAUgUyE+L+C5j3Qv
   T6lGg+N7M/5ycYBKvY7yK1M2cJpur0O5LVCnpWnHBZU7vDgYy2V6EySdD
   M=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65756988
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:gZhDEKCqfiy5sBVW/6jjw5YqxClBgxIJ4kV8jS/XYbTApG8mgjwCz
 2UWCm2FO/fZa2Xxftl1bdzi9k5UvJSAmNNiQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vh09Yy6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhM8
 /UQnpLoEj4wYJ/Xme8kQUh2HD5xaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguw5K8bmJsUHs2xIxjDFF/c2B5vERs0m4PcGgWht2JEeTZ4yY
 eImRxd1MhD7PCFeFUcHNrk8x/W52nvGJmgwRFW9+vNsvjm7IBZK+LLgKsbPc9qGA8BchF+Fp
 3nu9n78RBodMbS31j6t4n+qwOjVkkvTWo0IHbm83vdviU+UwCoYDxh+fWW8pf61m0uvQeV1I
 kYf+jcthaUq/UntRd74NzW6qnOZuh8XW/JLDvY3rgqKz8L88wufQ2QJUDNFQNgnr9MtAywn0
 EeTmNHkDiApt6eaIVqG7audpz62PSkTLEcBaDUCQA9D5MPsyKkxkxbOQ9BLAKOzyNrvFlnNL
 yui9XZkwe9J1IhSivv9rQuvby+QSobhczUVuy7ZBjmc911Lf4+uXp75x1fE4qMVRGqGdWWps
 H8BksmYyekBC5CRiSCAKNkw8KGVC+Wta2OF3wM2d3U133H0oiP4I9gMiN1rDBoxaq45lSnVj
 Fg/UO+7zLtaJzOUYKB+eOpd4Ox6nPG7RbwJuh05B+eig6SdlifapEmChmbKhggBdXTAd4llZ
 /93lu72UR4n5VxPlmbeegvk+eZDKtoC7W3SX4vn6B+szKCTYnWYIZ9cbgfQMb5ltvPY/FmLm
 zq6Cyds408POAEZSnOLmbP/0HhQdSRrbXwIg5c/mhG/zvpORzh6Vq65LUIJcI15haVF/tokD
 VnmMnK0PGHX3CWdQS3TMygLQOq2Af5X8CJqVQRxbA3A8yVyPu6SAFI3KsJfkU8Pr7c4k5aZj
 pAtJq29Pxi4Ym+eqmpHMsWl8tAKmdbCrVvmAhdJqQMXJvZIbwfI5sXlbk3o8iwPBTCwrswwv
 /ur0QazfHbJb14K4Br+AB53826MgA==
IronPort-HdrOrdr: A9a23:KUvYQ6EqCSnPuV8OpLqFBpHXdLJyesId70hD6qkvc3Jom52j+P
 xGws526faVslYssHFJo6HnBEClewKgyXcV2/hqAV7GZmjbUQSTXeRfBOfZslnd8mjFh5JgPM
 RbAtlD4b/LfCBHZK/BiWHSebtQo6jkzEnrv5ak854Ed3AVV0gK1XYBNu/0KDwQeOEQbqBJa6
 Z0q/A37waISDAyVICWF3MFV+/Mq5nik4/nWwcPA1oC5BOVhT2lxbbmG1zAty1uGQ9n8PMHyy
 zoggb57qKsv7WSzQLd7Xba69BzlMH6wtVOKcSQgow+KynqiCyveIN9Mofy9wwdkaWK0hIHgd
 PMqxAvM4Ba7G7QRHi8pV/X1wzpwF8Vmgjf4G7dpUGmjd3yRTo8BcYEr5leaAHl500pu8w5+L
 5X3kqC3qAnQi/orWDY3ZzlRhtqnk27rT4JiugIlUFSVoMYdft4sZEfxkVIC50NdRiKpLzPKN
 MeTf002cwmMW9zNxvizypSKZ2XLzkO9y69MwY/Upf/6UkVoJh7p3FosPD30E1wsa7VcKM0lN
 gsAp4Y5I2mcfVmH56VJN1xN/dfWVa9CC4lDgqpUCHa/ec8Sjbwl6I=
X-IronPort-AV: E=Sophos;i="5.90,167,1643691600"; 
   d="scan'208";a="65756988"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=KmNM7ySE/qFdO8KXIwon4DWZbI2WFCQ0WQ0GNGGZcxphRDJg8NT90r2Om0kgDbXhDQEfRhRLjyAz6j+xlWrhKTrQbj6+SLQlJv2FC8SxqSPeGfATUicwcNv1DCKs05XV43DXOtlrG+ch20S8s4rmbSPYggAaotX1W2pEE2BIzDp/tfukQxsOvpAvws5rkEKTQ7cOKveNYhYhBdxdniB2y0KCTLQkdGa8gpPfvTeIH19fUaqeTIAXMSjIhS6+bX9ceS+uEG0CEGXJCfhlnKbB0ijg+zMMv+Pod5GKFOV4we09+ZrkRSQ3mxejWxh3BqDEyMFMIku3oCcXRftn2/oLDA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=611DOdpLMuTwMAqQwGS9L1cjcG9t+GEoCqlhXsqn3WU=;
 b=d9WTtTMm7EExx+WnakrMb2jv8jk8CIUbh6fY6ulopX/4x1bAPtSl7gscAQH+XnCZxXgHAGE1vwyGaEhwlJYRyhhc15AN1xqcraQRdrDA2KA2Aol+a85xfIIA0Bs4ZBmJmkD63OUFfRHJ2JS1pQBqrQRkU9diVnkXPeo4KHcxTGpdXru+sLZ6v1yZxKWmc/DljpSBLP1hBbl74nXtS+fpTjiPmabcvf1qvGxyAsLZXdWWZ59bJELjiVXK+A4nDVe7GyW9A5U9o0TwQLz7zkFPsCZW1rCc/swULduFs4QAJO5bEibIIr/RBbRUWEftesT1V/QB/4AKkAVwY1fCZo+H7w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=611DOdpLMuTwMAqQwGS9L1cjcG9t+GEoCqlhXsqn3WU=;
 b=El08tMB77Ybz/sQF6891ol+wwOLvg0ANoXLGyn6pIrUHLiJsqZLdjkTOaBMmjL/pvamWdXfks9vyt0IGEa4zU1fUnD9tXavVxJkvpeouuUAjpSFTpeWxbuF9y1gVI4QIQSQf99q1srzAg+pOB4Sn07OCzuoL7b2iQf9dTj16nH4=
Date: Wed, 9 Mar 2022 16:07:38 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "George
 Dunlap" <George.Dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, "Julien
 Grall" <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, Wei Liu
	<wl@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>, Julien Grall <jgrall@amazon.com>
Subject: Re: [PATCH v4 2/2] livepatch: set -f{function,data}-sections
 compiler option
Message-ID: <YijCuo4lppwesjAC@Air-de-Roger>
References: <20220309122846.89696-1-roger.pau@citrix.com>
 <20220309122846.89696-3-roger.pau@citrix.com>
 <48528d19-d6ab-d8ae-498c-091b5b719250@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <48528d19-d6ab-d8ae-498c-091b5b719250@citrix.com>
X-ClientProxiedBy: LO2P265CA0473.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:a2::29) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5e008c1c-24be-41b2-fbc9-08da01de8f85
X-MS-TrafficTypeDiagnostic: BY5PR03MB5218:EE_
X-Microsoft-Antispam-PRVS: <BY5PR03MB52184157E23AB141262BF8A18F0A9@BY5PR03MB5218.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(316002)(82960400001)(83380400001)(5660300002)(66946007)(66556008)(2906002)(8676002)(4326008)(66476007)(8936002)(85182001)(6862004)(186003)(33716001)(6486002)(6636002)(508600001)(26005)(38100700002)(54906003)(6666004)(6512007)(6506007)(53546011)(9686003)(86362001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?RXB6UjlqbUN6Y0hTbUh3ZE1XQTRDT1UvY3Q2RXljZjZXaVlnZHNYMTh5WnB0?=
 =?utf-8?B?YjljRUR3SlFRNEtpNk1LZnJTSU5EMUpxWUNWWnR0YVhkQ0RzYXBFem9CelhQ?=
 =?utf-8?B?eC9PRkJsK1pZc3hWR1dHSFNIN3FaR3hKdXE1T3JXN2VocGVzdHRxYnNCVnVO?=
 =?utf-8?B?VGxzSHlONVk5N2JyZThHeTlsbTlVcW1LdzdobUhUUGVBTnMyYlpkMEJYVGly?=
 =?utf-8?B?UWhPYUlOVkFHVjFTYy8xMzYxdVRERE9BZUhlQkZEdEFBc2ZFWVJNcjlvdmtt?=
 =?utf-8?B?ZWIxYkluRm5FTVYyMzBtTHdOOWNtUHdUaHd5VGlGMU1mN043NlJCTEtaV1h6?=
 =?utf-8?B?aDR0czBPdlZ3UXN1eHQybDRQNDI3WHRvNUlBVzgwZ3JPc2dJRG5TaHlQdlgv?=
 =?utf-8?B?eExqVWlITldoeE5rWVFYUmRhdkpEVEpKMUUwb0ZHdTA2VnN5WUlBYXpObFor?=
 =?utf-8?B?UTdFMHUvWXMvQkZaQmxhZEU4TDk5RmhaeDhjU003S2Eza09TN0doTmxYS2cx?=
 =?utf-8?B?Z1VJV3R2Vm9OUW1zcWlLWktEY2Q5Q0ZUNXNJMzB0VzY0Sk9xN3hpNlR0aG9Y?=
 =?utf-8?B?U0Z0djJSajlmSjlhU2p2WDU3Wld4c1VBM0h4Vk55ZlZKaTRqb0R1YVhTQkdw?=
 =?utf-8?B?dkJzTGQ2bWRIc2FQb0F4UHJnMGQwcENrUkNaNDlBU1l5QlI1eWJRb3pxOWdK?=
 =?utf-8?B?dU9ocWlTa3RFcUJEUjVPU0NoVVU5NDJFRFBGejd0WUxpLy9EeWdTSkd4NGdo?=
 =?utf-8?B?cmEyNVlpTis1MDkzNDQrL2pWVk1OR2JCWWR2cVlzUE5reEVEYmhaajhmVno2?=
 =?utf-8?B?d1g2ZW1GMlpUZmlaTlhqM2MxMDlYQkdMSCs0U2UyaGpHTjE2V2VWTUFPU3VD?=
 =?utf-8?B?cG52RnNrY2RtZEhVSVVrUXlXT3pzSndqLzJ4SmxqaVdHT3Iva0FrZmtLYllD?=
 =?utf-8?B?L3RLcjVoSEQrQW96RW1LM1hCZFRjZ3V4cllOY3c4emdqSjlTZVd0ejREcmhv?=
 =?utf-8?B?YmdyMjc3cnAvVUxjM1JaTS9KTlNCblhUcGR5SHNwUWRkbzlnTDdnNmJFZWJR?=
 =?utf-8?B?T3ZXZUJxWUJ6YnNqUW93M3pqeWRxTWRWSUV5dlpQZXBselp3VDdWZWZ2cUVu?=
 =?utf-8?B?YUZieXlvOGFQSEEzVkxaMlRwaHptVFhuVFltaWhxRGJCMlZPQWNvZGY5eW5V?=
 =?utf-8?B?dk55cHpFWjNmYmhzOHlnREpMKzc2U3J5RTNWR0s0MDgrbHFSdVVyN0JFQ2E4?=
 =?utf-8?B?ZmdMUEo1N25yTW5xcStyTXRmVW1SM2FjM2YxQzFGaHI2SDdUVUZKVU9PREU1?=
 =?utf-8?B?VnN2d2w2bG5ScDU0SW9UYmFmc3Bvb21GMngrSWlBL0dsNG40b0YzUXYyNjEv?=
 =?utf-8?B?T2Ntb3hMblhUMFhMRzYrdURsQWJoeXE5N2NUV0sxWHROaG41MTE5TmJuMFJm?=
 =?utf-8?B?Ym5vTHdlUTNsMkJwUHJuNXpjdGgrNzFqZkdieFBnWjJVRUNBYnRZakNaWDZo?=
 =?utf-8?B?aEo3L1FKSUU5Uk93T0JqUVBWUGZVYzhnNzZNOGs5ajl0aS9JWEV5T1Q2Vzgz?=
 =?utf-8?B?Si94bVpUN3U0OWUrMXlCQU5OWjJPY0NhRnc0OGY5L0NVL29jMU5Wek1TdDQr?=
 =?utf-8?B?czZaNGFGUUZGaTJYVUcwQ0x5VTY1eWRlTk4xUFh0Ym5PS01sVHJSS2cweHRl?=
 =?utf-8?B?S2UwNmg1b2g1SVBSczlvWXZjT0VHdURMcG1MeGhkdGtWbko3eGF0WVRBbVJX?=
 =?utf-8?B?Y0hSL1ExYW45UmZDaldSOHRPVzNBVWs5eUpmanR4SDdkS25SNHAxcmIrTWdp?=
 =?utf-8?B?czhWbWFJN0o4Q3hMbG82TmdHbDlsZ3o1dHc2S2dXTVVDTnJTNkE5d2sxa3lK?=
 =?utf-8?B?SFRjVUF6NHBIVDNrOUt2Z21iaTJaU0s3ZkdLN2s1Mm9TRzdCUzRreW14M3pn?=
 =?utf-8?B?K2JiUkp1RU1UUWtNc2YwODZjVFJZTTg5cXJMUk9QYTl1eUh2b3FVazdGT0Q4?=
 =?utf-8?B?dER3dHYyc2VhcEJVUVRVSEZTbFRYViswRjVUYkRzcTdIQXhuRHkyZXA3TmY4?=
 =?utf-8?B?aElNQk51K3ViTWdIUnhIcEJya0RWeFdKa2dETk1vMkFNQkpsRWNjazJYNkEw?=
 =?utf-8?B?OTdzcUZXTDZ2UUZxOTNMcEJlZjJnd2kvelV6dkpzdzVWVUw2c0lUU3BrcUUx?=
 =?utf-8?Q?z8UNmHDpyXzTGYi4BrgUT9o=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 5e008c1c-24be-41b2-fbc9-08da01de8f85
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 15:07:43.0823
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: HmJLf516TiIws3r9XtEMqJMOEFm3FFCaN4cR5AIsCl3X+1ZFKU/4G2SzM3EAZ0+T1dCGBQaoO6g8RCPXr4aJyw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR03MB5218
X-OriginatorOrg: citrix.com

On Wed, Mar 09, 2022 at 02:58:06PM +0000, Andrew Cooper wrote:
> On 09/03/2022 12:28, Roger Pau Monne wrote:
> > diff --git a/xen/arch/x86/xen.lds.S b/xen/arch/x86/xen.lds.S
> > index 960c51eb4c..4103763f63 100644
> > --- a/xen/arch/x86/xen.lds.S
> > +++ b/xen/arch/x86/xen.lds.S
> > @@ -87,9 +87,12 @@ SECTIONS
> >         *(.text.cold)
> >         *(.text.unlikely .text.*_unlikely .text.unlikely.*)
> >  
> > +       *(.text.page_aligned)
> >         *(.text)
> > +#ifdef CONFIG_CC_SPLIT_SECTIONS
> > +       *(.text.*)
> > +#endif
> >         *(.text.__x86_indirect_thunk_*)
> > -       *(.text.page_aligned)
> >  
> >         *(.fixup)
> >         *(.gnu.warning)
> > @@ -292,9 +295,7 @@ SECTIONS
> >  
> >    DECL_SECTION(.data) {
> >         *(.data.page_aligned)
> > -       *(.data)
> > -       *(.data.rel)
> > -       *(.data.rel.*)
> > +       *(.data .data.*)
> >    } PHDR(text)
> >  
> >    DECL_SECTION(.bss) {
> > @@ -309,7 +310,7 @@ SECTIONS
> >         *(.bss.percpu.read_mostly)
> >         . = ALIGN(SMP_CACHE_BYTES);
> >         __per_cpu_data_end = .;
> > -       *(.bss)
> > +       *(.bss .bss.*)
> 
> Sorry if I've missed it elsewhere, but why are .data.* and .bss.*
> unguarded, but .text.* under ifdef ?
> 
> Surely they should have the same disposition?

The catch-all .text.* added for -ffunction-sections will mean that
.text.startup and .text.exit will end up in .text instead of in .init
and discarded respectively. That's not the case for the data or bss
catch-alls.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 15:14:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 15:14:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287934.488257 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRy11-000641-Fx; Wed, 09 Mar 2022 15:14:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287934.488257; Wed, 09 Mar 2022 15:14:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRy11-00063u-C2; Wed, 09 Mar 2022 15:14:15 +0000
Received: by outflank-mailman (input) for mailman id 287934;
 Wed, 09 Mar 2022 15:14:13 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=gSYI=TU=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRy0z-00063o-RS
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 15:14:13 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 9388071d-9fbb-11ec-8539-5f4723681683;
 Wed, 09 Mar 2022 16:14:12 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2173.outbound.protection.outlook.com [104.47.17.173]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-13-n12ccq3OPMmrT5ro8Y9ObQ-1; Wed, 09 Mar 2022 16:14:10 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB7PR04MB5337.eurprd04.prod.outlook.com (2603:10a6:5:1b::33) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.18; Wed, 9 Mar
 2022 15:14:08 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Wed, 9 Mar 2022
 15:14:08 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9388071d-9fbb-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646838852;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=yrpNBLGYU93k46NxfhdHcGQjmVPUW8QJexOIfYOXk4M=;
	b=nSDCcxn7NJhFJS7jTtr4+pAh6jVw/qBNRcCsrGPN0LJSLu/gAdHNlV7v90v1Ebd/3mjr6F
	0w/YNUGTRyMgFDVpg8WPu2971RYPxAVaNbxrQy6dVyH334m33NkY+7a+cHQ2KeScNvDL94
	PJqYV6r2gQ6lyU1guRQ4DENcImcjnWo=
X-MC-Unique: n12ccq3OPMmrT5ro8Y9ObQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=k6WCpm/08k/HAuddhcBSjNaUxTP+d4uIQ7KUoLP5lPvlSxX0oayjLWC8h8NJeG0VpRnUl241Y8qED3Vi04C1r0dPRExfgVcipwUICay0MUq/9W6KhW2BEbT5S0DWwOBdYqOAQU70FWHPnT4Ezf7SGwTl8I3dOUPKD+vVrvfLxn8kwToxmyR/7wZ23CfNZb19wgiIC3DDXQ8/fU+n9r20GO664L6+Qjyy5ECb5F2vqvxfKOkN4iCjE/9aFTM7A1G3Hg5FXhRJh+YjxRY+w2hR3vGbvsPqjmnPzcR94fGPRPp9DMuWnzQj1wDeRyCa8+tHW1BuzKXfvLlyWlkO3s2Veg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=yrpNBLGYU93k46NxfhdHcGQjmVPUW8QJexOIfYOXk4M=;
 b=VuKeDVVWfcaUt/sXm/hmApSzLVruVwmZPUWk+AE14H1GapcEd+Po9QqwbdFwvWk0jy/arBIPgJE1lqO0POGitlVadFMGSNwu+FuEuSlt1aUSlMsqb71wD+IXFFYt01kayC71rS3G49MNAHM71pFN/9s9x74L52h64V5t5WTFg8UeRtjCq/weYrrdkY9U1UkwbXaHv8WJ2JDW4xjLbnX/M7xINbloAjasts62XH3J1cdCVFQvyLmNvebFHFs/8IypFOGfK0Ais9LjUk0EvvrND5fhbnoPSd7WkdAeVGiGAbdiYD/r0QByl+cipE/yGpvH9Kkj6Da23ILGTBNj3I9d2g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <1298de41-654e-f73d-128d-23a850c61348@suse.com>
Date: Wed, 9 Mar 2022 16:14:05 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v5 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
Content-Language: en-US
To: Bjoern Doebel <doebel@amazon.de>
Cc: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>,
 Roger Pau Monne <roger.pau@citrix.com>,
 Andrew Cooper <Andrew.Cooper3@citrix.com>,
 Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
 Ross Lagerwall <ross.lagerwall@citrix.com>, xen-devel@lists.xenproject.org
References: <03798b67ec3a892a302e6be5d87ea676e6376036.1646837462.git.doebel@amazon.de>
 <5cdd27addcec926eb48fdeab08ad3371e7c3fd7c.1646837462.git.doebel@amazon.de>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <5cdd27addcec926eb48fdeab08ad3371e7c3fd7c.1646837462.git.doebel@amazon.de>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR06CA0035.eurprd06.prod.outlook.com
 (2603:10a6:20b:463::11) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5b15aa27-08f9-4071-c71d-08da01df751b
X-MS-TrafficTypeDiagnostic: DB7PR04MB5337:EE_
X-Microsoft-Antispam-PRVS:
	<DB7PR04MB5337D9C464063353FD5A15B6B30A9@DB7PR04MB5337.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(508600001)(8936002)(186003)(5660300002)(2616005)(54906003)(316002)(6916009)(6506007)(6486002)(53546011)(38100700002)(31696002)(86362001)(26005)(6512007)(8676002)(4326008)(6666004)(66946007)(66476007)(66556008)(31686004)(2906002)(83380400001)(36756003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?ZjBTd3dlZDZxMGtiZDQrQ241T1JLZGg0aGg1WTZoMEJVOVArWWl2L0xNclov?=
 =?utf-8?B?RHVBV2xEeHBDQmNMZ1FGK084dVlRSzgwVHdQbnZnSlpxVGdoUTlGWUVXNTF2?=
 =?utf-8?B?TUhNbjJXYk51dDBocGZ5NHNyVnRwWGhNVVBVbGE0RGZSWUhnaDk3NTUwYlBC?=
 =?utf-8?B?UFBtNHhhTGZ1UVRJNXlZaURzZUpNNUR0Zjg3SjJ0RDZPc2VTdWRld0t0ZytW?=
 =?utf-8?B?a3QwQlJBSGVxejRWd3RNNTE4VENWL1cyK3pOTlJlbm5laWdheUZPdFJiSnIy?=
 =?utf-8?B?eW1zaDBSN1N4V1JoSDJ0QnJKcFQvQlJsdloydDY5VzFBUzF2WUt1U2QzMS9w?=
 =?utf-8?B?NnZkd0lucDZyalBKanpKOGl3cWNMdk04alR5Sm1WeXl1eXJxZjFHSHlCeEUy?=
 =?utf-8?B?Y2U4TDlsaVNCZmpuY3M2ZWtvNmN5VmpCMTlMNXc4YkxiS1ZGWjhWOFpGbTFJ?=
 =?utf-8?B?d3ZPSW9xaXFTTit1OSswSkxxcXk3Wmdqb1ZOOEJlczVlVFpOOU5SSUNXSXIz?=
 =?utf-8?B?TTJYOXFWNjE3WFFhUzEyTWU3dks0UGJyZkNYTkwrVXB5M1UwNzdYNFpVbml4?=
 =?utf-8?B?SmhISDcxNHJ0ZGRnaGVkSDk3MGpiVlEvUXU3RDhqMWo0dXUxeGhYUGtvR3lr?=
 =?utf-8?B?NmNIaks4SSt0U1ZVQllmS2tFbHRnZlNCNGg4aSt6Ukl4QWF1S25XZ3pjR0x6?=
 =?utf-8?B?QldDZHJmTVpBUEZOejlqTVRESStiU1pDT3E4K3FIdHJBUlVaOTF5WDR5NDNh?=
 =?utf-8?B?bWhjOUdyR2c4Mk02eE1UdzdsRmtJWFQ3TWgrd3A3SmhrckNjRWdKRmhkWlU1?=
 =?utf-8?B?eURJaHRMOW1ieUFldmovR253M1l2cHIreGVsbDhZWk5UTGo2eXBtV2tmckEw?=
 =?utf-8?B?TzFRV1hCci9nNUlpU3o0U1YvMDd4WXhRZU05UXovb1NaTTJBUktiRWp5aGJT?=
 =?utf-8?B?YXhiL2Z3dkZOdFRYSUFsb1VaTHFqTzJtK1JwUVhQNUkwd1BRM1hwZDArd0NX?=
 =?utf-8?B?dU9zSjBUb0FjY0dOTkVpTWltbmxkMU1aSFoyVGY5VEdpUU9SS1ZKdzAweW9P?=
 =?utf-8?B?ZnowQnNPRkkrMWRONFVDOWEyMWRpTC9BbGYreVcxWWdRTko5eUZYbytxUkEy?=
 =?utf-8?B?NlNRQWRlVTRCUjdMMWRoZjl6QWdjWDN2K1k2NXQ5NEJmbjM1eXhFcGdlTi92?=
 =?utf-8?B?Q3U1VkMyMjhieVIydnI0TXlXT2NSdG5IVUFrNTk4c1FEMkdnaXl1TEhPQ251?=
 =?utf-8?B?bHArR3hkcGFxNUpYM1dlQUx5dHJoaUZaZFhxM1g4TEJ0K1NHRlhFTVZ3dExl?=
 =?utf-8?B?ay9Rb2JoMW1GYUtQMmsyOVdDaTlBQjNWUTJEU1JqUEw0Ty9TdDVDSTBnS1Bo?=
 =?utf-8?B?Qkc2cmdteUg3a09EU1VLaDZoK2RIREtIc0ZDNTZKbTNOdGhvbytRMkptNVlT?=
 =?utf-8?B?bVQrUHVTdVJ5ZlE0OU56c0d6bkZMMVBmU0tBMVFTRU00dU1wTUtGY2U5NGtC?=
 =?utf-8?B?ejdRbXRrT3N4TlgzaHRtdkRDMk5PMHZ1VFRneWpyWk5GclhZV2Y3dTFmVStx?=
 =?utf-8?B?WktuVGhuVGUyUE5NRmhtdEhTbVNRcmVwMCsxY0JIZnhlblc0cGlkZ3dsSGRw?=
 =?utf-8?B?UzE0MUsxWkgweEY4Ym90OVQyRDhma3l1N29FT2RDKzFGZ1VNbkZTdW9Ud2NT?=
 =?utf-8?B?eVg2aEhUYVZLbnliQWtNeURRZytabWFpN2RTY1BOaTVLeEw4ejZmam1tNlUr?=
 =?utf-8?B?VnFia3ZOWkNmVlpTM3pudmtUYnkrSnFKQjFlcURuUUR6UTFBelBBQ0JYRXVx?=
 =?utf-8?B?WUV1b1UwdkY1QndlSjdUMDJncUcyNkcvemlWRVk1RXl1Nk5kQmRMMW81dGl2?=
 =?utf-8?B?Yk5qcHhqN3hqZS9CajJ5VkQzRUx2S2JrbjRvSTFienkxQ3lZOVorUjJMTWJq?=
 =?utf-8?B?eUFHaS9rOFl1YXQ1SE1lcXU0cFIxMFVYODAwRmtQZ0srTWtMRVBlSFNUN3ZR?=
 =?utf-8?B?dU9JcUtJWEdUOGMxZEk3dHNaUkZmSHgvNkYrS2IwdVBsOHpzcXJ6K2NOSlZ3?=
 =?utf-8?B?STRZSGRodVM2cHExOWVWQitkTGIrR1NqQk1BMjlqeWR1NGNVb21DVlpqcDBk?=
 =?utf-8?B?dmFZVE5HOE0vS2FwT0V3ODU1MGVVSEloRVc5bE1MQ3JhYTAwaDcyN1Y0Zm5q?=
 =?utf-8?Q?2FfOKSstyuAX/D2W23dMJbo=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5b15aa27-08f9-4071-c71d-08da01df751b
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 15:14:08.1998
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 1oiDE3WG1HxaYp27AR0M+NPdYSY5u2NVWxR5BSVw93jAPFVYvydcHO4SSHxDY0NExYJ2KiZon90VapL+ZXpV9w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR04MB5337

On 09.03.2022 15:53, Bjoern Doebel wrote:
> Changes since r1:
> * use sizeof_field() to avoid unused variable warning
> * make metadata variable const in arch_livepatch_revert
> * rebase on top and make use of Andrew Cooper's was_endbr64() patch
> * use padding byte to store offset rather than reducing opaque area

You seem to accumulate things here, thus making it impossible to spot
what was changed from the previous version. Retaining all changes
information is helpful, but it wants splitting up suitably.

It would also have been helpful if you had mentioned the 2nd
was_endbr64() that has appeared now.

I'm glad to see the casts are gone now, thanks.

> @@ -114,8 +115,21 @@ int arch_livepatch_verify_func(const struct livepatch_func *func)
>          if ( func->old_size < func->new_size )
>              return -EINVAL;
>      }
> -    else if ( func->old_size < ARCH_PATCH_INSN_SIZE )
> -        return -EINVAL;
> +    else
> +    {
> +        /*
> +         * Space needed now depends on whether the target function
> +         * start{s,ed} with an ENDBR64 instruction.
> +         */
> +        uint8_t needed;
> +
> +        needed = ARCH_PATCH_INSN_SIZE;

Surely this can be the initializer of the variable?

> @@ -130,12 +144,24 @@ void noinline arch_livepatch_apply(struct livepatch_func *func)
>      uint8_t insn[sizeof(func->opaque)];
>      unsigned int len;
>  
> +    func->patch_offset = 0;
>      old_ptr = func->old_addr;
>      len = livepatch_insn_len(func);
>      if ( !len )
>          return;
>  
> -    memcpy(func->opaque, old_ptr, len);
> +    /*
> +    * CET hotpatching support: We may have functions starting with an ENDBR64
> +    * instruction that MUST remain the first instruction of the function, hence
> +    * we need to move any hotpatch trampoline further into the function. For that
> +    * we need to keep track of the patching offset used for any loaded hotpatch
> +    * (to avoid racing against other fixups adding/removing ENDBR64 or similar
> +    * instructions).
> +    */

Bad indentation of all but the first line of this comment. Also the
middle on of the lines is too long.

> +    if ( is_endbr64(old_ptr)  || was_endbr64(func->old_addr) )

Stray double blank in the middle.

> @@ -143,14 +169,15 @@ void noinline arch_livepatch_apply(struct livepatch_func *func)
>          BUILD_BUG_ON(ARCH_PATCH_INSN_SIZE != (1 + sizeof(val)));
>  
>          insn[0] = 0xe9; /* Relative jump. */
> -        val = func->new_addr - func->old_addr - ARCH_PATCH_INSN_SIZE;
> +        val = func->new_addr - (func->old_addr + func->patch_offset
> +                                + ARCH_PATCH_INSN_SIZE);

Nit: On split lines the operator still goes on the previous line. (We
often make an exception for ?:, but not normally anything else.)

> @@ -159,7 +186,7 @@ void noinline arch_livepatch_apply(struct livepatch_func *func)
>   */
>  void noinline arch_livepatch_revert(const struct livepatch_func *func)
>  {
> -    memcpy(func->old_addr, func->opaque, livepatch_insn_len(func));
> +    memcpy(func->old_addr + func->patch_offset, func->opaque, livepatch_insn_len(func));

This line is now too long.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 15:20:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 15:20:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287939.488268 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRy6c-0006qa-6k; Wed, 09 Mar 2022 15:20:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287939.488268; Wed, 09 Mar 2022 15:20:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRy6c-0006qS-1h; Wed, 09 Mar 2022 15:20:02 +0000
Received: by outflank-mailman (input) for mailman id 287939;
 Wed, 09 Mar 2022 15:20:00 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=/QAN=TU=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nRy6a-0006jj-DI
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 15:20:00 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 60de19dc-9fbc-11ec-8539-5f4723681683;
 Wed, 09 Mar 2022 16:19:58 +0100 (CET)
Received: from pps.filterd (m0246630.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 229EcPTq016927; 
 Wed, 9 Mar 2022 15:19:08 GMT
Received: from aserp3030.oracle.com (aserp3030.oracle.com [141.146.126.71])
 by mx0b-00069f02.pphosted.com with ESMTP id 3ekx9cj9sb-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Wed, 09 Mar 2022 15:19:08 +0000
Received: from pps.filterd (aserp3030.oracle.com [127.0.0.1])
 by aserp3030.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 229FBk5O159973;
 Wed, 9 Mar 2022 15:19:07 GMT
Received: from nam12-dm6-obe.outbound.protection.outlook.com
 (mail-dm6nam12lp2174.outbound.protection.outlook.com [104.47.59.174])
 by aserp3030.oracle.com with ESMTP id 3ekwwcv4df-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Wed, 09 Mar 2022 15:19:07 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
 by BN8PR10MB3393.namprd10.prod.outlook.com (2603:10b6:408:ca::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Wed, 9 Mar
 2022 15:19:05 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755]) by BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755%7]) with mapi id 15.20.5061.021; Wed, 9 Mar 2022
 15:19:05 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 60de19dc-9fbc-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=Dx641JSVlBiQrD+zJH2H/HezAIOHGVb03Y0nL/kDJBw=;
 b=PABVro5jJvRfd7cJQOORPeuJQTAk5yGtVHq1Ikm/p3PCK3Pl1meH5CZiCA5YsmDnbFYv
 4+1IqW+8ImIAUAcQ7wS+P/ipv6p1YRaeCmeIE8BpefbFml6gWnlll9fyJNIu5hPGNslO
 F5HA/XpWAt+HAWDxzMP+kS1C/KExNtaVyyo8EsMQ2kT6algAbYmpglcV8g7V0yvPnPRz
 XJVzEFS3wTK206fGz/AcvpufD+jE6o99RjUZMpyApp54GsliBzBy6EBlBlUh8ELPk4lK
 Q6aNx4CiUW7a6XmwEBpQg5FM/8Tfd9FdScxwerUUBY/vqiaOoG95QLfJysI1SVq+7h1m 9w== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=HEHPyjSwOBD3pR0mcIfAdUxRXe3UhUKlabQ0+C2C7Ob0ptn01/CPHsVmGZD9VZrZuAx0pPEQqyvlT6b3wCz/yvqRm4s2VL9ed76YO5PMMOW2+NBS9+t1bALedcJr/69K6yqGyiTI0bbAY/h5D3ZbMf9Jma1oIa1iTT3zqSjZflju37nhnixOQ8J2PARJTggDNYEvM+40WCkntw70diTB4mNw7tSBoYULHav2GoLJqsPx3d6TRjTkJ0f6fTjxGF7Pj8QJiB3f0KmntsqyZob8IRg8+9tj+BC5N4iHafcjpVTuZCMotCHkBDmmrwP8c4IvRsYzvlB2Rk794L72FKFgoA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Dx641JSVlBiQrD+zJH2H/HezAIOHGVb03Y0nL/kDJBw=;
 b=IIEjjqZ6k0gmWray/FUYEshYIpfu54ofKRN/JTPTJsUylaVanCTekZ0wY/FZZb5LZmMO3H25LLwyGsrdMO4ymwf8/e7avW04kKQryaBx3lNTKRBuS0BIm6/DGB+fSgoipAVNlpAopKMUgAJfu8YpyWAsoEKhHW4b/yzIcV8hUrIj1LjAbBsmwqp9LtVUPGjj+2QYrIaX8BX2zOOZZdHPnnk4UyNOBwoMk+F8VzSHwWfKb3gFKeOg21IgJ+IjcB2pHL5vuWdEGan5NXh12xRz+GMBvu75aeZaD1J8yqSOk2g3dXT2XlCAaQrc/R3PI+NBJMbEU11TkijJZ5hQxWPwQQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Dx641JSVlBiQrD+zJH2H/HezAIOHGVb03Y0nL/kDJBw=;
 b=0Kqty1EG5d/PfM9n7JZzkSJpKBgadK3l78TdLjrx7xB+Q26Cta1VcTum7/JDuIzqDbCABLzQUDHGbr2Qhwa6OQuA9CiXHU9XqMVY5Al2kydKbzTL7GYLFcLHzvDyak17ubJmtmhuxN7V1fTxo+K4b4jJfrDeN9uNS2QfhFViDNM=
Message-ID: <9fd239df-b066-36da-f27a-5d3231de82ee@oracle.com>
Date: Wed, 9 Mar 2022 10:18:57 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Subject: Re: [PATCH 11/12] swiotlb: merge swiotlb-xen initialization into
 swiotlb
Content-Language: en-US
To: Christoph Hellwig <hch@lst.de>
Cc: iommu@lists.linux-foundation.org, x86@kernel.org,
        Anshuman Khandual <anshuman.khandual@arm.com>,
        Tom Lendacky <thomas.lendacky@amd.com>,
        Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
        Stefano Stabellini <sstabellini@kernel.org>,
        Juergen Gross
 <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
        David Woodhouse <dwmw2@infradead.org>,
        Lu Baolu <baolu.lu@linux.intel.com>,
        Robin Murphy <robin.murphy@arm.com>,
        linux-arm-kernel@lists.infradead.org, xen-devel@lists.xenproject.org,
        linux-ia64@vger.kernel.org, linux-mips@vger.kernel.org,
        linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org,
        linux-s390@vger.kernel.org, linux-hyperv@vger.kernel.org,
        tboot-devel@lists.sourceforge.net, linux-pci@vger.kernel.org
References: <20220301105311.885699-1-hch@lst.de>
 <20220301105311.885699-12-hch@lst.de>
 <6a22ea1e-4823-5c3b-97ee-a29155404a0d@oracle.com>
 <20220309061840.GA31435@lst.de>
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
In-Reply-To: <20220309061840.GA31435@lst.de>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: SJ0PR03CA0212.namprd03.prod.outlook.com
 (2603:10b6:a03:39f::7) To BLAPR10MB5009.namprd10.prod.outlook.com
 (2603:10b6:208:321::10)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: fb6a8038-0539-4d83-b05f-08da01e025e6
X-MS-TrafficTypeDiagnostic: BN8PR10MB3393:EE_
X-Microsoft-Antispam-PRVS: 
	<BN8PR10MB3393E2CBCCE5ABC49F18CFAD8A0A9@BN8PR10MB3393.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BLAPR10MB5009.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(26005)(36756003)(53546011)(6486002)(31696002)(38100700002)(83380400001)(508600001)(6666004)(2906002)(2616005)(6506007)(6512007)(31686004)(186003)(6916009)(86362001)(316002)(66946007)(66476007)(66556008)(54906003)(7416002)(5660300002)(8936002)(4326008)(8676002)(44832011)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?b0s5cGhaWkl6Sk5LZDhqS1RBK3Y0YWtzREh0bUY4cXJCeVBkcUo3K0pSNzZi?=
 =?utf-8?B?dVd5QVJsTXhRYWpGamtMbXRCNnN4czFmQmlpZDArUHpaNHdWdEJ5dDlDVTdw?=
 =?utf-8?B?c2tGbjBTemZ6NFh4ZDJlR3orODZicllhdmx3Mk5XaXFtTkNmVmlDTkJaVVN3?=
 =?utf-8?B?UmVlUU4veEt0dWRoS1UvZjQrazN5Q0dzbFlUSUV1b2Y1bFQ4VFVMNmVIL2wx?=
 =?utf-8?B?NVZwVExFTnpRbVBpeDJCcjFJdDZZNFZaVFJ6NGJrKzlkWlN3THNDQ0dnU25o?=
 =?utf-8?B?aDh2dUE5ZTltMlM5WDBiZld3K1FiT01iUUxROS83UDNad2YyU0Z5QVlOOEl0?=
 =?utf-8?B?bTNqTDVxTTBpczlYR0RGRW4vTmlqWmpFbTQwZ2t6SUdpS0ZrRnZ1aEwyalBn?=
 =?utf-8?B?S1l1ZUhhZUNINTV0ekQwL2s4aFVucVRBb2JmaHRlZzlpcS9mUGM3dG9zZFo3?=
 =?utf-8?B?NEUyUVFXdnFLZmhET2d4b056WHhUWHRmeVptVWt1U0RxaTBvNGFmTDVWUzR1?=
 =?utf-8?B?NnpKbTBVTHpjRS9LNVJ5dVFTR0l1K1JaTFN0VWhudTFHMkRhRU1oVmtrQ1pz?=
 =?utf-8?B?OGplak5QZ2F2Y0FyVS9NcDRxaHR1M3hPU3UzRWZRLzZPczhvd3FxcWNXdXJa?=
 =?utf-8?B?V0dwcVl3cXZPdThmcG5nRGxqZy82MGF6M1dPZTVDdjFXdG5XZjNaU3VDd0tS?=
 =?utf-8?B?aGVMOFBmZEVQdVFydCtBVk52YmpYenpnVFRhRkxPSWZjY1NJYVIwNHNSeGlR?=
 =?utf-8?B?OGlhS1BNODBTL1NWTzd1MnBlc2lpVEFGSWR5STFTbHlVNHcwZkhhWXNvaTdx?=
 =?utf-8?B?SzBMRkprZEx2RXF3c3psSHZKOGxSN0pxbk9hMmFsWUxmUlFLczRMVytKcXM4?=
 =?utf-8?B?ejc2VFRLZkRoUDZqSlR4M1hLMk1MZzVqeFpJU0FpeUUxRlJ0dVA3enJ5T2xM?=
 =?utf-8?B?RjZUOE5MelNpVDg4TlFjQ3QxSzVBNStmVGVRQndDLzkrVWVNa3J4SFFRcWlS?=
 =?utf-8?B?cUtGKzl5eUMwcG5wQ0hIeExsT245eEVaZzg4UDBCRHFLQTlwZkJNQTFDVUtX?=
 =?utf-8?B?OERQc3h1K0Q0M3p4Y1ZUUHdpcDAybGpnVWJhZDJDNm9yeGs3bUxvaFNFRUZJ?=
 =?utf-8?B?eVB5bW9BaEx4OFNtM2JMN3lTd0k3S2tYakUxL1lrMTFlY0xpRGg4QnZLUHRO?=
 =?utf-8?B?cThBS2F5SnVRVHROM09sYnFDUWgyVzFTNkNVZWFtRnMzdkRkdDB2ZUFPeUUv?=
 =?utf-8?B?MHN6cXUrQUUxQWlrZG05U0RTRlI5NUtjK1FodUxDU0tYbzQ2VEkvWEhiQWRP?=
 =?utf-8?B?bU9SM05CL3VLZjVlZTRMZUJTUHl0c3VRbzZ0WFZOT3h6SXNndzh6cUF5c3Zu?=
 =?utf-8?B?dUxtU21meXV6ZmswVmx3VDkwOWk5Y2VKWHpabzJsdGdTcjJYeFFlaWo2SWFI?=
 =?utf-8?B?eUgzVkp3TEl3d1BtbldyalNwVytIdUg1blJWbndEL1l2cDUzTUROSTFlVWlB?=
 =?utf-8?B?OTFvYU50bUc4c3BpZTVpcXhNVWdTS1g1N2VZOWR4SmJIWU8xWU00dXBSYVdO?=
 =?utf-8?B?NHl5ZUZ6UnBRcTFkK0tkVkxzN0J6SWRqMDBjMUNkTWJJSjVFSXZiRnYxUEg5?=
 =?utf-8?B?RjlMam9Vb3E1T2tFMmJZaUdWL0ZkaEFHWWQxcVVCSHQvNjBLeWUra24xOWpi?=
 =?utf-8?B?VFVCKzUxY0haU1RYbFJPa2hxZkg2cUhxRjBKekdGWDRLUlR1Mzh1WkVSV0tR?=
 =?utf-8?B?M2U5WEp2N3RtZ2tVc3VEeU1oT3ZDR3VhbERSWE5vUExqZXBZdlVob1F5VENJ?=
 =?utf-8?B?ekRaV2hSU3ljN0Nhd1h2MHJVUXJ5RjhhczlRYWJEUnYyM1cwdjNxdWRPTzZ1?=
 =?utf-8?B?ZVBLS2gycVVLOGEya0M2V1gvVnJUL3JMdDVuV0N5OHpvUTRvdVMzOUdtOEIw?=
 =?utf-8?B?UU9Ud2M3bWRwVlR5ejVwSXRCSHdqOEh1dmMrOTJ0QkY1UllsQkxYMEFMT2hV?=
 =?utf-8?B?eTViWTdzWmZNd2FmTnF4QTdhR3NLQnJneEhiaUNGWE9WQkJ1aFN5MXN6cHcx?=
 =?utf-8?B?S1N5R2JrWWU3Sk1COFhCNCsrUHFsaHFIZWpoV3I0SWcwWWRRWUE4ZzR6K1BX?=
 =?utf-8?B?V0luYnZZVTBlVys1YytxRjVKQXlwR1gxRWdKVllZVWtVZzlzendBUDZxOTlD?=
 =?utf-8?B?VGFNa1BadDZMR2xLeTZ0ejJOanlackc5UXFqcUxWNWtOK3NLZzJqdWVQRUV3?=
 =?utf-8?Q?TugvA2MvwI39/l2rQ9CjmMwL0j3PMNKFcFquqwWvcM=3D?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: fb6a8038-0539-4d83-b05f-08da01e025e6
X-MS-Exchange-CrossTenant-AuthSource: BLAPR10MB5009.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 15:19:04.9325
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: C+DD9S6tdroI373tssDi2EgvnipQGchDK8a5RzpziOozDroVU4+ycD29E1J8y8PmXwyoU0Aj37uOG+9iOO2DZ/AizdjyTMty/uj3n+/YBJU=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN8PR10MB3393
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10281 signatures=692062
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxlogscore=670 spamscore=0
 phishscore=0 bulkscore=0 adultscore=0 malwarescore=0 suspectscore=0
 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1
 engine=8.12.0-2202240000 definitions=main-2203090085
X-Proofpoint-ORIG-GUID: WIi58lydhaEBuwimINUF8pWYN2lXAfqV
X-Proofpoint-GUID: WIi58lydhaEBuwimINUF8pWYN2lXAfqV


On 3/9/22 1:18 AM, Christoph Hellwig wrote:
> On Tue, Mar 08, 2022 at 04:38:21PM -0500, Boris Ostrovsky wrote:
>> On 3/1/22 5:53 AM, Christoph Hellwig wrote:
>>> Allow to pass a remap argument to the swiotlb initialization functions
>>> to handle the Xen/x86 remap case.  ARM/ARM64 never did any remapping
>>> from xen_swiotlb_fixup, so we don't even need that quirk.
>>
>> Any chance this patch could be split? Lots of things are happening here and it's somewhat hard to review. (Patch 7 too BTW but I think I managed to get through it)
> What would be your preferred split?


swiotlb_init() rework to be done separately?


>
>>> diff --git a/arch/x86/kernel/pci-dma.c b/arch/x86/kernel/pci-dma.c
>>> index e0def4b1c3181..2f2c468acb955 100644
>>> --- a/arch/x86/kernel/pci-dma.c
>>> +++ b/arch/x86/kernel/pci-dma.c
>>> @@ -71,15 +71,12 @@ static inline void __init pci_swiotlb_detect(void)
>>>    #endif /* CONFIG_SWIOTLB */
>>>      #ifdef CONFIG_SWIOTLB_XEN
>>> -static bool xen_swiotlb;
>>> -
>>>    static void __init pci_xen_swiotlb_init(void)
>>>    {
>>>    	if (!xen_initial_domain() && !x86_swiotlb_enable)
>>>    		return;
>>
>> Now that there is a single call site for this routine I think this check can be dropped. We are only called here for xen_initial_domain()==true.
> The callsite just checks xen_pv_domain() and itself is called
> unconditionally during initialization.


Oh, right, nevermind. *pv* domain.


-boris



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 15:20:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 15:20:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287942.488278 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRy6x-0007wn-GS; Wed, 09 Mar 2022 15:20:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287942.488278; Wed, 09 Mar 2022 15:20:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRy6x-0007wg-DV; Wed, 09 Mar 2022 15:20:23 +0000
Received: by outflank-mailman (input) for mailman id 287942;
 Wed, 09 Mar 2022 15:20:22 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=d6dl=TU=citrix.com=prvs=060aafcb7=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nRy6w-0006jj-8N
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 15:20:22 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 6e40eb4b-9fbc-11ec-8539-5f4723681683;
 Wed, 09 Mar 2022 16:20:21 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6e40eb4b-9fbc-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646839220;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=ZeIcQHUJJRtnxQDTvlTRsnnmCopd2Uwau0mRxANamAY=;
  b=eF9GBze7Hi/9YrVQdJ2qsFZV0vSkzEDRJ9ACtnMnLce57VMKDAxaryym
   6JVKvWxxKpJ6S+88BB2/cKqTPBUCaUw2fjxkZ+xHaAdmo95gqpQaFTNLS
   L1ujVpKpvDzO5ATvfwW7KbL92yMNkCiC4KN+RJ22bkpkbnmrbaclokKn3
   c=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 68181396
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:AIVfbKw9bJYtBuxwGYp6t+cgxirEfRIJ4+MujC+fZmUNrF6WrkUCx
 mEXDTvSP/rZMWb2LdokbYnk9h5SuZHUz4NlTFBrpCAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2YnhWWthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 Npl7NuOey0GY4jwu+1ESh9SH39/J7N99+qSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DFYUToHx/ixreCu4rW8vrSKTW/95Imjw3g6iiGN6AN
 5NJMGE+MnwsZTVBJgZOI8MYjtvrl3n+dztF93S5/K8Otj27IAtZj+G2bYu9lsaxbed/k1ucp
 2nG13/kGRxcP9uaoRKH/WirnfTnhj7gVcQZE7jQ3u5nhhify3IeDDUSVECnur+ph0imQdVdJ
 kcIvC00osAa60iDXtT7GRqirxa5UgU0AoQKVbdgsUfUl/SSs13x6nU4oiBpMZsYhuUZGBkW9
 VbQhtXjCWJuqqOuRifInluLlg+aNS8QJG4EQCYLSwoZ/tXuyL0OYgLzosVLS/Ds0ICscd3k6
 3XT9XVl2e1P5SIe//jjpTj6bySQSo8lp+LfziHeRSqb4wxwf+ZJjKT4uAGAvZ6swGt0J2RtX
 UToeeDDtIji7rnXzURhpdnh+pnzuZ5p1xWG3TZS82EJrWjFxpJaVdk4DMtCDEloKN0YXjTif
 VXevwhcjLcKYif0MvErOdLtV5h0pUQFKTgDfqqEBjapSsItHDJrAQk0PRLAt4wTuBNEfV4D1
 WezLp/3UCdy5VVPxzuqXeYNuYLHNQhlrV4/savTlkz9uZLHPSb9Ye5cbDOmM7BohIvZ8V692
 4sOaKO3J+B3DbSWjt//qtVIczjn7BETWPjLliCgXrXac1Q8Rz15VaO5LHFIU9UNopm5X9zgp
 hmVMnK0AnKh7ZEbAW1mskxeVY4=
IronPort-HdrOrdr: A9a23:pwbWy62/uPRjfrFTxMmSZQqjBI4kLtp133Aq2lEZdPUzSL39qy
 nOpoV/6faaskdzZJhNo7G90cq7L080l6QFhrX5VI3KNGOKhILBFvAF0WKI+UyDJ8SRzI5gPI
 5bAtFD4IKaNzNHZLzBjzVQuexQuOVvi5rFudvj
X-IronPort-AV: E=Sophos;i="5.90,167,1643691600"; 
   d="scan'208";a="68181396"
From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Jan Beulich
	<JBeulich@suse.com>, =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?=
	<roger.pau@citrix.com>, Wei Liu <wl@xen.org>, Juergen Gross <jgross@suse.com>
Subject: [PATCH] x86/hvm: Annotate hvm_physdev_op() with cf_check
Date: Wed, 9 Mar 2022 15:20:09 +0000
Message-ID: <20220309152009.10449-1-andrew.cooper3@citrix.com>
X-Mailer: git-send-email 2.11.0
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

This was missed previously, and would yield a fatal #CP for any HVM domain
which issues a physdevop hypercall.

Reported-by: Juergen Gross <jgross@suse.com>
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
---
CC: Jan Beulich <JBeulich@suse.com>
CC: Roger Pau Monné <roger.pau@citrix.com>
CC: Wei Liu <wl@xen.org>
CC: Juergen Gross <jgross@suse.com>
---
 xen/arch/x86/hvm/hypercall.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/xen/arch/x86/hvm/hypercall.c b/xen/arch/x86/hvm/hypercall.c
index 030243810e48..62b5349e7d6e 100644
--- a/xen/arch/x86/hvm/hypercall.c
+++ b/xen/arch/x86/hvm/hypercall.c
@@ -78,7 +78,7 @@ static long cf_check hvm_grant_table_op(
 }
 #endif
 
-static long hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+static long cf_check hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     const struct vcpu *curr = current;
     const struct domain *currd = curr->domain;
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 15:24:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 15:24:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287951.488289 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRyBK-0000MX-2G; Wed, 09 Mar 2022 15:24:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287951.488289; Wed, 09 Mar 2022 15:24:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRyBJ-0000MQ-VP; Wed, 09 Mar 2022 15:24:53 +0000
Received: by outflank-mailman (input) for mailman id 287951;
 Wed, 09 Mar 2022 15:24:52 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=gSYI=TU=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRyBI-0000MK-Ef
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 15:24:52 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 10399ae3-9fbd-11ec-8539-5f4723681683;
 Wed, 09 Mar 2022 16:24:51 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2112.outbound.protection.outlook.com [104.47.18.112]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-34-THauKfE3PoGZxWQvRiQ01g-1; Wed, 09 Mar 2022 16:24:50 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB7PR04MB4906.eurprd04.prod.outlook.com (2603:10a6:10:21::22) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Wed, 9 Mar
 2022 15:24:44 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Wed, 9 Mar 2022
 15:24:44 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 10399ae3-9fbd-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646839491;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=IVYz35bClYsU9ZphFPVIdSpwJHiwg4c3hvTJpFc6eJY=;
	b=l0C17H2VDHhFNqn6ud+uLTgUat1lOZA6oSiPgblcYrHPJZRKo44r9uV9Ah0nzyqe8ufj3m
	p9zF8J3C3REOKGrs5pyfcWqLJC02H0g46KcDgiaiCVpYvQ4V0F2PxN3edVCrf644Itg90s
	QEOjVQLnoabi2tDsTxoqbnBCsVp5VgM=
X-MC-Unique: THauKfE3PoGZxWQvRiQ01g-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=OkKv4NZgn7Q08bH6KhWax0+3P56eNC7U/kQU6sBj2TJ3T/0NhPT71edLvDqAb7iSJjtCZH2w5aU/IBI+8Yur6VQLFjdiL34dCKeWS8QARji6y1bFiZz3BGKjJnGjmJjkJG4TSqPVBJMEqlgIqNP0vitvWMm7ANo7/4AQfySAOuHccnvERLQ7LcTp9AEofvr6FmnSWeCCmY9xFNqcpoazVEaWERZYA6blTdLaojPkfdlRhryuSbrt+aCgrUn4fgYe0q8S7iNeo2nBxYyxxnLEksklwa+6CAWBevW4y420bP7bATvU8Pr892NcxDaVnL5ugnHPUhy2snuG7wy69hQDmQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=IVYz35bClYsU9ZphFPVIdSpwJHiwg4c3hvTJpFc6eJY=;
 b=oJa15U0z+DWeelbSx/moK4km5Mj31DBWZXGAdbtBdvEYCvCHaxxM6k6rOJYdRC+AvZyivRgBTevOcRV7eErQ5g26asYr5IKbYDAdURYdudna2Ebj4KtYph7bAyC7aALbzwxKpJWi+d4i4OosFbqmMntEI7PaCouvTafQX8eUGLT4bu3gis6XmdRnT1uSEHqFeej05YvjUTHvEx4HA6PZhCOF5/imYMZXexWNT276hxVgilys0Jl/XExaxl3k+B5DTNp+zWh6AJnrK5fS7oGtwlGpJI/fZFb+Jqweduji2TvnYejejWaYf0LQs4ckls6DBbEHBrWRUBDE3WzblAMDTw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <824225cc-54b4-f07b-21b2-1158e23de773@suse.com>
Date: Wed, 9 Mar 2022 16:24:42 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH] x86/hvm: Annotate hvm_physdev_op() with cf_check
Content-Language: en-US
To: Andrew Cooper <andrew.cooper3@citrix.com>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Wei Liu <wl@xen.org>, Juergen Gross <jgross@suse.com>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <20220309152009.10449-1-andrew.cooper3@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220309152009.10449-1-andrew.cooper3@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8P251CA0006.EURP251.PROD.OUTLOOK.COM
 (2603:10a6:20b:2f2::32) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f4c44624-7f29-46ab-3d6f-08da01e0f086
X-MS-TrafficTypeDiagnostic: DB7PR04MB4906:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<DB7PR04MB490672C782E302CC0CEEED9EB30A9@DB7PR04MB4906.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(4744005)(54906003)(6916009)(316002)(8936002)(5660300002)(2616005)(31686004)(8676002)(6486002)(86362001)(31696002)(66946007)(36756003)(2906002)(66476007)(66556008)(508600001)(4326008)(53546011)(38100700002)(6512007)(6506007)(26005)(186003)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?ajV2aGFnaVZjV25VNXVwQjFxdVN6Z2czclVCZk5iKzNUVUVxL3ROYnVxNnRo?=
 =?utf-8?B?ZVpwbUVGcWpLdlJxa0RzT1hIdHI3ZFg0N3FUZ20zQUI5anlBQ2lDRU9ZUXVR?=
 =?utf-8?B?bkRsRG9aZXpvQzFaL1JlVUREUnlxR2t6ek1vbU8yejBFNU91TGt3bWdHNmdO?=
 =?utf-8?B?aXl0c1lveGRXT3lsZDZDNmIyYjFEK2tHL2UvOGVJZFNJWldPcDMyQXgrYlM4?=
 =?utf-8?B?SnpkN2djMnJjcG9oVkVPWUxZRU5JRWdjLzdUcG16SXBSZ09DQXd1eUMrYmRG?=
 =?utf-8?B?T3I1dVFLdU5GSytNUEFKVmFTT3pEb1FwdEUzcEdWcXBnWXgvS2pRUTc5UmZ0?=
 =?utf-8?B?SHdEaFNFaExYYXhJTUJaV2NmYWZoclJvVjN1cUxkT1FLSVpZSHRBTE80cGdr?=
 =?utf-8?B?d0J2NFg0UXpwNkJISFpoZGxqam1mWHRqWk5KMEltRWtPQk40NTNkS1FCL0FQ?=
 =?utf-8?B?aG1HbUNBWVVIQUE5TkwvTzBkYjk1aU9sUHpwNmVlRVVRMkhJc1B4amFIN1Er?=
 =?utf-8?B?NEM4M1lQVDZkWEZMaENQRlBtSHFQMy83eGZtaUxqSE1nTWZUUzI4YUcwZlVm?=
 =?utf-8?B?MDd6V3hFSWNqMzJOMkh2NnRDVGtKbDUwNWhvcEtiVmJidzF0Wnp5bTFvazFn?=
 =?utf-8?B?NndIdFRaekNseTQ5YWhzV3F1TERiaVA5azRhTHJtby82UTVDNWpTY05uNE45?=
 =?utf-8?B?ZkJtbDdDdTNYSVpzeTFKcjRxZEVnK0g1eU5rbEd3eFlmNXYvMW90U2VmNnNi?=
 =?utf-8?B?N1QyZU1RN255bnpqMmtUSGhHeXk1cmRmdUtpdk5WVFJlcVZRbmpLSVF4TGdR?=
 =?utf-8?B?aisvVmFUTndmdGlyUjN3WWYvNGgyaWtlQVk2N1ltUzJTL3pIcnd4UDFYY3Jr?=
 =?utf-8?B?d1BxUFFFYTU5amowS2h6WDlYa1pBaklwRDBvQ0E1U2VuYWRCOGNKbC83NWRl?=
 =?utf-8?B?OVZMK1ZTY3ZYdWMvbXpLNXFtZ3oydWFxZXVRSzUxbU85UEQzSGJaNWt4ZW1x?=
 =?utf-8?B?R1oybHdiSUJCVGorNEprMEJXMnRZUS8xQVhDekxmKzNuTkFxVy93K0dYSEUv?=
 =?utf-8?B?UGxVS25GVnFYWFhSbWNwVlhQSFlSN0x3elo2ajNSRUJBV3dkNjd1Z1V2NG5k?=
 =?utf-8?B?ditZNlFoY1hVaG9STTJ2Qm1RcXNlMVl0MjAxNkVCT2NKSGVqUTZpSVZYUGY0?=
 =?utf-8?B?eGpGaDBRN1V2Q1pIUDFvVjdpcXdxY0FiU00wRTVMOW52a2dJSVBMbzZwZWhn?=
 =?utf-8?B?cjNyODAyWTE4TUNlQUhkZjAvZDJxOFRMRXZMeTNlcWF5a3FUM2Y4S2Y4b0Y0?=
 =?utf-8?B?V0tldUNsTWlJcVk4a25rTGJoVnZJZS9rMXNIMWxYRG12bUFSaUNYbEpoUTl5?=
 =?utf-8?B?NzlaUlpnakh3RFhScVJVS3F2RGswVXNIV0REaFBzR3g5RDQzN3BXMkpFQ3Ex?=
 =?utf-8?B?QnVtUlNGSmkvUjl2UFd5SngzNmZSenZiWWFleEk2SW1PMHpGWEtSRnBYMHhn?=
 =?utf-8?B?YkFXSjFkQTlVSHBIT01sNXU0YTJCYWlSSERlVDhqRjhwZ1h3SEVDTStZSHo3?=
 =?utf-8?B?dnJibU85b3hxM2grbmdwcGFjdEdIZnhJQ0tBUHhrVXU2MWxqY3A3QUhhU1Fm?=
 =?utf-8?B?bExrYnVxQ1JGZEIyQUFoK1pTdEF3VEduNExCaWdjbjRBVUsyQitFQm5GOVFV?=
 =?utf-8?B?WFNwak5BcndKTDZDTERBTkNlbG1kRm1zVE1LcW84STNBemxiWTJMY3NHeTc1?=
 =?utf-8?B?WW9YS3pteU9qNEtRRW91cjRZamVGTWV5U05CRm9JU1Jwek10NUJydHRRTlp2?=
 =?utf-8?B?d1NPb2VObjlUekczRHlaaThGamFXV252L0ZLc1ZsemxDM3pPZFdrTXpNaGJD?=
 =?utf-8?B?ejF2Zmc0TE5uek5HQlpZNHBHM1ZOdFZmNmxoU3drMFdVbGs5L0Y0eHhiRlRX?=
 =?utf-8?B?MXVDKzI5bDY4WEtHU1VOdFZQdWVpRnI5NWI5YXVkUzVUcTVMa01OYnMxMDNK?=
 =?utf-8?B?V3llTXk5eFBGYUVPeDM4UWxwdWhvbG8vS1FwZWdEZ0hZbExESWQ3S3cwNExG?=
 =?utf-8?B?VVBuUlBJNGt6eFg3SHZWbXJzSHR0V1VJdG1VYngvekkzV1B6YytMem0rUTZL?=
 =?utf-8?B?NVVlTkFqY0MyZGVYT1JrbHlBWmRYeVlqb1dzc2ZVS3ErSk80MFZCMjBUVjB2?=
 =?utf-8?Q?5em61NzgJcH6BEgbCZJGxa0=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f4c44624-7f29-46ab-3d6f-08da01e0f086
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 15:24:44.7852
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Gk6/2qDS6PRZNzuYIlY+d5/9oeArxNQGWv4jeOgwFsSaOsptFEuCil9UGK8fB7OVemOSNPoGaCI4flv+NQe8Gw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR04MB4906

On 09.03.2022 16:20, Andrew Cooper wrote:
> This was missed previously, and would yield a fatal #CP for any HVM domain
> which issues a physdevop hypercall.
> 
> Reported-by: Juergen Gross <jgross@suse.com>
> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>

Reviewed-by: Jan Beulich <jbeulich@suse.com>



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 15:40:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 15:40:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287958.488309 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRyQV-0002oB-GE; Wed, 09 Mar 2022 15:40:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287958.488309; Wed, 09 Mar 2022 15:40:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRyQV-0002o4-Cq; Wed, 09 Mar 2022 15:40:35 +0000
Received: by outflank-mailman (input) for mailman id 287958;
 Wed, 09 Mar 2022 15:40:33 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=gSYI=TU=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRyQT-0002ny-9w
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 15:40:33 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 40b38bac-9fbf-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 16:40:31 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2105.outbound.protection.outlook.com [104.47.18.105]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-31-gACokkQbPKyDPiuuK1WbfA-1; Wed, 09 Mar 2022 16:40:29 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DU0PR04MB9369.eurprd04.prod.outlook.com (2603:10a6:10:358::22)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.16; Wed, 9 Mar
 2022 15:40:27 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Wed, 9 Mar 2022
 15:40:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 40b38bac-9fbf-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646840431;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=Ge7aVOXHwPcohO/lcsLquwGxXYGCEM2NlDdA9/IsuDw=;
	b=Bbem0WwbP2mbEvGMASPJ5yhHIaV4brYVqN+f8TiK6hpmhgZDQxmt2f9nfLBWY+JuJSz85l
	K9KdG6r3KjHNw0apyICdCy3R08ZqvYIeIWz4l/0eMxt8Lsk9AP36oMjq4d2GATXYOlQZGT
	370y1Gn8Ma3X7woeH3zNMr2/TpqO6gQ=
X-MC-Unique: gACokkQbPKyDPiuuK1WbfA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=BaMWF48MwaKycwcDPnSxNP+8zvKYK4tnjiwaHxLlfMP41QsiYSZS5MhgOkZJ6xn5GzbTdSMhSjv1LKq3BKVIM3dDTBPRypn1SY+pVB4Ev5acU+gABNupkJOPLjxQF5hNUOvgylJngXPbBQR/J4JePkyLnH30P46OqN/35aOy2Cvm69jsegndD6LJyciDiPoqtLjDmjE1P61t1+ILKZ93UiV0/BMRZTKxLVwcfIBnUXi0XBFtiYzz0hAGWQpaWk/T1rYVJRhtZ/AHHqX3SsU8e06iI0MP03MWSAYePwtkBemuar7Anj2rsK7nzPW+d4u1GcDCbWwSBexHM3UtQO2LdA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=oV/3+xG0PWBethkSpKIKtEbialgZA7TCxx/K9Tn9Kgg=;
 b=R2tv1moqgHRawKNunNIW0tOAAtzVyor+nuN/OZIuLyGY2NIq6NwH9kfhqLhKP2dwD8BkjXFmuPPN2ptoD/DYkveNSkvwwQI6FBG7cBpTPVU8lnw5fn6YvsjcAz9GV5lKUTqL+Y3tEqb6TLNv2PjhGYJxKGei+sso1b0ms9yRP4eu+WPNpYPBRf/2utUDW/9zZq74uAMI4KtechozD4ga00MswtKQ6uUu0Im9IJGs2nxCvM7gmcfn1qrZOV2g+D/yy79ajY95bvF4qXvdPVMrOXrk1a+nIviyt8kS5Il8ORoTQaQ1RSMT80y1vZ+p7VXIYfSJILVORvdXnu5IdAPf8w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <6d0d901c-fc7c-2655-6285-df07101b852d@suse.com>
Date: Wed, 9 Mar 2022 16:40:24 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH 1/3] amd/msr: implement VIRT_SPEC_CTRL for HVM guests on
 top of SPEC_CTRL
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220201164651.6369-1-roger.pau@citrix.com>
 <20220201164651.6369-2-roger.pau@citrix.com>
 <8e7f3193-dee6-1ff4-0c68-081032e240d2@suse.com>
 <YijBpyOlmTA7tIUl@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YijBpyOlmTA7tIUl@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6P193CA0139.EURP193.PROD.OUTLOOK.COM
 (2603:10a6:209:85::44) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: b5f77d68-5fea-4cc9-7663-08da01e32237
X-MS-TrafficTypeDiagnostic: DU0PR04MB9369:EE_
X-Microsoft-Antispam-PRVS:
	<DU0PR04MB93697BCA9F0AF7FB942F320AB30A9@DU0PR04MB9369.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(53546011)(6512007)(83380400001)(2616005)(186003)(26005)(4326008)(66556008)(6666004)(2906002)(31686004)(508600001)(31696002)(54906003)(6486002)(36756003)(86362001)(8936002)(6916009)(38100700002)(316002)(5660300002)(66946007)(66476007)(8676002)(6506007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?2mxEKlWgPDeAZeWJ2Y4CnJGcvro5xVxA2bSnxFQ8jkmTBwvZdJqzw0iThAh+?=
 =?us-ascii?Q?7vALdjMxnNDqhfwJWCRXDEmS33ibho1e5478X99OdP2s9Cu+GqYfIQop6XG6?=
 =?us-ascii?Q?22QdTvldTnQcVyVL1FnhRkMTUONkjE8o4BFEUX2wtQpKBjgvbo7/mqOu9kdv?=
 =?us-ascii?Q?Jt2Rqcq6RHjWUxdBZ1FT2IlYhHABqsAIw80gg8qbOLyYNwutYgKGz6Lpaskt?=
 =?us-ascii?Q?114xHVhuwwCR69PEmiEJnr+KXffVZTXJrMm91MPh/x0sWMuQ7y8m6qX2b297?=
 =?us-ascii?Q?SUWDKlDRXERJA0kAvWm5+7aVNAoZft8F2pZHLfRNR/sgrCVhihyIeziFvSzm?=
 =?us-ascii?Q?r/nW3WZH8q27Ql2rTsV0P/zULTdhDyO8HtfAYVPVsA2xI7ly+buLYNr1pZsi?=
 =?us-ascii?Q?MWJwsMs+ty+9vo0KOHiBUw5Zsq8bn+keDJvmtXvsx3sjK81H6T2Or2m6I1Xu?=
 =?us-ascii?Q?NrKy7ep06oHVUSfnePA23pR0/+aibrv6evYKlmuNx5iimcdBC2dQQlZ5jo8D?=
 =?us-ascii?Q?o39WfFIumZn7UN8QVwg+K9K/iwfOP5cyzX/bx9zlTLMyXI1avxLrqg68ILu0?=
 =?us-ascii?Q?9XP6XXBV5eBmZogD2RdBeYXxLSJXbgmCAfQKUKLq/T19MC7EPTE4IcR5h2c9?=
 =?us-ascii?Q?8Up2xpmAUJPpl42PZ0eqBN7sQXW0jwWm5TW40jghiHL3/+K44nATFsQrQ5YP?=
 =?us-ascii?Q?+4Qk3QgMnBvYCawIBwB98FKExQsPY5jvn1limu5H3X8VSFFQdXb4CRfO7Afh?=
 =?us-ascii?Q?2kL2z5wB9nrFGwUx4d/BZvtY2hBQZygcKEFSiQu9kyypDyfou8JDW/Eg15IX?=
 =?us-ascii?Q?iOBFzoW3ftpzt1SPVdp4zn98AxikU19X4lX2xak1+L3UVlHvcRA29B55BZLX?=
 =?us-ascii?Q?apFPg8GN3P5tJiE/NG0d923Y4y6EjbuDkGqt1zFSLLABV5GN0XRxhOYz5UWf?=
 =?us-ascii?Q?LLywxx0bUrJD0ANHMHuTf8Ot2m4YHq0SAFSSkfl41upPqxjXE8noyy2hpyJe?=
 =?us-ascii?Q?U+2RjjlqJL6j6eKw053nTVggVknd+NGk5/i6Ye4VIgUcFv8aC031BOwa1HUc?=
 =?us-ascii?Q?5iUIRqamTRYfF9imhNHarMTFZKp4MfeKkQkkGuFv8zWBxclypaGa+/OpAY6F?=
 =?us-ascii?Q?zyazPG3YDrVi4UVbGG3FNR/wRcayZdQF25BtBKGxJ8AVCws8ETyv7TstS2KJ?=
 =?us-ascii?Q?EDsJIeAq6DJ5FDiYm/sLT26ZIK2lrAOsZiZlMKo01KBj3hUKoEhotNIXs93l?=
 =?us-ascii?Q?TbWh9TVhqKJMs6J3+x7zJVkUGe/iIaOVjcFRFdKKcDgBadcFhFrB+2mgnfUD?=
 =?us-ascii?Q?JXzh6CcNs2Sd65D0TXJNjVNaQn+8+BDqGHwKpff3Tv8yQ48+tfar5NUKkf0S?=
 =?us-ascii?Q?M4GClkK8JUPHwBAmTzTKsLDKA7NwzP6JWnEv3zqeMWYwuGdDJar5xy746tgL?=
 =?us-ascii?Q?vWSu6qmmVSVVWTpoim8IK76RLwghXf/qPi2tq8msIK4yV+BC1CKBGsBqY8U9?=
 =?us-ascii?Q?jp2izW+entacATFARaKaEaCqC92WgkBDGGnO21sY4qFG+VRn5E3fYA3N1K0B?=
 =?us-ascii?Q?Fok+eAt7ojMD0aV3n2NNLu8Ri/cXw3Nhc0LlR75IERU5hJYTDsVOhcYUws5S?=
 =?us-ascii?Q?pgIIF7yYACsgAQf3mK+jDS4=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b5f77d68-5fea-4cc9-7663-08da01e32237
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 15:40:27.1329
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: vsKqvxYBCdLrPmnCf9WRb0wDYbISc2lWMkG3vwYt8m9YjgVnUGzaRca12YClR8f/oB7G63t+4ee9FWbB7jRaUQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DU0PR04MB9369

On 09.03.2022 16:03, Roger Pau Monn=C3=A9 wrote:
> On Mon, Feb 14, 2022 at 04:07:09PM +0100, Jan Beulich wrote:
>> On 01.02.2022 17:46, Roger Pau Monne wrote:
>>> Use the logic to set shadow SPEC_CTRL values in order to implement
>>> support for VIRT_SPEC_CTRL (signaled by VIRT_SSBD CPUID flag) for HVM
>>> guests. This includes using the spec_ctrl vCPU MSR variable to store
>>> the guest set value of VIRT_SPEC_CTRL.SSBD.
>>
>> This leverages the guest running on the OR of host and guest values,
>> aiui. If so, this could do with spelling out.
>>
>>> Note that VIRT_SSBD is only set in the HVM max CPUID policy, as the
>>> default should be to expose SPEC_CTRL only and support VIRT_SPEC_CTRL
>>> for migration compatibility.
>>
>> I'm afraid I don't understand this last statement: How would this be
>> about migration compatibility? No guest so far can use VIRT_SPEC_CTRL,
>> and a future guest using it is unlikely to be able to cope with the
>> MSR "disappearing" during migration.
>=20
> Maybe I didn't express this correctly. What I meant to explain is that
> on hardware having SPEC_CTRL VIRT_SPEC_CTRL will not be offered by
> default to guests. VIRT_SPEC_CTRL will only be part of the max CPUID
> policy so it can be enabled for compatibility purposes. Does this make
> sense?

Yes. Can you re-word along these lines?

>>> --- a/docs/misc/xen-command-line.pandoc
>>> +++ b/docs/misc/xen-command-line.pandoc
>>> @@ -2273,8 +2273,9 @@ to use.
>>>  * `pv=3D` and `hvm=3D` offer control over all suboptions for PV and HV=
M guests
>>>    respectively.
>>>  * `msr-sc=3D` offers control over Xen's support for manipulating `MSR_=
SPEC_CTRL`
>>> -  on entry and exit.  These blocks are necessary to virtualise support=
 for
>>> -  guests and if disabled, guests will be unable to use IBRS/STIBP/SSBD=
/etc.
>>> +  and/or `MSR_VIRT_SPEC_CTRL` on entry and exit.  These blocks are nec=
essary to
>>
>> Why would Xen be manipulating an MSR it only brings into existence for i=
ts
>> guests?
>=20
> Well, that's not exactly true. Xen does use VIRT_SPEC_CTRL (see
> amd_init_ssbd).
>=20
> I'm unsure how to express support for VIRT_SPEC_CTRL, as it does rely
> on SPEC_CTRL when available.

I wonder whether the command line doc needs to go into this level of
detail.

>>> --- a/xen/arch/x86/cpuid.c
>>> +++ b/xen/arch/x86/cpuid.c
>>> @@ -543,6 +543,13 @@ static void __init calculate_hvm_max_policy(void)
>>>          __clear_bit(X86_FEATURE_IBRSB, hvm_featureset);
>>>          __clear_bit(X86_FEATURE_IBRS, hvm_featureset);
>>>      }
>>> +    else
>>> +        /*
>>> +         * If SPEC_CTRL is available VIRT_SPEC_CTRL can also be implem=
ented as
>>> +         * it's a subset of the controls exposed in SPEC_CTRL (SSBD on=
ly).
>>> +         * Expose in the max policy for compatibility migration.
>>> +         */
>>> +        __set_bit(X86_FEATURE_VIRT_SSBD, hvm_featureset);
>>
>> This means even Intel guests can use the feature then? I thought it was
>> meanwhile deemed bad to offer such cross-vendor features?
>=20
> No, we shouldn't expose to Intel.
>=20
>> Additionally, is SPEC_CTRL (i.e. IBRS) availability enough? Don't you
>> need AMD_SSBD as a prereq (which may want expressing in gen-cpuid.py)?
>=20
> We need AMD_SSBD if we implement VIRT_SPEC_CTRL on top of SPEC_CTRL,
> but we could also implement it on top of VIRT_SPEC_CTRL (if Xen runs
> virtualized) or even using the legacy SSBD setting mechanisms found in
> amd_init_ssbd, so I don't think VIRT_SSBD should explicitly depend on
> AMD_SSBD in gen-cpuid.py.

Hmm, yes, good point. But when the prereqs cannot be expressed in
gen-cpuid.py, I guess they need to be encoded here.

>>> --- a/xen/arch/x86/include/asm/msr.h
>>> +++ b/xen/arch/x86/include/asm/msr.h
>>> @@ -291,6 +291,7 @@ struct vcpu_msrs
>>>  {
>>>      /*
>>>       * 0x00000048 - MSR_SPEC_CTRL
>>> +     * 0xc001011f - MSR_VIRT_SPEC_CTRL
>>>       *
>>>       * For PV guests, this holds the guest kernel value.  It is access=
ed on
>>>       * every entry/exit path.
>>> @@ -301,7 +302,10 @@ struct vcpu_msrs
>>>       * For SVM, the guest value lives in the VMCB, and hardware saves/=
restores
>>>       * the host value automatically.  However, guests run with the OR =
of the
>>>       * host and guest value, which allows Xen to set protections behin=
d the
>>> -     * guest's back.
>>> +     * guest's back.  Use such functionality in order to implement sup=
port for
>>> +     * VIRT_SPEC_CTRL as a shadow value of SPEC_CTRL and thus store th=
e value
>>> +     * of VIRT_SPEC_CTRL in this field, taking advantage of both MSRs =
having
>>> +     * compatible layouts.
>>
>> I guess "shadow value" means more like an alternative value, but
>> (see above) this is about setting for now just one bit behind the
>> guest's back.
>=20
> Well, the guest sets the bit in VIRT_SPEC_CTRL and Xen sets it on
> SPEC_CTRL in order for it to have effect. I can use 'alternative
> value' if that's clearer.

Well, as I tried to express in my earlier reply, I view "shadow value"
to mean "alternative value", so replacing wouldn't help. The question
whether it acts like the shadow values we know elsewhere (VMX'es CR0
and CR4, for example). If it does, using the same term is of course
fine. But it didn't look to me as if it would, hence I'd prefer to
avoid ambiguity. But please realize that I may have misunderstood
things ...

>>> --- a/xen/arch/x86/spec_ctrl.c
>>> +++ b/xen/arch/x86/spec_ctrl.c
>>> @@ -395,12 +395,13 @@ static void __init print_details(enum ind_thunk t=
hunk, uint64_t caps)
>>>       * mitigation support for guests.
>>>       */
>>>  #ifdef CONFIG_HVM
>>> -    printk("  Support for HVM VMs:%s%s%s%s%s\n",
>>> +    printk("  Support for HVM VMs:%s%s%s%s%s%s\n",
>>>             (boot_cpu_has(X86_FEATURE_SC_MSR_HVM) ||
>>>              boot_cpu_has(X86_FEATURE_SC_RSB_HVM) ||
>>>              boot_cpu_has(X86_FEATURE_MD_CLEAR)   ||
>>>              opt_eager_fpu)                           ? ""             =
  : " None",
>>>             boot_cpu_has(X86_FEATURE_SC_MSR_HVM)      ? " MSR_SPEC_CTRL=
" : "",
>>> +           boot_cpu_has(X86_FEATURE_SC_MSR_HVM)      ? " MSR_VIRT_SPEC=
_CTRL" : "",
>>>             boot_cpu_has(X86_FEATURE_SC_RSB_HVM)      ? " RSB"         =
  : "",
>>>             opt_eager_fpu                             ? " EAGER_FPU"   =
  : "",
>>>             boot_cpu_has(X86_FEATURE_MD_CLEAR)        ? " MD_CLEAR"    =
  : "");
>>
>> The output getting longish, can the two SC_MSR_HVM dependent items
>> perhaps be folded, e.g. by making it "MSR_{,VIRT_}SPEC_CTRL"?
>=20
> OK, but further patches will add MSR_VIRT_SPEC_CTRL to hardware that
> doesn't expose MSR_SPEC_CTRL to guests, at which point it could be
> confusing?

Yeah, I obviously hadn't seen adjustments done here by later patches.
When I saw those, I think I understood why you things do this way.

>>> --- a/xen/include/public/arch-x86/cpufeatureset.h
>>> +++ b/xen/include/public/arch-x86/cpufeatureset.h
>>> @@ -265,7 +265,7 @@ XEN_CPUFEATURE(IBRS_SAME_MODE, 8*32+19) /*S  IBRS p=
rovides same-mode protection
>>>  XEN_CPUFEATURE(NO_LMSL,       8*32+20) /*S  EFER.LMSLE no longer suppo=
rted. */
>>>  XEN_CPUFEATURE(AMD_PPIN,      8*32+23) /*   Protected Processor Invent=
ory Number */
>>>  XEN_CPUFEATURE(AMD_SSBD,      8*32+24) /*S  MSR_SPEC_CTRL.SSBD availab=
le */
>>> -XEN_CPUFEATURE(VIRT_SSBD,     8*32+25) /*   MSR_VIRT_SPEC_CTRL.SSBD */
>>> +XEN_CPUFEATURE(VIRT_SSBD,     8*32+25) /*!s MSR_VIRT_SPEC_CTRL.SSBD */
>>
>> What is the ! intended to cover here? From guest perspective the
>> MSR acts entirely normally afaict.
>=20
> I've used the ! to note that VIRT_SSBD might be exposed on hardware
> whether it's not available as part of the host featureset. It did seem
> to me that using just 's' didn't reflect this properly.

I wouldn't have assigned such meaning to !. In fact if we emulated
a feature completely, I think it could legitimately show up here
without !. But then again I may also not fully be aware of all of
Andrew's intentions ...

Jan

> According to my reading of the comment at the top '!' is not used to
> signal that the feature might act differently, but just that it's
> presence cannot be properly expressed with just the A, S, H flags,
> which would be the case for VIRT_SSBD I think.
>=20
> Thanks, Roger.
>=20



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 15:51:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 15:51:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287964.488320 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRyaW-0004LE-L3; Wed, 09 Mar 2022 15:50:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287964.488320; Wed, 09 Mar 2022 15:50:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRyaW-0004L7-Gx; Wed, 09 Mar 2022 15:50:56 +0000
Received: by outflank-mailman (input) for mailman id 287964;
 Wed, 09 Mar 2022 15:50:55 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=l1b7=TU=arm.com=Rahul.Singh@srs-se1.protection.inumbo.net>)
 id 1nRyaU-0004L1-Tq
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 15:50:55 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05on2060e.outbound.protection.outlook.com
 [2a01:111:f400:7e1a::60e])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b2f3bfad-9fc0-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 16:50:53 +0100 (CET)
Received: from AM6PR08CA0014.eurprd08.prod.outlook.com (2603:10a6:20b:b2::26)
 by VI1PR08MB2895.eurprd08.prod.outlook.com (2603:10a6:802:21::11)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.19; Wed, 9 Mar
 2022 15:50:34 +0000
Received: from AM5EUR03FT028.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:b2:cafe::d8) by AM6PR08CA0014.outlook.office365.com
 (2603:10a6:20b:b2::26) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Wed, 9 Mar 2022 15:50:34 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT028.mail.protection.outlook.com (10.152.16.118) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5017.22 via Frontend Transport; Wed, 9 Mar 2022 15:50:32 +0000
Received: ("Tessian outbound 63bb5eb69ee8:v113");
 Wed, 09 Mar 2022 15:50:32 +0000
Received: from 03b9ea3420b2.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 5D80AFE1-E2BA-4362-99B0-CB081CE29FFF.1; 
 Wed, 09 Mar 2022 15:50:21 +0000
Received: from EUR01-VE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 03b9ea3420b2.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Wed, 09 Mar 2022 15:50:21 +0000
Received: from AM5PR0801MB2020.eurprd08.prod.outlook.com
 (2603:10a6:203:4c::14) by AM4PR08MB2850.eurprd08.prod.outlook.com
 (2603:10a6:205:3::27) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.16; Wed, 9 Mar
 2022 15:50:13 +0000
Received: from AM5PR0801MB2020.eurprd08.prod.outlook.com
 ([fe80::253a:4d6c:61c9:af60]) by AM5PR0801MB2020.eurprd08.prod.outlook.com
 ([fe80::253a:4d6c:61c9:af60%10]) with mapi id 15.20.5038.027; Wed, 9 Mar 2022
 15:50:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b2f3bfad-9fc0-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Z5Nvwym6EwBCaonhBcDZqUhNcEBgme2f9STe12xdYp4=;
 b=5KVKPli1J2h9bOhBO/o4CaDHIXcw8bd33a5HwFDlvaLZ0l2w8D8/TvCWz6rQQg2i5YnEc8+SvnQM5Yot0MHHTxe6hnsuB5AXIjjALwLp9DIAY8ejDSNldxAQSpMCTjgjmD1R/rdZM2j2wOutulolYvk7hKkhc7aHpA4xHtNCBsM=
X-MS-Exchange-Authentication-Results: spf=temperror (sender IP is
 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=temperror action=none
 header.from=arm.com;
Received-SPF: TempError (protection.outlook.com: error in processing during
 lookup of arm.com: DNS Timeout)
X-CheckRecipientChecked: true
X-CR-MTA-CID: 7c94f1fb3da4a1d2
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=MM1SpwYrbn0OBI7xBcBTb6kZVcl3/lhCnyGrhnZ0CunvThPp2QKZY57MsfVRHvMgy3Mlp/1himSVdBa14GeaLInvWBLpoR3Dgsrb3NlVOKprZzNekur0QAMXChr0bkdPResrgM1wPbPGpJmTx15CREVnbcM/Oo8cC8WBZ1m3RHYS24KwdxL/BtS0UL+8ySzfZQvIjVktarshaMFlAPYC2/8r85Xm9+rrXwl4DQGwUEKEHlW2kHZkAYqgt0s2yCDGfF86frgWuJjfT3mi031QYwaojCN1q+Yh3B/hod3RwHcfMOl3jhNjRfuRV1kezrFc0erPTpRTJNsonxD7uRBtbA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Z5Nvwym6EwBCaonhBcDZqUhNcEBgme2f9STe12xdYp4=;
 b=Cim1xvN9K+sAB7XM4WFAnSjxldeNnc0QgfJdALrxkaVwMVQJFJAZ7yldIWjdSkZSjqftyrUH/LMPAn74bsHSBjlSgB4efZjjUN9ECtY2eXJiw8bhfaDR6K6jEGUnt3n80VO4TsltrRBakU1Emf14SEuWL50U54obBqxAPp3FgLmDk0dl8JlEVYMe39Pu9fGD/55Lmn4H5tGYbZZn7vvPoMNESXNsGbQC2jerc3xYblwO0sE8bEEvgcf+sACVDd3EErJ7hOcPfZUWuIP3jz9E4iniM9kMTKDvOobFJYmF1xAZgr5bvNVALxWHqaxbfo6AwK6VamYcDoxdjqTAhMsqjw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Z5Nvwym6EwBCaonhBcDZqUhNcEBgme2f9STe12xdYp4=;
 b=5KVKPli1J2h9bOhBO/o4CaDHIXcw8bd33a5HwFDlvaLZ0l2w8D8/TvCWz6rQQg2i5YnEc8+SvnQM5Yot0MHHTxe6hnsuB5AXIjjALwLp9DIAY8ejDSNldxAQSpMCTjgjmD1R/rdZM2j2wOutulolYvk7hKkhc7aHpA4xHtNCBsM=
From: Rahul Singh <Rahul.Singh@arm.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Bertrand Marquis <Bertrand.Marquis@arm.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, =?utf-8?B?Um9nZXIgUGF1IE1vbm7DqQ==?=
	<roger.pau@citrix.com>, Wei Liu <wl@xen.org>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>, Paul Durrant <paul@xen.org>
Subject: Re: [PATCH v2 1/3] xen/vpci: msix: move x86 specific code to x86 file
Thread-Topic: [PATCH v2 1/3] xen/vpci: msix: move x86 specific code to x86
 file
Thread-Index:
 AQHYIoBoEZVl6/zkE0mK7dGMpvA2Zqyi2K6AgAfEbQCAAAXLAIADUEkAgAD5MYCACAnKAIAAAqaAgABc6AA=
Date: Wed, 9 Mar 2022 15:50:12 +0000
Message-ID: <515CDCB8-43D2-4D08-9195-D058E641E1BF@arm.com>
References: <cover.1644937405.git.rahul.singh@arm.com>
 <4d2a727ba218468e4f347dc12ca051a0534fe205.1644937405.git.rahul.singh@arm.com>
 <6e188f87-7e4c-00ee-dd0c-373d42acec34@suse.com>
 <6BFB9B87-D8A1-442D-B4DC-18760C59D7BF@arm.com>
 <c11278f4-c902-0eb9-ac59-e27c0f2ba912@suse.com>
 <41F03A07-F8D6-423D-9E40-F4B89C611C87@arm.com>
 <175a55cc-70b4-4832-9a78-0db57a9ae4a4@suse.com>
 <1205992D-ACE4-4E94-B554-3B14F6D9697E@arm.com>
 <35ad9273-956b-86d6-55a3-c737575a7880@suse.com>
In-Reply-To: <35ad9273-956b-86d6-55a3-c737575a7880@suse.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 78673165-26b8-4ac8-8f70-08da01e48b7d
x-ms-traffictypediagnostic:
	AM4PR08MB2850:EE_|AM5EUR03FT028:EE_|VI1PR08MB2895:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR08MB28951510D8FF239B29ACEE9CFC0A9@VI1PR08MB2895.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM5PR0801MB2020.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(122000001)(66556008)(2906002)(6506007)(86362001)(38100700002)(5660300002)(4326008)(76116006)(64756008)(66946007)(66476007)(33656002)(66446008)(91956017)(54906003)(6916009)(8676002)(316002)(36756003)(71200400001)(186003)(508600001)(6486002)(2616005)(38070700005)(83380400001)(53546011)(6512007)(8936002)(26005)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <D6CCC93737239748AB047E2E8F0CDC3A@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR08MB2850
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT028.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	21812fe6-d496-4bc4-1f9f-08da01e47f90
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(6506007)(8676002)(4326008)(6862004)(54906003)(336012)(316002)(5660300002)(8936002)(70206006)(70586007)(508600001)(6486002)(2616005)(186003)(26005)(82310400004)(6512007)(63350400001)(63370400001)(53546011)(2906002)(83380400001)(33656002)(40460700003)(86362001)(47076005)(36860700001)(356005)(81166007)(36756003)(45980500001);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 15:50:32.9998
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 78673165-26b8-4ac8-8f70-08da01e48b7d
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT028.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB2895
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From xen-devel-bounces@lists.xenproject.org Wed Mar 09 15:53:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 15:53:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287970.488331 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRydS-0004vr-4x; Wed, 09 Mar 2022 15:53:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287970.488331; Wed, 09 Mar 2022 15:53:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRydR-0004vk-Vw; Wed, 09 Mar 2022 15:53:57 +0000
Received: by outflank-mailman (input) for mailman id 287970;
 Wed, 09 Mar 2022 15:53:56 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=gSYI=TU=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRydQ-0004ve-5f
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 15:53:56 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 1f616008-9fc1-11ec-8539-5f4723681683;
 Wed, 09 Mar 2022 16:53:54 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2105.outbound.protection.outlook.com [104.47.17.105]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-41-3GT9MWEZNieV5CV4e7pLag-1; Wed, 09 Mar 2022 16:53:53 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PAXPR04MB8333.eurprd04.prod.outlook.com (2603:10a6:102:1c0::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Wed, 9 Mar
 2022 15:53:51 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Wed, 9 Mar 2022
 15:53:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1f616008-9fc1-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646841234;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=hTgYUAGUGOm6yz2Rhng1KQmnvhf7LBSyHbn9p33lEfI=;
	b=KJbt2RiV61rk9kGm3BOn1vW14o9SgARFwZ+wxwKs+9RAK4j2y0KP+M/SLz4hx2uCjjP633
	n11vIfuhnGqckXeGtS/LtSTtsBI2jb16Erw3qaFC8yE2OwDPEcJH/r1JKk5jG2PzUC9i/0
	PUqBhvJLIOkm1HY6q/WiuKgHmK6ITds=
X-MC-Unique: 3GT9MWEZNieV5CV4e7pLag-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=gyL4HLctQaF48g5bzgmZzmv4TUNldWNnY8WwCyIiUZL2luuu4zClx1st1jR+4IREctdLWiLv2pT+icjIQVoa0POiLBaeRKE+pkEXATKNl1yZnL08bAztyFFSwYr+nCr0hsfDiUEYuEpsP+XXX4XwKyqUvBYyLUyv7CAyDAWSquz85uErzTmWD1RPb9vABXMoXjbGyRK1V3sgFR9fFh4cD+7o93S4lymOLst6f7zmx59wDZMmvog8gAVCv+XSq3Y1kT5hCtLKw9FMOGZ+5FjuNwe8BbKdpIm50UWb8O3EIMmHAAfu4R6DtzTZ5ijJsImRDNpqlr3GW3z+qfr6v1Sgjw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=HtLPPhqsA2L9A8jhP7KLOSCifoMVqi0RRmVt8NB3DUQ=;
 b=eSDT2CGa3ZMEInql0Ozrqb/ifa+TWrpvS0wJz5ubfI45JYFUY0l9FSQuvpz8o07R/AZwPy040YTynU3RGcTV3exthe9hK3AvysmoCN7Ok94kvqnL8VYP+EuBn0wx//JEwZVX1itWO4V+dvw17kg3hawhf+CjZU35Xvap+Us1Pg82rQ8nWvKQZcbGOgGez0x6NogpXDccqcNpoD2SaaMIuNcTnKNqzOIODgrZMkuQS7LzVFT4Twvyk4dDPqNvcAOJNsZACyvpWkoBRkA/oi15FAaN9NJlCmT5JRUW0/N04P93+bo+0uDCK5y1dBZE10B4SeQsuVNrVTzWaOVdAjp9rA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <8395210e-802f-262a-2c1d-c702a4cc6ca3@suse.com>
Date: Wed, 9 Mar 2022 16:53:49 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v2 1/3] xen/vpci: msix: move x86 specific code to x86 file
Content-Language: en-US
To: Rahul Singh <Rahul.Singh@arm.com>
CC: Bertrand Marquis <Bertrand.Marquis@arm.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>, Wei Liu
 <wl@xen.org>, George Dunlap <george.dunlap@citrix.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Paul Durrant <paul@xen.org>
References: <cover.1644937405.git.rahul.singh@arm.com>
 <4d2a727ba218468e4f347dc12ca051a0534fe205.1644937405.git.rahul.singh@arm.com>
 <6e188f87-7e4c-00ee-dd0c-373d42acec34@suse.com>
 <6BFB9B87-D8A1-442D-B4DC-18760C59D7BF@arm.com>
 <c11278f4-c902-0eb9-ac59-e27c0f2ba912@suse.com>
 <41F03A07-F8D6-423D-9E40-F4B89C611C87@arm.com>
 <175a55cc-70b4-4832-9a78-0db57a9ae4a4@suse.com>
 <1205992D-ACE4-4E94-B554-3B14F6D9697E@arm.com>
 <35ad9273-956b-86d6-55a3-c737575a7880@suse.com>
 <515CDCB8-43D2-4D08-9195-D058E641E1BF@arm.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <515CDCB8-43D2-4D08-9195-D058E641E1BF@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6P195CA0009.EURP195.PROD.OUTLOOK.COM
 (2603:10a6:209:81::22) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 63bda054-4875-4641-d832-08da01e501a8
X-MS-TrafficTypeDiagnostic: PAXPR04MB8333:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB8333CC48877B452B58A95DC1B30A9@PAXPR04MB8333.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2906002)(53546011)(31686004)(6486002)(31696002)(4326008)(508600001)(8676002)(66476007)(316002)(83380400001)(66946007)(66556008)(186003)(86362001)(8936002)(6506007)(7416002)(36756003)(6916009)(6512007)(38100700002)(54906003)(26005)(2616005)(5660300002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?Z8/2NthURJV8w32hgcy+BUp++aznTaqp9d/K6psemIzWt1U0FEVhkfn5APft?=
 =?us-ascii?Q?8eqYM3UdITS/dddHLamgBgYamMPDKDfNY/iVbmOGOUZzrQ87RSDpgP6vZcpX?=
 =?us-ascii?Q?PDQEOr9ptQ3Kv9xmjbD1t2DVlmaydErgaKw4aRM/jIJVCoWWpKW6wI1xxXqL?=
 =?us-ascii?Q?Yun2jnPj6Skg4+vjVVvtMGfXVLvUZjVXqA9+Kl3wWgmCTbe4ZObNYONJLxCA?=
 =?us-ascii?Q?DfbqR8n5uDmtXdLDaY2i/Xh+TvDkgD3XCJPYuyoADvCEvGddi+iaLdtQVi3+?=
 =?us-ascii?Q?7GInI1GDqV//+dHkHfLwahgiwROc0/+6B9k9rkANlgSgshyHFMe6qAq1UXVp?=
 =?us-ascii?Q?JAG3W8tJY2iZ4gvEVxL40BoBG2Qa8ib/eVBEc+IC/xZRN5SBra6NoqcFHuNU?=
 =?us-ascii?Q?vL4Z6xrD7VHlMIK2f4S2N0XyKKKib5BkDcdkcrcS0a/lOaQGI5ysWN6xDdpS?=
 =?us-ascii?Q?n7/hIkX1bI+HlJCOvZJR3wP60ZtLZJEuBgi0SQmMLw8F86XqtYKePkNoy6rH?=
 =?us-ascii?Q?IoP8HZdMa7CIACruFrCHyFogzVu4UDs92y/rMH63rsxwb6+Hp35cgw5HDkqb?=
 =?us-ascii?Q?9AhmDMjieYBo721zx3exlcBOtMkg+oaX253cdReUjRbQgCP3T3lxumPsa/MU?=
 =?us-ascii?Q?LgDliDkyXWpDpuyaV6CiEdsZFQxnYKxd7RUQOKEH4352Heaayg9v2hUAnmeA?=
 =?us-ascii?Q?VjE5KPlF95Pt8FgOPMUmJ8kzdiB1SThn9o/Tk4uqJBuv5keoClF4bQEi9KCO?=
 =?us-ascii?Q?JQeddRhbylIsGVUwsbtqYiFrj1Qmbrcy56qiCwuQEmzh1zaWO13EWnl/zED6?=
 =?us-ascii?Q?bnBc1bGQDROyqo7HRklGigi+IA17N+0/spe8vDnQn5LQoFyLKu7AM1kiAH9T?=
 =?us-ascii?Q?yOYeFTD6getAnSuOJst4OtwSthPSOfd02BKuDtFlMYkxuGyhrYw25YMsfe58?=
 =?us-ascii?Q?8SHBKmDTiXU5yz5sob1pfGWcn5DJ76W6VKm355lyNi+Y2v7MsftTRNeFNy2k?=
 =?us-ascii?Q?W0re18F7Myj2Q04eUu3PWxt5t0sNwOc+ISXyo7DcTZf8HpfUwikzqnQfLpTL?=
 =?us-ascii?Q?Xmu9bJGqapYuDpDTj0/tDtsHHn0Y/235PhmiqCcnXkhsZWOngSnyOB7O4048?=
 =?us-ascii?Q?LDHMri08P0xw8lRzqf4rik6JW4xb6b40qghaC2DoZ6zupiZyO5dTvK1XJLnD?=
 =?us-ascii?Q?wuskChyn+u5l5JyS9Zwfyg7osnCXHLfOX0tJu42FiaQSxyCNUZt+MAIps1LA?=
 =?us-ascii?Q?0ZUm0mvd0Tdrck1iDKPeIRzHsFwdZOEcAjCi1hEScJ1Y6lDSfcM2a6Rj4t3v?=
 =?us-ascii?Q?RlXGLHAgyU8fp4+HorJbJtsFrp10QHgkFdgOlHl1IGKVluXBX6a8wlVW8zdD?=
 =?us-ascii?Q?28RZWPonxUK4ZWlNXPQAHCa0HFEwSg/VEdMPx4ZITKNpIoRhfeoNJxurUfKL?=
 =?us-ascii?Q?p76R+9AXLZ7f38ndKkIe1zXtxD+DZmLeUTwoButPxze+MWfPnvlKnk6yb1Y6?=
 =?us-ascii?Q?76Fd0PHAcK/P7IRVRW5Zuq/V/MwkcTUybxv4Z9Qf4xiM1dXvuzC/233pxBh8?=
 =?us-ascii?Q?Ct1VRJgTp2QR11Q374Y8glLvX5+MlPWvteAITAy4ePqYxm6Vkb37c5mglZYK?=
 =?us-ascii?Q?eYplX+xtNeX4lvkE3GOAorM=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 63bda054-4875-4641-d832-08da01e501a8
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 15:53:51.4577
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: pCY/qT3mm1IpQ6h7aZFbkv8OKhrkKvNVfRiujHJ5pxM0F84LUBtsfmabyseVeLoUi10671lIIcbIcmruLyoiCQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB8333

On 09.03.2022 16:50, Rahul Singh wrote:
>> On 9 Mar 2022, at 10:17 am, Jan Beulich <jbeulich@suse.com> wrote:
>> On 09.03.2022 11:08, Rahul Singh wrote:
>>>> On 4 Mar 2022, at 7:23 am, Jan Beulich <jbeulich@suse.com> wrote:
>>>> On 03.03.2022 17:31, Rahul Singh wrote:
>>>>>> On 1 Mar 2022, at 1:55 pm, Jan Beulich <jbeulich@suse.com> wrote:
>>>>>> On 01.03.2022 14:34, Rahul Singh wrote:
>>>>>>>> On 24 Feb 2022, at 2:57 pm, Jan Beulich <jbeulich@suse.com> wrote:
>>>>>>>> On 15.02.2022 16:25, Rahul Singh wrote:
>>>>>>>>> --- a/xen/arch/x86/hvm/vmsi.c
>>>>>>>>> +++ b/xen/arch/x86/hvm/vmsi.c
>>>>>>>>> @@ -925,4 +925,106 @@ int vpci_msix_arch_print(const struct vpci_=
msix *msix)
>>>>>>>>>
>>>>>>>>>  return 0;
>>>>>>>>> }
>>>>>>>>> +
>>>>>>>>> +int vpci_make_msix_hole(const struct pci_dev *pdev)
>>>>>>>>> +{
>>>>>>>>> +    struct domain *d =3D pdev->domain;
>>>>>>>>> +    unsigned int i;
>>>>>>>>> +
>>>>>>>>> +    if ( !pdev->vpci->msix )
>>>>>>>>> +        return 0;
>>>>>>>>> +
>>>>>>>>> +    /* Make sure there's a hole for the MSIX table/PBA in the p2=
m. */
>>>>>>>>> +    for ( i =3D 0; i < ARRAY_SIZE(pdev->vpci->msix->tables); i++=
 )
>>>>>>>>> +    {
>>>>>>>>> +        unsigned long start =3D PFN_DOWN(vmsix_table_addr(pdev->=
vpci, i));
>>>>>>>>> +        unsigned long end =3D PFN_DOWN(vmsix_table_addr(pdev->vp=
ci, i) +
>>>>>>>>> +                                     vmsix_table_size(pdev->vpci=
, i) - 1);
>>>>>>>>> +
>>>>>>>>> +        for ( ; start <=3D end; start++ )
>>>>>>>>> +        {
>>>>>>>>> +            p2m_type_t t;
>>>>>>>>> +            mfn_t mfn =3D get_gfn_query(d, start, &t);
>>>>>>>>> +
>>>>>>>>> +            switch ( t )
>>>>>>>>> +            {
>>>>>>>>> +            case p2m_mmio_dm:
>>>>>>>>> +            case p2m_invalid:
>>>>>>>>> +                break;
>>>>>>>>> +            case p2m_mmio_direct:
>>>>>>>>> +                if ( mfn_x(mfn) =3D=3D start )
>>>>>>>>> +                {
>>>>>>>>> +                    clear_identity_p2m_entry(d, start);
>>>>>>>>> +                    break;
>>>>>>>>> +                }
>>>>>>>>> +                /* fallthrough. */
>>>>>>>>> +            default:
>>>>>>>>> +                put_gfn(d, start);
>>>>>>>>> +                gprintk(XENLOG_WARNING,
>>>>>>>>> +                        "%pp: existing mapping (mfn: %" PRI_mfn
>>>>>>>>> +                        "type: %d) at %#lx clobbers MSIX MMIO ar=
ea\n",
>>>>>>>>> +                        &pdev->sbdf, mfn_x(mfn), t, start);
>>>>>>>>> +                return -EEXIST;
>>>>>>>>> +            }
>>>>>>>>> +            put_gfn(d, start);
>>>>>>>>> +        }
>>>>>>>>> +    }
>>>>>>>>> +
>>>>>>>>> +    return 0;
>>>>>>>>> +}
>>>>>>>>
>>>>>>>> ... nothing in this function looks to be x86-specific, except mayb=
e
>>>>>>>> functions like clear_identity_p2m_entry() may not currently be ava=
ilable
>>>>>>>> on Arm. But this doesn't make the code x86-specific.
>>>>>>>
>>>>>>> I will maybe be wrong but what I understand from the code is that f=
or x86=20
>>>>>>> if there is no p2m entries setup for the region, accesses to them w=
ill be trapped=20
>>>>>>> into the hypervisor and can be handled by specific MMIO handler.
>>>>>>>
>>>>>>> But for ARM when we are registering the MMIO handler we have to pro=
vide=20
>>>>>>> the GPA also for the MMIO handler.=20
>>>>>>
>>>>>> Question is: Is this just an effect resulting from different impleme=
ntation,
>>>>>> or an inherent requirement? In the former case, harmonizing things m=
ay be an
>>>>>> alternative option.
>>>>>
>>>>> This is an inherent requirement to provide a GPA when registering the=
 MMIO handler.
>>>>
>>>> So you first say yes to my "inherent" question, but then ...
>>>>
>>>>> For x86 msix mmio handlers is registered in init_msix(..) function as=
 there is no requirement
>>>>> on x86 to provide GPA when registering the handler. Later point of ti=
me when BARs are configured
>>>>> and memory decoding bit is enabled vpci_make_msix_hole() will clear t=
he identity mapping for msix
>>>>> base table address so that access to msix tables will be trapped.
>>>>>
>>>>> On ARM we need to provide GPA to register the mmio handler and MSIX t=
able base
>>>>> address is not valid when init_msix() is called as BAR will be config=
ured later point in time.
>>>>> Therefore on ARM mmio handler will be registered in function vpci_mak=
e_msix_hole() when
>>>>> memory decoding bit is enabled.
>>>>
>>>> ... you explain it's an implementation detail. I'm inclined to
>>>> suggest that x86 also pass the GPA where possible. Handler lookup
>>>> really would benefit from not needing to iterate over all registered
>>>> handlers, until one claims the access. The optimization part of this
>>>> of course doesn't need to be done right here, but harmonizing
>>>> register_mmio_handler() between both architectures would seem to be
>>>> a reasonable prereq step.
>>>
>>> I agree with you that if we modify the register_mmio_handler() for x86 =
to pass GPA
>>> we can have the common code for x86 and ARM and also we can optimize th=
e MMIO
>>> trap handling for x86.
>>>
>>> What I understand from the code is that modifying the register_mmio_han=
dler() for
>>> x86 to pass GPA requires a lot of effort and testing.
>>>
>>> Unfortunately, I have another high priority task that I have to complet=
e I don=E2=80=99t have time
>>> to optimise the register_mmio_handler() for x86 at this time.
>>
>> Actually making use of the parameter is nothing I would expect you to
>> do. But is just adding the extra parameter similarly out of scope for
>> you?
>>
>=20
> If I understand correctly you are asking to make register_mmio_handler() =
declaration
> same for x86 and ARM. You are not asking to modify the x86 MMIO handler l=
ogic to
> use GPA to find the handler?

Yes, but ...

> As Roger also mentioned that vpci_make_msix_hole() is required only for x=
86 to clear
> the identity mapping. If we make the vpci_make_msix_hole() arch-specific =
there is no
> need to modify the parameter for register_mmio_handler(), as for x86 and =
ARM
> register_mmio_handler() will be called in different places.

... with Roger agreeing with this plan, that other alternative is
likely dead now. Provided other stuff which isn't obviously arch-
specific remains in common code.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 15:56:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 15:56:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287977.488341 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRyg7-0005ej-LQ; Wed, 09 Mar 2022 15:56:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287977.488341; Wed, 09 Mar 2022 15:56:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRyg7-0005ec-I2; Wed, 09 Mar 2022 15:56:43 +0000
Received: by outflank-mailman (input) for mailman id 287977;
 Wed, 09 Mar 2022 15:56:42 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=mvXa=TU=citrix.com=prvs=060bf0544=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nRyg6-0005eW-Pj
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 15:56:42 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 81aa096e-9fc1-11ec-8539-5f4723681683;
 Wed, 09 Mar 2022 16:56:40 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 81aa096e-9fc1-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646841400;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=n49CLlnGx1Eql7D+zfFAn81RE9wbOo6xdqNpSM7mI4U=;
  b=NSPGSNTOe2llADwOsaVoaVo/xW9ifTJKPSDqlbnGk5z03tKIMn3UkJbw
   KTPvQpctdgrEVhceMFrLTa8W6gzUyK85GYwNJFVOWx3bYKFZUAAriyIRa
   JWSgvI+z3/cVbST5u3A0kkDERKVBII1N+uyTshfeGSiTb/D2PVfiB38mF
   k=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65306413
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:OIPwLqhOkinivDxvZo9UCQo8X161mBAKZh0ujC45NGQN5FlHY01je
 htvCGqBPKqCZjSgKdlwYNjg9UMD7Z+BzdJlTFY9/y5mFygb9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFvc4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YSowIrCWvedHahZ/TRAjMJBh4+XYB0Hq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bklNpyzyfKP8iSJTKRaji7t5ExjYgwMtJGJ4yY
 uJHNGE3MkiZOHWjPH80Vq8Rktei10OvUGIGgQ+Ko4gR+TjcmVkZPL/Fb4OOJ43iqd9utl2Du
 mvM8mD9AxcbHN+S0zyI9jSrnOCntSHmXIMfEpWo+/gsh0ecrkQtDxkRWUq+sOOOoEe0UNJCK
 GQZ4iMr66M18SSDQtDjUjWirXWDvxpaXMBfe8Uq5QfIxqfK7gKxAmkfUiUHeNEgrNUxRzEhy
 hmOhdyBLT5lvaCRSHmd3qyJtj70Mi8QRUcAajUDVhAt+MT4rcc4iRenZslnOL64iJvyAz6Y/
 tyRhHFg3fNJ15dNjvjluwCc696xmnTXZiMs+hiNe2H/1wxeOr/4arGP8gLEy88Vee51UWK9l
 HQDnsGf6sUHApeMiDGBTY0xIV252xqWGGaC2AAyRvHN4xzooif+Jt4IvFmSMW80ap5sRNP/X
 KPEVeq9Drd3NWDiU6J4apnZ5y8Cnfm5ToSNuhw5g7NzjnlNmO2voXkGia24hTmFfK0QfUcXY
 8nznSGEVypyNEif5GDqL9rxKJdyrszE+UvdRIrg0zOs2qeEaXieRN8taQXSML9nsPnU/FmJr
 b6z0vdmLT0FAIUShQGNreYuwa0idyBnVfgaVeQMHgJ8HuaWMD54UKKAqV/QU4dkg75Uho/1E
 oKVASdlJK7ErSSfc22iMyk7AJu2BMoXhS9rbEQEYAfzs1B+MNnH0UvqX8ZuFVXR3Lc4lqAco
 jhsU5joP8mjvRycomVDN8ah9NI+HPlp7CrXVxeYjPEEV8cIbyTC+8P+fxup8y8LDyGtstA5r
 aHm3QTeKafvjSw7ZCoKQJpDF2+MgEU=
IronPort-HdrOrdr: A9a23:VIqMg6jBXAKUFR93I1YHGQqa4HBQX2113DAbv31ZSRFFG/FwyP
 rAoB1L73PJYWgqNU3IwerwRZVpQRvnhPtICRF4B8bvYOCUghrVEGgE1/qs/9SAIVyyygc578
 ldmsdFeaTN5DRB/KXHCUyDYqwdKbq8ge6VbIXlvg9QpGhRAskKhWYYNu/YKDwMeOAvP+tgKH
 P23Lsim9PUQwVwUi3NPAhjYwGsnayoqLvWJTo9QzI34giHij2lrJTgFQKD4xsYWzRThZ8/7G
 nsiWXCl+SemsD+7iWZ+37Y7pxQltek4MBEHtawhs8cLSipohq0Zb5mR6aJsFkO0aGSARcR4Z
 rxSiUbToFOAkDqDyWISNzWqk7dOQMVmj3fIJmj8D3eSILCNWsH4oF69P1km1PimjQdVZdHof
 l2NiuixutqJAKFkyLn69fSURZ20kKyvHo5iOYWy2dSSI0EddZq3MQiFW5uYeE99RjBmcka+S
 hVfbThzecTdUnfY2HSv2FpztDpVnMvHg2eSkxHvsCOyTBZkH1w0kNdnaUk7z093YN4T4MB6/
 XPM6xumr0LRsgKbbhlDONERcesEGTCTR/FLWrXK1X6E6MMPW7LtvfMkf4IzfDvfIZNwIo5mZ
 zHXl8dvWkue1j2AcnLx5FP+gClehTLYd0s8LAr23FUgMyOeFOwC1zydLkHqbrTn8ki
X-IronPort-AV: E=Sophos;i="5.90,167,1643691600"; 
   d="scan'208";a="65306413"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=njteJXv6B+x81+B8VW0eUtx29Pj5aPMOonsS+Tecbt9X0G6vUTH52XMD6ixsB0SSd4tGDhKDEGUN7LBwdDovyBS41NbuOdUAYxKFP7q76P4Y0TpeMxHCXMtqB5aXmTPF/LSYlJedraq+3uF4k9U9WhlzBcO7oGN4Dtks+tRxmU/ypcOFsmEFzQeMyhpTtkgmAHBHyZTnryGTvXIvTlMvSjw3k2AeU9ehU89kgfg/nR53pxBsHHwaixb06aXJgjgfIwtVAzldP9ece6cDyo6UXUr7Sn2DJwpNBSMXxWnUgdZ5Gqh2Y6zsr1SsyS/ItCJjFvRIMM9lrpn8A+9La/2Mdg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=n49CLlnGx1Eql7D+zfFAn81RE9wbOo6xdqNpSM7mI4U=;
 b=QgFQ1F9p4Yq+sPkPFjTiBmXt5Yg7iWBxiUsBMkj0T0BHdZJ8kbdfehrDa1Eqd/ZCT63rWJIhlpNzMIa9yjOtyuRp7ywiNnfuEazmTTV/BpexIK2n5pDXUd7D1pQNX3cgnWrC7kWk1F0jo8eD+wMNGj6zFRJIXg8FM1xkIlI9X3+i6y2yoCk6y5lbUXE8tuH5hS3O20k60y+iM6wgCY0hLKEXOLDjAb/a2f+JTJ358yCAsvFZMzgPQsaxFEMg05hAc+NbPTUTXeML5XNtj/cre5fmgap6cO5OhmRuYHUC4wDLPV22kAhQiK9d+OTzKKVd6iPmPVc+HpvzGTas2sgM8g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=n49CLlnGx1Eql7D+zfFAn81RE9wbOo6xdqNpSM7mI4U=;
 b=FfIfZwI8WDZEBpYAcNHi3qV5kv/K5CsLTzKkHRb/B3tp/nZd3ugyYtCiB2jpOgAvp2ORmbzCuMcWarSTQ5XcKblH0NJtMUnoP3wTbi5cN0FwE946roM5/OtVwvoFuOupG1BSQRsGFT5ZTEGGl0ZCgurxKHiwotlrpo91MeSvjmM=
From: Jane Malalane <Jane.Malalane@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, "Anthony
 Perard" <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, "Andrew
 Cooper" <Andrew.Cooper3@citrix.com>, George Dunlap
	<George.Dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Christian Lindig <christian.lindig@citrix.com>,
	David Scott <dave@recoil.org>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>, "Roger Pau Monne" <roger.pau@citrix.com>
Subject: Re: [PATCH v5 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Thread-Topic: [PATCH v5 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Thread-Index: AQHYMjUEaMoAwzVpzE69n4F8Ciyydqy1XcmAgAAMr4CAAAJqgIAAIRgAgAAC1QCAAadGgA==
Date: Wed, 9 Mar 2022 15:56:35 +0000
Message-ID: <8ac6ad1f-de2d-be1b-3639-34effe85bd88@citrix.com>
References: <20220307150609.10662-1-jane.malalane@citrix.com>
 <20220307150609.10662-3-jane.malalane@citrix.com>
 <YidAU63TsVO/X1Q+@Air-de-Roger>
 <b633f92a-151f-c7ca-0d91-cfad8d2edcbe@suse.com>
 <YidM/Wu5lqF48zg2@Air-de-Roger>
 <81dc2758-accc-25a3-7b3c-d9988757dd0c@citrix.com>
 <6a0f4d8f-581d-20cc-07bc-ffbf9a04cfe0@suse.com>
In-Reply-To: <6a0f4d8f-581d-20cc-07bc-ffbf9a04cfe0@suse.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 2602feac-98bb-462b-9bbc-08da01e56399
x-ms-traffictypediagnostic: MWHPR03MB2879:EE_
x-microsoft-antispam-prvs: <MWHPR03MB2879503A0B24893635CD143F810A9@MWHPR03MB2879.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM5PR03MB3386.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(2616005)(122000001)(82960400001)(38070700005)(38100700002)(36756003)(54906003)(6916009)(66946007)(316002)(71200400001)(31686004)(66556008)(83380400001)(5660300002)(66446008)(6506007)(508600001)(53546011)(86362001)(8936002)(26005)(186003)(6512007)(107886003)(2906002)(31696002)(64756008)(91956017)(8676002)(66476007)(4326008)(76116006)(6486002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?YkVJbDA4SmRlQTd4NjRGQkVMWkd3aUh1cHREYWg0S2Nqc2kweW1jRXE4cXM3?=
 =?utf-8?B?NHF1Y2NVaFBPNUplSTFDMHI1YVN5SGp0eGJPa1JPWFpUQzJhc2VlVzk0Qm1G?=
 =?utf-8?B?ZzhKamQrQlVKVjhsMHJreUNkWThzdmFKbzVONmFocDRnbEYySW1jQkpWdXRX?=
 =?utf-8?B?eUQxQ0lvVEhRMVBoNUxrRTAvdWVKaGhXUENrdCtQYWtCM05NbTdTZDkxN1pt?=
 =?utf-8?B?V3dybmtmSWdHbDR5VU80a1lrMjMxdWJrY0pxZlhCRUExdE9rNmMrVHdKZXQr?=
 =?utf-8?B?Q1dOREpqK0k2WWxwaTUwSjlTbzJCWklIczZWQ3lzSjNLNEVzRjZhZUdYSUJi?=
 =?utf-8?B?clJPZlYzMk9VeGV6b25vMWd0bHFXSi9JRTAvR1BIZ0hxQzducXFadzFVbENr?=
 =?utf-8?B?Q0ovSWVUZ1V6eUZEUWtmOVNSQWJFNEN1cUVMUnVUTmhSbUUyTUdQMXc2dXpt?=
 =?utf-8?B?ZGN5Q0psLzhmNTgzOCtEV3RMcm5GeGNKSk1kYklGZ3NIOUkwOXNGbUV6TDdj?=
 =?utf-8?B?VDBkMDlaU21rZ2ZXRUY2ZmEyZTZ0cFQzWGVMVUlOdjduaXpmYXp5WTh4U3Q3?=
 =?utf-8?B?U0p1SUR0N2FhbW5LbGJJODd3b2lpMHBDbDkrQ2NNNmxmbC9ZRlhhUjBHQU9s?=
 =?utf-8?B?TFZiSjZKQUFZTWR6QlU4WFNzamRFVW5PUmJ5TjMzbElPdDVYdnY3VS9VMTcw?=
 =?utf-8?B?Z3ZhVWlaZmRkc1RYV1YyUmk5QXEvOCtMaWdvVkd3ekZDMEFJRllLdHp5RVZJ?=
 =?utf-8?B?alVPTUNLa2RYRHRhWWdha1ZUaHNuUlkvOXFPMzAwM05EZkhLR0sxWGFZdkEz?=
 =?utf-8?B?WWNGU2xQdWd4UzYrNnhSZFhoSjdteUpQWnVBb2loTjIwWG96UGFkQ3g0TU9l?=
 =?utf-8?B?b3E4Q2JIWE00aitaSSt6QUNNOHp1dVlRR1FEL1RBdlNYV3M3YlYxMUgveUpD?=
 =?utf-8?B?MHA0VngxKzZZWnhZcEthZ284ZlNHWWJGUmlxNS9tcEJSUElzajJpc1RCSFM5?=
 =?utf-8?B?YVdwSm5WbGQ3TWd1Ui9HTEhKOXV0dHJEbHpBczNCc1Irb2ZxeWZ2blIxTjk3?=
 =?utf-8?B?UmFobHVtL1BPSFZqblRBWllJT3dMQmx1TmhJNTNhbDJGVGt3eVQvYmY5WHRi?=
 =?utf-8?B?Rnhha0NjM0R3b084UmYrYWx3VG9MQTZQaHl3TS9ObXRDTVBydzBuZkljSVJr?=
 =?utf-8?B?MDBXOGtjeHVTQktab3hsRHc5T0J4YTBiazJJczVoZmNPbWt0a2IyRHYvaDBx?=
 =?utf-8?B?U3hZZllrM3A0ZHlvcnF3ZW42STRXR1Nad2g4UTNHeUoxbGl4elhOK0NubEJr?=
 =?utf-8?B?TEljZ0k0eGhZNTk5NXdoM3JxT0hjeWdzVWxuRlRYZFJHSjNBSEdVMkxYTmky?=
 =?utf-8?B?YXgrYWx1RkFSeFJJQmcrWlZDNStYdmRFa3VlZ1E4cGNSd0hSSWljQVBqM1ZS?=
 =?utf-8?B?ck41dWlFSkpSa3lJTWU3ZXpDdW44K0dwWFlPK2VPRjAyemtxRWdjK1FQc1Fu?=
 =?utf-8?B?NW9UcnljTUQzSFdYSFJtRnJjNlRkVEJtVEx3MXB1OUZBanZLRno4WitMVUZq?=
 =?utf-8?B?Q3kvM0NpQ3J2d0hWWndJU3hZNGtvZmtYWVg3MjN0ZFZnTGlHRmRpK2RrTkFJ?=
 =?utf-8?B?cXpldy9lSFJlbE9uWkp3QkxiWmY2QWR3cWJweWVLaHdXcGR0ZkVEdCtKallj?=
 =?utf-8?B?ZU56QUc5QzBEZzRsb3l1d0NyaTVzeHRuNXlBS0lVbW5keG0zTWpGcytwcUZX?=
 =?utf-8?B?RUw1OXVKU1pXRTVxMFRKb0xCRUh3RkJOYXI3TEZFYVRxVEZyMGJHdDZHTjRL?=
 =?utf-8?B?UWhYcGc0QW1YUkFoeGJNSk5nYUJnbmhJRVFuaWw5bURqa3dxb292VnJvd2Yw?=
 =?utf-8?B?QXpLQTJ4eW9kNkc4QjRIemVTRXlPZzdrVVZOMU1UcVFEMmpKbGZKU3VNN1Rq?=
 =?utf-8?B?VG9mLzFmN2gzdE01YlZ5MW5NeDNMNDFtY2t2Z3cxMmE4NVNIS1JUekN4Q203?=
 =?utf-8?B?WDA5SlRrcGYybzYxUmtDaWVyNXhJS05FcHVuSi83dzJiOUJwUkZQQ3R0amNW?=
 =?utf-8?B?ZWM2TThjSnkwdXp1YlI3aE81QUluc3hkd2NWZi92T2YwZHcrMU9wMVpYYkRR?=
 =?utf-8?B?eXp1a2VRU0IwYlYycWFLdGdkbzViMFJObXVvR1RlNUlsNEJzM25TRWdDUENG?=
 =?utf-8?B?VlpCZjhTaTJKTnZCdTBTSmpmUjN1Z0pIUUcxQ0hycHBQajZZSmMwTjVYVjVq?=
 =?utf-8?Q?0ZvI087YNjN6GhOE4rb1U84XOSf3fmp9h9D8LEFMV4=3D?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <14E5EB453FDB4348871D64F4B9D4D45C@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM5PR03MB3386.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 2602feac-98bb-462b-9bbc-08da01e56399
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Mar 2022 15:56:35.5558
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: FJwO1ZO25jOfunw3gz+0hZ13YTkVsqa4X1Pic4QOqqxnul//wYBpYuPzQWmxYmtrR34vBbn+jhx74mMMgWLmz6VrtvLGlSz+kWwia4o8vIg=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR03MB2879
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Wed Mar 09 16:06:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 16:06:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287982.488353 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRypa-0007fp-JZ; Wed, 09 Mar 2022 16:06:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287982.488353; Wed, 09 Mar 2022 16:06:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRypa-0007fi-GT; Wed, 09 Mar 2022 16:06:30 +0000
Received: by outflank-mailman (input) for mailman id 287982;
 Wed, 09 Mar 2022 16:06:29 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=QNbA=TU=citrix.com=prvs=060736ad3=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRypZ-0007fc-7K
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 16:06:29 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id de7db5db-9fc2-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 17:06:26 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: de7db5db-9fc2-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646841986;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=uw07yybbbAtrr5oZbng5bpTm/rxiKu7lQ+qu6HIzv9U=;
  b=DVDyllCbwmX6/6ptZBkV5juLRytCc69MTsiItaDbqdqgEqRry28LLC8V
   ZR2ziS9PkOJCKgOC43v1RFxVC8o7Um8svtx+2sulsSNEjWpuddg8lJSgP
   szcdngktL0I/OpXghbEdujEDYt6jtRg30hvDd0BN65/CLUzqNwdXQyOA0
   k=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65841244
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:w8jSz6oCBU+JKF6QAhkwb3XljaxeBmLlZRIvgKrLsJaIsI4StFCzt
 garIBmFafuKNzOkLt10PoTi9EwCsZ6BnNRrTlE4pSgwQSMQ+JuZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 YKq+aUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBAfX0vvsZQgBkDiBaNI5a6OLNDkmmvpnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVI1zbWAOxgWZnea67L+cVZzHE7gcUm8fP2O
 ZdJNWM1MEiojxtnFkk0IpJih8KUg17hbSdU8lWEvPQw7D2GpOB2+Oe0a4eEEjCQfu1OhVqRr
 G/C+2X/AzkZOcaZxD7D9Wij7sfNgCf6VYQ6BLC+sPlwjzW73mUODDUGWF39puO24mauVtQaJ
 0EK9y4Gqakp6FftXtT7Rwe/onOPolgbQdU4O+8w5RyJy6HUyx2EHWVCRTlEAPQcvc8rQXoR1
 1mGn/vgHzkpu7qQIVqC8p+EoDX0PjIaRUcoaDUYVwID75/GqZsqkxPUZt95Fei+ididJN3r6
 2nU9m5k3exV1JNVkfXglbzav96yjqeRdigq4hTOYn+kygpaeJ74baOZ8FeOuJ6sM72lZlWGu
 XEFne2X4+YPEYyBmUSxfQkdIF26z63baWOB2DaDC7Fkrm3woCD7Iei89RkjfB8BDyoSRdP+j
 KY/Uyt17YQbAnalZLQfj2mZW5VzlviI+TgIu5npgjtyjnpZKVfvEMJGPxf4M4XRfK4Ey/9X1
 XCzK5rEMJriIf47pAdavs9EuVPR+ggwxHnIWbfwxAm93LyVaRa9EOlZbgTQMrppsP/Y/m05F
 uqz0ePQm32zt8WkPkHqHXM7dwhWfRDX+7itwyCoSgJzClU/QzxwYxMg6bggZ5Zkj8xoehTgp
 RmAtrtj4AOn3xXvcFzSAlg6Me+Hdcsv/BoTYH13VX71iidLXGpaxPpGH3fBVeJ8r7ILID8dZ
 6RtRvhs9dwUE2WZoWtBNcehxGGgHTzy7T+z0+OeSGFXV7ZrRhDT+8+ieQ3q9SIUCTGwu9d4q
 Lqlvj43i7JZL+i+JK46sM6S8m4=
IronPort-HdrOrdr: A9a23:DSaZba1WtcSeJ4MEAjda0AqjBVZyeYIsimQD101hICG9Lfb3qy
 n+ppsmPEHP5Ar5OEtBpTiBUJPwJ0800aQFnLX5Wo3SIDUO2VHYVr2KiLGC/9SOIVyaygcw79
 YFT0E6MqyOMbEYt7eL3ODbKadZ/DDvysnB7o2yvhQdLz2CKZsQlDuRYjzrY3GeLzM2fKbReq
 Dsgfau8FGbCAoqh4mAdzI4dtmGg+eOuIPtYBYACRJiwA6SjQmw4Lq/NxSDxB8RXx5G3L9nqA
 H+4kHEz5Tml8v+5g7X1mfV4ZgTsNz9yuFbDMjJrsQOMD3jhiuheYwkcbyfuzIepv2p9T8R4Z
 PxiiZlG/42x2Laf2mzrxeo8w780Aw243un8lOciWuLm72OeBsKT+56wa5JeBrQ7EQt+Ptm1r
 hQ4m6fv51LSTvdgSXU/bHzJl9Xv3vxhUBnvf8YjnRZX4dbQqRWt5Yj8ERcF4pFND7m6bogDP
 JlAKjnlblrmGuhHjDkV1RUsZ+RtixZJGbFfqFCgL3Y79FupgE586NCr/Zv20vp9/oGOu55Dq
 r/Q+BVfYp1P70rhJJGdZQ8qPSMexnwqDL3QSuvyAfcZek600ykke+C3Fxy3pDsRKA1
X-IronPort-AV: E=Sophos;i="5.90,167,1643691600"; 
   d="scan'208";a="65841244"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ReAgBXYCHyPlClTqYsj7gdKreG6n+A8xbNeFIoeVlDcQZxGYR2EO+Xlsi8pU0hDuso8blHSNTT+DjzVSVPGyDQNMqaxySvsjOepK3LqOYyep+XwMyXeh2DIKzviaqw2sjC+RCqLRNegdcdwCbYXvUDR+aNRlovM+imi7XRY/WE1mPvHsc1bHUU29GWqVfdLFRq48Xe+kKFfxCwlkN1V0xnf28Rtf0E4byP/KN5K9wYZ/Q2Z8KwJEntKrTcmxTtEmYJ74Ap6sSvq0EEWoOuNYP8EfxN1Z252Yz7FMkzRQGXmd110BklSx5ftieC2RIl5JEbPZAuw3yzVlB/J7wQGy5Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=f3drGM7bML45U7g01fjTBjU3bjsi+aTm4m4efEhJI9U=;
 b=UXDiIKi89ZtE22u/KST5HnHHvWYaWMcpChpTrwrQpgS93rlioJ3oOWkErEwFj6h6RUu4CjjPrBOAT8PN+N9zJhg6JAlrXGmu8ET4pP0ZzdyIkZW7zZk9H3rWT52CZBnnM328EGW5k7FabCIGcuz30k3MjS7+ZNx06SFnJ/ttvzmPbGSr4Q/dSObQ3eMnHlUpQ2G04sI0ijJWHjjegC4zQOUaInkgjmZQ/dJVZZsSYk4CP9HcZ1cL6TtWb2fZct79aVpJDmdAXjKVAf1KQ0v9gUb4TIG113kYrrlADjTOj5U2sfN1qdhnfPE3eEFcqCo/bfwvJofWlqNZuvgLJXL/LQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=f3drGM7bML45U7g01fjTBjU3bjsi+aTm4m4efEhJI9U=;
 b=oL9lilEUo2r4H1SCtW9Xzke+SDI+PMG4ZCwR8D5xrHqy68rERRVyswLDZuEyjqaV+1jjAWK7kvKWqiMCU3XkNVvIhaP6th22G2XjZfnonUJYuRUMF7iWN9CDxTls/hucYsl4Pg3A0rDFmpnjMH/ah+aJivCcvcFVYleG6luw1/8=
Date: Wed, 9 Mar 2022 17:06:11 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Rahul Singh <Rahul.Singh@arm.com>
CC: Jan Beulich <jbeulich@suse.com>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, Andrew Cooper <andrew.cooper3@citrix.com>, "Wei
 Liu" <wl@xen.org>, George Dunlap <george.dunlap@citrix.com>, Julien Grall
	<julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "Paul
 Durrant" <paul@xen.org>
Subject: Re: [PATCH v2 1/3] xen/vpci: msix: move x86 specific code to x86 file
Message-ID: <YijQc9DejYAo3EcS@Air-de-Roger>
References: <cover.1644937405.git.rahul.singh@arm.com>
 <4d2a727ba218468e4f347dc12ca051a0534fe205.1644937405.git.rahul.singh@arm.com>
 <6e188f87-7e4c-00ee-dd0c-373d42acec34@suse.com>
 <6BFB9B87-D8A1-442D-B4DC-18760C59D7BF@arm.com>
 <c11278f4-c902-0eb9-ac59-e27c0f2ba912@suse.com>
 <41F03A07-F8D6-423D-9E40-F4B89C611C87@arm.com>
 <175a55cc-70b4-4832-9a78-0db57a9ae4a4@suse.com>
 <1205992D-ACE4-4E94-B554-3B14F6D9697E@arm.com>
 <35ad9273-956b-86d6-55a3-c737575a7880@suse.com>
 <515CDCB8-43D2-4D08-9195-D058E641E1BF@arm.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <515CDCB8-43D2-4D08-9195-D058E641E1BF@arm.com>
X-ClientProxiedBy: LO4P123CA0004.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:150::9) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: e65d6b81-4ccc-4841-1fd6-08da01e6be27
X-MS-TrafficTypeDiagnostic: BN3PR03MB2290:EE_
X-Microsoft-Antispam-PRVS: <BN3PR03MB2290DAB9B7457BE03B065BE48F0A9@BN3PR03MB2290.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(508600001)(66946007)(4326008)(8676002)(6666004)(66556008)(66476007)(9686003)(6506007)(6512007)(33716001)(53546011)(6486002)(82960400001)(38100700002)(6916009)(85182001)(83380400001)(2906002)(86362001)(316002)(186003)(26005)(8936002)(54906003)(5660300002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?K2MwNTFuK1RHVkhnR1dzMWxMU3g3L0RXdmNHV3lKQzZJM01yMThucEkyZWVE?=
 =?utf-8?B?bkw5Smx3Tm10S0lqaVQvRDhsODBBS0IyanBVZFU4OTIvSnZzVDhNVFB4Sjdx?=
 =?utf-8?B?UFlYc295NVhBQjVxYjFpK1pJTDdWK1ZrWmlIRngvRGx0bmkwWUFJa3RnaFhU?=
 =?utf-8?B?VHBBZUZzZDBaZEp5eW13ZEQ0OTJkWExyVDh2NDZ3RlpqeGdHY0l2Z0QxMkk5?=
 =?utf-8?B?YmRjYThhbGE2YUtsODJIcksrdWRVQWJCRjhFeTdVdUwrMXAxQ3p1WWhKejZp?=
 =?utf-8?B?V08zWFFPWFRkVUlOK09xaytnZ2NrV3M3R1RSNHhaa2t5OTA4d1FMZjdvenJC?=
 =?utf-8?B?QjFpdUtnd3hheU52NVcrd3hnbDJabWNMZlRnVVY0ejJiTitCTXk1L3laU05Q?=
 =?utf-8?B?THNUWTVzTFJyZHNpK1pveWlzL3NST3FWeTRuY2lIV2psaGFzRjRSdnltY2Er?=
 =?utf-8?B?Z2FDc1FQNUhCUnc1NVo5TFh0aFNnV2YvOFJhMEdOKy9lWjJOWEtoOC8rTVJO?=
 =?utf-8?B?aDB0ekJyanZzMXR0Z0RhOVVIcUdVRk0vUS9aNTFmNmpDeEljTUV3TGlJSmJ1?=
 =?utf-8?B?dGdjT3Jqa1hibmJNRXZ5dnptL0h1dnRFQ1ZPZDNBYnhLSE5LV1NGSmpyQXBm?=
 =?utf-8?B?MTM0VnVpWWwyREg1bHdwTEhwT1NveTBhQ0hFenUxdnhtMGVxN2hhNnZvSkpW?=
 =?utf-8?B?Y3p3RkRaSXdNRFFoMDRoUkFqaVBJVXFkbE9zejFjbFFPKzdSYVhuYlFaMEpG?=
 =?utf-8?B?dy90eWJvZ0dtR3p6MUZod2htRmpBQlBGN1FFNzM4bXREMzVqTXZWbFVKWGVm?=
 =?utf-8?B?TW5sVGlLN3YxeTFFMHpIOUs1ajN2bFI1cnZqOUtqN1p2VXI2c0NrNTY0NnR5?=
 =?utf-8?B?MGprWjFDa3pjdGQ2elQ2bERsZjBtYldmR3BQTWMrMUNudFBoRXQydjRDbEo3?=
 =?utf-8?B?V3daVDJTd2VVSU8wTXgrbkZxNEgybnpPUTlHUkZDTlA3OWwvTGs3ZGJBai8w?=
 =?utf-8?B?cHhqWjlLQ00reGZPaGhSWDdZQ0wvV1RtZTVjZzhUZUdCT005Y282M29rR2Vo?=
 =?utf-8?B?NzlQOE9pZHB3R3Q5S2Z1OVNPYjNOTFZrK0hBT0dXVmVVZjhlQlhiTXVSS3or?=
 =?utf-8?B?aVFaNmUvVnM4RHZEcnM5ZG9lWnVDYm4wSkJDWmNKUU5ReDJ4OVkyOVgvZDN2?=
 =?utf-8?B?dmVWSXczR2xnRjdEbHRoNXRpUjFVQmc2ZFhKcDFwY2hPTml3U0ZtT2kxZGJ4?=
 =?utf-8?B?eGVOWXE1cmdzQkc0M3JoY29zTDg5NjNObDdQMm13V3h5NHM0RXl5amM5VG1Z?=
 =?utf-8?B?QkN0RmdBankvWTM5ZFVNOWd1QmZEM0JzUFNaRzBpTTlLejVYMTdjZGxKM2Fj?=
 =?utf-8?B?aUM3dWhvbWk2MzdiZTVxbXN5WVBVT1hMQ0lLYU8rcGhJQm5lOVl0elhUS2Va?=
 =?utf-8?B?SjVvOXMzSi9WSFJSSVZoVmE0ZWpjS1dWRDA5QTJwcUFTcmZESUNTV2J4YnNC?=
 =?utf-8?B?c3lNWWUxRzFQV1p0c0w1Rk1XNzh0TllVZHQ3WDk0SUM1ODEvWHE4SWtEc0ZK?=
 =?utf-8?B?RjIwLzAwRmtrWXhZN3U4ZU1LelhLcURRclE0b1YzamNSS2V0LzNrc2Y1WTkr?=
 =?utf-8?B?MFpKWkloQk53dGM5b3FLeGU3SmMzQkZybWQzVHlNUFliMzExK1MzVyt6aHhN?=
 =?utf-8?B?aE1ueUxYODY5NUNPbWpyZkU3M2llMUR2WlgxSjMzQzVTZWE2QzdYTXVadUM5?=
 =?utf-8?B?K3VWYnB5T0RobjdYUDQweGtDSW5OczFEYWFTV1hEN3JKUGx4Ym1Ub1pXTFha?=
 =?utf-8?B?MEZNekppZG5pbVJhY1ROUHBDK1kvMWUvcEgzSk9uM3JmTnovaTNkVDNML0gy?=
 =?utf-8?B?K2U4S0dCdzc3U0ZiNERHTjdRVjZIY2h4NmNBa001WXhYTVpLTU8xZ1phUFBi?=
 =?utf-8?B?KzV6N2JpYnVXYVdJTGZnSXY5NHR3SnhobUY3WjRzSEtWNUVwdXBaaS9JNTNB?=
 =?utf-8?B?UHpMZ1hkak1nPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: e65d6b81-4ccc-4841-1fd6-08da01e6be27
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 16:06:17.2884
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: NCJNPER56SHFSLMCPoSySDaX52xxrMwHnyuGnR6t+aQq+132FJ+Bc4bwkoDdqybhv3lpq8Lr2MV8NN1wtQKEaQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN3PR03MB2290
X-OriginatorOrg: citrix.com

On Wed, Mar 09, 2022 at 03:50:12PM +0000, Rahul Singh wrote:
> Hi Jan,
> 
> > On 9 Mar 2022, at 10:17 am, Jan Beulich <jbeulich@suse.com> wrote:
> > 
> > On 09.03.2022 11:08, Rahul Singh wrote:
> >> Hi Jan,
> >> 
> >>> On 4 Mar 2022, at 7:23 am, Jan Beulich <jbeulich@suse.com> wrote:
> >>> 
> >>> On 03.03.2022 17:31, Rahul Singh wrote:
> >>>>> On 1 Mar 2022, at 1:55 pm, Jan Beulich <jbeulich@suse.com> wrote:
> >>>>> On 01.03.2022 14:34, Rahul Singh wrote:
> >>>>>>> On 24 Feb 2022, at 2:57 pm, Jan Beulich <jbeulich@suse.com> wrote:
> >>>>>>> On 15.02.2022 16:25, Rahul Singh wrote:
> >>>>>>>> --- a/xen/arch/x86/hvm/vmsi.c
> >>>>>>>> +++ b/xen/arch/x86/hvm/vmsi.c
> >>>>>>>> @@ -925,4 +925,106 @@ int vpci_msix_arch_print(const struct vpci_msix *msix)
> >>>>>>>> 
> >>>>>>>>  return 0;
> >>>>>>>> }
> >>>>>>>> +
> >>>>>>>> +int vpci_make_msix_hole(const struct pci_dev *pdev)
> >>>>>>>> +{
> >>>>>>>> +    struct domain *d = pdev->domain;
> >>>>>>>> +    unsigned int i;
> >>>>>>>> +
> >>>>>>>> +    if ( !pdev->vpci->msix )
> >>>>>>>> +        return 0;
> >>>>>>>> +
> >>>>>>>> +    /* Make sure there's a hole for the MSIX table/PBA in the p2m. */
> >>>>>>>> +    for ( i = 0; i < ARRAY_SIZE(pdev->vpci->msix->tables); i++ )
> >>>>>>>> +    {
> >>>>>>>> +        unsigned long start = PFN_DOWN(vmsix_table_addr(pdev->vpci, i));
> >>>>>>>> +        unsigned long end = PFN_DOWN(vmsix_table_addr(pdev->vpci, i) +
> >>>>>>>> +                                     vmsix_table_size(pdev->vpci, i) - 1);
> >>>>>>>> +
> >>>>>>>> +        for ( ; start <= end; start++ )
> >>>>>>>> +        {
> >>>>>>>> +            p2m_type_t t;
> >>>>>>>> +            mfn_t mfn = get_gfn_query(d, start, &t);
> >>>>>>>> +
> >>>>>>>> +            switch ( t )
> >>>>>>>> +            {
> >>>>>>>> +            case p2m_mmio_dm:
> >>>>>>>> +            case p2m_invalid:
> >>>>>>>> +                break;
> >>>>>>>> +            case p2m_mmio_direct:
> >>>>>>>> +                if ( mfn_x(mfn) == start )
> >>>>>>>> +                {
> >>>>>>>> +                    clear_identity_p2m_entry(d, start);
> >>>>>>>> +                    break;
> >>>>>>>> +                }
> >>>>>>>> +                /* fallthrough. */
> >>>>>>>> +            default:
> >>>>>>>> +                put_gfn(d, start);
> >>>>>>>> +                gprintk(XENLOG_WARNING,
> >>>>>>>> +                        "%pp: existing mapping (mfn: %" PRI_mfn
> >>>>>>>> +                        "type: %d) at %#lx clobbers MSIX MMIO area\n",
> >>>>>>>> +                        &pdev->sbdf, mfn_x(mfn), t, start);
> >>>>>>>> +                return -EEXIST;
> >>>>>>>> +            }
> >>>>>>>> +            put_gfn(d, start);
> >>>>>>>> +        }
> >>>>>>>> +    }
> >>>>>>>> +
> >>>>>>>> +    return 0;
> >>>>>>>> +}
> >>>>>>> 
> >>>>>>> ... nothing in this function looks to be x86-specific, except maybe
> >>>>>>> functions like clear_identity_p2m_entry() may not currently be available
> >>>>>>> on Arm. But this doesn't make the code x86-specific.
> >>>>>> 
> >>>>>> I will maybe be wrong but what I understand from the code is that for x86 
> >>>>>> if there is no p2m entries setup for the region, accesses to them will be trapped 
> >>>>>> into the hypervisor and can be handled by specific MMIO handler.
> >>>>>> 
> >>>>>> But for ARM when we are registering the MMIO handler we have to provide 
> >>>>>> the GPA also for the MMIO handler. 
> >>>>> 
> >>>>> Question is: Is this just an effect resulting from different implementation,
> >>>>> or an inherent requirement? In the former case, harmonizing things may be an
> >>>>> alternative option.
> >>>> 
> >>>> This is an inherent requirement to provide a GPA when registering the MMIO handler.
> >>> 
> >>> So you first say yes to my "inherent" question, but then ...
> >>> 
> >>>> For x86 msix mmio handlers is registered in init_msix(..) function as there is no requirement
> >>>> on x86 to provide GPA when registering the handler. Later point of time when BARs are configured
> >>>> and memory decoding bit is enabled vpci_make_msix_hole() will clear the identity mapping for msix
> >>>> base table address so that access to msix tables will be trapped.
> >>>> 
> >>>> On ARM we need to provide GPA to register the mmio handler and MSIX table base
> >>>> address is not valid when init_msix() is called as BAR will be configured later point in time.
> >>>> Therefore on ARM mmio handler will be registered in function vpci_make_msix_hole() when
> >>>> memory decoding bit is enabled.
> >>> 
> >>> ... you explain it's an implementation detail. I'm inclined to
> >>> suggest that x86 also pass the GPA where possible. Handler lookup
> >>> really would benefit from not needing to iterate over all registered
> >>> handlers, until one claims the access. The optimization part of this
> >>> of course doesn't need to be done right here, but harmonizing
> >>> register_mmio_handler() between both architectures would seem to be
> >>> a reasonable prereq step.
> >> 
> >> I agree with you that if we modify the register_mmio_handler() for x86 to pass GPA
> >> we can have the common code for x86 and ARM and also we can optimize the MMIO
> >> trap handling for x86.
> >> 
> >> What I understand from the code is that modifying the register_mmio_handler() for
> >> x86 to pass GPA requires a lot of effort and testing.
> >> 
> >> Unfortunately, I have another high priority task that I have to complete I don’t have time
> >> to optimise the register_mmio_handler() for x86 at this time.
> > 
> > Actually making use of the parameter is nothing I would expect you to
> > do. But is just adding the extra parameter similarly out of scope for
> > you?
> > 
> 
> If I understand correctly you are asking to make register_mmio_handler() declaration
> same for x86 and ARM. You are not asking to modify the x86 MMIO handler logic to
> use GPA to find the handler?
> 
> As Roger also mentioned that vpci_make_msix_hole() is required only for x86 to clear
> the identity mapping. If we make the vpci_make_msix_hole() arch-specific there is no
> need to modify the parameter for register_mmio_handler(), as for x86 and ARM
> register_mmio_handler() will be called in different places.
> 
> For x86 register_mmio_handler() will be called in init_msix() whereas for ARM
> register_mmio_handler() will be called  in vpci_make_msix_hole(). In this case we
> have to move the call to register_mmio_handler() also to arch-specific files. If we move
> the register_mmio_handler()  to arch specific file there is no need to make the
> function common.

So then for Arm you will need something akin to
unregister_mmio_handler so the handler can be removed when memory
decoding is disabled?

Or else you would keep adding new handlers every time the guest
enables memory decoding for the device without having removed the
stale ones?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 16:31:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 16:31:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287990.488363 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRzDo-0002Uw-MJ; Wed, 09 Mar 2022 16:31:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287990.488363; Wed, 09 Mar 2022 16:31:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRzDo-0002Up-JD; Wed, 09 Mar 2022 16:31:32 +0000
Received: by outflank-mailman (input) for mailman id 287990;
 Wed, 09 Mar 2022 16:31:31 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=QNbA=TU=citrix.com=prvs=060736ad3=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nRzDn-0002Uj-HF
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 16:31:31 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 5e12fdab-9fc6-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 17:31:29 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5e12fdab-9fc6-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646843489;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=Dm7/6LoRjHlZdzdMjGL+Nj0JzwiBDA4t1ql643AT0xQ=;
  b=PZjVaicbLQ0PgQbJEThnojWH/kbyX9LC0DlkZQND9ue/s2+Yh3Jkf7EH
   261lA83Zd/sP8u78H+4yDzr7KrTMl1CR+DZ+BFYu3XZR1rudANf2MP0EC
   kS59gvMPpBS9TAE6gbGErToo2lVOsc6fKhEh6FXsapdzzBXcy+xrI5XPL
   k=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65310681
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:sUkcda25UPiotI40/vbD5e1xkn2cJEfYwER7XKvMYLTBsI5bp2QCm
 GsWCG6AMqvfZzDwLY1xO4qwo0sH7JeHnNBnQARqpC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUw0IDja++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /1M6L+sdTspY5Tjt7sUFEMCAh98IfRJreqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHxO4wSoDd4xCzxBvc6W5HTBa7N4Le02R9u25sXRaiOP
 qL1bxI2YhfbRyZXHG5OM7IUrtv2pmPccCRh/Qf9Sa0fvDGIkV0ZPKLWGMXRUsyHQ4NShEnwj
 nLL+SH1Dw8XMPSbyCGZ6TS8i+nXhyT5VYkOUrqi+ZZCm0aPz2YeDBkXU1qTovSjjEO6HdVFJ
 CQ8+CAjsKwz/0yDVcTmUluzp3vslhwBX9tdFcUq5QfLzbDbizt1HUBdEGQHMoZ/8pZrG3p6j
 Tdlgu8FGxRu7Z6JdU6dq467gmy7fnJPPFEAeXYLGF5tD8bYnKk/iRfGT9BGGaGzj8HoFTyY/
 w1mvBTSlJ1I05dVivzTEUTvxmv1+8OXFlJdChD/Azr9hj6VcrJJcGBBBbLzyf9bZLiUQVCa1
 JTvs5jPtbteZX1hecHkfQnsIF1Lz6vdWNE/qQQ2d3XEy9hL0yT9FWy3yGsiTHqFyu5eJVfUj
 Lb74Gu9HqN7MnqwdrNQaImsEcksxqWIPY27Cq6LMIYUMsQtKFHvEMRSiai4hTCFfK8Ey/1XB
 HtmWZz0USZy5VpPl1JauNvxIZd0n3tjlAs/tLjwzgi90Kr2WZJmYextDbd6VchgtPnsiFyMq
 753bpLWoz0CALyWSnSGquY7cAFVRUXX8Lir8qS7gMbYeVE4cIzgYteMqY4cl3tNxP0EyL2Xo
 injBie1CjPX3BX6FOlDUVg6AJvHVpdjt3MreysqOFejwX84ZoizqqwYcvMKkXMPr4SPEdYco
 yE5Rvi9
IronPort-HdrOrdr: A9a23:vwZtgKysAk+fSI+x+pLpKrPwIr1zdoMgy1knxilNoH1uHvBw8v
 rEoB1173DJYVoqNk3I++rhBEDwexLhHPdOiOF6UItKNzOW21dAQrsSiLfK8nnNHDD/6/4Y9Y
 oISdkbNDQoNykZsfrH
X-IronPort-AV: E=Sophos;i="5.90,167,1643691600"; 
   d="scan'208";a="65310681"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=EhE9x0hKYMSEdivoO9uxyBZMSy1wV8xNXzezKWw+gwmV+v/FtKmZt7U6dMSFllZOasfoPZeXCoubbm78eGxmGj6jFt/GarIv3W6npuaKQ4hFyNhpRgMmuTfuXKmM6wNiNsrh7df6DnwgWKN1TZZEdYZFY07fdKj3mnezktBui7MaKHxETeNqIuy8SZmBZpPEXrs8gvSVekn7rnsEK0+hC3Tu1mZFg/6NAZ/mOWCgRf/42JRsevmRQI1uindClsUd/vzf6gIvutPjQO3gpcwb0L58kWyUzYfwbvBKMecTYzcizR6A762AoYVSoWaebwmo/EaN9z3hsCMOSwVEUyMHng==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=EM8Op1k6uEX0qDaiVSGaBuog1RPDRS9QMH5g5+r4jgk=;
 b=J/4t+LNAAX9eFVylJxTr3fUGmpWBqYC9EcnRVfirNgKA9Bw9Nsv0gqWn0bFqInccefYhoUxcHEluUnryKZnxIcBN02sZEa0lX7KbXKuGF7Tzpy1wOBsGmGxr5AXau1L/7lr4sB+WHPwnQHvBRCuKgkKiOwRBV9eKSnibFNBSjP4scxtyzsDtuZ/LomISrVEHXnDv1c7cw7NIIQ0U22oss9EwfAXrxhJgsCc/3iE5a7Av4AM1cOXXw4YnylqFI5XVs0wughrkofAAsj0gcw4fIgCn4fPjIwZ/1vf2JUyrjVE0WrhoZUWPS80G3rhfZUD/Q6xttnltM5bOmQTNSUkPzA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=EM8Op1k6uEX0qDaiVSGaBuog1RPDRS9QMH5g5+r4jgk=;
 b=BsC5xU7256X8fj/qO/MFKwoHxh2ox0HUlf2NBUx6z2CxSR7KS+Md70rXm/frQv/RirAK8ugE35xOWoz3IhiDN1yzBJDd9Nwau5FoWvniAg4ktWbpmiUL3Uqg2D9ReFHXvq4g1F2SwDnf/tTMztXeiw6Tcb/nFDCMWrhh9hcjtKw=
Date: Wed, 9 Mar 2022 17:31:14 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH 1/3] amd/msr: implement VIRT_SPEC_CTRL for HVM guests on
 top of SPEC_CTRL
Message-ID: <YijWUj3H+8UHEikf@Air-de-Roger>
References: <20220201164651.6369-1-roger.pau@citrix.com>
 <20220201164651.6369-2-roger.pau@citrix.com>
 <8e7f3193-dee6-1ff4-0c68-081032e240d2@suse.com>
 <YijBpyOlmTA7tIUl@Air-de-Roger>
 <6d0d901c-fc7c-2655-6285-df07101b852d@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <6d0d901c-fc7c-2655-6285-df07101b852d@suse.com>
X-ClientProxiedBy: LO4P123CA0401.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:189::10) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 3a1585b5-dbdf-4163-3aa4-08da01ea3d3d
X-MS-TrafficTypeDiagnostic: PH0PR03MB6496:EE_
X-Microsoft-Antispam-PRVS: <PH0PR03MB6496A994C7C71EDDD51DB5478F0A9@PH0PR03MB6496.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(85182001)(82960400001)(38100700002)(6486002)(54906003)(5660300002)(86362001)(8936002)(66476007)(8676002)(83380400001)(4326008)(2906002)(6916009)(66946007)(66556008)(33716001)(6506007)(9686003)(508600001)(6666004)(6512007)(186003)(26005)(316002)(53546011)(67856001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?WGdtY1ZrQ0NiQWRydlhHSW9ncERxck9RajlNL3M2V2NvZTVlenZIMmtYMmth?=
 =?utf-8?B?aWNMbkJhcGZiVFdiak1SbjJrU2J3bUFvSHRlQ3M5RHFmbTlaY3dVS2JlTTl4?=
 =?utf-8?B?TmZTUm1HcHBqT25DdEE4MnBZa2IyZGdWK1RXUFRIWFQ4ZFNvaVJydzBMdG9D?=
 =?utf-8?B?M0pJbGQ5bFEvUWYrQzZZMGlQMTBiZFhuNklRQURMdDVJMERaQnpKSXFRbldC?=
 =?utf-8?B?UzJxYUZkdHpqQU5CbkpYbEN2MHZLdkwyWTZPMHlaaEhlb0Zlbk93M0ZSQ2VG?=
 =?utf-8?B?VkZlSDRRbW5Vejh4NFVyWkpDRm9sU2t3TTI3ODRLUDYwREVSaU5Obm9iWHRE?=
 =?utf-8?B?NlcvUEVHN1NCZ2JjZnlmeit2OVFiMzI3SkN4L1Q2bjFWM0c2SWxGUjhwUnNK?=
 =?utf-8?B?Y0JCWUJ1L2FVSGhDaUVtT3hPYmJ0QnBtS1RNODNDT21VcGNTSG5KY0RIOXVV?=
 =?utf-8?B?aUUyY2pkZGVkZkx5L2tNNlhQUmdyMnhLQVRscXFQdXovR1dxL0FwajIrWjVy?=
 =?utf-8?B?OFZ2YzZuSWpZK2NiUEV0T0VHMGp6QVFTcmM0NXIrS2F6YjFFeVVHQlM2d05L?=
 =?utf-8?B?YysyczN2bzVHM3pRdmRESnRCRittOUwrQ3lUODBVRVk0RFhaREl0M3VpNENQ?=
 =?utf-8?B?amsyNVZsOHJGSk9zUi9pcmNJZU8yMWtWK1NHanNZR2h6b1JnVHlXdmI3c3BM?=
 =?utf-8?B?NWo3eHNNZGh6RUROaGV6TDN6UHJIWEpZR081NHViSGpkMVIyV3loSXQxMTJY?=
 =?utf-8?B?QTVyd1B2WUtJUGdpTDRmbU1rNEtUcWViUDBzS1BpZzdNRlhPVWp1TmhxakNT?=
 =?utf-8?B?c2RHandzbjdLVEN0T0dyT0lxeWFSMTEvajY1bVZDOFRlSkFOVGcrRG9RMVlD?=
 =?utf-8?B?N3BHMTRMU0hzNndXZk05ZUd0MWlMY2Zja3BGejRQNi96MzBrYlBkRUJiRllq?=
 =?utf-8?B?dkVTSC9GbmFrNXV0RUtIS1JObmhnckNwcmxPMVBiQTBIQktYTjRnYlBHb0Jw?=
 =?utf-8?B?cFpXcFkzTTRRWjZBdGhLdGRhVmZSR2ljK1FTTnlNenVVbmEyMGFnYXpEN2ZG?=
 =?utf-8?B?ciszaU9UZ2JXOVRRRktnYUJ2VEZ4dUQ5UlErSGE0SjRwdVRlZW5hVklUQmYy?=
 =?utf-8?B?OHNrVEtELzV0cWNCWUJGdjBMNUlKZ3JrSklMdVJUZXV6NUIvUDc2b2hCMVRO?=
 =?utf-8?B?bFJIV282d3pGcittL0dJL2JRMWJkSUJqd2hZQnlSTVdnOU9hSWdhdVdUa21q?=
 =?utf-8?B?c3M2RlIwVGFTWHduVWQ5Zkh1RkdqNzM5dmsyZGZldUhQS3pZVUJ1c1FiMEVE?=
 =?utf-8?B?dEUzb3lMam1Vc3h6N0NtMG9qRFNnL2YxUUd6eExRRFFoSW00aTd3bWVCZjhl?=
 =?utf-8?B?c1BWVEtwRWo5Z1ZuOFpOeEk1QUk0VCtyZEVWMkM1cmw3UXdQTVpZMzdyZUZj?=
 =?utf-8?B?dmREcXdyRlkxM2FrNDlvSTBLRTZDMUtHOGRjQmlvSXBDSXQvaXp6akRWdFhO?=
 =?utf-8?B?MVNLUVVnY3RMS1BCQVhDVTlubW9oMVcxMTB6cGR6dXlmQjVjSHdpZzhkMFVi?=
 =?utf-8?B?Z2RvQUxndE1BcFdSK1JiK2NyTHVYYWs5bzc0UEhnSXFad1UyUnNsOUU4V0l0?=
 =?utf-8?B?dTRCVzZIeFZuSWtWQ05DOHRxTGpCb0dkTFhTYTA5WlZBcWorL1M4c2U4blZP?=
 =?utf-8?B?UVRFT0NkYnNYeWQ1Wmt4aVYwU0VOUnNpV0ZVcnprSFhSckdUL09KUmpNcmFE?=
 =?utf-8?B?bkVkTDRqVDBKT0NvaWVPalE1a2Y1Y3doU2hqM2VlZnNnYzJzdjFsa3d0T1hQ?=
 =?utf-8?B?NDlkc011cDFyK0hxTmhKRGZ0UVEzQlVCcTJuMGh4bzNWYncvV0tJdnpIZXND?=
 =?utf-8?B?bmUxczduMWllTWU4NFBsenJzTW16Y2hBdlJtN2pqT0tReGZnNm5sWHVBZ1NI?=
 =?utf-8?B?M0d5NW55TWZnVlZUSFNFaW44ZzZraW9DUUtRUlQ0Y0ZINFFGU0Vuclp0b2kr?=
 =?utf-8?B?T3pJdlMwQ3lsNzVhUWxNUmFCblVnNDJROGVpUTg2dWV3QXJqMlZxbHdtVFBw?=
 =?utf-8?B?N1BQeVc2TDQ4R2lpMDVyY3NZSDFEeXN1Q0pqZEwzRWV2UzRpSFhGR0s1a2p4?=
 =?utf-8?B?dS91ODVBNDFCZGlZRytIcUt4TzBIN2lTeGlqVythVGpiZzVjWEVQVkZTL1VY?=
 =?utf-8?Q?LGwAhN3dtXT4yEf3TK2+j94=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 3a1585b5-dbdf-4163-3aa4-08da01ea3d3d
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 16:31:18.9775
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: NL8A2c7galHjn7yUsHzUbfFULBM+on3MLeQ1K4dOiW/XbS79EcDUaZHR83NGtj1+AXkSXXv1bzqSD5cbHQePxQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR03MB6496
X-OriginatorOrg: citrix.com

On Wed, Mar 09, 2022 at 04:40:24PM +0100, Jan Beulich wrote:
> On 09.03.2022 16:03, Roger Pau Monné wrote:
> > On Mon, Feb 14, 2022 at 04:07:09PM +0100, Jan Beulich wrote:
> >> On 01.02.2022 17:46, Roger Pau Monne wrote:
> >>> Use the logic to set shadow SPEC_CTRL values in order to implement
> >>> support for VIRT_SPEC_CTRL (signaled by VIRT_SSBD CPUID flag) for HVM
> >>> guests. This includes using the spec_ctrl vCPU MSR variable to store
> >>> the guest set value of VIRT_SPEC_CTRL.SSBD.
> >>
> >> This leverages the guest running on the OR of host and guest values,
> >> aiui. If so, this could do with spelling out.
> >>
> >>> Note that VIRT_SSBD is only set in the HVM max CPUID policy, as the
> >>> default should be to expose SPEC_CTRL only and support VIRT_SPEC_CTRL
> >>> for migration compatibility.
> >>
> >> I'm afraid I don't understand this last statement: How would this be
> >> about migration compatibility? No guest so far can use VIRT_SPEC_CTRL,
> >> and a future guest using it is unlikely to be able to cope with the
> >> MSR "disappearing" during migration.
> > 
> > Maybe I didn't express this correctly. What I meant to explain is that
> > on hardware having SPEC_CTRL VIRT_SPEC_CTRL will not be offered by
> > default to guests. VIRT_SPEC_CTRL will only be part of the max CPUID
> > policy so it can be enabled for compatibility purposes. Does this make
> > sense?
> 
> Yes. Can you re-word along these lines?

Sure.

> >>> --- a/docs/misc/xen-command-line.pandoc
> >>> +++ b/docs/misc/xen-command-line.pandoc
> >>> @@ -2273,8 +2273,9 @@ to use.
> >>>  * `pv=` and `hvm=` offer control over all suboptions for PV and HVM guests
> >>>    respectively.
> >>>  * `msr-sc=` offers control over Xen's support for manipulating `MSR_SPEC_CTRL`
> >>> -  on entry and exit.  These blocks are necessary to virtualise support for
> >>> -  guests and if disabled, guests will be unable to use IBRS/STIBP/SSBD/etc.
> >>> +  and/or `MSR_VIRT_SPEC_CTRL` on entry and exit.  These blocks are necessary to
> >>
> >> Why would Xen be manipulating an MSR it only brings into existence for its
> >> guests?
> > 
> > Well, that's not exactly true. Xen does use VIRT_SPEC_CTRL (see
> > amd_init_ssbd).
> > 
> > I'm unsure how to express support for VIRT_SPEC_CTRL, as it does rely
> > on SPEC_CTRL when available.
> 
> I wonder whether the command line doc needs to go into this level of
> detail.

Right, so you would be fine with leaving the command line option
description alone.

> >>> --- a/xen/arch/x86/cpuid.c
> >>> +++ b/xen/arch/x86/cpuid.c
> >>> @@ -543,6 +543,13 @@ static void __init calculate_hvm_max_policy(void)
> >>>          __clear_bit(X86_FEATURE_IBRSB, hvm_featureset);
> >>>          __clear_bit(X86_FEATURE_IBRS, hvm_featureset);
> >>>      }
> >>> +    else
> >>> +        /*
> >>> +         * If SPEC_CTRL is available VIRT_SPEC_CTRL can also be implemented as
> >>> +         * it's a subset of the controls exposed in SPEC_CTRL (SSBD only).
> >>> +         * Expose in the max policy for compatibility migration.
> >>> +         */
> >>> +        __set_bit(X86_FEATURE_VIRT_SSBD, hvm_featureset);
> >>
> >> This means even Intel guests can use the feature then? I thought it was
> >> meanwhile deemed bad to offer such cross-vendor features?
> > 
> > No, we shouldn't expose to Intel.
> > 
> >> Additionally, is SPEC_CTRL (i.e. IBRS) availability enough? Don't you
> >> need AMD_SSBD as a prereq (which may want expressing in gen-cpuid.py)?
> > 
> > We need AMD_SSBD if we implement VIRT_SPEC_CTRL on top of SPEC_CTRL,
> > but we could also implement it on top of VIRT_SPEC_CTRL (if Xen runs
> > virtualized) or even using the legacy SSBD setting mechanisms found in
> > amd_init_ssbd, so I don't think VIRT_SSBD should explicitly depend on
> > AMD_SSBD in gen-cpuid.py.
> 
> Hmm, yes, good point. But when the prereqs cannot be expressed in
> gen-cpuid.py, I guess they need to be encoded here.

Yes, I've added a dependency on AMD_SSBD here, which was missing.

> >>> --- a/xen/arch/x86/include/asm/msr.h
> >>> +++ b/xen/arch/x86/include/asm/msr.h
> >>> @@ -291,6 +291,7 @@ struct vcpu_msrs
> >>>  {
> >>>      /*
> >>>       * 0x00000048 - MSR_SPEC_CTRL
> >>> +     * 0xc001011f - MSR_VIRT_SPEC_CTRL
> >>>       *
> >>>       * For PV guests, this holds the guest kernel value.  It is accessed on
> >>>       * every entry/exit path.
> >>> @@ -301,7 +302,10 @@ struct vcpu_msrs
> >>>       * For SVM, the guest value lives in the VMCB, and hardware saves/restores
> >>>       * the host value automatically.  However, guests run with the OR of the
> >>>       * host and guest value, which allows Xen to set protections behind the
> >>> -     * guest's back.
> >>> +     * guest's back.  Use such functionality in order to implement support for
> >>> +     * VIRT_SPEC_CTRL as a shadow value of SPEC_CTRL and thus store the value
> >>> +     * of VIRT_SPEC_CTRL in this field, taking advantage of both MSRs having
> >>> +     * compatible layouts.
> >>
> >> I guess "shadow value" means more like an alternative value, but
> >> (see above) this is about setting for now just one bit behind the
> >> guest's back.
> > 
> > Well, the guest sets the bit in VIRT_SPEC_CTRL and Xen sets it on
> > SPEC_CTRL in order for it to have effect. I can use 'alternative
> > value' if that's clearer.
> 
> Well, as I tried to express in my earlier reply, I view "shadow value"
> to mean "alternative value", so replacing wouldn't help. The question
> whether it acts like the shadow values we know elsewhere (VMX'es CR0
> and CR4, for example). If it does, using the same term is of course
> fine. But it didn't look to me as if it would, hence I'd prefer to
> avoid ambiguity. But please realize that I may have misunderstood
> things ...

No, you are OK to ask. When developing the series I went back and
forth myself deciding whether 'hijacking' the spec_ctrl field to
implement VIRT_SPEC_CTRL was OK.

If host has AMD_SSBD: VIRT_SPEC_CTRL.SSBD will use the SPEC_CTRL.SSBD
bit in the spec_ctrl field, but it will be set behind the guests back.
If guests sets VIRT_SPEC_CTRL.SSBD but not SPEC_CTRL.SSBD, reads of
SPEC_CTRL.SSBD from guest context will return 0, but the bit will be
set.

I called it 'shadow' because the underlying SPEC_CTRL.SSBD bit will
get set, but reading SPEC_CTRL.SSBD could return 0 if the bit has been
set from VIRT_SPEC_CTRL.

Do you think that's a suitable use of 'shadow'?

> >>> --- a/xen/include/public/arch-x86/cpufeatureset.h
> >>> +++ b/xen/include/public/arch-x86/cpufeatureset.h
> >>> @@ -265,7 +265,7 @@ XEN_CPUFEATURE(IBRS_SAME_MODE, 8*32+19) /*S  IBRS provides same-mode protection
> >>>  XEN_CPUFEATURE(NO_LMSL,       8*32+20) /*S  EFER.LMSLE no longer supported. */
> >>>  XEN_CPUFEATURE(AMD_PPIN,      8*32+23) /*   Protected Processor Inventory Number */
> >>>  XEN_CPUFEATURE(AMD_SSBD,      8*32+24) /*S  MSR_SPEC_CTRL.SSBD available */
> >>> -XEN_CPUFEATURE(VIRT_SSBD,     8*32+25) /*   MSR_VIRT_SPEC_CTRL.SSBD */
> >>> +XEN_CPUFEATURE(VIRT_SSBD,     8*32+25) /*!s MSR_VIRT_SPEC_CTRL.SSBD */
> >>
> >> What is the ! intended to cover here? From guest perspective the
> >> MSR acts entirely normally afaict.
> > 
> > I've used the ! to note that VIRT_SSBD might be exposed on hardware
> > whether it's not available as part of the host featureset. It did seem
> > to me that using just 's' didn't reflect this properly.
> 
> I wouldn't have assigned such meaning to !. In fact if we emulated
> a feature completely, I think it could legitimately show up here
> without !. But then again I may also not fully be aware of all of
> Andrew's intentions ...

Not sure either. I've assumed '!' to mean that such feature could
appear on guest policies even when not present on the host one, but I
might be wrong. I'm happy to use a different annotation here.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 16:51:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 16:51:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.287995.488375 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRzWw-0004rR-B1; Wed, 09 Mar 2022 16:51:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 287995.488375; Wed, 09 Mar 2022 16:51:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRzWw-0004rK-6m; Wed, 09 Mar 2022 16:51:18 +0000
Received: by outflank-mailman (input) for mailman id 287995;
 Wed, 09 Mar 2022 16:51:17 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=gSYI=TU=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRzWu-0004rE-TB
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 16:51:17 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 21a78567-9fc9-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 17:51:14 +0100 (CET)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur02lp2054.outbound.protection.outlook.com [104.47.4.54]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-41-MlRv7jlIPNaMJ9hzyEaO6Q-1; Wed, 09 Mar 2022 17:51:13 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB6PR0401MB2456.eurprd04.prod.outlook.com (2603:10a6:4:36::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Wed, 9 Mar
 2022 16:51:11 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Wed, 9 Mar 2022
 16:51:11 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 21a78567-9fc9-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646844674;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=PMwHWffzDw/GeAFdOMFYMJ9ss+Rv7j7HmiSshrB04oM=;
	b=BUWDFzo+s0W862QAiLjXxZylWpScE1hlK3fuZnu3dBlLopgBZDfsQ70Fba7e/anK/iTP0M
	QI2gGJFkUTMHn6mVDgN3h13iZNxSdfy9IcXeb3MFuAbgK7THJq+XpyM30lEkrelXHu6V6e
	opaWY5du2e8wJ7oMSDk3X+GZISMsQwY=
X-MC-Unique: MlRv7jlIPNaMJ9hzyEaO6Q-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=hrRNqlP0mYjH78qGBNIMpzaNwT/D8zMhE/7BaTGI7OFe7Zn+wJBzTAzgfbwe77wX4Mb2UJd/UJlhAbwmbvkpjrxjYGqyLKSua2bOdjT1RZeM/2qDaHc02pLtV/e1H9zCjdFeKnokJb+5mkrkm9SiJeOPtwkeUXnEEOnBIZbk4VUrsbfICTbSO5vLz7cgGv78XJPB7+oDhdNWkk/BqPM1Ui+/fHytn26vs6y7P7vwOrrXQ7a6dXqhbKsKGt1S09az/446e9g/Py1yt/1ENbLs8aKiwf5yuIUMHwzvmgTbHBGJVXfizu88pzl/JlSkLuYdEZyEZ9ncqCuynpvxH5N3kg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=OLPS/wVVCoDXLowyepZvmkwXjJYYDG864o8BNNVCJzs=;
 b=aTg1ug4fTlV2BiPsupbIxIIKfNnSJGCFNNnvxXADvrDya+7w/PpNCoy293t4D7dafDlZR4xwWVRGgcp60OEaJRyDLQIiriP6wnFAgBb2rjMRrRuZVSFK17xcF/p1jWxysG4e3oBlYskQCltYnVyyVt0DJAMz6t+PQle8DYg5wLu8LZ5p5q+BihM+WzzBNJvtp/JbnmHaITheMmd25zPEnq07WzoOfAiUkZtthja5ufMCpAu0O/xTJ1pQjvJVrM4vws7/Lt7gbjBUMvLrYHdXUkiGv/8Gq8F8feiC1UVYM+rqXKxhT6B5B09FKkRsmncezYG+yKjO+kUL3sYNqK9jEQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <e771892c-f02e-375b-fff3-a6cff89559a4@suse.com>
Date: Wed, 9 Mar 2022 17:51:09 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v5 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Content-Language: en-US
To: Jane Malalane <Jane.Malalane@citrix.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>,
 Anthony Perard <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>,
 Andrew Cooper <Andrew.Cooper3@citrix.com>,
 George Dunlap <George.Dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Christian Lindig <christian.lindig@citrix.com>, David Scott
 <dave@recoil.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Roger Pau Monne <roger.pau@citrix.com>
References: <20220307150609.10662-1-jane.malalane@citrix.com>
 <20220307150609.10662-3-jane.malalane@citrix.com>
 <YidAU63TsVO/X1Q+@Air-de-Roger>
 <b633f92a-151f-c7ca-0d91-cfad8d2edcbe@suse.com>
 <YidM/Wu5lqF48zg2@Air-de-Roger>
 <81dc2758-accc-25a3-7b3c-d9988757dd0c@citrix.com>
 <6a0f4d8f-581d-20cc-07bc-ffbf9a04cfe0@suse.com>
 <8ac6ad1f-de2d-be1b-3639-34effe85bd88@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <8ac6ad1f-de2d-be1b-3639-34effe85bd88@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: FR3P281CA0058.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:4b::19) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 634a10c2-b391-44e3-437a-08da01ed0412
X-MS-TrafficTypeDiagnostic: DB6PR0401MB2456:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<DB6PR0401MB24563B4F92236128F0798966B30A9@DB6PR0401MB2456.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	UOgZ3d5yD4f0rIUAUARDgJO0ZNaBJ4La+dw39xHb9unrZQ7GGqLWkOfEWgdgFxp6sVn8uaIpcB+w9hbcn1QMviejbXUTWMeSpsJ6n6J/BTQ0kb6D63YUU0jHjNjPcPDExIXnmsuyMuiEjUE7HthBcbOAfZolZ/F6Br6zcVnKQ5V6ZGb2099JviNM0h38MLdvL1EtL2EcgIqp0DE4iw5e8lazgTqmRhMIuABXYayBpCvEdotncGnDhP02HZyWY4iaPAH4SNEF5M/x8yXT6nj36ItqxlNT40lOrhpmxxIriK6+yIv4qXKAEYTaahHAGB//Fke8VCRU3cbSqr4gU2a1tMG4LbXygba27fft1/tCA6p1sjhc0PqggU4QdSO7lK2yodJBKjUhhQ54kArRIoRYFUBBOorHUwOS7NS5lIGjBI8+HMWUyH1u0y66BSIihkyZjXsdU7ZiRi6p5GwYjFjitDkl+jZ8fSTQS9wo9oEKxy5AUoi6oy5dJikTc4eOfGq2w6eb0LTzgeSyPInC+XF0iMhBubb8N1y+IzgNckCAzbqgVawjII8OvY4kVD3RB+p1zF06/o3ScOj5n/SCPsNQTEhFXJeN7Zy392w7Gmrh+kXTjaRfNSU7w2LCzQ2AUfSQxt5RNIYj6+LZb/XCCfTHzpmbasfUEzUSBoAYa/g0fm1tyA0d/9WfQNMN5FCDQ7bJGzOcgdGT48X/d2RCFst0UHUn9AuCBPmmwcdTFlBPJ1c/PHMxsUhM3st8GOm/XNzC
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6486002)(6506007)(53546011)(86362001)(508600001)(4326008)(66476007)(66556008)(8676002)(316002)(54906003)(6916009)(66946007)(83380400001)(2616005)(186003)(26005)(6512007)(38100700002)(36756003)(8936002)(2906002)(7416002)(5660300002)(31686004)(31696002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?eWJVW1KsbiVoFSyjF2x1iOzq+znX/JIN9i43APmarpO7zVf7QWLk+/3wX4zJ?=
 =?us-ascii?Q?OyqWOuJYUqWBDUdLXUhU6X0P2Z5/X2oek18sAe09piFVBbRl51yLSw5VCWmn?=
 =?us-ascii?Q?QFjrMsDyfWthy6MvFesVlVzFGvmdp+47o8nbuIpKCXmaFnjwoyLTc+ffQ6fU?=
 =?us-ascii?Q?WQSnah3TYL9Swv3jvS+OauzIwLhD6trBzhhsoU6TPqh9cl0PFqzn+oViH1t/?=
 =?us-ascii?Q?MnQABp/AjMgQT3kAHhOsW1+tfEJ3trFuZmtMuacfhGPJxinGFsmnb9e8wazm?=
 =?us-ascii?Q?0slplBxp7poo/jYjbx0OYAOZLxqII4j2ht37GSRl7oMtjKeNRcHfJo32aOqK?=
 =?us-ascii?Q?F/E7WQuAJJS6i5dJwF+XgbdE2/3A/PZrZFkrhMEbUM89JUDiAXeyO3Rvih2+?=
 =?us-ascii?Q?PeyCtNZBlf+7e6dqYLB31GJYdUrnNEUllPYCKVV9dufG1VqwhqtPeQrUExOs?=
 =?us-ascii?Q?I3kReZy0v+RE3M64lweuWUnBzZ3BRRO4BnYnUS+lrUtJZqyRQbSXoIG1bAJb?=
 =?us-ascii?Q?eCh29++Se8MzQnhhI59fVOtcDJUyv0eZB+74Q4YGscUHFEwGbzKazXUuoNyy?=
 =?us-ascii?Q?yPQP2jtE3TrpB2kauLVp8G2hWfGyESJ+CNzYbwW7E1Q187ZQmyW8+ziV1yt3?=
 =?us-ascii?Q?WUZlJY+bYHxh9TlWRv1Y+wk8pZGn53esZRF7RVuSPulxKiEl2oxYvZ2xDRAN?=
 =?us-ascii?Q?afH0jxosSqBTU+BwFUiPxoa/1IJJy4VG/gBf71wI9nFX+UafnAsbu4luSrg3?=
 =?us-ascii?Q?Q29lyjzutCLY25qh23a7IuYjuACkNZ5kqXFU1YFj5oL7pwBA0rpEAE8mruXm?=
 =?us-ascii?Q?nQZdqY12jlQ7p3vy9tpQY/4TsvMONZ0KOFjiW3PvCTcvePC/tw8laSaacyQQ?=
 =?us-ascii?Q?iUpm8H9qREDYpFku0CgUMmmOfaPKUOFn9bxWKWP+p+T30qF6zMki4WAtkOcz?=
 =?us-ascii?Q?0V4owFCtrFFMynIQ+zA6M5azDbx8kS45g5ajN5Mb3BAw5LgKgmBMD1CpSM66?=
 =?us-ascii?Q?YJKQkoSOu5NO6aHdq4aInYhxwnGxmhMOmulg4sPM8a86vckvDr2jxs7yFgL7?=
 =?us-ascii?Q?fTcKjOZvE4VhdJNMy+Wye9PIZ2Kie3DiRMIr6Ubv7ThUAcdJiG4V03hjweFA?=
 =?us-ascii?Q?k7j2A22GLvPWqqD4RAmYwBR/6hGHbti0XSvnxNYnldIr0SmOs+bToRinz15q?=
 =?us-ascii?Q?9vrTIhKb4eGG7sFpmCExa99K9tZKv2JKfEqE0Qng5Spqs04RMzQOJfl69Nya?=
 =?us-ascii?Q?UuoXk5HcHEhl5leksGhptaF+zvutg1HPLPgS8H2Ev4qqBCBvZ4VoOnn/BG6h?=
 =?us-ascii?Q?IVjC/5/3YJZhP4W7APLNsEQ6Sb/8YmZgSwE6/DdukZnzfzd+osWrG94EpKYG?=
 =?us-ascii?Q?okEd7Nc+LBmZrPnaZVWun/giGVnbyN/Xc3sLtuJzbbv1TtaiN9eGwQYWg8L4?=
 =?us-ascii?Q?jeaeoVf7ibQGkdphf+CmLkQGt/OhP1iDbH0V4nDUfRAzHjLRPj3t09N++yU8?=
 =?us-ascii?Q?vfpqhP2lB3S3v65ANfTqYvjnzKw+etxTQHzbw5NdZzNLiKTRaQSRlQPStN2f?=
 =?us-ascii?Q?f+OcfFD/MN1y2zMW/1dM3q/gdg13QaLeCs9SGXAiuPhgkNo64TRBoTic9ulY?=
 =?us-ascii?Q?OscC40P7NnrC09+INrZt2hs=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 634a10c2-b391-44e3-437a-08da01ed0412
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 16:51:11.5560
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 2V24Dk3HiMi53e8DGb8coz8SdLaz865MD5mtdWVhW+t61KNBAZAoASFj3jLGDbrY4zS3nycK4yhHr6LRsbi2+Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0401MB2456

On 09.03.2022 16:56, Jane Malalane wrote:
> On 08/03/2022 14:41, Jan Beulich wrote:
>> [CAUTION - EXTERNAL EMAIL] DO NOT reply, click links, or open attachment=
s unless you have verified the sender and know the content is safe.
>>
>> On 08.03.2022 15:31, Jane Malalane wrote:
>>> On 08/03/2022 12:33, Roger Pau Monn=C3=A9 wrote:
>>>> On Tue, Mar 08, 2022 at 01:24:23PM +0100, Jan Beulich wrote:
>>>>> On 08.03.2022 12:38, Roger Pau Monn=C3=A9 wrote:
>>>>>> On Mon, Mar 07, 2022 at 03:06:09PM +0000, Jane Malalane wrote:
>>>>>>> @@ -685,13 +687,31 @@ int arch_sanitise_domain_config(struct xen_do=
mctl_createdomain *config)
>>>>>>>            }
>>>>>>>        }
>>>>>>>   =20
>>>>>>> -    if ( config->arch.misc_flags & ~XEN_X86_MSR_RELAXED )
>>>>>>> +    if ( config->arch.misc_flags & ~(XEN_X86_MSR_RELAXED |
>>>>>>> +                                     XEN_X86_ASSISTED_XAPIC |
>>>>>>> +                                     XEN_X86_ASSISTED_X2APIC) )
>>>>>>>        {
>>>>>>>            dprintk(XENLOG_INFO, "Invalid arch misc flags %#x\n",
>>>>>>>                    config->arch.misc_flags);
>>>>>>>            return -EINVAL;
>>>>>>>        }
>>>>>>>   =20
>>>>>>> +    if ( (assisted_xapic || assisted_x2apic) && !hvm )
>>>>>>> +    {
>>>>>>> +        dprintk(XENLOG_INFO,
>>>>>>> +                "Interrupt Controller Virtualization not supported=
 for PV\n");
>>>>>>> +        return -EINVAL;
>>>>>>> +    }
>>>>>>> +
>>>>>>> +    if ( (assisted_xapic && !assisted_xapic_available) ||
>>>>>>> +         (assisted_x2apic && !assisted_x2apic_available) )
>>>>>>> +    {
>>>>>>> +        dprintk(XENLOG_INFO,
>>>>>>> +                "Hardware assisted x%sAPIC requested but not avail=
able\n",
>>>>>>> +                assisted_xapic && !assisted_xapic_available ? "" :=
 "2");
>>>>>>> +        return -EINVAL;
>>>>>>
>>>>>> I think for those two you could return -ENODEV if others agree.
>>>>>
>>>>> If by "two" you mean the xAPIC and x2APIC aspects here (and not e.g. =
this
>>>>> and the earlier if()), then I agree. I'm always in favor of using dis=
tinct
>>>>> error codes when possible and at least halfway sensible.
>>>>
>>>> I would be fine by using it for the !hvm if also. IMO it makes sense
>>>> as PV doesn't have an APIC 'device' at all, so ENODEV would seem
>>>> fitting. EINVAL is also fine as the caller shouldn't even attempt that
>>>> in the first place.
>>>>
>>>> So let's use it for the last if only.
>>> Wouldn't it make more sense to use -ENODEV particularly for the first? =
I
>>> agree that -ENODEV should be reported in the first case because it
>>> doesn't make sense to request acceleration of something that doesn't
>>> exist and I should have put that. But having a look at the hap code
>>> (since it resembles the second case), it returns -EINVAL when it is not
>>> available, unless you deem this to be different or, in retrospective,
>>> that the hap code should too have been coded to return -ENODEV.
>>>
>>> if ( hap && !hvm_hap_supported() )
>>>       {
>>>           dprintk(XENLOG_INFO, "HAP requested but not available\n");
>>>           return -EINVAL;
>>>       }
>>
>> This is just one of the examples where using -ENODEV as you suggest
>> would introduce an inconsistency. We use -EINVAL also for other
>> purely guest-type dependent checks.
>>
>> Jan
> Hi Jan, so here I was comparing the hap implementation with the second=20
> case, i.e.
>=20
> if ( (assisted_xapic && !assisted_xapic_available) ||
>       (assisted_x2apic && !assisted_x2apic_available) )
>=20
> and you seem to agree that using -ENODEV would be inconsistent? Have I=20
> misinterpreted this?

Not exactly. I'm comparing existing hap / hvm / !hap / !hvm uses with
what you add.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 17:01:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 17:01:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288002.488386 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRzgZ-0006QR-Bn; Wed, 09 Mar 2022 17:01:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288002.488386; Wed, 09 Mar 2022 17:01:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRzgZ-0006QK-8d; Wed, 09 Mar 2022 17:01:15 +0000
Received: by outflank-mailman (input) for mailman id 288002;
 Wed, 09 Mar 2022 17:01:13 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nRzgX-0006QE-BC
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 17:01:13 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRzgW-0000t1-Rq; Wed, 09 Mar 2022 17:01:12 +0000
Received: from 54-240-197-225.amazon.com ([54.240.197.225]
 helo=[10.95.155.231]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nRzgW-0007Ub-LH; Wed, 09 Mar 2022 17:01:12 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=noIoU5ZIRB0VLt2ZnmhXzB6H6I67yxMBK7DL/IkQdoc=; b=6ejO2nDNG+2ZIM85ugiYNllczP
	EznZr85yfkjjyjwAWBSLF6IiechCSjiNJHVGTfZ0ex6cBZXUJI6epxl2sqSo0ollj7oh/UHZt40zS
	iOdPO7MaSdJ2e36uZruPU6LbxpropvKRYUTrG9giOxOYsKgLMbHrRD0MS4MO1OvrS3fo=;
Message-ID: <a53b060a-fbf7-d1f2-d36c-5824668ae18d@xen.org>
Date: Wed, 9 Mar 2022 17:01:09 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH v3 0/2] livepatch: enable -f{function,data}-sections
 compiler option
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
Cc: xen-devel@lists.xenproject.org,
 Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Jan Beulich <jbeulich@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>,
 Wei Liu <wl@xen.org>, George Dunlap <george.dunlap@citrix.com>
References: <20220308134924.83616-1-roger.pau@citrix.com>
 <3dcefa20-829a-ca13-941b-ede25ef81813@xen.org>
 <YiiddqMEBtpI0W65@Air-de-Roger>
From: Julien Grall <julien@xen.org>
In-Reply-To: <YiiddqMEBtpI0W65@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi Roger,

On 09/03/2022 12:28, Roger Pau Monné wrote:
> On Tue, Mar 08, 2022 at 02:52:55PM +0000, Julien Grall wrote:
>> Hi,
>>
>> On 08/03/2022 13:49, Roger Pau Monne wrote:
>>> Hello,
>>>
>>> The content in v3 has been split in two patches, but is still mostly the
>>> same. The main difference is that first patch does a bit of cleanup of
>>> the build logic now that the header object file doesn't need to be the
>>> first one passed to the linker script.
>>>
>>> Thanks, Roger.
>>>
>>> Roger Pau Monne (2):
>>>     xen/build: put image header into a separate section
>>>     livepatch: set -f{function,data}-sections compiler option
>>
>> For the Arm bits:
>>
>> Acked-by: Julien Grall <jgrall@amazon.com> # xen/arm
> 
> Thanks!
> 
> I don't think Acks require a scope tag, as you can only Ack changes to
> the code you are a maintainer for?

It is not required (same for reviewed-by). But it can be used to specify 
exactly which part you ack.

In this case, I am a maintainer for both common and Arm. I chose to ack 
Arm and leave someone else to confirm the change in common is fine.

Furthermore, with my committer hat on, I find handy to know which person 
acked what. This makes easier to check that the code is suitably acked.

Cheers,

[1] 
https://xenbits.xen.org/gitweb/?p=xen.git;a=blob;f=docs/process/sending-patches.pandoc;h=7ff7826c992b68804b41cc4a8605329f7a10e44c;hb=refs/heads/staging#l241

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 17:02:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 17:02:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288006.488396 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRzhr-0006yc-Lz; Wed, 09 Mar 2022 17:02:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288006.488396; Wed, 09 Mar 2022 17:02:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRzhr-0006yV-Ix; Wed, 09 Mar 2022 17:02:35 +0000
Received: by outflank-mailman (input) for mailman id 288006;
 Wed, 09 Mar 2022 17:02:34 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=mvXa=TU=citrix.com=prvs=060bf0544=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nRzhq-0006yL-MF
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 17:02:34 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b4a90f5d-9fca-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 18:02:32 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b4a90f5d-9fca-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646845352;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=k6ztCehjza+bcXw/T2UboJZpoS3IioKINFvKfcxm1RE=;
  b=AXq4m7mXye7SiZGWFeWwi5OQeA3D/kP97ZmCSp3M6DSLCkM4FFWgK1Rq
   /kl9eWqdvcGPpiFVuuGU9xpZW9tFKHxAiMspXOxIjJ1dmoroJyiXarc1T
   pfC2CavtEFexEAfvAdd8pOmbML70TqoMYeNYZ+EFFUJJFO06yJ/sLXiyt
   Y=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 68194560
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:bsseNKnJeIAJO2wKAEZhw/To5gx5JkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xIXCjqFM/mPYzahe9wkOoW+900CusOGydc3TQU9qSlnRiMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiW1LV4
 7senuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYEFwLboOTxbgnVgBDHhwuMoh8+7TqPi3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3mHhmwHf8BPIvRZnFTo3B5MNC3Sd2jcdLdRrbT
 5RJMGszMUqYC/FJEnELObY6huPvv1alamFF+E+EiOkbs1GGmWSd15CyaYGIK7RmX/59hV2Er
 2jL+2D4BBAyN9GFzzeBtHW2iYfnnz7/WY8UPK218LhtmlL77lIUDBoaRF6qu86Tg0S1W89cA
 0EM8y9opq83nGSnR8fwdwe1q3mFulgbQdU4O/037kSBx7TZ5y6dB3MYVXhRZdo+rsg0SDc2k
 FiTkLvBBzZirbmUQnK17aqPoHW5Pi19BW0NfygfViMe/sLu5oo0i3rnUdJLAKOzyNrvFlnNL
 yui9XZkwe9J1IhSivv9rQuvby+QSobhF1UXtiuIAz6f6xpiabP1aKmS6lP28qMVRGqGdWWps
 H8BksmYyekBC5CRiSCAKNkw8KGVC+Wta2OF3wM2d3U133H0oiP4I9gMiN1rDBoxaq45lSnVj
 Fg/UO+7zLtaJzOUYKB+eOpd4Ox6nPG7RbwJuh05B+eig6SdlifapEmChmbKhggBdXTAd4llZ
 /93lu72UR4n5VxPlmbeegvk+eZDKtoC7W3SX4vn6B+szKCTYnWYIZ9cbgfQMb5ltvPY/FmLm
 zq6Cyds408POAEZSnOLmbP/0HhQdSRrbXwIg5c/mhG/zvpORzh6Vq65LUIJcI15haVF/tokD
 VnmMnK0PGHX3CWdQS3TMygLQOq2Af5X8CJqVQRxbA3A8yVyPu6SAFI3KsJfkU8Pr7c4k5aZj
 pAtJq29Pxi4Ym+eqmpHMsWl8tAKmdbCrVvmAhdJqQMXJvZIbwfI5sXlbk3o8iwPBTCwrswwv
 /ur0QazfHbJb18K4Br+AB53826MgA==
IronPort-HdrOrdr: A9a23:HtE8DKpbNclVwub82YbpDwwaV5uCL9V00zEX/kB9WHVpm5Oj+f
 xGzc516farslossSkb6Ky90KnpewK5yXbsibNhcotKLzOWx1dAS7sSo7cKogeQVxEWk9Q96U
 4OSdkHNDSdNykZsS++2njELz9C+qjHzEnLv5ak854Fd2gDAMsMj3YbNu/YKDwNeOAvP+tjKH
 P23Lshm9PUQwVvUi3NPAhiYwGsnayvqLvWJTo9QzI34giHij2lrJTgFQKD4xsYWzRThZ8/7G
 nsiWXCl+WemsD+7iWZ+37Y7pxQltek4MBEHtawhs8cLSipohq0Zb5mR6aJsFkO0aKSARcR4Z
 vxSiUbToBOAkDqDyaISNzWqk/dOQMVmjrfIJmj8CLeSILCNWoH4oF69Pxkm1PimjsdVZdHof
 h2NiuixupqJAKFkyLn69fSURZ20kKyvHo5iOYWy2dSSI0EddZq3MciFW5uYd499RjBmcga+S
 hVfbXhzecTdUnfY2HSv2FpztDpVnMvHg2eSkxHvsCOyTBZkH1w0kNdnaUk7zo93YN4T4MB6/
 XPM6xumr0LRsgKbbhlDONERcesEGTCTR/FLWrXK1X6E6MMPW7LtvfMkf8IzfDvfIZNwIo5mZ
 zHXl8dvWkue1j2AcnLx5FP+gClehTKYd0s8LAo23FUgMyPeFOwC1zxdLkHqbrUn8ki
X-IronPort-AV: E=Sophos;i="5.90,167,1643691600"; 
   d="scan'208";a="68194560"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=NbyAfnltEMh0Qg/HZyZaGgmvbgEChxFZFhPwAs6aUKT3a+05gMvrTTyNsfT1pPdW4BWXxgdd41dFkIjc/tN1qdyK/GRFx2eftrgu/sAfFVuZ3XpyNFadJD1W1mGdI3P5UuOVjmDHfmuN9kVN/sAiNTxhaQq0+AXwsXc1zyNax7c9GrgA9Y6ZJvK3YxoeORfIrQnGVJW/6iKztbpT2S2Ay0Cz0oPG50ZMX1eJR11g3YzTrRLtsOYpoivNW4G4lR33QIkT10YT3usFJvpk91QVXWL+ws1MPTaKX2mZyTDTp+9098Vn5otcdWITedhamGD+YO4l+OEEotas04CZmE9DNA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=k6ztCehjza+bcXw/T2UboJZpoS3IioKINFvKfcxm1RE=;
 b=PeS7ZlN7XGI74Rzjh4diF/q1iyxpJZCViGRjeR3p44tu9kIGX1XCHD4h78g+ayvuJQbnWmPKLRIjxDWhN3/mMkkwfSpOBDCOHB7I5hIWpFwgMLP97CK4XTJnElHNLC0n8DFrVPn3dTCVAFUpq5mOQmCIj8PA1oIs5nZ+pRRQhiklGOvCtmodKzIVXZ/bJTgCfxUXLRO4gqDuBoPm+m1QKpCellEnknTFVYqbhVFf6lpBLGQOi7Mt0j5HNHsVmPnQ6Sn27Q5p1WlT+0SfWpMN3aeRluvGnlXpCXPuRelqkuaoexiSAE6QdhBJ6MkWcLmiv6IXUSwFvgzN+dn/PIjfUA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=k6ztCehjza+bcXw/T2UboJZpoS3IioKINFvKfcxm1RE=;
 b=VleQsyjgruMtoUZ3bDaYz9mrV+nupaxlDe8A9Pyfxfe/glawtv+9ZUnBQ49WQEhBBtZG/nZIBHMv8a2zzVK4SXUtanBzfD1vrNvCkBRJwHDf5W6uMrlSYyFuDAnMC8T7R4mIV4hhIvIm+Mnbz3PgWG+X7s4x3gETBBznQIlea1I=
From: Jane Malalane <Jane.Malalane@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, "Anthony
 Perard" <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, "Andrew
 Cooper" <Andrew.Cooper3@citrix.com>, George Dunlap
	<George.Dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Christian Lindig <christian.lindig@citrix.com>,
	David Scott <dave@recoil.org>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>, Roger Pau Monne <roger.pau@citrix.com>
Subject: Re: [PATCH v5 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Thread-Topic: [PATCH v5 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Thread-Index: AQHYMjUEaMoAwzVpzE69n4F8Ciyydqy1XcmAgAAMr4CAAAJqgIAAIRgAgAAC1QCAAadGgIAAD0GAgAADBgA=
Date: Wed, 9 Mar 2022 17:02:07 +0000
Message-ID: <946e8a6d-2383-89ba-1f87-a48833aaf3df@citrix.com>
References: <20220307150609.10662-1-jane.malalane@citrix.com>
 <20220307150609.10662-3-jane.malalane@citrix.com>
 <YidAU63TsVO/X1Q+@Air-de-Roger>
 <b633f92a-151f-c7ca-0d91-cfad8d2edcbe@suse.com>
 <YidM/Wu5lqF48zg2@Air-de-Roger>
 <81dc2758-accc-25a3-7b3c-d9988757dd0c@citrix.com>
 <6a0f4d8f-581d-20cc-07bc-ffbf9a04cfe0@suse.com>
 <8ac6ad1f-de2d-be1b-3639-34effe85bd88@citrix.com>
 <e771892c-f02e-375b-fff3-a6cff89559a4@suse.com>
In-Reply-To: <e771892c-f02e-375b-fff3-a6cff89559a4@suse.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: db18a5a2-2cd1-46a9-bba0-08da01ee8afb
x-ms-traffictypediagnostic: CY4PR03MB3237:EE_
x-microsoft-antispam-prvs: <CY4PR03MB323718A38AC5204C81EA11ED810A9@CY4PR03MB3237.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM5PR03MB3386.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(66446008)(53546011)(64756008)(8676002)(76116006)(2906002)(86362001)(107886003)(91956017)(66556008)(82960400001)(38100700002)(66946007)(66476007)(4326008)(54906003)(122000001)(71200400001)(6916009)(8936002)(38070700005)(5660300002)(6486002)(508600001)(316002)(31696002)(6506007)(186003)(26005)(36756003)(31686004)(83380400001)(6512007)(2616005)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?Qjc2S3FZYkw2VUVJVGtnWmtLR1cvQm51MFFZOGFHbkxSOFhpQnhYZmVBeW5a?=
 =?utf-8?B?VEtla1ZsSzFjS2E4a0RjZENSZzlEUW1iczB1UmMrNjFyQ0Z3c2VpRnZyN2xi?=
 =?utf-8?B?d3pIUTZaTTc1eVRtVTh6UnBMNk1TdWtmUFpldlpMU0NhZTlmL1JQN005U0R6?=
 =?utf-8?B?Nm9RVlZOSUc0ckdrelRGQ2JBRDgzRGd3MHB2VlZFZE1PVzhGYmJRK1NEcUIy?=
 =?utf-8?B?bVpkQVZ2YlVXMTQ3aDI3UlF0VHRBRkprWnFrbnFqajFrM0JrbERWYTdMdURa?=
 =?utf-8?B?SENCYURBdG1wRC9CQjB5N2J2L2swZ2c5d3BnczNtL1NHWTI3U2trdFdqOUNL?=
 =?utf-8?B?NEJFUTdYWXlJU1RKM0lLS05ZWkdlUExmN3NFczhtQmN6V2MyNlVlSk5YSzQx?=
 =?utf-8?B?Nk1kdHRUSlluV0ZYSmMvK0xJemEwUkJqZkNwUVRSZnZMK2lNRXlSUTFWTzd6?=
 =?utf-8?B?M01PYmxFeXMwSHFCakNINXpOT0xPbW9zbzQ1VVlmd3pQS1BMV09sUGQrR3VW?=
 =?utf-8?B?N1hTZWpCdERPRGxCMmxTWmFLMDVjMlErenRaT2t3d05oSWpURmxWd0NpUUMv?=
 =?utf-8?B?SEVJNXVHd1JwNVFmSkNsY09FaHBHVHh2MVRZSnlTSjJPN2ZMWlJ0T213dW1H?=
 =?utf-8?B?M0c0elR1SUJITElBSFNhOS9xb2tsTy9vSnZiS09sZmhOcmxSZG1hcTZVblBS?=
 =?utf-8?B?VWZYTUdYa2FPanlueHFmWXRZb2UzcEFUeDVUNkZrT1FrMXNmSGJlQTEvOFZB?=
 =?utf-8?B?T0JKUzAyaitSUWo1MkVHa3RaTE9uMXFuYlgxVTRpekFaTFNtRzY2ZThaR0V5?=
 =?utf-8?B?WkVtb3F2L3hqSUF3YkZFRXo4a3hoL1UrQzEwTGoyS2xObndNZEFpNmh0ZVdD?=
 =?utf-8?B?YkNjYTM0b212c00zWFRCYkhWVTAvSzhpb2xQajVQd2NjNkhEcEZjNHZNV25w?=
 =?utf-8?B?NVo5Snd2Sm9WTnk5MnFuRmtjYjVqMkF5UldMdnA5ZHNseVJGNUpRcS9ITjlk?=
 =?utf-8?B?WXlGTnpKZU1kVis5aEkwdlpIM0xFUUF4b3A2dWQwQzdCclVpdEFDL2JaTDI5?=
 =?utf-8?B?L2FHR3B2L3BaN3F6L2xpbnl2cVlVN0FyS2hITVpTajlxUGp2K3FjQThHQWVs?=
 =?utf-8?B?enZBeHpJTHB0Q1JLSlFidnNFL3I2alFYa2tQdy93R2Z5K2diQkIybVFxZ0FX?=
 =?utf-8?B?WVI4cEZRUVJTSEFreWFOVU1TT2RqSlJIYWVYMVNwWmRGOXVsTktxK3VSdUJ6?=
 =?utf-8?B?Z1dWdW5jS3V2UW9tUW1CSVUvbitmRkN6ZVBiOVhiTzFMcW9menp5ZGg0Q0M2?=
 =?utf-8?B?S0FubFNPMGVSS1VJWVZVRzAvMWxuTmlLUTBhNGpOUERVNys2NktnOHNIWlJk?=
 =?utf-8?B?WW5RZlpXbUR2eTVPLzhzZ2JqRmtDVUVKM2VlQVVJdm41ZDkrdldOWjc2a21M?=
 =?utf-8?B?V2ZNVFhIVDZ4a0ZySUE5UHN4bXh0dXBzME5RVC9JODVGRElBNkU0akNFa3Rs?=
 =?utf-8?B?OGY2YzlyWGEzQnlDUnhEZnF2NXRMZEVUMzNFYk1GY0JDQkRqTUN2MTlyZFU4?=
 =?utf-8?B?czNNWVRsZG1BRlJ1WXRtNUR4L0JkbDBQdXlzQW1qRkFlUEhwejJCTWxoSnZ0?=
 =?utf-8?B?RkpPb3N1Z3V6bmNKazFMRnJKL1BRWlNhY0hqSU9WSWdab3o3YS9iMDg5TTRi?=
 =?utf-8?B?Z2NXUjM0RWNMSDludHRmemc5VlNFeU91cmdDWTdRUEY2N1pZNmJqd0hnTzgz?=
 =?utf-8?B?VEZ3UDA3QUova0JYeE5BT1RxY0kzdGM1WXJTUWVTMWNVaitqb1l1T3BYandP?=
 =?utf-8?B?bmVlOEd5OExmeGFmR2JtUXRQQjhubE42WUtydU5DaGUwTmNtbEwvbmVKa3ZT?=
 =?utf-8?B?WDlQVkN2dmhaamxuSjhmbFhYNlRQb3ZmandORExkVXB6WE40VGQwTktaWnNS?=
 =?utf-8?B?SXJ5OFA2a2pjY0VOeGVCdG8vdmFsV1JYL1RPNy83cmkzek1aTi9RS3pTNllw?=
 =?utf-8?B?Y1pZSXpyMzN0WHpUUmtPT210VUJkWGhzSE81eVRYZmJuYVl1bGI1TzZEaStT?=
 =?utf-8?B?MU1CZXhyOFNQbVpvVnlSNjFSWlhvVDdpTUxETE9SWlRDek1CUlVBb0tQc1V3?=
 =?utf-8?B?T2xpQWE4UHIxalpjSlBPZXowOHVSLzg1b0I3VWVOZldWWnovMzBFT0I0Yk9O?=
 =?utf-8?B?VWV4elgxc002anYyQmszdDNBUk5nY3g1SEI4QUV6bnJseFEyeU1YMFhDcDNw?=
 =?utf-8?Q?bGe7PdauUK5Ny993yu78Xix+aJb+DJ6sMxhj3R9qso=3D?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <B313B663E290574C8EA318CC8E16C8C9@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM5PR03MB3386.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: db18a5a2-2cd1-46a9-bba0-08da01ee8afb
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Mar 2022 17:02:07.0537
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: UxOazPpHWosaYc/GxAsk2bL9dUfHZJynGDLS6QtSDuikK/T161nMQwsZl0+MweqKaTtMcBy6ykPdSAUhHGfusbiKcUp4SW5jOMqn4wCJRI8=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR03MB3237
X-OriginatorOrg: citrix.com
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=


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 17:04:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 17:04:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288011.488408 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRzjY-0007Zr-1r; Wed, 09 Mar 2022 17:04:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288011.488408; Wed, 09 Mar 2022 17:04:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRzjX-0007Zk-Uy; Wed, 09 Mar 2022 17:04:19 +0000
Received: by outflank-mailman (input) for mailman id 288011;
 Wed, 09 Mar 2022 17:04:19 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=gSYI=TU=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nRzjX-0007Yv-9Y
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 17:04:19 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f480ad4a-9fca-11ec-8eba-a37418f5ba1a;
 Wed, 09 Mar 2022 18:04:17 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2177.outbound.protection.outlook.com [104.47.17.177]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-41-xBkeaHlxMjSpi36_3I-hhg-1; Wed, 09 Mar 2022 18:04:16 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PA4PR04MB7758.eurprd04.prod.outlook.com (2603:10a6:102:c4::17)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Wed, 9 Mar
 2022 17:04:15 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::d479:b728:345c:bd65%6]) with mapi id 15.20.5038.027; Wed, 9 Mar 2022
 17:04:15 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f480ad4a-9fca-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646845457;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=kYEftJiIGj6yfDAAPjoszK5aTkRZa/QpMF4edRziIB8=;
	b=kAZGNE48t9JVQ9T6P7woJaztlwOMl16PidfN9mcyTLFM0i3zkb1MHjU4Sr46r12kRH+361
	KW6FWDcjEOrOv9Bk3SebLMitMoNr4iz8N/Qq7jyA7mV8TkjiamUHiEfOCbfAZGx+wFusVy
	i9ueV++Tk7j0ouX7nUqoktFjTW3Oaqc=
X-MC-Unique: xBkeaHlxMjSpi36_3I-hhg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ADNptanbCyeEuuJdq5tXYbZGwgEbcPgaigxyluGf5RtvFkBzaD8BOfkF9hor0NH/NMY3ALwKvdkV+YYfHcx+1i+Hh1vhJiLvMk6Hya05n2JO0QQpH+fnOrzuhGmleYoNsoBT3yhVnlrKx2KnTCxai0yAj1JmF3qsyJ7nRcZiHJFCnqygfQ/Vvn7LNRgFO3HaA8vMbT1HdYZGLEX/mKD1b/MHbfBxNyCKsOhqmngmIQIV5edf3r8wlz/9K4wW24qk4P4SH45fczzw8t94ewvjWaS2j12PDw3hbThEmC2XUgA672X+p0+pTva4Lnf2TRBxNDM1jb30WF/Mt7dZTRTO2A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=AKdSvgH0ZDjtJ82QEizepRe+KX43zcsKwVMkl7A8GSM=;
 b=dBeHRf5+aSs8MYLRoxZ3A7ig1XSiIS6lRYhRZKbqfh7vsFjoMVCxnEjcE1EbVoM1gf5RlkNLrUgWebxYxivUJJYOFjSZLb0NE7mvnEKoNFJTfzjTO+yvDVfFBBFlh8sRLgWcYbCkdJVcAfRST1g9V86nCvcMYAEFBUkY7/S+x8acEbspeQbLVGPbR8ytWtv4RxaxVONujb1wqzvfVlFJC5N6nhmtNtyqWVhuVcaTcs3J5DwfZSqUUXtb3FY90yoLmnosU62ef5KdGqY0NmSPKrxXP/S5SlpOAupTEThgvx1mY8geVdQPPtsdNBHyJRXZi4LOFN3h8O8kJBeZXJzoyA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <a1ed8c2e-2ddb-3df8-daad-39676c1ade07@suse.com>
Date: Wed, 9 Mar 2022 18:04:12 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH 1/3] amd/msr: implement VIRT_SPEC_CTRL for HVM guests on
 top of SPEC_CTRL
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220201164651.6369-1-roger.pau@citrix.com>
 <20220201164651.6369-2-roger.pau@citrix.com>
 <8e7f3193-dee6-1ff4-0c68-081032e240d2@suse.com>
 <YijBpyOlmTA7tIUl@Air-de-Roger>
 <6d0d901c-fc7c-2655-6285-df07101b852d@suse.com>
 <YijWUj3H+8UHEikf@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YijWUj3H+8UHEikf@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR06CA0238.eurprd06.prod.outlook.com
 (2603:10a6:20b:45e::8) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 32f08a06-9f7c-431c-325f-08da01eed710
X-MS-TrafficTypeDiagnostic: PA4PR04MB7758:EE_
X-Microsoft-Antispam-PRVS:
	<PA4PR04MB7758D22A07952EA1169781E0B30A9@PA4PR04MB7758.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(26005)(186003)(6506007)(6512007)(53546011)(6916009)(2616005)(6486002)(508600001)(31696002)(83380400001)(36756003)(86362001)(6666004)(31686004)(66556008)(66476007)(66946007)(4326008)(8676002)(5660300002)(2906002)(8936002)(38100700002)(54906003)(316002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?gHRwfUYvSyjGZgTwVsxIg5VmwGICK0mW/sZGqGQXFRLmXk8bZnxWfbzxtfBD?=
 =?us-ascii?Q?OMCRlE8hZxkOyulhWyHkiARlfJNGUZtzVbaaCS9gYia1j6ezL5uit6RanReU?=
 =?us-ascii?Q?7xZTbuI9Y+ypRDFyUlukiPqmPVAlOrl8xD5+e7EbqWHNTlTy0dY5Fo4F8Lff?=
 =?us-ascii?Q?FAPUcPYJFx2L/qwa+8LJbIpkzsE3zP+Vv45O/o8hC9+MuRZVRN0t1dya4x9M?=
 =?us-ascii?Q?sFoeMC3Mvz2xOlz5TP0sey7u0kKUML2xGGs4gskCVT9eZd34DsPAxwo6+7WC?=
 =?us-ascii?Q?kGEi7L9mkqw7wm5eX84n13+XKJxezjHk2IIS8c/vxFSW4v0N5YcM940mXMWF?=
 =?us-ascii?Q?zL0C22cfPJYWz5YnzD86selZdrbkFvb0+7yOdVWTMQey9P2e7XJr/9NiKE8O?=
 =?us-ascii?Q?ocetyZl5DdSYc4bR+MpWCifGKz44CwJhstDTBcx/bbxA8lQjypmOJjOa1/ob?=
 =?us-ascii?Q?+tmhsGg528c0zRUTnxQpy0Nl/qiSTQjN1sks9mOSa8qt1P4oYAwIaANsD1fy?=
 =?us-ascii?Q?gY0Zg3XUzvhy8lMoq2SnQYDrGTLHHUph3ffhW5qtLNp3Bgu0b2G/0rcOxKCK?=
 =?us-ascii?Q?TwLgintJPEWv6dzRCSBUThEua436IZEuv5qnChxIG/xRy4AmdBPaPGVLwL1O?=
 =?us-ascii?Q?PDWB4wuRv+6nd795BZjhza7QDuIB4WnLCQ6Zl8RYqv2DyKohMUJmj0x4xe7T?=
 =?us-ascii?Q?o3QJhUAJkkZpkQKQ8/0eOc05QtFbc7Ax8BWyWeTQcUlmDx81dKuCq8J2v+xh?=
 =?us-ascii?Q?MTUPUuaeVfrWLLPAD7sYikYFdaMSYIBgRA1UPceUkmo4aAXdEm6eIHm3TkvU?=
 =?us-ascii?Q?Rj5suEH8iwD1v7iHQANxdofn3iH8821CHBVJ8MFXw/inD06rerBRVsRJzuyG?=
 =?us-ascii?Q?d2QWNlnvuapoQIPJAx0/Nt+X9Yz9ZSWBGPln3jdjzjw/8m1gyXmSNnGENC1b?=
 =?us-ascii?Q?SpFDi6uNja/utT76BNqvGf8R30BUOoonCoJPbKWIQlf9uAzljvZBWSS4rWJe?=
 =?us-ascii?Q?59JogB4bLKlVWVh9VP9uB5+1r/PQJiGElBaWiaHN34IpwFZ885oDLFlJty/q?=
 =?us-ascii?Q?AUhumBn3cCAdNkTPaXlDEOUsVYmS6Roi2ke9oy+jPdisvSqVVNNQhgJF4S4n?=
 =?us-ascii?Q?AgYVq+iFEowVtT1mIZ7oI1m0edR4cl5GAgq0kiqHSO9alN2fb3X2bzxX5UNM?=
 =?us-ascii?Q?6qufGj5xqxlaV/i6Yf3s6l5ViUZJzc8TE5q3HNIKVfnRjnwbHDtd0SKmgrG6?=
 =?us-ascii?Q?7eqPEd/0iOq5YihUBOvG4xXuBZF2GhbPKNpfj/g/VL3GQ3HTZD59m74H2MqJ?=
 =?us-ascii?Q?ZZw/um25f7rsIR7Xly4JogB26gPeMnixd7T6JlvIYCi89cvTqHugy+zSG2uC?=
 =?us-ascii?Q?tm7VsgIv5gVq+G05VWIME178dK2ZNQOxVxxNHhJKJne37duzrxCvkdQZtsbS?=
 =?us-ascii?Q?F57N9c9818zeswqzs8CQm8xmlSzsg2FU4Sf4UiDY0PscxYemIycRcPWtwA7F?=
 =?us-ascii?Q?DtYTAFFfpmenDl9ylkhPERo/9dsQq2E9Rna7jhAWyq7C/InqibFCBBvK866E?=
 =?us-ascii?Q?oOtfO+XGWelN8l6e0x7fpDvVomG5kUvk3ieB6gw9VWzG4ITAI129RvEHGlCS?=
 =?us-ascii?Q?U7SbxPftVDXOGHStUperCoI=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 32f08a06-9f7c-431c-325f-08da01eed710
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 17:04:14.9759
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: zqfIN4Ql4hr+yq4NeAbqlO2q9xSMl12aJQq4or8R8qwcYkP/uR6PbP9sXRb4sFCy7/rL7KpJ2kI/WC7BS8Yz0g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR04MB7758

On 09.03.2022 17:31, Roger Pau Monn=C3=A9 wrote:
> On Wed, Mar 09, 2022 at 04:40:24PM +0100, Jan Beulich wrote:
>> On 09.03.2022 16:03, Roger Pau Monn=C3=A9 wrote:
>>> On Mon, Feb 14, 2022 at 04:07:09PM +0100, Jan Beulich wrote:
>>>> On 01.02.2022 17:46, Roger Pau Monne wrote:
>>>>> --- a/docs/misc/xen-command-line.pandoc
>>>>> +++ b/docs/misc/xen-command-line.pandoc
>>>>> @@ -2273,8 +2273,9 @@ to use.
>>>>>  * `pv=3D` and `hvm=3D` offer control over all suboptions for PV and =
HVM guests
>>>>>    respectively.
>>>>>  * `msr-sc=3D` offers control over Xen's support for manipulating `MS=
R_SPEC_CTRL`
>>>>> -  on entry and exit.  These blocks are necessary to virtualise suppo=
rt for
>>>>> -  guests and if disabled, guests will be unable to use IBRS/STIBP/SS=
BD/etc.
>>>>> +  and/or `MSR_VIRT_SPEC_CTRL` on entry and exit.  These blocks are n=
ecessary to
>>>>
>>>> Why would Xen be manipulating an MSR it only brings into existence for=
 its
>>>> guests?
>>>
>>> Well, that's not exactly true. Xen does use VIRT_SPEC_CTRL (see
>>> amd_init_ssbd).
>>>
>>> I'm unsure how to express support for VIRT_SPEC_CTRL, as it does rely
>>> on SPEC_CTRL when available.
>>
>> I wonder whether the command line doc needs to go into this level of
>> detail.
>=20
> Right, so you would be fine with leaving the command line option
> description alone.

Yes.

>>>>> --- a/xen/arch/x86/include/asm/msr.h
>>>>> +++ b/xen/arch/x86/include/asm/msr.h
>>>>> @@ -291,6 +291,7 @@ struct vcpu_msrs
>>>>>  {
>>>>>      /*
>>>>>       * 0x00000048 - MSR_SPEC_CTRL
>>>>> +     * 0xc001011f - MSR_VIRT_SPEC_CTRL
>>>>>       *
>>>>>       * For PV guests, this holds the guest kernel value.  It is acce=
ssed on
>>>>>       * every entry/exit path.
>>>>> @@ -301,7 +302,10 @@ struct vcpu_msrs
>>>>>       * For SVM, the guest value lives in the VMCB, and hardware save=
s/restores
>>>>>       * the host value automatically.  However, guests run with the O=
R of the
>>>>>       * host and guest value, which allows Xen to set protections beh=
ind the
>>>>> -     * guest's back.
>>>>> +     * guest's back.  Use such functionality in order to implement s=
upport for
>>>>> +     * VIRT_SPEC_CTRL as a shadow value of SPEC_CTRL and thus store =
the value
>>>>> +     * of VIRT_SPEC_CTRL in this field, taking advantage of both MSR=
s having
>>>>> +     * compatible layouts.
>>>>
>>>> I guess "shadow value" means more like an alternative value, but
>>>> (see above) this is about setting for now just one bit behind the
>>>> guest's back.
>>>
>>> Well, the guest sets the bit in VIRT_SPEC_CTRL and Xen sets it on
>>> SPEC_CTRL in order for it to have effect. I can use 'alternative
>>> value' if that's clearer.
>>
>> Well, as I tried to express in my earlier reply, I view "shadow value"
>> to mean "alternative value", so replacing wouldn't help. The question
>> whether it acts like the shadow values we know elsewhere (VMX'es CR0
>> and CR4, for example). If it does, using the same term is of course
>> fine. But it didn't look to me as if it would, hence I'd prefer to
>> avoid ambiguity. But please realize that I may have misunderstood
>> things ...
>=20
> No, you are OK to ask. When developing the series I went back and
> forth myself deciding whether 'hijacking' the spec_ctrl field to
> implement VIRT_SPEC_CTRL was OK.
>=20
> If host has AMD_SSBD: VIRT_SPEC_CTRL.SSBD will use the SPEC_CTRL.SSBD
> bit in the spec_ctrl field, but it will be set behind the guests back.
> If guests sets VIRT_SPEC_CTRL.SSBD but not SPEC_CTRL.SSBD, reads of
> SPEC_CTRL.SSBD from guest context will return 0, but the bit will be
> set.
>=20
> I called it 'shadow' because the underlying SPEC_CTRL.SSBD bit will
> get set, but reading SPEC_CTRL.SSBD could return 0 if the bit has been
> set from VIRT_SPEC_CTRL.
>=20
> Do you think that's a suitable use of 'shadow'?

Not sure, but since I don't have a good alternative suggestion, please
keep using "shadow".

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 09 17:12:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 17:12:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288019.488419 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRzrE-0000iH-11; Wed, 09 Mar 2022 17:12:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288019.488419; Wed, 09 Mar 2022 17:12:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nRzrD-0000iA-T9; Wed, 09 Mar 2022 17:12:15 +0000
Received: by outflank-mailman (input) for mailman id 288019;
 Wed, 09 Mar 2022 17:12:14 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Mata=TU=citrix.com=prvs=06023063e=ross.lagerwall@srs-se1.protection.inumbo.net>)
 id 1nRzrC-0000i4-Di
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 17:12:14 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 0daaf4cc-9fcc-11ec-8539-5f4723681683;
 Wed, 09 Mar 2022 18:12:10 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0daaf4cc-9fcc-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646845930;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-transfer-encoding:mime-version;
  bh=AJe1N+BmkN3tSEtYVVOxst4Uy9cViFrxg5wJvYcLItY=;
  b=FbU/fAtij2VFdPs0fyDBi5FPdqSuQZMADycPmdohh+T9PgXw7viDySsh
   EkfsADmBy2WxFdd+XW1oAPSHop57Cwcr7goouovpVcXBU2fzliAG7/8OF
   SKQM/SMF7ye0MZOPPybgIbqy9LCeyKz2avfnWgTrLm4kg6opFoF34lAzc
   w=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 68195895
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:y5t3OaB6m5KnqxVW/+rjw5YqxClBgxIJ4kV8jS/XYbTApDwk0jMFz
 GoZUD2CPPzfM2P9e9B2OYzjoBgCvsLdyNBkQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vh09Yy6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhK8
 8lRuLquFjsyBZ/Ak8NBax1qHRpHaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguw5K9LweocWtXx60jjdCd4tQIzZQrWM7thdtNs1rp4eRKeDN
 5tEAdZpRDvjUk1mZUUFMZ03rre4lnugWnpakHvA8MLb5ECMlVcsgdABKuH9f8SNRcFclUWwr
 2fP7WP/RB0XXPSczjyf+37qme7Lngv8QosZELD+/flv6HWWxXE7ARgfR1y95/W04mayXN9VJ
 kg88y8nv680skCmJvHtUhv9rHOasxo0X9tLD/Z8+AyL0rDT4QuSGi4DVDEpVTA9nJZoH3pwj
 AbPxo63Q2w02FGIdZ6D3oyvsS+/HzZKEXQ5VyMPalc95+vtm7hm23ojUe1fOKKyi9T0HxT5z
 DaLsDUyit0vsCIb60mo1QuZ2mzx//AlWiZwv1yKBTz9smuVcab4P9TA1LTN0RpXwG91pHGlt
 WNMpcWR5ftm4XqlxH3UG7Vl8F1ECp+43NzgbbxHQsFJG9eFoSfLkWVsDNdWfhkB3iEsI2OBX
 aMrkVkNjKK/xVPzBUONX6q/Ct4x0Y/rHsn/W/bfY7JmO8YtKlDZoHs+ORLMgQgBdXTAd4lla
 f93lu72UR4n5VlPlmLqF4/xL5dwrszB+Y8jbc+ilEn2uVZvTHWUVa0EIDOzghMRt8u5TPHu2
 48HbaOikkwHOMWnO3W/2dNDfDgicClgbbir+pM/SwJ2Clc/cI3XI6SKmu1Jlk0Mt/k9q9okC
 VnmAx4GkgWj3SObQehIA1g6AI7SsV9EhStTFQQnPEqy2mhlZoCq7awFcIAwc6Vh/+tmpcOYh
 dFfEylcKpyjkgj6xgk=
IronPort-HdrOrdr: A9a23:Hl3LvqmzgnirDrjX8uuhU3sEhSfpDfN7iWdD5ihNYBxZY6Wkfp
 +V8sjzhCWatN9OYh0dcIi7SdW9qXO1z+8Q3WBjB8bcYOCAghrnEGgC1/qs/9SEIUzDH4FmpN
 9dmsRFeb/N5B1B/LvHCWqDYpcdKbu8gduVbI7lph8HJ2wLGsJdBkVCe3ym+yVNNVJ77PECZf
 2hD7981kOdkAMsH6KG7xc+Lo3+juyOsKijTQ8NBhYh5gXLpyiv8qTGHx+R2Qpbey9TwJ85mF
 K10zDR1+GGibWW2xXc32jc49B9g9360OZOA8SKl4w8NijssAC1f45sMofy/wzd4dvfqmrCou
 O85yvIDP4DrE85uVvF5ycF7jOQlQrGLUWSkGNwz0GT+fARDwhKdfapzbgpAycxrXBQ5u2UmZ
 g7rF6xrYZYAx/bgSjx0dDUShlhl065pmcVi+IIlXxYVr0fZdZq3Pwi1VIQH5EaEC3g7oc7VO
 FoEcHH/f5TNUiXdnbDowBUsZaRt1kIb1+7q3I5y4eoOvlt7QdE5lpdwNZakmYL9Zo7RZUB7+
 PYMr5wnLULSsMNd6pyCOoIXMPyUwX2MF7xGXPXJU6iGLAMOnrLpZKy6LIp5PuycJhNyJcpgp
 zOXF5RqGZ3cUPzDs+F2oFN73n2MSiAdCWoztsb64lyu7X6SrauOSqfSEo2m8/luPkbCt2zYY
 f7BHuXOY6UEYLDI/c94+SlYeghFZA3arxghuoG
X-IronPort-AV: E=Sophos;i="5.90,167,1643691600"; 
   d="scan'208";a="68195895"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=azpBWBr+FUZs4T5G2I4C7S/tLKaK6pTIQdBeUoozr3I7cjcxGb+jruzS/Du1+Rj3ksP7krJwur/neiAgQIohd0LPS7oPk45KjC8Q0Y+3PIBy90Hdm7LwCfCGH8EL/f01paNUV90IOfhulIP+LrZTIBxnxYbJ81ox6IJGLU2vvbpMjPr5kRgVKp7avu8PnEGqjkojDLaol/Sq3yQwIFEiQ0Y9pGgXxb6K1sl1QAMfUMkjeVlqIXObA5oGSEgM5ZlHozR4QQhkLqqNDdJOgjyK79yxd5seaOoEJe3QZQ/dUqlFohOm0mCELtSdT+x1yaUS58u164MIQKptcrYPg5IuaA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=LXCHWgR96Dq0l1hW3035Mr/bLkazQ/bxND2RZzQbHO0=;
 b=KmoyTcXuUF7oF0qx2DNjwb5o+Bb3VptR3OPZOo6GoiKq5lK+WPGiFEGD4lccs7ljHukGN/vlrb0sDGUY6SyMA1hQrtqnwbEjcKM86ych4ee1NglDAzgM7sXOlRE1WGKzD0vRuAj5DcRQTeKKyZYRGzUfw3Aw6evCAm0lHfCMXqaq2AULp7o0aYnFem4ASRZejkTbyy3yH+rGmbUnYoX6vLFeDPdEJNNUECC03vHqt/i2CMAsYw7MlNYqouMmeKNR0sl/6CdPGAmmcWNaBpVEbp0GYEm867bfAAtfDYK988sn8X4BguPvVAznntsKq0A14OMqG2fruXFWxSSZUOucBQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=LXCHWgR96Dq0l1hW3035Mr/bLkazQ/bxND2RZzQbHO0=;
 b=rrC7T4NXv9DmPyqIjRQ2JV2/92tKYxs7tmYSsfXDgji+cR99oPQMNYqHAIVIu8pSVZQqcn0CrTxULnBxgrlPQBNjur0T7z8CixxF62HMSqm88guXkcJ4rcCqEdOenGp+zQmIXL4p8m6hlIeCzdpZWHp3t1SX6uGF1n8x8e82+TA=
From: Ross Lagerwall <ross.lagerwall@citrix.com>
To: Bjoern Doebel <doebel@amazon.de>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, "Roger
 Pau Monne" <roger.pau@citrix.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Subject: Re: [PATCH v5 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
Thread-Topic: [PATCH v5 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
Thread-Index: AQHYM8WNub5GgrUMA0aIU5Ob+nmmXay3SbM/
Date: Wed, 9 Mar 2022 17:12:05 +0000
Message-ID: <PH0PR03MB6382E2AD10AEF1BC48C55093F00A9@PH0PR03MB6382.namprd03.prod.outlook.com>
References: <03798b67ec3a892a302e6be5d87ea676e6376036.1646837462.git.doebel@amazon.de>
 <5cdd27addcec926eb48fdeab08ad3371e7c3fd7c.1646837462.git.doebel@amazon.de>
In-Reply-To: <5cdd27addcec926eb48fdeab08ad3371e7c3fd7c.1646837462.git.doebel@amazon.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
suggested_attachment_session_id: f77ff0d1-a564-c56b-6576-c0136644f957
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: af8eccd3-0f95-4bdd-afc7-08da01efefa1
x-ms-traffictypediagnostic: DM6PR03MB4634:EE_
x-microsoft-antispam-prvs: <DM6PR03MB463450CCC4CC5237900A118AF00A9@DM6PR03MB4634.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PH0PR03MB6382.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(71200400001)(186003)(122000001)(91956017)(38070700005)(5660300002)(38100700002)(26005)(8936002)(66446008)(52536014)(110136005)(54906003)(316002)(55016003)(8676002)(4326008)(66476007)(86362001)(64756008)(66946007)(82960400001)(66556008)(9686003)(76116006)(33656002)(44832011)(7696005)(6506007)(508600001)(2906002)(53546011);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?iJ7TeC7F1DkXj4IX5XOGL5nSfjoCBaNyY+Hl126YM6L1pkIzi9c+tn85F8?=
 =?iso-8859-1?Q?BVAkvu+6zJ0vQ4wNvaXsCLkIEwyjI7tIVAlk7aF1EAHEJOdlbnDnMGijbg?=
 =?iso-8859-1?Q?fTSQZgWJUveKaCNolbjqGKY4JsuP8tC+L0Qx2GnwKuEJHwpZA5DdvyS8Ej?=
 =?iso-8859-1?Q?UmtcafG3kYVB0lk+nw6e1O3d6dYGiaV7zBrbJKg3TffxOW+i0OOmQF2+zd?=
 =?iso-8859-1?Q?DILUGXe8DI/5g952qX/gaU/1yolqfAJp8RYYnqiGJPQZ/qorJRBHh2u28G?=
 =?iso-8859-1?Q?TJkm34nocQATj51c0bR1/fKQfTRakVYjgoH3Olcgn86NV4s97gPbrjhoaJ?=
 =?iso-8859-1?Q?jc2d910gVAVk/IKymKgG+mBup8Am7f15Jf/3YRdV2j4UtMpRu3nchj2H78?=
 =?iso-8859-1?Q?AfEG+kBaqhq2mdgT7dCp6ACdIPglvXpD/e9mcPbJtl5sHkVm9JydAZYpkz?=
 =?iso-8859-1?Q?2a8OPHGJXWaHit+0FCSXuXLI0RQ4GQmKelCo0qEl1p4PY2YhO7bWWChOi6?=
 =?iso-8859-1?Q?ZEMnlF6QP1/AzeaKiIP+X9Z1RwrvZhll5UAquJc3faNJKlA12frxefdhHO?=
 =?iso-8859-1?Q?1uRCHh6YDHxmZUC0o6QFsDQsO3TyZCLURul5dgzN7LtJhZA6BJta1oc1Q4?=
 =?iso-8859-1?Q?tAOBtOCPKjIuMGtBost+/PbvPLpoHuttsFaPOXH1UdDeYnLSEnVIMKSAh3?=
 =?iso-8859-1?Q?9wIqJnHUuox23O1jof4SH8vQ0ymxncJ8RXeHb5EoPovs43eoL7fcE3cmlE?=
 =?iso-8859-1?Q?yt0a67prBVwCxfiqzVsKx8aLhafhSXGCCtQ+Hf5FYgYMEwmhkAc9Aa2MMm?=
 =?iso-8859-1?Q?AmB0KWYg45tpo5G6uQ3J+ZMxXhSSL1FRzn9ZBepthEwBOlnjbfJ+4lIQ0n?=
 =?iso-8859-1?Q?jImnvgS1Sjre5mBsqOPEsC0e2ESfmBWGpGbqcYMPS6EdiR0BhE1rhe6rxj?=
 =?iso-8859-1?Q?t05PjdO1amSoTMkwjb8tPe594miWWCpsg+LFRWMXxoPuim6JC0m3D1pILT?=
 =?iso-8859-1?Q?yqGbXL4yuyemn1k8hGO4RLn4RwjCdNkStI36qPGO2RxSWcsgIxl/To+/zM?=
 =?iso-8859-1?Q?KbFH1D8SKRtkpE3wqajY64RioQsVSRlzcja/nGs4W4AoYYx5bZXou328LB?=
 =?iso-8859-1?Q?/z2AvC24bVk/yjxV1GlrkKr0gbZTi0OzCuftDnyCy7yEMTtfI4pvDmlRYK?=
 =?iso-8859-1?Q?9VCejG/wLIcl8NjlvBW61Fsd6HhCVvGdrhwhdrX672Ph5+PaznB3/bEwTv?=
 =?iso-8859-1?Q?lbm+XuZJAywkE0I73/M0ZGBhh8yy0cClA2YjLYvzmyYBWIaa1RK7F/9TVc?=
 =?iso-8859-1?Q?M7hbR0Ejw2lzK1F4XP9Q9GgrU4/3TDOdX5/Rr3vA66RaqvpfOIwjSo/bIP?=
 =?iso-8859-1?Q?CkOCoACy9C9IAzkRYLfENZQqEEQU+evEpcbugrwYC3XkwfYrNfuMTNmsxV?=
 =?iso-8859-1?Q?qNo1pbdwxDKY4bXCszZ3aLTWuYUL8gtaNKLYUwZaRmvlAPr18KtoMjpyHC?=
 =?iso-8859-1?Q?6lt56pygPkajnmZ1WAMN0KLOqE61QhmJ3rkvCWPFNVFFATguunuTgn2tsj?=
 =?iso-8859-1?Q?4d15CqYRILyjo5FBd6J6c5vEew9TZgHATPzeqs4VuUCosjMmR3kg4gi8LP?=
 =?iso-8859-1?Q?M4B5g2PQy/oybW2CNAh+peg3NyyqfqKL6KH80bl2j16fDpsleYWbUZgEIs?=
 =?iso-8859-1?Q?DZeGcyF63kT4DXaptg7tJAItmCotbwJAQgAdV7j7ahElAX3+8FyqpLk/PS?=
 =?iso-8859-1?Q?5cBg=3D=3D?=
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR03MB6382.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: af8eccd3-0f95-4bdd-afc7-08da01efefa1
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Mar 2022 17:12:05.4415
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: oip8adgyc1/JCIBOCVtdg2MVyi3BY9vPke3GoNh9ivUUi+8xkqfOCWQMTxfG00s/Z5l+DhQbOfd9nbEwK388Fe8roZxJZv3Uf5YfvfHq5DA=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR03MB4634
X-OriginatorOrg: citrix.com

> From: Bjoern Doebel <doebel@amazon.de>=0A=
> Sent: Wednesday, March 9, 2022 2:53 PM=0A=
> To: xen-devel@lists.xenproject.org <xen-devel@lists.xenproject.org>=0A=
> Cc: Michael Kurth <mku@amazon.de>; Martin Pohlack <mpohlack@amazon.de>; R=
oger Pau Monne <roger.pau@citrix.com>; Andrew Cooper <Andrew.Cooper3@citrix=
.com>; Bjoern Doebel <doebel@amazon.de>; Konrad Rzeszutek Wilk <konrad.wilk=
@oracle.com>; Ross Lagerwall <ross.lagerwall@citrix.com>=0A=
> Subject: [PATCH v5 2/2] xen/x86: Livepatch: support patching CET-enhanced=
 functions =0A=
>  =0A=
> Xen enabled CET for supporting architectures. The control flow aspect of=
=0A=
> CET expects functions that can be called indirectly (i.e., via function=
=0A=
> pointers) to start with an ENDBR64 instruction. Otherwise a control flow=
=0A=
> exception is raised.=0A=
> =0A=
> This expectation breaks livepatching flows because we patch functions by=
=0A=
> overwriting their first 5 bytes with a JMP + <offset>, thus breaking the=
=0A=
> ENDBR64. We fix this by checking the start of a patched function for=0A=
> being ENDBR64. In the positive case we move the livepatch JMP to start=0A=
> behind the ENDBR64 instruction.=0A=
> =0A=
> To avoid having to guess the ENDBR64 offset again on patch reversal=0A=
> (which might race with other mechanisms adding/removing ENDBR=0A=
> dynamically), use the livepatch metadata to store the computed offset=0A=
> along with the saved bytes of the overwritten function.=0A=
> =0A=
> Signed-off-by: Bjoern Doebel <doebel@amazon.de>=0A=
> Acked-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>=0A=
> CC: Ross Lagerwall <ross.lagerwall@citrix.com>=0A=
=0A=
Reviewed-by: Ross Lagerwall <ross.lagerwall@citrix.com>=


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 18:49:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 18:49:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288028.488430 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nS1Mx-000179-SZ; Wed, 09 Mar 2022 18:49:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288028.488430; Wed, 09 Mar 2022 18:49:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nS1Mx-000172-Pe; Wed, 09 Mar 2022 18:49:07 +0000
Received: by outflank-mailman (input) for mailman id 288028;
 Wed, 09 Mar 2022 18:49:05 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nS1Mv-00016r-QB; Wed, 09 Mar 2022 18:49:05 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nS1Mv-0002gH-NW; Wed, 09 Mar 2022 18:49:05 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nS1Mv-0004h4-F5; Wed, 09 Mar 2022 18:49:05 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nS1Mv-0004kM-ES; Wed, 09 Mar 2022 18:49:05 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=vrQM7nS/zJHAt7dhnraqsxPwnpZGyDa5YrKrQbyv2Ls=; b=h1WiGJ7/ZP6Yt1StJ2nZrVs+xp
	40olIY68wgOW7Iix+ILZh3jB4cn7zLQGpYLBudadOi7K4wK+xsHYPrHnKFl7MRITrd46DKkfrnZo2
	O3w7z+rJsMiabpoUU6W5n28t2xVMgDDdqSb881Jf8UvWOd7oIjNiGJ9KmU8g3TtBNqAQ=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168490-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168490: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=56530dec1105f17455752675e4c90fb859c64836
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 09 Mar 2022 18:49:05 +0000

flight 168490 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168490/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 56530dec1105f17455752675e4c90fb859c64836
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    9 days
Failing since        168258  2022-03-01 01:55:31 Z    8 days   82 attempts
Testing same since   168489  2022-03-08 19:42:15 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 493 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 19:06:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 19:06:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288037.488441 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nS1dy-0003aV-EY; Wed, 09 Mar 2022 19:06:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288037.488441; Wed, 09 Mar 2022 19:06:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nS1dy-0003aO-B7; Wed, 09 Mar 2022 19:06:42 +0000
Received: by outflank-mailman (input) for mailman id 288037;
 Wed, 09 Mar 2022 19:06:42 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=d6dl=TU=citrix.com=prvs=060aafcb7=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nS1dx-0003aI-OL
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 19:06:42 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 0b650140-9fdc-11ec-8539-5f4723681683;
 Wed, 09 Mar 2022 20:06:39 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0b650140-9fdc-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646852799;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=3ko7aNu7ldzqTgsm0KgJdKRF90vvCA4Ha2JKLEi48ZE=;
  b=U4xcGNyllq2w07P1UG70F3x5NJ5iNsWIRhkH3X/dmnMiiUuZOSeJ0LIq
   caDKkAqnP8OM59x7lwvsFEk1c5+9mfe9NnwvzCdwgHxQDUDE3eQUYLX4n
   JuR1YrXZOOXfgGHcX+BFo6pmqz1prA7SgST/hnYNO7PS1Mq9WwY+kr6Jd
   A=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65849160
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:/PBd5q3Q4BEDl+oDC/bD5SBxkn2cJEfYwER7XKvMYLTBsI5bpzYPz
 mBLXD+OOa7fZ2TxfIh1a4mxpkwC65OHnYU1S1Q+pC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUw0IDia++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /1SrbqIezUwMJbwidsRdwYJDRlEMfZJreqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHCOo8Ft24m5jbeFfs8GrjIQrnQ5M8e1zA17ixLNaiDN
 5ZIMGQ3BPjGSx1SE3AxLY4Hp96L22XZeBlEl16Z/INitgA/yyQuieOwYbI5YOeiT8hPglyRo
 G6A+m3jGwwbL/SW0z/D+XWp7sfxmif8VJMXBaeP3Pdgi12OxUQeEBQTE1C8pJGRmkO4Ht5SN
 UEQ0i4vtrQpslymSMHnWB+1q2LCuQQTM/JPF8Uq5QfLzbDbiy6bDGUZSj9KaPQ9qdQ7Azct0
 zehnc7tBDFpmK2YTzSa7Lj8hSipJSEfIGsGZCkFZQgI+d/upMc0lB2nczp4OPfr1JuvQ2i2m
 m3U6nhl71kOsSIV/7qj22j1sSuinaTYcQIR+VTJZliptQwsMeZJeLeUwVTc6P9BKqOQQV+Ao
 GUIlqCi0QweMX2evHfTGbtQRdlF897AaWSB2gA3Q/HN4hzwoybLQGxG3N1pyK6F2O4gcCShX
 kLcsBg5CHR7bCrzNv8fj25c5q0XIUnc+TbNC6i8gjlmOMEZmOq7EMdGPxD4M4fFyhRErE3HE
 c3HGftA9F5DYUid8BK4Rv0GzZggzT0kyGXYSPjTlkr7j+XAOCTFFetZbjNii9zVCove8G05F
 P4Fa6O3J+h3CrWiMkE7D6ZIRbz1EZTLLc+v8JEGHgJyCgFnBHsgG5fsLUAJIORYc1Buvr6Qp
 BmVAxYAoHKm3CGvAVjaOxhLNeK0Nb4i/C1TAMDZFQvxs5TVSd30t/l3mlpeVeRPydGPOtYvF
 qhbIZrcWqoTItkFkhxEBaTAQEVZXE3DrSqFPja/YSh5eJhlRgfT/cTjcBep/y4LZhdbf+Nly
 1F8/ms3maY+ejk=
IronPort-HdrOrdr: A9a23:vUc6zqjvS8kC4MCXvKvrhW8aX3BQX/p13DAbv31ZSRFFG/FwyP
 rBoB1L73DJYWgqNE3I+Orwc5VoLkmsk6KdjbNhXotKPzOW8ldATrsSlLcKqgeIc0aVm4886U
 4JSdk9NDSaNykesS+O2njeLz9W+qjizEnHv5a9855Fd3AQV4hQqyNCTiqLGEx/QwdLQbAjEo
 CH28ZBrz28PVwKc8WSHBA+LqX+juyOsKijTQ8NBhYh5gXLpyiv8qTGHx+R2Qpbey9TwI0l7X
 POn2XCl+meWrCAu1DhPl3ontVrcejau5t+7fm3+4Yowm+FsHfTWG0uYczAgNl/mpDW1L9jqq
 iwn/5nBbU315qZRBDInfO5szOQrgoG+jvsz0SVjmDkptG8TDUmC9BZjYYcaRfB7VE81esMmJ
 6j8ljpwaa/Nymw1RgVJuK4Ii1Chw6xuz4vgOQTh3tQXc8Xb6JQt5UW+AdPHJIJDEvBmfca+M
 EHNrCs2B5+GWnqEEwxflMftOBEck5DbStuGHJyyvB9+wIm7kxE8w==
X-IronPort-AV: E=Sophos;i="5.90,168,1643691600"; 
   d="scan'208";a="65849160"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=bLz1yH1M9QwkzrcxDTXDzNJLrB7pxODPdKWchjmYieCbNh3UVfffMEBh9p+aVGh2UU0p+8L2XCiExsbKaEIkL6BzT/HzeFbn4/jEZydSZUsnC4x9hfRRHpLnGb0B97AbtyXoe94x9D9HvpWieKZCNCqxV3ifSL/pC82f7gV8CemEI/WOw+86fAWhITEDFjctW1udIyE7C8kMURHLcFMSqY+pudmNj6z1QHVEDqrgC/1L+Az6JTCJsp3x7wFues2XFTkb/vkvxKKIviVctH/IZmDRphGstkN7C24vSNq4GNQot3jEmYJEpV0vJbTvxMxgxhbEKd1LCiQmkWWU3NQeKA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=3ko7aNu7ldzqTgsm0KgJdKRF90vvCA4Ha2JKLEi48ZE=;
 b=Yp3f9ISL6JZUSHRdncHh6e4J78bPs4FfO3YfM504Jx3lErQn+RWG82jWv7X8ymHzIkDnRwIxg8x7c6X0e6PrQ5cnRxMzSGRLOPCCFY6U6gwLPW3fS4Asl5VFBKqgK88N6pywOoAlON1kyE/FyENANSNGTHI0ptbt3ey0RpQZQ66L8kQFFWV4jusw02HQ+6zv+Wo5k2SZLVJ7I5TlkHhC6W0n5PO694H2O8pNx/05WsYSPFOfC2XxjNgjVj1tRxYmAbqiwAjMFu942lsFWqcYc1dFyauJqJZ65DHMPkh4kSAxsb3ybhf5riDlktgwbUjpMKWZ4RBmQfP08fmoaPwXXg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=3ko7aNu7ldzqTgsm0KgJdKRF90vvCA4Ha2JKLEi48ZE=;
 b=YIMeUSvnWJ/SSmTs/EEIY7C7QO+y6cNQjkvy5w2ImT2NfRqu17oJO43bGkvT9l7dP7il8xloWX0lbkkUfeu5mvCrBBakHFRiSZUuCYdOW/YJtKx/kaybwQs/rHuGakhCWADhVeNus1uErQRIeZvUsCIuc9UcwuvQEsR32J4ctW0=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>, Roger Pau Monne <roger.pau@citrix.com>
CC: George Dunlap <George.Dunlap@citrix.com>, Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>, "Bertrand
 Marquis" <bertrand.marquis@arm.com>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v3 2/2] livepatch: set -f{function,data}-sections compiler
 option
Thread-Topic: [PATCH v3 2/2] livepatch: set -f{function,data}-sections
 compiler option
Thread-Index: AQHYMvNxmieyqH8SX0SDccReVIf6jKy1hkuAgAAKagCAAAelgIAAGJiAgAAEt4CAARULAIAADp6AgACSWgA=
Date: Wed, 9 Mar 2022 19:06:33 +0000
Message-ID: <b8dd5bfd-53b0-bed3-719f-d53e126a0e89@citrix.com>
References: <20220308134924.83616-1-roger.pau@citrix.com>
 <20220308134924.83616-3-roger.pau@citrix.com>
 <c35415ef-b3c1-cc1c-2fb2-aa2de2602cd5@suse.com>
 <YidsSmPV1Pqulp+h@Air-de-Roger>
 <9cce44ca-3e31-bc13-3c56-2811efc36d5b@suse.com>
 <YieHVbKjtXY8vpOn@Air-de-Roger>
 <d400722d-d5a2-5bc6-8c16-be1d8e8ee046@suse.com>
 <YihzsHCgjVd0g4b5@Air-de-Roger>
 <b0f67b74-3443-2b10-ae94-80a284269265@suse.com>
In-Reply-To: <b0f67b74-3443-2b10-ae94-80a284269265@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 8f7bd46b-13cb-44d8-a7b6-08da01ffed2b
x-ms-traffictypediagnostic: BYAPR03MB4247:EE_
x-microsoft-antispam-prvs: <BYAPR03MB424718AF335375DBD34C43FFBA0A9@BYAPR03MB4247.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(83380400001)(66946007)(6506007)(6512007)(6486002)(26005)(38100700002)(186003)(122000001)(2616005)(53546011)(5660300002)(2906002)(71200400001)(8936002)(508600001)(66556008)(66446008)(66476007)(316002)(8676002)(76116006)(31686004)(64756008)(91956017)(38070700005)(82960400001)(54906003)(4326008)(6636002)(36756003)(110136005)(31696002)(86362001)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?SkZReXBIM20rYlRpckVuTlJtQ0Q3ZmFEQWlSb0V1QitzaHdvTlJWdWc0bnF1?=
 =?utf-8?B?Tmp1YU5aeXI1MTgxQm9HNy9wSGxXOGU2Y3YwbTdQVWJuOUYyYjZmN0pjcDRj?=
 =?utf-8?B?TTVKZFd3QnVBZDAwVHc2Q05JL2gxS1BwU0x0VmJoZklhK0hZODdaa21xWER3?=
 =?utf-8?B?Q2Q0Tm9RSENKaTFEcis2bnFsKzA4VU1NTWVGVzhQZjdyNitHQXZrWGVVVHFI?=
 =?utf-8?B?NXh1UUs4VmJVM2tuVTlxbEFvM3FHUFdnS0ROTU9JOVZpSzFQVHIrcjVrM3FM?=
 =?utf-8?B?ZG9mVW5KS1VsaWxoQm1aYkxpZEFWR1pzUjlEbU5qeDZibzlwdndNYisrMURk?=
 =?utf-8?B?bEllRVlnVzM1K1EwSkRUeGpLQkhaUTZ0WWVJeGthTDRmeHhUMjhxQm96NE9l?=
 =?utf-8?B?MXB0MlNYaU8xSkZ6RlVQbjZDbDNLU0dJY3VISDhBblVkMUJPamdHZXlqaFVr?=
 =?utf-8?B?MXZuazJoRHhtNDFyS0w1RkpGaEdNU3V1Y0dqd2l3T3Y0M3NTZmFkRjlqUmNm?=
 =?utf-8?B?WXdpTEZjYWVBUUprSFNBVXgwbXhJSEk0M0VYODRKd2REWVgrcDhUSHhCZzk1?=
 =?utf-8?B?YnlnMk1oQjJwWXBMT3M3eEpUSjdUZmVnNERzeFhnWDVZK25wWkZlMWVjQTg2?=
 =?utf-8?B?QlVHWHQ5NldRdXVxZFEyNmhUOHZEa3VrRWZQZndkQnNqNVcxU2ZIQUM3dXFN?=
 =?utf-8?B?T2Q0cG5Nbzd0V1RvTUNZTXFYdnBzMlFMN3BnaVgxNklSQThPelRNUlBjcUtx?=
 =?utf-8?B?dThhRkhYNFBwUHlrSUlEQ1JxUGVoN25TSTU2cGZQQkphN1hKWk5leFMvTjlJ?=
 =?utf-8?B?RHlySDVCM2pPVUhuT3pDdU9EL1RRRkN6N1NsbkQ4ZmFRRCsxOXRhOWN4b3Ez?=
 =?utf-8?B?T0Qza1ZTMksyOWgwSE00bHN5bm9XZ240V0JDaFhSZjNxYUVyVlBWNllidnQ4?=
 =?utf-8?B?SVZtQ0c3ZEZERER4eXZNdTdjZitJdERxT2ZjZmREbHE5ci9ZOHhNMzhEV0pP?=
 =?utf-8?B?cE1FdjJlV2NtWkM2RjZWUUQ1dTNhMTVwcmVndUlselY1WUNaVnZ3WGhoK01j?=
 =?utf-8?B?bDF3OXlMeDkxdzgwaUlCRnE0STBmd3ljWTJOL2hWTU9IeWlMMGVsYWFCV1do?=
 =?utf-8?B?Mmg3am1YWHE4a3FIS3pJN2VmblVSOEJuMyt3K1UrYjJsSmIxYmhua05kQlAw?=
 =?utf-8?B?UGs4Z1ExT1ljV004KzNtZmc4Q3FjWWdRYnJibUZIYUpZQ04yc212VDN0akZQ?=
 =?utf-8?B?T2xxRnRtcldaWloyTTdhQW0xeTc3ekhxL0lJSitybDBqN0hUUko2RWdhZWw1?=
 =?utf-8?B?NC82ZncvRThzUGs5R2JrWE02cmxiWC9RcjJZcDlWakZlN245ZUZvQmpYUGh1?=
 =?utf-8?B?U3VwaTJhOXJzT2ZCSS9mZHZHOWkyTGdBS2NFMW5GNG8vNFBkZXZaa2ZoN25D?=
 =?utf-8?B?Mk5BTnE3QllISkJyZnZteFpYQmdqKzd2RjRmNFdCTnJvdEFPbUZDeGZncXZV?=
 =?utf-8?B?TFkvSSs5NUpydWQ1UmNpd2FxZDF5NnBDUDZES2NNWjkxM1c5djBvMEp5Umlh?=
 =?utf-8?B?dC9kS05MUmVKbTEyNE5kcyszL1czRFZScmxmNHB6aHdoeGZkV1ZadE10dkVv?=
 =?utf-8?B?WlJaa2JTKzNoYWcyaUVzYmt4Q0F6eHFsR3F6VjZ0dWd3R2FaalhGK1NKWFlt?=
 =?utf-8?B?OFFEbzJqOUxjcWVMYjc0dHNDQzB3b2MzaU1qYWh5aGZ2LzFQMUhFTUxwL0hz?=
 =?utf-8?B?Mk15RVdBem1HZ25uc3EvRW1pc0w5Wmx2dEtuMzRnQ2VnY2hEbk1mUFFuQ1Zq?=
 =?utf-8?B?R3did2RQcFB5emZoZnJ1Z3Z1cTRjTU9yenhIM0FwV2ljdTI4VXdyLzNsYnhH?=
 =?utf-8?B?ZU4yT25pUjZoMFQvWk0vcGxjcEo2NmZselpiVm4xVG8xRlRYeFF6c2tvS3h4?=
 =?utf-8?B?Q2NjeElERWVuSjJLMUk3NUdKQTk4Ym15ZmdPVzVqaGlMTTRDeHNmcFptVWdj?=
 =?utf-8?B?Q3dnZFMzNDBnMmVWK0FuQ3FIUEVKaWtncm4zNDVYU1BSTTlTUzQwV2pBZ3Fx?=
 =?utf-8?B?dlh1M0IzcG5vbEVlOHQzNWlhTWhuc1dCNVQ3WVp5V2RKbWNuVGp0Z2VDdjAx?=
 =?utf-8?B?UCtlQ2VOcndrSC9KQmtnbGUwM2lscGVsTGpOUjVEd05WSHcyOXYzamxrNWs1?=
 =?utf-8?B?RVl0TnpVbDVQSEFTTnRNaGpXeVIxazc1c3JvdEJwdm9ZSGlNMVFzUm9SZXNV?=
 =?utf-8?B?ZXRyT3dGa3dZOWFGK0FKZy9xaDlRPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <D70A5FB313AC1748A3268DF68EA23BAE@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8f7bd46b-13cb-44d8-a7b6-08da01ffed2b
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Mar 2022 19:06:33.2758
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 6QResOBQvXo5wkSJ5By+GYtw5EgYZRD/v2nzlOgVvvT0i6gjBGl5CgyyaD8thr3/nO7BWFzNLf5k5u1vPpmArm/FtLl+yAEicAljmjQUl58=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB4247
X-OriginatorOrg: citrix.com

T24gMDkvMDMvMjAyMiAxMDoyMiwgSmFuIEJldWxpY2ggd3JvdGU6DQo+IE9uIDA5LjAzLjIwMjIg
MTA6MzAsIFJvZ2VyIFBhdSBNb25uw6kgd3JvdGU6DQo+PiBPbiBUdWUsIE1hciAwOCwgMjAyMiBh
dCAwNTo1ODo0OVBNICswMTAwLCBKYW4gQmV1bGljaCB3cm90ZToNCj4+PiBPbiAwOC4wMy4yMDIy
IDE3OjQxLCBSb2dlciBQYXUgTW9ubsOpIHdyb3RlOg0KPj4+PiBPbiBUdWUsIE1hciAwOCwgMjAy
MiBhdCAwNDoxMzo1NVBNICswMTAwLCBKYW4gQmV1bGljaCB3cm90ZToNCj4+Pj4+IE9uIDA4LjAz
LjIwMjIgMTU6NDYsIFJvZ2VyIFBhdSBNb25uw6kgd3JvdGU6DQo+Pj4+Pj4gT24gVHVlLCBNYXIg
MDgsIDIwMjIgYXQgMDM6MDk6MTdQTSArMDEwMCwgSmFuIEJldWxpY2ggd3JvdGU6DQo+Pj4+Pj4+
IE9uIDA4LjAzLjIwMjIgMTQ6NDksIFJvZ2VyIFBhdSBNb25uZSB3cm90ZToNCj4+Pj4+Pj4+IElm
IGxpdmVwYXRjaGluZyBzdXBwb3J0IGlzIGVuYWJsZWQgYnVpbGQgdGhlIGh5cGVydmlzb3Igd2l0
aA0KPj4+Pj4+Pj4gLWZ7ZnVuY3Rpb24sZGF0YX0tc2VjdGlvbnMgY29tcGlsZXIgb3B0aW9ucywg
d2hpY2ggaXMgcmVxdWlyZWQgYnkgdGhlDQo+Pj4+Pj4+PiBsaXZlcGF0Y2hpbmcgdG9vbHMgdG8g
ZGV0ZWN0IGNoYW5nZXMgYW5kIGNyZWF0ZSBsaXZlcGF0Y2hlcy4NCj4+Pj4+Pj4+DQo+Pj4+Pj4+
PiBUaGlzIHNob3VsZG4ndCByZXN1bHQgaW4gYW55IGZ1bmN0aW9uYWwgY2hhbmdlIG9uIHRoZSBo
eXBlcnZpc29yDQo+Pj4+Pj4+PiBiaW5hcnkgaW1hZ2UsIGJ1dCBkb2VzIGhvd2V2ZXIgcmVxdWly
ZSBzb21lIGNoYW5nZXMgaW4gdGhlIGxpbmtlcg0KPj4+Pj4+Pj4gc2NyaXB0IGluIG9yZGVyIHRv
IGhhbmRsZSB0aGF0IGVhY2ggZnVuY3Rpb24gYW5kIGRhdGEgaXRlbSB3aWxsIG5vdyBiZQ0KPj4+
Pj4+Pj4gcGxhY2VkIGludG8gaXRzIG93biBzZWN0aW9uIGluIG9iamVjdCBmaWxlcy4gQXMgYSBy
ZXN1bHQgYWRkIGNhdGNoLWFsbA0KPj4+Pj4+Pj4gZm9yIC50ZXh0LCAuZGF0YSBhbmQgLmJzcyBp
biBvcmRlciB0byBtZXJnZSBlYWNoIGluZGl2aWR1YWwgaXRlbQ0KPj4+Pj4+Pj4gc2VjdGlvbiBp
bnRvIHRoZSBmaW5hbCBpbWFnZS4NCj4+Pj4+Pj4+DQo+Pj4+Pj4+PiBUaGUgbWFpbiBkaWZmZXJl
bmNlIHdpbGwgYmUgdGhhdCAudGV4dC5zdGFydHVwIHdpbGwgZW5kIHVwIGJlaW5nIHBhcnQNCj4+
Pj4+Pj4+IG9mIC50ZXh0IHJhdGhlciB0aGFuIC5pbml0LCBhbmQgdGh1cyB3b24ndCBiZSBmcmVl
ZC4gLnRleHQuZXhpdCB3aWxsDQo+Pj4+Pj4+PiBhbHNvIGJlIHBhcnQgb2YgLnRleHQgcmF0aGVy
IHRoYW4gZHJvcHBlZC4gT3ZlcmFsbCB0aGlzIGNvdWxkIG1ha2UgdGhlDQo+Pj4+Pj4+PiBpbWFn
ZSBiaWdnZXIsIGFuZCBwYWNrYWdlIHNvbWUgLnRleHQgY29kZSBpbiBhIHN1Yi1vcHRpbWFsIHdh
eS4NCj4+Pj4+Pj4+DQo+Pj4+Pj4+PiBPbiBBcm0gdGhlIC5kYXRhLnJlYWRfbW9zdGx5IG5lZWRz
IHRvIGJlIG1vdmVkIGFoZWFkIG9mIHRoZSAuZGF0YQ0KPj4+Pj4+Pj4gc2VjdGlvbiBsaWtlIGl0
J3MgYWxyZWFkeSBkb25lIG9uIHg4Niwgc28gdGhlIC5kYXRhLiogY2F0Y2gtYWxsDQo+Pj4+Pj4+
PiBkb2Vzbid0IGFsc28gaW5jbHVkZSAuZGF0YS5yZWFkX21vc3RseS4gVGhlIGFsaWdubWVudCBv
Zg0KPj4+Pj4+Pj4gLmRhdGEucmVhZF9tb3N0bHkgYWxzbyBuZWVkcyB0byBiZSBzZXQgdG8gUEFH
RV9TSVpFIHNvIGl0IGRvZXNuJ3QgZW5kDQo+Pj4+Pj4+PiB1cCBiZWluZyBwbGFjZWQgYXQgdGhl
IHRhaWwgb2YgYSByZWFkLW9ubHkgcGFnZSBmcm9tIHRoZSBwcmV2aW91cw0KPj4+Pj4+Pj4gc2Vj
dGlvbi4gV2hpbGUgdGhlcmUgbW92ZSB0aGUgYWxpZ25tZW50IG9mIHRoZSAuZGF0YSBzZWN0aW9u
IGFoZWFkIG9mDQo+Pj4+Pj4+PiB0aGUgc2VjdGlvbiBkZWNsYXJhdGlvbiwgbGlrZSBpdCdzIGRv
bmUgZm9yIG90aGVyIHNlY3Rpb25zLg0KPj4+Pj4+Pj4NCj4+Pj4+Pj4+IFRoZSBiZW5lZml0IG9m
IGhhdmluZyBDT05GSUdfTElWRVBBVENIIGVuYWJsZSB0aG9zZSBjb21waWxlciBvcHRpb24NCj4+
Pj4+Pj4+IGlzIHRoYXQgdGhlIGxpdmVwYXRjaCBidWlsZCB0b29scyBubyBsb25nZXIgbmVlZCB0
byBmaWRkbGUgd2l0aCB0aGUNCj4+Pj4+Pj4+IGJ1aWxkIHN5c3RlbSBpbiBvcmRlciB0byBlbmFi
bGUgdGhlbS4gTm90ZSB0aGUgY3VycmVudCBsaXZlcGF0Y2ggdG9vbHMNCj4+Pj4+Pj4+IGFyZSBi
cm9rZW4gYWZ0ZXIgdGhlIHJlY2VudCBidWlsZCBjaGFuZ2VzIGR1ZSB0byB0aGUgd2F5IHRoZXkN
Cj4+Pj4+Pj4+IGF0dGVtcHQgdG8gc2V0ICAtZntmdW5jdGlvbixkYXRhfS1zZWN0aW9ucy4NCj4+
Pj4+Pj4+DQo+Pj4+Pj4+PiBTaWduZWQtb2ZmLWJ5OiBSb2dlciBQYXUgTW9ubsOpIDxyb2dlci5w
YXVAY2l0cml4LmNvbT4NCj4+Pj4+Pj4gUmV2aWV3ZWQtYnk6IEphbiBCZXVsaWNoIDxqYmV1bGlj
aEBzdXNlLmNvbT4NCj4+Pj4+Pj4NCj4+Pj4+Pj4+IC0tLSBhL3hlbi9hcmNoL3g4Ni94ZW4ubGRz
LlMNCj4+Pj4+Pj4+ICsrKyBiL3hlbi9hcmNoL3g4Ni94ZW4ubGRzLlMNCj4+Pj4+Pj4+IEBAIC04
OCw2ICs4OCw5IEBAIFNFQ1RJT05TDQo+Pj4+Pj4+PiAgICAgICAgICooLnRleHQudW5saWtlbHkg
LnRleHQuKl91bmxpa2VseSAudGV4dC51bmxpa2VseS4qKQ0KPj4+Pj4+Pj4gIA0KPj4+Pj4+Pj4g
ICAgICAgICAqKC50ZXh0KQ0KPj4+Pj4+Pj4gKyNpZmRlZiBDT05GSUdfQ0NfU1BMSVRfU0VDVElP
TlMNCj4+Pj4+Pj4+ICsgICAgICAgKigudGV4dC4qKQ0KPj4+Pj4+Pj4gKyNlbmRpZg0KPj4+Pj4+
Pj4gICAgICAgICAqKC50ZXh0Ll9feDg2X2luZGlyZWN0X3RodW5rXyopDQo+Pj4+Pj4+PiAgICAg
ICAgICooLnRleHQucGFnZV9hbGlnbmVkKQ0KPj4+Pj4+PiBUaGVzZSBsYXN0IHR3byBub3cgd2ls
bCBub3QgaGF2ZSBhbnkgZWZmZWN0IGFueW1vcmUgd2hlbg0KPj4+Pj4+PiBDQ19TUExJVF9TRUNU
SU9OUz15LiBUaGlzIG1heSBoYXZlIHVuZGVzaXJhYmxlIGVmZmVjdHMgb24gdGhlDQo+Pj4+Pj4+
IG92ZXJhbGwgc2l6ZSB3aGVuIHRoZXJlIGlzIG1vcmUgdGhhbiBvbmUgb2JqZWN0IHdpdGggYQ0K
Pj4+Pj4+PiAudGV4dC5wYWdlX2FsaWduZWQgY29udHJpYnV0aW9uLiBJbiAuZGF0YSAuLi4NCj4+
Pj4+PiBBZ3JlZWQuIEkgd29uZGVyZWQgd2hldGhlciB0byBtb3ZlIHRob3NlIGFoZWFkIG9mIHRo
ZSBtYWluIHRleHQNCj4+Pj4+PiBzZWN0aW9uLCBzbyBsaWtlbHk6DQo+Pj4+Pj4NCj4+Pj4+PiAg
ICAgICAgKigudGV4dC51bmxpa2VseSAudGV4dC4qX3VubGlrZWx5IC50ZXh0LnVubGlrZWx5Liop
DQo+Pj4+Pj4NCj4+Pj4+PiAgICAgICAgKigudGV4dC5wYWdlX2FsaWduZWQpDQo+Pj4+Pj4gICAg
ICAgICooLnRleHQuX194ODZfaW5kaXJlY3RfdGh1bmtfKikNCj4+Pj4+PiAgICAgICAgKigudGV4
dCkNCj4+Pj4+PiAjaWZkZWYgQ09ORklHX0NDX1NQTElUX1NFQ1RJT05TDQo+Pj4+Pj4gICAgICAg
ICooLnRleHQuKikNCj4+Pj4+PiAjZW5kaWYNCj4+Pj4+IFBlcmhhcHM7IEknbSBub3QgcmVhbGx5
IHdvcnJpZWQgb2YgLnRleHQuX194ODZfaW5kaXJlY3RfdGh1bmtfKiwNCj4+Pj4+IHRob3VnaC4g
V2hlbiBhZGRpbmcgLnRleHQuKiB0aGF0IG9uZSBjYW4gbGlrZWx5IGdvIGF3YXkuDQo+Pj4+Pg0K
Pj4+Pj4+IEZXSVcsIExpbnV4IHNlZW1zIGZpbmUgdG8gcGFja2FnZSAudGV4dC5wYWdlX2FsaWdu
ZWQgdG9nZXRoZXIgd2l0aCB0aGUNCj4+Pj4+PiByZXN0IG9mIC50ZXh0IHVzaW5nIHRoZSAudGV4
dC5bMC05YS16QS1aX10qIGNhdGNoLWFsbC4NCj4+Pj4+IFRoZXJlJ3Mgbm8gcXVlc3Rpb24gdGhp
cyBpcyBmdW5jdGlvbmFsbHkgZmluZS4gVGhlIHF1ZXN0aW9uIGlzIGhvdw0KPj4+Pj4gbWFueSBl
eHRyYSBwYWRkaW5nIGFyZWFzIGFyZSBpbnNlcnRlZCBiZWNhdXNlIG9mIHRoaXMuDQo+Pj4+Pg0K
Pj4+Pj4+Pj4gQEAgLTI5Miw5ICsyOTUsNyBAQCBTRUNUSU9OUw0KPj4+Pj4+Pj4gIA0KPj4+Pj4+
Pj4gICAgREVDTF9TRUNUSU9OKC5kYXRhKSB7DQo+Pj4+Pj4+PiAgICAgICAgICooLmRhdGEucGFn
ZV9hbGlnbmVkKQ0KPj4+Pj4+Pj4gLSAgICAgICAqKC5kYXRhKQ0KPj4+Pj4+Pj4gLSAgICAgICAq
KC5kYXRhLnJlbCkNCj4+Pj4+Pj4+IC0gICAgICAgKiguZGF0YS5yZWwuKikNCj4+Pj4+Pj4+ICsg
ICAgICAgKiguZGF0YSAuZGF0YS4qKQ0KPj4+Pj4+Pj4gICAgfSBQSERSKHRleHQpDQo+Pj4+Pj4+
IC4uLiB0aGlzIGNvbnRpbnVlcyB0byBiZSBuYW1lZCBmaXJzdC4gSSB3b25kZXIgd2hldGhlciB3
ZSB3b3VsZG4ndA0KPj4+Pj4+PiB3YW50IHRvIHVzZSBTT1JUX0JZX0FMSUdOTUVOVCAoaWYgYXZh
aWxhYmxlKSBpbnN0ZWFkIGluIGJvdGggcGxhY2VzLg0KPj4+Pj4+IFdlIGNvdWxkIHVzZSB0aGUg
Y29tbWFuZCBsaW5lIG9wdGlvbiBpZiBhdmFpbGFibGUNCj4+Pj4+PiAoLS1zb3J0LXNlY3Rpb249
YWxpZ25tZW50KSB0byBzb3J0IGFsbCB3aWxkY2FyZCBzZWN0aW9ucz8NCj4+Pj4+IERlcGVuZHMg
b24gdGhlIHNjb3BlIG9mIHRoZSBzb3J0aW5nIHRoYXQgd291bGQgcmVzdWx0IHdoZW4gZW5hYmxl
ZA0KPj4+Pj4gZ2xvYmFsbHkgbGlrZSB0aGlzLg0KPj4+PiBJJ20gbm90IHN1cmUgSSdtIGZvbGxv
d2luZy4gRG9uJ3Qgd2UgZ2VuZXJhbGx5IHdhbnQgdG8gc29ydCBieQ0KPj4+PiBhbGlnbm1lbnQg
aW4gb3JkZXIgdG8gYXZvaWQgYWRkaW5nIHVubmVjZXNzYXJ5IHBhZGRpbmcgYXMgbXVjaCBhcw0K
Pj4+PiBwb3NzaWJsZT8NCj4+Pj4NCj4+Pj4gRm9yIGFueSB3aWxkY2FyZCBzZWN0aW9ucyB3ZSBy
ZWFsbHkgZG9uJ3QgY2FyZSBhbnltb3JlIGhvdyB0aGV5IGFyZQ0KPj4+PiBzb3J0ZWQ/DQo+Pj4g
U3VyZS4gUXVlc3Rpb24gaXMgd2hldGhlciBzb3J0aW5nIGlzIGxpbWl0ZWQgdG8gd2l0aGluIGFu
eSBzaW5nbGUNCj4+PiAqKC4uLikgY29uc3RydWN0LCBvciB3aGV0aGVyIGl0IGNvdWxkIGV4dGVu
ZCB0byBhZGphY2VudCBvbmVzLiBJT1cNCj4+PiB3aGV0aGVyIHRoZSBjb21tYW5kIGxpbmUgb3B0
aW9uIHN0cmljdGx5IGlzIGEgcmVwbGFjZW1lbnQgb2YgYWRkaW5nDQo+Pj4gU09SVF9CWV9BTElH
Tk1FTlQgdG8gZXZlcnkgb25lIG9mIHRoZXNlIGNvbnN0cnVjdHMuDQo+PiBBRkFJQ1QgdGhlIGNv
bW1hbmQgbGluZSBvcHRpb24gd2lsbCBoYXZlIHRoZSBlZmZlY3Qgb2Ygc2V0dGluZyB0aGUNCj4+
IHNvcnRpbmcgb2YgYW55IHdpbGRjYXJkIGNvbnRhaW5pbmcgc2VjdGlvbnMgdG8gdXNlIFNPUlRf
QllfQUxJR05NRU5ULg0KPj4gSWU6IC5kYXRhLiogd291bGQgYmVjb21lIFNPUlRfQllfQUxJR05N
RU5UKC5kYXRhLiopOg0KPj4NCj4+ICooLmRhdGEgU09SVF9CWV9BTElHTk1FTlQoLmRhdGEuKikp
DQo+Pg0KPj4gSSd2ZSB0YWtlbiBhIGxvb2sgYXQgdGhlIGJpbnV0aWxzIGxkIHNvdXJjZSBhbmQg
dGhhdCBzZWVtcyB0byBiZSB0aGUNCj4+IGNhc2UsIGFueSB3aWxkY2FyZCBjb250YWluaW5nIGVu
dW0gd2lsbCBnZXQgaXQncyBzb3J0aW5nIHNldCB0byBieQ0KPj4gYWxpZ25tZW50IChidXQgSSdt
IG5vdCBmYW1pbGlhciB3aXRoIGxkIGNvZGUgc28gSSBtaWdodCBiZSBtaXNzaW5nDQo+PiBwaWVj
ZXMpLg0KPiBPa2F5IC0gd2h5IGRvbid0IHdlIHRyeSB0aGF0IHRoZW4gKGluIGEgc2VwYXJhdGUg
cGF0Y2gsIHNvIGl0J3MgZ29pbmcNCj4gdG8gYmUgZWFzeSB0byByZXZlcnQpPyBGb3IgdGhlIHBh
dGNoIGhlcmUgYWxsIEknZCBsaWtlIHRvIGFzayBmb3IgaXMNCj4gdG8ga2VlcCAudGV4dC5wYWdl
X2FsaWduZWQgZW51bWVyYXRlZCBleHBsaWNpdGx5IChhbmQgdGhlIHdpbGRjYXJkDQo+IHBsYWNl
ZCBhZnRlciBpdCwgb2J2aW91c2x5KS4NCg0KSSdtIG5vdCBjb252aW5jZWQgdGhpcyB3aWxsIGJl
IGFuIGltcHJvdmVtZW50LsKgIEl0IHdpbGwgbWFrZSBhIG1hcmdpbmFsDQpzcGFjZSBzYXZpbmcs
IGJ1dCBjb3N0IHJ1bnRpbWUgcGVyZm9ybWFuY2UgYnkgYnJlYWtpbmcNCmxvY2FsaXR5LW9mLXJl
ZmVyZW5jZSBpbnNpZGUgYSBUVS4NCg0KV2hhdCB3b3VsZCBtYWtlIGFuIGltcHJvdmVtZW50IChp
ZiB0aGlzIGlzbid0IGhvdyBpdCBhbHJlYWR5IHdvcmtzKSBpcw0KaGF2aW5nIGVhY2ggVFUgc29y
dCBieSBhbGlnbm1lbnQgb24gaXRzIG93biwgdGhlbiBsaW5rIGluIG9yZGVyLg0KDQp+QW5kcmV3
DQo=


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 19:09:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 19:09:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288044.488452 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nS1gv-0004FP-W3; Wed, 09 Mar 2022 19:09:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288044.488452; Wed, 09 Mar 2022 19:09:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nS1gv-0004FI-T0; Wed, 09 Mar 2022 19:09:45 +0000
Received: by outflank-mailman (input) for mailman id 288044;
 Wed, 09 Mar 2022 19:09:44 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nS1gu-0004FB-Ii
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 19:09:44 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nS1gt-00032G-OM; Wed, 09 Mar 2022 19:09:43 +0000
Received: from 54-240-197-225.amazon.com ([54.240.197.225]
 helo=[10.95.155.231]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nS1gt-0007Eo-HH; Wed, 09 Mar 2022 19:09:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=LMLUIzHcrhPLCpNrIagUAPfG48xyvEA9nKowKMRjMhY=; b=exYvH+X4DMhiNFejCW5uRQ0oC/
	BCXIncFK03refPRoDYqqnzrvWnuzVoEANaHrR5wk4Lvm/PxYQhJxkocGd9/GTXdgGfVZA7gw701ES
	j2zJrqcgP447uhRQMnFWfQc/TZ+eSVfY9TlII3uc6dhQtr8akLTva/yesEiIjugMGGJU=;
Message-ID: <2f357e1a-df8e-6326-267e-4d12e82e1a5f@xen.org>
Date: Wed, 9 Mar 2022 19:09:40 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH 04/36] xen/arm: add parsing function for cache coloring
 configuration
To: Marco Solieri <marco.solieri@minervasys.tech>,
 xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-5-marco.solieri@minervasys.tech>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220304174701.1453977-5-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 04/03/2022 17:46, Marco Solieri wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> Add three new bootargs allowing configuration of cache coloring support
> for Xen:

I would prefer if documentation of each command line is part of the 
patch introducing them. This would help understanding some of the 
parameters.

> - way_size: The size of a LLC way in bytes. This value is mainly used
>    to calculate the maximum available colors on the platform.

We should only add command line option when they are a strong use case. 
In documentation, you wrote that someone may want to overwrite the way 
size for "specific needs".

Can you explain what would be those needs?

> - dom0_colors: The coloring configuration for Dom0, which also acts as
>    default configuration for any DomU without an explicit configuration.
> - xen_colors: The coloring configuration for the Xen hypervisor itself.
> 
> A cache coloring configuration consists of a selection of colors to be
> assigned to a VM or to the hypervisor. It is represented by a set of
> ranges. Add a common function that parses a string with a
> comma-separated set of hyphen-separated ranges like "0-7,15-16" and
> returns both: the number of chosen colors, and an array containing their
> ids.
> Currently we support platforms with up to 128 colors.

Is there any reason this value is hardcoded in Xen rather than part of 
the Kconfig?

> 
> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
> Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
> ---
>   xen/arch/arm/Kconfig                |   5 ++
>   xen/arch/arm/Makefile               |   2 +-
>   xen/arch/arm/coloring.c             | 131 ++++++++++++++++++++++++++++
>   xen/arch/arm/include/asm/coloring.h |  28 ++++++
>   4 files changed, 165 insertions(+), 1 deletion(-)
>   create mode 100644 xen/arch/arm/coloring.c
>   create mode 100644 xen/arch/arm/include/asm/coloring.h
> 
> diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig
> index ecfa6822e4..f0f999d172 100644
> --- a/xen/arch/arm/Kconfig
> +++ b/xen/arch/arm/Kconfig
> @@ -97,6 +97,11 @@ config HARDEN_BRANCH_PREDICTOR
>   
>   	  If unsure, say Y.
>   
> +config COLORING
> +	bool "L2 cache coloring"
> +	default n

This wants to be gated with EXPERT for time-being. SUPPORT.MD woudl
Furthermore, I think this wants to be gated with EXPERT for the time-being.

> +	depends on ARM_64

Why is this limited to arm64?

> +
>   config TEE
>   	bool "Enable TEE mediators support (UNSUPPORTED)" if UNSUPPORTED
>   	default n
> diff --git a/xen/arch/arm/Makefile b/xen/arch/arm/Makefile
> index c993ce72a3..581896a528 100644
> --- a/xen/arch/arm/Makefile
> +++ b/xen/arch/arm/Makefile
> @@ -66,7 +66,7 @@ obj-$(CONFIG_SBSA_VUART_CONSOLE) += vpl011.o
>   obj-y += vsmc.o
>   obj-y += vpsci.o
>   obj-y += vuart.o
> -
> +obj-$(CONFIG_COLORING) += coloring.o

Please keep the newline before extra-y. The file are meant to be ordered 
alphabetically. So this should be inserted in the correct position.

>   extra-y += xen.lds
>   
>   #obj-bin-y += ....o
> diff --git a/xen/arch/arm/coloring.c b/xen/arch/arm/coloring.c
> new file mode 100644
> index 0000000000..8f1cff6efb
> --- /dev/null
> +++ b/xen/arch/arm/coloring.c
> @@ -0,0 +1,131 @@
> +/*
> + * xen/arch/arm/coloring.c
> + *
> + * Coloring support for ARM
> + *
> + * Copyright (C) 2019 Xilinx Inc.
> + *
> + * Authors:
> + *    Luca Miccio <lucmiccio@gmail.com>
> + *
> + * This program is free software; you can redistribute it and/or modify
> + * it under the terms of the GNU General Public License version 2 as
> + * published by the Free Software Foundation.
> + *
> + * This program is distributed in the hope that it will be useful,
> + * but WITHOUT ANY WARRANTY; without even the implied warranty of
> + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
> + * GNU General Public License for more details.
> + *
> + * You should have received a copy of the GNU General Public License
> + * along with this program.  If not, see <http://www.gnu.org/licenses/>.
> + */
> +#include <xen/init.h>
> +#include <xen/types.h>
> +#include <xen/lib.h>
> +#include <xen/errno.h>
> +#include <xen/param.h>
> +#include <asm/coloring.h>

The includes should be ordered so <xen/...> are first, then <asm/...>.
They are also ordered alphabetically within their own category.

> +
> +/* Number of color(s) assigned to Xen */
> +static uint32_t xen_col_num;
> +/* Coloring configuration of Xen as bitmask */
> +static uint32_t xen_col_mask[MAX_COLORS_CELLS];
Xen provides helpers to create and use bitmaps (see 
include/xen/bitmap.h). Can you use?

> +
> +/* Number of color(s) assigned to Dom0 */
> +static uint32_t dom0_col_num;
> +/* Coloring configuration of Dom0 as bitmask */
> +static uint32_t dom0_col_mask[MAX_COLORS_CELLS];
> +
> +static uint64_t way_size;
> +
> +/*************************
> + * PARSING COLORING BOOTARGS
> + */
> +
> +/*
> + * Parse the coloring configuration given in the buf string, following the
> + * syntax below, and store the number of colors and a corresponding mask in
> + * the last two given pointers.
> + *
> + * COLOR_CONFIGURATION ::= RANGE,...,RANGE
> + * RANGE               ::= COLOR-COLOR
> + *
> + * Example: "2-6,15-16" represents the set of colors: 2,3,4,5,6,15,16.
> + */
> +static int parse_color_config(
> +    const char *buf, uint32_t *col_mask, uint32_t *col_num)


Coding style. We usually declarate paremeters on the same line as the 
function name. If they can't fit on the same line, then we split in two 
with the parameter aligned to the first paremeter.

> +{
> +    int start, end, i;

AFAICT, none of the 3 variables will store negative values. So can they 
be unsigned?

> +    const char* s = buf;
> +    unsigned int offset;
> +
> +    if ( !col_mask || !col_num )
> +        return -EINVAL;
> +
> +    *col_num = 0;
> +    for ( i = 0; i < MAX_COLORS_CELLS; i++ )
> +        col_mask[i] = 0;
dom0_col_mask and xen_col_mask are already zeroed. I would also expect 
the same for dynamically allocated bitmask. So can this be dropped?

> +
> +    while ( *s != '\0' )
> +    {
> +        if ( *s != ',' )
> +        {
> +            start = simple_strtoul(s, &s, 0);
> +
> +            /* Ranges are hyphen-separated */
> +            if ( *s != '-' )
> +                goto fail;
> +            s++;
> +
> +            end = simple_strtoul(s, &s, 0);
> +
> +            for ( i = start; i <= end; i++ )
> +            {
> +                offset = i / 32;
> +                if ( offset > MAX_COLORS_CELLS )
> +                    goto fail;
> +
> +                if ( !(col_mask[offset] & (1 << i % 32)) )
> +                    *col_num += 1;
> +                col_mask[offset] |= (1 << i % 32);
> +            }
> +        }
> +        else
> +            s++;
> +    }
> +
> +    return *s ? -EINVAL : 0;
> +fail:
> +    return -EINVAL;
> +}
> +
> +static int __init parse_way_size(const char *s)
> +{
> +    way_size = simple_strtoull(s, &s, 0);
> +
> +    return *s ? -EINVAL : 0;
> +}
> +custom_param("way_size", parse_way_size);
> +
> +static int __init parse_dom0_colors(const char *s)
> +{
> +    return parse_color_config(s, dom0_col_mask, &dom0_col_num);
> +}
> +custom_param("dom0_colors", parse_dom0_colors);
> +
> +static int __init parse_xen_colors(const char *s)
> +{
> +    return parse_color_config(s, xen_col_mask, &xen_col_num);
> +}
> +custom_param("xen_colors", parse_xen_colors);
> +
> +/*
> + * Local variables:
> + * mode: C
> + * c-file-style: "BSD"
> + * c-basic-offset: 4
> + * tab-width: 4
> + * indent-tabs-mode: nil
> + * End:
> + */
> diff --git a/xen/arch/arm/include/asm/coloring.h b/xen/arch/arm/include/asm/coloring.h
> new file mode 100644
> index 0000000000..60958d1244
> --- /dev/null
> +++ b/xen/arch/arm/include/asm/coloring.h
> @@ -0,0 +1,28 @@
> +/*
> + * xen/arm/include/asm/coloring.h
> + *
> + * Coloring support for ARM
> + *
> + * Copyright (C) 2019 Xilinx Inc.
> + *
> + * Authors:
> + *    Luca Miccio <lucmiccio@gmail.com>
> + *
> + * This program is free software; you can redistribute it and/or modify
> + * it under the terms of the GNU General Public License version 2 as
> + * published by the Free Software Foundation.
> + *
> + * This program is distributed in the hope that it will be useful,
> + * but WITHOUT ANY WARRANTY; without even the implied warranty of
> + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
> + * GNU General Public License for more details.
> + *
> + * You should have received a copy of the GNU General Public License
> + * along with this program.  If not, see <http://www.gnu.org/licenses/>.
> + */
> +#ifndef __ASM_ARM_COLORING_H__
> +#define __ASM_ARM_COLORING_H__
> +
> +#define MAX_COLORS_CELLS 4
> +
> +#endif /* !__ASM_ARM_COLORING_H__ */

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 20:04:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 20:04:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288053.488462 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nS2XP-0001my-Px; Wed, 09 Mar 2022 20:03:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288053.488462; Wed, 09 Mar 2022 20:03:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nS2XP-0001mr-Mz; Wed, 09 Mar 2022 20:03:59 +0000
Received: by outflank-mailman (input) for mailman id 288053;
 Wed, 09 Mar 2022 20:03:58 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nS2XO-0001mh-Qi; Wed, 09 Mar 2022 20:03:58 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nS2XO-000409-KI; Wed, 09 Mar 2022 20:03:58 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nS2XN-0007hp-Vi; Wed, 09 Mar 2022 20:03:58 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nS2XN-0001Bv-VE; Wed, 09 Mar 2022 20:03:57 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=L8+EqG0iCt0wiWTrCOK8qmmjyKNWRA7bu+Giik4s9ok=; b=cxQZF3+idNtyNF9ehlBgcNXyTR
	Y9/tani+hw4EMjC0z2/6agIaTB3Vf/J2wca/cmKfT05bEiozz9X5LW6akkgNeGeJKhdQ8uCsR8cBN
	KD9zu7zA6xcnV9PUCeG4DBVWmLt1KuZc+qrmgUPMPfuJEey4amZXPtq8FiEOuSsfSn9s=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168495-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168495: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=5142dc5c25e317c208e3dc16d16b664b9f05dab5
X-Osstest-Versions-That:
    xen=8d03080d2a339840d3a59e0932a94f804e45110d
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 09 Mar 2022 20:03:57 +0000

flight 168495 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168495/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  5142dc5c25e317c208e3dc16d16b664b9f05dab5
baseline version:
 xen                  8d03080d2a339840d3a59e0932a94f804e45110d

Last test of basis   168487  2022-03-08 19:02:58 Z    1 days
Testing same since   168495  2022-03-09 16:03:18 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Alex Olson <Alex.Olson@starlab.io>
  Bjoern Doebel <doebel@amazon.de>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  Roger Pau Monné <roger.pau@citrix.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   8d03080d2a..5142dc5c25  5142dc5c25e317c208e3dc16d16b664b9f05dab5 -> smoke


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 20:12:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 20:12:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288068.488498 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nS2fx-0003XL-W7; Wed, 09 Mar 2022 20:12:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288068.488498; Wed, 09 Mar 2022 20:12:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nS2fx-0003XE-So; Wed, 09 Mar 2022 20:12:49 +0000
Received: by outflank-mailman (input) for mailman id 288068;
 Wed, 09 Mar 2022 20:12:48 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nS2fw-0003X8-MK
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 20:12:48 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nS2fw-0004AH-1k; Wed, 09 Mar 2022 20:12:48 +0000
Received: from 54-240-197-225.amazon.com ([54.240.197.225]
 helo=[10.95.155.231]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nS2fv-0002XW-Rc; Wed, 09 Mar 2022 20:12:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=JNjqY7BWV/QrjUDQuOSLAYaNkz8Cn0KW7dVGSssa7Vs=; b=KoRn1E8BZZfe3xp5a3LFc0Il2N
	oMy9lhWHqIAOKnD4RRjmNn13gEs/SBkvpdwZ3VwnQNoCcim2/MO16vC+ud4WXJWmB0XFFXqY9Svyk
	mj3Un+D5mSkycoUt3hvPnoIco0QqQd+wFYjb/2IOBDjoPrwP6e/T8n1BIKHZEnP63opI=;
Message-ID: <0509b0eb-0f3b-8a26-4202-0011201c3fac@xen.org>
Date: Wed, 9 Mar 2022 20:12:44 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH 05/36] xen/arm: compute LLC way size by hardware
 inspection
To: Marco Solieri <marco.solieri@minervasys.tech>,
 xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-6-marco.solieri@minervasys.tech>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220304174701.1453977-6-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 04/03/2022 17:46, Marco Solieri wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> The size of the LLC way is a crucial parameter for the cache coloring
> support, since it determines the maximum number of available colors on
> the platform.  This parameter can currently be retrieved only from
> the way_size bootarg and it is prone to misconfiguration nullifying the
> coloring mechanism and breaking cache isolation.

Reading this sentence, I think the command line option should be 
introduced after this patch (assuming this is necessary). This will 
avoid undoing/fixing a "bug" that was introduced by the same series.

> 
> Add an alternative and more safe method to retrieve the way size by
> directly asking the hardware, namely using CCSIDR_EL1 and CSSELR_EL1
> registers.
> 
> This method has to check also if at least L2 is implemented in the
> hardware since there are scenarios where only L1 cache is availble, e.g,

In the previous patch, the description for the Kconfig suggests that the 
cache coloring will only happen on L2. But here you are also adding L1. 
So I think the documentation needs to be updated.

Typo: s/availble/available/

> QEMU.
> 
> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
> Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
> ---
>   xen/arch/arm/coloring.c | 76 +++++++++++++++++++++++++++++++++++++++++
>   1 file changed, 76 insertions(+)
> 
> diff --git a/xen/arch/arm/coloring.c b/xen/arch/arm/coloring.c
> index 8f1cff6efb..e3d490b453 100644
> --- a/xen/arch/arm/coloring.c
> +++ b/xen/arch/arm/coloring.c
> @@ -25,7 +25,10 @@
>   #include <xen/lib.h>
>   #include <xen/errno.h>
>   #include <xen/param.h>
> +


NIT: I think this belongs to patch #4.

> +#include <asm/sysregs.h>

Please order the include alphabetically.

>   #include <asm/coloring.h> > +#include <asm/io.h>

You don't seem to use read*/write* helper. So why do you need this?
>   
>   /* Number of color(s) assigned to Xen */
>   static uint32_t xen_col_num;
> @@ -39,6 +42,79 @@ static uint32_t dom0_col_mask[MAX_COLORS_CELLS];
>   
>   static uint64_t way_size;
>   
> +#define CTR_LINESIZE_MASK 0x7
> +#define CTR_SIZE_SHIFT 13
> +#define CTR_SIZE_MASK 0x3FFF
> +#define CTR_SELECT_L2 1 << 1
> +#define CTR_SELECT_L3 1 << 2
> +#define CTR_CTYPEn_MASK 0x7
> +#define CTR_CTYPE2_SHIFT 3
> +#define CTR_CTYPE3_SHIFT 6
> +#define CTR_LLC_ON 1 << 2
> +#define CTR_LOC_SHIFT 24
> +#define CTR_LOC_MASK 0x7
> +#define CTR_LOC_L2 1 << 1
> +#define CTR_LOC_NOT_IMPLEMENTED 1 << 0

We already define some CTR_* in processor.h. Please any extra one there.

> +
> +
> +/* Return the way size of last level cache by asking the hardware */
> +static uint64_t get_llc_way_size(void)

This will break compilation as you are introducing get_llc_way_size() 
but not using it.

I would suggest to fold this patch in the next one.

> +{
> +    uint32_t cache_sel = READ_SYSREG64(CSSELR_EL1);

The return type for READ_SYSREG64() is uint64_t. That said, the 
equivalent register on 32bit is CSSELR which is 32-bit. So this should 
be READ_SYSREG() and the matching type is register_t.

> +    uint32_t cache_global_info = READ_SYSREG64(CLIDR_EL1);

Same remark here. Except the matching register is CLIDR.

> +    uint32_t cache_info;
> +    uint32_t cache_line_size;
> +    uint32_t cache_set_num;
> +    uint32_t cache_sel_tmp;
> +
> +    printk(XENLOG_INFO "Get information on LLC\n");
> +    printk(XENLOG_INFO "Cache CLIDR_EL1: 0x%"PRIx32"\n", cache_global_info);
> +
> +    /* Check if at least L2 is implemented */
> +    if ( ((cache_global_info >> CTR_LOC_SHIFT) & CTR_LOC_MASK)

This is a bit confusing. cache_global_info is storing CLIDR_* but you 
are using macro starting with CTR_*.

Did you intend to name the macros CLIDR_*?

The same remark goes for the other use of CTR_ below. The name of the 
macros should match the register they are meant to be used on.

> +        == CTR_LOC_NOT_IMPLEMENTED )

I am a bit confused this the check here. Shouln't you check that Ctype2 
is notn 0 instead?

> +    {
> +        printk(XENLOG_ERR "ERROR: L2 Cache not implemented\n");
> +        return 0;
> +    }
> +
> +    /* Save old value of CSSELR_EL1 */
> +    cache_sel_tmp = cache_sel;
> +
> +    /* Get LLC index */
> +    if ( ((cache_global_info >> CTR_CTYPE2_SHIFT) & CTR_CTYPEn_MASK)
> +        == CTR_LLC_ON )

I don't understand this check. You define CTR_LLC_ON to 1 << 2. So it 
would be 0b10. From the field you checked, this value mean "Data Cache 
Only". How is this indicating the which level to chose?

But then in patch #4 you wrote we will do cache coloring on L2. So why 
are we selecting L3?

> +        cache_sel = CTR_SELECT_L2;
> +    else
> +        cache_sel = CTR_SELECT_L3;
> +
> +    printk(XENLOG_INFO "LLC selection: %u\n", cache_sel);
> +    /* Select the correct LLC in CSSELR_EL1 */
> +    WRITE_SYSREG64(cache_sel, CSSELR_EL1);

This should be WRITE_SYSREG().

> +
> +    /* Ensure write */
> +    isb();
> +
> +    /* Get info about the LLC */
> +    cache_info = READ_SYSREG64(CCSIDR_EL1);
> +
> +    /* ARM TRM: (Log2(Number of bytes in cache line)) - 4. */

 From my understanding "TRM" in the Arm world refers to a specific 
processor. In this case we want to quote the spec. So we usually say 
"Arm Arm".

> +    cache_line_size = 1 << ((cache_info & CTR_LINESIZE_MASK) + 4);
> +    /* ARM TRM: (Number of sets in cache) - 1 */
> +    cache_set_num = ((cache_info >> CTR_SIZE_SHIFT) & CTR_SIZE_MASK) + 1;

The shifts here are assuming that FEAT_CCIDX is not implemented. I would 
be OK if we decide to not support cache coloring on such platform. 
However, we need to return an error if a user tries to use cache 
coloring on such platform.

> +
> +    printk(XENLOG_INFO "Cache line size: %u bytes\n", cache_line_size);
> +    printk(XENLOG_INFO "Cache sets num: %u\n", cache_set_num);
> +
> +    /* Restore value in CSSELR_EL1 */
> +    WRITE_SYSREG64(cache_sel_tmp, CSSELR_EL1);
> +
> +    /* Ensure write */
> +    isb();
> +
> +    return (cache_line_size * cache_set_num);
> +}
> +
>   /*************************
>    * PARSING COLORING BOOTARGS
>    */

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 20:15:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 20:15:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288073.488509 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nS2it-0004AF-E6; Wed, 09 Mar 2022 20:15:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288073.488509; Wed, 09 Mar 2022 20:15:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nS2it-0004A8-Ak; Wed, 09 Mar 2022 20:15:51 +0000
Received: by outflank-mailman (input) for mailman id 288073;
 Wed, 09 Mar 2022 20:15:50 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nS2ir-00049x-Vl; Wed, 09 Mar 2022 20:15:49 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nS2ir-0004Eg-TV; Wed, 09 Mar 2022 20:15:49 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nS2ir-00089e-CD; Wed, 09 Mar 2022 20:15:49 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nS2ir-0006bW-Bm; Wed, 09 Mar 2022 20:15:49 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=SmAQULHrcbm0CTVOvs+Pm/spVVm16dnmC2+NfxF/B+0=; b=rJ328I+68Ca3N4aWz44367O5QB
	RPBRmrFWbdg5lmcWOtbEvyHTczH9C6qrv6Vp4x4jfTifNXTsxR15F/LufWVbYnLHvWILKrJdaj9Fw
	t6rW7o9BRFd8H2sBis2Dr9ZL8fUMcbrk8ri8jhzJRxSW31vN9VukogiRxzOgEwyOPZ5E=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168483-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.15-testing test] 168483: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:guest-start.2:fail:heisenbug
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=1b50f41b3bd800eb72064063da0c64b86d629f3a
X-Osstest-Versions-That:
    xen=084bf6b19a7645e05878afcba88373534b06bb18
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 09 Mar 2022 20:15:49 +0000

flight 168483 xen-4.15-testing real [real]
flight 168497 xen-4.15-testing real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168483/
http://logs.test-lab.xenproject.org/osstest/logs/168497/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 15 guest-start.2 fail pass in 168497-retest

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168135
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168135
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168135
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168135
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168135
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168135
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168135
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168135
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168135
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168135
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168135
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168135
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  1b50f41b3bd800eb72064063da0c64b86d629f3a
baseline version:
 xen                  084bf6b19a7645e05878afcba88373534b06bb18

Last test of basis   168135  2022-02-16 15:11:54 Z   21 days
Testing same since   168483  2022-03-08 18:08:22 Z    1 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bertrand Marquis <bertrand.marquis@arm.com>
  Julien Grall <julien@xen.org>
  Rahul Singh <rahul.singh@arm.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        fail    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   084bf6b19a..1b50f41b3b  1b50f41b3bd800eb72064063da0c64b86d629f3a -> stable-4.15


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 20:17:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 20:17:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288083.488519 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nS2kL-0004qi-UD; Wed, 09 Mar 2022 20:17:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288083.488519; Wed, 09 Mar 2022 20:17:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nS2kL-0004qb-RO; Wed, 09 Mar 2022 20:17:21 +0000
Received: by outflank-mailman (input) for mailman id 288083;
 Wed, 09 Mar 2022 20:17:21 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nS2kL-0004qV-C5
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 20:17:21 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nS2kK-0004GI-Ur; Wed, 09 Mar 2022 20:17:20 +0000
Received: from 54-240-197-225.amazon.com ([54.240.197.225]
 helo=[10.95.155.231]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nS2kK-0002du-P5; Wed, 09 Mar 2022 20:17:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=DeOcCELI9sG6axh7pTB3g2EfK53JgnjI3EtSfGxe3YA=; b=Yf/O325E0LxEDkqlCjYTtwXJfc
	wrywoaIO4vG0JHQsthtntO+wjuT9R/To4NknkJoNZyNWsjcDLxhZ6dNeXWxv7ocaMYNhvkxiLO3XB
	Y+DmDA0/98HDcrjEQtXbbBfuh8/sFK9hgSrzUOyoq77U62LmKBvstHMQQ/SQmYsZGpdA=;
Message-ID: <55fb729a-c52e-0cca-3fa0-96dbffdee6de@xen.org>
Date: Wed, 9 Mar 2022 20:17:18 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH 10/36] xen/arch: check color selection function
To: Marco Solieri <marco.solieri@minervasys.tech>,
 xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-11-marco.solieri@minervasys.tech>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220304174701.1453977-11-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 04/03/2022 17:46, Marco Solieri wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> Dom0 color configuration is parsed in the Xen command line. Add an
> helper function to check the user selection. If no configuration is
> provided by the user, all the available colors supported by the
> hardware will be assigned to dom0.

 From the commit message, I was expecting the function to be used. Can 
this be introduced when you introduce its user?

> 
> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
> ---
>   xen/arch/arm/coloring.c             | 17 +++++++++++++++++
>   xen/arch/arm/include/asm/coloring.h |  8 ++++++++
>   2 files changed, 25 insertions(+)
> 
> diff --git a/xen/arch/arm/coloring.c b/xen/arch/arm/coloring.c
> index f6e6d09477..382d558021 100644
> --- a/xen/arch/arm/coloring.c
> +++ b/xen/arch/arm/coloring.c
> @@ -179,6 +179,23 @@ uint32_t *setup_default_colors(uint32_t *col_num)
>       return NULL;
>   }
>   
> +bool check_domain_colors(struct domain *d)
> +{
> +    int i;
> +    bool ret = false;
> +
> +    if ( !d )
> +        return ret;
> +
> +    if ( d->max_colors > max_col_num )
> +        return ret;
> +
> +    for ( i = 0; i < d->max_colors; i++ )
> +        ret |= (d->colors[i] > (max_col_num - 1));
> +
> +    return !ret;
> +}
> +
>   bool __init coloring_init(void)
>   {
>       int i;
> diff --git a/xen/arch/arm/include/asm/coloring.h b/xen/arch/arm/include/asm/coloring.h
> index 8f24acf082..fdd46448d7 100644
> --- a/xen/arch/arm/include/asm/coloring.h
> +++ b/xen/arch/arm/include/asm/coloring.h
> @@ -26,8 +26,16 @@
>   #define MAX_COLORS_CELLS 4
>   
>   #ifdef CONFIG_COLORING
> +#include <xen/sched.h>
> +
>   bool __init coloring_init(void);
>   
> +/*
> + * Check colors of a given domain.
> + * Return true if check passed, false otherwise.
> + */
> +bool check_domain_colors(struct domain *d);
> +
>   /*
>    * Return an array with default colors selection and store the number of
>    * colors in @param col_num. The array selection will be equal to the dom0

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 20:29:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 20:29:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288089.488531 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nS2wL-0006N2-2F; Wed, 09 Mar 2022 20:29:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288089.488531; Wed, 09 Mar 2022 20:29:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nS2wK-0006Mv-Uy; Wed, 09 Mar 2022 20:29:44 +0000
Received: by outflank-mailman (input) for mailman id 288089;
 Wed, 09 Mar 2022 20:29:44 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nS2wK-0006Mp-1k
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 20:29:44 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nS2wJ-0004VV-KN; Wed, 09 Mar 2022 20:29:43 +0000
Received: from 54-240-197-225.amazon.com ([54.240.197.225]
 helo=[10.95.155.231]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nS2wJ-0003Bs-Dg; Wed, 09 Mar 2022 20:29:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=r2aU9EIQeY9YmLinym1tZ4AHJ4iTxDziuWTVJWSFMJI=; b=au0QTTuFANrTaE0b1wnt4nm83Y
	E6D7gcdJ03GWdhQHqtPFAlnECC7nip90Z8tyQVbvcbk8jvu2DQ57np4TNeY70r63rjd9kzPPOv9rt
	t00Ou4ICUg8tkbQdnaf9wLQ4/pKhzbbQr+ryauR1X2V7UPVWPV7/FQrNwuub4p2bFELE=;
Message-ID: <1ccdd08d-b880-b4d0-30a3-ca7c83eccc70@xen.org>
Date: Wed, 9 Mar 2022 20:29:40 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH 11/36] xen/include: define hypercall parameter for
 coloring
To: Marco Solieri <marco.solieri@minervasys.tech>,
 xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-12-marco.solieri@minervasys.tech>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220304174701.1453977-12-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 04/03/2022 17:46, Marco Solieri wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> During domU creation process the colors selection has to be passed to
> the Xen hypercall.
> This is generally done using what Xen calls GUEST_HANDLE_PARAMS. In this
> case a simple bitmask for the coloring configuration suffices.
> Currently the maximum amount of supported colors is 128.
> Add a new parameter that allows us to pass both the colors bitmask
> and the number of elements in it.
> 
> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
> Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
> ---
>   xen/arch/arm/include/asm/coloring.h | 2 --
>   xen/include/public/arch-arm.h       | 8 ++++++++
I would prefer if the structure is defined in the same patch that will 
use it. This would make easier to figure out if the structure is indeed 
suitable.

>   2 files changed, 8 insertions(+), 2 deletions(-)
> 
> diff --git a/xen/arch/arm/include/asm/coloring.h b/xen/arch/arm/include/asm/coloring.h
> index fdd46448d7..1f7e0dde79 100644
> --- a/xen/arch/arm/include/asm/coloring.h
> +++ b/xen/arch/arm/include/asm/coloring.h
> @@ -23,8 +23,6 @@
>   #ifndef __ASM_ARM_COLORING_H__
>   #define __ASM_ARM_COLORING_H__
>   
> -#define MAX_COLORS_CELLS 4
> -

In general, we should avoid moving code that was introduced within the 
same series.

In this case, I am not convinced we should use a static array to 
communicate the information between the toolstack and Xen.

This would make more difficult for the user to tweak update the number 
of colors.

Instead, I think it should be better to expose to the toolstack the 
number of color supported and allocate a dynamic array.

>   #ifdef CONFIG_COLORING
>   #include <xen/sched.h>
>   
> diff --git a/xen/include/public/arch-arm.h b/xen/include/public/arch-arm.h
> index 94b31511dd..627cc42164 100644
> --- a/xen/include/public/arch-arm.h
> +++ b/xen/include/public/arch-arm.h
> @@ -303,6 +303,12 @@ struct vcpu_guest_context {
>   typedef struct vcpu_guest_context vcpu_guest_context_t;
>   DEFINE_XEN_GUEST_HANDLE(vcpu_guest_context_t);
>   
> +#define MAX_COLORS_CELLS 4
> +struct color_guest_config {
> +    uint32_t max_colors;
> +    uint32_t colors[MAX_COLORS_CELLS];
> +};

This looks like an open-coded version of xenctl_bitmap. Can you have a 
look to use it?

I would expect this will reduce how much code you introduced in the next 
patch.

> +
>   /*
>    * struct xen_arch_domainconfig's ABI is covered by
>    * XEN_DOMCTL_INTERFACE_VERSION.
> @@ -335,6 +341,8 @@ struct xen_arch_domainconfig {
>        *
>        */
>       uint32_t clock_frequency;
> +    /* IN */
> +    struct color_guest_config colors;
>   };
>   #endif /* __XEN__ || __XEN_TOOLS__ */
>   

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 20:34:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 20:34:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288094.488541 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nS31J-0007lp-LC; Wed, 09 Mar 2022 20:34:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288094.488541; Wed, 09 Mar 2022 20:34:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nS31J-0007li-I6; Wed, 09 Mar 2022 20:34:53 +0000
Received: by outflank-mailman (input) for mailman id 288094;
 Wed, 09 Mar 2022 20:34:52 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nS31I-0007lc-9G
 for xen-devel@lists.xenproject.org; Wed, 09 Mar 2022 20:34:52 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nS31H-0004b5-86; Wed, 09 Mar 2022 20:34:51 +0000
Received: from 54-240-197-225.amazon.com ([54.240.197.225]
 helo=[10.95.155.231]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nS31H-0003cm-1L; Wed, 09 Mar 2022 20:34:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=LZ+OQ+X5ZGTkR1tvH3KNAQ7UtKhCZs7tVYOAweZqzLA=; b=7ON+4gzC3VdkKfVjnbnLEIgfVU
	J6rI1bWtvpGEljL2xEge4NaHFDXZGIkGN3GrZA68tcrDxGTSvdia+4dJRdLM7R+MBjOeX0kmvdDfU
	uCeQoPas3s+S9tBNbrBG/RMwBwFpWvKLozSy38FqIi1paXVwatSJvHmcHrs6fJJQrG98=;
Message-ID: <e35c84cc-3bb0-9301-9610-376a18c69af4@xen.org>
Date: Wed, 9 Mar 2022 20:34:48 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH 13/36] xen/arm: A domain is not direct mapped when
 coloring is enabled
To: Marco Solieri <marco.solieri@minervasys.tech>,
 xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-14-marco.solieri@minervasys.tech>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220304174701.1453977-14-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 04/03/2022 17:46, Marco Solieri wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> Based on the intrinsic nature of cache coloring, it is trivial to state
> that each domain that is colored is also not direct mapped.
> Set the directmap variable to false when coloring is enabled.

This is basically fixing a bug that was introduced in the previous 
patch. Please fold it.

> 
> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
> ---
>   xen/arch/arm/domain.c | 2 ++
>   1 file changed, 2 insertions(+)
> 
> diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
> index 33471b3c58..80a6f39464 100644
> --- a/xen/arch/arm/domain.c
> +++ b/xen/arch/arm/domain.c
> @@ -785,6 +785,8 @@ int arch_domain_create(struct domain *d,
>   
>       d->max_colors = 0;
>   #ifdef CONFIG_COLORING
> +    d->arch.directmap = false;

We should avoid silently overwriting what the user requested. Instead, 
we should add a check in arch_sanitise_domain_config() to forbid case 
where CDF_directmap is set *and* the number of colors is > 0.

> +
>       /* Setup domain colors */
>       if ( !config->arch.colors.max_colors )
>       {

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Wed Mar 09 20:44:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 09 Mar 2022 20:44:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288099.488553 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nS3AX-0000pN-K2; Wed, 09 Mar 2022 20:44:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288099.488553; Wed, 09 Mar 2022 20:44:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nS3AX-0000pG-GK; Wed, 09 Mar 2022 20:44:25 +0000
Received: by outflank-mailman (input) for mailman id 288099;
 Wed, 09 Mar 2022 20:44:24 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nS3AW-0000p6-4P; Wed, 09 Mar 2022 20:44:24 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nS3AW-0004lu-0l; Wed, 09 Mar 2022 20:44:24 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nS3AV-0001DU-Fg; Wed, 09 Mar 2022 20:44:23 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nS3AV-0000HU-FC; Wed, 09 Mar 2022 20:44:23 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=IDScch39Agxs2Ysqj1L+/3yt5YNQCgUS/5QxwrMG9Qc=; b=GS5VuevKj48WV6iG82dk5/PpcR
	IUuKQYYCpuEZnsKHcVAbIG7rPWBAFSNlYbO7f2PjtgcQXkCNODNXFvIE/VqtOp6lx5tdimSWvwOuL
	Om2uqqdG0m7ePbXatZyy6RNIK/LuTlrT+habXuEYe2PvwAxooa9CJwIahO50Jwh01e+U=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168486-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168486: regressions - FAIL
X-Osstest-Failures:
    linux-linus:build-armhf-pvops:kernel-build:fail:regression
    linux-linus:test-armhf-armhf-xl:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-examine:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-rtds:guest-localmigrate/x10:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=92f90cc9fe0e7a984ea3d4bf3d120e30ba8a2118
X-Osstest-Versions-That:
    linux=ea4424be16887a37735d6550cfd0611528dbe5d9
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 09 Mar 2022 20:44:23 +0000

flight 168486 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168486/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-pvops             6 kernel-build             fail REGR. vs. 168466

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-arndale   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit1   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-cubietruck  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-rtds      1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-vhd       1 build-check(1)               blocked  n/a
 test-armhf-armhf-examine      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-rtds     20 guest-localmigrate/x10       fail  like 168466
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168466
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168466
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168466
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168466
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168466
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                92f90cc9fe0e7a984ea3d4bf3d120e30ba8a2118
baseline version:
 linux                ea4424be16887a37735d6550cfd0611528dbe5d9

Last test of basis   168466  2022-03-07 20:11:19 Z    2 days
Testing same since   168486  2022-03-08 18:12:42 Z    1 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Borislav Petkov <bp@suse.de>
  Catalin Marinas <catalin.marinas@arm.com>
  James Morse <james.morse@arm.com>
  Jeff Layton <jlayton@kernel.org>
  Josh Poimboeuf <jpoimboe@redhat.com>
  Kim Phillips <kim.phillips@amd.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Miklos Szeredi <mszeredi@redhat.com>
  Peter Zijlstra (Intel) <peterz@infradead.org>
  Peter Zijlstra <peterz@infradead.org>
  Russell King (Oracle) <rmk+kernel@armlinux.org.uk>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            fail    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  blocked 
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  blocked 
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  blocked 
 test-armhf-armhf-xl-cubietruck                               blocked 
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     blocked 
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                blocked 
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-amd64-xl-rtds                                     fail    
 test-armhf-armhf-xl-rtds                                     blocked 
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 814 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 10 00:54:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 00:54:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288113.488564 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nS74N-00085w-Ai; Thu, 10 Mar 2022 00:54:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288113.488564; Thu, 10 Mar 2022 00:54:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nS74N-00085p-5w; Thu, 10 Mar 2022 00:54:19 +0000
Received: by outflank-mailman (input) for mailman id 288113;
 Thu, 10 Mar 2022 00:54:17 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nS74L-00085f-MB; Thu, 10 Mar 2022 00:54:17 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nS74L-00011Z-I5; Thu, 10 Mar 2022 00:54:17 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nS74L-00053L-4R; Thu, 10 Mar 2022 00:54:17 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nS74L-0006tf-3q; Thu, 10 Mar 2022 00:54:17 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=HuKUOUeIa5HBWC7huC65kd+4mRNhN2hZSZ0EoPk5vnE=; b=0R6ahaCt5Nyy8JBRsHcY/53N3I
	HK3wSAFsSLnNYHUD1St6NFjIKdX5mHw5oDWGP47+UFsaqytiYmFxsIyxRBjtFdocqyP5GJWxDX9fQ
	BshObEKspvmeHRcdu3BZlvJlisxSIgPrip9H2i1nhlKp8aBDx/4hwxH/j73Q+sWkZy5g=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168485-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-5.4 test] 168485: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-5.4:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=e7d1268f5671aa524007f68f458aee185d93fa04
X-Osstest-Versions-That:
    linux=866ae42cf4788c8b18de6bda0a522362702861d7
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 10 Mar 2022 00:54:17 +0000

flight 168485 linux-5.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168485/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168334
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168334
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168334
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168334
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168334
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168334
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168334
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168334
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168334
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168334
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168334
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168334
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                e7d1268f5671aa524007f68f458aee185d93fa04
baseline version:
 linux                866ae42cf4788c8b18de6bda0a522362702861d7

Last test of basis   168334  2022-03-02 11:11:31 Z    7 days
Testing same since   168485  2022-03-08 18:13:43 Z    1 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Alan Stern <stern@rowland.harvard.edu>
  Alyssa Ross <hi@alyssa.is>
  Andrew Morton <akpm@linux-foundation.org>
  Antony Antony <antony.antony@secunet.com>
  Ard Biesheuvel <ardb@kernel.org>
  Barry Song <song.bao.hua@hisilicon.com>
  Benjamin Beichler <benjamin.beichler@uni-rostock.de>
  Benjamin Tissoires <benjamin.tissoires@redhat.com>
  Brian Norris <briannorris@chromium.org>
  Charles Keepax <ckeepax@opensource.cirrus.com>
  Corinna Vinschen <vinschen@redhat.com>
  D. Wythe <alibuda@linux.alibaba.com>
  Damien Le Moal <damien.lemoal@opensource.wdc.com>
  Daniele Palmas <dnlplm@gmail.com>
  dann frazier <dann.frazier@canonical.com>
  David S. Miller <davem@davemloft.net>
  David Sterba <dsterba@suse.com>
  Dietmar Eggemann <dietmar.eggemann@arm.com>
  Dmitry Torokhov <dmitry.torokhov@gmail.com>
  Eric Anholt <eric@anholt.net>
  Eric Dumazet <edumazet@google.com>
  Fabio Estevam <festevam@denx.de>
  Filipe Manana <fdmanana@suse.com>
  Florian Fainelli <f.fainelli@gmail.com>
  Florian Westphal <fw@strlen.de>
  Greg Kroah-Hartman <gregkh@linuxfoundation.org>
  Hangyu Hua <hbh25y@gmail.com>
  Hans de Goede <hdegoede@redhat.com>
  Heiko Stuebner <heiko@sntech.de>
  Huang Pei <huangpei@loongson.cn>
  Hugh Dickins <hughd@google.com>
  Hulk Robot <hulkrobot@huawei.com>
  Ingo Molnar <mingo@kernel.org>
  Jacob Keller <jacob.e.keller@intel.com>
  JaeMan Park <jaeman@google.com>
  Jakub Kicinski <kuba@kernel.org>
  Jann Horn <jannh@google.com>
  Jens Axboe <axboe@kernel.dk>
  Jia-Ju Bai <baijiaju1990@gmail.com>
  Jiasheng Jiang <jiasheng@iscas.ac.cn>
  Jiri Bohac <jbohac@suse.cz>
  Jiri Kosina <jkosina@suse.cz>
  Johannes Berg <johannes.berg@intel.com>
  Johannes Stezenbach <js@sig21.net>
  John Paul Adrian Glaubitz <glaubitz@physik.fu-berlin.de>
  Jon Hunter <jonathanh@nvidia.com>
  José Expósito <jose.exposito89@gmail.com>
  Kai Vehmanen <kai.vehmanen@linux.intel.com>
  Konrad Jankowski <konrad0.jankowski@intel.com>
  Leon Romanovsky <leonro@nvidia.com>
  Li Yang <leoyang.li@nxp.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Linux Kernel Functional Testing <lkft@linaro.org>
  Maciej Fijalkowski <maciej.fijalkowski@intel.com>
  Marc Kleine-Budde <mkl@pengutronix.de>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Marek Vasut <marex@denx.de>
  Mark Brown <broonie@kernel.org>
  Masami Hiramatsu <mhiramat@kernel.org>
  Mateusz Palczewski <mateusz.palczewski@intel.com>
  Maurice Baijens <maurice.baijens@ellips.com>
  Michal Simek <michal.simek@xilinx.com>
  Naama Meir <naamax.meir@linux.intel.com>
  Nicolas Escande <nico.escande@gmail.com>
  Oleksandr Natalenko <oleksandr@redhat.com>
  Pablo Neira Ayuso <pablo@netfilter.org>
  Peter Hutterer <peter.hutterer@who-t.net>
  Peter Zijlstra (Intel) <peterz@infradead.org>
  Phani Burra <phani.r.burra@intel.com>
  Randy Dunlap <rdunlap@infradead.org>
  Remi Pommarel <repk@triplefau.lt>
  Ronnie Sahlberg <lsahlber@redhat.com>
  Russell King (Oracle) <rmk+kernel@armlinux.org.uk>
  Sandeep Penigalapati <sandeep.penigalapati@intel.com>
  Sasha Levin <sashal@kernel.org>
  Sasha Neftin <sasha.neftin@intel.com>
  Sergei Trofimovich <slyfox@gentoo.org>
  Sergey Shtylyov <s.shtylyov@omp.ru>
  Shuah Khan <skhan@linuxfoundation.org>
  Sidong Yang <realwakka@gmail.com>
  Simon Wunderlich <sw@simonwunderlich.de>
  Slawomir Laba <slawomirx.laba@intel.com>
  Stefan Wahren <stefan.wahren@i2se.com>
  Steffen Klassert <steffen.klassert@secunet.com>
  Steve French <stfrench@microsoft.com>
  Steven Rostedt (Google) <rostedt@goodmis.org>
  Sudeep Holla <sudeep.holla@arm.com>
  Sudip Mukherjee <sudip.mukherjee@codethink.co.uk>
  Sudip Mukherjee <sudipm.mukherjee@gmail.com>
  Sukadev Bhattiprolu <sukadev@linux.ibm.com>
  Sven Eckelmann <sven@narfation.org>
  Takashi Iwai <tiwai@suse.de>
  Tony Nguyen <anthony.l.nguyen@intel.com>
  Valentin Schneider <valentin.schneider@arm.com>
  Vincent Guittot <vincent.guittot@linaro.org>
  Vincent Mailhol <mailhol.vincent@wanadoo.fr>
  Vinod Koul <vkoul@kernel.org>
  Vladimir Oltean <vladimir.oltean@nxp.com>
  William Mahon <wmahon@chromium.org>
  Wolfram Sang <wsa@kernel.org>
  Ye Bin <yebin10@huawei.com>
  Yongzhi Liu <lyz_cs@pku.edu.cn>
  Zhen Ni <nizhen@uniontech.com>
  Zheyu Ma <zheyuma97@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   866ae42cf478..e7d1268f5671  e7d1268f5671aa524007f68f458aee185d93fa04 -> tested/linux-5.4


From xen-devel-bounces@lists.xenproject.org Thu Mar 10 05:28:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 05:28:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288128.488575 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSBLW-0003jq-MH; Thu, 10 Mar 2022 05:28:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288128.488575; Thu, 10 Mar 2022 05:28:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSBLW-0003ji-Gn; Thu, 10 Mar 2022 05:28:18 +0000
Received: by outflank-mailman (input) for mailman id 288128;
 Thu, 10 Mar 2022 05:28:17 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSBLV-0003jY-2M; Thu, 10 Mar 2022 05:28:17 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSBLU-0000uo-W5; Thu, 10 Mar 2022 05:28:17 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSBLU-0002Yx-Ff; Thu, 10 Mar 2022 05:28:16 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSBLU-00015c-Df; Thu, 10 Mar 2022 05:28:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=hDPlChdktbAa4Kh3dM/moNNFsU0x8SLnkJapCJ3BeCs=; b=GyiUYuCgSKxcQ/ZBgAoDaJDc22
	i+yCmWA1FpCqVbA8Xk17zAeoXxS8OC69xhYQL7l9rTbxQX/ym6xcPXJ7shIFYKuyZP7GmDeVy2fE4
	o6DtwIpInu1Kvhs4NUru1tJCyisQ0KAEeTTorbuh7r2SpyNT07cyYRPTsUJe5jI9I6zg=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168492-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168492: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=b3ee86d901b9363d41500d7492714b9d46294d2b
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 10 Mar 2022 05:28:16 +0000

flight 168492 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168492/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              b3ee86d901b9363d41500d7492714b9d46294d2b
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  608 days
Failing since        151818  2020-07-11 04:18:52 Z  607 days  588 attempts
Testing same since   168492  2022-03-09 04:20:28 Z    1 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 100055 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 10 06:04:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 06:04:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288138.488585 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSBu1-00084b-Iy; Thu, 10 Mar 2022 06:03:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288138.488585; Thu, 10 Mar 2022 06:03:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSBu1-00084U-G5; Thu, 10 Mar 2022 06:03:57 +0000
Received: by outflank-mailman (input) for mailman id 288138;
 Thu, 10 Mar 2022 06:03:56 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSBu0-00084K-2x; Thu, 10 Mar 2022 06:03:56 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSBtz-0001Zv-Sf; Thu, 10 Mar 2022 06:03:55 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSBtz-0004nA-JB; Thu, 10 Mar 2022 06:03:55 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSBtz-0003J7-IT; Thu, 10 Mar 2022 06:03:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=HgqpNqNDmKuYtrfj2JQqCT29PqexWFVf6bIv6q+6Rdw=; b=67yQ1R/aJYFDP89dClxO+BEYys
	6Tia9438gyuGwpMaaRsZUvzmz5IKGj5UV0vvfxDUXRrhrQo4PzxWgQ5SYlzhy0oQiq3HuxOD2InXl
	9ewGvLwzsSp5nuKahnBmLC5cFbOZXkVMko/M0HZtNafW2ptmZHpx5hHXHfxLO3Y/o7ZE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168488-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168488: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-amd64-amd64-dom0pvh-xl-intel:guest-localmigrate/x10:fail:heisenbug
    qemu-mainline:test-amd64-coresched-i386-xl:guest-start/debian.repeat:fail:heisenbug
    qemu-mainline:test-amd64-amd64-xl-rtds:guest-localmigrate/x10:fail:allowable
    qemu-mainline:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:allowable
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=9740b907a5363c06ecf61e08b21966a81eb0dab4
X-Osstest-Versions-That:
    qemuu=b49872aa8fc0f3f5a3036cc37aa2cb5c92866f33
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 10 Mar 2022 06:03:55 +0000

flight 168488 qemu-mainline real [real]
flight 168499 qemu-mainline real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168488/
http://logs.test-lab.xenproject.org/osstest/logs/168499/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-dom0pvh-xl-intel 20 guest-localmigrate/x10 fail pass in 168499-retest
 test-amd64-coresched-i386-xl 22 guest-start/debian.repeat fail pass in 168499-retest

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-rtds     20 guest-localmigrate/x10   fail REGR. vs. 168465
 test-armhf-armhf-xl-rtds    18 guest-start/debian.repeat fail REGR. vs. 168465

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168465
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168465
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168465
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168465
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168465
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168465
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168465
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168465
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 qemuu                9740b907a5363c06ecf61e08b21966a81eb0dab4
baseline version:
 qemuu                b49872aa8fc0f3f5a3036cc37aa2cb5c92866f33

Last test of basis   168465  2022-03-07 19:37:00 Z    2 days
Failing since        168474  2022-03-08 09:38:14 Z    1 days    2 attempts
Testing same since   168488  2022-03-08 19:07:03 Z    1 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Akihiko Odaki <akihiko.odaki@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Fabian Franz <fabianfranz.oss@gmail.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Keno Fischer <keno@juliacomputing.com>
  Michael Roitzsch <reactorcontrol@icloud.com>
  Paolo Bonzini <pbonzini@redhat.com>
  Peter Maydell <peter.maydell@linaro.org>
  Philippe Mathieu-Daudé <f4bug@amsat.org>
  Richard Henderson <richard.henderson@linaro.org>
  Taylor Simpson <tsimpson@quicinc.com>
  Thomas Huth <thuth@redhat.com>
  Will Cohen <wwcohen@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 fail    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            fail    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     fail    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   b49872aa8f..9740b907a5  9740b907a5363c06ecf61e08b21966a81eb0dab4 -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Thu Mar 10 07:31:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 07:31:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288146.488596 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDGE-0008PZ-Vj; Thu, 10 Mar 2022 07:30:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288146.488596; Thu, 10 Mar 2022 07:30:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDGE-0008PS-Sb; Thu, 10 Mar 2022 07:30:58 +0000
Received: by outflank-mailman (input) for mailman id 288146;
 Thu, 10 Mar 2022 07:30:57 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=UgV8=TV=amazon.de=prvs=06149a43a=doebel@srs-se1.protection.inumbo.net>)
 id 1nSDGC-0008PM-BW
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 07:30:57 +0000
Received: from smtp-fw-80007.amazon.com (smtp-fw-80007.amazon.com
 [99.78.197.218]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 03ae7716-a044-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 08:30:54 +0100 (CET)
Received: from pdx4-co-svc-p1-lb2-vlan2.amazon.com (HELO
 email-inbound-relay-pdx-2a-5feb294a.us-west-2.amazon.com) ([10.25.36.210])
 by smtp-border-fw-80007.pdx80.corp.amazon.com with ESMTP;
 10 Mar 2022 07:30:37 +0000
Received: from EX13D03EUC002.ant.amazon.com
 (pdx1-ws-svc-p6-lb9-vlan2.pdx.amazon.com [10.236.137.194])
 by email-inbound-relay-pdx-2a-5feb294a.us-west-2.amazon.com (Postfix) with
 ESMTPS id 2DF9087C8A; Thu, 10 Mar 2022 07:30:36 +0000 (UTC)
Received: from [192.168.12.40] (10.43.164.135) by EX13D03EUC002.ant.amazon.com
 (10.43.164.60) with Microsoft SMTP Server (TLS) id 15.0.1497.32;
 Thu, 10 Mar 2022 07:30:34 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 03ae7716-a044-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646897455; x=1678433455;
  h=message-id:date:mime-version:to:cc:references:from:
   in-reply-to:content-transfer-encoding:subject;
  bh=ufwgmHbCfdgMRniaRjH5zBe3Ep9acz7kM8WGhwF8Iuw=;
  b=dp8B/LFR4O8sR2dheItO2IdrG4urLoiHTY/+nVPIxMto2E4+uauqdwt4
   MMyYHjhhfi7UTQagchmEeq8Brkqc1Z1qNAq3YXWXCqiMNI13eOSp46E43
   zumdix9tvPi1hyW4rVVTxNixxTuUUBVLzLb6kPvqdW/qmTf/cvyjWQ3fG
   A=;
X-IronPort-AV: E=Sophos;i="5.90,169,1643673600"; 
   d="scan'208";a="69573389"
Subject: Re: [PATCH] x86/cet: Use dedicated NOP4 for cf_clobber
Message-ID: <1c4fa029-44a9-1e0a-bb09-458ad8d28a64@amazon.de>
Date: Thu, 10 Mar 2022 08:30:33 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Content-Language: en-US
To: Andrew Cooper <andrew.cooper3@citrix.com>, Xen-devel
	<xen-devel@lists.xenproject.org>
CC: Jan Beulich <JBeulich@suse.com>, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?=
	<roger.pau@citrix.com>, Wei Liu <wl@xen.org>
References: <20220308140126.8815-1-andrew.cooper3@citrix.com>
From: "Doebel, Bjoern" <doebel@amazon.de>
In-Reply-To: <20220308140126.8815-1-andrew.cooper3@citrix.com>
X-Originating-IP: [10.43.164.135]
X-ClientProxiedBy: EX13D23EUC004.ant.amazon.com (10.43.164.201) To
 EX13D03EUC002.ant.amazon.com (10.43.164.60)
Precedence: Bulk
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: base64
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From xen-devel-bounces@lists.xenproject.org Thu Mar 10 07:34:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 07:34:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288151.488615 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDJb-0000dP-Ra; Thu, 10 Mar 2022 07:34:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288151.488615; Thu, 10 Mar 2022 07:34:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDJb-0000c5-JZ; Thu, 10 Mar 2022 07:34:27 +0000
Received: by outflank-mailman (input) for mailman id 288151;
 Thu, 10 Mar 2022 07:34:26 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=QHx9=TV=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nSDJa-0000ZQ-AR
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 07:34:26 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 82788018-a044-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 08:34:25 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id AEF8B1F443;
 Thu, 10 Mar 2022 07:34:24 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 806F413FA3;
 Thu, 10 Mar 2022 07:34:24 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id yHLoHQCqKWIkIAAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 10 Mar 2022 07:34:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 82788018-a044-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646897664; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=LH5iekQAujtfbCT5ppRY8SHnDyE773eE100u+22phKg=;
	b=fNXoM2VvH1hDPn2/XMCrGU0trY+SNYGEIxO658FKhJA0Eo1c2RLvAmkXnqVsq7z2OGIfof
	c0a+tIf/rIoixdf64gF6eLSIp2UzbEfCNrDL4hWI+g+uz0tAUhFeSh8DfNdEv0FkXZbicS
	KBreRyro5YcrP018qp4ekZqG2/BoFFc=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH v4 01/11] xen/arm: rename do_phydev_op() to do_arm_physdev_op()
Date: Thu, 10 Mar 2022 08:34:10 +0100
Message-Id: <20220310073420.15622-2-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220310073420.15622-1-jgross@suse.com>
References: <20220310073420.15622-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

do_physdev_op() prototypes on Arm and x86 differ in their return type,
so rename the Arm one in order to prepare using a common generated
header file.

Signed-off-by: Juergen Gross <jgross@suse.com>
---
V4:
- new patch
---
 xen/arch/arm/include/asm/hypercall.h | 2 +-
 xen/arch/arm/physdev.c               | 2 +-
 xen/arch/arm/traps.c                 | 2 +-
 3 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/xen/arch/arm/include/asm/hypercall.h b/xen/arch/arm/include/asm/hypercall.h
index a0c5a31a2f..39d2e7889d 100644
--- a/xen/arch/arm/include/asm/hypercall.h
+++ b/xen/arch/arm/include/asm/hypercall.h
@@ -2,7 +2,7 @@
 #define __ASM_ARM_HYPERCALL_H__
 
 #include <public/domctl.h> /* for arch_do_domctl */
-int do_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
+int do_arm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
 
 long do_arm_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg);
 
diff --git a/xen/arch/arm/physdev.c b/xen/arch/arm/physdev.c
index f9aa274dda..95a8cdc0ee 100644
--- a/xen/arch/arm/physdev.c
+++ b/xen/arch/arm/physdev.c
@@ -11,7 +11,7 @@
 #include <xen/hypercall.h>
 
 
-int do_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+int do_arm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
 #ifdef CONFIG_HAS_PCI
     return pci_physdev_op(cmd, arg);
diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
index 7a1b679b8c..f8c3ef0ca2 100644
--- a/xen/arch/arm/traps.c
+++ b/xen/arch/arm/traps.c
@@ -1371,7 +1371,7 @@ static arm_hypercall_t arm_hypercall_table[] = {
     HYPERCALL(xsm_op, 1),
     HYPERCALL(event_channel_op, 2),
     HYPERCALL_DEPRECATED(event_channel_op_compat, 1),
-    HYPERCALL(physdev_op, 2),
+    HYPERCALL_ARM(physdev_op, 2),
     HYPERCALL_DEPRECATED(physdev_op_compat, 1),
     HYPERCALL(sysctl, 2),
     HYPERCALL(hvm_op, 2),
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 07:34:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 07:34:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288150.488608 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDJb-0000Zu-FU; Thu, 10 Mar 2022 07:34:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288150.488608; Thu, 10 Mar 2022 07:34:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDJb-0000Zm-Cb; Thu, 10 Mar 2022 07:34:27 +0000
Received: by outflank-mailman (input) for mailman id 288150;
 Thu, 10 Mar 2022 07:34:26 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=QHx9=TV=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nSDJa-0000ZP-7B
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 07:34:26 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 802a1181-a044-11ec-8539-5f4723681683;
 Thu, 10 Mar 2022 08:34:21 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 7A09E1F381;
 Thu, 10 Mar 2022 07:34:24 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 18F2913FA3;
 Thu, 10 Mar 2022 07:34:24 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id qi80BACqKWIkIAAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 10 Mar 2022 07:34:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 802a1181-a044-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646897664; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:  content-transfer-encoding:content-transfer-encoding;
	bh=VW0S7DOLYYudVpiuotx3ct2mnfrTAcmlNP9qLbkTpQk=;
	b=pyzIy+dXZ6ehQV3VomECVrN5ky7eAhoAvzw028GJz+HKEhpwG1iYqzrO3fpLmEONgQgfog
	PFQ84nuwwnY4DQb9CoHu90sQtz6Mjv+3eXyA+9RQllxS8YQtJA7mvPFzMQ/NyuIYSvcy8j
	1xDOkPbfsgT7R795lJEX/qa60Bo1vJc=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Christopher Clark <christopher.w.clark@gmail.com>,
	Dario Faggioli <dfaggioli@suse.com>,
	Daniel De Graaf <dgdegra@tycho.nsa.gov>,
	"Daniel P. Smith" <dpsmith@apertussolutions.com>
Subject: [PATCH v4 00/11] xen: drop hypercall function tables
Date: Thu, 10 Mar 2022 08:34:09 +0100
Message-Id: <20220310073420.15622-1-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

In order to avoid indirect function calls on the hypercall path as
much as possible this series is removing the hypercall function tables
and is replacing the hypercall handler calls via the function array
by automatically generated call macros.

Another by-product of generating the call macros is the automatic
generating of the hypercall handler prototypes from the same data base
which is used to generate the macros.

This has the additional advantage of using type safe calls of the
handlers and to ensure related handler (e.g. PV and HVM ones) share
the same prototypes.

A very brief performance test (parallel build of the Xen hypervisor
in a 6 vcpu guest) showed a very slim improvement (less than 1%) of
the performance with the patches applied. The test was performed using
a PV and a PVH guest.

Changes in V2:
- new patches 6, 14, 15
- patch 7: support hypercall priorities for faster code
- comments addressed

Changes in V3:
- patches 1 and 4 removed as already applied
- comments addressed

Changes in V4:
- 5 patches removed al already applied
- new patches 1, 3 and 11
- avoid switching Arm hypercall handlers to return long (no change of
  handlers returning long already)

Juergen Gross (11):
  xen/arm: rename do_phydev_op() to do_arm_physdev_op()
  xen: move do_vcpu_op() to arch specific code
  xen: switch non style compliant hypercall handler parameter types
  xen: harmonize return types of hypercall handlers
  xen: don't include asm/hypercall.h from C sources
  xen: include compat/platform.h from hypercall.h
  xen: generate hypercall interface related code
  xen: use generated prototypes for hypercall handlers
  xen/x86: call hypercall handlers via generated macro
  xen/arm: call hypercall handlers via generated macro
  xen/x86: remove cf_check attribute from hypercall handlers

 .gitignore                               |   1 +
 xen/arch/arm/domain.c                    |  15 +-
 xen/arch/arm/hvm.c                       |   3 +-
 xen/arch/arm/include/asm/hypercall.h     |   7 +-
 xen/arch/arm/physdev.c                   |   2 +-
 xen/arch/arm/platform_hypercall.c        |   1 +
 xen/arch/arm/traps.c                     | 124 ++-------
 xen/arch/x86/compat.c                    |   6 +-
 xen/arch/x86/cpu/mcheck/mce.c            |   2 +-
 xen/arch/x86/cpu/vpmu.c                  |   3 +-
 xen/arch/x86/domain.c                    |  11 +-
 xen/arch/x86/domctl.c                    |   4 +-
 xen/arch/x86/hvm/dm.c                    |   2 +-
 xen/arch/x86/hvm/hvm.c                   |   2 +-
 xen/arch/x86/hvm/hypercall.c             | 177 ++-----------
 xen/arch/x86/hypercall.c                 |  59 -----
 xen/arch/x86/include/asm/hypercall.h     | 201 ++++-----------
 xen/arch/x86/include/asm/paging.h        |   3 -
 xen/arch/x86/mm.c                        |  13 +-
 xen/arch/x86/mm/paging.c                 |   3 +-
 xen/arch/x86/physdev.c                   |   2 +-
 xen/arch/x86/platform_hypercall.c        |   3 +-
 xen/arch/x86/pv/callback.c               |  26 +-
 xen/arch/x86/pv/descriptor-tables.c      |   8 +-
 xen/arch/x86/pv/emul-priv-op.c           |   2 +-
 xen/arch/x86/pv/hypercall.c              | 187 ++------------
 xen/arch/x86/pv/iret.c                   |   5 +-
 xen/arch/x86/pv/misc-hypercalls.c        |  22 +-
 xen/arch/x86/pv/shim.c                   |   4 +-
 xen/arch/x86/traps.c                     |   2 +-
 xen/arch/x86/x86_64/compat/mm.c          |   3 +-
 xen/arch/x86/x86_64/domain.c             |  16 +-
 xen/arch/x86/x86_64/mm.c                 |   2 -
 xen/arch/x86/x86_64/platform_hypercall.c |   3 +-
 xen/common/argo.c                        |   8 +-
 xen/common/compat/domain.c               |  15 +-
 xen/common/compat/grant_table.c          |   3 +-
 xen/common/compat/kernel.c               |   2 +-
 xen/common/compat/memory.c               |   3 +-
 xen/common/dm.c                          |   2 +-
 xen/common/domain.c                      |  14 +-
 xen/common/domctl.c                      |   2 +-
 xen/common/event_channel.c               |   3 +-
 xen/common/grant_table.c                 |   4 +-
 xen/common/hypfs.c                       |   2 +-
 xen/common/kernel.c                      |   2 +-
 xen/common/kexec.c                       |   6 +-
 xen/common/memory.c                      |   2 +-
 xen/common/multicall.c                   |   4 +-
 xen/common/sched/compat.c                |   2 +-
 xen/common/sched/core.c                  |   4 +-
 xen/common/sysctl.c                      |   2 +-
 xen/common/xenoprof.c                    |   2 +-
 xen/drivers/char/console.c               |   2 +-
 xen/include/Makefile                     |  13 +
 xen/include/hypercall-defs.c             | 285 ++++++++++++++++++++
 xen/include/xen/hypercall.h              | 185 +------------
 xen/scripts/gen_hypercall.awk            | 314 +++++++++++++++++++++++
 xen/xsm/xsm_core.c                       |   4 +-
 59 files changed, 865 insertions(+), 944 deletions(-)
 create mode 100644 xen/include/hypercall-defs.c
 create mode 100644 xen/scripts/gen_hypercall.awk

-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 07:34:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 07:34:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288152.488619 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDJc-0000nb-9e; Thu, 10 Mar 2022 07:34:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288152.488619; Thu, 10 Mar 2022 07:34:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDJc-0000kZ-1r; Thu, 10 Mar 2022 07:34:28 +0000
Received: by outflank-mailman (input) for mailman id 288152;
 Thu, 10 Mar 2022 07:34:27 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=QHx9=TV=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nSDJb-0000ZP-0h
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 07:34:27 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 80a6c3ed-a044-11ec-8539-5f4723681683;
 Thu, 10 Mar 2022 08:34:22 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 59F7C1F444;
 Thu, 10 Mar 2022 07:34:25 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 1C68C13FA5;
 Thu, 10 Mar 2022 07:34:25 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id aDi0BQGqKWIkIAAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 10 Mar 2022 07:34:25 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 80a6c3ed-a044-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646897665; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=BEzMzKjCEqWCLH4etovzeszLFEIwdEg6ZM52H2MR7Ho=;
	b=WKqgQwFza2uC/HWEuRsXBxOLS5oJiVmLCWkBKGaMLeOAu8BH/j1Bj0yHUoAtAA5lC3rMtT
	i/Y5DrqTLI1jxCiv+I9YoNIPoL65aC4+xsucIOiVJ/JcH962O0y8UnbGvmGgtmQKZkLVqC
	b6w/ePPZklxgYjbJ2JwlPZMa1AJ3Hs0=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>,
	George Dunlap <george.dunlap@citrix.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>
Subject: [PATCH v4 03/11] xen: switch non style compliant hypercall handler parameter types
Date: Thu, 10 Mar 2022 08:34:12 +0100
Message-Id: <20220310073420.15622-4-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220310073420.15622-1-jgross@suse.com>
References: <20220310073420.15622-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Switch some non style compliant types (u32, s32, s64) of hypercall
handler parameters to style compliant ones.

Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
---
V4:
- carved out from following patch (Julien Grall)
---
 xen/arch/x86/include/asm/hypercall.h | 10 +++++-----
 xen/include/xen/hypercall.h          |  4 ++--
 2 files changed, 7 insertions(+), 7 deletions(-)

diff --git a/xen/arch/x86/include/asm/hypercall.h b/xen/arch/x86/include/asm/hypercall.h
index 610c37a0b8..d6daa7e4cb 100644
--- a/xen/arch/x86/include/asm/hypercall.h
+++ b/xen/arch/x86/include/asm/hypercall.h
@@ -94,7 +94,7 @@ do_mca(XEN_GUEST_HANDLE_PARAM(xen_mc_t) u_xen_mc);
 extern long cf_check
 do_update_va_mapping(
     unsigned long va,
-    u64 val64,
+    uint64_t val64,
     unsigned long flags);
 
 extern long cf_check
@@ -104,7 +104,7 @@ do_physdev_op(
 extern long cf_check
 do_update_va_mapping_otherdomain(
     unsigned long va,
-    u64 val64,
+    uint64_t val64,
     unsigned long flags,
     domid_t domid);
 
@@ -162,10 +162,10 @@ extern long cf_check compat_callback_op(
     int cmd, XEN_GUEST_HANDLE(void) arg);
 
 extern int cf_check compat_update_va_mapping(
-    unsigned int va, u32 lo, u32 hi, unsigned int flags);
+    unsigned int va, uint32_t lo, uint32_t hi, unsigned int flags);
 
 extern int cf_check compat_update_va_mapping_otherdomain(
-    unsigned int va, u32 lo, u32 hi, unsigned int flags, domid_t domid);
+    unsigned int va, uint32_t lo, uint32_t hi, unsigned int flags, domid_t domid);
 
 DEFINE_XEN_GUEST_HANDLE(trap_info_compat_t);
 extern int cf_check compat_set_trap_table(
@@ -175,7 +175,7 @@ extern int cf_check compat_set_gdt(
     XEN_GUEST_HANDLE_PARAM(uint) frame_list, unsigned int entries);
 
 extern int cf_check compat_update_descriptor(
-    u32 pa_lo, u32 pa_hi, u32 desc_lo, u32 desc_hi);
+    uint32_t pa_lo, uint32_t pa_hi, uint32_t desc_lo, uint32_t desc_hi);
 
 extern unsigned int cf_check compat_iret(void);
 
diff --git a/xen/include/xen/hypercall.h b/xen/include/xen/hypercall.h
index 82f7f2caeb..81aae7a662 100644
--- a/xen/include/xen/hypercall.h
+++ b/xen/include/xen/hypercall.h
@@ -198,8 +198,8 @@ compat_sched_op(
 
 extern int cf_check
 compat_set_timer_op(
-    u32 lo,
-    s32 hi);
+    uint32_t lo,
+    int32_t hi);
 
 extern int cf_check compat_xsm_op(
     XEN_GUEST_HANDLE_PARAM(void) op);
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 07:34:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 07:34:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288153.488628 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDJc-0000s7-Rk; Thu, 10 Mar 2022 07:34:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288153.488628; Thu, 10 Mar 2022 07:34:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDJc-0000pB-Dm; Thu, 10 Mar 2022 07:34:28 +0000
Received: by outflank-mailman (input) for mailman id 288153;
 Thu, 10 Mar 2022 07:34:27 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=QHx9=TV=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nSDJb-0000ZQ-3d
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 07:34:27 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 82a45a74-a044-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 08:34:25 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 1561D21110;
 Thu, 10 Mar 2022 07:34:25 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id B505E13FA3;
 Thu, 10 Mar 2022 07:34:24 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id eOz3KgCqKWIkIAAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 10 Mar 2022 07:34:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 82a45a74-a044-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646897665; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=mg0IVeDJK5l+42HD2r55olz6U0rWy21oGjPbgxp9ur4=;
	b=khPMbExQNW9xjF14IZTxqZgnbDDSgRXjgJJ/mufG7YNC7RbZexBaYM4eiAHzQUANUeYx4S
	Uf6BLnB0s1IqXAKPDrxwr3th9oWdeKr5hI4jCKfjXMllo6wJBzsjgEFVxfrDdnWXzFW8Jd
	mkqAryDvQgHq8kRBhRMRU22GRlWZP7U=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>
Subject: [PATCH v4 02/11] xen: move do_vcpu_op() to arch specific code
Date: Thu, 10 Mar 2022 08:34:11 +0100
Message-Id: <20220310073420.15622-3-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220310073420.15622-1-jgross@suse.com>
References: <20220310073420.15622-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

The entry point used for the vcpu_op hypercall on Arm is different
from the one on x86 today, as some of the common sub-ops are not
supported on Arm. The Arm specific handler filters out the not
supported sub-ops and then calls the common handler. This leads to the
weird call hierarchy:

  do_arm_vcpu_op()
    do_vcpu_op()
      arch_do_vcpu_op()

Clean this up by renaming do_vcpu_op() to common_vcpu_op() and
arch_do_vcpu_op() in each architecture to do_vcpu_op(). This way one
of above calls can be avoided without restricting any potential
future use of common sub-ops for Arm.

Signed-off-by: Juergen Gross <jgross@suse.com>
---
V4:
- don't remove HYPERCALL_ARM()
---
 xen/arch/arm/domain.c                | 15 ++++++++-------
 xen/arch/arm/include/asm/hypercall.h |  2 --
 xen/arch/arm/traps.c                 |  2 +-
 xen/arch/x86/domain.c                | 12 ++++++++----
 xen/arch/x86/include/asm/hypercall.h |  2 +-
 xen/arch/x86/x86_64/domain.c         | 16 ++++++++++++----
 xen/common/compat/domain.c           | 15 ++++++---------
 xen/common/domain.c                  | 12 ++++--------
 xen/include/xen/hypercall.h          |  2 +-
 9 files changed, 41 insertions(+), 37 deletions(-)

diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
index 8110c1df86..2f8eaab7b5 100644
--- a/xen/arch/arm/domain.c
+++ b/xen/arch/arm/domain.c
@@ -1079,23 +1079,24 @@ void arch_dump_domain_info(struct domain *d)
 }
 
 
-long do_arm_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
+long do_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
+    struct domain *d = current->domain;
+    struct vcpu *v;
+
+    if ( (v = domain_vcpu(d, vcpuid)) == NULL )
+        return -ENOENT;
+
     switch ( cmd )
     {
         case VCPUOP_register_vcpu_info:
         case VCPUOP_register_runstate_memory_area:
-            return do_vcpu_op(cmd, vcpuid, arg);
+            return common_vcpu_op(cmd, v, arg);
         default:
             return -EINVAL;
     }
 }
 
-long arch_do_vcpu_op(int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
-{
-    return -ENOSYS;
-}
-
 void arch_dump_vcpu_info(struct vcpu *v)
 {
     gic_dump_info(v);
diff --git a/xen/arch/arm/include/asm/hypercall.h b/xen/arch/arm/include/asm/hypercall.h
index 39d2e7889d..fac4d60f17 100644
--- a/xen/arch/arm/include/asm/hypercall.h
+++ b/xen/arch/arm/include/asm/hypercall.h
@@ -4,8 +4,6 @@
 #include <public/domctl.h> /* for arch_do_domctl */
 int do_arm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
 
-long do_arm_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg);
-
 long subarch_do_domctl(struct xen_domctl *domctl, struct domain *d,
                        XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl);
 
diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
index f8c3ef0ca2..deb07784d9 100644
--- a/xen/arch/arm/traps.c
+++ b/xen/arch/arm/traps.c
@@ -1380,7 +1380,7 @@ static arm_hypercall_t arm_hypercall_table[] = {
 #endif
     HYPERCALL(multicall, 2),
     HYPERCALL(platform_op, 1),
-    HYPERCALL_ARM(vcpu_op, 3),
+    HYPERCALL(vcpu_op, 3),
     HYPERCALL(vm_assist, 2),
 #ifdef CONFIG_ARGO
     HYPERCALL(argo_op, 5),
diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c
index a5048ed654..d566fc82b4 100644
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -1489,11 +1489,15 @@ int arch_vcpu_reset(struct vcpu *v)
     return 0;
 }
 
-long
-arch_do_vcpu_op(
-    int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
+long cf_check do_vcpu_op(int cmd, unsigned int vcpuid,
+                         XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     long rc = 0;
+    struct domain *d = current->domain;
+    struct vcpu *v;
+
+    if ( (v = domain_vcpu(d, vcpuid)) == NULL )
+        return -ENOENT;
 
     switch ( cmd )
     {
@@ -1545,7 +1549,7 @@ arch_do_vcpu_op(
     }
 
     default:
-        rc = -ENOSYS;
+        rc = common_vcpu_op(cmd, v, arg);
         break;
     }
 
diff --git a/xen/arch/x86/include/asm/hypercall.h b/xen/arch/x86/include/asm/hypercall.h
index 16d8418b57..610c37a0b8 100644
--- a/xen/arch/x86/include/asm/hypercall.h
+++ b/xen/arch/x86/include/asm/hypercall.h
@@ -145,7 +145,7 @@ compat_physdev_op(
     XEN_GUEST_HANDLE_PARAM(void) arg);
 
 extern int
-arch_compat_vcpu_op(
+compat_common_vcpu_op(
     int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg);
 
 extern int cf_check compat_mmuext_op(
diff --git a/xen/arch/x86/x86_64/domain.c b/xen/arch/x86/x86_64/domain.c
index c46dccc25a..62fe51ee74 100644
--- a/xen/arch/x86/x86_64/domain.c
+++ b/xen/arch/x86/x86_64/domain.c
@@ -13,10 +13,14 @@ CHECK_vcpu_get_physid;
 #undef xen_vcpu_get_physid
 
 int
-arch_compat_vcpu_op(
-    int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
+compat_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
-    int rc = -ENOSYS;
+    int rc;
+    struct domain *d = current->domain;
+    struct vcpu *v;
+
+    if ( (v = domain_vcpu(d, vcpuid)) == NULL )
+        return -ENOENT;
 
     switch ( cmd )
     {
@@ -55,7 +59,11 @@ arch_compat_vcpu_op(
     }
 
     case VCPUOP_get_physid:
-        rc = arch_do_vcpu_op(cmd, v, arg);
+        rc = do_vcpu_op(cmd, vcpuid, arg);
+        break;
+
+    default:
+        rc = compat_common_vcpu_op(cmd, v, arg);
         break;
     }
 
diff --git a/xen/common/compat/domain.c b/xen/common/compat/domain.c
index afae27eeba..1119534679 100644
--- a/xen/common/compat/domain.c
+++ b/xen/common/compat/domain.c
@@ -38,15 +38,12 @@ CHECK_vcpu_hvm_context;
 
 #endif
 
-int cf_check compat_vcpu_op(
-    int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
+int compat_common_vcpu_op(int cmd, struct vcpu *v,
+                          XEN_GUEST_HANDLE_PARAM(void) arg)
 {
-    struct domain *d = current->domain;
-    struct vcpu *v;
     int rc = 0;
-
-    if ( (v = domain_vcpu(d, vcpuid)) == NULL )
-        return -ENOENT;
+    struct domain *d = current->domain;
+    unsigned int vcpuid = v->vcpu_id;
 
     switch ( cmd )
     {
@@ -103,7 +100,7 @@ int cf_check compat_vcpu_op(
     case VCPUOP_stop_singleshot_timer:
     case VCPUOP_register_vcpu_info:
     case VCPUOP_send_nmi:
-        rc = do_vcpu_op(cmd, vcpuid, arg);
+        rc = common_vcpu_op(cmd, v, arg);
         break;
 
     case VCPUOP_get_runstate_info:
@@ -134,7 +131,7 @@ int cf_check compat_vcpu_op(
     }
 
     default:
-        rc = arch_compat_vcpu_op(cmd, v, arg);
+        rc = -ENOSYS;
         break;
     }
 
diff --git a/xen/common/domain.c b/xen/common/domain.c
index 351029f8b2..f9de1be43c 100644
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -1570,15 +1570,11 @@ int default_initialise_vcpu(struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
     return rc;
 }
 
-long cf_check do_vcpu_op(
-    int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
+long common_vcpu_op(int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
-    struct domain *d = current->domain;
-    struct vcpu *v;
     long rc = 0;
-
-    if ( (v = domain_vcpu(d, vcpuid)) == NULL )
-        return -ENOENT;
+    struct domain *d = current->domain;
+    unsigned int vcpuid = v->vcpu_id;
 
     switch ( cmd )
     {
@@ -1750,7 +1746,7 @@ long cf_check do_vcpu_op(
     }
 
     default:
-        rc = arch_do_vcpu_op(cmd, v, arg);
+        rc = -ENOSYS;
         break;
     }
 
diff --git a/xen/include/xen/hypercall.h b/xen/include/xen/hypercall.h
index 4dfd64cf71..82f7f2caeb 100644
--- a/xen/include/xen/hypercall.h
+++ b/xen/include/xen/hypercall.h
@@ -110,7 +110,7 @@ do_vcpu_op(
 
 struct vcpu;
 extern long
-arch_do_vcpu_op(int cmd,
+common_vcpu_op(int cmd,
     struct vcpu *v,
     XEN_GUEST_HANDLE_PARAM(void) arg);
 
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 07:34:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 07:34:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288155.488647 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDJe-0001O5-8V; Thu, 10 Mar 2022 07:34:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288155.488647; Thu, 10 Mar 2022 07:34:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDJd-0001NO-TY; Thu, 10 Mar 2022 07:34:29 +0000
Received: by outflank-mailman (input) for mailman id 288155;
 Thu, 10 Mar 2022 07:34:28 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=QHx9=TV=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nSDJc-0000ZQ-3s
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 07:34:28 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 832d176b-a044-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 08:34:26 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id F2EE71F445;
 Thu, 10 Mar 2022 07:34:25 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id AB0CD13FA5;
 Thu, 10 Mar 2022 07:34:25 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id uECTKAGqKWIkIAAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 10 Mar 2022 07:34:25 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 832d176b-a044-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646897665; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=KLCDo14R+Scdn/ook0dpDfB9SKTB0wRtoV5guxmQ4bI=;
	b=C/180rQlPW0MtalczNjlx+tnmWxCCJwkkP7dCcCxBWN3IE2FPZ3XeyV9L3zr20zF8gf/96
	tqkZ/VsgOsbfPe6W7wtE4ekiNFrdBZmHvh0RDPQLmpVUknFgDlIWWpyIPFIReeOGBkJe3h
	0e9BCMpd6es11TRtJ4K/EYZVu8IhZoo=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>
Subject: [PATCH v4 05/11] xen: don't include asm/hypercall.h from C sources
Date: Thu, 10 Mar 2022 08:34:14 +0100
Message-Id: <20220310073420.15622-6-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220310073420.15622-1-jgross@suse.com>
References: <20220310073420.15622-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Instead of including asm/hypercall.h always use xen/hypercall.h.
Additionally include xen/hypercall.h from all sources containing a
hypercall handler.

This prepares for generating the handlers' prototypes at build time.

Add a guard in asm/hypercall.h to catch direct inclusion.

Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
---
V2:
- remove platform_op hunk (Jan Beulich)
- remove including of xen/hypervisor.h from arch/x86/x86_64/mm.c
  (Jan Beulich)
- fix include order in common/compat/grant_table.c (Jan Beulich)
---
 xen/arch/arm/hvm.c                       | 3 +--
 xen/arch/arm/include/asm/hypercall.h     | 4 ++++
 xen/arch/arm/platform_hypercall.c        | 1 +
 xen/arch/x86/cpu/vpmu.c                  | 1 +
 xen/arch/x86/include/asm/hypercall.h     | 4 ++++
 xen/arch/x86/mm.c                        | 1 -
 xen/arch/x86/platform_hypercall.c        | 1 +
 xen/arch/x86/pv/iret.c                   | 1 +
 xen/arch/x86/traps.c                     | 2 +-
 xen/arch/x86/x86_64/compat/mm.c          | 1 +
 xen/arch/x86/x86_64/mm.c                 | 2 --
 xen/arch/x86/x86_64/platform_hypercall.c | 1 -
 xen/common/compat/grant_table.c          | 1 +
 xen/common/event_channel.c               | 1 +
 xen/common/grant_table.c                 | 1 +
 xen/common/multicall.c                   | 1 +
 16 files changed, 19 insertions(+), 7 deletions(-)

diff --git a/xen/arch/arm/hvm.c b/xen/arch/arm/hvm.c
index 8951b34086..fc1a52767d 100644
--- a/xen/arch/arm/hvm.c
+++ b/xen/arch/arm/hvm.c
@@ -20,6 +20,7 @@
 #include <xen/lib.h>
 #include <xen/errno.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/sched.h>
 #include <xen/monitor.h>
 
@@ -29,8 +30,6 @@
 #include <public/hvm/params.h>
 #include <public/hvm/hvm_op.h>
 
-#include <asm/hypercall.h>
-
 static int hvm_allow_set_param(const struct domain *d, unsigned int param)
 {
     switch ( param )
diff --git a/xen/arch/arm/include/asm/hypercall.h b/xen/arch/arm/include/asm/hypercall.h
index fac4d60f17..8182895358 100644
--- a/xen/arch/arm/include/asm/hypercall.h
+++ b/xen/arch/arm/include/asm/hypercall.h
@@ -1,3 +1,7 @@
+#ifndef __XEN_HYPERCALL_H__
+#error "asm/hypercall.h should not be included directly - include xen/hypercall.h instead"
+#endif
+
 #ifndef __ASM_ARM_HYPERCALL_H__
 #define __ASM_ARM_HYPERCALL_H__
 
diff --git a/xen/arch/arm/platform_hypercall.c b/xen/arch/arm/platform_hypercall.c
index 8efac7ee60..403cc84324 100644
--- a/xen/arch/arm/platform_hypercall.c
+++ b/xen/arch/arm/platform_hypercall.c
@@ -9,6 +9,7 @@
 #include <xen/types.h>
 #include <xen/sched.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/spinlock.h>
 #include <public/platform.h>
 #include <xsm/xsm.h>
diff --git a/xen/arch/x86/cpu/vpmu.c b/xen/arch/x86/cpu/vpmu.c
index 4fedc7c570..51d171615f 100644
--- a/xen/arch/x86/cpu/vpmu.c
+++ b/xen/arch/x86/cpu/vpmu.c
@@ -22,6 +22,7 @@
 #include <xen/param.h>
 #include <xen/event.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/sched.h>
 #include <asm/regs.h>
 #include <asm/types.h>
diff --git a/xen/arch/x86/include/asm/hypercall.h b/xen/arch/x86/include/asm/hypercall.h
index 49973820af..81ca25f7b3 100644
--- a/xen/arch/x86/include/asm/hypercall.h
+++ b/xen/arch/x86/include/asm/hypercall.h
@@ -2,6 +2,10 @@
  * asm-x86/hypercall.h
  */
 
+#ifndef __XEN_HYPERCALL_H__
+#error "asm/hypercall.h should not be included directly - include xen/hypercall.h instead"
+#endif
+
 #ifndef __ASM_X86_HYPERCALL_H__
 #define __ASM_X86_HYPERCALL_H__
 
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index 2befd0c191..6cc73187ac 100644
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86/mm.c
@@ -129,7 +129,6 @@
 #include <asm/ldt.h>
 #include <asm/x86_emulate.h>
 #include <asm/e820.h>
-#include <asm/hypercall.h>
 #include <asm/shared.h>
 #include <asm/mem_sharing.h>
 #include <public/memory.h>
diff --git a/xen/arch/x86/platform_hypercall.c b/xen/arch/x86/platform_hypercall.c
index b91ccff589..eeb4f7a20e 100644
--- a/xen/arch/x86/platform_hypercall.c
+++ b/xen/arch/x86/platform_hypercall.c
@@ -17,6 +17,7 @@
 #include <xen/console.h>
 #include <xen/iocap.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/acpi.h>
 #include <xen/efi.h>
 #include <xen/cpu.h>
diff --git a/xen/arch/x86/pv/iret.c b/xen/arch/x86/pv/iret.c
index 55eb6a63bd..58de9f7922 100644
--- a/xen/arch/x86/pv/iret.c
+++ b/xen/arch/x86/pv/iret.c
@@ -18,6 +18,7 @@
  */
 
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/lib.h>
 #include <xen/sched.h>
 
diff --git a/xen/arch/x86/traps.c b/xen/arch/x86/traps.c
index a2278d9499..3ad954991b 100644
--- a/xen/arch/x86/traps.c
+++ b/xen/arch/x86/traps.c
@@ -29,6 +29,7 @@
 #include <xen/lib.h>
 #include <xen/err.h>
 #include <xen/errno.h>
+#include <xen/hypercall.h>
 #include <xen/mm.h>
 #include <xen/param.h>
 #include <xen/console.h>
@@ -70,7 +71,6 @@
 #include <asm/x86_emulate.h>
 #include <asm/traps.h>
 #include <asm/hvm/vpt.h>
-#include <asm/hypercall.h>
 #include <asm/mce.h>
 #include <asm/apic.h>
 #include <asm/mc146818rtc.h>
diff --git a/xen/arch/x86/x86_64/compat/mm.c b/xen/arch/x86/x86_64/compat/mm.c
index b3da8fafbb..70b08a832a 100644
--- a/xen/arch/x86/x86_64/compat/mm.c
+++ b/xen/arch/x86/x86_64/compat/mm.c
@@ -1,4 +1,5 @@
 #include <xen/event.h>
+#include <xen/hypercall.h>
 #include <xen/mem_access.h>
 #include <xen/multicall.h>
 #include <compat/memory.h>
diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c
index 4f225da81e..3510a5affe 100644
--- a/xen/arch/x86/x86_64/mm.c
+++ b/xen/arch/x86/x86_64/mm.c
@@ -25,14 +25,12 @@ EMIT_FILE;
 #include <xen/numa.h>
 #include <xen/nodemask.h>
 #include <xen/guest_access.h>
-#include <xen/hypercall.h>
 #include <xen/mem_access.h>
 #include <asm/current.h>
 #include <asm/asm_defns.h>
 #include <asm/page.h>
 #include <asm/flushtlb.h>
 #include <asm/fixmap.h>
-#include <asm/hypercall.h>
 #include <asm/msr.h>
 #include <asm/pv/domain.h>
 #include <asm/setup.h>
diff --git a/xen/arch/x86/x86_64/platform_hypercall.c b/xen/arch/x86/x86_64/platform_hypercall.c
index 2c21a3fd05..f84252bac6 100644
--- a/xen/arch/x86/x86_64/platform_hypercall.c
+++ b/xen/arch/x86/x86_64/platform_hypercall.c
@@ -7,7 +7,6 @@ EMIT_FILE;
 #include <xen/hypercall.h>
 #include <xen/lib.h>
 #include <compat/platform.h>
-#include <xen/hypercall.h>
 
 #define xen_platform_op     compat_platform_op
 #define xen_platform_op_t   compat_platform_op_t
diff --git a/xen/common/compat/grant_table.c b/xen/common/compat/grant_table.c
index c6199e8918..d5787e3719 100644
--- a/xen/common/compat/grant_table.c
+++ b/xen/common/compat/grant_table.c
@@ -3,6 +3,7 @@
  *
  */
 
+#include <xen/hypercall.h>
 #include <compat/grant_table.h>
 
 #define xen_grant_entry_v1 grant_entry_v1
diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c
index ffb042a241..0a82eb3ac2 100644
--- a/xen/common/event_channel.c
+++ b/xen/common/event_channel.c
@@ -24,6 +24,7 @@
 #include <xen/iocap.h>
 #include <xen/compat.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/keyhandler.h>
 #include <asm/current.h>
 
diff --git a/xen/common/grant_table.c b/xen/common/grant_table.c
index 1e0762b064..febbe12eab 100644
--- a/xen/common/grant_table.c
+++ b/xen/common/grant_table.c
@@ -33,6 +33,7 @@
 #include <xen/trace.h>
 #include <xen/grant_table.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/domain_page.h>
 #include <xen/iommu.h>
 #include <xen/paging.h>
diff --git a/xen/common/multicall.c b/xen/common/multicall.c
index e48f46dbe0..9db49092b4 100644
--- a/xen/common/multicall.c
+++ b/xen/common/multicall.c
@@ -9,6 +9,7 @@
 #include <xen/event.h>
 #include <xen/multicall.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/perfc.h>
 #include <xen/trace.h>
 #include <asm/current.h>
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 07:34:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 07:34:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288154.488650 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDJe-0001VR-Oq; Thu, 10 Mar 2022 07:34:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288154.488650; Thu, 10 Mar 2022 07:34:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDJe-0001TT-ER; Thu, 10 Mar 2022 07:34:30 +0000
Received: by outflank-mailman (input) for mailman id 288154;
 Thu, 10 Mar 2022 07:34:28 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=QHx9=TV=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nSDJc-0000ZP-0K
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 07:34:28 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 8127106d-a044-11ec-8539-5f4723681683;
 Thu, 10 Mar 2022 08:34:22 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 43FA81F449;
 Thu, 10 Mar 2022 07:34:26 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 06A5713FA3;
 Thu, 10 Mar 2022 07:34:26 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id IBpcAAKqKWIkIAAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 10 Mar 2022 07:34:26 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8127106d-a044-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646897666; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=IfItSZSW0o2H4xQgtklqjsDZtwba90rKZ+jpu4SrJ+k=;
	b=bwX/wwPLDXizevHSvyvYUqd3Q6vxqhy4TKLY7SIiCmojlNVRup3Vx7kZsA445mROLAAOot
	due1yHXGaln/jlbRCChInS8KOt9h98MiODFgi1oc/Euc/Q3GLt9MisnnJx/Let3SifEMrh
	rcyRPrm84Y1DKyNf9mKlj3CAAQwG7lo=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>,
	George Dunlap <george.dunlap@citrix.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>
Subject: [PATCH v4 06/11] xen: include compat/platform.h from hypercall.h
Date: Thu, 10 Mar 2022 08:34:15 +0100
Message-Id: <20220310073420.15622-7-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220310073420.15622-1-jgross@suse.com>
References: <20220310073420.15622-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

The definition of compat_platform_op_t is in compat/platform.h
already, so include that file from hypercall.h instead of repeating
the typedef.

This allows to remove the related include statement from
arch/x86/x86_64/platform_hypercall.c.

Signed-off-by: Juergen Gross <jgross@suse.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
---
V3:
- new patch
---
 xen/arch/x86/x86_64/platform_hypercall.c | 1 -
 xen/include/xen/hypercall.h              | 4 +++-
 2 files changed, 3 insertions(+), 2 deletions(-)

diff --git a/xen/arch/x86/x86_64/platform_hypercall.c b/xen/arch/x86/x86_64/platform_hypercall.c
index f84252bac6..7631058cce 100644
--- a/xen/arch/x86/x86_64/platform_hypercall.c
+++ b/xen/arch/x86/x86_64/platform_hypercall.c
@@ -6,7 +6,6 @@ EMIT_FILE;
 
 #include <xen/hypercall.h>
 #include <xen/lib.h>
-#include <compat/platform.h>
 
 #define xen_platform_op     compat_platform_op
 #define xen_platform_op_t   compat_platform_op_t
diff --git a/xen/include/xen/hypercall.h b/xen/include/xen/hypercall.h
index a032ba2b4a..ca8ee22717 100644
--- a/xen/include/xen/hypercall.h
+++ b/xen/include/xen/hypercall.h
@@ -15,6 +15,9 @@
 #include <public/version.h>
 #include <public/pmu.h>
 #include <public/hvm/dm_op.h>
+#ifdef CONFIG_COMPAT
+#include <compat/platform.h>
+#endif
 #include <asm/hypercall.h>
 #include <xsm/xsm.h>
 
@@ -206,7 +209,6 @@ extern int cf_check compat_multicall(
 
 int compat_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
 
-typedef struct compat_platform_op compat_platform_op_t;
 DEFINE_XEN_GUEST_HANDLE(compat_platform_op_t);
 int compat_platform_op(XEN_GUEST_HANDLE_PARAM(compat_platform_op_t) u_xenpf_op);
 
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 07:34:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 07:34:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288156.488661 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDJg-0001l0-2m; Thu, 10 Mar 2022 07:34:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288156.488661; Thu, 10 Mar 2022 07:34:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDJf-0001jL-JX; Thu, 10 Mar 2022 07:34:31 +0000
Received: by outflank-mailman (input) for mailman id 288156;
 Thu, 10 Mar 2022 07:34:29 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=QHx9=TV=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nSDJd-0000ZP-0Z
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 07:34:29 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 815f2fc0-a044-11ec-8539-5f4723681683;
 Thu, 10 Mar 2022 08:34:23 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 9A55921119;
 Thu, 10 Mar 2022 07:34:26 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 4D28113FA3;
 Thu, 10 Mar 2022 07:34:26 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id KBeWEQKqKWIkIAAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 10 Mar 2022 07:34:26 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 815f2fc0-a044-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646897666; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=AhjU8N75KhNEeyHRPfbUqSNllPUdHjiBKtRHcOwH+NQ=;
	b=l7Bvv7wg/Qnax3Di+qwgc44n7xxH9fb21o/z3Bf4nFM14SjS+0F3+hds1sZ9lqv2/JIAy7
	vFYRq68hDT/TNwo514TsuCPC/G+Of86WEtEJhVf4LYrjmGkToE3ogp65xzzKIMNyZxWNov
	bNHqGqUouhM/1kDYqI/qILUh2ipHswA=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>
Subject: [PATCH v4 07/11] xen: generate hypercall interface related code
Date: Thu, 10 Mar 2022 08:34:16 +0100
Message-Id: <20220310073420.15622-8-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220310073420.15622-1-jgross@suse.com>
References: <20220310073420.15622-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Instead of repeating similar data multiple times use a single source
file and a generator script for producing prototypes and call sequences
of the hypercalls.

As the script already knows the number of parameters used add generating
a macro for populating an array with the number of parameters per
hypercall.

The priorities for the specific hypercalls are based on two benchamrks
performed in guests (PV and PVH):

- make -j 4 of the Xen hypervisor (resulting in cpu load with lots of
  processes created)
- scp of a large file to the guest (network load)

With a small additional debug patch applied the number of the
different hypercalls in the guest and in dom0 (for looking at backend
activity related hypercalls) were counted while the benchmark in domU
was running:

PV-hypercall    PV-guest build   PV-guest scp    dom0 build     dom0 scp
mmu_update           186175729           2865         20936        33725
stack_switch           1273311          62381        108589       270764
multicall              2182803             50           302          524
update_va_mapping       571868             10            60           80
xen_version              73061            850           859         5432
grant_table_op               0              0         35557       139110
iret                  75673006         484132        268157       757958
vcpu_op                 453037          71199        138224       334988
set_segment_base       1650249          62387        108645       270823
mmuext_op             11225681            188          7239         3426
sched_op                280153         134645         70729       137943
event_channel_op        192327          66204         71409       214191
physdev_op                   0              0          7721         4315
(the dom0 values are for the guest running the build or scp test, so
dom0 acting as backend)

HVM-hypercall   PVH-guest build    PVH-guest scp
vcpu_op                  277684             2324
event_channel_op         350233            57383
(the related dom0 counter values are in the same range as with the test
running in the PV guest)

Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
---
V2:
- split platform_op for doe and compat prefixes (Jan Beulich)
- add "addline:" directive
- add priorities to handlers (Jan Beulich)
V2.1:
- add missing "delete" statement in awk script
- optimize case of 2 hypercalls with same priority
V2.2:
- avoid asort() function (Michal Orzel)
V3:
- drop "addline:" support, as no longer needed
- enclose call sequence macros in "({ ... })" (Jan Beulich)
- small style adjustment (Jan Beulich)
- move generating to xen/include/Makefile (Anthony PERARD)
V4:
- generate cf_check attribute for prototype (will be removed in later patch)
- add Arm-specific variant of physdev_op()
---
 .gitignore                    |   1 +
 xen/include/Makefile          |  13 ++
 xen/include/hypercall-defs.c  | 285 ++++++++++++++++++++++++++++++
 xen/scripts/gen_hypercall.awk | 314 ++++++++++++++++++++++++++++++++++
 4 files changed, 613 insertions(+)
 create mode 100644 xen/include/hypercall-defs.c
 create mode 100644 xen/scripts/gen_hypercall.awk

diff --git a/.gitignore b/.gitignore
index d425be4bd9..c6e5b31b98 100644
--- a/.gitignore
+++ b/.gitignore
@@ -324,6 +324,7 @@ xen/include/public/public
 xen/include/xen/*.new
 xen/include/xen/acm_policy.h
 xen/include/xen/compile.h
+xen/include/xen/hypercall-defs.h
 xen/include/xen/lib/x86/cpuid-autogen.h
 xen/test/livepatch/config.h
 xen/test/livepatch/expect_config.h
diff --git a/xen/include/Makefile b/xen/include/Makefile
index a3c2511f5f..b52a2da40c 100644
--- a/xen/include/Makefile
+++ b/xen/include/Makefile
@@ -77,6 +77,18 @@ $(obj)/compat/xlat.h: $(addprefix $(obj)/compat/.xlat/,$(xlat-y)) $(obj)/config/
 	cat $(filter %.h,$^) >$@.new
 	mv -f $@.new $@
 
+quiet_cmd_genhyp = GEN     $@
+define cmd_genhyp
+    awk -f $(src)/../scripts/gen_hypercall.awk <$< >$@
+endef
+
+all: $(obj)/xen/hypercall-defs.h
+
+$(obj)/xen/hypercall-defs.h: $(obj)/hypercall-defs.i $(src)/../scripts/gen_hypercall.awk FORCE
+	$(call if_changed,genhyp)
+
+targets += xen/hypercall-defs.h
+
 ifeq ($(XEN_TARGET_ARCH),$(XEN_COMPILE_ARCH))
 
 all: $(obj)/headers.chk $(obj)/headers99.chk $(obj)/headers++.chk
@@ -132,3 +144,4 @@ all: lib-x86-all
 endif
 
 clean-files := compat config generated headers*.chk xen/lib/x86/cpuid-autogen.h
+clean-files += xen/hypercall-defs.h hypercall-defs.i
diff --git a/xen/include/hypercall-defs.c b/xen/include/hypercall-defs.c
new file mode 100644
index 0000000000..69a1e3c0c9
--- /dev/null
+++ b/xen/include/hypercall-defs.c
@@ -0,0 +1,285 @@
+/*
+ * Hypercall interface description:
+ * Used by scripts/gen_hypercall.awk to generate hypercall prototypes and call
+ * sequences.
+ *
+ * Syntax is like a prototype, but without return type and without the ";" at
+ * the end. Pointer types will be automatically converted to use the
+ * XEN_GUEST_HANDLE_PARAM() macro. Handlers with no parameters just use a
+ * definition like "fn()".
+ * Hypercall/function names are without the leading "__HYPERVISOR_"/"do_"
+ * strings.
+ *
+ * The return type of a class of prototypes using the same prefix is set via:
+ * rettype: <prefix> <type>
+ * Default return type is "long". A return type for a prefix can be set only
+ * once and it needs to be set before that prefix is being used via the
+ * "prefix:" directive.
+ *
+ * The prefix of the prototypes is set via a line:
+ * prefix: <prefix> ...
+ * Multiple prefixes are possible (restriction see below). Prefixes are without
+ * a trailing "_". The current prefix settings are active until a new "prefix:"
+ * line.
+ *
+ * Caller macros are suffixed with a selectable name via lines like:
+ * caller: <suffix>
+ * When a caller suffix is active, there is only one active prefix allowed.
+ *
+ * With a "defhandle:" line it is possible to add a DEFINE_XEN_GUEST_HANDLE()
+ * to the generated header:
+ * defhandle: <handle-type> [<type>]
+ * Without specifying <type> only a DEFINE_XEN_GUEST_HANDLE(<handle-type>)
+ * will be generated, otherwise it will be a
+ * __DEFINE_XEN_GUEST_HANDLE(<handle-type>, <type>) being generated. Note that
+ * the latter will include the related "const" handle "const_<handle-type>".
+ *
+ * In order to support using coding style compliant pointers in the
+ * prototypes it is possible to add translation entries to generate the correct
+ * handle types:
+ * handle: <handle-type> <type>
+ * This will result in the prototype translation from "<type> *" to
+ * "XEN_GUEST_HANDLE_PARAM(<handle-type>)".
+ *
+ * The hypercall handler calling code will be generated from a final table in
+ * the source file, which is started via the line:
+ * table: <caller> <caller> ...
+ * with the <caller>s specifying the designated caller macro of each column of
+ * the table. Any column of a <caller> not having been set via a "caller:"
+ * line will be ignored.
+ * The first column of the table contains the hypercall/prototype, each
+ * <caller> column contains the prefix for the function to use for that caller.
+ * A function prefix can be annotated with a priority by adding ":<prio>" to it
+ * ("1" being the highest priority, higher numbers mean lower priority, no
+ * priority specified is the lowest priority). The generated code will try to
+ * achieve better performance for calling high priority handlers.
+ * A column not being supported by a <caller> is marked with "-". Lines with all
+ * entries being "-" after removal of inactive <caller> columns are ignored.
+ *
+ * This file is being preprocessed using $(CPP), so #ifdef CONFIG_* conditionals
+ * are possible.
+ */
+
+#ifdef CONFIG_HVM
+#define PREFIX_hvm hvm
+#else
+#define PREFIX_hvm
+#endif
+
+#ifdef CONFIG_COMPAT
+#define PREFIX_compat compat
+rettype: compat int
+#else
+#define PREFIX_compat
+#endif
+
+#ifdef CONFIG_ARM
+#define PREFIX_dep dep
+#define PREFIX_do_arm do_arm
+rettype: do_arm int
+#else
+#define PREFIX_dep
+#define PREFIX_do_arm
+#endif
+
+handle: uint unsigned int
+handle: const_void const void
+handle: const_char const char
+
+#ifdef CONFIG_COMPAT
+defhandle: multicall_entry_compat_t
+#ifndef CONFIG_PV_SHIM_EXCLUSIVE
+defhandle: compat_platform_op_t
+#endif
+#endif
+#ifdef CONFIG_PV32
+defhandle: trap_info_compat_t
+defhandle: physdev_op_compat_t
+#endif
+
+prefix: do PREFIX_hvm PREFIX_compat PREFIX_do_arm
+physdev_op(int cmd, void *arg)
+
+prefix: do PREFIX_hvm PREFIX_compat
+#if defined(CONFIG_GRANT_TABLE) || defined(CONFIG_PV_SHIM)
+grant_table_op(unsigned int cmd, void *uop, unsigned int count)
+#endif
+
+prefix: do PREFIX_hvm
+memory_op(unsigned long cmd, void *arg)
+
+prefix: do PREFIX_compat
+xen_version(int cmd, void *arg)
+vcpu_op(int cmd, unsigned int vcpuid, void *arg)
+sched_op(int cmd, void *arg)
+xsm_op(void *op)
+callback_op(int cmd, const void *arg)
+#ifdef CONFIG_ARGO
+argo_op(unsigned int cmd, void *arg1, void *arg2, unsigned long arg3, unsigned long arg4)
+#endif
+#ifdef CONFIG_KEXEC
+kexec_op(unsigned int op, void *uarg)
+#endif
+#ifdef CONFIG_PV
+iret()
+nmi_op(unsigned int cmd, void *arg)
+#ifdef CONFIG_XENOPROF
+xenoprof_op(int op, void *arg)
+#endif
+#endif /* CONFIG_PV */
+
+#ifdef CONFIG_COMPAT
+prefix: compat
+set_timer_op(uint32_t lo, int32_t hi)
+multicall(multicall_entry_compat_t *call_list, uint32_t nr_calls)
+memory_op(unsigned int cmd, void *arg)
+#ifdef CONFIG_IOREQ_SERVER
+dm_op(domid_t domid, unsigned int nr_bufs, void *bufs)
+#endif
+mmuext_op(void *arg, unsigned int count, uint *pdone, unsigned int foreigndom)
+#ifdef CONFIG_PV32
+set_trap_table(trap_info_compat_t *traps)
+set_gdt(unsigned int *frame_list, unsigned int entries)
+set_callbacks(unsigned long event_selector, unsigned long event_address, unsigned long failsafe_selector, unsigned long failsafe_address)
+update_descriptor(uint32_t pa_lo, uint32_t pa_hi, uint32_t desc_lo, uint32_t desc_hi)
+update_va_mapping(unsigned int va, uint32_t lo, uint32_t hi, unsigned int flags)
+physdev_op_compat(physdev_op_compat_t *uop)
+update_va_mapping_otherdomain(unsigned int va, uint32_t lo, uint32_t hi, unsigned int flags, domid_t domid)
+#endif
+#ifndef CONFIG_PV_SHIM_EXCLUSIVE
+platform_op(compat_platform_op_t *u_xenpf_op)
+#endif
+#endif /* CONFIG_COMPAT */
+
+#if defined(CONFIG_PV) || defined(CONFIG_ARM)
+prefix: do PREFIX_dep
+event_channel_op_compat(evtchn_op_t *uop)
+physdev_op_compat(physdev_op_t *uop)
+/* Legacy hypercall (as of 0x00030101). */
+sched_op_compat(int cmd, unsigned long arg)
+#endif
+
+prefix: do
+set_timer_op(s_time_t timeout)
+console_io(unsigned int cmd, unsigned int count, char *buffer)
+vm_assist(unsigned int cmd, unsigned int type)
+event_channel_op(int cmd, void *arg)
+mmuext_op(mmuext_op_t *uops, unsigned int count, unsigned int *pdone, unsigned int foreigndom)
+multicall(multicall_entry_t *call_list, unsigned int nr_calls)
+#ifdef CONFIG_PV
+mmu_update(mmu_update_t *ureqs, unsigned int count, unsigned int *pdone, unsigned int foreigndom)
+stack_switch(unsigned long ss, unsigned long esp)
+fpu_taskswitch(int set)
+set_debugreg(int reg, unsigned long value)
+get_debugreg(int reg)
+set_segment_base(unsigned int which, unsigned long base)
+mca(xen_mc_t *u_xen_mc)
+set_trap_table(const_trap_info_t *traps)
+set_gdt(xen_ulong_t *frame_list, unsigned int entries)
+set_callbacks(unsigned long event_address, unsigned long failsafe_address, unsigned long syscall_address)
+update_descriptor(uint64_t gaddr, seg_desc_t desc)
+update_va_mapping(unsigned long va, uint64_t val64, unsigned long flags)
+update_va_mapping_otherdomain(unsigned long va, uint64_t val64, unsigned long flags, domid_t domid)
+#endif
+#ifdef CONFIG_IOREQ_SERVER
+dm_op(domid_t domid, unsigned int nr_bufs, xen_dm_op_buf_t *bufs)
+#endif
+#ifndef CONFIG_PV_SHIM_EXCLUSIVE
+sysctl(xen_sysctl_t *u_sysctl)
+domctl(xen_domctl_t *u_domctl)
+paging_domctl_cont(xen_domctl_t *u_domctl)
+platform_op(xen_platform_op_t *u_xenpf_op)
+#endif
+#ifdef CONFIG_HVM
+hvm_op(unsigned long op, void *arg)
+#endif
+#ifdef CONFIG_HYPFS
+hypfs_op(unsigned int cmd, const char *arg1, unsigned long arg2, void *arg3, unsigned long arg4)
+#endif
+#ifdef CONFIG_X86
+xenpmu_op(unsigned int op, xen_pmu_params_t *arg)
+#endif
+
+#ifdef CONFIG_PV
+caller: pv64
+#ifdef CONFIG_PV32
+caller: pv32
+#endif
+#endif
+#if defined(CONFIG_HVM) && defined(CONFIG_X86)
+caller: hvm64
+#ifdef CONFIG_COMPAT
+caller: hvm32
+#endif
+#endif
+#ifdef CONFIG_ARM
+caller: arm
+#endif
+
+table:                             pv32     pv64     hvm32    hvm64    arm
+set_trap_table                     compat   do       -        -        -
+mmu_update                         do:1     do:1     -        -        -
+set_gdt                            compat   do       -        -        -
+stack_switch                       do:2     do:2     -        -        -
+set_callbacks                      compat   do       -        -        -
+fpu_taskswitch                     do       do       -        -        -
+sched_op_compat                    do       do       -        -        dep
+#ifndef CONFIG_PV_SHIM_EXCLUSIVE
+platform_op                        compat   do       compat   do       do
+#endif
+set_debugreg                       do       do       -        -        -
+get_debugreg                       do       do       -        -        -
+update_descriptor                  compat   do       -        -        -
+memory_op                          compat   do       hvm      hvm      do
+multicall                          compat:2 do:2     compat   do       do
+update_va_mapping                  compat   do       -        -        -
+set_timer_op                       compat   do       compat   do       -
+event_channel_op_compat            do       do       -        -        dep
+xen_version                        compat   do       compat   do       do
+console_io                         do       do       do       do       do
+physdev_op_compat                  compat   do       -        -        dep
+#if defined(CONFIG_GRANT_TABLE) || defined(CONFIG_PV_SHIM)
+grant_table_op                     compat   do       hvm      hvm      do
+#endif
+vm_assist                          do       do       do       do       do
+update_va_mapping_otherdomain      compat   do       -        -        -
+iret                               compat:1 do:1     -        -        -
+vcpu_op                            compat   do       compat:1 do:1     do
+set_segment_base                   do:2     do:2     -        -        -
+#ifdef CONFIG_PV
+mmuext_op                          compat:2 do:2     compat   do       -
+#endif
+xsm_op                             compat   do       compat   do       do
+nmi_op                             compat   do       -        -        -
+sched_op                           compat   do       compat   do       do
+callback_op                        compat   do       -        -        -
+#ifdef CONFIG_XENOPROF
+xenoprof_op                        compat   do       -        -        -
+#endif
+event_channel_op                   do       do       do:1     do:1     do
+physdev_op                         compat   do       hvm      hvm      do_arm
+#ifdef CONFIG_HVM
+hvm_op                             do       do       do       do       do
+#endif
+#ifndef CONFIG_PV_SHIM_EXCLUSIVE
+sysctl                             do       do       do       do       do
+domctl                             do       do       do       do       do
+#endif
+#ifdef CONFIG_KEXEC
+kexec_op                           compat   do       -        -        -
+#endif
+tmem_op                            -        -        -        -        -
+#ifdef CONFIG_ARGO
+argo_op                            compat   do       compat   do       do
+#endif
+xenpmu_op                          do       do       do       do       -
+#ifdef CONFIG_IOREQ_SERVER
+dm_op                              compat   do       compat   do       do
+#endif
+#ifdef CONFIG_HYPFS
+hypfs_op                           do       do       do       do       do
+#endif
+mca                                do       do       -        -        -
+#ifndef CONFIG_PV_SHIM_EXCLUSIVE
+paging_domctl_cont                 do       do       do       do       -
+#endif
diff --git a/xen/scripts/gen_hypercall.awk b/xen/scripts/gen_hypercall.awk
new file mode 100644
index 0000000000..403758be21
--- /dev/null
+++ b/xen/scripts/gen_hypercall.awk
@@ -0,0 +1,314 @@
+# awk script to generate hypercall handler prototypes and a macro for doing
+# the calls of the handlers inside a switch() statement.
+
+BEGIN {
+    printf("/* Generated file, do not edit! */\n\n");
+    e = 0;
+    n = 0;
+    p = 0;
+    nc = 0;
+}
+
+# Issue error to stderr
+function do_err(msg) {
+    print "Error: "msg": "$0 >"/dev/stderr";
+    exit 1;
+}
+
+# Generate handler call
+function do_call(f, p,    i) {
+    printf("            ret = %s_%s(", pre[f, p], fn[f]);
+    for (i = 1; i <= n_args[f]; i++) {
+        if (i > 1)
+            printf(", ");
+        if (ptr[f, i])
+            printf("(XEN_GUEST_HANDLE_PARAM(%s)){ _p(a%d) }", typ[f, i], i);
+        else
+            printf("(%s)(a%d)", typ[f, i], i);
+    }
+    printf("); \\\n");
+}
+
+# Generate case statement for call
+function do_case(f, p) {
+    printf("        case __HYPERVISOR_%s: \\\n", fn[f]);
+    do_call(f, p);
+    printf("            break; \\\n");
+}
+
+# Generate switch statement for calling handlers
+function do_switch(ca, p,    i) {
+    printf("        switch ( num ) \\\n");
+    printf("        { \\\n");
+    for (i = 1; i <= nc; i++)
+        if (call[i] == ca && call_prio[i] == p)
+            do_case(call_fn[i], call_p[i]);
+    printf("        default: \\\n");
+    printf("            ret = -ENOSYS; \\\n");
+    printf("            break; \\\n");
+    printf("        } \\\n");
+}
+
+function rest_of_line(par,    i, val) {
+    val = $(par);
+    for (i = par + 1; i <= NF; i++)
+        val = val " " $(i);
+    return val;
+}
+
+# Handle comments (multi- and single line)
+$1 == "/*" {
+    comment = 1;
+}
+comment == 1 {
+    if ($(NF) == "*/") comment = 0;
+    next;
+}
+
+# Skip preprocessing artefacts
+$1 == "extern" {
+    next;
+}
+/^#/ {
+    next;
+}
+
+# Drop empty lines
+NF == 0 {
+    next;
+}
+
+# Handle "handle:" line
+$1 == "handle:" {
+    if (NF < 3)
+        do_err("\"handle:\" requires at least two parameters");
+    val = rest_of_line(3);
+    xlate[val] = $2;
+    next;
+}
+
+# Handle "defhandle:" line
+$1 == "defhandle:" {
+    if (NF < 2)
+        do_err("\"defhandle:\" requires at least one parameter");
+    e++;
+    if (NF == 2) {
+        emit[e] = sprintf("DEFINE_XEN_GUEST_HANDLE(%s);", $2);
+    } else {
+        val = rest_of_line(3);
+        emit[e] = sprintf("__DEFINE_XEN_GUEST_HANDLE(%s, %s);", $2, val);
+        xlate[val] = $2;
+    }
+    next;
+}
+
+# Handle "rettype:" line
+$1 == "rettype:" {
+    if (NF < 3)
+        do_err("\"rettype:\" requires at least two parameters");
+    if ($2 in rettype)
+        do_err("rettype can be set only once for each prefix");
+    rettype[$2] = rest_of_line(3);
+    next;
+}
+
+# Handle "caller:" line
+$1 == "caller:" {
+    caller[$2] = 1;
+    next;
+}
+
+# Handle "prefix:" line
+$1 == "prefix:" {
+    p = NF - 1;
+    for (i = 2; i <= NF; i++) {
+        prefix[i - 1] = $(i);
+        if (!(prefix[i - 1] in rettype))
+            rettype[prefix[i - 1]] = "long";
+    }
+    next;
+}
+
+# Handle "table:" line
+$1 == "table:" {
+    table = 1;
+    for (i = 2; i <= NF; i++)
+        col[i - 1] = $(i);
+    n_cols = NF - 1;
+    next;
+}
+
+# Handle table definition line
+table == 1 {
+    if (NF != n_cols + 1)
+        do_err("Table definition line has wrong number of fields");
+    for (c = 1; c <= n_cols; c++) {
+        if (caller[col[c]] != 1)
+            continue;
+        if ($(c + 1) == "-")
+            continue;
+        pref = $(c + 1);
+        idx = index(pref, ":");
+        if (idx == 0)
+            prio = 100;
+        else {
+            prio = substr(pref, idx + 1) + 0;
+            pref = substr(pref, 1, idx - 1);
+            if (prio >= 100 || prio < 1)
+                do_err("Priority must be in the range 1..99");
+        }
+        fnd = 0;
+        for (i = 1; i <= n; i++) {
+            if (fn[i] != $1)
+                continue;
+            for (j = 1; j <= n_pre[i]; j++) {
+                if (pre[i, j] == pref) {
+                    prios[col[c], prio]++;
+                    if (prios[col[c], prio] == 1) {
+                        n_prios[col[c]]++;
+                        prio_list[col[c], n_prios[col[c]]] = prio;
+                        prio_mask[col[c], prio] = "(1ULL << __HYPERVISOR_"$1")";
+                    } else
+                        prio_mask[col[c], prio] = prio_mask[col[c], prio] " | (1ULL << __HYPERVISOR_"$1")";
+                    nc++;
+                    call[nc] = col[c];
+                    call_fn[nc] = i;
+                    call_p[nc] = j;
+                    call_prio[nc] = prio;
+                    fnd = 1;
+                }
+            }
+        }
+        if (fnd == 0)
+            do_err("No prototype for prefix/hypercall combination");
+    }
+    next;
+}
+
+# Prototype line
+{
+    bro = index($0, "(");
+    brc = index($0, ")");
+    if (bro < 2 || brc < bro)
+        do_err("No valid prototype line");
+    n++;
+    fn[n] = substr($0, 1, bro - 1);
+    n_pre[n] = p;
+    for (i = 1; i <= p; i++)
+        pre[n, i] = prefix[i];
+    args = substr($0, bro + 1, brc - bro - 1);
+    n_args[n] = split(args, a, ",");
+    if (n_args[n] > 5)
+        do_err("Too many parameters");
+    for (i = 1; i <= n_args[n]; i++) {
+        sub("^ *", "", a[i]);         # Remove leading white space
+        sub(" +", " ", a[i]);         # Replace multiple spaces with single ones
+        sub(" *$", "", a[i]);         # Remove trailing white space
+        ptr[n, i] = index(a[i], "*"); # Is it a pointer type?
+        sub("[*]", "", a[i]);         # Remove "*"
+        if (index(a[i], " ") == 0)
+            do_err("Parameter with no type or no name");
+        typ[n, i] = a[i];
+        sub(" [^ ]+$", "", typ[n, i]);    # Remove parameter name
+        if (ptr[n, i] && (typ[n, i] in xlate))
+            typ[n, i] = xlate[typ[n, i]];
+        arg[n, i] = a[i];
+        sub("^([^ ]+ )+", "", arg[n, i]); # Remove parameter type
+    }
+}
+
+# Generate the output
+END {
+    # Verbatim generated lines
+    for (i = 1; i <= e; i++)
+        printf("%s\n", emit[i]);
+    printf("\n");
+    # Generate prototypes
+    for (i = 1; i <= n; i++) {
+        for (p = 1; p <= n_pre[i]; p++) {
+            printf("%s cf_check %s_%s(", rettype[pre[i, p]], pre[i, p], fn[i]);
+            if (n_args[i] == 0)
+                printf("void");
+            else
+                for (j = 1; j <= n_args[i]; j++) {
+                    if (j > 1)
+                        printf(", ");
+                    if (ptr[i, j])
+                        printf("XEN_GUEST_HANDLE_PARAM(%s)", typ[i, j]);
+                    else
+                        printf("%s", typ[i, j]);
+                    printf(" %s", arg[i, j]);
+                }
+            printf(");\n");
+        }
+    }
+    # Generate call sequences and args array contents
+    for (ca in caller) {
+        if (caller[ca] != 1)
+            continue;
+        need_mask = 0;
+        for (pl = 1; pl <= n_prios[ca]; pl++) {
+            for (pll = pl; pll > 1; pll--) {
+                if (prio_list[ca, pl] > p_list[pll - 1])
+                    break;
+                else
+                    p_list[pll] = p_list[pll - 1];
+            }
+            p_list[pll] = prio_list[ca, pl];
+            # If any prio but the default one has more than 1 entry we need "mask"
+            if (p_list[pll] != 100 && prios[ca, p_list[pll]] > 1)
+                need_mask = 1;
+        }
+        printf("\n");
+        printf("#define call_handlers_%s(num, ret, a1, a2, a3, a4, a5) \\\n", ca);
+        printf("({ \\\n");
+        if (need_mask)
+            printf("    uint64_t mask = 1ULL << num; \\\n");
+        printf("    ");
+        for (pl = 1; pl <= n_prios[ca]; pl++) {
+            if (prios[ca, p_list[pl]] > 1) {
+                if (pl < n_prios[ca]) {
+                    printf("    if ( likely(mask & (%s)) ) \\\n", prio_mask[ca, p_list[pl]]);
+                    printf("    { \\\n");
+                }
+                if (prios[ca, p_list[pl]] == 2) {
+                    fnd = 0;
+                    for (i = 1; i <= nc; i++)
+                        if (call[i] == ca && call_prio[i] == p_list[pl]) {
+                            fnd++;
+                            if (fnd == 1)
+                                printf("        if ( num == __HYPERVISOR_%s ) \\\n", fn[call_fn[i]]);
+                            else
+                                printf("        else \\\n");
+                            do_call(call_fn[i], call_p[i]);
+                        }
+                } else {
+                    do_switch(ca, p_list[pl]);
+                }
+                if (pl < n_prios[ca])
+                    printf("    } \\\n");
+            } else {
+                for (i = 1; i <= nc; i++)
+                    if (call[i] == ca && call_prio[i] == p_list[pl]) {
+                        printf("if ( likely(num == __HYPERVISOR_%s) ) \\\n", fn[call_fn[i]]);
+                        do_call(call_fn[i], call_p[i]);
+                    }
+            }
+            if (pl < n_prios[ca] || prios[ca, p_list[pl]] <= 2)
+                printf("    else \\\n");
+        }
+        if (prios[ca, p_list[n_prios[ca]]] <= 2) {
+            printf("\\\n");
+            printf("        ret = -ENOSYS; \\\n");
+        }
+        printf("})\n");
+        delete p_list;
+        printf("\n");
+        printf("#define hypercall_args_%s \\\n", ca);
+        printf("{ \\\n");
+        for (i = 1; i <= nc; i++)
+            if (call[i] == ca)
+                printf("[__HYPERVISOR_%s] = %d, \\\n", fn[call_fn[i]], n_args[call_fn[i]]);
+        printf("}\n");
+    }
+}
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 07:34:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 07:34:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288157.488667 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDJg-0001z8-Pz; Thu, 10 Mar 2022 07:34:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288157.488667; Thu, 10 Mar 2022 07:34:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDJg-0001tY-DF; Thu, 10 Mar 2022 07:34:32 +0000
Received: by outflank-mailman (input) for mailman id 288157;
 Thu, 10 Mar 2022 07:34:29 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=QHx9=TV=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nSDJd-0000ZQ-4F
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 07:34:29 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 830f5fff-a044-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 08:34:26 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id A620321118;
 Thu, 10 Mar 2022 07:34:25 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 6180113FA3;
 Thu, 10 Mar 2022 07:34:25 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id eM2PFgGqKWIkIAAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 10 Mar 2022 07:34:25 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 830f5fff-a044-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646897665; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=6kPnP13BoiT67+pIZ2eno/H+dxIX2vBMmQiya/5eZeY=;
	b=n/HJh9+RKnhNyqQ4lu5BtffHDHULhWJ5zJD6sWF3QHNBuLXjL/VOmB6q4sVcP3dnLpuBFn
	MoYHpfzKAUJJtjH+IVPMhUWupcOfK5T1r1UsFfI2o1RYHltTstZEOuDuMif+/mJqx1XHyE
	oIElFpKqiKZvTN4SzmAx+lNei8ER6JA=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>,
	George Dunlap <george.dunlap@citrix.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Christopher Clark <christopher.w.clark@gmail.com>
Subject: [PATCH v4 04/11] xen: harmonize return types of hypercall handlers
Date: Thu, 10 Mar 2022 08:34:13 +0100
Message-Id: <20220310073420.15622-5-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220310073420.15622-1-jgross@suse.com>
References: <20220310073420.15622-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Today most hypercall handlers have a return type of long, while the
compat ones return an int. There are a few exceptions from that rule,
however.

Get rid of the exceptions by letting compat handlers always return int
and others always return long, with the exception of the Arm specific
physdev_op handler.

For the compat hvm case use eax instead of rax for the stored result as
it should have been from the beginning.

Additionally move some prototypes to include/asm-x86/hypercall.h
as they are x86 specific. Move the compat_platform_op() prototype to
the common header.

Rename paging_domctl_continuation() to do_paging_domctl_cont() and add
a matching define for the associated hypercall.

Make do_callback_op() and compat_callback_op() more similar by adding
the const attribute to compat_callback_op()'s 2nd parameter.

Change the type of the cmd parameter for [do|compat]_kexec_op() to
unsigned int, as this is more appropriate for the compat case.

Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
---
V2:
- rework platform_op compat handling (Jan Beulich)
V3:
- remove include of types.h (Jan Beulich)
V4:
- don't move do_physdev_op() (Julien Grall)
- carve out non style compliant parameter replacements (Julien Grall)
---
 xen/arch/x86/domctl.c                    |  4 +--
 xen/arch/x86/hvm/hypercall.c             |  8 ++----
 xen/arch/x86/hypercall.c                 |  2 +-
 xen/arch/x86/include/asm/hypercall.h     | 31 ++++++++++++------------
 xen/arch/x86/include/asm/paging.h        |  3 ---
 xen/arch/x86/mm/paging.c                 |  3 ++-
 xen/arch/x86/pv/callback.c               | 14 +++++------
 xen/arch/x86/pv/emul-priv-op.c           |  2 +-
 xen/arch/x86/pv/hypercall.c              |  5 +---
 xen/arch/x86/pv/iret.c                   |  4 +--
 xen/arch/x86/pv/misc-hypercalls.c        | 14 +++++++----
 xen/arch/x86/x86_64/platform_hypercall.c |  1 +
 xen/common/argo.c                        |  6 ++---
 xen/common/kexec.c                       |  6 ++---
 xen/include/xen/hypercall.h              | 20 +++++++--------
 15 files changed, 59 insertions(+), 64 deletions(-)

diff --git a/xen/arch/x86/domctl.c b/xen/arch/x86/domctl.c
index e49f9e91b9..ea7d60ffb6 100644
--- a/xen/arch/x86/domctl.c
+++ b/xen/arch/x86/domctl.c
@@ -221,8 +221,8 @@ long arch_do_domctl(
     case XEN_DOMCTL_shadow_op:
         ret = paging_domctl(d, &domctl->u.shadow_op, u_domctl, 0);
         if ( ret == -ERESTART )
-            return hypercall_create_continuation(__HYPERVISOR_arch_1,
-                                                 "h", u_domctl);
+            return hypercall_create_continuation(
+                       __HYPERVISOR_paging_domctl_cont, "h", u_domctl);
         copyback = true;
         break;
 
diff --git a/xen/arch/x86/hvm/hypercall.c b/xen/arch/x86/hvm/hypercall.c
index 030243810e..7ea1afd8fe 100644
--- a/xen/arch/x86/hvm/hypercall.c
+++ b/xen/arch/x86/hvm/hypercall.c
@@ -124,8 +124,6 @@ static long hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
     [ __HYPERVISOR_ ## x ] = { (hypercall_fn_t *) do_ ## x,  \
                                (hypercall_fn_t *) compat_ ## x }
 
-#define do_arch_1             paging_domctl_continuation
-
 static const struct {
     hypercall_fn_t *native, *compat;
 } hvm_hypercall_table[] = {
@@ -158,11 +156,9 @@ static const struct {
 #ifdef CONFIG_HYPFS
     HYPERCALL(hypfs_op),
 #endif
-    HYPERCALL(arch_1)
+    HYPERCALL(paging_domctl_cont)
 };
 
-#undef do_arch_1
-
 #undef HYPERCALL
 #undef HVM_CALL
 #undef COMPAT_CALL
@@ -300,7 +296,7 @@ int hvm_hypercall(struct cpu_user_regs *regs)
 #endif
 
         curr->hcall_compat = true;
-        regs->rax = hvm_hypercall_table[eax].compat(ebx, ecx, edx, esi, edi);
+        regs->eax = hvm_hypercall_table[eax].compat(ebx, ecx, edx, esi, edi);
         curr->hcall_compat = false;
 
 #ifndef NDEBUG
diff --git a/xen/arch/x86/hypercall.c b/xen/arch/x86/hypercall.c
index 2370d31d3f..07e1a45ef5 100644
--- a/xen/arch/x86/hypercall.c
+++ b/xen/arch/x86/hypercall.c
@@ -75,7 +75,7 @@ const hypercall_args_t hypercall_args_table[NR_hypercalls] =
     ARGS(dm_op, 3),
     ARGS(hypfs_op, 5),
     ARGS(mca, 1),
-    ARGS(arch_1, 1),
+    ARGS(paging_domctl_cont, 1),
 };
 
 #undef COMP
diff --git a/xen/arch/x86/include/asm/hypercall.h b/xen/arch/x86/include/asm/hypercall.h
index d6daa7e4cb..49973820af 100644
--- a/xen/arch/x86/include/asm/hypercall.h
+++ b/xen/arch/x86/include/asm/hypercall.h
@@ -11,6 +11,8 @@
 #include <public/arch-x86/xen-mca.h> /* for do_mca */
 #include <asm/paging.h>
 
+#define __HYPERVISOR_paging_domctl_cont __HYPERVISOR_arch_1
+
 typedef unsigned long hypercall_fn_t(
     unsigned long, unsigned long, unsigned long,
     unsigned long, unsigned long);
@@ -80,7 +82,7 @@ do_set_debugreg(
     int reg,
     unsigned long value);
 
-extern unsigned long cf_check
+extern long cf_check
 do_get_debugreg(
     int reg);
 
@@ -118,7 +120,7 @@ do_mmuext_op(
 extern long cf_check do_callback_op(
     int cmd, XEN_GUEST_HANDLE_PARAM(const_void) arg);
 
-extern unsigned long cf_check
+extern long cf_check
 do_iret(
     void);
 
@@ -133,17 +135,20 @@ do_set_segment_base(
     unsigned int which,
     unsigned long base);
 
+long cf_check do_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
+
+long cf_check do_xenpmu_op(unsigned int op,
+                           XEN_GUEST_HANDLE_PARAM(xen_pmu_params_t) arg);
+
+long cf_check do_paging_domctl_cont(
+    XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl);
+
 #ifdef CONFIG_COMPAT
 
 #include <compat/arch-x86/xen.h>
 #include <compat/physdev.h>
 #include <compat/platform.h>
 
-extern int cf_check
-compat_physdev_op(
-    int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
 extern int
 compat_common_vcpu_op(
     int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg);
@@ -154,12 +159,8 @@ extern int cf_check compat_mmuext_op(
     XEN_GUEST_HANDLE_PARAM(uint) pdone,
     unsigned int foreigndom);
 
-DEFINE_XEN_GUEST_HANDLE(compat_platform_op_t);
-extern int cf_check compat_platform_op(
-    XEN_GUEST_HANDLE_PARAM(compat_platform_op_t) u_xenpf_op);
-
-extern long cf_check compat_callback_op(
-    int cmd, XEN_GUEST_HANDLE(void) arg);
+extern int cf_check compat_callback_op(
+    int cmd, XEN_GUEST_HANDLE(const_void) arg);
 
 extern int cf_check compat_update_va_mapping(
     unsigned int va, uint32_t lo, uint32_t hi, unsigned int flags);
@@ -177,12 +178,12 @@ extern int cf_check compat_set_gdt(
 extern int cf_check compat_update_descriptor(
     uint32_t pa_lo, uint32_t pa_hi, uint32_t desc_lo, uint32_t desc_hi);
 
-extern unsigned int cf_check compat_iret(void);
+extern int cf_check compat_iret(void);
 
 extern int cf_check compat_nmi_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
 
-extern long cf_check compat_set_callbacks(
+extern int cf_check compat_set_callbacks(
     unsigned long event_selector, unsigned long event_address,
     unsigned long failsafe_selector, unsigned long failsafe_address);
 
diff --git a/xen/arch/x86/include/asm/paging.h b/xen/arch/x86/include/asm/paging.h
index f0b4efc66e..54c440be65 100644
--- a/xen/arch/x86/include/asm/paging.h
+++ b/xen/arch/x86/include/asm/paging.h
@@ -234,9 +234,6 @@ int paging_domctl(struct domain *d, struct xen_domctl_shadow_op *sc,
                   XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl,
                   bool_t resuming);
 
-/* Helper hypercall for dealing with continuations. */
-long cf_check paging_domctl_continuation(XEN_GUEST_HANDLE_PARAM(xen_domctl_t));
-
 /* Call when destroying a vcpu/domain */
 void paging_vcpu_teardown(struct vcpu *v);
 int paging_teardown(struct domain *d);
diff --git a/xen/arch/x86/mm/paging.c b/xen/arch/x86/mm/paging.c
index 1f0b94ad21..a7e2707ecc 100644
--- a/xen/arch/x86/mm/paging.c
+++ b/xen/arch/x86/mm/paging.c
@@ -21,6 +21,7 @@
 
 #include <xen/init.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <asm/paging.h>
 #include <asm/shadow.h>
 #include <asm/p2m.h>
@@ -759,7 +760,7 @@ int paging_domctl(struct domain *d, struct xen_domctl_shadow_op *sc,
         return shadow_domctl(d, sc, u_domctl);
 }
 
-long cf_check paging_domctl_continuation(
+long cf_check do_paging_domctl_cont(
     XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl)
 {
     struct xen_domctl op;
diff --git a/xen/arch/x86/pv/callback.c b/xen/arch/x86/pv/callback.c
index 55148c7f9e..1be9d3f731 100644
--- a/xen/arch/x86/pv/callback.c
+++ b/xen/arch/x86/pv/callback.c
@@ -207,9 +207,9 @@ long cf_check do_set_callbacks(
 #include <compat/callback.h>
 #include <compat/nmi.h>
 
-static long compat_register_guest_callback(struct compat_callback_register *reg)
+static int compat_register_guest_callback(struct compat_callback_register *reg)
 {
-    long ret = 0;
+    int ret = 0;
     struct vcpu *curr = current;
 
     fixup_guest_code_selector(curr->domain, reg->address.cs);
@@ -256,10 +256,10 @@ static long compat_register_guest_callback(struct compat_callback_register *reg)
     return ret;
 }
 
-static long compat_unregister_guest_callback(
+static int compat_unregister_guest_callback(
     struct compat_callback_unregister *unreg)
 {
-    long ret;
+    int ret;
 
     switch ( unreg->type )
     {
@@ -283,9 +283,9 @@ static long compat_unregister_guest_callback(
     return ret;
 }
 
-long cf_check compat_callback_op(int cmd, XEN_GUEST_HANDLE(void) arg)
+int cf_check compat_callback_op(int cmd, XEN_GUEST_HANDLE(const_void) arg)
 {
-    long ret;
+    int ret;
 
     switch ( cmd )
     {
@@ -321,7 +321,7 @@ long cf_check compat_callback_op(int cmd, XEN_GUEST_HANDLE(void) arg)
     return ret;
 }
 
-long cf_check compat_set_callbacks(
+int cf_check compat_set_callbacks(
     unsigned long event_selector, unsigned long event_address,
     unsigned long failsafe_selector, unsigned long failsafe_address)
 {
diff --git a/xen/arch/x86/pv/emul-priv-op.c b/xen/arch/x86/pv/emul-priv-op.c
index 22b10dec2a..5da00e24e4 100644
--- a/xen/arch/x86/pv/emul-priv-op.c
+++ b/xen/arch/x86/pv/emul-priv-op.c
@@ -22,13 +22,13 @@
 #include <xen/domain_page.h>
 #include <xen/event.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/iocap.h>
 
 #include <asm/amd.h>
 #include <asm/debugreg.h>
 #include <asm/endbr.h>
 #include <asm/hpet.h>
-#include <asm/hypercall.h>
 #include <asm/mc146818rtc.h>
 #include <asm/pv/domain.h>
 #include <asm/pv/trace.h>
diff --git a/xen/arch/x86/pv/hypercall.c b/xen/arch/x86/pv/hypercall.c
index e8fbee7bbb..fe8dfe9e8f 100644
--- a/xen/arch/x86/pv/hypercall.c
+++ b/xen/arch/x86/pv/hypercall.c
@@ -47,8 +47,6 @@ typedef struct {
 #define COMPAT_CALL(x) HYPERCALL(x)
 #endif
 
-#define do_arch_1             paging_domctl_continuation
-
 static const pv_hypercall_table_t pv_hypercall_table[] = {
     COMPAT_CALL(set_trap_table),
     HYPERCALL(mmu_update),
@@ -109,11 +107,10 @@ static const pv_hypercall_table_t pv_hypercall_table[] = {
 #endif
     HYPERCALL(mca),
 #ifndef CONFIG_PV_SHIM_EXCLUSIVE
-    HYPERCALL(arch_1),
+    HYPERCALL(paging_domctl_cont),
 #endif
 };
 
-#undef do_arch_1
 #undef COMPAT_CALL
 #undef HYPERCALL
 
diff --git a/xen/arch/x86/pv/iret.c b/xen/arch/x86/pv/iret.c
index dd2965d8f0..55eb6a63bd 100644
--- a/xen/arch/x86/pv/iret.c
+++ b/xen/arch/x86/pv/iret.c
@@ -48,7 +48,7 @@ static void async_exception_cleanup(struct vcpu *curr)
         curr->arch.async_exception_state(trap).old_mask;
 }
 
-unsigned long cf_check do_iret(void)
+long cf_check do_iret(void)
 {
     struct cpu_user_regs *regs = guest_cpu_user_regs();
     struct iret_context iret_saved;
@@ -105,7 +105,7 @@ unsigned long cf_check do_iret(void)
 }
 
 #ifdef CONFIG_PV32
-unsigned int cf_check compat_iret(void)
+int cf_check compat_iret(void)
 {
     struct cpu_user_regs *regs = guest_cpu_user_regs();
     struct vcpu *v = current;
diff --git a/xen/arch/x86/pv/misc-hypercalls.c b/xen/arch/x86/pv/misc-hypercalls.c
index 5649aaab44..635f5a644a 100644
--- a/xen/arch/x86/pv/misc-hypercalls.c
+++ b/xen/arch/x86/pv/misc-hypercalls.c
@@ -28,12 +28,16 @@ long cf_check do_set_debugreg(int reg, unsigned long value)
     return set_debugreg(current, reg, value);
 }
 
-unsigned long cf_check do_get_debugreg(int reg)
+long cf_check do_get_debugreg(int reg)
 {
-    unsigned long val;
-    int res = x86emul_read_dr(reg, &val, NULL);
-
-    return res == X86EMUL_OKAY ? val : -ENODEV;
+    /* Avoid implementation defined behavior casting unsigned long to long. */
+    union {
+        unsigned long val;
+        long ret;
+    } u;
+    int res = x86emul_read_dr(reg, &u.val, NULL);
+
+    return res == X86EMUL_OKAY ? u.ret : -ENODEV;
 }
 
 long cf_check do_fpu_taskswitch(int set)
diff --git a/xen/arch/x86/x86_64/platform_hypercall.c b/xen/arch/x86/x86_64/platform_hypercall.c
index 966fd27b5f..2c21a3fd05 100644
--- a/xen/arch/x86/x86_64/platform_hypercall.c
+++ b/xen/arch/x86/x86_64/platform_hypercall.c
@@ -4,6 +4,7 @@
 
 EMIT_FILE;
 
+#include <xen/hypercall.h>
 #include <xen/lib.h>
 #include <compat/platform.h>
 #include <xen/hypercall.h>
diff --git a/xen/common/argo.c b/xen/common/argo.c
index 297f6d11f0..26a01c2188 100644
--- a/xen/common/argo.c
+++ b/xen/common/argo.c
@@ -2207,13 +2207,13 @@ do_argo_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg1,
 }
 
 #ifdef CONFIG_COMPAT
-long cf_check
+int cf_check
 compat_argo_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg1,
                XEN_GUEST_HANDLE_PARAM(void) arg2, unsigned long arg3,
                unsigned long arg4)
 {
     struct domain *currd = current->domain;
-    long rc;
+    int rc;
     xen_argo_send_addr_t send_addr;
     xen_argo_iov_t iovs[XEN_ARGO_MAXIOV];
     compat_argo_iov_t compat_iovs[XEN_ARGO_MAXIOV];
@@ -2267,7 +2267,7 @@ compat_argo_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg1,
 
     rc = sendv(currd, &send_addr.src, &send_addr.dst, iovs, niov, arg4);
  out:
-    argo_dprintk("<-compat_argo_op(%u)=%ld\n", cmd, rc);
+    argo_dprintk("<-compat_argo_op(%u)=%d\n", cmd, rc);
 
     return rc;
 }
diff --git a/xen/common/kexec.c b/xen/common/kexec.c
index a2ffb6530c..41669964d2 100644
--- a/xen/common/kexec.c
+++ b/xen/common/kexec.c
@@ -1213,7 +1213,7 @@ static int kexec_status(XEN_GUEST_HANDLE_PARAM(void) uarg)
     return !!test_bit(bit, &kexec_flags);
 }
 
-static int do_kexec_op_internal(unsigned long op,
+static int do_kexec_op_internal(unsigned int op,
                                 XEN_GUEST_HANDLE_PARAM(void) uarg,
                                 bool_t compat)
 {
@@ -1265,13 +1265,13 @@ static int do_kexec_op_internal(unsigned long op,
     return ret;
 }
 
-long cf_check do_kexec_op(unsigned long op, XEN_GUEST_HANDLE_PARAM(void) uarg)
+long cf_check do_kexec_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg)
 {
     return do_kexec_op_internal(op, uarg, 0);
 }
 
 #ifdef CONFIG_COMPAT
-int cf_check compat_kexec_op(unsigned long op, XEN_GUEST_HANDLE_PARAM(void) uarg)
+int cf_check compat_kexec_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg)
 {
     return do_kexec_op_internal(op, uarg, 1);
 }
diff --git a/xen/include/xen/hypercall.h b/xen/include/xen/hypercall.h
index 81aae7a662..a032ba2b4a 100644
--- a/xen/include/xen/hypercall.h
+++ b/xen/include/xen/hypercall.h
@@ -114,11 +114,6 @@ common_vcpu_op(int cmd,
     struct vcpu *v,
     XEN_GUEST_HANDLE_PARAM(void) arg);
 
-extern long cf_check
-do_nmi_op(
-    unsigned int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
 extern long cf_check
 do_hvm_op(
     unsigned long op,
@@ -126,7 +121,7 @@ do_hvm_op(
 
 extern long cf_check
 do_kexec_op(
-    unsigned long op,
+    unsigned int op,
     XEN_GUEST_HANDLE_PARAM(void) uarg);
 
 extern long cf_check
@@ -145,9 +140,6 @@ extern long cf_check do_argo_op(
 extern long cf_check
 do_xenoprof_op(int op, XEN_GUEST_HANDLE_PARAM(void) arg);
 
-extern long cf_check
-do_xenpmu_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(xen_pmu_params_t) arg);
-
 extern long cf_check
 do_dm_op(
     domid_t domid,
@@ -205,15 +197,21 @@ extern int cf_check compat_xsm_op(
     XEN_GUEST_HANDLE_PARAM(void) op);
 
 extern int cf_check compat_kexec_op(
-    unsigned long op, XEN_GUEST_HANDLE_PARAM(void) uarg);
+    unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg);
 
 DEFINE_XEN_GUEST_HANDLE(multicall_entry_compat_t);
 extern int cf_check compat_multicall(
     XEN_GUEST_HANDLE_PARAM(multicall_entry_compat_t) call_list,
     uint32_t nr_calls);
 
+int compat_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
+
+typedef struct compat_platform_op compat_platform_op_t;
+DEFINE_XEN_GUEST_HANDLE(compat_platform_op_t);
+int compat_platform_op(XEN_GUEST_HANDLE_PARAM(compat_platform_op_t) u_xenpf_op);
+
 #ifdef CONFIG_ARGO
-extern long cf_check compat_argo_op(
+extern int cf_check compat_argo_op(
     unsigned int cmd,
     XEN_GUEST_HANDLE_PARAM(void) arg1,
     XEN_GUEST_HANDLE_PARAM(void) arg2,
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 07:34:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 07:34:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288158.488676 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDJh-00027m-Nt; Thu, 10 Mar 2022 07:34:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288158.488676; Thu, 10 Mar 2022 07:34:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDJh-000249-6k; Thu, 10 Mar 2022 07:34:33 +0000
Received: by outflank-mailman (input) for mailman id 288158;
 Thu, 10 Mar 2022 07:34:30 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=QHx9=TV=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nSDJe-0000ZQ-4b
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 07:34:30 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 8404a4ca-a044-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 08:34:27 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 62FA71F44B;
 Thu, 10 Mar 2022 07:34:27 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 31F7613FA3;
 Thu, 10 Mar 2022 07:34:27 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id yKD/CgOqKWIkIAAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 10 Mar 2022 07:34:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8404a4ca-a044-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646897667; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=9NMDfmYhtLw/sL7CfosAM4fVar8Ox4MuCe1fU0MA7/w=;
	b=LPD0Z47JivGhV+0vIBFkTMe1cHUw99QEDF0mlnkQCzc6EbCRgeYMlKCPKVU3etg4GmXKBz
	dWG+05viWe74dD4kaUuVwUNo9uDmsjHTlBzoz2atTfWhk1riBmgwMJXvQqnIMZbDf9s0hR
	2QTV2zU6I8JmTo8k20+MwPV9WO/IfxE=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Michal Orzel <michal.orzel@arm.com>
Subject: [PATCH v4 10/11] xen/arm: call hypercall handlers via generated macro
Date: Thu, 10 Mar 2022 08:34:19 +0100
Message-Id: <20220310073420.15622-11-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220310073420.15622-1-jgross@suse.com>
References: <20220310073420.15622-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Instead of using a function table use the generated macros for calling
the appropriate hypercall handlers.

This makes the calls of the handlers type safe.

For deprecated hypercalls define stub functions.

Signed-off-by: Juergen Gross <jgross@suse.com>
Tested-by: Michal Orzel <michal.orzel@arm.com>
---
V2:
- make hypercall_args[] const (Jan Beulich)
---
 xen/arch/arm/traps.c | 124 +++++++++----------------------------------
 1 file changed, 26 insertions(+), 98 deletions(-)

diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
index deb07784d9..98eab9a379 100644
--- a/xen/arch/arm/traps.c
+++ b/xen/arch/arm/traps.c
@@ -1331,67 +1331,20 @@ static register_t do_deprecated_hypercall(void)
     return -ENOSYS;
 }
 
-typedef register_t (*arm_hypercall_fn_t)(
-    register_t, register_t, register_t, register_t, register_t);
-
-typedef struct {
-    arm_hypercall_fn_t fn;
-    int nr_args;
-} arm_hypercall_t;
-
-#define HYPERCALL(_name, _nr_args)                                   \
-    [ __HYPERVISOR_ ## _name ] =  {                                  \
-        .fn = (arm_hypercall_fn_t) &do_ ## _name,                    \
-        .nr_args = _nr_args,                                         \
-    }
+long dep_sched_op_compat(int cmd, unsigned long arg)
+{
+    return do_deprecated_hypercall();
+}
 
-#define HYPERCALL_ARM(_name, _nr_args)                        \
-    [ __HYPERVISOR_ ## _name ] =  {                                  \
-        .fn = (arm_hypercall_fn_t) &do_arm_ ## _name,                \
-        .nr_args = _nr_args,                                         \
-    }
-/*
- * Only use this for hypercalls which were deprecated (i.e. replaced
- * by something else) before Xen on ARM was created, i.e. *not* for
- * hypercalls which are simply not yet used on ARM.
- */
-#define HYPERCALL_DEPRECATED(_name, _nr_args)                   \
-    [ __HYPERVISOR_##_name ] = {                                \
-        .fn = (arm_hypercall_fn_t) &do_deprecated_hypercall,    \
-        .nr_args = _nr_args,                                    \
-    }
+long dep_event_channel_op_compat(XEN_GUEST_HANDLE_PARAM(evtchn_op_t) uop)
+{
+    return do_deprecated_hypercall();
+}
 
-static arm_hypercall_t arm_hypercall_table[] = {
-    HYPERCALL(memory_op, 2),
-    HYPERCALL(domctl, 1),
-    HYPERCALL(sched_op, 2),
-    HYPERCALL_DEPRECATED(sched_op_compat, 2),
-    HYPERCALL(console_io, 3),
-    HYPERCALL(xen_version, 2),
-    HYPERCALL(xsm_op, 1),
-    HYPERCALL(event_channel_op, 2),
-    HYPERCALL_DEPRECATED(event_channel_op_compat, 1),
-    HYPERCALL_ARM(physdev_op, 2),
-    HYPERCALL_DEPRECATED(physdev_op_compat, 1),
-    HYPERCALL(sysctl, 2),
-    HYPERCALL(hvm_op, 2),
-#ifdef CONFIG_GRANT_TABLE
-    HYPERCALL(grant_table_op, 3),
-#endif
-    HYPERCALL(multicall, 2),
-    HYPERCALL(platform_op, 1),
-    HYPERCALL(vcpu_op, 3),
-    HYPERCALL(vm_assist, 2),
-#ifdef CONFIG_ARGO
-    HYPERCALL(argo_op, 5),
-#endif
-#ifdef CONFIG_HYPFS
-    HYPERCALL(hypfs_op, 5),
-#endif
-#ifdef CONFIG_IOREQ_SERVER
-    HYPERCALL(dm_op, 3),
-#endif
-};
+long dep_physdev_op_compat(XEN_GUEST_HANDLE_PARAM(physdev_op_t) uop)
+{
+    return do_deprecated_hypercall();
+}
 
 #ifndef NDEBUG
 static void do_debug_trap(struct cpu_user_regs *regs, unsigned int code)
@@ -1430,7 +1383,6 @@ static void do_debug_trap(struct cpu_user_regs *regs, unsigned int code)
 #define HYPERCALL_ARG3(r) (r)->x2
 #define HYPERCALL_ARG4(r) (r)->x3
 #define HYPERCALL_ARG5(r) (r)->x4
-#define HYPERCALL_ARGS(r) (r)->x0, (r)->x1, (r)->x2, (r)->x3, (r)->x4
 #else
 #define HYPERCALL_RESULT_REG(r) (r)->r0
 #define HYPERCALL_ARG1(r) (r)->r0
@@ -1438,52 +1390,40 @@ static void do_debug_trap(struct cpu_user_regs *regs, unsigned int code)
 #define HYPERCALL_ARG3(r) (r)->r2
 #define HYPERCALL_ARG4(r) (r)->r3
 #define HYPERCALL_ARG5(r) (r)->r4
-#define HYPERCALL_ARGS(r) (r)->r0, (r)->r1, (r)->r2, (r)->r3, (r)->r4
 #endif
 
+static const unsigned char hypercall_args[] = hypercall_args_arm;
+
 static void do_trap_hypercall(struct cpu_user_regs *regs, register_t *nr,
                               const union hsr hsr)
 {
-    arm_hypercall_fn_t call = NULL;
     struct vcpu *curr = current;
 
-    BUILD_BUG_ON(NR_hypercalls < ARRAY_SIZE(arm_hypercall_table) );
-
     if ( hsr.iss != XEN_HYPERCALL_TAG )
     {
         gprintk(XENLOG_WARNING, "Invalid HVC imm 0x%x\n", hsr.iss);
         return inject_undef_exception(regs, hsr);
     }
 
-    if ( *nr >= ARRAY_SIZE(arm_hypercall_table) )
-    {
-        perfc_incr(invalid_hypercalls);
-        HYPERCALL_RESULT_REG(regs) = -ENOSYS;
-        return;
-    }
-
     curr->hcall_preempted = false;
 
     perfc_incra(hypercalls, *nr);
-    call = arm_hypercall_table[*nr].fn;
-    if ( call == NULL )
-    {
-        HYPERCALL_RESULT_REG(regs) = -ENOSYS;
-        return;
-    }
 
-    HYPERCALL_RESULT_REG(regs) = call(HYPERCALL_ARGS(regs));
+    call_handlers_arm(*nr, HYPERCALL_RESULT_REG(regs), HYPERCALL_ARG1(regs),
+                      HYPERCALL_ARG2(regs), HYPERCALL_ARG3(regs),
+                      HYPERCALL_ARG4(regs), HYPERCALL_ARG5(regs));
 
 #ifndef NDEBUG
-    if ( !curr->hcall_preempted )
+    if ( !curr->hcall_preempted && HYPERCALL_RESULT_REG(regs) != -ENOSYS )
     {
         /* Deliberately corrupt parameter regs used by this hypercall. */
-        switch ( arm_hypercall_table[*nr].nr_args ) {
+        switch ( hypercall_args[*nr] ) {
         case 5: HYPERCALL_ARG5(regs) = 0xDEADBEEF;
         case 4: HYPERCALL_ARG4(regs) = 0xDEADBEEF;
         case 3: HYPERCALL_ARG3(regs) = 0xDEADBEEF;
         case 2: HYPERCALL_ARG2(regs) = 0xDEADBEEF;
         case 1: /* Don't clobber x0/r0 -- it's the return value */
+        case 0: /* -ENOSYS case */
             break;
         default: BUG();
         }
@@ -1520,7 +1460,10 @@ static bool check_multicall_32bit_clean(struct multicall_entry *multi)
 {
     int i;
 
-    for ( i = 0; i < arm_hypercall_table[multi->op].nr_args; i++ )
+    if ( multi->op >= ARRAY_SIZE(hypercall_args) )
+        return true;
+
+    for ( i = 0; i < hypercall_args[multi->op]; i++ )
     {
         if ( unlikely(multi->args[i] & 0xffffffff00000000ULL) )
         {
@@ -1537,28 +1480,13 @@ static bool check_multicall_32bit_clean(struct multicall_entry *multi)
 enum mc_disposition arch_do_multicall_call(struct mc_state *state)
 {
     struct multicall_entry *multi = &state->call;
-    arm_hypercall_fn_t call = NULL;
-
-    if ( multi->op >= ARRAY_SIZE(arm_hypercall_table) )
-    {
-        multi->result = -ENOSYS;
-        return mc_continue;
-    }
-
-    call = arm_hypercall_table[multi->op].fn;
-    if ( call == NULL )
-    {
-        multi->result = -ENOSYS;
-        return mc_continue;
-    }
 
     if ( is_32bit_domain(current->domain) &&
          !check_multicall_32bit_clean(multi) )
         return mc_continue;
 
-    multi->result = call(multi->args[0], multi->args[1],
-                         multi->args[2], multi->args[3],
-                         multi->args[4]);
+    call_handlers_arm(multi->op, multi->result, multi->args[0], multi->args[1],
+                      multi->args[2], multi->args[3], multi->args[4]);
 
     return likely(!regs_mode_is_user(guest_cpu_user_regs()))
            ? mc_continue : mc_preempt;
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 07:34:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 07:34:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288159.488691 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDJj-0002hE-Os; Thu, 10 Mar 2022 07:34:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288159.488691; Thu, 10 Mar 2022 07:34:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDJj-0002cm-EU; Thu, 10 Mar 2022 07:34:35 +0000
Received: by outflank-mailman (input) for mailman id 288159;
 Thu, 10 Mar 2022 07:34:30 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=QHx9=TV=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nSDJe-0000ZP-0o
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 07:34:30 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 81962ef3-a044-11ec-8539-5f4723681683;
 Thu, 10 Mar 2022 08:34:23 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id E0C6121122;
 Thu, 10 Mar 2022 07:34:26 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 9567113FA5;
 Thu, 10 Mar 2022 07:34:26 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id qClbIwKqKWIkIAAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 10 Mar 2022 07:34:26 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 81962ef3-a044-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646897666; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=fpeb6uD18aovTlXLd3NOy6bT95PYcP/pbwh726wUhUU=;
	b=rnDeeYz24m2Lmj16sckhmuEFSZzc3nNAt41OPCQvBNGHz0m96r5y67KZL4F9drNFS6e0zM
	y0DBhnMoE4TEl1TvNXO76ooUMWgd9Hm0tG82W32+lPXQZy/B29/c3RD30q+VN3Iukst87f
	W7Cg2HsqtVaOFmScbO52O8qCnrN9OpA=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>
Subject: [PATCH v4 08/11] xen: use generated prototypes for hypercall handlers
Date: Thu, 10 Mar 2022 08:34:17 +0100
Message-Id: <20220310073420.15622-9-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220310073420.15622-1-jgross@suse.com>
References: <20220310073420.15622-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Remove the hypercall handler's prototypes in the related header files
and use the generated ones instead.

Some handlers having been static before need to be made globally
visible.

Signed-off-by: Juergen Gross <jgross@suse.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
---
 xen/arch/arm/include/asm/hypercall.h |   1 -
 xen/arch/x86/hvm/hypercall.c         |   7 +-
 xen/arch/x86/include/asm/hypercall.h | 141 ---------------------
 xen/include/xen/hypercall.h          | 177 +--------------------------
 4 files changed, 5 insertions(+), 321 deletions(-)

diff --git a/xen/arch/arm/include/asm/hypercall.h b/xen/arch/arm/include/asm/hypercall.h
index 8182895358..ccd26c5184 100644
--- a/xen/arch/arm/include/asm/hypercall.h
+++ b/xen/arch/arm/include/asm/hypercall.h
@@ -6,7 +6,6 @@
 #define __ASM_ARM_HYPERCALL_H__
 
 #include <public/domctl.h> /* for arch_do_domctl */
-int do_arm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
 
 long subarch_do_domctl(struct xen_domctl *domctl, struct domain *d,
                        XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl);
diff --git a/xen/arch/x86/hvm/hypercall.c b/xen/arch/x86/hvm/hypercall.c
index 7ea1afd8fe..a9c9ad721f 100644
--- a/xen/arch/x86/hvm/hypercall.c
+++ b/xen/arch/x86/hvm/hypercall.c
@@ -31,8 +31,7 @@
 #include <public/hvm/hvm_op.h>
 #include <public/hvm/params.h>
 
-static long cf_check hvm_memory_op(
-    unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long cf_check hvm_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     long rc;
 
@@ -52,7 +51,7 @@ static long cf_check hvm_memory_op(
 }
 
 #ifdef CONFIG_GRANT_TABLE
-static long cf_check hvm_grant_table_op(
+long cf_check hvm_grant_table_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) uop, unsigned int count)
 {
     switch ( cmd )
@@ -78,7 +77,7 @@ static long cf_check hvm_grant_table_op(
 }
 #endif
 
-static long hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long cf_check hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     const struct vcpu *curr = current;
     const struct domain *currd = curr->domain;
diff --git a/xen/arch/x86/include/asm/hypercall.h b/xen/arch/x86/include/asm/hypercall.h
index 81ca25f7b3..2d243b48bc 100644
--- a/xen/arch/x86/include/asm/hypercall.h
+++ b/xen/arch/x86/include/asm/hypercall.h
@@ -44,109 +44,6 @@ void pv_ring3_init_hypercall_page(void *ptr);
  */
 #define MMU_UPDATE_PREEMPTED          (~(~0U>>1))
 
-extern long cf_check
-do_event_channel_op_compat(
-    XEN_GUEST_HANDLE_PARAM(evtchn_op_t) uop);
-
-/* Legacy hypercall (as of 0x00030202). */
-extern long cf_check do_physdev_op_compat(
-    XEN_GUEST_HANDLE(physdev_op_t) uop);
-
-/* Legacy hypercall (as of 0x00030101). */
-extern long cf_check do_sched_op_compat(
-    int cmd, unsigned long arg);
-
-extern long cf_check
-do_set_trap_table(
-    XEN_GUEST_HANDLE_PARAM(const_trap_info_t) traps);
-
-extern long cf_check
-do_mmu_update(
-    XEN_GUEST_HANDLE_PARAM(mmu_update_t) ureqs,
-    unsigned int count,
-    XEN_GUEST_HANDLE_PARAM(uint) pdone,
-    unsigned int foreigndom);
-
-extern long cf_check
-do_set_gdt(
-    XEN_GUEST_HANDLE_PARAM(xen_ulong_t) frame_list,
-    unsigned int entries);
-
-extern long cf_check
-do_stack_switch(
-    unsigned long ss,
-    unsigned long esp);
-
-extern long cf_check
-do_fpu_taskswitch(
-    int set);
-
-extern long cf_check
-do_set_debugreg(
-    int reg,
-    unsigned long value);
-
-extern long cf_check
-do_get_debugreg(
-    int reg);
-
-extern long cf_check
-do_update_descriptor(
-    uint64_t gaddr, seg_desc_t desc);
-
-extern long cf_check
-do_mca(XEN_GUEST_HANDLE_PARAM(xen_mc_t) u_xen_mc);
-
-extern long cf_check
-do_update_va_mapping(
-    unsigned long va,
-    uint64_t val64,
-    unsigned long flags);
-
-extern long cf_check
-do_physdev_op(
-    int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern long cf_check
-do_update_va_mapping_otherdomain(
-    unsigned long va,
-    uint64_t val64,
-    unsigned long flags,
-    domid_t domid);
-
-extern long cf_check
-do_mmuext_op(
-    XEN_GUEST_HANDLE_PARAM(mmuext_op_t) uops,
-    unsigned int count,
-    XEN_GUEST_HANDLE_PARAM(uint) pdone,
-    unsigned int foreigndom);
-
-extern long cf_check do_callback_op(
-    int cmd, XEN_GUEST_HANDLE_PARAM(const_void) arg);
-
-extern long cf_check
-do_iret(
-    void);
-
-extern long cf_check
-do_set_callbacks(
-    unsigned long event_address,
-    unsigned long failsafe_address,
-    unsigned long syscall_address);
-
-extern long cf_check
-do_set_segment_base(
-    unsigned int which,
-    unsigned long base);
-
-long cf_check do_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
-
-long cf_check do_xenpmu_op(unsigned int op,
-                           XEN_GUEST_HANDLE_PARAM(xen_pmu_params_t) arg);
-
-long cf_check do_paging_domctl_cont(
-    XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl);
-
 #ifdef CONFIG_COMPAT
 
 #include <compat/arch-x86/xen.h>
@@ -157,44 +54,6 @@ extern int
 compat_common_vcpu_op(
     int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg);
 
-extern int cf_check compat_mmuext_op(
-    XEN_GUEST_HANDLE_PARAM(void) arg,
-    unsigned int count,
-    XEN_GUEST_HANDLE_PARAM(uint) pdone,
-    unsigned int foreigndom);
-
-extern int cf_check compat_callback_op(
-    int cmd, XEN_GUEST_HANDLE(const_void) arg);
-
-extern int cf_check compat_update_va_mapping(
-    unsigned int va, uint32_t lo, uint32_t hi, unsigned int flags);
-
-extern int cf_check compat_update_va_mapping_otherdomain(
-    unsigned int va, uint32_t lo, uint32_t hi, unsigned int flags, domid_t domid);
-
-DEFINE_XEN_GUEST_HANDLE(trap_info_compat_t);
-extern int cf_check compat_set_trap_table(
-    XEN_GUEST_HANDLE(trap_info_compat_t) traps);
-
-extern int cf_check compat_set_gdt(
-    XEN_GUEST_HANDLE_PARAM(uint) frame_list, unsigned int entries);
-
-extern int cf_check compat_update_descriptor(
-    uint32_t pa_lo, uint32_t pa_hi, uint32_t desc_lo, uint32_t desc_hi);
-
-extern int cf_check compat_iret(void);
-
-extern int cf_check compat_nmi_op(
-    unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern int cf_check compat_set_callbacks(
-    unsigned long event_selector, unsigned long event_address,
-    unsigned long failsafe_selector, unsigned long failsafe_address);
-
-DEFINE_XEN_GUEST_HANDLE(physdev_op_compat_t);
-extern int cf_check compat_physdev_op_compat(
-    XEN_GUEST_HANDLE(physdev_op_compat_t) uop);
-
 #endif /* CONFIG_COMPAT */
 
 #endif /* __ASM_X86_HYPERCALL_H__ */
diff --git a/xen/include/xen/hypercall.h b/xen/include/xen/hypercall.h
index ca8ee22717..f307dfb597 100644
--- a/xen/include/xen/hypercall.h
+++ b/xen/include/xen/hypercall.h
@@ -21,33 +21,19 @@
 #include <asm/hypercall.h>
 #include <xsm/xsm.h>
 
-extern long cf_check
-do_sched_op(
-    int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern long cf_check
-do_domctl(
-    XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl);
+/* Needs to be after asm/hypercall.h. */
+#include <xen/hypercall-defs.h>
 
 extern long
 arch_do_domctl(
     struct xen_domctl *domctl, struct domain *d,
     XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl);
 
-extern long cf_check
-do_sysctl(
-    XEN_GUEST_HANDLE_PARAM(xen_sysctl_t) u_sysctl);
-
 extern long
 arch_do_sysctl(
     struct xen_sysctl *sysctl,
     XEN_GUEST_HANDLE_PARAM(xen_sysctl_t) u_sysctl);
 
-extern long cf_check
-do_platform_op(
-    XEN_GUEST_HANDLE_PARAM(xen_platform_op_t) u_xenpf_op);
-
 extern long
 pci_physdev_op(
     int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
@@ -65,170 +51,11 @@ pci_physdev_op(
 #define MEMOP_EXTENT_SHIFT 6 /* cmd[:6] == start_extent */
 #define MEMOP_CMD_MASK     ((1 << MEMOP_EXTENT_SHIFT) - 1)
 
-extern long cf_check
-do_memory_op(
-    unsigned long cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern long cf_check
-do_multicall(
-    XEN_GUEST_HANDLE_PARAM(multicall_entry_t) call_list,
-    unsigned int nr_calls);
-
-extern long cf_check
-do_set_timer_op(
-    s_time_t timeout);
-
-extern long cf_check
-do_event_channel_op(
-    int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern long cf_check
-do_xen_version(
-    int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern long cf_check
-do_console_io(
-    unsigned int cmd,
-    unsigned int count,
-    XEN_GUEST_HANDLE_PARAM(char) buffer);
-
-extern long cf_check
-do_grant_table_op(
-    unsigned int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) uop,
-    unsigned int count);
-
-extern long cf_check
-do_vm_assist(
-    unsigned int cmd,
-    unsigned int type);
-
-extern long cf_check
-do_vcpu_op(
-    int cmd,
-    unsigned int vcpuid,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-struct vcpu;
 extern long
 common_vcpu_op(int cmd,
     struct vcpu *v,
     XEN_GUEST_HANDLE_PARAM(void) arg);
 
-extern long cf_check
-do_hvm_op(
-    unsigned long op,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern long cf_check
-do_kexec_op(
-    unsigned int op,
-    XEN_GUEST_HANDLE_PARAM(void) uarg);
-
-extern long cf_check
-do_xsm_op(
-    XEN_GUEST_HANDLE_PARAM(void) u_xsm_op);
-
-#ifdef CONFIG_ARGO
-extern long cf_check do_argo_op(
-    unsigned int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg1,
-    XEN_GUEST_HANDLE_PARAM(void) arg2,
-    unsigned long arg3,
-    unsigned long arg4);
-#endif
-
-extern long cf_check
-do_xenoprof_op(int op, XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern long cf_check
-do_dm_op(
-    domid_t domid,
-    unsigned int nr_bufs,
-    XEN_GUEST_HANDLE_PARAM(xen_dm_op_buf_t) bufs);
-
-#ifdef CONFIG_HYPFS
-extern long cf_check
-do_hypfs_op(
-    unsigned int cmd,
-    XEN_GUEST_HANDLE_PARAM(const_char) arg1,
-    unsigned long arg2,
-    XEN_GUEST_HANDLE_PARAM(void) arg3,
-    unsigned long arg4);
-#endif
-
-#ifdef CONFIG_COMPAT
-
-extern int cf_check
-compat_memory_op(
-    unsigned int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern int cf_check
-compat_grant_table_op(
-    unsigned int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) uop,
-    unsigned int count);
-
-extern int cf_check
-compat_vcpu_op(
-    int cmd,
-    unsigned int vcpuid,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern int cf_check
-compat_xenoprof_op(int op, XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern int cf_check
-compat_xen_version(
-    int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern int cf_check
-compat_sched_op(
-    int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern int cf_check
-compat_set_timer_op(
-    uint32_t lo,
-    int32_t hi);
-
-extern int cf_check compat_xsm_op(
-    XEN_GUEST_HANDLE_PARAM(void) op);
-
-extern int cf_check compat_kexec_op(
-    unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg);
-
-DEFINE_XEN_GUEST_HANDLE(multicall_entry_compat_t);
-extern int cf_check compat_multicall(
-    XEN_GUEST_HANDLE_PARAM(multicall_entry_compat_t) call_list,
-    uint32_t nr_calls);
-
-int compat_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
-
-DEFINE_XEN_GUEST_HANDLE(compat_platform_op_t);
-int compat_platform_op(XEN_GUEST_HANDLE_PARAM(compat_platform_op_t) u_xenpf_op);
-
-#ifdef CONFIG_ARGO
-extern int cf_check compat_argo_op(
-    unsigned int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg1,
-    XEN_GUEST_HANDLE_PARAM(void) arg2,
-    unsigned long arg3,
-    unsigned long arg4);
-#endif
-
-extern int cf_check
-compat_dm_op(
-    domid_t domid,
-    unsigned int nr_bufs,
-    XEN_GUEST_HANDLE_PARAM(void) bufs);
-
-#endif
-
 void arch_get_xen_caps(xen_capabilities_info_t *info);
 
 #endif /* __XEN_HYPERCALL_H__ */
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 07:34:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 07:34:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288160.488702 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDJl-0002w9-0k; Thu, 10 Mar 2022 07:34:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288160.488702; Thu, 10 Mar 2022 07:34:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDJk-0002t5-Hs; Thu, 10 Mar 2022 07:34:36 +0000
Received: by outflank-mailman (input) for mailman id 288160;
 Thu, 10 Mar 2022 07:34:31 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=QHx9=TV=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nSDJf-0000ZQ-4Y
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 07:34:31 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 844a8722-a044-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 08:34:28 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id C406521125;
 Thu, 10 Mar 2022 07:34:27 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 6B99C13FA3;
 Thu, 10 Mar 2022 07:34:27 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id AJIiGQOqKWIkIAAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 10 Mar 2022 07:34:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 844a8722-a044-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646897667; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=McyNTZ+ZMzXXLmxrERYtuCPFQotaQRGzlIAiJNDAfQI=;
	b=FeYej+AE2EJqO5nkkPquFGYfz6rhxCBn35421heYrJl+BWMpglOqoFN6bI//e1sfcM2v7V
	9yBUeFaGkwgqUxLBRaU9Bkq2ZK283Q3DL/T4h/e9W9Ixyh9J9AVxXmz6ZUN6wtDdAjn1bs
	LzteBaXgQYwJKnfgSGKknCaJGf/3W98=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>,
	George Dunlap <george.dunlap@citrix.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Christopher Clark <christopher.w.clark@gmail.com>,
	Dario Faggioli <dfaggioli@suse.com>,
	Daniel De Graaf <dgdegra@tycho.nsa.gov>,
	"Daniel P. Smith" <dpsmith@apertussolutions.com>
Subject: [PATCH v4 11/11] xen/x86: remove cf_check attribute from hypercall handlers
Date: Thu, 10 Mar 2022 08:34:20 +0100
Message-Id: <20220310073420.15622-12-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220310073420.15622-1-jgross@suse.com>
References: <20220310073420.15622-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Now that the hypercall handlers are all being called directly instead
through a function vector, the "cf_check" attribute can be removed.

Signed-off-by: Juergen Gross <jgross@suse.com>
---
V4:
- new patch
---
 xen/arch/x86/compat.c               |  6 +++---
 xen/arch/x86/cpu/mcheck/mce.c       |  2 +-
 xen/arch/x86/cpu/vpmu.c             |  2 +-
 xen/arch/x86/domain.c               |  3 +--
 xen/arch/x86/hvm/dm.c               |  2 +-
 xen/arch/x86/hvm/hvm.c              |  2 +-
 xen/arch/x86/hvm/hypercall.c        |  6 +++---
 xen/arch/x86/mm.c                   | 12 ++++++------
 xen/arch/x86/mm/paging.c            |  2 +-
 xen/arch/x86/physdev.c              |  2 +-
 xen/arch/x86/platform_hypercall.c   |  2 +-
 xen/arch/x86/pv/callback.c          | 16 ++++++++--------
 xen/arch/x86/pv/descriptor-tables.c |  8 ++++----
 xen/arch/x86/pv/iret.c              |  4 ++--
 xen/arch/x86/pv/misc-hypercalls.c   | 10 +++++-----
 xen/arch/x86/pv/shim.c              |  4 ++--
 xen/arch/x86/x86_64/compat/mm.c     |  2 +-
 xen/common/argo.c                   |  4 ++--
 xen/common/compat/grant_table.c     |  2 +-
 xen/common/compat/kernel.c          |  2 +-
 xen/common/compat/memory.c          |  3 +--
 xen/common/dm.c                     |  2 +-
 xen/common/domain.c                 |  2 +-
 xen/common/domctl.c                 |  2 +-
 xen/common/event_channel.c          |  2 +-
 xen/common/grant_table.c            |  3 +--
 xen/common/hypfs.c                  |  2 +-
 xen/common/kernel.c                 |  2 +-
 xen/common/kexec.c                  |  4 ++--
 xen/common/memory.c                 |  2 +-
 xen/common/multicall.c              |  3 +--
 xen/common/sched/compat.c           |  2 +-
 xen/common/sched/core.c             |  4 ++--
 xen/common/sysctl.c                 |  2 +-
 xen/common/xenoprof.c               |  2 +-
 xen/drivers/char/console.c          |  2 +-
 xen/scripts/gen_hypercall.awk       |  2 +-
 xen/xsm/xsm_core.c                  |  4 ++--
 38 files changed, 67 insertions(+), 71 deletions(-)

diff --git a/xen/arch/x86/compat.c b/xen/arch/x86/compat.c
index 28281a262a..a031062830 100644
--- a/xen/arch/x86/compat.c
+++ b/xen/arch/x86/compat.c
@@ -15,7 +15,7 @@ typedef long ret_t;
 #endif
 
 /* Legacy hypercall (as of 0x00030202). */
-ret_t cf_check do_physdev_op_compat(XEN_GUEST_HANDLE_PARAM(physdev_op_t) uop)
+ret_t do_physdev_op_compat(XEN_GUEST_HANDLE_PARAM(physdev_op_t) uop)
 {
     struct physdev_op op;
 
@@ -28,7 +28,7 @@ ret_t cf_check do_physdev_op_compat(XEN_GUEST_HANDLE_PARAM(physdev_op_t) uop)
 #ifndef COMPAT
 
 /* Legacy hypercall (as of 0x00030101). */
-long cf_check do_sched_op_compat(int cmd, unsigned long arg)
+long do_sched_op_compat(int cmd, unsigned long arg)
 {
     switch ( cmd )
     {
@@ -50,7 +50,7 @@ long cf_check do_sched_op_compat(int cmd, unsigned long arg)
 }
 
 /* Legacy hypercall (as of 0x00030202). */
-long cf_check do_event_channel_op_compat(
+long do_event_channel_op_compat(
     XEN_GUEST_HANDLE_PARAM(evtchn_op_t) uop)
 {
     struct evtchn_op op;
diff --git a/xen/arch/x86/cpu/mcheck/mce.c b/xen/arch/x86/cpu/mcheck/mce.c
index 275c54be7c..f68e31b643 100644
--- a/xen/arch/x86/cpu/mcheck/mce.c
+++ b/xen/arch/x86/cpu/mcheck/mce.c
@@ -1351,7 +1351,7 @@ CHECK_mcinfo_recovery;
 # endif /* CONFIG_COMPAT */
 
 /* Machine Check Architecture Hypercall */
-long cf_check do_mca(XEN_GUEST_HANDLE_PARAM(xen_mc_t) u_xen_mc)
+long do_mca(XEN_GUEST_HANDLE_PARAM(xen_mc_t) u_xen_mc)
 {
     long ret = 0;
     struct xen_mc curop, *op = &curop;
diff --git a/xen/arch/x86/cpu/vpmu.c b/xen/arch/x86/cpu/vpmu.c
index 51d171615f..d2c03a1104 100644
--- a/xen/arch/x86/cpu/vpmu.c
+++ b/xen/arch/x86/cpu/vpmu.c
@@ -672,7 +672,7 @@ void vpmu_dump(struct vcpu *v)
         alternative_vcall(vpmu_ops.arch_vpmu_dump, v);
 }
 
-long cf_check do_xenpmu_op(
+long do_xenpmu_op(
     unsigned int op, XEN_GUEST_HANDLE_PARAM(xen_pmu_params_t) arg)
 {
     int ret;
diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c
index d566fc82b4..ddf969f76e 100644
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -1489,8 +1489,7 @@ int arch_vcpu_reset(struct vcpu *v)
     return 0;
 }
 
-long cf_check do_vcpu_op(int cmd, unsigned int vcpuid,
-                         XEN_GUEST_HANDLE_PARAM(void) arg)
+long do_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     long rc = 0;
     struct domain *d = current->domain;
diff --git a/xen/arch/x86/hvm/dm.c b/xen/arch/x86/hvm/dm.c
index d80975efcf..f8e6089870 100644
--- a/xen/arch/x86/hvm/dm.c
+++ b/xen/arch/x86/hvm/dm.c
@@ -654,7 +654,7 @@ CHECK_dm_op_relocate_memory;
 CHECK_dm_op_pin_memory_cacheattr;
 CHECK_dm_op_nr_vcpus;
 
-int cf_check compat_dm_op(
+int compat_dm_op(
     domid_t domid, unsigned int nr_bufs, XEN_GUEST_HANDLE_PARAM(void) bufs)
 {
     struct dmop_args args;
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index 709a4191ef..9b3973dad8 100644
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -5022,7 +5022,7 @@ static int hvmop_get_mem_type(
     return rc;
 }
 
-long cf_check do_hvm_op(unsigned long op, XEN_GUEST_HANDLE_PARAM(void) arg)
+long do_hvm_op(unsigned long op, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     long rc = 0;
 
diff --git a/xen/arch/x86/hvm/hypercall.c b/xen/arch/x86/hvm/hypercall.c
index ae601185fc..29d1ca7a13 100644
--- a/xen/arch/x86/hvm/hypercall.c
+++ b/xen/arch/x86/hvm/hypercall.c
@@ -31,7 +31,7 @@
 #include <public/hvm/hvm_op.h>
 #include <public/hvm/params.h>
 
-long cf_check hvm_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long hvm_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     long rc;
 
@@ -51,7 +51,7 @@ long cf_check hvm_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 }
 
 #ifdef CONFIG_GRANT_TABLE
-long cf_check hvm_grant_table_op(
+long hvm_grant_table_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) uop, unsigned int count)
 {
     switch ( cmd )
@@ -77,7 +77,7 @@ long cf_check hvm_grant_table_op(
 }
 #endif
 
-long cf_check hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     const struct vcpu *curr = current;
     const struct domain *currd = curr->domain;
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index 6cc73187ac..a958142d17 100644
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86/mm.c
@@ -3377,7 +3377,7 @@ static int vcpumask_to_pcpumask(
     }
 }
 
-long cf_check do_mmuext_op(
+long do_mmuext_op(
     XEN_GUEST_HANDLE_PARAM(mmuext_op_t) uops,
     unsigned int count,
     XEN_GUEST_HANDLE_PARAM(uint) pdone,
@@ -3916,7 +3916,7 @@ long cf_check do_mmuext_op(
     return rc;
 }
 
-long cf_check do_mmu_update(
+long do_mmu_update(
     XEN_GUEST_HANDLE_PARAM(mmu_update_t) ureqs,
     unsigned int count,
     XEN_GUEST_HANDLE_PARAM(uint) pdone,
@@ -4501,7 +4501,7 @@ static int __do_update_va_mapping(
     return rc;
 }
 
-long cf_check do_update_va_mapping(
+long do_update_va_mapping(
     unsigned long va, u64 val64, unsigned long flags)
 {
     int rc = __do_update_va_mapping(va, val64, flags, current->domain);
@@ -4513,7 +4513,7 @@ long cf_check do_update_va_mapping(
     return rc;
 }
 
-long cf_check do_update_va_mapping_otherdomain(
+long do_update_va_mapping_otherdomain(
     unsigned long va, u64 val64, unsigned long flags, domid_t domid)
 {
     struct domain *pg_owner;
@@ -4536,7 +4536,7 @@ long cf_check do_update_va_mapping_otherdomain(
 #endif /* CONFIG_PV */
 
 #ifdef CONFIG_PV32
-int cf_check compat_update_va_mapping(
+int compat_update_va_mapping(
     unsigned int va, uint32_t lo, uint32_t hi, unsigned int flags)
 {
     int rc = __do_update_va_mapping(va, ((uint64_t)hi << 32) | lo,
@@ -4549,7 +4549,7 @@ int cf_check compat_update_va_mapping(
     return rc;
 }
 
-int cf_check compat_update_va_mapping_otherdomain(
+int compat_update_va_mapping_otherdomain(
     unsigned int va, uint32_t lo, uint32_t hi, unsigned int flags,
     domid_t domid)
 {
diff --git a/xen/arch/x86/mm/paging.c b/xen/arch/x86/mm/paging.c
index a7e2707ecc..cb1bfcbde5 100644
--- a/xen/arch/x86/mm/paging.c
+++ b/xen/arch/x86/mm/paging.c
@@ -760,7 +760,7 @@ int paging_domctl(struct domain *d, struct xen_domctl_shadow_op *sc,
         return shadow_domctl(d, sc, u_domctl);
 }
 
-long cf_check do_paging_domctl_cont(
+long do_paging_domctl_cont(
     XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl)
 {
     struct xen_domctl op;
diff --git a/xen/arch/x86/physdev.c b/xen/arch/x86/physdev.c
index 2ddcf44f33..ea38be8b79 100644
--- a/xen/arch/x86/physdev.c
+++ b/xen/arch/x86/physdev.c
@@ -174,7 +174,7 @@ int physdev_unmap_pirq(domid_t domid, int pirq)
 }
 #endif /* COMPAT */
 
-ret_t cf_check do_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+ret_t do_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     int irq;
     ret_t ret;
diff --git a/xen/arch/x86/platform_hypercall.c b/xen/arch/x86/platform_hypercall.c
index eeb4f7a20e..a7341dc3d7 100644
--- a/xen/arch/x86/platform_hypercall.c
+++ b/xen/arch/x86/platform_hypercall.c
@@ -214,7 +214,7 @@ void cf_check resource_access(void *info)
 }
 #endif
 
-ret_t cf_check do_platform_op(
+ret_t do_platform_op(
     XEN_GUEST_HANDLE_PARAM(xen_platform_op_t) u_xenpf_op)
 {
     ret_t ret;
diff --git a/xen/arch/x86/pv/callback.c b/xen/arch/x86/pv/callback.c
index 1be9d3f731..067ee3b795 100644
--- a/xen/arch/x86/pv/callback.c
+++ b/xen/arch/x86/pv/callback.c
@@ -140,7 +140,7 @@ static long unregister_guest_callback(struct callback_unregister *unreg)
     return ret;
 }
 
-long cf_check do_callback_op(int cmd, XEN_GUEST_HANDLE_PARAM(const_void) arg)
+long do_callback_op(int cmd, XEN_GUEST_HANDLE_PARAM(const_void) arg)
 {
     long ret;
 
@@ -178,7 +178,7 @@ long cf_check do_callback_op(int cmd, XEN_GUEST_HANDLE_PARAM(const_void) arg)
     return ret;
 }
 
-long cf_check do_set_callbacks(
+long do_set_callbacks(
     unsigned long event_address, unsigned long failsafe_address,
     unsigned long syscall_address)
 {
@@ -283,7 +283,7 @@ static int compat_unregister_guest_callback(
     return ret;
 }
 
-int cf_check compat_callback_op(int cmd, XEN_GUEST_HANDLE(const_void) arg)
+int compat_callback_op(int cmd, XEN_GUEST_HANDLE(const_void) arg)
 {
     int ret;
 
@@ -321,7 +321,7 @@ int cf_check compat_callback_op(int cmd, XEN_GUEST_HANDLE(const_void) arg)
     return ret;
 }
 
-int cf_check compat_set_callbacks(
+int compat_set_callbacks(
     unsigned long event_selector, unsigned long event_address,
     unsigned long failsafe_selector, unsigned long failsafe_address)
 {
@@ -348,7 +348,7 @@ int cf_check compat_set_callbacks(
 
 #endif /* CONFIG_PV32 */
 
-long cf_check do_set_trap_table(XEN_GUEST_HANDLE_PARAM(const_trap_info_t) traps)
+long do_set_trap_table(XEN_GUEST_HANDLE_PARAM(const_trap_info_t) traps)
 {
     struct trap_info cur;
     struct vcpu *curr = current;
@@ -394,7 +394,7 @@ long cf_check do_set_trap_table(XEN_GUEST_HANDLE_PARAM(const_trap_info_t) traps)
 }
 
 #ifdef CONFIG_PV32
-int cf_check compat_set_trap_table(XEN_GUEST_HANDLE(trap_info_compat_t) traps)
+int compat_set_trap_table(XEN_GUEST_HANDLE(trap_info_compat_t) traps)
 {
     struct vcpu *curr = current;
     struct compat_trap_info cur;
@@ -437,7 +437,7 @@ int cf_check compat_set_trap_table(XEN_GUEST_HANDLE(trap_info_compat_t) traps)
 }
 #endif
 
-long cf_check do_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long do_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     struct xennmi_callback cb;
     long rc = 0;
@@ -463,7 +463,7 @@ long cf_check do_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 }
 
 #ifdef CONFIG_PV32
-int cf_check compat_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+int compat_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     struct compat_nmi_callback cb;
     int rc = 0;
diff --git a/xen/arch/x86/pv/descriptor-tables.c b/xen/arch/x86/pv/descriptor-tables.c
index 653a61d0b5..b4135b450c 100644
--- a/xen/arch/x86/pv/descriptor-tables.c
+++ b/xen/arch/x86/pv/descriptor-tables.c
@@ -124,7 +124,7 @@ int pv_set_gdt(struct vcpu *v, const unsigned long frames[],
     return -EINVAL;
 }
 
-long cf_check do_set_gdt(
+long do_set_gdt(
     XEN_GUEST_HANDLE_PARAM(xen_ulong_t) frame_list, unsigned int entries)
 {
     unsigned int nr_frames = DIV_ROUND_UP(entries, 512);
@@ -151,7 +151,7 @@ long cf_check do_set_gdt(
 
 #ifdef CONFIG_PV32
 
-int cf_check compat_set_gdt(
+int compat_set_gdt(
     XEN_GUEST_HANDLE_PARAM(uint) frame_list, unsigned int entries)
 {
     struct vcpu *curr = current;
@@ -187,7 +187,7 @@ int cf_check compat_set_gdt(
     return ret;
 }
 
-int cf_check compat_update_descriptor(
+int compat_update_descriptor(
     uint32_t pa_lo, uint32_t pa_hi, uint32_t desc_lo, uint32_t desc_hi)
 {
     seg_desc_t d;
@@ -299,7 +299,7 @@ int validate_segdesc_page(struct page_info *page)
     return i == 512 ? 0 : -EINVAL;
 }
 
-long cf_check do_update_descriptor(uint64_t gaddr, seg_desc_t d)
+long do_update_descriptor(uint64_t gaddr, seg_desc_t d)
 {
     struct domain *currd = current->domain;
     gfn_t gfn = gaddr_to_gfn(gaddr);
diff --git a/xen/arch/x86/pv/iret.c b/xen/arch/x86/pv/iret.c
index 58de9f7922..316a23e77e 100644
--- a/xen/arch/x86/pv/iret.c
+++ b/xen/arch/x86/pv/iret.c
@@ -49,7 +49,7 @@ static void async_exception_cleanup(struct vcpu *curr)
         curr->arch.async_exception_state(trap).old_mask;
 }
 
-long cf_check do_iret(void)
+long do_iret(void)
 {
     struct cpu_user_regs *regs = guest_cpu_user_regs();
     struct iret_context iret_saved;
@@ -106,7 +106,7 @@ long cf_check do_iret(void)
 }
 
 #ifdef CONFIG_PV32
-int cf_check compat_iret(void)
+int compat_iret(void)
 {
     struct cpu_user_regs *regs = guest_cpu_user_regs();
     struct vcpu *v = current;
diff --git a/xen/arch/x86/pv/misc-hypercalls.c b/xen/arch/x86/pv/misc-hypercalls.c
index 635f5a644a..aaaf70eb63 100644
--- a/xen/arch/x86/pv/misc-hypercalls.c
+++ b/xen/arch/x86/pv/misc-hypercalls.c
@@ -23,12 +23,12 @@
 
 #include <asm/debugreg.h>
 
-long cf_check do_set_debugreg(int reg, unsigned long value)
+long do_set_debugreg(int reg, unsigned long value)
 {
     return set_debugreg(current, reg, value);
 }
 
-long cf_check do_get_debugreg(int reg)
+long do_get_debugreg(int reg)
 {
     /* Avoid implementation defined behavior casting unsigned long to long. */
     union {
@@ -40,7 +40,7 @@ long cf_check do_get_debugreg(int reg)
     return res == X86EMUL_OKAY ? u.ret : -ENODEV;
 }
 
-long cf_check do_fpu_taskswitch(int set)
+long do_fpu_taskswitch(int set)
 {
     struct vcpu *v = current;
 
@@ -175,7 +175,7 @@ long set_debugreg(struct vcpu *v, unsigned int reg, unsigned long value)
     return 0;
 }
 
-long cf_check do_stack_switch(unsigned long ss, unsigned long esp)
+long do_stack_switch(unsigned long ss, unsigned long esp)
 {
     fixup_guest_stack_selector(current->domain, ss);
     current->arch.pv.kernel_ss = ss;
@@ -184,7 +184,7 @@ long cf_check do_stack_switch(unsigned long ss, unsigned long esp)
     return 0;
 }
 
-long cf_check do_set_segment_base(unsigned int which, unsigned long base)
+long do_set_segment_base(unsigned int which, unsigned long base)
 {
     struct vcpu *v = current;
     long ret = 0;
diff --git a/xen/arch/x86/pv/shim.c b/xen/arch/x86/pv/shim.c
index 2ee290a392..2b74fea181 100644
--- a/xen/arch/x86/pv/shim.c
+++ b/xen/arch/x86/pv/shim.c
@@ -824,7 +824,7 @@ long pv_shim_grant_table_op(unsigned int cmd,
 
 #ifndef CONFIG_GRANT_TABLE
 /* Thin wrapper(s) needed. */
-long cf_check do_grant_table_op(
+long do_grant_table_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) uop, unsigned int count)
 {
     if ( !pv_shim )
@@ -834,7 +834,7 @@ long cf_check do_grant_table_op(
 }
 
 #ifdef CONFIG_PV32
-int cf_check compat_grant_table_op(
+int compat_grant_table_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) uop, unsigned int count)
 {
     if ( !pv_shim )
diff --git a/xen/arch/x86/x86_64/compat/mm.c b/xen/arch/x86/x86_64/compat/mm.c
index 70b08a832a..d54efaad21 100644
--- a/xen/arch/x86/x86_64/compat/mm.c
+++ b/xen/arch/x86/x86_64/compat/mm.c
@@ -177,7 +177,7 @@ int compat_arch_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 #ifdef CONFIG_PV
 DEFINE_XEN_GUEST_HANDLE(mmuext_op_compat_t);
 
-int cf_check compat_mmuext_op(
+int compat_mmuext_op(
     XEN_GUEST_HANDLE_PARAM(void) arg, unsigned int count,
     XEN_GUEST_HANDLE_PARAM(uint) pdone, unsigned int foreigndom)
 {
diff --git a/xen/common/argo.c b/xen/common/argo.c
index 26a01c2188..748b8714d6 100644
--- a/xen/common/argo.c
+++ b/xen/common/argo.c
@@ -2069,7 +2069,7 @@ sendv(struct domain *src_d, xen_argo_addr_t *src_addr,
     return ( ret < 0 ) ? ret : len;
 }
 
-long cf_check
+long
 do_argo_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg1,
            XEN_GUEST_HANDLE_PARAM(void) arg2, unsigned long raw_arg3,
            unsigned long raw_arg4)
@@ -2207,7 +2207,7 @@ do_argo_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg1,
 }
 
 #ifdef CONFIG_COMPAT
-int cf_check
+int
 compat_argo_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg1,
                XEN_GUEST_HANDLE_PARAM(void) arg2, unsigned long arg3,
                unsigned long arg4)
diff --git a/xen/common/compat/grant_table.c b/xen/common/compat/grant_table.c
index d5787e3719..4705ee5f76 100644
--- a/xen/common/compat/grant_table.c
+++ b/xen/common/compat/grant_table.c
@@ -56,7 +56,7 @@ CHECK_gnttab_swap_grant_ref;
 CHECK_gnttab_cache_flush;
 #undef xen_gnttab_cache_flush
 
-int cf_check compat_grant_table_op(
+int compat_grant_table_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) cmp_uop, unsigned int count)
 {
     int rc = 0;
diff --git a/xen/common/compat/kernel.c b/xen/common/compat/kernel.c
index 8e8c413bf1..804b919bdc 100644
--- a/xen/common/compat/kernel.c
+++ b/xen/common/compat/kernel.c
@@ -37,7 +37,7 @@ CHECK_TYPE(capabilities_info);
 
 CHECK_TYPE(domain_handle);
 
-#define DO(fn) int cf_check compat_##fn
+#define DO(fn) int compat_##fn
 #define COMPAT
 
 #include "../kernel.c"
diff --git a/xen/common/compat/memory.c b/xen/common/compat/memory.c
index 077ded4a75..ce1de1b307 100644
--- a/xen/common/compat/memory.c
+++ b/xen/common/compat/memory.c
@@ -53,8 +53,7 @@ static int cf_check get_reserved_device_memory(
 }
 #endif
 
-int cf_check compat_memory_op(
-    unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) compat)
+int compat_memory_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) compat)
 {
     struct vcpu *curr = current;
     struct domain *currd = curr->domain;
diff --git a/xen/common/dm.c b/xen/common/dm.c
index fcb3a1aa05..201b652deb 100644
--- a/xen/common/dm.c
+++ b/xen/common/dm.c
@@ -19,7 +19,7 @@
 #include <xen/hypercall.h>
 #include <xen/nospec.h>
 
-long cf_check do_dm_op(
+long do_dm_op(
     domid_t domid, unsigned int nr_bufs,
     XEN_GUEST_HANDLE_PARAM(xen_dm_op_buf_t) bufs)
 {
diff --git a/xen/common/domain.c b/xen/common/domain.c
index f9de1be43c..48a22776a2 100644
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -1754,7 +1754,7 @@ long common_vcpu_op(int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
 }
 
 #ifdef arch_vm_assist_valid_mask
-long cf_check do_vm_assist(unsigned int cmd, unsigned int type)
+long do_vm_assist(unsigned int cmd, unsigned int type)
 {
     struct domain *currd = current->domain;
     const unsigned long valid = arch_vm_assist_valid_mask(currd);
diff --git a/xen/common/domctl.c b/xen/common/domctl.c
index 9606fa4f1a..879a2adcbe 100644
--- a/xen/common/domctl.c
+++ b/xen/common/domctl.c
@@ -274,7 +274,7 @@ static struct vnuma_info *vnuma_init(const struct xen_domctl_vnuma *uinfo,
     return ERR_PTR(ret);
 }
 
-long cf_check do_domctl(XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl)
+long do_domctl(XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl)
 {
     long ret = 0;
     bool_t copyback = 0;
diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c
index 0a82eb3ac2..5e2420fa12 100644
--- a/xen/common/event_channel.c
+++ b/xen/common/event_channel.c
@@ -1191,7 +1191,7 @@ static int evtchn_set_priority(const struct evtchn_set_priority *set_priority)
     return ret;
 }
 
-long cf_check do_event_channel_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long do_event_channel_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     int rc;
 
diff --git a/xen/common/grant_table.c b/xen/common/grant_table.c
index febbe12eab..c71d3ad24b 100644
--- a/xen/common/grant_table.c
+++ b/xen/common/grant_table.c
@@ -3559,8 +3559,7 @@ gnttab_cache_flush(XEN_GUEST_HANDLE_PARAM(gnttab_cache_flush_t) uop,
     return 0;
 }
 
-long cf_check
-do_grant_table_op(
+long do_grant_table_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) uop, unsigned int count)
 {
     long rc;
diff --git a/xen/common/hypfs.c b/xen/common/hypfs.c
index 0d22396f5d..acd258edf2 100644
--- a/xen/common/hypfs.c
+++ b/xen/common/hypfs.c
@@ -670,7 +670,7 @@ static int hypfs_write(struct hypfs_entry *entry,
     return entry->funcs->write(l, uaddr, ulen);
 }
 
-long cf_check do_hypfs_op(
+long do_hypfs_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(const_char) arg1,
     unsigned long arg2, XEN_GUEST_HANDLE_PARAM(void) arg3, unsigned long arg4)
 {
diff --git a/xen/common/kernel.c b/xen/common/kernel.c
index adff2d2c77..08bdae082a 100644
--- a/xen/common/kernel.c
+++ b/xen/common/kernel.c
@@ -451,7 +451,7 @@ static int __init cf_check param_init(void)
 __initcall(param_init);
 #endif
 
-# define DO(fn) long cf_check do_##fn
+# define DO(fn) long do_##fn
 
 #endif
 
diff --git a/xen/common/kexec.c b/xen/common/kexec.c
index 41669964d2..7095651605 100644
--- a/xen/common/kexec.c
+++ b/xen/common/kexec.c
@@ -1265,13 +1265,13 @@ static int do_kexec_op_internal(unsigned int op,
     return ret;
 }
 
-long cf_check do_kexec_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg)
+long do_kexec_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg)
 {
     return do_kexec_op_internal(op, uarg, 0);
 }
 
 #ifdef CONFIG_COMPAT
-int cf_check compat_kexec_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg)
+int compat_kexec_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg)
 {
     return do_kexec_op_internal(op, uarg, 1);
 }
diff --git a/xen/common/memory.c b/xen/common/memory.c
index 69b0cd1e50..963f4df1b6 100644
--- a/xen/common/memory.c
+++ b/xen/common/memory.c
@@ -1367,7 +1367,7 @@ static int acquire_resource(
     return rc;
 }
 
-long cf_check do_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long do_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     struct domain *d, *curr_d = current->domain;
     long rc;
diff --git a/xen/common/multicall.c b/xen/common/multicall.c
index 9db49092b4..1f0cc4cb26 100644
--- a/xen/common/multicall.c
+++ b/xen/common/multicall.c
@@ -33,8 +33,7 @@ static void trace_multicall_call(multicall_entry_t *call)
     __trace_multicall_call(call);
 }
 
-ret_t cf_check
-do_multicall(
+ret_t do_multicall(
     XEN_GUEST_HANDLE_PARAM(multicall_entry_t) call_list, uint32_t nr_calls)
 {
     struct vcpu *curr = current;
diff --git a/xen/common/sched/compat.c b/xen/common/sched/compat.c
index 66ba0fe88f..040b4caca2 100644
--- a/xen/common/sched/compat.c
+++ b/xen/common/sched/compat.c
@@ -39,7 +39,7 @@ static int compat_poll(struct compat_sched_poll *compat)
 
 #include "core.c"
 
-int cf_check compat_set_timer_op(u32 lo, s32 hi)
+int compat_set_timer_op(u32 lo, s32 hi)
 {
     return do_set_timer_op(((s64)hi << 32) | lo);
 }
diff --git a/xen/common/sched/core.c b/xen/common/sched/core.c
index 19ab678181..25885b5640 100644
--- a/xen/common/sched/core.c
+++ b/xen/common/sched/core.c
@@ -1862,7 +1862,7 @@ typedef long ret_t;
 
 #endif /* !COMPAT */
 
-ret_t cf_check do_sched_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+ret_t do_sched_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     ret_t ret = 0;
 
@@ -1999,7 +1999,7 @@ ret_t cf_check do_sched_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 #ifndef COMPAT
 
 /* Per-vcpu oneshot-timer hypercall. */
-long cf_check do_set_timer_op(s_time_t timeout)
+long do_set_timer_op(s_time_t timeout)
 {
     struct vcpu *v = current;
     s_time_t offset = timeout - NOW();
diff --git a/xen/common/sysctl.c b/xen/common/sysctl.c
index fc4a0b31d6..1ad3c29351 100644
--- a/xen/common/sysctl.c
+++ b/xen/common/sysctl.c
@@ -29,7 +29,7 @@
 #include <xen/livepatch.h>
 #include <xen/coverage.h>
 
-long cf_check do_sysctl(XEN_GUEST_HANDLE_PARAM(xen_sysctl_t) u_sysctl)
+long do_sysctl(XEN_GUEST_HANDLE_PARAM(xen_sysctl_t) u_sysctl)
 {
     long ret = 0;
     int copyback = -1;
diff --git a/xen/common/xenoprof.c b/xen/common/xenoprof.c
index af617f1d0b..1926a92fe4 100644
--- a/xen/common/xenoprof.c
+++ b/xen/common/xenoprof.c
@@ -721,7 +721,7 @@ static int xenoprof_op_get_buffer(XEN_GUEST_HANDLE_PARAM(void) arg)
                       || (op == XENOPROF_disable_virq)  \
                       || (op == XENOPROF_get_buffer))
  
-ret_t cf_check do_xenoprof_op(int op, XEN_GUEST_HANDLE_PARAM(void) arg)
+ret_t do_xenoprof_op(int op, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     int ret = 0;
     
diff --git a/xen/drivers/char/console.c b/xen/drivers/char/console.c
index d9d6556c22..c53fe30313 100644
--- a/xen/drivers/char/console.c
+++ b/xen/drivers/char/console.c
@@ -675,7 +675,7 @@ static long guest_console_write(XEN_GUEST_HANDLE_PARAM(char) buffer,
     return 0;
 }
 
-long cf_check do_console_io(
+long do_console_io(
     unsigned int cmd, unsigned int count, XEN_GUEST_HANDLE_PARAM(char) buffer)
 {
     long rc;
diff --git a/xen/scripts/gen_hypercall.awk b/xen/scripts/gen_hypercall.awk
index 403758be21..34840c514f 100644
--- a/xen/scripts/gen_hypercall.awk
+++ b/xen/scripts/gen_hypercall.awk
@@ -226,7 +226,7 @@ END {
     # Generate prototypes
     for (i = 1; i <= n; i++) {
         for (p = 1; p <= n_pre[i]; p++) {
-            printf("%s cf_check %s_%s(", rettype[pre[i, p]], pre[i, p], fn[i]);
+            printf("%s %s_%s(", rettype[pre[i, p]], pre[i, p], fn[i]);
             if (n_args[i] == 0)
                 printf("void");
             else
diff --git a/xen/xsm/xsm_core.c b/xen/xsm/xsm_core.c
index 2286a502e3..eaa028109b 100644
--- a/xen/xsm/xsm_core.c
+++ b/xen/xsm/xsm_core.c
@@ -219,13 +219,13 @@ bool __init has_xsm_magic(paddr_t start)
 
 #endif
 
-long cf_check do_xsm_op(XEN_GUEST_HANDLE_PARAM(void) op)
+long do_xsm_op(XEN_GUEST_HANDLE_PARAM(void) op)
 {
     return xsm_do_xsm_op(op);
 }
 
 #ifdef CONFIG_COMPAT
-int cf_check compat_xsm_op(XEN_GUEST_HANDLE_PARAM(void) op)
+int compat_xsm_op(XEN_GUEST_HANDLE_PARAM(void) op)
 {
     return xsm_do_compat_op(op);
 }
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 07:34:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 07:34:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288161.488714 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDJn-0003GT-59; Thu, 10 Mar 2022 07:34:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288161.488714; Thu, 10 Mar 2022 07:34:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDJm-0003DS-3P; Thu, 10 Mar 2022 07:34:38 +0000
Received: by outflank-mailman (input) for mailman id 288161;
 Thu, 10 Mar 2022 07:34:31 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=QHx9=TV=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nSDJf-0000ZP-16
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 07:34:31 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 81b083d8-a044-11ec-8539-5f4723681683;
 Thu, 10 Mar 2022 08:34:23 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 2AD4721123;
 Thu, 10 Mar 2022 07:34:27 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id E83F713FA3;
 Thu, 10 Mar 2022 07:34:26 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id cBmANwKqKWIkIAAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 10 Mar 2022 07:34:26 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 81b083d8-a044-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646897667; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=jxFsIOim8YQwQdGouIeDKfpkYqPTH+rehYL0W8dRFU0=;
	b=cGwohySYV8G61ejaXu1amWHW/yoQKRFf4vhEuR85juIRCBfa77/EyAnG0xuth4PodbqLGW
	fqDXqWbNZpUUz4NZ6K+2DJurzoID3qz/U8uwSvr3GpUIazxJb54Yf9/Q0QmEhcC/dYY8vJ
	Wq1ucUpCNieWmx6LOZTcbUoWJuWh/+Y=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>
Subject: [PATCH v4 09/11] xen/x86: call hypercall handlers via generated macro
Date: Thu, 10 Mar 2022 08:34:18 +0100
Message-Id: <20220310073420.15622-10-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220310073420.15622-1-jgross@suse.com>
References: <20220310073420.15622-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Instead of using a function table use the generated macros for calling
the appropriate hypercall handlers.

This is beneficial to performance and avoids speculation issues.

With calling the handlers using the correct number of parameters now
it is possible to do the parameter register clobbering in the NDEBUG
case after returning from the handler. With the additional generated
data the hard coded hypercall_args_table[] can be replaced by tables
using the generated number of parameters.

Note that this change modifies behavior of clobbering registers in a
minor way: in case a hypercall is returning -ENOSYS (or the unsigned
equivalent thereof) for any reason the parameter registers will no
longer be clobbered. This should be of no real concern, as those cases
ought to be extremely rare and reuse of the registers in those cases
seems rather far fetched.

Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
---
V2:
- make hypercall_args_*[] const (Jan Beulich)
- make clobber_regs*() independent from NDEBUG (Jan Beulich)
- drop "L" suffix for 32-bit register clobber value (Jan Beulich)
V3:
- add array_access_nospec() (Jan Beulich)
- remove local variables in hvm_hypercall() (Andrew Cooper)
---
 xen/arch/x86/hvm/hypercall.c         | 166 +++---------------------
 xen/arch/x86/hypercall.c             |  59 ---------
 xen/arch/x86/include/asm/hypercall.h |  55 ++++++--
 xen/arch/x86/pv/hypercall.c          | 184 +++------------------------
 4 files changed, 76 insertions(+), 388 deletions(-)

diff --git a/xen/arch/x86/hvm/hypercall.c b/xen/arch/x86/hvm/hypercall.c
index a9c9ad721f..ae601185fc 100644
--- a/xen/arch/x86/hvm/hypercall.c
+++ b/xen/arch/x86/hvm/hypercall.c
@@ -111,56 +111,10 @@ long cf_check hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
         return compat_physdev_op(cmd, arg);
 }
 
-#define HYPERCALL(x)                                         \
-    [ __HYPERVISOR_ ## x ] = { (hypercall_fn_t *) do_ ## x,  \
-                               (hypercall_fn_t *) do_ ## x }
-
-#define HVM_CALL(x)                                          \
-    [ __HYPERVISOR_ ## x ] = { (hypercall_fn_t *) hvm_ ## x, \
-                               (hypercall_fn_t *) hvm_ ## x }
-
-#define COMPAT_CALL(x)                                       \
-    [ __HYPERVISOR_ ## x ] = { (hypercall_fn_t *) do_ ## x,  \
-                               (hypercall_fn_t *) compat_ ## x }
-
-static const struct {
-    hypercall_fn_t *native, *compat;
-} hvm_hypercall_table[] = {
-    HVM_CALL(memory_op),
-    COMPAT_CALL(multicall),
-#ifdef CONFIG_GRANT_TABLE
-    HVM_CALL(grant_table_op),
-#endif
-    HYPERCALL(vm_assist),
-    COMPAT_CALL(vcpu_op),
-    HVM_CALL(physdev_op),
-    COMPAT_CALL(xen_version),
-    HYPERCALL(console_io),
-    HYPERCALL(event_channel_op),
-    COMPAT_CALL(sched_op),
-    COMPAT_CALL(set_timer_op),
-    COMPAT_CALL(xsm_op),
-    HYPERCALL(hvm_op),
-    HYPERCALL(sysctl),
-    HYPERCALL(domctl),
-#ifdef CONFIG_ARGO
-    COMPAT_CALL(argo_op),
-#endif
-    COMPAT_CALL(platform_op),
-#ifdef CONFIG_PV
-    COMPAT_CALL(mmuext_op),
-#endif
-    HYPERCALL(xenpmu_op),
-    COMPAT_CALL(dm_op),
-#ifdef CONFIG_HYPFS
-    HYPERCALL(hypfs_op),
+#ifndef NDEBUG
+static const unsigned char hypercall_args_64[] = hypercall_args_hvm64;
+static const unsigned char hypercall_args_32[] = hypercall_args_hvm32;
 #endif
-    HYPERCALL(paging_domctl_cont)
-};
-
-#undef HYPERCALL
-#undef HVM_CALL
-#undef COMPAT_CALL
 
 int hvm_hypercall(struct cpu_user_regs *regs)
 {
@@ -206,23 +160,6 @@ int hvm_hypercall(struct cpu_user_regs *regs)
         return ret;
     }
 
-    BUILD_BUG_ON(ARRAY_SIZE(hvm_hypercall_table) >
-                 ARRAY_SIZE(hypercall_args_table));
-
-    if ( eax >= ARRAY_SIZE(hvm_hypercall_table) )
-    {
-        regs->rax = -ENOSYS;
-        return HVM_HCALL_completed;
-    }
-
-    eax = array_index_nospec(eax, ARRAY_SIZE(hvm_hypercall_table));
-
-    if ( !hvm_hypercall_table[eax].native )
-    {
-        regs->rax = -ENOSYS;
-        return HVM_HCALL_completed;
-    }
-
     /*
      * Caching is intended for instruction emulation only. Disable it
      * for any accesses by hypercall argument copy-in / copy-out.
@@ -233,85 +170,27 @@ int hvm_hypercall(struct cpu_user_regs *regs)
 
     if ( mode == 8 )
     {
-        unsigned long rdi = regs->rdi;
-        unsigned long rsi = regs->rsi;
-        unsigned long rdx = regs->rdx;
-        unsigned long r10 = regs->r10;
-        unsigned long r8 = regs->r8;
-
         HVM_DBG_LOG(DBG_LEVEL_HCALL, "hcall%lu(%lx, %lx, %lx, %lx, %lx)",
-                    eax, rdi, rsi, rdx, r10, r8);
-
-#ifndef NDEBUG
-        /* Deliberately corrupt parameter regs not used by this hypercall. */
-        switch ( hypercall_args_table[eax].native )
-        {
-        case 0: rdi = 0xdeadbeefdeadf00dUL; fallthrough;
-        case 1: rsi = 0xdeadbeefdeadf00dUL; fallthrough;
-        case 2: rdx = 0xdeadbeefdeadf00dUL; fallthrough;
-        case 3: r10 = 0xdeadbeefdeadf00dUL; fallthrough;
-        case 4: r8 = 0xdeadbeefdeadf00dUL;
-        }
-#endif
+                    eax, regs->rdi, regs->rsi, regs->rdx, regs->r10, regs->r8);
 
-        regs->rax = hvm_hypercall_table[eax].native(rdi, rsi, rdx, r10, r8);
+        call_handlers_hvm64(eax, regs->rax, regs->rdi, regs->rsi, regs->rdx,
+                            regs->r10, regs->r8);
 
-#ifndef NDEBUG
-        if ( !curr->hcall_preempted )
-        {
-            /* Deliberately corrupt parameter regs used by this hypercall. */
-            switch ( hypercall_args_table[eax].native )
-            {
-            case 5: regs->r8  = 0xdeadbeefdeadf00dUL; fallthrough;
-            case 4: regs->r10 = 0xdeadbeefdeadf00dUL; fallthrough;
-            case 3: regs->rdx = 0xdeadbeefdeadf00dUL; fallthrough;
-            case 2: regs->rsi = 0xdeadbeefdeadf00dUL; fallthrough;
-            case 1: regs->rdi = 0xdeadbeefdeadf00dUL;
-            }
-        }
-#endif
+        if ( !curr->hcall_preempted && regs->rax != -ENOSYS )
+            clobber_regs(regs, get_nargs(hypercall_args_64, eax));
     }
     else
     {
-        unsigned int ebx = regs->ebx;
-        unsigned int ecx = regs->ecx;
-        unsigned int edx = regs->edx;
-        unsigned int esi = regs->esi;
-        unsigned int edi = regs->edi;
-
         HVM_DBG_LOG(DBG_LEVEL_HCALL, "hcall%lu(%x, %x, %x, %x, %x)", eax,
-                    ebx, ecx, edx, esi, edi);
-
-#ifndef NDEBUG
-        /* Deliberately corrupt parameter regs not used by this hypercall. */
-        switch ( hypercall_args_table[eax].compat )
-        {
-        case 0: ebx = 0xdeadf00d; fallthrough;
-        case 1: ecx = 0xdeadf00d; fallthrough;
-        case 2: edx = 0xdeadf00d; fallthrough;
-        case 3: esi = 0xdeadf00d; fallthrough;
-        case 4: edi = 0xdeadf00d;
-        }
-#endif
+                    regs->ebx, regs->ecx, regs->edx, regs->esi, regs->edi);
 
         curr->hcall_compat = true;
-        regs->eax = hvm_hypercall_table[eax].compat(ebx, ecx, edx, esi, edi);
+        call_handlers_hvm32(eax, regs->eax, regs->ebx, regs->ecx, regs->edx,
+                            regs->esi, regs->edi);
         curr->hcall_compat = false;
 
-#ifndef NDEBUG
-        if ( !curr->hcall_preempted )
-        {
-            /* Deliberately corrupt parameter regs used by this hypercall. */
-            switch ( hypercall_args_table[eax].compat )
-            {
-            case 5: regs->rdi = 0xdeadf00d; fallthrough;
-            case 4: regs->rsi = 0xdeadf00d; fallthrough;
-            case 3: regs->rdx = 0xdeadf00d; fallthrough;
-            case 2: regs->rcx = 0xdeadf00d; fallthrough;
-            case 1: regs->rbx = 0xdeadf00d;
-            }
-        }
-#endif
+        if ( !curr->hcall_preempted && regs->eax != -ENOSYS )
+            clobber_regs32(regs, get_nargs(hypercall_args_32, eax));
     }
 
     hvmemul_cache_restore(curr, token);
@@ -332,31 +211,20 @@ int hvm_hypercall(struct cpu_user_regs *regs)
 enum mc_disposition hvm_do_multicall_call(struct mc_state *state)
 {
     struct vcpu *curr = current;
-    hypercall_fn_t *func = NULL;
 
     if ( hvm_guest_x86_mode(curr) == 8 )
     {
         struct multicall_entry *call = &state->call;
 
-        if ( call->op < ARRAY_SIZE(hvm_hypercall_table) )
-            func = array_access_nospec(hvm_hypercall_table, call->op).native;
-        if ( func )
-            call->result = func(call->args[0], call->args[1], call->args[2],
-                                call->args[3], call->args[4]);
-        else
-            call->result = -ENOSYS;
+        call_handlers_hvm64(call->op, call->result, call->args[0], call->args[1],
+                            call->args[2], call->args[3], call->args[4]);
     }
     else
     {
         struct compat_multicall_entry *call = &state->compat_call;
 
-        if ( call->op < ARRAY_SIZE(hvm_hypercall_table) )
-            func = array_access_nospec(hvm_hypercall_table, call->op).compat;
-        if ( func )
-            call->result = func(call->args[0], call->args[1], call->args[2],
-                                call->args[3], call->args[4]);
-        else
-            call->result = -ENOSYS;
+        call_handlers_hvm32(call->op, call->result, call->args[0], call->args[1],
+                            call->args[2], call->args[3], call->args[4]);
     }
 
     return !hvm_get_cpl(curr) ? mc_continue : mc_preempt;
diff --git a/xen/arch/x86/hypercall.c b/xen/arch/x86/hypercall.c
index 07e1a45ef5..6b73cff9b9 100644
--- a/xen/arch/x86/hypercall.c
+++ b/xen/arch/x86/hypercall.c
@@ -22,65 +22,6 @@
 #include <xen/hypercall.h>
 #include <asm/multicall.h>
 
-#ifdef CONFIG_COMPAT
-#define ARGS(x, n)                              \
-    [ __HYPERVISOR_ ## x ] = { n, n }
-#define COMP(x, n, c)                           \
-    [ __HYPERVISOR_ ## x ] = { n, c }
-#else
-#define ARGS(x, n)    [ __HYPERVISOR_ ## x ] = { n }
-#define COMP(x, n, c) ARGS(x, n)
-#endif
-
-const hypercall_args_t hypercall_args_table[NR_hypercalls] =
-{
-    ARGS(set_trap_table, 1),
-    ARGS(mmu_update, 4),
-    ARGS(set_gdt, 2),
-    ARGS(stack_switch, 2),
-    COMP(set_callbacks, 3, 4),
-    ARGS(fpu_taskswitch, 1),
-    ARGS(sched_op_compat, 2),
-    ARGS(platform_op, 1),
-    ARGS(set_debugreg, 2),
-    ARGS(get_debugreg, 1),
-    COMP(update_descriptor, 2, 4),
-    ARGS(memory_op, 2),
-    ARGS(multicall, 2),
-    COMP(update_va_mapping, 3, 4),
-    COMP(set_timer_op, 1, 2),
-    ARGS(event_channel_op_compat, 1),
-    ARGS(xen_version, 2),
-    ARGS(console_io, 3),
-    ARGS(physdev_op_compat, 1),
-    ARGS(grant_table_op, 3),
-    ARGS(vm_assist, 2),
-    COMP(update_va_mapping_otherdomain, 4, 5),
-    ARGS(vcpu_op, 3),
-    COMP(set_segment_base, 2, 0),
-    ARGS(mmuext_op, 4),
-    ARGS(xsm_op, 1),
-    ARGS(nmi_op, 2),
-    ARGS(sched_op, 2),
-    ARGS(callback_op, 2),
-    ARGS(xenoprof_op, 2),
-    ARGS(event_channel_op, 2),
-    ARGS(physdev_op, 2),
-    ARGS(sysctl, 1),
-    ARGS(domctl, 1),
-    ARGS(kexec_op, 2),
-    ARGS(argo_op, 5),
-    ARGS(xenpmu_op, 2),
-    ARGS(hvm_op, 2),
-    ARGS(dm_op, 3),
-    ARGS(hypfs_op, 5),
-    ARGS(mca, 1),
-    ARGS(paging_domctl_cont, 1),
-};
-
-#undef COMP
-#undef ARGS
-
 #define NEXT_ARG(fmt, args)                                                 \
 ({                                                                          \
     unsigned long __arg;                                                    \
diff --git a/xen/arch/x86/include/asm/hypercall.h b/xen/arch/x86/include/asm/hypercall.h
index 2d243b48bc..ab8bd12e60 100644
--- a/xen/arch/x86/include/asm/hypercall.h
+++ b/xen/arch/x86/include/asm/hypercall.h
@@ -17,19 +17,6 @@
 
 #define __HYPERVISOR_paging_domctl_cont __HYPERVISOR_arch_1
 
-typedef unsigned long hypercall_fn_t(
-    unsigned long, unsigned long, unsigned long,
-    unsigned long, unsigned long);
-
-typedef struct {
-    uint8_t native;
-#ifdef CONFIG_COMPAT
-    uint8_t compat;
-#endif
-} hypercall_args_t;
-
-extern const hypercall_args_t hypercall_args_table[NR_hypercalls];
-
 #ifdef CONFIG_PV
 void pv_hypercall(struct cpu_user_regs *regs);
 #endif
@@ -56,4 +43,46 @@ compat_common_vcpu_op(
 
 #endif /* CONFIG_COMPAT */
 
+#ifndef NDEBUG
+static inline unsigned int _get_nargs(const unsigned char *tbl, unsigned int c)
+{
+    return tbl[c];
+}
+#define get_nargs(t, c) _get_nargs(t, array_index_nospec(c, ARRAY_SIZE(t)))
+#else
+#define get_nargs(tbl, c) 0
+#endif
+
+static inline void clobber_regs(struct cpu_user_regs *regs,
+                                unsigned int nargs)
+{
+#ifndef NDEBUG
+    /* Deliberately corrupt used parameter regs. */
+    switch ( nargs )
+    {
+    case 5: regs->r8  = 0xdeadbeefdeadf00dUL; fallthrough;
+    case 4: regs->r10 = 0xdeadbeefdeadf00dUL; fallthrough;
+    case 3: regs->rdx = 0xdeadbeefdeadf00dUL; fallthrough;
+    case 2: regs->rsi = 0xdeadbeefdeadf00dUL; fallthrough;
+    case 1: regs->rdi = 0xdeadbeefdeadf00dUL;
+    }
+#endif
+}
+
+static inline void clobber_regs32(struct cpu_user_regs *regs,
+                                  unsigned int nargs)
+{
+#ifndef NDEBUG
+    /* Deliberately corrupt used parameter regs. */
+    switch ( nargs )
+    {
+    case 5: regs->edi = 0xdeadf00dU; fallthrough;
+    case 4: regs->esi = 0xdeadf00dU; fallthrough;
+    case 3: regs->edx = 0xdeadf00dU; fallthrough;
+    case 2: regs->ecx = 0xdeadf00dU; fallthrough;
+    case 1: regs->ebx = 0xdeadf00dU;
+    }
+#endif
+}
+
 #endif /* __ASM_X86_HYPERCALL_H__ */
diff --git a/xen/arch/x86/pv/hypercall.c b/xen/arch/x86/pv/hypercall.c
index fe8dfe9e8f..bf64bb41bb 100644
--- a/xen/arch/x86/pv/hypercall.c
+++ b/xen/arch/x86/pv/hypercall.c
@@ -27,119 +27,22 @@
 #include <asm/multicall.h>
 #include <irq_vectors.h>
 
-typedef struct {
-    hypercall_fn_t *native;
-#ifdef CONFIG_PV32
-    hypercall_fn_t *compat;
-#endif
-} pv_hypercall_table_t;
-
+#ifndef NDEBUG
+static const unsigned char hypercall_args_64[] = hypercall_args_pv64;
 #ifdef CONFIG_PV32
-#define HYPERCALL(x)                                                \
-    [ __HYPERVISOR_ ## x ] = { (hypercall_fn_t *) do_ ## x,         \
-                               (hypercall_fn_t *) do_ ## x }
-#define COMPAT_CALL(x)                                              \
-    [ __HYPERVISOR_ ## x ] = { (hypercall_fn_t *) do_ ## x,         \
-                               (hypercall_fn_t *) compat_ ## x }
-#else
-#define HYPERCALL(x)                                                \
-    [ __HYPERVISOR_ ## x ] = { (hypercall_fn_t *) do_ ## x }
-#define COMPAT_CALL(x) HYPERCALL(x)
-#endif
-
-static const pv_hypercall_table_t pv_hypercall_table[] = {
-    COMPAT_CALL(set_trap_table),
-    HYPERCALL(mmu_update),
-    COMPAT_CALL(set_gdt),
-    HYPERCALL(stack_switch),
-    COMPAT_CALL(set_callbacks),
-    HYPERCALL(fpu_taskswitch),
-    HYPERCALL(sched_op_compat),
-#ifndef CONFIG_PV_SHIM_EXCLUSIVE
-    COMPAT_CALL(platform_op),
-#endif
-    HYPERCALL(set_debugreg),
-    HYPERCALL(get_debugreg),
-    COMPAT_CALL(update_descriptor),
-    COMPAT_CALL(memory_op),
-    COMPAT_CALL(multicall),
-    COMPAT_CALL(update_va_mapping),
-    COMPAT_CALL(set_timer_op),
-    HYPERCALL(event_channel_op_compat),
-    COMPAT_CALL(xen_version),
-    HYPERCALL(console_io),
-    COMPAT_CALL(physdev_op_compat),
-#if defined(CONFIG_GRANT_TABLE) || defined(CONFIG_PV_SHIM)
-    COMPAT_CALL(grant_table_op),
-#endif
-    HYPERCALL(vm_assist),
-    COMPAT_CALL(update_va_mapping_otherdomain),
-    COMPAT_CALL(iret),
-    COMPAT_CALL(vcpu_op),
-    HYPERCALL(set_segment_base),
-    COMPAT_CALL(mmuext_op),
-    COMPAT_CALL(xsm_op),
-    COMPAT_CALL(nmi_op),
-    COMPAT_CALL(sched_op),
-    COMPAT_CALL(callback_op),
-#ifdef CONFIG_XENOPROF
-    COMPAT_CALL(xenoprof_op),
-#endif
-    HYPERCALL(event_channel_op),
-    COMPAT_CALL(physdev_op),
-#ifndef CONFIG_PV_SHIM_EXCLUSIVE
-    HYPERCALL(sysctl),
-    HYPERCALL(domctl),
-#endif
-#ifdef CONFIG_KEXEC
-    COMPAT_CALL(kexec_op),
+static const unsigned char hypercall_args_32[] = hypercall_args_pv32;
 #endif
-#ifdef CONFIG_ARGO
-    COMPAT_CALL(argo_op),
 #endif
-    HYPERCALL(xenpmu_op),
-#ifdef CONFIG_HVM
-    HYPERCALL(hvm_op),
-    COMPAT_CALL(dm_op),
-#endif
-#ifdef CONFIG_HYPFS
-    HYPERCALL(hypfs_op),
-#endif
-    HYPERCALL(mca),
-#ifndef CONFIG_PV_SHIM_EXCLUSIVE
-    HYPERCALL(paging_domctl_cont),
-#endif
-};
-
-#undef COMPAT_CALL
-#undef HYPERCALL
 
 /* Forced inline to cause 'compat' to be evaluated at compile time. */
 static void always_inline
 _pv_hypercall(struct cpu_user_regs *regs, bool compat)
 {
     struct vcpu *curr = current;
-    unsigned long eax = compat ? regs->eax : regs->rax;
+    unsigned long eax;
 
     ASSERT(guest_kernel_mode(curr, regs));
 
-    BUILD_BUG_ON(ARRAY_SIZE(pv_hypercall_table) >
-                 ARRAY_SIZE(hypercall_args_table));
-
-    if ( eax >= ARRAY_SIZE(pv_hypercall_table) )
-    {
-        regs->rax = -ENOSYS;
-        return;
-    }
-
-    eax = array_index_nospec(eax, ARRAY_SIZE(pv_hypercall_table));
-
-    if ( !pv_hypercall_table[eax].native )
-    {
-        regs->rax = -ENOSYS;
-        return;
-    }
-
     curr->hcall_preempted = false;
 
     if ( !compat )
@@ -150,17 +53,8 @@ _pv_hypercall(struct cpu_user_regs *regs, bool compat)
         unsigned long r10 = regs->r10;
         unsigned long r8 = regs->r8;
 
-#ifndef NDEBUG
-        /* Deliberately corrupt parameter regs not used by this hypercall. */
-        switch ( hypercall_args_table[eax].native )
-        {
-        case 0: rdi = 0xdeadbeefdeadf00dUL; fallthrough;
-        case 1: rsi = 0xdeadbeefdeadf00dUL; fallthrough;
-        case 2: rdx = 0xdeadbeefdeadf00dUL; fallthrough;
-        case 3: r10 = 0xdeadbeefdeadf00dUL; fallthrough;
-        case 4: r8 = 0xdeadbeefdeadf00dUL;
-        }
-#endif
+        eax = regs->rax;
+
         if ( unlikely(tb_init_done) )
         {
             unsigned long args[5] = { rdi, rsi, rdx, r10, r8 };
@@ -168,22 +62,10 @@ _pv_hypercall(struct cpu_user_regs *regs, bool compat)
             __trace_hypercall(TRC_PV_HYPERCALL_V2, eax, args);
         }
 
-        regs->rax = pv_hypercall_table[eax].native(rdi, rsi, rdx, r10, r8);
+        call_handlers_pv64(eax, regs->rax, rdi, rsi, rdx, r10, r8);
 
-#ifndef NDEBUG
-        if ( !curr->hcall_preempted )
-        {
-            /* Deliberately corrupt parameter regs used by this hypercall. */
-            switch ( hypercall_args_table[eax].native )
-            {
-            case 5: regs->r8  = 0xdeadbeefdeadf00dUL; fallthrough;
-            case 4: regs->r10 = 0xdeadbeefdeadf00dUL; fallthrough;
-            case 3: regs->rdx = 0xdeadbeefdeadf00dUL; fallthrough;
-            case 2: regs->rsi = 0xdeadbeefdeadf00dUL; fallthrough;
-            case 1: regs->rdi = 0xdeadbeefdeadf00dUL;
-            }
-        }
-#endif
+        if ( !curr->hcall_preempted && regs->rax != -ENOSYS )
+            clobber_regs(regs, get_nargs(hypercall_args_64, eax));
     }
 #ifdef CONFIG_PV32
     else
@@ -194,17 +76,7 @@ _pv_hypercall(struct cpu_user_regs *regs, bool compat)
         unsigned int esi = regs->esi;
         unsigned int edi = regs->edi;
 
-#ifndef NDEBUG
-        /* Deliberately corrupt parameter regs not used by this hypercall. */
-        switch ( hypercall_args_table[eax].compat )
-        {
-        case 0: ebx = 0xdeadf00d; fallthrough;
-        case 1: ecx = 0xdeadf00d; fallthrough;
-        case 2: edx = 0xdeadf00d; fallthrough;
-        case 3: esi = 0xdeadf00d; fallthrough;
-        case 4: edi = 0xdeadf00d;
-        }
-#endif
+        eax = regs->eax;
 
         if ( unlikely(tb_init_done) )
         {
@@ -214,23 +86,11 @@ _pv_hypercall(struct cpu_user_regs *regs, bool compat)
         }
 
         curr->hcall_compat = true;
-        regs->eax = pv_hypercall_table[eax].compat(ebx, ecx, edx, esi, edi);
+        call_handlers_pv32(eax, regs->eax, ebx, ecx, edx, esi, edi);
         curr->hcall_compat = false;
 
-#ifndef NDEBUG
-        if ( !curr->hcall_preempted )
-        {
-            /* Deliberately corrupt parameter regs used by this hypercall. */
-            switch ( hypercall_args_table[eax].compat )
-            {
-            case 5: regs->edi = 0xdeadf00d; fallthrough;
-            case 4: regs->esi = 0xdeadf00d; fallthrough;
-            case 3: regs->edx = 0xdeadf00d; fallthrough;
-            case 2: regs->ecx = 0xdeadf00d; fallthrough;
-            case 1: regs->ebx = 0xdeadf00d;
-            }
-        }
-#endif
+        if ( !curr->hcall_preempted && regs->eax != -ENOSYS )
+            clobber_regs32(regs, get_nargs(hypercall_args_32, eax));
     }
 #endif /* CONFIG_PV32 */
 
@@ -256,13 +116,8 @@ enum mc_disposition pv_do_multicall_call(struct mc_state *state)
         struct compat_multicall_entry *call = &state->compat_call;
 
         op = call->op;
-        if ( (op < ARRAY_SIZE(pv_hypercall_table)) &&
-             pv_hypercall_table[op].compat )
-            call->result = pv_hypercall_table[op].compat(
-                call->args[0], call->args[1], call->args[2],
-                call->args[3], call->args[4]);
-        else
-            call->result = -ENOSYS;
+        call_handlers_pv32(op, call->result, call->args[0], call->args[1],
+                           call->args[2], call->args[3], call->args[4]);
     }
     else
 #endif
@@ -270,13 +125,8 @@ enum mc_disposition pv_do_multicall_call(struct mc_state *state)
         struct multicall_entry *call = &state->call;
 
         op = call->op;
-        if ( (op < ARRAY_SIZE(pv_hypercall_table)) &&
-             pv_hypercall_table[op].native )
-            call->result = pv_hypercall_table[op].native(
-                call->args[0], call->args[1], call->args[2],
-                call->args[3], call->args[4]);
-        else
-            call->result = -ENOSYS;
+        call_handlers_pv64(op, call->result, call->args[0], call->args[1],
+                           call->args[2], call->args[3], call->args[4]);
     }
 
     return unlikely(op == __HYPERVISOR_iret)
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 07:35:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 07:35:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288180.488740 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDKw-0007eN-Aw; Thu, 10 Mar 2022 07:35:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288180.488740; Thu, 10 Mar 2022 07:35:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSDKw-0007eG-7v; Thu, 10 Mar 2022 07:35:50 +0000
Received: by outflank-mailman (input) for mailman id 288180;
 Thu, 10 Mar 2022 07:35:49 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=UgV8=TV=amazon.de=prvs=06149a43a=doebel@srs-se1.protection.inumbo.net>)
 id 1nSDKv-0007dt-4k
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 07:35:49 +0000
Received: from smtp-fw-80007.amazon.com (smtp-fw-80007.amazon.com
 [99.78.197.218]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id b0d5ee16-a044-11ec-8539-5f4723681683;
 Thu, 10 Mar 2022 08:35:44 +0100 (CET)
Received: from pdx4-co-svc-p1-lb2-vlan2.amazon.com (HELO
 email-inbound-relay-pdx-2a-e6c05252.us-west-2.amazon.com) ([10.25.36.210])
 by smtp-border-fw-80007.pdx80.corp.amazon.com with ESMTP;
 10 Mar 2022 07:35:47 +0000
Received: from EX13D44EUC002.ant.amazon.com
 (pdx1-ws-svc-p6-lb9-vlan2.pdx.amazon.com [10.236.137.194])
 by email-inbound-relay-pdx-2a-e6c05252.us-west-2.amazon.com (Postfix) with
 ESMTPS id 5260F41D35; Thu, 10 Mar 2022 07:35:40 +0000 (UTC)
Received: from EX13MTAUEE002.ant.amazon.com (10.43.62.24) by
 EX13D44EUC002.ant.amazon.com (10.43.164.19) with Microsoft SMTP Server (TLS)
 id 15.0.1497.28; Thu, 10 Mar 2022 07:35:39 +0000
Received: from dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (10.13.240.106)
 by mail-relay.amazon.com (10.43.62.224) with Microsoft SMTP Server id
 15.0.1497.28 via Frontend Transport; Thu, 10 Mar 2022 07:35:38 +0000
Received: by dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (Postfix,
 from userid 3160037)
 id 2055B4EE8; Thu, 10 Mar 2022 07:35:38 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b0d5ee16-a044-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646897749; x=1678433749;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=F1i6mc4JNRjStuuHfMes5a9tep6OAGZG0c5Z/wtG6zE=;
  b=I3SYpF7RHUlGjXukwcB7rBm9iyjJ+AzsVL60uE7gS7AMbDfLvsaH3r53
   PBF4F4bg4SjVJK4DQyYJAbX8uSdsIeOW2dHssXrd9eXHsZmPI9OGUTaaN
   x5deNhnmEv7FysDoSLa9H3uFzRjq0XzcNRjjKGWC0kBWPAUQBQHE8M2U6
   c=;
X-IronPort-AV: E=Sophos;i="5.90,169,1643673600"; 
   d="scan'208";a="69574185"
From: Bjoern Doebel <doebel@amazon.de>
To: <xen-devel@lists.xenproject.org>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, Roger
 Pau Monne <roger.pau@citrix.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
	Bjoern Doebel <doebel@amazon.de>, Konrad Rzeszutek Wilk
	<konrad.wilk@oracle.com>, Ross Lagerwall <ross.lagerwall@citrix.com>
Subject: [PATCH v6 2/2] xen/x86: Livepatch: support patching CET-enhanced functions
Date: Thu, 10 Mar 2022 07:35:36 +0000
Message-ID: <81b800e254019ac3031e57307eea0ec422dc792f.1646897292.git.doebel@amazon.de>
X-Mailer: git-send-email 2.32.0
In-Reply-To: <03798b67ec3a892a302e6be5d87ea676e6376036.1646897292.git.doebel@amazon.de>
References: <03798b67ec3a892a302e6be5d87ea676e6376036.1646897292.git.doebel@amazon.de>
MIME-Version: 1.0
Precedence: Bulk
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

Xen enabled CET for supporting architectures. The control flow aspect of
CET expects functions that can be called indirectly (i.e., via function
pointers) to start with an ENDBR64 instruction. Otherwise a control flow
exception is raised.

This expectation breaks livepatching flows because we patch functions by
overwriting their first 5 bytes with a JMP + <offset>, thus breaking the
ENDBR64. We fix this by checking the start of a patched function for
being ENDBR64. In the positive case we move the livepatch JMP to start
behind the ENDBR64 instruction.

To avoid having to guess the ENDBR64 offset again on patch reversal
(which might race with other mechanisms adding/removing ENDBR
dynamically), use the livepatch metadata to store the computed offset
along with the saved bytes of the overwritten function.

Signed-off-by: Bjoern Doebel <doebel@amazon.de>
Acked-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Reviewed-by: Ross Lagerwall <ross.lagerwall@citrix.com>
----
Changes since r1:
* (v2) use sizeof_field() to avoid unused variable warning
* (v3) make metadata variable const in arch_livepatch_revert
* (v4) rebase on top and make use of Andrew Cooper's was_endbr64() patch
* (v5) use padding byte to store offset rather than reducing opaque area
* (v6) style fixes
---
 xen/arch/x86/livepatch.c    | 39 +++++++++++++++++++++++++++++++------
 xen/include/public/sysctl.h |  3 ++-
 2 files changed, 35 insertions(+), 7 deletions(-)

diff --git a/xen/arch/x86/livepatch.c b/xen/arch/x86/livepatch.c
index 37c9b8435e..81c48fda7f 100644
--- a/xen/arch/x86/livepatch.c
+++ b/xen/arch/x86/livepatch.c
@@ -14,6 +14,7 @@
 #include <xen/vm_event.h>
 #include <xen/virtual_region.h>
 
+#include <asm/endbr.h>
 #include <asm/fixmap.h>
 #include <asm/nmi.h>
 #include <asm/livepatch.h>
@@ -114,8 +115,20 @@ int arch_livepatch_verify_func(const struct livepatch_func *func)
         if ( func->old_size < func->new_size )
             return -EINVAL;
     }
-    else if ( func->old_size < ARCH_PATCH_INSN_SIZE )
-        return -EINVAL;
+    else
+    {
+        /*
+         * Space needed now depends on whether the target function
+         * start{s,ed} with an ENDBR64 instruction.
+         */
+        uint8_t needed = ARCH_PATCH_INSN_SIZE;
+
+        if ( is_endbr64(func->old_addr) || was_endbr64(func->old_addr) )
+            needed += ENDBR64_LEN;
+
+        if ( func->old_size < needed )
+            return -EINVAL;
+    }
 
     return 0;
 }
@@ -130,12 +143,24 @@ void noinline arch_livepatch_apply(struct livepatch_func *func)
     uint8_t insn[sizeof(func->opaque)];
     unsigned int len;
 
+    func->patch_offset = 0;
     old_ptr = func->old_addr;
     len = livepatch_insn_len(func);
     if ( !len )
         return;
 
-    memcpy(func->opaque, old_ptr, len);
+    /*
+     * CET hotpatching support: We may have functions starting with an ENDBR64
+     * instruction that MUST remain the first instruction of the function,
+     * hence we need to move any hotpatch trampoline further into the function.
+     * For that we need to keep track of the patching offset used for any
+     * loaded hotpatch (to avoid racing against other fixups adding/removing
+     * ENDBR64 or similar instructions).
+     */
+    if ( is_endbr64(old_ptr) || was_endbr64(func->old_addr) )
+        func->patch_offset += ENDBR64_LEN;
+
+    memcpy(func->opaque, old_ptr + func->patch_offset, len);
     if ( func->new_addr )
     {
         int32_t val;
@@ -143,14 +168,15 @@ void noinline arch_livepatch_apply(struct livepatch_func *func)
         BUILD_BUG_ON(ARCH_PATCH_INSN_SIZE != (1 + sizeof(val)));
 
         insn[0] = 0xe9; /* Relative jump. */
-        val = func->new_addr - func->old_addr - ARCH_PATCH_INSN_SIZE;
+        val = func->new_addr - (func->old_addr + func->patch_offset +
+                                ARCH_PATCH_INSN_SIZE);
 
         memcpy(&insn[1], &val, sizeof(val));
     }
     else
         add_nops(insn, len);
 
-    memcpy(old_ptr, insn, len);
+    memcpy(old_ptr + func->patch_offset, insn, len);
 }
 
 /*
@@ -159,7 +185,8 @@ void noinline arch_livepatch_apply(struct livepatch_func *func)
  */
 void noinline arch_livepatch_revert(const struct livepatch_func *func)
 {
-    memcpy(func->old_addr, func->opaque, livepatch_insn_len(func));
+    memcpy(func->old_addr + func->patch_offset, func->opaque,
+           livepatch_insn_len(func));
 }
 
 /*
diff --git a/xen/include/public/sysctl.h b/xen/include/public/sysctl.h
index 55252e97f2..b0a4af8789 100644
--- a/xen/include/public/sysctl.h
+++ b/xen/include/public/sysctl.h
@@ -876,7 +876,8 @@ struct livepatch_func {
     uint8_t version;        /* MUST be LIVEPATCH_PAYLOAD_VERSION. */
     uint8_t opaque[LIVEPATCH_OPAQUE_SIZE];
     uint8_t applied;
-    uint8_t _pad[7];
+    uint8_t patch_offset;
+    uint8_t _pad[6];
     livepatch_expectation_t expect;
 };
 typedef struct livepatch_func livepatch_func_t;
-- 
2.32.0




Amazon Development Center Germany GmbH
Krausenstr. 38
10117 Berlin
Geschaeftsfuehrung: Christian Schlaeger, Jonathan Weiss
Eingetragen am Amtsgericht Charlottenburg unter HRB 149173 B
Sitz: Berlin
Ust-ID: DE 289 237 879





From xen-devel-bounces@lists.xenproject.org Thu Mar 10 08:58:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 08:58:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288231.488787 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSEcU-0000Ab-LZ; Thu, 10 Mar 2022 08:58:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288231.488787; Thu, 10 Mar 2022 08:58:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSEcU-0000AT-Ho; Thu, 10 Mar 2022 08:58:02 +0000
Received: by outflank-mailman (input) for mailman id 288231;
 Thu, 10 Mar 2022 08:58:00 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=7C/d=TV=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nSEcS-0000AJ-PC
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 08:58:00 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 2c684178-a050-11ec-8539-5f4723681683;
 Thu, 10 Mar 2022 09:57:54 +0100 (CET)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2052.outbound.protection.outlook.com [104.47.14.52]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-22-8CdeSyXnMTGc-KAMACNXQw-1; Thu, 10 Mar 2022 09:57:56 +0100
Received: from AM0PR04MB5587.eurprd04.prod.outlook.com (2603:10a6:208:125::12)
 by AM6PR0402MB3895.eurprd04.prod.outlook.com (2603:10a6:209:1a::13)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Thu, 10 Mar
 2022 08:57:55 +0000
Received: from AM0PR04MB5587.eurprd04.prod.outlook.com
 ([fe80::dd50:54e6:1f96:3b33]) by AM0PR04MB5587.eurprd04.prod.outlook.com
 ([fe80::dd50:54e6:1f96:3b33%3]) with mapi id 15.20.5061.022; Thu, 10 Mar 2022
 08:57:54 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2c684178-a050-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646902678;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=IJHG4FXpB+oWx5WMa3/a2NqPpI1HWKX2PQ5pEE/c3C0=;
	b=Kmk4+Yj60EXD0p7ORj8KrakV48MjbUgm+BafwI1FlqDTbamWAUdoerXraLxZbRm7xP107T
	qHWDbUpXOoeg1Dazh7pe732YNBCJv1L+946Jt/3G+qTSBYoz/mQPlCUP0nA/PzklHeo7JW
	mfv5CLbWaQL+kdKq81/zgE9p/3IPl6k=
X-MC-Unique: 8CdeSyXnMTGc-KAMACNXQw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=lJQKJEoFsolfqaHMWW9zA3XBuj7i1VYL19nNofpmDWa4+d3rJWrIh5SuQ2Fp7hk4ohKiyYycH9UzDq5ZCtZQBdx5PS5plGAGtBKe4LwDHM14ZoSwXyuTum99okfAWhNaXMg8gso9weJibSbvVyIo+JQQu0oIQpEcqiH5rB7tXqByXWnatCTuvXfA1Yqwrj44Nct/Bnp8mRPZWb5sJjY/hYHQRR2AWbQM+/HUhQxYAFkvx3PUidSLlhVFi4O5+4F04VTQQwwZuGEicLZ8UR7qj9JVllpRU+12enCWWvomOKlobWlV4MMX5Gh0/OiFIlkTu5nAKHlbGtvhTrR85DqhBQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=IJHG4FXpB+oWx5WMa3/a2NqPpI1HWKX2PQ5pEE/c3C0=;
 b=E3z3DvVMC3/d1VOcsYXkX/rF4C8lc8zQ8chsH4+SST1Ylu08PHk7x/hXtamGH9JoCJmftHRNPz7+Otj49/NkPhD6nOILb/dm5qVRSYRJ4lgitidcSDcFE+3m3QhwvaB7zqzWjSpqa2p90KobQie9WEBz4qTQ9hGNwwPDRU3jXFDhO18AEtSBXTOAcW/kkxhfAC+2ZG2NcUNtyl9fXpY/wfK6LFlmkHZzXqBMG2tJ3EL5tGsYTwuPnTgcvQYlUIVedyIX70PmKzSsRf0g8rVLHkDa63sIzEnYl+gBjIS8fmttYgRmwUa2I1S/14jQlTVBWuVpb+IPk574JF6zhsqkSA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <b9be95eb-7a6e-9f1b-6b68-6d08d6329cd1@suse.com>
Date: Thu, 10 Mar 2022 09:57:45 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
From: Jan Beulich <jbeulich@suse.com>
Subject: preparations for 4.16.1
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: George Dunlap <george.dunlap@citrix.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Anthony Perard <anthony.perard@citrix.com>, Julien Grall <julien@xen.org>
Content-Language: en-US
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM5PR1001CA0043.EURPRD10.PROD.OUTLOOK.COM
 (2603:10a6:206:15::20) To AM0PR04MB5587.eurprd04.prod.outlook.com
 (2603:10a6:208:125::12)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: d59865d1-34e8-436a-9817-08da027410d0
X-MS-TrafficTypeDiagnostic: AM6PR0402MB3895:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR0402MB3895D3D828E3329AC0A4D1EEB30B9@AM6PR0402MB3895.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR04MB5587.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(54906003)(316002)(6916009)(66946007)(86362001)(66476007)(508600001)(8676002)(38100700002)(7116003)(4326008)(6666004)(6486002)(2906002)(31686004)(6506007)(6512007)(186003)(2616005)(66556008)(26005)(5660300002)(4744005)(31696002)(8936002)(36756003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?TXNsR3QwZFhSSlZ3VklJdnY3WXFoV3ZsMHRiem9jalpCRVNpcHMwYXFneGlO?=
 =?utf-8?B?cmpsenJ5MTI1VUdnVVlBYlQvbW1DS3laTGo3OG0yV2Z2TUluM2JmM1lkL3ox?=
 =?utf-8?B?UUhtNE1EWk9ISGZvcHNpR1NEVDFMcktSbWppYXZWU3VyaGtUOTE4cVhEUVJN?=
 =?utf-8?B?TTVEK0J6bHlmRHU3a2NNZWt3OENqY1BjeWZPZGVuMzU4NjREU1FRUlAyN1Fx?=
 =?utf-8?B?bHltaUQ0SDJCeS9yci9DWGNoTnBldjdUTFJRM3BrbkhCanRxOStNM2d1RFhG?=
 =?utf-8?B?cTRZVHFvNCt3WnU3dUY1K25YNWxsK0NnQlQ5dHRsMUVYRWVjWWxCNU5Ra0w4?=
 =?utf-8?B?WUFuQjdOck5JTWoxV0FiVm16cmVlWWVjaFBNeWQwVjc5L2t0djFjWlFEVXkz?=
 =?utf-8?B?U1AwOU5EQThZM2hqRy9ia3RtWXl4WVRRbjF2VmN3MlZ2WE5Gc0JZcDZLdEVq?=
 =?utf-8?B?Yk5GWWJzRnlCRkRrRHJ2OUpLM2ZHK1hXNWx1UHNhdHVCUXZIeGprbEMzNHJK?=
 =?utf-8?B?RVFYUE1wMGJXVW5uZUp4NWRTSWErTnN5SmNQZkRXUTVrL0l2Ky9Gd21uN2NY?=
 =?utf-8?B?QkRhaHFJdEk3SGY4ME1mVGlMWE40SEZZNUVxOGk0ajdYZ1NsaXplOU9haGgr?=
 =?utf-8?B?UXFpWXloYWlFYytpSjBXdUxzTFFaMHRWMXh2aXgzdmsraktJZURvYjJzMHg3?=
 =?utf-8?B?bU9mcERxams2QWgyQ3MvOTRzMzZPUTdDNUwvRzB5dTlhZmpRVExYSTdqVC9Y?=
 =?utf-8?B?WVNsUFdFOE0xZmQxdEpyMnorWnNnV1RFbmttWFM1aEdXbDhjZW82dUM4UUFS?=
 =?utf-8?B?WmdQQklhMnVrazBPQnNnbU5BUThkQ0x4T29Xb1BJcVFTYlRVZmt2VUZGVVBF?=
 =?utf-8?B?aEJJeVlTeGJ3Z1pDU2wrajhqdzVYME1UZFR4Y0JGeURIQm9WcEhWRmN1bFJ2?=
 =?utf-8?B?aXFZL1VVN3hzenlpeEsyTFdndlVHMm5IWHFDNnoxTll4VGpXMmFmK3VKby9E?=
 =?utf-8?B?NlpEM0tseEdSZHcvME9GMEZBZG5vM29xbXgxaGk0OHJXWk5oejFoSzdmUWVJ?=
 =?utf-8?B?UTJGZnVxckdaL0RJcEVVcEJwc0JiQzhhbkF5M2N1SW53YTV5Q2IrY09OZW1y?=
 =?utf-8?B?SjR1YVE1eExFNVEyVXF0OGxxTnpsMHFKOU1LcTJhTkVNb2s2QjdHMjdMRmUx?=
 =?utf-8?B?OVpBL24wSkJRK1F0d3NXZHRTa1F6THFYZXhKeHRpRWU3cFE4WjlJREQxMlF4?=
 =?utf-8?B?Y0duM2t6MGY2U0ZvWDc4YU53RVVoWDFnZUgra3RuaU5HYlI3eEUzRUpOenBG?=
 =?utf-8?B?RU9MR2Z4YUFqTkVYTnR6NUhzUlNmemx3QlNIL0xQdkpYZEtjVVk4anpMQm9E?=
 =?utf-8?B?SXJONjg4SmxuUm1IWWF3OUN4dHlsZC9DOVp3eHVUaW85Y1owbkhEaWtCVzJi?=
 =?utf-8?B?Q3BEYlJBMHBTYXBRSS85K3ErMHArWWZwRllsOFhPdEo0OWh6QzQzSFRUMU9Z?=
 =?utf-8?B?aXpvSDBMRUNFQzNZUFF5Z0JxdVdkcmtwMVdQby9YUE9iTkpVbHFpckYrVERX?=
 =?utf-8?B?SEdZZGwwakpkdDZvaTI0dC9SYkNyYmNZQ2lZdk5PVjUwUEFyWkdNcWZ3UUwx?=
 =?utf-8?B?azRSR0xDRElNTFBBRHpoUEtkWERmNzh0TGtBVTF1ZGY1MWgyaFdSNXJyQXhY?=
 =?utf-8?B?N1RTN0hjWndTamw0bFVTT1JhclNLd2pDcTI2YXdxOTZDTEJvcFRpaVcrY2FM?=
 =?utf-8?B?WEtsSGZDR1VEY1owSklLK05jbGdURW9yMTZHSmpVMTAySVNmK0NWTFpmMmlC?=
 =?utf-8?B?dXMzaklCZTFMWkIvRW9EbksrcnhaclFnQWN0OWkwM08rMGU2MFR4NldiN21Q?=
 =?utf-8?B?NTd5Yng3T2tKaXBVVWJnNXRuSkRodXNNMGhxNXNENFR4ZlBvdDhlUlBGd1U5?=
 =?utf-8?Q?QAihDG2wNGV7SkT4Rg2klpZBq/lJZekq?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d59865d1-34e8-436a-9817-08da027410d0
X-MS-Exchange-CrossTenant-AuthSource: AM0PR04MB5587.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2022 08:57:54.9320
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: MdqNzHcMwT69x6JZ4rgXSFrR2QrSGqnIScep0d+yoRCYe/f8X5i4La2uTdDJZYY3Q+PrtRZyMgD0cv+r0Mk4nQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR0402MB3895

All,

the release is due in a few weeks time.

Please point out backports you find missing from the respective staging
branch, but which you consider relevant. One I have queued already, but
which I'd like to put in only once the pending fix to it ("x86: avoid
SORT_BY_INIT_PRIORITY with old GNU ld") has also landed in staging, is

4b7fd8153ddf x86: fold sections in final binaries

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 09:01:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 09:01:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288235.488798 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSEfe-0001aF-3h; Thu, 10 Mar 2022 09:01:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288235.488798; Thu, 10 Mar 2022 09:01:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSEfe-0001a8-0R; Thu, 10 Mar 2022 09:01:18 +0000
Received: by outflank-mailman (input) for mailman id 288235;
 Thu, 10 Mar 2022 09:01:16 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=7C/d=TV=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nSEfc-0001Zz-Qy
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 09:01:16 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a3778abe-a050-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 10:01:14 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2111.outbound.protection.outlook.com [104.47.17.111]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-27-h-chUmV2PGGIwSdQVvFpPw-1; Thu, 10 Mar 2022 10:01:12 +0100
Received: from AM0PR04MB5587.eurprd04.prod.outlook.com (2603:10a6:208:125::12)
 by PA4PR04MB7951.eurprd04.prod.outlook.com (2603:10a6:102:ca::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Thu, 10 Mar
 2022 09:01:11 +0000
Received: from AM0PR04MB5587.eurprd04.prod.outlook.com
 ([fe80::dd50:54e6:1f96:3b33]) by AM0PR04MB5587.eurprd04.prod.outlook.com
 ([fe80::dd50:54e6:1f96:3b33%3]) with mapi id 15.20.5061.022; Thu, 10 Mar 2022
 09:01:11 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a3778abe-a050-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646902874;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=2yjxOm8D6c4XeWmgPpGxL+AeZOmUk5Vi+/HZDeBBiis=;
	b=JZYoOaSdyEzqBpUPKbh2Z2K6i1DraV7Jij7tcQaa8ZSJoRSubxsIoq6FmBVkXswW60TaPR
	Q1sVXAusRlqPXGwM7Jvo87Gb7fdak2zzOvLey5gT7E0mtPNdUD4bqW1bCgT1uHNvpqoffF
	8A6/60vqH81k5/Ny7f2vKTp9vt5jtys=
X-MC-Unique: h-chUmV2PGGIwSdQVvFpPw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=YnnW+PnMT/x8yUtLROto7nKxWWuZMBjXl0qYrTCwpg7J8apoK+zpkuCm+MuiaNR6+Vgnigo/SaUyjDTeu/2guTGXdIsLpZ2wI/122X3CrvU1c7/1M413gzXc0pvHbgZJ5UgCPAGKwOJnUtWx+lkjLAzt4nv/QO9JhkNaA2Dd2OKuhM+V99yQv+edp8z6sIbCsPXyU2Yu5VgYiZsNG+AlMQ4g6KElbCKbMOjns54wjNNoXTKMqQaXPHKh56pVmukLA5Xp/sEeJoplQ/gp7vqUFLHnUoCfsdV5TOI237ev95mkVsGs+KkXujLnHisSKwgCITPQPpizfe09j4HkSKtmqw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=2yjxOm8D6c4XeWmgPpGxL+AeZOmUk5Vi+/HZDeBBiis=;
 b=EAUeVq/h5l6tj0LxCkcVdYskIbxOfPwo2eYBMAGkcXPtI0ToXuwJSOoIahdUGAaT6vtP6qybJEEOMZ9YKFbmlMZlS/wQ1Fm49GWQItjY3B0V2SkWWpbZtRm9uHHYI0auLYUdi6yS2+7mdt6jC/9Glt14R6xZVh9Nr9l7RhfACf4Vq4bMQozBtAARbej38EZRMGXEHoskhVbPegYb7yzas4QQIYfHSBAYUq67jfleZ9Wyx+7REP8LuFMAxF6uUqFT9qNPNDXapS8reiYQ9op2y85ekBhmFWkSWP6WDAls3RrKDXPsQWQnwWQq54RPkUpQxfyd56aFmH0Twx5qgUmOGA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <6f8ccbb3-d384-bedd-8fb2-18aab570b588@suse.com>
Date: Thu, 10 Mar 2022 10:01:00 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: preparations for 4.16.1
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: George Dunlap <george.dunlap@citrix.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Anthony Perard <anthony.perard@citrix.com>, Julien Grall <julien@xen.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>
References: <b9be95eb-7a6e-9f1b-6b68-6d08d6329cd1@suse.com>
In-Reply-To: <b9be95eb-7a6e-9f1b-6b68-6d08d6329cd1@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8PR05CA0013.eurprd05.prod.outlook.com
 (2603:10a6:20b:311::18) To AM0PR04MB5587.eurprd04.prod.outlook.com
 (2603:10a6:208:125::12)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 38eef77f-135f-4ba2-1192-08da027485c8
X-MS-TrafficTypeDiagnostic: PA4PR04MB7951:EE_
X-Microsoft-Antispam-PRVS:
	<PA4PR04MB7951B0207CE545A238E11CDAB30B9@PA4PR04MB7951.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR04MB5587.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(4744005)(6512007)(53546011)(6506007)(2906002)(5660300002)(31686004)(6666004)(8936002)(508600001)(36756003)(2616005)(4326008)(8676002)(26005)(6486002)(86362001)(186003)(7116003)(31696002)(6916009)(54906003)(38100700002)(66946007)(66476007)(66556008)(316002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?elRrNUdCRnBQS1dRa2ZsRmRobWtrQ3RYMytrZDJWVjhhd0hvUkd0K1p1dFZB?=
 =?utf-8?B?bGVUYkZZMG9JQUZNYkhDZ2ZFWEMwQjllQUZBSy9DeTdjTUN6QmMwUVk3NHBT?=
 =?utf-8?B?bVVGRVNHUjJoTTZScElJVll4elkzTTRyT1Q4TjVoNnZTN1ZXbU9xM1VZeTB3?=
 =?utf-8?B?ZUswNFlydmdLVXVxVEtaNHRzRHhCd1pIWnhNbWlGdk95bmhOdUprZTdJbVZj?=
 =?utf-8?B?c1VqOGQ5aCtIYm9NUFcrc0lUZno5WmxFSHZWM2RTbzJnU212dEJCSklpRlhW?=
 =?utf-8?B?QzN6MllCOEsvdit3VUo1L2RyNURGK2NReERIakhPRFR3K2RmWWJTRmlxUDVI?=
 =?utf-8?B?NmJxYTlJNGhWTDZxNUNxL3RoUmJhcFFsRmxFZERsd21pcnozUmh5N0VhUkxY?=
 =?utf-8?B?c3ZwSEJEaUJSU21GT1FoekU2Wm4vUktGdUhlQ28rYnZHbHBINTdNdVJQOXcw?=
 =?utf-8?B?K2gzREEvZmQvWHh0K29kTkVDR0tEUDU5OHZQVUdTWFA1bmg4SnZHOXJ5Ylhr?=
 =?utf-8?B?azc4SXBYY1dybDlhS2lxS0gzZEx5M1BhNzU4MnJUdnFWdDNDa0pqRmJkeC9F?=
 =?utf-8?B?QUJRUXNZUDFlMWVxVzlVSjJTUjJBOVo2Y0s0aFhhSmNzNUVXYi95eXUxanlI?=
 =?utf-8?B?SG1mY0JRTjBhcnY1QUtlUEZ1Sk9jMlZHMko1QWtOMkl2dEJSSWhMWEdqZm1S?=
 =?utf-8?B?TzVpN3U4UUZKOVo5cTN4akMvWVlFMEp5endXSVhhdEd1WWtMUkx3Tm5sWWlw?=
 =?utf-8?B?OUFxaUwvY0JSSS9Bd2dQV3JDZXd5MktCVFJmTk1SOVV1UWV5bGpLWFIyQ2J4?=
 =?utf-8?B?NDg5VVllVEpVN3IzcVh0WDZ0NmJLZjJkOWpyM3VRM0pKdnI2TTl2V0M3UzlN?=
 =?utf-8?B?QjJvaWlzcjR0Rzl3cHBsbm95Nm5RZkJYSm5oRjRGbXZSRzFwZ05xUWcvNlcr?=
 =?utf-8?B?UmdHVE0wNE10MGsvcXdDbmNRK1pFdC9aNFVFUC9aMEdWZ1psZy9TSXRWeG5V?=
 =?utf-8?B?b2VlU05LMWtPRWdQNmtLNTVneG9zMmkwWUpSSFRFNkcwK1phM0hKazJTbkNp?=
 =?utf-8?B?SUQvbW1aRHBRLzV6TDZBbUdhRExtTHA5VzBEbXJpbHZ0dWpuRm1GZXNXMDNL?=
 =?utf-8?B?eWNzQkhuMUFjQzZ6QTJJWUR0OVhjbC9vTmFBbG82MFZxRWVxQ0p2bmlVakF1?=
 =?utf-8?B?NTh3b3VuRS9jMDRGL3EyWXB5bHE0SEdhUUcyVW9SbWZzQ21DbTZROFpUb0FW?=
 =?utf-8?B?bWs3OGdUcm9pOGN5SENIaUhjd2NBMjl1eXdyKzdjRVQwOC80N2tRMDJZN3BH?=
 =?utf-8?B?SU04SnJ2KytHRzdMWUxtYVNpS1JJdVI0MTVwUjkwYUw3SVVHZzl2d2RWS3I1?=
 =?utf-8?B?VWJ1TnF0MTlGSys0aEhnZUhPWkZOeVZQUEZKZmNjMmd1YmR6QnBPOER1NWRu?=
 =?utf-8?B?RjhnVVJveDZpWmUvc1U2NUtpS3h4QUZzNjNneHF1Vmd6dFQzR2p1eHpYQnNH?=
 =?utf-8?B?NzhXY1FEUVJPVmk2YXp5WGc2WVZjV3EwbFZPSlZQSVo4cVZUeGgzUDAraUkx?=
 =?utf-8?B?eEZQbS9nVThUaFhsb3VKc3hDQ1VLSnpWZjBvZEp5VWczM09NYnRWeVZOUWs2?=
 =?utf-8?B?MGlpMUdMaGs1NVc1NERqWlIwUlgwSVIxNEJoaGExNWJMZ3dxZEVFTUtySkRo?=
 =?utf-8?B?UEEvcEUwYnZWa2xCdk5XTHRKQ1NwRkhKOEdsT1U5ejZvODZNRVJyYlJkYUhR?=
 =?utf-8?B?ZkNLTE13Rm93OVlQKzlndjc2RDdjYnV5U1ZoMlBHSFhvWlFYZW5xVzNmTnpu?=
 =?utf-8?B?bnI0M04wY0w0REpCM3BJeWJkU1ZteVBuelp1VS8wczhiTXN5WTgwWXhnbDJt?=
 =?utf-8?B?QXNDU09qRzl4TTMyU2FhM0NhL3d0ZzBuWEVZai9XdUhkNDlMdjJnckF5RFFr?=
 =?utf-8?Q?Ct3dt05T1YIQRXPlogkwi/XE9hHOxKBr?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 38eef77f-135f-4ba2-1192-08da027485c8
X-MS-Exchange-CrossTenant-AuthSource: AM0PR04MB5587.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2022 09:01:11.2008
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 3QO7JEQuA2EFN9vYhng0FQyfH7naVU/cVYnYzRP6G3L1OOAXQnRN39O3Ba3ayF7fR5Bv3OsbchmVXv3OYusEOQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR04MB7951

On 10.03.2022 09:57, Jan Beulich wrote:
> Please point out backports you find missing from the respective staging
> branch, but which you consider relevant. One I have queued already, but
> which I'd like to put in only once the pending fix to it ("x86: avoid
> SORT_BY_INIT_PRIORITY with old GNU ld") has also landed in staging, is
> 
> 4b7fd8153ddf x86: fold sections in final binaries

Actually the other one I'm aware of is

7d9589239ec0 x86/CET: Fix S3 resume with shadow stacks active

which Andrew promised to provide a suitable backport for.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 09:04:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 09:04:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288239.488809 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSEie-0002Av-J7; Thu, 10 Mar 2022 09:04:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288239.488809; Thu, 10 Mar 2022 09:04:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSEie-0002Ao-EP; Thu, 10 Mar 2022 09:04:24 +0000
Received: by outflank-mailman (input) for mailman id 288239;
 Thu, 10 Mar 2022 09:04:22 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nSEic-0002Ai-R5
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 09:04:22 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSEib-0005BE-Vk; Thu, 10 Mar 2022 09:04:21 +0000
Received: from gw1.octic.net ([81.187.162.82] helo=[10.0.1.193])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSEib-0004uR-QC; Thu, 10 Mar 2022 09:04:21 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=FCVbPSRwf9qb2l4ezwa0t44y60FKVM56+bufAF2+fB4=; b=hG3sD5ET8AqoSnjekC7HSllyog
	L0682vY6laD4DwLGqqYIrQXJ08D0YiqdSRuxmb7OPOTKBNxNTDClmayM6z2f9HsVFr9gI8hm6OmMM
	D5Jk9wDAO2/PUC1wWdnIM3HrY1VpLAuKQclScekkX7CmNc8XHlT8i9UGbc5lXmRFBfhE=;
Message-ID: <4fe170af-9120-0203-bed9-895380a2ff0a@xen.org>
Date: Thu, 10 Mar 2022 09:04:18 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Subject: Re: preparations for 4.16.1
To: Jan Beulich <jbeulich@suse.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: George Dunlap <george.dunlap@citrix.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Anthony Perard <anthony.perard@citrix.com>
References: <b9be95eb-7a6e-9f1b-6b68-6d08d6329cd1@suse.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <b9be95eb-7a6e-9f1b-6b68-6d08d6329cd1@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

On 10/03/2022 08:57, Jan Beulich wrote:
> All,

Hi,

> the release is due in a few weeks time.
> 
> Please point out backports you find missing from the respective staging
> branch, but which you consider relevant. One I have queued already, but
> which I'd like to put in only once the pending fix to it ("x86: avoid
> SORT_BY_INIT_PRIORITY with old GNU ld") has also landed in staging, is
> 
> 4b7fd8153ddf x86: fold sections in final binaries

For arm, I would like to propose backporting:

32365f3476: xen/arm64: Zero the top 32 bits of gp registers on entry...

Stefano, what do you think?

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Thu Mar 10 10:03:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 10:03:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288245.488820 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSFdU-0008Db-RT; Thu, 10 Mar 2022 10:03:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288245.488820; Thu, 10 Mar 2022 10:03:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSFdU-0008DU-NA; Thu, 10 Mar 2022 10:03:08 +0000
Received: by outflank-mailman (input) for mailman id 288245;
 Thu, 10 Mar 2022 10:03:06 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=WGlF=TV=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nSFdS-0008DO-Jw
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 10:03:06 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05on2060a.outbound.protection.outlook.com
 [2a01:111:f400:7e1a::60a])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 46ae40d7-a059-11ec-8539-5f4723681683;
 Thu, 10 Mar 2022 11:03:04 +0100 (CET)
Received: from AM6P193CA0062.EURP193.PROD.OUTLOOK.COM (2603:10a6:209:8e::39)
 by DB9PR08MB6361.eurprd08.prod.outlook.com (2603:10a6:10:261::16) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 10 Mar
 2022 10:02:43 +0000
Received: from AM5EUR03FT047.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:8e:cafe::f) by AM6P193CA0062.outlook.office365.com
 (2603:10a6:209:8e::39) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.21 via Frontend
 Transport; Thu, 10 Mar 2022 10:02:40 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT047.mail.protection.outlook.com (10.152.16.197) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Thu, 10 Mar 2022 10:02:38 +0000
Received: ("Tessian outbound 341d209a0e52:v113");
 Thu, 10 Mar 2022 10:02:38 +0000
Received: from b29cf4e2649f.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 0BB56AF0-D4E6-4784-976E-D5160CB6CB3F.1; 
 Thu, 10 Mar 2022 10:02:31 +0000
Received: from EUR01-DB5-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id b29cf4e2649f.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 10 Mar 2022 10:02:31 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com (2603:10a6:20b:85::25)
 by VI1PR08MB4478.eurprd08.prod.outlook.com (2603:10a6:803:f7::10)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.17; Thu, 10 Mar
 2022 10:02:29 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62]) by AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62%3]) with mapi id 15.20.5061.022; Thu, 10 Mar 2022
 10:02:29 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 46ae40d7-a059-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=5OahcQ3uNb0fvdGGa4Pnu0zGAEWlRe6iFXLA/kCpNWM=;
 b=O5bZ1LkvjWfqbuH6qL852t+bAACFQQyS+psb5q8Zail86zqF3wm7PfhMoFgI6ddmyhZsVr+2akcKM8KAE16eRGeV5t8oRpb8NDR3omk0E8cKKKkHhidek20RYcAk15/RNKU/dbQ2EKB1z/76r5U2ejuX8O5LsNB38YVpiyd2w2o=
X-MS-Exchange-Authentication-Results: spf=temperror (sender IP is
 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=temperror action=none
 header.from=arm.com;
Received-SPF: TempError (protection.outlook.com: error in processing during
 lookup of arm.com: DNS Timeout)
X-CheckRecipientChecked: true
X-CR-MTA-CID: 54ae81c4c091ab40
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=d0hO/ogRJPZjvzTJBXjwQGZTtIusBtWwf5jEiNMgNj0NjjjUm/8ieoDkF3Ks1SQPE1QT2V5DbxFuWZC/qCjobJediwqbZmE9wbuZs9HVNOuA/bH1stcEIxfM5i40iUQ6Glnqpb1piR9zq6LFH2TNS/vbFePrBGa7U4tNu37rpS1PJhiQfealrWZl7gVpGwCKsBNwtt5S23edxWa643E2UhH3QRNRSZz0bxGgNBsylBXYyCw9NfB4h1xuVahchDGNU0PQ15nKTWHZw+CIBPwhuwbHMa1MfF1v/g11n0y2sktupMdr+0pxA8bk/MEpKQE40sg2N9mUrsm24hnlS5WBoQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=5OahcQ3uNb0fvdGGa4Pnu0zGAEWlRe6iFXLA/kCpNWM=;
 b=U8GVDGxtCByARRyW8CK68tvwVBbdH7wQtyxSKzqkN3bN5nIUcZKgTVOxxk2HCcjBOtQ1222OCDyD1QSrumDzZqr0COR7NbyHcYDKrhrGST77HBJjzkQvVFFYtOPUtjLtsGOhwlWuQmh5y6IJM4yyijf7vO24QdN2+VTFD0HN/hS0ALKrUtfKrMu3xTDyqOxEnrgJJQ67aLLS0qtKsMtgNYmHUkrOUeqofka5tUDK/Mi7fN9p+n7Sx+eK9GDvPDUG3a1ZfAOr+Gk2GFgycHNDV4qiweN8/bVzZ2gewzSI6SPwXEbiTDPTS/rI/YyiZyTHP9D56AUIJ3Ziu+MWz+bukA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=5OahcQ3uNb0fvdGGa4Pnu0zGAEWlRe6iFXLA/kCpNWM=;
 b=O5bZ1LkvjWfqbuH6qL852t+bAACFQQyS+psb5q8Zail86zqF3wm7PfhMoFgI6ddmyhZsVr+2akcKM8KAE16eRGeV5t8oRpb8NDR3omk0E8cKKKkHhidek20RYcAk15/RNKU/dbQ2EKB1z/76r5U2ejuX8O5LsNB38YVpiyd2w2o=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Julien Grall <julien@xen.org>
CC: Jan Beulich <jbeulich@suse.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>, George Dunlap <george.dunlap@citrix.com>,
	Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Anthony
 Perard <anthony.perard@citrix.com>
Subject: Re: preparations for 4.16.1
Thread-Topic: preparations for 4.16.1
Thread-Index: AQHYNF0EFrPPp9sw2ESIVxGhRdwIe6y4UusAgAAQQAA=
Date: Thu, 10 Mar 2022 10:02:29 +0000
Message-ID: <4DE5BBE4-F228-4584-81AD-D0A41858FDB9@arm.com>
References: <b9be95eb-7a6e-9f1b-6b68-6d08d6329cd1@suse.com>
 <4fe170af-9120-0203-bed9-895380a2ff0a@xen.org>
In-Reply-To: <4fe170af-9120-0203-bed9-895380a2ff0a@xen.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: fcfe4441-371a-43e6-8b43-08da027d1bc2
x-ms-traffictypediagnostic:
	VI1PR08MB4478:EE_|AM5EUR03FT047:EE_|DB9PR08MB6361:EE_
X-Microsoft-Antispam-PRVS:
	<DB9PR08MB6361E618BF15AC988C1037229D0B9@DB9PR08MB6361.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR08MB3784.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(53546011)(76116006)(6486002)(4326008)(2906002)(8676002)(66556008)(508600001)(122000001)(7116003)(38100700002)(6512007)(38070700005)(8936002)(6506007)(86362001)(54906003)(316002)(6916009)(2616005)(33656002)(71200400001)(83380400001)(36756003)(186003)(26005)(64756008)(66946007)(66476007)(91956017)(5660300002)(66446008)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <E8CCCD3D81803446A780154CECCB7B84@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB4478
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT047.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	baa08f42-d134-4d9b-bbbe-08da027d1628
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(70206006)(2616005)(186003)(26005)(336012)(7116003)(63370400001)(36860700001)(316002)(6862004)(83380400001)(8676002)(4326008)(33656002)(47076005)(107886003)(63350400001)(53546011)(40460700003)(86362001)(6506007)(70586007)(82310400004)(8936002)(5660300002)(6512007)(36756003)(6486002)(81166007)(54906003)(2906002)(508600001)(356005)(45980500001);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2022 10:02:38.5679
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: fcfe4441-371a-43e6-8b43-08da027d1bc2
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT047.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR08MB6361

Hi,


> On 10 Mar 2022, at 09:04, Julien Grall <julien@xen.org> wrote:
>=20
> On 10/03/2022 08:57, Jan Beulich wrote:
>> All,
>=20
> Hi,
>=20
>> the release is due in a few weeks time.
>> Please point out backports you find missing from the respective staging
>> branch, but which you consider relevant. One I have queued already, but
>> which I'd like to put in only once the pending fix to it ("x86: avoid
>> SORT_BY_INIT_PRIORITY with old GNU ld") has also landed in staging, is
>> 4b7fd8153ddf x86: fold sections in final binaries
>=20
> For arm, I would like to propose backporting:
>=20
> 32365f3476: xen/arm64: Zero the top 32 bits of gp registers on entry...
>=20

Agree (not changing the fact that Stefano should confirm)

I would like the following one to also be considered:
f3999bc: arm/efi: Handle Xen bootargs from both xen.cfg and DT
f1f38e2: xen/arm: increase memory banks number define value

And maybe this doc fix:
620ed2c: docs/efi: Fix wrong compatible in dts example

Stefano and Julien could tell what you think ?

Cheers
Bertrand

> Stefano, what do you think?
>=20
> Cheers,
>=20
> --=20
> Julien Grall
>=20



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 10:04:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 10:04:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288251.488831 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSFfF-0000P2-Ce; Thu, 10 Mar 2022 10:04:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288251.488831; Thu, 10 Mar 2022 10:04:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSFfF-0000Ov-9L; Thu, 10 Mar 2022 10:04:57 +0000
Received: by outflank-mailman (input) for mailman id 288251;
 Thu, 10 Mar 2022 10:04:56 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=WGlF=TV=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nSFfE-0000Og-2P
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 10:04:56 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05on20603.outbound.protection.outlook.com
 [2a01:111:f400:7d00::603])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 886d63bf-a059-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 11:04:54 +0100 (CET)
Received: from AS8PR04CA0001.eurprd04.prod.outlook.com (2603:10a6:20b:310::6)
 by PA4PR08MB6317.eurprd08.prod.outlook.com (2603:10a6:102:ec::11)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 10 Mar
 2022 10:04:53 +0000
Received: from VE1EUR03FT057.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:310:cafe::cc) by AS8PR04CA0001.outlook.office365.com
 (2603:10a6:20b:310::6) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.20 via Frontend
 Transport; Thu, 10 Mar 2022 10:04:52 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT057.mail.protection.outlook.com (10.152.19.123) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Thu, 10 Mar 2022 10:04:52 +0000
Received: ("Tessian outbound 1f399c739551:v113");
 Thu, 10 Mar 2022 10:04:51 +0000
Received: from 9fe71f417a22.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 E8CAD38B-296B-45B2-900A-C944A3B95753.1; 
 Thu, 10 Mar 2022 10:04:45 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 9fe71f417a22.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 10 Mar 2022 10:04:45 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com (2603:10a6:20b:85::25)
 by VI1PR0801MB1919.eurprd08.prod.outlook.com (2603:10a6:800:89::17)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Thu, 10 Mar
 2022 10:04:43 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62]) by AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62%3]) with mapi id 15.20.5061.022; Thu, 10 Mar 2022
 10:04:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 886d63bf-a059-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=h6DzGyR11dOFSZlHzPim5lUvFzM6gBvimFyirj35pXQ=;
 b=WLDR+FLVuf0h2wbekbMAIsbeD0I/AGItqjPLyhOUAdqxduhSsYqBAnHHP8ct3DcmMDyWi614eI9CnXwI5M67ivOR10RX7KWcwetp4tRwEJIZrKyD3hWFr0BoTUqxGJcNdGM/Boif8jUjhigU9om1XxqOMGADoH6AEa7uIRHOvoY=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 97bfdac981c90aab
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=fbCAfSyO6HSXoIiHGWWHQRzS/JuW9mJlb5gmIlEXJ1zko5Y4ufWJ1w3TMkxrgaiSBoOfmCiGanZG+i0zkXGEWD5Py/WtcKB8dSRwlQHimrWRWddyVHf9wstX6G8a+DMtS23/lA/LV72e/8oKOsCeMfexxME5mCtO5jhF8mkmrjR6Gm8AM3zB7cBI9NuaaQriAVuFyKszINSBSwAyKPRV8oHBe6rAJ43MchSmaeu0Z552zH3drVnW493cxigXXZAHgm7FKQRzgeg5FSfvm8fKV170zGPjgOnGfp3ORChzuLSpbI/Hn4vNWE6ppLEAgDufWQk0kNhZrJu5tdimARz5Ug==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=h6DzGyR11dOFSZlHzPim5lUvFzM6gBvimFyirj35pXQ=;
 b=YwnFTQDyQ+BTaVbVCxE5y10hoBRgG2PPuwpZhD0r4SCQVDNQZbkQ7mr7TY2iyuh6+GLTIACrhu0kKRv75elMXnk3ckeBZiHzhPBTLGSFF86XmpN8YPQrGfQODdAgT6voXeeqkEKaLbM+Db9ALwNszlXAKweitCYzMianrQqopQIai+AYS+98AMq0kTzOnzmdOZyiZQy5CGm6VnRaDI1aZ1WLtCR9Tcg6eluD3m0Is0oEnB7alf1MPTzfJ+dOsNfpqPBBQEA21mFtfFKW7+24rZtA6fsfT0G4bBRxRC3/ltBJEwHEiWzFzIlpCr8wH7zwMdBF47AhfBKB+gQd8eWDFg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=h6DzGyR11dOFSZlHzPim5lUvFzM6gBvimFyirj35pXQ=;
 b=WLDR+FLVuf0h2wbekbMAIsbeD0I/AGItqjPLyhOUAdqxduhSsYqBAnHHP8ct3DcmMDyWi614eI9CnXwI5M67ivOR10RX7KWcwetp4tRwEJIZrKyD3hWFr0BoTUqxGJcNdGM/Boif8jUjhigU9om1XxqOMGADoH6AEa7uIRHOvoY=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Julien Grall <julien@xen.org>
CC: Jan Beulich <jbeulich@suse.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>, George Dunlap <george.dunlap@citrix.com>,
	Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Anthony
 Perard <anthony.perard@citrix.com>
Subject: Re: preparations for 4.16.1
Thread-Topic: preparations for 4.16.1
Thread-Index: AQHYNF0EFrPPp9sw2ESIVxGhRdwIe6y4UusAgAAQQACAAAChgA==
Date: Thu, 10 Mar 2022 10:04:43 +0000
Message-ID: <8A26AAE3-3C61-49E1-B745-D7C5A7712E2D@arm.com>
References: <b9be95eb-7a6e-9f1b-6b68-6d08d6329cd1@suse.com>
 <4fe170af-9120-0203-bed9-895380a2ff0a@xen.org>
 <4DE5BBE4-F228-4584-81AD-D0A41858FDB9@arm.com>
In-Reply-To: <4DE5BBE4-F228-4584-81AD-D0A41858FDB9@arm.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 901d53b2-097a-44f9-6cc4-08da027d6b68
x-ms-traffictypediagnostic:
	VI1PR0801MB1919:EE_|VE1EUR03FT057:EE_|PA4PR08MB6317:EE_
X-Microsoft-Antispam-PRVS:
	<PA4PR08MB63177866FEA934E39AE64E739D0B9@PA4PR08MB6317.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR08MB3784.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(6486002)(186003)(122000001)(2616005)(36756003)(53546011)(4326008)(8936002)(6512007)(6916009)(8676002)(86362001)(66476007)(38100700002)(66556008)(66946007)(26005)(66446008)(316002)(64756008)(7116003)(76116006)(33656002)(5660300002)(54906003)(83380400001)(508600001)(91956017)(71200400001)(38070700005)(2906002)(6506007)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <9A6F7FE55AA5BA4EADD1370371711876@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB1919
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT057.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	19d188d4-02b9-4fa3-7ad0-08da027d6668
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	ky6LMlLIqbMtH5NeDeW3LkaYGl5GqiaXPEoQEARWBOr0FWrqzn08GWZEQWCl8Zddc/pZokak/tFR/Uop4bGNdpWxSiWmY37BKwkZ2PkStb6W8Hc2iYhGM5ncL1zkABP2ZScztfNUmkFPvSSAkfPuY1xdeOzp+eEBxpTVvTs3SH0ADr4m44NnoBWeEz0dAkm9kiURl37pxKLO8iwDu/JKh9kCAzEcO1lEc8JQFk2aN0wBnhE4/Tvtqn8HvQQepKoPTTvVbISQTDxH//9Xo2nHs1+I8jZbG5QIH2PWTgXql6YCZ45KKjIQzLJ1uLBW9b++mAdAnf96Ers9uBaNlqj65hJ9wOCFmAHR7L2O9UIAEfrxHYbBOtCi4TLUlc0hpgM53PYRq35S6eQX1gO4bjpOk60BY6mm3nCQ9CjXs3BD0WxmLEq1UYKMulzV+qfhv7p0HgNNiaUELgbi28jMNt5sHUxYdYwA67VFKEPrJRc/H/Iap66UFSOumkc4GR3/9g7aml2cyJ2jabc+c7YurIx4UYljNQLYKcB44h3Ux5cbFeN6fryYn8q1Db6pCQG5WoGzpCEU3XT3FNzW6Fxe4MAXarVdqabK/bh2Ch7OP8iWjRInTd3hRXfpwNyzk5Aa6p3xopLfyiZXP3Q6/mGHKNmHdHSJPswBBeW9KMD37MYPFH2uPoiYB4kT1336wOEr3ip2
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(54906003)(33656002)(70586007)(8936002)(47076005)(36756003)(316002)(6486002)(356005)(81166007)(36860700001)(86362001)(2616005)(6862004)(6512007)(70206006)(4326008)(8676002)(186003)(5660300002)(26005)(82310400004)(53546011)(336012)(83380400001)(107886003)(2906002)(508600001)(40460700003)(7116003)(6506007);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2022 10:04:52.1426
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 901d53b2-097a-44f9-6cc4-08da027d6b68
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT057.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR08MB6317



> On 10 Mar 2022, at 10:02, Bertrand Marquis <Bertrand.Marquis@arm.com> wro=
te:
>=20
> Hi,
>=20
>=20
>> On 10 Mar 2022, at 09:04, Julien Grall <julien@xen.org> wrote:
>>=20
>> On 10/03/2022 08:57, Jan Beulich wrote:
>>> All,
>>=20
>> Hi,
>>=20
>>> the release is due in a few weeks time.
>>> Please point out backports you find missing from the respective staging
>>> branch, but which you consider relevant. One I have queued already, but
>>> which I'd like to put in only once the pending fix to it ("x86: avoid
>>> SORT_BY_INIT_PRIORITY with old GNU ld") has also landed in staging, is
>>> 4b7fd8153ddf x86: fold sections in final binaries
>>=20
>> For arm, I would like to propose backporting:
>>=20
>> 32365f3476: xen/arm64: Zero the top 32 bits of gp registers on entry...
>>=20
>=20
> Agree (not changing the fact that Stefano should confirm)
>=20
> I would like the following one to also be considered:
> f3999bc: arm/efi: Handle Xen bootargs from both xen.cfg and DT
> f1f38e2: xen/arm: increase memory banks number define value
>=20
> And maybe this doc fix:
> 620ed2c: docs/efi: Fix wrong compatible in dts example

Sorry please ignore this one, already in :-)

>=20
> Stefano and Julien could tell what you think ?
>=20
> Cheers
> Bertrand
>=20
>> Stefano, what do you think?
>>=20
>> Cheers,
>>=20
>> --=20
>> Julien Grall



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 10:20:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 10:20:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288256.488842 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSFu6-0002ls-PO; Thu, 10 Mar 2022 10:20:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288256.488842; Thu, 10 Mar 2022 10:20:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSFu6-0002ll-L1; Thu, 10 Mar 2022 10:20:18 +0000
Received: by outflank-mailman (input) for mailman id 288256;
 Thu, 10 Mar 2022 10:20:17 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=XE96=TV=citrix.com=prvs=0613c794d=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nSFu5-0002lf-KW
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 10:20:17 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ac1c5b0c-a05b-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 11:20:14 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ac1c5b0c-a05b-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646907615;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=7zZdVll9lkUHleW6xxNA8iLDrQ4gvL7LbdKWsn9AntI=;
  b=Z0Zz4HHVtYt9wRfbg0NbaRMK+PmtZxawDaSv/yiZ+mEcy6BqWYq3/HYs
   IE6QB65XtD3oosNiw8oLfcgw9QqI0yVc1n6grH5WJ6mvaES/6BU75tVJ7
   nO6Zr37teyrFzEndWYYbWziss4b0YY+5Er6PG+wGr4ErxoAnEXT5tgeBX
   c=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66300126
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:GpflcazG3pLrz8dWSZR6t+fyxirEfRIJ4+MujC+fZmUNrF6WrkVVy
 GocUWmOafaIYTTxeNxxPITg9UxV656HztBgT1FsriAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2IDhWmthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 Nplmq2qcRwNBILws+U/fyR7FXxaYINmweqSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DFYUToHx/ixreCu4rW8vrSKTW/95Imjw3g6iiGN6AO
 ZFBMWM1MnwsZTVmGkc1OZMup9yRh1b7TDxj+HSUgpQOtj27IAtZj+G2bYu9lsaxbdpRtlaVo
 CTB5WuRKhMHMN2SzxKV/3TqgfXA9QvgQ54bHrC88v9sgXWQy3YVBRlQUkG0ydG7gEOjX9NUK
 2QP5zEj66M18SSDXtT7GhG1vnOAlhodQMZLVf037hmXzajZ6BrfAXILJgOtc/R/6pVwH2Zzk
 AbUwZW5XlSDrYF5V1qyx62stheIFhQ+LE0uWAwCEC9Yzfna9dRbYg30cv5vF6u8j9vQED72w
 iyXoCVWu4j/nfLnxI3gowmZ3mvESozhC1dsu16JBj7NAhZROdb9D7FE/2Q3+hqpwGyxalCa9
 EYJlMGFhAzlJcHczXfdKAnh8VzA2hpkDNE+qQM3d3XC3270k5JGQWy2yGsgTKuOGpxYEQIFm
 GeJ5WtsCGZ7ZRNGl5NfbYOrENgNxqP9D9njXf28RoMQPsYhKVbcp3kwNRD4M4XRfK4Ey/FX1
 XCzK5rEMJrnIf4/kGreqxk1jdfHORzSNUuMHMumnnxLIJKVZWKPSKdtDbd9RrtR0U9wmy2Mq
 4w3H5LTk313CbSiCgGKod97BQ1bdhATWMGpw/G7g8bee2KK7kl6UKSPqV7gEqQ495loehDgp
 SjsBBUHlAKh2RUq62yiMxheVV8mZr4mxVoTNi0wJ1e4nX8lZIek9qAEcJUrO7Ig8YReITRcF
 pHpp+3o7ixzdwn6
IronPort-HdrOrdr: A9a23:DGWCeKEkvoRCwXuypLqFRpHXdLJyesId70hD6qkvc3Nom52j+/
 xGws536fatskdtZJkh8erwXZVp2RvnhNFICPoqTMuftW7dySWVxeBZnMffKljbdREWmdQtrJ
 uIH5IOa+EYSGIK9/oSgzPIUurIouP3iJxA7N22pxwGLGFXguNbnnxE426gYxZLrWJ9dP4E/e
 +nl6x6Tk2bCBMqh6qAdxs4dtmGg+eOuIPtYBYACRJiwhKJlymU5LnzFAXd9gsCUhtUqI1SsV
 Ttokjc3OGOovu7whjT2yv49JJNgubszdNFGYilltUVEDPxkQylDb4RGIFq/QpF4t1H2mxa1O
 UkkC1QePibLEmhOF1dlCGdnjUIFgxeskMKh2Xo2UcL6vaJOw7SQ/Ax+76xNCGpsXbI9esMoJ
 6ilQiixutqJAKFkyLn69fSURZ20kKyvHo5iOYWy2dSSI0EddZq3MciFW5uYd499RjBmcga+S
 hVfbXhzecTdUnfY2HSv2FpztDpVnMvHg2eSkxHvsCOyTBZkH1w0kNdnaUk7zo93YN4T4MB6/
 XPM6xumr0LRsgKbbhlDONERcesEGTCTR/FLWrXK1X6E6MMPW7LtvfMkf8IzfDvfIZNwIo5mZ
 zHXl8dvWkue1j2AcnLx5FP+gClehTKYd0s8LAo23FUgMyPeFOwC1zxdLkHqbrUn8ki
X-IronPort-AV: E=Sophos;i="5.90,170,1643691600"; 
   d="scan'208";a="66300126"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Kg2LFaV7vnUqL4uTPb/heTD3Of8Gpxt1wnhNZpws2JgVBM/Q3MCFlDLv+8/WvEcjYqUWAexllU1K7N0Mp0cvLxypPPsPKzU/7mecU7RKoIYMdOs7EDDmPNpKVzef1niO+xiq3u9ud4yWoxKnD+HbqFnPTtB/naYzymWdW0WuQpgohWDiKEFedo80yNKkjM7tO+/VsgdDgEGFN7ede2zWmvAPu/u7tO1g/hqx6rRyebVyyzQ14zSegV9bffYdFxKJKLDeNswnR+g3D/9EW9hv4au81mOEuZGTlxtDd01LameStpnMsrpAyMwiTgHvsQNvNyjLZq96xTc4z2rl3P+cbQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=7zZdVll9lkUHleW6xxNA8iLDrQ4gvL7LbdKWsn9AntI=;
 b=d20SwKSnOLpV7gPbRV8S3O/N60XjbnK6IXTVXNj5dmm2cauCpeJnTZEjbC8CQE5fplTDrabqUMYRF2kLlcvbAffuFEvqrMYYUUzPYAiPb7LQLwGCLEIjb9OiQclCiFxHLwLIIsC8jPtIZC48fmvyJzZVN09JUS9jXq58DrYoQPiFZ21JO3JPxLLcDxIiKxhIgH4uecwXeEncekEIfv6ARKikkDFYW3SdEnnqsk47lLrcMk7kOZPefBijMDNIQkShiUwlDLPz4S70gdm6CXxvVfwJYMBmhPCXuiF6+9T9ievWgGGPbiDMnyLCRimM6pp3EejbkRS9snpUWJXfZ9Cr1w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=7zZdVll9lkUHleW6xxNA8iLDrQ4gvL7LbdKWsn9AntI=;
 b=U4g7FaIQr5llSGPeW8UbYuSn0BMnR1Vu0NgyfqerXaAC2V6UBslzApFOW9hWeg9GdN6PZLcw7I51r9IaUGgZ6pt8osKPRLdvf8qMW7fXYUldWT+IuEUEcrOJr8onAUMvpftmovrGWvssb4p72Xsce4/JN3pYsng8g9gvI1dMGmU=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: George Dunlap <George.Dunlap@citrix.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Anthony Perard
	<anthony.perard@citrix.com>, Julien Grall <julien@xen.org>
Subject: Re: preparations for 4.16.1
Thread-Topic: preparations for 4.16.1
Thread-Index: AQHYNF0BmGlme94kI0WXS90UZwN5Yqy4Uf8AgAAWHAA=
Date: Thu, 10 Mar 2022 10:20:09 +0000
Message-ID: <41020867-eaa4-839c-3380-00bd91c5299b@citrix.com>
References: <b9be95eb-7a6e-9f1b-6b68-6d08d6329cd1@suse.com>
 <6f8ccbb3-d384-bedd-8fb2-18aab570b588@suse.com>
In-Reply-To: <6f8ccbb3-d384-bedd-8fb2-18aab570b588@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: f176787d-4703-4baf-3fba-08da027f8dfe
x-ms-traffictypediagnostic: DM6PR03MB4746:EE_
x-microsoft-antispam-prvs: <DM6PR03MB47465F594D4E291107A6E47BBA0B9@DM6PR03MB4746.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(4326008)(5660300002)(66476007)(8676002)(64756008)(66556008)(66946007)(7116003)(91956017)(76116006)(186003)(66446008)(2906002)(316002)(8936002)(36756003)(31686004)(110136005)(54906003)(38100700002)(122000001)(4744005)(86362001)(6486002)(508600001)(31696002)(38070700005)(71200400001)(82960400001)(6512007)(6506007)(53546011)(2616005)(26005)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?cHRQNFRQZGQ5NFl6V0hHalFZWSswSFYwN25sYi9aTkNMRkEyQmpyREw0ajc3?=
 =?utf-8?B?NWhkVGNpK2l0cGEzZ3dOM2UrVzUranVQTUI0enZCSHdtWElUS29KQVlic3FW?=
 =?utf-8?B?czNMNG5vSzljdkFJU2NjeVg5TkNVSU1yekVhOGQycVVxOTUyV1djOWtPc2VN?=
 =?utf-8?B?ZmIxZnVIYVE1YVE4ajNHODIxcDAvWVFYUzlQVTZMTGRoRHBHdnFwbzlya0hD?=
 =?utf-8?B?aGNQTWZpMkxYM3h5cUYzRmc3NHhnNGYrVHdnQXhRS1N5QW4waDVPTy96TEJE?=
 =?utf-8?B?SnhmTHJiWDIxL1BxQmJXa1lER3BNT2tqQWhrRHlBWDVNMWpjL2NTWFlGalhN?=
 =?utf-8?B?ZXV2Z2VlckJNOTRMaW82OGxOSHdOQ2MrdGR1ZkNkREE5eElKV0xIb1ZndmdP?=
 =?utf-8?B?THBqODhmZUpRUTBvZXpKRjBmYnd1RWNLMHp1V1VqZ2NlaXdqcVdPWDhYWkVp?=
 =?utf-8?B?eE5kNjB5Wk9sUS9keC9hWStEZThqOG94cmhTVUQwOW9CVVhSbTZ6RUFWOWhx?=
 =?utf-8?B?dXVyb2diV3lyQ0VZREhUa3plZFNRNmh5cE1OWGpQcDllcFF2MjFmYWJUNUQv?=
 =?utf-8?B?a2xpOWlGNVg0eVhPVmptbWFXRU52NXNUaVpERmd1cHNWaXJ0YVoxOFRXTXU1?=
 =?utf-8?B?OWR5S2RrekdITHorYjhiUWNtWThCU0NQcElwbTlaaTM1Ni9YamxrOXo4VldV?=
 =?utf-8?B?ZEptNlNTdnlXWTZFMUE2Y3hFZ2E2MVVNaW9GR0E3SXFiWmJmWXNhVVpjUDlH?=
 =?utf-8?B?Y3VxMGJOSGZtSkZ0RHJwVExsQ1RVUTMxZkh4ZkNkQXhqelFoa25mSzhweVVT?=
 =?utf-8?B?MXZ0RitBVGdFU1ZOZThpbVBGY1NXcjBHNWZnUFprMDVmNHdCTi9YY3I2cDND?=
 =?utf-8?B?V3V4Z3RJQXUvNHRhV0l2eUZCN2xwV0dTRFZ1TVg3M2xTMTNWRkJaaHRaclM4?=
 =?utf-8?B?SFVuQ1g5T1FRekxaS0NZbWs5ZXZLdWZFSjVtOWN1VFgvQ2ZNOGVqYkUzRnVT?=
 =?utf-8?B?eUxWMUdDa05PM1JsL2ZrQjNTTGxqZ3hNS25FTFlqaEhqSlBLNFVxa0padXc4?=
 =?utf-8?B?Z3ZpUkZZbU5xWUJDd0pjZDl2am1JMnNhaDZPcVYrN3F5VWdGOW9JSlUxbXJN?=
 =?utf-8?B?cko1WUVhVUp0eldrdUhTUG1GeTEyQy9UdkI2UU5hVzYyTyt4SDZRWG1jemlP?=
 =?utf-8?B?cVdibDd3b2paZ2FDVTEwK2s1b3BmUC9CQWk4SlFOSXpiYjN6NjA5RHluWWJq?=
 =?utf-8?B?cmQ2UllUL1pUZHZBRVhqSGhTaDhqQ0xDTGh5bW04WnluQ3RVUXhmRjZYbzdL?=
 =?utf-8?B?c0hKOXR4bzE4UldkTnRkcTVHOXEzbXJBRE9JWnoyTFFmNFdkZnVxbDJlSFhs?=
 =?utf-8?B?bEFlSTdIL1hGdWhkMXVrb1BYY2ZacEEvSVJSK0Fuc3hndHBrZnRsenhyYTV4?=
 =?utf-8?B?cTlXVDlkMTFvVzVYZjRMNFFlY2xNMUt1S3VNTDZJWHc0Y21JMGdtbXNPb01v?=
 =?utf-8?B?anRBTDRKLzdOTlg1aG5DREozaVd1RDdhV2pqeDFISGpmM0ZacjhOSitacmpp?=
 =?utf-8?B?Y0gzdXZ4YWRwZ2RxY3BQdVYwQlpoVkErRytPV1NyUGY2M09LNDBOQ0NQUjVW?=
 =?utf-8?B?MTlOeU92bXdNYVkwa1pKT1BCOGtnRThHblZvSTUyYU9jK3RmTUwrSysrODBw?=
 =?utf-8?B?YXpZSDJOOTI2TlVaa25oUWVJT1pCTTl0T0swaTZJWnZkYkd5YTZRT1Z3Z1Rj?=
 =?utf-8?B?RUJMVHpDNE5vZFZUM3BwWVBTL2lha1VESHBCUzZqTTVQWmhXc1J6ZlRPVEFX?=
 =?utf-8?B?WU0vSkdjL01id2hSeVdBVStwYjZ2UmVEaDlOaSs5cHJLWG1zeWVjTE50Rkx4?=
 =?utf-8?B?bFIvNHNmN0FxVzZqaGdWYTJUMFV5RXVDNncvK2pLc05QUjFPU29ReFJieC9j?=
 =?utf-8?B?Zk11SkY2WGUwQ3J1eUIzR0R6QWlLV2ZLSkFsQ2RqZndselU3TFVwL0xqKzM5?=
 =?utf-8?B?UDRGRU8zZmNYdGplcE5uYzVpdTN1NmIvU3JUeVdJa3VVbWc3WUtVR3pOZG5E?=
 =?utf-8?B?NkNBemFUU1hqdnhFSnA1Wkk1bDBzdzdTcE94S2NOMTNBZHNUVzVFVlVtc3Fz?=
 =?utf-8?B?cWtibU0xSE9xY1NkY1JMZnVFdkQrSDc2Y3BNMHBLWkhtRXp3dXFTZTU2M0U1?=
 =?utf-8?B?ajBQQVJlUXdJZHNpQWVlcHFmU1VpNEQ1cFc3bEp4MlN6MTUzTXQrVDlkLzBo?=
 =?utf-8?B?RFJ3OC8wd0IyTjQ4bVNCWkxxS2pBPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <248FE2F92B61324FBEFDA372D91C8954@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f176787d-4703-4baf-3fba-08da027f8dfe
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Mar 2022 10:20:09.1448
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: h1YZ/wntadFJSlwUK/hlEh7Ebz1xvDC8+OAiS5HQI3svbN71yXxXHvCyMmdWmGo0X19b0LsKMteDZ+cBJ3x2pNWzvBIDZilg+84lYBURex8=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR03MB4746
X-OriginatorOrg: citrix.com
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=


From xen-devel-bounces@lists.xenproject.org Thu Mar 10 10:32:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 10:32:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288260.488852 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSG6C-0004GR-UM; Thu, 10 Mar 2022 10:32:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288260.488852; Thu, 10 Mar 2022 10:32:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSG6C-0004GK-RC; Thu, 10 Mar 2022 10:32:48 +0000
Received: by outflank-mailman (input) for mailman id 288260;
 Thu, 10 Mar 2022 10:32:47 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSG6B-0004GA-Jl; Thu, 10 Mar 2022 10:32:47 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSG6B-0006oZ-HS; Thu, 10 Mar 2022 10:32:47 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSG6B-0002By-0R; Thu, 10 Mar 2022 10:32:47 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSG6A-00074a-WD; Thu, 10 Mar 2022 10:32:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=tXLzZO0d7kLoK9qbSZpsYFjJUGbxEM0D+JVbIv53VfI=; b=uA2drJZBJumBaGIJPAYLCTzHbz
	wSh7nIoBsJOEwBkbs+H7BbZ+ADj5FTb7nEVxP5j0g2rbpB9yfr4DuRnjX7mpuKNb+hXVu2q4KxJN9
	uKLERpq5FLWVbjX6IQK1b+eX/A8qEV+9ZeEsvs5/XBRWEsJE7mId6TSv19DbY0WcHOi0=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168496-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168496: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=56530dec1105f17455752675e4c90fb859c64836
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 10 Mar 2022 10:32:46 +0000

flight 168496 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168496/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 56530dec1105f17455752675e4c90fb859c64836
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z    9 days
Failing since        168258  2022-03-01 01:55:31 Z    9 days   83 attempts
Testing same since   168489  2022-03-08 19:42:15 Z    1 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 493 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 10 10:35:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 10:35:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288270.488864 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSG8u-0004xI-Ie; Thu, 10 Mar 2022 10:35:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288270.488864; Thu, 10 Mar 2022 10:35:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSG8u-0004xB-EM; Thu, 10 Mar 2022 10:35:36 +0000
Received: by outflank-mailman (input) for mailman id 288270;
 Thu, 10 Mar 2022 10:35:35 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=7C/d=TV=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nSG8t-0004x5-Md
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 10:35:35 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id d0760a20-a05d-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 11:35:33 +0100 (CET)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur02lp2059.outbound.protection.outlook.com [104.47.4.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-25-oH1Bu1arM9-b9920fu-VHg-1; Thu, 10 Mar 2022 11:35:32 +0100
Received: from AM0PR04MB5587.eurprd04.prod.outlook.com (2603:10a6:208:125::12)
 by VE1PR04MB6734.eurprd04.prod.outlook.com (2603:10a6:803:121::33)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.21; Thu, 10 Mar
 2022 10:35:30 +0000
Received: from AM0PR04MB5587.eurprd04.prod.outlook.com
 ([fe80::dd50:54e6:1f96:3b33]) by AM0PR04MB5587.eurprd04.prod.outlook.com
 ([fe80::dd50:54e6:1f96:3b33%3]) with mapi id 15.20.5061.022; Thu, 10 Mar 2022
 10:35:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d0760a20-a05d-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646908533;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=OzV0hcvi28ysZA0Wsm1hJezLS60mrXHpfPR0s8jgrGY=;
	b=PrAxa/l4K0w9E/yq3b9FlFgjYqZISINowBuv/ezHVSIMRnczC4eQ+2s5qob1J+XIVgHX7Y
	A6vUJ5DRfKJhwYfgP1cJo6v0ahkKAnvyUM2f6VFzYBaZ5CP1F40E2iB7X9WSU5m/GnDqt7
	s0abISEOqd9maNi2jCBuhq6OY+5DYrY=
X-MC-Unique: oH1Bu1arM9-b9920fu-VHg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=eH2CO1Y/lXU0fp0SlzP1GKxp4j1y/F/CYfyoyA6DLfH9E+scGdhbiP2tn3artp8NN+Pe0TkfnQ1wbbrDgHcq5+EVTPaMX62hu2J4us9axMWxLM7N2IvSddMwindfItRcaOMLj8YtYaI1xWGMuvItfVdC4H+WbuYOfI2iySRTIlYooQLx0vIODdVgAi7tjTE8xM+K4p77ji1/JQPzNOJ/kpHjV1erNBivlsXJgAtKKfoZJ7QjXmWF8SD+k29ENtN3bnWlnKNSkw9OWfCzewmDwdKeq5jx0KOowwzTcUF3pfkb84rCPJ9lh3GCLEkd88Gefz9vHWmRIMhbMMCGWO4Vsg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=20CME50G/wqua2ecLLQuG4muwszWL3eObGtwOOp5zgo=;
 b=RYdduU+/dYgfUKLycxp1+TGlokEmfHh0LpcAaACU0H95+IjNfvlYLE/RaZ9eOz50EwVwxqWj3SHB7TLFX1dqjVk6TJBkOx4EBxbM/KucINYNSOfm/V046A9TMXFOPPz0IkhBIKFx5LVpPfkUkY8akROz5Uxd6jwEIURlAcs0fm85Dvrhn28IhAAivF+nc8latPAi5lS3xX+2hhGMagyygFEug2tlvjXvEFyl+9ju57WB5jbK53yqV+nxkw/QMcD8vUNKEgp90R2wtABwttTAn0Ojm2QYa/SMYtGYturLF9WE7z1eUxuSDWCatQHKn//UcEF1KGKKCtfoPHSdP17zmQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <cab2a003-5112-42d0-3d2c-3758c895e52a@suse.com>
Date: Thu, 10 Mar 2022 11:35:28 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: preparations for 4.16.1
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: George Dunlap <George.Dunlap@citrix.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Anthony Perard <anthony.perard@citrix.com>, Julien Grall <julien@xen.org>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <b9be95eb-7a6e-9f1b-6b68-6d08d6329cd1@suse.com>
 <6f8ccbb3-d384-bedd-8fb2-18aab570b588@suse.com>
 <41020867-eaa4-839c-3380-00bd91c5299b@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <41020867-eaa4-839c-3380-00bd91c5299b@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: FR0P281CA0007.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:15::12) To AM0PR04MB5587.eurprd04.prod.outlook.com
 (2603:10a6:208:125::12)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 3380c3ea-3734-443b-8531-08da0281b2b4
X-MS-TrafficTypeDiagnostic: VE1PR04MB6734:EE_
X-Microsoft-Antispam-PRVS:
	<VE1PR04MB6734794530627628CB46ED5DB30B9@VE1PR04MB6734.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR04MB5587.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(36756003)(6512007)(5660300002)(6506007)(53546011)(2616005)(26005)(186003)(2906002)(86362001)(38100700002)(7116003)(31696002)(8936002)(316002)(508600001)(31686004)(6486002)(6916009)(54906003)(4326008)(66476007)(8676002)(66556008)(66946007)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?lbF85d3205fkLA0uCpzHlZ3bKQ41AJ1sYlrSSM79zrN9jfnssndNfhl8bklI?=
 =?us-ascii?Q?Wv1D9Zb1qIrBYcEC0QrDvTZh/yIV2WyBRctwBFi8P7zwBKFPB+1WNeUakhKS?=
 =?us-ascii?Q?KH0mLkpSslCzVVzuTRoakpkHFW+lldBsKcsGJvc5DWEN5V+3BwjKHfjvHOQH?=
 =?us-ascii?Q?qw8sQE4OfMAjOVtr7NB4Qfu40R0j/ix5eCVBTpINLn8NJySvwM30YGqTHGsE?=
 =?us-ascii?Q?FgqlEDS3Wd9TYjmrHi4BazPmbRvDplKmNX6w7ZaXfvNYNZvZMJES30zmax+Z?=
 =?us-ascii?Q?htc3NqMcYtdWSoHEZfTzQF4qRV901WgvcsQ4+dW/w4bnzHnwteUGKEbq0LnT?=
 =?us-ascii?Q?o47SzQG1REUFRWFeMyzw2Jbbn+8wJulqai2VsUy/lRb6yjX4fuoI90iHuwDb?=
 =?us-ascii?Q?GTV/BUCftmm1X+oUTdWEsfODhlQFg0g8f0DCk+0K7qqoBjY8n5Q1tSbzVF9C?=
 =?us-ascii?Q?Duzf3seF3Y3EWBSTrhE0mLWO0UpzvxXteDgKdJtM+3oqfGd8F0e1cFKnZju4?=
 =?us-ascii?Q?64jjS+5jGOCwp6FodHJTBrMcx4xJvhhlMPCLByECYiGha1kus+W3ZOq6O45U?=
 =?us-ascii?Q?AUelY4SQ4sM8YXjsAUl9u+SWDdG3gcaeQdUd9f8Xl8XVZZK1QGWrtvODHmd0?=
 =?us-ascii?Q?4y0Vt49xZCeTjTcxqy5p9hIRUb+mj98J09DQTOT+qbEDeEIxiOIbaGLPlDZ/?=
 =?us-ascii?Q?z8iFBmnxthg4pKHLqJ27vkIxZZ/yuwxNz5rSw3MQcjggDa8Zo9Jw/kpD+PN9?=
 =?us-ascii?Q?JCc5ufWU7NtPoKnwxb6UPxK6aLYwV/rzS6KbEe2OophxKDFpxon8tRDbolx8?=
 =?us-ascii?Q?u3dssnNEML/jlgKyGfwJ6jVKsBIgfv1u0X6jmMh6hVHTsu+QO5PsihchktmJ?=
 =?us-ascii?Q?Tc1aykzDFvWnRCKXqyKDhReF9blDeuN1AlbE1MoIkt2M1CplbxePRKs62GOs?=
 =?us-ascii?Q?mavqOrJdGLFQAhFF+8WyEDp5fGpEHa6Wtir1ARNxiwj2rg98q25FmG3OihW2?=
 =?us-ascii?Q?ZCvQVoSWZVk5x4hIpFOiyEWpxlHV8ZQdkhACMPJONwhpY/wlWr9c/na/sFtF?=
 =?us-ascii?Q?jWqBoU7yKDHuYDdRH31N5Wko8pPUDfkDbVceBNM9LYLt4zC67gALE6xlSmLn?=
 =?us-ascii?Q?5ImFByhBorQK29BzMS7SBWmCd5LaYW9HDPB87XH0gCnfrMMHdqY1xF/A/Evk?=
 =?us-ascii?Q?HmHTimOqli20Sv9r3MVSqx7DS26QBxwf09TNEuJspC0D/jDtxLqDZxSufqre?=
 =?us-ascii?Q?QQF2bNx3ukpHjiSEZiXCZd28GUwSVa9W2Vuk8SBnSVlbu/hQV1PeBZAwDEDc?=
 =?us-ascii?Q?LDxRgiIEJWZEo11jq20QIj26ZUurmlTZ7r1BhTyRmjFTj/xrVFj2bIkD0DMZ?=
 =?us-ascii?Q?vpqloimGuh82+N0I3CPPgP+Fa62GVYjdKmsybLJJ2miSS/4ExJ7lKF/nNkLG?=
 =?us-ascii?Q?OtjvWrIHB3zJ1Nq2PX/OL+Q+okvHyw+q?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3380c3ea-3734-443b-8531-08da0281b2b4
X-MS-Exchange-CrossTenant-AuthSource: AM0PR04MB5587.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2022 10:35:30.2151
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: PNX9XntCdkk4bVRprF2mcaRu0DcndkayDciI6BZs8i/Wg1aVrSGEljN1ugfWEdY6BUhlMYinMowz+1J/eCFIsw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR04MB6734

On 10.03.2022 11:20, Andrew Cooper wrote:
> On 10/03/2022 09:01, Jan Beulich wrote:
>> On 10.03.2022 09:57, Jan Beulich wrote:
>>> Please point out backports you find missing from the respective staging
>>> branch, but which you consider relevant. One I have queued already, but
>>> which I'd like to put in only once the pending fix to it ("x86: avoid
>>> SORT_BY_INIT_PRIORITY with old GNU ld") has also landed in staging, is
>>>
>>> 4b7fd8153ddf x86: fold sections in final binaries
>> Actually the other one I'm aware of is
>>
>> 7d9589239ec0 x86/CET: Fix S3 resume with shadow stacks active
>>
>> which Andrew promised to provide a suitable backport for.
>=20
> So now XSA-398 is public, I can say what that slightly cryptically meant.
>=20
> The CET S3 fix depends on one of the code rearrangements introduced in
> the CET-IBT work.=C2=A0 We were intending to have CET-IBT backported for =
the
> tuesday embargo (didn't go to plan), after which the S3 fix would be a
> trivial backport to 4.14 and later.

I was indeed wondering. Even if this didn't work out in time, aiui the
plan still is to have that backported (without going the manual annotation
route). Do you expect this to be feasible in time (and not at the last
minute) for 4.16.1?

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 10:48:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 10:48:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288281.488899 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSGKt-0006ke-Tj; Thu, 10 Mar 2022 10:47:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288281.488899; Thu, 10 Mar 2022 10:47:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSGKt-0006kX-QZ; Thu, 10 Mar 2022 10:47:59 +0000
Received: by outflank-mailman (input) for mailman id 288281;
 Thu, 10 Mar 2022 10:47:58 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSGKs-0006kN-Fa; Thu, 10 Mar 2022 10:47:58 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSGKs-000762-Cv; Thu, 10 Mar 2022 10:47:58 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSGKs-0002wX-1k; Thu, 10 Mar 2022 10:47:58 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSGKs-0006Vg-1I; Thu, 10 Mar 2022 10:47:58 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=9JvobF2OPXbCHTWa+Ni8ZzGC2X/suyC97xBeq8qgFQM=; b=L2b8brTCz2SBo0Ta8/Sgv0YKK1
	8qw6Q0Z8SmPGn5uMHIwHdeWOD8zKwtgAwB4LLvIUHSco2n2B9yu3HT/DZgmsGoOo+q/hwqBCmP7cI
	yWskp/n5YsKlEUFK3FEzmlWPPXVq1qk1RmI4SgfUT5K15Yt+eRuWMPpB/hRVdOZF8LDs=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168491-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168491: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=8d03080d2a339840d3a59e0932a94f804e45110d
X-Osstest-Versions-That:
    xen=9d4a44380d273de22d5753883cbf5581795ff24d
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 10 Mar 2022 10:47:58 +0000

flight 168491 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168491/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168470
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168476
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168476
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168476
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168476
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168476
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168476
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168476
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168476
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168476
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168476
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168476
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  8d03080d2a339840d3a59e0932a94f804e45110d
baseline version:
 xen                  9d4a44380d273de22d5753883cbf5581795ff24d

Last test of basis   168476  2022-03-08 09:45:55 Z    2 days
Testing same since   168491  2022-03-09 01:08:18 Z    1 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bertrand Marquis <bertrand.marquis@arm.com>
  Julien Grall <julien@xen.org>
  Rahul Singh <rahul.singh@arm.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   9d4a44380d..8d03080d2a  8d03080d2a339840d3a59e0932a94f804e45110d -> master


From xen-devel-bounces@lists.xenproject.org Thu Mar 10 11:06:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 11:06:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288291.488910 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSGcs-0000l2-HV; Thu, 10 Mar 2022 11:06:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288291.488910; Thu, 10 Mar 2022 11:06:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSGcs-0000kv-DG; Thu, 10 Mar 2022 11:06:34 +0000
Received: by outflank-mailman (input) for mailman id 288291;
 Thu, 10 Mar 2022 11:06:32 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nSGcq-0000kp-Jf
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 11:06:32 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSGco-0007Qp-NZ; Thu, 10 Mar 2022 11:06:30 +0000
Received: from 54-240-197-230.amazon.com ([54.240.197.230] helo=[10.7.239.19])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSGco-0006K8-H1; Thu, 10 Mar 2022 11:06:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=V0aEpWnF4IApBhYe/KTRmsvoxHs6cR73b700XIxpcVY=; b=PeBmRkqFDbOsenoU9466KzQrvj
	ez6mbxpTfWecxCbwxgOSRppIUJGJtVRDLDk8hyPvwFh5sPojbuF476Usm0vyIRsfxc3kA/IIj0hqA
	WivTA1askua+IZOYAHANOEmVdYWlrc0HRbappHKhM42MjCFOnI/t2A9JPP/UqT1Ts++w=;
Message-ID: <3c7b7e00-1134-2ce3-26e7-b3d11782daaa@xen.org>
Date: Thu, 10 Mar 2022 11:06:28 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Subject: Re: preparations for 4.16.1
To: Bertrand Marquis <Bertrand.Marquis@arm.com>
Cc: Jan Beulich <jbeulich@suse.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 George Dunlap <george.dunlap@citrix.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Anthony Perard <anthony.perard@citrix.com>
References: <b9be95eb-7a6e-9f1b-6b68-6d08d6329cd1@suse.com>
 <4fe170af-9120-0203-bed9-895380a2ff0a@xen.org>
 <4DE5BBE4-F228-4584-81AD-D0A41858FDB9@arm.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <4DE5BBE4-F228-4584-81AD-D0A41858FDB9@arm.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit



On 10/03/2022 10:02, Bertrand Marquis wrote:
> Hi,

Hi Bertrand,

>> On 10 Mar 2022, at 09:04, Julien Grall <julien@xen.org> wrote:
>> On 10/03/2022 08:57, Jan Beulich wrote:
>>> the release is due in a few weeks time.
>>> Please point out backports you find missing from the respective staging
>>> branch, but which you consider relevant. One I have queued already, but
>>> which I'd like to put in only once the pending fix to it ("x86: avoid
>>> SORT_BY_INIT_PRIORITY with old GNU ld") has also landed in staging, is
>>> 4b7fd8153ddf x86: fold sections in final binaries
>>
>> For arm, I would like to propose backporting:
>>
>> 32365f3476: xen/arm64: Zero the top 32 bits of gp registers on entry...
>>
> 
> Agree (not changing the fact that Stefano should confirm)
> 
> I would like the following one to also be considered:
> f3999bc: arm/efi: Handle Xen bootargs from both xen.cfg and DT
> f1f38e2: xen/arm: increase memory banks number define value

I am fine with both.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Thu Mar 10 11:15:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 11:15:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288295.488920 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSGlE-0002D3-Bx; Thu, 10 Mar 2022 11:15:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288295.488920; Thu, 10 Mar 2022 11:15:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSGlE-0002Cw-8d; Thu, 10 Mar 2022 11:15:12 +0000
Received: by outflank-mailman (input) for mailman id 288295;
 Thu, 10 Mar 2022 11:15:10 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=XE96=TV=citrix.com=prvs=0613c794d=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nSGlC-0002Cq-Q3
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 11:15:10 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 57614daa-a063-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 12:15:08 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 57614daa-a063-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646910908;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=fsFn4/7HWRrmK2KntL6x1JsamB5cP/K2bXiZo2HDF8M=;
  b=DTO0NzmL06NdB9loAijUY7n9y8f8GfItUCEufbI9Fl5FsXQXGSMDGrBq
   jKMAufYO42dCaUIx+sqdA+sfz4S6Z749Hm9L9999uxIAARwk1tfI6MPav
   JCeh1RotR2u/gqysopZDzFk+/1Z/hOZWrl2WKP1e6mmMRSDTp3Y6vkxKH
   o=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 68258845
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:L0uDHahz0xLqjh1+rw2znzZ2X161pRAKZh0ujC45NGQN5FlHY01je
 htvUG+GOKvbYGP2eI9yPoqzo01UuJTdzoRrQAporCljFiob9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFrV4
 YqaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YSUxJe6SmPk5bytzH39uDJRGoOOfHWfq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bklhmwSvUErANRpfbTr+RzdRZwC0xloZFGvO2i
 88xN2o1MUSQP0An1lE/AbwnkMqZgnnGTxp+q220nJFnyUeN01kkuFTqGIWMIYHbLSlPpW6au
 2bH8mLREhwcctuFxlKt4n+qw+PCgy7/cIYTD6GjsO5nhkWJwW4eAwFQUkG0ydGmjmauVtQZL
 FYbkgIsp6Uv8E2gTvHmQga15nWDu3Y0QMFMGuc37AWMzKv84AuDAGUACDlbZ7QbWNQeHGJwk
 AXTxpWwWGIp4Ob9pW+hGqm8jyupenYVMEs+VwQIExs02tm7/NkPkUeaJjp8K5KdgtrwEDD25
 jmFqikimrke5fI2O7WHEUPv2Gz1+MWQJuIhzkCOBz/+sFslDGKwT9HwsTDmAeB8wJF1p7Vrl
 FwNgICg4e8HFvlhfwTdEbxWTNlFCxtoWQAwYGKD/bF8r1xBGFb5JOi8BQ2Swm8zbK7onhezP
 CfuVft5vsM7AZdTRfYfj3iNI8or17P8Mt/uS+rZaNFDCrAoKlPZrHw3PhXIgTCz+KTJrU3ZE
 c3LGSpLJSxGYZmLMRLsH7tNuVPV7nxWKZzvqWDTkE38jOv2iI+9QrYZKlqeBt3VH4vfyDg5B
 +13bpPQoz0GCbWWSnCOreY7cABbRVBmVMueg5EGKYa+zv9ORThJ5wn5muh6JeSIXs19y4/1w
 51KchQBmQSl2iGfd1nih7IKQOqHYKuTZEkTZEQEFV2px2IiccCo6qIefIEwZr4p6Kpoyvscc
 hXPU5jo7ihnItgfxwkgUA==
IronPort-HdrOrdr: A9a23:5tixvax1M+ykJZ7VpBbQKrPxjOskLtp133Aq2lEZdPULSKKlfp
 GV88jziyWZtN9IYgBdpTiBUJPwJU81bfZOkMcs1MSZLXbbUQyTXcBfBOrZsnLd8kjFl9K1up
 0QC5SWZOeAb2SSyPyKnTVQcOxQgOVvkprY/ts2pk0FJWoBBsEQjDuRSDzraHGeLDM2X6bRf6
 Dsgfav0gDQAEj/Gf7LYEXtMdKzwuHjpdbDW1orFhQn4A6BgXeD87jhCSWV2R8YTndm3aoi2X
 KtqX272oyT99WAjjPM3W7a6Jpb3PH7zMFYOcCKgs8Jbh3xlweTYph7UbHqhkF2nAjv0idurD
 D/mWZmAy1B0QKWQohzm2q15+DU6kdr15Yl8y7BvZKsm72jeNtwMbs+uWsQSGqp16NnhqAg7E
 sD5RPri3IcZymw7BjV9pzGUQpnmVGzpmdnmekPj2ZHWY9bc7NJq5cDlXklWqvoMRiKoLzPKt
 MeR/00JcwmBm+yfjTcpC1i0dasVnM8ElOPRVUDoNWc13xTkGpix0UVycQDljNYnahNB6Vs9q
 DBKOBlhbtORsgZYeZ0A/oAW9K+DijITQjXOGyfLFz7HOUMOm7LqZTw/LIpjdvaNaAg3d83gt
 DMQVlYvWk9dwbnDtCPxoRC9lTXTGC0TV3Wu4hjDlhCy8vBrZbQQFi+oQoV4rmdSt0kc7nmZ8
 o=
X-IronPort-AV: E=Sophos;i="5.90,170,1643691600"; 
   d="scan'208";a="68258845"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Vz8Zg5epG2gvh2ILriouUC79vEJ/GjcLXRbH6e2NOKhxRFgRC50KueEJTOnXiWJrzkw3D6W0FEGLK7MtMJ7YyOCws1va2apN1qfd3VaICajcp8CWFV7BigjiRlU5Z8EcHRMUiZS0RpvEKSKVqworHMRBdVLSQ4bdOFXnq03JtudVHZdnV6UkJUWw2fiP3Xrrfr69S2xa5T5UqxDTAflnDn/Ce5A7qMNsqJsmUyxopaNbwbYib2EO0g8bYavQGtpMo1mwxHa+/RP525eG2vzl856Zw55xxVF8seIs88zDihZ6+6CsE2U/OkhiQRFm1IhoRzOztdyzr/5uQ+AKp+qKeg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=fsFn4/7HWRrmK2KntL6x1JsamB5cP/K2bXiZo2HDF8M=;
 b=QjKwNy6IecsmzVq/di/eQm9NKgCoPgzdB5eLzzx2U3SIQnkXeyQHDzs2yev/uTJtZrS22+dXyx75pwc1GMGUTfxehVC4MiqZ6Y4jqsA6/gnCWTuzF136DKXZJUrZUpMWmb0axW0runMUPl7Ul058KfRhJubnilUkcR80G3i96bmEEvNvO50OIbKD2qzLZkB7jvt5PgkluOk2h/kGSxa6D3RtkBU8qdj9/WbWrmTzfjfqbYMISB/q4xg/TY3bmcL+OZB812EQJm1UGaHPQYTzVQCoZCrEOq3mARKnLlmuP6J+TDR/CEm0lGoJeZZW2+/1xUzk+/hTxRQw6ih8MDZO+Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=fsFn4/7HWRrmK2KntL6x1JsamB5cP/K2bXiZo2HDF8M=;
 b=BtrmZ8+lN3JePspdcstRHpG2QEu8PjXPREtNNivGWRvP6PO7pHQa/DENwvfj+b4srUiP5wDQquA6LkE+QNAmy7yPVXqVDXTgwORHvDwskA/qy06dRD4mwfpigqsFaWTMdQzkRqNXZbydRj3hSVGpIWo3m8lPKx8FXTsMblbLW7E=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: George Dunlap <George.Dunlap@citrix.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Anthony Perard
	<anthony.perard@citrix.com>, Julien Grall <julien@xen.org>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Subject: Re: preparations for 4.16.1
Thread-Topic: preparations for 4.16.1
Thread-Index: AQHYNF0BmGlme94kI0WXS90UZwN5Yqy4Uf8AgAAWHACAAARJAIAACu8A
Date: Thu, 10 Mar 2022 11:14:36 +0000
Message-ID: <08075ddf-fa90-dfaa-07df-0e256fee2c41@citrix.com>
References: <b9be95eb-7a6e-9f1b-6b68-6d08d6329cd1@suse.com>
 <6f8ccbb3-d384-bedd-8fb2-18aab570b588@suse.com>
 <41020867-eaa4-839c-3380-00bd91c5299b@citrix.com>
 <cab2a003-5112-42d0-3d2c-3758c895e52a@suse.com>
In-Reply-To: <cab2a003-5112-42d0-3d2c-3758c895e52a@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 6546057e-303b-4dd0-ce81-08da028729bd
x-ms-traffictypediagnostic: SN6PR03MB4240:EE_
x-microsoft-antispam-prvs: <SN6PR03MB4240B792F1CB4995FA33C724BA0B9@SN6PR03MB4240.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(36756003)(38070700005)(53546011)(5660300002)(71200400001)(6486002)(186003)(2906002)(2616005)(31696002)(26005)(31686004)(6512007)(6506007)(86362001)(4326008)(82960400001)(508600001)(66556008)(64756008)(66446008)(66476007)(66946007)(91956017)(8936002)(76116006)(38100700002)(54906003)(8676002)(122000001)(7116003)(6916009)(316002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?aUJsZ1dvMmZJcHdrNTNnZFo2b3VXSExyeXdnaWYzejRYdDdYWmtyWmJvaHhv?=
 =?utf-8?B?SmgxaVByUVlMK3FGM2YzTGNiSm9YQ1grbENqcDBRZk9mZE55WGdaSVNLMnBI?=
 =?utf-8?B?OS8vYkE4b3g0bXNINVNwUHFtZ3RVRUxtQUNaL2lYejlFSnA2Tk41K2JHSFJE?=
 =?utf-8?B?aEE2b3FXcWd1Uy9Ib0YyZVBidU5KVE9BTFRrTCtySG5wU2p6ck5jV3VobUJp?=
 =?utf-8?B?U1V6SFZvSEFyYmFJUFplSGdrQ2VmYVRGcU5RbzlqVm9MRllUME5VN1FMRFBJ?=
 =?utf-8?B?MExIazR3amJkeE4wa00yQlRGakl5YnN4VHRDNEFMZmxJSGM2ZnBSMFhpL01i?=
 =?utf-8?B?aE56YldVRHp0blJuSmp3YThiUzArdm05ZkRhYWcrQ0piT0FLQVh3a0tpZ1Bl?=
 =?utf-8?B?eDB5NXVJNU9BRFVHUjRZczRCemhhUTc1djRoWDdUWllPN0pCRWphM09jYm5j?=
 =?utf-8?B?UHRya2pIWERYaXV3bEFld1JGTEJmS0lWQVd3L3g4Sm9IdXg2UVE4N0hlcnNP?=
 =?utf-8?B?RzB2T1RvWk5GUm5XbU5XMnh5aGV2WUx3Q1NKNWx3Q05VT2RUdU1xU2JIM0NU?=
 =?utf-8?B?NEsrcW9PM1VFa1ZTU0xuTjZoL0hpVWpuWUxEYzlHc3FrWFJyZENrU1l2cHcx?=
 =?utf-8?B?OTZhWXpweHZnVHp5bFhDblNlK2NsZmJxTkExL1lLZ0xrUVh2WEE3dmR6Tllh?=
 =?utf-8?B?a3BORTFFMkJzQUd6ak10NUlGZ0xTNlpaWkkwb2dCRmdYcjl5REZpbnVQak1a?=
 =?utf-8?B?cHNHTnI5dmRqUks5L2l2cVJVM3JNbDFKYzY0aks3Q2l5RU4yMUF0NzBvWkpT?=
 =?utf-8?B?R3RWRFYyWlExWFlYcEw5WjR0ZUNsNTNzTmt4bEJLdFBYbUQ3NjArZ1BHVXRt?=
 =?utf-8?B?VW9NaWdpSHdaQnkydGRzNXlWcmU3Q3pQV29PT2FKYzZPaWs3UTVMazRpalor?=
 =?utf-8?B?TG1XampRczl1RVhrTG03blBvSXg1cnY2ZUpFTkkvS3EyMnJveUlOSkJWM3Qz?=
 =?utf-8?B?T1Y4YXZQUGdkTDhTUTc0Nk9sQ3NVb214NGRxaHdid3ZPaDBETTJvemtVMFhu?=
 =?utf-8?B?Q1dKRVFKSW54SU82dVlCcy8vdWEyLzhaOXFpY2xQdlhkczhlcGxlSjRoQU80?=
 =?utf-8?B?OTBIN1I5NWFGK29JbEtjVFErYjdXME5ETjhkUGxhZkdZU2p1RU1OeGF5Yjd3?=
 =?utf-8?B?N2Z6Z0xpVnpJNEhxYVFicURSdTZLei92TjdnYUpFY0ZrQjlEQmJwbW1vSlJT?=
 =?utf-8?B?dDhXS0ZFNTRwOXAxTkRjSlZuSVFvLzhFK3lqQkgzUFRzR2NhM2JhaktJQjls?=
 =?utf-8?B?dTA3YmppOVAyUkowdGltcWY3RmlyN25UWXFMRVllei9mWUh3UzZrNm5ZOTBQ?=
 =?utf-8?B?VWZ6ZmV3czFLUTRmTGQ0UUQzSGNqS2JuZWtHREt0MHhmcWRXKytnTkFhdko1?=
 =?utf-8?B?OEE4NzN6eGR1UlQxNXduQm5pSFRBbEZncjBSZnBQRVFROUU1alZQNU52THVK?=
 =?utf-8?B?RlliYlZPa0pJYklLbm02ZDlCV2NKTncybzdzcTdjcDQvTnpZbmR4ZnI1R2dW?=
 =?utf-8?B?RWYxWUtUTGxlWnBzbi9pWXIwL01LSDZoVWs5aUFBVFJNM1Z0TnJYZmdrRHRZ?=
 =?utf-8?B?aGx5VWFIN0hGelNoc2VJdmk4TWZKRlNCMTBaQ0dZVVc1RFNVOUZGaTNlRjhp?=
 =?utf-8?B?cnpnd3VRYjB5WDhqT0NhRnRqN0FjdmdwMnlVQjBIZHNWN09BU0pDYnhMZmpv?=
 =?utf-8?B?YkFmM3ZzSFlEc202QkhicFpJeXpKaXVJZDhTRXhrNjFaZlVaMlNlNzk1R2tN?=
 =?utf-8?B?cG5BdmhoZDA0QlRFN3BReGMwVW1lU0UvN2RGY2JMN0VsYXYyWXA1ZDFraFhT?=
 =?utf-8?B?bjh4Q2hRb3RFL0piVzRuQWZPcXpTZmJyaXZZZjNuYzdCODBYKzdCOHh4S01B?=
 =?utf-8?B?ZUxXOWZ3b2VkRkFFV1hNSy9Ca2JvbUZFbjU3UTRnaFlUZ2FOZ3kwb0NET3Jx?=
 =?utf-8?B?L0syOTYrN0l2dit4cHdacnAxdlVzM2poeVIyMXZQeFppeXZ6NlZJRnZlN2Nw?=
 =?utf-8?B?YzBqK1hONUlSWHA4aG5hcG5WTmFlQ0k2Y1g0VHMvdmJocTRHaDMxVFNoY1BX?=
 =?utf-8?B?UW4xdzB4M3FtVUI5d0EzM05Fb3FBajNDTmlxUVVwODVEZk5oeEV4ZWM4WDEz?=
 =?utf-8?B?Sm1KV3FnU0p2ekRDdmN0eFJMODJBeFB4YVJOdGl4bjZwbzNkbE5Eb0h5UEIz?=
 =?utf-8?B?SkpGL2xjNXArUUZmeHFOVkRuNTZnPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <32EE9F53CFEC12409CA397F34122035E@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6546057e-303b-4dd0-ce81-08da028729bd
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Mar 2022 11:14:36.9554
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: JJZ1RFbYX083I+bLcW9vtNQcVQK66TBsYR/X1kWOOky5YDDrB5t+5Z+nDAUlfl/gJXOFb2xby+2M1juUlBOZc0jrfP016RfsYmVHrcoU818=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR03MB4240
X-OriginatorOrg: citrix.com

T24gMTAvMDMvMjAyMiAxMDozNSwgSmFuIEJldWxpY2ggd3JvdGU6DQo+IE9uIDEwLjAzLjIwMjIg
MTE6MjAsIEFuZHJldyBDb29wZXIgd3JvdGU6DQo+PiBPbiAxMC8wMy8yMDIyIDA5OjAxLCBKYW4g
QmV1bGljaCB3cm90ZToNCj4+PiBPbiAxMC4wMy4yMDIyIDA5OjU3LCBKYW4gQmV1bGljaCB3cm90
ZToNCj4+Pj4gUGxlYXNlIHBvaW50IG91dCBiYWNrcG9ydHMgeW91IGZpbmQgbWlzc2luZyBmcm9t
IHRoZSByZXNwZWN0aXZlIHN0YWdpbmcNCj4+Pj4gYnJhbmNoLCBidXQgd2hpY2ggeW91IGNvbnNp
ZGVyIHJlbGV2YW50LiBPbmUgSSBoYXZlIHF1ZXVlZCBhbHJlYWR5LCBidXQNCj4+Pj4gd2hpY2gg
SSdkIGxpa2UgdG8gcHV0IGluIG9ubHkgb25jZSB0aGUgcGVuZGluZyBmaXggdG8gaXQgKCJ4ODY6
IGF2b2lkDQo+Pj4+IFNPUlRfQllfSU5JVF9QUklPUklUWSB3aXRoIG9sZCBHTlUgbGQiKSBoYXMg
YWxzbyBsYW5kZWQgaW4gc3RhZ2luZywgaXMNCj4+Pj4NCj4+Pj4gNGI3ZmQ4MTUzZGRmIHg4Njog
Zm9sZCBzZWN0aW9ucyBpbiBmaW5hbCBiaW5hcmllcw0KPj4+IEFjdHVhbGx5IHRoZSBvdGhlciBv
bmUgSSdtIGF3YXJlIG9mIGlzDQo+Pj4NCj4+PiA3ZDk1ODkyMzllYzAgeDg2L0NFVDogRml4IFMz
IHJlc3VtZSB3aXRoIHNoYWRvdyBzdGFja3MgYWN0aXZlDQo+Pj4NCj4+PiB3aGljaCBBbmRyZXcg
cHJvbWlzZWQgdG8gcHJvdmlkZSBhIHN1aXRhYmxlIGJhY2twb3J0IGZvci4NCj4+IFNvIG5vdyBY
U0EtMzk4IGlzIHB1YmxpYywgSSBjYW4gc2F5IHdoYXQgdGhhdCBzbGlnaHRseSBjcnlwdGljYWxs
eSBtZWFudC4NCj4+DQo+PiBUaGUgQ0VUIFMzIGZpeCBkZXBlbmRzIG9uIG9uZSBvZiB0aGUgY29k
ZSByZWFycmFuZ2VtZW50cyBpbnRyb2R1Y2VkIGluDQo+PiB0aGUgQ0VULUlCVCB3b3JrLsKgIFdl
IHdlcmUgaW50ZW5kaW5nIHRvIGhhdmUgQ0VULUlCVCBiYWNrcG9ydGVkIGZvciB0aGUNCj4+IHR1
ZXNkYXkgZW1iYXJnbyAoZGlkbid0IGdvIHRvIHBsYW4pLCBhZnRlciB3aGljaCB0aGUgUzMgZml4
IHdvdWxkIGJlIGENCj4+IHRyaXZpYWwgYmFja3BvcnQgdG8gNC4xNCBhbmQgbGF0ZXIuDQo+IEkg
d2FzIGluZGVlZCB3b25kZXJpbmcuIEV2ZW4gaWYgdGhpcyBkaWRuJ3Qgd29yayBvdXQgaW4gdGlt
ZSwgYWl1aSB0aGUNCj4gcGxhbiBzdGlsbCBpcyB0byBoYXZlIHRoYXQgYmFja3BvcnRlZCAod2l0
aG91dCBnb2luZyB0aGUgbWFudWFsIGFubm90YXRpb24NCj4gcm91dGUpLiBEbyB5b3UgZXhwZWN0
IHRoaXMgdG8gYmUgZmVhc2libGUgaW4gdGltZSAoYW5kIG5vdCBhdCB0aGUgbGFzdA0KPiBtaW51
dGUpIGZvciA0LjE2LjE/DQoNClRoZSBhbnN3ZXIgaXMgbGFyZ2VseSBkZXBlbmRlbnQgb24gaG93
IGxvbmcgaXQgdGFrZXMgdG8gcmVzb2x2ZSB0aGUNCnJlbWFpbmluZyBpc3N1ZXMgb24gc3RhZ2lu
ZyAoYWx0aG91Z2ggbW9zdCBhcmUgZG9uZSBub3cuwqAgSSdtIHNpZnRpbmcNCnRocm91Z2ggdGhp
bmdzIGZvciBhIGNvbW1pdCBzd2VlcCkuDQoNCkVhcmx5IG5leHQgd2VlaywgYXNzdW1pbmcgbm8g
YWRkaXRpb25hbCBmdW4gaXMgZm91bmQ/DQoNCn5BbmRyZXcNCg==


From xen-devel-bounces@lists.xenproject.org Thu Mar 10 11:48:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 11:48:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288301.488931 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSHHX-0005YE-2o; Thu, 10 Mar 2022 11:48:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288301.488931; Thu, 10 Mar 2022 11:48:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSHHW-0005Y7-Vq; Thu, 10 Mar 2022 11:48:34 +0000
Received: by outflank-mailman (input) for mailman id 288301;
 Thu, 10 Mar 2022 11:48:34 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=4sG2=TV=arm.com=Rahul.Singh@srs-se1.protection.inumbo.net>)
 id 1nSHHV-0005Y1-ON
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 11:48:34 +0000
Received: from EUR03-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur03on0631.outbound.protection.outlook.com
 [2a01:111:f400:fe0a::631])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 019b9f84-a068-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 12:48:31 +0100 (CET)
Received: from AM5PR0601CA0044.eurprd06.prod.outlook.com
 (2603:10a6:203:68::30) by PA4PR08MB5902.eurprd08.prod.outlook.com
 (2603:10a6:102:e0::10) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.17; Thu, 10 Mar
 2022 11:48:28 +0000
Received: from AM5EUR03FT034.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:203:68:cafe::18) by AM5PR0601CA0044.outlook.office365.com
 (2603:10a6:203:68::30) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22 via Frontend
 Transport; Thu, 10 Mar 2022 11:48:28 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT034.mail.protection.outlook.com (10.152.16.81) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Thu, 10 Mar 2022 11:48:28 +0000
Received: ("Tessian outbound 1f399c739551:v113");
 Thu, 10 Mar 2022 11:48:28 +0000
Received: from cebf5f71ebe2.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 1ACDE381-145D-492A-B377-0ADA3F3B6EB5.1; 
 Thu, 10 Mar 2022 11:48:17 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id cebf5f71ebe2.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 10 Mar 2022 11:48:17 +0000
Received: from AM5PR0801MB2020.eurprd08.prod.outlook.com
 (2603:10a6:203:4c::14) by AM9PR08MB6291.eurprd08.prod.outlook.com
 (2603:10a6:20b:284::18) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.16; Thu, 10 Mar
 2022 11:48:15 +0000
Received: from AM5PR0801MB2020.eurprd08.prod.outlook.com
 ([fe80::253a:4d6c:61c9:af60]) by AM5PR0801MB2020.eurprd08.prod.outlook.com
 ([fe80::253a:4d6c:61c9:af60%10]) with mapi id 15.20.5038.027; Thu, 10 Mar
 2022 11:48:15 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 019b9f84-a068-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=YpJGoNss4Yfq+O4dv5c/humRFEFAwNVxVOavAl1Oh8I=;
 b=pubq6pdn0yIk75kbreUJ6Vp6FAIJ1AUiraVbRBQ5cYciBbbp7d2hV4aSVzkVDk0m/qv50FzC8cUssftAJVGLCrh1y7WJ8HLP4MlwZ2ROZklOTCwykaFKEqOpxyGYBw9jB0P9mjHosXX27br5SCd0AH6cCL81IvN/MIXS9gPeTwY=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: d2a2e3417b493904
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=LGMcBsP6iDgNInmaFe9jhB7PDdym/OCePvHzk+Y1I1Wlx1YEfDll9Abpg0oyK0m79ufHEMGrx3lkxbfJMtgDnIPRDj30USyXxg8JQRtyF6+/OjNIgVWLfmvGwSqKV8MSJCa1AW5l3JnTLuDkpEsgZJBZTIeesVAmOw/C4mzLq/KfdmCBnPjzB2utEkgGNFRnT8mpc0YwqKjxOtWYZvdQxykD3XkX7F4TSlhdUVF0sE4497Emb+mvnqbT1EutBcH73pADDzIWI6SdUtXlTkx6kiYJPDszavxzV+zOiEV9LDluHaANOfydo4UKmkgNCJY1NgsQTmbtGT5HMxZSdlpmAw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=YpJGoNss4Yfq+O4dv5c/humRFEFAwNVxVOavAl1Oh8I=;
 b=W9v6o4XBtbMj5RkpWL10LcCJynoJJpU6eFRlltWU7KkvNX1FPvGSdCvAQMChz7I4+DbUnjPl28+44EL5Wwt+bRX+O7cU9TKenspShmiZRfCmomL0samKnvoz0JCDt9WzLge5eyf7f/oUFwRTyAwd6MzmqBxjbgAetaLGYsojvYJ2I1eXlMlB5auPAnbot6vxBqmDp4lRy+2fJR93wRMmBuynaVelQObBwrpBwsEXu30yVM0hV2W/tMUwo27H71vl53Wx34MGiQxWNIPfx4IStwxr05O5bCV4iY4RLUmMetM5huMmbUbXmo4Rw+FEvDPMUCEwu/1mTyrGWHCQq78LIg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=YpJGoNss4Yfq+O4dv5c/humRFEFAwNVxVOavAl1Oh8I=;
 b=pubq6pdn0yIk75kbreUJ6Vp6FAIJ1AUiraVbRBQ5cYciBbbp7d2hV4aSVzkVDk0m/qv50FzC8cUssftAJVGLCrh1y7WJ8HLP4MlwZ2ROZklOTCwykaFKEqOpxyGYBw9jB0P9mjHosXX27br5SCd0AH6cCL81IvN/MIXS9gPeTwY=
From: Rahul Singh <Rahul.Singh@arm.com>
To: =?utf-8?B?Um9nZXIgUGF1IE1vbm7DqQ==?= <roger.pau@citrix.com>
CC: Jan Beulich <jbeulich@suse.com>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, Andrew Cooper <andrew.cooper3@citrix.com>, Wei
 Liu <wl@xen.org>, George Dunlap <george.dunlap@citrix.com>, Julien Grall
	<julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Paul
 Durrant <paul@xen.org>
Subject: Re: [PATCH v2 1/3] xen/vpci: msix: move x86 specific code to x86 file
Thread-Topic: [PATCH v2 1/3] xen/vpci: msix: move x86 specific code to x86
 file
Thread-Index:
 AQHYIoBoEZVl6/zkE0mK7dGMpvA2Zqyi2K6AgAfEbQCAAAXLAIADUEkAgAD5MYCACAnKAIAAAqaAgABc6ACAAAR3gIABSkMA
Date: Thu, 10 Mar 2022 11:48:15 +0000
Message-ID: <500E2C83-DC6E-47C0-B345-D03F67472196@arm.com>
References: <cover.1644937405.git.rahul.singh@arm.com>
 <4d2a727ba218468e4f347dc12ca051a0534fe205.1644937405.git.rahul.singh@arm.com>
 <6e188f87-7e4c-00ee-dd0c-373d42acec34@suse.com>
 <6BFB9B87-D8A1-442D-B4DC-18760C59D7BF@arm.com>
 <c11278f4-c902-0eb9-ac59-e27c0f2ba912@suse.com>
 <41F03A07-F8D6-423D-9E40-F4B89C611C87@arm.com>
 <175a55cc-70b4-4832-9a78-0db57a9ae4a4@suse.com>
 <1205992D-ACE4-4E94-B554-3B14F6D9697E@arm.com>
 <35ad9273-956b-86d6-55a3-c737575a7880@suse.com>
 <515CDCB8-43D2-4D08-9195-D058E641E1BF@arm.com>
 <YijQc9DejYAo3EcS@Air-de-Roger>
In-Reply-To: <YijQc9DejYAo3EcS@Air-de-Roger>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 694b6d5a-fed4-40aa-3494-08da028be489
x-ms-traffictypediagnostic:
	AM9PR08MB6291:EE_|AM5EUR03FT034:EE_|PA4PR08MB5902:EE_
X-Microsoft-Antispam-PRVS:
	<PA4PR08MB590239DECA04E2DC8A455B0BFC0B9@PA4PR08MB5902.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM5PR0801MB2020.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(8676002)(76116006)(54906003)(6916009)(316002)(8936002)(66476007)(66446008)(66556008)(66946007)(36756003)(91956017)(5660300002)(2906002)(6512007)(6486002)(33656002)(6506007)(83380400001)(86362001)(186003)(26005)(2616005)(4326008)(64756008)(38070700005)(122000001)(53546011)(508600001)(71200400001)(38100700002)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <C62166E65C4FCB43852B3EF38DC77857@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR08MB6291
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT034.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	670c5e8e-45d6-4397-d3ad-08da028bdcd5
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(2906002)(6862004)(8676002)(33656002)(8936002)(70586007)(70206006)(81166007)(316002)(356005)(5660300002)(36756003)(54906003)(4326008)(36860700001)(6486002)(86362001)(40460700003)(508600001)(2616005)(47076005)(6506007)(6512007)(53546011)(26005)(186003)(83380400001)(336012)(82310400004);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2022 11:48:28.3472
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 694b6d5a-fed4-40aa-3494-08da028be489
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT034.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR08MB5902
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From xen-devel-bounces@lists.xenproject.org Thu Mar 10 11:54:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 11:54:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288307.488943 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSHNe-00070X-UE; Thu, 10 Mar 2022 11:54:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288307.488943; Thu, 10 Mar 2022 11:54:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSHNe-00070Q-Qt; Thu, 10 Mar 2022 11:54:54 +0000
Received: by outflank-mailman (input) for mailman id 288307;
 Thu, 10 Mar 2022 11:54:53 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=7C/d=TV=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nSHNd-00070K-73
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 11:54:53 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e49acd33-a068-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 12:54:51 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2176.outbound.protection.outlook.com [104.47.17.176]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-24-zxtkYNKmNhy-HZzjXMOKOQ-1; Thu, 10 Mar 2022 12:54:50 +0100
Received: from AM0PR04MB5587.eurprd04.prod.outlook.com (2603:10a6:208:125::12)
 by DB9PR04MB8139.eurprd04.prod.outlook.com (2603:10a6:10:248::17)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 10 Mar
 2022 11:54:46 +0000
Received: from AM0PR04MB5587.eurprd04.prod.outlook.com
 ([fe80::dd50:54e6:1f96:3b33]) by AM0PR04MB5587.eurprd04.prod.outlook.com
 ([fe80::dd50:54e6:1f96:3b33%3]) with mapi id 15.20.5061.022; Thu, 10 Mar 2022
 11:54:46 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e49acd33-a068-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646913291;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=TyCxc4CAs80k63TxBi1H2qzryCfLRo/ZELvc0mMJwO4=;
	b=Bras+4fwegZKWg7Jl9HAQUmxG1sxTbuBxETZiwUamY1m5YXAgWc04IWywwJ74esVd931lH
	H1FfGG6DKQduclsIcWOnEO8JDm1xUK4i5xgo1E5h45MUCw61sfatvBb1VhLIJoXUQc0GKY
	y/rx4nL/yXsEsLhFcFgDT3IT75L5daw=
X-MC-Unique: zxtkYNKmNhy-HZzjXMOKOQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ET/Y/0Af2A0GzR+xIPPt74/JF+HHCfIzwNwKZCXs1W5bRCIDQbCTphbiAQxq1IjsoIcN+U2xQeZIOx8vO5JgpzJ18yJZCQOLKILYtgL20eKD2rO+OgIzDpFfFruN9FYNuL8fSDIitNwb/pr8KAqHsgTUdHK0JvZ+Tyl0G0al+Jpi8BmK+BOnoL0EdblJB/9X67JR7dpI6SdH5ybH8bLJAkilDWtW7u+Zc8JyRHYPu3CVN/+03yGc81Q3+d0LbxxzeuNw+1HfOGaNVQ3fQpNpfOO4NXPwhM8Bzes+mFqxvceD7jcUDRjeQo20IgPBgyq1i6mXhA7BJARcBZCSCAhVcw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Tnwgely8PHXcnjQJ9XjDvuMBhYhZ//An4UOlVe0pGYs=;
 b=NS5LyZHxDvUbVjI9BEwOCDR5scOm57NGncdJ9DUcJyxIu3ToLaqPXIyl40q4NDlzJ54jPIDkgo2JVcPt96TJoVLjpCWTxyCg748KdnppJ/W2P5JfHX7ExJ4+RujS+lK0MuSyo2j3tFJr+e68ipiykmrAKBsMmmMB/bk6YB95fHorF/c2R/hxJp6bXxxEW14IgpGqG39xTXYeoDhjN1+/P/L3fk5IIoMpm+VCz8FbY1IV5hPJLY1hr2KCMTSEJydc1+uQaEo2Y3QbfT/nBvmoii61O54rv7A2fhsaQN8exzvw3QJ5KUNfT06peNLMY17psPpfYpCN3yOapb4SFdKnOA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <3fcc8f6f-c454-28a9-ccee-bbe36ad295cf@suse.com>
Date: Thu, 10 Mar 2022 12:54:43 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: preparations for 4.16.1
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: George Dunlap <George.Dunlap@citrix.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Anthony Perard <anthony.perard@citrix.com>, Julien Grall <julien@xen.org>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <b9be95eb-7a6e-9f1b-6b68-6d08d6329cd1@suse.com>
 <6f8ccbb3-d384-bedd-8fb2-18aab570b588@suse.com>
 <41020867-eaa4-839c-3380-00bd91c5299b@citrix.com>
 <cab2a003-5112-42d0-3d2c-3758c895e52a@suse.com>
 <08075ddf-fa90-dfaa-07df-0e256fee2c41@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <08075ddf-fa90-dfaa-07df-0e256fee2c41@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS8PR04CA0083.eurprd04.prod.outlook.com
 (2603:10a6:20b:313::28) To AM0PR04MB5587.eurprd04.prod.outlook.com
 (2603:10a6:208:125::12)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: d81fc37c-4682-41a2-01e7-08da028cc589
X-MS-TrafficTypeDiagnostic: DB9PR04MB8139:EE_
X-Microsoft-Antispam-PRVS:
	<DB9PR04MB8139DB580BF4C56C107D26F2B30B9@DB9PR04MB8139.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR04MB5587.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(8936002)(6666004)(8676002)(316002)(66476007)(66556008)(4326008)(7116003)(6506007)(86362001)(53546011)(5660300002)(2906002)(2616005)(31696002)(26005)(186003)(6512007)(66946007)(38100700002)(31686004)(508600001)(36756003)(6486002)(54906003)(6916009)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?4mi7Iw/+Ao8mnVvrj4Sltsm0TKSv/nit9LHsvL/pPJjxG52q8Qew+FGEOFiw?=
 =?us-ascii?Q?iP/EvKO4/t4In24/yUYcubAQqfjW8Qygr/+/W/bU1j7LA2xIS+J6V+MWt5P3?=
 =?us-ascii?Q?Q2Tmx0qzVsKHx6EH8zVRB1xOhsU4s62NbCbnLg8+Lrtz6RkZg/7+IeewvlDR?=
 =?us-ascii?Q?/8bcJjy0ninA0xb1qQzHMkl/DzlpL1hlNwvmWiIKmCdsFSOiNif1q01tgzg9?=
 =?us-ascii?Q?yMnwySCeTbWVTv4omTJlwNXz1D8l+ng+KmvBIpOnYRlIXJVsm0zVD04vAAI/?=
 =?us-ascii?Q?vgnHH/PZLEuBAscUOxpzA7cYZ/Bkyzkl5qotSa0EMT61e5+PomJRHY191tGR?=
 =?us-ascii?Q?So+BJUygW4WxtTWsAKB8EQtbFfA7/hDFFbMuYzAH6BxOlCBdVOz06Z6Cpuic?=
 =?us-ascii?Q?tKiDyquYyCgcsTjYgbAEVy479PdMK6n4xW29t08JUj6AL3m7hZs/vThzaXOV?=
 =?us-ascii?Q?ekVUiNToGhOmLIExJnYDgMiP5FPfhp4/ydfj7k/cOJXPF6BPZmVZjRv004sa?=
 =?us-ascii?Q?w4ePGi2NbOvdKPl5iZI4kOKKnVFNdpL9g40LzK2+H6X1yeV7KCt96CAbLXah?=
 =?us-ascii?Q?DV3azC1sNIT5GXueuQxmR7qo0wnll17sm6qflDXgTXbEmLU+dDG8OjYxcoOL?=
 =?us-ascii?Q?3ot9FaCCLuB6ovQRr9dd57bW4y8ce3anW9lrjE/gQ+oPZDGB/YQyFHGQVk5u?=
 =?us-ascii?Q?mHMNW/t5ETSuU0bgdDmRlkgIP+j2ABhOgjyJFfEF1YzJDfi6miK3wWuP/N7k?=
 =?us-ascii?Q?rGJwalPgJv8b94hLHghXWXttpFur2130UJX2nAYV7P+YjZUPB4ea9hV3CJfa?=
 =?us-ascii?Q?ioPRCh+uGiZPwNleNSob7APUKmxTh1WH8oS6BF+StS71B0O4jo4AA44ZEPYx?=
 =?us-ascii?Q?97XErnuP+IV9LEqGRfuPSpeK0aTNym0o90Npr8s+48tEtt9Ym76zy73Rj6ty?=
 =?us-ascii?Q?WJ2umbsCej2h4HfBIdtbmYProH/wa/HkwQ1OoCL+F5gULwYhBCA6/rMk7tRF?=
 =?us-ascii?Q?pv/9TilRED6RLNHAZCy2IoW3bERPdRGmQ/4tM/dM3xCTJayR1673td9vUy4j?=
 =?us-ascii?Q?oNkGAvmNdV0Retj0jJ/ZppPlHIcFj54X3hQ1ssqIW195ByRcoPp+E6NFsMpA?=
 =?us-ascii?Q?vlkuuS+xoKp2p8l/W8BMZ7kEmo2BYe4Waf+g3lIgsFGPVCbEUgarvJP1AcJC?=
 =?us-ascii?Q?f8IN0D3sI/nespekuis8xy9azJ7NtSaBmXzA86j4Ob6nQ6AJ7HEkAnjH30+w?=
 =?us-ascii?Q?F01c41tpbv7C5uLF8HIbq0AFIV29UXapU//OisRucZOGA3LVgxwnurTM9Zdq?=
 =?us-ascii?Q?xuKW/clkpRSA5ZUmpLpCEIGgkzySXvwVeZihtVogR/Yx0oXGiVnohoY/HK1f?=
 =?us-ascii?Q?SZ8FDW5MRmZ9zyANZyzEExCRlO0lof5qbX90qp+Q55HuFzU8MqI8V5cQ8B64?=
 =?us-ascii?Q?lybtWsrFstRs/8fm8ZKFBLKT5UIg+UmunSeNwqOnhRci419dHSwgVKwaOhME?=
 =?us-ascii?Q?KBuuuHFLZ6hjTO8wlBrjYNBgPEv9y6Fy80zRGAr60fk45fUgDQjOLsY0ipYJ?=
 =?us-ascii?Q?/we7pHGcUUFwvMb0H0XYuPYZhhUAmJBdsxbQoJO6td1rh4xsrltftrmzumga?=
 =?us-ascii?Q?P2N1oJMAS4W1Cc4UE4FM+Yw=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d81fc37c-4682-41a2-01e7-08da028cc589
X-MS-Exchange-CrossTenant-AuthSource: AM0PR04MB5587.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2022 11:54:46.0363
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: LzZ7uDvblKtCbENfh5Rkod4VgiuQcuP4hjZDkXkMEMCDAyH9lFh6QJ+f9zCh7bHXSRJKndyVRuYmYYflnf6GGQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR04MB8139

On 10.03.2022 12:14, Andrew Cooper wrote:
> On 10/03/2022 10:35, Jan Beulich wrote:
>> On 10.03.2022 11:20, Andrew Cooper wrote:
>>> On 10/03/2022 09:01, Jan Beulich wrote:
>>>> On 10.03.2022 09:57, Jan Beulich wrote:
>>>>> Please point out backports you find missing from the respective stagi=
ng
>>>>> branch, but which you consider relevant. One I have queued already, b=
ut
>>>>> which I'd like to put in only once the pending fix to it ("x86: avoid
>>>>> SORT_BY_INIT_PRIORITY with old GNU ld") has also landed in staging, i=
s
>>>>>
>>>>> 4b7fd8153ddf x86: fold sections in final binaries
>>>> Actually the other one I'm aware of is
>>>>
>>>> 7d9589239ec0 x86/CET: Fix S3 resume with shadow stacks active
>>>>
>>>> which Andrew promised to provide a suitable backport for.
>>> So now XSA-398 is public, I can say what that slightly cryptically mean=
t.
>>>
>>> The CET S3 fix depends on one of the code rearrangements introduced in
>>> the CET-IBT work.=C2=A0 We were intending to have CET-IBT backported fo=
r the
>>> tuesday embargo (didn't go to plan), after which the S3 fix would be a
>>> trivial backport to 4.14 and later.
>> I was indeed wondering. Even if this didn't work out in time, aiui the
>> plan still is to have that backported (without going the manual annotati=
on
>> route). Do you expect this to be feasible in time (and not at the last
>> minute) for 4.16.1?
>=20
> The answer is largely dependent on how long it takes to resolve the
> remaining issues on staging (although most are done now.=C2=A0 I'm siftin=
g
> through things for a commit sweep).
>=20
> Early next week, assuming no additional fun is found?

Early next week would certainly be faster than what I was hoping for ...

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 12:00:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 12:00:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288315.488964 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSHTG-0000IU-Cb; Thu, 10 Mar 2022 12:00:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288315.488964; Thu, 10 Mar 2022 12:00:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSHTG-0000FN-8F; Thu, 10 Mar 2022 12:00:42 +0000
Received: by outflank-mailman (input) for mailman id 288315;
 Thu, 10 Mar 2022 12:00:40 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=piYg=TV=xenbits.xen.org=jgross@srs-se1.protection.inumbo.net>)
 id 1nSHTE-0008VI-Ef
 for xen-devel@lists.xen.org; Thu, 10 Mar 2022 12:00:40 +0000
Received: from mail.xenproject.org (mail.xenproject.org [104.130.215.37])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b12edf4f-a069-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 13:00:37 +0100 (CET)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <jgross@xenbits.xen.org>)
 id 1nSHSz-0008Ma-Tt; Thu, 10 Mar 2022 12:00:25 +0000
Received: from jgross by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <jgross@xenbits.xen.org>)
 id 1nSHSz-0001kJ-R6; Thu, 10 Mar 2022 12:00:25 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b12edf4f-a069-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
	Content-Transfer-Encoding:Content-Type;
	bh=Cqrz06sMhRfR+NQvXB9OHurj3vsno2tJ12E6LUKZW6E=; b=ddLyspT5UIdJIAY+zJjPILViRY
	zDGseKyhNbrYAFj6dhDtWHoMdcMaH2oVsjBB8TrNp7ZWOFt7j4EWQnjO3Q4HYJk3iI4nJ81Qp6p3W
	fLggCFXTVmplz30G0p3XAsIO35ol4OgRZoTKjn2gvdcQSQsxBagMo5JIpNlVaN4AsoeE=;
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
CC: Xen.org security team <security-team-members@xen.org>
Subject: Xen Security Advisory 396 v3 (CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042)
 - Linux PV device frontends vulnerable to attacks by backends
Message-Id: <E1nSHSz-0001kJ-R6@xenbits.xenproject.org>
Date: Thu, 10 Mar 2022 12:00:25 +0000

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

 Xen Security Advisory CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042 / XSA-396
                                                                 version 3

      Linux PV device frontends vulnerable to attacks by backends

UPDATES IN VERSION 3
====================

Public release.

ISSUE DESCRIPTION
=================

Several Linux PV device frontends are using the grant table interfaces
for removing access rights of the backends in ways being subject to
race conditions, resulting in potential data leaks, data corruption
by malicious backends, and denial of service triggered by malicious
backends:

blkfront, netfront, scsifront and the gntalloc driver are testing
whether a grant reference is still in use. If this is not the case,
they assume that a following removal of the granted access will always
succeed, which is not true in case the backend has mapped the granted
page between those two operations. As a result the backend can keep
access to the memory page of the guest no matter how the page will be
used after the frontend I/O has finished. The xenbus driver has a
similar problem, as it doesn't check the success of removing the
granted access of a shared ring buffer.
blkfront: CVE-2022-23036
netfront: CVE-2022-23037
scsifront: CVE-2022-23038
gntalloc: CVE-2022-23039
xenbus: CVE-2022-23040

blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront,
and pvcalls are using a functionality to delay freeing a grant reference
until it is no longer in use, but the freeing of the related data page
is not synchronized with dropping the granted access. As a result the
backend can keep access to the memory page even after it has been freed
and then re-used for a different purpose.
CVE-2022-23041


netfront will fail a BUG_ON() assertion if it fails to revoke access in
the rx path. This will result in a Denial of Service (DoS) situation of
the guest which can be triggered by the backend.
CVE-2022-23042

IMPACT
======

Due to race conditions and missing tests of return codes in the Linux
PV device frontend drivers a malicious backend could gain access (read
and write) to memory pages it shouldn't have, or it could directly
trigger Denial of Service (DoS) in the guest.

VULNERABLE SYSTEMS
==================

All Linux guests using PV devices are vulnerable in case potentially
malicious PV device backends are being used.

MITIGATION
==========

There is no mitigation available other than not using PV devices in case
a backend is suspected to be potentially malicious.

RESOLUTION
==========

Applying the attached patches resolves this issue.

xsa396-linux-*.patch   Linux upstream

$ sha256sum xsa396*
d21d2d2c499d8e7c1cbc347d9df118b27af7d7c9ca5c104fcf1fef022ba6b92d  xsa396-linux-01.patch
c150c7873497b4d9807fcfe2a4a4831b033597db3d4c3dfaada1e647db1395fa  xsa396-linux-02.patch
6439ac16b6d6b29d6773d00895776a7392a321caa01f569062c4140d3d66167c  xsa396-linux-03.patch
2cc0b472514be47690ef257ab8d296bbec1827d18f98e1f1bbbfea53aafec78c  xsa396-linux-04.patch
cd6b6e65fe9915f98b04363bf1f22ddbd7c448215d52858ad1a2318bb1f034c8  xsa396-linux-05.patch
353e4de564897ad07120b17aa7a6a22b90fba6e65f39c20fe561ba06405656f3  xsa396-linux-06.patch
bf923c3bc92a908215d5ade016d27f56d1e445da88b04e1e1d4530ea5b139be3  xsa396-linux-07.patch
0a306ed20e4259e2a3583bfab14672a245bd33b24e95e5df8bfc30a25f7e18c6  xsa396-linux-08.patch
130b8305ba8c10e2942553078b845899ef79c5570692a499569a526b1e39d4fe  xsa396-linux-09.patch
1f70bdc0a5c1ff1b538d8cbec17e99af5888669f3a33ad8a02d2026719ad4bc9  xsa396-linux-10.patch
48fd782c6b0b705ccb59885d0e1562873f44478ea87f705f08ce18336bc19257  xsa396-linux-11.patch
d720350d36f7434e2cad1cb0ae0ed48776ad870a7b1e61cdd08d80fb4a787d59  xsa396-linux-12.patch
$

CREDITS
=======

This issue was discovered by Demi Marie Obenour and Simon Gaiser of
Invisible Things Lab.

DEPLOYMENT DURING EMBARGO
=========================

Deployment of patches or mitigations is NOT permitted (except where
all the affected VMs are administered and used only by
organisations which are members of the Xen Project Security Issues
Predisclosure List).  Specifically, deployment on public cloud systems
is NOT permitted.

This is because the patches need to be applied in the affected guests.
Switching from PV to non-PV devices is observable by the guests and has
usually a bad performance impact.

Deployment is permitted only AFTER the embargo ends.


(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable.  This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)

For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
  http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmIp2PYMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZKEAIAKS8IFrluU7bw2k0ll8LfDdwI1skWPzEW++bsEjl
G3eS2bIzOsI/HO5j8HKkxu7N/bPZF8U82+yrDtBYk7y1E8YnqoSyUB4Lc3Bv71gQ
6MVaLasbY5GrfUdK5lZyoepjudiPa+1/dOO7W3ZOJm7eLq0dTnTuR7vkyqEKQ2vY
tYC+ubssufuo1FevGANuh2XZe6GUY9hqpBpyVwqArbUVicKC1RhKfBDYyZpSXd/W
BIzwTZdWQlRIvu4TyPQTdFRjGH4gVf8roquHXDTJUHtItxomltq7irGdw/89y7EM
8abL+ZlUYHCb03RCT6ccTmExyVDrJ3h1JmWrqnIXpvApyAU=
=b5Zc
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa396-linux-01.patch"
Content-Disposition: attachment; filename="xsa396-linux-01.patch"
Content-Transfer-Encoding: base64

RnJvbSAzNmI4MmVhZDM0Nzk2ZGViZWE4MmEwMDQ1ZGJjZjZhZjAwMzlhOWZl
IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKdWVyZ2VuIEdyb3Nz
IDxqZ3Jvc3NAc3VzZS5jb20+CkRhdGU6IEZyaSwgMjUgRmViIDIwMjIgMTY6
MDU6NDAgKzAxMDAKU3ViamVjdDogW1BBVENIIDAxLzEyXSB4ZW4veGVuYnVz
OiBkb24ndCBsZXQgeGVuYnVzX2dyYW50X3JpbmcoKSByZW1vdmUKIGdyYW50
cyBpbiBlcnJvciBjYXNlCgpMZXR0aW5nIHhlbmJ1c19ncmFudF9yaW5nKCkg
dGVhciBkb3duIGdyYW50cyBpbiB0aGUgZXJyb3IgY2FzZSBpcwpwcm9ibGVt
YXRpYywgYXMgdGhlIG90aGVyIHNpZGUgY291bGQgYWxyZWFkeSBoYXZlIHVz
ZWQgdGhlc2UgZ3JhbnRzLgpDYWxsaW5nIGdudHRhYl9lbmRfZm9yZWlnbl9h
Y2Nlc3NfcmVmKCkgd2l0aG91dCBjaGVja2luZyBzdWNjZXNzIGlzCnJlc3Vs
dGluZyBpbiBhbiB1bmNsZWFyIHNpdHVhdGlvbiBmb3IgYW55IGNhbGxlciBv
ZiB4ZW5idXNfZ3JhbnRfcmluZygpCmFzIGluIHRoZSBlcnJvciBjYXNlIHRo
ZSBtZW1vcnkgcGFnZXMgb2YgdGhlIHJpbmcgcGFnZSBtaWdodCBiZQpwYXJ0
aWFsbHkgbWFwcGVkLiBGcmVlaW5nIHRoZW0gd291bGQgcmlzayB1bndhbnRl
ZCBmb3JlaWduIGFjY2VzcyB0bwp0aGVtLCB3aGlsZSBub3QgZnJlZWluZyB0
aGVtIHdvdWxkIGxlYWsgbWVtb3J5LgoKSW4gb3JkZXIgdG8gcmVtb3ZlIHRo
ZSBuZWVkIHRvIHVuZG8gYW55IGdudHRhYl9ncmFudF9mb3JlaWduX2FjY2Vz
cygpCmNhbGxzLCB1c2UgZ250dGFiX2FsbG9jX2dyYW50X3JlZmVyZW5jZXMo
KSB0byBtYWtlIHN1cmUgbm8gZnVydGhlcgplcnJvciBjYW4gb2NjdXIgaW4g
dGhlIGxvb3AgZ3JhbnRpbmcgYWNjZXNzIHRvIHRoZSByaW5nIHBhZ2VzLgoK
SXQgc2hvdWxkIGJlIG5vdGVkIHRoYXQgdGhpcyB3YXkgb2YgaGFuZGxpbmcg
cmVtb3ZlcyBsZWFraW5nIG9mCmdyYW50IGVudHJpZXMgaW4gdGhlIGVycm9y
IGNhc2UsIHRvby4KClRoaXMgaXMgQ1ZFLTIwMjItMjMwNDAgLyBwYXJ0IG9m
IFhTQS0zOTYuCgpSZXBvcnRlZC1ieTogRGVtaSBNYXJpZSBPYmVub3VyIDxk
ZW1pQGludmlzaWJsZXRoaW5nc2xhYi5jb20+ClNpZ25lZC1vZmYtYnk6IEp1
ZXJnZW4gR3Jvc3MgPGpncm9zc0BzdXNlLmNvbT4KUmV2aWV3ZWQtYnk6IEph
biBCZXVsaWNoIDxqYmV1bGljaEBzdXNlLmNvbT4KLS0tCiBkcml2ZXJzL3hl
bi94ZW5idXMveGVuYnVzX2NsaWVudC5jIHwgMjQgKysrKysrKysrKystLS0t
LS0tLS0tLS0tCiAxIGZpbGUgY2hhbmdlZCwgMTEgaW5zZXJ0aW9ucygrKSwg
MTMgZGVsZXRpb25zKC0pCgpkaWZmIC0tZ2l0IGEvZHJpdmVycy94ZW4veGVu
YnVzL3hlbmJ1c19jbGllbnQuYyBiL2RyaXZlcnMveGVuL3hlbmJ1cy94ZW5i
dXNfY2xpZW50LmMKaW5kZXggZThiZWQxY2I3NmJhLi5kZjY4OTA2ODEyMzEg
MTAwNjQ0Ci0tLSBhL2RyaXZlcnMveGVuL3hlbmJ1cy94ZW5idXNfY2xpZW50
LmMKKysrIGIvZHJpdmVycy94ZW4veGVuYnVzL3hlbmJ1c19jbGllbnQuYwpA
QCAtMzc5LDcgKzM3OSwxNCBAQCBpbnQgeGVuYnVzX2dyYW50X3Jpbmcoc3Ry
dWN0IHhlbmJ1c19kZXZpY2UgKmRldiwgdm9pZCAqdmFkZHIsCiAJCSAgICAg
IHVuc2lnbmVkIGludCBucl9wYWdlcywgZ3JhbnRfcmVmX3QgKmdyZWZzKQog
ewogCWludCBlcnI7Ci0JaW50IGksIGo7CisJdW5zaWduZWQgaW50IGk7CisJ
Z3JhbnRfcmVmX3QgZ3JlZl9oZWFkOworCisJZXJyID0gZ250dGFiX2FsbG9j
X2dyYW50X3JlZmVyZW5jZXMobnJfcGFnZXMsICZncmVmX2hlYWQpOworCWlm
IChlcnIpIHsKKwkJeGVuYnVzX2Rldl9mYXRhbChkZXYsIGVyciwgImdyYW50
aW5nIGFjY2VzcyB0byByaW5nIHBhZ2UiKTsKKwkJcmV0dXJuIGVycjsKKwl9
CiAKIAlmb3IgKGkgPSAwOyBpIDwgbnJfcGFnZXM7IGkrKykgewogCQl1bnNp
Z25lZCBsb25nIGdmbjsKQEAgLTM4OSwyMyArMzk2LDE0IEBAIGludCB4ZW5i
dXNfZ3JhbnRfcmluZyhzdHJ1Y3QgeGVuYnVzX2RldmljZSAqZGV2LCB2b2lk
ICp2YWRkciwKIAkJZWxzZQogCQkJZ2ZuID0gdmlydF90b19nZm4odmFkZHIp
OwogCi0JCWVyciA9IGdudHRhYl9ncmFudF9mb3JlaWduX2FjY2VzcyhkZXYt
Pm90aGVyZW5kX2lkLCBnZm4sIDApOwotCQlpZiAoZXJyIDwgMCkgewotCQkJ
eGVuYnVzX2Rldl9mYXRhbChkZXYsIGVyciwKLQkJCQkJICJncmFudGluZyBh
Y2Nlc3MgdG8gcmluZyBwYWdlIik7Ci0JCQlnb3RvIGZhaWw7Ci0JCX0KLQkJ
Z3JlZnNbaV0gPSBlcnI7CisJCWdyZWZzW2ldID0gZ250dGFiX2NsYWltX2dy
YW50X3JlZmVyZW5jZSgmZ3JlZl9oZWFkKTsKKwkJZ250dGFiX2dyYW50X2Zv
cmVpZ25fYWNjZXNzX3JlZihncmVmc1tpXSwgZGV2LT5vdGhlcmVuZF9pZCwK
KwkJCQkJCWdmbiwgMCk7CiAKIAkJdmFkZHIgPSB2YWRkciArIFhFTl9QQUdF
X1NJWkU7CiAJfQogCiAJcmV0dXJuIDA7Ci0KLWZhaWw6Ci0JZm9yIChqID0g
MDsgaiA8IGk7IGorKykKLQkJZ250dGFiX2VuZF9mb3JlaWduX2FjY2Vzc19y
ZWYoZ3JlZnNbal0sIDApOwotCXJldHVybiBlcnI7CiB9CiBFWFBPUlRfU1lN
Qk9MX0dQTCh4ZW5idXNfZ3JhbnRfcmluZyk7CiAKLS0gCjIuMzQuMQoK

--=separator
Content-Type: application/octet-stream; name="xsa396-linux-02.patch"
Content-Disposition: attachment; filename="xsa396-linux-02.patch"
Content-Transfer-Encoding: base64

RnJvbSAxNzQ3ODFjMDU2Y2JmOGUzZmYxYmIxY2Q1NmEyMDE3ZWM4YTE0ZWUz
IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKdWVyZ2VuIEdyb3Nz
IDxqZ3Jvc3NAc3VzZS5jb20+CkRhdGU6IEZyaSwgMjUgRmViIDIwMjIgMTY6
MDU6NDEgKzAxMDAKU3ViamVjdDogW1BBVENIIDAyLzEyXSB4ZW4vZ3JhbnQt
dGFibGU6IGFkZCBnbnR0YWJfdHJ5X2VuZF9mb3JlaWduX2FjY2VzcygpCgpB
ZGQgYSBuZXcgZ3JhbnQgdGFibGUgZnVuY3Rpb24gZ250dGFiX3RyeV9lbmRf
Zm9yZWlnbl9hY2Nlc3MoKSwgd2hpY2gKd2lsbCByZW1vdmUgYW5kIGZyZWUg
YSBncmFudCBpZiBpdCBpcyBub3QgaW4gdXNlLgoKSXRzIG1haW4gdXNlIGNh
c2UgaXMgdG8gZWl0aGVyIGZyZWUgYSBncmFudCBpZiBpdCBpcyBubyBsb25n
ZXIgaW4gdXNlLApvciB0byB0YWtlIHNvbWUgb3RoZXIgYWN0aW9uIGlmIGl0
IGlzIHN0aWxsIGluIHVzZS4gVGhpcyBvdGhlciBhY3Rpb24KY2FuIGJlIGFu
IGVycm9yIGV4aXQsIG9yIChlLmcuIGluIHRoZSBjYXNlIG9mIGJsa2Zyb250
IHBlcnNpc3RlbnQgZ3JhbnQKZmVhdHVyZSkgc29tZSBzcGVjaWFsIGhhbmRs
aW5nLgoKVGhpcyBpcyBDVkUtMjAyMi0yMzAzNiwgQ1ZFLTIwMjItMjMwMzgg
LyBwYXJ0IG9mIFhTQS0zOTYuCgpSZXBvcnRlZC1ieTogRGVtaSBNYXJpZSBP
YmVub3VyIDxkZW1pQGludmlzaWJsZXRoaW5nc2xhYi5jb20+ClNpZ25lZC1v
ZmYtYnk6IEp1ZXJnZW4gR3Jvc3MgPGpncm9zc0BzdXNlLmNvbT4KUmV2aWV3
ZWQtYnk6IEphbiBCZXVsaWNoIDxqYmV1bGljaEBzdXNlLmNvbT4KLS0tCiBk
cml2ZXJzL3hlbi9ncmFudC10YWJsZS5jIHwgMTQgKysrKysrKysrKysrLS0K
IGluY2x1ZGUveGVuL2dyYW50X3RhYmxlLmggfCAxMiArKysrKysrKysrKysK
IDIgZmlsZXMgY2hhbmdlZCwgMjQgaW5zZXJ0aW9ucygrKSwgMiBkZWxldGlv
bnMoLSkKCmRpZmYgLS1naXQgYS9kcml2ZXJzL3hlbi9ncmFudC10YWJsZS5j
IGIvZHJpdmVycy94ZW4vZ3JhbnQtdGFibGUuYwppbmRleCAzNzI5YmVhMGM5
ODkuLjFiODJlN2EzNzIyYSAxMDA2NDQKLS0tIGEvZHJpdmVycy94ZW4vZ3Jh
bnQtdGFibGUuYworKysgYi9kcml2ZXJzL3hlbi9ncmFudC10YWJsZS5jCkBA
IC00MzUsMTEgKzQzNSwyMSBAQCBzdGF0aWMgdm9pZCBnbnR0YWJfYWRkX2Rl
ZmVycmVkKGdyYW50X3JlZl90IHJlZiwgYm9vbCByZWFkb25seSwKIAkgICAg
ICAgd2hhdCwgcmVmLCBwYWdlID8gcGFnZV90b19wZm4ocGFnZSkgOiAtMSk7
CiB9CiAKK2ludCBnbnR0YWJfdHJ5X2VuZF9mb3JlaWduX2FjY2VzcyhncmFu
dF9yZWZfdCByZWYpCit7CisJaW50IHJldCA9IF9nbnR0YWJfZW5kX2ZvcmVp
Z25fYWNjZXNzX3JlZihyZWYsIDApOworCisJaWYgKHJldCkKKwkJcHV0X2Zy
ZWVfZW50cnkocmVmKTsKKworCXJldHVybiByZXQ7Cit9CitFWFBPUlRfU1lN
Qk9MX0dQTChnbnR0YWJfdHJ5X2VuZF9mb3JlaWduX2FjY2Vzcyk7CisKIHZv
aWQgZ250dGFiX2VuZF9mb3JlaWduX2FjY2VzcyhncmFudF9yZWZfdCByZWYs
IGludCByZWFkb25seSwKIAkJCSAgICAgICB1bnNpZ25lZCBsb25nIHBhZ2Up
CiB7Ci0JaWYgKGdudHRhYl9lbmRfZm9yZWlnbl9hY2Nlc3NfcmVmKHJlZiwg
cmVhZG9ubHkpKSB7Ci0JCXB1dF9mcmVlX2VudHJ5KHJlZik7CisJaWYgKGdu
dHRhYl90cnlfZW5kX2ZvcmVpZ25fYWNjZXNzKHJlZikpIHsKIAkJaWYgKHBh
Z2UgIT0gMCkKIAkJCXB1dF9wYWdlKHZpcnRfdG9fcGFnZShwYWdlKSk7CiAJ
fSBlbHNlCmRpZmYgLS1naXQgYS9pbmNsdWRlL3hlbi9ncmFudF90YWJsZS5o
IGIvaW5jbHVkZS94ZW4vZ3JhbnRfdGFibGUuaAppbmRleCBjYjg1NGRmMDMx
Y2UuLjM1OGQyODE3NzQxYiAxMDA2NDQKLS0tIGEvaW5jbHVkZS94ZW4vZ3Jh
bnRfdGFibGUuaAorKysgYi9pbmNsdWRlL3hlbi9ncmFudF90YWJsZS5oCkBA
IC0xMDQsMTAgKzEwNCwyMiBAQCBpbnQgZ250dGFiX2VuZF9mb3JlaWduX2Fj
Y2Vzc19yZWYoZ3JhbnRfcmVmX3QgcmVmLCBpbnQgcmVhZG9ubHkpOwogICog
YWNjZXNzIGhhcyBiZWVuIGVuZGVkLCBmcmVlIHRoZSBnaXZlbiBwYWdlIHRv
by4gIEFjY2VzcyB3aWxsIGJlIGVuZGVkCiAgKiBpbW1lZGlhdGVseSBpZmYg
dGhlIGdyYW50IGVudHJ5IGlzIG5vdCBpbiB1c2UsIG90aGVyd2lzZSBpdCB3
aWxsIGhhcHBlbgogICogc29tZSB0aW1lIGxhdGVyLiAgcGFnZSBtYXkgYmUg
MCwgaW4gd2hpY2ggY2FzZSBubyBmcmVlaW5nIHdpbGwgb2NjdXIuCisgKiBO
b3RlIHRoYXQgdGhlIGdyYW50ZWQgcGFnZSBtaWdodCBzdGlsbCBiZSBhY2Nl
c3NlZCAocmVhZCBvciB3cml0ZSkgYnkgdGhlCisgKiBvdGhlciBzaWRlIGFm
dGVyIGdudHRhYl9lbmRfZm9yZWlnbl9hY2Nlc3MoKSByZXR1cm5zLCBzbyBl
dmVuIGlmIHBhZ2Ugd2FzCisgKiBzcGVjaWZpZWQgYXMgMCBpdCBpcyBub3Qg
YWxsb3dlZCB0byBqdXN0IHJldXNlIHRoZSBwYWdlIGZvciBvdGhlcgorICog
cHVycG9zZXMgaW1tZWRpYXRlbHkuCiAgKi8KIHZvaWQgZ250dGFiX2VuZF9m
b3JlaWduX2FjY2VzcyhncmFudF9yZWZfdCByZWYsIGludCByZWFkb25seSwK
IAkJCSAgICAgICB1bnNpZ25lZCBsb25nIHBhZ2UpOwogCisvKgorICogRW5k
IGFjY2VzcyB0aHJvdWdoIHRoZSBnaXZlbiBncmFudCByZWZlcmVuY2UsIGlm
ZiB0aGUgZ3JhbnQgZW50cnkgaXMKKyAqIG5vIGxvbmdlciBpbiB1c2UuICBJ
biBjYXNlIG9mIHN1Y2Nlc3MgZW5kaW5nIGZvcmVpZ24gYWNjZXNzLCB0aGUK
KyAqIGdyYW50IHJlZmVyZW5jZSBpcyBkZWFsbG9jYXRlZC4KKyAqIFJldHVy
biAxIGlmIHRoZSBncmFudCBlbnRyeSB3YXMgZnJlZWQsIDAgaWYgaXQgaXMg
c3RpbGwgaW4gdXNlLgorICovCitpbnQgZ250dGFiX3RyeV9lbmRfZm9yZWln
bl9hY2Nlc3MoZ3JhbnRfcmVmX3QgcmVmKTsKKwogaW50IGdudHRhYl9ncmFu
dF9mb3JlaWduX3RyYW5zZmVyKGRvbWlkX3QgZG9taWQsIHVuc2lnbmVkIGxv
bmcgcGZuKTsKIAogdW5zaWduZWQgbG9uZyBnbnR0YWJfZW5kX2ZvcmVpZ25f
dHJhbnNmZXJfcmVmKGdyYW50X3JlZl90IHJlZik7Ci0tIAoyLjM0LjEKCg==

--=separator
Content-Type: application/octet-stream; name="xsa396-linux-03.patch"
Content-Disposition: attachment; filename="xsa396-linux-03.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa396-linux-04.patch"
Content-Disposition: attachment; filename="xsa396-linux-04.patch"
Content-Transfer-Encoding: base64

RnJvbSAyMDAwZTVmMjczMTk4NzI0YjVjNDBlYmFlNGQwYWYzYmYxYzcyY2M1
IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKdWVyZ2VuIEdyb3Nz
IDxqZ3Jvc3NAc3VzZS5jb20+CkRhdGU6IEZyaSwgMjUgRmViIDIwMjIgMTY6
MDU6NDEgKzAxMDAKU3ViamVjdDogW1BBVENIIDA0LzEyXSB4ZW4vbmV0ZnJv
bnQ6IGRvbid0IHVzZSBnbnR0YWJfcXVlcnlfZm9yZWlnbl9hY2Nlc3MoKSBm
b3IgbWFwcGVkIHN0YXR1cwoKSXQgaXNuJ3QgZW5vdWdoIHRvIGNoZWNrIHdo
ZXRoZXIgYSBncmFudCBpcyBzdGlsbCBiZWluZyBpbiB1c2UgYnkKY2FsbGlu
ZyBnbnR0YWJfcXVlcnlfZm9yZWlnbl9hY2Nlc3MoKSwgYXMgYSBtYXBwaW5n
IGNvdWxkIGJlIHJlYWxpemVkCmJ5IHRoZSBvdGhlciBzaWRlIGp1c3QgYWZ0
ZXIgaGF2aW5nIGNhbGxlZCB0aGF0IGZ1bmN0aW9uLgoKSW4gY2FzZSB0aGUg
Y2FsbCB3YXMgZG9uZSBpbiBwcmVwYXJhdGlvbiBvZiByZXZva2luZyBhIGdy
YW50IGl0IGlzCmJldHRlciB0byBkbyBzbyB2aWEgZ250dGFiX2VuZF9mb3Jl
aWduX2FjY2Vzc19yZWYoKSBhbmQgY2hlY2sgdGhlCnN1Y2Nlc3Mgb2YgdGhh
dCBvcGVyYXRpb24gaW5zdGVhZC4KClRoaXMgaXMgQ1ZFLTIwMjItMjMwMzcg
LyBwYXJ0IG9mIFhTQS0zOTYuCgpSZXBvcnRlZC1ieTogRGVtaSBNYXJpZSBP
YmVub3VyIDxkZW1pQGludmlzaWJsZXRoaW5nc2xhYi5jb20+ClNpZ25lZC1v
ZmYtYnk6IEp1ZXJnZW4gR3Jvc3MgPGpncm9zc0BzdXNlLmNvbT4KUmV2aWV3
ZWQtYnk6IEphbiBCZXVsaWNoIDxqYmV1bGljaEBzdXNlLmNvbT4KLS0tCiBk
cml2ZXJzL25ldC94ZW4tbmV0ZnJvbnQuYyB8IDYgKystLS0tCiAxIGZpbGUg
Y2hhbmdlZCwgMiBpbnNlcnRpb25zKCspLCA0IGRlbGV0aW9ucygtKQoKZGlm
ZiAtLWdpdCBhL2RyaXZlcnMvbmV0L3hlbi1uZXRmcm9udC5jIGIvZHJpdmVy
cy9uZXQveGVuLW5ldGZyb250LmMKaW5kZXggOGIxODI0NmFkOTk5Li43Mjdj
MDJlYmQxMmYgMTAwNjQ0Ci0tLSBhL2RyaXZlcnMvbmV0L3hlbi1uZXRmcm9u
dC5jCisrKyBiL2RyaXZlcnMvbmV0L3hlbi1uZXRmcm9udC5jCkBAIC00MjQs
MTQgKzQyNCwxMiBAQCBzdGF0aWMgYm9vbCB4ZW5uZXRfdHhfYnVmX2djKHN0
cnVjdCBuZXRmcm9udF9xdWV1ZSAqcXVldWUpCiAJCQlxdWV1ZS0+dHhfbGlu
a1tpZF0gPSBUWF9MSU5LX05PTkU7CiAJCQlza2IgPSBxdWV1ZS0+dHhfc2ti
c1tpZF07CiAJCQlxdWV1ZS0+dHhfc2tic1tpZF0gPSBOVUxMOwotCQkJaWYg
KHVubGlrZWx5KGdudHRhYl9xdWVyeV9mb3JlaWduX2FjY2VzcygKLQkJCQlx
dWV1ZS0+Z3JhbnRfdHhfcmVmW2lkXSkgIT0gMCkpIHsKKwkJCWlmICh1bmxp
a2VseSghZ250dGFiX2VuZF9mb3JlaWduX2FjY2Vzc19yZWYoCisJCQkJcXVl
dWUtPmdyYW50X3R4X3JlZltpZF0sIEdOVE1BUF9yZWFkb25seSkpKSB7CiAJ
CQkJZGV2X2FsZXJ0KGRldiwKIAkJCQkJICAiR3JhbnQgc3RpbGwgaW4gdXNl
IGJ5IGJhY2tlbmQgZG9tYWluXG4iKTsKIAkJCQlnb3RvIGVycjsKIAkJCX0K
LQkJCWdudHRhYl9lbmRfZm9yZWlnbl9hY2Nlc3NfcmVmKAotCQkJCXF1ZXVl
LT5ncmFudF90eF9yZWZbaWRdLCBHTlRNQVBfcmVhZG9ubHkpOwogCQkJZ250
dGFiX3JlbGVhc2VfZ3JhbnRfcmVmZXJlbmNlKAogCQkJCSZxdWV1ZS0+Z3Jl
Zl90eF9oZWFkLCBxdWV1ZS0+Z3JhbnRfdHhfcmVmW2lkXSk7CiAJCQlxdWV1
ZS0+Z3JhbnRfdHhfcmVmW2lkXSA9IEdSQU5UX0lOVkFMSURfUkVGOwotLSAK
Mi4zNC4xCgo=

--=separator
Content-Type: application/octet-stream; name="xsa396-linux-05.patch"
Content-Disposition: attachment; filename="xsa396-linux-05.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa396-linux-06.patch"
Content-Disposition: attachment; filename="xsa396-linux-06.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa396-linux-07.patch"
Content-Disposition: attachment; filename="xsa396-linux-07.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa396-linux-08.patch"
Content-Disposition: attachment; filename="xsa396-linux-08.patch"
Content-Transfer-Encoding: base64

RnJvbSA1MmIwZTVlZTI4ZTAyYTdhMzQ5MTRjYTA5NzYxZjVmNDg1YjBmM2M2
IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBKdWVyZ2VuIEdyb3Nz
IDxqZ3Jvc3NAc3VzZS5jb20+CkRhdGU6IEZyaSwgMjUgRmViIDIwMjIgMTY6
MDU6NDIgKzAxMDAKU3ViamVjdDogW1BBVENIIDA4LzEyXSB4ZW4vdXNiOiBk
b24ndCB1c2UgZ250dGFiX2VuZF9mb3JlaWduX2FjY2VzcygpIGluCiB4ZW5o
Y2RfZ250dGFiX2RvbmUoKQoKVGhlIHVzYWdlIG9mIGdudHRhYl9lbmRfZm9y
ZWlnbl9hY2Nlc3MoKSBpbiB4ZW5oY2RfZ250dGFiX2RvbmUoKSBpcwpub3Qg
c2FmZSBhZ2FpbnN0IGEgbWFsaWNpb3VzIGJhY2tlbmQsIGFzIHRoZSBiYWNr
ZW5kIGNvdWxkIGtlZXAgdGhlCkkvTyBwYWdlIG1hcHBlZCBhbmQgbW9kaWZ5
IGl0IGV2ZW4gYWZ0ZXIgdGhlIGdyYW50ZWQgbWVtb3J5IHBhZ2UgaXMKYmVp
bmcgdXNlZCBmb3IgY29tcGxldGVseSBvdGhlciBwdXJwb3NlcyBpbiB0aGUg
bG9jYWwgc3lzdGVtLgoKU28gcmVwbGFjZSB0aGF0IHVzZSBjYXNlIHdpdGgg
Z250dGFiX3RyeV9lbmRfZm9yZWlnbl9hY2Nlc3MoKSBhbmQKZGlzYWJsZSB0
aGUgUFYgaG9zdCBhZGFwdGVyIGluIGNhc2UgdGhlIGJhY2tlbmQgZGlkbid0
IHN0b3AgdXNpbmcgdGhlCmdyYW50ZWQgcGFnZS4KCkluIHhlbmhjZF91cmJf
cmVxdWVzdF9kb25lKCkgaW1tZWRpYXRlbHkgcmV0dXJuIGluIGNhc2Ugb2Yg
c2V0dGluZwp0aGUgZGV2aWNlIHN0YXRlIHRvICJlcnJvciIgaW5zdGVhZCBv
ZiBsb29raW5nIGludG8gZnVydGhlciBiYWNrZW5kCnJlc3BvbnNlcy4KClJl
cG9ydGVkLWJ5OiBEZW1pIE1hcmllIE9iZW5vdXIgPGRlbWlAaW52aXNpYmxl
dGhpbmdzbGFiLmNvbT4KU2lnbmVkLW9mZi1ieTogSnVlcmdlbiBHcm9zcyA8
amdyb3NzQHN1c2UuY29tPgpSZXZpZXdlZC1ieTogSmFuIEJldWxpY2ggPGpi
ZXVsaWNoQHN1c2UuY29tPgotLS0KIGRyaXZlcnMvdXNiL2hvc3QveGVuLWhj
ZC5jIHwgMjYgKysrKysrKysrKysrKysrKysrLS0tLS0tLS0KIDEgZmlsZSBj
aGFuZ2VkLCAxOCBpbnNlcnRpb25zKCspLCA4IGRlbGV0aW9ucygtKQoKZGlm
ZiAtLWdpdCBhL2RyaXZlcnMvdXNiL2hvc3QveGVuLWhjZC5jIGIvZHJpdmVy
cy91c2IvaG9zdC94ZW4taGNkLmMKaW5kZXggYmUwOWZkOWJhYzU4Li4xOWI4
YzdlZDc0Y2IgMTAwNjQ0Ci0tLSBhL2RyaXZlcnMvdXNiL2hvc3QveGVuLWhj
ZC5jCisrKyBiL2RyaXZlcnMvdXNiL2hvc3QveGVuLWhjZC5jCkBAIC03MTYs
OCArNzE2LDkgQEAgc3RhdGljIGludCB4ZW5oY2RfbWFwX3VyYl9mb3JfcmVx
dWVzdChzdHJ1Y3QgeGVuaGNkX2luZm8gKmluZm8sIHN0cnVjdCB1cmIgKnVy
YiwKIAlyZXR1cm4gMDsKIH0KIAotc3RhdGljIHZvaWQgeGVuaGNkX2dudHRh
Yl9kb25lKHN0cnVjdCB1c2Jfc2hhZG93ICpzaGFkb3cpCitzdGF0aWMgdm9p
ZCB4ZW5oY2RfZ250dGFiX2RvbmUoc3RydWN0IHhlbmhjZF9pbmZvICppbmZv
LCB1bnNpZ25lZCBpbnQgaWQpCiB7CisJc3RydWN0IHVzYl9zaGFkb3cgKnNo
YWRvdyA9IGluZm8tPnNoYWRvdyArIGlkOwogCWludCBucl9zZWdzID0gMDsK
IAlpbnQgaTsKIApAQCAtNzI2LDggKzcyNywxMCBAQCBzdGF0aWMgdm9pZCB4
ZW5oY2RfZ250dGFiX2RvbmUoc3RydWN0IHVzYl9zaGFkb3cgKnNoYWRvdykK
IAlpZiAoeGVudXNiX3BpcGVpc29jKHNoYWRvdy0+cmVxLnBpcGUpKQogCQlu
cl9zZWdzICs9IHNoYWRvdy0+cmVxLnUuaXNvYy5ucl9mcmFtZV9kZXNjX3Nl
Z3M7CiAKLQlmb3IgKGkgPSAwOyBpIDwgbnJfc2VnczsgaSsrKQotCQlnbnR0
YWJfZW5kX2ZvcmVpZ25fYWNjZXNzKHNoYWRvdy0+cmVxLnNlZ1tpXS5ncmVm
LCAwLCAwVUwpOworCWZvciAoaSA9IDA7IGkgPCBucl9zZWdzOyBpKyspIHsK
KwkJaWYgKCFnbnR0YWJfdHJ5X2VuZF9mb3JlaWduX2FjY2VzcyhzaGFkb3ct
PnJlcS5zZWdbaV0uZ3JlZikpCisJCQl4ZW5oY2Rfc2V0X2Vycm9yKGluZm8s
ICJiYWNrZW5kIGRpZG4ndCByZWxlYXNlIGdyYW50Iik7CisJfQogCiAJc2hh
ZG93LT5yZXEubnJfYnVmZmVyX3NlZ3MgPSAwOwogCXNoYWRvdy0+cmVxLnUu
aXNvYy5ucl9mcmFtZV9kZXNjX3NlZ3MgPSAwOwpAQCAtODQxLDcgKzg0NCw5
IEBAIHN0YXRpYyB2b2lkIHhlbmhjZF9jYW5jZWxfYWxsX2VucXVldWVkX3Vy
YnMoc3RydWN0IHhlbmhjZF9pbmZvICppbmZvKQogCWxpc3RfZm9yX2VhY2hf
ZW50cnlfc2FmZSh1cmJwLCB0bXAsICZpbmZvLT5pbl9wcm9ncmVzc19saXN0
LCBsaXN0KSB7CiAJCXJlcV9pZCA9IHVyYnAtPnJlcV9pZDsKIAkJaWYgKCF1
cmJwLT51bmxpbmtlZCkgewotCQkJeGVuaGNkX2dudHRhYl9kb25lKCZpbmZv
LT5zaGFkb3dbcmVxX2lkXSk7CisJCQl4ZW5oY2RfZ250dGFiX2RvbmUoaW5m
bywgcmVxX2lkKTsKKwkJCWlmIChpbmZvLT5lcnJvcikKKwkJCQlyZXR1cm47
CiAJCQlpZiAodXJicC0+dXJiLT5zdGF0dXMgPT0gLUVJTlBST0dSRVNTKQog
CQkJCS8qIG5vdCBkZXF1ZXVlZCAqLwogCQkJCXhlbmhjZF9naXZlYmFja191
cmIoaW5mbywgdXJicC0+dXJiLApAQCAtOTQyLDggKzk0Nyw3IEBAIHN0YXRp
YyBpbnQgeGVuaGNkX3VyYl9yZXF1ZXN0X2RvbmUoc3RydWN0IHhlbmhjZF9p
bmZvICppbmZvKQogCXJwID0gaW5mby0+dXJiX3Jpbmcuc3JpbmctPnJzcF9w
cm9kOwogCWlmIChSSU5HX1JFU1BPTlNFX1BST0RfT1ZFUkZMT1coJmluZm8t
PnVyYl9yaW5nLCBycCkpIHsKIAkJeGVuaGNkX3NldF9lcnJvcihpbmZvLCAi
SWxsZWdhbCBpbmRleCBvbiB1cmItcmluZyIpOwotCQlzcGluX3VubG9ja19p
cnFyZXN0b3JlKCZpbmZvLT5sb2NrLCBmbGFncyk7Ci0JCXJldHVybiAwOwor
CQlnb3RvIGVycjsKIAl9CiAJcm1iKCk7IC8qIGVuc3VyZSB3ZSBzZWUgcXVl
dWVkIHJlc3BvbnNlcyB1cCB0byAicnAiICovCiAKQEAgLTk1MiwxMSArOTU2
LDEzIEBAIHN0YXRpYyBpbnQgeGVuaGNkX3VyYl9yZXF1ZXN0X2RvbmUoc3Ry
dWN0IHhlbmhjZF9pbmZvICppbmZvKQogCQlpZCA9IHJlcy5pZDsKIAkJaWYg
KGlkID49IFhFTlVTQl9VUkJfUklOR19TSVpFKSB7CiAJCQl4ZW5oY2Rfc2V0
X2Vycm9yKGluZm8sICJJbGxlZ2FsIGRhdGEgb24gdXJiLXJpbmciKTsKLQkJ
CWNvbnRpbnVlOworCQkJZ290byBlcnI7CiAJCX0KIAogCQlpZiAobGlrZWx5
KHhlbnVzYl9waXBlc3VibWl0KGluZm8tPnNoYWRvd1tpZF0ucmVxLnBpcGUp
KSkgewotCQkJeGVuaGNkX2dudHRhYl9kb25lKCZpbmZvLT5zaGFkb3dbaWRd
KTsKKwkJCXhlbmhjZF9nbnR0YWJfZG9uZShpbmZvLCBpZCk7CisJCQlpZiAo
aW5mby0+ZXJyb3IpCisJCQkJZ290byBlcnI7CiAJCQl1cmIgPSBpbmZvLT5z
aGFkb3dbaWRdLnVyYjsKIAkJCWlmIChsaWtlbHkodXJiKSkgewogCQkJCXVy
Yi0+YWN0dWFsX2xlbmd0aCA9IHJlcy5hY3R1YWxfbGVuZ3RoOwpAQCAtOTc4
LDYgKzk4NCwxMCBAQCBzdGF0aWMgaW50IHhlbmhjZF91cmJfcmVxdWVzdF9k
b25lKHN0cnVjdCB4ZW5oY2RfaW5mbyAqaW5mbykKIAlzcGluX3VubG9ja19p
cnFyZXN0b3JlKCZpbmZvLT5sb2NrLCBmbGFncyk7CiAKIAlyZXR1cm4gbW9y
ZV90b19kbzsKKworIGVycjoKKwlzcGluX3VubG9ja19pcnFyZXN0b3JlKCZp
bmZvLT5sb2NrLCBmbGFncyk7CisJcmV0dXJuIDA7CiB9CiAKIHN0YXRpYyBp
bnQgeGVuaGNkX2Nvbm5fbm90aWZ5KHN0cnVjdCB4ZW5oY2RfaW5mbyAqaW5m
bykKLS0gCjIuMzQuMQoK

--=separator
Content-Type: application/octet-stream; name="xsa396-linux-09.patch"
Content-Disposition: attachment; filename="xsa396-linux-09.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa396-linux-10.patch"
Content-Disposition: attachment; filename="xsa396-linux-10.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa396-linux-11.patch"
Content-Disposition: attachment; filename="xsa396-linux-11.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa396-linux-12.patch"
Content-Disposition: attachment; filename="xsa396-linux-12.patch"
Content-Transfer-Encoding: base64
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--=separator--


From xen-devel-bounces@lists.xenproject.org Thu Mar 10 12:28:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 12:28:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288390.489003 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSHtR-0004nr-9j; Thu, 10 Mar 2022 12:27:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288390.489003; Thu, 10 Mar 2022 12:27:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSHtR-0004nk-53; Thu, 10 Mar 2022 12:27:45 +0000
Received: by outflank-mailman (input) for mailman id 288390;
 Thu, 10 Mar 2022 12:27:44 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=XE96=TV=citrix.com=prvs=0613c794d=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nSHtQ-0004ne-56
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 12:27:44 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 79eff541-a06d-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 13:27:41 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 79eff541-a06d-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646915261;
  h=from:to:subject:date:message-id:content-id:
   content-transfer-encoding:mime-version;
  bh=3qZMNVGZCiP4mGgElYaJw6QWZWK6tEObc9fFLKUfK9s=;
  b=YsB9uAwrUYpLoIKo/gYzkns94zIwhm/pBgz57flyOG/ohwj5MYT2jql+
   m3Rr6hmcZAYU+NOQ4tYCU3KPI/4oLJdC5CFzSGWazEBnCvcg1IEvaQpkj
   Urwu4Y35GSCxF5mzHQpBK5flHxS01inchS6s02ZAIzG7MArR+gPd6U+8C
   o=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65836836
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:pR8q9KsdJWCb5TQ2jKqs6eDOeOfnVBVZMUV32f8akzHdYApBsoF/q
 tZmKWyEbP/bZGX9Ld93Pt+0/RsGv5CGzN81QAA+/yBkEygQ+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jU4
 YuryyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi8PYb/cwsocTSADDgZfBPNh2LjFIluG5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvllJyz3DAOlgapfEW6jQvvdT3Ssqh9AIFvHbD
 yYcQWQyPE+eM0YRUrsRIIoegOr51kHRSRxZpUC4qrY34Ev3nSUkhdABN/KKI4fXFK25hH2wp
 WXA5W31RA4bMN+3ziCM+XahwOTImEvTX4YfF6ax8PJwt0GC3WwYCBAQVlyTrOGwjwi1XNc3A
 0AT9yAjqYA78UW5Sd+7UxDQiHucuR4YUtFTO+Q/4ROKzOzY7m6xA2sZZjdEYc4hsok6SFQC/
 FKTg8ngAzAplbSPUG+c7Z+dtzb0Mi8QRUcAbyIZSQoO4/H4vZo+yBnIS75LAKOzy9H4Bzz06
 zSLtzQlwaUei9YR0Ke29kyBhCijzrDWSiYl6wORWXiqhitif5KsbYGs7Vnd7N5DIZyfQ13Hu
 2IL8+Cc8eQPAJelhCGLBuIXE9mUC+2taWOGxwQ1Rt94qmrrqyXLkZ1sDC9WAhh7IpwqeCHQO
 1L0mDoPw79UPniJVPoiC26uMPgCwa/lHNXjc/nbaNtSf5R8HDO6EDFSiV24hD60zhV1+U0rE
 dLCKJv3Uy5GYUhy5GfuH48gPakXKjfSLI85bbTy1FyZ3LWXfxZ5op9VYQLVPojVAE5pyTg5E
 uqz1ePXk32zs8WkO0E7FLL/y3hQcxDX4ris96RqmhareFYOJY3YI6a5LUkdU4Jkhb9JsezD4
 2uwXERVoHKm2yGZeVjTMSs7NuOxNXqakZ7dFXZ8VbpP8yJ/CbtDEY9FL8dnFVXZ3LALIQFIo
 wktJJzbX6UnpsXv8DUBd5jtxLGOhzzw7T9iyxGNOWBlF7Y5HlSh0oa9ImPHqXlfZgLq5JBWi
 +DxiWvmrW8rGl0K4DD+M6n0kTtcfBE1xYpPYqc/CoIKKRu2r9QydXCZYz1eC5hkFCgvDwCyj
 m6+KRwZufPMs8ky9tzIjrqDtICnD611GU8yIoURxeze2fXyloZ7/bJ9bQ==
IronPort-HdrOrdr: A9a23:vKpqTaFnd06f0WRPpLqFVZHXdLJyesId70hD6qkvc3Jom52j+P
 xGws526fatskdrZJm58erwdZVoMkmsj6KdhrNhcYtKPTOW8ldASbsC0WKM+UyYJ8STzJ8+6U
 4CSdkwNDSTNykDsS+S2mDReLxMoKjlzEnBv5aG854Hd3APV0gU1XYeNu/tKDwQeOApP+tdKL
 Osou584xawc3Ueacq2QlMfWfLYmtHNnJX6JTYbGh8O8mC1/H2VwY+/NyLd8gYVUjtJz7tn23
 PCiRbF6qKqtOz+4gPA1lXU849dlLLau5p+7Y23+4gowwfX+0SVjbdaKvi/VfcO0aWSAWMR4Z
 rxStEbToNOAj3qDyeISFDWqnTdOX4VmgPfIBmj8CPeSIXCNUwH44Aqv/MnTjLJr0Unp91yy6
 RNwiaQsIdWFwrJmGDn68HPTAwCrDv8nZMOq59ls5Vka/ppVFaRl/1swGpFVJMbWC7q4oEuF+
 djSMna+fZNaFufK3TUpHNmztCgVmk6Wk7ueDlIhuWFlzxN2HxpxUoRw8IS2n8G6ZImUpFBo+
 DJKL5hmr1CRtIfKah9GOACS82qDXGle2OFDEuCZVD8UK0XMXPErJD6pL0z+eGxYZQNiIA/nZ
 zQOWkowVLau3iefPFm8Kc7giwlGl/NLAgF4vsulKREhg==
X-IronPort-AV: E=Sophos;i="5.90,170,1643691600"; 
   d="scan'208";a="65836836"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=LGInGvEVPtBZe5ACQGq3x+TheC5neOefg/xrD7FhDouBKnFuxwmh3JVuEN5F5Zcs1bmsQw9/aQvIWR/kVyZUeFwuLs2h+N4fNfmHH23M8TxIvPUzTP7qEthP38A7DIBRF1ybDB+RV74Ek6/qFV0/dfBIwyZCM42RfwnPPZH4SGtA9pPEpEPO2XA/lXtsopz/m3v2d6aEPvJt/uw3umPr5QLKzIQ9ZbxM+oyYw23HGWX/U2ZtO/ITnEoGfob6UWz/jScpBvN1U3oVBJQihY8bs3zI0sIoCHEqACneNH4AXqt4hwO15i/W86xdhjf1ftyAxClVMjBuoDBkKeAQQdz+7w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=3qZMNVGZCiP4mGgElYaJw6QWZWK6tEObc9fFLKUfK9s=;
 b=Qn1URTsC3LZUr6Lo3NI4j95JVaXUUzD+Dda2Tf3MeVmUW//eZJx7bxsulwEL6w8gmjbUU0iV0BFQLdm8bAlocrgJpmiNUHF7WFcvSrM/Ckes03BrjdopQGoUDGwkMCAJQSWzrcBDMOsyLnyj6HTu783Mhzz4SZ5qwGM/YyMYFU/fKQqmySo/S1/PrJha/y5zDy2efACnzwtVev9O4N3NIHp/fcol3d+9x8wF6OFWJ+a6isEEnBNljOwYNb6+NZeMhxxFkU5cQkZ2lkRjhxwd7J2vy82ibF9zAXMxrOkwbVs3yTXpfihhfY9udUtkFkCmRCu3+dPcOXlWvWB2fmwabw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=3qZMNVGZCiP4mGgElYaJw6QWZWK6tEObc9fFLKUfK9s=;
 b=G9i4TrQGk1KwNEA8IE6IN5HxP0hmyVs63bQeM7GzC8XPaDwOFFBP9QmUuZ4M25nScDIECXVot+pzyKmnFeN7trHbZr//jERZ6a8dhIuDTpV+SNTGYW5vTn+G/anD+TeF0poLZ8rpyClwioNrkHb+aKanQsY3A1Xl6Zu9SIer5co=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: xen-devel <xen-devel@lists.xenproject.org>, Jan Beulich
	<jbeulich@suse.com>, Roger Pau Monne <roger.pau@citrix.com>, Wei Liu
	<wl@xen.org>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Bertrand Marquis <Bertrand.Marquis@arm.com>,
	Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com>, Konrad Rzeszutek Wilk
	<konrad.wilk@oracle.com>, Ross Lagerwall <ross.lagerwall@citrix.com>, "Bjoern
 Doebel" <doebel@amazon.de>, Michael Kurth <mku@amazon.de>, "Pohlack, Martin"
	<mpohlack@amazon.de>
Subject: alternatives+livepatch testing
Thread-Topic: alternatives+livepatch testing
Thread-Index: AQHYNHo4adxTGvvXZUC/Revy/sIkdQ==
Date: Thu, 10 Mar 2022 12:27:34 +0000
Message-ID: <09e936c8-1110-a67b-cc67-9cf5ed5a3615@citrix.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 40ac8bc0-f427-4aa7-01b9-08da02915b2f
x-ms-traffictypediagnostic: SN6PR03MB3952:EE_
x-microsoft-antispam-prvs: <SN6PR03MB39529C75377EB8AA51CACAD3BA0B9@SN6PR03MB3952.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(38100700002)(8676002)(64756008)(66556008)(86362001)(36756003)(66946007)(91956017)(7416002)(2906002)(66446008)(66476007)(76116006)(2616005)(186003)(26005)(71200400001)(31686004)(83380400001)(508600001)(6506007)(6512007)(8936002)(316002)(3480700007)(31696002)(82960400001)(6486002)(5660300002)(110136005)(38070700005)(921005)(122000001)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?ZVJLZTRSa3IwYU4vdllSUnhVeCtacmJleU1YOEVrb2prYmtIUkRuditrQlNt?=
 =?utf-8?B?ZzQvK1dsaEJtWWtSRzBqUzFMelQ2RlhYK1d4dTZNcmlnOEQxUEtkMXpoTnV5?=
 =?utf-8?B?N1Y2NGtvTVlnT1F5UGhMcTJTNmUrak56OUJKNFoxdklUYnNGOFBXQnJPOUQ0?=
 =?utf-8?B?bXhkTTFabWZodnZwUjFmMkptczR4bGlKUmIzSUtSenI3bGNYdFVsWjlzTjYw?=
 =?utf-8?B?U3BtOW5JemJBbThjcnE3L2htT2dPZElIZGI0OG85QklLc3hSTk9yajg3NmRi?=
 =?utf-8?B?MDZGOEwzS1lDNjllUzNJNGxyRS9URXBEYnhKb0xBa2txYzFKRitNdUcwbmpj?=
 =?utf-8?B?N3owTm5pRUlyM3BTZURicUhDWjlKU1NkTEZURDR5U3ZIbFkwWHg2WlBaaFR3?=
 =?utf-8?B?c28xMTg4UmRJbURhMG5CQ21yY1lKa3FpZytVTGxSdzNTSXZTRWpkeWhzS3hL?=
 =?utf-8?B?NTdHMVZWNkFMTTU4QndWUUl5WFRXYkt2N2VyN0JzT1VqZ0pwTERRNXMyK3Bt?=
 =?utf-8?B?KzErOXlzU242YlNJdEsyNDQyVzh2SitmYW1BZWMzRXhuSlVIZGFFV3huYWFo?=
 =?utf-8?B?UkthTVFNU1ZGaWQzeUVFZG42WXI3N2JRS3FDNU51eXBXbzhFVE5mV296OTJZ?=
 =?utf-8?B?SkQ4QXYxbFhJd3RNdzNDVUFWaEVhMGxsR01qR2Z2bncrYTRuY3paUGQ1bGhH?=
 =?utf-8?B?MXIyN2hrQ1l3M1lZMUJaWnQzSlZnUkZBT09vbG9Tb0lmM3lKNEYwLzFnOTRx?=
 =?utf-8?B?UFdBRDE1ZVFITzFjUFVCbEROUFBnTGZNQjJ2UmRValcrOWZxdzJXa2lNUkFP?=
 =?utf-8?B?VzRXcGZNL1h0cW5zTTRadXk0elZjVTdHeWdRRVQvQWpvbE1TN1hNbHFYU1FM?=
 =?utf-8?B?V2xSK2ZnUFdTYVRJNVhZMzlleEwrTkkvbFhaVU5ld2V3eHl0c3E4RURaU2Uy?=
 =?utf-8?B?ME9ibTFRdzBjSitRY09mRGd5OURCRkJxYytGSlI2OWU5RDdGOHpZUEhqZTJr?=
 =?utf-8?B?WUhCczVrZFFBVDJac1V2USsxbzdWM09STDFnQ3Nma05OVkdBMzgzU1J0YjFM?=
 =?utf-8?B?Qzh5bVl0Nm1PVW11YTZENGE1OVpVNkJ3aEREeVVGRzh3VmtDYTduMVZQRzhH?=
 =?utf-8?B?cjdpRmczSlBwZ084blhNSGt3TGRBaXY1aC9qSy9BTWNXcE8xTEhxdVFvcmwz?=
 =?utf-8?B?YWFOZTdqUkVJenVTK0wrczA2TE4zRm5JbCtLbkFMSGRxU3ArZmFXc2I1YmVi?=
 =?utf-8?B?VGNaeU5qZjlUclRaSWJIbU9pbkpueUkrY1FXejEzWTRNWVJmN3pOeDNOYTND?=
 =?utf-8?B?eHdjNVRmSllUd1o0TmU0K0FJRFRtOVZMNTVvT3VxQUhmL1poc0J6SERmMVR3?=
 =?utf-8?B?Z0t6RS85WHgyRDV6R0FkYVlLVk11QTFnMm9MaVp4ZEExWkhYMitEa2hJZW9m?=
 =?utf-8?B?dGNaR1BySnBoOENzZ0xMYVYwTFpIQ1M3UXduOGVWNjVnUVNuZzdBdjhZamFs?=
 =?utf-8?B?TmdDeEE3K2VwTC82VXVrSTJMbStqZ2lmOWRVWFltdHo5RDZmTExsd1k1MUhi?=
 =?utf-8?B?ZjFKK1k3bXp1MVVzMm1KSm1hSTVIa1QyUW0rdGszUVNjZ1JBVW1IK3JqNGtp?=
 =?utf-8?B?VTE0ajM3SHRzV0tMbGxKeGtYbmJDeTRmVTh2VWlBZmY3aFNya2V0Z01KN0tk?=
 =?utf-8?B?V3N4RXJRNjJEclB6anJzUW9OUUJsUTByR3dCWE9YRnVwaFN4bWlFOThEOWJq?=
 =?utf-8?B?YXNoTEwxVytQa1liajRsaW1TNDBNZFY5Wkx0ejJ4OUlqaUpqNXV5S00yd2c5?=
 =?utf-8?B?ZDNOQ3FrYXRLMFMwc0l1aXdlRjJ3WG9DNUNyYVpZRDdCcUFWbGplaGhhdWZX?=
 =?utf-8?B?UWtYblpiWjZmWVYvYkJ1NU9XSUdXSDRnczhWRVhGYnRxc2ZJazNsWjhyZ0lP?=
 =?utf-8?B?WklqR0prUWJycDNpaEhjdmZWTTErNGtQb1E4U2d5cjg3UE53bXpJb2EvU2Q3?=
 =?utf-8?B?OFdobVBMVm81czFKaEJobFJ6eHRhemRCbWVsUGwrbU00ZnVCZ1JHOFUrek01?=
 =?utf-8?B?dGllN1ZHUUQva2JYalRlei9QMGNYQm8vcFNrNExub3BXbnpBRlUxNE5OS1Ns?=
 =?utf-8?B?S010NUdMd3ZORUc5WGl4MDA3YVhibFRJbTNOSHM2Sk5lbllEaVhlTTVKY1NU?=
 =?utf-8?B?K3ZvUHlqQVc4ZG15N2RCc3FZdHNDZ3JjNnVnaWloWlRyNlI3MlhpSzhidkZC?=
 =?utf-8?B?bWdPNDIzbFJaUm13ZXB6dHRTd09nPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <D76FF12039FA394780C3B2205B274DD8@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 40ac8bc0-f427-4aa7-01b9-08da02915b2f
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Mar 2022 12:27:34.8729
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: u+UK0hb1ZuSUnG1en7VWSK0ocTDV4v2f+c4gKXL9UGh+sAe/XzhjqFo3XfDADkZk4tgCJ43nq5LkWcoJ+aKfJZoP6xV61QHg1HP/sGANK4k=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR03MB3952
X-OriginatorOrg: citrix.com

SGVsbG8sDQoNClRoZSByZWNlbnQgaGljY3VwIHdpdGggQ0VULUlCVCwgYW5kIGRpc2NvdmVyeSB0
aGF0IGxpdmVwYXRjaC1idWlsZC10b29scw0KaGF2ZSBiZWVuIGJyb2tlbiBmb3Igc2V2ZXJhbCBy
ZWxlYXNlcywgZGVtb25zdHJhdGVzIHRoYXQgd2UgZG8gbm90IGhhdmUNCnJlbW90ZWx5IGFkZXF1
YXRlIHRlc3RpbmcgaW4gcGxhY2UuwqAgV2UgbmVlZCB0byBhZGRyZXNzLCBhbmQgZW5zdXJlIHdl
DQpkb24ndCBlbmQgdXAgaW4gdGhlIHNhbWUgcG9zaXRpb24gYWdhaW4uDQoNCkFsdGVybmF0aXZl
cyBhbmQgTGl2ZXBhdGNoaW5nIGhhdmUgYSBudW1iZXIgb2Ygb3ZlcmxhcHBpbmcgdGVzdA0KcmVx
dWlyZW1lbnRzLCBzbyBob3cgYWJvdXQgdGhlIGZvbGxvd2luZyBwbGFuOg0KDQoxKSBJbnRyb2R1
Y2UgYSBuZXcgJGFyY2gvc2NtLXRlc3RzLmMsIHdpdGggc29tZXRoaW5nIGFraW4gdG8gdGhlDQpl
eGlzdGluZyBzdHViX3NlbGZ0ZXN0KCkuwqAgSSdtIHRlbXB0ZWQgdG8gbW92ZSBzdHViX3NlbGZ0
ZXN0KCkgb3V0IG9mDQppbml0Y2FsbCBhbmQgY2FsbCBpdCBmcm9tIGluaXRfZG9uZSgpIChiZWZv
cmUgd2UgY2xvYmJlciAuaW5pdC50ZXh0KQ0KYmVjYXVzZSB0aGF0IGdldHMgc2hzdGsgdGVzdGlu
ZyBpbmNsdWRlZC4NCg0KRXZlbiB3aXRob3V0IGxpdmVwYXRjaGluZywgd2UndmUgZ290IHZhcmlv
dXMgcmVxdWlyZW1lbnRzIHN1Y2ggYXMNCmVuZGJyJ3Mgb25seSBleGlzdGluZyB3aGVyZSBleHBl
Y3RlZCwgYW5kIGdldHRpbmcgY2xvYmJlcmVkIHdoZW4NCnN1aXRhYmx5IGFubm90YXRlZCwgYW5k
IGFsdGNhbGxzIHR1cm5pbmcgaW50byBVRCBmb3IgYSBzdGlsbC1OVUxMIHBvaW50ZXIuDQoNCkl0
ZW1zIG5vdCB5ZXQgdXBzdHJlYW0gYnV0IG9uIHRoZSByYWRhciBpbmNsdWRlIGlubGluaW5nIG9m
IHJldHBvbGluZQ0KdGh1bmtzIGFuZCBTTFMgd29ya2Fyb3VuZHMsIHdoaWNoIHdvdWxkIGFsc28g
Zml0IGludG8gdGhpcy4NCg0KMikgUHJvdmlkZSAoaW4geGVuLmdpdCkgYSBwYXRjaCB0byBzY20t
dGVzdHMuYyB3aGljaCBPU1NUZXN0L290aGVyIGNhbg0KdXNlIGxpdmVwYXRjaC1idWlsZC10b29s
cyBvbiB0byBnZW5lcmF0ZSBhIHJlYWwgbGl2ZXBhdGNoLCBhbmQgYSBuZXcNCmxpdmVwYXRjaGlu
ZyBzdWJvcCB3aGljaCBjYW4gYmUgaW52b2tlZCBmcm9tIHhlbi1saXZlcGF0Y2ggaW4gdXNlcnNw
YWNlDQp0aGF0IHdpbGwgcnVuIHRoZSBzYW1lIGtpbmQgb2YgY29uc2lzdGVuY3kgY2hlY2tzIGFz
IDEpIG9uIHRoZSBwYXRjaGVkDQpjb250ZW50Lg0KDQpUaGlzIGxldHMgdXMgY3JlYXRlIHNwZWNp
ZmljIGNvbnN0cnVjdHMgYW5kIGNvbmZpcm0gdGhhdCB0aGV5IGdldA0KcGF0Y2hlZCBjb3JyZWN0
bHksIHdpdGhvdXQgaGF2aW5nIHRvIHNwZWNpZmljYWxseSBleGVjdXRlIHRoZSByZXN1bHQuwqAg
SQ0KKHRoaW5rKSB3ZSBjYW4gZG8gZXZlcnl0aGluZyBuZWVkZWQgd2l0aG91dCByZWZlcmVuY2Ug
dG8gdGhlIGxpdmVwYXRjaA0KbWV0YWRhdGEsIHdoaWNoIHNpbXBsaWZpZXMgdGhpbmdzLg0KDQpQ
cm92aWRpbmcgYSBwYXRjaCBpc24ndCB0b3RhbGx5IGlkZWFsIGZyb20gYSAibWFpbnRhaW5pbmcg
eGVuIiBwb2ludCBvZg0KdmlldywgYnV0IEkgdGhpbmsgd2UgY2FuIGhhdmUgYSBidWlsZC10aW1l
IHRlc3Qgd2hpY2ggY29uZmlybXMgdGhlIHBhdGNoDQppcyBzdGlsbCBnb29kLCBhbmQgaXQgaXMg
ZGVmaW5pdGVseSB0aGUgcmlnaHQgcHJpbWl0aXZlIHRvIHVzZSBmb3IgdGhlDQplbmQtdG8tZW5k
IHRlc3RpbmcuDQoNClRob3VnaHRzPw0KDQp+QW5kcmV3DQo=


From xen-devel-bounces@lists.xenproject.org Thu Mar 10 13:24:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 13:24:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288398.489014 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSIlr-0002OC-Kx; Thu, 10 Mar 2022 13:23:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288398.489014; Thu, 10 Mar 2022 13:23:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSIlr-0002O5-HL; Thu, 10 Mar 2022 13:23:59 +0000
Received: by outflank-mailman (input) for mailman id 288398;
 Thu, 10 Mar 2022 13:23:57 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSIlp-0002Ns-TD; Thu, 10 Mar 2022 13:23:57 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSIlp-0001LM-P4; Thu, 10 Mar 2022 13:23:57 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSIlp-0002K8-Dg; Thu, 10 Mar 2022 13:23:57 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSIlp-0000Cc-Br; Thu, 10 Mar 2022 13:23:57 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=WH3Ts43jDxFDRba8ROIWKYRlOdR+heUyYgkyZQ0QCGU=; b=N5E7PSmNs43/Sfn2IU37KOHSpV
	16fk3rznHydlJwH4GFu79dSEnDnVGhbnOiHEfdvscnHpdhqbHEkaJ1oVfLSmCEL73v6kEsWJTgKNQ
	Swz8VFIghQxWMy3EO52MrGAdAiuH8WHGkoIEXFI60+3ozqy7UmOU9ORw4Q0O6Lo0GZO4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168500-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168500: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=a5e659f071ae5f5fc9aadb46ad7c31736425f8cf
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 10 Mar 2022 13:23:57 +0000

flight 168500 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168500/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              a5e659f071ae5f5fc9aadb46ad7c31736425f8cf
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  608 days
Failing since        151818  2020-07-11 04:18:52 Z  607 days  589 attempts
Testing same since   168500  2022-03-10 05:28:55 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Martin Pitt <mpitt@debian.org>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 100328 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 10 14:13:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 14:13:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288409.489025 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSJXE-0007lw-Hg; Thu, 10 Mar 2022 14:12:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288409.489025; Thu, 10 Mar 2022 14:12:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSJXE-0007lp-Ei; Thu, 10 Mar 2022 14:12:56 +0000
Received: by outflank-mailman (input) for mailman id 288409;
 Thu, 10 Mar 2022 14:12:55 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSJXD-0007le-Jy; Thu, 10 Mar 2022 14:12:55 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSJXD-0002GJ-FC; Thu, 10 Mar 2022 14:12:55 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSJXC-0004B4-Ur; Thu, 10 Mar 2022 14:12:55 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSJXC-00085K-UP; Thu, 10 Mar 2022 14:12:54 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=DLnJfq+yankC7BgcfhmN23p76kDMCPWeYWRP6ZIKcIw=; b=VlJRsD/sSLcE6t32gSpnpIzpRe
	9Gq48l/Nnbhp1fCtBFYSNVDha/igS6XYAMmimBRtHyd6yBU158iTs0vG6f9O4sUc5Jzi4sz3UV7aB
	PYFBqnRejOgw77UUWicyo5F5wVG3HHn5pO0o90EUe5+WPUlZ+y7gwV25AGjzbzRo8GVg=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168493-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.14-testing test] 168493: FAIL
X-Osstest-Failures:
    xen-4.14-testing:test-armhf-armhf-xl-vhd:<job status>:broken:regression
    xen-4.14-testing:test-armhf-armhf-xl-vhd:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-i386-xl-qemut-debianhvm-i386-xsm:debian-hvm-install:fail:heisenbug
    xen-4.14-testing:test-arm64-arm64-xl:xen-boot:fail:heisenbug
    xen-4.14-testing:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=ca304edd3ba8c19211107fd2e898249987557ce5
X-Osstest-Versions-That:
    xen=496fb0be938a30971af05ffe0e58bb65643a0971
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 10 Mar 2022 14:12:54 +0000

flight 168493 xen-4.14-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168493/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-armhf-armhf-xl-vhd         <job status>                 broken  in 168482

Tests which are failing intermittently (not blocking):
 test-armhf-armhf-xl-vhd      5 host-install(5) broken in 168482 pass in 168493
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm 12 debian-hvm-install fail in 168482 pass in 168493
 test-arm64-arm64-xl           8 xen-boot                   fail pass in 168482

Tests which did not succeed, but are not blocking:
 test-arm64-arm64-xl         15 migrate-support-check fail in 168482 never pass
 test-arm64-arm64-xl     16 saverestore-support-check fail in 168482 never pass
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168061
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168061
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168061
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168061
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168061
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168061
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168061
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168061
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168061
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168061
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168061
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168061
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  ca304edd3ba8c19211107fd2e898249987557ce5
baseline version:
 xen                  496fb0be938a30971af05ffe0e58bb65643a0971

Last test of basis   168061  2022-02-08 18:37:46 Z   29 days
Testing same since   168482  2022-03-08 18:07:22 Z    1 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bertrand Marquis <bertrand.marquis@arm.com>
  Julien Grall <julien@xen.org>
  Rahul Singh <rahul.singh@arm.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          fail    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job test-armhf-armhf-xl-vhd broken

Not pushing.

------------------------------------------------------------
commit ca304edd3ba8c19211107fd2e898249987557ce5
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date:   Mon Mar 7 16:35:52 2022 +0000

    x86/spec-ctrl: Cease using thunk=lfence on AMD
    
    AMD have updated their Spectre v2 guidance, and lfence/jmp is no longer
    considered safe.  AMD are recommending using retpoline everywhere.
    
    Retpoline is incompatible with CET.  All CET-capable hardware has efficient
    IBRS (specifically, not something retrofitted in microcode), so use IBRS (and
    STIBP for consistency sake).
    
    This is a logical change on AMD, but not on Intel as the default calculations
    would end up with these settings anyway.  Leave behind a message if IBRS is
    found to be missing.
    
    Also update the default heuristics to never select THUNK_LFENCE.  This causes
    AMD CPUs to change their default to retpoline.
    
    Also update the printed message to include the AMD MSR_SPEC_CTRL settings, and
    STIBP now that we set it for consistency sake.
    
    This is part of XSA-398 / CVE-2021-26401.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
    Reviewed-by: Jan Beulich <jbeulich@suse.com>
    (cherry picked from commit 8d03080d2a339840d3a59e0932a94f804e45110d)

commit 7cebd77c80ce87f84c63a6043a5ad7115ccab9d5
Author: Bertrand Marquis <bertrand.marquis@arm.com>
Date:   Thu Feb 17 14:52:54 2022 +0000

    xen/arm: Allow to discover and use SMCCC_ARCH_WORKAROUND_3
    
    Allow guest to discover whether or not SMCCC_ARCH_WORKAROUND_3 is
    supported and create a fastpath in the code to handle guests request to
    do the workaround.
    
    The function SMCCC_ARCH_WORKAROUND_3 will be called by the guest for
    flushing the branch history. So we want the handling to be as fast as
    possible.
    
    As the mitigation is applied on every guest exit, we can check for the
    call before saving all context and return very early.
    
    This is part of XSA-398 / CVE-2022-23960.
    
    Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com>
    Reviewed-by: Julien Grall <julien@xen.org>
    (cherry picked from commit c0a56ea0fd92ecb471936b7355ddbecbaea3707c)

commit fc56dd212e4574c5fd77f830d077036b330dc1b5
Author: Rahul Singh <rahul.singh@arm.com>
Date:   Mon Feb 14 18:47:32 2022 +0000

    xen/arm: Add Spectre BHB handling
    
    This commit is adding Spectre BHB handling to Xen on Arm.
    The commit is introducing new alternative code to be executed during
    exception entry:
    - SMCC workaround 3 call
    - loop workaround (with 8, 24 or 32 iterations)
    - use of new clearbhb instruction
    
    Cpuerrata is modified by this patch to apply the required workaround for
    CPU affected by Spectre BHB when CONFIG_ARM64_HARDEN_BRANCH_PREDICTOR is
    enabled.
    
    To do this the system previously used to apply smcc workaround 1 is
    reused and new alternative code to be copied in the exception handler is
    introduced.
    
    To define the type of workaround required by a processor, 4 new cpu
    capabilities are introduced (for each number of loop and for smcc
    workaround 3).
    
    When a processor is affected, enable_spectre_bhb_workaround is called
    and if the processor does not have CSV2 set to 3 or ECBHB feature (which
    would mean that the processor is doing what is required in hardware),
    the proper code is enabled at exception entry.
    
    In the case where workaround 3 is not supported by the firmware, we
    enable workaround 1 when possible as it will also mitigate Spectre BHB
    on systems without CSV2.
    
    This is part of XSA-398 / CVE-2022-23960.
    
    Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com>
    Signed-off-by: Rahul Singh <rahul.singh@arm.com>
    Acked-by: Julien Grall <julien@xen.org>
    (cherry picked from commit 62c91eb66a2904eefb1d1d9642e3697a1e3c3a3c)

commit ee4b53ae1b95966fd9a491668f0eca73028925e1
Author: Bertrand Marquis <bertrand.marquis@arm.com>
Date:   Wed Feb 23 09:42:18 2022 +0000

    xen/arm: Add ECBHB and CLEARBHB ID fields
    
    Introduce ID coprocessor register ID_AA64ISAR2_EL1.
    Add definitions in cpufeature and sysregs of ECBHB field in mmfr1 and
    CLEARBHB in isar2 ID coprocessor registers.
    
    This is part of XSA-398 / CVE-2022-23960.
    
    Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com>
    Acked-by: Julien Grall <julien@xen.org>
    (cherry picked from commit 4b68d12d98b8790d8002fcc2c25a9d713374a4d7)

commit 6da7a845fb476ef7395185ec08a58c76ebd8c442
Author: Bertrand Marquis <bertrand.marquis@arm.com>
Date:   Tue Feb 15 10:39:47 2022 +0000

    xen/arm: move errata CSV2 check earlier
    
    CSV2 availability check is done after printing to the user that
    workaround 1 will be used. Move the check before to prevent saying to the
    user that workaround 1 is used when it is not because it is not needed.
    This will also allow to reuse install_bp_hardening_vec function for
    other use cases.
    
    Code previously returning "true", now returns "0" to conform to
    enable_smccc_arch_workaround_1 returning an int and surrounding code
    doing a "return 0" if workaround is not needed.
    
    This is part of XSA-398 / CVE-2022-23960.
    
    Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com>
    Reviewed-by: Julien Grall <julien@xen.org>
    (cherry picked from commit 599616d70eb886b9ad0ef9d6b51693ce790504ba)

commit 021466aa73caaa0c5983f02203678e649dd4d22c
Author: Bertrand Marquis <bertrand.marquis@arm.com>
Date:   Tue Feb 15 10:37:51 2022 +0000

    xen/arm: Introduce new Arm processors
    
    Add some new processor identifiers in processor.h and sync Xen
    definitions with status of Linux 5.17 (declared in
    arch/arm64/include/asm/cputype.h).
    
    This is part of XSA-398 / CVE-2022-23960.
    
    Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com>
    Acked-by: Julien Grall <julien@xen.org>
    (cherry picked from commit 35d1b85a6b43483f6bd007d48757434e54743e98)
(qemu changes not included)


From xen-devel-bounces@lists.xenproject.org Thu Mar 10 14:34:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 14:34:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288417.489035 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSJrx-0001jR-A6; Thu, 10 Mar 2022 14:34:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288417.489035; Thu, 10 Mar 2022 14:34:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSJrx-0001jK-7B; Thu, 10 Mar 2022 14:34:21 +0000
Received: by outflank-mailman (input) for mailman id 288417;
 Thu, 10 Mar 2022 14:34:19 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=g47H=TV=invisiblethingslab.com=marmarek@srs-se1.protection.inumbo.net>)
 id 1nSJrv-0001j9-Np
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 14:34:19 +0000
Received: from wout3-smtp.messagingengine.com (wout3-smtp.messagingengine.com
 [64.147.123.19]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 29968f09-a07f-11ec-8539-5f4723681683;
 Thu, 10 Mar 2022 15:34:17 +0100 (CET)
Received: from compute2.internal (compute2.nyi.internal [10.202.2.46])
 by mailout.west.internal (Postfix) with ESMTP id 897B93200D30;
 Thu, 10 Mar 2022 09:34:14 -0500 (EST)
Received: from mailfrontend1 ([10.202.2.162])
 by compute2.internal (MEProxy); Thu, 10 Mar 2022 09:34:15 -0500
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Thu,
 10 Mar 2022 09:34:12 -0500 (EST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 29968f09-a07f-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:cc:content-transfer-encoding
	:content-type:date:date:from:from:in-reply-to:message-id
	:mime-version:reply-to:sender:subject:subject:to:to:x-me-proxy
	:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm2; bh=+ofNMV
	OSWA1/XJphOOvDB6VXgIrvHKjSLBWQP2D64Co=; b=aw/hoPehRvcuF3BAcaR9u2
	gMBQCeGY2jzq+2OkGVuNE8BPJ7SRpUmtTyMelLvXwH6CkzNrmgFZToOHsXUyLEHI
	iJDLNyXgQ5mAEkkFfBAPLSVaD9AfiohVIOJt1khbijpDQc4z3gQO8Oa14vHSybbj
	bVoLUCdd10ol3OEA3hVvD437OmP4YmA1ce2YoO9ePpzpBRZJNiTkNXUA2bxEtML1
	B1QPGzZu2yvnpcz8FUWYR+hn9oCjoZ3bMZXANTDMvnEfZky7ors4D9D+iaexE3FA
	L35RfqfTNzBybga+4BnLij6MLxNt60MdsDX4GnWyNSoOiOq2b4fpz1NUbj+IJwVw
	==
X-ME-Sender: <xms:ZQwqYhp1yIkcsVgwotGCiY1wUXzKYniFO9Fg93uk5quQJcoSUMrCFA>
    <xme:ZQwqYjpUfYv4aVoXsQ5GR1iBIWvRHq_oK7Oo7u7KrSj4C_N5qu0DZMJZ1lHHiQA1p
    Vxxa59Zs7j2cQ>
X-ME-Received: <xmr:ZQwqYuNQ4eZiH05Qou4bAF2WJVnziGWaPRic4MPVaT4t--_iu7X5l0Xl5AdPTaWISwAWYjVKufuFFZs_9rKO2MatJEfvoC-xrA3neIKjgBLz6gcQup4>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddruddvtddgieehucetufdoteggodetrfdotf
    fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen
    uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne
    cujfgurhephffvufffkffogggtohfgsehtkeertdertdejnecuhfhrohhmpeforghrvghk
    ucforghrtgiihihkohifshhkihdqifpkrhgvtghkihcuoehmrghrmhgrrhgvkhesihhnvh
    hishhisghlvghthhhinhhgshhlrggsrdgtohhmqeenucggtffrrghtthgvrhhnpeetgeet
    keeukeffhfejueeludehtedtkeeuiedtgffgtdfhveefueeiiefhudehgeenucevlhhush
    htvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpehmrghrmhgrrhgvkhes
    ihhnvhhishhisghlvghthhhinhhgshhlrggsrdgtohhm
X-ME-Proxy: <xmx:ZQwqYs7OwmzJTy7HAYK4DQcNgyGUnHwxUlsnPOaU6jyjJCpGemlmJw>
    <xmx:ZQwqYg7m6tq-aVDtrJ1mu8tZPNWCDyVdWlAlMM6LXYzi2w-ngLP1Iw>
    <xmx:ZQwqYkgkg_qQPwbfwjFCx-I41j0E-kNvzrY6Ip0-P5knwqHIsstzpg>
    <xmx:ZgwqYqRm-F-Um74D6UZAtCU4wmqfNnD0J25RvWQktUC2IKE3Ul2ebA>
From: =?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: xen-devel@lists.xenproject.org
Cc: =?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>
Subject: [PATCH 1/2] ns16550: reject IRQ above nr_irqs
Date: Thu, 10 Mar 2022 15:34:02 +0100
Message-Id: <20220310143403.50944-1-marmarek@invisiblethingslab.com>
X-Mailer: git-send-email 2.31.1
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Organization: Invisible Things Lab
Content-Transfer-Encoding: 8bit

Intel LPSS has INTERRUPT_LINE set to 0xff by default, that can't
possibly work. While a proper IRQ configuration may be useful,
validating value retrieved from the hardware is still necessary. If it
fails, use the device in poll mode.

Signed-off-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
---
 xen/drivers/char/ns16550.c | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/xen/drivers/char/ns16550.c b/xen/drivers/char/ns16550.c
index e5b4a9085516..2d7c8c11bc69 100644
--- a/xen/drivers/char/ns16550.c
+++ b/xen/drivers/char/ns16550.c
@@ -1221,6 +1221,9 @@ pci_uart_config(struct ns16550 *uart, bool_t skip_amt, unsigned int idx)
                             pci_conf_read8(PCI_SBDF(0, b, d, f),
                                            PCI_INTERRUPT_LINE) : 0;
 
+                if (uart->irq >= nr_irqs)
+                    uart->irq = 0;
+
                 return 0;
             }
         }
-- 
2.31.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 14:34:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 14:34:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288418.489041 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSJrx-0001me-JM; Thu, 10 Mar 2022 14:34:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288418.489041; Thu, 10 Mar 2022 14:34:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSJrx-0001lw-E7; Thu, 10 Mar 2022 14:34:21 +0000
Received: by outflank-mailman (input) for mailman id 288418;
 Thu, 10 Mar 2022 14:34:20 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=g47H=TV=invisiblethingslab.com=marmarek@srs-se1.protection.inumbo.net>)
 id 1nSJrw-0001j9-93
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 14:34:20 +0000
Received: from wout3-smtp.messagingengine.com (wout3-smtp.messagingengine.com
 [64.147.123.19]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 2aff97be-a07f-11ec-8539-5f4723681683;
 Thu, 10 Mar 2022 15:34:19 +0100 (CET)
Received: from compute3.internal (compute3.nyi.internal [10.202.2.43])
 by mailout.west.internal (Postfix) with ESMTP id 657353200D25;
 Thu, 10 Mar 2022 09:34:17 -0500 (EST)
Received: from mailfrontend1 ([10.202.2.162])
 by compute3.internal (MEProxy); Thu, 10 Mar 2022 09:34:18 -0500
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Thu,
 10 Mar 2022 09:34:15 -0500 (EST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2aff97be-a07f-11ec-8539-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:cc:content-transfer-encoding
	:content-type:date:date:from:from:in-reply-to:in-reply-to
	:message-id:mime-version:references:reply-to:sender:subject
	:subject:to:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender
	:x-sasl-enc; s=fm2; bh=GGlD5fqFfDHwCS2CyKZrzEWK6VNmaqqEkjCd1dwys
	3E=; b=nAvSF+HvetmwTrmYzR6hO9z+RwIur5L+Wzpzs53Y+EDx6rtWWpis2HmnW
	wD9irOAuXdFBeXR4Pc9VQ6siRcIS7il7fM5mbiylWIHapF5Wys/Cv0dksb5nbeAJ
	teU3LTA0xooEG3BT95Bp5OHEppoKmvHAU6zSbgottfW8Y1B5rzOqP0rLuS2VOeph
	13Nd9MIO81Z4jS/ZEk0Jc2hF6qGg7EiWoMwTzmCn/N8G03I2DL2DloDmcxAD9Kvm
	866eugbxBF1hKfcuSJSW9dpiWbZPcRK7NEzoA5PQHDxmlNA5awBV5/OXag4TyUQT
	JiBhY17fAIWxhumMehCGM9IPWQl1g==
X-ME-Sender: <xms:aAwqYrMSVgRddA7mjT6DbuALnmXrJIRKntdyGWTVSc2Mouo800OE4g>
    <xme:aAwqYl_kbOxu671-XH0HkN0jPqiqUMft9Ckb5rsXvwUK-PoVfndG9qTIUmlpn_p99
    2ZLba3VLJRRYg>
X-ME-Received: <xmr:aAwqYqTufmDynZ3IppvqtZWmGikaS8639Y4EfyZhhs1qDOMlsBQLWG5USa-fl9tMifV3TShzPkURtmLKaGMWssJyLccXbgVDLlYvbvo5N6lgFFnwK4c>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddruddvtddgieeiucetufdoteggodetrfdotf
    fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen
    uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne
    cujfgurhephffvufffkffojghfgggtohfgsehtkeertdertdejnecuhfhrohhmpeforghr
    vghkucforghrtgiihihkohifshhkihdqifpkrhgvtghkihcuoehmrghrmhgrrhgvkhesih
    hnvhhishhisghlvghthhhinhhgshhlrggsrdgtohhmqeenucggtffrrghtthgvrhhnpeek
    jefhkeffkeekkeffiefhhffhledtgfejleeikeevffegfeelueehueeuleeljeenucevlh
    hushhtvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpehmrghrmhgrrhgv
    khesihhnvhhishhisghlvghthhhinhhgshhlrggsrdgtohhm
X-ME-Proxy: <xmx:aAwqYvtfhpxGzH8QaI9b4L8xGIBplfmX2Cfe-Kx5jogx6J2_jNy3iw>
    <xmx:aAwqYjckGsGfkSmkIuDlIPCGf0WgFv0BP0cfCgZWgdoAxHhrIsNvUA>
    <xmx:aAwqYr1xRUqwuS4kxt5cFqLzZO7eFmiBQz7V1XVBQuzJR6IF1Ywbuw>
    <xmx:aAwqYkHAMwT77VMOCgjL3cwRY-Dil_fAerfnavWRv2oQwDBorAjJLA>
From: =?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: xen-devel@lists.xenproject.org
Cc: =?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>
Subject: [PATCH 2/2] ns16550: Add support for Intel LPSS UART
Date: Thu, 10 Mar 2022 15:34:03 +0100
Message-Id: <20220310143403.50944-2-marmarek@invisiblethingslab.com>
X-Mailer: git-send-email 2.31.1
In-Reply-To: <20220310143403.50944-1-marmarek@invisiblethingslab.com>
References: <20220310143403.50944-1-marmarek@invisiblethingslab.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Organization: Invisible Things Lab
Content-Transfer-Encoding: 8bit

This adds support for serial console as found in a laptop with TGL-LP
(StarBook MkV). Since the device is on the bus 0, it needs to be enabled
via "com1=...,amt", not just "...,pci".

Device specification is in Intel docs 631119-007 and 631120-001.

Signed-off-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
---
This adds only a single device (UART#2) to the table - the only one I
have present, but the specification includes other device ids too. Should I
add them too? I don't have a way to test that, though.
---
 xen/drivers/char/ns16550.c | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)

diff --git a/xen/drivers/char/ns16550.c b/xen/drivers/char/ns16550.c
index 2d7c8c11bc69..edf981db22f4 100644
--- a/xen/drivers/char/ns16550.c
+++ b/xen/drivers/char/ns16550.c
@@ -91,6 +91,7 @@ struct ns16550_config {
         param_exar_xr17v352,
         param_exar_xr17v354,
         param_exar_xr17v358,
+        param_intel_lpss,
     } param;
 };
 
@@ -822,6 +823,16 @@ static const struct ns16550_config_param __initconst uart_param[] = {
         .mmio = 1,
         .max_ports = 8,
     },
+    [param_intel_lpss] = {
+        .uart_offset = 0x000,
+        .reg_shift = 2,
+        .reg_width = 1,
+        .fifo_size = 64,
+        .lsr_mask = UART_LSR_THRE,
+        .bar0 = 1,
+        .mmio = 1,
+        .max_ports = 1,
+    },
 };
 
 static const struct ns16550_config __initconst uart_config[] =
@@ -1066,6 +1077,12 @@ static const struct ns16550_config __initconst uart_config[] =
         .dev_id = 0x0358,
         .param = param_exar_xr17v358
     },
+    /* Intel Corp. TGL-LP LPSS PCI */
+    {
+        .vendor_id = PCI_VENDOR_ID_INTEL,
+        .dev_id = 0xa0c7,
+        .param = param_intel_lpss
+    },
 };
 
 static int __init
-- 
2.31.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 15:11:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 15:11:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288429.489057 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSKS8-0006eD-Fi; Thu, 10 Mar 2022 15:11:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288429.489057; Thu, 10 Mar 2022 15:11:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSKS8-0006e6-Ce; Thu, 10 Mar 2022 15:11:44 +0000
Received: by outflank-mailman (input) for mailman id 288429;
 Thu, 10 Mar 2022 15:11:42 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=VYsB=TV=citrix.com=prvs=061b0cdbb=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nSKS6-0006dy-Jg
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 15:11:42 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 5a94fb2e-a084-11ec-853a-5f4723681683;
 Thu, 10 Mar 2022 16:11:27 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5a94fb2e-a084-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646925100;
  h=from:to:cc:subject:date:message-id:
   content-transfer-encoding:mime-version;
  bh=6lltD7RbU95+l7kCtzVlCPCZzcfOoZJ1ClNq1SLzFtA=;
  b=g47g8Ud7NYp0zPcnzbHympIqIUhoKJcTGbJGW12EliY26ZBE5FPmpyVS
   qfj+zACJEzsiFQ/MzggWrZNrdUG72QZVlLfe4IFQdD6Gp8HcKO08FOIu1
   kkM358hJS1juO2paMjKXR9v0XsMJt4doStoAhGa7FiiSnpCbKMkVsgco3
   U=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65923541
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:Awc0qqu1g6peyPfyPthiAG928ufnVE1eMUV32f8akzHdYApBsoF/q
 tZmKWCAbP/ZZjbyfdhxOYWxoBgH7JOHmt4wTVA4pCgzFyND+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jU4
 YuoyyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi9qFZTspOYGbyUHPHhQIKRl6Y/uIGqW5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AO
 ptDMmczNXwsZTVEOnQ4BrUEldyhoWbPYSVK8wiOpagotj27IAtZj+G2bYu9lsaxbclSk0yVo
 krP+m3rBRdcONH34TmC9GiliqnQnCf4cIUIHba8+7hhh1j77nweDlgaWEW2pdG9i1WiQJRPJ
 koM4C0soKMuskuxQbHAswaQ+SDe+ERGApwJTrN8uFrlJrfoDxixRUM9bgJDc+Aa6+BvayEj9
 U65ttL7LGk62FGKck61+rCRpDK0HCEaK24eeCMJJTc4D8nfTJIb1UyWEIs6eEKhppisQGyrn
 WjWxMQrr+hL1aY2O7OHEUcrat5GjrzAVUYL6wreRQpJBSspNdf+N+REBbU2hMuszbp1rHHc5
 BDoeODEtYji6K1hcgTXHo3h+5nzu5643MX02wIHInXY323FF4SfVY5R+ipiA0xiL9wJfzTkC
 GeK518PtMIKZyDyM/8pC25UNyjM5fKwfTgCfqqIBuein7ArLFPXlM2QTRL4M5/RfLgEzvhkZ
 MbznTeEBncGE6V3pAdatM9GuYLHMhsWnDuJLbiilkzP+ePHOBa9FOdUWHPTP7tRxP7V/23oH
 yN3apLiJ+N3C7alPEE6MOc7cDg3EJTMLcuv+pINKbLbfFYO9aNII6a5/I7NsrdNxsx9vuzJ4
 mu8Sglfzl/+jmfAMgKEdjZob7aHYHq1hShT0fAEVbpw50UeXA==
IronPort-HdrOrdr: A9a23:LY3bUq1tWlepBLGz/kzbZAqjBURyeYIsimQD101hICG9Lfb2qy
 n+ppgmPEHP5Qr5OEtApTiBUJPwJU80kqQFm7X5XI3SJzUO3VHHEGgM1/qF/9SNIVydygc/79
 YeT0EdMqyIMbESt6+Ti2PZYrUdKbG8gdyVbIzlvhBQpG9RGsRdB1ATMHfnLqQ6fngxObMJUL
 6nouZXrTupfnoaKuy9G3k+RuDG4/nGjojvbxIqDwMurFDmt0Lh1JfKVzyjmjsOWTJGxrkvtU
 DDjgzC/62m99W20AXV2WP/54lf3PHh1txALsqRjdV9EESkti+YIKBaH5GStjE8p++irH4sjd
 n3uh8le/9+7nvAF1vF1CfF6k3F6nID+nXiwViXjT/IusriXg83DMJHmMZwbgbZw1BIhqAw7I
 t7m0ai87ZHBxLJmyrwo/LSUQtxq0ayqX0+1cYOkn1kV5cEYrM5l/1UwKpsKuZOIMvG0vFoLA
 E3Z/uspcq+MGnqJEwxh1MfjOBFBR8Ib1e7qktrgL3m79EZpgE786Ii/r1vop4xzuNCd3B63Z
 W1Dk0RrsA3ciY3V9MIOA5Te7rBNoTyKSi8Q156Z26XVp06Bw==
X-IronPort-AV: E=Sophos;i="5.90,171,1643691600"; 
   d="scan'208";a="65923541"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ku3shC2bPTrgLMREMU8NyTohcyWMBscyT8JIY67udoJsN0XCeYHDOX7inl9qlFmKK7fuAbFJ8jzm/XGhQlltv+uwEmsNGUldZ10unzWrRA+9P69xO57bNS1k194HhLdyDEZhQ8pF8sB3Oid02c87pMC7R1HxW8RKgSAGbJaHjOB6XTyoWuTHFUvJURKpdihS7AajPAOzwFBUNe+Lytl65CRy9/kCbztEQ8O0Nap9pVlTtdSNoayvnaJrFFTIhruxiAcSWiSbtOFQ8ixZ08A05kqBiwFQbNqv2WWHXmIQABaZEcHLQ5uUWCMhq/IdFeWvU922WlddyXJ9+JzvhVOjiw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=jTx68lV40wpFf4puUT35jyfriJILkHHvN0WT+lMixn0=;
 b=kRTXGH9G0q8xXMV+wSU73TaBqOjmgCGQPcl7V9Yi4+fHQqSxwmx9q8fXnvjgDlTrVz1mEq6qJE0thoIY0YKTTj3zlaOvpIqAXerHgEwlUWZL/T2WESWFBAYYG13mN56a7HEPxrOTXJOIXtAt89jyPqp+B4t7vMRSF8FfgULruZyfzOX8ATRMRQgt5rm2ctC88PqLjUQNEqIbpijEGBNopOpU/767rMXcHyQfONbOd5WJlGvctXbZ60OGMkEmspIAB5lLsNMMXC/3SbLXqS7bAJ/twXJkHnYUUUFphYJb6vQxxwtam39bxIYhpwTPPKvbxR0p8dMc218lV1v9MxBwKg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=jTx68lV40wpFf4puUT35jyfriJILkHHvN0WT+lMixn0=;
 b=Rg3UuVfFu8RzRlo/MJIAjk5ttEqtSFouSyxi04V2X+vBBlrfd5NSH2/7DAHVPDUHH7m29LvtnykyfNs2vAB+FL1xvjHzPaeJc7UUDse/JHpXCVHGqo/PVGq+U/NnYvE+bP1uHETNKE2J9Mn0P/wYzIjvjgu/cKfCcbbj4jWbUUo=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>, Ross Lagerwall
	<ross.lagerwall@citrix.com>, <doebel@amazon.de>, Roger Pau Monne
	<roger.pau@citrix.com>
Subject: [PATCH 0/3] livepatch: further fixes
Date: Thu, 10 Mar 2022 16:08:31 +0100
Message-ID: <20220310150834.98815-1-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO2P265CA0382.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:a3::34) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: eec5b8b5-3e52-411d-efb5-08da02a8439b
X-MS-TrafficTypeDiagnostic: SJ0PR03MB5758:EE_
X-Microsoft-Antispam-PRVS: <SJ0PR03MB575862DBBF0E12D77ACC92E68F0B9@SJ0PR03MB5758.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: OjhFNi+3w6qiie0Pu5dCKAY299vOuXeL6Pd+CFHOmx+hDF7fF0hDxjECjKxIOrrdG6NcWy29YLH7bhdHIoIYFdRZmNl38qXHEHBEEV+BxxHuEPsvWfPsV7AwARYNljz6B7KLf1F35WV7gJO78tuCvciFbt/gZjVsmP0CXFOlulRv37nrh5u91EVQZdED6ir/R7GWqC+tsYA5cVBVqEUQdTeY9jvZKjKO1YhrrHSR0vbzy/eT3jkiD7L6xyK9l+oCYD8My6Yox5A04iWLQXPh6jCZ7wi235FstKo6CR845dvneP1cI7zLN3Ctgen2jh9cLZaukAvdYe8GcYGXkltw9hBQfbx7LcoEpqt3r5D/uPw1/lQTxI5b/EbBcJq609CFQTISiUbOUfhvexASJZBq/sUYBG0COxrshks+uHYpIfHCGbttQA41tHMR2qbNFR8ReeSYBDpFOk2/U7L8gejuVDc6pGMHKdQOHJvu2kbvqgNR+bFnjVP0XcTKCbGU+PQ77OfgqruJE8rabypzJ3KZ/7yaOWv8Xkdke6JqpN9D7T33S/H/JzivW4zfMyNO2AtC3IJoBvahd67WOeOp/4JJY9GhwvdRlJjEWuOQAjBS/X6uOcQWNT3i1Tro21wcaGfWiMVUIAon0WvkFJx54x7Gsg==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(26005)(86362001)(1076003)(186003)(2616005)(6486002)(508600001)(107886003)(6666004)(6512007)(6506007)(38100700002)(83380400001)(82960400001)(66476007)(66556008)(8676002)(66946007)(36756003)(4326008)(2906002)(316002)(6916009)(5660300002)(54906003)(8936002)(4744005);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?eFF3b1FtNThxUkxKWFhULzg0RUdvUS9OTEEyR2cxMXZlY0ZqbWI4UVdEWitY?=
 =?utf-8?B?ZTJ4THlwRCtoWWU2V2tOSDg2aGxOcUxiR2Z1OWgrRzlpbmdRM25nam9mMUwx?=
 =?utf-8?B?d3RxbFQzNFlORHJ3MW85RHA1WkdCKzdXY25BaTFKdEZWazI4SXhrbEZpMlk4?=
 =?utf-8?B?L0hETVR5UFBrRVdHU3BTVmFLSXlnRjQwdkdKQmh2cnB6QndPUExmd3dEeG40?=
 =?utf-8?B?YjMrZFNqSUJ4RHp3R25zY2lIYVlSbFNtbThVZ3ZIQjlmNVFsWmRTQnNwKzFa?=
 =?utf-8?B?bzdxb0hMMzNvMysybnNhd2FCbzZNTTk5dWRienI5RWo1NDI0aVhZSmQxNjUx?=
 =?utf-8?B?ajhoS3MxYVF1eW1hQ1BNRkJJQW9CSFR4RTJoSHRwQXo4R3cvWEphem52cUYw?=
 =?utf-8?B?OUNLSEo4b0FwU3ZlbEt1a2M2TStud0JxamxtVlRpU0F2UzVHK0R1OWd5aUNr?=
 =?utf-8?B?SEw4WHVQZjRucWpoeGZHd0RsOUNUV1RuV0VCS21NY0pnOEVBaHdZWm1MUFMz?=
 =?utf-8?B?N0dPMUFtS0lHSU9HTHc0R1RTN2l4RkorNGRWbzJEZlZpcDFYeHJwNCt4b3d0?=
 =?utf-8?B?ZlVMVGRENkxYd296blJYOHduZ0N3Qkltc2tteXBnUDBTeTB3YlRyb3VISjda?=
 =?utf-8?B?RzNFSDZHallWRWg2MzhSNnZoS0tHRFhta3M2RzN5eTNwWDlrL2pwRit5TTBm?=
 =?utf-8?B?WVFING5oZ05aTEQ4R3J0bVZZZ1dWSkhwL3hQNlMvNUdha1dWdEU0ZXFCQVU3?=
 =?utf-8?B?YjRrK1dVQ0t0aVdvVjc1d205Q0xmV1pnbUZ5ZS85MTBmS1JLSlJlUy9LNEk3?=
 =?utf-8?B?b3BIdW1WMCtJMEY0aG5YSWxDSjg2cGFaajRjL000UkkzVWpwaFphZmtyUk9j?=
 =?utf-8?B?MUtTVCt3WFN2OEcxaCtJUWtjaWo1cy9uWHRKaVViWDRxRkNzeWMxYTd4clFo?=
 =?utf-8?B?N1pFYlptMUcyVVhxbFdDZnRIM2FWUlhnNktkenJXQWRSYW82YlJKYWpFcWJi?=
 =?utf-8?B?NnV3VzhGYTRMS0o2TFg5c0ZvQk8wamZYVERXMkV4Q21IU283QUxmZWlhbENL?=
 =?utf-8?B?MUltV2ZBSzJjMitqY3htbitZUnZHdlhtckY3aDBrMkJOVklKTGZONDVYY0sw?=
 =?utf-8?B?YUhLbTk3RC93Q2VKdTg2WWdKeHlCVlIrYTlHMW94UnBNSWVnSlIzRnVORDdV?=
 =?utf-8?B?M1hXMmlUaitwQlNGQ3VRTmJZNWk2L0xxUWNHbjR4REFnZDY1d1VSS1BCYUVZ?=
 =?utf-8?B?MDhnTzZEY1JNRnpzZEhLWTNNK0xid2RDams2alR3REtqd2MyVUpLVUJ3alZE?=
 =?utf-8?B?UThLUUdZYy9NQk1zMkVpc0t0bW1HcFB5ZlZnRUdZSzN5UzN4VHQ5NWs1cnBV?=
 =?utf-8?B?NFk4NTJycldmbkc1THFNT1NSNUNkb3lIcW42Y3BXQ3RqWVdYb25ROXNMKzRk?=
 =?utf-8?B?dDV1eXZtK1FSYjZJa0oyeUdBeENQSW1qQ1ArUVNRZFdzMXJJRGpvUndKa1N0?=
 =?utf-8?B?UFlxNnRJWWFIZG1wSzZtOTQ0OERRRmJiOUJnallHdVdyVUtiVzJ5Mnl2VEpP?=
 =?utf-8?B?S2d3Qmw0NTRyM0F5RndUMUdhUGZRQ0FQL0w4ZUxyTzAxYUt5dlJUS3V5R0Q2?=
 =?utf-8?B?YkFlaUw2L3hQdnozOXBsTTFvT1NuRXlhWDV2eThSWExkUjNEb1NIV3haZkh4?=
 =?utf-8?B?STIxRVJSOW1WQ2w0UDZaZEFZeWMwZWwyajQwVGpOeHZJZFZFeXVZSUZENHpD?=
 =?utf-8?B?Ukdpd3dOOE1ucldKZ0FaOXJrUklQdS9uK3pSbmRtWUFsUzBoUkhBNGtycHpE?=
 =?utf-8?B?UHYxTTFEbHRMRDBCOGhNeExRaktEN2ZPSWdScnhsYysyL1FJTGRzUmlpVERY?=
 =?utf-8?B?Nk5JdHVta2lzZUZMblNkWmMyWTRDMk5BbXFPOEtTSFBBTTJjbTZNaGhqSyto?=
 =?utf-8?B?OFNHSVBHeWh3QTlwQU9SZlFYR1RkcElCem1odHY0RjhVVzhmMlRQcVhMSHkv?=
 =?utf-8?B?MmU3bVI3TGI2WkhwRnRzZktsT2Z2MktGT1ZwZk55YWhLRlV3L09FK3RPZXNL?=
 =?utf-8?B?TEFIYm1jRWhrc2ZEaTIxcnRlSVpRbFBPdTNyakxteE1BTEpBMnVqZThqT002?=
 =?utf-8?B?ZjI0aVVCNzZDSmFBWWxlZHE1SURBVE5hclV2eEh0eDUzUkVqQzczQlN5QURn?=
 =?utf-8?Q?Fd2wTq7qZUcDo6Ftj5++5wc=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: eec5b8b5-3e52-411d-efb5-08da02a8439b
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2022 15:11:33.9181
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: pf4norN1aVlENCPNaemOItMy2LvIud3/BJitIbUdfldPfH4scEtEgHF5gNW/lbfzniGczK/0zAzT/lOibJgIVA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR03MB5758
X-OriginatorOrg: citrix.com

Hello,

The following series does some more cleanup after the Xen hypervisor
build changes (patches 1 and 2). Patch 3 fixes handling of .altinstr*
sections.

Thanks, Roger.

Roger Pau Monne (3):
  livepatch: use basename to perform object file matching
  livepatch: add extra efi/ objects to be ignored
  livepatch: correctly handle altinstruction sections

 common.c             |  7 +++++--
 create-diff-object.c | 26 --------------------------
 livepatch-gcc        | 14 +++++++++-----
 3 files changed, 14 insertions(+), 33 deletions(-)

-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 15:11:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 15:11:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288430.489069 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSKS9-0006ti-OC; Thu, 10 Mar 2022 15:11:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288430.489069; Thu, 10 Mar 2022 15:11:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSKS9-0006tb-Kk; Thu, 10 Mar 2022 15:11:45 +0000
Received: by outflank-mailman (input) for mailman id 288430;
 Thu, 10 Mar 2022 15:11:45 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=VYsB=TV=citrix.com=prvs=061b0cdbb=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nSKS8-0006dy-PJ
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 15:11:44 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 5d4ec551-a084-11ec-853a-5f4723681683;
 Thu, 10 Mar 2022 16:11:30 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5d4ec551-a084-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646925103;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:content-transfer-encoding:mime-version;
  bh=GbMTP6W7ZSddYtznbDAcAhdWrF1w25AtQwobW6NsGfM=;
  b=MKBQIvblvB9IlNnBA6Kx+zQZAaCHAvrxtcqgARJxzV7OcKB+dVefL30+
   EPolCaKqxUxpEsva5vrbt/sONIqIsoiyaxwO2qkyhikPdvLb4z3mHBX0h
   HiBKLBNXJatxlhbyC0eca34W3ZFlT9WoSlRKDDqq31X2OgH75D0Ur64Vq
   0=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65923548
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:6iso96Cd5V6QnBVW/zLjw5YqxClBgxIJ4kV8jS/XYbTApG501GAHy
 GJNXj2GPq3fN2L8ctp0bY/i8ktQ7ZPdzYAyQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vg2tYy6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPht0
 /x8r6KxZT0zHaTIt/xEfQBBCAZxaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguw5K8bmJsUHs2xIxjDFF/c2B5vERs0m4PcGgWZq3Z0STZ4yY
 eIHU2VeSBrKQyZXI2wIMswGuf2yhSfGJmgwRFW9+vNsvjm7IBZK+LTqPdDYfvSDQMxHmUDeq
 m+u12f+BAsTOJqAyD6G2nW2j+TLkGXwX4d6PK218LtmjUOewkQXCQYKTh2rrP+hkEm8VtlDb
 UsO9UITQbMarRLxCIOnBlvh/SDC7kV0t8ds//MS9Bqk+7Dq4iqjHEsNShFZMfI/rdQRSml/v
 rOWpO/BCTtqubyTbHuS8LaIsD+/URQowX8+iTwsFlVcvYS6yG0npleWF4s4Tvbp5jHgMWyom
 1i3QD4Ca6L/ZCLh/4Gy5hj5jj2lvfAlpSZlt1yMDgpJAu6UDbNJhrBEC3CGtZ6sz67DFzFtW
 UTofeDEsoji6rnXyESwrB0lRu3B2hp8GGS0baRTN5cg7S+x3HWoYJpd5jpzTG8wbJpaKWKwO
 xSL51MPjHO2AJdMRfUnC25WI552pZUM6Py/DqyEBjawSsQZmPC7ENFGOhfLgjGFfLkEmqAjI
 5aLGftA/l5BYZmLOAGeHr9HuZdyn3hW7TqKGfjTkkT2uZLDNSX9YepUbzOzghURsfrsTPP9q
 I0EaaNnCnx3DYXDX8Ug2dVKfA5QciRjW8yeRg4+XrfrHzeK0VoJUpf56bggZ5Zkj+JSkOLJ9
 Wu6QUhW1Bz0gnivFOlAQioLhG/HNXqnkU8GAA==
IronPort-HdrOrdr: A9a23:4yYXAag+BoAbK1oTbo9LNrH1+nBQXzh13DAbv31ZSRFFG/FwyP
 rAoB1L73PJYWgqNU3I+ergBEGBKUmskaKdhrNhQYtKPTOWxVdASbsN0WKM+UyHJ8STzJ8+6U
 4kSdkENDSSNykKsS+Z2njALz9I+rDum8rJ9ITjJjVWPHtXgslbnnlE422gYypLrWd9dP8E/M
 323Ls5m9PsQwVeUu2LQl0+G8TTrdzCk5zrJTYAGh4c8QGLyRel8qTzHRS01goXF2on+8ZpzU
 H11yjCoomzufCyzRHRk0fV8pRtgdPkjv9OHtaFhMQ5IijlziyoeINicbufuy1dmpDl1H8a1P
 335zswNcV67H3cOkmzvBvWwgHllA0j7nfzoGXo9kfLkIjcfnYXGsBBjYVWfl/y8Ew7puxx16
 pNwiawq4dXJQmoplWz2/H4EzVR0makq3srluAey1ZFV5EFVbNXpYsDuGtIDZY7Gj7g4oxPKp
 gjMCjl3ocWTbqmVQGYgoE2q+bcHUjbXy32D3Tqg/blnQS/xxtCvgklLM92pAZ1yHtycegA2w
 3+CNUaqFh/dL5nUUtDPpZyfSLOMB20ffvtChPlHb21LtBPB5ryw6SHlYndotvaPKA18A==
X-IronPort-AV: E=Sophos;i="5.90,171,1643691600"; 
   d="scan'208";a="65923548"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=NIg/p07TqaXhi2rotEG8q51luUv+aJqcI0NRkE9s4qB7suMjtO0jeUE1/p3F9fKHZiLDAx1U5VCt+TraQThbf8tuVTgujg97bXCPlF+4Ze/8BwKOn5q7uJff5hfYjNX5PqNeUO23PnTN/qI0e61t9bZe6yTqSfxygNwRqC7KTmDfUcY7ehasFtr9A0HVG59/U57N12sZou3dP8Fbc392eoAnbL7uFJ3keTeCPRLmdoo/2VxUogfU12tlZsWaVyTKLyrIdroPiZYvV6gE5TN95/zMxlpbUcCuK80u6LuwVAZMgnTtrLRH9/mUEoG03gjwYSbEWn5Ifh6tYiwrIZzZng==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=KPIrQ2uUJcoC3uPyB57aRxa3Wp1cquKb0s6A4/jRqUY=;
 b=NxmmD28ZgdFk2qdxSDGlXXzZE2AVaTxY0YOzbehPxsdl0NJM6ugm3nr0KsxNRe9J0+wP5y+11kAD55zGnhImn3tAUsn9PDY0Es52lHIqCvMjI/w2FGKyALaGcTqyMW+uXblWFRMn5sLvGWcWwJKb1cPemIzzKeVAb3YUT/rZYxWMaRwFFkrUXzLLwsprh/dkTRKroihr33LHgBLFlyPLxeEzPopWUAuurVlV3Mbhva/NuBoKJ3YtXGlDQ8Xou+8K++uBK8Cw61WgDG5d/HQteC5f9HLOuWVsxqg+DP7dxXeZUnmzeJo5nWeTYrfewvcj24qAlho1v+MYJVBxtD/xJg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=KPIrQ2uUJcoC3uPyB57aRxa3Wp1cquKb0s6A4/jRqUY=;
 b=QGai4kAFlCO+1qSsnDHmBEwrqiZoN230hf/xbLPkBtAQFw2fW8qew5S3O0n+ybTdYYKZhvAWIC4Qvn6zvpIEYgnnY8zCyr4rpv8fj1a1Mzup9cKbdxM3yMCH4QOW9jACpIhibsF/p4CnadM/mbZk9E9ceK0vtJF3NzW39z4XQAg=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>, Ross Lagerwall
	<ross.lagerwall@citrix.com>, <doebel@amazon.de>, Roger Pau Monne
	<roger.pau@citrix.com>
Subject: [PATCH 1/3] livepatch: use basename to perform object file matching
Date: Thu, 10 Mar 2022 16:08:32 +0100
Message-ID: <20220310150834.98815-2-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220310150834.98815-1-roger.pau@citrix.com>
References: <20220310150834.98815-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO2P123CA0061.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:1::25) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: e61a2442-5848-46eb-d87a-08da02a846fa
X-MS-TrafficTypeDiagnostic: BYAPR03MB3624:EE_
X-Microsoft-Antispam-PRVS: <BYAPR03MB3624E0DE77C14D5052B6414E8F0B9@BYAPR03MB3624.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(6512007)(186003)(2616005)(26005)(1076003)(86362001)(38100700002)(107886003)(5660300002)(6506007)(2906002)(6666004)(66556008)(8676002)(4326008)(66946007)(66476007)(6486002)(36756003)(316002)(54906003)(6916009)(82960400001)(8936002)(508600001)(83380400001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?SHNCcU80VUxOR0pHZmhISmZXZ1JDYWxKOVlGejIxelpXNTVqOU50QlEvQktr?=
 =?utf-8?B?Y0s3cGltRW9nSC9kZkx3NzZuMU10WkEzUmNzMVhLMEg5THVXK3pWaDNhNkpK?=
 =?utf-8?B?MjY4ZlFNblJBbGw4NXQxcHpLOVl6eEhPcjV3TFE0ODlaQm5pYVRCdXBWb0Ni?=
 =?utf-8?B?cHJ5cVhmeUJITkpjcm5RSXlIQnl6MjkwOXRCME9FbXEyQndLaHUzZjZhNVJl?=
 =?utf-8?B?VGtQeS8yTDgvRCtjUnhEYXdOQmZOWk94S25qSkFUU3JkZ05uNGYraWZMZUFY?=
 =?utf-8?B?TTNVWDNhblpYUURMS1I3UVVxMFRnZ05PTEdsOVI5WVR3MTJzM2gyaGNXNlhF?=
 =?utf-8?B?a1ZVcmdWbStnOUJ2UmNGY2l5K2tNZ2M2ZkxHSVRUQzQwOHB5amJoL1E0M2tT?=
 =?utf-8?B?TmEwR1VvN21FLytGQVdjQldhM09BVWhYUHIybVBrOGxyY1I5UVFkdWhYOVox?=
 =?utf-8?B?Q0hCVzBCRkhaUUpwNGFNRVFRRm1LbDRrNzhkT0ZKWmhRM08zbTM1NWV1bURV?=
 =?utf-8?B?djVPRnhqQ1JSbm9QTWdaclNuZUJkNndOS1JWUjR3cEIyd3RqanA5dW9IbFZm?=
 =?utf-8?B?WVp5em9Lcm4rVTlKQUdyRGxaR0JBWFJ1RnRSL25RWnZjaHlvZitidXVrcHlC?=
 =?utf-8?B?ZHBDek5KNHp1a2pXbWxab25hU0JwZGJHcEdRZkNob2oxU3p5N1dLRVlyYlZY?=
 =?utf-8?B?VzVsUk44NTJLUzJMR0hDd2ZUeDA3SnN4MHFwM3lxY0pwSGlwcElRREk1Y3VZ?=
 =?utf-8?B?Y1ZKUEZRSmhDdHAyMzdWclZOenUwZDFpYUtKK0JtQStwWE9nZmpaSXRRSENP?=
 =?utf-8?B?Sm1PZFJoaFRQbzdIaC8vS2R5MTdlSU0wb3ptOVh2WmZpZHpMTlVhK0pPNDJH?=
 =?utf-8?B?OG5WWmE0dEt4Mm5KKzVnV1JiOFhNTW5SeGpDdklNZWJ1NXhzT2EvLzFNSllC?=
 =?utf-8?B?aW1Eek9sNUhJaWJ4YUdxZm1Dd2xEYVcwRDErOUswVXVnNXlVOXptcFhmbG51?=
 =?utf-8?B?aXN4VVY3cGhDVXpCbVF0eERKTmpjdEY3V2wwWTlHUERlTkJ5Uk5nZ0ZZVlBX?=
 =?utf-8?B?WEpuM2JodG44dFAyMzFoVnk5QVdhQkhkTlZkcXhhb1kzeXJVVjJ6aElCNVpE?=
 =?utf-8?B?T21wTlZTQUQ5VUMvbkl2TzFYL1ZFZm1QSjFha24rOEtOT3dzVFk4ZEQ0TTQ4?=
 =?utf-8?B?ZXhGUSswWnBScnlYazNZUTl6WnQ2U0lSL0hBOG82Y2JiMmdERnhQNGxiNjcr?=
 =?utf-8?B?ZTVNN2NmZzF1RGJJOE43d09JZW16cW9DN2IwS0VNT0NYN3JaTjhENEMwejMx?=
 =?utf-8?B?dzlPR0pIL3JlQzUxd0lTd3huTzhoY0p1eEtza3l6SE0rb2pLa25kYVI1Q21w?=
 =?utf-8?B?UWMxVVNCVFBjZ0x2NHJSZW1vQloyTGZuUGQ4Z3BONHY4ZllaTElqVktYekZM?=
 =?utf-8?B?VUppVW8wcERFZnE1NCtWWVhoOVYremZJcXkvUVdMZTRvME1wSnlJYmRTT2h6?=
 =?utf-8?B?cnd0OVd6aHFrYUVJTTBMUm54WGxXdGc2ZlFJQjZpa082ZE9NRG5YVmtrQWs0?=
 =?utf-8?B?UTVlTHpIZE1NcURSTEF2VnUxUlYybXhyeGNoanRLSmtaMFFCaDFMRW82dWlj?=
 =?utf-8?B?SG5NbytGRGhUa1BmcFFnNVg2YTR0d2dLZVI0MXZRR3MyT2x5d3p6c1ZaekYw?=
 =?utf-8?B?WVpSMENDWmlESEVNU016ZjkwdTYrd0xkZHVCRGl0eXUwMGoxRC9CbEtWMHhS?=
 =?utf-8?B?V05palBJMW5HUStnbzFIR01yZ3hDYWx3NEVQSG1OcHBOdVJiYUdIZEF4a1ZU?=
 =?utf-8?B?UnlIeW41dEQ1cU1rTk94VlhKVTZrMUp0bSs4dklpdEVkVDhZNFE5eFdQZkYw?=
 =?utf-8?B?NUlBNml6N0h1YkJtWmljeXkyZS9SWjJnaG9YWTV0bnFVVlZwMk9SMitTNVZt?=
 =?utf-8?B?UnNNYVN2WXIxM0RLdG85ak9zUGsvTVQrQVk1WXZFUGR1dXVSM1QwcXhjVDNV?=
 =?utf-8?B?YTdPVE9jNTZ3Mk1pU1pHRWs5ZWdLWG4vUGJjUDNSK2UrVU9wam5xOCtlZzNa?=
 =?utf-8?B?WVFONjhhV1RFSTUrQk53ZVlDQ3JkdGdOd084Nk1JL2E5MDBWZmhQWTYzS3JY?=
 =?utf-8?B?ZzgvRVRXMWZNdU5pekZqWk81bUhXT3dlWW9zSjgxUUFuS2FTWENoSzhKZHVL?=
 =?utf-8?Q?0VhlCHEKQM53P0/4bKLjnAw=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: e61a2442-5848-46eb-d87a-08da02a846fa
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2022 15:11:39.5906
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: OOV7jaF6TLwjlpO7RBw0EMBLWxs5v0aK/J+Xe8cZAsvSiGsnXW5dclJRqF8NCNs9dgJO5CF4Yhz4F3t7PBWHgg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB3624
X-OriginatorOrg: citrix.com

The changes in the Xen build logic has resulted in the compiler and
objcopy being called from xen/ instead of relative to each object
directory. This requires using basename so that the directory is not
taken into account when checking against the list of files to be
explicitly ignored.

Also adjust the paths used to store the differing object files, as
with the current logic the resulting path will be wrong when using
newer Xen versions, changed_objs would end containing entries like:

xen/arch/x86/hvm/vmx/arch/x86/hvm/vmx/vmx.o

Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
 livepatch-gcc | 12 +++++++-----
 1 file changed, 7 insertions(+), 5 deletions(-)

diff --git a/livepatch-gcc b/livepatch-gcc
index 91333d5..fe782e0 100755
--- a/livepatch-gcc
+++ b/livepatch-gcc
@@ -32,10 +32,10 @@ if [[ "$TOOLCHAINCMD" =~ $GCC_RE ]] ; then
         if [ "$1" = "-o" ]; then
             obj=$2
             [[ $2 = */.tmp_*.o ]] && obj=${2/.tmp_/}
-            case "$obj" in
+            case "$(basename $obj)" in
             version.o|\
             debug.o|\
-            efi/check.o|\
+            check.o|\
             *.xen-syms.*.o|\
             *.xen.efi.*.o|\
             built_in.o|\
@@ -46,6 +46,7 @@ if [[ "$TOOLCHAINCMD" =~ $GCC_RE ]] ; then
             *.o)
                 path="$(pwd)/$(dirname $obj)"
                 dir="${path#$LIVEPATCH_BUILD_DIR}"
+                obj=$(basename $obj)
                 if [ -n "$LIVEPATCH_CAPTURE_DIR" -a -d "$LIVEPATCH_CAPTURE_DIR" ]; then
                     echo "$dir/$obj" >> "${LIVEPATCH_CAPTURE_DIR}/changed_objs"
                     keep=yes
@@ -61,15 +62,16 @@ if [[ "$TOOLCHAINCMD" =~ $GCC_RE ]] ; then
 done
 elif [[ "$TOOLCHAINCMD" =~ $OBJCOPY_RE ]] ; then
     obj="${!#}"
-    case "$obj" in
+    case "$(basename $obj)" in
         version.o|\
         debug.o|\
-        efi/check.o|\
+        check.o|\
         .*.o)
             ;;
         *.o)
             path="$(pwd)/$(dirname $obj)"
             dir="${path#$LIVEPATCH_BUILD_DIR}"
+            obj=$(basename $obj)
             if [ -n "$LIVEPATCH_CAPTURE_DIR" -a -d "$LIVEPATCH_CAPTURE_DIR" ]; then
                 echo "$dir/$obj" >> "${LIVEPATCH_CAPTURE_DIR}/changed_objs"
                 keep=yes
@@ -85,7 +87,7 @@ ret="$?"
 
 if [[ "$keep" = "yes" ]] ; then
     mkdir -p "$(dirname $LIVEPATCH_CAPTURE_DIR/$dir/$obj)"
-    cp "$obj" "$LIVEPATCH_CAPTURE_DIR/$dir/$obj"
+    cp "$path/$obj" "$LIVEPATCH_CAPTURE_DIR/$dir/$obj"
 fi
 
 exit "$ret"
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 15:11:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 15:11:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288431.489079 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSKSI-0007Fa-5X; Thu, 10 Mar 2022 15:11:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288431.489079; Thu, 10 Mar 2022 15:11:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSKSI-0007FQ-2B; Thu, 10 Mar 2022 15:11:54 +0000
Received: by outflank-mailman (input) for mailman id 288431;
 Thu, 10 Mar 2022 15:11:52 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=VYsB=TV=citrix.com=prvs=061b0cdbb=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nSKSG-0007Da-HW
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 15:11:52 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 67d1d6b9-a084-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 16:11:50 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 67d1d6b9-a084-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646925111;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:content-transfer-encoding:mime-version;
  bh=6fHjKMi/wGx86a90+Z66LOZxDkm78bQiP95NEwXV0tk=;
  b=QhCEA8r9peMV5VGR/qSGEoG3zYd0OjrXZVkStZT1t3nxjCXdOPn0c86B
   RQMGKhw5R0KsgJrMHOQOKJciRYCuyvxg6jlw+zbBb6VtTBiMRnIY3qOi0
   8D+U2M0nbGyMqPK6Dr0IffOYYKgnNNpDhgBAlUvnjfzOXip693iBToVFR
   w=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65853466
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:tOdTeKMVql+qT17vrR2+l8FynXyQoLVcMsEvi/4bfWQNrUpxgmECn
 TBMC2qFO/qKZ2P0L40nb4WwoUME75fUxoBgTQto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi29Yw27BVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Z5
 99zmZvoeSISZIboo7wQCRIGPD9YBPgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALNs7kMZlZonh95TrYEewnUdbIRKCiCdpwgmpg25sSQ6i2i
 8wxQzVAMCzqZDd0akY3OqtmjtqFmlTWWmgNwL6SjfVuuDWCpOBr65DhN9ffd9iiTMBcjEGe4
 G7Ll0z6BRcAPdDZ1juB8VqrnObEmS69U4UXfJWo+/gvjFCNy2g7DBwNSUD9sfS/klS5Wd9UN
 woT4CVGkEQp3BX1FJ+nBUT++SPa+E5HMzZNLwEkwC6H9IbTuza8PTIvagUZZYYt6uAoYwV/g
 zdlgOjVLTBotbSUT1eU+bGVsS6+NEApEIMSWcMXZVBbuoe++enfmjqKF48+S/Dt0rUZDBmtm
 2jikcQou1kEYSfnPY2f9EuPvT+jr4OhouUdtlSOBTLNAu+UieeYi22UBbrzsK4owGWxFADpU
 J04dy62tr5m4XalznDlfQn1NOv1j8tpyRWF6bKVI7Ev9i6251modp1K7Td1KS9Ba5hYJ2+0O
 RSI4V0Buve/2UdGi4ctM+pd7OxwkcDd+SnNDKiIPrKinLAtHON4wM2eTRHJhD28+KTduao+J
 Y2aYa6R4YUyUsxaIM6Nb75Fi9cDn3lmrUuKHMyT50n3gNK2OS/OIZ9YYQTmUwzMxP7dyOkj2
 40EbJXiJtQ2eLCWXxQ7BqZIdAFUdydnXc6qwyGVH8baSjdb9KgaI6a56ZsqepB/nrQTkeHN/
 3qnXVRfxka5jnrCQThmoFg6AF8zdf6TdU4GABE=
IronPort-HdrOrdr: A9a23:sXECYKN/zj5He8BcTyP155DYdb4zR+YMi2TDiHofdfUFSKClfp
 6V8cjztSWUtN4QMEtQ/exoX5PwPU80lKQFnLX5WI3NYOCIghrPEGgP1/qB/9SkIVyEygc/79
 YQT0EdMqyIMbESt6+Ti2PZYrUdKZu8gdqVbI/lvglQpGpRGsZdBmlCe2Om+hocfng4OXN1Lu
 vV2uN34x6bPVgHZMWyAXcIG8DFut3wjZrjJToLHQQu5gWihS6hrOeSKWnT4j4uFxd0hZsy+2
 nMlAL0oo2lrvGA0xfZk0ve9Y5fltfNwsZKQOaMls8WADPxjRvAXvUrZ5Sy+BQO5M2/4lcjl9
 fB5z8mIsRI8nvUOlq4pBP8sjOQpwoG2jvH8xu1kHHjqcv2SHYREMxan79UdRPf9g4JoMx8+L
 gj5RPXi7NnSTf72Ajt7dnBUB9n0mCup2A5rOIVh3tDFaMDdb5qq5AF9k89KuZNIMvD0vFnLA
 BSNrCd2B4PGmnqLEwx/1MfjeBEZ05DUCtvGSM5y46oOzs/pgEM86JX/r1bop46zuNPd3B13Z
 W1Dk1WrsA9ciZvV9MEOA4ge7rANoWfe2OEDIqtSW6XYZ3vfUi976LK3A==
X-IronPort-AV: E=Sophos;i="5.90,171,1643691600"; 
   d="scan'208";a="65853466"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=FiCY7+ZNfBX3XA7yEo8TS561PhPBrdagu2OMJLD9/cZ+WkCdiu/xM9v5i6QzD5+Js9stqvuHUsn+Q+Lwy5ASPo6sKOfE4glpNs2AY4Co1tTil0Q3jweVvpmDqKxWHjCgSQ+c+qoXzVddJhXj0LjlRaS4GgtOHCcsslO/WvWOoNJC6oNY7nLAYBl7QOhfHM/94+ceXZ5JlYbIKoiBMttiGuSr8R5/AJ900JM2sIOcTBek3pQ3RczU/1ZydrR3UeV1rHRWlU1VTugX3sMRBsCMoc91MA7mhoQELFt/LC6mbx63rZ4knCljAxim2XoVZAnnGtQblr7hrtKVM1APnfzy2A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=MDDTVvU5pkOqH4mj8UISu1ZWsAuZpj7tZtO5zjXp1J4=;
 b=H8T69q4s0DbZExg8pjRCQ67+aZl/egfrn7FwBRwA+1VWYvdZrCwNwjapcPbp4OkomvrQZ/ZsyJCf+07bfaCYw1z7ctQ4nvhPIYNsn7EHCbNeczsipK9yOTQ2FB+EuZ1t8a/Axk3UHP5ASPwTqnY0/lnb/R7I1Bby2URRTqAest92STayvAHOXVccCvlmHi1ubMMXGa7GogZvjlMPz0h1ntyeU6aKoXjj1LKtqsVuUN0luSQv/gV4B/Me8j/ov4T0vTvrBfg3Ps9CrQi+wXyWTAdPSwK7V0adLqTRsv063zeyUoxFrgr8MjtN/A4kvxXCsnrvO0KNuqRpQcF/T2+g4Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=MDDTVvU5pkOqH4mj8UISu1ZWsAuZpj7tZtO5zjXp1J4=;
 b=Qcmy2I4RIxec4Aj/vZI0DVdOHhsMwwOVFHylU7G0RcV2aeP11Zxoj5DkblUW7sYnaNOBukuUQRse44mwN9LpKsG+UQxVdMgMeH35dQ01AUiXLS6ES8XBfUBr86XwrBzhsmy7aiwiU+JqtbwmbXOPlWj3CB6I2cKpsB+9anyJSOs=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>, Ross Lagerwall
	<ross.lagerwall@citrix.com>, <doebel@amazon.de>, Roger Pau Monne
	<roger.pau@citrix.com>
Subject: [PATCH 2/3] livepatch: add extra efi/ objects to be ignored
Date: Thu, 10 Mar 2022 16:08:33 +0100
Message-ID: <20220310150834.98815-3-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220310150834.98815-1-roger.pau@citrix.com>
References: <20220310150834.98815-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO4P123CA0317.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:197::16) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: d3da9832-fd74-4d24-553d-08da02a84a32
X-MS-TrafficTypeDiagnostic: BYAPR03MB3624:EE_
X-Microsoft-Antispam-PRVS: <BYAPR03MB362480D091A187EE1EE697258F0B9@BYAPR03MB3624.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(6512007)(186003)(2616005)(26005)(1076003)(86362001)(38100700002)(107886003)(5660300002)(6506007)(2906002)(6666004)(66556008)(8676002)(4326008)(66946007)(66476007)(6486002)(36756003)(316002)(54906003)(4744005)(6916009)(82960400001)(8936002)(508600001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?OVlNeVJMRW1xd0oreitjWStOeFRNWkZNcXZvWnRqR2VkY3BJTUJuVGUvWEtF?=
 =?utf-8?B?ektwQks2TjZNUXl4WXhwaGs3ZXhiY2NVb3dGcVhsS0ZjYTBnaHdFemlVbngr?=
 =?utf-8?B?N3UxY081TURjemVQNkNObG5yYlZkL2w2Mk9ZNjRkVVBqbXAzVmozTm1SQXpx?=
 =?utf-8?B?Mnl1U2tBVkhsdDVSaXM2MkR5VEJRZFVBV3UxNmZGbUxmUm5HUFBVcmFobzM0?=
 =?utf-8?B?NXVlOVo3SFlyZ3loK29JQUNoZkh1RGZwcnBhNnYxT0E3Y2lJVjZEVlBPbXhC?=
 =?utf-8?B?TjhIL0drL2tqdTFzMGhmZWdxOEk2Z0lVTzdVcE5ucVRBaEVZZ0VQaXNGaEJV?=
 =?utf-8?B?Mk9qQXRIbDc1cHRsallGWG0reEdpUWxMTGdJeFBXZThUUVV0K0ozZVpkNmRk?=
 =?utf-8?B?Sk9reEthUmpDMng2Tnp4b3ZjaUhocVIxa2pPSTB0M1hTOXkwLzk1WHJxZitx?=
 =?utf-8?B?a0gxZlVZSDZ5RFNacXV0b0VPMWhOdG5CWE1FcXJ0SnFwVHJTSkxieEI1TlJG?=
 =?utf-8?B?WHZvWVNkS3ZyWXVhMXJES3pvMWR2ekdpMDAwV0kxUnVGcFZqUGhhNFprdlg2?=
 =?utf-8?B?SHN3YU5wYlVHelhXQzJsenlKMnc2QlUrRENpN0tzL3ZSU1ZmMVo3OVZvOERi?=
 =?utf-8?B?S0JoQmVBY3lyWllEdm9lMnlveTZxR3FOdjdiSUZYakRhSGhGVWUvRUxUVUdx?=
 =?utf-8?B?REcxVWpCaGZxN3dzanhTbUptQ2tFMURkdG5ucU84czBZdHJLRHZrWHNDR1ZN?=
 =?utf-8?B?NURNKzhKNmFiNjdQU0VlQTRmblBJaG5zS3dwRlFEMlpjdUtTRWpFc2lkQmZt?=
 =?utf-8?B?LzkzKzZLdi9DQ3ZGTmFDOTl3RnBRRDYzOXBrZlo1RElpd0VJZ1dQN3NFY242?=
 =?utf-8?B?N2VQMDUxUGVEckFmcWVYQ0wxSkdNZWtMbTAxTDdOT3o0OHlqRUFEbll4aEpG?=
 =?utf-8?B?YjhBUUY3aDgxN0RBVHJHQlExSkNlajRJZEFzNlJOYlVFZm5TaWVEdUZMWTc2?=
 =?utf-8?B?emdsREZiUWk1aFhUL2V5RHNWajk5V0ZZVm1FSzlKaGpaRUpUeXBzUGFPcjVB?=
 =?utf-8?B?YksveHgyUkY1QkQ1alVTN0ZDSjhKV3pUNEp5UW00d0loZ2tSbGlWcjU2SDFJ?=
 =?utf-8?B?VEN3UkVQb1dzUVZnSjkzZWZpZnRxMi82L0E5QTRqVmZBUE5wVlpFODNCVnRl?=
 =?utf-8?B?eE1FZzUvbTZ3QWZ0T09vVGt1a2xqZG9TM0QvWERPUEUzS1YxR1N1dzVVcFc5?=
 =?utf-8?B?TWF6SmpQM3RYOE00VG54aWFTT3V0SVA2ZWtORk9FOXFWV0lZMkdiaE1TNXZI?=
 =?utf-8?B?d2FIbndLKy93cEtkRENGNFd4NzJMa09qTkllVHJnYThqWWVDK2pHWTdhTEw3?=
 =?utf-8?B?UmJIVVVDNjFOeGtvTVR3aHNYenVKbnVvbEtUQU5pZUVYdVFINEdEdXQvdlli?=
 =?utf-8?B?aXJIYzFIb2xSOGV2NWlSdEpjenJQUGk4ejhOcXd0VVFFQmNPSkg1UlkyeTBU?=
 =?utf-8?B?QWRvSUZHNDQrWjRFMGM0SENmNmZweXNNUDM3eFFiNkpuWUJKVk1nZml0SXB2?=
 =?utf-8?B?N0l0czRlYmx1TkROQWp1K0c5aWtrcTFnQmRZeENOKzlLVlBFcmtSc01QSTNk?=
 =?utf-8?B?VlVoRFoydU9DWDM1Q0dPUVVUTmtWNk1zc1VzU2kyWjNzaXdmU3ozelZFVnps?=
 =?utf-8?B?R3VySVU3M2RWRlBwUTJaSUJEdy81cXlkc2w5TlU3UElTdnd3Y0hQTkRpUitF?=
 =?utf-8?B?dGNvVGtLbXAwL3BOVEJ3a1hIbnhURWp4R2o2OW9NTVBMeWVKR3V1ampsaDRM?=
 =?utf-8?B?TERHSTd6b2FyRE9pQ2VrNHNSTFNic0tGanc5VUJvOWI5VUVMaDlTa3hrakcv?=
 =?utf-8?B?L1VrY3JHWTkwbklqbW4yS2ZJQWhJRkRLY2hVQmtSSkJYTEg1eUtXWG15enVP?=
 =?utf-8?B?UFNOdExQM3RJaHlxbk0xSVZOOGJOWDVHVDZBRC9WK2Yvem5Tam1ya1NXNURH?=
 =?utf-8?B?NXhYMjc3VkJQbnBpenUvemxJdVA2QXAzMkRIejVuYkwvRlhSVmRsdWRDbWIx?=
 =?utf-8?B?N3pTcUd0elBxT3JFazdtYkQyeHovQ3ZPUG91dUs1N3h2LzhKNGF6bU40WkhN?=
 =?utf-8?B?VkRYdUtQclNtZ3pnbDZ5dEtJcEJkOWxnK25obTh6dE8rNHI0VFNIKzE3NmpE?=
 =?utf-8?Q?YbUAGZt4bdvvvYvi57IXazY=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: d3da9832-fd74-4d24-553d-08da02a84a32
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2022 15:11:44.9857
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: BrJYn6pT9r5h0Kz/gM7MB+lfniXYnU5pmGHI126A5ZkW2hiwmwIOpwm8QXtO2VVolvgcKD6GWjDCnQ6Mm5DU+g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB3624
X-OriginatorOrg: citrix.com

The contents of this objects is init only, and cannot be patched.

Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
 livepatch-gcc | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/livepatch-gcc b/livepatch-gcc
index fe782e0..b0b9ce4 100755
--- a/livepatch-gcc
+++ b/livepatch-gcc
@@ -66,6 +66,8 @@ elif [[ "$TOOLCHAINCMD" =~ $OBJCOPY_RE ]] ; then
         version.o|\
         debug.o|\
         check.o|\
+        boot.o|\
+        *.init.o|\
         .*.o)
             ;;
         *.o)
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 15:11:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 15:11:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288432.489091 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSKSM-0007ZZ-HZ; Thu, 10 Mar 2022 15:11:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288432.489091; Thu, 10 Mar 2022 15:11:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSKSM-0007ZG-BX; Thu, 10 Mar 2022 15:11:58 +0000
Received: by outflank-mailman (input) for mailman id 288432;
 Thu, 10 Mar 2022 15:11:57 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=VYsB=TV=citrix.com=prvs=061b0cdbb=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nSKSK-0006dy-TK
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 15:11:57 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 63a80f69-a084-11ec-853a-5f4723681683;
 Thu, 10 Mar 2022 16:11:42 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 63a80f69-a084-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646925115;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:content-transfer-encoding:mime-version;
  bh=alFlq9d6yt3XmMr1Rs6ZKudBRBHktI4LBY4Xm8IKjok=;
  b=eNIFcHbjVcnqPkT599FbeY5MSTMnSeLLdhO6vwJB1yL/SbysTXxkVfSr
   WPqx89SNL9Uk9z2Zj8oxqg+PFG+RNw/pG0ZYPEf7ZDd6/SyQoVa2L+jWB
   sZ+g5Weq+VsjrW8WOWd/BuGYIXw4HJnBTcCa/gSWHmb2/atDpNjFnmAia
   Y=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65399632
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:Uri086nokhfe4AlT8JDcv9vo5gyaJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xIYWmqOM/eOYmT2f913Otm+8UgHvp7cx4JmGQQ9pHpgFyMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiWlvV4
 7senuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYcgMUPK6UsvwmVjYBCDsjMqkBpaWePi3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3oHZvwCufFf87aZvCX7/L9ZlT2zJYasVmQ6uFN
 ptHMmAHgBLofU1ta3BUEcwHzeKP3WDyLRtFsAqYjP9ii4TU5FMoi+W8WDbPQfSGQshfk0Kwr
 2fP7WP/RB0XXPSczjyf+37qme7Lngv8QosZELD+/flv6HWDy2pWBBAIWF+TpfiillX4S99ZM
 1YT+Cclse417kPDczXmd0Tm+jje5EdaAocOVb1hgO2Q9kbKyz2dO2oHFhRZU9kJ7dQsGDMuk
 QKTxsy8UFSDr4apYX6a876Vqxa7Ni4UMXIOaEc4cOcV3zXwiNpt10ySF76PBIbw14SoQm+on
 1hmuQBj3+17sCId60msEbkraRqIr4OBcAM67x6/somNvlIgP97Ni2BFBDHmARd8wGSxEwHpU
 JsswZH2AAUy4XelznLlrAIlRu3B2hp9GGeA6WOD5rF4n9hXx1atfJpL/BZ1L1pzP8APdFfBO
 RGP51MMvcQIZCX6M8ebhr5d7exwncAM8vy/CpjpgidmOMAtJGdrAgkyDaJv44wduBd1yvxuU
 XtqWc2tEWwbGcxaIMmeHI8gPUsQ7nlmnwv7HMmjpzz+iOb2TCPFGN8tbQrVBshkvfzsnekg2
 4sGXyd8404EC7OWj+i+2dN7EG3m2lBgXMGo8ZMLLrDfSuekcUl4Y8LsLXoaU9UNt4xel/vS/
 2H7XUldyVHlgmbAJxnMYXdmAI4Dl74jxZ7nFUTA5WqV5kU=
IronPort-HdrOrdr: A9a23:4W65WKEFqfi+D2szpLqFCpHXdLJyesId70hD6qkvc3Nom52j+/
 xGws536faVslcssHFJo6HlBEDmewKhyXcV2/htAV7GZmfbUQSTXedfBOfZsl/d8mjFh5VgPM
 RbAtlD4b/LfCFHZK/BiWHSebZQo+VvsprY/9s2p00dMz2CAJsQiDuRZDzrd3GfE2J9dOUE/d
 enl4J6jgvlXU5SQtWwB3EDUeSGj9rXlKj+aRpDIxI88gGBgR6h9ba/SnGjr10jegIK5Y1n3X
 nOkgT/6Knmm/anyiXE32uWy5hNgtPuxvZKGcTJoMkILTfHjBquee1aKva/lQFwhNvqxEchkd
 HKrRtlF8Nv60nJdmXwmhfp0xmI6kdY11bSjXujxVfzq83wQzw3T+Bbg5hCTxff4008+Plhza
 NixQuixtVqJCKFuB64y8nDVhlsmEbxi2Eli/Qvg3tWVpZbQKNNrLYY4FheHP47bW7HAbgcYa
 hT5fznlbZrmQvwVQGbgoAv+q3gYp0LJGbJfqBY0fblkQS/nxhCvj8lLYIk7zI9HakGOup5Dt
 T/Q9RVfY51P70rhNpGdZ88qOuMexrwqEH3QSuvyWqOLtBzB5uKke+y3IkI
X-IronPort-AV: E=Sophos;i="5.90,171,1643691600"; 
   d="scan'208";a="65399632"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=UBpo6PVB2jyLE6M4awiWDiI0uG8BFy3k03EyAhxlrBtLk4vx3Gtcq3sLcFGF85MtqWljZBRoDpJuukbK81nlzjfbsf3pUW67bNxyB4kDENvs/TJGxaXKLaAHdD2aFYGOItrN20uO/z21l4IqPzdnM2GFKPtDpz+Yc2UKuoxrU3416n8weFZxv6SFZaBfCileDchGHW7Luk7bxV1nBcHrpUiyoCXEsw3v3mahKHJ/N6433XNuOZzhQs6Nk/8YJTHsy2o2Gl7THGdDnEpR05oKqStvcB3M0AnZsLE2y1j2wHHG26Mb1N07dS7OvtG2F/B4EANHv0MoAUjlCx2gpK3Org==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=gqzJJP1ALgqRLG/SatpbTyBtpWv/Y8f9lPVlBNCrbsY=;
 b=Y/QGpdOP1CMwqBWicJbBqUpDLZlGsav5eyjICvUCBJuioxPUF9OO9W1gfXitP6BuhsFVq6yc2pGn59/DsEH/KXu0kDYpcuu1iDtf86L4zmNb4oFHlRfjf+Diks6pkjduIQD1b/X+KqHHvfS5EeYaaYcrHPVlDLhcOBoUMe8I4Y+Qrqad605U/zASzqet408d3ECq1WV0dRKuIl7VIRqthHnrdFFFH0cxTJSNl0i++VuX1PUUk0mPw9YqZrXuivG3R46ze7KH6YpUGwbW4LvvFlapSK5LQ1u9go439kF2SNwWczppUyV7Ts5eChkeZxQk6y0wy+GspGA4dBzSeJs38A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=gqzJJP1ALgqRLG/SatpbTyBtpWv/Y8f9lPVlBNCrbsY=;
 b=QkfMCZp9HSQlu/gniAC1X1RRAM55WkUIylCRFwcg0hgQ6fq15o2iKLN5X9mxWvRppZAhgiBT6+6wTDhoMjsKF5exFJyRaKcWNgMEuO+9p2tq2qSCJK7JtlTi4KtpSafUeHmk5zY/axdTAZmcmB/5mzeDItmUsDqRv+t9TgRZNUk=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>, Ross Lagerwall
	<ross.lagerwall@citrix.com>, <doebel@amazon.de>, Roger Pau Monne
	<roger.pau@citrix.com>
Subject: [PATCH 3/3] livepatch: correctly handle altinstruction sections
Date: Thu, 10 Mar 2022 16:08:34 +0100
Message-ID: <20220310150834.98815-4-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220310150834.98815-1-roger.pau@citrix.com>
References: <20220310150834.98815-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO2P123CA0004.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:a6::16) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: e0169b3e-fee1-4a7c-2e38-08da02a84d24
X-MS-TrafficTypeDiagnostic: BYAPR03MB3624:EE_
X-Microsoft-Antispam-PRVS: <BYAPR03MB362437291F752C114D83928E8F0B9@BYAPR03MB3624.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(6512007)(186003)(2616005)(26005)(1076003)(86362001)(38100700002)(107886003)(5660300002)(6506007)(2906002)(6666004)(66556008)(8676002)(4326008)(66946007)(66476007)(6486002)(36756003)(316002)(54906003)(6916009)(82960400001)(8936002)(508600001)(83380400001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?Y0xrbzhwQ0YxTnVZcG9aM2RnTXVrWVNqYzZpRzJwQjV6MXFBMkZDT0Z0ZlIx?=
 =?utf-8?B?MXh6VHhKd0tyYWRpR3l1Y1JQU1FuYzZKNW15NzM1Yi83MlBiMXhzUzV6bVdJ?=
 =?utf-8?B?d1JsSFBBOTUzWFh0cEVxSElCVVZDYWxaWTR1ZU1GclNNRUJmZ3ZDanBxT3V1?=
 =?utf-8?B?M2xXRnRJT1d3OURtcnBXdWhFdVplNmtMeVBjWGZia0ltTU9Say9jM1hrQ0FD?=
 =?utf-8?B?VDFVVUh5T05RRGlHS0MvZ2V1TUVLdE01Q0toNnozNVN0QnFDS1ZuM3dzaEhL?=
 =?utf-8?B?dnpETFAyaThjaWxqWEZXanJpZjNWLzFMelRYNXcyUHFUek9pM2JQK01zODRP?=
 =?utf-8?B?L0FHMmZyR3JQTU1BNURkWERuRDUwVllHSjNXYzBHTkRhRnlrTnZZcjFYeXA5?=
 =?utf-8?B?Y0lIZitxUjNISFhPZk9sS2RhemxhR0VWVTdZemRQVXp4MVc5WUEyNGlOL2tr?=
 =?utf-8?B?THZKbWZOei9zVzlkcVVXM09FbXZkV0NhMThSYy9Pc3JhbjZJcGN0WjZ3Z1My?=
 =?utf-8?B?ejVFZjNKcVVkbTZGRUl4dG9EVDJ3VHptTUg2dTBNYTN5WXEzcEplK2IxK2lI?=
 =?utf-8?B?dVBYOWR0enpGSzU0VzBLdFhGcUxjYnlRNktQcHpHaVVqOW1sL2I3dGM4QmRD?=
 =?utf-8?B?Q212Wk9FaDRWQXhxS241VGRodnllc3MzL0UyS25mNksyOWk1WGVHSHlReHRh?=
 =?utf-8?B?WXE0Z3d2bEtXYTBnUGRxNEhWMjljMHlYTUdmL1lQVmNtbGpRWXY4T2g0Wklm?=
 =?utf-8?B?M0Ryak1HMFNzMnVpRW9qa1MzZmVtaEpxQkJ5Sm8rRzIrSVFmczFSWHNRR2w5?=
 =?utf-8?B?YUk0WmJqbHNQakFhVGdTaU5EbkxxL0Yrd2NuQnV2QjRiK3h2bUxmWmZtUGZM?=
 =?utf-8?B?OG9hb1RNaTdneWt2QzhRQk9nMmI1M0hubGhuSmJVY3F3L25BaGxvdWR4LzJy?=
 =?utf-8?B?emZVRHVYSCs1cFNpVnZFODlyZ01vYmtRRmRPdGRPRFZiZW9Mcmlqand0UmJt?=
 =?utf-8?B?ZnBQdXNpQW9HOUhZeUVvVVVWbzBCeUQzNUs4Mkk3TFN0ZFhiQnFJNG5ab3hw?=
 =?utf-8?B?cjFiWkR5anBKaTQ3c0pxSjQxRWRmVUNsV3hxUlBkRmovMmxqVHJhTk42N3da?=
 =?utf-8?B?WlNQY0hNKzBlbkpraWJNUkJIc2EzTkZVaElQZERES0hWWEdXaHZsV3B6SFdl?=
 =?utf-8?B?M2FaNHNFYmVmMUVVcVp0c05tOHhLaWo3RjJNV1Y4ODJ2aUxMV2Y2VW9IMDBB?=
 =?utf-8?B?YWRXMGQvTERYSjdubm5ORWc1bzFTclBzYXZLUjFQNnVhRENTd2pKVGR5S2ZW?=
 =?utf-8?B?TDNkbS9HRHp0VzNPWjh2cnVHWVZ3QU12aC9CYUQxbXgwNHB6TDF1VXdpQzdw?=
 =?utf-8?B?VFRyRTN5cTc2N2Z1Rk8zbmtielhGV3RYaFpsY0xjQjNhVlU0dldyUGJ5YWpx?=
 =?utf-8?B?K3J6c2tkTi8zd2VpSXd3NzlkcGc0ZnFuQXEyaWU2S2I0Wm5ZTHJzbEUvYVBL?=
 =?utf-8?B?Zk1wc1ZLQ0c2T3B4UVloRWNueUJQdDRRV1VoVm56SVRsckZXUUNuLzcxTUd4?=
 =?utf-8?B?d1JWK3RtMnZlUjRGcTQvSkVEcE82SXNpNkg0U1NOR0FjS21xT2piUXF4bFAz?=
 =?utf-8?B?Q1hvR0JVMGFJaGpOZTRtdnBVYmRrOE9pbGgyZklCeHFubWgrNXRzK2JpRmxk?=
 =?utf-8?B?dmFQV3oyMHlUNkdHYVI0aS9XT0JuczVtUTc3d0VEbHNhNnZiNmFoTUtSRkRv?=
 =?utf-8?B?V1cxVlhtQnF2ZjRiN2xLVERIbFVjdUJMeDZsQ1BtUk5idEVodXVpZlNoTUR0?=
 =?utf-8?B?eERaRk5HalZ2ZUUvUTBKV00xS3BqTXFNbm9QZWtYWFR4WFErUm4vWXQrTzQw?=
 =?utf-8?B?L2tydTkyTE5GWGpaNkRra3VEdWRFNUFNcmhaZ1RScjBGS2ZjZnBYWUI2M0Fh?=
 =?utf-8?B?OElPY253RzEwRGIrbHFHVEZSSjNhbXpsWDFxazZLYnh5SHpUWnNhcWZrR05Y?=
 =?utf-8?B?N1ozV2swQ3FYM1VJTU5waGF5b29TT0I5OEdpMGJodDZDTXBYNXFuZUNQM1lO?=
 =?utf-8?B?SWxBbXV1WURUOXJUWnk0OXh2YlREMzhzTE1IbmpTTjM5TFJ6dUU1M2pSUFAw?=
 =?utf-8?B?TDVUbHJHZWhvalpNd1FXK0I0Q0dEeGpuRzNKcXlZZVJjcFk5b2dHZ3krZUw0?=
 =?utf-8?Q?OyNw05Ay3QmrVobzs9FXaeE=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: e0169b3e-fee1-4a7c-2e38-08da02a84d24
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2022 15:11:49.9428
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: O76STjJ8DfXnHmg74+Avx+p+F2St8wL00HIhwQMAKfgdEpYSkouVvH950t/h8hBigwenl7FO6U7s2Gp8CnM2iQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB3624
X-OriginatorOrg: citrix.com

The current handling of altinstructions sections by the livepatch
tools is incorrect, as on Xen those sections are part of .init and
thus discarded after load. Correctly handle them by just ignoring, as
it's done with other .init related sections.

While there also add .data.ro_after_init section as a read-only
section and introduce some syntactic sugar for comparing section
names.

Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
I assume this handling of .altinstr* sections was inherited from Linux
where the sections are not discarded after load in order to apply
alternative patching to the loaded modules after boot.
---
 common.c             |  7 +++++--
 create-diff-object.c | 26 --------------------------
 2 files changed, 5 insertions(+), 28 deletions(-)

diff --git a/common.c b/common.c
index 68a71f7..a148d8a 100644
--- a/common.c
+++ b/common.c
@@ -249,19 +249,22 @@ int is_text_section(struct section *sec)
 		(sec->sh.sh_flags & SHF_EXECINSTR));
 }
 
+#define SEC_MATCH(n) !strncmp(sec->name, n, strlen(n) - 1)
 int is_rodata_section(struct section *sec)
 {
 	return sec->sh.sh_type == SHT_PROGBITS &&
 	       !(sec->sh.sh_flags & (SHF_EXECINSTR | SHF_WRITE)) &&
-	       !strncmp(sec->name, ".rodata", 7);
+	       (SEC_MATCH(".rodata") || SEC_MATCH(".data.ro_after_init"));
 }
 
 int is_init_section(struct section *sec)
 {
 	return sec->sh.sh_type == SHT_PROGBITS &&
 	       (sec->sh.sh_flags & SHF_ALLOC) &&
-	       !strncmp(sec->name, ".init", 5);
+	       (SEC_MATCH(".init") || SEC_MATCH(".text.startup") ||
+	        SEC_MATCH(".altinstr") || SEC_MATCH(".ctors"));
 }
+#undef SEC_MATCH
 
 int is_debug_section(struct section *sec)
 {
diff --git a/create-diff-object.c b/create-diff-object.c
index a516670..ec2afb4 100644
--- a/create-diff-object.c
+++ b/create-diff-object.c
@@ -995,19 +995,6 @@ static int ex_table_group_size(struct kpatch_elf *kelf, int offset)
 	return size;
 }
 
-static int altinstructions_group_size(struct kpatch_elf *kelf, int offset)
-{
-	static int size = 0;
-	char *str;
-	if (!size) {
-		str = getenv("ALT_STRUCT_SIZE");
-		size = str ? atoi(str) : 12;
-	}
-
-	log_debug("altinstr_size=%d\n", size);
-	return size;
-}
-
 static int livepatch_hooks_group_size(struct kpatch_elf *kelf, int offset)
 {
 	static int size = 0;
@@ -1021,11 +1008,6 @@ static int livepatch_hooks_group_size(struct kpatch_elf *kelf, int offset)
 	return size;
 }
 
-static int undefined_group_size(struct kpatch_elf *kelf, int offset)
-{
-	return 0;
-}
-
 /*
  * The rela groups in the .fixup section vary in size.  The beginning of each
  * .fixup rela group is referenced by the .ex_table section. To find the size
@@ -1099,14 +1081,6 @@ static struct special_section special_sections[] = {
 		.name		= ".ex_table",
 		.group_size	= ex_table_group_size,
 	},
-	{
-		.name		= ".altinstructions",
-		.group_size	= altinstructions_group_size,
-	},
-	{
-		.name		= ".altinstr_replacement",
-		.group_size	= undefined_group_size,
-	},
 	{
 		.name		= ".livepatch.hooks.load",
 		.group_size	= livepatch_hooks_group_size,
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 15:23:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 15:23:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288446.489101 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSKd9-0001Uu-GQ; Thu, 10 Mar 2022 15:23:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288446.489101; Thu, 10 Mar 2022 15:23:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSKd9-0001Un-DI; Thu, 10 Mar 2022 15:23:07 +0000
Received: by outflank-mailman (input) for mailman id 288446;
 Thu, 10 Mar 2022 15:23:06 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=7C/d=TV=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nSKd8-0001Uh-MR
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 15:23:06 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id fb66d511-a085-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 16:23:05 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2108.outbound.protection.outlook.com [104.47.18.108]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-38-chxfSxDXM1Oc_om6l1RgWw-1; Thu, 10 Mar 2022 16:23:03 +0100
Received: from AM0PR04MB5587.eurprd04.prod.outlook.com (2603:10a6:208:125::12)
 by AM9PR04MB8715.eurprd04.prod.outlook.com (2603:10a6:20b:43e::11)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 10 Mar
 2022 15:23:02 +0000
Received: from AM0PR04MB5587.eurprd04.prod.outlook.com
 ([fe80::dd50:54e6:1f96:3b33]) by AM0PR04MB5587.eurprd04.prod.outlook.com
 ([fe80::dd50:54e6:1f96:3b33%3]) with mapi id 15.20.5061.022; Thu, 10 Mar 2022
 15:23:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fb66d511-a085-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646925785;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=T0WZt12xJLiZQwOb24FZSzZ4iTWw5/nVhVQs4qp5wbI=;
	b=Jw4/NxGv33B8dgtqI+utjFkzRt/KQaNPKzmRPBEYnInpK71ww3K9mcbodXjNDpNqqd39sg
	wr52tl5Gy3DCrG8fybNV9m4+LI9zHIePj3ws3Wa4/E2M6QmUXrXl9zPD5gG8QJfJJEaFmI
	pkAhYtZacwJmUNOUbj0NlBqz7d5jS24=
X-MC-Unique: chxfSxDXM1Oc_om6l1RgWw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=YKUP5t/R3cy5BIbWWHjwifDQU4TBmDy+1W2HhoK/AY2mqTxgfiTClXAu+vOD9IJIwafLc3Q9AgoLOh6U8hQl+bBvpCISOPlS9o2iWJFhjAW8SU2BQ3cvCK29cIU5zkVosmffyI22VFkimtxyhQxr6h9oHwiXpZsvXI4s9igy6ovC+oYK0jq8gXuG+fgoDc3H+apCaOaEbmetboRNSUG6t1R59WwkIAML5qFn0W7q4y3VM64CrFaaY9BcuKwx/pJtkEV6Ua9TdvNIcSfLmTneYn6Hyjy33rVEActFk24vlRjVkb/ku+BN7Qn/lAYxkdift3IIWye1S19bmodSQiyoFg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=CsZrN3FxF+triV9bB5oQeY6blxKlOudJ1Z1gRuhUxuE=;
 b=h/vOsrUquc+IBUyaKr1TOGYPaeKgrobgALWJ0+1KGoL4dmHFKX1LHyQeKScA7swCngmRLhylKHfN+pPSO8NvEwt7JHIPCKd/1xbLRYK2DhUIGfQ8PF2WA+80yPO4suE754I8VvLTf374ApwIN4EZcNxM9ZIl76vEQ7sAVFyUWAfgNLpcQyT6zFDBNRL2uxzxog+25SCBdn92Sw2NojEysN+Dyx556Frgoa3sj8brCAu8i5bN8895L+AjH2zrsuGHXD8fF/6RXkj5AC+UE8NrJK1gNODAxTW1bljHvwi8VvD16geFh0alY5PwXrqSf26ncah+Uar83/6PIopSXB4tjA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <7acb2915-5a9d-c1f1-4b7b-2bc6c2055ea3@suse.com>
Date: Thu, 10 Mar 2022 16:23:00 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH 1/2] ns16550: reject IRQ above nr_irqs
Content-Language: en-US
To: =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?=
 <marmarek@invisiblethingslab.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220310143403.50944-1-marmarek@invisiblethingslab.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220310143403.50944-1-marmarek@invisiblethingslab.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR06CA0276.eurprd06.prod.outlook.com
 (2603:10a6:20b:45a::34) To AM0PR04MB5587.eurprd04.prod.outlook.com
 (2603:10a6:208:125::12)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: e82a928e-de3d-44b7-2bdf-08da02a9ddfc
X-MS-TrafficTypeDiagnostic: AM9PR04MB8715:EE_
X-Microsoft-Antispam-PRVS:
	<AM9PR04MB8715F7EBDE4980B1F68622C9B30B9@AM9PR04MB8715.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR04MB5587.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66476007)(4744005)(66946007)(66556008)(36756003)(316002)(186003)(6916009)(8936002)(83380400001)(2616005)(26005)(5660300002)(8676002)(4326008)(31686004)(508600001)(53546011)(31696002)(86362001)(38100700002)(6486002)(2906002)(54906003)(6506007)(6512007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?PtOLJnATt4LSymhG8MSOvDevEgGvZ6woxCwObtGHY6NyAjyXdRgbtEN0exiB?=
 =?us-ascii?Q?yDvfGTBjnD+NyEmQSftDLPWb/0gYAf5H7ctFlZ6yRbc+TQ7OFBzzioMVVMSh?=
 =?us-ascii?Q?YlRPE55Fa3xfEQUzxHHTMBlunO4TuRuq07z2IWUNrHXIGZ8Q+kRa1MS15nF9?=
 =?us-ascii?Q?wuFnRQgFc299XxDFsZL/NID7ytixTJNHanOEUMUKsv5rltwYdk38MY7P5QDY?=
 =?us-ascii?Q?bapWGj+xklqxdQencEbpWPRT+Vep6jWvs4iPxmi0gbH4r9zc4XZ8Pfts2mHt?=
 =?us-ascii?Q?r+0/0CNSNxRzXtn/e1pQuod5UYKRgodO8E8cMO4fRuW6GcfHqTmnyeHuAlXB?=
 =?us-ascii?Q?XKWaEjeXy10JsPv+OR2Jfxxc3VgVhkxpi/CJJxaFUQ1N+YlsAUXuHrzqYCQm?=
 =?us-ascii?Q?5rlANXR8o+0V1wo1xHyaCF1TK7VQwOJF6H/CfqdUbgzjBIpDBPQdy2zTTQc3?=
 =?us-ascii?Q?UVxSvzZANraqUCZH82YwTA8VdWlsZ6wV4fLFIxIopBxjGTViETyTef4dpgKv?=
 =?us-ascii?Q?S4JtZ3G4viVbbWnlMkQZIjNvJZxQotq2szzXKazV+yYF9IoRDcypA6esA7Zu?=
 =?us-ascii?Q?vYJ/ocbN0nNWTCIUFK61/xYnY8+MUuomQOzPd0ltFF4aabjGWd6HLDl+0zdR?=
 =?us-ascii?Q?hDZLouAzgjAJ2YR0M9YF2kZxXVXRQ8lDc4ImX9fPAla5FfQAvsa/ASM9TfUq?=
 =?us-ascii?Q?ZvWaLsZjzcpbJWqH2jG1jVew9y+yP3pQsV7k7UF81lGxXu1Gw4a65D3/qhbm?=
 =?us-ascii?Q?NLGWZMClpPE8ICC3VSx8623nPjph1DrmW531L3E645SPo4KYZA/Ilqah6VZi?=
 =?us-ascii?Q?fJml0Ocrdvyz5uJDkDZqO9larAM1yxGMerdvrFGneeupvo5v9lHeooAEWEHC?=
 =?us-ascii?Q?GduME3MhTTqkQAgRqIxF5+qaGPYjNzozeotHGoPckcfnbanrnxHCMsOfeCc2?=
 =?us-ascii?Q?G/BkDKkB2ZdcEUHiOfhcH2ccNLY4rQbFFyx7HE0ctlrh/aJsZKn/jRf3Re9u?=
 =?us-ascii?Q?+Q0m0g00txw7/7pd5VzdyhYYuL7QMaenN9FAyO5s+/efw/rQ/wzlLV8AB8BA?=
 =?us-ascii?Q?+3mdNMFTgjKxSrNFgIr6zGxYXtlbGhTrCEWYFhlHrrUXezM7zMWAmU2OnXCG?=
 =?us-ascii?Q?OMU7ay0gMa1oh6gHW0By0MqVv/Bp2XfDHxtl3ybMn9vpo9mMuDmrr6hkdyuw?=
 =?us-ascii?Q?ImSsQiejuOW9ejMANzHjugXHC/r9JTPsisSyJ9Tse+YpOeWhn3jbSC0CMoOm?=
 =?us-ascii?Q?qiQQRYvkiZiY5ZO/TQVIDkTkljAms13N6HpDuwM7mnYSF1BbsoEeWYN4DT0N?=
 =?us-ascii?Q?t/is8eM3SRTovwmM/hVYgcJTVgwRJvpQRI+jzwvzibM52nBmSckOOeWd7gvO?=
 =?us-ascii?Q?hLfgYP1S6uN5DGKt07fkcK9l1v/OOLxHpRH1J4eRH87/zL970K+gvowg1pWQ?=
 =?us-ascii?Q?NtLbJ0o0Ex+QGtce3ycVswjg14GOdTs9XmcqZtz4UfGcewXdwsNB6o7GD7Yk?=
 =?us-ascii?Q?0Fl5gGhPWLyUSBzlKgyUq+7/r78c2vSs3+qXb4CA7Wpc2WpTGzdCGSpKALVY?=
 =?us-ascii?Q?7z6eibl56wQzApIOMZCzqZXD6JuCADC/2Sq97/+umsnjP/zJ9/YLvE09VB8O?=
 =?us-ascii?Q?/7N4MF2tjK7f2LEkRuI2/BY=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e82a928e-de3d-44b7-2bdf-08da02a9ddfc
X-MS-Exchange-CrossTenant-AuthSource: AM0PR04MB5587.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2022 15:23:02.5397
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: jxS1+T5sfkwQO4LpT/adNOyfiqSaPSVrxHmb0tHpgxuquqXOeLy256slZRHhG4w9PLftOroRtZBZWT7buHK4tw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR04MB8715

On 10.03.2022 15:34, Marek Marczykowski-G=C3=B3recki wrote:
> --- a/xen/drivers/char/ns16550.c
> +++ b/xen/drivers/char/ns16550.c
> @@ -1221,6 +1221,9 @@ pci_uart_config(struct ns16550 *uart, bool_t skip_a=
mt, unsigned int idx)
>                              pci_conf_read8(PCI_SBDF(0, b, d, f),
>                                             PCI_INTERRUPT_LINE) : 0;
> =20
> +                if (uart->irq >=3D nr_irqs)
> +                    uart->irq =3D 0;

Don't you mean nr_irqs_gsi here? Also (nit) please add the missing blanks
immediately inside the parentheses.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 15:47:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 15:47:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288453.489113 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSL0K-00041u-KX; Thu, 10 Mar 2022 15:47:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288453.489113; Thu, 10 Mar 2022 15:47:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSL0K-00041n-HT; Thu, 10 Mar 2022 15:47:04 +0000
Received: by outflank-mailman (input) for mailman id 288453;
 Thu, 10 Mar 2022 15:47:03 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSL0J-00041d-GH; Thu, 10 Mar 2022 15:47:03 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSL0J-0003sC-Dc; Thu, 10 Mar 2022 15:47:03 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSL0J-00015V-0n; Thu, 10 Mar 2022 15:47:03 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSL0J-00010t-0L; Thu, 10 Mar 2022 15:47:03 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=9BLFwAI+fTrRZwM5jYUxDbdrqwXxLRl7AhdzO1MKdi8=; b=w1L/v7SfG1Cd7nnsaRxSmwcczs
	qG6qNf1NaG4P5zL6Q2OnuRfIIXwjFkp1QUj4jdF7U5xG5GpVK5QcLkwT9/kLBhVLAUvTdddq6WNdB
	kNhgWMabzFahZnD0L7Edg38YzRAZTMasybAmB5xygd5ISRruRHHUPv/CCfogqKzSfOJY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168498-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168498: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:allowable
    linux-linus:test-amd64-amd64-xl-rtds:guest-localmigrate/x10:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=330f4c53d3c2d8b11d86ec03a964b86dc81452f5
X-Osstest-Versions-That:
    linux=ea4424be16887a37735d6550cfd0611528dbe5d9
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 10 Mar 2022 15:47:03 +0000

flight 168498 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168498/

Failures :-/ but no regressions.

Regressions which are regarded as allowable (not blocking):
 test-armhf-armhf-xl-rtds    18 guest-start/debian.repeat fail REGR. vs. 168466

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-rtds     20 guest-localmigrate/x10       fail  like 168466
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168466
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168466
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168466
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168466
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168466
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168466
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168466
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168466
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                330f4c53d3c2d8b11d86ec03a964b86dc81452f5
baseline version:
 linux                ea4424be16887a37735d6550cfd0611528dbe5d9

Last test of basis   168466  2022-03-07 20:11:19 Z    2 days
Failing since        168486  2022-03-08 18:12:42 Z    1 days    2 attempts
Testing same since   168498  2022-03-09 20:47:09 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Aswath Govindraju <a-govindraju@ti.com>
  Borislav Petkov <bp@suse.de>
  Catalin Marinas <catalin.marinas@arm.com>
  Charles Keepax <ckeepax@opensource.cirrus.com>
  Emmanuel Gil Peyrot <linkmauve@linkmauve.fr>
  James Morse <james.morse@arm.com>
  Jeff Layton <jlayton@kernel.org>
  Josh Poimboeuf <jpoimboe@redhat.com>
  Kim Phillips <kim.phillips@amd.com>
  Lee Jones <lee.jones@linaro.org>
  Linus Torvalds <torvalds@linux-foundation.org>
  Miklos Szeredi <mszeredi@redhat.com>
  Peter Zijlstra (Intel) <peterz@infradead.org>
  Peter Zijlstra <peterz@infradead.org>
  Rob Herring <robh@kernel.org>
  Russell King (Oracle) <rmk+kernel@armlinux.org.uk>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     fail    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   ea4424be1688..330f4c53d3c2  330f4c53d3c2d8b11d86ec03a964b86dc81452f5 -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Thu Mar 10 15:47:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 15:47:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288458.489123 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSL0c-0004QQ-Ue; Thu, 10 Mar 2022 15:47:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288458.489123; Thu, 10 Mar 2022 15:47:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSL0c-0004Pq-Rc; Thu, 10 Mar 2022 15:47:22 +0000
Received: by outflank-mailman (input) for mailman id 288458;
 Thu, 10 Mar 2022 15:47:21 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=VYsB=TV=citrix.com=prvs=061b0cdbb=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nSL0b-0004KZ-OH
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 15:47:21 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 564e7f90-a089-11ec-853a-5f4723681683;
 Thu, 10 Mar 2022 16:47:07 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 564e7f90-a089-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646927240;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=iBwU9jkM2WhV4ydOiXDhddy6NJ1tHtzhyHB9c8AeB2Y=;
  b=BJv1U9eInIwauYIjwKgPjwPsiTo6mJfDK139hmVHVoiHVdXV01Cilruk
   JfD44PNlFkMX0L7eDkADmRE4989eXFvEv92FjVTx4susG0yZ0jIP3j2+Q
   nlKsB2IYFrN//xxgdmYWmvYk8gruh7w2IW3G1dukctbUFdN6IBw8nx8dQ
   A=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65936380
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:5pDsE6gdmWfTaA4uRgtiRnRiX161uBAKZh0ujC45NGQN5FlHY01je
 htvDGvVO/qCMDHzfd13bdy+o0tTusWHzYI3HQQ//30xRCwb9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFrV4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YVw2GJ2Wg7tFaRVZHQp8bYpe5Jb7L1Hq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bkmtnwjzDS+4vXLjIQrnQ5M8e1zA17ixLNaiDN
 pFHMmo3BPjGSzpDYUs8WJ0Pp/mlv13YSWAE8kzNt4NitgA/yyQuieOwYbI5YOeiXt5Jl0yVo
 mbH+WXRARwAMtGbjz2f/RqEmevnjS79HoUIG9WQ5vNsxVGe2GEXIBkXTkeg5+m0jFakXNBSI
 FBS/TAhxYAw/kG2Stj2XzWjvWWJ+BUbXrJ4FuQg7QiXx6n84gCHB3MFRDpMdNwnssAtQTUgk
 FSOmrvBByFrsbCTYWKQ8PGTtzzaBMQOBTZcP2leF1JDuoS95tFo5v7Scjp9OPWqqO2vAm6o+
 TyLogM815ILkec32YzuqDgrnAmQjpTOSwc04CDeUWSk8h51aeaZWmC41bTIxa0eddjEFzFtq
 FBBwpHDt75WUflhgQTQGL1lIV2/2xqS3NQwa3ZLFoJpyTmi8mXLkWt4sGAnfxcB3irplFbUj
 K7vVeF5ucc70JiCN/Yfj2eN5yICl/aI+TPNDKy8Uza2SsItHDJrBQk3DaJq40jjkVI3jYY0M
 oqBfMCnAB4yUPo7kmrrHrxGieF7mEjSIF8/o7ihn3xLNpLEOBaopUotagPSPojVEovYyOkqz
 zqvH5TTkEgOOAEPSiLW7ZQSPTg3wYsTXvjLRzhsXrfbeGJOQTh5Y9eImO9JU9E1zsx9y7aTl
 lngCxAw9bYKrSCeQel8Qis4M+2HsFcWhS9TABHAyn7zgil9O9nztPlDH3b1FJF+nNFeITdPZ
 6BtU+2LA+hVSySB/DIYbJLnq5dlegjtjgWLVxdJqhBlJPaMmyShFgfYQzbS
IronPort-HdrOrdr: A9a23:w2xcAak/Ok3fhCUBbgcAMQen55fpDfPIimdD5ihNYBxZY6Wkfp
 +V8sjzhCWatN9OYh0dcLC7WJVpQRvnhPhICK0qTMqftW7dyReVxeBZnPHfKljbehEWmdQtsJ
 uIH5IObOEYSGIK8voSgzPIY+rIouP3iJxA7N22pxwGIHAIGsNdBkVCe32m+yVNNXh77PECZe
 OhD6R81l2dkSN9VLXEOpBJZZmJm/T70LbdJTIWDR8u7weDyRuu9b7BChCdmjMTSSlGz7sO+X
 XM11WR3NTvj9iLjjvnk0PD5ZVfn9XsjvNFGcy3k8AQbhHhkByhaohNU6CL+Bo1vOaswlA3l8
 SkmWZrA+1Dr1fqOk2lqxrk3AftlB4o9n/Z0FedxUDupMToLQhKffZptMZ8SF/0+kAgtNZz3O
 ZgxGSCradaChvGgWDU+8XIfwsCrDv7nVMS1cooy1BPW4oXb7Fc6aYF+llOLZsGFCXmrKg6De
 hVCt3G7vo+SyLUU5nghBgu/DWQZAVxIv/fKXJy+PB9kgIm0EyR9nFohfD2xRw7hdcAo5ot3Z
 WyDk0nrsALciYsV9MOOA4we7rFNoXze2O4DIuzGyWvKEhVAQOEl3bIiI9FkN1CPqZ4i6cPpA
 ==
X-IronPort-AV: E=Sophos;i="5.90,171,1643691600"; 
   d="scan'208";a="65936380"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=hmfgrI3zAIr6nZTbJrw4lvyuUi2O0fvLeH5OtgvnNS1ltRAdvRTD6WH2wiwCYF+Btr7e9jmeiwhxuUcdjDw1uRWqeurTHMJVaQj3N16cAy8ZM22iX3mQvr5t/03x+Cun2u7FOhsNSPWFRKKQg7rD5XPboavep6FddPUxUpCtdrznme66nx/N2Ii+uurdsoIocs9/fFV+15HP1MEo4M/jEXxWNglyE4kWQEK2/EQI/fXC0lqHEuXJ2VKbP0Hyda+ZND9x1b781WpobMftFTlOk+xbGwdbD9O8aUibv00UMgItp3ght9QTA693Q5yBC3Py5MYK8WxOv/3upKlpP2Vpew==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=/s5gVJxNwTvaCF1xn5jjrcbwlk1xb0M8vClxfrriSzc=;
 b=kRDZTFUoNxAmmax/7swcQYdHe+VVQyJ0aorvnf4wtsCmYUtlBzMihjfI1ErIixUkzOegoOetrR+DXtnpFnkHewwdMgYQlPdJ6qWm6B0dM2cQvRyHzxDLqjc8UX2sm2qJHF1vzij6wOpQaTnirOia7VoZhQ/LxUPEWLVHrs9hZSx/E5NPtPa5Uf8pSdh6M/sxWRqlf8f9j24ve12RstsgulCvUMTovhNlyMxSfpFhvSdzaCEmwG5QX56byKQ3CsbohJK360D6WfEDsOHJfPWJo0qg8RAcDd7niyJ7HnYsLliMjDB/ZwebSYHDkiuRmAwVFlUnmZRPKX/OuWqmrXDKbA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=/s5gVJxNwTvaCF1xn5jjrcbwlk1xb0M8vClxfrriSzc=;
 b=pwLxSS/swTPjQjuIuZ4aJfd2odq9tWG5r5t3QDVr3xPgKhAX8uZY2y09tVD8OnIpr/JdKludGQs1jQzqcoRAqQiaZXB8kpMUc148WVeXHVgCapZ3/g1SmmkL2vjUlwtrSB/AUdb/xAOftMk7aWk/2QXNEwnp+98knG5vOSLLMPw=
Date: Thu, 10 Mar 2022 16:47:01 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?=
	<marmarek@invisiblethingslab.com>, Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH 1/2] ns16550: reject IRQ above nr_irqs
Message-ID: <YioddbNor6w/U9ed@Air-de-Roger>
References: <20220310143403.50944-1-marmarek@invisiblethingslab.com>
 <7acb2915-5a9d-c1f1-4b7b-2bc6c2055ea3@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <7acb2915-5a9d-c1f1-4b7b-2bc6c2055ea3@suse.com>
X-ClientProxiedBy: LO2P265CA0174.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:a::18) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2d3d2a82-8b66-4c8f-3be3-08da02ad3aac
X-MS-TrafficTypeDiagnostic: DM5PR03MB2795:EE_
X-Microsoft-Antispam-PRVS: <DM5PR03MB27952C531906AC77AC87F9148F0B9@DM5PR03MB2795.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: JlMP5hOFtOodpwoAFxzdw4m831nKjXQfUpxj6HkrvMi1uvcy3LlsqrgFX4nBt2SVUR/3xIV7aJvhJflzJxTf2KL3VukU7rJDyy2jF5iipm+7gfP7dXKjb/LTKhfHr/tzFKqrmIGgrfAy8NEcAZqLT/eUV6hXsXS4gU3YxlZdWxJ+iBXmwkIiVgrpAIoCRQL9nnm/ptdm2HYmvw15pjwDU2FKnF+viU+SyCIuGuHjg6t91MQ4KWuJM/rYZdkwBw08yK1K3GAiQLydu+CcmKdyr9f8fbJFwNTZRa94icOlGD5U89Fo1iE9OSpo3LYFw55EPw5F0IYaq6lOL1MjTUmM5zf7XDDHIhvttnFUg4meANuuNNHsxv4RhpQIuOAyPMkcYiCjySx+ZumSjDD7HJcVmE0Zd4YA/Q2np9Jp2VsMmh2okN9N2HrDR1XygCBZXGcMKipYqwym/QfSH3WHkqPMKHnlJKcbTrgBr2kXZNS2uCk1Iqok4eslO2ELI7nXzj+m0guC/zLE+4goONDrT25GUgiiZBeFx5AVM1KMW59JVwV1F4/YbRq6zKS7KiFnS2OHjco8LDQuzuarKJvbh8PwbddT65DX/dyTaOhiDqxUFIVAvMk2rIV5kepVuQVX8JqaQ7/OaB5UeEM6XNUZ386lWw==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(33716001)(85182001)(83380400001)(38100700002)(186003)(26005)(2906002)(4744005)(54906003)(316002)(5660300002)(82960400001)(6486002)(6916009)(6512007)(9686003)(508600001)(8936002)(53546011)(66946007)(86362001)(66556008)(6506007)(4326008)(66476007)(6666004)(8676002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?cTVzVWdQZnJ2aVIzZERIM2lJaS80Z1dYb3ROY1NjdTZuUEJUM1lDNFRyV0NJ?=
 =?utf-8?B?N2dEVXJoeVQzcWtGRXFrUjBJR3EyQ1ZzTFdWbTRvOXA2ZGg5NExTOGExZmhD?=
 =?utf-8?B?Rmk3d0JRTVBiSThYaVJLUjVwbGFWazczQ0FxZ2taS21jYWpidmVxSEtjZnNM?=
 =?utf-8?B?MUI0TTBUR2V2UkswZlkrdURoWW1mUXAxbjdodjNYdmsrTjNlaFdFSzVuaXdT?=
 =?utf-8?B?KzFnQmg2OXZmd0l2M1B2d20rMGFlaWFwVUNZUklZK1dRakFJMEZJMDlhalhY?=
 =?utf-8?B?d29ET2JoNGg2OGZMYnJlckQ1SzlYeUNMZU9QQUhMY3BFQ2JnQkxuTEcweDRt?=
 =?utf-8?B?ZzFOOGhCOXdVV3ZJVjFZVFhxM1Fvenlwc2I4UmdLdERkN2E1SXRrbU5sN1Fa?=
 =?utf-8?B?OU51SG5OM0haUk1RRW5qUXB0VEhNRmlFRWJ3Q2ZEaWlGL3dzRGQ4MmVFN0ty?=
 =?utf-8?B?QjF0T29FNXVsYWNqQVZvRkNDNlpXcHQyTk1aOGY1OGpJZHN6ZWFsNWwrTFMz?=
 =?utf-8?B?STVFcm1ZUUNFbXRmQk84Q3BkZTRGa2NrUUUvdWp0d005YnRrN3J0NDlRYzcy?=
 =?utf-8?B?NldQck1xWEU4Y2thTlJRbkVmTjd4cFp4NUJDU3RKd0NOZDBYV2lxTWM1Uml1?=
 =?utf-8?B?VStBZnlMNVFubXliNU5NSEw5NmUyQ1hsMnY0NytMRkRGTUwxNEpRUTBzZjVT?=
 =?utf-8?B?YWVIdE1TRFl5S0I1TjlNbUNVNlhkUTJXcHFBS0RQZm5Id1c2NzR3WlJrWFVI?=
 =?utf-8?B?OGg0eVF6U0pjRXNBcmhlNng0RHRFb2lPUWFLaUdWaDVYTlZtOWIrenAyVnVR?=
 =?utf-8?B?NHV6bldiNG1IQy9vMmFXelpTUnUxb0Y5M01QcWZRRy9JTjZvVjlXYkxoNUFR?=
 =?utf-8?B?WVd3MkdMaE83eitDSXZUQUU3cWZLS0pYOWhVMnlWemtyZ3Rvb2dyeVhDeisr?=
 =?utf-8?B?VWljQUgrRzFXZmlyeEplNjRRUVJuMWl2cXN4K3RYQ3ZQbmhVdnpIbDY1ZHd6?=
 =?utf-8?B?N2dJUUo1Vjl1bXpXc0RYMlR0cEJPekJyZTNyN0Zva2Q5MEY5bi9WbmF5U0ZD?=
 =?utf-8?B?TXBNYXVMU1gvN2FkcnFFWUlPYllNRlo0MGxLTHNHOGJobVlIU2FYL3ZnNU1O?=
 =?utf-8?B?NjRCRVRKWkZ3bTVaaXYzZDJ4aWE2R0hJY0VGM28vKzVSM3psL2k2ODdCY0dk?=
 =?utf-8?B?YWJVckFZYmtUdkNQbm1zWHBXTWFrK2ZVUDRkeXJkYzVrNE9URzB6b3E0YkRt?=
 =?utf-8?B?T3RzMTVNZWFVeE1nU2tQamtWVW5JU0RjbVBuVXQ2b2JDbFdPQ1E2TFJHNHpk?=
 =?utf-8?B?ODdOUG5kV21pMHFVZitqeEx5ZE0vSDFSZ2tnbG0vbnV0cThSaHhDOHdvbXFZ?=
 =?utf-8?B?cEtOZnJ0UnU3SldOUk91cGlxTVlzNTNDTUgrbDE2VnhNZGV1akl0MVkzd0JO?=
 =?utf-8?B?MWZSNnBkUmUrZnJjbEJqVkVBNVFSNFdwOE4xRUt4L01DRm0rNWdzSmNyaUFm?=
 =?utf-8?B?Tlpla2M3Sm5BOXVkdVQreDBSbFJxV2tnVnVxbjkzQzlxa2pqNEp1OXhESHJS?=
 =?utf-8?B?NGJZMUQ4ajR0QksvQjBMNTBzWmlkV0tBOEJIejhyWjV6U3NoUkVkUDgwRzVI?=
 =?utf-8?B?ZGtNWnlTNFBGL0U5VGExdEdGUjdXWVFmMGFmdFRIam1walQvQkVIa3liTGxP?=
 =?utf-8?B?T1dyYTd0RjZIQ3RKd3d5YWdPdm5KWFZqa01PRllkYllMbE85TWFqQmpJR04x?=
 =?utf-8?B?TE95OWt6V0JXL3J3NFd6VDJWT0JKQnhpWUZlc0w5eEV6Vmh3WlkzTS9rbG92?=
 =?utf-8?B?ZEtOTlNmcXRQb3JBaE1EbHFoK2VRODFFUzA2TzVrSmZuMTBkSzA3SFpJR24z?=
 =?utf-8?B?QVg4b3FqZm5Pb2p3dSszb1lLa3V3MGkxazgyUE05WDJTbE40V2FPNVRPdWN5?=
 =?utf-8?B?ZGhmektValhqOVdSMXJsUG9PSHlMRkc3TndaQjVtVTdqOWFsQmQ3ZUZRbEtB?=
 =?utf-8?B?N3NlTDU3dFMrNWxmQlNKUXhyZ2RCMVNEQWNHUzB1Q0JBU1czaWFlbFdrRmNm?=
 =?utf-8?B?bkEvUmdleGdXdmFEQmwvUHNZWnE5dWlnZjBpVGI0WUdwTjRiZjdYZ2M0UldP?=
 =?utf-8?B?NFAraTc5OFJ3Wmp0dDVPZnNkdUxHWFdlckpQT1pQV0FoN3hJemp3UlArU2Q3?=
 =?utf-8?Q?rhdDiQFtRuy4gvZD4dLFVrA=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 2d3d2a82-8b66-4c8f-3be3-08da02ad3aac
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2022 15:47:06.4096
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: lu32C4aWaxyN63cBgLvXN8/WnwFIKCcgHeMx99s5DmM3Kao7IRAXZ5HtZHUP7VRoWoLqrKImV/hhipGDQkexIQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR03MB2795
X-OriginatorOrg: citrix.com

On Thu, Mar 10, 2022 at 04:23:00PM +0100, Jan Beulich wrote:
> On 10.03.2022 15:34, Marek Marczykowski-Górecki wrote:
> > --- a/xen/drivers/char/ns16550.c
> > +++ b/xen/drivers/char/ns16550.c
> > @@ -1221,6 +1221,9 @@ pci_uart_config(struct ns16550 *uart, bool_t skip_amt, unsigned int idx)
> >                              pci_conf_read8(PCI_SBDF(0, b, d, f),
> >                                             PCI_INTERRUPT_LINE) : 0;
> >  
> > +                if (uart->irq >= nr_irqs)
> > +                    uart->irq = 0;
> 
> Don't you mean nr_irqs_gsi here? Also (nit) please add the missing blanks
> immediately inside the parentheses.

If we use nr_irqs_gsi we will need to make the check x86 only AFAICT.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Thu Mar 10 15:54:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 15:54:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288467.489135 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSL7I-00064w-RD; Thu, 10 Mar 2022 15:54:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288467.489135; Thu, 10 Mar 2022 15:54:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSL7I-00064p-Nv; Thu, 10 Mar 2022 15:54:16 +0000
Received: by outflank-mailman (input) for mailman id 288467;
 Thu, 10 Mar 2022 15:54:16 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=VYsB=TV=citrix.com=prvs=061b0cdbb=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nSL7I-00064j-47
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 15:54:16 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 544179b4-a08a-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 16:54:14 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 544179b4-a08a-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646927654;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=KbRWDr3sxAjW263RaXChrPW0m2P9F35LFaSMlCYEnU8=;
  b=d0SXmuJLkNB2trhW7tD3JcKpQPYrYkQl+9vQ6DQCGzeRChUudX+VX9QL
   3magrMjUUatE8DBWxxyM0EX8gHnlrL2Mcim7jlmqkzukVbQFHorEbdJfX
   eQ+OPQw0flloIcW2TtFtcj4inwAVqr6Op56DwZQ45YlpSu/rTOA3ZIfxN
   s=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66329645
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:WDADGqO0OXmu2LPvrR1Yl8FynXyQoLVcMsEvi/4bfWQNrUokg2BSz
 zQdX2iCbPeJNmanc9l2YYzg9UwC6sLWn4IwSwto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi29Yw27BVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Zl
 MdtmJiPaywVLpL1s7UiYhtxLCEmBPgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALNs7kMZlZonh95TrYEewnUdbIRKCiCdpwgmlr3JEQQau2i
 8wxbDRDSDr+cw1zAkoFCM04g+2ZjCXyfGgNwL6SjfVuuDWCpOBr65D2K8bccNGOQcRTn26bq
 3jA8mC/BQsVXPSd1D6E/3SEluLJ2yThV+o6DLSl8tZ6jVvVwXYcYDUGWF3+rfSnh0qWX9NEN
 1dS6icotbI19kGgUp/6RRLQiHyOswMYWtFQO/Yn8wzLwa3Riy6jD2gZSnh6adoptOc/Xzls3
 ViM9/v2ARR/vbvTTmiSnp++oCmuIyETISknbDUdUAoey9D5pcc4iRenczp4OPfr1JuvQ2i2m
 m3U6nhl71kOsSIV//mp3X3DvBCHmoj2dyVk2TTVd12ltjosMeZJeLeUwVTc6P9BKqOQQV+Ao
 GUIlqCi0QweMX2evHfTGbtQRdlF897AaWSB2gA3Q/HN4hzwoybLQGxG3N1pyK6F2O4gcCShX
 kLcsBg5CHR7bCrzNv8fj25c5q0XIUnc+TbNC6i8gjlmOMEZmOq7EMdGPxD4M4fFyhRErE3HE
 c3HGftA9F5DYUid8BK4Rv0GzZggzT0kyGXYSPjTlkr7j+rDPSXOEelVbjNii9zVCove8G05F
 P4Fa6O3J+h3CrWiMkE7D6ZPRbz1EZTLLc+v8JEGHgJyCgFnBHsgG5fsLUAJIORYc1Buvr6Qp
 BmVAxYAoHKm3CGvAVjaOxhLNeK0Nb4i/C1TAMDZFQvxs5TVSd30t/l3mlpeVeRPydGPOtYvF
 qhbIZrcWqoTItkFkhxEBaTAQEVZXE3DrSqFPja/YSh5eJhlRgfT/cTjcBep/y4LZhdbf+Nky
 1F8/ms3maY+ejk=
IronPort-HdrOrdr: A9a23:XhFOQKAEkLJlVNzlHehOsceALOsnbusQ8zAXPh9KJiC9I/b1qy
 nxppkmPH/P6Qr4WBkb6Le90Y27MAnhHPlOkPQs1NaZLXLbUQ6TQr2KgrGSoQEIdxeOk9K1kJ
 0QD5SWa+eAfGSS7/yKmTVQeuxIqLLskNHKuQ6d9QYUcegDUdAf0+4TMHf8LqQZfngjOXJvf6
 Dsmfav6gDQMUg/X4CePD0oTuLDr9rEmNbPZgMHPQcu7E2rgSmz4LD3PhCE1lNGOgk/i4sKwC
 zgqUjU96+ju/a0xlv10HLS1Y1fnJ/ExsFYDMKBp8AJInHHixquZq5mR7qe1QpF692H2RIPqp
 3hsh0gN8N85zf4eXy0mwLk303a3DMn+xbZuCilqEqmhfa8aCMxCsJHi44cWADe8VAcsNZ117
 8O936FtrJMZCmw0xjV1pztbVVHh0C0qX0tnao4lHpES7YTb7dXsMg24F5VKpEdByj3gbpXXN
 WGNPuspcq+TGnqL0ww5gJUsZ+RtzUIb1q7q3E5y4KoO2M8pgE686MarPZv6kvouqhNDqWs3N
 60QZiApIs+PvP+UpgNdtvpYfHHfFAlEii8eV57HzzcZdQ60jT22trK3Ik=
X-IronPort-AV: E=Sophos;i="5.90,171,1643691600"; 
   d="scan'208";a="66329645"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=F9HzRpSdyWLmp3wN5m2B/pFrdM1eNhwGsjOIcbPsyAbxil1CcBdn8S58lwIxXN0Plibu3QyZf9NF42JVDbJHvEs1PyX1hAxLd4ospq8e2czoG2pr0Bvs+/9eyE9ndbM8ClET7p6baNcM1mpdRGV0HXvole/zvSDdAm/2vEhYo1dSqsKpUfTS0Wf6FghCkluE1vM1x41aQNOPr2Zp7s6VnmBnjysLgF4iiH0NEi4s8dJUeHDuDJgF6gGqwux//HwWhB0CKgRuzapblckUMu8Eg4sxDm1ihVYyf40OkIQ+KESIBE3Xmqn/QMUUNKDdhwQr5Dk6NfHEdi2GeVOcLDevDg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=xiJt5U5O8Z9CAexKMAcOxSWKg1/YLpXUdbmtbgPL2wA=;
 b=Vd3gZvsFmZamARcdVDV3Tu58SEW9Ii+6YkvwOscl+K9cUjl9iACUG6zdwlQ5dUyvzgmVtZNxJN9tQ0R+M/IS/u9Cg3J4HvF30t+An6qL167GEI6MjQiLJFdfL+hBRIX4N2WVlu9LVxtuFOSX9fAg0DwBrzNSya3oY9plkGMdLTNpvhyuDryaDfiPtv895lDG3GzsMx40VQVl7azrPdjXyGmd6jdLWFuTBj6Ts2D6CaVEdarcVhxb2GhDOa0n18a12sE2dGoo15yJZDJvAcy0gnRdM7Vx+ya3RNAjnMWjSyU0bCeaX+l5tpUsqAPkkNoOGiTtnkBG6R8Qa7008Oc84g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=xiJt5U5O8Z9CAexKMAcOxSWKg1/YLpXUdbmtbgPL2wA=;
 b=u4h963tCWql0BdngbANk8DrD/VVuV9Oe1V10ch9TS3u7LyqYDJiyFSEcQPjuWKayPWY1MEimfzRqKQRPHGVCELJe4CvegjpsTAW4Mz5X84e6mHo6O1++Vcvm6NPqp21hyqA7vVqLbbWA9fHZTHnnhhvgjNPKDxNRvVvZBCL0EAI=
Date: Thu, 10 Mar 2022 16:54:04 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Rahul Singh <Rahul.Singh@arm.com>
CC: Jan Beulich <jbeulich@suse.com>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, Andrew Cooper <andrew.cooper3@citrix.com>, Wei
 Liu <wl@xen.org>, George Dunlap <george.dunlap@citrix.com>, Julien Grall
	<julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Paul
 Durrant <paul@xen.org>
Subject: Re: [PATCH v2 1/3] xen/vpci: msix: move x86 specific code to x86 file
Message-ID: <YiofHD23sCnvLBfO@Air-de-Roger>
References: <6e188f87-7e4c-00ee-dd0c-373d42acec34@suse.com>
 <6BFB9B87-D8A1-442D-B4DC-18760C59D7BF@arm.com>
 <c11278f4-c902-0eb9-ac59-e27c0f2ba912@suse.com>
 <41F03A07-F8D6-423D-9E40-F4B89C611C87@arm.com>
 <175a55cc-70b4-4832-9a78-0db57a9ae4a4@suse.com>
 <1205992D-ACE4-4E94-B554-3B14F6D9697E@arm.com>
 <35ad9273-956b-86d6-55a3-c737575a7880@suse.com>
 <515CDCB8-43D2-4D08-9195-D058E641E1BF@arm.com>
 <YijQc9DejYAo3EcS@Air-de-Roger>
 <500E2C83-DC6E-47C0-B345-D03F67472196@arm.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <500E2C83-DC6E-47C0-B345-D03F67472196@arm.com>
X-ClientProxiedBy: LNXP265CA0058.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:5d::22) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 86ae3a2e-2954-46d3-4a18-08da02ae3661
X-MS-TrafficTypeDiagnostic: CH0PR03MB6196:EE_
X-Microsoft-Antispam-PRVS: <CH0PR03MB6196996B10F3D163D930C5ED8F0B9@CH0PR03MB6196.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(82960400001)(83380400001)(316002)(54906003)(5660300002)(6486002)(6916009)(8676002)(4326008)(8936002)(66476007)(66946007)(66556008)(26005)(186003)(508600001)(6512007)(53546011)(6666004)(9686003)(2906002)(6506007)(86362001)(33716001)(85182001)(38100700002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?TkhkSVFXY01OMHhSMXZKR0RoYjlYMUR1MmprVWZQRWpzR29oeERuRG4yZXpS?=
 =?utf-8?B?b2ZtU1VIalVyd2l0VFUwVnhNY3F1T2dzRjFCSlE5OGtPRmV2TGRVa2tzcmNv?=
 =?utf-8?B?OHF0OE9BemRTRWdWdEZFWnplNWdsTzg2MEZobXVEM3Z6UXVJa0JSbnNrOTc0?=
 =?utf-8?B?eEpDWGtoVG13ZnVTbXBDTGlRdGN1NFlMWDlCMGtMNkNIanNNUzM1MjI1K2dQ?=
 =?utf-8?B?dU5uM212UW0vNXJ6RnY0RVF4K0N2WWkvTnRxdlI3Qkp5Y2VJYnVybnJJYnZw?=
 =?utf-8?B?dXZ1aFI3UThZelYzMXpuYUtNWEFIOWF6SEpnamdGblBldmRWcFlrZms2ZVh5?=
 =?utf-8?B?SWtQdXR4VW5TR1d2NW1LK3J1S3g3UFJZVE1qUElZZU9WQ0F0dGFlNmlnay9m?=
 =?utf-8?B?bk40SXdabEE5QUtteENZNVVDSjc0alZCdjZkWGZzblJsNUxvek5xWnZ0WElT?=
 =?utf-8?B?NmVYRWZUSGNjYVFhVDdINmp0RUsrR21xdWpteVhXZWROTUdpdjFMaFJzUXVQ?=
 =?utf-8?B?RE04U3NOUW5maEZiZEV4eUhGRkpkZVMvYklxRk1XdkxuMy81R0Z0OXdsb3JO?=
 =?utf-8?B?QnRvemFyNUIxSnFuWnFnT1FTa3ZCelgrdE01akRWRlVyK1h2UXV5MlNKcDVu?=
 =?utf-8?B?QjVyeGFhLzJvNFEvd1VUT1RTbDU0aXFPVncwRk5IUmJXRXlaMGNZeHkwdmJm?=
 =?utf-8?B?MnE4bVFlUXBvOVovajV0NTM3MWdpMW00c3dDZHNXZGMveE52RWNZZ1craENm?=
 =?utf-8?B?YXVXYmQ0S1lZUGxnWXgraThKWStia29rMHp0bHVGelZQZUNGdHdmOUNQaTZn?=
 =?utf-8?B?R0tqTXdiVi8zVDJReE5iM3Iza1ZvSWdGTjJqSWdyUDhJUkdXanFzbHdId0Uw?=
 =?utf-8?B?VGtKZkJmVWtEaDVLKzJqQTZ3Q0FOb3RoMnlQYk1BMUc2RkMvbTNOWEZ1MXpG?=
 =?utf-8?B?UUgyZG9xSHVWQ2lrcHl1cmVPbDJveUVhOHBxMGI5V2duYkR4TFRFT3lRMXpB?=
 =?utf-8?B?QVc5VnBDSzlKaENyZ2lSS3hMV1dMb2lybDZCaHVoY3Y5dzZySmc4VENKSXZV?=
 =?utf-8?B?TXFwNmNzaGo5SXhmNjJYQ0QxZU95OVlESlJRUXVYOXpIS2xIc1NEc2ZjRlZB?=
 =?utf-8?B?TE00aHptK3lpaHZvcU53YzlaNU5yRWdOVHgvcTZMalZqZDRPc25GWUdZMjBu?=
 =?utf-8?B?NFJERVlGc1h4MWJrRGh5K2xyVk8raU8weWpreDVvblRHK0lRb1doZ2FMWjFM?=
 =?utf-8?B?VEt1VnJCY0hVY3MySnM1am8yN3NlZFBrZ2daYW90QXRpc2ExYWthU1grQXZj?=
 =?utf-8?B?Z01Da1RXQTE1a0EyYzdkRTJBeXk5S1ZLT3VsVm5IWnNnRTZvSDdQRVcwSTdD?=
 =?utf-8?B?QytJdFlLM1ZSN0ZMRWQ2WlFRaGFCcUpUbWEzTUFIOThwNlJjbWpWL1ZWcHRj?=
 =?utf-8?B?K1ZCdk1KTDhyZjFKL1FKSSsyUTNKMFNmMkdSZ0xHSFhjdFRJd2h1dkNJem95?=
 =?utf-8?B?eWltQkxKcXJzUVBDVW5xUzdESlA3bTdFNTl3VzUrem5MT0xqdmV6QXZGYjJo?=
 =?utf-8?B?c2dDV29JdkVyMlJWSHNDVy9vNGZING9TR3B3MU1KRFFxSjR6VG1OODRhanBG?=
 =?utf-8?B?NzVSdlVnbWw2KzZYVmd3bWttcTYzNVB1MWRycXhDWHJTR3NZQldNeHc5T3kz?=
 =?utf-8?B?UUV0MzhKUlQvK2M2eUl0Ny9zbTF6Z1ppM0tHRDd2aUJrNWR3Smx5MjBtSXZP?=
 =?utf-8?B?aDBLQWtUWVc3VkU0RXVPMjE0NVpXaGtHS29hamdFUTR5OUwxZWx2UGgwbjJS?=
 =?utf-8?B?M0JTdzQ4c0xLa3hJSjZUQk5HZzgyRzFDZXk3N1JvM3NvRHNCaTZ0dWtEVmYv?=
 =?utf-8?B?YThoN1d6ODF0L1FaL0RrL2xWdmJrUEhWbjFHcXovbVVhTjZzWCtkUXd4OXVN?=
 =?utf-8?B?YU5sNXBUMlM2ZmRCRzYwUUw3WHBsZnJVZWM1Q013UXEzUW8rTjFXbE5WOXhh?=
 =?utf-8?B?UUdOMlBwbkJBPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 86ae3a2e-2954-46d3-4a18-08da02ae3661
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2022 15:54:08.7819
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: NSkzoPsjqCwnKviHZ6wYSdrzNx7O4IoKvR/feXF897W6tLwEq1hR+fH6E7ExGSdaxG+L/nQOtWVT/6BQIuBiFA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH0PR03MB6196
X-OriginatorOrg: citrix.com

On Thu, Mar 10, 2022 at 11:48:15AM +0000, Rahul Singh wrote:
> Hello Roger,
> 
> > On 9 Mar 2022, at 4:06 pm, Roger Pau Monné <roger.pau@citrix.com> wrote:
> > 
> > On Wed, Mar 09, 2022 at 03:50:12PM +0000, Rahul Singh wrote:
> >> Hi Jan,
> >> 
> >>> On 9 Mar 2022, at 10:17 am, Jan Beulich <jbeulich@suse.com> wrote:
> >>> 
> >>> On 09.03.2022 11:08, Rahul Singh wrote:
> >>>> Hi Jan,
> >>>> 
> >>>>> On 4 Mar 2022, at 7:23 am, Jan Beulich <jbeulich@suse.com> wrote:
> >>>>> 
> >>>>> On 03.03.2022 17:31, Rahul Singh wrote:
> >>>>>>> On 1 Mar 2022, at 1:55 pm, Jan Beulich <jbeulich@suse.com> wrote:
> >>>>>>> On 01.03.2022 14:34, Rahul Singh wrote:
> >>>>>>>>> On 24 Feb 2022, at 2:57 pm, Jan Beulich <jbeulich@suse.com> wrote:
> >>>>>>>>> On 15.02.2022 16:25, Rahul Singh wrote:
> >>>>>>>>>> --- a/xen/arch/x86/hvm/vmsi.c
> >>>>>>>>>> +++ b/xen/arch/x86/hvm/vmsi.c
> >>>>>>>>>> @@ -925,4 +925,106 @@ int vpci_msix_arch_print(const struct vpci_msix *msix)
> >>>>>>>>>> 
> >>>>>>>>>> return 0;
> >>>>>>>>>> }
> >>>>>>>>>> +
> >>>>>>>>>> +int vpci_make_msix_hole(const struct pci_dev *pdev)
> >>>>>>>>>> +{
> >>>>>>>>>> +    struct domain *d = pdev->domain;
> >>>>>>>>>> +    unsigned int i;
> >>>>>>>>>> +
> >>>>>>>>>> +    if ( !pdev->vpci->msix )
> >>>>>>>>>> +        return 0;
> >>>>>>>>>> +
> >>>>>>>>>> +    /* Make sure there's a hole for the MSIX table/PBA in the p2m. */
> >>>>>>>>>> +    for ( i = 0; i < ARRAY_SIZE(pdev->vpci->msix->tables); i++ )
> >>>>>>>>>> +    {
> >>>>>>>>>> +        unsigned long start = PFN_DOWN(vmsix_table_addr(pdev->vpci, i));
> >>>>>>>>>> +        unsigned long end = PFN_DOWN(vmsix_table_addr(pdev->vpci, i) +
> >>>>>>>>>> +                                     vmsix_table_size(pdev->vpci, i) - 1);
> >>>>>>>>>> +
> >>>>>>>>>> +        for ( ; start <= end; start++ )
> >>>>>>>>>> +        {
> >>>>>>>>>> +            p2m_type_t t;
> >>>>>>>>>> +            mfn_t mfn = get_gfn_query(d, start, &t);
> >>>>>>>>>> +
> >>>>>>>>>> +            switch ( t )
> >>>>>>>>>> +            {
> >>>>>>>>>> +            case p2m_mmio_dm:
> >>>>>>>>>> +            case p2m_invalid:
> >>>>>>>>>> +                break;
> >>>>>>>>>> +            case p2m_mmio_direct:
> >>>>>>>>>> +                if ( mfn_x(mfn) == start )
> >>>>>>>>>> +                {
> >>>>>>>>>> +                    clear_identity_p2m_entry(d, start);
> >>>>>>>>>> +                    break;
> >>>>>>>>>> +                }
> >>>>>>>>>> +                /* fallthrough. */
> >>>>>>>>>> +            default:
> >>>>>>>>>> +                put_gfn(d, start);
> >>>>>>>>>> +                gprintk(XENLOG_WARNING,
> >>>>>>>>>> +                        "%pp: existing mapping (mfn: %" PRI_mfn
> >>>>>>>>>> +                        "type: %d) at %#lx clobbers MSIX MMIO area\n",
> >>>>>>>>>> +                        &pdev->sbdf, mfn_x(mfn), t, start);
> >>>>>>>>>> +                return -EEXIST;
> >>>>>>>>>> +            }
> >>>>>>>>>> +            put_gfn(d, start);
> >>>>>>>>>> +        }
> >>>>>>>>>> +    }
> >>>>>>>>>> +
> >>>>>>>>>> +    return 0;
> >>>>>>>>>> +}
> >>>>>>>>> 
> >>>>>>>>> ... nothing in this function looks to be x86-specific, except maybe
> >>>>>>>>> functions like clear_identity_p2m_entry() may not currently be available
> >>>>>>>>> on Arm. But this doesn't make the code x86-specific.
> >>>>>>>> 
> >>>>>>>> I will maybe be wrong but what I understand from the code is that for x86 
> >>>>>>>> if there is no p2m entries setup for the region, accesses to them will be trapped 
> >>>>>>>> into the hypervisor and can be handled by specific MMIO handler.
> >>>>>>>> 
> >>>>>>>> But for ARM when we are registering the MMIO handler we have to provide 
> >>>>>>>> the GPA also for the MMIO handler. 
> >>>>>>> 
> >>>>>>> Question is: Is this just an effect resulting from different implementation,
> >>>>>>> or an inherent requirement? In the former case, harmonizing things may be an
> >>>>>>> alternative option.
> >>>>>> 
> >>>>>> This is an inherent requirement to provide a GPA when registering the MMIO handler.
> >>>>> 
> >>>>> So you first say yes to my "inherent" question, but then ...
> >>>>> 
> >>>>>> For x86 msix mmio handlers is registered in init_msix(..) function as there is no requirement
> >>>>>> on x86 to provide GPA when registering the handler. Later point of time when BARs are configured
> >>>>>> and memory decoding bit is enabled vpci_make_msix_hole() will clear the identity mapping for msix
> >>>>>> base table address so that access to msix tables will be trapped.
> >>>>>> 
> >>>>>> On ARM we need to provide GPA to register the mmio handler and MSIX table base
> >>>>>> address is not valid when init_msix() is called as BAR will be configured later point in time.
> >>>>>> Therefore on ARM mmio handler will be registered in function vpci_make_msix_hole() when
> >>>>>> memory decoding bit is enabled.
> >>>>> 
> >>>>> ... you explain it's an implementation detail. I'm inclined to
> >>>>> suggest that x86 also pass the GPA where possible. Handler lookup
> >>>>> really would benefit from not needing to iterate over all registered
> >>>>> handlers, until one claims the access. The optimization part of this
> >>>>> of course doesn't need to be done right here, but harmonizing
> >>>>> register_mmio_handler() between both architectures would seem to be
> >>>>> a reasonable prereq step.
> >>>> 
> >>>> I agree with you that if we modify the register_mmio_handler() for x86 to pass GPA
> >>>> we can have the common code for x86 and ARM and also we can optimize the MMIO
> >>>> trap handling for x86.
> >>>> 
> >>>> What I understand from the code is that modifying the register_mmio_handler() for
> >>>> x86 to pass GPA requires a lot of effort and testing.
> >>>> 
> >>>> Unfortunately, I have another high priority task that I have to complete I don’t have time
> >>>> to optimise the register_mmio_handler() for x86 at this time.
> >>> 
> >>> Actually making use of the parameter is nothing I would expect you to
> >>> do. But is just adding the extra parameter similarly out of scope for
> >>> you?
> >>> 
> >> 
> >> If I understand correctly you are asking to make register_mmio_handler() declaration
> >> same for x86 and ARM. You are not asking to modify the x86 MMIO handler logic to
> >> use GPA to find the handler?
> >> 
> >> As Roger also mentioned that vpci_make_msix_hole() is required only for x86 to clear
> >> the identity mapping. If we make the vpci_make_msix_hole() arch-specific there is no
> >> need to modify the parameter for register_mmio_handler(), as for x86 and ARM
> >> register_mmio_handler() will be called in different places.
> >> 
> >> For x86 register_mmio_handler() will be called in init_msix() whereas for ARM
> >> register_mmio_handler() will be called  in vpci_make_msix_hole(). In this case we
> >> have to move the call to register_mmio_handler() also to arch-specific files. If we move
> >> the register_mmio_handler()  to arch specific file there is no need to make the
> >> function common.
> > 
> > So then for Arm you will need something akin to
> > unregister_mmio_handler so the handler can be removed when memory
> > decoding is disabled?
> > 
> > Or else you would keep adding new handlers every time the guest
> > enables memory decoding for the device without having removed the
> > stale ones?
> 
> Yes, when I will send the patches for ARM I will take care of this not to register the handler 
> again if the memory decoding bit is changed. Before registering the handler will check 
> if the handler is already for GPA if it is already registered no need to register.

I think it might be helpful to post the Arm bits together with the
moving of the x86 ones. It's way easier to see why you need to make
certain things arch-specific if you also provide the Arm
implementation at the same time. Or else it's just code movement that
might need to be redone when Arm support is introduced if we deem that
certain parts could be unified.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Thu Mar 10 16:08:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 16:08:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288471.489146 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSLKr-0008B7-0e; Thu, 10 Mar 2022 16:08:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288471.489146; Thu, 10 Mar 2022 16:08:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSLKq-0008B0-Te; Thu, 10 Mar 2022 16:08:16 +0000
Received: by outflank-mailman (input) for mailman id 288471;
 Thu, 10 Mar 2022 16:08:16 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=7C/d=TV=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nSLKp-0008Au-Vb
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 16:08:15 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4a2bc5ef-a08c-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 17:08:14 +0100 (CET)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur02lp2052.outbound.protection.outlook.com [104.47.4.52]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-41-R7bo826bO3iJT1BY5juSQg-1; Thu, 10 Mar 2022 17:08:13 +0100
Received: from AM0PR04MB5587.eurprd04.prod.outlook.com (2603:10a6:208:125::12)
 by AM6PR04MB6757.eurprd04.prod.outlook.com (2603:10a6:20b:fb::33)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.16; Thu, 10 Mar
 2022 16:08:11 +0000
Received: from AM0PR04MB5587.eurprd04.prod.outlook.com
 ([fe80::dd50:54e6:1f96:3b33]) by AM0PR04MB5587.eurprd04.prod.outlook.com
 ([fe80::dd50:54e6:1f96:3b33%3]) with mapi id 15.20.5061.022; Thu, 10 Mar 2022
 16:08:11 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4a2bc5ef-a08c-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646928494;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=41vb8MNvBpU12xre5qevGtO4jMVtPh5Q8JtUiG0Sg0g=;
	b=Pn+1S0wtYtQAE27OqjqOpebrc7LtjYuJL0H47THCx//3FIZoxwzzT1C3I1VfDHWvweaHEV
	XidHTf0tEnT8SKMrqpRc+PNGnPhU3cq4l969BogFEkye0oGHJMPlnNiSGq6co/6nS9rzGz
	sSM8bWr+w95xoFRnHP0R6pJP627Xunk=
X-MC-Unique: R7bo826bO3iJT1BY5juSQg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=e+N8xP/XWTcftcBsGEZNZjPtaIao/0iM8tTZqlQw9a1CtjRrknyO95XZ3py8nmFaHULZKvc71WyyjcQpmjgzczx2W7zx8Jqes70nh0vWy5Z5vUtoN0QzK0mneu8gz9afjoOQBbUt4A0fHSJXM4vBS3fxBKIt6XIZnatV2gba32kb+dqdPaMiLqx1EnZORkE3gRqqV9qxzFOZ01T/KnwSvVtNBibL+cB0+9Ig+3nUyyXqfQXPuEvp5tH098ab+b9xhzQr5z6ozU9i9v/f/T4e2Ko0LwlmgO2+c7TcROWVmrlZ+8QPVxqfgnRsbQgKQ/Fjs+EU7t8Y6Xh89IjoIQlFSw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=s2ajQbdS592gU6A5RpIAVFt/gH7Fr3CwjQ3HlwM07HU=;
 b=a/b0iZFk18/ixBC4sSTZoKxTTVU1jDbctbgRHbzVBJ1CBnTkYYVb273r3rbBh8TqVvNJH57/lfY9o0GXMm9wSr0bGXCpPi0a76MaU/JHINF+dMz6EXAWGoFabAGvSSN0SsCVrw85Wh9xbZtwaFgxA+VSA3eqZvB/kF6vRU4jjsR7c6VqKaVaRl2ocCMLiEOAq1xMlAxRXrP3xnKqEaORvePUVP7RUk/NHmfqmo/VPN0HwkCu2Vq1r4vBYvWZ7l6tcbFWK14FeSEMV005Iwrfh76xQ013vVTtI9FjYoHJSUGa5ogJBndAsuQPj+DGiKyfeVoBz7POzrfoT/CGJzJ5QA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <53361d65-2bd8-c07b-938c-91b95f2d68ad@suse.com>
Date: Thu, 10 Mar 2022 17:08:07 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH 1/2] ns16550: reject IRQ above nr_irqs
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?=
 <marmarek@invisiblethingslab.com>, Andrew Cooper
 <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Wei Liu <wl@xen.org>, xen-devel@lists.xenproject.org
References: <20220310143403.50944-1-marmarek@invisiblethingslab.com>
 <7acb2915-5a9d-c1f1-4b7b-2bc6c2055ea3@suse.com>
 <YioddbNor6w/U9ed@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YioddbNor6w/U9ed@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6P193CA0110.EURP193.PROD.OUTLOOK.COM
 (2603:10a6:209:85::15) To AM0PR04MB5587.eurprd04.prod.outlook.com
 (2603:10a6:208:125::12)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ec62654f-50f5-4c0d-acd8-08da02b02cb8
X-MS-TrafficTypeDiagnostic: AM6PR04MB6757:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB67574CB7664B67A0A712DBE8B30B9@AM6PR04MB6757.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR04MB5587.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(186003)(2616005)(26005)(53546011)(31686004)(6666004)(83380400001)(8676002)(4326008)(6506007)(38100700002)(6512007)(66556008)(66946007)(66476007)(2906002)(8936002)(4744005)(5660300002)(36756003)(6486002)(508600001)(6916009)(316002)(86362001)(31696002)(54906003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?nQKs3fYVK5mgiNdLcTWTtJg0atcLoXP48vTehYaDdoZpqYryLqQAky7ohgwR?=
 =?us-ascii?Q?d9Q+BMl4TdMsAp6xIf97pQLsiTaEH+TDmLqal7o5WfA793sHRnXRAwmCCYzD?=
 =?us-ascii?Q?kWt0r/hglaDgfuSJL9hKL0m/c+zKqsE/nx6MSzfjGZQuSI2b7OzscC+xxaZu?=
 =?us-ascii?Q?pKMK7WvjP+hDVVrNRtpt5VkfRaqtf1ZXbYBAuyQ5zEjr2yZr55eHFKyFCABn?=
 =?us-ascii?Q?0/zQvEYC6V5Fcx9JYZmiwBRPC5Rgr+6wWZOa5FFX8e85eyAieRa4zlXN9Ozq?=
 =?us-ascii?Q?JzuCb4eY1NFkoDgRnbRN+MVd3xFJfY3tPX6oWFwG5tIppVLvVAxY7T0AEjLO?=
 =?us-ascii?Q?apBFfFFZ/VIO30hzUr72DbXa9R/SJxInITvWFlDkQ7uJhjc99KFP8Et4zqmr?=
 =?us-ascii?Q?xH6oZMO7yr1RVrH+vE09IRFa3gRn3XEwRFM2KE0KbCPzrr0yLME5mHS/tkRn?=
 =?us-ascii?Q?Jx8uIOoIAczhzNaWFuLkMyLjpAQNopEbU6ru/9l9xtGCAQCMpu03w0BNeVKP?=
 =?us-ascii?Q?zBvRXxGKyzTHNxamX/ZLrM3Oy9KDfR1Qn+J5uxl+zIFqUym8bySbMpddecCL?=
 =?us-ascii?Q?4YHnUIJ18weTI+t1MHTkuvcdrLFywcOGWyvLw7Fy0GAYZxS5xMTmDL1QTB+7?=
 =?us-ascii?Q?801JcQ9wAdjhPUtvx4VKZxL0kDmgLix55JCcv1IKyiLSH6O+KTWPqWeL+5Al?=
 =?us-ascii?Q?2PkFaytlNOvBVvMmE3jTDyQ1ldIQn6B/Bl2uaNyOWLEEKluwzy78tJOZsM/4?=
 =?us-ascii?Q?R89tH1DzzNshKxZHvAxiG1xW1a3IolCcbfnPXCgPtwZrf3BA6UpKpVo2bS1L?=
 =?us-ascii?Q?y0Xl+4Rp9hO0SiZ+MA01ce8AarHAlj15vvBGoqVWid731e6XqsuNhSnAy0r0?=
 =?us-ascii?Q?k+LxZ2NIx4GGr6x75kA8u2KUcacK9L28l6TD4HEf5m6RycxKnzibnYSPXF8s?=
 =?us-ascii?Q?WaLZify9MdtoCrwVmIeTHWfprL68vPEcOnrcuH4nNq1n57ZLYy8zkWhS1l/n?=
 =?us-ascii?Q?0pbPikWJhdZA4aa3c/ET0RLUcczq4xLzF8Py2MtGV/hckw05mE4/e209StNz?=
 =?us-ascii?Q?ikdD8WgNg5DSp7CiF4DLnFOreXxBUIlTyAyR8/m7E6r27+BmWXG4CqYvcwtD?=
 =?us-ascii?Q?ojK0sd/335eww5CWlz7qL0NCdroLMecE5PiyTv5eeWUopzCXPfAc6f+lKfg3?=
 =?us-ascii?Q?facQtDYPH++ratHwKUtjxpMxbCr9OwgFg6EK6RDkDti9cydSjGh3akkVOWpR?=
 =?us-ascii?Q?4MK1rsicuDihsxr1XZaFkFkHuyzBJfwU/crqrjuYNRGIUNFeFXSHQX9BJBja?=
 =?us-ascii?Q?ig7vGBWGD4oWkX2H3wxEdOCOasR+cbCisPt8PZPlTy+mZhqgWYoGBep6KJ6J?=
 =?us-ascii?Q?lYb4bvuAnFTvWGiorlw5BGMTVHtuvzbxQGx1nAgztF2vS8ZtArxoGufeI4+v?=
 =?us-ascii?Q?or+eLc+hIjcKRGQsCAcT3lIwp/vZalfIOl79hVdgDSCVT486wub+oBgvlcEo?=
 =?us-ascii?Q?UedTxnLT05LECL8xw80qrpxXdRl7wSUp777freX7z+rKo2B3xdEyVagidC3j?=
 =?us-ascii?Q?WIx5n25NN5Q4rysn2XbvUjWxyUzyaBQe5Ipo6uh5mmQf5aCVWkooiPZ5iDfc?=
 =?us-ascii?Q?hJjycy8rv17HUnrB8yl7R9Q=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ec62654f-50f5-4c0d-acd8-08da02b02cb8
X-MS-Exchange-CrossTenant-AuthSource: AM0PR04MB5587.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2022 16:08:11.8208
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: KOq9gWxr+u116/tekgJfZYF47maHfLmG0Zt6lEcLDNfn18bsVu6w9Dq8PgZBWRLs8gVO744SGVHQ/W4jEo34Sg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB6757

On 10.03.2022 16:47, Roger Pau Monn=C3=A9 wrote:
> On Thu, Mar 10, 2022 at 04:23:00PM +0100, Jan Beulich wrote:
>> On 10.03.2022 15:34, Marek Marczykowski-G=C3=B3recki wrote:
>>> --- a/xen/drivers/char/ns16550.c
>>> +++ b/xen/drivers/char/ns16550.c
>>> @@ -1221,6 +1221,9 @@ pci_uart_config(struct ns16550 *uart, bool_t skip=
_amt, unsigned int idx)
>>>                              pci_conf_read8(PCI_SBDF(0, b, d, f),
>>>                                             PCI_INTERRUPT_LINE) : 0;
>>> =20
>>> +                if (uart->irq >=3D nr_irqs)
>>> +                    uart->irq =3D 0;
>>
>> Don't you mean nr_irqs_gsi here? Also (nit) please add the missing blank=
s
>> immediately inside the parentheses.
>=20
> If we use nr_irqs_gsi we will need to make the check x86 only AFAICT.

Down the road (when Arm wants to select HAS_PCI) - yes. Not necessarily
right away. After all Arm wants to have an equivalent check here then,
not merely checking against nr_irqs instead. So putting a conditional
here right away would hide the need for putting in place an Arm-specific
alternative.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 16:13:05 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 16:13:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288476.489156 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSLPU-0001C1-Lz; Thu, 10 Mar 2022 16:13:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288476.489156; Thu, 10 Mar 2022 16:13:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSLPU-0001Bu-It; Thu, 10 Mar 2022 16:13:04 +0000
Received: by outflank-mailman (input) for mailman id 288476;
 Thu, 10 Mar 2022 16:13:03 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=VYsB=TV=citrix.com=prvs=061b0cdbb=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nSLPT-0001Bo-5m
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 16:13:03 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ecd8c87b-a08c-11ec-853a-5f4723681683;
 Thu, 10 Mar 2022 17:12:48 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ecd8c87b-a08c-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646928781;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=UF2mG6fP4M+bVNhG6XTeSIsciHp0NzyisAMoElppjYU=;
  b=H3SrYfd0RjCy+XfDsdBZt7IKZPhbYWAifUJq2Vywk2XC7iafY72ai9Y2
   YwkEMqJu0+G3Uutwt9fuG0YpnFzHuXw1OB+ib873UsnzVPkO9L32G9gC+
   nBByvF+Dp5w1mWjWl6mLewz1hZE6NgqFBbKD4i+IpK7O3K17idgv4rgcz
   A=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 68288830
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:ZdkzGq4OLBqG4nh8UDy08QxRtOHHchMFZxGqfqrLsTDasY5as4F+v
 mEZDG/QOvbbMTPyet13aIuy9UgPuMXTz4NgSgY+/ngyHi5G8cbLO4+Ufxz6V8+wwmwvb67FA
 +E2MISowBUcFyeEzvuVGuG96yE6j8lkf5KkYAL+EnkZqTRMFWFw0XqPp8Zj2tQy2YPgW1vX0
 T/Pi5a31GGNimYc3l08s8pvmDs31BglkGpF1rCWTakjUG72zxH5PrpGTU2CByKQrr1vNvy7X
 47+IISRpQs1yfuP5uSNyd4XemVSKlLb0JPnZnB+A8BOiTAazsA+PzpS2FPxpi67hh3Q9+2dx
 umhurToR113IoDwnd8NVgRfECZ6F65Bw6T+dC3XXcy7lyUqclPpyvRqSko3IZcZ6qB8BmQmG
 f4wcW5XKErZ3qTvnez9GrIEascLdaEHOKsFvX5t13fBBOsOSpHfWaTao9Rf2V/cg+gQTayON
 5pCMVKDajyRYQxvCmwQJqkhkf+QmnnnWQdqmH+s8P9fD2/7k1UqjemF3MDuUseRWcxfk0Kcp
 2TH12f0GBcXMJqY0zXt2m2orv/Cm2X8Qo16PK218LtmjUOewkQXCQYKTh2rrP+hkEm8VtlDb
 UsO9UIGr6I/6UiqRdnVRACjrTiPuRt0c99ZCegz8gyO4qvS/QeCB2IAQyJBadopr8s/T3oh0
 Vrht9H0AT1itpWFRHTb8a2bxQ5eIgBMczVEP3VdC1JYvZ+z++nfky4jUP47HvTrkvDJHArgx
 i2Nry86rbYUttUygvDTEU/8vxqgoZ3ATwgQ7wrRX3644g4RWLNJd7BE+nCAs68ecd/xok2p+
 SFdxpPAtLxm4YSlyXTVKNjhCo1F8Bps3Nf0pVd0V6cs+D22k5JIVdABuWouTKuF3yttRNMIX
 KMxkV4JjHOwFCHzBUOSX25XI550pUQHPY65Ps04lvIUPvBMmPavpUmCn3K40WH3i1QLmqoiI
 5qdesvEJS9EVfo3kWPtHL9DgeFDKsUCKYX7H8CTI/OPi+b2WZJoYe1dbAvmgh4RsMtoXzk5A
 /4AbpDXmn2zocX1YzXN8J57ELz5BSNTOHwCkOQOLrTrClM/QAkJUqaNqZt8K90Nt/kEzY/go
 yDiMnK0PXKi3BUr3y3RMSs9AF4uNL4ixU8G0dsEZg/5hSJ8Pd7xsM/ytfIfJNEayQCq9tYtJ
 9EtcMScGPVfDDPB/jUWd57mq4J+Mh+sgGqz0+CNOlDTo7YIq9T1x+LZ
IronPort-HdrOrdr: A9a23:PJ92JaNhCNHgDsBcTyP155DYdb4zR+YMi2TDiHofdfUFSKClfp
 6V8cjztSWUtN4QMEtQ/uxoHJPwO080kqQFnLX5XI3SJzUO3VHHEGgM1/qB/9SNIVyaygcZ79
 YdT0EcMqyAMbEZt7eC3ODQKb9Jq7PmgcOVbKXlvg9QpGlRGt9dBmxCe2Cm+yNNNW177c1TLu
 vi2iMLnUvpRV0nKuCAQlUVVenKoNPG0LrgfB49HhYirC2Dlymh5rLWGwWRmk52aUIE/Z4StU
 z+1yDp7KSqtP+2jjfaym/o9pxT3P/s0MFKCsCggtUcbh/slgGrToJ8XKDqhkF/nMifrHIR1P
 XcqRYpOMp+r1vXY2GOuBPonzLt1T4/gkWSvmOwsD/Gm4jUVTg6A81OicZyaR3C8Xctu9l6ze
 Ziw3+Zn4A/N2KOoA3No/zzEz16nEu9pnQv1cQJiWZEbIcYYLhN6aQC4UJuFosaFi6S0vFqLA
 BXNrCc2B9qSyLbU5iA1VMfg+BEH05DUytue3Jy9PB8iFNt7TJEJ0hx/r1qop5PzuN5d3B+3Z
 W2Dk1ZrsA/ciYoV9MOOA4ge7rANoWfe2OEDIqtSW6XYZ3vfUi976LK3A==
X-IronPort-AV: E=Sophos;i="5.90,171,1643691600"; 
   d="scan'208";a="68288830"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=DoD/6ngbl98lgbyYtsqhNyQBXs81y0OZL2Y/pySM3LXfsp4oc0wblt2RrQpXeIld8T8N8vKdtIyfWq0qP3hknxuOBcIh2oW6VTKio9d/ccq6OIWP1Siiek3uKC1FYJex0PbHVe3fvkUuUGV9WHrigUlitGwwmundPAaHmRrGKIZtILg4ZcbFf7BJkFvAqLnmO2bw1d4L5QhKpm0QfdUdXqQ3wpN4vOa+gSLPwRzXbydxyVGILdzMCZBt/w6fJVJAwt9BnEhlXSWFvIiuWeE3VYEQLXmx9ZaJrTbvAl2gPByVrT49Oyge6lV2+oGAsnTNomgJO4pt6sovjA6NbhKRDg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ubPUDdE1tqwSZQ4RBqrQwbEHk0YQGJqF57J4SOVISPc=;
 b=fjPxginXncGUhRGe45CwNi800mlOmmZbLJtk7pV8LRhxp0VGE/QPMLqKVcTCgXxNfZeZY3oEuBkzYBPCzjwCmyiuw6dUT1mESzf4HIJ6ObkqIA8lZExFrFSU8jtVIaGuUeYV9xt63zyiljDUzw1/lZcNh5WiP0v/Aqkdbfwv5EmkkzqGQIh2oTXZ3YbLRAY6UT8UwuH8cFFVwEobhryzk6dXq8ay2VVOzjsrBTaaVOH+tCgzcRm5jToJhirOpjywf7RCSOEPOtMtDseir1209Q7PWZPR672RwqjoUdu5uawdh++4Ub6PMJVtiDn/LH7KkqW75VHOhQaUGK83/mOt7Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=ubPUDdE1tqwSZQ4RBqrQwbEHk0YQGJqF57J4SOVISPc=;
 b=Fkq+AbWUCrrTn05Ytdo2hscYbB901ptKoGMhITHBX9e1B0y1RdUtfsD4/s2BF42+oaksCvFczpvfOO3Und6D2oxwRNgg348vailWt0nngPqNlnd0Ui11QriH4pKoij8pkBXmFR9ZIssazZGCNKeuWwTHm5FqgpuRR9zrYH+aEXo=
Date: Thu, 10 Mar 2022 17:12:51 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?=
	<marmarek@invisiblethingslab.com>, Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH 1/2] ns16550: reject IRQ above nr_irqs
Message-ID: <Yiojgxgd4amSjHog@Air-de-Roger>
References: <20220310143403.50944-1-marmarek@invisiblethingslab.com>
 <7acb2915-5a9d-c1f1-4b7b-2bc6c2055ea3@suse.com>
 <YioddbNor6w/U9ed@Air-de-Roger>
 <53361d65-2bd8-c07b-938c-91b95f2d68ad@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <53361d65-2bd8-c07b-938c-91b95f2d68ad@suse.com>
X-ClientProxiedBy: LO2P265CA0130.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:9f::22) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: e402bf28-9917-42b1-5a90-08da02b0d69a
X-MS-TrafficTypeDiagnostic: CO6PR03MB6243:EE_
X-Microsoft-Antispam-PRVS: <CO6PR03MB6243CD4AD7D6E54A5A1F8AE78F0B9@CO6PR03MB6243.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(83380400001)(8936002)(33716001)(508600001)(82960400001)(2906002)(85182001)(86362001)(316002)(6916009)(66946007)(38100700002)(54906003)(6666004)(53546011)(6506007)(9686003)(6512007)(186003)(5660300002)(26005)(4326008)(66556008)(66476007)(8676002)(6486002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?a1BJMU10d1M0UVR0d3FNY3R4amhPTFpvL3VDb0JhaFc4WGVNOURDazNjNjBC?=
 =?utf-8?B?a3M0cEVpdmJJcVVZU2NIV1poNlJBTU5SSTVjVmRtdUk0dXZvemEwaW5FNTRx?=
 =?utf-8?B?WGhkQ2NPU1pUQ2hkaVFjbXdIMVJOUjh5dVRYV0lSZk45WDNVbmNiUUxBTFNJ?=
 =?utf-8?B?dnVENU1pemVjN2Vad1F1dVJQajJmMTlvbVJuVkIzQ3NuME1ZQzNMRlduaUV1?=
 =?utf-8?B?T3IrR1lRQ3JERDlrbG9tZUU2RklBeklWNlVWUGRYMEFuM3ZtNHF1LzhmWXI2?=
 =?utf-8?B?VmkvdnpUejRzbWNzR0NiRHpBTVdzc3FOVXJFa2RBc1BxTDVrU29OZ3ZxUHBi?=
 =?utf-8?B?dFo0Z0toSVZIRFBHcThxam4raUlQSDBocEZNZzY5SUZBQTdRaE5KV1JrMkVp?=
 =?utf-8?B?bGMxN1g3Rm1oYnZwdzV0WFpzZS94aWxEdkFGNERUdnJUTVhCQlExUmRFY1Rz?=
 =?utf-8?B?SEk2Y2xZOVVLckxrUGZiV2tPOUx4Zkt1S3JuaktKNUVTZXNVT3gwWTYrU25v?=
 =?utf-8?B?c0N2cExGRzd5czVId2tOQjhxQlFtR2k3UndJZVhaUks1NFZSZnk5ODRyR1U2?=
 =?utf-8?B?dlRSbytpa3pnOGU1UDhoL1dkbUpUcUFMc2czZ3RtNUIvSS81cC9OZFlDZ1kx?=
 =?utf-8?B?dGE2YUNHYXA4UjZwYXVOMVdsb2N4bHNtY1A1ZEpuTEIxQlRRbmtyT2pONnlX?=
 =?utf-8?B?NE1XNWIwYmVCZGxHVE9SQ1hlbWIxTS9xOEJzcjg4cERnNDdud1BHVEphS0I1?=
 =?utf-8?B?Rll5MEdmWTExVzZwZjZiWk5NbW5mbXFIRThyNUdaNXUvNDNuQVVLWUtjNHA1?=
 =?utf-8?B?RzlIdnU3aGpEek1TeE01YUp1UmhXY2pBSDU2dGRCbHJFdW5FbWkrZ0l0RUpH?=
 =?utf-8?B?ay9UOFZTSktmNVBtemRETWJCVU5GMlZJbzNYcG1Xc2pyNW5SNnVVVVBKbmxh?=
 =?utf-8?B?UFJ1VE50L3ZBMXlKeVhyZjc0eldWZ1FSdGJFeWYvQ0pkNFdSR1MydmUxdlpt?=
 =?utf-8?B?c0cxZHJJWGtjRldDN21neklsN05DQVlJUVNuNXBHdUlJQnEwUFhPN2EvVE1R?=
 =?utf-8?B?aU5tMGFyZlBjN0QrZitTVXdHRTROWHpYczlVazdxN2JHenVIeUovNUVEaEZT?=
 =?utf-8?B?YkNoSERIUFdNQzRBSnF2THc3S3F0c1RoVzRNblRzTlBXUUtpb2Vaa3UzKzdi?=
 =?utf-8?B?RVdiUmhFY2djUmtYcldzbGd4K3BTeUVlTEZ2cnlPS1pycXZLZkhVeGNWV2c0?=
 =?utf-8?B?TUhmdVpnM3I3amVVeStQYkdOUXZlb0pwaXJhVFlhYXdRd2JLRERjdU4zRjFi?=
 =?utf-8?B?RExWMmFSMFJTTVFQRm9BSHRTOWZRYVVkZnpHYUVPL0ZqeHlCZjlJQ0src0cv?=
 =?utf-8?B?cjBBTEljWkxBbzBOblVKeVFNQldDOEx5MTU1ZEhlMUI5WSt4L3RObXRmN094?=
 =?utf-8?B?QWpmTmNSVCt5ZDh1bzJyYjZtaTROTG9mcE9JcG94eEVsaGFTRXEzTWpsRkFj?=
 =?utf-8?B?Q3YwdkR1SHl6K1pMa3RRako3Y25ncTJVWUZVTFRKQlY2M0dObHEyb21IRDZv?=
 =?utf-8?B?M2ZocHdQUWdPaWlUTmhsOFFTVGwxMVVPWjNLK3EyVG8yZ1F6ZUpmSzZKaVVO?=
 =?utf-8?B?WHNFY2NOTC9qUTVoMG42dXFJQnA1Wjk1MzJTZ1hIWnZUb1djbm0rOXo3UFVJ?=
 =?utf-8?B?UEFpYjlBY2FwdmZLcE45UitVVkJvU3FxeUk5N0ZJK3NZM0RvNVh0VjdDaUpG?=
 =?utf-8?B?ZEtoNnA5N0JQWXIwWHdpcWsvSGwvZFhnZmkwOVA1NnQ1OFlGcFVHRFIzMVVR?=
 =?utf-8?B?RTByRndVcjFEMjlwVTI2Qnd6Vk9aMzJxbyt2dll3c2I5N3c4N1dIdW56d1pM?=
 =?utf-8?B?REwwQlR0OUxGT0ZrR1lLaHlRb0lxUFk1eXNoS25GVXd6ZTVPRnJ3TTFNQ2Qy?=
 =?utf-8?B?Z3NPRGZJZVppd25LK3ZOc2hUMXRYNXJrRkVqNCsvRVN2QURDQ0ZDWW43UzFh?=
 =?utf-8?B?ZkE1dDBZV3ZBPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: e402bf28-9917-42b1-5a90-08da02b0d69a
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2022 16:12:56.6329
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: shA/0JCN3ZG5zmAotBIWlQ6JEYRlQpwCe2OAeveXjS0K20fm37rGitJTcBJ1hehuk2A0W6XqMLI3qJ2LWZT5aQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO6PR03MB6243
X-OriginatorOrg: citrix.com

On Thu, Mar 10, 2022 at 05:08:07PM +0100, Jan Beulich wrote:
> On 10.03.2022 16:47, Roger Pau Monné wrote:
> > On Thu, Mar 10, 2022 at 04:23:00PM +0100, Jan Beulich wrote:
> >> On 10.03.2022 15:34, Marek Marczykowski-Górecki wrote:
> >>> --- a/xen/drivers/char/ns16550.c
> >>> +++ b/xen/drivers/char/ns16550.c
> >>> @@ -1221,6 +1221,9 @@ pci_uart_config(struct ns16550 *uart, bool_t skip_amt, unsigned int idx)
> >>>                              pci_conf_read8(PCI_SBDF(0, b, d, f),
> >>>                                             PCI_INTERRUPT_LINE) : 0;
> >>>  
> >>> +                if (uart->irq >= nr_irqs)
> >>> +                    uart->irq = 0;
> >>
> >> Don't you mean nr_irqs_gsi here? Also (nit) please add the missing blanks
> >> immediately inside the parentheses.
> > 
> > If we use nr_irqs_gsi we will need to make the check x86 only AFAICT.
> 
> Down the road (when Arm wants to select HAS_PCI) - yes. Not necessarily
> right away. After all Arm wants to have an equivalent check here then,
> not merely checking against nr_irqs instead. So putting a conditional
> here right away would hide the need for putting in place an Arm-specific
> alternative.

Oh, I always forget Arm doesn't have CONFIG_HAS_PCI enabled just yet.

Roger.


From xen-devel-bounces@lists.xenproject.org Thu Mar 10 16:22:05 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 16:22:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288481.489168 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSLY7-0002f9-Iw; Thu, 10 Mar 2022 16:21:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288481.489168; Thu, 10 Mar 2022 16:21:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSLY7-0002f2-EG; Thu, 10 Mar 2022 16:21:59 +0000
Received: by outflank-mailman (input) for mailman id 288481;
 Thu, 10 Mar 2022 16:21:58 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nSLY6-0002ew-5u
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 16:21:58 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSLY2-00051J-1C; Thu, 10 Mar 2022 16:21:54 +0000
Received: from 54-240-197-230.amazon.com ([54.240.197.230] helo=[10.7.239.19])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSLY1-0004Vn-Qa; Thu, 10 Mar 2022 16:21:53 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=rxIZTSffmqqowa+YghYn9MNTIlg+qjQaunSYAg9HEvQ=; b=4icYkYFxhRYV0vD4QAbdO1NZJW
	qxd3QLIdr8C3k3pQmz33LpjfpGMPwQ3Ovh0LcOa3/j0uQ8sw19k/f+f4wtbgkDme4yeX5uOhUS+J0
	I83qUNNSFgvYDWP1yBtN0Ecqd5eH9yBrCVGbUJYMuDouVKPsViGWzRDYNTNpkbv80XJk=;
Message-ID: <3055b4a5-2d55-9cf1-1069-8c57208bf0af@xen.org>
Date: Thu, 10 Mar 2022 16:21:50 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Subject: Re: [PATCH 1/2] ns16550: reject IRQ above nr_irqs
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Jan Beulich <jbeulich@suse.com>
Cc: =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?=
 <marmarek@invisiblethingslab.com>, Andrew Cooper
 <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220310143403.50944-1-marmarek@invisiblethingslab.com>
 <7acb2915-5a9d-c1f1-4b7b-2bc6c2055ea3@suse.com>
 <YioddbNor6w/U9ed@Air-de-Roger>
 <53361d65-2bd8-c07b-938c-91b95f2d68ad@suse.com>
 <Yiojgxgd4amSjHog@Air-de-Roger>
From: Julien Grall <julien@xen.org>
In-Reply-To: <Yiojgxgd4amSjHog@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi,

On 10/03/2022 16:12, Roger Pau Monné wrote:
> On Thu, Mar 10, 2022 at 05:08:07PM +0100, Jan Beulich wrote:
>> On 10.03.2022 16:47, Roger Pau Monné wrote:
>>> On Thu, Mar 10, 2022 at 04:23:00PM +0100, Jan Beulich wrote:
>>>> On 10.03.2022 15:34, Marek Marczykowski-Górecki wrote:
>>>>> --- a/xen/drivers/char/ns16550.c
>>>>> +++ b/xen/drivers/char/ns16550.c
>>>>> @@ -1221,6 +1221,9 @@ pci_uart_config(struct ns16550 *uart, bool_t skip_amt, unsigned int idx)
>>>>>                               pci_conf_read8(PCI_SBDF(0, b, d, f),
>>>>>                                              PCI_INTERRUPT_LINE) : 0;
>>>>>   
>>>>> +                if (uart->irq >= nr_irqs)
>>>>> +                    uart->irq = 0;
>>>>
>>>> Don't you mean nr_irqs_gsi here? Also (nit) please add the missing blanks
>>>> immediately inside the parentheses.
>>>
>>> If we use nr_irqs_gsi we will need to make the check x86 only AFAICT.
>>
>> Down the road (when Arm wants to select HAS_PCI) - yes. Not necessarily
>> right away. After all Arm wants to have an equivalent check here then,
>> not merely checking against nr_irqs instead. So putting a conditional
>> here right away would hide the need for putting in place an Arm-specific
>> alternative.
> 
> Oh, I always forget Arm doesn't have CONFIG_HAS_PCI enabled just yet.
The PCI code in ns16550.c is gated by CONFIG_HAS_PCI and CONFIG_X86. I 
am not sure we will ever see a support for PCI UART card in Xen on Arm.

However, if it evers happens then neither nr_irqs or nr_irqs_gsi would 
help here because from the interrupt controller PoV 0xff may be a valid 
(GICv2 supports up to 1024 interrupts).

Is there any reason we can't explicitely check 0xff?

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Thu Mar 10 16:22:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 16:22:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288485.489179 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSLYa-0003Bv-QI; Thu, 10 Mar 2022 16:22:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288485.489179; Thu, 10 Mar 2022 16:22:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSLYa-0003Bo-Mi; Thu, 10 Mar 2022 16:22:28 +0000
Received: by outflank-mailman (input) for mailman id 288485;
 Thu, 10 Mar 2022 16:22:27 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=7C/d=TV=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nSLYZ-000345-C6
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 16:22:27 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3e549947-a08e-11ec-853a-5f4723681683;
 Thu, 10 Mar 2022 17:22:13 +0100 (CET)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2055.outbound.protection.outlook.com [104.47.14.55]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-6-uKgLZqA-NRiRnniUwSEhdQ-1; Thu, 10 Mar 2022 17:22:25 +0100
Received: from AM0PR04MB5587.eurprd04.prod.outlook.com (2603:10a6:208:125::12)
 by DBBPR04MB7804.eurprd04.prod.outlook.com (2603:10a6:10:1e0::13)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Thu, 10 Mar
 2022 16:22:22 +0000
Received: from AM0PR04MB5587.eurprd04.prod.outlook.com
 ([fe80::dd50:54e6:1f96:3b33]) by AM0PR04MB5587.eurprd04.prod.outlook.com
 ([fe80::dd50:54e6:1f96:3b33%3]) with mapi id 15.20.5061.022; Thu, 10 Mar 2022
 16:22:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3e549947-a08e-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646929346;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=9eo0H5vpXVTB/c0dc53LE4sXeKUot32StKUTjrflCj0=;
	b=cdovFi0qU2NI5+JGlBsVM3RutkiIGENgctrhHIaAI/COK5LpGWVDSx+LYvKST9CGI8fdij
	5g6Kr+v9eiA6oZAEqgYmaGWffDmArJjc5KXPLsj/Of8/QwqTNeABXBXg7zeO2SAoL7UKi+
	W4q74M4n2T7Z4ZCBJukjyuLGGPLroxI=
X-MC-Unique: uKgLZqA-NRiRnniUwSEhdQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=WeJmPvpdtYrDX3PYSk8WVSfX+F/i9X596nkgABqKtJFY87n/4bO7bbPW4QV1HRYM3tzPmFYMP4WcAuje5jCsv+wUWSeCo9B1BoKHHtQKpPizAdzxEjX8oiP2tfc3ccwl3heJlQMhQyJaO6NQltXEBt/g9oelWc9/fZxPaP8HxUgx0rGh9N2J18qZryYHwOD07yn7dNzGLASb56pbYfntpC+cu2ZJ8IXVDATf3e0rw2wbqdS+car7bI/pdPkP9psbmEcYF2yXi81AUETjy1GII16VxCrJk6M3RGHDeKW/D+Rb17UvRUIm/W/61ZEzavDHrUjnjMJ/WhR7sgZAxE5Ahg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=hE3q3K345m9RrR8pA2wdk8zDmQNuz0PME4QfC6V/ScA=;
 b=BYtZB7mQU3nfPIKjVFS5BC8hWDdrBlZ6LvVzISSSlElKSgovfSQPe8gE5+TUn2CXQ62Io1CE/m9rw3xY6uNg9NYn1krFifmHnTksBtY0AEw2HNy5XuErJUEMdHHCc74NM98vgJSIvInxJexBL76Hv19Ki8clPmbYo0M50cy1OK/3niLct6wC1s+T4PRnQCWTxwAIYxMP4VK7kvikq4aBo1HaL4RHAc6v/gpmV/BQQ3lvTVqd1MJqQ2Kojv5bEB8do8t60xumwxiTd+zZRp67yPZtsYioCCEQauO76RPFUYlnTpYAukevbxFkQ5XpTP4Su6LJsbDECtm3iw8SpgesTQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <15d8232a-51c5-77c8-b246-ca0266576b30@suse.com>
Date: Thu, 10 Mar 2022 17:22:20 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH] x86/vmx: remove dead code to create domains without a
 vLAPIC
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian <kevin.tian@intel.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org, Roger Pau Monne <roger.pau@citrix.com>
References: <20220215112835.99230-1-roger.pau@citrix.com>
 <b254d8ac-8bdd-af65-f9d3-e2fe69ffdde9@suse.com>
In-Reply-To: <b254d8ac-8bdd-af65-f9d3-e2fe69ffdde9@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6PR10CA0075.EURPRD10.PROD.OUTLOOK.COM
 (2603:10a6:209:8c::16) To AM0PR04MB5587.eurprd04.prod.outlook.com
 (2603:10a6:208:125::12)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 81d0cf24-2ca8-43e1-02ae-08da02b2281a
X-MS-TrafficTypeDiagnostic: DBBPR04MB7804:EE_
X-Microsoft-Antispam-PRVS:
	<DBBPR04MB78041D4ADAFEED50E9C8CE81B30B9@DBBPR04MB7804.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR04MB5587.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6486002)(31696002)(2616005)(4326008)(26005)(86362001)(186003)(8676002)(66946007)(66476007)(66556008)(110136005)(316002)(54906003)(38100700002)(4744005)(6512007)(53546011)(6506007)(2906002)(508600001)(36756003)(31686004)(5660300002)(8936002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?ZPxSihY1AsxNDVWoNqi+7LgzpMbJW4mRLfFnsomEUOsd1nThPoztQ6f/kd3S?=
 =?us-ascii?Q?9cIIUBu40IHmBDTyBM6+P4Wk6NRflZ/92GyfHy3HNQOJs0OsTU2XBKcDtuoU?=
 =?us-ascii?Q?AMHGD6mENYUcYnCboRp9Bll6VYzJv6aMmM5BpiJFQ4gFKAliGPhkTFsU/J1i?=
 =?us-ascii?Q?ZEV380M51QlDK8ExatfhXLKyIss+ecN+zK5pKgD3bjqWMArhTRuppKf0mIXo?=
 =?us-ascii?Q?RSI0iYjE5Qivnmn4Nh7+/e3i3UbAkEJ6ZMEJrqu/7XSWbYfdJQ42eYhn4Ck7?=
 =?us-ascii?Q?8uVFV3tS9jHmQxhRiNmqlFw4eehFhHyaxjVf+I9HOXD46C6JLfWUE8+rHYNp?=
 =?us-ascii?Q?O3uhgsezkFSAF0GmwqvGuP70RKjW6QSUBMP2bjl8/S7BQb0ttEiWWJzyFjKl?=
 =?us-ascii?Q?IxNCAdk3B2XGmFW/79YREJCnvr92NdL2fM2wjR0Oga43wOKMJ6G0nY9QdknM?=
 =?us-ascii?Q?df/76fHd852aE1J2RF8x2SsCNhGpQ0pgmvKuhLkZ4zTsk+nesK1AMbzGRIJE?=
 =?us-ascii?Q?2hYHi70pcKCUUmXFWQ7vTAeNezzwX0bLPlUCexuBuAvT9Bi3tAR/3DPgyWL3?=
 =?us-ascii?Q?qQu5V69oR2EmyP52yRkEj+TqNyqvZIdFqHYJgs+yuGfcXzLstJQXg+PuPXVp?=
 =?us-ascii?Q?1VfTR95qeGDjBrf9m+FPOdoMUBFrDBM9jirVdU2dq/aqeurbohH7RLB9kZ7B?=
 =?us-ascii?Q?YI/9LeI97D0UhgtVLej+TNH3W2/U0xh44ADV+Of065lRaiWiWF4nhpTqXpXA?=
 =?us-ascii?Q?p1Mebg6Q053NRbPX4rCtCIEEfKQCwinFDGyLVRZXn86vRcL9zGdCS5+g5zsJ?=
 =?us-ascii?Q?NqxQr8vAUOr4a7C9ugh63qpGs7Lv0552zaRTKB87lNGjMbiUb2S23hV1ymX0?=
 =?us-ascii?Q?DkEBWSFwhv4jgd+UPlL2O7077bEdgLLRZadg19E22LIC19hnqvU2yWJRjCpi?=
 =?us-ascii?Q?GJjHC1v9jhbqQdie5jubyUAJ8uSrBaAT3DaOdc0PmD4nq4RS7Uk4qYaH1w0H?=
 =?us-ascii?Q?gFp4h4wNxEP+59VTN7ziURTWjjU2DP1llx2tbnxNCbDiipbMYd1Nv3hNuFAb?=
 =?us-ascii?Q?DIwm1tuYfK1zX1TQ7PWs7tjgt5rYWToJwrt2nTtXXi5nQrvm0Aq/yNt/7aFV?=
 =?us-ascii?Q?aweS9n1CxM4/ZOsmfOzX1MvnwkpD0UD4/pwSsGKdyZCDRjLe58akpe9hdbv3?=
 =?us-ascii?Q?JVRL2BWGQmrxLOxiyNYLt2OCU7cT1dQ0QBBF5rBQujgb9y+VMr1mw7cuFdk6?=
 =?us-ascii?Q?i5bynK04Nk0Q4ywtnCFQRF4zrKj6YSKlHoQUyu/9qUek5VlSNCX/+aRSsfk9?=
 =?us-ascii?Q?AK8liu6Rxmkyy4N68BWY5m2luvjwQgMT2bAeMGHe83yiYvsq/EPR84n/48e5?=
 =?us-ascii?Q?FKihpWPIO6m920STl7nCxK5UNGIvsy+ItwyuMPvE/S73ucOEorU+B//iFZsC?=
 =?us-ascii?Q?Yj4Qkdx0Bm3PMxswzPRf9Phmx+GCnNBs?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 81d0cf24-2ca8-43e1-02ae-08da02b2281a
X-MS-Exchange-CrossTenant-AuthSource: AM0PR04MB5587.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2022 16:22:22.7823
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: KA/CLoEiBX8QL7l4/CBF/UHCX8X1vK+/jYo2SSmD202+SafIaDkkTc+mUtdjd4v2gVDPxOadl7sXf4muNANhlg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR04MB7804

On 15.02.2022 14:27, Jan Beulich wrote:
> On 15.02.2022 12:28, Roger Pau Monne wrote:
>> After the removal of PVHv1 it's no longer supported to create a domain
>> using hardware virtualization extensions and without a local APIC:
>> PVHv2 mandates domains to always have a LAPIC. Remove some stale code
>> in VMCS construction and related helpers that catered for that
>> use-case.
>>
>> No functional change.
>>
>> Signed-off-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>
>=20
> Reviewed-by: Jan Beulich <jbeulich@suse.com>

Just fyi - I'm inclined to put this in without further waiting for an
ack by one of the two of you.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 16:34:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 16:34:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288489.489190 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSLkJ-0004mG-Un; Thu, 10 Mar 2022 16:34:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288489.489190; Thu, 10 Mar 2022 16:34:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSLkJ-0004m9-Qd; Thu, 10 Mar 2022 16:34:35 +0000
Received: by outflank-mailman (input) for mailman id 288489;
 Thu, 10 Mar 2022 16:34:35 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=7C/d=TV=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nSLkJ-0004m3-7a
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 16:34:35 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id efed7436-a08f-11ec-853a-5f4723681683;
 Thu, 10 Mar 2022 17:34:21 +0100 (CET)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04lp2054.outbound.protection.outlook.com [104.47.13.54]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-31-hY3GBA27MIecKPM1DJUsCw-1; Thu, 10 Mar 2022 17:34:32 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR04MB6319.eurprd04.prod.outlook.com (2603:10a6:803:f5::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 10 Mar
 2022 16:34:29 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.022; Thu, 10 Mar 2022
 16:34:29 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: efed7436-a08f-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646930073;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=zJS/MJgF93x1eaWkMLEGh3suELLXAYcL0QnFP+NUPIM=;
	b=QNOmhUgKgvh9leSl5PfWQdolrrFckepDBSAbOH7tNoF55DClAUsKWBvlAm5svNGzx9s+wQ
	NasQa/zx0I6o/HDDUgKqgMZMWVV/uW2HLNceMr58vvl+oPXHo0bXOQ3o6gXMdRfFwNYfQM
	qVC+J+uwdd+iqaJysWdZ6/+N4Uzxp+E=
X-MC-Unique: hY3GBA27MIecKPM1DJUsCw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=QBVFqcYzk/lIQ6j6vS0s7R770Ln8xhXuPYxIZLVSCNI3XqgWmkcpWGAJtn5+AZcWF+iPRDcrIath/2bNuq3iAm7f8b9qZ2M6mFHNpEdGKFOFp7h1/yWezR8EdOHl+nPvt9QLkUR+XNZ2C+A+NDIBD4A78AqZx6ZH/pGGjTiXfjXVfSC5JU3uGxqKURA7ig/sMgcF+yfD99apcN3Y9TvnaiFpci6Z+mbHWME2VVyKHKAcFlZFVZ1qxR+WfRDnOhrm5sGpVHxpACXI3tDfzLqJOEs2q68PhQRtpbiQ3uw0evLMhaT+17RnFG3nFLb2CE7+JUnLFxuLT4/spuA4lBwwVg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=eGrJ19k4gI1zUU4RQDX9I3LcT3HH+0PXU+ufIXMY058=;
 b=WtGvqFSYsCO1O8bAKV5wYmmfNbfHioFC3TtTGn+0DzYpkjpzG7LzmqSwqHefOYnN6hHEFFTSdjouteGOlaWZiy0u5j9ctoikA626ezRRrC1Bo24YXPQ1k/Lc+slRKDbE+cwzBvZYvPnGO7pYgtuoceT6EaupBL4DCa8HHwLl9Og868P8ehWrvhhNiqgLZCWrslKeOE8yC2xDtjjhVKwwDVnqE35LpfRSoxhrtP8HC3mVPVOsUSDT3d6yVSOj5r0T2/RCfxvJnpNyiWjnuIPX1ufG6vFhgWisvKwcU/cUqv1I2NbPmHAOWGSagdxzV/I1R1neIMrp8XgjtDU5O83kUQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <25f3ec22-1dcd-776c-4b74-0be128c6f818@suse.com>
Date: Thu, 10 Mar 2022 17:34:25 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH 1/2] ns16550: reject IRQ above nr_irqs
Content-Language: en-US
To: Julien Grall <julien@xen.org>
CC: =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?=
 <marmarek@invisiblethingslab.com>, Andrew Cooper
 <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?=
 <roger.pau@citrix.com>
References: <20220310143403.50944-1-marmarek@invisiblethingslab.com>
 <7acb2915-5a9d-c1f1-4b7b-2bc6c2055ea3@suse.com>
 <YioddbNor6w/U9ed@Air-de-Roger>
 <53361d65-2bd8-c07b-938c-91b95f2d68ad@suse.com>
 <Yiojgxgd4amSjHog@Air-de-Roger>
 <3055b4a5-2d55-9cf1-1069-8c57208bf0af@xen.org>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <3055b4a5-2d55-9cf1-1069-8c57208bf0af@xen.org>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR06CA0057.eurprd06.prod.outlook.com
 (2603:10a6:20b:463::33) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: a074b022-9cac-458c-16e9-08da02b3d899
X-MS-TrafficTypeDiagnostic: VI1PR04MB6319:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB6319405EBA3063326086349BB30B9@VI1PR04MB6319.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	vmSD5LWRhHIy5qm1xrOhTXvN3yCGJ5iKhmRtREVeyNT6e+UhXJjYs22KMNPb/9HaYVfLEbIyKVmuH/NcimLz6DT+naqnVqssKU9XWUnsXY2AnlW4WpFfMS9Bgcxl5k12X9bz1hGMcq6jYMyfz87GjwQWpHxtIV0q7IV8CabbR3xkAxgFDawCSAk2J5A4xX5ltshnKlVmLZSHaCYtIBdm+U53jQcN9uvlC6ldVwn8cLg4hH0JOjCN3O3GXDVnpuoEN7kcCrXGuUxWNZCp9ZtwsLgE0rSyx7pR9itlFqj8duu9pAATlDMWl0456tY/sKTCF57SE3l+ALNOQT8HH8aIb9OXQIKtkJUwyOJK6IZZeBFlqxP0e2c+KDHbrOXjaziDnN1HtTRgI/iEOceD9vva3GUsDYn1v6x3nr9Anvg0dmZK4X9BC5nvGKiemBemTbmPHOXEmWhBuD1WfC8YHS2qakd9LfMVcx6SJ4kprKCJifRgIQv9MogusIrE/GuZcV3l9+aP2XE6iMBRlpUzD8ApU0ZXZx85/U20liraMgQqGeL/IOKhCvb5fKTiG4dN0U37u9EqNBZ0VhTn8r+17DU6bkMHUSGeRr0fC6JxNg6K2JEWxz9XZxh+lcDIR5t0hNdLElwYL2N5pd391Drfa2IHo5SRPMdPV++8Im52UAWRVo+CaS6VAWggZhYcwfA2vusOOxM7xeL4STf47GeODAskhddO7NU8rcGM967OTv6x/xSWWcKTCKONpB12rrn7YDEm
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6512007)(6506007)(53546011)(26005)(2906002)(66946007)(66476007)(66556008)(8676002)(4326008)(6486002)(508600001)(38100700002)(316002)(36756003)(31696002)(54906003)(6916009)(86362001)(31686004)(186003)(2616005)(83380400001)(5660300002)(6666004)(8936002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?z9GSeCQuDup1cr/nWhh1eNJadK5W9D1IHfI+Ndo1Jc6vIg/E8z5A+N1rhykE?=
 =?us-ascii?Q?t3E/dwujlaOVRTOEXkqhGdqjxT4r6ljDVgKp68j4U+HvuVpRAD13pQDInaF5?=
 =?us-ascii?Q?NmA8XDASiz2Fxsn+ydQiPhlIqkFZsgAtzr7tt9Z3xmPmEOdu99aM5MQi6q7P?=
 =?us-ascii?Q?BYND9TRLZZqnPW7x4R7TeIL4U70mPofXrAB6fOQG7qm5bT+KYXY08Euyd24B?=
 =?us-ascii?Q?GcQS4hIRpMBpPSviMHVrHB11zNlvG4DTX+qKwei/C8WccGUjEoABb6DnCKM8?=
 =?us-ascii?Q?8S+MLHaXzud0DEZGvCLDx939G716nrkwFps/WLN7eiH21P3LQs2yqfWwppAr?=
 =?us-ascii?Q?9ys3KYAse6HhkKQqry6VUi7yGcoB8PNEYoUWWGfk3HhY1kfU3zODXJjZXdoR?=
 =?us-ascii?Q?hMmo7L/LxpnwscF2Nx927isc39r6SG+r7eBEVK8yzPhIXLWS9qEI6Lqp+RSF?=
 =?us-ascii?Q?/X751LQyhZ/aFQHMjaUXf+Rsw8aQqmAu+OdkwJjY6r6oyNJKf5F4JqUpQleM?=
 =?us-ascii?Q?JHLhUbzWBZw0yfNq7J6dBmMDwSGaOvYFcEL6Mw0oBXBUL0f8jSXcOFsLPn+H?=
 =?us-ascii?Q?AYEu4gQG9NN8pJ12ZDlkgLoUwVTf6SN0ADJlXF4bYf//IROHsE1IsXpvf4IB?=
 =?us-ascii?Q?obQvS+j8Px+ccAVedr7tb/2uNOo5zF0gSc0mUOHlx9oElqJOYMpeLcrfbciu?=
 =?us-ascii?Q?eD9uMiX75YM56EcwOhy1maeD28z4MoV89v5P+9etD/s9EyFubailgK7ba4JT?=
 =?us-ascii?Q?yz/IiWXF9fs1OgdaUXAOPFpB/xDY7nFV2FzXYa/XUWAtZClK6NVsDOLPW9jG?=
 =?us-ascii?Q?68Cre99WwwWM4vp6dj/6BbWvfrXjniUl1SdBXhmbFW356NF4pV2D22rSwbCV?=
 =?us-ascii?Q?F+/NnIEvN//0qU6NCGF8PwF2w8hXSqlwq4cbcZ3t3WKJK/EZW+pJS43zshiS?=
 =?us-ascii?Q?BKznNCxg3WITiY2Vl8KuYVkiU6MdCNTlDY4iIf3KQ1Cw2h5Z/feLs5RX8MuT?=
 =?us-ascii?Q?/Hc8gmvnOgV7mPcKtIt4jE5ZNwdWYg+VPiHcEHOEkhQ5Nsd2A4ecuQPnWll9?=
 =?us-ascii?Q?y+Qb3VBFHes09pgyQ+B7+Ic1vaU+spHExTcY1ObYIzfNmGz5sBFuTXn9/wzD?=
 =?us-ascii?Q?KzGmFzcgpCOm+c5QDZBRPrat4RkkTW4xSii7Dw2URGWyfz3vFVLE3bLflsy2?=
 =?us-ascii?Q?6wYNBp8vMp/85adR5K39QkCQL4LDdHqjpbUtavw8ofPPfD7QP6kUMU2EVnk+?=
 =?us-ascii?Q?vy2Xt6LzbYwxTwG53eNBZTQdWx6Ze5cznUZJtgKwrvfHHkHmkf/b6V2iDti9?=
 =?us-ascii?Q?hVXUexbIZK+nR2se6nHUQFLhoeGqDwBsZuHZMgHT9HCeK3HDoJU0HwbL8YuT?=
 =?us-ascii?Q?20+GFFI6hDKVoS2o6mO8BY+ybHTOETvVldAfHtmrXgch6ZC0l2of4U3k8w0y?=
 =?us-ascii?Q?ReI5hcZpnZSZtciNriXUew7tZCuYMQvF26NcsbMJjGsYN9q8MEpDbQuTEEnj?=
 =?us-ascii?Q?wZ9ZutTzOjfQwYgy17rbIxCOh08hcJLZwOHXbeE1Ds0dAqc63J0FKDVgjjeH?=
 =?us-ascii?Q?C7kkOTcpIYz10d/liJkcMHK5jx36O0IHWV8zQV/wWMA6PYlPaIUG4Qg8UXQG?=
 =?us-ascii?Q?hCharZjvSK0TgAMHfRDDllE=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a074b022-9cac-458c-16e9-08da02b3d899
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2022 16:34:28.8440
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: XCodNq53bLCR7fjxv0w3CyXKWRUM8Qt5gmfFsKwouB9mgXahpyKjAk6nvB8KUaApdQnvhsRCOwAn8oIkP2xvVQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB6319

On 10.03.2022 17:21, Julien Grall wrote:
> On 10/03/2022 16:12, Roger Pau Monn=C3=A9 wrote:
>> On Thu, Mar 10, 2022 at 05:08:07PM +0100, Jan Beulich wrote:
>>> On 10.03.2022 16:47, Roger Pau Monn=C3=A9 wrote:
>>>> On Thu, Mar 10, 2022 at 04:23:00PM +0100, Jan Beulich wrote:
>>>>> On 10.03.2022 15:34, Marek Marczykowski-G=C3=B3recki wrote:
>>>>>> --- a/xen/drivers/char/ns16550.c
>>>>>> +++ b/xen/drivers/char/ns16550.c
>>>>>> @@ -1221,6 +1221,9 @@ pci_uart_config(struct ns16550 *uart, bool_t s=
kip_amt, unsigned int idx)
>>>>>>                               pci_conf_read8(PCI_SBDF(0, b, d, f),
>>>>>>                                              PCI_INTERRUPT_LINE) : 0=
;
>>>>>>  =20
>>>>>> +                if (uart->irq >=3D nr_irqs)
>>>>>> +                    uart->irq =3D 0;
>>>>>
>>>>> Don't you mean nr_irqs_gsi here? Also (nit) please add the missing bl=
anks
>>>>> immediately inside the parentheses.
>>>>
>>>> If we use nr_irqs_gsi we will need to make the check x86 only AFAICT.
>>>
>>> Down the road (when Arm wants to select HAS_PCI) - yes. Not necessarily
>>> right away. After all Arm wants to have an equivalent check here then,
>>> not merely checking against nr_irqs instead. So putting a conditional
>>> here right away would hide the need for putting in place an Arm-specifi=
c
>>> alternative.
>>
>> Oh, I always forget Arm doesn't have CONFIG_HAS_PCI enabled just yet.
> The PCI code in ns16550.c is gated by CONFIG_HAS_PCI and CONFIG_X86. I=20
> am not sure we will ever see a support for PCI UART card in Xen on Arm.
>=20
> However, if it evers happens then neither nr_irqs or nr_irqs_gsi would=20
> help here because from the interrupt controller PoV 0xff may be a valid=20
> (GICv2 supports up to 1024 interrupts).
>=20
> Is there any reason we can't explicitely check 0xff?

FF isn't called out by the spec as having a special meaning. Unlike I
think Andrew did say somewhere, FF does not indicate "none". That's
instead indicated by PIN returning zero. That's my reading of the spec,
at least.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 16:38:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 16:38:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288495.489201 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSLnc-0005V9-GW; Thu, 10 Mar 2022 16:38:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288495.489201; Thu, 10 Mar 2022 16:38:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSLnc-0005V2-Cf; Thu, 10 Mar 2022 16:38:00 +0000
Received: by outflank-mailman (input) for mailman id 288495;
 Thu, 10 Mar 2022 16:37:59 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=g47H=TV=invisiblethingslab.com=marmarek@srs-se1.protection.inumbo.net>)
 id 1nSLnb-0005Uw-08
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 16:37:59 +0000
Received: from wout3-smtp.messagingengine.com (wout3-smtp.messagingengine.com
 [64.147.123.19]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6fac80c1-a090-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 17:37:57 +0100 (CET)
Received: from compute3.internal (compute3.nyi.internal [10.202.2.43])
 by mailout.west.internal (Postfix) with ESMTP id 9B20532009F8;
 Thu, 10 Mar 2022 11:37:53 -0500 (EST)
Received: from mailfrontend1 ([10.202.2.162])
 by compute3.internal (MEProxy); Thu, 10 Mar 2022 11:37:54 -0500
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Thu,
 10 Mar 2022 11:37:51 -0500 (EST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6fac80c1-a090-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:cc:content-type:date:date:from:from
	:in-reply-to:in-reply-to:message-id:mime-version:references
	:reply-to:sender:subject:subject:to:to:x-me-proxy:x-me-proxy
	:x-me-sender:x-me-sender:x-sasl-enc; s=fm2; bh=IMFtNc/e43oS6YPhj
	3w0qR6jrHxuZP3OH1zJKSNC0XE=; b=ZeJ4byCWvEoaWe0HhHLdMOjATBOO0XSJc
	v/vyAaV+p4zYJAzd8TqaCozJyILDlfYOsVyjdp9K9xLfic5DAqOW0FVu8dAKyXpg
	b8ZZWYRlRVcRDCRhrxv1tQaGg0CIyWpNAR8bhBOoS1rvfIrt1/c4ufif92bzoZUs
	siIQdJETUqyXrVgAm+PTwk2ZtXrZl2Iv5gQSrnFWyPoiiH71t+BNiw/OjWLjICIK
	KzsZ9cy0Np4BHGAxf6wqHdBDF6SW38IQ/F1p7cPSdc6AmnasxfVkMQ0d9FAX67QJ
	i06DhRda87k1kEW/ykCO8lKlbERbPYRUfq29GSNW7NeKcj3qrR8iA==
X-ME-Sender: <xms:YCkqYsGfe1bK4CrVn9lqT8dBj5dDNP9L9Elbsj9pr61hIVZn3EPN1A>
    <xme:YCkqYlWHDNABp5LYsSCjmb4YPFDKxhYR3l6u0RXIUbx9XCKYX1R8itZi6n1bY7nk7
    1X-w1fALtu24g>
X-ME-Received: <xmr:YCkqYmJVqEarkRmQ-bjLivnUqqgsGcriIKS7a2ogdYfXbhUHnb7bOMCOAh8ZYA0WevFEp0OHqlYkjf1ha9pfRC4575Mb_VKcYQ>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddruddvtddgledtucetufdoteggodetrfdotf
    fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen
    uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne
    cujfgurhepfffhvffukfhfgggtuggjsehgtderredttdejnecuhfhrohhmpeforghrvghk
    ucforghrtgiihihkohifshhkihdqifpkrhgvtghkihcuoehmrghrmhgrrhgvkhesihhnvh
    hishhisghlvghthhhinhhgshhlrggsrdgtohhmqeenucggtffrrghtthgvrhhnpeetveff
    iefghfekhffggeeffffhgeevieektedthfehveeiheeiiedtudegfeetffenucevlhhush
    htvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpehmrghrmhgrrhgvkhes
    ihhnvhhishhisghlvghthhhinhhgshhlrggsrdgtohhm
X-ME-Proxy: <xmx:YSkqYuHSnUkeVzyGeXpUUwZUROxJBMOvlkXS6-FrpjHhGtQHtimKHg>
    <xmx:YSkqYiW0WOV2JUyBA4qP_C82BkPXr1f1AIDwM9T8JLV-OzJxAzCj6A>
    <xmx:YSkqYhOOoAGulrteb9i_e4pb1VgDYkmJ1NDYv0FH-LJbmhAgOq2Afg>
    <xmx:YSkqYkeeW6Wv40lXBDgmmXdnimdEtemuLDZQkvtdIZ-X1S0zyqWVEA>
Date: Thu, 10 Mar 2022 17:37:49 +0100
From: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: Julien Grall <julien@xen.org>
Cc: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
	xen-devel@lists.xenproject.org
Subject: Re: [PATCH 1/2] ns16550: reject IRQ above nr_irqs
Message-ID: <YiopXU65pAlnNVNI@mail-itl>
References: <20220310143403.50944-1-marmarek@invisiblethingslab.com>
 <7acb2915-5a9d-c1f1-4b7b-2bc6c2055ea3@suse.com>
 <YioddbNor6w/U9ed@Air-de-Roger>
 <53361d65-2bd8-c07b-938c-91b95f2d68ad@suse.com>
 <Yiojgxgd4amSjHog@Air-de-Roger>
 <3055b4a5-2d55-9cf1-1069-8c57208bf0af@xen.org>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="jeRcZFfk5DO+poSG"
Content-Disposition: inline
In-Reply-To: <3055b4a5-2d55-9cf1-1069-8c57208bf0af@xen.org>


--jeRcZFfk5DO+poSG
Content-Type: text/plain; protected-headers=v1; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Date: Thu, 10 Mar 2022 17:37:49 +0100
From: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: Julien Grall <julien@xen.org>
Cc: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
	xen-devel@lists.xenproject.org
Subject: Re: [PATCH 1/2] ns16550: reject IRQ above nr_irqs

On Thu, Mar 10, 2022 at 04:21:50PM +0000, Julien Grall wrote:
> Hi,
>=20
> On 10/03/2022 16:12, Roger Pau Monn=C3=A9 wrote:
> > On Thu, Mar 10, 2022 at 05:08:07PM +0100, Jan Beulich wrote:
> > > On 10.03.2022 16:47, Roger Pau Monn=C3=A9 wrote:
> > > > On Thu, Mar 10, 2022 at 04:23:00PM +0100, Jan Beulich wrote:
> > > > > On 10.03.2022 15:34, Marek Marczykowski-G=C3=B3recki wrote:
> > > > > > --- a/xen/drivers/char/ns16550.c
> > > > > > +++ b/xen/drivers/char/ns16550.c
> > > > > > @@ -1221,6 +1221,9 @@ pci_uart_config(struct ns16550 *uart, boo=
l_t skip_amt, unsigned int idx)
> > > > > >                               pci_conf_read8(PCI_SBDF(0, b, d, =
f),
> > > > > >                                              PCI_INTERRUPT_LINE=
) : 0;
> > > > > > +                if (uart->irq >=3D nr_irqs)
> > > > > > +                    uart->irq =3D 0;
> > > > >=20
> > > > > Don't you mean nr_irqs_gsi here? Also (nit) please add the missin=
g blanks
> > > > > immediately inside the parentheses.
> > > >=20
> > > > If we use nr_irqs_gsi we will need to make the check x86 only AFAIC=
T.
> > >=20
> > > Down the road (when Arm wants to select HAS_PCI) - yes. Not necessari=
ly
> > > right away. After all Arm wants to have an equivalent check here then,
> > > not merely checking against nr_irqs instead. So putting a conditional
> > > here right away would hide the need for putting in place an Arm-speci=
fic
> > > alternative.
> >=20
> > Oh, I always forget Arm doesn't have CONFIG_HAS_PCI enabled just yet.
> The PCI code in ns16550.c is gated by CONFIG_HAS_PCI and CONFIG_X86. I am
> not sure we will ever see a support for PCI UART card in Xen on Arm.
>=20
> However, if it evers happens then neither nr_irqs or nr_irqs_gsi would he=
lp
> here because from the interrupt controller PoV 0xff may be a valid (GICv2
> supports up to 1024 interrupts).
>=20
> Is there any reason we can't explicitely check 0xff?

That's what my v0.1 did, but Roger suggested nr_irqs. And I agree,
because the value is later used (on x86) to access irq_desc array (via
irq_to_desc), which has nr_irqs size.

--=20
Best Regards,
Marek Marczykowski-G=C3=B3recki
Invisible Things Lab

--jeRcZFfk5DO+poSG
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAmIqKV0ACgkQ24/THMrX
1yxgCwf/ffMj252XwXfMM00gL4pJ2pZmjsPdgrjwEIEX+/B9sEQVFF/+vAl4RY0x
rvodcPHWjg86JFfQadqKDlMTseo8RWNjCbjjR+jYjmyf8L9Hi1ZwOLqFgX0TG8LT
Dhe95Ba9bsh1aQ272Iw72nnqEOUKXMral7gCgp/m/cFTrtM8xwIkyWCMTNw0h58B
ulyumOAG0SAcHlbLFnOmbT5byscxqf5B2u1i3Lo/P8lrBODzKPNDK7f4IUegWmUY
NVfaI518vHbU5xxnS9FmiYmVnga0LlORG36Uu66AWtrw+0iK1AJJl0cPfCV/F31T
UQS7d0gCO+L2kOV3VCj1Y0b4qv9qEg==
=dTro
-----END PGP SIGNATURE-----

--jeRcZFfk5DO+poSG--


From xen-devel-bounces@lists.xenproject.org Thu Mar 10 16:42:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 16:42:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288499.489212 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSLrf-0006sb-1a; Thu, 10 Mar 2022 16:42:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288499.489212; Thu, 10 Mar 2022 16:42:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSLre-0006sU-UN; Thu, 10 Mar 2022 16:42:10 +0000
Received: by outflank-mailman (input) for mailman id 288499;
 Thu, 10 Mar 2022 16:42:09 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=VYsB=TV=citrix.com=prvs=061b0cdbb=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nSLrd-0006sO-4u
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 16:42:09 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 0260698c-a091-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 17:42:06 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0260698c-a091-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646930526;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=vTeSG5qpwFJWZhNshpkLO0h2G6lwdQp6zkK35UIt9tM=;
  b=a5wRUpNNv9CZgV59WZYXpn9K5QJcXkQlnKSgFOUZJnzw3e55Vu+9uZFM
   tkH6pyagC0ak/mp203k3g+tvkzOPZ8MLUhamnL96PycQEGpkmwT6DBpMj
   NtLScUvRGtCiS4wnPu0ngSoyOnIdaQICu8qU1lF+SWVUu51/j0pAsGXQC
   k=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65409551
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:4gEcjKBHTdByGxVW/zjjw5YqxClBgxIJ4kV8jS/XYbTApGwh0zxTx
 zZMXGCDPq6CYWbzfoxxPY7l8hxU7MWGm9VrQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vg2tYy6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhP6
 s9g5Me8Tzw2ZLHghqcbfgcGMx9XaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguw5K8bmJsUHs2xIxjDFF/c2B5vERs0m4PcGgWto150TRJ4yY
 eIiNBF0MSuffSZoHQo0Cr45xNevol7WJmgwRFW9+vNsvjm7IBZK+KjgNp/Zd8KHQe1Rn12Ev
 STW8mLhGBYYOdeDjz2f/RqEmevnjS79HoUIG9WQ9PRnnVmSzWw7EwANWB2wpvzRt6Klc4sBc
 QpOoHNo9PVsshzwJjXgY/GmiECmpDNNANZWKPJg9C2Tiaz5/Vi5OEFRG1atd+canMMxQDUr0
 HqAkNXoGSFjvdWpdJ6NyluHhWjsYHZIdAfucQdBFFJYuIe7/OnfmzqSFo4LLUKjsjHi9dgcK
 RiupTN2ubgchNVjO06TrQGe2GLESnQko2cICuTrsoCNs1sRiG2NPdXABb3nARBodtjxor6p5
 iRspiRmxLpSZaxhbQTUKAn3IJmn5uyeLBrXikN1Ep8q+lyFoiD/I9ANuWolfBk5bK7onAMFh
 meJ6Wu9A7cJYBOXgVJfOdrtW6zGM4C8fTgaahwkRoUXOcUgHON21CpveVSRzwjQfLsEyskC1
 WOgWZ/0Vx4yUP0/pBLvHrt1+eJ7l0gWmDKILbimnkvP7FZrTCPMIVvzGADVNb5RAWLtiFi9z
 uuzwOPRkkQBCrKiOneLmWPRRHhTRUUG6VnNg5U/XsaIIxZ8GXFnDPnUwLg7fJdikbgTneDNl
 kxRkGcEkjITWVWvxd22V01e
IronPort-HdrOrdr: A9a23:H7xXBKPoJ6w0MMBcTy3155DYdb4zR+YMi2TDiHofdfUFSKClfp
 6V8cjztSWUtN4QMEtQ/uxoHJPwO080lKQFmrX5WI3NYOCIghrLEGgP1/qG/9SkIVyCygc/79
 YfT0EdMqyIMbESt6+Ti2PZYrUdKZu8gdiVbI/lvghQpGpRGsddBmlCe2Km+hocfng7OXN1Lu
 vU2uN34x6bPVgHZMWyAXcIG8DFut3wjZrjJToLHQQu5gWihS6hrOeSKWnS4j4uFxd0hZsy+2
 nMlAL0oo2lrvGA0xfZk0ve9Y5fltfNwsZKQOaMls8WADPxjRvAXvUoZ5Sy+BQO5M2/4lcjl9
 fB5z8mIsRI8nvUOlq4pBP8sjOQpAoG2jvH8xu1kHHjqcv2SHYREMxan79UdRPf9g4JoMx8+L
 gj5RPUi7NnSTf72Ajt7dnBUB9n0mCup2A5rOIVh3tDFaMDdb5qq5AF9k89KuZMIMvD0vFoLA
 BSNrCc2B4PGmnqL0wx/1MfiuBEZ05DUStvGSM5y4+oOzs/pgEN86JX/r1cop46zuNMd3B13Z
 W0Dk1WrsA8ciY3V9MLOA5Te7rANoTyKSi8Ql56Z26XUZ06Bw==
X-IronPort-AV: E=Sophos;i="5.90,171,1643691600"; 
   d="scan'208";a="65409551"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=aUI0BV7ORAph5E9GggMSUCDqHOCzlni7y9mDZINmyRRUe0n4+TGyV229ou6q/ZeLYporymByNeIMMSxKhgXbMtiwpQs3s9IrPVGGR1k8RrvDax3PqAR3C/Wb2u8Qopdc5Z8j1NQDMTL1q94n54BVa+AgSdFhJwJw4Nlhlcz8M3d2nfVFrOc2KSKlWo4JPxTndUrVFlqkdKU8H4Rn6SmEbKJ0ks7ui8vfSiPT6U72f43tI3uE9lqGaFv4uQouAkiUOPIQluEBk8+JQUZ38OQWvtTbzdGh7/dyUv6RiLgpgt8h+hS0QUjlmpZpQemeZkASctr0af19ygxnnYkr6Inugg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=g1GROqNbzLR92M0X8QnrmNGlycl5GeJ7Kk749jNgCNk=;
 b=Hq/li9dLKPjcYpMaqjWGKC9vfvdbO3scYb3pQct+Vn3xMnabfwvdy9AK/10UWmCtCXzXEs4mMUsNCxHsfWY7sP7apZUjAXYklBdLDNucP4cqCrBQ18l55INwMf+KM2jk5yOqcpru2RNHSV67hytjlf7MYIazdcWhfiPyi3j7TIxOBfyzLGTEmZuyCwSCa7sa8sJaILjNZW8biyAPjQtYbvvD7Uv6AwiIuzRyGwBp0Qq/IvitWKX/ok47APj5RyXZ5eVgUzC+xrmELs4A54BJ9HiT0R4Ems3ifa7j6B0KGmnSsgUA1oBwhS7crDT6mIkZ7hKHE4MyBm0Ek+VKRyaTzw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=g1GROqNbzLR92M0X8QnrmNGlycl5GeJ7Kk749jNgCNk=;
 b=GOG3EY1yIauyCLMgTQWnu0OebF54QwoaQXOaB9z/bKBq8HxnPB8LW5vm667z2ZgzeGCYGGypx4NzVC4tJ1O+pjHBXfykZHWxI3Xratlno4k4bFsdP1y7CCBS0T+Cyq9SH2jHCPPe5e7krqHkc1TerNnoF8dJskU0iG/lL2bvWAQ=
Date: Thu, 10 Mar 2022 17:41:19 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH 2/3] amd/msr: allow passthrough of VIRT_SPEC_CTRL for HVM
 guests
Message-ID: <YioqL+CcQHiwyRwi@Air-de-Roger>
References: <20220201164651.6369-1-roger.pau@citrix.com>
 <20220201164651.6369-3-roger.pau@citrix.com>
 <ea9c7232-a98b-7fb4-a151-0c1e3ce1e1db@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <ea9c7232-a98b-7fb4-a151-0c1e3ce1e1db@suse.com>
X-ClientProxiedBy: LO4P123CA0383.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:18f::10) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 9810c045-445e-4d99-4693-08da02b4d0f7
X-MS-TrafficTypeDiagnostic: SJ0PR03MB6630:EE_
X-Microsoft-Antispam-PRVS: <SJ0PR03MB6630700503D64A51F257E31D8F0B9@SJ0PR03MB6630.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(6916009)(508600001)(66556008)(66476007)(54906003)(6486002)(316002)(38100700002)(8676002)(4326008)(66946007)(86362001)(82960400001)(186003)(85182001)(6666004)(26005)(6512007)(6506007)(53546011)(9686003)(2906002)(8936002)(33716001)(5660300002)(83380400001)(67856001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?dTFtRUtJb1AwRTBROTVEd1lmaWZxUEh4TkxUTnpJVFBBZEVQZEVPQ0tYOHVY?=
 =?utf-8?B?VE1EL2k2NWxvNUI2dGU2L2JMbnpFZ1UxUi9SdGZUS0VhSHhQc1dQQTJvUklG?=
 =?utf-8?B?citwb0E0b2lIcG5zNlBzU0h4cjBjVWI4blJ3b21oSTMrbnRkcGtQOXdwd2ww?=
 =?utf-8?B?YlVwQlEwV0pWMmZxRm54U1ZXVC93L3JCMEFWQjdKUkxmNGFYRUo0bExBQTZy?=
 =?utf-8?B?cHFxaGpPcXpnMEYyNXlyNVpMdmxXK3FQeXBWby8yOU5saVNuVjU3T201TnEr?=
 =?utf-8?B?NjdnQm0yTnd1cHNFZUtnNzZrMG9hMG1vRmhZdkU4ajZweGd1UVpNeUhYaW9w?=
 =?utf-8?B?R1JmNm5mNE0vdzZBZ1NiWnFveC9TbXI2RnB0T0VRUE9DcTQ0Si8wRnhhRjVP?=
 =?utf-8?B?V3JsTUhCNUxJUmx2MThsY25ZWE9PeklRVW9oL1lnM095UFJQcGxrQnZVVDU5?=
 =?utf-8?B?bnlVcUlHSWVMUWxITWJUUVdPaTI1Y3NEUDhxU0RzK0xUQkt6K25UaVdxbmNa?=
 =?utf-8?B?c0NWK3ZQY3gvck8wRkJLdWw4bk5Vb1o1b0FMZG1WMlZHZlhHbEF5MUJrRUZk?=
 =?utf-8?B?ZlhURGt0SVhUeGt1QUI0QkJqNFhrbHM5UEtIZnZQeml2RkdxdU5zNjl2TFc0?=
 =?utf-8?B?OExXR1daMlpsUzZhbG54eUQzT2VMYnBDRS8yTFh1UmdaRFI4MHRQRmpadDZK?=
 =?utf-8?B?TExLOE5XMkJ5elNlVUI4Y2lpT2dXSVoxaVUzS21EQXRSTFA5NEQzUVB6Nlgw?=
 =?utf-8?B?OHh5N2ZvYU9TMGl4QmRBbE50TXIxd1ErMEhoT1Bud0orbWZ6U0JFYnpvVXJL?=
 =?utf-8?B?NHordUsrMUZhSFZOTVpCQ0FIZWhDVGp5cVM5QU15R3YxOXdwWDBPK0k0YXZH?=
 =?utf-8?B?TDI3aUhlZzFaMHVUZVl5aU9tbFpJYkM5dUNMc1dMMmlUQ01SN3BEb0VmRnpy?=
 =?utf-8?B?SkRJMW10Um5ieXJLZ05RUEpVYTNlRkMwWTlKVVlTZmtKajVieTZKWTVObURR?=
 =?utf-8?B?Vm9HQk0rVTJOaHJjTUFac1dDVW5URXFLdGg0TlM3c2s5amRWUFI1K2xwWWZK?=
 =?utf-8?B?VzBLQTF1cjBNaTZEWnI0bUh2WldpMUVKbmUwR0FQbEMxSlZWd1hUT1cyUFla?=
 =?utf-8?B?cVQrK24xNG1ZNlJyeGhLM0VoZGwxNExGUXlmSEpHQlJKUGtCUlNiZXlpb1Zk?=
 =?utf-8?B?cmdTVmg2ekhEZkN0SnNXVGoxbGs2eUlLMGRVRHY1TUU2U095SVNEd1FCSHo1?=
 =?utf-8?B?ZHBtdWVxU0tKdUFxb05WUi9STi9vLzdMdDB5N3pMRWFiS01WR1U1N3pvdit3?=
 =?utf-8?B?c0tJVmtjZHZwZ0RMclU0Y3NvU1o2bHhjSVMwWFNNbGRhbDZWcXZwWGlRZEp4?=
 =?utf-8?B?bFdkc3ZzREk5ZGdvOTJrY21NMjQrWHBobHNPRE9NL1VaTjByWVoyajFrMjg3?=
 =?utf-8?B?WE5jdHB3cXpiMWNCMXFNRzNiUGQ2eDVwTUxCMzdPSGJtQnovYThFSlpPOE5B?=
 =?utf-8?B?Zk9XMWp1eWFIaklUSm9rNXQwMWs3WWtTU2xmLzJBZVJldzNGZXJYVmpaQzlx?=
 =?utf-8?B?c0dRelJ3M2VuQXR5dVM1cldvenI4eHdJcVh5RmxsRkpzdlpxYkdqd0NMZXYv?=
 =?utf-8?B?QTRycHd4Y0FJVGE2ZlBveHc5NGVFaG9TYnBMVlArTDFwTmJQd2RnaFB5M1Zn?=
 =?utf-8?B?ZjVFbHpoNmV4L1grK0t6bGhxdTVNajJvUmF5ZjhXdE9DNnNTaXcvUjRYd0hM?=
 =?utf-8?B?a0p0ZmR3VjlhVHFtSk9yWUd1WVpKNjU3cHBNRzhhdUZtaFQ1WThXN2hkNHJL?=
 =?utf-8?B?RStNUDlPNXp0TWM2WUMxV1RSc0dmRjdhQVVMUktiUmo4d3hoVmI2c3ZuNE9U?=
 =?utf-8?B?a3AyVFNlZzJXOHlRc0Jtemw5dmxqWEdtNU9nYWkwai9uUEpSWHJKdk9rdUtT?=
 =?utf-8?B?ejk0OWp2RkJhTjRRYjdNenJJYkRBSlZnNi96L0hRM1h1dENJSWV1Z2JsNXNu?=
 =?utf-8?B?NU1sOWVXZnJBPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 9810c045-445e-4d99-4693-08da02b4d0f7
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2022 16:41:25.2237
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: ctzhMdtmcsN15Fd2kObvV2/KYRPGeM+PZ0XuCPqAwHpnfbpvoLPXhKKUrHHPCJDa9jWtFLXssa+3TwmJCotahw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR03MB6630
X-OriginatorOrg: citrix.com

On Mon, Feb 14, 2022 at 05:02:52PM +0100, Jan Beulich wrote:
> On 01.02.2022 17:46, Roger Pau Monne wrote:
> > --- a/xen/arch/x86/hvm/svm/entry.S
> > +++ b/xen/arch/x86/hvm/svm/entry.S
> > @@ -71,7 +71,9 @@ __UNLIKELY_END(nsvm_hap)
> >              mov    %al, CPUINFO_last_spec_ctrl(%rsp)
> >  1:          /* No Spectre v1 concerns.  Execution will hit VMRUN imminently. */
> >          .endm
> > -        ALTERNATIVE "", svm_vmentry_spec_ctrl, X86_FEATURE_SC_MSR_HVM
> > +        ALTERNATIVE_2 "", STR(call vmentry_virt_spec_ctrl), \
> 
> I'm afraid this violates the "ret" part of the warning a few lines up,
> while ...
> 
> > +                          X86_FEATURE_VIRT_SC_MSR_HVM, \
> > +                      svm_vmentry_spec_ctrl, X86_FEATURE_SC_MSR_HVM
> >  
> >          pop  %r15
> >          pop  %r14
> > @@ -111,7 +113,9 @@ __UNLIKELY_END(nsvm_hap)
> >              wrmsr
> >              mov    %al, CPUINFO_last_spec_ctrl(%rsp)
> >          .endm
> > -        ALTERNATIVE "", svm_vmexit_spec_ctrl, X86_FEATURE_SC_MSR_HVM
> > +        ALTERNATIVE_2 "", STR(call vmexit_virt_spec_ctrl), \
> 
> ... this violates ...
> 
> > +                          X86_FEATURE_VIRT_SC_MSR_HVM, \
> > +                      svm_vmexit_spec_ctrl, X86_FEATURE_SC_MSR_HVM
> >          /* WARNING! `ret`, `call *`, `jmp *` not safe before this point. */
> 
> ... the "ret" part of this warning.

Hm, so while I could load VIRT_SPEC_CTRL easily from assembly, loading
of the legacy non-architectural setting of SSBD for Fam18h and earlier
it's likely not doable from assembly.

Since those helpers would only set SSBD, isn't it fine to execute a
`ret` after either having set or clear SSBD?

AFAICT the requirement would be to either have loaded SPEC_CTRL first
(if present) in the VM exit path, or to set SSBD before setting
SPEC_CTRL in the VM entry path.

> Furthermore, opposite to what the change to amd_init_ssbd() suggests,
> the ordering of the alternatives here means you prefer SPEC_CTRL over
> VIRT_SPEC_CTRL; see the comment near the top of _apply_alternatives().
> Unless I've missed logic guaranteeing that both of the keyed to
> features can't be active at the same time.

Xen itself will only use a single one (either SPEC_CTRL.SSBD or
VIRT_SPEC_CTRL.SSBD) in order to implement support on behalf of the
guest. amd_init_ssbd already prefer to use SPEC_CTRL.SSBD over
VIRT_SPEC_CTRL.SSBD when both are available, so we aim to do the same
here.

I think part of the confusion steams from using info->{last_spec_ctrl,
xen_spec_ctrl} even when SPEC_CTRL MSR is not used by Xen, I need to
clarify this somehow, maybe by not using those fields in the first
place.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Thu Mar 10 17:10:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 17:10:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288503.489223 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMJ8-0001m4-9Z; Thu, 10 Mar 2022 17:10:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288503.489223; Thu, 10 Mar 2022 17:10:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMJ8-0001lx-6O; Thu, 10 Mar 2022 17:10:34 +0000
Received: by outflank-mailman (input) for mailman id 288503;
 Thu, 10 Mar 2022 17:10:32 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5/tR=TV=arm.com=luca.fancellu@srs-se1.protection.inumbo.net>)
 id 1nSMJ6-0001lh-27
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 17:10:32 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id fc8655ae-a094-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 18:10:30 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id EF0901692;
 Thu, 10 Mar 2022 09:10:28 -0800 (PST)
Received: from e125770.cambridge.arm.com (e125770.cambridge.arm.com
 [10.1.195.16])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 5156D3F99C;
 Thu, 10 Mar 2022 09:10:27 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fc8655ae-a094-11ec-8eba-a37418f5ba1a
From: Luca Fancellu <luca.fancellu@arm.com>
To: xen-devel@lists.xenproject.org
Cc: wei.chen@arm.com,
	Wei Liu <wl@xen.org>,
	Anthony PERARD <anthony.perard@citrix.com>,
	Juergen Gross <jgross@suse.com>,
	Dario Faggioli <dfaggioli@suse.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH v2 0/6] Boot time cpupools
Date: Thu, 10 Mar 2022 17:10:13 +0000
Message-Id: <20220310171019.6170-1-luca.fancellu@arm.com>
X-Mailer: git-send-email 2.17.1

This serie introduces a feature for Xen to create cpu pools at boot time, the
feature is enabled using a configurable that is disabled by default.
The boot time cpupool feature relies on the device tree to describe the cpu
pools.
Another feature is introduced by the serie, the possibility to assign a
dom0less guest to a cpupool at boot time.

Here follows an example, Xen is built with CONFIG_BOOT_TIME_CPUPOOLS=y.

>From the DT:

  [...]

  a72_0: cpu@0 {
    compatible = "arm,cortex-a72";
    reg = <0x0 0x0>;
    device_type = "cpu";
    [...]
  };

  a72_1: cpu@1 {
    compatible = "arm,cortex-a72";
    reg = <0x0 0x1>;
    device_type = "cpu";
    [...]
  };

  a53_0: cpu@100 {
    compatible = "arm,cortex-a53";
    reg = <0x0 0x100>;
    device_type = "cpu";
    [...]
  };

  a53_1: cpu@101 {
    compatible = "arm,cortex-a53";
    reg = <0x0 0x101>;
    device_type = "cpu";
    [...]
  };

  a53_2: cpu@102 {
    compatible = "arm,cortex-a53";
    reg = <0x0 0x102>;
    device_type = "cpu";
    [...]
  };

  a53_3: cpu@103 {
    compatible = "arm,cortex-a53";
    reg = <0x0 0x103>;
    device_type = "cpu";
    [...]
  };

  chosen {
    #size-cells = <0x1>;
    #address-cells = <0x1>;
    xen,dom0-bootargs = "...";
    xen,xen-bootargs = "...";

    s1: sched_a {
        compatible = "xen,scheduler";
        sched-name = "credit2";
    };
    s2: sched_b {
        compatible = "xen,scheduler";
        sched-name = "null";
    };

    cpupool0 {
      compatible = "xen,cpupool";
      cpupool-cpus = <&a72_0 &a72_1>;
      cpupool-sched = <&1>;
    };

    cp1: cpupool1 {
      compatible = "xen,cpupool";
      cpupool-cpus = <&a53_0 &a53_1 &a53_2 &a53_3>;
      cpupool-sched = <&s2>;
    };

    module@0 {
      reg = <0x80080000 0x1300000>;
      compatible = "multiboot,module";
    };

    domU1 {
      #size-cells = <0x1>;
      #address-cells = <0x1>;
      compatible = "xen,domain";
      cpus = <1>;
      memory = <0 0xC0000>;
      vpl011;
      domain-cpupool = <&cp1>;

      module@92000000 {
        compatible = "multiboot,kernel", "multiboot,module";
        reg = <0x92000000 0x1ffffff>;
        bootargs = "...";
      };
    };
  };

  [...]

The example DT is instructing Xen to have two cpu pools, the one with id 0
having two phisical cpus and the one with id 1 having 4 phisical cpu, the
second cpu pool uses the null scheduler and from the /chosen node we can see
that a dom0less guest will be started on that cpu pool.

In this particular case Xen must boot with different type of cpus, so the
boot argument hmp_unsafe must be enabled.


Luca Fancellu (6):
  tools/cpupools: Give a name to unnamed cpupools
  xen/sched: create public function for cpupools creation
  xen/sched: retrieve scheduler id by name
  xen/cpupool: Create different cpupools at boot time
  arm/dom0less: assign dom0less guests to cpupools
  xen/cpupool: Allow cpupool0 to use different scheduler

 docs/misc/arm/device-tree/booting.txt  |   5 +
 docs/misc/arm/device-tree/cpupools.txt | 156 +++++++++++++++++
 tools/helpers/xen-init-dom0.c          |  35 +++-
 tools/libs/light/libxl_utils.c         |   3 +-
 xen/arch/arm/domain_build.c            |  14 +-
 xen/common/Kconfig                     |   8 +
 xen/common/Makefile                    |   1 +
 xen/common/boot_cpupools.c             | 233 +++++++++++++++++++++++++
 xen/common/domain.c                    |   2 +-
 xen/common/sched/core.c                |  40 +++--
 xen/common/sched/cpupool.c             |  29 ++-
 xen/include/public/domctl.h            |   4 +-
 xen/include/xen/sched.h                |  58 ++++++
 13 files changed, 560 insertions(+), 28 deletions(-)
 create mode 100644 docs/misc/arm/device-tree/cpupools.txt
 create mode 100644 xen/common/boot_cpupools.c

-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 17:10:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 17:10:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288505.489236 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMJ9-00020C-1x; Thu, 10 Mar 2022 17:10:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288505.489236; Thu, 10 Mar 2022 17:10:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMJ8-0001xI-So; Thu, 10 Mar 2022 17:10:34 +0000
Received: by outflank-mailman (input) for mailman id 288505;
 Thu, 10 Mar 2022 17:10:33 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5/tR=TV=arm.com=luca.fancellu@srs-se1.protection.inumbo.net>)
 id 1nSMJ7-0001lh-Ik
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 17:10:33 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id fe0d42a9-a094-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 18:10:32 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 7B84116F2;
 Thu, 10 Mar 2022 09:10:31 -0800 (PST)
Received: from e125770.cambridge.arm.com (e125770.cambridge.arm.com
 [10.1.195.16])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 301773F99C;
 Thu, 10 Mar 2022 09:10:30 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fe0d42a9-a094-11ec-8eba-a37418f5ba1a
From: Luca Fancellu <luca.fancellu@arm.com>
To: xen-devel@lists.xenproject.org
Cc: wei.chen@arm.com,
	Juergen Gross <jgross@suse.com>,
	Dario Faggioli <dfaggioli@suse.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>
Subject: [PATCH v2 2/6] xen/sched: create public function for cpupools creation
Date: Thu, 10 Mar 2022 17:10:15 +0000
Message-Id: <20220310171019.6170-3-luca.fancellu@arm.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220310171019.6170-1-luca.fancellu@arm.com>
References: <20220310171019.6170-1-luca.fancellu@arm.com>

Create new public function to create cpupools, can take as parameter
the scheduler id or a negative value that means the default Xen
scheduler will be used.

Signed-off-by: Luca Fancellu <luca.fancellu@arm.com>
---
Changes in v2:
- cpupool_create_pool doesn't check anymore for pool id uniqueness
  before calling cpupool_create. Modified commit message accordingly
---
 xen/common/sched/cpupool.c | 15 +++++++++++++++
 xen/include/xen/sched.h    | 16 ++++++++++++++++
 2 files changed, 31 insertions(+)

diff --git a/xen/common/sched/cpupool.c b/xen/common/sched/cpupool.c
index a6da4970506a..89a891af7076 100644
--- a/xen/common/sched/cpupool.c
+++ b/xen/common/sched/cpupool.c
@@ -1219,6 +1219,21 @@ static void cpupool_hypfs_init(void)
 
 #endif /* CONFIG_HYPFS */
 
+struct cpupool *__init cpupool_create_pool(unsigned int pool_id, int sched_id)
+{
+    struct cpupool *pool;
+
+    if ( sched_id < 0 )
+        sched_id = scheduler_get_default()->sched_id;
+
+    pool = cpupool_create(pool_id, sched_id);
+
+    BUG_ON(IS_ERR(pool));
+    cpupool_put(pool);
+
+    return pool;
+}
+
 static int __init cf_check cpupool_init(void)
 {
     unsigned int cpu;
diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
index 10ea969c7af9..47fc856e0fe0 100644
--- a/xen/include/xen/sched.h
+++ b/xen/include/xen/sched.h
@@ -1145,6 +1145,22 @@ int cpupool_move_domain(struct domain *d, struct cpupool *c);
 int cpupool_do_sysctl(struct xen_sysctl_cpupool_op *op);
 unsigned int cpupool_get_id(const struct domain *d);
 const cpumask_t *cpupool_valid_cpus(const struct cpupool *pool);
+
+/*
+ * cpupool_create_pool - Creates a cpupool
+ * @pool_id: id of the pool to be created
+ * @sched_id: id of the scheduler to be used for the pool
+ *
+ * Creates a cpupool with pool_id id.
+ * The sched_id parameter identifies the scheduler to be used, if it is
+ * negative, the default scheduler of Xen will be used.
+ *
+ * returns:
+ *     pointer to the struct cpupool just created, on success
+ *     NULL, on cpupool creation error
+ */
+struct cpupool *cpupool_create_pool(unsigned int pool_id, int sched_id);
+
 extern void cf_check dump_runq(unsigned char key);
 
 void arch_do_physinfo(struct xen_sysctl_physinfo *pi);
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 17:10:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 17:10:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288504.489229 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMJ8-0001pb-La; Thu, 10 Mar 2022 17:10:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288504.489229; Thu, 10 Mar 2022 17:10:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMJ8-0001oM-Dq; Thu, 10 Mar 2022 17:10:34 +0000
Received: by outflank-mailman (input) for mailman id 288504;
 Thu, 10 Mar 2022 17:10:32 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5/tR=TV=arm.com=luca.fancellu@srs-se1.protection.inumbo.net>)
 id 1nSMJ6-0001lh-Jy
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 17:10:32 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id fd225777-a094-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 18:10:30 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id EBA5116A3;
 Thu, 10 Mar 2022 09:10:29 -0800 (PST)
Received: from e125770.cambridge.arm.com (e125770.cambridge.arm.com
 [10.1.195.16])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 314BD3F99C;
 Thu, 10 Mar 2022 09:10:29 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fd225777-a094-11ec-8eba-a37418f5ba1a
From: Luca Fancellu <luca.fancellu@arm.com>
To: xen-devel@lists.xenproject.org
Cc: wei.chen@arm.com,
	Wei Liu <wl@xen.org>,
	Anthony PERARD <anthony.perard@citrix.com>,
	Juergen Gross <jgross@suse.com>
Subject: [PATCH v2 1/6] tools/cpupools: Give a name to unnamed cpupools
Date: Thu, 10 Mar 2022 17:10:14 +0000
Message-Id: <20220310171019.6170-2-luca.fancellu@arm.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220310171019.6170-1-luca.fancellu@arm.com>
References: <20220310171019.6170-1-luca.fancellu@arm.com>

With the introduction of boot time cpupools, Xen can create many
different cpupools at boot time other than cpupool with id 0.

Since these newly created cpupools can't have an
entry in Xenstore, create the entry using xen-init-dom0
helper with the usual convention: Pool-<cpupool id>.

Given the change, remove the check for poolid == 0 from
libxl_cpupoolid_to_name(...).

Signed-off-by: Luca Fancellu <luca.fancellu@arm.com>
---
Changes in v2:
 - Remove unused variable, moved xc_cpupool_infofree
   ahead to simplify the code, use asprintf (Juergen)
---
 tools/helpers/xen-init-dom0.c  | 35 +++++++++++++++++++++++++++++++++-
 tools/libs/light/libxl_utils.c |  3 +--
 2 files changed, 35 insertions(+), 3 deletions(-)

diff --git a/tools/helpers/xen-init-dom0.c b/tools/helpers/xen-init-dom0.c
index c99224a4b607..84286617790f 100644
--- a/tools/helpers/xen-init-dom0.c
+++ b/tools/helpers/xen-init-dom0.c
@@ -43,7 +43,9 @@ int main(int argc, char **argv)
     int rc;
     struct xs_handle *xsh = NULL;
     xc_interface *xch = NULL;
-    char *domname_string = NULL, *domid_string = NULL;
+    char *domname_string = NULL, *domid_string = NULL, *pool_path, *pool_name;
+    xc_cpupoolinfo_t *xcinfo;
+    unsigned int pool_id = 0;
     libxl_uuid uuid;
 
     /* Accept 0 or 1 argument */
@@ -114,6 +116,37 @@ int main(int argc, char **argv)
         goto out;
     }
 
+    /* Create an entry in xenstore for each cpupool on the system */
+    do {
+        xcinfo = xc_cpupool_getinfo(xch, pool_id);
+        if (xcinfo != NULL) {
+            if (xcinfo->cpupool_id != pool_id)
+                pool_id = xcinfo->cpupool_id;
+            xc_cpupool_infofree(xch, xcinfo);
+            if (asprintf(&pool_path, "/local/pool/%d/name", pool_id) <= 0) {
+                fprintf(stderr, "cannot allocate memory for pool path\n");
+                rc = 1;
+                goto out;
+            }
+            if (asprintf(&pool_name, "Pool-%d", pool_id) <= 0) {
+                fprintf(stderr, "cannot allocate memory for pool name\n");
+                rc = 1;
+                goto out_err;
+            }
+            pool_id++;
+            if (!xs_write(xsh, XBT_NULL, pool_path, pool_name,
+                          strlen(pool_name))) {
+                fprintf(stderr, "cannot set pool name\n");
+                rc = 1;
+            }
+            free(pool_name);
+out_err:
+            free(pool_path);
+            if ( rc )
+                goto out;
+        }
+    } while(xcinfo != NULL);
+
     printf("Done setting up Dom0\n");
 
 out:
diff --git a/tools/libs/light/libxl_utils.c b/tools/libs/light/libxl_utils.c
index b91c2cafa223..81780da3ff40 100644
--- a/tools/libs/light/libxl_utils.c
+++ b/tools/libs/light/libxl_utils.c
@@ -151,8 +151,7 @@ char *libxl_cpupoolid_to_name(libxl_ctx *ctx, uint32_t poolid)
 
     snprintf(path, sizeof(path), "/local/pool/%d/name", poolid);
     s = xs_read(ctx->xsh, XBT_NULL, path, &len);
-    if (!s && (poolid == 0))
-        return strdup("Pool-0");
+
     return s;
 }
 
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 17:10:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 17:10:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288507.489267 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMJC-0002ox-NC; Thu, 10 Mar 2022 17:10:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288507.489267; Thu, 10 Mar 2022 17:10:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMJC-0002nr-HJ; Thu, 10 Mar 2022 17:10:38 +0000
Received: by outflank-mailman (input) for mailman id 288507;
 Thu, 10 Mar 2022 17:10:37 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5/tR=TV=arm.com=luca.fancellu@srs-se1.protection.inumbo.net>)
 id 1nSMJA-0001lh-Sf
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 17:10:37 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id fff70587-a094-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 18:10:35 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id C542616A3;
 Thu, 10 Mar 2022 09:10:34 -0800 (PST)
Received: from e125770.cambridge.arm.com (e125770.cambridge.arm.com
 [10.1.195.16])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 29F8A3F99C;
 Thu, 10 Mar 2022 09:10:33 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fff70587-a094-11ec-8eba-a37418f5ba1a
From: Luca Fancellu <luca.fancellu@arm.com>
To: xen-devel@lists.xenproject.org
Cc: wei.chen@arm.com,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>,
	Juergen Gross <jgross@suse.com>,
	Dario Faggioli <dfaggioli@suse.com>
Subject: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot time
Date: Thu, 10 Mar 2022 17:10:17 +0000
Message-Id: <20220310171019.6170-5-luca.fancellu@arm.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220310171019.6170-1-luca.fancellu@arm.com>
References: <20220310171019.6170-1-luca.fancellu@arm.com>

Introduce a way to create different cpupools at boot time, this is
particularly useful on ARM big.LITTLE system where there might be the
need to have different cpupools for each type of core, but also
systems using NUMA can have different cpu pools for each node.

The feature on arm relies on a specification of the cpupools from the
device tree to build pools and assign cpus to them.

Documentation is created to explain the feature.

Signed-off-by: Luca Fancellu <luca.fancellu@arm.com>
---
Changes in v2:
- Move feature to common code (Juergen)
- Try to decouple dtb parse and cpupool creation to allow
  more way to specify cpupools (for example command line)
- Created standalone dt node for the scheduler so it can
  be used in future work to set scheduler specific
  parameters
- Use only auto generated ids for cpupools
---
 docs/misc/arm/device-tree/cpupools.txt | 156 ++++++++++++++++++
 xen/common/Kconfig                     |   8 +
 xen/common/Makefile                    |   1 +
 xen/common/boot_cpupools.c             | 212 +++++++++++++++++++++++++
 xen/common/sched/cpupool.c             |   6 +-
 xen/include/xen/sched.h                |  19 +++
 6 files changed, 401 insertions(+), 1 deletion(-)
 create mode 100644 docs/misc/arm/device-tree/cpupools.txt
 create mode 100644 xen/common/boot_cpupools.c

diff --git a/docs/misc/arm/device-tree/cpupools.txt b/docs/misc/arm/device-tree/cpupools.txt
new file mode 100644
index 000000000000..d5a82ed0d45a
--- /dev/null
+++ b/docs/misc/arm/device-tree/cpupools.txt
@@ -0,0 +1,156 @@
+Boot time cpupools
+==================
+
+When BOOT_TIME_CPUPOOLS is enabled in the Xen configuration, it is possible to
+create cpupools during boot phase by specifying them in the device tree.
+
+Cpupools specification nodes shall be direct childs of /chosen node.
+Each cpupool node contains the following properties:
+
+- compatible (mandatory)
+
+    Must always include the compatiblity string: "xen,cpupool".
+
+- cpupool-cpus (mandatory)
+
+    Must be a list of device tree phandle to nodes describing cpus (e.g. having
+    device_type = "cpu"), it can't be empty.
+
+- cpupool-sched (optional)
+
+    Must be a device tree phandle to a node having "xen,scheduler" compatible
+    (description below), it has no effect when the cpupool refers to the cpupool
+    number zero, in that case the default Xen scheduler is selected (sched=<...>
+    boot argument).
+
+
+A scheduler specification node is a device tree node that contains the following
+properties:
+
+- compatible (mandatory)
+
+    Must always include the compatiblity string: "xen,scheduler".
+
+- sched-name (mandatory)
+
+    Must be a string having the name of a Xen scheduler, check the sched=<...>
+    boot argument for allowed values.
+
+
+Constraints
+===========
+
+If no cpupools are specified, all cpus will be assigned to one cpupool
+implicitly created (Pool-0).
+
+If cpupools node are specified, but not every cpu brought up by Xen is assigned,
+all the not assigned cpu will be assigned to an additional cpupool.
+
+If a cpu is assigned to a cpupool, but it's not brought up correctly, Xen will
+stop.
+
+
+Examples
+========
+
+A system having two types of core, the following device tree specification will
+instruct Xen to have two cpupools:
+
+- The cpupool with id 0 will have 4 cpus assigned.
+- The cpupool with id 1 will have 2 cpus assigned.
+
+The following example can work only if hmp-unsafe=1 is passed to Xen boot
+arguments, otherwise not all cores will be brought up by Xen and the cpupool
+creation process will stop Xen.
+
+
+a72_1: cpu@0 {
+        compatible = "arm,cortex-a72";
+        reg = <0x0 0x0>;
+        device_type = "cpu";
+        [...]
+};
+
+a72_2: cpu@1 {
+        compatible = "arm,cortex-a72";
+        reg = <0x0 0x1>;
+        device_type = "cpu";
+        [...]
+};
+
+a53_1: cpu@100 {
+        compatible = "arm,cortex-a53";
+        reg = <0x0 0x100>;
+        device_type = "cpu";
+        [...]
+};
+
+a53_2: cpu@101 {
+        compatible = "arm,cortex-a53";
+        reg = <0x0 0x101>;
+        device_type = "cpu";
+        [...]
+};
+
+a53_3: cpu@102 {
+        compatible = "arm,cortex-a53";
+        reg = <0x0 0x102>;
+        device_type = "cpu";
+        [...]
+};
+
+a53_4: cpu@103 {
+        compatible = "arm,cortex-a53";
+        reg = <0x0 0x103>;
+        device_type = "cpu";
+        [...]
+};
+
+chosen {
+
+    sched: sched_a {
+        compatible = "xen,scheduler";
+        sched-name = "credit2";
+    };
+    cpupool_a {
+        compatible = "xen,cpupool";
+        cpupool-cpus = <&a53_1 &a53_2 &a53_3 &a53_4>;
+    };
+    cpupool_b {
+        compatible = "xen,cpupool";
+        cpupool-cpus = <&a72_1 &a72_2>;
+        cpupool-sched = <&sched>;
+    };
+
+    [...]
+
+};
+
+
+A system having the cpupools specification below will instruct Xen to have three
+cpupools:
+
+- The cpupool Pool-0 will have 2 cpus assigned.
+- The cpupool Pool-1 will have 2 cpus assigned.
+- The cpupool Pool-2 will have 2 cpus assigned (created by Xen with all the not
+  assigned cpus a53_3 and a53_4).
+
+chosen {
+
+    sched: sched_a {
+        compatible = "xen,scheduler";
+        sched-name = "null";
+    };
+    cpupool_a {
+        compatible = "xen,cpupool";
+        cpupool-cpus = <&a53_1 &a53_2>;
+    };
+    cpupool_b {
+        compatible = "xen,cpupool";
+        cpupool-cpus = <&a72_1 &a72_2>;
+        cpupool-sched = <&sched>;
+    };
+
+    [...]
+
+};
\ No newline at end of file
diff --git a/xen/common/Kconfig b/xen/common/Kconfig
index 64439438891c..dc9eed31682f 100644
--- a/xen/common/Kconfig
+++ b/xen/common/Kconfig
@@ -22,6 +22,14 @@ config GRANT_TABLE
 
 	  If unsure, say Y.
 
+config BOOT_TIME_CPUPOOLS
+	bool "Create cpupools at boot time"
+	depends on HAS_DEVICE_TREE
+	default n
+	help
+	  Creates cpupools during boot time and assigns cpus to them. Cpupools
+	  options can be specified in the device tree.
+
 config ALTERNATIVE_CALL
 	bool
 
diff --git a/xen/common/Makefile b/xen/common/Makefile
index dc8d3a13f5b8..c5949785ab28 100644
--- a/xen/common/Makefile
+++ b/xen/common/Makefile
@@ -1,5 +1,6 @@
 obj-$(CONFIG_ARGO) += argo.o
 obj-y += bitmap.o
+obj-$(CONFIG_BOOT_TIME_CPUPOOLS) += boot_cpupools.o
 obj-$(CONFIG_HYPFS_CONFIG) += config_data.o
 obj-$(CONFIG_CORE_PARKING) += core_parking.o
 obj-y += cpu.o
diff --git a/xen/common/boot_cpupools.c b/xen/common/boot_cpupools.c
new file mode 100644
index 000000000000..e8529a902d21
--- /dev/null
+++ b/xen/common/boot_cpupools.c
@@ -0,0 +1,212 @@
+/* SPDX-License-Identifier: GPL-2.0 */
+/*
+ * xen/common/boot_cpupools.c
+ *
+ * Code to create cpupools at boot time for arm architecture.
+ *
+ * Copyright (C) 2022 Arm Ltd.
+ */
+
+#include <xen/sched.h>
+
+#define BTCPUPOOLS_DT_NODE_NO_REG     (-1)
+#define BTCPUPOOLS_DT_NODE_NO_LOG_CPU (-2)
+
+struct pool_map {
+    int pool_id;
+    int sched_id;
+    struct cpupool *pool;
+};
+
+static struct pool_map __initdata pool_cpu_map[NR_CPUS] =
+    { [0 ... NR_CPUS-1] = {.pool_id = -1, .sched_id = -1, .pool = NULL} };
+static unsigned int __initdata next_pool_id;
+
+#ifdef CONFIG_ARM
+static int __init get_logical_cpu_from_hw_id(unsigned int hwid)
+{
+    unsigned int i;
+
+    for ( i = 0; i < nr_cpu_ids; i++ )
+        if ( cpu_logical_map(i) == hwid )
+            return i;
+
+    return -1;
+}
+
+static int __init
+get_logical_cpu_from_cpu_node(const struct dt_device_node *cpu_node)
+{
+    unsigned int cpu_reg, cpu_num;
+    const __be32 *prop;
+
+    prop = dt_get_property(cpu_node, "reg", NULL);
+    if ( !prop )
+        return BTCPUPOOLS_DT_NODE_NO_REG;
+
+    cpu_reg = dt_read_number(prop, dt_n_addr_cells(cpu_node));
+
+    cpu_num = get_logical_cpu_from_hw_id(cpu_reg);
+    if ( cpu_num < 0 )
+        return BTCPUPOOLS_DT_NODE_NO_LOG_CPU;
+
+    return cpu_num;
+}
+
+static int __init check_and_get_sched_id(const char* scheduler_name)
+{
+    int sched_id = sched_get_id_by_name(scheduler_name);
+
+    if ( sched_id < 0 )
+        panic("Scheduler %s does not exists!\n", scheduler_name);
+
+    return sched_id;
+}
+
+void __init btcpupools_dtb_parse(void)
+{
+    const struct dt_device_node *chosen, *node;
+
+    chosen = dt_find_node_by_path("/chosen");
+    if ( !chosen )
+        return;
+
+    dt_for_each_child_node(chosen, node)
+    {
+        const struct dt_device_node *phandle_node;
+        int sched_id = -1;
+        const char* scheduler_name;
+        unsigned int i = 0;
+
+        if ( !dt_device_is_compatible(node, "xen,cpupool") )
+            continue;
+
+        phandle_node = dt_parse_phandle(node, "cpupool-sched", 0);
+        if ( phandle_node )
+        {
+            if ( !dt_device_is_compatible(phandle_node, "xen,scheduler") )
+                panic("cpupool-sched must be a xen,scheduler compatible"
+                      "node!\n");
+            if ( !dt_property_read_string(phandle_node, "sched-name",
+                                          &scheduler_name) )
+                sched_id = check_and_get_sched_id(scheduler_name);
+            else
+                panic("Error trying to read sched-name in %s!\n",
+                      dt_node_name(phandle_node));
+        }
+
+        phandle_node = dt_parse_phandle(node, "cpupool-cpus", i++);
+        if ( !phandle_node )
+            panic("Missing or empty cpupool-cpus property!\n");
+
+        while ( phandle_node )
+        {
+            int cpu_num;
+
+            cpu_num = get_logical_cpu_from_cpu_node(phandle_node);
+
+            if ( cpu_num < 0 )
+                panic("Error retrieving logical cpu from node %s (%d)\n",
+                      dt_node_name(node), cpu_num);
+
+            if ( pool_cpu_map[cpu_num].pool_id != -1 )
+                panic("Logical cpu %d already added to a cpupool!\n", cpu_num);
+
+            pool_cpu_map[cpu_num].pool_id = next_pool_id;
+            pool_cpu_map[cpu_num].sched_id = sched_id;
+
+            phandle_node = dt_parse_phandle(node, "cpupool-cpus", i++);
+        }
+
+        /* Let Xen generate pool ids */
+        next_pool_id++;
+    }
+}
+#endif
+
+void __init btcpupools_allocate_pools(const cpumask_t *cpu_online_map)
+{
+    unsigned int cpu_num;
+
+    /*
+     * If there are no cpupools, the value of next_pool_id is zero, so the code
+     * below will assign every cpu to cpupool0 as the default behavior.
+     * When there are cpupools, the code below is assigning all the not
+     * assigned cpu to a new pool (next_pool_id value is the last id + 1).
+     * In the same loop we check if there is any assigned cpu that is not
+     * online.
+     */
+    for ( cpu_num = 0; cpu_num < nr_cpu_ids; cpu_num++ )
+        if ( cpumask_test_cpu(cpu_num, cpu_online_map) )
+        {
+            if ( pool_cpu_map[cpu_num].pool_id < 0 )
+                pool_cpu_map[cpu_num].pool_id = next_pool_id;
+        }
+        else
+            if ( pool_cpu_map[cpu_num].pool_id >= 0 )
+                panic("Pool-%d contains cpu%u that is not online!\n",
+                      pool_cpu_map[cpu_num].pool_id, cpu_num);
+
+#ifdef CONFIG_X86
+    /* Cpu0 must be in cpupool0 for x86 */
+    if ( pool_cpu_map[0].pool_id != 0 )
+    {
+        /* The cpupool containing cpu0 will become cpupool0 */
+        unsigned int swap_id = pool_cpu_map[0].pool_id;
+        for_each_cpu ( cpu_num, cpu_online_map )
+            if ( pool_cpu_map[cpu_num].pool_id == swap_id )
+                pool_cpu_map[cpu_num].pool_id = 0;
+            else if ( pool_cpu_map[cpu_num].pool_id == 0 )
+                pool_cpu_map[cpu_num].pool_id = swap_id;
+    }
+#endif
+
+    for_each_cpu ( cpu_num, cpu_online_map )
+    {
+        struct cpupool *pool = NULL;
+        int pool_id, sched_id;
+
+        pool_id = pool_cpu_map[cpu_num].pool_id;
+        sched_id = pool_cpu_map[cpu_num].sched_id;
+
+        if ( pool_id )
+        {
+            unsigned int i;
+
+            /* Look for previously created pool with id pool_id */
+            for ( i = 0; i < cpu_num; i++ )
+                if ( (pool_cpu_map[i].pool_id == pool_id) &&
+                     pool_cpu_map[i].pool )
+                {
+                    pool = pool_cpu_map[i].pool;
+                    break;
+                }
+
+            /* If no pool was created before, create it */
+            if ( !pool )
+                pool = cpupool_create_pool(pool_id, sched_id);
+            if ( !pool )
+                panic("Error creating pool id %u!\n", pool_id);
+        }
+        else
+            pool = cpupool0;
+
+        pool_cpu_map[cpu_num].pool = pool;
+        printk(XENLOG_INFO "Logical CPU %u in Pool-%u.\n", cpu_num, pool_id);
+    }
+}
+
+struct cpupool *__init btcpupools_get_cpupool(unsigned int cpu)
+{
+    return pool_cpu_map[cpu].pool;
+}
+
+/*
+ * Local variables:
+ * mode: C
+ * c-file-style: "BSD"
+ * c-basic-offset: 4
+ * tab-width: 4
+ * indent-tabs-mode: nil
+ * End:
+ */
diff --git a/xen/common/sched/cpupool.c b/xen/common/sched/cpupool.c
index 89a891af7076..b2495ad6d03e 100644
--- a/xen/common/sched/cpupool.c
+++ b/xen/common/sched/cpupool.c
@@ -1247,12 +1247,16 @@ static int __init cf_check cpupool_init(void)
     cpupool_put(cpupool0);
     register_cpu_notifier(&cpu_nfb);
 
+    btcpupools_dtb_parse();
+
+    btcpupools_allocate_pools(&cpu_online_map);
+
     spin_lock(&cpupool_lock);
 
     cpumask_copy(&cpupool_free_cpus, &cpu_online_map);
 
     for_each_cpu ( cpu, &cpupool_free_cpus )
-        cpupool_assign_cpu_locked(cpupool0, cpu);
+        cpupool_assign_cpu_locked(btcpupools_get_cpupool(cpu), cpu);
 
     spin_unlock(&cpupool_lock);
 
diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
index 2c10303f0187..de4e8feea399 100644
--- a/xen/include/xen/sched.h
+++ b/xen/include/xen/sched.h
@@ -1176,6 +1176,25 @@ extern void cf_check dump_runq(unsigned char key);
 
 void arch_do_physinfo(struct xen_sysctl_physinfo *pi);
 
+#ifdef CONFIG_BOOT_TIME_CPUPOOLS
+void btcpupools_allocate_pools(const cpumask_t *cpu_online_map);
+struct cpupool *btcpupools_get_cpupool(unsigned int cpu);
+
+#ifdef CONFIG_ARM
+void btcpupools_dtb_parse(void);
+#else
+static inline void btcpupools_dtb_parse(void) {}
+#endif
+
+#else
+static inline void btcpupools_allocate_pools(const cpumask_t *cpu_online_map) {}
+static inline void btcpupools_dtb_parse(void) {}
+static inline struct cpupool *btcpupools_get_cpupool(unsigned int cpu)
+{
+    return cpupool0;
+}
+#endif
+
 #endif /* __SCHED_H__ */
 
 /*
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 17:10:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 17:10:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288506.489256 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMJB-0002YS-Ay; Thu, 10 Mar 2022 17:10:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288506.489256; Thu, 10 Mar 2022 17:10:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMJB-0002YH-5O; Thu, 10 Mar 2022 17:10:37 +0000
Received: by outflank-mailman (input) for mailman id 288506;
 Thu, 10 Mar 2022 17:10:35 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5/tR=TV=arm.com=luca.fancellu@srs-se1.protection.inumbo.net>)
 id 1nSMJ9-0001pg-K0
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 17:10:35 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTP
 id f742fbd5-a094-11ec-853a-5f4723681683;
 Thu, 10 Mar 2022 18:10:20 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id E4EB71692;
 Thu, 10 Mar 2022 09:10:32 -0800 (PST)
Received: from e125770.cambridge.arm.com (e125770.cambridge.arm.com
 [10.1.195.16])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id B42F73F99C;
 Thu, 10 Mar 2022 09:10:31 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f742fbd5-a094-11ec-853a-5f4723681683
From: Luca Fancellu <luca.fancellu@arm.com>
To: xen-devel@lists.xenproject.org
Cc: wei.chen@arm.com,
	George Dunlap <george.dunlap@citrix.com>,
	Dario Faggioli <dfaggioli@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>
Subject: [PATCH v2 3/6] xen/sched: retrieve scheduler id by name
Date: Thu, 10 Mar 2022 17:10:16 +0000
Message-Id: <20220310171019.6170-4-luca.fancellu@arm.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220310171019.6170-1-luca.fancellu@arm.com>
References: <20220310171019.6170-1-luca.fancellu@arm.com>

Add a static function to retrieve the scheduler pointer using the
scheduler name.

Add a public function to retrieve the scheduler id by the scheduler
name that makes use of the new static function.

Take the occasion to replace open coded scheduler search with the
new static function in scheduler_init.

Signed-off-by: Luca Fancellu <luca.fancellu@arm.com>
---
Changes in v2:
- replace open coded scheduler search in scheduler_init (Juergen)
---
 xen/common/sched/core.c | 40 ++++++++++++++++++++++++++--------------
 xen/include/xen/sched.h | 11 +++++++++++
 2 files changed, 37 insertions(+), 14 deletions(-)

diff --git a/xen/common/sched/core.c b/xen/common/sched/core.c
index 19ab67818106..48ee01420fb8 100644
--- a/xen/common/sched/core.c
+++ b/xen/common/sched/core.c
@@ -2947,10 +2947,30 @@ void scheduler_enable(void)
     scheduler_active = true;
 }
 
+static inline
+const struct scheduler *__init sched_get_by_name(const char *sched_name)
+{
+    unsigned int i;
+
+    for ( i = 0; i < NUM_SCHEDULERS; i++ )
+        if ( schedulers[i] && !strcmp(schedulers[i]->opt_name, sched_name) )
+            return schedulers[i];
+
+    return NULL;
+}
+
+int __init sched_get_id_by_name(const char *sched_name)
+{
+    const struct scheduler *scheduler = sched_get_by_name(sched_name);
+
+    return scheduler ? scheduler->sched_id : -1;
+}
+
 /* Initialise the data structures. */
 void __init scheduler_init(void)
 {
     struct domain *idle_domain;
+    const struct scheduler *scheduler;
     int i;
 
     scheduler_enable();
@@ -2981,25 +3001,17 @@ void __init scheduler_init(void)
                    schedulers[i]->opt_name);
             schedulers[i] = NULL;
         }
-
-        if ( schedulers[i] && !ops.name &&
-             !strcmp(schedulers[i]->opt_name, opt_sched) )
-            ops = *schedulers[i];
     }
 
-    if ( !ops.name )
+    scheduler = sched_get_by_name(opt_sched);
+    if ( !scheduler )
     {
         printk("Could not find scheduler: %s\n", opt_sched);
-        for ( i = 0; i < NUM_SCHEDULERS; i++ )
-            if ( schedulers[i] &&
-                 !strcmp(schedulers[i]->opt_name, CONFIG_SCHED_DEFAULT) )
-            {
-                ops = *schedulers[i];
-                break;
-            }
-        BUG_ON(!ops.name);
-        printk("Using '%s' (%s)\n", ops.name, ops.opt_name);
+        scheduler = sched_get_by_name(CONFIG_SCHED_DEFAULT);
+        BUG_ON(!scheduler);
+        printk("Using '%s' (%s)\n", scheduler->name, scheduler->opt_name);
     }
+    ops = *scheduler;
 
     if ( cpu_schedule_up(0) )
         BUG();
diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
index 47fc856e0fe0..2c10303f0187 100644
--- a/xen/include/xen/sched.h
+++ b/xen/include/xen/sched.h
@@ -756,6 +756,17 @@ void sched_destroy_domain(struct domain *d);
 long sched_adjust(struct domain *, struct xen_domctl_scheduler_op *);
 long sched_adjust_global(struct xen_sysctl_scheduler_op *);
 int  sched_id(void);
+
+/*
+ * sched_get_id_by_name - retrieves a scheduler id given a scheduler name
+ * @sched_name: scheduler name as a string
+ *
+ * returns:
+ *     positive value being the scheduler id, on success
+ *     negative value if the scheduler name is not found.
+ */
+int sched_get_id_by_name(const char *sched_name);
+
 void vcpu_wake(struct vcpu *v);
 long vcpu_yield(void);
 void vcpu_sleep_nosync(struct vcpu *v);
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 17:10:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 17:10:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288508.489278 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMJE-000384-1d; Thu, 10 Mar 2022 17:10:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288508.489278; Thu, 10 Mar 2022 17:10:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMJD-00037e-R9; Thu, 10 Mar 2022 17:10:39 +0000
Received: by outflank-mailman (input) for mailman id 288508;
 Thu, 10 Mar 2022 17:10:38 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5/tR=TV=arm.com=luca.fancellu@srs-se1.protection.inumbo.net>)
 id 1nSMJC-0001lh-2m
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 17:10:38 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id 00d596e4-a095-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 18:10:36 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 554171692;
 Thu, 10 Mar 2022 09:10:36 -0800 (PST)
Received: from e125770.cambridge.arm.com (e125770.cambridge.arm.com
 [10.1.195.16])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 09C1C3F99C;
 Thu, 10 Mar 2022 09:10:34 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 00d596e4-a095-11ec-8eba-a37418f5ba1a
From: Luca Fancellu <luca.fancellu@arm.com>
To: xen-devel@lists.xenproject.org
Cc: wei.chen@arm.com,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>
Subject: [PATCH v2 5/6] arm/dom0less: assign dom0less guests to cpupools
Date: Thu, 10 Mar 2022 17:10:18 +0000
Message-Id: <20220310171019.6170-6-luca.fancellu@arm.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220310171019.6170-1-luca.fancellu@arm.com>
References: <20220310171019.6170-1-luca.fancellu@arm.com>

Introduce domain-cpupool property of a xen,domain device tree node,
that specifies the cpupool device tree handle of a xen,cpupool node
that identifies a cpupool created at boot time where the guest will
be assigned on creation.

Add member to the xen_domctl_createdomain public interface so the
XEN_DOMCTL_INTERFACE_VERSION version is bumped.

Add public function to retrieve a pool id from the device tree
cpupool node.

Update documentation about the property.

Signed-off-by: Luca Fancellu <luca.fancellu@arm.com>
---
Changes in v2:
- Moved cpupool_id from arch specific to common part (Juergen)
- Implemented functions to retrieve the cpupool id from the
  cpupool dtb node.
---
 docs/misc/arm/device-tree/booting.txt |  5 +++++
 xen/arch/arm/domain_build.c           | 14 +++++++++++++-
 xen/common/boot_cpupools.c            | 24 ++++++++++++++++++++++++
 xen/common/domain.c                   |  2 +-
 xen/include/public/domctl.h           |  4 +++-
 xen/include/xen/sched.h               |  9 +++++++++
 6 files changed, 55 insertions(+), 3 deletions(-)

diff --git a/docs/misc/arm/device-tree/booting.txt b/docs/misc/arm/device-tree/booting.txt
index a94125394e35..7b4a29a2c293 100644
--- a/docs/misc/arm/device-tree/booting.txt
+++ b/docs/misc/arm/device-tree/booting.txt
@@ -188,6 +188,11 @@ with the following properties:
     An empty property to request the memory of the domain to be
     direct-map (guest physical address == physical address).
 
+- domain-cpupool
+
+    Optional. Handle to a xen,cpupool device tree node that identifies the
+    cpupool where the guest will be started at boot.
+
 Under the "xen,domain" compatible node, one or more sub-nodes are present
 for the DomU kernel and ramdisk.
 
diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index 8be01678de05..9c67a483d4a4 100644
--- a/xen/arch/arm/domain_build.c
+++ b/xen/arch/arm/domain_build.c
@@ -3172,7 +3172,8 @@ static int __init construct_domU(struct domain *d,
 void __init create_domUs(void)
 {
     struct dt_device_node *node;
-    const struct dt_device_node *chosen = dt_find_node_by_path("/chosen");
+    const struct dt_device_node *cpupool_node,
+                                *chosen = dt_find_node_by_path("/chosen");
 
     BUG_ON(chosen == NULL);
     dt_for_each_child_node(chosen, node)
@@ -3241,6 +3242,17 @@ void __init create_domUs(void)
                                          vpl011_virq - 32 + 1);
         }
 
+        /* Get the optional property domain-cpupool */
+        cpupool_node = dt_parse_phandle(node, "domain-cpupool", 0);
+        if ( cpupool_node )
+        {
+            int pool_id = btcpupools_get_domain_pool_id(cpupool_node);
+            if ( pool_id < 0 )
+                panic("Error getting cpupool id from domain-cpupool (%d)\n",
+                      pool_id);
+            d_cfg.cpupool_id = pool_id;
+        }
+
         /*
          * The variable max_init_domid is initialized with zero, so here it's
          * very important to use the pre-increment operator to call
diff --git a/xen/common/boot_cpupools.c b/xen/common/boot_cpupools.c
index e8529a902d21..01a69f894f14 100644
--- a/xen/common/boot_cpupools.c
+++ b/xen/common/boot_cpupools.c
@@ -11,6 +11,8 @@
 
 #define BTCPUPOOLS_DT_NODE_NO_REG     (-1)
 #define BTCPUPOOLS_DT_NODE_NO_LOG_CPU (-2)
+#define BTCPUPOOLS_DT_WRONG_NODE      (-3)
+#define BTCPUPOOLS_DT_CORRUPTED_NODE  (-4)
 
 struct pool_map {
     int pool_id;
@@ -53,6 +55,28 @@ get_logical_cpu_from_cpu_node(const struct dt_device_node *cpu_node)
     return cpu_num;
 }
 
+int __init btcpupools_get_domain_pool_id(const struct dt_device_node *node)
+{
+    const struct dt_device_node *phandle_node;
+    int cpu_num;
+
+    if ( !dt_device_is_compatible(node, "xen,cpupool") )
+        return BTCPUPOOLS_DT_WRONG_NODE;
+    /*
+     * Get first cpu listed in the cpupool, from its reg it's possible to
+     * retrieve the cpupool id.
+     */
+    phandle_node = dt_parse_phandle(node, "cpupool-cpus", 0);
+    if ( !phandle_node )
+        return BTCPUPOOLS_DT_CORRUPTED_NODE;
+
+    cpu_num = get_logical_cpu_from_cpu_node(phandle_node);
+    if ( cpu_num < 0 )
+        return cpu_num;
+
+    return pool_cpu_map[cpu_num].pool_id;
+}
+
 static int __init check_and_get_sched_id(const char* scheduler_name)
 {
     int sched_id = sched_get_id_by_name(scheduler_name);
diff --git a/xen/common/domain.c b/xen/common/domain.c
index 351029f8b239..0827400f4f49 100644
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -698,7 +698,7 @@ struct domain *domain_create(domid_t domid,
         if ( !d->pbuf )
             goto fail;
 
-        if ( (err = sched_init_domain(d, 0)) != 0 )
+        if ( (err = sched_init_domain(d, config->cpupool_id)) != 0 )
             goto fail;
 
         if ( (err = late_hwdom_init(d)) != 0 )
diff --git a/xen/include/public/domctl.h b/xen/include/public/domctl.h
index b85e6170b0aa..3d431a8031fd 100644
--- a/xen/include/public/domctl.h
+++ b/xen/include/public/domctl.h
@@ -38,7 +38,7 @@
 #include "hvm/save.h"
 #include "memory.h"
 
-#define XEN_DOMCTL_INTERFACE_VERSION 0x00000014
+#define XEN_DOMCTL_INTERFACE_VERSION 0x00000015
 
 /*
  * NB. xen_domctl.domain is an IN/OUT parameter for this operation.
@@ -106,6 +106,8 @@ struct xen_domctl_createdomain {
     /* Per-vCPU buffer size in bytes.  0 to disable. */
     uint32_t vmtrace_size;
 
+    unsigned int cpupool_id;
+
     struct xen_arch_domainconfig arch;
 };
 
diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
index de4e8feea399..30a6538452bc 100644
--- a/xen/include/xen/sched.h
+++ b/xen/include/xen/sched.h
@@ -1182,6 +1182,7 @@ struct cpupool *btcpupools_get_cpupool(unsigned int cpu);
 
 #ifdef CONFIG_ARM
 void btcpupools_dtb_parse(void);
+int btcpupools_get_domain_pool_id(const struct dt_device_node *node);
 #else
 static inline void btcpupools_dtb_parse(void) {}
 #endif
@@ -1193,6 +1194,14 @@ static inline struct cpupool *btcpupools_get_cpupool(unsigned int cpu)
 {
     return cpupool0;
 }
+#ifdef CONFIG_ARM
+static inline int
+btcpupools_get_domain_pool_id(const struct dt_device_node *node)
+{
+    return 0;
+}
+#endif
+
 #endif
 
 #endif /* __SCHED_H__ */
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 17:10:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 17:10:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288509.489289 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMJF-0003Si-Kj; Thu, 10 Mar 2022 17:10:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288509.489289; Thu, 10 Mar 2022 17:10:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMJF-0003Rn-CK; Thu, 10 Mar 2022 17:10:41 +0000
Received: by outflank-mailman (input) for mailman id 288509;
 Thu, 10 Mar 2022 17:10:39 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5/tR=TV=arm.com=luca.fancellu@srs-se1.protection.inumbo.net>)
 id 1nSMJD-0001lh-M3
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 17:10:39 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id 01db4491-a095-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 18:10:38 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id D93E716A3;
 Thu, 10 Mar 2022 09:10:37 -0800 (PST)
Received: from e125770.cambridge.arm.com (e125770.cambridge.arm.com
 [10.1.195.16])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 8DDC13F99C;
 Thu, 10 Mar 2022 09:10:36 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 01db4491-a095-11ec-8eba-a37418f5ba1a
From: Luca Fancellu <luca.fancellu@arm.com>
To: xen-devel@lists.xenproject.org
Cc: wei.chen@arm.com,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Juergen Gross <jgross@suse.com>,
	Dario Faggioli <dfaggioli@suse.com>
Subject: [PATCH v2 6/6] xen/cpupool: Allow cpupool0 to use different scheduler
Date: Thu, 10 Mar 2022 17:10:19 +0000
Message-Id: <20220310171019.6170-7-luca.fancellu@arm.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220310171019.6170-1-luca.fancellu@arm.com>
References: <20220310171019.6170-1-luca.fancellu@arm.com>

Currently cpupool0 can use only the default scheduler, and
cpupool_create has an harcoded behavior when creating the pool 0
that doesn't allocate new memory for the scheduler, but uses the
default scheduler structure in memory.

With this commit it is possible to allocate a different scheduler for
the cpupool0 when using the boot time cpupool.
To achieve this the hardcoded behavior in cpupool_create is removed
and the cpupool0 creation is moved.

When compiling without boot time cpupools enabled, the current
behavior is maintained (except that cpupool0 scheduler memory will be
allocated).

Signed-off-by: Luca Fancellu <luca.fancellu@arm.com>
---
Changes in v2:
- new patch
---
 xen/common/boot_cpupools.c | 39 ++++++++++++++++++--------------------
 xen/common/sched/cpupool.c |  8 +-------
 xen/include/xen/sched.h    |  5 ++++-
 3 files changed, 23 insertions(+), 29 deletions(-)

diff --git a/xen/common/boot_cpupools.c b/xen/common/boot_cpupools.c
index 01a69f894f14..a8ae8c5b7852 100644
--- a/xen/common/boot_cpupools.c
+++ b/xen/common/boot_cpupools.c
@@ -189,31 +189,28 @@ void __init btcpupools_allocate_pools(const cpumask_t *cpu_online_map)
     {
         struct cpupool *pool = NULL;
         int pool_id, sched_id;
+        unsigned int i;
 
         pool_id = pool_cpu_map[cpu_num].pool_id;
         sched_id = pool_cpu_map[cpu_num].sched_id;
 
-        if ( pool_id )
-        {
-            unsigned int i;
-
-            /* Look for previously created pool with id pool_id */
-            for ( i = 0; i < cpu_num; i++ )
-                if ( (pool_cpu_map[i].pool_id == pool_id) &&
-                     pool_cpu_map[i].pool )
-                {
-                    pool = pool_cpu_map[i].pool;
-                    break;
-                }
-
-            /* If no pool was created before, create it */
-            if ( !pool )
-                pool = cpupool_create_pool(pool_id, sched_id);
-            if ( !pool )
-                panic("Error creating pool id %u!\n", pool_id);
-        }
-        else
-            pool = cpupool0;
+        /* Look for previously created pool with id pool_id */
+        for ( i = 0; i < cpu_num; i++ )
+            if ( (pool_cpu_map[i].pool_id == pool_id) && pool_cpu_map[i].pool )
+            {
+                pool = pool_cpu_map[i].pool;
+                break;
+            }
+
+        /* If no pool was created before, create it */
+        if ( !pool )
+            pool = cpupool_create_pool(pool_id, sched_id);
+        if ( !pool )
+            panic("Error creating pool id %u!\n", pool_id);
+
+        /* Keep track of cpupool id 0 with the global cpupool0 */
+        if ( !pool_id )
+            cpupool0 = pool;
 
         pool_cpu_map[cpu_num].pool = pool;
         printk(XENLOG_INFO "Logical CPU %u in Pool-%u.\n", cpu_num, pool_id);
diff --git a/xen/common/sched/cpupool.c b/xen/common/sched/cpupool.c
index b2495ad6d03e..3d458a4932b2 100644
--- a/xen/common/sched/cpupool.c
+++ b/xen/common/sched/cpupool.c
@@ -312,10 +312,7 @@ static struct cpupool *cpupool_create(unsigned int poolid,
         c->cpupool_id = q->cpupool_id + 1;
     }
 
-    if ( poolid == 0 )
-        c->sched = scheduler_get_default();
-    else
-        c->sched = scheduler_alloc(sched_id);
+    c->sched = scheduler_alloc(sched_id);
     if ( IS_ERR(c->sched) )
     {
         ret = PTR_ERR(c->sched);
@@ -1242,9 +1239,6 @@ static int __init cf_check cpupool_init(void)
 
     cpupool_hypfs_init();
 
-    cpupool0 = cpupool_create(0, 0);
-    BUG_ON(IS_ERR(cpupool0));
-    cpupool_put(cpupool0);
     register_cpu_notifier(&cpu_nfb);
 
     btcpupools_dtb_parse();
diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
index 30a6538452bc..4007a3df4c1c 100644
--- a/xen/include/xen/sched.h
+++ b/xen/include/xen/sched.h
@@ -1188,7 +1188,10 @@ static inline void btcpupools_dtb_parse(void) {}
 #endif
 
 #else
-static inline void btcpupools_allocate_pools(const cpumask_t *cpu_online_map) {}
+static inline void btcpupools_allocate_pools(const cpumask_t *cpu_online_map)
+{
+    cpupool0 = cpupool_create_pool(0, -1);
+}
 static inline void btcpupools_dtb_parse(void) {}
 static inline struct cpupool *btcpupools_get_cpupool(unsigned int cpu)
 {
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 17:23:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 17:23:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288535.489300 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMVN-0006rn-P5; Thu, 10 Mar 2022 17:23:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288535.489300; Thu, 10 Mar 2022 17:23:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMVN-0006rg-Li; Thu, 10 Mar 2022 17:23:13 +0000
Received: by outflank-mailman (input) for mailman id 288535;
 Thu, 10 Mar 2022 17:23:13 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=UgV8=TV=amazon.de=prvs=06149a43a=doebel@srs-se1.protection.inumbo.net>)
 id 1nSMVM-0006ra-Cq
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 17:23:13 +0000
Received: from smtp-fw-9103.amazon.com (smtp-fw-9103.amazon.com
 [207.171.188.200]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id c1264e60-a096-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 18:23:10 +0100 (CET)
Received: from pdx4-co-svc-p1-lb2-vlan2.amazon.com (HELO
 email-inbound-relay-pdx-2a-92ba9394.us-west-2.amazon.com) ([10.25.36.210])
 by smtp-border-fw-9103.sea19.amazon.com with ESMTP; 10 Mar 2022 17:22:53 +0000
Received: from EX13D03EUC002.ant.amazon.com
 (pdx1-ws-svc-p6-lb9-vlan3.pdx.amazon.com [10.236.137.198])
 by email-inbound-relay-pdx-2a-92ba9394.us-west-2.amazon.com (Postfix) with
 ESMTPS id 07982418BD; Thu, 10 Mar 2022 17:22:53 +0000 (UTC)
Received: from [192.168.12.40] (10.43.164.135) by EX13D03EUC002.ant.amazon.com
 (10.43.164.60) with Microsoft SMTP Server (TLS) id 15.0.1497.32;
 Thu, 10 Mar 2022 17:22:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c1264e60-a096-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646932990; x=1678468990;
  h=message-id:date:mime-version:to:cc:references:from:
   in-reply-to:content-transfer-encoding:subject;
  bh=PeRJ7Dq1zgla7eS4PsRQ+YK72cKN0uZOKASSXsgkSs8=;
  b=aPXr+dritpvjKu7rVk6wYKSTUTPD2b7GYG99pBPTyAebTpp3glezZ2jT
   2ln/sBLA6Nv1QCR6pcHX5apBkKNGLd5JJCJkZb+3b1dAhI3rIwoV+jKtM
   eVSuy9xzz9NDvVigEwY/vr19kH8GCVD7hfj+dmxBmAUT6fcyLWadfbyhX
   k=;
X-IronPort-AV: E=Sophos;i="5.90,171,1643673600"; 
   d="scan'208";a="998292950"
Subject: Re: [PATCH 1/3] livepatch: use basename to perform object file matching
Message-ID: <5134560e-ef03-fc37-2234-87186f391d8e@amazon.de>
Date: Thu, 10 Mar 2022 18:22:50 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Content-Language: en-US
To: Roger Pau Monne <roger.pau@citrix.com>, <xen-devel@lists.xenproject.org>
CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>, Ross Lagerwall
	<ross.lagerwall@citrix.com>
References: <20220310150834.98815-1-roger.pau@citrix.com>
 <20220310150834.98815-2-roger.pau@citrix.com>
From: "Doebel, Bjoern" <doebel@amazon.de>
In-Reply-To: <20220310150834.98815-2-roger.pau@citrix.com>
X-Originating-IP: [10.43.164.135]
X-ClientProxiedBy: EX13D20EUC003.ant.amazon.com (10.43.164.190) To
 EX13D03EUC002.ant.amazon.com (10.43.164.60)
Precedence: Bulk
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: base64
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=



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 17:23:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 17:23:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288539.489311 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMW2-0007OZ-2f; Thu, 10 Mar 2022 17:23:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288539.489311; Thu, 10 Mar 2022 17:23:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMW1-0007OS-Us; Thu, 10 Mar 2022 17:23:53 +0000
Received: by outflank-mailman (input) for mailman id 288539;
 Thu, 10 Mar 2022 17:23:52 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=UgV8=TV=amazon.de=prvs=06149a43a=doebel@srs-se1.protection.inumbo.net>)
 id 1nSMW0-0007FA-MH
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 17:23:52 +0000
Received: from smtp-fw-80006.amazon.com (smtp-fw-80006.amazon.com
 [99.78.197.217]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d9662771-a096-11ec-853a-5f4723681683;
 Thu, 10 Mar 2022 18:23:51 +0100 (CET)
Received: from pdx4-co-svc-p1-lb2-vlan3.amazon.com (HELO
 email-inbound-relay-pdx-2c-9ec26c6c.us-west-2.amazon.com) ([10.25.36.214])
 by smtp-border-fw-80006.pdx80.corp.amazon.com with ESMTP;
 10 Mar 2022 17:23:25 +0000
Received: from EX13D03EUC002.ant.amazon.com
 (pdx1-ws-svc-p6-lb9-vlan2.pdx.amazon.com [10.236.137.194])
 by email-inbound-relay-pdx-2c-9ec26c6c.us-west-2.amazon.com (Postfix) with
 ESMTPS id E7BC241D5A; Thu, 10 Mar 2022 17:23:21 +0000 (UTC)
Received: from [192.168.12.40] (10.43.164.135) by EX13D03EUC002.ant.amazon.com
 (10.43.164.60) with Microsoft SMTP Server (TLS) id 15.0.1497.32;
 Thu, 10 Mar 2022 17:23:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d9662771-a096-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646933032; x=1678469032;
  h=message-id:date:mime-version:to:cc:references:from:
   in-reply-to:content-transfer-encoding:subject;
  bh=4J05hkN6PUyYitnjc70uysTJgw/K2IYClOWPuN9u/Rs=;
  b=E5v1PfqoLAitYrYnbLvtswQjb3hGAmejsT+i0jO+wyTXU5i8+Cyif0Hf
   fXVZIdY/GKSwhnjme6VhkYaG4sXdl4AN/4yM00rMlXQyIN5vMRz/drgsU
   q2Mz03VXXS5qa2m5Bm7pNvUL3yKarE1yFQRXyFsDcsps3BaGSej2JRtzi
   I=;
X-IronPort-AV: E=Sophos;i="5.90,171,1643673600"; 
   d="scan'208";a="69705549"
Subject: Re: [PATCH 2/3] livepatch: add extra efi/ objects to be ignored
Message-ID: <7f8c3908-67c6-fd6d-a8c6-8f86562625d6@amazon.de>
Date: Thu, 10 Mar 2022 18:23:19 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Content-Language: en-US
To: Roger Pau Monne <roger.pau@citrix.com>, <xen-devel@lists.xenproject.org>
CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>, Ross Lagerwall
	<ross.lagerwall@citrix.com>
References: <20220310150834.98815-1-roger.pau@citrix.com>
 <20220310150834.98815-3-roger.pau@citrix.com>
From: "Doebel, Bjoern" <doebel@amazon.de>
In-Reply-To: <20220310150834.98815-3-roger.pau@citrix.com>
X-Originating-IP: [10.43.164.135]
X-ClientProxiedBy: EX13D53EUC001.ant.amazon.com (10.43.164.183) To
 EX13D03EUC002.ant.amazon.com (10.43.164.60)
Precedence: Bulk
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: base64
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From xen-devel-bounces@lists.xenproject.org Thu Mar 10 17:26:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 17:26:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288543.489322 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMYN-00084p-EF; Thu, 10 Mar 2022 17:26:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288543.489322; Thu, 10 Mar 2022 17:26:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMYN-00084i-BD; Thu, 10 Mar 2022 17:26:19 +0000
Received: by outflank-mailman (input) for mailman id 288543;
 Thu, 10 Mar 2022 17:26:17 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=UgV8=TV=amazon.de=prvs=06149a43a=doebel@srs-se1.protection.inumbo.net>)
 id 1nSMYL-00084H-MK
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 17:26:17 +0000
Received: from smtp-fw-80007.amazon.com (smtp-fw-80007.amazon.com
 [99.78.197.218]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2fbc8256-a097-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 18:26:16 +0100 (CET)
Received: from pdx4-co-svc-p1-lb2-vlan2.amazon.com (HELO
 email-inbound-relay-pdx-2c-34cb9e7b.us-west-2.amazon.com) ([10.25.36.210])
 by smtp-border-fw-80007.pdx80.corp.amazon.com with ESMTP;
 10 Mar 2022 17:25:56 +0000
Received: from EX13D03EUC002.ant.amazon.com
 (pdx1-ws-svc-p6-lb9-vlan2.pdx.amazon.com [10.236.137.194])
 by email-inbound-relay-pdx-2c-34cb9e7b.us-west-2.amazon.com (Postfix) with
 ESMTPS id 763E041DA7; Thu, 10 Mar 2022 17:25:54 +0000 (UTC)
Received: from [192.168.12.40] (10.43.164.135) by EX13D03EUC002.ant.amazon.com
 (10.43.164.60) with Microsoft SMTP Server (TLS) id 15.0.1497.32;
 Thu, 10 Mar 2022 17:25:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2fbc8256-a097-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646933177; x=1678469177;
  h=message-id:date:mime-version:to:cc:references:from:
   in-reply-to:content-transfer-encoding:subject;
  bh=x6WYQsFkxLGBkdR9D+/rLg8pEwwCQoCKyJJ6C4u2OHo=;
  b=CFlofUq1dKJI7FlUhCsrVWW/Wf87+bY4z4rUIvtWzn6znV8jmc3kW1MZ
   PmI1CDHjEhfDON2J6DbJhHrtTDr3+iHe0CkS5QVnWnWvxEamz5aAfZhjq
   jtthihPLxIRNhgMY0Q0oFa3COFNowRqcKopP/x+h5gNnMzhKW5H4QwnsR
   c=;
X-IronPort-AV: E=Sophos;i="5.90,171,1643673600"; 
   d="scan'208";a="69734144"
Subject: Re: [PATCH 3/3] livepatch: correctly handle altinstruction sections
Message-ID: <e64f2475-e06b-c908-d719-4dec319af099@amazon.de>
Date: Thu, 10 Mar 2022 18:25:51 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Content-Language: en-US
To: Roger Pau Monne <roger.pau@citrix.com>, <xen-devel@lists.xenproject.org>
CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>, Ross Lagerwall
	<ross.lagerwall@citrix.com>
References: <20220310150834.98815-1-roger.pau@citrix.com>
 <20220310150834.98815-4-roger.pau@citrix.com>
From: "Doebel, Bjoern" <doebel@amazon.de>
In-Reply-To: <20220310150834.98815-4-roger.pau@citrix.com>
X-Originating-IP: [10.43.164.135]
X-ClientProxiedBy: EX13D17EUC004.ant.amazon.com (10.43.164.212) To
 EX13D03EUC002.ant.amazon.com (10.43.164.60)
Precedence: Bulk
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: base64

CgpPbiAxMC4wMy4yMiAxNjowOCwgUm9nZXIgUGF1IE1vbm5lIHdyb3RlOgo+IENBVVRJT046IFRo
aXMgZW1haWwgb3JpZ2luYXRlZCBmcm9tIG91dHNpZGUgb2YgdGhlIG9yZ2FuaXphdGlvbi4gRG8g
bm90IGNsaWNrIGxpbmtzIG9yIG9wZW4gYXR0YWNobWVudHMgdW5sZXNzIHlvdSBjYW4gY29uZmly
bSB0aGUgc2VuZGVyIGFuZCBrbm93IHRoZSBjb250ZW50IGlzIHNhZmUuCj4gCj4gCj4gCj4gVGhl
IGN1cnJlbnQgaGFuZGxpbmcgb2YgYWx0aW5zdHJ1Y3Rpb25zIHNlY3Rpb25zIGJ5IHRoZSBsaXZl
cGF0Y2gKPiB0b29scyBpcyBpbmNvcnJlY3QsIGFzIG9uIFhlbiB0aG9zZSBzZWN0aW9ucyBhcmUg
cGFydCBvZiAuaW5pdCBhbmQKPiB0aHVzIGRpc2NhcmRlZCBhZnRlciBsb2FkLiBDb3JyZWN0bHkg
aGFuZGxlIHRoZW0gYnkganVzdCBpZ25vcmluZywgYXMKPiBpdCdzIGRvbmUgd2l0aCBvdGhlciAu
aW5pdCByZWxhdGVkIHNlY3Rpb25zLgo+IAo+IFdoaWxlIHRoZXJlIGFsc28gYWRkIC5kYXRhLnJv
X2FmdGVyX2luaXQgc2VjdGlvbiBhcyBhIHJlYWQtb25seQo+IHNlY3Rpb24gYW5kIGludHJvZHVj
ZSBzb21lIHN5bnRhY3RpYyBzdWdhciBmb3IgY29tcGFyaW5nIHNlY3Rpb24KPiBuYW1lcy4KPiAK
PiBTaWduZWQtb2ZmLWJ5OiBSb2dlciBQYXUgTW9ubsOpIDxyb2dlci5wYXVAY2l0cml4LmNvbT4K
PiAtLS0KPiBJIGFzc3VtZSB0aGlzIGhhbmRsaW5nIG9mIC5hbHRpbnN0ciogc2VjdGlvbnMgd2Fz
IGluaGVyaXRlZCBmcm9tIExpbnV4Cj4gd2hlcmUgdGhlIHNlY3Rpb25zIGFyZSBub3QgZGlzY2Fy
ZGVkIGFmdGVyIGxvYWQgaW4gb3JkZXIgdG8gYXBwbHkKPiBhbHRlcm5hdGl2ZSBwYXRjaGluZyB0
byB0aGUgbG9hZGVkIG1vZHVsZXMgYWZ0ZXIgYm9vdC4KPiAtLS0KPiAgIGNvbW1vbi5jICAgICAg
ICAgICAgIHwgIDcgKysrKystLQo+ICAgY3JlYXRlLWRpZmYtb2JqZWN0LmMgfCAyNiAtLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLQo+ICAgMiBmaWxlcyBjaGFuZ2VkLCA1IGluc2VydGlvbnMoKyks
IDI4IGRlbGV0aW9ucygtKQo+IAo+IGRpZmYgLS1naXQgYS9jb21tb24uYyBiL2NvbW1vbi5jCj4g
aW5kZXggNjhhNzFmNy4uYTE0OGQ4YSAxMDA2NDQKPiAtLS0gYS9jb21tb24uYwo+ICsrKyBiL2Nv
bW1vbi5jCj4gQEAgLTI0OSwxOSArMjQ5LDIyIEBAIGludCBpc190ZXh0X3NlY3Rpb24oc3RydWN0
IHNlY3Rpb24gKnNlYykKPiAgICAgICAgICAgICAgICAgIChzZWMtPnNoLnNoX2ZsYWdzICYgU0hG
X0VYRUNJTlNUUikpOwo+ICAgfQo+IAo+ICsjZGVmaW5lIFNFQ19NQVRDSChuKSAhc3RybmNtcChz
ZWMtPm5hbWUsIG4sIHN0cmxlbihuKSAtIDEpCj4gICBpbnQgaXNfcm9kYXRhX3NlY3Rpb24oc3Ry
dWN0IHNlY3Rpb24gKnNlYykKPiAgIHsKPiAgICAgICAgICByZXR1cm4gc2VjLT5zaC5zaF90eXBl
ID09IFNIVF9QUk9HQklUUyAmJgo+ICAgICAgICAgICAgICAgICAhKHNlYy0+c2guc2hfZmxhZ3Mg
JiAoU0hGX0VYRUNJTlNUUiB8IFNIRl9XUklURSkpICYmCj4gLSAgICAgICAgICAgICAgIXN0cm5j
bXAoc2VjLT5uYW1lLCAiLnJvZGF0YSIsIDcpOwo+ICsgICAgICAgICAgICAgIChTRUNfTUFUQ0go
Ii5yb2RhdGEiKSB8fCBTRUNfTUFUQ0goIi5kYXRhLnJvX2FmdGVyX2luaXQiKSk7Cj4gICB9Cj4g
Cj4gICBpbnQgaXNfaW5pdF9zZWN0aW9uKHN0cnVjdCBzZWN0aW9uICpzZWMpCj4gICB7Cj4gICAg
ICAgICAgcmV0dXJuIHNlYy0+c2guc2hfdHlwZSA9PSBTSFRfUFJPR0JJVFMgJiYKPiAgICAgICAg
ICAgICAgICAgKHNlYy0+c2guc2hfZmxhZ3MgJiBTSEZfQUxMT0MpICYmCj4gLSAgICAgICAgICAg
ICAgIXN0cm5jbXAoc2VjLT5uYW1lLCAiLmluaXQiLCA1KTsKPiArICAgICAgICAgICAgICAoU0VD
X01BVENIKCIuaW5pdCIpIHx8IFNFQ19NQVRDSCgiLnRleHQuc3RhcnR1cCIpIHx8Cj4gKyAgICAg
ICAgICAgICAgIFNFQ19NQVRDSCgiLmFsdGluc3RyIikgfHwgU0VDX01BVENIKCIuY3RvcnMiKSk7
Cj4gICB9Cj4gKyN1bmRlZiBTRUNfTUFUQ0gKPiAKPiAgIGludCBpc19kZWJ1Z19zZWN0aW9uKHN0
cnVjdCBzZWN0aW9uICpzZWMpCj4gICB7Cj4gZGlmZiAtLWdpdCBhL2NyZWF0ZS1kaWZmLW9iamVj
dC5jIGIvY3JlYXRlLWRpZmYtb2JqZWN0LmMKPiBpbmRleCBhNTE2NjcwLi5lYzJhZmI0IDEwMDY0
NAo+IC0tLSBhL2NyZWF0ZS1kaWZmLW9iamVjdC5jCj4gKysrIGIvY3JlYXRlLWRpZmYtb2JqZWN0
LmMKPiBAQCAtOTk1LDE5ICs5OTUsNiBAQCBzdGF0aWMgaW50IGV4X3RhYmxlX2dyb3VwX3NpemUo
c3RydWN0IGtwYXRjaF9lbGYgKmtlbGYsIGludCBvZmZzZXQpCj4gICAgICAgICAgcmV0dXJuIHNp
emU7Cj4gICB9Cj4gCj4gLXN0YXRpYyBpbnQgYWx0aW5zdHJ1Y3Rpb25zX2dyb3VwX3NpemUoc3Ry
dWN0IGtwYXRjaF9lbGYgKmtlbGYsIGludCBvZmZzZXQpCj4gLXsKPiAtICAgICAgIHN0YXRpYyBp
bnQgc2l6ZSA9IDA7Cj4gLSAgICAgICBjaGFyICpzdHI7Cj4gLSAgICAgICBpZiAoIXNpemUpIHsK
PiAtICAgICAgICAgICAgICAgc3RyID0gZ2V0ZW52KCJBTFRfU1RSVUNUX1NJWkUiKTsKPiAtICAg
ICAgICAgICAgICAgc2l6ZSA9IHN0ciA/IGF0b2koc3RyKSA6IDEyOwo+IC0gICAgICAgfQo+IC0K
PiAtICAgICAgIGxvZ19kZWJ1ZygiYWx0aW5zdHJfc2l6ZT0lZFxuIiwgc2l6ZSk7Cj4gLSAgICAg
ICByZXR1cm4gc2l6ZTsKPiAtfQo+IC0KPiAgIHN0YXRpYyBpbnQgbGl2ZXBhdGNoX2hvb2tzX2dy
b3VwX3NpemUoc3RydWN0IGtwYXRjaF9lbGYgKmtlbGYsIGludCBvZmZzZXQpCj4gICB7Cj4gICAg
ICAgICAgc3RhdGljIGludCBzaXplID0gMDsKPiBAQCAtMTAyMSwxMSArMTAwOCw2IEBAIHN0YXRp
YyBpbnQgbGl2ZXBhdGNoX2hvb2tzX2dyb3VwX3NpemUoc3RydWN0IGtwYXRjaF9lbGYgKmtlbGYs
IGludCBvZmZzZXQpCj4gICAgICAgICAgcmV0dXJuIHNpemU7Cj4gICB9Cj4gCj4gLXN0YXRpYyBp
bnQgdW5kZWZpbmVkX2dyb3VwX3NpemUoc3RydWN0IGtwYXRjaF9lbGYgKmtlbGYsIGludCBvZmZz
ZXQpCj4gLXsKPiAtICAgICAgIHJldHVybiAwOwo+IC19Cj4gLQo+ICAgLyoKPiAgICAqIFRoZSBy
ZWxhIGdyb3VwcyBpbiB0aGUgLmZpeHVwIHNlY3Rpb24gdmFyeSBpbiBzaXplLiAgVGhlIGJlZ2lu
bmluZyBvZiBlYWNoCj4gICAgKiAuZml4dXAgcmVsYSBncm91cCBpcyByZWZlcmVuY2VkIGJ5IHRo
ZSAuZXhfdGFibGUgc2VjdGlvbi4gVG8gZmluZCB0aGUgc2l6ZQo+IEBAIC0xMDk5LDE0ICsxMDgx
LDYgQEAgc3RhdGljIHN0cnVjdCBzcGVjaWFsX3NlY3Rpb24gc3BlY2lhbF9zZWN0aW9uc1tdID0g
ewo+ICAgICAgICAgICAgICAgICAgLm5hbWUgICAgICAgICAgID0gIi5leF90YWJsZSIsCj4gICAg
ICAgICAgICAgICAgICAuZ3JvdXBfc2l6ZSAgICAgPSBleF90YWJsZV9ncm91cF9zaXplLAo+ICAg
ICAgICAgIH0sCj4gLSAgICAgICB7Cj4gLSAgICAgICAgICAgICAgIC5uYW1lICAgICAgICAgICA9
ICIuYWx0aW5zdHJ1Y3Rpb25zIiwKPiAtICAgICAgICAgICAgICAgLmdyb3VwX3NpemUgICAgID0g
YWx0aW5zdHJ1Y3Rpb25zX2dyb3VwX3NpemUsCj4gLSAgICAgICB9LAo+IC0gICAgICAgewo+IC0g
ICAgICAgICAgICAgICAubmFtZSAgICAgICAgICAgPSAiLmFsdGluc3RyX3JlcGxhY2VtZW50IiwK
PiAtICAgICAgICAgICAgICAgLmdyb3VwX3NpemUgICAgID0gdW5kZWZpbmVkX2dyb3VwX3NpemUs
Cj4gLSAgICAgICB9LAo+ICAgICAgICAgIHsKPiAgICAgICAgICAgICAgICAgIC5uYW1lICAgICAg
ICAgICA9ICIubGl2ZXBhdGNoLmhvb2tzLmxvYWQiLAo+ICAgICAgICAgICAgICAgICAgLmdyb3Vw
X3NpemUgICAgID0gbGl2ZXBhdGNoX2hvb2tzX2dyb3VwX3NpemUsCj4gLS0KPiAyLjM0LjEKPiAK
CkNvbmZpcm1pbmcsIHRoaXMgc29sdmVzIHRoZSBhbHRzZWN0aW9uIGlzc3VlIEkgcmVwb3J0ZWQg
dmlhIApodHRwczovL2xvcmUua2VybmVsLm9yZy94ZW4tZGV2ZWwvYjc0YTY4YjAzOGMzMWRmNGJi
OTRhNWI1ZTg3NDUzZjVhMjQ5Y2ZlMi4xNjQ2NzUzNjU3LmdpdC5kb2ViZWxAYW1hem9uLmRlLwoK
UmV2aWV3ZWQtYnk6IEJqb2VybiBEb2ViZWwgPGRvZWJlbEBhbWF6b24uZGU+CgoKCkFtYXpvbiBE
ZXZlbG9wbWVudCBDZW50ZXIgR2VybWFueSBHbWJICktyYXVzZW5zdHIuIDM4CjEwMTE3IEJlcmxp
bgpHZXNjaGFlZnRzZnVlaHJ1bmc6IENocmlzdGlhbiBTY2hsYWVnZXIsIEpvbmF0aGFuIFdlaXNz
CkVpbmdldHJhZ2VuIGFtIEFtdHNnZXJpY2h0IENoYXJsb3R0ZW5idXJnIHVudGVyIEhSQiAxNDkx
NzMgQgpTaXR6OiBCZXJsaW4KVXN0LUlEOiBERSAyODkgMjM3IDg3OQoKCg==



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 17:34:44 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 17:34:44 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288547.489333 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMgQ-00015o-9h; Thu, 10 Mar 2022 17:34:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288547.489333; Thu, 10 Mar 2022 17:34:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMgQ-00015h-5d; Thu, 10 Mar 2022 17:34:38 +0000
Received: by outflank-mailman (input) for mailman id 288547;
 Thu, 10 Mar 2022 17:34:36 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSMgO-00015X-Tb; Thu, 10 Mar 2022 17:34:36 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSMgO-0006GK-R6; Thu, 10 Mar 2022 17:34:36 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSMgO-0006hP-DI; Thu, 10 Mar 2022 17:34:36 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSMgO-0001MD-Cc; Thu, 10 Mar 2022 17:34:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=t1fi6qafDm0lTyxl/NTlCpAEElpOF6cE60hfbYnAYZs=; b=J9/waLwu5tvSV/cC/XmNSAZ/FK
	yRmDQuaF+fprqExzV/9VGcktShga6uvgjqCmAyD6QRvVagTfaPDIydcUz5RoU5cD9QMwlEozsLCVM
	Iw4AUBVQvJ9raFQG64kRtQXQ6FMu+5rOm0dBFEdnnhtqpmCTVwzgHidpIcyI9q+8sNzc=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168504-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168504: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=f06941cc46d002f66875b6f2f711fa3df2775da4
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 10 Mar 2022 17:34:36 +0000

flight 168504 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168504/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 f06941cc46d002f66875b6f2f711fa3df2775da4
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   10 days
Failing since        168258  2022-03-01 01:55:31 Z    9 days   84 attempts
Testing same since   168504  2022-03-10 10:34:32 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 554 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 10 17:45:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 17:45:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288558.489354 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMqm-0002vm-Kl; Thu, 10 Mar 2022 17:45:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288558.489354; Thu, 10 Mar 2022 17:45:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMqm-0002vf-Hp; Thu, 10 Mar 2022 17:45:20 +0000
Received: by outflank-mailman (input) for mailman id 288558;
 Thu, 10 Mar 2022 17:45:19 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=i5Vk=TV=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nSMql-0002fW-7i
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 17:45:19 +0000
Received: from NAM11-BN8-obe.outbound.protection.outlook.com
 (mail-bn8nam11on20625.outbound.protection.outlook.com
 [2a01:111:f400:7eae::625])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d8db92ae-a099-11ec-853a-5f4723681683;
 Thu, 10 Mar 2022 18:45:17 +0100 (CET)
Received: from DM5PR18CA0086.namprd18.prod.outlook.com (2603:10b6:3:3::24) by
 DM6PR02MB6619.namprd02.prod.outlook.com (2603:10b6:5:217::8) with
 Microsoft
 SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5038.15; Thu, 10 Mar 2022 17:45:15 +0000
Received: from DM3NAM02FT022.eop-nam02.prod.protection.outlook.com
 (2603:10b6:3:3:cafe::33) by DM5PR18CA0086.outlook.office365.com
 (2603:10b6:3:3::24) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22 via Frontend
 Transport; Thu, 10 Mar 2022 17:45:14 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (149.199.80.198) by
 DM3NAM02FT022.mail.protection.outlook.com (10.13.5.89) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5061.22 via Frontend Transport; Thu, 10 Mar 2022 17:45:14 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Thu, 10 Mar 2022 17:45:13 +0000
Received: from smtp.xilinx.com (172.21.105.198) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Thu, 10 Mar 2022 17:45:13 +0000
Received: from [10.108.8.223] (port=47674 helo=xcbayankuma41x.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nSMqf-00062C-3L; Thu, 10 Mar 2022 17:45:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d8db92ae-a099-11ec-853a-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=GEqoDXRq0PGYOS+xORDtKTIJ+k5Opg4gAO9tXJ/rpuBJt9gvSiqlHh+He+DrOo6pImL9rRn0QOONyBqt0LAGRu1J1nZdmVYIKjN+JXKG14yUfua3IYB7VWm7YhW3jvkamTUgxPnzoTodU8B7d8NR6Gp/QcvhsdHv7qo+6+le0xpbO3Xz+QafdLY2JhrgCt2aGWnxI5KF+7JsvR9uBAkreRzB4xUG40W3M862yt3pNoXuOH923mwWjwKuBljxy0Pryw8MIIDHuwCMtMe6+jKKrUQhqd0scbpG8KqqSGkqPVvuIuGfKZO/+owmw3NEKDz5TsB0L4ETRuo4eiCmRTKRsg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Frs8haldHJhErbGXIyYNEdcgB/b9gbBfW73XjCo47n4=;
 b=nSX+Omjfyn0Fx+Qe+cABbQ9uoXe8D/B8zpGioL+ccahEaHKLVRL1mRYUULUahVo/aZ/5ErkdPAL9D2Z4O4QNU/2TRXXvurNWqyEIS2pX4PPO2WfULOfmja/MIE7QuFukcNVTjY+qroOCQyCk0+hW842w5avL4oQuomtzF8tQ/MXALJYXH+rg56/41wWAnNMgE/G9puXIzZNiXundtiCAsD2f9vdQ8MOVC+3tdgyXSwF6yIJY0HEZU2aUq6XGIYo0CErVP3jN/9WgCxwP9B4fCluxqrPX4OZ1w7S/v11uIFedOnb1lez452eYeZQMOr0hCoQ6F/PS0uZTdUpODfvP5w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Frs8haldHJhErbGXIyYNEdcgB/b9gbBfW73XjCo47n4=;
 b=nmHDbadIgx1a6vM0Bb9rtwkMIjIsqVOdwTh57nW94fuwr7Nb9/BpBaXvhXSJNjfm3IscYZ7xqRDMn04F2opz4u4JfSkVAXGK2X8LxkYHh/XzTEbDQDlx1trUYA/A1ViDmRn9m+GFEr06OC7E+Y+pkwCgC3VfaFkas0P6D6yVGEQ=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch01.xlnx.xilinx.com;
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <stefanos@xilinx.com>, <julien@xen.org>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>, Ayan Kumar Halder
	<ayankuma@xilinx.com>
Subject: [XEN v10 1/4] xen/arm64: Decode ldr/str post increment operations
Date: Thu, 10 Mar 2022 17:44:58 +0000
Message-ID: <20220310174501.62040-2-ayankuma@xilinx.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220310174501.62040-1-ayankuma@xilinx.com>
References: <20220310174501.62040-1-ayankuma@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 1e0c61c6-b68a-4452-9681-08da02bdbba4
X-MS-TrafficTypeDiagnostic: DM6PR02MB6619:EE_
X-Microsoft-Antispam-PRVS:
	<DM6PR02MB661997980819ED811F2FDE75B20B9@DM6PR02MB6619.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch01.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(426003)(1076003)(26005)(336012)(40460700003)(356005)(7636003)(83380400001)(2906002)(8936002)(5660300002)(36756003)(9786002)(7416002)(36860700001)(54906003)(6916009)(186003)(508600001)(107886003)(70586007)(70206006)(6666004)(7696005)(8676002)(2616005)(47076005)(316002)(82310400004)(4326008)(102446001);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2022 17:45:14.4203
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 1e0c61c6-b68a-4452-9681-08da02bdbba4
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch01.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DM3NAM02FT022.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR02MB6619

At the moment, Xen does not decode any of the arm64 instructions. This
means that when hsr_dabt.isv == 0, Xen cannot handle those instructions.
This will lead to Xen to abort the guests (from which those instructions
originate).

With this patch, Xen is able to decode ldr/str post indexing instructions.
These are a subset of instructions for which hsr_dabt.isv == 0.

The following instructions are now supported by Xen :-
1.      ldr     x2,    [x1],    #8
2.      ldr     w2,    [x1],    #-4
3.      ldr     x2,    [x1],    #-8
4.      ldr     w2,    [x1],    #4
5.      ldrh    w2,    [x1],    #2
6.      ldrb    w2,    [x1],    #1
7.      str     x2,    [x1],    #8
8.      str     w2,    [x1],    #-4
9.      strh    w2,    [x1],    #2
10.     strb    w2,    [x1],    #1

In the subsequent patch, decode_arm64() will get invoked when
hsr_dabt.isv == 0.

Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
---

Changelog :-

v2..v5 - Mentioned in the cover letter.

v6 - 1. Fixed the code style issues as mentioned in v5.

v7 - No change.

v8 - 1. Removed some un-necessary header files inclusion.
     2. Some style changes pointed out in v7.

v9 - 1. Rebased on top of the master.
     2. Renamed psr_mode_is_32bit to regs_mode_is_32bit.

v10 - 1. No change.

 xen/arch/arm/decode.c           | 79 ++++++++++++++++++++++++++++++++-
 xen/arch/arm/decode.h           | 48 +++++++++++++++++---
 xen/arch/arm/include/asm/mmio.h |  4 ++
 xen/arch/arm/io.c               |  2 +-
 4 files changed, 124 insertions(+), 9 deletions(-)

diff --git a/xen/arch/arm/decode.c b/xen/arch/arm/decode.c
index 792c2e92a7..3add87e83a 100644
--- a/xen/arch/arm/decode.c
+++ b/xen/arch/arm/decode.c
@@ -84,6 +84,78 @@ bad_thumb2:
     return 1;
 }
 
+static int decode_arm64(register_t pc, mmio_info_t *info)
+{
+    union instr opcode = {0};
+    struct hsr_dabt *dabt = &info->dabt;
+    struct instr_details *dabt_instr = &info->dabt_instr;
+
+    if ( raw_copy_from_guest(&opcode.value, (void * __user)pc, sizeof (opcode)) )
+    {
+        gprintk(XENLOG_ERR, "Could not copy the instruction from PC\n");
+        return 1;
+    }
+
+    /*
+     * Refer Arm v8 ARM DDI 0487G.b, Page - C6-1107
+     * "Shared decode for all encodings" (under ldr immediate)
+     * If n == t && n != 31, then the return value is implementation defined
+     * (can be WBSUPPRESS, UNKNOWN, UNDEFINED or NOP). Thus, we do not support
+     * this. This holds true for ldrb/ldrh immediate as well.
+     *
+     * Also refer, Page - C6-1384, the above described behaviour is same for
+     * str immediate. This holds true for strb/strh immediate as well
+     */
+    if ( (opcode.ldr_str.rn == opcode.ldr_str.rt) && (opcode.ldr_str.rn != 31) )
+    {
+        gprintk(XENLOG_ERR, "Rn should not be equal to Rt except for r31\n");
+        goto bad_loadstore;
+    }
+
+    /* First, let's check for the fixed values */
+    if ( (opcode.value & POST_INDEX_FIXED_MASK) != POST_INDEX_FIXED_VALUE )
+    {
+        gprintk(XENLOG_ERR,
+                "Decoding instruction 0x%x is not supported\n", opcode.value);
+        goto bad_loadstore;
+    }
+
+    if ( opcode.ldr_str.v != 0 )
+    {
+        gprintk(XENLOG_ERR,
+                "ldr/str post indexing for vector types are not supported\n");
+        goto bad_loadstore;
+    }
+
+    /* Check for STR (immediate) */
+    if ( opcode.ldr_str.opc == 0 )
+        dabt->write = 1;
+    /* Check for LDR (immediate) */
+    else if ( opcode.ldr_str.opc == 1 )
+        dabt->write = 0;
+    else
+    {
+        gprintk(XENLOG_ERR,
+                "Decoding ldr/str post indexing is not supported for this variant\n");
+        goto bad_loadstore;
+    }
+
+    gprintk(XENLOG_INFO,
+            "opcode->ldr_str.rt = 0x%x, opcode->ldr_str.size = 0x%x, opcode->ldr_str.imm9 = %d\n",
+            opcode.ldr_str.rt, opcode.ldr_str.size, opcode.ldr_str.imm9);
+
+    update_dabt(dabt, opcode.ldr_str.rt, opcode.ldr_str.size, false);
+
+    dabt_instr->rn = opcode.ldr_str.rn;
+    dabt_instr->imm9 = opcode.ldr_str.imm9;
+
+    return 0;
+
+ bad_loadstore:
+    gprintk(XENLOG_ERR, "unhandled Arm instruction 0x%x\n", opcode.value);
+    return 1;
+}
+
 static int decode_thumb(register_t pc, struct hsr_dabt *dabt)
 {
     uint16_t instr;
@@ -150,10 +222,13 @@ bad_thumb:
     return 1;
 }
 
-int decode_instruction(const struct cpu_user_regs *regs, struct hsr_dabt *dabt)
+int decode_instruction(const struct cpu_user_regs *regs, mmio_info_t *info)
 {
     if ( is_32bit_domain(current->domain) && regs->cpsr & PSR_THUMB )
-        return decode_thumb(regs->pc, dabt);
+        return decode_thumb(regs->pc, &info->dabt);
+
+    if ( !regs_mode_is_32bit(regs) )
+        return decode_arm64(regs->pc, info);
 
     /* TODO: Handle ARM instruction */
     gprintk(XENLOG_ERR, "unhandled ARM instruction\n");
diff --git a/xen/arch/arm/decode.h b/xen/arch/arm/decode.h
index 4613763bdb..13db8ac968 100644
--- a/xen/arch/arm/decode.h
+++ b/xen/arch/arm/decode.h
@@ -23,19 +23,55 @@
 #include <asm/regs.h>
 #include <asm/processor.h>
 
-/**
+/*
+ * Refer to the ARMv8 ARM (DDI 0487G.b), Section C4.1.4 Loads and Stores
+ * Page 318 specifies the following bit pattern for
+ * "load/store register (immediate post-indexed)".
+ *
+ * 31 30 29  27 26 25  23   21 20              11   9         4       0
+ * ___________________________________________________________________
+ * |size|1 1 1 |V |0 0 |opc |0 |      imm9     |0 1 |  Rn     |  Rt   |
+ * |____|______|__|____|____|__|_______________|____|_________|_______|
+ */
+union instr {
+    uint32_t value;
+    struct {
+        unsigned int rt:5;     /* Rt register */
+        unsigned int rn:5;     /* Rn register */
+        unsigned int fixed1:2; /* value == 01b */
+        signed int imm9:9;     /* imm9 */
+        unsigned int fixed2:1; /* value == 0b */
+        unsigned int opc:2;    /* opc */
+        unsigned int fixed3:2; /* value == 00b */
+        unsigned int v:1;      /* vector */
+        unsigned int fixed4:3; /* value == 111b */
+        unsigned int size:2;   /* size */
+    } ldr_str;
+};
+
+#define POST_INDEX_FIXED_MASK   0x3B200C00
+#define POST_INDEX_FIXED_VALUE  0x38000400
+
+/*
  * Decode an instruction from pc
- * /!\ This function is not intended to fully decode an instruction. It
- * considers that the instruction is valid.
+ * /!\ This function is intended to decode an instruction. It considers that the
+ * instruction is valid.
  *
- * This function will get:
- *  - The transfer register
+ * In case of thumb mode, this function will get:
+ *  - The transfer register (ie Rt)
  *  - Sign bit
  *  - Size
+ *
+ * In case of arm64 mode, this function will get:
+ * - The transfer register (ie Rt)
+ * - The source register (ie Rn)
+ * - Size
+ * - Immediate offset
+ * - Read or write
  */
 
 int decode_instruction(const struct cpu_user_regs *regs,
-                       struct hsr_dabt *dabt);
+                       mmio_info_t *info);
 
 #endif /* __ARCH_ARM_DECODE_H_ */
 
diff --git a/xen/arch/arm/include/asm/mmio.h b/xen/arch/arm/include/asm/mmio.h
index 7ab873cb8f..3354d9c635 100644
--- a/xen/arch/arm/include/asm/mmio.h
+++ b/xen/arch/arm/include/asm/mmio.h
@@ -29,6 +29,10 @@
 typedef struct
 {
     struct hsr_dabt dabt;
+    struct instr_details {
+        unsigned long rn:5;
+        signed int imm9:9;
+    } dabt_instr;
     paddr_t gpa;
 } mmio_info_t;
 
diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
index 1a066f9ae5..fad103bdbd 100644
--- a/xen/arch/arm/io.c
+++ b/xen/arch/arm/io.c
@@ -141,7 +141,7 @@ enum io_state try_handle_mmio(struct cpu_user_regs *regs,
     {
         int rc;
 
-        rc = decode_instruction(regs, &info.dabt);
+        rc = decode_instruction(regs, &info);
         if ( rc )
         {
             gprintk(XENLOG_DEBUG, "Unable to decode instruction\n");
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 17:45:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 17:45:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288557.489344 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMqi-0002fk-DT; Thu, 10 Mar 2022 17:45:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288557.489344; Thu, 10 Mar 2022 17:45:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMqi-0002fd-AC; Thu, 10 Mar 2022 17:45:16 +0000
Received: by outflank-mailman (input) for mailman id 288557;
 Thu, 10 Mar 2022 17:45:15 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=i5Vk=TV=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nSMqg-0002fW-U5
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 17:45:15 +0000
Received: from NAM11-BN8-obe.outbound.protection.outlook.com
 (mail-bn8nam11on20614.outbound.protection.outlook.com
 [2a01:111:f400:7eae::614])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d435954e-a099-11ec-853a-5f4723681683;
 Thu, 10 Mar 2022 18:45:11 +0100 (CET)
Received: from DM5PR17CA0051.namprd17.prod.outlook.com (2603:10b6:3:13f::13)
 by SJ0PR02MB8532.namprd02.prod.outlook.com (2603:10b6:a03:3fd::16) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Thu, 10 Mar
 2022 17:45:08 +0000
Received: from DM3NAM02FT023.eop-nam02.prod.protection.outlook.com
 (2603:10b6:3:13f:cafe::44) by DM5PR17CA0051.outlook.office365.com
 (2603:10b6:3:13f::13) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22 via Frontend
 Transport; Thu, 10 Mar 2022 17:45:08 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (149.199.80.198) by
 DM3NAM02FT023.mail.protection.outlook.com (10.13.5.127) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5061.22 via Frontend Transport; Thu, 10 Mar 2022 17:45:07 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Thu, 10 Mar 2022 17:45:05 +0000
Received: from smtp.xilinx.com (172.21.105.198) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Thu, 10 Mar 2022 17:45:05 +0000
Received: from [10.108.8.223] (port=47674 helo=xcbayankuma41x.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nSMqX-00062C-20; Thu, 10 Mar 2022 17:45:05 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d435954e-a099-11ec-853a-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=OVvdguyP6Z9CK2wMVk7YPdfhcrl60tmkSUuD7GNBDWOY1jZzgg0t+lkKQaLzJ7BPCTKRIKvnRwf8wH706t/z2prdlr99ulyTgInh7UGmbltiiwl6z+Pf15S3ok4q0o2ABtJWkXSGcDVfFuCbqyTW/zpMaWn9WyIHXD3ZC6ilNGMe8KsUEaUz4+qyiDn+0Qx2Vz1fM194PsLGSoENWkHT8YfXXS4n3YUUKa0+4FtPuSvMOFosgbVVx9tUsYzYIfAgAZcQHeM26Hm9tLjFiaEsbz7f/NXlzqivwPaey4yVMeH8yy5a4VGYsK5LhYO6ytegnZTU9PcOfolaqTUDSro/Zg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=vtnqHWo21PYkXXu0QirZrBjGvvDVMR1GsuzNkgjNRRA=;
 b=ApqVUp/tcEOQNPmRxWsPnS3xar/EMCwpjDjRzZNJb9Oa5vglUbrkPm1V8iL99DROGMfShZlH7wBRecyzcaohj5itMcCaApQWkmcFTjTuC0IA14+jgSRQctNPLAY7GxPPRXBBjBY/aQ2jchrJ+Tc5a5wAe0tJBWnqFbG4PsDa5Z2qPnjFF/Gt5aEvnA+F4e+UP/cTOwHKU66+M3aB4qG4zm8xl6dGv+VsXiwsM8Op2WqHRocO+f/foLWQFekvhBkysfEzq0/pmG9JNSiBR3LcUVLlFdwpjBCmZautsqLuPYRncXALOVOL1ryrTgXFoO6cwZz3dxSiVzgM/BqqZG8Dpw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=vtnqHWo21PYkXXu0QirZrBjGvvDVMR1GsuzNkgjNRRA=;
 b=GWiE9ec2vo1EmqGkvyIbnAg5HucNj8lRNh169JTbNRknB/WgfpLx4YJ/2GOGRQrVVHuw7TjtOxpLS6H3++RRfaKye0lvH70W1qw02RLwbvkzh6Pu+dJwwEhTjFjREvR4Ubb1ZBBScyzTpok/ewI5VlGP8vdFneguWVM+1mwbYqY=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch01.xlnx.xilinx.com;
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <stefanos@xilinx.com>, <julien@xen.org>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>, Ayan Kumar Halder
	<ayankuma@xilinx.com>
Subject: [XEN v10 0/4] xen/arm64: io: Decode ldr/str post-indexing instruction
Date: Thu, 10 Mar 2022 17:44:57 +0000
Message-ID: <20220310174501.62040-1-ayankuma@xilinx.com>
X-Mailer: git-send-email 2.17.1
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 6e4557a3-ca8b-43fe-c0cc-08da02bdb787
X-MS-TrafficTypeDiagnostic: SJ0PR02MB8532:EE_
X-Microsoft-Antispam-PRVS:
	<SJ0PR02MB8532B2FFB83BDE5F6E84C9DDB20B9@SJ0PR02MB8532.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch01.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(2906002)(107886003)(7696005)(82310400004)(40460700003)(426003)(83380400001)(336012)(2616005)(36860700001)(186003)(26005)(47076005)(316002)(8936002)(9786002)(36756003)(70586007)(70206006)(4326008)(8676002)(508600001)(5660300002)(6666004)(356005)(7416002)(7636003)(1076003)(54906003)(6916009)(102446001)(473944003);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2022 17:45:07.4735
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 6e4557a3-ca8b-43fe-c0cc-08da02bdb787
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch01.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DM3NAM02FT023.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR02MB8532

Hi All,

The patch series introduces support to decode instructions by Xen when ISS is
invalid. Currently, when the guest executes post indexing ldr/str instructions
on emulated MMIO, these instructions are trapped into Xen as a data abort.
Xen reads hsr_dabt.isv == 0, so ISS is invalid. Therefore, it reads the faulting
instruction's opcode from guest's PC. It decodes and executes the instruction on
the emulated region.

While doing the patch, we found two bugs in the codebase. I have addressed them
in patches 3 and 4. These bugs were discussed with Julien on IRC chat. The
purpose of addressing these bugs (in this series) is that 1. We should not forget
about them. 2. To get clarity if our understanding is correct.

Ayan Kumar Halder (4):
  xen/arm64: Decode ldr/str post increment operations
  xen/arm64: io: Support instructions (for which ISS is not valid) on
    emulated MMIO region using MMIO/ioreq handler
  xen/arm64: io: Handle the abort due to access to stage1 translation
    table
  xen/arm64: io: Handle data abort due to cache maintenance instructions


Ayan Kumar Halder (4):
  xen/arm64: Decode ldr/str post increment operations
  xen/arm64: io: Support instructions (for which ISS is not valid) on
    emulated MMIO region using MMIO/ioreq handler
  xen/arm64: io: Handle the abort due to access to stage1 translation
    table
  xen/arm64: io: Handle data abort due to cache maintenance instructions

 xen/arch/arm/arm32/traps.c        |  11 +++
 xen/arch/arm/arm64/traps.c        |  52 ++++++++++++++
 xen/arch/arm/decode.c             |  81 ++++++++++++++++++++-
 xen/arch/arm/decode.h             |  48 +++++++++++--
 xen/arch/arm/include/asm/domain.h |   4 ++
 xen/arch/arm/include/asm/mmio.h   |  22 +++++-
 xen/arch/arm/include/asm/traps.h  |   2 +
 xen/arch/arm/io.c                 | 115 ++++++++++++++++++++++--------
 xen/arch/arm/ioreq.c              |  21 +++++-
 xen/arch/arm/traps.c              |  77 +++++++++++++++-----
 xen/arch/x86/include/asm/ioreq.h  |   3 +
 xen/include/xen/sched.h           |   2 +
 12 files changed, 379 insertions(+), 59 deletions(-)

Changelog :-
v2 - 1. Updated the rn register after reading from it. (Pointed by Julien,
        Stefano)
     2. Used a union to represent the instruction opcode (Suggestd by Bertrand)
     3. Fixed coding style issues (Pointed by Julien)
     4. In the previous patch, I was updating dabt->sign based on the signedness
        of imm9. This was incorrect. As mentioned in ARMv8 ARM  DDI 0487G.b,
        Page 3221, SSE indicates the signedness of the data item loaded. In our
        case, the data item loaded is always unsigned.

v3- 1. Handled all the variants of ldr/str (ie 64, 32, 16, 8 bit variants).
       Thus, I have removed the check for "instr->code.opc == 0" (Suggested by
       Andre)
    2. Handled the scenario when rn = SP, rt = XZR (Suggested by Jan, Andre)
    3. Added restriction for "rt != rn" (Suggested by Andre)
    4. Moved union ldr_str_instr_class {} to decode.h. This is the header included
       by io.c and decode.c (where the union is referred). (Suggested by Jan)
    5. Indentation and typo fixes (Suggested by Jan)

v4- 1. Fixed the patch as per Stefano's comments on v3. They are as follows :-
        1.1 Use macros to determine the fixed values in the instruction opcode
        1.2 Checked if instr != NULL
        1.3 Changed some data types and added #define ARM_64 for AArch64 specific
            code
        1.4 Moved post_increment_register() to decode.c so that the decoding
            logic is confined to a single file.
        1.5 Moved some checks from post_increment_register() to
            decode_loadstore_postindexing()
        1.6 Removed a duplicate check
    2. Updated the commit message as per Andre's comments.
    3. Changed the names of a label and some comments. *32bit* was erroneously
       mentioned in a label and comments in decode_loadstore_postindexing()
       although the function handled all variants of ldr/str post indexing.

v5- 1. Renamed decode_loadstore_postindexing() to decode_arm64(). The reason
       being this will be extended in future to support more instructions for
       which hsr_badt.isv = 0
    2. Introduce a function try_decode_instruction_invalid_iss() to determine
       if the instruction needs to be decoded before invoking decode_instruction().

       It checks :-
       2.1  dabt->s1ptw - Returns IO_UNHANDLED
       2.2  dabt->cache - Returns IO_IGNORED. (new enum instroduced to let the
            caller know that the instruction needs to be ignored by Xen. Thus
            the caller needs to increment the PC and return to the guest.

    3. Invoked try_decode_instruction_invalid_iss() from the following 2 places :-
        3.a - try_handle_mmio() - When we have determined that there is a valid
              mmio handler.
        3.b - try_fwd_ioserv()
        When ioserver completes the io request, the acknowledgement is sent via
        handle_ioserv(). Here, we need to increment the register. As there is no
        common data shared between try_fwd_ioserv() and handle_ioserv(), we need
        to decode the instruction again in handle_ioserv() to determine rn, imm9.

        (NOTE to Reviewers) - This does not feel correct. However, I could not
        think of a better approach. Please provide your inputs.

    4. Augumented struct hsr_dabt{} with struct hsr_dabt_instr_details{} to hold
       rn and imm9. This is passed to post_increment_register() to update rn.
    5. Other style changes as suggested in v4.

v6 - 1. Split the patch into three parts.

v7 - 1. Merged patch2 and patch3 into a single patch.

v8 - 1. Changes mentioned in the individual patches.

v9 - 1. Added patches 3 and 4 to address the bugs found in the existing codebase.
     2. Changes mentioned in the individual patches.

v10 - 1. Changes mentioned in the individual patches.
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 17:45:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 17:45:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288559.489366 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMqt-0003HK-Sf; Thu, 10 Mar 2022 17:45:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288559.489366; Thu, 10 Mar 2022 17:45:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMqt-0003HD-PV; Thu, 10 Mar 2022 17:45:27 +0000
Received: by outflank-mailman (input) for mailman id 288559;
 Thu, 10 Mar 2022 17:45:26 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=i5Vk=TV=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nSMqs-0003Et-4J
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 17:45:26 +0000
Received: from NAM12-BN8-obe.outbound.protection.outlook.com
 (mail-bn8nam12on2061c.outbound.protection.outlook.com
 [2a01:111:f400:fe5b::61c])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id dcacf8aa-a099-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 18:45:24 +0100 (CET)
Received: from DS7PR03CA0219.namprd03.prod.outlook.com (2603:10b6:5:3ba::14)
 by DM6PR02MB4860.namprd02.prod.outlook.com (2603:10b6:5:10::25) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Thu, 10 Mar
 2022 17:45:21 +0000
Received: from DM3NAM02FT051.eop-nam02.prod.protection.outlook.com
 (2603:10b6:5:3ba:cafe::eb) by DS7PR03CA0219.outlook.office365.com
 (2603:10b6:5:3ba::14) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Thu, 10 Mar 2022 17:45:21 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (149.199.80.198) by
 DM3NAM02FT051.mail.protection.outlook.com (10.13.4.91) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5061.22 via Frontend Transport; Thu, 10 Mar 2022 17:45:20 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Thu, 10 Mar 2022 17:45:19 +0000
Received: from smtp.xilinx.com (172.21.105.198) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Thu, 10 Mar 2022 17:45:19 +0000
Received: from [10.108.8.223] (port=47674 helo=xcbayankuma41x.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nSMqk-00062C-Jp; Thu, 10 Mar 2022 17:45:18 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: dcacf8aa-a099-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=dC0POvUCGY22IqX4w8cDzMRsnwrX5gDB9BahAXMgnsMq7TaayNOqrJ13GLxxbStfEj2xJBK7TTQWd/L78HmhBv3xwUCLSuxRCe1PCFzc6wtlGRp0b+cxT5Pr4jGcLNQR93gc3QJlyI2qzFWgTRXVelexkN2DdJeEBPgAWV/cYgIQFwG3UV+kgNzQzdng/h3jBtT0677huhc+2AqaBJSUzXg6hpcp1HnZFWiiXiLfPucXUhEKDsqXkEbgUgajS9KGxP68MJHbF0j+hghnbxDBvFiaLits+VN/TMqjjkoYcAiGLnbpHHh9OhGBWJtQAvBZJaELPexpi1oAwV5MlYKEfQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=v+THwbN4oTMoGKFH1lRCrmOSyHRnq+hrefN92IPF7io=;
 b=NxLpeD/ECAWW5f3oLQVhaRGvjhp6tTvpbBMNHqv2/wTsub+4YTxV0oqnOtuMg+pJTThM7oygTV2mkSRbU9iRkJwmgDoYi9wm3zKzR4PGRvDHaccK/4PC5vvV8Cnn+DKqz5wLXLxgsQcVpSMT+tpYLeQE85JR8s1zL50hp7eT2CLMWjXp0f8ixP3io6MOt9XW91hryl1txC/QYnD0PajK4o7SGbjYVMh72s5z6aKp6WiAQRBaZw4eNHIyiXwn9ZW3vNbbvRu2ojUjwuxFO/rBvjOxbnbgRj/xFnCRLh9WlspKUjuXx8NAqovHw+TlKlXuYHwC35TBKsJ1EvXHYip+qg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=v+THwbN4oTMoGKFH1lRCrmOSyHRnq+hrefN92IPF7io=;
 b=Mv2vtrv4ibpGfW5bnBZnPEkt14N1zTLmN0X1bM6yQH0kVg2eWjvU9ofs28dT8azGBpK+Tzeqjv/BWMW57EXu2GBY7DDIZ2JtafRakj6WFhCtsjcMDvJe0NP3m87ttCtU9mqDxr6jy7nEn1/9pqz3C9AEBWv/Z5QEN6r+LEFbo9c=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch01.xlnx.xilinx.com;
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <stefanos@xilinx.com>, <julien@xen.org>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>, Ayan Kumar Halder
	<ayankuma@xilinx.com>
Subject: [XEN v10 3/4] xen/arm64: io: Handle the abort due to access to stage1 translation table
Date: Thu, 10 Mar 2022 17:45:00 +0000
Message-ID: <20220310174501.62040-4-ayankuma@xilinx.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220310174501.62040-1-ayankuma@xilinx.com>
References: <20220310174501.62040-1-ayankuma@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 537e6435-fd6d-4a4c-50a7-08da02bdbf50
X-MS-TrafficTypeDiagnostic: DM6PR02MB4860:EE_
X-Microsoft-Antispam-PRVS:
	<DM6PR02MB4860EFD4F370141388D348B4B20B9@DM6PR02MB4860.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch01.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(70206006)(70586007)(2906002)(8676002)(356005)(4326008)(82310400004)(54906003)(7636003)(107886003)(40460700003)(6916009)(8936002)(5660300002)(9786002)(7416002)(47076005)(508600001)(7696005)(316002)(36860700001)(186003)(26005)(36756003)(336012)(426003)(83380400001)(1076003)(6666004)(2616005)(102446001)(473944003);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2022 17:45:20.5164
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 537e6435-fd6d-4a4c-50a7-08da02bdbf50
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch01.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DM3NAM02FT051.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR02MB4860

If the abort was caused due to access to stage1 translation table, Xen
will try to set the p2m entry (assuming that the Stage 1 translation
table is in the non MMIO region).
If there is no such entry found, then Xen will try to map the address as
a MMIO region (assuming that the Stage 1 translation table is in the
direct MMIO region).

If that fails as well, then there are the two following scenarios:-
1. Stage 1 translation table being in the emulated MMIO region - Xen
can read the region, but it has no way to return the value read to the
CPU page table walker (which tries to go through the stage1 tables to
resolve the translation fault).

2. Stage 1 translation table address is invalid.

In both the above scenarios, Xen will forward the abort to the guest.

Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
---

Changelog :-

v1..v8 - NA

v9 - 1. Extracted this change from "[XEN v8 2/2] xen/arm64: io: Support
instructions (for which ISS is not..." into a separate patch of its own.
The reason being this is an existing bug in the codebase.

v10 - 1. Enabled checking for stage1 translation table address in the
MMIO region. The reason being Arm Arm does not have any restrictions.
2. Updated the commit message to explain all the possible scenarios.

 xen/arch/arm/io.c | 11 +++++++++++
 1 file changed, 11 insertions(+)

diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
index fd903b7b03..e6c77e16bf 100644
--- a/xen/arch/arm/io.c
+++ b/xen/arch/arm/io.c
@@ -128,6 +128,17 @@ void try_decode_instruction(const struct cpu_user_regs *regs,
         return;
     }
 
+    /*
+     * At this point, we know that the stage1 translation table is either in the
+     * emulated MMIO region or its address is invalid . This is not expected by
+     * Xen and thus it forwards the abort to the guest.
+     */
+    if ( info->dabt.s1ptw )
+    {
+        info->dabt_instr.state = INSTR_ERROR;
+        return;
+    }
+
     /*
      * Armv8 processor does not provide a valid syndrome for decoding some
      * instructions. So in order to process these instructions, Xen must
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 17:45:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 17:45:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288560.489371 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMqu-0003Ka-6i; Thu, 10 Mar 2022 17:45:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288560.489371; Thu, 10 Mar 2022 17:45:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMqu-0003JX-0f; Thu, 10 Mar 2022 17:45:28 +0000
Received: by outflank-mailman (input) for mailman id 288560;
 Thu, 10 Mar 2022 17:45:26 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=i5Vk=TV=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nSMqs-0002fW-7Y
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 17:45:26 +0000
Received: from NAM12-BN8-obe.outbound.protection.outlook.com
 (mail-bn8nam12on20608.outbound.protection.outlook.com
 [2a01:111:f400:fe5b::608])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id db3fe2f0-a099-11ec-853a-5f4723681683;
 Thu, 10 Mar 2022 18:45:23 +0100 (CET)
Received: from DM5PR16CA0038.namprd16.prod.outlook.com (2603:10b6:4:15::24) by
 BYAPR02MB5192.namprd02.prod.outlook.com (2603:10b6:a03:72::32) with
 Microsoft
 SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5038.14; Thu, 10 Mar 2022 17:45:18 +0000
Received: from DM3NAM02FT003.eop-nam02.prod.protection.outlook.com
 (2603:10b6:4:15:cafe::28) by DM5PR16CA0038.outlook.office365.com
 (2603:10b6:4:15::24) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.23 via Frontend
 Transport; Thu, 10 Mar 2022 17:45:18 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (149.199.80.198) by
 DM3NAM02FT003.mail.protection.outlook.com (10.13.4.168) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5061.22 via Frontend Transport; Thu, 10 Mar 2022 17:45:17 +0000
Received: from xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Thu, 10 Mar 2022 17:45:16 +0000
Received: from smtp.xilinx.com (172.21.105.198) by
 xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Thu, 10 Mar 2022 17:45:16 +0000
Received: from [10.108.8.223] (port=47674 helo=xcbayankuma41x.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nSMqi-00062C-Aw; Thu, 10 Mar 2022 17:45:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: db3fe2f0-a099-11ec-853a-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=TjJGV2h6sPEamDwntDiIHc7Vg/jiOeLcQeJMEHEaye6N+3muZEJT6FizsYBvTsMlQZPiZ7/nVxbXj/DPpUKpRxZobbuSuS6x52ohhH451Wejwmo7mW133iyr27jYTxSMnv2euUtDbG6hMvwwk/nHMx+GIwhwYHnk3QqD4kyCYk7v+lLlRU6X9bFGAngs8GpvhFiup9lRtXN3rN7SHu/fSMxijW94x+dcI/0m4nMVlQgmWcofL1DAUVzf05JckpgPZullpxZN4eUkRTsaEigT/r1nZ0rK1xoRHXqrjXVntU7/VHOa4VztG12iwuXisWWvIyjl3ocyQY4rclzj75q2AQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=/rVOnmzQQ4ELGJW7g72ReoXq3HvVRus6YPjNI5sBSyE=;
 b=UajEnVz09LQSYkTTuKvIGge7qPmbx6qK+xBxgtLJfP7H523sU88QRmQ9nGGMa1xi0WNDd4aiqmM3Jpma2BeaqbbXOtzZJf1wk7HuuLh/76zmjD07PvYyGDD22uIQNRximGmKScnzm3VM2AW3J8FEnVBpYNVFvfAAK1WUSSwM/6Zb+U8orXZgLnvA1J/eLzgcovWS1d8rtP9bDCgOpugDBGoIURZeTS/X7FTOaCnXt8Nx6+FoKPOyl1XB0D7Dbi3zxI/xSSeR2UWZlXFaNJpTSMLG3u4rblJIx2UwBs4k2lTy90bh9totmZ+fmdThsU2rQRaHmiTg88evJf+yJ9BJDg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=/rVOnmzQQ4ELGJW7g72ReoXq3HvVRus6YPjNI5sBSyE=;
 b=nwRiV5lsGarCe5/oiWRz/B+lHhPzgbn4GuOTblgtatdXxEniJacQGANYdAv2IcMbcfPKCDCgg0kAgZUJis/l3mpSsQF3AjvK2MJCWoOul9OIxR884xwQWydKaV1hhl3ZcRJUg/UY16RmDJZSan+jiKqlJhjUQi4FWbUAOFnCLms=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch01.xlnx.xilinx.com;
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <stefanos@xilinx.com>, <julien@xen.org>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>, Ayan Kumar Halder
	<ayankuma@xilinx.com>
Subject: [XEN v10 2/4] xen/arm64: io: Support instructions (for which ISS is not valid) on emulated MMIO region using MMIO/ioreq handler
Date: Thu, 10 Mar 2022 17:44:59 +0000
Message-ID: <20220310174501.62040-3-ayankuma@xilinx.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220310174501.62040-1-ayankuma@xilinx.com>
References: <20220310174501.62040-1-ayankuma@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 6074dbec-6a7c-4783-d747-08da02bdbd94
X-MS-TrafficTypeDiagnostic: BYAPR02MB5192:EE_
X-Microsoft-Antispam-PRVS:
	<BYAPR02MB519270FBBCF0C9FD53730B32B20B9@BYAPR02MB5192.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch01.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(508600001)(5660300002)(47076005)(8936002)(356005)(9786002)(54906003)(6666004)(30864003)(7416002)(2906002)(8676002)(4326008)(7636003)(83380400001)(70206006)(70586007)(7696005)(6916009)(82310400004)(36860700001)(316002)(107886003)(2616005)(336012)(186003)(426003)(26005)(36756003)(1076003)(102446001)(473944003);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2022 17:45:17.6881
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 6074dbec-6a7c-4783-d747-08da02bdbd94
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch01.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DM3NAM02FT003.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR02MB5192

When an instruction is trapped in Xen due to translation fault, Xen
checks if the ISS is invalid (for data abort) or it is an instruction
abort. If so, Xen tries to resolve the translation fault using p2m page
tables. In case of data abort, Xen will try to map the mmio region to
the guest (ie tries to emulate the mmio region).

If the ISS is not valid and it is a data abort, then Xen tries to
decode the instruction. In case of ioreq, Xen  saves the decoding state,
rn and imm9 to vcpu_io. Whenever the vcpu handles the ioreq successfully,
it will read the decoding state to determine if the instruction decoded
was a ldr/str post indexing (ie INSTR_LDR_STR_POSTINDEXING). If so, it
uses these details to post increment rn.

In case of mmio handler, if the mmio operation was successful, then Xen
retrives the decoding state, rn and imm9. For state ==
INSTR_LDR_STR_POSTINDEXING, Xen will update rn.

If there is an error encountered while decoding/executing the instruction,
Xen will forward the abort to the guest.

Also, the logic to infer the type of instruction has been moved from
try_handle_mmio() to try_decode_instruction() which is called before.
try_handle_mmio() is solely responsible for handling the mmio operation.

Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
---

Changelog :-

v2..v5 - Mentioned in the cover letter.

v6 - 1. Mantained the decoding state of the instruction. This is used by the
caller to either abort the guest or retry or ignore or perform read/write on
the mmio region.

2. try_decode() invokes decoding for both aarch64 and thumb state. (Previously
it used to invoke decoding only for aarch64 state). Thus, it handles all the
checking of the registers before invoking any decoding of instruction.
try_decode_instruction_invalid_iss() has thus been removed.

3. Introduced a new field('enum instr_decode_state state') inside
'struct instr_details'. This holds the decoding state of the instruction.
This is later read by the post_increment_register() to determine if rn needs to
be incremented. Also, this is read by the callers of try_decode_instruction()
to determine if the instruction was valid or ignored or to be retried or
error or decoded successfully.

4. Also stored 'instr_details' inside 'struct ioreq'. This enables
arch_ioreq_complete_mmio() to invoke post_increment_register() without decoding
the instruction again.

5. Check hsr.dabt.valid in do_trap_stage2_abort_guest(). If it is not valid,
then decode the instruction. This ensures that try_handle_mmio() is invoked only
when the instruction is either valid or decoded successfully.

6. Inside do_trap_stage2_abort_guest(), if hsr.dabt.valid is not set, then
resolve the translation fault before trying to decode the instruction. If
translation fault is resolved, then return to the guest to execute the instruction
again.


v7 - 1. Moved the decoding instruction details ie instr_details from 'struct ioreq'
to 'struct vcpu_io'.

2. The instruction is decoded only when we get a data abort.

3. Replaced ASSERT_UNREACHABLE() with domain_crash(). The reason being asserts
can be disabled in some builds. In this scenario when the guest's cpsr is in an
erroneous state, Xen should crash the guest.

4. Introduced check_p2m() which invokes p2m_resolve_translation_fault() and
try_map_mmio() to resolve translation fault by configuring the page tables. This
gets invoked first if ISS is invalid and it is an instruction abort. If it is
a data abort and hsr.dabt.s1ptw is set or try_handle_mmio() returns IO_UNHANDLED,
then check_p2m() gets invoked again.


v8 - 1. Removed the handling of data abort when info->dabt.cache is set. This will
be implemented in a subsequent patch. (Not as part of this series)

2. When the data abort is due to access to stage 1 translation tables, Xen will
try to fix the mapping of the page table for the corresponding address. If this
returns an error, Xen will abort the guest. Else, it will ask the guest to retry
the instruction.

3. Changed v->io.info.dabt_instr from pointer to variable. The reason being that
arch_ioreq_complete_mmio() is called from leave_hypervisor_to_guest().
That is after do_trap_stage2_abort_guest()  has been invoked. So the original
variable will be no longer valid.

4. Some other style issues pointed out in v7.


v9 - 1. Ensure that "Erratum 766422" is handled only when ISS is valid.

2. Whenever Xen receives and instruction abort or data abort (with invalid ISS),
Xen should first try to resolve the p2m translation fault or see if it it needs
to map a MMIO region. If it succeeds, it should return to the guest to retry the
instruction.

3. Removed handling of "dabt.s1ptw == 1" aborts. This is addressed in patch3 as
it is an existing bug in codebase.

4. Various style issues pointed by Julien in v8.


v10 - 1. Set 'dabt.valid=1' when the instruction is fully decoded. This is
checked in try_handle_mmio() and try_fwd_ioserv().

2. Various other style issues pointed in v9.

 xen/arch/arm/arm32/traps.c        | 11 ++++
 xen/arch/arm/arm64/traps.c        | 52 ++++++++++++++++++
 xen/arch/arm/decode.c             |  2 +
 xen/arch/arm/include/asm/domain.h |  4 ++
 xen/arch/arm/include/asm/mmio.h   | 17 +++++-
 xen/arch/arm/include/asm/traps.h  |  2 +
 xen/arch/arm/io.c                 | 90 +++++++++++++++++++------------
 xen/arch/arm/ioreq.c              |  8 ++-
 xen/arch/arm/traps.c              | 77 ++++++++++++++++++++------
 xen/arch/x86/include/asm/ioreq.h  |  3 ++
 xen/include/xen/sched.h           |  2 +
 11 files changed, 214 insertions(+), 54 deletions(-)

diff --git a/xen/arch/arm/arm32/traps.c b/xen/arch/arm/arm32/traps.c
index 9c9790a6d1..159e3cef8b 100644
--- a/xen/arch/arm/arm32/traps.c
+++ b/xen/arch/arm/arm32/traps.c
@@ -18,9 +18,11 @@
 
 #include <xen/lib.h>
 #include <xen/kernel.h>
+#include <xen/sched.h>
 
 #include <public/xen.h>
 
+#include <asm/mmio.h>
 #include <asm/processor.h>
 #include <asm/traps.h>
 
@@ -82,6 +84,15 @@ void do_trap_data_abort(struct cpu_user_regs *regs)
         do_unexpected_trap("Data Abort", regs);
 }
 
+void post_increment_register(const struct instr_details *instr)
+{
+    /*
+     * We have not implemented decoding of post indexing instructions for 32 bit.
+     * Thus, this should be unreachable.
+     */
+    domain_crash(current->domain);
+}
+
 /*
  * Local variables:
  * mode: C
diff --git a/xen/arch/arm/arm64/traps.c b/xen/arch/arm/arm64/traps.c
index 9113a15c7a..6ce4a1fa8c 100644
--- a/xen/arch/arm/arm64/traps.c
+++ b/xen/arch/arm/arm64/traps.c
@@ -17,6 +17,7 @@
  */
 
 #include <xen/lib.h>
+#include <xen/sched.h>
 
 #include <asm/hsr.h>
 #include <asm/system.h>
@@ -44,6 +45,57 @@ void do_bad_mode(struct cpu_user_regs *regs, int reason)
     panic("bad mode\n");
 }
 
+void post_increment_register(const struct instr_details *instr)
+{
+    struct cpu_user_regs *regs = guest_cpu_user_regs();
+    register_t val = 0;
+    uint8_t psr_mode = (regs->cpsr & PSR_MODE_MASK);
+
+    /* Currently, we handle only ldr/str post indexing instructions */
+    if ( instr->state != INSTR_LDR_STR_POSTINDEXING )
+        return;
+
+    /*
+     * Handle when rn = SP
+     * Refer ArmV8 ARM DDI 0487G.b, Page - D1-2463 "Stack pointer register
+     * selection"
+     * t = SP_EL0
+     * h = SP_ELx
+     * and M[3:0] (Page - C5-474 "When exception taken from AArch64 state:")
+     */
+    if ( instr->rn == 31 )
+    {
+        switch ( psr_mode )
+        {
+        case PSR_MODE_EL1h:
+            val = regs->sp_el1;
+            break;
+        case PSR_MODE_EL1t:
+        case PSR_MODE_EL0t:
+            val = regs->sp_el0;
+            break;
+
+        default:
+            domain_crash(current->domain);
+            return;
+        }
+    }
+    else
+        val = get_user_reg(regs, instr->rn);
+
+    val += instr->imm9;
+
+    if ( instr->rn == 31 )
+    {
+        if ( (regs->cpsr & PSR_MODE_MASK) == PSR_MODE_EL1h )
+            regs->sp_el1 = val;
+        else
+            regs->sp_el0 = val;
+    }
+    else
+        set_user_reg(regs, instr->rn, val);
+}
+
 /*
  * Local variables:
  * mode: C
diff --git a/xen/arch/arm/decode.c b/xen/arch/arm/decode.c
index 3add87e83a..f5f6562600 100644
--- a/xen/arch/arm/decode.c
+++ b/xen/arch/arm/decode.c
@@ -146,8 +146,10 @@ static int decode_arm64(register_t pc, mmio_info_t *info)
 
     update_dabt(dabt, opcode.ldr_str.rt, opcode.ldr_str.size, false);
 
+    dabt_instr->state = INSTR_LDR_STR_POSTINDEXING;
     dabt_instr->rn = opcode.ldr_str.rn;
     dabt_instr->imm9 = opcode.ldr_str.imm9;
+    dabt->valid = 1;
 
     return 0;
 
diff --git a/xen/arch/arm/include/asm/domain.h b/xen/arch/arm/include/asm/domain.h
index c56f6e4398..ed63c2b6f9 100644
--- a/xen/arch/arm/include/asm/domain.h
+++ b/xen/arch/arm/include/asm/domain.h
@@ -281,6 +281,10 @@ static inline void arch_vcpu_block(struct vcpu *v) {}
 /* vPCI is not available on Arm */
 #define has_vpci(d)    ({ (void)(d); false; })
 
+struct arch_vcpu_io {
+    struct instr_details dabt_instr; /* when the instruction is decoded */
+};
+
 #endif /* __ASM_DOMAIN_H__ */
 
 /*
diff --git a/xen/arch/arm/include/asm/mmio.h b/xen/arch/arm/include/asm/mmio.h
index 3354d9c635..ca259a79c2 100644
--- a/xen/arch/arm/include/asm/mmio.h
+++ b/xen/arch/arm/include/asm/mmio.h
@@ -26,12 +26,24 @@
 
 #define MAX_IO_HANDLER  16
 
+enum instr_decode_state
+{
+    INSTR_ERROR,                    /* Error encountered while decoding instr */
+    INSTR_VALID,                    /* ISS is valid, so no need to decode */
+    /*
+     * Instruction is decoded successfully. It is a ldr/str post indexing
+     * instruction.
+     */
+    INSTR_LDR_STR_POSTINDEXING,
+};
+
 typedef struct
 {
     struct hsr_dabt dabt;
     struct instr_details {
         unsigned long rn:5;
         signed int imm9:9;
+        enum instr_decode_state state;
     } dabt_instr;
     paddr_t gpa;
 } mmio_info_t;
@@ -69,14 +81,15 @@ struct vmmio {
 };
 
 enum io_state try_handle_mmio(struct cpu_user_regs *regs,
-                              const union hsr hsr,
-                              paddr_t gpa);
+                              mmio_info_t *info);
 void register_mmio_handler(struct domain *d,
                            const struct mmio_handler_ops *ops,
                            paddr_t addr, paddr_t size, void *priv);
 int domain_io_init(struct domain *d, int max_count);
 void domain_io_free(struct domain *d);
 
+void try_decode_instruction(const struct cpu_user_regs *regs,
+                            mmio_info_t *info);
 
 #endif  /* __ASM_ARM_MMIO_H__ */
 
diff --git a/xen/arch/arm/include/asm/traps.h b/xen/arch/arm/include/asm/traps.h
index 2ed2b85c6f..95c46ad391 100644
--- a/xen/arch/arm/include/asm/traps.h
+++ b/xen/arch/arm/include/asm/traps.h
@@ -109,6 +109,8 @@ static inline register_t sign_extend(const struct hsr_dabt dabt, register_t r)
     return r;
 }
 
+void post_increment_register(const struct instr_details *instr);
+
 #endif /* __ASM_ARM_TRAPS__ */
 /*
  * Local variables:
diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
index fad103bdbd..fd903b7b03 100644
--- a/xen/arch/arm/io.c
+++ b/xen/arch/arm/io.c
@@ -102,57 +102,79 @@ static const struct mmio_handler *find_mmio_handler(struct domain *d,
     return handler;
 }
 
+void try_decode_instruction(const struct cpu_user_regs *regs,
+                            mmio_info_t *info)
+{
+    int rc;
+
+    if ( info->dabt.valid )
+    {
+        info->dabt_instr.state = INSTR_VALID;
+
+        /*
+         * Erratum 766422: Thumb store translation fault to Hypervisor may
+         * not have correct HSR Rt value.
+         */
+        if ( check_workaround_766422() && (regs->cpsr & PSR_THUMB) &&
+             info->dabt.write )
+        {
+            rc = decode_instruction(regs, info);
+            if ( rc )
+            {
+                gprintk(XENLOG_DEBUG, "Unable to decode instruction\n");
+                info->dabt_instr.state = INSTR_ERROR;
+            }
+        }
+        return;
+    }
+
+    /*
+     * Armv8 processor does not provide a valid syndrome for decoding some
+     * instructions. So in order to process these instructions, Xen must
+     * decode them.
+     */
+    rc = decode_instruction(regs, info);
+    if ( rc )
+    {
+        gprintk(XENLOG_ERR, "Unable to decode instruction\n");
+        info->dabt_instr.state = INSTR_ERROR;
+    }
+}
+
 enum io_state try_handle_mmio(struct cpu_user_regs *regs,
-                              const union hsr hsr,
-                              paddr_t gpa)
+                              mmio_info_t *info)
 {
     struct vcpu *v = current;
     const struct mmio_handler *handler = NULL;
-    const struct hsr_dabt dabt = hsr.dabt;
-    mmio_info_t info = {
-        .gpa = gpa,
-        .dabt = dabt
-    };
+    int rc;
 
-    ASSERT(hsr.ec == HSR_EC_DATA_ABORT_LOWER_EL);
+    ASSERT(info->dabt.ec == HSR_EC_DATA_ABORT_LOWER_EL);
 
-    handler = find_mmio_handler(v->domain, info.gpa);
-    if ( !handler )
+    if ( !info->dabt.valid )
     {
-        int rc;
+        ASSERT_UNREACHABLE();
+        return IO_ABORT;
+    }
 
-        rc = try_fwd_ioserv(regs, v, &info);
+    handler = find_mmio_handler(v->domain, info->gpa);
+    if ( !handler )
+    {
+        rc = try_fwd_ioserv(regs, v, info);
         if ( rc == IO_HANDLED )
             return handle_ioserv(regs, v);
 
         return rc;
     }
 
-    /* All the instructions used on emulated MMIO region should be valid */
-    if ( !dabt.valid )
-        return IO_ABORT;
-
     /*
-     * Erratum 766422: Thumb store translation fault to Hypervisor may
-     * not have correct HSR Rt value.
+     * At this point, we know that the instruction is either valid or has been
+     * decoded successfully. Thus, Xen should be allowed to execute the
+     * instruction on the emulated MMIO region.
      */
-    if ( check_workaround_766422() && (regs->cpsr & PSR_THUMB) &&
-         dabt.write )
-    {
-        int rc;
-
-        rc = decode_instruction(regs, &info);
-        if ( rc )
-        {
-            gprintk(XENLOG_DEBUG, "Unable to decode instruction\n");
-            return IO_ABORT;
-        }
-    }
-
-    if ( info.dabt.write )
-        return handle_write(handler, v, &info);
+    if ( info->dabt.write )
+        return handle_write(handler, v, info);
     else
-        return handle_read(handler, v, &info);
+        return handle_read(handler, v, info);
 }
 
 void register_mmio_handler(struct domain *d,
diff --git a/xen/arch/arm/ioreq.c b/xen/arch/arm/ioreq.c
index 308650b400..cc9bf23213 100644
--- a/xen/arch/arm/ioreq.c
+++ b/xen/arch/arm/ioreq.c
@@ -47,6 +47,8 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
                              struct vcpu *v, mmio_info_t *info)
 {
     struct vcpu_io *vio = &v->io;
+    struct instr_details instr = info->dabt_instr;
+    struct hsr_dabt dabt = info->dabt;
     ioreq_t p = {
         .type = IOREQ_TYPE_COPY,
         .addr = info->gpa,
@@ -76,10 +78,10 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
     if ( !s )
         return IO_UNHANDLED;
 
-    if ( !info->dabt.valid )
-        return IO_ABORT;
+    ASSERT(dabt.valid);
 
     vio->req = p;
+    vio->info.dabt_instr = instr;
 
     rc = ioreq_send(s, &p, 0);
     if ( rc != IO_RETRY || v->domain->is_shutting_down )
@@ -95,6 +97,7 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
 bool arch_ioreq_complete_mmio(void)
 {
     struct vcpu *v = current;
+    struct instr_details dabt_instr = v->io.info.dabt_instr;
     struct cpu_user_regs *regs = guest_cpu_user_regs();
     const union hsr hsr = { .bits = regs->hsr };
 
@@ -106,6 +109,7 @@ bool arch_ioreq_complete_mmio(void)
 
     if ( handle_ioserv(regs, v) == IO_HANDLED )
     {
+        post_increment_register(&dabt_instr);
         advance_pc(regs, hsr);
         return true;
     }
diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
index 7a1b679b8c..53652d7781 100644
--- a/xen/arch/arm/traps.c
+++ b/xen/arch/arm/traps.c
@@ -1893,6 +1893,21 @@ static bool try_map_mmio(gfn_t gfn)
     return !map_regions_p2mt(d, gfn, 1, mfn, p2m_mmio_direct_c);
 }
 
+static inline bool check_p2m(bool is_data, paddr_t gpa)
+{
+    /*
+     * First check if the translation fault can be resolved by the P2M subsystem.
+     * If that's the case nothing else to do.
+     */
+    if ( p2m_resolve_translation_fault(current->domain , gaddr_to_gfn(gpa)) )
+        return true;
+
+    if ( is_data && try_map_mmio(gaddr_to_gfn(gpa)) )
+        return true;
+
+    return false;
+}
+
 static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
                                        const union hsr hsr)
 {
@@ -1906,6 +1921,8 @@ static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
     paddr_t gpa;
     uint8_t fsc = xabt.fsc & ~FSC_LL_MASK;
     bool is_data = (hsr.ec == HSR_EC_DATA_ABORT_LOWER_EL);
+    mmio_info_t info;
+    enum io_state state;
 
     /*
      * If this bit has been set, it means that this stage-2 abort is caused
@@ -1959,21 +1976,52 @@ static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
         return;
     }
     case FSC_FLT_TRANS:
+    {
+        info.gpa = gpa;
+        info.dabt = hsr.dabt;
+
         /*
-         * Attempt first to emulate the MMIO as the data abort will
-         * likely happen in an emulated region.
-         *
-         * Note that emulated region cannot be executed
+         * Assumption :- Most of the times when we get a data abort and the ISS
+         * is invalid or an instruction abort, the underlying cause is that the
+         * page tables have not been set up correctly.
          */
-        if ( is_data )
+        if ( !is_data || !info.dabt.valid )
         {
-            enum io_state state = try_handle_mmio(regs, hsr, gpa);
+            if ( check_p2m(is_data, gpa) )
+                return;
 
-            switch ( state )
-            {
+            /*
+             * If the instruction abort could not be resolved by setting the
+             * appropriate bits in the translation table, then Xen should
+             * forward the abort to the guest.
+             */
+            if ( !is_data )
+                goto inject_abt;
+        }
+
+        try_decode_instruction(regs, &info);
+
+        /*
+         * If Xen could not decode the instruction or encountered an error
+         * while decoding, then it should forward the abort to the guest.
+         */
+        if ( info.dabt_instr.state == INSTR_ERROR )
+            goto inject_abt;
+
+        state = try_handle_mmio(regs, &info);
+
+        switch ( state )
+        {
             case IO_ABORT:
                 goto inject_abt;
             case IO_HANDLED:
+                /*
+                 * If the instruction was decoded and has executed successfully
+                 * on the MMIO region, then Xen should execute the next part of
+                 * the instruction. (for eg increment the rn if it is a
+                 * post-indexing instruction.
+                 */
+                post_increment_register(&info.dabt_instr);
                 advance_pc(regs, hsr);
                 return;
             case IO_RETRY:
@@ -1982,21 +2030,18 @@ static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
             case IO_UNHANDLED:
                 /* IO unhandled, try another way to handle it. */
                 break;
-            }
         }
 
         /*
-         * First check if the translation fault can be resolved by the
-         * P2M subsystem. If that's the case nothing else to do.
+         * If the instruction syndrome was invalid, then we already checked if
+         * this was due to a P2M fault. So no point to check again as the result
+         * will be the same.
          */
-        if ( p2m_resolve_translation_fault(current->domain,
-                                           gaddr_to_gfn(gpa)) )
-            return;
-
-        if ( is_data && try_map_mmio(gaddr_to_gfn(gpa)) )
+        if ( (info.dabt_instr.state == INSTR_VALID) && check_p2m(is_data, gpa) )
             return;
 
         break;
+    }
     default:
         gprintk(XENLOG_WARNING,
                 "Unsupported FSC: HSR=%#"PRIregister" DFSC=%#x\n",
diff --git a/xen/arch/x86/include/asm/ioreq.h b/xen/arch/x86/include/asm/ioreq.h
index d06ce9a6ea..ecfe7f9fdb 100644
--- a/xen/arch/x86/include/asm/ioreq.h
+++ b/xen/arch/x86/include/asm/ioreq.h
@@ -26,6 +26,9 @@
 #include <asm/hvm/ioreq.h>
 #endif
 
+struct arch_vcpu_io {
+};
+
 #endif /* __ASM_X86_IOREQ_H__ */
 
 /*
diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
index 10ea969c7a..406d9bc610 100644
--- a/xen/include/xen/sched.h
+++ b/xen/include/xen/sched.h
@@ -160,6 +160,8 @@ struct vcpu_io {
     /* I/O request in flight to device model. */
     enum vio_completion  completion;
     ioreq_t              req;
+    /* Arch specific info pertaining to the io request */
+    struct arch_vcpu_io  info;
 };
 
 struct vcpu
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 17:45:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 17:45:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288561.489387 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMqw-0003qT-Ic; Thu, 10 Mar 2022 17:45:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288561.489387; Thu, 10 Mar 2022 17:45:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMqw-0003qI-Ec; Thu, 10 Mar 2022 17:45:30 +0000
Received: by outflank-mailman (input) for mailman id 288561;
 Thu, 10 Mar 2022 17:45:28 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=i5Vk=TV=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nSMqu-0002fW-Jx
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 17:45:28 +0000
Received: from NAM11-CO1-obe.outbound.protection.outlook.com
 (mail-co1nam11on20600.outbound.protection.outlook.com
 [2a01:111:f400:7eab::600])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id dda620cb-a099-11ec-853a-5f4723681683;
 Thu, 10 Mar 2022 18:45:26 +0100 (CET)
Received: from DM5PR2001CA0023.namprd20.prod.outlook.com (2603:10b6:4:16::33)
 by MN2PR02MB6222.namprd02.prod.outlook.com (2603:10b6:208:186::23)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Thu, 10 Mar
 2022 17:45:23 +0000
Received: from DM3NAM02FT053.eop-nam02.prod.protection.outlook.com
 (2603:10b6:4:16:cafe::c6) by DM5PR2001CA0023.outlook.office365.com
 (2603:10b6:4:16::33) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.23 via Frontend
 Transport; Thu, 10 Mar 2022 17:45:23 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (149.199.80.198) by
 DM3NAM02FT053.mail.protection.outlook.com (10.13.5.35) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5061.22 via Frontend Transport; Thu, 10 Mar 2022 17:45:22 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Thu, 10 Mar 2022 17:45:21 +0000
Received: from smtp.xilinx.com (172.21.105.198) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Thu, 10 Mar 2022 17:45:21 +0000
Received: from [10.108.8.223] (port=47674 helo=xcbayankuma41x.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nSMqn-00062C-5M; Thu, 10 Mar 2022 17:45:21 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: dda620cb-a099-11ec-853a-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=l9rW8e3nlyxAPZhmTZO2hZmr5KYrg7E9eC+v0/xzN/uvkIKEMDNyAeFy77NryyT+nDbn2F5dB4szITsXv27pL3DBueUyLgvxXqzEuhRCcMHrnUsOCwC/GeFQk+DhuOEUF7TCKs/btZD9tYfdUKrNsTZgvTaVDoKyd5dma0qgjwdXStVIyMvHmR3eN7h4X/9SuJ8yZWaSNzyi5wXczbhLii9H+JyoeYd3WQBmLfSWSJHJ2T9NGPmveIBRCNNly4B9DPa+eumfGIXxAXTAuaIIQhPekpLCS73uWmK3nL9AYBpt9gPSek+WtgXbjoWNhdGZ898dBp/L5uEjOdxlQL3AwA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=+xhAyzOJKcFQjR6pp7HDy+csplKGaoofhTDl9R0cDo8=;
 b=YBihvOkKUEXYjuRKLNWgDc+oWC3y7rj2dU395NdaRgSelO4sn8bm4pLR3NzvZd/QBVfN5bzAVRN/uejqsuobZMDCbx8IwRpeDIiyJNeLPL2VxWMTuUz2RLQA0sDyV+yuUv9DlvEmmeZqOnctHrdHnzX6FsN9a/u7UeBI9pd15Jb/UMxh2oDHyr6aru3tgKIZTFlbnzQDMC1Ip0E9Fm7hQtxr5WA+LLmyPuPwWpqk+38SybGqNYh9l0c4B3b0Je9TZw5Vk0rATijx8CT9mlndP8yYVzsZQciBLp8pE8GEYbgZTuDuwAPCAXwsxpf5uEAC0rfcN8Hh++NDsc0Sas7vKQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=+xhAyzOJKcFQjR6pp7HDy+csplKGaoofhTDl9R0cDo8=;
 b=GU8uyhQwohfsXpme0ENnovUH9p0KHEmxqk/Hk+CuK5SMcfvJ37Ae4/Hqa0KdoKUmdqDmE1Q0Jwugm/8pgedGAVzT4kEJj4weDrKMdlThlr8BtYSaNenCyxvjA4c6IV/ARNxhzMJHLieQMXPe5V7vnZfn+v6qN0DyzIl2cim0pIY=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch01.xlnx.xilinx.com;
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <stefanos@xilinx.com>, <julien@xen.org>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>, Ayan Kumar Halder
	<ayankuma@xilinx.com>
Subject: [XEN v10 4/4] xen/arm64: io: Handle data abort due to cache maintenance instructions
Date: Thu, 10 Mar 2022 17:45:01 +0000
Message-ID: <20220310174501.62040-5-ayankuma@xilinx.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220310174501.62040-1-ayankuma@xilinx.com>
References: <20220310174501.62040-1-ayankuma@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: eb30c7df-e11e-4db7-119e-08da02bdc091
X-MS-TrafficTypeDiagnostic: MN2PR02MB6222:EE_
X-Microsoft-Antispam-PRVS:
	<MN2PR02MB6222A916D39C8E3C4EC6AFDFB20B9@MN2PR02MB6222.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch01.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(6666004)(7636003)(40460700003)(4326008)(7696005)(356005)(70586007)(70206006)(8676002)(508600001)(2906002)(7416002)(82310400004)(2616005)(186003)(83380400001)(36860700001)(8936002)(9786002)(47076005)(1076003)(107886003)(5660300002)(36756003)(26005)(336012)(426003)(54906003)(316002)(6916009)(102446001);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2022 17:45:22.6185
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: eb30c7df-e11e-4db7-119e-08da02bdc091
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch01.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DM3NAM02FT053.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR02MB6222

When the data abort is caused due to cache maintenance for an address,
there are three scenarios:-

1. Address belonging to a non emulated region - For this, Xen should
set the corresponding bit in the translation table entry to valid and
return to the guest to retry the instruction. This can happen sometimes
as Xen need to set the translation table entry to invalid. (for eg
'Break-Before-Make' sequence). Xen returns to the guest to retry the
instruction.

2. Address belongs to an emulated region - Xen should ignore the
instruction (ie increment the PC) and return to the guest.

3. Address is invalid - Xen should forward the data abort to the guest.

Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
---

Changelog:-

v1...v8 - NA

v9 - Extracted this change from "[XEN v7 2/2] xen/arm64: io: Support
instructions (for which ISS is not ..." into a separate patch of its
own. The reason being this addresses an existing bug in the codebase.

v10 - 1. To check if the address belongs to an emulated region, one
needs to check if it has a mmio handler or an ioreq server. In this
case, Xen should increment the PC
2. If the address is invalid (niether emulated MMIO nor the translation
could be resolved via p2m or mapping the MMIO region), then Xen should
forward the abort to the guest.

 xen/arch/arm/include/asm/mmio.h |  1 +
 xen/arch/arm/io.c               | 20 ++++++++++++++++++++
 xen/arch/arm/ioreq.c            | 15 ++++++++++++++-
 3 files changed, 35 insertions(+), 1 deletion(-)

diff --git a/xen/arch/arm/include/asm/mmio.h b/xen/arch/arm/include/asm/mmio.h
index ca259a79c2..79e64d9af8 100644
--- a/xen/arch/arm/include/asm/mmio.h
+++ b/xen/arch/arm/include/asm/mmio.h
@@ -35,6 +35,7 @@ enum instr_decode_state
      * instruction.
      */
     INSTR_LDR_STR_POSTINDEXING,
+    INSTR_CACHE,                    /* Cache Maintenance instr */
 };
 
 typedef struct
diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
index e6c77e16bf..c5b2980a5f 100644
--- a/xen/arch/arm/io.c
+++ b/xen/arch/arm/io.c
@@ -139,6 +139,17 @@ void try_decode_instruction(const struct cpu_user_regs *regs,
         return;
     }
 
+    /*
+     * When the data abort is caused due to cache maintenance, Xen should check
+     * if the address belongs to an emulated MMIO region or not. The behavior
+     * will differ accordingly.
+     */
+    if ( info->dabt.cache )
+    {
+        info->dabt_instr.state = INSTR_CACHE;
+        return;
+    }
+
     /*
      * Armv8 processor does not provide a valid syndrome for decoding some
      * instructions. So in order to process these instructions, Xen must
@@ -177,6 +188,15 @@ enum io_state try_handle_mmio(struct cpu_user_regs *regs,
         return rc;
     }
 
+    /*
+     * When the data abort is caused due to cache maintenance and the address
+     * belongs to an emulated region, Xen should ignore this instruction.
+     */
+    if ( info->dabt_instr.state == INSTR_CACHE )
+    {
+        return IO_HANDLED;
+    }
+
     /*
      * At this point, we know that the instruction is either valid or has been
      * decoded successfully. Thus, Xen should be allowed to execute the
diff --git a/xen/arch/arm/ioreq.c b/xen/arch/arm/ioreq.c
index cc9bf23213..0dd2d452f7 100644
--- a/xen/arch/arm/ioreq.c
+++ b/xen/arch/arm/ioreq.c
@@ -29,10 +29,14 @@ enum io_state handle_ioserv(struct cpu_user_regs *regs, struct vcpu *v)
     const struct hsr_dabt dabt = hsr.dabt;
     /* Code is similar to handle_read */
     register_t r = v->io.req.data;
+    const struct instr_details instr = v->io.info.dabt_instr;
 
     /* We are done with the IO */
     v->io.req.state = STATE_IOREQ_NONE;
 
+    if ( instr.state == INSTR_CACHE )
+        return IO_HANDLED;
+
     if ( dabt.write )
         return IO_HANDLED;
 
@@ -47,7 +51,7 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
                              struct vcpu *v, mmio_info_t *info)
 {
     struct vcpu_io *vio = &v->io;
-    struct instr_details instr = info->dabt_instr;
+    const struct instr_details instr = info->dabt_instr;
     struct hsr_dabt dabt = info->dabt;
     ioreq_t p = {
         .type = IOREQ_TYPE_COPY,
@@ -78,6 +82,15 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
     if ( !s )
         return IO_UNHANDLED;
 
+    /*
+     * When the data abort is caused due to cache maintenance and the address
+     * belongs to an emulated region, Xen should ignore this instruction.
+     */
+    if ( instr.state == INSTR_CACHE )
+    {
+        return IO_HANDLED;
+    }
+
     ASSERT(dabt.valid);
 
     vio->req = p;
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 17:52:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 17:52:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288580.489399 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMxV-0006ZO-F8; Thu, 10 Mar 2022 17:52:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288580.489399; Thu, 10 Mar 2022 17:52:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSMxV-0006ZH-B3; Thu, 10 Mar 2022 17:52:17 +0000
Received: by outflank-mailman (input) for mailman id 288580;
 Thu, 10 Mar 2022 17:52:16 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=jEEf=TV=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nSMxU-0006ZB-H3
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 17:52:16 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d15eeab4-a09a-11ec-853a-5f4723681683;
 Thu, 10 Mar 2022 18:52:14 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 1053BB82794;
 Thu, 10 Mar 2022 17:52:14 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 430B2C340E8;
 Thu, 10 Mar 2022 17:52:12 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d15eeab4-a09a-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646934732;
	bh=EibqyvZ2uaiAGPgf3LcwpDdQJvPaXhwvTgjJ+0WaCKE=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=R2l5+XKsK1iHvGGtTTqXoVQYMm15odSGmOfQeG+3JBBoYYN/EGwizUsKKbW+RPCU/
	 rYZMRLgNhSeeol9zZHBbOuapap+oq3vIfV9bIk0gbIRuqc9f2Usje8AnfHoXSIntSn
	 sshVBaeiy87gRbbvEURWV9INLhKzBEdGD1oD69h5LpqwIKpVKw4PCHChd5gam561cG
	 5ZCdgoeXBml7xrcKJIKJBRFczo0Ph+UX104iaz+0dfMiOeg9Ib+oQR33TWJssdb4cx
	 4Jgxu1zcYu6A/TebFgivNDUKoa+/1QkJlhbzo8moZBl0zsRHSZqNEQabOKpQ5m7WlS
	 Jif201jiIbDOA==
Date: Thu, 10 Mar 2022 09:52:11 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Julien Grall <julien@xen.org>
cc: Bertrand Marquis <Bertrand.Marquis@arm.com>, 
    Jan Beulich <jbeulich@suse.com>, 
    "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, 
    George Dunlap <george.dunlap@citrix.com>, 
    Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>, 
    Anthony Perard <anthony.perard@citrix.com>
Subject: Re: preparations for 4.16.1
In-Reply-To: <3c7b7e00-1134-2ce3-26e7-b3d11782daaa@xen.org>
Message-ID: <alpine.DEB.2.22.394.2203100951290.3261@ubuntu-linux-20-04-desktop>
References: <b9be95eb-7a6e-9f1b-6b68-6d08d6329cd1@suse.com> <4fe170af-9120-0203-bed9-895380a2ff0a@xen.org> <4DE5BBE4-F228-4584-81AD-D0A41858FDB9@arm.com> <3c7b7e00-1134-2ce3-26e7-b3d11782daaa@xen.org>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Thu, 10 Mar 2022, Julien Grall wrote:
> On 10/03/2022 10:02, Bertrand Marquis wrote:
> > Hi,
> > > On 10 Mar 2022, at 09:04, Julien Grall <julien@xen.org> wrote:
> > > On 10/03/2022 08:57, Jan Beulich wrote:
> > > > the release is due in a few weeks time.
> > > > Please point out backports you find missing from the respective staging
> > > > branch, but which you consider relevant. One I have queued already, but
> > > > which I'd like to put in only once the pending fix to it ("x86: avoid
> > > > SORT_BY_INIT_PRIORITY with old GNU ld") has also landed in staging, is
> > > > 4b7fd8153ddf x86: fold sections in final binaries
> > > 
> > > For arm, I would like to propose backporting:
> > > 
> > > 32365f3476: xen/arm64: Zero the top 32 bits of gp registers on entry...
> > > 
> > 
> > Agree (not changing the fact that Stefano should confirm)
> > 
> > I would like the following one to also be considered:
> > f3999bc: arm/efi: Handle Xen bootargs from both xen.cfg and DT
> > f1f38e2: xen/arm: increase memory banks number define value
> 
> I am fine with both.

Agree and done


From xen-devel-bounces@lists.xenproject.org Thu Mar 10 18:02:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 18:02:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288588.489421 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSN6q-0008G0-F8; Thu, 10 Mar 2022 18:01:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288588.489421; Thu, 10 Mar 2022 18:01:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSN6q-0008Ft-C4; Thu, 10 Mar 2022 18:01:56 +0000
Received: by outflank-mailman (input) for mailman id 288588;
 Thu, 10 Mar 2022 18:01:54 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=XE96=TV=citrix.com=prvs=0613c794d=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nSN6o-0008Fn-BD
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 18:01:54 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 29792092-a09c-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 19:01:52 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 29792092-a09c-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646935312;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=dutXrCMyPCT3EF4xQMJwBzi2O1s157h9DnmoUvOyd7o=;
  b=TxabfpyuPgg3y2O6jYd1KniuYAhXYldTOh9pdj4x+SPtSsu4zOhMbu8K
   WRpL4OAJLif87KzREj4TjV5tgvKSQYuUfOlLL2ohDxcuetHOHGYCenS3P
   +62jTLJStSJVY5ZSnmhc6WAo3FG2xaqxG32ot1+y/l1QwZQX9oxBt4nx4
   Y=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65951792
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:/ra2DK/u2it8Cx4nlOPfDrUDtn6TJUtcMsCJ2f8bNWPcYEJGY0x3y
 TEWCmyAaanfZGrwL9okPdnk80wHuZGDzt8wHgI6+yg8E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oHhW1nlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnay+UgsMEKCWobQyAgV3S3lzHo1kw6CSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFKoZtmtt0nfyCvE+TIqYa67L+cVZzHE7gcUm8fP2O
 ZdINGMwPU6ojxtneRAYLJ83kdqToXThMCN/pmKSroYo7D2GpOB2+Oe0a4eEEjCQfu1ZmUuSq
 2bu9mHwEBYcctCSoRKH73ati+nnjS79HoUIG9WQ5vNsxVGe2GEXIBkXTkeg5+m0jFakXNBSI
 FBS/TAhxYAx80qxR9W7QBy8o1aDpBcXX9cWGOo/gDxh0YKNvVzfXDJdCGccNpp276faWADGy
 He5kcjlIBJi6oTFZiOB2e/MoBCSGxMKeDpqiTA/cSMJ5NzqoYcWhx3JT8p+HKPdsuAZCQ0c0
 BjR8nFg2ux7YdojkvzioAuZ227ESo3hE1Ztjjg7SF5J+e+QiGSNQ4WzoWbW4v9bRGpyZgnQ5
 SNU8yRyAQ1nMH1sqMBvaLhVdF1Kz6zcWNE5vbKJN8N/n9hK0yT/Fb28GBkkeC9U3j8sIFcFm
 nP7twJL/4N0N3C3d6JxaI/ZI510kfawSI2+DaiKPoQmjn1NmOmvpnEGiam4hTyFraTRuftnZ
 cfznTiEUR729piLPBLpHrxAgNfHNwg1xH/JRICT8vhU+eH2WZJhcp9caAHmRrlgtMus+VyJm
 /4CZ5ri40gOC4XWP3iImbP/2HhXdBDX87it8JcJHgNCSyI7cFwc5wj5mupwJdY6w/wLyo8lP
 BiVAydl9bY2vlWeQS2iYXF/crL/G5F5qHMwJys3Oli0nXMkZO6SAG03LfPboZFPGDRf8MNJ
IronPort-HdrOrdr: A9a23:OWwx3aq0dt8+/AGJXeZF1hwaV5txLNV00zEX/kB9WHVpm5Oj5q
 KTdaUgpHzJYWgqOE3IwerwRpVoMkmshKKdgLNhf4tKMzOWwldAQLsSircKhgeQZBEWldQtkJ
 uIEZIOdeEYZGIS5auXj2fYYrNQpOVvsprY+ds2p00dEj2CAJsQljuRfzzraXGeMzM2fabReq
 DsgPav4ADKRZ0QVK6GL0hAe9KGi8zAlZrgbxJDLQUg8hOygTSh76O/OwSE3z8FOgk/hYsKwC
 zgqUjU96+ju/a0xlv3zGnI9albn9Pn159qGNGMsM4IMT/h4zzYI7iJGofy+gzdktvfsGrCo+
 O8+CvI+P4DsU85S1vF+CcFHTOQjQrGpUWSlWNwykGT0fARDAhKePapw7gpLCcxonBQy+2VCM
 9wrhCkX0E7N2K0oMwmiuK4Iy1Chw66p2EvnvUUiGEaWYwCaKVJpYha509NFowcdRiKqbzPv9
 MeR/00ycwmPm9yVUqp8FWHAebcFEgbD1ODWAwPq8aV2z9ZkDRwyFYZ3tUWmjMF+IgmQ5dJ6u
 zYOuAw/Ys+DfM+fOZ4HqMMUMG3AmvCTVbFN3+TO03uEOUCN2jWo5D67b0p7KWheYAOzpE1hJ
 PdOWko9VIaagbrE4mDzZdL+hfCTCG0Wins0NhX49xjtrj1VNPQQGG+oZAV4oadStkkc4Tmsq
 yISeRr6tfYXCPTJbo=
X-IronPort-AV: E=Sophos;i="5.90,171,1643691600"; 
   d="scan'208";a="65951792"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=KFAb8lapqIwu5xEZYQPrNOxkNZwypVvDfG9s4a59SrdLZktIAEZE910Ivm0upUl27UV97brZLZMUtp94B8+C5WDoEl+epO+oUcVwCUFhT2BP0aABOLuRiCfpWUQfw/zzAZUuVDOTkFdKOSdY27aw1KKob/YT86Gh7ix28rrgB9CWgvN5bta6hXh3ZdeXgANyhGYKwAbU33CvINZh76qD+PDFL1qKO1i7kC0BCghHCabX5Ts1rsO0YL5rYjWk/JE9HStiUduykf6SlWSCP2MNeN79ViuTyM/6cgApoKoNBB6aoOWbdG+uTkqYoVAwdUm6m2siGjDDDzJeu3o2lnMDZw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=dutXrCMyPCT3EF4xQMJwBzi2O1s157h9DnmoUvOyd7o=;
 b=hRFmy6YCzdutdgcdtlvhtAnbltcvSH7wuypivjicnSuzvU8bNEV/B2VRzO5ijb1DseNQdWKHJ/NvxL/tsRl7Ds0KZyrSSJgYPOFSdRbzy4/z/6gM5aZzIE7bLBmc1EerSfXIRCmL3NrR0wN4+EabT3rq8cFdRjUGrfAFUUYG+5jx+7Y1KwwM4S/3i1gK2vXjDzklj85WSbOvqapzrwHnmhuVQ6SsT8/ZGH/+FqiKg60LP6DR86MSD6tvjYYR/rsNGoIGfJDkBoOG2xm0LRc83Oofha/JNMBA4BeRw7sM4d671SJ3BovvGmSS3ewrfAmbYlz2CxZngUx/5yJrI5wb8w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=dutXrCMyPCT3EF4xQMJwBzi2O1s157h9DnmoUvOyd7o=;
 b=aSQKJu5nXfjf7mplHr5R/hTu8LzfXAFspQA9YARZ+aqezeYK+6piNj/J4ZxrbgLKP9oUIte6kW/2m9uO7Qct2AvXYZveIcZKuhg6ch1xIwvZMOtYAuMMaaozwxTWEbOMhbmGYJ2eHQgety8xmmGymkCdcP1cbJzuw+NEYTmFE24=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Roger Pau Monne <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "Ross
 Lagerwall" <ross.lagerwall@citrix.com>, "konrad.wilk@oracle.com"
	<konrad.wilk@oracle.com>, "doebel@amazon.de" <doebel@amazon.de>,
	"julien@xen.org" <julien@xen.org>
Subject: Re: [PATCH 4/4] livepatch: differentiate between old and new build
 systems
Thread-Topic: [PATCH 4/4] livepatch: differentiate between old and new build
 systems
Thread-Index: AQHYLkHgSrb/iAL0mEi291/GjB3zE6y1l+sAgAAD5ACAA1l+gA==
Date: Thu, 10 Mar 2022 18:01:48 +0000
Message-ID: <3e285745-9cc3-4f9a-ec27-fe917faa4547@citrix.com>
References: <20220302142711.38953-1-roger.pau@citrix.com>
 <20220302142711.38953-5-roger.pau@citrix.com>
 <32b098c1-963f-2e03-84bb-c8db410c8554@citrix.com>
 <Yidtuq8YUq+SbY7C@Air-de-Roger>
In-Reply-To: <Yidtuq8YUq+SbY7C@Air-de-Roger>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 339f64c0-2c27-40bb-9577-08da02c00bcb
x-ms-traffictypediagnostic: CY4PR03MB2712:EE_
x-microsoft-antispam-prvs: <CY4PR03MB27125FDEE8B29E6FB703430ABA0B9@CY4PR03MB2712.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(31686004)(8936002)(71200400001)(6512007)(2616005)(316002)(83380400001)(26005)(186003)(53546011)(36756003)(6636002)(37006003)(6506007)(38070700005)(54906003)(2906002)(6486002)(86362001)(31696002)(8676002)(6862004)(4326008)(5660300002)(508600001)(66476007)(76116006)(66556008)(82960400001)(122000001)(38100700002)(66946007)(66446008)(64756008)(91956017)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?Y1FSeEZ2MVJFVTBBS3IwTmc1bE1iNjBSTjZ6TjN2TUdtVkRhVytkWjU3NHRB?=
 =?utf-8?B?NDRPc0M4WmtwaDZ2UW9mK1BWQUpRdEhRb0tTbTBDZ3ZadDlZRTJZalpaelN2?=
 =?utf-8?B?Q0R6NjRON0VTMTVPbHl1VEFvMUJoSGtMOWwxWjZzRGppU01tTkVvVUpYZjdU?=
 =?utf-8?B?N2cwblZCZUhrR0VtemFvcEpPaGtTQklHUUFIdldFVHJ6R3paZkhPSzBpZkNr?=
 =?utf-8?B?NUFIdUNQOE40ZFgwclVzTEh1a1Yzb1E0Y0VLS3J1bW1pVnBXdWQ1RjhGcSs0?=
 =?utf-8?B?MW8wd2FrQUVwWHFKODVmU1FPQ2lWY2xBUlZOdHoza0RZb2h4WEhQS2dEc0Zq?=
 =?utf-8?B?TEhJcWdvWDN1OHhPclUwclhxaUZuclozV0ZYZ2ViUThUVnRBaEJhcEliYzln?=
 =?utf-8?B?dy9DWWtieEFxVXF5QjhHQUp1d2RYR21NTHpBeU8rcFM0amR4QlcwUit1azVY?=
 =?utf-8?B?Ym5zbDROWFJOTkF6WkdqOFVZQzhFMnk0YVlHemVvUUcvZ1hJMGk2eVptYXRQ?=
 =?utf-8?B?Rk9jMFU1Ti96dkxURzh3bjRNSEpMVDJqWFVhVEtPd2NyWmQ2ejFHZnh3ZCtY?=
 =?utf-8?B?TXkwQmEybmZieHk4aVdDYXNSWmFySXlJRm1MaUJhRnNiZzIvQnYrdkJqcUpo?=
 =?utf-8?B?QitQUEFTc0dTSCtMakE4bnIrTjc5NnBxa0ZEQnBaTVB2UjRha0t3eDRrTHZp?=
 =?utf-8?B?aTVBaUkzcitjY3FmQWZOK2J6c1A3NjBWNmFPcDYxZEJMUTRqaTI0QklVR3VU?=
 =?utf-8?B?eXZhOVdnNXZkcUhqRGMvRlNmcmlJWStZSlJ1UE0vakU0a1NONmxRZXVFYlBO?=
 =?utf-8?B?L1MrS0tDWTljRkErRUgyTEFSOGw3bFlRNXU4VlRETENDWHMyVkgvWGs5OGY0?=
 =?utf-8?B?dzhvNzlpTGViUitreEptRGlEZjJpMFd1TGMxSjJUTVo2Z0dmLzJuUzBVMEdh?=
 =?utf-8?B?YUszVS9SM0FnMGhCNHVuSjZ6czdyemo0d2cySzUxNStxVStMRm1DMHN4V2Ex?=
 =?utf-8?B?bS9pNGp6UDBtWnIrc2RaOXJXVFg2NWhBV2pkR3E3UXV4V2ZLS1ZkQ2l6VkZ2?=
 =?utf-8?B?N21XNjdQRE9wQ3lWRmh1V0tENHF5WURuc2RzSktIWFRyZ1VxdDRuMUNIYnpw?=
 =?utf-8?B?dktDL243VWJPeWhGKzQweGlUL0hkMTlUSmJjQTh3a1lSZkVvZmlvbDl4VEdN?=
 =?utf-8?B?aGlDT2c5Zlg5TTcwUHQ0anhiVzhpWnRmNFBrL3VtblpjTnErb1YyZTFOZ3Q4?=
 =?utf-8?B?R1NvdkJDKzc1RVluZ1FpakJaZDZZMngrdHFDekFXNnFaZTJJQVlxamZxQlNs?=
 =?utf-8?B?QnRqenJwZWJzdytncGZZQ0FTZm5pamgyVVRPc0FxejNzVEpkdS95UWVOQWNx?=
 =?utf-8?B?dVk3RDR3aTh2RE9vbzFVZUp2VGNNbUNhanpIaTlzYkFkV2xKR0s5cXdhb1hM?=
 =?utf-8?B?WHFhencyZ1gza0xkQUlyRlZFbm81T0VrRUNBRkFvbVRLaHMrb0xJUm9mMlM4?=
 =?utf-8?B?ZDBIQlpqU0dzVFVISU9ySHhDQ1BSOEYyS291L2RMTGZmNHlJd09Qd0EraXY1?=
 =?utf-8?B?b28zcFVlTFcvUjFwVW1pZFUxWWcvQWxVNXpWaUNacERJN2djczk5RkpNTjhL?=
 =?utf-8?B?MDFDMEtSWDJqdnhKZEkvTFlkdEtOeWJZNUtTUk1Ec29FREptSjA1U09rYURB?=
 =?utf-8?B?Rk5XWU1XaFZzZEVYa1EvRFp4enJ0bnAyMmQvZlQrRGVXbUZjVmN0RUxQVGQz?=
 =?utf-8?B?SFd6dEhvam1iQy9KTmdPN3gyMjNpcWYwdVRsUXV5NzF5MnBUdlBZVmVvdi9z?=
 =?utf-8?B?NWk1ei84NURaRU5RZ3dwaFdLL0NCNmhTYnFRRW1WK0RBRU1GcE16YTVHeVBU?=
 =?utf-8?B?NWJKTE5OUEhCSVRBTVhHWXdCdjJDRW9PS0dHSGlLV254T0diUmxCd1ZjeTlH?=
 =?utf-8?Q?frOSgI/jPMRMa7cWO84ik3TcSC/zqE7X?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <939BF42D7B03C1438E668EEE03B45C6D@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 339f64c0-2c27-40bb-9577-08da02c00bcb
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Mar 2022 18:01:48.0589
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: t++6ODWtNsGnHnoKwNcr+KfgjLMEkprQsoGnwdp8zyMH2gCwOhGwCj85fgYvifzI/8ZCSSDqGjhJV4PkH2ytWbDVWMUfjRAbZ/6NCTjuWJk=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR03MB2712
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Thu Mar 10 18:42:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 18:42:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288592.489433 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSNju-00042S-Hl; Thu, 10 Mar 2022 18:42:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288592.489433; Thu, 10 Mar 2022 18:42:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSNju-00042L-EC; Thu, 10 Mar 2022 18:42:18 +0000
Received: by outflank-mailman (input) for mailman id 288592;
 Thu, 10 Mar 2022 18:42:17 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=XE96=TV=citrix.com=prvs=0613c794d=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nSNjs-00042D-Ob
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 18:42:17 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id cc99944f-a0a1-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 19:42:14 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cc99944f-a0a1-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646937734;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=nVI4z8iNBd/kRyEyeVnYFlnzBShQ15AmHDIeSwR6WJ8=;
  b=CbD8JLRr7Y5ZIYxcOTo4cN3Xg1gAgBEaUNktT4G+ZfZSMGsrOCiU1NDn
   UJxiXxqwLzrbyx21vgW7tqTHzTxbtiirrI53i1d0erqRGnzP1BXiMXXgf
   foiISR+R3kGC96KYvt7rj6Zy0TsskK+hiXQL/P4GVHQLGRyhInvQC0bJn
   g=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66347577
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:Rb7zMKoZEihWxiUGfBRYfUZjDDheBmLQZRIvgKrLsJaIsI4StFCzt
 garIBnTPKzcYDH9f91/bNng9kIP6MWHz4BlGgE4/ntkRiMTpZuZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 Iuq+aUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBBIjyg94HSURkCjByMYl05aT2LX3imJnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVI5DfVF/s5B7vERL3H/4Rw1zYsnMFeW/3ZY
 qL1bBIxMk+cPEAQZT/7Dro/ksf4ily8TAFx62C5p4Q7yUvxzwJuhe2F3N39JYXRGJQ9clyjj
 mfF4kzwBxgIM9rZxTft2ne0ge/LlCj4cIsXHa+/8LhmjTW71mEVTREbS1a/if24kVKlHcJSL
 VQO/SgjprR081akJvH/VRClpH+PvjYHRsFdVeY97Wml1a788wufQG8eQVZpZNsrvsIybTUv3
 02OmZXlCFRSXKa9ECzHsO3O9HXrZHZTfTRqiTI4oRUt2fzdu7splE/zV8dvHIqHk8bEFTSt6
 mXfxMQhvIk7gckO3qS92FnIhTOwu5TEJjIIChXrsnGNtV0gOtP8D2C8wR2CtKsbct7FJrWUl
 CVcw6CjAPYy4YZhfcBnaMEEB/mX6vmMK1UwanY/TsB6p1xBF5NOFL28AQ2Sxm80aq7omhezO
 Sc/XD+9ArcJYhNGioctP+qM5zwCl/SIKDgcfqm8giBySpZwbhSb2ypleFSd2Wvg+GB1z/1ha
 crCKp30UyZEYUiC8NZQb71NuVPM7npirV4/uLihl0j3uVZgTCL9pUg53KumMblisfLsTPT9+
 NdDLcqaoyizo8WlChQ7BbU7dAhQRVBiXMieg5UOKoarf1o3cEl8WqS56e5wJORYc1F9y76gE
 oeVARQDljISRBTvdG23V5yUQOi2DMgl8i5jY3BE0JTB8yFLXLtDJZw3LvMfVbIm6PZi3bhzS
 fwEcN+HGfNBVnLM/DF1UHU3hNAKmMiD7e5WAxeYXQ==
IronPort-HdrOrdr: A9a23:b8lDlKqjo+nOCF4iIJwVDVAaV5uLL9V00zEX/kB9WHVpm5Oj+f
 xGzc516farslossSkb6Ky90KnpewK5yXbsibNhc4tKLzOWx1dAS7sSrLcKogeQVBEWk9Q96U
 4OSdkHNDSdNykZsS++2njELz9C+qjGzEnLv5ak854Fd2gDAMsMj3YbNu/YKDwNeOAvP+tiKH
 P23Lshm9PUQwVvUi3NPAhiYwGsnayvqLvWJTo9QzI34giHij2lrJTgFQKD4xsYWzRThZ8/7G
 nsiWXCl+aemsD+7iWZ+37Y7pxQltek4MBEHtawhs8cLSipohq0Zb5mR6aJsFkO0aOSARcR4Z
 zxSiUbToNOAkDqDyeISNzWqlDdOQMVmjvfIJmj8CPeSILCNWkH4oF69Pxkm1PimjsdVZdHof
 92Niuixulq5VmrplWM2/HYEx5tjUa6unwkjKoaiGFeS5IXbPtLoZUY5149KuZLIMvW0vFuLA
 BVNrCW2B+WSyLsU1nJ+m10hNC8VHU6GRmLBkAEp8yOyjBT2HR01VERysATlmoJsMtVcegJ28
 3UdqBz0L1eRM4faqxwQO8HXMusE2TIBRbBKnibL1jrHLwOf3jNt5n06rMo4/zCQu1E8LIi3J
 DaFF9Iv287fEzjTcWIwZ1Q6xjIBH6wWDz8o/surqSReoeMMoYDHRfzPWzGyfHQ0cn3KverL8
 qOBA==
X-IronPort-AV: E=Sophos;i="5.90,171,1643691600"; 
   d="scan'208";a="66347577"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=C7F+D1rH3FWogvf3f/Jdpgd3txz1AFLfQerq5IBDxrOC+1ZLfWcOdkJjXUP2/4fHagEOqeu2rW+SIFO3P/ctrugFW4ytChoqCg1WIClHxf/l+jjvxaZ0Ekg0E339F8s8hmXtZkr5tz1jIDaEKrrv01zW4yD42xhme5DrKXDs/zRjZCNoYB4JXKl99T8Rq8ziRDrJV+bq+qv+oaO2AKBUdBe9zzvzzjmQ76AExH2j1pwDM0xenF1VBTE8NqYSnhb0Zv8Q1mqJdrTFyJJea+MQ3sLKdSmJrj3Flu5h6ysXUoSHBXtskvGwvPdO+UAAwX8lCZapCq/FWNRT99NsswYWkw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=nVI4z8iNBd/kRyEyeVnYFlnzBShQ15AmHDIeSwR6WJ8=;
 b=es52F4VYSXS4Te8ZYeR23+WM81qBZERa+hB2jiVe3lMQwT5KJCvi3g5MTUTwbHWWcx8O00uA3oe+FZLMoP5mWWV9+OJNQW0R5ZTvLdBPHO1Py8VkyuQrfLNvLpRF090vG20bSz1uGJaup4eU3B6YILBVaIIZV7tiPzSSOEVoA7qGb6vTr3cphb36cUeHgBsadzoOBWLp9khLfX5FtWFIqviQ3MLM/38L5IPhd/b1gmKglE00bo4Zdwj9mIuS7LFanmCXrKsYdfymb5kJyzkRam2wo8spWez0owW1Cnv0g9pec7eBQpkCJ/JOO/bFTwWtovc2nwpA29qSz/hhlIJZgw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=nVI4z8iNBd/kRyEyeVnYFlnzBShQ15AmHDIeSwR6WJ8=;
 b=t87O5OkJcwxyt2xJUJowau/aGTF3TGRam+wvfJPAMnfErVD0cxVT9j5oN93DqwhsoBPhVPSGsu4GM5lqFnkAN/ZJ26GoVmWdY2UU76AYjSLQBvwaY4MEMgO8nPP0otL3kWylHQ/FjVKLbhac8ZRPXbq/z+GjGMN3zhPG9YWkV7Y=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>, "Bjoern
 Doebel" <doebel@amazon.de>, Michael Kurth <mku@amazon.de>, Martin Pohlack
	<mpohlack@amazon.de>, Xen-devel <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH] x86/cet: Use dedicated NOP4 for cf_clobber
Thread-Topic: [PATCH] x86/cet: Use dedicated NOP4 for cf_clobber
Thread-Index: AQHYMvUk0XiHSYNleUqdwHU2YHv5TKy1jjMAgAALzQCAAASOAIAAB8IAgANQ2gA=
Date: Thu, 10 Mar 2022 18:42:07 +0000
Message-ID: <d65a64fe-72b1-efc5-1804-8f74aca6d803@citrix.com>
References: <20220308140126.8815-1-andrew.cooper3@citrix.com>
 <18fb4115-94d8-16c2-e39b-1be895e254f4@suse.com>
 <476a25f8-86eb-0df5-b481-fc4cd5ecbb18@citrix.com>
 <83fa28ce-f2db-2451-356f-0dc0266834f2@suse.com>
 <48c6720a-070e-85db-f1c3-448714232946@citrix.com>
In-Reply-To: <48c6720a-070e-85db-f1c3-448714232946@citrix.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 42e26607-145b-40c3-d67c-08da02c5ada5
x-ms-traffictypediagnostic: MN2PR03MB4605:EE_
x-microsoft-antispam-prvs: <MN2PR03MB46057953D663179EA0B28EF4BA0B9@MN2PR03MB4605.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(66476007)(91956017)(64756008)(316002)(6916009)(66946007)(76116006)(66446008)(66556008)(122000001)(54906003)(4326008)(71200400001)(31686004)(5660300002)(83380400001)(38070700005)(8676002)(6486002)(26005)(31696002)(186003)(86362001)(2616005)(8936002)(38100700002)(53546011)(6512007)(82960400001)(36756003)(6506007)(508600001)(2906002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?dGNTeXlhbXQyK2k1bTlEcHJITWQ2MEFLYUs1bWRjdlBjQWplQWg5ZEhGSmpP?=
 =?utf-8?B?ZTRxaFV3d2pPVzRFWVZWYUVrY1N5YkIyNDhWMGZibmlRQllxbFdDbWhFaGxz?=
 =?utf-8?B?UXN3d1dPQlo4OWNhRVJkMStmT21NRHdPbGUvaEZnZWRhTFNuSVhTbmZlamVE?=
 =?utf-8?B?SWJhN3F2S295ejRMMXpoSUZpeWhRMFJTbThCdERtZHdzT3IwTUhyMU1vMVhj?=
 =?utf-8?B?TGxxRFBCdk85dERQcWZ2VGsxNkhlZGx4dFU3WG9WZ1dWenNNQy9wejU4UjFz?=
 =?utf-8?B?SmdVNlZxS01RWE9UNWNHLzErWmwzbWFkakx4RWJEL243NTl0cEZlK0RTN29l?=
 =?utf-8?B?ZjYwdzJtYVBzUGhCSzFqNlVyMU1nZnhpMmhaY21oRkF4aTNUK21DY2pCMDQ1?=
 =?utf-8?B?bVRFYzNlT1ZOQmRrNWNGSUxQRjYzRTU1UkZqZDlZVys3Z2xnY2F6ZmQ5cStr?=
 =?utf-8?B?a1g1ZEE1OFJSMWtlOWZXN0lvM3ZSNTJSNTlKcTRkSGlmSkFKRCs2YmFQb0tE?=
 =?utf-8?B?ekNQcHFqekZheDhPYlBCTWJxZmhNNm5mRWlXamJSK2NkY3FNU0NadDE1bC9y?=
 =?utf-8?B?NHdqVEdOY1pETVl1cmczSlU4MzJCbVZnMDNLcjl3SDBzSUw2WVNwSTZYQlY3?=
 =?utf-8?B?aXpZRDJyYzhCV2Q2U0RGTVYzTmw5S2V5emYwang2UXNZT1lhSjUzWklSZzky?=
 =?utf-8?B?Qkw1TW1yaUJYUTI1ZDZWMHkwR0RMQXpNZ1FueUxtd3M3WFJwcHdTUGhXbjN5?=
 =?utf-8?B?cDd2OWFxbGRUZUh3WFhUY2JCajlHQThoK0dSb0VGVVBITHJxNWZDR3h1ZUV6?=
 =?utf-8?B?WmU3ZUhHWmZFTHEwMkEzczM4ZDd6OUVDOG5LUmtrOXhkQmErc1FRQTJLT0FB?=
 =?utf-8?B?anRVN213dWVyeERTb1ZuSU83Y093NG1aaGtKaWtVcFNhLytOZGtwK1ArRmx4?=
 =?utf-8?B?UmtpQzdOcGo3RGFFNTFkV3ZqYkZrb2dqdzdrNWI5ZDF1b1l6eEVtaE9ZYkdC?=
 =?utf-8?B?bUVsT1JZckZhejB5dzErbzJ4NVJlVW5YcTF1RDVDeERtMmNnRXBrR3JHU1pR?=
 =?utf-8?B?NkFacUxIMGVRdU10Ulg1ZndiSG9HbldLbVRTVk5URmIvSVFraEV3MHk5RGlv?=
 =?utf-8?B?UmNyWFFlSEhDZmFPaEdiSzZFT0c2MmRzVjVmNEVyTlNTcEdWajAwb1V3MjlF?=
 =?utf-8?B?REszK0FzSW1PK2tOQjlMbVZsNkRKem14cTY4T29UNG84aWJuVmplVlcwN21R?=
 =?utf-8?B?cCt0Z0JCNm9hYTFLaXJjK1hja1VZajFtQjBvUnltWDJZRU4zM2FhN1lqKzJO?=
 =?utf-8?B?U1FxWitGamFYVmNWMUFITHRQZXdDOEV2Zks1WkxDekFmMHh3a2g0R0xFN1ZK?=
 =?utf-8?B?alRhMWNMRk1MZWRpVU9mcVN0N2MrSDNYd09HcjdxNSsvNmh0Lzc5a2RXbHFx?=
 =?utf-8?B?Q2pqTXRGWFEyeVpIVDY2ME5TUThTbjhGcWpFR2FydGhaV0x6bmhsYzFEV1Vp?=
 =?utf-8?B?N2xqMmRWWUhKRlVTMzBJRG5sT1E4VmF6OWIrR0RLdEx2Zm50TGFVMWd5NEdK?=
 =?utf-8?B?RGFYME1oS2ZlUTd5dldsU045dVR1Z1R5U09paDdMTnFkTzFidS9WQm4yMW16?=
 =?utf-8?B?b00vK3JoaXdDMUViTGYrWkoyK2xHUlV3c1JqVXlxVTlDMXlTZ3F1bWhWcFVa?=
 =?utf-8?B?emI2S3pXVVh0Ym80SFpEWTlKNmN3di96VUVVM1pQRUhrdjgyMEhSbmNNV1l3?=
 =?utf-8?B?MVlvM1hrLzNPcy9uVmcrdERsR1hxUXlsREU5dHpKS3RIUkhBN3FXMXpIVVFv?=
 =?utf-8?B?ckF6S3VpQnJYVUtxTFhiMHNiNUUrK3NHZm9OeU5qTzVxY1Rnc3VLL1d6cmpN?=
 =?utf-8?B?OUlWOEU4OW05VDJUbTl3dXpvRGlrTEtuWnBnN3U2cGp3aHp2SklRRGROenkx?=
 =?utf-8?B?cnJsSVk4aWtRRmhranFIeHFiMkRJZTlMdVFVZWZ2clhEdE9MWVZ4S1YvRXQz?=
 =?utf-8?B?SURGR3Rwd243V2ZpTkpTUFFLeDJ1K0RuNVlzakIrVUZRN3l0b0xHcTNqMTVi?=
 =?utf-8?B?b0JzQlRNektRYmtIOXYzQVA1cit5Z29DWWxqM1FaUlkwYW1UL3JndVhOSE5U?=
 =?utf-8?B?OEQxdi9SazJ4Z3djODZON0hpakFvY2EzWndLdGhyWkh0bHA5WDdJT1plY1Iv?=
 =?utf-8?B?dmxHbWNJOUVUeW5HdEc3QVlHU3FMdG8yWWRIRkF6UnRaYmlxMDZvWlRuY0dP?=
 =?utf-8?B?V1hSc3R5QXp6bEY0b2VyZ1MwT2pnPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <D2779CEEBF2D8D48B63E09264141ACB5@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 42e26607-145b-40c3-d67c-08da02c5ada5
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Mar 2022 18:42:07.0392
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 1CmKdT7VA6/ItLaOH/KvK30o4KOJ+tknoBWWlYmRH6ZIZbZgWdy0K3A+FQnHnE4bOfS9m1zOFUi5jOKkbzmZ3WysXaey5avmG+L/AqW5voQ=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR03MB4605
X-OriginatorOrg: citrix.com
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=


From xen-devel-bounces@lists.xenproject.org Thu Mar 10 18:45:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 18:45:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288598.489444 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSNmd-0004ic-4f; Thu, 10 Mar 2022 18:45:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288598.489444; Thu, 10 Mar 2022 18:45:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSNmd-0004iV-1L; Thu, 10 Mar 2022 18:45:07 +0000
Received: by outflank-mailman (input) for mailman id 288598;
 Thu, 10 Mar 2022 18:45:05 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=nQkI=TV=intel.com=tamas.lengyel@srs-se1.protection.inumbo.net>)
 id 1nSNmb-0004iN-Cy
 for xen-devel@lists.xenproject.org; Thu, 10 Mar 2022 18:45:05 +0000
Received: from mga11.intel.com (mga11.intel.com [192.55.52.93])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3078c41a-a0a2-11ec-853a-5f4723681683;
 Thu, 10 Mar 2022 19:45:02 +0100 (CET)
Received: from fmsmga002.fm.intel.com ([10.253.24.26])
 by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 10 Mar 2022 10:44:59 -0800
Received: from tlengyel-mobl3.amr.corp.intel.com (HELO localhost.localdomain)
 ([10.212.69.49])
 by fmsmga002-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 10 Mar 2022 10:44:58 -0800
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3078c41a-a0a2-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;
  t=1646937902; x=1678473902;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=2FqLq9eNolAav03XkdCJx45m7RWw2RGi/b+c0qm0okI=;
  b=OBMxT/Kqqg+vvTOU6igokX4fouW0AKvB/Nt6VX/5qJQJFDqIYpItxJbA
   JO8wLOVeTBqnlbsD8skKOF3o4+HKpeKZR8OJB5qc6L//kKpgRBf38syW8
   T80TzjdwUlRiILWjdD3M2TaNJN33Gx6djPg+zLqZ2mdoeivEUmUQwxmdH
   jbDzpiTzBNZfHQuo0VlcZBu6ktwW80BTFP1EJqeCx8zGAu9/HXyIsa6Nw
   ZnwDYv2vvLshNlpouKuBEQYBOQ9i+kPEbuKQAqAmMMpeRoK7loV1v+DrB
   YU0sDpt7eQlklmBsEOjMHIl7pg4nKgEV82QD26+scLgjD7mRURSl5Dxu4
   g==;
X-IronPort-AV: E=McAfee;i="6200,9189,10282"; a="252904358"
X-IronPort-AV: E=Sophos;i="5.90,171,1643702400"; 
   d="scan'208";a="252904358"
X-IronPort-AV: E=Sophos;i="5.90,171,1643702400"; 
   d="scan'208";a="642672181"
From: Tamas K Lengyel <tamas.lengyel@intel.com>
To: xen-devel@lists.xenproject.org
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>,
	Jun Nakajima <jun.nakajima@intel.com>,
	Kevin Tian <kevin.tian@intel.com>
Subject: [PATCH] x86/hvm: Include interruptibility state in hvm_hw_cpu
Date: Thu, 10 Mar 2022 13:44:46 -0500
Message-Id: <05d0a5b5c18d667a5527e6f834347f54a10309da.1646937728.git.tamas.lengyel@intel.com>
X-Mailer: git-send-email 2.25.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

During VM fork resetting a failed vmentry has been observed when the reset
is performed immediately after a STI instruction executed. This is due to
the guest interruptibility state in the VMCS being modified by STI but the
subsequent reset removes the IF bit from FLAGS, causing the failed vmentry.

Include the interruptibility state information in the public hvm_hw_cpu struct
so that the CPU can be safely saved/restored.

Signed-off-by: Tamas K Lengyel <tamas.lengyel@intel.com>
---
 xen/arch/x86/hvm/hvm.c                 |  9 +++++----
 xen/arch/x86/hvm/vmx/vmx.c             |  4 ++++
 xen/arch/x86/include/asm/hvm/hvm.h     | 26 ++++++++++++++++++++++++++
 xen/include/public/arch-x86/hvm/save.h |  3 ++-
 4 files changed, 37 insertions(+), 5 deletions(-)

diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index 709a4191ef..b239c72215 100644
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -897,6 +897,8 @@ static int cf_check hvm_save_cpu_ctxt(struct vcpu *v, hvm_domain_context_t *h)
         ctxt.flags = XEN_X86_FPU_INITIALISED;
     }
 
+    ctxt.interruptibility_info = hvm_get_interrupt_shadow(v);
+
     return hvm_save_entry(CPU, v->vcpu_id, h, &ctxt);
 }
 
@@ -990,9 +992,6 @@ static int cf_check hvm_load_cpu_ctxt(struct domain *d, hvm_domain_context_t *h)
     if ( hvm_load_entry_zeroextend(CPU, h, &ctxt) != 0 )
         return -EINVAL;
 
-    if ( ctxt.pad0 != 0 )
-        return -EINVAL;
-
     /* Sanity check some control registers. */
     if ( (ctxt.cr0 & HVM_CR0_GUEST_RESERVED_BITS) ||
          !(ctxt.cr0 & X86_CR0_ET) ||
@@ -1155,6 +1154,8 @@ static int cf_check hvm_load_cpu_ctxt(struct domain *d, hvm_domain_context_t *h)
     v->arch.dr6   = ctxt.dr6;
     v->arch.dr7   = ctxt.dr7;
 
+    hvm_set_interrupt_shadow(v, ctxt.interruptibility_info);
+
     hvmemul_cancel(v);
 
     /* Auxiliary processors should be woken immediately. */
@@ -3888,7 +3889,7 @@ enum hvm_intblk hvm_interrupt_blocked(struct vcpu *v, struct hvm_intack intack)
          !(guest_cpu_user_regs()->eflags & X86_EFLAGS_IF) )
         return hvm_intblk_rflags_ie;
 
-    intr_shadow = alternative_call(hvm_funcs.get_interrupt_shadow, v);
+    intr_shadow = hvm_get_interrupt_shadow(v);
 
     if ( intr_shadow & (HVM_INTR_SHADOW_STI|HVM_INTR_SHADOW_MOV_SS) )
         return hvm_intblk_shadow;
diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
index c075370f64..e13817431a 100644
--- a/xen/arch/x86/hvm/vmx/vmx.c
+++ b/xen/arch/x86/hvm/vmx/vmx.c
@@ -1323,7 +1323,9 @@ static unsigned int cf_check vmx_get_interrupt_shadow(struct vcpu *v)
 {
     unsigned long intr_shadow;
 
+    vmx_vmcs_enter(v);
     __vmread(GUEST_INTERRUPTIBILITY_INFO, &intr_shadow);
+    vmx_vmcs_exit(v);
 
     return intr_shadow;
 }
@@ -1331,7 +1333,9 @@ static unsigned int cf_check vmx_get_interrupt_shadow(struct vcpu *v)
 static void cf_check vmx_set_interrupt_shadow(
     struct vcpu *v, unsigned int intr_shadow)
 {
+    vmx_vmcs_enter(v);
     __vmwrite(GUEST_INTERRUPTIBILITY_INFO, intr_shadow);
+    vmx_vmcs_exit(v);
 }
 
 static void vmx_load_pdptrs(struct vcpu *v)
diff --git a/xen/arch/x86/include/asm/hvm/hvm.h b/xen/arch/x86/include/asm/hvm/hvm.h
index 5b7ec0cf69..2fb7865a05 100644
--- a/xen/arch/x86/include/asm/hvm/hvm.h
+++ b/xen/arch/x86/include/asm/hvm/hvm.h
@@ -720,6 +720,22 @@ static inline int hvm_vmtrace_reset(struct vcpu *v)
     return -EOPNOTSUPP;
 }
 
+static inline unsigned long hvm_get_interrupt_shadow(struct vcpu *v)
+{
+    if ( hvm_funcs.get_interrupt_shadow )
+        return alternative_call(hvm_funcs.get_interrupt_shadow, v);
+
+    return -EOPNOTSUPP;
+}
+
+static inline void
+hvm_set_interrupt_shadow(struct vcpu *v, unsigned long val)
+{
+    if ( hvm_funcs.set_interrupt_shadow )
+        alternative_vcall(hvm_funcs.set_interrupt_shadow, v, val);
+}
+
+
 /*
  * Accessors for registers which have per-guest-type or per-vendor locations
  * (e.g. VMCS, msr load/save lists, VMCB, VMLOAD lazy, etc).
@@ -863,6 +879,16 @@ static inline void hvm_set_reg(struct vcpu *v, unsigned int reg, uint64_t val)
     ASSERT_UNREACHABLE();
 }
 
+static inline unsigned long hvm_get_interrupt_shadow(struct vcpu *v)
+{
+    ASSERT_UNREACHABLE();
+    return 0;
+}
+static inline void hvm_set_interrupt_shadow(struct vcpu *v, unsigned long val)
+{
+    ASSERT_UNREACHABLE();
+}
+
 #define is_viridian_domain(d) ((void)(d), false)
 #define is_viridian_vcpu(v) ((void)(v), false)
 #define has_viridian_time_ref_count(d) ((void)(d), false)
diff --git a/xen/include/public/arch-x86/hvm/save.h b/xen/include/public/arch-x86/hvm/save.h
index 773a380bc2..e944b1756a 100644
--- a/xen/include/public/arch-x86/hvm/save.h
+++ b/xen/include/public/arch-x86/hvm/save.h
@@ -165,7 +165,8 @@ struct hvm_hw_cpu {
 #define _XEN_X86_FPU_INITIALISED        0
 #define XEN_X86_FPU_INITIALISED         (1U<<_XEN_X86_FPU_INITIALISED)
     uint32_t flags;
-    uint32_t pad0;
+
+    uint32_t interruptibility_info;
 };
 
 struct hvm_hw_cpu_compat {
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 19:29:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 19:29:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288606.489467 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSOTo-0000jm-MD; Thu, 10 Mar 2022 19:29:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288606.489467; Thu, 10 Mar 2022 19:29:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSOTo-0000jf-Iq; Thu, 10 Mar 2022 19:29:44 +0000
Received: by outflank-mailman (input) for mailman id 288606;
 Thu, 10 Mar 2022 19:29:43 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSOTn-0000jV-0b; Thu, 10 Mar 2022 19:29:43 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSOTm-0008Jn-UH; Thu, 10 Mar 2022 19:29:42 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSOTm-00049a-F8; Thu, 10 Mar 2022 19:29:42 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSOTm-0006w6-EM; Thu, 10 Mar 2022 19:29:42 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=srxDYl7Ax7sZKdq04Tm76HUKDnI3E8/FyKlCsLfzsWE=; b=Adr0hiicuh/LL3mnislNckHLOK
	pfo1J52RpfgxVN2ZnNzyBrmT64KqBrwkESh1TgZmzqd/sSu10eqkI0k+uEIYGdXECu/Wm5jlTz3ts
	C904Xwy6zNdF32TsZurFdHDw2MWj/94wHG/z0k2vgBnewTUVBnyoc5Ijtdm0oqVk20MM=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168501-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168501: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=d9ccf33f9479201e5add8db0af68ca9ca8da358b
X-Osstest-Versions-That:
    qemuu=9740b907a5363c06ecf61e08b21966a81eb0dab4
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 10 Mar 2022 19:29:42 +0000

flight 168501 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168501/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168488
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168488
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168488
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168488
 test-armhf-armhf-xl-rtds     18 guest-start/debian.repeat    fail  like 168488
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168488
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168488
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168488
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168488
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 qemuu                d9ccf33f9479201e5add8db0af68ca9ca8da358b
baseline version:
 qemuu                9740b907a5363c06ecf61e08b21966a81eb0dab4

Last test of basis   168488  2022-03-08 19:07:03 Z    2 days
Testing same since   168501  2022-03-10 06:06:16 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Jeffery <andrew@aj.id.au>
  Ani Sinha <ani@anisinha.ca>
  Bernhard Beschow <shentey@gmail.com>
  Cleber Rosa <crosa@redhat.com>
  Corey Minyard <cminyard@mvista.com> (isa_ipmi_bt, isa_ipmi_kcs)
  Cornelia Huck <cohuck@redhat.com>
  Cédric Le Goater <clg@kaod.org>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel P. Berrangé <berrange@redhat.com>
  David Miller <dmiller423@gmail.com>
  Dov Murik <dovmurik@linux.ibm.com>
  Eric Auger <eric.auger@redhat.com>
  Eric Blake <eblake@redhat.com>
  Eric DeVolder <eric.devolder@oracle.com>
  Eugenio Pérez <eperezma@redhat.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Halil Pasic <pasic@linux.ibm.com>
  Igor Mammedov <imammedo@redhat.com>
  Jason Wang <jasowang@redhat.com>
  Jean-Philippe Brucker <jean-philippe@linaro.org>
  Joelle van Dyne <j@getutm.app>
  John Snow <jsnow@redhat.com>
  Jonathan Cameron <Jonathan.Cameron@huawei.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Wolf <kwolf@redhat.com>
  Knut Omang <knut.omang@oracle.com>
  Knut Omang <knuto@ifi.uio.no>
  Laurent Vivier <laurent@vivier.eu>
  Laurent Vivier <lvivier@redhat.com>
  Liav Albani <liavalb@gmail.com>
  Mark Cave-Ayland <mark.cave-ayland@ilande.co.uk>
  Matheus Ferst <matheus.ferst@eldorado.org.br>
  Michael S. Tsirkin <mst@redhat.com>
  Patrick Venture <venture@google.com>
  Patrick Williams <patrick@stwcx.xyz>
  Peter Maydell <peter.maydell@linaro.org>
  Philippe Mathieu-Daudé <f4bug@amsat.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Sergio Lopez <slp@redhat.com>
  Simon Burge <simonb@NetBSD.org>
  Stefano Garzarella <sgarzare@redhat.com>
  Thomas Huth <thuth@redhat.com>
  Viresh Kumar <viresh.kumar@linaro.org>
  Wentao_Liang <Wentao_Liang_g@163.com>
  Xueming Li <xuemingl@nvidia.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Łukasz Gieryk <lukasz.gieryk@linux.intel.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   9740b907a5..d9ccf33f94  d9ccf33f9479201e5add8db0af68ca9ca8da358b -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Thu Mar 10 21:47:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 21:47:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288617.489479 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSQd1-0005kE-Ve; Thu, 10 Mar 2022 21:47:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288617.489479; Thu, 10 Mar 2022 21:47:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSQd1-0005k7-Qb; Thu, 10 Mar 2022 21:47:23 +0000
Received: by outflank-mailman (input) for mailman id 288617;
 Thu, 10 Mar 2022 21:47:22 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=AS8o=TV=citrix.com=prvs=0616ffc5a=George.Dunlap@srs-se1.protection.inumbo.net>)
 id 1nSQd0-0005k1-7S
 for xen-devel@lists.xen.org; Thu, 10 Mar 2022 21:47:22 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a74445ca-a0bb-11ec-8eba-a37418f5ba1a;
 Thu, 10 Mar 2022 22:47:19 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a74445ca-a0bb-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646948839;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=F0ajbJVK25pe+VkSUwxWniOGGKx/gjVYAmZB4qZdk/Y=;
  b=Zs3yqJQTff/8VD2Q5Otiba5tIroUB9jyJI3EkG/gou726hVGhJXz4gvq
   1jf4gFCqFkFOoH3xFYPhoUeXzBd4jfdlWTZvi1eZfpeug3uETqwFO8NRY
   6U1VxaN7RZ34nweXWDh6Y8yJpzdKIa8vAtbGdq0OVjSTVji9s2KzxfF93
   E=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 65959406
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:krvzH6qd2z7sQBN1NnWJywlNDadeBmIoZRIvgKrLsJaIsI4StFCzt
 garIBmHO66OMGSkL4gnPIrg8UoOvcXVx9BlSAdqrSszRXgV+ZuZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 Iuq+aUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBPajCgcgCYhViDzh6MYlH+e/jPUqZrpnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVI4jzeF/krB7zeRaHD/fdT3Ssqh9AIFvHbD
 yYcQWQyPUmRP0URUrsRIMJlu7ekomDOTxZ3q3+vg+1u22Li8RMkhdABN/KKI4fXFK25hH2wv
 Xna9m70BhUbMt23yjef9H+owOjVkkvTR4Y6BLC+sPlwjzW7xHEXCRAQfUu2p7++kEHWc8JSL
 QkY9zQjqYA29Ve3VZ/tUhv+p2SL1jY8VtxKAqsF4QeC4qPO5kCSAW1sZjxLZcEitcQ2bSc3z
 VLPlNTsbQGDq5XMFyjbrO3N62rvZ25FdgfueBPoUyMG5tf6jJ4CgijTV9JvNK+03vnpKxfvl
 mXiQDcFu50fissC1qOe9F/Bgi6xqpWhcjPZ9jk7TUr+sFonOdfNi5iArAGCsK0edNrxokyp4
 SBc8/Vy+tziGn1keMalZOwWVI+k6P+eWNE3qQ4+RsJxn9hBFpPKQGyx3N2cDBs4WirnUWWwC
 KM2he+3zMYCVJdNRfUrC79d8+xwkcDd+S3ND5g4lOZmbJlrbxOg9ypzf0OW1G2FuBFyzf9uY
 sjEIZ70VChy5UFbINyeHrZ1PVgDnH1W+I8ubcqjk0TPPUS2OBZ5tovpwHPRN7tkvctoUS3e8
 spFNtvi9vmseLaWX8UjyqZKdQpiBSFiXfje8pULHsbeclsOMDxwUJf5nOJ+E7GJaowIz48kC
 FnmARQGoLc+7FWaQTi3hodLM+q+A8wg8SplYUTB/z+AghAeXGpm149HH7NfQFXt3LYLISJcJ
 xXdR/i9Pw==
IronPort-HdrOrdr: A9a23:p50QfK/oPW3OS6xNGHxuk+DcI+orL9Y04lQ7vn2ZLiYlFfBw9v
 re+MjzsCWetN9/Yh0dcLy7V5VoIkm9yXcW2+cs1N6ZNWGN1VdAR7sC0aLShxHmBi3i5qp8+M
 5bAs1D4QTLfDtHZBDBkWuFL+o=
X-IronPort-AV: E=Sophos;i="5.90,171,1643691600"; 
   d="scan'208";a="65959406"
From: George Dunlap <george.dunlap@citrix.com>
To: <xen-devel@lists.xen.org>
CC: George Dunlap <george.dunlap@citrix.com>, Henry Wang <Henry.Wang@arm.com>,
	Wei Liu <wl@xen.org>, Andrew Cooper <andrew.cooper3@citrix.com>, Jan Beulich
	<jbeulich@suse.com>, Roger Pau Monne <roger.pau@citrix.com>, "Stefano
 Stabellini" <sstabellini@kernel.org>, Julien Grall <julien@xen.org>
Subject: [PATCH] MAINTAINERS: Propose Henry Wang as the new release manager
Date: Thu, 10 Mar 2022 21:46:55 +0000
Message-ID: <20220310214655.14510-1-george.dunlap@citrix.com>
X-Mailer: git-send-email 2.35.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain

ARM has proposed Henry Wang as a release manager for 4.17.  Signify
this by giving him maintainership over CHANGELOG.md.

Below is an introduction given by Bertrand Marquis:

Henry Wang is an open-source software engineer at Arm focusing on the
hypervisor and virtualization technology. Before joining the
AIS-Hypervisor team, he was one of the leading Arm contributors of the
Rust-VMM and the Cloud Hypervisor community.  He is the Arm reviewer
of the Cloud Hypervisor project. His work includes basic project
enabling on Arm platform, Arm device emulation, advanced features
support on Arm and bug fixes.

After joining the AIS-Hypervisor team at Arm, he has been involved in Xen feature
development on Arm in various areas, including:

1. Xen Arm MPAM extension research and PoC: Ongoing, the design will
share in xen-devel soon.

2. Port of Xen to Arm MPU systems: Working together with Penny Zheng
on coding and testing, will be soon sent to xen-devel.

3. Static Xen heap on Arm: Work done but depend on the direct mapping
series from Penny Zheng, will be upstreamed in the next weeks.

4. Virtio PoC for Xen on Arm using kvmtool as the Xen virtio backend:
Work done, including the enabling of the virtio and the virtio
performance tuning.

5. Participated in code reviews and discussions in xen-devel,
including the foreign memory mapping series from EPAM, etc.

Signed-off-by: George Dunlap <george.dunlap@citrix.com>
---
CC: Henry Wang <Henry.Wang@arm.com>
 CC: Ian Jackson <iwj@xenproject.org>
CC: Wei Liu <wl@xen.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>
CC: Jan Beulich <jbeulich@suse.com>
CC: Roger Pau Monne <roger.pau@citrix.com>
CC: Stefano Stabellini <sstabellini@kernel.org>
CC: Julien Grall <julien@xen.org>
---
 MAINTAINERS | 1 +
 1 file changed, 1 insertion(+)

diff --git a/MAINTAINERS b/MAINTAINERS
index d4b06f5bfb..6a097b43eb 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -255,6 +255,7 @@ S:	Supported
 F:	xen/drivers/passthrough/arm/smmu-v3.c
 
 Change Log
+M:	Henry Wang <Henry.Wang@arm.com>
 R:	Community Manager <community.manager@xenproject.org>
 S:	Maintained
 F:	CHANGELOG.md
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 10 23:19:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 10 Mar 2022 23:19:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288625.489494 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSS3R-0006BA-JZ; Thu, 10 Mar 2022 23:18:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288625.489494; Thu, 10 Mar 2022 23:18:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSS3R-0006B3-Gg; Thu, 10 Mar 2022 23:18:45 +0000
Received: by outflank-mailman (input) for mailman id 288625;
 Thu, 10 Mar 2022 23:18:44 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSS3Q-0006At-0s; Thu, 10 Mar 2022 23:18:44 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSS3P-0003kp-V7; Thu, 10 Mar 2022 23:18:43 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSS3P-0006FZ-Jn; Thu, 10 Mar 2022 23:18:43 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSS3P-0001OV-JL; Thu, 10 Mar 2022 23:18:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=3s1li7xqkGJxWHk5gzgl9ZVVyFbtLF5Fev3MpQBqhm4=; b=smU+YpNb+vZV1K8gdaGcQCf/x6
	rXWDWCPewX5XM/3jtREcPfGFkq30t+T7trb0uvN/KmUk8+bhm8xW+3ZCnaYOXfEbh9jRbXAMQmUd1
	Nn5E21l1eJQcQX9dXHEDyxPb6Ss6EEPZNKTSLACR7a1fssIxeX6RcVtqCMuonL5EQBP4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168509-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168509: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=6ff9a7e62b8c43fe3e9d360fbd49d5854787bc39
X-Osstest-Versions-That:
    xen=5142dc5c25e317c208e3dc16d16b664b9f05dab5
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 10 Mar 2022 23:18:43 +0000

flight 168509 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168509/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  6ff9a7e62b8c43fe3e9d360fbd49d5854787bc39
baseline version:
 xen                  5142dc5c25e317c208e3dc16d16b664b9f05dab5

Last test of basis   168495  2022-03-09 16:03:18 Z    1 days
Testing same since   168509  2022-03-10 19:01:48 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Julien Grall <jgrall@amazon.com>
  Roger Pau Monne <roger.pau@citrix.com>
  Roger Pau Monné <roger.pau@citrix.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   5142dc5c25..6ff9a7e62b  6ff9a7e62b8c43fe3e9d360fbd49d5854787bc39 -> smoke


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 01:55:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 01:55:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288635.489506 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSUUe-00027n-GL; Fri, 11 Mar 2022 01:55:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288635.489506; Fri, 11 Mar 2022 01:55:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSUUe-00027f-BJ; Fri, 11 Mar 2022 01:55:00 +0000
Received: by outflank-mailman (input) for mailman id 288635;
 Fri, 11 Mar 2022 01:54:59 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=8RDm=TW=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nSUUc-00027X-Ra
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 01:54:58 +0000
Received: from sin.source.kernel.org (sin.source.kernel.org
 [2604:1380:40e1:4800::1])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3e00fd4f-a0de-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 02:54:55 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by sin.source.kernel.org (Postfix) with ESMTPS id BEADBCE26E4;
 Fri, 11 Mar 2022 01:54:48 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8A3A7C340E8;
 Fri, 11 Mar 2022 01:54:46 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3e00fd4f-a0de-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646963687;
	bh=Vp7eqyHq8TCWGeGwv1NmbBeghan1MnKK0nA5j+35Yu8=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=C1WoB5iopCoqc4IbxZIRxG9aQ/aG3qWI18+BrgKUhgjKagR4xh7eEWaWWseHJA4dS
	 IqibHDVvZLERf/y3h8Yqdn5lPAAZ4JT79F71dwoQ/MFm0R2cmxxHixSzj+4YIl3d3s
	 W/QY/SzdqJoWnmpT74r4FJ9c7QQ2GGWmWHrKTckykJo+J/zcxsdNMtXNp0oaaSJX3U
	 Ex6PRw0WP65jRlB3rhIY4suwRUSsgvF6lKejbnPWnlk/YxtK/riCrVQr+vKMHhDIgT
	 hLLGhsqPpSiUYgDSp1bWZGfOXx0CrUCDGMlYN51t3LU7N1184VJYiOWGWSIc1y9K+y
	 52JQV4HlonIWw==
Date: Thu, 10 Mar 2022 17:54:45 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
cc: xen-devel@lists.xenproject.org, sstabellini@kernel.org, 
    stefanos@xilinx.com, julien@xen.org, Volodymyr_Babchuk@epam.com, 
    bertrand.marquis@arm.com, andrew.cooper3@citrix.com, 
    george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org, 
    roger.pau@citrix.com, Ayan Kumar Halder <ayankuma@xilinx.com>
Subject: Re: [XEN v10 1/4] xen/arm64: Decode ldr/str post increment
 operations
In-Reply-To: <20220310174501.62040-2-ayankuma@xilinx.com>
Message-ID: <alpine.DEB.2.22.394.2203101752260.3261@ubuntu-linux-20-04-desktop>
References: <20220310174501.62040-1-ayankuma@xilinx.com> <20220310174501.62040-2-ayankuma@xilinx.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Thu, 10 Mar 2022, Ayan Kumar Halder wrote:
> At the moment, Xen does not decode any of the arm64 instructions. This
> means that when hsr_dabt.isv == 0, Xen cannot handle those instructions.
> This will lead to Xen to abort the guests (from which those instructions
> originate).
> 
> With this patch, Xen is able to decode ldr/str post indexing instructions.
> These are a subset of instructions for which hsr_dabt.isv == 0.
> 
> The following instructions are now supported by Xen :-
> 1.      ldr     x2,    [x1],    #8
> 2.      ldr     w2,    [x1],    #-4
> 3.      ldr     x2,    [x1],    #-8
> 4.      ldr     w2,    [x1],    #4
> 5.      ldrh    w2,    [x1],    #2
> 6.      ldrb    w2,    [x1],    #1
> 7.      str     x2,    [x1],    #8
> 8.      str     w2,    [x1],    #-4
> 9.      strh    w2,    [x1],    #2
> 10.     strb    w2,    [x1],    #1
> 
> In the subsequent patch, decode_arm64() will get invoked when
> hsr_dabt.isv == 0.
> 
> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>

Reviewed-by: Stefano Stabellini <sstabellini@kernel.org>

Note that if there are no changes (or small changes) to a patch and
previously someone gave his reviewed-by, it is customary to keep the tag
in the next version of the series.

I.e. you should have added my Reviewed-by directly to the commit message
in v10. See https://marc.info/?l=xen-devel&m=164635451928651


> ---
> 
> Changelog :-
> 
> v2..v5 - Mentioned in the cover letter.
> 
> v6 - 1. Fixed the code style issues as mentioned in v5.
> 
> v7 - No change.
> 
> v8 - 1. Removed some un-necessary header files inclusion.
>      2. Some style changes pointed out in v7.
> 
> v9 - 1. Rebased on top of the master.
>      2. Renamed psr_mode_is_32bit to regs_mode_is_32bit.
> 
> v10 - 1. No change.
> 
>  xen/arch/arm/decode.c           | 79 ++++++++++++++++++++++++++++++++-
>  xen/arch/arm/decode.h           | 48 +++++++++++++++++---
>  xen/arch/arm/include/asm/mmio.h |  4 ++
>  xen/arch/arm/io.c               |  2 +-
>  4 files changed, 124 insertions(+), 9 deletions(-)
> 
> diff --git a/xen/arch/arm/decode.c b/xen/arch/arm/decode.c
> index 792c2e92a7..3add87e83a 100644
> --- a/xen/arch/arm/decode.c
> +++ b/xen/arch/arm/decode.c
> @@ -84,6 +84,78 @@ bad_thumb2:
>      return 1;
>  }
>  
> +static int decode_arm64(register_t pc, mmio_info_t *info)
> +{
> +    union instr opcode = {0};
> +    struct hsr_dabt *dabt = &info->dabt;
> +    struct instr_details *dabt_instr = &info->dabt_instr;
> +
> +    if ( raw_copy_from_guest(&opcode.value, (void * __user)pc, sizeof (opcode)) )
> +    {
> +        gprintk(XENLOG_ERR, "Could not copy the instruction from PC\n");
> +        return 1;
> +    }
> +
> +    /*
> +     * Refer Arm v8 ARM DDI 0487G.b, Page - C6-1107
> +     * "Shared decode for all encodings" (under ldr immediate)
> +     * If n == t && n != 31, then the return value is implementation defined
> +     * (can be WBSUPPRESS, UNKNOWN, UNDEFINED or NOP). Thus, we do not support
> +     * this. This holds true for ldrb/ldrh immediate as well.
> +     *
> +     * Also refer, Page - C6-1384, the above described behaviour is same for
> +     * str immediate. This holds true for strb/strh immediate as well
> +     */
> +    if ( (opcode.ldr_str.rn == opcode.ldr_str.rt) && (opcode.ldr_str.rn != 31) )
> +    {
> +        gprintk(XENLOG_ERR, "Rn should not be equal to Rt except for r31\n");
> +        goto bad_loadstore;
> +    }
> +
> +    /* First, let's check for the fixed values */
> +    if ( (opcode.value & POST_INDEX_FIXED_MASK) != POST_INDEX_FIXED_VALUE )
> +    {
> +        gprintk(XENLOG_ERR,
> +                "Decoding instruction 0x%x is not supported\n", opcode.value);
> +        goto bad_loadstore;
> +    }
> +
> +    if ( opcode.ldr_str.v != 0 )
> +    {
> +        gprintk(XENLOG_ERR,
> +                "ldr/str post indexing for vector types are not supported\n");
> +        goto bad_loadstore;
> +    }
> +
> +    /* Check for STR (immediate) */
> +    if ( opcode.ldr_str.opc == 0 )
> +        dabt->write = 1;
> +    /* Check for LDR (immediate) */
> +    else if ( opcode.ldr_str.opc == 1 )
> +        dabt->write = 0;
> +    else
> +    {
> +        gprintk(XENLOG_ERR,
> +                "Decoding ldr/str post indexing is not supported for this variant\n");
> +        goto bad_loadstore;
> +    }
> +
> +    gprintk(XENLOG_INFO,
> +            "opcode->ldr_str.rt = 0x%x, opcode->ldr_str.size = 0x%x, opcode->ldr_str.imm9 = %d\n",
> +            opcode.ldr_str.rt, opcode.ldr_str.size, opcode.ldr_str.imm9);
> +
> +    update_dabt(dabt, opcode.ldr_str.rt, opcode.ldr_str.size, false);
> +
> +    dabt_instr->rn = opcode.ldr_str.rn;
> +    dabt_instr->imm9 = opcode.ldr_str.imm9;
> +
> +    return 0;
> +
> + bad_loadstore:
> +    gprintk(XENLOG_ERR, "unhandled Arm instruction 0x%x\n", opcode.value);
> +    return 1;
> +}
> +
>  static int decode_thumb(register_t pc, struct hsr_dabt *dabt)
>  {
>      uint16_t instr;
> @@ -150,10 +222,13 @@ bad_thumb:
>      return 1;
>  }
>  
> -int decode_instruction(const struct cpu_user_regs *regs, struct hsr_dabt *dabt)
> +int decode_instruction(const struct cpu_user_regs *regs, mmio_info_t *info)
>  {
>      if ( is_32bit_domain(current->domain) && regs->cpsr & PSR_THUMB )
> -        return decode_thumb(regs->pc, dabt);
> +        return decode_thumb(regs->pc, &info->dabt);
> +
> +    if ( !regs_mode_is_32bit(regs) )
> +        return decode_arm64(regs->pc, info);
>  
>      /* TODO: Handle ARM instruction */
>      gprintk(XENLOG_ERR, "unhandled ARM instruction\n");
> diff --git a/xen/arch/arm/decode.h b/xen/arch/arm/decode.h
> index 4613763bdb..13db8ac968 100644
> --- a/xen/arch/arm/decode.h
> +++ b/xen/arch/arm/decode.h
> @@ -23,19 +23,55 @@
>  #include <asm/regs.h>
>  #include <asm/processor.h>
>  
> -/**
> +/*
> + * Refer to the ARMv8 ARM (DDI 0487G.b), Section C4.1.4 Loads and Stores
> + * Page 318 specifies the following bit pattern for
> + * "load/store register (immediate post-indexed)".
> + *
> + * 31 30 29  27 26 25  23   21 20              11   9         4       0
> + * ___________________________________________________________________
> + * |size|1 1 1 |V |0 0 |opc |0 |      imm9     |0 1 |  Rn     |  Rt   |
> + * |____|______|__|____|____|__|_______________|____|_________|_______|
> + */
> +union instr {
> +    uint32_t value;
> +    struct {
> +        unsigned int rt:5;     /* Rt register */
> +        unsigned int rn:5;     /* Rn register */
> +        unsigned int fixed1:2; /* value == 01b */
> +        signed int imm9:9;     /* imm9 */
> +        unsigned int fixed2:1; /* value == 0b */
> +        unsigned int opc:2;    /* opc */
> +        unsigned int fixed3:2; /* value == 00b */
> +        unsigned int v:1;      /* vector */
> +        unsigned int fixed4:3; /* value == 111b */
> +        unsigned int size:2;   /* size */
> +    } ldr_str;
> +};
> +
> +#define POST_INDEX_FIXED_MASK   0x3B200C00
> +#define POST_INDEX_FIXED_VALUE  0x38000400
> +
> +/*
>   * Decode an instruction from pc
> - * /!\ This function is not intended to fully decode an instruction. It
> - * considers that the instruction is valid.
> + * /!\ This function is intended to decode an instruction. It considers that the
> + * instruction is valid.
>   *
> - * This function will get:
> - *  - The transfer register
> + * In case of thumb mode, this function will get:
> + *  - The transfer register (ie Rt)
>   *  - Sign bit
>   *  - Size
> + *
> + * In case of arm64 mode, this function will get:
> + * - The transfer register (ie Rt)
> + * - The source register (ie Rn)
> + * - Size
> + * - Immediate offset
> + * - Read or write
>   */
>  
>  int decode_instruction(const struct cpu_user_regs *regs,
> -                       struct hsr_dabt *dabt);
> +                       mmio_info_t *info);
>  
>  #endif /* __ARCH_ARM_DECODE_H_ */
>  
> diff --git a/xen/arch/arm/include/asm/mmio.h b/xen/arch/arm/include/asm/mmio.h
> index 7ab873cb8f..3354d9c635 100644
> --- a/xen/arch/arm/include/asm/mmio.h
> +++ b/xen/arch/arm/include/asm/mmio.h
> @@ -29,6 +29,10 @@
>  typedef struct
>  {
>      struct hsr_dabt dabt;
> +    struct instr_details {
> +        unsigned long rn:5;
> +        signed int imm9:9;
> +    } dabt_instr;
>      paddr_t gpa;
>  } mmio_info_t;
>  
> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
> index 1a066f9ae5..fad103bdbd 100644
> --- a/xen/arch/arm/io.c
> +++ b/xen/arch/arm/io.c
> @@ -141,7 +141,7 @@ enum io_state try_handle_mmio(struct cpu_user_regs *regs,
>      {
>          int rc;
>  
> -        rc = decode_instruction(regs, &info.dabt);
> +        rc = decode_instruction(regs, &info);
>          if ( rc )
>          {
>              gprintk(XENLOG_DEBUG, "Unable to decode instruction\n");
> -- 
> 2.17.1
> 
> 


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 01:59:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 01:59:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288639.489516 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSUZ9-0002nX-1X; Fri, 11 Mar 2022 01:59:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288639.489516; Fri, 11 Mar 2022 01:59:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSUZ8-0002nQ-Uq; Fri, 11 Mar 2022 01:59:38 +0000
Received: by outflank-mailman (input) for mailman id 288639;
 Fri, 11 Mar 2022 01:59:37 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=8RDm=TW=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nSUZ7-0002nK-Cs
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 01:59:37 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e62c8b77-a0de-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 02:59:35 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id E3AACB824C7;
 Fri, 11 Mar 2022 01:59:33 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id E0BFEC340E8;
 Fri, 11 Mar 2022 01:59:31 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e62c8b77-a0de-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646963972;
	bh=TP2QHoLbLWo/yoHssUP0NSw9VEr2vUTbAGTNwOHLcj4=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=PXu2Q6xTMDytpBVx8odLOXqYGb2SF5/R/q5Qmr/jXKMcIcFvPdMPyfaYiJVYHfLcL
	 evDTr51/5IvY+P8OtWXu2Fxven+pR7uqhj4mUOxugQv7oD3P/Ajnbd2hX7eDiPx7Py
	 d1tN5H0m+HA25iAbPHF0NSG4i32b16yp1+6pthel7WVVxu0+WyrGYyrHpvYcaONCfa
	 lgGR40/GoY82jzBdovcdv5Fs8+GGd5vR85mrotuVBvmeQEDvIbSH8i1y91monT+eWF
	 STjjeT6r5yLpQg7br6MjP0J+dlxK0vq7vsk1Ne2QSa+oQxEbqxeK1rl5Nlia0XvrLc
	 oKpgLM1sCROBA==
Date: Thu, 10 Mar 2022 17:59:31 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
cc: xen-devel@lists.xenproject.org, sstabellini@kernel.org, 
    stefanos@xilinx.com, julien@xen.org, Volodymyr_Babchuk@epam.com, 
    bertrand.marquis@arm.com, andrew.cooper3@citrix.com, 
    george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org, 
    roger.pau@citrix.com, Ayan Kumar Halder <ayankuma@xilinx.com>
Subject: Re: [XEN v10 2/4] xen/arm64: io: Support instructions (for which
 ISS is not valid) on emulated MMIO region using MMIO/ioreq handler
In-Reply-To: <20220310174501.62040-3-ayankuma@xilinx.com>
Message-ID: <alpine.DEB.2.22.394.2203101759210.3261@ubuntu-linux-20-04-desktop>
References: <20220310174501.62040-1-ayankuma@xilinx.com> <20220310174501.62040-3-ayankuma@xilinx.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Thu, 10 Mar 2022, Ayan Kumar Halder wrote:
> When an instruction is trapped in Xen due to translation fault, Xen
> checks if the ISS is invalid (for data abort) or it is an instruction
> abort. If so, Xen tries to resolve the translation fault using p2m page
> tables. In case of data abort, Xen will try to map the mmio region to
> the guest (ie tries to emulate the mmio region).
> 
> If the ISS is not valid and it is a data abort, then Xen tries to
> decode the instruction. In case of ioreq, Xen  saves the decoding state,
> rn and imm9 to vcpu_io. Whenever the vcpu handles the ioreq successfully,
> it will read the decoding state to determine if the instruction decoded
> was a ldr/str post indexing (ie INSTR_LDR_STR_POSTINDEXING). If so, it
> uses these details to post increment rn.
> 
> In case of mmio handler, if the mmio operation was successful, then Xen
> retrives the decoding state, rn and imm9. For state ==
> INSTR_LDR_STR_POSTINDEXING, Xen will update rn.
> 
> If there is an error encountered while decoding/executing the instruction,
> Xen will forward the abort to the guest.
> 
> Also, the logic to infer the type of instruction has been moved from
> try_handle_mmio() to try_decode_instruction() which is called before.
> try_handle_mmio() is solely responsible for handling the mmio operation.
> 
> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>

Reviewed-by: Stefano Stabellini <sstabellini@kernel.org>


> ---
> 
> Changelog :-
> 
> v2..v5 - Mentioned in the cover letter.
> 
> v6 - 1. Mantained the decoding state of the instruction. This is used by the
> caller to either abort the guest or retry or ignore or perform read/write on
> the mmio region.
> 
> 2. try_decode() invokes decoding for both aarch64 and thumb state. (Previously
> it used to invoke decoding only for aarch64 state). Thus, it handles all the
> checking of the registers before invoking any decoding of instruction.
> try_decode_instruction_invalid_iss() has thus been removed.
> 
> 3. Introduced a new field('enum instr_decode_state state') inside
> 'struct instr_details'. This holds the decoding state of the instruction.
> This is later read by the post_increment_register() to determine if rn needs to
> be incremented. Also, this is read by the callers of try_decode_instruction()
> to determine if the instruction was valid or ignored or to be retried or
> error or decoded successfully.
> 
> 4. Also stored 'instr_details' inside 'struct ioreq'. This enables
> arch_ioreq_complete_mmio() to invoke post_increment_register() without decoding
> the instruction again.
> 
> 5. Check hsr.dabt.valid in do_trap_stage2_abort_guest(). If it is not valid,
> then decode the instruction. This ensures that try_handle_mmio() is invoked only
> when the instruction is either valid or decoded successfully.
> 
> 6. Inside do_trap_stage2_abort_guest(), if hsr.dabt.valid is not set, then
> resolve the translation fault before trying to decode the instruction. If
> translation fault is resolved, then return to the guest to execute the instruction
> again.
> 
> 
> v7 - 1. Moved the decoding instruction details ie instr_details from 'struct ioreq'
> to 'struct vcpu_io'.
> 
> 2. The instruction is decoded only when we get a data abort.
> 
> 3. Replaced ASSERT_UNREACHABLE() with domain_crash(). The reason being asserts
> can be disabled in some builds. In this scenario when the guest's cpsr is in an
> erroneous state, Xen should crash the guest.
> 
> 4. Introduced check_p2m() which invokes p2m_resolve_translation_fault() and
> try_map_mmio() to resolve translation fault by configuring the page tables. This
> gets invoked first if ISS is invalid and it is an instruction abort. If it is
> a data abort and hsr.dabt.s1ptw is set or try_handle_mmio() returns IO_UNHANDLED,
> then check_p2m() gets invoked again.
> 
> 
> v8 - 1. Removed the handling of data abort when info->dabt.cache is set. This will
> be implemented in a subsequent patch. (Not as part of this series)
> 
> 2. When the data abort is due to access to stage 1 translation tables, Xen will
> try to fix the mapping of the page table for the corresponding address. If this
> returns an error, Xen will abort the guest. Else, it will ask the guest to retry
> the instruction.
> 
> 3. Changed v->io.info.dabt_instr from pointer to variable. The reason being that
> arch_ioreq_complete_mmio() is called from leave_hypervisor_to_guest().
> That is after do_trap_stage2_abort_guest()  has been invoked. So the original
> variable will be no longer valid.
> 
> 4. Some other style issues pointed out in v7.
> 
> 
> v9 - 1. Ensure that "Erratum 766422" is handled only when ISS is valid.
> 
> 2. Whenever Xen receives and instruction abort or data abort (with invalid ISS),
> Xen should first try to resolve the p2m translation fault or see if it it needs
> to map a MMIO region. If it succeeds, it should return to the guest to retry the
> instruction.
> 
> 3. Removed handling of "dabt.s1ptw == 1" aborts. This is addressed in patch3 as
> it is an existing bug in codebase.
> 
> 4. Various style issues pointed by Julien in v8.
> 
> 
> v10 - 1. Set 'dabt.valid=1' when the instruction is fully decoded. This is
> checked in try_handle_mmio() and try_fwd_ioserv().
> 
> 2. Various other style issues pointed in v9.
> 
>  xen/arch/arm/arm32/traps.c        | 11 ++++
>  xen/arch/arm/arm64/traps.c        | 52 ++++++++++++++++++
>  xen/arch/arm/decode.c             |  2 +
>  xen/arch/arm/include/asm/domain.h |  4 ++
>  xen/arch/arm/include/asm/mmio.h   | 17 +++++-
>  xen/arch/arm/include/asm/traps.h  |  2 +
>  xen/arch/arm/io.c                 | 90 +++++++++++++++++++------------
>  xen/arch/arm/ioreq.c              |  8 ++-
>  xen/arch/arm/traps.c              | 77 ++++++++++++++++++++------
>  xen/arch/x86/include/asm/ioreq.h  |  3 ++
>  xen/include/xen/sched.h           |  2 +
>  11 files changed, 214 insertions(+), 54 deletions(-)
> 
> diff --git a/xen/arch/arm/arm32/traps.c b/xen/arch/arm/arm32/traps.c
> index 9c9790a6d1..159e3cef8b 100644
> --- a/xen/arch/arm/arm32/traps.c
> +++ b/xen/arch/arm/arm32/traps.c
> @@ -18,9 +18,11 @@
>  
>  #include <xen/lib.h>
>  #include <xen/kernel.h>
> +#include <xen/sched.h>
>  
>  #include <public/xen.h>
>  
> +#include <asm/mmio.h>
>  #include <asm/processor.h>
>  #include <asm/traps.h>
>  
> @@ -82,6 +84,15 @@ void do_trap_data_abort(struct cpu_user_regs *regs)
>          do_unexpected_trap("Data Abort", regs);
>  }
>  
> +void post_increment_register(const struct instr_details *instr)
> +{
> +    /*
> +     * We have not implemented decoding of post indexing instructions for 32 bit.
> +     * Thus, this should be unreachable.
> +     */
> +    domain_crash(current->domain);
> +}
> +
>  /*
>   * Local variables:
>   * mode: C
> diff --git a/xen/arch/arm/arm64/traps.c b/xen/arch/arm/arm64/traps.c
> index 9113a15c7a..6ce4a1fa8c 100644
> --- a/xen/arch/arm/arm64/traps.c
> +++ b/xen/arch/arm/arm64/traps.c
> @@ -17,6 +17,7 @@
>   */
>  
>  #include <xen/lib.h>
> +#include <xen/sched.h>
>  
>  #include <asm/hsr.h>
>  #include <asm/system.h>
> @@ -44,6 +45,57 @@ void do_bad_mode(struct cpu_user_regs *regs, int reason)
>      panic("bad mode\n");
>  }
>  
> +void post_increment_register(const struct instr_details *instr)
> +{
> +    struct cpu_user_regs *regs = guest_cpu_user_regs();
> +    register_t val = 0;
> +    uint8_t psr_mode = (regs->cpsr & PSR_MODE_MASK);
> +
> +    /* Currently, we handle only ldr/str post indexing instructions */
> +    if ( instr->state != INSTR_LDR_STR_POSTINDEXING )
> +        return;
> +
> +    /*
> +     * Handle when rn = SP
> +     * Refer ArmV8 ARM DDI 0487G.b, Page - D1-2463 "Stack pointer register
> +     * selection"
> +     * t = SP_EL0
> +     * h = SP_ELx
> +     * and M[3:0] (Page - C5-474 "When exception taken from AArch64 state:")
> +     */
> +    if ( instr->rn == 31 )
> +    {
> +        switch ( psr_mode )
> +        {
> +        case PSR_MODE_EL1h:
> +            val = regs->sp_el1;
> +            break;
> +        case PSR_MODE_EL1t:
> +        case PSR_MODE_EL0t:
> +            val = regs->sp_el0;
> +            break;
> +
> +        default:
> +            domain_crash(current->domain);
> +            return;
> +        }
> +    }
> +    else
> +        val = get_user_reg(regs, instr->rn);
> +
> +    val += instr->imm9;
> +
> +    if ( instr->rn == 31 )
> +    {
> +        if ( (regs->cpsr & PSR_MODE_MASK) == PSR_MODE_EL1h )
> +            regs->sp_el1 = val;
> +        else
> +            regs->sp_el0 = val;
> +    }
> +    else
> +        set_user_reg(regs, instr->rn, val);
> +}
> +
>  /*
>   * Local variables:
>   * mode: C
> diff --git a/xen/arch/arm/decode.c b/xen/arch/arm/decode.c
> index 3add87e83a..f5f6562600 100644
> --- a/xen/arch/arm/decode.c
> +++ b/xen/arch/arm/decode.c
> @@ -146,8 +146,10 @@ static int decode_arm64(register_t pc, mmio_info_t *info)
>  
>      update_dabt(dabt, opcode.ldr_str.rt, opcode.ldr_str.size, false);
>  
> +    dabt_instr->state = INSTR_LDR_STR_POSTINDEXING;
>      dabt_instr->rn = opcode.ldr_str.rn;
>      dabt_instr->imm9 = opcode.ldr_str.imm9;
> +    dabt->valid = 1;
>  
>      return 0;
>  
> diff --git a/xen/arch/arm/include/asm/domain.h b/xen/arch/arm/include/asm/domain.h
> index c56f6e4398..ed63c2b6f9 100644
> --- a/xen/arch/arm/include/asm/domain.h
> +++ b/xen/arch/arm/include/asm/domain.h
> @@ -281,6 +281,10 @@ static inline void arch_vcpu_block(struct vcpu *v) {}
>  /* vPCI is not available on Arm */
>  #define has_vpci(d)    ({ (void)(d); false; })
>  
> +struct arch_vcpu_io {
> +    struct instr_details dabt_instr; /* when the instruction is decoded */
> +};
> +
>  #endif /* __ASM_DOMAIN_H__ */
>  
>  /*
> diff --git a/xen/arch/arm/include/asm/mmio.h b/xen/arch/arm/include/asm/mmio.h
> index 3354d9c635..ca259a79c2 100644
> --- a/xen/arch/arm/include/asm/mmio.h
> +++ b/xen/arch/arm/include/asm/mmio.h
> @@ -26,12 +26,24 @@
>  
>  #define MAX_IO_HANDLER  16
>  
> +enum instr_decode_state
> +{
> +    INSTR_ERROR,                    /* Error encountered while decoding instr */
> +    INSTR_VALID,                    /* ISS is valid, so no need to decode */
> +    /*
> +     * Instruction is decoded successfully. It is a ldr/str post indexing
> +     * instruction.
> +     */
> +    INSTR_LDR_STR_POSTINDEXING,
> +};
> +
>  typedef struct
>  {
>      struct hsr_dabt dabt;
>      struct instr_details {
>          unsigned long rn:5;
>          signed int imm9:9;
> +        enum instr_decode_state state;
>      } dabt_instr;
>      paddr_t gpa;
>  } mmio_info_t;
> @@ -69,14 +81,15 @@ struct vmmio {
>  };
>  
>  enum io_state try_handle_mmio(struct cpu_user_regs *regs,
> -                              const union hsr hsr,
> -                              paddr_t gpa);
> +                              mmio_info_t *info);
>  void register_mmio_handler(struct domain *d,
>                             const struct mmio_handler_ops *ops,
>                             paddr_t addr, paddr_t size, void *priv);
>  int domain_io_init(struct domain *d, int max_count);
>  void domain_io_free(struct domain *d);
>  
> +void try_decode_instruction(const struct cpu_user_regs *regs,
> +                            mmio_info_t *info);
>  
>  #endif  /* __ASM_ARM_MMIO_H__ */
>  
> diff --git a/xen/arch/arm/include/asm/traps.h b/xen/arch/arm/include/asm/traps.h
> index 2ed2b85c6f..95c46ad391 100644
> --- a/xen/arch/arm/include/asm/traps.h
> +++ b/xen/arch/arm/include/asm/traps.h
> @@ -109,6 +109,8 @@ static inline register_t sign_extend(const struct hsr_dabt dabt, register_t r)
>      return r;
>  }
>  
> +void post_increment_register(const struct instr_details *instr);
> +
>  #endif /* __ASM_ARM_TRAPS__ */
>  /*
>   * Local variables:
> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
> index fad103bdbd..fd903b7b03 100644
> --- a/xen/arch/arm/io.c
> +++ b/xen/arch/arm/io.c
> @@ -102,57 +102,79 @@ static const struct mmio_handler *find_mmio_handler(struct domain *d,
>      return handler;
>  }
>  
> +void try_decode_instruction(const struct cpu_user_regs *regs,
> +                            mmio_info_t *info)
> +{
> +    int rc;
> +
> +    if ( info->dabt.valid )
> +    {
> +        info->dabt_instr.state = INSTR_VALID;
> +
> +        /*
> +         * Erratum 766422: Thumb store translation fault to Hypervisor may
> +         * not have correct HSR Rt value.
> +         */
> +        if ( check_workaround_766422() && (regs->cpsr & PSR_THUMB) &&
> +             info->dabt.write )
> +        {
> +            rc = decode_instruction(regs, info);
> +            if ( rc )
> +            {
> +                gprintk(XENLOG_DEBUG, "Unable to decode instruction\n");
> +                info->dabt_instr.state = INSTR_ERROR;
> +            }
> +        }
> +        return;
> +    }
> +
> +    /*
> +     * Armv8 processor does not provide a valid syndrome for decoding some
> +     * instructions. So in order to process these instructions, Xen must
> +     * decode them.
> +     */
> +    rc = decode_instruction(regs, info);
> +    if ( rc )
> +    {
> +        gprintk(XENLOG_ERR, "Unable to decode instruction\n");
> +        info->dabt_instr.state = INSTR_ERROR;
> +    }
> +}
> +
>  enum io_state try_handle_mmio(struct cpu_user_regs *regs,
> -                              const union hsr hsr,
> -                              paddr_t gpa)
> +                              mmio_info_t *info)
>  {
>      struct vcpu *v = current;
>      const struct mmio_handler *handler = NULL;
> -    const struct hsr_dabt dabt = hsr.dabt;
> -    mmio_info_t info = {
> -        .gpa = gpa,
> -        .dabt = dabt
> -    };
> +    int rc;
>  
> -    ASSERT(hsr.ec == HSR_EC_DATA_ABORT_LOWER_EL);
> +    ASSERT(info->dabt.ec == HSR_EC_DATA_ABORT_LOWER_EL);
>  
> -    handler = find_mmio_handler(v->domain, info.gpa);
> -    if ( !handler )
> +    if ( !info->dabt.valid )
>      {
> -        int rc;
> +        ASSERT_UNREACHABLE();
> +        return IO_ABORT;
> +    }
>  
> -        rc = try_fwd_ioserv(regs, v, &info);
> +    handler = find_mmio_handler(v->domain, info->gpa);
> +    if ( !handler )
> +    {
> +        rc = try_fwd_ioserv(regs, v, info);
>          if ( rc == IO_HANDLED )
>              return handle_ioserv(regs, v);
>  
>          return rc;
>      }
>  
> -    /* All the instructions used on emulated MMIO region should be valid */
> -    if ( !dabt.valid )
> -        return IO_ABORT;
> -
>      /*
> -     * Erratum 766422: Thumb store translation fault to Hypervisor may
> -     * not have correct HSR Rt value.
> +     * At this point, we know that the instruction is either valid or has been
> +     * decoded successfully. Thus, Xen should be allowed to execute the
> +     * instruction on the emulated MMIO region.
>       */
> -    if ( check_workaround_766422() && (regs->cpsr & PSR_THUMB) &&
> -         dabt.write )
> -    {
> -        int rc;
> -
> -        rc = decode_instruction(regs, &info);
> -        if ( rc )
> -        {
> -            gprintk(XENLOG_DEBUG, "Unable to decode instruction\n");
> -            return IO_ABORT;
> -        }
> -    }
> -
> -    if ( info.dabt.write )
> -        return handle_write(handler, v, &info);
> +    if ( info->dabt.write )
> +        return handle_write(handler, v, info);
>      else
> -        return handle_read(handler, v, &info);
> +        return handle_read(handler, v, info);
>  }
>  
>  void register_mmio_handler(struct domain *d,
> diff --git a/xen/arch/arm/ioreq.c b/xen/arch/arm/ioreq.c
> index 308650b400..cc9bf23213 100644
> --- a/xen/arch/arm/ioreq.c
> +++ b/xen/arch/arm/ioreq.c
> @@ -47,6 +47,8 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
>                               struct vcpu *v, mmio_info_t *info)
>  {
>      struct vcpu_io *vio = &v->io;
> +    struct instr_details instr = info->dabt_instr;
> +    struct hsr_dabt dabt = info->dabt;
>      ioreq_t p = {
>          .type = IOREQ_TYPE_COPY,
>          .addr = info->gpa,
> @@ -76,10 +78,10 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
>      if ( !s )
>          return IO_UNHANDLED;
>  
> -    if ( !info->dabt.valid )
> -        return IO_ABORT;
> +    ASSERT(dabt.valid);
>  
>      vio->req = p;
> +    vio->info.dabt_instr = instr;
>  
>      rc = ioreq_send(s, &p, 0);
>      if ( rc != IO_RETRY || v->domain->is_shutting_down )
> @@ -95,6 +97,7 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
>  bool arch_ioreq_complete_mmio(void)
>  {
>      struct vcpu *v = current;
> +    struct instr_details dabt_instr = v->io.info.dabt_instr;
>      struct cpu_user_regs *regs = guest_cpu_user_regs();
>      const union hsr hsr = { .bits = regs->hsr };
>  
> @@ -106,6 +109,7 @@ bool arch_ioreq_complete_mmio(void)
>  
>      if ( handle_ioserv(regs, v) == IO_HANDLED )
>      {
> +        post_increment_register(&dabt_instr);
>          advance_pc(regs, hsr);
>          return true;
>      }
> diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
> index 7a1b679b8c..53652d7781 100644
> --- a/xen/arch/arm/traps.c
> +++ b/xen/arch/arm/traps.c
> @@ -1893,6 +1893,21 @@ static bool try_map_mmio(gfn_t gfn)
>      return !map_regions_p2mt(d, gfn, 1, mfn, p2m_mmio_direct_c);
>  }
>  
> +static inline bool check_p2m(bool is_data, paddr_t gpa)
> +{
> +    /*
> +     * First check if the translation fault can be resolved by the P2M subsystem.
> +     * If that's the case nothing else to do.
> +     */
> +    if ( p2m_resolve_translation_fault(current->domain , gaddr_to_gfn(gpa)) )
> +        return true;
> +
> +    if ( is_data && try_map_mmio(gaddr_to_gfn(gpa)) )
> +        return true;
> +
> +    return false;
> +}
> +
>  static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
>                                         const union hsr hsr)
>  {
> @@ -1906,6 +1921,8 @@ static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
>      paddr_t gpa;
>      uint8_t fsc = xabt.fsc & ~FSC_LL_MASK;
>      bool is_data = (hsr.ec == HSR_EC_DATA_ABORT_LOWER_EL);
> +    mmio_info_t info;
> +    enum io_state state;
>  
>      /*
>       * If this bit has been set, it means that this stage-2 abort is caused
> @@ -1959,21 +1976,52 @@ static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
>          return;
>      }
>      case FSC_FLT_TRANS:
> +    {
> +        info.gpa = gpa;
> +        info.dabt = hsr.dabt;
> +
>          /*
> -         * Attempt first to emulate the MMIO as the data abort will
> -         * likely happen in an emulated region.
> -         *
> -         * Note that emulated region cannot be executed
> +         * Assumption :- Most of the times when we get a data abort and the ISS
> +         * is invalid or an instruction abort, the underlying cause is that the
> +         * page tables have not been set up correctly.
>           */
> -        if ( is_data )
> +        if ( !is_data || !info.dabt.valid )
>          {
> -            enum io_state state = try_handle_mmio(regs, hsr, gpa);
> +            if ( check_p2m(is_data, gpa) )
> +                return;
>  
> -            switch ( state )
> -            {
> +            /*
> +             * If the instruction abort could not be resolved by setting the
> +             * appropriate bits in the translation table, then Xen should
> +             * forward the abort to the guest.
> +             */
> +            if ( !is_data )
> +                goto inject_abt;
> +        }
> +
> +        try_decode_instruction(regs, &info);
> +
> +        /*
> +         * If Xen could not decode the instruction or encountered an error
> +         * while decoding, then it should forward the abort to the guest.
> +         */
> +        if ( info.dabt_instr.state == INSTR_ERROR )
> +            goto inject_abt;
> +
> +        state = try_handle_mmio(regs, &info);
> +
> +        switch ( state )
> +        {
>              case IO_ABORT:
>                  goto inject_abt;
>              case IO_HANDLED:
> +                /*
> +                 * If the instruction was decoded and has executed successfully
> +                 * on the MMIO region, then Xen should execute the next part of
> +                 * the instruction. (for eg increment the rn if it is a
> +                 * post-indexing instruction.
> +                 */
> +                post_increment_register(&info.dabt_instr);
>                  advance_pc(regs, hsr);
>                  return;
>              case IO_RETRY:
> @@ -1982,21 +2030,18 @@ static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
>              case IO_UNHANDLED:
>                  /* IO unhandled, try another way to handle it. */
>                  break;
> -            }
>          }
>  
>          /*
> -         * First check if the translation fault can be resolved by the
> -         * P2M subsystem. If that's the case nothing else to do.
> +         * If the instruction syndrome was invalid, then we already checked if
> +         * this was due to a P2M fault. So no point to check again as the result
> +         * will be the same.
>           */
> -        if ( p2m_resolve_translation_fault(current->domain,
> -                                           gaddr_to_gfn(gpa)) )
> -            return;
> -
> -        if ( is_data && try_map_mmio(gaddr_to_gfn(gpa)) )
> +        if ( (info.dabt_instr.state == INSTR_VALID) && check_p2m(is_data, gpa) )
>              return;
>  
>          break;
> +    }
>      default:
>          gprintk(XENLOG_WARNING,
>                  "Unsupported FSC: HSR=%#"PRIregister" DFSC=%#x\n",
> diff --git a/xen/arch/x86/include/asm/ioreq.h b/xen/arch/x86/include/asm/ioreq.h
> index d06ce9a6ea..ecfe7f9fdb 100644
> --- a/xen/arch/x86/include/asm/ioreq.h
> +++ b/xen/arch/x86/include/asm/ioreq.h
> @@ -26,6 +26,9 @@
>  #include <asm/hvm/ioreq.h>
>  #endif
>  
> +struct arch_vcpu_io {
> +};
> +
>  #endif /* __ASM_X86_IOREQ_H__ */
>  
>  /*
> diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
> index 10ea969c7a..406d9bc610 100644
> --- a/xen/include/xen/sched.h
> +++ b/xen/include/xen/sched.h
> @@ -160,6 +160,8 @@ struct vcpu_io {
>      /* I/O request in flight to device model. */
>      enum vio_completion  completion;
>      ioreq_t              req;
> +    /* Arch specific info pertaining to the io request */
> +    struct arch_vcpu_io  info;
>  };
>  
>  struct vcpu
> -- 
> 2.17.1
> 
> 


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 02:06:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 02:06:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288645.489528 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSUfo-0004gJ-TV; Fri, 11 Mar 2022 02:06:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288645.489528; Fri, 11 Mar 2022 02:06:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSUfo-0004gC-QJ; Fri, 11 Mar 2022 02:06:32 +0000
Received: by outflank-mailman (input) for mailman id 288645;
 Fri, 11 Mar 2022 02:06:31 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=8RDm=TW=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nSUfn-0004g6-IV
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 02:06:31 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id dddc47aa-a0df-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 03:06:30 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id AB4DFB829B8;
 Fri, 11 Mar 2022 02:06:29 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id C2AC5C340E8;
 Fri, 11 Mar 2022 02:06:27 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: dddc47aa-a0df-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646964388;
	bh=+gN9ASdsAqbrPChnsiLbZRYTMat+zAXKK6CDtuMVhjc=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=FG6MngYkq3kYMOxB5tNBEnIB7Fk+jP8KZcYAJJV6YbLrQZyge8jIzgP394fp23cZe
	 IA9RdtGkvkO+zGp4udVel2rDcSiBSR5DoSB6V4jPHJf6RBqQ51wmvLKTXIaCF79om1
	 1SSBqO3lqbUOaAx+eJMywUzslkAVtji9DxYU+yw5xfIbJRXGZCS2TC97ZwBZJSN6bc
	 96/BhnDSKUJfdqIFEi2lq8c6tpBQ5/5KvZyGMPijktkiH45hlLscsBnYRKbcG1sItE
	 jJu8csoRERKQUjv3nFmmsdrR2Womzg+9idxa/AVommWY5n6Wov20eymlELUIBInM+V
	 ctyzcXvcJO9kA==
Date: Thu, 10 Mar 2022 18:06:26 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
cc: xen-devel@lists.xenproject.org, sstabellini@kernel.org, 
    stefanos@xilinx.com, julien@xen.org, Volodymyr_Babchuk@epam.com, 
    bertrand.marquis@arm.com, andrew.cooper3@citrix.com, 
    george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org, 
    roger.pau@citrix.com, Ayan Kumar Halder <ayankuma@xilinx.com>
Subject: Re: [XEN v10 3/4] xen/arm64: io: Handle the abort due to access to
 stage1 translation table
In-Reply-To: <20220310174501.62040-4-ayankuma@xilinx.com>
Message-ID: <alpine.DEB.2.22.394.2203101805360.3261@ubuntu-linux-20-04-desktop>
References: <20220310174501.62040-1-ayankuma@xilinx.com> <20220310174501.62040-4-ayankuma@xilinx.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Thu, 10 Mar 2022, Ayan Kumar Halder wrote:
> If the abort was caused due to access to stage1 translation table, Xen
> will try to set the p2m entry (assuming that the Stage 1 translation
> table is in the non MMIO region).
> If there is no such entry found, then Xen will try to map the address as
> a MMIO region (assuming that the Stage 1 translation table is in the
> direct MMIO region).
> 
> If that fails as well, then there are the two following scenarios:-
> 1. Stage 1 translation table being in the emulated MMIO region - Xen
> can read the region, but it has no way to return the value read to the
> CPU page table walker (which tries to go through the stage1 tables to
> resolve the translation fault).
> 
> 2. Stage 1 translation table address is invalid.
> 
> In both the above scenarios, Xen will forward the abort to the guest.
> 
> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
> ---
> 
> Changelog :-
> 
> v1..v8 - NA
> 
> v9 - 1. Extracted this change from "[XEN v8 2/2] xen/arm64: io: Support
> instructions (for which ISS is not..." into a separate patch of its own.
> The reason being this is an existing bug in the codebase.
> 
> v10 - 1. Enabled checking for stage1 translation table address in the
> MMIO region. The reason being Arm Arm does not have any restrictions.
> 2. Updated the commit message to explain all the possible scenarios.
> 
>  xen/arch/arm/io.c | 11 +++++++++++
>  1 file changed, 11 insertions(+)
> 
> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
> index fd903b7b03..e6c77e16bf 100644
> --- a/xen/arch/arm/io.c
> +++ b/xen/arch/arm/io.c
> @@ -128,6 +128,17 @@ void try_decode_instruction(const struct cpu_user_regs *regs,
>          return;
>      }
>  
> +    /*
> +     * At this point, we know that the stage1 translation table is either in the
> +     * emulated MMIO region or its address is invalid . This is not expected by
                                                        ^

This looks OK to me now, but I'll let Julien ack/comment as he has been
following more closely.


> +     * Xen and thus it forwards the abort to the guest.
> +     */
> +    if ( info->dabt.s1ptw )
> +    {
> +        info->dabt_instr.state = INSTR_ERROR;
> +        return;
> +    }
>      /*
>       * Armv8 processor does not provide a valid syndrome for decoding some
>       * instructions. So in order to process these instructions, Xen must
> -- 
> 2.17.1
> 
> 


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 02:25:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 02:25:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288649.489538 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSUy9-00071l-Gq; Fri, 11 Mar 2022 02:25:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288649.489538; Fri, 11 Mar 2022 02:25:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSUy9-00071e-Dn; Fri, 11 Mar 2022 02:25:29 +0000
Received: by outflank-mailman (input) for mailman id 288649;
 Fri, 11 Mar 2022 02:25:27 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=8RDm=TW=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nSUy7-00071Y-LE
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 02:25:27 +0000
Received: from sin.source.kernel.org (sin.source.kernel.org
 [2604:1380:40e1:4800::1])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 8235b9e3-a0e2-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 03:25:26 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by sin.source.kernel.org (Postfix) with ESMTPS id 7BE92CE26D0;
 Fri, 11 Mar 2022 02:25:21 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2A767C340E8;
 Fri, 11 Mar 2022 02:25:19 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8235b9e3-a0e2-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646965519;
	bh=yHKa0cSP1NYreZiHqCrhYlTJ0pBTR4aEa6N0TsokFGM=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=ML1TAeMTxI/MLZD0ZjVD+xcYKJf4S1SFl9TlTjJNb0VJB66vlvQJOhx+6r3qzmECM
	 NyNLYHQ3XusLuT8n0afsyF91h46B2A216uP565fxr5DcXVg2H4IkbrYzH2wyDfqiHa
	 WQ5+fVr4YWYNABHlkSWIhWrSaT67+vHuxjPahR4VPuzoLzPCkuQVsYvemONCtrtnGV
	 8FrkzvPFrtN8pFEK7mGRwUXzOG6xd8ZciCqkhqU/m5RrJwW0zqPGvnIK6uvncu5FiT
	 Jn67hvDOGzvVSW5nK+uFQ70JP9vvIBL8R16bQnJjRW8OwSVGfxkCm4WCwyITxohMJ8
	 9S3/XD1RDbNjg==
Date: Thu, 10 Mar 2022 18:25:18 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
cc: xen-devel@lists.xenproject.org, sstabellini@kernel.org, 
    stefanos@xilinx.com, julien@xen.org, Volodymyr_Babchuk@epam.com, 
    bertrand.marquis@arm.com, andrew.cooper3@citrix.com, 
    george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org, 
    roger.pau@citrix.com, Ayan Kumar Halder <ayankuma@xilinx.com>
Subject: Re: [XEN v10 4/4] xen/arm64: io: Handle data abort due to cache
 maintenance instructions
In-Reply-To: <20220310174501.62040-5-ayankuma@xilinx.com>
Message-ID: <alpine.DEB.2.22.394.2203101813030.3261@ubuntu-linux-20-04-desktop>
References: <20220310174501.62040-1-ayankuma@xilinx.com> <20220310174501.62040-5-ayankuma@xilinx.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Thu, 10 Mar 2022, Ayan Kumar Halder wrote:
> When the data abort is caused due to cache maintenance for an address,
> there are three scenarios:-
> 
> 1. Address belonging to a non emulated region - For this, Xen should
> set the corresponding bit in the translation table entry to valid and
> return to the guest to retry the instruction. This can happen sometimes
> as Xen need to set the translation table entry to invalid. (for eg
> 'Break-Before-Make' sequence). Xen returns to the guest to retry the
> instruction.
> 
> 2. Address belongs to an emulated region - Xen should ignore the
> instruction (ie increment the PC) and return to the guest.
> 
> 3. Address is invalid - Xen should forward the data abort to the guest.
> 
> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
> ---
> 
> Changelog:-
> 
> v1...v8 - NA
> 
> v9 - Extracted this change from "[XEN v7 2/2] xen/arm64: io: Support
> instructions (for which ISS is not ..." into a separate patch of its
> own. The reason being this addresses an existing bug in the codebase.
> 
> v10 - 1. To check if the address belongs to an emulated region, one
> needs to check if it has a mmio handler or an ioreq server. In this
> case, Xen should increment the PC
> 2. If the address is invalid (niether emulated MMIO nor the translation
> could be resolved via p2m or mapping the MMIO region), then Xen should
> forward the abort to the guest.
> 
>  xen/arch/arm/include/asm/mmio.h |  1 +
>  xen/arch/arm/io.c               | 20 ++++++++++++++++++++
>  xen/arch/arm/ioreq.c            | 15 ++++++++++++++-
>  3 files changed, 35 insertions(+), 1 deletion(-)
> 
> diff --git a/xen/arch/arm/include/asm/mmio.h b/xen/arch/arm/include/asm/mmio.h
> index ca259a79c2..79e64d9af8 100644
> --- a/xen/arch/arm/include/asm/mmio.h
> +++ b/xen/arch/arm/include/asm/mmio.h
> @@ -35,6 +35,7 @@ enum instr_decode_state
>       * instruction.
>       */
>      INSTR_LDR_STR_POSTINDEXING,
> +    INSTR_CACHE,                    /* Cache Maintenance instr */
>  };
>  
>  typedef struct
> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
> index e6c77e16bf..c5b2980a5f 100644
> --- a/xen/arch/arm/io.c
> +++ b/xen/arch/arm/io.c
> @@ -139,6 +139,17 @@ void try_decode_instruction(const struct cpu_user_regs *regs,
>          return;
>      }
>  
> +    /*
> +     * When the data abort is caused due to cache maintenance, Xen should check
> +     * if the address belongs to an emulated MMIO region or not. The behavior
> +     * will differ accordingly.
> +     */
> +    if ( info->dabt.cache )
> +    {
> +        info->dabt_instr.state = INSTR_CACHE;
> +        return;
> +    }
> +
>      /*
>       * Armv8 processor does not provide a valid syndrome for decoding some
>       * instructions. So in order to process these instructions, Xen must
> @@ -177,6 +188,15 @@ enum io_state try_handle_mmio(struct cpu_user_regs *regs,
>          return rc;
>      }
>  
> +    /*
> +     * When the data abort is caused due to cache maintenance and the address
> +     * belongs to an emulated region, Xen should ignore this instruction.
> +     */
> +    if ( info->dabt_instr.state == INSTR_CACHE )
> +    {
> +        return IO_HANDLED;
> +    }
>      /*
>       * At this point, we know that the instruction is either valid or has been
>       * decoded successfully. Thus, Xen should be allowed to execute the
> diff --git a/xen/arch/arm/ioreq.c b/xen/arch/arm/ioreq.c
> index cc9bf23213..0dd2d452f7 100644
> --- a/xen/arch/arm/ioreq.c
> +++ b/xen/arch/arm/ioreq.c
> @@ -29,10 +29,14 @@ enum io_state handle_ioserv(struct cpu_user_regs *regs, struct vcpu *v)
>      const struct hsr_dabt dabt = hsr.dabt;
>      /* Code is similar to handle_read */
>      register_t r = v->io.req.data;
> +    const struct instr_details instr = v->io.info.dabt_instr;
>  
>      /* We are done with the IO */
>      v->io.req.state = STATE_IOREQ_NONE;
>  
> +    if ( instr.state == INSTR_CACHE )
> +        return IO_HANDLED;

It might be possible to get rid of this check here by rearranging the
code in try_handle_mmio a little bit so that handle_ioserv is not called
when INSTR_CACHE. But I don't have an opinion about it.

The patch does what it says on the tin and as far as I can tell followed
Julien's requests so:

Reviewed-by: Stefano Stabellini <sstabellini@kernel.org>


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 02:29:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 02:29:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288653.489550 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSV1p-0007fF-0A; Fri, 11 Mar 2022 02:29:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288653.489550; Fri, 11 Mar 2022 02:29:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSV1o-0007f8-TG; Fri, 11 Mar 2022 02:29:16 +0000
Received: by outflank-mailman (input) for mailman id 288653;
 Fri, 11 Mar 2022 02:29:14 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSV1m-0007ey-Sw; Fri, 11 Mar 2022 02:29:14 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSV1m-0004sk-PV; Fri, 11 Mar 2022 02:29:14 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSV1m-00087E-9Y; Fri, 11 Mar 2022 02:29:14 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSV1m-0001IU-7S; Fri, 11 Mar 2022 02:29:14 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=DAsJB5sRBgV559eU2mdZCUyB3xt6Iaz0+8tXpHO2Y/A=; b=Hu1PdxCcZBUb9ebI+tQFq3yvdQ
	v2j5QU/HNc3h5OBWRv1uLtfiKrX5lX+PETPJJtXZ+kzzJcA7N4mJsJX5NstNnc8A+vgmb/8TDWFTs
	4UM4PU3ccokT3jXDCwcHIZAJw42u49fJpaeZUSP52EX6Al6tFTtZHz/iNnGe/8nvtX2I=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168502-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.15-testing test] 168502: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-4.15-testing:test-armhf-armhf-xl-rtds:guest-start.2:fail:allowable
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=cd751c09a5bab9f3529901fbe4d867ad7d52e89d
X-Osstest-Versions-That:
    xen=1b50f41b3bd800eb72064063da0c64b86d629f3a
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 11 Mar 2022 02:29:14 +0000

flight 168502 xen-4.15-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168502/

Failures :-/ but no regressions.

Regressions which are regarded as allowable (not blocking):
 test-armhf-armhf-xl-rtds     19 guest-start.2            fail REGR. vs. 168483

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168483
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168483
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168483
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168483
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168483
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168483
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168483
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168483
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168483
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168483
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168483
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168483
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass

version targeted for testing:
 xen                  cd751c09a5bab9f3529901fbe4d867ad7d52e89d
baseline version:
 xen                  1b50f41b3bd800eb72064063da0c64b86d629f3a

Last test of basis   168483  2022-03-08 18:08:22 Z    2 days
Testing same since   168502  2022-03-10 09:07:57 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Gao Xiang <hsiangkao@linux.alibaba.com>
  Jan Beulich <jbeulich@suse.com>
  Lasse Collin <lasse.collin@tukaani.org>
  Roger Pau Monné <roger.pau@citrix.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   1b50f41b3b..cd751c09a5  cd751c09a5bab9f3529901fbe4d867ad7d52e89d -> stable-4.15


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 03:58:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 03:58:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288668.489588 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSWPw-0008N6-Al; Fri, 11 Mar 2022 03:58:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288668.489588; Fri, 11 Mar 2022 03:58:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSWPw-0008Mz-6z; Fri, 11 Mar 2022 03:58:16 +0000
Received: by outflank-mailman (input) for mailman id 288668;
 Fri, 11 Mar 2022 03:58:14 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=8RDm=TW=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nSWPu-00087M-DO
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 03:58:14 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 789973d0-a0ef-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 04:58:13 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id CAE9560F18;
 Fri, 11 Mar 2022 03:58:11 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id AAD90C340EC;
 Fri, 11 Mar 2022 03:58:10 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 789973d0-a0ef-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646971091;
	bh=Zx/7Tqb+5PSJtuLt9nlAhd3CHH8tWXSQ0LeJbdqhxKU=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=Z3ZxE4JQRInp4Ei5xefT5EYGcuwVJbiLHRsA8WKz4iWRCH9s6hNjmw9Vm93GOLQil
	 WTpQuiFnDfD3SbI+IyHioo8KucUUX2su2rPWDfcpms7Scz3P/PcJ3gZnyb6Bm1gFSI
	 kN93eZXVsmPu8AOg3GB2e61p77LIp5dQt2dVTIP2fGLG8omXNkipGvLHIVJ3b8Gu51
	 KIljOjnu1+TQApBr8lUCKuYt94zJFv6C2U52lB8KfinrPYm3NrRcTVORwHQhSZKFXD
	 a7iJnyQtMgJ9Cuz7YaOair9L9yhKhgyzxMCQbFHczehkjZ8wKXgYOuZbk/jCqBEnBA
	 C2+x0DrVAz8WA==
Date: Thu, 10 Mar 2022 19:58:10 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Luca Fancellu <luca.fancellu@arm.com>
cc: xen-devel@lists.xenproject.org, wei.chen@arm.com, 
    Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>, 
    Bertrand Marquis <bertrand.marquis@arm.com>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, 
    Andrew Cooper <andrew.cooper3@citrix.com>, 
    George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, 
    Wei Liu <wl@xen.org>
Subject: Re: [PATCH v2 5/6] arm/dom0less: assign dom0less guests to
 cpupools
In-Reply-To: <20220310171019.6170-6-luca.fancellu@arm.com>
Message-ID: <alpine.DEB.2.22.394.2203101926250.3261@ubuntu-linux-20-04-desktop>
References: <20220310171019.6170-1-luca.fancellu@arm.com> <20220310171019.6170-6-luca.fancellu@arm.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Thu, 10 Mar 2022, Luca Fancellu wrote:
> Introduce domain-cpupool property of a xen,domain device tree node,
> that specifies the cpupool device tree handle of a xen,cpupool node
> that identifies a cpupool created at boot time where the guest will
> be assigned on creation.
> 
> Add member to the xen_domctl_createdomain public interface so the
> XEN_DOMCTL_INTERFACE_VERSION version is bumped.
> 
> Add public function to retrieve a pool id from the device tree
> cpupool node.
> 
> Update documentation about the property.
> 
> Signed-off-by: Luca Fancellu <luca.fancellu@arm.com>
> ---
> Changes in v2:
> - Moved cpupool_id from arch specific to common part (Juergen)
> - Implemented functions to retrieve the cpupool id from the
>   cpupool dtb node.
> ---
>  docs/misc/arm/device-tree/booting.txt |  5 +++++
>  xen/arch/arm/domain_build.c           | 14 +++++++++++++-
>  xen/common/boot_cpupools.c            | 24 ++++++++++++++++++++++++
>  xen/common/domain.c                   |  2 +-
>  xen/include/public/domctl.h           |  4 +++-
>  xen/include/xen/sched.h               |  9 +++++++++
>  6 files changed, 55 insertions(+), 3 deletions(-)
> 
> diff --git a/docs/misc/arm/device-tree/booting.txt b/docs/misc/arm/device-tree/booting.txt
> index a94125394e35..7b4a29a2c293 100644
> --- a/docs/misc/arm/device-tree/booting.txt
> +++ b/docs/misc/arm/device-tree/booting.txt
> @@ -188,6 +188,11 @@ with the following properties:
>      An empty property to request the memory of the domain to be
>      direct-map (guest physical address == physical address).
>  
> +- domain-cpupool
> +
> +    Optional. Handle to a xen,cpupool device tree node that identifies the
> +    cpupool where the guest will be started at boot.
> +
>  Under the "xen,domain" compatible node, one or more sub-nodes are present
>  for the DomU kernel and ramdisk.
>  
> diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
> index 8be01678de05..9c67a483d4a4 100644
> --- a/xen/arch/arm/domain_build.c
> +++ b/xen/arch/arm/domain_build.c
> @@ -3172,7 +3172,8 @@ static int __init construct_domU(struct domain *d,
>  void __init create_domUs(void)
>  {
>      struct dt_device_node *node;
> -    const struct dt_device_node *chosen = dt_find_node_by_path("/chosen");
> +    const struct dt_device_node *cpupool_node,
> +                                *chosen = dt_find_node_by_path("/chosen");
>  
>      BUG_ON(chosen == NULL);
>      dt_for_each_child_node(chosen, node)
> @@ -3241,6 +3242,17 @@ void __init create_domUs(void)
>                                           vpl011_virq - 32 + 1);
>          }
>  
> +        /* Get the optional property domain-cpupool */
> +        cpupool_node = dt_parse_phandle(node, "domain-cpupool", 0);
> +        if ( cpupool_node )
> +        {
> +            int pool_id = btcpupools_get_domain_pool_id(cpupool_node);
> +            if ( pool_id < 0 )
> +                panic("Error getting cpupool id from domain-cpupool (%d)\n",
> +                      pool_id);
> +            d_cfg.cpupool_id = pool_id;
> +        }
> +
>          /*
>           * The variable max_init_domid is initialized with zero, so here it's
>           * very important to use the pre-increment operator to call
> diff --git a/xen/common/boot_cpupools.c b/xen/common/boot_cpupools.c
> index e8529a902d21..01a69f894f14 100644
> --- a/xen/common/boot_cpupools.c
> +++ b/xen/common/boot_cpupools.c
> @@ -11,6 +11,8 @@
>  
>  #define BTCPUPOOLS_DT_NODE_NO_REG     (-1)
>  #define BTCPUPOOLS_DT_NODE_NO_LOG_CPU (-2)
> +#define BTCPUPOOLS_DT_WRONG_NODE      (-3)
> +#define BTCPUPOOLS_DT_CORRUPTED_NODE  (-4)
>  
>  struct pool_map {
>      int pool_id;
> @@ -53,6 +55,28 @@ get_logical_cpu_from_cpu_node(const struct dt_device_node *cpu_node)
>      return cpu_num;
>  }
>  
> +int __init btcpupools_get_domain_pool_id(const struct dt_device_node *node)
> +{
> +    const struct dt_device_node *phandle_node;
> +    int cpu_num;
> +
> +    if ( !dt_device_is_compatible(node, "xen,cpupool") )
> +        return BTCPUPOOLS_DT_WRONG_NODE;
> +    /*
> +     * Get first cpu listed in the cpupool, from its reg it's possible to
> +     * retrieve the cpupool id.
> +     */
> +    phandle_node = dt_parse_phandle(node, "cpupool-cpus", 0);
> +    if ( !phandle_node )
> +        return BTCPUPOOLS_DT_CORRUPTED_NODE;
> +
> +    cpu_num = get_logical_cpu_from_cpu_node(phandle_node);
> +    if ( cpu_num < 0 )
> +        return cpu_num;
> +
> +    return pool_cpu_map[cpu_num].pool_id;
> +}

Nice!


>  static int __init check_and_get_sched_id(const char* scheduler_name)
>  {
>      int sched_id = sched_get_id_by_name(scheduler_name);
> diff --git a/xen/common/domain.c b/xen/common/domain.c
> index 351029f8b239..0827400f4f49 100644
> --- a/xen/common/domain.c
> +++ b/xen/common/domain.c
> @@ -698,7 +698,7 @@ struct domain *domain_create(domid_t domid,
>          if ( !d->pbuf )
>              goto fail;
>  
> -        if ( (err = sched_init_domain(d, 0)) != 0 )
> +        if ( (err = sched_init_domain(d, config->cpupool_id)) != 0 )
>              goto fail;
>  
>          if ( (err = late_hwdom_init(d)) != 0 )
> diff --git a/xen/include/public/domctl.h b/xen/include/public/domctl.h
> index b85e6170b0aa..3d431a8031fd 100644
> --- a/xen/include/public/domctl.h
> +++ b/xen/include/public/domctl.h
> @@ -38,7 +38,7 @@
>  #include "hvm/save.h"
>  #include "memory.h"
>  
> -#define XEN_DOMCTL_INTERFACE_VERSION 0x00000014
> +#define XEN_DOMCTL_INTERFACE_VERSION 0x00000015
>  
>  /*
>   * NB. xen_domctl.domain is an IN/OUT parameter for this operation.
> @@ -106,6 +106,8 @@ struct xen_domctl_createdomain {
>      /* Per-vCPU buffer size in bytes.  0 to disable. */
>      uint32_t vmtrace_size;
>  
> +    unsigned int cpupool_id;

Please use an explicitly sized integer


>      struct xen_arch_domainconfig arch;
>  };
>  
> diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
> index de4e8feea399..30a6538452bc 100644
> --- a/xen/include/xen/sched.h
> +++ b/xen/include/xen/sched.h
> @@ -1182,6 +1182,7 @@ struct cpupool *btcpupools_get_cpupool(unsigned int cpu);
>  
>  #ifdef CONFIG_ARM
>  void btcpupools_dtb_parse(void);
> +int btcpupools_get_domain_pool_id(const struct dt_device_node *node);
>  #else
>  static inline void btcpupools_dtb_parse(void) {}
>  #endif
> @@ -1193,6 +1194,14 @@ static inline struct cpupool *btcpupools_get_cpupool(unsigned int cpu)
>  {
>      return cpupool0;
>  }
> +#ifdef CONFIG_ARM
> +static inline int
> +btcpupools_get_domain_pool_id(const struct dt_device_node *node)
> +{
> +    return 0;
> +}
> +#endif
> +
>  #endif
>  
>  #endif /* __SCHED_H__ */
> -- 
> 2.17.1
> 


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 03:58:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 03:58:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288667.489577 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSWPt-00087Z-2z; Fri, 11 Mar 2022 03:58:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288667.489577; Fri, 11 Mar 2022 03:58:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSWPs-00087S-V5; Fri, 11 Mar 2022 03:58:12 +0000
Received: by outflank-mailman (input) for mailman id 288667;
 Fri, 11 Mar 2022 03:58:11 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=8RDm=TW=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nSWPr-00087M-CC
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 03:58:11 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 746bafec-a0ef-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 04:58:08 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 6B62AB82856;
 Fri, 11 Mar 2022 03:58:04 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 777B8C340EE;
 Fri, 11 Mar 2022 03:58:02 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 746bafec-a0ef-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1646971083;
	bh=Bk3RZTgTHcZjpg+cqrU2aAsjDMmaJEACzHS2mwJaEIY=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=ZetPW6dnKQCF7XYn08OsufLzzBDABrnn7qNPXg69ijskJLV7ZVGuEWcT4sJ1nhoVf
	 7v4aZdp2TI1bDlhWgTDP7j98ec5TOp0oW4v5KuoAHHb1iXBoeoAIKzIjx3HSTYDG40
	 zChYbvKxI9mjd9FiVCaMvs5lxpfWdq17KJyK7UZgnrNE1gmZ2dl1BRUsPOIJGQXLKR
	 Dm5GCQQkRTFWkKdzT9C5ehbipqSMs3WDewOd19sQ/dOO8e3RzBC34g3iWzXW1TJxr5
	 RAnAFIC5/ShRgn3KcjJ1b7bb1o3aWwR9pt+tv/5h5LamNUGMTOzpJ8MeAOXp8XgYb3
	 RkwlTTx2a5eLQ==
Date: Thu, 10 Mar 2022 19:57:55 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Luca Fancellu <luca.fancellu@arm.com>
cc: xen-devel@lists.xenproject.org, wei.chen@arm.com, 
    Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>, 
    Bertrand Marquis <bertrand.marquis@arm.com>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, 
    Andrew Cooper <andrew.cooper3@citrix.com>, 
    George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, 
    Wei Liu <wl@xen.org>, Juergen Gross <jgross@suse.com>, 
    Dario Faggioli <dfaggioli@suse.com>
Subject: Re: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
In-Reply-To: <20220310171019.6170-5-luca.fancellu@arm.com>
Message-ID: <alpine.DEB.2.22.394.2203101957370.3497@ubuntu-linux-20-04-desktop>
References: <20220310171019.6170-1-luca.fancellu@arm.com> <20220310171019.6170-5-luca.fancellu@arm.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Thu, 10 Mar 2022, Luca Fancellu wrote:
> Introduce a way to create different cpupools at boot time, this is
> particularly useful on ARM big.LITTLE system where there might be the
> need to have different cpupools for each type of core, but also
> systems using NUMA can have different cpu pools for each node.
> 
> The feature on arm relies on a specification of the cpupools from the
> device tree to build pools and assign cpus to them.
> 
> Documentation is created to explain the feature.
> 
> Signed-off-by: Luca Fancellu <luca.fancellu@arm.com>
> ---
> Changes in v2:
> - Move feature to common code (Juergen)
> - Try to decouple dtb parse and cpupool creation to allow
>   more way to specify cpupools (for example command line)
> - Created standalone dt node for the scheduler so it can
>   be used in future work to set scheduler specific
>   parameters
> - Use only auto generated ids for cpupools
> ---
>  docs/misc/arm/device-tree/cpupools.txt | 156 ++++++++++++++++++
>  xen/common/Kconfig                     |   8 +
>  xen/common/Makefile                    |   1 +
>  xen/common/boot_cpupools.c             | 212 +++++++++++++++++++++++++
>  xen/common/sched/cpupool.c             |   6 +-
>  xen/include/xen/sched.h                |  19 +++
>  6 files changed, 401 insertions(+), 1 deletion(-)
>  create mode 100644 docs/misc/arm/device-tree/cpupools.txt
>  create mode 100644 xen/common/boot_cpupools.c
> 
> diff --git a/docs/misc/arm/device-tree/cpupools.txt b/docs/misc/arm/device-tree/cpupools.txt
> new file mode 100644
> index 000000000000..d5a82ed0d45a
> --- /dev/null
> +++ b/docs/misc/arm/device-tree/cpupools.txt
> @@ -0,0 +1,156 @@
> +Boot time cpupools
> +==================
> +
> +When BOOT_TIME_CPUPOOLS is enabled in the Xen configuration, it is possible to
> +create cpupools during boot phase by specifying them in the device tree.
> +
> +Cpupools specification nodes shall be direct childs of /chosen node.
> +Each cpupool node contains the following properties:
> +
> +- compatible (mandatory)
> +
> +    Must always include the compatiblity string: "xen,cpupool".
> +
> +- cpupool-cpus (mandatory)
> +
> +    Must be a list of device tree phandle to nodes describing cpus (e.g. having
> +    device_type = "cpu"), it can't be empty.
> +
> +- cpupool-sched (optional)
> +
> +    Must be a device tree phandle to a node having "xen,scheduler" compatible
> +    (description below), it has no effect when the cpupool refers to the cpupool
> +    number zero, in that case the default Xen scheduler is selected (sched=<...>
> +    boot argument).

This is *a lot* better.

The device tree part is nice. I have only one question left on it: why
do we need a separate scheduler node? Could the "cpupool-sched" property
be a simple string with the scheduler name?

E.g.:

    cpupool_a {
        compatible = "xen,cpupool";
        cpupool-cpus = <&a53_1 &a53_2>;
    };
    cpupool_b {
        compatible = "xen,cpupool";
        cpupool-cpus = <&a72_1 &a72_2>;
        cpupool-sched = "null";
    };


To me, it doesn't look like these new "scheduler specification nodes"
bring any benefits. I would just get rid of them.


> +A scheduler specification node is a device tree node that contains the following
> +properties:
> +
> +- compatible (mandatory)
> +
> +    Must always include the compatiblity string: "xen,scheduler".
> +
> +- sched-name (mandatory)
> +
> +    Must be a string having the name of a Xen scheduler, check the sched=<...>
> +    boot argument for allowed values.
> +
> +
> +Constraints
> +===========
> +
> +If no cpupools are specified, all cpus will be assigned to one cpupool
> +implicitly created (Pool-0).
> +
> +If cpupools node are specified, but not every cpu brought up by Xen is assigned,
> +all the not assigned cpu will be assigned to an additional cpupool.
> +
> +If a cpu is assigned to a cpupool, but it's not brought up correctly, Xen will
> +stop.
> +
> +
> +Examples
> +========
> +
> +A system having two types of core, the following device tree specification will
> +instruct Xen to have two cpupools:
> +
> +- The cpupool with id 0 will have 4 cpus assigned.
> +- The cpupool with id 1 will have 2 cpus assigned.
> +
> +The following example can work only if hmp-unsafe=1 is passed to Xen boot
> +arguments, otherwise not all cores will be brought up by Xen and the cpupool
> +creation process will stop Xen.
> +
> +
> +a72_1: cpu@0 {
> +        compatible = "arm,cortex-a72";
> +        reg = <0x0 0x0>;
> +        device_type = "cpu";
> +        [...]
> +};
> +
> +a72_2: cpu@1 {
> +        compatible = "arm,cortex-a72";
> +        reg = <0x0 0x1>;
> +        device_type = "cpu";
> +        [...]
> +};
> +
> +a53_1: cpu@100 {
> +        compatible = "arm,cortex-a53";
> +        reg = <0x0 0x100>;
> +        device_type = "cpu";
> +        [...]
> +};
> +
> +a53_2: cpu@101 {
> +        compatible = "arm,cortex-a53";
> +        reg = <0x0 0x101>;
> +        device_type = "cpu";
> +        [...]
> +};
> +
> +a53_3: cpu@102 {
> +        compatible = "arm,cortex-a53";
> +        reg = <0x0 0x102>;
> +        device_type = "cpu";
> +        [...]
> +};
> +
> +a53_4: cpu@103 {
> +        compatible = "arm,cortex-a53";
> +        reg = <0x0 0x103>;
> +        device_type = "cpu";
> +        [...]
> +};
> +
> +chosen {
> +
> +    sched: sched_a {
> +        compatible = "xen,scheduler";
> +        sched-name = "credit2";
> +    };
> +    cpupool_a {
> +        compatible = "xen,cpupool";
> +        cpupool-cpus = <&a53_1 &a53_2 &a53_3 &a53_4>;
> +    };
> +    cpupool_b {
> +        compatible = "xen,cpupool";
> +        cpupool-cpus = <&a72_1 &a72_2>;
> +        cpupool-sched = <&sched>;
> +    };
> +
> +    [...]
> +
> +};
> +
> +
> +A system having the cpupools specification below will instruct Xen to have three
> +cpupools:
> +
> +- The cpupool Pool-0 will have 2 cpus assigned.
> +- The cpupool Pool-1 will have 2 cpus assigned.
> +- The cpupool Pool-2 will have 2 cpus assigned (created by Xen with all the not
> +  assigned cpus a53_3 and a53_4).
> +
> +chosen {
> +
> +    sched: sched_a {
> +        compatible = "xen,scheduler";
> +        sched-name = "null";
> +    };
> +    cpupool_a {
> +        compatible = "xen,cpupool";
> +        cpupool-cpus = <&a53_1 &a53_2>;
> +    };
> +    cpupool_b {
> +        compatible = "xen,cpupool";
> +        cpupool-cpus = <&a72_1 &a72_2>;
> +        cpupool-sched = <&sched>;
> +    };
> +
> +    [...]
> +
> +};
> \ No newline at end of file
> diff --git a/xen/common/Kconfig b/xen/common/Kconfig
> index 64439438891c..dc9eed31682f 100644
> --- a/xen/common/Kconfig
> +++ b/xen/common/Kconfig
> @@ -22,6 +22,14 @@ config GRANT_TABLE
>  
>  	  If unsure, say Y.
>  
> +config BOOT_TIME_CPUPOOLS
> +	bool "Create cpupools at boot time"
> +	depends on HAS_DEVICE_TREE
> +	default n
> +	help
> +	  Creates cpupools during boot time and assigns cpus to them. Cpupools
> +	  options can be specified in the device tree.
> +
>  config ALTERNATIVE_CALL
>  	bool
>  
> diff --git a/xen/common/Makefile b/xen/common/Makefile
> index dc8d3a13f5b8..c5949785ab28 100644
> --- a/xen/common/Makefile
> +++ b/xen/common/Makefile
> @@ -1,5 +1,6 @@
>  obj-$(CONFIG_ARGO) += argo.o
>  obj-y += bitmap.o
> +obj-$(CONFIG_BOOT_TIME_CPUPOOLS) += boot_cpupools.o
>  obj-$(CONFIG_HYPFS_CONFIG) += config_data.o
>  obj-$(CONFIG_CORE_PARKING) += core_parking.o
>  obj-y += cpu.o
> diff --git a/xen/common/boot_cpupools.c b/xen/common/boot_cpupools.c
> new file mode 100644
> index 000000000000..e8529a902d21
> --- /dev/null
> +++ b/xen/common/boot_cpupools.c
> @@ -0,0 +1,212 @@
> +/* SPDX-License-Identifier: GPL-2.0 */
> +/*
> + * xen/common/boot_cpupools.c
> + *
> + * Code to create cpupools at boot time for arm architecture.
> + *
> + * Copyright (C) 2022 Arm Ltd.
> + */
> +
> +#include <xen/sched.h>
> +
> +#define BTCPUPOOLS_DT_NODE_NO_REG     (-1)
> +#define BTCPUPOOLS_DT_NODE_NO_LOG_CPU (-2)
> +
> +struct pool_map {
> +    int pool_id;
> +    int sched_id;
> +    struct cpupool *pool;
> +};
> +
> +static struct pool_map __initdata pool_cpu_map[NR_CPUS] =
> +    { [0 ... NR_CPUS-1] = {.pool_id = -1, .sched_id = -1, .pool = NULL} };
> +static unsigned int __initdata next_pool_id;
> +
> +#ifdef CONFIG_ARM
> +static int __init get_logical_cpu_from_hw_id(unsigned int hwid)
> +{
> +    unsigned int i;
> +
> +    for ( i = 0; i < nr_cpu_ids; i++ )
> +        if ( cpu_logical_map(i) == hwid )
> +            return i;
> +
> +    return -1;
> +}
> +
> +static int __init
> +get_logical_cpu_from_cpu_node(const struct dt_device_node *cpu_node)
> +{
> +    unsigned int cpu_reg, cpu_num;
> +    const __be32 *prop;
> +
> +    prop = dt_get_property(cpu_node, "reg", NULL);
> +    if ( !prop )
> +        return BTCPUPOOLS_DT_NODE_NO_REG;
> +
> +    cpu_reg = dt_read_number(prop, dt_n_addr_cells(cpu_node));
> +
> +    cpu_num = get_logical_cpu_from_hw_id(cpu_reg);
> +    if ( cpu_num < 0 )
> +        return BTCPUPOOLS_DT_NODE_NO_LOG_CPU;
> +
> +    return cpu_num;
> +}
> +
> +static int __init check_and_get_sched_id(const char* scheduler_name)
> +{
> +    int sched_id = sched_get_id_by_name(scheduler_name);
> +
> +    if ( sched_id < 0 )
> +        panic("Scheduler %s does not exists!\n", scheduler_name);
> +
> +    return sched_id;
> +}
> +
> +void __init btcpupools_dtb_parse(void)
> +{
> +    const struct dt_device_node *chosen, *node;
> +
> +    chosen = dt_find_node_by_path("/chosen");
> +    if ( !chosen )
> +        return;
> +
> +    dt_for_each_child_node(chosen, node)
> +    {
> +        const struct dt_device_node *phandle_node;
> +        int sched_id = -1;
> +        const char* scheduler_name;
> +        unsigned int i = 0;
> +
> +        if ( !dt_device_is_compatible(node, "xen,cpupool") )
> +            continue;
> +
> +        phandle_node = dt_parse_phandle(node, "cpupool-sched", 0);
> +        if ( phandle_node )
> +        {
> +            if ( !dt_device_is_compatible(phandle_node, "xen,scheduler") )
> +                panic("cpupool-sched must be a xen,scheduler compatible"
> +                      "node!\n");
> +            if ( !dt_property_read_string(phandle_node, "sched-name",
> +                                          &scheduler_name) )
> +                sched_id = check_and_get_sched_id(scheduler_name);
> +            else
> +                panic("Error trying to read sched-name in %s!\n",
> +                      dt_node_name(phandle_node));
> +        }

it doesn't look like the "xen,scheduler" nodes are very useful from a dt
parsing perspective either


> +        phandle_node = dt_parse_phandle(node, "cpupool-cpus", i++);
> +        if ( !phandle_node )
> +            panic("Missing or empty cpupool-cpus property!\n");
> +
> +        while ( phandle_node )
> +        {
> +            int cpu_num;
> +
> +            cpu_num = get_logical_cpu_from_cpu_node(phandle_node);
> +
> +            if ( cpu_num < 0 )
> +                panic("Error retrieving logical cpu from node %s (%d)\n",
> +                      dt_node_name(node), cpu_num);
> +
> +            if ( pool_cpu_map[cpu_num].pool_id != -1 )
> +                panic("Logical cpu %d already added to a cpupool!\n", cpu_num);
> +
> +            pool_cpu_map[cpu_num].pool_id = next_pool_id;
> +            pool_cpu_map[cpu_num].sched_id = sched_id;
> +
> +            phandle_node = dt_parse_phandle(node, "cpupool-cpus", i++);
> +        }
> +
> +        /* Let Xen generate pool ids */
> +        next_pool_id++;
> +    }
> +}
> +#endif
> +
> +void __init btcpupools_allocate_pools(const cpumask_t *cpu_online_map)
> +{
> +    unsigned int cpu_num;
> +
> +    /*
> +     * If there are no cpupools, the value of next_pool_id is zero, so the code
> +     * below will assign every cpu to cpupool0 as the default behavior.
> +     * When there are cpupools, the code below is assigning all the not
> +     * assigned cpu to a new pool (next_pool_id value is the last id + 1).
> +     * In the same loop we check if there is any assigned cpu that is not
> +     * online.
> +     */
> +    for ( cpu_num = 0; cpu_num < nr_cpu_ids; cpu_num++ )
> +        if ( cpumask_test_cpu(cpu_num, cpu_online_map) )
> +        {
> +            if ( pool_cpu_map[cpu_num].pool_id < 0 )
> +                pool_cpu_map[cpu_num].pool_id = next_pool_id;
> +        }
> +        else

Please add { }


> +            if ( pool_cpu_map[cpu_num].pool_id >= 0 )
> +                panic("Pool-%d contains cpu%u that is not online!\n",
> +                      pool_cpu_map[cpu_num].pool_id, cpu_num);



> +#ifdef CONFIG_X86
> +    /* Cpu0 must be in cpupool0 for x86 */
> +    if ( pool_cpu_map[0].pool_id != 0 )

Is that even possible on x86 given that btcpupools_dtb_parse cannot even
run on x86?

If it is not possible, I would remove the code below and simply panic
instead.


> +    {
> +        /* The cpupool containing cpu0 will become cpupool0 */
> +        unsigned int swap_id = pool_cpu_map[0].pool_id;
> +        for_each_cpu ( cpu_num, cpu_online_map )
> +            if ( pool_cpu_map[cpu_num].pool_id == swap_id )
> +                pool_cpu_map[cpu_num].pool_id = 0;
> +            else if ( pool_cpu_map[cpu_num].pool_id == 0 )
> +                pool_cpu_map[cpu_num].pool_id = swap_id;
> +    }
> +#endif
> +
> +    for_each_cpu ( cpu_num, cpu_online_map )
> +    {
> +        struct cpupool *pool = NULL;
> +        int pool_id, sched_id;
> +
> +        pool_id = pool_cpu_map[cpu_num].pool_id;
> +        sched_id = pool_cpu_map[cpu_num].sched_id;
> +
> +        if ( pool_id )
> +        {
> +            unsigned int i;
> +
> +            /* Look for previously created pool with id pool_id */
> +            for ( i = 0; i < cpu_num; i++ )

Please add { }

But actually, the double loop seems a bit excessive for this. Could we
just have a single loop to cpupool_create_pool from 0 to next_pool_id?

We could get rid of pool_cpu_map[i].pool and just rely on
pool_cpu_map[i].pool_id. No need to update pool_cpu_map[i].pool if we
get rid of it: it doesn't look like it is very useful anyway?


> +                if ( (pool_cpu_map[i].pool_id == pool_id) &&
> +                     pool_cpu_map[i].pool )
> +                {
> +                    pool = pool_cpu_map[i].pool;
> +                    break;
> +                }
> +
> +            /* If no pool was created before, create it */
> +            if ( !pool )
> +                pool = cpupool_create_pool(pool_id, sched_id);
> +            if ( !pool )
> +                panic("Error creating pool id %u!\n", pool_id);
> +        }
> +        else
> +            pool = cpupool0;
> +
> +        pool_cpu_map[cpu_num].pool = pool;
> +        printk(XENLOG_INFO "Logical CPU %u in Pool-%u.\n", cpu_num, pool_id);
> +    }
> +}
> +
> +struct cpupool *__init btcpupools_get_cpupool(unsigned int cpu)
> +{
> +    return pool_cpu_map[cpu].pool;
> +}
> +
> +/*
> + * Local variables:
> + * mode: C
> + * c-file-style: "BSD"
> + * c-basic-offset: 4
> + * tab-width: 4
> + * indent-tabs-mode: nil
> + * End:
> + */
> diff --git a/xen/common/sched/cpupool.c b/xen/common/sched/cpupool.c
> index 89a891af7076..b2495ad6d03e 100644
> --- a/xen/common/sched/cpupool.c
> +++ b/xen/common/sched/cpupool.c
> @@ -1247,12 +1247,16 @@ static int __init cf_check cpupool_init(void)
>      cpupool_put(cpupool0);
>      register_cpu_notifier(&cpu_nfb);
>  
> +    btcpupools_dtb_parse();
> +
> +    btcpupools_allocate_pools(&cpu_online_map);
> +
>      spin_lock(&cpupool_lock);
>  
>      cpumask_copy(&cpupool_free_cpus, &cpu_online_map);
>  
>      for_each_cpu ( cpu, &cpupool_free_cpus )
> -        cpupool_assign_cpu_locked(cpupool0, cpu);
> +        cpupool_assign_cpu_locked(btcpupools_get_cpupool(cpu), cpu);
>  
>      spin_unlock(&cpupool_lock);
>  
> diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
> index 2c10303f0187..de4e8feea399 100644
> --- a/xen/include/xen/sched.h
> +++ b/xen/include/xen/sched.h
> @@ -1176,6 +1176,25 @@ extern void cf_check dump_runq(unsigned char key);
>  
>  void arch_do_physinfo(struct xen_sysctl_physinfo *pi);
>  
> +#ifdef CONFIG_BOOT_TIME_CPUPOOLS
> +void btcpupools_allocate_pools(const cpumask_t *cpu_online_map);
> +struct cpupool *btcpupools_get_cpupool(unsigned int cpu);
> +
> +#ifdef CONFIG_ARM
> +void btcpupools_dtb_parse(void);
> +#else
> +static inline void btcpupools_dtb_parse(void) {}
> +#endif
> +
> +#else
> +static inline void btcpupools_allocate_pools(const cpumask_t *cpu_online_map) {}
> +static inline void btcpupools_dtb_parse(void) {}
> +static inline struct cpupool *btcpupools_get_cpupool(unsigned int cpu)
> +{
> +    return cpupool0;
> +}
> +#endif
> +
>  #endif /* __SCHED_H__ */
>  
>  /*
> -- 
> 2.17.1
> 


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 04:31:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 04:31:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288675.489599 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSWvj-0004bH-Sz; Fri, 11 Mar 2022 04:31:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288675.489599; Fri, 11 Mar 2022 04:31:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSWvj-0004bA-PL; Fri, 11 Mar 2022 04:31:07 +0000
Received: by outflank-mailman (input) for mailman id 288675;
 Fri, 11 Mar 2022 04:31:06 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSWvi-0004b0-T3; Fri, 11 Mar 2022 04:31:06 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSWvi-0007DU-QN; Fri, 11 Mar 2022 04:31:06 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSWvi-0007Fj-Fb; Fri, 11 Mar 2022 04:31:06 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSWvi-0006oy-F7; Fri, 11 Mar 2022 04:31:06 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=2sAHqsBO03debuWeM/X3G257hLWfiGQqN8pjeMiD6Bw=; b=l6ohBT5nRjcXBxC3ZD4hKwIr6a
	1bPTMd548BKXuXXAocogl2kQmIbwSeozWjjTK2vC2jtMOrLlcAaxD7QMnC09bgvlVZSrPWMHEvF/W
	NUWNFD3q0zsETVlDJDRM5mNuprQUPAOx1usC7KCWoKGIWxlpCbx1Dc0w7dlftdTL1/4o=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168508-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168508: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=f06941cc46d002f66875b6f2f711fa3df2775da4
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 11 Mar 2022 04:31:06 +0000

flight 168508 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168508/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 f06941cc46d002f66875b6f2f711fa3df2775da4
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   10 days
Failing since        168258  2022-03-01 01:55:31 Z   10 days   85 attempts
Testing same since   168504  2022-03-10 10:34:32 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 554 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 05:11:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 05:11:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288690.489622 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSXYr-0000wG-5M; Fri, 11 Mar 2022 05:11:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288690.489622; Fri, 11 Mar 2022 05:11:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSXYr-0000w9-1p; Fri, 11 Mar 2022 05:11:33 +0000
Received: by outflank-mailman (input) for mailman id 288690;
 Fri, 11 Mar 2022 05:11:32 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSXYq-0000vo-BT; Fri, 11 Mar 2022 05:11:32 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSXYq-0008Mv-9B; Fri, 11 Mar 2022 05:11:32 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSXYp-00019c-P0; Fri, 11 Mar 2022 05:11:31 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSXYp-000672-OJ; Fri, 11 Mar 2022 05:11:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=4c8yFW8juSJp7L5Bj+LoZpNEI5NxxZzSNav0Oo3n4sA=; b=FPf1tLwTuuf/VgPiVHwTx9/H3Z
	fzc6S/C0WJTZNtG51g5tPhvm4INp1db4RjVEO8QlWDkMBK/f3VlZFczp5tR7UYP0Cz5A1BeGExGy1
	PWIzPxsiAQrIQ1DKki+lCOnaX1c/O/g7maFjt1Smki6G5IMxhXF0ojfGrcqwcX6gZi1Q=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168503-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.16-testing test] 168503: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-4.16-testing:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=ee4d66242eef4d4c4215a432dece577093bfcbbc
X-Osstest-Versions-That:
    xen=c374a8c5cc74535e16410b7a0d9e92bf5de54f79
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 11 Mar 2022 05:11:31 +0000

flight 168503 xen-4.16-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168503/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168484
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168484
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168484
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168484
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168484
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168484
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168484
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168484
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168484
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168484
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168484
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168484
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  ee4d66242eef4d4c4215a432dece577093bfcbbc
baseline version:
 xen                  c374a8c5cc74535e16410b7a0d9e92bf5de54f79

Last test of basis   168484  2022-03-08 18:08:10 Z    2 days
Testing same since   168503  2022-03-10 09:07:57 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Gao Xiang <hsiangkao@linux.alibaba.com>
  Jan Beulich <jbeulich@suse.com>
  Lasse Collin <lasse.collin@tukaani.org>
  Roger Pau Monné <roger.pau@citrix.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   c374a8c5cc..ee4d66242e  ee4d66242eef4d4c4215a432dece577093bfcbbc -> stable-4.16


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 05:15:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 05:15:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288685.489641 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSXcU-0001fq-RL; Fri, 11 Mar 2022 05:15:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288685.489641; Fri, 11 Mar 2022 05:15:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSXcU-0001fj-MK; Fri, 11 Mar 2022 05:15:18 +0000
Received: by outflank-mailman (input) for mailman id 288685;
 Fri, 11 Mar 2022 05:01:35 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=K7gA=TW=aim.com=brchuckz@srs-se1.protection.inumbo.net>)
 id 1nSXPC-0008K2-6D
 for xen-devel@lists.xen.org; Fri, 11 Mar 2022 05:01:35 +0000
Received: from sonic306-19.consmr.mail.gq1.yahoo.com
 (sonic306-19.consmr.mail.gq1.yahoo.com [98.137.68.82])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4e3cca5b-a0f8-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 06:01:31 +0100 (CET)
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic306.consmr.mail.gq1.yahoo.com with HTTP; Fri, 11 Mar 2022 05:01:26 +0000
Received: by kubenode532.mail-prod1.omega.ne1.yahoo.com (VZM Hermes SMTP
 Server) with ESMTPA ID 654337a831c968b465ea7902d4a544cc; 
 Fri, 11 Mar 2022 05:01:24 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4e3cca5b-a0f8-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netscape.net; s=a2048; t=1646974886; bh=pAmEpZGbTSxRF4ekSimPEO0xZW6MBXSMK/vuO4xoIuA=; h=Date:To:From:Subject:References:From:Subject:Reply-To; b=m9gYMXMvBB+ZYW+SitfH/N9S/e/wHYD5r4iFCyuMvUtn4RVEAWna+EzW4aU2gIBwny4Q3gUFlXhrp4hZzC0mP+ooFFH9ZELFQqpXCoZNXvD7qBlYaJu3a0zmML2y3YzvK1B7W+m0VVpkp24elD2PbGvskFgNXkN1H/TCu26uR5WcEk1xpZz8toH+Fu3AFmSIp3Urq5lCgASkoHzGo97cgq9jwo2Abt+TexapA0YXamCvfRY5jZSnGjAG2cizwSs591aphU9ExQ0U9JamqDQa2lHRyn8MwgkZOlVDOmTH0EJjAL5MwR+BN66pfO7mWcfyJWbhMBNNAshw3s+3TIfeBA==
X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1646974886; bh=McAta/lzIfdVRKDixyRRN9NhlkuPJQEXYgVjly/Oww/=; h=X-Sonic-MF:Date:To:From:Subject:From:Subject; b=Iu+h3dqEwkx4pXdsfEDtrzq3wGdsA9ienkCaklKsqI5ilRD9G0mS+8H6LmZ94rmKQZFp5kajGWgqSpRq4uSuTfW3WujxqjV4tjCnK5ok62Nl6VWLcv6melhUIP/gmfAAxoOdE/ucHGhsrl4x6IVO0cureF61Lxu+f6spK3p15cl8W65XZ+RN14a5tdpPAgcomUodsO+6WCmHGZyJg3jyMUNN4V6BTZ0eopx5IHkGEWj+S0ickP8vxPMMusdhHVJ/viJjuKl2foe1fr7QvYP/Sr/vYijIsjT1ogGR4/fpeWE7bWDSSj4TRArGtZERTfg8cANdhLA7an+hMciN9y77jg==
X-YMail-OSG: pmz.5JIVM1lmwx8rKmmbE0K9nMFQd7aDaglsyRjgf9EHjcCjH_WN9zGxdDQH2jc
 wFwskDkgcUuYo8ysaOm2leKnIw7rGdhIwbrZludrb2qx7NP2DGJ6otF4_HBLeafDfSw0KC7_Mr1p
 e_E5CxoqUlHDKxhVB3OFOprEDhDNrwYk7U02vkC_N4trJJThM8Wn.QadvI2vUaw9QVg6d7hv5002
 bUIhhiUv5GUjAAPSuPGdn4FaMRA3Li8jQa4Z87j9KOfxT.UcPgkwY1PKh9X6IIjso7_s4uDjbM53
 IkyQ9uuTqrZkmOfah4nmylNdugQpzPBpb5Wkvcaz88rhaf6ICSdq1DEI42CJOKl3jwDsbwhiETW2
 bGBA0hpqJiCM4XBGBLxCRO.hebowD.bRdFWXfhzMOp_JYnuvRffuu.ATgY.21ioAGAn6oSHBoaUv
 BMVwmK62d2SvkWULAP9W0nvsQbQJ89Ci.rgeK_.X9mDSJOqKjjOc_Q3J0CLagJP70fbIu2CKfWIO
 DW7esSVUkqEejrKhrXrGWCO6xUtvas9YvQqtbElB4fCnHvkfBrC2QEeB0UDvUchkYaP9pKQ5VFTz
 _uwUmPBpDA4ZeGzbedBxNJk.vzDXTsAjhwLKz0MdodWg9rwn9Mvc87VXK9fxRKHzUh.O8tJCXRMT
 7hq1Er2T9XNsjGwh16ANt06HKqudVBfyahuoYdKPL80R4oMPAkU_ISVS4mw270Hdhpl0BuIPkWIL
 rkv6uhTXG.z.9.FuOnQ6BQw4tV7MtJdrCLlF7N6xISYOH1cnmXv.LneEjHncPH84D.fCJ3F5jFzz
 OExTmA2GcjjNBn6hQkJMu26vxuGslx55dXDO055WO0pLEPqX6cNqsY7N7X0lncCFwHlS4F4jAT7O
 jLio8Npps_8FNNpdcjfFNAvpd.Fl.rc7GnvO6LwWTIr8OtMS2HMAjZV6Fz5rJjBxuQIP9aiA6Btp
 dJUZ6pv4P0x8rmsfJQpQ5Bk7EekKaqwEAAubBZEAJePOWHhbvgaLyifqTRXvb3VgkSbwfLRP90Z9
 B.edIvQsMYtzonmIQcJDdRDyOJvQGJuKs2gCuQxa_Jw0bo1kXXNA2N.hNcprifhR_v4qhFFsml_1
 ESGK9uwxAw3N6ge_LO67jIEdoU4L2JIRFEG882f_c6bMKW0kmeG_pZqK0gahRg.89.RFnOlRa19w
 z9dvSdZOdEGsG25e.VxwL85464vnrcytMrNNdiDWQjkELGeXer2TA3EGFLtz4SV0fBs7hC9IOdHC
 G3rFd6xieqnKN_YNAIkETnL601hG7rm1HFJyCXAtNRLvJRxHHirVb4dmySbM1U6ZqtlHw9i76T3S
 DtP3JSy0fWsRt5TbVbnA3XQl1NekuYEmEerjw6sf.ZKAw.YTWUHcyiiQbvPOdit1uayFc7lx8y2W
 UX5mG718h5kGAYcw33TGM.to8bW0RIViniDXWy4JF1krWm.yzH3ULYjNtXzfWby0WDbKBYIRr7AA
 Cc9hra7YRlAK2AjH57_IQ205YBGna34kDUg84e7dG37bL4BdKZuCAfYXGusU_HPPaM2zWu191ZNO
 MN6NyZhJaHDGYRsq08zOfqSJ4yGXiGUYGmG2IAVN.OCVN.O04HvJxGbTVJJboEMw5qV5fsegI0jv
 KGw_gMef4o5AnQP.h3bLktqGXDp369Zd21e_B7kyQNrlg_XtVLyHFOQtsit01O3V2sv5XIqPRU34
 xIxflSJxYRmWox7unq9Rs8bgURVXOo8sFegs4IhOMdVb3rpIWTQlj29hUhHyoxiqBB6giNTrXISC
 vYcHUW8szWQy90o.m_1or8qIYnCOmV8HzJhWZvBsi9.FLaRDX10A0fjZSLKZsfGQy2BimcPK6hh8
 sLB0VHmRVPSiLHWziFeuUjlYZ3HLNt_yonDjVYgYjq6RQG7Kse9CaSFtcy_SCn2VKhzC71wJz25i
 9y8OFOQW2nBA2msaO6qt3S6DnywLt2EkK0yYwKZDoajPjP6JPXVnO40vqEF3CY2fMHmu9sFbKEHx
 .PKaicNOEjcwDft1hfvyMW.oJ2Q9hq0ymiuPmoIiYIbSJTt_wRq2ZKB1ODzCT7FUa1ZSNNpig14S
 fc1GmJGW.A0DhIv5qH.PnY2IW2htqjijdkwMqiKmYyqk2YU3e1PGIHQYVVSILiXgofuscohtKOeq
 2sKVBsN16i57JfwYObiQk9vNanePPzTTRAhI.C5osOqUYJXQWwMfFyrlqxWr1mT9O9gmgpMndnjr
 .X15uNjC7MOHPVr9XU7tj1rSYVge45AdHC4CyRLDG
X-Sonic-MF: <brchuckz@aim.com>
Message-ID: <4703b7f1-8d3c-5128-213c-e39f487e4cde@netscape.net>
Date: Fri, 11 Mar 2022 00:01:23 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Content-Language: en-US
To: xen-devel@lists.xen.org
From: Chuck Zmudzinski <brchuckz@netscape.net>
Subject: BUG: libxenlight fails to grant permission to access Intel IGD
 Opregion
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
References: <4703b7f1-8d3c-5128-213c-e39f487e4cde.ref@netscape.net>
X-Mailer: WebService/1.1.19878 mail.backend.jedi.jws.acl:role.jedi.acl.token.atz.jws.hermes.aol
Content-Length: 10828

Hello,

Below is a proposed patch for a bug that I have noticed on
Debian versions of Xen going back to at least Xen 4.8, which
shipped with Debian 9 in 2017. In fact, the last Debian version
of Xen that did not have the bug was Xen 4.4 that shipped
with Debian 8 back in 2015. The bug causes passthrough of the Intel
IGD to a Linux HVM domain to fail.

On Debian BTS this is 
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988333

I have provided a patch that fixes the bug on Xen-4.16 at the end of
this message.

A long time ago, during the development of Xen 4.5 in 2014,
two patches implemented a change to the way permission is
granted for an unprivileged domain to access PCI/VGA-related
I/O memory. Prior to this, AFAICT, permission was implicitly
granted to access the memory the domain requested when a
PCI device being passed to the domain was being configured.
After the change, permission to access such memory is not
granted without prior explicit permission being configured,
and this is still the current behavior.

The relevant patches are:

1. 
https://xenbits.xen.org/gitweb/?p=xen.git;a=commitdiff;h=abfb006f1ff4af1424e5b0d0589f0226377fda36

and

2. 
https://xenbits.xen.org/gitweb/?p=xen.git;a=commitdiff;h=0561e1f01e87b777bcc47971e4ae1f420314f4a0

I found these patches by brute force, building and testing various
versions of Xen 4.5-unstable until I found the patches that caused
passthrough of the Intel IGD to Linux to fail. I used the traditional
device model in my tests because back when Xen 4.5 was under
development, the upstream device model did not support Intel IGD
passthrough.

The first of these patches intended to implement explicit
granting of permission to access the I/O memory that is
needed to support the gfx_passthru feature in libxl_pci.c,
in the libxl__grant_vga_iomem_permission function. The second
patch implements the removal of implicit permission to access
the PCI/VGA-related I/O memory and causes requests to access
such memory by a domain to be denied unless prior explicit
permission had been configured.

Specifically, the first patch adds 32 (0x20) pages of data starting at
memory address (0xa0000 >> XC_PAGE_SHIFT) (in pages) to the memory the
domain is permitted to access. XC_PAGE_SHIFT is 12, so this memory
range shows up in the logs when running Xen 4.5 as:

memory_map:add: dom1 gfn=a0 mfn=a0 nr=20

But my testing of these old patches with added custom logging
shows that another two pages are needed:

memory_map:access not permitted: dom1 gfn=fdffc mfn=cc490 nr=2

The patch for custom logging was against the Xen-4.5 branch after the
second of the aforementioned patches was committed to Xen 4.5-unstable.

Here is the patch (against Xen 4.5) for custom logging, and I would
recommend adding it to Xen so a message will be printed in the dmesg
buffer when a domain tries to access memory it is not allowed to
access:

--- a/xen/common/domctl.c
+++ b/xen/common/domctl.c
@@ -1033,7 +1033,12 @@ long 
do_domctl(XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl)
          ret = -EPERM;
          if ( !iomem_access_permitted(current->domain, mfn, mfn_end) ||
               !iomem_access_permitted(d, mfn, mfn_end) )
+        {
+            printk(XENLOG_G_WARNING
+                       "memory_map:access not permitted: dom%d gfn=%lx 
mfn=%lx nr=%lx\n",
+                       d->domain_id, gfn, mfn, nr_mfns);
              break;
+        }

          ret = xsm_iomem_mapping(XSM_HOOK, d, mfn, mfn_end, add);
          if ( ret )
snip ---------------------------------------------- snip

Further research showed that these two pages at 0xcc490 are for the
Intel IGD opregion, and because this memory is not permitted to be
accessed by the domain, the passthrough of an Intel IGD to a Linux
HVM domain fails, causing a crash of the Linux i915.ko kernel module
in the HVM domain. My testing, which was on a desktop with a Haswell
Intel CPU/IGD, confirmed that these two extra pages need to be
permitted in order for passthrough of the Intel IGD to a Linux
domain to work properly.

I find that adding two pages is enough to fix the problem, but I
have read in other places that the Opregion is actually three pages,
and maybe newer revisions of the Intel IGD do need three pages instead
of two. I am testing on a Haswell Intel chip, which is over 8 years old
now. So the patch I propose adds two pages, but I am not sure if
it should be three pages for newer Intel chips.

The failure to map this memory with gfx_passthru enabled
is therefore a bug, a regression that was introduced with the two
aforementioned patches way back in 2014 when Xen 4.5 was under
development.

Once I developed a patch, I did more testing with the traditional
Qemu device model and Debian's package of Xen-4.16 for Debian
sid/unstable after I discovered where this bug first appeared in
Xen 4.5-unstable back in 2014. In my testing, Windows HVM domains are
not affected by this bug and they function properly, most likely
because proprietary Intel graphics drivers for Windows are more
forgiving than the Linux open source drivers for Intel graphics
regarding the details of how Xen and Qemu configure the domain.

This bug still exists in current supported versions of Xen
because in Xen 4.16, passthrough of my Haswell Intel IGD to a Linux
domain still fails with a crash of the i915 Linux kernel module in
the Linux unprivileged domain when the traditional Qemu device model
is used in dom0. The patch at the end of this message fixes it.

I have not yet succeeded in reproducing this bug with the
upstream device model because there is another bug in Qemu
upstream that breaks passthrough of the Intel IGD to a Linux HVM
domU, so for now, to reproduce it, please use the traditional device
model.

Also, as a starting point to reproduce the bug, first get Intel IGD
passthrough to a Windows HVM domain using the Qemu traditional
device model working on Xen 4.16. Then replace the Windows HVM domain
with a Linux HVM domain, keeping everything else the same including
the Qemu traditional device model. I tested using a Debian 11.2
(bullseye) HVM domain and Debian sid/unstable with Xen 4.16 and
a build of the Qemu traditional device model from source as
provided on xenbits.xen.org

I am using a desktop computer and the xl toolstack and Xen as
packaged by Debian, except that I added the traditional device
model that Debian does not provide.

If you need more info, please let me know. I am not subscribed to
xen-devel so please cc me with your replies.

Regards,

Chuck

Here is the patch that fixes the bug on Debian sid/Xen 4.16:

--- a/tools/libs/light/libxl_pci.c
+++ b/tools/libs/light/libxl_pci.c
@@ -24,6 +24,7 @@
  #define PCI_OPTIONS            "msitranslate=%d,power_mgmt=%d"
  #define PCI_BDF_XSPATH         "%04x-%02x-%02x-%01x"
  #define PCI_PT_QDEV_ID         "pci-pt-%02x_%02x.%01x"
+#define PCI_INTEL_OPREGION     0xfc /* value defined in 
tools/firmware/hvmloader/pci_regs.h */

  static unsigned int pci_encode_bdf(libxl_device_pci *pci)
  {
@@ -640,6 +641,45 @@
  }

  /*
+ * This function assumes prior verification
+ * that pci is an Intel IGD device.
+ */
+static uint32_t sysfs_dev_get_igd_opregion(libxl__gc *gc, 
libxl_device_pci *pci)
+{
+    char *pci_device_vendor_path =
+            GCSPRINTF(SYSFS_PCI_DEV"/"PCI_BDF"/config",
+                      pci->domain, pci->bus, pci->dev, pci->func);
+    size_t read_item;
+    uint32_t igd_opregion;
+
+    FILE *f = fopen(pci_device_vendor_path, "r");
+    if (!f) {
+        LOGE(ERROR,
+             "pci device "PCI_BDF" does not have config attribute",
+             pci->domain, pci->bus, pci->dev, pci->func);
+        return 0xffffffff;
+    }
+    if (fseek(f, PCI_INTEL_OPREGION, SEEK_SET)) {
+        LOGE(ERROR,
+             "pci device "PCI_BDF": cannot find igd-opregion address",
+             pci->domain, pci->bus, pci->dev, pci->func);
+        fclose(f);
+        return 0xffffffff;
+    }
+    read_item = fread(&igd_opregion, 4, 1, f);
+    fclose(f);
+
+    if (read_item != 1) {
+        LOGE(ERROR,
+             "cannot read igd-opresgion address of pci device "PCI_BDF,
+             pci->domain, pci->bus, pci->dev, pci->func);
+        return 0xffffffff;
+    }
+
+    return igd_opregion;
+}
+
+/*
   * A brief comment about slots.  I don't know what slots are for; however,
   * I have by experimentation determined:
   * - Before a device can be bound to pciback, its BDF must first be listed
@@ -2531,6 +2571,34 @@
                    domid, vga_iomem_start, (vga_iomem_start + 0x20 - 1));
              return ret;
          }
+
+        /* Allow access to Intel igd-opregion */
+        if (sysfs_dev_get_vendor(gc, pci) == 0x8086)
+        {
+            uint32_t igd_opregion = sysfs_dev_get_igd_opregion(gc, pci);
+            if (igd_opregion == 0xffffffff)
+                break;
+            vga_iomem_start = ((uint64_t)igd_opregion) >> XC_PAGE_SHIFT;
+            ret = xc_domain_iomem_permission(CTX->xch, stubdom_domid,
+                                             vga_iomem_start, 0x2, 1);
+            if (ret < 0) {
+                LOGED(ERROR, domid,
+                      "failed to give stubdom%d access to iomem range "
+                      "%"PRIx64"-%"PRIx64" for IGD passthru",
+                      stubdom_domid,
+                      vga_iomem_start, (vga_iomem_start + 0x2 - 1));
+                return ret;
+            }
+            ret = xc_domain_iomem_permission(CTX->xch, domid,
+                                             vga_iomem_start, 0x2, 1);
+            if (ret < 0) {
+                LOGED(ERROR, domid,
+                      "failed to give dom%d access to iomem range "
+                      "%"PRIx64"-%"PRIx64" for IGD passthru",
+                      domid, vga_iomem_start, (vga_iomem_start + 0x2 - 1));
+                return ret;
+            }
+        }
          break;
      }

snip ---------------------------------------------------- snip


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 05:44:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 05:44:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288705.489653 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSY4l-0004zb-Bv; Fri, 11 Mar 2022 05:44:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288705.489653; Fri, 11 Mar 2022 05:44:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSY4l-0004zU-6B; Fri, 11 Mar 2022 05:44:31 +0000
Received: by outflank-mailman (input) for mailman id 288705;
 Fri, 11 Mar 2022 05:44:29 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=p7td=TW=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nSY4j-0004zO-0i
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 05:44:29 +0000
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur03on060f.outbound.protection.outlook.com
 [2a01:111:f400:fe08::60f])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4fa23081-a0fe-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 06:44:26 +0100 (CET)
Received: from DB6PR0801CA0045.eurprd08.prod.outlook.com (2603:10a6:4:2b::13)
 by AS8PR08MB7144.eurprd08.prod.outlook.com (2603:10a6:20b:404::7)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar
 2022 05:44:24 +0000
Received: from DB5EUR03FT064.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:4:2b:cafe::b2) by DB6PR0801CA0045.outlook.office365.com
 (2603:10a6:4:2b::13) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.20 via Frontend
 Transport; Fri, 11 Mar 2022 05:44:24 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT064.mail.protection.outlook.com (10.152.21.199) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 05:44:24 +0000
Received: ("Tessian outbound 31aeb3346a45:v113");
 Fri, 11 Mar 2022 05:44:24 +0000
Received: from 73832b78e5d3.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 4CE5C011-B871-4379-80A5-715702A00AE4.1; 
 Fri, 11 Mar 2022 05:44:13 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 73832b78e5d3.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 11 Mar 2022 05:44:13 +0000
Received: from DU2PR08MB7325.eurprd08.prod.outlook.com (2603:10a6:10:2e4::7)
 by AM0PR08MB5138.eurprd08.prod.outlook.com (2603:10a6:208:15a::32) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar
 2022 05:44:10 +0000
Received: from DU2PR08MB7325.eurprd08.prod.outlook.com
 ([fe80::b84f:d66b:13a7:245]) by DU2PR08MB7325.eurprd08.prod.outlook.com
 ([fe80::b84f:d66b:13a7:245%8]) with mapi id 15.20.5038.027; Fri, 11 Mar 2022
 05:44:10 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4fa23081-a0fe-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=c28Kke/5oZ6g/Jvh3ICA5ujYR5lILp7anSAj6v0NL8Q=;
 b=EsLtPO3yIoxkWCXJ1428j0YWezGvpAwSDEbyxfMP2oQ7NmoSmBnoHDvsDkRs8i1oMZNGJgqmH9kD1sLooQvGNhsH0BMvRcfBN7976ggBDgKOmslBK1/cyyYFfwk30ApAs8Iux9H9+MzeGkwe8ts1W3whFjh9VgbnzqhR9Ozs6QU=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: d7a1b44a9db603dc
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=iJNi7/359UGCbJRncGT4isWolIEiD3MBZGiDsPzg+TnVJtZxOKnRxd/sktb4Axyoqqg2cTlv4jCH/GbYLscVLOhR/fTPvF5RGWFPDBKckkMV3b/xmo6zghy3W6x3k8pBYyROoWUafzf/dqoFB5sEnF4/pwScxF5LGeRofqidriA0AhG7fuVJCrwNA+gYJKx3a/fVSo+FgUsLgyTo/QWPahTiUF7GX6Xq8Cm6csDsOaSbfwi3NmEZ8NIQBvL3amOdKGjMe9q5cK3ez1oYU5FSr3O5MCkP3QpLPUUrK7S8MMhjJlj6naGHdR6ofnyutrc2vIMY78k+GvOgnmEef53mXA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=c28Kke/5oZ6g/Jvh3ICA5ujYR5lILp7anSAj6v0NL8Q=;
 b=GPlvy2qHeT5XHeZOdRSKgo2k8Pn67C30Zg90hO7NZWe1HaHJdt60wNBrm2ufTcLoSYTwRvKRZJ/9KnrgZrRMNkzPvHLmYV8VjENJeJZbtBfNnx2wZnbbGvGkJtdSOGYxn4WxeLPCpiCQi8+hg0I9nVCRl/hVo6gDIF4P8Wz6gSLqjq9FAoyvVcoLguW/MTuUp0VjcjOzA6Qy1SZLyIYQ95thpYJNxtuvJzG4wnGejM7+elMP7dfcrrfjLQIR843OmBFcNxnZeaoFJaMdkVmAFKXULKPCoR42CKjqLfV3bfJuletIuJWhLvw145V46b3V/CDPmZFI5llGbEV+LxY68w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=c28Kke/5oZ6g/Jvh3ICA5ujYR5lILp7anSAj6v0NL8Q=;
 b=EsLtPO3yIoxkWCXJ1428j0YWezGvpAwSDEbyxfMP2oQ7NmoSmBnoHDvsDkRs8i1oMZNGJgqmH9kD1sLooQvGNhsH0BMvRcfBN7976ggBDgKOmslBK1/cyyYFfwk30ApAs8Iux9H9+MzeGkwe8ts1W3whFjh9VgbnzqhR9Ozs6QU=
From: Penny Zheng <Penny.Zheng@arm.com>
To: Julien Grall <julien@xen.org>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>, "sstabellini@kernel.org"
	<sstabellini@kernel.org>
CC: Bertrand Marquis <Bertrand.Marquis@arm.com>, Wei Chen <Wei.Chen@arm.com>
Subject: RE: [PATCH] design: design doc for shared memory on a dom0less system
Thread-Topic: [PATCH] design: design doc for shared memory on a dom0less
 system
Thread-Index: AQHYEqOgll18bmnPWkmHeWkC3i31m6ygnOgw
Date: Fri, 11 Mar 2022 05:44:10 +0000
Message-ID:
 <DU2PR08MB73250D8A1B417C49FD215DDEF70C9@DU2PR08MB7325.eurprd08.prod.outlook.com>
References: <20220126100943.4086208-1-penny.zheng@arm.com>
 <c820b027-1b23-a762-ca91-7a2f0a46f423@xen.org>
In-Reply-To: <c820b027-1b23-a762-ca91-7a2f0a46f423@xen.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 0ff6ee1d-eff8-40f6-fb38-08da032232af
x-ms-traffictypediagnostic:
	AM0PR08MB5138:EE_|DB5EUR03FT064:EE_|AS8PR08MB7144:EE_
X-Microsoft-Antispam-PRVS:
	<AS8PR08MB7144B3CEE9009443F46CE559F70C9@AS8PR08MB7144.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR08MB7325.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(66446008)(66476007)(8676002)(64756008)(66556008)(66946007)(76116006)(316002)(30864003)(4326008)(122000001)(86362001)(38070700005)(55016003)(5660300002)(8936002)(52536014)(38100700002)(2906002)(53546011)(7696005)(9686003)(6506007)(83380400001)(186003)(26005)(54906003)(110136005)(71200400001)(966005)(508600001)(33656002)(32563001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB5138
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT064.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	9bc9c05a-f7f2-4ad8-8f91-08da03222abf
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(316002)(70206006)(70586007)(83380400001)(2906002)(81166007)(26005)(336012)(186003)(356005)(55016003)(82310400004)(8936002)(47076005)(86362001)(8676002)(6506007)(9686003)(7696005)(53546011)(4326008)(110136005)(36860700001)(40460700003)(33656002)(5660300002)(52536014)(30864003)(54906003)(508600001)(966005)(32563001);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 05:44:24.0511
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 0ff6ee1d-eff8-40f6-fb38-08da032232af
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT064.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR08MB7144

SGkgSnVsaWVuDQoNClNvcnJ5IGZvciB0aGUgbGF0ZSByZXNwb25zZSwgU2luY2UgSSdtIGNvbnNp
ZGVyaW5nIHNlbmRpbmcgdGhlIGNvZGUgdG9nZXRoZXIgZm9yIGJldHRlcg0KdW5kZXJzdGFuZGlu
Zy4NCg0KPiAtLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0KPiBGcm9tOiBKdWxpZW4gR3JhbGwg
PGp1bGllbkB4ZW4ub3JnPg0KPiBTZW50OiBXZWRuZXNkYXksIEphbnVhcnkgMjYsIDIwMjIgNjo1
OCBQTQ0KPiBUbzogUGVubnkgWmhlbmcgPFBlbm55LlpoZW5nQGFybS5jb20+OyB4ZW4tZGV2ZWxA
bGlzdHMueGVucHJvamVjdC5vcmc7DQo+IHNzdGFiZWxsaW5pQGtlcm5lbC5vcmcNCj4gQ2M6IEJl
cnRyYW5kIE1hcnF1aXMgPEJlcnRyYW5kLk1hcnF1aXNAYXJtLmNvbT47IFdlaSBDaGVuDQo+IDxX
ZWkuQ2hlbkBhcm0uY29tPg0KPiBTdWJqZWN0OiBSZTogW1BBVENIXSBkZXNpZ246IGRlc2lnbiBk
b2MgZm9yIHNoYXJlZCBtZW1vcnkgb24gYSBkb20wbGVzcw0KPiBzeXN0ZW0NCj4gDQo+IEhpLA0K
PiANCj4gT24gMjYvMDEvMjAyMiAxMDowOSwgUGVubnkgWmhlbmcgd3JvdGU6DQo+ID4gVGhpcyBj
b21taXQgcHJvdmlkZXMgYSBkZXNpZ24gZG9jIGZvciBzdGF0aWMgc2hhcmVkIG1lbW9yeSBvbiBh
DQo+ID4gZG9tMGxlc3Mgc3lzdGVtLg0KPiA+DQo+ID4gU2lnbmVkLW9mZi1ieTogUGVubnkgWmhl
bmcgPHBlbm55LnpoZW5nQGFybS5jb20+DQo+ID4gLS0tDQo+ID4gICBkZXNpZ24vc2htLWRvbTBs
ZXNzLm1kIHwgMTgyDQo+ICsrKysrKysrKysrKysrKysrKysrKysrKysrKysrKysrKysrKysrKysr
DQo+ID4gICAxIGZpbGUgY2hhbmdlZCwgMTgyIGluc2VydGlvbnMoKykNCj4gPiAgIGNyZWF0ZSBt
b2RlIDEwMDY0NCBkZXNpZ24vc2htLWRvbTBsZXNzLm1kDQo+ID4NCj4gPiBkaWZmIC0tZ2l0IGEv
ZGVzaWduL3NobS1kb20wbGVzcy5tZCBiL2Rlc2lnbi9zaG0tZG9tMGxlc3MubWQgbmV3IGZpbGUN
Cj4gPiBtb2RlIDEwMDY0NCBpbmRleCAwMDAwMDAwLi5iNDYxOTlkDQo+ID4gLS0tIC9kZXYvbnVs
bA0KPiA+ICsrKyBiL2Rlc2lnbi9zaG0tZG9tMGxlc3MubWQNCj4gPiBAQCAtMCwwICsxLDE4MiBA
QA0KPiA+ICsjIFN0YXRpYyBTaGFyZWQgTWVtb3J5IGJldHdlZW4gZG9tYWlucyBvbiBhIGRvbTBs
ZXNzIHN5c3RlbQ0KPiA+ICsNCj4gPiArVGhpcyBkZXNpZ24gYWltcyB0byBwcm92aWRlIGFuIG92
ZXJ2aWV3IG9mIHRoZSBuZXcgZmVhdHVyZTogc2V0dGluZw0KPiA+ICt1cCBzdGF0aWMgc2hhcmVk
IG1lbW9yeSBiZXR3ZWVuIGRvbWFpbnMgb24gYSBkb20wbGVzcyBzeXN0ZW0sIHRocm91Z2gNCj4g
PiArZGV2aWNlIHRyZWUgY29uZmlndXJhdGlvbi4NCj4gPiArDQo+ID4gK1RoZSBuZXcgZmVhdHVy
ZSBpcyBkcml2ZW4gYnkgdGhlIG5lZWQgb2YgZmluZGluZyBhIHdheSB0byBidWlsZCB1cA0KPiA+
ICtjb21tdW5pY2F0aW9uIGNoYW5uZWxzIG9uIGRvbTBsZXNzIHN5c3RlbSwgc2luY2UgdGhlIGxl
Z2FjeSB3YXlzDQo+ID4gK2luY2x1ZGluZyBncmFudCB0YWJsZSwgZXRjIGFyZSBhbGwgYWJzZW50
IHRoZXJlLg0KPiANCj4gU3RlZmFubyBoYXMgYSBzZXJpZXMgdG8gYWRkIHN1cHBvcnQgZm9yIGdy
YW50LXRhYmxlIFsyXS4gU28gSSB0aGluayB5b3Ugd2FudCB0bw0KPiBqdXN0aWZ5IGl0IGRpZmZl
cmVudGx5Lg0KPiANCg0KVGhlIGRvbTBsZXNzIHN5c3RlbSBJIGFtIHJlZmVycmluZyBoZXJlIGlz
IHRoYXQgZWl0aGVyIGRvbTAgaXMgdG90YWxseSBtaXNzaW5nIGluIHRoZSBzeXN0ZW0sDQpvciBl
dmVuIHdoZW4gZG9tMCBpcyB0aGVyZSwgYWxsIHRoZSBvdGhlciBkb21haW5zIGFyZSBzdGF0aWNh
bGx5IGNvbmZpZ3VyZWQgYW5kIENPTkZJR19YRU4NCmlzIG5vdCBlbmFibGVkLCBzbyBpbiBhYm92
ZSBzY2VuYXJpbywgYWxsIHRoZSBsZWdhY3kgd2F5cyB0byBjb21tdW5pY2F0ZSBiZXR3ZWVuIGRv
bWFpbnMgYXJlDQphYnNlbnQuIFRoZXNlIHNjZW5hcmlvcyBhcmUgc3BlY2lhbGx5IGFwcGxpZWQg
dG8gQVJNdjhSLCB3aGVyZSBldmVyeXRoaW5nIGlzIHN0YXRpYy4NCg0KSSB0aGluayBTdGVmYW5v
IGlzIHRyeWluZyB0byBlbmFibGUgUFYgZHJpdmVycyBvbiBkb20wbGVzcyBndWVzdCB3aXRoIENP
TkZJR19YRU4gc3RpbGwgb24uDQpUQkgsIEkgY291bGQgbm90IGZpbmQgcHJvcGVyIG5vdW5zIGZv
ciB0aGVtLCBzb21ldGltZXMgY2FsbGluZyB0aGVzZSBkb21haW5zIGRvbTBsZXNzIGd1ZXN0cyBi
dXQNCndpdGggZG9tMCBzdGlsbCB0aGVyZSBtYWtlcyBtZSBjb25mdXNlZCB0b28uIDsvDQoNCj4g
PiArDQo+ID4gK0l0IHdhcyBpbnNwaXJlZCBieSB0aGUgcGF0Y2ggc2VyaWUgb2YgInhsL2xpYnhs
LWJhc2VkIHNoYXJlZCBtZW1vcnkiLA0KPiA+ICtzZWUgWzFdIGZvciBtb3JlIGRldGFpbHMuDQo+
ID4gKw0KPiA+ICsjIFN0YXRpYyBTaGFyZWQgTWVtb3J5IERldmljZSBUcmVlIENvbmZpZ3VyYXRp
b24NCj4gPiArDQo+ID4gK1RoZSBzdGF0aWMgc2hhcmVkIG1lbW9yeSBkZXZpY2UgdHJlZSBub2Rl
cyBhbGxvdyB1c2VycyB0byBzdGF0aWNhbGx5DQo+ID4gK3NldCB1cCBzaGFyZWQgbWVtb3J5IGFt
b25nIGEgZ3JvdXAgb2YgZG9tMGxlc3MgRG9tVXMgYW5kIERvbTAsDQo+ID4gK2VuYWJsaW5nIGRv
bWFpbnMgdG8gZG8gc2htLWJhc2VkIGNvbW11bmljYXRpb24uDQo+ID4gKw0KPiA+ICstIGNvbXBh
dGlibGUNCj4gPiArDQo+ID4gKyAgICAieGVuLGRvbWFpbi1zaGFyZWQtbWVtb3J5LXYxIg0KPiA+
ICsNCj4gPiArLSB4ZW4sc2htLWlkDQo+IA0KPiAgRnJvbSB0aGUgZG9jdW1lbnQsIGl0IGlzIG5v
dCBjbGVhciB0byBtZSB3aGF0IGlzIHRoZSBwdXJwb3NlIG9mIHRoZSBpZGVudGlmaWVyLg0KPiBD
b3VsZCB5b3UgY2xhcmlmeSBpdD8NCj4gDQoNCkl0IGlzIG1vcmUgcmVsYXRlZCB0byB0aGUgaW1w
bGVtZW50YXRpb24uIA0KDQpJJ3ZlIGFscmVhZHkgcHVzaGVkIGFuIFJGQyBwYXRjaCBmb3IgcmV2
aWV3aW5nIGluIGNvbW11bml0eSBmb3IgYmV0dGVyIHVuZGVyc3RhbmRpbmcuICBGb3IgZXhhbXBs
ZSwNCmluIGNvbW1pdCAieGVuL2FybTogaW50cm9kdWNlIHN0YXRpYyBzaGFyZWQgbWVtb3J5Iiwg
d2hlbiBwYXJzaW5nIHNoYXJlZCBtZW1vcnkgbm9kZSB0byByZXNlcnZlIGl0DQppbiBhZHZhbmNl
LCB3ZSBub3RpY2UgdGhhdCBhIHNoYXJlZCBtZW1vcnkgcmVnaW9uIGNvdWxkIGJlIHNoYXJlZCBh
bW9uZyBtdWx0aXBsZSBkb21haW5zLCBzbyBpbiBvcmRlciB0bw0KcHJldmVudCBpdGVyYXRpbmcg
b3ZlciBhbGwgcmVzZXJ2ZWQgbWVtb3J5IHJlZ2lvbnMgZWFjaCB0aW1lLCB3ZSB1c2UgYml0bWFw
IHRoZXJlIGFuZCBzaG0taWQgaXMgdXNlZCBhcyB0aGUNCmluZGV4IG9mIHRoZSBiaXRtYXAuDQoN
CkFsc28sIGluIExpbnV4IERvYyBhYm91dCB4ZW4sc2hhcmVkLW1lbW9yeSBiaW5kaW5nWzNdLCBp
dCByZXF1aXJlcyBhIHhlbixpZCBwcm9wZXJ0eSB0aGF0IGlkZW50aWZpZXMgdGhlDQpzaGFyZWQg
bWVtb3J5IHJlZ2lvbiBhcyBzcGVjaWZpZWQgaW4gdGhlIFZNIGNvbmZpZyBmaWxlLiANCg0KPiA+
ICsNCj4gPiArICAgIEFuIHUzMiB2YWx1ZSByZXByZXNlbnRzIHRoZSB1bmlxdWUgaWRlbnRpZmll
ciBvZiB0aGUgc2hhcmVkIG1lbW9yeQ0KPiByZWdpb24uDQo+ID4gKyAgICBVc2VyIHZhbHVpbmcg
cGVyIHNoYXJlZCBtZW1vcnkgcmVnaW9uIHNoYWxsIGZvbGxvdyB0aGUgYXNjZW5kaW5nIG9yZGVy
LA0KPiA+ICsgICAgc3RhcnRpbmcgZnJvbSB4ZW4sc2htLWlkID0gPDB4MD4sIHRvIHRoZSBtYXhp
bXVtIGlkZW50aWZpZXINCj4gPiArICAgIHhlbixzaG0taWQgPSA8MHgxMjY+Lg0KPiANCj4gV2h5
IGlzIGl0IGxpbWl0IHRvIDB4MTI2PyBBbmQgYWxzbywgd2h5IGRvIHRoZXkgaGF2ZSB0byBiZSBh
bGxvY2F0ZWQgaW4NCj4gYXNjZW5kaW5nIG9yZGVyPw0KPiANCg0KSW4gY3VycmVudCBjb2RlLCBJ
IG1ha2UgaXQgdGhlIHNhbWUgbnVtYmVyIHdpdGggTlJfTUVNX0JBTktTDQoNCj4gPiBUaGUgc3Bl
Y2lhbCB4ZW4sc2htLWlkID0gPDB4MTI3PiBpcyByZXNlcnZlZCBmb3INCj4gPiArICAgIElOVkFM
SURfU0hNSUQuDQo+IA0KPiBXaHkgZG8gd2UgbmVlZCB0byByZXNlcnZlIGludmFsaWQ/DQo+IA0K
DQpJdCBpcyByZW1vdmVkIGluIGN1cnJlbnQgY29kZXMuDQoNCj4gPiArDQo+ID4gKy0geGVuLHNo
YXJlZC1tZW0NCj4gPiArDQo+ID4gKyAgICBBbiBhcnJheSB0YWtlcyBhIHBoeXNpY2FsIGFkZHJl
c3MsIHdoaWNoIGlzIHRoZSBiYXNlIGFkZHJlc3Mgb2YgdGhlDQo+ID4gKyAgICBzaGFyZWQgbWVt
b3J5IHJlZ2lvbiBpbiBob3N0IHBoeXNpY2FsIGFkZHJlc3Mgc3BhY2UsIGEgc2l6ZSwgYW5kIGEg
Z3Vlc3QNCj4gPiArICAgIHBoeXNpY2FsIGFkZHJlc3MsIGFzIHRoZSB0YXJnZXQgYWRkcmVzcyBv
ZiB0aGUgbWFwcGluZy4NCj4gDQo+IEkgdGhpbmsgc2hhcmVkIG1lbW9yeSBpcyB1c2VmdWwgd2l0
aG91dCBzdGF0aWMgYWxsb2NhdGlvbi4gU28gSSB0aGluayB3ZSB3YW50IHRvDQo+IG1ha2UgdGhl
IGhvc3QgcGh5c2ljYWwgYWRkcmVzcyBvcHRpb25hbC4NCj4gDQoNCkhtbSwsIHNvIGxhdGVyLCwg
eW91IHdhbnQgdG8gbWFrZSBvbmUgZG9tYWluIGFzIG93bmVyLCBhbmQgcGFydHMgb2YgaXRzIGd1
ZXN0IFJBTQ0KaXMgc2hhcmVkIHdpdGggb3RoZXIgYm9ycm93ZXIgZG9tYWlucz8gU28gb25seSBH
Rk4gaXMgZW5vdWdoIGhlcmUsIHJpZ2h0Pw0KDQo+ID4gKw0KPiA+ICstIHJvbGUoT3B0aW9uYWwp
DQo+ID4gKw0KPiA+ICsgICAgQSBzdHJpbmcgcHJvcGVydHkgc3BlY2lmeWluZyB0aGUgb3duZXJz
aGlwIG9mIGEgc2hhcmVkIG1lbW9yeSByZWdpb24sDQo+ID4gKyAgICB0aGUgdmFsdWUgbXVzdCBi
ZSBvbmUgb2YgdGhlIGZvbGxvd2luZzogIm93bmVyIiwgb3IgImJvcnJvd2VyIg0KPiA+ICsgICAg
QSBzaGFyZWQgbWVtb3J5IHJlZ2lvbiBjb3VsZCBiZSBleHBsaWNpdGx5IGJhY2tlZCBieSBvbmUg
ZG9tYWluLCB3aGljaA0KPiBpcw0KPiA+ICsgICAgY2FsbGVkICJvd25lciBkb21haW4iLCBhbmQg
YWxsIHRoZSBvdGhlciBkb21haW5zIHdobyBhcmUgYWxzbyBzaGFyaW5nDQo+ID4gKyAgICB0aGlz
IHJlZ2lvbiBhcmUgY2FsbGVkICJib3Jyb3dlciBkb21haW4iLg0KPiA+ICsgICAgSWYgbm90IHNw
ZWNpZmllZCwgdGhlIGRlZmF1bHQgdmFsdWUgaXMgImJvcnJvd2VyIiBhbmQgb3duZXIgaXMNCj4g
PiArICAgICJkb21fc2hhcmVkIiwgYSBzeXN0ZW0gZG9tYWluLg0KPiANCj4gSSBkb24ndCBwYXJ0
aWN1bGFybHkgbGlrZSBhZGRpbmcgYW5vdGhlciBzeXN0ZW0gZG9tYWluLiBJbnN0ZWFkLCBpdCB3
b3VsZCBiZQ0KPiBiZXR0ZXIgdG8gYWx3YXlzIHNwZWNpZnkgdGhlIG93bmVyLg0KPiANCj4gPiAr
DQo+ID4gKyMjIEV4YW1wbGUNCj4gPiArDQo+ID4gK2Nob3NlbiB7DQo+ID4gKyAgICAjYWRkcmVz
cy1jZWxscyA9IDwweDE+Ow0KPiA+ICsgICAgI3NpemUtY2VsbHMgPSA8MHgxPjsNCj4gPiArICAg
IHhlbix4ZW4tYm9vdGFyZ3MgPSAiY29uc29sZT1kdHVhcnQgZHR1YXJ0PXNlcmlhbDAgYm9vdHNj
cnViPTAiOw0KPiA+ICsNCj4gPiArICAgIC4uLi4uLg0KPiA+ICsNCj4gPiArICAgIC8qIHRoaXMg
aXMgZm9yIERvbTAgKi8NCj4gPiArICAgIGRvbTAtc2hhcmVkLW1lbUAxMDAwMDAwMCB7DQo+ID4g
KyAgICAgICAgY29tcGF0aWJsZSA9ICJ4ZW4sZG9tYWluLXNoYXJlZC1tZW1vcnktdjEiOw0KPiA+
ICsgICAgICAgIHhlbixzaG0taWQgPSA8MHgwPjsNCj4gPiArICAgICAgICByb2xlID0gIm93bmVy
IjsNCj4gPiArICAgICAgICB4ZW4sc2hhcmVkLW1lbSA9IDwweDEwMDAwMDAwIDB4MTAwMDAwMDAg
MHgxMDAwMDAwMD47DQo+ID4gKyAgICB9DQo+ID4gKw0KPiA+ICsgICAgZG9tVTEgew0KPiA+ICsg
ICAgICAgIGNvbXBhdGlibGUgPSAieGVuLGRvbWFpbiI7DQo+ID4gKyAgICAgICAgI2FkZHJlc3Mt
Y2VsbHMgPSA8MHgxPjsNCj4gPiArICAgICAgICAjc2l6ZS1jZWxscyA9IDwweDE+Ow0KPiA+ICsg
ICAgICAgIG1lbW9yeSA9IDwwIDEzMTA3Mj47DQo+ID4gKyAgICAgICAgY3B1cyA9IDwyPjsNCj4g
PiArICAgICAgICB2cGwwMTE7DQo+ID4gKw0KPiA+ICsgICAgICAgIC8qDQo+ID4gKyAgICAgICAg
ICogc2hhcmVkIG1lbW9yeSByZWdpb24gaWRlbnRpZmllZCBhcyAweDAoeGVuLHNobS1pZCA9IDww
eDA+KQ0KPiA+ICsgICAgICAgICAqIHNoYXJlZCBiZXR3ZWVuIGRvbTAuDQo+ID4gKyAgICAgICAg
ICovDQo+ID4gKyAgICAgICAgZG9tVTEtc2hhcmVkLW1lbUAxMDAwMDAwMCB7DQo+ID4gKyAgICAg
ICAgICAgIGNvbXBhdGlibGUgPSAieGVuLGRvbWFpbi1zaGFyZWQtbWVtb3J5LXYxIjsNCj4gPiAr
ICAgICAgICAgICAgeGVuLHNobS1pZCA9IDwweDA+Ow0KPiA+ICsgICAgICAgICAgICByb2xlID0g
ImJvcnJvd2VyIjsNCj4gPiArICAgICAgICAgICAgeGVuLHNoYXJlZC1tZW0gPSA8MHgxMDAwMDAw
MCAweDEwMDAwMDAwIDB4NTAwMDAwMDA+Ow0KPiANCj4gVGVjaG5pY2FsbHksIHlvdSBhbHJlYWR5
IGtub3cgdGhlIHBoeXNpY2FsIGFkZHJlc3MgZnJvbSB0aGUgb3duZXIuIEluIGZhY3QsIGl0DQo+
IHdpbGwgb25seSBpbmNyZWFzZSB0aGUgcmlzayB0byBnZXQgdGhlIHdyb25nIGJpbmRpbmcuIFNv
IEkgd291bGQgbGlrZSB0byBzdWdnZXN0IGENCj4gZGlmZmVyZW50IGJpbmRpbmcuDQo+IA0KPiAx
KSBSZXNlcnZlIHRoZSByZWdpb24gaW4gdGhlIGhvc3QgbWVtb3J5IHVzaW5nIHJlc2VydmVkLW1l
bW9yeSBiaW5kaW5nDQo+IDIpIENyZWF0ZSBhIGJpbmRpbmcgcGVyIGRvbWFpbiB0aGF0IGNvbnRh
aW5zIGEgcGhhbmRsZSB0byB0aGUgaG9zdCBtZW1vcnkNCj4gYW5kIHRoZSByb2xlLg0KPiANCj4g
VGhlIGFkdmFudGFnZSB3aXRoIHRoaXMgaXMgd2UgY291bGQgZWFzaWx5IHN1cHBvcnQgcmVnaW9u
IHRoYXQgYXJlIG5vdCBiYWNrZWQNCj4gYnkgYSByZXNlcnZlZC1tZW1vcnkuDQo+IA0KPiANCj4g
PiArICAgICAgICB9DQo+ID4gKw0KPiA+ICsgICAgICAgIGRvbVUxLXNoYXJlZC1tZW1ANTAwMDAw
MDAgew0KPiA+ICsgICAgICAgICAgICBjb21wYXRpYmxlID0gInhlbixkb21haW4tc2hhcmVkLW1l
bW9yeS12MSI7DQo+ID4gKyAgICAgICAgICAgIHhlbixzaG0taWQgPSA8MHgxPjsNCj4gPiArICAg
ICAgICAgICAgeGVuLHNoYXJlZC1tZW0gPSA8MHg1MDAwMDAwMCAweDIwMDAwMDAwIDB4NjAwMDAw
MDA+Ow0KPiA+ICsgICAgICAgIH0NCj4gPiArDQo+ID4gKyAgICAgICAgLi4uLi4uDQo+ID4gKw0K
PiA+ICsgICAgfTsNCj4gPiArDQo+ID4gKyAgICBkb21VMiB7DQo+ID4gKyAgICAgICAgY29tcGF0
aWJsZSA9ICJ4ZW4sZG9tYWluIjsNCj4gPiArICAgICAgICAjYWRkcmVzcy1jZWxscyA9IDwweDE+
Ow0KPiA+ICsgICAgICAgICNzaXplLWNlbGxzID0gPDB4MT47DQo+ID4gKyAgICAgICAgbWVtb3J5
ID0gPDAgNjU1MzY+Ow0KPiA+ICsgICAgICAgIGNwdXMgPSA8MT47DQo+ID4gKw0KPiA+ICsgICAg
ICAgIC8qDQo+ID4gKyAgICAgICAgICogc2hhcmVkIG1lbW9yeSByZWdpb24gaWRlbnRpZmllZCBh
cyAweDEoeGVuLHNobS1pZCA9IDwweDE+KQ0KPiA+ICsgICAgICAgICAqIHNoYXJlZCBiZXR3ZWVu
IGRvbVUxLg0KPiA+ICsgICAgICAgICAqLw0KPiA+ICsgICAgICAgIGRvbVUyLXNoYXJlZC1tZW1A
NTAwMDAwMDAgew0KPiA+ICsgICAgICAgICAgICBjb21wYXRpYmxlID0gInhlbixkb21haW4tc2hh
cmVkLW1lbW9yeS12MSI7DQo+ID4gKyAgICAgICAgICAgIHhlbixzaG0taWQgPSA8MHgxPjsNCj4g
PiArICAgICAgICAgICAgeGVuLHNoYXJlZC1tZW0gPSA8MHg1MDAwMDAwMCAweDIwMDAwMDAwIDB4
NzAwMDAwMDA+Ow0KPiA+ICsgICAgICAgIH0NCj4gPiArDQo+ID4gKyAgICAgICAgLi4uLi4uDQo+
ID4gKyAgICB9Ow0KPiA+ICt9Ow0KPiA+ICsNCj4gPiArSXQgaXMgdGhlIGV4YW1wbGUgb2YgdHdv
IHN0YXRpYyBzaGFyZWQgbWVtb3J5IHJlZ2lvbnMuDQo+ID4gKw0KPiA+ICtJbiB0ZXJtcyBvZiBz
aGFyZWQgbWVtb3J5IHJlZ2lvbiBpZGVudGlmaWVkIGFzIDB4MCwgaG9zdCBwaHlzaWNhbCBhZGRy
ZXNzDQo+ID4gK3N0YXJ0aW5nIGF0IDB4MTAwMDAwMDAgb2YgMjU2TUIgd2lsbCBiZSByZXNlcnZl
ZCB0byBiZSBzaGFyZWQgYmV0d2Vlbg0KPiBEb20wDQo+ID4gK2FuZCBEb21VMS4gSXQgd2lsbCBn
ZXQgbWFwcGVkIGF0IDB4MTAwMDAwMDAgaW4gRG9tMCBndWVzdCBwaHlzaWNhbA0KPiBhZGRyZXNz
DQo+ID4gK3NwYWNlLCBhbmQgYXQgMHg1MDAwMDAwMCBpbiBEb21VMSBndWVzdCBwaHlzaWNhbCBh
ZGRyZXNzIHNwYWNlLiBEb20wIGlzDQo+IHRoZQ0KPiA+ICtvd25lciBkb21haW4sIGFuZCBkb21V
MSBpcyB0aGUgYm9ycm93ZXIgZG9tYWluLg0KPiA+ICsNCj4gPiArQW5kIGluIHRlcm1zIG9mIHNo
YXJlZCBtZW1vcnkgcmVnaW9uIGlkZW50aWZpZWQgYXMgMHgxLCBob3N0IHBoeXNpY2FsDQo+IGFk
ZHJlc3MNCj4gPiArc3RhcnRpbmcgYXQgMHg1MDAwMDAwMCBvZiA1MTJNQiB3aWxsIGJlIHJlc2Vy
dmVkIHRvIGJlIHNoYXJlZCBiZXR3ZWVuDQo+IERvbVUxDQo+ID4gK2FuZCBEb21VMi4gSXQgd2ls
bCBnZXQgbWFwcGVkIGF0IDB4NjAwMDAwMDAgaW4gRG9tVTEgZ3Vlc3QgcGh5c2ljYWwNCj4gYWRk
cmVzcw0KPiA+ICtzcGFjZSwgYW5kIGF0IDB4NzAwMDAwMDAgaW4gRG9tVTIgZ3Vlc3QgcGh5c2lj
YWwgYWRkcmVzcyBzcGFjZS4gU2luY2Ugbm8NCj4gb3duZXINCj4gPiArZG9tYWluIGlzIGV4cGxp
Y2l0bHkgZGVmaW5lZCwgdGhlIGRlZmF1bHQgImRvbV9zaGFyZWQiIGlzIHRoZSBvd25lcg0KPiBk
b21haW4sDQo+ID4gK2FuZCBib3RoIGRvbVUxIGFuZCBkb21VMiBhcmUgdGhlIGJvcnJvd2VyIGRv
bWFpbnMuDQo+ID4gKw0KPiA+ICsjIE92ZXJ2aWV3IG9mIFN0YXRpYyBTaGFyZWQgTWVtb3J5IEZs
b3cNCj4gPiArDQo+ID4gK1N0YXRpYyBTaGFyZWQgTWVtb3J5IHdvcmtpbmcgZmxvdyBjb3VsZCBi
ZSBjbGFzc2lmaWVkIGludG8gdGhlIGZvbGxvd2luZw0KPiA+ICtzdGVwczoNCj4gPiArIC0gQ2Fy
dmUgb3V0IGEgcmFuZ2Ugb2YgbWVtb3J5IGluIGhvc3QgcGh5c2ljYWwgYWRkcmVzcyBzcGFjZSB0
byBiZSB1c2VkDQo+ID4gK2ZvciBzaGFyaW5nLiBEZWZpbmUgaXQgaW4gZGV2aWNlIHRyZWUgY29u
ZmlndXJhdGlvbiwgdGhlbiBwYXJzZSBhbmQgcmVzZXJ2ZQ0KPiA+ICtpdCB0byBhdm9pZCBvdGhl
ciB1c2UuDQo+ID4gKyAtIENyZWF0ZSBhIHNwZWNpYWwgZG9tYWluICJkb21fc2hhcmVkIi4gSXQg
d2lsbCBiZSB0aGUgb3duZXIgZG9tYWluDQo+IHdoaWNoDQo+ID4gK2lzIG93bmluZyB0aGUgc3Rh
dGljYWxseSBzaGFyZWQgcGFnZXMsIGlmICJyb2xlIiBwcm9wZXJ0eSBpcyBub3Qgc3BlY2lmaWVk
Lg0KPiA+ICsgLSBQZXIgc2hhcmVkIG1lbW9yeSByZWdpb24gY291bGQgYmUgc2hhcmVkIHdpdGgg
bXVsdGlwbGUgZG9tYWlucy4gRm9yDQo+ID4gK293bmVyIGRvbWFpbiwgaXQgYWNxdWlyZXMgc3Rh
dGljYWxseSBzaGFyZWQgcGFnZXMgYW5kIGFzc2lnbiB0aGVtIHRvIGl0c2VsZiwNCj4gPiAraW4g
dGhlIHNhbWUgd2F5IHdpdGggc3RhdGljIG1lbW9yeS4gQW5kIG90aGVyIHRoYW4gb3duZXIgZG9t
YWluLCB0aGUNCj4gb3RoZXJzDQo+ID4gK3dobyBhcmUgYWxzbyBzaGFyaW5nIGFyZSBjYWxsZWQg
ImJvcnJvd2VyIGRvbWFpbiIsIGZvciB3aGljaCBmb3JlaWduDQo+IG1lbW9yeQ0KPiA+ICttYXAg
b2Ygc3RhdGljYWxseSBzaGFyZWQgcGFnZXMgaXMgcmVxdWlyZWQuDQo+ID4gKyAtIEV4cG9zZSB0
aGUgc2hhcmVkIG1lbW9yeSB0byB0aGUgZG9tVSB1c2luZyB0aGUgInhlbixzaGFyZWQtbWVtb3J5
LQ0KPiB2MSINCj4gPiArcmVzZXJ2ZWQtbWVtb3J5IGJpbmRpbmcuIFNlZQ0KPiA+ICtEb2N1bWVu
dGF0aW9uL2RldmljZXRyZWUvYmluZGluZ3MvcmVzZXJ2ZWQtbWVtb3J5L3hlbixzaGFyZWQtDQo+
IG1lbW9yeS50eHQNCj4gPiAraW4gTGludXggZm9yIHRoZSBjb3JyZXNwb25kaW5nIGRldmljZSB0
cmVlIGJpbmRpbmcuDQo+ID4gKw0KPiA+ICsjIE1lbW9yeSBtYW5hZ2VtZW50IG9mIFNoYXJlZCBN
ZW1vcnkgUmVnaW9uDQo+ID4gKw0KPiA+ICtFYWNoIG1lbW9yeSBwYWdlIG5lZWRzIHRvIGhhdmUg
YW4gIm93bmVyIiBhbmQgaXQgaXMgbGlrZWx5IHRoYXQgaW4gbWFueQ0KPiBjYXNlcw0KPiA+ICt0
aGUgdXNlciBkb24ndCBjYXJlIHdobyB0aGUgb3duZXIgaXMsIHNvIGl0IG1ha2VzIHNlbnNlIHRo
YXQgdXNlcnMgZG9uJ3QNCj4gPiArbmVlZCB0byBzcGVjaWZ5IHRoZSAicm9sZSIgaW4gZGV2aWNl
IHRyZWUgaWYgdGhleSBkb24ndCB3YW50IHRvLCBpbiB3aGljaA0KPiA+ICtzY2VuYXJpbywgYSBk
ZWZhdWx0IGRvbWFpbiBzaGFsbCBiZSB0aGUgb3duZXIgZG9tYWluLg0KPiA+ICsNCj4gPiArV2Ug
cHJvcG9zZSBhIG5ldyBzeXN0ZW0gZG9tYWluICJkb21fc2hhcmVkIiB0byBiZSB0aGUgZGVmYXVs
dCBkb21haW4NCj4gb3duaW5nIGFsbA0KPiA+ICtzdGF0aWNhbGx5IHVub3duZWQgc2hhcmVkIHBh
Z2VzLCBhc3NpZ25pbmcgaXQgZG9tX2lkDQo+IDB4N0ZGNShET01JRF9TSEFSRUQpLg0KPiA+ICsN
Cj4gPiArImRvbV9zaGFyZWQiIGRvbWFpbiBzaGFsbCBnZXQgY29uc3RydWN0ZWQgYmVmb3JlIGRv
bWFpbiBjb25zdHJ1Y3Rpb24NCj4gYW5kIGFmdGVyDQo+ID4gKyJzZXR1cF92aXJ0X3BhZ2luZyIs
IGR1cmluZyBzeXN0ZW0gYm9vdC10aW1lLCBzbyBpdCBjb3VsZCBzdWNjZXNzZnVsbHkgZG8NCj4g
PiArcDJtIGluaXRpYWxpemF0aW9uLg0KPiANCj4gSUhNTywgdGhpcyBpcyBnb2luZyB0b28gbXVj
aCBpbnRvIGRldGFpbHMgZm9yIGEgZGVzaWduIGRvY3VtZW50LiBUaGUNCj4gZ29hbCBpcyB0byBh
YnN0cmFjdCB0aGUgZmVhdHVyZSByYXRoZXIgdGhhbiBtZW50aW9uaW5nIHRoZQ0KPiBpbXBsZW1l
bnRhdGlvbiAod2hpY2ggbWF5IGNoYW5nZSBkdXJpbmcgcmV2aWV3IG9yIGluIHRoZSBmdXR1cmUp
Lg0KPiANCg0KU3VyZSwgSSdsbCBkZWxldGUNCg0KPiA+ICsNCj4gPiArT3duZXIgZG9tYWluIGFj
cXVpcmVzIHN0YXRpY2FsbHkgc2hhcmVkIHBhZ2VzIGFuZCBhc3NpZ24gdGhlbSB0byBpdHNlbGYs
DQo+ID4gK3doaWxlIGJvcnJvd2VyIGRvbWFpbnMgZ2V0IGFuZCB0YWtlIHJlZmVyZW5jZSBvZiB0
aGVtLCB0aGVuIGRvIGZvcmVpZ24NCj4gbWVtb3J5DQo+ID4gK21hcCBvZiB0aGVzZSBzdGF0aWNh
bGx5IHNoYXJlZCBwYWdlcy4NCj4gDQo+IFdoYXQgaGFwcGVucyBpZiB0aGUgYm9ycm93ZXIgaXMg
c2VlbiBiZWZvcmUgdGhlIG93bmVyPw0KPiANCg0KSSd2ZSBhIGNvbW1pdCBzcGVjaWFsbHkgZm9j
dXNpbmcgb24gdGhpcyBzY2VuYXJpbywgUExaIHNlZSBjb21taXQgIg0KeGVuL2FybTogZGVmZXIg
Zm9yZWlnbiBtZW1vcnkgbWFwIGluIHNobV9pbml0X2xhdGUiLCBsaWtlIEkgYWxzbyBjb21tZW50
IGluDQp0aGUgY29kZXM6DQoiDQpJbiBhIGZldyBzY2VuYXJpb3Mgd2hlcmUgb3duZXIgZG9tYWlu
LCBpcyBkZWZpbmVkIGFmdGVyIGJvcnJvd2VyIGRvbWFpbiBpbg0KZGV2aWNlIHRyZWUgY29uZmln
dXJhdGlvbiwgc3RhdGljYWxseSBzaGFyZWQgcGFnZXMgaGF2ZW4ndCBiZWVuIHByb3Blcmx5IGFs
bG9jYXRlZA0KaWYgYm9ycm93ZXIgZG9tYWluIGhlcmUgdHJpZXMgdG8gZG8gZm9yZWlnbiBtZW1v
cnkgbWFwLg0KSW4gb3JkZXIgdG8gY292ZXIgc3VjaCBzY2VuYXJpbywgd2UgZGVmZXIgYWxsIGJv
cnJvd2VyIGRvbWFpbnMnIGZvcmVpZ24gbWVtb3J5DQptYXAgYWZ0ZXIgYWxsIGRvbWFpbiBjb25z
dHJ1Y3Rpb24gZmluaXNoZWQuDQoiDQoNCj4gPiArDQo+ID4gK1doZW4gZGVzdHJveWluZyBvciBy
ZWJvb3RpbmcgYSBkb21haW4sIGlmIGl0IGlzIGEgYm9ycm93ZXIgZG9tYWluLCBvdGhlcg0KPiB0
aGFuDQo+ID4gK3JlbW92aW5nIGZvcmVpZ24gbWVtb3J5IG1hcCBvZiBzdGF0aWNhbGx5IHNoYXJl
ZCBwYWdlcyBpbiBQMk0gdGFibGUsIHdlDQo+IGFsc28NCj4gPiArbmVlZCB0byBkcm9wIGFjY29y
ZGluZyBnYWluZWQgcmVmZXJlbmNlLiBBbmQgaWYgaXQgaXMgYW4gb3duZXIgZG9tYWluLA0KPiBz
aW5jZQ0KPiA+ICtzdGF0aWNhbGx5IHNoYXJlZCBwYWdlcyBhcmUgYWxsb2NhdGVkIGFzIGd1ZXN0
IG5vcm1hbCByYW0sIGl0IGlzIG5vdCBuZWVkZWQNCj4gdG8NCj4gPiArZG8gZXh0cmEgcmVtb3Zp
bmcuDQo+ID4gKw0KPiA+ICtIb3dldmVyIGlmIG93bmVyIGRvbWFpbiBpcyBub3QgdGhlIGRlZmF1
bHQgImRvbV9zaGFyZWQiIGRvbWFpbiwgYnV0DQo+IHNwZWNpZmllZA0KPiA+ICtleHBsaWNpdGx5
IGluIGRldmljZSB0cmVlLCBzdG9wcGluZyBpdHNlbGYgd2lsbCBtYWtlIHNoYXJlZCBtZW1vcnkg
cmVnaW9uDQo+ID4gK3VuYWNjZXNzaWJsZSB0byBhbGwgYm9ycm93ZXIgZG9tYWlucywgc28gd2Ug
bmVlZCB0byByZW1vdmUgZm9yZWlnbg0KPiBtZW1vcnkgbWFwDQo+ID4gK2ZvciBhbGwgYm9ycm93
ZXIgZG9tYWlucy4gTm90aWNlIHRoYXQgYWxsIGJvcnJvd2VycyBkb21haW5zIHNob3VsZCBiZQ0K
PiBzdG9wcGVkDQo+ID4gK2JlZm9yZSBzdG9wcGluZyB0aGUgb3duZXIgZG9tYWluLg0KPiANCj4g
SG93IHdpbGwgeW91IGVuZm9yY2UgdGhhdD8NCj4NCg0KWWVzLCBJIGFncmVlIHRoYXQgd2UgY291
bGQgbm90IGVuZm9yY2UgdGhhdCwgc28gaW4gY29tbWl0ICINCnhlbi9hcm06IHVubWFwIGZvcmVp
Z24gbWVtb3J5IG1hcHBpbmcgd2hlbiBkZXN0cm95ZWQgZG9tYWluIGlzIG93bmVyIGRvbWFpbiIs
DQpOb3csIHdoZW4gZGVzdHJveWVkIGRvbWFpbiBpcyBhbiBvd25lciBkb21haW4gb2YgYSBzdGF0
aWMgc2hhcmVkIG1lbW9yeSByZWdpb24sIA0Kd2UgbmVlZCB0byBlbnN1cmUgdGhhdCBhbGwgYWNj
b3JkaW5nIGJvcnJvd2VyIGRvbWFpbnMgc2hhbGwgbm90IGhhdmUgdGhlIGFjY2VzcyB0byB0aGlz
DQpzdGF0aWMgc2hhcmVkIG1lbW9yeSByZWdpb24gdG9vLg0KIA0KPiA+ICsNCj4gPiArImRvbV9z
aGFyZWQiIGRvbWFpbiBpcyBkZXN0cm95ZWQgd2hlbiB0aGUgd2hvbGUgc3lzdGVtIHNodXRzIGRv
d24sIHNvDQo+IGl0cw0KPiA+ICtvd25pbmcgc3RhdGljYWxseSBzaGFyZWQgcGFnZXMgYXJlIG9u
bHkgZnJlZWQgYXQgc3lzdGVtIHNodXRkb3duLg0KPiA+ICsNCj4gPiArWzFdIGh0dHBzOi8vbWFy
Yy5pbmZvLz9sPXhlbi1kZXZlbCZtPTE1NDQwNDgyMTczMTE4Ng0KPiANCj4gWzJdIDxhbHBpbmUu
REVCLjIuMjIuMzk0LjIyMDExMjE2NDYyOTAuMTkzNjJAdWJ1bnR1LWxpbnV4LTIwLTA0LWRlc2t0
b3A+DQo+IA0KDQpbM10gaHR0cHM6Ly9naXRodWIuY29tL3RvcnZhbGRzL2xpbnV4L2Jsb2IvbWFz
dGVyL0RvY3VtZW50YXRpb24vZGV2aWNldHJlZS9iaW5kaW5ncy9yZXNlcnZlZC1tZW1vcnkveGVu
JTJDc2hhcmVkLW1lbW9yeS50eHQNCg0KPiAtLQ0KPiBKdWxpZW4gR3JhbGwNCg0KLS0NClBlbm55
IFpoZW5nDQo=


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 06:12:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 06:12:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288711.489685 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYW0-0000XY-5i; Fri, 11 Mar 2022 06:12:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288711.489685; Fri, 11 Mar 2022 06:12:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYW0-0000XP-2U; Fri, 11 Mar 2022 06:12:40 +0000
Received: by outflank-mailman (input) for mailman id 288711;
 Fri, 11 Mar 2022 06:12:38 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=p7td=TW=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nSYVy-0000Fh-7Q
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 06:12:38 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04on0607.outbound.protection.outlook.com
 [2a01:111:f400:fe0d::607])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 3fa8371d-a102-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 07:12:37 +0100 (CET)
Received: from DB9PR06CA0014.eurprd06.prod.outlook.com (2603:10a6:10:1db::19)
 by AM8PR08MB6545.eurprd08.prod.outlook.com (2603:10a6:20b:368::13)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Fri, 11 Mar
 2022 06:12:35 +0000
Received: from DB5EUR03FT064.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:1db:cafe::d) by DB9PR06CA0014.outlook.office365.com
 (2603:10a6:10:1db::19) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:35 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT064.mail.protection.outlook.com (10.152.21.199) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:12:34 +0000
Received: ("Tessian outbound 31aeb3346a45:v113");
 Fri, 11 Mar 2022 06:12:34 +0000
Received: from f51cbd4cabcd.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 451891ED-868A-47FA-B37C-DD139D17B140.1; 
 Fri, 11 Mar 2022 06:12:27 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id f51cbd4cabcd.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 11 Mar 2022 06:12:27 +0000
Received: from AM6P193CA0100.EURP193.PROD.OUTLOOK.COM (2603:10a6:209:88::41)
 by VI1PR08MB3533.eurprd08.prod.outlook.com (2603:10a6:803:84::16) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.16; Fri, 11 Mar
 2022 06:12:25 +0000
Received: from AM5EUR03FT021.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:88:cafe::34) by AM6P193CA0100.outlook.office365.com
 (2603:10a6:209:88::41) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.20 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:25 +0000
Received: from nebula.arm.com (40.67.248.234) by
 AM5EUR03FT021.mail.protection.outlook.com (10.152.16.105) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:12:25 +0000
Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX04.Arm.com
 (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27; Fri, 11 Mar
 2022 06:12:21 +0000
Received: from a011292.shanghai.arm.com (10.169.190.94) by mail.arm.com
 (10.251.24.32) with Microsoft SMTP Server id 15.1.2308.27 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:19 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3fa8371d-a102-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=6aEzTY0gaHMjQiSKvKT0k3TGTcpG97yqj0yEvdhiK8g=;
 b=cKCTShhTjRm4L6NeW2sDcWp8QTAraL/IiRUWGeIWkiNBIQXllmkJ0w1OJQg6kEH4ZMQxu4s43zSyGYVVQJY+5oMU/b69c0693ITcEid0QHvwHcK1BmOANsrDFG6XnB8EWP1WUUsrFr8S4P9AG5kVLMctTwkO962dgNvi3vPXeGQ=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 315f15bcb692ff6d
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=O0O/fDEOT+ohxNpGx+e9A4Ok9MonqvvjUxtDEYbEB4gMEz0rXKlZoDpCr3CT2qbDixsI8oC6eZWrzjM6imYkp/dWYf6wfX3l2UY78zGHT1kwMApESI5wI7SLfgv8HyRmGX4TzOXW4JGb7iI9BR1xl9I/f72VjnHXjfrRqEyVZ9CdDn1aO1Up70ZvDcMn7x54juMm6mz+rjUZ3rQ+4xnuho+G4aZF+LKnoYWTAT/Loi2Ei0FDN66dk1ZPSeutogC7y8CcGpcSuBfLB6VAeYSQ8gWO0ZbLp1WNcNZHUjkS54fV2Edat4hmwwduPJ7a63XyFVSMgP4J+xuSGg6eWVeTlQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=6aEzTY0gaHMjQiSKvKT0k3TGTcpG97yqj0yEvdhiK8g=;
 b=HIQWdE76JSyEuz974EBLEy0YR6SEmcCZbuze2cjEMHAqDTPb8qO0s6Za/Lq5NgqJUnvPjQ2f2oeuDc6CQYHZwGV8zReRswxQ5WBDqnm3FTtrKlmgNIi8Ig6FEWfIGEE7ejh/awzxVFDI4LlmV82YqJ6C6fFmVNbBuoYTOMZwlyWewkalyWzOofFFjHRqY00qtzBuYNlVYydchIY5BTiipsqSloS5esgAwl6vPesZTQgXcFlGcMAW4qT2nLhcuSVm3bCkusaWPmfvXDKzrcbfjAJN9ZeO11z3Mabm14qoLZnTdZ7kgS0YTS9w+NT5CqZp0MjFGlnWdnAjjsCDpe81Sw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 40.67.248.234) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=6aEzTY0gaHMjQiSKvKT0k3TGTcpG97yqj0yEvdhiK8g=;
 b=cKCTShhTjRm4L6NeW2sDcWp8QTAraL/IiRUWGeIWkiNBIQXllmkJ0w1OJQg6kEH4ZMQxu4s43zSyGYVVQJY+5oMU/b69c0693ITcEid0QHvwHcK1BmOANsrDFG6XnB8EWP1WUUsrFr8S4P9AG5kVLMctTwkO962dgNvi3vPXeGQ=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234)
 smtp.mailfrom=arm.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 40.67.248.234 as permitted sender) receiver=protection.outlook.com;
 client-ip=40.67.248.234; helo=nebula.arm.com;
From: Penny Zheng <Penny.Zheng@arm.com>
To: <xen-devel@lists.xenproject.org>
CC: <nd@arm.com>, Penny Zheng <penny.zheng@arm.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Julien Grall <julien@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH v1 04/13] xen/arm: add P2M type parameter in guest_physmap_add_pages
Date: Fri, 11 Mar 2022 14:11:14 +0800
Message-ID: <20220311061123.1883189-5-Penny.Zheng@arm.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <20220311061123.1883189-1-Penny.Zheng@arm.com>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain
X-EOPAttributedMessage: 1
X-MS-Office365-Filtering-Correlation-Id: 9f78ee7a-cd3b-403e-bb11-08da0326226c
X-MS-TrafficTypeDiagnostic:
	VI1PR08MB3533:EE_|DB5EUR03FT064:EE_|AM8PR08MB6545:EE_
X-Microsoft-Antispam-PRVS:
	<AM8PR08MB6545669552C5C8FE18ED3027F70C9@AM8PR08MB6545.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
NoDisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 vFMZkg8duRlCN/nAZqSeeN4hD1KwoOPcf91HUb6YDarLEYwVgKoV/DFluh6QGndX9HH3RCQ5l3Ca1rVWGvM1AIBiXkym/jIGWv5soZsOu5DWUG+Ga+3eVxuyg69Sa2N1E1NpiErbn2aggMSTV5NSm8SBVFYvqwD893X3mLDQdJf7cChM8PpACFR/I1T/1ZD592FfSud+jn+CHdBp5eKu98NmhIDLGMqx41gqVw3zQYCZmXU6v1RLkRf1bi3QCqhFCvNOOpBvyvVAwbYhE7IOIaLv3M55q17qfUFB246aunHKMyHXUKlIPF5j9hoIFESHN2WAWMkIS3Cf7TwCT1hdZXYQhfwFPb4TcckfjWZoRu7Ofa7RqK/RflRasU3p20RFJ91wBFVg+bK1LhfdkUZZ5gWN55uCWZ7vQgmp0Tii3YOPTD8bvNbCzcbbWlRl80/vg4HbjebE05N0ZizPS/+SG8Pi8PlwCG2MLcq+2di+UJZOhIYFod6TB3xaH+USS2TYJcMu/FoF6vWEtnba/K2qCSaEsKMOVnveDzGdMSCCkRPKmU5JVP0iEQglSEr74MjWPCc3+Kug4pR7UTQe6CSvlBWo6Pz1q/Ir9KuI2ZPo5RkEkuQ9VMLy6aSYAlk+jq1lI/giFQn5q0aVIKMTpewisB6hQ4SEwE357X1vwEDp259tbvMraoIRU/TSkzhhBvuMngoiPh2xVMIrT/xy2mL66g==
X-Forefront-Antispam-Report-Untrusted:
 CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(508600001)(336012)(186003)(426003)(1076003)(26005)(2616005)(86362001)(82310400004)(7696005)(6666004)(5660300002)(54906003)(316002)(6916009)(4326008)(70206006)(70586007)(40460700003)(8676002)(81166007)(83380400001)(36756003)(356005)(8936002)(2906002)(36860700001)(47076005)(36900700001);DIR:OUT;SFP:1101;
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB3533
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT064.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	7f5cbd13-1e96-4283-5542-08da03261cea
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	rY7nI8NIP764s0bItiGCSIveTj/p23vh81wfv9On73eTCkUvsZ6zdD64oWDI2nEj7xXAVauQy2ff7CAXBxf9Z+TfA7RK5Lc2zxC80fnNp1CpRbYMoE8ZlAEBEob3hLP7Y1FHmhxbcSVBGh2jBRGR+pAkMkHDnWabbs9kYDrSrU6YkcKr9HD1BTeZYpgc0hkVO29NsdF/L3Eu5TQDK7xP66ti2PdbdIvH8bHdslVaTxarNOdPcq5PUBCzcsmNHNqZVgTWvOVncX5pRcEohh+Povi4df0jMTvVW6nu55ZhokwWW5lKfbzkq6PFwnLsmUIcKsoOZJ8LfzJh08RcepSVi4bwWkpyUE+SKin/Xaysc+chr1Mu4fjp4//PBRlNxP4v76JQX5sNXutPQm53ckb0U+69zZ/scWu7WSA43ytxvSy/y42e0ZZDKdfEaBxrFJmNgTz5EXdIqC/wS015AfUe7zeVqIAuoFi2rK5+sndSQ6XLyhyAwAg7Wti53WLfeNTUyJbVhHyNt5wMp0W9Z5e3NiYzblMaCMh5aRI/BImlFFf9shIVtb1ek6G8z4tRUiqEpBSkHrvx6aUR+T60H4VDKGH5ChcZxbgNFyn1fPELei4ktfx3wL1KE6ZIxyN0Y9vyFZRZuK6Bs9ufddT4lrMmNlmkyUvzR1NKCWx0AOFYEihEuzDfb4VGnmhStM+y3Vej
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(336012)(426003)(508600001)(83380400001)(40460700003)(186003)(1076003)(26005)(2906002)(2616005)(107886003)(36756003)(36860700001)(47076005)(7696005)(82310400004)(6666004)(81166007)(5660300002)(70586007)(70206006)(8936002)(316002)(54906003)(4326008)(86362001)(8676002)(6916009);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 06:12:34.7381
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 9f78ee7a-cd3b-403e-bb11-08da0326226c
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT064.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM8PR08MB6545

From: Penny Zheng <penny.zheng@arm.com>

In order to cover the scenario where users intend to set up guest
p2m foreign mapping with nr_pages, this commit adds a new P2M type
parameter in guest_physmap_add_pages.

Signed-off-by: Penny Zheng <penny.zheng@arm.com>
---
 xen/arch/arm/domain_build.c    | 5 +++--
 xen/arch/arm/include/asm/p2m.h | 5 +++--
 2 files changed, 6 insertions(+), 4 deletions(-)

diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index 6e6349caac..984e70e5fc 100644
--- a/xen/arch/arm/domain_build.c
+++ b/xen/arch/arm/domain_build.c
@@ -507,7 +507,7 @@ static bool __init append_static_memory_to_bank(struct domain *d,
     else
         sgfn = gaddr_to_gfn(mfn_to_maddr(smfn));
 
-    res = guest_physmap_add_pages(d, sgfn, smfn, nr_pages);
+    res = guest_physmap_add_pages(d, sgfn, smfn, nr_pages, p2m_ram_rw);
     if ( res )
     {
         dprintk(XENLOG_ERR, "Failed to map pages to DOMU: %d", res);
@@ -787,7 +787,8 @@ static int __init allocate_shared_memory(struct domain *d,
     if ( mfn_eq(smfn, INVALID_MFN) )
         return -EINVAL;
 
-    ret = guest_physmap_add_pages(d, gaddr_to_gfn(gbase), smfn, PFN_DOWN(psize));
+    ret = guest_physmap_add_pages(d, gaddr_to_gfn(gbase), smfn, PFN_DOWN(psize),
+                                  p2m_ram_rw);
     if ( ret )
     {
         dprintk(XENLOG_ERR, "Failed to map shared memory to %pd.\n", d);
diff --git a/xen/arch/arm/include/asm/p2m.h b/xen/arch/arm/include/asm/p2m.h
index 8cce459b67..58590145b0 100644
--- a/xen/arch/arm/include/asm/p2m.h
+++ b/xen/arch/arm/include/asm/p2m.h
@@ -317,9 +317,10 @@ guest_physmap_add_page(struct domain *d, gfn_t gfn, mfn_t mfn,
 static inline int guest_physmap_add_pages(struct domain *d,
                                           gfn_t gfn,
                                           mfn_t mfn,
-                                          unsigned int nr_pages)
+                                          unsigned int nr_pages,
+                                          p2m_type_t t)
 {
-    return p2m_insert_mapping(d, gfn, nr_pages, mfn, p2m_ram_rw);
+    return p2m_insert_mapping(d, gfn, nr_pages, mfn, t);
 }
 
 mfn_t gfn_to_mfn(struct domain *d, gfn_t gfn);
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 06:12:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 06:12:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288710.489674 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYVy-0000Gg-Ut; Fri, 11 Mar 2022 06:12:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288710.489674; Fri, 11 Mar 2022 06:12:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYVy-0000GX-QL; Fri, 11 Mar 2022 06:12:38 +0000
Received: by outflank-mailman (input) for mailman id 288710;
 Fri, 11 Mar 2022 06:12:37 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=p7td=TW=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nSYVx-0000Fh-8t
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 06:12:37 +0000
Received: from EUR01-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur01on0616.outbound.protection.outlook.com
 [2a01:111:f400:fe1f::616])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 3e508a72-a102-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 07:12:35 +0100 (CET)
Received: from DB6PR0301CA0014.eurprd03.prod.outlook.com (2603:10a6:4:3e::24)
 by DU2PR08MB7270.eurprd08.prod.outlook.com (2603:10a6:10:2d5::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.16; Fri, 11 Mar
 2022 06:12:32 +0000
Received: from DB5EUR03FT047.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:4:3e:cafe::84) by DB6PR0301CA0014.outlook.office365.com
 (2603:10a6:4:3e::24) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.23 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:32 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT047.mail.protection.outlook.com (10.152.21.232) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:12:31 +0000
Received: ("Tessian outbound 1f399c739551:v113");
 Fri, 11 Mar 2022 06:12:31 +0000
Received: from 1ad56a869f2f.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 875CF326-78E1-410B-B6BF-F90B7F3BCA75.1; 
 Fri, 11 Mar 2022 06:12:25 +0000
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 1ad56a869f2f.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 11 Mar 2022 06:12:25 +0000
Received: from AM6P193CA0085.EURP193.PROD.OUTLOOK.COM (2603:10a6:209:88::26)
 by AM6PR08MB4133.eurprd08.prod.outlook.com (2603:10a6:20b:ab::21) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.19; Fri, 11 Mar
 2022 06:12:23 +0000
Received: from AM5EUR03FT021.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:88:cafe::f1) by AM6P193CA0085.outlook.office365.com
 (2603:10a6:209:88::26) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:18 +0000
Received: from nebula.arm.com (40.67.248.234) by
 AM5EUR03FT021.mail.protection.outlook.com (10.152.16.105) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:12:18 +0000
Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX04.Arm.com
 (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27; Fri, 11 Mar
 2022 06:12:16 +0000
Received: from a011292.shanghai.arm.com (10.169.190.94) by mail.arm.com
 (10.251.24.32) with Microsoft SMTP Server id 15.1.2308.27 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:12 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3e508a72-a102-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=pjd0pcH7ozHk3VDSlSokBSzHTlMY1j1l8m/2mk3WqSg=;
 b=DmhPXjw758sy9rxwSWVWGLnny5SXk3oCf9q8p+wAHt5l+50+VWB+ui0sJZb4AtP8wlePs0dPvc/ghwHadl9w1ctKX+Mw4gNxU/QzXiXOogxq60NItugc1dhX2E93cahGKiK3NF2IAw/jNMiamOTyaIRTuxIllHvQ0C3C72Wz5gQ=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 3c6a9fa71984e4f1
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=oGyhsi3QuCqAosuWtKxzwRl4UbYa6hV0HSiEIWfOZRW8Ww23wdy6uMvv5NROqaVPTFGyGucyEN0Gzj0atY21nouWyR/FlAjc25VTm8Xdih//8zbyWrEkyx3ncFCKrs2mpSY7Z9YsPtA8S6OgYJJl1ez0CTO8St3nSSOJ3gdk8mSztvNDjMF4BWfA3INp0DeLuV8niMURUcKuUtdA35JPvI7h4f9HBg70CcqPZnHEyw7NS3FRw8ySuuEOjJbrg+RFISO+GiMJtZE9jGebb0jEDD2CKpsQ2hw74x/ropKTPwC+xqAHqN0I3noVCLbvsTSTwKQmgISImta7Y9hJru+J3A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=pjd0pcH7ozHk3VDSlSokBSzHTlMY1j1l8m/2mk3WqSg=;
 b=bQqJZ97SwLM9ZcL/sALB0xTsekeMYV17Gxf7RhmKDFSlnuUeR9dxFcHmbYUeATCd+2JQOxR3a/DPOWBoPX5doWvjgA2OFjO53l2IAfgqwHnsWAguqYhcUKXpCLeR2yUpvf3TagPvFGQXCz/cbTvMlsp+3RS26pO855N6xy87IarkBObe2hLIU2Srhp3PhNo8bfvcY3+EeQ8Rn/47XHubJs2cqXiweC7Am1nSgGUTTiATJmLpmFvOq7ZZBmAm6fJeZnmNMEZkb5Tdk4SFZxd6sVx7yBqfIG+99UTwBjo/UV5bovZuTxl88GE+nV4T0fXQszMssaJ6oWtxKuAn8sugsg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 40.67.248.234) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=pjd0pcH7ozHk3VDSlSokBSzHTlMY1j1l8m/2mk3WqSg=;
 b=DmhPXjw758sy9rxwSWVWGLnny5SXk3oCf9q8p+wAHt5l+50+VWB+ui0sJZb4AtP8wlePs0dPvc/ghwHadl9w1ctKX+Mw4gNxU/QzXiXOogxq60NItugc1dhX2E93cahGKiK3NF2IAw/jNMiamOTyaIRTuxIllHvQ0C3C72Wz5gQ=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234)
 smtp.mailfrom=arm.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 40.67.248.234 as permitted sender) receiver=protection.outlook.com;
 client-ip=40.67.248.234; helo=nebula.arm.com;
From: Penny Zheng <Penny.Zheng@arm.com>
To: <xen-devel@lists.xenproject.org>
CC: <nd@arm.com>, Penny Zheng <penzhe01@a011292.shanghai.arm.com>, "Stefano
 Stabellini" <sstabellini@kernel.org>, Julien Grall <julien@xen.org>,
	"Bertrand Marquis" <bertrand.marquis@arm.com>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>, Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>, Penny Zheng <penny.zheng@arm.com>
Subject: [PATCH v1 02/13] xen/arm: introduce a special domain DOMID_SHARED
Date: Fri, 11 Mar 2022 14:11:12 +0800
Message-ID: <20220311061123.1883189-3-Penny.Zheng@arm.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <20220311061123.1883189-1-Penny.Zheng@arm.com>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain
X-EOPAttributedMessage: 1
X-MS-Office365-Filtering-Correlation-Id: 513da211-a7df-49b6-41bf-08da032620b1
X-MS-TrafficTypeDiagnostic:
	AM6PR08MB4133:EE_|DB5EUR03FT047:EE_|DU2PR08MB7270:EE_
X-Microsoft-Antispam-PRVS:
	<DU2PR08MB727042E4FF24D05CF8713E4DF70C9@DU2PR08MB7270.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
NoDisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(54906003)(1076003)(2906002)(36756003)(8936002)(316002)(6916009)(186003)(83380400001)(2616005)(86362001)(26005)(81166007)(36860700001)(356005)(70206006)(70586007)(7696005)(4326008)(8676002)(47076005)(336012)(508600001)(426003)(40460700003)(82310400004)(5660300002)(36900700001);DIR:OUT;SFP:1101;
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4133
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT047.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	92d2a486-5316-4327-fd24-08da032618af
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	laOn+NenWd6aZySIAVlfu2OLrjgF574+x3sceZzFKlProsyp1sCzFX4AdcUMGUQh7TkO63Wh2P2F3OF1bXItM0PSKei486Sxs+bhX7sj2+F3tgndTiu5dBbwh5Zj6RxWETj+EJg1gpFqM7NZuLmLvBVzi0D0/kFmH1LfeZvPVCS96oTVBXZ/Exz3fRnck4/JYVGdSomYtI3yzfw1rI3E3ijIR0OxWmZgLsXEQy7nGSdcLLCWFgGaC/NRaAaspSSNAM8PFszpr6BSazo79oBTt0tfaeHfb4OnTThUF8u5M2X6eD+F7PZTMjcKvRu2FaUCY25Jtd4GFmSDuMqyQfJpiNewYO2rmq9ZM0PIn4miLm8Qm99kBCIHlLZQvEiFK4lJ3BmCEn3AGQq8Rj2N8t1njE+Zbe9kNnW5OhZcm7aXn610s4lrFk8QYD3deFXVwy1X8Y543QvBlx3oXbf7CL+pTPoKV8ew/nMWIXdVP0MpIU5tQLvvsLIuohN5WVw5HM7zciSrUwAesH3zfMHt8j0khC25KCwBBReA+CQGf8MPzdWWIsnpUz8TXuuOR+SS+EeRDgLQPoSS84WYK/IZKhnpNgKcA69sdN9RpfOTLpWY8t9iGFkbZVePf8yNrT5tUx+fCsq6XGgx/NrxAsqH0EIRAjGG+d+eeXb1hvwmKz0KJjtK2g4p10jiHoprkz4E2DBp
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(40460700003)(6916009)(70206006)(70586007)(8936002)(5660300002)(86362001)(2906002)(8676002)(316002)(82310400004)(4326008)(47076005)(81166007)(54906003)(36756003)(7696005)(83380400001)(426003)(1076003)(186003)(336012)(26005)(508600001)(36860700001)(2616005);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 06:12:31.8474
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 513da211-a7df-49b6-41bf-08da032620b1
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT047.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DU2PR08MB7270

From: Penny Zheng <penzhe01@a011292.shanghai.arm.com>

In case to own statically shared pages when owner domain is not
explicitly defined, this commits propose a special domain DOMID_SHARED,
and we assign it 0x7FF5, as one of the system domains.

Statically shared memory reuses the same way of initialization with static
memory, hence this commits proposes a new Kconfig CONFIG_STATIC_SHM to wrap
related codes, and this option depends on static memory(CONFIG_STATIC_MEMORY).

We intends to do shared domain creation after setup_virt_paging so shared
domain could successfully do p2m initialization.

Signed-off-by: Penny Zheng <penny.zheng@arm.com>
---
 xen/arch/arm/Kconfig              |  7 +++++++
 xen/arch/arm/domain.c             | 12 ++++++++++--
 xen/arch/arm/include/asm/domain.h |  6 ++++++
 xen/arch/arm/setup.c              | 22 ++++++++++++++++++++++
 xen/common/domain.c               | 11 +++++++----
 xen/common/page_alloc.c           |  5 +++++
 xen/common/vsprintf.c             |  9 +++++----
 xen/include/public/xen.h          |  6 ++++++
 xen/include/xen/sched.h           |  2 ++
 9 files changed, 70 insertions(+), 10 deletions(-)

diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig
index ecfa6822e4..c54accefb1 100644
--- a/xen/arch/arm/Kconfig
+++ b/xen/arch/arm/Kconfig
@@ -106,6 +106,13 @@ config TEE
 
 source "arch/arm/tee/Kconfig"
 
+config STATIC_SHM
+       bool "Statically shared memory on a dom0less system" if UNSUPPORTED
+       depends on STATIC_MEMORY
+       default n
+       help
+         This option enables statically shared memory on a dom0less system.
+
 endmenu
 
 menu "ARM errata workaround via the alternative framework"
diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
index 8110c1df86..1ff1df5d3f 100644
--- a/xen/arch/arm/domain.c
+++ b/xen/arch/arm/domain.c
@@ -44,6 +44,10 @@
 
 DEFINE_PER_CPU(struct vcpu *, curr_vcpu);
 
+#ifdef CONFIG_STATIC_SHM
+struct domain *__read_mostly dom_shared;
+#endif
+
 static void do_idle(void)
 {
     unsigned int cpu = smp_processor_id();
@@ -703,7 +707,7 @@ int arch_domain_create(struct domain *d,
     if ( is_idle_domain(d) )
         return 0;
 
-    ASSERT(config != NULL);
+    ASSERT(is_shared_domain(d) ? config == NULL : config != NULL);
 
 #ifdef CONFIG_IOREQ_SERVER
     ioreq_domain_init(d);
@@ -712,12 +716,16 @@ int arch_domain_create(struct domain *d,
     d->arch.directmap = flags & CDF_directmap;
 
     /* p2m_init relies on some value initialized by the IOMMU subsystem */
-    if ( (rc = iommu_domain_init(d, config->iommu_opts)) != 0 )
+    if ( (rc = iommu_domain_init(d, is_shared_domain(d) ? 0 : config->iommu_opts)) != 0 )
         goto fail;
 
     if ( (rc = p2m_init(d)) != 0 )
         goto fail;
 
+    /* DOMID_shared is sufficiently constructed after p2m initialization. */
+    if ( is_shared_domain(d) )
+        return 0;
+
     rc = -ENOMEM;
     if ( (d->shared_info = alloc_xenheap_pages(0, 0)) == NULL )
         goto fail;
diff --git a/xen/arch/arm/include/asm/domain.h b/xen/arch/arm/include/asm/domain.h
index c56f6e4398..ea7a7219a3 100644
--- a/xen/arch/arm/include/asm/domain.h
+++ b/xen/arch/arm/include/asm/domain.h
@@ -31,6 +31,12 @@ enum domain_type {
 
 #define is_domain_direct_mapped(d) (d)->arch.directmap
 
+#ifdef CONFIG_STATIC_SHM
+extern struct domain *dom_shared;
+#else
+#define dom_shared NULL
+#endif
+
 /*
  * Is the domain using the host memory layout?
  *
diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c
index d5d0792ed4..f6a3b04958 100644
--- a/xen/arch/arm/setup.c
+++ b/xen/arch/arm/setup.c
@@ -855,6 +855,20 @@ static bool __init is_dom0less_mode(void)
     return ( !dom0found && domUfound );
 }
 
+#ifdef CONFIG_STATIC_SHM
+static void __init setup_shared_domain(void)
+{
+    /*
+     * Initialise our DOMID_SHARED domain.
+     * This domain owns statically shared pages when owner domain is not
+     * explicitly defined.
+     */
+    dom_shared = domain_create(DOMID_SHARED, NULL, CDF_directmap);
+    if ( IS_ERR(dom_shared) )
+        panic("Failed to create d[SHARED]: %ld\n", PTR_ERR(dom_shared));
+}
+#endif
+
 size_t __read_mostly dcache_line_bytes;
 
 /* C entry point for boot CPU */
@@ -1022,6 +1036,14 @@ void __init start_xen(unsigned long boot_phys_offset,
     apply_alternatives_all();
     enable_errata_workarounds();
 
+#ifdef CONFIG_STATIC_SHM
+    /*
+     * This needs to be called **after** setup_virt_paging so shared
+     * domains could successfully do p2m initialization.
+     */
+    setup_shared_domain();
+#endif
+
     /* Create initial domain 0. */
     if ( !is_dom0less_mode() )
         create_dom0();
diff --git a/xen/common/domain.c b/xen/common/domain.c
index 3742322d22..5cdd0b9f5b 100644
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -643,11 +643,14 @@ struct domain *domain_create(domid_t domid,
 
     rangeset_domain_initialise(d);
 
-    /* DOMID_{XEN,IO,etc} (other than IDLE) are sufficiently constructed. */
-    if ( is_system_domain(d) && !is_idle_domain(d) )
+    /*
+     * DOMID_{XEN,IO,etc} (other than IDLE and DOMID_shared) are
+     * sufficiently constructed.
+     */
+    if ( is_system_domain(d) && !is_idle_domain(d) && !is_shared_domain(d) )
         return d;
 
-    if ( !is_idle_domain(d) )
+    if ( !is_idle_domain(d) && !is_shared_domain(d) )
     {
         if ( !is_hardware_domain(d) )
             d->nr_pirqs = nr_static_irqs + extra_domU_irqs;
@@ -663,7 +666,7 @@ struct domain *domain_create(domid_t domid,
         goto fail;
     init_status |= INIT_arch;
 
-    if ( !is_idle_domain(d) )
+    if ( !is_idle_domain(d) && !is_shared_domain(d) )
     {
         watchdog_domain_init(d);
         init_status |= INIT_watchdog;
diff --git a/xen/common/page_alloc.c b/xen/common/page_alloc.c
index f8749b0787..e5e357969d 100644
--- a/xen/common/page_alloc.c
+++ b/xen/common/page_alloc.c
@@ -2616,6 +2616,11 @@ struct domain *get_pg_owner(domid_t domid)
 
     switch ( domid )
     {
+#ifdef CONFIG_STATIC_SHM
+    case DOMID_SHARED:
+        pg_owner = rcu_lock_domain(dom_shared);
+        break;
+#endif
     case DOMID_IO:
         pg_owner = rcu_lock_domain(dom_io);
         break;
diff --git a/xen/common/vsprintf.c b/xen/common/vsprintf.c
index b278961cc3..a22854001b 100644
--- a/xen/common/vsprintf.c
+++ b/xen/common/vsprintf.c
@@ -359,10 +359,11 @@ static char *print_domain(char *str, const char *end, const struct domain *d)
 
     switch ( d->domain_id )
     {
-    case DOMID_IO:   name = "[IO]";   break;
-    case DOMID_XEN:  name = "[XEN]";  break;
-    case DOMID_COW:  name = "[COW]";  break;
-    case DOMID_IDLE: name = "[IDLE]"; break;
+    case DOMID_IO:     name = "[IO]";     break;
+    case DOMID_XEN:    name = "[XEN]";    break;
+    case DOMID_COW:    name = "[COW]";    break;
+    case DOMID_IDLE:   name = "[IDLE]";   break;
+    case DOMID_SHARED: name = "[SHARED]"; break;
         /*
          * In principle, we could ASSERT_UNREACHABLE() in the default case.
          * However, this path is used to print out crash information, which
diff --git a/xen/include/public/xen.h b/xen/include/public/xen.h
index e373592c33..2e00741f09 100644
--- a/xen/include/public/xen.h
+++ b/xen/include/public/xen.h
@@ -612,6 +612,12 @@ DEFINE_XEN_GUEST_HANDLE(mmuext_op_t);
 /* DOMID_INVALID is used to identify pages with unknown owner. */
 #define DOMID_INVALID        xen_mk_uint(0x7FF4)
 
+/*
+ * DOMID_SHARED is used as the owner of statically shared pages, when
+ * owner is not explicitly defined.
+ */
+#define DOMID_SHARED         xen_mk_uint(0x7FF5)
+
 /* Idle domain. */
 #define DOMID_IDLE           xen_mk_uint(0x7FFF)
 
diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
index 24a9a87f83..2fb236f4ea 100644
--- a/xen/include/xen/sched.h
+++ b/xen/include/xen/sched.h
@@ -618,6 +618,8 @@ static inline bool is_system_domain(const struct domain *d)
     return d->domain_id >= DOMID_FIRST_RESERVED;
 }
 
+#define is_shared_domain(d) ((d)->domain_id == DOMID_SHARED)
+
 #define DOMAIN_DESTROYED (1u << 31) /* assumes atomic_t is >= 32 bits */
 #define put_domain(_d) \
   if ( atomic_dec_and_test(&(_d)->refcnt) ) domain_destroy(_d)
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 06:12:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 06:12:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288713.489707 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYW2-00013i-6p; Fri, 11 Mar 2022 06:12:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288713.489707; Fri, 11 Mar 2022 06:12:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYW2-00013Z-16; Fri, 11 Mar 2022 06:12:42 +0000
Received: by outflank-mailman (input) for mailman id 288713;
 Fri, 11 Mar 2022 06:12:40 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=p7td=TW=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nSYVz-0000Fh-Tx
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 06:12:40 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04on061a.outbound.protection.outlook.com
 [2a01:111:f400:fe0e::61a])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4086729b-a102-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 07:12:39 +0100 (CET)
Received: from DB6PR07CA0075.eurprd07.prod.outlook.com (2603:10a6:6:2b::13) by
 DBBPR08MB4725.eurprd08.prod.outlook.com (2603:10a6:10:f5::10) with
 Microsoft
 SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22; Fri, 11 Mar 2022 06:12:37 +0000
Received: from DB5EUR03FT035.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:6:2b:cafe::d4) by DB6PR07CA0075.outlook.office365.com
 (2603:10a6:6:2b::13) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.9 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:37 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT035.mail.protection.outlook.com (10.152.20.65) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:12:36 +0000
Received: ("Tessian outbound 1f399c739551:v113");
 Fri, 11 Mar 2022 06:12:36 +0000
Received: from 901fda6444bd.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 B0B78372-B243-4C01-BB65-1CF05B3ED5F1.1; 
 Fri, 11 Mar 2022 06:12:30 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 901fda6444bd.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 11 Mar 2022 06:12:30 +0000
Received: from AM6P194CA0023.EURP194.PROD.OUTLOOK.COM (2603:10a6:209:90::36)
 by DB6PR0801MB1990.eurprd08.prod.outlook.com (2603:10a6:4:6c::21) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.17; Fri, 11 Mar
 2022 06:12:28 +0000
Received: from AM5EUR03FT051.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:90:cafe::9c) by AM6P194CA0023.outlook.office365.com
 (2603:10a6:209:90::36) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.23 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:28 +0000
Received: from nebula.arm.com (40.67.248.234) by
 AM5EUR03FT051.mail.protection.outlook.com (10.152.16.246) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:12:28 +0000
Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX04.Arm.com
 (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27; Fri, 11 Mar
 2022 06:12:27 +0000
Received: from a011292.shanghai.arm.com (10.169.190.94) by mail.arm.com
 (10.251.24.32) with Microsoft SMTP Server id 15.1.2308.27 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4086729b-a102-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=M1TXqrctcdUtGEYuF9ixd4KtwFZVaadgy8ENe9JSK4o=;
 b=7LtzVGt6Mv6MBe5WM7Vr44ZZexiXvpI5zua5vzRckIU96fil+oKTsxznRp85A9qmw15tpUeUJqn56ZlHzWfvtdl94wz05TiR++qd61/Rh+QIUbn3111719TjHBrTj7bWuEcpU8FgtY/WxxuK/UtptXIEegz60skzJYOvFg3faWQ=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: a242202be340aa9d
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=NcBL3IvWw1tRx2VjBREMxVo7+VsJ4jt+rZjRD4XhkEXjdx1HEB35TAszNwbZX5/S8wKhm0SWRdgV6yi4d2kW45l9PotuMpqipoLAvjUCYt4lFB3AVzgFqmlg+QhfDm93weRAW4eR2RDNXmLCa3SZlLhVR2EuuQXpIOE8YNpjS2R+U0s2d8YiSl54fuByeShdEfSspOKELppQyNvVQeWt8mDsOYpCFl3T1Rz/JTGLEVaZs599UrCrBKbiXEADcxE7v5wZr6Y6D7kVx+WHFuH8dMRs3BAtLP42xWQ9UiAcHtWkm1v2F6v0/Es0J9IJyJdq1B06RcJevVJE2vOysl9UTA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=M1TXqrctcdUtGEYuF9ixd4KtwFZVaadgy8ENe9JSK4o=;
 b=BiOurEmGP0PA/pzA9GhezVuc+DM8ZTDdwbBDNS+lFp3yKj+6jafA6QuxrMj0yseOukyydi6tj/GCRNsxix8xWlG94hoqY9Ait493RZySDVYyllo+RmbMt6Wbkw15+DJwE7VgJOlxutr6MFjHHvh1KpK05ZSe6VwLGCO5JYd+YEioZ08+kpqwk++/ej5ZazNeG/FVyicabJ1z6WJNjppmutCNIAWiiEEmfeGuBBF0BRS5Y4g6sDqoazQojTPX4QCPLa9hp5NNgflkKWhYbtrVmUTOsJnkt3gcHOiN6Jkl7N9z7/sS2Wx89YDo0qkRQOkDMwhNvdNmqkZWA2fTUZZnuw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 40.67.248.234) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=M1TXqrctcdUtGEYuF9ixd4KtwFZVaadgy8ENe9JSK4o=;
 b=7LtzVGt6Mv6MBe5WM7Vr44ZZexiXvpI5zua5vzRckIU96fil+oKTsxznRp85A9qmw15tpUeUJqn56ZlHzWfvtdl94wz05TiR++qd61/Rh+QIUbn3111719TjHBrTj7bWuEcpU8FgtY/WxxuK/UtptXIEegz60skzJYOvFg3faWQ=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234)
 smtp.mailfrom=arm.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 40.67.248.234 as permitted sender) receiver=protection.outlook.com;
 client-ip=40.67.248.234; helo=nebula.arm.com;
From: Penny Zheng <Penny.Zheng@arm.com>
To: <xen-devel@lists.xenproject.org>
CC: <nd@arm.com>, Penny Zheng <penny.zheng@arm.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Julien Grall <julien@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH v1 06/13] xen/arm: set up shared memory foreign mapping for borrower domain
Date: Fri, 11 Mar 2022 14:11:16 +0800
Message-ID: <20220311061123.1883189-7-Penny.Zheng@arm.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <20220311061123.1883189-1-Penny.Zheng@arm.com>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain
X-EOPAttributedMessage: 1
X-MS-Office365-Filtering-Correlation-Id: 04f4c9b9-4c8b-4eaf-987c-08da032623b7
X-MS-TrafficTypeDiagnostic:
	DB6PR0801MB1990:EE_|DB5EUR03FT035:EE_|DBBPR08MB4725:EE_
X-Microsoft-Antispam-PRVS:
	<DBBPR08MB4725DBDDE7DFDFA64BBDFE60F70C9@DBBPR08MB4725.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
NoDisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(316002)(4326008)(82310400004)(8676002)(70586007)(70206006)(5660300002)(36860700001)(2616005)(1076003)(86362001)(336012)(83380400001)(40460700003)(26005)(186003)(426003)(6916009)(54906003)(8936002)(6666004)(7696005)(81166007)(508600001)(356005)(36756003)(2906002)(47076005)(36900700001);DIR:OUT;SFP:1101;
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0801MB1990
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT035.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	31699b1f-39aa-49cd-d14d-08da03261eaa
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(8676002)(47076005)(70586007)(4326008)(70206006)(36860700001)(186003)(2616005)(26005)(107886003)(426003)(336012)(1076003)(83380400001)(81166007)(40460700003)(8936002)(5660300002)(6666004)(508600001)(7696005)(36756003)(82310400004)(316002)(6916009)(86362001)(2906002)(54906003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 06:12:36.9065
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 04f4c9b9-4c8b-4eaf-987c-08da032623b7
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT035.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB4725

From: Penny Zheng <penny.zheng@arm.com>

This commits introduces a new helper guest_physmap_add_shm to set up shared
memory foreign mapping for borrower domain.

Firstly it should get and take reference of statically shared pages from
owner dom_shared. Then it will setup P2M foreign memory map of these statically
shared pages for borrower domain.

This commits only considers owner domain is the default dom_shared, the
other scenario will be covered in the following patches.

Signed-off-by: Penny Zheng <penny.zheng@arm.com>
---
 xen/arch/arm/domain_build.c | 52 +++++++++++++++++++++++++++++++++++++
 1 file changed, 52 insertions(+)

diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index 984e70e5fc..8cee5ffbd1 100644
--- a/xen/arch/arm/domain_build.c
+++ b/xen/arch/arm/domain_build.c
@@ -798,6 +798,48 @@ static int __init allocate_shared_memory(struct domain *d,
     return ret;
 }
 
+static int __init guest_physmap_add_shm(struct domain *od, struct domain *bd,
+                                        unsigned long o_gfn,
+                                        unsigned long b_gfn,
+                                        unsigned long nr_gfns)
+{
+    struct page_info **pages = NULL;
+    p2m_type_t p2mt, t;
+    int ret = 0;
+
+    pages = xmalloc_array(struct page_info *, nr_gfns);
+    if ( !pages )
+        return -ENOMEM;
+
+    /*
+     * Take reference of statically shared pages from owner domain.
+     * Reference will be released when destroying shared memory region.
+     */
+    ret = get_pages_from_gfn(od, o_gfn, nr_gfns, pages, &p2mt, P2M_ALLOC);
+    if ( ret )
+    {
+        ret = -EINVAL;
+        goto fail_pages;
+    }
+
+    if ( p2m_is_ram(p2mt) )
+        t = (p2mt == p2m_ram_rw) ? p2m_map_foreign_rw : p2m_map_foreign_ro;
+    else
+    {
+        ret = -EINVAL;
+        goto fail_pages;
+    }
+
+    /* Set up guest foreign map. */
+    ret = guest_physmap_add_pages(bd, _gfn(b_gfn), page_to_mfn(pages[0]),
+                                  nr_gfns, t);
+
+ fail_pages:
+        xfree(pages);
+
+    return ret;
+}
+
 static int __init process_shm(struct domain *d,
                               const struct dt_device_node *node)
 {
@@ -855,6 +897,16 @@ static int __init process_shm(struct domain *d,
 
             set_bit(shm_id, shm_mask);
         }
+
+        /*
+         * All domains are borrower domains when owner domain is the
+         * default dom_shared, so here we could just set up P2M foreign
+         * mapping for borrower domain immediately.
+         */
+        ret = guest_physmap_add_shm(dom_shared, d, PFN_DOWN(pbase),
+                                    PFN_DOWN(gbase), PFN_DOWN(psize));
+        if ( ret )
+            return ret;
     }
 
     return 0;
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 06:12:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 06:12:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288709.489663 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYVq-0008QM-HT; Fri, 11 Mar 2022 06:12:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288709.489663; Fri, 11 Mar 2022 06:12:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYVq-0008QF-DX; Fri, 11 Mar 2022 06:12:30 +0000
Received: by outflank-mailman (input) for mailman id 288709;
 Fri, 11 Mar 2022 06:12:29 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=p7td=TW=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nSYVp-0008Q3-0T
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 06:12:29 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04on0608.outbound.protection.outlook.com
 [2a01:111:f400:fe0d::608])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 386adf47-a102-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 07:12:25 +0100 (CET)
Received: from AS8PR04CA0197.eurprd04.prod.outlook.com (2603:10a6:20b:2f3::22)
 by VI1PR0801MB1805.eurprd08.prod.outlook.com (2603:10a6:800:58::22)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar
 2022 06:12:22 +0000
Received: from AM5EUR03FT045.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:2f3:cafe::f5) by AS8PR04CA0197.outlook.office365.com
 (2603:10a6:20b:2f3::22) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:22 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT045.mail.protection.outlook.com (10.152.17.105) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:12:21 +0000
Received: ("Tessian outbound 18e50a6f0513:v113");
 Fri, 11 Mar 2022 06:12:21 +0000
Received: from e89924f2a56e.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 F0B1AE4F-380E-430B-B3BD-EFD62DB2D3E7.1; 
 Fri, 11 Mar 2022 06:12:14 +0000
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id e89924f2a56e.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 11 Mar 2022 06:12:14 +0000
Received: from AS8PR04CA0206.eurprd04.prod.outlook.com (2603:10a6:20b:2f3::31)
 by AM0PR08MB3586.eurprd08.prod.outlook.com (2603:10a6:208:e1::27)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar
 2022 06:12:11 +0000
Received: from AM5EUR03FT045.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:2f3:cafe::6e) by AS8PR04CA0206.outlook.office365.com
 (2603:10a6:20b:2f3::31) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:11 +0000
Received: from nebula.arm.com (40.67.248.234) by
 AM5EUR03FT045.mail.protection.outlook.com (10.152.17.105) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:12:11 +0000
Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX04.Arm.com
 (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27; Fri, 11 Mar
 2022 06:12:09 +0000
Received: from a011292.shanghai.arm.com (10.169.190.94) by mail.arm.com
 (10.251.24.32) with Microsoft SMTP Server id 15.1.2308.27 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:06 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 386adf47-a102-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=wYrJwC7mNWpHkKnyQLyh0ZZfxbUzI1fqragYXrD7bOc=;
 b=kyXSoQcvUOJgTmR52Oq3+P/jDYlSuRH2/ea3ixGI8wqfFYHzr/5FaxDV2yy6+4DPdiUzR8l9tQLY+xJFTpgH0yI69UDLyHN/1diWCXjcJUGVoRsSCwceC7r/VbaA2U9duRcc5C0M4gwdh/PPtzYOpw2hUsCdUE9iJlreygLfHHc=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 38cf4bca022dc8fd
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=davKaJ5dn+BBwP/ZUMmxRAgGt6p01FLVTo/byok1d9ep4bHkJ/YFZuDYgEgz+Q+B3LpniU8ZpltaCIYBsn1AN7ymwOcw5yDTYW+3eZuxvgPKqnqK/q/MG/QjSJcT4ZznB3bUJwvQ+fAioDf3348P/ZaEOAxXssLOl2A6gRe6W7YyKXR7Cci0lVIGOmiPd+7lUnK9l1fa3Hvoi8EU6I82IbXHb3nqTU4GouJT4uhIxfSo4uJQiP5cD+Pl+pKeRkceu/VKQguvMeeofLC3Ad5+5H/klxr0YqjLPT5sKndsAYnJWQGG3s5PgYVW7Eeh3rVuBsuP4HKn6aqZX0W4dSlOWA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=wYrJwC7mNWpHkKnyQLyh0ZZfxbUzI1fqragYXrD7bOc=;
 b=VFCoGx/RYMAGLxkIfkc4euT28HZppzOkw8G+3hjc8DERMYZsfpS7buRKT1F3oTdR2z0CdYxKa8Qyn6DvLa+9oAkKhPJuWSp+FnwGH+J1XTvzGPkF1dgC4iuOG0oWNcgbiLwQ1zd8Vw6uGo/CcYvlKkePZe2wfpo+UBSNtOdKUW0OXGVENJQ70f3e26lPGggNAfxoGnVw4tYF5fonqFHmC1DkfxSo6LvYVYxncPJzTTpi6WpMofs/RZJhZK9vNEoPm7kLNJhUBc2/j68WbIbOp4b3kzeJcpVtpj0Pii/ZBvLEXEBvtmIdIeqWeAIHmaQYkbDA0w7S0OuryGqnONY5pA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 40.67.248.234) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=wYrJwC7mNWpHkKnyQLyh0ZZfxbUzI1fqragYXrD7bOc=;
 b=kyXSoQcvUOJgTmR52Oq3+P/jDYlSuRH2/ea3ixGI8wqfFYHzr/5FaxDV2yy6+4DPdiUzR8l9tQLY+xJFTpgH0yI69UDLyHN/1diWCXjcJUGVoRsSCwceC7r/VbaA2U9duRcc5C0M4gwdh/PPtzYOpw2hUsCdUE9iJlreygLfHHc=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234)
 smtp.mailfrom=arm.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 40.67.248.234 as permitted sender) receiver=protection.outlook.com;
 client-ip=40.67.248.234; helo=nebula.arm.com;
From: Penny Zheng <Penny.Zheng@arm.com>
To: <xen-devel@lists.xenproject.org>
CC: <nd@arm.com>, Penny Zheng <Penny.Zheng@arm.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Julien Grall <julien@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Wei Liu
	<wl@xen.org>
Subject: [PATCH v1 00/13] Static shared memory on dom0less system 
Date: Fri, 11 Mar 2022 14:11:10 +0800
Message-ID: <20220311061123.1883189-1-Penny.Zheng@arm.com>
X-Mailer: git-send-email 2.25.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain
X-EOPAttributedMessage: 1
X-MS-Office365-Filtering-Correlation-Id: d97a0d10-13b1-4643-6ef0-08da03261aae
X-MS-TrafficTypeDiagnostic:
	AM0PR08MB3586:EE_|AM5EUR03FT045:EE_|VI1PR0801MB1805:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR0801MB1805BF9F82FE7EFA83C41707F70C9@VI1PR0801MB1805.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
NoDisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(86362001)(2906002)(5660300002)(8676002)(508600001)(70206006)(4326008)(8936002)(70586007)(83380400001)(1076003)(2616005)(356005)(336012)(316002)(26005)(186003)(6916009)(426003)(4743002)(7696005)(6666004)(54906003)(47076005)(82310400004)(36756003)(36860700001)(966005)(81166007)(40460700003)(32563001)(36900700001);DIR:OUT;SFP:1101;
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB3586
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT045.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	6eb525be-5304-4fab-5691-08da03261472
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(36756003)(2906002)(5660300002)(40460700003)(8936002)(70206006)(70586007)(54906003)(6916009)(316002)(86362001)(966005)(508600001)(4743002)(2616005)(426003)(336012)(186003)(1076003)(6666004)(7696005)(26005)(81166007)(47076005)(4326008)(8676002)(36860700001)(82310400004)(83380400001)(32563001);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 06:12:21.7092
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: d97a0d10-13b1-4643-6ef0-08da03261aae
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT045.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB1805

The static shared memory device tree nodes allow users to statically set up
shared memory on dom0less system, enabling domains to do shm-based
communication.

The new feature is driven by the need of finding a way to build up
communication channels on dom0less system, since the legacy ways including
grant table, etc are all absent there.

It was inspired by the patch serie of ["xl/libxl-based shared mem](
https://marc.info/?l=xen-devel&m=154404821731186ory").

Looking into related [design link](
https://lore.kernel.org/all/a50d9fde-1d06-7cda-2779-9eea9e1c0134@xen.org/T/)
for more details.

Penny Zheng (13):
  xen/arm: introduce static shared memory
  xen/arm: introduce a special domain DOMID_SHARED
  xen/arm: allocate static shared memory to dom_shared
  xen/arm: add P2M type parameter in guest_physmap_add_pages
  xen/arm: introduce get_pages_from_gfn
  xen/arm: set up shared memory foreign mapping for borrower domain
  xen/arm: create shared memory nodes in guest device tree
  xen/arm: destroy static shared memory when de-construct domain
  xen/arm: enable statically shared memory on Dom0
  xen/arm: allocate static shared memory to a specific owner domain
  xen/arm: store shm-info for deferred foreign memory map
  xen/arm: defer foreign memory map in shm_init_late
  xen/arm: unmap foreign memory mapping when destroyed domain is owner
    domain

 docs/misc/arm/device-tree/booting.txt | 118 +++++++
 xen/arch/arm/Kconfig                  |   7 +
 xen/arch/arm/bootfdt.c                |  52 +++
 xen/arch/arm/domain.c                 | 117 ++++++-
 xen/arch/arm/domain_build.c           | 445 +++++++++++++++++++++++++-
 xen/arch/arm/include/asm/domain.h     |  33 ++
 xen/arch/arm/include/asm/p2m.h        |  42 ++-
 xen/arch/arm/include/asm/setup.h      |   3 +
 xen/arch/arm/setup.c                  |  28 ++
 xen/common/domain.c                   |  11 +-
 xen/common/page_alloc.c               |   5 +
 xen/common/vsprintf.c                 |   9 +-
 xen/include/public/xen.h              |   6 +
 xen/include/xen/sched.h               |   2 +
 14 files changed, 864 insertions(+), 14 deletions(-)

-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 06:12:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 06:12:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288712.489691 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYW0-0000fU-QL; Fri, 11 Mar 2022 06:12:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288712.489691; Fri, 11 Mar 2022 06:12:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYW0-0000ek-Lp; Fri, 11 Mar 2022 06:12:40 +0000
Received: by outflank-mailman (input) for mailman id 288712;
 Fri, 11 Mar 2022 06:12:39 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=p7td=TW=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nSYVz-0008Q3-48
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 06:12:39 +0000
Received: from EUR03-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur03on0626.outbound.protection.outlook.com
 [2a01:111:f400:fe09::626])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 401d07cd-a102-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 07:12:38 +0100 (CET)
Received: from DB9PR06CA0007.eurprd06.prod.outlook.com (2603:10a6:10:1db::12)
 by PR2PR08MB4763.eurprd08.prod.outlook.com (2603:10a6:101:20::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Fri, 11 Mar
 2022 06:12:35 +0000
Received: from DB5EUR03FT050.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:1db:cafe::3d) by DB9PR06CA0007.outlook.office365.com
 (2603:10a6:10:1db::12) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.23 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:35 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT050.mail.protection.outlook.com (10.152.21.128) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:12:35 +0000
Received: ("Tessian outbound 826a6d8e58c3:v113");
 Fri, 11 Mar 2022 06:12:35 +0000
Received: from ee42f0a71c79.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 52173E03-777A-4219-8A16-B8A7E30F730C.1; 
 Fri, 11 Mar 2022 06:12:29 +0000
Received: from EUR03-VE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id ee42f0a71c79.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 11 Mar 2022 06:12:29 +0000
Received: from AM6P193CA0100.EURP193.PROD.OUTLOOK.COM (2603:10a6:209:88::41)
 by AM6PR08MB4785.eurprd08.prod.outlook.com (2603:10a6:20b:d2::19) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.29; Fri, 11 Mar
 2022 06:12:27 +0000
Received: from AM5EUR03FT021.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:88:cafe::34) by AM6P193CA0100.outlook.office365.com
 (2603:10a6:209:88::41) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.20 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:27 +0000
Received: from nebula.arm.com (40.67.248.234) by
 AM5EUR03FT021.mail.protection.outlook.com (10.152.16.105) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:12:27 +0000
Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX04.Arm.com
 (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27; Fri, 11 Mar
 2022 06:12:24 +0000
Received: from a011292.shanghai.arm.com (10.169.190.94) by mail.arm.com
 (10.251.24.32) with Microsoft SMTP Server id 15.1.2308.27 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 401d07cd-a102-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=2tUy/0RXwgpLcKCk4dgzOJCVdOMJ/pIH58P1Z/r+6Ms=;
 b=8AAxO/XQZbs9mKqqiBvUKePnRIfdB97MlrofFNBffhBA419DgSdnSlErgygiJxfJO7FY7eTe/M0okFsyvZ0aUnJp5Ub7aFYummkfyhqdaGleklTBixAoCFYKwi80fOYWFbpbt8kA+7YLVehfRYSokcfrsEp9dHUAAsh79tXwINE=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 2fe5afede2149a2a
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=nz2IqV+9TTz6sdPjRlH6hcPMppdkxe4txsu3HLjSwiekouz6gLpEj7GXg46Ym04eq7myHhRRIsBbAeiFqd6aIfNXOFRulb/KlKiyI6YB20kScu6ZxuqE9Q+jgAJz8b8wyCM/i5MovcbnOTog8L+P1ox1dNNSfdp0aIS9PEwWbhEysRufraSGZQpnOv5Q0LOgA+WQEV2Zko077JEjjXUO2dAfbWdNjhPwMKgk417O/Nogn5f1JzsU/XQCd/G00UfIkaDVtJZAMiMaxLrkWZ36h3ckT+WzU6rXckGyd8rY+osF7RUMvyrmYI6i0WISujIhPQcG7vp57hABTfJDXDoxNQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=2tUy/0RXwgpLcKCk4dgzOJCVdOMJ/pIH58P1Z/r+6Ms=;
 b=m/k3EKXbeVect56qh7hRMes04UP22AwB/5bsntYqaFi+jkxxNdh9zYBVHWLg9t6R80nFi2AIK3WdvRn5fwu9TQn4OCVNIH1iAw6d1K1dv3bXDwr/GRLoOsj+6SZrV+0hsKcuSGQXvAMCG91dvoT7e88qLzX7XHx7puMpN+cw5XPUsMO6FeIu0racbAC2rlBjAe1SSPgwoNEHTN46g24vDY21kCmqbdBYH7cPY9QmlwA5aaAfB2KabJPUdRint8w18UUa/8ebuFBbvYGZaKCqe3bFVYDXrEk7xfKC8HA8SdkmaaO9Qbyla6Adsm1N4+6LgYCHR4w8/+VIGfeIBIMGcg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 40.67.248.234) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=2tUy/0RXwgpLcKCk4dgzOJCVdOMJ/pIH58P1Z/r+6Ms=;
 b=8AAxO/XQZbs9mKqqiBvUKePnRIfdB97MlrofFNBffhBA419DgSdnSlErgygiJxfJO7FY7eTe/M0okFsyvZ0aUnJp5Ub7aFYummkfyhqdaGleklTBixAoCFYKwi80fOYWFbpbt8kA+7YLVehfRYSokcfrsEp9dHUAAsh79tXwINE=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234)
 smtp.mailfrom=arm.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 40.67.248.234 as permitted sender) receiver=protection.outlook.com;
 client-ip=40.67.248.234; helo=nebula.arm.com;
From: Penny Zheng <Penny.Zheng@arm.com>
To: <xen-devel@lists.xenproject.org>
CC: <nd@arm.com>, Penny Zheng <penny.zheng@arm.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Julien Grall <julien@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH v1 05/13] xen/arm: introduce get_pages_from_gfn
Date: Fri, 11 Mar 2022 14:11:15 +0800
Message-ID: <20220311061123.1883189-6-Penny.Zheng@arm.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <20220311061123.1883189-1-Penny.Zheng@arm.com>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain
X-EOPAttributedMessage: 1
X-MS-Office365-Filtering-Correlation-Id: d51735c1-b30d-4373-cc63-08da032622e3
X-MS-TrafficTypeDiagnostic:
	AM6PR08MB4785:EE_|DB5EUR03FT050:EE_|PR2PR08MB4763:EE_
X-Microsoft-Antispam-PRVS:
	<PR2PR08MB4763C7AE1373A27C64C8C61DF70C9@PR2PR08MB4763.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
NoDisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(508600001)(356005)(6916009)(54906003)(5660300002)(316002)(8936002)(81166007)(47076005)(8676002)(70586007)(36860700001)(4326008)(70206006)(83380400001)(186003)(26005)(1076003)(336012)(2616005)(40460700003)(7696005)(6666004)(36756003)(82310400004)(86362001)(2906002)(426003)(36900700001);DIR:OUT;SFP:1101;
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4785
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT050.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	73a9ee89-54eb-4df2-f584-08da03261df2
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	QuOUcR3KkLiURbcG5aYIBY+MzhYnTx0tbRlB5FHx3mfvo/HZIZl6EZ2I29npLK5zihY8i7zlieGy5RfkgjYExjh2W9fyqi7pLGzVdU+APL+fm7hqW8Kw7MF0EtJnmHbhtRKuKAiNP4USkOUSX0bylxn+yiMxNADp0xy74YAXt7PA2exvxapw9lMh5HiePyTJSycdNuxsiewDoGvYqk3lhRrVklENAsprNMsEjSYV0BcqAntqVv5YZGJRAHPk5vFgAOP12kzMfnfVPz/m/Y+cYDpou4V83Op8kbrsw8nTyU+oMYgavmVEbhBWBGIttdkvoi5geo5dWIdy9Q/0NGwLbguqYTrlvazEuUsyh6/YLtsw9M9fNogTQFJSGZzjVZQMh0O9v7dS0mXQ5mCSO9l5aSlNAhhrIkcK7TQk2pAEwaFJJwC/0tqzJyR68M6ah3Sv4i1kIHY4ofMgaY688niL8j+NeDfkVvQ5cGLIeaEhHaNikOvyS9OCOA4jxVwqoMIyhp8rQ7TXDnWCisTwgPlMUnDrmXrRzJS8LcRvi0xeE7Q8Bl0cWxwHLtcQK40it8yj+Uhe5BW6AxX/ZFY5zr+jLyrfsWsPF/phQEF9gnGTox6nYFqqaMQwwzpzj/ZsphhTyGRhTprK70ybcpjvp4ytOyr8mY/W2qtRyienaDdDBQpHU8t6kr4WXlYrnW6oFZs/
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(2906002)(47076005)(36860700001)(5660300002)(86362001)(83380400001)(8936002)(4326008)(8676002)(36756003)(1076003)(70586007)(2616005)(426003)(26005)(186003)(81166007)(336012)(82310400004)(316002)(54906003)(6666004)(7696005)(40460700003)(508600001)(107886003)(6916009)(70206006);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 06:12:35.5341
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: d51735c1-b30d-4373-cc63-08da032622e3
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT050.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PR2PR08MB4763

From: Penny Zheng <penny.zheng@arm.com>

In order to getting statically shared pages based on gfn with nr_pages, this
commit introduces a new helper get_pages_from_gfn to acquire a set of pages
based on [gfn, gfn + nr_gfns), with the same P2M type.

Signed-off-by: Penny Zheng <penny.zheng@arm.com>
---
 xen/arch/arm/include/asm/p2m.h | 37 ++++++++++++++++++++++++++++++++++
 1 file changed, 37 insertions(+)

diff --git a/xen/arch/arm/include/asm/p2m.h b/xen/arch/arm/include/asm/p2m.h
index 58590145b0..b23024b9a1 100644
--- a/xen/arch/arm/include/asm/p2m.h
+++ b/xen/arch/arm/include/asm/p2m.h
@@ -370,6 +370,43 @@ static inline struct page_info *get_page_from_gfn(
     return page;
 }
 
+static inline int get_pages_from_gfn(struct domain *d, unsigned long gfn,
+                                     unsigned long nr_gfns,
+                                     struct page_info **pages, p2m_type_t *t,
+                                     p2m_query_t q)
+{
+    p2m_type_t _t;
+    unsigned long i = 0;
+    int ret = 0;
+
+    for ( ; i < nr_gfns; i++ )
+    {
+        pages[i] = get_page_from_gfn(d, gfn + i, t, q);
+
+        if ( !pages[i] )
+        {
+            ret = -ENOENT;
+            goto fail_get;
+        }
+
+        if ( i == 0 )
+            _t = *t;
+        /* Check if all pages share the same p2m type. */
+        else if ( *t != _t )
+        {
+            ret = -EINVAL;
+            goto fail_get;
+        }
+    }
+
+    return ret;
+
+ fail_get:
+        while( --i >= 0 )
+            put_page(pages[i]);
+        return ret;
+}
+
 int get_page_type(struct page_info *page, unsigned long type);
 bool is_iomem_page(mfn_t mfn);
 static inline int get_page_and_type(struct page_info *page,
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 06:12:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 06:12:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288714.489717 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYW4-0001Pw-IH; Fri, 11 Mar 2022 06:12:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288714.489717; Fri, 11 Mar 2022 06:12:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYW4-0001Pd-DP; Fri, 11 Mar 2022 06:12:44 +0000
Received: by outflank-mailman (input) for mailman id 288714;
 Fri, 11 Mar 2022 06:12:42 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=p7td=TW=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nSYW2-0000Fh-49
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 06:12:42 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05on2062e.outbound.protection.outlook.com
 [2a01:111:f400:7d00::62e])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4200c9dc-a102-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 07:12:41 +0100 (CET)
Received: from AM6PR10CA0093.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:209:8c::34)
 by DBAPR08MB5719.eurprd08.prod.outlook.com (2603:10a6:10:1a6::23)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.17; Fri, 11 Mar
 2022 06:12:34 +0000
Received: from AM5EUR03FT043.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:8c:cafe::57) by AM6PR10CA0093.outlook.office365.com
 (2603:10a6:209:8c::34) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.23 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:34 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT043.mail.protection.outlook.com (10.152.17.43) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:12:33 +0000
Received: ("Tessian outbound 2877e54fe176:v113");
 Fri, 11 Mar 2022 06:12:32 +0000
Received: from 33cc58f73ad5.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 BFEBA997-4473-4E5C-95AF-94CE27DFF97C.1; 
 Fri, 11 Mar 2022 06:12:26 +0000
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 33cc58f73ad5.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 11 Mar 2022 06:12:26 +0000
Received: from AM6P193CA0098.EURP193.PROD.OUTLOOK.COM (2603:10a6:209:88::39)
 by AM6PR08MB3880.eurprd08.prod.outlook.com (2603:10a6:20b:86::25) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.20; Fri, 11 Mar
 2022 06:12:24 +0000
Received: from AM5EUR03FT021.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:88:cafe::1d) by AM6P193CA0098.outlook.office365.com
 (2603:10a6:209:88::39) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.20 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:24 +0000
Received: from nebula.arm.com (40.67.248.234) by
 AM5EUR03FT021.mail.protection.outlook.com (10.152.16.105) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:12:24 +0000
Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX04.Arm.com
 (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27; Fri, 11 Mar
 2022 06:12:18 +0000
Received: from a011292.shanghai.arm.com (10.169.190.94) by mail.arm.com
 (10.251.24.32) with Microsoft SMTP Server id 15.1.2308.27 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4200c9dc-a102-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=91p2GRq5kBZZuDWk4lf3po8ltidBgbVkId9fQw4+bdE=;
 b=A4nd4mmwyY85RQToWZ3KddKo3t7LB0y92Ix0cmJcNgG6CL9qUEyNQYnKBSbUFENY3xxAmy9/EtPVeuufm1GC6+IS11aZkkFx2wlZPMB6AsmJ0PKbL8e1vmGNqCUElptzMn9RWP9S/+iBsMsIMm8JNK4g4/qaYclSseY0AP4BaQc=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 13f0d65bc3c1ec0e
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ZYelD2S5agAVL35WbK2fxtx2CI2Tpd25vM3omDZZVoG4dneHUNOHwTlkv6nX7F1w6sg/O024/uMACdjcVD6WBgWHevheaXlkPmEBRa6WPA2RF4J9sfFYf7jqWbSKSD8wlSdI5c2Xc3Fs5qyLQh8LQ8PyQA+a9rbMTaR336/6uoPUmssl9tPH07jgf4psBb42+bk/XUYkkeTpmkO5ZSpDKqlRh79oSBXse8s1MDDDpqRmuf1XG1+Csdv7wtYrPB0q5WIt6areXK6uuumYywYJe3gDNCMDyIuZFjC25v8jSYEB9FDzr++ETRfJYxyfMyL+HTH7g9O/5Na2THh6TopRpQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=91p2GRq5kBZZuDWk4lf3po8ltidBgbVkId9fQw4+bdE=;
 b=RF0OzEN+KnmqOdFEFQ8w+NgnCr5yxONPQzh/BWf5DGDTPWB90Ut00Pf8kmWE7OW8qQNdKn0NBTt1seviWICBzf2i1S2rHAf6ewJaMmTqtiAzYuu3i86dO5wjft+iWGr3sRhHu6IBL4mpqcCSIC43cu0bnnOsPiQDG3YQPtWysdBpcNxMHWlW5wNdNQxhEtLJbhp8icErTh+2GwAWChia7ZCAENryzwqXaj76LUUIKTnpmfMyXQwAYZPas7FgCFKsrqTDr6hFZ2Dj1C1RW3WKVL63JHilIsmQddgeps90MxWAGDvYrVkjuNDQXw6bgo8HtgTD9Fh/0y/eAE0KlHnrGg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 40.67.248.234) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=91p2GRq5kBZZuDWk4lf3po8ltidBgbVkId9fQw4+bdE=;
 b=A4nd4mmwyY85RQToWZ3KddKo3t7LB0y92Ix0cmJcNgG6CL9qUEyNQYnKBSbUFENY3xxAmy9/EtPVeuufm1GC6+IS11aZkkFx2wlZPMB6AsmJ0PKbL8e1vmGNqCUElptzMn9RWP9S/+iBsMsIMm8JNK4g4/qaYclSseY0AP4BaQc=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234)
 smtp.mailfrom=arm.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 40.67.248.234 as permitted sender) receiver=protection.outlook.com;
 client-ip=40.67.248.234; helo=nebula.arm.com;
From: Penny Zheng <Penny.Zheng@arm.com>
To: <xen-devel@lists.xenproject.org>
CC: <nd@arm.com>, Penny Zheng <penny.zheng@arm.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Julien Grall <julien@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH v1 03/13] xen/arm: allocate static shared memory to dom_shared
Date: Fri, 11 Mar 2022 14:11:13 +0800
Message-ID: <20220311061123.1883189-4-Penny.Zheng@arm.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <20220311061123.1883189-1-Penny.Zheng@arm.com>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain
X-EOPAttributedMessage: 1
X-MS-Office365-Filtering-Correlation-Id: 049b94ea-7735-445a-5c1c-08da032621a6
X-MS-TrafficTypeDiagnostic:
	AM6PR08MB3880:EE_|AM5EUR03FT043:EE_|DBAPR08MB5719:EE_
X-Microsoft-Antispam-PRVS:
	<DBAPR08MB5719D7AE1C6568D386D41966F70C9@DBAPR08MB5719.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
NoDisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 9gUABD4unzlPK0n5bgmqPSGpvMufjcfPSFn1Le8hqVv8dMCipCdkuye/c+HDLj9MrJPt0eGYpFoyFxEHPfwl3mpw6T16SI4tyR9yqa49iA0zww6kMzNlNjKYVJpBe7Cw7BaKpb3i5t5e4KSTlvVEG6HqudYDl1bhXHAJsula0cnh3AugoSOvRX3XeXCwGc3y7rQgCcxSP7M57Nl66CkMS2ZU4z/yChIGTuQ+po60BdtWdjYmqSi9ACFr8FsLG1lwbZff9R1a3kindFzAJLP90AeE1NLsFjvKQKhh1/VQTpRBEXyhF/8wDyryordE3mzq55WqaXUM2pK60W4YfYMA8g7OGdSMSMc9b/RiQ+7V0P40QreoZ8yz2CDXcseidrVWJj9bnTDvEmrwwahdSb1zX6LIcTQMln57eZqojFBRIIpTFsG6mOCmVDDxwSN3LuoWrq1ITKTakU/ztQb5YhHd6dTAjCGjuw/bVRv+wxNEjYO47TS9Tga1diuYN7bM6b2JlMDOWUGVFK69gwz+P6jg8Uf30Bl7/fX7aOpMPf0rxIS6P4Y13wRnsjlChP9cDGBaTolT6ke8Dqhys9PZPyw1oRCwkR7+U6jpT6dfrYl2JHGV/RlKaH+Y7IxAEzp8JvtMcfzZDiNVReZV5V6Be81lgsikbw9duoRCVOPvkE9pb50zkG08TLE0RcGH0d0n7LqLnOdNDWypXgI0nu5yM2DhZQ==
X-Forefront-Antispam-Report-Untrusted:
 CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(1076003)(82310400004)(2616005)(86362001)(426003)(83380400001)(26005)(186003)(336012)(2906002)(47076005)(36860700001)(8936002)(70586007)(81166007)(40460700003)(356005)(54906003)(5660300002)(6666004)(316002)(508600001)(70206006)(4326008)(6916009)(8676002)(36756003)(7696005)(36900700001);DIR:OUT;SFP:1101;
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB3880
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT043.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	05a25351-5397-450d-f8ee-08da03261c8a
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(7696005)(6666004)(5660300002)(4326008)(47076005)(36860700001)(508600001)(8676002)(70206006)(70586007)(54906003)(8936002)(6916009)(316002)(2616005)(107886003)(186003)(26005)(36756003)(40460700003)(336012)(426003)(86362001)(83380400001)(81166007)(82310400004)(1076003)(2906002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 06:12:33.3912
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 049b94ea-7735-445a-5c1c-08da032621a6
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT043.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBAPR08MB5719

From: Penny Zheng <penny.zheng@arm.com>

This commit introduces process_shm to cope with static shared memory in
domain construction.

This commit only considers allocating static shared memory to dom_shared
when owner domain is not explicitly defined in device tree, the other
scenario will be covered in the following patches.

Static shared memory could reuse acquire_static_memory_bank() to acquire
and allocate static memory.

Signed-off-by: Penny Zheng <penny.zheng@arm.com>
---
 xen/arch/arm/domain_build.c | 116 +++++++++++++++++++++++++++++++++++-
 1 file changed, 115 insertions(+), 1 deletion(-)

diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index 8be01678de..6e6349caac 100644
--- a/xen/arch/arm/domain_build.c
+++ b/xen/arch/arm/domain_build.c
@@ -527,7 +527,8 @@ static mfn_t __init acquire_static_memory_bank(struct domain *d,
     mfn_t smfn;
     int res;
 
-    device_tree_get_reg(cell, addr_cells, size_cells, pbase, psize);
+    if ( cell )
+        device_tree_get_reg(cell, addr_cells, size_cells, pbase, psize);
     ASSERT(IS_ALIGNED(*pbase, PAGE_SIZE) && IS_ALIGNED(*psize, PAGE_SIZE));
     if ( PFN_DOWN(*psize) > UINT_MAX )
     {
@@ -751,6 +752,113 @@ static void __init assign_static_memory_11(struct domain *d,
     panic("Failed to assign requested static memory for direct-map domain %pd.",
           d);
 }
+
+#ifdef CONFIG_STATIC_SHM
+static __initdata DECLARE_BITMAP(shm_mask, NR_MEM_BANKS);
+
+static mfn_t __init acquire_shared_memory_bank(struct domain *d,
+                                               u32 addr_cells, u32 size_cells,
+                                               paddr_t *pbase, paddr_t *psize)
+{
+    /*
+     * Pages of statically shared memory shall be included
+     * in domain_tot_pages().
+     */
+    d->max_pages += PFN_DOWN(*psize);
+
+    return acquire_static_memory_bank(d, NULL, addr_cells, size_cells,
+                                      pbase, psize);
+
+}
+
+static int __init allocate_shared_memory(struct domain *d,
+                                         u32 addr_cells, u32 size_cells,
+                                         paddr_t pbase, paddr_t psize,
+                                         paddr_t gbase)
+{
+    mfn_t smfn;
+    int ret = 0;
+
+    printk(XENLOG_INFO "Allocate static shared memory BANK %#"PRIpaddr"-%#"PRIpaddr"\n",
+           pbase, pbase + psize);
+
+    smfn = acquire_shared_memory_bank(d, addr_cells, size_cells, &pbase,
+                                      &psize);
+    if ( mfn_eq(smfn, INVALID_MFN) )
+        return -EINVAL;
+
+    ret = guest_physmap_add_pages(d, gaddr_to_gfn(gbase), smfn, PFN_DOWN(psize));
+    if ( ret )
+    {
+        dprintk(XENLOG_ERR, "Failed to map shared memory to %pd.\n", d);
+        return ret;
+    }
+
+    return ret;
+}
+
+static int __init process_shm(struct domain *d,
+                              const struct dt_device_node *node)
+{
+    struct dt_device_node *shm_node;
+    int ret = 0;
+    const struct dt_property *prop;
+    const __be32 *cells;
+    u32 shm_id;
+    u32 addr_cells, size_cells;
+    paddr_t gbase, pbase, psize;
+
+    dt_for_each_child_node(node, shm_node)
+    {
+        if ( !dt_device_is_compatible(shm_node, "xen,domain-shared-memory-v1") )
+            continue;
+
+        if ( !dt_property_read_u32(shm_node, "xen,shm-id", &shm_id) )
+        {
+            printk("Shared memory node does not provide \"xen,shm-id\" property.\n");
+            return -ENOENT;
+        }
+
+        addr_cells = dt_n_addr_cells(shm_node);
+        size_cells = dt_n_size_cells(shm_node);
+        prop = dt_find_property(shm_node, "xen,shared-mem", NULL);
+        if ( !prop )
+        {
+            printk("Shared memory node does not provide \"xen,shared-mem\" property.\n");
+            return -ENOENT;
+        }
+        cells = (const __be32 *)prop->value;
+        /* xen,shared-mem = <pbase, psize, gbase>; */
+        device_tree_get_reg(&cells, addr_cells, size_cells, &pbase, &psize);
+        ASSERT(IS_ALIGNED(pbase, PAGE_SIZE) && IS_ALIGNED(psize, PAGE_SIZE));
+        gbase = dt_read_number(cells, addr_cells);
+
+        /* TODO: Consider owner domain is not the default dom_shared. */
+        /*
+         * Per shared memory region could be shared between multiple domains.
+         * In case re-allocating the same shared memory region, we use bitmask
+         * shm_mask to record whether this shared memory region has ever been
+         * allocated already.
+         */
+        if ( !test_bit(shm_id, shm_mask) )
+        {
+            /*
+             * Allocate statically shared pages to the default dom_shared.
+             * Set up P2M, and dom_shared is a direct-map domain,
+             * so GFN == PFN.
+             */
+            ret = allocate_shared_memory(dom_shared, addr_cells, size_cells,
+                                         pbase, psize, pbase);
+            if ( ret )
+                return ret;
+
+            set_bit(shm_id, shm_mask);
+        }
+    }
+
+    return 0;
+}
+#endif /* CONFIG_STATIC_SHM */
 #else
 static void __init allocate_static_memory(struct domain *d,
                                           struct kernel_info *kinfo,
@@ -3150,6 +3258,12 @@ static int __init construct_domU(struct domain *d,
     else
         assign_static_memory_11(d, &kinfo, node);
 
+#ifdef CONFIG_STATIC_SHM
+    rc = process_shm(d, node);
+    if ( rc < 0 )
+        return rc;
+#endif
+
     /*
      * Base address and irq number are needed when creating vpl011 device
      * tree node in prepare_dtb_domU, so initialization on related variables
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 06:12:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 06:12:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288715.489729 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYW8-0001pN-1b; Fri, 11 Mar 2022 06:12:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288715.489729; Fri, 11 Mar 2022 06:12:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYW7-0001or-Th; Fri, 11 Mar 2022 06:12:47 +0000
Received: by outflank-mailman (input) for mailman id 288715;
 Fri, 11 Mar 2022 06:12:46 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=p7td=TW=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nSYW6-0008Q3-7v
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 06:12:46 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on2061a.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::61a])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 444708df-a102-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 07:12:45 +0100 (CET)
Received: from DB6PR07CA0104.eurprd07.prod.outlook.com (2603:10a6:6:2c::18) by
 DBBPR08MB4679.eurprd08.prod.outlook.com (2603:10a6:10:db::21) with
 Microsoft
 SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5038.17; Fri, 11 Mar 2022 06:12:43 +0000
Received: from DB5EUR03FT023.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:6:2c:cafe::9a) by DB6PR07CA0104.outlook.office365.com
 (2603:10a6:6:2c::18) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.7 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:43 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT023.mail.protection.outlook.com (10.152.20.68) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:12:42 +0000
Received: ("Tessian outbound 2877e54fe176:v113");
 Fri, 11 Mar 2022 06:12:42 +0000
Received: from 060b85e9f54f.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 51A1884C-C79B-4AE8-BF64-A32FC44677CE.1; 
 Fri, 11 Mar 2022 06:12:36 +0000
Received: from EUR01-HE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 060b85e9f54f.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 11 Mar 2022 06:12:36 +0000
Received: from AS9PR05CA0024.eurprd05.prod.outlook.com (2603:10a6:20b:488::23)
 by AM4PR08MB2625.eurprd08.prod.outlook.com (2603:10a6:205:e::30) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.25; Fri, 11 Mar
 2022 06:12:34 +0000
Received: from AM5EUR03FT019.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:488:cafe::b) by AS9PR05CA0024.outlook.office365.com
 (2603:10a6:20b:488::23) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.24 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:34 +0000
Received: from nebula.arm.com (40.67.248.234) by
 AM5EUR03FT019.mail.protection.outlook.com (10.152.16.104) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:12:33 +0000
Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX04.Arm.com
 (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27; Fri, 11 Mar
 2022 06:12:32 +0000
Received: from a011292.shanghai.arm.com (10.169.190.94) by mail.arm.com
 (10.251.24.32) with Microsoft SMTP Server id 15.1.2308.27 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 444708df-a102-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=mDvbp4DWU9mwuztP7cNd08kpIm//piVnKYKpsaKT7q8=;
 b=ptmRVisctFiB0GYfoxUw6QCjvksNPDZwlzYpffxwd/y2M+0LxK5wgcjsEvRTHP7ObbZOAksfGH12kcA+EQ9xbkQ5Te1NzmH0dZwYv2ejGHDGaHD6JomCM37fyTHmk+mRQNl2z7JA4raqcPmgFI2dA4rWkSv6NtMstqJr+T6ixG4=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 6e9c82cd63a216ba
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=HKHQZU6BAEOFCsnxBMCyKsL17PtI+Md3T+LB1G+doaikcmSsbXJ3eYoHokzbK0JWyFkQsmLBNRQIQXpZrD4tqd52zoitnILETlWkakfQVHJNPrJ25iz8EcqpDYCjak/sL9FCrrL93kl4W8IfHKSeyQoTV+8fa+zMgR66yEN2Cy+HatKSgG2xg4Ac11JGEkwdKhlVyl5bnIsZ8Fc/Wzmk4KHgVx9B5wg05XJWc270BgmLWL452iSUB3FsQQghvAYLZomB/wm76RnZyJTFnW5rRU6lg4SFZ66rdO9EzJimjCoYPNMgXkRXoePsu0yAH4qX0Szw1eDRgQDOax/SuG65UQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=mDvbp4DWU9mwuztP7cNd08kpIm//piVnKYKpsaKT7q8=;
 b=dZ3iZHGSP4q7ttNnwAg4fE+gm6bcAkNIajYBh5FO6KpfIpNOvDACDpt2YZHPHHrfCg1Bnjh6hyjREuiDfgdPHKN/Vs/4lPaOSCF0iTHlHIte+8MZEkStgzaJT7SSSYuvaiPG/ZpjkrtIBnU8+qA7VuAB2K02cNMEjTxrWbnpqGqE0W708ZJchckzixd2Kj5B01KyBbnx+FG6Z8LwVR3eyoXFZZ4K0LZgXSrt1LIL8VZW40Hdr6bbcjIa/GRKeXGQ0iotAK/fnIZsnISjKZjvglHi0ZgMaUOVijRXuAExTlAlhG41OO1ppyVU1FWjPDFSlXUqQXN5Yez1MTI+c+e4oQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 40.67.248.234) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=mDvbp4DWU9mwuztP7cNd08kpIm//piVnKYKpsaKT7q8=;
 b=ptmRVisctFiB0GYfoxUw6QCjvksNPDZwlzYpffxwd/y2M+0LxK5wgcjsEvRTHP7ObbZOAksfGH12kcA+EQ9xbkQ5Te1NzmH0dZwYv2ejGHDGaHD6JomCM37fyTHmk+mRQNl2z7JA4raqcPmgFI2dA4rWkSv6NtMstqJr+T6ixG4=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234)
 smtp.mailfrom=arm.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 40.67.248.234 as permitted sender) receiver=protection.outlook.com;
 client-ip=40.67.248.234; helo=nebula.arm.com;
From: Penny Zheng <Penny.Zheng@arm.com>
To: <xen-devel@lists.xenproject.org>
CC: <nd@arm.com>, Penny Zheng <penny.zheng@arm.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Julien Grall <julien@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH v1 08/13] xen/arm: destroy static shared memory when de-construct domain
Date: Fri, 11 Mar 2022 14:11:18 +0800
Message-ID: <20220311061123.1883189-9-Penny.Zheng@arm.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <20220311061123.1883189-1-Penny.Zheng@arm.com>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain
X-EOPAttributedMessage: 1
X-MS-Office365-Filtering-Correlation-Id: fb207d42-330f-4a15-2948-08da0326274a
X-MS-TrafficTypeDiagnostic:
	AM4PR08MB2625:EE_|DB5EUR03FT023:EE_|DBBPR08MB4679:EE_
X-Microsoft-Antispam-PRVS:
	<DBBPR08MB46799708909C29630C5D8849F70C9@DBBPR08MB4679.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
NoDisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(5660300002)(8936002)(2906002)(54906003)(316002)(81166007)(40460700003)(356005)(83380400001)(7696005)(2616005)(1076003)(426003)(186003)(36756003)(336012)(26005)(82310400004)(508600001)(70206006)(4326008)(6666004)(70586007)(36860700001)(86362001)(47076005)(8676002)(6916009)(36900700001);DIR:OUT;SFP:1101;
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR08MB2625
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT023.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	529e58f3-8e77-4d09-657b-08da032621e0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(4326008)(83380400001)(107886003)(2616005)(70586007)(70206006)(6916009)(82310400004)(2906002)(81166007)(40460700003)(86362001)(47076005)(8676002)(6666004)(7696005)(316002)(336012)(26005)(186003)(426003)(1076003)(54906003)(36756003)(5660300002)(8936002)(508600001)(36860700001);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 06:12:42.9158
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: fb207d42-330f-4a15-2948-08da0326274a
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT023.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB4679

From: Penny Zheng <penny.zheng@arm.com>

This commit introduces a new helper destroy_domain_shm to destroy static
shared memory at domain de-construction.

This patch only considers the scenario where the owner domain is the
default dom_shared, for user-defined owner domain, it will be covered in
the following patches.

Since all domains are borrower domains, we could simply remove guest P2M
foreign mapping of statically shared memory region and drop the reference
added at guest_physmap_add_shm.

Signed-off-by: Penny Zheng <penny.zheng@arm.com>
---
 xen/arch/arm/domain.c | 48 +++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 48 insertions(+)

diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
index 1ff1df5d3f..f0bfd67fe5 100644
--- a/xen/arch/arm/domain.c
+++ b/xen/arch/arm/domain.c
@@ -34,6 +34,7 @@
 #include <asm/platform.h>
 #include <asm/procinfo.h>
 #include <asm/regs.h>
+#include <asm/setup.h>
 #include <asm/tee/tee.h>
 #include <asm/vfp.h>
 #include <asm/vgic.h>
@@ -993,6 +994,48 @@ static int relinquish_memory(struct domain *d, struct page_list_head *list)
     return ret;
 }
 
+#ifdef CONFIG_STATIC_SHM
+static int domain_destroy_shm(struct domain *d)
+{
+    int ret = 0;
+    unsigned long i = 0UL, j;
+
+    if ( d->arch.shm_mem == NULL )
+        return ret;
+    else
+    {
+        for ( ; i < d->arch.shm_mem->nr_banks; i++ )
+        {
+            unsigned long nr_gfns = PFN_DOWN(d->arch.shm_mem->bank[i].size);
+            gfn_t gfn = gaddr_to_gfn(d->arch.shm_mem->bank[i].start);
+
+            for ( j = 0; j < nr_gfns; j++ )
+            {
+                mfn_t mfn;
+
+                mfn = gfn_to_mfn(d, gfn_add(gfn, j));
+                if ( !mfn_valid(mfn) )
+                {
+                    dprintk(XENLOG_ERR,
+                            "Domain %pd page number %lx invalid.\n",
+                            d, gfn_x(gfn) + i);
+                    return -EINVAL;
+                }
+
+                ret = guest_physmap_remove_page(d, gfn_add(gfn, j), mfn, 0);
+                if ( ret )
+                    return ret;
+
+                /* Drop the reference. */
+                put_page(mfn_to_page(mfn));
+            }
+        }
+    }
+
+    return ret;
+}
+#endif
+
 /*
  * Record the current progress. Subsequent hypercall continuations will
  * logically restart work from this point.
@@ -1039,6 +1082,11 @@ int domain_relinquish_resources(struct domain *d)
          */
         domain_vpl011_deinit(d);
 
+#ifdef CONFIG_STATIC_SHM
+        ret = domain_destroy_shm(d);
+        if ( ret )
+            return ret;
+#endif
 #ifdef CONFIG_IOREQ_SERVER
         ioreq_server_destroy_all(d);
 #endif
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 06:13:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 06:13:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288717.489740 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYWD-0002L1-G6; Fri, 11 Mar 2022 06:12:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288717.489740; Fri, 11 Mar 2022 06:12:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYWD-0002Kl-9b; Fri, 11 Mar 2022 06:12:53 +0000
Received: by outflank-mailman (input) for mailman id 288717;
 Fri, 11 Mar 2022 06:12:51 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=p7td=TW=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nSYWB-0000Fh-3y
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 06:12:51 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04on0624.outbound.protection.outlook.com
 [2a01:111:f400:fe0d::624])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 46ea25c8-a102-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 07:12:50 +0100 (CET)
Received: from AM6PR10CA0008.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:209:89::21)
 by DB6PR0801MB1960.eurprd08.prod.outlook.com (2603:10a6:4:76::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.19; Fri, 11 Mar
 2022 06:12:42 +0000
Received: from AM5EUR03FT031.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:89:cafe::a4) by AM6PR10CA0008.outlook.office365.com
 (2603:10a6:209:89::21) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:42 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT031.mail.protection.outlook.com (10.152.16.111) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:12:41 +0000
Received: ("Tessian outbound 63bb5eb69ee8:v113");
 Fri, 11 Mar 2022 06:12:41 +0000
Received: from ffade54445f8.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 1368B86B-9193-41CD-8161-E823D5739779.1; 
 Fri, 11 Mar 2022 06:12:34 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id ffade54445f8.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 11 Mar 2022 06:12:34 +0000
Received: from AM6PR10CA0089.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:209:8c::30)
 by DB8PR08MB5401.eurprd08.prod.outlook.com (2603:10a6:10:f9::13) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar
 2022 06:12:32 +0000
Received: from AM5EUR03FT060.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:8c:cafe::d2) by AM6PR10CA0089.outlook.office365.com
 (2603:10a6:209:8c::30) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.20 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:32 +0000
Received: from nebula.arm.com (40.67.248.234) by
 AM5EUR03FT060.mail.protection.outlook.com (10.152.16.160) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5017.24 via Frontend Transport; Fri, 11 Mar 2022 06:12:31 +0000
Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX04.Arm.com
 (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27; Fri, 11 Mar
 2022 06:12:29 +0000
Received: from a011292.shanghai.arm.com (10.169.190.94) by mail.arm.com
 (10.251.24.32) with Microsoft SMTP Server id 15.1.2308.27 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 46ea25c8-a102-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=umdxaC9M1LCNOYH4ZpD5ACrl2y60yzal5ReM8dSmiFw=;
 b=v1V6XNf72S4ItEfdsoAAHY49IK1Fuvm/OQIHJUjVWD1kviXgF8xHrxDV2aUzmBDZMB8HZ3R3ukUhKFSPmQCH8ew1vzGiVWyiAMEo2Hrb2krnTN37wWnoZ5SIKURokGfkK9pCoM+hL4gOM1muyNjFKdWUfTQlFQTRfYFi9uHBuQg=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 0a46b8f13a50568b
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=fTzOncaUWmi+9/BwTptUX8m9Z5SjS4Ni5WKs/96YjHCwQh/r63kAEbtW2s40+3QbmIeKSWB1eb0Y75MjK7bwBHWfAEfFwKUvurMHHk3eFN3YxFd8lhYsh41xKxuhrOK2PKpdhZF62/c22ijG7l+FSvXfOISps5uOvcf4oz5AETnmpyLlTqqkckdcwsvk962GY1cWfNudm1RLOnU1t5TA5YByI3eOWcatQhwvijLVojQXR0r2NmVWJ53XMzLBwJnNfVwbxFoRjjyY/pnGdH3oKgXPjydN2mWVJh9CIkRE17e9B1hmtos7YJ+ap5S8cfZiCZcHZLf2Qi9QSCsFgCdfZQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=umdxaC9M1LCNOYH4ZpD5ACrl2y60yzal5ReM8dSmiFw=;
 b=R7Ci329X43kgDR0HmX/5yjIkk7jFayhIQYVd7SqdjarX9yuKKZ5sqqI7rQM81ac7IdrQuqKvtAxk75k9Q9W8+GzrZ6Xd1qHy3ApzQhy0TzELqazUhQy5/exNmkznU3iFjsNHiGRENZDmpTzI+YEIOfbcgSgoWMopD93/hrQpt/bDgg3ItStFL/kr6fXOxu6KLwCybXIdMwqAe7VtoAIpqaNX/9Q+H+wi21y5VTfuiJgBYFK2HCXo/HHjjyeexcrkkHKT57H+CxckDtZXXssBJXJ412taxfoUKjGDt+YYORHYUjmInup78tLLHyXq6i2CnY47exnAoCFG1pDY+UDf0w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 40.67.248.234) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=umdxaC9M1LCNOYH4ZpD5ACrl2y60yzal5ReM8dSmiFw=;
 b=v1V6XNf72S4ItEfdsoAAHY49IK1Fuvm/OQIHJUjVWD1kviXgF8xHrxDV2aUzmBDZMB8HZ3R3ukUhKFSPmQCH8ew1vzGiVWyiAMEo2Hrb2krnTN37wWnoZ5SIKURokGfkK9pCoM+hL4gOM1muyNjFKdWUfTQlFQTRfYFi9uHBuQg=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234)
 smtp.mailfrom=arm.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 40.67.248.234 as permitted sender) receiver=protection.outlook.com;
 client-ip=40.67.248.234; helo=nebula.arm.com;
From: Penny Zheng <Penny.Zheng@arm.com>
To: <xen-devel@lists.xenproject.org>
CC: <nd@arm.com>, Penny Zheng <penny.zheng@arm.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Julien Grall <julien@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH v1 07/13] xen/arm: create shared memory nodes in guest device tree
Date: Fri, 11 Mar 2022 14:11:17 +0800
Message-ID: <20220311061123.1883189-8-Penny.Zheng@arm.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <20220311061123.1883189-1-Penny.Zheng@arm.com>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain
X-EOPAttributedMessage: 1
X-MS-Office365-Filtering-Correlation-Id: fca68a2e-c460-4a49-24d4-08da03262698
X-MS-TrafficTypeDiagnostic:
	DB8PR08MB5401:EE_|AM5EUR03FT031:EE_|DB6PR0801MB1960:EE_
X-Microsoft-Antispam-PRVS:
	<DB6PR0801MB19604698C9475C8A3B4F5FA3F70C9@DB6PR0801MB1960.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
NoDisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(1076003)(7696005)(26005)(186003)(8676002)(5660300002)(6666004)(54906003)(70206006)(70586007)(316002)(36756003)(36860700001)(47076005)(82310400004)(508600001)(6916009)(2906002)(4326008)(336012)(426003)(8936002)(2616005)(86362001)(40460700003)(356005)(83380400001)(81166007)(36900700001);DIR:OUT;SFP:1101;
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR08MB5401
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT031.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	d6bf2f15-1bfd-4e8a-a11d-08da03262088
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	ea9hoodo56SHdeurQPQ31QV+IXccKAk9oHlcgXovKQNk9IVTybhuyolc7R2J4qbbCzluUu/o+vIS6k6l5UVfkCfozaRGDqMnMqMHiwt/re8NvUkGiTX+mZQ02UhaqYwQB58Kvcb3m9t7ohgNbjzXAS41MaACangvCzEqUU2fWmdVLSs72NGe+LvJ8s1EnFngn6Nzju4KrdVkA+heJGPv6w86FZs/Iv7rNgEwg7a7Ds93Gz+nMq3LF5alyCPX3Obf7//qUzPJDd0M90juyXt/XceZFegadwgdGnmF/3NdnWIlNFyxDg8oyzkajdUP/VB2byMe54wvD2EyFIgTYuZe40ju8TCN8ZOLXoTYyV5JZwfb0Dl95WwVN2xymaVCw+ktj08jllPPI5dmJqr6BCKvWKUti7RvCvNiqszBZk6s0uNBxLMyjQ5bX+uqnRfIql4PE42dOVG99huceBEXKpwHXRYPdVPef4mRzkk4RNlFwFez9pZYSdBWAPkdW9J+cAvpGQXA9+9sPJUgs6Yj5v3vvkbPo0GQYFtJaxormS2UJC99EsnRzFaDib5GJIJW86LhS2P571tG7sdkkcB0IcTrUw6A95em7PVGeIyi5pKmOd+zVDDCAzXfpzgXtMbfPGJpOSD7ZdIhE7ZSea5SwMa7j6EupK/LBhMKnorv51dABH3tQ61Ns7dX7cmlZfjalzvW
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(86362001)(6666004)(40460700003)(47076005)(8936002)(36860700001)(336012)(508600001)(4326008)(2906002)(81166007)(8676002)(7696005)(1076003)(82310400004)(83380400001)(36756003)(186003)(426003)(26005)(6916009)(2616005)(316002)(107886003)(70586007)(70206006)(5660300002)(54906003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 06:12:41.6710
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: fca68a2e-c460-4a49-24d4-08da03262698
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT031.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0801MB1960

From: Penny Zheng <penny.zheng@arm.com>

We expose the shared memory to the domU using the "xen,shared-memory-v1"
reserved-memory binding. See
Documentation/devicetree/bindings/reserved-memory/xen,shared-memory.txt
in Linux for the corresponding device tree binding.

To save the cost of re-parsing shared memory device tree configuration when
creating shared memory nodes in guest device tree, this commit adds new field
"shm_mem" to store shm-info per domain.

For each shared memory region, a range is exposed under
the /reserved-memory node as a child node. Each range sub-node is
named xen-shmem@<address> and has the following properties:
- compatible:
        compatible = "xen,shared-memory-v1"
- reg:
        the base guest physical address and size of the shared memory region
- xen,id:
        a string that identifies the shared memory region.

Signed-off-by: Penny Zheng <penny.zheng@arm.com>
---
 xen/arch/arm/domain_build.c       | 144 ++++++++++++++++++++++++++++++
 xen/arch/arm/include/asm/domain.h |   1 +
 xen/arch/arm/include/asm/setup.h  |   3 +
 3 files changed, 148 insertions(+)

diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index 8cee5ffbd1..997df46ddd 100644
--- a/xen/arch/arm/domain_build.c
+++ b/xen/arch/arm/domain_build.c
@@ -840,6 +840,28 @@ static int __init guest_physmap_add_shm(struct domain *od, struct domain *bd,
     return ret;
 }
 
+static int __init append_shm_bank_to_domain(struct domain *d,
+                                            paddr_t start, paddr_t size,
+                                            u32 shm_id)
+{
+    /* Allocate memory at first insertion. */
+    if ( d->arch.shm_mem == NULL )
+    {
+        d->arch.shm_mem = xmalloc_bytes(sizeof(struct meminfo));
+        if ( d->arch.shm_mem == NULL )
+            return -ENOMEM;
+
+        memset(d->arch.shm_mem, 0, sizeof(struct meminfo));
+    }
+
+    d->arch.shm_mem->bank[d->arch.shm_mem->nr_banks].start = start;
+    d->arch.shm_mem->bank[d->arch.shm_mem->nr_banks].size = size;
+    d->arch.shm_mem->bank[d->arch.shm_mem->nr_banks].shm_id = shm_id;
+    d->arch.shm_mem->nr_banks++;
+
+    return 0;
+}
+
 static int __init process_shm(struct domain *d,
                               const struct dt_device_node *node)
 {
@@ -907,6 +929,14 @@ static int __init process_shm(struct domain *d,
                                     PFN_DOWN(gbase), PFN_DOWN(psize));
         if ( ret )
             return ret;
+
+        /*
+         * Record static shared memory region info for later setting
+         * up shm-node in guest device tree.
+         */
+        ret = append_shm_bank_to_domain(d, gbase, psize, shm_id);
+        if ( ret )
+            return ret;
     }
 
     return 0;
@@ -1237,6 +1267,115 @@ static int __init make_memory_node(const struct domain *d,
     return res;
 }
 
+#ifdef CONFIG_STATIC_SHM
+static int __init make_shm_memory_node(const struct domain *d,
+                                       void *fdt,
+                                       int addrcells, int sizecells,
+                                       struct meminfo *mem)
+{
+    unsigned long i = 0;
+    int res = 0;
+    int reg_size = addrcells + sizecells;
+
+    if ( mem->nr_banks == 0 )
+        return -ENOENT;
+
+    /*
+     * For each shared memory region, a range is exposed under
+     * the /reserved-memory node as a child node. Each range sub-node is
+     * named xen-shmem@<address>.
+     */
+    dt_dprintk("Create xen-shmem node\n");
+
+    for ( ; i < mem->nr_banks; i++ )
+    {
+        u64 start = mem->bank[i].start;
+        u64 size = mem->bank[i].size;
+        u32 shm_id = mem->bank[i].shm_id;
+        /* Placeholder for xen-shmem@ + a 64-bit number + \0 */
+        char buf[27];
+        const char compat[] = "xen,shared-memory-v1";
+        __be32 *reg, *cells;
+       unsigned int len;
+
+        snprintf(buf, sizeof(buf), "xen-shmem@%"PRIx64, mem->bank[i].start);
+        res = fdt_begin_node(fdt, buf);
+        if ( res )
+            return res;
+
+        res = fdt_property(fdt, "compatible", compat, sizeof(compat));
+        if ( res )
+            return res;
+
+       len = reg_size * sizeof(__be32);
+        reg = xmalloc_bytes(len);
+        if ( reg == NULL )
+            return -ENOMEM;
+        cells = reg;
+
+        dt_child_set_range(&cells, addrcells, sizecells, start, size);
+
+        res = fdt_property(fdt, "reg", reg, len);
+        xfree(reg);
+        if (res)
+            return res;
+
+        dt_dprintk("Shared memory bank %lu: %#"PRIx64"->%#"PRIx64"\n",
+                   i, start, start + size);
+
+        res = fdt_property_cell(fdt, "xen,id", shm_id);
+        if (res)
+            return res;
+
+        res = fdt_end_node(fdt);
+        if (res)
+            return res;
+    }
+
+    return res;
+}
+#else
+static int __init make_shm_memory_node(const struct domain *d,
+                                       void *fdt,
+                                       int addrcells, int sizecells,
+                                       struct meminfo *mem)
+{
+    ASSERT_UNREACHABLE();
+}
+#endif
+
+static int __init make_resv_memory_node(const struct domain *d,
+                                        void *fdt,
+                                        int addrcells, int sizecells,
+                                        struct meminfo *mem)
+{
+    int res = 0;
+    /* Placeholder for reserved-memory\0 */
+    char resvbuf[16] = "reserved-mem";
+
+    if ( mem == NULL )
+        /* No shared memory provided. */
+        return 0;
+
+    dt_dprintk("Create reserved-memory node\n");
+
+    res = fdt_begin_node(fdt, resvbuf);
+    if ( res )
+        return res;
+
+    res = fdt_property(fdt, "ranges", NULL, 0);
+    if ( res )
+        return res;
+
+    res = make_shm_memory_node(d, fdt, addrcells, sizecells, mem);
+    if ( res )
+        return res;
+
+    res = fdt_end_node(fdt);
+
+    return res;
+}
+
 static int __init add_ext_regions(unsigned long s, unsigned long e, void *data)
 {
     struct meminfo *ext_regions = data;
@@ -2974,6 +3113,11 @@ static int __init prepare_dtb_domU(struct domain *d, struct kernel_info *kinfo)
     if ( ret )
         goto err;
 
+    ret = make_resv_memory_node(d, kinfo->fdt, addrcells, sizecells,
+                                d->arch.shm_mem);
+    if ( ret )
+        goto err;
+
     /*
      * domain_handle_dtb_bootmodule has to be called before the rest of
      * the device tree is generated because it depends on the value of
diff --git a/xen/arch/arm/include/asm/domain.h b/xen/arch/arm/include/asm/domain.h
index ea7a7219a3..6df37d2c46 100644
--- a/xen/arch/arm/include/asm/domain.h
+++ b/xen/arch/arm/include/asm/domain.h
@@ -110,6 +110,7 @@ struct arch_domain
 #endif
 
     bool directmap;
+    struct meminfo *shm_mem;
 }  __cacheline_aligned;
 
 struct arch_vcpu
diff --git a/xen/arch/arm/include/asm/setup.h b/xen/arch/arm/include/asm/setup.h
index 7a1e1d6798..b6ff04889c 100644
--- a/xen/arch/arm/include/asm/setup.h
+++ b/xen/arch/arm/include/asm/setup.h
@@ -27,6 +27,9 @@ struct membank {
     paddr_t start;
     paddr_t size;
     bool xen_domain; /* whether the memory bank is bound to a Xen domain. */
+#ifdef CONFIG_STATIC_SHM
+    u32 shm_id ;     /* ID identifier of a static shared memory bank. */
+#endif
 };
 
 struct meminfo {
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 06:13:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 06:13:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288728.489761 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYWI-0003Hp-Jp; Fri, 11 Mar 2022 06:12:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288728.489761; Fri, 11 Mar 2022 06:12:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYWI-0003HY-EK; Fri, 11 Mar 2022 06:12:58 +0000
Received: by outflank-mailman (input) for mailman id 288728;
 Fri, 11 Mar 2022 06:12:56 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=p7td=TW=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nSYWG-0008Q3-M2
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 06:12:56 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04on0631.outbound.protection.outlook.com
 [2a01:111:f400:fe0e::631])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4a2db3e8-a102-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 07:12:55 +0100 (CET)
Received: from AS8PR04CA0063.eurprd04.prod.outlook.com (2603:10a6:20b:313::8)
 by VI1PR0801MB1935.eurprd08.prod.outlook.com (2603:10a6:800:87::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.17; Fri, 11 Mar
 2022 06:12:51 +0000
Received: from AM5EUR03FT037.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:313:cafe::94) by AS8PR04CA0063.outlook.office365.com
 (2603:10a6:20b:313::8) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4975.18 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:51 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT037.mail.protection.outlook.com (10.152.17.241) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:12:49 +0000
Received: ("Tessian outbound 341d209a0e52:v113");
 Fri, 11 Mar 2022 06:12:49 +0000
Received: from 28280eae6570.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 6511A843-2DD5-4832-869F-DB913DB77101.1; 
 Fri, 11 Mar 2022 06:12:43 +0000
Received: from EUR01-DB5-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 28280eae6570.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 11 Mar 2022 06:12:43 +0000
Received: from AM5PR0101CA0030.eurprd01.prod.exchangelabs.com
 (2603:10a6:206:16::43) by VI1PR08MB3823.eurprd08.prod.outlook.com
 (2603:10a6:803:c2::31) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.19; Fri, 11 Mar
 2022 06:12:41 +0000
Received: from AM5EUR03FT059.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:206:16:cafe::be) by AM5PR0101CA0030.outlook.office365.com
 (2603:10a6:206:16::43) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.20 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:41 +0000
Received: from nebula.arm.com (40.67.248.234) by
 AM5EUR03FT059.mail.protection.outlook.com (10.152.17.193) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5017.24 via Frontend Transport; Fri, 11 Mar 2022 06:12:38 +0000
Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX04.Arm.com
 (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27; Fri, 11 Mar
 2022 06:12:35 +0000
Received: from a011292.shanghai.arm.com (10.169.190.94) by mail.arm.com
 (10.251.24.32) with Microsoft SMTP Server id 15.1.2308.27 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4a2db3e8-a102-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=6bSp5tvM7rKX9UVcthkuPyrtsBk3BRPoTnoVQ5rFyO8=;
 b=vokE7VE9Pe134rWz6CfxUcU9dgqMNWt8V4d/IHH/G/qj+rD5RyEO8cWnImnV7SOIKqVIRwOu2f6/bjcrBqwcjbMGMM6jobYUdKmtmDf2YaS/Z1Pmr2QHm3cvy9X7RKqlZBpGJND7DNw8CcwxWz/6U1Qw5jBBuq8tCI3Ds4WBSLk=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 74e58dee669366f6
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Y+AgXP+2vOov0PBeexjTZBfM7Lp0yQd/i7BkCh8Fn0pvEFIHW4HFq57koUCFabsd7U1lQTGaPjISXsrFKJriRtFnKjNE2kYE1uAFEH/0UYxIwtVTxNUepST5PFREeZLheiHSqHW957yd2q2wuXn84NZLnmBhMBPnwmhILILG5djCSZ6CN+PjrYYoeWdQyIWqH2giHcyx5kknVkxMelkjhT+oT45ApGkixWrqx1X7NIfn4Bb2C5vs2Q4Haap3j/LM8809TP5vC4UJSDekyyG5NcR8eVzQFYt9PJ+5vxCOwKequAnzyFsQv6030oKYZjYfcxa3yHl7lFi4x4al4SYzQg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=6bSp5tvM7rKX9UVcthkuPyrtsBk3BRPoTnoVQ5rFyO8=;
 b=F2yg9B852m+q4m1S0YubZTQMElumoTKR0Js9werY5VLYTopQnvkTRExEsawQ7XPMxIM2f0ytttUf7L3U5zfMVc+f1OuxMk6pOi0NRKHmHgAyYfkC0uunQOVAB+pZySydHmdR4YxLShwljm9sCVXhmZIkO4tIzec7vCoLfjlPSAx45BxGVxzBuSiw6UNmi43F9IoII/Zhj0IbCkAglfjmBvwnXgoRyn/KNK+AIy7DWGhXb3Fq6m4DasouDd83YEckbaHqGDmUKd0ZtwzBbyUqUq+1vTCQkbIifBq4faUoTGPh4bK+4XhSaYHTNwL86sOyyISe2XdelrAW0tG7SkfFkg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 40.67.248.234) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=6bSp5tvM7rKX9UVcthkuPyrtsBk3BRPoTnoVQ5rFyO8=;
 b=vokE7VE9Pe134rWz6CfxUcU9dgqMNWt8V4d/IHH/G/qj+rD5RyEO8cWnImnV7SOIKqVIRwOu2f6/bjcrBqwcjbMGMM6jobYUdKmtmDf2YaS/Z1Pmr2QHm3cvy9X7RKqlZBpGJND7DNw8CcwxWz/6U1Qw5jBBuq8tCI3Ds4WBSLk=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234)
 smtp.mailfrom=arm.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 40.67.248.234 as permitted sender) receiver=protection.outlook.com;
 client-ip=40.67.248.234; helo=nebula.arm.com;
From: Penny Zheng <Penny.Zheng@arm.com>
To: <xen-devel@lists.xenproject.org>
CC: <nd@arm.com>, Penny Zheng <penny.zheng@arm.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Julien Grall <julien@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH v1 09/13] xen/arm: enable statically shared memory on Dom0
Date: Fri, 11 Mar 2022 14:11:19 +0800
Message-ID: <20220311061123.1883189-10-Penny.Zheng@arm.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <20220311061123.1883189-1-Penny.Zheng@arm.com>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain
X-EOPAttributedMessage: 1
X-MS-Office365-Filtering-Correlation-Id: 67d17d15-7a52-4646-f820-08da03262b7c
X-MS-TrafficTypeDiagnostic:
	VI1PR08MB3823:EE_|AM5EUR03FT037:EE_|VI1PR0801MB1935:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR0801MB1935C911F1AB635FE50BF57DF70C9@VI1PR0801MB1935.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
NoDisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(86362001)(26005)(336012)(70586007)(426003)(82310400004)(8936002)(186003)(8676002)(316002)(4326008)(508600001)(6666004)(70206006)(356005)(36756003)(1076003)(7696005)(81166007)(36860700001)(5660300002)(2906002)(2616005)(40460700003)(6916009)(54906003)(47076005)(36900700001);DIR:OUT;SFP:1101;
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB3823
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT037.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	ef85de60-c0ba-4312-c22c-08da032624d0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(70206006)(70586007)(8676002)(36756003)(4326008)(86362001)(54906003)(6916009)(316002)(82310400004)(81166007)(2906002)(8936002)(426003)(186003)(336012)(26005)(40460700003)(1076003)(2616005)(6666004)(508600001)(7696005)(36860700001)(47076005)(107886003)(5660300002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 06:12:49.8863
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 67d17d15-7a52-4646-f820-08da03262b7c
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT037.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB1935

From: Penny Zheng <penny.zheng@arm.com>

To add statically shared memory nodes in Dom0, user shall put according
static shared memory configuration under /chosen node.

This commit adds shm-processing function process_shm in construct_dom0
to enable statically shared memory on Dom0.

Signed-off-by: Penny Zheng <penny.zheng@arm.com>
---
 xen/arch/arm/domain_build.c | 14 ++++++++++++++
 1 file changed, 14 insertions(+)

diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index 997df46ddd..d35f98ff9c 100644
--- a/xen/arch/arm/domain_build.c
+++ b/xen/arch/arm/domain_build.c
@@ -2561,6 +2561,11 @@ static int __init handle_node(struct domain *d, struct kernel_info *kinfo,
             if ( res )
                 return res;
         }
+
+        res = make_resv_memory_node(d, kinfo->fdt, addrcells, sizecells,
+                                    d->arch.shm_mem);
+        if ( res )
+            return res;
     }
 
     res = fdt_end_node(kinfo->fdt);
@@ -3572,6 +3577,9 @@ static int __init construct_dom0(struct domain *d)
 {
     struct kernel_info kinfo = {};
     int rc;
+#ifdef CONFIG_STATIC_SHM
+    const struct dt_device_node *chosen = dt_find_node_by_path("/chosen");
+#endif
 
     /* Sanity! */
     BUG_ON(d->domain_id != 0);
@@ -3606,6 +3614,12 @@ static int __init construct_dom0(struct domain *d)
     allocate_memory_11(d, &kinfo);
     find_gnttab_region(d, &kinfo);
 
+#ifdef CONFIG_STATIC_SHM
+    rc = process_shm(d, chosen);
+    if ( rc < 0 )
+        return rc;
+#endif
+
     /* Map extra GIC MMIO, irqs and other hw stuffs to dom0. */
     rc = gic_map_hwdom_extra_mappings(d);
     if ( rc < 0 )
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 06:13:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 06:13:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288720.489746 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYWE-0002SY-DD; Fri, 11 Mar 2022 06:12:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288720.489746; Fri, 11 Mar 2022 06:12:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYWE-0002Qy-10; Fri, 11 Mar 2022 06:12:54 +0000
Received: by outflank-mailman (input) for mailman id 288720;
 Fri, 11 Mar 2022 06:12:52 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=p7td=TW=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nSYWC-0008Q3-Kk
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 06:12:52 +0000
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur02on062e.outbound.protection.outlook.com
 [2a01:111:f400:fe05::62e])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 47ad5f6c-a102-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 07:12:51 +0100 (CET)
Received: from AS9PR06CA0215.eurprd06.prod.outlook.com (2603:10a6:20b:45e::22)
 by AM8PR08MB6339.eurprd08.prod.outlook.com (2603:10a6:20b:317::6)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar
 2022 06:12:24 +0000
Received: from AM5EUR03FT007.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:45e:cafe::87) by AS9PR06CA0215.outlook.office365.com
 (2603:10a6:20b:45e::22) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.20 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:24 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT007.mail.protection.outlook.com (10.152.16.145) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:12:23 +0000
Received: ("Tessian outbound 741ca6c82739:v113");
 Fri, 11 Mar 2022 06:12:23 +0000
Received: from ae69decf3fdd.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 C2D83D3B-8822-4D16-9F53-9D9A93EEF755.1; 
 Fri, 11 Mar 2022 06:12:17 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id ae69decf3fdd.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 11 Mar 2022 06:12:17 +0000
Received: from AS8PR04CA0001.eurprd04.prod.outlook.com (2603:10a6:20b:310::6)
 by VI1PR0802MB2207.eurprd08.prod.outlook.com (2603:10a6:800:9c::11)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.20; Fri, 11 Mar
 2022 06:12:14 +0000
Received: from AM5EUR03FT044.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:310:cafe::a4) by AS8PR04CA0001.outlook.office365.com
 (2603:10a6:20b:310::6) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.23 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:13 +0000
Received: from nebula.arm.com (40.67.248.234) by
 AM5EUR03FT044.mail.protection.outlook.com (10.152.17.56) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:12:13 +0000
Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX04.Arm.com
 (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27; Fri, 11 Mar
 2022 06:12:12 +0000
Received: from a011292.shanghai.arm.com (10.169.190.94) by mail.arm.com
 (10.251.24.32) with Microsoft SMTP Server id 15.1.2308.27 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:10 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 47ad5f6c-a102-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=bU8NQceo5M7S7uNB+SFlZP2PMMWPBqpC6eRiMideGyc=;
 b=DoqDXPA0eJHypZxGSfKZbJTh+MXH310v6E6lz3ap1acAK2fCW8VbITDEJmARSzk8HS7RDu894g/dZwZd+AS0Nf8Q/P4cddpjbqfiED1bY2X7RO/6rkWwfwaCWfIg760mhaKW+DV0lYR55t6Qi1DaK/ByC01f1YitzfZXuNcq3ic=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 9d83c625b8f15de6
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=O9pdQ7chCVD8BMA8INgpDupFWsWqQNUfq7QUWufHDz+QR8LCsnaF/yU2E2ZlbCeh4FpLdHopebq9VQ/TO/H5Q8iN9ztFzCWUpFxTH+oZR8PdZt7pNBYb5k8/XzBjCLiEuubKpv5Fe7p1xJdP1aeqazzpq2qcq7EpQULst9FlJoztnaFQ/0up+isbsmGek917Rw5dDDHqGpnulTdXou+okWAAR0UaUHYCeajXuk47nvL3pUb3IfqQ5RMuacK1aCEtt+upj3/Nr3hFap1ouKY/PnZO3WycdOc7LLV8JFFnw4cV4TGnUrX/2PQKGhBWIZ5KrOJC0OAJKy/xzaV5FF1vrw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=bU8NQceo5M7S7uNB+SFlZP2PMMWPBqpC6eRiMideGyc=;
 b=VHh9/W1KYNP0zTrtMoSHnaKiBAV0yrrjDuVTviVfYjJIIdUxAN8xhOCIMulGSvGUO7L/jYKS0p92HCBvKvqrJ72Wole4B1Wa1rH/wncnHa03USP8zqjLJWMhTtJbFBw7g8aV67Z53ZX0mtpfDiJATT69aMD2oK+s1hFaIy/oRWb3VmjKghJelJOvYRcTijiSm2HCJN5RnOsvY/lam1yBI8SYIBrbansTsALgIMFqx/aiYvLgTzQCuPlI2xmeo+f5PmkfZyNI6tKzQHYsW20GoxYYyPgVkIcSgTze4IwyWQGTV6r8EQZkTpbUoM6MpLIBfJQ7vgQig9OiIYiTs90c1Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 40.67.248.234) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=bU8NQceo5M7S7uNB+SFlZP2PMMWPBqpC6eRiMideGyc=;
 b=DoqDXPA0eJHypZxGSfKZbJTh+MXH310v6E6lz3ap1acAK2fCW8VbITDEJmARSzk8HS7RDu894g/dZwZd+AS0Nf8Q/P4cddpjbqfiED1bY2X7RO/6rkWwfwaCWfIg760mhaKW+DV0lYR55t6Qi1DaK/ByC01f1YitzfZXuNcq3ic=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234)
 smtp.mailfrom=arm.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 40.67.248.234 as permitted sender) receiver=protection.outlook.com;
 client-ip=40.67.248.234; helo=nebula.arm.com;
From: Penny Zheng <Penny.Zheng@arm.com>
To: <xen-devel@lists.xenproject.org>
CC: <nd@arm.com>, Penny Zheng <penny.zheng@arm.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Julien Grall <julien@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH v1 01/13] xen/arm: introduce static shared memory
Date: Fri, 11 Mar 2022 14:11:11 +0800
Message-ID: <20220311061123.1883189-2-Penny.Zheng@arm.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <20220311061123.1883189-1-Penny.Zheng@arm.com>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain
X-EOPAttributedMessage: 1
X-MS-Office365-Filtering-Correlation-Id: 070ca016-3acc-4d1f-c401-08da03261bff
X-MS-TrafficTypeDiagnostic:
	VI1PR0802MB2207:EE_|AM5EUR03FT007:EE_|AM8PR08MB6339:EE_
X-Microsoft-Antispam-PRVS:
	<AM8PR08MB6339E710DDC8DCC1BA53B7AAF70C9@AM8PR08MB6339.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
NoDisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 TOwcCHJ+mhaf8ew7f+NJbY3YrymNNZXPh5I+RUnSGsWEGLDpS0/g4+a/pBbHozyX+CulP8PShD3oSFQEMuYYC+zwgJN9+ZGuiu4FDP70efirkgSaRn8fjFinwFZFB3I81falTKZ+CYFASmHiW0WElVMXzQk0/Tjf5CrJQ5r+U5OvhywppuXnO/TZNNFHvF93Blu7/lmUKoC0adL9CM7E/fXQApiFcGKhQ64nAo79tmTc2jh7Oc8yFMDQtYGcc/Q3hAyPRaNEaltwhTyx4ZICCRhB8dakTTOAI2htLF4Ux4/Y0gymqAU7ppMGdaoAbHdP/m4S2Xmr3a5Mo7CKuwh/H3eBF+2SPWb0nJPZDyFpxUv9BuSWkYSmvK1o832vEEE79yov/snWKg3CfeF3s2fls3hKV5tNNd8rIeeCQu0sCDZUsQcGni4REQcpkqYLg58fjrufupoE7SE91ng2StbEi5+B6rhNkVdg7bv4nJ1lOdMxBjdeHiUwOFr0PfFctjiUCWnBF+7J+O+9fPd4FOJMm7Nf2kt5LpZvv/NaeR/9nTtunWcrLUKNgvTFjpOQSlyei8mZd6zsOcISxn7tQNAZrQ2GIffBbY3oK1kR4AGMiFy9EB8MpZr9NsZlfKFEGFcDXwPgdOxvhFOWlQe819dMucxFTvajQw0sAwQfyLwaMRZ3OgxUCVP1Za85JOCVC1G4IDXhnORUSC3/60BLtbxWsg==
X-Forefront-Antispam-Report-Untrusted:
 CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(83380400001)(186003)(26005)(316002)(8936002)(81166007)(54906003)(336012)(36860700001)(7696005)(356005)(47076005)(40460700003)(82310400004)(426003)(70206006)(4326008)(2906002)(70586007)(86362001)(5660300002)(36756003)(1076003)(2616005)(508600001)(6916009)(8676002)(36900700001);DIR:OUT;SFP:1101;
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0802MB2207
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT007.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	167916f2-5630-48c5-bfbc-08da032615c8
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(47076005)(83380400001)(508600001)(54906003)(5660300002)(82310400004)(8936002)(7696005)(70206006)(36860700001)(2906002)(107886003)(426003)(70586007)(1076003)(8676002)(4326008)(2616005)(336012)(26005)(186003)(86362001)(36756003)(40460700003)(316002)(6916009)(81166007);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 06:12:23.8796
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 070ca016-3acc-4d1f-c401-08da03261bff
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT007.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM8PR08MB6339

From: Penny Zheng <penny.zheng@arm.com>

This patch serie introduces a new feature: setting up static
shared memory on a dom0less system, through device tree configuration.

This commit parses shared memory node at boot-time, and reserve it in
bootinfo.reserved_mem to avoid other use.

Signed-off-by: Penny Zheng <penny.zheng@arm.com>
---
 docs/misc/arm/device-tree/booting.txt | 118 ++++++++++++++++++++++++++
 xen/arch/arm/bootfdt.c                |  52 ++++++++++++
 2 files changed, 170 insertions(+)

diff --git a/docs/misc/arm/device-tree/booting.txt b/docs/misc/arm/device-tree/booting.txt
index a94125394e..f702ade817 100644
--- a/docs/misc/arm/device-tree/booting.txt
+++ b/docs/misc/arm/device-tree/booting.txt
@@ -355,3 +355,121 @@ device-tree:
 
 This will reserve a 512MB region starting at the host physical address
 0x30000000 to be exclusively used by DomU1.
+
+Static Shared Memory
+=============
+
+The static shared memory device tree nodes allow users to statically set up
+shared memory on dom0less system, enabling domains to do shm-based
+communication.
+
+- compatible
+
+    "xen,domain-shared-memory-v1"
+
+- xen,shm-id
+
+    An u8 value represents the unique identifier of the shared memory region.
+    The maximum identifier shall be "xen,shm-id = <0xff>".
+
+- xen,shared-mem
+
+    An array takes a physical address, which is the base address of the
+    shared memory region in host physical address space, a size, and a guest
+    physical address, as the target address of the mapping.
+
+- role (Optional)
+
+    A string property specifying the ownership of a shared memory region,
+    the value must be one of the following: "owner", or "borrower"
+    A shared memory region could be explicitly backed by one domain, which is
+    called "owner domain", and all the other domains who are also sharing
+    this region are called "borrower domain".
+    If not specified, the default value is "borrower" and owner is
+    "dom_shared", a system domain.
+
+As an example:
+
+chosen {
+    #address-cells = <0x1>;
+    #size-cells = <0x1>;
+    xen,xen-bootargs = "console=dtuart dtuart=serial0 bootscrub=0";
+
+    ......
+
+    /* this is for Dom0 */
+    dom0-shared-mem@10000000 {
+        compatible = "xen,domain-shared-memory-v1";
+        role = "owner";
+        xen,shm-id = <0x0>;
+        xen,shared-mem = <0x10000000 0x10000000 0x10000000>;
+    }
+
+    domU1 {
+        compatible = "xen,domain";
+        #address-cells = <0x1>;
+        #size-cells = <0x1>;
+        memory = <0 131072>;
+        cpus = <2>;
+        vpl011;
+
+        /*
+         * shared memory region identified as 0x0(xen,shm-id = <0x0>)
+         * is shared between Dom0 and DomU1.
+         */
+        domU1-shared-mem@10000000 {
+            compatible = "xen,domain-shared-memory-v1";
+            role = "borrower";
+            xen,shm-id = <0x0>;
+            xen,shared-mem = <0x10000000 0x10000000 0x50000000>;
+        }
+
+        /*
+         * shared memory region identified as 0x1(xen,shm-id = <0x1>)
+         * is shared between DomU1 and DomU2.
+         */
+        domU1-shared-mem@50000000 {
+            compatible = "xen,domain-shared-memory-v1";
+            xen,shm-id = <0x1>;
+            xen,shared-mem = <0x50000000 0x20000000 0x60000000>;
+        }
+
+        ......
+
+    };
+
+    domU2 {
+        compatible = "xen,domain";
+        #address-cells = <0x1>;
+        #size-cells = <0x1>;
+        memory = <0 65536>;
+        cpus = <1>;
+
+        /*
+         * shared memory region identified as 0x1(xen,shm-id = <0x1>)
+         * is shared between domU1 and domU2.
+         */
+        domU2-shared-mem@50000000 {
+            compatible = "xen,domain-shared-memory-v1";
+            xen,shm-id = <0x1>;
+            xen,shared-mem = <0x50000000 0x20000000 0x70000000>;
+        }
+
+        ......
+    };
+};
+
+This is an example with two static shared memory regions.
+
+For the static shared memory region identified as 0x0, host physical
+address starting at 0x10000000 of 256MB will be reserved to be shared between
+Dom0 and DomU1.It will get mapped at 0x10000000 in Dom0 guest physical address
+space, and at 0x50000000 in DomU1 guest physical address space. Dom0 is
+explicitly defined as the owner domain, and DomU1 is the borrower domain.
+
+For the static shared memory region identified as 0x1, host physical
+address starting at 0x50000000 of 512MB will be reserved to be shared between
+DomU1 and DomU2. It will get mapped at 0x60000000 in DomU1 guest physical
+address space, and at 0x70000000 in DomU2 guest physical address space. DomU1
+and DomU2 are both the borrower domain, the owner domain is the default owner
+domain dom_shared.
diff --git a/xen/arch/arm/bootfdt.c b/xen/arch/arm/bootfdt.c
index afaa0e249b..7de0f8cea9 100644
--- a/xen/arch/arm/bootfdt.c
+++ b/xen/arch/arm/bootfdt.c
@@ -363,6 +363,56 @@ static int __init process_domain_node(const void *fdt, int node,
                                    size_cells, &bootinfo.reserved_mem, true);
 }
 
+static __initdata DECLARE_BITMAP(shm_mask, NR_MEM_BANKS);
+static int __init process_shm_node(const void *fdt, int node,
+                                   u32 address_cells, u32 size_cells)
+{
+    const struct fdt_property *prop;
+    const __be32 *cell;
+    paddr_t paddr, size;
+    struct meminfo *mem = &bootinfo.reserved_mem;
+    u32 id;
+
+    if ( address_cells < 1 || size_cells < 1 )
+    {
+        printk("fdt: invalid #address-cells or #size-cells for static shared memory node.\n");
+        return -EINVAL;
+    }
+
+    prop = fdt_get_property(fdt, node, "xen,shared-mem", NULL);
+    if ( !prop )
+        return -ENOENT;
+
+    id = device_tree_get_u32(fdt, node, "xen,shm-id", NR_MEM_BANKS);
+    if ( id >= NR_MEM_BANKS )
+        return -EINVAL;
+
+    /*
+     * A shared memory region could be shared between multiple domains. We
+     * use the shm_mask bitmask to prevent iterating over all reserved memory
+     * regions each time.
+     */
+    if ( !test_bit(id, shm_mask) )
+    {
+        /*
+         * xen,shared-mem = <paddr, size, gaddr>;
+         * Memory region starting from physical address #paddr of #size shall
+         * be mapped to guest physical address #gaddr as shared memory region.
+         */
+        cell = (const __be32 *)prop->data;
+        device_tree_get_reg(&cell, address_cells, size_cells, &paddr, &size);
+
+        /* shared memory shall be reserved from other use. */
+        mem->bank[mem->nr_banks].start = paddr;
+        mem->bank[mem->nr_banks].size = size;
+        mem->bank[mem->nr_banks].xen_domain = true;
+        mem->nr_banks++;
+        set_bit(id, shm_mask);
+    }
+
+    return 0;
+}
+
 static int __init early_scan_node(const void *fdt,
                                   int node, const char *name, int depth,
                                   u32 address_cells, u32 size_cells,
@@ -383,6 +433,8 @@ static int __init early_scan_node(const void *fdt,
         process_chosen_node(fdt, node, name, address_cells, size_cells);
     else if ( depth == 2 && device_tree_node_compatible(fdt, node, "xen,domain") )
         rc = process_domain_node(fdt, node, name, address_cells, size_cells);
+    else if ( depth <= 3 && device_tree_node_compatible(fdt, node, "xen,domain-shared-memory-v1") )
+        rc = process_shm_node(fdt, node, address_cells, size_cells);
 
     if ( rc < 0 )
         printk("fdt: node `%s': parsing failed\n", name);
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 06:13:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 06:13:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288730.489766 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYWJ-0003Qq-CV; Fri, 11 Mar 2022 06:12:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288730.489766; Fri, 11 Mar 2022 06:12:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYWJ-0003Og-3G; Fri, 11 Mar 2022 06:12:59 +0000
Received: by outflank-mailman (input) for mailman id 288730;
 Fri, 11 Mar 2022 06:12:58 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=p7td=TW=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nSYWI-0000Fh-2k
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 06:12:58 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04on062b.outbound.protection.outlook.com
 [2a01:111:f400:fe0c::62b])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4b9893b1-a102-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 07:12:57 +0100 (CET)
Received: from AS9PR0301CA0029.eurprd03.prod.outlook.com
 (2603:10a6:20b:468::10) by AM9PR08MB7242.eurprd08.prod.outlook.com
 (2603:10a6:20b:431::11) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Fri, 11 Mar
 2022 06:12:55 +0000
Received: from VE1EUR03FT055.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:468:cafe::9c) by AS9PR0301CA0029.outlook.office365.com
 (2603:10a6:20b:468::10) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.23 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:55 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT055.mail.protection.outlook.com (10.152.19.158) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:12:54 +0000
Received: ("Tessian outbound 18e50a6f0513:v113");
 Fri, 11 Mar 2022 06:12:54 +0000
Received: from 94a5c30b510f.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 62079C2C-621B-4092-BC66-B8A5B84068C8.1; 
 Fri, 11 Mar 2022 06:12:48 +0000
Received: from EUR01-DB5-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 94a5c30b510f.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 11 Mar 2022 06:12:48 +0000
Received: from AS9PR06CA0202.eurprd06.prod.outlook.com (2603:10a6:20b:45d::32)
 by AM0PR08MB3538.eurprd08.prod.outlook.com (2603:10a6:208:de::29)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.19; Fri, 11 Mar
 2022 06:12:45 +0000
Received: from VE1EUR03FT029.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:45d:cafe::35) by AS9PR06CA0202.outlook.office365.com
 (2603:10a6:20b:45d::32) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.20 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:45 +0000
Received: from nebula.arm.com (40.67.248.234) by
 VE1EUR03FT029.mail.protection.outlook.com (10.152.18.107) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:12:40 +0000
Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX03.Arm.com
 (10.251.24.31) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27; Fri, 11 Mar
 2022 06:12:37 +0000
Received: from a011292.shanghai.arm.com (10.169.190.94) by mail.arm.com
 (10.251.24.32) with Microsoft SMTP Server id 15.1.2308.27 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:35 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4b9893b1-a102-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=QR0uJjdb78Gry1GYCYAG5IJdQ9AYTo5LJTpZNi0Eqhs=;
 b=FYgLgsUZUv+JJpq18/N0tth/RcX5GPbaGpcKI74v4AC5yJWrmuy3PH9/7FvPTiBo97d91FbqhuyJn5uaNx0SliX3BIyG66gUr+ozFJQm12dYjo/Wza0tbhcnQwaFj/hR+dw7RtGafNDbLz164L/QDPRG+m89NhoDDx0jy0i0/O8=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 4548e821d9660e39
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=oHu5dKgOJ+pgs8bNfw/cSrIDupk6kfjdTGZDEyT/Wl9H7QUCSOZvzEPvy4KZ6djM90bskw67q3fuNIm/g2Q3Yi9zteaWZR2M02ryl8utJR40ooJoWoEW5wbnOFaC4F2XYQSh/ytqM1agPb1QSiZWPlU1QALOjkqMmeg9wLcwRvh18ajfs40ifSL8kXWWMkDgT4ZvcCFwDVZyKsHMqA4U1yOfGlPDzJRXiW4Q4tqFg4t9E74vK/GnFoX+0x+xn5m2yY0Ozooh0qo11GUAOKcL3nZQpQx9DAz1Ck+1FEuF45AnntY8xOx4z62IG8nAglLDVQXWwBMly2VBcyQdKc5ZCw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=QR0uJjdb78Gry1GYCYAG5IJdQ9AYTo5LJTpZNi0Eqhs=;
 b=XraXeDJXZ/zfLgwdOHGgrydQjBK7N2CXPqdy5XwAGnccLRNcaOWO/EkRSRzZM1VnB0E5Ui/1IZ8T+GrHkPi2zkXnybtw2wN1231xEgmYrfkv7zWgXoLAmJQyZKimMDtDYSidvK07DZvM1pXlNWrTpd6ro9GDh6ACtFVf/0HGv8lUPvb8ATguRaih7o0uqZIQvRlkBIDtDoEerL7TthysMqXXgLWXuRBOSBX6FFf4L9dslSAcYSM0w7Uu+AvQSVYmylXsuaNRh8XdCtiW8q1uPkGN/3PNHOFIF9I2Y6fP1q705quWnHNUeEwcoU/ErWKnZN8A2EdAbAaZRSYpO5gA3g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 40.67.248.234) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=QR0uJjdb78Gry1GYCYAG5IJdQ9AYTo5LJTpZNi0Eqhs=;
 b=FYgLgsUZUv+JJpq18/N0tth/RcX5GPbaGpcKI74v4AC5yJWrmuy3PH9/7FvPTiBo97d91FbqhuyJn5uaNx0SliX3BIyG66gUr+ozFJQm12dYjo/Wza0tbhcnQwaFj/hR+dw7RtGafNDbLz164L/QDPRG+m89NhoDDx0jy0i0/O8=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234)
 smtp.mailfrom=arm.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 40.67.248.234 as permitted sender) receiver=protection.outlook.com;
 client-ip=40.67.248.234; helo=nebula.arm.com;
From: Penny Zheng <Penny.Zheng@arm.com>
To: <xen-devel@lists.xenproject.org>
CC: <nd@arm.com>, Penny Zheng <penny.zheng@arm.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Julien Grall <julien@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH v1 10/13] xen/arm: allocate static shared memory to a specific owner domain
Date: Fri, 11 Mar 2022 14:11:20 +0800
Message-ID: <20220311061123.1883189-11-Penny.Zheng@arm.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <20220311061123.1883189-1-Penny.Zheng@arm.com>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain
X-EOPAttributedMessage: 1
X-MS-Office365-Filtering-Correlation-Id: b5f6e165-4fe1-48a7-322f-08da03262e71
X-MS-TrafficTypeDiagnostic:
	AM0PR08MB3538:EE_|VE1EUR03FT055:EE_|AM9PR08MB7242:EE_
X-Microsoft-Antispam-PRVS:
	<AM9PR08MB7242E63D458A4FEE88519FFDF70C9@AM9PR08MB7242.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
NoDisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(54906003)(1076003)(356005)(82310400004)(6916009)(316002)(2616005)(7696005)(5660300002)(81166007)(8676002)(83380400001)(8936002)(6666004)(336012)(426003)(508600001)(86362001)(47076005)(4326008)(36860700001)(36756003)(40460700003)(186003)(2906002)(70586007)(26005)(70206006)(36900700001);DIR:OUT;SFP:1101;
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB3538
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT055.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	3bd64e54-2636-42ae-3e63-08da032625a7
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(8936002)(70586007)(2906002)(508600001)(316002)(36756003)(186003)(82310400004)(426003)(6666004)(7696005)(2616005)(26005)(1076003)(107886003)(47076005)(40460700003)(83380400001)(336012)(8676002)(70206006)(54906003)(4326008)(6916009)(36860700001)(5660300002)(81166007)(86362001);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 06:12:54.8063
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: b5f6e165-4fe1-48a7-322f-08da03262e71
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT055.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR08MB7242

From: Penny Zheng <penny.zheng@arm.com>

If owner property is defined, then owner domain of a static shared memory
region is not the default dom_shared anymore, but a specific domain.

This commit implements allocating static shared memory to a specific domain
when owner property is defined.

Signed-off-by: Penny Zheng <penny.zheng@arm.com>
---
 xen/arch/arm/domain_build.c | 63 ++++++++++++++++++++++++++++---------
 1 file changed, 48 insertions(+), 15 deletions(-)

diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index d35f98ff9c..7ee4d33e0b 100644
--- a/xen/arch/arm/domain_build.c
+++ b/xen/arch/arm/domain_build.c
@@ -872,6 +872,8 @@ static int __init process_shm(struct domain *d,
     u32 shm_id;
     u32 addr_cells, size_cells;
     paddr_t gbase, pbase, psize;
+    const char *role_str;
+    bool owner_dom_shared = true;
 
     dt_for_each_child_node(node, shm_node)
     {
@@ -899,6 +901,13 @@ static int __init process_shm(struct domain *d,
         gbase = dt_read_number(cells, addr_cells);
 
         /* TODO: Consider owner domain is not the default dom_shared. */
+        /*
+         * "role" property is optional and if it is defined explicitly,
+         * so the owner domain is not the default "dom_shared" domain.
+         */
+        if ( dt_property_read_string(shm_node, "role", &role_str) == 0 )
+            owner_dom_shared = false;
+
         /*
          * Per shared memory region could be shared between multiple domains.
          * In case re-allocating the same shared memory region, we use bitmask
@@ -907,17 +916,38 @@ static int __init process_shm(struct domain *d,
          */
         if ( !test_bit(shm_id, shm_mask) )
         {
-            /*
-             * Allocate statically shared pages to the default dom_shared.
-             * Set up P2M, and dom_shared is a direct-map domain,
-             * so GFN == PFN.
-             */
-            ret = allocate_shared_memory(dom_shared, addr_cells, size_cells,
-                                         pbase, psize, pbase);
-            if ( ret )
-                return ret;
-
-            set_bit(shm_id, shm_mask);
+            if ( !owner_dom_shared )
+            {
+                if ( strcmp(role_str, "owner") == 0 )
+                {
+                    /*
+                     * Allocate statically shared pages to a specific owner
+                     * domain.
+                     */
+                    ret = allocate_shared_memory(d, shm_id, addr_cells,
+                                                 size_cells, pbase, psize,
+                                                 gbase);
+                    if ( ret )
+                        return ret;
+
+                    set_bit(shm_id, shm_mask);
+                }
+            }
+            else
+            {
+                /*
+                 * Allocate statically shared pages to the default dom_shared.
+                 * Set up P2M, and dom_shared is a direct-map domain,
+                 * so GFN == PFN.
+                 */
+                ret = allocate_shared_memory(dom_shared, shm_id,
+                                             addr_cells, size_cells, pbase,
+                                             psize, pbase);
+                if ( ret )
+                    return ret;
+
+                set_bit(shm_id, shm_mask);
+            }
         }
 
         /*
@@ -925,10 +955,13 @@ static int __init process_shm(struct domain *d,
          * default dom_shared, so here we could just set up P2M foreign
          * mapping for borrower domain immediately.
          */
-        ret = guest_physmap_add_shm(dom_shared, d, PFN_DOWN(pbase),
-                                    PFN_DOWN(gbase), PFN_DOWN(psize));
-        if ( ret )
-            return ret;
+        if ( owner_dom_shared )
+        {
+            ret = guest_physmap_add_shm(dom_shared, d, PFN_DOWN(pbase),
+                                        PFN_DOWN(gbase), PFN_DOWN(psize));
+            if ( ret )
+                return ret;
+        }
 
         /*
          * Record static shared memory region info for later setting
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 06:16:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 06:16:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288754.489784 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYZd-0006lF-1Q; Fri, 11 Mar 2022 06:16:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288754.489784; Fri, 11 Mar 2022 06:16:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYZc-0006l8-Ua; Fri, 11 Mar 2022 06:16:24 +0000
Received: by outflank-mailman (input) for mailman id 288754;
 Fri, 11 Mar 2022 06:16:23 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=p7td=TW=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nSYWf-0000Fh-78
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 06:13:21 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on2062b.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::62b])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 592b729e-a102-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 07:13:20 +0100 (CET)
Received: from AM6P194CA0013.EURP194.PROD.OUTLOOK.COM (2603:10a6:209:90::26)
 by AM5PR0801MB2066.eurprd08.prod.outlook.com (2603:10a6:203:4d::13) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.21; Fri, 11 Mar
 2022 06:13:18 +0000
Received: from AM5EUR03FT056.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:90:cafe::cb) by AM6P194CA0013.outlook.office365.com
 (2603:10a6:209:90::26) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22 via Frontend
 Transport; Fri, 11 Mar 2022 06:13:18 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT056.mail.protection.outlook.com (10.152.17.224) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:13:17 +0000
Received: ("Tessian outbound 826a6d8e58c3:v113");
 Fri, 11 Mar 2022 06:13:17 +0000
Received: from 27ab5dd389c2.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 4DE4BD2A-E33F-4D7F-AFC3-710EB1AAD2E0.1; 
 Fri, 11 Mar 2022 06:13:11 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 27ab5dd389c2.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 11 Mar 2022 06:13:11 +0000
Received: from AS9PR0301CA0019.eurprd03.prod.outlook.com
 (2603:10a6:20b:468::29) by PR2PR08MB4828.eurprd08.prod.outlook.com
 (2603:10a6:101:1d::14) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.17; Fri, 11 Mar
 2022 06:13:08 +0000
Received: from VE1EUR03FT055.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:468:cafe::68) by AS9PR0301CA0019.outlook.office365.com
 (2603:10a6:20b:468::29) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22 via Frontend
 Transport; Fri, 11 Mar 2022 06:13:08 +0000
Received: from nebula.arm.com (40.67.248.234) by
 VE1EUR03FT055.mail.protection.outlook.com (10.152.19.158) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:13:08 +0000
Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX03.Arm.com
 (10.251.24.31) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27; Fri, 11 Mar
 2022 06:12:46 +0000
Received: from a011292.shanghai.arm.com (10.169.190.94) by mail.arm.com
 (10.251.24.32) with Microsoft SMTP Server id 15.1.2308.27 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 592b729e-a102-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=a4JLEIb5PBTxY4a54x6twnAqTQYE+B3WX7UNftnFy/Y=;
 b=dj9yzVYyBVjCMIERbmslJLiETmw0UyMzqzZbme4El0PaZDLXw/DAZL71uJ+7S29XDaHbs1FJBrPpoK8JbeQuz5R0bEB2+Kc61nAmkKnev0lbOvtpgZVGzmsvRvZlCEuvEhATPmnfsWtSIjyhFc0DIyDCBGOHgiizswE+lMSkWj4=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 93567b3a7281382f
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=AiKndQNN58ZHsVaj3z8ySMKYedS5Vl9IFXeO8xgYkdV5gsnODpGJpvIn+CcdefVsmByU6tWfS9j6Htghq7vLSPh5A2YB1ZD7wRwnoGBkAP8bhLyRIqhAmEhYuSQeCGgfWMweWRr25/DFh/BmQUuaxcZl6X5A8lXYKXur+HbSiwzG4OI72BgF+AOODq3+VfrdRY+d7fM90HsArq+vysOTUqiTRsFUiz6HjSMIEPl9n/CnM6iYgwmy3PAlF3txB+CsImJvN41jyDSseB6e8OIZdH/pBeydy1FpNnUY5juo8LCarDKtOxXALpnxJ6MgTQIoiwnU5QC5r9/Z7ok8iKVUZQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=a4JLEIb5PBTxY4a54x6twnAqTQYE+B3WX7UNftnFy/Y=;
 b=CnDeoL7KRuf3AES+KHlb8NEtpPl4OykRncA5pUO+Dql6iWpYiuH1Hr+n+va+wIjo65guJvg0b9NdDg4966XYss+OyCeKop7rIVZqmW2ulSsXiz8lcWHvrDEEW67hNyNIMfVI/yvpFYHwHxT9wGEPELjraE9fnRNYBo6uBCUHcf2CF2BUXbwnEpcfH7XASJq1sEqjy/ImZr115DcBcc2muhe20u53fAeWaefXAvFcZOnwhQrGMDusFAviDpt0YYbkzICzJE8z6HJlOzF+ZAvySsYm+0fJuUplXiy2Npzi8oZTR76NUjsgeA69AQLF5t2OXFgNxhWltkoEFEz+7LsKxA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 40.67.248.234) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=a4JLEIb5PBTxY4a54x6twnAqTQYE+B3WX7UNftnFy/Y=;
 b=dj9yzVYyBVjCMIERbmslJLiETmw0UyMzqzZbme4El0PaZDLXw/DAZL71uJ+7S29XDaHbs1FJBrPpoK8JbeQuz5R0bEB2+Kc61nAmkKnev0lbOvtpgZVGzmsvRvZlCEuvEhATPmnfsWtSIjyhFc0DIyDCBGOHgiizswE+lMSkWj4=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234)
 smtp.mailfrom=arm.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 40.67.248.234 as permitted sender) receiver=protection.outlook.com;
 client-ip=40.67.248.234; helo=nebula.arm.com;
From: Penny Zheng <Penny.Zheng@arm.com>
To: <xen-devel@lists.xenproject.org>
CC: <nd@arm.com>, Penny Zheng <penny.zheng@arm.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Julien Grall <julien@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH v1 13/13] xen/arm: unmap foreign memory mapping when destroyed domain is owner domain
Date: Fri, 11 Mar 2022 14:11:23 +0800
Message-ID: <20220311061123.1883189-14-Penny.Zheng@arm.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <20220311061123.1883189-1-Penny.Zheng@arm.com>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain
X-EOPAttributedMessage: 1
X-MS-Office365-Filtering-Correlation-Id: 964922e8-f03b-4b19-64b4-08da03263c04
X-MS-TrafficTypeDiagnostic:
	PR2PR08MB4828:EE_|AM5EUR03FT056:EE_|AM5PR0801MB2066:EE_
X-Microsoft-Antispam-PRVS:
	<AM5PR0801MB2066B9BABC5D139E213FE094F70C9@AM5PR0801MB2066.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
NoDisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(70586007)(8676002)(70206006)(7696005)(6666004)(508600001)(4326008)(6916009)(316002)(54906003)(83380400001)(36860700001)(82310400004)(336012)(26005)(40460700003)(186003)(1076003)(2616005)(2906002)(356005)(426003)(81166007)(47076005)(8936002)(86362001)(5660300002)(36756003)(36900700001);DIR:OUT;SFP:1101;
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PR2PR08MB4828
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT056.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	7f97ff42-c75f-49ee-5d59-08da0326364d
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(7696005)(6916009)(186003)(2616005)(70586007)(316002)(36756003)(26005)(40460700003)(86362001)(1076003)(54906003)(107886003)(8936002)(5660300002)(336012)(83380400001)(426003)(2906002)(508600001)(6666004)(47076005)(36860700001)(8676002)(4326008)(82310400004)(70206006)(81166007);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 06:13:17.6254
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 964922e8-f03b-4b19-64b4-08da03263c04
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT056.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0801MB2066

From: Penny Zheng <penny.zheng@arm.com>

When destroyed domain is an owner domain of a static shared memory
region, then we need to ensure that all according borrower domains
shall not have the access to this static shared memory region too.

This commit covers above scenario through unmapping all borrowers'
according foreign memory mapping when destroyed domain is a owner
domain of a static shared memory region.

NOTE: It will best for users to destroy all borrowers before the owner
domain in case encountering data abort when accidentally accessing
the static shared memory region.

Signed-off-by: Penny Zheng <penny.zheng@arm.com>
---
 xen/arch/arm/domain.c | 88 ++++++++++++++++++++++++++++++++++---------
 1 file changed, 71 insertions(+), 17 deletions(-)

diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
index 73ffbfb918..8f4a8dcbfc 100644
--- a/xen/arch/arm/domain.c
+++ b/xen/arch/arm/domain.c
@@ -998,10 +998,39 @@ static int relinquish_memory(struct domain *d, struct page_list_head *list)
 }
 
 #ifdef CONFIG_STATIC_SHM
+static int destroy_shm(struct domain *d, gfn_t gfn, unsigned long nr_gfns)
+{
+    unsigned long i = 0;
+    int ret = 0;
+
+    for ( ; i < nr_gfns; i++ )
+    {
+        mfn_t mfn;
+
+        mfn = gfn_to_mfn(d, gfn_add(gfn, i));
+        if ( !mfn_valid(mfn) )
+        {
+            dprintk(XENLOG_ERR,
+                    "Domain %pd page number %lx invalid.\n",
+                    d, gfn_x(gfn) + i);
+            return -EINVAL;
+        }
+
+        ret = guest_physmap_remove_page(d, gfn_add(gfn, i), mfn, 0);
+        if ( ret )
+            return ret;
+
+        /* Drop the reference. */
+        put_page(mfn_to_page(mfn));
+    }
+
+    return ret;
+}
+
 static int domain_destroy_shm(struct domain *d)
 {
     int ret = 0;
-    unsigned long i = 0UL, j;
+    unsigned long i = 0UL;
 
     if ( d->arch.shm_mem == NULL )
         return ret;
@@ -1009,29 +1038,54 @@ static int domain_destroy_shm(struct domain *d)
     {
         for ( ; i < d->arch.shm_mem->nr_banks; i++ )
         {
+            u32 shm_id = d->arch.shm_mem->bank[i].shm_id;
             unsigned long nr_gfns = PFN_DOWN(d->arch.shm_mem->bank[i].size);
             gfn_t gfn = gaddr_to_gfn(d->arch.shm_mem->bank[i].start);
 
-            for ( j = 0; j < nr_gfns; j++ )
+            if ( test_bit(shm_id, shm_list_mask) )
             {
-                mfn_t mfn;
-
-                mfn = gfn_to_mfn(d, gfn_add(gfn, j));
-                if ( !mfn_valid(mfn) )
+                domid_t od = shm_list[shm_id].owner_dom;
+                unsigned long j;
+                /*
+                 * If it is a owner domain, then after it gets destroyed,
+                 * static shared memory region shall be unaccessible to all
+                 * borrower domains too.
+                 */
+                if ( d->domain_id == od )
                 {
-                    dprintk(XENLOG_ERR,
-                            "Domain %pd page number %lx invalid.\n",
-                            d, gfn_x(gfn) + i);
-                    return -EINVAL;
+                    struct domain *bd;
+
+                    for ( j = 0; j < shm_list[shm_id].nr_borrower; j++ )
+                    {
+                        bd = get_domain_by_id(shm_list[shm_id].borrower_dom[j]);
+                        /*
+                         * borrower domain could be dead already, in such case
+                         * no need to do the unmapping.
+                         */
+                        if ( bd != NULL )
+                        {
+                            gfn_t b_gfn = gaddr_to_gfn(
+                                          shm_list[shm_id].borrower_gbase[j]);
+                            ret = destroy_shm(bd, b_gfn, nr_gfns);
+                            if ( ret )
+                                dprintk(XENLOG_ERR,
+                                        "Domain %pd: failed to destroy static shared memory.\n",
+                                        bd);
+                        }
+                    }
+
+                    continue;
                 }
-
-                ret = guest_physmap_remove_page(d, gfn_add(gfn, j), mfn, 0);
-                if ( ret )
-                    return ret;
-
-                /* Drop the reference. */
-                put_page(mfn_to_page(mfn));
             }
+            /*
+             * As borrower domain, remove foreign memory mapping and drop the
+             * reference count.
+             */
+            ret = destroy_shm(d, gfn, nr_gfns);
+            if ( ret )
+                dprintk(XENLOG_ERR,
+                        "Domain %pd: failed to destroy static shared memory.\n",
+                        d);
         }
     }
 
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 06:16:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 06:16:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288759.489795 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYZf-00072M-Do; Fri, 11 Mar 2022 06:16:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288759.489795; Fri, 11 Mar 2022 06:16:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYZf-00072D-AU; Fri, 11 Mar 2022 06:16:27 +0000
Received: by outflank-mailman (input) for mailman id 288759;
 Fri, 11 Mar 2022 06:16:26 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=p7td=TW=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nSYWO-0008Q3-Gn
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 06:13:04 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05on20605.outbound.protection.outlook.com
 [2a01:111:f400:7d00::605])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4ea01581-a102-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 07:13:02 +0100 (CET)
Received: from AS9PR04CA0107.eurprd04.prod.outlook.com (2603:10a6:20b:50e::19)
 by AM8PR08MB6433.eurprd08.prod.outlook.com (2603:10a6:20b:36b::24)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.15; Fri, 11 Mar
 2022 06:12:58 +0000
Received: from VE1EUR03FT010.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:50e:cafe::fc) by AS9PR04CA0107.outlook.office365.com
 (2603:10a6:20b:50e::19) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.24 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:58 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT010.mail.protection.outlook.com (10.152.18.113) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:12:57 +0000
Received: ("Tessian outbound 341d209a0e52:v113");
 Fri, 11 Mar 2022 06:12:57 +0000
Received: from 72911b43b740.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 D503CA3B-063E-4A24-9456-542ADE790B96.1; 
 Fri, 11 Mar 2022 06:12:50 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 72911b43b740.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 11 Mar 2022 06:12:50 +0000
Received: from AS9PR06CA0209.eurprd06.prod.outlook.com (2603:10a6:20b:45d::14)
 by AS8PR08MB6744.eurprd08.prod.outlook.com (2603:10a6:20b:397::10)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.17; Fri, 11 Mar
 2022 06:12:49 +0000
Received: from VE1EUR03FT029.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:45d:cafe::a2) by AS9PR06CA0209.outlook.office365.com
 (2603:10a6:20b:45d::14) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:49 +0000
Received: from nebula.arm.com (40.67.248.234) by
 VE1EUR03FT029.mail.protection.outlook.com (10.152.18.107) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:12:49 +0000
Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX03.Arm.com
 (10.251.24.31) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27; Fri, 11 Mar
 2022 06:12:40 +0000
Received: from a011292.shanghai.arm.com (10.169.190.94) by mail.arm.com
 (10.251.24.32) with Microsoft SMTP Server id 15.1.2308.27 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4ea01581-a102-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=GHzNODlA8XFx6CtjhuogInLZztAvYsmJNbcr6OVan/s=;
 b=Y/1NVxZ1E5Mc/sCB41/i3FsXtlVVTLHavshd+Mc28BQ3lzYpVWz9Cfd4V0zTI7zxBZ+3hFl6hidGH+kQEFIRfbxtL9o0Kqa+u4ph90tF81ZiuqJCOzv9Jorb3OjYs9oU5FGtENR1IVCFqQMtkakuxX8Tz1SBIxQMPnkcPxn877M=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 1c88ce1e8792f6c7
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=nHjZnPQGR6vT2b//6gT3RJ7a4mApyEWbIMoiX1lBiyY+gDhxj9IPlgL8z0nB0qGetNlZFWcjqRg7N/EFkXdQ/+U2hGzbwf2PZc3TdZBgIXltredigv+hDI19Ny7KsI9pGBk5V41kST4m/vkRDUVRSY63T8u+8QBcbyvvbvkuAaQGoUu94kqGztXUygIrO6/PdTcnBj+V2olKy7Wbj4UYyRkb5GCiif/ELydsoxZ/2ujh6C7gnmYDKWgB6Q15iTvQD/1ikgjZCMcYYkcuP6zBLhgAgDfrP3Hmg1Jm98PdcAjy9ZCRePbMcVC0q3oKP3WPblK0+q3DVzwnZkvlmxeQ9g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=GHzNODlA8XFx6CtjhuogInLZztAvYsmJNbcr6OVan/s=;
 b=PvLWA++5/l1ZqLySqabS7OTUcUqYWPpp4t1aAdJdDY7A+YfYZXFckd1V7HkbrhU1qtf3Q/dzQDNEuf4mOO12QRRDM6ihljz6AxsdEYECOu7eDwYZh3aJ7dnNT0sQRH0c7gxI68YUrhpeNTJVrQsj0KHfs154iKo4fpuHEvamzOErEhDKkiHSUobl1c2NhprPVum8SeIasiJKLLaTgir85K6iV4Chz6TcDOm+fDO7iLQTGE/z3EMVxxYnRT0H/ihKb+hYEIfXoyPUu260vBAs09eNXdQyCVmSfhB+sa6FELZu1LDK5wJpgbzyugoSPJ9fshyl6iFrvvCTMmbADHj1PQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 40.67.248.234) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=GHzNODlA8XFx6CtjhuogInLZztAvYsmJNbcr6OVan/s=;
 b=Y/1NVxZ1E5Mc/sCB41/i3FsXtlVVTLHavshd+Mc28BQ3lzYpVWz9Cfd4V0zTI7zxBZ+3hFl6hidGH+kQEFIRfbxtL9o0Kqa+u4ph90tF81ZiuqJCOzv9Jorb3OjYs9oU5FGtENR1IVCFqQMtkakuxX8Tz1SBIxQMPnkcPxn877M=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234)
 smtp.mailfrom=arm.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 40.67.248.234 as permitted sender) receiver=protection.outlook.com;
 client-ip=40.67.248.234; helo=nebula.arm.com;
From: Penny Zheng <Penny.Zheng@arm.com>
To: <xen-devel@lists.xenproject.org>
CC: <nd@arm.com>, Penny Zheng <penny.zheng@arm.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Julien Grall <julien@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH v1 11/13] xen/arm: store shm-info for deferred foreign memory map
Date: Fri, 11 Mar 2022 14:11:21 +0800
Message-ID: <20220311061123.1883189-12-Penny.Zheng@arm.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <20220311061123.1883189-1-Penny.Zheng@arm.com>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain
X-EOPAttributedMessage: 1
X-MS-Office365-Filtering-Correlation-Id: 6d96fbbe-a24b-4f3d-ed69-08da03263036
X-MS-TrafficTypeDiagnostic:
	AS8PR08MB6744:EE_|VE1EUR03FT010:EE_|AM8PR08MB6433:EE_
X-Microsoft-Antispam-PRVS:
	<AM8PR08MB64339A8AF19AFDFBE5B30E69F70C9@AM8PR08MB6433.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
NoDisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(47076005)(83380400001)(508600001)(5660300002)(82310400004)(8936002)(6666004)(7696005)(70206006)(36860700001)(2906002)(70586007)(426003)(4326008)(8676002)(1076003)(2616005)(336012)(186003)(26005)(86362001)(36756003)(40460700003)(316002)(356005)(81166007)(6916009)(54906003)(36900700001);DIR:OUT;SFP:1101;
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR08MB6744
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT010.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	efc1c244-41de-4514-78b9-08da03262b04
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(7696005)(6666004)(2616005)(186003)(36860700001)(107886003)(26005)(1076003)(426003)(82310400004)(336012)(83380400001)(36756003)(2906002)(8936002)(5660300002)(40460700003)(8676002)(47076005)(4326008)(54906003)(6916009)(316002)(508600001)(70206006)(70586007)(86362001)(81166007);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 06:12:57.7799
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 6d96fbbe-a24b-4f3d-ed69-08da03263036
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT010.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM8PR08MB6433

From: Penny Zheng <penny.zheng@arm.com>

In a few scenarios where owner domain, is defined after borrower domain in
device tree configuration, then statically shared pages haven't been properly
allocated if borrower domain tries to do foreign memory map during
domain construction.

In order to cover such scenario, we defer all borrower domains' foreign
memory map after all domain construction finished, then only need to store
shm-info during domain construction.

Signed-off-by: Penny Zheng <penny.zheng@arm.com>
---
 xen/arch/arm/domain.c             |  3 +++
 xen/arch/arm/domain_build.c       | 34 ++++++++++++++++++++++++++++++-
 xen/arch/arm/include/asm/domain.h | 25 +++++++++++++++++++++++
 3 files changed, 61 insertions(+), 1 deletion(-)

diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
index f0bfd67fe5..73ffbfb918 100644
--- a/xen/arch/arm/domain.c
+++ b/xen/arch/arm/domain.c
@@ -47,6 +47,9 @@ DEFINE_PER_CPU(struct vcpu *, curr_vcpu);
 
 #ifdef CONFIG_STATIC_SHM
 struct domain *__read_mostly dom_shared;
+
+shm_info_t shm_list[NR_MEM_BANKS];
+DECLARE_BITMAP(shm_list_mask, NR_MEM_BANKS);
 #endif
 
 static void do_idle(void)
diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index 7ee4d33e0b..4b19160674 100644
--- a/xen/arch/arm/domain_build.c
+++ b/xen/arch/arm/domain_build.c
@@ -771,7 +771,7 @@ static mfn_t __init acquire_shared_memory_bank(struct domain *d,
 
 }
 
-static int __init allocate_shared_memory(struct domain *d,
+static int __init allocate_shared_memory(struct domain *d, u32 shm_id,
                                          u32 addr_cells, u32 size_cells,
                                          paddr_t pbase, paddr_t psize,
                                          paddr_t gbase)
@@ -795,6 +795,18 @@ static int __init allocate_shared_memory(struct domain *d,
         return ret;
     }
 
+    /*
+     * If owner domain is not default dom_shared, shm-info of owner domain
+     * shall also be recorded for later deferred foreign memory map.
+     */
+    if ( d != dom_shared )
+    {
+        shm_list[shm_id].owner_dom = d->domain_id;
+        shm_list[shm_id].owner_gbase = gbase;
+        shm_list[shm_id].size = psize;
+        set_bit(shm_id, shm_list_mask);
+    }
+
     return ret;
 }
 
@@ -962,6 +974,26 @@ static int __init process_shm(struct domain *d,
             if ( ret )
                 return ret;
         }
+        else
+        {
+            if ( strcmp(role_str, "borrower") == 0 )
+            {
+                /*
+                 * In a few scenarios where owner domain, is defined after
+                 * borrower domain in device tree configuration, statically
+                 * shared pages haven't been properly allocated if borrower
+                 * domain here tries to do foreign memory map.
+                 * In order to cover such scenario, we defer all borrower
+                 * domains'foreign memory map after all domain construction
+                 * finished, and only store shm-info here for later use.
+                 */
+                shm_list[shm_id].borrower_dom[shm_list[shm_id].nr_borrower] =
+                                                                d->domain_id;
+                shm_list[shm_id].borrower_gbase[shm_list[shm_id].nr_borrower] =
+                                                                gbase;
+                shm_list[shm_id].nr_borrower++;
+            }
+        }
 
         /*
          * Record static shared memory region info for later setting
diff --git a/xen/arch/arm/include/asm/domain.h b/xen/arch/arm/include/asm/domain.h
index 6df37d2c46..1c0f2e22ca 100644
--- a/xen/arch/arm/include/asm/domain.h
+++ b/xen/arch/arm/include/asm/domain.h
@@ -10,6 +10,7 @@
 #include <asm/gic.h>
 #include <asm/vgic.h>
 #include <asm/vpl011.h>
+#include <asm/setup.h>
 #include <public/hvm/params.h>
 
 struct hvm_domain
@@ -33,6 +34,30 @@ enum domain_type {
 
 #ifdef CONFIG_STATIC_SHM
 extern struct domain *dom_shared;
+
+/* Maximum number of borrower domains. */
+#define NR_SHM_DOMAIN 32
+/*
+ * shm_list is indexed by unique identifier "xen,shm-id", but it only stores
+ * a subset of static shared memory regions, of which owner domain is not the
+ * default dom_shared.
+ * shm_list_mask bitmask is to record the position of these static shared
+ * memory regions.
+ * Per bit represents a entry in shm_list, and setting it 1 means the
+ * static shared memory region here is owned by a specific domain, then bit 0
+ * means the static shared memory region here is either owned by the default
+ * dom_shared or no static shared memory region here at all.
+ */
+typedef struct {
+    domid_t owner_dom;
+    paddr_t owner_gbase;
+    paddr_t size;
+    domid_t borrower_dom[NR_SHM_DOMAIN];
+    paddr_t borrower_gbase[NR_SHM_DOMAIN];
+    unsigned long nr_borrower;
+} shm_info_t;
+extern shm_info_t shm_list[NR_MEM_BANKS];
+extern unsigned long shm_list_mask[BITS_TO_LONGS(NR_MEM_BANKS)];
 #else
 #define dom_shared NULL
 #endif
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 06:16:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 06:16:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288773.489806 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYZx-0007lo-Nz; Fri, 11 Mar 2022 06:16:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288773.489806; Fri, 11 Mar 2022 06:16:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSYZx-0007lD-K9; Fri, 11 Mar 2022 06:16:45 +0000
Received: by outflank-mailman (input) for mailman id 288773;
 Fri, 11 Mar 2022 06:16:44 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=p7td=TW=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nSYWS-0008Q3-Cy
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 06:13:08 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05on2062b.outbound.protection.outlook.com
 [2a01:111:f400:7d00::62b])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 511f6752-a102-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 07:13:07 +0100 (CET)
Received: from AM5PR1001CA0021.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:206:2::34)
 by DB7PR08MB3067.eurprd08.prod.outlook.com (2603:10a6:5:1d::21) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.16; Fri, 11 Mar
 2022 06:13:02 +0000
Received: from VE1EUR03FT019.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:206:2:cafe::10) by AM5PR1001CA0021.outlook.office365.com
 (2603:10a6:206:2::34) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.20 via Frontend
 Transport; Fri, 11 Mar 2022 06:13:02 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT019.mail.protection.outlook.com (10.152.18.153) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:13:01 +0000
Received: ("Tessian outbound 18e50a6f0513:v113");
 Fri, 11 Mar 2022 06:13:01 +0000
Received: from e580bba4a969.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 B64F63F4-0DB4-4524-AAEA-BA24E649C067.1; 
 Fri, 11 Mar 2022 06:12:54 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id e580bba4a969.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 11 Mar 2022 06:12:54 +0000
Received: from AS9PR06CA0188.eurprd06.prod.outlook.com (2603:10a6:20b:45d::15)
 by DB9PR08MB7493.eurprd08.prod.outlook.com (2603:10a6:10:36e::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Fri, 11 Mar
 2022 06:12:53 +0000
Received: from VE1EUR03FT029.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:45d:cafe::c1) by AS9PR06CA0188.outlook.office365.com
 (2603:10a6:20b:45d::15) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.20 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:53 +0000
Received: from nebula.arm.com (40.67.248.234) by
 VE1EUR03FT029.mail.protection.outlook.com (10.152.18.107) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 06:12:52 +0000
Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX03.Arm.com
 (10.251.24.31) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27; Fri, 11 Mar
 2022 06:12:43 +0000
Received: from a011292.shanghai.arm.com (10.169.190.94) by mail.arm.com
 (10.251.24.32) with Microsoft SMTP Server id 15.1.2308.27 via Frontend
 Transport; Fri, 11 Mar 2022 06:12:41 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 511f6752-a102-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=JPsPOvzho2nUCB0RDRsUprWjaTqQDf6F4G+auSec2gA=;
 b=zEXBBooENPXWwekxMPsivO4mQ9vcO7ewOle//u+gAAEZcndROf8GcjflzM9v9jm/hXGZHT2tQUZynTKLhv2GOddP7J2NpQox/+p9BYkvPy0/R+pg/wCYH71YBN/lT7e3Ly+YP0kBpIRU1ph/aa6xBtthRHm/Czs5BhKAltRJvUk=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 08a5aae35ab4c662
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=lp16z6s2RNHzOatsFZZSsANhotpnk41e3Gd5cV9oIOJx4xPonMx+e3y83lKDganBe4i0CFQ8xLL+uHANPQCr3Z+kHQV+8wSdStHS66Sztd5qtEvZU2NFBPdeEknIqnS7RnhKDuWiggrVAojux34RUZMmCYQE/kIYjZ/BuLPStxHIfpBLcVJwNEy8l45hglxkqxJlC5dh5audxcksB06gh35cCPbhjz4h630qFaYt14DxfD1uIBdGV0hl1NQhMq3knDpA8dgaICxkbWEKIFn2V/zmGgOoZAV995Hzo6H40YI/DxwQEsaJkz3z5e1RgD04XmrMo8ZshQF7sXOvomcHRQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=JPsPOvzho2nUCB0RDRsUprWjaTqQDf6F4G+auSec2gA=;
 b=TpDq0G5H+cW6Zig2cadDJLIAc6WBP/xVoy+at+5Okb7G8wLhbHkYHBs8jDPY1+NSs1YoGXyFpcpdDCHfLKo/+J6+LLX3q3OR1vbmBevHc1ZLIMcYaHBlU/wKc6PAa3HP+Te/ZuPkH4SrnkmYLaYdjJCQvX7RqxOvkJKanyUXJrrPlBdc9OZzP6Lb+5rrTfk3w/zVKUofRnO0IQ4WWeU5ce3M2roM0qxBNU3CkjFPQ0LcRWmKAiDPxarBQF0fLMU5hitOunH106AgKmbRiy2TURjPXz6FZvbV2GJHyMJpFD2jfh01RaM0gdNPrM3Z/jPtbTG1Gd552KQAMgrfdvTaNQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 40.67.248.234) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=JPsPOvzho2nUCB0RDRsUprWjaTqQDf6F4G+auSec2gA=;
 b=zEXBBooENPXWwekxMPsivO4mQ9vcO7ewOle//u+gAAEZcndROf8GcjflzM9v9jm/hXGZHT2tQUZynTKLhv2GOddP7J2NpQox/+p9BYkvPy0/R+pg/wCYH71YBN/lT7e3Ly+YP0kBpIRU1ph/aa6xBtthRHm/Czs5BhKAltRJvUk=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234)
 smtp.mailfrom=arm.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 40.67.248.234 as permitted sender) receiver=protection.outlook.com;
 client-ip=40.67.248.234; helo=nebula.arm.com;
From: Penny Zheng <Penny.Zheng@arm.com>
To: <xen-devel@lists.xenproject.org>
CC: <nd@arm.com>, Penny Zheng <penny.zheng@arm.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Julien Grall <julien@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH v1 12/13] xen/arm: defer foreign memory map in shm_init_late
Date: Fri, 11 Mar 2022 14:11:22 +0800
Message-ID: <20220311061123.1883189-13-Penny.Zheng@arm.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <20220311061123.1883189-1-Penny.Zheng@arm.com>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain
X-EOPAttributedMessage: 1
X-MS-Office365-Filtering-Correlation-Id: 293c8bf2-dbcb-4bb9-54d6-08da032632aa
X-MS-TrafficTypeDiagnostic:
	DB9PR08MB7493:EE_|VE1EUR03FT019:EE_|DB7PR08MB3067:EE_
X-Microsoft-Antispam-PRVS:
	<DB7PR08MB3067686C5FD1F8964C542102F70C9@DB7PR08MB3067.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
NoDisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(336012)(1076003)(2616005)(426003)(83380400001)(186003)(26005)(356005)(36756003)(81166007)(82310400004)(36860700001)(47076005)(8676002)(4326008)(508600001)(70206006)(70586007)(40460700003)(316002)(6916009)(54906003)(2906002)(5660300002)(8936002)(6666004)(7696005)(86362001)(36900700001);DIR:OUT;SFP:1101;
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR08MB7493
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT019.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	01a6c042-a16b-44b8-ce6d-08da03262d47
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(36756003)(8936002)(4326008)(508600001)(8676002)(5660300002)(36860700001)(7696005)(6666004)(107886003)(70206006)(1076003)(26005)(186003)(426003)(83380400001)(336012)(2616005)(70586007)(54906003)(81166007)(86362001)(47076005)(40460700003)(2906002)(82310400004)(316002)(6916009);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 06:13:01.8917
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 293c8bf2-dbcb-4bb9-54d6-08da032632aa
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT019.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR08MB3067

From: Penny Zheng <penny.zheng@arm.com>

This commit introduces a new helper shm_init_late to implement
deferred foreign memory mapping of static shared memory.

Signed-off-by: Penny Zheng <penny.zheng@arm.com>
---
 xen/arch/arm/domain_build.c       | 51 +++++++++++++++++++++++++++++++
 xen/arch/arm/include/asm/domain.h |  1 +
 xen/arch/arm/setup.c              |  6 ++++
 3 files changed, 58 insertions(+)

diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index 4b19160674..f6ef5a702f 100644
--- a/xen/arch/arm/domain_build.c
+++ b/xen/arch/arm/domain_build.c
@@ -1006,6 +1006,57 @@ static int __init process_shm(struct domain *d,
 
     return 0;
 }
+
+int __init shm_init_late(void)
+{
+    unsigned long i = 0UL, shm_id;
+    int ret = 0;
+    struct domain *od, **bd = NULL;
+    unsigned long o_gfn, b_gfn, nr_gfns;
+
+    for ( shm_id = find_first_bit(shm_list_mask, NR_MEM_BANKS);
+          shm_id < NR_MEM_BANKS;
+          shm_id = find_next_bit(shm_list_mask, NR_MEM_BANKS, shm_id + 1) )
+
+    {
+        /* Acquire the only owner domain. */
+        od = get_domain_by_id(shm_list[shm_id].owner_dom);
+        if ( od == NULL )
+            return -ESRCH;
+        o_gfn = PFN_DOWN(shm_list[shm_id].owner_gbase);
+        nr_gfns = PFN_DOWN(shm_list[shm_id].size);
+
+        bd = xmalloc_array(struct domain *, shm_list[shm_id].nr_borrower);
+        if ( !bd )
+            return -ENOMEM;
+        /* Set up foreign memory map for all borrower domains. */
+        for ( i = 0; i < shm_list[shm_id].nr_borrower; i++ )
+        {
+            bd[i] = get_domain_by_id(shm_list[shm_id].borrower_dom[i]);
+            if ( bd[i] == NULL )
+            {
+                return -ESRCH;
+                goto fail;
+            }
+
+            b_gfn = PFN_DOWN(shm_list[shm_id].borrower_gbase[i]);
+            ret = guest_physmap_add_shm(od, bd[i], o_gfn, b_gfn, nr_gfns);
+            if ( ret )
+            {
+                ret = -EINVAL;
+                goto fail;
+            }
+        }
+
+        xfree(bd);
+    }
+    return ret;
+
+ fail:
+    xfree(bd);
+
+    return ret;
+}
 #endif /* CONFIG_STATIC_SHM */
 #else
 static void __init allocate_static_memory(struct domain *d,
diff --git a/xen/arch/arm/include/asm/domain.h b/xen/arch/arm/include/asm/domain.h
index 1c0f2e22ca..c3f2155f5c 100644
--- a/xen/arch/arm/include/asm/domain.h
+++ b/xen/arch/arm/include/asm/domain.h
@@ -58,6 +58,7 @@ typedef struct {
 } shm_info_t;
 extern shm_info_t shm_list[NR_MEM_BANKS];
 extern unsigned long shm_list_mask[BITS_TO_LONGS(NR_MEM_BANKS)];
+extern int shm_init_late(void);
 #else
 #define dom_shared NULL
 #endif
diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c
index f6a3b04958..4987b71111 100644
--- a/xen/arch/arm/setup.c
+++ b/xen/arch/arm/setup.c
@@ -1051,7 +1051,13 @@ void __init start_xen(unsigned long boot_phys_offset,
         printk(XENLOG_INFO "Xen dom0less mode detected\n");
 
     if ( acpi_disabled )
+    {
         create_domUs();
+#ifdef CONFIG_STATIC_SHM
+        if ( shm_init_late() )
+            panic("Failed to set up deferred foreign memory mapping of static shared memory.\n");
+#endif
+    }
 
     /*
      * This needs to be called **before** heap_init_late() so modules
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 07:18:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 07:18:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288793.489816 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSZXj-0005lZ-Dz; Fri, 11 Mar 2022 07:18:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288793.489816; Fri, 11 Mar 2022 07:18:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSZXj-0005lS-Az; Fri, 11 Mar 2022 07:18:31 +0000
Received: by outflank-mailman (input) for mailman id 288793;
 Fri, 11 Mar 2022 07:18:30 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=3DNt=TW=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nSZXi-0005lM-0f
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 07:18:30 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 71b943df-a10b-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 08:18:27 +0100 (CET)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur03lp2050.outbound.protection.outlook.com [104.47.8.50]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-41-VVkNmF6hM-y7Q-qfalMlzw-1; Fri, 11 Mar 2022 08:18:26 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM6PR04MB6726.eurprd04.prod.outlook.com (2603:10a6:20b:fb::26)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar
 2022 07:18:25 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.022; Fri, 11 Mar 2022
 07:18:25 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 71b943df-a10b-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646983107;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=4Ikbr4D74grBm1OoFVhZv8x7t/XLolbsgh+J/5sw9fA=;
	b=crIab4NRCMDtfs3LlZ4yzPocCKAB+fGgEkh0Yitp6USXy8rJ9JpoM5NvPm3eyb710JJfSJ
	Zxp7hFVAUvbtb5aOr6Mlsjn9cP1ZrRMAbVKtzANyNQlmX7rkTY05yxKpd5wxVrDTvcPYIa
	UEAA72oF9Pnm+xlZLBvqUi8Qkojeu3s=
X-MC-Unique: VVkNmF6hM-y7Q-qfalMlzw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=RVxBC7Cd6/2/EFBkSQS66Y/QUDvwcnrInCojewzqrpjhQHnevPGvF+OAmlCW1mOzdJdf8S/uqllPBTG5SxlFJejrQ9QFtlooqVlFo7wmASIfjTWAbTMNP2g8uRkpsGvEPCZYpjyETWOmNE11wDrVhAXgsxs+hJNrIE+idBhx9xp/qSYMr1WfitoKT4nCMZKHhEZidSxZEpOgzDNfSq5jXzXScyh/44hR3T7MzqgJMGiBcTfdxyEk05W7K6O2wwUh9VZUn/n2WgUHqo7eP54o7dndsIyTafgSlEUIVT8W/4+mkrN1d8N1wjdV2Z6t2TGBdw+RymDjLAxgtA2frJuw5Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=SyUJhWfsSyqUUHT6uq6nwQbPw81yxNi/kMNNb7x9pH8=;
 b=H9XVIacNIsM11ofWa/Aa4QP9WbEv9Lx3TxfxoWxetBTBtyvWJLFskX5J5zZcjV8kettCJI3OUyA1Bfqm2MvQamSLWbzesBJ64dI9j4kgaUGtpNQc1Ptonj2XmNA1ad7LlhYfJ1jpKFFtGDEKNPIMdzmHR1SERQewGqMAxYFG4FMqKI/LhwZ4WHIUKAKL2k/8tnFlr3M6nEeLtuBc3Qx2uqYoM0cJuOtz/IYDYF2vSDFkS8DFeVTOiWXrEqmX7mzDOaguVYd1p8k9KhNfGyhAPiqYDyGWrOjFdC+YoO1YJet6aGldeoF+v+z0Pae+NRmmFiAhEdZr00y6T2l25gb+zw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <8b240f4f-0cf2-e543-b21b-be356ab71e49@suse.com>
Date: Fri, 11 Mar 2022 08:18:21 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH] x86/cet: Use dedicated NOP4 for cf_clobber
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
 Bjoern Doebel <doebel@amazon.de>, Michael Kurth <mku@amazon.de>,
 Martin Pohlack <mpohlack@amazon.de>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <20220308140126.8815-1-andrew.cooper3@citrix.com>
 <18fb4115-94d8-16c2-e39b-1be895e254f4@suse.com>
 <476a25f8-86eb-0df5-b481-fc4cd5ecbb18@citrix.com>
 <83fa28ce-f2db-2451-356f-0dc0266834f2@suse.com>
 <48c6720a-070e-85db-f1c3-448714232946@citrix.com>
 <d65a64fe-72b1-efc5-1804-8f74aca6d803@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <d65a64fe-72b1-efc5-1804-8f74aca6d803@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR06CA0171.eurprd06.prod.outlook.com
 (2603:10a6:20b:45c::29) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: d53e8592-62ac-4c40-517a-08da032f54d2
X-MS-TrafficTypeDiagnostic: AM6PR04MB6726:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB6726CDF24CFC286F2DC85453B30C9@AM6PR04MB6726.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2616005)(53546011)(186003)(83380400001)(26005)(6506007)(6512007)(6666004)(54906003)(316002)(66556008)(66946007)(8676002)(86362001)(66476007)(6916009)(38100700002)(36756003)(31696002)(508600001)(4326008)(31686004)(5660300002)(2906002)(8936002)(6486002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?aTOTaPrEvZtkHByxmjzA/XCqv/Y+OdPHnw+jXhazfu7FLCrqlPXsc6l8rHWV?=
 =?us-ascii?Q?16/Y3cNiPquH1Jji+C3lql25xR7M0Zclr6te1nNMqMt1UAdr6wRnTbXWpgwL?=
 =?us-ascii?Q?vmbrh2cZ0nqgUE1y02Du8VKS/vibMA/c3huEJf9wnV1cal5O8qCeQN+8FEtI?=
 =?us-ascii?Q?wBU4j0bWGZwIKCUeneyFZqkYiXlkqBWbnSIXCemJkSC7PGNLUqc9bE08+ZkG?=
 =?us-ascii?Q?pSM7fTcsCUcUaSwoI5eJyqqnHjHtTqCMNhATfnoiEH7N712k4/VpQ8ro2K0I?=
 =?us-ascii?Q?dWzrQv6Fyi/x9XJWME8xenYkDGUisCcIqic+oi42YcTvbx1/FNRMhV8T4C5M?=
 =?us-ascii?Q?ZLubq2/JJZR0rDuheym5WlxYyTTyyXDQJYP5pnaMRil7EtIOkntBUShl8HaV?=
 =?us-ascii?Q?S8LEF9Jn/9xxlE1lw9PB9s2lPPqFU/1ecGtqTzyRDfcsqacWnM2ASv1rEIMK?=
 =?us-ascii?Q?Ny8c6RofKpCXHvv6n/E0+t9xKV9Cc1jw8QYmbxc1Dn203GVe3e8p9uTmmBx6?=
 =?us-ascii?Q?Kr0tWjfm3oLDlwYe3VGZFBskNDO3uKxOhPV9qK/JzUu8x8FxZlk1WIAS3l8B?=
 =?us-ascii?Q?k5MJbtHzEIdmk/DFRA3R4e0mpvBaIOSATGaEdm7Ad99H8AcSut12mvz0gocd?=
 =?us-ascii?Q?4Z2TP+FlaK9W7tko3x7z8g7wbnuQXOyZ46eDGZqwLNKXtrVhDt8m1HnTCJZ/?=
 =?us-ascii?Q?LRKoDSddgFB2ncjEEa8/cZRnyqziYtipHshLZj6pONHF5XkFL/xELLYmh38A?=
 =?us-ascii?Q?lJQHnZsXWPs1fm/SS0HxJNGHnMlXgVKeLquMS6R9ZwUK6D4WeFm1H8nsq9nh?=
 =?us-ascii?Q?eKP3dl6nJmt7IFZYxVgHW/gnOnX25TazvaA5XFi0P/4AN8X6D+h5xPWkRl0I?=
 =?us-ascii?Q?D9pD7ko/vci+gwfOgl2U52MaOaYd27tWgLdNncBkIDYfHEJTHOVXdreMke1m?=
 =?us-ascii?Q?p3GWA1biTdDD2wsCFG7OWf6dKAxsbL0cHr+UiQvgVKWxe0jzj/i0HDl9seKi?=
 =?us-ascii?Q?HS+NUJatlqnel4B1htFDV5DKaFXVKuqj/MYIHyBHW89EWnzG0RjMJ0aZ7le/?=
 =?us-ascii?Q?bRYmSbSVUu25uH5B4PPlGKObyr9MKB97qykgOnhCj8nVYHQqjUvL+Jvhncx5?=
 =?us-ascii?Q?evdbuMlJyTX0izr05RA2zKDzmn6CUL+pj1IaYYA09S4kclUQHbPbwyg0QQjf?=
 =?us-ascii?Q?eRrApQ9xTDrnOw76bpaO9PsNicZZGKJH945ogUKKmgRgkzLlvPoqrFGw+Ptt?=
 =?us-ascii?Q?Sx2Ao8o/AsITk7fgc/g7vWRLansaP4oXN60nC/O8DmyGxrPQaxxo2/Th2h4g?=
 =?us-ascii?Q?Id6QAF9avU0zJh8ozTRCXRYtrtGA2NgerTUjV+sSZxzblsQA9o7fGimCPF0F?=
 =?us-ascii?Q?Jm0LUVOQXUi1OPzHd93pwsv0M/HhBzTkcSLXgMEnfIdPVJqhNoqs4cj2SfT2?=
 =?us-ascii?Q?gPkMS2U1pldXgFVtq1m5OMUMh1AZnQqT?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d53e8592-62ac-4c40-517a-08da032f54d2
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 07:18:25.0887
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: HxAAw++6RG8pg0cySQps8NOw9oHWjyNl25VYe7Sxr/fHpqfILdqgReMBxOZWO/5T5tTWbl9sTdf9qSBOFLqDBQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB6726

On 10.03.2022 19:42, Andrew Cooper wrote:
> On 08/03/2022 16:03, Andrew Cooper wrote:
>>>>>> --- a/xen/arch/x86/include/asm/endbr.h
>>>>>> +++ b/xen/arch/x86/include/asm/endbr.h
>>>>>> @@ -52,4 +52,16 @@ static inline void place_endbr64(void *ptr)
>>>>>>      *(uint32_t *)ptr =3D gen_endbr64();
>>>>>>  }
>>>>>> =20
>>>>>> +/*
>>>>>> + * After clobbering ENDBR64, we may need to confirm that the site u=
sed to
>>>>>> + * contain an ENDBR64 instruction.  Use an encoding which isn't the=
 default
>>>>>> + * P6_NOP4.
>>>>>> + */
>>>>>> +#define ENDBR64_POISON "\x66\x0f\x1f\x00" /* osp nopl (%rax) */
>>>>> In case this remains as is - did you mean "opsz" instead of "osp"?
>>>>> But this really is "nopw (%rax)" anyway.
>>>> Oh, osp is the nasm name.=C2=A0 I'll switch to nopw.
>>> Reviewed-by: Jan Beulich <jbeulich@suse.com>
>> Thanks.
>=20
> It does occur to me that we can extend check-endbr.sh for this.
>=20
> diff --git a/xen/arch/x86/indirect-thunk.S b/xen/arch/x86/indirect-thunk.=
S
> index 7cc22da0ef93..3baaf7ab4983 100644
> --- a/xen/arch/x86/indirect-thunk.S
> +++ b/xen/arch/x86/indirect-thunk.S
> @@ -38,6 +38,7 @@
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 .section .text.__x86_ind=
irect_thunk_\reg, "ax", @progbits
> =C2=A0
> =C2=A0ENTRY(__x86_indirect_thunk_\reg)
> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 nopw (%rax)
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 ALTERNATIVE_2 __stringif=
y(IND_THUNK_RETPOLINE \reg),=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 __stringify(IND_THUNK_LF=
ENCE \reg), X86_FEATURE_IND_THUNK_LFENCE, \
> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 __stringify(IND_THUNK_JM=
P \reg),=C2=A0=C2=A0=C2=A0 X86_FEATURE_IND_THUNK_JMP
> diff --git a/xen/tools/check-endbr.sh b/xen/tools/check-endbr.sh
> index 9799c451a18d..652ac8d0b983 100755
> --- a/xen/tools/check-endbr.sh
> +++ b/xen/tools/check-endbr.sh
> @@ -67,7 +67,7 @@ eval $(${OBJDUMP} -j .text $1 -h |
> =C2=A0${OBJCOPY} -j .text $1 -O binary $TEXT_BIN
> =C2=A0if $perl_re
> =C2=A0then
> -=C2=A0=C2=A0=C2=A0 LC_ALL=3DC grep -aobP '\363\17\36\372' $TEXT_BIN
> +=C2=A0=C2=A0=C2=A0 LC_ALL=3DC grep -aobP '\363\17\36\372|\x66\x0f\x1f\x0=
0' $TEXT_BIN
> =C2=A0else
> =C2=A0=C2=A0=C2=A0=C2=A0 grep -aob "$(printf '\363\17\36\372')" $TEXT_BIN
> =C2=A0fi | awk -F':' '{printf "%s%x\n", "'$vma_hi'", int(0x'$vma_lo') + $=
1}'
>> $ALL
>=20
> yields:
>=20
> check-endbr.sh xen-syms Fail: Found 15 embedded endbr64 instructions
> 0xffff82d040377f00: __x86_indirect_thunk_rax at
> /local/xen.git/xen/arch/x86/indirect-thunk.S:55
> 0xffff82d040377f20: __x86_indirect_thunk_rcx at ??:?
> 0xffff82d040377f40: __x86_indirect_thunk_rdx at ??:?
> 0xffff82d040377f60: __x86_indirect_thunk_rbx at ??:?
> 0xffff82d040377f80: __x86_indirect_thunk_rbp at ??:?
> 0xffff82d040377fa0: __x86_indirect_thunk_rsi at ??:?
> 0xffff82d040377fc0: __x86_indirect_thunk_rdi at ??:?
> 0xffff82d040377fe0: __x86_indirect_thunk_r8 at ??:?
> 0xffff82d040378000: __x86_indirect_thunk_r9 at ??:?
> 0xffff82d040378020: __x86_indirect_thunk_r10 at ??:?
> 0xffff82d040378040: __x86_indirect_thunk_r11 at ??:?
> 0xffff82d040378060: __x86_indirect_thunk_r12 at ??:?
> 0xffff82d040378080: __x86_indirect_thunk_r13 at ??:?
> 0xffff82d0403780a0: __x86_indirect_thunk_r14 at ??:?
> 0xffff82d0403780c0: __x86_indirect_thunk_r15 at ??:?
> ...
> check-endbr.sh xen.efi Fail: Found 15 embedded endbr64 instructions
> 0xffff82d040377f00: ?? at /local/xen.git/xen/arch/x86/indirect-thunk.S:55
> 0xffff82d040377f20: ?? at head.o:?
> 0xffff82d040377f40: ?? at head.o:?
> 0xffff82d040377f60: ?? at head.o:?
> 0xffff82d040377f80: ?? at head.o:?
> 0xffff82d040377fa0: ?? at head.o:?
> 0xffff82d040377fc0: ?? at head.o:?
> 0xffff82d040377fe0: ?? at head.o:?
> 0xffff82d040378000: ?? at head.o:?
> 0xffff82d040378020: ?? at head.o:?
> 0xffff82d040378040: ?? at head.o:?
> 0xffff82d040378060: ?? at head.o:?
> 0xffff82d040378080: ?? at head.o:?
> 0xffff82d0403780a0: ?? at head.o:?
> 0xffff82d0403780c0: ?? at head.o:?
>=20
> Obviously the changes to check-endbr want cleaning up, but I think it's
> entirely within scope to check for ENDBR64_POISON too, and we can do it
> without adding an extra pass.=C2=A0 Would you be happier with this check =
added?

Yes, this would feel better. Thanks for having continued to think
about it.

> But we also have some clear errors with debug symbols.=C2=A0 It's perhaps=
 not
> terribly surprising that irp/endr only gets file/line for the first
> instance,

I have to admit I would expect it to at least figure the file. But
there's no .debug_line contents at all for ..._rcx .. ..._r15.

> and at least ELF manage to get the function name right, but
> EFI is a mess and manages to get the wrong file.=C2=A0 Any idea how to ge=
t
> rather less nonsense out of the debug symbols?

A random example with a symbol from a C file works here, at least.

Jan



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 07:31:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 07:31:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288797.489828 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSZkK-00082N-K3; Fri, 11 Mar 2022 07:31:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288797.489828; Fri, 11 Mar 2022 07:31:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSZkK-00082G-Gl; Fri, 11 Mar 2022 07:31:32 +0000
Received: by outflank-mailman (input) for mailman id 288797;
 Fri, 11 Mar 2022 07:31:31 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=3DNt=TW=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nSZkJ-00082A-6x
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 07:31:31 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 44278901-a10d-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 08:31:29 +0100 (CET)
Received: from EUR02-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur02lp2059.outbound.protection.outlook.com [104.47.6.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-16-26mGd1CpOROmDQlDwSCbfQ-1; Fri, 11 Mar 2022 08:31:27 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR04MB4254.eurprd04.prod.outlook.com (2603:10a6:803:4c::10)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar
 2022 07:31:26 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.022; Fri, 11 Mar 2022
 07:31:25 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 44278901-a10d-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646983889;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=C4zkjxkVZiYDgmPmUWX5tjEAvsyz1m61cvfXGo4002w=;
	b=URGk/0oDj5/rIhzJbSWvAyD3EUnPhi9iP1OvaRrLKq5JG9Jrb7Lr6KzXs6avxdBtLAvi0O
	+MDy6U5r9+oE1mSxxM1+Hg10nEsTCGO94HL4ot59+jVcRTQOTtMd3Gt6ivAyatSL9rrif6
	+iaoihYWmVxoWsGz5RmSDE2gW4pBZso=
X-MC-Unique: 26mGd1CpOROmDQlDwSCbfQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=YYnSGWBQbCmd3stf5f/+06Uq3KTVpARI9k3W9dRvkeDBV65TZMdbNSpVMt34AVd6sYME3rqluYLZDZC97B5PMDuT3bH01W1aLN4k3D/OQALrXKPpQqwNyh39JGcj+pPsdnrABfq0CshrgHMqInY8uI7bh0bFvkwrJFyNEPtp/yHvf++0xGgMDW05ivXk90pGwz8B4xlYtdraNPugPzn4U6Y1011bNxP4lXBT0ITymXnsMFqSqF5VVTJpt9SVn4+TVbs2E2m7nggKm4seJlXiGXJoFlNzQh7rcYxzhS0s9kSPTULf5r5d8Cs+N7gdoYWIXAUkIFUNDxq8Jh1mw+JdjQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=wloZl1mLIM3AW+cXBMeY1xnluT4vQZGey+5pgRQ9lME=;
 b=XN5zaBkV7Wu1SJJXm9ROVw1uZo98noNOySsGacGFPT+JncbRwFzitS3ijzVSShEtlglXSBmyFn0UQOGAotLZ9aTF1z/e6TLdpLO+TNNrzu4hMt6opADDX+W8jehmTZTnU5BMIZRvlM8GbVqYUvRTlfCfVkzjqcVv9+aEcjwb3tb4Ozib9wWC6WERDmhYfN4R1FAx0bWFFY2G3dDoBiODBu4OYVUwUCMyfYZ3P0s4a9gQ2FPZC46WVG5JGLzGy3n85YMmEeUFUY4CQ4dxkC76Q48TZPUmQi7vqr8TXNEGi8BxVZHgGmGdb0sCvby+8RkriFH/B5obErpWVIhVxKW0kg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <d54a2875-b170-3d38-b025-1654d8c61203@suse.com>
Date: Fri, 11 Mar 2022 08:31:23 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH 2/3] amd/msr: allow passthrough of VIRT_SPEC_CTRL for HVM
 guests
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220201164651.6369-1-roger.pau@citrix.com>
 <20220201164651.6369-3-roger.pau@citrix.com>
 <ea9c7232-a98b-7fb4-a151-0c1e3ce1e1db@suse.com>
 <YioqL+CcQHiwyRwi@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YioqL+CcQHiwyRwi@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM5P194CA0021.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:203:8f::31) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 9d11d13a-7330-4e91-02b5-08da0331264e
X-MS-TrafficTypeDiagnostic: VI1PR04MB4254:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB425412D34ABAEFB774C6C440B30C9@VI1PR04MB4254.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(5660300002)(53546011)(2616005)(2906002)(6512007)(6506007)(8936002)(54906003)(6486002)(6916009)(316002)(31696002)(36756003)(4326008)(86362001)(508600001)(8676002)(66476007)(66946007)(66556008)(31686004)(83380400001)(38100700002)(186003)(26005)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?22PFKPB7oBElNXpciEEF0XiYe+8hyhy+M7rKA8NEMWk0Le+l018Il1/+cm1Z?=
 =?us-ascii?Q?VoS4XXv/TcOBknYOLdb8wsI/ceNrhO+nVnGLoJbQRS1kWwXfw2n5Z5a6Fgb4?=
 =?us-ascii?Q?YIlEKyGhSXuYnHsJxBppgcbpVnv13dWnvT6GU3Cd6LP3k73sr9XMle1zX6p8?=
 =?us-ascii?Q?EMwyzf1iBz9CgYVLkW3XtXOv/UlEZFgf77bYEryFlEn7gELya2OqPGsR5sIJ?=
 =?us-ascii?Q?CWD3U4zmyM/bYPHH+5RCYcS/vZASCYdHQ8moiLyO0IqoDK1yAZXdsniiof5H?=
 =?us-ascii?Q?XvLHMyqw6UgbrL84neBI1xIUBQQN3MUUi07+L8alqA1J9/RqmnPESXVyWB9M?=
 =?us-ascii?Q?v/2BX45Ebt5eYMpeVXB2L3Z4sqmoEhp+MlyZL4EF8jzNYTozqBDs37GZ9fJG?=
 =?us-ascii?Q?uPhsQPomN5v0edaGY+6LWtuk8o0amtZiCKHSPM6iCDpGO5KOVO2VVWZbP1BK?=
 =?us-ascii?Q?gDdaTDWJGe0dw0q6ffP03unAdE2aJlekxchLvWIOAof3n+401Er0OiSwItcA?=
 =?us-ascii?Q?Yip6gRcxb0DqORRU5UFHYBs5jeZi9ndaKiMkNDFTdZkmWOyl84RCjpnQOiBu?=
 =?us-ascii?Q?dcCVEzEeIcqgZwxTbT1y1M6laRV/tHOw1Jzo8tSPbzrdvmYIJGJn3RezqmGP?=
 =?us-ascii?Q?T8A4TCeldp1jHPOX42I/xlGkowLRs04NhhfTBK3JdQ2A2vXHCZy1stuuKOB6?=
 =?us-ascii?Q?HhknIgK2HEH+QXKKehGvRM6rQH12Yi51N3TchDznsT5t7dJKl7djVt6FVcjP?=
 =?us-ascii?Q?MUUMksxYxnuUgMPKpXk2Jedkbgpq/QBy4z4OFqMezGlwvI1X3eOVZr5Arovo?=
 =?us-ascii?Q?CA5bUCr/RJHTZH3fH6RV7bhNYXMEoPDb/AJxedrkGcgPlO9T8qDp2KQxqkUJ?=
 =?us-ascii?Q?eZPQPkri9gIc/XJ0WXKkOXwdkHGCzPF0i86C7Y7AFEeQXj0sEyLLyPZs53ZP?=
 =?us-ascii?Q?h+qOhndLmv40hOSVwgKmwkmsRZoBkByhlHBwNRPARCu0fDdw0Mi9D4sZ3g8b?=
 =?us-ascii?Q?XEbBi8oPdrvFQnpzVQ4TjjhK6y+b1D1FjhjtPxJbGbOQOtqhMa0KoS/UOoPU?=
 =?us-ascii?Q?E91aN13CPucxq/211W64YqRiYryN3AMPG1zK2tVrS7Nx3tzhEu13HvsfFRmG?=
 =?us-ascii?Q?cRq1JrEWCXfeCw1XNKsM1Fp05dSL4pHp8BkSnZFuDeppuy0/h47ZCJb1reoQ?=
 =?us-ascii?Q?SaaDF9w/raYtMlYz7sEsNvC8TvsLhEsaEcWhj9nmeAqrkru76jqIhpWz6UQN?=
 =?us-ascii?Q?za/DMvSK/vpbMebhuAE+FlrUCgLy5C7qyXAr9cdkJp3+0EsKFCD7wkKJ2aGq?=
 =?us-ascii?Q?dhczEe9B7NyP+zl+5zH4wuGQwvrr9YtSU5hR5n1fHH6OBkqSGzbj95EN9yk0?=
 =?us-ascii?Q?tyb9ApN/uMY5U3PIRx5L1mZ2k2e7+j4MpqmDD57o/5xyapFENc/2X2jh6JUR?=
 =?us-ascii?Q?eyM654M/PS869mrGpOqgDZla38Prlvrk?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 9d11d13a-7330-4e91-02b5-08da0331264e
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 07:31:25.8992
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: kmmGK9PC24fygYsUv9ZF0pjBeqUcUJ3qBw547zU4V7ZNode8u3dcSwaP77sA2Kfz8ga3AgJoJDSXWGDHu4ZFLw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB4254

On 10.03.2022 17:41, Roger Pau Monn=C3=A9 wrote:
> On Mon, Feb 14, 2022 at 05:02:52PM +0100, Jan Beulich wrote:
>> On 01.02.2022 17:46, Roger Pau Monne wrote:
>>> --- a/xen/arch/x86/hvm/svm/entry.S
>>> +++ b/xen/arch/x86/hvm/svm/entry.S
>>> @@ -71,7 +71,9 @@ __UNLIKELY_END(nsvm_hap)
>>>              mov    %al, CPUINFO_last_spec_ctrl(%rsp)
>>>  1:          /* No Spectre v1 concerns.  Execution will hit VMRUN immin=
ently. */
>>>          .endm
>>> -        ALTERNATIVE "", svm_vmentry_spec_ctrl, X86_FEATURE_SC_MSR_HVM
>>> +        ALTERNATIVE_2 "", STR(call vmentry_virt_spec_ctrl), \
>>
>> I'm afraid this violates the "ret" part of the warning a few lines up,
>> while ...
>>
>>> +                          X86_FEATURE_VIRT_SC_MSR_HVM, \
>>> +                      svm_vmentry_spec_ctrl, X86_FEATURE_SC_MSR_HVM
>>> =20
>>>          pop  %r15
>>>          pop  %r14
>>> @@ -111,7 +113,9 @@ __UNLIKELY_END(nsvm_hap)
>>>              wrmsr
>>>              mov    %al, CPUINFO_last_spec_ctrl(%rsp)
>>>          .endm
>>> -        ALTERNATIVE "", svm_vmexit_spec_ctrl, X86_FEATURE_SC_MSR_HVM
>>> +        ALTERNATIVE_2 "", STR(call vmexit_virt_spec_ctrl), \
>>
>> ... this violates ...
>>
>>> +                          X86_FEATURE_VIRT_SC_MSR_HVM, \
>>> +                      svm_vmexit_spec_ctrl, X86_FEATURE_SC_MSR_HVM
>>>          /* WARNING! `ret`, `call *`, `jmp *` not safe before this poin=
t. */
>>
>> ... the "ret" part of this warning.
>=20
> Hm, so while I could load VIRT_SPEC_CTRL easily from assembly, loading
> of the legacy non-architectural setting of SSBD for Fam18h and earlier
> it's likely not doable from assembly.
>=20
> Since those helpers would only set SSBD, isn't it fine to execute a
> `ret` after either having set or clear SSBD?
>=20
> AFAICT the requirement would be to either have loaded SPEC_CTRL first
> (if present) in the VM exit path, or to set SSBD before setting
> SPEC_CTRL in the VM entry path.

Yes, setting SSBD with SPEC_CTRL already / still set ought to be fine.

>> Furthermore, opposite to what the change to amd_init_ssbd() suggests,
>> the ordering of the alternatives here means you prefer SPEC_CTRL over
>> VIRT_SPEC_CTRL; see the comment near the top of _apply_alternatives().
>> Unless I've missed logic guaranteeing that both of the keyed to
>> features can't be active at the same time.
>=20
> Xen itself will only use a single one (either SPEC_CTRL.SSBD or
> VIRT_SPEC_CTRL.SSBD) in order to implement support on behalf of the
> guest. amd_init_ssbd already prefer to use SPEC_CTRL.SSBD over
> VIRT_SPEC_CTRL.SSBD when both are available, so we aim to do the same
> here.

Hmm, I can't see the change to init_speculation_mitigations()
guaranteeing that at most one of the two would be enabled.

> I think part of the confusion steams from using info->{last_spec_ctrl,
> xen_spec_ctrl} even when SPEC_CTRL MSR is not used by Xen, I need to
> clarify this somehow, maybe by not using those fields in the first
> place.

I don't think this matters for this particular aspect of my reply.
It was possibly causing some confusion to me, but elsewhere.

Jan



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 07:35:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 07:35:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288801.489839 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSZo6-0000Dc-5w; Fri, 11 Mar 2022 07:35:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288801.489839; Fri, 11 Mar 2022 07:35:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSZo6-0000DV-1T; Fri, 11 Mar 2022 07:35:26 +0000
Received: by outflank-mailman (input) for mailman id 288801;
 Fri, 11 Mar 2022 07:35:24 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=3DNt=TW=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nSZo4-0000DL-L9
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 07:35:24 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id cf57bbbe-a10d-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 08:35:23 +0100 (CET)
Received: from EUR03-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur03lp2053.outbound.protection.outlook.com [104.47.10.53]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-34-yJOsBPFsP5qubBwdLd2-mA-1; Fri, 11 Mar 2022 08:35:22 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PAXPR04MB8304.eurprd04.prod.outlook.com (2603:10a6:102:1bc::10)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Fri, 11 Mar
 2022 07:35:20 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.022; Fri, 11 Mar 2022
 07:35:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cf57bbbe-a10d-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646984123;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=XYS4+Swr/XxYiIs+qZs2wMjAfnDUFisBVZmUV9uOFpQ=;
	b=VVZnYEnlTVl7ryPBdU3mhTNCJEkEmH0xw+JpHq2TQqVVH3zOW5N/qvwK3zepbtOsQpyIn5
	cjiZukLa/fRcvXKVR8BKXQlbCTDfKZxKHy0PdZN1K+qN6Vf04R45OvchS2m4Pf81R6o3jg
	hQrQaXRdOaSb2to83XO/dGpdJd3fId8=
X-MC-Unique: yJOsBPFsP5qubBwdLd2-mA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=d8D1N1LL/i5hL9Lv3Ie1s9jNXB59whwtzUsOYopU6kdUzKKHaJDCMsGEmwN5vFMbLu0n5AAJsj7d9Salcj6Bj7G+sCy38y9cKXi4FZ7T7w4cn8oteHuDxlMpVXxj2jrAMSyvGvOiSq6d7Lv+znE2dAbrKUWbvxeVRJb3YCq44XPG/+zNrxRHUYsFsyocFFFB/HPtGd71aF0yO3ogw7TPHGWSBxaTfcB5LC6QKK3Dd3zqBegWrKJxtsbW54k3Ze/cGCRRa56GEtliQejBNNt+95ss/0b51T4wCKfqpikYVRqfm50q8ygwRmFUn+4H08GTN+2+Wz1SG2IWf4dLAhKn7w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=XYS4+Swr/XxYiIs+qZs2wMjAfnDUFisBVZmUV9uOFpQ=;
 b=GgNFy6zjit+NvX53X+zj3kCZHvwr/XhgGT9bX57ebN8bnxGg9aGqA7aX9yKfJxA4W1lJwNodYhsjiMg1xwslS322Fwe1HbItmUqkzrKH3VxiNfOFGVLE0PATgib4nhttMduYLBryriHIgd22YdAgvB09mI48h9mPkqCG7Qc0jTjdLlBlJFk5roZpsCfMs4kOPMajsvW7kG+VQXbTJlfQ6MrgD7ezYXroV/S2B6ugsaGp4wHDeGDuVJfDzk7Mo1vxC+9Onq+nnEcFDneZ6I5vUc8EjT3CjfGk3tUz322pnM6rGndQIGOlFrGfgj3zJ1sBpuMS4T0vtTuZeJZrGBzF6w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <2e2781eb-2c62-1c93-ef8e-75054a213fb8@suse.com>
Date: Fri, 11 Mar 2022 08:35:18 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH 3/3] livepatch: correctly handle altinstruction sections
Content-Language: en-US
To: Roger Pau Monne <roger.pau@citrix.com>
Cc: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
 Ross Lagerwall <ross.lagerwall@citrix.com>, doebel@amazon.de,
 xen-devel@lists.xenproject.org
References: <20220310150834.98815-1-roger.pau@citrix.com>
 <20220310150834.98815-4-roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220310150834.98815-4-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR05CA0020.eurprd05.prod.outlook.com
 (2603:10a6:20b:488::34) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 03458774-860d-405a-4fd8-08da0331b222
X-MS-TrafficTypeDiagnostic: PAXPR04MB8304:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB83048D566632BAD3538A5E5DB30C9@PAXPR04MB8304.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2906002)(6512007)(53546011)(6506007)(66946007)(66476007)(8676002)(66556008)(6486002)(508600001)(26005)(38100700002)(4326008)(316002)(86362001)(54906003)(6916009)(83380400001)(186003)(31686004)(2616005)(5660300002)(36756003)(31696002)(8936002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?UW1yWWgxMVlRd0xvKzJJamNkS1c0bEEwL0Q4dmVWcFp2bENxakt1eURwUC9u?=
 =?utf-8?B?Y0htaE1WQmRGZCtGLzJTTGZCVG5Fa1Fza3U1MEZrcmU1YzJPaDAvenhNYTFw?=
 =?utf-8?B?NWdvZUJWU1VWdktDREVEeFozdFg0MnhwM1FiTUI5emZYMzMrRHYxMjhIc0oz?=
 =?utf-8?B?cWNUcHBrbEdibGUyL0NjcEJkNEtXVW84Mm9UQy9zeVh5LzJrbjBPUjQ2cktV?=
 =?utf-8?B?NEZWUDcwalNiS21GNVNnZUNzQXNnbmZqZ1RmcXhZTGNLcG5UODVEMjFrdmFt?=
 =?utf-8?B?d2kzSnE4bkJRY1JaS2ZwOVZLem1WdldWK25nVnYza1hISG0ydDFpME1jVk54?=
 =?utf-8?B?NjFFY0NvZEhaLzhVY09hWWNwYmoyM3AvcHRHWWxIR0dYWFBUdzJ4Z09aQzZ6?=
 =?utf-8?B?VXpIcUtzMFZLSEk1S1EyclhQUzRXS2JwdkV5SEVmb3hzbUd3ZDR1d3RkUmxx?=
 =?utf-8?B?WXIzUnZWWXpjZkp1TG5meE9idmxITXJTM3lUM1Y2S2QwNExPZE0vOTNPZVk4?=
 =?utf-8?B?dG9ISXhPZVk1cmNJYzFKV3dJVTBLcXRLWHpOeHBRVlJZNkl6OFMzd0JwRVdp?=
 =?utf-8?B?THdoeFFEeGRWaWgrRks1aXdFSkJ4V2ZtblFKa3gralJpQlBkYmtRUmN0ak93?=
 =?utf-8?B?d0ZpRFVyOEh2UVlWZ1R3QmM0b3paZEtQSE94SGRuZnpjZEFidVlIbGpEdGY4?=
 =?utf-8?B?WWx4ZUZHZ3ZIaHI2TXA2SGRVUzNReGFjTkZGdnFxc0VLS3JtbzlHRUlsaXR5?=
 =?utf-8?B?RXUvd0k3ZWFVdmJQZ05OZXgwS2I1Y2ExMkthamk0enVrNWk3bVRFalNVQ0ha?=
 =?utf-8?B?WnVCSlZvK3RTVnh4L1kxdWpETkY2Z0pMOHB3cjVIS0Z6NVFQMDMvaktqWEFV?=
 =?utf-8?B?OUJ4VEV3RCtIVlQ2NnRLQ0w1aWJJeXZuVktzbThiTWpvb2ErUm5EcDY1SjZu?=
 =?utf-8?B?YStPRkNVeWRTWmtQWHZ4cmp1cHp1U01OQzV0VEVUNHExWTNKbHRYL3drMnFm?=
 =?utf-8?B?RzBHdXRGQXFJSGM2UmZ5NU92MDErcXNNU2hibFhhUWwwaTltbFUvWkpyVTRt?=
 =?utf-8?B?YTIzbFRvTW1lclNzdWRKUUFDRXVZVTErcTdrRkJoRWZkN0pLRjZDeUN3QmxJ?=
 =?utf-8?B?blV6NlRSNDY4YmRlS1FkWG1KVDIvVEtkZU50bmlTbUFSZ21NbEQzNTNOS3cz?=
 =?utf-8?B?M3VDUnpMR09adkZCOHRXY3pZaGdzVnJQeGxtZjNOcEp1TWtkbjh2bzJDSU1j?=
 =?utf-8?B?aVBoU0cxMGNCRlp3TWlwMHNxVjlEeEtUa2cxUlc1SnpZKzJBaEhIR1ZaS0JD?=
 =?utf-8?B?TThLWlp2d3I5VGtqM1ZaL0lOeHE5QjIySkVNblJvRWcyNEw0YVVjbGJxTWZL?=
 =?utf-8?B?K1M2SXFUdmJSS0Y1cUs4M0w5NjUwQkZyZkpJb3ZBMjZiQTJrbEhGa0x1d1NQ?=
 =?utf-8?B?QUUvN01NSnZwMXU4QUkzOUtzWmlCeEg3NEdzNlMxbjRiY0VZeFV6QkZaemtn?=
 =?utf-8?B?bWpEL0NXdktvS2w4Rm5qU05EQ3FGcWtmKzR3NDFGSzRabDJqQkhTMFVjaDVP?=
 =?utf-8?B?L3FFWWw5UnMwbHVQVGZoL1IzT08vK0FPdVBhM1VmMnlFdGxMN2V6ckZmR3NX?=
 =?utf-8?B?TEZ0TlY0cUQ0NzlyQ0RCZ2c0OWQ5N0M4Rkt0TXovTHFxTVpSYllPWVA4bzRC?=
 =?utf-8?B?WTZnV1YzOE1mRzJ3SlBlWlFud1N3cXhQa1hEalFOaWhxQldQbk0xR1M0VEpY?=
 =?utf-8?B?UWFpNGZYYlkycVozVjVpdVBTVkRwWWhRQXJtcXU1Z3BDOWJQVDdDS2FjYmY3?=
 =?utf-8?B?bjNSVTFFSGFJNndXWG9PK1NFU05CMkk1c2wzS0JOenpqdmp5MTQ5azRsY1g0?=
 =?utf-8?B?NlBrcy9jRHJFNVpuZUxvU2ZQcmpJYWFJRVFZWFBvbDFFVHp3OUh4WExrYVJ1?=
 =?utf-8?B?aEhPb3NIcnZJVXdZRkdDMkl3b2szdm5RM2dWNm1tZlY3SVFEbm5weC9taHJK?=
 =?utf-8?B?Sm4vdElYNWZWSlRXZDRTR0prOXlLNGtiV0RoOG5iR05xM3ZHZ0dBVHU2ZlRM?=
 =?utf-8?B?YUVaMmxLYVFrMkVHalB5N25VZTlXbWtoaHZpWVBRRFJHdjVQbVFkdzEwUDdh?=
 =?utf-8?B?RmQrVFNOa1ZuTUpvdFNFYjZJTWJHRW1ZY2JweEphTUNNVXg5WU1yTmlZVk1x?=
 =?utf-8?Q?6HrM6K4Y1BPfjAyhSHTEO4s=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 03458774-860d-405a-4fd8-08da0331b222
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 07:35:20.5251
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Z03PqUVVuU8b1b5uUav8X3F8tBwC6Ue5VUQBMar6uxq1mT9cSYYSYObVUh0a7LXVMeDeWyzPayrqGrjShIhAHg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB8304

On 10.03.2022 16:08, Roger Pau Monne wrote:
> --- a/common.c
> +++ b/common.c
> @@ -249,19 +249,22 @@ int is_text_section(struct section *sec)
>  		(sec->sh.sh_flags & SHF_EXECINSTR));
>  }
>  
> +#define SEC_MATCH(n) !strncmp(sec->name, n, strlen(n) - 1)
>  int is_rodata_section(struct section *sec)
>  {
>  	return sec->sh.sh_type == SHT_PROGBITS &&
>  	       !(sec->sh.sh_flags & (SHF_EXECINSTR | SHF_WRITE)) &&
> -	       !strncmp(sec->name, ".rodata", 7);
> +	       (SEC_MATCH(".rodata") || SEC_MATCH(".data.ro_after_init"));
>  }
>  
>  int is_init_section(struct section *sec)
>  {
>  	return sec->sh.sh_type == SHT_PROGBITS &&
>  	       (sec->sh.sh_flags & SHF_ALLOC) &&
> -	       !strncmp(sec->name, ".init", 5);
> +	       (SEC_MATCH(".init") || SEC_MATCH(".text.startup") ||
> +	        SEC_MATCH(".altinstr") || SEC_MATCH(".ctors"));

Having dealt with this recently - what about .init_array? Modern gcc
prefers that over .ctors. Of course the question is whether either
really needs dealing with here - these sections, to my knowledge,
appear only with gcov support enabled. Not sure that's a case where
livepatching is actually expected to be used.

Jan



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 07:41:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 07:41:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288807.489850 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSZtj-0001ij-UV; Fri, 11 Mar 2022 07:41:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288807.489850; Fri, 11 Mar 2022 07:41:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSZtj-0001ic-QU; Fri, 11 Mar 2022 07:41:15 +0000
Received: by outflank-mailman (input) for mailman id 288807;
 Fri, 11 Mar 2022 07:41:13 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=3DNt=TW=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nSZth-0001iW-SC
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 07:41:13 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 9f7d2da7-a10e-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 08:41:12 +0100 (CET)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur03lp2051.outbound.protection.outlook.com [104.47.8.51]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-18-kNqtzLyhOjGB0hFoQRA3WQ-1; Fri, 11 Mar 2022 08:41:11 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR04MB4365.eurprd04.prod.outlook.com (2603:10a6:803:49::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.17; Fri, 11 Mar
 2022 07:41:08 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.022; Fri, 11 Mar 2022
 07:41:08 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9f7d2da7-a10e-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646984472;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=lKb6F2BfGn60D6OxmqevToHZVaT6xiH8n9n5hKW7J/4=;
	b=cdTB6/AHBTqU+sgdK6TRZdl1BRgARFMpO5SFwxZbq7rThITNB0gtfPTSkQVowGlhiXIH/d
	ILVPGy5kYEoPsCdiZertZFJt9OAlxcjWgspAlfO140KBGWsNFLvwTBWn2D6yuSGhx0DXik
	c0ixywnNJxH+iwtpdPHMDbUESGAG1G0=
X-MC-Unique: kNqtzLyhOjGB0hFoQRA3WQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=f1VxCOAn9Qfujs5qZE9um3njrNHuDRdNQIdUq/aGox74bFbbrnTrwFLyRPtYv4kuPhm1+kFrOls89M0rYuPVXhlyo8TdqNd7lGkinEXSVOY8+I70M/hUh4vxT8vlEZ0lX7IWO7wUX8Xxvnu9hIwhNANmW3j6Uun1uyhebv8LL8gcoXoqwY2kUSyx/T1IqpeT1UhkQYISICkHJxtUedFkWbf9N8hPMxpwYCBm5esnrvkN2xUecbmHCwseheHXAjwV/FfDd42v951HypbWcGzOGoCPlaZxiYJJJm5GwtLQRAQjqHThMODxdHhp1uKB5nGrUfJ3AZM6WBntu4DmuiSQpQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=lKb6F2BfGn60D6OxmqevToHZVaT6xiH8n9n5hKW7J/4=;
 b=MLcMfFyRFRE/e0k93AO7jMRXeOZ50BA3U1QMvDOj8d/4yFNnLX2jf7qvxMBCg/YZWV50uLebrJa1PgXIKhCcDiOfcXWFWiEQ/+vrAvBg65khiAkqxrEMBglTcuXaNWD5HA2nZ2ZhOOOg95Q6m9IQI1+XSHICVxhRLG7lFzb3KK3rtmi0JW/O1qrqQdOUpv+YG/Kszi3cqXzpMiI3bQ8Iw3IsKL/0q7VRUdmbtlBAvKmWcnTXQXZrv82Eb3QKxuiVM9FkR/zEKqn6HihK+A1fg/7qU0JuYshb9aiwYazxP+GA7POdYPt2D6QN6ONFuQFllTupKz2mw6eD0VdSHfWfsg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <f02e8704-90a7-aa8b-eda6-5f7a9a6a4e3d@suse.com>
Date: Fri, 11 Mar 2022 08:41:06 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
Content-Language: en-US
To: Luca Fancellu <luca.fancellu@arm.com>
Cc: wei.chen@arm.com, Stefano Stabellini <sstabellini@kernel.org>,
 Julien Grall <julien@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 Juergen Gross <jgross@suse.com>, Dario Faggioli <dfaggioli@suse.com>,
 xen-devel@lists.xenproject.org
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-5-luca.fancellu@arm.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220310171019.6170-5-luca.fancellu@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: FR0P281CA0078.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:1e::17) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 87d67929-4e01-43f2-c732-08da033281c4
X-MS-TrafficTypeDiagnostic: VI1PR04MB4365:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB43657AA165C2548A22EE405DB30C9@VI1PR04MB4365.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	GdhAipbMMvJ2Te+3SJf9sAUm/HOIjxaE6OLNYXTqAR4ed0gs7xp9K1lMNh20gjkAPeJJIWuKXNVCiTZnINi8VguM9/tdZApCVHnh1LTomc26IIBzrFjSaT72jlz1ZGqXA0YquUwpsq+bu5T3hUHrH/8cvkNQrBK1CydiwAW5+n6o+PsKR/lts29fHkPyGcBU8AtfoUhYd/kRo+CNP2Y9jb+d8MuR7txTLhyecZ2iMzX2anUxbO91A7XFhUQH4QxEs+4tVweGb6fZ+Y1La6Bj7mS6HJs9Vnne/rNuAZzUaPyszppFsuD0d5eqgBGdhpw15L5cHXDJKRBtipcfTV84JzHwQRJFc/uZbeB4cIC4uQxmp2q6eeNgfCS6uic8Bhf0is9oYlzTCx/5XoNxa8T5GX9kKqKRPLGUz8LH01SZ1i7uHP05SX1xkRW0+Q0Eb2sO1wwwtriVjXKMeaN5Lk1um1EbwuEelXivYsAYfJvOV86R1QXKNGpNnWovTbLU6uWC6FUkv4vwmLBQpJ9IXE0bi0g13oahGb9YrOSIfKG7cdJNtA0GV6mPDvgp1TlshP2Yj2B60yacTSx0/h4kUFssya3X7BrmUfVY+UY2/2MKZA1ARtxd3CuZqjXxpd3/g87R2lXUARVw9vzCSaPvHF2URPEt65BSni8zjyfqW9DIDEegBGXlYwxozc7Y4VyZMep0kguqE8oh9YqjlxgTDSnGfkBcob3K0Ja5X9nPjjbtSIyhUCQoRFm0MBb+/eaxnijm
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(8936002)(2906002)(7416002)(38100700002)(8676002)(4744005)(66476007)(66556008)(66946007)(31686004)(54906003)(316002)(36756003)(5660300002)(4326008)(6916009)(6486002)(86362001)(31696002)(508600001)(2616005)(6506007)(6512007)(53546011)(26005)(186003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?bjVJYmR2Z3diMExrUWVhOFU2OUp6eG82bmdVU2tDNU45Vm5lTXZzelVoYXU2?=
 =?utf-8?B?a3o3NERBL3puNjV1OVhDSVZ2M3BQaWxMM0dDVmViQlMzaDQ4c1F6Qjg5dU5B?=
 =?utf-8?B?bXcxUWk2VnByeVJTeUh1SkNMYStZQkRVUGtrYkx1bzk4Y1VtaDllSUxTVHEr?=
 =?utf-8?B?aDVqMWFQY2Y3WndIdkxLUlhuaW1GMVdaQ2xMVzkyejB1Njg5YWhBODc1eEZa?=
 =?utf-8?B?UldpWmg4cEk3K0QrY0FpYlRjN0F4ejJlZ1FpNFZsRGlNTVE2aVExc2x6MjBa?=
 =?utf-8?B?VzBwY3BOTklENlVSeldmWW1kZHNEWTc3ZkVLMm8ySDJVcXZVa2J3YjZUOWFY?=
 =?utf-8?B?K05VNU1vdFNkZHNYVEY3TU1vaStJTlZ6N2svOEYwVGhIY09xR0N3NlZOY29M?=
 =?utf-8?B?UDVLNkRmT0MzYzFaTkxBMmNQekZBQUMyam1NUkZMZGsraVE4NmVRT2RBYXJV?=
 =?utf-8?B?Y3VNSXAzazdwSVpSTTNwMkFmeGNsV2lvek10ajNuTE9sckc3RHAzV3gvQ2pq?=
 =?utf-8?B?LzBNQi9KdFc4MDZsZGpzVTZPY1Q1ek1YcDBlbER1b3dGQlYyaVo1OHdpM3gr?=
 =?utf-8?B?aDhTUFVjU0pMSmx0ekYvbk5SZlJJMmYycVFnd3V0bkFTakhKU0N1K1lrVUdJ?=
 =?utf-8?B?dGZ1NzZoSVBaMUNYUnFHN0NQanNwQjZ4TzBPK0ZzZ1g1TVY1YnlDenIrZ0d4?=
 =?utf-8?B?emdaNUxJRlJPUjdDUkJBM2lvZTlCek9DTTJtNUJtQkZKb2x4WkFzc0s2Z0pY?=
 =?utf-8?B?K0cweGZESVZuL1krbVJQUkM3ZDZVcHExTndZWGJaY1NEcEVlZStZNGcwWUpx?=
 =?utf-8?B?LzRGdllUbDBEWlVkNGpaNWorL3k3VW9Ic1V6VWhzRS9MeWl3R2kzUW9IOGpk?=
 =?utf-8?B?SW4xbVJEdE1BM2RDRUU1Nm5pejdwZXk1dFNLZHE2OEExU1lZQWpJWnpyV21S?=
 =?utf-8?B?WmJKbW1lY3F3c2NJQ1A0TVNZTkcxVmdWajh0U09mMHpXSE93UzNhMEllWkhI?=
 =?utf-8?B?WDJSR0hsTXBqMHpYVTVNT3plUlNmS3E1VEFJUkNiUXV0ZndZQ21yY1FKaTlB?=
 =?utf-8?B?YVRsTElhV29OM2l3UnE1d3R1WmRaakVwOE9Bek5KV0YrdkZzbEg0eVJQb04v?=
 =?utf-8?B?MXZFdi93am5IRXhJUEIrbDBaRzYzcEwvVVpHc2pnWTNYdyt6cEI3aFV5MElL?=
 =?utf-8?B?eEpET3Z5d0hrenpIVVJGYUR4dVIwbGpBSHR0VnNBMTZMMXVvYTZoVThldnZl?=
 =?utf-8?B?NjUxK1hsQ0xINGtMMWFKRXNHNVBVd3d0eURsZVRKdUl5d1lFSW9wTlZBVGhw?=
 =?utf-8?B?eUIwelM2aWhVWFUxOE1NVVluNnFwSDlpdnZOZUdseFk5NlluaHo0OFFUbUlz?=
 =?utf-8?B?VmFsa3hCcFVrbmVQaXQxVlFvZ3FFbDZkV3dUZnhwalFuZXJtZXVIM1BtWEpX?=
 =?utf-8?B?SmRZcklLZ3VaTjIzRzlGSzkzanQrcnl4a3dSNVBnQytENDFQSXJ1VnNsaVo5?=
 =?utf-8?B?Q2tGZHEvMC9YQytMTDdGWXU3Q1lsSk9yQW1TSzMzYmpQUlY3Y254ZVEyb2J5?=
 =?utf-8?B?UE9uVFV3dVZqUWtJeFVyeU1ocUVka0JQZWRnczVEUGlWNk9VSHZkckRIUjdi?=
 =?utf-8?B?SWVQZXkzaVFRNWxIOUxRd0tIU3NGZkwvdFpzWG56aGhkeWtFbXhmOXh2T1pz?=
 =?utf-8?B?SHBmR0kyYXplTHdRUVB1ZlhTaG5EcHdydlVacVNId0JaK1BEWEpqSlBmR0g3?=
 =?utf-8?B?SGhCNnVUVUJ5UkFMQkVsTGlrQm1hdFgvVEZhUmxSRkNQdS9WbDE0WjZCRGpD?=
 =?utf-8?B?SXJDVVZLOHY2Y2RYTkZ1QjN4NHZOTEhFNHZxSTZrekduVDJwUWRudndLZW8z?=
 =?utf-8?B?QmsxQjY4eEFZQnZDSzBiNXVYMnR2d1lRTWpvcXZSazNlcDErWUM1bEdOWVdq?=
 =?utf-8?B?ZGhEUGlDYzZxTkNSdHc0cTY3WXYvOEVORndISmxxL3FEcU9oQy9naktUNkN0?=
 =?utf-8?B?L0FLODFoempveFlMRlFWMERWcjdZUGNFSnVIQmxRRllzdkhUeW0wVkJpN0Za?=
 =?utf-8?B?dmFmM3pFZm40Ly85S2hxVHhBUFdBVndVbSs0b3NNYlhxOGkvMHpadGhMZ2dj?=
 =?utf-8?B?elJmOTNkUFI3cGlncm5jTnErSDQ2RituR1lOUjl6TUQ0UmJqaGRsZk1qTWND?=
 =?utf-8?Q?h48CNnHWiJv6RBiZhsCTz7g=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 87d67929-4e01-43f2-c732-08da033281c4
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 07:41:08.8157
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: v2O/blAAqPbWNIggqj6apfGVFs4RkH5e3bjyb/F0dYrWErPU74T8mio/IvScIUJJDRCL4HwOGela3OOu+t6byw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB4365

On 10.03.2022 18:10, Luca Fancellu wrote:
> +chosen {
> +
> +    sched: sched_a {
> +        compatible = "xen,scheduler";
> +        sched-name = "null";
> +    };
> +    cpupool_a {
> +        compatible = "xen,cpupool";
> +        cpupool-cpus = <&a53_1 &a53_2>;
> +    };
> +    cpupool_b {
> +        compatible = "xen,cpupool";
> +        cpupool-cpus = <&a72_1 &a72_2>;
> +        cpupool-sched = <&sched>;
> +    };
> +
> +    [...]
> +
> +};
> \ No newline at end of file

Only seeing this in context of where I wanted to actually comment on.
Please fix.

> --- a/xen/common/Kconfig
> +++ b/xen/common/Kconfig
> @@ -22,6 +22,14 @@ config GRANT_TABLE
>  
>  	  If unsure, say Y.
>  
> +config BOOT_TIME_CPUPOOLS
> +	bool "Create cpupools at boot time"
> +	depends on HAS_DEVICE_TREE
> +	default n

Nit: Please omit this line - the default is N anyway unless specified
otherwise explicitly.

Jan



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 07:46:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 07:46:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288811.489860 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSZz6-0002OA-Hy; Fri, 11 Mar 2022 07:46:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288811.489860; Fri, 11 Mar 2022 07:46:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSZz6-0002O3-Et; Fri, 11 Mar 2022 07:46:48 +0000
Received: by outflank-mailman (input) for mailman id 288811;
 Fri, 11 Mar 2022 07:46:46 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=hT2a=TW=amazon.de=prvs=062ebc15f=doebel@srs-se1.protection.inumbo.net>)
 id 1nSZz3-0002Nx-Re
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 07:46:46 +0000
Received: from smtp-fw-80006.amazon.com (smtp-fw-80006.amazon.com
 [99.78.197.217]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 641735f3-a10f-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 08:46:44 +0100 (CET)
Received: from pdx4-co-svc-p1-lb2-vlan3.amazon.com (HELO
 email-inbound-relay-iad-1a-87b71607.us-east-1.amazon.com) ([10.25.36.214])
 by smtp-border-fw-80006.pdx80.corp.amazon.com with ESMTP;
 11 Mar 2022 07:46:24 +0000
Received: from EX13D03EUC002.ant.amazon.com
 (iad12-ws-svc-p26-lb9-vlan3.iad.amazon.com [10.40.163.38])
 by email-inbound-relay-iad-1a-87b71607.us-east-1.amazon.com (Postfix) with
 ESMTPS id BFD39140FF4; Fri, 11 Mar 2022 07:46:23 +0000 (UTC)
Received: from [192.168.11.20] (10.43.165.105) by EX13D03EUC002.ant.amazon.com
 (10.43.164.60) with Microsoft SMTP Server (TLS) id 15.0.1497.32;
 Fri, 11 Mar 2022 07:46:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 641735f3-a10f-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1646984804; x=1678520804;
  h=message-id:date:mime-version:subject:to:references:from:
   in-reply-to:content-transfer-encoding;
  bh=UefNS3sWcK2bd0zhcSvwZf+MbcZJY0pomDwhuvZFq7M=;
  b=CnMHnrjcyNMt4tdm4tlDF56oLf4cJtaVjgeE0+GGZG69R1TkiKtoHeHb
   yuLFUmeVzcUOYb7r8sZsYaIL/vBi9fmIea/hrQJupgCA9gHX8XCdV5I9/
   4nrCtOJ9jY2UTNAh1H0T8Co9uzVNgqX5Yf3EqKTjCz+lg+oThXy+h0XFE
   E=;
X-IronPort-AV: E=Sophos;i="5.90,173,1643673600"; 
   d="scan'208";a="70089535"
Message-ID: <be931738-facf-a6ae-e028-f561d6cb5e4c@amazon.de>
Date: Fri, 11 Mar 2022 08:46:21 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Subject: Re: alternatives+livepatch testing
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>, xen-devel
	<xen-devel@lists.xenproject.org>, Jan Beulich <jbeulich@suse.com>, Roger Pau
 Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>, Julien Grall
	<julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, Bertrand
 Marquis <Bertrand.Marquis@arm.com>, Oleksandr Tyshchenko
	<oleksandr_tyshchenko@epam.com>, Konrad Rzeszutek Wilk
	<konrad.wilk@oracle.com>, Ross Lagerwall <ross.lagerwall@citrix.com>, Michael
 Kurth <mku@amazon.de>, "Pohlack, Martin" <mpohlack@amazon.de>
References: <09e936c8-1110-a67b-cc67-9cf5ed5a3615@citrix.com>
From: "Doebel, Bjoern" <doebel@amazon.de>
In-Reply-To: <09e936c8-1110-a67b-cc67-9cf5ed5a3615@citrix.com>
X-Originating-IP: [10.43.165.105]
X-ClientProxiedBy: EX13D13EUA004.ant.amazon.com (10.43.165.22) To
 EX13D03EUC002.ant.amazon.com (10.43.164.60)
Precedence: Bulk
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: base64
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From xen-devel-bounces@lists.xenproject.org Fri Mar 11 08:09:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 08:09:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288824.489872 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSaKq-0005OT-Qd; Fri, 11 Mar 2022 08:09:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288824.489872; Fri, 11 Mar 2022 08:09:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSaKq-0005OM-N8; Fri, 11 Mar 2022 08:09:16 +0000
Received: by outflank-mailman (input) for mailman id 288824;
 Fri, 11 Mar 2022 08:09:15 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=aAGA=TW=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nSaKp-0005OG-7R
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 08:09:15 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 89a2988e-a112-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 09:09:13 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id EE2A8210FB;
 Fri, 11 Mar 2022 08:09:12 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 9774B13C9D;
 Fri, 11 Mar 2022 08:09:12 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id MC2qI6gDK2K6MQAAMHmgww
 (envelope-from <jgross@suse.com>); Fri, 11 Mar 2022 08:09:12 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 89a2988e-a112-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646986152; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=apEO+fK3/lEvU3etG3Kd0Wq+stgTKpVFChWgIjU+bGI=;
	b=a/NSywTYg2GlVhkLI73U8h2ace4A7MoLgN+LXfcI5fajsPcsM/7Q2C9Wqwu0FlOEbubpIW
	598/ZOtibduolcwZOFI+R8O98Tcn/IC8F4r7J3HobtxdjXev/xgDJDDE7rmVUddfpVTeAL
	tUIqnoqcy1CXeGfHqNfqrQLNXJVPZcU=
Message-ID: <378565ed-80d4-e760-2e25-f5d2e4cb9ce2@suse.com>
Date: Fri, 11 Mar 2022 09:09:12 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Content-Language: en-US
To: Luca Fancellu <luca.fancellu@arm.com>, xen-devel@lists.xenproject.org
Cc: wei.chen@arm.com, Stefano Stabellini <sstabellini@kernel.org>,
 Julien Grall <julien@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Wei Liu <wl@xen.org>, Dario Faggioli <dfaggioli@suse.com>
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-5-luca.fancellu@arm.com>
From: Juergen Gross <jgross@suse.com>
Subject: Re: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
In-Reply-To: <20220310171019.6170-5-luca.fancellu@arm.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------EhxemSYdkiauQaDdt6Ldc1Pg"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------EhxemSYdkiauQaDdt6Ldc1Pg
Content-Type: multipart/mixed; boundary="------------BDILBzsUsHNWO0cktHwYnT7s";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Luca Fancellu <luca.fancellu@arm.com>, xen-devel@lists.xenproject.org
Cc: wei.chen@arm.com, Stefano Stabellini <sstabellini@kernel.org>,
 Julien Grall <julien@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Wei Liu <wl@xen.org>, Dario Faggioli <dfaggioli@suse.com>
Message-ID: <378565ed-80d4-e760-2e25-f5d2e4cb9ce2@suse.com>
Subject: Re: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-5-luca.fancellu@arm.com>
In-Reply-To: <20220310171019.6170-5-luca.fancellu@arm.com>

--------------BDILBzsUsHNWO0cktHwYnT7s
Content-Type: multipart/mixed; boundary="------------vwxrcve0Cad7II0PEJuCugZJ"

--------------vwxrcve0Cad7II0PEJuCugZJ
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------vwxrcve0Cad7II0PEJuCugZJ
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----

xsBNBFOMcBYBCACgGjqjoGvbEouQZw/ToiBg9W98AlM2QHV+iNHsEs7kxWhKMjri
oyspZKOBycWxw3ie3j9uvg9EOB3aN4xiTv4qbnGiTr3oJhkB1gsb6ToJQZ8uxGq2
kaV2KL9650I1SJvedYm8Of8Zd621lSmoKOwlNClALZNew72NjJLEzTalU1OdT7/i
1TXkH09XSSI8mEQ/ouNcMvIJNwQpd369y9bfIhWUiVXEK7MlRgUG6MvIj6Y3Am/B
BLUVbDa4+gmzDC9ezlZkTZG2t14zWPvxXP3FAp2pkW0xqG7/377qptDmrk42GlSK
N4z76ELnLxussxc7I2hx18NUcbP8+uty4bMxABEBAAHNHEp1ZXJnZW4gR3Jvc3Mg
PGpnQHBmdXBmLm5ldD7CwHkEEwECACMFAlOMcBYCGwMHCwkIBwMCAQYVCAIJCgsE
FgIDAQIeAQIXgAAKCRCw3p3WKL8TL0KdB/93FcIZ3GCNwFU0u3EjNbNjmXBKDY4F
UGNQH2lvWAUy+dnyThpwdtF/jQ6j9RwE8VP0+NXcYpGJDWlNb9/JmYqLiX2Q3Tye
vpB0CA3dbBQp0OW0fgCetToGIQrg0MbD1C/sEOv8Mr4NAfbauXjZlvTj30H2jO0u
+6WGM6nHwbh2l5O8ZiHkH32iaSTfN7Eu5RnNVUJbvoPHZ8SlM4KWm8rG+lIkGurq
qu5gu8q8ZMKdsdGC4bBxdQKDKHEFExLJK/nRPFmAuGlId1E3fe10v5QL+qHI3EIP
tyfE7i9Hz6rVwi7lWKgh7pe0ZvatAudZ+JNIlBKptb64FaiIOAWDCx1SzR9KdWVy
Z2VuIEdyb3NzIDxqZ3Jvc3NAc3VzZS5jb20+wsB5BBMBAgAjBQJTjHCvAhsDBwsJ
CAcDAgEGFQgCCQoLBBYCAwECHgECF4AACgkQsN6d1ii/Ey/HmQf/RtI7kv5A2PS4
RF7HoZhPVPogNVbC4YA6lW7DrWf0teC0RR3MzXfy6pJ+7KLgkqMlrAbN/8Dvjoz7
8X+5vhH/rDLa9BuZQlhFmvcGtCF8eR0T1v0nC/nuAFVGy+67q2DH8As3KPu0344T
BDpAvr2uYM4tSqxK4DURx5INz4ZZ0WNFHcqsfvlGJALDeE0LhITTd9jLzdDad1pQ
SToCnLl6SBJZjDOX9QQcyUigZFtCXFst4dlsvddrxyqT1f17+2cFSdu7+ynLmXBK
7abQ3rwJY8SbRO2iRulogc5vr/RLMMlscDAiDkaFQWLoqHHOdfO9rURssHNN8WkM
nQfvUewRz80hSnVlcmdlbiBHcm9zcyA8amdyb3NzQG5vdmVsbC5jb20+wsB5BBMB
AgAjBQJTjHDXAhsDBwsJCAcDAgEGFQgCCQoLBBYCAwECHgECF4AACgkQsN6d1ii/
Ey8PUQf/ehmgCI9jB9hlgexLvgOtf7PJnFOXgMLdBQgBlVPO3/D9R8LtF9DBAFPN
hlrsfIG/SqICoRCqUcJ96Pn3P7UUinFG/I0ECGF4EvTE1jnDkfJZr6jrbjgyoZHi
w/4BNwSTL9rWASyLgqlA8u1mf+c2yUwcGhgkRAd1gOwungxcwzwqgljf0N51N5Jf
VRHRtyfwq/ge+YEkDGcTU6Y0sPOuj4Dyfm8fJzdfHNQsWq3PnczLVELStJNdapwP
OoE+lotufe3AM2vAEYJ9rTz3Cki4JFUsgLkHFqGZarrPGi1eyQcXeluldO3m91NK
/1xMI3/+8jbO0tsn1tqSEUGIJi7ox80eSnVlcmdlbiBHcm9zcyA8amdyb3NzQHN1
c2UuZGU+wsB5BBMBAgAjBQJTjHDrAhsDBwsJCAcDAgEGFQgCCQoLBBYCAwECHgEC
F4AACgkQsN6d1ii/Ey+LhQf9GL45eU5vOowA2u5N3g3OZUEBmDHVVbqMtzwlmNC4
k9Kx39r5s2vcFl4tXqW7g9/ViXYuiDXb0RfUpZiIUW89siKrkzmQ5dM7wRqzgJpJ
wK8Bn2MIxAKArekWpiCKvBOB/Cc+3EXE78XdlxLyOi/NrmSGRIov0karw2RzMNOu
5D+jLRZQd1Sv27AR+IP3I8U4aqnhLpwhK7MEy9oCILlgZ1QZe49kpcumcZKORmzB
TNh30FVKK1EvmV2xAKDoaEOgQB4iFQLhJCdP1I5aSgM5IVFdn7v5YgEYuJYx37Io
N1EblHI//x/e2AaIHpzK5h88NEawQsaNRpNSrcfbFmAg987ATQRTjHAWAQgAyzH6
AOODMBjgfWE9VeCgsrwH3exNAU32gLq2xvjpWnHIs98ndPUDpnoxWQugJ6MpMncr
0xSwFmHEgnSEjK/PAjppgmyc57BwKII3sV4on+gDVFJR6Y8ZRwgnBC5mVM6JjQ5x
Dk8WRXljExRfUX9pNhdE5eBOZJrDRoLUmmjDtKzWaDhIg/+1Hzz93X4fCQkNVbVF
LELU9bMaLPBG/x5q4iYZ2k2ex6d47YE1ZFdMm6YBYMOljGkZKwYde5ldM9mo45mm
we0icXKLkpEdIXKTZeKDO+Hdv1aqFuAcccTg9RXDQjmwhC3yEmrmcfl0+rPghO0I
v3OOImwTEe4co3c1mwARAQABwsBfBBgBAgAJBQJTjHAWAhsMAAoJELDendYovxMv
Q/gH/1ha96vm4P/L+bQpJwrZ/dneZcmEwTbe8YFsw2V/Buv6Z4Mysln3nQK5ZadD
534CF7TDVft7fC4tU4PONxF5D+/tvgkPfDAfF77zy2AH1vJzQ1fOU8lYFpZXTXIH
b+559UqvIB8AdgR3SAJGHHt4RKA0F7f5ipYBBrC6cyXJyyoprT10EMvU8VGiwXvT
yJz3fjoYsdFzpWPlJEBRMedCot60g5dmbdrZ5DWClAr0yau47zpWj3enf1tLWaqc
suylWsviuGjKGw7KHQd3bxALOknAp4dN3QwBYCKuZ7AddY9yjynVaD5X7nF9nO5B
jR/i1DG86lem3iBDXzXsZDn8R38=3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------vwxrcve0Cad7II0PEJuCugZJ--

--------------BDILBzsUsHNWO0cktHwYnT7s--

--------------EhxemSYdkiauQaDdt6Ldc1Pg
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIrA6gFAwAAAAAACgkQsN6d1ii/Ey+h
0Qf/XMSJYj0KfDgv7B6gWUMSv8BVtAS6jdqlkLV50hByol1zRxZ6sWQCpTDov45RV04ZR7ug+1mc
JmGJ/soD/JXBBjhSVX7/CcVVyPj+uEojq64Lb5unAWnAlbOUJi03h1F7wRTRujQFZcDmTAeY9W/T
zOSdxz4LcDrRxQhBx8JWElc9sF2y5McWWNculzMSTzrUm4Ow2TZzP5VMDsX64VhScks3FeLE0lFU
Kth+bVnEN7pnykM1Bxt3aikFORnTWzwt+Ru0Gl+XcQIWx1n0sG4ma3WYuOlQj0/ZVzh6U53PzVRw
wms09qKMUbCWLulgsT+zUWlSwa58sSV3TGbL5al09Q==
=lRqt
-----END PGP SIGNATURE-----

--------------EhxemSYdkiauQaDdt6Ldc1Pg--


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 08:09:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 08:09:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288825.489883 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSaL5-0005jj-5w; Fri, 11 Mar 2022 08:09:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288825.489883; Fri, 11 Mar 2022 08:09:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSaL5-0005jc-2t; Fri, 11 Mar 2022 08:09:31 +0000
Received: by outflank-mailman (input) for mailman id 288825;
 Fri, 11 Mar 2022 08:09:29 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=3DNt=TW=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nSaL3-0005ip-RZ
 for xen-devel@lists.xen.org; Fri, 11 Mar 2022 08:09:29 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 9289c869-a112-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 09:09:28 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2107.outbound.protection.outlook.com [104.47.17.107]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-37-DXckLLDDOR-y-zbnWdt8Xg-1; Fri, 11 Mar 2022 09:09:26 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AS8PR04MB9111.eurprd04.prod.outlook.com (2603:10a6:20b:44a::17)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar
 2022 08:09:24 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.022; Fri, 11 Mar 2022
 08:09:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9289c869-a112-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646986168;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=2ndhTxU01gVi5qaL0V/zrOWyWVNtAt9NIcKZrXiULoE=;
	b=Hznxq0ACwbRzrLXqUWH0H4xTcNLRyI+Vyv9Kutr39+wsTdMmKraE1qT/Lheq2AUzntWZi/
	b7MIxijJr44gwmMdC9WcJ/8esy3QJZJeh1LFMUnQ9ZnXGtekTnsbjNi6eMjHpRpF1ZmtlK
	I7CLxXrHYZA5+Bso/HS6MksROKybJsU=
X-MC-Unique: DXckLLDDOR-y-zbnWdt8Xg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=UYjwPYD2q7ASPqvUgBZqCWgeFtbVP40xQ9usYMppHs3IHkCG94Foew5bk2cZvzbPalet2+CJXI3kQFaL1xL2UZczgjohrRor5n/bE2CvUH7zipIz7vQFPBpbxXvYN9v1oQKdzpLe4WKHYS5BcGD3F0Y3EOjqzqAzVXXgH1790xgTG4FWmc3VMddu4suMDsgubkeiUAq7rI9UzsXVx07rYyZUZwe/WcPDTQ/DNbZ/B/P2KDAr4C/XUoRUnZv0S0zoELZpTyYk3I9+bEaPWpMYjeYMnB34EyTnx4nc++NZxyDLQGkkqBm7R/ePTh3oLVSkwIn2AvdsC8Lx7iHlWBWlzg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=2ndhTxU01gVi5qaL0V/zrOWyWVNtAt9NIcKZrXiULoE=;
 b=EY3ZJPmcSesa78+kPT1vNeVZDd2ZmkY2oHU62c5FAG9gbVqU1tbC2sm2RSm9gRWh9Tfwbo3d3vv+RT1hM7cGYUuSRsdLF219AhXvQsqXq7AJTx5dJRf86Cb0wNN8LcNH8la3ktwXC2mWACHjbG2ZFeRv1y3XoGxs3JHVEgVOvRQ+YV2koK6xhOQs+Ceu1bEjmtOAo6p5j4l5cTgtAArc17gQN60Gws+MruSMSrlsb7COg7ElDBGnlZAfM5VTrghyCesewRyu/6bizK/YVVre0iNCzJlwX5I8OWLZmZC6HDO6ZzdbKNXRJZbbW8sMQIVQqouf8W7AKXVgzCGZQdvefg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <2e74415a-d0d4-321b-be2e-a14db297c51a@suse.com>
Date: Fri, 11 Mar 2022 09:09:22 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: BUG: libxenlight fails to grant permission to access Intel IGD
 Opregion
Content-Language: en-US
To: Chuck Zmudzinski <brchuckz@netscape.net>
References: <4703b7f1-8d3c-5128-213c-e39f487e4cde.ref@netscape.net>
 <4703b7f1-8d3c-5128-213c-e39f487e4cde@netscape.net>
Cc: xen-devel@lists.xen.org
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <4703b7f1-8d3c-5128-213c-e39f487e4cde@netscape.net>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM5PR1001CA0063.EURPRD10.PROD.OUTLOOK.COM
 (2603:10a6:206:15::40) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: b1b72d91-a4f2-43b8-57af-08da03367484
X-MS-TrafficTypeDiagnostic: AS8PR04MB9111:EE_
X-Microsoft-Antispam-PRVS:
	<AS8PR04MB91114D2AFAA774330842D1F8B30C9@AS8PR04MB9111.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(86362001)(2906002)(31696002)(38100700002)(53546011)(6506007)(6512007)(6916009)(186003)(26005)(2616005)(316002)(66476007)(66946007)(508600001)(6486002)(5660300002)(4326008)(8676002)(66556008)(83380400001)(36756003)(8936002)(31686004)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?YWpxV044YnZYWmZ5a21hSlUrY3hVTDdQam5kT1FxcmJFUm5Ub3IvVDM3Uy8x?=
 =?utf-8?B?Tk10QjVOdzVsdXFmZ3R4dHBOUGVPdW96L3Y0RE01YTN2SjZtWXdhNTdnZXpx?=
 =?utf-8?B?OVI0UCtHVU1ZemNVYlJReWpqYTZjcHdiVFFZKzNGSGJITFlJc3NHV3BhS1Iy?=
 =?utf-8?B?Q0xSaWZrdE1jN2diYW11NFlKS1c4eEczcXFoYUNYY2F3anROdDdYSlF6aXdL?=
 =?utf-8?B?Ry93VGRMbUp1ZSttZERLVk11NHlZa3VwVnFmelFDeXMvY2RvVE9BQTlaelJs?=
 =?utf-8?B?QTB4MXFlYlBWU3FyeU5ldWJ1TWlQNytqQTA2RVVld0tiNHNjZFpLSnlrNlRr?=
 =?utf-8?B?bGNEdW5rWngyRktlaG00d2tPRGkvWEhRQU1OSFMxWjBqUmNGVG9zT1F0Snov?=
 =?utf-8?B?d3BaVXowVlpSRml1YTlFNmZhMlFUa3VZUmRBNGx4K0J1ZEZ5VzRKQmR1VjNL?=
 =?utf-8?B?dENIY3IzUVV2UFd2NnNKS3F0QUlweUswb2JyQ081VURFM3QvejRNcE5mTEVS?=
 =?utf-8?B?T0NldnoydlladzNaLzFHM1J1QWNmY0lmc3ZCWGtPbFovOEh5UkNsZGU4SHN6?=
 =?utf-8?B?R3lkaFpqS3VaK3dScjVoNWVxdDc0TXpzbmtWVFVMck5UVXh1NzhZKyt3V2xr?=
 =?utf-8?B?VmQ4RVh1aDI4RUVqVFFKd0MxUjYrSng0MjNSbEtZT3NXYTlNSWhiVjhnZy9L?=
 =?utf-8?B?N054RW1WaW9ZR2N2T2xiZ25qdUVLcUJBSnkrZnkyeDBYcmxWNkNkVVdUVjNB?=
 =?utf-8?B?NWdrMEx4ZEVxbTBzalpzWk5VMEFOMTdCVHRCeTRteDd4ZEZBakh1K2pqUWQ5?=
 =?utf-8?B?QkFxWDd4Z1lOY2JJNTBXTlF6TFc5eWlyTDlSTDJ4djhkN3dlYllaMHA4dFJM?=
 =?utf-8?B?TXNBZHRlZnpNS0dzLzA4ckRick14ZmJ5U1dlS2ZYVmxVMTlTRGo1NWhhSFlQ?=
 =?utf-8?B?cHM3c2N5VVhoRVN0b1FEenY0eDVLQk9mbnJqWnVFYjJaRnlObFBCdkdBckda?=
 =?utf-8?B?N2wwOVlSalJPK2l5U2tlMFdkdnFuUVM2eCtpTzlkMzJwYjhuWFdkd2lSN2Ev?=
 =?utf-8?B?dmdXOU45K052NGZycW9VN0l2WnIvU05SWTN0RjE2TnVhQSs5RmRTZnRHeDJP?=
 =?utf-8?B?Z3BsNnJGdXkwRndwUkxHa0dtL1VwbnY5cUtWOWVveUZRdU9JUzlKUk1ZUWFH?=
 =?utf-8?B?ZWZVZ016azNmTWpGNnM5VGxBWjhPeU5ZaFVPbi9IU0k4UUNkemJieGVjSWk2?=
 =?utf-8?B?V0FZUkVUS20yb1dobzJwcFFPb1R3ZHdmbFpYdkRZQ2hTSkQ4YVY4RFo2d1FD?=
 =?utf-8?B?UitQYWVRQ1hTSCt5RW91djJZeEJNczRNZ3JYbnlTM0EveCtRbXZ6a0xla01I?=
 =?utf-8?B?OGtFVFo3Z3dHSnkrQldyV2J3MnQySnNoU2pNdEFZOUdmcjRwbUUySDVXMmRB?=
 =?utf-8?B?aFAwWDZEeDcxNGx5MWUwVzFRWElQYVpQQUltdmNGR1hRVGhzeERaTHlxaTdj?=
 =?utf-8?B?ME5yZCtEdWJjKzg3WWdQZ3VzVElxN0d6QkNySkdnZmNiODJQRHBGNXg3Sk11?=
 =?utf-8?B?ZHNreTFTWHhjby9KZ2hFNngzU2VPamdRTm1FTng4a00zY2FPWkd4RGl6WjNh?=
 =?utf-8?B?cjh1QVpOZmRhU2ZITzVRaU01UFlNOVdKSEN1dWNzczFsZWoyWWFUSUpoMnVy?=
 =?utf-8?B?ZjhrelJVWEx0VFhRbUIvdFlSMzZGU3AvbWUxQTFGTUFpTDJaVmdhUnBheGdE?=
 =?utf-8?B?bFQ5WUh0UUNwTUQyS09pYlVTYm9FN0ZLbVVGQXMxbjI1MHg4T2dJOGRFRzJt?=
 =?utf-8?B?U2ZaZWVibnp5ZitadW5YOWlLMEpTd3NjZGQwQXcrYitZbjk1aDczUFNMTUFy?=
 =?utf-8?B?dXZsV2FrMGU4dWFXR0lTTG1lTnhlRXVuUURLMVE0cnY3QXdUY1NpR0JQY1BP?=
 =?utf-8?Q?rdvrl0koMg0TpWAclwED/kl9Y09t2Yec?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b1b72d91-a4f2-43b8-57af-08da03367484
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 08:09:24.5700
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: z7J4+kLFikP82dOtYntbxazDKkFFCb5gcGepE2p+IRtzY94hpV0CR+lCUxrm4tq7JXJ0d7lq5YWHgbD2sAxykw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR04MB9111

On 11.03.2022 06:01, Chuck Zmudzinski wrote:
> Further research showed that these two pages at 0xcc490 are for the
> Intel IGD opregion, and because this memory is not permitted to be
> accessed by the domain, the passthrough of an Intel IGD to a Linux
> HVM domain fails, causing a crash of the Linux i915.ko kernel module
> in the HVM domain. My testing, which was on a desktop with a Haswell
> Intel CPU/IGD, confirmed that these two extra pages need to be
> permitted in order for passthrough of the Intel IGD to a Linux
> domain to work properly.
> 
> I find that adding two pages is enough to fix the problem, but I
> have read in other places that the Opregion is actually three pages,
> and maybe newer revisions of the Intel IGD do need three pages instead
> of two. I am testing on a Haswell Intel chip, which is over 8 years old
> now. So the patch I propose adds two pages, but I am not sure if
> it should be three pages for newer Intel chips.
> 
> The failure to map this memory with gfx_passthru enabled
> is therefore a bug, a regression that was introduced with the two
> aforementioned patches way back in 2014 when Xen 4.5 was under
> development.

Thanks for this analysis. It looks quite plausible (but the question
of 2 vs 3 pages of course needs resolving).

> Once I developed a patch, I did more testing with the traditional
> Qemu device model and Debian's package of Xen-4.16 for Debian
> sid/unstable after I discovered where this bug first appeared in
> Xen 4.5-unstable back in 2014. In my testing, Windows HVM domains are
> not affected by this bug and they function properly, most likely
> because proprietary Intel graphics drivers for Windows are more
> forgiving than the Linux open source drivers for Intel graphics
> regarding the details of how Xen and Qemu configure the domain.
> 
> This bug still exists in current supported versions of Xen
> because in Xen 4.16, passthrough of my Haswell Intel IGD to a Linux
> domain still fails with a crash of the i915 Linux kernel module in
> the Linux unprivileged domain when the traditional Qemu device model
> is used in dom0. The patch at the end of this message fixes it.
> 
> I have not yet succeeded in reproducing this bug with the
> upstream device model because there is another bug in Qemu
> upstream that breaks passthrough of the Intel IGD to a Linux HVM
> domU, so for now, to reproduce it, please use the traditional device
> model.
> 
> Also, as a starting point to reproduce the bug, first get Intel IGD
> passthrough to a Windows HVM domain using the Qemu traditional
> device model working on Xen 4.16. Then replace the Windows HVM domain
> with a Linux HVM domain, keeping everything else the same including
> the Qemu traditional device model. I tested using a Debian 11.2
> (bullseye) HVM domain and Debian sid/unstable with Xen 4.16 and
> a build of the Qemu traditional device model from source as
> provided on xenbits.xen.org
> 
> I am using a desktop computer and the xl toolstack and Xen as
> packaged by Debian, except that I added the traditional device
> model that Debian does not provide.
> 
> If you need more info, please let me know. I am not subscribed to
> xen-devel so please cc me with your replies.
> 
> Regards,
> 
> Chuck
> 
> Here is the patch that fixes the bug on Debian sid/Xen 4.16:

As to an actual patch for us to take - please see
docs/process/sending-patches.pandoc for the formal requirements.
(Note this was recently introduced, so you won't find it in the
4.16 sources. But your patch wants to be against latest staging
anyway.)

Jan



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 08:12:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 08:12:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288834.489893 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSaOA-0007OR-Kz; Fri, 11 Mar 2022 08:12:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288834.489893; Fri, 11 Mar 2022 08:12:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSaOA-0007OK-Hl; Fri, 11 Mar 2022 08:12:42 +0000
Received: by outflank-mailman (input) for mailman id 288834;
 Fri, 11 Mar 2022 08:12:41 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=RXIo=TW=citrix.com=prvs=0626a3ed1=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nSaO9-0007OE-KI
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 08:12:41 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 02b8664a-a113-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 09:12:38 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 02b8664a-a113-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646986359;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=HeqqydfsS+PmwFlAbqrMgGh5Ib6STse+DUpnMAuX4OQ=;
  b=c9LaL5KlSFcDJQz3MlcidA6iqO58ojfH2ABu5E7fuQzOJb9h5QSuP7vJ
   Nzuf/dwaWYKJqzvsteQYdeVgwd9MM2ZNCCCh+2dzfHJ0nGThAI03+9iac
   HMEyE69vYLU+XoUr8HTn8B2EOlt6DkjvpVz66nP5uU7Rh01Bl2pQE3gHP
   0=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65998669
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:eUCbaKAXMLtAMRVW/x3jw5YqxClBgxIJ4kV8jS/XYbTApD0ngjYDy
 GBOXG+Ha6yMM2D9Lt9/OY/l8kID78DczN9jQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vg29Yx6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhw1
 fsXnraZcTw7O6/SvL4ieQAbSSxhaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguw5K8bmJsUHs2xIxjDFF/c2B5vERs0m4PcGgWZh1p4QTJ4yY
 eI3ewo0Uy/tfiZseX06JJs6s8uTmSLWJmgwRFW9+vNsvjm7IBZK+LTqPdDYfvSDQMxHmUDeq
 m+u13T0BFQWOcKSzRKB82mwnanfkCXjQoUQGbaksPlwjzW7xGYeFRkXXluTuuSihwi1XNc3A
 08T/DAnoe4t9UioZt7nVha8rTiPuRt0ZjZLO7RkskfXkPOSulvHQDhfJtJcVDA4nM4ra2YB/
 HaxpMHsByJL6oK/UDHH+6jB+FteJhMpBWMFYCYFSy4M7N/ivJw/g3rzczpzLEKmpoarQG+tm
 lhmuAB73uxO1pBTi81X6Hia22rEm3TfcuIiCuw7tEqB5xgxWoOqbpfABbPzvacZd9bxorVsU
 RE5dymiAAImUcDleM+lGrxl8FSVCxCtaWy0bblHRcVJythV0yT/Fb28GRknTKuTDu4KeCXyf
 GjYsh5L6ZlYMROCNPErPdPqVJt6lfC5S7wJs8w4iPIXM/CdkyfdoUlTibO4hTixwCDAb4ljU
 XtkTSpcJSlDUvk2pNZHb+wczaUq1kgDKZD7HvjGI+Cc+ePGPha9EO5dWHPXN7xRxP7U8W39r
 ocEX+PXmko3bQELSnSOmWLlBQtRdiZT6FGfg5E/S9Nv1SI9QTB/UaCNme19E2Gn9owM/tr1E
 riGchYw4HL0hGHdKBXMbXZmabj1Wo14o259NispVWtEEVB6CWpzxM/zr6cKQIQ=
IronPort-HdrOrdr: A9a23:S/nAuaohS/uz4NafxIP1ZksaV5vHL9V00zEX/kB9WHVpm5Oj+P
 xGzc526farslsssREb+OxpOMG7MBThHLpOkPMs1NaZLXLbUQ6TQr2KgrGSoQEIdxeOk9K1kJ
 0QDpSWa+eAc2SS7/yKmTVQeuxIqLLskNHKuQ6d9QYUcegDUdAe0+4TMHf8LqQZfngjOXJvf6
 Dsmvav6gDQMEg/X4CePD0oTuLDr9rEmNbPZgMHPQcu7E2rgSmz4LD3PhCE1lNGOgk/iosKwC
 zgqUjU96+ju/a0xlv10HLS1Y1fnJ/ExsFYDMKBp8AJInHHixquZq5mR7qe1QpF6N2H2RIPqp
 3hsh0gN8N85zf4eXy0mwLk303a3DMn+xbZuCulqEqmhfa8aCMxCsJHi44cWADe8VAcsNZ117
 8O936FtrJMZCmw0BjV1pztbVVHh0C0qX0tnao4lHpES7YTb7dXsMg24F5VKpEdByj3gbpXXd
 WGNPusqsq+TGnqLkww5gJUsZyRtzUIb127q3E5y4OoO2M8pgE786MarPZv60vouqhNCaWs3N
 60QpiApIs+P/P+UpgNd9vpYfHHfVAlEii8Rl57HzzcZdM60jT22tvK3Ik=
X-IronPort-AV: E=Sophos;i="5.90,173,1643691600"; 
   d="scan'208";a="65998669"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=iFaPO0e8UAUmOC8VrA4+2l1gpDEoBybsMpi1WPm2eWRH34TOdmT1xBdDQmTtONNsEKsX8h+/3a372cO4exqGEnVZbU//tafbeqS1SPCWDd1o2XvDSH1Nh/OV6B1u+85hN3STtSbJnk/ls0YLN+IMtUD56UNr5dGdg7yqkoQsLYpgSziWHl0cMsIC1mWX34tlFqKS2ZEdzH3/gHIhoYqz4qThEQR8bVj2caeQnueO9DOU1O1fu8Tqj7sjqvZTv6XyddROXYwP88QzkSICAO0PNNpoTAqBbxNMllp5Fqm+Y/hBLfvx1sKgW5yoZJ5qFtCDlb/PsShhn5pwWfAEZOsn6Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Hqj1Ct1vF/IdmNBlplv5XpzFFposBQj93hAh9uGH5E0=;
 b=enFpNX9J+YhiTcjxCjiHZ+r8OYjo8zOUS5pPq4vk7JSiHLmU4Q/8iznj4IwZID3BzUSD+ql0t+wObnbN0uLMtNL3xMp3mWSRaD21Z7vXX6i0EcraXi5pZ1kNP41hFQ0QsSnFF+3EUje6XNZF0CrSFMftuzC2wLkk8Mox2eLnmY7BkZr2DDex8B5KscKnuz6KXt+K7r2VoFnPvV6+2+culbqIcfLNYs5O9CG/wzDHQ8D3gCkPRUQ0gJThD/fOpzZTgiIKUepySQ+hI0Y/1xBEvBW52b0sTcSG/ALYl2s0jIXdqhWARDBo6Ytnwx5eiXWltBw59WApKG0dod1xynkQqA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Hqj1Ct1vF/IdmNBlplv5XpzFFposBQj93hAh9uGH5E0=;
 b=qHRTdNFfqTpEzDx928ueNZzHaTJOjhY6XdwSXSD69MmvSZ38AiWa9F7pjNbFdSEWrfq2tYI3KqOIRpg3aMSimNNHp3wfAs7B2sOLl85/hC+ovzj4T7cBUXGlbE48ano9czFZVqWo/9OBNuqxoGxq35mWtavpCJQX2IyTQq4yEDY=
Date: Fri, 11 Mar 2022 09:12:23 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>, Ross Lagerwall
	<ross.lagerwall@citrix.com>, <doebel@amazon.de>,
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH 3/3] livepatch: correctly handle altinstruction sections
Message-ID: <YisEZ2gYrVIAozYU@Air-de-Roger>
References: <20220310150834.98815-1-roger.pau@citrix.com>
 <20220310150834.98815-4-roger.pau@citrix.com>
 <2e2781eb-2c62-1c93-ef8e-75054a213fb8@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <2e2781eb-2c62-1c93-ef8e-75054a213fb8@suse.com>
X-ClientProxiedBy: MR1P264CA0140.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:501:51::6) To SA0PR03MB5610.namprd03.prod.outlook.com
 (2603:10b6:806:b2::9)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 044567c5-6937-4a05-6e32-08da0336e1a0
X-MS-TrafficTypeDiagnostic: BY5PR03MB5252:EE_
X-Microsoft-Antispam-PRVS: <BY5PR03MB525222640DEEE5755AF1213A8F0C9@BY5PR03MB5252.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: KfkH3Vh8MjOlUg9VFe8sOeHOd8ZBjCt6UaQqpx91kl6aXYooTvgiwQYzznQaWroADK1cfEBLQfioBTIjaCx5uXm2tuvokDD4m7FkTTrHTBAu/BSq145Uah/xTv2vCH+yKRMUYSZCfxXIaI/r/KG2YgCQYUd/isDc7ed8b5sXOPzeHpBcOnAw20OC6MFXn9baTQH4nM4mEWBqFYlboeLSpZdlN9BMzUc7rPVBjvtv3Gs6NHbm9lNZFunfRVLONVpFTXWN5f46YhvhKWjtdFW5OTwApsat4FRxlrvYjP/RrGOXzhlo5cIajQE6TpYtMAOi87QaPoIe1JB3aXPLEOikxuCpuoeZlEdgFpySM2Tj2ExSy9ZqyRvQiT+YIstrf5qy5MWQY1vKYj36j3xvZT6xzZ/GtGugNFBiJgGsJQfBfNy+gPUiPBrSZcQfuHAxW3GryvBrfubmgy9gm7sebnEeJjER7uAxjgAoOLnaQzNsVba3rwZ4AiZS0PcCVFlO9cTOWjTedTVt1OC5M2poQGPm5/YRxewjB0RAIGlMFZC35KnVEHjpCZVGnLvMMSsuyn2J64x1gt8RGrZ9i01pVWU/97tEAn3/PGtfPI/aXThBaJo+rF1H0nXVS1elWf8/IPDPUjTUdIsZsbvHHLImX+K2YQ==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SA0PR03MB5610.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(186003)(26005)(85182001)(54906003)(86362001)(33716001)(5660300002)(38100700002)(8936002)(83380400001)(6512007)(66556008)(66476007)(2906002)(82960400001)(6916009)(8676002)(316002)(6506007)(53546011)(6666004)(9686003)(66946007)(508600001)(4326008)(6486002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?Mm91MHdFNWhUaS9Qb0t6d2J1emVMOEIvYnpLditqSWZ6aWkwZm5CcFE2YXRH?=
 =?utf-8?B?eEtCandMckUwQ3g3OW9jM2hmVFdTTjNIOGRUOThQTktDMFF0aE9ZakFzcjhS?=
 =?utf-8?B?VVZZVEJFZHVOdUpLYjJGUEFHcE1XandPWG1LMFd5OGJ1TjI0d0JMZEpxMnFl?=
 =?utf-8?B?SVBTKzB1SWJEZlBzN0lZbWFsNUhJbnd1Q2JOanlFZTl1VkVLTnVBSFRtM25t?=
 =?utf-8?B?UUdtdVF4OUR5NXBHNkNhUmtLNlR6VFU3cDhtb041cklwcWdKWU5xL0NpUTZm?=
 =?utf-8?B?S1NGZGJ0b1puSzdXNHJmVzZiUWs0SkdXZHZCampPSk1FYXZkbDdtNUdzbmxm?=
 =?utf-8?B?dW9XanRvbEw2SFJMVmkxS25GQ0I4MEpZS0tKU3pLb3gvdXU0bUYwek5WVjQ2?=
 =?utf-8?B?QnRmZjl4eVh1RVdHWWtuUW1oeGNBWGY2WFlyYUp4MVBTUzNWL0NUYmg5YTRV?=
 =?utf-8?B?SzdNVW9mUzFzVlgwdEY4YkhEV1FDVlFQRS9FNkJmSjdKdkMwS0JTZDdGeGhI?=
 =?utf-8?B?QjV2VzBHNS9ScGYvSkpZTWNwU3BIU2JPTUZwbmZpVll0em5hUDNtWGZacE1M?=
 =?utf-8?B?M1lFYVQxdUtRSnpNNjNBdXl2dDc2WG1Zc0xVMFMrQ2J1ak1rSE1Oa2tUenZm?=
 =?utf-8?B?VURlOUtmK21kQUd0dStTd3FPd3BBUVRNNXh4ZytqQlArOWxnM1pzYlhsSjND?=
 =?utf-8?B?cmJuamxFUlZIOG5OellBaVlIclZkWHhabmJDcm9LKzlZTTM5UFhtM2F0bHJ4?=
 =?utf-8?B?Sld5RytReksvNWdtd1lQclpYRll5R2VVaVVDMlF6UE9ta3JEWUdmQmRlTWpK?=
 =?utf-8?B?RURjd1BkcSsycVJyODJMbGVBWHpXWWN2bGs4aGhwOVFPQU5qaVU1MXhGaVl4?=
 =?utf-8?B?eW1RWU0zbmZEamVOekZnV0dqSS9NMzFtQXBXaU9KNzNheVhicXEwZHVTMkdi?=
 =?utf-8?B?YU5TR2FYMjJLeTNrOWZOOWMxSmN6NG43UXhnQkRZdGFzTlJIUThpdHA0UHBl?=
 =?utf-8?B?ekptM3I2akNNRmN6MGkvb2JYaW9qTG9oNVIvUHhBRVVvMTgvSGc1TkFxOHdB?=
 =?utf-8?B?UWg2aHh1eC8zWkNYWnFFSWlyTjV2dzdFTEhuSDhBVG9ad0NBZHk1aG14alQ5?=
 =?utf-8?B?bHFRQlh1eURTYVhGTUVRSjBPWUxqQzduNGIweFl4bC9SSEs1K3lnbkszRWVT?=
 =?utf-8?B?ZDZzRHhZbTRzenBQZ2V1UkcrdnRCbGZtZXFXK0p2NFhheXRvdzExS0Q0TDRS?=
 =?utf-8?B?cHgxZ1pUc09DU29mNElqQ3Ixa3dRdXhBaUhndVNJWENoMWlvcEFETy9HeWls?=
 =?utf-8?B?ZFpVQkRRcXRjdWdhOWJqR2pyWnkvc0tYc2VZLytqdlpFRC9FaTlVZ3pla2Na?=
 =?utf-8?B?TFNxU3FtU0Q4SWFBOW1NR2w0WVF4VVlOWmlnK2pSR1pFMUpQaTh5RTNSZjRM?=
 =?utf-8?B?dHoyV200enFLa0w4QWQ4eWxIVEpycS9lWnMyTlJOME01aUtTTVZrKzg0TWcy?=
 =?utf-8?B?ZzVIYjZxTVBSWXN2Ukw1dWZsV1pxZjcrL0h1eVZhbENOTlo0KzJpcjFpZ2hw?=
 =?utf-8?B?c1Z0Q3JVNzlXQWQyZEFhcEVSeGl4R3ZDc0Zuckd1MG1WUjROU00xRkFFZkoy?=
 =?utf-8?B?TDltL3Fnak9KeFBLR01ZQmNsckRpSFBQelg2cmxPZHBEU0lVWlBLcHNtcFNu?=
 =?utf-8?B?ZWFJZFB3SERSZHlvQ0VubGZ2TlhKVWgraHVZM1A0S1VwLzhNSURZa0pIdnZ1?=
 =?utf-8?B?N0QzWDVSbGNwd0Vvb2UrOVFGYWdBSHBWRlBOTzRmYjlLZGJRMFVTQTJObjBo?=
 =?utf-8?B?ZDJnejRRUk0vNWNzYWg5cU1QUkJrcWVvWUc0ZFpCS0RoL2ZKMkpCTlFFa0I1?=
 =?utf-8?B?cmNqenhmcmo3UEg3U1VTTU80YlNtU1plMXV6ZnhGMklEbTBFamsrem9ObzY2?=
 =?utf-8?B?SUdaOHN4ajNScUorMnFmbFZZN0hCekNpck55aUxBNzVleUY1a2NROWlWcUNv?=
 =?utf-8?B?aVRZcFdqTXdnPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 044567c5-6937-4a05-6e32-08da0336e1a0
X-MS-Exchange-CrossTenant-AuthSource: SA0PR03MB5610.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 08:12:27.7207
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: fJNmSC7LNv2db85SQq9WfiwzefkardX/GiFE14r0MPcof8EIcBGdxkNd0VB8GLba73KFuzwCHoA93uD3RIoqEQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR03MB5252
X-OriginatorOrg: citrix.com

On Fri, Mar 11, 2022 at 08:35:18AM +0100, Jan Beulich wrote:
> On 10.03.2022 16:08, Roger Pau Monne wrote:
> > --- a/common.c
> > +++ b/common.c
> > @@ -249,19 +249,22 @@ int is_text_section(struct section *sec)
> >  		(sec->sh.sh_flags & SHF_EXECINSTR));
> >  }
> >  
> > +#define SEC_MATCH(n) !strncmp(sec->name, n, strlen(n) - 1)
> >  int is_rodata_section(struct section *sec)
> >  {
> >  	return sec->sh.sh_type == SHT_PROGBITS &&
> >  	       !(sec->sh.sh_flags & (SHF_EXECINSTR | SHF_WRITE)) &&
> > -	       !strncmp(sec->name, ".rodata", 7);
> > +	       (SEC_MATCH(".rodata") || SEC_MATCH(".data.ro_after_init"));
> >  }
> >  
> >  int is_init_section(struct section *sec)
> >  {
> >  	return sec->sh.sh_type == SHT_PROGBITS &&
> >  	       (sec->sh.sh_flags & SHF_ALLOC) &&
> > -	       !strncmp(sec->name, ".init", 5);
> > +	       (SEC_MATCH(".init") || SEC_MATCH(".text.startup") ||
> > +	        SEC_MATCH(".altinstr") || SEC_MATCH(".ctors"));
> 
> Having dealt with this recently - what about .init_array? Modern gcc
> prefers that over .ctors. Of course the question is whether either
> really needs dealing with here - these sections, to my knowledge,
> appear only with gcov support enabled. Not sure that's a case where
> livepatching is actually expected to be used.

.init_array will match the .init comparison, and thus is already
handled.

Regarding .ctors, it's certainly an .init section, so it doesn't hurt
to get added here in any case? (regardless of us only knowing it being
used for code coverage so far)

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 08:13:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 08:13:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288838.489905 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSaOw-0007wJ-U9; Fri, 11 Mar 2022 08:13:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288838.489905; Fri, 11 Mar 2022 08:13:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSaOw-0007wC-R6; Fri, 11 Mar 2022 08:13:30 +0000
Received: by outflank-mailman (input) for mailman id 288838;
 Fri, 11 Mar 2022 08:13:29 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=aAGA=TW=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nSaOv-0007sX-Ds
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 08:13:29 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 21c8f513-a113-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 09:13:28 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 6513A1F381;
 Fri, 11 Mar 2022 08:13:28 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 13DF513C9D;
 Fri, 11 Mar 2022 08:13:28 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id snGxAqgEK2J7MwAAMHmgww
 (envelope-from <jgross@suse.com>); Fri, 11 Mar 2022 08:13:28 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 21c8f513-a113-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646986408; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=ROxfp58BieFmJKYFavw5q8tvoKRS2fmJIXqK/EmLtbA=;
	b=tM5XmXbRis3VuF0Z0OIArzQpGreX01P/URtxTJNIAIQKK3xtDd+wsLqsjeu60Tju4Ofh3N
	0U3NNvPmf7XqhBSwjasbtW/YLt8MXG8+BhRhkIq+58lfWIBRcoThCZNUXUHJA1H4p5Web+
	TfNWTYgvu8msP0PZeCFlygWnqAEVQKU=
Message-ID: <5ec9811c-514c-8247-b45a-64b15d0bcc4b@suse.com>
Date: Fri, 11 Mar 2022 09:13:27 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [PATCH v2 3/6] xen/sched: retrieve scheduler id by name
Content-Language: en-US
To: Luca Fancellu <luca.fancellu@arm.com>, xen-devel@lists.xenproject.org
Cc: wei.chen@arm.com, George Dunlap <george.dunlap@citrix.com>,
 Dario Faggioli <dfaggioli@suse.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Wei Liu <wl@xen.org>
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-4-luca.fancellu@arm.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <20220310171019.6170-4-luca.fancellu@arm.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------rl409qTLmzFxDOW60qRfbJ7J"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------rl409qTLmzFxDOW60qRfbJ7J
Content-Type: multipart/mixed; boundary="------------682iHufVdKKfTqiztrlyVAms";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Luca Fancellu <luca.fancellu@arm.com>, xen-devel@lists.xenproject.org
Cc: wei.chen@arm.com, George Dunlap <george.dunlap@citrix.com>,
 Dario Faggioli <dfaggioli@suse.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Wei Liu <wl@xen.org>
Message-ID: <5ec9811c-514c-8247-b45a-64b15d0bcc4b@suse.com>
Subject: Re: [PATCH v2 3/6] xen/sched: retrieve scheduler id by name
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-4-luca.fancellu@arm.com>
In-Reply-To: <20220310171019.6170-4-luca.fancellu@arm.com>

--------------682iHufVdKKfTqiztrlyVAms
Content-Type: multipart/mixed; boundary="------------rfBrNlsnagXlMWli0oGCZNx2"

--------------rfBrNlsnagXlMWli0oGCZNx2
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------rfBrNlsnagXlMWli0oGCZNx2
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------rfBrNlsnagXlMWli0oGCZNx2--

--------------682iHufVdKKfTqiztrlyVAms--

--------------rl409qTLmzFxDOW60qRfbJ7J
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIrBKcFAwAAAAAACgkQsN6d1ii/Ey9i
WQf+JMQnnaDz3MBiOvaSPVlc9NGSeHjfmgM6ZhO4r39JpHOLfILYVFk93Xyt9gKlwEfGk+r9hg9z
KnHnD1Qtr07Et4Tlzol/mXQah/n9TprzfRCjLlj7TsroP1LCPnnsmriD5TXPZK3JkUDpL3Wo2Ere
CvsyjKG25+ZcAxMq1gG3r7cMQIhi4xgL3Ks/ZFMFNO2W/5RzbjdDUO2cr0T2DDu5ue19vgEH5lmR
y7C1J0CJ4P8zmdo6kVQiLIWUp5z3U31zfiAvaXLdJLT/RFMd/vvVc9qZ5+gw3uKTcRFI/m0hTp8k
lb2pLRsiv+kqd+mq9Z+ZWYCLcRMDBA+/qusAgLvNvQ==
=rdSm
-----END PGP SIGNATURE-----

--------------rl409qTLmzFxDOW60qRfbJ7J--


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 08:17:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 08:17:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288844.489916 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSaSR-0000GX-Gq; Fri, 11 Mar 2022 08:17:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288844.489916; Fri, 11 Mar 2022 08:17:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSaSR-0000GQ-Dw; Fri, 11 Mar 2022 08:17:07 +0000
Received: by outflank-mailman (input) for mailman id 288844;
 Fri, 11 Mar 2022 08:17:06 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=aAGA=TW=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nSaSQ-0000GJ-8f
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 08:17:06 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a2be9dab-a113-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 09:17:05 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 86E391F38D;
 Fri, 11 Mar 2022 08:17:04 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 527EF13C9D;
 Fri, 11 Mar 2022 08:17:04 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id ZvIyEoAFK2IWNQAAMHmgww
 (envelope-from <jgross@suse.com>); Fri, 11 Mar 2022 08:17:04 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a2be9dab-a113-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646986624; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=m5giv2VUbhUOTe8v735blL4jXRTl2UKmg1TxdJTcal0=;
	b=S7IN2a1lM9UaGLfIPO5TojMN0i+Ne8SVph8H416ZsW0vYimlETglaFKKdmmXEdCu5epTrC
	0C1sty9ah8GR4aeaBVd8K92Znzps4g8ZcdIKgn8r3HmarAi/yVpGKygV7JWacFdtFE41yq
	8Xy/bH9z0xRMlbDWsrQU/E7HK1/MSyM=
Message-ID: <2dfb6f30-ef47-0450-2846-c5e0e6e1c73e@suse.com>
Date: Fri, 11 Mar 2022 09:17:03 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [PATCH v2 1/6] tools/cpupools: Give a name to unnamed cpupools
Content-Language: en-US
To: Luca Fancellu <luca.fancellu@arm.com>, xen-devel@lists.xenproject.org
Cc: wei.chen@arm.com, Wei Liu <wl@xen.org>,
 Anthony PERARD <anthony.perard@citrix.com>
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-2-luca.fancellu@arm.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <20220310171019.6170-2-luca.fancellu@arm.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------r9VJ2ukTbZzGmipn0u4tVDuI"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------r9VJ2ukTbZzGmipn0u4tVDuI
Content-Type: multipart/mixed; boundary="------------0QfhGAUMn9buG0qd3EPR0072";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Luca Fancellu <luca.fancellu@arm.com>, xen-devel@lists.xenproject.org
Cc: wei.chen@arm.com, Wei Liu <wl@xen.org>,
 Anthony PERARD <anthony.perard@citrix.com>
Message-ID: <2dfb6f30-ef47-0450-2846-c5e0e6e1c73e@suse.com>
Subject: Re: [PATCH v2 1/6] tools/cpupools: Give a name to unnamed cpupools
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-2-luca.fancellu@arm.com>
In-Reply-To: <20220310171019.6170-2-luca.fancellu@arm.com>

--------------0QfhGAUMn9buG0qd3EPR0072
Content-Type: multipart/mixed; boundary="------------3IMchMNyIrEJV6phl3pqcHV0"

--------------3IMchMNyIrEJV6phl3pqcHV0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------3IMchMNyIrEJV6phl3pqcHV0
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------3IMchMNyIrEJV6phl3pqcHV0--

--------------0QfhGAUMn9buG0qd3EPR0072--

--------------r9VJ2ukTbZzGmipn0u4tVDuI
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIrBX8FAwAAAAAACgkQsN6d1ii/Ey+6
dQf/UPXlk4bf9OC4GD+rV1vNQROmDbOhpIFsLBx3Dvs7LJ0WlYUQcfCVRPkBmYEx0i+8jEPzNUFY
l9OAyVbv5n8rMFeTU3GVGhxntUXlrZDxj1+QuQW2qw8cj71Wy1j6rxtbxPDpCGmsofyts/uUIaPm
8WeeyfPa3JbBR2K9DvlEMOh26ExP4j5KenxIfJ/5h1+TN3fZG9J8iMoZ7B/Lldx8JybtOuE5/oyu
MNsvUKt1pG1lFtYRKs9la3yL2xznZ8u32ZYrVdCGkLgXp4kr2H8NdLIjGK9xqwxLRO4YfMuw5NR+
xDXws3gM+qpZHgW7IzJYA34oJ8r4tZiN2vAdaABfcQ==
=PuEC
-----END PGP SIGNATURE-----

--------------r9VJ2ukTbZzGmipn0u4tVDuI--


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 08:18:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 08:18:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288848.489927 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSaTv-0000qD-SR; Fri, 11 Mar 2022 08:18:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288848.489927; Fri, 11 Mar 2022 08:18:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSaTv-0000q6-PC; Fri, 11 Mar 2022 08:18:39 +0000
Received: by outflank-mailman (input) for mailman id 288848;
 Fri, 11 Mar 2022 08:18:38 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=3DNt=TW=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nSaTu-0000q0-GR
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 08:18:38 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id d9bf93d9-a113-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 09:18:37 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2174.outbound.protection.outlook.com [104.47.17.174]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-18-nmD2GCCqOGa5EGffebEb9Q-1; Fri, 11 Mar 2022 09:18:35 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB3PR0402MB3756.eurprd04.prod.outlook.com (2603:10a6:8:12::29)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar
 2022 08:18:34 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.022; Fri, 11 Mar 2022
 08:18:34 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d9bf93d9-a113-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646986717;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=oEMrupQxHKXScyxV+gcQit/P6hG0ObWUOL/SvpRO9m0=;
	b=GYPbQsTnX0zf/PRZxlreD7txaswLkHTQmo7Y/7gB9YN209oj5azATjpYK3/c1C3zqdyUJk
	T97iTgzdPo/o7su1PW+oO+EjpvLiZ+T81LKb6//QlSO/mv+70lMZUX4F0NrVWjPLNnRhEH
	8NFV3m/ZPiXExh3/LzzDu2fPzdC/8w0=
X-MC-Unique: nmD2GCCqOGa5EGffebEb9Q-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=LH87ZTVCXBbA1XnRnC2aoRImnLn30WzurGQzdNJAuHedeaiue4/bGnY9qX8FupbadnNGyCvPFt2rivc5CbkkTYE/yvwgCyow5kuMpzMg7ypQzUQ9YGSzYni9HGESa/ZrIbj1b5H8CDpse1dQ0jyZtSvGDbU6+cv7MV2ESglDdPBcJZayJYqNPXleznb0kluI0rtuMmElj7VlfI2ZQuzsB29pyUDvz1WsCtX7/oGEUBr/GAn6VBQsWfp0Ct9K8VIxno6z/vEhNYpHCg+MK9Vk1XAYNLLEcyJqgMeGEmLdsSzAZh1AvzPzSnMfQ16jM9pGnQlPVKrJDQEjjuIE9ZDFLw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=UFAvEK9VlK6CHPGYBUtNcbmWwHUOBj8Z9Dz/0FXC03A=;
 b=ZLE7JL7vv3Ge6yQoQO+H5eKvTUrG3LTBzOtig9u9kFHKTtV4wooQuFS/7vvLz/C6wdCXd8Ms5G/no2g2LNZY9NC4l5Ue5XKH+JFMiPpWWFJIjS/mbrZQxKnppAilYUgSs2/YprVTGblSUAsRfxo/kwCwAB5VmgKlMsRRCUHqqt6B3EMjVkbEp0UP4QG9qhNE3RuR8tEpZBkmZm9JxDaRgpiwwe1xbNLo3fxVeISwX3TjUElhD1+WPv5nYgtfg/+ZrbMmA2v8MmTU+dHX2vVTTysSrQD63qn03cKWdJdxzyN3ZhKlzNfDhMTq6912mkz5ejTPKZ2SF/mxYDSnw0WsOw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <44f928c0-b3fa-ed5b-4622-dd5cb044d459@suse.com>
Date: Fri, 11 Mar 2022 09:18:31 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH 3/3] livepatch: correctly handle altinstruction sections
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
 Ross Lagerwall <ross.lagerwall@citrix.com>, doebel@amazon.de,
 xen-devel@lists.xenproject.org
References: <20220310150834.98815-1-roger.pau@citrix.com>
 <20220310150834.98815-4-roger.pau@citrix.com>
 <2e2781eb-2c62-1c93-ef8e-75054a213fb8@suse.com>
 <YisEZ2gYrVIAozYU@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YisEZ2gYrVIAozYU@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6P194CA0093.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:209:8f::34) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c82bc159-0358-4a2a-65ec-08da0337bc3f
X-MS-TrafficTypeDiagnostic: DB3PR0402MB3756:EE_
X-Microsoft-Antispam-PRVS:
	<DB3PR0402MB3756A53C68B46F02567D7C16B30C9@DB3PR0402MB3756.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(54906003)(6916009)(508600001)(316002)(66476007)(66946007)(38100700002)(66556008)(4326008)(8676002)(2906002)(6486002)(83380400001)(6506007)(6666004)(31686004)(6512007)(53546011)(186003)(2616005)(26005)(5660300002)(8936002)(31696002)(36756003)(86362001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?uB/wems8mnU0/ZU7JQydlPrTr7LRJWl1KnzH5U5pmmXBGLhiMAduHkMEgfbH?=
 =?us-ascii?Q?Xyjg7dfdhWEpHm6zC6db8hArGcIY/uIhv5kYYWCQCLuLGB6YYin+aUsF/5Xy?=
 =?us-ascii?Q?ewf1CXOfJHDpoFhn92kwcNysjVRifACzTzqI+zj8zM6oFUhzgieFESqSaxQ7?=
 =?us-ascii?Q?JjtbUWhz49Ih8JZb536JUI9h/Jzrfv8nFehMbZeGgu+nC1y6w2LJa185JOyC?=
 =?us-ascii?Q?WVw9LYcZn8M6vxlbjR91JHgJhpFlhtuFDWNhYRZeexm7iWo5Aqy7pY1RnV5d?=
 =?us-ascii?Q?x7J0uEOmSMrdj5ScXv7g7gqgAbYrJPvJvK/dEKLFQaO69PczVs0bhrhN6W2X?=
 =?us-ascii?Q?6kCCPEclWWa6NqeZmpvd4WrDOcD+gSvPCxlIe98fOfCqAXyp1SaH1mWct9Q6?=
 =?us-ascii?Q?W+SYpia8QlU/zcAyh+eOd3CFM1YGYHNrRF6YBI7b1Rb1rTZI7akQIuZqM8UQ?=
 =?us-ascii?Q?qMNBwjA/pZg7bJ6v/qxY/JxTehYIogR3tG4PaJFP2xKmGzyZZZ1LjhLGqyFH?=
 =?us-ascii?Q?mh1IavRXGc4bPzCwb7UvGvIICae1tpQwGlZ09ws1HBiqJoX0VSOv918iO8yp?=
 =?us-ascii?Q?AAYg5Ar6k/zNYXkO9s1SOfnILSrgOJ6YzY5EjFJuQsYqF+SkLzeeJO+YoLko?=
 =?us-ascii?Q?B/0SfWVyI39BTO/UzjbflVhCmB+Mt6IKptXcAX1KvVf6bnuvXfKsv8EEQSaI?=
 =?us-ascii?Q?SI7u15/03KFWO9wMX1OyyWk7Hctvzd4mEDX1frupUOhcLN7UTl+074mtUcj9?=
 =?us-ascii?Q?fHZLsxwyIIqp9sCmY9oK4pCpeptCDJtatCp4JHLYUOcToZwoBD2N+sbgK09X?=
 =?us-ascii?Q?RaoXx6EDaKXLh05lXOmybTIung1wskJod8s3RMcKF0N11Y/11Xx91yk2Mm//?=
 =?us-ascii?Q?WBi5sJ9/1qEou/iBqgkbdE2/wLwNdMen33saw2ZvNNNXf95e0mdfhcSAcjXK?=
 =?us-ascii?Q?4cL0UObF66FUiHV0MjPkU4E70zS/gmOIkhR4T42GDgKUJOr5BMJtGmAFdDhe?=
 =?us-ascii?Q?u28hps6X/IHm33LI1JimFqYVdlUeNVQf4fCn4MYQiq5M0XOQNMvcvYlNree5?=
 =?us-ascii?Q?4ABzBDeMF4r/8JJtC0xaXhtk28ecZhZW3Cls/81rWZ6znxstpsBgJqVwXAN7?=
 =?us-ascii?Q?SNfDffsdKiHPXOJS+oMpaOk9zjBdsqPmN+qcTwj+4NvN5bcN/Kc3HLM1JwWn?=
 =?us-ascii?Q?FmWIwxXmiv5bAVrc0i5wN28e5c/y2d3z6hV0SiNuxzeirlHVQHWwi6MVyLK+?=
 =?us-ascii?Q?XI2/zsRX5EmZAR4mOx4EnaErCCNgh5jO5PUNvEQ5JAPo1U+Jo+r8v9hsZLwT?=
 =?us-ascii?Q?0FzzxBLBBaxsvg8FdkLsYIg4yGHWUxbb8HKEVUm60rzTN3o/s1xFi2bjFlE8?=
 =?us-ascii?Q?g1ggjOC/PaxyIHpqy8okMkQ1f1FUqnIPqDR59Xe70Mljb4iqxrpT82QNpOym?=
 =?us-ascii?Q?1n5IfpjJHiIXERaMdepKDD9mQ4wW2Bcv?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c82bc159-0358-4a2a-65ec-08da0337bc3f
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 08:18:34.4264
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: tTZ/QqOJ5ovJOzOMDs4XYfQ3DavRbRmv8dgwGdrcHGeslVExw22CO9eDfbWrpdH1TGzhZS3jCeLkZUFjhBnoIA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB3PR0402MB3756

On 11.03.2022 09:12, Roger Pau Monn=C3=A9 wrote:
> On Fri, Mar 11, 2022 at 08:35:18AM +0100, Jan Beulich wrote:
>> On 10.03.2022 16:08, Roger Pau Monne wrote:
>>> --- a/common.c
>>> +++ b/common.c
>>> @@ -249,19 +249,22 @@ int is_text_section(struct section *sec)
>>>  		(sec->sh.sh_flags & SHF_EXECINSTR));
>>>  }
>>> =20
>>> +#define SEC_MATCH(n) !strncmp(sec->name, n, strlen(n) - 1)
>>>  int is_rodata_section(struct section *sec)
>>>  {
>>>  	return sec->sh.sh_type =3D=3D SHT_PROGBITS &&
>>>  	       !(sec->sh.sh_flags & (SHF_EXECINSTR | SHF_WRITE)) &&
>>> -	       !strncmp(sec->name, ".rodata", 7);
>>> +	       (SEC_MATCH(".rodata") || SEC_MATCH(".data.ro_after_init"));
>>>  }
>>> =20
>>>  int is_init_section(struct section *sec)
>>>  {
>>>  	return sec->sh.sh_type =3D=3D SHT_PROGBITS &&
>>>  	       (sec->sh.sh_flags & SHF_ALLOC) &&
>>> -	       !strncmp(sec->name, ".init", 5);
>>> +	       (SEC_MATCH(".init") || SEC_MATCH(".text.startup") ||
>>> +	        SEC_MATCH(".altinstr") || SEC_MATCH(".ctors"));
>>
>> Having dealt with this recently - what about .init_array? Modern gcc
>> prefers that over .ctors. Of course the question is whether either
>> really needs dealing with here - these sections, to my knowledge,
>> appear only with gcov support enabled. Not sure that's a case where
>> livepatching is actually expected to be used.
>=20
> .init_array will match the .init comparison, and thus is already
> handled.

Oh, I guess I should have looked at what SEC_MATCH() actually does.

> Regarding .ctors, it's certainly an .init section, so it doesn't hurt
> to get added here in any case? (regardless of us only knowing it being
> used for code coverage so far)

It certainly doesn't hurt, sure.

Jan



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 08:21:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 08:21:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288852.489938 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSaWU-0002Dy-9I; Fri, 11 Mar 2022 08:21:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288852.489938; Fri, 11 Mar 2022 08:21:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSaWU-0002Dr-60; Fri, 11 Mar 2022 08:21:18 +0000
Received: by outflank-mailman (input) for mailman id 288852;
 Fri, 11 Mar 2022 08:21:16 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=aAGA=TW=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nSaWS-0002Dl-8i
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 08:21:16 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 374ae060-a114-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 09:21:14 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id F40E91F38D;
 Fri, 11 Mar 2022 08:21:13 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 8919513C9D;
 Fri, 11 Mar 2022 08:21:13 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id /GfwH3kGK2ISNwAAMHmgww
 (envelope-from <jgross@suse.com>); Fri, 11 Mar 2022 08:21:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 374ae060-a114-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646986874; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=NXKZK6VpRmVkqGgeqBb2LsXN95cf+e6tyUgBVx4yzR8=;
	b=nEVOKknHKq2LjN3CzzWqNopXQlhi6yEL0wckxXoR20uqEYbkP9eH71dGtXxi+D1NdKcGqB
	vZpG60tQs5kWEnlh1qzRYqSpSiAL8qD8mHGlHYY+MSJzZXf4WYSi175SNv99eRochgrpLR
	1CAm/U64QaQgOiEVyEXPiNtAKMWAaxE=
Message-ID: <8bbd6239-f6e9-6c76-bca7-b382306e4171@suse.com>
Date: Fri, 11 Mar 2022 09:21:12 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [PATCH v2 2/6] xen/sched: create public function for cpupools
 creation
Content-Language: en-US
To: Luca Fancellu <luca.fancellu@arm.com>, xen-devel@lists.xenproject.org
Cc: wei.chen@arm.com, Dario Faggioli <dfaggioli@suse.com>,
 George Dunlap <george.dunlap@citrix.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Wei Liu <wl@xen.org>
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-3-luca.fancellu@arm.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <20220310171019.6170-3-luca.fancellu@arm.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------UUgjTmVUl98wrUEGdY76aT2x"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------UUgjTmVUl98wrUEGdY76aT2x
Content-Type: multipart/mixed; boundary="------------fE7BZbS8pPGzPI3ffF6ibudk";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Luca Fancellu <luca.fancellu@arm.com>, xen-devel@lists.xenproject.org
Cc: wei.chen@arm.com, Dario Faggioli <dfaggioli@suse.com>,
 George Dunlap <george.dunlap@citrix.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Wei Liu <wl@xen.org>
Message-ID: <8bbd6239-f6e9-6c76-bca7-b382306e4171@suse.com>
Subject: Re: [PATCH v2 2/6] xen/sched: create public function for cpupools
 creation
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-3-luca.fancellu@arm.com>
In-Reply-To: <20220310171019.6170-3-luca.fancellu@arm.com>

--------------fE7BZbS8pPGzPI3ffF6ibudk
Content-Type: multipart/mixed; boundary="------------PlyAXB9er6a5m1IllIzc914r"

--------------PlyAXB9er6a5m1IllIzc914r
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

T24gMTAuMDMuMjIgMTg6MTAsIEx1Y2EgRmFuY2VsbHUgd3JvdGU6DQo+IENyZWF0ZSBuZXcg
cHVibGljIGZ1bmN0aW9uIHRvIGNyZWF0ZSBjcHVwb29scywgY2FuIHRha2UgYXMgcGFyYW1l
dGVyDQo+IHRoZSBzY2hlZHVsZXIgaWQgb3IgYSBuZWdhdGl2ZSB2YWx1ZSB0aGF0IG1lYW5z
IHRoZSBkZWZhdWx0IFhlbg0KPiBzY2hlZHVsZXIgd2lsbCBiZSB1c2VkLg0KPiANCj4gU2ln
bmVkLW9mZi1ieTogTHVjYSBGYW5jZWxsdSA8bHVjYS5mYW5jZWxsdUBhcm0uY29tPg0KPiAt
LS0NCj4gQ2hhbmdlcyBpbiB2MjoNCj4gLSBjcHVwb29sX2NyZWF0ZV9wb29sIGRvZXNuJ3Qg
Y2hlY2sgYW55bW9yZSBmb3IgcG9vbCBpZCB1bmlxdWVuZXNzDQo+ICAgIGJlZm9yZSBjYWxs
aW5nIGNwdXBvb2xfY3JlYXRlLiBNb2RpZmllZCBjb21taXQgbWVzc2FnZSBhY2NvcmRpbmds
eQ0KPiAtLS0NCj4gICB4ZW4vY29tbW9uL3NjaGVkL2NwdXBvb2wuYyB8IDE1ICsrKysrKysr
KysrKysrKw0KPiAgIHhlbi9pbmNsdWRlL3hlbi9zY2hlZC5oICAgIHwgMTYgKysrKysrKysr
KysrKysrKw0KPiAgIDIgZmlsZXMgY2hhbmdlZCwgMzEgaW5zZXJ0aW9ucygrKQ0KPiANCj4g
ZGlmZiAtLWdpdCBhL3hlbi9jb21tb24vc2NoZWQvY3B1cG9vbC5jIGIveGVuL2NvbW1vbi9z
Y2hlZC9jcHVwb29sLmMNCj4gaW5kZXggYTZkYTQ5NzA1MDZhLi44OWE4OTFhZjcwNzYgMTAw
NjQ0DQo+IC0tLSBhL3hlbi9jb21tb24vc2NoZWQvY3B1cG9vbC5jDQo+ICsrKyBiL3hlbi9j
b21tb24vc2NoZWQvY3B1cG9vbC5jDQo+IEBAIC0xMjE5LDYgKzEyMTksMjEgQEAgc3RhdGlj
IHZvaWQgY3B1cG9vbF9oeXBmc19pbml0KHZvaWQpDQo+ICAgDQo+ICAgI2VuZGlmIC8qIENP
TkZJR19IWVBGUyAqLw0KPiAgIA0KPiArc3RydWN0IGNwdXBvb2wgKl9faW5pdCBjcHVwb29s
X2NyZWF0ZV9wb29sKHVuc2lnbmVkIGludCBwb29sX2lkLCBpbnQgc2NoZWRfaWQpDQo+ICt7
DQo+ICsgICAgc3RydWN0IGNwdXBvb2wgKnBvb2w7DQo+ICsNCj4gKyAgICBpZiAoIHNjaGVk
X2lkIDwgMCApDQo+ICsgICAgICAgIHNjaGVkX2lkID0gc2NoZWR1bGVyX2dldF9kZWZhdWx0
KCktPnNjaGVkX2lkOw0KPiArDQo+ICsgICAgcG9vbCA9IGNwdXBvb2xfY3JlYXRlKHBvb2xf
aWQsIHNjaGVkX2lkKTsNCj4gKw0KPiArICAgIEJVR19PTihJU19FUlIocG9vbCkpOw0KPiAr
ICAgIGNwdXBvb2xfcHV0KHBvb2wpOw0KPiArDQo+ICsgICAgcmV0dXJuIHBvb2w7DQo+ICt9
DQo+ICsNCj4gICBzdGF0aWMgaW50IF9faW5pdCBjZl9jaGVjayBjcHVwb29sX2luaXQodm9p
ZCkNCj4gICB7DQo+ICAgICAgIHVuc2lnbmVkIGludCBjcHU7DQo+IGRpZmYgLS1naXQgYS94
ZW4vaW5jbHVkZS94ZW4vc2NoZWQuaCBiL3hlbi9pbmNsdWRlL3hlbi9zY2hlZC5oDQo+IGlu
ZGV4IDEwZWE5NjljN2FmOS4uNDdmYzg1NmUwZmUwIDEwMDY0NA0KPiAtLS0gYS94ZW4vaW5j
bHVkZS94ZW4vc2NoZWQuaA0KPiArKysgYi94ZW4vaW5jbHVkZS94ZW4vc2NoZWQuaA0KPiBA
QCAtMTE0NSw2ICsxMTQ1LDIyIEBAIGludCBjcHVwb29sX21vdmVfZG9tYWluKHN0cnVjdCBk
b21haW4gKmQsIHN0cnVjdCBjcHVwb29sICpjKTsNCj4gICBpbnQgY3B1cG9vbF9kb19zeXNj
dGwoc3RydWN0IHhlbl9zeXNjdGxfY3B1cG9vbF9vcCAqb3ApOw0KPiAgIHVuc2lnbmVkIGlu
dCBjcHVwb29sX2dldF9pZChjb25zdCBzdHJ1Y3QgZG9tYWluICpkKTsNCj4gICBjb25zdCBj
cHVtYXNrX3QgKmNwdXBvb2xfdmFsaWRfY3B1cyhjb25zdCBzdHJ1Y3QgY3B1cG9vbCAqcG9v
bCk7DQo+ICsNCj4gKy8qDQo+ICsgKiBjcHVwb29sX2NyZWF0ZV9wb29sIC0gQ3JlYXRlcyBh
IGNwdXBvb2wNCj4gKyAqIEBwb29sX2lkOiBpZCBvZiB0aGUgcG9vbCB0byBiZSBjcmVhdGVk
DQo+ICsgKiBAc2NoZWRfaWQ6IGlkIG9mIHRoZSBzY2hlZHVsZXIgdG8gYmUgdXNlZCBmb3Ig
dGhlIHBvb2wNCj4gKyAqDQo+ICsgKiBDcmVhdGVzIGEgY3B1cG9vbCB3aXRoIHBvb2xfaWQg
aWQuDQo+ICsgKiBUaGUgc2NoZWRfaWQgcGFyYW1ldGVyIGlkZW50aWZpZXMgdGhlIHNjaGVk
dWxlciB0byBiZSB1c2VkLCBpZiBpdCBpcw0KPiArICogbmVnYXRpdmUsIHRoZSBkZWZhdWx0
IHNjaGVkdWxlciBvZiBYZW4gd2lsbCBiZSB1c2VkLg0KPiArICoNCj4gKyAqIHJldHVybnM6
DQo+ICsgKiAgICAgcG9pbnRlciB0byB0aGUgc3RydWN0IGNwdXBvb2wganVzdCBjcmVhdGVk
LCBvbiBzdWNjZXNzDQo+ICsgKiAgICAgTlVMTCwgb24gY3B1cG9vbCBjcmVhdGlvbiBlcnJv
cg0KDQpFaXRoZXIgYWRkIGEgIi4iIGluIHRoZSBwcmV2aW91cyBsaW5lLCBvciByZXBocmFz
ZSAoZS5nLjoNCiJwb2ludGVyIHRvIHRoZSBzdHJ1Y3QgY3B1cG9vbCBqdXN0IGNyZWF0ZWQs
IG9yIE5VTEwgaW4gY2FzZSBvZiBlcnJvciINCg0KSSBoYXBwZW5lZCB0byByZWFkIGl0IGFz
ICJwb2ludGVyIHRvIHRoZSBzdHJ1Y3QgY3B1cG9vbCBqdXN0IGNyZWF0ZWQsDQpvbiBzdWNj
ZXNzIE5VTEwsIG9uIGNwdXBvb2wgY3JlYXRpb24gZXJyb3IiIGZpcnN0LCB3aGljaCB3YXMg
d2VpcmQuDQoNCldpdGggdGhhdCBmaXhlZDoNCg0KUmV2aWV3ZWQtYnk6IEp1ZXJnZW4gR3Jv
c3MgPGpncm9zc0BzdXNlLmNvbT4NCg0KDQpKdWVyZ2VuDQo=
--------------PlyAXB9er6a5m1IllIzc914r
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------PlyAXB9er6a5m1IllIzc914r--

--------------fE7BZbS8pPGzPI3ffF6ibudk--

--------------UUgjTmVUl98wrUEGdY76aT2x
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIrBnkFAwAAAAAACgkQsN6d1ii/Ey/V
xQf9HuHOhVR6goNc7b9eU5YAi7u987F3hg5EfrBLai1hKIA5a2DVR0XKvFhB0ZC/TpCSv056Od2a
bdnSHKdCH6TtkMoLQP44VJLVBFvnn8UtEkAbcpE0dZhaP8ws1wKWQSU7FABji7pv+mNuFUkm/n5j
iencsbHtetmPTXUsxAHLuDloJS6uY5zjt7r3Chnn/Qw2KEtItcY3ixCn05SIs28hdGEv/T2xE+s4
1KlJ6MWmu3dtmytyG2w/bJbqmaH6XaSrtZLBvWvxOXE5PtJnm794SlaR8QMQoL/UbJ5ELVTk4sLh
Bo+fRkP2KHkPnVhQHkoQIzWSqVO2fg/nzkhlWQqubA==
=/C/t
-----END PGP SIGNATURE-----

--------------UUgjTmVUl98wrUEGdY76aT2x--


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 08:25:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 08:25:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288858.489949 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSaax-0002wH-0N; Fri, 11 Mar 2022 08:25:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288858.489949; Fri, 11 Mar 2022 08:25:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSaaw-0002wA-Sz; Fri, 11 Mar 2022 08:25:54 +0000
Received: by outflank-mailman (input) for mailman id 288858;
 Fri, 11 Mar 2022 08:25:53 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=aAGA=TW=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nSaav-0002w4-Rb
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 08:25:53 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id dd64011e-a114-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 09:25:52 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 92AE51F381;
 Fri, 11 Mar 2022 08:25:52 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 4A27513A85;
 Fri, 11 Mar 2022 08:25:52 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id pEPJEJAHK2IyOQAAMHmgww
 (envelope-from <jgross@suse.com>); Fri, 11 Mar 2022 08:25:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: dd64011e-a114-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646987152; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=tq/mZqBDSm+MJQBgs9+hcoWxWqGgZpUACfqcB9eXLxk=;
	b=il/krjpVHnilQE7ry6rG/+lgzNSPFrlkHSVISHTtzzYCJ7zgsSXzoZ5INjTRXumDVu6CC7
	iYOOoyw9lbJqC4Dwnui0aF7shAI4uTDQmld9BCtlA6QoCLq76lSn/Des9AjskS8llC+pA8
	lJIWCMm1RqBwzlQIbZcigOuHKiwwrhs=
Message-ID: <2dedbb44-83cd-f491-35e2-8e6b5e884b26@suse.com>
Date: Fri, 11 Mar 2022 09:25:51 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [PATCH v2 6/6] xen/cpupool: Allow cpupool0 to use different
 scheduler
Content-Language: en-US
To: Luca Fancellu <luca.fancellu@arm.com>, xen-devel@lists.xenproject.org
Cc: wei.chen@arm.com, Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Wei Liu <wl@xen.org>, Dario Faggioli <dfaggioli@suse.com>
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-7-luca.fancellu@arm.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <20220310171019.6170-7-luca.fancellu@arm.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------Am6gw1Jg7lVY8nZ5C3XeOQ8G"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------Am6gw1Jg7lVY8nZ5C3XeOQ8G
Content-Type: multipart/mixed; boundary="------------iyl9VfiiLzYg24mfKf4dvmKe";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Luca Fancellu <luca.fancellu@arm.com>, xen-devel@lists.xenproject.org
Cc: wei.chen@arm.com, Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Wei Liu <wl@xen.org>, Dario Faggioli <dfaggioli@suse.com>
Message-ID: <2dedbb44-83cd-f491-35e2-8e6b5e884b26@suse.com>
Subject: Re: [PATCH v2 6/6] xen/cpupool: Allow cpupool0 to use different
 scheduler
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-7-luca.fancellu@arm.com>
In-Reply-To: <20220310171019.6170-7-luca.fancellu@arm.com>

--------------iyl9VfiiLzYg24mfKf4dvmKe
Content-Type: multipart/mixed; boundary="------------PE81kw7pdMX86qNeEIKH2D1C"

--------------PE81kw7pdMX86qNeEIKH2D1C
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------PE81kw7pdMX86qNeEIKH2D1C
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------PE81kw7pdMX86qNeEIKH2D1C--

--------------iyl9VfiiLzYg24mfKf4dvmKe--

--------------Am6gw1Jg7lVY8nZ5C3XeOQ8G
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIrB48FAwAAAAAACgkQsN6d1ii/Ey8e
RQf/WiC621Lt3J/LLSbZYIB+f9U3W70vyHlWlgoADHqokFbAiUovGEDqf3EUsjcXe/CBlt03sqEp
SKwFL/zEngQp2FJIxXhtO6/k5DOSIxvIZOe7qnteAAbWE4kyk2XKva+ymNxhldYIihXQQyErSvq5
dJErVhsL9g8TulR4OvzP20emFuDj91f7Cc+HRndb8Wacbx2wkCDUOHEOwnOMFdODH6OtaFcqFPZk
BOknuejT1ZD56leTJHVPBhclCw8Zmj277KKwh38kRBWRcCQbKanfjiOX1pc4TCQaDkNQkl1yv1es
kzIxRf2V/G8VouDKYcE4DqP+oIxItDPfiuiA4ZA86Q==
=Vere
-----END PGP SIGNATURE-----

--------------Am6gw1Jg7lVY8nZ5C3XeOQ8G--


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 08:33:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 08:33:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288862.489960 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSaiG-0004Mo-QB; Fri, 11 Mar 2022 08:33:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288862.489960; Fri, 11 Mar 2022 08:33:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSaiG-0004Mh-Mc; Fri, 11 Mar 2022 08:33:28 +0000
Received: by outflank-mailman (input) for mailman id 288862;
 Fri, 11 Mar 2022 08:33:27 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=RXIo=TW=citrix.com=prvs=0626a3ed1=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nSaiF-0004Mb-68
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 08:33:27 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ea034037-a115-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 09:33:25 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ea034037-a115-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646987605;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=tbG+5+VkxfK6tcUAsA2wH2gjzXbTR1WZcHafd0LDTg8=;
  b=NxyeemRWWnL0tl/FwDzz6qaIPHLUMpJ9wlPc3iwhrKkNaz/I1ln8EDYI
   xfIeq7tMzkIW6a4e0LkCJPjR+QW6cPYJNNwhnqVPAxGpWoukpi9CbqBOk
   0AwrPdN3zjL96YK/gu/WgHP9x6btUUP740hRhLci961HPAceVcm0ftWuy
   o=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 68350050
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:d9lZYa/O7nxz51KXQ12JDrUDq36TJUtcMsCJ2f8bNWPcYEJGY0x3m
 2YZUTyOOPyJYmCneYh1OYy3oRsDvJbcz9BlGgdk+Hg8E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oHgW1rlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnZ+fYxgLNermocIEVjxUVCtVM6l/8rCSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFJkYtXx6iynQEN4tQIzZQrWM7thdtNs1rp4eRquGP
 5dBAdZpRB3MM0dJKHsnNKs3tv+wunfgKQ8AjV3A8MLb5ECMlVcsgdABKuH9dtuHT8hRtk+dr
 3DB+SL1D3kyNsGbyDeD2mKhgKnIhyyTcJIfEvi0++BnhHWXx3cPE1sGWF2ju/67h0WiHdVFJ
 CQ8+S0ot6E+slOqStrVWAexq3qJ+BUbXrJt//YSsV/XjPCOukDAWzZCHmUphMEaWNEeRhMAy
 X2C2PnQIyVqlbHSQ1mT8o6eombnUcQKFlMqaSgBRAoDxtDspoAvkx7CJupe/L6JYs7dQm+pn
 W3TxMQqr/BK1JNQif3nlbzSq2/0/vD0ohgJChI7t45Pxidwf8abaoOh8jA3Bt4Qfd/CHjFtU
 JXp8vVyDdzi77nRxURho81XRdlFAspp1hWF0DaD+LF7q1yQF4aLJ9w43d2HDB4B3jw4UTHoe
 lTPngha+YVeOnCnBYcuPd7vWp91kvi4TY27PhwxUjaoSsEgHONg1HszDXN8Iki3yBR8+U3BE
 cvznTmQ4YYyVv08kWveqxY12r433CEurV4/trigpylLJYG2PSbPIZ9caQPmRrlgsMus/VWEm
 /4CZpDi40gOD4XDjtz/rNd7waYidiNgW/gbaqV/K4a+H+aRMDp4WqGLnu95JdANcmY8vr6gw
 0xRk3RwkTLXrXbGNR+LejZkbrbuVox4tnU1IWonOlPA5pTpSdrHAHs3H3fvQYQayQ==
IronPort-HdrOrdr: A9a23:iYVlrKgM1DBms2XGQwqGYCuornBQXkQji2hC6mlwRA09TyXBrb
 HXoBwavSWUtN9jYgBapTnmAtj/fZq8z+8L3WB/B8bFYOCLggSVxeJZnPrfKl/balTDH4dmvM
 8KGcUTNDSaNzhHZLPBkWuF+qEbsbq6Gc6T69v2/jNGRQRua6Zv0gt9Bh+bFEp7YxVDDpYjfa
 Dsg/Zvln6OcWUxcsCxCmIiUNHKqdHQ/aiWBiLuTCRXkjVmxQnYlYLSIlym2BcVXxdC260r/2
 Tpjxfw+6WktJiAu3vhPkHonuhrpOc=
X-IronPort-AV: E=Sophos;i="5.90,173,1643691600"; 
   d="scan'208";a="68350050"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=O12V8bs2RLrOKv/F0eUMltk5acC/0/jsqJU5ObKZqpCOoELpxmF4UsLyxeq3vt5+Q4LDvFuZMh/arM93XiO3l0V8zKZy5cN+h03iiZflL7lH0Ve0fw1Y8V3vivCN84f2by42O2/gRY5S4M06CW0AerXlw5ubddtJ+zJE045QcaPuPXPkrvYNpxCkB6RubeJ7sWzC8sMy/VGSfeOEjVy5B/WBfnjDo2MrAERjqVwFCdnXh/vLvUs4bFh4MgaHU1JqH5GjBvxSVVNtdq2TXvleaY+nLUrXaZWbQAq6wc9erZ/milE/MIAWSdhXMgY07q9aV9jSBtPxjNF8RtSMS+0Rlg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=dFdPvFcnYw6R7oQmRklyRYsTI4psmQhNZc4Km6yVZKE=;
 b=XomWG/kmYxrcX2P42ThQeZgmCsAHpBG+HPWyYrAhWnrOcW9X2LBE8ZbS9Wu734WO4sT9I5QDJwPx/zjIN9gbzEHSmGMLNuMvr4SBd6kX0oaVrlRxnzopjYux9jq7cLn7WPJrp/qbnFPu+dFza1YJAgAFl+3slmyPfrsjYF4uq/yVOPkrqWnXzgbEu3bvgzQW8ynKTrP+cL9kIW+a2GPpQv6tmzJtMUNENA9pwHBC+NJ2yJ4pWrIktqzj/4gqAb9s/dVA8lODL1wL45SBeBRM7JCrW4KofgLoYzD7ouZqXNvGEKtOn3DVBqEPSZSWZ32AKBlkz3ibpozU4kBSSJ9kDg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=dFdPvFcnYw6R7oQmRklyRYsTI4psmQhNZc4Km6yVZKE=;
 b=XxBLpFYZI5wkKaYYNMT9Z/iJNaonjjShDf+a/xfIzM3hfjktLNnndlbR9bWcXFc2k9Q1rBmDU6DBMIDS5upsDU/B+w3efHqWhCza69o99VjJJgPXYlvaZ19ce7gEqIMWo7hcaomsqkLsz9BvEQS8iTb0nzTCPCZwww/7c3EsvtU=
Date: Fri, 11 Mar 2022 09:33:15 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Ross
 Lagerwall <ross.lagerwall@citrix.com>, "konrad.wilk@oracle.com"
	<konrad.wilk@oracle.com>, "doebel@amazon.de" <doebel@amazon.de>,
	"julien@xen.org" <julien@xen.org>
Subject: Re: [PATCH 4/4] livepatch: differentiate between old and new build
 systems
Message-ID: <YisJS9ITWTpM7bYj@Air-de-Roger>
References: <20220302142711.38953-1-roger.pau@citrix.com>
 <20220302142711.38953-5-roger.pau@citrix.com>
 <32b098c1-963f-2e03-84bb-c8db410c8554@citrix.com>
 <Yidtuq8YUq+SbY7C@Air-de-Roger>
 <3e285745-9cc3-4f9a-ec27-fe917faa4547@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <3e285745-9cc3-4f9a-ec27-fe917faa4547@citrix.com>
X-ClientProxiedBy: MR2P264CA0152.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:501:1::15) To SA0PR03MB5610.namprd03.prod.outlook.com
 (2603:10b6:806:b2::9)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5f554c10-e4b1-4f7c-6d3d-08da0339cc36
X-MS-TrafficTypeDiagnostic: CH0PR03MB6082:EE_
X-Microsoft-Antispam-PRVS: <CH0PR03MB608209C546D0B0940DAFE6828F0C9@CH0PR03MB6082.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SA0PR03MB5610.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(53546011)(38100700002)(82960400001)(83380400001)(6506007)(9686003)(6512007)(8936002)(5660300002)(33716001)(2906002)(85182001)(66946007)(6666004)(66476007)(66556008)(6486002)(508600001)(186003)(26005)(54906003)(8676002)(6862004)(4326008)(86362001)(316002)(6636002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?VmlrNzcza0RxYzFHWktMM01xajg5VDlUcXFpNmJ2MUNhNzh5bitNMkNVZGdW?=
 =?utf-8?B?ZXlsbmdKU1QxSStWRUt0T0ljZEgyV1FSVmxLZWRVbEZYVTNuakFYVFdzYzJi?=
 =?utf-8?B?SXNXT2hBUVFkd2Uyd1RzSGJXUG1jNTFSdmVCZkdxci9PRHNmbGduaElBNVNw?=
 =?utf-8?B?d0hFbEJ0aGtOYjNCRnQ4WTBUbTBuNTB6U0hjQVE0K3VucktlV01Rc2RUUHdW?=
 =?utf-8?B?VUVteHJTenZXK2JlK3ZHV2NuWDYyRGdOaXJSWHg3MW5xTGVmd2JBOGJ1R3lS?=
 =?utf-8?B?ckdjd1FPbHJiazZ4bWUxRkFqSjE0dzRKUjhod2cwdHkvemJ0UlR3Q28zRTFS?=
 =?utf-8?B?b1VYNFpKRFI4K1lVVTB2NndhNW1sUXRGMmcreDY1YmFpc285MGtTWi9aY2RR?=
 =?utf-8?B?WlVUUkVaZXlZeW1vUDhidURLYmFCcFJhNlVycXNnUXdmeUVZQkRnSFpYRGNU?=
 =?utf-8?B?aWt6dk1tV1FyMHBYSEd2THZRY0JwQnorQVZNUDBudk1OR1Y5dWpJU2I1M0p5?=
 =?utf-8?B?OXRoU3NCdEZoWFdPRGtDOTZERjVVRnB6L0RTWTBGS2xwdlM3ajFibWV1YkZx?=
 =?utf-8?B?dXlIUmZNUGYwUGlER0E1TXJaWmJiajl5Yzc4MkxWblhYVUFpVyszSHAzODhs?=
 =?utf-8?B?bFpCajJMVmllMjNhSExNQi9ZYjhzcDNJeWRXV3Rta1FKcVZnNmVEdHJmS3pi?=
 =?utf-8?B?Rlk2dFAwck15VWFEV0JzK2x4VWdZdS9PK3RjWFZ4NmlxeUtja29XcXhPU2M5?=
 =?utf-8?B?OWJBeW1FbSswbGJhQkhRbjFTSWpOQW9XazYzU0ZHOTRQb1RkWnlTQnRnYjE5?=
 =?utf-8?B?TDRvVUQrbEszR3JaMmtPZTljVnNXQ1kzS3FKd1cxdTB5VTRnL1N0aW55aC84?=
 =?utf-8?B?ZVYxVnBIVDlKMkhHVTQ1YVRrVHhmcDQ0eXBCa0ZKSUlXRzdZNWlVb0JLbkVw?=
 =?utf-8?B?cmRVTkFTajZBRStObjNKSktiWVF5Tzh4eHF4d0xPU3Bvd2ZMSkp4cTU4SEtt?=
 =?utf-8?B?WE1HRmVlU29Gd0dPOVJPTUNuajBQTW40THJRL3o0eDFBYVJPQWxLV1lQcFNV?=
 =?utf-8?B?L0FwQ0hNcjFOaFpJdHBBSmpDYTVNUlRibXp4bkJ2WmpFeG00QW4yWlg0Smhj?=
 =?utf-8?B?TXlQMEMxUFlsUGlRR2pkUmlDRkpXdUJHOTQ0MmxmNDlDK3JMOTI1cVVFOFVI?=
 =?utf-8?B?aDRsME5yNE9yVHBJdHJEMjVnVGpLa3Z2amg2VEREbGowYmY4emxTV1pWcEda?=
 =?utf-8?B?QVF0cFBtZFAvdXZ6WmxSTDRzZnVXTWpoek5YSWptTVZzZzh2bklWWWNjMTVM?=
 =?utf-8?B?VjZBMFhxTTdPZndWaDZPY2w4eVBLR2lUSlBQallsVkRzYWZtbjRkN2RNb0lB?=
 =?utf-8?B?MUtEK3BtWkU4dndaSlI1Y3VWbXN2VzA0Z3QxNlE5QjM3N0FhcUVtNTFSVTM3?=
 =?utf-8?B?REpJbDZ2WUh4TDNXVnRqRWN5OU41cmN3ejQ0MWlWc0dmRVRMN05jZlZyQzdu?=
 =?utf-8?B?YUhEaU4xTnZLS2ZrTFRDYk5oUWlTaXB2T1RVVzRObWlGcGRSL0xLYVpNMVF1?=
 =?utf-8?B?amJGaUtyN2hIK2RSTzc2Z2pjNHpSY2J2WDRqU3V4dTRyclJ4c1drMDdqSFlS?=
 =?utf-8?B?ZFhNNlhRM2wxbXJIbWN6aXE2UEs5MFM4OWdycmhPZ2JKb2tTWmtQTTRGVjVU?=
 =?utf-8?B?OUwwMW04Ry9sOXZRNEphVllhSHpSNTdLQmltTTRBbG5weFZRSzNjNzFTN09E?=
 =?utf-8?B?NWhjU0VOTitRMkNTeCtsTFhaNDJSVGRNbW90UDJIeXlRT2prUGdDb1Q5NHQ1?=
 =?utf-8?B?bkppeDFmOWV6UVVCamtEaDJ6bi84UEovOHZMYzhmbzZQay9CeStrNzJUUWRr?=
 =?utf-8?B?RnZpMG03Zitrbi9TazN2RVRBUkR1UW1QaGMyQmZHdkxBSTI5TTBjZmNPUXYy?=
 =?utf-8?B?bi84RFlQSzdHVzVQYzRGT1RGR2xJTEpoN05WMTdyem54YnVjbEV2QTA1NFNY?=
 =?utf-8?B?UTc4NzhJQVRBPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 5f554c10-e4b1-4f7c-6d3d-08da0339cc36
X-MS-Exchange-CrossTenant-AuthSource: SA0PR03MB5610.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 08:33:20.2984
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: GvQ6398EEoE4L4UbRnU9eu5/4LI/IEKzjGJhR0G57lufqoFY3WMYCi+e7B1vSnjRjrAiW9phCTM2p9KimyEL1g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH0PR03MB6082
X-OriginatorOrg: citrix.com

On Thu, Mar 10, 2022 at 06:01:48PM +0000, Andrew Cooper wrote:
> On 08/03/2022 14:52, Roger Pau Monne wrote:
> > On Tue, Mar 08, 2022 at 02:38:47PM +0000, Andrew Cooper wrote:
> >> On 02/03/2022 14:27, Roger Pau Monne wrote:
> >>> diff --git a/livepatch-build b/livepatch-build
> >>> index 38a92be..656cdac 100755
> >>> --- a/livepatch-build
> >>> +++ b/livepatch-build
> >>> @@ -98,14 +98,20 @@ function build_special()
> >>>  
> >>>      # Build with special GCC flags
> >>>      cd "${SRCDIR}/xen" || die
> >>> -    sed -i 's/CFLAGS += -nostdinc/CFLAGS += -nostdinc -ffunction-sections -fdata-sections/' Rules.mk
> >>> -    cp -p arch/x86/Makefile arch/x86/Makefile.bak
> >>> -    sed -i 's/--section-alignment=0x200000/--section-alignment=0x1000/' arch/x86/Makefile
> >>> -    # Restore timestamps to prevent spurious rebuilding
> >>> -    touch --reference=arch/x86/Makefile.bak arch/x86/Makefile
> >>> -    make "-j$CPUS" $XEN_DEBUG &> "${OUTPUT}/build_${name}_compile.log" || die
> >>> -    sed -i 's/CFLAGS += -nostdinc -ffunction-sections -fdata-sections/CFLAGS += -nostdinc/' Rules.mk
> >>> -    mv -f arch/x86/Makefile.bak arch/x86/Makefile
> >>> +    if grep -q 'nostdinc' Rules.mk; then
> >>> +         # Support for old build system, attempt to set -f{function,data}-sections and rebuild
> >>> +        sed -i 's/CFLAGS += -nostdinc/CFLAGS += -nostdinc -ffunction-sections -fdata-sections/' Rules.mk
> >>> +        cp -p arch/x86/Makefile arch/x86/Makefile.bak
> >>> +        sed -i 's/--section-alignment=0x200000/--section-alignment=0x1000/' arch/x86/Makefile
> >>> +        # Restore timestamps to prevent spurious rebuilding
> >>> +        touch --reference=arch/x86/Makefile.bak arch/x86/Makefile
> >>> +        make "-j$CPUS" $XEN_DEBUG &> "${OUTPUT}/build_${name}_compile.log" || die
> >>> +        sed -i 's/CFLAGS += -nostdinc -ffunction-sections -fdata-sections/CFLAGS += -nostdinc/' Rules.mk
> >>> +        mv -f arch/x86/Makefile.bak arch/x86/Makefile
> >>> +    else
> >>> +        # -f{function,data}-sections set by CONFIG_LIVEPATCH
> >>> +        make "-j$CPUS" $XEN_DEBUG &> "${OUTPUT}/build_${name}_compile.log" || die
> >>> +    fi
> >> This really ought to be the other way around, by spotting the thing we
> >> know is good, and then falling back to the heuristics.  In light of the
> >> updates to the Xen side, something like:
> > I'm not sure I agree. I do prefer to spot the 'bad' one, and just
> > fallback to expecting Xen to correctly set -f{function,data}-sections
> > otherwise.
> >
> >> if grep -q CC_SPLIT_SECTIONS Kconfig; then
> > Because this logic ties us to not moving CC_SPLIT_SECTIONS from being
> > defined in xen/Kconfig (or even changing it's name), and gain ties the
> > livepatch tools to internal details about the Xen build system.
> 
> It doesn't particularly matter which way around the if/else is.  It does
> matter that we're choosing based on something relevant.
> 
> nostdinc in Rules.mk has exactly the same amount of "magic string in
> magic file" as CC_SPLIT_SECTIONS in Kconfig, but has absolutely nothing
> to do with the property we actually care about.
> 
> Really what you actually want is
> 
> if grep -q CC_SPLIT_SECTIONS Kconfig; then
>     # Xen behaves sensibly
> elif grep -q 'nostdinc' Rules.mk; then
>     # Legacy mess with Rules.mk
> else
>     die "Help with build system divination"
> fi
> 
> The "behaves sensibly" case is unlikely to change name and unlikely to
> move locations, but each are easy to cope with via `grep -e FOO -e BAR
> file1 file2`, and this approach avoids the problem of blindly (and
> falsely) assuming that anything which is 4.14 and later splits sections
> correctly, and that this will remain true even when someone adds "# use
> to have -nostdinc here" to Rules.mk.

TBH, I don't find the proposed solution is much better to what's in
this patch, and as said I really dislike tying the behavior of the
livepatch build tools to heuristics against Xen internal build files -
be it a Kconfig or a Makefile. Specially because your proposed
approach adds heuristics to detect the 'good' case which should be the
default one going forward.

A better option might be to just make the 'build adjustments' a
command line option that the user can pass to the tools, ie:
--build-adjust and let the user decide whether it needs the
adjustments or not. If I was a livepatch user myself I would seriously
consider picking the linker script changes and backport that to my
production version.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 08:56:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 08:56:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288866.489971 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSb4s-0006pT-Nj; Fri, 11 Mar 2022 08:56:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288866.489971; Fri, 11 Mar 2022 08:56:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSb4s-0006pL-Jj; Fri, 11 Mar 2022 08:56:50 +0000
Received: by outflank-mailman (input) for mailman id 288866;
 Fri, 11 Mar 2022 08:56:48 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=PRj6=TW=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nSb4q-0006pF-Fj
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 08:56:48 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05on2062f.outbound.protection.outlook.com
 [2a01:111:f400:7d00::62f])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 2db545fa-a119-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 09:56:46 +0100 (CET)
Received: from AM6P194CA0007.EURP194.PROD.OUTLOOK.COM (2603:10a6:209:90::20)
 by AS8PR08MB7141.eurprd08.prod.outlook.com (2603:10a6:20b:401::10) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar
 2022 08:56:32 +0000
Received: from VE1EUR03FT056.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:90:cafe::45) by AM6P194CA0007.outlook.office365.com
 (2603:10a6:209:90::20) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22 via Frontend
 Transport; Fri, 11 Mar 2022 08:56:32 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT056.mail.protection.outlook.com (10.152.19.28) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 08:56:32 +0000
Received: ("Tessian outbound 18e50a6f0513:v113");
 Fri, 11 Mar 2022 08:56:31 +0000
Received: from d5cd513202a1.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 B7841A13-F092-4516-AB07-143FE0BC11AF.1; 
 Fri, 11 Mar 2022 08:56:25 +0000
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id d5cd513202a1.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 11 Mar 2022 08:56:25 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by AM9PR08MB7150.eurprd08.prod.outlook.com (2603:10a6:20b:41f::7)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.16; Fri, 11 Mar
 2022 08:56:22 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5061.022; Fri, 11 Mar 2022
 08:56:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2db545fa-a119-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=InW73DvoZDmJPyo+8XSYzoNYtujMyRd1DovMiR6B4oY=;
 b=Gq9ZgtF7EPv1yoarYHILCTm+FdwVFj4V1KWOnjdgANgrNK4fn0zGrejAS8JB+EbbNGilj7vRgk0tLBofRm+qbrbElBP0/ZGv3LQeev7QnyTGEcIU8tjogFwFpI4yX+qx6in4wiNoKy4b/s+HoiDfT+rIS25pE7lBPQflgpxnADw=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 47024c25e44bfe19
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=bYZBbesbszfkp/DBpcO5BXKibWb0JEL9xv/qQxz8PbhJAwqLwXTHEEswyu6ZwfvZRFfpGM/RfIqlaKvCRGicEkbTd/ptbHJujLhUunAPkGs2nQg58PZAPBdJxBzTXCOrbUkHCIPT6Cc6+69zssnf+htKEh7Gz6cSy2jM8ufpWOuyqIX5WAYhEMHUSHLHmeS1ApKoqmda8JKllFrWVsMEtmfvHoLmrdsOQWm952dDnBB346kWKmuQBnrOBwafUP9Rv/369KN/OR3SgW24TPghSCXhzRwe8m1UuKEh9VYQn+ugEs8YiTdMDkLyBQttd5XwBp7PEnQMgcB+EsIQLMryNA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=InW73DvoZDmJPyo+8XSYzoNYtujMyRd1DovMiR6B4oY=;
 b=ik5qWyKI2/zRgmtkqh6hE3Q+EaNfKMr/vkQ3X4EL3reXpebdV6bZpjQuKpcCKXe/V9aIh+FcPNZ+s6lo/H09SVf8Hyokxd29JYvHae3SGCjMiyBHAe2/HHWnXNY5LRRyEnRMw1F/bBhlLDf7muYplz8cA7aqVbwbylif1d4IftduQFBSqhkjsvFw8il7rw9pjZdN0A+Poh7FSEBpSr9kzjfTeahKEDCBWDmDUR8t2NhL83BwJQmuikdXhdz0KqbJuuSfRxtxWyzsWaahR3/z+ISJDKAUuE9PN/I95U57aMChyXBKFGiPXP6cIbC17QjfAjJ3UAslM0oHjrShEFAz2Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=InW73DvoZDmJPyo+8XSYzoNYtujMyRd1DovMiR6B4oY=;
 b=Gq9ZgtF7EPv1yoarYHILCTm+FdwVFj4V1KWOnjdgANgrNK4fn0zGrejAS8JB+EbbNGilj7vRgk0tLBofRm+qbrbElBP0/ZGv3LQeev7QnyTGEcIU8tjogFwFpI4yX+qx6in4wiNoKy4b/s+HoiDfT+rIS25pE7lBPQflgpxnADw=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Juergen Gross <jgross@suse.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>,
	Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>,
	Bertrand Marquis <Bertrand.Marquis@arm.com>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>, Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>, Dario Faggioli <dfaggioli@suse.com>
Subject: Re: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Topic: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Index: AQHYNKHSvTK6bj2+f02v/DWZHCtE9qy51VEAgAANLYA=
Date: Fri, 11 Mar 2022 08:56:22 +0000
Message-ID: <0D3FFA8E-A904-4375-BDBB-2C974C224D14@arm.com>
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-5-luca.fancellu@arm.com>
 <378565ed-80d4-e760-2e25-f5d2e4cb9ce2@suse.com>
In-Reply-To: <378565ed-80d4-e760-2e25-f5d2e4cb9ce2@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 1a546a69-a0e3-429d-1ce4-08da033d0a2d
x-ms-traffictypediagnostic:
	AM9PR08MB7150:EE_|VE1EUR03FT056:EE_|AS8PR08MB7141:EE_
X-Microsoft-Antispam-PRVS:
	<AS8PR08MB7141B95F93E1DFF36EBD7A10E40C9@AS8PR08MB7141.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 BPGVF/t/G/8UFMZT3mEgdQLzfCjXxez5yXO+AQN+BQ/QTJCZyJ2TqgmanIETmqnn5uqA0ImfSWgft5XPb929PGL2hweuJgkYA037UPq5PNn95OtOSZKJO7xIJjPYQWOOMO5uIU6/JRkq85Rs+J4th3zlBwzkFUA934Ha2+79ylcOSsDHVM1LiPrIkfp+BmNWP2d7xePHOthaNI7T2FHfhSJIRKm4siXlk5jvMFGTP1vqNlEvWSeEgJX1klEhgf0nfbu77dCt1JsIdmjpPXKA0sB3Lqq8OLdDTT7Q2QiXoLOv+YKg+UFrGwqwmECWxvqeY/S3HMJM8iSURP7jVvtITUEk9LzoWoIXfm3JvtOMpTdL7jKt2awhqGa6RLaJjoXXGLuNtUDMtiscOGD+ejRAJ1ZpySpjpN1fhqVHEM5/y+CFPZ7jQ5Awzb6L9TCK/+e46JPPYiO8Sb2L7XtEcwXQcsrCYH788vpEDku5p4EixjX+zRbSZO2kxFPo0w0C6H/NErVL3mChq3RaM8M1guH0RZWumay1lvQ2MNddbsow9y/WsdWTg2Q6VTq6eMNY0w+Y+h/DjCtQs9Wl0ZjqBWkeJ3Fq+vR7gMZH0KcFC1b//4UATTY3aDNCpRdG/tPnwagdZmZHdE9QNQFYXMqNgUnj75Kixp4zcjunHywms16Ufx2zk2gOkjXh+EahE+DDKWlpQPd7GjymBO7h/BcnJfe3yyrsYLRmtXZIN9fwC9MeAUa8beHJXM1SnI0GG0PNd1dG
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(2616005)(186003)(8936002)(7416002)(6486002)(54906003)(26005)(38070700005)(508600001)(71200400001)(53546011)(5660300002)(76116006)(38100700002)(30864003)(6506007)(6512007)(33656002)(316002)(36756003)(86362001)(64756008)(66476007)(66446008)(66556008)(91956017)(8676002)(6916009)(122000001)(83380400001)(4326008)(66946007)(2906002)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <6C2D3AEA3121744AA0BD53AF5D08F485@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR08MB7150
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT056.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	735a5960-193c-4e95-666c-08da033d0403
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(70206006)(70586007)(40460700003)(4326008)(8936002)(6862004)(8676002)(5660300002)(2906002)(53546011)(6506007)(316002)(33656002)(30864003)(356005)(81166007)(36756003)(107886003)(86362001)(6512007)(336012)(26005)(186003)(2616005)(54906003)(82310400004)(508600001)(6486002)(47076005)(36860700001)(83380400001);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 08:56:32.3557
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 1a546a69-a0e3-429d-1ce4-08da033d0a2d
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT056.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR08MB7141
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From xen-devel-bounces@lists.xenproject.org Fri Mar 11 09:20:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 09:20:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288872.489982 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSbRm-0001eu-RV; Fri, 11 Mar 2022 09:20:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288872.489982; Fri, 11 Mar 2022 09:20:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSbRm-0001en-OG; Fri, 11 Mar 2022 09:20:30 +0000
Received: by outflank-mailman (input) for mailman id 288872;
 Fri, 11 Mar 2022 09:20:29 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=2/As=TW=arm.com=Henry.Wang@srs-se1.protection.inumbo.net>)
 id 1nSbRl-0001eh-5a
 for xen-devel@lists.xen.org; Fri, 11 Mar 2022 09:20:29 +0000
Received: from EUR03-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur03on062b.outbound.protection.outlook.com
 [2a01:111:f400:fe09::62b])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 7ba7c515-a11c-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 10:20:25 +0100 (CET)
Received: from AM5PR0502CA0008.eurprd05.prod.outlook.com
 (2603:10a6:203:91::18) by DBAPR08MB5717.eurprd08.prod.outlook.com
 (2603:10a6:10:1ae::23) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.29; Fri, 11 Mar
 2022 09:20:22 +0000
Received: from VE1EUR03FT045.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:203:91:cafe::a9) by AM5PR0502CA0008.outlook.office365.com
 (2603:10a6:203:91::18) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22 via Frontend
 Transport; Fri, 11 Mar 2022 09:20:22 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT045.mail.protection.outlook.com (10.152.19.51) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 09:20:22 +0000
Received: ("Tessian outbound 826a6d8e58c3:v113");
 Fri, 11 Mar 2022 09:20:21 +0000
Received: from eb83f013d847.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 D112B6A4-E8A0-46ED-9012-0ADD2192EAC1.1; 
 Fri, 11 Mar 2022 09:20:16 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id eb83f013d847.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 11 Mar 2022 09:20:16 +0000
Received: from PA4PR08MB6253.eurprd08.prod.outlook.com (2603:10a6:102:e4::8)
 by AM4PR0802MB2178.eurprd08.prod.outlook.com (2603:10a6:200:5a::18) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar
 2022 09:20:13 +0000
Received: from PA4PR08MB6253.eurprd08.prod.outlook.com
 ([fe80::41e8:ebec:d794:38aa]) by PA4PR08MB6253.eurprd08.prod.outlook.com
 ([fe80::41e8:ebec:d794:38aa%3]) with mapi id 15.20.5061.023; Fri, 11 Mar 2022
 09:20:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 7ba7c515-a11c-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=WSdaAfTvS3Cau6k31vQz7cMYUanQWubHEURyC1QQA7c=;
 b=l3LuTdBxloa4HB90dr2x3E++75WV4w4wOXG0y121B7ht6gIcoCTiPxcLc4qi5WB7WZVfvAX2YHA0b/MitvPJA1E/VOpLqGE0yG/azjkPwkvCIQPsJQn7GVWbAVUK8+mWviz0Ozl/rqiMrqXFrHAkKciWKfKQjtEEBF6INywxuLM=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=gw/MDKH5WwQpJ0JG9isJ5C3mxDxhcjBvOaZ2DU81A/mf2lmAsKq35hOG/XBIUOS416oCGa3O0ylhhBV0OBVB4xy7MhhcoF42Kex7YbVvz+AX0o8sDcpsP8jVMqPmithcm+MzUSoAxpu9bNDnGHtgqKKd4VQxkAu4aK927QRda3EbU/Srm+pc2kgHJYWEIsLRq91G1J9EG/yWnaovckN9E3yKZ4UUCbjozNu7zFKdlWbMQSFawTz4Pn0+Jgj4gLrGj8w81sbXYuvZNE5Hj6EMom1DhJc2Psw5Um/15g+sYe7mFmg321srsVTCKM5LOBpvZC/1hmjx008BdfuszfQSCg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=WSdaAfTvS3Cau6k31vQz7cMYUanQWubHEURyC1QQA7c=;
 b=d+pO6Dgs7aMlS03ah5S2XoXHd68w74KMSTySBFNw24J+ILVcveyqQqVuYhWHjDaUHUFv+lWym8KxFycf1zoIZPp6TbPn/U3ycYSaZ//+OKtDzmZncqPV9BCmfuwjveZaGsD8iDhk2WRZ9WH8mHetTNbKedT1h5eDzhKVnx0BtjnSG8Hw2P2hMYOkXcQLLD01k+CWPnhPWNS+VslxksI0LpogzqxJ3DJZKbnIrWkeYqOP3bJsx2OER6Z4gIJlgSnmGlYfELFVeM3aRyFx78zsYtPx3M/YgHzoj2ej9lSgNj/0Q0VBjqhzo5qwUxN2Nd/khywiJCMnSaXx+0EjINfOZg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=WSdaAfTvS3Cau6k31vQz7cMYUanQWubHEURyC1QQA7c=;
 b=l3LuTdBxloa4HB90dr2x3E++75WV4w4wOXG0y121B7ht6gIcoCTiPxcLc4qi5WB7WZVfvAX2YHA0b/MitvPJA1E/VOpLqGE0yG/azjkPwkvCIQPsJQn7GVWbAVUK8+mWviz0Ozl/rqiMrqXFrHAkKciWKfKQjtEEBF6INywxuLM=
From: Henry Wang <Henry.Wang@arm.com>
To: George Dunlap <george.dunlap@citrix.com>, "xen-devel@lists.xen.org"
	<xen-devel@lists.xen.org>
CC: Wei Liu <wl@xen.org>, Andrew Cooper <andrew.cooper3@citrix.com>, Jan
 Beulich <jbeulich@suse.com>, Roger Pau Monne <roger.pau@citrix.com>, Stefano
 Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>
Subject: RE: [PATCH] MAINTAINERS: Propose Henry Wang as the new release
 manager
Thread-Topic: [PATCH] MAINTAINERS: Propose Henry Wang as the new release
 manager
Thread-Index: AQHYNMhyMcIJxhFRS0ylLPd8oqvQQay556xg
Date: Fri, 11 Mar 2022 09:20:13 +0000
Message-ID:
 <PA4PR08MB62538EAA0292E1FA430B8537920C9@PA4PR08MB6253.eurprd08.prod.outlook.com>
References: <20220310214655.14510-1-george.dunlap@citrix.com>
In-Reply-To: <20220310214655.14510-1-george.dunlap@citrix.com>
Accept-Language: zh-CN, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: E80394E2F453D148817304078FFAE0B0.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 062dcf70-f945-4814-7020-08da03405e5c
x-ms-traffictypediagnostic:
	AM4PR0802MB2178:EE_|VE1EUR03FT045:EE_|DBAPR08MB5717:EE_
X-Microsoft-Antispam-PRVS:
	<DBAPR08MB5717BB52BEC9793CC10D8714920C9@DBAPR08MB5717.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PA4PR08MB6253.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(508600001)(52536014)(38100700002)(83380400001)(186003)(33656002)(8936002)(86362001)(4326008)(122000001)(76116006)(66946007)(54906003)(110136005)(66556008)(8676002)(66446008)(26005)(66476007)(5660300002)(71200400001)(64756008)(55016003)(9686003)(38070700005)(7696005)(53546011)(2906002)(6506007)(316002);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR0802MB2178
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT045.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	a28cb313-9e3a-4234-de20-08da034058fe
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(33656002)(70206006)(86362001)(316002)(54906003)(8676002)(55016003)(4326008)(70586007)(81166007)(5660300002)(6506007)(53546011)(336012)(8936002)(52536014)(356005)(82310400004)(26005)(186003)(7696005)(9686003)(2906002)(83380400001)(40460700003)(47076005)(36860700001)(110136005)(508600001);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 09:20:22.1174
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 062dcf70-f945-4814-7020-08da03405e5c
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT045.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBAPR08MB5717

Hi George,

> -----Original Message-----
> From: George Dunlap <george.dunlap@citrix.com>
> Sent: Friday, March 11, 2022 5:47 AM
> To: xen-devel@lists.xen.org
> Cc: George Dunlap <george.dunlap@citrix.com>; Henry Wang
> <Henry.Wang@arm.com>; Wei Liu <wl@xen.org>; Andrew Cooper
> <andrew.cooper3@citrix.com>; Jan Beulich <jbeulich@suse.com>; Roger Pau
> Monne <roger.pau@citrix.com>; Stefano Stabellini <sstabellini@kernel.org>=
;
> Julien Grall <julien@xen.org>
> Subject: [PATCH] MAINTAINERS: Propose Henry Wang as the new release
> manager
>
> ARM has proposed Henry Wang as a release manager for 4.17.  Signify
> this by giving him maintainership over CHANGELOG.md.
>
> Below is an introduction given by Bertrand Marquis:
>
> Henry Wang is an open-source software engineer at Arm focusing on the
> hypervisor and virtualization technology. Before joining the
> AIS-Hypervisor team, he was one of the leading Arm contributors of the
> Rust-VMM and the Cloud Hypervisor community.  He is the Arm reviewer
> of the Cloud Hypervisor project. His work includes basic project
> enabling on Arm platform, Arm device emulation, advanced features
> support on Arm and bug fixes.
>
> After joining the AIS-Hypervisor team at Arm, he has been involved in Xen
> feature
> development on Arm in various areas, including:
>
> 1. Xen Arm MPAM extension research and PoC: Ongoing, the design will
> share in xen-devel soon.
>
> 2. Port of Xen to Arm MPU systems: Working together with Penny Zheng
> on coding and testing, will be soon sent to xen-devel.
>
> 3. Static Xen heap on Arm: Work done but depend on the direct mapping
> series from Penny Zheng, will be upstreamed in the next weeks.
>
> 4. Virtio PoC for Xen on Arm using kvmtool as the Xen virtio backend:
> Work done, including the enabling of the virtio and the virtio
> performance tuning.
>
> 5. Participated in code reviews and discussions in xen-devel,
> including the foreign memory mapping series from EPAM, etc.
>
> Signed-off-by: George Dunlap <george.dunlap@citrix.com>

Thank you very much for sending this email!

Acked-by: Henry Wang <Henry.Wang@arm.com>

Kind regards,
Henry

> ---
> CC: Henry Wang <Henry.Wang@arm.com>
>  CC: Ian Jackson <iwj@xenproject.org>
> CC: Wei Liu <wl@xen.org>
> CC: Andrew Cooper <andrew.cooper3@citrix.com>
> CC: Jan Beulich <jbeulich@suse.com>
> CC: Roger Pau Monne <roger.pau@citrix.com>
> CC: Stefano Stabellini <sstabellini@kernel.org>
> CC: Julien Grall <julien@xen.org>
> ---
>  MAINTAINERS | 1 +
>  1 file changed, 1 insertion(+)
>
> diff --git a/MAINTAINERS b/MAINTAINERS
> index d4b06f5bfb..6a097b43eb 100644
> --- a/MAINTAINERS
> +++ b/MAINTAINERS
> @@ -255,6 +255,7 @@ S:        Supported
>  F:   xen/drivers/passthrough/arm/smmu-v3.c
>
>  Change Log
> +M:   Henry Wang <Henry.Wang@arm.com>
>  R:   Community Manager <community.manager@xenproject.org>
>  S:   Maintained
>  F:   CHANGELOG.md
> --
> 2.35.1

IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose, or store or copy the information in =
any medium. Thank you.


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 09:29:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 09:29:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288876.489993 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSbaj-0002Lm-Os; Fri, 11 Mar 2022 09:29:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288876.489993; Fri, 11 Mar 2022 09:29:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSbaj-0002Lf-Lg; Fri, 11 Mar 2022 09:29:45 +0000
Received: by outflank-mailman (input) for mailman id 288876;
 Fri, 11 Mar 2022 09:29:44 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=aAGA=TW=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nSbai-0002LZ-8b
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 09:29:44 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c7fb73d9-a11d-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 10:29:42 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 0F2B71F381;
 Fri, 11 Mar 2022 09:29:42 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id A291B13A82;
 Fri, 11 Mar 2022 09:29:41 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id GO5cJoUWK2JMVwAAMHmgww
 (envelope-from <jgross@suse.com>); Fri, 11 Mar 2022 09:29:41 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c7fb73d9-a11d-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646990982; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=4+sUpoMHEwBSaBP4UTN/ojlI/oSHhzJG4xCyo+Y8m8g=;
	b=Kplt02CGrJsFl8FROQwGIGQmzYGtxrjLwB3xdNszF+RLuwGfw+kdXq9JrddMxAxdJSmalj
	RjAdxCQusxIsUvRm4QoKYRZjh5BhjQWtrOnG1HcyYRodARcg7UsbfccTUMZ+RYuES99qOG
	/uM6GAZTi5prKzMrdb1Ad3/9xX+EaZg=
Message-ID: <21783c1d-d8c7-b03b-2221-5e34b4bd0fd4@suse.com>
Date: Fri, 11 Mar 2022 10:29:41 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Content-Language: en-US
To: Luca Fancellu <Luca.Fancellu@arm.com>
Cc: Xen-devel <xen-devel@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>,
 Bertrand Marquis <Bertrand.Marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Wei Liu <wl@xen.org>, Dario Faggioli <dfaggioli@suse.com>
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-5-luca.fancellu@arm.com>
 <378565ed-80d4-e760-2e25-f5d2e4cb9ce2@suse.com>
 <0D3FFA8E-A904-4375-BDBB-2C974C224D14@arm.com>
From: Juergen Gross <jgross@suse.com>
Subject: Re: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
In-Reply-To: <0D3FFA8E-A904-4375-BDBB-2C974C224D14@arm.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------U54ePrikYPmDR0uPBvI7yoWj"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------U54ePrikYPmDR0uPBvI7yoWj
Content-Type: multipart/mixed; boundary="------------yaXboqLrdtofj5e4cAuO2QGa";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Luca Fancellu <Luca.Fancellu@arm.com>
Cc: Xen-devel <xen-devel@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>,
 Bertrand Marquis <Bertrand.Marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Wei Liu <wl@xen.org>, Dario Faggioli <dfaggioli@suse.com>
Message-ID: <21783c1d-d8c7-b03b-2221-5e34b4bd0fd4@suse.com>
Subject: Re: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-5-luca.fancellu@arm.com>
 <378565ed-80d4-e760-2e25-f5d2e4cb9ce2@suse.com>
 <0D3FFA8E-A904-4375-BDBB-2C974C224D14@arm.com>
In-Reply-To: <0D3FFA8E-A904-4375-BDBB-2C974C224D14@arm.com>

--------------yaXboqLrdtofj5e4cAuO2QGa
Content-Type: multipart/mixed; boundary="------------BgRjgRLp2Bwq0xtys0eJEnnp"

--------------BgRjgRLp2Bwq0xtys0eJEnnp
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------BgRjgRLp2Bwq0xtys0eJEnnp
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------BgRjgRLp2Bwq0xtys0eJEnnp--

--------------yaXboqLrdtofj5e4cAuO2QGa--

--------------U54ePrikYPmDR0uPBvI7yoWj
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIrFoUFAwAAAAAACgkQsN6d1ii/Ey9h
9Qf8D8Tv5gyLPeTCENtWj1ThNlE4ihHX42ve3bProImzB6VtoVf97MPSswYrZwAH5XLqdizT5oKJ
4u5OzoWly1yOf6ih8EUQoXuBEafPaKoQNjzAV9HknQbWPZjaexQPs+1m6N3o1YgtkG/4w16OeHkw
8hfBRkBBp+SnDP8q0rMZUSY96INxTUZO6AOe9qMgex1sgzm4o6y3tgW6jE3xqWh5vRqBWZpbEbqM
/rvzt1JQzTEWt9P9MwTcIb8/f3UoZpRYPLZMeG0LFPF8pdXM6XcYFTVOx6rsNFAHoMaOdvfWxixb
iGMTjy7qxY2r2lI6pXwbJqJ9cYGEsAVwbNGHyMyL8A==
=RTd3
-----END PGP SIGNATURE-----

--------------U54ePrikYPmDR0uPBvI7yoWj--


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 09:47:05 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 09:47:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288882.490004 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSbrP-0004mr-Cz; Fri, 11 Mar 2022 09:46:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288882.490004; Fri, 11 Mar 2022 09:46:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSbrP-0004mk-9V; Fri, 11 Mar 2022 09:46:59 +0000
Received: by outflank-mailman (input) for mailman id 288882;
 Fri, 11 Mar 2022 09:46:57 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=3DNt=TW=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nSbrN-0004me-H6
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 09:46:57 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 30092247-a120-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 10:46:56 +0100 (CET)
Received: from EUR03-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur03lp2055.outbound.protection.outlook.com [104.47.10.55]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-31-zs8btPepOr6MY3qK2X0wdQ-1; Fri, 11 Mar 2022 10:46:54 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR04MB6799.eurprd04.prod.outlook.com (2603:10a6:803:130::8)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar
 2022 09:46:51 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.022; Fri, 11 Mar 2022
 09:46:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 30092247-a120-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646992016;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=GC2zDr7UR7aIBiPkvxzEq6mypUYB0YYi4fynC7MtBhc=;
	b=idAgvm8e8rb7xIGcfdpnTP2tCumB2EmcaG/Zp3v8PnZ5L9R7LZWVE0XnE5QFwRMy0x3trz
	K6k3mH6LlygxzJNB6rTsdS0IsdJNRQ7BxGXZg4vqQVyOQoEnstngBY/u7/So6GmkYApFhx
	epIs99Mc43735hhVLB34QF82frnQ2nM=
X-MC-Unique: zs8btPepOr6MY3qK2X0wdQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=IZMMmcigDDsov/Wc97RRVrJ79I0Mt88pUOHw4LTvqKpozJtFBHYkhPo2T13DF+/XhoZigBNF+vbyKuNc+3tEq1ZGHtqnsR7j2njC//FqegzpXhtU1YsevP2ZShtnjJv/UAgtqN0/dAXv/DfoFL/rVOURbOvNyACvJww/naB+2ayun6biUVyeRD5MYTxw6n4c+B/WYK4y25Fzg8zdmEPdgxgSPhkTb4xomOUWq0/dKyZSwVz0hgKCG3Xq8iXF5/D27PmeP5FUo6YDPJrbH45HsfGAfDQ0r2pn31pTDvx7yeyZcxROd8S97oYqWZq3/ydgaHIxUzyMCIGQ7DWz8KIsLA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=sadzFknVB08MeOjW+HL4UeJqEuTAHjGcpcSpPOCsao8=;
 b=dEW20dGzS8hXTR4LcymUlUnEqVrsEyWcKuOBmnu5p6BHn8NasWj7CswQ+dgGCXO3R/XqxDpTpwPZQEUkjMT8FnZ4KFtGSdgvbftBnm2WQHc+hyqKegV/idiKoWWx1Eq2IZS2fLpUQimAAXjcdgjl4SpAu8zEe/jU8E8a+KS7KbFHsNFumMO6nXMC3p3Ntd4rlGJQOacaHD9PJ+jJbvQbDvEPh8APN3tt16QwYS4RJQHjujXePpV8xu8lHSU9eZ1mlvqFqnoNRQiHyQIzrmNz2H/IA1UXVcfB94L9KgKoRC+7huK1WQRr56afTm3BIbYWq7/0zVLermEeYKLpqT9D5g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <26fbe29d-b5d3-2ce5-a16b-ca05329c778a@suse.com>
Date: Fri, 11 Mar 2022 10:46:47 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
Content-Language: en-US
To: Juergen Gross <jgross@suse.com>, Luca Fancellu <Luca.Fancellu@arm.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>,
 Bertrand Marquis <Bertrand.Marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 Dario Faggioli <dfaggioli@suse.com>
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-5-luca.fancellu@arm.com>
 <378565ed-80d4-e760-2e25-f5d2e4cb9ce2@suse.com>
 <0D3FFA8E-A904-4375-BDBB-2C974C224D14@arm.com>
 <21783c1d-d8c7-b03b-2221-5e34b4bd0fd4@suse.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <21783c1d-d8c7-b03b-2221-5e34b4bd0fd4@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6P194CA0070.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:209:84::47) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: bb4b7d81-d8c9-43f1-b551-08da0344116b
X-MS-TrafficTypeDiagnostic: VI1PR04MB6799:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB67990A198E3315EEF81904BDB30C9@VI1PR04MB6799.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6666004)(54906003)(110136005)(26005)(107886003)(186003)(2616005)(508600001)(36756003)(31686004)(6486002)(31696002)(7416002)(86362001)(4326008)(66476007)(8676002)(66556008)(316002)(66946007)(6506007)(6512007)(53546011)(38100700002)(5660300002)(8936002)(2906002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?uH2xkCh+jqqcghuOjgiLR5gA72ve0JfwIIvBufahNbLaNDEBNWuLwPMjaYL+?=
 =?us-ascii?Q?Kd8DPf7d3Ne40AjCaFiSOoSIQDA1Vz0R8Jvy1SnxjrLb+kbpBQQGEbpe0nAC?=
 =?us-ascii?Q?uxHLlSr45jFbM/j7uVvROKYUkGWMKAuE7OedWCiVK0vhK0T2cXYAtI4HV6Pc?=
 =?us-ascii?Q?qqMWeZN7auJSBsFAUmM9EMCbt1PwGBm0+BhGZvsxnOwSZOU03isomXp93MfA?=
 =?us-ascii?Q?3AU5QWxhyZ02V3bn0F1GabFoeK5P/kU1XqVEV1MolYiEOeiRz9Qes/SrnDOK?=
 =?us-ascii?Q?yDumqQ13IqSPBSp1H1XxT+jY0hAqusq+uD9RR29/5ZTRV5Uyq1AgzncSnGl9?=
 =?us-ascii?Q?nK0v3GTYsh8QJqCMLoiEaBQya/ls8I5G7AB8DBDiFXS47R/k9tKRUc3KxjV2?=
 =?us-ascii?Q?/6NRXykrwB7ZQXwd/RcZBTpa2BBzWRaBgnl46DTqp7Ss3jMzFR0rjPXHrTsD?=
 =?us-ascii?Q?o/NqvzUVosxCq+yfkshhPjp3JhspxJI4QnKeMH6RUaTOpWDXE1L3GLiQ0V35?=
 =?us-ascii?Q?UjaSnGIa16U3GGfVPx72lnEN05Yaa7fRsdDAjIia+XHvCJNjDUYMTHLZ14PA?=
 =?us-ascii?Q?Bc3bja8xjJT+msRi4TKln5LFwq2RNeddp1lOKFOB5Suub5R+43WTeF/zrKKV?=
 =?us-ascii?Q?4YJCvKXcNtxj5r2/ilXvApHOkaix/O8T/Vh4B95BRv1c87EqFSe2yN5OLo4s?=
 =?us-ascii?Q?4NauOZvywYRbL+BJmsOWcDcMmqLcfMxaxdQO0nRhPsI62262sZUjFsy8vKwp?=
 =?us-ascii?Q?z+B09htn70LhrtgWx/ADYHrblCUg8S/PUtCw3bBauscUD6n8+HSIsSj0JKhR?=
 =?us-ascii?Q?WBz5CiebC8TsxPgzr5v2skjWXy6P4VXQSmA9GbNJEgLqpaJ3OUne1LVcjWtJ?=
 =?us-ascii?Q?vRi58byDNH9cAP5PGmtSZzsvbe2u+qBnN4ZXKuzn+gm5MXRfZFva0MlZPoOE?=
 =?us-ascii?Q?SSeirYHjxrEJ6H2J4cdR4SM99oIKgtx+qB6xdN/Wj2k3iAi33cX68qftVyJd?=
 =?us-ascii?Q?8lwwLX2u7kaojjjcGNz+WMIIj1FnzsLhsu4hB8iy6CrNVIdXIenT1iSPCA7Y?=
 =?us-ascii?Q?R2RAD9m5LHM+BMQ5Nj5NGp/CPQvktBNl5ZX7QBPpH3QUJroLNrWCO4eBs0yC?=
 =?us-ascii?Q?FAc2NRUVCjsRvGb6hONuzVLpH6Rswq8WpCa/Wqt50uX6oz0Ty94T6fr9f4HI?=
 =?us-ascii?Q?j4K5/AJTrgAWWjEJJVL0YeujVlIUbJC6OztIFSALtobogkwU05qFQETRafuO?=
 =?us-ascii?Q?xWWKTUYfK/D1G2ec6SFvcpyMW9lM9ryqGjhXYaayPXOlYK+jUpaeF6ofEwJ9?=
 =?us-ascii?Q?2EE6iJqNPgClR+TRt57FCuzhkn5kV/4Y5TjNJQCUoC2VOU+xwsIggkJj2xXk?=
 =?us-ascii?Q?dXd+EyGvZ7JEw9vlKPBmRS7tOcgGe8iBQi4TeyTNlf3R5XdqgDZcGFsyi0mk?=
 =?us-ascii?Q?yiii50n1XWR3drsJ7eVHdxBDpTYfhx8e?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: bb4b7d81-d8c9-43f1-b551-08da0344116b
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 09:46:51.3933
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: L8yDks3fRTkskZ7oo1x7Gw5cdgL/ncyfPTxDlTtM2ifdjh1ZHAWfbU7WtfwNKT7MaK+czYEAELDsCQgjMIywag==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB6799

On 11.03.2022 10:29, Juergen Gross wrote:
> On 11.03.22 09:56, Luca Fancellu wrote:
>>> On 11 Mar 2022, at 08:09, Juergen Gross <jgross@suse.com> wrote:
>>> On 10.03.22 18:10, Luca Fancellu wrote:
>>>> --- /dev/null
>>>> +++ b/xen/common/boot_cpupools.c
>>>> @@ -0,0 +1,212 @@
>>>> +/* SPDX-License-Identifier: GPL-2.0 */
>>>> +/*
>>>> + * xen/common/boot_cpupools.c
>>>> + *
>>>> + * Code to create cpupools at boot time for arm architecture.
>>>
>>> Please drop the arm reference here.
>>>
>>>> + *
>>>> + * Copyright (C) 2022 Arm Ltd.
>>>> + */
>>>> +
>>>> +#include <xen/sched.h>
>>>> +
>>>> +#define BTCPUPOOLS_DT_NODE_NO_REG     (-1)
>>>> +#define BTCPUPOOLS_DT_NODE_NO_LOG_CPU (-2)
>>>
>>> Move those inside the #ifdef below, please
>>>
>>>> +
>>>> +struct pool_map {
>>>> +    int pool_id;
>>>> +    int sched_id;
>>>> +    struct cpupool *pool;
>>>> +};
>>>> +
>>>> +static struct pool_map __initdata pool_cpu_map[NR_CPUS] =3D
>>>> +    { [0 ... NR_CPUS-1] =3D {.pool_id =3D -1, .sched_id =3D -1, .pool=
 =3D NULL} };
>>>> +static unsigned int __initdata next_pool_id;
>>>> +
>>>> +#ifdef CONFIG_ARM
>>>
>>> Shouldn't this be CONFIG_HAS_DEVICE_TREE?
>>
>> Yes, the only problem is that in get_logical_cpu_from_hw_id I use the ar=
m specific
>> cpu_logical_map(=E2=80=A6), so what do you think it=E2=80=99s the better=
 way here?
>> Do you think I should have everything under CONFIG_HAS_DEVICE_TREE
>> and get_logical_cpu_from_hw_id under CONFIG_ARM like in this way below?
>=20
> Hmm, what is the hwid used for on Arm? I guess this could be similar
> to the x86 acpi-id?

Since there's going to be only one of DT or ACPI, if anything this could
be the APIC ID and then ...

> So I'd rather put get_logical_cpu_from_hw_id() into Arm specific code
> and add a related x86 function to x86 code. Depending on the answer to
> above question this could either be get_cpu_id(), or maybe an identity
> function.

... a lookup loop over x86_cpu_to_apicid[] (I thought we had a function
doing so, but right now I can't find one).

Jan



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 10:07:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 10:07:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288888.490015 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScAv-0007FL-43; Fri, 11 Mar 2022 10:07:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288888.490015; Fri, 11 Mar 2022 10:07:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScAv-0007FE-0v; Fri, 11 Mar 2022 10:07:09 +0000
Received: by outflank-mailman (input) for mailman id 288888;
 Fri, 11 Mar 2022 10:07:08 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=RXIo=TW=citrix.com=prvs=0626a3ed1=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nScAt-0007F8-SI
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 10:07:08 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ff65e316-a122-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 11:07:05 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ff65e316-a122-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646993224;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=C85UofXtcVTHDWQKUx88Sumon96vfBF6RpczIPlvto0=;
  b=bjaxFXQWwmJNPiAEj0BH80mJB/DRO2XgqZogMxZ0TJpUvT2WEyTMKOFk
   w9tPgI/n3S4rIdWK7ZrA9I/EDtCkLKJ34mHRYqE35QP2pEImo+kU/AyoZ
   Azo5M6/EwJmCcLGvUgTPPuNGlTc7tnLHnO01Fx24/S0dutmKPd9xJqyDA
   8=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65927382
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:upOi/KxuQY71E4QPtzV6t+dwwSrEfRIJ4+MujC+fZmUNrF6WrkUEm
 DEfCj3QOamOYjTyfN5wYNjn/UgGv8XQzIBiHAdt+yAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2IHhWmthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 Npl6cG9EVd4BZD2wroRfhpxGSpBYfdm5+qSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DJoQQt2sm1TjEJf0nXYrCU+PB4towMDIY2J0fR6mFN
 5BxhTxHbB6aSEMfKgwuFrU5uPyh3UDYWgcFpwfAzUYwyzeKl1EguFT3C/LWfdqQTMkTgUecp
 UrB5W3yBhxcP9uaoRKC9n+vnebJkTnMRJMJFLa4+/hph3We3mUWThYRUDOTrf60gEO6c9taI
 l4T/GwioMAa8VSsTt30VB6QqXuNrBkaHdZde8U/6xylw6/d8QGfQGQJJhZrZcY6rsYwSXoP3
 0WQgtLyLTV1tfueTnf13rWeoC62OCMVBXQffiJCRgwAi/HzrYd2gh/RQ9JLFK+uksazCTz22
 yqNriU1m/MUl8Fj/7q/1UDKhXSrvJehZhUu+gzdU2ah7wV4TI2ofYql7R7c9/koBISESliMu
 lAUls7Y6/oBZaxhjwTUHr9LRuvwoa/YbnuM2jaDAqXN6RzxpnP7LdFr3QskektEMe8OcgC1O
 m/M7FY5CIBoAFOmaqp+YoSUAssszLT9GdmNas04fuaicbAqKlbZoXgGiVq4mjm0zRNyyf1X1
 YKzLJ70ZUv2H5iL29Zfqw019bYwjh4zymrILXwQ50T2iOHODJJ5pFpsDbdvUgzbxP/VyOk22
 4wGXydv9/m5eLSvCsUw2dRPRW3m1VBhWfjLRzV/L4Zv2DZOFmA7EOP2yrg8YYFjlKk9vr6Wo
 i/sARAHmAKn3COvxeC2hpZLMeKHsXFX9y9TAMDRFQzwhyhLjXiHsM/ziKfbjZF4rbc+nJaYv
 tEOetmaA+Qnd9g00291UHUJl6Q7LE7DrVvXZ0KNOWFjF7Y9F12h0oK1JWPHqXhRZhdbQONj+
 tVMICuAGsFdL+mjZe6LAM+SI6SZ5iFMxrgtAxOWfrG+uizEqeBXFsA4tdduS+kkIhTf3DqKk
 QGQBBYTv+7WpIEpttLOgMi5Q02BT7cW8pZyd4UD0YuLCA==
IronPort-HdrOrdr: A9a23:0iqFBKit/JpZPQ9rWAauiEayZHBQXz513DAbv31ZSRFFG/FwyP
 rBoB1L73DJYWgqNE3I+erhBEGBKUmsk6KdxbNhQItKOzOWxFdATbsSl7cKpgeAJ8SQzJ856U
 4NSdkbNDS0NykEsS+Y2njJLz9D+qj+zEnAv463pB0BPGIaCZ2IrT0JcTpzencGNTWubqBJba
 Z0iPA3wAZJLh8sH7qG7zQ+LqP+juyOsKijTQ8NBhYh5gXLpTS06ITiGxzd+hsFSTtAzZor7G
 CAymXCl+iemsD+7iWZ+37Y7pxQltek4txfBPaUgsxQDjn3kA6naKloRrXHljEop+OE7kosjb
 D30l0dFvU2z0mUUnC+oBPr1QWl+DEy60X6wVvdunfnqdyRfkNNN+NxwaZiNjfJ4Uspu99xlI
 hR2XiCipZRBRTc2Azg+tnhTXhR5wSJiEtntdRWo21UUIMYZrMUh5cY5llpHJAJGz+/wJw7Ed
 NpENrX6J9tABynhkjizylSKeGXLzcO9k/seDlBhiXV6UkboJlB9TpY+CRF9U1wsa7USPF/lp
 P52+pT5fVzp/QtHNBA7dc6MLiK41P2MGfx2UKpUB3a/fI8SjrwQ6Ce2sRA2AjtQu1O8KcP
X-IronPort-AV: E=Sophos;i="5.90,173,1643691600"; 
   d="scan'208";a="65927382"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=mraqsD1Vh0NyYtPFAXHMg6VR2j2lhNUSDjxuizOSoUs60+kC+GHUmKDq2EIctz0nFgMrxXuE5f7g6Oibac3XYf1MrUw4rG1N9Qt/Fhk2m9hxKDN/UBZsGXOdWhF5jDOURRYut5ph+/7fRrTj5QqW1Pjq+s9CwFcEqkTpy2Advst90wweL1yfjeEXF2mI29LZwX9OnUISjMFHkA8vNrTLiREem54NQ32SDP/w6sgvMTL8TD4qV3ie9hZPGHnXqOW5jKPNK5Yjer//04aRvyEb8b4HG+FJp8fLfAFyqN4NqQHZJ3PljLQZTI2F/ZKAgVupKtDy7fWe1veT8hdrQm1lqw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=bcs3QXxJEyoE62nLZdflDbySx1KIU6vlO7YUiYFr4uo=;
 b=LC7Zsqz866IQNSWJD7AGkj0HullPH//aXW9KTJO+6uXIpY4ubQ2X3BK6zW0ymNVdubRWatnnONJBSMcCzYYFP3Bz9wHEDQcQJ36AUE8tJbNFHq2Jje0pliyUxkNLKmsbFYY52MXsNoBcyG09RyYql4WaX3lS0MHuT7VulzTmOtiBHrzu88PpXUr0eJv2ic8LJmxIauoG+zzR2f1vduUJzAfV7HXSEJyxwE+T0S8QQnjWjoz4ZzyCSsBfhoOCQX4h/WJRWAewJVLmDDrC6teWaf3Skm48d0QFNr3EsFdwN4RJSgQLubQjQ+w0nvtIdNBtDVj3OLKY7pTlN7KUcUnxTQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=bcs3QXxJEyoE62nLZdflDbySx1KIU6vlO7YUiYFr4uo=;
 b=Eq4St5vIyPpCMnxXrJozyNpn4VtD3bOHHNeUegVQP81ftkq0fy6XrhTcs7BvxL59irNbLmiMWazfoxFPjtE/q3BhAXWo9TCJt5HA0xjCUUUrRK+RYtef5sBBZnMMPDktExIt6ms3NIBJJg9Io9r4uSP67TdNCuy5VFqHzuE2gX4=
Date: Fri, 11 Mar 2022 11:05:49 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: xen-devel <xen-devel@lists.xenproject.org>, Jan Beulich
	<jbeulich@suse.com>, Wei Liu <wl@xen.org>, Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, Oleksandr Tyshchenko
	<oleksandr_tyshchenko@epam.com>, Konrad Rzeszutek Wilk
	<konrad.wilk@oracle.com>, Ross Lagerwall <ross.lagerwall@citrix.com>, "Bjoern
 Doebel" <doebel@amazon.de>, Michael Kurth <mku@amazon.de>, "Pohlack, Martin"
	<mpohlack@amazon.de>
Subject: Re: alternatives+livepatch testing
Message-ID: <Yise/YYT/Q8l9Yx3@Air-de-Roger>
References: <09e936c8-1110-a67b-cc67-9cf5ed5a3615@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <09e936c8-1110-a67b-cc67-9cf5ed5a3615@citrix.com>
X-ClientProxiedBy: FR0P281CA0041.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:48::6) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 3948bc77-4988-438d-6d37-08da0346ba33
X-MS-TrafficTypeDiagnostic: BN6PR03MB2930:EE_
X-Microsoft-Antispam-PRVS: <BN6PR03MB2930113DAF1FCA579D745D978F0C9@BN6PR03MB2930.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: GigA/d6PLreWe8CC9atBLvgbRTTucOjxO9LqkzaOKfp3bKvkst64AntMeuMnpaH8yWMyFedNMUa8LK6XrZkJR9wieUKBgT+X9ck31B/g/RVaRjktCUfl0EZbDisi0sUzcF2sHe3qO+OV3XJmfEnLzLTyvrwhFQ6HHVvZcpGTlmCWLobXqmV4g12xnnKuP3nL5xH5VByifoUmctvhaDmMJYRPheihdexvGG2TCm+7JUBvM/KURZI6irdHlUfcNs07eowx8e5VkmMICAmKjZ84cZ7h0AtQA4qFm6ueItPP5WonO0x0RuiT5hM6d5kMvumVAMT2M6lMZXIGMUj9ZqGqjrthsv9ha6FIVXMz29fKQdo8E/TIWTgif/ISlxIIRei2o9vASJ2XqLAZ9VkGZCWVVA6iC7+CQTTEQrbo+QknMpVRJQsMZFOwjx1SI1uBHX0TMEtNQNACt33F09cl+QMxCRt5CcRQtV87rxvh3mZlVaMvo51tmez8bIE8HsVMlCu+6QiT2lKpi3S5cNZRgRN3frPAy4yg3Mw/5b5QbcYN2dLwlmxQ6J9t+fp8rrdeCSx2azphxt1k0SRWO2xGg9SFOU6nMTdajraAAuVU6yZKIi24TWKvvRQlMFzcwjyN9oxmKsZ6AmtInbr3a5Lchhf9Pw==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(82960400001)(38100700002)(2906002)(4326008)(508600001)(8676002)(9686003)(6512007)(6506007)(6486002)(316002)(6862004)(33716001)(186003)(8936002)(66556008)(66946007)(66476007)(5660300002)(86362001)(7416002)(54906003)(6666004)(85182001)(83380400001)(3480700007)(26005)(6636002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?U3QrQXpvWmJWeks4cXNjVHJ0OXladWQ5U3lQV28wYVhmcWFnbmwrUDVPeXZ1?=
 =?utf-8?B?NTk3NmNUWUJxWUpmWUZWN2dGTk1HZ1c3Y3cvSkZsVGFKMFBsRUl2NlYzcklM?=
 =?utf-8?B?SGVoK1dkbDNYWkkrZXhGakM2cVNoTGxmNUdUZlUvNHd0UkVwNGpCell1NVJ0?=
 =?utf-8?B?bVhKMVc2Z2JBd3ZPK1dKZjIvY0V5bVU2K2JReUp2UjlnaEVnWUhINW44eGRG?=
 =?utf-8?B?Wk1ycFpiTXlMcnV6eUdjU3R2VUZlbjE2SGJ0akxpRVhveGhzZ1NzUTlHOHpW?=
 =?utf-8?B?WDIzSiswRkdUejNKWUZsVDkzRXljeCt2U0FCMHF5QitwWWxBaWMvL2xNWkFS?=
 =?utf-8?B?aTVweElTU3puWktUU3g2VjBkTkxNa0YrVHVLM1RUalp2eHhkR1RwR3daRXVF?=
 =?utf-8?B?NVhwMy9UaUNXenV4T0ZVR3JvaUcrWmxzbHFQV0RYaERvZElLT1Q0RDNtKzRu?=
 =?utf-8?B?N1hWbnNUbGszTERXdVp0UTBCZ2VQS1BKNnR6enl3Vy9TL0d4ck41REZ5WDFs?=
 =?utf-8?B?Vkx5bEdrNCtOTWgwZ2JoaDUzV3NJemQxSHYrR0hyS2wvbCtjNjFuV2JjV3hS?=
 =?utf-8?B?ZFZ2UFJ4K0tqY0wzSVNYc1FWbWtzSEEvOGYzenZrc0pNT2h0QUdzUDl6RUl6?=
 =?utf-8?B?NE50M2VkZXk2Uk9XMis5aEl1SXZUenBWK29jNXRrNy9mdFgwQ3dpVWl6dnRa?=
 =?utf-8?B?ZkpZVGE0NWJuUHFZRUh5YUtwZG4ybEx2SjVPWk5PdWk0dk5XWlhtNTNNQW5h?=
 =?utf-8?B?a1RGTi9hZjk3MDNMK2E2Zi9ScjZrVDQweFUzbHJIQmZVY3JlSjlBSUZpZTh1?=
 =?utf-8?B?NzNUYjEwSFF1dEtqSVA3RmlKcWhNR3RJUjRpY1hYTlFmeVVkWDU3UTN3Kzh3?=
 =?utf-8?B?akJscmk3Y1Z4U3I0TTRnbVVJeTlFQlYvS1cyK0xrd3F2VFNlMzdPTXRqMWNG?=
 =?utf-8?B?ZHJXaHkyNnlWem1DQ0VLdkQ2VDJpbk10eHh1VnVZMGF4eVB6QTBFUTJQeGtF?=
 =?utf-8?B?NE9RcnE3dzJRMTdibmVmOWsxcncyWE1jWHJ5RXlXQzVyelhkdUFsaUJ3NXRj?=
 =?utf-8?B?WVFSc2V6NnV3VmVxMTBRMFFGMmN1UWZkRWVHQk5jS0M5TjJ2NkZrL0Jmanl4?=
 =?utf-8?B?amlKNXpFRUhnL1p2RG1FRlBWZFAxTGlmck5kQzY4SmxHSEFnRDR1REVVRS9p?=
 =?utf-8?B?SXFZejZrRStaeTRPaTlYVHRMeExydUNJYzJGNFVnb2VBRXdoSkVLTy9CVkdx?=
 =?utf-8?B?cXFZUUx4T3d2ZlpKQUdYVkNjMnl0NVE1RnlNUnRyN3RaOWNnSDJOWkhqcUhh?=
 =?utf-8?B?UXBGcHBxSHBwTUdFcFpCWVRTOHhBQytVZXpmR2wxYUFTc0dmcWZySzR5b1JD?=
 =?utf-8?B?WTRpOHM5MlNZSFQxV241Rjc5aVR1WDBqcnJWRVlFcTljRCttVEFITzZWc3Rv?=
 =?utf-8?B?bE9RV3Z0VGdUVTMxMTAyRmc5TTJBM2t6WGJpTDU1amxXbVQrQlpxWUJKcU5l?=
 =?utf-8?B?WExub21pMzZoRkR1MHpEZVJYOHZ6SVBaeGlVNFU4NVorQnR3clpicWJEOE45?=
 =?utf-8?B?aXd6L0NtRTBTUlBCclJIMkUrbFRZT3ZCRmRXYThOMkFsMTJycEdIQmVHODla?=
 =?utf-8?B?ZEY3ZVVsY0s2T1pqbjZ1ek12eVNtSFlWUG1nTVRXNDVNb1g2VDJZVU10MnJp?=
 =?utf-8?B?ZlgzeEp4dGZTU0lyTGxuRVlpR1A4aFllZEwwaEZMK1B4NVJEQnZMRGJDRm9o?=
 =?utf-8?B?UzFMSUNQQmNoZ2RNSmRIVTc2RHMzVTBEVTJIM1Zyc1k3cGFPMVZDTkdPQmh3?=
 =?utf-8?B?cSt1c2ROR2xKVHBqUFYrOU1CWXlCdUJ4RGt1TDlVTnQ1ZENRc3d3aUp6V2Zr?=
 =?utf-8?B?UjJrcWMzajNrQzcrYWxCSWl1d0I5TmhLYUpLSFRjSkdhRDUvVUJ2ZzE1Z1Bl?=
 =?utf-8?B?Vnc1NWMyR20rTVNxNktBUXh3TVpDd0FNSXc4WUI1b2U0bExBZXB6aHUzWjlL?=
 =?utf-8?B?SmlHRW1hVEhJZFRXdnRpSDViZzI2enBTM3RnSmhuY2VhZEtvRFRaeVhHa0s5?=
 =?utf-8?B?RGUvdDlNS25abzRWYVdMZnVXcGNjdHpHMjdvdHh3UmNUZkRWakVUKzhlYXZ4?=
 =?utf-8?B?WmxZSXBWL2x4emEvK1paNVNYQTg3aEwvK3FQdWZmNHBxcmtKUFpkVk1JazJ2?=
 =?utf-8?Q?m5xsygF24AajjG1bn56MnkY=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 3948bc77-4988-438d-6d37-08da0346ba33
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 10:05:53.5215
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: ojAUikyWmvg8F0+JACuGtphQT9dXR/KP7ielfkW16FM7rbLA6Ki7Zudkab9atgAqBvkWX+auqrdx95hm6KYMdg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR03MB2930
X-OriginatorOrg: citrix.com

On Thu, Mar 10, 2022 at 12:27:34PM +0000, Andrew Cooper wrote:
> Hello,
> 
> The recent hiccup with CET-IBT, and discovery that livepatch-build-tools
> have been broken for several releases, demonstrates that we do not have
> remotely adequate testing in place.  We need to address, and ensure we
> don't end up in the same position again.
> 
> Alternatives and Livepatching have a number of overlapping test
> requirements, so how about the following plan:
> 
> 1) Introduce a new $arch/scm-tests.c, with something akin to the
> existing stub_selftest().  I'm tempted to move stub_selftest() out of
> initcall and call it from init_done() (before we clobber .init.text)
> because that gets shstk testing included.

Having a specific file we can patch would be good. We could even try
to apply/revert the patch as part of normal build processes, but that
might be too much.

> Even without livepatching, we've got various requirements such as
> endbr's only existing where expected, and getting clobbered when
> suitably annotated, and altcalls turning into UD for a still-NULL pointer.
> 
> Items not yet upstream but on the radar include inlining of retpoline
> thunks and SLS workarounds, which would also fit into this.
> 
> 2) Provide (in xen.git) a patch to scm-tests.c which OSSTest/other can
> use livepatch-build-tools on to generate a real livepatch, and a new
> livepatching subop which can be invoked from xen-livepatch in userspace
> that will run the same kind of consistency checks as 1) on the patched
> content.
> 
> This lets us create specific constructs and confirm that they get
> patched correctly, without having to specifically execute the result.  I
> (think) we can do everything needed without reference to the livepatch
> metadata, which simplifies things.

We could start with just patching the livepatch subop hypercall to
return a specific value and expand from there. We need something
simple in Xen so that we can start and integrate into osstest. We can
then build extra coverage easily from there.

> Providing a patch isn't totally ideal from a "maintaining xen" point of
> view, but I think we can have a build-time test which confirms the patch
> is still good, and it is definitely the right primitive to use for the
> end-to-end testing.

Oh, right, so you would be fine with applying/revertign the patch
during a normal build process.

Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 10:18:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 10:18:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288892.490026 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScLV-0000Hi-4r; Fri, 11 Mar 2022 10:18:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288892.490026; Fri, 11 Mar 2022 10:18:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScLV-0000HT-1T; Fri, 11 Mar 2022 10:18:05 +0000
Received: by outflank-mailman (input) for mailman id 288892;
 Fri, 11 Mar 2022 10:18:03 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=aAGA=TW=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nScLT-0000HM-D2
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 10:18:03 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 887a2049-a124-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 11:18:02 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id EC9851F381;
 Fri, 11 Mar 2022 10:18:01 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 9641113A85;
 Fri, 11 Mar 2022 10:18:01 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id 1u83I9khK2J2bgAAMHmgww
 (envelope-from <jgross@suse.com>); Fri, 11 Mar 2022 10:18:01 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 887a2049-a124-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646993881; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=7u/Is2UVOTX2rGvOKQ7rmncsGAw6e42zAkYb7StfEtc=;
	b=uFq27mJhT5U5ggt7EJDgioAucBJqDZ4A4R+ZxquTJCKRLrMmLgNkc6h4ivqzQW+GlHiExG
	kLCH5IW+Ly0HKmL6DmeQpvhEwFyktGGlOoP4H7sPTMNhvTA3IaS4JYVbhR/5fNnsKIIOTT
	IIy4aH5N+fLuTVCqz14jGgIuwsnSpUQ=
Message-ID: <918fd4d8-99d6-3acf-0637-7feda1e08f71@suse.com>
Date: Fri, 11 Mar 2022 11:18:00 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>, Luca Fancellu <Luca.Fancellu@arm.com>
Cc: Xen-devel <xen-devel@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>,
 Bertrand Marquis <Bertrand.Marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 Dario Faggioli <dfaggioli@suse.com>
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-5-luca.fancellu@arm.com>
 <378565ed-80d4-e760-2e25-f5d2e4cb9ce2@suse.com>
 <0D3FFA8E-A904-4375-BDBB-2C974C224D14@arm.com>
 <21783c1d-d8c7-b03b-2221-5e34b4bd0fd4@suse.com>
 <26fbe29d-b5d3-2ce5-a16b-ca05329c778a@suse.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <26fbe29d-b5d3-2ce5-a16b-ca05329c778a@suse.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------0pqQkUBWGNXKVW8srhnUDx1e"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------0pqQkUBWGNXKVW8srhnUDx1e
Content-Type: multipart/mixed; boundary="------------Zq025EPAKVJYfvpf0uuZQBG5";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Jan Beulich <jbeulich@suse.com>, Luca Fancellu <Luca.Fancellu@arm.com>
Cc: Xen-devel <xen-devel@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>,
 Bertrand Marquis <Bertrand.Marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 Dario Faggioli <dfaggioli@suse.com>
Message-ID: <918fd4d8-99d6-3acf-0637-7feda1e08f71@suse.com>
Subject: Re: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-5-luca.fancellu@arm.com>
 <378565ed-80d4-e760-2e25-f5d2e4cb9ce2@suse.com>
 <0D3FFA8E-A904-4375-BDBB-2C974C224D14@arm.com>
 <21783c1d-d8c7-b03b-2221-5e34b4bd0fd4@suse.com>
 <26fbe29d-b5d3-2ce5-a16b-ca05329c778a@suse.com>
In-Reply-To: <26fbe29d-b5d3-2ce5-a16b-ca05329c778a@suse.com>

--------------Zq025EPAKVJYfvpf0uuZQBG5
Content-Type: multipart/mixed; boundary="------------TrY2l8hce2QOx8n0b0EoY7zm"

--------------TrY2l8hce2QOx8n0b0EoY7zm
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------TrY2l8hce2QOx8n0b0EoY7zm
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------TrY2l8hce2QOx8n0b0EoY7zm--

--------------Zq025EPAKVJYfvpf0uuZQBG5--

--------------0pqQkUBWGNXKVW8srhnUDx1e
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIrIdgFAwAAAAAACgkQsN6d1ii/Ey9/
IQf/SdTB6IT1Nk6gQzQVGwn99abXvbaBRn9lVE2Lvb5bL/hzrPl0RhkaA3NzkaSIpKvOR7rSRPzi
HLx35JcHH1M8q8zdvhfT/fqK3uEvKHbkPZfn4kOUOG9Ma3bTnU22lg8GueRH2L6usg4AgHweneo2
N+AGPM8sw+nV7YZ4QwHKPTKeBRUJZBxS5k+jf8bXHP7l8eJ1dkwU/QtoKDwq/Ky8ZEcNDOuwAN1U
WPCdwbE7S2HNUvEnOccD0hMPTR/3Wkp5X2808QVu6IqOm/GJf/hXoJWrsnosn0H0keFDX/IdZMUh
8sDc8bKyNWx33GevvOX/NEpkTPv1y53tFTuWSIn4+Q==
=+2HM
-----END PGP SIGNATURE-----

--------------0pqQkUBWGNXKVW8srhnUDx1e--


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 10:18:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 10:18:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288893.490037 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScLa-0000Zd-G2; Fri, 11 Mar 2022 10:18:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288893.490037; Fri, 11 Mar 2022 10:18:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScLa-0000ZW-Cv; Fri, 11 Mar 2022 10:18:10 +0000
Received: by outflank-mailman (input) for mailman id 288893;
 Fri, 11 Mar 2022 10:18:09 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nScLZ-0000YY-2Y; Fri, 11 Mar 2022 10:18:09 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nScLY-00066d-WD; Fri, 11 Mar 2022 10:18:09 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nScLY-00012N-IS; Fri, 11 Mar 2022 10:18:08 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nScLY-0001wi-I5; Fri, 11 Mar 2022 10:18:08 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=hAKtw8uibJTWl20+W0vfqWP24UKd/2pDxVsWqb2zfrk=; b=JjxIeWTKjwDI07Qqrko9LExarn
	S0JH7dTsAc2TKruZbO1ealuyEljhYtjrv8TatBhVFiEiWSixNC1UdbLoHQiWP4bLKiROvZ3ZhxWoL
	UONCkiKIXzHiujlp7uKERmfj5TTfwekoNJiPm1nJex4O/VU1XNqVj3D67pl6Z9zHKico=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168506-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.14-testing test] 168506: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-4.14-testing:test-arm64-arm64-xl:xen-boot:fail:heisenbug
    xen-4.14-testing:test-armhf-armhf-xl-arndale:xen-boot:fail:heisenbug
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64:guest-localmigrate/x10:fail:heisenbug
    xen-4.14-testing:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=ca304edd3ba8c19211107fd2e898249987557ce5
X-Osstest-Versions-That:
    xen=496fb0be938a30971af05ffe0e58bb65643a0971
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 11 Mar 2022 10:18:08 +0000

flight 168506 xen-4.14-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168506/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-arm64-arm64-xl           8 xen-boot         fail in 168493 pass in 168506
 test-armhf-armhf-xl-arndale   8 xen-boot                   fail pass in 168493
 test-amd64-amd64-xl-qemuu-debianhvm-amd64 18 guest-localmigrate/x10 fail pass in 168493

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-xl-arndale 15 migrate-support-check fail in 168493 never pass
 test-armhf-armhf-xl-arndale 16 saverestore-support-check fail in 168493 never pass
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168061
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168061
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168061
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168061
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168061
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168061
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168061
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168061
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168061
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168061
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168061
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168061
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  ca304edd3ba8c19211107fd2e898249987557ce5
baseline version:
 xen                  496fb0be938a30971af05ffe0e58bb65643a0971

Last test of basis   168061  2022-02-08 18:37:46 Z   30 days
Testing same since   168482  2022-03-08 18:07:22 Z    2 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bertrand Marquis <bertrand.marquis@arm.com>
  Julien Grall <julien@xen.org>
  Rahul Singh <rahul.singh@arm.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    fail    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  fail    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   496fb0be93..ca304edd3b  ca304edd3ba8c19211107fd2e898249987557ce5 -> stable-4.14


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 10:23:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 10:23:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288912.490071 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScQQ-0002cf-E7; Fri, 11 Mar 2022 10:23:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288912.490071; Fri, 11 Mar 2022 10:23:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScQQ-0002cY-Ap; Fri, 11 Mar 2022 10:23:10 +0000
Received: by outflank-mailman (input) for mailman id 288912;
 Fri, 11 Mar 2022 10:23:09 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nScQP-0002cQ-AU
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 10:23:09 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nScQL-0006DS-G6; Fri, 11 Mar 2022 10:23:05 +0000
Received: from 54-240-197-233.amazon.com ([54.240.197.233] helo=[10.95.172.72])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nScQL-0006wc-AK; Fri, 11 Mar 2022 10:23:05 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=ugFcATDfwLUcJxWd59sXJ8fRfbNaVCaXWg6vatzSz78=; b=JA1jrWLuP1z52DBpjTyI2TAYc/
	DPn+DakMImF+Pf80MGD48DqtqwVOmVhx4GkE/rAGBbegRVXYUgP3Au/wHkrVJc7zVRAsvWk980lgn
	h0dydeqOj6oAXkdi0rNv5nhH1nbKU5AHXoGlNofwEUOXQ1yeVgrtu/JjX8FBmH7l9yz4=;
Message-ID: <d2c63630-6ab3-b4dd-128e-72f871fb9e08@xen.org>
Date: Fri, 11 Mar 2022 10:23:03 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Subject: Re: [PATCH 1/2] ns16550: reject IRQ above nr_irqs
To: =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?=
 <marmarek@invisiblethingslab.com>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Jan Beulich <jbeulich@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220310143403.50944-1-marmarek@invisiblethingslab.com>
 <7acb2915-5a9d-c1f1-4b7b-2bc6c2055ea3@suse.com>
 <YioddbNor6w/U9ed@Air-de-Roger>
 <53361d65-2bd8-c07b-938c-91b95f2d68ad@suse.com>
 <Yiojgxgd4amSjHog@Air-de-Roger>
 <3055b4a5-2d55-9cf1-1069-8c57208bf0af@xen.org> <YiopXU65pAlnNVNI@mail-itl>
From: Julien Grall <julien@xen.org>
In-Reply-To: <YiopXU65pAlnNVNI@mail-itl>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi Marek,

On 10/03/2022 16:37, Marek Marczykowski-Górecki wrote:
> On Thu, Mar 10, 2022 at 04:21:50PM +0000, Julien Grall wrote:
>> Hi,
>>
>> On 10/03/2022 16:12, Roger Pau Monné wrote:
>>> On Thu, Mar 10, 2022 at 05:08:07PM +0100, Jan Beulich wrote:
>>>> On 10.03.2022 16:47, Roger Pau Monné wrote:
>>>>> On Thu, Mar 10, 2022 at 04:23:00PM +0100, Jan Beulich wrote:
>>>>>> On 10.03.2022 15:34, Marek Marczykowski-Górecki wrote:
>>>>>>> --- a/xen/drivers/char/ns16550.c
>>>>>>> +++ b/xen/drivers/char/ns16550.c
>>>>>>> @@ -1221,6 +1221,9 @@ pci_uart_config(struct ns16550 *uart, bool_t skip_amt, unsigned int idx)
>>>>>>>                                pci_conf_read8(PCI_SBDF(0, b, d, f),
>>>>>>>                                               PCI_INTERRUPT_LINE) : 0;
>>>>>>> +                if (uart->irq >= nr_irqs)
>>>>>>> +                    uart->irq = 0;
>>>>>>
>>>>>> Don't you mean nr_irqs_gsi here? Also (nit) please add the missing blanks
>>>>>> immediately inside the parentheses.
>>>>>
>>>>> If we use nr_irqs_gsi we will need to make the check x86 only AFAICT.
>>>>
>>>> Down the road (when Arm wants to select HAS_PCI) - yes. Not necessarily
>>>> right away. After all Arm wants to have an equivalent check here then,
>>>> not merely checking against nr_irqs instead. So putting a conditional
>>>> here right away would hide the need for putting in place an Arm-specific
>>>> alternative.
>>>
>>> Oh, I always forget Arm doesn't have CONFIG_HAS_PCI enabled just yet.
>> The PCI code in ns16550.c is gated by CONFIG_HAS_PCI and CONFIG_X86. I am
>> not sure we will ever see a support for PCI UART card in Xen on Arm.
>>
>> However, if it evers happens then neither nr_irqs or nr_irqs_gsi would help
>> here because from the interrupt controller PoV 0xff may be a valid (GICv2
>> supports up to 1024 interrupts).
>>
>> Is there any reason we can't explicitely check 0xff?
> 
> That's what my v0.1 did, but Roger suggested nr_irqs. And I agree,
> because the value is later used (on x86) to access irq_desc array (via
> irq_to_desc), which has nr_irqs size.

I think it would be better if that check is closer to who access the 
irq_desc. This would be helpful for other users (I am sure this is not 
the only potential place where the IRQ may be wrong). So how about 
moving it in setup_irq()?

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 10:34:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 10:34:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288916.490083 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScbU-00047n-Fq; Fri, 11 Mar 2022 10:34:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288916.490083; Fri, 11 Mar 2022 10:34:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScbU-00047g-Ce; Fri, 11 Mar 2022 10:34:36 +0000
Received: by outflank-mailman (input) for mailman id 288916;
 Fri, 11 Mar 2022 10:34:35 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=aAGA=TW=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nScbT-00047V-92
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 10:34:35 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d6746525-a126-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 11:34:32 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 79D72210FB;
 Fri, 11 Mar 2022 10:34:33 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id A827013A85;
 Fri, 11 Mar 2022 10:34:32 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id Kh3tJ7glK2LxdQAAMHmgww
 (envelope-from <jgross@suse.com>); Fri, 11 Mar 2022 10:34:32 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d6746525-a126-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646994873; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:  content-transfer-encoding:content-transfer-encoding;
	bh=wxQGvXlNGe5HCBbR63oBE/kK35uYM5cAEXtsbUcwkZQ=;
	b=iNIvX7qiHCHs8as2v0+a/C6Wf9AM41VW8O+o2xwFxi1cw2QRDGGMgZ/U+wVya50NqXLinC
	i0LxZhXeNa6Kvoq6FYdE1Rn7t/eAOn4geBVM9tpVaCf3Bq2EMzIQrENQGGyoxOfZbZapRr
	hZujw3UMlrZhO11g0/T3KzHa4Umc+Jk=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org,
	linux-kernel@vger.kernel.org,
	linux-block@vger.kernel.org,
	linux-integrity@vger.kernel.org,
	dri-devel@lists.freedesktop.org,
	linux-input@vger.kernel.org,
	netdev@vger.kernel.org,
	linux-pci@vger.kernel.org,
	linux-scsi@vger.kernel.org,
	linux-usb@vger.kernel.org,
	v9fs-developer@lists.sourceforge.net
Cc: Juergen Gross <jgross@suse.com>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Jens Axboe <axboe@kernel.dk>,
	Peter Huewe <peterhuewe@gmx.de>,
	Jarkko Sakkinen <jarkko@kernel.org>,
	Jason Gunthorpe <jgg@ziepe.ca>,
	Oleksandr Andrushchenko <oleksandr_andrushchenko@epam.com>,
	David Airlie <airlied@linux.ie>,
	Daniel Vetter <daniel@ffwll.ch>,
	Dmitry Torokhov <dmitry.torokhov@gmail.com>,
	"David S. Miller" <davem@davemloft.net>,
	Jakub Kicinski <kuba@kernel.org>,
	Bjorn Helgaas <bhelgaas@google.com>,
	"James E.J. Bottomley" <jejb@linux.ibm.com>,
	"Martin K. Petersen" <martin.petersen@oracle.com>,
	Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
	Eric Van Hensbergen <ericvh@gmail.com>,
	Latchesar Ionkov <lucho@ionkov.net>,
	Dominique Martinet <asmadeus@codewreck.org>,
	Christian Schoenebeck <linux_oss@crudebyte.com>,
	Jaroslav Kysela <perex@perex.cz>,
	Takashi Iwai <tiwai@suse.com>,
	alsa-devel@alsa-project.org
Subject: [PATCH 0/2] xen/grant-table: do some cleanup
Date: Fri, 11 Mar 2022 11:34:27 +0100
Message-Id: <20220311103429.12845-1-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Cleanup grant table code by removing unused functionality.

Juergen Gross (2):
  xen/grant-table: remove gnttab_*transfer*() functions
  xen/grant-table: remove readonly parameter from functions

 drivers/block/xen-blkfront.c                |   8 +-
 drivers/char/tpm/xen-tpmfront.c             |   2 +-
 drivers/gpu/drm/xen/xen_drm_front_evtchnl.c |   2 +-
 drivers/input/misc/xen-kbdfront.c           |   4 +-
 drivers/net/xen-netfront.c                  |  13 +-
 drivers/pci/xen-pcifront.c                  |   2 +-
 drivers/scsi/xen-scsifront.c                |   4 +-
 drivers/usb/host/xen-hcd.c                  |   4 +-
 drivers/xen/gntalloc.c                      |   2 +-
 drivers/xen/gntdev-dmabuf.c                 |   2 +-
 drivers/xen/grant-table.c                   | 151 +++-----------------
 drivers/xen/pvcalls-front.c                 |   6 +-
 drivers/xen/xen-front-pgdir-shbuf.c         |   3 +-
 include/xen/grant_table.h                   |  13 +-
 net/9p/trans_xen.c                          |   8 +-
 sound/xen/xen_snd_front_evtchnl.c           |   2 +-
 16 files changed, 50 insertions(+), 176 deletions(-)

-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 10:34:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 10:34:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288917.490089 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScbU-0004B2-QJ; Fri, 11 Mar 2022 10:34:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288917.490089; Fri, 11 Mar 2022 10:34:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScbU-0004AF-Jx; Fri, 11 Mar 2022 10:34:36 +0000
Received: by outflank-mailman (input) for mailman id 288917;
 Fri, 11 Mar 2022 10:34:35 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=aAGA=TW=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nScbT-00047U-K8
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 10:34:35 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id d7973e09-a126-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 11:34:34 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id A6E151F38D;
 Fri, 11 Mar 2022 10:34:33 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 7E45213FA6;
 Fri, 11 Mar 2022 10:34:33 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id sBSlHbklK2LxdQAAMHmgww
 (envelope-from <jgross@suse.com>); Fri, 11 Mar 2022 10:34:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d7973e09-a126-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646994873; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=zIKrcrVv8sT7uGpdxBONglT2SrtoCB1xadTjqU49EQU=;
	b=ELDyhB/pH3g1wNJ9NCIGljJ0NiUjr/eV44nW0TBeCBZEPxzRjH0TAZleF2TcInRM3GMZq5
	bNyCjCx4Dprb3ou9V62DzSxf8GOTp6WpxPDTeucbqFJA2wZV0cbT+bvqNkLKnF8vFrPzz4
	QEZNLWqGh6PdbE6DjGcNB4TU1l/RBK8=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org,
	linux-kernel@vger.kernel.org
Cc: Juergen Gross <jgross@suse.com>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>
Subject: [PATCH 1/2] xen/grant-table: remove gnttab_*transfer*() functions
Date: Fri, 11 Mar 2022 11:34:28 +0100
Message-Id: <20220311103429.12845-2-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220311103429.12845-1-jgross@suse.com>
References: <20220311103429.12845-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

All grant table operations related to the "transfer" functionality
are unused currently. There have been users in the old days of the
"Xen-o-Linux" kernel, but those didn't make it upstream.

So remove the "transfer" related functions.

Signed-off-by: Juergen Gross <jgross@suse.com>
---
 drivers/xen/grant-table.c | 113 +-------------------------------------
 include/xen/grant_table.h |   8 ---
 2 files changed, 2 insertions(+), 119 deletions(-)

diff --git a/drivers/xen/grant-table.c b/drivers/xen/grant-table.c
index 5c83d41766c8..8963af8ec764 100644
--- a/drivers/xen/grant-table.c
+++ b/drivers/xen/grant-table.c
@@ -109,7 +109,7 @@ struct gnttab_ops {
 	void (*unmap_frames)(void);
 	/*
 	 * Introducing a valid entry into the grant table, granting the frame of
-	 * this grant entry to domain for accessing or transfering. Ref
+	 * this grant entry to domain for accessing. Ref
 	 * parameter is reference of this introduced grant entry, domid is id of
 	 * granted domain, frame is the page frame to be granted, and flags is
 	 * status of the grant entry to be updated.
@@ -125,14 +125,6 @@ struct gnttab_ops {
 	 * access for this entry and return success(==1).
 	 */
 	int (*end_foreign_access_ref)(grant_ref_t ref, int readonly);
-	/*
-	 * Stop granting a grant entry to domain for transfer. Ref parameter is
-	 * reference of a grant entry whose grant transfer will be stopped. If
-	 * tranfer has not started, just reclaim the grant entry and return
-	 * failure(==0). Otherwise, wait for the transfer to complete and then
-	 * return the frame.
-	 */
-	unsigned long (*end_foreign_transfer_ref)(grant_ref_t ref);
 	/*
 	 * Read the frame number related to a given grant reference.
 	 */
@@ -230,10 +222,7 @@ static void put_free_entry(grant_ref_t ref)
  * Following applies to gnttab_update_entry_v1 and gnttab_update_entry_v2.
  * Introducing a valid entry into the grant table:
  *  1. Write ent->domid.
- *  2. Write ent->frame:
- *      GTF_permit_access:   Frame to which access is permitted.
- *      GTF_accept_transfer: Pseudo-phys frame slot being filled by new
- *                           frame, or zero if none.
+ *  2. Write ent->frame: Frame to which access is permitted.
  *  3. Write memory barrier (WMB).
  *  4. Write ent->flags, inc. valid type.
  */
@@ -455,102 +444,6 @@ void gnttab_end_foreign_access(grant_ref_t ref, int readonly,
 }
 EXPORT_SYMBOL_GPL(gnttab_end_foreign_access);
 
-int gnttab_grant_foreign_transfer(domid_t domid, unsigned long pfn)
-{
-	int ref;
-
-	ref = get_free_entries(1);
-	if (unlikely(ref < 0))
-		return -ENOSPC;
-	gnttab_grant_foreign_transfer_ref(ref, domid, pfn);
-
-	return ref;
-}
-EXPORT_SYMBOL_GPL(gnttab_grant_foreign_transfer);
-
-void gnttab_grant_foreign_transfer_ref(grant_ref_t ref, domid_t domid,
-				       unsigned long pfn)
-{
-	gnttab_interface->update_entry(ref, domid, pfn, GTF_accept_transfer);
-}
-EXPORT_SYMBOL_GPL(gnttab_grant_foreign_transfer_ref);
-
-static unsigned long gnttab_end_foreign_transfer_ref_v1(grant_ref_t ref)
-{
-	unsigned long frame;
-	u16           flags;
-	u16          *pflags;
-
-	pflags = &gnttab_shared.v1[ref].flags;
-
-	/*
-	 * If a transfer is not even yet started, try to reclaim the grant
-	 * reference and return failure (== 0).
-	 */
-	while (!((flags = *pflags) & GTF_transfer_committed)) {
-		if (sync_cmpxchg(pflags, flags, 0) == flags)
-			return 0;
-		cpu_relax();
-	}
-
-	/* If a transfer is in progress then wait until it is completed. */
-	while (!(flags & GTF_transfer_completed)) {
-		flags = *pflags;
-		cpu_relax();
-	}
-
-	rmb();	/* Read the frame number /after/ reading completion status. */
-	frame = gnttab_shared.v1[ref].frame;
-	BUG_ON(frame == 0);
-
-	return frame;
-}
-
-static unsigned long gnttab_end_foreign_transfer_ref_v2(grant_ref_t ref)
-{
-	unsigned long frame;
-	u16           flags;
-	u16          *pflags;
-
-	pflags = &gnttab_shared.v2[ref].hdr.flags;
-
-	/*
-	 * If a transfer is not even yet started, try to reclaim the grant
-	 * reference and return failure (== 0).
-	 */
-	while (!((flags = *pflags) & GTF_transfer_committed)) {
-		if (sync_cmpxchg(pflags, flags, 0) == flags)
-			return 0;
-		cpu_relax();
-	}
-
-	/* If a transfer is in progress then wait until it is completed. */
-	while (!(flags & GTF_transfer_completed)) {
-		flags = *pflags;
-		cpu_relax();
-	}
-
-	rmb();  /* Read the frame number /after/ reading completion status. */
-	frame = gnttab_shared.v2[ref].full_page.frame;
-	BUG_ON(frame == 0);
-
-	return frame;
-}
-
-unsigned long gnttab_end_foreign_transfer_ref(grant_ref_t ref)
-{
-	return gnttab_interface->end_foreign_transfer_ref(ref);
-}
-EXPORT_SYMBOL_GPL(gnttab_end_foreign_transfer_ref);
-
-unsigned long gnttab_end_foreign_transfer(grant_ref_t ref)
-{
-	unsigned long frame = gnttab_end_foreign_transfer_ref(ref);
-	put_free_entry(ref);
-	return frame;
-}
-EXPORT_SYMBOL_GPL(gnttab_end_foreign_transfer);
-
 void gnttab_free_grant_reference(grant_ref_t ref)
 {
 	put_free_entry(ref);
@@ -1423,7 +1316,6 @@ static const struct gnttab_ops gnttab_v1_ops = {
 	.unmap_frames			= gnttab_unmap_frames_v1,
 	.update_entry			= gnttab_update_entry_v1,
 	.end_foreign_access_ref		= gnttab_end_foreign_access_ref_v1,
-	.end_foreign_transfer_ref	= gnttab_end_foreign_transfer_ref_v1,
 	.read_frame			= gnttab_read_frame_v1,
 };
 
@@ -1435,7 +1327,6 @@ static const struct gnttab_ops gnttab_v2_ops = {
 	.unmap_frames			= gnttab_unmap_frames_v2,
 	.update_entry			= gnttab_update_entry_v2,
 	.end_foreign_access_ref		= gnttab_end_foreign_access_ref_v2,
-	.end_foreign_transfer_ref	= gnttab_end_foreign_transfer_ref_v2,
 	.read_frame			= gnttab_read_frame_v2,
 };
 
diff --git a/include/xen/grant_table.h b/include/xen/grant_table.h
index c9fea9389ebe..9f9b1a297f0d 100644
--- a/include/xen/grant_table.h
+++ b/include/xen/grant_table.h
@@ -125,11 +125,6 @@ void gnttab_end_foreign_access(grant_ref_t ref, int readonly,
  */
 int gnttab_try_end_foreign_access(grant_ref_t ref);
 
-int gnttab_grant_foreign_transfer(domid_t domid, unsigned long pfn);
-
-unsigned long gnttab_end_foreign_transfer_ref(grant_ref_t ref);
-unsigned long gnttab_end_foreign_transfer(grant_ref_t ref);
-
 /*
  * operations on reserved batches of grant references
  */
@@ -162,9 +157,6 @@ static inline void gnttab_page_grant_foreign_access_ref_one(
 					readonly);
 }
 
-void gnttab_grant_foreign_transfer_ref(grant_ref_t, domid_t domid,
-				       unsigned long pfn);
-
 static inline void
 gnttab_set_map_op(struct gnttab_map_grant_ref *map, phys_addr_t addr,
 		  uint32_t flags, grant_ref_t ref, domid_t domid)
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 10:34:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 10:34:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288918.490105 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScbX-0004du-5W; Fri, 11 Mar 2022 10:34:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288918.490105; Fri, 11 Mar 2022 10:34:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScbX-0004dn-1t; Fri, 11 Mar 2022 10:34:39 +0000
Received: by outflank-mailman (input) for mailman id 288918;
 Fri, 11 Mar 2022 10:34:36 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=aAGA=TW=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nScbU-00047V-Dd
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 10:34:36 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d7004c4d-a126-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 11:34:33 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 81E8C218FC;
 Fri, 11 Mar 2022 10:34:34 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id AE25F13A85;
 Fri, 11 Mar 2022 10:34:33 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id sN5lKbklK2LxdQAAMHmgww
 (envelope-from <jgross@suse.com>); Fri, 11 Mar 2022 10:34:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d7004c4d-a126-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646994874; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=nZEvYyMBPYN1QtFdkQaMVNyj0XKkJ4elnymAYBJb21k=;
	b=ZS6ZRpLJmnmpCiKN0CZ3r86ITAr5TZ7YKuw20us0lnF3osuVpL90xTJ/v+NK4SyU7YdkWm
	IKGkavbso0o8v5YIWB4LbFnLFO0l6XfR2mgPKYmHMWY5Cy2lw8zalAj6pmwD3qWibMhSUP
	bdsJRB8vS66pgMEPsIct9gEAqhPkRqo=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org,
	linux-block@vger.kernel.org,
	linux-kernel@vger.kernel.org,
	linux-integrity@vger.kernel.org,
	dri-devel@lists.freedesktop.org,
	linux-input@vger.kernel.org,
	netdev@vger.kernel.org,
	linux-pci@vger.kernel.org,
	linux-scsi@vger.kernel.org,
	linux-usb@vger.kernel.org,
	v9fs-developer@lists.sourceforge.net
Cc: Juergen Gross <jgross@suse.com>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Jens Axboe <axboe@kernel.dk>,
	Peter Huewe <peterhuewe@gmx.de>,
	Jarkko Sakkinen <jarkko@kernel.org>,
	Jason Gunthorpe <jgg@ziepe.ca>,
	Oleksandr Andrushchenko <oleksandr_andrushchenko@epam.com>,
	David Airlie <airlied@linux.ie>,
	Daniel Vetter <daniel@ffwll.ch>,
	Dmitry Torokhov <dmitry.torokhov@gmail.com>,
	"David S. Miller" <davem@davemloft.net>,
	Jakub Kicinski <kuba@kernel.org>,
	Bjorn Helgaas <bhelgaas@google.com>,
	"James E.J. Bottomley" <jejb@linux.ibm.com>,
	"Martin K. Petersen" <martin.petersen@oracle.com>,
	Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
	Eric Van Hensbergen <ericvh@gmail.com>,
	Latchesar Ionkov <lucho@ionkov.net>,
	Dominique Martinet <asmadeus@codewreck.org>,
	Christian Schoenebeck <linux_oss@crudebyte.com>,
	Jaroslav Kysela <perex@perex.cz>,
	Takashi Iwai <tiwai@suse.com>,
	alsa-devel@alsa-project.org
Subject: [PATCH 2/2] xen/grant-table: remove readonly parameter from functions
Date: Fri, 11 Mar 2022 11:34:29 +0100
Message-Id: <20220311103429.12845-3-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220311103429.12845-1-jgross@suse.com>
References: <20220311103429.12845-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

The gnttab_end_foreign_access() family of functions is taking a
"readonly" parameter, which isn't used. Remove it from the function
parameters.

Signed-off-by: Juergen Gross <jgross@suse.com>
---
 drivers/block/xen-blkfront.c                |  8 ++---
 drivers/char/tpm/xen-tpmfront.c             |  2 +-
 drivers/gpu/drm/xen/xen_drm_front_evtchnl.c |  2 +-
 drivers/input/misc/xen-kbdfront.c           |  4 +--
 drivers/net/xen-netfront.c                  | 13 ++++---
 drivers/pci/xen-pcifront.c                  |  2 +-
 drivers/scsi/xen-scsifront.c                |  4 +--
 drivers/usb/host/xen-hcd.c                  |  4 +--
 drivers/xen/gntalloc.c                      |  2 +-
 drivers/xen/gntdev-dmabuf.c                 |  2 +-
 drivers/xen/grant-table.c                   | 38 +++++++++------------
 drivers/xen/pvcalls-front.c                 |  6 ++--
 drivers/xen/xen-front-pgdir-shbuf.c         |  3 +-
 include/xen/grant_table.h                   |  5 ++-
 net/9p/trans_xen.c                          |  8 ++---
 sound/xen/xen_snd_front_evtchnl.c           |  2 +-
 16 files changed, 48 insertions(+), 57 deletions(-)

diff --git a/drivers/block/xen-blkfront.c b/drivers/block/xen-blkfront.c
index 03b5fb341e58..aa996b637d0b 100644
--- a/drivers/block/xen-blkfront.c
+++ b/drivers/block/xen-blkfront.c
@@ -1223,7 +1223,7 @@ static void blkif_free_ring(struct blkfront_ring_info *rinfo)
 			list_del(&persistent_gnt->node);
 			if (persistent_gnt->gref != GRANT_INVALID_REF) {
 				gnttab_end_foreign_access(persistent_gnt->gref,
-							  0, 0UL);
+							  0UL);
 				rinfo->persistent_gnts_c--;
 			}
 			if (info->feature_persistent)
@@ -1246,7 +1246,7 @@ static void blkif_free_ring(struct blkfront_ring_info *rinfo)
 		       rinfo->shadow[i].req.u.rw.nr_segments;
 		for (j = 0; j < segs; j++) {
 			persistent_gnt = rinfo->shadow[i].grants_used[j];
-			gnttab_end_foreign_access(persistent_gnt->gref, 0, 0UL);
+			gnttab_end_foreign_access(persistent_gnt->gref, 0UL);
 			if (info->feature_persistent)
 				__free_page(persistent_gnt->page);
 			kfree(persistent_gnt);
@@ -1261,7 +1261,7 @@ static void blkif_free_ring(struct blkfront_ring_info *rinfo)
 
 		for (j = 0; j < INDIRECT_GREFS(segs); j++) {
 			persistent_gnt = rinfo->shadow[i].indirect_grants[j];
-			gnttab_end_foreign_access(persistent_gnt->gref, 0, 0UL);
+			gnttab_end_foreign_access(persistent_gnt->gref, 0UL);
 			__free_page(persistent_gnt->page);
 			kfree(persistent_gnt);
 		}
@@ -1284,7 +1284,7 @@ static void blkif_free_ring(struct blkfront_ring_info *rinfo)
 	/* Free resources associated with old device channel. */
 	for (i = 0; i < info->nr_ring_pages; i++) {
 		if (rinfo->ring_ref[i] != GRANT_INVALID_REF) {
-			gnttab_end_foreign_access(rinfo->ring_ref[i], 0, 0);
+			gnttab_end_foreign_access(rinfo->ring_ref[i], 0);
 			rinfo->ring_ref[i] = GRANT_INVALID_REF;
 		}
 	}
diff --git a/drivers/char/tpm/xen-tpmfront.c b/drivers/char/tpm/xen-tpmfront.c
index da5b30771418..ad0675f23e6e 100644
--- a/drivers/char/tpm/xen-tpmfront.c
+++ b/drivers/char/tpm/xen-tpmfront.c
@@ -332,7 +332,7 @@ static void ring_free(struct tpm_private *priv)
 		return;
 
 	if (priv->ring_ref)
-		gnttab_end_foreign_access(priv->ring_ref, 0,
+		gnttab_end_foreign_access(priv->ring_ref,
 				(unsigned long)priv->shr);
 	else
 		free_page((unsigned long)priv->shr);
diff --git a/drivers/gpu/drm/xen/xen_drm_front_evtchnl.c b/drivers/gpu/drm/xen/xen_drm_front_evtchnl.c
index e10d95dddb99..08b526eeec16 100644
--- a/drivers/gpu/drm/xen/xen_drm_front_evtchnl.c
+++ b/drivers/gpu/drm/xen/xen_drm_front_evtchnl.c
@@ -148,7 +148,7 @@ static void evtchnl_free(struct xen_drm_front_info *front_info,
 
 	/* end access and free the page */
 	if (evtchnl->gref != GRANT_INVALID_REF)
-		gnttab_end_foreign_access(evtchnl->gref, 0, page);
+		gnttab_end_foreign_access(evtchnl->gref, page);
 
 	memset(evtchnl, 0, sizeof(*evtchnl));
 }
diff --git a/drivers/input/misc/xen-kbdfront.c b/drivers/input/misc/xen-kbdfront.c
index 3d17a0b3fe51..1fc9b3e7007f 100644
--- a/drivers/input/misc/xen-kbdfront.c
+++ b/drivers/input/misc/xen-kbdfront.c
@@ -481,7 +481,7 @@ static int xenkbd_connect_backend(struct xenbus_device *dev,
  error_evtchan:
 	xenbus_free_evtchn(dev, evtchn);
  error_grant:
-	gnttab_end_foreign_access(info->gref, 0, 0UL);
+	gnttab_end_foreign_access(info->gref, 0UL);
 	info->gref = -1;
 	return ret;
 }
@@ -492,7 +492,7 @@ static void xenkbd_disconnect_backend(struct xenkbd_info *info)
 		unbind_from_irqhandler(info->irq, info);
 	info->irq = -1;
 	if (info->gref >= 0)
-		gnttab_end_foreign_access(info->gref, 0, 0UL);
+		gnttab_end_foreign_access(info->gref, 0UL);
 	info->gref = -1;
 }
 
diff --git a/drivers/net/xen-netfront.c b/drivers/net/xen-netfront.c
index daa4e6106aac..e2b4a1893a13 100644
--- a/drivers/net/xen-netfront.c
+++ b/drivers/net/xen-netfront.c
@@ -425,7 +425,7 @@ static bool xennet_tx_buf_gc(struct netfront_queue *queue)
 			skb = queue->tx_skbs[id];
 			queue->tx_skbs[id] = NULL;
 			if (unlikely(!gnttab_end_foreign_access_ref(
-				queue->grant_tx_ref[id], GNTMAP_readonly))) {
+				queue->grant_tx_ref[id]))) {
 				dev_alert(dev,
 					  "Grant still in use by backend domain\n");
 				goto err;
@@ -1029,7 +1029,7 @@ static int xennet_get_responses(struct netfront_queue *queue,
 			goto next;
 		}
 
-		if (!gnttab_end_foreign_access_ref(ref, 0)) {
+		if (!gnttab_end_foreign_access_ref(ref)) {
 			dev_alert(dev,
 				  "Grant still in use by backend domain\n");
 			queue->info->broken = true;
@@ -1388,7 +1388,6 @@ static void xennet_release_tx_bufs(struct netfront_queue *queue)
 		queue->tx_skbs[i] = NULL;
 		get_page(queue->grant_tx_page[i]);
 		gnttab_end_foreign_access(queue->grant_tx_ref[i],
-					  GNTMAP_readonly,
 					  (unsigned long)page_address(queue->grant_tx_page[i]));
 		queue->grant_tx_page[i] = NULL;
 		queue->grant_tx_ref[i] = GRANT_INVALID_REF;
@@ -1421,7 +1420,7 @@ static void xennet_release_rx_bufs(struct netfront_queue *queue)
 		 * foreign access is ended (which may be deferred).
 		 */
 		get_page(page);
-		gnttab_end_foreign_access(ref, 0,
+		gnttab_end_foreign_access(ref,
 					  (unsigned long)page_address(page));
 		queue->grant_rx_ref[id] = GRANT_INVALID_REF;
 
@@ -1763,7 +1762,7 @@ static void xennet_end_access(int ref, void *page)
 {
 	/* This frees the page as a side-effect */
 	if (ref != GRANT_INVALID_REF)
-		gnttab_end_foreign_access(ref, 0, (unsigned long)page);
+		gnttab_end_foreign_access(ref, (unsigned long)page);
 }
 
 static void xennet_disconnect_backend(struct netfront_info *info)
@@ -1980,14 +1979,14 @@ static int setup_netfront(struct xenbus_device *dev,
 	 */
  fail:
 	if (queue->rx_ring_ref != GRANT_INVALID_REF) {
-		gnttab_end_foreign_access(queue->rx_ring_ref, 0,
+		gnttab_end_foreign_access(queue->rx_ring_ref,
 					  (unsigned long)rxs);
 		queue->rx_ring_ref = GRANT_INVALID_REF;
 	} else {
 		free_page((unsigned long)rxs);
 	}
 	if (queue->tx_ring_ref != GRANT_INVALID_REF) {
-		gnttab_end_foreign_access(queue->tx_ring_ref, 0,
+		gnttab_end_foreign_access(queue->tx_ring_ref,
 					  (unsigned long)txs);
 		queue->tx_ring_ref = GRANT_INVALID_REF;
 	} else {
diff --git a/drivers/pci/xen-pcifront.c b/drivers/pci/xen-pcifront.c
index d2a7b9fd678b..3edc1565a27c 100644
--- a/drivers/pci/xen-pcifront.c
+++ b/drivers/pci/xen-pcifront.c
@@ -755,7 +755,7 @@ static void free_pdev(struct pcifront_device *pdev)
 		xenbus_free_evtchn(pdev->xdev, pdev->evtchn);
 
 	if (pdev->gnt_ref != INVALID_GRANT_REF)
-		gnttab_end_foreign_access(pdev->gnt_ref, 0 /* r/w page */,
+		gnttab_end_foreign_access(pdev->gnt_ref,
 					  (unsigned long)pdev->sh_info);
 	else
 		free_page((unsigned long)pdev->sh_info);
diff --git a/drivers/scsi/xen-scsifront.c b/drivers/scsi/xen-scsifront.c
index 7f421600cb66..12109e4c73d4 100644
--- a/drivers/scsi/xen-scsifront.c
+++ b/drivers/scsi/xen-scsifront.c
@@ -757,7 +757,7 @@ static int scsifront_alloc_ring(struct vscsifrnt_info *info)
 free_irq:
 	unbind_from_irqhandler(info->irq, info);
 free_gnttab:
-	gnttab_end_foreign_access(info->ring_ref, 0,
+	gnttab_end_foreign_access(info->ring_ref,
 				  (unsigned long)info->ring.sring);
 
 	return err;
@@ -766,7 +766,7 @@ static int scsifront_alloc_ring(struct vscsifrnt_info *info)
 static void scsifront_free_ring(struct vscsifrnt_info *info)
 {
 	unbind_from_irqhandler(info->irq, info);
-	gnttab_end_foreign_access(info->ring_ref, 0,
+	gnttab_end_foreign_access(info->ring_ref,
 				  (unsigned long)info->ring.sring);
 }
 
diff --git a/drivers/usb/host/xen-hcd.c b/drivers/usb/host/xen-hcd.c
index 19b8c7ed74cb..5f4a00df4f1c 100644
--- a/drivers/usb/host/xen-hcd.c
+++ b/drivers/usb/host/xen-hcd.c
@@ -1075,14 +1075,14 @@ static void xenhcd_destroy_rings(struct xenhcd_info *info)
 	info->irq = 0;
 
 	if (info->urb_ring_ref != GRANT_INVALID_REF) {
-		gnttab_end_foreign_access(info->urb_ring_ref, 0,
+		gnttab_end_foreign_access(info->urb_ring_ref,
 					  (unsigned long)info->urb_ring.sring);
 		info->urb_ring_ref = GRANT_INVALID_REF;
 	}
 	info->urb_ring.sring = NULL;
 
 	if (info->conn_ring_ref != GRANT_INVALID_REF) {
-		gnttab_end_foreign_access(info->conn_ring_ref, 0,
+		gnttab_end_foreign_access(info->conn_ring_ref,
 					  (unsigned long)info->conn_ring.sring);
 		info->conn_ring_ref = GRANT_INVALID_REF;
 	}
diff --git a/drivers/xen/gntalloc.c b/drivers/xen/gntalloc.c
index edb0acd0b832..4849f94372a4 100644
--- a/drivers/xen/gntalloc.c
+++ b/drivers/xen/gntalloc.c
@@ -192,7 +192,7 @@ static void __del_gref(struct gntalloc_gref *gref)
 	if (gref->gref_id) {
 		if (gref->page) {
 			addr = (unsigned long)page_to_virt(gref->page);
-			gnttab_end_foreign_access(gref->gref_id, 0, addr);
+			gnttab_end_foreign_access(gref->gref_id, addr);
 		} else
 			gnttab_free_grant_reference(gref->gref_id);
 	}
diff --git a/drivers/xen/gntdev-dmabuf.c b/drivers/xen/gntdev-dmabuf.c
index 12e380db7f55..d5bfd7b867fc 100644
--- a/drivers/xen/gntdev-dmabuf.c
+++ b/drivers/xen/gntdev-dmabuf.c
@@ -533,7 +533,7 @@ static void dmabuf_imp_end_foreign_access(u32 *refs, int count)
 
 	for (i = 0; i < count; i++)
 		if (refs[i] != GRANT_INVALID_REF)
-			gnttab_end_foreign_access(refs[i], 0, 0UL);
+			gnttab_end_foreign_access(refs[i], 0UL);
 }
 
 static void dmabuf_imp_free_storage(struct gntdev_dmabuf *gntdev_dmabuf)
diff --git a/drivers/xen/grant-table.c b/drivers/xen/grant-table.c
index 8963af8ec764..8ccccace2a4f 100644
--- a/drivers/xen/grant-table.c
+++ b/drivers/xen/grant-table.c
@@ -118,13 +118,12 @@ struct gnttab_ops {
 			     unsigned long frame, unsigned flags);
 	/*
 	 * Stop granting a grant entry to domain for accessing. Ref parameter is
-	 * reference of a grant entry whose grant access will be stopped,
-	 * readonly is not in use in this function. If the grant entry is
-	 * currently mapped for reading or writing, just return failure(==0)
-	 * directly and don't tear down the grant access. Otherwise, stop grant
-	 * access for this entry and return success(==1).
+	 * reference of a grant entry whose grant access will be stopped.
+	 * If the grant entry is currently mapped for reading or writing, just
+	 * return failure(==0) directly and don't tear down the grant access.
+	 * Otherwise, stop grant access for this entry and return success(==1).
 	 */
-	int (*end_foreign_access_ref)(grant_ref_t ref, int readonly);
+	int (*end_foreign_access_ref)(grant_ref_t ref);
 	/*
 	 * Read the frame number related to a given grant reference.
 	 */
@@ -270,7 +269,7 @@ int gnttab_grant_foreign_access(domid_t domid, unsigned long frame,
 }
 EXPORT_SYMBOL_GPL(gnttab_grant_foreign_access);
 
-static int gnttab_end_foreign_access_ref_v1(grant_ref_t ref, int readonly)
+static int gnttab_end_foreign_access_ref_v1(grant_ref_t ref)
 {
 	u16 flags, nflags;
 	u16 *pflags;
@@ -286,7 +285,7 @@ static int gnttab_end_foreign_access_ref_v1(grant_ref_t ref, int readonly)
 	return 1;
 }
 
-static int gnttab_end_foreign_access_ref_v2(grant_ref_t ref, int readonly)
+static int gnttab_end_foreign_access_ref_v2(grant_ref_t ref)
 {
 	gnttab_shared.v2[ref].hdr.flags = 0;
 	mb();	/* Concurrent access by hypervisor. */
@@ -309,14 +308,14 @@ static int gnttab_end_foreign_access_ref_v2(grant_ref_t ref, int readonly)
 	return 1;
 }
 
-static inline int _gnttab_end_foreign_access_ref(grant_ref_t ref, int readonly)
+static inline int _gnttab_end_foreign_access_ref(grant_ref_t ref)
 {
-	return gnttab_interface->end_foreign_access_ref(ref, readonly);
+	return gnttab_interface->end_foreign_access_ref(ref);
 }
 
-int gnttab_end_foreign_access_ref(grant_ref_t ref, int readonly)
+int gnttab_end_foreign_access_ref(grant_ref_t ref)
 {
-	if (_gnttab_end_foreign_access_ref(ref, readonly))
+	if (_gnttab_end_foreign_access_ref(ref))
 		return 1;
 	pr_warn("WARNING: g.e. %#x still in use!\n", ref);
 	return 0;
@@ -336,7 +335,6 @@ static unsigned long gnttab_read_frame_v2(grant_ref_t ref)
 struct deferred_entry {
 	struct list_head list;
 	grant_ref_t ref;
-	bool ro;
 	uint16_t warn_delay;
 	struct page *page;
 };
@@ -360,7 +358,7 @@ static void gnttab_handle_deferred(struct timer_list *unused)
 			break;
 		list_del(&entry->list);
 		spin_unlock_irqrestore(&gnttab_list_lock, flags);
-		if (_gnttab_end_foreign_access_ref(entry->ref, entry->ro)) {
+		if (_gnttab_end_foreign_access_ref(entry->ref)) {
 			put_free_entry(entry->ref);
 			pr_debug("freeing g.e. %#x (pfn %#lx)\n",
 				 entry->ref, page_to_pfn(entry->page));
@@ -386,8 +384,7 @@ static void gnttab_handle_deferred(struct timer_list *unused)
 	spin_unlock_irqrestore(&gnttab_list_lock, flags);
 }
 
-static void gnttab_add_deferred(grant_ref_t ref, bool readonly,
-				struct page *page)
+static void gnttab_add_deferred(grant_ref_t ref, struct page *page)
 {
 	struct deferred_entry *entry;
 	gfp_t gfp = (in_atomic() || irqs_disabled()) ? GFP_ATOMIC : GFP_KERNEL;
@@ -405,7 +402,6 @@ static void gnttab_add_deferred(grant_ref_t ref, bool readonly,
 		unsigned long flags;
 
 		entry->ref = ref;
-		entry->ro = readonly;
 		entry->page = page;
 		entry->warn_delay = 60;
 		spin_lock_irqsave(&gnttab_list_lock, flags);
@@ -423,7 +419,7 @@ static void gnttab_add_deferred(grant_ref_t ref, bool readonly,
 
 int gnttab_try_end_foreign_access(grant_ref_t ref)
 {
-	int ret = _gnttab_end_foreign_access_ref(ref, 0);
+	int ret = _gnttab_end_foreign_access_ref(ref);
 
 	if (ret)
 		put_free_entry(ref);
@@ -432,15 +428,13 @@ int gnttab_try_end_foreign_access(grant_ref_t ref)
 }
 EXPORT_SYMBOL_GPL(gnttab_try_end_foreign_access);
 
-void gnttab_end_foreign_access(grant_ref_t ref, int readonly,
-			       unsigned long page)
+void gnttab_end_foreign_access(grant_ref_t ref, unsigned long page)
 {
 	if (gnttab_try_end_foreign_access(ref)) {
 		if (page != 0)
 			put_page(virt_to_page(page));
 	} else
-		gnttab_add_deferred(ref, readonly,
-				    page ? virt_to_page(page) : NULL);
+		gnttab_add_deferred(ref, page ? virt_to_page(page) : NULL);
 }
 EXPORT_SYMBOL_GPL(gnttab_end_foreign_access);
 
diff --git a/drivers/xen/pvcalls-front.c b/drivers/xen/pvcalls-front.c
index 0ca351f30a6d..e254ed19488f 100644
--- a/drivers/xen/pvcalls-front.c
+++ b/drivers/xen/pvcalls-front.c
@@ -238,8 +238,8 @@ static void pvcalls_front_free_map(struct pvcalls_bedata *bedata,
 	spin_unlock(&bedata->socket_lock);
 
 	for (i = 0; i < (1 << PVCALLS_RING_ORDER); i++)
-		gnttab_end_foreign_access(map->active.ring->ref[i], 0, 0);
-	gnttab_end_foreign_access(map->active.ref, 0, 0);
+		gnttab_end_foreign_access(map->active.ring->ref[i], 0);
+	gnttab_end_foreign_access(map->active.ref, 0);
 	free_page((unsigned long)map->active.ring);
 
 	kfree(map);
@@ -1117,7 +1117,7 @@ static int pvcalls_front_remove(struct xenbus_device *dev)
 		}
 	}
 	if (bedata->ref != -1)
-		gnttab_end_foreign_access(bedata->ref, 0, 0);
+		gnttab_end_foreign_access(bedata->ref, 0);
 	kfree(bedata->ring.sring);
 	kfree(bedata);
 	xenbus_switch_state(dev, XenbusStateClosed);
diff --git a/drivers/xen/xen-front-pgdir-shbuf.c b/drivers/xen/xen-front-pgdir-shbuf.c
index 81b6e13fa5ec..a959dee21134 100644
--- a/drivers/xen/xen-front-pgdir-shbuf.c
+++ b/drivers/xen/xen-front-pgdir-shbuf.c
@@ -143,8 +143,7 @@ void xen_front_pgdir_shbuf_free(struct xen_front_pgdir_shbuf *buf)
 
 		for (i = 0; i < buf->num_grefs; i++)
 			if (buf->grefs[i] != GRANT_INVALID_REF)
-				gnttab_end_foreign_access(buf->grefs[i],
-							  0, 0UL);
+				gnttab_end_foreign_access(buf->grefs[i], 0UL);
 	}
 	kfree(buf->grefs);
 	kfree(buf->directory);
diff --git a/include/xen/grant_table.h b/include/xen/grant_table.h
index 9f9b1a297f0d..dfd5bf31cfb9 100644
--- a/include/xen/grant_table.h
+++ b/include/xen/grant_table.h
@@ -97,7 +97,7 @@ int gnttab_grant_foreign_access(domid_t domid, unsigned long frame,
  * longer in use.  Return 1 if the grant entry was freed, 0 if it is still in
  * use.
  */
-int gnttab_end_foreign_access_ref(grant_ref_t ref, int readonly);
+int gnttab_end_foreign_access_ref(grant_ref_t ref);
 
 /*
  * Eventually end access through the given grant reference, and once that
@@ -114,8 +114,7 @@ int gnttab_end_foreign_access_ref(grant_ref_t ref, int readonly);
  * gnttab_end_foreign_access() are done via alloc_pages_exact() (and freeing
  * via free_pages_exact()) in order to avoid high order pages.
  */
-void gnttab_end_foreign_access(grant_ref_t ref, int readonly,
-			       unsigned long page);
+void gnttab_end_foreign_access(grant_ref_t ref, unsigned long page);
 
 /*
  * End access through the given grant reference, iff the grant entry is
diff --git a/net/9p/trans_xen.c b/net/9p/trans_xen.c
index 01f8067994d6..77883b6788cd 100644
--- a/net/9p/trans_xen.c
+++ b/net/9p/trans_xen.c
@@ -279,13 +279,13 @@ static void xen_9pfs_front_free(struct xen_9pfs_front_priv *priv)
 				grant_ref_t ref;
 
 				ref = priv->rings[i].intf->ref[j];
-				gnttab_end_foreign_access(ref, 0, 0);
+				gnttab_end_foreign_access(ref, 0);
 			}
 			free_pages_exact(priv->rings[i].data.in,
 				   1UL << (priv->rings[i].intf->ring_order +
 					   XEN_PAGE_SHIFT));
 		}
-		gnttab_end_foreign_access(priv->rings[i].ref, 0, 0);
+		gnttab_end_foreign_access(priv->rings[i].ref, 0);
 		free_page((unsigned long)priv->rings[i].intf);
 	}
 	kfree(priv->rings);
@@ -353,10 +353,10 @@ static int xen_9pfs_front_alloc_dataring(struct xenbus_device *dev,
 out:
 	if (bytes) {
 		for (i--; i >= 0; i--)
-			gnttab_end_foreign_access(ring->intf->ref[i], 0, 0);
+			gnttab_end_foreign_access(ring->intf->ref[i], 0);
 		free_pages_exact(bytes, 1UL << (order + XEN_PAGE_SHIFT));
 	}
-	gnttab_end_foreign_access(ring->ref, 0, 0);
+	gnttab_end_foreign_access(ring->ref, 0);
 	free_page((unsigned long)ring->intf);
 	return ret;
 }
diff --git a/sound/xen/xen_snd_front_evtchnl.c b/sound/xen/xen_snd_front_evtchnl.c
index 29e0f0ea67eb..ecbc294fc59a 100644
--- a/sound/xen/xen_snd_front_evtchnl.c
+++ b/sound/xen/xen_snd_front_evtchnl.c
@@ -168,7 +168,7 @@ static void evtchnl_free(struct xen_snd_front_info *front_info,
 
 	/* End access and free the page. */
 	if (channel->gref != GRANT_INVALID_REF)
-		gnttab_end_foreign_access(channel->gref, 0, page);
+		gnttab_end_foreign_access(channel->gref, page);
 	else
 		free_page(page);
 
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 10:35:05 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 10:35:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288926.490116 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScbx-0005aF-J9; Fri, 11 Mar 2022 10:35:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288926.490116; Fri, 11 Mar 2022 10:35:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScbx-0005a7-Fv; Fri, 11 Mar 2022 10:35:05 +0000
Received: by outflank-mailman (input) for mailman id 288926;
 Fri, 11 Mar 2022 10:35:04 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=aAGA=TW=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nScbw-00047V-0W
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 10:35:04 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id e7e4c480-a126-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 11:35:01 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 1505421901;
 Fri, 11 Mar 2022 10:35:03 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id D69EB13A85;
 Fri, 11 Mar 2022 10:35:02 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id Pe8nM9YlK2I5dgAAMHmgww
 (envelope-from <jgross@suse.com>); Fri, 11 Mar 2022 10:35:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e7e4c480-a126-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646994903; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:  content-transfer-encoding:content-transfer-encoding;
	bh=cl8eXsZGXE2910dV3+hGtO5AmlArXF2/CNH7AFhna9A=;
	b=jzLP/R1zJqyhsxtF02jryM8k300pfwJZXj8gxvxt/4Nm6TDhvTgoPKqENjWl1clmPGCMbt
	UIL2Xl9sT9WOeDqiCb8WyElSfyhKO6RDIANpNYwGrrZN/pHL8Z7FWmqzuDzEpdMtsLQpdh
	GxViyLpxS0aatuAWvXEwYj0rudthaDU=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org,
	linux-usb@vger.kernel.org,
	linux-kernel@vger.kernel.org
Cc: Juergen Gross <jgross@suse.com>,
	Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Subject: [PATCH] xen/usb: don't use arbitrary_virt_to_machine()
Date: Fri, 11 Mar 2022 11:35:00 +0100
Message-Id: <20220311103500.12885-1-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

arbitrary_virt_to_machine() is meant to be used in PV guests only.
Replace its usage with virt_to_gfn().

Signed-off-by: Juergen Gross <jgross@suse.com>
---
 drivers/usb/host/xen-hcd.c | 4 +---
 1 file changed, 1 insertion(+), 3 deletions(-)

diff --git a/drivers/usb/host/xen-hcd.c b/drivers/usb/host/xen-hcd.c
index 5f4a00df4f1c..01db5c767251 100644
--- a/drivers/usb/host/xen-hcd.c
+++ b/drivers/usb/host/xen-hcd.c
@@ -589,14 +589,12 @@ static void xenhcd_gnttab_map(struct xenhcd_info *info, void *addr, int length,
 			      int nr_pages, int flags)
 {
 	grant_ref_t ref;
-	unsigned long buffer_mfn;
 	unsigned int offset;
 	unsigned int len = length;
 	unsigned int bytes;
 	int i;
 
 	for (i = 0; i < nr_pages; i++) {
-		buffer_mfn = PFN_DOWN(arbitrary_virt_to_machine(addr).maddr);
 		offset = offset_in_page(addr);
 
 		bytes = PAGE_SIZE - offset;
@@ -605,7 +603,7 @@ static void xenhcd_gnttab_map(struct xenhcd_info *info, void *addr, int length,
 
 		ref = gnttab_claim_grant_reference(gref_head);
 		gnttab_grant_foreign_access_ref(ref, info->xbdev->otherend_id,
-						buffer_mfn, flags);
+						virt_to_gfn(addr), flags);
 		seg[i].gref = ref;
 		seg[i].offset = (__u16)offset;
 		seg[i].length = (__u16)bytes;
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 10:35:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 10:35:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288928.490127 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScc5-00060L-R2; Fri, 11 Mar 2022 10:35:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288928.490127; Fri, 11 Mar 2022 10:35:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScc5-00060E-Nv; Fri, 11 Mar 2022 10:35:13 +0000
Received: by outflank-mailman (input) for mailman id 288928;
 Fri, 11 Mar 2022 10:35:12 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=aAGA=TW=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nScc4-00047U-6n
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 10:35:12 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id edd96244-a126-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 11:35:11 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 39DE021900;
 Fri, 11 Mar 2022 10:35:11 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 0D8A613A85;
 Fri, 11 Mar 2022 10:35:11 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id hhYYAt8lK2JRdgAAMHmgww
 (envelope-from <jgross@suse.com>); Fri, 11 Mar 2022 10:35:11 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: edd96244-a126-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646994911; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:  content-transfer-encoding:content-transfer-encoding;
	bh=3mp/NTfr1ZRQi2cvIw2K8ve4TPHKPxpsioOPY6Gm7jc=;
	b=jEF0gJQKcwhTeagwgBdvSlHK36VYwwKZUbqR5ce0nf5w8NliamXW+5XJYokUtbuWWuhBgB
	8rKEt/xFMtHs84cFx6WEQp8PD/IfplRPiesklbTvPESwhZqVNC6NFBDRQiZfIVwtX1gnKU
	r4JvdzxW9L6tOjbi2UUDEDb/R5Qt3hA=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org,
	linux-usb@vger.kernel.org,
	linux-kernel@vger.kernel.org
Cc: Juergen Gross <jgross@suse.com>,
	Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Subject: [PATCH] xen/usb: harden xen_hcd against malicious backends
Date: Fri, 11 Mar 2022 11:35:09 +0100
Message-Id: <20220311103509.12908-1-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Make sure a malicious backend can't cause any harm other than wrong
I/O data.

Missing are verification of the request id in a response, sanitizing
the reported actual I/O length, and protection against interrupt storms
from the backend.

Signed-off-by: Juergen Gross <jgross@suse.com>
---
 drivers/usb/host/xen-hcd.c | 57 ++++++++++++++++++++++++++++----------
 1 file changed, 43 insertions(+), 14 deletions(-)

diff --git a/drivers/usb/host/xen-hcd.c b/drivers/usb/host/xen-hcd.c
index 01db5c767251..3e487baf8422 100644
--- a/drivers/usb/host/xen-hcd.c
+++ b/drivers/usb/host/xen-hcd.c
@@ -51,6 +51,7 @@ struct vdevice_status {
 struct usb_shadow {
 	struct xenusb_urb_request req;
 	struct urb *urb;
+	bool in_flight;
 };
 
 struct xenhcd_info {
@@ -720,6 +721,12 @@ static void xenhcd_gnttab_done(struct xenhcd_info *info, unsigned int id)
 	int nr_segs = 0;
 	int i;
 
+	if (!shadow->in_flight) {
+		xenhcd_set_error(info, "Illegal request id");
+		return;
+	}
+	shadow->in_flight = false;
+
 	nr_segs = shadow->req.nr_buffer_segs;
 
 	if (xenusb_pipeisoc(shadow->req.pipe))
@@ -803,6 +810,7 @@ static int xenhcd_do_request(struct xenhcd_info *info, struct urb_priv *urbp)
 
 	info->urb_ring.req_prod_pvt++;
 	info->shadow[id].urb = urb;
+	info->shadow[id].in_flight = true;
 
 	RING_PUSH_REQUESTS_AND_CHECK_NOTIFY(&info->urb_ring, notify);
 	if (notify)
@@ -931,10 +939,27 @@ static int xenhcd_unlink_urb(struct xenhcd_info *info, struct urb_priv *urbp)
 	return ret;
 }
 
-static int xenhcd_urb_request_done(struct xenhcd_info *info)
+static void xenhcd_res_to_urb(struct xenhcd_info *info,
+			      struct xenusb_urb_response *res, struct urb *urb)
+{
+	if (unlikely(!urb))
+		return;
+
+	if (res->actual_length > urb->transfer_buffer_length)
+		urb->actual_length = urb->transfer_buffer_length;
+	else if (res->actual_length < 0)
+		urb->actual_length = 0;
+	else
+		urb->actual_length = res->actual_length;
+	urb->error_count = res->error_count;
+	urb->start_frame = res->start_frame;
+	xenhcd_giveback_urb(info, urb, res->status);
+}
+
+static int xenhcd_urb_request_done(struct xenhcd_info *info,
+				   unsigned int *eoiflag)
 {
 	struct xenusb_urb_response res;
-	struct urb *urb;
 	RING_IDX i, rp;
 	__u16 id;
 	int more_to_do = 0;
@@ -961,16 +986,12 @@ static int xenhcd_urb_request_done(struct xenhcd_info *info)
 			xenhcd_gnttab_done(info, id);
 			if (info->error)
 				goto err;
-			urb = info->shadow[id].urb;
-			if (likely(urb)) {
-				urb->actual_length = res.actual_length;
-				urb->error_count = res.error_count;
-				urb->start_frame = res.start_frame;
-				xenhcd_giveback_urb(info, urb, res.status);
-			}
+			xenhcd_res_to_urb(info, &res, info->shadow[id].urb);
 		}
 
 		xenhcd_add_id_to_freelist(info, id);
+
+		*eoiflag = 0;
 	}
 	info->urb_ring.rsp_cons = i;
 
@@ -988,7 +1009,7 @@ static int xenhcd_urb_request_done(struct xenhcd_info *info)
 	return 0;
 }
 
-static int xenhcd_conn_notify(struct xenhcd_info *info)
+static int xenhcd_conn_notify(struct xenhcd_info *info, unsigned int *eoiflag)
 {
 	struct xenusb_conn_response res;
 	struct xenusb_conn_request *req;
@@ -1033,6 +1054,8 @@ static int xenhcd_conn_notify(struct xenhcd_info *info)
 				       info->conn_ring.req_prod_pvt);
 		req->id = id;
 		info->conn_ring.req_prod_pvt++;
+
+		*eoiflag = 0;
 	}
 
 	if (rc != info->conn_ring.req_prod_pvt)
@@ -1055,14 +1078,19 @@ static int xenhcd_conn_notify(struct xenhcd_info *info)
 static irqreturn_t xenhcd_int(int irq, void *dev_id)
 {
 	struct xenhcd_info *info = (struct xenhcd_info *)dev_id;
+	unsigned int eoiflag = XEN_EOI_FLAG_SPURIOUS;
 
-	if (unlikely(info->error))
+	if (unlikely(info->error)) {
+		xen_irq_lateeoi(irq, XEN_EOI_FLAG_SPURIOUS);
 		return IRQ_HANDLED;
+	}
 
-	while (xenhcd_urb_request_done(info) | xenhcd_conn_notify(info))
+	while (xenhcd_urb_request_done(info, &eoiflag) |
+	       xenhcd_conn_notify(info, &eoiflag))
 		/* Yield point for this unbounded loop. */
 		cond_resched();
 
+	xen_irq_lateeoi(irq, eoiflag);
 	return IRQ_HANDLED;
 }
 
@@ -1139,9 +1167,9 @@ static int xenhcd_setup_rings(struct xenbus_device *dev,
 		goto fail;
 	}
 
-	err = bind_evtchn_to_irq(info->evtchn);
+	err = bind_evtchn_to_irq_lateeoi(info->evtchn);
 	if (err <= 0) {
-		xenbus_dev_fatal(dev, err, "bind_evtchn_to_irq");
+		xenbus_dev_fatal(dev, err, "bind_evtchn_to_irq_lateeoi");
 		goto fail;
 	}
 
@@ -1494,6 +1522,7 @@ static struct usb_hcd *xenhcd_create_hcd(struct xenbus_device *dev)
 	for (i = 0; i < XENUSB_URB_RING_SIZE; i++) {
 		info->shadow[i].req.id = i + 1;
 		info->shadow[i].urb = NULL;
+		info->shadow[i].in_flight = false;
 	}
 	info->shadow[XENUSB_URB_RING_SIZE - 1].req.id = 0x0fff;
 
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 10:35:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 10:35:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288933.490137 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSccN-0006oH-3K; Fri, 11 Mar 2022 10:35:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288933.490137; Fri, 11 Mar 2022 10:35:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSccN-0006oA-01; Fri, 11 Mar 2022 10:35:31 +0000
Received: by outflank-mailman (input) for mailman id 288933;
 Fri, 11 Mar 2022 10:35:29 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=aAGA=TW=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nSccL-00047U-TJ
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 10:35:29 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f87ff06e-a126-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 11:35:29 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 18DCC21900;
 Fri, 11 Mar 2022 10:35:29 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id CE33E13A85;
 Fri, 11 Mar 2022 10:35:28 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id 2CMJMfAlK2JydgAAMHmgww
 (envelope-from <jgross@suse.com>); Fri, 11 Mar 2022 10:35:28 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f87ff06e-a126-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1646994929; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:  content-transfer-encoding:content-transfer-encoding;
	bh=2A0s9MNxg2Q3sbNoaDjqzamUO4PIFL9q9tcCNyUQzoo=;
	b=kOTKT+erKLJg8Sd4nahKDsq5kn2bQQGml4MXQ+m1NTG+glUxRhoBrK+ftjenbbb2FK5k4N
	eJMBxr9G8aAIvMFDCdAYBBuywecStRBkVAMuu2sI8CW0jHZ3ZUIZZpAs+Mz/MUbN1DD61B
	Go1rLUSZ6tZYV9RL/MORon1oqiyXz4s=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org,
	linux-block@vger.kernel.org,
	linux-kernel@vger.kernel.org
Cc: Juergen Gross <jgross@suse.com>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Jens Axboe <axboe@kernel.dk>,
	Jan Beulich <jbeulich@suse.com>
Subject: [PATCH] xen/blkfront: speed up purge_persistent_grants()
Date: Fri, 11 Mar 2022 11:35:27 +0100
Message-Id: <20220311103527.12931-1-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

purge_persistent_grants() is scanning the grants list for persistent
grants being no longer in use by the backend. When having found such a
grant, it will be set to "invalid" and pushed to the tail of the list.

Instead of pushing it directly to the end of the list, add it first to
a temporary list, avoiding to scan those entries again in the main
list traversal. After having finished the scan, append the temporary
list to the grant list.

Suggested-by: Jan Beulich <jbeulich@suse.com>
Signed-off-by: Juergen Gross <jgross@suse.com>
---
 drivers/block/xen-blkfront.c | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/drivers/block/xen-blkfront.c b/drivers/block/xen-blkfront.c
index aa996b637d0b..378262ec47ae 100644
--- a/drivers/block/xen-blkfront.c
+++ b/drivers/block/xen-blkfront.c
@@ -2533,6 +2533,7 @@ static void purge_persistent_grants(struct blkfront_info *info)
 
 	for_each_rinfo(info, rinfo, i) {
 		struct grant *gnt_list_entry, *tmp;
+		LIST_HEAD(grants);
 
 		spin_lock_irqsave(&rinfo->ring_lock, flags);
 
@@ -2550,9 +2551,11 @@ static void purge_persistent_grants(struct blkfront_info *info)
 			list_del(&gnt_list_entry->node);
 			rinfo->persistent_gnts_c--;
 			gnt_list_entry->gref = GRANT_INVALID_REF;
-			list_add_tail(&gnt_list_entry->node, &rinfo->grants);
+			list_add_tail(&gnt_list_entry->node, &grants);
 		}
 
+		list_splice_tail(&grants, &rinfo->grants);
+
 		spin_unlock_irqrestore(&rinfo->ring_lock, flags);
 	}
 }
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 10:35:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 10:35:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288935.490149 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSccO-000751-Bu; Fri, 11 Mar 2022 10:35:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288935.490149; Fri, 11 Mar 2022 10:35:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSccO-00074s-88; Fri, 11 Mar 2022 10:35:32 +0000
Received: by outflank-mailman (input) for mailman id 288935;
 Fri, 11 Mar 2022 10:35:31 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nSccN-0006ob-4x
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 10:35:31 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSccM-0006Qs-TS; Fri, 11 Mar 2022 10:35:30 +0000
Received: from 54-240-197-233.amazon.com ([54.240.197.233] helo=[10.95.172.72])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSccM-0007u1-Ng; Fri, 11 Mar 2022 10:35:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=IG98Swik7wXbsek33e22yfMk0sIk2wuzdyxMp439xz4=; b=Js/QoM0PGuF9sdn5HB9IkYSkgt
	wSVqRnSPBP07CdtOOWw4+gKp+d5FT7X72jqBznMeadSjpAV1vK9C75cEfQsyCCRjx8gJ17yaNUPpc
	ii4OI9m/fTibM3GhYTu9bqaoJ91U4l93vrdj+X4OQxj7d9obs0jWqq03mTJhmblJtW6Y=;
Message-ID: <fe99c7b5-d897-d413-cc64-ee36eb578182@xen.org>
Date: Fri, 11 Mar 2022 10:35:28 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Subject: Re: [PATCH v6 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
To: Bjoern Doebel <doebel@amazon.de>, xen-devel@lists.xenproject.org
Cc: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>,
 Roger Pau Monne <roger.pau@citrix.com>,
 Andrew Cooper <Andrew.Cooper3@citrix.com>,
 Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
 Ross Lagerwall <ross.lagerwall@citrix.com>
References: <03798b67ec3a892a302e6be5d87ea676e6376036.1646897292.git.doebel@amazon.de>
 <81b800e254019ac3031e57307eea0ec422dc792f.1646897292.git.doebel@amazon.de>
From: Julien Grall <julien@xen.org>
In-Reply-To: <81b800e254019ac3031e57307eea0ec422dc792f.1646897292.git.doebel@amazon.de>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Bjoern,

On 10/03/2022 07:35, Bjoern Doebel wrote:
> Xen enabled CET for supporting architectures. The control flow aspect of
> CET expects functions that can be called indirectly (i.e., via function
> pointers) to start with an ENDBR64 instruction. Otherwise a control flow
> exception is raised.
> 
> This expectation breaks livepatching flows because we patch functions by
> overwriting their first 5 bytes with a JMP + <offset>, thus breaking the
> ENDBR64. We fix this by checking the start of a patched function for
> being ENDBR64. In the positive case we move the livepatch JMP to start
> behind the ENDBR64 instruction.
> 
> To avoid having to guess the ENDBR64 offset again on patch reversal
> (which might race with other mechanisms adding/removing ENDBR
> dynamically), use the livepatch metadata to store the computed offset
> along with the saved bytes of the overwritten function.
> 
> Signed-off-by: Bjoern Doebel <doebel@amazon.de>
> Acked-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
> Reviewed-by: Ross Lagerwall <ross.lagerwall@citrix.com>
> ----
> Changes since r1:
> * (v2) use sizeof_field() to avoid unused variable warning
> * (v3) make metadata variable const in arch_livepatch_revert
> * (v4) rebase on top and make use of Andrew Cooper's was_endbr64() patch
> * (v5) use padding byte to store offset rather than reducing opaque area
> * (v6) style fixes

For the record, this patch depends on 
https://lore.kernel.org/xen-devel/20220308140126.8815-1-andrew.cooper3@citrix.com/.

Your patch will be merged once the prereq has been merged.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 10:48:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 10:48:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288949.490160 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScoZ-0000tv-IC; Fri, 11 Mar 2022 10:48:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288949.490160; Fri, 11 Mar 2022 10:48:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScoZ-0000to-Di; Fri, 11 Mar 2022 10:48:07 +0000
Received: by outflank-mailman (input) for mailman id 288949;
 Fri, 11 Mar 2022 10:48:06 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=3DNt=TW=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nScoY-0000ti-O4
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 10:48:06 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id bafdcada-a128-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 11:48:05 +0100 (CET)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur01lp2059.outbound.protection.outlook.com [104.47.2.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-14-faktBsoIM8225rnSx08a9Q-2; Fri, 11 Mar 2022 11:48:02 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR0402MB3489.eurprd04.prod.outlook.com (2603:10a6:208:16::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar
 2022 10:47:59 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.022; Fri, 11 Mar 2022
 10:47:59 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: bafdcada-a128-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646995684;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=DIbxokGLfszPWvvBfF32ODiQ346zEr4gzjmkYm4XMII=;
	b=VsamcDbHG/jJ6IivEXDi5MUDn/miNyE4vstxlWUV0mDDR6vsAgHTv5b7nlpZltFbb7vHX/
	plT2Jn0PQrG21z/0Q+UwtSraBb6pVTE1AOeB/pOAYlGA86oXtC/3QNI1TVxqtfKcfAb7BE
	udAzyPp07uVkBN7/qLfzNXYR4T8YlAg=
X-MC-Unique: faktBsoIM8225rnSx08a9Q-2
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=FR2VKUxNgT3Z9x14b5fQqWvKkDEFnT10+S/OucuL7GO1Un0Pb8UPrtP5iV1O0lQZHhyfjsdQDKXKzFKWNnfSw7xfKigxecQwNvkMfGYc10JM4M67Pr+Bo5hdJO7gP3qNaFtm/hoAmxYDGhMYeDx0ugU8yeMcEvQO6RoPuL6UtNUhNGAI+Uv92iQBVFjohYC0raDz6Vt+uwrjgpuI1kEfDaxyBUS9DILvsmxCmik1vvGf7lBDfs/ilGbTEp6jW5VTKYZ3G/1jkqrKqT/LfbKnueEqDqSlDujPK9ge0r8hmIdgVFfERksmxIq+hxAkb7eZkWQXzC2hFColtMNT1QuJhA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=DIbxokGLfszPWvvBfF32ODiQ346zEr4gzjmkYm4XMII=;
 b=OtRQwmpRDYOdDviFOSX93y67sNGFZxkWrDJgfLeWu/MPilo8Klxlh8Nah0GPTWJJ9hOfXZWWgS9KhdQAylEpypIen1doofglwZPEEEee/E0mFSL8sKB2ILXzfK9qTBAyJJ0M5koVG2wUM31wHZ1udLrBJoyGebxskCQa3NMBSCbR26SDfROAUV9tZkPXcGXxC0nNesvQZRwX1PD+ARdlSSiyFJw4Kmx4WYMa2Caai2Rd56YFdvnF4eJITowd/bFnFMWfPaqkFXSVBXkr/UKXyOMWqbVzN1eQX1pMoiektv4sYTW8tbrkNjsXe2soST/DDCu8NmmsovZh7CJkx/GZ3w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <5276ee7f-22b5-0223-72b6-ca71ae82c3f6@suse.com>
Date: Fri, 11 Mar 2022 11:47:54 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH 2/2] xen/grant-table: remove readonly parameter from
 functions
Content-Language: en-US
To: Juergen Gross <jgross@suse.com>
Cc: Boris Ostrovsky <boris.ostrovsky@oracle.com>,
 Stefano Stabellini <sstabellini@kernel.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Jens Axboe <axboe@kernel.dk>, Peter Huewe <peterhuewe@gmx.de>,
 Jarkko Sakkinen <jarkko@kernel.org>, Jason Gunthorpe <jgg@ziepe.ca>,
 Oleksandr Andrushchenko <oleksandr_andrushchenko@epam.com>,
 David Airlie <airlied@linux.ie>, Daniel Vetter <daniel@ffwll.ch>,
 Dmitry Torokhov <dmitry.torokhov@gmail.com>,
 "David S. Miller" <davem@davemloft.net>, Jakub Kicinski <kuba@kernel.org>,
 Bjorn Helgaas <bhelgaas@google.com>,
 "James E.J. Bottomley" <jejb@linux.ibm.com>,
 "Martin K. Petersen" <martin.petersen@oracle.com>,
 Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
 Eric Van Hensbergen <ericvh@gmail.com>, Latchesar Ionkov <lucho@ionkov.net>,
 Dominique Martinet <asmadeus@codewreck.org>,
 Christian Schoenebeck <linux_oss@crudebyte.com>,
 Jaroslav Kysela <perex@perex.cz>, Takashi Iwai <tiwai@suse.com>,
 alsa-devel@alsa-project.org, xen-devel@lists.xenproject.org,
 linux-kernel@vger.kernel.org, linux-integrity@vger.kernel.org,
 linux-input@vger.kernel.org, netdev@vger.kernel.org,
 linux-block@vger.kernel.org, dri-devel@lists.freedesktop.org,
 linux-pci@vger.kernel.org, linux-scsi@vger.kernel.org,
 linux-usb@vger.kernel.org, v9fs-developer@lists.sourceforge.net
References: <20220311103429.12845-1-jgross@suse.com>
 <20220311103429.12845-3-jgross@suse.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220311103429.12845-3-jgross@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P191CA0039.EURP191.PROD.OUTLOOK.COM
 (2603:10a6:209:7f::16) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ccf1c0e1-d7e0-4cbd-f674-08da034c9b62
X-MS-TrafficTypeDiagnostic: AM0PR0402MB3489:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<AM0PR0402MB348967F264AD215F3C597051B30C9@AM0PR0402MB3489.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66476007)(66556008)(7416002)(8936002)(7406005)(6666004)(6512007)(6506007)(66946007)(558084003)(31696002)(4326008)(8676002)(6862004)(86362001)(5660300002)(53546011)(26005)(31686004)(37006003)(316002)(186003)(83380400001)(2616005)(508600001)(38100700002)(6486002)(54906003)(2906002)(36756003)(6636002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?NFNjM0pWMnY3Y2lPcW85V3RyZmdQcStqbElsTnZLb3ZFNnV3UFBqQVEwN3Bs?=
 =?utf-8?B?eTZ4VEJtQkk0bHVYV1F2SWlSNGRXOTF1SVB3WkZZcEdoMW9OTVZ5aXh3allm?=
 =?utf-8?B?ZTRudEFmdnJuVitUMUFPTTNsZ1NicENKUVJ4QzZ0RFgxSmhHbTIwZm93QTBi?=
 =?utf-8?B?QVhoNTkvdHZ5bjkwLzVKZFV1RkJPcThUUlZQb3FzSTcyTHRDbUpVMzdsRnFF?=
 =?utf-8?B?NDlIUUNTRGlzS3VqWnhSc1pUYURjN0lzTHQ4OHh6dnZXcnVFM1pwbGhwYXd4?=
 =?utf-8?B?K0JGRUF2UGNtS0psT003YXo3OXQ2anpXZ1RzazdBd2Z4cnZqVXJHbThXdnQ2?=
 =?utf-8?B?ZndxZGsxeWxzME9wT1ZWM29VdHhmaXBhODZhelZpZ0IvTDFCbGFSTXdLMUNj?=
 =?utf-8?B?bEVRN2JsRVV1OUliVVNLQlBxTTA4dlNxREtYK013d2NieThLbWtvc2FwMWYz?=
 =?utf-8?B?RlJLYlNpV1E5cWRKamRodWx4cTdyQStLTWpMZlJ0UVNId1BndGxHdnkvTEZN?=
 =?utf-8?B?d09PQkYrS29zU0Z2QkFJRTNXNGI3a1FwR0pReGZDQUZOLzdGMmZWYWlUYzVE?=
 =?utf-8?B?aGkzSVdnWUpiUkVVVjBVYUd4UzhTWFZBM2V4Y3R3OVNVR2c0Z25Nd2UrSFYx?=
 =?utf-8?B?UFlPZURmVUxSZXIrZkpqeDBxSE14QUJMUTlsT3ZRcUs5RHNOT0kwTE0rVWVl?=
 =?utf-8?B?SXh0ck1ic3RlSytaWDVEN1ViZTJPM3JMbmhxUHlvZFNPOFdmd1FuaU11TS9m?=
 =?utf-8?B?SVpMczg4RC9mK0VVY1hreTB2WDNTM3NtVWYzaVJzVDVuN2JUN2pxQ0tVTWNy?=
 =?utf-8?B?eFVUNE8xaWtEKzNrNkNhN0dBMXBpQm1IS3JmT3J6ZElaSjMyZUdGUUl4ejFH?=
 =?utf-8?B?RTI1TThVQ1BldVBZVHBrMGdsNE1aTE51bnA0enJjT1NQekZ0dTZ6eHR4Tkox?=
 =?utf-8?B?UmQxQkpTUytUZVFjNmNsWFlISjE4YnQvVGxSL0hvcTVRbFd3UFBhUUJHNkxO?=
 =?utf-8?B?amh2cllJWmFpQnJsQ3ZESVV4UTVqQUN5dURScDFoRmpNM1VrVjU3U1pFbnNU?=
 =?utf-8?B?U3NkQ2k3WUVNVnpGeXdsRGtIZGJRT1RQd05DZkZpb2RxYzlLNXhTUFYvZHp2?=
 =?utf-8?B?djRucEczYnlpWm42eDM1UmN5dFdFVzYrdlpEKzN2SW1vUGtkNUR6R01zdEho?=
 =?utf-8?B?V3ByeDMrbUdoc0UwTmp3UmxRTjRicWpRc0QvMVN0TzlibitDQjRXWktPNmRU?=
 =?utf-8?B?d1I3R3VFcW13SFQzc25DTCtSUVZOeEpQRUM0dGhwcndoUzR0eEtHamlheXJC?=
 =?utf-8?B?N0tuSkVjWTFRcVZKc2dGN3AxVkpBNWkzQXRZTkR0dWxBNGZMdlZtYldnSmg5?=
 =?utf-8?B?ZnU3TFprVnZuZE1vNFB3MVFJVWYwR2dLM041QnBuUEExUDNuVUszdHE2OUk0?=
 =?utf-8?B?cXFYZGs1Tks5RFJ2RmdDYWJscXhLN2krWDNwc3hpQkxmTnQxcG1WcVk0OWhj?=
 =?utf-8?B?THA1WUMwMFlhRmE4T2U3TzRSQTNYVHJlQUJnb1F3VEtSSFRoMk8yeGVvUUp2?=
 =?utf-8?B?ZDQ0ZldjRWNtQmtQTlBZZ2c3NWJzMTBqanJ4aUlDdUNBbUFqVnZYY0JMbWsz?=
 =?utf-8?B?K2pOY2NCaTU0bTRtOVVKOEFXcVI5NXRvVVFwbW0wWTlXRUVPWW1BTkdFNFk2?=
 =?utf-8?B?TGZwOU5SWTFqR00wV1Z3TE5EUVhNMmdlbm9OU2d6ZloxUUg5RU9rendrUXFQ?=
 =?utf-8?B?VzZzQXhmWnpiK0dMekNvc3ZJaStQUDV1ZytYTUZsQ2hhVUpKRFgvb1Bsc0Ji?=
 =?utf-8?B?dTZDSm4rYXBzMUJDdXZQdFlXM3RPUFNrbkFzeHJjTVVkV05FblRpcUdpVVlI?=
 =?utf-8?B?S2tHRHNLZmlJbG0xUHZ0REU2dVBzWGloNWhzU1BXeHRvM242SEpxYmZUZFU3?=
 =?utf-8?Q?j968dqETLSwE3RJRtkntiRqD+PcCrqNF?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ccf1c0e1-d7e0-4cbd-f674-08da034c9b62
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 10:47:59.3510
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: uZx5z2nctVZyeUeUEhFpfh0eeSk4mMu0ciTMoVUfZfltieVRWuKSmxYEnyiF0c1qSXgLVgCrGjrwux4em2gWyQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR0402MB3489

On 11.03.2022 11:34, Juergen Gross wrote:
> The gnttab_end_foreign_access() family of functions is taking a
> "readonly" parameter, which isn't used. Remove it from the function
> parameters.
> 
> Signed-off-by: Juergen Gross <jgross@suse.com>

Reviewed-by: Jan Beulich <jbeulich@suse.com>



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 10:50:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 10:50:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288955.490170 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScrC-0002Kq-2t; Fri, 11 Mar 2022 10:50:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288955.490170; Fri, 11 Mar 2022 10:50:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScrB-0002Kj-VH; Fri, 11 Mar 2022 10:50:49 +0000
Received: by outflank-mailman (input) for mailman id 288955;
 Fri, 11 Mar 2022 10:50:48 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=3DNt=TW=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nScrA-0002Kd-8p
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 10:50:48 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 1ba2cd03-a129-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 11:50:47 +0100 (CET)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur03lp2056.outbound.protection.outlook.com [104.47.8.56]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-25-32Ee6pqvMNWgssCWxoMaRg-1; Fri, 11 Mar 2022 11:50:46 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by HE1PR04MB3242.eurprd04.prod.outlook.com (2603:10a6:7:1a::28) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.26; Fri, 11 Mar
 2022 10:50:43 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.022; Fri, 11 Mar 2022
 10:50:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1ba2cd03-a129-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1646995847;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=AiRt42fRhEl1AlX/cCUYc0SGy1ZQxOYcHHZJYcVh7lQ=;
	b=Sr+Q4qxm6f2TeWo5XJvlPEnlupNzmYx46pfuI3QlU3wlJLhy0g14o0Mxu0Le3BWpXFA7AM
	qM1KGghfl51ztcscZaP+lomMKOa+ivv7UFrT27xoUvQ7lZaMb6kFCf7mTPT6K4lbwsjh/T
	b2di9uiBbskNm2FZFrQtnG0b2QpMb1k=
X-MC-Unique: 32Ee6pqvMNWgssCWxoMaRg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=oRHAk2D0ajsnTU5Gyy47om7++aHS2n5tayLZk4eWT5LPBrLUbe3a1GUbLOwtjOs78MDzcqiJjz0Mlw/AOgn1BN/MH8jjs6U+Bqvi2vstXQkudU9wP4leCvvhCEzGBxjdP0yYR394SieYq361pjUrupeSmBg7pSL2SgGgeJXH4puOdGh8ODJlcC1SuDBlXrPuIr5KPq0g6co69Mf2m0LvZ9F1zxQWBY/QiRU4L7wgvfrT09Mghh3jQ8fyz6erUIkrofKYtieQdxVxLAWQcXnba7SrsARBEzStVl1OmxK1kTW0U3c9hvgMCMrENBEqnb0fsyQQE7iT67jSfXr9qOe/fA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=AiRt42fRhEl1AlX/cCUYc0SGy1ZQxOYcHHZJYcVh7lQ=;
 b=HTcYsFcGTGvya5ImKU99FDi+KeuXo65KuIKuUGyGyT3OK0Cf+wmJW7+d1dXsnjSOthrbqDhh3P6s9XRy0bZXgQ/Z15cHEZMSbya4iWSkrStpwmO011GvSf/c/ztKSFjwU+0idUUYsXGX9iC7T+xyfyYUaR3UGOlyZp2PIJf4eoi02jWJv/dRIRm2LsClpTsbpg0hpWO5fmETvkxjkG/mpMtECb9J9ju7HGlmUX7Vs/7DtOIEir2bN4+GLtY7piwyrA89Hg9hV1BU9VMihpve4C3rbomZJPdhgp+Euuwu6vYUUg24C3AUvHfnkaOOrEvBs4/wx9QxkHxjPQrcvJKmwg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <d116558e-b13b-9091-8396-337f05db77bb@suse.com>
Date: Fri, 11 Mar 2022 11:50:40 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH] xen/blkfront: speed up purge_persistent_grants()
Content-Language: en-US
To: Juergen Gross <jgross@suse.com>
Cc: Boris Ostrovsky <boris.ostrovsky@oracle.com>,
 Stefano Stabellini <sstabellini@kernel.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Jens Axboe <axboe@kernel.dk>, xen-devel@lists.xenproject.org,
 linux-block@vger.kernel.org, linux-kernel@vger.kernel.org
References: <20220311103527.12931-1-jgross@suse.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220311103527.12931-1-jgross@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P194CA0037.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:209:84::14) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c18a5839-a88b-4067-f567-08da034cfd85
X-MS-TrafficTypeDiagnostic: HE1PR04MB3242:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<HE1PR04MB3242358946F6362FBECC4C48B30C9@HE1PR04MB3242.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(54906003)(53546011)(31696002)(37006003)(36756003)(316002)(31686004)(2906002)(38100700002)(6486002)(6862004)(66556008)(5660300002)(66946007)(66476007)(186003)(2616005)(508600001)(26005)(6512007)(6506007)(8936002)(8676002)(4326008)(86362001)(6636002)(4744005)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?WG1SNWQxTkFzSTljNWszRmNqNmdDR0J4dDZwWWRINDNSNG54YzUyenRDTTF0?=
 =?utf-8?B?d1JTZXlMZ2hVN2pYazdadnV6aGE3QTI5M1JzRnZVT2NlaHhtY0FwVDBvaXdm?=
 =?utf-8?B?Vm1OeHBGbFZDR0ZhQWNLTGhNVG1janltVXY1K3FBb0pmNER1UjFpN0ppem1E?=
 =?utf-8?B?STBmMmpxUUw2em1uNE9YaXh5NFVoSXZnT3lhM29FZGppa3FKcm9wN0ZlbCtQ?=
 =?utf-8?B?VzhXQVRZTEJUbHBmRDg2THQ1WEtqVk5sYkFnSnlJZ25hTUFhUEcvZEluZnNI?=
 =?utf-8?B?b1Nzb3J2VE1JdW1la1Y0dTBTVjQ2RWVzV2hsWTZpZEUwakpmTi8ramtkNm9x?=
 =?utf-8?B?SW9nMFNDblJsT282UWl6eFp1R3AxSEZ2TmJrYlBRb0dzM0UvenVCcUxEZDBT?=
 =?utf-8?B?djJVRnJKRGVYdlNqV0xnM21UYVJiOUZOWWNsOE9FTURHbVFaaXkxN0pzcTU0?=
 =?utf-8?B?TDJOcnRxcHNGRldQM08yRS9MSmwvUXYrV1V2b3BZekNzV2tXOUdHRytyMWtR?=
 =?utf-8?B?M1psVUVLMm1GK0V5WnJlL2JQSnAzL1lnTFlYN0VxeXF2bUFxWVQvT0ZjUGh2?=
 =?utf-8?B?RHlPTjZqUm5HSkMwMzV5SW40WC82NVNxb1Z6YW1TUXd0RnJsMm9vTzR0WnFK?=
 =?utf-8?B?Qytoa1paR2NVZFNhaDdDT3phU3RvV0d5MGRUdllIdFN0OXZuZ2FmWlEwM3pK?=
 =?utf-8?B?cWtGZ21NNHRiaXpJWkUrQ3ltdkg4OTBoQXJ0S1dwT2VyVmY2dUVib1NmdWpk?=
 =?utf-8?B?U0ZOWElBeEpDbUlkVTNHNVBudlRNK3c4c2ZZUXV5dzZUNlhraTUraW54N1Vn?=
 =?utf-8?B?Y1I5UGpLNWhuTytyVERDeVpLTThDcXU4OXUrRXhKVmdocnhCQWNyRGZrZHJ1?=
 =?utf-8?B?QmFzTEY0WUlXcEF1ZUFxa29Nd21WYVBRa0tJekszdVFnYXY2ZW9xT3pnOSt0?=
 =?utf-8?B?MjZVZThzVU9VTlBNQnB2QUlRdzFiODlVTGFrYlFlbXdPSTNqRStmcXJkeGJF?=
 =?utf-8?B?YjVoNTRaTEYxUDNmMG1JRG9ybi9xOGVKd3Y1WnAwMmpmL3AxS1RxUUhPcTRO?=
 =?utf-8?B?NGJlckY0NTVjc005VU5UdmlUM3M0MnZrYVFLRXc1R1lZeW1Hc1dHeFRxMTNu?=
 =?utf-8?B?a3Fxb3lDbldSdThBMEExREpObVY0RG5oTi93aURsb2UxYUMyYTVjVS8vc3JY?=
 =?utf-8?B?VExicTlUT0pLSitEYnNUTkQ0R09zRk5PU1N0c1FHQk91bldYbjdObXY4amNP?=
 =?utf-8?B?Y0EreVYvSTJlbTl3WDFOM01Sb1Y3a2NnYlduK005OXV5bldhQTRIK2RMSnJ2?=
 =?utf-8?B?WVRueFhibmFwYytXU3FDV09IajIydlNnMk1tVTF3Mk9nN1NoUm0zOG5ITTFp?=
 =?utf-8?B?SndoeW1HZ3doMnh1ajJsSzU5ZVRaSUFKQUxpZ0g0aTJJV2QrNU44QmZkQVJ4?=
 =?utf-8?B?Wm9QQ01uK0p5QjViOEhOdVlMdlA4U0xnRGN0K2RrZkNwUjh5TWNTN2VDZFhM?=
 =?utf-8?B?OFNhYkVwWWNiVXZWeC82c2N2d2hpNkhwZ3pxSEZaSjlqZit5MnBIdWZSeGJI?=
 =?utf-8?B?SFkvRjRiaFkvem5LejdSQ0dxWVhPMmtZdzVOaW9QWnRNbHZ4aE5HcG5tMkpG?=
 =?utf-8?B?NkJhT1QzM0NpZ0czN3lwSkViMW5YVmtWUSsxVFRTTVl1dmc4M2JJREpIQTZB?=
 =?utf-8?B?MERYR3VrVCsrTXJOc3VxUEdKUEtndmtlZU1WVHlrSUlWb1FFbU1OTXBaK3RB?=
 =?utf-8?B?RFhISkVDTTNVaHZQck1rL055OFlKN0dDZEw5bG9YeUswZURMcWY0TzBBOVRh?=
 =?utf-8?B?NHM4MkVMc0JsWUNNc3FuYThubDVOY0lqZnM5cjA2QlRiT0FSdzJzd1lJTWNz?=
 =?utf-8?B?dUJaTmw2RFQwOG1md3liYXU0anJyS1RuLzBIc1JmaGtKbGhKVEMxQi9NNXk0?=
 =?utf-8?B?aENrR1M4L2J1dU9vSTFWa05OQktmMUJkQzZnNjNwYlkrQ2RRYTFKWm9WeXRX?=
 =?utf-8?B?Y1RnVkdWdWlRU0gxUWFsaVNPWmg5TVJkblgvSU1tZlJFMVJEczJrS25ndXEy?=
 =?utf-8?B?V2hveGZhcEwwdmFibVZGSnFoQ3N0djZNamRVSjZJRTFTdnpIdjZQekhLNEF5?=
 =?utf-8?B?Y1FMbWRYWk1keUxoajB1S3NHRytoRlFydWZsUWhLdG5ob0c3cWwzZGlEakxm?=
 =?utf-8?Q?2sn7FBqJlyi35HK9SZpufpE=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c18a5839-a88b-4067-f567-08da034cfd85
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 10:50:43.3096
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: NueNW4UvrgtXQQ/0qqCnx0v2KdLWBe0XKfzN2pdgn08fs1+cNfkwBgUSPxPuB6UgutblJqmt0nLaMdzilaEtHg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR04MB3242

On 11.03.2022 11:35, Juergen Gross wrote:
> purge_persistent_grants() is scanning the grants list for persistent
> grants being no longer in use by the backend. When having found such a
> grant, it will be set to "invalid" and pushed to the tail of the list.
> 
> Instead of pushing it directly to the end of the list, add it first to
> a temporary list, avoiding to scan those entries again in the main
> list traversal. After having finished the scan, append the temporary
> list to the grant list.
> 
> Suggested-by: Jan Beulich <jbeulich@suse.com>
> Signed-off-by: Juergen Gross <jgross@suse.com>

Reviewed-by: Jan Beulich <jbeulich@suse.com>



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 10:51:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 10:51:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288957.490182 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScrW-0002lA-BH; Fri, 11 Mar 2022 10:51:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288957.490182; Fri, 11 Mar 2022 10:51:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScrW-0002l3-7a; Fri, 11 Mar 2022 10:51:10 +0000
Received: by outflank-mailman (input) for mailman id 288957;
 Fri, 11 Mar 2022 10:51:08 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nScrU-0002h8-8e; Fri, 11 Mar 2022 10:51:08 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nScrU-0006h7-5X; Fri, 11 Mar 2022 10:51:08 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nScrT-0002jq-PZ; Fri, 11 Mar 2022 10:51:07 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nScrT-0001nV-P5; Fri, 11 Mar 2022 10:51:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=opxSIrN91qifQUM5qWzAU8rgkXcroV302bQotF6Uiao=; b=m/jt1w/6V25+IuxrVKc2XazYG2
	osn05YAzUnrmhe8AVhDTPUrxAz9420mWtnMXwwuLrsXrUTUf1NYtWIymSfCa9npCsneBMQ3GXweZU
	ivCy12kk6eW8nYE9uuB6j17YhcvZk2cUgIdYX4WvuP6YR9iio1svv+rbRnq7hou6AGUA=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168505-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168505: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-unstable:test-amd64-i386-qemuu-rhel6hvm-amd:guest-start/redhat.repeat:fail:heisenbug
    xen-unstable:test-amd64-i386-libvirt:guest-start.2:fail:heisenbug
    xen-unstable:test-armhf-armhf-xl-vhd:leak-check/check:fail:heisenbug
    xen-unstable:test-armhf-armhf-xl-rtds:guest-start:fail:allowable
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=5142dc5c25e317c208e3dc16d16b664b9f05dab5
X-Osstest-Versions-That:
    xen=8d03080d2a339840d3a59e0932a94f804e45110d
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 11 Mar 2022 10:51:07 +0000

flight 168505 xen-unstable real [real]
flight 168514 xen-unstable real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168505/
http://logs.test-lab.xenproject.org/osstest/logs/168514/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-i386-qemuu-rhel6hvm-amd 14 guest-start/redhat.repeat fail pass in 168514-retest
 test-amd64-i386-libvirt      21 guest-start.2       fail pass in 168514-retest
 test-armhf-armhf-xl-vhd      20 leak-check/check    fail pass in 168514-retest

Regressions which are regarded as allowable (not blocking):
 test-armhf-armhf-xl-rtds     14 guest-start              fail REGR. vs. 168491

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168491
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168491
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168491
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168491
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168491
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168491
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168491
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168491
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168491
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168491
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168491
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168491
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass

version targeted for testing:
 xen                  5142dc5c25e317c208e3dc16d16b664b9f05dab5
baseline version:
 xen                  8d03080d2a339840d3a59e0932a94f804e45110d

Last test of basis   168491  2022-03-09 01:08:18 Z    2 days
Testing same since   168505  2022-03-10 10:50:04 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Alex Olson <Alex.Olson@starlab.io>
  Bjoern Doebel <doebel@amazon.de>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  Roger Pau Monné <roger.pau@citrix.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           fail    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      fail    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      fail    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   8d03080d2a..5142dc5c25  5142dc5c25e317c208e3dc16d16b664b9f05dab5 -> master


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 10:52:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 10:52:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288969.490193 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScsT-0003XY-Pb; Fri, 11 Mar 2022 10:52:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288969.490193; Fri, 11 Mar 2022 10:52:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nScsT-0003XR-Mb; Fri, 11 Mar 2022 10:52:09 +0000
Received: by outflank-mailman (input) for mailman id 288969;
 Fri, 11 Mar 2022 10:52:08 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3NWv=TW=invisiblethingslab.com=marmarek@srs-se1.protection.inumbo.net>)
 id 1nScsS-00036B-L9
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 10:52:08 +0000
Received: from out2-smtp.messagingengine.com (out2-smtp.messagingengine.com
 [66.111.4.26]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4af11c12-a129-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 11:52:07 +0100 (CET)
Received: from compute2.internal (compute2.nyi.internal [10.202.2.46])
 by mailout.nyi.internal (Postfix) with ESMTP id 239735C016D;
 Fri, 11 Mar 2022 05:52:06 -0500 (EST)
Received: from mailfrontend2 ([10.202.2.163])
 by compute2.internal (MEProxy); Fri, 11 Mar 2022 05:52:06 -0500
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Fri,
 11 Mar 2022 05:52:04 -0500 (EST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4af11c12-a129-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:cc:content-type:date:date:from:from
	:in-reply-to:in-reply-to:message-id:mime-version:references
	:reply-to:sender:subject:subject:to:to:x-me-proxy:x-me-proxy
	:x-me-sender:x-me-sender:x-sasl-enc; s=fm2; bh=CAoG9oHN8iIZCxSg/
	7uN6wFgpkb/G/E+2v0gqZ+qy0c=; b=E+rTaGPJqBxdvkwx0Pdb9unWEQvABI5Nh
	wFfsMl5H/VW+E3xZcaP8VrAL/S4hUjc51iZqOdfpPyNoHfic218r5XkV3T5iuCU6
	599tUM5GW1ZMvCDtewMe4ZvuAWcPg7KxZiYfebc08B2BEkPFZGqGJccExjNjKOUk
	BsVeDF/TxHNvXKyBi74PbhUwjnAWxOmCizrHI4qzw51tASzScX1MI624+4sGLoVN
	kHf//3v18SvW0ySyRXLV3JkOPscTSeLP8opjp26L8A1ey5Vm6FEGXbMHcB3P3QsP
	u28iPjtcLlTH0S6ArZf7GBlRer0xl3k/UtqW92UHffOXXjRMR+XMw==
X-ME-Sender: <xms:1SkrYhZH-5Y7F9Yz-UcaW75WCK0WeEYZEDwk_UFl1tPW-uEAGc9Dsw>
    <xme:1SkrYoYkGe_2o3aScjbbKZXPXA8u-1PtSdnW46DlSttEDtwvIThoRO419_N61zQnU
    kTxMtBb-SwPUA>
X-ME-Received: <xmr:1SkrYj9JbTuFQuup5zEt_-iQ_oo6XC407WewzX41UvmEK0-g20zk6NIofcdMjbu1UjzHb-PMZIa3ypZUWzXBFf2W-rUAsk0PWw>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddruddvvddgudelucetufdoteggodetrfdotf
    fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen
    uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne
    cujfgurhepfffhvffukfhfgggtuggjsehgtderredttdejnecuhfhrohhmpeforghrvghk
    ucforghrtgiihihkohifshhkihdqifpkrhgvtghkihcuoehmrghrmhgrrhgvkhesihhnvh
    hishhisghlvghthhhinhhgshhlrggsrdgtohhmqeenucggtffrrghtthgvrhhnpeetveff
    iefghfekhffggeeffffhgeevieektedthfehveeiheeiiedtudegfeetffenucevlhhush
    htvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpehmrghrmhgrrhgvkhes
    ihhnvhhishhisghlvghthhhinhhgshhlrggsrdgtohhm
X-ME-Proxy: <xmx:1SkrYvo1Tur6w7nfVbeMDn1fs2S_KvZ-tmpxEE4Mg1AKomS4zknefA>
    <xmx:1SkrYspbh9I-wqw4JhsnRSQGTWuElwHQ34fiX9W_8CqwoZ3Wxhijbg>
    <xmx:1SkrYlQtOItCqbN1HwALx8aaoqCWCimbcOkKklyLyP7P3g1BuNEeOA>
    <xmx:1ikrYhDmGt3Cx7AEDeWawjslZERPaNbTWjxqtbbeJ18JZvg6mYrn8A>
Date: Fri, 11 Mar 2022 11:52:01 +0100
From: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: Julien Grall <julien@xen.org>
Cc: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
	xen-devel@lists.xenproject.org
Subject: Re: [PATCH 1/2] ns16550: reject IRQ above nr_irqs
Message-ID: <Yisp0Q/cNGbgsO/7@mail-itl>
References: <20220310143403.50944-1-marmarek@invisiblethingslab.com>
 <7acb2915-5a9d-c1f1-4b7b-2bc6c2055ea3@suse.com>
 <YioddbNor6w/U9ed@Air-de-Roger>
 <53361d65-2bd8-c07b-938c-91b95f2d68ad@suse.com>
 <Yiojgxgd4amSjHog@Air-de-Roger>
 <3055b4a5-2d55-9cf1-1069-8c57208bf0af@xen.org>
 <YiopXU65pAlnNVNI@mail-itl>
 <d2c63630-6ab3-b4dd-128e-72f871fb9e08@xen.org>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="r+5BN2em9Kwd9k2b"
Content-Disposition: inline
In-Reply-To: <d2c63630-6ab3-b4dd-128e-72f871fb9e08@xen.org>


--r+5BN2em9Kwd9k2b
Content-Type: text/plain; protected-headers=v1; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Date: Fri, 11 Mar 2022 11:52:01 +0100
From: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: Julien Grall <julien@xen.org>
Cc: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
	xen-devel@lists.xenproject.org
Subject: Re: [PATCH 1/2] ns16550: reject IRQ above nr_irqs

On Fri, Mar 11, 2022 at 10:23:03AM +0000, Julien Grall wrote:
> Hi Marek,
>=20
> On 10/03/2022 16:37, Marek Marczykowski-G=C3=B3recki wrote:
> > On Thu, Mar 10, 2022 at 04:21:50PM +0000, Julien Grall wrote:
> > > Hi,
> > >=20
> > > On 10/03/2022 16:12, Roger Pau Monn=C3=A9 wrote:
> > > > On Thu, Mar 10, 2022 at 05:08:07PM +0100, Jan Beulich wrote:
> > > > > On 10.03.2022 16:47, Roger Pau Monn=C3=A9 wrote:
> > > > > > On Thu, Mar 10, 2022 at 04:23:00PM +0100, Jan Beulich wrote:
> > > > > > > On 10.03.2022 15:34, Marek Marczykowski-G=C3=B3recki wrote:
> > > > > > > > --- a/xen/drivers/char/ns16550.c
> > > > > > > > +++ b/xen/drivers/char/ns16550.c
> > > > > > > > @@ -1221,6 +1221,9 @@ pci_uart_config(struct ns16550 *uart,=
 bool_t skip_amt, unsigned int idx)
> > > > > > > >                                pci_conf_read8(PCI_SBDF(0, b=
, d, f),
> > > > > > > >                                               PCI_INTERRUPT=
_LINE) : 0;
> > > > > > > > +                if (uart->irq >=3D nr_irqs)
> > > > > > > > +                    uart->irq =3D 0;
> > > > > > >=20
> > > > > > > Don't you mean nr_irqs_gsi here? Also (nit) please add the mi=
ssing blanks
> > > > > > > immediately inside the parentheses.
> > > > > >=20
> > > > > > If we use nr_irqs_gsi we will need to make the check x86 only A=
FAICT.
> > > > >=20
> > > > > Down the road (when Arm wants to select HAS_PCI) - yes. Not neces=
sarily
> > > > > right away. After all Arm wants to have an equivalent check here =
then,
> > > > > not merely checking against nr_irqs instead. So putting a conditi=
onal
> > > > > here right away would hide the need for putting in place an Arm-s=
pecific
> > > > > alternative.
> > > >=20
> > > > Oh, I always forget Arm doesn't have CONFIG_HAS_PCI enabled just ye=
t.
> > > The PCI code in ns16550.c is gated by CONFIG_HAS_PCI and CONFIG_X86. =
I am
> > > not sure we will ever see a support for PCI UART card in Xen on Arm.
> > >=20
> > > However, if it evers happens then neither nr_irqs or nr_irqs_gsi woul=
d help
> > > here because from the interrupt controller PoV 0xff may be a valid (G=
ICv2
> > > supports up to 1024 interrupts).
> > >=20
> > > Is there any reason we can't explicitely check 0xff?
> >=20
> > That's what my v0.1 did, but Roger suggested nr_irqs. And I agree,
> > because the value is later used (on x86) to access irq_desc array (via
> > irq_to_desc), which has nr_irqs size.
>=20
> I think it would be better if that check is closer to who access the
> irq_desc. This would be helpful for other users (I am sure this is not the
> only potential place where the IRQ may be wrong). So how about moving it =
in
> setup_irq()?

I don't like it, it's rather fragile approach (at least in the current
code base, without some refactor). There are a bunch of places using
uart->irq (even if just checking if its -1 or 0) before setup_irq()
call. This includes smp_intr_init(), which is what was the first thing
crashing with 0xff set there.

--=20
Best Regards,
Marek Marczykowski-G=C3=B3recki
Invisible Things Lab

--r+5BN2em9Kwd9k2b
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAmIrKdIACgkQ24/THMrX
1ywonAf/ZcA+As+roYBZ9aCaQH4qRmNjkfOvTS0ic2QgFkrr+6UXUNLsvgbTNn5t
lYTb4YuFpbiRGecjnqP0EniqOCoGTU15R0/dRMozAAtjCAvcOgFFZ3HBCGsX6pHC
x5xtbF65jj+k1GJAuKoIAmUW5z3E3Z+J8R6cfZcc1XRVZ78V71aviN1M18jflugj
6avE+Cv2/vGx+wU8T+JPZ9k+E2aKXBpXr3zMjXfWg09ousJUqKqPX1OSLupOEc/0
ohB94/sXgjIqyvdMY+BaZFAxdYfF2erP7aP2wPhSw7mVUjJTtvmjfSe4ylVo5WoJ
U1Y9B1OpJcv7H3QgJP5wO7JBUOlPPg==
=RJqz
-----END PGP SIGNATURE-----

--r+5BN2em9Kwd9k2b--


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 11:01:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 11:01:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288976.490212 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSd1t-0005Cj-PN; Fri, 11 Mar 2022 11:01:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288976.490212; Fri, 11 Mar 2022 11:01:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSd1t-0005Cc-ME; Fri, 11 Mar 2022 11:01:53 +0000
Received: by outflank-mailman (input) for mailman id 288976;
 Fri, 11 Mar 2022 11:01:52 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=RXIo=TW=citrix.com=prvs=0626a3ed1=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nSd1s-0005CW-Af
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 11:01:52 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a5bdfc17-a12a-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 12:01:50 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a5bdfc17-a12a-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1646996510;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=NZfuSuOf3HsgXGGjM3uvYPU0K7q//s5hos77iiW/mIg=;
  b=beN53d/qLckVSolXXKyVIYQX+XGhRgdUEtoqGFH8MZxEQjwqb7BM7V4P
   LFmmWam5wgBTxgOdlCAJPY0bwDvGGQCESM+xVJov9pKcuL+RyZsxIh8Gn
   aQDyUDDGQGVI15Gw/JHN0oP94k1mMgGmWZwX8QfAH9JJa3ex9msyQ3iau
   o=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66009274
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:PvFD16v87McJy26zE3mMDyL8zOfnVMteMUV32f8akzHdYApBsoF/q
 tZmKT+OO/bYYTT2fNpzaIS1oEoDsMTUm4VgHFM/qyxgH38b+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jU4
 IuryyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi8wIoPSnN88CiVkMDNdYO5l+4f+Kz+W5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AO
 ZJBOGAwMHwsZTUWYVocL8sCod2hlz6iVhtnunWuj7Metj27IAtZj+G2bYu9lsaxbd5Ogk+Sq
 2bC/mL4KhIXLtqSzXyC6H3EruXIhyLgHoUJCKe/6OVpkXWU3GUYDBBQXly+ydG7gEOjX9NUK
 2QP5zEj66M18SSDR8n3WBCQo3OeuBMYHdZTe8Uq5QfIxqfK7gKxAmkfUiUHeNEgrNUxRzEhy
 hmOhdyBLT5gqrqOUlqG66yZ6zi1PEA9KW4EeD9BTgYf5dTniJ88gwiJTdt5FqOxyNrvFlnYx
 zGMsTh7jbEUhs0jyaq25xbEjiiqq5yPSRQ6jjg7RUr8sFk/PtT8IdX1tx6Ltp6sMbp1UHGYo
 FYan/O/tdwyLoOuyW+uQ900FvaAsqPt3CLnvXZjGJwo9jKI8nGlfJxN7DwWGHqFIvroaheyP
 haN5Fo5CIt7eSLzMPQpO97Z59ECkPC4fekJQMw4eTanjnJZUAactB9jakeLt4wGuBh9yPpvU
 Xt3nCvFMJr7NUiF5GbnLwv++eVyrszb+Y81bcmqp/hA+eDCDEN5sZ9fbDOzghkRtctoWjn9/
 ddFLNetwB5CSuD4aSS/2ddNcQ5bdidkVciu8pI/mgu/zuxOQTBJ5xj5m+5JRmCYt/4NyregE
 o+VBie0N2YTdVWYcF7XOxiPmZvkXIplrGJTAMDfFQ3A5pTXWq72tP13X8JuJdEPrbU/pdYpH
 6htU5jRWZxnF2WYkwnxmLGg9eSOgjzw3lnQV8dkCRBiF6Ndq/vhoYa1IFGwqHFQUkJad6IW+
 tWd6+8SerJaLyxKB8fKcvO/iVS3uHkWguVpWEXUZNJUfS3RHEJCcUQdUtdfzxkwFCj+
IronPort-HdrOrdr: A9a23:3gXLcqOAfiKg+sBcTjujsMiBIKoaSvp037BK7S1MoNJuEvBw9v
 re+MjzsCWftN9/Yh4dcLy7VpVoIkmskKKdg7NhXotKNTOO0AeVxelZhrcKqAeQeREWmNQ96U
 9hGZIOdeEZDzJB/LrHCN/TKade/DGFmprY+9s31x1WPGZXgzkL1XYDNu6ceHcGIjVuNN4CO7
 e3wNFInDakcWR/VLXAOpFUN9Kz3uEijfjdEGY7OyI=
X-IronPort-AV: E=Sophos;i="5.90,173,1643691600"; 
   d="scan'208";a="66009274"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=LEiWyupErfhEk0a5x0tQH4FhUD58IQIcepJ9CkxWd/sxWOyhtiRXJgAjRVnmjSM9B7a/MUUj5dbplIhg29Yodxg9tOhMmCQZv5FtZ7VK3zwDQ1AyX2Afo5y8xXcalSVo7jnpGOUTQLV7OvCtjw5+ynIIxhkHfXcOrWn9VZbmoupDhxxRySyj2dXvo+LDmehUtjZOTLSxGweInJIw4tNvkoqMIlbh/R6F88DBbNcBTy0KldCVHLAehgmUsSeSRpbXpSgcRijc2Q0JhRGbxQYI+xsk0vMef7QqGiMInH6T7oOm+VS/WjAQfLbFQ9xGGEXW9D18VlPW/5HvJqSUyLccKw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=7r+XHGjRDZfJFK8qVKqeLX5YluqIfaqF+fN63ptoViM=;
 b=kqowpKl9+jiu/D7ulcILiWQ4P1t22oT/Dm5hNdZEdxLIdp7/Znu9P72+wpKjjt0sniN0Oeu95M/NUZFO+SQkKbygZ29Vay7FyzZ2US63PRUXT2xngk3JlNXMi92capKB2OdKz4OSvx67E8CABo5k5MvSMLszxWn0duNOiu1ViiFu2tnQ7qFWGmqiRYUNYTb212ZvjimPArR6nqHIhw7vqnw+pzeMS6wBgLwVF+5mikToj0NTiqb7kMGI1xppy6c06ENz9A3Fa4bT2tGgEmeXOC2x5viy1EYsquWaGGnKm10WbEE3sa7vBorYZRyr4T0GNaTqcbftzJfofoxOA/P9zQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=7r+XHGjRDZfJFK8qVKqeLX5YluqIfaqF+fN63ptoViM=;
 b=xle8AYtbEulfowagL+mL9Sy01DQuwR7Ga8pjYm7T+5fRtaScMFj4vxnPE+7b2yXsOB30j+wS1Oje+YE1ck3z5FxnvFNMhkEOnRBmKllKo22lXHm2MFU6BXpzN7SQruLKAjmxmbkoXCN9AE5J5hvRu3tI540CCHB8D5fY/G0Cp8Q=
Date: Fri, 11 Mar 2022 12:01:40 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Juergen Gross <jgross@suse.com>
CC: <xen-devel@lists.xenproject.org>, <linux-block@vger.kernel.org>,
	<linux-kernel@vger.kernel.org>, Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>, Jens Axboe <axboe@kernel.dk>,
	Jan Beulich <jbeulich@suse.com>
Subject: Re: [PATCH] xen/blkfront: speed up purge_persistent_grants()
Message-ID: <YissFI7k6AYkM45X@Air-de-Roger>
References: <20220311103527.12931-1-jgross@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <20220311103527.12931-1-jgross@suse.com>
X-ClientProxiedBy: MR1P264CA0047.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:501:3e::19) To SA0PR03MB5610.namprd03.prod.outlook.com
 (2603:10b6:806:b2::9)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: e525ee9e-8b8b-4b93-b503-08da034e8790
X-MS-TrafficTypeDiagnostic: DM5PR03MB3275:EE_
X-Microsoft-Antispam-PRVS: <DM5PR03MB32759E503A9B056FC41C99318F0C9@DM5PR03MB3275.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SA0PR03MB5610.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(316002)(186003)(26005)(66556008)(66946007)(6512007)(9686003)(66476007)(4326008)(2906002)(82960400001)(8676002)(6486002)(38100700002)(6506007)(508600001)(8936002)(86362001)(5660300002)(4744005)(6666004)(54906003)(6916009)(33716001)(85182001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?Y3diL0hLQm1hQzJ5QUNxZkNOU0gvQlM0dkJncnFCSzVTNUE1YVQya2pTN2N1?=
 =?utf-8?B?Vkp0aDE0L2xIbGZRT2tkaEVac2VWSHlLN0kzVCtqdFFtTlpjZ21Ta1V2VkRw?=
 =?utf-8?B?RU8yWjB1UXdDZkg4Vm9nZUJVMncvcEl6Qi84bjZyZjducS9CS1VIMGVXcUE5?=
 =?utf-8?B?WWU4NElyendlUWQzUnQ0OXI1dWowVWFnU3lEeVZjdFdqcEluZEF2WHJxVjBq?=
 =?utf-8?B?cWtYNlJQVVVuZi96OTliWjcxSUdnMnNPRkplSGtpa3F1WTVSR0IvdUloQW0v?=
 =?utf-8?B?a3VnZCtucitkeFZrUFF3Ty9lQjhsVGZrUUYvTnB4enZFZVRBZGRDTEV6dkIr?=
 =?utf-8?B?VjZGeURoMzV2QVQyT0NXQWNTUmRSZkc0VXVOK29mbTllaTRRaXpvUG9TbldY?=
 =?utf-8?B?N3o2T3pZQ0VzOVJKZG1jdHUxT2RyVi9rdWtqQW15STRYWGdMWXVjZ0JRTUFm?=
 =?utf-8?B?V1R4dXZJOExnSG9va0gvN3dxNmVpQ2FWVTBiVHQ2T2NSakFqa1BFZEQ5dE8v?=
 =?utf-8?B?bXI1eWRKSnlDQzM4RHY5RHZOL1FGMi96Rk9DeVhDZlhIMFFSSjNGdFVER1Ba?=
 =?utf-8?B?YXZ0T1ZZeFBINGIwa24vcnhXUjRRQ0R0eElYd3U5eVdvZSt5MStRY3lNYmVt?=
 =?utf-8?B?L3lxRW9vTno1dXdlaGROWW82ZEhCYTRPQzBwTXRXR0ZMaWl5Snc4S2drQU9T?=
 =?utf-8?B?em13K2NXMWVlRWNzdVZPOEhDeEExRExISzVUM09NMWZIRXFrNjVGM1VKclg1?=
 =?utf-8?B?MnBDMWNHVHFMTmlaMmswblNoUE1MT3JrNjluYjRlWWFSMVRoOXZjTU1kZXRs?=
 =?utf-8?B?WUxKeHFGUCtlQlVDT1ZNMHFHaXB0OUFLZHJOdVRZb2NVcWdHNzVLRUtGdDMr?=
 =?utf-8?B?Rmtqa1h0bi8yb2F3S2lwWklrU1B6VEZTcGZHa1J5Q01rZk9oOTE3bUU5Tkxw?=
 =?utf-8?B?OEQ1bTNXcExKNThzWG9WMXdQYWJoc0xwM2ZOa3ZzcVdYa2ljVHVZTG4vbmJ6?=
 =?utf-8?B?Yi9OVFNtY3gwOVcyd2JZNERDWHJ3VkhwMyswSjl0WUtBQVA0NVF0N1F4Sjlq?=
 =?utf-8?B?U2pPQXNKZW9MY2dsRXRpMmpMY3c5ZXlXcEJGQUhnai9WWUtoTmxPRGFuTm5E?=
 =?utf-8?B?L1VHUFhWQXRQZGpHa0F1elN3NWN0SVM5RGNZb2REdWZiVkRycktvVVRFZDFJ?=
 =?utf-8?B?Q0dqc29jRy9EaU5IbDVKSTdFOTNZMEhWaHlvRytNSU9IYm5KdzFBc0d2Uzlh?=
 =?utf-8?B?UERsbUdGcFNaZml4bDhIU2VIbTdOUUl0Y2kwZ1ZrZTJQV2o3THJyK29INlVV?=
 =?utf-8?B?RmFTaVFyc3dXaHprRDczcDlCN1poWDBKb3E1aDA0SExtTVVwc1ZYMEdjRWQ4?=
 =?utf-8?B?cU01TkcyOENYVitvVFQzVGt0czkzeUY5Z1pzSVdlZmZjUUhrUjk1cWF0S2FP?=
 =?utf-8?B?MnFpNFNZZmdpdXgwVnVkVHFkY0NxZDhkaUN4ODVoSWUzc0ZCaHFtMit3WTZZ?=
 =?utf-8?B?OUFRVUFwbG1iNzV2bkppZ3BQMUVWYlNPWVpOVEE5SlduUXQvL2NRelRZbUdX?=
 =?utf-8?B?U1J6OFUvK2tXcmQreDczWjlWZ1lFNmNKN3hScVkyaDMrYndHeGNFS0p2aVZ5?=
 =?utf-8?B?cU5LQzY4Mnl0TVliaDc0OFNMVE8ySWJreXhUellXL3Y0dis2ajVTZGg2blNV?=
 =?utf-8?B?eHBxbjk3d2swMGlJcldmci82L0tmUDB6c3l1ZnF3ZjFEeXVwNTdLazFDSm81?=
 =?utf-8?B?QzNSUmJJL0NJUFZQeVBLeWlqMDZpbllZV1BpZHJlcVZhd0grcW9JUXpzcWh5?=
 =?utf-8?B?VkMrZ0lFdWowaHI1L2hQRjFGTm1rYWdwSTIwRGEvRmhQekhNYldIWGpoQkdL?=
 =?utf-8?B?TXRJOE5CRkJWUGR3TlNjbVY5eG9xM2YycFoxVCtVRHcwdFZicXlXbW9Oekd5?=
 =?utf-8?B?bXZudVpDSG5ybkFWOEplVi8vVVFOcHJDdGp1SnZjSmRqcjMwR3R6WW92T3V3?=
 =?utf-8?B?Zm0waDFhNEhnPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: e525ee9e-8b8b-4b93-b503-08da034e8790
X-MS-Exchange-CrossTenant-AuthSource: SA0PR03MB5610.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 11:01:44.6835
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 4dGSxbXSyHy+HsKoFZu3IUYkMWn2J9cTJj1hZlUWN06E8m+gee8OVndEDir23tkyPpd25dr4wed6TFLA5MJQnw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR03MB3275
X-OriginatorOrg: citrix.com

On Fri, Mar 11, 2022 at 11:35:27AM +0100, Juergen Gross wrote:
> purge_persistent_grants() is scanning the grants list for persistent
> grants being no longer in use by the backend. When having found such a
> grant, it will be set to "invalid" and pushed to the tail of the list.
> 
> Instead of pushing it directly to the end of the list, add it first to
> a temporary list, avoiding to scan those entries again in the main
> list traversal. After having finished the scan, append the temporary
> list to the grant list.
> 
> Suggested-by: Jan Beulich <jbeulich@suse.com>
> Signed-off-by: Juergen Gross <jgross@suse.com>

Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>

Thanks.


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 11:15:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 11:15:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288981.490223 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSdEu-0006kq-Vk; Fri, 11 Mar 2022 11:15:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288981.490223; Fri, 11 Mar 2022 11:15:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSdEu-0006kj-Rx; Fri, 11 Mar 2022 11:15:20 +0000
Received: by outflank-mailman (input) for mailman id 288981;
 Fri, 11 Mar 2022 11:15:19 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nSdEt-0006kd-Sx
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 11:15:19 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSdEq-000798-7M; Fri, 11 Mar 2022 11:15:16 +0000
Received: from 54-240-197-233.amazon.com ([54.240.197.233] helo=[10.95.172.72])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSdEq-0002f2-0V; Fri, 11 Mar 2022 11:15:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=7mXwwIlhef40MPAwsqSX1Iv8RqJ2SPS2PZk9l8m8IYc=; b=PdISopE87p/XvjPV5UP1QlD2Rl
	M4OE5HupFbg7gW0dDvgrPtFMH6MfWSvfQy4f25wbcsdTozloSXiM/CXmEgBsfoSky9oEkEmoPZGmG
	PDHSu2NSMntZFc4GrrO/SXkzwNT4ncQ7WhmOddZjJTaCyS+f5gT4rPmH70AL+9cP42OM=;
Message-ID: <2a5c59ad-2fa5-b668-8bce-0d55e89a4afd@xen.org>
Date: Fri, 11 Mar 2022 11:15:13 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Subject: Re: [PATCH 1/2] ns16550: reject IRQ above nr_irqs
To: =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?=
 <marmarek@invisiblethingslab.com>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Jan Beulich <jbeulich@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220310143403.50944-1-marmarek@invisiblethingslab.com>
 <7acb2915-5a9d-c1f1-4b7b-2bc6c2055ea3@suse.com>
 <YioddbNor6w/U9ed@Air-de-Roger>
 <53361d65-2bd8-c07b-938c-91b95f2d68ad@suse.com>
 <Yiojgxgd4amSjHog@Air-de-Roger>
 <3055b4a5-2d55-9cf1-1069-8c57208bf0af@xen.org> <YiopXU65pAlnNVNI@mail-itl>
 <d2c63630-6ab3-b4dd-128e-72f871fb9e08@xen.org> <Yisp0Q/cNGbgsO/7@mail-itl>
From: Julien Grall <julien@xen.org>
In-Reply-To: <Yisp0Q/cNGbgsO/7@mail-itl>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi,

On 11/03/2022 10:52, Marek Marczykowski-Górecki wrote:
> On Fri, Mar 11, 2022 at 10:23:03AM +0000, Julien Grall wrote:
>> Hi Marek,
>>
>> On 10/03/2022 16:37, Marek Marczykowski-Górecki wrote:
>>> On Thu, Mar 10, 2022 at 04:21:50PM +0000, Julien Grall wrote:
>>>> Hi,
>>>>
>>>> On 10/03/2022 16:12, Roger Pau Monné wrote:
>>>>> On Thu, Mar 10, 2022 at 05:08:07PM +0100, Jan Beulich wrote:
>>>>>> On 10.03.2022 16:47, Roger Pau Monné wrote:
>>>>>>> On Thu, Mar 10, 2022 at 04:23:00PM +0100, Jan Beulich wrote:
>>>>>>>> On 10.03.2022 15:34, Marek Marczykowski-Górecki wrote:
>>>>>>>>> --- a/xen/drivers/char/ns16550.c
>>>>>>>>> +++ b/xen/drivers/char/ns16550.c
>>>>>>>>> @@ -1221,6 +1221,9 @@ pci_uart_config(struct ns16550 *uart, bool_t skip_amt, unsigned int idx)
>>>>>>>>>                                 pci_conf_read8(PCI_SBDF(0, b, d, f),
>>>>>>>>>                                                PCI_INTERRUPT_LINE) : 0;
>>>>>>>>> +                if (uart->irq >= nr_irqs)
>>>>>>>>> +                    uart->irq = 0;
>>>>>>>>
>>>>>>>> Don't you mean nr_irqs_gsi here? Also (nit) please add the missing blanks
>>>>>>>> immediately inside the parentheses.
>>>>>>>
>>>>>>> If we use nr_irqs_gsi we will need to make the check x86 only AFAICT.
>>>>>>
>>>>>> Down the road (when Arm wants to select HAS_PCI) - yes. Not necessarily
>>>>>> right away. After all Arm wants to have an equivalent check here then,
>>>>>> not merely checking against nr_irqs instead. So putting a conditional
>>>>>> here right away would hide the need for putting in place an Arm-specific
>>>>>> alternative.
>>>>>
>>>>> Oh, I always forget Arm doesn't have CONFIG_HAS_PCI enabled just yet.
>>>> The PCI code in ns16550.c is gated by CONFIG_HAS_PCI and CONFIG_X86. I am
>>>> not sure we will ever see a support for PCI UART card in Xen on Arm.
>>>>
>>>> However, if it evers happens then neither nr_irqs or nr_irqs_gsi would help
>>>> here because from the interrupt controller PoV 0xff may be a valid (GICv2
>>>> supports up to 1024 interrupts).
>>>>
>>>> Is there any reason we can't explicitely check 0xff?
>>>
>>> That's what my v0.1 did, but Roger suggested nr_irqs. And I agree,
>>> because the value is later used (on x86) to access irq_desc array (via
>>> irq_to_desc), which has nr_irqs size.
>>
>> I think it would be better if that check is closer to who access the
>> irq_desc. This would be helpful for other users (I am sure this is not the
>> only potential place where the IRQ may be wrong). So how about moving it in
>> setup_irq()?
> 
> I don't like it, it's rather fragile approach (at least in the current
> code base, without some refactor). There are a bunch of places using
> uart->irq (even if just checking if its -1 or 0) before setup_irq()
> call. This includes smp_intr_init(), which is what was the first thing
> crashing with 0xff set there.

Even if the code is gated with !CONFIG_X86, it sounds wrong to me to 
have such check in an UART driver. It only prevents us to do an 
out-of-bound access. There are no guarantee the interrupt will be usable 
(on Arm 256 is a valid interrupt).

As I wrote, I don't expect the code to be used any time soon on Arm. So 
I am not going to argue too much on the approach. However, we should at 
least clarify in the commit message/title that this is x86 and pci only.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 11:30:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 11:30:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288985.490234 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSdTP-0000eg-8E; Fri, 11 Mar 2022 11:30:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288985.490234; Fri, 11 Mar 2022 11:30:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSdTP-0000eZ-4K; Fri, 11 Mar 2022 11:30:19 +0000
Received: by outflank-mailman (input) for mailman id 288985;
 Fri, 11 Mar 2022 11:30:17 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=PRj6=TW=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nSdTM-0000eT-SX
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 11:30:17 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04on0631.outbound.protection.outlook.com
 [2a01:111:f400:fe0e::631])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 9ea56b2f-a12e-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 12:30:14 +0100 (CET)
Received: from AM6PR0502CA0069.eurprd05.prod.outlook.com
 (2603:10a6:20b:56::46) by AM0PR08MB4161.eurprd08.prod.outlook.com
 (2603:10a6:208:134::29) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar
 2022 11:30:03 +0000
Received: from AM5EUR03FT022.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:56:cafe::e3) by AM6PR0502CA0069.outlook.office365.com
 (2603:10a6:20b:56::46) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22 via Frontend
 Transport; Fri, 11 Mar 2022 11:30:03 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT022.mail.protection.outlook.com (10.152.16.79) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 11:30:03 +0000
Received: ("Tessian outbound 741ca6c82739:v113");
 Fri, 11 Mar 2022 11:30:03 +0000
Received: from 72898bd4ddc3.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 92762F4D-5145-4422-8CCD-7840035AFB50.1; 
 Fri, 11 Mar 2022 11:29:52 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 72898bd4ddc3.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 11 Mar 2022 11:29:52 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by AM4PR0802MB2227.eurprd08.prod.outlook.com (2603:10a6:200:5e::13)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar
 2022 11:29:50 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5061.022; Fri, 11 Mar 2022
 11:29:50 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9ea56b2f-a12e-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=vsCeOcSuwjMD2fsHQeMAY1oXQKKExhxDi1howaZ3RIM=;
 b=ZHl6011ZModw2zmLG8IUN5hq132v4QcX1rNDqFGHmdFa/INbIsSQQOyAfMIruFLj/Tmb0rh9zaxm2JLMSL2QFxahjqz9Vxoj7R5jbAvr9+TNrJoxhGjFrS1fLjS+vn/FaQKTBj98fsjVMwu3+d9WwHO/RTOBAbRRXwvK6qY3Orw=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 366115b56a1efca7
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=hPW2VEBUKFryUTt9UVuowxNHO8kc2xUdj6YTO/Fne6y7RDjf6kdJyUZT6FAKUn0e54xSKT+XVuWapoRf/iOHQ04OZlTZbpgba/i+1ee8aSQsRy05/BlTmgGXBGQcZQ6upazR91NEOuH4X3JYhTwIqSWZVQIuhuiFNvj6i+S27dZpszY1I2vrhHxbjZncjr5wxijfZxGTbar1TY92VEMr57mMTqZsdClCyPoc7xbI0AOQmK7UJCvMru55TzXSQ74i1UXFSIXS7uf2aLIBPO5vfRLUTs+CWLVBk7JS1LWl84uSG8QixSarlx2QfkVDMJJQhThIe9SJ0hLHpmNePD1dYA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=vsCeOcSuwjMD2fsHQeMAY1oXQKKExhxDi1howaZ3RIM=;
 b=BLhFjxDxn5a4ejgkFsXfoBM0whd/JYOH1erEkoCOKkI5VECbZc6FpdNDf63UY86vPZElC07oFiqtF3sZDWqlPOm7yFDCIx/FU+GaTFx9uwUTnh6PhjnV4NE52cv90XN3GL80XcDVwvCfnatiazAY7Q2NRUHl4y/wjwyO4zQXwJM60ZvvLdyYbw6IPD0/6jkBJmiywJQ1weRwa7+KH27lm1jBGxyg6qBmJzgY0Mnh5XM0VbP3pNtIwLHXXd050D29eyqWV+eH4CaxRZ0lnlZtz40+9X5uHK7YNwKOEmRmMgXRhlIJGdqrEFeiGOie1OaxdZx8TtOSgUetoQGD97v1Qg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=vsCeOcSuwjMD2fsHQeMAY1oXQKKExhxDi1howaZ3RIM=;
 b=ZHl6011ZModw2zmLG8IUN5hq132v4QcX1rNDqFGHmdFa/INbIsSQQOyAfMIruFLj/Tmb0rh9zaxm2JLMSL2QFxahjqz9Vxoj7R5jbAvr9+TNrJoxhGjFrS1fLjS+vn/FaQKTBj98fsjVMwu3+d9WwHO/RTOBAbRRXwvK6qY3Orw=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Juergen Gross <jgross@suse.com>, Jan Beulich <jbeulich@suse.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>,
	Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>,
	Bertrand Marquis <Bertrand.Marquis@arm.com>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>, Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>, Dario
 Faggioli <dfaggioli@suse.com>
Subject: Re: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Topic: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Index:
 AQHYNKHSvTK6bj2+f02v/DWZHCtE9qy51VEAgAANLYCAAAlQgIAABMeAgAAIuQCAABQSAA==
Date: Fri, 11 Mar 2022 11:29:50 +0000
Message-ID: <509DF3D9-A0B4-4139-8DE8-C4276C16BD26@arm.com>
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-5-luca.fancellu@arm.com>
 <378565ed-80d4-e760-2e25-f5d2e4cb9ce2@suse.com>
 <0D3FFA8E-A904-4375-BDBB-2C974C224D14@arm.com>
 <21783c1d-d8c7-b03b-2221-5e34b4bd0fd4@suse.com>
 <26fbe29d-b5d3-2ce5-a16b-ca05329c778a@suse.com>
 <918fd4d8-99d6-3acf-0637-7feda1e08f71@suse.com>
In-Reply-To: <918fd4d8-99d6-3acf-0637-7feda1e08f71@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: a03593e0-5e12-493b-27f3-08da03527c4c
x-ms-traffictypediagnostic:
	AM4PR0802MB2227:EE_|AM5EUR03FT022:EE_|AM0PR08MB4161:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR08MB416138A6B0927BE769582927E40C9@AM0PR08MB4161.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(2616005)(26005)(7416002)(8936002)(122000001)(38100700002)(186003)(33656002)(2906002)(53546011)(6512007)(6506007)(86362001)(66446008)(66476007)(66556008)(64756008)(66946007)(36756003)(8676002)(4326008)(76116006)(91956017)(316002)(6486002)(508600001)(110136005)(71200400001)(54906003)(5660300002)(38070700005)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <359E632D236F9A43B6E2E6750C397B0B@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR0802MB2227
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT022.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	90de2269-23b8-4e0d-1a4c-08da035274cf
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(508600001)(110136005)(6486002)(54906003)(336012)(186003)(356005)(2616005)(81166007)(316002)(2906002)(107886003)(36756003)(6512007)(6506007)(33656002)(82310400004)(36860700001)(47076005)(70586007)(70206006)(8936002)(5660300002)(53546011)(86362001)(26005)(40460700003)(4326008)(8676002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 11:30:03.3132
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: a03593e0-5e12-493b-27f3-08da03527c4c
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT022.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB4161

DQoNCj4gT24gMTEgTWFyIDIwMjIsIGF0IDEwOjE4LCBKdWVyZ2VuIEdyb3NzIDxqZ3Jvc3NAc3Vz
ZS5jb20+IHdyb3RlOg0KPiANCj4gT24gMTEuMDMuMjIgMTA6NDYsIEphbiBCZXVsaWNoIHdyb3Rl
Og0KPj4gT24gMTEuMDMuMjAyMiAxMDoyOSwgSnVlcmdlbiBHcm9zcyB3cm90ZToNCj4+PiBPbiAx
MS4wMy4yMiAwOTo1NiwgTHVjYSBGYW5jZWxsdSB3cm90ZToNCj4+Pj4+IE9uIDExIE1hciAyMDIy
LCBhdCAwODowOSwgSnVlcmdlbiBHcm9zcyA8amdyb3NzQHN1c2UuY29tPiB3cm90ZToNCj4+Pj4+
IE9uIDEwLjAzLjIyIDE4OjEwLCBMdWNhIEZhbmNlbGx1IHdyb3RlOg0KPj4+Pj4+IC0tLSAvZGV2
L251bGwNCj4+Pj4+PiArKysgYi94ZW4vY29tbW9uL2Jvb3RfY3B1cG9vbHMuYw0KPj4+Pj4+IEBA
IC0wLDAgKzEsMjEyIEBADQo+Pj4+Pj4gKy8qIFNQRFgtTGljZW5zZS1JZGVudGlmaWVyOiBHUEwt
Mi4wICovDQo+Pj4+Pj4gKy8qDQo+Pj4+Pj4gKyAqIHhlbi9jb21tb24vYm9vdF9jcHVwb29scy5j
DQo+Pj4+Pj4gKyAqDQo+Pj4+Pj4gKyAqIENvZGUgdG8gY3JlYXRlIGNwdXBvb2xzIGF0IGJvb3Qg
dGltZSBmb3IgYXJtIGFyY2hpdGVjdHVyZS4NCj4+Pj4+IA0KPj4+Pj4gUGxlYXNlIGRyb3AgdGhl
IGFybSByZWZlcmVuY2UgaGVyZS4NCj4+Pj4+IA0KPj4+Pj4+ICsgKg0KPj4+Pj4+ICsgKiBDb3B5
cmlnaHQgKEMpIDIwMjIgQXJtIEx0ZC4NCj4+Pj4+PiArICovDQo+Pj4+Pj4gKw0KPj4+Pj4+ICsj
aW5jbHVkZSA8eGVuL3NjaGVkLmg+DQo+Pj4+Pj4gKw0KPj4+Pj4+ICsjZGVmaW5lIEJUQ1BVUE9P
TFNfRFRfTk9ERV9OT19SRUcgICAgICgtMSkNCj4+Pj4+PiArI2RlZmluZSBCVENQVVBPT0xTX0RU
X05PREVfTk9fTE9HX0NQVSAoLTIpDQo+Pj4+PiANCj4+Pj4+IE1vdmUgdGhvc2UgaW5zaWRlIHRo
ZSAjaWZkZWYgYmVsb3csIHBsZWFzZQ0KPj4+Pj4gDQo+Pj4+Pj4gKw0KPj4+Pj4+ICtzdHJ1Y3Qg
cG9vbF9tYXAgew0KPj4+Pj4+ICsgICAgaW50IHBvb2xfaWQ7DQo+Pj4+Pj4gKyAgICBpbnQgc2No
ZWRfaWQ7DQo+Pj4+Pj4gKyAgICBzdHJ1Y3QgY3B1cG9vbCAqcG9vbDsNCj4+Pj4+PiArfTsNCj4+
Pj4+PiArDQo+Pj4+Pj4gK3N0YXRpYyBzdHJ1Y3QgcG9vbF9tYXAgX19pbml0ZGF0YSBwb29sX2Nw
dV9tYXBbTlJfQ1BVU10gPQ0KPj4+Pj4+ICsgICAgeyBbMCAuLi4gTlJfQ1BVUy0xXSA9IHsucG9v
bF9pZCA9IC0xLCAuc2NoZWRfaWQgPSAtMSwgLnBvb2wgPSBOVUxMfSB9Ow0KPj4+Pj4+ICtzdGF0
aWMgdW5zaWduZWQgaW50IF9faW5pdGRhdGEgbmV4dF9wb29sX2lkOw0KPj4+Pj4+ICsNCj4+Pj4+
PiArI2lmZGVmIENPTkZJR19BUk0NCj4+Pj4+IA0KPj4+Pj4gU2hvdWxkbid0IHRoaXMgYmUgQ09O
RklHX0hBU19ERVZJQ0VfVFJFRT8NCj4+Pj4gDQo+Pj4+IFllcywgdGhlIG9ubHkgcHJvYmxlbSBp
cyB0aGF0IGluIGdldF9sb2dpY2FsX2NwdV9mcm9tX2h3X2lkIEkgdXNlIHRoZSBhcm0gc3BlY2lm
aWMNCj4+Pj4gY3B1X2xvZ2ljYWxfbWFwKOKApiksIHNvIHdoYXQgZG8geW91IHRoaW5rIGl04oCZ
cyB0aGUgYmV0dGVyIHdheSBoZXJlPw0KPj4+PiBEbyB5b3UgdGhpbmsgSSBzaG91bGQgaGF2ZSBl
dmVyeXRoaW5nIHVuZGVyIENPTkZJR19IQVNfREVWSUNFX1RSRUUNCj4+Pj4gYW5kIGdldF9sb2dp
Y2FsX2NwdV9mcm9tX2h3X2lkIHVuZGVyIENPTkZJR19BUk0gbGlrZSBpbiB0aGlzIHdheSBiZWxv
dz8NCj4+PiANCj4+PiBIbW0sIHdoYXQgaXMgdGhlIGh3aWQgdXNlZCBmb3Igb24gQXJtPyBJIGd1
ZXNzIHRoaXMgY291bGQgYmUgc2ltaWxhcg0KPj4+IHRvIHRoZSB4ODYgYWNwaS1pZD8NCj4+IFNp
bmNlIHRoZXJlJ3MgZ29pbmcgdG8gYmUgb25seSBvbmUgb2YgRFQgb3IgQUNQSSwgaWYgYW55dGhp
bmcgdGhpcyBjb3VsZA0KPj4gYmUgdGhlIEFQSUMgSUQgYW5kIHRoZW4gLi4uDQo+Pj4gU28gSSdk
IHJhdGhlciBwdXQgZ2V0X2xvZ2ljYWxfY3B1X2Zyb21faHdfaWQoKSBpbnRvIEFybSBzcGVjaWZp
YyBjb2RlDQo+Pj4gYW5kIGFkZCBhIHJlbGF0ZWQgeDg2IGZ1bmN0aW9uIHRvIHg4NiBjb2RlLiBE
ZXBlbmRpbmcgb24gdGhlIGFuc3dlciB0bw0KPj4+IGFib3ZlIHF1ZXN0aW9uIHRoaXMgY291bGQg
ZWl0aGVyIGJlIGdldF9jcHVfaWQoKSwgb3IgbWF5YmUgYW4gaWRlbnRpdHkNCj4+PiBmdW5jdGlv
bi4NCj4+IC4uLiBhIGxvb2t1cCBsb29wIG92ZXIgeDg2X2NwdV90b19hcGljaWRbXSAoSSB0aG91
Z2h0IHdlIGhhZCBhIGZ1bmN0aW9uDQo+PiBkb2luZyBzbywgYnV0IHJpZ2h0IG5vdyBJIGNhbid0
IGZpbmQgb25lKS4NCj4gDQo+IEl0IGlzIHRoZSBzZWNvbmQgaGFsZiBvZiBnZXRfY3B1X2lkKCku
DQoNCkkgd2FzIGdvaW5nIHRvIHNheSwgbWF5YmUgSSBjYW4gZG8gc29tZXRoaW5nIGxpa2UgdGhp
czoNCg0KI2lmZGVmIENPTkZJR19BUk0NCiNkZWZpbmUgaHdpZF9mcm9tX2xvZ2ljYWxfY3B1X2lk
KHgpIGNwdV9sb2dpY2FsX21hcCh4KQ0KI2VsaWYgZGVmaW5lZChDT05GSUdfWDg2KQ0KI2RlZmlu
ZSBod2lkX2Zyb21fbG9naWNhbF9jcHVfaWQoeCkgeDg2X2NwdV90b19hcGljaWQoeCkNCiNlbHNl
DQojZGVmaW5lIGh3aWRfZnJvbV9sb2dpY2FsX2NwdV9pZCh4KSAoLTEpDQojZW5kDQoNCnN0YXRp
YyBpbnQgX19pbml0IGdldF9sb2dpY2FsX2NwdV9mcm9tX2h3X2lkKHVuc2lnbmVkIGludCBod2lk
KQ0Kew0KICAgIHVuc2lnbmVkIGludCBpOw0KDQogICAgZm9yICggaSA9IDA7IGkgPCBucl9jcHVf
aWRzOyBpKysgKQ0KICAgICAgICBpZiAoIGh3aWRfZnJvbV9sb2dpY2FsX2NwdV9pZChpKSA9PSBo
d2lkICkNCiAgICAgICAgICAgIHJldHVybiBpOw0KDQogICAgcmV0dXJuIC0xOw0KfQ0KDQpEbyB5
b3UgdGhpbmsgaXQgaXMgYWNjZXB0YWJsZT8NCg0KSSBzZWUgdGhlIGN1cnJlbnQgZ2V0X2NwdV9p
ZCjigKYpIGZyb20geDg2IGNvZGUgaXMgc3RhcnRpbmcgZnJvbSBhbiBhY3BpIGlkIHRvDQpsb29r
dXAgdGhlIGFwaWNpZCBhbmQgdGhlbiBpdCBpcyBsb29raW5nIGZvciB0aGUgbG9naWNhbCBjcHUg
bnVtYmVyLg0KSW4gdGhlIHg4NiBjb250ZXh0LCBldmVudHVhbGx5LCB0aGUgcmVnIHByb3BlcnR5
IG9mIGEgY3B1IG5vZGUgd291bGQgaG9sZCBhbg0KQWNwaSBpZCBvciBhbiBhcGljaWQ/IEkgd291
bGQgaGF2ZSBzYXkgdGhlIGxhc3Qgb25lIGJ1dCBJ4oCZbSBub3Qgc3VyZSBub3cuDQoNCkNoZWVy
cywNCkx1Y2ENCg0KPiANCj4gDQo+IEp1ZXJnZW4NCj4gPE9wZW5QR1BfMHhCMERFOURENjI4QkYx
MzJGLmFzYz4NCg0K


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 12:04:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 12:04:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.288998.490245 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSdzz-0004E2-7Z; Fri, 11 Mar 2022 12:03:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 288998.490245; Fri, 11 Mar 2022 12:03:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSdzz-0004Dv-4O; Fri, 11 Mar 2022 12:03:59 +0000
Received: by outflank-mailman (input) for mailman id 288998;
 Fri, 11 Mar 2022 12:03:58 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=RXIo=TW=citrix.com=prvs=0626a3ed1=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nSdzx-0004Dm-R7
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 12:03:58 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 528c3dd4-a133-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 13:03:56 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 528c3dd4-a133-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647000236;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=4RLoqQ8C8eE+/ksvJoStTEPEt200uw42WoB0YX88IB4=;
  b=Ip7McgZcBgR9FjRchv0bumI8i+WuTBrl80Et27fpsxaIMWQyrfZxSr9k
   7YaI7OZNUWdUe6K0vyNxsv159nzHWF4IQBmuV9CBU4HaEKcJedL5ndcEM
   RGakKpvrkk8/mWXN8r5TY4tCrKbiTxc5sgb9hN+mLQCVIAY3jO1lYjHhy
   8=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65933907
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:5ZJb3KqNtxkHxSmahedM811eT1heBmIOZRIvgKrLsJaIsI4StFCzt
 garIBnUOPiJYjaket5zbYmxoE9VscPQz4JmQQo4+S5kRH4V+JuZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 Iqq+qUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBOKjmmbQXUzZiDTwgH6RMxpzaKyeziJnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVI1zbWAOxgWZnea67L+cVZzHE7gcUm8fP2O
 ZdIMmE+NEuojxtnMXUvCa4ArP2RoCf8Yxt3qkmtiIku7D2GpOB2+Oe0a4eEEjCQfu1Kmm6Iq
 2SA+H72ajkKOdraxTeb/3aEgu7UgTi9SI8UDKe/9PNhnBuU3GN7IB8cWEa/oPK5olWjQN8ZI
 EsRkhfCtoBrqhbtFIOkGUTl/jjU5XbwRua8DcU87SuMmqDUzDyHGzYmRzR/S8Es68MPEGlCO
 kCyo/vlAjlmsbuwQH2b96uJoT7aBRX5PVPudgdfE1JbvoCLTJUby0uWE409SPLdYsjdRGmoq
 w1muhTSkFn6YSQj86ygtW7KjDu3znQiZl5kv16HNo5JA+4QWWJEW2BKwQSKhRqjBNzAJrVkg
 JTis5HPhAzpJcvR/BFhuM1XQNmUCw+taVUwe2JHEZg77CiK8HW+Z41W6zwWDB43bphVImC2M
 BeL4F05CHpv0J2CNP4fj2WZUZlC8EQdPY69CqC8giRmPvCdizNrDAkxPBXNjggBYWAnkL0lO
 IfzTCpfJS1yNEiT9xLvH711+eZynkgWnDqPLbimn0XP+efPPxa9FOZaWGZim8hktctoVi2Oq
 I0BXyZLoj0CONDDjt7/qtdCcwpVcSBlWfgbaaV/L4a+H+avI0l4Y9f5yrI9YY112aNTk+bD5
 HamXUFEjlH4gBX6xc+iMBiPtJuHsU5DkE8G
IronPort-HdrOrdr: A9a23:fDQVFqlQuPgOwWF7+aK+KcDN8GTpDfPIimdD5ihNYBxZY6Wkfp
 +V8sjzhCWatN9OYh0dcLC7WJVpQRvnhPhICK0qTMqftW7dyReVxeBZnPHfKljbehEWmdQtsJ
 uIH5IObOEYSGIK8voSgzPIY+rIouP3iJxA7N22pxwGIHAIGsNdBkVCe32m+yVNNXh77PECZe
 OhD6R81l2dkSN9VLXEOpBJZZmJm/T70LbdJTIWDR8u7weDyRuu9b7BChCdmjMTSSlGz7sO+X
 XM11WR3NTvj9iLjjvnk0PD5ZVfn9XsjvNFGcy3k8AQbhHhkByhaohNU6CL+Bo1vOaswlA3l8
 SkmWZrA+1Dr1fqOk2lqxrk3AftlB4o9n/Z0FedxUDupMToLQhKffZptMZ8SF/0+kAgtNZz3O
 ZgxGSCradaChvGgWDU+8XIfwsCrDv7nVMS1cooy1BPW4oXb7Fc6aYF+llOLZsGFCXmrKg6De
 hVCt3G7vo+SyLUU5nghBgu/DWQZAVxIv/fKXJy+PB9kgIm0EyR9nFohfD2xRw7hdcAo5ot3Z
 WyDk0nrsALciYsV9MOOA4we7rFNoXze2O4DIuzGyWvKEhVAQOEl3bIiI9FkN1CPqZ4i6cPpA
 ==
X-IronPort-AV: E=Sophos;i="5.90,173,1643691600"; 
   d="scan'208";a="65933907"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ofwpSxKC/7JUsscpPWbfnWcw7uj8xhdyIqtDCKUwI2rq8MPNrYHOR1rDFrGPJw9Yu2vWi3SFR/DTUDOwBukVGvoz2xzXt4afYy42tL8FyRZ5u5CW7fq09Oq18bOQG0N3esyM0fCe3AchfBhVBiDvWJe/cQC87ziXA9UiyhX3/nSQyf0mRbLbxQRzajU0johX7gnoXUdbmzidKVbEMenPPUzzxA3wlJRj03Moz7vN3oUy7Dn8wWNICNuH/YCh0VZU6WJLMnUXSQjPlNfTMtQkHY66XYGXh1KmHJ3ACXzgdPD1sGwU1YXzzdmMzy6fdT4qm1GLJJCmR4WmghQ2s7CaQw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=/rItIzYlJMusMY0MQsyzIG/dtNn3y0YWMVd/og4abL0=;
 b=mHzhzzA6e0WqxpaOwBsJKR3+rIkD4oBWKti5293pmM9H3JxNLuptsOVLIBaATLwCLa//V7a7kSIFN1/AFVYyphqMCiH9iBnBgxSgxo2T/yMYq2n9MpgdQNQnvJSB94TtPIR7JaIpLqOmp5uZpkueDiHpH82tQ1BthttfAv7yf07Ouw48Zcxp8HNeGR1hXlXByxm7tizj7ogvB4I5Hkvt445F22dh+ezXQAO/fsv/AXNjZvdVbnzsHBEMYtqmNKBNvEJKZIE9K2Flsf7miDhhoHUuuzkU9/DCgbE60qN9RQFT4BEOn6mpS2+fLoBJj8oashhoXzGe5cWgb7U9Zi4RkQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=/rItIzYlJMusMY0MQsyzIG/dtNn3y0YWMVd/og4abL0=;
 b=MI+0bDMVqUuptrEyvu9DK6cRvXWqkm+ENo5ICt4VQaPS4xq8GtvWWw5yQN2afvWcGoTcmjOBL63xjv3cCcL28XmKIOUIhsaSQeBT5UEc7R6ifnxw2EqE8gripvIm/X9jd8hrzpbwP3UkisVuMZhEvVCPGquxzxg7j1LnGfgB5ZI=
Date: Fri, 11 Mar 2022 13:03:42 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH v3 1/4] x86/time: further improve TSC / CPU freq
 calibration accuracy
Message-ID: <Yis6nrchuvzagfOb@Air-de-Roger>
References: <35cb3c72-05ba-24c7-1fdd-3ee1aced3aec@suse.com>
 <65c123fe-c8e7-b9cf-4dea-904bf28170a7@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <65c123fe-c8e7-b9cf-4dea-904bf28170a7@suse.com>
X-ClientProxiedBy: MR1P264CA0070.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:501:3f::18) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ca8dddeb-78ed-4ace-afa8-08da03573337
X-MS-TrafficTypeDiagnostic: BLAPR03MB5649:EE_
X-Microsoft-Antispam-PRVS: <BLAPR03MB5649CBD0BD2B4CA3E51E79B38F0C9@BLAPR03MB5649.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: c+TO6j4lU2sGokM8LecQqXSg6KMjBRtd5NjBwMWtmcg/WdCawbGn77jsLvVXfMgFOe4EXMXZPukjdlzuo3YSlShYg1UVA99QrdkQgecfVGBfH695RQg5vT6mpetwQPzn/H3Kw+hSVr08FhQrgAhCSto18PDPeqL8SXKOSNv5yDjP1xQG0FonhqybmgQofWjVoDUzSwJUiIAtRSPkm5An0Ytcu7L0nBIN/W3EsH8Qso1GAqr1zFmDEJBdlQoSSPFIMBtchXlZIY+jHKHo9QE2FeNxAEq2+ZZjtE4LYiQZfNS8prni8dAZGJgP3VPxm04wGjmn4ztWAFzzIMJ6Kn5oO1OUMBvvXQPPsYFz2oZNSGr383EAR1MXlxlHIHxt937DrDUka25s/k8u+9uywbgWGMVegZHMmsdNe3zMJPzxgZrsxCzsrwERuopldvkfdVxEyDkF5dy9fEy0cS9JAH0kkE5jHrZLFwinMn+c5bRBVaqVBnxAvQsRIyOi9fzi92sFlxddMMUrJsqjwdT3qXS3svInzeHNAOs7HddLfCN4NBYMagc8sMQyWpwb9i0JHhAkPeVhlwHsbC62Djn4B/W2FTZPQRutIvnwbF9dr7FzxBdt6Z2X0qv8D0/tPT+WFYQCCdyI+vLKZ6LNspCE9og9Eg==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(8936002)(82960400001)(85182001)(66946007)(66476007)(66556008)(8676002)(4326008)(54906003)(316002)(6916009)(5660300002)(2906002)(26005)(33716001)(186003)(6506007)(6512007)(6666004)(9686003)(86362001)(83380400001)(38100700002)(6486002)(508600001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?S3pFdU12ZXNmd0VpZ2NnTE5RZHBmVEhRaWtJVEdGcU53bzZCVU5LRHBxVzJ6?=
 =?utf-8?B?LzI2eHpTY0FmSlZBSmxkWEREUFJ1amxnL0xkQU1QaHJQZWprYVhOUDJiUk9L?=
 =?utf-8?B?VVdMU1VURVhJcnFKTk9IMUN6TXdObXV3TG1vdlM1RkRQR2l6eDBqSkJBTzVw?=
 =?utf-8?B?ck5zeFlkQjFZVWFDbVNJS01FaVROYytCQU9VS2ttT3A1Y0tqclZWLzg4NW9B?=
 =?utf-8?B?d2V2U01QaE5WeG5oMVFYbmZNU3paRUtwWHBYNVUyTmJEUytSN04zaG02c2xX?=
 =?utf-8?B?elFvajdpUUtuL2hEOHVoN1pvdkR4TDFjV0hlV2pKc3BjVHJhdUwxaUFEK0s5?=
 =?utf-8?B?S2dWQ3Ywd2sweklzL2Q5MHdyOGRleXNsNUJSdXBOSHBJS0FKSlBzNEZDM0M0?=
 =?utf-8?B?YzNBeUNYQkNJN3FGeHdzeHMvRVY2a1VOT0NxMzZja0dmNThaOWxZdWZOWVIx?=
 =?utf-8?B?ZTREOUNMd3lOWllpV0pYUnZoeFVDczAvWTI5N1RHbWszRDFwSUJTTVJzMFFH?=
 =?utf-8?B?RUZpSjRRRDA3c0g3aWJreXZTcFpDdU4wUlY3Q1lxQ3dzcFNyazlMNm1YYXY3?=
 =?utf-8?B?cWxHMGREdjFybVVzZDlBQW84ZDJ2RjQwZmxlOVcwaTNOWGZ3WS8yRnM1c09l?=
 =?utf-8?B?QTRGamxyY2o5MSttUkZRSHM0bnd2SnNGN1hhU25hUlJYcGNHWmpsNXpRN0xj?=
 =?utf-8?B?bjhaOFBjQXE1REFaR1Q3SjJxUVJ6Q1p5R25HM0NwQXpPRzk5M3Z1VnMwZitn?=
 =?utf-8?B?T2FUVVVnY09BM3hIOFBIME1XNTg3MzlhbURReHRFUGxYVE1tSEZKOUw4STlQ?=
 =?utf-8?B?K1NKbUpwdExIY1UxZlRuWERtbVhMV1UvM2lNbWp1ZE53QzFMNklCTUM0eUNX?=
 =?utf-8?B?QkF6RVJBM3J0TmhpZDhRTW14NGl3dlRxZWRLNVhRVnIrRXJ1NmtBSnBpQmJW?=
 =?utf-8?B?V0pEbDB1TmdmVlRKUlFUZzNZWWovcEQwc21EUHkvb2NRcXp5NHlPVWFIU0FG?=
 =?utf-8?B?a1dyZFF0Mk5NOUZ1ZWpCODlidW5PNklicUE5Qzd3OFRkNUxlUldPNk1EUy9x?=
 =?utf-8?B?d1RHM2padytnL0NKWnJFNmw3UFdlNlJ2UTl0bThpVEs2YmpVNDFGMDFWSVBp?=
 =?utf-8?B?OHJySGkvK25RRzBMSU9UQkJVa2tHZHlpVlpuWGgwUjNjZjV0RWRvdW5Bb0pm?=
 =?utf-8?B?WUZhTHEzaHhkZm4veEhJcXdtK1J6djhSR0diaUtuaDFVTGJrZWdDdlB0Q1pH?=
 =?utf-8?B?d0piWkpndSswaFFWSXJmUFRkK1pWQVd3NDIzeDZJMUczYU1CSUdpRG5sdi84?=
 =?utf-8?B?N1BmYVM5R0JZenJmL0lqTnBhRTlQbEVpeXhNemE3VHJXV2lqNUo3b0NtQVpn?=
 =?utf-8?B?Qi9RQllNUUlCdE1yc1pWZExVVjBFNW5vWUZ5bkNzRXV6cDBRNWhEVUJ3WERa?=
 =?utf-8?B?QWE5SktkYnBMbHY3aXlGVTIwNkN4NXZ6NWRZaU4xRm0zOENHY2ZCbWRtZHMw?=
 =?utf-8?B?cm9Fa0hld1lCZjgra2thTnZKeGpBSm1VL1J4VW1sVFg5Y2JPV3FZVTNlQWQw?=
 =?utf-8?B?NVBFYlNmRWx2TFV3TTQzWnYvMk92cFFNUVNSdlVzUGRlQitSN0ppQnI0MG84?=
 =?utf-8?B?dWNkdmZWL3Z0a0o2a3FEenpxTHJnRCt2WUsxNmZCMEZFRmVpTEhiZXBzODBE?=
 =?utf-8?B?NnZHTjRyVTh5UXo3WjJQa0RWN1FvZEd1SjFseVVMSVFZd0RIb1F1c0lFSVkx?=
 =?utf-8?B?cTlQUUYvZHZNY1R5dXZid3dPeGxDQmpBV0xNczcrV2J6MzZPbnMrZ0JpMjBz?=
 =?utf-8?B?U2pBaVVpTmtVbXNBUUhqZEVRYk42MHo4NExyNFJEVUx0a1IxSTN1enl4cGpB?=
 =?utf-8?B?NjVwanBTOVhya2VmeGI2ejNGS3JBY2libE1Ub0RHOEpySnBTbkUrN3YyT3FS?=
 =?utf-8?B?R3hISlA2NzF2SnExVW9EMHdRclVlVDBjMmEyV05YQWlBSFkyNWMreVdjeDFt?=
 =?utf-8?B?dHNHRlRadDRnPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: ca8dddeb-78ed-4ace-afa8-08da03573337
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 12:03:49.2682
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: /uJ9oXokiNvGUQ82EpXBqz+EsHz88rWGuCh5Udgx5WVZMBXj6cpXIwuPCORgfjShIPydP21iLVAl05bvkz8IfQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLAPR03MB5649
X-OriginatorOrg: citrix.com

On Mon, Feb 14, 2022 at 10:24:49AM +0100, Jan Beulich wrote:
> Calibration logic assumes that the platform timer (HPET or ACPI PM
> timer) and the TSC are read at about the same time. This assumption may
> not hold when a long latency event (e.g. SMI or NMI) occurs between the
> two reads. Reduce the risk of reading uncorrelated values by doing at
> least four pairs of reads, using the tuple where the delta between the
> enclosing TSC reads was smallest. From the fourth iteration onwards bail
> if the new TSC delta isn't better (smaller) than the best earlier one.
> 
> Signed-off-by: Jan Beulich <jbeulich@suse.com>

Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>

> ---
> When running virtualized, scheduling in the host would also constitute
> long latency events. I wonder whether, to compensate for that, we'd want
> more than 3 "base" iterations, as I would expect scheduling events to
> occur more frequently than e.g. SMI (and with a higher probability of
> multiple ones occurring in close succession).

That's hard to tell, maybe we should make the base iteration count
settable from the command line?

> ---
> v3: Fix 24-bit PM timer wrapping between the two read_pt_and_tsc()
>     invocations.
> v2: Use helper functions to fold duplicate code.
> 
> --- a/xen/arch/x86/time.c
> +++ b/xen/arch/x86/time.c
> @@ -287,9 +287,47 @@ static char *freq_string(u64 freq)
>      return s;
>  }
>  
> -static uint64_t adjust_elapsed(uint64_t elapsed, uint32_t actual,
> -                               uint32_t target)
> +static uint32_t __init read_pt_and_tsc(uint64_t *tsc,
> +                                       const struct platform_timesource *pts)
>  {
> +    uint64_t tsc_prev = *tsc = rdtsc_ordered(), tsc_min = ~0;
> +    uint32_t best = best;
> +    unsigned int i;
> +
> +    for ( i = 0; ; ++i )
> +    {
> +        uint32_t pt = pts->read_counter();
> +        uint64_t tsc_cur = rdtsc_ordered();
> +        uint64_t tsc_delta = tsc_cur - tsc_prev;
> +
> +        if ( tsc_delta < tsc_min )
> +        {
> +            tsc_min = tsc_delta;
> +            *tsc = tsc_cur;
> +            best = pt;
> +        }
> +        else if ( i > 2 )
> +            break;
> +
> +        tsc_prev = tsc_cur;
> +    }
> +
> +    return best;
> +}
> +
> +static uint64_t __init calibrate_tsc(const struct platform_timesource *pts)
> +{
> +    uint64_t start, end, elapsed;
> +    unsigned int count = read_pt_and_tsc(&start, pts);
> +    unsigned int target = CALIBRATE_VALUE(pts->frequency), actual;
> +    unsigned int mask = (uint32_t)~0 >> (32 - pts->counter_bits);

Just to be on the safe side you might want to add an assert that
counter_bits <= 32.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 12:16:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 12:16:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289002.490255 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSeBo-0005kV-BW; Fri, 11 Mar 2022 12:16:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289002.490255; Fri, 11 Mar 2022 12:16:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSeBo-0005kO-8b; Fri, 11 Mar 2022 12:16:12 +0000
Received: by outflank-mailman (input) for mailman id 289002;
 Fri, 11 Mar 2022 12:16:10 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=eaTR=TW=kernel.dk=axboe@srs-se1.protection.inumbo.net>)
 id 1nSeBm-0005kI-Ox
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 12:16:10 +0000
Received: from mail-pl1-x632.google.com (mail-pl1-x632.google.com
 [2607:f8b0:4864:20::632])
 by se1-gles-sth1.inumbo.com (Halon) with UTF8SMTPS
 id 03a6c47a-a135-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 13:16:01 +0100 (CET)
Received: by mail-pl1-x632.google.com with SMTP id q13so7508545plk.12
 for <xen-devel@lists.xenproject.org>; Fri, 11 Mar 2022 04:16:01 -0800 (PST)
Received: from [127.0.1.1] ([198.8.77.157]) by smtp.gmail.com with ESMTPSA id
 oc3-20020a17090b1c0300b001bf8c88a8c4sm13322797pjb.35.2022.03.11.04.15.58
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Fri, 11 Mar 2022 04:15:59 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 03a6c47a-a135-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=kernel-dk.20210112.gappssmtp.com; s=20210112;
        h=from:to:cc:in-reply-to:references:subject:message-id:date
         :mime-version:content-transfer-encoding;
        bh=8lgnycCyEA7OE7uRgpUg805RrcH5QY6fpQNIJm8bcKE=;
        b=p7dP/Bwcd8UH3YDqkYYYIAgwNyj9EfrcebjoF/yIrwWUByv8XfkmURMrk/WXYDJkWk
         Pu74We98LlV85ri8Auq24Zn7pgyxdBbgrogPWu281/71BuLPXcp+Z4ILMtHlvq7/Io+u
         41E4F7gtFeJi+ndakPTDFAqHBZOybi1Y8JwAobYmHTQ1KHaBxiqc/mUUrvSRSWWxblAD
         nZQ1cv95vvu/Sfa2Xiq7xodBpRxPAh2uF134wqRsJ9Kg3U/bVkup5bR6lGyjMrMbgGsh
         N6ui+ubJsCAYJ1zs950g4VRSpf4nXUWCBIJcpIRPavKaN3nOSvEwGAiu5ctbSEhaL+0M
         1X6g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:in-reply-to:references:subject
         :message-id:date:mime-version:content-transfer-encoding;
        bh=8lgnycCyEA7OE7uRgpUg805RrcH5QY6fpQNIJm8bcKE=;
        b=I5a1w1gpcPg2i+lYITSQgQ3GIM96O5G8g6JaqxSGi6B1qtqt4FPgIquoj/mrkZ2a+v
         3eZ1A2sckpKthLFAmJWk8Keupcz0mnCo02Rz1QN8iX2zIwg4qY6/F2zjEaE3+W3DxYHS
         WOBkLkuEfdnu4FsGGmi7x+YmiDXGdqBuDluKMINDdk5hmcpjDgnO4jHXjY8XuA7YXvp7
         WB3M/xgZ7ye8y6epJDLdphgsZAhIzlLZY1DtRmJdXBulh/oa5PEcVVZgP2elQ4BFei00
         IaZrtEI4ScroageqmB1lB3Rs3Mj3WuMotrr//0Esx4ExNZmj+zD4/wrwyeHNTyejHNWf
         9LqA==
X-Gm-Message-State: AOAM530yYwrT6CKKDzAQmB6kNGb+AvV5bIkMdJuSSeN8Z7Mqv5v65ykx
	+KT8YIyZDULfJoCQjb5+CTPnfQ==
X-Google-Smtp-Source: ABdhPJwwolMs/D5abOMe+Vfv4rMCTXspDIr98osvzAsU/ODnym2pEqUZ8N0fVBx/9zqrpRkzL504VQ==
X-Received: by 2002:a17:90b:1b4f:b0:1c5:4dc9:61c with SMTP id nv15-20020a17090b1b4f00b001c54dc9061cmr520951pjb.161.1647000960096;
        Fri, 11 Mar 2022 04:16:00 -0800 (PST)
From: Jens Axboe <axboe@kernel.dk>
To: linux-block@vger.kernel.org, linux-kernel@vger.kernel.org, Juergen Gross <jgross@suse.com>, xen-devel@lists.xenproject.org
Cc: Roger Pau Monné <roger.pau@citrix.com>, Jan Beulich <jbeulich@suse.com>, Boris Ostrovsky <boris.ostrovsky@oracle.com>, Stefano Stabellini <sstabellini@kernel.org>
In-Reply-To: <20220311103527.12931-1-jgross@suse.com>
References: <20220311103527.12931-1-jgross@suse.com>
Subject: Re: [PATCH] xen/blkfront: speed up purge_persistent_grants()
Message-Id: <164700095873.9652.11436979852565493829.b4-ty@kernel.dk>
Date: Fri, 11 Mar 2022 05:15:58 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit

On Fri, 11 Mar 2022 11:35:27 +0100, Juergen Gross wrote:
> purge_persistent_grants() is scanning the grants list for persistent
> grants being no longer in use by the backend. When having found such a
> grant, it will be set to "invalid" and pushed to the tail of the list.
> 
> Instead of pushing it directly to the end of the list, add it first to
> a temporary list, avoiding to scan those entries again in the main
> list traversal. After having finished the scan, append the temporary
> list to the grant list.
> 
> [...]

Applied, thanks!

[1/1] xen/blkfront: speed up purge_persistent_grants()
      commit: 85d9abcd7331566781b93ff46e4bccd4806ef2b2

Best regards,
-- 
Jens Axboe




From xen-devel-bounces@lists.xenproject.org Fri Mar 11 12:23:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 12:23:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289007.490267 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSeIR-0007A6-3g; Fri, 11 Mar 2022 12:23:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289007.490267; Fri, 11 Mar 2022 12:23:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSeIQ-00079x-WF; Fri, 11 Mar 2022 12:23:03 +0000
Received: by outflank-mailman (input) for mailman id 289007;
 Fri, 11 Mar 2022 12:23:01 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=aAGA=TW=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nSeIO-00079r-Uu
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 12:23:01 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id fd2a029b-a135-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 13:22:59 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 3701A210F4;
 Fri, 11 Mar 2022 12:22:59 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id C9D1913A89;
 Fri, 11 Mar 2022 12:22:58 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id fFyBLyI/K2JMMgAAMHmgww
 (envelope-from <jgross@suse.com>); Fri, 11 Mar 2022 12:22:58 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fd2a029b-a135-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647001379; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=o+inxrardfooF0/6r9wCvjk80c53RdoGX6buvtTWeuE=;
	b=EqgUJyzpz8xlS/i3NgKq2p5TlD4J40fIp6kqO6uPorK2gnNOiMRGgivTLtkdwGH5OXpwtT
	rm6yiPZtrJ+ta6D8dkNDti/VhwOWi/iT2EcZJzOl5LsD/jB/SV5r+ByD+1C054j8DRDS8i
	wrvBb9DDGDxqplGg7cHMOWpfeVzSk0U=
Message-ID: <251ab7df-8c54-d3c8-2159-2cbe93586ece@suse.com>
Date: Fri, 11 Mar 2022 13:22:58 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
Content-Language: en-US
To: Luca Fancellu <Luca.Fancellu@arm.com>, Jan Beulich <jbeulich@suse.com>
Cc: Xen-devel <xen-devel@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>,
 Bertrand Marquis <Bertrand.Marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 Dario Faggioli <dfaggioli@suse.com>
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-5-luca.fancellu@arm.com>
 <378565ed-80d4-e760-2e25-f5d2e4cb9ce2@suse.com>
 <0D3FFA8E-A904-4375-BDBB-2C974C224D14@arm.com>
 <21783c1d-d8c7-b03b-2221-5e34b4bd0fd4@suse.com>
 <26fbe29d-b5d3-2ce5-a16b-ca05329c778a@suse.com>
 <918fd4d8-99d6-3acf-0637-7feda1e08f71@suse.com>
 <509DF3D9-A0B4-4139-8DE8-C4276C16BD26@arm.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <509DF3D9-A0B4-4139-8DE8-C4276C16BD26@arm.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------nNYwFw9iS4IsPqr1OSdqJBew"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------nNYwFw9iS4IsPqr1OSdqJBew
Content-Type: multipart/mixed; boundary="------------cSMyawGhB1EbRpz807Df9Sma";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Luca Fancellu <Luca.Fancellu@arm.com>, Jan Beulich <jbeulich@suse.com>
Cc: Xen-devel <xen-devel@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>,
 Bertrand Marquis <Bertrand.Marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 Dario Faggioli <dfaggioli@suse.com>
Message-ID: <251ab7df-8c54-d3c8-2159-2cbe93586ece@suse.com>
Subject: Re: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-5-luca.fancellu@arm.com>
 <378565ed-80d4-e760-2e25-f5d2e4cb9ce2@suse.com>
 <0D3FFA8E-A904-4375-BDBB-2C974C224D14@arm.com>
 <21783c1d-d8c7-b03b-2221-5e34b4bd0fd4@suse.com>
 <26fbe29d-b5d3-2ce5-a16b-ca05329c778a@suse.com>
 <918fd4d8-99d6-3acf-0637-7feda1e08f71@suse.com>
 <509DF3D9-A0B4-4139-8DE8-C4276C16BD26@arm.com>
In-Reply-To: <509DF3D9-A0B4-4139-8DE8-C4276C16BD26@arm.com>

--------------cSMyawGhB1EbRpz807Df9Sma
Content-Type: multipart/mixed; boundary="------------8H06UJNxhjjRQ0pAf6LkQMPb"

--------------8H06UJNxhjjRQ0pAf6LkQMPb
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------8H06UJNxhjjRQ0pAf6LkQMPb
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------8H06UJNxhjjRQ0pAf6LkQMPb--

--------------cSMyawGhB1EbRpz807Df9Sma--

--------------nNYwFw9iS4IsPqr1OSdqJBew
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIrPyIFAwAAAAAACgkQsN6d1ii/Ey9d
eAf/UhN6cSkss+bl727YlYzfaJgtgoCG3ugu+Mr8XIpNMhgU/7Wm3PqELc/2bH76QxghJqPGqt3w
ofqesTMWk/HLN6vbmxuSINW74A8AXw7cAaAFPSlMdkmV9Y2Npv5vy8jh9+DQVvbTUuNdHAVZ384C
NdEQqOnNqN48xEjAswPxoOEigsFMnyV5WRgW+s21DRS1a6JOpgwQ5gKHhUDTdVA/kWk0O4Uhx5Ff
cUcD37x6Ows1Xz765hYV6nJQyui+Gl1y+W9C4Fa26j1o1j7vOPKnAHZVaLF7lgzyWM++VWZJzdwh
wfyXC7bPdE+CEQYrpaDbAYFcwF9PZWatufLXsaOozA==
=/KVl
-----END PGP SIGNATURE-----

--------------nNYwFw9iS4IsPqr1OSdqJBew--


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 12:28:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 12:28:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289013.490278 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSeNO-0007tF-QK; Fri, 11 Mar 2022 12:28:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289013.490278; Fri, 11 Mar 2022 12:28:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSeNO-0007t8-Mt; Fri, 11 Mar 2022 12:28:10 +0000
Received: by outflank-mailman (input) for mailman id 289013;
 Fri, 11 Mar 2022 12:28:09 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=3DNt=TW=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nSeNN-0007t2-Qe
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 12:28:09 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id b51ce636-a136-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 13:28:08 +0100 (CET)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2052.outbound.protection.outlook.com [104.47.14.52]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-27-U0j3EKQNOUuZVauAKlrfmw-1; Fri, 11 Mar 2022 13:28:07 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR04MB5028.eurprd04.prod.outlook.com (2603:10a6:208:cc::23)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar
 2022 12:28:04 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.022; Fri, 11 Mar 2022
 12:28:04 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b51ce636-a136-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647001688;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=ovrxvzJCrIzbaOGDqozVwtiad8yCZaikFFQCMLG6z+M=;
	b=fE9ogMOpAZ69kCwtq+ON9+7GZ82WqFE1d8jC/7nV7SYu8DIKDfwV/c8JtavHaUxTwixaEw
	OhyuNXV3Y48z14bT/92zsiUi0UAlbB4gjJLvnvWpYd/QwdbWzYWpTmL3DQ7acZyWNbXZdu
	k6wjsNEkE5UPJyDXK/Q1+CbnCvIckms=
X-MC-Unique: U0j3EKQNOUuZVauAKlrfmw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=QEVaqHMJtWmOsRObqNmUiXKezPs/edKfDbKw2EDuWjvmp3GeH0bnlnynVgid3+0WBKKx+KtD4sLyPnqdc8QOuR//siCT0ulXWhVD6TnrPyzHN+h5HjEeA4D4SS37y1fZyEO4UjJiumdO6wGMAInRgIkgF5zAJXkQqsfD7+TwfOpdjLfPIwtHLu9tE9LvLpgiOjaJmw33+3g/TZg0LHKtZGIHAWEQsg0UcMenz39lz8itsBp2dYUkRT7BedOVBSH3DXYWNpqxpGf/oWhpbYHM2n1Htu6D2RaAB0gove0VJJQm9wnlkzTvVU3E/czStGUhwP5+kQlPNdVJ4rQ/IPdS/g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=S5xjwBOe4g63+TsspZ5O0F0zu3Yh/XSsI5xQ0WkylhA=;
 b=h1bmc5gDG2ryZQzPJzhVWofGHJPZSjQALfnnzL+J2Nl0PwLmHTh0yruLJdkiXxQ69DNKWziEbde/WyuRgKmILM7eYZtLEkywm6XbfVhuKgKY8xi7CgksUoxAvY+MEqQJTI1M7jIWF10wIrpW97ygLgUYAQjvh589I3swrT5Vti2Sa3tKNgsqGxS/1hg88vAGNsHHFTttE77zb1zj7CPWRNxdhG8W84PX9gFYcEeB0JgOhk/iG3aTMjgtlTuZYiPoD2hwsxDHw7F/lElnr0JQLFBfTlYZuecwhcIvkLbQBawoqf6HWbW7amkOZ7Itgx45tWxF3TWXB9BVELziljzmMw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <453ae515-d97a-cc0b-7b7d-a505a8904f03@suse.com>
Date: Fri, 11 Mar 2022 13:28:00 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
Content-Language: en-US
To: Luca Fancellu <Luca.Fancellu@arm.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>,
 Bertrand Marquis <Bertrand.Marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 Dario Faggioli <dfaggioli@suse.com>, Juergen Gross <jgross@suse.com>
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-5-luca.fancellu@arm.com>
 <378565ed-80d4-e760-2e25-f5d2e4cb9ce2@suse.com>
 <0D3FFA8E-A904-4375-BDBB-2C974C224D14@arm.com>
 <21783c1d-d8c7-b03b-2221-5e34b4bd0fd4@suse.com>
 <26fbe29d-b5d3-2ce5-a16b-ca05329c778a@suse.com>
 <918fd4d8-99d6-3acf-0637-7feda1e08f71@suse.com>
 <509DF3D9-A0B4-4139-8DE8-C4276C16BD26@arm.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <509DF3D9-A0B4-4139-8DE8-C4276C16BD26@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM5PR1001CA0063.EURPRD10.PROD.OUTLOOK.COM
 (2603:10a6:206:15::40) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: dade818a-eeee-4889-1898-08da035a9705
X-MS-TrafficTypeDiagnostic: AM0PR04MB5028:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB50285BD9335EBE2CCA33D89FB30C9@AM0PR04MB5028.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(107886003)(53546011)(66946007)(2616005)(6666004)(6512007)(6506007)(36756003)(186003)(26005)(66556008)(6486002)(508600001)(8936002)(54906003)(86362001)(2906002)(66476007)(83380400001)(4326008)(31686004)(316002)(6916009)(8676002)(31696002)(5660300002)(38100700002)(7416002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?kXA8nZz4fHscQ+M2Nl6nmm07ArfMzzp6J7oRIZEJP6EhdjkHwdTboJt0iMz1?=
 =?us-ascii?Q?TVoLiGRuIokIU/jhuovgpaqAng/kj3xGPPUUKMjziuRRoA1jL92pkU/DP7xe?=
 =?us-ascii?Q?c1A9eqAhBQU6fhaNXKApXFMoLuOOfmLW9ra0SKBuT3EjTfsYxELw1C58lCHI?=
 =?us-ascii?Q?E+WfVcEddqt/mSZhT5S4MSz2ku0CghmOEJ6+r8iGQNXmVzxlMecC+/Q8zPj9?=
 =?us-ascii?Q?/xJ22PoowjcxpCh8kwcRhumOpzYw+6KNmJlJk4SKRsNl+i75kehDP1/7/SxY?=
 =?us-ascii?Q?oC7DInUePajbeW5W1Agkc+GpzdISEanUhwOYPVlQ3cDhBRgm0DIAcESaxUIx?=
 =?us-ascii?Q?nshl/ntp4BYc479Iu3CiTPim46igbvflY59XlGxxftT9zrGwlRMydoo+kAke?=
 =?us-ascii?Q?WvPQCySKLjmZhw3vSz2fzeBXpj7HXihab1rZJFyu5Dheydk/wRZQfBX7KWMe?=
 =?us-ascii?Q?DRRwNLO5ENEwUrEVGF0VZRY18UbMu5HEmo1cwFOBgw7A7r/x+hg48qF1xWnc?=
 =?us-ascii?Q?xMJcN5OONycWgjBJqlQFgqd++qOsCEox7qojCQb35QqNy4QNErLeHc40qZPf?=
 =?us-ascii?Q?BucVsNU4duYbl/YNysQhadjOzFxqNpdLw+f+slv3vIS5kN57ZG+FAtwFSNvN?=
 =?us-ascii?Q?+KlrlGuOhfpGc455bK8rPPL2tnYJKaSUnPlFZVPus+cfdev6bwfVzdRqiCpB?=
 =?us-ascii?Q?/JtoWMSzcn0NQGw2oByABGqPKIynQNO4XczR0bJZfhQrxxetK+75g1Ci1GhY?=
 =?us-ascii?Q?XDsp0MkldoY8jjzH/AR7ByhcG9l15sVaibmSFzp57kbmjmgHInBS7WoJBH7h?=
 =?us-ascii?Q?FiWaYsQzFoHZuiLr/4iVrknZu3DcMEunPI7pRvgVDUHTBCi/PwaKnVHn/F0R?=
 =?us-ascii?Q?YQDWMeLBenGPrdboz9pMBf84prQtk776tzQCYB8v/ji8nEUyQavdXPr7xPZS?=
 =?us-ascii?Q?Z1faTypzutvVDoiki8gy/03bGqe03PuWESlj91DBiu0CN3Mf9P7ih+c8HnCd?=
 =?us-ascii?Q?taryTvpZAmGQAEVwIEGuRQri9Y/PIvvbaeWHJVO7YWtJHOoUsF29LvDG/76w?=
 =?us-ascii?Q?szZFuUnVV0CFJuyIYMrfFbmGUT/klqGyi5XJYzm1czJK1wcIAZNmcsuRKtbm?=
 =?us-ascii?Q?TRjQCES6C8LSG60ifaasf5SFzug57zOi19rqlMw1tFsYxWqWxSGHPTcni8Bf?=
 =?us-ascii?Q?+Cb2p063DBajAqmOcz/mujAVdh7IKUe2P+O2qP7yIG111VpVal4MJguDRJW9?=
 =?us-ascii?Q?GwVoyB4sCAF1AUvPQQeHGyqE1baoMb2i75FyArSRKcIEI58vmwzo5Pg55bqP?=
 =?us-ascii?Q?MIeFVujIR6gp3g9LVcOy4z6ihAuz4jttnzMd7tmF4PZpGpuJ0jyrb2iEbft5?=
 =?us-ascii?Q?0e9Xb/USikjIoTaKlPj8dq065W5NbkaItygRD+leUSmLgSnQnrGCY+7vBfiK?=
 =?us-ascii?Q?ygSk5p6CMsuPnwvFnmhD5XUXAz/ngBnA?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: dade818a-eeee-4889-1898-08da035a9705
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 12:28:04.4479
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: kOyZZsx3S9Ieneki1Jbr7Ql4zib1K1IfgRdbRIj1XqGlIc+1bupfVnIYHdKiadT9QAxg3UCWFEfIboL0fWphiA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB5028

On 11.03.2022 12:29, Luca Fancellu wrote:
>> On 11 Mar 2022, at 10:18, Juergen Gross <jgross@suse.com> wrote:
>> On 11.03.22 10:46, Jan Beulich wrote:
>>> On 11.03.2022 10:29, Juergen Gross wrote:
>>>> On 11.03.22 09:56, Luca Fancellu wrote:
>>>>>> On 11 Mar 2022, at 08:09, Juergen Gross <jgross@suse.com> wrote:
>>>>>> On 10.03.22 18:10, Luca Fancellu wrote:
>>>>>>> --- /dev/null
>>>>>>> +++ b/xen/common/boot_cpupools.c
>>>>>>> @@ -0,0 +1,212 @@
>>>>>>> +/* SPDX-License-Identifier: GPL-2.0 */
>>>>>>> +/*
>>>>>>> + * xen/common/boot_cpupools.c
>>>>>>> + *
>>>>>>> + * Code to create cpupools at boot time for arm architecture.
>>>>>>
>>>>>> Please drop the arm reference here.
>>>>>>
>>>>>>> + *
>>>>>>> + * Copyright (C) 2022 Arm Ltd.
>>>>>>> + */
>>>>>>> +
>>>>>>> +#include <xen/sched.h>
>>>>>>> +
>>>>>>> +#define BTCPUPOOLS_DT_NODE_NO_REG     (-1)
>>>>>>> +#define BTCPUPOOLS_DT_NODE_NO_LOG_CPU (-2)
>>>>>>
>>>>>> Move those inside the #ifdef below, please
>>>>>>
>>>>>>> +
>>>>>>> +struct pool_map {
>>>>>>> +    int pool_id;
>>>>>>> +    int sched_id;
>>>>>>> +    struct cpupool *pool;
>>>>>>> +};
>>>>>>> +
>>>>>>> +static struct pool_map __initdata pool_cpu_map[NR_CPUS] =3D
>>>>>>> +    { [0 ... NR_CPUS-1] =3D {.pool_id =3D -1, .sched_id =3D -1, .p=
ool =3D NULL} };
>>>>>>> +static unsigned int __initdata next_pool_id;
>>>>>>> +
>>>>>>> +#ifdef CONFIG_ARM
>>>>>>
>>>>>> Shouldn't this be CONFIG_HAS_DEVICE_TREE?
>>>>>
>>>>> Yes, the only problem is that in get_logical_cpu_from_hw_id I use the=
 arm specific
>>>>> cpu_logical_map(=E2=80=A6), so what do you think it=E2=80=99s the bet=
ter way here?
>>>>> Do you think I should have everything under CONFIG_HAS_DEVICE_TREE
>>>>> and get_logical_cpu_from_hw_id under CONFIG_ARM like in this way belo=
w?
>>>>
>>>> Hmm, what is the hwid used for on Arm? I guess this could be similar
>>>> to the x86 acpi-id?
>>> Since there's going to be only one of DT or ACPI, if anything this coul=
d
>>> be the APIC ID and then ...
>>>> So I'd rather put get_logical_cpu_from_hw_id() into Arm specific code
>>>> and add a related x86 function to x86 code. Depending on the answer to
>>>> above question this could either be get_cpu_id(), or maybe an identity
>>>> function.
>>> ... a lookup loop over x86_cpu_to_apicid[] (I thought we had a function
>>> doing so, but right now I can't find one).
>>
>> It is the second half of get_cpu_id().
>=20
> I was going to say, maybe I can do something like this:
>=20
> #ifdef CONFIG_ARM
> #define hwid_from_logical_cpu_id(x) cpu_logical_map(x)
> #elif defined(CONFIG_X86)
> #define hwid_from_logical_cpu_id(x) x86_cpu_to_apicid(x)
> #else
> #define hwid_from_logical_cpu_id(x) (-1)
> #end
>=20
> static int __init get_logical_cpu_from_hw_id(unsigned int hwid)
> {
>     unsigned int i;
>=20
>     for ( i =3D 0; i < nr_cpu_ids; i++ )
>         if ( hwid_from_logical_cpu_id(i) =3D=3D hwid )
>             return i;
>=20
>     return -1;
> }
>=20
> Do you think it is acceptable?

Why not, if even on Arm you have to use a loop. As J=C3=BCrgen said, this
likely wants to move to some header file. Whether the names are
suitable for an arch abstraction I'm not sure, but I also have no
immediate alternative suggestion.

> I see the current get_cpu_id(=E2=80=A6) from x86 code is starting from an=
 acpi id to
> lookup the apicid and then it is looking for the logical cpu number.
> In the x86 context, eventually, the reg property of a cpu node would hold=
 an
> Acpi id or an apicid? I would have say the last one but I=E2=80=99m not s=
ure now.

Without ACPI it can't sensibly be an ACPI ID. The most logical thing
to expect would be an APIC ID, but then it's all up to whoever specifies
what DT is to supply.

Jan



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 12:31:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 12:31:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289017.490289 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSeQ9-0000pM-7k; Fri, 11 Mar 2022 12:31:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289017.490289; Fri, 11 Mar 2022 12:31:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSeQ9-0000pF-4h; Fri, 11 Mar 2022 12:31:01 +0000
Received: by outflank-mailman (input) for mailman id 289017;
 Fri, 11 Mar 2022 12:31:00 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=3DNt=TW=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nSeQ8-0000p9-1A
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 12:31:00 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 1aa5b973-a137-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 13:30:58 +0100 (CET)
Received: from EUR02-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur02lp2059.outbound.protection.outlook.com [104.47.6.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-31-lJTUeyJiO-eMT2iLBWXAzA-1; Fri, 11 Mar 2022 13:30:57 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR0402MB3633.eurprd04.prod.outlook.com (2603:10a6:208:c::28)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar
 2022 12:30:55 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.022; Fri, 11 Mar 2022
 12:30:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1aa5b973-a137-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647001858;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=v1MNd096C8fKQZi4xn5Oe60BodAFGo4UDI3yEvFOLPk=;
	b=Yrmi7e24ks2ilE9bX5E+HUiBpv4KAJN6V+hbME88RhLdaKsPHwEXjkpz9nPIeK1E2f7kjf
	0EspnY6pHXYTaIHlKrjUWkavKynoNvyaLGaoUtR7NPV6cBsfoVv0jHO+ZEqbVS5EQcP23y
	9vXViiNm0tNgIacDneLJmyg2ntN/Mz8=
X-MC-Unique: lJTUeyJiO-eMT2iLBWXAzA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=oZNPw964XH14zYF6wt1NxpxsVoplEsAoNm+XsO9vc6iDkw4a1PifV/gPEDLaEHh6byBVyEPkoX/8gnE3X4fwEsgO5gmGROYrMjQgW/dxrPsQ6jtDptEzJFkxQ0JwH1JsTmhmdhReml3eEOXDv/uUW9D7hCrRIuzVSxqDaToT55ke85ttSpiKB/bOj0rJw8txqTBpabfwVsSqbceYTDakJ6qp4zvL6gjzXYnXi7NfNRvM61+LRiRisnls9Wz3dq+fsnuw06239mI5BZCxvPmK43ARxDdGrl20Tr8XXC/RAwNQqvcgdkQPZErdqKRiBf9wC+P6cmaRy8BS/juWCfSu1w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=7ehG6zKVsTFwvNcCOOtzFk9BpNnW17evCWMJKGkeAmw=;
 b=MjfkiS4aA17J+1TDGBdShM9UvIdPrn/PVAYPgqvWnVSJBIWMhfT8xUL/K96KUrdqhnyqyM366zjoYqJCqk0qPTsycr6ROOEyOUYklYWVXe6EEVrv6D0LD1pGFwXG5uvGtELE3WVTt6GeBGHR/sIi2snn7e6s/7qeFED56SV9cM1DcNWIKfCSsVmVtd1uQgIn3x7wd9Q7qtzN+00rhMzhledUdYVWEDWkKsppvvDeQBpO1r3Kc+z4tNhZBVV0rmGhZalOOlE799P0tJUbWnc825C2ksmXhec1js+mZsyqOuknT1dNfR7iJW1oLSMyyYSUkEIq1V7PdEQJM7rrG/0Grg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <2ec142df-0023-d105-4c96-3b42a198a8df@suse.com>
Date: Fri, 11 Mar 2022 13:30:53 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v3 1/4] x86/time: further improve TSC / CPU freq
 calibration accuracy
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
References: <35cb3c72-05ba-24c7-1fdd-3ee1aced3aec@suse.com>
 <65c123fe-c8e7-b9cf-4dea-904bf28170a7@suse.com>
 <Yis6nrchuvzagfOb@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <Yis6nrchuvzagfOb@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS8PR07CA0015.eurprd07.prod.outlook.com
 (2603:10a6:20b:451::28) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: a4852a1e-6591-4077-d484-08da035afd07
X-MS-TrafficTypeDiagnostic: AM0PR0402MB3633:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR0402MB36338A5E4BCB95B3B83C07AFB30C9@AM0PR0402MB3633.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6486002)(83380400001)(508600001)(54906003)(5660300002)(8936002)(6506007)(6512007)(53546011)(2906002)(8676002)(66946007)(66556008)(66476007)(4326008)(26005)(2616005)(186003)(86362001)(38100700002)(36756003)(31696002)(316002)(31686004)(6916009)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?VSTn98ql0BHGEbO92hb/RgJ2MDXh85wC+0lEymSrM6GRdsyAMjzwmYLNQsZ9?=
 =?us-ascii?Q?Rci5fs2Aew99OMWmwsUyzEpzhYNGo+cn/tKUK+t3cQZNuru5O8Wc6C/jWpxh?=
 =?us-ascii?Q?XnFDfMZ50+qobjQwP3C1jo357vHY83siq77wdE9PEL90DqMIxjdVX7yoN3sN?=
 =?us-ascii?Q?nyWDoyOCHUePJIIQmntf3hIo2hY+xeAUCgpf6rRd9NT0u1P5+PrpytCwR+tT?=
 =?us-ascii?Q?axnzOnPOqARfeUjvxgi7tGBtyMQGAaShfpIa6l5+vsvuqJXrhkyE0LbbN6gg?=
 =?us-ascii?Q?2LbfAwD42QsnSvVIrxTthjTaBgJX53VA4utMKHI06nrQlsrRt8D24tiDSam0?=
 =?us-ascii?Q?Wo2cM6lzM3ZklxUv31Nh5HPnVKGynF3ji0+hJepQYI1b6464Rg1CITCHzWdi?=
 =?us-ascii?Q?ryTVzi0jtV5hyrx70iKRPRYUxQa3TEv0Csdp4XPd526KOZ52Ee01803/mQ7r?=
 =?us-ascii?Q?i6mhMjSpgob8s4kcXSaVPOBYIVsy2R9u0gDnL83tnzDTSbVHNFGKy3W9FKai?=
 =?us-ascii?Q?VcQkSkjf2scjRBUNw9qdnbajanfgQ/exfRCBdFI0hnvrh/R+tilpbh5OrF0Q?=
 =?us-ascii?Q?d9oIQySQMcevPiw0yEosj9VVcl7hjoTpxMts6p06N85IiDASlXliEJfqj9+E?=
 =?us-ascii?Q?l+gXA0I5itjuJqJnE0IxzG4J/qD8vt8h8qUMlasxBif4ic2Jw8P7FsJAs3ml?=
 =?us-ascii?Q?lJqC2LD3ASbznfMuKEuDJ2mjB+Avb5AZZ2R+MeTPowIBZ+zfnTlphu+5/jrL?=
 =?us-ascii?Q?c0NgsTbsSQ3VaL9daXG2im7iaxjbZ54Da1pdEEg3xxe3+rqpTXrxOB8zQ+Ih?=
 =?us-ascii?Q?ExD3k6LtvIUGAtjhSB1w7tUj/dFhV5RH4z2LLCLvwDbC+lDd5E4Zdi9idy3Q?=
 =?us-ascii?Q?VSRz3wrEBKPVxRes/+fn88j8XYU4DmUbrBrv59SHOZVOm1WO/qtczLWxUliA?=
 =?us-ascii?Q?A3zpMSa+AgUHft3UULjdyStJvRKX+nhdgvxXMlrl18kdDOLbhwSVEomQR/fl?=
 =?us-ascii?Q?SLOjSo+k6CZTvngw6u8m7QQh7U8m7e+xWPPZuXEtrASWOh+izp+XmcTK28Ma?=
 =?us-ascii?Q?l+a+nj/U2OnMbKI+4WZHBQf/XPih4RMX2pu6coAIu2nrEK0jSIXPVZr+kPpG?=
 =?us-ascii?Q?vz7tU3i/TPm8sGHT9rcK/c93KFmLZ2C+PBlU/Wlmue8vXHvjPDZNXX0IP26h?=
 =?us-ascii?Q?ML3JSPbnHVjpRgJhmNRYcvnuNxidswtawogjEFR66vhjpyLYXSkFYx3+nouk?=
 =?us-ascii?Q?JeY4ID+rHGKQiBGIOb8ZEuZnXcZV/hodofAOhNlzu3xikWif0+q/foEG+anP?=
 =?us-ascii?Q?zEZNiDyoOXhxSAxSBhG/XRm44RVCKjL1lXiulu2i3eQzd5/XqOZ4Bp+aRkvs?=
 =?us-ascii?Q?nMtEc49TvxbBpbFzD8iZdETkZ4Mez+K4VJR5G7IyxcE28+TTlx+YRKEv0Ysq?=
 =?us-ascii?Q?kH9aJmI+ApbzWkK7FOe/orpnr0WBZH99?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a4852a1e-6591-4077-d484-08da035afd07
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 12:30:55.4841
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: rUIVLTFPCnApBodl0nfwIl0eEmr7zz8WUnJDsbaIkexugkGWqriRcvuf0BvvsgDtl+z4zQHzm0TqYtxj+B2u0w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR0402MB3633

On 11.03.2022 13:03, Roger Pau Monn=C3=A9 wrote:
> On Mon, Feb 14, 2022 at 10:24:49AM +0100, Jan Beulich wrote:
>> Calibration logic assumes that the platform timer (HPET or ACPI PM
>> timer) and the TSC are read at about the same time. This assumption may
>> not hold when a long latency event (e.g. SMI or NMI) occurs between the
>> two reads. Reduce the risk of reading uncorrelated values by doing at
>> least four pairs of reads, using the tuple where the delta between the
>> enclosing TSC reads was smallest. From the fourth iteration onwards bail
>> if the new TSC delta isn't better (smaller) than the best earlier one.
>>
>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>=20
> Reviewed-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>

Thanks.

>> ---
>> When running virtualized, scheduling in the host would also constitute
>> long latency events. I wonder whether, to compensate for that, we'd want
>> more than 3 "base" iterations, as I would expect scheduling events to
>> occur more frequently than e.g. SMI (and with a higher probability of
>> multiple ones occurring in close succession).
>=20
> That's hard to tell, maybe we should make the base iteration count
> settable from the command line?

As a last resort (if people observe problems) - maybe. It's not clear to me
though on what basis an admin would choose another value.

Jan



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 12:38:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 12:38:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289021.490300 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSeWx-0001VZ-0V; Fri, 11 Mar 2022 12:38:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289021.490300; Fri, 11 Mar 2022 12:38:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSeWw-0001VS-Tc; Fri, 11 Mar 2022 12:38:02 +0000
Received: by outflank-mailman (input) for mailman id 289021;
 Fri, 11 Mar 2022 12:38:01 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=3DNt=TW=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nSeWv-0001VM-Iv
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 12:38:01 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 15d53f51-a138-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 13:38:00 +0100 (CET)
Received: from EUR03-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur03lp2052.outbound.protection.outlook.com [104.47.10.52]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-15-pNi0s382NuK90YUykX2Sjw-1; Fri, 11 Mar 2022 13:37:58 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM9PR04MB7540.eurprd04.prod.outlook.com (2603:10a6:20b:283::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar
 2022 12:37:56 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.022; Fri, 11 Mar 2022
 12:37:56 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 15d53f51-a138-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647002279;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=lzNu+bRrUNWSJ/j3o3FwQ3DbRXe2DBMKx3ah6WH7m+I=;
	b=QKrt1p0ayymisGaKAqXVCgvCKcQG8EIBAwTRSLCNkBVvMbHua1EkIpMu+GpypOKDs+iTV+
	pbghl3mI3b5rBeVhTgareFvPmsOGFRfalg+qSwAhy2k8iw7GPaU2sEusdS7GppLYkSVxr9
	XahzbF592WzceoZliXsUNcNz1Lqwb1I=
X-MC-Unique: pNi0s382NuK90YUykX2Sjw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ePIlFrKfa0KkJ7NsVu8zlu/E87h3pvNct/moFJtmYpRrnqcipbKqTkMnicz2gwD7xbuauwCSWcRtqm4o+P5HFO0E7s3LgLIK2xQXER97gutajN0uVGuft6U6bdFexwz6Uc74fkfswN1lHNxywtwB6kQhAWD0Yg5MfM8ibF3UOuxtOq1+yL+sVKV2FtoEeyNwf0pkiQMrurKQ3+UCM4kQoiAQfFeC26gJRnXkDypbHpwosVVbCbVNxrcbMJSxijdDaJ9PoxwQb/Rj5ThXP/p5pGGT5AloevYnlYl+7nH5qFOa1QCsVj0iDWBAEtl6gBR+CK3jeYJ/LHqHnPchumaI1g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=osJgQ04+5b1DULiWJsGepETs843ARAuaf1ZfKY+1yj0=;
 b=AEJJM/ifOIe6aABc/t2wae+RqtGgCIPDImmFqKEdyg4Sq7KkzCc0DtdF0AvNDT7i2pR0LVgnpep5pOGje+W2V+Zy0acuGhu7HjMHw7bgKrqYSGTXRRwKraDkTD56sRP2mcv7Ta1UZiYd9ZnA9cMtWVVqYQDJaap9iuY8QvPur7jKgxtqXguvLyCNZyV5r4osm4dE+ZeTJZiCksQx8SslhiyHOTndQLcJCjrrFDrkCY8nkUnb3rzZPg4OcnV22yBk1ehMhzSLt3YBOurbo7aBCas1M8GG7s94+SPo6Osp504oZqcx5y8X+Ey+YNmVUhBjtxT3g+ZTKCF3LV0MycAfAA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <44a6db86-e49c-b820-b397-09769c198959@suse.com>
Date: Fri, 11 Mar 2022 13:37:54 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH v3] x86/build: use --orphan-handling linker option if
 available
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
Content-Language: en-US
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR0301CA0046.eurprd03.prod.outlook.com
 (2603:10a6:20b:469::6) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 3a2424ad-790e-4920-9962-08da035bf7fa
X-MS-TrafficTypeDiagnostic: AM9PR04MB7540:EE_
X-Microsoft-Antispam-PRVS:
	<AM9PR04MB75400DE1750E02582CE3112FB30C9@AM9PR04MB7540.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(86362001)(54906003)(6916009)(66946007)(31696002)(6506007)(316002)(83380400001)(66476007)(38100700002)(66556008)(84970400001)(4326008)(8676002)(6512007)(2906002)(30864003)(36756003)(2616005)(31686004)(6486002)(5660300002)(26005)(966005)(8936002)(186003)(508600001)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?6glTOF5VbtJVHiwpiw5cVl6lxsODVg6mJu6M1hBlRs96Uq69HWAFwR0U8WfY?=
 =?us-ascii?Q?w5al2Dhvgp3QHytzRrsx/tmmjDFRXbKgM9XuiAjFTPgUaFDkyxmGzaPf88yF?=
 =?us-ascii?Q?5Bfb/F0+icImlwxtI3yabMPb0S0hA6s7qPbtUP3gggqdnz5sKf4G41XfpIvH?=
 =?us-ascii?Q?10Ih+e9/+UTsQ6s+sr+HgzpTu49+Hif8GFNWNmmu77NlojygG2gW9xRBW4FS?=
 =?us-ascii?Q?v29AEP/kO9ak4w2N5g+5LVdwj7CY1fILi2rwpEx/7pD+Hen0srwj5rfdTZoc?=
 =?us-ascii?Q?4yYJQnIQUG/ZfMpqgc63iDBfw0KL957jqjGoF2EAz7xO05GEpS6cZTR9O2ig?=
 =?us-ascii?Q?xo0HjSz9SoBuh5/tLcyWM7FLnH6K0YP6NXJY8VgRjfL2haU4p7BI4QrNejpr?=
 =?us-ascii?Q?SaErLOcIdRP/8a36sUtFhdJo2fSgqE6Ra23R9AwWzTbSnNeMQ/qirWQXT52y?=
 =?us-ascii?Q?AUWtfvPux1VRV1LcVk2owzsJhmXUIcxcn69pU7hRypMZrIzORCN+apkWAplE?=
 =?us-ascii?Q?PSZmjDk7igIsv2BVW/jWt8v77Ig3aD7OfO+p23kZJuS9PvlXV6kL7B0kDQ+Z?=
 =?us-ascii?Q?EfCU+E7yUj+9DQMAXHjsTfaPNdv/bOwb7Jv9vit+CTVwkBZEAg5nHBFNwP66?=
 =?us-ascii?Q?q+e8wXxPQW/PslbRw1Dffgkgme4vr/77V/IYibrxRyrNG3BkI/uygvv3LUsh?=
 =?us-ascii?Q?j216zIX7VouYK71B3cuXmehwSEd8AYISD/IrJ1dUkImCBCHKcxVRSSMRqRZO?=
 =?us-ascii?Q?PzhhucBUTwKx68x23bBX4tSr1oDLPYz0YN9rVOHa24f1a9prUQ/hEOKOOKH9?=
 =?us-ascii?Q?JuZJLxd3xPJsPEQIIp8/OhWR4Rcp4pl1Hyf668w8DrHfqlZApCMF4frSMy+i?=
 =?us-ascii?Q?d5o0GtHw1TDrgKTFuC5/5Fq76W4qW2UgmrU43d4we6N+s4iipjVG5DTysf36?=
 =?us-ascii?Q?jdp30ADt87Iaj08BUahSEnsxZc6z5WEkam6u0Je8ZtL2ceunVOLgjaQ+m2e4?=
 =?us-ascii?Q?xuz2fF0yQkLPGqauRFc6J+wfVQmNC/ylNlMPDAczGCgU3NLaSPXg3hv01+/5?=
 =?us-ascii?Q?E1lFKwEzHyl29vfZVgFEYAZn5si8YrKJMqA6pqTh0F+r+LE6AEeW+mRUcuMf?=
 =?us-ascii?Q?WbQ2sVjKoLbrhyo80p5tSC1ifnnvIy+IkqSR7R8RqvE6vZ2wHMpK78ORdunE?=
 =?us-ascii?Q?ayilgQFY/4yx2VW3CLD3BWMz/MbOZXqG9YvoEjnV2buM8x5vjDT+UN1pzcjZ?=
 =?us-ascii?Q?y8WKBtBqNqpOiADZrCyV6FyWXxOKTPgFJxTp/tbbIbfzA5chfuuLijiIzlIS?=
 =?us-ascii?Q?zYKh3cawiPMvTMPNX9jPfJHwkaov7eh5NfX2SEw7cQF0BAmi1RnserNfpQFt?=
 =?us-ascii?Q?GYH2yQwMKsh8BvOZuxxyqiKMpLjlUpWcK/JjbIEBu0z+W8h74cu+hYROysCN?=
 =?us-ascii?Q?XlvKIPMEeWfXtSoP0hrrJ0osZ0imeMOJ?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3a2424ad-790e-4920-9962-08da035bf7fa
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 12:37:56.5055
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 6ufMzJFvN3ZR2vKumr2XBoDk6GPNx53z/ouZQ4BhDRzfABeuz3A8+A+Akca4sBfaSvtk/D4IWEJpr9b6ONcJvQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR04MB7540

As was e.g. making necessary 4b7fd8153ddf ("x86: fold sections in final
binaries"), arbitrary sections appearing without our linker script
placing them explicitly can be a problem. Have the linker make us aware
of such sections, so we would know that the script needs adjusting.

To deal with the resulting warnings:
- Retain .note.* explicitly for ELF, and discard all of them (except the
  earlier consumed .note.gnu.build-id) for PE/COFF.
- Have explicit statements for .got, .plt, and alike and add assertions
  that they're empty. No output sections will be created for these as
  long as they remain empty (or else the assertions would cause early
  failure anyway).
- Collect all .rela.* into a single section, with again an assertion
  added for the resulting section to be empty.
- Extend the enumerating of .debug_* to ELF. Note that for Clang adding
  of .debug_macinfo is necessary. Amend this by its Dwarf5 counterpart,
  .debug_macro, then as well (albeit more may need adding for full
  coverage).

Suggested-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>
Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
v3: Extend a comment. Add comment ahead of .note.Xen.
v2: Don't use (NOLOAD) for ELF; it has undocumented (and unhelpful)
    behavior with GNU ld there. Also place .{sym,str,shstr}tab for LLVM
    ld.
---
I would have wanted to make this generic (by putting it in
xen/Makefile), but the option cannot be added to LDFLAGS, or else
there'll be a flood of warnings with $(LD) -r. (Besides, adding to
LDFLAGS would mean use of the option on every linker pass rather than
just the last one.)

Retaining of .note in xen-syms is under question. Plus if we want to
retain all notes, the question is whether they wouldn't better go into
.init.rodata. But .note.gnu.build-id shouldn't move there, and when
notes are discontiguous all intermediate space will also be assigned to
the NOTE segment, thus making the contents useless for tools going just
by program headers.

Newer Clang may require yet more .debug_* to be added. I've only played
with versions 5 and 7 so far.

Unless we would finally drop all mentioning of Stabs sections, we may
want to extend to there what is done for Dwarf here (allowing the EFI
conditional around the section to also go away).

See also https://sourceware.org/pipermail/binutils/2022-March/119922.html.

--- a/xen/arch/x86/Makefile
+++ b/xen/arch/x86/Makefile
@@ -119,6 +119,8 @@ syms-warn-dup-y :=3D --warn-dup
 syms-warn-dup-$(CONFIG_SUPPRESS_DUPLICATE_SYMBOL_WARNINGS) :=3D
 syms-warn-dup-$(CONFIG_ENFORCE_UNIQUE_SYMBOLS) :=3D --error-dup
=20
+orphan-handling-$(call ld-option,--orphan-handling=3Dwarn) +=3D --orphan-h=
andling=3Dwarn
+
 $(TARGET): TMP =3D $(@D)/.$(@F).elf32
 $(TARGET): $(TARGET)-syms $(efi-y) $(obj)/boot/mkelf32
 	$(obj)/boot/mkelf32 $(notes_phdrs) $(TARGET)-syms $(TMP) $(XEN_IMG_OFFSET=
) \
@@ -145,7 +147,7 @@ $(TARGET)-syms: $(BASEDIR)/prelink.o $(o
 		>$(@D)/.$(@F).1.S
 	$(MAKE) $(build)=3D$(@D) $(@D)/.$(@F).1.o
 	$(LD) $(XEN_LDFLAGS) -T $(obj)/xen.lds -N $< $(build_id_linker) \
-	    $(@D)/.$(@F).1.o -o $@
+	    $(orphan-handling-y) $(@D)/.$(@F).1.o -o $@
 	$(NM) -pa --format=3Dsysv $(@D)/$(@F) \
 		| $(BASEDIR)/tools/symbols --all-symbols --xensyms --sysv --sort \
 		>$(@D)/$(@F).map
@@ -219,7 +221,7 @@ endif
 		| $(BASEDIR)/tools/symbols $(all_symbols) --sysv --sort >$(@D)/.$(@F).1s=
.S
 	$(MAKE) $(build)=3D$(@D) .$(@F).1r.o .$(@F).1s.o
 	$(LD) $(call EFI_LDFLAGS,$(VIRT_BASE)) -T $(obj)/efi.lds -N $< \
-	                $(@D)/.$(@F).1r.o $(@D)/.$(@F).1s.o $(note_file_option) -=
o $@
+	      $(@D)/.$(@F).1r.o $(@D)/.$(@F).1s.o $(orphan-handling-y) $(note_fil=
e_option) -o $@
 	$(NM) -pa --format=3Dsysv $(@D)/$(@F) \
 		| $(BASEDIR)/tools/symbols --all-symbols --xensyms --sysv --sort >$(@D)/=
$(@F).map
 	rm -f $(@D)/.$(@F).[0-9]* $(@D)/..$(@F).[0-9]*
--- unstable.orig/xen/arch/x86/xen.lds.S	2022-03-04 08:31:54.000000000 +010=
0
+++ unstable/xen/arch/x86/xen.lds.S	2022-03-11 13:34:39.006859853 +0100
@@ -12,6 +12,13 @@
 #undef __XEN_VIRT_START
 #define __XEN_VIRT_START __image_base__
 #define DECL_SECTION(x) x :
+/*
+ * Use the NOLOAD directive, despite currently ignored by (at least) GNU l=
d
+ * for PE output, in order to record that we'd prefer these sections to no=
t
+ * be loaded into memory.
+ */
+#define DECL_DEBUG(x, a) #x ALIGN(a) (NOLOAD) : { *(x) }
+#define DECL_DEBUG2(x, y, a) #x ALIGN(a) (NOLOAD) : { *(x) *(y) }
=20
 ENTRY(efi_start)
=20
@@ -19,6 +26,8 @@ ENTRY(efi_start)
=20
 #define FORMAT "elf64-x86-64"
 #define DECL_SECTION(x) #x : AT(ADDR(#x) - __XEN_VIRT_START)
+#define DECL_DEBUG(x, a) #x 0 : { *(x) }
+#define DECL_DEBUG2(x, y, a) #x 0 : { *(x) *(y) }
=20
 ENTRY(start_pa)
=20
@@ -158,6 +167,10 @@ SECTIONS
   } PHDR(text)
=20
 #if defined(CONFIG_PVH_GUEST) && !defined(EFI)
+  /*
+   * In principle this should be fine to live in .note (below), but let's =
keep
+   * it separate in case anyone decided to find these notes by section nam=
e.
+   */
   DECL_SECTION(.note.Xen) {
       *(.note.Xen)
   } PHDR(note) PHDR(text)
@@ -185,6 +198,13 @@ SECTIONS
 #endif
 #endif
=20
+#ifndef EFI
+  /* Retain these just for the purpose of possible analysis tools. */
+  DECL_SECTION(.note) {
+       *(.note.*)
+  } PHDR(note) PHDR(text)
+#endif
+
   _erodata =3D .;
=20
   . =3D ALIGN(SECTION_ALIGN);
@@ -272,6 +292,34 @@ SECTIONS
        __ctors_end =3D .;
   } PHDR(text)
=20
+#ifndef EFI
+  /*
+   * With --orphan-sections=3Dwarn (or =3Derror) we need to handle certain=
 linker
+   * generated sections.  These are all expected to be empty; respective
+   * ASSERT()s can be found towards the end of this file.  Put them in the
+   * text program header, just to be on the safe side against e.g. a linke=
r
+   * otherwise chosing to put them in a separate one.
+   */
+  DECL_SECTION(.got) {
+       *(.got)
+  } PHDR(text)
+  DECL_SECTION(.got.plt) {
+       *(.got.plt)
+  } PHDR(text)
+  DECL_SECTION(.igot.plt) {
+       *(.igot.plt)
+  } PHDR(text)
+  DECL_SECTION(.iplt) {
+       *(.iplt)
+  } PHDR(text)
+  DECL_SECTION(.plt) {
+       *(.plt)
+  } PHDR(text)
+  DECL_SECTION(.rela) {
+       *(.rela.*)
+  } PHDR(text)
+#endif
+
   . =3D ALIGN(SECTION_ALIGN);
   __init_end =3D .;
   __2M_init_end =3D .;
@@ -324,71 +372,6 @@ SECTIONS
     *(.reloc)
     __base_relocs_end =3D .;
   }
-  /*
-   * Explicitly list debug section for the PE output so that they don't en=
d
-   * up at VA 0 which is below image base and thus invalid. Also use the
-   * NOLOAD directive, despite currently ignored by ld for PE output, in
-   * order to record that we'd prefer these sections to not be loaded into
-   * memory.
-   *
-   * Note that we're past _end here, so if these sections get loaded they'=
ll
-   * be discarded at runtime anyway.
-   */
-  .debug_abbrev ALIGN(1) (NOLOAD) : {
-     *(.debug_abbrev)
-  }
-  .debug_info ALIGN(1) (NOLOAD) : {
-    *(.debug_info)
-    *(.gnu.linkonce.wi.*)
-  }
-  .debug_types ALIGN(1) (NOLOAD) : {
-    *(.debug_types)
-  }
-  .debug_str ALIGN(1) (NOLOAD) : {
-    *(.debug_str)
-  }
-  .debug_line ALIGN(1) (NOLOAD) : {
-    *(.debug_line)
-    *(.debug_line.*)
-  }
-  .debug_line_str ALIGN(1) (NOLOAD) : {
-    *(.debug_line_str)
-  }
-  .debug_names ALIGN(4) (NOLOAD) : {
-    *(.debug_names)
-  }
-  .debug_frame ALIGN(4) (NOLOAD) : {
-    *(.debug_frame)
-  }
-  .debug_loc ALIGN(1) (NOLOAD) : {
-    *(.debug_loc)
-  }
-  .debug_loclists ALIGN(4) (NOLOAD) : {
-    *(.debug_loclists)
-  }
-  .debug_ranges ALIGN(8) (NOLOAD) : {
-    *(.debug_ranges)
-  }
-  .debug_rnglists ALIGN(4) (NOLOAD) : {
-    *(.debug_rnglists)
-  }
-  .debug_addr ALIGN(8) (NOLOAD) : {
-    *(.debug_addr)
-  }
-  .debug_aranges ALIGN(1) (NOLOAD) : {
-    *(.debug_aranges)
-  }
-  .debug_pubnames ALIGN(1) (NOLOAD) : {
-    *(.debug_pubnames)
-  }
-  .debug_pubtypes ALIGN(1) (NOLOAD) : {
-    *(.debug_pubtypes)
-  }
-  /* Trick the linker into setting the image size to no less than 16Mb. */
-  __image_end__ =3D .;
-  .pad ALIGN(__section_alignment__) : {
-    . =3D __image_end__ < __image_base__ + MB(16) ? ALIGN(MB(16)) : .;
-  }
 #elif defined(XEN_BUILD_EFI)
   /*
    * Due to the way EFI support is currently implemented, these two symbol=
s
@@ -403,6 +386,42 @@ SECTIONS
   efi =3D .;
 #endif
=20
+  /*
+   * Explicitly list debug sections, first of all to avoid these sections =
being
+   * viewed as "orphan" by the linker.
+   *
+   * For the PE output this is further necessary so that they don't end up=
 at
+   * VA 0, which is below image base and thus invalid.  Note that we're pa=
st
+   * _end here, so if these sections get loaded they'll be discarded at ru=
ntime
+   * anyway.
+   */
+  DECL_DEBUG(.debug_abbrev, 1)
+  DECL_DEBUG2(.debug_info, .gnu.linkonce.wi.*, 1)
+  DECL_DEBUG(.debug_types, 1)
+  DECL_DEBUG(.debug_str, 1)
+  DECL_DEBUG2(.debug_line, .debug_line.*, 1)
+  DECL_DEBUG(.debug_line_str, 1)
+  DECL_DEBUG(.debug_names, 4)
+  DECL_DEBUG(.debug_frame, 4)
+  DECL_DEBUG(.debug_loc, 1)
+  DECL_DEBUG(.debug_loclists, 4)
+  DECL_DEBUG(.debug_macinfo, 1)
+  DECL_DEBUG(.debug_macro, 1)
+  DECL_DEBUG(.debug_ranges, 8)
+  DECL_DEBUG(.debug_rnglists, 4)
+  DECL_DEBUG(.debug_addr, 8)
+  DECL_DEBUG(.debug_aranges, 1)
+  DECL_DEBUG(.debug_pubnames, 1)
+  DECL_DEBUG(.debug_pubtypes, 1)
+
+#ifdef EFI
+  /* Trick the linker into setting the image size to no less than 16Mb. */
+  __image_end__ =3D .;
+  .pad ALIGN(__section_alignment__) : {
+    . =3D __image_end__ < __image_base__ + MB(16) ? ALIGN(MB(16)) : .;
+  }
+#endif
+
 #ifdef CONFIG_HYPERV_GUEST
   hv_hcall_page =3D ABSOLUTE(HV_HCALL_PAGE - XEN_VIRT_START + __XEN_VIRT_S=
TART);
 #endif
@@ -423,8 +442,7 @@ SECTIONS
 #ifdef EFI
        *(.comment)
        *(.comment.*)
-       *(.note.Xen)
-       *(.note.gnu.*)
+       *(.note.*)
 #endif
   }
=20
@@ -437,6 +455,13 @@ SECTIONS
   .stab.index 0 : { *(.stab.index) }
   .stab.indexstr 0 : { *(.stab.indexstr) }
   .comment 0 : { *(.comment) }
+  /*
+   * LLVM ld also wants .symtab, .strtab, and .shstrtab placed. These look=
 to
+   * be benign to GNU ld, so we can have them here unconditionally.
+   */
+  .symtab 0 : { *(.symtab) }
+  .strtab 0 : { *(.strtab) }
+  .shstrtab 0 : { *(.shstrtab) }
 #endif
 }
=20
@@ -470,6 +495,15 @@ ASSERT(IS_ALIGNED(trampoline_end,   4),
 ASSERT(IS_ALIGNED(__bss_start,      8), "__bss_start misaligned")
 ASSERT(IS_ALIGNED(__bss_end,        8), "__bss_end misaligned")
=20
+#ifndef EFI
+ASSERT(!SIZEOF(.got),      ".got non-empty")
+ASSERT(!SIZEOF(.got.plt),  ".got.plt non-empty")
+ASSERT(!SIZEOF(.igot.plt), ".igot.plt non-empty")
+ASSERT(!SIZEOF(.iplt),     ".iplt non-empty")
+ASSERT(!SIZEOF(.plt),      ".plt non-empty")
+ASSERT(!SIZEOF(.rela),     "leftover relocations")
+#endif
+
 ASSERT((trampoline_end - trampoline_start) < TRAMPOLINE_SPACE - MBI_SPACE_=
MIN,
     "not enough room for trampoline and mbi data")
 ASSERT((wakeup_stack - wakeup_stack_start) >=3D WAKEUP_STACK_MIN,



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 13:21:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 13:21:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289028.490311 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSfCn-0006Zp-CF; Fri, 11 Mar 2022 13:21:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289028.490311; Fri, 11 Mar 2022 13:21:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSfCn-0006Zi-9B; Fri, 11 Mar 2022 13:21:17 +0000
Received: by outflank-mailman (input) for mailman id 289028;
 Fri, 11 Mar 2022 13:21:15 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=bq6s=TW=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nSfCl-0006Zc-5j
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 13:21:15 +0000
Received: from NAM04-BN8-obe.outbound.protection.outlook.com
 (mail-bn8nam08on2061b.outbound.protection.outlook.com
 [2a01:111:f400:7e8d::61b])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 1e2728db-a13e-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 14:21:12 +0100 (CET)
Received: from SN4PR0401CA0020.namprd04.prod.outlook.com
 (2603:10b6:803:21::30) by DM5PR02MB2441.namprd02.prod.outlook.com
 (2603:10b6:3:46::13) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.29; Fri, 11 Mar
 2022 13:21:08 +0000
Received: from SN1NAM02FT0024.eop-nam02.prod.protection.outlook.com
 (2603:10b6:803:21:cafe::26) by SN4PR0401CA0020.outlook.office365.com
 (2603:10b6:803:21::30) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.20 via Frontend
 Transport; Fri, 11 Mar 2022 13:21:08 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (149.199.80.198) by
 SN1NAM02FT0024.mail.protection.outlook.com (10.97.5.147) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 13:21:08 +0000
Received: from xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Fri, 11 Mar 2022 13:21:06 +0000
Received: from smtp.xilinx.com (172.21.105.198) by
 xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Fri, 11 Mar 2022 13:21:03 +0000
Received: from [10.71.118.106] (port=50548)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nSfCX-0003ny-Hc; Fri, 11 Mar 2022 13:21:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1e2728db-a13e-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=b+hx8picdgtl7Ei59bbHggVQlwZSfmUqrvzTBjWZwLlq59LFUrsPEMlNjrxodGCyDVUZCZe1qzO5DfFJ6zLLMdCdlUx7wYrx36a2Yhp4+tupgXIOmGQkIfzO6IggBqdN2spa6dQL23VemyQ5U/pyN5hISuSuysEYdMLmtQTHYqajZ/GVOWoidHRRmNmhTgez0mXNqPI+InPDeUrWwmYK13lJAQFZtfMtMT7ohlVsAIlv3fZwpRLsJk0U18A/zLPJb33/Rs6RTBeKyHkf4Yvg7O4t6H0R512XHpfLCIfae80eoO3lBb0TwE803vPz4CZEoKajgD+C8LkkhlZIZRvrHQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=K+k1d2AlhUFlWXWJZs1e/Mul6hrSF5nctiIMio6BAy4=;
 b=LC4itbbNQXbrZ9SvfrYhCGcKgD8njJGnHUleGfQQYCCaI6VRb5Hl0VrFw8uQdscgqgC7rTfqntq5vmrz+W7V6LEdaWEe/bV2hOp0on9AZ7KQks1G2G+7cNA+BbLFSBetWK8ncpwEhmtBmR8RYrLMnS5y6Gg67pank7aVN48GdNwkqYwkIyqFalpliBniUpJrrPTeGYalkj1fXQb7WQxhSnfhPWcFcJsAVVsU+OnDpfd2Cl+HAlokiw821ewf1DFrHE5H8Xg3YouPolLozP9gRfxl0Mu1KEPdbOrsasxkd07okbSzK9eR7aLWKGhHdn3SDp0tlgmPqP3QheNFXb/LeQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=kernel.org smtp.mailfrom=xilinx.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=xilinx.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=K+k1d2AlhUFlWXWJZs1e/Mul6hrSF5nctiIMio6BAy4=;
 b=ixCADxwRMRKGe/KzxRo8a+1mqymVUO2wMAdZNWslF3wp0lkE2ACj+K9PftpvlXis1Kpi66xKVBkRl0pr/q/4PkAYj7RqJwSHX5bKrpo7mfT9zJrEkCCPGrvTJ8ssi7kvIsqNTe6BABjNXHtF98Z7+fqDndWxyTkEbeYFdGk4ulg=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch01.xlnx.xilinx.com;
Message-ID: <347bda39-2eed-6139-222d-3924bf286f08@xilinx.com>
Date: Fri, 11 Mar 2022 13:21:00 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Subject: Re: [XEN v10 4/4] xen/arm64: io: Handle data abort due to cache
 maintenance instructions
To: Stefano Stabellini <sstabellini@kernel.org>, Ayan Kumar Halder
	<ayan.kumar.halder@xilinx.com>
CC: <xen-devel@lists.xenproject.org>, <stefanos@xilinx.com>, <julien@xen.org>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>
References: <20220310174501.62040-1-ayankuma@xilinx.com>
 <20220310174501.62040-5-ayankuma@xilinx.com>
 <alpine.DEB.2.22.394.2203101813030.3261@ubuntu-linux-20-04-desktop>
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
In-Reply-To: <alpine.DEB.2.22.394.2203101813030.3261@ubuntu-linux-20-04-desktop>
Content-Type: text/plain; charset="UTF-8"; format=flowed
Content-Transfer-Encoding: 8bit
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5c3f42f2-6c29-4e8b-8320-08da036200f0
X-MS-TrafficTypeDiagnostic: DM5PR02MB2441:EE_
X-Microsoft-Antispam-PRVS:
	<DM5PR02MB244119C260B8167BDBBF026CB20C9@DM5PR02MB2441.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	ZeezdIP/xvC+uqPqjMpIgJSPpft0M8T5Owxg2mLMVgYVaMvXx5atavg09Ig1GGPwu1J/+bL7DNspnzSndB3czv6TlNvNZMCTT05whENX/4KrqUQZ7astc6UBmjLxEEg/Us03RRbN7x3oakokgZXa4HCCSbobCQUDqD3iQdfAsDv94K3aXOulbG9NeDTnEhdx3CByKif5VDhe5TDeUiQTenzrL5yFkN/WHquoJD8ntcWQq3aakRGw3KBdJQmZvxAOnklUuUHZLDBmGrrlOydt5O2NFUqoHkCRda0oep9AHP490EQr1S/PDU8+kFtB/9seKpIzYkzbCSYvN2x4ZcKzOT6bi1bvl9sycYNejFLFEMaEL/GbUP2w/pW/rbtCf4JNkwA3XQArpe3zj85UIXq8PAXwWf2kg+fuDLZ0KSPkFkngBEGPWOiXo4SqqtkzcieXKRW8RSp+j8TaCcUzEjdMJTkI67eO7xYrD3tJuemQSD6q+wd9SxyaMwvRQTqbHDD0dVwCfDk17OnRhOyLegkcQJyHeGe12nEH8Pvfef5yuSJe0kMUfu3seq9YYRxlQ3aSUUwMXMmiD5bpKqJ0JTfsPnFLg204tQCfha5BVRiey8WLN+qF3/R1ML5vYgJm79wXY8j9F0Owd3rk8vihJYVqh55KjEViPgjNiulpiLPIPl4aO5pTpdPBFMBubTGaKBS9sfZoCdteWggebqI4wP8aSiA22dG37lNi7xpKyB8I4kQ=
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch01.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(356005)(508600001)(31686004)(110136005)(54906003)(316002)(5660300002)(7636003)(8676002)(70586007)(47076005)(36860700001)(4326008)(7416002)(8936002)(70206006)(2616005)(336012)(186003)(26005)(40460700003)(53546011)(83380400001)(9786002)(36756003)(82310400004)(2906002)(426003)(31696002)(50156003)(43740500002);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 13:21:08.0974
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 5c3f42f2-6c29-4e8b-8320-08da036200f0
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch01.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	SN1NAM02FT0024.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR02MB2441

Hi Stefano,

On 11/03/2022 02:25, Stefano Stabellini wrote:
> On Thu, 10 Mar 2022, Ayan Kumar Halder wrote:
>> When the data abort is caused due to cache maintenance for an address,
>> there are three scenarios:-
>>
>> 1. Address belonging to a non emulated region - For this, Xen should
>> set the corresponding bit in the translation table entry to valid and
>> return to the guest to retry the instruction. This can happen sometimes
>> as Xen need to set the translation table entry to invalid. (for eg
>> 'Break-Before-Make' sequence). Xen returns to the guest to retry the
>> instruction.
>>
>> 2. Address belongs to an emulated region - Xen should ignore the
>> instruction (ie increment the PC) and return to the guest.
>>
>> 3. Address is invalid - Xen should forward the data abort to the guest.
>>
>> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
>> ---
>>
>> Changelog:-
>>
>> v1...v8 - NA
>>
>> v9 - Extracted this change from "[XEN v7 2/2] xen/arm64: io: Support
>> instructions (for which ISS is not ..." into a separate patch of its
>> own. The reason being this addresses an existing bug in the codebase.
>>
>> v10 - 1. To check if the address belongs to an emulated region, one
>> needs to check if it has a mmio handler or an ioreq server. In this
>> case, Xen should increment the PC
>> 2. If the address is invalid (niether emulated MMIO nor the translation
>> could be resolved via p2m or mapping the MMIO region), then Xen should
>> forward the abort to the guest.
>>
>>   xen/arch/arm/include/asm/mmio.h |  1 +
>>   xen/arch/arm/io.c               | 20 ++++++++++++++++++++
>>   xen/arch/arm/ioreq.c            | 15 ++++++++++++++-
>>   3 files changed, 35 insertions(+), 1 deletion(-)
>>
>> diff --git a/xen/arch/arm/include/asm/mmio.h b/xen/arch/arm/include/asm/mmio.h
>> index ca259a79c2..79e64d9af8 100644
>> --- a/xen/arch/arm/include/asm/mmio.h
>> +++ b/xen/arch/arm/include/asm/mmio.h
>> @@ -35,6 +35,7 @@ enum instr_decode_state
>>        * instruction.
>>        */
>>       INSTR_LDR_STR_POSTINDEXING,
>> +    INSTR_CACHE,                    /* Cache Maintenance instr */
>>   };
>>   
>>   typedef struct
>> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
>> index e6c77e16bf..c5b2980a5f 100644
>> --- a/xen/arch/arm/io.c
>> +++ b/xen/arch/arm/io.c
>> @@ -139,6 +139,17 @@ void try_decode_instruction(const struct cpu_user_regs *regs,
>>           return;
>>       }
>>   
>> +    /*
>> +     * When the data abort is caused due to cache maintenance, Xen should check
>> +     * if the address belongs to an emulated MMIO region or not. The behavior
>> +     * will differ accordingly.
>> +     */
>> +    if ( info->dabt.cache )
>> +    {
>> +        info->dabt_instr.state = INSTR_CACHE;
>> +        return;
>> +    }
>> +
>>       /*
>>        * Armv8 processor does not provide a valid syndrome for decoding some
>>        * instructions. So in order to process these instructions, Xen must
>> @@ -177,6 +188,15 @@ enum io_state try_handle_mmio(struct cpu_user_regs *regs,
>>           return rc;
>>       }
>>   
>> +    /*
>> +     * When the data abort is caused due to cache maintenance and the address
>> +     * belongs to an emulated region, Xen should ignore this instruction.
>> +     */
>> +    if ( info->dabt_instr.state == INSTR_CACHE )
>> +    {
>> +        return IO_HANDLED;
>> +    }
>>       /*
>>        * At this point, we know that the instruction is either valid or has been
>>        * decoded successfully. Thus, Xen should be allowed to execute the
>> diff --git a/xen/arch/arm/ioreq.c b/xen/arch/arm/ioreq.c
>> index cc9bf23213..0dd2d452f7 100644
>> --- a/xen/arch/arm/ioreq.c
>> +++ b/xen/arch/arm/ioreq.c
>> @@ -29,10 +29,14 @@ enum io_state handle_ioserv(struct cpu_user_regs *regs, struct vcpu *v)
>>       const struct hsr_dabt dabt = hsr.dabt;
>>       /* Code is similar to handle_read */
>>       register_t r = v->io.req.data;
>> +    const struct instr_details instr = v->io.info.dabt_instr;
>>   
>>       /* We are done with the IO */
>>       v->io.req.state = STATE_IOREQ_NONE;
>>   
>> +    if ( instr.state == INSTR_CACHE )
>> +        return IO_HANDLED;
> It might be possible to get rid of this check here by rearranging the
> code in try_handle_mmio a little bit so that handle_ioserv is not called
> when INSTR_CACHE. But I don't have an opinion about it.

AFAIU, we need to invoke ioreq_server_select()  to determine if there is 
a ioreq server for the faulting gpa. If so, then we know that the 
address is emulated. I think what you are suggesting is to check this 
before invoking try_fwd_ioserv() in try_handle_mmio().

If so, the code will look like this :-

enum io_state try_handle_mmio(struct cpu_user_regs *regs,
                               mmio_info_t *info)
{
     struct vcpu *v = current;
     const struct mmio_handler *handler = NULL;
     int rc;

     ASSERT(info->dabt.ec == HSR_EC_DATA_ABORT_LOWER_EL);

     if ( !info->dabt.valid )
     {
         ASSERT_UNREACHABLE();
         return IO_ABORT;
     }

     handler = find_mmio_handler(v->domain, info->gpa);
     if ( !handler )
     {

#ifdef CONFIG_IOREQ_SERVER

     struct vcpu_io *vio = &v->io;
     const struct instr_details instr = info->dabt_instr;
     struct hsr_dabt dabt = info->dabt;
     ioreq_t p = {
         .type = IOREQ_TYPE_COPY,
         .addr = info->gpa,
         .size = 1 << info->dabt.size,
         .count = 1,
         .dir = !info->dabt.write,
         /*
          * On x86, df is used by 'rep' instruction to tell the direction
          * to iterate (forward or backward).
          * On Arm, all the accesses to MMIO region will do a single
          * memory access. So for now, we can safely always set to 0.
          */
         .df = 0,
         .data = get_user_reg(regs, info->dabt.reg),
         .state = STATE_IOREQ_READY,
     };
     struct ioreq_server *s = NULL;
     enum io_state rc;

     if ( vio->req.state != STATE_IOREQ_NONE )
     {
         gdprintk(XENLOG_ERR, "wrong state %u\n", vio->req.state);
         return IO_ABORT;
     }

     s = ioreq_server_select(v->domain, &p);
     if ( !s )
         return IO_UNHANDLED;

     if ( instr.state == INSTR_CACHE )
     {
         return IO_HANDLED;
     }

     rc = try_fwd_ioserv(vio, &p, s);
     if ( rc == IO_HANDLED )
         return handle_ioserv(regs, v);

#endif
         return rc;
     }

I am not be inclined to have "#ifdef CONFIG_IOREQ_SERVER" in 
xen/xen/arch/arm/io.c as the file is generic.

- Ayan

>
> The patch does what it says on the tin and as far as I can tell followed
> Julien's requests so:
>
> Reviewed-by: Stefano Stabellini <sstabellini@kernel.org>


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 13:28:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 13:28:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289032.490322 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSfK4-0007Ft-58; Fri, 11 Mar 2022 13:28:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289032.490322; Fri, 11 Mar 2022 13:28:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSfK4-0007Fm-1x; Fri, 11 Mar 2022 13:28:48 +0000
Received: by outflank-mailman (input) for mailman id 289032;
 Fri, 11 Mar 2022 13:28:47 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=3DNt=TW=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nSfK3-0007Fg-HP
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 13:28:47 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2d68e693-a13f-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 14:28:46 +0100 (CET)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur01lp2057.outbound.protection.outlook.com [104.47.0.57]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-39-yCitXWhaNTaPuZK36NXK1Q-1; Fri, 11 Mar 2022 14:28:45 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by HE1PR0401MB2569.eurprd04.prod.outlook.com (2603:10a6:3:7c::7) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar
 2022 13:28:43 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.022; Fri, 11 Mar 2022
 13:28:42 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2d68e693-a13f-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647005326;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=oB9UyoUTlYD7+jOARvtGocxIQ/b7yV0YHAi0kIcsud0=;
	b=bjjeT33WbtJms+PnDPcFu3LUPsPFlUeFCu3lDTEBTUGxUfLDAeUQLbCWbZSmhH528fm8/i
	0LdtX3CzFrn6Rsf5HSsr0gwiGGJ3cAT/IAo6A7gJo5Q5/Ll0Xwl9MXyev+3sGCBbeEKpma
	NKfsUwtQHJAm8+DgmkY4hjKmWG4cGt0=
X-MC-Unique: yCitXWhaNTaPuZK36NXK1Q-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=nYJVjNXBBJdwj6kC0B8Yr+BQgQ6HAllLUvQufDBT0YFZcG6q6mMNCst+fFchvjHGQvb76Fit5p9+9+Wd1MyNkmui0AjaPlg4g8UgbhXXvYqkMy2ulCbYqhWE0hyvotHh/e/uRUoAxibTxEzQn40TGZej0Zjx9h/fpIMqjkBdvvGipnezDwD0p3m91kwlTFjL4GkzCSqBA8T7r6TuDtKSOXbMwbtlt374YhVxQGc4nXsWl4NlHKyoe+EL3p4JXsmijncPgOxXFSSkAzuE7d2V5EZp3KqLSouxaBiW3oGWencgrTW47Obyj0Lz/PGH8rKlEizDrPv7w4m208G5pXnOaA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=oB9UyoUTlYD7+jOARvtGocxIQ/b7yV0YHAi0kIcsud0=;
 b=kZb+zeekyDAP+0pZOtfPEYcRrszixBEJe+WcyhTxpESxrsxed/P+tR3CBs1y4ni37odAbyG1KuphjAjDPt6nuFbtRmR2fsi0uujk2paSfGlK853+CO6CBX0t7KeaPvId0VFGQvtKo0QupMxlYShfJrsFXFdkOcVuXuP7Pdg4kEiykVBdCAdYa4FM/KmyBqNrVf1sk0PlCCF7FUKMEwvdk8IvkDRTJWPVIY5hqaKBAszItZlpg2ZQ3iv8lTQbpcuu2OyCkhrPeICX1eY25rEb9Lmo6+CMCZ4Y8SAJn01I0+D1oYqZ4DSONVozXoLv4vvrKwZ7JVc3+2N/pqT/dl+CEQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <97bebbfa-b5e8-4c57-162f-2a052de92f02@suse.com>
Date: Fri, 11 Mar 2022 14:28:40 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH v2] x86: avoid SORT_BY_INIT_PRIORITY with old GNU ld
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
Content-Language: en-US
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR0301CA0056.eurprd03.prod.outlook.com
 (2603:10a6:20b:469::34) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 7b981e2d-df7d-4d32-3c5e-08da03630f95
X-MS-TrafficTypeDiagnostic: HE1PR0401MB2569:EE_
X-Microsoft-Antispam-PRVS:
	<HE1PR0401MB2569F517B262CAC4FA8A975FB30C9@HE1PR0401MB2569.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6486002)(6506007)(316002)(508600001)(38100700002)(8676002)(66476007)(66556008)(86362001)(66946007)(31696002)(5660300002)(4326008)(8936002)(54906003)(6916009)(2906002)(2616005)(186003)(26005)(31686004)(36756003)(6512007)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?VjJIQXZMWjlJeUpZMlgvUm1ORDlDM1kyWnRiNk5JbUF6bEkwMVRQRTdiaHVx?=
 =?utf-8?B?Y3I4RFNONmdqZEZWS3pCd09nRWhYdU5ickxLUnNjclhwUXppTjJGTHpLelMv?=
 =?utf-8?B?UEpkclppdXFFRzcxaGhCRHB3Qm0rb2N3UkVNNXlUbVQ2R0RUbWU4aW93SmJC?=
 =?utf-8?B?MDZwQmhMVC9IaUtyVUd3L1NhM3lkUUk1SkFPcnhaM21ZajFFUUdFd1BxVjdl?=
 =?utf-8?B?OHR0dEUrR0prTkw5cEFSSnhucExrSUF4ZnJiM1lGcWVFWlJUU0plWUdqUUNW?=
 =?utf-8?B?NTV1ZzZJMms5eUJOUnpXRUVLMFFHNVhPS1JsUnRZVnlLb0cwUjNpbU5XaTB3?=
 =?utf-8?B?ZjdNV0YwS0sraUl6ZWY4N05yNHZIV0hRNlhLQlA2R0hhajREMzZaSXRaYkVz?=
 =?utf-8?B?VDRjU1VNU3JlbFlHWUoyT3F4NlZ5czF4LzNOWmRlNEVtV0ZHMExNbE9zNmly?=
 =?utf-8?B?NHlIdmpucHk0ekNXdVFYQkdwbUFVVVVlZzRnRWI5S3V1SXpZUG12Y01ISkdG?=
 =?utf-8?B?Vlo1M2JZaUJpY2o2cExwREJXbmtiekFrOFBpaEtZeGg0aXdQZDluY1JubjQx?=
 =?utf-8?B?Ukc1ZnM2ZU45SGluWSs5VGJsbFUzQ1NBL2szZkp5VDZJSlV0QXBBYkFqb0pu?=
 =?utf-8?B?TTZOdFNNVXM3cTluckVjeE51eG5Td0dVcytsNVRCakt3SDFGaktPVTRZczJk?=
 =?utf-8?B?Q1kyc0JpWDVQUkhKSXQrR1dsZmV3RWUyNEQrQVE2U0wxOGd4R2gxVlRoYmFo?=
 =?utf-8?B?aEJhbGtNWG1YRGgxUG14NE1kSllIUk91aG5jcndLT0lLd3lZbWt4bThuUCt0?=
 =?utf-8?B?NzYycHZyVGw2UEdoeXc5Tjc2TnFRRlZkU3FUaVQ2TFd0SFJPOE85QmVkUlF4?=
 =?utf-8?B?d1k2UmJSZjRIRzZaOURZcXNEdWNubFpmYXpMVWgvYTVhYUU4WjZRcWY4S1hC?=
 =?utf-8?B?LzBIY2lHSDlvRERpYUJFeXdsUHBIZ2VVVDR2b05CdXZGbUNNaVYrcEduTElC?=
 =?utf-8?B?SEVoU2pYRklUTjRHdzl2dkl2TzJoU2k2K1krQ2xQeFNkWE1KYnZWYmJncUJl?=
 =?utf-8?B?K04vVGkxdnozZ01oNGxkcWN4RkFqUXVpaHUwcFh0cHZsTVZUNXIrSDZzNkVk?=
 =?utf-8?B?Z1ZIN0p1MmNxVVJjZEtKdG00b1duejBRUC96N2JYS1RuLzRFTGhkRzFRSE1G?=
 =?utf-8?B?RElXY3JKZ2FWdE1Ub2FTMGJmSHp0UDAzYXMzdmU0YmNmNGtRTlZNUTlSZ0Fa?=
 =?utf-8?B?WVFCV2czWlZpZzNCTXJ6ZWZmWERnWTlZNmRkeW41MmZQWW9lQlpFN1Q4ZC9q?=
 =?utf-8?B?WVM2MEJmSU5vdWsySEF0a0NYL2xaek1EUXJJRnpjL2JRTDhhRDlaenc5aFg3?=
 =?utf-8?B?V0hwWkQ2MFBWdzJtTW9LUS9sNjRwVlUzWTQvMEgyWHAxb2N6blRWL1IvUTNL?=
 =?utf-8?B?SWpnbXF6NnZXOUpML0RaRWRMemNmbHFRYVIzOGNtWXY2dnZQR21jS2cvc0ZV?=
 =?utf-8?B?bXQ0clN1T1poOC9QYXNSR3FPaWtKSnNGYUk4Zk9jeEQ3MXRFRjVjL1JidnJD?=
 =?utf-8?B?OVpIL0gxQkhkbUFiMzlDTkJxN2o0R1N3bktQbGd5N0RiVXRJZlkrUlY4Vmdt?=
 =?utf-8?B?U1dvRmU4YlN3VzFPNUJsUE43WitTUzFkemtFQ0ZCWVlFOFR2eFB4NUpmVDlK?=
 =?utf-8?B?a0hCR25uZHVienBPaVJ6bFAyZ2IvWVNESG9EeTFpdUJmYk1UUmFxNGxsU0xT?=
 =?utf-8?B?TUM3dFpEZTd3OXAyenM1d3BBU09mOEFrN1gvRk1BcEJUM3pVQUFxNFFZejBT?=
 =?utf-8?B?TWpBamZsdHo0QzZSWHFjTnZ1TTcvU2hTcWNQMmF2T2IzNHF3ZURKbFh0RG5y?=
 =?utf-8?B?enlraGQ0bjA3MExBT1hIcCtMaWpxcXFZanh1dWRiZXVxSXN4Ym41aEg0WTRq?=
 =?utf-8?Q?DG1+pXOz+JR0KC7JROGmkdruTxVDp1+q?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7b981e2d-df7d-4d32-3c5e-08da03630f95
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 13:28:42.6461
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: hW8KFbyFTHy17yP0bUWSwmmVPEu8eZWf2y/Y9lREPLxEXhSnmdIpup3ex8hDSpVZV9znSrQ9IqgGAvs7336Dew==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0401MB2569

Support for this construct was added in 2.22 only. Avoid the need to
introduce logic to probe for linker script capabilities by (ab)using the
probe for a command line option having appeared at about the same time.

Fixes: 4b7fd8153ddf ("x86: fold sections in final binaries")
Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
v2: Always define HAVE_LD_SORT_BY_INIT_PRIORITY when using LLVM ld.

--- a/xen/arch/x86/arch.mk
+++ b/xen/arch/x86/arch.mk
@@ -73,6 +73,16 @@ ifeq ($(CONFIG_UBSAN),y)
 $(call cc-option-add,CFLAGS_UBSAN,CC,-fno-sanitize=alignment)
 endif
 
+ifeq ($(call success,$(LD) --version | head -n 1 | grep -q "GNU ld"),y)
+# While not much better than going by raw GNU ld version, utilize that the
+# feature we're after has appeared in the same release as the
+# --print-output-format command line option.
+AFLAGS-$(call ld-option,--print-output-format) += -DHAVE_LD_SORT_BY_INIT_PRIORITY
+else
+# Assume all versions of LLD support this.
+AFLAGS += -DHAVE_LD_SORT_BY_INIT_PRIORITY
+endif
+
 ifneq ($(CONFIG_PV_SHIM_EXCLUSIVE),y)
 
 efi-check := arch/x86/efi/check
--- a/xen/arch/x86/xen.lds.S
+++ b/xen/arch/x86/xen.lds.S
@@ -30,6 +30,10 @@ ENTRY(start_pa)
 # define SECTION_ALIGN PAGE_SIZE
 #endif
 
+#ifndef HAVE_LD_SORT_BY_INIT_PRIORITY
+# define SORT_BY_INIT_PRIORITY SORT
+#endif
+
 OUTPUT_FORMAT(FORMAT, FORMAT, FORMAT)
 
 OUTPUT_ARCH(i386:x86-64)



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 13:45:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 13:45:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289036.490332 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSfaR-00019L-LK; Fri, 11 Mar 2022 13:45:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289036.490332; Fri, 11 Mar 2022 13:45:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSfaR-00019E-I6; Fri, 11 Mar 2022 13:45:43 +0000
Received: by outflank-mailman (input) for mailman id 289036;
 Fri, 11 Mar 2022 13:45:42 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=RXIo=TW=citrix.com=prvs=0626a3ed1=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nSfaQ-000198-4n
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 13:45:42 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 8819cb56-a141-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 14:45:38 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8819cb56-a141-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647006338;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=Qv4HpE7251WgWfiEkj210g/0/QJJkkuMkcq/yRM0yKg=;
  b=eCRdqwDNV91WJTlnGfOgLdm7W8J+GsFg+DG8wohfpG6BIKhEkDYzDB0R
   hs1j+5nlkPVZTu37gWMUgNKSaZ0YCHoMo9kEABWdZ/uhCvhfppmljyS9Q
   Fn/4MCRTWvBhnp/RU/98FLcQ74kJXmSCt0rl2pJyBkt5ZTQfPrH64pUfI
   s=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66019459
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:9slu26LXpHR4cVeAFE+Rx5UlxSXFcZb7ZxGr2PjKsXjdYENS0WQEx
 mpLXGrVb6reNjahLdh3bInk/EhTupHWzNAxSQplqX01Q3x08seUXt7xwmUcns+xwm8vaGo9s
 q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUYYoAQgsA148IMsdoUg7wbRh2dcx2YHR7z6l4
 rseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3fMldG0DQUIhMdtNWc
 s6YpF2PEsE1yD92Yj+tuu6TnkTn2dc+NyDW4pZdc/DKbhSvOkXee0v0XRYRQR4/ttmHozx+4
 NJhmrGUYx5yAqPzwdsNeRdjGS1HIbITrdcrIVDn2SCS50jPcn+qyPRyFkAme4Yf/46bA0kXq
 6ZecmpUKEne2aTmm9pXScE17ignBNPsM44F/Glp0BnSDOo8QICFSKLPjTNd9Glu3pkfQauPD
 yYfQStpTkqRYTFLAVRNEJg7vuClp0DSSRQN/Tp5ooJoujOOnWSdyoPFL979atGMA8JPkS6wt
 m/Aumj0HBweHNie0iaetGKhgPfVmiH2U55UE6e3ntZoilCOwm0YCDUNSEC25/K+jyaDt8l3c
 hJOvHB09O5rqRLtHoKVswCETGCsuTIzdv56CrYG5j7U9br+7T2TClEYUWsUADA5j/MeSTsv3
 16PutrmAz1zrbGYIU6gGqeoQSCaYnZMczJbDcMQZU5cuoS4/tlv5v7aZos7SMaIYsvJ9SYcK
 txghAw3nP0tgMECzM1XFniX0mv39vAlouPYjzg7v15JDCslNeZJhKTysDA3CMqsyq7AHzFtW
 1Bex6CjABgmV83lqcB0aLxl8EuVz/iEKibAplVkAoMs8T+gk1b6I9wOsWohexcxap9aEdMMX
 KM1kVoAjHO0FCH3BZKbnqrrU5h6pUQePYiNug/ogipmPcEqKV7vENBGbk+MxWH9+HXAYolkU
 ap3hf2EVC5AYYw+lWLeb75EjdcDm3BvrUuOFMuT50n2jtKjiIu9FO5t3K2mNbtisstpYWz9r
 r5iCid9404GAbOkPXWPr9J7wJJjBSFTOK0aYvd/L4arCgFnBHsgG7nWx7YgcJZihKNbiqHD+
 XTVZ6OS4ACXaaHvQelSVk1eVQ==
IronPort-HdrOrdr: A9a23:88wGcq39cToHGD1EcaAoTwqjBVxyeYIsimQD101hICG9Lfb3qy
 n+ppsmPEHP5Ar5OEtBpTiBUJPwJ0800aQFnLX5XI3SJjUO3VHIEGgM1/qG/9SNIVybygcZ79
 YdT0EcMqyAMbEZt7eD3ODQKb9Jq7PrgcPY59s2jU0dNj2CA5sQkTuRYTzra3GeKjM2YqbQQ/
 Gnl7V6TnebCDwqR/X+IkNAc/nIptXNmp6jSRkaByQ/4A3LqT+z8rb1HzWRwx9bClp0sP0f2F
 mAtza8yrSosvm9xBOZ/2jP765OkN+k7tdYHsSDhuUcNz2poAe1Y4ZKXaGEoVkO0aqSwWdvtO
 OJjwYrPsx15X+UVmapoSH10w2l6zoq42+K8y7uvVLT5ejCAB4qActIgoxUNjHD7VA7gd162K
 VXm0qEqpt+F3r77WvAzumNcysvulu/oHIkn+JWpWdYS5EiZLhYqpFa1F9JEa0HADnx5OkcYa
 VT5fnnlbdrmG6hHjDkVjEF+q3uYp1zJGbKfqE6gL3a79AM90oJjXfxx6Qk7wM9HdwGOtx5Dt
 //Q9dVfYF1P78rhJ1GdZU8qOuMexrwqEH3QSuvyWqOLtBzB5uKke+y3IkI
X-IronPort-AV: E=Sophos;i="5.90,173,1643691600"; 
   d="scan'208";a="66019459"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=BaVEUO3rJCs98yVQfkopRMevSy2sscDv9v7gVZUd4Cx0t57FulaVAfcGuK+lmnFNisrzD3U34OGI4+QwtyTVQkYn++DodRWzSIAimYtCYA3ywZoVrPXvuW8JaaDJYTN+z2T/LxuX4lEWE8u8IiO6q48hCcccAyWeUMa+CDQPlkjFXBpq6UJ3O2C3DeyGsDc+8VvW9JvyZl9dHiY7c9JA5JELMxGwlWcB6V9XYY4BSXMN2EDrxVCWShjmikIk1lMDiCHd5CfGNbo4uqyVw7R8oZXM5EGoCxefZJYxZkw91lOsXv1/iy1w5iI7AoVFbttiEuXQy4Di2QjWBBhz4wlDHw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Z1rXfp8sgKLX+pQEw5xzFWphL9/bIweA7E1Bmx9VvD4=;
 b=fGgT9vRrU8sUjxcWHF1pgGNfclyeZiuA3VRyee1xFIsotUVntvL2nDSw/lC4x7KycZMD0kuQbB+3xEiZtx87Dubs3fr0sa5IJw2BjravudNCEUag0Pwp0plofZP8unP481mKUR8f6COndnnnnxTGAUfaDE7V7vwtHwuw/NOpqTu+Rq6b+6gLsc6zPx2QK4NVj4gQ5mdgbj3J7180eeMk6WIfYBBu4Sqr3RhuyIdYVKuQD7IxjDH91x5kmCTmwv9wgEpEgsz4nc3fixcQ26n3NASp0YilXfJdhQ6cMoOrlM+zLIY6DuTXL3+KRIvDhB5xbmpXn0fRSOUx1RVwkOg8NA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Z1rXfp8sgKLX+pQEw5xzFWphL9/bIweA7E1Bmx9VvD4=;
 b=RpTzc6FoF0tgtTSQn0opAFXKfjfVQL0EWTQkLXDtt+Jvu3t37g3JVW5+q9THheI4vTU9LcrPj/BQZ6CKbXbaV4sVorypQ5zxvO0iIalZXdbsVFGAD68zIQ9wL8WVzVjVBdzAn5C/5v7S7hEgmud7gIRoBlFwH//3euqffstN2Xo=
Date: Fri, 11 Mar 2022 14:45:23 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH v3 2/4] x86/APIC: calibrate against platform timer when
 possible
Message-ID: <YitSc/Ky6PJb5ndV@Air-de-Roger>
References: <35cb3c72-05ba-24c7-1fdd-3ee1aced3aec@suse.com>
 <cb7dd6bc-79a4-2137-5e82-805b9daf5d58@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <cb7dd6bc-79a4-2137-5e82-805b9daf5d58@suse.com>
X-ClientProxiedBy: PR1PR01CA0012.eurprd01.prod.exchangelabs.com
 (2603:10a6:102::25) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 3836b684-d060-4df9-931c-08da0365671d
X-MS-TrafficTypeDiagnostic: CO6PR03MB6308:EE_
X-Microsoft-Antispam-PRVS: <CO6PR03MB63088EDB9B27EFF59077BE668F0C9@CO6PR03MB6308.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(83380400001)(9686003)(316002)(2906002)(6512007)(8676002)(6486002)(6666004)(508600001)(5660300002)(66946007)(8936002)(86362001)(4326008)(66556008)(66476007)(6506007)(186003)(82960400001)(85182001)(26005)(33716001)(6916009)(54906003)(38100700002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?cjVLQlE2MWlqTllsQmlzL0s1cHdrZmxYUnU0S2tPSHdNWU9zOG85SFZSekQy?=
 =?utf-8?B?S00zdkVkT2hMSW1mZUwzSmwrb2hwY3lDUXVLMUZCV1BTTStoWVJyWkVGMW9m?=
 =?utf-8?B?UHdsSTUyZzZPU0pjM3I0eDEzc1RpRVFtMkg2MklQZEtKMVZlREw0am1qbkJT?=
 =?utf-8?B?OHZHL2prd0pVT29RTjR0bGNWMDBudXU3bXQ3N0tjVnNFYW85ZlVtYmZTdVor?=
 =?utf-8?B?THM2Q2trZ0tad2xLQ3BydUp1aGs5M0xCWHVPV2VWVEQwblMvZlJaNUZiNWNH?=
 =?utf-8?B?eXUvWVRVYzYvaGJVaXE3RnA2OEtldmRJeEtBRkVsc3c4eFI1QzFCYXZ5cHl0?=
 =?utf-8?B?dmcrTnhVdkRmemtuU3hrQ0VPeTZDd3F6OTNXa2pwbzh4YkpNMytvUFJRdUFI?=
 =?utf-8?B?MGhxeFBWOXFvNVlPd1JVakRQT0NYWFRrQnZTRXBHTnVBcmhONUhvcVVISnYy?=
 =?utf-8?B?OFpyL3YwcU9VUWRpckx2aDF3dVFWWG9wek9HVlRWTXBjYjJQc05UVjZyYzYz?=
 =?utf-8?B?Q1d0Y1QrYlAxY09Eb1JsSVlEcmFFYWdTVmU5aERNeWpEZnRubHpPNjJQcTZv?=
 =?utf-8?B?UC9mUTJkcjRsOUtYSzZnRWVpU2lKKytRczUyVXZWZXUrNk9NQnpvQTlySUNz?=
 =?utf-8?B?R0lLYi9QMHptTEdxWDlYdU1JaGpGbU9NWCthNUhiQWRNazlpRGxNV0l5S2c0?=
 =?utf-8?B?dDBWTlBtZ1RBTjRJTUt1V3Jlb0E2a0gySEIvdXcwRkI1ZTlqWGFuaHZmQWFz?=
 =?utf-8?B?eHo3NGlPaVlQbXNrbnhhQ2tYYzRVME1VNzdkd0JsRzlvUWFrZEhxOW9jMlAy?=
 =?utf-8?B?L3lEbndRSjNLRjR1WUpBMFZPZHRvQmtraFYwb0dleXJLcFkycGdCVzV3c3Nt?=
 =?utf-8?B?N2UrNldnUDZ4Ryszb1drQnl6YlZNQ0NjOVVJQUlXOVhBZzhrSDRRTWR4bGhQ?=
 =?utf-8?B?VHBiT0RrWDdrSnVrZlBaNUo4Syt4aEpndzMvY0dlc0UvclhSOTZDcm8zMHhj?=
 =?utf-8?B?OFJXMWJkWjRkU2luOEpYS0M0aXdvdmNxOHVSQW1lSFVkdWJ3TVR4T3hqcSs5?=
 =?utf-8?B?a2FLaTZhTGM4ZEtoVnZLL3NyVDhNTWFHaWViT2p1QXFPRFVDVHo1ZHI5b2tF?=
 =?utf-8?B?aUdBaWVMcUVMK240S1duc0ZkdmlzcUZNemFJZVRUbUtGa28zYU9DQXFLRmR5?=
 =?utf-8?B?ZEJ4SE5oRWlwZFgvTi9DSTNDaDZ6ME5FUVUxNXdLN0ZtcXZHMDNBckpoeS9I?=
 =?utf-8?B?UEVCWjQrOU5iMjh2ZCtGd1oyRW9hN0t0U0FadHZPazlUQUc0L3NIYkZTZzBG?=
 =?utf-8?B?OVNCY2JXU3A0Z1VjVG5jczkwUzJyNEtMQk1Bcm1BRjdTdkhtN3hGcUxNMlBJ?=
 =?utf-8?B?VWN0V2ZyUWNzeWkvcm5mYkF3Q294N21HNklCbnU0R3RxTWhvaEd4QjZTMWlU?=
 =?utf-8?B?Vi9nemhUem9HMXF5YnhvM3BIZDhad3QwMXg1UFZ1WC8vM1Vja2h4SkpFMXla?=
 =?utf-8?B?VVRLNnA5WmZZRHpkMXVRNE55SUNtaXBRVkZ3bmNjTnkxRVY3UXJKSlZqTnpY?=
 =?utf-8?B?RlBVL25CclVjbUJQcUF4d1hLVlh6eWR6K0lLZ01aMEQ2STlSN3d0Nk1rVTRh?=
 =?utf-8?B?My9LWHIrd1BMRHgxMElnOWZONnY2eXJJbWJ5OCs1ekMxblhhQnM2UWFaM0xo?=
 =?utf-8?B?TDJrcGp1QXFMSzJsUFU2eUt1ejRmNnpGaEhtZmJrdGYzRW5WekxrR3BmSDZI?=
 =?utf-8?B?REt5ck1JZk9paWN0MHRqK0c3Z3NNQU96K3JnSmJMVzdmTWt2ZFBrQ0p2V2tr?=
 =?utf-8?B?TmVldE5xYkJpU0hEWGhNTytNTndsNUs5cXNyK3Z2N1crU3cwU2ZZRncva1hE?=
 =?utf-8?B?TE8wRjgwejMwZG1GaHBNaWcyTGg1dmpMaU9kQ05PZVhpSkFSbFdxZW5nUXRT?=
 =?utf-8?B?Vm5EaDh1WGF4dUxSVEFGek1KN0YrZVducVExNUxvT1RGVHk0K3Jrcm5NalFD?=
 =?utf-8?B?dVJweXp1N2dRPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 3836b684-d060-4df9-931c-08da0365671d
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 13:45:29.2603
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: EjIpL0FZeJ5E7vVFEISR4dcgwwrlgw1/+IwZwnOaB1NjpKtdBwaLFofNj5ICrhwmeGiqV0OtQbxt5lF+6gjm7g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO6PR03MB6308
X-OriginatorOrg: citrix.com

On Mon, Feb 14, 2022 at 10:25:11AM +0100, Jan Beulich wrote:
> Use the original calibration against PIT only when the platform timer
> is PIT. This implicitly excludes the "xen_guest" case from using the PIT
> logic (init_pit() fails there, and as of 5e73b2594c54 ["x86/time: minor
> adjustments to init_pit()"] using_pit also isn't being set too early
> anymore), so the respective hack there can be dropped at the same time.
> This also reduces calibration time from 100ms to 50ms, albeit this step
> is being skipped as of 0731a56c7c72 ("x86/APIC: no need for timer
> calibration when using TDT") anyway.
> 
> While re-indenting the PIT logic in calibrate_APIC_clock(), besides
> adjusting style also switch around the 2nd TSC/TMCCT read pair, to match
> the order of the 1st one, yielding more consistent deltas.
> 
> Signed-off-by: Jan Beulich <jbeulich@suse.com>
> ---
> Open-coding apic_read() in read_tmcct() isn't overly nice, but I wanted
> to avoid x2apic_enabled being evaluated twice in close succession. (The
> barrier is there just in case only anyway: While this RDMSR isn't
> serializing, I'm unaware of any statement whether it can also be
> executed speculatively, like RDTSC can.) An option might be to move the
> function to apic.c such that it would also be used by
> calibrate_APIC_clock().

I think that would make sense. Or else it's kind of orthogonal that we
use a barrier in calibrate_apic_timer but not in calibrate_APIC_clock.
But maybe we can get rid of the open-coded PIT calibration in
calibrate_APIC_clock? (see below)

> --- a/xen/arch/x86/time.c
> +++ b/xen/arch/x86/time.c
> @@ -26,6 +26,7 @@
>  #include <xen/symbols.h>
>  #include <xen/keyhandler.h>
>  #include <xen/guest_access.h>
> +#include <asm/apic.h>
>  #include <asm/io.h>
>  #include <asm/iocap.h>
>  #include <asm/msr.h>
> @@ -1004,6 +1005,78 @@ static u64 __init init_platform_timer(vo
>      return rc;
>  }
>  
> +static uint32_t __init read_tmcct(void)
> +{
> +    if ( x2apic_enabled )
> +    {
> +        alternative("lfence", "mfence", X86_FEATURE_MFENCE_RDTSC);
> +        return apic_rdmsr(APIC_TMCCT);
> +    }
> +
> +    return apic_mem_read(APIC_TMCCT);
> +}
> +
> +static uint64_t __init read_pt_and_tmcct(uint32_t *tmcct)
> +{
> +    uint32_t tmcct_prev = *tmcct = read_tmcct(), tmcct_min = ~0;
> +    uint64_t best = best;
> +    unsigned int i;
> +
> +    for ( i = 0; ; ++i )
> +    {
> +        uint64_t pt = plt_src.read_counter();
> +        uint32_t tmcct_cur = read_tmcct();
> +        uint32_t tmcct_delta = tmcct_prev - tmcct_cur;
> +
> +        if ( tmcct_delta < tmcct_min )
> +        {
> +            tmcct_min = tmcct_delta;
> +            *tmcct = tmcct_cur;
> +            best = pt;
> +        }
> +        else if ( i > 2 )
> +            break;
> +
> +        tmcct_prev = tmcct_cur;
> +    }
> +
> +    return best;
> +}
> +
> +uint64_t __init calibrate_apic_timer(void)
> +{
> +    uint32_t start, end;
> +    uint64_t count = read_pt_and_tmcct(&start), elapsed;
> +    uint64_t target = CALIBRATE_VALUE(plt_src.frequency), actual;
> +    uint64_t mask = (uint64_t)~0 >> (64 - plt_src.counter_bits);
> +
> +    /*
> +     * PIT cannot be used here as it requires the timer interrupt to maintain
> +     * its 32-bit software counter, yet here we run with IRQs disabled.
> +     */

The reasoning in calibrate_APIC_clock to have interrupts disabled
doesn't apply anymore I would think (interrupts are already enabled
when we get there), and hence it seems to me that calibrate_APIC_clock
could be called with interrupts enabled and we could remove the
open-coded usage of the PIT in calibrate_APIC_clock.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 13:47:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 13:47:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289042.490344 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSfcb-0001ot-5j; Fri, 11 Mar 2022 13:47:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289042.490344; Fri, 11 Mar 2022 13:47:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSfcb-0001om-2l; Fri, 11 Mar 2022 13:47:57 +0000
Received: by outflank-mailman (input) for mailman id 289042;
 Fri, 11 Mar 2022 13:47:55 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=K7gA=TW=aim.com=brchuckz@srs-se1.protection.inumbo.net>)
 id 1nSfcZ-0001oe-2r
 for xen-devel@lists.xen.org; Fri, 11 Mar 2022 13:47:55 +0000
Received: from sonic305-20.consmr.mail.gq1.yahoo.com
 (sonic305-20.consmr.mail.gq1.yahoo.com [98.137.64.83])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id d6721d68-a141-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 14:47:51 +0100 (CET)
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic305.consmr.mail.gq1.yahoo.com with HTTP; Fri, 11 Mar 2022 13:47:48 +0000
Received: by kubenode549.mail-prod1.omega.bf1.yahoo.com (VZM Hermes SMTP
 Server) with ESMTPA ID 9b8a9a8043f39f48f46947ac260309e3; 
 Fri, 11 Mar 2022 13:47:44 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d6721d68-a141-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netscape.net; s=a2048; t=1647006468; bh=kWpHkZBAz6H+US7utCYqzMOteRtCtfOqLW3VfN4Z1yc=; h=Date:From:Subject:To:Cc:References:In-Reply-To:From:Subject:Reply-To; b=e+pMt9jgKgIgX/uH1AhIknz9+TSeedLCdtJ3VH1bCEpJuZAZlFUxfIOr2ikLyJAbmxZjVYPX6fGrN4KoVXAoxQkB02pLK4O82jScsGzOFMxb+RuWxb5EbvOorEY/uufzCGMnCxd+O+c9g19J3DXDI8c6sjufowrnCcr1o1ddCs7cvwayna/wejL+j2dD/QADkirUUpPvZrgqZRXIFiboXjVTA4BfrVboGbj4stCSw9hMfdrmDBxqWjZqbyoUQ28OIgt2V72fpv3IUSpt+duI8w8cqV+OEdpVFQOiDsRbRDdNSCQxAdm17R2Wt2vZrI+ytwXG91vn9dLjrKTlZPedkA==
X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1647006468; bh=g2DpNCmSj0RDoYrNEkCgy0YSHOYA5n0qOPEZtw+asYN=; h=X-Sonic-MF:Date:From:Subject:To:From:Subject; b=ZRkud6mcLQ1xXbHR34ywjN8OeEzryQk2hlFUP1snrIGB02sJgu+htaRXxx5vfsh7A6dOx9/eshzZi2gqLtKvChAS5bf+/Yjqlrgxl6oUygMYXpu1gfcBrRVi+A9jsNvWTv3eF/KdmGC5/QKKmz05hNLB9Tx2f8FTP2gY8tDI7ppzRX+Cr3DuWIAahSNx3EhInCmiN96yZ+58L0dAOFkg8p91Vg6wQHN0WkneH5J/iITokPIhteMdQBboWTwRP34ledJuEeKbPozYKViPJ8UsFDFjW8WJ8JYow+xuv+zCODpaoOGbqhxYTdDHlpB+VrCgnz8uv0SLI/WmZHS5JPtYkg==
X-YMail-OSG: qN.zYq0VM1nZ1PDCLQBYE0D1VbxdPbZLm3ZKLkhmC8f_NJXvVfc6ieYNQDeGZKZ
 cqh2HSWf9asSSEUJtRs0cs.GQJhQauNdVQxx0JuacX3nEBtv49V1a0XwiRbZvX3Zid9YwVHafebK
 AOS_Y4SFHYipRuSKnCXQH2YkLGLzJYtOLiCg7auQR6tHha94EGhJLTsyoMYkX2h8aOb1bO060Ga2
 33.G.NwuHq2eFJHGQEi.S4mO.3hUGhoHPARWZScvEjMAGRDkC6avAmcYy5_3oaymjQyt11CTCH1g
 bZGVAxc2DFbhT0kiVlrY7c.o41pOpy2vlINSz5iqW6JqumH0CufDNT1RildxbtlLHo6Bt1x3DB77
 Zn3pPnW.nvjZ1x58OL_2z.VDCMcwbsEVTl7D6ql64nzd_ttJaUs0OAiFzwfdp5iyL0Z_ZHjkbma6
 u.Z9HK23o.yQT39HI7EqKmvHvYOZWPno0VWKdZGyhL_4A9KEH0WNRt98ounoV9ybgvdZYc0LRMyu
 izVF5.6vdw6XzZ5hpzY6tvioY_hbW7u4wybRD_d5EjgHN29gU0cZkNqcFfId9dQ1eWfr5.XKw45A
 sBopvuD8WzN6xH9AHz1Uh_I.anYP_LDZOpjzSfdxrbkQd4rNwRjw5zo3l1o9dZfiHywYeH136R2f
 QtmuPiycLt15WN.PZtpS2tIn0KvfvcLfYU5qvPCGB4nIYU5uPUSWpeLRiAQWNIH5xgXC6Nz2S2rh
 HxZmHywswuzBiGtixYij7vnry5sQ9cXagaoMMVw3rplUVM_ejbJcWPhS_WomqRN4PDbbLZsd2K3H
 09m2gYxuKI2IAef5yYkortEj7M8s0MJ927F4aiiT_mTSZ8kVgh8WOVevH9CiNN14R0xh5zWnnKQi
 N2brGkOcrgBdG.x_c2yaqGAWzgUDPxiISXuiXhvvZIsND81jCrWfW5WVzVq0oovp6GZcxoM2HQ03
 Dj7KrtYcHdB9UyZ599fI.NDp6E8Prjo8LIWuTDTqJr_2TU3vTypj3gnJ2RyT0L33Iut3y0MizX4y
 SnV9cv0yvUcTD3vMBhysQOv.dbyxwo.po30zk5yAAEdbkXNkWcdZAOJG8pGN0Ux8ui2qYpp0Jjp2
 M_y7v4Y49MCIYahXiaSDJ8mwc2KLqjDRIBOpYPeoXq5Jys8ZbDV7KZ33KW33MGBLlrmN5ZT6W2Kw
 wCkHJE4SlEHsftMNBp5jVKQ0GttY4p9UUN_lws8CBY9cl_DyjIPuaMPK3VCbbnxY5MqJ1Bw1TOYN
 eWrrdsqBRjKD2NCirIHDIJ4GZE6cPw2CaBr5FSSaeiAs1M3CTWjdgD4aWyxARkQgxeDrzyTPpm0P
 E8fb6jBxmOXhTjaNnM_TagbeOIhLvxl3FKXV7ODXvSdNi5IFH6z8Vvfq4Z0TUbuziCK_Vf1KBJzY
 U84c6ua6Z1rD5JWR3023GNjknR8OpVfi5wDUgcPuShz4JiKEL3oPRGljV2aXh9HD0xn5GcGyw8ay
 Ye5sQNnzhpJiyVU96s4lLXcOe8sEW9xujCPasCEuzDkdNZ3y4jLGyOVYcZ.BVd6gxnRsfLvn8.pP
 LCRa8eCbkDNT0bVmSpAsV3GkbYA10jQSASiz5X5liE6e._fgXg87R8zAg3JB.vDvKB2P.nHb.cLZ
 YARGmCo63i08GBzb7KP4ngVjgxStmrTRZxVBWB3zr7L6XeVfvV3Yo7AdUZ5wEEzNkHjHJEoDjruM
 2a2qTvZUbuUi3d98WKJKM4Qpfsw2ldu_E319tEykXyXqwGgFaumZwpiFAd1S.upi_M0uBIiwmalo
 I5a9W9KZyFVKLLlvwg.mfpdxT70GGnHqqG9r3qCZzWuH2JN4Y_Glur1QMtf_WnaAvN0gDp_Pyw3_
 9UKTwoLIRZK7LGyJ.3.AChnaO27d0.Jj7VsZPO3yHE8t.TWL3cXTy_yD6XJDyBQ0dLIR8ibM7qRE
 rz20OKNFNaOMVEQ7k3mgNX1JQT6zkwd0xGdl10FEtVQGoAYNGe6pe.RU9Vu7lbUb_SOm3UoYlxdG
 uMyvL7Ogd.PDqmmbmn3egMJXEtM5QXzGhEF6b70Yk1Z84FQ7FhJQcQeIa34rDUKdalTO8LWPQhvs
 uikG8DjQhP9zjSwpBQvfGzTyupUf0OUK0o6g9uIV72BmMA0N7Sib8ZwkoKJFgL5AEh.zibysq6gd
 AuqfNEcLFr4mg4St_RwCD2n0lK2obc5o7iHJ.FzS57DJCEm64CdHFYNvYvQV1q4jNeIzvOzuLizH
 Z47Y-
X-Sonic-MF: <brchuckz@aim.com>
Message-ID: <ed955608-9c62-3dc8-fbcc-df5b4d3c5e46@netscape.net>
Date: Fri, 11 Mar 2022 08:47:42 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
From: Chuck Zmudzinski <brchuckz@netscape.net>
Subject: Re: BUG: libxenlight fails to grant permission to access Intel IGD
 Opregion
To: Jan Beulich <jbeulich@suse.com>
Cc: xen-devel@lists.xen.org
References: <4703b7f1-8d3c-5128-213c-e39f487e4cde.ref@netscape.net>
 <4703b7f1-8d3c-5128-213c-e39f487e4cde@netscape.net>
 <2e74415a-d0d4-321b-be2e-a14db297c51a@suse.com>
Content-Language: en-US
In-Reply-To: <2e74415a-d0d4-321b-be2e-a14db297c51a@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Mailer: WebService/1.1.19878 mail.backend.jedi.jws.acl:role.jedi.acl.token.atz.jws.hermes.aol
Content-Length: 4157

On 3/11/2022 3:09 AM, Jan Beulich wrote:
> On 11.03.2022 06:01, Chuck Zmudzinski wrote:
>> Further research showed that these two pages at 0xcc490 are for the
>> Intel IGD opregion, and because this memory is not permitted to be
>> accessed by the domain, the passthrough of an Intel IGD to a Linux
>> HVM domain fails, causing a crash of the Linux i915.ko kernel module
>> in the HVM domain. My testing, which was on a desktop with a Haswell
>> Intel CPU/IGD, confirmed that these two extra pages need to be
>> permitted in order for passthrough of the Intel IGD to a Linux
>> domain to work properly.
>>
>> I find that adding two pages is enough to fix the problem, but I
>> have read in other places that the Opregion is actually three pages,
>> and maybe newer revisions of the Intel IGD do need three pages instead
>> of two. I am testing on a Haswell Intel chip, which is over 8 years old
>> now. So the patch I propose adds two pages, but I am not sure if
>> it should be three pages for newer Intel chips.
>>
>> The failure to map this memory with gfx_passthru enabled
>> is therefore a bug, a regression that was introduced with the two
>> aforementioned patches way back in 2014 when Xen 4.5 was under
>> development.
> Thanks for this analysis. It looks quite plausible (but the question
> of 2 vs 3 pages of course needs resolving).
>
>> Once I developed a patch, I did more testing with the traditional
>> Qemu device model and Debian's package of Xen-4.16 for Debian
>> sid/unstable after I discovered where this bug first appeared in
>> Xen 4.5-unstable back in 2014. In my testing, Windows HVM domains are
>> not affected by this bug and they function properly, most likely
>> because proprietary Intel graphics drivers for Windows are more
>> forgiving than the Linux open source drivers for Intel graphics
>> regarding the details of how Xen and Qemu configure the domain.
>>
>> This bug still exists in current supported versions of Xen
>> because in Xen 4.16, passthrough of my Haswell Intel IGD to a Linux
>> domain still fails with a crash of the i915 Linux kernel module in
>> the Linux unprivileged domain when the traditional Qemu device model
>> is used in dom0. The patch at the end of this message fixes it.
>>
>> I have not yet succeeded in reproducing this bug with the
>> upstream device model because there is another bug in Qemu
>> upstream that breaks passthrough of the Intel IGD to a Linux HVM
>> domU, so for now, to reproduce it, please use the traditional device
>> model.
>>
>> Also, as a starting point to reproduce the bug, first get Intel IGD
>> passthrough to a Windows HVM domain using the Qemu traditional
>> device model working on Xen 4.16. Then replace the Windows HVM domain
>> with a Linux HVM domain, keeping everything else the same including
>> the Qemu traditional device model. I tested using a Debian 11.2
>> (bullseye) HVM domain and Debian sid/unstable with Xen 4.16 and
>> a build of the Qemu traditional device model from source as
>> provided on xenbits.xen.org
>>
>> I am using a desktop computer and the xl toolstack and Xen as
>> packaged by Debian, except that I added the traditional device
>> model that Debian does not provide.
>>
>> If you need more info, please let me know. I am not subscribed to
>> xen-devel so please cc me with your replies.
>>
>> Regards,
>>
>> Chuck
>>
>> Here is the patch that fixes the bug on Debian sid/Xen 4.16:
> As to an actual patch for us to take - please see
> docs/process/sending-patches.pandoc for the formal requirements.
> (Note this was recently introduced, so you won't find it in the
> 4.16 sources. But your patch wants to be against latest staging
> anyway.)
>
> Jan
>

After resolving the question of two vs. three pages, I will follow
the process for submitting a patch against the latest staging.

Qubes OS has a patch that uses three pages, and the
igd.c pci file in Qemu's hw/vfio directory also specifies
three pages, but if two is enough, that seems to be safer.
I haven't checked yet to see if there is an official specification
from Intel. I will start by looking in the Linux kernel i915
driver code which might give a clue.

Chuck


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 14:03:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 14:03:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289046.490355 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSfrg-0004DW-G9; Fri, 11 Mar 2022 14:03:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289046.490355; Fri, 11 Mar 2022 14:03:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSfrg-0004DP-Bj; Fri, 11 Mar 2022 14:03:32 +0000
Received: by outflank-mailman (input) for mailman id 289046;
 Fri, 11 Mar 2022 14:03:30 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSfre-0004DF-Jf; Fri, 11 Mar 2022 14:03:30 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSfre-0001iR-Hr; Fri, 11 Mar 2022 14:03:30 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSfre-0002FK-3f; Fri, 11 Mar 2022 14:03:30 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSfre-000436-3C; Fri, 11 Mar 2022 14:03:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Y4zAo05nbpc/MYhe0/6dQV5r2hNSuF1ZU1u/JEhL8Ps=; b=OEkfhVZbOxJ8g2fRydTuCv76rQ
	hdaCq6Fri8nTVFGnMCR2dIFsYhJei1hkx/SgNATyS/lpTP6oEnVjvu8u6vB7IQy/k1XV4n4/Uu34y
	a+zl13fv6xfrS+8t7VjMym982yypYlcTnh+yGqvNXyesPFxXc8TsxkF533uRNVPmSOw8=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168511-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168511: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=688a2c0897c9ce57f715f46b6dece343efc5ce75
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 11 Mar 2022 14:03:30 +0000

flight 168511 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168511/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              688a2c0897c9ce57f715f46b6dece343efc5ce75
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  609 days
Failing since        151818  2020-07-11 04:18:52 Z  608 days  590 attempts
Testing same since   168511  2022-03-11 04:21:43 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Martin Pitt <mpitt@debian.org>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 100521 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 14:05:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 14:05:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289054.490365 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSftz-0004pu-Sp; Fri, 11 Mar 2022 14:05:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289054.490365; Fri, 11 Mar 2022 14:05:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSftz-0004pn-Pl; Fri, 11 Mar 2022 14:05:55 +0000
Received: by outflank-mailman (input) for mailman id 289054;
 Fri, 11 Mar 2022 14:05:53 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=RXIo=TW=citrix.com=prvs=0626a3ed1=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nSftx-0004pd-T7
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 14:05:53 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 5ab2f32a-a144-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 15:05:51 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5ab2f32a-a144-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647007552;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=w7+YEg80/LjQfksqt8crA6jdF3y18KR4t7mzfmWIFEQ=;
  b=HO4XO+FSdDLdhHrgtAKRq94Qgmp9DBkBoyJGzWt+LRDUelXK7KP/nxyz
   NyMwLaa690WkWjWhNgPiO3jLCRM9SMpZHkQe2AtmZ2QJWnzSkslKB1c0+
   uWDWeEyHMB5+sdaO7L2LAEc6o2b3ACnp4zDgIuvD5mE2iash4kVhFtyi4
   s=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65486906
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:pb8Yjqh7dcV4rF41duIPT/rgX161cRAKZh0ujC45NGQN5FlHY01je
 htvUGjVaP3ea2akfYh/PY7noUMPvsKGztI1QQtp+S1kFH8b9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFrU4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YRY4MITg28pDaDt7H3lgLbB39rPKG1Hq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bkmtnwjzDS+4vXLjIQrnQ5M8e1zA17ixLNaiDO
 5pHOGIxBPjGSwNQZkY4A5kYpui5u3rdLxtAiHGoiJNitgA/yyQuieOwYbI5YOeiWsF9jkue4
 GXc8AzREhwccdCS1zeB2natnfPU2zP2XpoIE7+1/eIsh0ecrkQRAhALUVqwodGil1WzHdlYL
 iQpFjEG9PZoshbxF5+kAkP+8CXsUgMgt8R4Avw0wS3O5PTvwSWVXnYUUw9PZNEcnZpjLdA17
 WOhk9TsDD1plbSaT3OB67uZxQ+P1TgpwXwqPnFdE1ZcizX3iMRq10+UEI4/eEKgpoCtQVnNL
 ya2QD/Sbln5peoCzO2F8F/OmFpATbCZH1dutm07so9Ihz6VhbJJhaT0uDA3Dt4ade51q2VtW
 lBdyqByC8hUUfmweNSlGrllIV1Qz6/t3MfgqVBuBYI90D+m5mSue4tdiBknehs3Y51bJm+xO
 BaN0e+02HO1FCL7BUOQS9jsY/nGMIC6TYi1PhwqRoYmjmdNmP+vo3g1OB/4M5HFm0kwi6AvU
 ap3gu73ZUv2/Z9PlWLsL89EiOdD7nlnmQv7GMCqpzz6gOH2TCPEFt843K6mM7lRAFWs+16Or
 b6y9qKiln1ibQEJSnKOoNBJcgxScyRT6FKfg5U/S9Nv6zFOQQkJI/TQ3akga8pimaFUnf3P5
 XazRglTz1+XuJENAVzaApy/QNsDhapCkE8=
IronPort-HdrOrdr: A9a23:NJhQ86uQSbOhpN8q99jsFfjH7skCmoMji2hC6mlwRA09TyXGra
 +TdaUguSMc1gx9ZJhBo7G90KnpewK6yXdQ2/hqAV7CZnichILMFu9fBOTZsl/d8kHFh4tgPO
 JbAtVD4b7LfCZHZKTBkXCF+r8bqbHtmsDY5ts2jU0dNT2CA5sQkDuRYTzrdHGeKjM2YabQQ/
 Gnl7Z6TnebCD0qR/X+IkNAc/nIptXNmp6jSRkaByQ/4A3LqT+z8rb1HzWRwx9bClp0sPwf2F
 mAtza8yrSosvm9xBOZ/2jP765OkN+k7tdYHsSDhuUcNz2poAe1Y4ZKXaGEoVkO0amSwWdvtO
 OJjwYrPsx15X+UVmapoSH10w2l6zoq42+K8y7tvVLT5ejCAB4qActIgoxUNjHD7VA7gd162K
 VXm0qEqpt+F3r77WjAzumNcysvulu/oHIkn+JWpWdYS5EiZLhYqpFa1F9JEa0HADnx5OkcYa
 RT5fnnlbhrmG6hHjHkVjEF+q3tYp1zJGbNfqE6gL3b79AM90oJjHfxx6Qk7wI9HdwGOtt5Dt
 //Q9RVfYF1P74rhJ1GdZQ8qOuMexvwqEH3QRSvyWqOLtB0B5uKke+z3IkI
X-IronPort-AV: E=Sophos;i="5.90,174,1643691600"; 
   d="scan'208";a="65486906"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=VxoHVkClVwAlSDL1UYbKjQbJbaP1W868xXXmc4ueGOocRcgNgLvf3AF+rjknI2a/AQ8eZE0EJpp90bjB9eXNNQTBC6r8UesQiOiPJVIAOVLCNW4SwJsuNwmdrdhcIDcaZDwEAJF6PiPImXwPnmA60vhViPXk5MtyUVobAobOqtgl3g8snos8Vwj/fyLJcFcdibme+VCfmpr2c4rhIRND7giJOuGslJm2gy/0DqRFi0EF2YM1xBgV5zwtBahkPyFcti09/mY0DfegihK1bpED0SEL8ZDY+ypRQPhfLGbVnMV4bYJyd5oS1GtwT3o42WThAkHaFDJAEcpUDCyRW6GYhQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=G5BbK7KsURF3cQSO399ioLmdycALGg4i7zDBaV8o6VM=;
 b=J7XTY+zCOaLz16MJgM1pdzGmyb3uHZxtshHQhQwxdMHJNlrhTe6iDlEDU9u7tKdfxxvoMkMtqCewoJfs01eoc3IQkwX8/j8RYWe+mbUFBVkm0dEPR0Rw7bWueAtvZhg8AwFmw6+lU8lobYSiLsF4eytIYbKj77mAcIGKjx2YILfZ1oLsFmVye64REf+XPjiD4rzHU1nhFIyFZcYpvnSTPRGCiwJymEQWGLpJkYl8u14Zb7u+xRL+4bVua+odoOwE2NbrmeqvzYpl6XO6unMcUFNWmpJWrUh2/dfnUTCiuo0Kl07MIjAC2tuYqQ28PxiPd2VL6dlS/IaCQeXwiCrRMw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=G5BbK7KsURF3cQSO399ioLmdycALGg4i7zDBaV8o6VM=;
 b=nbPmpLnz4Iq7kPdmRlQtz/lzms5XuhrPH7tFczxYVYNDTocS6hFIQQmQqfzpFrjjWcX0a1t4qw1sy47STk12ZRaV9Ekwcg0X8RXat/HIsR4ck6iQAWBIh7Is3OHulJ7xA5Zy/s/AS5CnFZudiBQeFvNaAJih8R9uMXk+sTPQYRo=
Date: Fri, 11 Mar 2022 15:05:17 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Andrew
 Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH v3 3/4] x86/APIC: skip unnecessary parts of
 __setup_APIC_LVTT()
Message-ID: <YitXHaekQk1aK1i2@Air-de-Roger>
References: <35cb3c72-05ba-24c7-1fdd-3ee1aced3aec@suse.com>
 <c679a11a-d2b5-403a-5341-3e00ac91ff45@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <c679a11a-d2b5-403a-5341-3e00ac91ff45@suse.com>
X-ClientProxiedBy: MR1P264CA0129.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:501:51::17) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 38ea09e5-7307-431f-7d75-08da03682e8f
X-MS-TrafficTypeDiagnostic: BN6PR03MB2913:EE_
X-Microsoft-Antispam-PRVS: <BN6PR03MB2913187B3B090B9B6A9B2AD28F0C9@BN6PR03MB2913.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(54906003)(6506007)(85182001)(6916009)(2906002)(86362001)(6486002)(6666004)(9686003)(6512007)(26005)(186003)(8676002)(66476007)(33716001)(508600001)(316002)(4326008)(66556008)(66946007)(5660300002)(82960400001)(38100700002)(8936002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?YjVHY3lBVmxuaENtSEQzODY5V3hic0NrZHNOZ3o4QVBBN1VnZWtCNVlDYUdF?=
 =?utf-8?B?d0ZndzROMmJqRDdtdldEenRjOXd1ME1vQ0p1NWZYaGpBcmdBWHZzVG9Edkpp?=
 =?utf-8?B?TC96Y09zODltLzRGaXAyUlVvWUtZWmQvZnVoYmc2WGdPbGtianc3NE15YlJy?=
 =?utf-8?B?Y3l0RlpqblY3enZOdEdhNmdOQ0UrMjU5VUZ6bkF0THJqRFp3MVVKVHNiajc5?=
 =?utf-8?B?QlZEVyt4K3REVlAxUWw4RGNEcktYSnVwWDVWREJRU0tvaFZ3b3Baa2N4emhH?=
 =?utf-8?B?dEk5UDhZUlhJYWhmTDIwem9MdzZuajJscUhKQ3l0ZWRDNjk0UWIwM1lhRnhP?=
 =?utf-8?B?TmRiRG5RVlFGNWNycjBDQ0dOK3VQQXdqVmhIeVdZTVI0UWkzM3Jxdnpra1Vw?=
 =?utf-8?B?UkpJSHo4U2I0dGxaQVAvUDVEc2VtUzYzKy9FeDlsK3daSytNb290dmJqN2JY?=
 =?utf-8?B?akN2UWljSGw1TlM1eWhhOHJ0RFN0aUp6TEMwdUFUTXFvME9pNHdKbHVSdms0?=
 =?utf-8?B?M2x5YmFxSmVKMDhTQUVETWdvVWNkUU1DYW9EWm9XZzJ3VllmUUczeEVLU2VR?=
 =?utf-8?B?b1dMTEZSMmxTTGZTaU5tbFllMDlTTWx4NjJOc1pCM1RsY1BjblBwUHN3SXdZ?=
 =?utf-8?B?RzlWY0tLS0NsYkRIQ0xRcGYyMTNjM3BoKzFWR2lURExNc3ZxaENibHovT2RW?=
 =?utf-8?B?S0VtNEJWUEcrNHovMmNYZXJpSFZ6TkV5Uno4WkhqcXBVT1NFUm5YZ05IUkJ3?=
 =?utf-8?B?S2FOWGdNSk5DbGFkYVI3N3QvRm02ZjFVZFp2eHJwTVp0NDlhTmxJeGNkWjFP?=
 =?utf-8?B?OWpER0JrK0FrRnNHc0Z6cjBuU1BwR0JLSngzWk9HQlJKTUl4T1hkcURVLzFs?=
 =?utf-8?B?MGJVRGs2SFdtMm9XOGYvcmUyUmdEcUU3RmNqS1h3bTlJY2Y3SVhMdWFKQ0Y4?=
 =?utf-8?B?NnZaY084Tk9KR2xFVHpGNlZZTlA1ay9XV3pNcHpNaEZJNzBNVXRxR3Y0VEhK?=
 =?utf-8?B?d205a2NtTDE3M0Z2bXNGUm8wQXlldUtFWGtWaytDK0oxa0hHbXN6dm9YbFYw?=
 =?utf-8?B?dVNRdFp2M1NRYkNqMGJacUxocDF5TWV4aUV4YWx5QzUwVzJOeVE5TytUMjVi?=
 =?utf-8?B?RlNXNysxaGxSOXdFUjJVUkg4V001NnJrVXBzNHVDcE5qODJDRTBzUzNZK1Ry?=
 =?utf-8?B?ZUdHTVFkZzFEbzJyRnNEQ2trb3J4SDZBRHdXZTV3S3FxNFpBbXdiak5PQlRi?=
 =?utf-8?B?MjZHSzZsMGMyYWc5S09ZVFV0VVBuM1FxNW5WanBpczFEMEtQRCttTUpmTjZW?=
 =?utf-8?B?Z0s1VE50V096NENQUlorOHlwbEFxSHVwejlpdzZGVmJJUHJQSWNqMUxMMWsr?=
 =?utf-8?B?VDZYSGRtNlVHUlpoTWQwM25MTzNQTUQvS0tYQVh4cFZneUVyRFUxQjZRakRn?=
 =?utf-8?B?OUMxZ0wxOXo4Q3U2SVRWVDVraHFsTkk2SmVTdWpTN3JTZlJia0t2M2pjb1Ro?=
 =?utf-8?B?SVNmTW92YTNuclIxWGM3UjdtcDhqZzRGZ1NLR2I1WWs2dVVUbTNoWjBETHJD?=
 =?utf-8?B?WEtpWU55a0IwajV1ajZPTFJNM3NjaWR4QzBFV0FyM3VmUTNDaTJRcm1JRE5s?=
 =?utf-8?B?SjFMN3hnZlp3dlpnOE9VbUhnTE01NDJnM0tndjNWUktFM0xXRGpXMVdHNTRh?=
 =?utf-8?B?OGx4YWc4Tmc1cGZSR043dHBhZTBja1BheEhCTzFYZDdHQkgwcW1EWE95L2hO?=
 =?utf-8?B?N1k0MW92S1hNZFJ3RmVRMXZkSTdjZjRUUVdMMmtWY2lib2NqME1aUE9QODgx?=
 =?utf-8?B?RWUyQW1CRkxBd29hcHhrR1ZXMlJCL3ZURFdRMC9pei91bXdoMm8vM1gvNTVM?=
 =?utf-8?B?NUpSR3ZGUXcyM01ZQWlGZTdrZUh4ZzdPTmRRMVpKaVFnWmJVNGtqT3U2U1ls?=
 =?utf-8?B?UUM0ZzZtTEptZHdIUWJFTEFDTXYyRy8vUkkvT2lpZktza3J5RnVhVFkxczJH?=
 =?utf-8?B?ZERqcHlaaDJ3PT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 38ea09e5-7307-431f-7d75-08da03682e8f
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 14:05:22.1483
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Q3OZUFMAfMNIk94Upl5uPLkkRz+GelEl9inNcEbfN1KcvcNlvswF4gmKuMF3s4xRLa6b16eN/KmD5uRXtsnOZw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR03MB2913
X-OriginatorOrg: citrix.com

On Mon, Feb 14, 2022 at 10:25:31AM +0100, Jan Beulich wrote:
> In TDT mode there's no point writing TDCR or TMICT, while outside of
> that mode there's no need for the MFENCE.
> 
> No change intended to overall functioning.
> 
> Signed-off-by: Jan Beulich <jbeulich@suse.com>

I've got some comments below, now that the current proposal is bad,
but I think we could simplify a bit more.

> ---
> v2: New.
> 
> --- a/xen/arch/x86/apic.c
> +++ b/xen/arch/x86/apic.c
> @@ -1059,24 +1059,25 @@ static void __setup_APIC_LVTT(unsigned i
>  {
>      unsigned int lvtt_value, tmp_value;
>  
> -    /* NB. Xen uses local APIC timer in one-shot mode. */
> -    lvtt_value = /*APIC_TIMER_MODE_PERIODIC |*/ LOCAL_TIMER_VECTOR;
> -
>      if ( tdt_enabled )
>      {
> -        lvtt_value &= (~APIC_TIMER_MODE_MASK);
> -        lvtt_value |= APIC_TIMER_MODE_TSC_DEADLINE;
> +        lvtt_value = APIC_TIMER_MODE_TSC_DEADLINE | LOCAL_TIMER_VECTOR;
> +        apic_write(APIC_LVTT, lvtt_value);
> +
> +        /*
> +         * See Intel SDM: TSC-Deadline Mode chapter. In xAPIC mode,
> +         * writing to the APIC LVTT and TSC_DEADLINE MSR isn't serialized.
> +         * According to Intel, MFENCE can do the serialization here.
> +         */
> +        asm volatile( "mfence" : : : "memory" );
> +
> +        return;
>      }
>  
> +    /* NB. Xen uses local APIC timer in one-shot mode. */
> +    lvtt_value = /*APIC_TIMER_MODE_PERIODIC |*/ LOCAL_TIMER_VECTOR;

While here I wouldn't mind if you replaced the comment(s) here with
APIC_TIMER_MODE_ONESHOT. I think that's clearer.

I wouldn't mind if you did something like:

unsigned int lvtt_value = (tdt_enabled ? APIC_TIMER_MODE_TSC_DEADLINE
                                       : APIC_TIMER_MODE_ONESHOT) |
                          LOCAL_TIMER_VECTOR;

apic_write(APIC_LVTT, lvtt_value);

if ( tdt_enabled )
{
    MFENCE;
    return;
}

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 14:11:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 14:11:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289061.490377 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSfzQ-0006LC-MN; Fri, 11 Mar 2022 14:11:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289061.490377; Fri, 11 Mar 2022 14:11:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSfzQ-0006L5-J4; Fri, 11 Mar 2022 14:11:32 +0000
Received: by outflank-mailman (input) for mailman id 289061;
 Fri, 11 Mar 2022 14:11:32 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=PRj6=TW=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nSfzP-0006Kz-LR
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 14:11:32 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on2062b.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::62b])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 24124364-a145-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 15:11:27 +0100 (CET)
Received: from AS9PR05CA0011.eurprd05.prod.outlook.com (2603:10a6:20b:488::19)
 by PAXPR08MB6653.eurprd08.prod.outlook.com (2603:10a6:102:15f::9)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Fri, 11 Mar
 2022 14:11:24 +0000
Received: from VE1EUR03FT030.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:488:cafe::e) by AS9PR05CA0011.outlook.office365.com
 (2603:10a6:20b:488::19) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.23 via Frontend
 Transport; Fri, 11 Mar 2022 14:11:24 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT030.mail.protection.outlook.com (10.152.18.66) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 14:11:24 +0000
Received: ("Tessian outbound 1f399c739551:v113");
 Fri, 11 Mar 2022 14:11:23 +0000
Received: from bc30d117d2eb.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 CB0514E1-6EF4-4484-BE1E-635F457D7A83.1; 
 Fri, 11 Mar 2022 14:11:11 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id bc30d117d2eb.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 11 Mar 2022 14:11:11 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by AM6PR08MB4486.eurprd08.prod.outlook.com (2603:10a6:20b:72::17)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar
 2022 14:11:08 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5061.022; Fri, 11 Mar 2022
 14:11:08 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 24124364-a145-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=nhSZ1vL7Bie6TI+SPIoWxprLPD73O9t+W3DBldbmlVU=;
 b=D83cKwJjgYWDq5OKhXNMhQeS9UJhEU8OGglsMSwDEpEiC7dfuNn48dG7lEJsxf9dmz0mTGkQ+kUF7psaJqsXUYM2CqiuvsU1KrnGPclc/eRjQla++CCDIFUoYCEKN0PYOSk1B6IFcnJ8NFu4yB8l1UyiFwLOJqiE3wkAvIJoa4w=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: e3c03ed20c0618c9
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=FQcfNFqYQHCtgxsv79MjlJFGFAykr0BU5OTTWigCeDQCJllv4iYFYS0KKxLEX/vpg2ODN2ZMZMP8mX2PEYNHBhuAVDOO9sMEFVFOxEylt6sRUnHuukKAVBwltgMChd3Dq7fAk7OC85eJhcErtgdIH1akrFqC2itlTTYc/6dNDEHu7ntnmqd0T7wbf/zU+JtPjdCx1VhheEBhsw1H2HbZMc0/c68fJAwsujF0msdTdcyPsheZTxPUB+rj3kNp9YOzsMiQTToage0aqdYTMemajOUHq+SxvxffzOSDMQez8JLTyTKsC4G4OQ8d6LPQvMfOZvOMmOI9GQ1z2h0x+Nvdqg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=nhSZ1vL7Bie6TI+SPIoWxprLPD73O9t+W3DBldbmlVU=;
 b=U2oyYBZOKQEdSmrH+IWFCUiebXCZz+NjbeuORHYW2Nx2t2zuSPwL9/pT7D3E5fqc4Pisc1PIEZSHKGyglVWcDEqK3wmf5kHM5eMAtet/2ONIyARgYHWLCW0rCqKRyIQydxzUMbyFgUbKFIuD+WjmubMm9WlM/8VdekxougrO+r81UDLvwEKKdCjTy6lMC2BC1hWNq4H48NwAKuWvsFkDKaWH+ut1LrNY2kWX3CVQwCn7AMjq8+4QVtE5Q1QxQNtT21L1Uz6citLNNNzfkA9QDRWTpnKR5FK0MPzr5SzeHJ+ARC+3+bi8DsVvpUzDH+vabfh+x8raoZbkVefbhInbnQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=nhSZ1vL7Bie6TI+SPIoWxprLPD73O9t+W3DBldbmlVU=;
 b=D83cKwJjgYWDq5OKhXNMhQeS9UJhEU8OGglsMSwDEpEiC7dfuNn48dG7lEJsxf9dmz0mTGkQ+kUF7psaJqsXUYM2CqiuvsU1KrnGPclc/eRjQla++CCDIFUoYCEKN0PYOSk1B6IFcnJ8NFu4yB8l1UyiFwLOJqiE3wkAvIJoa4w=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Stefano Stabellini <sstabellini@kernel.org>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>,
	Julien Grall <julien@xen.org>, Bertrand Marquis <Bertrand.Marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, Jan
 Beulich <jbeulich@suse.com>, Wei Liu <wl@xen.org>, Juergen Gross
	<jgross@suse.com>, Dario Faggioli <dfaggioli@suse.com>
Subject: Re: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Topic: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Index: AQHYNKHSvTK6bj2+f02v/DWZHCtE9qy5jxyAgACrU4A=
Date: Fri, 11 Mar 2022 14:11:08 +0000
Message-ID: <A34CF75A-8139-4A4A-A1AE-3BA74E70DE55@arm.com>
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-5-luca.fancellu@arm.com>
 <alpine.DEB.2.22.394.2203101957370.3497@ubuntu-linux-20-04-desktop>
In-Reply-To:
 <alpine.DEB.2.22.394.2203101957370.3497@ubuntu-linux-20-04-desktop>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: a9634f48-56c4-4376-1093-08da0369067d
x-ms-traffictypediagnostic:
	AM6PR08MB4486:EE_|VE1EUR03FT030:EE_|PAXPR08MB6653:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR08MB6653817826C45EBE612776A9E40C9@PAXPR08MB6653.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(76116006)(26005)(186003)(83380400001)(66556008)(38070700005)(122000001)(30864003)(2616005)(91956017)(7416002)(8936002)(66946007)(8676002)(33656002)(6486002)(64756008)(66446008)(4326008)(5660300002)(38100700002)(66476007)(36756003)(2906002)(6512007)(86362001)(6506007)(508600001)(316002)(53546011)(6916009)(71200400001)(54906003)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <7081A84784EAB14EA90F8394C543D976@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4486
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT030.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	861e7324-b42d-415d-c33e-08da0368fd09
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(36860700001)(6486002)(82310400004)(86362001)(40460700003)(33656002)(316002)(81166007)(356005)(54906003)(2906002)(30864003)(4326008)(5660300002)(8936002)(8676002)(6862004)(508600001)(70586007)(36756003)(70206006)(6506007)(6512007)(83380400001)(53546011)(186003)(107886003)(26005)(336012)(47076005)(2616005);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 14:11:24.0249
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: a9634f48-56c4-4376-1093-08da0369067d
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT030.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB6653
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From xen-devel-bounces@lists.xenproject.org Fri Mar 11 14:16:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 14:16:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289067.490388 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSg4K-000734-Dp; Fri, 11 Mar 2022 14:16:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289067.490388; Fri, 11 Mar 2022 14:16:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSg4K-00072x-AN; Fri, 11 Mar 2022 14:16:36 +0000
Received: by outflank-mailman (input) for mailman id 289067;
 Fri, 11 Mar 2022 14:16:35 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=PRj6=TW=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nSg4J-00072r-3u
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 14:16:35 +0000
Received: from EUR03-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur03on061b.outbound.protection.outlook.com
 [2a01:111:f400:fe0a::61b])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id da33bde7-a145-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 15:16:33 +0100 (CET)
Received: from AM6P194CA0100.EURP194.PROD.OUTLOOK.COM (2603:10a6:209:8f::41)
 by AM6PR08MB3878.eurprd08.prod.outlook.com (2603:10a6:20b:8b::27) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.16; Fri, 11 Mar
 2022 14:16:29 +0000
Received: from VE1EUR03FT037.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:8f:cafe::84) by AM6P194CA0100.outlook.office365.com
 (2603:10a6:209:8f::41) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.23 via Frontend
 Transport; Fri, 11 Mar 2022 14:16:29 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT037.mail.protection.outlook.com (10.152.19.70) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Fri, 11 Mar 2022 14:16:28 +0000
Received: ("Tessian outbound 2877e54fe176:v113");
 Fri, 11 Mar 2022 14:16:28 +0000
Received: from f76ef5b0f806.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 1D6A31D1-1107-4444-BB5C-81CF6C7DF818.1; 
 Fri, 11 Mar 2022 14:16:27 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id f76ef5b0f806.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 11 Mar 2022 14:16:27 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by VI1PR08MB2992.eurprd08.prod.outlook.com (2603:10a6:803:44::22)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.14; Fri, 11 Mar
 2022 14:16:18 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5061.022; Fri, 11 Mar 2022
 14:16:18 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: da33bde7-a145-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=A1B6EucJ49r/nq4XJKQ0ve8CrJVik0XIrMEuy859JVk=;
 b=qkAhWUhT8hlaXne2XVi7rCMIYaAgtQiX+h+LKJfqNP3svka1TflQcF0xRZfdbFiaNDxYSpdqby5eWKFKmB7qRtdBtGVQgn5bpLOShXYbhQAgnwzlFhc6xi7VnKxUNf9V/eAJk2SUtV5L21SaMhRcuoCiQSDIcYmDQJ9cK6k7j0E=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: c29900f02809ce0f
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=hBOZmSiAeWuMJo5xvOOUYThS20zwPmySf1V2eU9sl5zYPtUIOs2gbi1ZJI+ZjTZFavEsjml380udv7qZJDuKnUJGQtDA1rpOdLVGKgKdvHn3opxLqjMLOruEUawg8Xiw5KDzQw+lsHP0Nuhx0G7d0Jqa3btjlctJvFSq9d7GMmBNDuevYFmC2lxSCItQSEWITx01DsGRfYZ73989r7ZK3ShXnJP+RRzZReizQN9yeVKv84/Jp3/fUrvBDEqQTPs3XxcmW+qBKoz/9dFX3mA55fbuiknHE2XhcdUbrMcIGB4gFNpny46poyVlf8Vtd/wrXZneYl0MYVPGo68DfQu6VQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=A1B6EucJ49r/nq4XJKQ0ve8CrJVik0XIrMEuy859JVk=;
 b=W4cCLw4Uu1x60BqbcqnpklZ+8REZzkNUJr4+iTz1rvftCa7REST4WoYe3Gf3o5wPgTOx9xXIPl3L74BCQYH4l8TvzJahbdTuzpgPQvPmQLXR2TOce+i6eagPaeSAO7PJI3fBU0pcRIXzGsg5RLidz9u4yCBrDvx2G1ZvswWPLSU5RzmLY3hmFloCDmoLIOjXjemLQy/Ch2g9iXgQdFudrEa7vmAQTjBJXyNdUI8LgXiTbtvFOr/J6s97ZnOnBRrfHfkJZGJ89QZoFG7KZAqgNwi7tKhC/Y283Od3GhmZWYM76QTGX5dF0TE2fptaziQsH0bqgkyKslaA24xeUHtebQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=A1B6EucJ49r/nq4XJKQ0ve8CrJVik0XIrMEuy859JVk=;
 b=qkAhWUhT8hlaXne2XVi7rCMIYaAgtQiX+h+LKJfqNP3svka1TflQcF0xRZfdbFiaNDxYSpdqby5eWKFKmB7qRtdBtGVQgn5bpLOShXYbhQAgnwzlFhc6xi7VnKxUNf9V/eAJk2SUtV5L21SaMhRcuoCiQSDIcYmDQJ9cK6k7j0E=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Stefano Stabellini <sstabellini@kernel.org>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>,
	Julien Grall <julien@xen.org>, Bertrand Marquis <Bertrand.Marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, Jan
 Beulich <jbeulich@suse.com>, Wei Liu <wl@xen.org>, Juergen Gross
	<jgross@suse.com>, Dario Faggioli <dfaggioli@suse.com>
Subject: Re: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Topic: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Index: AQHYNKHSvTK6bj2+f02v/DWZHCtE9qy5jxyAgACrU4CAAAFygA==
Date: Fri, 11 Mar 2022 14:16:18 +0000
Message-ID: <80352F68-AF73-4FB0-9E16-E1B7ED01EBAB@arm.com>
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-5-luca.fancellu@arm.com>
 <alpine.DEB.2.22.394.2203101957370.3497@ubuntu-linux-20-04-desktop>
 <A34CF75A-8139-4A4A-A1AE-3BA74E70DE55@arm.com>
In-Reply-To: <A34CF75A-8139-4A4A-A1AE-3BA74E70DE55@arm.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 084460e9-47f4-4c80-4975-08da0369bc31
x-ms-traffictypediagnostic:
	VI1PR08MB2992:EE_|VE1EUR03FT037:EE_|AM6PR08MB3878:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR08MB3878DEB58286E33613687903E40C9@AM6PR08MB3878.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(316002)(2906002)(64756008)(6486002)(122000001)(2616005)(36756003)(38100700002)(6916009)(54906003)(66446008)(4326008)(66556008)(38070700005)(7416002)(6506007)(8936002)(5660300002)(508600001)(8676002)(66476007)(33656002)(66946007)(91956017)(76116006)(83380400001)(6512007)(71200400001)(86362001)(30864003)(186003)(26005)(53546011)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <F9FBE4A7B94B3145BA4668FCFAB01A59@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB2992
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT037.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	e0f20a96-8911-48dd-1f7a-08da0369b5c8
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(356005)(33656002)(83380400001)(40460700003)(107886003)(336012)(316002)(2616005)(8676002)(26005)(186003)(2906002)(70206006)(70586007)(4326008)(6862004)(81166007)(36860700001)(36756003)(6506007)(53546011)(82310400004)(6486002)(6512007)(508600001)(54906003)(47076005)(30864003)(86362001)(8936002)(5660300002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 14:16:28.8736
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 084460e9-47f4-4c80-4975-08da0369bc31
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT037.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB3878

DQoNCj4gT24gMTEgTWFyIDIwMjIsIGF0IDE0OjExLCBMdWNhIEZhbmNlbGx1IDxMdWNhLkZhbmNl
bGx1QGFybS5jb20+IHdyb3RlOg0KPiANCj4gSGkgU3RlZmFubywNCj4gDQo+PiBPbiAxMSBNYXIg
MjAyMiwgYXQgMDM6NTcsIFN0ZWZhbm8gU3RhYmVsbGluaSA8c3N0YWJlbGxpbmlAa2VybmVsLm9y
Zz4gd3JvdGU6DQo+PiANCj4+IE9uIFRodSwgMTAgTWFyIDIwMjIsIEx1Y2EgRmFuY2VsbHUgd3Jv
dGU6DQo+Pj4gSW50cm9kdWNlIGEgd2F5IHRvIGNyZWF0ZSBkaWZmZXJlbnQgY3B1cG9vbHMgYXQg
Ym9vdCB0aW1lLCB0aGlzIGlzDQo+Pj4gcGFydGljdWxhcmx5IHVzZWZ1bCBvbiBBUk0gYmlnLkxJ
VFRMRSBzeXN0ZW0gd2hlcmUgdGhlcmUgbWlnaHQgYmUgdGhlDQo+Pj4gbmVlZCB0byBoYXZlIGRp
ZmZlcmVudCBjcHVwb29scyBmb3IgZWFjaCB0eXBlIG9mIGNvcmUsIGJ1dCBhbHNvDQo+Pj4gc3lz
dGVtcyB1c2luZyBOVU1BIGNhbiBoYXZlIGRpZmZlcmVudCBjcHUgcG9vbHMgZm9yIGVhY2ggbm9k
ZS4NCj4+PiANCj4+PiBUaGUgZmVhdHVyZSBvbiBhcm0gcmVsaWVzIG9uIGEgc3BlY2lmaWNhdGlv
biBvZiB0aGUgY3B1cG9vbHMgZnJvbSB0aGUNCj4+PiBkZXZpY2UgdHJlZSB0byBidWlsZCBwb29s
cyBhbmQgYXNzaWduIGNwdXMgdG8gdGhlbS4NCj4+PiANCj4+PiBEb2N1bWVudGF0aW9uIGlzIGNy
ZWF0ZWQgdG8gZXhwbGFpbiB0aGUgZmVhdHVyZS4NCj4+PiANCj4+PiBTaWduZWQtb2ZmLWJ5OiBM
dWNhIEZhbmNlbGx1IDxsdWNhLmZhbmNlbGx1QGFybS5jb20+DQo+Pj4gLS0tDQo+Pj4gQ2hhbmdl
cyBpbiB2MjoNCj4+PiAtIE1vdmUgZmVhdHVyZSB0byBjb21tb24gY29kZSAoSnVlcmdlbikNCj4+
PiAtIFRyeSB0byBkZWNvdXBsZSBkdGIgcGFyc2UgYW5kIGNwdXBvb2wgY3JlYXRpb24gdG8gYWxs
b3cNCj4+PiBtb3JlIHdheSB0byBzcGVjaWZ5IGNwdXBvb2xzIChmb3IgZXhhbXBsZSBjb21tYW5k
IGxpbmUpDQo+Pj4gLSBDcmVhdGVkIHN0YW5kYWxvbmUgZHQgbm9kZSBmb3IgdGhlIHNjaGVkdWxl
ciBzbyBpdCBjYW4NCj4+PiBiZSB1c2VkIGluIGZ1dHVyZSB3b3JrIHRvIHNldCBzY2hlZHVsZXIg
c3BlY2lmaWMNCj4+PiBwYXJhbWV0ZXJzDQo+Pj4gLSBVc2Ugb25seSBhdXRvIGdlbmVyYXRlZCBp
ZHMgZm9yIGNwdXBvb2xzDQo+Pj4gLS0tDQo+Pj4gZG9jcy9taXNjL2FybS9kZXZpY2UtdHJlZS9j
cHVwb29scy50eHQgfCAxNTYgKysrKysrKysrKysrKysrKysrDQo+Pj4geGVuL2NvbW1vbi9LY29u
ZmlnICAgICAgICAgICAgICAgICAgICAgfCAgIDggKw0KPj4+IHhlbi9jb21tb24vTWFrZWZpbGUg
ICAgICAgICAgICAgICAgICAgIHwgICAxICsNCj4+PiB4ZW4vY29tbW9uL2Jvb3RfY3B1cG9vbHMu
YyAgICAgICAgICAgICB8IDIxMiArKysrKysrKysrKysrKysrKysrKysrKysrDQo+Pj4geGVuL2Nv
bW1vbi9zY2hlZC9jcHVwb29sLmMgICAgICAgICAgICAgfCAgIDYgKy0NCj4+PiB4ZW4vaW5jbHVk
ZS94ZW4vc2NoZWQuaCAgICAgICAgICAgICAgICB8ICAxOSArKysNCj4+PiA2IGZpbGVzIGNoYW5n
ZWQsIDQwMSBpbnNlcnRpb25zKCspLCAxIGRlbGV0aW9uKC0pDQo+Pj4gY3JlYXRlIG1vZGUgMTAw
NjQ0IGRvY3MvbWlzYy9hcm0vZGV2aWNlLXRyZWUvY3B1cG9vbHMudHh0DQo+Pj4gY3JlYXRlIG1v
ZGUgMTAwNjQ0IHhlbi9jb21tb24vYm9vdF9jcHVwb29scy5jDQo+Pj4gDQo+Pj4gZGlmZiAtLWdp
dCBhL2RvY3MvbWlzYy9hcm0vZGV2aWNlLXRyZWUvY3B1cG9vbHMudHh0IGIvZG9jcy9taXNjL2Fy
bS9kZXZpY2UtdHJlZS9jcHVwb29scy50eHQNCj4+PiBuZXcgZmlsZSBtb2RlIDEwMDY0NA0KPj4+
IGluZGV4IDAwMDAwMDAwMDAwMC4uZDVhODJlZDBkNDVhDQo+Pj4gLS0tIC9kZXYvbnVsbA0KPj4+
ICsrKyBiL2RvY3MvbWlzYy9hcm0vZGV2aWNlLXRyZWUvY3B1cG9vbHMudHh0DQo+Pj4gQEAgLTAs
MCArMSwxNTYgQEANCj4+PiArQm9vdCB0aW1lIGNwdXBvb2xzDQo+Pj4gKz09PT09PT09PT09PT09
PT09PQ0KPj4+ICsNCj4+PiArV2hlbiBCT09UX1RJTUVfQ1BVUE9PTFMgaXMgZW5hYmxlZCBpbiB0
aGUgWGVuIGNvbmZpZ3VyYXRpb24sIGl0IGlzIHBvc3NpYmxlIHRvDQo+Pj4gK2NyZWF0ZSBjcHVw
b29scyBkdXJpbmcgYm9vdCBwaGFzZSBieSBzcGVjaWZ5aW5nIHRoZW0gaW4gdGhlIGRldmljZSB0
cmVlLg0KPj4+ICsNCj4+PiArQ3B1cG9vbHMgc3BlY2lmaWNhdGlvbiBub2RlcyBzaGFsbCBiZSBk
aXJlY3QgY2hpbGRzIG9mIC9jaG9zZW4gbm9kZS4NCj4+PiArRWFjaCBjcHVwb29sIG5vZGUgY29u
dGFpbnMgdGhlIGZvbGxvd2luZyBwcm9wZXJ0aWVzOg0KPj4+ICsNCj4+PiArLSBjb21wYXRpYmxl
IChtYW5kYXRvcnkpDQo+Pj4gKw0KPj4+ICsgICAgTXVzdCBhbHdheXMgaW5jbHVkZSB0aGUgY29t
cGF0aWJsaXR5IHN0cmluZzogInhlbixjcHVwb29sIi4NCj4+PiArDQo+Pj4gKy0gY3B1cG9vbC1j
cHVzIChtYW5kYXRvcnkpDQo+Pj4gKw0KPj4+ICsgICAgTXVzdCBiZSBhIGxpc3Qgb2YgZGV2aWNl
IHRyZWUgcGhhbmRsZSB0byBub2RlcyBkZXNjcmliaW5nIGNwdXMgKGUuZy4gaGF2aW5nDQo+Pj4g
KyAgICBkZXZpY2VfdHlwZSA9ICJjcHUiKSwgaXQgY2FuJ3QgYmUgZW1wdHkuDQo+Pj4gKw0KPj4+
ICstIGNwdXBvb2wtc2NoZWQgKG9wdGlvbmFsKQ0KPj4+ICsNCj4+PiArICAgIE11c3QgYmUgYSBk
ZXZpY2UgdHJlZSBwaGFuZGxlIHRvIGEgbm9kZSBoYXZpbmcgInhlbixzY2hlZHVsZXIiIGNvbXBh
dGlibGUNCj4+PiArICAgIChkZXNjcmlwdGlvbiBiZWxvdyksIGl0IGhhcyBubyBlZmZlY3Qgd2hl
biB0aGUgY3B1cG9vbCByZWZlcnMgdG8gdGhlIGNwdXBvb2wNCj4+PiArICAgIG51bWJlciB6ZXJv
LCBpbiB0aGF0IGNhc2UgdGhlIGRlZmF1bHQgWGVuIHNjaGVkdWxlciBpcyBzZWxlY3RlZCAoc2No
ZWQ9PC4uLj4NCj4+PiArICAgIGJvb3QgYXJndW1lbnQpLg0KPj4gDQo+PiBUaGlzIGlzICphIGxv
dCogYmV0dGVyLg0KPj4gDQo+PiBUaGUgZGV2aWNlIHRyZWUgcGFydCBpcyBuaWNlLiBJIGhhdmUg
b25seSBvbmUgcXVlc3Rpb24gbGVmdCBvbiBpdDogd2h5DQo+PiBkbyB3ZSBuZWVkIGEgc2VwYXJh
dGUgc2NoZWR1bGVyIG5vZGU/IENvdWxkIHRoZSAiY3B1cG9vbC1zY2hlZCIgcHJvcGVydHkNCj4+
IGJlIGEgc2ltcGxlIHN0cmluZyB3aXRoIHRoZSBzY2hlZHVsZXIgbmFtZT8NCj4+IA0KPj4gRS5n
LjoNCj4+IA0KPj4gICBjcHVwb29sX2Egew0KPj4gICAgICAgY29tcGF0aWJsZSA9ICJ4ZW4sY3B1
cG9vbCI7DQo+PiAgICAgICBjcHVwb29sLWNwdXMgPSA8JmE1M18xICZhNTNfMj47DQo+PiAgIH07
DQo+PiAgIGNwdXBvb2xfYiB7DQo+PiAgICAgICBjb21wYXRpYmxlID0gInhlbixjcHVwb29sIjsN
Cj4+ICAgICAgIGNwdXBvb2wtY3B1cyA9IDwmYTcyXzEgJmE3Ml8yPjsNCj4+ICAgICAgIGNwdXBv
b2wtc2NoZWQgPSAibnVsbCI7DQo+PiAgIH07DQo+PiANCj4+IA0KPj4gVG8gbWUsIGl0IGRvZXNu
J3QgbG9vayBsaWtlIHRoZXNlIG5ldyAic2NoZWR1bGVyIHNwZWNpZmljYXRpb24gbm9kZXMiDQo+
PiBicmluZyBhbnkgYmVuZWZpdHMuIEkgd291bGQganVzdCBnZXQgcmlkIG9mIHRoZW0uDQo+IA0K
PiBGcm9tIGEgY29tbWVudCBvZiBKdWVyZ2VuIG9uIHRoZSBzZWNvbmQgcGF0Y2ggSSB0aG91Z2h0
IHNvbWVvbmUgc2VlcyB0aGUgbmVlZCB0bw0KPiBoYXZlIGEgd2F5IHRvIHNldCBzY2hlZHVsaW5n
IHBhcmFtZXRlcnM6DQo+IA0KPiDigJx5b3UgYXJlIGFsbG93aW5nIHRvIHVzZSBhbm90aGVyIHNj
aGVkdWxlciwNCj4gYnV0IHdoYXQgaWYgc29tZW9uZSB3YW50cyB0byBzZXQgbm9uLXN0YW5kYXJk
IHNjaGVkdWxpbmcgcGFyYW1ldGVycw0KPiAoZS5nLiBhbm90aGVyIHRpbWUgc2xpY2UpP+KAnQ0K
PiANCj4gU28gSSB0aG91Z2h0IEkgY291bGQgaW50cm9kdWNlIGEgc2NoZWR1bGVyIHNwZWNpZmlj
YXRpb24gbm9kZSB0aGF0IGNvdWxkIGluIHRoZSBmdXR1cmUgYmUNCj4gZXh0ZW5kZWQgYW5kIHVz
ZWQgdG8gc2V0IHNjaGVkdWxpbmcgcGFyYW1ldGVyLg0KPiANCj4gSWYgaXQgaXMgc29tZXRoaW5n
IHRoYXQgaXMgbm90IG5lZWRlZCwgSSB3aWxsIGdldCByaWQgb2YgaXQuDQo+IA0KPj4gDQo+PiAN
Cj4+PiArQSBzY2hlZHVsZXIgc3BlY2lmaWNhdGlvbiBub2RlIGlzIGEgZGV2aWNlIHRyZWUgbm9k
ZSB0aGF0IGNvbnRhaW5zIHRoZSBmb2xsb3dpbmcNCj4+PiArcHJvcGVydGllczoNCj4+PiArDQo+
Pj4gKy0gY29tcGF0aWJsZSAobWFuZGF0b3J5KQ0KPj4+ICsNCj4+PiArICAgIE11c3QgYWx3YXlz
IGluY2x1ZGUgdGhlIGNvbXBhdGlibGl0eSBzdHJpbmc6ICJ4ZW4sc2NoZWR1bGVyIi4NCj4+PiAr
DQo+Pj4gKy0gc2NoZWQtbmFtZSAobWFuZGF0b3J5KQ0KPj4+ICsNCj4+PiArICAgIE11c3QgYmUg
YSBzdHJpbmcgaGF2aW5nIHRoZSBuYW1lIG9mIGEgWGVuIHNjaGVkdWxlciwgY2hlY2sgdGhlIHNj
aGVkPTwuLi4+DQo+Pj4gKyAgICBib290IGFyZ3VtZW50IGZvciBhbGxvd2VkIHZhbHVlcy4NCj4+
PiArDQo+Pj4gKw0KPj4+ICtDb25zdHJhaW50cw0KPj4+ICs9PT09PT09PT09PQ0KPj4+ICsNCj4+
PiArSWYgbm8gY3B1cG9vbHMgYXJlIHNwZWNpZmllZCwgYWxsIGNwdXMgd2lsbCBiZSBhc3NpZ25l
ZCB0byBvbmUgY3B1cG9vbA0KPj4+ICtpbXBsaWNpdGx5IGNyZWF0ZWQgKFBvb2wtMCkuDQo+Pj4g
Kw0KPj4+ICtJZiBjcHVwb29scyBub2RlIGFyZSBzcGVjaWZpZWQsIGJ1dCBub3QgZXZlcnkgY3B1
IGJyb3VnaHQgdXAgYnkgWGVuIGlzIGFzc2lnbmVkLA0KPj4+ICthbGwgdGhlIG5vdCBhc3NpZ25l
ZCBjcHUgd2lsbCBiZSBhc3NpZ25lZCB0byBhbiBhZGRpdGlvbmFsIGNwdXBvb2wuDQo+Pj4gKw0K
Pj4+ICtJZiBhIGNwdSBpcyBhc3NpZ25lZCB0byBhIGNwdXBvb2wsIGJ1dCBpdCdzIG5vdCBicm91
Z2h0IHVwIGNvcnJlY3RseSwgWGVuIHdpbGwNCj4+PiArc3RvcC4NCj4+PiArDQo+Pj4gKw0KPj4+
ICtFeGFtcGxlcw0KPj4+ICs9PT09PT09PQ0KPj4+ICsNCj4+PiArQSBzeXN0ZW0gaGF2aW5nIHR3
byB0eXBlcyBvZiBjb3JlLCB0aGUgZm9sbG93aW5nIGRldmljZSB0cmVlIHNwZWNpZmljYXRpb24g
d2lsbA0KPj4+ICtpbnN0cnVjdCBYZW4gdG8gaGF2ZSB0d28gY3B1cG9vbHM6DQo+Pj4gKw0KPj4+
ICstIFRoZSBjcHVwb29sIHdpdGggaWQgMCB3aWxsIGhhdmUgNCBjcHVzIGFzc2lnbmVkLg0KPj4+
ICstIFRoZSBjcHVwb29sIHdpdGggaWQgMSB3aWxsIGhhdmUgMiBjcHVzIGFzc2lnbmVkLg0KPj4+
ICsNCj4+PiArVGhlIGZvbGxvd2luZyBleGFtcGxlIGNhbiB3b3JrIG9ubHkgaWYgaG1wLXVuc2Fm
ZT0xIGlzIHBhc3NlZCB0byBYZW4gYm9vdA0KPj4+ICthcmd1bWVudHMsIG90aGVyd2lzZSBub3Qg
YWxsIGNvcmVzIHdpbGwgYmUgYnJvdWdodCB1cCBieSBYZW4gYW5kIHRoZSBjcHVwb29sDQo+Pj4g
K2NyZWF0aW9uIHByb2Nlc3Mgd2lsbCBzdG9wIFhlbi4NCj4+PiArDQo+Pj4gKw0KPj4+ICthNzJf
MTogY3B1QDAgew0KPj4+ICsgICAgICAgIGNvbXBhdGlibGUgPSAiYXJtLGNvcnRleC1hNzIiOw0K
Pj4+ICsgICAgICAgIHJlZyA9IDwweDAgMHgwPjsNCj4+PiArICAgICAgICBkZXZpY2VfdHlwZSA9
ICJjcHUiOw0KPj4+ICsgICAgICAgIFsuLi5dDQo+Pj4gK307DQo+Pj4gKw0KPj4+ICthNzJfMjog
Y3B1QDEgew0KPj4+ICsgICAgICAgIGNvbXBhdGlibGUgPSAiYXJtLGNvcnRleC1hNzIiOw0KPj4+
ICsgICAgICAgIHJlZyA9IDwweDAgMHgxPjsNCj4+PiArICAgICAgICBkZXZpY2VfdHlwZSA9ICJj
cHUiOw0KPj4+ICsgICAgICAgIFsuLi5dDQo+Pj4gK307DQo+Pj4gKw0KPj4+ICthNTNfMTogY3B1
QDEwMCB7DQo+Pj4gKyAgICAgICAgY29tcGF0aWJsZSA9ICJhcm0sY29ydGV4LWE1MyI7DQo+Pj4g
KyAgICAgICAgcmVnID0gPDB4MCAweDEwMD47DQo+Pj4gKyAgICAgICAgZGV2aWNlX3R5cGUgPSAi
Y3B1IjsNCj4+PiArICAgICAgICBbLi4uXQ0KPj4+ICt9Ow0KPj4+ICsNCj4+PiArYTUzXzI6IGNw
dUAxMDEgew0KPj4+ICsgICAgICAgIGNvbXBhdGlibGUgPSAiYXJtLGNvcnRleC1hNTMiOw0KPj4+
ICsgICAgICAgIHJlZyA9IDwweDAgMHgxMDE+Ow0KPj4+ICsgICAgICAgIGRldmljZV90eXBlID0g
ImNwdSI7DQo+Pj4gKyAgICAgICAgWy4uLl0NCj4+PiArfTsNCj4+PiArDQo+Pj4gK2E1M18zOiBj
cHVAMTAyIHsNCj4+PiArICAgICAgICBjb21wYXRpYmxlID0gImFybSxjb3J0ZXgtYTUzIjsNCj4+
PiArICAgICAgICByZWcgPSA8MHgwIDB4MTAyPjsNCj4+PiArICAgICAgICBkZXZpY2VfdHlwZSA9
ICJjcHUiOw0KPj4+ICsgICAgICAgIFsuLi5dDQo+Pj4gK307DQo+Pj4gKw0KPj4+ICthNTNfNDog
Y3B1QDEwMyB7DQo+Pj4gKyAgICAgICAgY29tcGF0aWJsZSA9ICJhcm0sY29ydGV4LWE1MyI7DQo+
Pj4gKyAgICAgICAgcmVnID0gPDB4MCAweDEwMz47DQo+Pj4gKyAgICAgICAgZGV2aWNlX3R5cGUg
PSAiY3B1IjsNCj4+PiArICAgICAgICBbLi4uXQ0KPj4+ICt9Ow0KPj4+ICsNCj4+PiArY2hvc2Vu
IHsNCj4+PiArDQo+Pj4gKyAgICBzY2hlZDogc2NoZWRfYSB7DQo+Pj4gKyAgICAgICAgY29tcGF0
aWJsZSA9ICJ4ZW4sc2NoZWR1bGVyIjsNCj4+PiArICAgICAgICBzY2hlZC1uYW1lID0gImNyZWRp
dDIiOw0KPj4+ICsgICAgfTsNCj4+PiArICAgIGNwdXBvb2xfYSB7DQo+Pj4gKyAgICAgICAgY29t
cGF0aWJsZSA9ICJ4ZW4sY3B1cG9vbCI7DQo+Pj4gKyAgICAgICAgY3B1cG9vbC1jcHVzID0gPCZh
NTNfMSAmYTUzXzIgJmE1M18zICZhNTNfND47DQo+Pj4gKyAgICB9Ow0KPj4+ICsgICAgY3B1cG9v
bF9iIHsNCj4+PiArICAgICAgICBjb21wYXRpYmxlID0gInhlbixjcHVwb29sIjsNCj4+PiArICAg
ICAgICBjcHVwb29sLWNwdXMgPSA8JmE3Ml8xICZhNzJfMj47DQo+Pj4gKyAgICAgICAgY3B1cG9v
bC1zY2hlZCA9IDwmc2NoZWQ+Ow0KPj4+ICsgICAgfTsNCj4+PiArDQo+Pj4gKyAgICBbLi4uXQ0K
Pj4+ICsNCj4+PiArfTsNCj4+PiArDQo+Pj4gKw0KPj4+ICtBIHN5c3RlbSBoYXZpbmcgdGhlIGNw
dXBvb2xzIHNwZWNpZmljYXRpb24gYmVsb3cgd2lsbCBpbnN0cnVjdCBYZW4gdG8gaGF2ZSB0aHJl
ZQ0KPj4+ICtjcHVwb29sczoNCj4+PiArDQo+Pj4gKy0gVGhlIGNwdXBvb2wgUG9vbC0wIHdpbGwg
aGF2ZSAyIGNwdXMgYXNzaWduZWQuDQo+Pj4gKy0gVGhlIGNwdXBvb2wgUG9vbC0xIHdpbGwgaGF2
ZSAyIGNwdXMgYXNzaWduZWQuDQo+Pj4gKy0gVGhlIGNwdXBvb2wgUG9vbC0yIHdpbGwgaGF2ZSAy
IGNwdXMgYXNzaWduZWQgKGNyZWF0ZWQgYnkgWGVuIHdpdGggYWxsIHRoZSBub3QNCj4+PiArICBh
c3NpZ25lZCBjcHVzIGE1M18zIGFuZCBhNTNfNCkuDQo+Pj4gKw0KPj4+ICtjaG9zZW4gew0KPj4+
ICsNCj4+PiArICAgIHNjaGVkOiBzY2hlZF9hIHsNCj4+PiArICAgICAgICBjb21wYXRpYmxlID0g
InhlbixzY2hlZHVsZXIiOw0KPj4+ICsgICAgICAgIHNjaGVkLW5hbWUgPSAibnVsbCI7DQo+Pj4g
KyAgICB9Ow0KPj4+ICsgICAgY3B1cG9vbF9hIHsNCj4+PiArICAgICAgICBjb21wYXRpYmxlID0g
InhlbixjcHVwb29sIjsNCj4+PiArICAgICAgICBjcHVwb29sLWNwdXMgPSA8JmE1M18xICZhNTNf
Mj47DQo+Pj4gKyAgICB9Ow0KPj4+ICsgICAgY3B1cG9vbF9iIHsNCj4+PiArICAgICAgICBjb21w
YXRpYmxlID0gInhlbixjcHVwb29sIjsNCj4+PiArICAgICAgICBjcHVwb29sLWNwdXMgPSA8JmE3
Ml8xICZhNzJfMj47DQo+Pj4gKyAgICAgICAgY3B1cG9vbC1zY2hlZCA9IDwmc2NoZWQ+Ow0KPj4+
ICsgICAgfTsNCj4+PiArDQo+Pj4gKyAgICBbLi4uXQ0KPj4+ICsNCj4+PiArfTsNCj4+PiBcIE5v
IG5ld2xpbmUgYXQgZW5kIG9mIGZpbGUNCj4+PiBkaWZmIC0tZ2l0IGEveGVuL2NvbW1vbi9LY29u
ZmlnIGIveGVuL2NvbW1vbi9LY29uZmlnDQo+Pj4gaW5kZXggNjQ0Mzk0Mzg4OTFjLi5kYzllZWQz
MTY4MmYgMTAwNjQ0DQo+Pj4gLS0tIGEveGVuL2NvbW1vbi9LY29uZmlnDQo+Pj4gKysrIGIveGVu
L2NvbW1vbi9LY29uZmlnDQo+Pj4gQEAgLTIyLDYgKzIyLDE0IEBAIGNvbmZpZyBHUkFOVF9UQUJM
RQ0KPj4+IA0KPj4+IAkgIElmIHVuc3VyZSwgc2F5IFkuDQo+Pj4gDQo+Pj4gK2NvbmZpZyBCT09U
X1RJTUVfQ1BVUE9PTFMNCj4+PiArCWJvb2wgIkNyZWF0ZSBjcHVwb29scyBhdCBib290IHRpbWUi
DQo+Pj4gKwlkZXBlbmRzIG9uIEhBU19ERVZJQ0VfVFJFRQ0KPj4+ICsJZGVmYXVsdCBuDQo+Pj4g
KwloZWxwDQo+Pj4gKwkgIENyZWF0ZXMgY3B1cG9vbHMgZHVyaW5nIGJvb3QgdGltZSBhbmQgYXNz
aWducyBjcHVzIHRvIHRoZW0uIENwdXBvb2xzDQo+Pj4gKwkgIG9wdGlvbnMgY2FuIGJlIHNwZWNp
ZmllZCBpbiB0aGUgZGV2aWNlIHRyZWUuDQo+Pj4gKw0KPj4+IGNvbmZpZyBBTFRFUk5BVElWRV9D
QUxMDQo+Pj4gCWJvb2wNCj4+PiANCj4+PiBkaWZmIC0tZ2l0IGEveGVuL2NvbW1vbi9NYWtlZmls
ZSBiL3hlbi9jb21tb24vTWFrZWZpbGUNCj4+PiBpbmRleCBkYzhkM2ExM2Y1YjguLmM1OTQ5Nzg1
YWIyOCAxMDA2NDQNCj4+PiAtLS0gYS94ZW4vY29tbW9uL01ha2VmaWxlDQo+Pj4gKysrIGIveGVu
L2NvbW1vbi9NYWtlZmlsZQ0KPj4+IEBAIC0xLDUgKzEsNiBAQA0KPj4+IG9iai0kKENPTkZJR19B
UkdPKSArPSBhcmdvLm8NCj4+PiBvYmoteSArPSBiaXRtYXAubw0KPj4+ICtvYmotJChDT05GSUdf
Qk9PVF9USU1FX0NQVVBPT0xTKSArPSBib290X2NwdXBvb2xzLm8NCj4+PiBvYmotJChDT05GSUdf
SFlQRlNfQ09ORklHKSArPSBjb25maWdfZGF0YS5vDQo+Pj4gb2JqLSQoQ09ORklHX0NPUkVfUEFS
S0lORykgKz0gY29yZV9wYXJraW5nLm8NCj4+PiBvYmoteSArPSBjcHUubw0KPj4+IGRpZmYgLS1n
aXQgYS94ZW4vY29tbW9uL2Jvb3RfY3B1cG9vbHMuYyBiL3hlbi9jb21tb24vYm9vdF9jcHVwb29s
cy5jDQo+Pj4gbmV3IGZpbGUgbW9kZSAxMDA2NDQNCj4+PiBpbmRleCAwMDAwMDAwMDAwMDAuLmU4
NTI5YTkwMmQyMQ0KPj4+IC0tLSAvZGV2L251bGwNCj4+PiArKysgYi94ZW4vY29tbW9uL2Jvb3Rf
Y3B1cG9vbHMuYw0KPj4+IEBAIC0wLDAgKzEsMjEyIEBADQo+Pj4gKy8qIFNQRFgtTGljZW5zZS1J
ZGVudGlmaWVyOiBHUEwtMi4wICovDQo+Pj4gKy8qDQo+Pj4gKyAqIHhlbi9jb21tb24vYm9vdF9j
cHVwb29scy5jDQo+Pj4gKyAqDQo+Pj4gKyAqIENvZGUgdG8gY3JlYXRlIGNwdXBvb2xzIGF0IGJv
b3QgdGltZSBmb3IgYXJtIGFyY2hpdGVjdHVyZS4NCj4+PiArICoNCj4+PiArICogQ29weXJpZ2h0
IChDKSAyMDIyIEFybSBMdGQuDQo+Pj4gKyAqLw0KPj4+ICsNCj4+PiArI2luY2x1ZGUgPHhlbi9z
Y2hlZC5oPg0KPj4+ICsNCj4+PiArI2RlZmluZSBCVENQVVBPT0xTX0RUX05PREVfTk9fUkVHICAg
ICAoLTEpDQo+Pj4gKyNkZWZpbmUgQlRDUFVQT09MU19EVF9OT0RFX05PX0xPR19DUFUgKC0yKQ0K
Pj4+ICsNCj4+PiArc3RydWN0IHBvb2xfbWFwIHsNCj4+PiArICAgIGludCBwb29sX2lkOw0KPj4+
ICsgICAgaW50IHNjaGVkX2lkOw0KPj4+ICsgICAgc3RydWN0IGNwdXBvb2wgKnBvb2w7DQo+Pj4g
K307DQo+Pj4gKw0KPj4+ICtzdGF0aWMgc3RydWN0IHBvb2xfbWFwIF9faW5pdGRhdGEgcG9vbF9j
cHVfbWFwW05SX0NQVVNdID0NCj4+PiArICAgIHsgWzAgLi4uIE5SX0NQVVMtMV0gPSB7LnBvb2xf
aWQgPSAtMSwgLnNjaGVkX2lkID0gLTEsIC5wb29sID0gTlVMTH0gfTsNCj4+PiArc3RhdGljIHVu
c2lnbmVkIGludCBfX2luaXRkYXRhIG5leHRfcG9vbF9pZDsNCj4+PiArDQo+Pj4gKyNpZmRlZiBD
T05GSUdfQVJNDQo+Pj4gK3N0YXRpYyBpbnQgX19pbml0IGdldF9sb2dpY2FsX2NwdV9mcm9tX2h3
X2lkKHVuc2lnbmVkIGludCBod2lkKQ0KPj4+ICt7DQo+Pj4gKyAgICB1bnNpZ25lZCBpbnQgaTsN
Cj4+PiArDQo+Pj4gKyAgICBmb3IgKCBpID0gMDsgaSA8IG5yX2NwdV9pZHM7IGkrKyApDQo+Pj4g
KyAgICAgICAgaWYgKCBjcHVfbG9naWNhbF9tYXAoaSkgPT0gaHdpZCApDQo+Pj4gKyAgICAgICAg
ICAgIHJldHVybiBpOw0KPj4+ICsNCj4+PiArICAgIHJldHVybiAtMTsNCj4+PiArfQ0KPj4+ICsN
Cj4+PiArc3RhdGljIGludCBfX2luaXQNCj4+PiArZ2V0X2xvZ2ljYWxfY3B1X2Zyb21fY3B1X25v
ZGUoY29uc3Qgc3RydWN0IGR0X2RldmljZV9ub2RlICpjcHVfbm9kZSkNCj4+PiArew0KPj4+ICsg
ICAgdW5zaWduZWQgaW50IGNwdV9yZWcsIGNwdV9udW07DQo+Pj4gKyAgICBjb25zdCBfX2JlMzIg
KnByb3A7DQo+Pj4gKw0KPj4+ICsgICAgcHJvcCA9IGR0X2dldF9wcm9wZXJ0eShjcHVfbm9kZSwg
InJlZyIsIE5VTEwpOw0KPj4+ICsgICAgaWYgKCAhcHJvcCApDQo+Pj4gKyAgICAgICAgcmV0dXJu
IEJUQ1BVUE9PTFNfRFRfTk9ERV9OT19SRUc7DQo+Pj4gKw0KPj4+ICsgICAgY3B1X3JlZyA9IGR0
X3JlYWRfbnVtYmVyKHByb3AsIGR0X25fYWRkcl9jZWxscyhjcHVfbm9kZSkpOw0KPj4+ICsNCj4+
PiArICAgIGNwdV9udW0gPSBnZXRfbG9naWNhbF9jcHVfZnJvbV9od19pZChjcHVfcmVnKTsNCj4+
PiArICAgIGlmICggY3B1X251bSA8IDAgKQ0KPj4+ICsgICAgICAgIHJldHVybiBCVENQVVBPT0xT
X0RUX05PREVfTk9fTE9HX0NQVTsNCj4+PiArDQo+Pj4gKyAgICByZXR1cm4gY3B1X251bTsNCj4+
PiArfQ0KPj4+ICsNCj4+PiArc3RhdGljIGludCBfX2luaXQgY2hlY2tfYW5kX2dldF9zY2hlZF9p
ZChjb25zdCBjaGFyKiBzY2hlZHVsZXJfbmFtZSkNCj4+PiArew0KPj4+ICsgICAgaW50IHNjaGVk
X2lkID0gc2NoZWRfZ2V0X2lkX2J5X25hbWUoc2NoZWR1bGVyX25hbWUpOw0KPj4+ICsNCj4+PiAr
ICAgIGlmICggc2NoZWRfaWQgPCAwICkNCj4+PiArICAgICAgICBwYW5pYygiU2NoZWR1bGVyICVz
IGRvZXMgbm90IGV4aXN0cyFcbiIsIHNjaGVkdWxlcl9uYW1lKTsNCj4+PiArDQo+Pj4gKyAgICBy
ZXR1cm4gc2NoZWRfaWQ7DQo+Pj4gK30NCj4+PiArDQo+Pj4gK3ZvaWQgX19pbml0IGJ0Y3B1cG9v
bHNfZHRiX3BhcnNlKHZvaWQpDQo+Pj4gK3sNCj4+PiArICAgIGNvbnN0IHN0cnVjdCBkdF9kZXZp
Y2Vfbm9kZSAqY2hvc2VuLCAqbm9kZTsNCj4+PiArDQo+Pj4gKyAgICBjaG9zZW4gPSBkdF9maW5k
X25vZGVfYnlfcGF0aCgiL2Nob3NlbiIpOw0KPj4+ICsgICAgaWYgKCAhY2hvc2VuICkNCj4+PiAr
ICAgICAgICByZXR1cm47DQo+Pj4gKw0KPj4+ICsgICAgZHRfZm9yX2VhY2hfY2hpbGRfbm9kZShj
aG9zZW4sIG5vZGUpDQo+Pj4gKyAgICB7DQo+Pj4gKyAgICAgICAgY29uc3Qgc3RydWN0IGR0X2Rl
dmljZV9ub2RlICpwaGFuZGxlX25vZGU7DQo+Pj4gKyAgICAgICAgaW50IHNjaGVkX2lkID0gLTE7
DQo+Pj4gKyAgICAgICAgY29uc3QgY2hhciogc2NoZWR1bGVyX25hbWU7DQo+Pj4gKyAgICAgICAg
dW5zaWduZWQgaW50IGkgPSAwOw0KPj4+ICsNCj4+PiArICAgICAgICBpZiAoICFkdF9kZXZpY2Vf
aXNfY29tcGF0aWJsZShub2RlLCAieGVuLGNwdXBvb2wiKSApDQo+Pj4gKyAgICAgICAgICAgIGNv
bnRpbnVlOw0KPj4+ICsNCj4+PiArICAgICAgICBwaGFuZGxlX25vZGUgPSBkdF9wYXJzZV9waGFu
ZGxlKG5vZGUsICJjcHVwb29sLXNjaGVkIiwgMCk7DQo+Pj4gKyAgICAgICAgaWYgKCBwaGFuZGxl
X25vZGUgKQ0KPj4+ICsgICAgICAgIHsNCj4+PiArICAgICAgICAgICAgaWYgKCAhZHRfZGV2aWNl
X2lzX2NvbXBhdGlibGUocGhhbmRsZV9ub2RlLCAieGVuLHNjaGVkdWxlciIpICkNCj4+PiArICAg
ICAgICAgICAgICAgIHBhbmljKCJjcHVwb29sLXNjaGVkIG11c3QgYmUgYSB4ZW4sc2NoZWR1bGVy
IGNvbXBhdGlibGUiDQo+Pj4gKyAgICAgICAgICAgICAgICAgICAgICAibm9kZSFcbiIpOw0KPj4+
ICsgICAgICAgICAgICBpZiAoICFkdF9wcm9wZXJ0eV9yZWFkX3N0cmluZyhwaGFuZGxlX25vZGUs
ICJzY2hlZC1uYW1lIiwNCj4+PiArICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgJnNjaGVkdWxlcl9uYW1lKSApDQo+Pj4gKyAgICAgICAgICAgICAgICBzY2hlZF9pZCA9
IGNoZWNrX2FuZF9nZXRfc2NoZWRfaWQoc2NoZWR1bGVyX25hbWUpOw0KPj4+ICsgICAgICAgICAg
ICBlbHNlDQo+Pj4gKyAgICAgICAgICAgICAgICBwYW5pYygiRXJyb3IgdHJ5aW5nIHRvIHJlYWQg
c2NoZWQtbmFtZSBpbiAlcyFcbiIsDQo+Pj4gKyAgICAgICAgICAgICAgICAgICAgICBkdF9ub2Rl
X25hbWUocGhhbmRsZV9ub2RlKSk7DQo+Pj4gKyAgICAgICAgfQ0KPj4gDQo+PiBpdCBkb2Vzbid0
IGxvb2sgbGlrZSB0aGUgInhlbixzY2hlZHVsZXIiIG5vZGVzIGFyZSB2ZXJ5IHVzZWZ1bCBmcm9t
IGEgZHQNCj4+IHBhcnNpbmcgcGVyc3BlY3RpdmUgZWl0aGVyDQo+PiANCj4+IA0KPj4+ICsgICAg
ICAgIHBoYW5kbGVfbm9kZSA9IGR0X3BhcnNlX3BoYW5kbGUobm9kZSwgImNwdXBvb2wtY3B1cyIs
IGkrKyk7DQo+Pj4gKyAgICAgICAgaWYgKCAhcGhhbmRsZV9ub2RlICkNCj4+PiArICAgICAgICAg
ICAgcGFuaWMoIk1pc3Npbmcgb3IgZW1wdHkgY3B1cG9vbC1jcHVzIHByb3BlcnR5IVxuIik7DQo+
Pj4gKw0KPj4+ICsgICAgICAgIHdoaWxlICggcGhhbmRsZV9ub2RlICkNCj4+PiArICAgICAgICB7
DQo+Pj4gKyAgICAgICAgICAgIGludCBjcHVfbnVtOw0KPj4+ICsNCj4+PiArICAgICAgICAgICAg
Y3B1X251bSA9IGdldF9sb2dpY2FsX2NwdV9mcm9tX2NwdV9ub2RlKHBoYW5kbGVfbm9kZSk7DQo+
Pj4gKw0KPj4+ICsgICAgICAgICAgICBpZiAoIGNwdV9udW0gPCAwICkNCj4+PiArICAgICAgICAg
ICAgICAgIHBhbmljKCJFcnJvciByZXRyaWV2aW5nIGxvZ2ljYWwgY3B1IGZyb20gbm9kZSAlcyAo
JWQpXG4iLA0KPj4+ICsgICAgICAgICAgICAgICAgICAgICAgZHRfbm9kZV9uYW1lKG5vZGUpLCBj
cHVfbnVtKTsNCj4+PiArDQo+Pj4gKyAgICAgICAgICAgIGlmICggcG9vbF9jcHVfbWFwW2NwdV9u
dW1dLnBvb2xfaWQgIT0gLTEgKQ0KPj4+ICsgICAgICAgICAgICAgICAgcGFuaWMoIkxvZ2ljYWwg
Y3B1ICVkIGFscmVhZHkgYWRkZWQgdG8gYSBjcHVwb29sIVxuIiwgY3B1X251bSk7DQo+Pj4gKw0K
Pj4+ICsgICAgICAgICAgICBwb29sX2NwdV9tYXBbY3B1X251bV0ucG9vbF9pZCA9IG5leHRfcG9v
bF9pZDsNCj4+PiArICAgICAgICAgICAgcG9vbF9jcHVfbWFwW2NwdV9udW1dLnNjaGVkX2lkID0g
c2NoZWRfaWQ7DQo+Pj4gKw0KPj4+ICsgICAgICAgICAgICBwaGFuZGxlX25vZGUgPSBkdF9wYXJz
ZV9waGFuZGxlKG5vZGUsICJjcHVwb29sLWNwdXMiLCBpKyspOw0KPj4+ICsgICAgICAgIH0NCj4+
PiArDQo+Pj4gKyAgICAgICAgLyogTGV0IFhlbiBnZW5lcmF0ZSBwb29sIGlkcyAqLw0KPj4+ICsg
ICAgICAgIG5leHRfcG9vbF9pZCsrOw0KPj4+ICsgICAgfQ0KPj4+ICt9DQo+Pj4gKyNlbmRpZg0K
Pj4+ICsNCj4+PiArdm9pZCBfX2luaXQgYnRjcHVwb29sc19hbGxvY2F0ZV9wb29scyhjb25zdCBj
cHVtYXNrX3QgKmNwdV9vbmxpbmVfbWFwKQ0KPj4+ICt7DQo+Pj4gKyAgICB1bnNpZ25lZCBpbnQg
Y3B1X251bTsNCj4+PiArDQo+Pj4gKyAgICAvKg0KPj4+ICsgICAgICogSWYgdGhlcmUgYXJlIG5v
IGNwdXBvb2xzLCB0aGUgdmFsdWUgb2YgbmV4dF9wb29sX2lkIGlzIHplcm8sIHNvIHRoZSBjb2Rl
DQo+Pj4gKyAgICAgKiBiZWxvdyB3aWxsIGFzc2lnbiBldmVyeSBjcHUgdG8gY3B1cG9vbDAgYXMg
dGhlIGRlZmF1bHQgYmVoYXZpb3IuDQo+Pj4gKyAgICAgKiBXaGVuIHRoZXJlIGFyZSBjcHVwb29s
cywgdGhlIGNvZGUgYmVsb3cgaXMgYXNzaWduaW5nIGFsbCB0aGUgbm90DQo+Pj4gKyAgICAgKiBh
c3NpZ25lZCBjcHUgdG8gYSBuZXcgcG9vbCAobmV4dF9wb29sX2lkIHZhbHVlIGlzIHRoZSBsYXN0
IGlkICsgMSkuDQo+Pj4gKyAgICAgKiBJbiB0aGUgc2FtZSBsb29wIHdlIGNoZWNrIGlmIHRoZXJl
IGlzIGFueSBhc3NpZ25lZCBjcHUgdGhhdCBpcyBub3QNCj4+PiArICAgICAqIG9ubGluZS4NCj4+
PiArICAgICAqLw0KPj4+ICsgICAgZm9yICggY3B1X251bSA9IDA7IGNwdV9udW0gPCBucl9jcHVf
aWRzOyBjcHVfbnVtKysgKQ0KPj4+ICsgICAgICAgIGlmICggY3B1bWFza190ZXN0X2NwdShjcHVf
bnVtLCBjcHVfb25saW5lX21hcCkgKQ0KPj4+ICsgICAgICAgIHsNCj4+PiArICAgICAgICAgICAg
aWYgKCBwb29sX2NwdV9tYXBbY3B1X251bV0ucG9vbF9pZCA8IDAgKQ0KPj4+ICsgICAgICAgICAg
ICAgICAgcG9vbF9jcHVfbWFwW2NwdV9udW1dLnBvb2xfaWQgPSBuZXh0X3Bvb2xfaWQ7DQo+Pj4g
KyAgICAgICAgfQ0KPj4+ICsgICAgICAgIGVsc2UNCj4+IA0KPj4gUGxlYXNlIGFkZCB7IH0NCj4+
IA0KPj4gDQo+Pj4gKyAgICAgICAgICAgIGlmICggcG9vbF9jcHVfbWFwW2NwdV9udW1dLnBvb2xf
aWQgPj0gMCApDQo+Pj4gKyAgICAgICAgICAgICAgICBwYW5pYygiUG9vbC0lZCBjb250YWlucyBj
cHUldSB0aGF0IGlzIG5vdCBvbmxpbmUhXG4iLA0KPj4+ICsgICAgICAgICAgICAgICAgICAgICAg
cG9vbF9jcHVfbWFwW2NwdV9udW1dLnBvb2xfaWQsIGNwdV9udW0pOw0KPj4gDQo+PiANCj4+IA0K
Pj4+ICsjaWZkZWYgQ09ORklHX1g4Ng0KPj4+ICsgICAgLyogQ3B1MCBtdXN0IGJlIGluIGNwdXBv
b2wwIGZvciB4ODYgKi8NCj4+PiArICAgIGlmICggcG9vbF9jcHVfbWFwWzBdLnBvb2xfaWQgIT0g
MCApDQo+PiANCj4+IElzIHRoYXQgZXZlbiBwb3NzaWJsZSBvbiB4ODYgZ2l2ZW4gdGhhdCBidGNw
dXBvb2xzX2R0Yl9wYXJzZSBjYW5ub3QgZXZlbg0KPj4gcnVuIG9uIHg4Nj8NCj4+IA0KPj4gSWYg
aXQgaXMgbm90IHBvc3NpYmxlLCBJIHdvdWxkIHJlbW92ZSB0aGUgY29kZSBiZWxvdyBhbmQgc2lt
cGx5IHBhbmljDQo+PiBpbnN0ZWFkLg0KPiANCj4gQ3VycmVudGx5IHg4NiBkb2VzbuKAmXQgaGF2
ZSBhIHdheSB0byBzcGVjaWZ5IGNwdXBvb2xzLCBzbyBmb3Igbm93IG9uIHg4NiB0aGVyZSB3aWxs
DQo+IGJlIG9ubHkgY3B1cG9vbCAwIHdpdGggZXZlcnkgY3B1IGF0dGFjaGVkLCBJIHRob3VnaHQg
SSBoYWQgdG8gaGFuZGxlIHRoZSBjYXNlIGlmIGluDQo+IHRoZSBmdXR1cmUgc29tZW9uZSBhZGRz
IGEgd2F5IHRvIHNwZWNpZnkgY3B1cG9vbHMgKGNtZGxpbmU/KS4NCj4gSWYgeW91IHRoaW5rIHRo
aXMgc2hvdWxkIGJlIGhhbmRsZWQgb25seSBieSB3aG8gaW1wbGVtZW50cyB0aGF0IGZlYXR1cmUs
IEkgd2lsbCByZW1vdmUNCj4gY29tcGxldGVseSB0aGUgYmxvY2suDQo+IA0KPj4gDQo+PiANCj4+
PiArICAgIHsNCj4+PiArICAgICAgICAvKiBUaGUgY3B1cG9vbCBjb250YWluaW5nIGNwdTAgd2ls
bCBiZWNvbWUgY3B1cG9vbDAgKi8NCj4+PiArICAgICAgICB1bnNpZ25lZCBpbnQgc3dhcF9pZCA9
IHBvb2xfY3B1X21hcFswXS5wb29sX2lkOw0KPj4+ICsgICAgICAgIGZvcl9lYWNoX2NwdSAoIGNw
dV9udW0sIGNwdV9vbmxpbmVfbWFwICkNCj4+PiArICAgICAgICAgICAgaWYgKCBwb29sX2NwdV9t
YXBbY3B1X251bV0ucG9vbF9pZCA9PSBzd2FwX2lkICkNCj4+PiArICAgICAgICAgICAgICAgIHBv
b2xfY3B1X21hcFtjcHVfbnVtXS5wb29sX2lkID0gMDsNCj4+PiArICAgICAgICAgICAgZWxzZSBp
ZiAoIHBvb2xfY3B1X21hcFtjcHVfbnVtXS5wb29sX2lkID09IDAgKQ0KPj4+ICsgICAgICAgICAg
ICAgICAgcG9vbF9jcHVfbWFwW2NwdV9udW1dLnBvb2xfaWQgPSBzd2FwX2lkOw0KPj4+ICsgICAg
fQ0KPj4+ICsjZW5kaWYNCj4+PiArDQo+Pj4gKyAgICBmb3JfZWFjaF9jcHUgKCBjcHVfbnVtLCBj
cHVfb25saW5lX21hcCApDQo+Pj4gKyAgICB7DQo+Pj4gKyAgICAgICAgc3RydWN0IGNwdXBvb2wg
KnBvb2wgPSBOVUxMOw0KPj4+ICsgICAgICAgIGludCBwb29sX2lkLCBzY2hlZF9pZDsNCj4+PiAr
DQo+Pj4gKyAgICAgICAgcG9vbF9pZCA9IHBvb2xfY3B1X21hcFtjcHVfbnVtXS5wb29sX2lkOw0K
Pj4+ICsgICAgICAgIHNjaGVkX2lkID0gcG9vbF9jcHVfbWFwW2NwdV9udW1dLnNjaGVkX2lkOw0K
Pj4+ICsNCj4+PiArICAgICAgICBpZiAoIHBvb2xfaWQgKQ0KPj4+ICsgICAgICAgIHsNCj4+PiAr
ICAgICAgICAgICAgdW5zaWduZWQgaW50IGk7DQo+Pj4gKw0KPj4+ICsgICAgICAgICAgICAvKiBM
b29rIGZvciBwcmV2aW91c2x5IGNyZWF0ZWQgcG9vbCB3aXRoIGlkIHBvb2xfaWQgKi8NCj4+PiAr
ICAgICAgICAgICAgZm9yICggaSA9IDA7IGkgPCBjcHVfbnVtOyBpKysgKQ0KPj4gDQo+PiBQbGVh
c2UgYWRkIHsgfQ0KPj4gDQo+PiBCdXQgYWN0dWFsbHksIHRoZSBkb3VibGUgbG9vcCBzZWVtcyBh
IGJpdCBleGNlc3NpdmUgZm9yIHRoaXMuIENvdWxkIHdlDQo+PiBqdXN0IGhhdmUgYSBzaW5nbGUg
bG9vcCB0byBjcHVwb29sX2NyZWF0ZV9wb29sIGZyb20gMCB0byBuZXh0X3Bvb2xfaWQ/DQo+PiAN
Cj4+IFdlIGNvdWxkIGdldCByaWQgb2YgcG9vbF9jcHVfbWFwW2ldLnBvb2wgYW5kIGp1c3QgcmVs
eSBvbg0KPj4gcG9vbF9jcHVfbWFwW2ldLnBvb2xfaWQuIE5vIG5lZWQgdG8gdXBkYXRlIHBvb2xf
Y3B1X21hcFtpXS5wb29sIGlmIHdlDQo+PiBnZXQgcmlkIG9mIGl0OiBpdCBkb2Vzbid0IGxvb2sg
bGlrZSBpdCBpcyB2ZXJ5IHVzZWZ1bCBhbnl3YXk/DQo+IA0KPiBZZXMgd2UgY291bGQgY3JlYXRl
IGFsbCB0aGUgY3B1cG9vbHMgaW4gYSBsb29wIGVhc2lseSwgYnV0IHRvIHJldHJpZXZlIHRoZSBw
b2ludGVyDQo+IGZyb20gdGhlIGNwdXBvb2wgbGlzdCBJIHdvdWxkIG5lZWQgc29tZXRoaW5nLCBJ
IGNhbiBtYWtlIHB1YmxpYyB0aGlzIGZ1bmN0aW9uOg0KPiANCj4gc3RhdGljIHN0cnVjdCBjcHVw
b29sICpjcHVwb29sX2ZpbmRfYnlfaWQodW5zaWduZWQgaW50IHBvb2xpZCkNCj4gDQoNCkkgbWVh
bnQgYSB3cmFwcGVyIG9mIHRoaXMgZnVuY3Rpb24sIHNpbmNlIHRoaXMgbmVlZHMgdGhlIGxvY2su
Li4NCg0KPiBmcm9tIGNwdXBvb2wuYyB0byBnZXQgdGhlIHBvaW50ZXIgZnJvbSB0aGUgcG9vbCBp
ZCwgZG8geW91IHRoaW5rIGl0IGNhbiBiZSBvaz8NCj4gDQo+IEkgd2lsbCBhZGRyZXNzIHlvdXIg
b3RoZXIgZmluZGluZ3MgaW4gdGhlIG5leHQgc2VyaWUuDQo+IA0KPiBUaGFuayB5b3UgZm9yIHlv
dXIgcmV2aWV3Lg0KPiANCj4gQ2hlZXJzLA0KPiBMdWNhDQo+IA0KPj4gDQo+PiANCj4+PiArICAg
ICAgICAgICAgICAgIGlmICggKHBvb2xfY3B1X21hcFtpXS5wb29sX2lkID09IHBvb2xfaWQpICYm
DQo+Pj4gKyAgICAgICAgICAgICAgICAgICAgIHBvb2xfY3B1X21hcFtpXS5wb29sICkNCj4+PiAr
ICAgICAgICAgICAgICAgIHsNCj4+PiArICAgICAgICAgICAgICAgICAgICBwb29sID0gcG9vbF9j
cHVfbWFwW2ldLnBvb2w7DQo+Pj4gKyAgICAgICAgICAgICAgICAgICAgYnJlYWs7DQo+Pj4gKyAg
ICAgICAgICAgICAgICB9DQo+Pj4gKw0KPj4+ICsgICAgICAgICAgICAvKiBJZiBubyBwb29sIHdh
cyBjcmVhdGVkIGJlZm9yZSwgY3JlYXRlIGl0ICovDQo+Pj4gKyAgICAgICAgICAgIGlmICggIXBv
b2wgKQ0KPj4+ICsgICAgICAgICAgICAgICAgcG9vbCA9IGNwdXBvb2xfY3JlYXRlX3Bvb2wocG9v
bF9pZCwgc2NoZWRfaWQpOw0KPj4+ICsgICAgICAgICAgICBpZiAoICFwb29sICkNCj4+PiArICAg
ICAgICAgICAgICAgIHBhbmljKCJFcnJvciBjcmVhdGluZyBwb29sIGlkICV1IVxuIiwgcG9vbF9p
ZCk7DQo+Pj4gKyAgICAgICAgfQ0KPj4+ICsgICAgICAgIGVsc2UNCj4+PiArICAgICAgICAgICAg
cG9vbCA9IGNwdXBvb2wwOw0KPj4+ICsNCj4+PiArICAgICAgICBwb29sX2NwdV9tYXBbY3B1X251
bV0ucG9vbCA9IHBvb2w7DQo+Pj4gKyAgICAgICAgcHJpbnRrKFhFTkxPR19JTkZPICJMb2dpY2Fs
IENQVSAldSBpbiBQb29sLSV1LlxuIiwgY3B1X251bSwgcG9vbF9pZCk7DQo+Pj4gKyAgICB9DQo+
Pj4gK30NCj4+PiArDQo+Pj4gK3N0cnVjdCBjcHVwb29sICpfX2luaXQgYnRjcHVwb29sc19nZXRf
Y3B1cG9vbCh1bnNpZ25lZCBpbnQgY3B1KQ0KPj4+ICt7DQo+Pj4gKyAgICByZXR1cm4gcG9vbF9j
cHVfbWFwW2NwdV0ucG9vbDsNCj4+PiArfQ0KPj4+ICsNCj4+PiArLyoNCj4+PiArICogTG9jYWwg
dmFyaWFibGVzOg0KPj4+ICsgKiBtb2RlOiBDDQo+Pj4gKyAqIGMtZmlsZS1zdHlsZTogIkJTRCIN
Cj4+PiArICogYy1iYXNpYy1vZmZzZXQ6IDQNCj4+PiArICogdGFiLXdpZHRoOiA0DQo+Pj4gKyAq
IGluZGVudC10YWJzLW1vZGU6IG5pbA0KPj4+ICsgKiBFbmQ6DQo+Pj4gKyAqLw0KPj4+IGRpZmYg
LS1naXQgYS94ZW4vY29tbW9uL3NjaGVkL2NwdXBvb2wuYyBiL3hlbi9jb21tb24vc2NoZWQvY3B1
cG9vbC5jDQo+Pj4gaW5kZXggODlhODkxYWY3MDc2Li5iMjQ5NWFkNmQwM2UgMTAwNjQ0DQo+Pj4g
LS0tIGEveGVuL2NvbW1vbi9zY2hlZC9jcHVwb29sLmMNCj4+PiArKysgYi94ZW4vY29tbW9uL3Nj
aGVkL2NwdXBvb2wuYw0KPj4+IEBAIC0xMjQ3LDEyICsxMjQ3LDE2IEBAIHN0YXRpYyBpbnQgX19p
bml0IGNmX2NoZWNrIGNwdXBvb2xfaW5pdCh2b2lkKQ0KPj4+ICAgIGNwdXBvb2xfcHV0KGNwdXBv
b2wwKTsNCj4+PiAgICByZWdpc3Rlcl9jcHVfbm90aWZpZXIoJmNwdV9uZmIpOw0KPj4+IA0KPj4+
ICsgICAgYnRjcHVwb29sc19kdGJfcGFyc2UoKTsNCj4+PiArDQo+Pj4gKyAgICBidGNwdXBvb2xz
X2FsbG9jYXRlX3Bvb2xzKCZjcHVfb25saW5lX21hcCk7DQo+Pj4gKw0KPj4+ICAgIHNwaW5fbG9j
aygmY3B1cG9vbF9sb2NrKTsNCj4+PiANCj4+PiAgICBjcHVtYXNrX2NvcHkoJmNwdXBvb2xfZnJl
ZV9jcHVzLCAmY3B1X29ubGluZV9tYXApOw0KPj4+IA0KPj4+ICAgIGZvcl9lYWNoX2NwdSAoIGNw
dSwgJmNwdXBvb2xfZnJlZV9jcHVzICkNCj4+PiAtICAgICAgICBjcHVwb29sX2Fzc2lnbl9jcHVf
bG9ja2VkKGNwdXBvb2wwLCBjcHUpOw0KPj4+ICsgICAgICAgIGNwdXBvb2xfYXNzaWduX2NwdV9s
b2NrZWQoYnRjcHVwb29sc19nZXRfY3B1cG9vbChjcHUpLCBjcHUpOw0KPj4+IA0KPj4+ICAgIHNw
aW5fdW5sb2NrKCZjcHVwb29sX2xvY2spOw0KPj4+IA0KPj4+IGRpZmYgLS1naXQgYS94ZW4vaW5j
bHVkZS94ZW4vc2NoZWQuaCBiL3hlbi9pbmNsdWRlL3hlbi9zY2hlZC5oDQo+Pj4gaW5kZXggMmMx
MDMwM2YwMTg3Li5kZTRlOGZlZWEzOTkgMTAwNjQ0DQo+Pj4gLS0tIGEveGVuL2luY2x1ZGUveGVu
L3NjaGVkLmgNCj4+PiArKysgYi94ZW4vaW5jbHVkZS94ZW4vc2NoZWQuaA0KPj4+IEBAIC0xMTc2
LDYgKzExNzYsMjUgQEAgZXh0ZXJuIHZvaWQgY2ZfY2hlY2sgZHVtcF9ydW5xKHVuc2lnbmVkIGNo
YXIga2V5KTsNCj4+PiANCj4+PiB2b2lkIGFyY2hfZG9fcGh5c2luZm8oc3RydWN0IHhlbl9zeXNj
dGxfcGh5c2luZm8gKnBpKTsNCj4+PiANCj4+PiArI2lmZGVmIENPTkZJR19CT09UX1RJTUVfQ1BV
UE9PTFMNCj4+PiArdm9pZCBidGNwdXBvb2xzX2FsbG9jYXRlX3Bvb2xzKGNvbnN0IGNwdW1hc2tf
dCAqY3B1X29ubGluZV9tYXApOw0KPj4+ICtzdHJ1Y3QgY3B1cG9vbCAqYnRjcHVwb29sc19nZXRf
Y3B1cG9vbCh1bnNpZ25lZCBpbnQgY3B1KTsNCj4+PiArDQo+Pj4gKyNpZmRlZiBDT05GSUdfQVJN
DQo+Pj4gK3ZvaWQgYnRjcHVwb29sc19kdGJfcGFyc2Uodm9pZCk7DQo+Pj4gKyNlbHNlDQo+Pj4g
K3N0YXRpYyBpbmxpbmUgdm9pZCBidGNwdXBvb2xzX2R0Yl9wYXJzZSh2b2lkKSB7fQ0KPj4+ICsj
ZW5kaWYNCj4+PiArDQo+Pj4gKyNlbHNlDQo+Pj4gK3N0YXRpYyBpbmxpbmUgdm9pZCBidGNwdXBv
b2xzX2FsbG9jYXRlX3Bvb2xzKGNvbnN0IGNwdW1hc2tfdCAqY3B1X29ubGluZV9tYXApIHt9DQo+
Pj4gK3N0YXRpYyBpbmxpbmUgdm9pZCBidGNwdXBvb2xzX2R0Yl9wYXJzZSh2b2lkKSB7fQ0KPj4+
ICtzdGF0aWMgaW5saW5lIHN0cnVjdCBjcHVwb29sICpidGNwdXBvb2xzX2dldF9jcHVwb29sKHVu
c2lnbmVkIGludCBjcHUpDQo+Pj4gK3sNCj4+PiArICAgIHJldHVybiBjcHVwb29sMDsNCj4+PiAr
fQ0KPj4+ICsjZW5kaWYNCj4+PiArDQo+Pj4gI2VuZGlmIC8qIF9fU0NIRURfSF9fICovDQo+Pj4g
DQo+Pj4gLyoNCj4+PiAtLSANCj4+PiAyLjE3LjENCg0K


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 14:18:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 14:18:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289073.490399 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSg6M-0007he-06; Fri, 11 Mar 2022 14:18:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289073.490399; Fri, 11 Mar 2022 14:18:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSg6L-0007hX-Sj; Fri, 11 Mar 2022 14:18:41 +0000
Received: by outflank-mailman (input) for mailman id 289073;
 Fri, 11 Mar 2022 14:18:40 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=vG69=TW=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nSg6J-0007hP-94
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 14:18:40 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 23c12c60-a146-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 15:18:37 +0100 (CET)
Received: from pps.filterd (m0246631.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 22BDTCW1029467; 
 Fri, 11 Mar 2022 14:18:30 GMT
Received: from userp3030.oracle.com (userp3030.oracle.com [156.151.31.80])
 by mx0b-00069f02.pphosted.com with ESMTP id 3ekxn2saqf-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Fri, 11 Mar 2022 14:18:29 +0000
Received: from pps.filterd (userp3030.oracle.com [127.0.0.1])
 by userp3030.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 22BECVdq024357;
 Fri, 11 Mar 2022 14:18:28 GMT
Received: from nam12-dm6-obe.outbound.protection.outlook.com
 (mail-dm6nam12lp2175.outbound.protection.outlook.com [104.47.59.175])
 by userp3030.oracle.com with ESMTP id 3ekvyxmsdq-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Fri, 11 Mar 2022 14:18:28 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
 by MN2PR10MB4272.namprd10.prod.outlook.com (2603:10b6:208:1dc::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar
 2022 14:18:26 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755]) by BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755%7]) with mapi id 15.20.5061.023; Fri, 11 Mar 2022
 14:18:25 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 23c12c60-a146-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=Qy8F67MnbhoV2EvV6dtq0vsTBfGRqjKRt2v3zgtZw10=;
 b=fEwzRaZcnjIwP4ua0hqvr4q5vzYLBeGN5UhnCd7IiZc1MWsZPzngKIZ6YHRi7KfTDZXj
 NrWpr0eG4o2GijqJfIfhfqeKO64FadGKqPLjkocphKUlWgv87sxsTYxt/+XITafmQiE5
 ziLwSNJXRX56FizTctox566qr/EvnT4KnZAKcqOO7D23ta+fRa4p8GK/onGF6VVEmSF5
 /XLyKeX/UX74A1DmgzpOeNXdEp3q9iRBgk6Xpv7UzeKjluEaecBkC88R/Zic1diK3xYY
 K+Fz9szKRNMdjWzKlJg84oRDp5daMwKtwuXUq+JTIOJs8Kplrj6Zs93AulWEDGmsnazi MA== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=edDwlj6k728NErkfpXFcthMjS/5qD6GypPSgHvFHL5MQEXOqqGxOaAclziUAuT3e7eZtIre+QMj0VYpsmTthJTYE0NDvXAF2+0PPwLE5LY2m67KtPFpOGaGPHZtgPR4XYx8h83b34mkbYEdhxcwn7KlJ6w+jddXxmqoV3g/+nm/7J68+NhP/TNa4rzAeIC/bOiNepS0QhcO9s0BXeieHA0TSEzU2Gb8KuQxnmAF+IZuXe4CiNdRp2yNrefti2xqWyi3pnpBwE+VkT6qzZe2iwFTqE79WgRcrICZvVHiJt2w0o/iZ4xfVYHEtV4XCP9eQ7maT3l+co2x+goEQcbaNpg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Qy8F67MnbhoV2EvV6dtq0vsTBfGRqjKRt2v3zgtZw10=;
 b=Pyw+GW1mG9r0jzFnwwabBjUj33s4iW231wQNuwG6i9wljV9PCTvP1P+OShcBDuIsvMsw04xJADmib6wR6hTZXEUN+Oe4G9e21DIRli1V8CiagqWN3GAKVLQb8+F7ucqVSty+pJtVhRjsY0hweT1sFRKT0w2sigyB1oIwqlwdoBVz6J2pDHlr3tZWNVUc5PX4QbviT3Kt9POPBqyc/9MCUC5o0PZ8nnzB+kGWjdY2suXEvkjF7g99zKEyBqEYwBKwSTEFhmwE/rOKjYI0f+nGnERGyWleKHAeWL11L/9NK8mxJQgKZX2XEXe5cJeXRwAX+XCSE8xrK3U9hPUENd7HSw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Qy8F67MnbhoV2EvV6dtq0vsTBfGRqjKRt2v3zgtZw10=;
 b=w4kLrvuJzY/qrU1WuleiYJNzO9m3exd33XxUgltlJGI6Ukzpv9yDH6UhPeEYOI2621MYLhSPZwMdyTKgsyBro9U9mENuZZ8qKlhEwLrKPYCd5ORvsY2qH7TxvHY+tIt5Btvus22oBiRAZMneg3Vto1mAxhTrTjvOnAIrCJ5V7A8=
Message-ID: <da0efe1c-1d02-3c45-482a-b92ac314e211@oracle.com>
Date: Fri, 11 Mar 2022 09:18:13 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Subject: Re: [PATCH] xen: use time_is_before_eq_jiffies() instead of open
 coding it
Content-Language: en-US
To: Qing Wang <wangqing@vivo.com>, Juergen Gross <jgross@suse.com>,
        Stefano Stabellini <sstabellini@kernel.org>,
        xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org
References: <1646018104-61415-1-git-send-email-wangqing@vivo.com>
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
In-Reply-To: <1646018104-61415-1-git-send-email-wangqing@vivo.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: BY3PR10CA0028.namprd10.prod.outlook.com
 (2603:10b6:a03:255::33) To BLAPR10MB5009.namprd10.prod.outlook.com
 (2603:10b6:208:321::10)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 76e595bd-750d-4e3b-8bd5-08da036a0125
X-MS-TrafficTypeDiagnostic: MN2PR10MB4272:EE_
X-Microsoft-Antispam-PRVS: 
	<MN2PR10MB42723CDF35B9FE052EB602AF8A0C9@MN2PR10MB4272.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BLAPR10MB5009.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66946007)(508600001)(6486002)(6666004)(66556008)(66476007)(86362001)(8676002)(316002)(31696002)(110136005)(26005)(186003)(6512007)(6506007)(38100700002)(53546011)(2616005)(31686004)(2906002)(558084003)(36756003)(8936002)(5660300002)(44832011)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?ZjY1ZThRWFFYaXBBMGRJc3NrVlpLbFJrL1NVMGtLb3hxUUsrclN3cEE4UUIy?=
 =?utf-8?B?azJ6NzM2eTVkR1hUUkxFNTNpaHNiL1JLaUtQbG5GdVFVOHFzN2dKM1cvekYz?=
 =?utf-8?B?TER4aEJySVAxc1BVYit5NUF1WTN4cGtWMlNNTkZKQ3Mwb3o4N01IOVFSeHc0?=
 =?utf-8?B?MVhPd2Q4KzdkMFhzejdjVXpTbkF6MmVmNGZNMDEzU2RQeWNYNDhKYzVzMHJI?=
 =?utf-8?B?TVpieFVHSnJhMms4UTM0WlNnYW9EYzA5aFNLckZnbVJyUXlhMW9wbGphMTZO?=
 =?utf-8?B?RkQvNEFWcXMvZ3d1aE1mNkp3endPTXF1RWhjektCbFZZZGpTUmxzU1YxZGlW?=
 =?utf-8?B?aTV1bzduY3ZGbmdPeFNQbHhvdUZFUEhvSjNVZGVLUkhCajNHN2hJOVhjVFVy?=
 =?utf-8?B?akNTNVN5Ujh6QzlOQWJkVEVJU0dKNzJhM2R1UDVieDZsU09QenNaTllKOWZU?=
 =?utf-8?B?VDhlOEM2MGdzVm1UOEJTc29iU3diMTl1MEh2U2g1dTdEc2RtREZ1U2FjR2Zp?=
 =?utf-8?B?WDhWbUhqTVhsQWV2cWtyNUlyWk5udHhCd2RsRzJmTUk0RHJxc3JTcFlIK1lp?=
 =?utf-8?B?bFlXM3ByNjAxVEpDUjdoNDNsa3NUcFFkTUJvMk1Jei92ZGJyZ0w1WGNaQmth?=
 =?utf-8?B?VmxaMzM2VjBiU0ROVHIzMjZDOVJwWW9lNUF2dWs3WEQ4bERtK3VBWXN1NVRS?=
 =?utf-8?B?a0hMUVE3RGtEdEp0dkxUd1Z1Uy8xdlhCY0FFS0NZWU1BT1RiQUw5Q2h6V3dF?=
 =?utf-8?B?SnFEeG9WNzQxaFhndFlwVE5KWmlsVEFLbW5GRlhpMDdqSmRzcjRMdmphSXJp?=
 =?utf-8?B?SE80TXdaNVdodGdwczExdHowV3FTNyswMm1SR3RJclV1V1FSNnFYNVllUEFo?=
 =?utf-8?B?bEs0dUtFRkZaRG5OM2NTUHIxZGhGb2IvN3krY1RHTnM5eDVLb1ZYUDJRWmJM?=
 =?utf-8?B?Rm95RXlUTjRvK293Uk1KNG1CMUpuTFJRdGQyZHRUQjVNR0hteHFETkd0MnU5?=
 =?utf-8?B?MVY1Y2JGWEJhZzF2WVR3NkxXWHE3aFM2eHhneUxScGErWXQ3dHFYUG8xbGdn?=
 =?utf-8?B?VkplNFI2dUlnUlFZZGMwZks5SWE4TnB2UFVmOVdUbThJV3pUbnE4Q3lxVk9Z?=
 =?utf-8?B?eTdPUTR6cTBZeDE0M0Jsb3dWdytZZ213UE8yOFhpdzhBM3BiVnFWeHNNTlFZ?=
 =?utf-8?B?MUZaaFRqc0wzK1RhRmN6alZHMlZZMmJpRkp5b2dwc2huV1E4S1V5ekRjckpE?=
 =?utf-8?B?SDArV0pBbVBRQ0lYd1RDY0p6dWcvcHJzTDdtRVA2VmFoZmVLbFhMeUV4Y2pQ?=
 =?utf-8?B?MklEaTFkS0l6bm1sb1h6eFZ2KzlGZ0JyWGJPWTlzNWZkWURTTkJGZUlpbVBn?=
 =?utf-8?B?SkJjZTVtTlZiL0czdUJabTFEUk8zd3hTM0gyUkFpMDl5N3V1NWprbXFGVE5R?=
 =?utf-8?B?ZHNSUjFZdGNzM0lydXV4WENGWVlWa0xGMmtYQkdwNzJrUHB0bzVyQTlPK1Nn?=
 =?utf-8?B?dGZjcEl2akZWdWtmTkdaMVM4MUJvbU5uSHhaQjhHY1BDYnFZMHp0cE1xSUhW?=
 =?utf-8?B?SUNLQ1ptNk82U0RySGpRWWFlMXFYR0hFajljM3hlNzl2dVhRUE9CSmhmNWpa?=
 =?utf-8?B?SmZYSkxYZUl3RitRaU4rWlFrcWF1ZVVlM0lxV1VhdFNMRW1OVm5Nd05OTWFF?=
 =?utf-8?B?aE0yVWozWUdnc1FCVm1nbXVWK0ZoZFB2WTBsRUlGZjcxbjFqeEVkTm8xMnVF?=
 =?utf-8?B?OThoaEVpVitZcGE1bmVMaDYrVFh5QS9ybC95YnZwZXF5OG5QSWRjOG9PZGgx?=
 =?utf-8?B?UUhaWE1VVWZ1Y0hEMGpLUEdRUUZZTjV3Y1ZsOEtzSWJweXNodXZRRzJLaFpx?=
 =?utf-8?B?Q2VCL2hXd3dCZENyWCtncU42RXVVaDFieHNMaUlITEUvLy96ZVhvNlpKbWtz?=
 =?utf-8?B?SUJHelJmZVVQUEZJMTBxcTlsWGF6VGRSdzB6TEowUmpLMzV6cGZRQWFQL1l0?=
 =?utf-8?B?SDZGZ1dibGd3PT0=?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 76e595bd-750d-4e3b-8bd5-08da036a0125
X-MS-Exchange-CrossTenant-AuthSource: BLAPR10MB5009.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 14:18:25.4980
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: VTIpCaTnipPcHh+8MEGKnDt2hP7qWo8qr8CxADQQKp+2ZD6UucqVQoqrU17X06LLtXtSaOZE61Ian7gi7GnVtR1K/u4GhBQVF73W0BLy0q4=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR10MB4272
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10282 signatures=692556
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 malwarescore=0 mlxscore=0
 suspectscore=0 bulkscore=0 mlxlogscore=999 adultscore=0 spamscore=0
 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1
 engine=8.12.0-2202240000 definitions=main-2203110070
X-Proofpoint-ORIG-GUID: DKb-WaV8DylUQLM_UEA3d-5ONZG8-IeW
X-Proofpoint-GUID: DKb-WaV8DylUQLM_UEA3d-5ONZG8-IeW


On 2/27/22 10:15 PM, Qing Wang wrote:
> From: Wang Qing <wangqing@vivo.com>
>
> Use the helper function time_is_{before,after}_jiffies() to improve
> code readability.
>
> Signed-off-by: Wang Qing <wangqing@vivo.com>


Reviewed-by: Boris Ostrovsky <boris.ostrovsky@oracle.com>


Applied to for-linus-5.18



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 14:20:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 14:20:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289077.490410 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSg87-0000du-BD; Fri, 11 Mar 2022 14:20:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289077.490410; Fri, 11 Mar 2022 14:20:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSg87-0000dn-7y; Fri, 11 Mar 2022 14:20:31 +0000
Received: by outflank-mailman (input) for mailman id 289077;
 Fri, 11 Mar 2022 14:20:30 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=vG69=TW=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nSg86-0000dh-B6
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 14:20:30 +0000
Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com
 [205.220.165.32]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 65f9c43d-a146-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 15:20:28 +0100 (CET)
Received: from pps.filterd (m0246627.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 22BDTFtD001496; 
 Fri, 11 Mar 2022 14:20:06 GMT
Received: from userp3030.oracle.com (userp3030.oracle.com [156.151.31.80])
 by mx0b-00069f02.pphosted.com with ESMTP id 3ekxf10vxm-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Fri, 11 Mar 2022 14:20:06 +0000
Received: from pps.filterd (userp3030.oracle.com [127.0.0.1])
 by userp3030.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 22BECVCq024340;
 Fri, 11 Mar 2022 14:20:05 GMT
Received: from nam02-sn1-obe.outbound.protection.outlook.com
 (mail-sn1anam02lp2047.outbound.protection.outlook.com [104.47.57.47])
 by userp3030.oracle.com with ESMTP id 3ekvyxmtgq-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Fri, 11 Mar 2022 14:20:05 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
 by BYAPR10MB2901.namprd10.prod.outlook.com (2603:10b6:a03:83::11)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.19; Fri, 11 Mar
 2022 14:20:00 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755]) by BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755%7]) with mapi id 15.20.5061.023; Fri, 11 Mar 2022
 14:20:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 65f9c43d-a146-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=AzwRPKJCYGsACE2zdpPOVzAzmw0WG+/nFrwAUQxVVdM=;
 b=fYC2omq7XJVbl+ToeC1Mk1DWFo+23NMUIxLP77BdoZb6w3xXLbCiwSJ86PTv/06Fxv6Z
 MAIvRtY2/SVtJsDZW4BWhzM6jgsgZi+XlZVAPouGzsdeVpDAYydSrWUfo610QkLZzhCR
 MYQ5aLhRyHYJS8XqDkuVqT6tFT5QTtFkNoCkhJ8RhYN7dkx/zmCRnkAxa3wsVQSygsJ5
 WPjJUuQCJwAjtjXJENpr8VWR/cAI7HcVrdQ05i+vktNr+4p5hIjpXCwL30uV6Htuq/dZ
 kfLFaZY4LDIwRjpykI4fST/c8thqVXM1PRXt+luFyWPvKLfCxtLOzr6AUHz5le+W4yg6 6Q== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ZuiljGe1Bzf1BoPM4f0NM4YEZDagoBkrKgf2wKIZGfcZZ/79yuL7rh6GMyVU8PVlNGlf90pWZvNn8VVXHwaFGXGjmZG+akCATQrkhY6wYLTSvW5KkeWTtzNJ9Cgy/mocw9qOFqIy4va0fCodYDDVD+Cu2R2FTrRA/UUmJ1/Bq8/sPhkXab2KjSlxb2iI5Pb/4DIwgIDdEg9Mnmyr+4oKxoTtQwPemiiNnFZKdBpRAaMbGHApOzPaEWd+/sAfgaCHPF1L5Y/vgJfdmgpixNk3y4ZQOPjV5SJyByxhRnTKoRG7ssiGhhsqfcwmPbVE6nrFkji7Y4y0tYd/wNxi1kDY+Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=AzwRPKJCYGsACE2zdpPOVzAzmw0WG+/nFrwAUQxVVdM=;
 b=WdKM/WTJqUgoI2Uhefg3yNtdZxnMgW/17SsOFvdPhJzFAh7fqEYp1hUUa+5VxbkBBmOOAL/mWcpEHBCOocgA5EXXia11P04cigjc8TsKTi3MxYIvrtH+VYtqDRpiOW5wcg9mSq1Bn6Wo8FNOHzgTlX6EziqZkvoXlyuXP1QiJCo3D9KcVcF212OU7yV6XMiNM+J5ayTwrE4pYSzFQ0s6O+Cyf4hwqMPAmE2/G953JaLgY+4dLhlE6LfQhfXVuAsv/rqCMuH9mL4ETqAsb9EcrScn504fgx8wdUnkqW/myM7pdD0bYlE9gr4PHPkfG7WtLijL4SkPJ9sXVZWE28cGDQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=AzwRPKJCYGsACE2zdpPOVzAzmw0WG+/nFrwAUQxVVdM=;
 b=D4j+rh7LAoaV8KtSHXnHnbhP1stG36W9E9YTdQufB3qFndydGnC8ofXXpfkG0rJRUiaADAa07p5Hp/NcWJBJWLXFCcLcFoIev/PNrQ6uOhwaTXzQ9iLzFUl/g8PsrdB4EUn39yyNx8oSUa/pwRv/ts8SzlEXgWEuW8vak0XJThQ=
Message-ID: <4468bea0-4813-a0e5-50bd-ce29f23d482e@oracle.com>
Date: Fri, 11 Mar 2022 09:19:46 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Subject: Re: [PATCH v4 2/2] xen: delay xen_hvm_init_time_ops() if kdump is
 boot on vcpu>=32
Content-Language: en-US
To: Dongli Zhang <dongli.zhang@oracle.com>, xen-devel@lists.xenproject.org,
        x86@kernel.org
Cc: linux-kernel@vger.kernel.org, jgross@suse.com, sstabellini@kernel.org,
        tglx@linutronix.de, mingo@redhat.com, bp@alien8.de,
        dave.hansen@linux.intel.com, joe.jin@oracle.com
References: <20220302164032.14569-1-dongli.zhang@oracle.com>
 <20220302164032.14569-3-dongli.zhang@oracle.com>
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
In-Reply-To: <20220302164032.14569-3-dongli.zhang@oracle.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: BY3PR10CA0023.namprd10.prod.outlook.com
 (2603:10b6:a03:255::28) To BLAPR10MB5009.namprd10.prod.outlook.com
 (2603:10b6:208:321::10)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: b5fb1a8f-d6e0-48c8-3e0d-08da036a3a00
X-MS-TrafficTypeDiagnostic: BYAPR10MB2901:EE_
X-Microsoft-Antispam-PRVS: 
	<BYAPR10MB29019696C848C93A3D8339138A0C9@BYAPR10MB2901.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BLAPR10MB5009.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66476007)(4326008)(66556008)(66946007)(8676002)(107886003)(31696002)(83380400001)(26005)(2616005)(186003)(86362001)(38100700002)(5660300002)(508600001)(6486002)(44832011)(31686004)(8936002)(36756003)(316002)(2906002)(6666004)(6512007)(53546011)(6506007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?VkhHbUlTQVZNVlFMVTJ1NWlZUElCaFh3ZjJtd1RJYW01RXpZUnhHd0czRnAv?=
 =?utf-8?B?ZEVRU2tTUkJ4SE5abWdzd2lpTXhXNWZoTHA3QnhVemhzNEZkOGVuNUVjQnZn?=
 =?utf-8?B?aWhybC9xaHFsUFZPTlc2YUE2T3FOYzRwUkFsNjRMbHVFbUhqQjhybXM2M0Qr?=
 =?utf-8?B?T0JPZU1xYUNlMG9rNkJwZ3crTWIxTnJ4M2Zla2RjcXY0Q3ZoKzhibU1hNXhH?=
 =?utf-8?B?OVZaMjkwTlh1N1pTN3R1RXJsL1ppTVZ6VktMODE4TDFnVkFYYlREUk82MXQ4?=
 =?utf-8?B?NHRUSkpaZWFoQXZpWWx4eGlrMndQOThBMy9UQVFXdWlmdzVzVnRQRHovcElt?=
 =?utf-8?B?YXRBcWg3QXQrTXljVzRzL2pQUnFLVHV5cDlUT1FHYmdGViszRnA5MnNRcHBs?=
 =?utf-8?B?Z0loYVBuQ0dYMnBsYjVNa1J1MmJmUXN6K21VVm9mMGZVZUVtYUxJU1o0cElF?=
 =?utf-8?B?S0U3N2NJK2NUN0pSYTNCRVFMUXlvcTVxWmI4VHl6Nlc4VG9uUlRzVTgzSkFq?=
 =?utf-8?B?SkgzUk44Rjh3czNPUXlBeW5sSS91VkJzTm95NWZDUVJWRzJzczlTd3I0dERR?=
 =?utf-8?B?emhtVWcwRjU3bUJRWW5ySE9TTEdlRlA3blNHV1FyeE5rWHkwUm9zakZIN3o5?=
 =?utf-8?B?dm1yT1p5V21udUxDRmdNdlRPajVSdWVzb0tNSlU3eENNWFViRXNGam5RbzNB?=
 =?utf-8?B?MkJLNEk2dm9qWmVOSTBrcXB0SGZrTFdKS0JyQ3ZCOTVmdVRIOUVKdGxpM1RD?=
 =?utf-8?B?WVRpdG15Qm1KNFRMVGN3N3FSV2thdDVUMXYrNHhjUndVcUpLeUtLZ3daZDlq?=
 =?utf-8?B?QkY5cmZsSURqKzEwc21OQkduLzlnenBWd1MrVlpSbzdEc3N5TnFXdVZ4aXhk?=
 =?utf-8?B?Uys5WTlpZ1hNTzRzVTR1YkNUdi9FcGYwSUszSkpjL3BsMm4zaDkxd0w0eXpn?=
 =?utf-8?B?d2VVeDhIcit6bW40eXIzNkNIa3JtMEQ0WW5KTko0cWlpWUtJNVFpM2hmK1Jm?=
 =?utf-8?B?VWdHVzFocGowY0ZhOGVBR3p5OTQ1MGlHZm9TZ09iY21xRFBHcy9nSStIOURM?=
 =?utf-8?B?VnpxbUVrVytFSnFsNkJWUWg5YXJ2ZHdZcWpzek83U0xKVC82NnNuVUFnU21i?=
 =?utf-8?B?TmllWWVYWWVpLzZlQVByWVBzN284cE5mTm9USHpLRXVrWFZiVDA5azg2a3Zs?=
 =?utf-8?B?OXZDV25XQkI5a2FIcHFFT09DZ3ZwTEVIMDF6RVpNY3dVSkpOWUVNQjQvTmRi?=
 =?utf-8?B?NGxteDZYUGVVaVNoRGx1UldBUHU3VFRhVlRIMG5xYmFMSlBtS3pOa3B3cS9i?=
 =?utf-8?B?b3A1NTFVRExGN1c1WSttdnZISTliak1Zc2NhdkFkczhTaCtKcEFIS01lNlFI?=
 =?utf-8?B?Q3VYSHlRMHdaL2dZWnpSR1Q0SXdlZTl3OGp1cWNLeWdiQkpCV3JJcU1aZGlz?=
 =?utf-8?B?OXkxYWFROVEyZG9tWW04cGFiT0xjaWcwaFpkT0Z0SHFPWWN2VFhlWEZRTmpQ?=
 =?utf-8?B?dFFMaXQxU1c3WEZ1YVpHTHlvb2RaZ0E0N3UrWTBOZmRrNUU2VlExNjZvTnFX?=
 =?utf-8?B?bURzZ2Q2K3F2WUljbGdwaS9Dd3owL1hTK1NDUmtaS0ZqMk5jOFdjcjBsSlZX?=
 =?utf-8?B?SzFYSlBQWVN2cCtUQTIyOXYwNzc5V1NtWEVuZDF1QjUrK2dxbTBodzFaYUlL?=
 =?utf-8?B?ZnNCNmRDb0orQWZLUjJRUDBjRmpTb1JPVGJKQjRtd2NIVGl3RU85eEYwemNu?=
 =?utf-8?B?WnZkb3ZKKzg5US9obVJQYzN1TXdsOHZua3FUcklKcW10dnR1ZzFiR01hMWFp?=
 =?utf-8?B?Y1RBVjdUU0t5LzNIeGlSeDhqTWs0c0FnVXVBUnd5S05HeG9TQW5oWTlub2Zo?=
 =?utf-8?B?UzVKTW9HZW1RbWIxSWtoYzhHbmYvaXhtb1VpbDJvRVpBWUtFVzR0TXRWbjFU?=
 =?utf-8?B?UjVSdVExOE9tRFlaajdZalR1N0N1cnI2alZodkJHVkVOQWRoaVdrZ2dIbEly?=
 =?utf-8?B?K1pnUUVaV04xOUN1cTZHdEI5Z3FnRTE1MUREZmt5MkI4YXpCUHpkc21YQU00?=
 =?utf-8?B?NG5TNE9NU29NOHo2UHJsOW93YlBOMXdobE5Ud2N5T2liZ0VTY3lDWjVRN2FT?=
 =?utf-8?B?bmErTHFKVUdaQkU3dUZEczBGZmtaWE1uRVM1TXdPN2FMUkxJRWgyMXg5L3hO?=
 =?utf-8?B?eHVpSy9TUGVuR0FnR1RSSmsrYXNHREw3TGtFMmIyd3VIWjhNWDI4NkpwOUp1?=
 =?utf-8?Q?GcucaNYV4XrnvENsjfB2zxs05ewZJ1VRllojvpLbG0=3D?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b5fb1a8f-d6e0-48c8-3e0d-08da036a3a00
X-MS-Exchange-CrossTenant-AuthSource: BLAPR10MB5009.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 14:20:00.2107
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: DuG6uQMihY5O8pwaI6jNOQov8Fam9heglhq8T9fFeA0w0v1D4G4Dtj0+jrEkU3AV1uCSacyqNoBiD5hDJw8eZdzXA/BguLN4NDnqb264Y7M=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR10MB2901
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10282 signatures=692556
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 malwarescore=0 mlxscore=0
 suspectscore=0 bulkscore=0 mlxlogscore=999 adultscore=0 spamscore=0
 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1
 engine=8.12.0-2202240000 definitions=main-2203110070
X-Proofpoint-ORIG-GUID: r-PoXcf__L-nhKstcdDA2yG-XqCcJhZy
X-Proofpoint-GUID: r-PoXcf__L-nhKstcdDA2yG-XqCcJhZy


On 3/2/22 11:40 AM, Dongli Zhang wrote:
> The sched_clock() can be used very early since commit 857baa87b642
> ("sched/clock: Enable sched clock early"). In addition, with commit
> 38669ba205d1 ("x86/xen/time: Output xen sched_clock time from 0"), kdump
> kernel in Xen HVM guest may panic at very early stage when accessing
> &__this_cpu_read(xen_vcpu)->time as in below:
>
> setup_arch()
>   -> init_hypervisor_platform()
>       -> x86_init.hyper.init_platform = xen_hvm_guest_init()
>           -> xen_hvm_init_time_ops()
>               -> xen_clocksource_read()
>                   -> src = &__this_cpu_read(xen_vcpu)->time;
>
> This is because Xen HVM supports at most MAX_VIRT_CPUS=32 'vcpu_info'
> embedded inside 'shared_info' during early stage until xen_vcpu_setup() is
> used to allocate/relocate 'vcpu_info' for boot cpu at arbitrary address.
>
> However, when Xen HVM guest panic on vcpu >= 32, since
> xen_vcpu_info_reset(0) would set per_cpu(xen_vcpu, cpu) = NULL when
> vcpu >= 32, xen_clocksource_read() on vcpu >= 32 would panic.
>
> This patch calls xen_hvm_init_time_ops() again later in
> xen_hvm_smp_prepare_boot_cpu() after the 'vcpu_info' for boot vcpu is
> registered when the boot vcpu is >= 32.
>
> This issue can be reproduced on purpose via below command at the guest
> side when kdump/kexec is enabled:
>
> "taskset -c 33 echo c > /proc/sysrq-trigger"
>
> The bugfix for PVM is not implemented due to the lack of testing
> environment.
>
> Cc: Joe Jin <joe.jin@oracle.com>
> Signed-off-by: Dongli Zhang <dongli.zhang@oracle.com>


Reviewed-by: Boris Ostrovsky <boris.ostrovsky@oracle.com>


Applied to for-linus-5.18 (with return path adjusted)



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 14:21:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 14:21:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289080.490421 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSg91-0001Bv-M6; Fri, 11 Mar 2022 14:21:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289080.490421; Fri, 11 Mar 2022 14:21:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSg91-0001Bo-Ix; Fri, 11 Mar 2022 14:21:27 +0000
Received: by outflank-mailman (input) for mailman id 289080;
 Fri, 11 Mar 2022 14:21:26 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=vG69=TW=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nSg8z-0001Ba-Tr
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 14:21:26 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 8775f6ef-a146-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 15:21:24 +0100 (CET)
Received: from pps.filterd (m0246631.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 22BDTDpd029475; 
 Fri, 11 Mar 2022 14:21:19 GMT
Received: from aserp3020.oracle.com (aserp3020.oracle.com [141.146.126.70])
 by mx0b-00069f02.pphosted.com with ESMTP id 3ekxn2savd-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Fri, 11 Mar 2022 14:21:19 +0000
Received: from pps.filterd (aserp3020.oracle.com [127.0.0.1])
 by aserp3020.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 22BEBKml143029;
 Fri, 11 Mar 2022 14:21:18 GMT
Received: from nam02-sn1-obe.outbound.protection.outlook.com
 (mail-sn1anam02lp2046.outbound.protection.outlook.com [104.47.57.46])
 by aserp3020.oracle.com with ESMTP id 3ekyp49am7-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Fri, 11 Mar 2022 14:21:18 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
 by DS7PR10MB5200.namprd10.prod.outlook.com (2603:10b6:5:3a6::18) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar
 2022 14:21:16 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755]) by BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755%7]) with mapi id 15.20.5061.023; Fri, 11 Mar 2022
 14:21:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8775f6ef-a146-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=eOwkiKVKM+CFHzLED+bslnb+pRK6RA8Is8BgbESIvcs=;
 b=UsG0ByX195bflkVlwW+k85dayeWcBlJn8M1cJf6oD6rEjTACeQlo2gqNzQeiDNmf0YdS
 621PDy/fm+RsK+LjCWgpXoe3UagIRd88yFm0RLFyCoOArnidB8vX4AA1Z1h1/lpOBWYS
 yGmNIbU15rCCm5FYzGxU0+a4osjPeixQEdKsuqbrT1RHi80jnuJIpSsqQNajcUPVxQLU
 aMHDcLiEK8JfIiuEBpk7fDjOENI8BpYKhvHKpp+DDEswzO4C1sZPBARCSizsCDUgA98P
 EY+4wwBchKLon21kmFyGX+/IUCsL2uNLU/NuctwJMWGVXJSoua/N0W9Z8RKhAMRSdedh qA== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=U8sfQySo2+k1OWfMTwHqyUU88SV4iWuMzxGzeYKk6KOP7jxPq0gxJh84lGxT7vdfwluwo9qY9/Z3c0qNkOrdLVWrl3PfBgE8ijyxDHBZSPke85owDsjMl9QMYlQU+TSNs1dhIdSgSAB1mcfsfHV1LaeXtLcMbVZ5oWs4M4Q0y9OlBtYDQ+SZqNQFbO29LqXUNrPWq2m5XEFVunWLh6WHbZrd6y+ySgT29DZazuxnf2qes6Lea4BjqXFF1xBgZdwYUK3v9786DX5TLka+2CZzB95wR3qqeqwao6cHYIZU2dbDTlmVX/kqwYEN4Kll/oXBk+D2gn7jxKH7ISoMzBPEtw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=eOwkiKVKM+CFHzLED+bslnb+pRK6RA8Is8BgbESIvcs=;
 b=Nrhg7acr/+kp6ld/2QYxMQvGUiSGWmyiIC4ShXIrgQcaCmmOC36msuwCTBGgn5A768giMTzkfibu2s3PEONYd6yWxGGuPqoKGuJfyWSw7HQksIwRPejmzSNogp508htcQDXO3I76wJBlEjstr5YAjYx8Wi4p1tNk/VD/hQpFu37N6RfGkEnM0+bvcxc96dII2ty8g3g4fN6PrNyZFN8WIyTY5Z8CexnyM7A4Xsgk22nq05b8Cuny4t5tzWvo02B6iEKCTsXOg3Ja2pGNm1oBMqREFFBhhEIka0tACOirscXQ+KkBfASZCPgpMrM0RbKp0rhLwVQTXWRzAsFw4ibs1A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=eOwkiKVKM+CFHzLED+bslnb+pRK6RA8Is8BgbESIvcs=;
 b=TPW4U0oSsczHEtmOuOc7Yv/AVyZnFbkuqUBiZWEd10Yh4gU9B20aZ62cVYwz1rL8O8Ah2XbiG+3M9WUivRTln2gAd3pVrfpm7xv1VZMYX6yRK6J5BMwFVpjJbdRkHmIjSI15+oc+439vq+H/aNxKWcRF751/3JzzpAWvPqG+TUI=
Message-ID: <bd8054c2-dfe7-7eac-bf76-ccdd95095525@oracle.com>
Date: Fri, 11 Mar 2022 09:21:04 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Subject: Re: [PATCH] drivers/xen: use helper macro __ATTR_RW
Content-Language: en-US
To: zhanglianjie <zhanglianjie@uniontech.com>,
        Juergen Gross
 <jgross@suse.com>,
        David Vrabel <david.vrabel@citrix.com>
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
        Stefano Stabellini <sstabellini@kernel.org>,
        xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org,
        Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
References: <20220305133823.158961-1-zhanglianjie@uniontech.com>
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
In-Reply-To: <20220305133823.158961-1-zhanglianjie@uniontech.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: BY5PR17CA0039.namprd17.prod.outlook.com
 (2603:10b6:a03:167::16) To BLAPR10MB5009.namprd10.prod.outlook.com
 (2603:10b6:208:321::10)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 50f016c9-88e8-4707-bf29-08da036a678f
X-MS-TrafficTypeDiagnostic: DS7PR10MB5200:EE_
X-Microsoft-Antispam-PRVS: 
	<DS7PR10MB5200C0F8803F40ECA79FBC208A0C9@DS7PR10MB5200.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BLAPR10MB5009.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6512007)(6506007)(83380400001)(316002)(2906002)(4326008)(8676002)(6486002)(66556008)(6666004)(5660300002)(31696002)(66946007)(8936002)(53546011)(86362001)(44832011)(66476007)(4744005)(508600001)(2616005)(36756003)(107886003)(186003)(26005)(38100700002)(31686004)(110136005)(54906003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?TTlJVHc5QmgrTWJSbk9HTmVQY005WFM4N3I0dlV6M2R4SHdzd1d1ZkRKT04w?=
 =?utf-8?B?UTNDNGFDRHIvUm5URE1ZcTIwbnVDdUx1VFVUa0hNM2F3WlpMUkhWNEt0TDVM?=
 =?utf-8?B?N2tQMDI0RGVBdkNOTEJHUGhSTGNJVVhmYXhxazRmV1g5RWJ4cStIVEFaam1p?=
 =?utf-8?B?dGV3SEtBWlJ2QThKa2VUU2dGbE5iT1BrSTBVdmNGaFJOU3k1M214YTQ1ZUNS?=
 =?utf-8?B?d3BpbjA2REk0TU0xM0pKZnpTSXhrQWFTMVNqa2szWlljVnpwVzl4V2NPOHRW?=
 =?utf-8?B?VVpmcE0rQ3VnL2dMMEZqS2VleU1PQ29BSlFiU0lSWFJlaWJCb3NWMjVzVmNu?=
 =?utf-8?B?QzFpVjlFOWU5YmRkSTMrSFVxK3VxVGlOYkNKU00yWDNqSXU0ZDM4Mi95VHh0?=
 =?utf-8?B?V1ZMM0dhSmV0NUNlWloxVkVqckEvQnNCbEMxYzRCaUpYUEZzbDM1WmtBZGRp?=
 =?utf-8?B?ejBOWXBZTzJLTC9LM0ZMRDlHK004cFg0MTBtZkoxZXI0clZkeEhzV1Z1cGhx?=
 =?utf-8?B?WU9HUlpOeGRpcFVQMzBzdStRNXBmd3duNUI0VFpCNm1GMVBGNEgwek9pVmE2?=
 =?utf-8?B?SHBHZHVnNEtyTEVkZmRKRVFwTjcya1FvcFc4UFZNa1NMQ05SNW9leWg2Z3NB?=
 =?utf-8?B?RFVzUzUxZEdaOUFyZWVVaW44aUFJcUlvMWlMY2RtbjdEelI4OFhWZEhqdGJM?=
 =?utf-8?B?QW1uSXRrVExaUnQyTGNnWHFUSEJPMTNmT1hiZFRpOFdES1lBai9zYVY3eFA1?=
 =?utf-8?B?VFV3VmFTay9sZWtYYnE1dnJNM0hVUWtyb2lXVE1ocnRkRUp4RFhvYWszWXNr?=
 =?utf-8?B?WWlwWDAyQzJMUFNHYUkrQThaV0l3c0tSa1Y4RU9lTGVwVy82VW83aklMVHdG?=
 =?utf-8?B?NGZLblNkREtnY0F0SWhxVy84T0kwUzVvZWJjaWxTM2VLSEZOVktQSnUybDhX?=
 =?utf-8?B?MFRha2VFRnN4NmF4UjBQTU5hZmM2NmE4dG9uTlhkTGo1Z1Z4YkVUWk52VU1T?=
 =?utf-8?B?eDN3SGlhRGdnTVIrd0J3UWxydzIzc2VDWmdKbGV0Z0REZHJnMDVIZUM3WmRG?=
 =?utf-8?B?OTVQUnh1VWpBZFpWQ3QxLzdzMUw5SjdvV29aMDQ3WVRFK1V5NFNZb1Iydm95?=
 =?utf-8?B?VXFDenZhRWx3aFkrcFBkWkthTityMGhaNXl5TnpyQVNFdWt6QzhHcHgvanFT?=
 =?utf-8?B?eFkxemQ2dUdpVkJKM3E4Wmp0TGJOenhDQWZRTE9hRUUyZXppNFM4dDEzbEg2?=
 =?utf-8?B?YTBEWVFNa0M1aG9uV0ZtRGppWTAyNUZzbkp0ZU0vQXB1QjlxMElESFhHK0Rv?=
 =?utf-8?B?WVRzRG5PditNQjlWdnZUYUlvM29KRjdPNStpeUhqMGJ6Qk5kdXkrdEZudUtB?=
 =?utf-8?B?dFBuM3p1aTZQanZVSDFmT09aZjhUR25VNzRUaG9rOFhuQWhqeDZpWHBObHZ3?=
 =?utf-8?B?enMxTEd0YTdFaUdlOTAyOGhxd2lLQVE1cnplNVNHTE5lbEo1ZkVLMUtuamhu?=
 =?utf-8?B?em9KTlliWFBGMDRId2ZacDU3UnNLSHhHS2grcVZETjFiNlcyWi9sdGgvaGJG?=
 =?utf-8?B?OXgxSHJNRjhaQ0VETWVmSUxNQ2JGdFBpSDJYdGI1L0p5S3FSYTVzcnVyU0x2?=
 =?utf-8?B?OS91UGZFQTNENHkwU01oZURUdHRYeG5SbUJKUDdMSXdxeDJtL3BheFpaSzhP?=
 =?utf-8?B?K0UyOVZQUDB2RGZQU3pZU0RzZDUvYWpLamJxY2RUY3VneFNyOSt0Z2VHUFFh?=
 =?utf-8?B?ZjZyUXFFdTROdDZqTGFadEVPVUd5bVFtKzNuazNORm9BN3RrNS9iRmJyN3g2?=
 =?utf-8?B?L0lKRXlwOWQ1dmZnMXJ2WVY3ZjJoRTIwbzM2emxjbFEzMWM5Zm5ISXlLYldL?=
 =?utf-8?B?MFJiejROdXNsc2hpNDBiYXdEdzRYbVBvVmEyTWE4dTRPdDY3c1VnMHJCL3BP?=
 =?utf-8?B?ZWdPM09Td0FRaXRlcFFVS1huQU9EZnUvdUpuWmZ6OHdkM3pHdnYwT0NXRVdG?=
 =?utf-8?B?OFZQQjFpdCtRPT0=?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 50f016c9-88e8-4707-bf29-08da036a678f
X-MS-Exchange-CrossTenant-AuthSource: BLAPR10MB5009.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 14:21:16.7580
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: S5+RItXTu/+K10tmkX4zUM1VMd+BpfO+PyDUYJMjkGSN1jM0MdRobVH+hIUL/UsbwN9xSSZitw1bvynCmVyEtuGsMnu1IykBtrdTjvHmKdw=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS7PR10MB5200
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10282 signatures=692556
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 phishscore=0 mlxscore=0
 bulkscore=0 mlxlogscore=999 spamscore=0 adultscore=0 malwarescore=0
 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2202240000
 definitions=main-2203110070
X-Proofpoint-ORIG-GUID: LJs2khjPCxfIHDVfn-_gIWHP8AFmU7l3
X-Proofpoint-GUID: LJs2khjPCxfIHDVfn-_gIWHP8AFmU7l3


On 3/5/22 8:38 AM, zhanglianjie wrote:
> Use helper macro __ATTR_RW to define HYPERVISOR_ATTR_RW to make code more clear.
> Minor readability improvement.
>
> Signed-off-by: zhanglianjie <zhanglianjie@uniontech.com>


Reviewed-by: Boris Ostrovsky <boris.ostrovsky@oracle.com>


Applied to for-linus-5.18 (with whitespace change noted in commit message)





From xen-devel-bounces@lists.xenproject.org Fri Mar 11 14:22:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 14:22:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289086.490432 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSg9n-0001pJ-4p; Fri, 11 Mar 2022 14:22:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289086.490432; Fri, 11 Mar 2022 14:22:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSg9n-0001pC-1Y; Fri, 11 Mar 2022 14:22:15 +0000
Received: by outflank-mailman (input) for mailman id 289086;
 Fri, 11 Mar 2022 14:22:13 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=vG69=TW=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nSg9l-0001jN-BY
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 14:22:13 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a3c6c1c7-a146-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 15:22:12 +0100 (CET)
Received: from pps.filterd (m0246631.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 22BDTDpo029475; 
 Fri, 11 Mar 2022 14:21:54 GMT
Received: from aserp3030.oracle.com (aserp3030.oracle.com [141.146.126.71])
 by mx0b-00069f02.pphosted.com with ESMTP id 3ekxn2saww-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Fri, 11 Mar 2022 14:21:54 +0000
Received: from pps.filterd (aserp3030.oracle.com [127.0.0.1])
 by aserp3030.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 22BEBjgp091758;
 Fri, 11 Mar 2022 14:21:53 GMT
Received: from nam02-sn1-obe.outbound.protection.outlook.com
 (mail-sn1anam02lp2044.outbound.protection.outlook.com [104.47.57.44])
 by aserp3030.oracle.com with ESMTP id 3ekwwe4jt6-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Fri, 11 Mar 2022 14:21:52 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
 by DS7PR10MB5200.namprd10.prod.outlook.com (2603:10b6:5:3a6::18) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar
 2022 14:21:51 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755]) by BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755%7]) with mapi id 15.20.5061.023; Fri, 11 Mar 2022
 14:21:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a3c6c1c7-a146-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=byeKvxA6GX3sO0MuOUglsxX745JYya3OyoNB5zjeBOg=;
 b=Sdl7PbPLyRjHZ9/0a8/IMNrLScsgUtltvB22Nn5VNcgZhHlSkyyVauDLTiltX30DxCnb
 TtwqTudB8IVTEXO0fpIipXadDmkCIgPFttgt3TGup3G6nbaJIR3iK1aVju6I5GjYz29p
 M6ODoLhhoKiiNiYDC5U5z/F52N3j4RR37AlFU7NVPfswCpwux/a9pEOHz1GVnPAJA+fo
 C+2vyjd1cm+esW0FMIK/EhFp4onv7iKQDcXwbqGngqClpEekpJqqF7b7yuPE8hZuM2BW
 ZbP/md+I8YGilN+RZILqNgYqqQ0fLU/jPld+Q/VKEXAPXo8MEcFtY3gDmVT1qbrEGBw9 iQ== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Bfxmx8j/7HcjQ46MrZOSvWDN9s9VbkxaCaeg1QG8EKRyCBkKBpf4DWSXMACSnQQ5GpJ6sFKfOJb7clKIPSaRvujUiWrXJC0LtCE3zAWZekYhWgcM7sytANv9uwU5H8Jb/Si5t7Ny6PdwRg/OmYmbZHWPxTkPJnYCA+8E+9OSTK2poeTeZLYCyvCmc1PtcUteu7Lpm3JlC58mbRcnmPTPlj80XTJTUWPYnXWoIy5VORqhYwBjxWA7YribEjUyn3iP42zOLz2rmakPX/3BpuPEmIgHlWCQTONzj+HKsUc1jg82/Z99XKg/ckF8GDaYUf/Tx5fbuIjNY8KJ3ItcUj4yCA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=byeKvxA6GX3sO0MuOUglsxX745JYya3OyoNB5zjeBOg=;
 b=SAjGAyv+X90JpIZcxvN1Uv0ibiKRx5MKxoy3wFLzpDpGTH6ygyqXN+uhEj6ApaoWj1LYSN5NBrgkii8n6/MK7v8JQLrTFR5H++LmqS3pZ9NeRfrurTf8cT4JR6Wzpn97WlsFQ484gg5zTTGWPZqoVB6eNJrqq9TUkVaeQ2sVndrjN4OfxilszMg78zZIZTAGLNCfiMSOolQySk6a9631JSJdZOH2giPtEQkd87wup+Ux3XNMmdcfEnZs0yToOEuAuiNgdFhKFCo3LliQYVsU9dN5YWNbgKU3Lbhp/oX4pjFAH5uvEOifDGe8VTj3iDobdXwZ8muqIk4+OQNDpwOOXA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=byeKvxA6GX3sO0MuOUglsxX745JYya3OyoNB5zjeBOg=;
 b=FzNNZhxwVW9S1ad7b840wTBCE1jblJkYgwFyrhtkZeiWB8VSrPkllVaJ6Co4I225NdO6MEAEMeQt5zHtbOw0U/n/SsvC7GZuUenQn2bfa7cKIiVY9n2zySKjeqL+UgfNPikyY/BpdmRcgYVTMrukO4/xjuHUDgx2E3IArCidtTc=
Message-ID: <eac862a4-e7e4-b042-61eb-b1894610164b@oracle.com>
Date: Fri, 11 Mar 2022 09:21:39 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Subject: Re: [PATCH] x86/xen: Fix kerneldoc warning
Content-Language: en-US
To: Jiapeng Chong <jiapeng.chong@linux.alibaba.com>
Cc: jgross@suse.com, sstabellini@kernel.org, tglx@linutronix.de,
        mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com,
        x86@kernel.org, hpa@zytor.com, xen-devel@lists.xenproject.org,
        linux-kernel@vger.kernel.org, Abaci Robot <abaci@linux.alibaba.com>
References: <20220307062554.8334-1-jiapeng.chong@linux.alibaba.com>
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
In-Reply-To: <20220307062554.8334-1-jiapeng.chong@linux.alibaba.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: MN2PR07CA0018.namprd07.prod.outlook.com
 (2603:10b6:208:1a0::28) To BLAPR10MB5009.namprd10.prod.outlook.com
 (2603:10b6:208:321::10)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 8c757014-fd37-4e17-e01c-08da036a7c5f
X-MS-TrafficTypeDiagnostic: DS7PR10MB5200:EE_
X-Microsoft-Antispam-PRVS: 
	<DS7PR10MB5200F2447265E9E8C5AC10568A0C9@DS7PR10MB5200.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BLAPR10MB5009.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6512007)(6506007)(83380400001)(316002)(2906002)(4326008)(8676002)(6486002)(66556008)(7416002)(6666004)(5660300002)(31696002)(66946007)(8936002)(53546011)(86362001)(44832011)(66476007)(4744005)(508600001)(2616005)(36756003)(186003)(26005)(38100700002)(31686004)(6916009)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?emdyQTRxSXJkK2lOaVVLY0xQSDh5TEQvK1Rsc3YvU0JQUVVJTG5jMldNRE96?=
 =?utf-8?B?UlRWMEN2bWdIRFYwUUVhaXZEU3hIQ2haOHMrUEFIQ2d2MTRmSjhxb3J0dnYr?=
 =?utf-8?B?M1lEUjZvK0RpTGpTVDhyTWx4eXJLUVJ5QXA3cndLREtyYWErb2xsRytDcTRi?=
 =?utf-8?B?elhTTmhjRkpKVWVRWGhxcWdXZHVSMXh4VjRqWklOcTNsaFJqL0F6WEFVVHZD?=
 =?utf-8?B?amxMM0MyV1dHUFN5WkhjZmFodEkreTZUNG5Ub0ZSVEdXK05wVDljZGdWcUhB?=
 =?utf-8?B?UHVYamlRdDRLYkxTNHF0NHZaRUovb25uUzJleS9jRTdOeGIzRThaSTNLdFBm?=
 =?utf-8?B?UFNuNm1odkxzelJIcGt3OGwxQUEvTU9FVDg5WDgwY3NmZ1hLMFFxalNYaDRL?=
 =?utf-8?B?dWJ3a2lQVU1NUm5DNjJCYzBCU3VBbW4rdGhMVWdTSkxhM1g5MC9CV2ViOGlZ?=
 =?utf-8?B?bWJ2MkNyWXdobnFIUnBIMExtS0lDU2lFa3JkaHNsd0ZjWmNLZ2ZhZ3c2Mnpq?=
 =?utf-8?B?Wlo2SU1qMHRsLzJudUxDZ2NIMStZeVk5NnI0elBJUy91dmlpT0hhbFZCZXBC?=
 =?utf-8?B?c0pxZGpIYS9LcjZBMk5xOTdzR0Y5V1pJVEFlVmNqVEp0eVR5aUNmcW9nUUZw?=
 =?utf-8?B?eHYzRWMzRmUwUnZsS05KQm85TTZVUmpLYzVzYzJ1WEMwNWZEOTZlaytXSXcw?=
 =?utf-8?B?YjJlOENYODI3WGI3L2k2T25ENVRLaUQxaFZlbFVIRWJZQnEyUGJpVXZEU2Vw?=
 =?utf-8?B?NkpVeTJsTjlROHZTaXdzYUR6cXQ5anhwN1NKWWtUdUs1V205SXA1V1BEMFAr?=
 =?utf-8?B?OFcyYm5GQjRnZlNabEh6SlBkNncvYmRaRkh5M0tEbFUzTkRLNWNxTG04WjJt?=
 =?utf-8?B?RGt2d3huZ2psejUrb1pSL1dlWnNsWE0ySDYvNWdodmhnUmZ4NnJZc20xYXBh?=
 =?utf-8?B?bmtyU3pta21NWnh0Zm0vT0x4SDIvUGoraFcvek4zRW4zL3RnNlBtd2xGcWU1?=
 =?utf-8?B?VStUZXlDbXdoVWwrNWllc2VXcXkrMG4va0ZmMzloem1zZHNFZVBtL2lPdzRC?=
 =?utf-8?B?NHNyWGxoYVMwKyt1MWZXMmg4eEp0Rk5jZGMwQnMySGFoaHpndHZKaUZERGpq?=
 =?utf-8?B?MXdmMU9Va29hSUt4aFpqMGM5M3MxcHZqZGk0MmNFMnlXWVdKZHN6eWFQeEo5?=
 =?utf-8?B?OVRhWVU3cnVXTGtxaTZKRTN1OCtXWERjVjNCVWdFMTg4MkE4L05nMUdiVEVp?=
 =?utf-8?B?M2o4OWlhejRySUM2YU40RUNLQkVCM2NjVFpsYXR1b3dRRDJ2WmQxWHlJNnZY?=
 =?utf-8?B?bWwzRzdLNlZ2TkQ1dXltcG9KUGM1RWNYVHRVLzloMXNTUXdxbnN2eUxPaUJT?=
 =?utf-8?B?dG50OFNDUlVoVWRwN0hRT3ZnemNPT1kzYmorbDFZL2VGNVk1Q3ZEeGU4UHZt?=
 =?utf-8?B?d1lOZFowMWxXbFdSc2VaaHZTVjJLaGVzbFdTdStVNjhQRzZkbFR2OW9BbE55?=
 =?utf-8?B?UDB3NFR6aDJaOXE0VVZQMVpLYS9DbGlBcGVNVGpzU2kybE1ZUmIvZnJnQ1li?=
 =?utf-8?B?S1ZpVExsUkN6bWJlZ1FjYXlud21raXVVZmgyRm83Vkthc0lWc0FDMDZFOG9Z?=
 =?utf-8?B?ZTdXbzVwM2tva29SOHJnVk9aemFKdGxQUnpuVmFObG0wdUxaVEhZNmR6OGdq?=
 =?utf-8?B?WDlPWGZxR2k1bGwxSytBMmtxaFE2UFpEbm5URFpkYlM3NDBBZVpNbTVvdjhX?=
 =?utf-8?B?MFFzWU55YVRnZkZXV0FtUFgrNU9yUkJpWVp5VFBYQVlRbjlKc1NBd3J4anhX?=
 =?utf-8?B?KytjYUNOb3hoTTdaL1RVQjBWalBWL2xQYm81ZkFXSzJ5WFhHMklDeW94VDlG?=
 =?utf-8?B?RERsRkhBSDM5N2ZLclJSV3QzcmxVa2JNUmFFbXJOdVV6N0Rldm8xMldjcVky?=
 =?utf-8?B?UGc2MllLS1VlNllzem5tTXBvN0hjNDgyN1lIZ0gydWU4SVMvamg0QXBqUlJa?=
 =?utf-8?B?eVh1d1lXUXVnPT0=?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8c757014-fd37-4e17-e01c-08da036a7c5f
X-MS-Exchange-CrossTenant-AuthSource: BLAPR10MB5009.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 14:21:51.5996
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: wte9l6w2hE7818hzSazcEKjwIj1R3V80xVWLUvBlFb0dzrwFroBcPInVg7wlTnjc338xhxI6Vwwl23LbXHvdFiMeSMBdfr725lmIRxBqNRk=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS7PR10MB5200
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10282 signatures=692556
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxlogscore=999 spamscore=0
 phishscore=0 bulkscore=0 adultscore=0 malwarescore=0 suspectscore=0
 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1
 engine=8.12.0-2202240000 definitions=main-2203110070
X-Proofpoint-ORIG-GUID: Q3Wvoga4btLSncV1zrSRZmncOX1sI_ge
X-Proofpoint-GUID: Q3Wvoga4btLSncV1zrSRZmncOX1sI_ge


On 3/7/22 1:25 AM, Jiapeng Chong wrote:
> Fix the following W=1 kernel warnings:
>
> arch/x86/xen/setup.c:725: warning: expecting prototype for
> machine_specific_memory_setup(). Prototype was for xen_memory_setup()
> instead.
>
> Reported-by: Abaci Robot <abaci@linux.alibaba.com>
> Signed-off-by: Jiapeng Chong <jiapeng.chong@linux.alibaba.com>


Reviewed-by: Boris Ostrovsky <boris.ostrovsky@oracle.com>


Applied to for-linus-5.18



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 14:24:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 14:24:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289090.490443 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSgBq-0002So-Ig; Fri, 11 Mar 2022 14:24:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289090.490443; Fri, 11 Mar 2022 14:24:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSgBq-0002Sh-Dz; Fri, 11 Mar 2022 14:24:22 +0000
Received: by outflank-mailman (input) for mailman id 289090;
 Fri, 11 Mar 2022 14:24:21 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=RXIo=TW=citrix.com=prvs=0626a3ed1=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nSgBp-0002SX-7h
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 14:24:21 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ef77a203-a146-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 15:24:19 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ef77a203-a146-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647008659;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=vDV4ZFsa/MHQQwbGO+Q72XYhvRSZ0LfS+jmzzRN+65Y=;
  b=ZGqLBxnD0iYDX+iCAo7aFZ5J+XnevQHgXcabkmQQF/koX/iesnP+2sqj
   YMg27cpuEOYv4Diduzs70VTlFs+SJPf3C1GSF44Pfpo4tAFoUYr1WZh+v
   nhCxx6O56qzM9ILv+9Jq8+aweu20LFQ+04aeW2JeOkY6hvfoTroZvDCtF
   M=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66414387
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:ghsvmqjjdvVhdUqXnQWAJkUYX161dhAKZh0ujC45NGQN5FlHY01je
 htvCzrUOfjfYzD0Lo91OoXnphkDvZHQmNBqQFc6pHwxHy8b9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFrU4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YR4PG4Prlvwtbz1zP35fBK9a1+WbClHq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bkmtnwjzDS+4vXLjIQrnQ5M8e1zA17ixLNaiAO
 5NFMmowBPjGSyRBKFgYCqAZp/uTrEnQKwNJt3GxpbVitgA/yyQuieOwYbI5YOeiWsF9jkue4
 GXc8AzREhwccdCS1zeB2natnfPU2zP2XpoIE7+1/eIsh0ecrkQRAhALUVqwodGil1WzHdlYL
 iQpFjEG9PZoshbxF5+kAkP+8CXsUgMgt8R4CssfxiaD0proxy21WUk9TCJuMoANnZpjLdA17
 WOhk9TsDD1plbSaT3OB67uZxQ+P1TgpwXwqPnFdE1ZcizX3iMRq10+UEI4/eEKgpoCtQVnNL
 ya2QD/Sbln5peoCzO2F8F/OmFpATbCZH1dutm07so9Ihz6VhbJJhaT0uDA3Dt4ade51q2VtW
 lBdyqByC8hUUfmweNSlGrllIV1Qz6/t3MfgqVBuBYI90D+m5mSue4tdiBknehs3Y51bJm+xO
 BaN0e+02HO1FCL7BUOQS9jsY/nGMIC6TYi1PhwqRoYmjmdNmP+vo3g1OB/4M5HFm0kwi6AvU
 ap3gu73ZUv2/Z9PlWLsL89EiOdD7nlnmQv7GMCqpzz6gOH2TCPEFt843K6mM7lRAFWs+16Or
 b6y9qKiln1ibQEJSnKOoNBJcgxScyRT6FKfg5U/S9Nv6zFOQQkJI/TQ3akga8pimaFUnf3P5
 XazRglTz1+XuJENAV7ihqxLAF83YatCkA==
IronPort-HdrOrdr: A9a23:WI4kQaN/Cc2DXMBcTyP155DYdb4zR+YMi2TDiHofdfUFSKClfp
 6V8cjztSWUtN4QMEtQ/uxoHJPwO080kqQFnLX5XI3SJzUO3VHHEGgM1/qB/9SNIVyaygcZ79
 YdT0EcMqyAMbEZt7eC3ODQKb9Jq7PmgcOVbKXlvg9QpGlRGt9dBmxCe2Cm+yNNNW177c1TLu
 vi2iMLnUvpRV0nKuCAQlUVVenKoNPG0LrgfB49HhYirC2Dlymh5rLWGwWRmk52aUIE/Z4StU
 z+1yDp7KSqtP+2jjfaym/o9pxT3P/s0MFKCsCggtUcbh/slgGrToJ8XKDqhkF/nMifrHIR1P
 XcqRYpOMp+r1vXY2GOuBPonzLt1T4/gkWSvmOwsD/Gm4jUVTg6A81OicZyaR3C8Xctu9l6ze
 Ziw3+Zn4A/N2KOoA3No/zzEz16nEu9pnQv1cQJiWZEbIcYYLhN6aQC4UJuFosaFi6S0vFqLA
 BXNrCc2B9qSyLbU5iA1VMfg+BEH05DUytue3Jy9PB8iFNt7TJEJ0hx/r1qop5PzuN5d3B+3Z
 W2Dk1ZrsA/ciYoV9MOOA4ge7rANoWfe2OEDIqtSW6XYZ3vfUi976LK3A==
X-IronPort-AV: E=Sophos;i="5.90,174,1643691600"; 
   d="scan'208";a="66414387"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=gJBnvwwVvhoDXnd5nxTzEGib71IU1pF77hAOgN/T8/vgmKLvMtr79lO78die89g5wNeWTWa48NSQl8V9EXpJlPinDbsmsDN/KE5ZzT97unpcWP+Ebqu6SmpI2sxniLQYL3fClxAdr0q2QU763J6/SaWXMakC75dcQBEhNyOBeEOpmnuZHjpYWk9L2ERv485Kc2qTgz+uwCaODn2z+Ld878QRa3CotjSdtgM7nQBQDx+w5N5gnd6vf4jzvvCxquxmEW42jGVj6MQXe0Ezs+Ruxe25mQKls+5O1aJu1bCcZ4OvOwoWkXr4wg58LLzC5ueU75aSh7UAjExm6HWeLV0D+w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=PUVoz5ZnjPVv6WWPECj6Ql/c7yrOmuO1pB7PGRJOqEA=;
 b=KogsRDgIH0xkfpQrmx7hdwSMTeg/dLq/JiHeeSS5sCPOHyNNCgINcf9KQ1Zw0slZI93AH4k+YDoY6X3U6o3sPDOiobsquDV5DvnBUMuoPXtgKCDFlMQzIRs0rBBc5HZLMDKYxR8OTS3oXqUoPmTMUxk4gv5sDXC78FyzIxWKIAVUmZVPhNb2XErYeMAfIosV6R3bvV/8CGX6Lci1JTqyP/jcWJcs4/V5BMww8/f7Roiu+y8ntemLk7SoyZfekGUvE1MculTzONtB4UbFb1wF6umG+CS3P1ZFPGgrBrjnbohy/FPzLje1HY0X3qpcgAGRAZIQ337ucNC31Eywyv1CuA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=PUVoz5ZnjPVv6WWPECj6Ql/c7yrOmuO1pB7PGRJOqEA=;
 b=Dr6U4dddh+ar4P6PxIpJc5mcztfHzKtGHaHFUM/xjxs90xsO9LL24F7zkBY3U7JN9jjfqNShOGd4WoTqbY5fBKsvr1yz4d5RAK8+xfx5ElUok6lEJWmYrdzg02ssPVkqGhInQu2vgBf4VfE3c/uP/mLklHcKrYf9VLLCdmSupXs=
Date: Fri, 11 Mar 2022 15:24:06 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Andrew
 Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH v3 4/4] x86/APIC: make connections between seemingly
 arbitrary numbers
Message-ID: <YitbhmgGy4Yh8PoP@Air-de-Roger>
References: <35cb3c72-05ba-24c7-1fdd-3ee1aced3aec@suse.com>
 <123a9ae8-caab-01ae-5bea-8c590bd8f9d9@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <123a9ae8-caab-01ae-5bea-8c590bd8f9d9@suse.com>
X-ClientProxiedBy: LO2P265CA0233.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:b::29) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f5d014b6-caca-4865-80f2-08da036ad181
X-MS-TrafficTypeDiagnostic: SN6PR03MB4447:EE_
X-Microsoft-Antispam-PRVS: <SN6PR03MB4447D78878F6EA9DC0EB8C0B8F0C9@SN6PR03MB4447.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(6512007)(2906002)(66556008)(9686003)(6506007)(66946007)(316002)(6486002)(8676002)(186003)(66476007)(4326008)(8936002)(86362001)(508600001)(6666004)(5660300002)(85182001)(26005)(83380400001)(33716001)(38100700002)(54906003)(6916009)(82960400001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?YzJ2dVdDd0N5WUFkamJDZFduUFFEU2Vvd0V6U1pLdWd6a0dSVGhVYS90bUdB?=
 =?utf-8?B?Y3hUMm1aemJQbkEzWHNTbmlHWlNkb3pHTnpCUHdnSEYwR2xOdzdKWVpPbGlM?=
 =?utf-8?B?c3djZmVuTkFhNFJ2R3FySi85TS9qTDBFbGRwUjVob2F2MXZCNFVjUGVJaFhj?=
 =?utf-8?B?Z3RKeHV4eU0xYjJORUtwaXZRalM5NUQ1eG5hODArdGVZcWNxRSsxa2FOOEpZ?=
 =?utf-8?B?a2l4T3YvUDBFLytjeG5EV3NyaVkzaElFS0o2TUpmaXpWMG14U1UvLzU4Y1I0?=
 =?utf-8?B?d0FwOFJrSVVHL096TmNuZGdOb0g2d3Z4QWV5b0sxQ05QQURmbTB6OEZjZSs0?=
 =?utf-8?B?aklKb20zdk9nV1pNTlAyb3hxSnM1UC9Ma0k5LzU3d2o5TzA3WHAzZVhJeWRl?=
 =?utf-8?B?T2J3K1hyRzg1dWNyWnYweFp5a3hiM2FNN1dmYjMzaUhtbG5SRHZ6WDBjdGdK?=
 =?utf-8?B?aGZZb0xYMm9COFhPR1pQUW9CNkV2SFl5OWhIc1JxWllYa0FPdlpjRlovQXVs?=
 =?utf-8?B?Tk9JRGNoa0NPam45VmlkQXA0N3FXWEprbHhJYnByYzIrUVBHdm9QY283QkxF?=
 =?utf-8?B?YXBQLzkyT281R0hBUlJLbnlaWEZ1RUNuUzJnNnlhQW1wSUtCMnFMZUVCcDIx?=
 =?utf-8?B?dHovajZTYllIdDBNaWhHS3hMajZtWmZVWVBHM015OCtjR1pNTkFWTzlPYWsv?=
 =?utf-8?B?RzBUdXBMQWFQeG85VWxLd1VZQVh3RkY3YWJralQzZEtkaFFZeGltUXFrd3lm?=
 =?utf-8?B?ZFlrS3lhUHg1eE4vM1Y5ekRmU3AwR1pRMHpYMndXSERNR2J2UFFKNVNseUVh?=
 =?utf-8?B?UzV5Rm40WmFBT3RGNWpuNk9yampVZ0N0NkVJTmVFOWFhSXFMMEc2ayt3MS84?=
 =?utf-8?B?alZhUHczT1RzWkY2K01hQWFwd3FyVzd4YlZXbFUySzRnNWJ4Ym43cmpJZ0Ja?=
 =?utf-8?B?QXg5Z3VESzZ0MGYydkx3cENCWVVpVFJKSTJBclR2SE9ndGVaR056TEJhSy9S?=
 =?utf-8?B?b0liQWFycGI4M2pRRExPZDNhZ0RCcVlmVks4MC9BVER6d2NPVEhlYmluSU83?=
 =?utf-8?B?Rlk4TU1vSFFGTlhWYkk1NmFGb1NzWGdodWU1Y2tGMHVtRmxJbm9XcGF0T0xa?=
 =?utf-8?B?dzZmcDBiT05PU3pkbm1FK1hWWkJBcUcwNm94YlJIK3JOVlBPdjZiNzNlNDN6?=
 =?utf-8?B?RnljbkpKWHJWTUpGRFNOOHBYWG1mSUZqWVJLNXFYUElKNDh2RXpMSE9HcWtL?=
 =?utf-8?B?WHpCblVQRFNOQ21ONXBnYUdaSkRMQjUvZUlWeWVjeXlYWDkwK2h2U0xuekdx?=
 =?utf-8?B?SU1nR3d3UkZLOXJ2cGFiYkJBUUJMWEkxT3JXVXFjUzhUcHNadDNjSzRuNWg0?=
 =?utf-8?B?eUMrdUVISzRkZ0l6NmhwQzM3VkRaVVNEcjBmcDllRXNyUzBmSDVlOEw0cy9v?=
 =?utf-8?B?L3kxWFMreXYrWGZVZkVXWUNtVVhEVW1HSWNySmtJQ0U4ZTljSmM1M3llbjFP?=
 =?utf-8?B?QUtVdURtQTlXYTV5dGQzSUc5aDNIY1Jkd0tIQSt6N0h3TEg2MHhCS2laRCsr?=
 =?utf-8?B?NzBkQUtjYVF1UVpkdGloZTZqR1pnYWhiZFo5ZVFSS3RiUWtMaUNReGp3MVcx?=
 =?utf-8?B?b3hVUlM4OFdPdWp5bk5SeC9CSEluSld4MmEySUVUSlh0aHpXRXhqQURyVFo2?=
 =?utf-8?B?V0ZZOERQRk1ER0JrV2xIVGF1OTVveHUrSHpwekZpcEtPOGVkSUJsWTBOM0Z3?=
 =?utf-8?B?cm0zQW9JRXhaeDJMUHVXTXRJa0h4UWFiNXhHQUhza21Wa1AwV055T0NEYlhq?=
 =?utf-8?B?OXlCekRsaWxJQ1U0cG15TU1SelZFTjZvZlBSYjZMb25mc1FudmNxNDZ3UDh4?=
 =?utf-8?B?S0lvblZiRXowcUhTMytwdkY5TkhJUFhzYzZEQjN6MExSU3VwZWNpVW5PV0l3?=
 =?utf-8?B?Y0VkYXdCcUtzcmV6NVlkMm16Zk5iNXJHYi9lTXNONXhkOXlERXhTa3lMS1p4?=
 =?utf-8?B?TWU5SmlUbmFRPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: f5d014b6-caca-4865-80f2-08da036ad181
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 14:24:14.4875
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 6vm9kz+FT9oQej/oXrf1mW2bvJ2844o1G5KriNg2F11WotjL9biIy44+3svPDLpZjzfNC4L3qwUtBUvPnUoJVw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR03MB4447
X-OriginatorOrg: citrix.com

On Mon, Feb 14, 2022 at 10:25:57AM +0100, Jan Beulich wrote:
> Making adjustments to arbitrarily chosen values shouldn't require
> auditing the code for possible derived numbers - such a change should
> be doable in a single place, having an effect on all code depending on
> that choice.
> 
> For one make the TDCR write actually use APIC_DIVISOR. With the
> necessary mask constant introduced, also use that in vLAPIC code. While
> introducing the constant, drop APIC_TDR_DIV_TMBASE: The bit has been
> undefined in halfway recent SDM and PM versions.
> 
> And then introduce a constant tying together the scale used when
> converting nanoseconds to bus clocks.
> 
> No functional change intended.
> 
> Signed-off-by: Jan Beulich <jbeulich@suse.com>

Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>

> ---
> I thought we have a generic "glue" macro, but I couldn't find one. Hence
> I'm (ab)using _AC().

I would be fine if you want to introduce something right in this
commit to cover those needs, using _AC is not overly nice (or
clear) IMO.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 14:34:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 14:34:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289095.490454 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSgLr-0003xT-IJ; Fri, 11 Mar 2022 14:34:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289095.490454; Fri, 11 Mar 2022 14:34:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSgLr-0003xM-DZ; Fri, 11 Mar 2022 14:34:43 +0000
Received: by outflank-mailman (input) for mailman id 289095;
 Fri, 11 Mar 2022 14:34:42 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=RXIo=TW=citrix.com=prvs=0626a3ed1=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nSgLq-0003xG-2v
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 14:34:42 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 61d2e8e3-a148-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 15:34:40 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 61d2e8e3-a148-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647009280;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=nq4wrcwMrV7c3NzsFGvzT106QaKejpF7C1oT0qx1HjE=;
  b=Deazh868aW7BBYQclEeNUTe1/zldc3f1HKLqReoCkKPvUFnO3c7WAXDM
   rxiLnqGLM0im1Wr094Npk+in0QNTr/qCO70eqSqQRrbVHDr0nWeElPWIP
   BXZAUDdAFNgbWy6wriReucRu3JWqr0cXJeOVlJzOPwGppZKttjpNH0Jk3
   4=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66415741
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:/Rz0qaj3rjRt997EIyVNqE7sX161dhAKZh0ujC45NGQN5FlHY01je
 htvUT2BO/jcM2ajet92aYTko04Ev5PXytViHQI4pCowRiwb9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFrU4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YSkLJrDGlL4UaAJBNiR5N7BXoKbMHmfq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bkmtnwjzDS+4vXLjIQrnQ5M8e1zA17ixLNaiAO
 5NENmY2BPjGSx8QHAtGKIwMp92LoiPELh8EmHmsnINitgA/yyQuieOwYbI5YOeiWsF9jkue4
 GXc8AzREhwccdCS1zeB2natnfPU2zP2XpoIE7+1/eIsh0ecrkQRAhALUVqwodGil1WzHdlYL
 iQpFjEG9PZoshbxF5+kAkP+8CXsUgMgt8R4Pc8i9QuBkKPv+B+8A28OUy8ZcdcZq5pjLdA17
 WOhk9TsDD1plbSaT3OB67uZxQ+P1TgpwXwqPnFdE1ZcizX3iMRq10+UEI4/eEKgpoCtQVnNL
 ya2QD/Sbln5peoCzO2F8F/OmFpATbCZH1dutm07so9Ihz6VhbJJhaT0uDA3Dt4ade51q2VtW
 lBdyqByC8hUUfmweNSlGrllIV1Qz6/t3MfgqVBuBYI90D+m5mSue4tdiBknehs3Y51bJm+xO
 BaN0e+02HO1FCL7BUOQS9jsY/nGMIC6TYi1PhwqRoYmjmdNmP+vo3g1OB/4M5HFm0kwi6AvU
 ap3gu73ZUv2/Z9PlWLsL89EiOdD7nlnmQv7GMCqpzz6gOH2TCPEFt843K6mM7lRAFWs+16Or
 b6y9qKiln1ibQEJSnKOoNBJcgxScyRT6FKfg5U/S9Nv6zFOQQkJI/TQ3akga8pimaFUnf3P5
 XazRglTz1+XuJENAV7ihqxLAF83YatCkA==
IronPort-HdrOrdr: A9a23:yJWeu6DFTQAgUQ3lHehAsceALOsnbusQ8zAXPh9KJiC9I/b1qy
 nxppkmPH/P6Qr4WBkb6Le90Y27MAnhHP9OkPIs1NKZMjUO11HYTr2KgbGSpgEIXheOi9K1tp
 0QDZSWaueAdGSS5PySiGLTc6dC/DDEytHRuQ639QYTcegAUdAH0+4WMHf+LqUgLzM2eabRWa
 Dsr/Zvln6FQzA6f867Dn4KU6zqoMDKrovvZVojCwQ84AeDoDu04PqieiLolSs2Yndq+/MP4G
 LFmwv26uGKtOy68AbV0yv2445NkNXs59NfDIini9QTKB/rlgG0Db4RE4GqjXQQmqWC+VwqmN
 7Dr1MJONly0WrYeiWPrR7ky2DboUITwk6n7WXdrWrooMT/Sj5/IdFGn5hlfhzQ7FdllM1g0Y
 pQtljp+6Z/PFflpmDQ9tLIXxZlmg6funw5i9MeiHRZTM83dKJRl4oC50lYea1wUR4S0LpXXt
 WGMfuspcq/KTihHjDkVyhUsZaRt00Ib1i7qhNogL3X79BU9EoJunfwivZv3Evoz6hNO6Ws19
 60Q5iAq4s+PfP+TZgNc9vpEvHHfFAkf3r3QRCvyBLcZeQ6B04=
X-IronPort-AV: E=Sophos;i="5.90,174,1643691600"; 
   d="scan'208";a="66415741"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=eJ9Rw2oVhIQS1ZuDBjbcnlsYNwvHPeXAouxW4PPaXQUrcv3a0HN5t67QifkcFS/ZqL7f/9nkteFd2DDj3YccsIhQbmPmjfHrVy6lrYCycZcorMqItTqLVlqNzcGdFNaI7t/3zuFR5C6vhD02LDnucd/VIHS2B53bfvdhTK2jDG0pKrDBatPimGpZDpLC47Qyr6sWui1SElW9/guC3IlbqpsOprjmajiIDR3/fyUqsdycrGRf0p3FdkHM8EnJT3DrAkymxixZ80+zbvjEeK8OJKAwAiLE4Hwt7JPT9ymrvAg9gNKAyXtLZEnToZaPJnbAHF2/If9iQbPzH02LlWY4HQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=BIp9enZ6Td5IPjrl0a4wgylfAVxySYGj9CkFtleIuvw=;
 b=TQfL8TFGGOuQltlG9+l2LO0lF1PUNVnlDf8aP3+Vksj9qhjaVcPhE9ivNRgVZ6Ltu0eHNNq+5OT6idpyH3phQEw5yBAWsYeYWcjreSkf57SvTI0EHpPf6P/Sn9YvZlHHPPlBvzCETXJDzJzC1qiyTAvdn9FF9GkgD4uLD1imqBhZKt4CH6smghWNgliwyGKVZJ8gSWaDtAQiQpy3cVp67t/rtQM3X/WksvIpPcXd53eC2ztUyDOq5fpF08nypk8WYiVBYju8NO4qUG3vpnAeCDA1O2X8ak4y62yIn6uAVx6f++Kb3dByw6xDbTLhDiFblYWGWUwlOC3PfB0s3HyzKg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=BIp9enZ6Td5IPjrl0a4wgylfAVxySYGj9CkFtleIuvw=;
 b=FXbgGV+dEmwf6DKUjiVfUy09D/bziTE8+qh7aZeRUUScnbYw97IDlNpMBC+y2qkqsJVs97oTq6PDp4FVeM674NOFDMUefiO0nHwTKpVb+ODRZ0zHcA+IdsnuPQW53WwoScjwbOPEHfJFDNmtFta27/GfWL/lbojUQUT5v2+WFio=
Date: Fri, 11 Mar 2022 15:34:29 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Andrew
 Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH v2] x86: avoid SORT_BY_INIT_PRIORITY with old GNU ld
Message-ID: <Yitd9RNJf1vvOsf4@Air-de-Roger>
References: <97bebbfa-b5e8-4c57-162f-2a052de92f02@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <97bebbfa-b5e8-4c57-162f-2a052de92f02@suse.com>
X-ClientProxiedBy: LO4P265CA0061.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:2af::7) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 7326ee2a-ba87-4e22-aafa-08da036c4356
X-MS-TrafficTypeDiagnostic: SJ0PR03MB5774:EE_
X-Microsoft-Antispam-PRVS: <SJ0PR03MB5774E16BA1D01255B17772858F0C9@SJ0PR03MB5774.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(86362001)(6486002)(54906003)(38100700002)(26005)(186003)(9686003)(85182001)(6666004)(6512007)(6506007)(33716001)(508600001)(316002)(6916009)(8936002)(8676002)(4326008)(66476007)(66556008)(66946007)(2906002)(5660300002)(82960400001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?cE9rNHpmN3NFZ2FmQlYxS1JuNno5NWpEYS94Y0pQUUN5Z1VqUHRGcDFGOXMz?=
 =?utf-8?B?dlA5YlJza3k2ZkN2SW0zVytSbFhPZGk3WUtZSk40bTl1MjVwdWV6Uk9BbExz?=
 =?utf-8?B?VFZjVDA2YVZPNm1VNE1RbVh6N0lFWjIwVVVhNXJGVkppbUhnOW5ERU9zQlVt?=
 =?utf-8?B?S2NMcGtNbzZUWkZIUmEwT0dQN0pYMUo2blVqSlRGNkpFREtuQktDS1hDSzlr?=
 =?utf-8?B?YlEwL0RJc0dBSjVpYWJ6RTFMb0IzVWxEV2hSSFdtb2t4OE9wSjZUZ0xoY1Zv?=
 =?utf-8?B?SEg1cU5IVjRLZWUveEZzWGdCbk01djVzUkdETlZaanBpTTJZb2diNmRKbUtq?=
 =?utf-8?B?UGZTaFZTT0F2MkVYdnFsUEtXUEo3R3pLcDRwdUNUZDBNeG5RNURzM1loM0lk?=
 =?utf-8?B?ZXo5V3pXS2cvdEM2eUFjVHlERG45ZzhXZXFrdE82SXlVaHhJM0dpZjhqVTJE?=
 =?utf-8?B?VDRDN09hWUZuMTRoSEZjUWJ2VXVUQlRCaExuTUNLSDEySFNlVk4xcUkvS1Rm?=
 =?utf-8?B?RHFKblMvVDNFYWtJTUQ4SnV3WEZWdzFJcUJPR2VHTEJZejUrZDNEeW5Kb1hl?=
 =?utf-8?B?WnF2Ykw2K2RLQUxEY2NqTWltWnFBaytYQ2tlL3VORHJONVQ1S3lGNXFKTVZj?=
 =?utf-8?B?NFE1aStweVVuQUpqKzhsM2JKem1ZQWZ2NVRMSjMvd29EWSs0cHNoR2lKS0Z4?=
 =?utf-8?B?TTJ5WkVQMFRMNmREVDZ4VzhrL0N5NlZBN3owNlRCdWlHbGh4V2d5WVowSDMv?=
 =?utf-8?B?RmNLWjU0L3pSdXpyd2M3Y2hLQ2FnSUJlYUc1UERkY08wK1Z2ckM0dmc3TWRL?=
 =?utf-8?B?czM5WXlvRE9pSXN1V0E5RWEyNENab2NVSm5pcEYrb3ZuMnI2UXdBc1d3Yzhq?=
 =?utf-8?B?MWsydmwxUnB0VWFmb0lTaWw5TmhVT043V1pWZTJxV2llQmdQckhBSUpHdFJZ?=
 =?utf-8?B?cnZ4czhoeGFLWlhNM015VWpBVHl0VFN6WVlwTTRMVmtJemhlT2ZhSXIrRTQz?=
 =?utf-8?B?SGlSVW9YRE1qeTIreU5SOHlKWFhEWk5WS0treGVGT2xoTVE1aHBNWG05T3lw?=
 =?utf-8?B?NStURmxrMXhlb3BNZnI3dDk4MWxPVFNDdlRnNXpZc2l1RVdRd2p5amhrQmx0?=
 =?utf-8?B?Ty80NXdNRy91OGRnamlqRDlna2JyQlIyMUJjRHZwNUFOTHF1aCt4R0tiRXh5?=
 =?utf-8?B?YmZUbmxNdC9LTWlzZHRJeVBYS2ZOb3dyVDQ1MXg2eXdGZHNWL1E1Njl3blEy?=
 =?utf-8?B?c2tka0lPMTlJMnA5Uy9QajlHUW1ySFd2ang2Y0plQkhJYUhTY1V5ME1xbXNG?=
 =?utf-8?B?SzRKYktlQ25wWHBSb1lUTS9PSzlzZTR4UWhpenJWdzdXZHFKdEVPWUpHVDFS?=
 =?utf-8?B?dmhpZHBqMGxMbTVPL0FzYmJSSGFjek83MXBlcnMzUld4SDB3aUlsTWFVS3Uw?=
 =?utf-8?B?UkZ5U3ZFNXZGUDhqUHA0dHJmU3hhVDBmeTJiSjQxcTB0cWVtNFV5d1pZRnpO?=
 =?utf-8?B?VE9ERThBMTFGSkpJeUtlM2cvK0tyMHNzWjRPQUt2Wnova3psVVVLVTVSZ004?=
 =?utf-8?B?aE14UU1xOEJkSzhnNjRmb01tQTZVbXd2VVp2YnJmT3U2S3BaQm9JdytFN2J0?=
 =?utf-8?B?OXVMZlY3SWgyNVRqRkp3YUFaVlBFU1BpSTgzUWk2eGN4aTdLNjBlcTk0aFBl?=
 =?utf-8?B?SHRnSHNVdjg2UUdxazVLS0gxVjJ5OFEwaHozMFZHQ0hsZVZwZXJZMDBvZFN2?=
 =?utf-8?B?TjMyci94dm1pQlpmamhoR3lwMjBlaTAwZW4zS1F3a2JvWHpacVc1ZEgrd3Zu?=
 =?utf-8?B?c1ZXTCtFNkpWdTRTSFFNbkdWcmdVemdCR3pQWEgyWHBnRlJNamlKdkluMmlO?=
 =?utf-8?B?SDVRbldCS3h2WElVNVBqRmZtT0FUY1lMYVptS2tncU1YTjVscCtUWTdaMC90?=
 =?utf-8?B?NlFDYTJCRnQrc0RJVDFqQWtQaTNnTTloYkY4RDVrNTNXY3prb2VxUm9keGZY?=
 =?utf-8?B?d05tcjM1dUVnPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 7326ee2a-ba87-4e22-aafa-08da036c4356
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 14:34:34.9638
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Ato1MXIhRimbA2Ezdmxv666JiQjqVtybpoRp4WcEsatat/facuguOQQozJ8xaB7p9rH5kv2J+RU4RoK19ILYtg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR03MB5774
X-OriginatorOrg: citrix.com

On Fri, Mar 11, 2022 at 02:28:40PM +0100, Jan Beulich wrote:
> Support for this construct was added in 2.22 only. Avoid the need to
> introduce logic to probe for linker script capabilities by (ab)using the
> probe for a command line option having appeared at about the same time.
> 
> Fixes: 4b7fd8153ddf ("x86: fold sections in final binaries")
> Signed-off-by: Jan Beulich <jbeulich@suse.com>
> ---
> v2: Always define HAVE_LD_SORT_BY_INIT_PRIORITY when using LLVM ld.
> 
> --- a/xen/arch/x86/arch.mk
> +++ b/xen/arch/x86/arch.mk
> @@ -73,6 +73,16 @@ ifeq ($(CONFIG_UBSAN),y)
>  $(call cc-option-add,CFLAGS_UBSAN,CC,-fno-sanitize=alignment)
>  endif
>  
> +ifeq ($(call success,$(LD) --version | head -n 1 | grep -q "GNU ld"),y)

You are not going to like this, but I think this should live in
xen/Kconfig together with CC_IS_{GCC,CLANG}, ie: LD_IS_GNU or similar.

It's possible we will need this in the future in other places, so
having it in Kconfig makes sense.

> +# While not much better than going by raw GNU ld version, utilize that the
> +# feature we're after has appeared in the same release as the
> +# --print-output-format command line option.
> +AFLAGS-$(call ld-option,--print-output-format) += -DHAVE_LD_SORT_BY_INIT_PRIORITY

That's fine to have here IMO.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 14:39:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 14:39:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289100.490464 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSgQE-0004gc-8R; Fri, 11 Mar 2022 14:39:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289100.490464; Fri, 11 Mar 2022 14:39:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSgQE-0004gV-56; Fri, 11 Mar 2022 14:39:14 +0000
Received: by outflank-mailman (input) for mailman id 289100;
 Fri, 11 Mar 2022 14:39:12 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSgQC-0004gL-8d; Fri, 11 Mar 2022 14:39:12 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSgQC-0002Kp-4e; Fri, 11 Mar 2022 14:39:12 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSgQB-0003qh-MT; Fri, 11 Mar 2022 14:39:11 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSgQB-0004jm-M0; Fri, 11 Mar 2022 14:39:11 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=O6Ej0M5/Zqw8UOpi99RQgnKFmVrADI8VMwAFRlPBE1M=; b=pbQjpWSXeciZouqAC9lfiKdYhT
	BVdRc1NRZlu93CkfJcU9UysnPgQgdePH4oy+FBq77HbM9Fn7BI1OIODe2MD0GjiXnxLD1/DLJ7OsA
	bllWIPNchWHAli9V99vcWTmUkuTT4AnakI0hvYTezCtaOfCYZSgpTBa3+C34/Y/DiF80=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168507-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168507: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-freebsd11-amd64:guest-start/freebsd.repeat:fail:heisenbug
    linux-linus:test-amd64-amd64-xl-rtds:guest-localmigrate/x10:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=1db333d9a51f3459fba1bcaa564d95befe79f0b3
X-Osstest-Versions-That:
    linux=330f4c53d3c2d8b11d86ec03a964b86dc81452f5
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 11 Mar 2022 14:39:11 +0000

flight 168507 linux-linus real [real]
flight 168517 linux-linus real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168507/
http://logs.test-lab.xenproject.org/osstest/logs/168517/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-freebsd11-amd64 21 guest-start/freebsd.repeat fail pass in 168517-retest

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-rtds     20 guest-localmigrate/x10       fail  like 168498
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168498
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168498
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168498
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168498
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168498
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168498
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168498
 test-armhf-armhf-xl-rtds     18 guest-start/debian.repeat    fail  like 168498
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168498
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                1db333d9a51f3459fba1bcaa564d95befe79f0b3
baseline version:
 linux                330f4c53d3c2d8b11d86ec03a964b86dc81452f5

Last test of basis   168498  2022-03-09 20:47:09 Z    1 days
Testing same since   168507  2022-03-10 15:51:11 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Akhil R <akhilrajeev@nvidia.com>
  Andy Shevchenko <andriy.shevchenko@linux.intel.com>
  Bartosz Golaszewski <brgl@bgdev.pl>
  Biju Das <biju.das.jz@bp.renesas.com>
  Catalin Marinas <catalin.marinas@arm.com>
  Dmitry Torokhov <dmitry.torokhov@gmail.com>
  Horatiu Vultur <horatiu.vultur@microchip.com>
  James Morse <james.morse@arm.com>
  Jia-Ju Bai <baijiaju1990@gmail.com>
  Jiri Kosina <jkosina@suse.cz>
  Juergen Gross <jgross@suse.com>
  Kai-Heng Feng <kai.heng.feng@canonical.com>
  Kris Bahnsen <kris@embeddedTS.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Lucas Zampieri <lzampier@redhat.com>
  Marcelo Roberto Jimenez <marcelo.jimenez@gmail.com>
  Mark Brown <broonie@kernel.org>
  Mark Featherston <mark@embeddedTS.com>
  Michael Hübner <michaelh.95@t-online.de>
  Nathan Chancellor <nathan@kernel.org>
  Nestor Lopez Casado <nlopezcasad@logitech.com>
  Paul Semel <paul.semel@datadoghq.com>
  Paul Semel <semelpaul@gmail.com>
  Pavel Skripkin <paskripkin@gmail.com>
  Russell King (Oracle) <rmk+kernel@armlinux.org.uk>
  Stephen Boyd <sboyd@kernel.org>
  Stephen Boyd <swboyd@chromium.org>
  Taniya Das <tdas@codeaurora.org>
  Vladimir Murzin <vladimir.murzin@arm.com>
  Will Deacon <will@kernel.org>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             fail    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     fail    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   330f4c53d3c2..1db333d9a51f  1db333d9a51f3459fba1bcaa564d95befe79f0b3 -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 14:56:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 14:56:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289109.490476 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSggd-00072b-OL; Fri, 11 Mar 2022 14:56:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289109.490476; Fri, 11 Mar 2022 14:56:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSggd-00072U-K9; Fri, 11 Mar 2022 14:56:11 +0000
Received: by outflank-mailman (input) for mailman id 289109;
 Fri, 11 Mar 2022 14:56:10 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=3DNt=TW=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nSggc-00071s-F4
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 14:56:10 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 5eae14f7-a14b-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 15:56:02 +0100 (CET)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04lp2059.outbound.protection.outlook.com [104.47.12.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-26-YgYIV9R6Pe2qYMSx1kDlwA-1; Fri, 11 Mar 2022 15:56:01 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR04MB4126.eurprd04.prod.outlook.com (2603:10a6:803:47::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 11 Mar
 2022 14:55:59 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.022; Fri, 11 Mar 2022
 14:55:59 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5eae14f7-a14b-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647010562;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=ykyRe5f2Qq0vrqDC/csptHNV7cXQPzFWgenxhlPLXI0=;
	b=K0TWVUEKCbMV88+pLtL5AElmfeeizeyx30ToZP4i8uFz+RmrBS85440PjvEhcHWJQB9Q4N
	Oxu4ShVeKjK+JGxbrxb1Kf8diQ8PPevdqVL/BaJGILP/8puMgBzrbejY5AiHl/9n3mLa4a
	TBjZovFMtn59zj8Az06hMvpZX3IJ1gM=
X-MC-Unique: YgYIV9R6Pe2qYMSx1kDlwA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=CB1Bci/tReIG3N1gOnxtvXQmLKqEKAVpriDOAzAF0IAquQpayAR9SI2SOPbApB/bVUbsVbR127bsTc5YW8MsvgciyrCC/1jJOc5BJQcFXUGhNhvVEPrtKnu/6Dj6uuQgW3QKy4IPDHhOP41J7ch0UsCc114HQCpve2OS6GvUGegFzWpYRF5duaH5uSIcR2xnYpS7PSH+OzGq99UFpTC8M6STcoYgKBwqmN3+6XwPHw/PGMjP5Vpzjn8bkQGQx1dz95V4h1HUd8GA6ohBP3VGCI9NhCqB0p+ixnNYPA8Kw9jRCuo+eTAAw3QwVQjmYw1S34Yb+dwa3ZYrG/g12Cb/Ng==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=FM3xGw8zm03xEVgPT9CjAZ8cHLezv+jMMRWO3OocsiA=;
 b=H/mf3XVgLk5V2IK8xVWtE6l1szfxGM7mvL9rleR1jMZFMmKnNrPQC7F9KK0TmcnXrGWfv5M8ZI0h2cFxhaJ44AhfknEq4oFD8gDqAgF+Gs3Xn+p0K4Dd6gTCwWpnf01WsZfcIy7nDTJgHOxSJ7wRS5TCuXnH1eGCQTqIArsHebTkYwkebn5gGkOv8VBUwMb8++Ilca3M0k13CbkzeWNsHLwLBnw97lQCszsw7xMePQEHHuRxebwgtvhkA3F2B+b802A9rf8T9IJkZ1vNYdb6u60XEd53WPi0HstuVeKWZnmX1bcdJ1WHRR5S3WHlD7H44lLiTyoIkxS8I83R5QjgSA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <517b0f83-ba5e-3aaf-9c06-9b7078b816ec@suse.com>
Date: Fri, 11 Mar 2022 15:55:57 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v2] x86: avoid SORT_BY_INIT_PRIORITY with old GNU ld
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
References: <97bebbfa-b5e8-4c57-162f-2a052de92f02@suse.com>
 <Yitd9RNJf1vvOsf4@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <Yitd9RNJf1vvOsf4@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6PR0502CA0042.eurprd05.prod.outlook.com
 (2603:10a6:20b:56::19) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: fbbdf2a1-9a16-4d41-5d58-08da036f40fa
X-MS-TrafficTypeDiagnostic: VI1PR04MB4126:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB4126655F6F3B7AAAB6222E22B30C9@VI1PR04MB4126.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	DTNEZxPcPJVVQc5xE/Spz+weyC++8d2bgaL6f71vtwDQ1/ietKU4tJgx7ujJ2HFqt7QTe4JWZPhknUo/2FVF9bEPZDSPej7yOkIBPSXjpT/x3TEYYPNPH8iafnM7jlK12it48YiFZI391JLS8UAan1XLOwckkHwMK4v/FBJPeWhrb6H/aCHbahcav/m1sOGpsrygdYraarCJHBLHz1Fg4gIKyjHOFRtxWwNk6yFxW1aU+ReHPJ21jCft842VYmicOLqRleeZjTx72f5N7xzjFhTH8qV7QajMyGYFyqzDKlHgaOHUYDP7SYqe3/jeKuxWF/ACrLhD4b7oWLLKso+DjR3uwPUKbDnPFocUaTSbBnkXNx+7QcYDO2OFTLp+fpBAiTBgaESTED/KlXJgGFriplYcIkg4aJIAFFBLIuTvuOQF7XqJsVzAbfE39+LpUZ9tu83mSV9QdVxLvdNaMQiDb20gIS1nLbFetESkvvTyhI4JgQ9ABRQjJ1kR1p+LbCSfdSdNH4ErTSUUTCGMdOMCeSnxxyIPzaWAKDUI+elCAbgDz0oVp+K3jnhFbHxI8e17YGTShXwYAqsS5wtb/lxHvyXfA8R3GiXGgM6NqIjRO9v3BWp+ujhMMzCeHg6t8xG1x4ON5zNo4pq03njFnpd6DGLlfJmjebmRxo/LDjzW2fBdbSWRo0WPJh3mk4hk872iOwYnuZrX4Ikl47Mt1YqsyjXn2KRL6MpAhKHZenCP3WM=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(508600001)(66946007)(6486002)(66556008)(66476007)(86362001)(4326008)(8676002)(54906003)(6916009)(316002)(31696002)(26005)(186003)(6512007)(6506007)(38100700002)(53546011)(2616005)(31686004)(2906002)(36756003)(8936002)(5660300002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?9VVLwbo1+89QcYgSdtUrviop2XljPi9fcr3uFoYBEv7Cot8aQesGPexE3kn3?=
 =?us-ascii?Q?HT8Yzf66gnsukErU7ko4UHwdRolW2RKJ1DmOHToDVExQOfu0DgLybQpvorhP?=
 =?us-ascii?Q?jleNQRWWdR/iTzVTeYEmSxkyOmwHvoD6C/UYQgWp+RVt6dYjlFF36vRikjXu?=
 =?us-ascii?Q?rsPhUos26eR3bFzPTTY19xZRixzUv5DtQU6aFe512D8jw9HOPgn26LBpaOut?=
 =?us-ascii?Q?hHQdG3lKCVpKmvckdSxXXfF+oj6QlmqtIxM1SuJfgj2bq9KqgtuEZ2Ywz5JQ?=
 =?us-ascii?Q?AjXIjTwznLEfvcsTnepQ/r7ow8FOiYa6jWvxwyUjJaNr27YFAIe6M5+PJFjf?=
 =?us-ascii?Q?Qp5FbmcLeMYp2hrrAq9JyW7vGkgAoNW2cndfDNegq+O3Laro34cKL/WL7wwQ?=
 =?us-ascii?Q?D2tkgbktMB7BLidqxKkKQkrHX9EBsafRFv17qx/WYRlqzqNzJB5i2eIHiTit?=
 =?us-ascii?Q?3XcGm6RrlHAEOedqJq0iF8iedz3OzhaxJ1oakx7FzDCMiifQDbx20L6wT6DH?=
 =?us-ascii?Q?mE5HdbvAeqbWtAckzH1Jipfg8/9owqdRkD4bof49sVGZpmJcNkg4iJfglX9Z?=
 =?us-ascii?Q?1DwzVt8+fZ4OwNPLoVtIzu8WHSEBXxlccbsNnOg+hQWhBqpM5DUZjEZlEhko?=
 =?us-ascii?Q?4ReTII/Q+0K8MLYI3FBIio3FXVRivko55lal2TmfPWHlDEXHKem/dtajgNnn?=
 =?us-ascii?Q?WWMxYt05XHzaZibmnEc5B+f4c5ci+sLE0gPCktwstLq23Gv1q6FYy9ATnE9k?=
 =?us-ascii?Q?h/lL+7qT55aYeSvUbAXgAxKLEc5tAH+PttQvwe/wE3PP0t4iUJ0X0cyo4LQT?=
 =?us-ascii?Q?hMn+jw1JbuM8TKVMo4dXNVsibqqqWTxLqChmIzayAYkkTMIag4R0kCZ/hX5v?=
 =?us-ascii?Q?11sLZsn7Zn1IycqZZZkYG5qdF4xQ334iSks4xQp6x4RoavI6KTzeWIYN9v4j?=
 =?us-ascii?Q?a8VX8IhU5kGRqwOCkxx5g/bAiTf4uq9nXg8j22xfFFBQbc6BLuHEUhnHUukD?=
 =?us-ascii?Q?DpO2Dnh2CuNjMWK2HJyRcF92RGe6vNqj3GmC8eunQwvwgRM2/FXkBFjwwrc3?=
 =?us-ascii?Q?iL8QbJ3zx3vkqmQELaRDqU3Efyqqrxk7mkJAK/MEPjPXczL9se0LWPeOM9U8?=
 =?us-ascii?Q?rIoiNd2bsl4eS8hwrWS1zlPY8oUcc1tlq8UXSqXUVvQU6+ATOe0REhVZRQXk?=
 =?us-ascii?Q?Ll6w/l+vTw/3+o/gdICQbE0FoGPR51/xM2wFZRoYrDNuPWR1qQ4EkbvdMreW?=
 =?us-ascii?Q?kF50kKfFU4ediTfalveMCayqQPKbGAHlb2Z5rwkkNYxX8i0QW1zWGxqlQzKZ?=
 =?us-ascii?Q?OwLcSbRQUTk6Z/dkfgwIulsvyIz53byJrOGzDxpAGqDwnEGVvaQlwMVY/gFJ?=
 =?us-ascii?Q?vWFWwoT5l1LGkKtS5BOAUAUGtkuVa8oUC7iH71PzDruAZGlj92dA1+6vAewF?=
 =?us-ascii?Q?y2Bo1WyKRrC1AXFReJYM7F4axrb4g95A?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: fbbdf2a1-9a16-4d41-5d58-08da036f40fa
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 14:55:59.6655
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: /xpE6gQ/SwrUzAF92mXyAwBRTdXHdPh+6fQY3e0npttX/c/e1KVyQ6qzWmBF3MVavoUx7dgbebemFtZVOmpypg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB4126

On 11.03.2022 15:34, Roger Pau Monn=C3=A9 wrote:
> On Fri, Mar 11, 2022 at 02:28:40PM +0100, Jan Beulich wrote:
>> Support for this construct was added in 2.22 only. Avoid the need to
>> introduce logic to probe for linker script capabilities by (ab)using the
>> probe for a command line option having appeared at about the same time.
>>
>> Fixes: 4b7fd8153ddf ("x86: fold sections in final binaries")
>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>> ---
>> v2: Always define HAVE_LD_SORT_BY_INIT_PRIORITY when using LLVM ld.
>>
>> --- a/xen/arch/x86/arch.mk
>> +++ b/xen/arch/x86/arch.mk
>> @@ -73,6 +73,16 @@ ifeq ($(CONFIG_UBSAN),y)
>>  $(call cc-option-add,CFLAGS_UBSAN,CC,-fno-sanitize=3Dalignment)
>>  endif
>> =20
>> +ifeq ($(call success,$(LD) --version | head -n 1 | grep -q "GNU ld"),y)
>=20
> You are not going to like this, but I think this should live in
> xen/Kconfig together with CC_IS_{GCC,CLANG}, ie: LD_IS_GNU or similar.
>=20
> It's possible we will need this in the future in other places, so
> having it in Kconfig makes sense.

Despite me not liking this (until, as said elsewhere, we've properly
settled on either approach) I did actually consider doing like you
suggest. But: I would have to introduce there more than I need here,
just for consistency's sake, and I wouldn't have a way to test the
LLD part of it (I did check - none of the distros where I chose to
install Clang offer the linker). I realize I could ask you to help
with the testing, but then the first point would remain. I'd prefer
if for this simple build fix it was okay to go the old fashioned
route ...

Jan



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 14:56:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 14:56:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289110.490487 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSggp-0007MB-2g; Fri, 11 Mar 2022 14:56:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289110.490487; Fri, 11 Mar 2022 14:56:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSggo-0007M4-Vr; Fri, 11 Mar 2022 14:56:22 +0000
Received: by outflank-mailman (input) for mailman id 289110;
 Fri, 11 Mar 2022 14:56:22 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=RXIo=TW=citrix.com=prvs=0626a3ed1=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nSggo-0007La-Cf
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 14:56:22 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 67bb94d0-a14b-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 15:56:19 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 67bb94d0-a14b-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647010579;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=wM8jj/+LYSoUgwT1plT1dQ8fBe6VUbqiPHKL8ELPfJM=;
  b=AG5+D1eHxJ7fkED6uA1IHkIn0IYHPLrPz62NoTK7DqNk9Hed1Iv9gv5P
   61fAofUg4z50zQfboBCDN0XSN74/SuGvyPbsEuQUzc0XTWpC0v/9Fa43J
   h8qwhxNKqM0IK4yNbxuCEi1eXUiM6CheXnvsfGTaKCc5ImO5Vx3CGTyES
   c=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65491796
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:bzXjsqNL6hVkq6DvrR28l8FynXyQoLVcMsEvi/4bfWQNrUpzgTwAm
 msaCG6FbKncY2f0L4ogYYu+8UJTv5PVzt9jGgto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi29cw27BVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Z4
 tdDnIO2WyAVA7ycoqcdCgh1AR56MvgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALNs7kMZlZonh95TrYEewnUdbIRKCiCdpwgmps15kRTKi2i
 8wxOANXPTjfaUx2F3wwKL0GxP+WwXb1SmgNwL6SjfVuuDWCpOBr65DyNPLFd9rMQt9a9m6Iq
 2SD82nnDxUyMN2E1SHD4n+qnvXIny7wRMQVDrLQ3vxgjUCXx2cTIAYLTlb9qv684nNSQPoGd
 RZSoHB36/Fvqgr7FbERQiFUvlauvBA1RNxCNNEH+VG3iaqN8iuLOWwLG2sphMMdiOc6Qjkj1
 1msltzvBCByvLD9dU9x5ot4vhvpZ3FLcDZqiTssCFJcvoK9+N1bYgfnE447eJNZmOEZDt0ZL
 9qiiCElz4segscQv0lQ1QCW2mn8znQlo+Nc2+k2Yo5Hxl8oDGJGT9bxgbQ+0RqmBN/IJrVml
 CJY8/VyFMhUUfmweNaxaOsMBqq1wP2OLSfRh1Vid7F4qWjzqiX8ItAIuGggTKuMDiriUWa4C
 KM0kVkMjKK/wVPwNfMnC25PI5hCIVfc+STNCamPM4smjmlZfw6b5iB+DXN8LEi2+HXAZZoXY
 M/BGe71VC5yIf0+kFKeGrdMuZd2l3tW7T6CGvjGI+GPjOP2TGSLUo0MLFbmRrl/tMtoVi2Oq
 I0BXyZLoj0CONDDjt7/qtdCcwpVcSBlWfgbaaV/L4a+H+avI0l4Y9f5yrI9YY112aNTk+bD5
 HamXUFEjlH4gBX6xc+iMxiPtJuHsU5DkE8G
IronPort-HdrOrdr: A9a23:PhKdZq9HkutpgvoGJB9uk+E8db1zdoMgy1knxilNoENuHPBwxv
 rAoB1E73PJYVYqOE3Jmbi7Sc+9qFfnhONICO4qTMuftWjdyRGVxeRZjLcKrAeQfhEWmtQtsZ
 uINpIOd+EYbmIK/foSgjPIa+rIqePvmMvD6Ja8vhVQpENRGtpdBm9Ce3em+yZNNXB77PQCZf
 2hDp0tnUvfRZ1bVLXxOlA1G8z44/HbnpPvZhALQzYh9Qm1lDutrJr3CQKR0BsyWy5Ghe5Kyx
 mJryXJooGY992rwB7V0GHeq7xQhdva09NGQOiBkNIcJDnAghuhIK5hR7qBljYop/zH0idhrP
 D85zMbe+hj4XLYeW+45TPrxgnbyT4rr0TvzFeJ6EGT1/DRdXYfMY5slIhZehzW5w4Lp9dnyp
 9G2Gqfqt5+EQ7AtD6V3amHazha0m6P5VYym+8aiHJSFaEEbqVKkIAZ9ERJVL8dASPB7pw9Gu
 UGNrCS2B9vSyLbU5nlhBgt/DT1NU5DXCtuA3Jy9vB96gIm3UyQlCAjtYkidnRpzuNLd3AL3Z
 WBDk1SrsA9ciYnV9MPOA4/e7rDNoXse2OEDIvAGyWuKEk4U0i936Ifpo9Fo92XRA==
X-IronPort-AV: E=Sophos;i="5.90,174,1643691600"; 
   d="scan'208";a="65491796"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=bTD2alvl7sUbLXWfhoCPQw4GSZrLqLEc02negl9yyegmL7cickBOTnlJ8fNBSH9toasOzCAYTBXsNwYg+NmRaFThpWKXsPgoyjPh6ruS/QnO6jwNJrnLJgBGJiXl+jd8sm8PiEMC84r7kkUvyhs2OLdjdgBYPlf+Uu/qnJ+FOB0GMdHLSGrGFwbrRFis4/didOOn9+TVLOEE5qJ6ekq26kpbb5GvSiLqmYh69dXgfRji0OMwtVygK56+0VDURsa/9S20A4yz7jaYNdwR7BcupZf4L/qcJ5qAowop5vUJdoJAvddZlYERUY6sATgOCuTr0cCT9pAL1cxUkBsAYofCSA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Ka8qzxPq7vFRcORU838LOci75elHMb5JrhnGsEEjjCw=;
 b=O5RQ2xCWa89tZtqfWEFNtZYJZfq7BriquxLD5N5JnBgKtup4/Zwyl+9B9RmgeUWfhDOOnMGK0K5JUsdBaEXL4nKapVZg3PPrDQ6O9hwNWOzywlZVIm9pQ52BrtS3Axs7VmLfmRtMyV/tw/oC7c6G71epiF/qpIaMAVKRxh82bCzajE7iE6uuekT8ArePdroq1Lomttp6hd9wyD1RYaC2tfEdxDO7R0nPebnTF2IVOtJVY2pMluMBD/kSmvBTt0oGeX8K5eE+2edH/ekqWx1dwNG8XeEiMBU8PHzmU0rMaRvNlHihsU3xoPvmJprY601V6tT1ks2YnXKRanQlTJ4A/Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Ka8qzxPq7vFRcORU838LOci75elHMb5JrhnGsEEjjCw=;
 b=I4Ur7aYjc28hplR2jRqLoxOc8hU6QZNeZpIAgruIN3aKWuJRY//i/3d6jq3mzCDvg6S1lK1wLG4+/wySJiWvwulkhCieD9bwhmG/HKJpAHYn6arSg9WrAv5kKWuNI6fT/r/4VxH22+2ELfUDt7dson8zfKenYbcVcztIGM/fBQw=
Date: Fri, 11 Mar 2022 15:56:07 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH v3] x86/build: use --orphan-handling linker option if
 available
Message-ID: <YitjB+8Mtw71Ge8k@Air-de-Roger>
References: <44a6db86-e49c-b820-b397-09769c198959@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <44a6db86-e49c-b820-b397-09769c198959@suse.com>
X-ClientProxiedBy: LO4P123CA0077.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:190::10) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 524de6d5-8145-4f3e-0bd2-08da036f4911
X-MS-TrafficTypeDiagnostic: BYAPR03MB4760:EE_
X-Microsoft-Antispam-PRVS: <BYAPR03MB4760F23E7BBA77F48AF87CB28F0C9@BYAPR03MB4760.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(6506007)(186003)(26005)(8936002)(5660300002)(6486002)(2906002)(83380400001)(9686003)(33716001)(6512007)(54906003)(38100700002)(82960400001)(6916009)(66946007)(66476007)(4326008)(66556008)(8676002)(85182001)(508600001)(86362001)(316002)(6666004)(67856001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?aUJ6U21RWDBQMlFMMGRCTHlRU3lrN2F0ZVhwL3VkYzFOSEk0Vjh2cU5TcnM4?=
 =?utf-8?B?L251SGU4U2QwcDVIWW94VDl4Wi9oVXdKUlRTbmwvQlhESUJTZnB4WTF5aFM0?=
 =?utf-8?B?OGRUd3VxaENyanZuQ0R5dUdibFQwS0FkR0wzSlVHMFhRa3VJQUZ4aXFyeFAy?=
 =?utf-8?B?UGt1R1BnYmdvSW9ZNjhxS0ZyQmpjRm5rNWdVNlhhTmI5TU9VcnFlQ0wweEpN?=
 =?utf-8?B?bGcrT0hiZHFpVXBlRFhQQ282RG8xWmhPTWZ5cTVPWmxmbXhhNDZPWXRMSWFR?=
 =?utf-8?B?N1VMQjNSVWM1SGUwcGFObWhXOHZwVmhsdTYzeDdaUDZ0QjhSVVpjUHVNOGNk?=
 =?utf-8?B?eHJabEtKa3AxeUhyQkZNZm5mMEI3dzFqeEt1K1kxZWgwMk1TS2QzVXJ6WSs5?=
 =?utf-8?B?RVY3QnVQcXU0MzZ6ZmhrT3kwN0g2RmpMV3luZENTRmFCaGJYM2NWVHQ1VldV?=
 =?utf-8?B?NllZdlo4Y2FkSjk2WGNwK05BdHk2WXRzQTNQUG01MDFaSmszem5JaWY3blpj?=
 =?utf-8?B?WUwrN3JNNEYrS3I0U053Z1lVQTRTMWhCMkFrbTZicXRVVmlMS2tlb3BicWhR?=
 =?utf-8?B?K1hrdkJSK3hTRHdFV0V4WWJvSk9oalY3TDFnaFpOczQreWVMMFlMTUx3RE5n?=
 =?utf-8?B?bTVRcVFxTjRhL0tFZDB0STF1RS9nRG1GWTFScWFXMGN2NTAyOEpaU0dtWXNr?=
 =?utf-8?B?SUl3Vlp5ckQ3OU43UUpSN0toUkI0cWFWREduazM4VkdzbUlRVVA2V2VSWFNP?=
 =?utf-8?B?a2JOTVowd1h2K3ErL1I0RUh2akk4WmVFcXI1VDVNWjUyNzVwTXBtMmxFUktX?=
 =?utf-8?B?R1VmdkxOcnY3U2Q5NURhRXVBZ1RMdEhQYUp0WGh6b2YyZXQydmFiZUFaWThY?=
 =?utf-8?B?bHNBK0lSVGNEQzBFZVlzcXppSGg2ZjlLZkZTTXplRm9HazloLzZoYno1aVk0?=
 =?utf-8?B?cHN1L0RabDVwRWYwd3gyOFh1TkJTSVlYcDhITjFBbkZhUE4rODNzZ3ArbHND?=
 =?utf-8?B?RE1KeHN4TU95YXhnY3Y2Sjc0LzRUeXpWWW5DQytpWDNRcW9RODNqdGF5OE1u?=
 =?utf-8?B?Wk1CY1E1RTJOcFNMVUdmTDliUlBjSWpuWE1UOVNiWis3TnFUNmhoREZ4M1Mr?=
 =?utf-8?B?QS9KUHZkSjVWbXN6V0hyR2lnSHU3Ri9LSUl1RFJvTGt2bEhpeUlTd1ZubnBq?=
 =?utf-8?B?Z1ZCKzJVSlZ4MXhEdjNDUGxqZmNyQ2hIZ1YvUm16TzJJTVkwczF0ZS9mWFk0?=
 =?utf-8?B?WGhmUVAvS0ZHZGNRcWFsWjBXN1ZzRHZSbWVCeE5LaXR5aTZPMkRvckFpa0dw?=
 =?utf-8?B?NklsWWhZaENSQzA2NHpFeGdadVhoTTJPTFpla2FjbnJxbXduWmRmTUoxb3dt?=
 =?utf-8?B?eTRPd2IzTEdXb210YUgwNHA2THg0UHg5VmFJVDUyQ1RpRXB0ZTdmRWU0L1B5?=
 =?utf-8?B?V2kzQjI1VGw0enJRM2FNOEdFdzdhZHpJN1M1bmg1TjZrZVFXVkJqcVdTYUFR?=
 =?utf-8?B?NzBPckptWDlsWDUrVTM4bFF1bVFsUkFuQldDVDRIWEJCN01Lc3huY1YrdXE0?=
 =?utf-8?B?eFkrc09waTF4cnE4U290clo4cVg3d3hzeXU3Z1kwWUE0MExNTlhmMTJacHht?=
 =?utf-8?B?UjQwNW9ackNzVHVaYlgwcTBvMlYvYm91TTVCcm9tLzJGSjdNajJ5UmZKRFNs?=
 =?utf-8?B?emhsbWNCdVZBZEQ5Q3M0WGpkcnd4bXRQUHN6SndEV3hJRm9WMlNvY09WNHFD?=
 =?utf-8?B?RGhpWGo3Q05wRnMzWmdVRmpIb2xseUtQcWhaNTdmZGhLSzI2UTRVaENSb0gx?=
 =?utf-8?B?TCtFTkFHcEdGNkpIeVBIdUJEcU9UN01iQ3prcWQ1WFVFVnV6Y1NwWGdTRllv?=
 =?utf-8?B?K0FyY0VkQ1pVSjlmYWJFUTgwU0tuMjNyRW1UTUNsd1FncTYwWGdBaUZUWG9z?=
 =?utf-8?B?MmtKU1lkU2dXbk5UTW85V3pEa3JyVkI4MTg3TmprTHY1clFSRGlCRFdyYm5T?=
 =?utf-8?B?bHQrWTVPMWxnPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 524de6d5-8145-4f3e-0bd2-08da036f4911
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 14:56:13.0640
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 2w4l5PMn3OP9EGiRKbHI2vEQdjo57YNEHhbtOAz82IDVQQy3zBMK+nw4B+57ida4U6G9R8svlgeEeGVqKppXcQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB4760
X-OriginatorOrg: citrix.com

On Fri, Mar 11, 2022 at 01:37:54PM +0100, Jan Beulich wrote:
> As was e.g. making necessary 4b7fd8153ddf ("x86: fold sections in final
> binaries"), arbitrary sections appearing without our linker script
> placing them explicitly can be a problem. Have the linker make us aware
> of such sections, so we would know that the script needs adjusting.
> 
> To deal with the resulting warnings:
> - Retain .note.* explicitly for ELF, and discard all of them (except the
>   earlier consumed .note.gnu.build-id) for PE/COFF.
> - Have explicit statements for .got, .plt, and alike and add assertions
>   that they're empty. No output sections will be created for these as
>   long as they remain empty (or else the assertions would cause early
>   failure anyway).
> - Collect all .rela.* into a single section, with again an assertion
>   added for the resulting section to be empty.
> - Extend the enumerating of .debug_* to ELF. Note that for Clang adding
>   of .debug_macinfo is necessary. Amend this by its Dwarf5 counterpart,
>   .debug_macro, then as well (albeit more may need adding for full
>   coverage).

You might also want to add that LLVM ld requires explicit handling of
.symtab, .strtab and .shstrtab.

> 
> Suggested-by: Roger Pau Monné <roger.pau@citrix.com>
> Signed-off-by: Jan Beulich <jbeulich@suse.com>

Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 15:04:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 15:04:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289119.490498 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSgob-0000hL-Uc; Fri, 11 Mar 2022 15:04:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289119.490498; Fri, 11 Mar 2022 15:04:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSgob-0000hE-Qs; Fri, 11 Mar 2022 15:04:25 +0000
Received: by outflank-mailman (input) for mailman id 289119;
 Fri, 11 Mar 2022 15:04:24 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=RXIo=TW=citrix.com=prvs=0626a3ed1=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nSgoa-0000h7-My
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 15:04:24 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 8824a789-a14c-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 16:04:23 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8824a789-a14c-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647011063;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=x9tpm+39mVbVQI2FWpCKH+QDqhktoDrl6MiphDSK+Rc=;
  b=gef2NVatEPcdFocjGEMS0nwhY/u+bt/bOfEM7LDlJJh7JTR5R6QSAutO
   aNwIQe/dYIqdvm5yhdhcPs7sxCDna6z5yT3UlSRWDwKzKhCTS4jdIZk/K
   sOT6wjzrv9LX0jn7+FWU3MKSbQ9oKspVZZ4QFER/xQW6/kvrh/MxBZSmx
   c=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65493375
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:e+AfNKxBakqmsFDhQs16t+fvxirEfRIJ4+MujC+fZmUNrF6WrkVTn
 2UfD2rSaKuJM2r3fth/atu2ph9VvcCHn9BqTlBkpCAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2IHhWWthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 NpliL6NYyQRYIT2uscBU1oDExAkFoJl0eqSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DJoQQt2sm1TjEJf0nXYrCU+PB4towMDIY2J0STK2FO
 JdxhTxHQi/Jc0UWE1ArT5c8292Ri2jbLiQFgQfAzUYwyzeKl1EguFT3C/LOYcCDT8hRmkeep
 0rF8n7/DxVcM8aQoRKa9lq8i+mJmjn0MKoCGbv9+vN0jVm7wm0IFAZQRVa9ueO+iEO1R5RYM
 UN80igzqak/8mS7Q9+7WAe3yFaBtwQZUsBdEMU77h+M0ave5wuFBmkCQSVFYdZgv8gzLRQo3
 FKUm9LiBRR0raaYD3ma89+pQSiaYHZPazVYPGldEFVDs4KLTJwPYgznc/ReOo2N0PTPOxLsw
 3PRrBlkrJowpJtev0mkxmzvjzWpr5nPawc64ATLQ26ohj9EiJ6Zi5+AsgaCs6sZRGqNZhzY5
 SVfxZDChAwbJczVzESwrPMx8KZFDhpvGBnVmhZREpYo7FxBEFbzLNkLsFmSyKqEW/vomAMFg
 meP6Gu9B7cJZRNGiJObharoWqzGKoC6SbzYugj8NIYmX3SIXFbvENtSTUCRxXvxt0MnjLsyP
 5yWGe71UypEWP84k2ruH75DuVPO+szY7TqCLXwc5076uYdymVbPEetVWLdwRrxRAFy4TPX9r
 I8EapriJ+R3W+zieCjHmbP/3nhRRUXX8ave8pQNHsbae1IOMDh4V5f5nONwE6Q4zv89vrqZo
 RmAtrpwlQOXaYvvcl7RNBiOqdrHAP5CkJ7MFXd1bAjyhCR7P9rHAWV2X8JfQITLPddLlJZcZ
 /IEZ9+BErJITDHG8C4adp7zsMppcxHDuO5EF3P4CNTjV/aMnzD0x+I=
IronPort-HdrOrdr: A9a23:flejZ6j508n3vwU1Ku2YnyXt8HBQXuQji2hC6mlwRA09TyX+rb
 HIoB17726RtN9/YgBDpTntAsm9qBDnlKKdg7NhW4tKNTOO0AHEQL2KhbGSugEIcBeOk9K1u5
 0QEJSWIeeAdWST0q3BizVQaexP/DAsytHSuQ6k9RhQcT0=
X-IronPort-AV: E=Sophos;i="5.90,174,1643691600"; 
   d="scan'208";a="65493375"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=oYS3WGciAvhCHTqoQpYuCps3XKEs/VcWQWEzUPstTl57hMt3Xgw4q4A0bR7CLN0PWIr4LiD2k3S6b9R811L5jIyufZmULyF7KPZ6stVfmhgMbKuPP0lLVg9SDHcXH4kgijF+AyFq738KHL4lwwEl5nJOppQ+PDuG2dKCqS9lLlpOrgXNPBbHN/F78Z+X10p+m8FNAvCoDAd6/RUjRWAtzCgr4in8NY06F1TF/lyNtDnynLCkwh9kgIW4M/piufX5ZEZQEO10PEn+HRbxbU3Pm9RoiXlqjFNh2bmGpvs7spNvRCszJQsG8ntwYzh0wtAmL2UVvhxmg6QbCQLLhyd5xA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=lgI5z3POU1knKetqPNIAXGK84/wxhJZ8VBSD/E8/dX4=;
 b=ad757i/0+WHSN/iEvXCTsftYQXQcF+MlVit6E2bCdxHIngD9anqRJqETEtN6Z5Pc/e1JBvgntz7XDrTtjpMDirmAmP47zY8H5JKKWXVz/z9c/K/nrUroQPPcAHpwly3VINc0X/OdF+1fx1gaQ9YkDWTArwuQbGXnh8zTe55JMOoqk6KauXJ6ZIGtty/XVG5cMGUO4wW9LH3z7XxM8fKbA1iqRMKsaO9MX3uqf0SSh+/vptl9qG37M5F12kYNzyQsGZsj5+eE6t6yGZXpjm0KconoRSRSGmd6wkwLyD9Q1SVrPID9mkoO334CWnXrrV6ccSUo52Cr/rImhqIJMfVl1A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=lgI5z3POU1knKetqPNIAXGK84/wxhJZ8VBSD/E8/dX4=;
 b=F+nD1fzTnjGxUyCipgf72KE8eljvFzua3479Dl0eRpcflcwkLm29fvhk/tEtKYWwwH6mFVVp+d1w28sybfN2GO5Geosk0nq9MhYk+5dZjgEpBed3SsOt3XG7PiRaxOPER9jN7oMA9EF4FBCv8/KhG8ougdvZyvnQJ9m6JOneR0I=
Date: Fri, 11 Mar 2022 16:04:11 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Julien Grall <julien@xen.org>
CC: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?=
	<marmarek@invisiblethingslab.com>, Jan Beulich <jbeulich@suse.com>, Andrew
 Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
	Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH 1/2] ns16550: reject IRQ above nr_irqs
Message-ID: <Yitk68wpP8HV4od9@Air-de-Roger>
References: <20220310143403.50944-1-marmarek@invisiblethingslab.com>
 <7acb2915-5a9d-c1f1-4b7b-2bc6c2055ea3@suse.com>
 <YioddbNor6w/U9ed@Air-de-Roger>
 <53361d65-2bd8-c07b-938c-91b95f2d68ad@suse.com>
 <Yiojgxgd4amSjHog@Air-de-Roger>
 <3055b4a5-2d55-9cf1-1069-8c57208bf0af@xen.org> <YiopXU65pAlnNVNI@mail-itl>
 <d2c63630-6ab3-b4dd-128e-72f871fb9e08@xen.org> <Yisp0Q/cNGbgsO/7@mail-itl>
 <2a5c59ad-2fa5-b668-8bce-0d55e89a4afd@xen.org>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <2a5c59ad-2fa5-b668-8bce-0d55e89a4afd@xen.org>
X-ClientProxiedBy: LO2P265CA0490.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:13a::15) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f7c83a8c-3aff-4ba9-0109-08da0370694b
X-MS-TrafficTypeDiagnostic: MWHPR03MB2893:EE_
X-Microsoft-Antispam-PRVS: <MWHPR03MB2893D79EC1873AD1A50815878F0C9@MWHPR03MB2893.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: ITQGfpJF0DoH92MzL5kMGJor0rGXF9m9N4IrBYhse+Uil8qLI6/tszeMl/lL6Pl2hD80B+1aLwto0V2Z8iOpZzm4HOx2eOfJwhW1J4G5VLAnZPk39TbR937s8x3AICvh3sRoO0LdLAy6f82sNAIAC7/CgLqtO3t+IqPRwjUzy1dMPQ4y2zPIh7DZzYUb7kt0EYn5QWZ3CbCiGwpn1qWJWnrJyez1RpAhngaHwrCH83ScyYQzOiDsWV4u0ogp8MZe4WpsMOn8ZK47S0Ec8wWDw7i8JlljpHns8q4xzZIMwyf3gkw9dItnMS554lGQAZG8dMTeSPrP22CIBHM4Y+MxW2In///BdHYVSkNLL3zfXBUIA7dzOHm5jxQ2w9ZMKvJ0v/9qkkaOHQVMSfcyb4Oqz6rYAAqDEEfFBBr0s6m4OcgHZ5JaPfpl6KxUWjS2DPuaR03MUfbXdBuMJH5ZJZZ5DpNtBhNa9pMMG0rG/JWqJ00FntDldQXj0jjHXK3pjtfDwkUuUA4/1ICI8/tTSdtxcqeYgfxTweMorbmm4qgvTRE434QAzRWt091oihoGKppM5/Fq4xhWaQ4C/Ue9saOeUv8WZSlE+NL6y1kcSz3fHiwti66dJ9uDnVadQym+rM8fBZPejVMJvkjZIRBd6JEt/g==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(83380400001)(5660300002)(33716001)(8936002)(2906002)(82960400001)(316002)(54906003)(6916009)(6666004)(6512007)(9686003)(4326008)(38100700002)(85182001)(8676002)(66556008)(66476007)(86362001)(66946007)(186003)(53546011)(508600001)(26005)(6506007)(6486002)(66574015);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?ZExZbjZTZi94OFJROHJ4RkQ1ZDBNMEJvRUpIbm1oOUVLWmhYYUQyMVhUL3E2?=
 =?utf-8?B?cStGL2d3akc3M3lLdVdzTFpCNWYvY3Z1Ny9nWmgySzBqcENFRUJpWUZxVjBU?=
 =?utf-8?B?OXdJcXdiK3BXWDBqZzlwRWZuV1ZwK00xZTJaM0FacHVTYURCUmRaR2UwOTg1?=
 =?utf-8?B?ZlVreDR4NTRmMVhsNGdNSkhvVjBFbWtIVERHRWJ0amwybmFYaXdoKy9uVEZU?=
 =?utf-8?B?TmlKYVB1L2w4RzI2N3RZdFJKaHVUT2pyVTJ5QXNNWlhYNERuWloxRVM2L2gy?=
 =?utf-8?B?QmN0bVJ3SVFmSkwzYXI1WFVEcHdCd1BxNFBzZmc1WVJpdS9sbFFZWkdLcWlU?=
 =?utf-8?B?NWw4cERjekVUc28vVk1NN05YamZ0QmltZEVGYWNST1BuQS9FY3BiVWhnS0Ny?=
 =?utf-8?B?RzFsNWx6ODVscm1UUEFxUXVuZEZCckZVc3JiTlNqdENqY0hQbkFwQmFrdS9n?=
 =?utf-8?B?RmhVVklZWm5Fd1hpd1pWaTV3OXZxQW1Lc29HVVFlam5SbkNGdFZLSW1uSkI5?=
 =?utf-8?B?SUliYXF5UWpZc1VFUTRnUzgxbU5NeXNZZEtwbEpGSVRUYmJIaVRmU0hDQVdV?=
 =?utf-8?B?ZStQcG1rVW1ua21xaFhFcEZadUl6MUJiM0l0dkY3TXB6OGVOcUFYck9uMEV1?=
 =?utf-8?B?V1lzMUlVeitxakdZRVFCaXNmMy9oV2NBT3RucXUwTndaQ0FOMERTcUtBTTRZ?=
 =?utf-8?B?ZkFKeERvN2ZtUVZuazM5OXpjTEM4MXRWWE5MYkczdTdWMnlrOVAvTXMveHFL?=
 =?utf-8?B?ZTBndHZXdGRkclI2NzFQcS9NV0ljazcvRlpDY3EvYitZL1YvbjdKK0V3NnBn?=
 =?utf-8?B?K2k0Z2RjZlFTbTFIRlB0bmlNZUZNcGtkN0Y0Vy9LeVlvOGhmYVFjYmFUYmRh?=
 =?utf-8?B?NWhPK2lFN0dYRko2RUw1ekpFM2NNbzYzMVFmd1FHV3U5RGgySm5wbklac3NH?=
 =?utf-8?B?NWpmZjhDV2MwYlcrdkR0aFNMMXhkSWZaWllVc2VKdUtBejRaQ0lCQTlnVk5G?=
 =?utf-8?B?eG1OalVLM282S1NoeGpIMXhON3Fjcmh1ai9qcEkwQ01ON0xiNytrZ2lLWHVj?=
 =?utf-8?B?ZWU4VzJtVmtXMU1nNThIaTR0OGpIRDJTK2k0VVNsYlJBZ240NkhiQTd2NFlv?=
 =?utf-8?B?a2U5V21MM3lScG5HdTlQNk9OY0FIQW5CN0xHK3BrSElCcXJHalZiZ09uTFc5?=
 =?utf-8?B?eEtTQlRmSS9zdHpyak1qQWp3MzRsY3ZRVUlyVmtHVEdBUE5WN0grWkF5bFQ1?=
 =?utf-8?B?WmNyVUVidzdsbHNhWVRNVHd1QVN3UEtZRTRIeUdIVWZvd2hDY2ZwNlhNc1A5?=
 =?utf-8?B?cTIzMEQ3UnROMFNVZUdhWFF6SzVYeko5ckMwZzRDR2JpZy9Pcld2OGJxekhp?=
 =?utf-8?B?ZlN3TkxxQ1hBWUVFY0FJRHN4YmhxRGxZb0o4ektEMEQ1cUorU3ZtdmhvSHlv?=
 =?utf-8?B?OGExUkg1SkpyZFVUUllhRU56NFFZdVBuZU9SQ25HWmlTU0pTNFJnaVdHZzBV?=
 =?utf-8?B?bWQxbGd2Q1FMbDdGRFdHWU13VnpPYzhKU0Y3ejhodFZpQm5SVlBUa1d1V0Vq?=
 =?utf-8?B?NHFYb2dwYVFDcUgxQnNjdXRpN3E4UWFCNW9UN0ZUb2p5Tmx2dmROeUMxclNI?=
 =?utf-8?B?T1NTUDFYQ1RVa01lTXBQaWVlcXhYZU9HQUtoY2dXdktoeWJ2RnpwZnJmL0x2?=
 =?utf-8?B?TDk3UFk5dDVzQXBCQmQyY00xNHVWUTI5M0hGWk9RL2JLdFR2WjRtRzBpZkNB?=
 =?utf-8?B?dWFkRXNvYnNVSWJ3L0JJZXRFL08wcmpzQVFKS1cveGU1VmozVXhrb0VCZkVu?=
 =?utf-8?B?bVdkd0lUek1tdUdWVWcwcXJVUWkvc001TXluSXBNaFZvTFdUMm8yOG1nRWgx?=
 =?utf-8?B?a2JueXFWeHNIdnVCMWJJZ0xGR0RMckc2NVFrOUMrUWlpc05jOGhEZTZUYURP?=
 =?utf-8?B?UnRldTdLSzZmM213YVRlVUxDVmdycThOeWtZZHRUVk14TjVtUkgvSG5MKzR1?=
 =?utf-8?B?dW53MjBTcDVBPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: f7c83a8c-3aff-4ba9-0109-08da0370694b
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 15:04:16.7370
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: RxJk5TpYKqaDXwsT09VuQ5RcedFSK3dIu7HOK2W14ybK8aLoeNqemREvIg2bxDnxJTCWQ5+C4OOCiz8R+GgB8g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR03MB2893
X-OriginatorOrg: citrix.com

On Fri, Mar 11, 2022 at 11:15:13AM +0000, Julien Grall wrote:
> Hi,
> 
> On 11/03/2022 10:52, Marek Marczykowski-Górecki wrote:
> > On Fri, Mar 11, 2022 at 10:23:03AM +0000, Julien Grall wrote:
> > > Hi Marek,
> > > 
> > > On 10/03/2022 16:37, Marek Marczykowski-Górecki wrote:
> > > > On Thu, Mar 10, 2022 at 04:21:50PM +0000, Julien Grall wrote:
> > > > > Hi,
> > > > > 
> > > > > On 10/03/2022 16:12, Roger Pau Monné wrote:
> > > > > > On Thu, Mar 10, 2022 at 05:08:07PM +0100, Jan Beulich wrote:
> > > > > > > On 10.03.2022 16:47, Roger Pau Monné wrote:
> > > > > > > > On Thu, Mar 10, 2022 at 04:23:00PM +0100, Jan Beulich wrote:
> > > > > > > > > On 10.03.2022 15:34, Marek Marczykowski-Górecki wrote:
> > > > > > > > > > --- a/xen/drivers/char/ns16550.c
> > > > > > > > > > +++ b/xen/drivers/char/ns16550.c
> > > > > > > > > > @@ -1221,6 +1221,9 @@ pci_uart_config(struct ns16550 *uart, bool_t skip_amt, unsigned int idx)
> > > > > > > > > >                                 pci_conf_read8(PCI_SBDF(0, b, d, f),
> > > > > > > > > >                                                PCI_INTERRUPT_LINE) : 0;
> > > > > > > > > > +                if (uart->irq >= nr_irqs)
> > > > > > > > > > +                    uart->irq = 0;
> > > > > > > > > 
> > > > > > > > > Don't you mean nr_irqs_gsi here? Also (nit) please add the missing blanks
> > > > > > > > > immediately inside the parentheses.
> > > > > > > > 
> > > > > > > > If we use nr_irqs_gsi we will need to make the check x86 only AFAICT.
> > > > > > > 
> > > > > > > Down the road (when Arm wants to select HAS_PCI) - yes. Not necessarily
> > > > > > > right away. After all Arm wants to have an equivalent check here then,
> > > > > > > not merely checking against nr_irqs instead. So putting a conditional
> > > > > > > here right away would hide the need for putting in place an Arm-specific
> > > > > > > alternative.
> > > > > > 
> > > > > > Oh, I always forget Arm doesn't have CONFIG_HAS_PCI enabled just yet.
> > > > > The PCI code in ns16550.c is gated by CONFIG_HAS_PCI and CONFIG_X86. I am
> > > > > not sure we will ever see a support for PCI UART card in Xen on Arm.
> > > > > 
> > > > > However, if it evers happens then neither nr_irqs or nr_irqs_gsi would help
> > > > > here because from the interrupt controller PoV 0xff may be a valid (GICv2
> > > > > supports up to 1024 interrupts).
> > > > > 
> > > > > Is there any reason we can't explicitely check 0xff?
> > > > 
> > > > That's what my v0.1 did, but Roger suggested nr_irqs. And I agree,
> > > > because the value is later used (on x86) to access irq_desc array (via
> > > > irq_to_desc), which has nr_irqs size.
> > > 
> > > I think it would be better if that check is closer to who access the
> > > irq_desc. This would be helpful for other users (I am sure this is not the
> > > only potential place where the IRQ may be wrong). So how about moving it in
> > > setup_irq()?
> > 
> > I don't like it, it's rather fragile approach (at least in the current
> > code base, without some refactor). There are a bunch of places using
> > uart->irq (even if just checking if its -1 or 0) before setup_irq()
> > call. This includes smp_intr_init(), which is what was the first thing
> > crashing with 0xff set there.
> 
> Even if the code is gated with !CONFIG_X86, it sounds wrong to me to have
> such check in an UART driver. It only prevents us to do an out-of-bound
> access. There are no guarantee the interrupt will be usable (on Arm 256 is a
> valid interrupt).

It's a sanity check of a value we get from the hardware, I don't think
it's that strange. It's mostly similar to doing sanity checks of input
values we get from users.

Could you add an error message to note that an incorrect irq to use
was reported by hardware?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 15:05:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 15:05:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289123.490509 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSgpY-0001Gb-7w; Fri, 11 Mar 2022 15:05:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289123.490509; Fri, 11 Mar 2022 15:05:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSgpY-0001GS-4g; Fri, 11 Mar 2022 15:05:24 +0000
Received: by outflank-mailman (input) for mailman id 289123;
 Fri, 11 Mar 2022 15:05:22 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3p0I=TW=citrix.com=prvs=06245b39f=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nSgpW-0000h7-Em
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 15:05:22 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id aa233e1a-a14c-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 16:05:20 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: aa233e1a-a14c-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647011120;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=xFR1X1AGdU5c6vvB51yvPTeo6emGP+lVw3aj9ed8sXE=;
  b=MESGNOgZ1m8yAHXBdxJ/xMK6NmsPYHf7jtwjngm/pv1YDF+1LoD3w2PC
   BdyyipHQCjJzNnCPLxm8quoNJxV0v+gzawN2vRk/PcN3kNFFFjGnHHrPe
   ZF3hGLTmOL3zTnzy5PAvLQCBxIJQ9VG2TcUH0PjV7ejDKTIBse1jUd01G
   c=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 65948723
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:KW0Fvq9dcG7ELx2GgJhtDrUDG36TJUtcMsCJ2f8bNWPcYEJGY0x3y
 mFMW2DSa/vbN2X9etl3a4q/9EsOvsPQztFlSQNt/Ho8E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oHgW1nlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnbeaZSpxHqDwo98mYUJTCgAmBbJsoZaSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFKEWvHwm6DjdBPIvR53rSKTW/95Imjw3g6iiGN6AO
 ptFOWU1N3wsZTVgYnlMFYomvNyhoVPnTC0ftW+NtZgetj27IAtZj+G2bYu9lsaxbftSmkGUt
 2fX5VPTCxsRNMGc4Ted+3fqjejK9QvgQ54bHrC88v9sgXWQy3YVBRlQUkG0ydGzh1SiQdtZJ
 woR8zA3sKkp3EWxS5/2WBjQiH2JoB8aHcZRGusS6QeRx66S6AGcbkAGUzgHbtUlvc03QDUC1
 1mVktevDjtq2JWXRmia7ay8ti6pNG4eKmpqTT8JS04J7sfupKk3jwnTVZBzHaitlNr3FDrsh
 TeQo0AWhb8ekMoK3KWT5k3cjnSnoZ2hZgwo4gTaWEq14wU/Y5SqD6S37XDL4PAGK5yWJmRtp
 1BdxZLYtrpXS8jQymrdG43hAY1F+d6uGhHx2X5iI6IazAb28GeCJbhPymhXcRIB3tk/RRflZ
 0rauAV07ZBVPWe3YaIfX79dG/jG3oC7S427C6m8gs5mJ8EoKVTZpH0GiVu4gji1+HXAh53TL
 ntynSyEKX8BQZpqwzOtLwv2+e96n3turY8/qH2S8vhG7VZ8TCLEIVvmGAHXBgzc0E9iiFyEm
 zq4H5HWoyizqMWkPkHqHXc7dDjm10QTC5HssNBwfeWeOAdgE2xJI6aPne1wINM6z/wNz7mgE
 pSBtqlwkQuXaZrvc1jiV5yeQOm3AcYXQYwTYUTAwmpEK1B8ON3yvc/zhrM8fKU99fwL8BKHZ
 6JtRil0OdwWEm6v021ENfHV9dU+HDz21VPmF3f0O1AXIs8/LzElD/e5J2MDAgFVVXHp3Sb/y
 pX9vj7mrW0rHF0zUpyJNKrxkztcfxE1wYpPYqcBGfELEG2EzWSgA3Cr5hPrC6ng8Sn++wY=
IronPort-HdrOrdr: A9a23:zemAbqoMF3wb+N5L7AX2/VEaV5oTeYIsimQD101hICG8cqSj+f
 xG+85rrCMc6QxhPk3I9urhBEDtex/hHNtOkOws1NSZLW7bUQmTXeJfBOLZqlWKcUDDH6xmpM
 NdmsBFeaXN5DNB7PoSjjPWLz9Z+qjkzJyV
X-IronPort-AV: E=Sophos;i="5.90,174,1643691600"; 
   d="scan'208";a="65948723"
From: Jane Malalane <jane.malalane@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Jane Malalane <jane.malalane@citrix.com>, Wei Liu <wl@xen.org>, "Anthony
 PERARD" <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien Grall
	<julien@xen.org>, "Stefano Stabellini" <sstabellini@kernel.org>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian
	<kevin.tian@intel.com>, =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?=
	<roger.pau@citrix.com>
Subject: [PATCH v7 1/2] xen+tools: Report Interrupt Controller Virtualization capabilities on x86
Date: Fri, 11 Mar 2022 15:04:00 +0000
Message-ID: <20220311150400.21272-1-jane.malalane@citrix.com>
X-Mailer: git-send-email 2.11.0
In-Reply-To: <20220308173118.31490-1-jane.malalane@citrix.com>
References: <20220308173118.31490-1-jane.malalane@citrix.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

Add XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC and
XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC to report accelerated xapic
and x2apic, on x86 hardware.
No such features are currently implemented on AMD hardware.

HW assisted xAPIC virtualization will be reported if HW, at the
minimum, supports virtualize_apic_accesses as this feature alone means
that an access to the APIC page will cause an APIC-access VM exit. An
APIC-access VM exit provides a VMM with information about the access
causing the VM exit, unlike a regular EPT fault, thus simplifying some
internal handling.

HW assisted x2APIC virtualization will be reported if HW supports
virtualize_x2apic_mode and, at least, either apic_reg_virt or
virtual_intr_delivery. This also means that
sysctl follows the conditionals in vmx_vlapic_msr_changed().

For that purpose, also add an arch-specific "capabilities" parameter
to struct xen_sysctl_physinfo.

Note that this interface is intended to be compatible with AMD so that
AVIC support can be introduced in a future patch. Unlike Intel that
has multiple controls for APIC Virtualization, AMD has one global
'AVIC Enable' control bit, so fine-graining of APIC virtualization
control cannot be done on a common interface.

Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Jane Malalane <jane.malalane@citrix.com>
---
CC: Wei Liu <wl@xen.org>
CC: Anthony PERARD <anthony.perard@citrix.com>
CC: Juergen Gross <jgross@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>
CC: George Dunlap <george.dunlap@citrix.com>
CC: Jan Beulich <jbeulich@suse.com>
CC: Julien Grall <julien@xen.org>
CC: Stefano Stabellini <sstabellini@kernel.org>
CC: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
CC: Bertrand Marquis <bertrand.marquis@arm.com>
CC: Jun Nakajima <jun.nakajima@intel.com>
CC: Kevin Tian <kevin.tian@intel.com>
CC: "Roger Pau Monné" <roger.pau@citrix.com>

v7:
 * Make sure assisted_x{2}apic_available evaluates to false, to ensure
   Xen builds, when !CONFIG_HVM
 * Fix coding style issues

v6:
 * Limit abi check to x86
 * Fix coding style issue

v5:
 * Have assisted_xapic_available solely depend on
   cpu_has_vmx_virtualize_apic_accesses and assisted_x2apic_available
   depend on cpu_has_vmx_virtualize_x2apic_mode and
   cpu_has_vmx_apic_reg_virt OR cpu_has_vmx_virtual_intr_delivery

v4:
 * Fallback to the original v2/v1 conditions for setting
   assisted_xapic_available and assisted_x2apic_available so that in
   the future APIC virtualization can be exposed on AMD hardware
   since fine-graining of "AVIC" is not supported, i.e., AMD solely
   uses "AVIC Enable". This also means that sysctl mimics what's
   exposed in CPUID

v3:
 * Define XEN_SYSCTL_PHYSCAP_ARCH_MAX for ABI checking and actually
   set "arch_capbilities", via a call to c_bitmap_to_ocaml_list()
 * Have assisted_x2apic_available only depend on
   cpu_has_vmx_virtualize_x2apic_mode

v2:
 * Use one macro LIBXL_HAVE_PHYSINFO_ASSISTED_APIC instead of two
 * Pass xcpyshinfo as a pointer in libxl__arch_get_physinfo
 * Set assisted_x{2}apic_available to be conditional upon "bsp" and
   annotate it with __ro_after_init
 * Change XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_X{2}APIC to
   _X86_ASSISTED_X{2}APIC
 * Keep XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X{2}APIC contained within
   sysctl.h
 * Fix padding introduced in struct xen_sysctl_physinfo and bump
   XEN_SYSCTL_INTERFACE_VERSION
---
 tools/golang/xenlight/helpers.gen.go |  4 ++++
 tools/golang/xenlight/types.gen.go   |  2 ++
 tools/include/libxl.h                |  7 +++++++
 tools/libs/light/libxl.c             |  3 +++
 tools/libs/light/libxl_arch.h        |  4 ++++
 tools/libs/light/libxl_arm.c         |  5 +++++
 tools/libs/light/libxl_types.idl     |  2 ++
 tools/libs/light/libxl_x86.c         | 11 +++++++++++
 tools/ocaml/libs/xc/xenctrl.ml       |  5 +++++
 tools/ocaml/libs/xc/xenctrl.mli      |  5 +++++
 tools/ocaml/libs/xc/xenctrl_stubs.c  | 15 +++++++++++++--
 tools/xl/xl_info.c                   |  6 ++++--
 xen/arch/x86/hvm/hvm.c               |  3 +++
 xen/arch/x86/hvm/vmx/vmcs.c          |  9 +++++++++
 xen/arch/x86/include/asm/hvm/hvm.h   |  5 +++++
 xen/arch/x86/sysctl.c                |  4 ++++
 xen/include/public/sysctl.h          | 11 ++++++++++-
 17 files changed, 96 insertions(+), 5 deletions(-)

diff --git a/tools/golang/xenlight/helpers.gen.go b/tools/golang/xenlight/helpers.gen.go
index b746ff1081..dd4e6c9f14 100644
--- a/tools/golang/xenlight/helpers.gen.go
+++ b/tools/golang/xenlight/helpers.gen.go
@@ -3373,6 +3373,8 @@ x.CapVmtrace = bool(xc.cap_vmtrace)
 x.CapVpmu = bool(xc.cap_vpmu)
 x.CapGnttabV1 = bool(xc.cap_gnttab_v1)
 x.CapGnttabV2 = bool(xc.cap_gnttab_v2)
+x.CapAssistedXapic = bool(xc.cap_assisted_xapic)
+x.CapAssistedX2Apic = bool(xc.cap_assisted_x2apic)
 
  return nil}
 
@@ -3407,6 +3409,8 @@ xc.cap_vmtrace = C.bool(x.CapVmtrace)
 xc.cap_vpmu = C.bool(x.CapVpmu)
 xc.cap_gnttab_v1 = C.bool(x.CapGnttabV1)
 xc.cap_gnttab_v2 = C.bool(x.CapGnttabV2)
+xc.cap_assisted_xapic = C.bool(x.CapAssistedXapic)
+xc.cap_assisted_x2apic = C.bool(x.CapAssistedX2Apic)
 
  return nil
  }
diff --git a/tools/golang/xenlight/types.gen.go b/tools/golang/xenlight/types.gen.go
index b1e84d5258..87be46c745 100644
--- a/tools/golang/xenlight/types.gen.go
+++ b/tools/golang/xenlight/types.gen.go
@@ -1014,6 +1014,8 @@ CapVmtrace bool
 CapVpmu bool
 CapGnttabV1 bool
 CapGnttabV2 bool
+CapAssistedXapic bool
+CapAssistedX2Apic bool
 }
 
 type Connectorinfo struct {
diff --git a/tools/include/libxl.h b/tools/include/libxl.h
index 51a9b6cfac..94e6355822 100644
--- a/tools/include/libxl.h
+++ b/tools/include/libxl.h
@@ -528,6 +528,13 @@
 #define LIBXL_HAVE_MAX_GRANT_VERSION 1
 
 /*
+ * LIBXL_HAVE_PHYSINFO_ASSISTED_APIC indicates that libxl_physinfo has
+ * cap_assisted_xapic and cap_assisted_x2apic fields, which indicates
+ * the availability of x{2}APIC hardware assisted virtualization.
+ */
+#define LIBXL_HAVE_PHYSINFO_ASSISTED_APIC 1
+
+/*
  * libxl ABI compatibility
  *
  * The only guarantee which libxl makes regarding ABI compatibility
diff --git a/tools/libs/light/libxl.c b/tools/libs/light/libxl.c
index a0bf7d186f..6d699951e2 100644
--- a/tools/libs/light/libxl.c
+++ b/tools/libs/light/libxl.c
@@ -15,6 +15,7 @@
 #include "libxl_osdeps.h"
 
 #include "libxl_internal.h"
+#include "libxl_arch.h"
 
 int libxl_ctx_alloc(libxl_ctx **pctx, int version,
                     unsigned flags, xentoollog_logger * lg)
@@ -410,6 +411,8 @@ int libxl_get_physinfo(libxl_ctx *ctx, libxl_physinfo *physinfo)
     physinfo->cap_gnttab_v2 =
         !!(xcphysinfo.capabilities & XEN_SYSCTL_PHYSCAP_gnttab_v2);
 
+    libxl__arch_get_physinfo(physinfo, &xcphysinfo);
+
     GC_FREE;
     return 0;
 }
diff --git a/tools/libs/light/libxl_arch.h b/tools/libs/light/libxl_arch.h
index 1522ecb97f..207ceac6a1 100644
--- a/tools/libs/light/libxl_arch.h
+++ b/tools/libs/light/libxl_arch.h
@@ -86,6 +86,10 @@ int libxl__arch_extra_memory(libxl__gc *gc,
                              uint64_t *out);
 
 _hidden
+void libxl__arch_get_physinfo(libxl_physinfo *physinfo,
+                              const xc_physinfo_t *xcphysinfo);
+
+_hidden
 void libxl__arch_update_domain_config(libxl__gc *gc,
                                       libxl_domain_config *dst,
                                       const libxl_domain_config *src);
diff --git a/tools/libs/light/libxl_arm.c b/tools/libs/light/libxl_arm.c
index eef1de0939..39fdca1b49 100644
--- a/tools/libs/light/libxl_arm.c
+++ b/tools/libs/light/libxl_arm.c
@@ -1431,6 +1431,11 @@ int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
     return rc;
 }
 
+void libxl__arch_get_physinfo(libxl_physinfo *physinfo,
+                              const xc_physinfo_t *xcphysinfo)
+{
+}
+
 void libxl__arch_update_domain_config(libxl__gc *gc,
                                       libxl_domain_config *dst,
                                       const libxl_domain_config *src)
diff --git a/tools/libs/light/libxl_types.idl b/tools/libs/light/libxl_types.idl
index 2a42da2f7d..42ac6c357b 100644
--- a/tools/libs/light/libxl_types.idl
+++ b/tools/libs/light/libxl_types.idl
@@ -1068,6 +1068,8 @@ libxl_physinfo = Struct("physinfo", [
     ("cap_vpmu", bool),
     ("cap_gnttab_v1", bool),
     ("cap_gnttab_v2", bool),
+    ("cap_assisted_xapic", bool),
+    ("cap_assisted_x2apic", bool),
     ], dir=DIR_OUT)
 
 libxl_connectorinfo = Struct("connectorinfo", [
diff --git a/tools/libs/light/libxl_x86.c b/tools/libs/light/libxl_x86.c
index 1feadebb18..e0a06ecfe3 100644
--- a/tools/libs/light/libxl_x86.c
+++ b/tools/libs/light/libxl_x86.c
@@ -866,6 +866,17 @@ int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
     return rc;
 }
 
+void libxl__arch_get_physinfo(libxl_physinfo *physinfo,
+                              const xc_physinfo_t *xcphysinfo)
+{
+    physinfo->cap_assisted_xapic =
+        !!(xcphysinfo->arch_capabilities &
+           XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC);
+    physinfo->cap_assisted_x2apic =
+        !!(xcphysinfo->arch_capabilities &
+           XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC);
+}
+
 void libxl__arch_update_domain_config(libxl__gc *gc,
                                       libxl_domain_config *dst,
                                       const libxl_domain_config *src)
diff --git a/tools/ocaml/libs/xc/xenctrl.ml b/tools/ocaml/libs/xc/xenctrl.ml
index 7503031d8f..712456e098 100644
--- a/tools/ocaml/libs/xc/xenctrl.ml
+++ b/tools/ocaml/libs/xc/xenctrl.ml
@@ -127,6 +127,10 @@ type physinfo_cap_flag =
 	| CAP_Gnttab_v1
 	| CAP_Gnttab_v2
 
+type physinfo_arch_cap_flag =
+	| CAP_X86_ASSISTED_XAPIC
+	| CAP_X86_ASSISTED_X2APIC
+
 type physinfo =
 {
 	threads_per_core : int;
@@ -140,6 +144,7 @@ type physinfo =
 	(* XXX hw_cap *)
 	capabilities     : physinfo_cap_flag list;
 	max_nr_cpus      : int;
+	arch_capabilities : physinfo_arch_cap_flag list;
 }
 
 type version =
diff --git a/tools/ocaml/libs/xc/xenctrl.mli b/tools/ocaml/libs/xc/xenctrl.mli
index d1d9c9247a..b034434f68 100644
--- a/tools/ocaml/libs/xc/xenctrl.mli
+++ b/tools/ocaml/libs/xc/xenctrl.mli
@@ -112,6 +112,10 @@ type physinfo_cap_flag =
   | CAP_Gnttab_v1
   | CAP_Gnttab_v2
 
+type physinfo_arch_cap_flag =
+  | CAP_X86_ASSISTED_XAPIC
+  | CAP_X86_ASSISTED_X2APIC
+
 type physinfo = {
   threads_per_core : int;
   cores_per_socket : int;
@@ -123,6 +127,7 @@ type physinfo = {
   scrub_pages      : nativeint;
   capabilities     : physinfo_cap_flag list;
   max_nr_cpus      : int; (** compile-time max possible number of nr_cpus *)
+  arch_capabilities : physinfo_arch_cap_flag list;
 }
 type version = { major : int; minor : int; extra : string; }
 type compile_info = {
diff --git a/tools/ocaml/libs/xc/xenctrl_stubs.c b/tools/ocaml/libs/xc/xenctrl_stubs.c
index 5b4fe72c8d..7e9c32ad1b 100644
--- a/tools/ocaml/libs/xc/xenctrl_stubs.c
+++ b/tools/ocaml/libs/xc/xenctrl_stubs.c
@@ -712,7 +712,7 @@ CAMLprim value stub_xc_send_debug_keys(value xch, value keys)
 CAMLprim value stub_xc_physinfo(value xch)
 {
 	CAMLparam1(xch);
-	CAMLlocal2(physinfo, cap_list);
+	CAMLlocal3(physinfo, cap_list, arch_cap_list);
 	xc_physinfo_t c_physinfo;
 	int r;
 
@@ -731,7 +731,7 @@ CAMLprim value stub_xc_physinfo(value xch)
 		/* ! XEN_SYSCTL_PHYSCAP_ XEN_SYSCTL_PHYSCAP_MAX max */
 		(c_physinfo.capabilities);
 
-	physinfo = caml_alloc_tuple(10);
+	physinfo = caml_alloc_tuple(11);
 	Store_field(physinfo, 0, Val_int(c_physinfo.threads_per_core));
 	Store_field(physinfo, 1, Val_int(c_physinfo.cores_per_socket));
 	Store_field(physinfo, 2, Val_int(c_physinfo.nr_cpus));
@@ -743,6 +743,17 @@ CAMLprim value stub_xc_physinfo(value xch)
 	Store_field(physinfo, 8, cap_list);
 	Store_field(physinfo, 9, Val_int(c_physinfo.max_cpu_id + 1));
 
+#if defined(__i386__) || defined(__x86_64__)
+	/*
+	 * arch_capabilities: physinfo_arch_cap_flag list;
+	 */
+	arch_cap_list = c_bitmap_to_ocaml_list
+		/* ! physinfo_arch_cap_flag CAP_ none */
+		/* ! XEN_SYSCTL_PHYSCAP_ XEN_SYSCTL_PHYSCAP_X86_MAX max */
+		(c_physinfo.arch_capabilities);
+	Store_field(physinfo, 10, arch_cap_list);
+#endif
+
 	CAMLreturn(physinfo);
 }
 
diff --git a/tools/xl/xl_info.c b/tools/xl/xl_info.c
index 712b7638b0..3205270754 100644
--- a/tools/xl/xl_info.c
+++ b/tools/xl/xl_info.c
@@ -210,7 +210,7 @@ static void output_physinfo(void)
          info.hw_cap[4], info.hw_cap[5], info.hw_cap[6], info.hw_cap[7]
         );
 
-    maybe_printf("virt_caps              :%s%s%s%s%s%s%s%s%s%s%s\n",
+    maybe_printf("virt_caps              :%s%s%s%s%s%s%s%s%s%s%s%s%s\n",
          info.cap_pv ? " pv" : "",
          info.cap_hvm ? " hvm" : "",
          info.cap_hvm && info.cap_hvm_directio ? " hvm_directio" : "",
@@ -221,7 +221,9 @@ static void output_physinfo(void)
          info.cap_vmtrace ? " vmtrace" : "",
          info.cap_vpmu ? " vpmu" : "",
          info.cap_gnttab_v1 ? " gnttab-v1" : "",
-         info.cap_gnttab_v2 ? " gnttab-v2" : ""
+         info.cap_gnttab_v2 ? " gnttab-v2" : "",
+         info.cap_assisted_xapic ? " assisted_xapic" : "",
+         info.cap_assisted_x2apic ? " assisted_x2apic" : ""
         );
 
     vinfo = libxl_get_version_info(ctx);
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index 709a4191ef..e5dde9f8ce 100644
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -117,6 +117,9 @@ static const char __initconst warning_hvm_fep[] =
 static bool_t __initdata opt_altp2m_enabled = 0;
 boolean_param("altp2m", opt_altp2m_enabled);
 
+bool __ro_after_init assisted_xapic_available;
+bool __ro_after_init assisted_x2apic_available;
+
 static int cf_check cpu_callback(
     struct notifier_block *nfb, unsigned long action, void *hcpu)
 {
diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
index e1e1fa14e6..77ce0b2121 100644
--- a/xen/arch/x86/hvm/vmx/vmcs.c
+++ b/xen/arch/x86/hvm/vmx/vmcs.c
@@ -343,6 +343,15 @@ static int vmx_init_vmcs_config(bool bsp)
             MSR_IA32_VMX_PROCBASED_CTLS2, &mismatch);
     }
 
+    /* Check whether hardware supports accelerated xapic and x2apic. */
+    if ( bsp )
+    {
+        assisted_xapic_available = cpu_has_vmx_virtualize_apic_accesses;
+        assisted_x2apic_available = cpu_has_vmx_virtualize_x2apic_mode &&
+                                    (cpu_has_vmx_apic_reg_virt ||
+                                     cpu_has_vmx_virtual_intr_delivery);
+    }
+
     /* The IA32_VMX_EPT_VPID_CAP MSR exists only when EPT or VPID available */
     if ( _vmx_secondary_exec_control & (SECONDARY_EXEC_ENABLE_EPT |
                                         SECONDARY_EXEC_ENABLE_VPID) )
diff --git a/xen/arch/x86/include/asm/hvm/hvm.h b/xen/arch/x86/include/asm/hvm/hvm.h
index 5b7ec0cf69..e0d9348878 100644
--- a/xen/arch/x86/include/asm/hvm/hvm.h
+++ b/xen/arch/x86/include/asm/hvm/hvm.h
@@ -373,6 +373,9 @@ int hvm_get_param(struct domain *d, uint32_t index, uint64_t *value);
 #define hvm_tsc_scaling_ratio(d) \
     ((d)->arch.hvm.tsc_scaling_ratio)
 
+extern bool assisted_xapic_available;
+extern bool assisted_x2apic_available;
+
 #define hvm_get_guest_time(v) hvm_get_guest_time_fixed(v, 0)
 
 #define hvm_paging_enabled(v) \
@@ -872,6 +875,8 @@ static inline void hvm_set_reg(struct vcpu *v, unsigned int reg, uint64_t val)
 #define hvm_tsc_scaling_supported false
 #define hap_has_1gb false
 #define hap_has_2mb false
+#define assisted_xapic_available false
+#define assisted_x2apic_available false
 
 #define hvm_paging_enabled(v) ((void)(v), false)
 #define hvm_wp_enabled(v) ((void)(v), false)
diff --git a/xen/arch/x86/sysctl.c b/xen/arch/x86/sysctl.c
index f82abc2488..716525f72f 100644
--- a/xen/arch/x86/sysctl.c
+++ b/xen/arch/x86/sysctl.c
@@ -135,6 +135,10 @@ void arch_do_physinfo(struct xen_sysctl_physinfo *pi)
         pi->capabilities |= XEN_SYSCTL_PHYSCAP_hap;
     if ( IS_ENABLED(CONFIG_SHADOW_PAGING) )
         pi->capabilities |= XEN_SYSCTL_PHYSCAP_shadow;
+    if ( assisted_xapic_available )
+        pi->arch_capabilities |= XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC;
+    if ( assisted_x2apic_available )
+        pi->arch_capabilities |= XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC;
 }
 
 long arch_do_sysctl(
diff --git a/xen/include/public/sysctl.h b/xen/include/public/sysctl.h
index 55252e97f2..fbb9912067 100644
--- a/xen/include/public/sysctl.h
+++ b/xen/include/public/sysctl.h
@@ -35,7 +35,7 @@
 #include "domctl.h"
 #include "physdev.h"
 
-#define XEN_SYSCTL_INTERFACE_VERSION 0x00000014
+#define XEN_SYSCTL_INTERFACE_VERSION 0x00000015
 
 /*
  * Read console content from Xen buffer ring.
@@ -111,6 +111,13 @@ struct xen_sysctl_tbuf_op {
 /* Max XEN_SYSCTL_PHYSCAP_* constant.  Used for ABI checking. */
 #define XEN_SYSCTL_PHYSCAP_MAX XEN_SYSCTL_PHYSCAP_gnttab_v2
 
+/* The platform supports x{2}apic hardware assisted emulation. */
+#define XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC  (1u << 0)
+#define XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC (1u << 1)
+
+/* Max XEN_SYSCTL_PHYSCAP_X86__* constant. Used for ABI checking. */
+#define XEN_SYSCTL_PHYSCAP_X86_MAX XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC
+
 struct xen_sysctl_physinfo {
     uint32_t threads_per_core;
     uint32_t cores_per_socket;
@@ -120,6 +127,8 @@ struct xen_sysctl_physinfo {
     uint32_t max_node_id; /* Largest possible node ID on this host */
     uint32_t cpu_khz;
     uint32_t capabilities;/* XEN_SYSCTL_PHYSCAP_??? */
+    uint32_t arch_capabilities;/* XEN_SYSCTL_PHYSCAP_{X86,ARM,...}_??? */
+    uint32_t pad;
     uint64_aligned_t total_pages;
     uint64_aligned_t free_pages;
     uint64_aligned_t scrub_pages;
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 15:08:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 15:08:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289129.490520 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSgsA-000253-Qh; Fri, 11 Mar 2022 15:08:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289129.490520; Fri, 11 Mar 2022 15:08:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSgsA-00024w-N7; Fri, 11 Mar 2022 15:08:06 +0000
Received: by outflank-mailman (input) for mailman id 289129;
 Fri, 11 Mar 2022 15:08:05 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=RXIo=TW=citrix.com=prvs=0626a3ed1=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nSgs9-00024q-3Y
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 15:08:05 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 0b5e39da-a14d-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 16:08:03 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0b5e39da-a14d-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647011283;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=gs0u7tnL2WY6HHle9UCAegaNmYOL6XKCE5HpbHIfEq0=;
  b=J0gHozZAS8YmZzu/GAozCgKYNHyGOD+UiEWo47MS7rm0rZdThGUA7ySx
   xu92OPUGtVsY2JK9uux/vv/3TvCsQJdqmbZqmyeMo+ElU815iirSv/P/0
   FrDWAqJ1ve7bb+gtzvEXBDSdUFOHfW/g95faKD/zFGkm1zRtkN+5wWVvY
   8=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66030042
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:wyuqoKMW4icj2MXvrR2zl8FynXyQoLVcMsEvi/4bfWQNrUol1DIOz
 GIWUWzTbP2CNmDwLdB/b9zkoBsD7MTQm95jHQto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi29cw27BVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Zx
 N99i6GqeT0SGajCqPY4dUlBDwohMvgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALNs7kMZlZonh95TrYEewnUdbIRKCiCdpwgmlo3ZgWQay2i
 8wxdCBEdir7cgV0Yg0WB4wR3/+TjFy8WmgNwL6SjfVuuDWCpOBr65DyNPLFd9rMQt9a9m6Iq
 2SD82nnDxUyMN2E1SHD4n+qnvXIny7wRMQVDrLQ3vxgjUCXx2cTIAYLTlb9qv684nNSQPoGd
 RZSoHB36/Fvqgr7FbERQiFUvlaItC4iZsBgKdYd7Q+92I/ysx+FLTcLG2sphMMdiOc6Qjkj1
 1msltzvBCByvLD9dU9x5ot4vhvpZ3FLcDZqiTssCFJcvoK9+N1bYgfnE447eJNZmOEZDt0ZL
 9qiiCElz4segscQv0lQ1QCW2mn8znQlo+Nc2+k2Yo5Hxl8oDGJGT9bxgbQ+0RqmBN/IJrVml
 CJY8/VyFMhUUfmweNWlGY3h5o2B6fefKyH7ilVyBZQn/DnF0yf9Id4Bu24hdB8xa5hsldrVj
 Kn74FI5CHh7ZibCUEOKS9jpV5RCIVbISbwJqcw4nvIRO8MsJWdrDQllZFKK3nCFraTfufpXB
 HtvSu71VSxyIf0+lFKeHr5BuZd2lnFW7T6CHvjTkkX4uYdykVbIEN/pxnPVNbtnhE5FyS2Im
 +ti2zyikEwODrehPnGJreb+7zkidBAGOHw/kOQOHsarKQt6AmAxTfjXxLIqYYt+mKpJ0OzP+
 xmAtoVwkjITWVWvxd22V01e
IronPort-HdrOrdr: A9a23:qsBPLKPcQ1IvzMBcTjujsMiBIKoaSvp037BK7S1MoNJuEvBw9v
 re+MjzsCWftN9/Yh4dcLy7VpVoIkmskKKdg7NhXotKNTOO0AeVxelZhrcKqAeQeREWmNQ96U
 9hGZIOdeEZDzJB/LrHCN/TKade/DGFmprY+9s31x1WPGZXgzkL1XYDNu6ceHcGIjVuNN4CO7
 e3wNFInDakcWR/VLXAOpFUN9Kz3uEijfjdEGY7OyI=
X-IronPort-AV: E=Sophos;i="5.90,174,1643691600"; 
   d="scan'208";a="66030042"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=L5T/kyE0eDLHhnXeZFbQUAhancDx0OGsaxXtgnlwWSH6tKZIsHTYneHwLDGaSV9DDHDPQBGoTEf2deCnJHZop67dBBbXvjktItayXj6HBBDXulfg4sHf+ThrFCuJjUrgHhY8gX1gj7YK6P+KKCt3uHV9/eh9y6ctXtd7fGyBE2f7l5UoA+NsomaRshT4NBqh+bN2t1LbKCd5ZqM/oJvNfXAa+8CEjH29pzqCTfHcSUhBrWWhNDROIcCY1n5QCmh1XSSINqXzM4FzgIo0Czj4WM0uZwD4H8y2ns35T5m/STuV5rRAPHH2tcRJQXyghgvJGOzkm54T2rfXHM6VdqBfgw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=eD9ALPhI+NUwjBofo27V0gTeE07oK0WA6/Hq2mZEOCM=;
 b=J8hj1EBh7eVe9PRN7XUAHv216d0HUbh5rrwlhBYawIG2yANykyLF/GIV/EsTUGvrcItj2usbxZaYLFnPEX9ymz9xQmKLW/ol902rRucinZu3LPxO/2m/sIiqb+r5RFyv+aJT+SGouFP85/GeTDG3duX8iAZVrMHQoHOIYU123ZiM7WHfUEDOLOqp16MravTu7QYp9tgWHiByY7oZ9xAh7SdKdF+Zan31l8pl61axS7yvpgCRBI4hncbpfws3yIQTcGD9DFxcvfIlvG4cx4H57QWhi6TIVHeYzzWf0ErA/cS7uTlLwr2akn3bx9Lj/Qo82HfMTnNRxlIdDZhgja8hfg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=eD9ALPhI+NUwjBofo27V0gTeE07oK0WA6/Hq2mZEOCM=;
 b=DFsWwceeMiAD+Yg7jaJI7bZR3kIctQTQJtOJhpjyuhBuB4K0Irddn7+Lsaxj86D8EAJ4k4zulE5s3BXrZatSnDcAojFD+MxwC5iZMIdCpxwdLkFC78KsFmSUqfdDtTyxjke5sFFih5v1WvG/ZS9WtWXSD4dnLtBYNSYuQodBK2s=
Date: Fri, 11 Mar 2022 16:07:47 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Andrew
 Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH v2] x86: avoid SORT_BY_INIT_PRIORITY with old GNU ld
Message-ID: <Yitlw1EN+egVJ4xD@Air-de-Roger>
References: <97bebbfa-b5e8-4c57-162f-2a052de92f02@suse.com>
 <Yitd9RNJf1vvOsf4@Air-de-Roger>
 <517b0f83-ba5e-3aaf-9c06-9b7078b816ec@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <517b0f83-ba5e-3aaf-9c06-9b7078b816ec@suse.com>
X-ClientProxiedBy: LO3P265CA0016.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:bb::21) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 61b54e33-8328-4420-64e0-08da0370ea27
X-MS-TrafficTypeDiagnostic: DM5PR03MB2969:EE_
X-Microsoft-Antispam-PRVS: <DM5PR03MB296983A104D7E31483262D1B8F0C9@DM5PR03MB2969.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(316002)(6916009)(85182001)(8936002)(66946007)(83380400001)(54906003)(38100700002)(186003)(5660300002)(2906002)(26005)(4326008)(8676002)(86362001)(6486002)(33716001)(508600001)(6506007)(6666004)(53546011)(6512007)(82960400001)(66476007)(9686003)(66556008)(67856001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?eThURy84eVdFeFp6NldDMGFMTDBPMVowUkp0Um4zbGJPT1BKK0RyNWlYUHlu?=
 =?utf-8?B?QXFoOVIrU2VYSGtqd0I0SFJzOE5uckhvamd5TjBVNjRFdmpKczRtekNIdUFh?=
 =?utf-8?B?bWdXQ0RuTHdGem5FVzhsU3JhcEtKSmVGZFVnZnF5WjNteTcwRndWdWMrdzFU?=
 =?utf-8?B?SHhvQjdvV0dOdE04eldtbmZuYWRvdE1ucjdEdW93RDNIdFMzS05rWmdZQmxX?=
 =?utf-8?B?djF2cHVJT3JRUnpHbm5SV2tFUUl3RDdVQ2UyWWZIS1dOdXpnaDhTZnlJK1hQ?=
 =?utf-8?B?QnkxRzNaNUN3R1V0RVJYU2JPbEozTTRGcDFwelZKK094MXR5M0VNODlPUFJm?=
 =?utf-8?B?ZWJaNmRLbkwrdGhtdzZPNHV6eVZVSW5NMjk4SHZYS1Nrc1V3TWlWd3RlWnJa?=
 =?utf-8?B?elpLbS9RNkxjL2l3Ty8xRnBLQzNkNklJTjF6UUlNSHBiN2RQZmhtNENXQnY0?=
 =?utf-8?B?bVF0dW9OUk4rczNFYkV0Y21pNGxobjd4QUNWb3ROUG9XTDBBUWFUVDJhWElv?=
 =?utf-8?B?bUVySmdDc05yY3R3M2ZPYTJ1UjlqeVl3bk01TEcxYVF3ZFc1dnpSTncwNXBC?=
 =?utf-8?B?bGhUSWF0OU1WbUNZVmx5T0lDVVlwaHlVZ1hGNytpZklmbEpLam9jK1gzaEMx?=
 =?utf-8?B?Z1d4azVMKzIvTVRtSnZuT0FUa1R2M1NPWFBuVWNvWUkwWmFUWTA5ZUF1ZTdy?=
 =?utf-8?B?WEgrV3RQS3djNFo0UVVncldIUkI2bFJnV0JYbUlpMlBsbis1MTVMVWpSZnY4?=
 =?utf-8?B?d0MzMEQvVDEwajZqNlFUaTRJcnptWHc0RWxBR0VxajNFUzVITVNlMWhIdUNt?=
 =?utf-8?B?U3lKcE0xRU11VHl2MjNKYVpCTFZHcXB4M2JVZkR1N1dJcUtQT1ZZc09LTk1j?=
 =?utf-8?B?V1lKM0tZNXp1U0gzeGc3cTMvM28ycEUzOFZrc3plNWlhdUgwYUxjMDNMcEo4?=
 =?utf-8?B?Y1FlRUcxTXB3Qk10T2JJUlc2S01HVFk3WjhOOG5CSG94TEExTWhFK3U0RUJN?=
 =?utf-8?B?V0x0alY5blA4YnEzalU0RXFrSXZVUjNlbGtpRjNyR2piZm5LeFJXZ2lqUEN5?=
 =?utf-8?B?NlBlWmZkRzY0WTkxWVllU0t4MWV0c3U5S1RBRW04WUVZWnEzSEl2K0ZnSWo4?=
 =?utf-8?B?aHhqZEpzakVGcWVpTjdTTlkydnA4M2dVWklZYUFIL3dwYmN5YzNoYkZET1Vq?=
 =?utf-8?B?cnJpRmlmc3RkanNYR1dlMk1Lc1lyMjZ4blVtUElLMHc5VCtpQ0xtZlY1ZTFY?=
 =?utf-8?B?QndRZGE3Z3lsU0NTSzdQbC8yOW4zVm56UTR6akNkSy9XZXRzSWJjcVFnaGJk?=
 =?utf-8?B?VFVoZWNjc0dST21vNTJGK3dZZ0wyZy9NSkt3VXJnU3pwblhrbDZFaHNRVjBt?=
 =?utf-8?B?UVJoNTZZT25Md0dCZEZRc3ZCZjVpbVhaMitvQlFNTGc0ZEI1Q2VYb2J6Tnhp?=
 =?utf-8?B?bElyR1RncUQrbm5uYVdMQWFCejlNV3IyN015aU5Ed0dvcGdBaGhCWTJtL3BS?=
 =?utf-8?B?eDVVQzF3Vjc4STZhU0xRY1BWTmlPNm1Ud0lHZWl5ZHJ4RnFDekVXMzAwcUV1?=
 =?utf-8?B?MFRYUnVWaWtHZkd5ZWwzRlAydDUvQU5PeFh1emVjRG16UUQzVEg4NWZsRUlu?=
 =?utf-8?B?RkNaSTlKeGoyUjUra2NBZjh5RzExajJpcXowV0gva0hUcHkrMXowS0JFNHBP?=
 =?utf-8?B?U2pYZVcvRXlnRnI2d2ZVcXRPZ2dBUWJBK3k5Q2t1MkcwYS9xd2VpQzBqbERN?=
 =?utf-8?B?V0V4SWE3UXpXMGxTaytjNSswS0ZEM05jZU5MYnJVVnRMUlprbG03VzEvbG5w?=
 =?utf-8?B?eU5Xd05lMUN0SzV3cmx3enF4TVdTbjhaR3BCMHlRWlZXbnNVTm5lY2Y2bW5T?=
 =?utf-8?B?TkpUOXZqa2p3OTR6bHdUMUEvN2JmcTgzNDl4bGdUS1RCcXo5dWdXZlZFSVRT?=
 =?utf-8?B?RlBhcUZ2eS9VZlhiNEVuQm5xR3A4U2RnU3RrQmRvU1gvb1RDNkNNUGNJcndo?=
 =?utf-8?B?ZEVYUFNqUFR3PT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 61b54e33-8328-4420-64e0-08da0370ea27
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 15:07:52.7891
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: nqKbdIOPfHfweJ9y74NmaqP4YKRfRaOSDZuItQGpCAHCRin5UWqrdy1FyRy+Z7SJOZaauzWIRgK4oo42Ucd0FQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR03MB2969
X-OriginatorOrg: citrix.com

On Fri, Mar 11, 2022 at 03:55:57PM +0100, Jan Beulich wrote:
> On 11.03.2022 15:34, Roger Pau Monné wrote:
> > On Fri, Mar 11, 2022 at 02:28:40PM +0100, Jan Beulich wrote:
> >> Support for this construct was added in 2.22 only. Avoid the need to
> >> introduce logic to probe for linker script capabilities by (ab)using the
> >> probe for a command line option having appeared at about the same time.
> >>
> >> Fixes: 4b7fd8153ddf ("x86: fold sections in final binaries")
> >> Signed-off-by: Jan Beulich <jbeulich@suse.com>
> >> ---
> >> v2: Always define HAVE_LD_SORT_BY_INIT_PRIORITY when using LLVM ld.
> >>
> >> --- a/xen/arch/x86/arch.mk
> >> +++ b/xen/arch/x86/arch.mk
> >> @@ -73,6 +73,16 @@ ifeq ($(CONFIG_UBSAN),y)
> >>  $(call cc-option-add,CFLAGS_UBSAN,CC,-fno-sanitize=alignment)
> >>  endif
> >>  
> >> +ifeq ($(call success,$(LD) --version | head -n 1 | grep -q "GNU ld"),y)
> > 
> > You are not going to like this, but I think this should live in
> > xen/Kconfig together with CC_IS_{GCC,CLANG}, ie: LD_IS_GNU or similar.
> > 
> > It's possible we will need this in the future in other places, so
> > having it in Kconfig makes sense.
> 
> Despite me not liking this (until, as said elsewhere, we've properly
> settled on either approach) I did actually consider doing like you
> suggest. But: I would have to introduce there more than I need here,
> just for consistency's sake, and I wouldn't have a way to test the
> LLD part of it (I did check - none of the distros where I chose to
> install Clang offer the linker). I realize I could ask you to help
> with the testing, but then the first point would remain. I'd prefer
> if for this simple build fix it was okay to go the old fashioned
> route ...

I would be fine with you just introducing LD_IS_GNU. That's all we
need so far. We can introduce LD_IS_LLVM if/when required. I prefer
that asymmetry rather than doing the detection here.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 15:08:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 15:08:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289132.490531 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSgsa-0002XF-2y; Fri, 11 Mar 2022 15:08:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289132.490531; Fri, 11 Mar 2022 15:08:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSgsZ-0002X8-Vy; Fri, 11 Mar 2022 15:08:31 +0000
Received: by outflank-mailman (input) for mailman id 289132;
 Fri, 11 Mar 2022 15:08:31 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3p0I=TW=citrix.com=prvs=06245b39f=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nSgsZ-0002Wz-Gg
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 15:08:31 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 1ae09176-a14d-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 16:08:29 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1ae09176-a14d-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647011308;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=zUZlcj5OcIYc952rlMvhxXnxE1SjvwPbkDM5ybal+Rc=;
  b=MC0QQwf0R+2PIo+/5PXyhHLp/VroBZegm1xy/Xl9ZkR2fZygYFOrw0vx
   OaYBOJ7XYkpowhWRBGRSo4Z6kyruC0i9FBmwIUvKAvCrYhkMhPiTzaE3K
   +TY9VMuyv5HhvlDGCSJVLpSEJMv+bGwJR7OGFKJFDpv2nWfJgjE5i/4Ne
   I=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 66419842
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:h+bEwq5YRopv84Q6DxNTWwxRtNvHchMFZxGqfqrLsTDasY5as4F+v
 mFNW2rSO67eYmKjfYogPovn9RhXuZDUzoBqGVdp/Cg8Hi5G8cbLO4+Ufxz6V8+wwmwvb67FA
 +E2MISowBUcFyeEzvuVGuG96yE6j8lkf5KkYAL+EnkZqTRMFWFw0XqPp8Zj2tQy2YPgWlvX0
 T/Pi5a31GGNimYc3l08s8pvmDs31BglkGpF1rCWTakjUG72zxH5PrpGTU2CByKQrr1vNvy7X
 47+IISRpQs1yfuP5uSNyd4XemVSKlLb0JPnZnB+A8BOiTAazsA+PzpS2FPxpi67hh3Q9+2dx
 umhurSRRicZMfb+mthEECsFLxM5M/BHo7zIdC3XXcy7lyUqclPpyvRqSko3IZcZ6qB8BmQmG
 f4wcW5XKErZ3qTvnez9GrIEascLdaEHOKs9s3dtixTQCf8iSJbOa67L+cVZzHE7gcUm8fP2O
 ZRFMGs/ME6ojxtnGWdHS8MyzeSSuULmUxJloWqQqYBuyj2GpOB2+Oe0a4eEEjCQfu1OhVqRr
 G/C+2X/AzkZOcaZxD7D9Wij7sfNgCf6VYQ6BLC+sPlwjzW7+GsXDxEHUEqhltOwgEW+RtF3J
 lQd/2wlqq1a3ECiUNTVRRCzp3+A+BkGVLJ4EeIg7xqW4rHJ+AvfDW8BJhZRZdpjuMIoSDgC0
 l6Sg8ivFTFpqKeSS3+W6vGTtzzaETcRBX8PY2kDVwRty9vprZw3jxnPZs1+C6PzhdrwcQwc2
 BjT8nJ43e9Ky5dWiePrpjgrng5AuLDoQS4F6V7lXF78rTEkWLziadGpslvUuKMowJmicnGNu
 30Nms675e8IDI2QmCHlfNjhDI1F9N7ebmSC3AcH840Jsm30piX9Jdw4DCRWeR8xWvvobwMFd
 6M6Vel5wJZIdEWnYqZsC25aI5R7lPOwfTgJux29UzavXnSTXFPWlM2NTRTJt4wIrKTKufhuU
 Xt8WZzwZUv28Yw9kFKLqx41iNfHPBwWy2LJXozcxB+6y7eYb3P9Ye5bbAXfNb9mvPvc+Vu9H
 zNj2y2ikkQ3vArWOHS/zGLuBQpScShT6W7e96S7idJv0iI5QTp8Wpc9MJsqepB/nrQ9qws71
 irVZ6Os83Km3SevAVzTMhhLMeqzNb4i/SNTFXF9Zj6Ahil8CbtDGY9CLvPbi5F8r7c9pRO1J
 tFYE/i97gNnEW2WpW5CMcGj8OSPtn2D3GqzAsZsWxBnF7YIeuAD0oaMktfHnMXWMheKiA==
IronPort-HdrOrdr: A9a23:XYqLZqpT6OCxdHNrAL10TZ8aV5rReYIsimQD101hICG9Evb0qy
 lhppQmPH7P+VIssRQb8+xoV5PufZqxz/BICOoqTNKftWvdyQiVxehZhOOP/9SJIUbDH4VmpM
 VdmsZFaeEZDTJB/LvHCAvTKadd/DFQmprY+ts3zB1WPH9Xg7kL1XYfNu4CeHcGPzWvA/ACZf
 yhz/sCnRWMU1INYP+2A3EUNtKz3eEixPrdEGc77wdM0nj3sQ+V
X-IronPort-AV: E=Sophos;i="5.90,174,1643691600"; 
   d="scan'208";a="66419842"
From: Jane Malalane <jane.malalane@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Jane Malalane <jane.malalane@citrix.com>, Wei Liu <wl@xen.org>, "Anthony
 PERARD" <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien Grall
	<julien@xen.org>, "Stefano Stabellini" <sstabellini@kernel.org>, Christian
 Lindig <christian.lindig@citrix.com>, David Scott <dave@recoil.org>,
	"Volodymyr Babchuk" <Volodymyr_Babchuk@epam.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>
Subject: [PATCH v7 2/2] x86/xen: Allow per-domain usage of hardware virtualized APIC
Date: Fri, 11 Mar 2022 15:08:15 +0000
Message-ID: <20220311150815.27339-1-jane.malalane@citrix.com>
X-Mailer: git-send-email 2.11.0
In-Reply-To: <20220308173643.2929-1-jane.malalane@citrix.com>
References: <20220308173643.2929-1-jane.malalane@citrix.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

Introduce a new per-domain creation x86 specific flag to
select whether hardware assisted virtualization should be used for
x{2}APIC.

A per-domain option is added to xl in order to select the usage of
x{2}APIC hardware assisted virtualization, as well as a global
configuration option.

Having all APIC interaction exit to Xen for emulation is slow and can
induce much overhead. Hardware can speed up x{2}APIC by decoding the
APIC access and providing a VM exit with a more specific exit reason
than a regular EPT fault or by altogether avoiding a VM exit.

On the other hand, being able to disable x{2}APIC hardware assisted
virtualization can be useful for testing and debugging purposes.

Note: vmx_install_vlapic_mapping doesn't require modifications
regardless of whether the guest has "Virtualize APIC accesses" enabled
or not, i.e., setting the APIC_ACCESS_ADDR VMCS field is fine so long
as virtualize_apic_accesses is supported by the CPU.

Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Jane Malalane <jane.malalane@citrix.com>
---
CC: Wei Liu <wl@xen.org>
CC: Anthony PERARD <anthony.perard@citrix.com>
CC: Juergen Gross <jgross@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>
CC: George Dunlap <george.dunlap@citrix.com>
CC: Jan Beulich <jbeulich@suse.com>
CC: Julien Grall <julien@xen.org>
CC: Stefano Stabellini <sstabellini@kernel.org>
CC: Christian Lindig <christian.lindig@citrix.com>
CC: David Scott <dave@recoil.org>
CC: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
CC: "Roger Pau Monné" <roger.pau@citrix.com>

v7:
 * Fix void return in libxl__arch_domain_build_info_setdefault
 * Fix style issues
 * Use EINVAL when rejecting assisted_x{2}apic for PV guests and
   ENODEV otherwise, when assisted_x{2}apic isn't supported
 * Define has_assisted_x{2}apic macros for when !CONFIG_HVM
 * Replace "EPT" fault reference with "p2m" fault since the former is
   Intel-specific

v6:
 * Use ENODEV instead of EINVAL when rejecting assisted_x{2}apic
   for PV guests
 * Move has_assisted_x{2}apic macros out of an Intel specific header
 * Remove references to Intel specific features in documentation

v5:
 * Revert v4 changes in vmx_vlapic_msr_changed(), preserving the use of
   the has_assisted_x{2}apic macros
 * Following changes in assisted_x{2}apic_available definitions in
   patch 1, retighten conditionals for setting
   XEN_HVM_CPUID_APIC_ACCESS_VIRT and XEN_HVM_CPUID_X2APIC_VIRT in
   cpuid_hypervisor_leaves()

v4:
 * Add has_assisted_x{2}apic macros and use them where appropriate
 * Replace CPU checks with per-domain assisted_x{2}apic control
   options in vmx_vlapic_msr_changed() and cpuid_hypervisor_leaves(),
   following edits to assisted_x{2}apic_available definitions in
   patch 1
   Note: new assisted_x{2}apic_available definitions make later
   cpu_has_vmx_apic_reg_virt and cpu_has_vmx_virtual_intr_delivery
   checks redundant in vmx_vlapic_msr_changed()

v3:
 * Change info in xl.cfg to better express reality and fix
   capitalization of x{2}apic
 * Move "physinfo" variable definition to the beggining of
   libxl__domain_build_info_setdefault()
 * Reposition brackets in if statement to match libxl coding style
 * Shorten logic in libxl__arch_domain_build_info_setdefault()
 * Correct dprintk message in arch_sanitise_domain_config()
 * Make appropriate changes in vmx_vlapic_msr_changed() and
   cpuid_hypervisor_leaves() for amended "assisted_x2apic" bit
 * Remove unneeded parantheses

v2:
 * Add a LIBXL_HAVE_ASSISTED_APIC macro
 * Pass xcpyshinfo as a pointer in libxl__arch_get_physinfo
 * Add a return statement in now "int"
   libxl__arch_domain_build_info_setdefault()
 * Preserve libxl__arch_domain_build_info_setdefault 's location in
   libxl_create.c
 * Correct x{2}apic default setting logic in
   libxl__arch_domain_prepare_config()
 * Correct logic for parsing assisted_x{2}apic host/guest options in
   xl_parse.c and initialize them to -1 in xl.c
 * Use guest options directly in vmx_vlapic_msr_changed
 * Fix indentation of bool assisted_x{2}apic in struct hvm_domain
 * Add a change in xenctrl_stubs.c to pass xenctrl ABI checks
---
 docs/man/xl.cfg.5.pod.in              | 15 +++++++++++++++
 docs/man/xl.conf.5.pod.in             | 12 ++++++++++++
 tools/golang/xenlight/helpers.gen.go  | 12 ++++++++++++
 tools/golang/xenlight/types.gen.go    |  2 ++
 tools/include/libxl.h                 |  7 +++++++
 tools/libs/light/libxl_arch.h         |  5 +++--
 tools/libs/light/libxl_arm.c          |  9 ++++++---
 tools/libs/light/libxl_create.c       | 22 +++++++++++++---------
 tools/libs/light/libxl_types.idl      |  2 ++
 tools/libs/light/libxl_x86.c          | 28 ++++++++++++++++++++++++++--
 tools/ocaml/libs/xc/xenctrl.ml        |  2 ++
 tools/ocaml/libs/xc/xenctrl.mli       |  2 ++
 tools/ocaml/libs/xc/xenctrl_stubs.c   |  2 +-
 tools/xl/xl.c                         |  8 ++++++++
 tools/xl/xl.h                         |  2 ++
 tools/xl/xl_parse.c                   | 16 ++++++++++++++++
 xen/arch/x86/domain.c                 | 29 ++++++++++++++++++++++++++++-
 xen/arch/x86/hvm/vmx/vmcs.c           |  4 ++++
 xen/arch/x86/hvm/vmx/vmx.c            | 13 ++++---------
 xen/arch/x86/include/asm/hvm/domain.h |  6 ++++++
 xen/arch/x86/include/asm/hvm/hvm.h    |  5 +++++
 xen/arch/x86/traps.c                  |  5 +++--
 xen/include/public/arch-x86/xen.h     |  2 ++
 23 files changed, 181 insertions(+), 29 deletions(-)

diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in
index b98d161398..6d98d73d76 100644
--- a/docs/man/xl.cfg.5.pod.in
+++ b/docs/man/xl.cfg.5.pod.in
@@ -1862,6 +1862,21 @@ firmware tables when using certain older guest Operating
 Systems. These tables have been superseded by newer constructs within
 the ACPI tables.
 
+=item B<assisted_xapic=BOOLEAN>
+
+B<(x86 only)> Enables or disables hardware assisted virtualization for
+xAPIC. With this option enabled, a memory-mapped APIC access will be
+decoded by hardware and either issue a more specific VM exit than just
+a p2m fault, or altogether avoid a VM exit. The
+default is settable via L<xl.conf(5)>.
+
+=item B<assisted_x2apic=BOOLEAN>
+
+B<(x86 only)> Enables or disables hardware assisted virtualization for
+x2APIC. With this option enabled, certain accesses to MSR APIC
+registers will avoid a VM exit into the hypervisor. The default is
+settable via L<xl.conf(5)>.
+
 =item B<nx=BOOLEAN>
 
 B<(x86 only)> Hides or exposes the No-eXecute capability. This allows a guest
diff --git a/docs/man/xl.conf.5.pod.in b/docs/man/xl.conf.5.pod.in
index df20c08137..95d136d1ea 100644
--- a/docs/man/xl.conf.5.pod.in
+++ b/docs/man/xl.conf.5.pod.in
@@ -107,6 +107,18 @@ Sets the default value for the C<max_grant_version> domain config value.
 
 Default: maximum grant version supported by the hypervisor.
 
+=item B<assisted_xapic=BOOLEAN>
+
+If enabled, domains will use xAPIC hardware assisted virtualization by default.
+
+Default: enabled if supported.
+
+=item B<assisted_x2apic=BOOLEAN>
+
+If enabled, domains will use x2APIC hardware assisted virtualization by default.
+
+Default: enabled if supported.
+
 =item B<vif.default.script="PATH">
 
 Configures the default hotplug script used by virtual network devices.
diff --git a/tools/golang/xenlight/helpers.gen.go b/tools/golang/xenlight/helpers.gen.go
index dd4e6c9f14..dece545ee0 100644
--- a/tools/golang/xenlight/helpers.gen.go
+++ b/tools/golang/xenlight/helpers.gen.go
@@ -1120,6 +1120,12 @@ x.ArchArm.Vuart = VuartType(xc.arch_arm.vuart)
 if err := x.ArchX86.MsrRelaxed.fromC(&xc.arch_x86.msr_relaxed);err != nil {
 return fmt.Errorf("converting field ArchX86.MsrRelaxed: %v", err)
 }
+if err := x.ArchX86.AssistedXapic.fromC(&xc.arch_x86.assisted_xapic);err != nil {
+return fmt.Errorf("converting field ArchX86.AssistedXapic: %v", err)
+}
+if err := x.ArchX86.AssistedX2Apic.fromC(&xc.arch_x86.assisted_x2apic);err != nil {
+return fmt.Errorf("converting field ArchX86.AssistedX2Apic: %v", err)
+}
 x.Altp2M = Altp2MMode(xc.altp2m)
 x.VmtraceBufKb = int(xc.vmtrace_buf_kb)
 if err := x.Vpmu.fromC(&xc.vpmu);err != nil {
@@ -1605,6 +1611,12 @@ xc.arch_arm.vuart = C.libxl_vuart_type(x.ArchArm.Vuart)
 if err := x.ArchX86.MsrRelaxed.toC(&xc.arch_x86.msr_relaxed); err != nil {
 return fmt.Errorf("converting field ArchX86.MsrRelaxed: %v", err)
 }
+if err := x.ArchX86.AssistedXapic.toC(&xc.arch_x86.assisted_xapic); err != nil {
+return fmt.Errorf("converting field ArchX86.AssistedXapic: %v", err)
+}
+if err := x.ArchX86.AssistedX2Apic.toC(&xc.arch_x86.assisted_x2apic); err != nil {
+return fmt.Errorf("converting field ArchX86.AssistedX2Apic: %v", err)
+}
 xc.altp2m = C.libxl_altp2m_mode(x.Altp2M)
 xc.vmtrace_buf_kb = C.int(x.VmtraceBufKb)
 if err := x.Vpmu.toC(&xc.vpmu); err != nil {
diff --git a/tools/golang/xenlight/types.gen.go b/tools/golang/xenlight/types.gen.go
index 87be46c745..253c9ad93d 100644
--- a/tools/golang/xenlight/types.gen.go
+++ b/tools/golang/xenlight/types.gen.go
@@ -520,6 +520,8 @@ Vuart VuartType
 }
 ArchX86 struct {
 MsrRelaxed Defbool
+AssistedXapic Defbool
+AssistedX2Apic Defbool
 }
 Altp2M Altp2MMode
 VmtraceBufKb int
diff --git a/tools/include/libxl.h b/tools/include/libxl.h
index 94e6355822..cdcccd6d01 100644
--- a/tools/include/libxl.h
+++ b/tools/include/libxl.h
@@ -535,6 +535,13 @@
 #define LIBXL_HAVE_PHYSINFO_ASSISTED_APIC 1
 
 /*
+ * LIBXL_HAVE_ASSISTED_APIC indicates that libxl_domain_build_info has
+ * assisted_xapic and assisted_x2apic fields for enabling hardware
+ * assisted virtualization for x{2}apic per domain.
+ */
+#define LIBXL_HAVE_ASSISTED_APIC 1
+
+/*
  * libxl ABI compatibility
  *
  * The only guarantee which libxl makes regarding ABI compatibility
diff --git a/tools/libs/light/libxl_arch.h b/tools/libs/light/libxl_arch.h
index 207ceac6a1..03b89929e6 100644
--- a/tools/libs/light/libxl_arch.h
+++ b/tools/libs/light/libxl_arch.h
@@ -71,8 +71,9 @@ void libxl__arch_domain_create_info_setdefault(libxl__gc *gc,
                                                libxl_domain_create_info *c_info);
 
 _hidden
-void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
-                                              libxl_domain_build_info *b_info);
+int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
+                                             libxl_domain_build_info *b_info,
+                                             const libxl_physinfo *physinfo);
 
 _hidden
 int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
diff --git a/tools/libs/light/libxl_arm.c b/tools/libs/light/libxl_arm.c
index 39fdca1b49..7dee2afd4b 100644
--- a/tools/libs/light/libxl_arm.c
+++ b/tools/libs/light/libxl_arm.c
@@ -1384,14 +1384,15 @@ void libxl__arch_domain_create_info_setdefault(libxl__gc *gc,
     }
 }
 
-void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
-                                              libxl_domain_build_info *b_info)
+int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
+                                             libxl_domain_build_info *b_info,
+                                             const libxl_physinfo *physinfo)
 {
     /* ACPI is disabled by default */
     libxl_defbool_setdefault(&b_info->acpi, false);
 
     if (b_info->type != LIBXL_DOMAIN_TYPE_PV)
-        return;
+        return 0;
 
     LOG(DEBUG, "Converting build_info to PVH");
 
@@ -1399,6 +1400,8 @@ void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
     memset(&b_info->u, '\0', sizeof(b_info->u));
     b_info->type = LIBXL_DOMAIN_TYPE_INVALID;
     libxl_domain_build_info_init_type(b_info, LIBXL_DOMAIN_TYPE_PVH);
+
+    return 0;
 }
 
 int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
diff --git a/tools/libs/light/libxl_create.c b/tools/libs/light/libxl_create.c
index 15ed021f41..88d08d7277 100644
--- a/tools/libs/light/libxl_create.c
+++ b/tools/libs/light/libxl_create.c
@@ -75,6 +75,7 @@ int libxl__domain_build_info_setdefault(libxl__gc *gc,
                                         libxl_domain_build_info *b_info)
 {
     int i, rc;
+    libxl_physinfo info;
 
     if (b_info->type != LIBXL_DOMAIN_TYPE_HVM &&
         b_info->type != LIBXL_DOMAIN_TYPE_PV &&
@@ -264,7 +265,18 @@ int libxl__domain_build_info_setdefault(libxl__gc *gc,
     if (!b_info->event_channels)
         b_info->event_channels = 1023;
 
-    libxl__arch_domain_build_info_setdefault(gc, b_info);
+    rc = libxl_get_physinfo(CTX, &info);
+    if (rc) {
+        LOG(ERROR, "failed to get hypervisor info");
+        return rc;
+    }
+
+    rc = libxl__arch_domain_build_info_setdefault(gc, b_info, &info);
+    if (rc) {
+        LOG(ERROR, "unable to set domain arch build info defaults");
+        return rc;
+    }
+
     libxl_defbool_setdefault(&b_info->dm_restrict, false);
 
     if (b_info->iommu_memkb == LIBXL_MEMKB_DEFAULT)
@@ -457,14 +469,6 @@ int libxl__domain_build_info_setdefault(libxl__gc *gc,
     }
 
     if (b_info->max_grant_version == LIBXL_MAX_GRANT_DEFAULT) {
-        libxl_physinfo info;
-
-        rc = libxl_get_physinfo(CTX, &info);
-        if (rc) {
-            LOG(ERROR, "failed to get hypervisor info");
-            return rc;
-        }
-
         if (info.cap_gnttab_v2)
             b_info->max_grant_version = 2;
         else if (info.cap_gnttab_v1)
diff --git a/tools/libs/light/libxl_types.idl b/tools/libs/light/libxl_types.idl
index 42ac6c357b..db5eb0a0b3 100644
--- a/tools/libs/light/libxl_types.idl
+++ b/tools/libs/light/libxl_types.idl
@@ -648,6 +648,8 @@ libxl_domain_build_info = Struct("domain_build_info",[
                                ("vuart", libxl_vuart_type),
                               ])),
     ("arch_x86", Struct(None, [("msr_relaxed", libxl_defbool),
+                               ("assisted_xapic", libxl_defbool),
+                               ("assisted_x2apic", libxl_defbool),
                               ])),
     # Alternate p2m is not bound to any architecture or guest type, as it is
     # supported by x86 HVM and ARM support is planned.
diff --git a/tools/libs/light/libxl_x86.c b/tools/libs/light/libxl_x86.c
index e0a06ecfe3..46d4de22d1 100644
--- a/tools/libs/light/libxl_x86.c
+++ b/tools/libs/light/libxl_x86.c
@@ -23,6 +23,15 @@ int libxl__arch_domain_prepare_config(libxl__gc *gc,
     if (libxl_defbool_val(d_config->b_info.arch_x86.msr_relaxed))
         config->arch.misc_flags |= XEN_X86_MSR_RELAXED;
 
+    if (d_config->c_info.type != LIBXL_DOMAIN_TYPE_PV)
+    {
+        if (libxl_defbool_val(d_config->b_info.arch_x86.assisted_xapic))
+            config->arch.misc_flags |= XEN_X86_ASSISTED_XAPIC;
+
+        if (libxl_defbool_val(d_config->b_info.arch_x86.assisted_x2apic))
+            config->arch.misc_flags |= XEN_X86_ASSISTED_X2APIC;
+    }
+
     return 0;
 }
 
@@ -819,11 +828,26 @@ void libxl__arch_domain_create_info_setdefault(libxl__gc *gc,
 {
 }
 
-void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
-                                              libxl_domain_build_info *b_info)
+int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
+                                             libxl_domain_build_info *b_info,
+                                             const libxl_physinfo *physinfo)
 {
     libxl_defbool_setdefault(&b_info->acpi, true);
     libxl_defbool_setdefault(&b_info->arch_x86.msr_relaxed, false);
+
+    if (b_info->type != LIBXL_DOMAIN_TYPE_PV) {
+        libxl_defbool_setdefault(&b_info->arch_x86.assisted_xapic,
+                             physinfo->cap_assisted_xapic);
+        libxl_defbool_setdefault(&b_info->arch_x86.assisted_x2apic,
+                             physinfo->cap_assisted_x2apic);
+    }
+    else if (!libxl_defbool_is_default(b_info->arch_x86.assisted_xapic) ||
+             !libxl_defbool_is_default(b_info->arch_x86.assisted_x2apic)) {
+        LOG(ERROR, "Interrupt Controller Virtualization not supported for PV");
+        return ERROR_INVAL;
+    }
+
+    return 0;
 }
 
 int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
diff --git a/tools/ocaml/libs/xc/xenctrl.ml b/tools/ocaml/libs/xc/xenctrl.ml
index 712456e098..32f3028828 100644
--- a/tools/ocaml/libs/xc/xenctrl.ml
+++ b/tools/ocaml/libs/xc/xenctrl.ml
@@ -50,6 +50,8 @@ type x86_arch_emulation_flags =
 
 type x86_arch_misc_flags =
 	| X86_MSR_RELAXED
+	| X86_ASSISTED_XAPIC
+	| X86_ASSISTED_X2APIC
 
 type xen_x86_arch_domainconfig =
 {
diff --git a/tools/ocaml/libs/xc/xenctrl.mli b/tools/ocaml/libs/xc/xenctrl.mli
index b034434f68..d0fcbc8866 100644
--- a/tools/ocaml/libs/xc/xenctrl.mli
+++ b/tools/ocaml/libs/xc/xenctrl.mli
@@ -44,6 +44,8 @@ type x86_arch_emulation_flags =
 
 type x86_arch_misc_flags =
   | X86_MSR_RELAXED
+  | X86_ASSISTED_XAPIC
+  | X86_ASSISTED_X2APIC
 
 type xen_x86_arch_domainconfig = {
   emulation_flags: x86_arch_emulation_flags list;
diff --git a/tools/ocaml/libs/xc/xenctrl_stubs.c b/tools/ocaml/libs/xc/xenctrl_stubs.c
index 7e9c32ad1b..5df8aaa58f 100644
--- a/tools/ocaml/libs/xc/xenctrl_stubs.c
+++ b/tools/ocaml/libs/xc/xenctrl_stubs.c
@@ -239,7 +239,7 @@ CAMLprim value stub_xc_domain_create(value xch, value wanted_domid, value config
 
 		cfg.arch.misc_flags = ocaml_list_to_c_bitmap
 			/* ! x86_arch_misc_flags X86_ none */
-			/* ! XEN_X86_ XEN_X86_MSR_RELAXED all */
+			/* ! XEN_X86_ XEN_X86_ASSISTED_X2APIC max */
 			(VAL_MISC_FLAGS);
 
 #undef VAL_MISC_FLAGS
diff --git a/tools/xl/xl.c b/tools/xl/xl.c
index 2d1ec18ea3..31eb223309 100644
--- a/tools/xl/xl.c
+++ b/tools/xl/xl.c
@@ -57,6 +57,8 @@ int max_grant_frames = -1;
 int max_maptrack_frames = -1;
 int max_grant_version = LIBXL_MAX_GRANT_DEFAULT;
 libxl_domid domid_policy = INVALID_DOMID;
+int assisted_xapic = -1;
+int assisted_x2apic = -1;
 
 xentoollog_level minmsglevel = minmsglevel_default;
 
@@ -201,6 +203,12 @@ static void parse_global_config(const char *configfile,
     if (!xlu_cfg_get_long (config, "claim_mode", &l, 0))
         claim_mode = l;
 
+    if (!xlu_cfg_get_long (config, "assisted_xapic", &l, 0))
+        assisted_xapic = l;
+
+    if (!xlu_cfg_get_long (config, "assisted_x2apic", &l, 0))
+        assisted_x2apic = l;
+
     xlu_cfg_replace_string (config, "remus.default.netbufscript",
         &default_remus_netbufscript, 0);
     xlu_cfg_replace_string (config, "colo.default.proxyscript",
diff --git a/tools/xl/xl.h b/tools/xl/xl.h
index c5c4bedbdd..528deb3feb 100644
--- a/tools/xl/xl.h
+++ b/tools/xl/xl.h
@@ -286,6 +286,8 @@ extern libxl_bitmap global_vm_affinity_mask;
 extern libxl_bitmap global_hvm_affinity_mask;
 extern libxl_bitmap global_pv_affinity_mask;
 extern libxl_domid domid_policy;
+extern int assisted_xapic;
+extern int assisted_x2apic;
 
 enum output_format {
     OUTPUT_FORMAT_JSON,
diff --git a/tools/xl/xl_parse.c b/tools/xl/xl_parse.c
index 117fcdcb2b..0ab9b145fe 100644
--- a/tools/xl/xl_parse.c
+++ b/tools/xl/xl_parse.c
@@ -1681,6 +1681,22 @@ void parse_config_data(const char *config_source,
         xlu_cfg_get_defbool(config, "vpt_align", &b_info->u.hvm.vpt_align, 0);
         xlu_cfg_get_defbool(config, "apic", &b_info->apic, 0);
 
+        e = xlu_cfg_get_long(config, "assisted_xapic", &l , 0);
+        if ((e == ESRCH && assisted_xapic != -1)) /* use global default if present */
+            libxl_defbool_set(&b_info->arch_x86.assisted_xapic, assisted_xapic);
+        else if (!e)
+            libxl_defbool_set(&b_info->arch_x86.assisted_xapic, l);
+        else
+            exit(1);
+
+        e = xlu_cfg_get_long(config, "assisted_x2apic", &l, 0);
+        if ((e == ESRCH && assisted_x2apic != -1)) /* use global default if present */
+            libxl_defbool_set(&b_info->arch_x86.assisted_x2apic, assisted_x2apic);
+        else if (!e)
+            libxl_defbool_set(&b_info->arch_x86.assisted_x2apic, l);
+        else
+            exit(1);
+
         switch (xlu_cfg_get_list(config, "viridian",
                                  &viridian, &num_viridian, 1))
         {
diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c
index a5048ed654..279936a016 100644
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -50,6 +50,7 @@
 #include <asm/cpuidle.h>
 #include <asm/mpspec.h>
 #include <asm/ldt.h>
+#include <asm/hvm/domain.h>
 #include <asm/hvm/hvm.h>
 #include <asm/hvm/nestedhvm.h>
 #include <asm/hvm/support.h>
@@ -619,6 +620,8 @@ int arch_sanitise_domain_config(struct xen_domctl_createdomain *config)
     bool hvm = config->flags & XEN_DOMCTL_CDF_hvm;
     bool hap = config->flags & XEN_DOMCTL_CDF_hap;
     bool nested_virt = config->flags & XEN_DOMCTL_CDF_nested_virt;
+    bool assisted_xapic = config->arch.misc_flags & XEN_X86_ASSISTED_XAPIC;
+    bool assisted_x2apic = config->arch.misc_flags & XEN_X86_ASSISTED_X2APIC;
     unsigned int max_vcpus;
 
     if ( hvm ? !hvm_enabled : !IS_ENABLED(CONFIG_PV) )
@@ -685,13 +688,31 @@ int arch_sanitise_domain_config(struct xen_domctl_createdomain *config)
         }
     }
 
-    if ( config->arch.misc_flags & ~XEN_X86_MSR_RELAXED )
+    if ( config->arch.misc_flags & ~(XEN_X86_MSR_RELAXED |
+                                     XEN_X86_ASSISTED_XAPIC |
+                                     XEN_X86_ASSISTED_X2APIC) )
     {
         dprintk(XENLOG_INFO, "Invalid arch misc flags %#x\n",
                 config->arch.misc_flags);
         return -EINVAL;
     }
 
+    if ( (assisted_xapic || assisted_x2apic) && !hvm )
+    {
+        dprintk(XENLOG_INFO,
+                "Interrupt Controller Virtualization not supported for PV\n");
+        return -EINVAL;
+    }
+
+    if ( (assisted_xapic && !assisted_xapic_available) ||
+         (assisted_x2apic && !assisted_x2apic_available) )
+    {
+        dprintk(XENLOG_INFO,
+                "Hardware assisted x%sAPIC requested but not available\n",
+                assisted_xapic && !assisted_xapic_available ? "" : "2");
+        return -ENODEV;
+    }
+
     return 0;
 }
 
@@ -864,6 +885,12 @@ int arch_domain_create(struct domain *d,
 
     d->arch.msr_relaxed = config->arch.misc_flags & XEN_X86_MSR_RELAXED;
 
+    d->arch.hvm.assisted_xapic =
+        config->arch.misc_flags & XEN_X86_ASSISTED_XAPIC;
+
+    d->arch.hvm.assisted_x2apic =
+        config->arch.misc_flags & XEN_X86_ASSISTED_X2APIC;
+
     return 0;
 
  fail:
diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
index 77ce0b2121..47c27740d3 100644
--- a/xen/arch/x86/hvm/vmx/vmcs.c
+++ b/xen/arch/x86/hvm/vmx/vmcs.c
@@ -1157,6 +1157,10 @@ static int construct_vmcs(struct vcpu *v)
         __vmwrite(PLE_WINDOW, ple_window);
     }
 
+    if ( !has_assisted_xapic(d) )
+        v->arch.hvm.vmx.secondary_exec_control &=
+            ~SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES;
+
     if ( cpu_has_vmx_secondary_exec_control )
         __vmwrite(SECONDARY_VM_EXEC_CONTROL,
                   v->arch.hvm.vmx.secondary_exec_control);
diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
index c075370f64..949ddd684c 100644
--- a/xen/arch/x86/hvm/vmx/vmx.c
+++ b/xen/arch/x86/hvm/vmx/vmx.c
@@ -3344,16 +3344,11 @@ static void vmx_install_vlapic_mapping(struct vcpu *v)
 
 void vmx_vlapic_msr_changed(struct vcpu *v)
 {
-    int virtualize_x2apic_mode;
     struct vlapic *vlapic = vcpu_vlapic(v);
     unsigned int msr;
 
-    virtualize_x2apic_mode = ( (cpu_has_vmx_apic_reg_virt ||
-                                cpu_has_vmx_virtual_intr_delivery) &&
-                               cpu_has_vmx_virtualize_x2apic_mode );
-
-    if ( !cpu_has_vmx_virtualize_apic_accesses &&
-         !virtualize_x2apic_mode )
+    if ( !has_assisted_xapic(v->domain) &&
+         !has_assisted_x2apic(v->domain) )
         return;
 
     vmx_vmcs_enter(v);
@@ -3363,7 +3358,7 @@ void vmx_vlapic_msr_changed(struct vcpu *v)
     if ( !vlapic_hw_disabled(vlapic) &&
          (vlapic_base_address(vlapic) == APIC_DEFAULT_PHYS_BASE) )
     {
-        if ( virtualize_x2apic_mode && vlapic_x2apic_mode(vlapic) )
+        if ( has_assisted_x2apic(v->domain) && vlapic_x2apic_mode(vlapic) )
         {
             v->arch.hvm.vmx.secondary_exec_control |=
                 SECONDARY_EXEC_VIRTUALIZE_X2APIC_MODE;
@@ -3384,7 +3379,7 @@ void vmx_vlapic_msr_changed(struct vcpu *v)
                 vmx_clear_msr_intercept(v, MSR_X2APIC_SELF, VMX_MSR_W);
             }
         }
-        else
+        else if ( has_assisted_xapic(v->domain) )
             v->arch.hvm.vmx.secondary_exec_control |=
                 SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES;
     }
diff --git a/xen/arch/x86/include/asm/hvm/domain.h b/xen/arch/x86/include/asm/hvm/domain.h
index 698455444e..92bf53483c 100644
--- a/xen/arch/x86/include/asm/hvm/domain.h
+++ b/xen/arch/x86/include/asm/hvm/domain.h
@@ -117,6 +117,12 @@ struct hvm_domain {
 
     bool                   is_s3_suspended;
 
+    /* xAPIC hardware assisted virtualization. */
+    bool                   assisted_xapic;
+
+    /* x2APIC hardware assisted virtualization. */
+    bool                   assisted_x2apic;
+
     /* hypervisor intercepted msix table */
     struct list_head       msixtbl_list;
 
diff --git a/xen/arch/x86/include/asm/hvm/hvm.h b/xen/arch/x86/include/asm/hvm/hvm.h
index e0d9348878..6ecbe22cc9 100644
--- a/xen/arch/x86/include/asm/hvm/hvm.h
+++ b/xen/arch/x86/include/asm/hvm/hvm.h
@@ -376,6 +376,9 @@ int hvm_get_param(struct domain *d, uint32_t index, uint64_t *value);
 extern bool assisted_xapic_available;
 extern bool assisted_x2apic_available;
 
+#define has_assisted_xapic(d) ((d)->arch.hvm.assisted_xapic)
+#define has_assisted_x2apic(d) ((d)->arch.hvm.assisted_x2apic)
+
 #define hvm_get_guest_time(v) hvm_get_guest_time_fixed(v, 0)
 
 #define hvm_paging_enabled(v) \
@@ -878,6 +881,8 @@ static inline void hvm_set_reg(struct vcpu *v, unsigned int reg, uint64_t val)
 #define assisted_xapic_available false
 #define assisted_x2apic_available false
 
+#define has_assisted_xapic(d) ((void)(d), false)
+#define has_assisted_x2apic(d) ((void)(d), false)
 #define hvm_paging_enabled(v) ((void)(v), false)
 #define hvm_wp_enabled(v) ((void)(v), false)
 #define hvm_pcid_enabled(v) ((void)(v), false)
diff --git a/xen/arch/x86/traps.c b/xen/arch/x86/traps.c
index a2278d9499..a8dba88916 100644
--- a/xen/arch/x86/traps.c
+++ b/xen/arch/x86/traps.c
@@ -1121,7 +1121,8 @@ void cpuid_hypervisor_leaves(const struct vcpu *v, uint32_t leaf,
         if ( !is_hvm_domain(d) || subleaf != 0 )
             break;
 
-        if ( cpu_has_vmx_apic_reg_virt )
+        if ( cpu_has_vmx_apic_reg_virt &&
+             has_assisted_xapic(d) )
             res->a |= XEN_HVM_CPUID_APIC_ACCESS_VIRT;
 
         /*
@@ -1130,7 +1131,7 @@ void cpuid_hypervisor_leaves(const struct vcpu *v, uint32_t leaf,
          * and wrmsr in the guest will run without VMEXITs (see
          * vmx_vlapic_msr_changed()).
          */
-        if ( cpu_has_vmx_virtualize_x2apic_mode &&
+        if ( has_assisted_x2apic(d) &&
              cpu_has_vmx_apic_reg_virt &&
              cpu_has_vmx_virtual_intr_delivery )
             res->a |= XEN_HVM_CPUID_X2APIC_VIRT;
diff --git a/xen/include/public/arch-x86/xen.h b/xen/include/public/arch-x86/xen.h
index 7acd94c8eb..9da32c6239 100644
--- a/xen/include/public/arch-x86/xen.h
+++ b/xen/include/public/arch-x86/xen.h
@@ -317,6 +317,8 @@ struct xen_arch_domainconfig {
  * doesn't allow the guest to read or write to the underlying MSR.
  */
 #define XEN_X86_MSR_RELAXED (1u << 0)
+#define XEN_X86_ASSISTED_XAPIC (1u << 1)
+#define XEN_X86_ASSISTED_X2APIC (1u << 2)
     uint32_t misc_flags;
 };
 
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 15:10:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 15:10:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289139.490542 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSgty-0003Jd-Is; Fri, 11 Mar 2022 15:09:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289139.490542; Fri, 11 Mar 2022 15:09:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSgty-0003JW-Fl; Fri, 11 Mar 2022 15:09:58 +0000
Received: by outflank-mailman (input) for mailman id 289139;
 Fri, 11 Mar 2022 15:09:57 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3p0I=TW=citrix.com=prvs=06245b39f=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nSgtx-0003JE-21
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 15:09:57 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4e5aac9f-a14d-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 16:09:55 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4e5aac9f-a14d-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647011395;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=5QfmejG/hFxU6elea9FKxA+jplT5zSanP1PZrhU7IKg=;
  b=acIvprps86UatS70fyvUTOfeDvccSL4dZief0p9Ihd5WQf7sdMdSpioz
   e8zRTB1rzbg1ChM2qHf+zOZ+UoyqqjN2L9Sc/VN9KEfKs11ZZ8Z5cQqyW
   +jwF+BAHgotgFLi/cytkvDIHKVro7KAleq3TVFRVvNwaksF6b8tXRCRk3
   c=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 68379949
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:6vvL86s17RBF+c86pLIlpEkB9ufnVOdeMUV32f8akzHdYApBsoF/q
 tZmKW6OP6nbYWfyKd4la9yyoEJTsMPQzNc3GgFv/ChhQ3tH+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jU4
 IuoyyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi8pEaaLtc4aSSJqDn1DNvMb47XAGGKG5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvllCxDfUS9MvRZnHSqPHzdRZwC0xloZFGvO2i
 88xN2o0M0WRP0wn1lE/LJkcoPeOrXXFTGcBhE/Ji7ds6krv01kkuFTqGIWMIYHbLSlPpW6mo
 WbB83X8EwstHtWVwjqY8VqhnubK2yj8Xeo6D6ak//RnhFmSwG07CxAMU1a/5/6jhSaWUd9FN
 1Yd/CZoqKEo7VGqVfH0RRj+q3mB1jYfVsRRFasm6QiL4qvS/wudQGMDS1ZpasEg8sk/RjUo1
 1qAt9LvGTFr9raSTBq16bO8vT60fy8PIgcqdSICCAcI/dTniIUylQ7UCMZuFravid/4Ei22x
 CqFxAA8iK8UltUjzLig8BbMhDfEjprUSg844C3HU2Tj6Rl2DKanbYG17VnQ7d5bMZ2UCFKGu
 RA5d9O2tb5US8vXzWrUHbtLTOrBC+u53CP0gXFkWLQL8C6WyWP/QIsOvSp0I35zC5NREdP2W
 3P7tQRU7Z5VGXKla65rfo68Y/gXIbjc+cfNDa6NMIcXCnRlXErepXw1OxbMt4z4uBV0yckC1
 YGnndFA5JrwIYBu13KISugUytfHLQhulDqIFfgXI/lKuIdyhUJ5q59ZYTNijchjtctoRTk5F
 f4GZqNmLD0FDIXDjtH/q9J7ELzzBSFT6WrKg8JWbPWfBQFtBXssDfTcqZt4JdA7zv8KybeQp
 ijjMqO99LYZrSSWQeltQio+AI4DoL4l9S5rVcDSFQrAN4cfjXaHs/5EKspfkUgP/+1/1/9kJ
 8TpiO3basmjvg/vomxHBbGk9dQKXE3y2WqmYnr0CBBiLsUIb1GYpbfZkv7HqXBm4tyf7pBl/
 dVNF2rzHPI+euiVJJ2POaz1kA/p4yR1dSAbdxKgH+S/sX7EqeBCAyfwkuU2M4cLLxDCzSGdz
 AGYHVETouylnmP/2IOhaXysx2txL9ZDIw==
IronPort-HdrOrdr: A9a23:cdCYLaxmgXhLNn4eGnwLKrPxgeskLtp133Aq2lEZdPULSKOlfp
 GV8MjziyWYtN9IYgBcpTiBUJPwJE81bfZOkMYs1MSZLXXbUQyTXc9fBOrZsnHd8kjFmNK1up
 0QCpSWZOeAbmSSyPyKmjVQcOxQgeVvkprY/ds2pk0FJWoBCsFdBkVCe32m+yVNNVJ77PECZf
 6hD7981lydkAMsH6OG7xc+Lor+juyOsKijTQ8NBhYh5gXLpyiv8qTGHx+R2Qpbey9TwJ85mF
 K10zDR1+GGibWW2xXc32jc49B9g9360OZOA8SKl4w8NijssAC1f45sMofy/wzd4dvfqmrCou
 O85yvIDP4DrE85uVvF5ycF7jOQlQrGLUWSkGNwz0GT+fARDwhKdPapzbgpDCcxrXBQ5u2UmZ
 g7rl6xpt5ZCwjNkz/64MWNXxZ2llCsqX5niuILiWdDOLFuI4O5ArZviX+9Pa1wVR4S0rpXWN
 WGzfuskMp+YBefdTTUr2NvyNujUjA6GQqHWFELvoiQ3yJNlH50wkMEzIhH901wua4VWt1B/a
 DJI65onLZBQosfar98Hv4IRY+yBnbWSRzBPWqOKRDsFb0BOXjKt5nriY9Frt2CadgN1t8/iZ
 7BWFRXuSo7fF/vE9SH2NlR/hXEUAyGLELQIwFllu9EU5HHNcnW2He4OSATeuOb0ociPvE=
X-IronPort-AV: E=Sophos;i="5.90,174,1643691600"; 
   d="scan'208";a="68379949"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=fohVDD1BeulLuQhIZcDJ2RWGmdnqiYa1TKD3BByarW8X9mpdedKEdtdgrlM6QDABVhhi3XtBX0km7i8/dKPZEAHxkjeyBXQHTNLp/fS9cVdNmP0bISl57u5hs0QHWwq2jrpYMRuQSEmSmt3bHZm3gssnNhlD3GBRbnJgzpXdGuMdti7adI0csq2VB0y60EhsNZfC4+0jS4zw/zYQvkSBeL2IbjoeiBgOkYtRMAxBWORs8LcM0T4KoGLOa0heY8+zNFkp8JE+zmwDIvrQ2XQWp8mHe7PELZksmS/OYu/k6vO4U9grmiExxolOakOJjPjz6XhRpdj5qqyMotLlOq8lVA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=5QfmejG/hFxU6elea9FKxA+jplT5zSanP1PZrhU7IKg=;
 b=Qi/P0Qm5siX1KW18kwxOVk2Z63vgKilIur8J8fCiY7hs7jMlt1xqH2DNAhtZOUKGhixP7QnF7mMfC+fZehMnXXWCUiydyAFkhjW6tmGzZj9NFaPKyewKXUCPzhCcsAUAOjaXBcK9Pz9MdgmLCeAL9q446E76Ubx0/IYTouTxl6aj15r1/7XwtNabXng84BAK4ftyK01CByL4TW1Z6BPMhnMBUQ0JMRLjp8kGQ5SzS4Bknrs/kQu0JAyi9IcC7bnf2InSU77Vqvyiwrbhn+M24alq0UkFgvXlexpgl7K+UrakVkE/40/Ivo76kdbwH+Csv5OZ/MnroYJLmWXkRhrxSw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=5QfmejG/hFxU6elea9FKxA+jplT5zSanP1PZrhU7IKg=;
 b=YStvbN/5WvVSRf4VWRVpTSjHd2togAfOYM9r92rv32zuI6s8g8wVRyB2tLm3RcNPZ0diZsjMiSY6JE/yte4XxtM7mDEBnFthGKEJPSSdW2vEUDKgIq6IRrjL5tHjOsSqOsYfwzTj41NbQKE5qdCuZMR5z6PZZYnzvF1mfWEuBSo=
From: Jane Malalane <Jane.Malalane@citrix.com>
To: Roger Pau Monne <roger.pau@citrix.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, "Anthony
 Perard" <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, "Andrew
 Cooper" <Andrew.Cooper3@citrix.com>, George Dunlap
	<George.Dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien Grall
	<julien@xen.org>, "Stefano Stabellini" <sstabellini@kernel.org>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian
	<kevin.tian@intel.com>
Subject: Re: [PATCH v6 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Thread-Topic: [PATCH v6 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Thread-Index: AQHYMxKO2Blwl2qLLkWflNBa6+BEmqy23N6AgANxEQA=
Date: Fri, 11 Mar 2022 15:09:48 +0000
Message-ID: <c1f51c0f-b15a-d715-16f7-50abdbbcb5f2@citrix.com>
References: <20220307150609.10662-2-jane.malalane@citrix.com>
 <20220308173118.31490-1-jane.malalane@citrix.com>
 <YiiDIQY11N4hmmhv@Air-de-Roger>
In-Reply-To: <YiiDIQY11N4hmmhv@Air-de-Roger>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: cab4c000-96bd-4ff2-7df7-08da03712f41
x-ms-traffictypediagnostic: PH0PR03MB6573:EE_
x-ld-processed: 335836de-42ef-43a2-b145-348c2ee9ca5b,ExtAddr
x-microsoft-antispam-prvs: <PH0PR03MB65736A5004642D9B5129D34F810C9@PH0PR03MB6573.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM5PR03MB3386.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(54906003)(508600001)(37006003)(316002)(38070700005)(6636002)(38100700002)(31696002)(8676002)(66446008)(82960400001)(64756008)(6862004)(4326008)(66476007)(66556008)(122000001)(86362001)(91956017)(66946007)(76116006)(71200400001)(6486002)(6512007)(31686004)(2906002)(6506007)(53546011)(8936002)(36756003)(26005)(186003)(5660300002)(2616005)(83380400001)(7416002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?L2RzNHFuYVpiR0lGSDRVSU5iTTRUeXVvTEE2cndyeCthZVllNGRBdEFic25V?=
 =?utf-8?B?V3Npb09vWGVkbnhVL2ZOSEsvZUZGeXlwVVc5SHJsRDhnMkRnQmkxMVlEcStV?=
 =?utf-8?B?VkZ3TnhSRHV5N0dwVVVOaGVtUmRlVGhjaW1xRUhLNFdRcEE2ZThzSEp6SytD?=
 =?utf-8?B?QVFWQ091eWdWZGhmQWdwRkVxZFUyQXZpaUp5cEZoSHh1bCtRVGpMeC9IbmFG?=
 =?utf-8?B?Y0hYYlBzYTVTYklaUzRIVlpkblBKNXdSWWZNZXZSR2xQQ0libDF6V3o0bk5E?=
 =?utf-8?B?Y2R1RjFMVDlXa0hqRHN3SU1sbFJEWnF4dFBEN1Q5a0NQTWMrK3RZcHg2L1Ny?=
 =?utf-8?B?cXJESlRidGZUZEZYQXVRSmxzbVRxanBGTWIxNGtYN25jbjU4V1liVnF6VXZF?=
 =?utf-8?B?ekQzNUcwOEZORjhITzlGUWZVYkRHZ041YjFlZVN6VFRuU0hhRnY0d296a0pj?=
 =?utf-8?B?TDh0OTNtL09LMHZsVFNkLzY1SUVzOXFwbkozOVV0NU83eTAzMWdoeHJXRWF0?=
 =?utf-8?B?UkZKMnpCMnFKS1pIM0pxNlFHTlMxQmkxa0RyZno0QVZXUFhOdHVRZENlRVQ4?=
 =?utf-8?B?V3FxL3dKTVVsemlTK3JaeWtFNTBPV2JBc2FFeVUzQWF1cE5zZDlYUTNuUW0r?=
 =?utf-8?B?Q3U3am91RTd4WTlOOFFYTmZ5V1N5M0ZCdFI1QlhXaE8vOUd4Q3hHWE9rQmNP?=
 =?utf-8?B?aXdyZzVFcWFKYmlRL3BZckd0dGsyc3RTQ0tDdHFQUUhrQzgxME1EN1kwdUIz?=
 =?utf-8?B?dUhIYWN2czVUMGVDQzRXb2Q4SXlYbzJuK1ZpYktreGxQT1NrZ0JkeUpieGla?=
 =?utf-8?B?SmdHU3BWWmFrcS9pWWRhRUxHZHZtanR3M3kvUkJ2NWxaT3d4anZWVmRrbmRn?=
 =?utf-8?B?TzNrK0VGWWNNcnZNYmZ3N1Z3Wi9OTXZVWHkyN0pudFpkbHo0NXppR3hHdkl5?=
 =?utf-8?B?a1VPdEZtWE1RM0I0OVkyd1ZRQmJPeS9kNUFxMXR5Qy9WV0FMWEhVT25LamdU?=
 =?utf-8?B?akp5cnRhLzE1UFI1TW9iR3lUV1ZLQm8raWZSM2dLUUltcU1SeUdxamNYK0U5?=
 =?utf-8?B?S0ZWb2NHNmNBOEpYd1hIS0krRWszUGoyWWo1dHlUZHYrSTlodGpIZ3ByR0Fj?=
 =?utf-8?B?OFFqdEZKVFNRWUtXUXRUMVRtaHpmSnlHWi9hb3c4enBwMGlzM2pDSHp5alMr?=
 =?utf-8?B?TWJsKzBIVlgrdzV1OGFFU0JLb1lnT3VLZnRRUXpMZUIyVlNUSmxrUlYvL21E?=
 =?utf-8?B?bytReEdBSW1yTHR6amt6cmxndnRNSzdMdEtSMU9vdmhDY0M1d0VwdnN1QkJU?=
 =?utf-8?B?RGg1bGI5OUlOUWV0RzhJN3ZRQWRxWEZ1Y28zR0JaYUdTNXFjdi9DUnpoeTky?=
 =?utf-8?B?RWtPV3A2Vk91dHFxQ1NiQ0NoalF0RVprKzBEZTRtdEVPSWh4TVZWN2pUZTFJ?=
 =?utf-8?B?dHRNTUZVQzhZaHptTlpSRFo1eVFGU1k1aHd1OGllTlc3ZW54YjAwMy84aVhr?=
 =?utf-8?B?UVNpTDJtV2tqNDdsZ3I2UjJpcHZ2RWVNT1hEN3RaWXlpd2VZY01qSzhKKytr?=
 =?utf-8?B?Y3lxdXJTVjJmVFN4d3ZLRVJSd29MWjhTbVNsUTQ0RzRncmRiUTR5dHU3WlZN?=
 =?utf-8?B?WDU0RnllK0hTc3dDV2E2YWJTeVFySnVrZVUwb0RRVUFoUzFvN3JtaXRwVjBW?=
 =?utf-8?B?dXZROXdOUUhRcUdzUHlBWm9hOWFCWFpDSHIzWHJES3FxcCtsNXladWZ0SVcx?=
 =?utf-8?B?dXYrTGFlVkhKNHhmRzJYQlVoTjFIRzRVM0JUUzd2aWhKM1ZxaTNicmFrNnh4?=
 =?utf-8?B?U3JKSjFkRWlOMHh3SzluaUtuTjZyQ2paV3prb3B1em9iN2xOemg2STBoc0hk?=
 =?utf-8?B?b0NCRks5TlBEZlVLa2dZZHd0SzVMVVhrZ1VXd29Za0tNanpuNWVUZ3NtMi9r?=
 =?utf-8?B?V0hjdFFoQ29aSHdncGhRQVNwY2NxR09pbEpBUFVaVHdIdXpwK0tXaElMMktF?=
 =?utf-8?B?ZlAvS3RqTFl3PT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <BD30B3878408694588733855211FA44E@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM5PR03MB3386.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: cab4c000-96bd-4ff2-7df7-08da03712f41
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Mar 2022 15:09:48.3793
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: QJ/sjtSa/CRx/77lvr8Z4LaIpBpga8eZIvy3/zLPtvRgqZSY+T5erA/AnwaierDzh9CVYw4siJpxarGVu0LN7zBlfrXuCLLhgTsqAS6dnsA=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR03MB6573
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Fri Mar 11 15:19:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 15:19:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289143.490553 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSh3C-0004oQ-Gu; Fri, 11 Mar 2022 15:19:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289143.490553; Fri, 11 Mar 2022 15:19:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSh3C-0004oJ-Dc; Fri, 11 Mar 2022 15:19:30 +0000
Received: by outflank-mailman (input) for mailman id 289143;
 Fri, 11 Mar 2022 15:19:28 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nSh3A-0004oD-RY
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 15:19:28 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSh36-00031n-U5; Fri, 11 Mar 2022 15:19:24 +0000
Received: from 54-240-197-233.amazon.com ([54.240.197.233] helo=[10.95.172.72])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSh36-0004ev-NH; Fri, 11 Mar 2022 15:19:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=RWUxNyPrRvO8H6IBuIUIOdLlraMxNaXzOn/Emb4xGX4=; b=ootR8xZzzbtVUimLCow9Ru8WHa
	opPyWj4QePnYvijXRL307nZU+pFHUugdZnWdhtnlTR+vZy4LqHqQFHVCFsiSQy9J8SY/BZzaJrgH4
	lC0OCB6KjUfzPY3bM9MNHO/Q4ajNuxAU/LZCfBPQxfJO4j04CG7Use0oBnIHXzGKsaZs=;
Message-ID: <5cedf43b-3903-9668-69a0-01b8ba339ba7@xen.org>
Date: Fri, 11 Mar 2022 15:19:22 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH 1/2] ns16550: reject IRQ above nr_irqs
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
Cc: =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?=
 <marmarek@invisiblethingslab.com>, Jan Beulich <jbeulich@suse.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220310143403.50944-1-marmarek@invisiblethingslab.com>
 <7acb2915-5a9d-c1f1-4b7b-2bc6c2055ea3@suse.com>
 <YioddbNor6w/U9ed@Air-de-Roger>
 <53361d65-2bd8-c07b-938c-91b95f2d68ad@suse.com>
 <Yiojgxgd4amSjHog@Air-de-Roger>
 <3055b4a5-2d55-9cf1-1069-8c57208bf0af@xen.org> <YiopXU65pAlnNVNI@mail-itl>
 <d2c63630-6ab3-b4dd-128e-72f871fb9e08@xen.org> <Yisp0Q/cNGbgsO/7@mail-itl>
 <2a5c59ad-2fa5-b668-8bce-0d55e89a4afd@xen.org>
 <Yitk68wpP8HV4od9@Air-de-Roger>
From: Julien Grall <julien@xen.org>
In-Reply-To: <Yitk68wpP8HV4od9@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi Roger,

On 11/03/2022 15:04, Roger Pau Monné wrote:
> On Fri, Mar 11, 2022 at 11:15:13AM +0000, Julien Grall wrote:
>> Hi,
>>
>> On 11/03/2022 10:52, Marek Marczykowski-Górecki wrote:
>>> On Fri, Mar 11, 2022 at 10:23:03AM +0000, Julien Grall wrote:
>>>> Hi Marek,
>>>>
>>>> On 10/03/2022 16:37, Marek Marczykowski-Górecki wrote:
>>>>> On Thu, Mar 10, 2022 at 04:21:50PM +0000, Julien Grall wrote:
>>>>>> Hi,
>>>>>>
>>>>>> On 10/03/2022 16:12, Roger Pau Monné wrote:
>>>>>>> On Thu, Mar 10, 2022 at 05:08:07PM +0100, Jan Beulich wrote:
>>>>>>>> On 10.03.2022 16:47, Roger Pau Monné wrote:
>>>>>>>>> On Thu, Mar 10, 2022 at 04:23:00PM +0100, Jan Beulich wrote:
>>>>>>>>>> On 10.03.2022 15:34, Marek Marczykowski-Górecki wrote:
>>>>>>>>>>> --- a/xen/drivers/char/ns16550.c
>>>>>>>>>>> +++ b/xen/drivers/char/ns16550.c
>>>>>>>>>>> @@ -1221,6 +1221,9 @@ pci_uart_config(struct ns16550 *uart, bool_t skip_amt, unsigned int idx)
>>>>>>>>>>>                                  pci_conf_read8(PCI_SBDF(0, b, d, f),
>>>>>>>>>>>                                                 PCI_INTERRUPT_LINE) : 0;
>>>>>>>>>>> +                if (uart->irq >= nr_irqs)
>>>>>>>>>>> +                    uart->irq = 0;
>>>>>>>>>>
>>>>>>>>>> Don't you mean nr_irqs_gsi here? Also (nit) please add the missing blanks
>>>>>>>>>> immediately inside the parentheses.
>>>>>>>>>
>>>>>>>>> If we use nr_irqs_gsi we will need to make the check x86 only AFAICT.
>>>>>>>>
>>>>>>>> Down the road (when Arm wants to select HAS_PCI) - yes. Not necessarily
>>>>>>>> right away. After all Arm wants to have an equivalent check here then,
>>>>>>>> not merely checking against nr_irqs instead. So putting a conditional
>>>>>>>> here right away would hide the need for putting in place an Arm-specific
>>>>>>>> alternative.
>>>>>>>
>>>>>>> Oh, I always forget Arm doesn't have CONFIG_HAS_PCI enabled just yet.
>>>>>> The PCI code in ns16550.c is gated by CONFIG_HAS_PCI and CONFIG_X86. I am
>>>>>> not sure we will ever see a support for PCI UART card in Xen on Arm.
>>>>>>
>>>>>> However, if it evers happens then neither nr_irqs or nr_irqs_gsi would help
>>>>>> here because from the interrupt controller PoV 0xff may be a valid (GICv2
>>>>>> supports up to 1024 interrupts).
>>>>>>
>>>>>> Is there any reason we can't explicitely check 0xff?
>>>>>
>>>>> That's what my v0.1 did, but Roger suggested nr_irqs. And I agree,
>>>>> because the value is later used (on x86) to access irq_desc array (via
>>>>> irq_to_desc), which has nr_irqs size.
>>>>
>>>> I think it would be better if that check is closer to who access the
>>>> irq_desc. This would be helpful for other users (I am sure this is not the
>>>> only potential place where the IRQ may be wrong). So how about moving it in
>>>> setup_irq()?
>>>
>>> I don't like it, it's rather fragile approach (at least in the current
>>> code base, without some refactor). There are a bunch of places using
>>> uart->irq (even if just checking if its -1 or 0) before setup_irq()
>>> call. This includes smp_intr_init(), which is what was the first thing
>>> crashing with 0xff set there.
>>
>> Even if the code is gated with !CONFIG_X86, it sounds wrong to me to have
>> such check in an UART driver. It only prevents us to do an out-of-bound
>> access. There are no guarantee the interrupt will be usable (on Arm 256 is a
>> valid interrupt).
> 
> It's a sanity check of a value we get from the hardware, I don't think
> it's that strange.

I think it is strange because the behavior would be different between 
the architectures. On x86, we would reject the interrupt and poll. On 
Arm, we would accept the interrupt and the UART would be unusable.

> It's mostly similar to doing sanity checks of input
> values we get from users.
I am a bit concerned that we are using an unrelated check (see above
why) to catch the "misconfiguration".

I think it would be good to understand why the interrupt line is 0xff 
and properly fix it. Is it a misconfiguration?  Is it intended to 
indicate "no IRQ"? Can we actually trust the value for the Intel LPSS?

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 15:21:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 15:21:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289147.490563 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSh5I-0006AZ-SH; Fri, 11 Mar 2022 15:21:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289147.490563; Fri, 11 Mar 2022 15:21:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSh5I-0006AS-P6; Fri, 11 Mar 2022 15:21:40 +0000
Received: by outflank-mailman (input) for mailman id 289147;
 Fri, 11 Mar 2022 15:21:38 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3p0I=TW=citrix.com=prvs=06245b39f=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nSh5G-0006AM-Nc
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 15:21:38 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f0d0ae16-a14e-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 16:21:37 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f0d0ae16-a14e-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647012097;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=NQe4qS5MBDdoMjjP8Wzae2ESuncqEPDVU3r+YlHB8x4=;
  b=gm9BMMn9u8X1KhEm7bqzTOGdDbWh9GCb0Vc/khwL1PNnfYEND+GI6htd
   UFTdV0d4rBvcn/cBUuh2KY7m8E3KY/EGUnB83c05qN1TPmT+aM9EoKyUa
   6Di9bk/aWZFpe//NNBND1QwtJue7FRMfaf+21gHGdalg6Ap2Gcavd0VpU
   o=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 65495651
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:ZM3aPq+ozGdccQ8euuRADrUD5H6TJUtcMsCJ2f8bNWPcYEJGY0x3n
 WIdUT3SOf+DZmH9fN90a4mz8h4D6MSBnYBqGQs9pH08E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oHgW1nlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnb3hZCMSEJbKpKcMCDZpK3pBAPUd/IaSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFKEWvHwm6DjdBPIvR53rSKTW/95Imjw3g6iiGN6AO
 pZINGQyNXwsZTV9I14SEa4zzdyzm1f8WhQI92PPn4oOtj27IAtZj+G2bYu9lsaxbdVYmAOUq
 3zL+0z9AwoGL5qPxDyd6HWui+TT2yThV+ov+KaQr6AwxgfJnypKVUNQBQDTTeSFZlCWeoNyD
 3c6wSwS7rlp232TFebAB0a8mSvR1vIDYOZ4H+o/4QCL76Pb5QeFG2QJJgJ8hMwaWNweHmJzi
 ALQ9z/9LXk26eDOFyrBnluBhW7qYUAowXk+iTjopOfvy/3qu8kNgx3GVb6P+4bl34SuSVkcL
 91nxRXSZon/b+ZXhs1XHnid2lpAQ6QlqCZst207uUr/smtEiHaNPdDA1LQixa8owHylZleAp
 mMYvMOV8foDC5qA/ATUHrlTTer2uKbdaGSC6bKKI3XH3238k5JEVdoNiAyS2W8zappUEdMXS
 BO7VfxtCG97YyLxMP4fj3OZAMU216nwfekJpdiPBueilqNZLVfdlAk3PBb49zm0zCAEzPFuU
 b/GIJ3EJStLVsxaIM+eGr51PUkDnXtlmws+hPnTknya7FZpTCXMGOlfbwfWMLxRAWHtiFy9z
 uuz/vCik313ONASqAGNmWLPBTjm9UQGOK0=
IronPort-HdrOrdr: A9a23:VWSb3a1K3avTTYQsEvGGCgqjBL4kLtp133Aq2lEZdPRUGvb3qy
 nIpoV96faUskd0ZJhOo7C90cW7LU80lqQFhLX5X43SPzUO0VHAROoJgLcKqweQfREWndQ96U
 4PScdD4aXLfDpHsfo=
X-IronPort-AV: E=Sophos;i="5.90,174,1643691600"; 
   d="scan'208";a="65495651"
From: Jane Malalane <jane.malalane@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Jane Malalane <jane.malalane@citrix.com>
Subject: [PATCH v7 0/2] xen: Report and use hardware APIC virtualization capabilities
Date: Fri, 11 Mar 2022 15:21:05 +0000
Message-ID: <20220311152107.2918-1-jane.malalane@citrix.com>
X-Mailer: git-send-email 2.11.0
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

Jane Malalane (2):
  xen+tools: Report Interrupt Controller Virtualization capabilities on
    x86
  x86/xen: Allow per-domain usage of hardware virtualized APIC

 docs/man/xl.cfg.5.pod.in              | 15 ++++++++++++++
 docs/man/xl.conf.5.pod.in             | 12 +++++++++++
 tools/golang/xenlight/helpers.gen.go  | 16 ++++++++++++++
 tools/golang/xenlight/types.gen.go    |  4 ++++
 tools/include/libxl.h                 | 14 +++++++++++++
 tools/libs/light/libxl.c              |  3 +++
 tools/libs/light/libxl_arch.h         |  9 ++++++--
 tools/libs/light/libxl_arm.c          | 14 ++++++++++---
 tools/libs/light/libxl_create.c       | 22 ++++++++++++--------
 tools/libs/light/libxl_types.idl      |  4 ++++
 tools/libs/light/libxl_x86.c          | 39 +++++++++++++++++++++++++++++++++--
 tools/ocaml/libs/xc/xenctrl.ml        |  7 +++++++
 tools/ocaml/libs/xc/xenctrl.mli       |  7 +++++++
 tools/ocaml/libs/xc/xenctrl_stubs.c   | 17 ++++++++++++---
 tools/xl/xl.c                         |  8 +++++++
 tools/xl/xl.h                         |  2 ++
 tools/xl/xl_info.c                    |  6 ++++--
 tools/xl/xl_parse.c                   | 16 ++++++++++++++
 xen/arch/x86/domain.c                 | 29 +++++++++++++++++++++++++-
 xen/arch/x86/hvm/hvm.c                |  3 +++
 xen/arch/x86/hvm/vmx/vmcs.c           | 13 ++++++++++++
 xen/arch/x86/hvm/vmx/vmx.c            | 13 ++++--------
 xen/arch/x86/include/asm/hvm/domain.h |  6 ++++++
 xen/arch/x86/include/asm/hvm/hvm.h    | 10 +++++++++
 xen/arch/x86/sysctl.c                 |  4 ++++
 xen/arch/x86/traps.c                  |  5 +++--
 xen/include/public/arch-x86/xen.h     |  2 ++
 xen/include/public/sysctl.h           | 11 +++++++++-
 28 files changed, 277 insertions(+), 34 deletions(-)

-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 15:21:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 15:21:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289148.490574 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSh5V-0006W0-46; Fri, 11 Mar 2022 15:21:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289148.490574; Fri, 11 Mar 2022 15:21:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSh5V-0006Vp-0t; Fri, 11 Mar 2022 15:21:53 +0000
Received: by outflank-mailman (input) for mailman id 289148;
 Fri, 11 Mar 2022 15:21:52 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3p0I=TW=citrix.com=prvs=06245b39f=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nSh5U-0006Us-9x
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 15:21:52 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f7d3a09e-a14e-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 16:21:49 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f7d3a09e-a14e-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647012109;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=zUZlcj5OcIYc952rlMvhxXnxE1SjvwPbkDM5ybal+Rc=;
  b=dUNBWg7bQRVuLz0HdoyZB+hLWfJY5VXhQpbWW/5JaCkBjWXqYByufQ4b
   1NMqzaFuHVvKL4cAvBdDmQWds4xbqx+WX3i1ioRncy+1Q6YMwpX5TnWDw
   iq25SpSAjIsIKFBLrhKE2Aj+VEGQz9Q82Mae40a4V8vQGXGOyjZYnb42M
   8=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 66031307
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:G7fA366bN4Ll75o2sf2AUAxRtNvHchMFZxGqfqrLsTDasY5as4F+v
 jBJCziDafyCNGSmfIgiPY6+o00AvsSEyYUxGQc/pSg2Hi5G8cbLO4+Ufxz6V8+wwmwvb67FA
 +E2MISowBUcFyeEzvuVGuG96yE6j8lkf5KkYAL+EnkZqTRMFWFw0XqPp8Zj2tQy2YPgWlvX0
 T/Pi5a31GGNimYc3l08s8pvmDs31BglkGpF1rCWTakjUG72zxH5PrpGTU2CByKQrr1vNvy7X
 47+IISRpQs1yfuP5uSNyd4XemVSKlLb0JPnZnB+A8BOiTAazsA+PzpS2FPxpi67hh3Q9+2dx
 umhurScczs4Lrbukd8EShsCL2J0H/J9qJrYdC3XXcy7lyUqclPpyvRqSko3IZcZ6qB8BmQmG
 f4wcW5XKErZ3qTvnez9GrIEascLdaEHOKs9s3dtixTQCf8iSJbOa67L+cVZzHE7gcUm8fP2O
 ZRBMmM0NEuojxtnNxQcU48czNeRjHD6VR9K90+fgbcc2j2GpOB2+Oe0a4eEEjCQfu1OhVqRr
 G/C+2X/AzkZOcaZxD7D9Wij7sfNgCf6VYQ6BLC+sPlwjzW7+GsXDxEHUEqhltOwgEW+RtF3J
 lQd/2wlqq1a3ECiUNTVRRCzp3+A+BkGVLJ4EeIg7xqW4rHJ+AvfDW8BJhZRZdpjuMIoSDgC0
 l6Sg8ivFTFpqKeSS3+W6vGTtzzaETcRBX8PY2kDVwRty9vprZw3jxnPZs1+C6PzhdrwcQwc2
 BjT8nJ43e9Ky5dWiePrpjgrng5AuLDldDIk9h71V1m89wEjWM2vRdOTuX3EuKMowJmicnGNu
 30Nms675e8IDI2QmCHlfNjhDI1F9N7ebmSC3AcH840Jsm30piX9Jdw4DCRWeR8xWvvobwMFd
 6M6Vel5wJZIdEWnYqZsC25aI5R7lPOwfTgJux29UzavXnSTXFPWlM2NTRTJt4wIrKTKufhuU
 Xt8WZzwZUv28Yw9kFKLqx41iNfHPBwWy2LJXozcxB+6y7eYb3P9Ye5bbAXfNb9mvPvc+Vu9H
 zNj2y2ikkQ3vArWOHS/zGLuBQpScShT6W7e96S7idJv0iI5QTp8Wpc9MJsqepB/nrQ9qws71
 irVZ6Os83Km3SevAVzTMhhLMeqzNb4i/SNTFXF9Zj6Ahil8CbtDGY9CLvPbi5F8r7c9pRO1J
 tFYE/i97gNnEW2WpW5CMcGj8OSPtn2D3GqzAsZsWxBnF7YIeuAD0oSMktfHnMXWMheKiA==
IronPort-HdrOrdr: A9a23:9aZUo6yuwL6DQKEB9zoRKrPw3L1zdoMgy1knxilNoHxuH/Bw9v
 re+8jzsCWftN9/Yh4dcLy7VpVoBEmslqKdgrNhWYtKPjOHhILAFugLgbcKgQeQeREWntQ36U
 4KSdkaNDSfNzlHZcaR2njFLz4jquP3j5xBU43lvglQpQIBUdAQ0+9gYDzrdHGf3GN9dOAE/J
 z33Ls/mxOQPU45Q+6cHXc/U+3Kt7Tw5e/biU5vPW9e1OGW5wnYk4LHLw==
X-IronPort-AV: E=Sophos;i="5.90,174,1643691600"; 
   d="scan'208";a="66031307"
From: Jane Malalane <jane.malalane@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Jane Malalane <jane.malalane@citrix.com>, Wei Liu <wl@xen.org>, "Anthony
 PERARD" <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien Grall
	<julien@xen.org>, "Stefano Stabellini" <sstabellini@kernel.org>, Christian
 Lindig <christian.lindig@citrix.com>, David Scott <dave@recoil.org>,
	"Volodymyr Babchuk" <Volodymyr_Babchuk@epam.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>
Subject: [PATCH v7 2/2] x86/xen: Allow per-domain usage of hardware virtualized APIC
Date: Fri, 11 Mar 2022 15:21:07 +0000
Message-ID: <20220311152107.2918-3-jane.malalane@citrix.com>
X-Mailer: git-send-email 2.11.0
In-Reply-To: <20220311152107.2918-1-jane.malalane@citrix.com>
References: <20220311152107.2918-1-jane.malalane@citrix.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

Introduce a new per-domain creation x86 specific flag to
select whether hardware assisted virtualization should be used for
x{2}APIC.

A per-domain option is added to xl in order to select the usage of
x{2}APIC hardware assisted virtualization, as well as a global
configuration option.

Having all APIC interaction exit to Xen for emulation is slow and can
induce much overhead. Hardware can speed up x{2}APIC by decoding the
APIC access and providing a VM exit with a more specific exit reason
than a regular EPT fault or by altogether avoiding a VM exit.

On the other hand, being able to disable x{2}APIC hardware assisted
virtualization can be useful for testing and debugging purposes.

Note: vmx_install_vlapic_mapping doesn't require modifications
regardless of whether the guest has "Virtualize APIC accesses" enabled
or not, i.e., setting the APIC_ACCESS_ADDR VMCS field is fine so long
as virtualize_apic_accesses is supported by the CPU.

Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Jane Malalane <jane.malalane@citrix.com>
---
CC: Wei Liu <wl@xen.org>
CC: Anthony PERARD <anthony.perard@citrix.com>
CC: Juergen Gross <jgross@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>
CC: George Dunlap <george.dunlap@citrix.com>
CC: Jan Beulich <jbeulich@suse.com>
CC: Julien Grall <julien@xen.org>
CC: Stefano Stabellini <sstabellini@kernel.org>
CC: Christian Lindig <christian.lindig@citrix.com>
CC: David Scott <dave@recoil.org>
CC: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
CC: "Roger Pau Monné" <roger.pau@citrix.com>

v7:
 * Fix void return in libxl__arch_domain_build_info_setdefault
 * Fix style issues
 * Use EINVAL when rejecting assisted_x{2}apic for PV guests and
   ENODEV otherwise, when assisted_x{2}apic isn't supported
 * Define has_assisted_x{2}apic macros for when !CONFIG_HVM
 * Replace "EPT" fault reference with "p2m" fault since the former is
   Intel-specific

v6:
 * Use ENODEV instead of EINVAL when rejecting assisted_x{2}apic
   for PV guests
 * Move has_assisted_x{2}apic macros out of an Intel specific header
 * Remove references to Intel specific features in documentation

v5:
 * Revert v4 changes in vmx_vlapic_msr_changed(), preserving the use of
   the has_assisted_x{2}apic macros
 * Following changes in assisted_x{2}apic_available definitions in
   patch 1, retighten conditionals for setting
   XEN_HVM_CPUID_APIC_ACCESS_VIRT and XEN_HVM_CPUID_X2APIC_VIRT in
   cpuid_hypervisor_leaves()

v4:
 * Add has_assisted_x{2}apic macros and use them where appropriate
 * Replace CPU checks with per-domain assisted_x{2}apic control
   options in vmx_vlapic_msr_changed() and cpuid_hypervisor_leaves(),
   following edits to assisted_x{2}apic_available definitions in
   patch 1
   Note: new assisted_x{2}apic_available definitions make later
   cpu_has_vmx_apic_reg_virt and cpu_has_vmx_virtual_intr_delivery
   checks redundant in vmx_vlapic_msr_changed()

v3:
 * Change info in xl.cfg to better express reality and fix
   capitalization of x{2}apic
 * Move "physinfo" variable definition to the beggining of
   libxl__domain_build_info_setdefault()
 * Reposition brackets in if statement to match libxl coding style
 * Shorten logic in libxl__arch_domain_build_info_setdefault()
 * Correct dprintk message in arch_sanitise_domain_config()
 * Make appropriate changes in vmx_vlapic_msr_changed() and
   cpuid_hypervisor_leaves() for amended "assisted_x2apic" bit
 * Remove unneeded parantheses

v2:
 * Add a LIBXL_HAVE_ASSISTED_APIC macro
 * Pass xcpyshinfo as a pointer in libxl__arch_get_physinfo
 * Add a return statement in now "int"
   libxl__arch_domain_build_info_setdefault()
 * Preserve libxl__arch_domain_build_info_setdefault 's location in
   libxl_create.c
 * Correct x{2}apic default setting logic in
   libxl__arch_domain_prepare_config()
 * Correct logic for parsing assisted_x{2}apic host/guest options in
   xl_parse.c and initialize them to -1 in xl.c
 * Use guest options directly in vmx_vlapic_msr_changed
 * Fix indentation of bool assisted_x{2}apic in struct hvm_domain
 * Add a change in xenctrl_stubs.c to pass xenctrl ABI checks
---
 docs/man/xl.cfg.5.pod.in              | 15 +++++++++++++++
 docs/man/xl.conf.5.pod.in             | 12 ++++++++++++
 tools/golang/xenlight/helpers.gen.go  | 12 ++++++++++++
 tools/golang/xenlight/types.gen.go    |  2 ++
 tools/include/libxl.h                 |  7 +++++++
 tools/libs/light/libxl_arch.h         |  5 +++--
 tools/libs/light/libxl_arm.c          |  9 ++++++---
 tools/libs/light/libxl_create.c       | 22 +++++++++++++---------
 tools/libs/light/libxl_types.idl      |  2 ++
 tools/libs/light/libxl_x86.c          | 28 ++++++++++++++++++++++++++--
 tools/ocaml/libs/xc/xenctrl.ml        |  2 ++
 tools/ocaml/libs/xc/xenctrl.mli       |  2 ++
 tools/ocaml/libs/xc/xenctrl_stubs.c   |  2 +-
 tools/xl/xl.c                         |  8 ++++++++
 tools/xl/xl.h                         |  2 ++
 tools/xl/xl_parse.c                   | 16 ++++++++++++++++
 xen/arch/x86/domain.c                 | 29 ++++++++++++++++++++++++++++-
 xen/arch/x86/hvm/vmx/vmcs.c           |  4 ++++
 xen/arch/x86/hvm/vmx/vmx.c            | 13 ++++---------
 xen/arch/x86/include/asm/hvm/domain.h |  6 ++++++
 xen/arch/x86/include/asm/hvm/hvm.h    |  5 +++++
 xen/arch/x86/traps.c                  |  5 +++--
 xen/include/public/arch-x86/xen.h     |  2 ++
 23 files changed, 181 insertions(+), 29 deletions(-)

diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in
index b98d161398..6d98d73d76 100644
--- a/docs/man/xl.cfg.5.pod.in
+++ b/docs/man/xl.cfg.5.pod.in
@@ -1862,6 +1862,21 @@ firmware tables when using certain older guest Operating
 Systems. These tables have been superseded by newer constructs within
 the ACPI tables.
 
+=item B<assisted_xapic=BOOLEAN>
+
+B<(x86 only)> Enables or disables hardware assisted virtualization for
+xAPIC. With this option enabled, a memory-mapped APIC access will be
+decoded by hardware and either issue a more specific VM exit than just
+a p2m fault, or altogether avoid a VM exit. The
+default is settable via L<xl.conf(5)>.
+
+=item B<assisted_x2apic=BOOLEAN>
+
+B<(x86 only)> Enables or disables hardware assisted virtualization for
+x2APIC. With this option enabled, certain accesses to MSR APIC
+registers will avoid a VM exit into the hypervisor. The default is
+settable via L<xl.conf(5)>.
+
 =item B<nx=BOOLEAN>
 
 B<(x86 only)> Hides or exposes the No-eXecute capability. This allows a guest
diff --git a/docs/man/xl.conf.5.pod.in b/docs/man/xl.conf.5.pod.in
index df20c08137..95d136d1ea 100644
--- a/docs/man/xl.conf.5.pod.in
+++ b/docs/man/xl.conf.5.pod.in
@@ -107,6 +107,18 @@ Sets the default value for the C<max_grant_version> domain config value.
 
 Default: maximum grant version supported by the hypervisor.
 
+=item B<assisted_xapic=BOOLEAN>
+
+If enabled, domains will use xAPIC hardware assisted virtualization by default.
+
+Default: enabled if supported.
+
+=item B<assisted_x2apic=BOOLEAN>
+
+If enabled, domains will use x2APIC hardware assisted virtualization by default.
+
+Default: enabled if supported.
+
 =item B<vif.default.script="PATH">
 
 Configures the default hotplug script used by virtual network devices.
diff --git a/tools/golang/xenlight/helpers.gen.go b/tools/golang/xenlight/helpers.gen.go
index dd4e6c9f14..dece545ee0 100644
--- a/tools/golang/xenlight/helpers.gen.go
+++ b/tools/golang/xenlight/helpers.gen.go
@@ -1120,6 +1120,12 @@ x.ArchArm.Vuart = VuartType(xc.arch_arm.vuart)
 if err := x.ArchX86.MsrRelaxed.fromC(&xc.arch_x86.msr_relaxed);err != nil {
 return fmt.Errorf("converting field ArchX86.MsrRelaxed: %v", err)
 }
+if err := x.ArchX86.AssistedXapic.fromC(&xc.arch_x86.assisted_xapic);err != nil {
+return fmt.Errorf("converting field ArchX86.AssistedXapic: %v", err)
+}
+if err := x.ArchX86.AssistedX2Apic.fromC(&xc.arch_x86.assisted_x2apic);err != nil {
+return fmt.Errorf("converting field ArchX86.AssistedX2Apic: %v", err)
+}
 x.Altp2M = Altp2MMode(xc.altp2m)
 x.VmtraceBufKb = int(xc.vmtrace_buf_kb)
 if err := x.Vpmu.fromC(&xc.vpmu);err != nil {
@@ -1605,6 +1611,12 @@ xc.arch_arm.vuart = C.libxl_vuart_type(x.ArchArm.Vuart)
 if err := x.ArchX86.MsrRelaxed.toC(&xc.arch_x86.msr_relaxed); err != nil {
 return fmt.Errorf("converting field ArchX86.MsrRelaxed: %v", err)
 }
+if err := x.ArchX86.AssistedXapic.toC(&xc.arch_x86.assisted_xapic); err != nil {
+return fmt.Errorf("converting field ArchX86.AssistedXapic: %v", err)
+}
+if err := x.ArchX86.AssistedX2Apic.toC(&xc.arch_x86.assisted_x2apic); err != nil {
+return fmt.Errorf("converting field ArchX86.AssistedX2Apic: %v", err)
+}
 xc.altp2m = C.libxl_altp2m_mode(x.Altp2M)
 xc.vmtrace_buf_kb = C.int(x.VmtraceBufKb)
 if err := x.Vpmu.toC(&xc.vpmu); err != nil {
diff --git a/tools/golang/xenlight/types.gen.go b/tools/golang/xenlight/types.gen.go
index 87be46c745..253c9ad93d 100644
--- a/tools/golang/xenlight/types.gen.go
+++ b/tools/golang/xenlight/types.gen.go
@@ -520,6 +520,8 @@ Vuart VuartType
 }
 ArchX86 struct {
 MsrRelaxed Defbool
+AssistedXapic Defbool
+AssistedX2Apic Defbool
 }
 Altp2M Altp2MMode
 VmtraceBufKb int
diff --git a/tools/include/libxl.h b/tools/include/libxl.h
index 94e6355822..cdcccd6d01 100644
--- a/tools/include/libxl.h
+++ b/tools/include/libxl.h
@@ -535,6 +535,13 @@
 #define LIBXL_HAVE_PHYSINFO_ASSISTED_APIC 1
 
 /*
+ * LIBXL_HAVE_ASSISTED_APIC indicates that libxl_domain_build_info has
+ * assisted_xapic and assisted_x2apic fields for enabling hardware
+ * assisted virtualization for x{2}apic per domain.
+ */
+#define LIBXL_HAVE_ASSISTED_APIC 1
+
+/*
  * libxl ABI compatibility
  *
  * The only guarantee which libxl makes regarding ABI compatibility
diff --git a/tools/libs/light/libxl_arch.h b/tools/libs/light/libxl_arch.h
index 207ceac6a1..03b89929e6 100644
--- a/tools/libs/light/libxl_arch.h
+++ b/tools/libs/light/libxl_arch.h
@@ -71,8 +71,9 @@ void libxl__arch_domain_create_info_setdefault(libxl__gc *gc,
                                                libxl_domain_create_info *c_info);
 
 _hidden
-void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
-                                              libxl_domain_build_info *b_info);
+int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
+                                             libxl_domain_build_info *b_info,
+                                             const libxl_physinfo *physinfo);
 
 _hidden
 int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
diff --git a/tools/libs/light/libxl_arm.c b/tools/libs/light/libxl_arm.c
index 39fdca1b49..7dee2afd4b 100644
--- a/tools/libs/light/libxl_arm.c
+++ b/tools/libs/light/libxl_arm.c
@@ -1384,14 +1384,15 @@ void libxl__arch_domain_create_info_setdefault(libxl__gc *gc,
     }
 }
 
-void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
-                                              libxl_domain_build_info *b_info)
+int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
+                                             libxl_domain_build_info *b_info,
+                                             const libxl_physinfo *physinfo)
 {
     /* ACPI is disabled by default */
     libxl_defbool_setdefault(&b_info->acpi, false);
 
     if (b_info->type != LIBXL_DOMAIN_TYPE_PV)
-        return;
+        return 0;
 
     LOG(DEBUG, "Converting build_info to PVH");
 
@@ -1399,6 +1400,8 @@ void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
     memset(&b_info->u, '\0', sizeof(b_info->u));
     b_info->type = LIBXL_DOMAIN_TYPE_INVALID;
     libxl_domain_build_info_init_type(b_info, LIBXL_DOMAIN_TYPE_PVH);
+
+    return 0;
 }
 
 int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
diff --git a/tools/libs/light/libxl_create.c b/tools/libs/light/libxl_create.c
index 15ed021f41..88d08d7277 100644
--- a/tools/libs/light/libxl_create.c
+++ b/tools/libs/light/libxl_create.c
@@ -75,6 +75,7 @@ int libxl__domain_build_info_setdefault(libxl__gc *gc,
                                         libxl_domain_build_info *b_info)
 {
     int i, rc;
+    libxl_physinfo info;
 
     if (b_info->type != LIBXL_DOMAIN_TYPE_HVM &&
         b_info->type != LIBXL_DOMAIN_TYPE_PV &&
@@ -264,7 +265,18 @@ int libxl__domain_build_info_setdefault(libxl__gc *gc,
     if (!b_info->event_channels)
         b_info->event_channels = 1023;
 
-    libxl__arch_domain_build_info_setdefault(gc, b_info);
+    rc = libxl_get_physinfo(CTX, &info);
+    if (rc) {
+        LOG(ERROR, "failed to get hypervisor info");
+        return rc;
+    }
+
+    rc = libxl__arch_domain_build_info_setdefault(gc, b_info, &info);
+    if (rc) {
+        LOG(ERROR, "unable to set domain arch build info defaults");
+        return rc;
+    }
+
     libxl_defbool_setdefault(&b_info->dm_restrict, false);
 
     if (b_info->iommu_memkb == LIBXL_MEMKB_DEFAULT)
@@ -457,14 +469,6 @@ int libxl__domain_build_info_setdefault(libxl__gc *gc,
     }
 
     if (b_info->max_grant_version == LIBXL_MAX_GRANT_DEFAULT) {
-        libxl_physinfo info;
-
-        rc = libxl_get_physinfo(CTX, &info);
-        if (rc) {
-            LOG(ERROR, "failed to get hypervisor info");
-            return rc;
-        }
-
         if (info.cap_gnttab_v2)
             b_info->max_grant_version = 2;
         else if (info.cap_gnttab_v1)
diff --git a/tools/libs/light/libxl_types.idl b/tools/libs/light/libxl_types.idl
index 42ac6c357b..db5eb0a0b3 100644
--- a/tools/libs/light/libxl_types.idl
+++ b/tools/libs/light/libxl_types.idl
@@ -648,6 +648,8 @@ libxl_domain_build_info = Struct("domain_build_info",[
                                ("vuart", libxl_vuart_type),
                               ])),
     ("arch_x86", Struct(None, [("msr_relaxed", libxl_defbool),
+                               ("assisted_xapic", libxl_defbool),
+                               ("assisted_x2apic", libxl_defbool),
                               ])),
     # Alternate p2m is not bound to any architecture or guest type, as it is
     # supported by x86 HVM and ARM support is planned.
diff --git a/tools/libs/light/libxl_x86.c b/tools/libs/light/libxl_x86.c
index e0a06ecfe3..46d4de22d1 100644
--- a/tools/libs/light/libxl_x86.c
+++ b/tools/libs/light/libxl_x86.c
@@ -23,6 +23,15 @@ int libxl__arch_domain_prepare_config(libxl__gc *gc,
     if (libxl_defbool_val(d_config->b_info.arch_x86.msr_relaxed))
         config->arch.misc_flags |= XEN_X86_MSR_RELAXED;
 
+    if (d_config->c_info.type != LIBXL_DOMAIN_TYPE_PV)
+    {
+        if (libxl_defbool_val(d_config->b_info.arch_x86.assisted_xapic))
+            config->arch.misc_flags |= XEN_X86_ASSISTED_XAPIC;
+
+        if (libxl_defbool_val(d_config->b_info.arch_x86.assisted_x2apic))
+            config->arch.misc_flags |= XEN_X86_ASSISTED_X2APIC;
+    }
+
     return 0;
 }
 
@@ -819,11 +828,26 @@ void libxl__arch_domain_create_info_setdefault(libxl__gc *gc,
 {
 }
 
-void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
-                                              libxl_domain_build_info *b_info)
+int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
+                                             libxl_domain_build_info *b_info,
+                                             const libxl_physinfo *physinfo)
 {
     libxl_defbool_setdefault(&b_info->acpi, true);
     libxl_defbool_setdefault(&b_info->arch_x86.msr_relaxed, false);
+
+    if (b_info->type != LIBXL_DOMAIN_TYPE_PV) {
+        libxl_defbool_setdefault(&b_info->arch_x86.assisted_xapic,
+                             physinfo->cap_assisted_xapic);
+        libxl_defbool_setdefault(&b_info->arch_x86.assisted_x2apic,
+                             physinfo->cap_assisted_x2apic);
+    }
+    else if (!libxl_defbool_is_default(b_info->arch_x86.assisted_xapic) ||
+             !libxl_defbool_is_default(b_info->arch_x86.assisted_x2apic)) {
+        LOG(ERROR, "Interrupt Controller Virtualization not supported for PV");
+        return ERROR_INVAL;
+    }
+
+    return 0;
 }
 
 int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
diff --git a/tools/ocaml/libs/xc/xenctrl.ml b/tools/ocaml/libs/xc/xenctrl.ml
index 712456e098..32f3028828 100644
--- a/tools/ocaml/libs/xc/xenctrl.ml
+++ b/tools/ocaml/libs/xc/xenctrl.ml
@@ -50,6 +50,8 @@ type x86_arch_emulation_flags =
 
 type x86_arch_misc_flags =
 	| X86_MSR_RELAXED
+	| X86_ASSISTED_XAPIC
+	| X86_ASSISTED_X2APIC
 
 type xen_x86_arch_domainconfig =
 {
diff --git a/tools/ocaml/libs/xc/xenctrl.mli b/tools/ocaml/libs/xc/xenctrl.mli
index b034434f68..d0fcbc8866 100644
--- a/tools/ocaml/libs/xc/xenctrl.mli
+++ b/tools/ocaml/libs/xc/xenctrl.mli
@@ -44,6 +44,8 @@ type x86_arch_emulation_flags =
 
 type x86_arch_misc_flags =
   | X86_MSR_RELAXED
+  | X86_ASSISTED_XAPIC
+  | X86_ASSISTED_X2APIC
 
 type xen_x86_arch_domainconfig = {
   emulation_flags: x86_arch_emulation_flags list;
diff --git a/tools/ocaml/libs/xc/xenctrl_stubs.c b/tools/ocaml/libs/xc/xenctrl_stubs.c
index 7e9c32ad1b..5df8aaa58f 100644
--- a/tools/ocaml/libs/xc/xenctrl_stubs.c
+++ b/tools/ocaml/libs/xc/xenctrl_stubs.c
@@ -239,7 +239,7 @@ CAMLprim value stub_xc_domain_create(value xch, value wanted_domid, value config
 
 		cfg.arch.misc_flags = ocaml_list_to_c_bitmap
 			/* ! x86_arch_misc_flags X86_ none */
-			/* ! XEN_X86_ XEN_X86_MSR_RELAXED all */
+			/* ! XEN_X86_ XEN_X86_ASSISTED_X2APIC max */
 			(VAL_MISC_FLAGS);
 
 #undef VAL_MISC_FLAGS
diff --git a/tools/xl/xl.c b/tools/xl/xl.c
index 2d1ec18ea3..31eb223309 100644
--- a/tools/xl/xl.c
+++ b/tools/xl/xl.c
@@ -57,6 +57,8 @@ int max_grant_frames = -1;
 int max_maptrack_frames = -1;
 int max_grant_version = LIBXL_MAX_GRANT_DEFAULT;
 libxl_domid domid_policy = INVALID_DOMID;
+int assisted_xapic = -1;
+int assisted_x2apic = -1;
 
 xentoollog_level minmsglevel = minmsglevel_default;
 
@@ -201,6 +203,12 @@ static void parse_global_config(const char *configfile,
     if (!xlu_cfg_get_long (config, "claim_mode", &l, 0))
         claim_mode = l;
 
+    if (!xlu_cfg_get_long (config, "assisted_xapic", &l, 0))
+        assisted_xapic = l;
+
+    if (!xlu_cfg_get_long (config, "assisted_x2apic", &l, 0))
+        assisted_x2apic = l;
+
     xlu_cfg_replace_string (config, "remus.default.netbufscript",
         &default_remus_netbufscript, 0);
     xlu_cfg_replace_string (config, "colo.default.proxyscript",
diff --git a/tools/xl/xl.h b/tools/xl/xl.h
index c5c4bedbdd..528deb3feb 100644
--- a/tools/xl/xl.h
+++ b/tools/xl/xl.h
@@ -286,6 +286,8 @@ extern libxl_bitmap global_vm_affinity_mask;
 extern libxl_bitmap global_hvm_affinity_mask;
 extern libxl_bitmap global_pv_affinity_mask;
 extern libxl_domid domid_policy;
+extern int assisted_xapic;
+extern int assisted_x2apic;
 
 enum output_format {
     OUTPUT_FORMAT_JSON,
diff --git a/tools/xl/xl_parse.c b/tools/xl/xl_parse.c
index 117fcdcb2b..0ab9b145fe 100644
--- a/tools/xl/xl_parse.c
+++ b/tools/xl/xl_parse.c
@@ -1681,6 +1681,22 @@ void parse_config_data(const char *config_source,
         xlu_cfg_get_defbool(config, "vpt_align", &b_info->u.hvm.vpt_align, 0);
         xlu_cfg_get_defbool(config, "apic", &b_info->apic, 0);
 
+        e = xlu_cfg_get_long(config, "assisted_xapic", &l , 0);
+        if ((e == ESRCH && assisted_xapic != -1)) /* use global default if present */
+            libxl_defbool_set(&b_info->arch_x86.assisted_xapic, assisted_xapic);
+        else if (!e)
+            libxl_defbool_set(&b_info->arch_x86.assisted_xapic, l);
+        else
+            exit(1);
+
+        e = xlu_cfg_get_long(config, "assisted_x2apic", &l, 0);
+        if ((e == ESRCH && assisted_x2apic != -1)) /* use global default if present */
+            libxl_defbool_set(&b_info->arch_x86.assisted_x2apic, assisted_x2apic);
+        else if (!e)
+            libxl_defbool_set(&b_info->arch_x86.assisted_x2apic, l);
+        else
+            exit(1);
+
         switch (xlu_cfg_get_list(config, "viridian",
                                  &viridian, &num_viridian, 1))
         {
diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c
index a5048ed654..279936a016 100644
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -50,6 +50,7 @@
 #include <asm/cpuidle.h>
 #include <asm/mpspec.h>
 #include <asm/ldt.h>
+#include <asm/hvm/domain.h>
 #include <asm/hvm/hvm.h>
 #include <asm/hvm/nestedhvm.h>
 #include <asm/hvm/support.h>
@@ -619,6 +620,8 @@ int arch_sanitise_domain_config(struct xen_domctl_createdomain *config)
     bool hvm = config->flags & XEN_DOMCTL_CDF_hvm;
     bool hap = config->flags & XEN_DOMCTL_CDF_hap;
     bool nested_virt = config->flags & XEN_DOMCTL_CDF_nested_virt;
+    bool assisted_xapic = config->arch.misc_flags & XEN_X86_ASSISTED_XAPIC;
+    bool assisted_x2apic = config->arch.misc_flags & XEN_X86_ASSISTED_X2APIC;
     unsigned int max_vcpus;
 
     if ( hvm ? !hvm_enabled : !IS_ENABLED(CONFIG_PV) )
@@ -685,13 +688,31 @@ int arch_sanitise_domain_config(struct xen_domctl_createdomain *config)
         }
     }
 
-    if ( config->arch.misc_flags & ~XEN_X86_MSR_RELAXED )
+    if ( config->arch.misc_flags & ~(XEN_X86_MSR_RELAXED |
+                                     XEN_X86_ASSISTED_XAPIC |
+                                     XEN_X86_ASSISTED_X2APIC) )
     {
         dprintk(XENLOG_INFO, "Invalid arch misc flags %#x\n",
                 config->arch.misc_flags);
         return -EINVAL;
     }
 
+    if ( (assisted_xapic || assisted_x2apic) && !hvm )
+    {
+        dprintk(XENLOG_INFO,
+                "Interrupt Controller Virtualization not supported for PV\n");
+        return -EINVAL;
+    }
+
+    if ( (assisted_xapic && !assisted_xapic_available) ||
+         (assisted_x2apic && !assisted_x2apic_available) )
+    {
+        dprintk(XENLOG_INFO,
+                "Hardware assisted x%sAPIC requested but not available\n",
+                assisted_xapic && !assisted_xapic_available ? "" : "2");
+        return -ENODEV;
+    }
+
     return 0;
 }
 
@@ -864,6 +885,12 @@ int arch_domain_create(struct domain *d,
 
     d->arch.msr_relaxed = config->arch.misc_flags & XEN_X86_MSR_RELAXED;
 
+    d->arch.hvm.assisted_xapic =
+        config->arch.misc_flags & XEN_X86_ASSISTED_XAPIC;
+
+    d->arch.hvm.assisted_x2apic =
+        config->arch.misc_flags & XEN_X86_ASSISTED_X2APIC;
+
     return 0;
 
  fail:
diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
index 77ce0b2121..47c27740d3 100644
--- a/xen/arch/x86/hvm/vmx/vmcs.c
+++ b/xen/arch/x86/hvm/vmx/vmcs.c
@@ -1157,6 +1157,10 @@ static int construct_vmcs(struct vcpu *v)
         __vmwrite(PLE_WINDOW, ple_window);
     }
 
+    if ( !has_assisted_xapic(d) )
+        v->arch.hvm.vmx.secondary_exec_control &=
+            ~SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES;
+
     if ( cpu_has_vmx_secondary_exec_control )
         __vmwrite(SECONDARY_VM_EXEC_CONTROL,
                   v->arch.hvm.vmx.secondary_exec_control);
diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
index c075370f64..949ddd684c 100644
--- a/xen/arch/x86/hvm/vmx/vmx.c
+++ b/xen/arch/x86/hvm/vmx/vmx.c
@@ -3344,16 +3344,11 @@ static void vmx_install_vlapic_mapping(struct vcpu *v)
 
 void vmx_vlapic_msr_changed(struct vcpu *v)
 {
-    int virtualize_x2apic_mode;
     struct vlapic *vlapic = vcpu_vlapic(v);
     unsigned int msr;
 
-    virtualize_x2apic_mode = ( (cpu_has_vmx_apic_reg_virt ||
-                                cpu_has_vmx_virtual_intr_delivery) &&
-                               cpu_has_vmx_virtualize_x2apic_mode );
-
-    if ( !cpu_has_vmx_virtualize_apic_accesses &&
-         !virtualize_x2apic_mode )
+    if ( !has_assisted_xapic(v->domain) &&
+         !has_assisted_x2apic(v->domain) )
         return;
 
     vmx_vmcs_enter(v);
@@ -3363,7 +3358,7 @@ void vmx_vlapic_msr_changed(struct vcpu *v)
     if ( !vlapic_hw_disabled(vlapic) &&
          (vlapic_base_address(vlapic) == APIC_DEFAULT_PHYS_BASE) )
     {
-        if ( virtualize_x2apic_mode && vlapic_x2apic_mode(vlapic) )
+        if ( has_assisted_x2apic(v->domain) && vlapic_x2apic_mode(vlapic) )
         {
             v->arch.hvm.vmx.secondary_exec_control |=
                 SECONDARY_EXEC_VIRTUALIZE_X2APIC_MODE;
@@ -3384,7 +3379,7 @@ void vmx_vlapic_msr_changed(struct vcpu *v)
                 vmx_clear_msr_intercept(v, MSR_X2APIC_SELF, VMX_MSR_W);
             }
         }
-        else
+        else if ( has_assisted_xapic(v->domain) )
             v->arch.hvm.vmx.secondary_exec_control |=
                 SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES;
     }
diff --git a/xen/arch/x86/include/asm/hvm/domain.h b/xen/arch/x86/include/asm/hvm/domain.h
index 698455444e..92bf53483c 100644
--- a/xen/arch/x86/include/asm/hvm/domain.h
+++ b/xen/arch/x86/include/asm/hvm/domain.h
@@ -117,6 +117,12 @@ struct hvm_domain {
 
     bool                   is_s3_suspended;
 
+    /* xAPIC hardware assisted virtualization. */
+    bool                   assisted_xapic;
+
+    /* x2APIC hardware assisted virtualization. */
+    bool                   assisted_x2apic;
+
     /* hypervisor intercepted msix table */
     struct list_head       msixtbl_list;
 
diff --git a/xen/arch/x86/include/asm/hvm/hvm.h b/xen/arch/x86/include/asm/hvm/hvm.h
index e0d9348878..6ecbe22cc9 100644
--- a/xen/arch/x86/include/asm/hvm/hvm.h
+++ b/xen/arch/x86/include/asm/hvm/hvm.h
@@ -376,6 +376,9 @@ int hvm_get_param(struct domain *d, uint32_t index, uint64_t *value);
 extern bool assisted_xapic_available;
 extern bool assisted_x2apic_available;
 
+#define has_assisted_xapic(d) ((d)->arch.hvm.assisted_xapic)
+#define has_assisted_x2apic(d) ((d)->arch.hvm.assisted_x2apic)
+
 #define hvm_get_guest_time(v) hvm_get_guest_time_fixed(v, 0)
 
 #define hvm_paging_enabled(v) \
@@ -878,6 +881,8 @@ static inline void hvm_set_reg(struct vcpu *v, unsigned int reg, uint64_t val)
 #define assisted_xapic_available false
 #define assisted_x2apic_available false
 
+#define has_assisted_xapic(d) ((void)(d), false)
+#define has_assisted_x2apic(d) ((void)(d), false)
 #define hvm_paging_enabled(v) ((void)(v), false)
 #define hvm_wp_enabled(v) ((void)(v), false)
 #define hvm_pcid_enabled(v) ((void)(v), false)
diff --git a/xen/arch/x86/traps.c b/xen/arch/x86/traps.c
index a2278d9499..a8dba88916 100644
--- a/xen/arch/x86/traps.c
+++ b/xen/arch/x86/traps.c
@@ -1121,7 +1121,8 @@ void cpuid_hypervisor_leaves(const struct vcpu *v, uint32_t leaf,
         if ( !is_hvm_domain(d) || subleaf != 0 )
             break;
 
-        if ( cpu_has_vmx_apic_reg_virt )
+        if ( cpu_has_vmx_apic_reg_virt &&
+             has_assisted_xapic(d) )
             res->a |= XEN_HVM_CPUID_APIC_ACCESS_VIRT;
 
         /*
@@ -1130,7 +1131,7 @@ void cpuid_hypervisor_leaves(const struct vcpu *v, uint32_t leaf,
          * and wrmsr in the guest will run without VMEXITs (see
          * vmx_vlapic_msr_changed()).
          */
-        if ( cpu_has_vmx_virtualize_x2apic_mode &&
+        if ( has_assisted_x2apic(d) &&
              cpu_has_vmx_apic_reg_virt &&
              cpu_has_vmx_virtual_intr_delivery )
             res->a |= XEN_HVM_CPUID_X2APIC_VIRT;
diff --git a/xen/include/public/arch-x86/xen.h b/xen/include/public/arch-x86/xen.h
index 7acd94c8eb..9da32c6239 100644
--- a/xen/include/public/arch-x86/xen.h
+++ b/xen/include/public/arch-x86/xen.h
@@ -317,6 +317,8 @@ struct xen_arch_domainconfig {
  * doesn't allow the guest to read or write to the underlying MSR.
  */
 #define XEN_X86_MSR_RELAXED (1u << 0)
+#define XEN_X86_ASSISTED_XAPIC (1u << 1)
+#define XEN_X86_ASSISTED_X2APIC (1u << 2)
     uint32_t misc_flags;
 };
 
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 15:21:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 15:21:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289150.490586 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSh5W-0006o3-Io; Fri, 11 Mar 2022 15:21:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289150.490586; Fri, 11 Mar 2022 15:21:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSh5W-0006n7-Ek; Fri, 11 Mar 2022 15:21:54 +0000
Received: by outflank-mailman (input) for mailman id 289150;
 Fri, 11 Mar 2022 15:21:53 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3p0I=TW=citrix.com=prvs=06245b39f=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nSh5V-0006AM-9U
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 15:21:53 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f8bce061-a14e-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 16:21:51 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f8bce061-a14e-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647012111;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=xFR1X1AGdU5c6vvB51yvPTeo6emGP+lVw3aj9ed8sXE=;
  b=F3PQa/d6T4Wk4mn218yoA7zB/qKyOo86qO4JMcMlXWt6bodiNc74Frt6
   XZEAzf+FzOh+QcN13kiQOeT1QjZdJtm3OMbKaTAgelknkxoa9JabAbAQA
   +k0zRSJNDcJf/SePHE8n4wkwerH9IQCg3uPkPLZxfgdhKWE8G+1bPDeIn
   w=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 66019512
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:rrHs/aBNL5X+xBVW/7Hjw5YqxClBgxIJ4kV8jS/XYbTApDhxhWAGy
 TcWWT3TOK6Ca2anKop1Povi800CsZSHz9ZkQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vg29Yy6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPh61
 sVSs4OgEjwXHaH8xekSUTdIEmJxaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguwBJc/meqYWvnhkxDfUJf0nXYrCU+PB4towMDIY2J4WRKeDP
 pBxhTxHKzOabRZiJxArJ7Vkpvqa3lfcSBNIgQfAzUYwyzeKl1EguFT3C/LrfdiNSdRQj1yvj
 GvM9GTkATkXLNWajzGC9xqEnfTTlCn2XIYTEryQ9fNwhlCXgGsJB3U+X1ahveOwjEL4XttFM
 lEV4QInt610/0uuJvH+UgO5pjiYvxcac9tWD+A+rgqKz8L84RufQG4NTTdDadkvnM4wWTEuk
 FSOmrvBBzN1t6aOYWmA7brSpjS3UQAFIGlHaSIaQA8t59j4vJp1nh/JVsxkEqO+kpvyAz6Y6
 zKAoTU6hr4TpdUWzKj99lfC6xquu5zIQwgd9gjRGGW/4WtRe4qNd4Gur1/B4p59wJ2xFwfb+
 iJewo7Hsb5IXcrleDGxrPslF6+5+PCaIGbnv31jL8Qs+DaD63/gctUFiN1hH3tBPsEBcD7vR
 UbcvwJN+ZNeVEeXgb9Lj5GZUJpzk/W5fTjxfrWNN4cVPMAtHOOS1Hw2PSatM3bRfF/AeE3VE
 bOSao6SAHkTEsyLJxLmFr5GgdfHKs3TrF4/pKwXLTz7gNJyh1bPEN/p1WdiiMhgvctoRy2Pr
 75i2zOikUk3bQEHSnC/HXQvBV4LN2MnIpv9ttZacOWOSiI/Rj1/WqSOnuN5I9U790iwqgsu1
 ijsMqO/4ACi7UAr1C3QMiwzAF8RdcoXQY0H0dwEYg/zhilLjXeH56YDbZonFYTLB8Q4pcOYu
 8ItIp3aatwWE2yv021EMfHV8dwzHDz21FnmF3f0P1ACk2tIGlWhFinMJVC0qkHjz0Of6KMDn
 lFX/liCEMRZGFg6Upq+hTDG5wrZgEXxUdlaByPgSuS/sm2xmGS2A0QdVsMKHvw=
IronPort-HdrOrdr: A9a23:poJxAqrZyok9pi2vn3EHpp8aV5oReYIsimQD101hICG8cqSj9v
 xG+85rrSMc6QxhIU3I9urwW5VoLUmyyXcx2/h0AV7AZniBhILLFvAB0WKK+VSJcEeSmtK1l5
 0QFJSWYOeAdmSS5vyb3ODXKbgdKaG8gcWVuds=
X-IronPort-AV: E=Sophos;i="5.90,174,1643691600"; 
   d="scan'208";a="66019512"
From: Jane Malalane <jane.malalane@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Jane Malalane <jane.malalane@citrix.com>, Wei Liu <wl@xen.org>, "Anthony
 PERARD" <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien Grall
	<julien@xen.org>, "Stefano Stabellini" <sstabellini@kernel.org>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian
	<kevin.tian@intel.com>, =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?=
	<roger.pau@citrix.com>
Subject: [PATCH v7 1/2] xen+tools: Report Interrupt Controller Virtualization capabilities on x86
Date: Fri, 11 Mar 2022 15:21:06 +0000
Message-ID: <20220311152107.2918-2-jane.malalane@citrix.com>
X-Mailer: git-send-email 2.11.0
In-Reply-To: <20220311152107.2918-1-jane.malalane@citrix.com>
References: <20220311152107.2918-1-jane.malalane@citrix.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

Add XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC and
XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC to report accelerated xapic
and x2apic, on x86 hardware.
No such features are currently implemented on AMD hardware.

HW assisted xAPIC virtualization will be reported if HW, at the
minimum, supports virtualize_apic_accesses as this feature alone means
that an access to the APIC page will cause an APIC-access VM exit. An
APIC-access VM exit provides a VMM with information about the access
causing the VM exit, unlike a regular EPT fault, thus simplifying some
internal handling.

HW assisted x2APIC virtualization will be reported if HW supports
virtualize_x2apic_mode and, at least, either apic_reg_virt or
virtual_intr_delivery. This also means that
sysctl follows the conditionals in vmx_vlapic_msr_changed().

For that purpose, also add an arch-specific "capabilities" parameter
to struct xen_sysctl_physinfo.

Note that this interface is intended to be compatible with AMD so that
AVIC support can be introduced in a future patch. Unlike Intel that
has multiple controls for APIC Virtualization, AMD has one global
'AVIC Enable' control bit, so fine-graining of APIC virtualization
control cannot be done on a common interface.

Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Jane Malalane <jane.malalane@citrix.com>
---
CC: Wei Liu <wl@xen.org>
CC: Anthony PERARD <anthony.perard@citrix.com>
CC: Juergen Gross <jgross@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>
CC: George Dunlap <george.dunlap@citrix.com>
CC: Jan Beulich <jbeulich@suse.com>
CC: Julien Grall <julien@xen.org>
CC: Stefano Stabellini <sstabellini@kernel.org>
CC: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
CC: Bertrand Marquis <bertrand.marquis@arm.com>
CC: Jun Nakajima <jun.nakajima@intel.com>
CC: Kevin Tian <kevin.tian@intel.com>
CC: "Roger Pau Monné" <roger.pau@citrix.com>

v7:
 * Make sure assisted_x{2}apic_available evaluates to false, to ensure
   Xen builds, when !CONFIG_HVM
 * Fix coding style issues

v6:
 * Limit abi check to x86
 * Fix coding style issue

v5:
 * Have assisted_xapic_available solely depend on
   cpu_has_vmx_virtualize_apic_accesses and assisted_x2apic_available
   depend on cpu_has_vmx_virtualize_x2apic_mode and
   cpu_has_vmx_apic_reg_virt OR cpu_has_vmx_virtual_intr_delivery

v4:
 * Fallback to the original v2/v1 conditions for setting
   assisted_xapic_available and assisted_x2apic_available so that in
   the future APIC virtualization can be exposed on AMD hardware
   since fine-graining of "AVIC" is not supported, i.e., AMD solely
   uses "AVIC Enable". This also means that sysctl mimics what's
   exposed in CPUID

v3:
 * Define XEN_SYSCTL_PHYSCAP_ARCH_MAX for ABI checking and actually
   set "arch_capbilities", via a call to c_bitmap_to_ocaml_list()
 * Have assisted_x2apic_available only depend on
   cpu_has_vmx_virtualize_x2apic_mode

v2:
 * Use one macro LIBXL_HAVE_PHYSINFO_ASSISTED_APIC instead of two
 * Pass xcpyshinfo as a pointer in libxl__arch_get_physinfo
 * Set assisted_x{2}apic_available to be conditional upon "bsp" and
   annotate it with __ro_after_init
 * Change XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_X{2}APIC to
   _X86_ASSISTED_X{2}APIC
 * Keep XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X{2}APIC contained within
   sysctl.h
 * Fix padding introduced in struct xen_sysctl_physinfo and bump
   XEN_SYSCTL_INTERFACE_VERSION
---
 tools/golang/xenlight/helpers.gen.go |  4 ++++
 tools/golang/xenlight/types.gen.go   |  2 ++
 tools/include/libxl.h                |  7 +++++++
 tools/libs/light/libxl.c             |  3 +++
 tools/libs/light/libxl_arch.h        |  4 ++++
 tools/libs/light/libxl_arm.c         |  5 +++++
 tools/libs/light/libxl_types.idl     |  2 ++
 tools/libs/light/libxl_x86.c         | 11 +++++++++++
 tools/ocaml/libs/xc/xenctrl.ml       |  5 +++++
 tools/ocaml/libs/xc/xenctrl.mli      |  5 +++++
 tools/ocaml/libs/xc/xenctrl_stubs.c  | 15 +++++++++++++--
 tools/xl/xl_info.c                   |  6 ++++--
 xen/arch/x86/hvm/hvm.c               |  3 +++
 xen/arch/x86/hvm/vmx/vmcs.c          |  9 +++++++++
 xen/arch/x86/include/asm/hvm/hvm.h   |  5 +++++
 xen/arch/x86/sysctl.c                |  4 ++++
 xen/include/public/sysctl.h          | 11 ++++++++++-
 17 files changed, 96 insertions(+), 5 deletions(-)

diff --git a/tools/golang/xenlight/helpers.gen.go b/tools/golang/xenlight/helpers.gen.go
index b746ff1081..dd4e6c9f14 100644
--- a/tools/golang/xenlight/helpers.gen.go
+++ b/tools/golang/xenlight/helpers.gen.go
@@ -3373,6 +3373,8 @@ x.CapVmtrace = bool(xc.cap_vmtrace)
 x.CapVpmu = bool(xc.cap_vpmu)
 x.CapGnttabV1 = bool(xc.cap_gnttab_v1)
 x.CapGnttabV2 = bool(xc.cap_gnttab_v2)
+x.CapAssistedXapic = bool(xc.cap_assisted_xapic)
+x.CapAssistedX2Apic = bool(xc.cap_assisted_x2apic)
 
  return nil}
 
@@ -3407,6 +3409,8 @@ xc.cap_vmtrace = C.bool(x.CapVmtrace)
 xc.cap_vpmu = C.bool(x.CapVpmu)
 xc.cap_gnttab_v1 = C.bool(x.CapGnttabV1)
 xc.cap_gnttab_v2 = C.bool(x.CapGnttabV2)
+xc.cap_assisted_xapic = C.bool(x.CapAssistedXapic)
+xc.cap_assisted_x2apic = C.bool(x.CapAssistedX2Apic)
 
  return nil
  }
diff --git a/tools/golang/xenlight/types.gen.go b/tools/golang/xenlight/types.gen.go
index b1e84d5258..87be46c745 100644
--- a/tools/golang/xenlight/types.gen.go
+++ b/tools/golang/xenlight/types.gen.go
@@ -1014,6 +1014,8 @@ CapVmtrace bool
 CapVpmu bool
 CapGnttabV1 bool
 CapGnttabV2 bool
+CapAssistedXapic bool
+CapAssistedX2Apic bool
 }
 
 type Connectorinfo struct {
diff --git a/tools/include/libxl.h b/tools/include/libxl.h
index 51a9b6cfac..94e6355822 100644
--- a/tools/include/libxl.h
+++ b/tools/include/libxl.h
@@ -528,6 +528,13 @@
 #define LIBXL_HAVE_MAX_GRANT_VERSION 1
 
 /*
+ * LIBXL_HAVE_PHYSINFO_ASSISTED_APIC indicates that libxl_physinfo has
+ * cap_assisted_xapic and cap_assisted_x2apic fields, which indicates
+ * the availability of x{2}APIC hardware assisted virtualization.
+ */
+#define LIBXL_HAVE_PHYSINFO_ASSISTED_APIC 1
+
+/*
  * libxl ABI compatibility
  *
  * The only guarantee which libxl makes regarding ABI compatibility
diff --git a/tools/libs/light/libxl.c b/tools/libs/light/libxl.c
index a0bf7d186f..6d699951e2 100644
--- a/tools/libs/light/libxl.c
+++ b/tools/libs/light/libxl.c
@@ -15,6 +15,7 @@
 #include "libxl_osdeps.h"
 
 #include "libxl_internal.h"
+#include "libxl_arch.h"
 
 int libxl_ctx_alloc(libxl_ctx **pctx, int version,
                     unsigned flags, xentoollog_logger * lg)
@@ -410,6 +411,8 @@ int libxl_get_physinfo(libxl_ctx *ctx, libxl_physinfo *physinfo)
     physinfo->cap_gnttab_v2 =
         !!(xcphysinfo.capabilities & XEN_SYSCTL_PHYSCAP_gnttab_v2);
 
+    libxl__arch_get_physinfo(physinfo, &xcphysinfo);
+
     GC_FREE;
     return 0;
 }
diff --git a/tools/libs/light/libxl_arch.h b/tools/libs/light/libxl_arch.h
index 1522ecb97f..207ceac6a1 100644
--- a/tools/libs/light/libxl_arch.h
+++ b/tools/libs/light/libxl_arch.h
@@ -86,6 +86,10 @@ int libxl__arch_extra_memory(libxl__gc *gc,
                              uint64_t *out);
 
 _hidden
+void libxl__arch_get_physinfo(libxl_physinfo *physinfo,
+                              const xc_physinfo_t *xcphysinfo);
+
+_hidden
 void libxl__arch_update_domain_config(libxl__gc *gc,
                                       libxl_domain_config *dst,
                                       const libxl_domain_config *src);
diff --git a/tools/libs/light/libxl_arm.c b/tools/libs/light/libxl_arm.c
index eef1de0939..39fdca1b49 100644
--- a/tools/libs/light/libxl_arm.c
+++ b/tools/libs/light/libxl_arm.c
@@ -1431,6 +1431,11 @@ int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
     return rc;
 }
 
+void libxl__arch_get_physinfo(libxl_physinfo *physinfo,
+                              const xc_physinfo_t *xcphysinfo)
+{
+}
+
 void libxl__arch_update_domain_config(libxl__gc *gc,
                                       libxl_domain_config *dst,
                                       const libxl_domain_config *src)
diff --git a/tools/libs/light/libxl_types.idl b/tools/libs/light/libxl_types.idl
index 2a42da2f7d..42ac6c357b 100644
--- a/tools/libs/light/libxl_types.idl
+++ b/tools/libs/light/libxl_types.idl
@@ -1068,6 +1068,8 @@ libxl_physinfo = Struct("physinfo", [
     ("cap_vpmu", bool),
     ("cap_gnttab_v1", bool),
     ("cap_gnttab_v2", bool),
+    ("cap_assisted_xapic", bool),
+    ("cap_assisted_x2apic", bool),
     ], dir=DIR_OUT)
 
 libxl_connectorinfo = Struct("connectorinfo", [
diff --git a/tools/libs/light/libxl_x86.c b/tools/libs/light/libxl_x86.c
index 1feadebb18..e0a06ecfe3 100644
--- a/tools/libs/light/libxl_x86.c
+++ b/tools/libs/light/libxl_x86.c
@@ -866,6 +866,17 @@ int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
     return rc;
 }
 
+void libxl__arch_get_physinfo(libxl_physinfo *physinfo,
+                              const xc_physinfo_t *xcphysinfo)
+{
+    physinfo->cap_assisted_xapic =
+        !!(xcphysinfo->arch_capabilities &
+           XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC);
+    physinfo->cap_assisted_x2apic =
+        !!(xcphysinfo->arch_capabilities &
+           XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC);
+}
+
 void libxl__arch_update_domain_config(libxl__gc *gc,
                                       libxl_domain_config *dst,
                                       const libxl_domain_config *src)
diff --git a/tools/ocaml/libs/xc/xenctrl.ml b/tools/ocaml/libs/xc/xenctrl.ml
index 7503031d8f..712456e098 100644
--- a/tools/ocaml/libs/xc/xenctrl.ml
+++ b/tools/ocaml/libs/xc/xenctrl.ml
@@ -127,6 +127,10 @@ type physinfo_cap_flag =
 	| CAP_Gnttab_v1
 	| CAP_Gnttab_v2
 
+type physinfo_arch_cap_flag =
+	| CAP_X86_ASSISTED_XAPIC
+	| CAP_X86_ASSISTED_X2APIC
+
 type physinfo =
 {
 	threads_per_core : int;
@@ -140,6 +144,7 @@ type physinfo =
 	(* XXX hw_cap *)
 	capabilities     : physinfo_cap_flag list;
 	max_nr_cpus      : int;
+	arch_capabilities : physinfo_arch_cap_flag list;
 }
 
 type version =
diff --git a/tools/ocaml/libs/xc/xenctrl.mli b/tools/ocaml/libs/xc/xenctrl.mli
index d1d9c9247a..b034434f68 100644
--- a/tools/ocaml/libs/xc/xenctrl.mli
+++ b/tools/ocaml/libs/xc/xenctrl.mli
@@ -112,6 +112,10 @@ type physinfo_cap_flag =
   | CAP_Gnttab_v1
   | CAP_Gnttab_v2
 
+type physinfo_arch_cap_flag =
+  | CAP_X86_ASSISTED_XAPIC
+  | CAP_X86_ASSISTED_X2APIC
+
 type physinfo = {
   threads_per_core : int;
   cores_per_socket : int;
@@ -123,6 +127,7 @@ type physinfo = {
   scrub_pages      : nativeint;
   capabilities     : physinfo_cap_flag list;
   max_nr_cpus      : int; (** compile-time max possible number of nr_cpus *)
+  arch_capabilities : physinfo_arch_cap_flag list;
 }
 type version = { major : int; minor : int; extra : string; }
 type compile_info = {
diff --git a/tools/ocaml/libs/xc/xenctrl_stubs.c b/tools/ocaml/libs/xc/xenctrl_stubs.c
index 5b4fe72c8d..7e9c32ad1b 100644
--- a/tools/ocaml/libs/xc/xenctrl_stubs.c
+++ b/tools/ocaml/libs/xc/xenctrl_stubs.c
@@ -712,7 +712,7 @@ CAMLprim value stub_xc_send_debug_keys(value xch, value keys)
 CAMLprim value stub_xc_physinfo(value xch)
 {
 	CAMLparam1(xch);
-	CAMLlocal2(physinfo, cap_list);
+	CAMLlocal3(physinfo, cap_list, arch_cap_list);
 	xc_physinfo_t c_physinfo;
 	int r;
 
@@ -731,7 +731,7 @@ CAMLprim value stub_xc_physinfo(value xch)
 		/* ! XEN_SYSCTL_PHYSCAP_ XEN_SYSCTL_PHYSCAP_MAX max */
 		(c_physinfo.capabilities);
 
-	physinfo = caml_alloc_tuple(10);
+	physinfo = caml_alloc_tuple(11);
 	Store_field(physinfo, 0, Val_int(c_physinfo.threads_per_core));
 	Store_field(physinfo, 1, Val_int(c_physinfo.cores_per_socket));
 	Store_field(physinfo, 2, Val_int(c_physinfo.nr_cpus));
@@ -743,6 +743,17 @@ CAMLprim value stub_xc_physinfo(value xch)
 	Store_field(physinfo, 8, cap_list);
 	Store_field(physinfo, 9, Val_int(c_physinfo.max_cpu_id + 1));
 
+#if defined(__i386__) || defined(__x86_64__)
+	/*
+	 * arch_capabilities: physinfo_arch_cap_flag list;
+	 */
+	arch_cap_list = c_bitmap_to_ocaml_list
+		/* ! physinfo_arch_cap_flag CAP_ none */
+		/* ! XEN_SYSCTL_PHYSCAP_ XEN_SYSCTL_PHYSCAP_X86_MAX max */
+		(c_physinfo.arch_capabilities);
+	Store_field(physinfo, 10, arch_cap_list);
+#endif
+
 	CAMLreturn(physinfo);
 }
 
diff --git a/tools/xl/xl_info.c b/tools/xl/xl_info.c
index 712b7638b0..3205270754 100644
--- a/tools/xl/xl_info.c
+++ b/tools/xl/xl_info.c
@@ -210,7 +210,7 @@ static void output_physinfo(void)
          info.hw_cap[4], info.hw_cap[5], info.hw_cap[6], info.hw_cap[7]
         );
 
-    maybe_printf("virt_caps              :%s%s%s%s%s%s%s%s%s%s%s\n",
+    maybe_printf("virt_caps              :%s%s%s%s%s%s%s%s%s%s%s%s%s\n",
          info.cap_pv ? " pv" : "",
          info.cap_hvm ? " hvm" : "",
          info.cap_hvm && info.cap_hvm_directio ? " hvm_directio" : "",
@@ -221,7 +221,9 @@ static void output_physinfo(void)
          info.cap_vmtrace ? " vmtrace" : "",
          info.cap_vpmu ? " vpmu" : "",
          info.cap_gnttab_v1 ? " gnttab-v1" : "",
-         info.cap_gnttab_v2 ? " gnttab-v2" : ""
+         info.cap_gnttab_v2 ? " gnttab-v2" : "",
+         info.cap_assisted_xapic ? " assisted_xapic" : "",
+         info.cap_assisted_x2apic ? " assisted_x2apic" : ""
         );
 
     vinfo = libxl_get_version_info(ctx);
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index 709a4191ef..e5dde9f8ce 100644
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -117,6 +117,9 @@ static const char __initconst warning_hvm_fep[] =
 static bool_t __initdata opt_altp2m_enabled = 0;
 boolean_param("altp2m", opt_altp2m_enabled);
 
+bool __ro_after_init assisted_xapic_available;
+bool __ro_after_init assisted_x2apic_available;
+
 static int cf_check cpu_callback(
     struct notifier_block *nfb, unsigned long action, void *hcpu)
 {
diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
index e1e1fa14e6..77ce0b2121 100644
--- a/xen/arch/x86/hvm/vmx/vmcs.c
+++ b/xen/arch/x86/hvm/vmx/vmcs.c
@@ -343,6 +343,15 @@ static int vmx_init_vmcs_config(bool bsp)
             MSR_IA32_VMX_PROCBASED_CTLS2, &mismatch);
     }
 
+    /* Check whether hardware supports accelerated xapic and x2apic. */
+    if ( bsp )
+    {
+        assisted_xapic_available = cpu_has_vmx_virtualize_apic_accesses;
+        assisted_x2apic_available = cpu_has_vmx_virtualize_x2apic_mode &&
+                                    (cpu_has_vmx_apic_reg_virt ||
+                                     cpu_has_vmx_virtual_intr_delivery);
+    }
+
     /* The IA32_VMX_EPT_VPID_CAP MSR exists only when EPT or VPID available */
     if ( _vmx_secondary_exec_control & (SECONDARY_EXEC_ENABLE_EPT |
                                         SECONDARY_EXEC_ENABLE_VPID) )
diff --git a/xen/arch/x86/include/asm/hvm/hvm.h b/xen/arch/x86/include/asm/hvm/hvm.h
index 5b7ec0cf69..e0d9348878 100644
--- a/xen/arch/x86/include/asm/hvm/hvm.h
+++ b/xen/arch/x86/include/asm/hvm/hvm.h
@@ -373,6 +373,9 @@ int hvm_get_param(struct domain *d, uint32_t index, uint64_t *value);
 #define hvm_tsc_scaling_ratio(d) \
     ((d)->arch.hvm.tsc_scaling_ratio)
 
+extern bool assisted_xapic_available;
+extern bool assisted_x2apic_available;
+
 #define hvm_get_guest_time(v) hvm_get_guest_time_fixed(v, 0)
 
 #define hvm_paging_enabled(v) \
@@ -872,6 +875,8 @@ static inline void hvm_set_reg(struct vcpu *v, unsigned int reg, uint64_t val)
 #define hvm_tsc_scaling_supported false
 #define hap_has_1gb false
 #define hap_has_2mb false
+#define assisted_xapic_available false
+#define assisted_x2apic_available false
 
 #define hvm_paging_enabled(v) ((void)(v), false)
 #define hvm_wp_enabled(v) ((void)(v), false)
diff --git a/xen/arch/x86/sysctl.c b/xen/arch/x86/sysctl.c
index f82abc2488..716525f72f 100644
--- a/xen/arch/x86/sysctl.c
+++ b/xen/arch/x86/sysctl.c
@@ -135,6 +135,10 @@ void arch_do_physinfo(struct xen_sysctl_physinfo *pi)
         pi->capabilities |= XEN_SYSCTL_PHYSCAP_hap;
     if ( IS_ENABLED(CONFIG_SHADOW_PAGING) )
         pi->capabilities |= XEN_SYSCTL_PHYSCAP_shadow;
+    if ( assisted_xapic_available )
+        pi->arch_capabilities |= XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC;
+    if ( assisted_x2apic_available )
+        pi->arch_capabilities |= XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC;
 }
 
 long arch_do_sysctl(
diff --git a/xen/include/public/sysctl.h b/xen/include/public/sysctl.h
index 55252e97f2..fbb9912067 100644
--- a/xen/include/public/sysctl.h
+++ b/xen/include/public/sysctl.h
@@ -35,7 +35,7 @@
 #include "domctl.h"
 #include "physdev.h"
 
-#define XEN_SYSCTL_INTERFACE_VERSION 0x00000014
+#define XEN_SYSCTL_INTERFACE_VERSION 0x00000015
 
 /*
  * Read console content from Xen buffer ring.
@@ -111,6 +111,13 @@ struct xen_sysctl_tbuf_op {
 /* Max XEN_SYSCTL_PHYSCAP_* constant.  Used for ABI checking. */
 #define XEN_SYSCTL_PHYSCAP_MAX XEN_SYSCTL_PHYSCAP_gnttab_v2
 
+/* The platform supports x{2}apic hardware assisted emulation. */
+#define XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC  (1u << 0)
+#define XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC (1u << 1)
+
+/* Max XEN_SYSCTL_PHYSCAP_X86__* constant. Used for ABI checking. */
+#define XEN_SYSCTL_PHYSCAP_X86_MAX XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC
+
 struct xen_sysctl_physinfo {
     uint32_t threads_per_core;
     uint32_t cores_per_socket;
@@ -120,6 +127,8 @@ struct xen_sysctl_physinfo {
     uint32_t max_node_id; /* Largest possible node ID on this host */
     uint32_t cpu_khz;
     uint32_t capabilities;/* XEN_SYSCTL_PHYSCAP_??? */
+    uint32_t arch_capabilities;/* XEN_SYSCTL_PHYSCAP_{X86,ARM,...}_??? */
+    uint32_t pad;
     uint64_aligned_t total_pages;
     uint64_aligned_t free_pages;
     uint64_aligned_t scrub_pages;
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Fri Mar 11 15:29:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 15:29:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289161.490596 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nShCm-00085v-Bt; Fri, 11 Mar 2022 15:29:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289161.490596; Fri, 11 Mar 2022 15:29:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nShCm-00085o-8r; Fri, 11 Mar 2022 15:29:24 +0000
Received: by outflank-mailman (input) for mailman id 289161;
 Fri, 11 Mar 2022 15:29:23 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=RXIo=TW=citrix.com=prvs=0626a3ed1=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nShCk-00085i-Ui
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 15:29:22 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 0552e04b-a150-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 16:29:21 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0552e04b-a150-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647012561;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=bK7jgMrHM0d3pPZ1cR8Yq1a8EfEJPtb+x1j9X46bgeY=;
  b=JlIxSXbI2dxweZ4nAFwGjVyeFl0AgYarMC/V1JzsF80SYr6YCriCNa0h
   Na6MAZNl9L4dMzYu9Hja5Rvl7YntdA8lJ1po07B+3ZO6RORHCoJcPTCL+
   4Sfl+5ZU4cbAbP7kbCkK4WzhZiI6ferWiW+dbRlxj2tSeicu+6VOaKhxw
   g=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65951722
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:qLhtTaN2iDp1JITvrR2Jl8FynXyQoLVcMsEvi/4bfWQNrUoigmEPn
 GFMX2CCOq6LZzOmfdB0PN/g8U4OvcKDy9ZqSgto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi29cw27BVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Zl
 4kOu4Crb1YVGu7Bx8YXDxBdTgI5BPgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALNs7kMZlZonh95TrYEewnUdbIRKCiCdpwgmph25kRR6y2i
 8wxdiFCNBTtXgxzN04wFIg+wvnytyD6fGgNwL6SjfVuuDWCpOBr65D9PdyQdtGUSMF9mkeDu
 nmA72n/GgsdNtGU1XyC6H3ErvDLtTP2XsQVDrLQ3vxgjUCXx2cTIAYLTlb9qv684ma1Q99FI
 E0K8wIgt6U//lenCN7nUHWFTGWs50BGHYAKSqtjtV/LmvG8Dxul6nYsEWICZsA9kp4KYX8ni
 X2Dw9rsWB8oiejAIZ6CzYu8oTS3MCkTCGYNYy4YUAcIi+XeTJEPYgHnFYg6TvPs5jHhMXSpm
 m3R8nBi71kGpZNTj82GEUb7byVAT3QjZio8/U3pU22s9WuVj6b1NtXzuTA3ARutRbt1r2VtX
 lBYyqByD8hUVPlhcRBhps1UTdlFAN7fbFXhbaZHRcVJythU0yfLkXpsyD9/Plx1Fc0PZCXkZ
 kTe0SsIusMNbSD1Mv8vO9vvYyjP8UQGPY20PhwzRoATCqWdiSfdpH0+DaJu9zyFfLcQfVEXZ
 s7ALJfE4YcyAqV71jumL9rxIpdwrh3SMVj7HMihpzz+iOL2TCfMFd8tbQvfBshkvfjsiFiEr
 L5i2z6ilkw3vBvWOXKMr+b+7DkicBAGOHwBg5cOJ7DZfVY+Rj1J5j246epJRrGJVp99z4/g1
 nq8RlVZ2Bz4g3jGIh+NcXdtdPXkWpMXkJ7xFXZE0YqAs5T7XbuS0Q==
IronPort-HdrOrdr: A9a23:N8FA26w7YDe0pIz4yvapKrPxwOskLtp133Aq2lEZdPULSKOlfp
 GV8MjziyWYtN9wYhAdcdDpAtjmfZr5z+8O3WBxB8bYYOCCggWVxe5ZnOnfKlHbakjDH6tmpN
 pdmstFeaPN5DpB/L/HCWCDer5Kqrn3k5xAx92ut0uFJTsaFJ2IhD0JbDpzfHcGIDWvUvECZe
 ahD4d81nOdUEVSSv7+KmgOXuDFqdGOvJX6YSQeDxpizAWVlzun5JPzDhDdh34lInhy6IZn1V
 KAvx3y562lvf3+4hjA11XL55ATvNf60NNMCOGFl8BQADTxjQSDYphnRtS5zXgIidDqzGxvvM
 jHoh8mMcg2w3TNflutqR+o4AXk2CZG0Q6X9XaoxV/Y5eDpTjMzDMRMwahDdAHC1kYmtNZglI
 pWwmOwrfNsfF/9tRW4w+KNewBhl0Kyr3Znu/UUlWZjXYwXb6IUhZAD/XlSDIwLEEvBmc0a+d
 FVfY/hDcttABKnhyizhBgu/DXsZAV4Iv6+eDlMhiTPuAIm30yQzCMjtbkidzk7hdAAoqJ/lp
 T525RT5cBzp/AtHNFA7cc6MLyK4z/2MGTx2Fz7GyWUKEhAAQOJl6LK
X-IronPort-AV: E=Sophos;i="5.90,174,1643691600"; 
   d="scan'208";a="65951722"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=i5uOO7ylvF85zRmAtE0wJI+uq+OOsOMMdZ/II7twbBguLeXVWD93v9rCrPXGG5pDND9J1+tmxLPUiLajpQtOOe324WwGmwDFWz2pXbaCiSfAu3yjo33bfIXcrPtwfBP31CD+kLP9hK45xbRqHFuQEhYH/6AjXFo7LLWGZ7d/6IwxdHwLzQZhDBWusYIs+b8Wv0Djpu7eoxpqSVDdGPpCX8F/rJrxyK3XMXhZfRJMag30ii+RiFfpeK+UG8pKkDHmgTly14Kl5rIaCSz4n/T+Kc/goBUD6ZvMM/G8nLCoKEQ7fEeEt0eJznRC6Vf+/4SqDt9R1InkmEqmuFQlmkxvPg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=VBo92vs/J2whbFMGg3aG7kvVyctYctEerkmEdGhcIH8=;
 b=RX2ht63DNJQk77E4pGyJ9/l/oX1/04C3H6b4VvljhDzSkEx/gaFoYKXmdzxFtUX6z7aElLrrR9HucdJr97bxE7A9n73+sAc1fjlzWp53pAKh8u1OEiyIXo49Tb3n8ttKa8R3ZERQlmSYs0setpQNenAOWSpfTQVbHdOy5QqJIdGpja3FYtL99wHAKGZMwCvHwgKZL6gjqJCZw0EiIfJwWFML1KL5Vm7yNZa+m45Epdi8K/PFOQwPJ+n4emAKRp2+WKfXJ4tkMCsPD/5BLM3D33/7g23mSXvlk1R0Lq6vhl2j2RhkoWFkvKy7ULMv/bIU6ggEAzMRE5uSsFswspAnag==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=VBo92vs/J2whbFMGg3aG7kvVyctYctEerkmEdGhcIH8=;
 b=jhh8g4I0Q5Va0TbalAQUpwf9cSPAoEH+QXWqaM9VetfM9FemVkFSeHiYU2v9HO4xJwNz4FpbJFUDHOqIrtvSa5OTT47U8xsRdtlORKfISatgTy048xKmsHRxIeIffOYPqtol+U4LhDr+jVme8m4sBCNObbR4NIwa0K5Ce9cCOE4=
Date: Fri, 11 Mar 2022 16:29:01 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>, Colin Percival <cperciva@FreeBSD.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Andrew
 Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: statistical time calibration
Message-ID: <YitqvQxsJ1/hqfrg@Air-de-Roger>
References: <1ea5815b-df22-7884-d28b-bdcc1741e349@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <1ea5815b-df22-7884-d28b-bdcc1741e349@suse.com>
X-ClientProxiedBy: LO2P265CA0032.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:61::20) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 88d0f47a-e9e2-4ff1-f81b-08da0373e190
X-MS-TrafficTypeDiagnostic: CY4PR03MB3318:EE_
X-Microsoft-Antispam-PRVS: <CY4PR03MB3318E8C07E85342D17B9CC6C8F0C9@CY4PR03MB3318.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: Bkk6z6EAJN+JQdiIC4Y478jEuEOzn8d+uc17X2YxaINa3EIq+M14lYpSU4jwSbQFknWLeEcax4Xz1uRNabPSAM838UEwqyN23Yasn72Lgcme8fdkOUXHZjL/Q3Y2Kjn9A8mKpWatxZzUHdF1IToUQCHqxdJImTOvBcx5Af175w0LF38xTyTtWqo6VpPmdSK1uYb2TAe4yD5HkXoKAOCO6ore0yL3zSoZLfnZlwVBU5wQp3UD32YzGeFf6fjIf5eFFXCwi/54Mfv+N+evgWlE+yUT0YNUK707Mc3AVucR/GVDE3QRluwW3GoNM87/n1bXBv8K+NcDaxyDb7okX8lyXtmm5blWesW2KquwbTIphiN/gOOnwd1Bkyor1MdjRfk+j7QfchmaYRYTQdmBHmK17ngG+pjDJG2ohozLWTCa4X2FbUrkepgYxLuFqSx9m59Sz3UfGAQRJoJWDnjU3ORDs5mlYijZMBcr5pYNkprqm0o8e8adQhwvCuEQ1zWqnWzJhRB3LTpFNgiyLmBVnkNzWsr6Pt+aS2iHo9cVkRAjbv6IXwGAqaFr6zECSIWaPAbGsTNbaRXXCxUg5YhuTDmTBkIxv6X60NS3Vf513BzpJrck9YdqLoiL8LFqaAtYEJHRSYbyg0kVQjRfAfwUwaKiWTYTJogyxz8bexGYu2hXL0d1t+V4g/2WHlN/jLobFNkYnpOPAo6XV7xh9uHPhNx5sBS57tgBOX/UjvjzdGavNTA=
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(66476007)(85182001)(9686003)(6512007)(38100700002)(33716001)(66946007)(6506007)(186003)(26005)(3480700007)(83380400001)(6666004)(86362001)(7116003)(6486002)(5660300002)(8676002)(966005)(54906003)(8936002)(2906002)(82960400001)(110136005)(316002)(508600001)(66556008)(4326008);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?bUMvT2ZiUldUbE5maERid283Q2ErcGNKSkdlaFBqdW5BZnZ0d2dySzJKelN1?=
 =?utf-8?B?NnhBbCtCYVE1U21DSGJjbWVWQ3ZDMXgzZ3NzcHRlOW8wdGdyQzFrRXNHYzRr?=
 =?utf-8?B?MUVESmVXK1UrTldFazc1aVVOa0ltakRXWWxhQXc3eTMzblA0ZUx0bXZNYmoz?=
 =?utf-8?B?R1JxalNwR05VVWpVUDhManA2T2pXYnVJeWVEcFgxTTBEbVo4alVuSng2amhG?=
 =?utf-8?B?S09Nd0xzdFZCM0t5NkFZZzlsQ3EwSVREaWUrVmlFVjRvUkFoZE1nMWVGWWNV?=
 =?utf-8?B?UG15R3F1UHg1ZGdnM3I1cExVY3RqSG1IL3ZqS2hIblNaTHRoTUZzQ2VMUS9i?=
 =?utf-8?B?R3JSTWt3M09iVFNWbzZXeG1BVk1rQ2t2SkVLcnRIQnhWbjV5ekFQbjl1bzIx?=
 =?utf-8?B?S3M2WUQrWlBJUG9KSVRMei9MYkl3R2l2S2VVazlmVUgrTVBlV0Y1Y08zVDM4?=
 =?utf-8?B?TE9KSzltR3ovZ29SS1NIb3pXTjEzVDN4bVVqZXExSk8zYkhZYzZrWTBzQ3Fz?=
 =?utf-8?B?bXdsK0pkeFFMbTBuU1lGNFQ3dHdOdzlCRUNzSDdWRmtZK1hJNHl2eVRBc0E3?=
 =?utf-8?B?T2NkQWtJaEZwTElwSmlZQ0tTUjVsL1FpTmUvNWR0R2FhN0hYQ3FhcjF6K3Zv?=
 =?utf-8?B?bUhtUjYxKzUwVC9sRlY2QTM4UGYyMWpRT1VNakM0S1d4SWJGTy9zL2U4T3Y2?=
 =?utf-8?B?Q1ovTTBjd2xZRER5YXdzOFhYUFhGVVB5QmpiME5YMjhjQ05wNzBGRytLUDFP?=
 =?utf-8?B?d2Q1Y2FWMzVuZTBiZ29JYkF0V1JlTDc0THJOa2Y4cS9CWTVxejEwOVZYWndv?=
 =?utf-8?B?UjRBTWo0bTcvNmhwbW9zUXU1Z0R4SUtsWjNvZy95bFg2cncvMmlkTnRVQmRl?=
 =?utf-8?B?d0xyTHRneCtHN1BlS0U3UTlvQ2hERzkzcFp6MWNRRUcwYmhsU05Jb1NSWWNj?=
 =?utf-8?B?UjJxMXhnRzduNTY0Yi9pS09EZ0gzZ2lXSWllRytNZVBZYnVRaXhrNWM1d2dv?=
 =?utf-8?B?aG8wY2hzL3ZzdmRYb2VjdlFQRFFPZkhIa0lxRHRmSXNScW4zNnUxaHVJaWRK?=
 =?utf-8?B?eHU1TVJHNVNSNFVSeStPZnlIZGZEQTFWdEJ5L3FZWVBVcEJxUWNmOURNVmMx?=
 =?utf-8?B?OWZ6U3podmJBWmhaYzUwNk5QNFJzTDlPb0dvTlN2bU9OOTlHOVlFTkc1ZDkx?=
 =?utf-8?B?bGJ0SEJzc3Z2M0lyWDdIcHRPWTNGL29YS0xINysyQWFtUmhmTCtqVEtzcjJs?=
 =?utf-8?B?MXlpcFdIek4zUGdJb1dTTm16a0hQQ20yWS92bUFyRnFmNUFMNmNuM0VEUlQ1?=
 =?utf-8?B?ZXB3akNKUU1XS3MxVkwvNEl3U3dMTUJVb2Q0TVFmRVppWURoLzRHbTRISWNa?=
 =?utf-8?B?ZGFIWHgxd1MwUFBhRFl0U3lqOHZsejdTblRic1YwcE9FdGJNQXFGdGxaWlUz?=
 =?utf-8?B?MlZjK0RQbjhOUEZ3d1phWWpIYzEwazZXSC80UUZpaGNmTjhscVJlSmYxN2J3?=
 =?utf-8?B?TXJnTWF4SlRFSStyaVhtOExSYnhMbVpLM0dUbDBSZ1hac1ZTRlJrZGsvNGxJ?=
 =?utf-8?B?bm1kdmo0cDlzdVN0WWlkcE1SOXFUaU1qckVYTDc0c1dvR1pzRElVYnZCOGN1?=
 =?utf-8?B?b0lrRld1T3dRRVptQ0VlVEVIRCtkYkE5L21hRnRTOUY1akU5YVVjRzZ4dndP?=
 =?utf-8?B?cE12OG9nVVdHenJ2T0pmdWN2cFcvYlhnQXQ0UitwTG5vS011ODc4dklDcDdS?=
 =?utf-8?B?UXpQVnFkRmQrOWhTTGlUYzlUWGMzYTRNbWpKYlFnK1RDS0JFNksvcExObng4?=
 =?utf-8?B?MmF1M0RNRURNNlZLM0xVdjJYeUhKQWViWWRnNm5TUVlaOWQ2V01FWExSSkhN?=
 =?utf-8?B?UHhjWENNcElyeURmcEhBQWc3SzFSYzJuQlZkK20xTlBEUlhIcWd3Nkp2TVh4?=
 =?utf-8?B?cVhwbVZVUHN0cnNxMk5UMHViNTV3bWxxU0JlR0VSRTdEVFVhc2t2ZVZjWWpl?=
 =?utf-8?B?dkVDcndScVFGa3dkdVpQU2o5YnpQSmJlNThidE9wRkpMS1NoOEFPMDljQ1NS?=
 =?utf-8?B?cjZvRGRlY1hPOXlxTkZ1SVpTcmpCVTlFRHNacDBOY3JOOXd5Nnlza1FidHdp?=
 =?utf-8?B?RU9uVzkwOUk3cnFpSFpWTDBDOHZuczFTelVOOTA1WVR0ZURqTFNyS1lmK3ho?=
 =?utf-8?Q?IFbHYWQKg/wwJuhXZb434Kg=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 88d0f47a-e9e2-4ff1-f81b-08da0373e190
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 15:29:06.8720
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: r4DJM2yPLjpMNC5pt3zmgyW3nRMSeDiyMaZd9H6UE2+boeoe4sDOwjYoVZMogG0GeemW+eY2E8qLMRTPKYzAfA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR03MB3318
X-OriginatorOrg: citrix.com

On Tue, Jan 18, 2022 at 04:03:56PM +0100, Jan Beulich wrote:
> Hello,
> 
> Roger pointer me to a FreeBSD commit [1] introducing such there. While
> we don't start at 2000ms (but rather at 50), this still looked interesting
> enough to take a closer look. I think I've mostly understood the idea and
> implementation now, with the exception of three things:

I have to admit I didn't really look at the commit in detail, just saw
it go by at the same time you where working on improving our time
calibration, and assumed it could be interesting.

> 1) When deciding whether to increment "passes", both variance values have
> an arbitrary value of 4 added to them. There's a sentence about this in
> the earlier (big) comment, but it lacks any justification as to the chosen
> value. What's worse, variance is not a plain number, but a quantity in the
> same units as the base values. Since typically both clocks will run at
> very difference frequencies, using the same (constant) value here has much
> more of an effect on the lower frequency clock's value than on the higher
> frequency one's.
> 
> 2) The second of the "important formulas" is nothing I could recall or was
> able to look up. All I could find are somewhat similar, but still
> sufficiently different ones. Perhaps my "introductory statistics" have
> meanwhile been too long ago ... (In this context I'd like to also mention
> that it took me quite a while to prove to myself that the degenerate case
> of, in particular, the first iteration wouldn't lead to an early exit
> from the function.)
> 
> 3) At the bottom of the loop there is some delaying logic, leading to
> later data points coming in closer succession than earlier ones. I'm
> afraid I don't understand the "theoretical risk of aliasing", and hence
> I'm seeing more risks than benefits from this construct.

Might be easier to just add Colin, he did the original commit and can
likely answer those questions much better than me. He has also done a
bunch of work for FreeBSD/Xen.

> Beyond that there are implementation aspects that I'm not happy with,
> like aforementioned delay loop not dealing with a TSC which did start
> from a large "negative" value, and which hence would eventually wrap. Nor
> is the SMI (or other long latency events) aspect being taken care of. But
> any such concern could of course be dealt with as we port over this
> logic, if we decided we want to go that route.
> 
> My main concern is with the goal of reaching accuracy of 1PPM, and the
> loop ending only after a full second (if I got that right) if that
> accuracy cannot be reached. Afaict there's no guarantee that 1PPM is
> reachable. My recent observations suggest that with HPET that's
> feasible (but only barely), but with PMTMR it might be more like 3 or
> more.
> 
> The other slight concern I have, as previously voiced on IRC, is the use
> of floating point here.
> 
> Jan
> 
> [1] https://cgit.freebsd.org/src/commit/?id=c2705ceaeb09d8579661097fd358ffb5defb5624
> 


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 15:43:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 15:43:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289170.490608 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nShQU-00021r-S7; Fri, 11 Mar 2022 15:43:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289170.490608; Fri, 11 Mar 2022 15:43:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nShQU-00021k-Ng; Fri, 11 Mar 2022 15:43:34 +0000
Received: by outflank-mailman (input) for mailman id 289170;
 Fri, 11 Mar 2022 15:43:33 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=RXIo=TW=citrix.com=prvs=0626a3ed1=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nShQT-00021e-Ad
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 15:43:33 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ffe7fa31-a151-11ec-853a-5f4723681683;
 Fri, 11 Mar 2022 16:43:31 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ffe7fa31-a151-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647013411;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=Qb1WPJrHE7r6NligJnq75SM4L052jdVODx99ty9UA84=;
  b=ZDGfOteFxOn7/9YNwKdhz1xyhym5TYYC9OujSafYJSyzPbXlH+vOtSc+
   iBjl0r/XRpa2elQ5Z0x+3E/bRhgVw/AjUYrNUCoF84/+TDnHqvqY+j9Cr
   ULHxlQ+Trlggxx0K4v3pkc6oxQ3CS3uhy+8lMyaT9FcECs1+umUQPOG2O
   s=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66423434
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:T+akjq5EKWgG+LSLSHKIXgxRtOHHchMFZxGqfqrLsTDasY5as4F+v
 mVKXG+FbP+La2X3fdh2bdu08U1T6sfcy9Y2TgE9rSszHi5G8cbLO4+Ufxz6V8+wwmwvb67FA
 +E2MISowBUcFyeEzvuVGuG96yE6j8lkf5KkYAL+EnkZqTRMFWFw0XqPp8Zj2tQy2YPgWlvX0
 T/Pi5a31GGNimYc3l08s8pvmDs31BglkGpF1rCWTakjUG72zxH5PrpGTU2CByKQrr1vNvy7X
 47+IISRpQs1yfuP5uSNyd4XemVSKlLb0JPnZnB+A8BOiTAazsA+PzpS2FPxpi67hh3Q9+2dx
 umhurSwezoYYvXnnt09QgdiGD0vHepMx77+dC3XXcy7lyUqclPpyvRqSko3IZcZ6qB8BmQmG
 f4wcW5XKErZ3qTvnez9GrIEascLdaEHOKsFvX5t13fBBOsOSpHfWaTao9Rf2V/cg+gQQ6qEP
 JZCNVKDajzxXUxqF14RN6kjhe6kqWakLyx1gVas8P9fD2/7k1UqjemF3MDuUseRWcxfk0Kcp
 2TH12f0GBcXMJqY0zXt2m2orv/Cm2X8Qo16PK218LtmjUOewkQXCQYKTh2rrP+hkEm8VtlDb
 UsO9UIGr7U29UGtZsnwWVu/unHslhsVQd9ZCeA5wACL1KvP4gydC3QETzhOc9gvvok9QjlC/
 l2Dks7tBDdvmKaIUn/b/bCRxQ5eIgBMczVEP3VdC1JYvZ+z++nfky4jUP5jIpOE0oXeHwjQ0
 i6wpzRvp/IZss8ygvDTEU/8vxqgoZ3ATwgQ7wrRX3644g4RWLNJd7BE+nCAs68ecd/xok2p+
 SFdxpPAtLxm4YSlyXTVKNjhCo1F8Bps3Nf0pVd0V6cs+D22k5JIVdABuWouTKuF3yttRNMIX
 KMxkV8AjHOwFCHzBUOSX25XI517pUQHPY65Ps04lvIUPvBMmPavpUmCn3K40WH3i1QLmqoiI
 5qdesvEJS9EVfo2l2XpF79FiOFDKsUCKYX7HMGTI/OPi+f2WZJoYe1dbAvmgh4RsMtoXzk5A
 /4AbpDXmn2zocX1YzXN8J57ELz5BSNTOHwCkOQOLrTrClM/QAkJUqaNqZt8K90Nt/kEzY/go
 yDiMnK0PXKi3BUr3y3RMSs9AF4uNL4ixU8G0dsEZg/5hSJ8Pd7xsM/ytfIfJNEayQCq9tYtJ
 9EtcMScGPVfDDPB/jUWd57mq4J+Mh+sgGqz0+CNOlDTo7YIq9T1x+LZ
IronPort-HdrOrdr: A9a23:ZvmPAKv6w20wTKQ2uhXpLj3S7skCkoMji2hC6mlwRA09TyXGra
 6TdaUguiMc1gx8ZJhBo7C90KnpewK7yXdQ2/htAV7EZnibhILIFvAZ0WKG+Vzd8kLFh4tgPM
 tbAsxD4ZjLfCdHZKXBkXmF+rQbsaG6GcmT7I+0pRodLnAJV0gj1XYDNu/yKDwGeOAsP+tBKH
 Pz3Lshm9L2Ek5nEPhTS0N1FNTrlpnurtbLcBQGDxko5E2nii6p0qfzF1y90g0FWz1C7L8++S
 yd+jaJq5mLgrWe8FvxxmXT55NZlJ/IzcZCPtWFjowwJi/3ggilSYx9U/mpvSwzosuo9FE2+e
 O86SsIDoBW0Tf8b2u1qRzi103J1ysv0WbrzRuijX7qsaXCNUQHIvsEobgcXgrS6kImst05+r
 lMxXilu51eCg6FtDjh5vDTPisa2HackD4Hq6o+nnZfWYwRZPt6tooE5n5YF58GAWbT9J0nKu
 9zF8vRjcwmPm9yV0qp/lWH/ebcHUjaRny9Mwo/U42uonRrdUlCvgolLJd1pAZEyHo/I6M0kN
 gsfJ4Y0I2mdfVmH56VNN1xMvdfNVa9NC4kEFjiaGgPR5t3c04klfbMkcEIDaeRCds18Kc=
X-IronPort-AV: E=Sophos;i="5.90,174,1643691600"; 
   d="scan'208";a="66423434"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=aX8HJokydeHtP8eunHlOQ7XDjuhQ5Mq/U9b71zOIXYnHrbhDCsgE4OWhsBbkytsHAEei9d4873R4vgwReQUtpY4D18cMS5GcpLoXluH+pbMBCVvL8mibwz8i03qExeH1JlGKtTnpWflqzrCJqSzB9kqcsOheqrtp9vKZh+qYymnWh3ZuJedZpd3aBah2Pl7m5A0UbLNKYc+ZqyNkt8ofbTIG1Lv8VXU2axBeGv4VwMkO+pgsDIbnpbQqOIvrL+rASXwCgtPbG+qwl1WqNvDRYfqrSuCd5tjhp9z3OsfrZNehNB3v1joj5UXk0vIqlymEKeQnWj9/pHK8n11i8PjRhw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=o78LAcSdpDOuZYvRCUZArWtMiA+1Enw3E8fVQ0izufc=;
 b=VS3/A6yTgl7oCfY7Eoxv4V+S7JYvlmydZI7tdJfK7eX6EmVTwqYNm6V5lZ8L47pHknx5zdhk0K3o6DEIpaJN3r8HsRq6uPTC3aDOgZLh/0TJ80sOAUaw3qE7iS9w363yLduNBrYoSondcgnRNkDiZfwzdSJ3h/uKoI5OXbUD2xlH2/rbUxL4u/FAJ+1PvXr78ndVD1LU7v6o9wZFgdby2b9Izurgjpbvf6lyslcjCmxyfw8FkCPgwbH0c9UxWxgPavyZ/DdTEtZB1zmAkrsjcn8BjgzXwlggeqdyLhkIvCPjZ1YHnJtbhERCVY41+oS5La0n8yeiXsdu8crpr1y2tg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=o78LAcSdpDOuZYvRCUZArWtMiA+1Enw3E8fVQ0izufc=;
 b=ZsoRXvyzj3e45N8/EXkRRYTngnGcv6TGe1I1o4Jx0HcXAwKojbR4tFx7yDFSzXzRIrxqwhJyQYRRG2cZKCcyeO6EH4gB9xzicKqKYrU1a03HQ68H40jws7qiE8eXRwqo8hkqiO5MXOnfOoWKYuKVb9h3rTDWYFv+Q2ybc5y9Jhk=
Date: Fri, 11 Mar 2022 16:43:22 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Julien Grall <julien@xen.org>
CC: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?=
	<marmarek@invisiblethingslab.com>, Jan Beulich <jbeulich@suse.com>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Stefano Stabellini <sstabellini@kernel.org>, Wei
 Liu <wl@xen.org>, <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH 1/2] ns16550: reject IRQ above nr_irqs
Message-ID: <YituGsgaGaGSIMZ1@Air-de-Roger>
References: <YioddbNor6w/U9ed@Air-de-Roger>
 <53361d65-2bd8-c07b-938c-91b95f2d68ad@suse.com>
 <Yiojgxgd4amSjHog@Air-de-Roger>
 <3055b4a5-2d55-9cf1-1069-8c57208bf0af@xen.org> <YiopXU65pAlnNVNI@mail-itl>
 <d2c63630-6ab3-b4dd-128e-72f871fb9e08@xen.org> <Yisp0Q/cNGbgsO/7@mail-itl>
 <2a5c59ad-2fa5-b668-8bce-0d55e89a4afd@xen.org>
 <Yitk68wpP8HV4od9@Air-de-Roger>
 <5cedf43b-3903-9668-69a0-01b8ba339ba7@xen.org>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <5cedf43b-3903-9668-69a0-01b8ba339ba7@xen.org>
X-ClientProxiedBy: LO3P265CA0003.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:bb::8) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 1c13a5a1-d9b9-4d21-b1aa-08da0375e1ed
X-MS-TrafficTypeDiagnostic: CH0PR03MB6049:EE_
X-Microsoft-Antispam-PRVS: <CH0PR03MB6049DABA4DDD81D9B4420A458F0C9@CH0PR03MB6049.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(26005)(186003)(83380400001)(66556008)(85182001)(8936002)(66946007)(8676002)(6486002)(33716001)(66574015)(38100700002)(4326008)(5660300002)(66476007)(9686003)(6666004)(2906002)(6512007)(86362001)(82960400001)(6506007)(508600001)(316002)(53546011)(6916009)(54906003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?TGxoamN0Qk5WQ3phK0gwaGlXcnQzZzZ2ZVZDckUyMko4bzI2bVBRKzZZenhG?=
 =?utf-8?B?N1dsV0NMN3IyNTJrY0pmY3ZwYnBMcnpyMHFrYmQ3ODZtdWdHcWVYZzFNYTh3?=
 =?utf-8?B?VWtjcm5IMmZ5MU03QjV1S2dlK3h6bnVlSkwvc0JsdVNlb3YrSFprYytjMUZH?=
 =?utf-8?B?K01qUm5GcHR3ZHZMTEg5VFNiNkxsSkFWWXRSUElGSkJSUVJEWmg4KzJ6MG5N?=
 =?utf-8?B?MndwbWVQNzhXVWRXQllxcm9LTXFPUjI3dkRDZXlDL1UwMTlhUHBhcGpWRE1W?=
 =?utf-8?B?N0FSZEoxaUlXWk81RXU2NUZHUFRkUWJOY09rYk1lTVgrV01BbDU5L2JxUzlD?=
 =?utf-8?B?WEVpdFNIUWg2T2dLc1VibkVLYytySmpCS0R1ekg0ZTVwMlVvZzUvV2IvR3Zm?=
 =?utf-8?B?WnpGVTNQTG9aRjNJeTBtczcyM2ErMUlHMFFucDZCd0RBZktVM1dYcFBmMGZL?=
 =?utf-8?B?aStCMlJnN1F6U1REUmJJcTBYZ1lXaGFqSHpBb0hadnZkME92dTU3RzJiQVZr?=
 =?utf-8?B?WTBzMVNlL3JyQUp2SXp0eDRmbjNkcDB1NmFSNTA0a2MwTEcydnRndlBNMGt0?=
 =?utf-8?B?TUloU3hLbXVEdlZ2UWJBMWtPZzFRMHhXZG5ydmwxQlI4TlNkU0pWWGV2a1Va?=
 =?utf-8?B?U2loLzFIenZNcjZBN09wWmVPTGVVNmR6QUFCUmJSc2pDajhRNVFsbnN4YlJy?=
 =?utf-8?B?OGxHcmxBcUZvSWNPOXB3SG5HbjhsL1orajRCcDlEaG1xZjdZekkwanlZckRD?=
 =?utf-8?B?RHZFa0JIVHhIOEVuOUJSR05NQlR0bEgyTVpYaXR2R2x2NE4yU3lXWElDeDR1?=
 =?utf-8?B?M2hzYzZqSm85Z2kzbkFzS0pzWkR4bGZLVWtwS0YrK3dYdnRJb1VHSFRxalNG?=
 =?utf-8?B?UGE0NnppY3FaM3dnOGJKNGNvMDRVN2dYQjgvaVNYdG85V2tEOGhFbTZxSjBr?=
 =?utf-8?B?bXdUMVh6ZGFucFRNUFBmcUtGeHJWWm5rQXdOQ2JTaUgxNGs3YXdJbTVJVHg3?=
 =?utf-8?B?VXBKcjlETFVkcUtLbk0vMkVPbjc0TGJ0MGR3cDZYbERmNk50L2VEVkpENW1E?=
 =?utf-8?B?djNvalVmdFRpYng1aHFVQTlicXNuQUhIRCtEWnhtU3gvU2JMc3dYMjBUTmto?=
 =?utf-8?B?R2hKQmcxTkdKc0xOTi9HQVQ0anV1U2ZiU216NTdvcFB3VjIzRkpxWDBmTmhw?=
 =?utf-8?B?Skw5Qi9tcDR0S3NRdmhwQ2U3bVMzblAwWTZGZ1RpNmlnRzhNdy94b29Dai90?=
 =?utf-8?B?bFUxc3EwanZVS293RFg5cFFEYkNOUzBBZFRNcldpd2RDZElUaGNyNEZTRDYw?=
 =?utf-8?B?Y1JmSTJHa1lOK3FyQmk4ZGcwc0VNTzF6Y2xpNVdoYSs2Vk5mQkdiN3dDdWhO?=
 =?utf-8?B?N1pMWXlLd28vTTh4RG11dWxpY2tGM25yYW9kQzJ6YkZiN0JxU3ZnYjRlS0N3?=
 =?utf-8?B?VUhOclFZMktwYXBwOXhNOW1OOVVwbmZIUGI3SVRyWEJqTTNRRXc4b1RhNjJ3?=
 =?utf-8?B?SEhOU2NLQTU0NjlES0w5MFV5Y1dQbERkWkpkKzNBZ002RUF4bDFiRmtHeUtS?=
 =?utf-8?B?SGpOYXpRQkduUXFOK2NZNUkwUGZUV0lrNGZKVzM3RWlVQnZSR29aU0lzR1RN?=
 =?utf-8?B?TFB3YlByb3hiVExGc2JxTE0vck5PRTViYnhUQ20xMVpuTXZKWXB4MXREVUM3?=
 =?utf-8?B?M1JZcjdHRG9lSHgraGs3SnpPamFmZlU0M1NyWlJ4OFZkamY5VlAzVVNnUVN4?=
 =?utf-8?B?MVNXMytBM2w2ZWRhUC9TZDJUV1dkeXkxTmxGbWVPMkZJc0ltU2FqNWozNHhy?=
 =?utf-8?B?ekNrSWdvZHhOcU5wR3hLQkpmakFUN2lTM0Jlc2x3RHVRaCs1NHRUaGNoMm1q?=
 =?utf-8?B?OGtuVnlNVE5JRGtCRFhZdVRQYTZXMExmQ1RsU2U1dUdIcjU5RDZqanZlWjV0?=
 =?utf-8?B?QWZyUFRLRkdBMzRYT1hOM0RyUCtqMWkrV3JCT3pkcEhaUXJBVXZ4Y3BRZ2ZL?=
 =?utf-8?B?OFdkY3p6cXN3PT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 1c13a5a1-d9b9-4d21-b1aa-08da0375e1ed
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Mar 2022 15:43:26.4260
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: xw3wbIGMz+WPAjP8hslDlg7cs3i1+YT9KFWPvZt3BLh6RrxKRiNIkqzhsjbstK1cdfZqnlE2VGexlInbNTNQnQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH0PR03MB6049
X-OriginatorOrg: citrix.com

On Fri, Mar 11, 2022 at 03:19:22PM +0000, Julien Grall wrote:
> Hi Roger,
> 
> On 11/03/2022 15:04, Roger Pau Monné wrote:
> > On Fri, Mar 11, 2022 at 11:15:13AM +0000, Julien Grall wrote:
> > > Hi,
> > > 
> > > On 11/03/2022 10:52, Marek Marczykowski-Górecki wrote:
> > > > On Fri, Mar 11, 2022 at 10:23:03AM +0000, Julien Grall wrote:
> > > > > Hi Marek,
> > > > > 
> > > > > On 10/03/2022 16:37, Marek Marczykowski-Górecki wrote:
> > > > > > On Thu, Mar 10, 2022 at 04:21:50PM +0000, Julien Grall wrote:
> > > > > > > Hi,
> > > > > > > 
> > > > > > > On 10/03/2022 16:12, Roger Pau Monné wrote:
> > > > > > > > On Thu, Mar 10, 2022 at 05:08:07PM +0100, Jan Beulich wrote:
> > > > > > > > > On 10.03.2022 16:47, Roger Pau Monné wrote:
> > > > > > > > > > On Thu, Mar 10, 2022 at 04:23:00PM +0100, Jan Beulich wrote:
> > > > > > > > > > > On 10.03.2022 15:34, Marek Marczykowski-Górecki wrote:
> > > > > > > > > > > > --- a/xen/drivers/char/ns16550.c
> > > > > > > > > > > > +++ b/xen/drivers/char/ns16550.c
> > > > > > > > > > > > @@ -1221,6 +1221,9 @@ pci_uart_config(struct ns16550 *uart, bool_t skip_amt, unsigned int idx)
> > > > > > > > > > > >                                  pci_conf_read8(PCI_SBDF(0, b, d, f),
> > > > > > > > > > > >                                                 PCI_INTERRUPT_LINE) : 0;
> > > > > > > > > > > > +                if (uart->irq >= nr_irqs)
> > > > > > > > > > > > +                    uart->irq = 0;
> > > > > > > > > > > 
> > > > > > > > > > > Don't you mean nr_irqs_gsi here? Also (nit) please add the missing blanks
> > > > > > > > > > > immediately inside the parentheses.
> > > > > > > > > > 
> > > > > > > > > > If we use nr_irqs_gsi we will need to make the check x86 only AFAICT.
> > > > > > > > > 
> > > > > > > > > Down the road (when Arm wants to select HAS_PCI) - yes. Not necessarily
> > > > > > > > > right away. After all Arm wants to have an equivalent check here then,
> > > > > > > > > not merely checking against nr_irqs instead. So putting a conditional
> > > > > > > > > here right away would hide the need for putting in place an Arm-specific
> > > > > > > > > alternative.
> > > > > > > > 
> > > > > > > > Oh, I always forget Arm doesn't have CONFIG_HAS_PCI enabled just yet.
> > > > > > > The PCI code in ns16550.c is gated by CONFIG_HAS_PCI and CONFIG_X86. I am
> > > > > > > not sure we will ever see a support for PCI UART card in Xen on Arm.
> > > > > > > 
> > > > > > > However, if it evers happens then neither nr_irqs or nr_irqs_gsi would help
> > > > > > > here because from the interrupt controller PoV 0xff may be a valid (GICv2
> > > > > > > supports up to 1024 interrupts).
> > > > > > > 
> > > > > > > Is there any reason we can't explicitely check 0xff?
> > > > > > 
> > > > > > That's what my v0.1 did, but Roger suggested nr_irqs. And I agree,
> > > > > > because the value is later used (on x86) to access irq_desc array (via
> > > > > > irq_to_desc), which has nr_irqs size.
> > > > > 
> > > > > I think it would be better if that check is closer to who access the
> > > > > irq_desc. This would be helpful for other users (I am sure this is not the
> > > > > only potential place where the IRQ may be wrong). So how about moving it in
> > > > > setup_irq()?
> > > > 
> > > > I don't like it, it's rather fragile approach (at least in the current
> > > > code base, without some refactor). There are a bunch of places using
> > > > uart->irq (even if just checking if its -1 or 0) before setup_irq()
> > > > call. This includes smp_intr_init(), which is what was the first thing
> > > > crashing with 0xff set there.
> > > 
> > > Even if the code is gated with !CONFIG_X86, it sounds wrong to me to have
> > > such check in an UART driver. It only prevents us to do an out-of-bound
> > > access. There are no guarantee the interrupt will be usable (on Arm 256 is a
> > > valid interrupt).
> > 
> > It's a sanity check of a value we get from the hardware, I don't think
> > it's that strange.
> 
> I think it is strange because the behavior would be different between the
> architectures. On x86, we would reject the interrupt and poll. On Arm, we
> would accept the interrupt and the UART would be unusable.
> 
> > It's mostly similar to doing sanity checks of input
> > values we get from users.
> I am a bit concerned that we are using an unrelated check (see above
> why) to catch the "misconfiguration".
> 
> I think it would be good to understand why the interrupt line is 0xff and
> properly fix it. Is it a misconfiguration?  Is it intended to indicate "no
> IRQ"? Can we actually trust the value for the Intel LPSS?

Sorry, maybe this wasn't clear. My suggestion was not to just do this
fix and call it done, but rather to add this check for sanity and then
figure out how to properly handle this specific device.

So adding the check here is not a workaround in order to support Intel
LPSS, but rather a generic fix to ns16550 for an issue which happens
to be triggered by Intel LPSS. We would still need to figure how to
handle that specific Line value. I haven't looked at the docs, will do
on Monday hopefully.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 16:33:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 16:33:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289174.490618 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSiCG-0007dp-LE; Fri, 11 Mar 2022 16:32:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289174.490618; Fri, 11 Mar 2022 16:32:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSiCG-0007di-IN; Fri, 11 Mar 2022 16:32:56 +0000
Received: by outflank-mailman (input) for mailman id 289174;
 Fri, 11 Mar 2022 16:32:55 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3NWv=TW=invisiblethingslab.com=marmarek@srs-se1.protection.inumbo.net>)
 id 1nSiCE-0007db-Kl
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 16:32:54 +0000
Received: from out5-smtp.messagingengine.com (out5-smtp.messagingengine.com
 [66.111.4.29]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e4dca70a-a158-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 17:32:52 +0100 (CET)
Received: from compute3.internal (compute3.nyi.internal [10.202.2.43])
 by mailout.nyi.internal (Postfix) with ESMTP id 9B6855C0281;
 Fri, 11 Mar 2022 11:32:50 -0500 (EST)
Received: from mailfrontend1 ([10.202.2.162])
 by compute3.internal (MEProxy); Fri, 11 Mar 2022 11:32:50 -0500
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Fri,
 11 Mar 2022 11:32:49 -0500 (EST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e4dca70a-a158-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:cc:content-type:date:date:from:from
	:in-reply-to:in-reply-to:message-id:mime-version:references
	:reply-to:sender:subject:subject:to:to:x-me-proxy:x-me-proxy
	:x-me-sender:x-me-sender:x-sasl-enc; s=fm2; bh=7AhpJBKPcuqB+//iI
	3WdKqhkxmxc6gcb4790oS/b6Y0=; b=fMEye0MUm/bNsvzUMfHUY8wx0vhbqNOjd
	mU2t5eAwjjEVkYKX0KMyPL0sTeBRkGFtLaZVLA6J0TD73yPIvperwR5QyUlB59TP
	DtFgDQFyXe8af82VlSB9YtAGCAuaxw/N+hs522SyrYEXWbpzWQKutnzG1lDbt5j9
	0VNJXp94wz2WCf28VsPUsTaVqKhOpHtPBJIC/sB6c4ga3K+VeIwuACRMB2lytV65
	m8nb6dnwmRz+2NtnCr7WVKOVSzTdgvkmMjmRfJrw8CObJna9W8JP0TRY4fXwjAK2
	+FLqqpRjppfTQjoYvAGYWrLL8IWdDtHQVIxbRy+fjxh8/oS4MxK8Q==
X-ME-Sender: <xms:snkrYq5HYxinpH1m27p3y5ypJ5v2OqpGM5-fy-CbCl6P7YIatblUFQ>
    <xme:snkrYj71CdUyijAEpuJPsxsrKg5m1sWsBRjfLlWxbjbIK1EEWdpsC6FS_egg9PkXr
    YPCnsci70UPlQ>
X-ME-Received: <xmr:snkrYpd3G3jNJKp8d2FG1wc5eW2gBWDs6NRXMWo08oIcfP1ZpXogtydWErWpfyTUAwhZ_Qb1LUNp6CR2wwd7Iogi47ineGwSgA>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddruddvvddgkeejucetufdoteggodetrfdotf
    fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen
    uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne
    cujfgurhepfffhvffukfhfgggtuggjsehgtderredttdejnecuhfhrohhmpeforghrvghk
    ucforghrtgiihihkohifshhkihdqifpkrhgvtghkihcuoehmrghrmhgrrhgvkhesihhnvh
    hishhisghlvghthhhinhhgshhlrggsrdgtohhmqeenucggtffrrghtthgvrhhnpeetveff
    iefghfekhffggeeffffhgeevieektedthfehveeiheeiiedtudegfeetffenucevlhhush
    htvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpehmrghrmhgrrhgvkhes
    ihhnvhhishhisghlvghthhhinhhgshhlrggsrdgtohhm
X-ME-Proxy: <xmx:snkrYnIBO0dG3B9fYn7knjJKPAgRQTmQhPXP8qhNgiC4tCisDLEmBg>
    <xmx:snkrYuLNx8RC6rt9UTvNeBScBEndSDNd93FWLejCQYEPr9PiQ8uOew>
    <xmx:snkrYoxRSpW-x26KzOylYaPhge4WOVjpJ0qK28inOsFbtMH__L16bA>
    <xmx:snkrYghY_80ULBS6rGaFdeuD9G7oape4SfSKDKbD7YnwIuq_eKX_lg>
Date: Fri, 11 Mar 2022 17:32:45 +0100
From: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
Cc: Julien Grall <julien@xen.org>, Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
	xen-devel@lists.xenproject.org
Subject: Re: [PATCH 1/2] ns16550: reject IRQ above nr_irqs
Message-ID: <Yit5rnJnOu1VMIn1@mail-itl>
References: <53361d65-2bd8-c07b-938c-91b95f2d68ad@suse.com>
 <Yiojgxgd4amSjHog@Air-de-Roger>
 <3055b4a5-2d55-9cf1-1069-8c57208bf0af@xen.org>
 <YiopXU65pAlnNVNI@mail-itl>
 <d2c63630-6ab3-b4dd-128e-72f871fb9e08@xen.org>
 <Yisp0Q/cNGbgsO/7@mail-itl>
 <2a5c59ad-2fa5-b668-8bce-0d55e89a4afd@xen.org>
 <Yitk68wpP8HV4od9@Air-de-Roger>
 <5cedf43b-3903-9668-69a0-01b8ba339ba7@xen.org>
 <YituGsgaGaGSIMZ1@Air-de-Roger>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="lWJNIGd8CEP9PnML"
Content-Disposition: inline
In-Reply-To: <YituGsgaGaGSIMZ1@Air-de-Roger>


--lWJNIGd8CEP9PnML
Content-Type: text/plain; protected-headers=v1; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Date: Fri, 11 Mar 2022 17:32:45 +0100
From: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
Cc: Julien Grall <julien@xen.org>, Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
	xen-devel@lists.xenproject.org
Subject: Re: [PATCH 1/2] ns16550: reject IRQ above nr_irqs

On Fri, Mar 11, 2022 at 04:43:22PM +0100, Roger Pau Monn=C3=A9 wrote:
> Sorry, maybe this wasn't clear. My suggestion was not to just do this
> fix and call it done, but rather to add this check for sanity and then
> figure out how to properly handle this specific device.

Yes, I agree. Having it properly configured is preferred. Linux manages
to do that, but I'm not sure how exactly. But ...

> So adding the check here is not a workaround in order to support Intel
> LPSS, but rather a generic fix to ns16550 for an issue which happens
> to be triggered by Intel LPSS. We would still need to figure how to
> handle that specific Line value. I haven't looked at the docs, will do
> on Monday hopefully.

=2E.. having fallback to a poll mode is still better than crashing the
hypervisor or not using such console at all.

--=20
Best Regards,
Marek Marczykowski-G=C3=B3recki
Invisible Things Lab

--lWJNIGd8CEP9PnML
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAmIrea4ACgkQ24/THMrX
1yzoQAf9EC+6Z9gQeTqZM3USmxOkjfKZDoG2g6kGqCYUxUGULHJfy8/e0aSeaWOH
BWKzX3EMcG931WTZgroBqLYxYePWiM8M7GIr9s4tj5hgndQkAYf3zDaRH9Z5Opno
y/3OdeYQhTZdePqj2X1pU0JmdFfHbyYYWo7HNga/Rxax0Bu0u3UO1fGXGDTRQKhz
H6niPuykyfB4EgK3Dh5HmJkb96dSQZ9uE6WmQyedxILOOa3gn9gtuOKtIKQows5t
kXTsMdKYmYhlPFUkJfvOyqsC/cD44Wgai9WX0aHCiT7o4WUaGis1AatAK6ZaFetk
xR/iqBN93Hq8DzhwlXuH2kZJFUGm4Q==
=tKWg
-----END PGP SIGNATURE-----

--lWJNIGd8CEP9PnML--


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 16:48:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 16:48:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289178.490629 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSiQw-0000lS-10; Fri, 11 Mar 2022 16:48:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289178.490629; Fri, 11 Mar 2022 16:48:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSiQv-0000lL-Tx; Fri, 11 Mar 2022 16:48:05 +0000
Received: by outflank-mailman (input) for mailman id 289178;
 Fri, 11 Mar 2022 16:48:04 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSiQu-0000lB-57; Fri, 11 Mar 2022 16:48:04 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSiQu-00054h-41; Fri, 11 Mar 2022 16:48:04 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSiQt-00024h-Oc; Fri, 11 Mar 2022 16:48:03 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSiQt-0003FZ-Mo; Fri, 11 Mar 2022 16:48:03 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=1Mr42LCrZ/Pd+sSp0hhBTqIE39PhmuJ7WFSu0ivzmVI=; b=oeseixuA0/nnex3yiCFc2q3+Tu
	o3694+JeoMU+fMe4jvddjsiywPee7wxSEBzMX36PA4TY2kWbIYUqBP5PU3ZFxPhbxYQ6PK2gV2vl1
	+eBv8YJAtAXq1q3WVLqltn+fWcvHPP8CK9Np6QJHJ3wcM9+qaGsEzapmcVSU7mJqp32c=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168512-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168512: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=f06941cc46d002f66875b6f2f711fa3df2775da4
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 11 Mar 2022 16:48:03 +0000

flight 168512 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168512/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 f06941cc46d002f66875b6f2f711fa3df2775da4
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   11 days
Failing since        168258  2022-03-01 01:55:31 Z   10 days   86 attempts
Testing same since   168504  2022-03-10 10:34:32 Z    1 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 554 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 17:34:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 17:34:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289186.490641 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSj9D-0005mu-DT; Fri, 11 Mar 2022 17:33:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289186.490641; Fri, 11 Mar 2022 17:33:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSj9D-0005mn-9y; Fri, 11 Mar 2022 17:33:51 +0000
Received: by outflank-mailman (input) for mailman id 289186;
 Fri, 11 Mar 2022 17:33:49 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSj9B-0005mZ-Rt; Fri, 11 Mar 2022 17:33:49 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSj9B-0005o9-PJ; Fri, 11 Mar 2022 17:33:49 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSj9B-0004V5-7z; Fri, 11 Mar 2022 17:33:49 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSj9B-0005mS-7R; Fri, 11 Mar 2022 17:33:49 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=p1Y8fWHD4cnMbAw/3ec9pKgxBPkOYI+Fd5piVaXcI90=; b=UxeNpAUBP+CeiWagYNBAZWEm49
	DtAib22DluUM8p/w40YoBtY4WQBWQEgBrr3rbaWwFMkEIiWwVWvEoL8fWjjA4AM31BbEyD6k7wjzd
	Lco9kRcJuO2fuLrtcrre/sbSdMvbUvqwmEy6jwNNevdBkbBYEPbLYAxDa1CNYpxIrRL8=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168510-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168510: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=1416688c53be6535be755b44c15fb2eb9defd20f
X-Osstest-Versions-That:
    qemuu=d9ccf33f9479201e5add8db0af68ca9ca8da358b
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 11 Mar 2022 17:33:49 +0000

flight 168510 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168510/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168501
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168501
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168501
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168501
 test-armhf-armhf-xl-rtds     18 guest-start/debian.repeat    fail  like 168501
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168501
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168501
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168501
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168501
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 qemuu                1416688c53be6535be755b44c15fb2eb9defd20f
baseline version:
 qemuu                d9ccf33f9479201e5add8db0af68ca9ca8da358b

Last test of basis   168501  2022-03-10 06:06:16 Z    1 days
Testing same since   168510  2022-03-10 19:38:23 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Corey Minyard <cminyard@mvista.com>
  Mark Cave-Ayland <mark.cave-ayland@ilande.co.uk>
  Peter Maydell <peter.maydell@linaro.org>
  Philippe Mathieu-Daudé <f4bug@amsat.org>
  Shengtan Mao <stmao@google.com>
  Titus Rwantare <titusr@google.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   d9ccf33f94..1416688c53  1416688c53be6535be755b44c15fb2eb9defd20f -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 17:40:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 17:40:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289196.490652 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSjFB-0006XQ-7K; Fri, 11 Mar 2022 17:40:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289196.490652; Fri, 11 Mar 2022 17:40:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSjFB-0006XJ-3m; Fri, 11 Mar 2022 17:40:01 +0000
Received: by outflank-mailman (input) for mailman id 289196;
 Fri, 11 Mar 2022 17:39:59 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=bM73=TW=minervasys.tech=marco.solieri@srs-se1.protection.inumbo.net>)
 id 1nSjF9-0006XD-Mq
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 17:39:59 +0000
Received: from mail-wr1-x429.google.com (mail-wr1-x429.google.com
 [2a00:1450:4864:20::429])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 44e12c3d-a162-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 18:39:57 +0100 (CET)
Received: by mail-wr1-x429.google.com with SMTP id j17so14102968wrc.0
 for <xen-devel@lists.xenproject.org>; Fri, 11 Mar 2022 09:39:57 -0800 (PST)
Received: from localhost (nb2assolieri.mat.unimo.it. [155.185.4.56])
 by smtp.gmail.com with ESMTPSA id
 l10-20020a056000022a00b001f017dfb5cdsm9218270wrz.90.2022.03.11.09.39.55
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Fri, 11 Mar 2022 09:39:55 -0800 (PST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 44e12c3d-a162-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=minervasys-tech.20210112.gappssmtp.com; s=20210112;
        h=date:from:to:cc:subject:message-id:references:mime-version
         :content-disposition:in-reply-to;
        bh=0SdaYfl4J3Hk0WbpMOxuF3TK/zJq9KPEi4t5ysXyntE=;
        b=oFaq5fSN+T00BiBnW9bL/3uwgxBWm2+9KnXOP6HSd0K8QbxoqzL3Y0DoH/FQrIxv8B
         IjaEhQpb7zsyUtI4iKcRqwmMKWrG15gQ5fLmjMBqjLxJr9jJewxahZrufsFct1iq89ph
         UBZLG3EKSbw9zl9FLg/BMdLRd/exLp1fqNrGFJaVHM3O0jHpBYxuRVrjqApc+xGeiwtu
         4T+y+Zhu7w4pAY2xwVOcjcu/UXryckhhS1DOOuVY4eSthei4EE4lQfY+eCMQWthpI9em
         xRkR9/4RHbxkk75qF4V569B+JmBpbaMgvMTZ2hKCVVIoM+UMN6FYl5I3dnlWBW7tVPa2
         KgPQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:date:from:to:cc:subject:message-id:references
         :mime-version:content-disposition:in-reply-to;
        bh=0SdaYfl4J3Hk0WbpMOxuF3TK/zJq9KPEi4t5ysXyntE=;
        b=TPHo4oD+lbee3hgEcIk6kytnRTkpSB24LFV3LpCP/HvudQYItv2nZuRMkVPJn94W95
         YG8rISVAU8ObhV9CWKINGtqWc5vbrFMoG+azLM2LZngVRJNYX94Mip0mLwu9/EjzC/Li
         XCMTL/moq1UIwZAmrLElN6qPzHdqmKLEopoSv6Hy0HEgMMeMbf0JKYXJ9Wwy1OT1JMd5
         aP7/wuPR1HBOqtmgbA0Xh8ajgTkQz0+33gP+bcLFFguQ3N2BjWMX18Fgx5cutfbbncra
         gMqmiIikjGfNuHU7WLxPdTtEh6o3mmxJyk2psgTJareQ1oyVv1QN6Hqq4dBpmE3k828+
         i/Gg==
X-Gm-Message-State: AOAM533fqjYwVI9a+vsy5pwbEkEDnGCc8DtX8R+xsymYQiUEqAwHApzk
	L9D4dyNbZ0BKuJDGsZygx9sh6A==
X-Google-Smtp-Source: ABdhPJyg8aKhc8vuk69WmjSnIwv7hsQiQa64W/e+SK4MlIHWSo0If06v+PYctnm/HeNkwy1E/zK3PQ==
X-Received: by 2002:adf:a199:0:b0:1f0:20f5:8f79 with SMTP id u25-20020adfa199000000b001f020f58f79mr7690877wru.296.1647020397082;
        Fri, 11 Mar 2022 09:39:57 -0800 (PST)
Date: Fri, 11 Mar 2022 18:39:14 +0100
From: Marco Solieri <marco.solieri@minervasys.tech>
To: Julien Grall <julien@xen.org>
Cc: xen-devel@lists.xenproject.org,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
	Marco Solieri <marco.solieri@unimore.it>,
	Andrea Bastoni <andrea.bastoni@minervasys.tech>,
	Luca Miccio <lucmiccio@gmail.com>
Subject: Re: [PATCH 16/36] xen/color alloc: implement color_from_page for
 ARM64
Message-ID: <20220311173914.mppkerpbme6roo6w@carbon.xt3.it>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-17-marco.solieri@minervasys.tech>
 <1bf96df3-3593-1c01-a571-a0ee6e63524e@xen.org>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha512;
	protocol="application/pgp-signature"; boundary="eddp35kr53vdp4fl"
Content-Disposition: inline
In-Reply-To: <1bf96df3-3593-1c01-a571-a0ee6e63524e@xen.org>


--eddp35kr53vdp4fl
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Fri, Mar 04, 2022 at 08:54:35PM +0000, Julien Grall wrote:
> On 04/03/2022 17:46, Marco Solieri wrote:
> > The colored allocator should not make any assumptions on how a color
> > is defined, since the definition may change depending on the
> > architecture.
> IIUC, you are saying that the mapping between a physical address to a
> way is the same on every Armv8 processor.
>=20
> Can you provide a reference from the Arm Arm which confirm this
> statement?

We are actually stating quite the opposite.  Generally speaking, the Arm
ARM leaves as IMPLEMENTATION DEFINED many details that are needed to
determine how colouring should be defined, most notably:
- the physical vs virtual indexing, which determines whether colouring
  is possible;
- the cache line length and the degree of associativity, which determine
  the way size, which in turn, together with the page size selected by
  the OS/hypervisor, allows to compute the number of available colours;
- the number of levels of shared caches, which determines the number of
  different colour sets.

For the sake of simplicity, we wanted to decouple the notion of colour
=66rom the many hardware features that enable/suggest one of the
(sometimes many) instantiations.

All these details are usually reported in the processor TRM.  E.g., in
the A53 TRM [DDI 0500J] we read (Sec. 7.1):

| Optional tightly-coupled L2 cache that includes:
| =E2=80=94 Configurable L2 cache size of 128KB, 256KB, 512KB, 1MB and 2MB.
| =E2=80=94 Fixed line length of 64 bytes.
| =E2=80=94 Physically indexed and tagged cache.
| =E2=80=94 16-way set-associative cache structure.

A simplified version of this configuration is implemented in PATCH
06/36, where the fallback automatic configuration assumes that colouring
targets the LLC, and that this is the only shared cache level.

I hope that this clarify some points.


Cheers.

--=20
Marco Solieri, Ph.D.
CEO & Founder
Tel: +39-059-205-5182 -- Cell: +39-349-678-66-65 -- OpenPGP: 0x75822E7E

Minerva Systems SRL -- http://www.minervasys.tech
Via Campi 213/B, 41125, Modena, Italy -- PIVA/CF 03996890368

~~>
Discover how to easily optimise complex embedded solutions
for high-performance, safety and predictability. Together.

--eddp35kr53vdp4fl
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=BNqq
-----END PGP SIGNATURE-----

--eddp35kr53vdp4fl--


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 17:57:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 17:57:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289201.490663 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSjW8-0000Tb-N6; Fri, 11 Mar 2022 17:57:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289201.490663; Fri, 11 Mar 2022 17:57:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSjW8-0000TU-Jy; Fri, 11 Mar 2022 17:57:32 +0000
Received: by outflank-mailman (input) for mailman id 289201;
 Fri, 11 Mar 2022 17:57:31 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nSjW7-0000TO-6R
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 17:57:31 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSjW6-0006Dh-HV; Fri, 11 Mar 2022 17:57:30 +0000
Received: from 54-240-197-233.amazon.com ([54.240.197.233] helo=[10.95.172.72])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSjW6-0004z9-Ai; Fri, 11 Mar 2022 17:57:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=hywydtrlPhkGhhyjpfV2laEBa7hEGzZJzRG+8up4XdQ=; b=ZALKVdtAyoLfdzmoEj0thR+gRU
	J5vluGmAfu4+T2nfapM5P4AsqrEtRdrZwenQ52Nzu/2GW+WpM+LxfjeMFHPuodjcM13celvGghrxn
	lkv+dD5ns2abD2Y+z+KplAD7CxnfAmbqSUYHPnyTA9BB47aUy8stmU7HkjcQP0ZHJAKE=;
Message-ID: <3fa26307-965e-549e-1496-ee618399b085@xen.org>
Date: Fri, 11 Mar 2022 17:57:27 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH 16/36] xen/color alloc: implement color_from_page for
 ARM64
To: Marco Solieri <marco.solieri@minervasys.tech>
Cc: xen-devel@lists.xenproject.org, Andrew Cooper
 <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
 Jan Beulich <jbeulich@suse.com>, Stefano Stabellini
 <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-17-marco.solieri@minervasys.tech>
 <1bf96df3-3593-1c01-a571-a0ee6e63524e@xen.org>
 <20220311173914.mppkerpbme6roo6w@carbon.xt3.it>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220311173914.mppkerpbme6roo6w@carbon.xt3.it>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi Marco,

On 11/03/2022 17:39, Marco Solieri wrote:
> On Fri, Mar 04, 2022 at 08:54:35PM +0000, Julien Grall wrote:
>> On 04/03/2022 17:46, Marco Solieri wrote:
>>> The colored allocator should not make any assumptions on how a color
>>> is defined, since the definition may change depending on the
>>> architecture.
>> IIUC, you are saying that the mapping between a physical address to a
>> way is the same on every Armv8 processor.
>>
>> Can you provide a reference from the Arm Arm which confirm this
>> statement?
> 
> We are actually stating quite the opposite.  Generally speaking, the Arm
> ARM leaves as IMPLEMENTATION DEFINED many details that are needed to
> determine how colouring should be defined, most notably:
> - the physical vs virtual indexing, which determines whether colouring
>    is possible;
> - the cache line length and the degree of associativity, which determine
>    the way size, which in turn, together with the page size selected by
>    the OS/hypervisor, allows to compute the number of available colours;
> - the number of levels of shared caches, which determines the number of
>    different colour sets.
> 
> For the sake of simplicity, we wanted to decouple the notion of colour
> from the many hardware features that enable/suggest one of the
> (sometimes many) instantiations.
> 
> All these details are usually reported in the processor TRM.  E.g., in
> the A53 TRM [DDI 0500J] we read (Sec. 7.1):
> 
> | Optional tightly-coupled L2 cache that includes:
> | — Configurable L2 cache size of 128KB, 256KB, 512KB, 1MB and 2MB.
> | — Fixed line length of 64 bytes.
> | — Physically indexed and tagged cache.
> | — 16-way set-associative cache structure.
Thanks for the details. They are all about the variables of an equation. 
What I am looking for is how the equation calculate_addr_col_mask() in 
patch #6 was defined.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 18:28:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 18:28:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289205.490673 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSjzn-0003pR-5G; Fri, 11 Mar 2022 18:28:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289205.490673; Fri, 11 Mar 2022 18:28:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSjzn-0003pK-1j; Fri, 11 Mar 2022 18:28:11 +0000
Received: by outflank-mailman (input) for mailman id 289205;
 Fri, 11 Mar 2022 18:28:09 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nSjzl-0003pE-OY
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 18:28:09 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSjzl-0006o0-5I; Fri, 11 Mar 2022 18:28:09 +0000
Received: from 54-240-197-233.amazon.com ([54.240.197.233] helo=[10.95.172.72])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSjzk-0006nR-V0; Fri, 11 Mar 2022 18:28:09 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=7hXMn3yWkb/iWu8EHrUxKJ0Gaq+ha2s4M0IjCnculvE=; b=L/W8mE/KGWIh8wE1CYh2SkXnL4
	WuWcOVDVWs4G+vZ3ilY9RVRnnaeTiFZSJynSer64DZpazU/VLSZC+8PpRSfADJA9WZWQ1jCv82syo
	udNAd70LpbYJSNViYjpuYyTYX1TqrnMsN6aDrIAVNsom9/zZ3TGj/S74tJemlvygHonI=;
Message-ID: <da30f814-eb32-6b7b-369b-2fad0d8e5dda@xen.org>
Date: Fri, 11 Mar 2022 18:28:06 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [XEN v10 2/4] xen/arm64: io: Support instructions (for which ISS
 is not valid) on emulated MMIO region using MMIO/ioreq handler
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>,
 xen-devel@lists.xenproject.org
Cc: sstabellini@kernel.org, stefanos@xilinx.com, Volodymyr_Babchuk@epam.com,
 bertrand.marquis@arm.com, andrew.cooper3@citrix.com,
 george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org,
 roger.pau@citrix.com, Ayan Kumar Halder <ayankuma@xilinx.com>
References: <20220310174501.62040-1-ayankuma@xilinx.com>
 <20220310174501.62040-3-ayankuma@xilinx.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220310174501.62040-3-ayankuma@xilinx.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 10/03/2022 17:44, Ayan Kumar Halder wrote:
> When an instruction is trapped in Xen due to translation fault, Xen
> checks if the ISS is invalid (for data abort) or it is an instruction
> abort. If so, Xen tries to resolve the translation fault using p2m page
> tables. In case of data abort, Xen will try to map the mmio region to
> the guest (ie tries to emulate the mmio region).
> 
> If the ISS is not valid and it is a data abort, then Xen tries to
> decode the instruction. In case of ioreq, Xen  saves the decoding state,
> rn and imm9 to vcpu_io. Whenever the vcpu handles the ioreq successfully,
> it will read the decoding state to determine if the instruction decoded
> was a ldr/str post indexing (ie INSTR_LDR_STR_POSTINDEXING). If so, it
> uses these details to post increment rn.
> 
> In case of mmio handler, if the mmio operation was successful, then Xen
> retrives the decoding state, rn and imm9. For state ==
> INSTR_LDR_STR_POSTINDEXING, Xen will update rn.
> 
> If there is an error encountered while decoding/executing the instruction,
> Xen will forward the abort to the guest.
> 
> Also, the logic to infer the type of instruction has been moved from
> try_handle_mmio() to try_decode_instruction() which is called before.
> try_handle_mmio() is solely responsible for handling the mmio operation.
> 
> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>

Acked-by: Julien Grall <jgrall@amazon.com>

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 18:31:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 18:31:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289209.490685 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSk2r-0005CT-Lb; Fri, 11 Mar 2022 18:31:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289209.490685; Fri, 11 Mar 2022 18:31:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSk2r-0005CL-Gn; Fri, 11 Mar 2022 18:31:21 +0000
Received: by outflank-mailman (input) for mailman id 289209;
 Fri, 11 Mar 2022 18:31:19 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nSk2p-0005CD-Lk
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 18:31:19 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSk2p-0006sV-7N; Fri, 11 Mar 2022 18:31:19 +0000
Received: from 54-240-197-233.amazon.com ([54.240.197.233] helo=[10.95.172.72])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSk2p-0006uG-1M; Fri, 11 Mar 2022 18:31:19 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=dzh/apuglEO0xtnBTiRbrwOR5q1vhdtLUmg/+d7xgYo=; b=KJo7EJ8KPiXHBxQoUVdXB/BdAh
	dICBq5GNC3wQzBvje4Rg8osONGaB+R6RMMBjyiF/+4uR6Jop7m8j0pLhYaVyjNpfUAmkuekBlTCMb
	9hkoYNaSY5aslioaceM7mPWnlCrHAUARfz7W8bCKssvkhkx1bQaJvsFQUgYNv28AHfvM=;
Message-ID: <0d8657ef-2449-be1f-6e91-67a520835512@xen.org>
Date: Fri, 11 Mar 2022 18:31:16 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [XEN v10 3/4] xen/arm64: io: Handle the abort due to access to
 stage1 translation table
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>,
 xen-devel@lists.xenproject.org
Cc: sstabellini@kernel.org, stefanos@xilinx.com, Volodymyr_Babchuk@epam.com,
 bertrand.marquis@arm.com, andrew.cooper3@citrix.com,
 george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org,
 roger.pau@citrix.com, Ayan Kumar Halder <ayankuma@xilinx.com>
References: <20220310174501.62040-1-ayankuma@xilinx.com>
 <20220310174501.62040-4-ayankuma@xilinx.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220310174501.62040-4-ayankuma@xilinx.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 10/03/2022 17:45, Ayan Kumar Halder wrote:
> If the abort was caused due to access to stage1 translation table, Xen
> will try to set the p2m entry (assuming that the Stage 1 translation
> table is in the non MMIO region).
> If there is no such entry found, then Xen will try to map the address as
> a MMIO region (assuming that the Stage 1 translation table is in the
> direct MMIO region).
> 
> If that fails as well, then there are the two following scenarios:-
> 1. Stage 1 translation table being in the emulated MMIO region - Xen

We have multiple emulated MMIO regions. So I would s/the/an/

> can read the region, but it has no way to return the value read to the
> CPU page table walker (which tries to go through the stage1 tables to
> resolve the translation fault).
> 
> 2. Stage 1 translation table address is invalid.
> 
> In both the above scenarios, Xen will forward the abort to the guest.
> 
> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
> ---
> 
> Changelog :-
> 
> v1..v8 - NA
> 
> v9 - 1. Extracted this change from "[XEN v8 2/2] xen/arm64: io: Support
> instructions (for which ISS is not..." into a separate patch of its own.
> The reason being this is an existing bug in the codebase.
> 
> v10 - 1. Enabled checking for stage1 translation table address in the
> MMIO region. The reason being Arm Arm does not have any restrictions.
> 2. Updated the commit message to explain all the possible scenarios.
> 
>   xen/arch/arm/io.c | 11 +++++++++++
>   1 file changed, 11 insertions(+)
> 
> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
> index fd903b7b03..e6c77e16bf 100644
> --- a/xen/arch/arm/io.c
> +++ b/xen/arch/arm/io.c
> @@ -128,6 +128,17 @@ void try_decode_instruction(const struct cpu_user_regs *regs,
>           return;
>       }
>   
> +    /*
> +     * At this point, we know that the stage1 translation table is either in the

Same here.

> +     * emulated MMIO region or its address is invalid . This is not expected by

s/ . /. /

All of these can be fixed on commit. So:

Reviewed-by: Julien Grall <jgrall@amazon.com>

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 18:34:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 18:34:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289213.490696 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSk5z-0005nf-3w; Fri, 11 Mar 2022 18:34:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289213.490696; Fri, 11 Mar 2022 18:34:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSk5y-0005nY-Vw; Fri, 11 Mar 2022 18:34:34 +0000
Received: by outflank-mailman (input) for mailman id 289213;
 Fri, 11 Mar 2022 18:34:33 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nSk5x-0005nQ-Bf
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 18:34:33 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSk5w-0006v0-MJ; Fri, 11 Mar 2022 18:34:32 +0000
Received: from 54-240-197-233.amazon.com ([54.240.197.233] helo=[10.95.172.72])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSk5w-0007DW-GB; Fri, 11 Mar 2022 18:34:32 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=giorpWSsQyc+2JucN0SXJSmKISXlhsmyLyBX+PBatEM=; b=Xr5ug7UrOH7QVoq1wI3uJsJwaN
	L8ZOjM1Bmw7v6WQFbRBflGK4pAv64XIWPtM/GTSWkRw5rJ4WtvgrZDdem7C/di9KJ+0ljyisZlODg
	hSSpUFHlb8BGN77B8lCI8jSetxKbnWDRXnmfHVA25k3AOcVaoYyVTzb+V7c0JEp+HPAA=;
Message-ID: <e2e27a6d-3339-d312-455c-0e61fe410462@xen.org>
Date: Fri, 11 Mar 2022 18:34:29 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [XEN v10 4/4] xen/arm64: io: Handle data abort due to cache
 maintenance instructions
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>,
 xen-devel@lists.xenproject.org
Cc: sstabellini@kernel.org, stefanos@xilinx.com, Volodymyr_Babchuk@epam.com,
 bertrand.marquis@arm.com, andrew.cooper3@citrix.com,
 george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org,
 roger.pau@citrix.com, Ayan Kumar Halder <ayankuma@xilinx.com>
References: <20220310174501.62040-1-ayankuma@xilinx.com>
 <20220310174501.62040-5-ayankuma@xilinx.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220310174501.62040-5-ayankuma@xilinx.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 10/03/2022 17:45, Ayan Kumar Halder wrote:
> When the data abort is caused due to cache maintenance for an address,
> there are three scenarios:-
> 
> 1. Address belonging to a non emulated region - For this, Xen should
> set the corresponding bit in the translation table entry to valid and
> return to the guest to retry the instruction. This can happen sometimes
> as Xen need to set the translation table entry to invalid. (for eg
> 'Break-Before-Make' sequence). Xen returns to the guest to retry the
> instruction.
> 
> 2. Address belongs to an emulated region - Xen should ignore the
> instruction (ie increment the PC) and return to the guest.
> 
> 3. Address is invalid - Xen should forward the data abort to the guest.
> 
> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
> ---
> 
> Changelog:-
> 
> v1...v8 - NA
> 
> v9 - Extracted this change from "[XEN v7 2/2] xen/arm64: io: Support
> instructions (for which ISS is not ..." into a separate patch of its
> own. The reason being this addresses an existing bug in the codebase.
> 
> v10 - 1. To check if the address belongs to an emulated region, one
> needs to check if it has a mmio handler or an ioreq server. In this
> case, Xen should increment the PC
> 2. If the address is invalid (niether emulated MMIO nor the translation
> could be resolved via p2m or mapping the MMIO region), then Xen should
> forward the abort to the guest.
> 
>   xen/arch/arm/include/asm/mmio.h |  1 +
>   xen/arch/arm/io.c               | 20 ++++++++++++++++++++
>   xen/arch/arm/ioreq.c            | 15 ++++++++++++++-
>   3 files changed, 35 insertions(+), 1 deletion(-)
> 
> diff --git a/xen/arch/arm/include/asm/mmio.h b/xen/arch/arm/include/asm/mmio.h
> index ca259a79c2..79e64d9af8 100644
> --- a/xen/arch/arm/include/asm/mmio.h
> +++ b/xen/arch/arm/include/asm/mmio.h
> @@ -35,6 +35,7 @@ enum instr_decode_state
>        * instruction.
>        */
>       INSTR_LDR_STR_POSTINDEXING,
> +    INSTR_CACHE,                    /* Cache Maintenance instr */
>   };
>   
>   typedef struct
> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
> index e6c77e16bf..c5b2980a5f 100644
> --- a/xen/arch/arm/io.c
> +++ b/xen/arch/arm/io.c
> @@ -139,6 +139,17 @@ void try_decode_instruction(const struct cpu_user_regs *regs,
>           return;
>       }
>   
> +    /*
> +     * When the data abort is caused due to cache maintenance, Xen should check
> +     * if the address belongs to an emulated MMIO region or not. The behavior
> +     * will differ accordingly.
> +     */
> +    if ( info->dabt.cache )
> +    {
> +        info->dabt_instr.state = INSTR_CACHE;
> +        return;
> +    }
> +
>       /*
>        * Armv8 processor does not provide a valid syndrome for decoding some
>        * instructions. So in order to process these instructions, Xen must
> @@ -177,6 +188,15 @@ enum io_state try_handle_mmio(struct cpu_user_regs *regs,
>           return rc;
>       }
>   
> +    /*
> +     * When the data abort is caused due to cache maintenance and the address
> +     * belongs to an emulated region, Xen should ignore this instruction.
> +     */
> +    if ( info->dabt_instr.state == INSTR_CACHE )
> +    {
> +        return IO_HANDLED;
> +    }
> +
>       /*
>        * At this point, we know that the instruction is either valid or has been
>        * decoded successfully. Thus, Xen should be allowed to execute the
> diff --git a/xen/arch/arm/ioreq.c b/xen/arch/arm/ioreq.c
> index cc9bf23213..0dd2d452f7 100644
> --- a/xen/arch/arm/ioreq.c
> +++ b/xen/arch/arm/ioreq.c
> @@ -29,10 +29,14 @@ enum io_state handle_ioserv(struct cpu_user_regs *regs, struct vcpu *v)
>       const struct hsr_dabt dabt = hsr.dabt;
>       /* Code is similar to handle_read */
>       register_t r = v->io.req.data;
> +    const struct instr_details instr = v->io.info.dabt_instr;
>   
>       /* We are done with the IO */
>       v->io.req.state = STATE_IOREQ_NONE;
>   
> +    if ( instr.state == INSTR_CACHE )
> +        return IO_HANDLED;

The request will not be forwarded to the IOREQ, so why do we need check 
instr.state here?

> +
>       if ( dabt.write )
>           return IO_HANDLED;
>   
> @@ -47,7 +51,7 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
>                                struct vcpu *v, mmio_info_t *info)
>   {
>       struct vcpu_io *vio = &v->io;
> -    struct instr_details instr = info->dabt_instr;
> +    const struct instr_details instr = info->dabt_instr; >       struct hsr_dabt dabt = info->dabt;
>       ioreq_t p = {
>           .type = IOREQ_TYPE_COPY,
> @@ -78,6 +82,15 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
>       if ( !s )
>           return IO_UNHANDLED;
>   
> +    /*
> +     * When the data abort is caused due to cache maintenance and the address
> +     * belongs to an emulated region, Xen should ignore this instruction.
> +     */
> +    if ( instr.state == INSTR_CACHE )
> +    {
> +        return IO_HANDLED;
> +    }
> +
>       ASSERT(dabt.valid);
>   
>       vio->req = p;

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 18:37:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 18:37:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289217.490707 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSk8y-0006R3-Hz; Fri, 11 Mar 2022 18:37:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289217.490707; Fri, 11 Mar 2022 18:37:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSk8y-0006Qw-Ev; Fri, 11 Mar 2022 18:37:40 +0000
Received: by outflank-mailman (input) for mailman id 289217;
 Fri, 11 Mar 2022 18:37:39 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nSk8x-0006Qq-Tv
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 18:37:39 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSk8x-0006yx-0H; Fri, 11 Mar 2022 18:37:39 +0000
Received: from 54-240-197-233.amazon.com ([54.240.197.233] helo=[10.95.172.72])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSk8w-0007Ns-QL; Fri, 11 Mar 2022 18:37:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=CZ63bL1kLAFWObhhg+hdAzn1RIjFwUrgLCaNdMJq8o4=; b=pH2XgbtNW7id6PMDCQKeTjc02+
	55KfRtJTpIqxQOHplY5zGdU2gKgBoVUj/bqXQzqG57u4QZjHf6DGHcAcW7XxFc9NP36G23Y7vpqYk
	M1dwT2zfGazVc68ovbEmHba7/vIulDdwUYyVUiie/v37g1xVPSKOCBGwWkI/ulmkJJMw=;
Message-ID: <7bfe438f-a200-8c80-c81d-632d90fe8430@xen.org>
Date: Fri, 11 Mar 2022 18:37:36 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [XEN v10 4/4] xen/arm64: io: Handle data abort due to cache
 maintenance instructions
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>,
 Stefano Stabellini <sstabellini@kernel.org>
Cc: xen-devel@lists.xenproject.org, stefanos@xilinx.com,
 Volodymyr_Babchuk@epam.com, bertrand.marquis@arm.com,
 andrew.cooper3@citrix.com, george.dunlap@citrix.com, jbeulich@suse.com,
 wl@xen.org, paul@xen.org, roger.pau@citrix.com
References: <20220310174501.62040-1-ayankuma@xilinx.com>
 <20220310174501.62040-5-ayankuma@xilinx.com>
 <alpine.DEB.2.22.394.2203101813030.3261@ubuntu-linux-20-04-desktop>
 <347bda39-2eed-6139-222d-3924bf286f08@xilinx.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <347bda39-2eed-6139-222d-3924bf286f08@xilinx.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi,

On 11/03/2022 13:21, Ayan Kumar Halder wrote:
> enum io_state try_handle_mmio(struct cpu_user_regs *regs,
>                                mmio_info_t *info)
> {
>      struct vcpu *v = current;
>      const struct mmio_handler *handler = NULL;
>      int rc;
> 
>      ASSERT(info->dabt.ec == HSR_EC_DATA_ABORT_LOWER_EL);
> 
>      if ( !info->dabt.valid )
>      {
>          ASSERT_UNREACHABLE();
>          return IO_ABORT;
>      }
> 
>      handler = find_mmio_handler(v->domain, info->gpa);
>      if ( !handler )
>      {
> 
> #ifdef CONFIG_IOREQ_SERVER
> 
>      struct vcpu_io *vio = &v->io;
>      const struct instr_details instr = info->dabt_instr;
>      struct hsr_dabt dabt = info->dabt;
>      ioreq_t p = {
>          .type = IOREQ_TYPE_COPY,
>          .addr = info->gpa,
>          .size = 1 << info->dabt.size,
>          .count = 1,
>          .dir = !info->dabt.write,
>          /*
>           * On x86, df is used by 'rep' instruction to tell the direction
>           * to iterate (forward or backward).
>           * On Arm, all the accesses to MMIO region will do a single
>           * memory access. So for now, we can safely always set to 0.
>           */
>          .df = 0,
>          .data = get_user_reg(regs, info->dabt.reg),
>          .state = STATE_IOREQ_READY,
>      };
>      struct ioreq_server *s = NULL;
>      enum io_state rc;
> 
>      if ( vio->req.state != STATE_IOREQ_NONE )
>      {
>          gdprintk(XENLOG_ERR, "wrong state %u\n", vio->req.state);
>          return IO_ABORT;
>      }
> 
>      s = ioreq_server_select(v->domain, &p);
>      if ( !s )
>          return IO_UNHANDLED;
> 
>      if ( instr.state == INSTR_CACHE )
>      {
>          return IO_HANDLED;
>      }
> 
>      rc = try_fwd_ioserv(vio, &p, s);
>      if ( rc == IO_HANDLED )
>          return handle_ioserv(regs, v);
> 
> #endif
>          return rc;
>      }
> 
> I am not be inclined to have "#ifdef CONFIG_IOREQ_SERVER" in 
> xen/xen/arch/arm/io.c as the file is generic.

+1. I much prefer your first approach.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 19:06:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 19:06:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289224.490718 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSkaF-0001Lv-TV; Fri, 11 Mar 2022 19:05:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289224.490718; Fri, 11 Mar 2022 19:05:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSkaF-0001Lo-QE; Fri, 11 Mar 2022 19:05:51 +0000
Received: by outflank-mailman (input) for mailman id 289224;
 Fri, 11 Mar 2022 19:05:50 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nSkaE-0001Li-BG
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 19:05:50 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSkaD-0007TX-Tf; Fri, 11 Mar 2022 19:05:49 +0000
Received: from 54-240-197-233.amazon.com ([54.240.197.233] helo=[10.95.172.72])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSkaD-0000bg-Mw; Fri, 11 Mar 2022 19:05:49 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=Suvb3LfmjFYbJRJ34pluTgk0Y3N1eRKOlk11Q45rlGw=; b=4gxWKgrnYKiylYcrl/qcP8USN/
	V0eAjup9bYe4uQn6aYE272JHKU/p4QK8qi/aGZ7AngXUIPfJVOBd0FjkImY4Vfox4kwmugh6NwJ26
	bVlsdUDiRVueJjEY9yofjD+toHwp7/YEolXjmUtx2qM2rIvz8/lE57BOa4Y+vpIo6aDw=;
Message-ID: <1b34e833-9b7d-2ab2-cabb-658e7045fea5@xen.org>
Date: Fri, 11 Mar 2022 19:05:47 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH 12/36] xen/arm: initialize cache coloring data for Dom0/U
To: Marco Solieri <marco.solieri@minervasys.tech>,
 xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-13-marco.solieri@minervasys.tech>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220304174701.1453977-13-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 04/03/2022 17:46, Marco Solieri wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> Initialize cache coloring configuration during domain creation. If no
> colors assignment is provided by the user, use the default one.
> The default configuration is the one assigned to Dom0. The latter is
> configured as a standard domain with default configuration.
> 
> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
> ---
>   xen/arch/arm/domain.c       | 53 +++++++++++++++++++++++++++++++++++++
>   xen/arch/arm/domain_build.c |  5 +++-
>   2 files changed, 57 insertions(+), 1 deletion(-)
> 
> diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
> index 8110c1df86..33471b3c58 100644
> --- a/xen/arch/arm/domain.c
> +++ b/xen/arch/arm/domain.c
> @@ -38,6 +38,7 @@
>   #include <asm/vfp.h>
>   #include <asm/vgic.h>
>   #include <asm/vtimer.h>
> +#include <asm/coloring.h>
>   
>   #include "vpci.h"
>   #include "vuart.h"
> @@ -782,6 +783,58 @@ int arch_domain_create(struct domain *d,
>       if ( (rc = domain_vpci_init(d)) != 0 )
>           goto fail;
>   
> +    d->max_colors = 0;

NIT: d is always zeroed when allocated. So it is not necessary to 
initialize the field again.

> +#ifdef CONFIG_COLORING

Please move this code in a separate helper. The new helper could be 
defined in coloring.c.

Furthermore, I would initialize the coloring information earlier in 
arch_domain_create(). This could be useful if we want to allocate 
internal structure from a color assigned to the domain.

> +    /* Setup domain colors */
> +    if ( !config->arch.colors.max_colors )
> +    {
> +        if ( !is_hardware_domain(d) )
> +            printk(XENLOG_INFO "Color configuration not found for dom%u, using default\n",

This message and the other below wants to be ratelimited. I would use 
XENLOG_G_{INFO, ERROR}.

Please use %pd instead of dom%u. This remark is valid for all the other 
use below.

> +                   d->domain_id);

This would need to be changed to 'd'.

> +        d->colors = setup_default_colors(&d->max_colors);

Looking at setup_default_colors(), it using "dom0_col_num". This implies 
we are using the dom0 color. Shouldn't we return an error if d is not 
the hardware domain?

Also, AFAICT, you allocate the memory but never free it.

> +        if ( !d->colors )
> +        {
> +            rc = -ENOMEM;
> +            printk(XENLOG_ERR "Color array allocation failed for dom%u\n",
> +                   d->domain_id);
> +            goto fail;
> +        }
> +    }
> +    else
> +    {
> +        int i, k;
> +
> +        d->colors = xzalloc_array(uint32_t, config->arch.colors.max_colors);

Same here.

> +        if ( !d->colors )
> +        {
> +            rc = -ENOMEM;
> +            printk(XENLOG_ERR "Failed to alloc colors for dom%u\n",
> +                   d->domain_id);
> +            goto fail;
> +        }
> +
> +        d->max_colors = config->arch.colors.max_colors;
> +        for ( i = 0, k = 0;
> +              k < d->max_colors && i < sizeof(config->arch.colors.colors) * 8;
> +              i++ )
> +        {
> +            if ( config->arch.colors.colors[i / 32] & (1 << (i % 32)) )
> +                d->colors[k++] = i;
> +        }
> +    }
> +
> +    printk("Dom%u colors: [ ", d->domain_id);
> +    for ( int i = 0; i < d->max_colors; i++ ) > +        printk("%u ", d->colors[i]);
> +    printk("]\n");

You will be able to get the same information using the debug-key. So I 
am not convinced this is warrant to print here. The more the 
configuration should always be the same as what the user requested.

> +
> +    if ( !check_domain_colors(d) )
> +    {
> +        rc = -EINVAL;
> +        printk(XENLOG_ERR "Failed to check colors for dom%u\n", d->domain_id);
> +        goto fail;
> +    }
> +#endif
>       return 0;
>   
>   fail:
> diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
> index 8be01678de..9630d00066 100644
> --- a/xen/arch/arm/domain_build.c
> +++ b/xen/arch/arm/domain_build.c
> @@ -3344,7 +3344,10 @@ void __init create_dom0(void)
>           printk(XENLOG_WARNING "Maximum number of vGIC IRQs exceeded.\n");
>       dom0_cfg.arch.tee_type = tee_get_type();
>       dom0_cfg.max_vcpus = dom0_max_vcpus();
> -
> +#ifdef CONFIG_COLORING
> +    /* Colors are set after domain_create */

Do you instead mean 'by'?

> +    dom0_cfg.arch.colors.max_colors = 0;
> +#endif
>       if ( iommu_enabled )
>           dom0_cfg.flags |= XEN_DOMCTL_CDF_iommu;
>   

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 19:09:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 19:09:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289228.490729 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSkeE-0001zd-Dl; Fri, 11 Mar 2022 19:09:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289228.490729; Fri, 11 Mar 2022 19:09:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSkeE-0001zW-AY; Fri, 11 Mar 2022 19:09:58 +0000
Received: by outflank-mailman (input) for mailman id 289228;
 Fri, 11 Mar 2022 19:09:56 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nSkeC-0001zO-Sm
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 19:09:56 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSkeC-0007Wp-J4; Fri, 11 Mar 2022 19:09:56 +0000
Received: from 54-240-197-233.amazon.com ([54.240.197.233] helo=[10.95.172.72])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSkeC-0000pD-D1; Fri, 11 Mar 2022 19:09:56 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=z1zYnJ3HEqZ7g0dsuskkQBjmFYjRXMdFNpn2Ra5Rvig=; b=iDdKzhiWtMLV5G9MOjdRWJgwFR
	HytUVQVJiKjthFij2khyVZpFEF1PTKhBtfSW4BIj8l2eLxpP5p7B/xo0CdRfI7sPezQL6i+RtF881
	UmFQz4h5j8WUlvosBoLdLQ1xW7CLPCl9z8QV/p33RNTp93UdBwJkyx2hFB7kaP/jWoXk=;
Message-ID: <f29461ce-981f-a600-d5df-04c66e73f6e4@xen.org>
Date: Fri, 11 Mar 2022 19:09:54 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH 17/36] xen/arm: add get_max_color function
To: Marco Solieri <marco.solieri@minervasys.tech>,
 xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-18-marco.solieri@minervasys.tech>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220304174701.1453977-18-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Marco,

On 04/03/2022 17:46, Marco Solieri wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> In order to initialize the colored allocator data structure, the maximum
> amount of colors defined by the hardware has to be know.
> Add a helper function that returns this information.
> 
> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> ---
>   xen/arch/arm/coloring.c             | 5 +++++
>   xen/arch/arm/include/asm/coloring.h | 8 ++++++++

This helper is simple enough that I think it would be better to fold in 
the first patch using it.

>   2 files changed, 13 insertions(+)
> 
> diff --git a/xen/arch/arm/coloring.c b/xen/arch/arm/coloring.c
> index 4748d717d6..d1ac193a80 100644
> --- a/xen/arch/arm/coloring.c
> +++ b/xen/arch/arm/coloring.c
> @@ -209,6 +209,11 @@ unsigned long color_from_page(struct page_info *pg)
>     return ((addr_col_mask & page_to_maddr(pg)) >> PAGE_SHIFT);
>   }
>   
> +uint32_t get_max_colors(void)
> +{
> +    return max_col_num;
> +}
> +
>   bool __init coloring_init(void)
>   {
>       int i;
> diff --git a/xen/arch/arm/include/asm/coloring.h b/xen/arch/arm/include/asm/coloring.h
> index 318e2a4521..22e67dc9d8 100644
> --- a/xen/arch/arm/include/asm/coloring.h
> +++ b/xen/arch/arm/include/asm/coloring.h
> @@ -49,6 +49,9 @@ void coloring_dump_info(struct domain *d);
>    * specifications.
>    */
>   unsigned long color_from_page(struct page_info *pg);
> +
> +/* Return the maximum available number of colors supported by the hardware */
> +uint32_t get_max_colors(void);
>   #else /* !CONFIG_COLORING */
>   static inline bool __init coloring_init(void)
>   {
> @@ -59,5 +62,10 @@ static inline void coloring_dump_info(struct domain *d)
>   {
>       return;
>   }
> +
> +static inline uint32_t get_max_colors(void)
> +{
> +    return 0;
> +}
>   #endif /* CONFIG_COLORING */
>   #endif /* !__ASM_ARM_COLORING_H__ */

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 19:12:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 19:12:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289232.490740 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSkgK-0003MF-Rp; Fri, 11 Mar 2022 19:12:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289232.490740; Fri, 11 Mar 2022 19:12:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSkgK-0003M8-NL; Fri, 11 Mar 2022 19:12:08 +0000
Received: by outflank-mailman (input) for mailman id 289232;
 Fri, 11 Mar 2022 19:12:06 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=hT2a=TW=amazon.de=prvs=062ebc15f=doebel@srs-se1.protection.inumbo.net>)
 id 1nSkgH-0003Lt-7b
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 19:12:06 +0000
Received: from smtp-fw-80006.amazon.com (smtp-fw-80006.amazon.com
 [99.78.197.217]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 211fac9e-a16f-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 20:12:03 +0100 (CET)
Received: from pdx4-co-svc-p1-lb2-vlan3.amazon.com (HELO
 email-inbound-relay-iad-1e-b69ea591.us-east-1.amazon.com) ([10.25.36.214])
 by smtp-border-fw-80006.pdx80.corp.amazon.com with ESMTP;
 11 Mar 2022 19:11:46 +0000
Received: from EX13D03EUC001.ant.amazon.com
 (iad12-ws-svc-p26-lb9-vlan2.iad.amazon.com [10.40.163.34])
 by email-inbound-relay-iad-1e-b69ea591.us-east-1.amazon.com (Postfix) with
 ESMTPS id D6698C084A; Fri, 11 Mar 2022 19:11:45 +0000 (UTC)
Received: from EX13MTAUEA001.ant.amazon.com (10.43.61.82) by
 EX13D03EUC001.ant.amazon.com (10.43.164.245) with Microsoft SMTP Server (TLS)
 id 15.0.1497.32; Fri, 11 Mar 2022 11:11:44 -0800
Received: from dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (10.13.240.106)
 by mail-relay.amazon.com (10.43.61.243) with Microsoft SMTP Server id
 15.0.1497.28 via Frontend Transport; Fri, 11 Mar 2022 19:11:44 +0000
Received: by dev-dsk-doebel-1c-c6d5f274.eu-west-1.amazon.com (Postfix,
 from userid 3160037)
 id EDE544EE0; Fri, 11 Mar 2022 19:11:43 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 211fac9e-a16f-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1647025924; x=1678561924;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=deZpx3l+nb5S0Sc70c5ZJFYtuVpFzmwCko4kD9WJYoI=;
  b=bM0VAqArHHRXgfQYhmAGMHJDBgNI9PBrIikk8rLei6kZedAipRjEGB26
   /sJxVbBvrS0/KPp7oLI9z5svPki6VjcaSm2QDyFUGgFugl6q9zjpkrPiw
   v9NNlTAjQD/aAe1p9NI2TabrxbnoLQHCXXoDPo1Wrc9TeTp/RkZkvH8Rj
   k=;
X-IronPort-AV: E=Sophos;i="5.90,174,1643673600"; 
   d="scan'208";a="70265491"
From: Bjoern Doebel <doebel@amazon.de>
To: <xen-devel@lists.xenproject.org>
CC: Bjoern Doebel <doebel@amazon.de>, Konrad Rzeszutek Wilk
	<konrad.wilk@oracle.com>, Ross Lagerwall <ross.lagerwall@citrix.com>
Subject: [PATCH] Livepatch: fix typos
Date: Fri, 11 Mar 2022 19:11:37 +0000
Message-ID: <032faef0d56d1de17b9dd229b33bd755c402b978.1647025870.git.doebel@amazon.de>
X-Mailer: git-send-email 2.32.0
MIME-Version: 1.0
Precedence: Bulk
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

Fix a couple of typos in livepatch code.

Signed-off-by: Bjoern Doebel <doebel@amazon.de>
CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
CC: Ross Lagerwall <ross.lagerwall@citrix.com>
---
 xen/arch/x86/livepatch.c |  2 +-
 xen/common/livepatch.c   | 10 +++++-----
 2 files changed, 6 insertions(+), 6 deletions(-)

diff --git a/xen/arch/x86/livepatch.c b/xen/arch/x86/livepatch.c
index 81c48fda7f..c4a19f3169 100644
--- a/xen/arch/x86/livepatch.c
+++ b/xen/arch/x86/livepatch.c
@@ -28,7 +28,7 @@ static bool has_active_waitqueue(const struct vm_event_domain *ved)
 }
 
 /*
- * x86's implementation of waitqueue violates the livepatching safey principle
+ * x86's implementation of waitqueue violates the livepatching safety principle
  * of having unwound every CPUs stack before modifying live content.
  *
  * Search through every domain and check that no vCPUs have an active
diff --git a/xen/common/livepatch.c b/xen/common/livepatch.c
index be2cf75c2d..edf56a357f 100644
--- a/xen/common/livepatch.c
+++ b/xen/common/livepatch.c
@@ -40,7 +40,7 @@ static LIST_HEAD(payload_list);
 
 /*
  * Patches which have been applied. Need RCU in case we crash (and then
- * traps code would iterate via applied_list) when adding entries onthe list.
+ * traps code would iterate via applied_list) when adding entries on the list.
  */
 static DEFINE_RCU_READ_LOCK(rcu_applied_lock);
 static LIST_HEAD(applied_list);
@@ -326,8 +326,8 @@ static int move_payload(struct payload *payload, struct livepatch_elf *elf)
 
     /*
      * Total of all three regions - RX, RW, and RO. We have to have
-     * keep them in seperate pages so we PAGE_ALIGN the RX and RW to have
-     * them on seperate pages. The last one will by default fall on its
+     * keep them in separate pages so we PAGE_ALIGN the RX and RW to have
+     * them on separate pages. The last one will by default fall on its
      * own page.
      */
     size = PAGE_ALIGN(payload->text_size) + PAGE_ALIGN(payload->rw_size) +
@@ -882,7 +882,7 @@ static bool_t is_payload_symbol(const struct livepatch_elf *elf,
         return 0;
 
     /*
-     * The payload is not a final image as we dynmically link against it.
+     * The payload is not a final image as we dynamically link against it.
      * As such the linker has left symbols we don't care about and which
      * binutils would have removed had it be a final image. Hence we:
      * - For SHF_ALLOC - ignore symbols referring to sections that are not
@@ -1523,7 +1523,7 @@ static bool_t is_work_scheduled(const struct payload *data)
 
 /*
  * Check if payload has any of the vetoing, non-atomic hooks assigned.
- * A vetoing, non-atmic hook may perform an operation that changes the
+ * A vetoing, non-atomic hook may perform an operation that changes the
  * hypervisor state and may not be guaranteed to succeed. Result of
  * such operation may be returned and may change the livepatch workflow.
  * Such hooks may require additional cleanup actions performed by other
-- 
2.32.0




Amazon Development Center Germany GmbH
Krausenstr. 38
10117 Berlin
Geschaeftsfuehrung: Christian Schlaeger, Jonathan Weiss
Eingetragen am Amtsgericht Charlottenburg unter HRB 149173 B
Sitz: Berlin
Ust-ID: DE 289 237 879





From xen-devel-bounces@lists.xenproject.org Fri Mar 11 20:36:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 20:36:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289240.490750 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSlzk-0002t1-Tx; Fri, 11 Mar 2022 20:36:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289240.490750; Fri, 11 Mar 2022 20:36:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSlzk-0002su-Qz; Fri, 11 Mar 2022 20:36:16 +0000
Received: by outflank-mailman (input) for mailman id 289240;
 Fri, 11 Mar 2022 20:36:15 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=K7gA=TW=aim.com=brchuckz@srs-se1.protection.inumbo.net>)
 id 1nSlzi-0002so-EK
 for xen-devel@lists.xen.org; Fri, 11 Mar 2022 20:36:15 +0000
Received: from sonic310-21.consmr.mail.gq1.yahoo.com
 (sonic310-21.consmr.mail.gq1.yahoo.com [98.137.69.147])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id dd648cf1-a17a-11ec-8eba-a37418f5ba1a;
 Fri, 11 Mar 2022 21:36:03 +0100 (CET)
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic310.consmr.mail.gq1.yahoo.com with HTTP; Fri, 11 Mar 2022 20:36:00 +0000
Received: by kubenode526.mail-prod1.omega.ne1.yahoo.com (VZM Hermes SMTP
 Server) with ESMTPA ID 237a08bd678e6c7a92e7645b27bc741e; 
 Fri, 11 Mar 2022 20:35:58 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: dd648cf1-a17a-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netscape.net; s=a2048; t=1647030960; bh=83Qq5LTx2nwUKD6FV6iPsPmfwEwD8QTSrGJI3T917Z0=; h=Date:Subject:From:To:Cc:References:In-Reply-To:From:Subject:Reply-To; b=jaI4TmQ5aMJ4wplvNvxBgnJBr/R8pNxw/PhvLM5XmwwhSl43ZUTpygjC/U633EDG1bLGJt763Ruuie1YFaCJzc1UuseVsumP8w7iFLL6NLzMpN/Gm1ejYwmDa/N0eixpSB5Z/cDIGUEimrbpW3EmhQJXvDKQXRLSfRDRMCsWGbxj6euDpt9IdOaB+SV/n0tmo6v5ZqERTZTdW60XOhhzlmcs1tfc3zBRIjRLKXH/0BwhuEbvEAoYeYlfJzUryHNVtRDBpF9UQcXyrAGaafzw+KljTzmzQvSW0hxZw5FBW2EA/Jp381wq+7mHGrTiwSfdojfqPzzcU7s0GGgxhhApYA==
X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1647030960; bh=vqZ3YuXc2KukjaMzzzFQFT3YQBSz9+HWDAM4QpVqbF4=; h=X-Sonic-MF:Date:Subject:From:To:From:Subject; b=bibihrIWg041qrJ8bkCI5ZED4ZGsVttIyncNqV9LmOjfJ60cdvb3Df1hvDJ03tvQg9er6qU7kTrRItT0xJz6tK1RHiPNWBJ8xCifqX5MiRDR9+H5nQIk8yvRePYuWmqw8WhyJ4MywFSgCiOnJdxrJmGhD8Hmt6B+L3hCgALMNhI6IbHHSvrCw/4qPJ+I13IPmUz3d4CPtD/02r/lfv5PYqt1F5WQ0Ng4dNQII9nH2ge/TgxCKxzFgMKNijO2I5q3Vk2UAiqyP2/ViZYSv4x7gwbOESu8et6bMwVHKjCQnlix/9WLFZJFrMtFzjez2GtSfJ39FKDgKPcQNueV4nvmpQ==
X-YMail-OSG: XLjFt3kVM1nXy3RP7h.g2zVQPJEu7zjTdnjoxgWv4x6PrMthCtVrnavEnrIu_z2
 U.5hQuJAsO1trRCdldVmzf.HKkgg0amgoJPf_JL2hy4tdTofsojJ1TQS7alH.nOzCpqN2UOYDWDO
 uVpY38Lncm.EbyPAxn6FiOKqP_T8yAvIemXDujYKSYyycseynhty4n7s9OZNXH7U8RanUOg6N0W.
 2sHvVwWJoe8gLs7czGkiCNyal3wLcHHrk6H_8EVvWkuz57LSrOugv48cHyiCyE_OBjJqJYwG.G_f
 _eLhMDFy3ioQuus3s1POJKblbYpxdKpjDHSkTvJFr.IA3C6oHQtTsNVso3CBJItfA8OdnN8wRIhR
 .cWE9KCRX5Cbm1Y5Xl0x_.aVHjUcZ4j12U6QcuWvqDWQ5GKYQthTjaXGXYTIXAgZr85o8Mo8S0Ip
 .9uVeJsRTwdzB71H2qbMIAtbocPnjwSK4GuajBq8enQAeuGNW_Kn4kTdeg.GZAgchnQg1eQot4ol
 GBCUiTBioDWTTMPweXE2KO5Ksohu.FE1JgdAuI_H__3EA4w2vB.p2qwbXYE2RAlH9VW4Il4twfnY
 4n8gRzpFgjSoRTGDYWFGQ.YLazwEtc3ui5tyZ1_q1hsCBzxsQyGWJ03ERD672OlrBM723rFf1OSr
 4ccVEgVAgsNgTHfROVUBv2zsGMxdjQSbqW_KGiXJB1vEMKwRuMNaIxxeiR_9IWCjBgawNH8FtrJF
 A4q2fyGf5UNXPt73YIYDs.qA5WaHyMvCGrB0_34HEI2DK5mQVs0qMU4VBhQzq_57ds8mGL_wUo2l
 kpe9uABQLnUf9gkxSgCHtQV6Kjn5s4tJEMvS5Nyp7Mc9DWmTAgZWifa7SAO1RyySwQf2L2qGgEDZ
 tFq1qKY8pjuGe9KVtKaoHwZ9v7urcI_AKdrrVmm1JZgccs4vpX33C_ojw8_ifmgco9mN4mya22N2
 sRVYYuLDohXNc29iDhsdU.AyM3z63hPUMSrOu2DpN6UIOttwvP1fuV_mF5VBIsTYQs.AlTKoLE8z
 x1or50XYLM9b0otJEjsI.T7rtlCFow2WlCCBza79yNxIKJCkYQmeYIQCdsDhnISZ9wiI8v1NwnBP
 p4oVH9qjLY2AB1P0iV0f9Rx8ueTM7gTtfPYQstKa6hf1S1BZJVa23z2.stL7OlgCwJ4Vmf4EUclj
 _CLcPLl3N4fJpIqsnBzLp2_tLtU7vTpjxnEGHgB81kbuVqgLny75NKbRT4IQiFowPgR1B3p2LfgD
 2Ds3T.mEaZeYmoIIEy2qrAkgprYa8k71VvZP4e1ivLlxv5Wlzxlyoc0yr43gEe0pf_vt0o9dctqc
 wVYiN2KIF4B3E47ctBn6rDbQjf0K0ev9TEBBIDigpFG84sjsc9FZJ_OwGubR5bWdtZ3ofFArWHLM
 dU9yRzJLJtRTRmpdZgOcLSq4wS0A5iy5smaaBAP_ILrFczxyDpwoFBNCRJubtxfJ7XETcgSPpEvF
 xPH4_5nqbzIVzE3hWEefXvKADUzpbT4NIlCLPnPgsxCPQFKiNMFTAzM.XtEEi.SOKIuZKIScnDLU
 UgjBVlbf4_3Q4kaSwnEr2LXngyCDdxbx1CZ7ReSgEfjg_Pf70LjsHnEADjj_9kyPr.GtGN4H3Dfq
 LDRE3VdVbuaosD3Zy5CDnXY1qg6fT.vSJXvxOJrGGKVNE3mc0NSWUyrTK4YpwGMNJk7lnWpVJwvZ
 WGZ6Bwi_Db7j96AeKCorhCixnR0SkySMbMi8yuS2qwEzFKZ4RUFitDEh06JjiMzaS56WGpgZJ0g0
 07FamhKFeG0Wf2sgPVd.kp_MwLud7pJRADLrWj2bME8GHxqOnh_1cyS_BLzCQWkC2cKhkMkXpUyD
 CvkgJOMojT8jZP8A18elgkPqdpB7wyNwJSz1WjtP0JrnMUR1CaiYQFlOU4yFQAhIurfeXDrtEV4g
 DN0yMggTS9hzULXtVcNNbUZH2kbqmdqgaQ_kJ2AHV.wIcpMRgIycVK7J2jq4lO.dDR828YH3Dy6C
 A2UEVU2u1yCabl72f_Uf5DcVRjpV4gPJ.Yj__xJ3b0GF0XggPIaqImkqAarv8ITpY3Q42YcLnXx8
 2kOOiuqe_uvsUSMcV0ehnQnLxpj9Jfnz3n4WWoiTphbKNMhLMsa_euo.X58cABLpa1V82..ihTKs
 dCQRORTjRDgn3tlniu5HOUJeapz8IC3mVGE16eotMHDVLSRalEmvGtAbrcKakREbxGZp7DFRq83s
 T2.HxtLREdmAOMB8TvINLIx456WRz3SKrSTJGKnem2eCWWvhymkt91.CrBsUBhky4yS02dFV0wz3
 .gCHcTN6r4wxQ2DAVww7Pzr6RVKYNJam9ZOgAJBoUtlRHcemWCqH3hv1LpeG9Zfn7wY3tALaBy6u
 uzUBl_MT7dhhVkcZOf4YzNqAxPcdFqIjbeEnnCTPlaFQLdZrYkLl4dVunI.8i_Qk-
X-Sonic-MF: <brchuckz@aim.com>
Message-ID: <e0a49022-097b-b9ae-eff9-eb2111e7acb9@netscape.net>
Date: Fri, 11 Mar 2022 15:35:57 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: BUG: libxenlight fails to grant permission to access Intel IGD
 Opregion
Content-Language: en-US
From: Chuck Zmudzinski <brchuckz@netscape.net>
To: Jan Beulich <jbeulich@suse.com>
Cc: xen-devel@lists.xen.org
References: <4703b7f1-8d3c-5128-213c-e39f487e4cde.ref@netscape.net>
 <4703b7f1-8d3c-5128-213c-e39f487e4cde@netscape.net>
 <2e74415a-d0d4-321b-be2e-a14db297c51a@suse.com>
 <ed955608-9c62-3dc8-fbcc-df5b4d3c5e46@netscape.net>
In-Reply-To: <ed955608-9c62-3dc8-fbcc-df5b4d3c5e46@netscape.net>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Mailer: WebService/1.1.19878 mail.backend.jedi.jws.acl:role.jedi.acl.token.atz.jws.hermes.aol
Content-Length: 1900

On 3/11/22 8:47 AM, Chuck Zmudzinski wrote:
 > On 3/11/2022 3:09 AM, Jan Beulich wrote:
 >>
 >> Thanks for this analysis. It looks quite plausible (but the question
 >> of 2 vs 3 pages of course needs resolving).
 >>
 >>
 >>
 >
 > After resolving the question of two vs. three pages, I will follow
 > the process for submitting a patch against the latest staging.
 >
 > Qubes OS has a patch that uses three pages, and the
 > igd.c pci file in Qemu's hw/vfio directory also specifies
 > three pages, but if two is enough, that seems to be safer.
 > I haven't checked yet to see if there is an official specification
 > from Intel. I will start by looking in the Linux kernel i915
 > driver code which might give a clue.

It looks like both in Xen and Qemu, it is agreed we need 3 pages

In Xen, we have:

From: Keir Fraser <keir@xen.org>
Date: Thu, 10 Jan 2013 17:26:24 +0000 (+0000)
Subject: hvmloader: Allocate 3 pages for Intel GPU OpRegion passthrough.
X-Git-Tag: 4.3.0-rc1~546
X-Git-Url:
https://xenbits.xen.org/gitweb/?p=xen.git;a=commitdiff_plain;h=408a9e56343b006c9e58a334f0b97dd2deedf9ac

hvmloader: Allocate 3 pages for Intel GPU OpRegion passthrough.

The 8kB region may not be page aligned, hence requiring 3 pages to
be mapped through.

Signed-off-by: Keir Fraser <keir@xen.org>

Also Qemu upstream defines it as 3 pages:

https://xenbits.xen.org/gitweb/?p=qemu-xen.git;a=blob;f=hw/xen/xen_pt_graphics.c;h=a3bc7e39214b3d71c32c8386758fdef6ced5c0df;hb=a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42#l242

In Keir's commit, the OpRegion size was increased from 2 to
3 pages, so I think it is correct to use 3 pages in a proposed
patch.

In tools/firmware/hvmloader, there are header files that have
macros setting the address and size of the Intel IGD opregion.

So my only question is:

Is it proper to include header files from tools/firmware/hvmloader in
tools/libs/light/libxl_pci.c ?

Chuck


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 22:29:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 22:29:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289272.490783 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSnkv-0006Ip-F7; Fri, 11 Mar 2022 22:29:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289272.490783; Fri, 11 Mar 2022 22:29:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSnkv-0006Ii-BX; Fri, 11 Mar 2022 22:29:05 +0000
Received: by outflank-mailman (input) for mailman id 289272;
 Fri, 11 Mar 2022 22:29:04 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nSnku-0006Ic-Bf
 for xen-devel@lists.xenproject.org; Fri, 11 Mar 2022 22:29:04 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSnkn-0002Oo-13; Fri, 11 Mar 2022 22:28:57 +0000
Received: from gw1.octic.net ([81.187.162.82] helo=[10.0.1.102])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nSnkm-000476-Ql; Fri, 11 Mar 2022 22:28:56 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:Subject:
	From:References:Cc:To:MIME-Version:Date:Message-ID;
	bh=FmTCGu9KQaQL86omL6YiRViAhJTBBT+KMYvX8QRG/YY=; b=Tsvh3PUpHWhWkqGx6R59SiOHoI
	YITvxQF9ey2IQwrOyWY/WVfIopj/flCQdxd9A11EDIopOJrGeqREjdw5Q3WcfZd8w8ggP5DIsVXBn
	EoVDsNVslKHtoiaSNfF5A8gJqElkLNeG5x93eJqD/A7Wo8cnLIH3S8Ir5VtIC7GFgco8=;
Message-ID: <ec6106f4-3a9a-7110-78e3-de3f072576b9@xen.org>
Date: Fri, 11 Mar 2022 22:28:53 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
To: Jan Beulich <jbeulich@suse.com>,
 Marco Solieri <marco.solieri@minervasys.tech>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>,
 xen-devel@lists.xenproject.org
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-29-marco.solieri@minervasys.tech>
 <07507a77-168a-9387-1f5a-11f00de587f6@suse.com>
From: Julien Grall <julien@xen.org>
Subject: Re: [PATCH 28/36] xen/arm: introduce xen_map_text_rw
In-Reply-To: <07507a77-168a-9387-1f5a-11f00de587f6@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 07/03/2022 07:39, Jan Beulich wrote:
> On 04.03.2022 18:46, Marco Solieri wrote:
>> From: Luca Miccio <lucmiccio@gmail.com>
>>
>> Introduce two new arm specific functions to temporarily map/unmap the
>> Xen text read-write (the Xen text is mapped read-only by default by
>> setup_pagetables): xen_map_text_rw and xen_unmap_text_rw.
>>
>> There is only one caller in the alternative framework.
>>
>> The non-colored implementation simply uses __vmap to do the mapping. In
>> other words, there are no changes to the non-colored case.
>>
>> The colored implementation calculates Xen text physical addresses
>> appropriately, according to the coloring configuration.
>>
>> Export vm_alloc because it is needed by the colored implementation of
>> xen_map_text_rw.
> 
> I'm afraid I view vm_alloc() as strictly an internal function to
> vmap.c. Even livepatching infrastructure has got away without making
> it non-static.

I think we can get away from using vmap() here. We were using it because 
Xen text mappings are RX and this is enforced by the processor via 
SCTLR_EL1.WXN.

The bit is cached in the TLB. Back then it wasn't very clear what would 
happen if we clear the bit. Looking at the latest Arm Arm (ARM DDI 
0487H.a D5.10), there is now a section "TLB invalidation and System 
register control fields" providing more details.

Reading the section, it should be safe to temporary disable WXN on every 
CPUs and make Xen text writable.

@Marco, would you be able to have a look?

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 11 22:53:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 11 Mar 2022 22:53:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289278.490793 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSo8O-00017Z-Gt; Fri, 11 Mar 2022 22:53:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289278.490793; Fri, 11 Mar 2022 22:53:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSo8O-00017S-Dt; Fri, 11 Mar 2022 22:53:20 +0000
Received: by outflank-mailman (input) for mailman id 289278;
 Fri, 11 Mar 2022 22:53:18 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSo8M-00017I-JW; Fri, 11 Mar 2022 22:53:18 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSo8M-0002nN-Fn; Fri, 11 Mar 2022 22:53:18 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSo8L-0004eK-VM; Fri, 11 Mar 2022 22:53:18 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSo8L-0007KU-Ud; Fri, 11 Mar 2022 22:53:17 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=mvYVF5vs1juSJM4DbsiJeVzZsACu8j+BrV4xRJQC4F0=; b=b4s5Mp/SxLdE1ihmYBAqVCS+hT
	uqHGgbVVabuzWzJtHYEx2XGncEu5d+v8rwbY8f+iiPgt8LEvyiFzaLUKR5Be08keKNYenwh+RcfUQ
	AFNkAC2e0aNgC4DvkfqaqEPEhKgGofBjBXHvqPcskzzHnJshMlFAMjwfPJucKEKbDaEA=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168513-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.16-testing test] 168513: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-4.16-testing:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=cfd29b83a26f35f49f074f06169ce4cadfdebf0d
X-Osstest-Versions-That:
    xen=ee4d66242eef4d4c4215a432dece577093bfcbbc
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 11 Mar 2022 22:53:17 +0000

flight 168513 xen-4.16-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168513/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168503
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168503
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168503
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168503
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168503
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168503
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168503
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168503
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168503
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168503
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168503
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168503
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  cfd29b83a26f35f49f074f06169ce4cadfdebf0d
baseline version:
 xen                  ee4d66242eef4d4c4215a432dece577093bfcbbc

Last test of basis   168503  2022-03-10 09:07:57 Z    1 days
Testing same since   168513  2022-03-11 05:13:34 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Julien Grall <jgrall@amazon.com>
  Luca Fancellu <luca.fancellu@arm.com>
  Michal Orzel <michal.orzel@arm.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   ee4d66242e..cfd29b83a2  cfd29b83a26f35f49f074f06169ce4cadfdebf0d -> stable-4.16


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 00:11:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 00:11:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289289.490816 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSpLT-0001K1-Pj; Sat, 12 Mar 2022 00:10:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289289.490816; Sat, 12 Mar 2022 00:10:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSpLT-0001Ju-Mq; Sat, 12 Mar 2022 00:10:55 +0000
Received: by outflank-mailman (input) for mailman id 289289;
 Sat, 12 Mar 2022 00:10:53 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=b/J2=TX=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nSpLR-0001Jo-C8
 for xen-devel@lists.xenproject.org; Sat, 12 Mar 2022 00:10:53 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org
 [2604:1380:4601:e00::1])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id defbd0ed-a198-11ec-853a-5f4723681683;
 Sat, 12 Mar 2022 01:10:50 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 2CB43B82C21;
 Sat, 12 Mar 2022 00:10:48 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 26A5DC340E9;
 Sat, 12 Mar 2022 00:10:46 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: defbd0ed-a198-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647043846;
	bh=un05KrbSExi2lS3SOxJs4EWHqYhMcbhCOOiV/xaAIEs=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=lBk8VH8DiFvuya/0IiYUD2Vtw5inlXzb+SBP00K7JZvm2UBZ6lov5sYDw0mouYDL+
	 MX6V3b2tBfWWd0ssX9iGCfasvzbpnbreH3+7o/uAQTOIsU6JjH3U3uXIC/F+4anevM
	 Q4o+Kv83hRyHKSH0VLo5u9k3LRMruNlRJYIqk0nE45JQi+Ig/OzLrEtxABhhOHoLTQ
	 XZ0HHOrMqXmtl/nO0o7WfwVKcGT5gofdGPc/pzmj3RnqZ1myELfsoz2phXF731Oqp+
	 gN+LwOcnFXTVcuX3WizAXprQ4W5UZr1HXJ5q9I2brBFIJOVXQD34/PABmzMPdf5J7e
	 YMEZRDFEy20zQ==
Date: Fri, 11 Mar 2022 16:10:45 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Luca Fancellu <Luca.Fancellu@arm.com>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    Xen-devel <xen-devel@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>, 
    Julien Grall <julien@xen.org>, Bertrand Marquis <Bertrand.Marquis@arm.com>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, 
    Andrew Cooper <andrew.cooper3@citrix.com>, 
    George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, 
    Wei Liu <wl@xen.org>, Juergen Gross <jgross@suse.com>, 
    Dario Faggioli <dfaggioli@suse.com>
Subject: Re: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
In-Reply-To: <A34CF75A-8139-4A4A-A1AE-3BA74E70DE55@arm.com>
Message-ID: <alpine.DEB.2.22.394.2203111600330.3497@ubuntu-linux-20-04-desktop>
References: <20220310171019.6170-1-luca.fancellu@arm.com> <20220310171019.6170-5-luca.fancellu@arm.com> <alpine.DEB.2.22.394.2203101957370.3497@ubuntu-linux-20-04-desktop> <A34CF75A-8139-4A4A-A1AE-3BA74E70DE55@arm.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: multipart/mixed; BOUNDARY="8323329-622300958-1647043522=:3497"
Content-ID: <alpine.DEB.2.22.394.2203111606200.3497@ubuntu-linux-20-04-desktop>

  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--8323329-622300958-1647043522=:3497
Content-Type: text/plain; CHARSET=UTF-8
Content-Transfer-Encoding: 8BIT
Content-ID: <alpine.DEB.2.22.394.2203111606201.3497@ubuntu-linux-20-04-desktop>

On Fri, 11 Mar 2022, Luca Fancellu wrote:
> > On Thu, 10 Mar 2022, Luca Fancellu wrote:
> >> Introduce a way to create different cpupools at boot time, this is
> >> particularly useful on ARM big.LITTLE system where there might be the
> >> need to have different cpupools for each type of core, but also
> >> systems using NUMA can have different cpu pools for each node.
> >> 
> >> The feature on arm relies on a specification of the cpupools from the
> >> device tree to build pools and assign cpus to them.
> >> 
> >> Documentation is created to explain the feature.
> >> 
> >> Signed-off-by: Luca Fancellu <luca.fancellu@arm.com>
> >> ---
> >> Changes in v2:
> >> - Move feature to common code (Juergen)
> >> - Try to decouple dtb parse and cpupool creation to allow
> >>  more way to specify cpupools (for example command line)
> >> - Created standalone dt node for the scheduler so it can
> >>  be used in future work to set scheduler specific
> >>  parameters
> >> - Use only auto generated ids for cpupools
> >> ---
> >> docs/misc/arm/device-tree/cpupools.txt | 156 ++++++++++++++++++
> >> xen/common/Kconfig                     |   8 +
> >> xen/common/Makefile                    |   1 +
> >> xen/common/boot_cpupools.c             | 212 +++++++++++++++++++++++++
> >> xen/common/sched/cpupool.c             |   6 +-
> >> xen/include/xen/sched.h                |  19 +++
> >> 6 files changed, 401 insertions(+), 1 deletion(-)
> >> create mode 100644 docs/misc/arm/device-tree/cpupools.txt
> >> create mode 100644 xen/common/boot_cpupools.c
> >> 
> >> diff --git a/docs/misc/arm/device-tree/cpupools.txt b/docs/misc/arm/device-tree/cpupools.txt
> >> new file mode 100644
> >> index 000000000000..d5a82ed0d45a
> >> --- /dev/null
> >> +++ b/docs/misc/arm/device-tree/cpupools.txt
> >> @@ -0,0 +1,156 @@
> >> +Boot time cpupools
> >> +==================
> >> +
> >> +When BOOT_TIME_CPUPOOLS is enabled in the Xen configuration, it is possible to
> >> +create cpupools during boot phase by specifying them in the device tree.
> >> +
> >> +Cpupools specification nodes shall be direct childs of /chosen node.
> >> +Each cpupool node contains the following properties:
> >> +
> >> +- compatible (mandatory)
> >> +
> >> +    Must always include the compatiblity string: "xen,cpupool".
> >> +
> >> +- cpupool-cpus (mandatory)
> >> +
> >> +    Must be a list of device tree phandle to nodes describing cpus (e.g. having
> >> +    device_type = "cpu"), it can't be empty.
> >> +
> >> +- cpupool-sched (optional)
> >> +
> >> +    Must be a device tree phandle to a node having "xen,scheduler" compatible
> >> +    (description below), it has no effect when the cpupool refers to the cpupool
> >> +    number zero, in that case the default Xen scheduler is selected (sched=<...>
> >> +    boot argument).
> > 
> > This is *a lot* better.
> > 
> > The device tree part is nice. I have only one question left on it: why
> > do we need a separate scheduler node? Could the "cpupool-sched" property
> > be a simple string with the scheduler name?
> > 
> > E.g.:
> > 
> >    cpupool_a {
> >        compatible = "xen,cpupool";
> >        cpupool-cpus = <&a53_1 &a53_2>;
> >    };
> >    cpupool_b {
> >        compatible = "xen,cpupool";
> >        cpupool-cpus = <&a72_1 &a72_2>;
> >        cpupool-sched = "null";
> >    };
> > 
> > 
> > To me, it doesn't look like these new "scheduler specification nodes"
> > bring any benefits. I would just get rid of them.
> 
> From a comment of Juergen on the second patch I thought someone sees the need to
> have a way to set scheduling parameters:
> 
> “you are allowing to use another scheduler,
> but what if someone wants to set non-standard scheduling parameters
> (e.g. another time slice)?”
> 
> So I thought I could introduce a scheduler specification node that could in the future be
> extended and used to set scheduling parameter.
> 
> If it is something that is not needed, I will get rid of it.

I think you should get rid of it because it doesn't help. For instance,
if two cpupools want to use the same scheduler but with different
parameters we would end up with two different scheduler nodes.

Instead, in the future we could have one or more sched-params properties
as needed in the cpupools node to specify scheduler parameters.

 
> >> +A scheduler specification node is a device tree node that contains the following
> >> +properties:
> >> +
> >> +- compatible (mandatory)
> >> +
> >> +    Must always include the compatiblity string: "xen,scheduler".
> >> +
> >> +- sched-name (mandatory)
> >> +
> >> +    Must be a string having the name of a Xen scheduler, check the sched=<...>
> >> +    boot argument for allowed values.
> >> +
> >> +
> >> +Constraints
> >> +===========
> >> +
> >> +If no cpupools are specified, all cpus will be assigned to one cpupool
> >> +implicitly created (Pool-0).
> >> +
> >> +If cpupools node are specified, but not every cpu brought up by Xen is assigned,
> >> +all the not assigned cpu will be assigned to an additional cpupool.
> >> +
> >> +If a cpu is assigned to a cpupool, but it's not brought up correctly, Xen will
> >> +stop.
> >> +
> >> +
> >> +Examples
> >> +========
> >> +
> >> +A system having two types of core, the following device tree specification will
> >> +instruct Xen to have two cpupools:
> >> +
> >> +- The cpupool with id 0 will have 4 cpus assigned.
> >> +- The cpupool with id 1 will have 2 cpus assigned.
> >> +
> >> +The following example can work only if hmp-unsafe=1 is passed to Xen boot
> >> +arguments, otherwise not all cores will be brought up by Xen and the cpupool
> >> +creation process will stop Xen.
> >> +
> >> +
> >> +a72_1: cpu@0 {
> >> +        compatible = "arm,cortex-a72";
> >> +        reg = <0x0 0x0>;
> >> +        device_type = "cpu";
> >> +        [...]
> >> +};
> >> +
> >> +a72_2: cpu@1 {
> >> +        compatible = "arm,cortex-a72";
> >> +        reg = <0x0 0x1>;
> >> +        device_type = "cpu";
> >> +        [...]
> >> +};
> >> +
> >> +a53_1: cpu@100 {
> >> +        compatible = "arm,cortex-a53";
> >> +        reg = <0x0 0x100>;
> >> +        device_type = "cpu";
> >> +        [...]
> >> +};
> >> +
> >> +a53_2: cpu@101 {
> >> +        compatible = "arm,cortex-a53";
> >> +        reg = <0x0 0x101>;
> >> +        device_type = "cpu";
> >> +        [...]
> >> +};
> >> +
> >> +a53_3: cpu@102 {
> >> +        compatible = "arm,cortex-a53";
> >> +        reg = <0x0 0x102>;
> >> +        device_type = "cpu";
> >> +        [...]
> >> +};
> >> +
> >> +a53_4: cpu@103 {
> >> +        compatible = "arm,cortex-a53";
> >> +        reg = <0x0 0x103>;
> >> +        device_type = "cpu";
> >> +        [...]
> >> +};
> >> +
> >> +chosen {
> >> +
> >> +    sched: sched_a {
> >> +        compatible = "xen,scheduler";
> >> +        sched-name = "credit2";
> >> +    };
> >> +    cpupool_a {
> >> +        compatible = "xen,cpupool";
> >> +        cpupool-cpus = <&a53_1 &a53_2 &a53_3 &a53_4>;
> >> +    };
> >> +    cpupool_b {
> >> +        compatible = "xen,cpupool";
> >> +        cpupool-cpus = <&a72_1 &a72_2>;
> >> +        cpupool-sched = <&sched>;
> >> +    };
> >> +
> >> +    [...]
> >> +
> >> +};
> >> +
> >> +
> >> +A system having the cpupools specification below will instruct Xen to have three
> >> +cpupools:
> >> +
> >> +- The cpupool Pool-0 will have 2 cpus assigned.
> >> +- The cpupool Pool-1 will have 2 cpus assigned.
> >> +- The cpupool Pool-2 will have 2 cpus assigned (created by Xen with all the not
> >> +  assigned cpus a53_3 and a53_4).
> >> +
> >> +chosen {
> >> +
> >> +    sched: sched_a {
> >> +        compatible = "xen,scheduler";
> >> +        sched-name = "null";
> >> +    };
> >> +    cpupool_a {
> >> +        compatible = "xen,cpupool";
> >> +        cpupool-cpus = <&a53_1 &a53_2>;
> >> +    };
> >> +    cpupool_b {
> >> +        compatible = "xen,cpupool";
> >> +        cpupool-cpus = <&a72_1 &a72_2>;
> >> +        cpupool-sched = <&sched>;
> >> +    };
> >> +
> >> +    [...]
> >> +
> >> +};
> >> \ No newline at end of file
> >> diff --git a/xen/common/Kconfig b/xen/common/Kconfig
> >> index 64439438891c..dc9eed31682f 100644
> >> --- a/xen/common/Kconfig
> >> +++ b/xen/common/Kconfig
> >> @@ -22,6 +22,14 @@ config GRANT_TABLE
> >> 
> >> 	  If unsure, say Y.
> >> 
> >> +config BOOT_TIME_CPUPOOLS
> >> +	bool "Create cpupools at boot time"
> >> +	depends on HAS_DEVICE_TREE
> >> +	default n
> >> +	help
> >> +	  Creates cpupools during boot time and assigns cpus to them. Cpupools
> >> +	  options can be specified in the device tree.
> >> +
> >> config ALTERNATIVE_CALL
> >> 	bool
> >> 
> >> diff --git a/xen/common/Makefile b/xen/common/Makefile
> >> index dc8d3a13f5b8..c5949785ab28 100644
> >> --- a/xen/common/Makefile
> >> +++ b/xen/common/Makefile
> >> @@ -1,5 +1,6 @@
> >> obj-$(CONFIG_ARGO) += argo.o
> >> obj-y += bitmap.o
> >> +obj-$(CONFIG_BOOT_TIME_CPUPOOLS) += boot_cpupools.o
> >> obj-$(CONFIG_HYPFS_CONFIG) += config_data.o
> >> obj-$(CONFIG_CORE_PARKING) += core_parking.o
> >> obj-y += cpu.o
> >> diff --git a/xen/common/boot_cpupools.c b/xen/common/boot_cpupools.c
> >> new file mode 100644
> >> index 000000000000..e8529a902d21
> >> --- /dev/null
> >> +++ b/xen/common/boot_cpupools.c
> >> @@ -0,0 +1,212 @@
> >> +/* SPDX-License-Identifier: GPL-2.0 */
> >> +/*
> >> + * xen/common/boot_cpupools.c
> >> + *
> >> + * Code to create cpupools at boot time for arm architecture.
> >> + *
> >> + * Copyright (C) 2022 Arm Ltd.
> >> + */
> >> +
> >> +#include <xen/sched.h>
> >> +
> >> +#define BTCPUPOOLS_DT_NODE_NO_REG     (-1)
> >> +#define BTCPUPOOLS_DT_NODE_NO_LOG_CPU (-2)
> >> +
> >> +struct pool_map {
> >> +    int pool_id;
> >> +    int sched_id;
> >> +    struct cpupool *pool;
> >> +};
> >> +
> >> +static struct pool_map __initdata pool_cpu_map[NR_CPUS] =
> >> +    { [0 ... NR_CPUS-1] = {.pool_id = -1, .sched_id = -1, .pool = NULL} };
> >> +static unsigned int __initdata next_pool_id;
> >> +
> >> +#ifdef CONFIG_ARM
> >> +static int __init get_logical_cpu_from_hw_id(unsigned int hwid)
> >> +{
> >> +    unsigned int i;
> >> +
> >> +    for ( i = 0; i < nr_cpu_ids; i++ )
> >> +        if ( cpu_logical_map(i) == hwid )
> >> +            return i;
> >> +
> >> +    return -1;
> >> +}
> >> +
> >> +static int __init
> >> +get_logical_cpu_from_cpu_node(const struct dt_device_node *cpu_node)
> >> +{
> >> +    unsigned int cpu_reg, cpu_num;
> >> +    const __be32 *prop;
> >> +
> >> +    prop = dt_get_property(cpu_node, "reg", NULL);
> >> +    if ( !prop )
> >> +        return BTCPUPOOLS_DT_NODE_NO_REG;
> >> +
> >> +    cpu_reg = dt_read_number(prop, dt_n_addr_cells(cpu_node));
> >> +
> >> +    cpu_num = get_logical_cpu_from_hw_id(cpu_reg);
> >> +    if ( cpu_num < 0 )
> >> +        return BTCPUPOOLS_DT_NODE_NO_LOG_CPU;
> >> +
> >> +    return cpu_num;
> >> +}
> >> +
> >> +static int __init check_and_get_sched_id(const char* scheduler_name)
> >> +{
> >> +    int sched_id = sched_get_id_by_name(scheduler_name);
> >> +
> >> +    if ( sched_id < 0 )
> >> +        panic("Scheduler %s does not exists!\n", scheduler_name);
> >> +
> >> +    return sched_id;
> >> +}
> >> +
> >> +void __init btcpupools_dtb_parse(void)
> >> +{
> >> +    const struct dt_device_node *chosen, *node;
> >> +
> >> +    chosen = dt_find_node_by_path("/chosen");
> >> +    if ( !chosen )
> >> +        return;
> >> +
> >> +    dt_for_each_child_node(chosen, node)
> >> +    {
> >> +        const struct dt_device_node *phandle_node;
> >> +        int sched_id = -1;
> >> +        const char* scheduler_name;
> >> +        unsigned int i = 0;
> >> +
> >> +        if ( !dt_device_is_compatible(node, "xen,cpupool") )
> >> +            continue;
> >> +
> >> +        phandle_node = dt_parse_phandle(node, "cpupool-sched", 0);
> >> +        if ( phandle_node )
> >> +        {
> >> +            if ( !dt_device_is_compatible(phandle_node, "xen,scheduler") )
> >> +                panic("cpupool-sched must be a xen,scheduler compatible"
> >> +                      "node!\n");
> >> +            if ( !dt_property_read_string(phandle_node, "sched-name",
> >> +                                          &scheduler_name) )
> >> +                sched_id = check_and_get_sched_id(scheduler_name);
> >> +            else
> >> +                panic("Error trying to read sched-name in %s!\n",
> >> +                      dt_node_name(phandle_node));
> >> +        }
> > 
> > it doesn't look like the "xen,scheduler" nodes are very useful from a dt
> > parsing perspective either
> > 
> > 
> >> +        phandle_node = dt_parse_phandle(node, "cpupool-cpus", i++);
> >> +        if ( !phandle_node )
> >> +            panic("Missing or empty cpupool-cpus property!\n");
> >> +
> >> +        while ( phandle_node )
> >> +        {
> >> +            int cpu_num;
> >> +
> >> +            cpu_num = get_logical_cpu_from_cpu_node(phandle_node);
> >> +
> >> +            if ( cpu_num < 0 )
> >> +                panic("Error retrieving logical cpu from node %s (%d)\n",
> >> +                      dt_node_name(node), cpu_num);
> >> +
> >> +            if ( pool_cpu_map[cpu_num].pool_id != -1 )
> >> +                panic("Logical cpu %d already added to a cpupool!\n", cpu_num);
> >> +
> >> +            pool_cpu_map[cpu_num].pool_id = next_pool_id;
> >> +            pool_cpu_map[cpu_num].sched_id = sched_id;
> >> +
> >> +            phandle_node = dt_parse_phandle(node, "cpupool-cpus", i++);
> >> +        }
> >> +
> >> +        /* Let Xen generate pool ids */
> >> +        next_pool_id++;
> >> +    }
> >> +}
> >> +#endif
> >> +
> >> +void __init btcpupools_allocate_pools(const cpumask_t *cpu_online_map)
> >> +{
> >> +    unsigned int cpu_num;
> >> +
> >> +    /*
> >> +     * If there are no cpupools, the value of next_pool_id is zero, so the code
> >> +     * below will assign every cpu to cpupool0 as the default behavior.
> >> +     * When there are cpupools, the code below is assigning all the not
> >> +     * assigned cpu to a new pool (next_pool_id value is the last id + 1).
> >> +     * In the same loop we check if there is any assigned cpu that is not
> >> +     * online.
> >> +     */
> >> +    for ( cpu_num = 0; cpu_num < nr_cpu_ids; cpu_num++ )
> >> +        if ( cpumask_test_cpu(cpu_num, cpu_online_map) )
> >> +        {
> >> +            if ( pool_cpu_map[cpu_num].pool_id < 0 )
> >> +                pool_cpu_map[cpu_num].pool_id = next_pool_id;
> >> +        }
> >> +        else
> > 
> > Please add { }
> > 
> > 
> >> +            if ( pool_cpu_map[cpu_num].pool_id >= 0 )
> >> +                panic("Pool-%d contains cpu%u that is not online!\n",
> >> +                      pool_cpu_map[cpu_num].pool_id, cpu_num);
> > 
> > 
> > 
> >> +#ifdef CONFIG_X86
> >> +    /* Cpu0 must be in cpupool0 for x86 */
> >> +    if ( pool_cpu_map[0].pool_id != 0 )
> > 
> > Is that even possible on x86 given that btcpupools_dtb_parse cannot even
> > run on x86?
> > 
> > If it is not possible, I would remove the code below and simply panic
> > instead.
> 
> Currently x86 doesn’t have a way to specify cpupools, so for now on x86 there will
> be only cpupool 0 with every cpu attached, I thought I had to handle the case if in
> the future someone adds a way to specify cpupools (cmdline?).
> If you think this should be handled only by who implements that feature, I will remove
> completely the block.
 
In general, it is good to try to make the code as generally useful as
possible. However, it needs to be testable. In this case, this code is
basically dead code because there is no way to trigger it. So I suggest
to remove it and replace it with a panic.
 
 
> >> +    {
> >> +        /* The cpupool containing cpu0 will become cpupool0 */
> >> +        unsigned int swap_id = pool_cpu_map[0].pool_id;
> >> +        for_each_cpu ( cpu_num, cpu_online_map )
> >> +            if ( pool_cpu_map[cpu_num].pool_id == swap_id )
> >> +                pool_cpu_map[cpu_num].pool_id = 0;
> >> +            else if ( pool_cpu_map[cpu_num].pool_id == 0 )
> >> +                pool_cpu_map[cpu_num].pool_id = swap_id;
> >> +    }
> >> +#endif
> >> +
> >> +    for_each_cpu ( cpu_num, cpu_online_map )
> >> +    {
> >> +        struct cpupool *pool = NULL;
> >> +        int pool_id, sched_id;
> >> +
> >> +        pool_id = pool_cpu_map[cpu_num].pool_id;
> >> +        sched_id = pool_cpu_map[cpu_num].sched_id;
> >> +
> >> +        if ( pool_id )
> >> +        {
> >> +            unsigned int i;
> >> +
> >> +            /* Look for previously created pool with id pool_id */
> >> +            for ( i = 0; i < cpu_num; i++ )
> > 
> > Please add { }
> > 
> > But actually, the double loop seems a bit excessive for this. Could we
> > just have a single loop to cpupool_create_pool from 0 to next_pool_id?
> > 
> > We could get rid of pool_cpu_map[i].pool and just rely on
> > pool_cpu_map[i].pool_id. No need to update pool_cpu_map[i].pool if we
> > get rid of it: it doesn't look like it is very useful anyway?
> 
> Yes we could create all the cpupools in a loop easily, but to retrieve the pointer
> from the cpupool list I would need something, I can make public this function:
> 
> static struct cpupool *cpupool_find_by_id(unsigned int poolid)
> 
> from cpupool.c to get the pointer from the pool id, do you think it can be ok?

Yes I think that is a better option if Juergen agrees.
--8323329-622300958-1647043522=:3497--


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 01:18:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 01:18:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289296.490828 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSqOB-0004lt-Ow; Sat, 12 Mar 2022 01:17:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289296.490828; Sat, 12 Mar 2022 01:17:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSqOB-0004lm-Lt; Sat, 12 Mar 2022 01:17:47 +0000
Received: by outflank-mailman (input) for mailman id 289296;
 Sat, 12 Mar 2022 01:17:46 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=b/J2=TX=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nSqOA-0004lg-Mm
 for xen-devel@lists.xenproject.org; Sat, 12 Mar 2022 01:17:46 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 378acdc2-a1a2-11ec-853a-5f4723681683;
 Sat, 12 Mar 2022 02:17:44 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 93270615ED;
 Sat, 12 Mar 2022 01:17:42 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8EADDC340EE;
 Sat, 12 Mar 2022 01:17:41 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 378acdc2-a1a2-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647047862;
	bh=2ObVLuOCpMk+7o7YQ4gxe9MMFce7y/gHB5VcRv/DxBw=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=QyFuQqfV4nU4vgMGxc0D9WrEtMwNSsOWku4RheIVdyLo2lsrchbAZY3UOfa3fBnn2
	 jF2cwFf/fJC1pF005pZm4SQGqNb3MDJfQvZ9RgRa01ZMVumsi48OJdc61VCfQ8C2Tp
	 A1yFdYgKW6JxBfcA6s/oQWGaPSs/+A1RwIkyKxB+WcouRtmhSbtn+J3LV+JfqFdNVW
	 0L4gU0rosfEgJUp5K7Hzlj0emKAcwwTN2pSjsC7Fwdn3lqGbckqeOqNpi3q1yWEkGz
	 LkTtCKh5csJhPNCr6f1eXIOZx/GaizA402W7/OeZfXCyfAWAv3sFcTVeeOpX/ZM4uf
	 QWCg6SQUMBinA==
Date: Fri, 11 Mar 2022 17:17:40 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Julien Grall <julien@xen.org>
cc: xen-devel@lists.xenproject.org, marco.solieri@minervasys.tech, 
    lucmiccio@gmail.com, Julien Grall <jgrall@amazon.com>, 
    Stefano Stabellini <sstabellini@kernel.org>, 
    Bertrand Marquis <bertrand.marquis@arm.com>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH early-RFC 4/5] xen/arm: mm: Rework switch_ttbr()
In-Reply-To: <20220309112048.17377-5-julien@xen.org>
Message-ID: <alpine.DEB.2.22.394.2203111710300.3497@ubuntu-linux-20-04-desktop>
References: <20220309112048.17377-1-julien@xen.org> <20220309112048.17377-5-julien@xen.org>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Wed, 9 Mar 2022, Julien Grall wrote:
> From: Julien Grall <jgrall@amazon.com>
> 
> At the moment, switch_ttbr() is switching the TTBR whilst the MMU is
> still on.
> 
> Switching TTBR is like replacing existing mappings with new ones. So
> we need to follow the break-before-make sequence.
> 
> In this case, it means the MMU needs to be switched off while the
> TTBR is updated. In order to disable the MMU, we need to first
> jump to an identity mapping.
> 
> Rename switch_ttbr() to switch_ttbr_id() and create an helper on
> top to temporary map the identity mapping and call switch_ttbr()
> via the identity address.
> 
> switch_ttbr_id() is now reworked to temporarily turn off the MMU
> before updating the TTBR.
> 
> We also need to make sure the helper switch_ttbr() is part of the
> identity mapping. So move _end_boot past it.
> 
> Take the opportunity to instruction cache flush as the operation is
> only necessary when the memory is updated.
> 
> Signed-off-by: Julien Grall <jgrall@amazon.com>
> 
> ---
> 
>     TODO:
>         * Rename _end_boot to _end_id_mapping or similar
>         * Check the memory barriers
>         * I suspect the instruction cache flush will be necessary
>           for cache coloring.
> ---
>  xen/arch/arm/arm64/head.S | 31 ++++++++++++++++++++-----------
>  xen/arch/arm/mm.c         | 14 +++++++++++++-
>  2 files changed, 33 insertions(+), 12 deletions(-)
> 
> diff --git a/xen/arch/arm/arm64/head.S b/xen/arch/arm/arm64/head.S
> index 878649280d73..c5cc72b8fe6f 100644
> --- a/xen/arch/arm/arm64/head.S
> +++ b/xen/arch/arm/arm64/head.S
> @@ -803,36 +803,45 @@ fail:   PRINT("- Boot failed -\r\n")
>          b     1b
>  ENDPROC(fail)
>  
> -GLOBAL(_end_boot)
> -
>  /*
>   * Switch TTBR
>   *
>   * x0    ttbr
>   *
> - * TODO: This code does not comply with break-before-make.
> + * XXX: Check the barriers
>   */
> -ENTRY(switch_ttbr)
> +ENTRY(switch_ttbr_id)
>          dsb   sy                     /* Ensure the flushes happen before
>                                        * continuing */
>          isb                          /* Ensure synchronization with previous
>                                        * changes to text */
> +
> +        /* Turn off MMU */
> +        mrs    x1, SCTLR_EL2
> +        bic    x1, x1, #SCTLR_Axx_ELx_M
> +        msr    SCTLR_EL2, x1
> +        dsb    sy
> +        isb
> +
>          tlbi   alle2                 /* Flush hypervisor TLB */
> -        ic     iallu                 /* Flush I-cache */
>          dsb    sy                    /* Ensure completion of TLB flush */
>          isb
>  
> -        msr    TTBR0_EL2, x0
> +        msr   TTBR0_EL2, x0
> +
> +        mrs   x1, SCTLR_EL2
> +        orr   x1, x1, #SCTLR_Axx_ELx_M  /* Enable MMU */
> +        msr   SCTLR_EL2, x1
>  
>          isb                          /* Ensure synchronization with previous
>                                        * changes to text */
> -        tlbi   alle2                 /* Flush hypervisor TLB */
> -        ic     iallu                 /* Flush I-cache */
> -        dsb    sy                    /* Ensure completion of TLB flush */
> -        isb
> +        /* Turn on the MMU */
> +
>  
>          ret
> -ENDPROC(switch_ttbr)
> +ENDPROC(switch_ttbr_id)
> +
> +GLOBAL(_end_boot)
>  
>  #ifdef CONFIG_EARLY_PRINTK
>  /*
> diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
> index 5c4dece16f7f..a53760af7af0 100644
> --- a/xen/arch/arm/mm.c
> +++ b/xen/arch/arm/mm.c
> @@ -660,7 +660,19 @@ static void xen_pt_enforce_wnx(void)
>      flush_xen_tlb_local();
>  }
>  
> -extern void switch_ttbr(uint64_t ttbr);
> +extern void switch_ttbr_id(uint64_t ttbr);
> +
> +typedef void (switch_ttbr_fn)(uint64_t ttbr);
> +
> +static void switch_ttbr(uint64_t ttbr)
> +{
> +    vaddr_t id_addr = virt_to_maddr(switch_ttbr_id);
> +    switch_ttbr_fn *fn = (switch_ttbr_fn *)id_addr;
> +
> +    update_identity_mapping(true);
> +    fn(ttbr);
> +    update_identity_mapping(false);
> +}

As far as I can tell this should work for coloring too. In the case of
coloring:

    /* running on the old mapping, same as non-coloring */
    update_identity_mapping(true);

    /* jumping to the 1:1 mapping of the old Xen and switching to the
     * new pagetable */
    fn(ttbr);

    /* new pagetable is enabled, now we are back to addresses greater
     * than XEN_VIRT_START, which correspond to new cache-colored Xen */
    update_identity_mapping(false);


The only doubt that I have is: are we sure than a single page of 1:1
mapping is enough? What if:

virt_to_maddr(switch_ttbr_id) - virt_to_maddr(_start) > PAGE_SIZE


We might have to do a 1:1 mapping of size = _end-_start. It would work
with coloring too because we are doing a 1:1 mapping of the old copy of
Xen which is non-colored and contiguous (not the new copy which is
colored and fragmented).


Thanks Julien very much for your help!


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 01:32:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 01:32:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289300.490839 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSqbx-00073c-40; Sat, 12 Mar 2022 01:32:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289300.490839; Sat, 12 Mar 2022 01:32:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSqbw-00073V-Uw; Sat, 12 Mar 2022 01:32:00 +0000
Received: by outflank-mailman (input) for mailman id 289300;
 Sat, 12 Mar 2022 01:31:59 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=b/J2=TX=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nSqbv-00073P-6G
 for xen-devel@lists.xenproject.org; Sat, 12 Mar 2022 01:31:59 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 34c0402b-a1a4-11ec-8eba-a37418f5ba1a;
 Sat, 12 Mar 2022 02:31:57 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 9878EB82C0F;
 Sat, 12 Mar 2022 01:31:56 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id CF2E6C340E9;
 Sat, 12 Mar 2022 01:31:54 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 34c0402b-a1a4-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647048715;
	bh=CXK5Q7puLgFc5u6bvpSQ6R2EKfCDS2Td2kizgzyjcEY=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=PS5gfpPmk1iYPt0Lbqyom6thPCShkNODRoz9iC/3p19yYkE2+9rg600YTTGiH3voA
	 wtN6dNxOveBaWMbYr/s3lXlJPGFAFXzVfn56L2XZKtR48N3Qb3DLQNJ2B0gWoWk6X0
	 i7Tce3d1VcRZ6Jznxl/RlRlbf/nRmU6Q2aLWb9Bl7y7nBgPkJAf2orPD9H2EXEoV19
	 1qYStP+xl1YHZaC2ezvV0fVDUpIrFk5+dktWmNQ9Mp5QgROgz82ioKSkRGBmNGPTvA
	 okVTXxYbNbzX6gmHitSPlcvlI+fQiqZVSuo/sdwRlsgEBRR6FVzdRUH2vpvYKFDe3d
	 Ikt+och2/lxlw==
Date: Fri, 11 Mar 2022 17:31:53 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Julien Grall <julien@xen.org>
cc: xen-devel@lists.xenproject.org, marco.solieri@minervasys.tech, 
    lucmiccio@gmail.com, Julien Grall <jgrall@amazon.com>, 
    Stefano Stabellini <sstabellini@kernel.org>, 
    Bertrand Marquis <bertrand.marquis@arm.com>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH early-RFC 4/5] xen/arm: mm: Rework switch_ttbr()
In-Reply-To: <20220309112048.17377-5-julien@xen.org>
Message-ID: <alpine.DEB.2.22.394.2203111721130.3497@ubuntu-linux-20-04-desktop>
References: <20220309112048.17377-1-julien@xen.org> <20220309112048.17377-5-julien@xen.org>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Wed, 9 Mar 2022, Julien Grall wrote:
> From: Julien Grall <jgrall@amazon.com>
> 
> At the moment, switch_ttbr() is switching the TTBR whilst the MMU is
> still on.
> 
> Switching TTBR is like replacing existing mappings with new ones. So
> we need to follow the break-before-make sequence.
> 
> In this case, it means the MMU needs to be switched off while the
> TTBR is updated. In order to disable the MMU, we need to first
> jump to an identity mapping.
> 
> Rename switch_ttbr() to switch_ttbr_id() and create an helper on
> top to temporary map the identity mapping and call switch_ttbr()
> via the identity address.
> 
> switch_ttbr_id() is now reworked to temporarily turn off the MMU
> before updating the TTBR.
> 
> We also need to make sure the helper switch_ttbr() is part of the
> identity mapping. So move _end_boot past it.
> 
> Take the opportunity to instruction cache flush as the operation is
> only necessary when the memory is updated.
> 
> Signed-off-by: Julien Grall <jgrall@amazon.com>
> 
> ---
> 
>     TODO:
>         * Rename _end_boot to _end_id_mapping or similar
>         * Check the memory barriers
>         * I suspect the instruction cache flush will be necessary
>           for cache coloring.
> ---
>  xen/arch/arm/arm64/head.S | 31 ++++++++++++++++++++-----------
>  xen/arch/arm/mm.c         | 14 +++++++++++++-
>  2 files changed, 33 insertions(+), 12 deletions(-)
> 
> diff --git a/xen/arch/arm/arm64/head.S b/xen/arch/arm/arm64/head.S
> index 878649280d73..c5cc72b8fe6f 100644
> --- a/xen/arch/arm/arm64/head.S
> +++ b/xen/arch/arm/arm64/head.S
> @@ -803,36 +803,45 @@ fail:   PRINT("- Boot failed -\r\n")
>          b     1b
>  ENDPROC(fail)
>  
> -GLOBAL(_end_boot)
> -
>  /*
>   * Switch TTBR
>   *
>   * x0    ttbr
>   *
> - * TODO: This code does not comply with break-before-make.
> + * XXX: Check the barriers
>   */
> -ENTRY(switch_ttbr)
> +ENTRY(switch_ttbr_id)
>          dsb   sy                     /* Ensure the flushes happen before
>                                        * continuing */
>          isb                          /* Ensure synchronization with previous
>                                        * changes to text */
> +
> +        /* Turn off MMU */
> +        mrs    x1, SCTLR_EL2
> +        bic    x1, x1, #SCTLR_Axx_ELx_M
> +        msr    SCTLR_EL2, x1
> +        dsb    sy
> +        isb
> +
>          tlbi   alle2                 /* Flush hypervisor TLB */
> -        ic     iallu                 /* Flush I-cache */
>          dsb    sy                    /* Ensure completion of TLB flush */
>          isb
>  
> -        msr    TTBR0_EL2, x0
> +        msr   TTBR0_EL2, x0
> +
> +        mrs   x1, SCTLR_EL2
> +        orr   x1, x1, #SCTLR_Axx_ELx_M  /* Enable MMU */
> +        msr   SCTLR_EL2, x1
>  
>          isb                          /* Ensure synchronization with previous
>                                        * changes to text */
> -        tlbi   alle2                 /* Flush hypervisor TLB */
> -        ic     iallu                 /* Flush I-cache */
> -        dsb    sy                    /* Ensure completion of TLB flush */
> -        isb
> +        /* Turn on the MMU */
> +
>  
>          ret
> -ENDPROC(switch_ttbr)
> +ENDPROC(switch_ttbr_id)
> +
> +GLOBAL(_end_boot)
>  
>  #ifdef CONFIG_EARLY_PRINTK
>  /*
> diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
> index 5c4dece16f7f..a53760af7af0 100644
> --- a/xen/arch/arm/mm.c
> +++ b/xen/arch/arm/mm.c
> @@ -660,7 +660,19 @@ static void xen_pt_enforce_wnx(void)
>      flush_xen_tlb_local();
>  }
>  
> -extern void switch_ttbr(uint64_t ttbr);
> +extern void switch_ttbr_id(uint64_t ttbr);
> +
> +typedef void (switch_ttbr_fn)(uint64_t ttbr);
> +
> +static void switch_ttbr(uint64_t ttbr)
> +{
> +    vaddr_t id_addr = virt_to_maddr(switch_ttbr_id);
> +    switch_ttbr_fn *fn = (switch_ttbr_fn *)id_addr;
> +
> +    update_identity_mapping(true);
> +    fn(ttbr);
> +    update_identity_mapping(false);
> +}

Controversial question: does it really matter that XEN_VIRT_START >
512GB and that _start < 512GB?

I am totally fine with the limit, I am just brainstorming: given that
the mapping is used very temporarely, it wouldn't really be an issue if
it conflicts with something important. Let's say that it conflicts with
the VMAP or the FRAMETABLE. As long as:

- we save the current mapping
- update it with the Xen 1:1
- switch_ttbr
- remove Xen 1:1
- restore mapping

It should work, right? Basically, a mapping conflict shouldn't be an
issue given that the mapping has only to live long enough to call
switch_ttbr_id.

I am less sure about patch #5 but it doesn't seem it would be a problem
there either.

That said, I am totally fine with _start < 512GB.


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 02:01:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 02:01:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289304.490849 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSr4I-0002Go-Dx; Sat, 12 Mar 2022 02:01:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289304.490849; Sat, 12 Mar 2022 02:01:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSr4I-0002Gh-AO; Sat, 12 Mar 2022 02:01:18 +0000
Received: by outflank-mailman (input) for mailman id 289304;
 Sat, 12 Mar 2022 02:01:16 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=b/J2=TX=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nSr4G-0002Gb-Ra
 for xen-devel@lists.xenproject.org; Sat, 12 Mar 2022 02:01:16 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4c2fb323-a1a8-11ec-853a-5f4723681683;
 Sat, 12 Mar 2022 03:01:14 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 136E6B80EF1;
 Sat, 12 Mar 2022 02:01:14 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 69D59C340E9;
 Sat, 12 Mar 2022 02:01:12 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4c2fb323-a1a8-11ec-853a-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647050472;
	bh=jlJTQC9rL0Ohy92tmOfNWwQooasADfiPhpQpT96wHT8=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=fbl40iQmu8txLiFBKEbYE87/V1sERSDFH6uAO0+5GS7MChg26w54kZeRfO4Nzrwqj
	 ZbrLkjWJLk2TktdvkZwqaiRpn/Cu0ANALocft3bD+gI2aoYHndgi9m2ylD1KOqYteX
	 siqCfjrZ8kVfjYh7PsfBqBRfGTl0CQHcSE2UqD6dAbbgX47pPeLrvXuG5x5Dp0Ln4n
	 7H7YaPpX/4HKIPs1oOTUJYsCw5Syl/j4HbtAQIdiLQ6Iccwov3+zTQZsBeaiU96pJQ
	 iuH1YRvi3w7fzTFy/pacesE9nssq3TfFIbjhGBiHswZSZBPE4iENNXUQSnIN6t7PEx
	 bXd/T5MfXfOlw==
Date: Fri, 11 Mar 2022 18:01:11 -0800 (PST)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Miaoqian Lin <linmq006@gmail.com>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    Russell King <linux@armlinux.org.uk>, 
    Catalin Marinas <catalin.marinas@arm.com>, 
    Shannon Zhao <shannon.zhao@linaro.org>, 
    Julien Grall <julien.grall@arm.com>, xen-devel@lists.xenproject.org, 
    linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org
Subject: Re: [PATCH] arm/xen: Fix refcount leak in xen_dt_guest_init
In-Reply-To: <20220309102442.14726-1-linmq006@gmail.com>
Message-ID: <alpine.DEB.2.22.394.2203111756000.3497@ubuntu-linux-20-04-desktop>
References: <20220309102442.14726-1-linmq006@gmail.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Wed, 9 Mar 2022, Miaoqian Lin wrote:
> The of_find_compatible_node() function returns a node pointer with
> refcount incremented, We should use of_node_put() on it when done
> Add the missing of_node_put() to release the refcount.
> 
> Fixes: 9b08aaa3199a ("ARM: XEN: Move xen_early_init() before efi_init()")
> Signed-off-by: Miaoqian Lin <linmq006@gmail.com>

Thanks for the patch!


> ---
>  arch/arm/xen/enlighten.c | 1 +
>  1 file changed, 1 insertion(+)
> 
> diff --git a/arch/arm/xen/enlighten.c b/arch/arm/xen/enlighten.c
> index ec5b082f3de6..262f45f686b6 100644
> --- a/arch/arm/xen/enlighten.c
> +++ b/arch/arm/xen/enlighten.c
> @@ -424,6 +424,7 @@ static void __init xen_dt_guest_init(void)
>  
>  	if (of_address_to_resource(xen_node, GRANT_TABLE_INDEX, &res)) {
>  		pr_err("Xen grant table region is not found\n");
> +		of_node_put(xen_node);
>  		return;
>  	}

This is adding a call to of_node_put on the error path. Shouldn't it
be called also in the non-error path?

Also, there is another instance of of_address_to_resource being called
in this file (in arch_xen_unpopulated_init), does it make sense to call
of_node_put there too?


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 02:03:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 02:03:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289308.490861 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSr67-0002qI-RT; Sat, 12 Mar 2022 02:03:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289308.490861; Sat, 12 Mar 2022 02:03:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSr67-0002qB-No; Sat, 12 Mar 2022 02:03:11 +0000
Received: by outflank-mailman (input) for mailman id 289308;
 Sat, 12 Mar 2022 02:03:10 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSr66-0002pz-Gl; Sat, 12 Mar 2022 02:03:10 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSr66-00041k-Cz; Sat, 12 Mar 2022 02:03:10 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSr65-00054c-Uf; Sat, 12 Mar 2022 02:03:10 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSr65-0008JH-Tx; Sat, 12 Mar 2022 02:03:09 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=w+6TnwX76vflnq2nrHfpaKDMT6BpU8neLfGN+qI9KyM=; b=1ctfxFoQWVvitQDy1Aqae7NSXS
	b92KXr2XUzX8crzaOGoF4VZO22YbgUxM3I/H/reRz9tM17Mb6DANjs4oYmlTS6RpCw+H/3kbpHhcM
	eHUVJLo2JhoqLFhHWpLzBK4SHaHOyHlr9z8ueeHZxvRlBz/Vr3a1O32fsVi5VgoeGUPc=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168515-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-5.4 test] 168515: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-5.4:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:debian-hvm-install:fail:heisenbug
    linux-5.4:test-amd64-amd64-xl-rtds:guest-localmigrate/x10:fail:allowable
    linux-5.4:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=1346e17653a52c2042a486c7726f92e81481c8ec
X-Osstest-Versions-That:
    linux=e7d1268f5671aa524007f68f458aee185d93fa04
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 12 Mar 2022 02:03:09 +0000

flight 168515 linux-5.4 real [real]
flight 168520 linux-5.4 real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168515/
http://logs.test-lab.xenproject.org/osstest/logs/168520/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm 12 debian-hvm-install fail pass in 168520-retest

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-rtds     20 guest-localmigrate/x10   fail REGR. vs. 168485

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168485
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168485
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168485
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168485
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168485
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168485
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168485
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168485
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168485
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168485
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168485
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168485
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                1346e17653a52c2042a486c7726f92e81481c8ec
baseline version:
 linux                e7d1268f5671aa524007f68f458aee185d93fa04

Last test of basis   168485  2022-03-08 18:13:43 Z    3 days
Testing same since   168515  2022-03-11 10:43:35 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Alexei Starovoitov <ast@kernel.org>
  Borislav Petkov <bp@suse.de>
  Catalin Marinas <catalin.marinas@arm.com>
  Emmanuel Gil Peyrot <linkmauve@linkmauve.fr>
  Florian Fainelli <f.fainelli@gmail.com>
  Frank van der Linden <fllinden@amazon.com>
  Greg Kroah-Hartman <gregkh@linuxfoundation.org>
  Guenter Roeck <linux@roeck-us.net>
  Hulk Robot <hulkrobot@huawei.com>
  Jon Hunter <jonathanh@nvidia.com>
  Josh Poimboeuf <jpoimboe@redhat.com>
  Juergen Gross <jgross@suse.com>
  Kim Phillips <kim.phillips@amd.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Lorenzo Pieralisi <lorenzo.pieralisi@arm.com>
  Marc Zyngier <maz@kernel.org>
  Mark Rutland <mark.rutland@arm.com>
  Nathan Chancellor <nathan@kernel.org>
  Peter Zijlstra (Intel) <peterz@infradead.org>
  Peter Zijlstra <peterz@infradead.org>
  Russell King (Oracle) <rmk+kernel@armlinux.org.uk>
  Shuah Khan <skhan@linuxfoundation.org>
  Steven Price <steven.price@arm.com>
  Sudip Mukherjee <sudip.mukherjee@codethink.co.uk>
  Will Deacon <will.deacon@arm.com>
  Will Deacon <will@kernel.org>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 fail    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     fail    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   e7d1268f5671..1346e17653a5  1346e17653a52c2042a486c7726f92e81481c8ec -> tested/linux-5.4


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 03:26:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 03:26:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289320.490871 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSsOE-0002Ja-77; Sat, 12 Mar 2022 03:25:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289320.490871; Sat, 12 Mar 2022 03:25:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSsOE-0002JT-49; Sat, 12 Mar 2022 03:25:58 +0000
Received: by outflank-mailman (input) for mailman id 289320;
 Sat, 12 Mar 2022 03:25:56 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Jeav=TX=freebsd.org=cperciva@srs-se1.protection.inumbo.net>)
 id 1nSsOC-0002JN-Ow
 for xen-devel@lists.xenproject.org; Sat, 12 Mar 2022 03:25:56 +0000
Received: from mail.tarsnap.com (mail.tarsnap.com [54.86.246.204])
 by se1-gles-flk1.inumbo.com (Halon) with SMTP
 id 1eb29636-a1b4-11ec-853a-5f4723681683;
 Sat, 12 Mar 2022 04:25:52 +0100 (CET)
Received: (qmail 87537 invoked from network); 12 Mar 2022 03:25:51 -0000
Received: from unknown (HELO dell7390.daemonology.net) (127.0.0.1)
 by mail.tarsnap.com with SMTP; 12 Mar 2022 03:25:51 -0000
Received: (qmail 88480 invoked from network); 12 Mar 2022 03:25:51 -0000
Received: from unknown (HELO ?127.0.0.1?) (127.0.0.1)
 by localhost with SMTP; 12 Mar 2022 03:25:51 -0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1eb29636-a1b4-11ec-853a-5f4723681683
Message-ID: <3a0e1abd-678d-e01b-6949-02bb52e9c740@freebsd.org>
Date: Fri, 11 Mar 2022 19:25:51 -0800
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: statistical time calibration
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Jan Beulich <jbeulich@suse.com>
Cc: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
References: <1ea5815b-df22-7884-d28b-bdcc1741e349@suse.com>
 <YitqvQxsJ1/hqfrg@Air-de-Roger>
From: Colin Percival <cperciva@freebsd.org>
In-Reply-To: <YitqvQxsJ1/hqfrg@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi everyone,

On 3/11/22 07:29, Roger Pau Monné wrote:
> On Tue, Jan 18, 2022 at 04:03:56PM +0100, Jan Beulich wrote:
>> 1) When deciding whether to increment "passes", both variance values have
>> an arbitrary value of 4 added to them. There's a sentence about this in
>> the earlier (big) comment, but it lacks any justification as to the chosen
>> value. What's worse, variance is not a plain number, but a quantity in the
>> same units as the base values. Since typically both clocks will run at
>> very difference frequencies, using the same (constant) value here has much
>> more of an effect on the lower frequency clock's value than on the higher
>> frequency one's.

This additional variance arises from the quantization, and so it scales with
the timing quantum.  It makes sense that it has a larger effect on a lower
frequency clock -- if you imagine trying to calibrate against a clock which
runs at 1 Hz, without this term you would read several identical values from
that clock and conclude that your clock runs at infinity Hz.

>> 2) The second of the "important formulas" is nothing I could recall or was
>> able to look up. All I could find are somewhat similar, but still
>> sufficiently different ones. Perhaps my "introductory statistics" have
>> meanwhile been too long ago ... (In this context I'd like to also mention
>> that it took me quite a while to prove to myself that the degenerate case
>> of, in particular, the first iteration wouldn't lead to an early exit
>> from the function.)

Most statistics courses present a formula for the absolute uncertainty in the
slope rather than the relative uncertainty.  But it's easy to derive one from
the other.

>> 3) At the bottom of the loop there is some delaying logic, leading to
>> later data points coming in closer succession than earlier ones. I'm
>> afraid I don't understand the "theoretical risk of aliasing", and hence
>> I'm seeing more risks than benefits from this construct.

Suppose it takes exactly 1 us to run through the loop but one of the clocks
runs at exactly 1000001 Hz.  Without the extra delay, we'll probably observe
the clock incrementing by 1 every time through the loop (since it would only
increment by 2 once a second) and end up computing the wrong frequency.  The
"noise" introduced by adding small (variable) delays eliminates any chance
of this scenario and makes the data points behave like the *random* data
points which the statistical analysis needs.

> Might be easier to just add Colin, he did the original commit and can
> likely answer those questions much better than me. He has also done a
> bunch of work for FreeBSD/Xen.

You're too generous... I think the only real Xen work I did was adding support
for indirect segment I/Os to blkfront.  Mostly I was just packaging things up
for EC2 (back when EC2 used Xen).

>> My main concern is with the goal of reaching accuracy of 1PPM, and the
>> loop ending only after a full second (if I got that right) if that
>> accuracy cannot be reached. Afaict there's no guarantee that 1PPM is
>> reachable. My recent observations suggest that with HPET that's
>> feasible (but only barely), but with PMTMR it might be more like 3 or
>> more.

The "give up after 1 second" thing is just "fall back to historical FreeBSD
behaviour".  In my experiments I found that calibrating against the i8254
we would get 1PPM in about 50 ms while HPET was 2-3 ms.

>> The other slight concern I have, as previously voiced on IRC, is the use
>> of floating point here.

FWIW, my first version of this code (about 5 years ago) used fixed-point
arithmetic.  It was far uglier so I was happy when the FreeBSD kernel became
able to use the FPU this early in the boot process.

-- 
Colin Percival
Security Officer Emeritus, FreeBSD | The power to serve
Founder, Tarsnap | www.tarsnap.com | Online backups for the truly paranoid


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 03:46:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 03:46:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289324.490883 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSsho-0004iB-Rg; Sat, 12 Mar 2022 03:46:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289324.490883; Sat, 12 Mar 2022 03:46:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSsho-0004i4-Ol; Sat, 12 Mar 2022 03:46:12 +0000
Received: by outflank-mailman (input) for mailman id 289324;
 Sat, 12 Mar 2022 03:46:11 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSshn-0004hu-SM; Sat, 12 Mar 2022 03:46:11 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSshn-0000TA-Nt; Sat, 12 Mar 2022 03:46:11 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSshn-0002Y2-8J; Sat, 12 Mar 2022 03:46:11 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSshn-0003di-7t; Sat, 12 Mar 2022 03:46:11 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=DGskl85t877fqhmE5xh9jIdcy52/lHPmrvQaOYjkh4I=; b=6migmBT05fy/SfvL5Uzul2XXCy
	RkulqzrShWXc07ipi10jsZDTfeXe8RW1YuyujoJq9mwWPDbPrOGkqNZ8pXVVswdqaY5HzF6nAFgT1
	N8c0sr2lUVzk8MHNfeUWivFkj/ZQ12cCAbrK+Rv1DTX9ZB+H3fNGoJHxp5UM+AXLyZCk=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168519-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168519: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 12 Mar 2022 03:46:11 +0000

flight 168519 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168519/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   11 days
Failing since        168258  2022-03-01 01:55:31 Z   11 days   87 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 07:11:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 07:11:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289335.490894 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSvu1-0007xT-Ga; Sat, 12 Mar 2022 07:11:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289335.490894; Sat, 12 Mar 2022 07:11:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSvu1-0007xM-DY; Sat, 12 Mar 2022 07:11:01 +0000
Received: by outflank-mailman (input) for mailman id 289335;
 Sat, 12 Mar 2022 07:11:00 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSvu0-0007wt-2D; Sat, 12 Mar 2022 07:11:00 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSvtz-0004SO-Vs; Sat, 12 Mar 2022 07:10:59 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSvtz-0002x1-Fr; Sat, 12 Mar 2022 07:10:59 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSvtz-0006fi-FS; Sat, 12 Mar 2022 07:10:59 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=AH6kqelDfzlFvgaOZjMMOgzJc9yC7rifC90qK4/f29s=; b=EGR+BA/TtSkT0n/ZspI7wlVPlZ
	Mrp24CyjaKKZMhZenE0EPYddZqVQzrfwdra6RgcuJh4yyoBQnc953ZrpZyeZQCWr+j5GmDYoShamw
	9l8E8TR0OxcOk08lXG+0e1+Dtqc9IiWxQj40nSPKw7EKwWRPcINEbNN8xzxAEBZ28EdM=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168521-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168521: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 12 Mar 2022 07:10:59 +0000

flight 168521 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168521/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   11 days
Failing since        168258  2022-03-01 01:55:31 Z   11 days   88 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 07:43:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 07:43:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289343.490905 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSwOv-0002oj-2H; Sat, 12 Mar 2022 07:42:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289343.490905; Sat, 12 Mar 2022 07:42:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSwOu-0002oc-VX; Sat, 12 Mar 2022 07:42:56 +0000
Received: by outflank-mailman (input) for mailman id 289343;
 Sat, 12 Mar 2022 07:42:55 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSwOt-0002oQ-81; Sat, 12 Mar 2022 07:42:55 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSwOs-0004xJ-W1; Sat, 12 Mar 2022 07:42:55 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSwOs-0003js-I9; Sat, 12 Mar 2022 07:42:54 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSwOs-0007aq-HI; Sat, 12 Mar 2022 07:42:54 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=WdPSR1bagLKl4sU8pFfJeIoaNe3xzjq8LJZZ9hbLbfQ=; b=Nm2ssa8ejHEQYPAccQpw3lsRBl
	krJz/IiTnxOKO66S903ZrpBtpXEGhzfLdg9imDeKs2OgHMjcUbs5+xhoOgH8DOSIYM+J2HVN2he29
	DTlelfzNTdpIen6WXricsgIuBw3PCd1ShahA3QzWHO4rfYAH6Nxrox7lVRcQpdlb2BPg=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168522-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168522: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=2804fa912fa160e38e4ce7f537b6f6e1dcd5ee9d
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 12 Mar 2022 07:42:54 +0000

flight 168522 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168522/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              2804fa912fa160e38e4ce7f537b6f6e1dcd5ee9d
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  610 days
Failing since        151818  2020-07-11 04:18:52 Z  609 days  591 attempts
Testing same since   168522  2022-03-12 04:18:54 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Haonan Wang <hnwanga1@gmail.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Martin Pitt <mpitt@debian.org>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 100900 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 08:00:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 08:00:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289358.490915 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSwfs-0005qV-WC; Sat, 12 Mar 2022 08:00:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289358.490915; Sat, 12 Mar 2022 08:00:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSwfs-0005qO-TE; Sat, 12 Mar 2022 08:00:28 +0000
Received: by outflank-mailman (input) for mailman id 289358;
 Sat, 12 Mar 2022 08:00:28 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSwfs-0005qE-7E; Sat, 12 Mar 2022 08:00:28 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSwfs-0005pc-5i; Sat, 12 Mar 2022 08:00:28 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSwfr-00047y-T9; Sat, 12 Mar 2022 08:00:28 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSwfr-00048a-Sh; Sat, 12 Mar 2022 08:00:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=uriQTXVs99V8UM7wJVcH1hDGp6a5tZJb3HBY4kvB6/o=; b=SVg0GWpPMat3fr/7m2vEqVlktX
	H1tlnlmN718igAO4IHGI4NO7es8hDFsz0MYwDUZ8EgrKRVcdhxp2Bxsxhpfp297ACP2l8przTXrpy
	SzzlCU/fEzlQpOKqYMwF68hCvLlOLzZczrU/BLWnCkFIP6hGT7//JFoDHvR80FlDgQC4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168524-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168524: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 12 Mar 2022 08:00:27 +0000

flight 168524 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168524/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   11 days
Failing since        168258  2022-03-01 01:55:31 Z   11 days   89 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    0 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 08:31:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 08:31:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289369.490927 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSx9K-0000hn-Du; Sat, 12 Mar 2022 08:30:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289369.490927; Sat, 12 Mar 2022 08:30:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSx9K-0000hg-AG; Sat, 12 Mar 2022 08:30:54 +0000
Received: by outflank-mailman (input) for mailman id 289369;
 Sat, 12 Mar 2022 08:30:53 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSx9J-0000hW-0I; Sat, 12 Mar 2022 08:30:53 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSx9I-0006Ia-UA; Sat, 12 Mar 2022 08:30:52 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSx9I-0004mb-CK; Sat, 12 Mar 2022 08:30:52 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSx9I-0003ZE-Be; Sat, 12 Mar 2022 08:30:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=ZDnXuZhqWSEnvpOi/9S8NSf1mCWnrEZEX2GuUBqgNZE=; b=6AzIytq3QiSx0fSrLcXjWbK4oM
	GkredF+bT4qliu+Bd91BgfYYogLM8wpWQHi8MaR0dIsqwPeAWx+wJM9A3yCitxaWElqF41U8ZfaqG
	lfxIbw5+eSVzQmZ0N3RGrGWFGgZhbYzOkyVO/UMOkj64gLMP2L64fQsCfHxKuArPkWK0=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168525-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168525: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 12 Mar 2022 08:30:52 +0000

flight 168525 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168525/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   11 days
Failing since        168258  2022-03-01 01:55:31 Z   11 days   90 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    0 days    4 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 09:04:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 09:04:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289378.490938 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSxg8-000420-5u; Sat, 12 Mar 2022 09:04:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289378.490938; Sat, 12 Mar 2022 09:04:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSxg8-00041t-0w; Sat, 12 Mar 2022 09:04:48 +0000
Received: by outflank-mailman (input) for mailman id 289378;
 Sat, 12 Mar 2022 09:04:46 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSxg6-00041j-S6; Sat, 12 Mar 2022 09:04:46 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSxg6-0006qv-OL; Sat, 12 Mar 2022 09:04:46 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSxg6-0005Z5-8Z; Sat, 12 Mar 2022 09:04:46 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSxg6-0003aN-87; Sat, 12 Mar 2022 09:04:46 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=usEAieISF6zyIfq+ko/DbjUpWjnpEarYLjirjp3PWLA=; b=UDvSGkWbWeb95XRpQLrSpGYxdD
	2MljpxbK9YPN0dZ4Kqxtm6KOVYFE/uPTeUXj2LW+XhohegY15C6BG9uBGAJe69nSatulXCaDrY72j
	GnUkjry6Pi42o61AOceo7BEz+MkihZ0+M/aCiIkdaaLdpUXWWEPw6mkOXzy6iumgWClw=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168516-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168516: regressions - FAIL
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:debian-hvm-install:fail:regression
    xen-unstable:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:debian-hvm-install:fail:heisenbug
    xen-unstable:test-amd64-amd64-xl-rtds:guest-localmigrate/x10:fail:allowable
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=6ff9a7e62b8c43fe3e9d360fbd49d5854787bc39
X-Osstest-Versions-That:
    xen=5142dc5c25e317c208e3dc16d16b664b9f05dab5
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 12 Mar 2022 09:04:46 +0000

flight 168516 xen-unstable real [real]
flight 168523 xen-unstable real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168516/
http://logs.test-lab.xenproject.org/osstest/logs/168523/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm 12 debian-hvm-install fail REGR. vs. 168505

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm 12 debian-hvm-install fail pass in 168523-retest

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-rtds     20 guest-localmigrate/x10   fail REGR. vs. 168505

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168505
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168505
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168505
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168505
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168505
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168505
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168505
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168505
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168505
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168505
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168505
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168505
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass

version targeted for testing:
 xen                  6ff9a7e62b8c43fe3e9d360fbd49d5854787bc39
baseline version:
 xen                  5142dc5c25e317c208e3dc16d16b664b9f05dab5

Last test of basis   168505  2022-03-10 10:50:04 Z    1 days
Testing same since   168516  2022-03-11 10:53:13 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Julien Grall <jgrall@amazon.com>
  Roger Pau Monne <roger.pau@citrix.com>
  Roger Pau Monné <roger.pau@citrix.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 fail    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 fail    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     fail    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 6ff9a7e62b8c43fe3e9d360fbd49d5854787bc39
Author: Roger Pau Monne <roger.pau@citrix.com>
Date:   Wed Mar 9 13:28:46 2022 +0100

    livepatch: set -f{function,data}-sections compiler option
    
    If livepatching support is enabled build the hypervisor with
    -f{function,data}-sections compiler options, which is required by the
    livepatching tools to detect changes and create livepatches.
    
    This shouldn't result in any functional change on the hypervisor
    binary image, but does however require some changes in the linker
    script in order to handle that each function and data item will now be
    placed into its own section in object files. As a result add catch-all
    for .text, .data and .bss in order to merge each individual item
    section into the final image.
    
    The main difference will be that .text.startup will end up being part
    of .text rather than .init, and thus won't be freed. .text.exit will
    also be part of .text rather than dropped. Overall this could make the
    image bigger, and package some .text code in a sub-optimal way.
    
    On Arm the .data.read_mostly needs to be moved ahead of the .data
    section like it's already done on x86, so the .data.* catch-all
    doesn't also include .data.read_mostly. The alignment of
    .data.read_mostly also needs to be set to PAGE_SIZE so it doesn't end
    up being placed at the tail of a read-only page from the previous
    section. While there move the alignment of the .data section ahead of
    the section declaration, like it's done for other sections.
    
    The benefit of having CONFIG_LIVEPATCH enable those compiler option
    is that the livepatch build tools no longer need to fiddle with the
    build system in order to enable them. Note the current livepatch tools
    are broken after the recent build changes due to the way they
    attempt to set  -f{function,data}-sections.
    
    Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
    Acked-by: Julien Grall <jgrall@amazon.com>
    Reviewed-by: Jan Beulich <jbeulich@suse.com>

commit 4267a33b19d43c988fd4535093c426aa2aec70a1
Author: Roger Pau Monne <roger.pau@citrix.com>
Date:   Wed Mar 9 13:28:45 2022 +0100

    xen/build: put image header into a separate section
    
    So it can be explicitly placed ahead of the rest of the .text content
    in the linker script (and thus the resulting image). This is a
    prerequisite for further work that will add a catch-all to the text
    section (.text.*).
    
    Note that placement of the sections inside of .text is also slightly
    adjusted to be more similar to the position found in the default GNU
    ld linker script.
    
    The special handling of the object file containing the header data as
    the first object file passed to the linker command line can also be
    removed.
    
    While there also remove the special handling of efi/ on x86. There's
    no need for the resulting object file to be passed in any special
    order to the linker.
    
    Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
    Reviewed-by: Jan Beulich <jbeulich@suse.com>
    Acked-by: Julien Grall <jgrall@amazon.com>

commit 7f5b2448bd724f5f24426b2595a9bdceb1e5a346
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date:   Mon Mar 7 20:19:18 2022 +0000

    x86/kexec: Fix kexec-reboot with CET active
    
    The kexec_reloc() asm has an indirect jump to relocate onto the identity
    trampoline.  While we clear CET in machine_crash_shutdown(), we fail to clear
    CET for the non-crash path.  This in turn highlights that the same is true of
    resetting the CPUID masking/faulting.
    
    Move both pieces of logic from machine_crash_shutdown() to machine_kexec(),
    the latter being common for all kexec transitions.  Adjust the condition for
    CET being considered active to check in CR4, which is simpler and more robust.
    
    Fixes: 311434bfc9d1 ("x86/setup: Rework MSR_S_CET handling for CET-IBT")
    Fixes: b60ab42db2f0 ("x86/shstk: Activate Supervisor Shadow Stacks")
    Fixes: 5ab9564c6fa1 ("x86/cpu: Context switch cpuid masks and faulting state in context_switch()")
    Reported-by: David Vrabel <dvrabel@amazon.co.uk>
    Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
    Reviewed-by: David Vrabel <dvrabel@amazon.co.uk>
(qemu changes not included)


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 09:30:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 09:30:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289389.490952 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSy5J-0007MD-Cc; Sat, 12 Mar 2022 09:30:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289389.490952; Sat, 12 Mar 2022 09:30:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSy5J-0007M6-9J; Sat, 12 Mar 2022 09:30:49 +0000
Received: by outflank-mailman (input) for mailman id 289389;
 Sat, 12 Mar 2022 09:30:48 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSy5I-0007Lw-Ms; Sat, 12 Mar 2022 09:30:48 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSy5I-0007Hp-JT; Sat, 12 Mar 2022 09:30:48 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSy5I-00069i-71; Sat, 12 Mar 2022 09:30:48 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSy5I-0002Fo-6Y; Sat, 12 Mar 2022 09:30:48 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=owtlmvcL93DO6digtidSlILV1CTuEuj5Hdr0Fa9GmOc=; b=2YpN4ov2Jiv+rNllypyWefcAKf
	6fBtUkUHYw21z9Z/W3uk69m3l+Nx+sjpvJOfX+ZOYIT/EnEjA/s2LV0CrdLCO/hqNRlCQD1rYnMc+
	FHZ5bW5TXkl6nmF4yZ6nuwwpX9WzG+jtqs8si1XDI/KIObjy7wDR1dYYZhMzx7w2Nz4w=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168526-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168526: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 12 Mar 2022 09:30:48 +0000

flight 168526 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168526/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   11 days
Failing since        168258  2022-03-01 01:55:31 Z   11 days   91 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    0 days    5 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 10:19:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 10:19:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289423.490981 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSyqg-0004PC-Cc; Sat, 12 Mar 2022 10:19:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289423.490981; Sat, 12 Mar 2022 10:19:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSyqg-0004P5-9V; Sat, 12 Mar 2022 10:19:46 +0000
Received: by outflank-mailman (input) for mailman id 289423;
 Sat, 12 Mar 2022 10:19:45 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSyqe-0004Ov-VR; Sat, 12 Mar 2022 10:19:45 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSyqe-00089f-SE; Sat, 12 Mar 2022 10:19:44 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSyqe-0007Ju-Dx; Sat, 12 Mar 2022 10:19:44 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSyqe-0004Ji-DZ; Sat, 12 Mar 2022 10:19:44 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=npPajJQUpYkUd14F76k+ZCR0ZC7AG0qozyR7kSSNz9g=; b=oDyufnjGuX0NbuMz4Farc3chV/
	DzTsng6ESi74LnX881/lcd7HLdYEYkV1q/ubhv27BlbQUbu/KoyhsizgDX3ULWXueZYVBfgQNIu8S
	maPYXgeqgXv3omq9DyUWx/1z8SuQGPAmN/XVXAF/Aqf1jz66uK80UaiVLxy91rLHxQvc=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168518-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168518: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl-xsm:guest-start/debian.repeat:fail:heisenbug
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=79b00034e9dcd2b065c1665c8b42f62b6b80a9be
X-Osstest-Versions-That:
    linux=1db333d9a51f3459fba1bcaa564d95befe79f0b3
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 12 Mar 2022 10:19:44 +0000

flight 168518 linux-linus real [real]
flight 168529 linux-linus real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168518/
http://logs.test-lab.xenproject.org/osstest/logs/168529/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-xsm 22 guest-start/debian.repeat fail pass in 168529-retest

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168507
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168507
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168507
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168507
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168507
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168507
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168507
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168507
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                79b00034e9dcd2b065c1665c8b42f62b6b80a9be
baseline version:
 linux                1db333d9a51f3459fba1bcaa564d95befe79f0b3

Last test of basis   168507  2022-03-10 15:51:11 Z    1 days
Testing same since   168518  2022-03-11 14:42:07 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Aleksander Jan Bajkowski <olek2@wp.pl>
  Alexey Khoroshilov <khoroshilov@ispras.ru>
  Alyssa Rosenzweig <alyssa.rosenzweig@collabora.com>
  AngeloGioacchino Del Regno <angelogioacchino.delregno@collabora.com>
  Arnd Bergmann <arnd@arndb.de>
  Ben Ben-Ishay <benishay@nvidia.com>
  Bjorn Andersson <bjorn.andersson@linaro.org>
  Chris Clayton <chris2553@googlemail.com>
  Christophe JAILLET <christophe.jaillet@wanadoo.fr>
  Claudiu Beznea <claudiu.beznea@microchip.com>
  Clément Léger <clement.leger@bootlin.com>
  Colin Foster <colin.foster@in-advantage.com>
  Dan Carpenter <dan.carpenter@oracle.com>
  Daniel Bristot de Oliveira <bristot@kernel.org>
  Daniel Palmer <daniel@0x0f.com>
  Dave Airlie <airlied@redhat.com>
  Dave Ertman <david.m.ertman@intel.com>
  David Hildenbrand <david@redhat.com>
  David S. Miller <davem@davemloft.net>
  Dima Chumak <dchumak@nvidia.com>
  Duoming Zhou <duoming@zju.edu.cn>
  Eric Dumazet <edumazet@google.com>
  Erico Nunes <nunes.erico@gmail.com>
  Fabio Estevam <festevam@denx.de>
  Florian Fainelli <f.fainelli@gmail.com>
  Greg Kroah-Hartman <gregkh@linuxfoundation.org>
  Gregory CLEMENT <gregory.clement@bootlin.com>
  Grzegorz Siwik <grzegorz.siwik@intel.com>
  Grzegorz Szczurek <grzegorzx.szczurek@intel.com>
  Guillaume Nault <gnault@redhat.com>
  Gurucharan <gurucharanx.g@intel.com> (A Contingent worker at Intel)
  Gurucharan G <gurucharanx.g@intel.com> (A Contingent worker at Intel)
  Hans de Goede <hdegoede@redhat.com>
  Hauke Mehrtens <hauke@hauke-m.de>
  Heiner Kallweit <hkallweit1@gmail.com>
  Ivan Vecera <ivecera@redhat.com>
  Jacob Keller <jacob.e.keller@intel.com>
  Jakub Kicinski <kuba@kernel.org>
  Jedrzej Jagielski <jedrzej.jagielski@intel.com>
  Jens Axboe <axboe@kernel.dk>
  Jeremy Linton <jeremy.linton@arm.com>
  Jernej Skrabec <jernej.skrabec@gmail.com>
  Jia-Ju Bai <baijiaju1990@gmail.com>
  Jianglei Nie <niejianglei2021@163.com>
  Jiapeng Chong <jiapeng.chong@linux.alibaba.com>
  Jiasheng Jiang <jiasheng@iscas.ac.cn>
  Jisheng Zhang <Jisheng.Zhang@synaptics.com>
  Joel Stanley <joel@jms.id.au>
  Jon Hunter <jonathanh@nvidia.com>
  Jon Maloy <jmaloy@redhat.com>
  Jonathan Marek <jonathan@marek.ca>
  Jonathan Toppins <jtoppins@redhat.com>
  José Roberto de Souza <jose.souza@intel.com>
  Jouni Högander <jouni.hogander@intel.com>
  Kai Lueke <kailueke@linux.microsoft.com>
  Konrad Jankowski <konrad0.jankowski@intel.com>
  Krzysztof Kozlowski <krzysztof.kozlowski@canonical.com>
  Kuldeep Singh <singh.kuldeep87k@gmail.com>
  Leszek Kaliszczuk <leszek.kaliszczuk@intel.com>
  Lina Wang <lina.wang@mediatek.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
  Lyude Paul <lyude@redhat.com>
  Marcel Holtmann <marcel@holtmann.org>
  Matthias Brugger <matthias.bgg@gmail.com>
  Maxime Ripard <maxime@cerno.tech>
  Miaoqian Lin <linmq006@gmail.com>
  Michal Maloszewski <michal.maloszewski@intel.com>
  Minghao Chi (CGEL ZTE) <chi.minghao@zte.com.cn>
  Mitch Williams <mitch.a.williams@intel.com>
  Mohammad Kabat <mohammadkab@nvidia.com>
  Moshe Shemesh <moshe@nvidia.com>
  Nicolas Saenz Julienne <nsaenzju@redhat.com>
  Norbert Ciosek <norbertx.ciosek@intel.com>
  Nícolas F. R. A. Prado <nfraprado@collabora.com>
  Pali Rohár <pali@kernel.org>
  Paolo Abeni <pabeni@redhat.com>
  Paul E. McKenney <paulmck@kernel.org>
  Pavel Skripkin <paskripkin@gmail.com>
  Peter Robinson <pbrobinson@gmail.com>
  Petr Oros <poros@redhat.com>
  Robert Foss <robert.foss@linaro.org>
  Robert Hancock <robert.hancock@calian.com>
  Roi Dayan <roid@nvidia.com>
  Russell King (Oracle) <rmk+kernel@armlinux.org.uk>
  Saeed Mahameed <saeedm@nvidia.com>
  Scott McNutt <scott.mcnutt@siriusxm.com>
  Sebastian Andrzej Siewior <bigeasy@linutronix.de>
  Shin'ichiro Kawasaki <shinichiro.kawasaki@wdc.com>
  Stanislav Jakubek <stano.jakubek@gmail.com>
  Steev Klimaszewski <steev@kali.org>
  Stefan Wahren <stefan.wahren@i2se.com>
  Steffen Klassert <steffen.klassert@secunet.com>
  Steven Rostedt (Google) <rostedt@goodmis.org>
  Thierry Reding <treding@nvidia.com>
  Thomas Zimmermann <tzimmermann@suse.de>
  Toke Høiland-Jørgensen <toke@redhat.com>
  Tom Rix <trix@redhat.com>
  Tony Nguyen <anthony.l.nguyen@intel.com>
  Tung Nguyen <tung.q.nguyen@dektech.com.au>
  Tvrtko Ursulin <tvrtko.ursulin@intel.com>
  Tvrtko Ursulin <tvrtko.ursulin@linux.intel.com>
  Vladimir Oltean <vladimir.oltean@nxp.com>
  Zheyu Ma <zheyuma97@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      fail    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   1db333d9a51f..79b00034e9dc  79b00034e9dcd2b065c1665c8b42f62b6b80a9be -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 10:48:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 10:48:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289432.490992 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSzI2-0007gw-O2; Sat, 12 Mar 2022 10:48:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289432.490992; Sat, 12 Mar 2022 10:48:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nSzI2-0007gp-Kw; Sat, 12 Mar 2022 10:48:02 +0000
Received: by outflank-mailman (input) for mailman id 289432;
 Sat, 12 Mar 2022 10:48:01 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSzI1-0007gf-Op; Sat, 12 Mar 2022 10:48:01 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSzI1-0000AY-J5; Sat, 12 Mar 2022 10:48:01 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nSzI1-0008Gy-7X; Sat, 12 Mar 2022 10:48:01 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nSzI1-0001Nk-76; Sat, 12 Mar 2022 10:48:01 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=uC6LdRUR5Asaqw65Dyn1hscr3CAvmIsZl+EPRDt/KIs=; b=UV7s9Mc1meE+tg7scGCy8aZJVu
	wFEFcq5lxWwENTlVy6mKwLDkHQGdQ8YaGaDQ5Fcm4yYWPGgoDuYF6UEnqgpdxYFXl+dHLoS8uggX6
	2PCzlVkyqtSsO7Gjn2PKHvApmysgXBWnm19QrR9/dJ9Aa93lBoG+PjRjdP+rzjotABHE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168530-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168530: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 12 Mar 2022 10:48:01 +0000

flight 168530 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168530/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   12 days
Failing since        168258  2022-03-01 01:55:31 Z   11 days   92 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    0 days    6 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 11:54:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 11:54:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289444.491005 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nT0KI-0006C1-PX; Sat, 12 Mar 2022 11:54:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289444.491005; Sat, 12 Mar 2022 11:54:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nT0KI-0006Bu-Me; Sat, 12 Mar 2022 11:54:26 +0000
Received: by outflank-mailman (input) for mailman id 289444;
 Sat, 12 Mar 2022 11:54:25 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT0KH-0006Bk-8K; Sat, 12 Mar 2022 11:54:25 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT0KH-0001Ev-6b; Sat, 12 Mar 2022 11:54:25 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT0KG-0002cr-Vq; Sat, 12 Mar 2022 11:54:25 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nT0KG-00010q-VK; Sat, 12 Mar 2022 11:54:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Ht646uP83+idhwbYqAZww7NYREl4uW8qZ684JgmwZpE=; b=HdwVtWUutkU4u0DYJ9G6f9NpTf
	w3SbvkjMbFu3HmirZcjnZP9CgNOxwG9U174Hg70VG6+Oyu3JUac0qTlRtiu6f7LByP6xM1qcOO40h
	LrcxbgeX0TMI+5VXcGvD/LUgwsIVJTt5H2DHQnU4XgowOZ8tdj7ac5yj6oTX7iOuK1y4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168532-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168532: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 12 Mar 2022 11:54:24 +0000

flight 168532 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168532/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   12 days
Failing since        168258  2022-03-01 01:55:31 Z   11 days   93 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    0 days    7 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 15:25:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 15:25:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289465.491017 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nT3cX-0000yw-1b; Sat, 12 Mar 2022 15:25:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289465.491017; Sat, 12 Mar 2022 15:25:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nT3cW-0000yp-Ug; Sat, 12 Mar 2022 15:25:28 +0000
Received: by outflank-mailman (input) for mailman id 289465;
 Sat, 12 Mar 2022 15:25:27 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT3cV-0000yf-Bk; Sat, 12 Mar 2022 15:25:27 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT3cV-0004oY-A3; Sat, 12 Mar 2022 15:25:27 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT3cU-0006aq-UU; Sat, 12 Mar 2022 15:25:27 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nT3cU-0006oE-U4; Sat, 12 Mar 2022 15:25:26 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=GsHR1+QZZPHiZjJlwVzfKMGf4zI4drKupy4Ap3nsGGE=; b=VHGQsB4zOiwd/qXDPpz3SQ3oge
	HwkxgqxCkizTfODCT4Sw5trjNkgpz9YyMPspgrzbErrzALf+xdm03URZGpTmT6MeL+3O9i0y5ovmr
	n/07GaWot74e2wQ/RaU/kCCwiyDqK40NoKbP4i09QISy2Iw0uKv64aCaKPIsn6fPZwzQ=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168533-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168533: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 12 Mar 2022 15:25:26 +0000

flight 168533 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168533/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   12 days
Failing since        168258  2022-03-01 01:55:31 Z   11 days   94 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    0 days    8 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 17:00:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 17:00:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289480.491040 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nT56Q-0002qe-7e; Sat, 12 Mar 2022 17:00:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289480.491040; Sat, 12 Mar 2022 17:00:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nT56Q-0002qV-4A; Sat, 12 Mar 2022 17:00:26 +0000
Received: by outflank-mailman (input) for mailman id 289480;
 Sat, 12 Mar 2022 17:00:24 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT56O-0002oZ-26; Sat, 12 Mar 2022 17:00:24 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT56N-00071H-W6; Sat, 12 Mar 2022 17:00:24 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT56N-00024v-Hz; Sat, 12 Mar 2022 17:00:23 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nT56N-0006tR-Ha; Sat, 12 Mar 2022 17:00:23 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=9AHCwHTBhKDbTdV3j/znK6eWsPgXE5W9aUJumL0Moaw=; b=vE2AJnp7n47R8Tru1RSIFysHyq
	TqD2RKsuQ/2xcZP50elUHePDXd9pTPQrzmsDziZcBasQ2LXH131PYOaDOFSihAFkyNx93AyiMQXTs
	1bP+oV62dIkmP04Vn2gmiZ71dk3CK03iQG322LuwwYyS/elaye3jV1x4McExD29apNHM=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168527-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168527: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-rtds:guest-localmigrate/x10:fail:heisenbug
    xen-unstable:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:debian-hvm-install:fail:heisenbug
    xen-unstable:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:debian-hvm-install:fail:heisenbug
    xen-unstable:test-amd64-amd64-xl:guest-start/debian.repeat:fail:heisenbug
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=6ff9a7e62b8c43fe3e9d360fbd49d5854787bc39
X-Osstest-Versions-That:
    xen=5142dc5c25e317c208e3dc16d16b664b9f05dab5
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 12 Mar 2022 17:00:23 +0000

flight 168527 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168527/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-rtds 20 guest-localmigrate/x10 fail in 168516 pass in 168527
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm 12 debian-hvm-install fail in 168516 pass in 168527
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm 12 debian-hvm-install fail in 168516 pass in 168527
 test-amd64-amd64-xl          22 guest-start/debian.repeat  fail pass in 168516

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168505
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168505
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168505
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168505
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168505
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168505
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168505
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168505
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168505
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168505
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168505
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168505
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass

version targeted for testing:
 xen                  6ff9a7e62b8c43fe3e9d360fbd49d5854787bc39
baseline version:
 xen                  5142dc5c25e317c208e3dc16d16b664b9f05dab5

Last test of basis   168505  2022-03-10 10:50:04 Z    2 days
Testing same since   168516  2022-03-11 10:53:13 Z    1 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Julien Grall <jgrall@amazon.com>
  Roger Pau Monne <roger.pau@citrix.com>
  Roger Pau Monné <roger.pau@citrix.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          fail    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   5142dc5c25..6ff9a7e62b  6ff9a7e62b8c43fe3e9d360fbd49d5854787bc39 -> master


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 17:31:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 17:31:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289488.491051 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nT5ac-0006BZ-QN; Sat, 12 Mar 2022 17:31:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289488.491051; Sat, 12 Mar 2022 17:31:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nT5ac-0006BS-NL; Sat, 12 Mar 2022 17:31:38 +0000
Received: by outflank-mailman (input) for mailman id 289488;
 Sat, 12 Mar 2022 17:31:38 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT5ac-0006BI-6M; Sat, 12 Mar 2022 17:31:38 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT5ac-0007Xb-4Q; Sat, 12 Mar 2022 17:31:38 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT5ab-0002wT-OH; Sat, 12 Mar 2022 17:31:37 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nT5ab-0007Zb-Nq; Sat, 12 Mar 2022 17:31:37 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Lsl1ty3FZS0tITbfv0kz6cFk4sFrd1Sf0Aojv4ewZJs=; b=IIf0Ym2qdHrXXfi/+CfsLgzsnA
	7LcoT1nqXGRXN03zwWboyvhAE+eyDpb3i6y5d1dKisoLKIYzMCj6o4NO4kQ892PeaeS3cQgQBGeQL
	SZ9Lx835Njw5kqPz7MPw7fxW7AdG777EDWNqWHzbB6TYu3c4EEzOcfXStCpxOsr6VU0U=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168534-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168534: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 12 Mar 2022 17:31:37 +0000

flight 168534 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168534/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   12 days
Failing since        168258  2022-03-01 01:55:31 Z   11 days   95 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    1 days    9 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 18:11:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 18:11:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289499.491062 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nT6Cp-00025n-1i; Sat, 12 Mar 2022 18:11:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289499.491062; Sat, 12 Mar 2022 18:11:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nT6Co-00025g-Uy; Sat, 12 Mar 2022 18:11:06 +0000
Received: by outflank-mailman (input) for mailman id 289499;
 Sat, 12 Mar 2022 18:11:05 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT6Cn-00025W-Dq; Sat, 12 Mar 2022 18:11:05 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT6Cn-0008JM-AW; Sat, 12 Mar 2022 18:11:05 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT6Cm-0003x3-Vx; Sat, 12 Mar 2022 18:11:05 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nT6Cm-0001bX-VW; Sat, 12 Mar 2022 18:11:04 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=MbYRo4lpFrlNyRsyVtBB/NjAbb/Msr7GanjPBKseOjI=; b=fISjldGO5h/hHBJ1qepJksKOoP
	ZiHqfGYtgbuRJMv7zJSQmHSuM/i++zaU3gkRKO6qSlqkVLdwrNAeAUCWHHJ5k2VI2nEugTOEUBY/v
	GUXHY37ePNzGD7tmBb+cKuSHcyU9VMjMKSAdbBbaj1Fu4OhwVun9SBu6mRnz+MkuWNAI=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168535-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168535: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 12 Mar 2022 18:11:04 +0000

flight 168535 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168535/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   12 days
Failing since        168258  2022-03-01 01:55:31 Z   11 days   96 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    1 days   10 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 18:20:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 18:20:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289507.491073 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nT6Lm-0003Zk-Vz; Sat, 12 Mar 2022 18:20:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289507.491073; Sat, 12 Mar 2022 18:20:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nT6Lm-0003Zd-Sk; Sat, 12 Mar 2022 18:20:22 +0000
Received: by outflank-mailman (input) for mailman id 289507;
 Sat, 12 Mar 2022 18:20:22 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nT6Ll-0003ZX-Va
 for xen-devel@lists.xenproject.org; Sat, 12 Mar 2022 18:20:21 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nT6Ll-0008TZ-HM; Sat, 12 Mar 2022 18:20:21 +0000
Received: from gw1.octic.net ([81.187.162.82] helo=[10.0.1.102])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nT6Ll-0007Ed-Ay; Sat, 12 Mar 2022 18:20:21 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:Subject:
	From:References:Cc:To:MIME-Version:Date:Message-ID;
	bh=PfkFhvv6hBf53lCXse73H//zcpE2aUBJoYlgSJA8fQ4=; b=XwOXzdRZMyZXXyQlGBB+3jiWgg
	3Xzpfst6B2Agzt4wvSrLvjxNKqyJkYsUlLXWRkO3DHEK6rhvUVmQ1C7hwHd7qukvlRspsVh/7QvwX
	b32SvpaqPngIl7wik7OD8CxqY0vDrezOQk8Bx2pzhUzd6kX2Iq8dz1u0/2T+Msok7rzQ=;
Message-ID: <78cd8ea7-e37a-d3d9-d2d1-6686ca491925@xen.org>
Date: Sat, 12 Mar 2022 18:20:18 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
To: Stefano Stabellini <sstabellini@kernel.org>
Cc: xen-devel@lists.xenproject.org, marco.solieri@minervasys.tech,
 lucmiccio@gmail.com, Julien Grall <jgrall@amazon.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
References: <20220309112048.17377-1-julien@xen.org>
 <20220309112048.17377-5-julien@xen.org>
 <alpine.DEB.2.22.394.2203111710300.3497@ubuntu-linux-20-04-desktop>
From: Julien Grall <julien@xen.org>
Subject: Re: [PATCH early-RFC 4/5] xen/arm: mm: Rework switch_ttbr()
In-Reply-To: <alpine.DEB.2.22.394.2203111710300.3497@ubuntu-linux-20-04-desktop>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Stefano,

On 12/03/2022 01:17, Stefano Stabellini wrote:
> On Wed, 9 Mar 2022, Julien Grall wrote:
> As far as I can tell this should work for coloring too. In the case of
> coloring:
> 
>      /* running on the old mapping, same as non-coloring */
>      update_identity_mapping(true);
> 
>      /* jumping to the 1:1 mapping of the old Xen and switching to the
>       * new pagetable */
>      fn(ttbr);
> 
>      /* new pagetable is enabled, now we are back to addresses greater
>       * than XEN_VIRT_START, which correspond to new cache-colored Xen */
>      update_identity_mapping(false);
> 
> 
> The only doubt that I have is: are we sure than a single page of 1:1
> mapping is enough? What if:
> 
> virt_to_maddr(switch_ttbr_id) - virt_to_maddr(_start) > PAGE_SIZE

switch_ttbr_id() is placed before _end_boot (this needs to be renamed). 
We are veryfing a link time (see the check in xen.lds.S) that _end_boot 
- _start is always smaller than 4KB.

At the moment, the size is less than 2KB. So we have plenty of space to 
grow. Also, there are some code that is technically not used while using 
the ID map. So if necessary we can shrink the size to always fit in a 
PAGE_SIZE.

> We might have to do a 1:1 mapping of size = _end-_start. It would work
> with coloring too because we are doing a 1:1 mapping of the old copy of
> Xen which is non-colored and contiguous (not the new copy which is
> colored and fragmented).

I would like to keep the size of the ID mapping to the strict minimum. A 
PAGE_SIZE should be sufficient for most of what we need in Xen.

This would help to get rid of the old copy of Xen in case of the cache 
coloring. Otherwise, you technically have to keep it forever if you plan 
to support suspend/resume or even allow CPU hotplug.

Furthemore, if you keep the two copy around, it is more difficult to 
know which mapping is used and we increase the risk to use the wrong 
one. For instance, the current implementation of cache coloring is 
clearing the wrong set of boot pagetables.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 18:54:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 18:54:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289517.491084 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nT6sU-0006sZ-Lt; Sat, 12 Mar 2022 18:54:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289517.491084; Sat, 12 Mar 2022 18:54:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nT6sU-0006sS-I3; Sat, 12 Mar 2022 18:54:10 +0000
Received: by outflank-mailman (input) for mailman id 289517;
 Sat, 12 Mar 2022 18:54:08 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nT6sS-0006s4-LQ
 for xen-devel@lists.xenproject.org; Sat, 12 Mar 2022 18:54:08 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nT6sR-0000aO-ET; Sat, 12 Mar 2022 18:54:07 +0000
Received: from home.octic.net ([81.187.162.82] helo=[10.0.1.102])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nT6sR-0000tb-8Q; Sat, 12 Mar 2022 18:54:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:Subject:
	From:References:Cc:To:MIME-Version:Date:Message-ID;
	bh=b/uB3H0LsEV7GJm36w+JqXQECWN95jRxSpi+gckbZkw=; b=VTX5HbSzb9P9MtXSBrJavgCoIo
	zkWMAakoxXGVv1GrTfbzGN0xX+uamZvas+a5FVwyuE/53PiyabAjdBHENjy5tv3vsS4zISJJDydeo
	7Y7Yca6JzDuxJYcjml3tcu/AUIrSlgjNt6fFaHprgyAE+ErYbfSglNJvIzP2082BBUlo=;
Message-ID: <ece8f698-0abd-42eb-625e-693f69f02e27@xen.org>
Date: Sat, 12 Mar 2022 18:54:05 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
To: Stefano Stabellini <sstabellini@kernel.org>
Cc: xen-devel@lists.xenproject.org, marco.solieri@minervasys.tech,
 lucmiccio@gmail.com, Julien Grall <jgrall@amazon.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
References: <20220309112048.17377-1-julien@xen.org>
 <20220309112048.17377-5-julien@xen.org>
 <alpine.DEB.2.22.394.2203111721130.3497@ubuntu-linux-20-04-desktop>
From: Julien Grall <julien@xen.org>
Subject: Re: [PATCH early-RFC 4/5] xen/arm: mm: Rework switch_ttbr()
In-Reply-To: <alpine.DEB.2.22.394.2203111721130.3497@ubuntu-linux-20-04-desktop>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit



On 12/03/2022 01:31, Stefano Stabellini wrote:
> On Wed, 9 Mar 2022, Julien Grall wrote:
>> From: Julien Grall <jgrall@amazon.com>
>>
>> At the moment, switch_ttbr() is switching the TTBR whilst the MMU is
>> still on.
>>
>> Switching TTBR is like replacing existing mappings with new ones. So
>> we need to follow the break-before-make sequence.
>>
>> In this case, it means the MMU needs to be switched off while the
>> TTBR is updated. In order to disable the MMU, we need to first
>> jump to an identity mapping.
>>
>> Rename switch_ttbr() to switch_ttbr_id() and create an helper on
>> top to temporary map the identity mapping and call switch_ttbr()
>> via the identity address.
>>
>> switch_ttbr_id() is now reworked to temporarily turn off the MMU
>> before updating the TTBR.
>>
>> We also need to make sure the helper switch_ttbr() is part of the
>> identity mapping. So move _end_boot past it.
>>
>> Take the opportunity to instruction cache flush as the operation is
>> only necessary when the memory is updated.
>>
>> Signed-off-by: Julien Grall <jgrall@amazon.com>
>>
>> ---
>>
>>      TODO:
>>          * Rename _end_boot to _end_id_mapping or similar
>>          * Check the memory barriers
>>          * I suspect the instruction cache flush will be necessary
>>            for cache coloring.
>> ---
>>   xen/arch/arm/arm64/head.S | 31 ++++++++++++++++++++-----------
>>   xen/arch/arm/mm.c         | 14 +++++++++++++-
>>   2 files changed, 33 insertions(+), 12 deletions(-)
>>
>> diff --git a/xen/arch/arm/arm64/head.S b/xen/arch/arm/arm64/head.S
>> index 878649280d73..c5cc72b8fe6f 100644
>> --- a/xen/arch/arm/arm64/head.S
>> +++ b/xen/arch/arm/arm64/head.S
>> @@ -803,36 +803,45 @@ fail:   PRINT("- Boot failed -\r\n")
>>           b     1b
>>   ENDPROC(fail)
>>   
>> -GLOBAL(_end_boot)
>> -
>>   /*
>>    * Switch TTBR
>>    *
>>    * x0    ttbr
>>    *
>> - * TODO: This code does not comply with break-before-make.
>> + * XXX: Check the barriers
>>    */
>> -ENTRY(switch_ttbr)
>> +ENTRY(switch_ttbr_id)
>>           dsb   sy                     /* Ensure the flushes happen before
>>                                         * continuing */
>>           isb                          /* Ensure synchronization with previous
>>                                         * changes to text */
>> +
>> +        /* Turn off MMU */
>> +        mrs    x1, SCTLR_EL2
>> +        bic    x1, x1, #SCTLR_Axx_ELx_M
>> +        msr    SCTLR_EL2, x1
>> +        dsb    sy
>> +        isb
>> +
>>           tlbi   alle2                 /* Flush hypervisor TLB */
>> -        ic     iallu                 /* Flush I-cache */
>>           dsb    sy                    /* Ensure completion of TLB flush */
>>           isb
>>   
>> -        msr    TTBR0_EL2, x0
>> +        msr   TTBR0_EL2, x0
>> +
>> +        mrs   x1, SCTLR_EL2
>> +        orr   x1, x1, #SCTLR_Axx_ELx_M  /* Enable MMU */
>> +        msr   SCTLR_EL2, x1
>>   
>>           isb                          /* Ensure synchronization with previous
>>                                         * changes to text */
>> -        tlbi   alle2                 /* Flush hypervisor TLB */
>> -        ic     iallu                 /* Flush I-cache */
>> -        dsb    sy                    /* Ensure completion of TLB flush */
>> -        isb
>> +        /* Turn on the MMU */
>> +
>>   
>>           ret
>> -ENDPROC(switch_ttbr)
>> +ENDPROC(switch_ttbr_id)
>> +
>> +GLOBAL(_end_boot)
>>   
>>   #ifdef CONFIG_EARLY_PRINTK
>>   /*
>> diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
>> index 5c4dece16f7f..a53760af7af0 100644
>> --- a/xen/arch/arm/mm.c
>> +++ b/xen/arch/arm/mm.c
>> @@ -660,7 +660,19 @@ static void xen_pt_enforce_wnx(void)
>>       flush_xen_tlb_local();
>>   }
>>   
>> -extern void switch_ttbr(uint64_t ttbr);
>> +extern void switch_ttbr_id(uint64_t ttbr);
>> +
>> +typedef void (switch_ttbr_fn)(uint64_t ttbr);
>> +
>> +static void switch_ttbr(uint64_t ttbr)
>> +{
>> +    vaddr_t id_addr = virt_to_maddr(switch_ttbr_id);
>> +    switch_ttbr_fn *fn = (switch_ttbr_fn *)id_addr;
>> +
>> +    update_identity_mapping(true);
>> +    fn(ttbr);
>> +    update_identity_mapping(false);
>> +}
> 
> Controversial question: does it really matter that XEN_VIRT_START >
> 512GB and that _start < 512GB?
> 
> I am totally fine with the limit, I am just brainstorming: given that
> the mapping is used very temporarely, it wouldn't really be an issue if
> it conflicts with something important. Let's say that it conflicts with
> the VMAP or the FRAMETABLE. As long as:
> 
> - we save the current mapping
> - update it with the Xen 1:1
> - switch_ttbr
> - remove Xen 1:1
> - restore mapping
> 
> It should work, right? Basically, a mapping conflict shouldn't be an
> issue given that the mapping has only to live long enough to call
> switch_ttbr_id.

Today switch_ttbr() is called before we initialized most of the memory 
layout. So clashing with the VMAP and frametable is not a problem.

However, the identity mapping may also clash with the region used to map 
Xen. That said, technically, we are not able to handle Xen when its 
start address is in region 2MB + 4K to 4MB (Xen is loaded at a 4KB 
aligned address).

The trouble is some features (e.g. UBSAN, GCOV) can generate Xen image 
over 2MB. IOW, the range where Xen cannot be loaded will increase.

This is an issue because AFAIK, there is no away to tell GRUB "You can't 
load Xen at this region". But even if there were one, I feel this 
restriction is sort of random.

I already wrote a patch to get rid of the restriction. The code is not 
too bad (we only need an extra indirection). But I haven't sent it yet 
because it is less critical with the re-shuffling of the memory layout.

Anyway, that's a long way to say that it will soon become an issue if 
the ID mapping is clashing with Xen mappings.

> 
> I am less sure about patch #5 but it doesn't seem it would be a problem
> there either.

This is actually going to be problematic. On Arm64, the page-tables are 
shared with all the CPUs. You would need to prevent the CPUs to touch 
any of the mapping we removed.

While booting, idle pCPUs will usually scrub the pages. So the 
frametable will be used. In theory, we could make sure the CPUs are not 
scrubbing. This would get trick for CPU hotpluggling (not yet supported) 
as CPU would need to idle. IMHO, this would be unnaceptable to block all 
the CPUs just to bring a new one.

Furthermore, we would need to be careful anytime we define new regions 
in the memory layout or reshuffle it as we need to ensure that no-one 
else use them when the ID mapping is inplace.

The memory layout is far from been full on Arm64. So to me, the extra 
risk is not worth it. The same goes for Arm32 (even thought the memory 
has much less space).

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 19:27:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 19:27:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289521.491095 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nT7OD-0001rJ-8z; Sat, 12 Mar 2022 19:26:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289521.491095; Sat, 12 Mar 2022 19:26:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nT7OD-0001rC-4s; Sat, 12 Mar 2022 19:26:57 +0000
Received: by outflank-mailman (input) for mailman id 289521;
 Sat, 12 Mar 2022 19:26:56 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT7OC-0001r2-7W; Sat, 12 Mar 2022 19:26:56 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT7OC-0001BW-5A; Sat, 12 Mar 2022 19:26:56 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT7OB-0005hi-N8; Sat, 12 Mar 2022 19:26:55 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nT7OB-0003XD-Mg; Sat, 12 Mar 2022 19:26:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=3p/UCpSwgHMz6D8D3AEc3nZoA2IKGJEhocwZSJb7+oo=; b=fZmii2FN4s6NQ4ZVoxFnjMtwDf
	IXDg2Bh1azptxI2zqpcwtKvXtAKbTNJDnkp5FD3hIOL0+ptEUKqq/NQqIDzC5ehQ9aJmMIjyQ+LKt
	FwIgIMxD2+XwDRVQn0rgsgqnyagfr9pPPO7avZYNX4iD8fvFBbt4yG8EVZkFzsCWaYk8=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168536-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168536: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 12 Mar 2022 19:26:55 +0000

flight 168536 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168536/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   12 days
Failing since        168258  2022-03-01 01:55:31 Z   11 days   97 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    1 days   11 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 20:10:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 20:10:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289530.491106 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nT84O-0006wG-Ka; Sat, 12 Mar 2022 20:10:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289530.491106; Sat, 12 Mar 2022 20:10:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nT84O-0006w9-HA; Sat, 12 Mar 2022 20:10:32 +0000
Received: by outflank-mailman (input) for mailman id 289530;
 Sat, 12 Mar 2022 20:10:31 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT84N-0006vz-8p; Sat, 12 Mar 2022 20:10:31 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT84N-00020l-5e; Sat, 12 Mar 2022 20:10:31 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT84M-0006eY-NC; Sat, 12 Mar 2022 20:10:30 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nT84M-0004EU-Ml; Sat, 12 Mar 2022 20:10:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=vT1klOHVErABcPvKt98YbtWxIbf6Fh/Aty+wEewNQwg=; b=NpycZ6FQb0I3oMcEYOaf+gCiOG
	XYa3d162hSFfhNWIxvzgyhacKIrKwKL8c46qox9mZ++x/Z68FbbSdnXJ/npb9o3/6F161aiKHfpoR
	YhcgIOep94UF1X+wyfT0Jg0cxuFzFoUoasU+4UpkEYx9Iz32sPe8EnVwY5NcvlEvdd5A=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168538-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168538: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 12 Mar 2022 20:10:30 +0000

flight 168538 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168538/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   12 days
Failing since        168258  2022-03-01 01:55:31 Z   11 days   98 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    1 days   12 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 20:29:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 20:29:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289540.491117 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nT8MP-0000HJ-BL; Sat, 12 Mar 2022 20:29:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289540.491117; Sat, 12 Mar 2022 20:29:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nT8MP-0000HC-88; Sat, 12 Mar 2022 20:29:09 +0000
Received: by outflank-mailman (input) for mailman id 289540;
 Sat, 12 Mar 2022 20:29:07 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=5kzO=TX=aim.com=brchuckz@srs-se1.protection.inumbo.net>)
 id 1nT8MM-0000H4-Ge
 for xen-devel@lists.xen.org; Sat, 12 Mar 2022 20:29:07 +0000
Received: from sonic310-21.consmr.mail.gq1.yahoo.com
 (sonic310-21.consmr.mail.gq1.yahoo.com [98.137.69.147])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 0c5d9592-a243-11ec-853b-5f4723681683;
 Sat, 12 Mar 2022 21:29:03 +0100 (CET)
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic310.consmr.mail.gq1.yahoo.com with HTTP; Sat, 12 Mar 2022 20:28:58 +0000
Received: by kubenode500.mail-prod1.omega.bf1.yahoo.com (VZM Hermes SMTP
 Server) with ESMTPA ID 73ce19a3450832609b15371a3ed11189; 
 Sat, 12 Mar 2022 20:28:54 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0c5d9592-a243-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netscape.net; s=a2048; t=1647116938; bh=WFwzecQuG0wiUElFD96EX2UZi7TR+5rSnQIZKRtTotE=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From:Subject:Reply-To; b=MFg1o/bh/XfZB9npug2LlNl5k1Gzw8lwFnQgs0zt8AMoRRk/6RUmrMlWQIz+IXuy9tRwowG63/nl5vF9s6QDYbCluw7hwc6cOmbUxptXtLcq8wX1cJH0N4HwepSyMihp3eVhLSri5jpKn1QVkn/mExb95Q3WCcXOngkNWZ5+H1FBAtjLvRpp3EWVoi7UBddSAX06WCaU/qR2rNnH+nCFvMxXRMKhW4EcbUC0qn0nyqJ55R9jtW1vfpUwJFYyIrGWaXD0JBHNwt5liN8Y5ZL3ddRsDy0+ZU8cNtFmLnlkMXDxzFjgxuR3TzjrV9Iu88Ams2HFz+4HIjYIbhRk4fjo8Q==
X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1647116938; bh=6DN6dZg0glyW93NF4AybwnJDFJyftFi1Oyws2ooJIvZ=; h=X-Sonic-MF:Date:Subject:To:From:From:Subject; b=QSPcT+4IevZ2tPn9Q/9Be4BrxYsFV87HxvZBDhcc8zPBHefcJ8fmMoo+11HW+njhVWj05FfUJX7UICO0RAE5Xy9z7EHrOahF1wDTrrdRFrEKfwn6qc3Yc9j2U8t+6D/bLgGubySlz6dTb7++F9x84sa2ncwSQitMDOdUZuoPe431tm+2E9QmGbt3xotAwDKEGO8qXFamUNFrvgMg1aUxgVnrQJr1W8dHTI+bf05ENerTpee9TjVJSjPXWdMULe5ua6Ahu0h5ZzMIJODGP4EB2/iCQ0bfbH9CJX2Wepp8tJ1yAFFpx19TCXrlMDPvSNszfxf3frOSIqs+mmSbes7ELA==
X-YMail-OSG: UAkn4T0VM1lrcRuI4kX7JOGNzlLF.eZDPFj4ZHuW_cyZAcrQY2Xj6NXdlF0n6CC
 UhmzFK9OQ_qsZ4kVULe.ifSD3yn5CgCa7MpXq_sMziRv0ChJ4JrTryk2MhNR6xTCig3CKvQJsAqd
 XZqgGHM_W2s9Gu7qVqzYEqN3pa4GoiC71cYnxRq4WZL.q7ziCYmKH.NGKduT1lGEfTbyY0cEcBnr
 63U55eP9LQwWFhZLpKa5prljH9lXi8JEzAO9ccSI.vBvy6lxo5Ewc6PlWAriCZjFdsre_64SUgXg
 jDKRh5ZDM4JAYeZA41XmNzvw1s4ii1zoVQRUx2yPgI_11Y3mGIEZGt86BFfn2fOYpvv1DstwCQcc
 ZDEoe1b7R3.AxVXMKFjRUSs2NbSdQBWORb.OlNTOJZW1EfEbdqX166KyijE3OsdCjfhB_XISXh2X
 FmKcBy3rnP3LqzMb70m3xhQZoOLk_IuXnBjh6WkzKpP.uHhOwk.UDjHr56g.cyKS3EbSpSi8uKj_
 ISTIwzVx7EfaMU3Wx1nCyT9EXZg8abLpHKvVryAK4AsGtJ.H_qbGHOlj8AhBP_u9UA5545bfRfqo
 rrYbpsw6DqdP1DVzvpA3vqKfFyczrLQR7.JDAxVJ5hMvQF6E3cLm0SJpf_sR.ATw3Sge1.gC8g9_
 mTWd21yXR0s_h2nzT4dOQdNXypKQ_VSdBXkvV2k88npdtwt0OTNieEn9Ij1L8nkbokJcNbyBjhA7
 KEDrz8pVcGrTpawy.twMLTuEmSGaz4ABqCALnaHiqoX8u2MxGicNhDxOju_hRKYbBlpa4TQ2cCTt
 0CHHf9hpN65Jh_7LRVca0GwiUMT1wJJDX9KfRezVy4h0IHPoNY8IrNB5bN3oS.5cpYt0kJJniEDe
 5NE9eOFIaUGVCdcwKWcADK.qkbopkV3b8pJOdVeoTDSe7EbEAisnylrsPxThUdMqTaY4MhEvaVuV
 Fk5mZIR3Rk1Sd643D6BOAlCrvGdzYEHyCI4opVYcByZesZxlIqFerfUHlbkpiW8UkBYnN2BAa78j
 75aIG7Q2hLNKUWfZbTbAcXMlbZwg0_fbbVp7IkJQwNDSm.dqwCbjsKFiNofhgu6Y8cVfIbdMHYKy
 OjTxtRJpnkb97Xy0w6ltdjbJ3FkUwcgnGZOU9oKIi1iXHltuxiPoSBwxhnv1AeQqRCPhQwm0TZGi
 _ET0OCrUaCbN4MFH1ltvn4WycAlbUGIyV85k53a6hewp_Vq9ejfEQKa9tJ.o3EVU1A.49DwdSbk5
 45s5R96f_5OP4SELmhe3W0WngmovfF2be8zgUgidOExPuz8A5bitMkPi_sbT3gkgFPZ97iOVEgwj
 jqdw2nTLuu1xRdNWiRi7W1pNa.tlYuQn3V45dQZ1hkogK5VAU3vQYX9obE9h.aL.nbr8n7lIEf31
 afp.CAY3tsHFVow5SCG38x38XM5wyctBfD_TkPJs2XDpzVeVwsSVbcfPr1z7hiDMI4q9T.CDkprb
 JtOg1AJOijiodCjuw7b6pltxIgUm5FhZHLSCjaBRA90znFjWBlNZKTFBaMDVj21yknT.guts4eJV
 uUIE7Pjo3G2xEr7XKZ7oDQR58cYgKbbuzqbYqWEImPhWzmolDJ1MNaTZk4dyc4Cz4UEzxVAPRSrk
 A5G1n_e5exyP0.CAMvCPg6OFCBajzymb4SsgPdbVjc7C6VAnxIkF_GX4GxweVPFavRmNMqK6Gzlc
 DwBPLFfVWv2fayZhOS6_7wp.lAa6wOj_1LAWqDV4iqD4KbJNmd_TMRC1OQTEBsjhak_wlLylFc0g
 N73OHyf_9Ouwvz9GJrIJ4_vS5afluj5sjRb2hrvNidxP6YxgIBM1PoWKiSbappPyI8Jw1Bwyhz91
 baXpnTNxge8QoePBuMyT5DZ0jjd07ONPBHNiZwLGjU5tn_RnAq3oqYCBTLZ5PMBOPhDyC3PUgOc_
 v.YeUnQKLaFuqYPsq9peGcy_BvpjUdTt2quf2ID6YERPN8ix9QS7.xr9T7d7OGV1ajujagRsQKV.
 y3rc1rkIyQG4jAvY_EUpXR7QDQ2c7oDQwOM2o4D.jK5QEF3lFnxe_HsxAXBCDjgosNUoPlT3_945
 bDn_RDDZIrOTQ1axatI95GMMI7e_UTmI3MXYtS9GprwWQ8hvO_oxLfCLjGWFTQAcUQ5gBV8ihfOi
 GSc5__jVroJVKsWL4a72NQhu0uwNq8hC6GTo6ORhyomX3VIY2butvRRZ1bIlzHQZHLSjiA2Q1Vcu
 Wl5d9Ix0-
X-Sonic-MF: <brchuckz@aim.com>
Message-ID: <f6e946d0-01cd-f369-3da3-54836d37f05e@netscape.net>
Date: Sat, 12 Mar 2022 15:28:53 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: BUG: libxenlight fails to grant permission to access Intel IGD
 Opregion
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>
Cc: xen-devel@lists.xen.org
References: <4703b7f1-8d3c-5128-213c-e39f487e4cde.ref@netscape.net>
 <4703b7f1-8d3c-5128-213c-e39f487e4cde@netscape.net>
 <2e74415a-d0d4-321b-be2e-a14db297c51a@suse.com>
From: Chuck Zmudzinski <brchuckz@netscape.net>
In-Reply-To: <2e74415a-d0d4-321b-be2e-a14db297c51a@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Mailer: WebService/1.1.19878 mail.backend.jedi.jws.acl:role.jedi.acl.token.atz.jws.hermes.aol
Content-Length: 2599

On 3/11/22 3:09 AM, Jan Beulich wrote:
> On 11.03.2022 06:01, Chuck Zmudzinski wrote:
>
>> Here is the patch that fixes the bug on Debian sid/Xen 4.16:
> As to an actual patch for us to take - please see
> docs/process/sending-patches.pandoc for the formal requirements.
> (Note this was recently introduced, so you won't find it in the
> 4.16 sources. But your patch wants to be against latest staging
> anyway.)
>
> Jan
>

OK, I took a look at the process and I also studied this
issue more closely, and my conclusion is that I would not
recommend fixing this old bug now until we have a better
idea about how good our current tests for the Intel IGD are.

AFAICT, if our tests for the Intel IGD result in a false positive,
then hvmloader will map three pages in the guest for the
IGD opregion, but the mapped memory would certainly
not be the expected IGD opregion if the device is not actually
an IGD or GPU with an opregion. In such a case, we would be
mapping three pages of unexpected memory to the guest. So before
proposing a patch that would fix this bug but have the unintended
consequence of allowing access to unexpected memory in the case
of a false positive detection of an Intel IGD, I will first spend some
time deciding if a more accurate and reliable test is needed to
determine if a PCI device with class VGA and vendor Intel actually
has an IGD opregion. Once I am confident that the risk of a false
positive when testing for the Intel IGD is acceptably low , then I
would consider submitting a patch that fixes this bug.

Our tests check if the PCI device has class VGA and that the
vendor is Intel, and we also check if the gfx_passthru option
is enabled. Those tests are applied both in hvmloader
and in libxenlight to decide about mapping the IGD opregion
to the guest and informing Qemu about the mapped address.
I don't think these tests for the Intel IGD account for recent
developments such as newer discrete Intel GPUs that
might not have an IGD opregion, nor do they account for
older Intel IGDs/GPUs that also might not have an IGD opregion.

I think some time is needed to look at the i915 Linux kernel driver
code to more precisely identify the devices that need access
to the IGD opregion. Other devices either are not compatible
with the feature of VGA passthrough or do not need to have
access to the IGD opregion.

With this information, a patch can be developed that will more
accurately determine when the guest needs access to the IGD
opregion. With such a patch committed in Xen, I would be more
comfortable submitting a fix for this bug.

Regards,

Chuck


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 20:39:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 20:39:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289544.491128 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nT8WK-0001lU-A2; Sat, 12 Mar 2022 20:39:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289544.491128; Sat, 12 Mar 2022 20:39:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nT8WK-0001lN-6U; Sat, 12 Mar 2022 20:39:24 +0000
Received: by outflank-mailman (input) for mailman id 289544;
 Sat, 12 Mar 2022 20:39:23 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT8WJ-0001lD-Mg; Sat, 12 Mar 2022 20:39:23 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT8WJ-0002Uy-DZ; Sat, 12 Mar 2022 20:39:23 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT8WI-0007K9-Up; Sat, 12 Mar 2022 20:39:23 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nT8WI-0001Im-UJ; Sat, 12 Mar 2022 20:39:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=9S91Fi/IRcd4TRfyIeyCIC2b8si5jan/zRi0wnuAzVY=; b=QtfqqYNbgynTz0+toqRO39S4R7
	R/6FHWrZIdswJmXlbFjHqq6BYcH2bPVdgpDAkT/RDoFRiTKxDfpIhi5DMPbTkWVkBHd3Y+RVNQeFB
	QCYDzF0l1BhYqVOvsGfsdYNl3/XOF3GU/zALA+3DckPM8pbRc6MULzT6Vbr7Cj6sQwoU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168531-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168531: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:debian-hvm-install:fail:heisenbug
    linux-linus:test-arm64-arm64-libvirt-raw:guest-start/debian.repeat:fail:heisenbug
    linux-linus:test-armhf-armhf-xl-rtds:xen-boot:fail:allowable
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=68453767131a5deec1e8f9ac92a9042f929e585d
X-Osstest-Versions-That:
    linux=79b00034e9dcd2b065c1665c8b42f62b6b80a9be
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 12 Mar 2022 20:39:22 +0000

flight 168531 linux-linus real [real]
flight 168537 linux-linus real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168531/
http://logs.test-lab.xenproject.org/osstest/logs/168537/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm 12 debian-hvm-install fail pass in 168537-retest
 test-arm64-arm64-libvirt-raw 17 guest-start/debian.repeat fail pass in 168537-retest

Regressions which are regarded as allowable (not blocking):
 test-armhf-armhf-xl-rtds      8 xen-boot                 fail REGR. vs. 168518

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168518
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168518
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168518
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168518
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168518
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168518
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168518
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168518
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                68453767131a5deec1e8f9ac92a9042f929e585d
baseline version:
 linux                79b00034e9dcd2b065c1665c8b42f62b6b80a9be

Last test of basis   168518  2022-03-11 14:42:07 Z    1 days
Testing same since   168531  2022-03-12 10:22:17 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Christophe JAILLET <christophe.jaillet@wanadoo.fr>
  David Howells <dhowells@redhat.com>
  Emil Renner Berthing <kernel@esmil.dk>
  H. Nikolaus Schaller <hns@goldelico.com>
  Jean Rene Dawin <jdawin@math.uni-bielefeld.de>
  Jisheng Zhang <jszhang@kernel.org>
  Linus Torvalds <torvalds@linux-foundation.org>
  Marc Dionne <marc.dionne@auristor.com>
  Michael Ellerman <mpe@ellerman.id.au>
  Nathan Chancellor <nathan@kernel.org>
  Palmer Dabbelt <palmer@rivosinc.com>
  Randy Dunlap <rdunlap@infradead.org>
  Rong Chen <rong.chen@amlogic.com>
  Russell King (Oracle) <rmk+kernel@armlinux.org.uk>
  Ulf Hansson <ulf.hansson@linaro.org>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 fail    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 fail    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   79b00034e9dc..68453767131a  68453767131a5deec1e8f9ac92a9042f929e585d -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 21:09:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 21:09:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289552.491139 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nT8z0-00054W-Hb; Sat, 12 Mar 2022 21:09:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289552.491139; Sat, 12 Mar 2022 21:09:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nT8z0-00054P-D1; Sat, 12 Mar 2022 21:09:02 +0000
Received: by outflank-mailman (input) for mailman id 289552;
 Sat, 12 Mar 2022 21:09:01 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT8yz-00054F-2x; Sat, 12 Mar 2022 21:09:01 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT8yz-00030l-1A; Sat, 12 Mar 2022 21:09:01 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nT8yy-0007xi-Dj; Sat, 12 Mar 2022 21:09:00 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nT8yy-0008Oh-DJ; Sat, 12 Mar 2022 21:09:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=AQO7Sl8swNspA02SzYDnndC7hdVmCief7WoO/jpx4Xw=; b=A8+sfltO/SysjGgM7oe/m92qLg
	k1J5kpAxVyXmpBAk9vMmxzDYTjMVEvvPaPYvdemvt4OBPFcJJdQkKkXleRprbmxh7exLb5M5POxfd
	p+Gx0DbU/ahE6neFnYnz0MpX8z76Q3lIXsmnZKS3xIz4KC/EhrNh9L61MR4zAJfvhTMY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168539-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168539: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 12 Mar 2022 21:09:00 +0000

flight 168539 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168539/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   12 days
Failing since        168258  2022-03-01 01:55:31 Z   11 days   99 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    1 days   13 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 22:17:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 22:17:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289562.491150 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTA34-0003df-QR; Sat, 12 Mar 2022 22:17:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289562.491150; Sat, 12 Mar 2022 22:17:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTA34-0003dY-MB; Sat, 12 Mar 2022 22:17:18 +0000
Received: by outflank-mailman (input) for mailman id 289562;
 Sat, 12 Mar 2022 22:17:16 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTA32-0003dO-T1; Sat, 12 Mar 2022 22:17:16 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTA32-0004DN-La; Sat, 12 Mar 2022 22:17:16 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTA32-0001uR-Az; Sat, 12 Mar 2022 22:17:16 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTA32-0001qM-AY; Sat, 12 Mar 2022 22:17:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=J2cpESNkcHu0itU3AkF0wT8DMka+ZXqkDhy+bqtxggs=; b=Prs2ZoTkzCyLiFo6gEES/YueRe
	4dOxR/WrFnDbR5VCIIdC1nZhDmnHs0fxdYt4ARdMmBZRv59XW14LGLQFT8+iQmJyDkQqVuxNc54PA
	hdypNAq0py1o5eL+4I49RAdrHDy1vwW0R89ZfqAY5TTIGxb7nR6uVHClYX8f3r0Cxxts=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168541-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168541: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 12 Mar 2022 22:17:16 +0000

flight 168541 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168541/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   12 days
Failing since        168258  2022-03-01 01:55:31 Z   11 days  100 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    1 days   14 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 12 23:58:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 12 Mar 2022 23:58:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289574.491160 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTBcs-0004u5-4E; Sat, 12 Mar 2022 23:58:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289574.491160; Sat, 12 Mar 2022 23:58:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTBcs-0004ty-1Q; Sat, 12 Mar 2022 23:58:22 +0000
Received: by outflank-mailman (input) for mailman id 289574;
 Sat, 12 Mar 2022 23:58:20 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTBcq-0004tk-3Q; Sat, 12 Mar 2022 23:58:20 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTBcp-0005rH-V4; Sat, 12 Mar 2022 23:58:19 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTBcp-00069x-L5; Sat, 12 Mar 2022 23:58:19 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTBcp-0007Xs-Kb; Sat, 12 Mar 2022 23:58:19 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=czdsD69EMfNfwe7De1lv4Ueb+GHsZ/IRHW3XnmfdgXw=; b=yS1FfkuL5oG2ehlizSTzCJFH+G
	M3GMoyCda9lTWgTz+lLfpCCaD3CdNujwYGobpD608aWV344Em+vpyJ7Di4vU2JiB0SWg8V/ruT1hX
	mB4yIvTqWhlIkzw/vBE48Aja4jD6UW7r58fo1SU3Be9zH6zSYw1Hz7LctnWs2hbRWuUU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168542-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168542: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 12 Mar 2022 23:58:19 +0000

flight 168542 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168542/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   12 days
Failing since        168258  2022-03-01 01:55:31 Z   11 days  101 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    1 days   15 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 13 01:12:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 13 Mar 2022 01:12:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289582.491172 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTCmj-00029n-GX; Sun, 13 Mar 2022 01:12:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289582.491172; Sun, 13 Mar 2022 01:12:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTCmj-00029g-DJ; Sun, 13 Mar 2022 01:12:37 +0000
Received: by outflank-mailman (input) for mailman id 289582;
 Sun, 13 Mar 2022 01:12:36 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTCmi-00029W-35; Sun, 13 Mar 2022 01:12:36 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTCmi-0004dA-09; Sun, 13 Mar 2022 01:12:36 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTCmh-0008RJ-Iv; Sun, 13 Mar 2022 01:12:35 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTCmh-0007lz-IQ; Sun, 13 Mar 2022 01:12:35 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=/B+vTC4DzWnDU4CBCEbIg23QW+xwXO0rKUK2UQhGEFU=; b=v1inERh0wAPrADXQ4swyCLZicf
	KiaZa09YvwQjErRGWWqMcds9xURHQpD4ANq2jtdjQmDwIzi91ZsZe/KAlWFpG52pBpIjQN6uAdHJf
	4mQPatfcP0Ku0rBPkLEK21E37BTG+11onyJ35+lr3WY3C3SNlE993evyROMEB4m/5C1Q=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168543-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168543: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 13 Mar 2022 01:12:35 +0000

flight 168543 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168543/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   12 days
Failing since        168258  2022-03-01 01:55:31 Z   11 days  102 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    1 days   16 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 13 02:30:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 13 Mar 2022 02:30:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289590.491183 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTE07-0001uK-3i; Sun, 13 Mar 2022 02:30:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289590.491183; Sun, 13 Mar 2022 02:30:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTE07-0001uD-07; Sun, 13 Mar 2022 02:30:31 +0000
Received: by outflank-mailman (input) for mailman id 289590;
 Sun, 13 Mar 2022 02:30:30 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTE06-0001u3-6O; Sun, 13 Mar 2022 02:30:30 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTE06-0006NK-1T; Sun, 13 Mar 2022 02:30:30 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTE05-0001zl-6O; Sun, 13 Mar 2022 02:30:29 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTE05-0004i0-4g; Sun, 13 Mar 2022 02:30:29 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=5ljXBQ9GQL6TcN1AJkLque/j8hyRMaoopazVtmp7ZNk=; b=dttKff6V8v4fEIGi7ZYEz6Swo2
	A6DcsimgZbEIvEngiDmXeIFKQZjCQgKglK4n22os5BAwUF7CTcqrdaulkNwcc0wDU19M/esYFfV6x
	IDLqt4aGlM5xM/YZyCszFSDF7rlqMcIVVHPRHq2AZcdHnxhuNBO3k5z+pn4oA+bnYyVY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168544-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168544: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 13 Mar 2022 02:30:29 +0000

flight 168544 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168544/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   12 days
Failing since        168258  2022-03-01 01:55:31 Z   12 days  103 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    1 days   17 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 13 03:40:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 13 Mar 2022 03:40:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289599.491194 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTF5k-0000Pm-0N; Sun, 13 Mar 2022 03:40:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289599.491194; Sun, 13 Mar 2022 03:40:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTF5j-0000Pf-T0; Sun, 13 Mar 2022 03:40:23 +0000
Received: by outflank-mailman (input) for mailman id 289599;
 Sun, 13 Mar 2022 03:40:23 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTF5j-0000PV-Ao; Sun, 13 Mar 2022 03:40:23 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTF5j-0007W9-93; Sun, 13 Mar 2022 03:40:23 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTF5i-0004JS-Pp; Sun, 13 Mar 2022 03:40:22 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTF5i-0002XR-PK; Sun, 13 Mar 2022 03:40:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=IqPfmZjGkUSq4XKAQy0qHX/f/dK5EMm86sYmD1CgXeQ=; b=hyqYG3UOkdmI55uq6ItCA4em9x
	9PTG0ibvFNCFR5J2Q8iheLH1gOq9PY+NgptcmTyKyqA1EHllrpIgZnKpP5QpMLyXAvHzDIZZci0/z
	SAGGNY1kvYPP1P5s6YuS8CQzTmLen8Kg12w+RC0OnYP7qf1DErjdCH3IMQo5UgEhZl4E=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168546-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168546: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 13 Mar 2022 03:40:22 +0000

flight 168546 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168546/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   12 days
Failing since        168258  2022-03-01 01:55:31 Z   12 days  104 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    1 days   18 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 13 04:17:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 13 Mar 2022 04:17:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289611.491205 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTFfz-00047r-AQ; Sun, 13 Mar 2022 04:17:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289611.491205; Sun, 13 Mar 2022 04:17:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTFfz-00047k-6m; Sun, 13 Mar 2022 04:17:51 +0000
Received: by outflank-mailman (input) for mailman id 289611;
 Sun, 13 Mar 2022 04:17:50 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTFfy-00047a-Cy; Sun, 13 Mar 2022 04:17:50 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTFfy-0008KE-8j; Sun, 13 Mar 2022 04:17:50 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTFfx-00065o-Rx; Sun, 13 Mar 2022 04:17:49 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTFfx-0002We-RW; Sun, 13 Mar 2022 04:17:49 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=9Ih9F3PIN4fBs1StwEkxKenejoMhUQMVjhjR2MAgkb4=; b=5nXqagBd2GjxBm1xaksBXx8mXe
	bg9kHQMi8tPiLYO1dk15TGeees9gwy7WHbwj92CGxZl0GKJ2kmUp+GhcRnQ/9yJmgM85DqVAEb03x
	q0U09naBfA2mVWw288xWju+XQBJfeRilSIUsUmjjmyKcU1qZaa9KYRRqN/yIibBLybms=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168540-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168540: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-dom0pvh-xl-intel:guest-start/debian.repeat:fail:heisenbug
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=aad611a868d16cdc16a7d4a764cef955293e47e3
X-Osstest-Versions-That:
    linux=68453767131a5deec1e8f9ac92a9042f929e585d
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 13 Mar 2022 04:17:49 +0000

flight 168540 linux-linus real [real]
flight 168547 linux-linus real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168540/
http://logs.test-lab.xenproject.org/osstest/logs/168547/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-dom0pvh-xl-intel 22 guest-start/debian.repeat fail pass in 168547-retest

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168531
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168531
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168531
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168531
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168531
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168531
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168531
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168531
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                aad611a868d16cdc16a7d4a764cef955293e47e3
baseline version:
 linux                68453767131a5deec1e8f9ac92a9042f929e585d

Last test of basis   168531  2022-03-12 10:22:17 Z    0 days
Testing same since   168540  2022-03-12 21:09:37 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Arnaldo Carvalho de Melo <acme@redhat.com>
  Dave Airlie <airlied@redhat.com>
  Davidlohr Bueso <dave@stgolabs.net>
  Linus Torvalds <torvalds@linux-foundation.org>
  Sam Ravnborg <sam@ravnborg.org>
  Thomas Zimmermann <tzimmermann@suse.de>
  Weiguo Li <liwg06@foxmail.com>
  Zhengjun Xing <zhengjun.xing@linux.intel.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            fail    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   68453767131a..aad611a868d1  aad611a868d16cdc16a7d4a764cef955293e47e3 -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Sun Mar 13 05:40:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 13 Mar 2022 05:40:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289621.491216 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTGxP-0003sK-W7; Sun, 13 Mar 2022 05:39:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289621.491216; Sun, 13 Mar 2022 05:39:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTGxP-0003sD-T3; Sun, 13 Mar 2022 05:39:55 +0000
Received: by outflank-mailman (input) for mailman id 289621;
 Sun, 13 Mar 2022 05:39:55 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTGxP-0003s3-42; Sun, 13 Mar 2022 05:39:55 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTGxP-0001Vv-1j; Sun, 13 Mar 2022 05:39:55 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTGxO-0002Fy-RH; Sun, 13 Mar 2022 05:39:54 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTGxO-0003L7-Qq; Sun, 13 Mar 2022 05:39:54 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=P4xJ52vJO7rCdbUTl8mMJDRSujhNMpokiEdAp61EFAw=; b=1SgbzQVPPeZ47+OqDD/pIH5CpC
	7F6Pu788YlJSezHIBPXpDxYXl8UDckO2wAAI+pC6VMyoyoXT/6otf8KEdAAfemUr2CqPp5naqpLNz
	OMMggjyET0KWAPFK5JKVNwwG1ZUyfpVmEHi0eBX4qIFNOHLy7DhNLxqsXvYXXDcxsaa4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168548-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168548: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 13 Mar 2022 05:39:54 +0000

flight 168548 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168548/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   12 days
Failing since        168258  2022-03-01 01:55:31 Z   12 days  105 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    1 days   19 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 13 07:53:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 13 Mar 2022 07:53:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289629.491227 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTJ2Z-0000Wm-3T; Sun, 13 Mar 2022 07:53:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289629.491227; Sun, 13 Mar 2022 07:53:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTJ2Z-0000Wf-0P; Sun, 13 Mar 2022 07:53:23 +0000
Received: by outflank-mailman (input) for mailman id 289629;
 Sun, 13 Mar 2022 07:53:21 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTJ2X-0000WV-NC; Sun, 13 Mar 2022 07:53:21 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTJ2X-0003rE-KX; Sun, 13 Mar 2022 07:53:21 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTJ2X-0008T3-6t; Sun, 13 Mar 2022 07:53:21 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTJ2X-00020n-6P; Sun, 13 Mar 2022 07:53:21 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=XpmW/dQHcN6Q879wvQtUheidi555QR33TqDLokF4ZOU=; b=zASghyRjL1t6vtb3R+/hK7ESgl
	hM2KUCGfcFpplnfYM/UCp0D2i2dYqbGSCdWQ4oJthG4PVpEyb/Seja/+Q6baHjmItjnjuxacz9KFG
	RINhbzbWKSkkUCMAUkD3OZxXTi1HoucwSFTxeGd88FF/jXGWOZHr1tuHmJn42Q/mxU3M=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168549-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168549: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=2804fa912fa160e38e4ce7f537b6f6e1dcd5ee9d
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 13 Mar 2022 07:53:21 +0000

flight 168549 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168549/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              2804fa912fa160e38e4ce7f537b6f6e1dcd5ee9d
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  611 days
Failing since        151818  2020-07-11 04:18:52 Z  610 days  592 attempts
Testing same since   168522  2022-03-12 04:18:54 Z    1 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Haonan Wang <hnwanga1@gmail.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Martin Pitt <mpitt@debian.org>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 100900 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 13 09:03:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 13 Mar 2022 09:03:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289648.491237 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTK8C-000888-B9; Sun, 13 Mar 2022 09:03:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289648.491237; Sun, 13 Mar 2022 09:03:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTK8C-000881-8B; Sun, 13 Mar 2022 09:03:16 +0000
Received: by outflank-mailman (input) for mailman id 289648;
 Sun, 13 Mar 2022 09:03:15 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTK8B-00087r-HJ; Sun, 13 Mar 2022 09:03:15 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTK8B-0005mV-FU; Sun, 13 Mar 2022 09:03:15 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTK8B-0001mC-69; Sun, 13 Mar 2022 09:03:15 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTK8B-0004Oo-5j; Sun, 13 Mar 2022 09:03:15 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=+nMTeAjhxOcIcs3YlDP23MXmb033Awyc3cioCRXvByk=; b=i2PF+J3HNWAvvQoWEaOxFVnQp4
	/9CDpCIOkGVMqg6k0G2yEYHr7AurHphTPJJoMJhoMvFLEpgnWrSWwogoqDAV409LRVWIUt3DzuBCN
	Gq2RNXOgmt1fL495ZjRt9cdMOHiHsyN8e0emZkd8XWXhGsC01kfcgvpSA5fUR0T0a1HY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168550-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168550: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 13 Mar 2022 09:03:15 +0000

flight 168550 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168550/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   12 days
Failing since        168258  2022-03-01 01:55:31 Z   12 days  106 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    1 days   20 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 13 09:30:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 13 Mar 2022 09:30:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289656.491249 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTKYn-0002zR-KX; Sun, 13 Mar 2022 09:30:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289656.491249; Sun, 13 Mar 2022 09:30:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTKYn-0002zK-Gj; Sun, 13 Mar 2022 09:30:45 +0000
Received: by outflank-mailman (input) for mailman id 289656;
 Sun, 13 Mar 2022 09:30:44 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTKYm-0002zA-2E; Sun, 13 Mar 2022 09:30:44 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTKYm-0006HW-0P; Sun, 13 Mar 2022 09:30:44 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTKYl-0002OZ-MX; Sun, 13 Mar 2022 09:30:43 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTKYl-0003Oe-M6; Sun, 13 Mar 2022 09:30:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=tH9cWowQ0ua8bUNfNWDHWumaLU/ItGyKHGEFtNVEuAQ=; b=JfHV8g3IBdSxnAvaCHTcQzkaOY
	26bS+MKeVmMcliV3yl5fbYd0hPaS7DyKx9PgiTR0/u8Y0YBkLqyIodPaRBH6mx4QGil0pnogm2XEd
	mlmIC0Zi4a0JVvu1rDUpY9pP+DU7lT+JqO1XEmSCvoC139bjRJ6dtjC/9iuKAEAYmq04=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168551-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168551: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 13 Mar 2022 09:30:43 +0000

flight 168551 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168551/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   12 days
Failing since        168258  2022-03-01 01:55:31 Z   12 days  107 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    1 days   21 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 13 09:59:44 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 13 Mar 2022 09:59:44 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289664.491259 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTL0j-0005Vx-UM; Sun, 13 Mar 2022 09:59:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289664.491259; Sun, 13 Mar 2022 09:59:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTL0j-0005Vq-QU; Sun, 13 Mar 2022 09:59:37 +0000
Received: by outflank-mailman (input) for mailman id 289664;
 Sun, 13 Mar 2022 09:59:35 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTL0h-0005Vg-QO; Sun, 13 Mar 2022 09:59:35 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTL0h-0006j4-Hy; Sun, 13 Mar 2022 09:59:35 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTL0g-000355-BV; Sun, 13 Mar 2022 09:59:34 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTL0g-0002K4-B3; Sun, 13 Mar 2022 09:59:34 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=K1zEPWr0eIymcuib3OQiWf+y6GsVxI+P6oq4nc8WgPA=; b=p9l2o/a42ht5OSlCMJV7515YpM
	WRarXAX+v2v2BrU9fhYlGDKL+01G2z/r8N1XKqChpOEspxK3bcD153CiPXWQSl2Ulhsajy9dPJZC2
	uaib+f15WQndPDds9Re3wGp9a9M3MnHlGtfdlgtFNSSYNj780vKFbvc+Qcz0XIKzdxEY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168552-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168552: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 13 Mar 2022 09:59:34 +0000

flight 168552 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168552/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   12 days
Failing since        168258  2022-03-01 01:55:31 Z   12 days  108 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    1 days   22 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 13 10:57:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 13 Mar 2022 10:57:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289675.491270 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTLuK-0003FV-QG; Sun, 13 Mar 2022 10:57:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289675.491270; Sun, 13 Mar 2022 10:57:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTLuK-0003FO-NP; Sun, 13 Mar 2022 10:57:04 +0000
Received: by outflank-mailman (input) for mailman id 289675;
 Sun, 13 Mar 2022 10:57:03 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTLuJ-0003FE-Eg; Sun, 13 Mar 2022 10:57:03 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTLuJ-0007lE-Ab; Sun, 13 Mar 2022 10:57:03 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTLuI-0004Qf-S2; Sun, 13 Mar 2022 10:57:02 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTLuI-0007Yk-Rb; Sun, 13 Mar 2022 10:57:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=e972tK13mXchCJr53/6MB/2ZoBi3XlCviIPVMVTEhP0=; b=55urliYDPCx1yARC2EVgMl71AW
	C4Tf7wIVlxuPevKes18EVm/R8ok7X3joBoQpqmKJBr/Ik/LH8lkBgPAPoH8Z15QW+SE0bGh2FIEVS
	R07AFr/Cecq5gwBHRhpIKRxqKk78Xs5iuGBpPOyDJxBwjcO8R/31h0FIBwdyQhe9eQhw=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168553-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168553: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 13 Mar 2022 10:57:02 +0000

flight 168553 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168553/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   13 days
Failing since        168258  2022-03-01 01:55:31 Z   12 days  109 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    1 days   23 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 13 11:04:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 13 Mar 2022 11:04:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289683.491282 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTM1K-0004gf-Je; Sun, 13 Mar 2022 11:04:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289683.491282; Sun, 13 Mar 2022 11:04:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTM1K-0004gY-Gg; Sun, 13 Mar 2022 11:04:18 +0000
Received: by outflank-mailman (input) for mailman id 289683;
 Sun, 13 Mar 2022 11:04:16 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTM1I-0004gO-CM; Sun, 13 Mar 2022 11:04:16 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTM1I-0007th-3z; Sun, 13 Mar 2022 11:04:16 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTM1H-0004a4-Lj; Sun, 13 Mar 2022 11:04:15 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTM1H-0000GX-LI; Sun, 13 Mar 2022 11:04:15 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=GX3p5yMirqq/flSlsZ8+BFdn2aHL8u5/KC2Lq+R7IQQ=; b=k8pP6npyH1s4Yflpiox7OGvzn0
	a0NbaIXbt3QGYJZMreA3z/GSJNepaenaGNGd5puq92fgiv+EcRQ9MsaCwGeRLnoGg/LudtzZKrHhC
	a8GiqtmzZ+s3FhQfCB93ngM8IRj2CNda4a0BXIwJAHFaJ1Fg/Iy9AhH3zv2yP1X+6eRQ=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168545-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168545: tolerable FAIL
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=6ff9a7e62b8c43fe3e9d360fbd49d5854787bc39
X-Osstest-Versions-That:
    xen=6ff9a7e62b8c43fe3e9d360fbd49d5854787bc39
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 13 Mar 2022 11:04:15 +0000

flight 168545 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168545/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168527
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168527
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168527
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168527
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168527
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168527
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168527
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168527
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168527
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168527
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168527
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168527
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass

version targeted for testing:
 xen                  6ff9a7e62b8c43fe3e9d360fbd49d5854787bc39
baseline version:
 xen                  6ff9a7e62b8c43fe3e9d360fbd49d5854787bc39

Last test of basis   168545  2022-03-13 01:51:48 Z    0 days
Testing same since                          (not found)         0 attempts

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Published tested tree is already up to date.



From xen-devel-bounces@lists.xenproject.org Sun Mar 13 11:31:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 13 Mar 2022 11:31:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289693.491292 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTMR9-00083l-VK; Sun, 13 Mar 2022 11:30:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289693.491292; Sun, 13 Mar 2022 11:30:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTMR9-00083e-SP; Sun, 13 Mar 2022 11:30:59 +0000
Received: by outflank-mailman (input) for mailman id 289693;
 Sun, 13 Mar 2022 11:30:58 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTMR8-00083U-HQ; Sun, 13 Mar 2022 11:30:58 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTMR8-0008MB-Ew; Sun, 13 Mar 2022 11:30:58 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTMR8-00059E-3P; Sun, 13 Mar 2022 11:30:58 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTMR8-0007D3-2v; Sun, 13 Mar 2022 11:30:58 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=efMhQy6GMmnT54MzUdcOlvkCPqEKggL/oKBizFUOr/A=; b=jbLq4o6SM0vdbdLHXnmIKLqBW/
	PhKhpAW3dfg9mseuDOBWuXPf/cuWLgXAKHFxJWtzOD/n6UnEXD16+kc64nLaDQhstuf+rHdWpW1aT
	ZlWoMU9PzyvLa8jLaHogCkw8ecvCb6uyAnLZMTz020ewtFeWz3R2XZCtWwymCzy9kicc=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168554-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168554: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 13 Mar 2022 11:30:58 +0000

flight 168554 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168554/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   13 days
Failing since        168258  2022-03-01 01:55:31 Z   12 days  110 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    1 days   24 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 13 12:15:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 13 Mar 2022 12:15:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289703.491304 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTN7d-0003yS-Gj; Sun, 13 Mar 2022 12:14:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289703.491304; Sun, 13 Mar 2022 12:14:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTN7d-0003yL-Du; Sun, 13 Mar 2022 12:14:53 +0000
Received: by outflank-mailman (input) for mailman id 289703;
 Sun, 13 Mar 2022 12:14:52 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTN7c-0003yB-3g; Sun, 13 Mar 2022 12:14:52 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTN7c-0000d1-1O; Sun, 13 Mar 2022 12:14:52 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTN7b-00066T-Np; Sun, 13 Mar 2022 12:14:51 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTN7b-0000Bx-NM; Sun, 13 Mar 2022 12:14:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=6JkQm0TMkdKTelYYadvquJZrV0Hxm3Pm4nCDi7IOl+0=; b=sH6dFyWPNoOtn9w+xsR0sLZsrW
	rsYvtTnrCQVKdkWpbhXaQFY7KQUkkcUR0Y7lRYFUjM5fSBC7D36MY9ItwbyIp0qZHaypIEJeRgsAC
	44WVm74f05Unb9fBicRSXg97xduxUJjRkC3FQemCfQ7oEVLI1XbpuqYSt2hCVPMiUNnE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168555-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168555: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 13 Mar 2022 12:14:51 +0000

flight 168555 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168555/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   13 days
Failing since        168258  2022-03-01 01:55:31 Z   12 days  111 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    1 days   25 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 13 12:59:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 13 Mar 2022 12:59:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289711.491315 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTNog-0008MQ-Uv; Sun, 13 Mar 2022 12:59:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289711.491315; Sun, 13 Mar 2022 12:59:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTNog-0008MJ-RI; Sun, 13 Mar 2022 12:59:22 +0000
Received: by outflank-mailman (input) for mailman id 289711;
 Sun, 13 Mar 2022 12:59:21 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTNof-0008M9-FD; Sun, 13 Mar 2022 12:59:21 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTNof-0001L1-ED; Sun, 13 Mar 2022 12:59:21 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTNoe-00074D-UZ; Sun, 13 Mar 2022 12:59:21 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTNoe-0002xR-U5; Sun, 13 Mar 2022 12:59:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=8iLyNPg+YKEUF6CtTsYiVs5XYTX3GuPpPvVhCPuuDFk=; b=AxtodqadCBNDSMIDU82cEaGmZr
	9jrGlSyapjPL0t2MpsBcAq7i943dGMvuh57p1gJTVG6nGrOLdfrQq/FY4C71y/Rt4zuWXHu56u8iv
	1UZXNB29QbIe9nRf/k3HdLKipW8GupwoDBHxXKZZlDZxRg2PUWsWarQ9NoLRWwxSGy0U=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168556-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168556: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 13 Mar 2022 12:59:20 +0000

flight 168556 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168556/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   13 days
Failing since        168258  2022-03-01 01:55:31 Z   12 days  112 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    1 days   26 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 13 13:45:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 13 Mar 2022 13:45:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289720.491326 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTOXA-00054Y-8W; Sun, 13 Mar 2022 13:45:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289720.491326; Sun, 13 Mar 2022 13:45:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTOXA-00054Q-5S; Sun, 13 Mar 2022 13:45:20 +0000
Received: by outflank-mailman (input) for mailman id 289720;
 Sun, 13 Mar 2022 13:45:19 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTOX9-00054H-RT; Sun, 13 Mar 2022 13:45:19 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTOX9-00025s-On; Sun, 13 Mar 2022 13:45:19 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTOX9-00083L-E0; Sun, 13 Mar 2022 13:45:19 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTOX9-0004OJ-DV; Sun, 13 Mar 2022 13:45:19 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=v2xYcyBMIZEw2+WyL6DtHAqkOc1aPC42KXWw2oz2Dbo=; b=uDTrRIWFjcYphOPBgW5TXrJzJL
	vo4pNlmjH5DBkA3iG/dfl6mjJLAImI5gpIX55cx31YddnJCvcezwNUWMQS/pQnxnT0R4uJN+snFlf
	U9YzL0JhqHNGd+Tv5lsZMdN0eHVlT+eTtt7WrcubeE2MNX34Pk1Rfb6WDBNREXSOjavo=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168557-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168557: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 13 Mar 2022 13:45:19 +0000

flight 168557 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168557/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   13 days
Failing since        168258  2022-03-01 01:55:31 Z   12 days  113 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    1 days   27 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 13 14:31:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 13 Mar 2022 14:31:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289729.491337 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTPFo-0001tf-Jq; Sun, 13 Mar 2022 14:31:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289729.491337; Sun, 13 Mar 2022 14:31:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTPFo-0001tY-Ga; Sun, 13 Mar 2022 14:31:28 +0000
Received: by outflank-mailman (input) for mailman id 289729;
 Sun, 13 Mar 2022 14:31:27 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTPFn-0001tN-B2; Sun, 13 Mar 2022 14:31:27 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTPFn-0002v4-8H; Sun, 13 Mar 2022 14:31:27 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTPFm-0000by-TL; Sun, 13 Mar 2022 14:31:26 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTPFm-0007KI-Su; Sun, 13 Mar 2022 14:31:26 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=v2PqMZM3GFK4qTE/O5tO7aKx+Bf/GyobY3TLJUNsx5k=; b=2RK03kbdxQBqRZsX1M8OWqItgz
	fHEEXBXyl1ssIZCPtoGlAvISNExwb9CuQYOPvR0/Bl3tWJ427/vgqdrUqcER3tSOZUZtRQOryATef
	3dFLLiCLQf6FscVwuUbePyRrDMx5ScU77kAwZmoYb9VcqYKQeIjnMvWlxwPE7ngQpWlU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168558-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168558: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 13 Mar 2022 14:31:26 +0000

flight 168558 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168558/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   13 days
Failing since        168258  2022-03-01 01:55:31 Z   12 days  114 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    1 days   28 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 13 15:40:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 13 Mar 2022 15:40:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289738.491348 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTQKD-0000LL-QA; Sun, 13 Mar 2022 15:40:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289738.491348; Sun, 13 Mar 2022 15:40:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTQKD-0000Kh-Ls; Sun, 13 Mar 2022 15:40:05 +0000
Received: by outflank-mailman (input) for mailman id 289738;
 Sun, 13 Mar 2022 15:40:04 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTQKC-00009e-OG; Sun, 13 Mar 2022 15:40:04 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTQKC-00044g-MQ; Sun, 13 Mar 2022 15:40:04 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTQKC-00026f-9H; Sun, 13 Mar 2022 15:40:04 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTQKC-0004t7-8q; Sun, 13 Mar 2022 15:40:04 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Rf38elw7qLlrcz66tgTEMPo4gE2GNswEIq3wWgYCDfE=; b=FpOi6M6mfwZJCYUW4LIZ2xXohY
	MLmiqR24VUJMSC2RMPXIO+xfAggyv9Sd7OG/6zk5Zfye1h9AuhCegI4PFb+RKszkAD0a/Y8Ao+90p
	VCPW7kL2NKHKVZNinyj2Vuo7jX9RBvBp5LpdqppbYnQRNVZpBPAEikeeAYfyeiAWF9sw=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168559-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168559: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 13 Mar 2022 15:40:04 +0000

flight 168559 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168559/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   13 days
Failing since        168258  2022-03-01 01:55:31 Z   12 days  115 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    1 days   29 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 13 16:57:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 13 Mar 2022 16:57:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289749.491359 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTRX0-0008CZ-Ky; Sun, 13 Mar 2022 16:57:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289749.491359; Sun, 13 Mar 2022 16:57:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTRX0-0008CS-Hi; Sun, 13 Mar 2022 16:57:22 +0000
Received: by outflank-mailman (input) for mailman id 289749;
 Sun, 13 Mar 2022 16:57:22 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTRX0-0008CI-3F; Sun, 13 Mar 2022 16:57:22 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTRWz-0005uh-UV; Sun, 13 Mar 2022 16:57:21 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTRWz-0003mT-FM; Sun, 13 Mar 2022 16:57:21 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTRWz-000710-Ev; Sun, 13 Mar 2022 16:57:21 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=WshtUnhqVmalTvbZDjWHyDcrM1Lui+piF3Z+d1OJwYY=; b=dpf813n7DfjedL0DESn7kCEJLZ
	ew8D+7dWUdDfJlsj46r4mg8WriLwc1DgGfOY1mjK4CBqiWe/FPgx9L093/ckl4FrOyWH4a1bQi5se
	wog2dej52dnakqIwOBIp8cxbn1ucJfCkR8+MsUCSp9JdnMLzHQLoERyxAU1NPAD4FQgo=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168560-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168560: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 13 Mar 2022 16:57:21 +0000

flight 168560 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168560/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   13 days
Failing since        168258  2022-03-01 01:55:31 Z   12 days  116 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    1 days   30 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 13 17:42:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 13 Mar 2022 17:42:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289758.491370 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTSEF-0004qQ-48; Sun, 13 Mar 2022 17:42:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289758.491370; Sun, 13 Mar 2022 17:42:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTSEF-0004qJ-13; Sun, 13 Mar 2022 17:42:03 +0000
Received: by outflank-mailman (input) for mailman id 289758;
 Sun, 13 Mar 2022 17:42:02 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTSEE-0004q9-7x; Sun, 13 Mar 2022 17:42:02 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTSEE-0006fP-6M; Sun, 13 Mar 2022 17:42:02 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTSED-0004kQ-U1; Sun, 13 Mar 2022 17:42:01 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTSED-0008Bu-Tb; Sun, 13 Mar 2022 17:42:01 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=zC3XRKfoCGP8hdaQGnsUyvRQpxrKNFqZbMtffoszerk=; b=35pEC574HUwGMEPkt1CgmEr480
	oW+Jy7jJouirCJiSb4TeF1pL2YpjdBWeQ9X3GcJ/8ZvSOyp/KOP7fWD51al9O2Kmja5plEpKK88cB
	FfD0SH3j0lp+q0bR5vGW8kSexsc0xHPw/uuiOnawXSr3JZ2KNYZqsR01Ddgct1rLg9XQ=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168561-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168561: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 13 Mar 2022 17:42:01 +0000

flight 168561 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168561/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   13 days
Failing since        168258  2022-03-01 01:55:31 Z   12 days  117 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    2 days   31 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 13 18:41:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 13 Mar 2022 18:41:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289766.491381 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTT9u-0002a4-9U; Sun, 13 Mar 2022 18:41:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289766.491381; Sun, 13 Mar 2022 18:41:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTT9u-0002Zx-62; Sun, 13 Mar 2022 18:41:38 +0000
Received: by outflank-mailman (input) for mailman id 289766;
 Sun, 13 Mar 2022 18:41:36 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTT9s-0002Zn-KG; Sun, 13 Mar 2022 18:41:36 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTT9s-0007hU-Fz; Sun, 13 Mar 2022 18:41:36 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTT9s-00060u-5B; Sun, 13 Mar 2022 18:41:36 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTT9s-0004l5-4i; Sun, 13 Mar 2022 18:41:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Az6IfOESU9AmV9i6YLY+XMUIiJqW9BvIl+SEuXp3dgw=; b=U4v8045oKqBQ8cP7yMqSYcXR9L
	uAX5n2ANDiZip5T3vGY+Rv4ro1mnmtTNnvRlLLnnvRTUnZkayaOY7G5TPXBR44/Mt8ApEN4GgpV+w
	NDW0DpOXEPVsiCVW5HOOKvsFHrankj0Oh6eUpmIKPf2DiqGkMFUWGxYQl3xbtrKcm8HY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168562-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168562: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 13 Mar 2022 18:41:36 +0000

flight 168562 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168562/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   13 days
Failing since        168258  2022-03-01 01:55:31 Z   12 days  118 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    2 days   32 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 13 20:28:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 13 Mar 2022 20:28:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289774.491392 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTUpR-0004JZ-AJ; Sun, 13 Mar 2022 20:28:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289774.491392; Sun, 13 Mar 2022 20:28:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTUpR-0004JR-6b; Sun, 13 Mar 2022 20:28:37 +0000
Received: by outflank-mailman (input) for mailman id 289774;
 Sun, 13 Mar 2022 20:28:36 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTUpQ-0004JH-Ah; Sun, 13 Mar 2022 20:28:36 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTUpQ-00016m-37; Sun, 13 Mar 2022 20:28:36 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTUpP-0008Kh-L2; Sun, 13 Mar 2022 20:28:35 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTUpP-00009S-KZ; Sun, 13 Mar 2022 20:28:35 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=T/5JP+gNoIr7fks13XWZO4GsULMwft3zw5yLPg9Vv3o=; b=M2gBR8xo//r9KZ+UBOE+X2OGR6
	Pi1EzfEEA1ItZqSdgZOGpxz+dmzbu22sARjTYuPvEvi5MCLPmhS50DfeD28745boDaIp8NI0w3v7a
	zmtSKOt+qpKlXL4++qm2LkyerN+PXovwz3HEBQa9Tl4/jMeYy22b5G/AQoeGnQcAHVAI=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168564-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168564: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 13 Mar 2022 20:28:35 +0000

flight 168564 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168564/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   13 days
Failing since        168258  2022-03-01 01:55:31 Z   12 days  119 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    2 days   33 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 13 21:29:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 13 Mar 2022 21:29:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289782.491403 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTVll-00022v-P1; Sun, 13 Mar 2022 21:28:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289782.491403; Sun, 13 Mar 2022 21:28:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTVll-00022o-LK; Sun, 13 Mar 2022 21:28:53 +0000
Received: by outflank-mailman (input) for mailman id 289782;
 Sun, 13 Mar 2022 21:28:52 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTVlk-00022e-Ou; Sun, 13 Mar 2022 21:28:52 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTVlk-00024W-8i; Sun, 13 Mar 2022 21:28:52 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTVlj-0003BI-TQ; Sun, 13 Mar 2022 21:28:51 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTVlj-0008LV-Sy; Sun, 13 Mar 2022 21:28:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=L6C4hN+LV01khU8yq9e4AxGOE6Mw9e9v50oi/xQA5JY=; b=xiurpKd46uGanob0n8/V1jF+xa
	zDCsxemqvE4SqC+AR88eebgeK+NLNGkJm8wyvSsRDXH68SwacjQN1ZwcS1kBOeiqd9gIgy+msBQpi
	ZP5SKpjNEFdLIxX0GDyko1Sd/Y6wB1rGp5HpFGmvUQQ5UQUrZGZ+zQP+zTpohwiR1IlQ=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168565-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168565: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 13 Mar 2022 21:28:51 +0000

flight 168565 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168565/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   13 days
Failing since        168258  2022-03-01 01:55:31 Z   12 days  120 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    2 days   34 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 13 22:28:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 13 Mar 2022 22:28:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289792.491413 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTWhF-0008ET-Fy; Sun, 13 Mar 2022 22:28:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289792.491413; Sun, 13 Mar 2022 22:28:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTWhF-0008EM-Cz; Sun, 13 Mar 2022 22:28:17 +0000
Received: by outflank-mailman (input) for mailman id 289792;
 Sun, 13 Mar 2022 22:28:15 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTWhD-0008EC-Q4; Sun, 13 Mar 2022 22:28:15 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTWhD-00032G-NU; Sun, 13 Mar 2022 22:28:15 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTWhD-0005Xp-94; Sun, 13 Mar 2022 22:28:15 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTWhD-0000TK-8f; Sun, 13 Mar 2022 22:28:15 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=IFLfbBQyX1uPQ2lKCgetsXGVNdgCEP5M50wVGqw4Esc=; b=iSAIxOxhTjHRkcUegZCm/PJOSg
	03NJXbfCvEMbzchSVvnJuQnjC0ci+PDapvftqpPTcOL2MlKOp5+GFogSV5ujJBI1gAPK3F7xP0h5V
	tYOGkMxcEX8Xoi9pfQAh1gYbk8XJ6S1pzeX8qeO033aiy6w8pcZTKRZykb0Z31PVSTGI=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168566-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168566: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 13 Mar 2022 22:28:15 +0000

flight 168566 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168566/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   13 days
Failing since        168258  2022-03-01 01:55:31 Z   12 days  121 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    2 days   35 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 13 23:18:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 13 Mar 2022 23:18:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289801.491424 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTXTY-00058D-7q; Sun, 13 Mar 2022 23:18:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289801.491424; Sun, 13 Mar 2022 23:18:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTXTY-000586-4y; Sun, 13 Mar 2022 23:18:12 +0000
Received: by outflank-mailman (input) for mailman id 289801;
 Sun, 13 Mar 2022 23:18:11 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTXTX-00057w-22; Sun, 13 Mar 2022 23:18:11 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTXTX-0003pv-0z; Sun, 13 Mar 2022 23:18:11 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTXTW-0007Hm-Mm; Sun, 13 Mar 2022 23:18:10 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTXTW-00017X-MM; Sun, 13 Mar 2022 23:18:10 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=pxVvSW8uMG+oij3r+hDn7Xgv1wG+RMHBYZAywffnVBk=; b=tHveVRl6NVak758qnuOnAo+H54
	X77R+BRqECUJ4dpmoPca2bROKxzDL8kZUuRzrb+icZ0LeA3zBptDuwadEC2bVUk/Xa9Q6P6Htcy/Q
	WajghfCB2i7w8+zYDG1r4NY4JIhzCGMQ4tavCuC+6NOptQUmluh4iAQq16qphLKCEr50=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168567-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168567: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 13 Mar 2022 23:18:10 +0000

flight 168567 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168567/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   13 days
Failing since        168258  2022-03-01 01:55:31 Z   12 days  122 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    2 days   36 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 13 23:59:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 13 Mar 2022 23:59:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289809.491436 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTY79-0000yG-67; Sun, 13 Mar 2022 23:59:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289809.491436; Sun, 13 Mar 2022 23:59:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTY79-0000y9-3B; Sun, 13 Mar 2022 23:59:07 +0000
Received: by outflank-mailman (input) for mailman id 289809;
 Sun, 13 Mar 2022 23:59:05 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTY77-0000xz-SI; Sun, 13 Mar 2022 23:59:05 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTY77-0004TI-QJ; Sun, 13 Mar 2022 23:59:05 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTY77-0008OJ-Ay; Sun, 13 Mar 2022 23:59:05 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTY77-0006g3-AW; Sun, 13 Mar 2022 23:59:05 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=C18vrEbKi4n2e+sZvvXmKqIf6DgZ8SMv546UDYYnxa0=; b=usebfyeLrpGaFHhjDu8wrPAEjG
	qD+bYuvoML+wNEKrVDOJiMgafSIQvIB4DpIc7UGCSoYxSRW85hLDF65KYp37SRZbFxG+ZHMUHc00m
	uK3MwcAy4ETbqeKlmDpJ1vvWxtMQzaPNExREW2q2VEzG2yGT7FrVZMGsicctT05cksEM=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168568-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168568: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 13 Mar 2022 23:59:05 +0000

flight 168568 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168568/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   13 days
Failing since        168258  2022-03-01 01:55:31 Z   12 days  123 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    2 days   37 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 00:57:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 00:57:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289817.491446 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTZ1K-0007lk-5x; Mon, 14 Mar 2022 00:57:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289817.491446; Mon, 14 Mar 2022 00:57:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTZ1K-0007ld-2p; Mon, 14 Mar 2022 00:57:10 +0000
Received: by outflank-mailman (input) for mailman id 289817;
 Mon, 14 Mar 2022 00:57:09 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTZ1J-0007lT-0K; Mon, 14 Mar 2022 00:57:09 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTZ1I-00061q-V6; Mon, 14 Mar 2022 00:57:08 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTZ1I-0001MD-GS; Mon, 14 Mar 2022 00:57:08 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTZ1I-0004MJ-G0; Mon, 14 Mar 2022 00:57:08 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=IMlv+t8SsjzePvKl7qHavhFnIjpY2wdBWZWcE4D60nc=; b=1tERHnoApWIQcTywehWKZoGc6i
	Fsi73ffktEw0l1OQV9BZ2fZ9Lt2vYcnaZkRrza0LZnadcAZd+VcC+DPL5o94esYbldziJEx1dIeQx
	llXO7qWNtWqK1C2Ouk9fpT/4hPxa0E3+NjWWWHtysEOtVltPcmiQMFOaYo/P88/k4ZJc=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168569-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168569: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 14 Mar 2022 00:57:08 +0000

flight 168569 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168569/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   13 days
Failing since        168258  2022-03-01 01:55:31 Z   12 days  124 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    2 days   38 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 01:29:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 01:29:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289825.491458 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTZWW-00008F-JT; Mon, 14 Mar 2022 01:29:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289825.491458; Mon, 14 Mar 2022 01:29:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTZWW-000086-GA; Mon, 14 Mar 2022 01:29:24 +0000
Received: by outflank-mailman (input) for mailman id 289825;
 Mon, 14 Mar 2022 01:29:23 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTZWV-00007w-9H; Mon, 14 Mar 2022 01:29:23 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTZWV-0003Tt-5N; Mon, 14 Mar 2022 01:29:23 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTZWU-00029M-KX; Mon, 14 Mar 2022 01:29:22 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTZWU-0004M8-K9; Mon, 14 Mar 2022 01:29:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=VfCUc51OzfAWdDXb53UqpOfM38FxrL+gMa2trFhJEVM=; b=uWZKwPlwrH+p/gpHs2kkjyRP7D
	VgSeS9uzWglq031DJxZMLGL/oXSEghAGzZjwVDWP3JB9iEBZPYV2lNx8xiwQJ8J0rlxVhBRxmbRey
	CWT/CXZbIrd+Idc40oWkVfNZP8t20GfrHEBekHYmRmZa+lFHj5upyz7gM3TSN4yscMCA=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168570-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168570: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 14 Mar 2022 01:29:22 +0000

flight 168570 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168570/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   13 days
Failing since        168258  2022-03-01 01:55:31 Z   12 days  125 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    2 days   39 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 02:00:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 02:00:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289836.491468 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTZzz-0003cV-02; Mon, 14 Mar 2022 01:59:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289836.491468; Mon, 14 Mar 2022 01:59:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTZzy-0003cO-T1; Mon, 14 Mar 2022 01:59:50 +0000
Received: by outflank-mailman (input) for mailman id 289836;
 Mon, 14 Mar 2022 01:59:49 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTZzx-0003cE-0Y; Mon, 14 Mar 2022 01:59:49 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTZzw-00043I-Th; Mon, 14 Mar 2022 01:59:48 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTZzw-0002rh-I3; Mon, 14 Mar 2022 01:59:48 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTZzw-0002Y7-Hb; Mon, 14 Mar 2022 01:59:48 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=JxJwPEUfq7FcGG/dhQBT+BnvdHqdssd4m+BxUnG5fd0=; b=vl9y18/Kozn2wVkDviBWuGqmad
	xiLbB4k4iDxSkYQNMM3Qpm0uVeQAE99UutIutKSIadVM4cnUDpYkgWNBFzyUv4NngPYNNMf3qk5gT
	0dhO2319/PFuZ09ONBbN3RXxJWxZtd9AXAPSPiXQy7fTMZXan+cUaLmNBdL2g2JPyBG4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168572-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168572: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 14 Mar 2022 01:59:48 +0000

flight 168572 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168572/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   13 days
Failing since        168258  2022-03-01 01:55:31 Z   13 days  126 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    2 days   40 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 03:04:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 03:04:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289845.491480 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTb0H-000321-U7; Mon, 14 Mar 2022 03:04:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289845.491480; Mon, 14 Mar 2022 03:04:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTb0H-00031u-PJ; Mon, 14 Mar 2022 03:04:13 +0000
Received: by outflank-mailman (input) for mailman id 289845;
 Mon, 14 Mar 2022 03:04:12 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTb0G-00031k-GE; Mon, 14 Mar 2022 03:04:12 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTb0G-00063X-Dc; Mon, 14 Mar 2022 03:04:12 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTb0G-0004MD-10; Mon, 14 Mar 2022 03:04:12 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTb0G-0007Mt-0P; Mon, 14 Mar 2022 03:04:12 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=PaVgbE5b77S2WObMuXE2kTsn92evrvOKRoJjFk7wt1w=; b=zdZkrww/N4RG1jiB+KrFxsg57W
	26ANJQZ3oCYKsi3/kjzWqeEEyUVHs/aOfYehDDi2nvJkzTF+mf4Ba2Dbbzcv/rMOvkmpbsC4BPScv
	E6xTkLX75w1jancYCxSY52I/jiBI49NoXNrXXckafk5hXCL7yhHYt9tK+DzIeYfNbwuI=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168563-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168563: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-freebsd11-amd64:guest-localmigrate/x10:fail:heisenbug
    linux-linus:test-amd64-amd64-xl-xsm:guest-start/debian.repeat:fail:heisenbug
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=f0e18b03fcafd8344539101f564ae358950ae892
X-Osstest-Versions-That:
    linux=aad611a868d16cdc16a7d4a764cef955293e47e3
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 14 Mar 2022 03:04:12 +0000

flight 168563 linux-linus real [real]
flight 168571 linux-linus real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168563/
http://logs.test-lab.xenproject.org/osstest/logs/168571/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-freebsd11-amd64 19 guest-localmigrate/x10 fail pass in 168571-retest
 test-amd64-amd64-xl-xsm 22 guest-start/debian.repeat fail pass in 168571-retest

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168540
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168540
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168540
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168540
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168540
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168540
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168540
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168540
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                f0e18b03fcafd8344539101f564ae358950ae892
baseline version:
 linux                aad611a868d16cdc16a7d4a764cef955293e47e3

Last test of basis   168540  2022-03-12 21:09:37 Z    1 days
Testing same since   168563  2022-03-13 19:10:54 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Borislav Petkov <bp@suse.de>
  Dave Hansen <dave.hansen@linux.intel.com>
  Jarkko Sakkinen <jarkko@kernel.org>
  Li Huafei <lihuafei1@huawei.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Masami Hiramatsu <mhiramat@kernel.org>
  Peter Zijlstra (Intel) <peterz@infradead.org>
  Peter Zijlstra <peterz@infradead.org>
  Ross Philipson <ross.philipson@oracle.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      fail    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             fail    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   aad611a868d1..f0e18b03fcaf  f0e18b03fcafd8344539101f564ae358950ae892 -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 03:12:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 03:12:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289853.491490 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTb8W-0004Yd-P1; Mon, 14 Mar 2022 03:12:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289853.491490; Mon, 14 Mar 2022 03:12:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTb8W-0004YW-Lx; Mon, 14 Mar 2022 03:12:44 +0000
Received: by outflank-mailman (input) for mailman id 289853;
 Mon, 14 Mar 2022 03:12:43 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTb8V-0004YM-1Q; Mon, 14 Mar 2022 03:12:43 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTb8U-0006CG-UB; Mon, 14 Mar 2022 03:12:42 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTb8U-0004cY-BI; Mon, 14 Mar 2022 03:12:42 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTb8U-0003QX-An; Mon, 14 Mar 2022 03:12:42 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=bsKgzcCNusFKVX6JVhGx3vLS6pynDLkwelhw4n/JSaU=; b=uUovnnNzu/Cpb1aMpEWm68a5PY
	XyZKyrQ1IMNTlto0vVhMrjbjOY8Og4Xhc3GEpsZuMuZ1WpZ8mp+3cAT6b3quj6ltwqU5ksBp17dK/
	IRJT+4FR5QBSB2pNCsyGZo4MF19BZ8psb1m16ZztqeaKO3wfpO4xEbR1Sv6andBGglfg=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168574-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168574: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 14 Mar 2022 03:12:42 +0000

flight 168574 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168574/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   13 days
Failing since        168258  2022-03-01 01:55:31 Z   13 days  127 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    2 days   41 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 03:42:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 03:42:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289863.491501 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTbal-0007zV-6v; Mon, 14 Mar 2022 03:41:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289863.491501; Mon, 14 Mar 2022 03:41:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTbal-0007zO-3v; Mon, 14 Mar 2022 03:41:55 +0000
Received: by outflank-mailman (input) for mailman id 289863;
 Mon, 14 Mar 2022 03:41:53 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=ga0j=TZ=aim.com=brchuckz@srs-se1.protection.inumbo.net>)
 id 1nTbai-0007zG-92
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 03:41:53 +0000
Received: from sonic306-21.consmr.mail.gq1.yahoo.com
 (sonic306-21.consmr.mail.gq1.yahoo.com [98.137.68.84])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ac60146a-a348-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 04:41:48 +0100 (CET)
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic306.consmr.mail.gq1.yahoo.com with HTTP; Mon, 14 Mar 2022 03:41:46 +0000
Received: by kubenode510.mail-prod1.omega.ne1.yahoo.com (VZM Hermes SMTP
 Server) with ESMTPA ID 2a2ff40647b282ca087dda5d8bac1295; 
 Mon, 14 Mar 2022 03:41:43 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ac60146a-a348-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netscape.net; s=a2048; t=1647229306; bh=mLaHN5C5RzR3kqlo3PMcOlb/DmfXiYWaEjD2K3ImbGQ=; h=From:To:Cc:Subject:Date:References:From:Subject:Reply-To; b=rbyXGFXVfBxM8cJnHzl9ywnkE+x+SypMzLhofsw4KSkb+ukyqmhZN2B73HgzJHB8rkNY3IsHuhZnQd9SspTI6Ew+AlR5iOLd/Wi/XtA5Oc6mRKXCD9qXdWzzMBtb94m98blESIuz5sXD9JAiEoDalEfclURxPmqevuGZ0J7WnA+YvYEvs8k7MG4yr+J/PgJFvzL0mpw3uIWeDnBS4QeXzimsL4LkmuWQNfFDhq4SOOe7mUrCHNlCXxl6n2tZDzNuV4t5HyMM6zamta6WXFNhBJipBtDa0XVwXE57ocsbf0m5KOehEy5wMB9aVpFUwjifDhCPRIGezrPtnCb2p8kvXw==
X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1647229306; bh=pJnuEFWPougLFIC66Rngu3qbknm8HFA+APqxALvqu8C=; h=X-Sonic-MF:From:To:Subject:Date:From:Subject; b=Rkn5lG9gQbnEczRksMlUIc7lnuChWaqOZYGuy6KFOoSTCKqhCPhL2rrmCYVRoS56uxkDXe4YiZ6S0kw1GQcYISpCSiWcYEcAUOlk1iuf9SUQlT6Lr/sO4lUDVoUgI5evGbfJ17Rof+fdlcBYN6h2sRCGaAMvkOMsOuKa+JOXR+Tpb4aOhAbxc6t9r0yvRVBW/PlZuKCNaqIKXa1I816fo1O680ke9Paerbgo2GY0+2PCDc3yZ3V6cqQXWVQv+KZSWerPb+EHEK8f0Na5dnt1h9lKpSmrW659zknTZmz6G+VuTKcHFc2XER+ebkGlP5Nl1Mr19W7SwFUDCMemDoEGLw==
X-YMail-OSG: uZr2XLgVM1kb0CkHNdEMW7nHD0RMHc71na8YKjUN_arnKI1vln5zMgBVdZQrgWf
 D6MJx8zdGvap3kv0lrs_WTJprjxX9DN917QZ5xjC2YV8dqFoJ11Tn1WwGx.ictXZ55KlYotOFcbK
 UwYj0KcDFSM0Pc.coPuxjqziCKWZhdnAdXKmVealc50kwDxMd8fSq5U1Eg34lWnTYlQc.EjgHpMt
 hYmBvMZINq3es1KtAbETSOCyy2_kliTKkPThs.cbGT2GGPGEZbUnTabDXgtoXl8587e6FsRkQIFB
 QST8QyP6UjaEtOlSPwJ.Vl.XSK2zTM_Uo43euk8T43VhOYgQMTLKvxp87MSQrfaHiTK_PYId06QD
 nGWnRYC2DstcZKzBZKfKI5FmXHOkRUTMvkRvFrp2OR2MClb5xmbviyLMYODkZOrdTY3CdZBciiGl
 ja9G2Kq7wUJ67G1.5Nn.Uu0PTLHcsMFqkMl7GLuq3e6h1MUXc3XNscJ_LVTwMO0mTq6YAI316iCx
 Xwm5MayommIEnBVDqNMSrmSABP03C4E17fywAvbCEDt67R_R2X20sbr8tBcpeI.4Hlp232lA7QO4
 J144X8SYXWwnMEPk21KSzqmGPlZfU2HKdjUeh.FjTWncz4YaOEMbF8l7Ry9ScT8fUooJ083kK8N0
 dmmWyu2Me_PNMEXB948fgK.RtmmoQ1VyyRG9DrcSZT227GseHGdwfVH4JgCcr1dAD0HQNd6wem9s
 TKxjUBNxp412svgLWS8Rb9sICBDAAZ5I1AmDTZZSkQMVhirdWNeiNmUckYBO0VzNaa3hJRpkVe8i
 Q7WJNaaVcZwbBKfgCt6.nOJ53tLFpCe7CYfdnDnufRhfGY_BtgFQfRxlbnwWxUfP0wLfDSldngtQ
 Nb_yYo.JzlqwKFZ6a_B6PQLGCInCXiNhSmKiWLFo5mdDaTLWiPlsCPGvIfgKiZhzgoEFPjnlJ3mo
 Npc9dLAk4ovDw2WxxzOV.gr4_VrLoUqsWQjVcbKpzjv_aQJZCZRhxQ8WYKbYxSfTu3QaRMgU3jBW
 KH877jsWq8acPlgtiHuLf.Zr9G2afiDg5vTV6i6zBlHUZl5jyaOLSdihBf8nXBYkvSlzgZjnwItQ
 K7wikQ5lN9FTA2ROSLNTnsBL8AVkpaTAvWMDJj1uJmU3GW6iERjQ.1miJpllBsaFA5QhJEqNaNeX
 tUWyAeBT5ErW0SgPlcEUN3Ug.xGIV..XkETH_IO6aW1Ua8ZqppLX_6JFJ4bm56KNrE08nX6C6gcX
 7nLMm4B8S_k31DzhKv81J5dwSWIQPYP2SsQxdN20hJfaf7pGEkQhSE6XjEW447QERChoz4rPp3od
 1VxswMtMyC1KBAl_IG1hRnJq7QzMpyqyv1wCxsXDzsoookn3.dW7yC.Aa9WKcCj_7E0Uru3eoIqe
 o24z.r.BN9Sy6E6BahE2rq4yuTOGaXSsC35bzULdZUzv2.JMR1cUJNQcTo.BXwePeXbNj1NgJKkj
 0kaGBi5IX4zEmbmACSPiEgDvH3z4hNiiPcAVodBSjiIK8AC4WQu.xJ3cYqjix3v_iwefJxHbh2_i
 9mIQLy8TMLvA.9XvRUolL0Vbm8k2wK7h3E96cSb2bJ28IlGAXSVXI5svbDNo1CZ2JqlNsI24VKIs
 JHSlY6q2jhAwJlbmYf0DQ8I1Pxpp3rLwOCE6KNqa_bYaRoQZUZYFEa0v63tIKchhVjAOlw5D5fpU
 dwrxCBe0JuXoTmP7NzC0Yf1osXKFBekWTany8cOAy1hZt3_eo8JhqQl7SmaDNQwfWDp6cKnpFe2a
 _PY70xdAz3uZtDBn6Bvg1g3LEZTqB6sSnyN9Dzrxi6JdiL3jKPIYHBu8eRd0WzipmXH12c005_m4
 MblrPieFsxwR_kiFzHy1lNY7kmT6.P3nXWVMh6pCnlJnriv2PgFFoR2cyxIpRzEp4P1zTqrgsf53
 37wehkV6R_7x_8irKFK_ibjWhYhzW4t0Di4NPMq5zP6rgmioi3QNRA9_BA.bsgl5J5cBBfZwHcxc
 i5P7tyk95dZfGpHidbiit4RVrEZSgvtdNGNJ5TNPuhwam0XB7yOWzf9kiUVvnqjxMcaLCCT6fVAg
 enbQCZeKWHGdXNKmBPNVA5AFKXzyykN8uGgo9MuQyK1g2gzfF2CDs3.iJ6V9FcaeF9jY2CfDxrtK
 vjylNG9D9dPrVMi7moXys23Ta1gzFf5lkrzR3nvsCP6GpCgIleiX0YWXstaC7vyw6mFZS0F8aQOd
 sWl0-
X-Sonic-MF: <brchuckz@aim.com>
From: Chuck Zmudzinski <brchuckz@netscape.net>
To: xen-devel@lists.xenproject.org
Cc: Wei Liu <wl@xen.org>,
	Anthony PERARD <anthony.perard@citrix.com>,
	Juergen Gross <jgross@suse.com>,
	Jan Beulich <jbeulich@suse.com>
Subject: [XEN PATCH] tools/libs/light/libxl_pci.c: explicitly grant access to Intel IGD opregion
Date: Sun, 13 Mar 2022 23:41:37 -0400
Message-Id: <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz@netscape.net>
X-Mailer: git-send-email 2.35.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
References: <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz.ref@netscape.net>
Content-Length: 10962

When gfx_passthru is enabled for the Intel IGD, hvmloader maps the IGD
opregion to the guest but libxl does not grant the guest permission to
access the mapped memory region. This results in a crash of the i915.ko
kernel module in a Linux HVM guest when it needs to access the IGD
opregion:

Oct 23 11:36:33 domU kernel: Call Trace:
Oct 23 11:36:33 domU kernel:  ? idr_alloc+0x39/0x70
Oct 23 11:36:33 domU kernel:  drm_get_last_vbltimestamp+0xaa/0xc0 [drm]
Oct 23 11:36:33 domU kernel:  drm_reset_vblank_timestamp+0x5b/0xd0 [drm]
Oct 23 11:36:33 domU kernel:  drm_crtc_vblank_on+0x7b/0x130 [drm]
Oct 23 11:36:33 domU kernel:  intel_modeset_setup_hw_state+0xbd4/0x1900 [i915]
Oct 23 11:36:33 domU kernel:  ? _cond_resched+0x16/0x40
Oct 23 11:36:33 domU kernel:  ? ww_mutex_lock+0x15/0x80
Oct 23 11:36:33 domU kernel:  intel_modeset_init_nogem+0x867/0x1d30 [i915]
Oct 23 11:36:33 domU kernel:  ? gen6_write32+0x4b/0x1c0 [i915]
Oct 23 11:36:33 domU kernel:  ? intel_irq_postinstall+0xb9/0x670 [i915]
Oct 23 11:36:33 domU kernel:  i915_driver_probe+0x5c2/0xc90 [i915]
Oct 23 11:36:33 domU kernel:  ? vga_switcheroo_client_probe_defer+0x1f/0x40
Oct 23 11:36:33 domU kernel:  ? i915_pci_probe+0x3f/0x150 [i915]
Oct 23 11:36:33 domU kernel:  local_pci_probe+0x42/0x80
Oct 23 11:36:33 domU kernel:  ? _cond_resched+0x16/0x40
Oct 23 11:36:33 domU kernel:  pci_device_probe+0xfd/0x1b0
Oct 23 11:36:33 domU kernel:  really_probe+0x222/0x480
Oct 23 11:36:33 domU kernel:  driver_probe_device+0xe1/0x150
Oct 23 11:36:33 domU kernel:  device_driver_attach+0xa1/0xb0
Oct 23 11:36:33 domU kernel:  __driver_attach+0x8a/0x150
Oct 23 11:36:33 domU kernel:  ? device_driver_attach+0xb0/0xb0
Oct 23 11:36:33 domU kernel:  ? device_driver_attach+0xb0/0xb0
Oct 23 11:36:33 domU kernel:  bus_for_each_dev+0x78/0xc0
Oct 23 11:36:33 domU kernel:  bus_add_driver+0x12b/0x1e0
Oct 23 11:36:33 domU kernel:  driver_register+0x8b/0xe0
Oct 23 11:36:33 domU kernel:  ? 0xffffffffc06b8000
Oct 23 11:36:33 domU kernel:  i915_init+0x5d/0x70 [i915]
Oct 23 11:36:33 domU kernel:  do_one_initcall+0x44/0x1d0
Oct 23 11:36:33 domU kernel:  ? do_init_module+0x23/0x260
Oct 23 11:36:33 domU kernel:  ? kmem_cache_alloc_trace+0xf5/0x200
Oct 23 11:36:33 domU kernel:  do_init_module+0x5c/0x260
Oct 23 11:36:33 domU kernel:  __do_sys_finit_module+0xb1/0x110
Oct 23 11:36:33 domU kernel:  do_syscall_64+0x33/0x80
Oct 23 11:36:33 domU kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9
Oct 23 11:36:33 domU kernel: RIP: 0033:0x7f188e1aa9b9

This bug first appeared with commits abfb006f1ff4 and 0561e1f01e87
during the development of Xen 4.5 in 2014 and is present in all Xen
versions 4.5 and higher.

Currently, because of another bug in Qemu upstream, this crash can
only be reproduced using the traditional Qemu device model, and of
course it can only be reproduced on a system with an Intel IGD and
compatible hardware and system BIOS that supports Intel VT-d. It also
only occurs with Linux Intel graphics drivers (i915) in a Linux guest.
It does not occur in a Windows guest with proprietary Windows Intel
graphics drivers. This testing was done with Qemu traditional running as
a process in dom0.

The commit abfb006f1ff4 was intended to explicitly grant access to all
needed I/O memory ranges so access requests by guests would not fail
after commit 0561e1f01e87 was applied, but it failed to handle the case
when the Intel IGD is being passed to an HVM guest for VGA passthrough.
This patch grants access to the Intel IGD opregion if an Intel IGD is
passed to an HVM guest and gfx_passthru is enabled in the xl.cfg guest
configuration file, in addition to the other memory that was configured
for access in commit abfb006f1ff4.

The fix is implemented as follows:

The first hunk of the patch adds two macros. These are the macros that
determine the starting address and size of the Intel IGD opregion.
PCI_INTEL_OPREGION matches the value in tools/firmware/hvmloader/pci_regs.h.
IGD_OPREGION_PAGES matches the value in tools/firmware/hvmloader/config.h.
These macros are used to correctly define the start address and size of
the Intel IGD opregion.

The second hunk is the new sysfs_dev_get_igd_opregion function, using
the same coding style as the other sysfs_dev_get_xxx functions in
the patched file. It returns the start address of the Intel IGD opregion
from dom0's point of view if there are no errors, and it is called by
code in the third and final hunk of the patch.

The third hunk extends the libxl__grant_vga_iomem_permission function,
which was a newly added function in one of the commits being fixed now
(abfb006f1ff4). That function, in addition to what it did before, now
checks if we have an Intel IGD and if so, it calls the new
sysfs_dev_get_igd_opregion function to get the starting address of the
memory to grant access to.

This problem was discovered by building and testing versions of
Xen 4.5-unstable until the aforementioned patches that broke passthrough
of the Intel IGD to a Linux HVM guest were found.

That alone, though, was not enough information to arrive at this fix.
After identifying abfb006f1ff4 and 0561e1f01e87 as the commits that were
causing the trouble, it was necessary to find out what memory was being
denied that previously was allowed. By examining verbose logs from both
Qemu and Xen, and the logs from a custom build of Xen that added a
custom log entry to indicate the address of the memory that was being
denied, it was possible to determine without doubt that the memory that
was being denied was the Intel IGD opregion.

Windows HVM guests are not affected by this issue, presumably because
the proprietary Windows Intel graphics drivers do not need to access the
Intel IGD opregion if for some reason it is inaccessible.

Guidelines for maintaining this code: This code needs to be kept
consistent with how hvmloader maps the Intel IGD opregion to the guest,
how hvmloader and libxenlight detect an Intel IGD on the PCI bus, and
how Qemu sets up the mapped IGD opregion in the guest and detects an
Intel IGD. For example, all these components should agree on the size of
the IGD opregion.

The most important point for the future is accurate detection of the
Intel IGD, which libxl__is_igd_vga_passthru currently provides. This
patch does not modify that function, but it does use it. It will be
important to ensure that function accurately detects an Intel IGD,
because that is the only way we validate the contents of the Intel
IGD opregion that we are permitting the guest to access. Currently, if
we have a VGA device, the vendor is Intel, and the gfx_passthru option
is enabled, we assume the contents of the memory we are mapping to
and sharing with the guest is valid. The libxl__is_igd_vga_passthru
function also reads the device id, but currently it assumes every
Intel GPU device has an opregion. So, for example, if it is discovered
that the newer discrete Intel GPUs do not have an opregion, the
libxl__is_igd_vga_passthru function should be modified to return false
for those devices.

Fixes: abfb006f1ff4 (tools/libxl: explicitly grant access to needed I/O-memory ranges)
Fixes: 0561e1f01e87 (xen/common: do not implicitly permit access to mapped I/O memory)
Backport: 4.12+

Signed-off-by: Chuck Zmudzinski <brchuckz@netscape.net>
---
 tools/libs/light/libxl_pci.c | 72 ++++++++++++++++++++++++++++++++++++
 1 file changed, 72 insertions(+)

diff --git a/tools/libs/light/libxl_pci.c b/tools/libs/light/libxl_pci.c
index 4bbbfe9f16..a4fc473de9 100644
--- a/tools/libs/light/libxl_pci.c
+++ b/tools/libs/light/libxl_pci.c
@@ -24,6 +24,8 @@
 #define PCI_OPTIONS            "msitranslate=%d,power_mgmt=%d"
 #define PCI_BDF_XSPATH         "%04x-%02x-%02x-%01x"
 #define PCI_PT_QDEV_ID         "pci-pt-%02x_%02x.%01x"
+#define PCI_INTEL_OPREGION     0xfc
+#define IGD_OPREGION_PAGES     3
 
 static unsigned int pci_encode_bdf(libxl_device_pci *pci)
 {
@@ -610,6 +612,45 @@ out:
     return ret;
 }
 
+static uint32_t sysfs_dev_get_igd_opregion(libxl__gc *gc,
+                                           libxl_device_pci *pci)
+{
+    char *pci_device_config_path =
+            GCSPRINTF(SYSFS_PCI_DEV"/"PCI_BDF"/config",
+                      pci->domain, pci->bus, pci->dev, pci->func);
+    size_t read_items;
+    uint32_t igd_opregion;
+    uint32_t error = 0xffffffff;
+
+    FILE *f = fopen(pci_device_config_path, "r");
+    if (!f) {
+        LOGE(ERROR,
+             "pci device "PCI_BDF" does not have config attribute",
+             pci->domain, pci->bus, pci->dev, pci->func);
+        goto out;
+    }
+    if (fseek(f, PCI_INTEL_OPREGION, SEEK_SET)) {
+        LOGE(ERROR,
+             "cannot find igd opregion address of pci device "PCI_BDF,
+             pci->domain, pci->bus, pci->dev, pci->func);
+        goto out;
+    }
+    read_items = fread(&igd_opregion, 4, 1, f);
+    if (read_items != 1) {
+        LOGE(ERROR,
+             "cannot read igd opregion address of pci device "PCI_BDF,
+             pci->domain, pci->bus, pci->dev, pci->func);
+        goto out;
+    }
+    fclose(f);
+    return igd_opregion;
+
+out:
+    if (f)
+        fclose(f);
+    return error;
+}
+
 /*
  * Some devices may need some ways to work well. Here like IGD,
  * we have to pass a specific option to qemu.
@@ -2531,6 +2572,37 @@ int libxl__grant_vga_iomem_permission(libxl__gc *gc, const uint32_t domid,
                   domid, vga_iomem_start, (vga_iomem_start + 0x20 - 1));
             return ret;
         }
+
+        /* If this is an Intel IGD, allow access to the IGD opregion */
+        if (!libxl__is_igd_vga_passthru(gc, d_config)) return 0;
+
+        uint32_t igd_opregion = sysfs_dev_get_igd_opregion(gc, pci);
+        uint32_t error = 0xffffffff;
+        if (igd_opregion == error) break;
+
+        vga_iomem_start = ( (uint64_t) igd_opregion ) >> XC_PAGE_SHIFT;
+        ret = xc_domain_iomem_permission(CTX->xch, stubdom_domid,
+                                         vga_iomem_start,
+                                         IGD_OPREGION_PAGES, 1);
+        if (ret < 0) {
+            LOGED(ERROR, domid,
+                  "failed to give stubdom%d access to iomem range "
+                  "%"PRIx64"-%"PRIx64" for IGD passthru",
+                  stubdom_domid, vga_iomem_start, (vga_iomem_start +
+                                                IGD_OPREGION_PAGES - 1));
+            return ret;
+        }
+        ret = xc_domain_iomem_permission(CTX->xch, domid,
+                                         vga_iomem_start,
+                                         IGD_OPREGION_PAGES, 1);
+        if (ret < 0) {
+            LOGED(ERROR, domid,
+                  "failed to give dom%d access to iomem range "
+                  "%"PRIx64"-%"PRIx64" for IGD passthru",
+                  domid, vga_iomem_start, (vga_iomem_start +
+                                           IGD_OPREGION_PAGES - 1));
+            return ret;
+        }
         break;
     }
 
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 03:43:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 03:43:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289867.491513 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTbbq-00004t-HM; Mon, 14 Mar 2022 03:43:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289867.491513; Mon, 14 Mar 2022 03:43:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTbbq-0008WS-Dy; Mon, 14 Mar 2022 03:43:02 +0000
Received: by outflank-mailman (input) for mailman id 289867;
 Mon, 14 Mar 2022 03:43:01 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=NoMf=TZ=intel.com=kevin.tian@srs-se1.protection.inumbo.net>)
 id 1nTbbp-0008WE-8Z
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 03:43:01 +0000
Received: from mga05.intel.com (mga05.intel.com [192.55.52.43])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d658249e-a348-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 04:42:59 +0100 (CET)
Received: from orsmga003.jf.intel.com ([10.7.209.27])
 by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 13 Mar 2022 20:42:56 -0700
Received: from orsmsx606.amr.corp.intel.com ([10.22.229.19])
 by orsmga003.jf.intel.com with ESMTP; 13 Mar 2022 20:42:56 -0700
Received: from orsmsx610.amr.corp.intel.com (10.22.229.23) by
 ORSMSX606.amr.corp.intel.com (10.22.229.19) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21; Sun, 13 Mar 2022 20:42:56 -0700
Received: from orsedg603.ED.cps.intel.com (10.7.248.4) by
 orsmsx610.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21 via Frontend Transport; Sun, 13 Mar 2022 20:42:55 -0700
Received: from NAM02-BN1-obe.outbound.protection.outlook.com (104.47.51.40) by
 edgegateway.intel.com (134.134.137.100) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.1.2308.21; Sun, 13 Mar 2022 20:42:55 -0700
Received: from BN9PR11MB5276.namprd11.prod.outlook.com (2603:10b6:408:135::18)
 by PH7PR11MB6030.namprd11.prod.outlook.com (2603:10b6:510:1d1::19)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26; Mon, 14 Mar
 2022 03:42:53 +0000
Received: from BN9PR11MB5276.namprd11.prod.outlook.com
 ([fe80::c8aa:b5b2:dc34:e893]) by BN9PR11MB5276.namprd11.prod.outlook.com
 ([fe80::c8aa:b5b2:dc34:e893%8]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 03:42:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d658249e-a348-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;
  t=1647229379; x=1678765379;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-transfer-encoding:mime-version;
  bh=p887uf0TXNXf/PQUOtxZhhikezJyHUC/mzsjzKSlOpY=;
  b=ZQQr/7V9pfpK2Eej35DXomezlYhx63K0CfuexyGc3PgC+qPOa2Zb4WXT
   1POI2aYe6pfT5p3nTagT00+bN4YeXvihkbYC8xYiVZ2ap5o4j6TArO7lx
   UZ9yLbx+iBxBodEjG+j8QGeFkXXI1uCcaKv5UgkGvndUHnF+3UcciVxt6
   8OY/W8g1szLzPCjg84kTwloatA1PGcXvUFvFKZ0P192lUbDStdX+p/EZH
   wztDPEKqgCeNm0XA8fPI6Gp7zm7Pkl/tOT5T+R1uTpkg2susUOiEKPxSF
   Pyah+YP9MoXBT790Rm+dIPNqpvSIft4fp/9sNrD9N0qYPkzl/yWoexl1J
   A==;
X-IronPort-AV: E=McAfee;i="6200,9189,10285"; a="342353159"
X-IronPort-AV: E=Sophos;i="5.90,179,1643702400"; 
   d="scan'208";a="342353159"
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.90,179,1643702400"; 
   d="scan'208";a="497449376"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ZBXtcCTRzLFrN/RkyiiuzMYBMxiVMcIyxS0Rlh+/O9tfZuyzsUWTaBH+SKPzSoDf48ie+00qY5n5dlG0dw5ob4m9hUEbboRA/qS+ArJfD5IzuX8IdBu7eYyKOebFjJ2E3M4RJUJZ9ckPCCLWJJEPM2xzqniFk4VFA0nAoBgm+eX/dHjsArRJ3fc+FBTQVAIyjxYBm91aZJNeXaH3KF1mhxnrAno6dUtacrX2+XYjM3VnapL5l21uRxIlU1hzrWaeeLkXHtURv5YxXwTWOTfDtczMwk+yAumpwY58v4S3oCXgdiTXi9RSjbqzGkDWgnsuN5b76SMAZAeReE0FXPcyJg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=p887uf0TXNXf/PQUOtxZhhikezJyHUC/mzsjzKSlOpY=;
 b=WfU5rVDuzSKHT464n1KLuSlMxNWJVrPdQdElXJZMUBBqJ+acS1bvcKDtKSuO3whx1owD4KtsnhDTsWxk0DolkO9eqlEF++XXsqdnxYRQrwqJ6k+JP9wnscLeXkQloy+1m+L7FtZoXZGMd6hjGuydJGtXacqxyGSd5poCa6JCa9bROWhQZw/6sSQP8EwavGOYSJvSWD9gruV872TdtecUgX/qvtCRWwrb/G/nwf2PJW2Tzq8t+3eauDLqkVwes82y2EPz+/Sde8Df0hLu4Ir9pD66SSuucTxDXZ587iwuGyMn++xGxwWFd0t7JQ8f+33t3KNgq1zWss9RuLwHPVPptw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com;
 dkim=pass header.d=intel.com; arc=none
From: "Tian, Kevin" <kevin.tian@intel.com>
To: "Beulich, Jan" <JBeulich@suse.com>, "Nakajima, Jun"
	<jun.nakajima@intel.com>
CC: "Cooper, Andrew" <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	=?utf-8?B?UGF1IE1vbm7DqSwgUm9nZXI=?= <roger.pau@citrix.com>
Subject: RE: [PATCH] x86/vmx: remove dead code to create domains without a
 vLAPIC
Thread-Topic: [PATCH] x86/vmx: remove dead code to create domains without a
 vLAPIC
Thread-Index: AQHYIl87iX8bB2tBzkuN2evUAzBqdayUmrQAgCRWlQCABXUBQA==
Date: Mon, 14 Mar 2022 03:42:52 +0000
Message-ID: <BN9PR11MB5276A2F0B18385F11F87EE5D8C0F9@BN9PR11MB5276.namprd11.prod.outlook.com>
References: <20220215112835.99230-1-roger.pau@citrix.com>
 <b254d8ac-8bdd-af65-f9d3-e2fe69ffdde9@suse.com>
 <15d8232a-51c5-77c8-b246-ca0266576b30@suse.com>
In-Reply-To: <15d8232a-51c5-77c8-b246-ca0266576b30@suse.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=intel.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: c7cac378-6fd0-4a64-9f9a-08da056cb810
x-ms-traffictypediagnostic: PH7PR11MB6030:EE_
x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr
x-microsoft-antispam-prvs: <PH7PR11MB6030BE6130420D9764ED58848C0F9@PH7PR11MB6030.namprd11.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: +JjrY+g9YD5oOeNPpJptJpGOs0bNE8UpELH56fW9gBvnpZl34CRMuNNZlrwjPjr9aMfwfRixmbOCDvOgJ+tWkE4wxVoO0W2b1vkFYyauDlMMSAFTZbzhUp1F6Y1NPZRGNYUsUSQyYIkFL7UoEGaSRJwIgcfxGKCwJEbhZSq4FSq1bDX53oHI4Aw17lnx2SlFqs72VufAQHsHE1yiZ0tTiD7+osrRf5vrcRCC2cyq4ZZGyudUcKfjQ7Bbwua1F4WuyGUxjUr/HlUdZDU4paQzqzekn2slxDSiNgBXSppBg13PoCeIdW3xtFG/BWMpMiY2FIbNx4boIS9hnpeLVQNYYR+P5jQDcYkkDb4tkGTMVqGYV9f/RSnoZLtnylCY44FwlrzoUZrUVHLNNJ5PDte+bt2M1j21Wb9eoXxPQiOF9uVLFltfbf9x4ffkb+E1DjYRi0+OQswJhtfNffhbU5N82reGhqy4AFmZtqw6RqISeJsqvqDdRVyQtc2v8NPPEAijZ8EWivrFRX3OzY2lBJsepAAZEebn+gbg2RJ12ibkmrb7PnyM3fT2u5WHzeeO5qJoBtEzg0m0lmsocsCOt0IqkOF7t+EARj4evThfxGGX2pBWVSOWQtdp8+bRsPim/p2PsVKes7/XSV7uvWVYj8XEwC+flkZiodsH8qJVjb5cZ/2SOOzQamoP6/r1toltddnODtolB9/dSAmS9iPlZv84sg==
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BN9PR11MB5276.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(82960400001)(54906003)(316002)(122000001)(9686003)(508600001)(6636002)(86362001)(33656002)(66556008)(55016003)(76116006)(66946007)(66476007)(4326008)(8676002)(66446008)(64756008)(38070700005)(110136005)(53546011)(7696005)(71200400001)(6506007)(38100700002)(83380400001)(2906002)(4744005)(52536014)(186003)(8936002)(5660300002)(26005);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?VDdONElEUjAwbDhvK0VUMERDbVowU0dDZnJYVTVUMGJtTHdDSHlGTHdINzkv?=
 =?utf-8?B?ZFFiNjU0MXFjZDAydnYwRXVGdllVNFdNeDd6M0thTWR6SFpzbjl1Q0pJRFYw?=
 =?utf-8?B?aWVMeXBLMXdvNjZueDMyaThySGh2Q3VvajdFWG9BdDZCVEd2UFhtVTBpU0N6?=
 =?utf-8?B?MjM2N1VwUS9JeEVpbHJ5enJHQUswcFM0WDBVeWlGLytJdjhRYVBKdDVuUGdn?=
 =?utf-8?B?TDlwaHlyUk9CMVNXYXlKcnZrMjMxVHg2RUVhUGxNRlVsUkdKaXY0TE1KRXZD?=
 =?utf-8?B?c2Roa2x4cXFtRzd0WUF0Yk00SGdhYmhIVGNhOG1jcDRVVnNhUXNkUTZsVGJO?=
 =?utf-8?B?TW1HODZKV2RMVHY5a3BCWXRQU0dkRUNwdVNrdS9oWWVFRzB5cmt6Y2NrWXNv?=
 =?utf-8?B?Mm5wZnh4RnNmY0VLNXQ2L2ZrQkdpVmJzYWRJQ3JtQmo2MlR5eThyNHNxTllk?=
 =?utf-8?B?R0w3SGhBR1l1UW9KR1pML0luSG1VWUZ3cFl0TzFRK3dDd0c0L2pVdHZqdm1y?=
 =?utf-8?B?WGF0SlBBbzRkbXhhcmhwVlA2WGhTS3FYMkFuVmMyN3B3cUJlcHFtbkk4cndP?=
 =?utf-8?B?cW9jbkszNkdsK0U3MnRsVUNVTk9qMUY2bnFRTWs4SE5KTkdsaG5FVU5BWTF1?=
 =?utf-8?B?cFRCdXgydEYvVE9odDZkNmpQSDJDM1k0QnBmZnU3cThrK2FVQzVCZWlJU1Uz?=
 =?utf-8?B?NmtyWEk3UnNKVzhSRXhCUjFTM1g3N0FHSGNwdjRodGJXRXlDODlncW45N3dP?=
 =?utf-8?B?RWdYb1U3blhJTmlvMm9ZeHVRdmRMcWJQRmNjTUNoSUFlYmxCZUVLbWc0QUJn?=
 =?utf-8?B?YWVGQm9aUUVaTVU3dHBiRHdjdFM4U0N5Njk5ZUJCd0Fka29ObzVUS3ZmblB4?=
 =?utf-8?B?Q2xneTRXVE11NmlxSGpsZU80OFhlVzhKVWYrUUhZOGRwN1dZOUNNUmE5REl5?=
 =?utf-8?B?NGYrdGx0eS9EZ3hlZUJjeHl5MGZ1WlJYYzl4KzJKL0VaZ281d3pBSWJYV0Nx?=
 =?utf-8?B?NW1JSHdaOWRUQkFyZEEzVE45a1RwWFlBbmN3ZlJXRk1vYzAwMkR0d3FLRTlH?=
 =?utf-8?B?aTFhek9YZVpkZ1dQaTAzcXg5cFpyOFE0VjhlSEcyTXdCNWJZU096cVhKaTU0?=
 =?utf-8?B?Y0VLMEVjVys4aWNwM3ZsZWtYams2OGJIVWZnZm5SbzlHWG9IV2Y1cG1RTk81?=
 =?utf-8?B?UENJYmZoa3pUdUMzT09OL0syZC9qbDRvbjRrZDJJSHVYdTdEU2pKL05IYkh5?=
 =?utf-8?B?Nm1QaHloZjJocExnd1g0YVA2Z2ZZVDJqZWdjOG9zcGxPK1dET25DQytpV3gr?=
 =?utf-8?B?elIzRHR4ZG9kUC9KR1hhQVhHSm1kWHQxSUJnK29rMGgzeEQ5UGdzallZbDg3?=
 =?utf-8?B?K2R2Vk5ybGRNNjgwK3pHbkpVaWlTMUtFSW5EdW84c0lYSTlsRlhIUEJSYmZt?=
 =?utf-8?B?TXY1d0FmaGttalRucXFwSkZhUnVrb1hyZjRaQlZrWTBHQnFpbGZDVFREMzht?=
 =?utf-8?B?WEZwV2NWdWorOVFqN013Sjhhd2d6czNhUy9IVENLWmc0Y0w2ODFKMmRxQUs0?=
 =?utf-8?B?dlBCeUhOOTJuY1BmOG9JL1RrS29aVHVRY1NtSllwWFpIcXBlZFNGV2hNWFA5?=
 =?utf-8?B?cktJMGRkTmt2c1F3Z2d2NGdUQUdlak0rOTJFOWpGY1pEK0d2SXdGSFEzVEdG?=
 =?utf-8?B?aHpXWUJSK05ZL3VrSXpOYjc2S1pteEh5R1ppTkZWNk5NMVJVUkxHalc5ejJ4?=
 =?utf-8?B?WlFSaWlNZnVWaWhuS0Q4bzRZK3d0bENyU1RGYmQwWG5ScXFQYVAvdnhEeVU5?=
 =?utf-8?B?UWJUVkhFVUd1ZGtZVzJPOUVwaFdta1YyREgvZGtlTUZXYWVPd0VNQTk2bnpw?=
 =?utf-8?B?TFRrb21aeTBodTRvVW5ncTlRZnN3WUQ2WVYyNHJhKzdiQWYwMEFzMGVNRmE3?=
 =?utf-8?Q?HyOXVYbj8J/oSEKDW8vMcsvrYby38l65?=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN9PR11MB5276.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c7cac378-6fd0-4a64-9f9a-08da056cb810
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Mar 2022 03:42:52.8113
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 8SLfAO8BoDZvn3UCBI3YKUZEG1mfTDQvI+5JwEBB25pZ5NQwnlpVa0LCPy9XMx3MyTtgG+NOMU0jBfSkXBo7Zg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR11MB6030
X-OriginatorOrg: intel.com
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=


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 03:48:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 03:48:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289871.491523 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTbh4-0000tP-4z; Mon, 14 Mar 2022 03:48:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289871.491523; Mon, 14 Mar 2022 03:48:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTbh4-0000tI-1y; Mon, 14 Mar 2022 03:48:26 +0000
Received: by outflank-mailman (input) for mailman id 289871;
 Mon, 14 Mar 2022 03:48:24 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=QvMz=TZ=arm.com=Henry.Wang@srs-se1.protection.inumbo.net>)
 id 1nTbh2-0000t7-MC
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 03:48:24 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04on062e.outbound.protection.outlook.com
 [2a01:111:f400:fe0c::62e])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 981a2942-a349-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 04:48:23 +0100 (CET)
Received: from DB3PR06CA0010.eurprd06.prod.outlook.com (2603:10a6:8:1::23) by
 VI1PR08MB5309.eurprd08.prod.outlook.com (2603:10a6:803:133::18) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26; Mon, 14 Mar
 2022 03:48:05 +0000
Received: from DB5EUR03FT019.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:8:1:cafe::7c) by DB3PR06CA0010.outlook.office365.com
 (2603:10a6:8:1::23) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26 via Frontend
 Transport; Mon, 14 Mar 2022 03:48:04 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT019.mail.protection.outlook.com (10.152.20.163) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Mon, 14 Mar 2022 03:48:04 +0000
Received: ("Tessian outbound 31aeb3346a45:v113");
 Mon, 14 Mar 2022 03:48:04 +0000
Received: from 05102da35aa8.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 95D3180B-EA70-49B3-A85F-F550BAD559C8.1; 
 Mon, 14 Mar 2022 03:47:58 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 05102da35aa8.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Mon, 14 Mar 2022 03:47:58 +0000
Received: from PA4PR08MB6253.eurprd08.prod.outlook.com (2603:10a6:102:e4::8)
 by AM8PR08MB6385.eurprd08.prod.outlook.com (2603:10a6:20b:36a::22) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.24; Mon, 14 Mar
 2022 03:47:51 +0000
Received: from PA4PR08MB6253.eurprd08.prod.outlook.com
 ([fe80::41e8:ebec:d794:38aa]) by PA4PR08MB6253.eurprd08.prod.outlook.com
 ([fe80::41e8:ebec:d794:38aa%3]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 03:47:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 981a2942-a349-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=jKGj6i4PAHGNNAnP+1fMv9k5drENGC6Bq98G+6PhbYU=;
 b=3iXuEXpBlKDXgLbUOpPAUBH+T1HdouXzt4GSsTamFisLoEHgT65H846SknRFdmBwhij+Fe+WOOEeo3JPV9Zw5P2D8MGKh4dTS2eWZENPtT/WiZrTHuRrvdZhDgrDYh0QvzA4OCp4pL9cj3UXHJuBAnQI1Jt5FJm26wjZDV4dfIY=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=hqEuCyu+1PE4+X+EzdYc2gVEh7JfqhVdKWhHjQITwr/5YK/Vg/CrsTIZN3oljcnNHhZcu7oKnOErCDzcX2oi+/dG85d6H4JtjbiC1exo7tb04ThFmN1jfMVREfXA0Jp9fTzU+s9Ktrj9lRiv3fZBL1i+VESys782Lj7zaT1FpxRbLtiHzaf1Mxh4g22wHGvGn4JBJSR+IYQk0w0IN001lyBOLe9ulAXNjFLp7o7r/9eXC0JQ6/AioAMEk0S67pLBkqiV0pVaqiURV7DCAXsEdUfGXS2wMRVHdadHs8gwz7Ni+LYNAqCgPNJHF3m134+QuOfNedAqj2TVcMVjmvjPow==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=jKGj6i4PAHGNNAnP+1fMv9k5drENGC6Bq98G+6PhbYU=;
 b=C4M43nW1yWIiq6DxmfPI8JaTs/z/T6RPMENlPmNG4GtWB0/riDhtZ5u4z3jHo87zQWoOdJ6FDw75yVCXPn2RmkoLkZWnVUmDF6OHyrvcyA+9tYmtJpCUPcx7Iw8p0txNfkIycoHwYUXIk1XsNe9RZ6eGOHp6yIyOmxn4kkWNWXoo4iknp5U2sDdZDR0iPdoq4u/7xFRwRfIBWw2TZStQGd2w5dp7I6aeP4dYfLL5S7L5kiEOyKiTexa3tzSyYnhb5eGfEYeVL6kM4eVKLKnwkfW3aibKd3A9j3yWfdMfUe+IfJeYBqnER48nHAopbmDmw9l7RVNOGR8HzcOYHNZC7Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=jKGj6i4PAHGNNAnP+1fMv9k5drENGC6Bq98G+6PhbYU=;
 b=3iXuEXpBlKDXgLbUOpPAUBH+T1HdouXzt4GSsTamFisLoEHgT65H846SknRFdmBwhij+Fe+WOOEeo3JPV9Zw5P2D8MGKh4dTS2eWZENPtT/WiZrTHuRrvdZhDgrDYh0QvzA4OCp4pL9cj3UXHJuBAnQI1Jt5FJm26wjZDV4dfIY=
From: Henry Wang <Henry.Wang@arm.com>
To: Marco Solieri <marco.solieri@minervasys.tech>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien Grall
	<julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, Wei Liu
	<wl@xen.org>, Marco Solieri <marco.solieri@unimore.it>, Andrea Bastoni
	<andrea.bastoni@minervasys.tech>, Luca Miccio <lucmiccio@gmail.com>
Subject: RE: [PATCH 27/36] xen/arch: add coloring support for Xen
Thread-Topic: [PATCH 27/36] xen/arch: add coloring support for Xen
Thread-Index: AQHYL/RHtZV3whmnN0SzL3d8EugMTKy+SvZA
Date: Mon, 14 Mar 2022 03:47:51 +0000
Message-ID:
 <PA4PR08MB6253A16AB5B20A479F923ECD920F9@PA4PR08MB6253.eurprd08.prod.outlook.com>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-28-marco.solieri@minervasys.tech>
In-Reply-To: <20220304174701.1453977-28-marco.solieri@minervasys.tech>
Accept-Language: zh-CN, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 5B3DDAEB4ECC0944B2BE5C4AC4C3F3A4.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 83d1439e-f977-4ee2-cada-08da056d71d2
x-ms-traffictypediagnostic:
	AM8PR08MB6385:EE_|DB5EUR03FT019:EE_|VI1PR08MB5309:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR08MB5309369FE5E5EBBF24B2752D920F9@VI1PR08MB5309.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PA4PR08MB6253.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(55016003)(53546011)(9686003)(6506007)(7696005)(122000001)(38100700002)(508600001)(2906002)(33656002)(83380400001)(71200400001)(52536014)(66446008)(30864003)(110136005)(54906003)(5660300002)(7416002)(38070700005)(8936002)(186003)(76116006)(8676002)(316002)(26005)(86362001)(64756008)(66476007)(4326008)(66556008)(66946007);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM8PR08MB6385
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT019.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	5b3da2ff-803e-4087-c7ef-08da056d69f1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(54906003)(508600001)(110136005)(86362001)(36860700001)(107886003)(47076005)(26005)(186003)(336012)(33656002)(53546011)(83380400001)(9686003)(7696005)(6506007)(4326008)(81166007)(8676002)(70206006)(70586007)(82310400004)(2906002)(356005)(316002)(8936002)(55016003)(5660300002)(52536014)(30864003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 03:48:04.5404
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 83d1439e-f977-4ee2-cada-08da056d71d2
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT019.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB5309

Hi,

> -----Original Message-----
> From: Xen-devel <xen-devel-bounces@lists.xenproject.org> On Behalf Of
> Marco Solieri
> Sent: Saturday, March 5, 2022 1:47 AM
> To: xen-devel@lists.xenproject.org
> Cc: Marco Solieri <marco.solieri@minervasys.tech>; Andrew Cooper
> <andrew.cooper3@citrix.com>; George Dunlap <george.dunlap@citrix.com>;
> Jan Beulich <jbeulich@suse.com>; Julien Grall <julien@xen.org>; Stefano
> Stabellini <sstabellini@kernel.org>; Wei Liu <wl@xen.org>; Marco Solieri
> <marco.solieri@unimore.it>; Andrea Bastoni
> <andrea.bastoni@minervasys.tech>; Luca Miccio <lucmiccio@gmail.com>
> Subject: [PATCH 27/36] xen/arch: add coloring support for Xen
>=20
> From: Luca Miccio <lucmiccio@gmail.com>
>=20
> Introduce a new implementation of setup_pagetables that uses coloring
> logic in order to isolate Xen code using its color selection.
> Page tables construction is essentially copied, except for the xenmap
> table, where coloring logic is needed.  Given the absence of a contiguous
> physical mapping, pointers to next level tables need to be manually
> calculated.
>=20
> Xen code is relocated in strided mode using the same coloring logic as
> the one in xenmap table by using a temporary colored mapping that will
> be destroyed after switching the TTBR register.
>=20
> Keep Xen text section mapped in the newly created pagetables.
> The boot process relies on computing needed physical addresses of Xen
> code by using a shift, but colored mapping is not linear and not easily
> computable. Therefore, the old Xen code is temporarily kept and used to
> boot secondary CPUs until they switch to the colored mapping, which is
> accessed using the handy macro virt_old.  After the boot process, the old
> Xen code memory is reset and its mapping is destroyed.
>=20
> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
> ---
>  xen/arch/arm/include/asm/coloring.h |  13 ++
>  xen/arch/arm/include/asm/mm.h       |   7 ++
>  xen/arch/arm/mm.c                   | 186 +++++++++++++++++++++++++++-
>  xen/arch/arm/psci.c                 |   4 +-
>  xen/arch/arm/setup.c                |  21 +++-
>  xen/arch/arm/smpboot.c              |  19 ++-
>  6 files changed, 241 insertions(+), 9 deletions(-)
>=20
> diff --git a/xen/arch/arm/include/asm/coloring.h
> b/xen/arch/arm/include/asm/coloring.h
> index 8c4525677c..424f6c2b04 100644
> --- a/xen/arch/arm/include/asm/coloring.h
> +++ b/xen/arch/arm/include/asm/coloring.h
> @@ -26,6 +26,17 @@
>  #ifdef CONFIG_COLORING
>  #include <xen/sched.h>
>=20
> +/*
> + * Amount of memory that we need to map in order to color Xen.  The valu=
e
> + * depends on the maximum number of available colors of the hardware.
> The
> + * memory size is pessimistically calculated assuming only one color is =
used,
> + * which means that any pages belonging to any other color has to be
> skipped.
> + */
> +#define XEN_COLOR_MAP_SIZE \
> +	((((_end - _start) * get_max_colors())\
> +		+ (XEN_PADDR_ALIGN-1)) & ~(XEN_PADDR_ALIGN-1))
> +#define XEN_COLOR_MAP_SIZE_M (XEN_COLOR_MAP_SIZE >> 20)
> +
>  bool __init coloring_init(void);
>=20
>  /*
> @@ -67,6 +78,8 @@ unsigned long color_from_page(struct page_info *pg);
>  /* Return the maximum available number of colors supported by the
> hardware */
>  uint32_t get_max_colors(void);
>  #else /* !CONFIG_COLORING */
> +#define XEN_COLOR_MAP_SIZE (_end - _start)
> +
>  static inline bool __init coloring_init(void)
>  {
>      return true;
> diff --git a/xen/arch/arm/include/asm/mm.h
> b/xen/arch/arm/include/asm/mm.h
> index 041ec4ee70..1422091436 100644
> --- a/xen/arch/arm/include/asm/mm.h
> +++ b/xen/arch/arm/include/asm/mm.h
> @@ -362,6 +362,13 @@ void clear_and_clean_page(struct page_info *page);
>=20
>  unsigned int arch_get_dma_bitsize(void);
>=20
> +#ifdef CONFIG_COLORING
> +#define virt_boot_xen(virt)\
> +    (vaddr_t)((virt - XEN_VIRT_START) + BOOT_RELOC_VIRT_START)

Apart from Julien's comments, one small issue, I am afraid with commit:

0c18fb7632 xen/arm: Remove unused BOOT_RELOC_VIRT_START

merged in staging branch, directly applying the Arm Cache coloring
series on top of the staging branch breaks the build of Xen.

Therefore please take care of this issue when sending the next version,
Thanks :)

Kind regards,

Henry

> +#else
> +#define virt_boot_xen(virt) virt
> +#endif
> +
>  #endif /*  __ARCH_ARM_MM__ */
>  /*
>   * Local variables:
> diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
> index d69f18b5d2..53ea13641b 100644
> --- a/xen/arch/arm/mm.c
> +++ b/xen/arch/arm/mm.c
> @@ -42,6 +42,7 @@
>  #include <xen/libfdt/libfdt.h>
>=20
>  #include <asm/setup.h>
> +#include <asm/coloring.h>
>=20
>  /* Override macros from asm/page.h to make them work with mfn_t */
>  #undef virt_to_mfn
> @@ -110,6 +111,9 @@ DEFINE_BOOT_PAGE_TABLE(boot_second_id);
>  DEFINE_BOOT_PAGE_TABLE(boot_third_id);
>  DEFINE_BOOT_PAGE_TABLE(boot_second);
>  DEFINE_BOOT_PAGE_TABLE(boot_third);
> +#ifdef CONFIG_COLORING
> +DEFINE_BOOT_PAGE_TABLE(boot_colored_xen);
> +#endif
>=20
>  /* Main runtime page tables */
>=20
> @@ -632,6 +636,166 @@ static void clear_table(void *table)
>      clean_and_invalidate_dcache_va_range(table, PAGE_SIZE);
>  }
>=20
> +#ifdef CONFIG_COLORING
> +/*
> + * Translate a Xen (.text) virtual address to the colored physical one
> + * depending on the hypervisor configuration.
> + * N.B: this function must be used only when migrating from non colored =
to
> + * colored pagetables since it assumes to have the temporary mappings
> created
> + * during setup_pagetables that starts from BOOT_RELOC_VIRT_START.
> + * After the migration we have to use virt_to_maddr.
> + */
> +static paddr_t virt_to_maddr_colored(vaddr_t virt)
> +{
> +    unsigned int va_offset;
> +
> +    va_offset =3D virt - XEN_VIRT_START;
> +    return __pa(BOOT_RELOC_VIRT_START + va_offset);
> +}
> +
> +static void __init coloring_temp_mappings(paddr_t xen_paddr, vaddr_t
> virt_start)
> +{
> +    int i;
> +    lpae_t pte;
> +    unsigned int xen_text_size =3D (_end - _start);
> +
> +    xen_text_size =3D PAGE_ALIGN(xen_text_size);
> +
> +    pte =3D mfn_to_xen_entry(maddr_to_mfn(__pa(boot_second)),
> MT_NORMAL);
> +    pte.pt.table =3D 1;
> +    boot_first[first_table_offset(virt_start)] =3D pte;
> +
> +    pte =3D mfn_to_xen_entry(maddr_to_mfn(__pa(boot_colored_xen)),
> MT_NORMAL);
> +    pte.pt.table =3D 1;
> +    boot_second[second_table_offset(virt_start)] =3D pte;
> +
> +    for ( i =3D 0; i < (xen_text_size/PAGE_SIZE); i++ )
> +    {
> +        mfn_t mfn;
> +        xen_paddr =3D next_xen_colored(xen_paddr);
> +        mfn =3D maddr_to_mfn(xen_paddr);
> +        pte =3D mfn_to_xen_entry(mfn, MT_NORMAL);
> +        pte.pt.table =3D 1; /* 4k mappings always have this bit set */
> +        boot_colored_xen[i] =3D pte;
> +        xen_paddr +=3D PAGE_SIZE;
> +    }
> +
> +   flush_xen_tlb_local();
> +}
> +
> +/*
> + * Boot-time pagetable setup with coloring support
> + * Changes here may need matching changes in head.S
> + *
> + * The process can be explained as follows:
> + * - Create a temporary colored mapping that conforms to Xen color
> selection.
> + * - Update all the pagetables links that point to the next level table(=
s):
> + * this process is crucial beacause the translation tables are not physi=
cally
> + * contiguous and we cannot calculate the physical addresses by using th=
e
> + * standard method (physical offset). In order to get the correct physic=
al
> + * address we use virt_to_maddr_colored that translates the virtual addr=
ess
> + * into a physical one based on the Xen coloring configuration.
> + * - Copy Xen to the new location.
> + * - Update TTBR0_EL2 with the new root page table address.
> + */
> +void __init setup_pagetables(unsigned long boot_phys_offset, paddr_t
> xen_paddr)
> +{
> +    int i;
> +    lpae_t pte, *p;
> +    paddr_t pt_phys;
> +    mfn_t pt_phys_mfn;
> +    paddr_t _xen_paddr =3D xen_paddr;
> +
> +    phys_offset =3D boot_phys_offset;
> +
> +    ASSERT((_end - _start) < SECOND_SIZE);
> +    /* Create temporary mappings */
> +    coloring_temp_mappings(xen_paddr, BOOT_RELOC_VIRT_START);
> +
> +    /* Build pagetables links */
> +    p =3D (void *)xen_pgtable;
> +    pt_phys =3D virt_to_maddr_colored((vaddr_t)xen_first);
> +    pt_phys_mfn =3D maddr_to_mfn(pt_phys);
> +    p[0] =3D mfn_to_xen_entry(pt_phys_mfn, MT_NORMAL);
> +    p[0].pt.table =3D 1;
> +    p[0].pt.xn =3D 0;
> +    p =3D (void *)xen_first;
> +
> +    for ( i =3D 0; i < 2; i++ )
> +    {
> +        pt_phys =3D virt_to_maddr_colored((vaddr_t)(xen_second + i *
> LPAE_ENTRIES));
> +        pt_phys_mfn =3D maddr_to_mfn(pt_phys);
> +        p[i] =3D mfn_to_xen_entry(pt_phys_mfn, MT_NORMAL);
> +        p[i].pt.table =3D 1;
> +        p[i].pt.xn =3D 0;
> +    }
> +
> +    for ( i =3D 0; i < LPAE_ENTRIES; i++ )
> +    {
> +        mfn_t mfn;
> +        vaddr_t va =3D XEN_VIRT_START + (i << PAGE_SHIFT);
> +        _xen_paddr =3D next_xen_colored(_xen_paddr);
> +        mfn =3D maddr_to_mfn(_xen_paddr);
> +        if ( !is_kernel(va) )
> +            break;
> +        pte =3D mfn_to_xen_entry(mfn, MT_NORMAL);
> +        pte.pt.table =3D 1; /* 4k mappings always have this bit set */
> +        if ( is_kernel_text(va) || is_kernel_inittext(va) )
> +        {
> +            pte.pt.xn =3D 0;
> +            pte.pt.ro =3D 1;
> +        }
> +        if ( is_kernel_rodata(va) )
> +            pte.pt.ro =3D 1;
> +        xen_xenmap[i] =3D pte;
> +        _xen_paddr +=3D PAGE_SIZE;
> +    }
> +
> +    /* Initialise xen second level entries ... */
> +    /* ... Xen's text etc */
> +    pt_phys =3D virt_to_maddr_colored((vaddr_t)(xen_xenmap));
> +    pt_phys_mfn =3D maddr_to_mfn(pt_phys);
> +    pte =3D mfn_to_xen_entry(pt_phys_mfn, MT_NORMAL);
> +    pte.pt.table =3D 1;
> +    xen_second[second_table_offset(XEN_VIRT_START)] =3D pte;
> +
> +    /* ... Fixmap */
> +    pt_phys =3D virt_to_maddr_colored((vaddr_t)(xen_fixmap));
> +    pt_phys_mfn =3D maddr_to_mfn(pt_phys);
> +    pte =3D mfn_to_xen_entry(pt_phys_mfn, MT_NORMAL);
> +    pte.pt.table =3D 1;
> +    xen_second[second_table_offset(FIXMAP_ADDR(0))] =3D pte;
> +
> +    /* ... DTB */
> +    pte =3D boot_second[second_table_offset(BOOT_FDT_VIRT_START)];
> +    xen_second[second_table_offset(BOOT_FDT_VIRT_START)] =3D pte;
> +    pte =3D boot_second[second_table_offset(BOOT_FDT_VIRT_START +
> SZ_2M)];
> +    xen_second[second_table_offset(BOOT_FDT_VIRT_START + SZ_2M)] =3D
> pte;
> +
> +    /* Update the value of init_ttbr */
> +    init_ttbr =3D virt_to_maddr_colored((vaddr_t)xen_pgtable);
> +    clean_dcache(init_ttbr);
> +
> +    /* Copy Xen to the new location */
> +    memcpy((void*)BOOT_RELOC_VIRT_START,
> +        (const void*)XEN_VIRT_START, (_end - _start));
> +    clean_dcache_va_range((void*)BOOT_RELOC_VIRT_START, (_end -
> _start));
> +
> +    /* Change ttbr */
> +    switch_ttbr(init_ttbr);
> +
> +    /*
> +     * Keep mapped old Xen memory in a contiguous mapping
> +     * for other cpus to boot. This mapping will also replace the
> +     * one created at the beginning of setup_pagetables.
> +     */
> +    create_mappings(xen_second, BOOT_RELOC_VIRT_START,
> +                paddr_to_pfn(XEN_VIRT_START + phys_offset),
> +                SZ_2M >> PAGE_SHIFT, SZ_2M);
> +
> +    xen_pt_enforce_wnx();
> +}
> +#else
>  /* Boot-time pagetable setup.
>   * Changes here may need matching changes in head.S */
>  void __init setup_pagetables(unsigned long boot_phys_offset, paddr_t
> xen_paddr)
> @@ -721,6 +885,7 @@ void __init setup_pagetables(unsigned long
> boot_phys_offset, paddr_t xen_paddr)
>      per_cpu(xen_dommap, 0) =3D cpu0_dommap;
>  #endif
>  }
> +#endif /* !CONFIG_COLORING */
>=20
>  static void clear_boot_pagetables(void)
>  {
> @@ -735,6 +900,9 @@ static void clear_boot_pagetables(void)
>  #endif
>      clear_table(boot_second);
>      clear_table(boot_third);
> +#ifdef CONFIG_COLORING
> +    clear_table(boot_colored_xen);
> +#endif
>  }
>=20
>  #ifdef CONFIG_ARM_64
> @@ -742,10 +910,16 @@ int init_secondary_pagetables(int cpu)
>  {
>      clear_boot_pagetables();
>=20
> +    /*
> +     * For coloring the value of the ttbr was already set up during
> +     * setup_pagetables.
> +     */
> +#ifndef CONFIG_COLORING
>      /* Set init_ttbr for this CPU coming up. All CPus share a single set=
of
>       * pagetables, but rewrite it each time for consistency with 32 bit.=
 */
>      init_ttbr =3D (uintptr_t) xen_pgtable + phys_offset;
>      clean_dcache(init_ttbr);
> +#endif
>      return 0;
>  }
>  #else
> @@ -859,12 +1033,20 @@ void __init setup_xenheap_mappings(unsigned
> long base_mfn,
>          else if ( xenheap_first_first_slot =3D=3D -1)
>          {
>              /* Use xenheap_first_first to bootstrap the mappings */
> -            first =3D xenheap_first_first;
> +            paddr_t phys_addr;
> +
> +            /*
> +             * At this stage is safe to use virt_to_maddr because Xen ma=
pping
> +             * is already in place. Using virt_to_maddr allows us to uni=
fy
> +             * codepath with and without cache coloring enabled.
> +             */
> +            phys_addr =3D virt_to_maddr((vaddr_t)xenheap_first_first);
> +            pte =3D mfn_to_xen_entry(maddr_to_mfn(phys_addr),MT_NORMAL);
>=20
> -            pte =3D pte_of_xenaddr((vaddr_t)xenheap_first_first);
>              pte.pt.table =3D 1;
>              write_pte(p, pte);
>=20
> +            first =3D xenheap_first_first;
>              xenheap_first_first_slot =3D slot;
>          }
>          else
> diff --git a/xen/arch/arm/psci.c b/xen/arch/arm/psci.c
> index 0c90c2305c..d443fac6a2 100644
> --- a/xen/arch/arm/psci.c
> +++ b/xen/arch/arm/psci.c
> @@ -25,6 +25,7 @@
>  #include <asm/cpufeature.h>
>  #include <asm/psci.h>
>  #include <asm/acpi.h>
> +#include <asm/coloring.h>
>=20
>  /*
>   * While a 64-bit OS can make calls with SMC32 calling conventions, for
> @@ -49,7 +50,8 @@ int call_psci_cpu_on(int cpu)
>  {
>      struct arm_smccc_res res;
>=20
> -    arm_smccc_smc(psci_cpu_on_nr, cpu_logical_map(cpu),
> __pa(init_secondary),
> +    arm_smccc_smc(psci_cpu_on_nr, cpu_logical_map(cpu),
> +                  __pa(virt_boot_xen((vaddr_t)init_secondary)),
>                    &res);
>=20
>      return PSCI_RET(res);
> diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c
> index 13b10515a8..294b806120 100644
> --- a/xen/arch/arm/setup.c
> +++ b/xen/arch/arm/setup.c
> @@ -924,6 +924,7 @@ void __init start_xen(unsigned long boot_phys_offset,
>      struct domain *d;
>      int rc;
>      paddr_t xen_paddr =3D (paddr_t)(_start + boot_phys_offset);
> +    uint32_t xen_size =3D (_end - _start);
>=20
>      dcache_line_bytes =3D read_dcache_line_bytes();
>=20
> @@ -952,13 +953,16 @@ void __init start_xen(unsigned long
> boot_phys_offset,
>      if ( !coloring_init() )
>          panic("Xen Coloring support: setup failed\n");
>=20
> +    xen_size =3D XEN_COLOR_MAP_SIZE;
> +#ifdef CONFIG_COLORING
> +    xen_paddr =3D get_xen_paddr(xen_size);
> +#endif
> +
>      /* Register Xen's load address as a boot module. */
> -    xen_bootmodule =3D add_boot_module(BOOTMOD_XEN, xen_paddr,
> -                             (paddr_t)(uintptr_t)(_end - _start + 1), fa=
lse);
> +    xen_bootmodule =3D add_boot_module(BOOTMOD_XEN, xen_paddr,
> xen_size, false);
>      BUG_ON(!xen_bootmodule);
>=20
>      setup_pagetables(boot_phys_offset, xen_paddr);
> -
>      setup_mm();
>=20
>      /* Parse the ACPI tables for possible boot-time configuration */
> @@ -1072,6 +1076,17 @@ void __init start_xen(unsigned long
> boot_phys_offset,
>=20
>      setup_virt_paging();
>=20
> +    /*
> +     * This removal is useful if cache coloring is enabled but
> +     * it should not affect non coloring configuration.
> +     * The removal is done earlier than discard_initial_modules
> +     * beacuse in do_initcalls there is the livepatch support
> +     * setup which uses the virtual addresses starting from
> +     * BOOT_RELOC_VIRT_START.
> +     * Remove coloring mappings to expose a clear state to the
> +     * livepatch module.
> +     */
> +    remove_early_mappings(BOOT_RELOC_VIRT_START, SZ_2M);
>      do_initcalls();
>=20
>      /*
> diff --git a/xen/arch/arm/smpboot.c b/xen/arch/arm/smpboot.c
> index 7bfd0a73a7..5ef68976c9 100644
> --- a/xen/arch/arm/smpboot.c
> +++ b/xen/arch/arm/smpboot.c
> @@ -438,6 +438,7 @@ int __cpu_up(unsigned int cpu)
>  {
>      int rc;
>      s_time_t deadline;
> +    vaddr_t *smp_up_cpu_addr;
>=20
>      printk("Bringing up CPU%d\n", cpu);
>=20
> @@ -453,10 +454,22 @@ int __cpu_up(unsigned int cpu)
>      /* Tell the remote CPU what its logical CPU ID is. */
>      init_data.cpuid =3D cpu;
>=20
> +    /*
> +     * If coloring is enabled, non-Master CPUs boot using the old Xen co=
de.
> +     * During the boot process each cpu is booted one after another usin=
g the
> +     * smp_cpu_cpu variable. This variable is accessed in head.S using i=
ts
> +     * physical address.
> +     * That address is calculated using the physical offset of the old X=
en
> +     * code. With coloring we can not rely anymore on that offset. For t=
his
> +     * reason in order to boot the other cpus we rely on the old xen cod=
e that
> +     * was mapped during tables setup in mm.c so that we can use the old
> physical
> +     * offset and the old head.S code also. In order to modify the old X=
en
> code
> +     * we need to access it using the mapped done in color_xen.
> +     */
> +    smp_up_cpu_addr =3D (vaddr_t *)virt_boot_xen((vaddr_t)&smp_up_cpu);
> +    *smp_up_cpu_addr =3D cpu_logical_map(cpu);
>      /* Open the gate for this CPU */
> -    smp_up_cpu =3D cpu_logical_map(cpu);
> -    clean_dcache(smp_up_cpu);
> -
> +    clean_dcache(*smp_up_cpu_addr);
>      rc =3D arch_cpu_up(cpu);
>=20
>      console_end_sync();
> --
> 2.30.2
>=20



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 04:01:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 04:01:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289878.491535 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTbtZ-0003Mr-EH; Mon, 14 Mar 2022 04:01:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289878.491535; Mon, 14 Mar 2022 04:01:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTbtZ-0003Mk-B6; Mon, 14 Mar 2022 04:01:21 +0000
Received: by outflank-mailman (input) for mailman id 289878;
 Mon, 14 Mar 2022 04:01:19 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=NoMf=TZ=intel.com=kevin.tian@srs-se1.protection.inumbo.net>)
 id 1nTbtX-0003Me-GG
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 04:01:19 +0000
Received: from mga04.intel.com (mga04.intel.com [192.55.52.120])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 64ab61d2-a34b-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 05:01:17 +0100 (CET)
Received: from orsmga003.jf.intel.com ([10.7.209.27])
 by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 13 Mar 2022 21:01:14 -0700
Received: from fmsmsx605.amr.corp.intel.com ([10.18.126.85])
 by orsmga003.jf.intel.com with ESMTP; 13 Mar 2022 21:01:14 -0700
Received: from fmsmsx608.amr.corp.intel.com (10.18.126.88) by
 fmsmsx605.amr.corp.intel.com (10.18.126.85) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21; Sun, 13 Mar 2022 21:01:13 -0700
Received: from fmsmsx601.amr.corp.intel.com (10.18.126.81) by
 fmsmsx608.amr.corp.intel.com (10.18.126.88) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21; Sun, 13 Mar 2022 21:01:13 -0700
Received: from fmsedg602.ED.cps.intel.com (10.1.192.136) by
 fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21 via Frontend Transport; Sun, 13 Mar 2022 21:01:13 -0700
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (104.47.59.175)
 by edgegateway.intel.com (192.55.55.71) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.1.2308.21; Sun, 13 Mar 2022 21:01:12 -0700
Received: from BN9PR11MB5276.namprd11.prod.outlook.com (2603:10b6:408:135::18)
 by PH0PR11MB5190.namprd11.prod.outlook.com (2603:10b6:510:3c::24)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Mon, 14 Mar
 2022 04:01:11 +0000
Received: from BN9PR11MB5276.namprd11.prod.outlook.com
 ([fe80::c8aa:b5b2:dc34:e893]) by BN9PR11MB5276.namprd11.prod.outlook.com
 ([fe80::c8aa:b5b2:dc34:e893%8]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 04:01:11 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 64ab61d2-a34b-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;
  t=1647230477; x=1678766477;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-transfer-encoding:mime-version;
  bh=ie85Mj/g5KeuT8Nxnk7L5VDB//4wcRDAhiKjOiS51Xc=;
  b=Ip6EYvMYVj6M5COCXGrP7Ydu3+0ij79Amun0SHult5M7iNKob7XmV3YY
   Q4X8p+1ylUR6Fm3ud+rIRwRJbFmHYFh5shiZ0dKBDEoTi0W/VJ5LBPDpY
   d9lQL9pDwnDcdLV6fr6T1T643qJccpTpXtkA38qYOM1HNdp9w2lecoQpZ
   lbJlVcfm+uDrWaBz8w5MVscR0etk/ZnypgcPdcXhYRnEmgRxz1svdAFXy
   0U8bVjXV2GymAeax/bwxf8g320OmkiOu4p0Flk6yvZbZ3a2+rJT7vLedc
   pbMpnU8pdYoFgSm38UG6TvF9H25AcsGCG6nDImswQiMG7ouM2wvocwUHB
   Q==;
X-IronPort-AV: E=McAfee;i="6200,9189,10285"; a="254757931"
X-IronPort-AV: E=Sophos;i="5.90,179,1643702400"; 
   d="scan'208";a="254757931"
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.90,179,1643702400"; 
   d="scan'208";a="497452736"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ZHb67Xrk8qaptf6O2VJUrz6HKJDBkQnFniIE2GoW85UwAlFdOPdf2FIU5RcW1D1d5fYw0ETD5QyRfvxxKjjUm/OejjNm2m+fqpv1glL0F6KT5zs8n6lngvoXqzbStdm6WFoy5zPwN90jx/Qfm07U0/hE5IAOKm5mgbktM/EY3pU0TjeoCRrb85f80Fn6GXL93u/8w+3agl/ySOeD+gKp/wpy+8cb4AlPD/FAZ6RWwZ2mmffgw+odlBTB3OHDD1gGBdBYceT3EJcrX2QMfHXdHjRJ0fX3qkqYGBDwcS9u3Jhh9d+jeZEhG5vPbEqi0jZIyaR4N+Ta496ktvGmKsKyog==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ie85Mj/g5KeuT8Nxnk7L5VDB//4wcRDAhiKjOiS51Xc=;
 b=Q2p+UqMKQTnCuRVkgyeqePgiXhf4Iks7362HWTcjAtNTbwnnYtL6PE38d9qvs0gBT04YYEP0mscAM2Z2nNTnUTl+LoR+q7BfYShvkzU8HeFxwB4cEOuFXon5gBBSJVS0BstGudnpo8DfzB8PfwWv0+zIGcmXcAj8QN9gj+z1NXF1i3h94Y/LtSkls35K6brlPVWcHg8HiJax1wHHJjh4cJyIlZ3M82RubCb946SO97CCqeC/aQUUgMllQJIsCxntrqdJAAS8D1/KCyreE/Ir37xVCW7TLkOKT07+jD4F4qk1nuW+ReWIn3TF7cDQGydlbHIYblxB3N2SGImMtFmk6Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com;
 dkim=pass header.d=intel.com; arc=none
From: "Tian, Kevin" <kevin.tian@intel.com>
To: "Beulich, Jan" <JBeulich@suse.com>
CC: "Cooper, Andrew" <andrew.cooper3@citrix.com>, Paul Durrant <paul@xen.org>,
	=?utf-8?B?UGF1IE1vbm7DqSwgUm9nZXI=?= <roger.pau@citrix.com>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Subject: RE: [PATCH v3 20/23] VT-d: free all-empty page tables
Thread-Topic: [PATCH v3 20/23] VT-d: free all-empty page tables
Thread-Index: AQHYBkBAHcUqxDPFCEWIL9jRoPTFzayZAFJQgAA29ICAJWrDAA==
Date: Mon, 14 Mar 2022 04:01:11 +0000
Message-ID: <BN9PR11MB5276930B2AFE79C4961E66548C0F9@BN9PR11MB5276.namprd11.prod.outlook.com>
References: <76cb9f26-e316-98a2-b1ba-e51e3d20f335@suse.com>
 <807a48fe-3829-d976-75dc-1767d32fb0f4@suse.com>
 <BN9PR11MB527622E58C2E4EF90CF29EF88C379@BN9PR11MB5276.namprd11.prod.outlook.com>
 <9432990c-6de4-ad12-e9fa-12792200748a@suse.com>
In-Reply-To: <9432990c-6de4-ad12-e9fa-12792200748a@suse.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=intel.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: bb2dca33-a20a-46a0-dad1-08da056f46d8
x-ms-traffictypediagnostic: PH0PR11MB5190:EE_
x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr
x-microsoft-antispam-prvs: <PH0PR11MB51902E46F5347F3A26B13B408C0F9@PH0PR11MB5190.namprd11.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: GDMlG4+qBY6KwSrutXNHsUvWh+W6UqUqN85oY/Lg3Xdcs7GSZ+uQEiyp/25q2pCvNvxwUMhKiPna+c4I+iMj+p7mY7flE5d+dXTTMayLCTz++nzMxlru5n68XTAf4MdH/LfVBK13/EnPpE62pGPmJhAvntMvGqOA2VYv3u2q2fZC8721/3QtiIhMLWandLaGL5vVHZu7//VQtvfMKA4wCv4RnecgowGst6zxBly7sY1aEC6nkyJqWsq94ZwTSUk3McBp68M2HQ6Om6ut5a0sms8Yo2VSE8n/eFJmvfo4hTSik91T0bit3l63AIekOxkMy/PoumNoNAfuHNDDUv/5iTJ8Kxub+NzB3u0voeifUyMkH85tNhPT1Kqyiaj0IIkguRKeDdSmMCir/d1+rfEBUXC/8/UNrXGgyZNNtboaUY4tmtsnupCIlXd1ogT13oogk9SnzzxJcLMdRoYrNNRGRINSMdIW0RhziJxk86veT524gwNfMRWuUa7sHAVEv1FZl7TYjUaoB1grTgol8uH8ti8Uzan6GvyEe//UVJbcBkIZaN8EGLY2M/gndztQzk7oEnl3K5fNmNkWA2oJW7jW2APMWK2oZrCfXhtBR0lsk2MG83nz/KqPHFfOx2K9aom4cOVgftV2sNT3naWlGWHQrclusvTr1otF43D/inGIKgCl/cs2nSOoHJCcbmavfBkX6pCd0vQ7YuYD4XUM36k5+Q==
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BN9PR11MB5276.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(8676002)(4326008)(122000001)(26005)(186003)(6916009)(316002)(38100700002)(6506007)(38070700005)(53546011)(33656002)(66446008)(64756008)(66946007)(66556008)(76116006)(66476007)(508600001)(7696005)(9686003)(55016003)(54906003)(52536014)(71200400001)(5660300002)(83380400001)(2906002)(8936002)(86362001)(82960400001);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?cURjQ2U1WEpRalJ3MVh3RitJSWdEbTVDcHptcEJZd3c5MGMzQ3hyR1l1dmhN?=
 =?utf-8?B?U3NpMFVIbm4vNWRpbk50ZERmamN6WVZyYm5kTE9FNitOTTNDVXF2TWpKS25I?=
 =?utf-8?B?UWoyc001eUhaSjl0dElFbEFUSS9QTjVtZGU3R254TTBwWW5tQUdsK01MK2I1?=
 =?utf-8?B?TWVSUS9CVnZpVDdTZWpZa1FTMTdKbTdod0VzMFhpcCtUbXEwREJidE03Z3ZU?=
 =?utf-8?B?djA5OXByaHpyVXRRd1lRMjRmY216a0hCYVZUYXZNRFJjaG4wTjV0Z2VDQ0l0?=
 =?utf-8?B?cG1tc2FpWVoxQWdQdldaY0JmTnpKS2s3RUNMdGlqL3gvMmR5OHBZTnp6Mldh?=
 =?utf-8?B?WXVsbXRnZTYxZ2RGRlhlUlBYckRrb0MzZkt3U2hkSys5cElULzhFRWQ0eWRz?=
 =?utf-8?B?UnBpUkNXMkNEVFVBMlJuTHNmNXl3WEtUOXRDTER4TlMzSnJHMXJ2bHo4bENL?=
 =?utf-8?B?T04wdTdyUlNrMUx4dGpHOGV5QlJabXZYNFBoRmRtNGlaT2RqNUJaaGZzSGg0?=
 =?utf-8?B?aDV0bENSR29tUkxYTkE3dHdrdVVCVlk1ZlZ4Q0MxVEpvZDJXOXE5cUNONU9R?=
 =?utf-8?B?QkpGajNGTE9oRitPUDVmTi9RQ1hFQmY2ZnBndDhMVkpEelViWHJUUStrWFox?=
 =?utf-8?B?dW5aamlRUlNQWEhHQTU3N2RjZzRYN3loUEw3V3pxMm1HMG1vREdCSTNUUThm?=
 =?utf-8?B?K2Z5YnhidFJrQmJqVU9ZM0JnbjZUMm9rNEdyOGRENGxTZzFWd1hyWG5TQ1Qw?=
 =?utf-8?B?TzdkZERaMmdiRFpHQXU5byszejVSSGFkVHRLVmlHdEJaVHRXQSszcVlRZEg3?=
 =?utf-8?B?UmQ5ZUErOVFuUXgwRy9PYmtZck1QYS9BY2pQUjBtYkg3d3BrTDNuS0ZFeVd2?=
 =?utf-8?B?SVpqaDhqV1MvbGx5d2s3aFpkSnRBWHo4dzY1SWczZ3BvSlBJWGpFaUJ3WXBC?=
 =?utf-8?B?UnM0MVlZSG9WRW8xODhXcThkU1dQWEIxTGFGVmJKNjU5VWJ4NHFOM0phK3N5?=
 =?utf-8?B?eE5oS1NibU1aUFc2MWtuRXRic0gxUEE5WHViRzJWclV6SG9lMTdrUHRBL0dm?=
 =?utf-8?B?aWxBalB1UVg0clRQMTBuVnBySHp2S0s5SFZwM1RYL3NQTXl2YWt4MVhJMWM1?=
 =?utf-8?B?VGN2TEZTS0lSaE1sZ1h4VjBVUFZudmhFKzZVN0ZBWVliYnZ0RnpYRis2RFRU?=
 =?utf-8?B?SElwZkkwMndaZk80ZERtTVNpSjBvU3hsamV4clBvWjFIYlc2cDJQR2VQYjVE?=
 =?utf-8?B?S21SU2ZOZEF0ZTMyZHNKVVJ2RFZZYXlBc3hLMEtYdzdZSWduQXNlZDNsZGpK?=
 =?utf-8?B?ZW5NZGM0cjR0WGR3YUd1d0dqOUo5dERYS3p2OHBuYVZOV2ZBRmYyeVpIaTZr?=
 =?utf-8?B?a2gzSWtBbE9pU2g1dnRWUlAwdEZ6TklVRG1sSFJoM21xWk9xR3ZkcEVCN3Va?=
 =?utf-8?B?US9SWmNmOGFrYjU5U09ibzNsemE2T3NhSWNzOXM5b0RpV256OUhwd21nZ2xa?=
 =?utf-8?B?RUs1eTZGdFFiUEw2dW1BRStSeVUvcnUrTGdXaUhZbkZQWHVTbGwzOWQvL3Ax?=
 =?utf-8?B?emdYUE02L0pWSk5uUHErc0M2YkFhejZNQXlBZkVmK2hIL21NNm0yeEZiVVlL?=
 =?utf-8?B?eEd6RkdMWXkxUFNRczBRb1lSY3gyZTlPVURkVjhya1VVaGdrSy9CVWFZVHpz?=
 =?utf-8?B?eXZBR05ZSmhDWWMxT0NQWktkdXhvczhISlhSeFJNOGN5K3FmUEUzaTZxamdE?=
 =?utf-8?B?c0FUVzhCZzg0blNURHoxOTNXeTNYNmpkQzcxKzRESVhUaGdqWGdOT2N4VEVn?=
 =?utf-8?B?SnFnQmFUWDVKY1RBV0h2WWgwdERKR3lxR3ZvWXhGeW02bWEwY2U0UFlaaWxE?=
 =?utf-8?B?WDdDMnBTamUzcXA4M1JOLzV3Nm5lbFlsQmp0V2x0bXhacHlTT1JHdnY2MUo4?=
 =?utf-8?Q?Y8uIvndMjcapfVhQa+eapEGhfJLfKveR?=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN9PR11MB5276.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: bb2dca33-a20a-46a0-dad1-08da056f46d8
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Mar 2022 04:01:11.3066
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 5ZGr6ng2xGAkgmRwdSlIwJVfKngjgafkPCwJWn6zbqfT3CFdEMhfgVBc+rMij5vMep5COLKox7iypho85NZVgg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR11MB5190
X-OriginatorOrg: intel.com
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From xen-devel-bounces@lists.xenproject.org Mon Mar 14 04:24:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 04:24:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289882.491546 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTcFX-000619-A1; Mon, 14 Mar 2022 04:24:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289882.491546; Mon, 14 Mar 2022 04:24:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTcFX-000612-63; Mon, 14 Mar 2022 04:24:03 +0000
Received: by outflank-mailman (input) for mailman id 289882;
 Mon, 14 Mar 2022 04:24:01 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=NoMf=TZ=intel.com=kevin.tian@srs-se1.protection.inumbo.net>)
 id 1nTcFV-00060u-9X
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 04:24:01 +0000
Received: from mga17.intel.com (mga17.intel.com [192.55.52.151])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 8e3ec14f-a34e-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 05:23:57 +0100 (CET)
Received: from fmsmga006.fm.intel.com ([10.253.24.20])
 by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 13 Mar 2022 21:23:52 -0700
Received: from orsmsx605.amr.corp.intel.com ([10.22.229.18])
 by fmsmga006.fm.intel.com with ESMTP; 13 Mar 2022 21:23:52 -0700
Received: from orsmsx610.amr.corp.intel.com (10.22.229.23) by
 ORSMSX605.amr.corp.intel.com (10.22.229.18) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21; Sun, 13 Mar 2022 21:23:51 -0700
Received: from orsmsx603.amr.corp.intel.com (10.22.229.16) by
 ORSMSX610.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21; Sun, 13 Mar 2022 21:23:51 -0700
Received: from ORSEDG602.ED.cps.intel.com (10.7.248.7) by
 orsmsx603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21 via Frontend Transport; Sun, 13 Mar 2022 21:23:51 -0700
Received: from NAM10-MW2-obe.outbound.protection.outlook.com (104.47.55.106)
 by edgegateway.intel.com (134.134.137.103) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.1.2308.21; Sun, 13 Mar 2022 21:23:51 -0700
Received: from BN9PR11MB5276.namprd11.prod.outlook.com (2603:10b6:408:135::18)
 by DM4PR11MB5293.namprd11.prod.outlook.com (2603:10b6:5:390::20) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.25; Mon, 14 Mar
 2022 04:23:45 +0000
Received: from BN9PR11MB5276.namprd11.prod.outlook.com
 ([fe80::c8aa:b5b2:dc34:e893]) by BN9PR11MB5276.namprd11.prod.outlook.com
 ([fe80::c8aa:b5b2:dc34:e893%8]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 04:23:45 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8e3ec14f-a34e-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;
  t=1647231837; x=1678767837;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-transfer-encoding:mime-version;
  bh=8AKA4c4Ka8ipunDYSfY9LOnlRMe2V6ttdMZH279ybKY=;
  b=nCtWScUiTZxFY8zkE7DlAYk2t9a931Qo6s9wQlIBRf2vtLVf/ooqyf1H
   EypgBAYPOCMjL3up57boYfGiRNMgOfItwwKCJJlnM05nC+SJ9HRQVDFMX
   oh8gYNfPg+ycBTuq8HnLxt9DSwEHDBcaKzq5jm2nqqDcQ69gkFR4kzrNo
   QrlYRo24w9V9KUgzn3UDf6x+u8zYRxIFh0LoH9lH1dzcQtNZINhVUOrt4
   YdjoWzLfDL+xQj15hwHokWOqDwophEfTVC2twYxP4U52rhJa75UI+OVK4
   Lbwi9j7YdQqYvEmmRxaboEC3uk15/n5MxIwgXg7ufFg0wOFSsVE/0b8Gg
   g==;
X-IronPort-AV: E=McAfee;i="6200,9189,10285"; a="236534931"
X-IronPort-AV: E=Sophos;i="5.90,179,1643702400"; 
   d="scan'208";a="236534931"
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.90,179,1643702400"; 
   d="scan'208";a="782534906"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=LvuXuOPOPorgdOl1iPIsDBS/LXSXyw2D6kT3xVtK++gN+uLdKy2EI/bQkOxe6bzCtaVkBK0fZw98iI6JiYY/5W8ijbvYHvrRZIS3KUVIQodDjYuTQQxcnWczWXG7qGQaFqFYXHl4Re1+9oTFz/H56FOzfULGL2Pnhs7mZzut4CL5z/jdXje1JBwj7/vo65Kd8KjCKym6KSDI4crzZv8Hue21dyXVxMMDCE/FpVCVOscgYE5t6rgUIHLZoKzURS+Fno464eMwPzGC8ciR7+abn3ba7Y0MDvfUUEm4czHo2Uup4oc5qbWyfeZgzz0C1dfCAG3JpdD/i1dIfLsh4VZqUg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=8AKA4c4Ka8ipunDYSfY9LOnlRMe2V6ttdMZH279ybKY=;
 b=DAQVb8hY5WXBQJVDPzUBuc+HonvwD27ApQoemtNB4zMQMdO8G3swckLCypY95BzBbojkVwtmYkZUnUFJxusMZSG/FWha9QxzCV8rWEtYlPGwmvDUDBm/zn56etTvJ3Y5a2l6IqrduJhqA+asiZamnPSZF++dKivOMTOrrJRe49+vnX6NQtBMxroB9/esE7YYOZgndc8mWal4CMYND8CtOvPUsvMz1dKOs4epDPNAYUfqJrbqfDaRITzsmCCfuIAtX2LaSQsvjAbkYt5txKgSsW8LILzTLZA9DV3dATlSC4is4YJzXRg6P9pKiyreejFGsg5lSGLCp+oZObx/HQTLXw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com;
 dkim=pass header.d=intel.com; arc=none
From: "Tian, Kevin" <kevin.tian@intel.com>
To: =?utf-8?B?UGF1IE1vbm7DqSwgUm9nZXI=?= <roger.pau@citrix.com>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
CC: =?utf-8?B?UGF1IE1vbm7DqSwgUm9nZXI=?= <roger.pau@citrix.com>, "Beulich,
 Jan" <JBeulich@suse.com>, Paul Durrant <paul@xen.org>, "Cooper, Andrew"
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
	"Julien Grall" <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>, Oleksandr Andrushchenko <andr2000@gmail.com>
Subject: RE: [PATCH v2] pci/ats: do not allow broken devices to be assigned to
 guests
Thread-Topic: [PATCH v2] pci/ats: do not allow broken devices to be assigned
 to guests
Thread-Index: AQHYKZzUihT7TwO5nUar4zaYDsWnday+Yz/w
Date: Mon, 14 Mar 2022 04:23:45 +0000
Message-ID: <BN9PR11MB527683C2307B5C9D457035A38C0F9@BN9PR11MB5276.namprd11.prod.outlook.com>
References: <20220224163701.89404-1-roger.pau@citrix.com>
In-Reply-To: <20220224163701.89404-1-roger.pau@citrix.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=intel.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 6a369562-cb3c-40be-5814-08da05726e0c
x-ms-traffictypediagnostic: DM4PR11MB5293:EE_
x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr
x-microsoft-antispam-prvs: <DM4PR11MB5293C15D95900735FBF5CB178C0F9@DM4PR11MB5293.namprd11.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BN9PR11MB5276.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(64756008)(52536014)(8936002)(38100700002)(66446008)(66476007)(66556008)(66946007)(76116006)(508600001)(7696005)(6506007)(26005)(5660300002)(33656002)(82960400001)(7416002)(186003)(9686003)(122000001)(110136005)(54906003)(71200400001)(2906002)(83380400001)(316002)(8676002)(4326008)(38070700005)(55016003)(86362001);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?SDJoNEhGREYyRGNiSWRnTW52Njk0K21UR0N4WDg4WHAyTzR2RlRRSFU1UlZF?=
 =?utf-8?B?SWU3R3JWR3N2NlRMTnhYZ3lmU09yMjBXUGZ0ODVFZW9CRlpTdjJaWTB6WTBU?=
 =?utf-8?B?a0srZWxUOGk0ZDR1c2k4bmU2ckk2T0p0bVJWNDlKbU52RElQK1VNOGhneElz?=
 =?utf-8?B?S291c201dS9EV1ViNHd0STUrN1lWSXV2STRaaWt2WFRBU3NrT2JYSk9EK0x3?=
 =?utf-8?B?UFZDYVA4MUl3Nks2MVI1T2RhWmRSRFVqREp6R3BVR1JOS09Vbjd4Z1ZQeVpv?=
 =?utf-8?B?SlJXRDRhSmwrdW9VQXFnMGtyTENreEVTT09SZnNya1VDZHpQOXF5QVhMa0Fi?=
 =?utf-8?B?WmswcVZGMExSSVM0M2Rqeml4RWtsSUFwaDIvMVlraGJtcFFkZjZvTDg1N1c5?=
 =?utf-8?B?TXdlS0E0U05WZFNiakxBeEdjbXRXbFd1WlJVMElvQkp1aTNKczVDOWhhdlVo?=
 =?utf-8?B?SGFzZ21EcVAweFl4NDYwaGJCcjRyREpZU1Z4amZmVkovb3o5cVlyN3hRWVYw?=
 =?utf-8?B?cnNWaDVXZ01lbCtsWkFKUUpmUXo4djZvdXhxTk5BVzAyek5pZTQrZ0k5SHhC?=
 =?utf-8?B?TjVWcU83TEVXeEVkd2JwMkdGaFFXSTFoRnFqTnUzUHJjUGM1VHJwM1RKbTAz?=
 =?utf-8?B?NTBvcTVwU1Rsb0tLN1lCNG10NHVPUVkrNC9wOXJDNEFhdWJSdFJIV1o1N2Ri?=
 =?utf-8?B?cjFVbWZmVDV2Vkcwc1RjQkg3SUtYd1cvbWNGYXJ6OUtvNlB5dk9rRnBQL0FF?=
 =?utf-8?B?d2VubmhBTnlWcER5YUxoRU4wUGRuSHVyZ2lha0FKVGpWSldoZDZBMk9oWUtw?=
 =?utf-8?B?ZGdRSkhGaUNRV0RYc2ZobFEzSWhsdlhKM2RvWGZEazlBWXovY21kL2FZQVpY?=
 =?utf-8?B?TSsybHE1N1FIUll4SG5sWXJMV3JjNWs4dXJKb1hYYU9lMnZvVWpjVlVUZEh1?=
 =?utf-8?B?TTlsMFI2MTJidCtnSC8yblNHd0tYZVdWMW9iRzdRSVRESUFhYkRNYzMyT3R0?=
 =?utf-8?B?dXBnR2YrSDkxeGkzMm02c2l0ZkUvTy8yZ1BqdVhPV1dEVExvdldIWnBUbTVZ?=
 =?utf-8?B?QU9Qa1RLT0gyUU9tOTMxYzM5TzdhcW1wZDE2aDZGemphZkFiSlMvSVh0WUh6?=
 =?utf-8?B?OEZ1dkN4SENYKzhjZEo1Y3ZLK2liSFpOVU5FSnBsWFp4Qk4zOVZqLzQ0ajV1?=
 =?utf-8?B?R3l2REVYQmMrSmVnTVpZME5ha3MzbUxsc0c2U1VjTVlUU0pMeVgyN3pRTnEz?=
 =?utf-8?B?cmlPWkRvS1g0M2tQWEp2cm44VmtwVHFGR0t5VkR6cWRTcmV2b080ZS9qNHRC?=
 =?utf-8?B?Y2RxT0MrL0NJWkFUOGEvZ29DZGI2RkhaYnowY0ZXVVFVZkQzMklWVENqaXM4?=
 =?utf-8?B?YlRsTkl6SUtUd3FDUnhZWW1qQXJINExXa241UXREb3FGaGlEQlg3R1d6RGZk?=
 =?utf-8?B?TGs0T0FnOUdxYWFPZ3hiYWZsNDJIV00xWEpNamVNZHpVZzVtTG1aaW8xTDI4?=
 =?utf-8?B?RTV2S1pyd2xCNlpqT290NFBJa2toVEtwMTBzWWxPRThveXZDUXR2VWFyYXJ5?=
 =?utf-8?B?Q1dUTnZXQmhzVUdPbGhSWHVDWlRUQUYvc1FGZlFsZjlZbFdwMzM1Z3pDTDdr?=
 =?utf-8?B?c3MrcjUweTF5STkrRmUwczNDb0x4STFZTVFodzRMWXhVMFp3cTlkcjJLQVZx?=
 =?utf-8?B?YVBrWDhNcHA3RzhRNk5hRzBuQXpjeFhENVBxdGZhWGVGdVJ2a2pWWkFkekFl?=
 =?utf-8?B?ZGN5ZEkyRFlIVWVxbVJ5cXcxQnFQQnI5VzlqOTRBMy83dElWcTd6UDFOdklk?=
 =?utf-8?B?SWhOWXJrYkxETW9ZOWQzR3d2REFkYWk0L3h2WS9TbGxrS3hLdkNLRVZRTVNZ?=
 =?utf-8?B?NDYyRkJZNG9TQXpJcUFuMExrNytlSmg5VnQzNlJWSXdxdTd1cXJvd3pwV1RD?=
 =?utf-8?Q?Z/y+mq831aNYEpzjPS6NXps5diRpbWkU?=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN9PR11MB5276.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6a369562-cb3c-40be-5814-08da05726e0c
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Mar 2022 04:23:45.5810
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: OaK72UjaUPYHb8wSk3n8XJ3Ok7Jzp8aLfJV/VvYjLCPr0EMqxL5UIFBez2BVgT7v9O3mTOzs7P5EjxTw8Egl5A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR11MB5293
X-OriginatorOrg: intel.com
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From xen-devel-bounces@lists.xenproject.org Mon Mar 14 04:24:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 04:24:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289887.491556 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTcGP-0006b5-O6; Mon, 14 Mar 2022 04:24:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289887.491556; Mon, 14 Mar 2022 04:24:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTcGP-0006ay-Kg; Mon, 14 Mar 2022 04:24:57 +0000
Received: by outflank-mailman (input) for mailman id 289887;
 Mon, 14 Mar 2022 04:24:56 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=NoMf=TZ=intel.com=kevin.tian@srs-se1.protection.inumbo.net>)
 id 1nTcGO-00060u-AK
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 04:24:56 +0000
Received: from mga09.intel.com (mga09.intel.com [134.134.136.24])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b1b2ec6d-a34e-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 05:24:54 +0100 (CET)
Received: from fmsmga004.fm.intel.com ([10.253.24.48])
 by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 13 Mar 2022 21:24:52 -0700
Received: from orsmsx604.amr.corp.intel.com ([10.22.229.17])
 by fmsmga004.fm.intel.com with ESMTP; 13 Mar 2022 21:24:51 -0700
Received: from orsmsx610.amr.corp.intel.com (10.22.229.23) by
 ORSMSX604.amr.corp.intel.com (10.22.229.17) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21; Sun, 13 Mar 2022 21:24:51 -0700
Received: from ORSEDG602.ED.cps.intel.com (10.7.248.7) by
 orsmsx610.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21 via Frontend Transport; Sun, 13 Mar 2022 21:24:51 -0700
Received: from NAM10-MW2-obe.outbound.protection.outlook.com (104.47.55.102)
 by edgegateway.intel.com (134.134.137.103) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.1.2308.21; Sun, 13 Mar 2022 21:24:51 -0700
Received: from BN9PR11MB5276.namprd11.prod.outlook.com (2603:10b6:408:135::18)
 by DM4PR11MB5293.namprd11.prod.outlook.com (2603:10b6:5:390::20) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.25; Mon, 14 Mar
 2022 04:24:49 +0000
Received: from BN9PR11MB5276.namprd11.prod.outlook.com
 ([fe80::c8aa:b5b2:dc34:e893]) by BN9PR11MB5276.namprd11.prod.outlook.com
 ([fe80::c8aa:b5b2:dc34:e893%8]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 04:24:49 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b1b2ec6d-a34e-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;
  t=1647231894; x=1678767894;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-transfer-encoding:mime-version;
  bh=QHOmEgQovgBEG71i/B/HYiSJ1oDHWnojD6X9SvX1PEQ=;
  b=gGYKpC9mStIX7CRuoEPuzPvfHJeEUnPbWEzmIoFdwj3SsEDKlfCd7nH/
   4kkMPDw0H12RQpTAWAfysTVi+2i6yFkJ1yCIzvprT8iHRzy5ERaqNl841
   3pybje2EZWmt6E2Lick8+e5PtQfg1gvkSc0GCmlO9ToZb4oNEGhLWsGAA
   gyjzkceXTcfeUFr0/kF4Uh3Z0xFUW+L4sTSlIRErooJw/wv3zPxvkEmc3
   WSHT8RpDa2yYYpozdMoMGexzKkZmnICXOWJpzyoZj7KwckpHSxWN8hhni
   hPHS3Na0+8A95Zx8y4QSFNT/BSEPURAcpDiMysfnhmYOaode1KYjthzrL
   A==;
X-IronPort-AV: E=McAfee;i="6200,9189,10285"; a="255660681"
X-IronPort-AV: E=Sophos;i="5.90,179,1643702400"; 
   d="scan'208";a="255660681"
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.90,179,1643702400"; 
   d="scan'208";a="612752553"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ImSscckDbjVm2fD0857lr7ONj+UlFNIQF1pvGTiNF/xKsffmkyqU6AL7ujHR5dMDONoZHtkTQbvFNUhPwrFBEElu+dHaQSMco3flkAhFuAajXOs9XR7kgg36uW8HDeSJHFPeaVab0oapnFRoFeerHI+a+QDKv4H9M3oWP01uW3bPUrSuR6QTuXDM5LbGzGATgka+XH4dbZh+Nzver32qA0dnlJgEkH24CPiVl+gfYrgc4jKgXJP7HdiySou8QJ5hpHmgkN49U40Jcr+ZHl/cfwBf/cY2YsnmdfhVzMS/QHGL5UTYedj0jKbG0yWVLNLaILpYms6Mk8qt0YzIKumzlw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=QHOmEgQovgBEG71i/B/HYiSJ1oDHWnojD6X9SvX1PEQ=;
 b=dIByqt6ZHr4V/pLn4MtmtG5ctzW4MdI7fWpaneGmd97lSB/jWaacCsXsiN8Saj5CmGgF+QpPRVsxSYdSUdv5WA+zsz/7fLJ4otsA3ZOmdIPdeIHhhiPruamUdkIbK6pINNDuMzz0jqnxmNu1p0spC+yYbnveTwxB/OA4F4OL1yorwx3GN6td27Ul91pjfi+meYo1WxFgw9OOYMqFUC3RGLBAtMFc1Jp4OyKW8rSBWr8qEoI0P9mgcR0pSjCVgYRQWZzBi1IDTqR0TYSrZs/VglwI1xrVcC+e4pF9rS1AtsqO6bmogEJps0wph7qsBJQUhjz61nskqSh5pmnCQDJ9Iw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com;
 dkim=pass header.d=intel.com; arc=none
From: "Tian, Kevin" <kevin.tian@intel.com>
To: "Beulich, Jan" <JBeulich@suse.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Paul Durrant <paul@xen.org>, "Cooper, Andrew" <andrew.cooper3@citrix.com>
Subject: RE: [PATCH] IOMMU/x86: tidy adjust_irq_affinities hook
Thread-Topic: [PATCH] IOMMU/x86: tidy adjust_irq_affinities hook
Thread-Index: AQHYMiCBwdBBME0p6k2Ozu7Ef1L2p6y+Uoqw
Date: Mon, 14 Mar 2022 04:24:49 +0000
Message-ID: <BN9PR11MB52764474C9C9C825258A2BBB8C0F9@BN9PR11MB5276.namprd11.prod.outlook.com>
References: <67e34863-74fd-6d7f-8b63-26f45bf0426f@suse.com>
In-Reply-To: <67e34863-74fd-6d7f-8b63-26f45bf0426f@suse.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=intel.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 4c8204d2-3c79-4ee8-bba4-08da057293f1
x-ms-traffictypediagnostic: DM4PR11MB5293:EE_
x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr
x-microsoft-antispam-prvs: <DM4PR11MB5293BFE30B67A7A13818ADB18C0F9@DM4PR11MB5293.namprd11.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BN9PR11MB5276.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(64756008)(52536014)(8936002)(38100700002)(66446008)(66476007)(66556008)(66946007)(76116006)(508600001)(7696005)(6506007)(26005)(5660300002)(33656002)(82960400001)(186003)(9686003)(122000001)(110136005)(54906003)(71200400001)(2906002)(83380400001)(316002)(8676002)(4326008)(38070700005)(55016003)(86362001);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?SzJpR2J1L1N3NEhpWW93eS95d01Kb3RNUXlNaG5qdVhCenAvQ1l3T00weTNM?=
 =?utf-8?B?Yk9uOXBkT2RNYjliZmU1cUlyWVdWeU55a09YN1ovS3lVazlFWENqaFUyTmZB?=
 =?utf-8?B?NktJVlFBdlM1bFFyalhZL001azFDOCtFYVFZM2VoSGcrZVNXU3Eya1FxRVNK?=
 =?utf-8?B?Mk5CM29QV0hYdC81RkNTYjEzYTl3NEU1MW8rK1BQYXhWeUlkSzFuQnBMME9X?=
 =?utf-8?B?bTJNOWFaYVhncHdrai95TklHaEpPeFlIWjRmcGFxb0hNQUFJMnpaRGVVcSs1?=
 =?utf-8?B?bm1iWG9JUnMrZi9vYXU1Vm50a0xSRE9URWZJUGtyTDUyL0NzYlBMWVhHN1B3?=
 =?utf-8?B?S0lQMnVwWW81T29NM1hOYnZSVjdFWk13MnBvVEt0V1lPME5mbDBYbWF2cEZ6?=
 =?utf-8?B?ekNXdUtrV291enNXc0F0WWdCQjJwM0VhcmFOeHl4ZnBjb21EeW1sbDNibXpa?=
 =?utf-8?B?UW9JYmh3REpDTEJxTVZOMDd5cmx0WFNpRWszSVhIaW9xRmJhRGttYnZFWmRh?=
 =?utf-8?B?QURMQzM5UkVKZDljdjlJMGJxTlZrTmxBWGJ6dFBscVRyeVdUQXJUWmkzclhu?=
 =?utf-8?B?MTdIc28reFpmODRNUVpHb1lUbmhERnAwQ3V0cE5CMlJLam1COGhKeU53V3NJ?=
 =?utf-8?B?NEgvWGV1QXlrSnVvQzNsQzNvQ0doaEIydXArVnM1NXZ2bGlHbHhnajY1cDFY?=
 =?utf-8?B?ZzZwaGRPKzF2UmluMU4yb0tRY0NPWEk4YWxsclRrTGZqbk1ueE9lbUxCbjZI?=
 =?utf-8?B?NWtMR0dsUmFWWFB5ancybWxYcVlwc2NOZUlIWlZkU0tuaVgyVGJCUFhrNjFo?=
 =?utf-8?B?VVFEQnlUSFRVVFROdzZPd0NyRHZSNmR5WnFtOEpzdGNSa214NjE2dVdEQTY3?=
 =?utf-8?B?d0hqdTZzVERzc3JVN2l2VHBxRHBwT1N1QWY1NjJSSFNNZExaZGY5ZzR2RERj?=
 =?utf-8?B?cWd5R0lWdHFrejJPcXRyd2U1TmVaL2JYeVJ5SVBraUlQREpvejFMdm5NU0RX?=
 =?utf-8?B?SWcvTFVwODQzYms3Q1dDSzBEU0hJTWNIM3BQdjI3Y3pTRnEyMUZsZDFGb2Q5?=
 =?utf-8?B?NUYyVGhIeU15L3JidWRwOWlYN0RIS2Q1Q0NUSGdReG9ndlZKMFltdEw2a3pW?=
 =?utf-8?B?eFg3Z2FYeC8ycmwxeUkveDJZYVFPZjZhcnl3Skhic2hldDRGMjhSUDhmQ3h4?=
 =?utf-8?B?cytSdFQ1QThXMTNVcW9KUllsUU9UQWNKc2xSazI3ZFA3ZndRNGNqRW03ckJM?=
 =?utf-8?B?OUxTd0Q4VFpYRy94dnBLVXZ6TnNITVpDaEJSQlZwUVk4aHpjSkZXWUtyOEkr?=
 =?utf-8?B?OGxhQmdBS0tIV1ZwUzhPelM5QTZ6NjdlNWEvSzdSVm00RGFnZnpQR3BNUFJt?=
 =?utf-8?B?dEcwRDVnS2cxMFZZT21mbHpoQ1lDNlYxbWJJM01XQTgxbk5sckV4b2RXSWlj?=
 =?utf-8?B?RzlpaE1Ma2NhdmUrOW9kK05jNGIrSUppNzBxSnJxUnlmaHo0VmxCQnZuSTE3?=
 =?utf-8?B?b3gxRllqNXVvcW1GblRwS2VYaXFDVTNiSkZ4U1M5MXVjOTBnbStQRDBFV05X?=
 =?utf-8?B?ditrbExBWUtQVEJ2QSt0Y0F3TGdnWjcwQ081YWY1OTR0Z3A1eE8rcUtjelQw?=
 =?utf-8?B?bjEwdzNjQmt4dm5JQi9NV0E4Vmt2NTlOdUhlay9IaDJ5dklPMlcwVlcwMWNP?=
 =?utf-8?B?MUJ6NlBuS1ZreEpla0wrSmZPL1FuWkR6Yi9FQ0I3NE91Vy9TM0xCQmxEOXJq?=
 =?utf-8?B?cmoraWZuRjdqYkxuNnAzbGVtNm9ZTVNaMWhrcDRBTVp4dFpKRjNNYjBocit4?=
 =?utf-8?B?L3krNVFqd2dZVHFKUHpUTXdaaWdpRk1PVkc3ZEM1UVFoNUFYbkNGWGFYT0d0?=
 =?utf-8?B?bmZ4bERNTmJlaFV3TFZNVDJpUDB5RTRqMmN5M2tUZGZxVi8vYlF5NnBwYmVC?=
 =?utf-8?Q?pZgEbztR2bHHjXCzRNBDUGUtfFhML063?=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN9PR11MB5276.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4c8204d2-3c79-4ee8-bba4-08da057293f1
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Mar 2022 04:24:49.1443
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: wO3p+Inv8H7uMT0ssNkIoKlu6y5lBUssfIoZisF53XpHC+V/CkGMoPAgn5+PMQ3544epCbFBjC3ArALVDW9WGQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR11MB5293
X-OriginatorOrg: intel.com
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From xen-devel-bounces@lists.xenproject.org Mon Mar 14 04:25:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 04:25:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289891.491568 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTcH6-0007BZ-1L; Mon, 14 Mar 2022 04:25:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289891.491568; Mon, 14 Mar 2022 04:25:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTcH5-0007BS-UA; Mon, 14 Mar 2022 04:25:39 +0000
Received: by outflank-mailman (input) for mailman id 289891;
 Mon, 14 Mar 2022 04:25:38 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=NoMf=TZ=intel.com=kevin.tian@srs-se1.protection.inumbo.net>)
 id 1nTcH4-0007B6-9M
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 04:25:38 +0000
Received: from mga03.intel.com (mga03.intel.com [134.134.136.65])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id cab8cb58-a34e-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 05:25:36 +0100 (CET)
Received: from fmsmga003.fm.intel.com ([10.253.24.29])
 by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 13 Mar 2022 21:25:28 -0700
Received: from orsmsx606.amr.corp.intel.com ([10.22.229.19])
 by FMSMGA003.fm.intel.com with ESMTP; 13 Mar 2022 21:25:27 -0700
Received: from orsmsx606.amr.corp.intel.com (10.22.229.19) by
 ORSMSX606.amr.corp.intel.com (10.22.229.19) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21; Sun, 13 Mar 2022 21:25:27 -0700
Received: from ORSEDG602.ED.cps.intel.com (10.7.248.7) by
 orsmsx606.amr.corp.intel.com (10.22.229.19) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21 via Frontend Transport; Sun, 13 Mar 2022 21:25:27 -0700
Received: from NAM11-BN8-obe.outbound.protection.outlook.com (104.47.58.172)
 by edgegateway.intel.com (134.134.137.103) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.1.2308.21; Sun, 13 Mar 2022 21:25:27 -0700
Received: from BN9PR11MB5276.namprd11.prod.outlook.com (2603:10b6:408:135::18)
 by DM4PR11MB5293.namprd11.prod.outlook.com (2603:10b6:5:390::20) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.25; Mon, 14 Mar
 2022 04:25:24 +0000
Received: from BN9PR11MB5276.namprd11.prod.outlook.com
 ([fe80::c8aa:b5b2:dc34:e893]) by BN9PR11MB5276.namprd11.prod.outlook.com
 ([fe80::c8aa:b5b2:dc34:e893%8]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 04:25:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cab8cb58-a34e-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;
  t=1647231936; x=1678767936;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-transfer-encoding:mime-version;
  bh=YK9ghu5VnXGGMB1HbKe/q46aWNwKy4qjP3wtzR5zOVI=;
  b=Fhz7yQzacy9V5MddGBvrKD+bjh1BF9hpYjuYKO40J4kLlsYw2QIVwvh7
   6orhzvsaNe4QWFByxhcg84V/Y665ji16pxySZ2oo8MCklZ7PPvmhjzo6h
   TQjc+G9NqB1adcYwNIGthlQr4reWHuE2iIYDt4JNI1Pu7pQTgC0BvHhCe
   hod4PQHkGwfQm/cCdbyQyigEwr3X7Py0LqmzwAVYJ8PHiNpQUVzTCy4iI
   6pP96do1whRH7HfOxplOFiisG5ATm/TnMRfRQvP1X0Hyfc1YsQW4Uk/bh
   tx6SyYbd+QGRhWXU7pNYV3SExQpHkjT5HPnzD0US7fP5Lr8RxTPQQokTQ
   Q==;
X-IronPort-AV: E=McAfee;i="6200,9189,10285"; a="255883565"
X-IronPort-AV: E=Sophos;i="5.90,179,1643702400"; 
   d="scan'208";a="255883565"
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.90,179,1643702400"; 
   d="scan'208";a="634052406"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=oB3Fu+3kAF3Uq+ONwRgN5kGHZ1A/js8NJUAbGMjr5iF3GviBXnnhH4ugYuEAOLHeNCQ0WzoBnL2LLNBhA6DwP0txmdIF3DmWxNnZPFn+AzEHDac4hVgJEXjyoA1wmzrNJFi0z4VR1E50jmtUHiPJo2C+6OQ4Hiwrllc3eqrR6nBer1wcEsUsvw47FjnrZVx39O392veqnqe8PCiJdj+nPulvtDvqKE8oQ4Yhtbbc/OhOrG1J62Upd2MBfpLD6IvBuJLzU45STs5TVzKGFK341YrlH4rUXM+wGZXKPQBuQAUdTPV/IVMQdVW2PC6RgYKhfSiYafPZ0df3Tyxt9sSLcA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=YK9ghu5VnXGGMB1HbKe/q46aWNwKy4qjP3wtzR5zOVI=;
 b=WjgaixnIxa+du4BAqG/NIHTWWkNFZLMdJwP6PV+RgqrGqbMOFHaXhVcCHAJy388NGWumleE1UVHKvA+qnmoOcXaIMnD1NMQwIq86O02xsVgt6r7xjXBfouWbrCP9mgWKz+9R4wbt9OXseSw4YwUtT2Itg9KNnPELr6wKFvDiIAVbzqi2JUFuyFE33lZoe7KL/6d1C9tSrjfcByQQviEN6ihUdEGQ7ZYRzW+HwdXI4IcR5wK4unxE5ZzC0g5Kv0HCQIy+EcsUk1+Gdh1P1+UgGQA/17Nf/4gjD15x8pUsmTSjjTx8FfUnoHv30vsfWAozCQkWYdDPqMUeNOVwP4/ZEA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com;
 dkim=pass header.d=intel.com; arc=none
From: "Tian, Kevin" <kevin.tian@intel.com>
To: "Beulich, Jan" <JBeulich@suse.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Paul Durrant <paul@xen.org>
Subject: RE: [PATCH 4.16] VT-d: drop undue address-of from
 check_cleanup_domid_map()
Thread-Topic: [PATCH 4.16] VT-d: drop undue address-of from
 check_cleanup_domid_map()
Thread-Index: AQHYMwD+JbApDZ2z+USosO8XsFJIAqy+UOtg
Date: Mon, 14 Mar 2022 04:25:24 +0000
Message-ID: <BN9PR11MB52761EFD184DBE00B53C27328C0F9@BN9PR11MB5276.namprd11.prod.outlook.com>
References: <c71ac406-15a9-6291-d670-0f965a59bebf@suse.com>
In-Reply-To: <c71ac406-15a9-6291-d670-0f965a59bebf@suse.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=intel.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: c0a6e194-ba9f-4de9-7a0e-08da0572a8ba
x-ms-traffictypediagnostic: DM4PR11MB5293:EE_
x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr
x-microsoft-antispam-prvs: <DM4PR11MB52933E92BC9221DC3530DC458C0F9@DM4PR11MB5293.namprd11.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BN9PR11MB5276.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(64756008)(52536014)(8936002)(38100700002)(66446008)(66476007)(66556008)(66946007)(76116006)(508600001)(4744005)(7696005)(6506007)(26005)(5660300002)(33656002)(82960400001)(186003)(9686003)(122000001)(110136005)(71200400001)(2906002)(316002)(8676002)(4326008)(38070700005)(55016003)(86362001);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?by9SOXoxNVp6T3BDQlk4MTZlZkJqVDhXSVpzT2FJZlcydkxWSEVXOFFZYlNY?=
 =?utf-8?B?S2c5eDFJcjZuTXRrSWthMHM1L1Zsd1k4V2JWYmRVYm9SUlp2WGx3RTlEQTJC?=
 =?utf-8?B?aEVlMExKd01OdW91N2VCdHFwQkQ0bUhJa09BTDFzWHh0ak11VHNkM21WSFNk?=
 =?utf-8?B?dUVZU1ZQdzgzT0swYnlOK05NQW95WEhSRHZzbzNvSXkwdEdKR0tBQzZRbkhQ?=
 =?utf-8?B?RkptcHVxYUZEUDhxRi9ycDhHc1htQk5XQ0ZFbFdRcTRwMnRieUtoSFJTTWF6?=
 =?utf-8?B?U0p2NUVBbzhsc0lmUGZBbmVkTjlrRnkvclJEa2tUVUdWUDcwcGZIQ0lSem5t?=
 =?utf-8?B?dWhkMnVUSXZyMGJ5cW9Ed2lKMWk3STVSelhIUGc0RW5MZWd5VlpjeXFkNWg4?=
 =?utf-8?B?Lzd6UVFXTVlWYWRwbUdlWU1uVTYzUmRYRzJHWkFSdSswVkYvN1NwSjVUR1lD?=
 =?utf-8?B?TjFPMHBqazd5dWo1NTcwVEpiVXJPNis1N2YyVjhzL0R2MnFSR0VIa3NDeDB2?=
 =?utf-8?B?Z2NQUklKNWlNNDBYV1AyQWRzYVkrZFMyRnZLdTNSVXNjYTVrRVA3M24vYmZZ?=
 =?utf-8?B?SWlxZFA4bjFSTUZzUk1iY2JDdkVSWS92Tit4enlHVzcvVFJwT3JwQW1nbHd4?=
 =?utf-8?B?eVIwWG5vai9nUm04UmdUaXpFNjhkZGZQb3BSd0dPbVAwM1phcjJYVW5ta2hT?=
 =?utf-8?B?WUxTQ0h5ZkxjVlBrbFoyZTFyS1RxbU0vd0FjcHgxcUFOeVIxZDZZR2diVFA4?=
 =?utf-8?B?ZnN5dGgrSVUyajFUbjlNd0dwUTYwWXBCTlh5TlFjNllpTURZdTl1MVlUQlJR?=
 =?utf-8?B?ZDAyMEFpZUd1c0h6WUpUL1NBOXNONTlvL0RrM3RNVkhEbmFmSm5aM21MdjZW?=
 =?utf-8?B?alJ1K2NGQXk5cEtWbVd5cEh0aEErQVc0Wkg2MWphNzVjSEFYSnhwMm5lbzR5?=
 =?utf-8?B?VHljcWs1blZMVDBNaTFaWGJWTTlVR3luNWg5enVXTGFoK2YyQzR6ZGlGOGRR?=
 =?utf-8?B?L05jY3NGOWUyVWZ2NUZVL05GSzhqK0p0ZlJiUWpYQjc3aHo1ZWdoUTNLRGdK?=
 =?utf-8?B?QjQ3SzJ4NkhVRi9qWVA5SkNONjd4cU0zSFJiTGZmSjYvOTI1b2VsaWdVY0N1?=
 =?utf-8?B?Rnl5SzJkaTVEWE9SRWNRWXRBeHAxSTVucXhtSVRjeHM2UjhZb0EycS9CU2JL?=
 =?utf-8?B?N2tweTk0K09uTGI3dldHbnc4MmxRTnRoUlBISlJGZWxkcVRqR3paUXJ4M1Qv?=
 =?utf-8?B?R2VteUZycVBYTndCSlBmaS9RWWhKMTVldnBzU3lhNWlKUFZTNSs4OGRzakZ4?=
 =?utf-8?B?UDRqRTFCQTdyV0IvZXBUenFPeHpGK25QSGtFS3NNanRuR2VDR1Uzb1VaSUJx?=
 =?utf-8?B?cjBkalZaOFhUYVVOMVhvRkw5eDhPYnR1bUs5eWgxNVlFTURmT2R1a1p1d1ly?=
 =?utf-8?B?eTlXS1NWeFFxNkdGUmZCZEVqd1JDNHhPUENBdTdYZnl1cTAvZ0tqME9uTUpJ?=
 =?utf-8?B?UWdsYU93SCs5bFNucTh0TVBlRVVFL2RHVEFFWi9kdGNXRFdWZlVKMEhQVExn?=
 =?utf-8?B?ZkVPckw2TzFxK1hjQTZoQTdiWDdVYzJwd0FsWFpoZzBKQXlpd2xpdmgrd3Jn?=
 =?utf-8?B?M0lrVkFCRGJqRkpXd3hIUjFmckNyaWtnTTZrajV0QWlkZ0piV2Z0MUhlcExL?=
 =?utf-8?B?bFpub3liT3RsbnlidXNBdE9ZTFNNb0lMT3d4Tlg4cHJRUS96Q0lMSWhRT3Fy?=
 =?utf-8?B?QjBvZlpjSGdtYXVyWFRNSkJrMGlUWm45dW9pakllVHBoUE1yaS9NU1p6TVpu?=
 =?utf-8?B?ZVNFVjBjdXAvZ281YzQrSFRoY29uV1VzbVRzcDErOW8yRHljMWFId1p1YUEr?=
 =?utf-8?B?QkdFZ0E3THUvQUNRWU5hVVpRRW14T2ZiSWhEQ1VvNmhVcVpFOEUvcjIzTXdR?=
 =?utf-8?Q?fdCrVSPPHQVRd3ku5+aNJMQ0+FMpYict?=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN9PR11MB5276.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c0a6e194-ba9f-4de9-7a0e-08da0572a8ba
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Mar 2022 04:25:24.0456
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: LqUPK/MLVbg+Sc6uDrn7+o1ljOJyda6JtsYN89t95rBbMPEQbC8TfOe+xj3jCKMdp8LSg8bdsb4yp7pe+OVMIg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR11MB5293
X-OriginatorOrg: intel.com
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From xen-devel-bounces@lists.xenproject.org Mon Mar 14 04:31:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 04:31:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289896.491579 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTcN2-0000Ia-Mf; Mon, 14 Mar 2022 04:31:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289896.491579; Mon, 14 Mar 2022 04:31:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTcN2-0000IT-JO; Mon, 14 Mar 2022 04:31:48 +0000
Received: by outflank-mailman (input) for mailman id 289896;
 Mon, 14 Mar 2022 04:31:46 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTcN0-0000IJ-Oa; Mon, 14 Mar 2022 04:31:46 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTcN0-0007lk-Lj; Mon, 14 Mar 2022 04:31:46 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTcN0-00071e-5o; Mon, 14 Mar 2022 04:31:46 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTcN0-0006dh-5L; Mon, 14 Mar 2022 04:31:46 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=RGXINhWWGx7ihZc5qwW21IAXOh611YyootdY8KZtMRc=; b=Y6yH2wrKjUyLrgpn0G2Gt+fRcE
	xoyMzkaxUGtaDQTA0PSTbT/Hi4TisjstLDdk+7O0lg5KjeKo6cRRSfAB3gA0g9AlFRbx9hYCXLBex
	IYY9eNCXqim9g7zFRFjjimptckHuPVegmyHqPw3/e+kOW7EZkQ7r2kXJm+wupYipagH0=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168576-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168576: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 14 Mar 2022 04:31:46 +0000

flight 168576 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168576/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b175eeb6a3f630aef5a59a2c610a5be1a0cdd65
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   13 days
Failing since        168258  2022-03-01 01:55:31 Z   13 days  128 attempts
Testing same since   168519  2022-03-11 17:11:41 Z    2 days   42 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 569 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 06:07:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 06:07:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289906.491590 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTdr5-0001Uo-Ku; Mon, 14 Mar 2022 06:06:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289906.491590; Mon, 14 Mar 2022 06:06:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTdr5-0001Uh-Ho; Mon, 14 Mar 2022 06:06:55 +0000
Received: by outflank-mailman (input) for mailman id 289906;
 Mon, 14 Mar 2022 06:06:54 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=QvMz=TZ=arm.com=Henry.Wang@srs-se1.protection.inumbo.net>)
 id 1nTdr3-0001Ua-U9
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 06:06:54 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04on0621.outbound.protection.outlook.com
 [2a01:111:f400:fe0c::621])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f06dcc8d-a35c-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 07:06:51 +0100 (CET)
Received: from AS9PR06CA0351.eurprd06.prod.outlook.com (2603:10a6:20b:466::17)
 by DBBPR08MB4743.eurprd08.prod.outlook.com (2603:10a6:10:d9::23) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Mon, 14 Mar
 2022 06:06:46 +0000
Received: from AM5EUR03FT062.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:466:cafe::6b) by AS9PR06CA0351.outlook.office365.com
 (2603:10a6:20b:466::17) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.23 via Frontend
 Transport; Mon, 14 Mar 2022 06:06:46 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT062.mail.protection.outlook.com (10.152.17.120) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.26 via Frontend Transport; Mon, 14 Mar 2022 06:06:45 +0000
Received: ("Tessian outbound 741ca6c82739:v113");
 Mon, 14 Mar 2022 06:06:45 +0000
Received: from 69fde00719bc.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 F1FA95F9-60AC-4536-9635-1AEF435A75FD.1; 
 Mon, 14 Mar 2022 06:06:39 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 69fde00719bc.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Mon, 14 Mar 2022 06:06:39 +0000
Received: from PA4PR08MB6253.eurprd08.prod.outlook.com (2603:10a6:102:e4::8)
 by AM9PR08MB6981.eurprd08.prod.outlook.com (2603:10a6:20b:414::21) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.24; Mon, 14 Mar
 2022 06:06:37 +0000
Received: from PA4PR08MB6253.eurprd08.prod.outlook.com
 ([fe80::41e8:ebec:d794:38aa]) by PA4PR08MB6253.eurprd08.prod.outlook.com
 ([fe80::41e8:ebec:d794:38aa%3]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 06:06:37 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f06dcc8d-a35c-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=+5vDZRUa8GvcEAGaJ+myRho+cJnHExOj0FwE3vOCH4E=;
 b=B/goTK5KdXh9hg0HReTy73ChXzm07YN/fsVfeelIzegV6KZ27RJexnHX/CJOAjxE5mG4Bh3QYkl3SPdew5rrecGeN2Gatv7QLahemj5nI18ZT6gvyLxE6KunGo4tmwgIn7gcVGMoI52+3CMKTvICfduheg4ehvxUZUkxEu9mRQg=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=iTnXqVuEKz2T1A3msZozOK/9+vzt6YhqZOZ1j3bmRNwKZjXeb11FKjKLxsX/NEUyAQ0Z7sDFIk3iNIY83G630euoDgDX/3S5ytUAsyz3iiPELTTT3CWt0OVIHBj7SHnznJgC95ApGh71CkfvV5mv29AeJzyPnD5dlzQBmTSSm1/MmKbood+Rf2JAn4TusefzQ/cvcr1EGknOejMtwR7CeX8yZLaok7fp9vU47xcvG0Tf8XoNSe+PLKsepde9pWqn1lwiuNsNzt0ts+JjZyu9g+ggmZVUI65OeDkz/YL5AC06OWK9dSumXcQUz84cXcmx2aTuna1s/qdkn4mOVF2loQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=+5vDZRUa8GvcEAGaJ+myRho+cJnHExOj0FwE3vOCH4E=;
 b=iuumx5NkHA0SIY87WsAKEW0Ivf70bDMHlNmyikwVkGfM8A5Sh40q5EltXRd//1aR2fbD4yF4MDr9A7W+hpAnuhSQczi9OX8ziGheqlMLJtbegKoGp62laM3ZrfjfqEPpXhXB6A/CopT/2mmE0gKMbtuygUt7gvAetMFug5UZFm/Oy+hyRTctKvpY9TG5VjGIAxqAsiowizYk37QVMWoAu5swqM4+vPOyecdQbCXr1RvqhC3rbfzRtu+tmDBpCFJzpGGXiNkR3ZVoUtoF8smXVsl0akOz+aE4VBQ+mDlMcPxvw/5PaEfyLfNKHYJv86vpQNQOMYd1mxh1sj2gdNrgzQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=+5vDZRUa8GvcEAGaJ+myRho+cJnHExOj0FwE3vOCH4E=;
 b=B/goTK5KdXh9hg0HReTy73ChXzm07YN/fsVfeelIzegV6KZ27RJexnHX/CJOAjxE5mG4Bh3QYkl3SPdew5rrecGeN2Gatv7QLahemj5nI18ZT6gvyLxE6KunGo4tmwgIn7gcVGMoI52+3CMKTvICfduheg4ehvxUZUkxEu9mRQg=
From: Henry Wang <Henry.Wang@arm.com>
To: Marco Solieri <marco.solieri@minervasys.tech>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien Grall
	<julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, Wei Liu
	<wl@xen.org>, Marco Solieri <marco.solieri@unimore.it>, Andrea Bastoni
	<andrea.bastoni@minervasys.tech>, Luca Miccio <lucmiccio@gmail.com>
Subject: RE: [PATCH 10/36] xen/arch: check color selection function
Thread-Topic: [PATCH 10/36] xen/arch: check color selection function
Thread-Index: AQHYL/Q7H6udck4WIkSPZpB4k5JnoKy+cvyw
Date: Mon, 14 Mar 2022 06:06:37 +0000
Message-ID:
 <PA4PR08MB6253129DC0D55F2532C31EFC920F9@PA4PR08MB6253.eurprd08.prod.outlook.com>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-11-marco.solieri@minervasys.tech>
In-Reply-To: <20220304174701.1453977-11-marco.solieri@minervasys.tech>
Accept-Language: zh-CN, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 7DE6E42948E5EE489DD59FE85D50BA3F.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 88d74f00-90a1-4dfa-1a54-08da0580d1b5
x-ms-traffictypediagnostic:
	AM9PR08MB6981:EE_|AM5EUR03FT062:EE_|DBBPR08MB4743:EE_
X-Microsoft-Antispam-PRVS:
	<DBBPR08MB4743190E527A9B576B988DBD920F9@DBBPR08MB4743.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PA4PR08MB6253.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(71200400001)(38070700005)(7416002)(66446008)(52536014)(8936002)(5660300002)(110136005)(54906003)(316002)(8676002)(76116006)(4326008)(66946007)(86362001)(64756008)(66476007)(26005)(66556008)(186003)(9686003)(122000001)(6506007)(55016003)(7696005)(53546011)(33656002)(2906002)(83380400001)(38100700002)(508600001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR08MB6981
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT062.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	39a89864-cfea-497e-e71d-08da0580ccd2
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	OWJyF4pwZ/MuHe5UA7GlZZHNQCqLw+mw3wFdNWKXUCOGqVJa32gPY2hp4IYvRNh0icEfeWCOYzFzQtHgR82ZYwLIF76Pk25fUmICWomDOu/4CopoUH0Fd64nbcsDOUoNPEnkGBAiznBWiM1B5YwhSTM+W59eslEg9AWyiL3C8DIS7RAITJ+uimRPpamvjZRb5K2ZCNwKeNshZRh+EqcB/+wHq5nTtS4vUgHCF1UElnaIywwwFl/Q/+W2blk/rFWNtZMecaI9L/Xj4FXna6wD4YZKFW4sHYeOouUFkRlXurvRC23yRmGh75Ck4PByBFw2n6SBhwrvbdL/ccJQSbR54aoXIMXWl98P9bhBDKu5T3pU7oaxxbAaX6RpeDoq1e0BVN2OuKlqMv5rehHK+F1DbhbtjEjo+4bEWVy5Y6eCQGvbjGLadIYYv8LGs4OB2UNAbeWhsWl3d4v25ZuZnhCpL9M5X2XaL4Zz4a46jz39dgEoITCUhaWCoYzZB1KnKjbLdp29XQotruqx+pRXz94TZZRnB0CaZ8TLItwb9RkrVa0VomTRpMxrcA8o3WI3jHRwun+aQPBsprDl2b+ZGTsLeBt3us6ADpEFXHTR+wdyd8K0i0DGpSLtamDfVnx6GDx1xP/XyWT3zTSU4p69WBrJKxQdJiRH16rx+Gz3opNkPGdZj8fbhGoZeEk8jSSLmNQL
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(6506007)(70586007)(7696005)(70206006)(9686003)(316002)(86362001)(82310400004)(54906003)(110136005)(508600001)(53546011)(356005)(47076005)(40460700003)(36860700001)(186003)(107886003)(336012)(26005)(83380400001)(81166007)(33656002)(8936002)(5660300002)(52536014)(55016003)(4326008)(8676002)(2906002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 06:06:45.7981
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 88d74f00-90a1-4dfa-1a54-08da0580d1b5
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT062.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB4743

Hi Marco,

> -----Original Message-----
> From: Xen-devel <xen-devel-bounces@lists.xenproject.org> On Behalf Of
> Marco Solieri
> Sent: Saturday, March 5, 2022 1:47 AM
> To: xen-devel@lists.xenproject.org
> Cc: Marco Solieri <marco.solieri@minervasys.tech>; Andrew Cooper
> <andrew.cooper3@citrix.com>; George Dunlap <george.dunlap@citrix.com>;
> Jan Beulich <jbeulich@suse.com>; Julien Grall <julien@xen.org>; Stefano
> Stabellini <sstabellini@kernel.org>; Wei Liu <wl@xen.org>; Marco Solieri
> <marco.solieri@unimore.it>; Andrea Bastoni
> <andrea.bastoni@minervasys.tech>; Luca Miccio <lucmiccio@gmail.com>
> Subject: [PATCH 10/36] xen/arch: check color selection function
>=20
> From: Luca Miccio <lucmiccio@gmail.com>
>=20
> Dom0 color configuration is parsed in the Xen command line. Add an
> helper function to check the user selection. If no configuration is
> provided by the user, all the available colors supported by the
> hardware will be assigned to dom0.
>=20
> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>

For the first 10 commits:

Tested-by: Henry Wang <Henry.Wang@arm.com>

> ---
>  xen/arch/arm/coloring.c             | 17 +++++++++++++++++
>  xen/arch/arm/include/asm/coloring.h |  8 ++++++++
>  2 files changed, 25 insertions(+)
>=20
> diff --git a/xen/arch/arm/coloring.c b/xen/arch/arm/coloring.c
> index f6e6d09477..382d558021 100644
> --- a/xen/arch/arm/coloring.c
> +++ b/xen/arch/arm/coloring.c
> @@ -179,6 +179,23 @@ uint32_t *setup_default_colors(uint32_t *col_num)
>      return NULL;
>  }
>=20
> +bool check_domain_colors(struct domain *d)
> +{
> +    int i;
> +    bool ret =3D false;
> +
> +    if ( !d )
> +        return ret;
> +
> +    if ( d->max_colors > max_col_num )
> +        return ret;
> +
> +    for ( i =3D 0; i < d->max_colors; i++ )
> +        ret |=3D (d->colors[i] > (max_col_num - 1));
> +
> +    return !ret;
> +}
> +
>  bool __init coloring_init(void)
>  {
>      int i;
> diff --git a/xen/arch/arm/include/asm/coloring.h
> b/xen/arch/arm/include/asm/coloring.h
> index 8f24acf082..fdd46448d7 100644
> --- a/xen/arch/arm/include/asm/coloring.h
> +++ b/xen/arch/arm/include/asm/coloring.h
> @@ -26,8 +26,16 @@
>  #define MAX_COLORS_CELLS 4
>=20
>  #ifdef CONFIG_COLORING
> +#include <xen/sched.h>
> +
>  bool __init coloring_init(void);
>=20
> +/*
> + * Check colors of a given domain.
> + * Return true if check passed, false otherwise.
> + */
> +bool check_domain_colors(struct domain *d);
> +
>  /*
>   * Return an array with default colors selection and store the number of
>   * colors in @param col_num. The array selection will be equal to the do=
m0
> --
> 2.30.2
>=20



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 06:36:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 06:36:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289910.491601 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTeJT-0004uf-IH; Mon, 14 Mar 2022 06:36:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289910.491601; Mon, 14 Mar 2022 06:36:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTeJT-0004uY-EW; Mon, 14 Mar 2022 06:36:15 +0000
Received: by outflank-mailman (input) for mailman id 289910;
 Mon, 14 Mar 2022 06:36:14 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=NoMf=TZ=intel.com=kevin.tian@srs-se1.protection.inumbo.net>)
 id 1nTeJR-0004uS-Vu
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 06:36:14 +0000
Received: from mga17.intel.com (mga17.intel.com [192.55.52.151])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 06215c21-a361-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 07:36:06 +0100 (CET)
Received: from orsmga005.jf.intel.com ([10.7.209.41])
 by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 13 Mar 2022 23:36:04 -0700
Received: from fmsmsx601.amr.corp.intel.com ([10.18.126.81])
 by orsmga005.jf.intel.com with ESMTP; 13 Mar 2022 23:36:03 -0700
Received: from fmsmsx610.amr.corp.intel.com (10.18.126.90) by
 fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21; Sun, 13 Mar 2022 23:36:01 -0700
Received: from fmsmsx610.amr.corp.intel.com (10.18.126.90) by
 fmsmsx610.amr.corp.intel.com (10.18.126.90) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21; Sun, 13 Mar 2022 23:36:01 -0700
Received: from FMSEDG603.ED.cps.intel.com (10.1.192.133) by
 fmsmsx610.amr.corp.intel.com (10.18.126.90) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21 via Frontend Transport; Sun, 13 Mar 2022 23:36:01 -0700
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (104.47.56.172)
 by edgegateway.intel.com (192.55.55.68) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.1.2308.21; Sun, 13 Mar 2022 23:36:01 -0700
Received: from BN9PR11MB5276.namprd11.prod.outlook.com (2603:10b6:408:135::18)
 by PH0PR11MB4840.namprd11.prod.outlook.com (2603:10b6:510:43::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Mon, 14 Mar
 2022 06:35:59 +0000
Received: from BN9PR11MB5276.namprd11.prod.outlook.com
 ([fe80::c8aa:b5b2:dc34:e893]) by BN9PR11MB5276.namprd11.prod.outlook.com
 ([fe80::c8aa:b5b2:dc34:e893%8]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 06:35:59 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 06215c21-a361-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;
  t=1647239766; x=1678775766;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-transfer-encoding:mime-version;
  bh=Uy9+7M3ERNNieNsQ5D2FRzFFgf+QvDat5baL9WxIhVc=;
  b=fMr5CGHwuS2FBacGvanizhVAWzRF5gMpDKqHl5NsydzaLj4X3Q+AawmD
   dyYmUZs1P9DhBPoUvqaP9h7yhk5+Et0y4CdllAA60bhSzoeyB7eqkrwwQ
   Q4bIK72wKFwg56lhzUC86YM6kEB8JODFnRaxic5/jCdLDUciaSeKPV9kz
   JxbilWcfqPkxyL16XKYwVgiM4rY6tcvd8xkgCqZVwHu8/NgmI7yFnxR+r
   4nnbO6xruM68UbbP5jjsHz+yjs+PhBbKPN8AVEBKkykljB8vn8hnOLMlP
   yWSmcRcU8WSzPJRMb3hEWZ04TqlSHrGKWjenoAiIMYs/d2LsExzxDJRGJ
   w==;
X-IronPort-AV: E=McAfee;i="6200,9189,10285"; a="236551953"
X-IronPort-AV: E=Sophos;i="5.90,179,1643702400"; 
   d="scan'208";a="236551953"
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.90,179,1643702400"; 
   d="scan'208";a="713597124"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=LiskI8vlVRkXvolZm/T3WSSuhhjB61S1KCRw8Y8zD/ODOkO87c2pyJCo2dp4bTBHUurpRBGUFpGDBguZVOn5vG7fZ95OkVWA359MW9eiDceGYq3yDY94m7HPAxNJK4cqJZD30u3wKtYZcxqsF6UTyrv6nyO7UsSzsgSTINzgtO4BHgAVnKmsagRpKqzamPG0CZPIPFPK00lFFQdRV+mdZOXDGLLKe4BqAQp3FaSFaYiL+N3nLGuc5BhtYAi4KvTWrRMG6tKAym4tmCG5EZMi/5hIpFxdWw76jx1ku5WBGb7y5/vpRV+m9gmn2+28NJ0hN9dSJjmjRa2bzC2FecJLow==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Uy9+7M3ERNNieNsQ5D2FRzFFgf+QvDat5baL9WxIhVc=;
 b=O1v+UrX8FbcvHDNdSsPTnjy8gk1CQ/JaRml/OwCrgpfrlo5S6yN+5HiAG9xRwma4hE9OFVVD1RicDNdskxm5pxZCBBl+W1J2TrCEO3V33Wg58TNePVIWCEJmXLNOUtLEMbVhYgHYggE+sGsybBEp7h6YX+x9J3CoD6VmbuVNLPFVH0wWYU7f8qehiJriOTkU4HtvlQWSZpnBKAFHn0IRrlIPUZl+n5QyueZgPN6MgUeZbqAq4abdgWDUUDFU10o8kuK3MjGLL5ALiHJCJrSrau2oXcrrvikRY0vWjFHqc9psZrxMiFVugvNSdLSqZzUHtfSLGgit4DzIE67f9aashw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com;
 dkim=pass header.d=intel.com; arc=none
From: "Tian, Kevin" <kevin.tian@intel.com>
To: "Beulich, Jan" <JBeulich@suse.com>, "Cooper, Andrew"
	<andrew.cooper3@citrix.com>
CC: =?utf-8?B?UGF1IE1vbm7DqSwgUm9nZXI=?= <roger.pau@citrix.com>, Wei Liu
	<wl@xen.org>, "Nakajima, Jun" <jun.nakajima@intel.com>, Thiner Logoer
	<logoerthiner1@163.com>, "Marczykowski, Marek"
	<marmarek@invisiblethingslab.com>, Xen-devel <xen-devel@lists.xenproject.org>
Subject: RE: x86/vmx: Don't spuriously crash the domain when INIT is received
Thread-Topic: x86/vmx: Don't spuriously crash the domain when INIT is received
Thread-Index: AQHYKbevPQACrsDTpUmflGdlWuTEmayj9FgAgAA+nwCAAA5IgIAAQNmAgAQWIgCAFe3v8A==
Date: Mon, 14 Mar 2022 06:35:58 +0000
Message-ID: <BN9PR11MB52767BF5573E31241734F2A28C0F9@BN9PR11MB5276.namprd11.prod.outlook.com>
References: <20220224194853.17774-1-andrew.cooper3@citrix.com>
 <20220224194853.17774-3-andrew.cooper3@citrix.com>
 <12d8b90b-15b0-c094-71e5-35cfdbfe72b4@suse.com>
 <51ef6bd1-bcd9-9a3a-e902-887d42d7dd7e@citrix.com>
 <bb4b4106-f49d-2b50-1eb9-eb450f6b24fa@suse.com>
 <965e91fa-1f1e-7c57-5a71-a09b170a7d9f@citrix.com>
 <2e1dcfb8-20ae-26b2-427d-9c19bd8c8add@suse.com>
In-Reply-To: <2e1dcfb8-20ae-26b2-427d-9c19bd8c8add@suse.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=intel.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: aa03578a-e49d-4437-3a28-08da0584e6b3
x-ms-traffictypediagnostic: PH0PR11MB4840:EE_
x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr
x-microsoft-antispam-prvs: <PH0PR11MB4840B5C2878FFED58512D6218C0F9@PH0PR11MB4840.namprd11.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BN9PR11MB5276.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(26005)(6506007)(7696005)(83380400001)(71200400001)(186003)(53546011)(54906003)(5660300002)(110136005)(86362001)(8936002)(2906002)(9686003)(38070700005)(76116006)(122000001)(55016003)(316002)(38100700002)(82960400001)(52536014)(33656002)(508600001)(66556008)(66476007)(66946007)(66446008)(64756008)(4326008)(8676002);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?WUZHOFJ3WUYrVWxkZ2VRcFVjZHpORWwxODlNeG05TkltYlVlTXdVVWpQT3Jw?=
 =?utf-8?B?b1NybUtWeWNxNE5tNENBQ3VqQmlUQkYxNzJZQ05uK2tjRk5jK283U2E2aGk1?=
 =?utf-8?B?OGEzUVhzOUlHRVNFbEZiSGZiNmxoS0JPUHJjWUpobFprK3U0N0x6OThWTVBm?=
 =?utf-8?B?ZVRJdjF6T2kwZVhzUFVFMVpvSVRXOElCaHNnREY5d3lhNEZ0MCtFZjJWNjlM?=
 =?utf-8?B?aEdzZlc5SDIrNTBXQXR5dHowZVdYMlpjd1JzcWZkTHJDSWZ6MTJDcGlUdnVS?=
 =?utf-8?B?dW92QlBjMnkweThCZUpxQ3hGTXRodENIR1hhbmZHdnZvUERVWjJmUFVQaXlh?=
 =?utf-8?B?bHRFN1QxNjNscVA4bEc0OGtPNmFLSWczL25vUW5oSUx2UjY0bUxIVFloMmFN?=
 =?utf-8?B?L29qbU0wbzZGekpNcTdDejJHc1ZEc2JNcXNiNlRlWENlK3pBdVo4aEJDU283?=
 =?utf-8?B?a3dnaExLdmVnRHZLUjQwOXNCNWUxWWtUUVNQR1dxNlFnVCtGRHF3bmdDTzQ0?=
 =?utf-8?B?TlJJdWo5OG9lakplY1c2MUZNQ1RXTmRiSWx1YUZkRTR2WFlFdjVKZXE5UG5v?=
 =?utf-8?B?dkQ3dTBRTDFKTElwQXd5TmJ6SGdGZDk3SFhyT0NvbHFPcmpCaUpGSTZqMTBk?=
 =?utf-8?B?dDBKU2pLcXFkWWFrWnJtQXZ3WUFOUEFMZVZSa25HdHc3SmRvQjZtOHlzVTF5?=
 =?utf-8?B?VndhRG9aK1M5cVFGLzl3ZVBKaVp0L2ROZVZLbmRtMlhySThSeGVZdHA5QlZz?=
 =?utf-8?B?dFFTZzBLRUhabzc2RjlPTGN5T3JJczNJVFlvVlE3SmphNXV4WHlvRE1zOXZ2?=
 =?utf-8?B?S3hkQVlMZyt1NmVlczVaOW9OWmNqbXFhbVJieHpPSW56eFpnYUdId0hiOVBt?=
 =?utf-8?B?Zy9oOEh5eTg5MTR2d1IrMG81ZVpIbnc4bElFN1o1UEhPS2NQelFyUmcwTkR2?=
 =?utf-8?B?WVRDenBWbk9MRVI4Qm1EcnhxUkF5UTgxb1FGUEMySTJHcjN3MU1GUDB0NG5v?=
 =?utf-8?B?MmtRWCtiVUl5UnZjWWlYeW5hWHNPQVdXSTFoT3M0NUN1Vk96UDJ1MWJWNW1N?=
 =?utf-8?B?N3d1d2NpYVljNUZRZnhtbnVoa3BPYmViMzNNSitqN2gvTFNKMy9aVmZUWkFk?=
 =?utf-8?B?aHk1UXFZK09QQ1pTUDdXL1F3WG9BWjlYbUNvRWh0MXQ1OEpNSE9PSXNKQysr?=
 =?utf-8?B?MjdwZ1MvOVppOGxMYnUvS29yRnBzc1cxU0ZmcnVFTzVWdzR4Z0ZJTjVpbmtm?=
 =?utf-8?B?YVZXZzRJaitKWFhSeit5L09aN2xUNGhkVXlyQ0pTQXhPU0tyb3Z5T29IN2Ji?=
 =?utf-8?B?dmJEb3lJZkl2dzlhdzI3ZnMxRE1hU1kwYWNOWUZFbS9lcjhtRG1IRUk1SG10?=
 =?utf-8?B?Zis4bFZHMytTeDJuSXg2VTFtSzBhV2VGQURLaUVDWUs3eVlPaUVIc2s4Z29z?=
 =?utf-8?B?MndtRnhybmd3V2djMHlONG02V3hFNUVpNzRwcFgrdnRoZlpMRnRRamc1bThm?=
 =?utf-8?B?SmtwTEozR0dKYUtKVEQ5WjcvNys3SU9NTzVBeXFnZGs1Nm5QSHQ1T20xSUZj?=
 =?utf-8?B?alhlOS80dXdtdVFxTW5QU1V3UmlDS0RsanFFSy9LY0NNcEg4NGkxSHlabXV1?=
 =?utf-8?B?Vi9PenJua1Zyb1FxcFoxSFdud3F6dkxyVFJwaE9CMU03eGZOazNvWVpHTE42?=
 =?utf-8?B?Mm1ncDE3bWw2U2xCaXBqYndLR0NLYWJhZTdHWnBBck9zc0QrVnZ3RXdCZ2lW?=
 =?utf-8?B?SXVmY0JyMEpKblJITnNsL21NNnlMNVFMSVpGV0VMRnpEVXE2MEszS21VZmQy?=
 =?utf-8?B?ZVlFQTZaZExkK3dnN0hTbE43VGxGWW0yWGZtNDBmeTZkd0taQ29Nbnl2RWJk?=
 =?utf-8?B?Wmt2TWJEcnZLRjVXc2lneWFaUVBwN0hmTDQvMjlUL3M2b21ISnpyUjYwc1Bh?=
 =?utf-8?Q?AKebKIEWFvhb1n+96diJ1MsoP74PYSDY?=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN9PR11MB5276.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: aa03578a-e49d-4437-3a28-08da0584e6b3
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Mar 2022 06:35:58.8955
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: IeHpUp5uaTXICxXnPGBE9xZEBfPSqmOnvcZH9dxlCNQHJqgOQV5tVaiS+HV0aNIR61wCJm1IcxphSWzd6cXJKg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR11MB4840
X-OriginatorOrg: intel.com

PiBGcm9tOiBKYW4gQmV1bGljaCA8amJldWxpY2hAc3VzZS5jb20+DQo+IFNlbnQ6IE1vbmRheSwg
RmVicnVhcnkgMjgsIDIwMjIgMzozNiBQTQ0KPiANCj4gT24gMjUuMDIuMjAyMiAxODoxMSwgQW5k
cmV3IENvb3BlciB3cm90ZToNCj4gPiBPbiAyNS8wMi8yMDIyIDEzOjE5LCBKYW4gQmV1bGljaCB3
cm90ZToNCj4gPj4gT24gMjUuMDIuMjAyMiAxMzoyOCwgQW5kcmV3IENvb3BlciB3cm90ZToNCj4g
Pj4+IE9uIDI1LzAyLzIwMjIgMDg6NDQsIEphbiBCZXVsaWNoIHdyb3RlOg0KPiA+Pj4+IE9uIDI0
LjAyLjIwMjIgMjA6NDgsIEFuZHJldyBDb29wZXIgd3JvdGU6DQo+ID4+Pj4+IEluIFZNWCBvcGVy
YXRpb24sIHRoZSBoYW5kbGluZyBvZiBJTklUIElQSXMgaXMgY2hhbmdlZC4NCj4gRVhJVF9SRUFT
T05fSU5JVCBoYXMNCj4gPj4+Pj4gbm90aGluZyB0byBkbyB3aXRoIHRoZSBndWVzdCBpbiBxdWVz
dGlvbiwgc2ltcGx5IHNpZ25hbHMgdGhhdCBhbiBJTklUDQo+IHdhcw0KPiA+Pj4+PiByZWNlaXZl
ZC4NCj4gPj4+Pj4NCj4gPj4+Pj4gSWdub3JpbmcgdGhlIElOSVQgaXMgcHJvYmFibHkgdGhlIHdy
b25nIHRoaW5nIHRvIGRvLCBidXQgaXMgaGVscGZ1bCBmb3INCj4gPj4+Pj4gZGVidWdnaW5nLiAg
Q3Jhc2hpbmcgdGhlIGRvbWFpbiB3aGljaCBoYXBwZW5zIHRvIGJlIGluIGNvbnRleHQgaXMNCj4g
ZGVmaW5pdGVseQ0KPiA+Pj4+PiB3cm9uZy4gIFByaW50IGFuIGVycm9yIG1lc3NhZ2UgYW5kIGNv
bnRpbnVlLg0KPiA+Pj4+Pg0KPiA+Pj4+PiBEaXNjb3ZlcmVkIGFzIGNvbGxhdGVyYWwgZGFtYWdl
IGZyb20gd2hlbiBhbiBBUCB0cmlwbGUgZmF1bHRzIG9uIFMzDQo+IHJlc3VtZSBvbg0KPiA+Pj4+
PiBJbnRlbCBUaWdlckxha2UgcGxhdGZvcm1zLg0KPiA+Pj4+IEknbSBhZnJhaWQgSSBkb24ndCBm
b2xsb3cgdGhlIHNjZW5hcmlvLCB3aGljaCB3YXMgKG9ubHkpIG91dGxpbmVkIGluDQo+ID4+Pj4g
cGF0Y2ggMTogV2h5IHdvdWxkIHRoZSBCU1AgcmVjZWl2ZSBJTklUIGluIHRoaXMgY2FzZT8NCj4g
Pj4+IFNIVVRET1dOIGlzIGEgc2lnbmFsIGVtaXR0ZWQgYnkgYSBjb3JlIHdoZW4gaXQgY2FuJ3Qg
Y29udGludWUuwqAgVHJpcGxlDQo+ID4+PiBmYXVsdCBpcyBvbmUgY2F1c2UsIGJ1dCBvdGhlciBz
b3VyY2VzIGluY2x1ZGUgYSBkb3VibGUgI01DLCBldGMuDQo+ID4+Pg0KPiA+Pj4gU29tZSBleHRl
cm5hbCBjb21wb25lbnQsIGluIHRoZSBQQ0ggSSBleHBlY3QsIG5lZWRzIHRvIHR1cm4gdGhpcyBp
bnRvIGENCj4gPj4+IHBsYXRmb3JtIHJlc2V0LCBiZWNhdXNlIG9uZSBtYWxmdW5jdGlvbmluZyBj
b3JlIGNhbid0LsKgIEl0IGlzIHdoeSBhDQo+ID4+PiB0cmlwbGUgZmF1bHQgb24gYW55IGxvZ2lj
YWwgcHJvY2Vzc29yIGJyaW5ncyB0aGUgd2hvbGUgc3lzdGVtIGRvd24uDQo+ID4+IEknbSBhZnJh
aWQgdGhpcyBkb2Vzbid0IGFuc3dlciBteSBxdWVzdGlvbi4gQ2xlYXJseSB0aGUgc3lzdGVtIGRp
ZG4ndA0KPiA+PiBzaHV0IGRvd24uDQo+ID4NCj4gPiBJbmRlZWQsICpiZWNhdXNlKiBYZW4gY2F1
Z2h0IGFuZCBpZ25vcmVkIHRoZSBJTklUIHdoaWNoIHdhcyBvdGhlcndpc2UNCj4gPiBzdXBwb3Nl
ZCB0byBkbyBpdC4NCj4gPg0KPiA+PiAgSGVuY2UgSSBzdGlsbCBkb24ndCBzZWUgd2h5IHRoZSBC
U1Agd291bGQgc2VlIElOSVQgaW4gdGhlDQo+ID4+IGZpcnN0IHBsYWNlLg0KPiA+Pg0KPiA+Pj4+
IEFuZCBpdCBhbHNvIGNhbm5vdCBiZSB0aGF0IHRoZSBJTklUIHdhcyByZWNlaXZlZCBieSB0aGUg
dkNQVSB3aGlsZQ0KPiBydW5uaW5nIG9uDQo+ID4+Pj4gYW5vdGhlciBDUFU6DQo+ID4+PiBJdCdz
IG5vdGhpbmcgKHJlYWxseSkgdG8gZG8gd2l0aCB0aGUgdkNQVS7CoCBJTklUIGlzIGEgZXh0ZXJu
YWwgc2lnbmFsIHRvDQo+ID4+PiB0aGUgKHJlYWwpIEFQSUMsIGp1c3QgbGlrZSBOTUkvZXRjLg0K
PiA+Pj4NCj4gPj4+IEl0IGlzIHRoZSBuZXh0IFZNRW50cnkgb24gYSBDUFUgd2hpY2ggcmVjZWl2
ZWQgSU5JVCB0aGF0IHN1ZmZlcnMgYQ0KPiA+Pj4gVk1FbnRyeSBmYWlsdXJlLCBhbmQgdGhlIFZN
RW50cnkgZmFpbHVyZSBoYXMgbm90aGluZyB0byBkbyB3aXRoIHRoZQ0KPiA+Pj4gY29udGVudHMg
b2YgdGhlIFZNQ1MuDQo+ID4+Pg0KPiA+Pj4gSW1wb3J0YW50bHkgZm9yIFhlbiBob3dldmVyLCB0
aGlzIGlzbid0IGFwcGxpY2FibGUgZm9yIHNjaGVkdWxpbmcgUFYNCj4gPj4+IHZDUFVzLCB3aGlj
aCBpcyB3aHkgZG9tMCB3YXNuJ3QgdGhlIG9uZSB0aGF0IGNyYXNoZWQuwqAgVGhpcyBhY3R1YWxs
eQ0KPiA+Pj4gbWVhbnQgdGhhdCBkb20wIHdhcyBhbGl2ZSBhbiB1c2FibGUsIGFsYmVpdCBpdCBz
aGFyaW5nIGFsbCB2Q1BVcyBvbiBhDQo+ID4+PiBzaW5nbGUgQ1BVLg0KPiA+Pj4NCj4gPj4+DQo+
ID4+PiBUaGUgY2hhbmdlIGluIElOSVQgYmVoYXZpb3VyIGV4aXN0cyBmb3IgVFhULCB3aGVyZSBp
cyBpdCBjcml0aWNhbCB0aGF0DQo+ID4+PiBzb2Z0d2FyZSBjYW4gY2xlYXIgc2VjcmV0cyBmcm9t
IFJBTSBiZWZvcmUgcmVzZXR0aW5nLsKgIEknbSBub3Qgd2FudGluZw0KPiA+Pj4gdG8gZ2V0IGlu
dG8gYW55IG9mIHRoYXQgYmVjYXVzZSBpdCdzIGZhciBtb3JlIGNvbXBsaWNhdGVkIHRoYW4gSSBo
YXZlDQo+ID4+PiB0aW1lIHRvIGZpeC4NCj4gPj4gSSBndWVzcyB0aGVyZSdzIHNvbWV0aGluZyBo
aWRkZW4gYmVoaW5kIHdoYXQgeW91IHNheSBoZXJlLCBsaWtlIElOSVQNCj4gPj4gb25seSBiZWlu
ZyBsYXRjaGVkLCBidXQgdGhpcyBsYXRjaGVkIHN0YXRlIHRoZW4gY2F1c2luZyB0aGUgVk0gZW50
cnkNCj4gPj4gZmFpbHVyZS4gV2hpY2ggd291bGQgbWVhbiB0aGF0IHJlYWxseSB0aGUgSU5JVCB3
YXMgYSBzaWduYWwgZm9yIHRoZQ0KPiA+PiBzeXN0ZW0gdG8gc2h1dCBkb3duIC8gc2h1dHRpbmcg
ZG93bi4NCj4gPg0KPiA+IFllcy4NCg0Kd2h5IGlzIElOSVQgbGF0Y2hlZCBpbiByb290IG1vZGUg
KHRha2UgZWZmZWN0IHVudGlsIHZtZW50cnkpIGluc3RlYWQgb2YNCmRpcmVjdGx5IGNhdXNpbmcg
dGhlIENQVSB0byByZXNldD8NCg0KPiA+DQo+ID4+IEluIHdoaWNoIGNhc2UgYXJyYW5naW5nIHRv
DQo+ID4+IGNvbnRpbnVlIGJ5IGlnbm9yaW5nIHRoZSBldmVudCBpbiBWTVggbG9va3Mgd3Jvbmcu
IFNpbXBseSBjcmFzaGluZw0KPiA+PiB0aGUgZ3Vlc3Qgd291bGQgdGhlbiBiZSB3cm9uZyBhcyB3
ZWxsLCBvZiBjb3Vyc2UuIFdlIHNob3VsZCBzaHV0DQo+ID4+IGRvd24gaW5zdGVhZC4NCj4gPg0K
PiA+IEl0IGlzIHNvZnR3YXJlJ3MgZGlzY3JldGlvbiB3aGF0IHRvIGRvIHdoZW4gYW4gSU5JVCBp
cyBjYXVnaHQsIGV2ZW4gaWYNCj4gPiB0aGUgZXhwZWN0YXRpb24gaXMgdG8gaG9ub3VyIGl0IGZh
aXJseSBwcm9tcHRseS4NCj4gPg0KPiA+PiBCdXQgSSBkb24ndCB0aGluayBJIHNlZSB0aGUgZnVs
bCBwaWN0dXJlIGhlcmUgeWV0LCB1bmxlc3MgeW91cg0KPiA+PiBtZW50aW9uaW5nIG9mIFRYVCB3
YXMgYWN0dWFsbHkgaW1wbHlpbmcgdGhhdCBUWFQgd2FzIGFjdGl2ZSBhdCB0aGUNCj4gPj4gcG9p
bnQgb2YgdGhlIGNyYXNoICh3aGljaCBJIGRvbid0IHRoaW5rIHdhcyBzYWlkIGFueXdoZXJlKS4N
Cj4gPg0KPiA+IFRoaXMgZGlkIGNhdXNlIGNvbmZ1c2lvbiBkdXJpbmcgZGVidWdnaW5nLsKgIEFz
IGZhciBhcyB3ZSBjYW4gdGVsbCwgVFhUDQo+ID4gaXMgbm90IGFjdGl2ZSwgYnV0IHRoZSBvYnNl
cnZlZCBiZWhhdmlvdXIgY2VydGFpbmx5IGxvb2tzIGxpa2UgVFhUIGlzDQo+ID4gYWN0aXZlLg0K
PiA+DQo+ID4gVGhlbiBhZ2FpbiwgcmVzZXQgaXMgYSBwbGF0Zm9ybSBiZWhhdmlvdXIsIG5vdCBh
cmNoaXRlY3R1cmFsLsKgIEFsc28sDQo+ID4gaXQncyBteSB1bmRlcnN0YW5kaW5nIHRoYXQgSW50
ZWwgZG9lcyBub3Qgc3VwcG9ydCBTMyBvbiBUaWdlckxha2UNCj4gPiAob3B0aW5nIHRvIG9ubHkg
c3VwcG9ydCBTMGl4IGluc3RlYWQpLCBzbyBJJ20gZ3Vlc3NpbmcgdGhhdCAiTGludXggUzMiDQo+
ID4gYXMgaXQncyBjYWxsZWQgaW4gdGhlIG1lbnUgaXMgc29tZXRoaW5nIHJldHJvZml0dGVkIGJ5
IHRoZSBPRU0uDQo+ID4NCj4gPiBCdXQgb3ZlcmFsbCwgdGhlIHBvaW50IGlzbid0IHJlYWxseSBh
Ym91dCB3aGF0IHRyaWdnZXJlZCB0aGUgSU5JVC7CoCBXZQ0KPiA+IGFsc28gc2hvdWxkbid0IG51
a2UgYW4gaW5ub2NlbnQgVk0gaWYgYW4gSU5JVCBJUEkgc2xpcHMgdGhyb3VnaA0KPiA+IGludGVy
cnVwdCByZW1hcHBpbmcuDQo+IA0KPiBCdXQgd2UgYWxzbyBzaG91bGRuJ3QgY29udGludWUgaW4g
c3VjaCBhIGNhc2UgYXMgaWYgbm90aGluZyBoYWQgaGFwcGVuZWQNCj4gYXQgYWxsLCBzaG91bGQg
d2U/DQo+IA0KDQpOb3cgdGhlcmUgYXJlIHR3byBwcm9ibGVtczoNCg0KMSkgQW4gaW5ub2NlbnQg
Vk0gaXMga2lsbGVkOw0KMikgVGhlIHN5c3RlbSBjb250aW51ZXMgYXMgaWYgbm90aGluZyBoYWQg
aGFwcGVuZWQ7DQoNCkFuZHJldydzIHBhdGNoIGZpeGVzIDEpIHdoaWNoIGltbyBpcyB3ZWxjb21l
ZCBhbnl3YXkuDQoNCjIpIGNlcnRhaW5seSBuZWVkcyBtb3JlIHdvcmsgYnV0IGNvdWxkIGNvbWUg
YWZ0ZXIgMSkuIA0KDQpUaGFua3MNCktldmluDQo=


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 06:40:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 06:40:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289916.491612 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTeNd-0006MB-6a; Mon, 14 Mar 2022 06:40:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289916.491612; Mon, 14 Mar 2022 06:40:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTeNd-0006M4-3b; Mon, 14 Mar 2022 06:40:33 +0000
Received: by outflank-mailman (input) for mailman id 289916;
 Mon, 14 Mar 2022 06:40:32 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=NoMf=TZ=intel.com=kevin.tian@srs-se1.protection.inumbo.net>)
 id 1nTeNc-0006Li-Dx
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 06:40:32 +0000
Received: from mga14.intel.com (mga14.intel.com [192.55.52.115])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a358cf7e-a361-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 07:40:30 +0100 (CET)
Received: from orsmga005.jf.intel.com ([10.7.209.41])
 by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 13 Mar 2022 23:40:27 -0700
Received: from fmsmsx601.amr.corp.intel.com ([10.18.126.81])
 by orsmga005.jf.intel.com with ESMTP; 13 Mar 2022 23:40:27 -0700
Received: from fmsmsx612.amr.corp.intel.com (10.18.126.92) by
 fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21; Sun, 13 Mar 2022 23:40:27 -0700
Received: from fmsmsx601.amr.corp.intel.com (10.18.126.81) by
 fmsmsx612.amr.corp.intel.com (10.18.126.92) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21; Sun, 13 Mar 2022 23:40:26 -0700
Received: from FMSEDG603.ED.cps.intel.com (10.1.192.133) by
 fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21 via Frontend Transport; Sun, 13 Mar 2022 23:40:26 -0700
Received: from NAM12-BN8-obe.outbound.protection.outlook.com (104.47.55.173)
 by edgegateway.intel.com (192.55.55.68) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.1.2308.21; Sun, 13 Mar 2022 23:40:26 -0700
Received: from BN9PR11MB5276.namprd11.prod.outlook.com (2603:10b6:408:135::18)
 by MWHPR1101MB2349.namprd11.prod.outlook.com (2603:10b6:300:79::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Mon, 14 Mar
 2022 06:40:11 +0000
Received: from BN9PR11MB5276.namprd11.prod.outlook.com
 ([fe80::c8aa:b5b2:dc34:e893]) by BN9PR11MB5276.namprd11.prod.outlook.com
 ([fe80::c8aa:b5b2:dc34:e893%8]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 06:40:10 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a358cf7e-a361-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;
  t=1647240030; x=1678776030;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-transfer-encoding:mime-version;
  bh=czyHI8KkCYHqEByd+ZuhEe+bUHITDOyIXb9DONK4qFo=;
  b=e5SCmlz/dKM+CR/h42smQFt+diJVp0EdAv6iHfWWtqEqpWFTgxE4H2Td
   XQaE6o30YsJqQvXkv6br13QD/wac0fk/myP63bw3VaJWs8m6q6+eEdKTv
   IR1+2xdrgQYnnZVYhjHBSngHhistM492W9rDBx+PdRsOjdTCs21OAEkPZ
   zNTS9p3dnRwmMPSRjom7w+9W9A+fRStSM8d3TFV/lQ8PizWaEpZhfzKg9
   iaa5WpFjK6enpDeroepqgRRz4QmL9HoZiDN4z95oYRbc0bDZxJ4W49ePQ
   QTbE7iGMdxBB4+8DGPZqNNSxON7j0OxSkc5ej6bubaW9QTRi5GH++vqMz
   w==;
X-IronPort-AV: E=McAfee;i="6200,9189,10285"; a="256135385"
X-IronPort-AV: E=Sophos;i="5.90,179,1643702400"; 
   d="scan'208";a="256135385"
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.90,179,1643702400"; 
   d="scan'208";a="713598318"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=JjGgBLn0/LbdXFARncJ0a6YHSL0bBKzd1t3iNy1NXphtil57/gOnzv6h89dbmsDWlMvWFtqYcechTPzQtbDZ2lArYmuGgss8hWqtKm+njoTvdgvuqUqW6KCOwTzo+gd8uEL1IvZFIQPdJmC+o9s6IV4zN8CJLv5RXs5Fxlm2Oc/RsIn2vQAAPSCILdZ1FpnjOENMR+cPJwk2rJDdA7l00GifIJj3GMxW3+L7gju/MbMfNektblt6HgMLDcwHVkTOMvaxW3qypj4aNNZoUrnRYq5cC9A3Tp9OEy2H+dvqgvgN/sdgd6Ul64Ns6kJSXPcB5ApyOMJAn9o8nPaUVwqBIg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=czyHI8KkCYHqEByd+ZuhEe+bUHITDOyIXb9DONK4qFo=;
 b=UxNuT1oFHahsdj9ET9vLnuZ9oCXu5OqJyif9dFnhMGxpGIJC3DdH0nVHuG/ROpNhmQf8aC3nPJTSa5d5A1IbBdFCz/QscNTPeaGjLQh/dScmzfBvd7C4zQy1bqRk6dG5iLxgdTr4ouAYvM3T0llS3DjB5imY4VfXeGs8FKBsutUTH06a7CilPNVBJUEuAaCbtvCnFemyytbrF8Laf3D9FJg+cIvZcwwbdaKvYeeKoZH6x7e+eB/22MuU/BXfHCGxNUpHd4Llf5nsqWdTN6ryaZblaVdtrW9GdNYEVnsPFmj0BSPTkiy8reJSBQoYpRaK6bwVXvS12h1ri5gkW1PzHw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com;
 dkim=pass header.d=intel.com; arc=none
From: "Tian, Kevin" <kevin.tian@intel.com>
To: Jane Malalane <jane.malalane@citrix.com>, Xen-devel
	<xen-devel@lists.xenproject.org>
CC: Wei Liu <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>, "Gross,
 Jurgen" <jgross@suse.com>, "Cooper, Andrew" <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>, "Beulich, Jan" <JBeulich@suse.com>,
	Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, Bertrand Marquis
	<bertrand.marquis@arm.com>, "Nakajima, Jun" <jun.nakajima@intel.com>,
	=?utf-8?B?UGF1IE1vbm7DqSwgUm9nZXI=?= <roger.pau@citrix.com>
Subject: RE: [PATCH v5 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Thread-Topic: [PATCH v5 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Thread-Index: AQHYMjTwrgWmuXEjA0e1vahO/5egnKy+d+KA
Date: Mon, 14 Mar 2022 06:40:10 +0000
Message-ID: <BN9PR11MB527670221482173B63DB02FD8C0F9@BN9PR11MB5276.namprd11.prod.outlook.com>
References: <20220307150609.10662-1-jane.malalane@citrix.com>
 <20220307150609.10662-2-jane.malalane@citrix.com>
In-Reply-To: <20220307150609.10662-2-jane.malalane@citrix.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=intel.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: f48e5611-f757-4e90-17b5-08da05857cd7
x-ms-traffictypediagnostic: MWHPR1101MB2349:EE_
x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr
x-microsoft-antispam-prvs: <MWHPR1101MB2349745ED5FA3ED89036E2F28C0F9@MWHPR1101MB2349.namprd11.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BN9PR11MB5276.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(8936002)(52536014)(64756008)(71200400001)(38100700002)(66946007)(66446008)(66476007)(66556008)(76116006)(508600001)(7696005)(6506007)(26005)(5660300002)(33656002)(7416002)(82960400001)(186003)(9686003)(122000001)(110136005)(54906003)(2906002)(83380400001)(316002)(8676002)(4326008)(38070700005)(55016003)(86362001);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?d0hwRkFHZVJONENBaXpxNmN6R1kwSkkyN2ZUTXVSSHRIRFFpMFVVYVZNYUp2?=
 =?utf-8?B?MEwxMWhtVEN0WXBGeWprbTdBalNtZmhibGxCS0laUk9NdlNVNWJ6SDdxZGwv?=
 =?utf-8?B?a3AwV1krdG90NytnZ21LN2NISW9oVmQzY1dFcGdNTkUyeWkrZGpaYUZBUTFp?=
 =?utf-8?B?N0tZQldWWC8yYnV5TDNuR1h2aW1wRzVkM3RZRTRiT2prQlNGUjA1cE03ZzdW?=
 =?utf-8?B?aXhRZSttSFNtbGF3bER0aWR3WndZWjVhMmlaTzVwZDFmdUh6SmV4MmVHZmZh?=
 =?utf-8?B?azBOOEM3TnJwUm9sWnlBemhoeGxYeGUrTmZFSW5lbFZ3bG04aWZ3RzZ0c3Jk?=
 =?utf-8?B?R3pyUTJhdXFvc0x0VVB6QWd0T2NERXBYL2hId2NxS2tvbzZZb2JYbHpnMWZM?=
 =?utf-8?B?RG1kdDFkM0hrSlpLTTNrNXdvU0NBd0dkY0E5ZkRBSFg2OVZhU0xZVWRUWFgw?=
 =?utf-8?B?RGRuL1ZpczJEbEk4TURVWXJKR0F2QnhtRTRMaWlIczI2blhZdkNmY3JnOTMy?=
 =?utf-8?B?WkxSUzVWMkZEODhJUHgzamh6YlhNSGo5Und4VmRYM3BxbmFudnRBdDhwM3ZT?=
 =?utf-8?B?SGppK09UWUV0RXJWby81YWJ0R3FsSk16N3FXdG41eVFSOVpDVWJ0ZGxEcjA4?=
 =?utf-8?B?QkoxUnVnNU9POE44T2cvMHdpdmsyekhmcHNQNUUySzI1M2NZWkZDTFdON0hL?=
 =?utf-8?B?eVRCcnlmUy9nK244L1BmTkZxcVd3anEyU0lPb1BTRnk2NUE0TVFGYURGc2c1?=
 =?utf-8?B?a0p3cWVUM3hBc1VYRG8yUzBWTkJ2VlgzY3VSOThEVFdpSFRwNTI4Zm5qcFJZ?=
 =?utf-8?B?bjB5NjVtL1k0R3g4dmcrWUovS04vMm9iTjM0bWFReHR0UElPT1dxbmw0ODQz?=
 =?utf-8?B?VXJCVFFSOHNzYlJQU0tlL1ZFK2x2eXUxanJSaUtmMzMwb2JNTWIzUjdKQjdM?=
 =?utf-8?B?VXEzbnZGVEdLWDZ2WUE0alZiQy9MNUFUNXVCeitPRXJVdlVqVXR0L29yRG5V?=
 =?utf-8?B?RndJdFUrZW1XTTZVQmtTVndnK3BwUzNjb3pVcC9KTWEycjRpMktuck1XWVpT?=
 =?utf-8?B?WU9PYlZ6MmVGTWJCdzJlVUtMdzJ5cWFZSW1lQzJyMkRmQnlpdW5yWVZUSzNh?=
 =?utf-8?B?VVp2eWkvd0R3K0E2YjZBalRHWTNKMFpieUxySFIyamdLZjB2VDVObThrVnVy?=
 =?utf-8?B?VXFBdVI4c1RIYS9UNWo2T1QvemsvTGFva3JXQ3VrR3V6OHVtL1RtRGorOUNH?=
 =?utf-8?B?VUdwMFFmR01RbCtPY2dmekR2MFE3am05djk5ZSt0OHMwaStla1dTRjloVEkx?=
 =?utf-8?B?TmxVYnNXMnZhN254Qkd4ZmUwT2xxd0dnNUh5bldNTytGMktuenc0RWZjeXkx?=
 =?utf-8?B?VHNhbXVSTWY0RTI0MXVxZytPTGwyQU1SZGVFWXJhaG56Qnd5bmMvM04xd2dn?=
 =?utf-8?B?a2tHdS9xUi80ZHlxZmQ1UCtNeTBuUkJLK2VtZm5hM3FPeTUzcXNhS0JNeUwy?=
 =?utf-8?B?T2VPak9UcGxNbVFmeEQwbloyQm1WTmpZUTdmNCtob01MT0lUbGxtczFFN0g3?=
 =?utf-8?B?Mll2aUthNkk0SHhKUnlyZW96aDN0QnpPNG02OUFJUkkxaTlPK0QvcXkyNW51?=
 =?utf-8?B?bTQ3WEFRaU00SWZFaXFBSmcwcDBDL0RITGI2VWFlZ2htSTdiWmR5WlRBM3hI?=
 =?utf-8?B?YzdFeE5kdXlDRUp2dVRuM3k3c2ErekxJM09vT3pIR3NyWkdYWlBsa3ljK1E4?=
 =?utf-8?B?N2I1UXdvSll2TFFsRzF2L3dlOW50SFlETUYrRWF4VDZPaHN1OHZGQ3A2TXQv?=
 =?utf-8?B?WmV2Kzd2b1BCNEpxMUhsWEV1dDMxNzRSTzk4dTJ0dHd3Y3pXdmxvYzZpUDFC?=
 =?utf-8?B?L2g1TE4wYzZtKy9UV2NxeGtwLzBJd2c2OXR5Z2xUTU1DeS82MXlVR0Rzb1oy?=
 =?utf-8?Q?f0yXBvRRz2/1c+8eJlhDJkM8/jpzyR2S?=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN9PR11MB5276.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f48e5611-f757-4e90-17b5-08da05857cd7
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Mar 2022 06:40:10.7576
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 58We7s/Fovg2sDQyZH0Se8msMWF8c2H2JRx3YRm3lMQII2VXABamS3VNHThf3DoQsE+UXm0SGd1MDT6FC/tLvQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR1101MB2349
X-OriginatorOrg: intel.com
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From xen-devel-bounces@lists.xenproject.org Mon Mar 14 07:11:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 07:11:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289920.491623 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTerD-0001P6-HV; Mon, 14 Mar 2022 07:11:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289920.491623; Mon, 14 Mar 2022 07:11:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTerD-0001Oz-EY; Mon, 14 Mar 2022 07:11:07 +0000
Received: by outflank-mailman (input) for mailman id 289920;
 Mon, 14 Mar 2022 07:05:49 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=1dCu=TZ=cmss.chinamobile.com=jianchunfu@srs-se1.protection.inumbo.net>)
 id 1nTem5-0000Vn-9H
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 07:05:49 +0000
Received: from cmccmta1.chinamobile.com (cmccmta1.chinamobile.com
 [221.176.66.79]) by se1-gles-flk1.inumbo.com (Halon) with ESMTP
 id 25d4dfc0-a365-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 08:05:44 +0100 (CET)
Received: from spf.mail.chinamobile.com (unknown[172.16.121.3]) by
 rmmx-syy-dmz-app02-12002 (RichMail) with SMTP id 2ee2622ee9422a3-edaed;
 Mon, 14 Mar 2022 15:05:38 +0800 (CST)
Received: from localhost.localdomain (unknown[223.108.79.97])
 by rmsmtp-syy-appsvr02-12002 (RichMail) with SMTP id 2ee2622ee93bb5a-76513;
 Mon, 14 Mar 2022 15:05:37 +0800 (CST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 25d4dfc0-a365-11ec-853b-5f4723681683
X-RM-TRANSID:2ee2622ee9422a3-edaed
X-RM-TagInfo: emlType=0                                       
X-RM-SPAM-FLAG:00000000
X-RM-TRANSID:2ee2622ee93bb5a-76513
From: jianchunfu <jianchunfu@cmss.chinamobile.com>
To: tglx@linutronix.de
Cc: x86@kernel.org,
	hpa@zytor.com,
	boris.ostrovsky@oracle.com,
	sstabellini@kernel.org,
	xen-devel@lists.xenproject.org,
	trivial@kernel.org,
	jianchunfu <jianchunfu@cmss.chinamobile.com>
Subject: [PATCH] arch:x86:xen: Remove unnecessary assignment in xen_apic_read()
Date: Mon, 14 Mar 2022 15:05:14 +0800
Message-Id: <20220314070514.2602-1-jianchunfu@cmss.chinamobile.com>
X-Mailer: git-send-email 2.18.4

In the function xen_apic_read(), the initialized value of 'ret' is unused
because it will be assigned by the function HYPERVISOR_platform_op(),
thus remove it.

Signed-off-by: jianchunfu <jianchunfu@cmss.chinamobile.com>
---
 arch/x86/xen/apic.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/arch/x86/xen/apic.c b/arch/x86/xen/apic.c
index 0d46cc283..62d34b661 100644
--- a/arch/x86/xen/apic.c
+++ b/arch/x86/xen/apic.c
@@ -51,7 +51,7 @@ static u32 xen_apic_read(u32 reg)
 		.interface_version = XENPF_INTERFACE_VERSION,
 		.u.pcpu_info.xen_cpuid = 0,
 	};
-	int ret = 0;
+	int ret;
 
 	/* Shouldn't need this as APIC is turned off for PV, and we only
 	 * get called on the bootup processor. But just in case. */
-- 
2.18.4





From xen-devel-bounces@lists.xenproject.org Mon Mar 14 07:22:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 07:22:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289926.491633 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTf1n-0002w0-H3; Mon, 14 Mar 2022 07:22:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289926.491633; Mon, 14 Mar 2022 07:22:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTf1n-0002vt-Dz; Mon, 14 Mar 2022 07:22:03 +0000
Received: by outflank-mailman (input) for mailman id 289926;
 Mon, 14 Mar 2022 07:22:01 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=NoMf=TZ=intel.com=kevin.tian@srs-se1.protection.inumbo.net>)
 id 1nTf1l-0002vn-7v
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 07:22:01 +0000
Received: from mga05.intel.com (mga05.intel.com [192.55.52.43])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6dc2f331-a367-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 08:21:57 +0100 (CET)
Received: from fmsmga006.fm.intel.com ([10.253.24.20])
 by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 14 Mar 2022 00:21:55 -0700
Received: from fmsmsx601.amr.corp.intel.com ([10.18.126.81])
 by fmsmga006.fm.intel.com with ESMTP; 14 Mar 2022 00:21:55 -0700
Received: from fmsmsx609.amr.corp.intel.com (10.18.126.89) by
 fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21; Mon, 14 Mar 2022 00:21:55 -0700
Received: from fmsmsx604.amr.corp.intel.com (10.18.126.84) by
 fmsmsx609.amr.corp.intel.com (10.18.126.89) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21; Mon, 14 Mar 2022 00:21:54 -0700
Received: from FMSEDG603.ED.cps.intel.com (10.1.192.133) by
 fmsmsx604.amr.corp.intel.com (10.18.126.84) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21 via Frontend Transport; Mon, 14 Mar 2022 00:21:54 -0700
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (104.47.59.176)
 by edgegateway.intel.com (192.55.55.68) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.1.2308.21; Mon, 14 Mar 2022 00:21:54 -0700
Received: from BN9PR11MB5276.namprd11.prod.outlook.com (2603:10b6:408:135::18)
 by BL1PR11MB5287.namprd11.prod.outlook.com (2603:10b6:208:31b::7)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.25; Mon, 14 Mar
 2022 07:21:51 +0000
Received: from BN9PR11MB5276.namprd11.prod.outlook.com
 ([fe80::c8aa:b5b2:dc34:e893]) by BN9PR11MB5276.namprd11.prod.outlook.com
 ([fe80::c8aa:b5b2:dc34:e893%8]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 07:21:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6dc2f331-a367-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;
  t=1647242517; x=1678778517;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-transfer-encoding:mime-version;
  bh=QCoRZakBNp6atUb69Adv0fUItxLm34NJw4N0ncZ6p1E=;
  b=f8l9TllJqT4IoYjM1KGmjLBR41bZrS+5zS4cR9mm9wVQ8OFamp0FbRMc
   cZed2ZNomGj/poQ6XKxbxq+flSWvCoznrzj2K9RasboTt3WRLgDMPUkZY
   Scneufm/g58eaVZY+3fMFZ1wstT2hcIH9dhhDUVG+Y2+BMzBhJb3zEwZW
   kzhk6toRYv1X0YG/9XcFZSiHawA8D+wLngMDPqK0dfnsIucRM/WSlJoT/
   omoEdFMo6+Se1Aqd0Anxow3zxN0j5hUkDtOG/F7pEukkK0Hb05ixZZNWe
   I8lxyqDw67Y4dDuj7OEXggOvLJ2sZgKbWwJQyeNeve19rDC1z1tm1VGCW
   g==;
X-IronPort-AV: E=McAfee;i="6200,9189,10285"; a="342380662"
X-IronPort-AV: E=Sophos;i="5.90,180,1643702400"; 
   d="scan'208";a="342380662"
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.90,180,1643702400"; 
   d="scan'208";a="782574952"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=MzsY2CD/HLQiaTIB0aNiXgsvzlqzgZCcvL4DqTdzWDL7HYYo2DvWHseI8HIyyyuFAEIwF5fJy2b0sjM02HUwA2cvwVAMZT7w8Nu3kVB9tUT7QTsagEfaQ2rw6rzy+TzIeViWOvc/fV6Ze73G7h4zrD05p2giJctCUalF9t3GYPcbhhIHatakR3eLxHYtI6LnQPO8hbA4dqKch11H4J4JcR3linM24wrcU25NVn/jMR8mZPl7xDXzDC5wGxHubz17sw2lqeWgH6BFMUrx3qA1IfNm0Y3LxFnSAirdskY7+a7nx+Bv0NVqjF9KCB/RjBqPEN6AHIXLjb0warJdZcw6hA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Jbx0T/F9cPynn4YQwqMTpQSADVVy0D40ks1XZzL4JgI=;
 b=GozqqyzfztO1gPlSTwllyt6CFRWimxy6nMJozi/s0z8BqA4n3PIaKao6U3LWd1mD1fqK82bZ4acpTnvNePrRzsxe2R75AVvJoaM/kkA/xWbGS6kXbE1AO0OnHnEprpIPgf2WOIbLPBw0JH3AIVe2uU0t7Q0BA3+h2c8iiSzay6ggjWZ0yq85KyThcd4nK9GKcmjKMILYfsRnVXAvwz4fpswIHsKRx6mxbU3OYb6bRdUD6scl1HahkWQ/dMExlKyVuRSXh/pMLfbZEUCpK9SH+LgcRN8qG0ilmkxF0HX/EMFPJotFWBV4yjzLKTJ+8NistNq2pSPu1fsYSEcdTSdAoA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com;
 dkim=pass header.d=intel.com; arc=none
From: "Tian, Kevin" <kevin.tian@intel.com>
To: "Lengyel, Tamas" <tamas.lengyel@intel.com>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
CC: "Beulich, Jan" <JBeulich@suse.com>, "Cooper, Andrew"
	<andrew.cooper3@citrix.com>, =?iso-8859-1?Q?Pau_Monn=E9=2C_Roger?=
	<roger.pau@citrix.com>, Wei Liu <wl@xen.org>, "Nakajima, Jun"
	<jun.nakajima@intel.com>
Subject: RE: [PATCH] x86/hvm: Include interruptibility state in hvm_hw_cpu
Thread-Topic: [PATCH] x86/hvm: Include interruptibility state in hvm_hw_cpu
Thread-Index: AQHYNK72F/eE81SIoUqvccI09xMIhKy+fRzg
Date: Mon, 14 Mar 2022 07:21:51 +0000
Message-ID: <BN9PR11MB5276E96E39209EDCCED5E9198C0F9@BN9PR11MB5276.namprd11.prod.outlook.com>
References: <05d0a5b5c18d667a5527e6f834347f54a10309da.1646937728.git.tamas.lengyel@intel.com>
In-Reply-To: <05d0a5b5c18d667a5527e6f834347f54a10309da.1646937728.git.tamas.lengyel@intel.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=intel.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 0473a384-871d-4427-63a4-08da058b4f28
x-ms-traffictypediagnostic: BL1PR11MB5287:EE_
x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr
x-microsoft-antispam-prvs: <BL1PR11MB528749CCD498362D6040F9928C0F9@BL1PR11MB5287.namprd11.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BN9PR11MB5276.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(5660300002)(55016003)(9686003)(33656002)(107886003)(2906002)(83380400001)(122000001)(66446008)(71200400001)(8936002)(38070700005)(66476007)(4326008)(64756008)(82960400001)(66556008)(26005)(76116006)(186003)(8676002)(66946007)(52536014)(38100700002)(86362001)(6506007)(7696005)(316002)(54906003)(110136005)(508600001);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?hMjpJ0gVX/0EcJv+SQ4Q2WyaRrMTYlxYnTEWyK7WzQsY+X4Y6z+JgQhbH2?=
 =?iso-8859-1?Q?cp0XVNUzhSsFOF96nLbigKPC6hkTnJb07wrRTpFoHXJjpGBvyc0Myi07/S?=
 =?iso-8859-1?Q?yVruJb1tdwn/VLLaVryNgB+Xz9Lcus9npWflYe9TO8m36oTwzReKKXDbIr?=
 =?iso-8859-1?Q?+f2rSsEMWVE7JqMyVxDM4F3RFtOtgLJI1gbE1Ql9dH0Hkqws+d5Fwcaaq9?=
 =?iso-8859-1?Q?g1it51vslqwAh1l7SZzB9QFbCurH/OkrGYwZ0iM83USxCBe7yPcc2BexzJ?=
 =?iso-8859-1?Q?UfNa9IH5jtWb2HsoAoZ1gaNV1dCr7mhN+JCQsSuFekTZVtBGTnIRU4OxUq?=
 =?iso-8859-1?Q?8nTiWm8bow/vGbVwdD+tO1RudP93OVZFzn7M1+5WzIFQ6TOVBG0gTPVQ9p?=
 =?iso-8859-1?Q?h8tlKJWf6N7WUp5aqidPsnuZaAq8PtuvehIMfBmiAYoqf4ezgRPs5qBLpi?=
 =?iso-8859-1?Q?Lp72j3RYx3Ij4KXKWnjhfLCGBZYXp7zWGXB0WGV8ptAfTTcPRaG8EI53kB?=
 =?iso-8859-1?Q?Ih68cK8x0ssOyXsZrCUXW9wVX+xH/+MKmY6TViUL2dZVCGEcA11WD9dE5X?=
 =?iso-8859-1?Q?o6j/FlmTA+8SgXZXsWG+JAxALaNnm7DU8UigZpctm+ncnXGgEOBdHG1mcK?=
 =?iso-8859-1?Q?69tJGEvFgodHMP/vrGKijb42XDGX8IkffnUhQcq5PInJZMHHbBS1tamWTD?=
 =?iso-8859-1?Q?cnMxmR+PIuTAUyj+Q+8TIVRp2R7hpnHahVKROkyOFy0Aqw12otIUkIDB0D?=
 =?iso-8859-1?Q?/P0Q8WujhIIurqpCJAGhjLiELLDbCgTTyQHdZPjpfhZuNDANCrD5huYzUV?=
 =?iso-8859-1?Q?XWBh+Oo0K45GHrjFFpS72/rW7SGBK61mKg8331+GvVlgnM8uhwDKS7NiAM?=
 =?iso-8859-1?Q?zjXX69fLZKtBQN/ED1iBEYrjYDaxUiKOYzxX5sxkjv7+5p5I1fzA6eMkqx?=
 =?iso-8859-1?Q?SRO+2hVDxrbJhewVLxsxMLKhk6AwAvvjebHdaM0oU7y16iLlwRl68CQpJc?=
 =?iso-8859-1?Q?DudQASu9ZivVGyVK0GU7sMbHmywI3ozcNJ9jojfnEgMr3kwKjDt7YsvYGD?=
 =?iso-8859-1?Q?6B4GOjpSWUzDwbPb00DX1jnIrE8AQMBRWrtG6PFfa8KGqyIk+hISxzMtEO?=
 =?iso-8859-1?Q?VwGuOw50pwLTXutXFtKxq6kHO7KAr9QCPa4ap9/brGkLBT6fGa+cd1ycLk?=
 =?iso-8859-1?Q?nXMo1OjLKcVjgtH8N6TNFsyGvQ7iaGT5LeIRDAhEiYhMU/DwR6hfX1r4Yo?=
 =?iso-8859-1?Q?h7k95BZexz6wZaAhlvG42EMH1cwNE+CQJmdyeDI1szDraWQ/3OwXFukYc5?=
 =?iso-8859-1?Q?W104qnGSjPsFM5P+QicqfpP4rp9RrIHVGav9k+YI0SajovPvy+hqRI9QAq?=
 =?iso-8859-1?Q?Brwxnv3tqDR2cL/P/rnFxi6epElrB9BWO3OH8JJcYV9feQPxJSmIzTPyiI?=
 =?iso-8859-1?Q?/sRuUi+Hai7fT5egVOzMGOb5/VsEtV1zBBXvE7KKVdOG+iD5K16XFs094r?=
 =?iso-8859-1?Q?HJ9pJdjs9UF0Fds+HHqmwO?=
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN9PR11MB5276.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0473a384-871d-4427-63a4-08da058b4f28
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Mar 2022 07:21:51.1268
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: aZc49Vgbn71e7hz4ZDS6XZNazzqKF/5hRE+lzuAZKS9u4OAkTdK0mZvYtRXbHvIzr6rIJ4vcf1L/lgGhtLmYyA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL1PR11MB5287
X-OriginatorOrg: intel.com

> From: Lengyel, Tamas <tamas.lengyel@intel.com>
> Sent: Friday, March 11, 2022 2:45 AM
>=20
> During VM fork resetting a failed vmentry has been observed when the rese=
t
> is performed immediately after a STI instruction executed. This is due to
> the guest interruptibility state in the VMCS being modified by STI but th=
e
> subsequent reset removes the IF bit from FLAGS, causing the failed vmentr=
y.

I didn't get the rationale here. Before this patch the interruptibility sta=
te is=20
not saved/restored thus I suppose after reset it will be cleared thus align=
ed
with RFLAGS.IF=3D0. Can you elaborate a bit how exactly above problem is
caused?

>=20
> Include the interruptibility state information in the public hvm_hw_cpu s=
truct
> so that the CPU can be safely saved/restored.
>=20
> Signed-off-by: Tamas K Lengyel <tamas.lengyel@intel.com>
> ---
>  xen/arch/x86/hvm/hvm.c                 |  9 +++++----
>  xen/arch/x86/hvm/vmx/vmx.c             |  4 ++++
>  xen/arch/x86/include/asm/hvm/hvm.h     | 26

Why is this change only applied to vmx instead of svm?

> ++++++++++++++++++++++++++
>  xen/include/public/arch-x86/hvm/save.h |  3 ++-
>  4 files changed, 37 insertions(+), 5 deletions(-)
>=20
> diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
> index 709a4191ef..b239c72215 100644
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -897,6 +897,8 @@ static int cf_check hvm_save_cpu_ctxt(struct vcpu *v,
> hvm_domain_context_t *h)
>          ctxt.flags =3D XEN_X86_FPU_INITIALISED;
>      }
>=20
> +    ctxt.interruptibility_info =3D hvm_get_interrupt_shadow(v);
> +
>      return hvm_save_entry(CPU, v->vcpu_id, h, &ctxt);
>  }
>=20
> @@ -990,9 +992,6 @@ static int cf_check hvm_load_cpu_ctxt(struct domain
> *d, hvm_domain_context_t *h)
>      if ( hvm_load_entry_zeroextend(CPU, h, &ctxt) !=3D 0 )
>          return -EINVAL;
>=20
> -    if ( ctxt.pad0 !=3D 0 )
> -        return -EINVAL;
> -
>      /* Sanity check some control registers. */
>      if ( (ctxt.cr0 & HVM_CR0_GUEST_RESERVED_BITS) ||
>           !(ctxt.cr0 & X86_CR0_ET) ||
> @@ -1155,6 +1154,8 @@ static int cf_check hvm_load_cpu_ctxt(struct
> domain *d, hvm_domain_context_t *h)
>      v->arch.dr6   =3D ctxt.dr6;
>      v->arch.dr7   =3D ctxt.dr7;
>=20
> +    hvm_set_interrupt_shadow(v, ctxt.interruptibility_info);
> +
>      hvmemul_cancel(v);
>=20
>      /* Auxiliary processors should be woken immediately. */
> @@ -3888,7 +3889,7 @@ enum hvm_intblk hvm_interrupt_blocked(struct
> vcpu *v, struct hvm_intack intack)
>           !(guest_cpu_user_regs()->eflags & X86_EFLAGS_IF) )
>          return hvm_intblk_rflags_ie;
>=20
> -    intr_shadow =3D alternative_call(hvm_funcs.get_interrupt_shadow, v);
> +    intr_shadow =3D hvm_get_interrupt_shadow(v);
>=20
>      if ( intr_shadow &
> (HVM_INTR_SHADOW_STI|HVM_INTR_SHADOW_MOV_SS) )
>          return hvm_intblk_shadow;
> diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
> index c075370f64..e13817431a 100644
> --- a/xen/arch/x86/hvm/vmx/vmx.c
> +++ b/xen/arch/x86/hvm/vmx/vmx.c
> @@ -1323,7 +1323,9 @@ static unsigned int cf_check
> vmx_get_interrupt_shadow(struct vcpu *v)
>  {
>      unsigned long intr_shadow;
>=20
> +    vmx_vmcs_enter(v);
>      __vmread(GUEST_INTERRUPTIBILITY_INFO, &intr_shadow);
> +    vmx_vmcs_exit(v);
>=20
>      return intr_shadow;
>  }
> @@ -1331,7 +1333,9 @@ static unsigned int cf_check
> vmx_get_interrupt_shadow(struct vcpu *v)
>  static void cf_check vmx_set_interrupt_shadow(
>      struct vcpu *v, unsigned int intr_shadow)
>  {
> +    vmx_vmcs_enter(v);
>      __vmwrite(GUEST_INTERRUPTIBILITY_INFO, intr_shadow);
> +    vmx_vmcs_exit(v);
>  }
>=20
>  static void vmx_load_pdptrs(struct vcpu *v)
> diff --git a/xen/arch/x86/include/asm/hvm/hvm.h
> b/xen/arch/x86/include/asm/hvm/hvm.h
> index 5b7ec0cf69..2fb7865a05 100644
> --- a/xen/arch/x86/include/asm/hvm/hvm.h
> +++ b/xen/arch/x86/include/asm/hvm/hvm.h
> @@ -720,6 +720,22 @@ static inline int hvm_vmtrace_reset(struct vcpu *v)
>      return -EOPNOTSUPP;
>  }
>=20
> +static inline unsigned long hvm_get_interrupt_shadow(struct vcpu *v)
> +{
> +    if ( hvm_funcs.get_interrupt_shadow )
> +        return alternative_call(hvm_funcs.get_interrupt_shadow, v);
> +
> +    return -EOPNOTSUPP;
> +}
> +
> +static inline void
> +hvm_set_interrupt_shadow(struct vcpu *v, unsigned long val)
> +{
> +    if ( hvm_funcs.set_interrupt_shadow )
> +        alternative_vcall(hvm_funcs.set_interrupt_shadow, v, val);
> +}
> +
> +
>  /*
>   * Accessors for registers which have per-guest-type or per-vendor locat=
ions
>   * (e.g. VMCS, msr load/save lists, VMCB, VMLOAD lazy, etc).
> @@ -863,6 +879,16 @@ static inline void hvm_set_reg(struct vcpu *v,
> unsigned int reg, uint64_t val)
>      ASSERT_UNREACHABLE();
>  }
>=20
> +static inline unsigned long hvm_get_interrupt_shadow(struct vcpu *v)
> +{
> +    ASSERT_UNREACHABLE();
> +    return 0;
> +}
> +static inline void hvm_set_interrupt_shadow(struct vcpu *v, unsigned lon=
g
> val)
> +{
> +    ASSERT_UNREACHABLE();
> +}
> +
>  #define is_viridian_domain(d) ((void)(d), false)
>  #define is_viridian_vcpu(v) ((void)(v), false)
>  #define has_viridian_time_ref_count(d) ((void)(d), false)
> diff --git a/xen/include/public/arch-x86/hvm/save.h
> b/xen/include/public/arch-x86/hvm/save.h
> index 773a380bc2..e944b1756a 100644
> --- a/xen/include/public/arch-x86/hvm/save.h
> +++ b/xen/include/public/arch-x86/hvm/save.h
> @@ -165,7 +165,8 @@ struct hvm_hw_cpu {
>  #define _XEN_X86_FPU_INITIALISED        0
>  #define XEN_X86_FPU_INITIALISED         (1U<<_XEN_X86_FPU_INITIALISED)
>      uint32_t flags;
> -    uint32_t pad0;
> +
> +    uint32_t interruptibility_info;
>  };
>=20
>  struct hvm_hw_cpu_compat {
> --
> 2.25.1



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 07:27:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 07:27:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289931.491645 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTf6Z-0003he-6l; Mon, 14 Mar 2022 07:26:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289931.491645; Mon, 14 Mar 2022 07:26:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTf6Z-0003hX-3m; Mon, 14 Mar 2022 07:26:59 +0000
Received: by outflank-mailman (input) for mailman id 289931;
 Mon, 14 Mar 2022 07:26:57 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=29fN=TZ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nTf6X-0003hP-3A
 for xen-devel@lists.xen.org; Mon, 14 Mar 2022 07:26:57 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2021cc6f-a368-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 08:26:55 +0100 (CET)
Received: from EUR01-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur01lp2057.outbound.protection.outlook.com [104.47.1.57]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-5-O68Q47QFMKOV75QchKGNFQ-1; Mon, 14 Mar 2022 08:26:53 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by HE1PR0402MB3627.eurprd04.prod.outlook.com (2603:10a6:7:84::25)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26; Mon, 14 Mar
 2022 07:26:51 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 07:26:50 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2021cc6f-a368-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647242815;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=0n9mSjleTTMOFrCey1eo0rX4dS8KiDyB9jcU/KFeHLg=;
	b=jld6A+jk3US38LQ9Ah79jCjIpDNqGfRhFMQ/tfHfI39A/TYJDEC56RgRHmo/g0O3th29AF
	NoZdsrfCoexE5iG3lw+ufHLWEQ+wjzli64hhsdV5jp9G47rVEM+tCzgfs/eVlnRm6/Iw8l
	gEWdc/y9J5uAGQP6+M6gTmGKQh7JoQ8=
X-MC-Unique: O68Q47QFMKOV75QchKGNFQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=mMi+vZmKesBHNp+2WM4qdJVBh4gp6yovoz5uDZHi2ZN7KYWwQrRfSBkdQeX2PwZ6fdKUfoNlTn+jTsxdvCCCT0S510b8bsa7IP+tQJA4/DuBjBWd1XnTSBYW1j5++YTNjfQXxMX2+8jyc8Vgl26RiO7rEi+ht/TQLJuEp8lAko/6nb7vHHY2j9oHs4F/KhVQBMAabGwDMuYLF8fiYs/ROJXP+svt+HfStcuVjyOhKEumXaTNItoO8ODGSe3CbqNLOoIDU4lp/1kalJPOfbhDtXPc5jlEuWg2wWZjWIOF5W99aCJWm7qA055KNRk1KBzNHSMFkbyYOkpM+dNKMmUh9w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=0n9mSjleTTMOFrCey1eo0rX4dS8KiDyB9jcU/KFeHLg=;
 b=QP0GEDjWyzEW0klFj4iLKoN8ra2CIdpMEzECES0U9/1lmvDIf1WqaLTHbOfFRL/nyx68wiZww5cp4TALVeeBc4lacJG2FGIs7CSaV2GC27b6uOFv3T5RWeI4m8xgKo+tj0f03IGxDrzOIMyw5FkrC5crBcgy8aMf3+PqX4aQmREezG3fdiIzHwAGI0G4OL4haEGlPHSniZBVSpgUCrEI36s9jm4mK+vTCTjI8csy2EeM0PYFi8SzVHGUmHIIIVj/CiGp+lZJ8CEFUSeDYM6g2cLdu+emtCaoUdu8r1XR6I+5pbOhVFTDlsCDlqfAWgqeyljv+pSTLqCQrHJdKHToJg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <d3f31e6a-706e-cc24-1d9d-d78ace0cc705@suse.com>
Date: Mon, 14 Mar 2022 08:26:50 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: BUG: libxenlight fails to grant permission to access Intel IGD
 Opregion
Content-Language: en-US
To: Chuck Zmudzinski <brchuckz@netscape.net>
Cc: xen-devel@lists.xen.org
References: <4703b7f1-8d3c-5128-213c-e39f487e4cde.ref@netscape.net>
 <4703b7f1-8d3c-5128-213c-e39f487e4cde@netscape.net>
 <2e74415a-d0d4-321b-be2e-a14db297c51a@suse.com>
 <ed955608-9c62-3dc8-fbcc-df5b4d3c5e46@netscape.net>
 <e0a49022-097b-b9ae-eff9-eb2111e7acb9@netscape.net>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <e0a49022-097b-b9ae-eff9-eb2111e7acb9@netscape.net>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR06CA0270.eurprd06.prod.outlook.com
 (2603:10a6:20b:45f::31) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 203ab75f-d526-44f5-70f3-08da058c015b
X-MS-TrafficTypeDiagnostic: HE1PR0402MB3627:EE_
X-Microsoft-Antispam-PRVS:
	<HE1PR0402MB36277572F842226A60F4476EB30F9@HE1PR0402MB3627.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	z2oFWGlBWsUL4p6OPGuuC/1I8IjKbOAEWO7yAr8tJGiom8wxQKO8nPyXkPC7jp36OJMg2Uq9VzKsymNV+Lq71Lhlli5pDXUrLQ4gtXWMJgRMelrNmoi1UId15Gr9WIPpPsc+NIJ8Guefu0T0DzKe1lOZ1o5b8jiK4A/GlhHdat3AGrw//DbIFHDd+HLS58MsW6r0Hutyd9sgoYbn9IumDzgyG9DwNxdlzTUeD9OimBDmR9QVkcwfgHBEkfl9xKNm9RhNdptAJoW1cBNeyJItVMcEWq50ygVQ8FItKeT1tlzmKSe0velQY7L5QIUh/jSZ4o9Ytg9FZVufDqnTZ00mMmgq7NxcgQhG1MvT4F/pY4vk3gnKJt7lDDNGVGd/v+D7ChJbG6CG9XOM3wxdl435g+A2IN24cSCXaj0PXAJYM+2kJO3fdrR65DIMfsk5tSFVkkoH8m8UWrZtNnwyp82XoJWiDCd17xTkrCO6qFwV+0PoCHzh/lm14tr/S+ASneKj3h5uPVDrG5eTpC0yTnoEWkv9rx9yPktRICwFk15v5yTW1pH5kOzf8cT5eDGHR5p03R6GB0e3nZ2rQD1sSN085Tr3+FZPXAwSpFER7ob/6dT0SKFzYyAtQh2iDCFsuy4ZRPx8NwCdynHn3eb6vAbwQlvLyuT4P2XtV4rTOp4OlcpJPHi4brLGuKaHrtr8+M+jhhTtlRp8wyRSsbhzZEW8gTs1wX9g06Uw3N7H1oDwBDs=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2616005)(36756003)(5660300002)(6506007)(53546011)(2906002)(6486002)(86362001)(8936002)(186003)(31686004)(26005)(31696002)(6512007)(66946007)(66556008)(66476007)(8676002)(4326008)(558084003)(38100700002)(316002)(508600001)(6916009)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?WUJ1TmZmVjhJM2RVUjQ5NUZCUHpyQ0tQRUlSdEpOKzVmUFFvWlBNYk5KSEVm?=
 =?utf-8?B?VUo1bW41OTJjam1Na3RVMS9yWGZSa21QOUd3RXRvbEZFaEtQNzhENTdqaUgv?=
 =?utf-8?B?RGpNTXQ0VjU1bWJUUnFuVFhsZGZVTE83RmNxWEVUWXN0U011aG45SEtiNWxM?=
 =?utf-8?B?bk40VUk3akhjdmRUZUJicFR2VTE1emFuVjllRS9EbmJ1WlNvNHBlU2J0R2dC?=
 =?utf-8?B?dktkNllzL3Z1NmF0NmJvM2ZqNUZSVHlpWDk2L0pFSWt2aENZSVZUZkFWR0xE?=
 =?utf-8?B?MjJZdXpna3BHTTVSN2Q3YTNLSUI0VTlNRjBOMS94VGhZU1FJY1RwWlIyUlEw?=
 =?utf-8?B?SS9kaG43eHNTNWNld3BjTkNxYmR5U2ZpN1YvSmZwNTR3R1JHUkFsWk9kSXlY?=
 =?utf-8?B?WnhobUlnd2JzSTdaT0FDUnI3eXVTdXNZNHJDMVdwbzR1a2F2UktrOVpXYXRy?=
 =?utf-8?B?T25idjN6ZVgvY1dEQnZqTWRjVUtPaEZLNnBZOWRyYlhYSC93TmlnVm1ZMThx?=
 =?utf-8?B?Z2I2bFJheW40VXJnWVFUOS95RXVPUGxYNGcrQjBhWUJUbkFoQUpLTkRteVN4?=
 =?utf-8?B?TVdNR2xia3JkSEJRWlhmQyt4YmxEbGhUVzZWd0VQTkc1OHg4aWZlWnYxVHk3?=
 =?utf-8?B?RkZmOE1sU0ZlRjdXeW5qaE9qYmtwdHM3VEtBV3NBeFZLNXR1OEFhRjZpZmVD?=
 =?utf-8?B?MGF6dTlhc1UwSXFSVU1Wd2dWUDdmbjJCWXZIbHRZU3lFbVM2dWxSdXJBZ2xp?=
 =?utf-8?B?RU51RGlKU0s1QnNHMmlXTW1ycnBKNzN4Q3BoaUkwV1BSMFd6Q0ZVbkI1VWM5?=
 =?utf-8?B?Q0UzQUUxOXlIeG96TEo1ZjM3UU5ZeWNnMDA3enBiV2YxTHlqNWZSRWdlQ0R3?=
 =?utf-8?B?T09SVndJQXEyR2xGdEtoYzh5Q01GNGNBMjlrOG9PZnVIdUxnQVNZM1ArY2NO?=
 =?utf-8?B?TkhuNVUxMzRkMFhTdE1uRmc1UVFCcjVSNnpiM0Y5MlpkNkpMUG5UUzlDZzdE?=
 =?utf-8?B?R0t3czNLY2Zmd1crNitqSm5aOEhnWXZhd2NIaSs4QVZvUkVFeFZxNTVVODVP?=
 =?utf-8?B?RjkydzJPQ3RDNlFTV0ZZWGJBT0g2czVJTEEyb3hucElET0lNZ1RNbGpwMUNS?=
 =?utf-8?B?ajBkNUczYUFGQ2lWRWh0c1g3OWM0VUxGdVZocUdGMWlrelFyN25Pd3p6ajdE?=
 =?utf-8?B?NVFWU1BxWDlFM1pWQWpmMXJ4emN4RXpDNlRkRGd2MitPUTRLR0hrVXBtSHNj?=
 =?utf-8?B?RTdteGRTYlFIQ0NSMjlPR2diV0JHa1haNFg4S0NGd0N1VW1OV2xOcHFEMk5X?=
 =?utf-8?B?K2wwNnB0QUluZEZvR3JKRUVWWG5wYVIwWGtFakZydlJMK3lMVnRiQVR2TUIv?=
 =?utf-8?B?RkFhNjMvMFVsdGZhdkhOOGtCRG9rSHVsQkFGNXVSVVh0dmlBeVRqSjZxVnNO?=
 =?utf-8?B?M2VZY3hEZU1yS25GRVFxbXNXdFZaaXI4d0NQcUhzNEU4WnhLT2gyWUh4NkI4?=
 =?utf-8?B?QUR4NTM5bzZiMnIyTVZsM0xlK3l2eGRaR0Rrbm1FNjEweHB0V0J3cmJpVkt2?=
 =?utf-8?B?dFNoY045bzVXRW9KVE5TenNqOThjck02MmFtaDdmMWRvaTE2NmdmaVJjWUds?=
 =?utf-8?B?bDVRQlJzY0dtQS9MMHZBRVBtTTNsRE52RHMxVVM3Q2V5QzNHdVY0M25tSWht?=
 =?utf-8?B?ZGlRZjBPSSt6TEVQTXlGMXIxRC9oWkFuVUdhdnZucG5MNFBhOE8zQk00bTlJ?=
 =?utf-8?B?Rm00NVZCQjBKcjVFUm1iSDlLYTh2Mm5lcjdPNGFQTHRsdnB3QTF4N2laRUgv?=
 =?utf-8?B?bk1kamRNYlpsM3BwVDRZNmxCSmlXTE5JYWhIZnFlRzR0UHVrTzZlVDFaNHla?=
 =?utf-8?B?bldManRsZ1VHcGdsN01MRm1IcCt4TEJzTXp4TFd2NmFZdVZ2Z2FzUjVKU1pG?=
 =?utf-8?Q?LKe0CRk3ea6psD4vSebtRssl4sBL5HQV?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 203ab75f-d526-44f5-70f3-08da058c015b
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 07:26:50.5020
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Yn0tRveS2YL2nJavyRu0ApZiO9wEnBYksMXcGhLTZ8LCEi7SzVUuluu/D5qGskQ1vej4nNwYrZfKZiIxd8DEpw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0402MB3627

On 11.03.2022 21:35, Chuck Zmudzinski wrote:
> So my only question is:
> 
> Is it proper to include header files from tools/firmware/hvmloader in
> tools/libs/light/libxl_pci.c ?

No, it certainly is not.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 07:31:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 07:31:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289937.491666 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfBM-0005MY-2R; Mon, 14 Mar 2022 07:31:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289937.491666; Mon, 14 Mar 2022 07:31:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfBL-0005MP-V5; Mon, 14 Mar 2022 07:31:55 +0000
Received: by outflank-mailman (input) for mailman id 289937;
 Mon, 14 Mar 2022 07:31:54 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=BEku=TZ=bombadil.srs.infradead.org=BATV+605a0c0c3369109790a8+6777+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nTfBK-00056d-Ej
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 07:31:54 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id cf0dc345-a368-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 08:31:49 +0100 (CET)
Received: from [46.140.54.162] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nTfB1-0044SD-2u; Mon, 14 Mar 2022 07:31:35 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cf0dc345-a368-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=fpYq2gch6ejmPkcFKPjSyDr7OAs4OQSLe0uyAoUEPa0=; b=1SiDt8zubg5I0ueT636uOGUNeo
	nzdNRiaQCUVWgjMPxZ1+oQTQbyiLg/w4TFouHm2BYLknLSuxCv/ojkO1Z5PpI5wlZ3h0uqPrutEh8
	OuZPV6b5cmTW9qNKKLWRTUH4LF4VetuO/2a0xOe6Q/Fz+TG4amB4EVcoitlw06DP9dGsILqimGObs
	ExsRJz/Gu+rY3tdP9ldFzM98I4FPsnUIBEiN1tfsgCwAluNTubp3//rXJ6sYUpzqebfF0FJRHE1lC
	bxauBfwlUuLRbxzO+E/W4SduALdUw9Kb+9eT67a6+f/Dsi9acNlJyA8zzX7BXeY9ZUCUeg4ftUTle
	5C25WlEg==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: [PATCH 01/15] dma-direct: use is_swiotlb_active in dma_direct_map_page
Date: Mon, 14 Mar 2022 08:31:15 +0100
Message-Id: <20220314073129.1862284-2-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220314073129.1862284-1-hch@lst.de>
References: <20220314073129.1862284-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

Use the more specific is_swiotlb_active check instead of checking the
global swiotlb_force variable.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Reviewed-by: Anshuman Khandual <anshuman.khandual@arm.com>
---
 kernel/dma/direct.h | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/kernel/dma/direct.h b/kernel/dma/direct.h
index 4632b0f4f72eb..4dc16e08c7e1a 100644
--- a/kernel/dma/direct.h
+++ b/kernel/dma/direct.h
@@ -91,7 +91,7 @@ static inline dma_addr_t dma_direct_map_page(struct device *dev,
 		return swiotlb_map(dev, phys, size, dir, attrs);
 
 	if (unlikely(!dma_capable(dev, dma_addr, size, true))) {
-		if (swiotlb_force != SWIOTLB_NO_FORCE)
+		if (is_swiotlb_active(dev))
 			return swiotlb_map(dev, phys, size, dir, attrs);
 
 		dev_WARN_ONCE(dev, 1,
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 07:31:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 07:31:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289938.491671 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfBM-0005Pl-Ah; Mon, 14 Mar 2022 07:31:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289938.491671; Mon, 14 Mar 2022 07:31:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfBM-0005P2-7O; Mon, 14 Mar 2022 07:31:56 +0000
Received: by outflank-mailman (input) for mailman id 289938;
 Mon, 14 Mar 2022 07:31:54 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=BEku=TZ=bombadil.srs.infradead.org=BATV+605a0c0c3369109790a8+6777+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nTfBK-00056d-Tf
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 07:31:54 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id cdd6656d-a368-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 08:31:49 +0100 (CET)
Received: from [46.140.54.162] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nTfAx-0044RD-TW; Mon, 14 Mar 2022 07:31:32 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cdd6656d-a368-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:Message-Id:Date:Subject:Cc:To:From:Sender:Reply-To:Content-Type:
	Content-ID:Content-Description:In-Reply-To:References;
	bh=HhGavQ6qvlf8H5F/ZlRZDjP5Hg4YmQaPJkbgnrtpMJI=; b=x1HmPcRq+EIQAGkkRG5r3Q2ccQ
	wnlPc6HT3VpJAMMRF1p4SFikzmXOQYomeT6ykxwmWCxoebP1bN2ceE+8XNvoM8N5VllZnT75DHXGC
	h4wekLHOCpTAFXijUS4GI7cBuhiIwxysA4rgf8RJTlGS2pKLIVQjT1AeGrirHMuQmzJkixPdmUiaw
	cmRW8o6cqr3klWE3JQHi+2CDOTmN7yN+qKBICbgnWeDRcK/2hY0uiepsrGceY5FvPtk+56Vn9gD0m
	a70FwFmi8fEZWw8s5/U6tP9pIaV7UquRjOae803zd4ky95pR5AVFQCHxkh5K/hYSfr0VZAdOqR1aQ
	rxPZmEfQ==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: cleanup swiotlb initialization v5
Date: Mon, 14 Mar 2022 08:31:14 +0100
Message-Id: <20220314073129.1862284-1-hch@lst.de>
X-Mailer: git-send-email 2.30.2
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

Hi all,

this series tries to clean up the swiotlb initialization, including
that of swiotlb-xen.  To get there is also removes the x86 iommu table
infrastructure that massively obsfucates the initialization path.

Git tree:

    git://git.infradead.org/users/hch/misc.git swiotlb-init-cleanup

Gitweb:

    http://git.infradead.org/users/hch/misc.git/shortlog/refs/heads/swiotlb-init-cleanup

Changes since v5:
 - split a patch into three
 - fix setting x86_swiotlb_enable for Xen
 - fix a comment about forced bounce buffering for guest memory
   encryption
 - remove the xen_initial_domain check from
   xen_create_contiguous_region

Changes since v3:
 - fix a compilation issue on some powerpc configfs
 - fix and cleanup how forced bounce buffering is enabled for
   guest memory encryption

Changes since v2:
 - make ppc_swiotlb_flags actually work again
 - also force enable swiotlb for guest encrypted memory to cater
   to hyperv which doesn't set the host encrypted memory flag

Changes since v1:
 - skip IOMMU initialization on Xen PV kernels
 - various small whitespace / typo fixes

Diffstat:
 arch/ia64/include/asm/iommu_table.h      |    7 -
 arch/x86/include/asm/iommu_table.h       |  102 ------------------
 arch/x86/include/asm/swiotlb.h           |   30 -----
 arch/x86/kernel/pci-iommu_table.c        |   77 -------------
 arch/x86/kernel/pci-swiotlb.c            |   77 -------------
 arch/x86/xen/pci-swiotlb-xen.c           |   96 -----------------
 b/arch/arm/mm/init.c                     |    6 -
 b/arch/arm/xen/mm.c                      |   26 ++--
 b/arch/arm64/mm/init.c                   |    6 -
 b/arch/ia64/mm/init.c                    |    4 
 b/arch/mips/cavium-octeon/dma-octeon.c   |   15 --
 b/arch/mips/loongson64/dma.c             |    2 
 b/arch/mips/pci/pci-octeon.c             |    2 
 b/arch/mips/sibyte/common/dma.c          |    2 
 b/arch/powerpc/include/asm/svm.h         |    4 
 b/arch/powerpc/include/asm/swiotlb.h     |    1 
 b/arch/powerpc/kernel/dma-swiotlb.c      |    1 
 b/arch/powerpc/mm/mem.c                  |    6 -
 b/arch/powerpc/platforms/pseries/setup.c |    3 
 b/arch/powerpc/platforms/pseries/svm.c   |   26 ----
 b/arch/riscv/mm/init.c                   |    8 -
 b/arch/s390/mm/init.c                    |    3 
 b/arch/x86/include/asm/dma-mapping.h     |   12 --
 b/arch/x86/include/asm/gart.h            |    5 
 b/arch/x86/include/asm/iommu.h           |    8 +
 b/arch/x86/include/asm/xen/page.h        |    5 
 b/arch/x86/include/asm/xen/swiotlb-xen.h |    2 
 b/arch/x86/kernel/Makefile               |    2 
 b/arch/x86/kernel/amd_gart_64.c          |    5 
 b/arch/x86/kernel/aperture_64.c          |   14 --
 b/arch/x86/kernel/cpu/mshyperv.c         |    8 -
 b/arch/x86/kernel/pci-dma.c              |  113 ++++++++++++++++----
 b/arch/x86/kernel/tboot.c                |    1 
 b/arch/x86/kernel/vmlinux.lds.S          |   12 --
 b/arch/x86/mm/mem_encrypt_amd.c          |    3 
 b/arch/x86/pci/sta2x11-fixup.c           |    2 
 b/arch/x86/xen/Makefile                  |    2 
 b/drivers/iommu/amd/init.c               |    6 -
 b/drivers/iommu/amd/iommu.c              |    5 
 b/drivers/iommu/intel/dmar.c             |    6 -
 b/drivers/xen/swiotlb-xen.c              |  132 -----------------------
 b/include/linux/dmar.h                   |    6 -
 b/include/linux/swiotlb.h                |   22 +--
 b/include/trace/events/swiotlb.h         |   29 +----
 b/include/xen/arm/page.h                 |    1 
 b/include/xen/swiotlb-xen.h              |    8 +
 b/kernel/dma/direct.h                    |    2 
 b/kernel/dma/swiotlb.c                   |  175 +++++++++++++++----------------
 48 files changed, 264 insertions(+), 826 deletions(-)


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 07:31:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 07:31:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289936.491655 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfBK-00056x-PJ; Mon, 14 Mar 2022 07:31:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289936.491655; Mon, 14 Mar 2022 07:31:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfBK-00056q-MH; Mon, 14 Mar 2022 07:31:54 +0000
Received: by outflank-mailman (input) for mailman id 289936;
 Mon, 14 Mar 2022 07:31:54 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=BEku=TZ=bombadil.srs.infradead.org=BATV+605a0c0c3369109790a8+6777+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nTfBJ-00056d-53
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 07:31:54 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id cf30f5d3-a368-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 08:31:50 +0100 (CET)
Received: from [46.140.54.162] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nTfB4-0044TV-Ja; Mon, 14 Mar 2022 07:31:39 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cf30f5d3-a368-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=7KIhJt40I1ofu47+zsRTUJkoQ8fUOXBHfwlYnVCC3M8=; b=W+WZjoWPy3YFymvGdgW5PlFiLN
	2oqlLSAIhYam5081YLU/1idoDC+4RE6JSCHC36ZpyAX2RqypK3I1dmx8MCT9usY2EtHAr7dVoXXgU
	ta3E9aQ+CvKo576fFUXY4Js12Sk2bnGPPWnIQ4WEXMdZ1jHX3vWNfFRBg0PeEX9CY8ebeHWNaHoXD
	Ldd6MPElBlKE1uL77ytbpRl/zJ8WlwYmmUjnWfYBgb8pX+tGeT/H2o/rs+/tYOYrp3RlS4F5EEmz/
	9eJYZaX/9N3HVPvuYUruScc8MIxDSXJGJKLArbTW8hiz/DoUu0s0GNqz7Lk4SBui3qiJz+6Yua/Fj
	GAY/ztJQ==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: [PATCH 02/15] swiotlb: make swiotlb_exit a no-op if SWIOTLB_FORCE is set
Date: Mon, 14 Mar 2022 08:31:16 +0100
Message-Id: <20220314073129.1862284-3-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220314073129.1862284-1-hch@lst.de>
References: <20220314073129.1862284-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

If force bouncing is enabled we can't release the buffers.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Reviewed-by: Anshuman Khandual <anshuman.khandual@arm.com>
---
 kernel/dma/swiotlb.c | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c
index 908eac2527cb1..af9d257501a64 100644
--- a/kernel/dma/swiotlb.c
+++ b/kernel/dma/swiotlb.c
@@ -369,6 +369,9 @@ void __init swiotlb_exit(void)
 	unsigned long tbl_vaddr;
 	size_t tbl_size, slots_size;
 
+	if (swiotlb_force == SWIOTLB_FORCE)
+		return;
+
 	if (!mem->nslabs)
 		return;
 
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 07:32:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 07:32:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289939.491689 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfBR-0005zU-L3; Mon, 14 Mar 2022 07:32:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289939.491689; Mon, 14 Mar 2022 07:32:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfBR-0005zK-Hg; Mon, 14 Mar 2022 07:32:01 +0000
Received: by outflank-mailman (input) for mailman id 289939;
 Mon, 14 Mar 2022 07:31:59 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=BEku=TZ=bombadil.srs.infradead.org=BATV+605a0c0c3369109790a8+6777+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nTfBP-0005vt-RH
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 07:31:59 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d2d9e783-a368-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 08:31:56 +0100 (CET)
Received: from [46.140.54.162] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nTfBB-0044WZ-0Z; Mon, 14 Mar 2022 07:31:45 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d2d9e783-a368-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=fPWsO1iHHAQagtBcoXAydAb96o6DVHP7RWGjrq+6LwY=; b=qwDfXCpOs1g0/zHivF8J3Pa2kj
	TSEGk1jWRMtKhEWhGNTpplhyN3HAXMPj2LczMjlRItqHl2EU4O94m52uTs7+XplZ9Kz3G8NQbVgDe
	8sYKcoI1GNnHZg+/WDfK7cVDrptgMrK0dKcNymVgO1rg5DAYC7x7npVpM/i4b21NILmU5aJ0/my+6
	kyYkMNI5HH4L9WZ2hdaZTVXBgc1A0S2ACtfv5IQXO+1zkiOWQ3JRYYpJ3hCXh6GtWwX4FXtpn++/b
	3fgyxOV7bdJ585bpb0fhRoJk4MsacKntn9Q2zC4rxGGLze7TGvuBGq3nLKTRVjU093NpkROGa7e37
	qjB7pyoQ==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: [PATCH 04/15] swiotlb: rename swiotlb_late_init_with_default_size
Date: Mon, 14 Mar 2022 08:31:18 +0100
Message-Id: <20220314073129.1862284-5-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220314073129.1862284-1-hch@lst.de>
References: <20220314073129.1862284-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

swiotlb_late_init_with_default_size is an overly verbose name that
doesn't even catch what the function is doing, given that the size is
not just a default but the actual requested size.

Rename it to swiotlb_init_late.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Reviewed-by: Anshuman Khandual <anshuman.khandual@arm.com>
---
 arch/x86/pci/sta2x11-fixup.c | 2 +-
 include/linux/swiotlb.h      | 2 +-
 kernel/dma/swiotlb.c         | 6 ++----
 3 files changed, 4 insertions(+), 6 deletions(-)

diff --git a/arch/x86/pci/sta2x11-fixup.c b/arch/x86/pci/sta2x11-fixup.c
index 101081ad64b6d..e0c039a75b2db 100644
--- a/arch/x86/pci/sta2x11-fixup.c
+++ b/arch/x86/pci/sta2x11-fixup.c
@@ -57,7 +57,7 @@ static void sta2x11_new_instance(struct pci_dev *pdev)
 		int size = STA2X11_SWIOTLB_SIZE;
 		/* First instance: register your own swiotlb area */
 		dev_info(&pdev->dev, "Using SWIOTLB (size %i)\n", size);
-		if (swiotlb_late_init_with_default_size(size))
+		if (swiotlb_init_late(size))
 			dev_emerg(&pdev->dev, "init swiotlb failed\n");
 	}
 	list_add(&instance->list, &sta2x11_instance_list);
diff --git a/include/linux/swiotlb.h b/include/linux/swiotlb.h
index 9fb3a568f0c51..b48b26bfa0edb 100644
--- a/include/linux/swiotlb.h
+++ b/include/linux/swiotlb.h
@@ -40,7 +40,7 @@ extern void swiotlb_init(int verbose);
 int swiotlb_init_with_tbl(char *tlb, unsigned long nslabs, int verbose);
 unsigned long swiotlb_size_or_default(void);
 extern int swiotlb_late_init_with_tbl(char *tlb, unsigned long nslabs);
-extern int swiotlb_late_init_with_default_size(size_t default_size);
+int swiotlb_init_late(size_t size);
 extern void __init swiotlb_update_mem_attributes(void);
 
 phys_addr_t swiotlb_tbl_map_single(struct device *hwdev, phys_addr_t phys,
diff --git a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c
index b75943c2a0a0e..14e08fa9621c2 100644
--- a/kernel/dma/swiotlb.c
+++ b/kernel/dma/swiotlb.c
@@ -281,11 +281,9 @@ swiotlb_init(int verbose)
  * initialize the swiotlb later using the slab allocator if needed.
  * This should be just like above, but with some error catching.
  */
-int
-swiotlb_late_init_with_default_size(size_t default_size)
+int swiotlb_init_late(size_t size)
 {
-	unsigned long nslabs =
-		ALIGN(default_size >> IO_TLB_SHIFT, IO_TLB_SEGSIZE);
+	unsigned long nslabs = ALIGN(size >> IO_TLB_SHIFT, IO_TLB_SEGSIZE);
 	unsigned long bytes;
 	unsigned char *vstart = NULL;
 	unsigned int order;
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 07:32:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 07:32:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289940.491695 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfBS-00067B-7n; Mon, 14 Mar 2022 07:32:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289940.491695; Mon, 14 Mar 2022 07:32:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfBS-00064A-2O; Mon, 14 Mar 2022 07:32:02 +0000
Received: by outflank-mailman (input) for mailman id 289940;
 Mon, 14 Mar 2022 07:32:00 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=BEku=TZ=bombadil.srs.infradead.org=BATV+605a0c0c3369109790a8+6777+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nTfBQ-0005vt-Kb
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 07:32:00 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d20cd6d2-a368-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 08:31:56 +0100 (CET)
Received: from [46.140.54.162] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nTfB7-0044Us-O5; Mon, 14 Mar 2022 07:31:42 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d20cd6d2-a368-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=qjF6UlDoKTJIPz7U7eqEwXQdhEoBvByheuaiClvkIZs=; b=xws4HwHaOihl78yOiEhjroPPH2
	54Uuo5lIEafRY6wWRzl3zJycrcpdL3Ct3V5Jp5JR8qMp8oFjSOXQbB0NlttNHliOig3A7mAukzQQ1
	jqCDcfjsL8YCmgoNEU5hVEVvPQVUgpI4qQ9pvZEVCxmIRV8INa0ghdAsk8Vxd/FVyx+S9zfzWJkI8
	71Vz8cAVJ+t3qVKRBh3oH5OfL67neWWtxy0ukHlr5V7WBvHe1bgjdnFpOyHJL/puGEyXEQmWcSMeF
	dhJq3ne5jkzC2E0LUwwtQQmao0rPySxKqNAmfNsXt+gJ1lr4nz1OMCbh7PoAe9GuD09/A8md2T2cD
	qY3q73tw==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: [PATCH 03/15] swiotlb: simplify swiotlb_max_segment
Date: Mon, 14 Mar 2022 08:31:17 +0100
Message-Id: <20220314073129.1862284-4-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220314073129.1862284-1-hch@lst.de>
References: <20220314073129.1862284-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

Remove the bogus Xen override that was usually larger than the actual
size and just calculate the value on demand.  Note that
swiotlb_max_segment still doesn't make sense as an interface and should
eventually be removed.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Reviewed-by: Anshuman Khandual <anshuman.khandual@arm.com>
---
 drivers/xen/swiotlb-xen.c |  2 --
 include/linux/swiotlb.h   |  1 -
 kernel/dma/swiotlb.c      | 20 +++-----------------
 3 files changed, 3 insertions(+), 20 deletions(-)

diff --git a/drivers/xen/swiotlb-xen.c b/drivers/xen/swiotlb-xen.c
index 47aebd98f52f5..485cd06ed39e7 100644
--- a/drivers/xen/swiotlb-xen.c
+++ b/drivers/xen/swiotlb-xen.c
@@ -202,7 +202,6 @@ int xen_swiotlb_init(void)
 	rc = swiotlb_late_init_with_tbl(start, nslabs);
 	if (rc)
 		return rc;
-	swiotlb_set_max_segment(PAGE_SIZE);
 	return 0;
 error:
 	if (nslabs > 1024 && repeat--) {
@@ -254,7 +253,6 @@ void __init xen_swiotlb_init_early(void)
 
 	if (swiotlb_init_with_tbl(start, nslabs, true))
 		panic("Cannot allocate SWIOTLB buffer");
-	swiotlb_set_max_segment(PAGE_SIZE);
 }
 #endif /* CONFIG_X86 */
 
diff --git a/include/linux/swiotlb.h b/include/linux/swiotlb.h
index f6c3638255d54..9fb3a568f0c51 100644
--- a/include/linux/swiotlb.h
+++ b/include/linux/swiotlb.h
@@ -164,7 +164,6 @@ static inline void swiotlb_adjust_size(unsigned long size)
 #endif /* CONFIG_SWIOTLB */
 
 extern void swiotlb_print_info(void);
-extern void swiotlb_set_max_segment(unsigned int);
 
 #ifdef CONFIG_DMA_RESTRICTED_POOL
 struct page *swiotlb_alloc(struct device *dev, size_t size);
diff --git a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c
index af9d257501a64..b75943c2a0a0e 100644
--- a/kernel/dma/swiotlb.c
+++ b/kernel/dma/swiotlb.c
@@ -68,12 +68,6 @@ struct io_tlb_mem io_tlb_default_mem;
 
 phys_addr_t swiotlb_unencrypted_base;
 
-/*
- * Max segment that we can provide which (if pages are contingous) will
- * not be bounced (unless SWIOTLB_FORCE is set).
- */
-static unsigned int max_segment;
-
 static unsigned long default_nslabs = IO_TLB_DEFAULT_SIZE >> IO_TLB_SHIFT;
 
 static int __init
@@ -97,18 +91,12 @@ early_param("swiotlb", setup_io_tlb_npages);
 
 unsigned int swiotlb_max_segment(void)
 {
-	return io_tlb_default_mem.nslabs ? max_segment : 0;
+	if (!io_tlb_default_mem.nslabs)
+		return 0;
+	return rounddown(io_tlb_default_mem.nslabs << IO_TLB_SHIFT, PAGE_SIZE);
 }
 EXPORT_SYMBOL_GPL(swiotlb_max_segment);
 
-void swiotlb_set_max_segment(unsigned int val)
-{
-	if (swiotlb_force == SWIOTLB_FORCE)
-		max_segment = 1;
-	else
-		max_segment = rounddown(val, PAGE_SIZE);
-}
-
 unsigned long swiotlb_size_or_default(void)
 {
 	return default_nslabs << IO_TLB_SHIFT;
@@ -258,7 +246,6 @@ int __init swiotlb_init_with_tbl(char *tlb, unsigned long nslabs, int verbose)
 
 	if (verbose)
 		swiotlb_print_info();
-	swiotlb_set_max_segment(mem->nslabs << IO_TLB_SHIFT);
 	return 0;
 }
 
@@ -359,7 +346,6 @@ swiotlb_late_init_with_tbl(char *tlb, unsigned long nslabs)
 	swiotlb_init_io_tlb_mem(mem, virt_to_phys(tlb), nslabs, true);
 
 	swiotlb_print_info();
-	swiotlb_set_max_segment(mem->nslabs << IO_TLB_SHIFT);
 	return 0;
 }
 
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 07:32:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 07:32:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289941.491711 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfBU-0006ab-LA; Mon, 14 Mar 2022 07:32:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289941.491711; Mon, 14 Mar 2022 07:32:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfBU-0006aR-GH; Mon, 14 Mar 2022 07:32:04 +0000
Received: by outflank-mailman (input) for mailman id 289941;
 Mon, 14 Mar 2022 07:32:02 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=BEku=TZ=bombadil.srs.infradead.org=BATV+605a0c0c3369109790a8+6777+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nTfBS-0005vt-TY
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 07:32:02 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d6660914-a368-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 08:32:02 +0100 (CET)
Received: from [46.140.54.162] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nTfBE-0044YU-6n; Mon, 14 Mar 2022 07:31:48 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d6660914-a368-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=PXzvxDuJ7dtq4MEwSJLJWBZwmoZU9P9omOl6CdJuIoM=; b=qiuq87bYuaIlaiP0CNaY36Vw2E
	eRadO6nXlKLFyymOzH7mAwQgeK4fEKmdRvF6EjtdqK6+MbDIOpkQiH+QdW80NTaMs30eyNTyE8Tmg
	xFZRbGO0LcYfGQuCTWKgMJnzCl+u0P4/fgJMtF3taDNIcjh1uSBVkVIECGoChzB8GkRiKr8LnKX3u
	6GNxIeUiA+DizSoHt6RIqvYjOaVp03itnUL9qBG06/2pqM7shQiyVji3SqadJOIwzwmiBbcIGlXvU
	+hGhlJ94coaCT4H/vaPwPH1xU9garA4YArn7xfz6IqfQCCp1++XWmvY/xfmXvDkNEPMfCy/gu7s3t
	M0LxkcQA==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org,
	Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: [PATCH 05/15] arm/xen: don't check for xen_initial_domain() in xen_create_contiguous_region
Date: Mon, 14 Mar 2022 08:31:19 +0100
Message-Id: <20220314073129.1862284-6-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220314073129.1862284-1-hch@lst.de>
References: <20220314073129.1862284-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

From: Stefano Stabellini <sstabellini@kernel.org>

It used to be that Linux enabled swiotlb-xen when running a dom0 on ARM.
Since f5079a9a2a31 "xen/arm: introduce XENFEAT_direct_mapped and
XENFEAT_not_direct_mapped", Linux detects whether to enable or disable
swiotlb-xen based on the new feature flags: XENFEAT_direct_mapped and
XENFEAT_not_direct_mapped.

However, there is still a leftover xen_initial_domain() check in
xen_create_contiguous_region. Remove the check as
xen_create_contiguous_region is only called by swiotlb-xen during
initialization. If xen_create_contiguous_region is called, we know Linux
is running 1:1 mapped so there is no need for additional checks.

Also update the in-code comment.

Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
Signed-off-by: Christoph Hellwig <hch@lst.de>
---
 arch/arm/xen/mm.c | 5 +----
 1 file changed, 1 insertion(+), 4 deletions(-)

diff --git a/arch/arm/xen/mm.c b/arch/arm/xen/mm.c
index a7e54a087b802..28c2070602535 100644
--- a/arch/arm/xen/mm.c
+++ b/arch/arm/xen/mm.c
@@ -122,10 +122,7 @@ int xen_create_contiguous_region(phys_addr_t pstart, unsigned int order,
 				 unsigned int address_bits,
 				 dma_addr_t *dma_handle)
 {
-	if (!xen_initial_domain())
-		return -EINVAL;
-
-	/* we assume that dom0 is mapped 1:1 for now */
+	/* the domain is 1:1 mapped to use swiotlb-xen */
 	*dma_handle = pstart;
 	return 0;
 }
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 07:32:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 07:32:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289942.491722 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfBW-0006sT-0W; Mon, 14 Mar 2022 07:32:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289942.491722; Mon, 14 Mar 2022 07:32:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfBV-0006rg-Rl; Mon, 14 Mar 2022 07:32:05 +0000
Received: by outflank-mailman (input) for mailman id 289942;
 Mon, 14 Mar 2022 07:32:05 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=BEku=TZ=bombadil.srs.infradead.org=BATV+605a0c0c3369109790a8+6777+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nTfBV-00056d-4w
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 07:32:05 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id d7c160fe-a368-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 08:32:04 +0100 (CET)
Received: from [46.140.54.162] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nTfBH-0044b2-Bx; Mon, 14 Mar 2022 07:31:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d7c160fe-a368-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=fPQX1tW6oEG+I0H/rxZDFlkVrHm+7UqYHxDjUft+pbI=; b=UaUDSuTfz++xf50tkHNiHGXJZq
	cJ7jDE7eLn4++IV9Tll52n1Vyta7Quk7g2f3APPp8NZQ82J9lVEH0b+2sz77Kx5Ag19nVkSSMOHca
	Q+4rQuVGpmGgZutzMpfA5u3XmfFPI5bVsb07TCve+RRWDWakNpqhwENvwDSHO4BZduNpBFXaySMjE
	UGCLRYOwl0Xqsbq+YUPpW34dps/onEFHOIF/iOXPMh3FmAWkYnxr8hf3aefQd6Yzrs5k6KcfnvkBt
	bVljteU+8Uox68Ji5IQ+EVsDkRO+On8IRzUH/KkmbM7cukrYjUNKbL5VWd44MaREvLr7mZQKNZUnB
	NK1I2pAQ==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org,
	Thomas Bogendoerfer <tsbogend@alpha.franken.de>
Subject: [PATCH 06/15] MIPS/octeon: use swiotlb_init instead of open coding it
Date: Mon, 14 Mar 2022 08:31:20 +0100
Message-Id: <20220314073129.1862284-7-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220314073129.1862284-1-hch@lst.de>
References: <20220314073129.1862284-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

Use the generic swiotlb initialization helper instead of open coding it.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Acked-by: Thomas Bogendoerfer <tsbogend@alpha.franken.de>
---
 arch/mips/cavium-octeon/dma-octeon.c | 15 ++-------------
 arch/mips/pci/pci-octeon.c           |  2 +-
 2 files changed, 3 insertions(+), 14 deletions(-)

diff --git a/arch/mips/cavium-octeon/dma-octeon.c b/arch/mips/cavium-octeon/dma-octeon.c
index df70308db0e69..fb7547e217263 100644
--- a/arch/mips/cavium-octeon/dma-octeon.c
+++ b/arch/mips/cavium-octeon/dma-octeon.c
@@ -186,15 +186,12 @@ phys_addr_t dma_to_phys(struct device *dev, dma_addr_t daddr)
 	return daddr;
 }
 
-char *octeon_swiotlb;
-
 void __init plat_swiotlb_setup(void)
 {
 	phys_addr_t start, end;
 	phys_addr_t max_addr;
 	phys_addr_t addr_size;
 	size_t swiotlbsize;
-	unsigned long swiotlb_nslabs;
 	u64 i;
 
 	max_addr = 0;
@@ -236,15 +233,7 @@ void __init plat_swiotlb_setup(void)
 	if (OCTEON_IS_OCTEON2() && max_addr >= 0x100000000ul)
 		swiotlbsize = 64 * (1<<20);
 #endif
-	swiotlb_nslabs = swiotlbsize >> IO_TLB_SHIFT;
-	swiotlb_nslabs = ALIGN(swiotlb_nslabs, IO_TLB_SEGSIZE);
-	swiotlbsize = swiotlb_nslabs << IO_TLB_SHIFT;
-
-	octeon_swiotlb = memblock_alloc_low(swiotlbsize, PAGE_SIZE);
-	if (!octeon_swiotlb)
-		panic("%s: Failed to allocate %zu bytes align=%lx\n",
-		      __func__, swiotlbsize, PAGE_SIZE);
 
-	if (swiotlb_init_with_tbl(octeon_swiotlb, swiotlb_nslabs, 1) == -ENOMEM)
-		panic("Cannot allocate SWIOTLB buffer");
+	swiotlb_adjust_size(swiotlbsize);
+	swiotlb_init(1);
 }
diff --git a/arch/mips/pci/pci-octeon.c b/arch/mips/pci/pci-octeon.c
index fc29b85cfa926..e457a18cbdc59 100644
--- a/arch/mips/pci/pci-octeon.c
+++ b/arch/mips/pci/pci-octeon.c
@@ -664,7 +664,7 @@ static int __init octeon_pci_setup(void)
 
 		/* BAR1 movable regions contiguous to cover the swiotlb */
 		octeon_bar1_pci_phys =
-			virt_to_phys(octeon_swiotlb) & ~((1ull << 22) - 1);
+			io_tlb_default_mem.start & ~((1ull << 22) - 1);
 
 		for (index = 0; index < 32; index++) {
 			union cvmx_pci_bar1_indexx bar1_index;
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 07:32:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 07:32:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289945.491733 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfBb-0007Vr-D3; Mon, 14 Mar 2022 07:32:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289945.491733; Mon, 14 Mar 2022 07:32:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfBb-0007Ux-6c; Mon, 14 Mar 2022 07:32:11 +0000
Received: by outflank-mailman (input) for mailman id 289945;
 Mon, 14 Mar 2022 07:32:10 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=BEku=TZ=bombadil.srs.infradead.org=BATV+605a0c0c3369109790a8+6777+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nTfBa-0005vt-72
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 07:32:10 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d9ee9516-a368-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 08:32:08 +0100 (CET)
Received: from [46.140.54.162] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nTfBK-0044dW-LB; Mon, 14 Mar 2022 07:31:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d9ee9516-a368-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=9TI61PVS1CmYy96IdPK0xotFklww6NqACNVye6CbaCc=; b=ztzmVDCimd9p0qwRm3lPhdEThS
	Myvw6EN96v1eJT5HIwjmhtSTD1TGKN+ia9lsBzRQQLbtwfn1lMSZmS1xHx0qRKrzU4UBuKdYNyTZX
	8H7CJzvwmYx5ufy1f24XGAoU7n0oP0ekhhcJF8sTxahztZj3Vp0H7aR/xGGmoRdzShekU91k9U+k3
	HL/vhJGPknDZS3VDH4yXPZrZVMxHlnMVwQZPk9ynPQftVct1V87zITgA6hv+wi7HOoioEhjv2Iewz
	rESc6pI2aejfYQodsDN3VxFl32XCwKmZqGn7KtURt42Ki+5zp7cbRqBjhzryE4qIA+ThVjmdawC3y
	i+FuQ/CA==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: [PATCH 07/15] x86: remove the IOMMU table infrastructure
Date: Mon, 14 Mar 2022 08:31:21 +0100
Message-Id: <20220314073129.1862284-8-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220314073129.1862284-1-hch@lst.de>
References: <20220314073129.1862284-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

The IOMMU table tries to separate the different IOMMUs into different
backends, but actually requires various cross calls.

Rewrite the code to do the generic swiotlb/swiotlb-xen setup directly
in pci-dma.c and then just call into the IOMMU drivers.

Signed-off-by: Christoph Hellwig <hch@lst.de>
---
 arch/ia64/include/asm/iommu_table.h    |   7 --
 arch/x86/include/asm/dma-mapping.h     |   1 -
 arch/x86/include/asm/gart.h            |   5 +-
 arch/x86/include/asm/iommu.h           |   6 ++
 arch/x86/include/asm/iommu_table.h     | 102 -----------------------
 arch/x86/include/asm/swiotlb.h         |  30 -------
 arch/x86/include/asm/xen/swiotlb-xen.h |   2 -
 arch/x86/kernel/Makefile               |   2 -
 arch/x86/kernel/amd_gart_64.c          |   5 +-
 arch/x86/kernel/aperture_64.c          |  14 ++--
 arch/x86/kernel/pci-dma.c              | 107 ++++++++++++++++++++-----
 arch/x86/kernel/pci-iommu_table.c      |  77 ------------------
 arch/x86/kernel/pci-swiotlb.c          |  77 ------------------
 arch/x86/kernel/tboot.c                |   1 -
 arch/x86/kernel/vmlinux.lds.S          |  12 ---
 arch/x86/xen/Makefile                  |   2 -
 arch/x86/xen/pci-swiotlb-xen.c         |  96 ----------------------
 drivers/iommu/amd/init.c               |   6 --
 drivers/iommu/amd/iommu.c              |   5 +-
 drivers/iommu/intel/dmar.c             |   6 +-
 include/linux/dmar.h                   |   6 +-
 21 files changed, 110 insertions(+), 459 deletions(-)
 delete mode 100644 arch/ia64/include/asm/iommu_table.h
 delete mode 100644 arch/x86/include/asm/iommu_table.h
 delete mode 100644 arch/x86/include/asm/swiotlb.h
 delete mode 100644 arch/x86/kernel/pci-iommu_table.c
 delete mode 100644 arch/x86/kernel/pci-swiotlb.c
 delete mode 100644 arch/x86/xen/pci-swiotlb-xen.c

diff --git a/arch/ia64/include/asm/iommu_table.h b/arch/ia64/include/asm/iommu_table.h
deleted file mode 100644
index cc96116ac276a..0000000000000
--- a/arch/ia64/include/asm/iommu_table.h
+++ /dev/null
@@ -1,7 +0,0 @@
-/* SPDX-License-Identifier: GPL-2.0 */
-#ifndef _ASM_IA64_IOMMU_TABLE_H
-#define _ASM_IA64_IOMMU_TABLE_H
-
-#define IOMMU_INIT_POST(_detect)
-
-#endif /* _ASM_IA64_IOMMU_TABLE_H */
diff --git a/arch/x86/include/asm/dma-mapping.h b/arch/x86/include/asm/dma-mapping.h
index bb1654fe0ce74..256fd8115223d 100644
--- a/arch/x86/include/asm/dma-mapping.h
+++ b/arch/x86/include/asm/dma-mapping.h
@@ -9,7 +9,6 @@
 
 #include <linux/scatterlist.h>
 #include <asm/io.h>
-#include <asm/swiotlb.h>
 
 extern int iommu_merge;
 extern int panic_on_overflow;
diff --git a/arch/x86/include/asm/gart.h b/arch/x86/include/asm/gart.h
index 3185565743459..5af8088a10df6 100644
--- a/arch/x86/include/asm/gart.h
+++ b/arch/x86/include/asm/gart.h
@@ -38,7 +38,7 @@ extern int gart_iommu_aperture_disabled;
 extern void early_gart_iommu_check(void);
 extern int gart_iommu_init(void);
 extern void __init gart_parse_options(char *);
-extern int gart_iommu_hole_init(void);
+void gart_iommu_hole_init(void);
 
 #else
 #define gart_iommu_aperture            0
@@ -51,9 +51,8 @@ static inline void early_gart_iommu_check(void)
 static inline void gart_parse_options(char *options)
 {
 }
-static inline int gart_iommu_hole_init(void)
+static inline void gart_iommu_hole_init(void)
 {
-	return -ENODEV;
 }
 #endif
 
diff --git a/arch/x86/include/asm/iommu.h b/arch/x86/include/asm/iommu.h
index bf1ed2ddc74bd..dba89ed40d38d 100644
--- a/arch/x86/include/asm/iommu.h
+++ b/arch/x86/include/asm/iommu.h
@@ -9,6 +9,12 @@
 extern int force_iommu, no_iommu;
 extern int iommu_detected;
 
+#ifdef CONFIG_SWIOTLB
+extern bool x86_swiotlb_enable;
+#else
+#define x86_swiotlb_enable false
+#endif
+
 /* 10 seconds */
 #define DMAR_OPERATION_TIMEOUT ((cycles_t) tsc_khz*10*1000)
 
diff --git a/arch/x86/include/asm/iommu_table.h b/arch/x86/include/asm/iommu_table.h
deleted file mode 100644
index 1fb3fd1a83c25..0000000000000
--- a/arch/x86/include/asm/iommu_table.h
+++ /dev/null
@@ -1,102 +0,0 @@
-/* SPDX-License-Identifier: GPL-2.0 */
-#ifndef _ASM_X86_IOMMU_TABLE_H
-#define _ASM_X86_IOMMU_TABLE_H
-
-#include <asm/swiotlb.h>
-
-/*
- * History lesson:
- * The execution chain of IOMMUs in 2.6.36 looks as so:
- *
- *            [xen-swiotlb]
- *                 |
- *         +----[swiotlb *]--+
- *        /         |         \
- *       /          |          \
- *    [GART]     [Calgary]  [Intel VT-d]
- *     /
- *    /
- * [AMD-Vi]
- *
- * *: if SWIOTLB detected 'iommu=soft'/'swiotlb=force' it would skip
- * over the rest of IOMMUs and unconditionally initialize the SWIOTLB.
- * Also it would surreptitiously initialize set the swiotlb=1 if there were
- * more than 4GB and if the user did not pass in 'iommu=off'. The swiotlb
- * flag would be turned off by all IOMMUs except the Calgary one.
- *
- * The IOMMU_INIT* macros allow a similar tree (or more complex if desired)
- * to be built by defining who we depend on.
- *
- * And all that needs to be done is to use one of the macros in the IOMMU
- * and the pci-dma.c will take care of the rest.
- */
-
-struct iommu_table_entry {
-	initcall_t	detect;
-	initcall_t	depend;
-	void		(*early_init)(void); /* No memory allocate available. */
-	void		(*late_init)(void); /* Yes, can allocate memory. */
-#define IOMMU_FINISH_IF_DETECTED (1<<0)
-#define IOMMU_DETECTED		 (1<<1)
-	int		flags;
-};
-/*
- * Macro fills out an entry in the .iommu_table that is equivalent
- * to the fields that 'struct iommu_table_entry' has. The entries
- * that are put in the .iommu_table section are not put in any order
- * hence during boot-time we will have to resort them based on
- * dependency. */
-
-
-#define __IOMMU_INIT(_detect, _depend, _early_init, _late_init, _finish)\
-	static const struct iommu_table_entry				\
-		__iommu_entry_##_detect __used				\
-	__attribute__ ((unused, __section__(".iommu_table"),		\
-			aligned((sizeof(void *)))))	\
-	= {_detect, _depend, _early_init, _late_init,			\
-	   _finish ? IOMMU_FINISH_IF_DETECTED : 0}
-/*
- * The simplest IOMMU definition. Provide the detection routine
- * and it will be run after the SWIOTLB and the other IOMMUs
- * that utilize this macro. If the IOMMU is detected (ie, the
- * detect routine returns a positive value), the other IOMMUs
- * are also checked. You can use IOMMU_INIT_POST_FINISH if you prefer
- * to stop detecting the other IOMMUs after yours has been detected.
- */
-#define IOMMU_INIT_POST(_detect)					\
-	__IOMMU_INIT(_detect, pci_swiotlb_detect_4gb,  NULL, NULL, 0)
-
-#define IOMMU_INIT_POST_FINISH(detect)					\
-	__IOMMU_INIT(_detect, pci_swiotlb_detect_4gb,  NULL, NULL, 1)
-
-/*
- * A more sophisticated version of IOMMU_INIT. This variant requires:
- *  a). A detection routine function.
- *  b). The name of the detection routine we depend on to get called
- *      before us.
- *  c). The init routine which gets called if the detection routine
- *      returns a positive value from the pci_iommu_alloc. This means
- *      no presence of a memory allocator.
- *  d). Similar to the 'init', except that this gets called from pci_iommu_init
- *      where we do have a memory allocator.
- *
- * The standard IOMMU_INIT differs from the IOMMU_INIT_FINISH variant
- * in that the former will continue detecting other IOMMUs in the call
- * list after the detection routine returns a positive number, while the
- * latter will stop the execution chain upon first successful detection.
- * Both variants will still call the 'init' and 'late_init' functions if
- * they are set.
- */
-#define IOMMU_INIT_FINISH(_detect, _depend, _init, _late_init)		\
-	__IOMMU_INIT(_detect, _depend, _init, _late_init, 1)
-
-#define IOMMU_INIT(_detect, _depend, _init, _late_init)			\
-	__IOMMU_INIT(_detect, _depend, _init, _late_init, 0)
-
-void sort_iommu_table(struct iommu_table_entry *start,
-		      struct iommu_table_entry *finish);
-
-void check_iommu_entries(struct iommu_table_entry *start,
-			 struct iommu_table_entry *finish);
-
-#endif /* _ASM_X86_IOMMU_TABLE_H */
diff --git a/arch/x86/include/asm/swiotlb.h b/arch/x86/include/asm/swiotlb.h
deleted file mode 100644
index ff6c92eff035a..0000000000000
--- a/arch/x86/include/asm/swiotlb.h
+++ /dev/null
@@ -1,30 +0,0 @@
-/* SPDX-License-Identifier: GPL-2.0 */
-#ifndef _ASM_X86_SWIOTLB_H
-#define _ASM_X86_SWIOTLB_H
-
-#include <linux/swiotlb.h>
-
-#ifdef CONFIG_SWIOTLB
-extern int swiotlb;
-extern int __init pci_swiotlb_detect_override(void);
-extern int __init pci_swiotlb_detect_4gb(void);
-extern void __init pci_swiotlb_init(void);
-extern void __init pci_swiotlb_late_init(void);
-#else
-#define swiotlb 0
-static inline int pci_swiotlb_detect_override(void)
-{
-	return 0;
-}
-static inline int pci_swiotlb_detect_4gb(void)
-{
-	return 0;
-}
-static inline void pci_swiotlb_init(void)
-{
-}
-static inline void pci_swiotlb_late_init(void)
-{
-}
-#endif
-#endif /* _ASM_X86_SWIOTLB_H */
diff --git a/arch/x86/include/asm/xen/swiotlb-xen.h b/arch/x86/include/asm/xen/swiotlb-xen.h
index 66b4ddde77430..e5a90b42e4dde 100644
--- a/arch/x86/include/asm/xen/swiotlb-xen.h
+++ b/arch/x86/include/asm/xen/swiotlb-xen.h
@@ -3,10 +3,8 @@
 #define _ASM_X86_SWIOTLB_XEN_H
 
 #ifdef CONFIG_SWIOTLB_XEN
-extern int __init pci_xen_swiotlb_detect(void);
 extern int pci_xen_swiotlb_init_late(void);
 #else
-#define pci_xen_swiotlb_detect NULL
 static inline int pci_xen_swiotlb_init_late(void) { return -ENXIO; }
 #endif
 
diff --git a/arch/x86/kernel/Makefile b/arch/x86/kernel/Makefile
index 6aef9ee28a394..2851d4f0aa0d2 100644
--- a/arch/x86/kernel/Makefile
+++ b/arch/x86/kernel/Makefile
@@ -71,7 +71,6 @@ obj-y			+= bootflag.o e820.o
 obj-y			+= pci-dma.o quirks.o topology.o kdebugfs.o
 obj-y			+= alternative.o i8253.o hw_breakpoint.o
 obj-y			+= tsc.o tsc_msr.o io_delay.o rtc.o
-obj-y			+= pci-iommu_table.o
 obj-y			+= resource.o
 obj-y			+= irqflags.o
 obj-y			+= static_call.o
@@ -136,7 +135,6 @@ obj-$(CONFIG_PCSPKR_PLATFORM)	+= pcspeaker.o
 
 obj-$(CONFIG_X86_CHECK_BIOS_CORRUPTION) += check.o
 
-obj-$(CONFIG_SWIOTLB)			+= pci-swiotlb.o
 obj-$(CONFIG_OF)			+= devicetree.o
 obj-$(CONFIG_UPROBES)			+= uprobes.o
 
diff --git a/arch/x86/kernel/amd_gart_64.c b/arch/x86/kernel/amd_gart_64.c
index ed837383de5c8..194d54eed5376 100644
--- a/arch/x86/kernel/amd_gart_64.c
+++ b/arch/x86/kernel/amd_gart_64.c
@@ -38,11 +38,9 @@
 #include <asm/iommu.h>
 #include <asm/gart.h>
 #include <asm/set_memory.h>
-#include <asm/swiotlb.h>
 #include <asm/dma.h>
 #include <asm/amd_nb.h>
 #include <asm/x86_init.h>
-#include <asm/iommu_table.h>
 
 static unsigned long iommu_bus_base;	/* GART remapping area (physical) */
 static unsigned long iommu_size;	/* size of remapping area bytes */
@@ -808,7 +806,7 @@ int __init gart_iommu_init(void)
 	flush_gart();
 	dma_ops = &gart_dma_ops;
 	x86_platform.iommu_shutdown = gart_iommu_shutdown;
-	swiotlb = 0;
+	x86_swiotlb_enable = false;
 
 	return 0;
 }
@@ -842,4 +840,3 @@ void __init gart_parse_options(char *p)
 		}
 	}
 }
-IOMMU_INIT_POST(gart_iommu_hole_init);
diff --git a/arch/x86/kernel/aperture_64.c b/arch/x86/kernel/aperture_64.c
index af3ba08b684b5..7a5630d904b23 100644
--- a/arch/x86/kernel/aperture_64.c
+++ b/arch/x86/kernel/aperture_64.c
@@ -392,7 +392,7 @@ void __init early_gart_iommu_check(void)
 
 static int __initdata printed_gart_size_msg;
 
-int __init gart_iommu_hole_init(void)
+void __init gart_iommu_hole_init(void)
 {
 	u32 agp_aper_base = 0, agp_aper_order = 0;
 	u32 aper_size, aper_alloc = 0, aper_order = 0, last_aper_order = 0;
@@ -401,11 +401,11 @@ int __init gart_iommu_hole_init(void)
 	int i, node;
 
 	if (!amd_gart_present())
-		return -ENODEV;
+		return;
 
 	if (gart_iommu_aperture_disabled || !fix_aperture ||
 	    !early_pci_allowed())
-		return -ENODEV;
+		return;
 
 	pr_info("Checking aperture...\n");
 
@@ -491,10 +491,8 @@ int __init gart_iommu_hole_init(void)
 			 * and fixed up the northbridge
 			 */
 			exclude_from_core(last_aper_base, last_aper_order);
-
-			return 1;
 		}
-		return 0;
+		return;
 	}
 
 	if (!fallback_aper_force) {
@@ -527,7 +525,7 @@ int __init gart_iommu_hole_init(void)
 			panic("Not enough memory for aperture");
 		}
 	} else {
-		return 0;
+		return;
 	}
 
 	/*
@@ -561,6 +559,4 @@ int __init gart_iommu_hole_init(void)
 	}
 
 	set_up_gart_resume(aper_order, aper_alloc);
-
-	return 1;
 }
diff --git a/arch/x86/kernel/pci-dma.c b/arch/x86/kernel/pci-dma.c
index de234e7a8962e..df96926421be0 100644
--- a/arch/x86/kernel/pci-dma.c
+++ b/arch/x86/kernel/pci-dma.c
@@ -7,13 +7,16 @@
 #include <linux/memblock.h>
 #include <linux/gfp.h>
 #include <linux/pci.h>
+#include <linux/amd-iommu.h>
 
 #include <asm/proto.h>
 #include <asm/dma.h>
 #include <asm/iommu.h>
 #include <asm/gart.h>
 #include <asm/x86_init.h>
-#include <asm/iommu_table.h>
+
+#include <xen/xen.h>
+#include <xen/swiotlb-xen.h>
 
 static bool disable_dac_quirk __read_mostly;
 
@@ -34,24 +37,83 @@ int no_iommu __read_mostly;
 /* Set this to 1 if there is a HW IOMMU in the system */
 int iommu_detected __read_mostly = 0;
 
-extern struct iommu_table_entry __iommu_table[], __iommu_table_end[];
+#ifdef CONFIG_SWIOTLB
+bool x86_swiotlb_enable;
+
+static void __init pci_swiotlb_detect(void)
+{
+	/* don't initialize swiotlb if iommu=off (no_iommu=1) */
+	if (!no_iommu && max_possible_pfn > MAX_DMA32_PFN)
+		x86_swiotlb_enable = true;
+
+	/*
+	 * Set swiotlb to 1 so that bounce buffers are allocated and used for
+	 * devices that can't support DMA to encrypted memory.
+	 */
+	if (cc_platform_has(CC_ATTR_HOST_MEM_ENCRYPT))
+		x86_swiotlb_enable = true;
+
+	if (swiotlb_force == SWIOTLB_FORCE)
+		x86_swiotlb_enable = true;
+}
+#else
+static inline void __init pci_swiotlb_detect(void)
+{
+}
+#endif /* CONFIG_SWIOTLB */
+
+#ifdef CONFIG_SWIOTLB_XEN
+static bool xen_swiotlb;
+
+static void __init pci_xen_swiotlb_init(void)
+{
+	if (!xen_initial_domain() && !x86_swiotlb_enable &&
+	    swiotlb_force != SWIOTLB_FORCE)
+		return;
+	x86_swiotlb_enable = true;
+	xen_swiotlb = true;
+	xen_swiotlb_init_early();
+	dma_ops = &xen_swiotlb_dma_ops;
+	if (IS_ENABLED(CONFIG_PCI))
+		pci_request_acs();
+}
+
+int pci_xen_swiotlb_init_late(void)
+{
+	int rc;
+
+	if (xen_swiotlb)
+		return 0;
+
+	rc = xen_swiotlb_init();
+	if (rc)
+		return rc;
+
+	/* XXX: this switches the dma ops under live devices! */
+	dma_ops = &xen_swiotlb_dma_ops;
+	if (IS_ENABLED(CONFIG_PCI))
+		pci_request_acs();
+	return 0;
+}
+EXPORT_SYMBOL_GPL(pci_xen_swiotlb_init_late);
+#else
+static inline void __init pci_xen_swiotlb_init(void)
+{
+}
+#endif /* CONFIG_SWIOTLB_XEN */
 
 void __init pci_iommu_alloc(void)
 {
-	struct iommu_table_entry *p;
-
-	sort_iommu_table(__iommu_table, __iommu_table_end);
-	check_iommu_entries(__iommu_table, __iommu_table_end);
-
-	for (p = __iommu_table; p < __iommu_table_end; p++) {
-		if (p && p->detect && p->detect() > 0) {
-			p->flags |= IOMMU_DETECTED;
-			if (p->early_init)
-				p->early_init();
-			if (p->flags & IOMMU_FINISH_IF_DETECTED)
-				break;
-		}
+	if (xen_pv_domain()) {
+		pci_xen_swiotlb_init();
+		return;
 	}
+	pci_swiotlb_detect();
+	gart_iommu_hole_init();
+	amd_iommu_detect();
+	detect_intel_iommu();
+	if (x86_swiotlb_enable)
+		swiotlb_init(0);
 }
 
 /*
@@ -102,7 +164,7 @@ static __init int iommu_setup(char *p)
 		}
 #ifdef CONFIG_SWIOTLB
 		if (!strncmp(p, "soft", 4))
-			swiotlb = 1;
+			x86_swiotlb_enable = true;
 #endif
 		if (!strncmp(p, "pt", 2))
 			iommu_set_default_passthrough(true);
@@ -121,14 +183,17 @@ early_param("iommu", iommu_setup);
 
 static int __init pci_iommu_init(void)
 {
-	struct iommu_table_entry *p;
-
 	x86_init.iommu.iommu_init();
 
-	for (p = __iommu_table; p < __iommu_table_end; p++) {
-		if (p && (p->flags & IOMMU_DETECTED) && p->late_init)
-			p->late_init();
+#ifdef CONFIG_SWIOTLB
+	/* An IOMMU turned us off. */
+	if (x86_swiotlb_enable) {
+		pr_info("PCI-DMA: Using software bounce buffering for IO (SWIOTLB)\n");
+		swiotlb_print_info();
+	} else {
+		swiotlb_exit();
 	}
+#endif
 
 	return 0;
 }
diff --git a/arch/x86/kernel/pci-iommu_table.c b/arch/x86/kernel/pci-iommu_table.c
deleted file mode 100644
index 42e92ec62973b..0000000000000
--- a/arch/x86/kernel/pci-iommu_table.c
+++ /dev/null
@@ -1,77 +0,0 @@
-// SPDX-License-Identifier: GPL-2.0
-#include <linux/dma-mapping.h>
-#include <asm/iommu_table.h>
-#include <linux/string.h>
-#include <linux/kallsyms.h>
-
-static struct iommu_table_entry * __init
-find_dependents_of(struct iommu_table_entry *start,
-		   struct iommu_table_entry *finish,
-		   struct iommu_table_entry *q)
-{
-	struct iommu_table_entry *p;
-
-	if (!q)
-		return NULL;
-
-	for (p = start; p < finish; p++)
-		if (p->detect == q->depend)
-			return p;
-
-	return NULL;
-}
-
-
-void __init sort_iommu_table(struct iommu_table_entry *start,
-			     struct iommu_table_entry *finish) {
-
-	struct iommu_table_entry *p, *q, tmp;
-
-	for (p = start; p < finish; p++) {
-again:
-		q = find_dependents_of(start, finish, p);
-		/* We are bit sneaky here. We use the memory address to figure
-		 * out if the node we depend on is past our point, if so, swap.
-		 */
-		if (q > p) {
-			tmp = *p;
-			memmove(p, q, sizeof(*p));
-			*q = tmp;
-			goto again;
-		}
-	}
-
-}
-
-#ifdef DEBUG
-void __init check_iommu_entries(struct iommu_table_entry *start,
-				struct iommu_table_entry *finish)
-{
-	struct iommu_table_entry *p, *q, *x;
-
-	/* Simple cyclic dependency checker. */
-	for (p = start; p < finish; p++) {
-		q = find_dependents_of(start, finish, p);
-		x = find_dependents_of(start, finish, q);
-		if (p == x) {
-			printk(KERN_ERR "CYCLIC DEPENDENCY FOUND! %pS depends on %pS and vice-versa. BREAKING IT.\n",
-			       p->detect, q->detect);
-			/* Heavy handed way..*/
-			x->depend = NULL;
-		}
-	}
-
-	for (p = start; p < finish; p++) {
-		q = find_dependents_of(p, finish, p);
-		if (q && q > p) {
-			printk(KERN_ERR "EXECUTION ORDER INVALID! %pS should be called before %pS!\n",
-			       p->detect, q->detect);
-		}
-	}
-}
-#else
-void __init check_iommu_entries(struct iommu_table_entry *start,
-				       struct iommu_table_entry *finish)
-{
-}
-#endif
diff --git a/arch/x86/kernel/pci-swiotlb.c b/arch/x86/kernel/pci-swiotlb.c
deleted file mode 100644
index 814ab46a0dada..0000000000000
--- a/arch/x86/kernel/pci-swiotlb.c
+++ /dev/null
@@ -1,77 +0,0 @@
-// SPDX-License-Identifier: GPL-2.0
-
-#include <linux/pci.h>
-#include <linux/cache.h>
-#include <linux/init.h>
-#include <linux/swiotlb.h>
-#include <linux/memblock.h>
-#include <linux/dma-direct.h>
-#include <linux/cc_platform.h>
-
-#include <asm/iommu.h>
-#include <asm/swiotlb.h>
-#include <asm/dma.h>
-#include <asm/xen/swiotlb-xen.h>
-#include <asm/iommu_table.h>
-
-int swiotlb __read_mostly;
-
-/*
- * pci_swiotlb_detect_override - set swiotlb to 1 if necessary
- *
- * This returns non-zero if we are forced to use swiotlb (by the boot
- * option).
- */
-int __init pci_swiotlb_detect_override(void)
-{
-	if (swiotlb_force == SWIOTLB_FORCE)
-		swiotlb = 1;
-
-	return swiotlb;
-}
-IOMMU_INIT_FINISH(pci_swiotlb_detect_override,
-		  pci_xen_swiotlb_detect,
-		  pci_swiotlb_init,
-		  pci_swiotlb_late_init);
-
-/*
- * If 4GB or more detected (and iommu=off not set) or if SME is active
- * then set swiotlb to 1 and return 1.
- */
-int __init pci_swiotlb_detect_4gb(void)
-{
-	/* don't initialize swiotlb if iommu=off (no_iommu=1) */
-	if (!no_iommu && max_possible_pfn > MAX_DMA32_PFN)
-		swiotlb = 1;
-
-	/*
-	 * Set swiotlb to 1 so that bounce buffers are allocated and used for
-	 * devices that can't support DMA to encrypted memory.
-	 */
-	if (cc_platform_has(CC_ATTR_HOST_MEM_ENCRYPT))
-		swiotlb = 1;
-
-	return swiotlb;
-}
-IOMMU_INIT(pci_swiotlb_detect_4gb,
-	   pci_swiotlb_detect_override,
-	   pci_swiotlb_init,
-	   pci_swiotlb_late_init);
-
-void __init pci_swiotlb_init(void)
-{
-	if (swiotlb)
-		swiotlb_init(0);
-}
-
-void __init pci_swiotlb_late_init(void)
-{
-	/* An IOMMU turned us off. */
-	if (!swiotlb)
-		swiotlb_exit();
-	else {
-		printk(KERN_INFO "PCI-DMA: "
-		       "Using software bounce buffering for IO (SWIOTLB)\n");
-		swiotlb_print_info();
-	}
-}
diff --git a/arch/x86/kernel/tboot.c b/arch/x86/kernel/tboot.c
index f9af561c3cd4f..0c1154a1c4032 100644
--- a/arch/x86/kernel/tboot.c
+++ b/arch/x86/kernel/tboot.c
@@ -24,7 +24,6 @@
 #include <asm/processor.h>
 #include <asm/bootparam.h>
 #include <asm/pgalloc.h>
-#include <asm/swiotlb.h>
 #include <asm/fixmap.h>
 #include <asm/proto.h>
 #include <asm/setup.h>
diff --git a/arch/x86/kernel/vmlinux.lds.S b/arch/x86/kernel/vmlinux.lds.S
index 27f830345b6f0..bbe910c15b293 100644
--- a/arch/x86/kernel/vmlinux.lds.S
+++ b/arch/x86/kernel/vmlinux.lds.S
@@ -306,18 +306,6 @@ SECTIONS
 		*(.altinstr_replacement)
 	}
 
-	/*
-	 * struct iommu_table_entry entries are injected in this section.
-	 * It is an array of IOMMUs which during run time gets sorted depending
-	 * on its dependency order. After rootfs_initcall is complete
-	 * this section can be safely removed.
-	 */
-	.iommu_table : AT(ADDR(.iommu_table) - LOAD_OFFSET) {
-		__iommu_table = .;
-		*(.iommu_table)
-		__iommu_table_end = .;
-	}
-
 	. = ALIGN(8);
 	.apicdrivers : AT(ADDR(.apicdrivers) - LOAD_OFFSET) {
 		__apicdrivers = .;
diff --git a/arch/x86/xen/Makefile b/arch/x86/xen/Makefile
index 4953260e281c3..3c5b52fbe4a7f 100644
--- a/arch/x86/xen/Makefile
+++ b/arch/x86/xen/Makefile
@@ -47,6 +47,4 @@ obj-$(CONFIG_XEN_DEBUG_FS)	+= debugfs.o
 
 obj-$(CONFIG_XEN_PV_DOM0)	+= vga.o
 
-obj-$(CONFIG_SWIOTLB_XEN)	+= pci-swiotlb-xen.o
-
 obj-$(CONFIG_XEN_EFI)		+= efi.o
diff --git a/arch/x86/xen/pci-swiotlb-xen.c b/arch/x86/xen/pci-swiotlb-xen.c
deleted file mode 100644
index 46df59aeaa06a..0000000000000
--- a/arch/x86/xen/pci-swiotlb-xen.c
+++ /dev/null
@@ -1,96 +0,0 @@
-// SPDX-License-Identifier: GPL-2.0
-
-/* Glue code to lib/swiotlb-xen.c */
-
-#include <linux/dma-map-ops.h>
-#include <linux/pci.h>
-#include <xen/swiotlb-xen.h>
-
-#include <asm/xen/hypervisor.h>
-#include <xen/xen.h>
-#include <asm/iommu_table.h>
-
-
-#include <asm/xen/swiotlb-xen.h>
-#ifdef CONFIG_X86_64
-#include <asm/iommu.h>
-#include <asm/dma.h>
-#endif
-#include <linux/export.h>
-
-static int xen_swiotlb __read_mostly;
-
-/*
- * pci_xen_swiotlb_detect - set xen_swiotlb to 1 if necessary
- *
- * This returns non-zero if we are forced to use xen_swiotlb (by the boot
- * option).
- */
-int __init pci_xen_swiotlb_detect(void)
-{
-
-	if (!xen_pv_domain())
-		return 0;
-
-	/* If running as PV guest, either iommu=soft, or swiotlb=force will
-	 * activate this IOMMU. If running as PV privileged, activate it
-	 * irregardless.
-	 */
-	if (xen_initial_domain() || swiotlb || swiotlb_force == SWIOTLB_FORCE)
-		xen_swiotlb = 1;
-
-	/* If we are running under Xen, we MUST disable the native SWIOTLB.
-	 * Don't worry about swiotlb_force flag activating the native, as
-	 * the 'swiotlb' flag is the only one turning it on. */
-	swiotlb = 0;
-
-#ifdef CONFIG_X86_64
-	/* pci_swiotlb_detect_4gb turns on native SWIOTLB if no_iommu == 0
-	 * (so no iommu=X command line over-writes).
-	 * Considering that PV guests do not want the *native SWIOTLB* but
-	 * only Xen SWIOTLB it is not useful to us so set no_iommu=1 here.
-	 */
-	if (max_pfn > MAX_DMA32_PFN)
-		no_iommu = 1;
-#endif
-	return xen_swiotlb;
-}
-
-static void __init pci_xen_swiotlb_init(void)
-{
-	if (xen_swiotlb) {
-		xen_swiotlb_init_early();
-		dma_ops = &xen_swiotlb_dma_ops;
-
-#ifdef CONFIG_PCI
-		/* Make sure ACS will be enabled */
-		pci_request_acs();
-#endif
-	}
-}
-
-int pci_xen_swiotlb_init_late(void)
-{
-	int rc;
-
-	if (xen_swiotlb)
-		return 0;
-
-	rc = xen_swiotlb_init();
-	if (rc)
-		return rc;
-
-	dma_ops = &xen_swiotlb_dma_ops;
-#ifdef CONFIG_PCI
-	/* Make sure ACS will be enabled */
-	pci_request_acs();
-#endif
-
-	return 0;
-}
-EXPORT_SYMBOL_GPL(pci_xen_swiotlb_init_late);
-
-IOMMU_INIT_FINISH(pci_xen_swiotlb_detect,
-		  NULL,
-		  pci_xen_swiotlb_init,
-		  NULL);
diff --git a/drivers/iommu/amd/init.c b/drivers/iommu/amd/init.c
index dc338acf33385..0000bce14d059 100644
--- a/drivers/iommu/amd/init.c
+++ b/drivers/iommu/amd/init.c
@@ -26,7 +26,6 @@
 #include <asm/apic.h>
 #include <asm/gart.h>
 #include <asm/x86_init.h>
-#include <asm/iommu_table.h>
 #include <asm/io_apic.h>
 #include <asm/irq_remapping.h>
 #include <asm/set_memory.h>
@@ -3235,11 +3234,6 @@ __setup("ivrs_ioapic",		parse_ivrs_ioapic);
 __setup("ivrs_hpet",		parse_ivrs_hpet);
 __setup("ivrs_acpihid",		parse_ivrs_acpihid);
 
-IOMMU_INIT_FINISH(amd_iommu_detect,
-		  gart_iommu_hole_init,
-		  NULL,
-		  NULL);
-
 bool amd_iommu_v2_supported(void)
 {
 	return amd_iommu_v2_present;
diff --git a/drivers/iommu/amd/iommu.c b/drivers/iommu/amd/iommu.c
index 461f1844ed1fb..541a7b8315a12 100644
--- a/drivers/iommu/amd/iommu.c
+++ b/drivers/iommu/amd/iommu.c
@@ -1834,7 +1834,10 @@ void amd_iommu_domain_update(struct protection_domain *domain)
 
 static void __init amd_iommu_init_dma_ops(void)
 {
-	swiotlb = (iommu_default_passthrough() || sme_me_mask) ? 1 : 0;
+	if (iommu_default_passthrough() || sme_me_mask)
+		x86_swiotlb_enable = true;
+	else
+		x86_swiotlb_enable = false;
 }
 
 int __init amd_iommu_init_api(void)
diff --git a/drivers/iommu/intel/dmar.c b/drivers/iommu/intel/dmar.c
index 915bff76fe965..29bee4b210c5b 100644
--- a/drivers/iommu/intel/dmar.c
+++ b/drivers/iommu/intel/dmar.c
@@ -30,7 +30,6 @@
 #include <linux/numa.h>
 #include <linux/limits.h>
 #include <asm/irq_remapping.h>
-#include <asm/iommu_table.h>
 #include <trace/events/intel_iommu.h>
 
 #include "../irq_remapping.h"
@@ -913,7 +912,7 @@ dmar_validate_one_drhd(struct acpi_dmar_header *entry, void *arg)
 	return 0;
 }
 
-int __init detect_intel_iommu(void)
+void __init detect_intel_iommu(void)
 {
 	int ret;
 	struct dmar_res_callback validate_drhd_cb = {
@@ -946,8 +945,6 @@ int __init detect_intel_iommu(void)
 		dmar_tbl = NULL;
 	}
 	up_write(&dmar_global_lock);
-
-	return ret ? ret : 1;
 }
 
 static void unmap_iommu(struct intel_iommu *iommu)
@@ -2165,7 +2162,6 @@ static int __init dmar_free_unused_resources(void)
 }
 
 late_initcall(dmar_free_unused_resources);
-IOMMU_INIT_POST(detect_intel_iommu);
 
 /*
  * DMAR Hotplug Support
diff --git a/include/linux/dmar.h b/include/linux/dmar.h
index 45e903d847335..cbd714a198a0a 100644
--- a/include/linux/dmar.h
+++ b/include/linux/dmar.h
@@ -121,7 +121,7 @@ extern int dmar_remove_dev_scope(struct dmar_pci_notify_info *info,
 				 u16 segment, struct dmar_dev_scope *devices,
 				 int count);
 /* Intel IOMMU detection */
-extern int detect_intel_iommu(void);
+void detect_intel_iommu(void);
 extern int enable_drhd_fault_handling(void);
 extern int dmar_device_add(acpi_handle handle);
 extern int dmar_device_remove(acpi_handle handle);
@@ -197,6 +197,10 @@ static inline bool dmar_platform_optin(void)
 	return false;
 }
 
+static inline void detect_intel_iommu(void)
+{
+}
+
 #endif /* CONFIG_DMAR_TABLE */
 
 struct irte {
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 07:32:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 07:32:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289946.491744 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfBd-0007wY-QG; Mon, 14 Mar 2022 07:32:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289946.491744; Mon, 14 Mar 2022 07:32:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfBd-0007wL-Me; Mon, 14 Mar 2022 07:32:13 +0000
Received: by outflank-mailman (input) for mailman id 289946;
 Mon, 14 Mar 2022 07:32:11 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=BEku=TZ=bombadil.srs.infradead.org=BATV+605a0c0c3369109790a8+6777+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nTfBb-00056d-92
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 07:32:11 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id db43d627-a368-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 08:32:10 +0100 (CET)
Received: from [46.140.54.162] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nTfBO-0044gC-7e; Mon, 14 Mar 2022 07:31:58 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: db43d627-a368-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=G+BH4X2UfRw8OQMrfsMNZasg39oL/O6RTmQprXaltS0=; b=Grkv61SpDZXDtEl+P0acp2tTgz
	OLt1K0n4GmPr0GQxsUa8/K8MjT3fytjZ3rMBnPHO2kpSrwAz0QoAkPN/ghuhz21oW1mV/v64yJByU
	2OV008sibw7ZWNht6kzeRC++MtgAaleBtX4VbTiTlboGVSvOamqdjEHWbgTpAwaTcwbE/jDMQFqpI
	asso+bSa91CnpkigH56+ORMUcaFOjOcTjY+IeFeok3J3cRYAK3Okh52ITJFOrcYMNTOisQuUDaIeP
	BaZ0miOCwVVihjS9gxDyrn/S/D3V7gXL5BDCq6FpCcdb9+LOEAc1r+dumDEfY4xYA4ex0Cqigpbpr
	IkwBVJtQ==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: [PATCH 08/15] x86: centralize setting SWIOTLB_FORCE when guest memory encryption is enabled
Date: Mon, 14 Mar 2022 08:31:22 +0100
Message-Id: <20220314073129.1862284-9-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220314073129.1862284-1-hch@lst.de>
References: <20220314073129.1862284-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

Move enabling SWIOTLB_FORCE for guest memory encryption into common code.

Signed-off-by: Christoph Hellwig <hch@lst.de>
---
 arch/x86/kernel/cpu/mshyperv.c | 8 --------
 arch/x86/kernel/pci-dma.c      | 8 ++++++++
 arch/x86/mm/mem_encrypt_amd.c  | 3 ---
 3 files changed, 8 insertions(+), 11 deletions(-)

diff --git a/arch/x86/kernel/cpu/mshyperv.c b/arch/x86/kernel/cpu/mshyperv.c
index 5a99f993e6392..568274917f1cd 100644
--- a/arch/x86/kernel/cpu/mshyperv.c
+++ b/arch/x86/kernel/cpu/mshyperv.c
@@ -336,14 +336,6 @@ static void __init ms_hyperv_init_platform(void)
 			swiotlb_unencrypted_base = ms_hyperv.shared_gpa_boundary;
 #endif
 		}
-
-#ifdef CONFIG_SWIOTLB
-		/*
-		 * Enable swiotlb force mode in Isolation VM to
-		 * use swiotlb bounce buffer for dma transaction.
-		 */
-		swiotlb_force = SWIOTLB_FORCE;
-#endif
 	}
 
 	if (hv_max_functions_eax >= HYPERV_CPUID_NESTED_FEATURES) {
diff --git a/arch/x86/kernel/pci-dma.c b/arch/x86/kernel/pci-dma.c
index df96926421be0..04140e20ef1a3 100644
--- a/arch/x86/kernel/pci-dma.c
+++ b/arch/x86/kernel/pci-dma.c
@@ -53,6 +53,14 @@ static void __init pci_swiotlb_detect(void)
 	if (cc_platform_has(CC_ATTR_HOST_MEM_ENCRYPT))
 		x86_swiotlb_enable = true;
 
+	/*
+	 * Guest with guest memory encryption currently perform all DMA through
+	 * bounce buffers as the hypervisor can't access arbitrary VM memory
+	 * that is not explicitly shared with it.
+	 */
+	if (cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT))
+		swiotlb_force = SWIOTLB_FORCE;
+
 	if (swiotlb_force == SWIOTLB_FORCE)
 		x86_swiotlb_enable = true;
 }
diff --git a/arch/x86/mm/mem_encrypt_amd.c b/arch/x86/mm/mem_encrypt_amd.c
index 2b2d018ea3450..a72942d569cf9 100644
--- a/arch/x86/mm/mem_encrypt_amd.c
+++ b/arch/x86/mm/mem_encrypt_amd.c
@@ -191,9 +191,6 @@ void __init sme_early_init(void)
 	/* Update the protection map with memory encryption mask */
 	for (i = 0; i < ARRAY_SIZE(protection_map); i++)
 		protection_map[i] = pgprot_encrypted(protection_map[i]);
-
-	if (cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT))
-		swiotlb_force = SWIOTLB_FORCE;
 }
 
 void __init sev_setup_arch(void)
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 07:32:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 07:32:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289950.491755 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfBi-00006g-6s; Mon, 14 Mar 2022 07:32:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289950.491755; Mon, 14 Mar 2022 07:32:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfBi-00006S-1h; Mon, 14 Mar 2022 07:32:18 +0000
Received: by outflank-mailman (input) for mailman id 289950;
 Mon, 14 Mar 2022 07:32:17 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=BEku=TZ=bombadil.srs.infradead.org=BATV+605a0c0c3369109790a8+6777+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nTfBg-0005vt-MX
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 07:32:16 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id de3587c3-a368-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 08:32:15 +0100 (CET)
Received: from [46.140.54.162] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nTfBR-0044iI-FL; Mon, 14 Mar 2022 07:32:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: de3587c3-a368-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=j/gMo6kiMd15MBMR1iDhtcdbnucrzViFl0x/evBe/TY=; b=xEjxMMsgbQ0jKRvTK2JjhaXyUW
	drB+OCc3Pz1H1uptRid31fhWIE5niv1KrX8vnTFCQuiZbAK+DzpHs+QwGXf3gCehjg6z0G5Tflm0D
	g6UeoMbTAxL+SlAoczJI4sdOcSLdGR/wmGxfeAj7W3bBMK6fSKezuouF1XzDxMg3tFWSiW+sjDmPD
	VqFbTXPJKAaWfxmVUrbE0a5a9e1/bmQzsY3pcSm5obrhdRwd5sjI516ufZsueZySDVuEzXrm2IVvp
	q8AhDTF7lCMrSWp4UYk7vhqY48EbEugzz/Yel5JzwrU2N9Ev/atyyDefwiU2UIAvxCri15b0aXh70
	eiAp67sA==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: [PATCH 09/15] swiotlb: make the swiotlb_init interface more useful
Date: Mon, 14 Mar 2022 08:31:23 +0100
Message-Id: <20220314073129.1862284-10-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220314073129.1862284-1-hch@lst.de>
References: <20220314073129.1862284-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

Pass a bool to pass if swiotlb needs to be enabled based on the
addressing needs and replace the verbose argument with a set of
flags, including one to force enable bounce buffering.

Note that this patch removes the possibility to force xen-swiotlb
use using swiotlb=force on the command line on x86 (arm and arm64
never supported that), but this interface will be restored shortly.

Signed-off-by: Christoph Hellwig <hch@lst.de>
---
 arch/arm/mm/init.c                     |  6 +----
 arch/arm64/mm/init.c                   |  6 +----
 arch/ia64/mm/init.c                    |  4 +--
 arch/mips/cavium-octeon/dma-octeon.c   |  2 +-
 arch/mips/loongson64/dma.c             |  2 +-
 arch/mips/sibyte/common/dma.c          |  2 +-
 arch/powerpc/mm/mem.c                  |  3 ++-
 arch/powerpc/platforms/pseries/setup.c |  3 ---
 arch/riscv/mm/init.c                   |  8 +-----
 arch/s390/mm/init.c                    |  3 +--
 arch/x86/kernel/pci-dma.c              | 15 ++++++-----
 drivers/xen/swiotlb-xen.c              |  4 +--
 include/linux/swiotlb.h                | 15 ++++++-----
 include/trace/events/swiotlb.h         | 29 ++++++++-------------
 kernel/dma/swiotlb.c                   | 35 ++++++++++++++------------
 15 files changed, 55 insertions(+), 82 deletions(-)

diff --git a/arch/arm/mm/init.c b/arch/arm/mm/init.c
index 6d0cb0f7bc54b..73f30d278b565 100644
--- a/arch/arm/mm/init.c
+++ b/arch/arm/mm/init.c
@@ -312,11 +312,7 @@ static void __init free_highpages(void)
 void __init mem_init(void)
 {
 #ifdef CONFIG_ARM_LPAE
-	if (swiotlb_force == SWIOTLB_FORCE ||
-	    max_pfn > arm_dma_pfn_limit)
-		swiotlb_init(1);
-	else
-		swiotlb_force = SWIOTLB_NO_FORCE;
+	swiotlb_init(max_pfn > arm_dma_pfn_limit, SWIOTLB_VERBOSE);
 #endif
 
 	set_max_mapnr(pfn_to_page(max_pfn) - mem_map);
diff --git a/arch/arm64/mm/init.c b/arch/arm64/mm/init.c
index db63cc885771a..52102adda3d28 100644
--- a/arch/arm64/mm/init.c
+++ b/arch/arm64/mm/init.c
@@ -373,11 +373,7 @@ void __init bootmem_init(void)
  */
 void __init mem_init(void)
 {
-	if (swiotlb_force == SWIOTLB_FORCE ||
-	    max_pfn > PFN_DOWN(arm64_dma_phys_limit))
-		swiotlb_init(1);
-	else if (!xen_swiotlb_detect())
-		swiotlb_force = SWIOTLB_NO_FORCE;
+	swiotlb_init(max_pfn > PFN_DOWN(arm64_dma_phys_limit), SWIOTLB_VERBOSE);
 
 	/* this will put all unused low memory onto the freelists */
 	memblock_free_all();
diff --git a/arch/ia64/mm/init.c b/arch/ia64/mm/init.c
index 5d165607bf354..3c3e15b22608f 100644
--- a/arch/ia64/mm/init.c
+++ b/arch/ia64/mm/init.c
@@ -437,9 +437,7 @@ mem_init (void)
 		if (iommu_detected)
 			break;
 #endif
-#ifdef CONFIG_SWIOTLB
-		swiotlb_init(1);
-#endif
+		swiotlb_init(true, SWIOTLB_VERBOSE);
 	} while (0);
 
 #ifdef CONFIG_FLATMEM
diff --git a/arch/mips/cavium-octeon/dma-octeon.c b/arch/mips/cavium-octeon/dma-octeon.c
index fb7547e217263..9fbba6a8fa4c5 100644
--- a/arch/mips/cavium-octeon/dma-octeon.c
+++ b/arch/mips/cavium-octeon/dma-octeon.c
@@ -235,5 +235,5 @@ void __init plat_swiotlb_setup(void)
 #endif
 
 	swiotlb_adjust_size(swiotlbsize);
-	swiotlb_init(1);
+	swiotlb_init(true, SWIOTLB_VERBOSE);
 }
diff --git a/arch/mips/loongson64/dma.c b/arch/mips/loongson64/dma.c
index 364f2f27c8723..8220a1bc0db64 100644
--- a/arch/mips/loongson64/dma.c
+++ b/arch/mips/loongson64/dma.c
@@ -24,5 +24,5 @@ phys_addr_t dma_to_phys(struct device *dev, dma_addr_t daddr)
 
 void __init plat_swiotlb_setup(void)
 {
-	swiotlb_init(1);
+	swiotlb_init(true, SWIOTLB_VERBOSE);
 }
diff --git a/arch/mips/sibyte/common/dma.c b/arch/mips/sibyte/common/dma.c
index eb47a94f3583e..c5c2c782aff68 100644
--- a/arch/mips/sibyte/common/dma.c
+++ b/arch/mips/sibyte/common/dma.c
@@ -10,5 +10,5 @@
 
 void __init plat_swiotlb_setup(void)
 {
-	swiotlb_init(1);
+	swiotlb_init(true, SWIOTLB_VERBOSE);
 }
diff --git a/arch/powerpc/mm/mem.c b/arch/powerpc/mm/mem.c
index 8e301cd8925b2..e1519e2edc656 100644
--- a/arch/powerpc/mm/mem.c
+++ b/arch/powerpc/mm/mem.c
@@ -17,6 +17,7 @@
 #include <linux/suspend.h>
 #include <linux/dma-direct.h>
 
+#include <asm/swiotlb.h>
 #include <asm/machdep.h>
 #include <asm/rtas.h>
 #include <asm/kasan.h>
@@ -251,7 +252,7 @@ void __init mem_init(void)
 	if (is_secure_guest())
 		svm_swiotlb_init();
 	else
-		swiotlb_init(0);
+		swiotlb_init(ppc_swiotlb_enable, 0);
 #endif
 
 	high_memory = (void *) __va(max_low_pfn * PAGE_SIZE);
diff --git a/arch/powerpc/platforms/pseries/setup.c b/arch/powerpc/platforms/pseries/setup.c
index 83a04d967a59f..45d637ab58261 100644
--- a/arch/powerpc/platforms/pseries/setup.c
+++ b/arch/powerpc/platforms/pseries/setup.c
@@ -838,9 +838,6 @@ static void __init pSeries_setup_arch(void)
 	}
 
 	ppc_md.pcibios_root_bridge_prepare = pseries_root_bridge_prepare;
-
-	if (swiotlb_force == SWIOTLB_FORCE)
-		ppc_swiotlb_enable = 1;
 }
 
 static void pseries_panic(char *str)
diff --git a/arch/riscv/mm/init.c b/arch/riscv/mm/init.c
index cf4d018b7d668..e2c97b4ea2b48 100644
--- a/arch/riscv/mm/init.c
+++ b/arch/riscv/mm/init.c
@@ -118,13 +118,7 @@ void __init mem_init(void)
 	BUG_ON(!mem_map);
 #endif /* CONFIG_FLATMEM */
 
-#ifdef CONFIG_SWIOTLB
-	if (swiotlb_force == SWIOTLB_FORCE ||
-	    max_pfn > PFN_DOWN(dma32_phys_limit))
-		swiotlb_init(1);
-	else
-		swiotlb_force = SWIOTLB_NO_FORCE;
-#endif
+	swiotlb_init(max_pfn > PFN_DOWN(dma32_phys_limit), SWIOTLB_VERBOSE);
 	high_memory = (void *)(__va(PFN_PHYS(max_low_pfn)));
 	memblock_free_all();
 
diff --git a/arch/s390/mm/init.c b/arch/s390/mm/init.c
index 86ffd0d51fd59..6fb6bf64326f9 100644
--- a/arch/s390/mm/init.c
+++ b/arch/s390/mm/init.c
@@ -185,8 +185,7 @@ static void pv_init(void)
 		return;
 
 	/* make sure bounce buffers are shared */
-	swiotlb_force = SWIOTLB_FORCE;
-	swiotlb_init(1);
+	swiotlb_init(true, SWIOTLB_FORCE | SWIOTLB_VERBOSE);
 	swiotlb_update_mem_attributes();
 }
 
diff --git a/arch/x86/kernel/pci-dma.c b/arch/x86/kernel/pci-dma.c
index 04140e20ef1a3..a705a199bf8a3 100644
--- a/arch/x86/kernel/pci-dma.c
+++ b/arch/x86/kernel/pci-dma.c
@@ -39,6 +39,7 @@ int iommu_detected __read_mostly = 0;
 
 #ifdef CONFIG_SWIOTLB
 bool x86_swiotlb_enable;
+static unsigned int x86_swiotlb_flags;
 
 static void __init pci_swiotlb_detect(void)
 {
@@ -58,16 +59,16 @@ static void __init pci_swiotlb_detect(void)
 	 * bounce buffers as the hypervisor can't access arbitrary VM memory
 	 * that is not explicitly shared with it.
 	 */
-	if (cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT))
-		swiotlb_force = SWIOTLB_FORCE;
-
-	if (swiotlb_force == SWIOTLB_FORCE)
+	if (cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT)) {
 		x86_swiotlb_enable = true;
+		x86_swiotlb_flags |= SWIOTLB_FORCE;
+	}
 }
 #else
 static inline void __init pci_swiotlb_detect(void)
 {
 }
+#define x86_swiotlb_flags 0
 #endif /* CONFIG_SWIOTLB */
 
 #ifdef CONFIG_SWIOTLB_XEN
@@ -75,8 +76,7 @@ static bool xen_swiotlb;
 
 static void __init pci_xen_swiotlb_init(void)
 {
-	if (!xen_initial_domain() && !x86_swiotlb_enable &&
-	    swiotlb_force != SWIOTLB_FORCE)
+	if (!xen_initial_domain() && !x86_swiotlb_enable)
 		return;
 	x86_swiotlb_enable = true;
 	xen_swiotlb = true;
@@ -120,8 +120,7 @@ void __init pci_iommu_alloc(void)
 	gart_iommu_hole_init();
 	amd_iommu_detect();
 	detect_intel_iommu();
-	if (x86_swiotlb_enable)
-		swiotlb_init(0);
+	swiotlb_init(x86_swiotlb_enable, x86_swiotlb_flags);
 }
 
 /*
diff --git a/drivers/xen/swiotlb-xen.c b/drivers/xen/swiotlb-xen.c
index 485cd06ed39e7..c2da3eb4826e8 100644
--- a/drivers/xen/swiotlb-xen.c
+++ b/drivers/xen/swiotlb-xen.c
@@ -251,7 +251,7 @@ void __init xen_swiotlb_init_early(void)
 		panic("%s (rc:%d)", xen_swiotlb_error(XEN_SWIOTLB_EFIXUP), rc);
 	}
 
-	if (swiotlb_init_with_tbl(start, nslabs, true))
+	if (swiotlb_init_with_tbl(start, nslabs, SWIOTLB_VERBOSE))
 		panic("Cannot allocate SWIOTLB buffer");
 }
 #endif /* CONFIG_X86 */
@@ -376,7 +376,7 @@ static dma_addr_t xen_swiotlb_map_page(struct device *dev, struct page *page,
 	/*
 	 * Oh well, have to allocate and map a bounce buffer.
 	 */
-	trace_swiotlb_bounced(dev, dev_addr, size, swiotlb_force);
+	trace_swiotlb_bounced(dev, dev_addr, size);
 
 	map = swiotlb_tbl_map_single(dev, phys, size, size, 0, dir, attrs);
 	if (map == (phys_addr_t)DMA_MAPPING_ERROR)
diff --git a/include/linux/swiotlb.h b/include/linux/swiotlb.h
index b48b26bfa0edb..ae0407173e845 100644
--- a/include/linux/swiotlb.h
+++ b/include/linux/swiotlb.h
@@ -13,11 +13,8 @@ struct device;
 struct page;
 struct scatterlist;
 
-enum swiotlb_force {
-	SWIOTLB_NORMAL,		/* Default - depending on HW DMA mask etc. */
-	SWIOTLB_FORCE,		/* swiotlb=force */
-	SWIOTLB_NO_FORCE,	/* swiotlb=noforce */
-};
+#define SWIOTLB_VERBOSE	(1 << 0) /* verbose initialization */
+#define SWIOTLB_FORCE	(1 << 1) /* force bounce buffering */
 
 /*
  * Maximum allowable number of contiguous slabs to map,
@@ -36,8 +33,7 @@ enum swiotlb_force {
 /* default to 64MB */
 #define IO_TLB_DEFAULT_SIZE (64UL<<20)
 
-extern void swiotlb_init(int verbose);
-int swiotlb_init_with_tbl(char *tlb, unsigned long nslabs, int verbose);
+int swiotlb_init_with_tbl(char *tlb, unsigned long nslabs, unsigned int flags);
 unsigned long swiotlb_size_or_default(void);
 extern int swiotlb_late_init_with_tbl(char *tlb, unsigned long nslabs);
 int swiotlb_init_late(size_t size);
@@ -126,13 +122,16 @@ static inline bool is_swiotlb_force_bounce(struct device *dev)
 	return mem && mem->force_bounce;
 }
 
+void swiotlb_init(bool addressing_limited, unsigned int flags);
 void __init swiotlb_exit(void);
 unsigned int swiotlb_max_segment(void);
 size_t swiotlb_max_mapping_size(struct device *dev);
 bool is_swiotlb_active(struct device *dev);
 void __init swiotlb_adjust_size(unsigned long size);
 #else
-#define swiotlb_force SWIOTLB_NO_FORCE
+static inline void swiotlb_init(bool addressing_limited, unsigned int flags)
+{
+}
 static inline bool is_swiotlb_buffer(struct device *dev, phys_addr_t paddr)
 {
 	return false;
diff --git a/include/trace/events/swiotlb.h b/include/trace/events/swiotlb.h
index 705be43b71ab0..da05c9ebd224a 100644
--- a/include/trace/events/swiotlb.h
+++ b/include/trace/events/swiotlb.h
@@ -8,20 +8,15 @@
 #include <linux/tracepoint.h>
 
 TRACE_EVENT(swiotlb_bounced,
-
-	TP_PROTO(struct device *dev,
-		 dma_addr_t dev_addr,
-		 size_t size,
-		 enum swiotlb_force swiotlb_force),
-
-	TP_ARGS(dev, dev_addr, size, swiotlb_force),
+	TP_PROTO(struct device *dev, dma_addr_t dev_addr, size_t size),
+	TP_ARGS(dev, dev_addr, size),
 
 	TP_STRUCT__entry(
-		__string(	dev_name,	dev_name(dev)		)
-		__field(	u64,	dma_mask			)
-		__field(	dma_addr_t,	dev_addr		)
-		__field(	size_t,	size				)
-		__field(	enum swiotlb_force,	swiotlb_force	)
+		__string(dev_name, dev_name(dev))
+		__field(u64, dma_mask)
+		__field(dma_addr_t, dev_addr)
+		__field(size_t, size)
+		__field(bool, force)
 	),
 
 	TP_fast_assign(
@@ -29,19 +24,15 @@ TRACE_EVENT(swiotlb_bounced,
 		__entry->dma_mask = (dev->dma_mask ? *dev->dma_mask : 0);
 		__entry->dev_addr = dev_addr;
 		__entry->size = size;
-		__entry->swiotlb_force = swiotlb_force;
+		__entry->force = is_swiotlb_force_bounce(dev);
 	),
 
-	TP_printk("dev_name: %s dma_mask=%llx dev_addr=%llx "
-		"size=%zu %s",
+	TP_printk("dev_name: %s dma_mask=%llx dev_addr=%llx size=%zu %s",
 		__get_str(dev_name),
 		__entry->dma_mask,
 		(unsigned long long)__entry->dev_addr,
 		__entry->size,
-		__print_symbolic(__entry->swiotlb_force,
-			{ SWIOTLB_NORMAL,	"NORMAL" },
-			{ SWIOTLB_FORCE,	"FORCE" },
-			{ SWIOTLB_NO_FORCE,	"NO_FORCE" }))
+		__entry->force ? "FORCE" : "NORMAL")
 );
 
 #endif /*  _TRACE_SWIOTLB_H */
diff --git a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c
index 14e08fa9621c2..5ac6e128d4279 100644
--- a/kernel/dma/swiotlb.c
+++ b/kernel/dma/swiotlb.c
@@ -62,7 +62,8 @@
 
 #define INVALID_PHYS_ADDR (~(phys_addr_t)0)
 
-enum swiotlb_force swiotlb_force;
+static bool swiotlb_force_bounce;
+static bool swiotlb_force_disable;
 
 struct io_tlb_mem io_tlb_default_mem;
 
@@ -81,9 +82,9 @@ setup_io_tlb_npages(char *str)
 	if (*str == ',')
 		++str;
 	if (!strcmp(str, "force"))
-		swiotlb_force = SWIOTLB_FORCE;
+		swiotlb_force_bounce = true;
 	else if (!strcmp(str, "noforce"))
-		swiotlb_force = SWIOTLB_NO_FORCE;
+		swiotlb_force_disable = true;
 
 	return 0;
 }
@@ -202,7 +203,7 @@ static void swiotlb_init_io_tlb_mem(struct io_tlb_mem *mem, phys_addr_t start,
 	mem->index = 0;
 	mem->late_alloc = late_alloc;
 
-	if (swiotlb_force == SWIOTLB_FORCE)
+	if (swiotlb_force_bounce)
 		mem->force_bounce = true;
 
 	spin_lock_init(&mem->lock);
@@ -224,12 +225,13 @@ static void swiotlb_init_io_tlb_mem(struct io_tlb_mem *mem, phys_addr_t start,
 	return;
 }
 
-int __init swiotlb_init_with_tbl(char *tlb, unsigned long nslabs, int verbose)
+int __init swiotlb_init_with_tbl(char *tlb, unsigned long nslabs,
+		unsigned int flags)
 {
 	struct io_tlb_mem *mem = &io_tlb_default_mem;
 	size_t alloc_size;
 
-	if (swiotlb_force == SWIOTLB_NO_FORCE)
+	if (swiotlb_force_disable)
 		return 0;
 
 	/* protect against double initialization */
@@ -243,8 +245,9 @@ int __init swiotlb_init_with_tbl(char *tlb, unsigned long nslabs, int verbose)
 		      __func__, alloc_size, PAGE_SIZE);
 
 	swiotlb_init_io_tlb_mem(mem, __pa(tlb), nslabs, false);
+	mem->force_bounce = flags & SWIOTLB_FORCE;
 
-	if (verbose)
+	if (flags & SWIOTLB_VERBOSE)
 		swiotlb_print_info();
 	return 0;
 }
@@ -253,20 +256,21 @@ int __init swiotlb_init_with_tbl(char *tlb, unsigned long nslabs, int verbose)
  * Statically reserve bounce buffer space and initialize bounce buffer data
  * structures for the software IO TLB used to implement the DMA API.
  */
-void  __init
-swiotlb_init(int verbose)
+void __init swiotlb_init(bool addressing_limit, unsigned int flags)
 {
 	size_t bytes = PAGE_ALIGN(default_nslabs << IO_TLB_SHIFT);
 	void *tlb;
 
-	if (swiotlb_force == SWIOTLB_NO_FORCE)
+	if (!addressing_limit && !swiotlb_force_bounce)
+		return;
+	if (swiotlb_force_disable)
 		return;
 
 	/* Get IO TLB memory from the low pages */
 	tlb = memblock_alloc_low(bytes, PAGE_SIZE);
 	if (!tlb)
 		goto fail;
-	if (swiotlb_init_with_tbl(tlb, default_nslabs, verbose))
+	if (swiotlb_init_with_tbl(tlb, default_nslabs, flags))
 		goto fail_free_mem;
 	return;
 
@@ -289,7 +293,7 @@ int swiotlb_init_late(size_t size)
 	unsigned int order;
 	int rc = 0;
 
-	if (swiotlb_force == SWIOTLB_NO_FORCE)
+	if (swiotlb_force_disable)
 		return 0;
 
 	/*
@@ -328,7 +332,7 @@ swiotlb_late_init_with_tbl(char *tlb, unsigned long nslabs)
 	struct io_tlb_mem *mem = &io_tlb_default_mem;
 	unsigned long bytes = nslabs << IO_TLB_SHIFT;
 
-	if (swiotlb_force == SWIOTLB_NO_FORCE)
+	if (swiotlb_force_disable)
 		return 0;
 
 	/* protect against double initialization */
@@ -353,7 +357,7 @@ void __init swiotlb_exit(void)
 	unsigned long tbl_vaddr;
 	size_t tbl_size, slots_size;
 
-	if (swiotlb_force == SWIOTLB_FORCE)
+	if (swiotlb_force_bounce)
 		return;
 
 	if (!mem->nslabs)
@@ -699,8 +703,7 @@ dma_addr_t swiotlb_map(struct device *dev, phys_addr_t paddr, size_t size,
 	phys_addr_t swiotlb_addr;
 	dma_addr_t dma_addr;
 
-	trace_swiotlb_bounced(dev, phys_to_dma(dev, paddr), size,
-			      swiotlb_force);
+	trace_swiotlb_bounced(dev, phys_to_dma(dev, paddr), size);
 
 	swiotlb_addr = swiotlb_tbl_map_single(dev, paddr, size, size, 0, dir,
 			attrs);
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 07:32:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 07:32:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289954.491766 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfBm-0000hq-ES; Mon, 14 Mar 2022 07:32:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289954.491766; Mon, 14 Mar 2022 07:32:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfBm-0000hh-BC; Mon, 14 Mar 2022 07:32:22 +0000
Received: by outflank-mailman (input) for mailman id 289954;
 Mon, 14 Mar 2022 07:32:21 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=BEku=TZ=bombadil.srs.infradead.org=BATV+605a0c0c3369109790a8+6777+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nTfBl-0005vt-IC
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 07:32:21 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id e0ed80d5-a368-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 08:32:20 +0100 (CET)
Received: from [46.140.54.162] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nTfBU-0044l6-Pr; Mon, 14 Mar 2022 07:32:05 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e0ed80d5-a368-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=IbJQxaVGsLOnuLApC1W6u9Iku9THkdOh49hhwsQBBRk=; b=tK68Ijrd1/cIsna5xphlbFdXSm
	bHrkhGEpmsnXwro/DU5nR3bLwfDyCWnvMPwb7vBV8J1Fv4qBsXkvt3HSuzNOknQP/Bl7Nemjpf3xv
	DYgNvl3HJaonwptS1EPU66gRvbaA2crWzzg9wm+EvcWdYs3AbMAnn0vqYHhoGrHc/gmf9j7/3JSq+
	+no0w2XcZ2J2w98/AXCIYn2UAbl4yhmkACP0pBjdJ81us1qFAwMlX8raVh4T05PKlU7HqHOMVUXtL
	LaxHbPOytLGhwb6TecxqYTd0uCP66Zkqa13jXXli492+7N+edkiDapIRinfy6WFxzQ/xynCz4My08
	ScXHujgg==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: [PATCH 10/15] swiotlb: add a SWIOTLB_ANY flag to lift the low memory restriction
Date: Mon, 14 Mar 2022 08:31:24 +0100
Message-Id: <20220314073129.1862284-11-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220314073129.1862284-1-hch@lst.de>
References: <20220314073129.1862284-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

Power SVM wants to allocate a swiotlb buffer that is not restricted to
low memory for the trusted hypervisor scheme.  Consolidate the support
for this into the swiotlb_init interface by adding a new flag.

Signed-off-by: Christoph Hellwig <hch@lst.de>
---
 arch/powerpc/include/asm/svm.h       |  4 ----
 arch/powerpc/include/asm/swiotlb.h   |  1 +
 arch/powerpc/kernel/dma-swiotlb.c    |  1 +
 arch/powerpc/mm/mem.c                |  5 +----
 arch/powerpc/platforms/pseries/svm.c | 26 +-------------------------
 include/linux/swiotlb.h              |  1 +
 kernel/dma/swiotlb.c                 | 11 +++++++++--
 7 files changed, 14 insertions(+), 35 deletions(-)

diff --git a/arch/powerpc/include/asm/svm.h b/arch/powerpc/include/asm/svm.h
index 7546402d796af..85580b30aba48 100644
--- a/arch/powerpc/include/asm/svm.h
+++ b/arch/powerpc/include/asm/svm.h
@@ -15,8 +15,6 @@ static inline bool is_secure_guest(void)
 	return mfmsr() & MSR_S;
 }
 
-void __init svm_swiotlb_init(void);
-
 void dtl_cache_ctor(void *addr);
 #define get_dtl_cache_ctor()	(is_secure_guest() ? dtl_cache_ctor : NULL)
 
@@ -27,8 +25,6 @@ static inline bool is_secure_guest(void)
 	return false;
 }
 
-static inline void svm_swiotlb_init(void) {}
-
 #define get_dtl_cache_ctor() NULL
 
 #endif /* CONFIG_PPC_SVM */
diff --git a/arch/powerpc/include/asm/swiotlb.h b/arch/powerpc/include/asm/swiotlb.h
index 3c1a1cd161286..4203b5e0a88ed 100644
--- a/arch/powerpc/include/asm/swiotlb.h
+++ b/arch/powerpc/include/asm/swiotlb.h
@@ -9,6 +9,7 @@
 #include <linux/swiotlb.h>
 
 extern unsigned int ppc_swiotlb_enable;
+extern unsigned int ppc_swiotlb_flags;
 
 #ifdef CONFIG_SWIOTLB
 void swiotlb_detect_4g(void);
diff --git a/arch/powerpc/kernel/dma-swiotlb.c b/arch/powerpc/kernel/dma-swiotlb.c
index fc7816126a401..ba256c37bcc0f 100644
--- a/arch/powerpc/kernel/dma-swiotlb.c
+++ b/arch/powerpc/kernel/dma-swiotlb.c
@@ -10,6 +10,7 @@
 #include <asm/swiotlb.h>
 
 unsigned int ppc_swiotlb_enable;
+unsigned int ppc_swiotlb_flags;
 
 void __init swiotlb_detect_4g(void)
 {
diff --git a/arch/powerpc/mm/mem.c b/arch/powerpc/mm/mem.c
index e1519e2edc656..a4d65418c30a9 100644
--- a/arch/powerpc/mm/mem.c
+++ b/arch/powerpc/mm/mem.c
@@ -249,10 +249,7 @@ void __init mem_init(void)
 	 * back to to-down.
 	 */
 	memblock_set_bottom_up(true);
-	if (is_secure_guest())
-		svm_swiotlb_init();
-	else
-		swiotlb_init(ppc_swiotlb_enable, 0);
+	swiotlb_init(ppc_swiotlb_enable, ppc_swiotlb_flags);
 #endif
 
 	high_memory = (void *) __va(max_low_pfn * PAGE_SIZE);
diff --git a/arch/powerpc/platforms/pseries/svm.c b/arch/powerpc/platforms/pseries/svm.c
index c5228f4969eb2..3b4045d508ec8 100644
--- a/arch/powerpc/platforms/pseries/svm.c
+++ b/arch/powerpc/platforms/pseries/svm.c
@@ -28,7 +28,7 @@ static int __init init_svm(void)
 	 * need to use the SWIOTLB buffer for DMA even if dma_capable() says
 	 * otherwise.
 	 */
-	swiotlb_force = SWIOTLB_FORCE;
+	ppc_swiotlb_flags |= SWIOTLB_ANY | SWIOTLB_FORCE;
 
 	/* Share the SWIOTLB buffer with the host. */
 	swiotlb_update_mem_attributes();
@@ -37,30 +37,6 @@ static int __init init_svm(void)
 }
 machine_early_initcall(pseries, init_svm);
 
-/*
- * Initialize SWIOTLB. Essentially the same as swiotlb_init(), except that it
- * can allocate the buffer anywhere in memory. Since the hypervisor doesn't have
- * any addressing limitation, we don't need to allocate it in low addresses.
- */
-void __init svm_swiotlb_init(void)
-{
-	unsigned char *vstart;
-	unsigned long bytes, io_tlb_nslabs;
-
-	io_tlb_nslabs = (swiotlb_size_or_default() >> IO_TLB_SHIFT);
-	io_tlb_nslabs = ALIGN(io_tlb_nslabs, IO_TLB_SEGSIZE);
-
-	bytes = io_tlb_nslabs << IO_TLB_SHIFT;
-
-	vstart = memblock_alloc(PAGE_ALIGN(bytes), PAGE_SIZE);
-	if (vstart && !swiotlb_init_with_tbl(vstart, io_tlb_nslabs, false))
-		return;
-
-
-	memblock_free(vstart, PAGE_ALIGN(io_tlb_nslabs << IO_TLB_SHIFT));
-	panic("SVM: Cannot allocate SWIOTLB buffer");
-}
-
 int set_memory_encrypted(unsigned long addr, int numpages)
 {
 	if (!cc_platform_has(CC_ATTR_MEM_ENCRYPT))
diff --git a/include/linux/swiotlb.h b/include/linux/swiotlb.h
index ae0407173e845..eabdd89987027 100644
--- a/include/linux/swiotlb.h
+++ b/include/linux/swiotlb.h
@@ -15,6 +15,7 @@ struct scatterlist;
 
 #define SWIOTLB_VERBOSE	(1 << 0) /* verbose initialization */
 #define SWIOTLB_FORCE	(1 << 1) /* force bounce buffering */
+#define SWIOTLB_ANY	(1 << 2) /* allow any memory for the buffer */
 
 /*
  * Maximum allowable number of contiguous slabs to map,
diff --git a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c
index 5ac6e128d4279..2ad12562c94fe 100644
--- a/kernel/dma/swiotlb.c
+++ b/kernel/dma/swiotlb.c
@@ -266,8 +266,15 @@ void __init swiotlb_init(bool addressing_limit, unsigned int flags)
 	if (swiotlb_force_disable)
 		return;
 
-	/* Get IO TLB memory from the low pages */
-	tlb = memblock_alloc_low(bytes, PAGE_SIZE);
+	/*
+	 * By default allocate the bounce buffer memory from low memory, but
+	 * allow to pick a location everywhere for hypervisors with guest
+	 * memory encryption.
+	 */
+	if (flags & SWIOTLB_ANY)
+		tlb = memblock_alloc(bytes, PAGE_SIZE);
+	else
+		tlb = memblock_alloc_low(bytes, PAGE_SIZE);
 	if (!tlb)
 		goto fail;
 	if (swiotlb_init_with_tbl(tlb, default_nslabs, flags))
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 07:36:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 07:36:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289970.491777 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfFb-0003Hu-8I; Mon, 14 Mar 2022 07:36:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289970.491777; Mon, 14 Mar 2022 07:36:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfFb-0003Hn-51; Mon, 14 Mar 2022 07:36:19 +0000
Received: by outflank-mailman (input) for mailman id 289970;
 Mon, 14 Mar 2022 07:36:17 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=BEku=TZ=bombadil.srs.infradead.org=BATV+605a0c0c3369109790a8+6777+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nTfBw-00056d-2M
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 07:32:32 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e79b489a-a368-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 08:32:30 +0100 (CET)
Received: from [46.140.54.162] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nTfBd-0044s6-8e; Mon, 14 Mar 2022 07:32:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e79b489a-a368-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=1FAMfRRw2aEYg6ugW17iKWYRmxGcWkT9OJlmJuUFHKk=; b=KGIzp2JLMsNz/9/O53m5dQCL/i
	9BIvOegjPn8f4pkgr2+hRsdTiUliDURRbQCNFxlTB2u18aoIHj/u4p9P3yh7cnSwXDZ98ZmeE/LwQ
	VFFc7Kbhx+orXeTs7dfJKtCujBIryxvTOrmg3tHPjhJwb19T9fzrx+e+AqbpQ5q6G7p2BOLrBeHJQ
	9LvmnG6yYRQx0G0DIAr/9X5lQknf2sP+SEYD9Ev2Y38Hc6Ny6PG0zj/k8R334QV87OMF3fuyGaw0U
	QmxV/6ZhNQ8teCnAONpK494UOjRP0mAO1NIbxgUgHTLV6tBzl1LnrTBHEe9f0nmyeNvpEDFAhvbFA
	WTzyb3Mg==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: [PATCH 13/15] swiotlb: merge swiotlb-xen initialization into swiotlb
Date: Mon, 14 Mar 2022 08:31:27 +0100
Message-Id: <20220314073129.1862284-14-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220314073129.1862284-1-hch@lst.de>
References: <20220314073129.1862284-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

Reuse the generic swiotlb initialization for xen-swiotlb.  For ARM/ARM64
this works trivially, while for x86 xen_swiotlb_fixup needs to be passed
as the remap argument to swiotlb_init_remap/swiotlb_init_late.

Signed-off-by: Christoph Hellwig <hch@lst.de>
---
 arch/arm/xen/mm.c               |  21 +++---
 arch/x86/include/asm/xen/page.h |   5 --
 arch/x86/kernel/pci-dma.c       |  19 +++--
 drivers/xen/swiotlb-xen.c       | 128 +-------------------------------
 include/xen/arm/page.h          |   1 -
 include/xen/swiotlb-xen.h       |   8 +-
 6 files changed, 27 insertions(+), 155 deletions(-)

diff --git a/arch/arm/xen/mm.c b/arch/arm/xen/mm.c
index 28c2070602535..ff05a7899cb86 100644
--- a/arch/arm/xen/mm.c
+++ b/arch/arm/xen/mm.c
@@ -23,22 +23,20 @@
 #include <asm/xen/hypercall.h>
 #include <asm/xen/interface.h>
 
-unsigned long xen_get_swiotlb_free_pages(unsigned int order)
+static gfp_t xen_swiotlb_gfp(void)
 {
 	phys_addr_t base;
-	gfp_t flags = __GFP_NOWARN|__GFP_KSWAPD_RECLAIM;
 	u64 i;
 
 	for_each_mem_range(i, &base, NULL) {
 		if (base < (phys_addr_t)0xffffffff) {
 			if (IS_ENABLED(CONFIG_ZONE_DMA32))
-				flags |= __GFP_DMA32;
-			else
-				flags |= __GFP_DMA;
-			break;
+				return __GFP_DMA32;
+			return __GFP_DMA;
 		}
 	}
-	return __get_free_pages(flags, order);
+
+	return GFP_KERNEL;
 }
 
 static bool hypercall_cflush = false;
@@ -140,10 +138,13 @@ static int __init xen_mm_init(void)
 	if (!xen_swiotlb_detect())
 		return 0;
 
-	rc = xen_swiotlb_init();
 	/* we can work with the default swiotlb */
-	if (rc < 0 && rc != -EEXIST)
-		return rc;
+	if (!io_tlb_default_mem.nslabs) {
+		rc = swiotlb_init_late(swiotlb_size_or_default(),
+				       xen_swiotlb_gfp(), NULL);
+		if (rc < 0)
+			return rc;
+	}
 
 	cflush.op = 0;
 	cflush.a.dev_bus_addr = 0;
diff --git a/arch/x86/include/asm/xen/page.h b/arch/x86/include/asm/xen/page.h
index e989bc2269f54..1fc67df500145 100644
--- a/arch/x86/include/asm/xen/page.h
+++ b/arch/x86/include/asm/xen/page.h
@@ -357,9 +357,4 @@ static inline bool xen_arch_need_swiotlb(struct device *dev,
 	return false;
 }
 
-static inline unsigned long xen_get_swiotlb_free_pages(unsigned int order)
-{
-	return __get_free_pages(__GFP_NOWARN, order);
-}
-
 #endif /* _ASM_X86_XEN_PAGE_H */
diff --git a/arch/x86/kernel/pci-dma.c b/arch/x86/kernel/pci-dma.c
index a705a199bf8a3..dbb7b83fc3e48 100644
--- a/arch/x86/kernel/pci-dma.c
+++ b/arch/x86/kernel/pci-dma.c
@@ -72,15 +72,12 @@ static inline void __init pci_swiotlb_detect(void)
 #endif /* CONFIG_SWIOTLB */
 
 #ifdef CONFIG_SWIOTLB_XEN
-static bool xen_swiotlb;
-
 static void __init pci_xen_swiotlb_init(void)
 {
 	if (!xen_initial_domain() && !x86_swiotlb_enable)
 		return;
 	x86_swiotlb_enable = true;
-	xen_swiotlb = true;
-	xen_swiotlb_init_early();
+	swiotlb_init_remap(true, x86_swiotlb_flags, xen_swiotlb_fixup);
 	dma_ops = &xen_swiotlb_dma_ops;
 	if (IS_ENABLED(CONFIG_PCI))
 		pci_request_acs();
@@ -88,14 +85,16 @@ static void __init pci_xen_swiotlb_init(void)
 
 int pci_xen_swiotlb_init_late(void)
 {
-	int rc;
-
-	if (xen_swiotlb)
+	if (dma_ops == &xen_swiotlb_dma_ops)
 		return 0;
 
-	rc = xen_swiotlb_init();
-	if (rc)
-		return rc;
+	/* we can work with the default swiotlb */
+	if (!io_tlb_default_mem.nslabs) {
+		int rc = swiotlb_init_late(swiotlb_size_or_default(),
+					   GFP_KERNEL, xen_swiotlb_fixup);
+		if (rc < 0)
+			return rc;
+	}
 
 	/* XXX: this switches the dma ops under live devices! */
 	dma_ops = &xen_swiotlb_dma_ops;
diff --git a/drivers/xen/swiotlb-xen.c b/drivers/xen/swiotlb-xen.c
index c2da3eb4826e8..df8085b50df10 100644
--- a/drivers/xen/swiotlb-xen.c
+++ b/drivers/xen/swiotlb-xen.c
@@ -104,7 +104,7 @@ static int is_xen_swiotlb_buffer(struct device *dev, dma_addr_t dma_addr)
 	return 0;
 }
 
-static int xen_swiotlb_fixup(void *buf, unsigned long nslabs)
+int xen_swiotlb_fixup(void *buf, unsigned long nslabs)
 {
 	int rc;
 	unsigned int order = get_order(IO_TLB_SEGSIZE << IO_TLB_SHIFT);
@@ -130,132 +130,6 @@ static int xen_swiotlb_fixup(void *buf, unsigned long nslabs)
 	return 0;
 }
 
-enum xen_swiotlb_err {
-	XEN_SWIOTLB_UNKNOWN = 0,
-	XEN_SWIOTLB_ENOMEM,
-	XEN_SWIOTLB_EFIXUP
-};
-
-static const char *xen_swiotlb_error(enum xen_swiotlb_err err)
-{
-	switch (err) {
-	case XEN_SWIOTLB_ENOMEM:
-		return "Cannot allocate Xen-SWIOTLB buffer\n";
-	case XEN_SWIOTLB_EFIXUP:
-		return "Failed to get contiguous memory for DMA from Xen!\n"\
-		    "You either: don't have the permissions, do not have"\
-		    " enough free memory under 4GB, or the hypervisor memory"\
-		    " is too fragmented!";
-	default:
-		break;
-	}
-	return "";
-}
-
-int xen_swiotlb_init(void)
-{
-	enum xen_swiotlb_err m_ret = XEN_SWIOTLB_UNKNOWN;
-	unsigned long bytes = swiotlb_size_or_default();
-	unsigned long nslabs = bytes >> IO_TLB_SHIFT;
-	unsigned int order, repeat = 3;
-	int rc = -ENOMEM;
-	char *start;
-
-	if (io_tlb_default_mem.nslabs) {
-		pr_warn("swiotlb buffer already initialized\n");
-		return -EEXIST;
-	}
-
-retry:
-	m_ret = XEN_SWIOTLB_ENOMEM;
-	order = get_order(bytes);
-
-	/*
-	 * Get IO TLB memory from any location.
-	 */
-#define SLABS_PER_PAGE (1 << (PAGE_SHIFT - IO_TLB_SHIFT))
-#define IO_TLB_MIN_SLABS ((1<<20) >> IO_TLB_SHIFT)
-	while ((SLABS_PER_PAGE << order) > IO_TLB_MIN_SLABS) {
-		start = (void *)xen_get_swiotlb_free_pages(order);
-		if (start)
-			break;
-		order--;
-	}
-	if (!start)
-		goto exit;
-	if (order != get_order(bytes)) {
-		pr_warn("Warning: only able to allocate %ld MB for software IO TLB\n",
-			(PAGE_SIZE << order) >> 20);
-		nslabs = SLABS_PER_PAGE << order;
-		bytes = nslabs << IO_TLB_SHIFT;
-	}
-
-	/*
-	 * And replace that memory with pages under 4GB.
-	 */
-	rc = xen_swiotlb_fixup(start, nslabs);
-	if (rc) {
-		free_pages((unsigned long)start, order);
-		m_ret = XEN_SWIOTLB_EFIXUP;
-		goto error;
-	}
-	rc = swiotlb_late_init_with_tbl(start, nslabs);
-	if (rc)
-		return rc;
-	return 0;
-error:
-	if (nslabs > 1024 && repeat--) {
-		/* Min is 2MB */
-		nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
-		bytes = nslabs << IO_TLB_SHIFT;
-		pr_info("Lowering to %luMB\n", bytes >> 20);
-		goto retry;
-	}
-exit:
-	pr_err("%s (rc:%d)\n", xen_swiotlb_error(m_ret), rc);
-	return rc;
-}
-
-#ifdef CONFIG_X86
-void __init xen_swiotlb_init_early(void)
-{
-	unsigned long bytes = swiotlb_size_or_default();
-	unsigned long nslabs = bytes >> IO_TLB_SHIFT;
-	unsigned int repeat = 3;
-	char *start;
-	int rc;
-
-retry:
-	/*
-	 * Get IO TLB memory from any location.
-	 */
-	start = memblock_alloc(PAGE_ALIGN(bytes),
-			       IO_TLB_SEGSIZE << IO_TLB_SHIFT);
-	if (!start)
-		panic("%s: Failed to allocate %lu bytes\n",
-		      __func__, PAGE_ALIGN(bytes));
-
-	/*
-	 * And replace that memory with pages under 4GB.
-	 */
-	rc = xen_swiotlb_fixup(start, nslabs);
-	if (rc) {
-		memblock_free(start, PAGE_ALIGN(bytes));
-		if (nslabs > 1024 && repeat--) {
-			/* Min is 2MB */
-			nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
-			bytes = nslabs << IO_TLB_SHIFT;
-			pr_info("Lowering to %luMB\n", bytes >> 20);
-			goto retry;
-		}
-		panic("%s (rc:%d)", xen_swiotlb_error(XEN_SWIOTLB_EFIXUP), rc);
-	}
-
-	if (swiotlb_init_with_tbl(start, nslabs, SWIOTLB_VERBOSE))
-		panic("Cannot allocate SWIOTLB buffer");
-}
-#endif /* CONFIG_X86 */
-
 static void *
 xen_swiotlb_alloc_coherent(struct device *hwdev, size_t size,
 			   dma_addr_t *dma_handle, gfp_t flags,
diff --git a/include/xen/arm/page.h b/include/xen/arm/page.h
index ac1b654705631..7e199c6656b90 100644
--- a/include/xen/arm/page.h
+++ b/include/xen/arm/page.h
@@ -115,6 +115,5 @@ static inline bool set_phys_to_machine(unsigned long pfn, unsigned long mfn)
 bool xen_arch_need_swiotlb(struct device *dev,
 			   phys_addr_t phys,
 			   dma_addr_t dev_addr);
-unsigned long xen_get_swiotlb_free_pages(unsigned int order);
 
 #endif /* _ASM_ARM_XEN_PAGE_H */
diff --git a/include/xen/swiotlb-xen.h b/include/xen/swiotlb-xen.h
index b3e647f86e3e2..590ceb923f0c8 100644
--- a/include/xen/swiotlb-xen.h
+++ b/include/xen/swiotlb-xen.h
@@ -10,8 +10,12 @@ void xen_dma_sync_for_cpu(struct device *dev, dma_addr_t handle,
 void xen_dma_sync_for_device(struct device *dev, dma_addr_t handle,
 			     size_t size, enum dma_data_direction dir);
 
-int xen_swiotlb_init(void);
-void __init xen_swiotlb_init_early(void);
+#ifdef CONFIG_SWIOTLB_XEN
+int xen_swiotlb_fixup(void *buf, unsigned long nslabs);
+#else
+#define xen_swiotlb_fixup NULL
+#endif
+
 extern const struct dma_map_ops xen_swiotlb_dma_ops;
 
 #endif /* __LINUX_SWIOTLB_XEN_H */
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 07:36:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 07:36:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289971.491788 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfFn-0003fD-JG; Mon, 14 Mar 2022 07:36:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289971.491788; Mon, 14 Mar 2022 07:36:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfFn-0003ei-EJ; Mon, 14 Mar 2022 07:36:31 +0000
Received: by outflank-mailman (input) for mailman id 289971;
 Mon, 14 Mar 2022 07:36:30 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=BEku=TZ=bombadil.srs.infradead.org=BATV+605a0c0c3369109790a8+6777+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nTfBp-00056d-SL
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 07:32:25 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e40776c1-a368-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 08:32:25 +0100 (CET)
Received: from [46.140.54.162] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nTfBX-0044nI-NE; Mon, 14 Mar 2022 07:32:08 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e40776c1-a368-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=z/er+v+IsLn/3DGDcWTENkiYhlg652Y98Hj6qBpRkNM=; b=T6Y3N/uUE3h/14YStboRzoVFc/
	9GfPPPiQd9PwYJqMRTOm0smey062UGJjZdeQZ9x0qWOemaH54g1ClNwdlxvpRhwgYnXiW5KIAxr/K
	0ViIWjUq2r0uqQwCJOnDObCWM2sgMkrRm+yHUkWtw73Q3liFGhUVwItXaqZymyO6/dwPOeEuZGgic
	vt7rZvwQsgvigoSxECM40cJSIH9vvMz5ucLySpLwPPc8PaMJsrw6tdkHiuxSJZFXbg98u8YA2zmsH
	4lidVtIkikm+amhl35GxiJRKhzpKdfqaC0KZ0xADQbJRGXRScG3/pvHuAePMU0dudcrXIJ0h7PCMq
	JLagJkvA==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: [PATCH 11/15] swiotlb: pass a gfp_mask argument to swiotlb_init_late
Date: Mon, 14 Mar 2022 08:31:25 +0100
Message-Id: <20220314073129.1862284-12-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220314073129.1862284-1-hch@lst.de>
References: <20220314073129.1862284-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

Let the caller chose a zone to allocate from.  This will be used
later on by the xen-swiotlb initialization on arm.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Reviewed-by: Anshuman Khandual <anshuman.khandual@arm.com>
---
 arch/x86/pci/sta2x11-fixup.c | 2 +-
 include/linux/swiotlb.h      | 2 +-
 kernel/dma/swiotlb.c         | 7 ++-----
 3 files changed, 4 insertions(+), 7 deletions(-)

diff --git a/arch/x86/pci/sta2x11-fixup.c b/arch/x86/pci/sta2x11-fixup.c
index e0c039a75b2db..c7e6faf59a861 100644
--- a/arch/x86/pci/sta2x11-fixup.c
+++ b/arch/x86/pci/sta2x11-fixup.c
@@ -57,7 +57,7 @@ static void sta2x11_new_instance(struct pci_dev *pdev)
 		int size = STA2X11_SWIOTLB_SIZE;
 		/* First instance: register your own swiotlb area */
 		dev_info(&pdev->dev, "Using SWIOTLB (size %i)\n", size);
-		if (swiotlb_init_late(size))
+		if (swiotlb_init_late(size, GFP_DMA))
 			dev_emerg(&pdev->dev, "init swiotlb failed\n");
 	}
 	list_add(&instance->list, &sta2x11_instance_list);
diff --git a/include/linux/swiotlb.h b/include/linux/swiotlb.h
index eabdd89987027..ee655f2e4d28b 100644
--- a/include/linux/swiotlb.h
+++ b/include/linux/swiotlb.h
@@ -37,7 +37,7 @@ struct scatterlist;
 int swiotlb_init_with_tbl(char *tlb, unsigned long nslabs, unsigned int flags);
 unsigned long swiotlb_size_or_default(void);
 extern int swiotlb_late_init_with_tbl(char *tlb, unsigned long nslabs);
-int swiotlb_init_late(size_t size);
+int swiotlb_init_late(size_t size, gfp_t gfp_mask);
 extern void __init swiotlb_update_mem_attributes(void);
 
 phys_addr_t swiotlb_tbl_map_single(struct device *hwdev, phys_addr_t phys,
diff --git a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c
index 2ad12562c94fe..79641c446d284 100644
--- a/kernel/dma/swiotlb.c
+++ b/kernel/dma/swiotlb.c
@@ -292,7 +292,7 @@ void __init swiotlb_init(bool addressing_limit, unsigned int flags)
  * initialize the swiotlb later using the slab allocator if needed.
  * This should be just like above, but with some error catching.
  */
-int swiotlb_init_late(size_t size)
+int swiotlb_init_late(size_t size, gfp_t gfp_mask)
 {
 	unsigned long nslabs = ALIGN(size >> IO_TLB_SHIFT, IO_TLB_SEGSIZE);
 	unsigned long bytes;
@@ -303,15 +303,12 @@ int swiotlb_init_late(size_t size)
 	if (swiotlb_force_disable)
 		return 0;
 
-	/*
-	 * Get IO TLB memory from the low pages
-	 */
 	order = get_order(nslabs << IO_TLB_SHIFT);
 	nslabs = SLABS_PER_PAGE << order;
 	bytes = nslabs << IO_TLB_SHIFT;
 
 	while ((SLABS_PER_PAGE << order) > IO_TLB_MIN_SLABS) {
-		vstart = (void *)__get_free_pages(GFP_DMA | __GFP_NOWARN,
+		vstart = (void *)__get_free_pages(gfp_mask | __GFP_NOWARN,
 						  order);
 		if (vstart)
 			break;
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 07:36:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 07:36:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289973.491799 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfFq-00041A-SK; Mon, 14 Mar 2022 07:36:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289973.491799; Mon, 14 Mar 2022 07:36:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfFq-000413-O4; Mon, 14 Mar 2022 07:36:34 +0000
Received: by outflank-mailman (input) for mailman id 289973;
 Mon, 14 Mar 2022 07:36:33 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=BEku=TZ=bombadil.srs.infradead.org=BATV+605a0c0c3369109790a8+6777+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nTfBt-0005vt-L7
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 07:32:29 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id e618dfd3-a368-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 08:32:28 +0100 (CET)
Received: from [46.140.54.162] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nTfBa-0044pG-D4; Mon, 14 Mar 2022 07:32:11 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e618dfd3-a368-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=tCQPVGkfrukt4Dhgd/m8K7XGtVrl0r8X20GxVdNHixk=; b=ENNItxcdsAagWAfjgj/8+y982H
	gh50MENeg/ax/OS7Fov6li0O5SQnNLVr0BqfVzuuzju/FcYqJlRTQJPJL3BrzIDsJO3ks0LS+ILtS
	CkJEYoIwpoL6ptQvzrS2W+46fwBq3U2+fJ6IoE5tCVcnuI0z+6fYNN+VOkwK8P6ZsBEnNHweD8G76
	JXrWKYiQ++5QYu2v027qSoahDtSHnSCymKyy1r1TMGpw067rLd/NUVSZmMK515LT0f9U5pLn9XuEd
	SUNEsRc/aLRyqWwRUpskuuDHXD0b4X4VXD3Y3IYvp1A+0MPW28KuwT+adBEIHIzoAtbobOA8f0sNd
	7/N4x57g==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: [PATCH 12/15] swiotlb: provide swiotlb_init variants that remap the buffer
Date: Mon, 14 Mar 2022 08:31:26 +0100
Message-Id: <20220314073129.1862284-13-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220314073129.1862284-1-hch@lst.de>
References: <20220314073129.1862284-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

To shared more code between swiotlb and xen-swiotlb, offer a
swiotlb_init_remap interface and add a remap callback to
swiotlb_init_late that will allow Xen to remap the buffer the
buffer without duplicating much of the logic.

Signed-off-by: Christoph Hellwig <hch@lst.de>
---
 arch/x86/pci/sta2x11-fixup.c |  2 +-
 include/linux/swiotlb.h      |  5 ++++-
 kernel/dma/swiotlb.c         | 38 +++++++++++++++++++++++++++++++++---
 3 files changed, 40 insertions(+), 5 deletions(-)

diff --git a/arch/x86/pci/sta2x11-fixup.c b/arch/x86/pci/sta2x11-fixup.c
index c7e6faf59a861..7368afc039987 100644
--- a/arch/x86/pci/sta2x11-fixup.c
+++ b/arch/x86/pci/sta2x11-fixup.c
@@ -57,7 +57,7 @@ static void sta2x11_new_instance(struct pci_dev *pdev)
 		int size = STA2X11_SWIOTLB_SIZE;
 		/* First instance: register your own swiotlb area */
 		dev_info(&pdev->dev, "Using SWIOTLB (size %i)\n", size);
-		if (swiotlb_init_late(size, GFP_DMA))
+		if (swiotlb_init_late(size, GFP_DMA, NULL))
 			dev_emerg(&pdev->dev, "init swiotlb failed\n");
 	}
 	list_add(&instance->list, &sta2x11_instance_list);
diff --git a/include/linux/swiotlb.h b/include/linux/swiotlb.h
index ee655f2e4d28b..7b50c82f84ce9 100644
--- a/include/linux/swiotlb.h
+++ b/include/linux/swiotlb.h
@@ -36,8 +36,11 @@ struct scatterlist;
 
 int swiotlb_init_with_tbl(char *tlb, unsigned long nslabs, unsigned int flags);
 unsigned long swiotlb_size_or_default(void);
+void __init swiotlb_init_remap(bool addressing_limit, unsigned int flags,
+	int (*remap)(void *tlb, unsigned long nslabs));
+int swiotlb_init_late(size_t size, gfp_t gfp_mask,
+	int (*remap)(void *tlb, unsigned long nslabs));
 extern int swiotlb_late_init_with_tbl(char *tlb, unsigned long nslabs);
-int swiotlb_init_late(size_t size, gfp_t gfp_mask);
 extern void __init swiotlb_update_mem_attributes(void);
 
 phys_addr_t swiotlb_tbl_map_single(struct device *hwdev, phys_addr_t phys,
diff --git a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c
index 79641c446d284..88ea7b9bce6e9 100644
--- a/kernel/dma/swiotlb.c
+++ b/kernel/dma/swiotlb.c
@@ -256,9 +256,11 @@ int __init swiotlb_init_with_tbl(char *tlb, unsigned long nslabs,
  * Statically reserve bounce buffer space and initialize bounce buffer data
  * structures for the software IO TLB used to implement the DMA API.
  */
-void __init swiotlb_init(bool addressing_limit, unsigned int flags)
+void __init swiotlb_init_remap(bool addressing_limit, unsigned int flags,
+		int (*remap)(void *tlb, unsigned long nslabs))
 {
-	size_t bytes = PAGE_ALIGN(default_nslabs << IO_TLB_SHIFT);
+	unsigned long nslabs = default_nslabs;
+	size_t bytes;
 	void *tlb;
 
 	if (!addressing_limit && !swiotlb_force_bounce)
@@ -271,12 +273,24 @@ void __init swiotlb_init(bool addressing_limit, unsigned int flags)
 	 * allow to pick a location everywhere for hypervisors with guest
 	 * memory encryption.
 	 */
+retry:
+	bytes = PAGE_ALIGN(default_nslabs << IO_TLB_SHIFT);
 	if (flags & SWIOTLB_ANY)
 		tlb = memblock_alloc(bytes, PAGE_SIZE);
 	else
 		tlb = memblock_alloc_low(bytes, PAGE_SIZE);
 	if (!tlb)
 		goto fail;
+	if (remap && remap(tlb, nslabs) < 0) {
+		memblock_free(tlb, PAGE_ALIGN(bytes));
+
+		/* Min is 2MB */
+		if (nslabs <= 1024)
+			panic("%s: Failed to remap %zu bytes\n",
+			      __func__, bytes);
+		nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
+		goto retry;
+	}
 	if (swiotlb_init_with_tbl(tlb, default_nslabs, flags))
 		goto fail_free_mem;
 	return;
@@ -287,12 +301,18 @@ void __init swiotlb_init(bool addressing_limit, unsigned int flags)
 	pr_warn("Cannot allocate buffer");
 }
 
+void __init swiotlb_init(bool addressing_limit, unsigned int flags)
+{
+	return swiotlb_init_remap(addressing_limit, flags, NULL);
+}
+
 /*
  * Systems with larger DMA zones (those that don't support ISA) can
  * initialize the swiotlb later using the slab allocator if needed.
  * This should be just like above, but with some error catching.
  */
-int swiotlb_init_late(size_t size, gfp_t gfp_mask)
+int swiotlb_init_late(size_t size, gfp_t gfp_mask,
+		int (*remap)(void *tlb, unsigned long nslabs))
 {
 	unsigned long nslabs = ALIGN(size >> IO_TLB_SHIFT, IO_TLB_SEGSIZE);
 	unsigned long bytes;
@@ -303,6 +323,7 @@ int swiotlb_init_late(size_t size, gfp_t gfp_mask)
 	if (swiotlb_force_disable)
 		return 0;
 
+retry:
 	order = get_order(nslabs << IO_TLB_SHIFT);
 	nslabs = SLABS_PER_PAGE << order;
 	bytes = nslabs << IO_TLB_SHIFT;
@@ -317,6 +338,17 @@ int swiotlb_init_late(size_t size, gfp_t gfp_mask)
 
 	if (!vstart)
 		return -ENOMEM;
+	if (remap)
+		rc = remap(vstart, nslabs);
+	if (rc) {
+		free_pages((unsigned long)vstart, order);
+ 
+		/* Min is 2MB */
+		if (nslabs <= 1024)
+			return rc;
+		nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
+		goto retry;
+	}
 
 	if (order != get_order(bytes)) {
 		pr_warn("only able to allocate %ld MB\n",
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 07:36:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 07:36:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289974.491802 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfFr-000441-7r; Mon, 14 Mar 2022 07:36:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289974.491802; Mon, 14 Mar 2022 07:36:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfFr-00043L-17; Mon, 14 Mar 2022 07:36:35 +0000
Received: by outflank-mailman (input) for mailman id 289974;
 Mon, 14 Mar 2022 07:36:33 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=BEku=TZ=bombadil.srs.infradead.org=BATV+605a0c0c3369109790a8+6777+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nTfC0-0005vt-MK
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 07:32:36 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ea411c8f-a368-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 08:32:35 +0100 (CET)
Received: from [46.140.54.162] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nTfBi-0044wm-QZ; Mon, 14 Mar 2022 07:32:19 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ea411c8f-a368-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=zCMW1Q+QCPXYuvBuEGOZUQKFwE9OwdLFtYhltvQ29K4=; b=vIJ2oE33+/DMOwDU/JixqH774f
	4HcyxfW75FjmmRylwNxtYUZ/EQtjckE6WUtJCk9FMmZ9UiNrJUQNReUkRYB9gehR9d8FPU1StVV25
	mDZAU61IRRH6aevchvran8PrU1UUMctkO1s07C1dw7LyB44+FDPejkmKQZWLyMHg5oTrChOy5x3wo
	MfT4/jWOnm16vvedpWLshlHmUjvCe5TTKasktRFAsL18gH/ZI5fWAS0KZoTBRUiVEpg29wVYcYU1M
	9OpeHj+MXwuceM9FZp/nCmHAVa7rGsk1e3aB6Qq0bvLlVR46azzHlVR3oWpheK6+ceqEjGSc2s8WB
	kPKhfqNA==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: [PATCH 15/15] x86: remove cruft from <asm/dma-mapping.h>
Date: Mon, 14 Mar 2022 08:31:29 +0100
Message-Id: <20220314073129.1862284-16-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220314073129.1862284-1-hch@lst.de>
References: <20220314073129.1862284-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

<asm/dma-mapping.h> gets pulled in by all drivers using the DMA API.
Remove x86 internal variables and unnecessary includes from it.

Signed-off-by: Christoph Hellwig <hch@lst.de>
---
 arch/x86/include/asm/dma-mapping.h | 11 -----------
 arch/x86/include/asm/iommu.h       |  2 ++
 2 files changed, 2 insertions(+), 11 deletions(-)

diff --git a/arch/x86/include/asm/dma-mapping.h b/arch/x86/include/asm/dma-mapping.h
index 256fd8115223d..1c66708e30623 100644
--- a/arch/x86/include/asm/dma-mapping.h
+++ b/arch/x86/include/asm/dma-mapping.h
@@ -2,17 +2,6 @@
 #ifndef _ASM_X86_DMA_MAPPING_H
 #define _ASM_X86_DMA_MAPPING_H
 
-/*
- * IOMMU interface. See Documentation/core-api/dma-api-howto.rst and
- * Documentation/core-api/dma-api.rst for documentation.
- */
-
-#include <linux/scatterlist.h>
-#include <asm/io.h>
-
-extern int iommu_merge;
-extern int panic_on_overflow;
-
 extern const struct dma_map_ops *dma_ops;
 
 static inline const struct dma_map_ops *get_arch_dma_ops(struct bus_type *bus)
diff --git a/arch/x86/include/asm/iommu.h b/arch/x86/include/asm/iommu.h
index dba89ed40d38d..0bef44d30a278 100644
--- a/arch/x86/include/asm/iommu.h
+++ b/arch/x86/include/asm/iommu.h
@@ -8,6 +8,8 @@
 
 extern int force_iommu, no_iommu;
 extern int iommu_detected;
+extern int iommu_merge;
+extern int panic_on_overflow;
 
 #ifdef CONFIG_SWIOTLB
 extern bool x86_swiotlb_enable;
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 07:36:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 07:36:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289975.491811 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfFr-00049j-Pl; Mon, 14 Mar 2022 07:36:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289975.491811; Mon, 14 Mar 2022 07:36:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfFr-00047e-CC; Mon, 14 Mar 2022 07:36:35 +0000
Received: by outflank-mailman (input) for mailman id 289975;
 Mon, 14 Mar 2022 07:36:33 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=BEku=TZ=bombadil.srs.infradead.org=BATV+605a0c0c3369109790a8+6777+infradead.org+hch@srs-se1.protection.inumbo.net>)
 id 1nTfBx-00056d-L6
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 07:32:33 +0000
Received: from bombadil.infradead.org (bombadil.infradead.org
 [2607:7c80:54:e::133])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e8bffa18-a368-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 08:32:32 +0100 (CET)
Received: from [46.140.54.162] (helo=localhost)
 by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux))
 id 1nTfBg-0044uH-2E; Mon, 14 Mar 2022 07:32:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e8bffa18-a368-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding:
	MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender
	:Reply-To:Content-Type:Content-ID:Content-Description;
	bh=dDhiwgQcAwGiyM5bV6HjqpPSPw1ZYuR5pzBsTUAIu7w=; b=Nd0IXyZYwxrXgIDJ9Qm0/nnu/F
	Mt9TAfkB75N48Ae3Up+Y0uwyHDdKoDRxWDLLJLP3GGrVVF3u7f3+tRpuvub8FjFBNd4aw/6KW0vUV
	VPbPrxqDRNkIFNT8McAKXUWPxG6Z+heTadwCb9udXXC9KJL2FmOQRZ31FOYGmkipgixZstyzqL2GA
	UFyG9Yk/FMzwJigMzLreiBJg1ov91gQNkSLz1gD2xxpL7EUvQPuBBFK/whVl0jfD3c8tmg7g/mcFB
	79yNstFQ/NxJPPZSVTTKVF8QucE1PLouj0dsYSJktNDH0IbHUYXjYZJo9FuyvrefY6r8vr1wsZT/F
	ZCtU1P8A==;
From: Christoph Hellwig <hch@lst.de>
To: iommu@lists.linux-foundation.org
Cc: x86@kernel.org,
	Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org,
	linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org,
	linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org,
	linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org,
	tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: [PATCH 14/15] swiotlb: remove swiotlb_init_with_tbl and swiotlb_init_late_with_tbl
Date: Mon, 14 Mar 2022 08:31:28 +0100
Message-Id: <20220314073129.1862284-15-hch@lst.de>
X-Mailer: git-send-email 2.30.2
In-Reply-To: <20220314073129.1862284-1-hch@lst.de>
References: <20220314073129.1862284-1-hch@lst.de>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-SRS-Rewrite: SMTP reverse-path rewritten from <hch@infradead.org> by bombadil.infradead.org. See http://www.infradead.org/rpr.html

No users left.

Signed-off-by: Christoph Hellwig <hch@lst.de>
---
 include/linux/swiotlb.h |  2 -
 kernel/dma/swiotlb.c    | 85 +++++++++++++++--------------------------
 2 files changed, 30 insertions(+), 57 deletions(-)

diff --git a/include/linux/swiotlb.h b/include/linux/swiotlb.h
index 7b50c82f84ce9..7ed35dd3de6e7 100644
--- a/include/linux/swiotlb.h
+++ b/include/linux/swiotlb.h
@@ -34,13 +34,11 @@ struct scatterlist;
 /* default to 64MB */
 #define IO_TLB_DEFAULT_SIZE (64UL<<20)
 
-int swiotlb_init_with_tbl(char *tlb, unsigned long nslabs, unsigned int flags);
 unsigned long swiotlb_size_or_default(void);
 void __init swiotlb_init_remap(bool addressing_limit, unsigned int flags,
 	int (*remap)(void *tlb, unsigned long nslabs));
 int swiotlb_init_late(size_t size, gfp_t gfp_mask,
 	int (*remap)(void *tlb, unsigned long nslabs));
-extern int swiotlb_late_init_with_tbl(char *tlb, unsigned long nslabs);
 extern void __init swiotlb_update_mem_attributes(void);
 
 phys_addr_t swiotlb_tbl_map_single(struct device *hwdev, phys_addr_t phys,
diff --git a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c
index 88ea7b9bce6e9..d04bacdb0905b 100644
--- a/kernel/dma/swiotlb.c
+++ b/kernel/dma/swiotlb.c
@@ -225,33 +225,6 @@ static void swiotlb_init_io_tlb_mem(struct io_tlb_mem *mem, phys_addr_t start,
 	return;
 }
 
-int __init swiotlb_init_with_tbl(char *tlb, unsigned long nslabs,
-		unsigned int flags)
-{
-	struct io_tlb_mem *mem = &io_tlb_default_mem;
-	size_t alloc_size;
-
-	if (swiotlb_force_disable)
-		return 0;
-
-	/* protect against double initialization */
-	if (WARN_ON_ONCE(mem->nslabs))
-		return -ENOMEM;
-
-	alloc_size = PAGE_ALIGN(array_size(sizeof(*mem->slots), nslabs));
-	mem->slots = memblock_alloc(alloc_size, PAGE_SIZE);
-	if (!mem->slots)
-		panic("%s: Failed to allocate %zu bytes align=0x%lx\n",
-		      __func__, alloc_size, PAGE_SIZE);
-
-	swiotlb_init_io_tlb_mem(mem, __pa(tlb), nslabs, false);
-	mem->force_bounce = flags & SWIOTLB_FORCE;
-
-	if (flags & SWIOTLB_VERBOSE)
-		swiotlb_print_info();
-	return 0;
-}
-
 /*
  * Statically reserve bounce buffer space and initialize bounce buffer data
  * structures for the software IO TLB used to implement the DMA API.
@@ -259,7 +232,9 @@ int __init swiotlb_init_with_tbl(char *tlb, unsigned long nslabs,
 void __init swiotlb_init_remap(bool addressing_limit, unsigned int flags,
 		int (*remap)(void *tlb, unsigned long nslabs))
 {
+	struct io_tlb_mem *mem = &io_tlb_default_mem;
 	unsigned long nslabs = default_nslabs;
+	size_t alloc_size = PAGE_ALIGN(array_size(sizeof(*mem->slots), nslabs));
 	size_t bytes;
 	void *tlb;
 
@@ -280,7 +255,8 @@ void __init swiotlb_init_remap(bool addressing_limit, unsigned int flags,
 	else
 		tlb = memblock_alloc_low(bytes, PAGE_SIZE);
 	if (!tlb)
-		goto fail;
+		panic("%s: failed to allocate tlb structure\n", __func__);
+
 	if (remap && remap(tlb, nslabs) < 0) {
 		memblock_free(tlb, PAGE_ALIGN(bytes));
 
@@ -291,14 +267,17 @@ void __init swiotlb_init_remap(bool addressing_limit, unsigned int flags,
 		nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
 		goto retry;
 	}
-	if (swiotlb_init_with_tbl(tlb, default_nslabs, flags))
-		goto fail_free_mem;
-	return;
 
-fail_free_mem:
-	memblock_free(tlb, bytes);
-fail:
-	pr_warn("Cannot allocate buffer");
+	mem->slots = memblock_alloc(alloc_size, PAGE_SIZE);
+	if (!mem->slots)
+		panic("%s: Failed to allocate %zu bytes align=0x%lx\n",
+		      __func__, alloc_size, PAGE_SIZE);
+
+	swiotlb_init_io_tlb_mem(mem, __pa(tlb), default_nslabs, false);
+	mem->force_bounce = flags & SWIOTLB_FORCE;
+
+	if (flags & SWIOTLB_VERBOSE)
+		swiotlb_print_info();
 }
 
 void __init swiotlb_init(bool addressing_limit, unsigned int flags)
@@ -314,6 +293,7 @@ void __init swiotlb_init(bool addressing_limit, unsigned int flags)
 int swiotlb_init_late(size_t size, gfp_t gfp_mask,
 		int (*remap)(void *tlb, unsigned long nslabs))
 {
+	struct io_tlb_mem *mem = &io_tlb_default_mem;
 	unsigned long nslabs = ALIGN(size >> IO_TLB_SHIFT, IO_TLB_SEGSIZE);
 	unsigned long bytes;
 	unsigned char *vstart = NULL;
@@ -355,33 +335,28 @@ int swiotlb_init_late(size_t size, gfp_t gfp_mask,
 			(PAGE_SIZE << order) >> 20);
 		nslabs = SLABS_PER_PAGE << order;
 	}
-	rc = swiotlb_late_init_with_tbl(vstart, nslabs);
-	if (rc)
-		free_pages((unsigned long)vstart, order);
-
-	return rc;
-}
-
-int
-swiotlb_late_init_with_tbl(char *tlb, unsigned long nslabs)
-{
-	struct io_tlb_mem *mem = &io_tlb_default_mem;
-	unsigned long bytes = nslabs << IO_TLB_SHIFT;
 
-	if (swiotlb_force_disable)
-		return 0;
+	if (remap)
+		rc = remap(vstart, nslabs);
+	if (rc) {
+		free_pages((unsigned long)vstart, order);
 
-	/* protect against double initialization */
-	if (WARN_ON_ONCE(mem->nslabs))
-		return -ENOMEM;
+		/* Min is 2MB */
+		if (nslabs <= 1024)
+			return rc;
+		nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
+		goto retry;
+	}
 
 	mem->slots = (void *)__get_free_pages(GFP_KERNEL | __GFP_ZERO,
 		get_order(array_size(sizeof(*mem->slots), nslabs)));
-	if (!mem->slots)
+	if (!mem->slots) {
+		free_pages((unsigned long)vstart, order);
 		return -ENOMEM;
+	}
 
-	set_memory_decrypted((unsigned long)tlb, bytes >> PAGE_SHIFT);
-	swiotlb_init_io_tlb_mem(mem, virt_to_phys(tlb), nslabs, true);
+	set_memory_decrypted((unsigned long)vstart, bytes >> PAGE_SHIFT);
+	swiotlb_init_io_tlb_mem(mem, virt_to_phys(vstart), nslabs, true);
 
 	swiotlb_print_info();
 	return 0;
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 07:36:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 07:36:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.289990.491832 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfG9-0005ku-B4; Mon, 14 Mar 2022 07:36:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 289990.491832; Mon, 14 Mar 2022 07:36:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfG9-0005kl-7B; Mon, 14 Mar 2022 07:36:53 +0000
Received: by outflank-mailman (input) for mailman id 289990;
 Mon, 14 Mar 2022 07:36:52 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=29fN=TZ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nTfCf-00056d-88
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 07:33:17 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 02f66b30-a369-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 08:33:16 +0100 (CET)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur03lp2051.outbound.protection.outlook.com [104.47.8.51]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-37-RxVZ-D7QPsOK1Koy0nd3Ng-1; Mon, 14 Mar 2022 08:33:14 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB7PR04MB5148.eurprd04.prod.outlook.com (2603:10a6:10:14::13) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.28; Mon, 14 Mar
 2022 07:33:11 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 07:33:11 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 02f66b30-a369-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647243195;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=Nk3/gBSQM3XFj4SLDCHDdprdUbPzYyz1f+yxqCkw2Yo=;
	b=HHdJT0PMU+PEPqCnoVjOHFKd5GrVRUpc4UssqAQrQ8a8cDtuaBLowmyvTz8c3CzxnE6iiq
	Wxr0HjsX7ojleTArVQkDA1h4hYJAGJk2n66jjl51Kt2QiRsnnE+vyqGmFaX8koZCWV2NQE
	IDZx5B4Og5wY+dprogBxUMUwHUFdP1M=
X-MC-Unique: RxVZ-D7QPsOK1Koy0nd3Ng-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=D8pRRxauO98wpPMx4jiz3yqnl6lFj/6F9ROf1H9DKsGxWBLR0gMP6HS8oARxcyfTSNYK2cIHJ+U1K0HUh2gr/IZodNV/zKTnGlPEgz1nCi3B2ZciIZKClNqsuyyGmgr1atWwYyc0MfjSx2OcvaCtnYwE57EdbF+g3qAW8q00+TtiBwbJg1PcElNXHPaiTljccQYl3wzxbgoBtRzcMRmkSrTfE8A+zan5l2Iwlit+2ahyJWXVS86I7syd9fTWUsOaNlECZWPyx5bygQ5Xil/W50kv9bMDmijiXmZYq9dkMTyflT2BnGhqPZporYuF5nyLl7DLbTTvIf6ii9PI1xx5Ug==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Nk3/gBSQM3XFj4SLDCHDdprdUbPzYyz1f+yxqCkw2Yo=;
 b=DxzVNd7+fMcQAv5d7Pvw6wv64aNl8k/sa4dKlzEfg2dlgxDVtlPF1rJ96Scx1GHEbYD8EsiiPuO5MvpJWD1B5etgZnps2gBqMOE3Os6fGUbf0/neuoJpPrz84Vb97nG3MpnpEYtNZqNzErSZMW1LGzr8E+z5YlDAhiixuU09vG6E2eQ21j5BwaFnnRFlxCSZerwI2E4bkH8v0tU+pWi5TrNbjfVHS45s5j9hvovOLoWq/N+m2vqkU2mW9FZNpHp1tobcbTZXP7jb7AOvjhmpDzc8qANNbYi8r7D6xkaIS1d5lwvUsD19hrmtiluNizP3d7FTKxmgE2Gmw9Jcb8R0tw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <ca2ad24a-0703-de6c-81a5-e01615f93d21@suse.com>
Date: Mon, 14 Mar 2022 08:33:12 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v3 20/23] VT-d: free all-empty page tables
Content-Language: en-US
To: "Tian, Kevin" <kevin.tian@intel.com>
Cc: "Cooper, Andrew" <andrew.cooper3@citrix.com>, Paul Durrant
 <paul@xen.org>, =?UTF-8?Q?Pau_Monn=c3=a9=2c_Roger?= <roger.pau@citrix.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <76cb9f26-e316-98a2-b1ba-e51e3d20f335@suse.com>
 <807a48fe-3829-d976-75dc-1767d32fb0f4@suse.com>
 <BN9PR11MB527622E58C2E4EF90CF29EF88C379@BN9PR11MB5276.namprd11.prod.outlook.com>
 <9432990c-6de4-ad12-e9fa-12792200748a@suse.com>
 <BN9PR11MB5276930B2AFE79C4961E66548C0F9@BN9PR11MB5276.namprd11.prod.outlook.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <BN9PR11MB5276930B2AFE79C4961E66548C0F9@BN9PR11MB5276.namprd11.prod.outlook.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM5PR04CA0011.eurprd04.prod.outlook.com
 (2603:10a6:206:1::24) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 600f9635-43eb-434a-3c37-08da058ce4a9
X-MS-TrafficTypeDiagnostic: DB7PR04MB5148:EE_
X-Microsoft-Antispam-PRVS:
	<DB7PR04MB51480E193FF8ADA997ACB57BB30F9@DB7PR04MB5148.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	2AJv5gIdM0W7X2PdU5VqNnLGSFWhzKmvr2481b0mn0JVhJICwoUZvMvM70V1Pa29eU3NJdvl/S9b53eWZwBMHIIjt8Nc2Lq9dtU7EEzhuHGLb3/zLr8/kD0ZEZnLTPuvdPRnPpqDnfSq2D2Q4a3/ze5G4vIPVJFx9TDoSfyFecOVG4RgVdR81Uq1RX9/HIT7uln2lOyPxxzRx+dksdy+8TQdsvz+AJDdSsjHsZzVo3FCEiS6yRb1YAqPkrU5TiA6ys2vBAZUOSY7/XvQ432+DtdiT3hJiS0Y0TU4wMSS0HHtS5K105iSSBzSjJQLtybRdoRIwYR1UAEWn629wWWGftouw2vHnn0HYFhD1xOjxuZD7otM1mZ5V6CJuCcYmT25h+8+qBfvK9nOYJzDRivtaK4VJnSRjPZtBBW5kKclkfiqCkHaAmCI4I6191AgvvBlBtP17AKTp5Po6DDtQf9eFODpqpFqunS6bBdNVvoAJfco3JEAwhXo7aPOgokjKD9kJTcIxOVry4pueOWK9Rx7KkckN3g1JicyIdLnyj7Tn4zutvxOSUK5bs5fSBBjPAHaK3o3BDi3jbSG23ENlbq99+Yiurh53Jhxxi2/X1sbvXRm9VCrlYJ4pFmvq6/qcw14B852bnI5GwFYHICRytR8IUOtygDc6FTplpAMqq35aLvc5H34wnw1wWsWHtJEPW9UizsSXLV7kLTpDAWvTsfqDJuim4kljbc5fe4alOjO11w=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(53546011)(66946007)(83380400001)(31686004)(86362001)(31696002)(6486002)(38100700002)(186003)(2906002)(2616005)(36756003)(66556008)(66476007)(26005)(54906003)(316002)(5660300002)(8676002)(4326008)(6916009)(8936002)(6512007)(6506007)(508600001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?TU5lRmtFZGZlVmcrMjJnZFNqTU9qZ1I3eTAxTlQ2ODU2TGhUY2hkYWJJWFdS?=
 =?utf-8?B?aTJUMDkwRkRqWStGbCt2UjFPYnptZlhNcExNaXFVV1NrZFVTaFdXaUdVUXdB?=
 =?utf-8?B?SGtvYkxOeDdmeHRiM21ndnR6RWVBbzRGdG8zakhMYjVidk1ZN3ljM3JyZ1k1?=
 =?utf-8?B?LzRSMHNxMDlWb2dodnBsV05XQ2JVVDR6QmtKL3RlL2hpMy8yWDROWXMxbVo5?=
 =?utf-8?B?cERVdEl3cmNIekR0VTdpQWZqTFRQRTMwTmdsdWFDVU05T0RBSlhkc1VKWlVv?=
 =?utf-8?B?YUNYTWkwejVDYVp1ZXNSS3l6a2Vnalc4ZHU5ZFd0RzdNR0tBR3d2WmI4Vk40?=
 =?utf-8?B?aTM4aXBOK3o3R1ZRSE5xdWttUUVLWmVJRHNtbFhPN00zQ3lnUGJ3RFhhdlJ5?=
 =?utf-8?B?SnlTSzVMYjNhVFUwanlsSjVraVpkcit0M1JWSEQzZGZUZ2RnMWs2VmVZNFVw?=
 =?utf-8?B?TktxaG8zUmk4dFVjNWhrdTM4ZnZQY1IyclFzVFhsZ0d0NTVCZWFXdy9hRTR0?=
 =?utf-8?B?UnBIcTdBZ2RXUVdQS1ozWUlPRGFMY0gzN0VTcUQwVzByZDZhTkd6NTdxRUEy?=
 =?utf-8?B?eGpndDlKRDZWUHBaR3U5amVYVEVzcVRjV0cvb2UwNDRmT3BVQi9iK1U2WVpz?=
 =?utf-8?B?Nko2bndXM1I4ekpNbHkybnBxb25CL1dObDIwZ2lPZkUzOWw4YUhIbjFrNTBa?=
 =?utf-8?B?YWJXbkNhbmJoaDMzMSt0T2lHU1Yzd3JaOHZRY1J3UkU5RE1KVHRCWDRGUzNP?=
 =?utf-8?B?UmlLN25scVZhODNud2xnbnUraGFTS2s0RW9ER0djVlZ1UFpYM2hjRGEyY2hH?=
 =?utf-8?B?Wk1PRmxONzdhVjB3czlHb2pISnBpSGNYVERjWUF2ekl1Z1dwektDcVpXUVZB?=
 =?utf-8?B?TVdxVTY0V2dibVJFMlJ4NGIzbGZwVzYzZlp6Y2hIR1dQUFJMejBUR2RKTTIr?=
 =?utf-8?B?M2UxS1BvdEE4TGlEWXdFekVxWjJMbUsxYXc2NCtVZ0ppTGtIM0ZOVjI2NGht?=
 =?utf-8?B?RkYxSENQZW5lYjEwWkNFTFowajVZRzdRams0U1ZVTlZST0tKbjJmZVF1OGlK?=
 =?utf-8?B?dW5wMnVXQ3E1R1pBTlZuVjhqUG9SS2pwcVpmRDNKT0k2WHZyZ3FDWVcyNjVY?=
 =?utf-8?B?QTJoOHh5b3pGZHJhUFJuc0tyRlAxcmVTQVdQOGNvbGlVaC9aQ21OTTdEa1Q0?=
 =?utf-8?B?MmFvbU94RGx1bVZ2M1RGUThMcHQwYm9Rdm1vL3BnbmtOQ0dSenlHTm94c1pt?=
 =?utf-8?B?cjlsMHYyNXcyVVlnS1hSQXQxZXEvUUJQaVNBcEVoUHFJMlVDMEJ0TmRRZHhl?=
 =?utf-8?B?YVlUWll3Z3NhVS9ib0Y5d05YMGpLeFI2VHNNSWp3S3pZUUNwcWQ0NXRScFB2?=
 =?utf-8?B?ZXYwcGpNSGNZZEdIOVZxa3k0TjZQOWsvOGhBaFdrVDdXS3ZPbzlyMHAxOWlt?=
 =?utf-8?B?SDEvNmJZUkRRUEhtMjBTY1VsRmdkVmFmSmtkTGkvdUN6TGloMExzejluQTYy?=
 =?utf-8?B?ek5vTCtCczY1RFpZdVVQcDZNa20xM0h2WUFrYmc4TFZyUWpob3JwVlZrMGtN?=
 =?utf-8?B?RC85WWRRV3BxN0VkRHVzc2laaUZRajJGdzVXVEM1cGorTTVMWktqQXZ1bmdG?=
 =?utf-8?B?Z1BxTEt1S1JidThVY0U3YTg1V3JOUWNENVF6YlBOOFVqSkQ3ajN1OWxHRVph?=
 =?utf-8?B?MUpSVnpyVlhXdDgzb3dHeG1rSnNLQnpFR2ZGRDhzdDd4Z1JZWEs3WS9iU1FC?=
 =?utf-8?B?Y3grcUp0cUxManpyN0Y0Z3hIbHZoaDhqa1hNaW9XVUtZVW9oSjUzQlZCTDdh?=
 =?utf-8?B?cGFXdFFuenM5ck5JaVpmbU1EUkJMcVY0NVFQZHJtNjF4WTc1SnpBL3BMMGNl?=
 =?utf-8?B?SjdYMUMyaFhNWnAvSlBYUmp6VlQ1OThtN2VBVDRHSE1Fcmh6TmRyckM5cnRi?=
 =?utf-8?Q?cFwPDsNvQLq5yLmeE77uZK9CxEx8UuP+?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 600f9635-43eb-434a-3c37-08da058ce4a9
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 07:33:11.7452
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: kFD2rpYmCLvBWTdBjjp3CaTvoFFoWRya4XcJw/Ebnb3tFWXUhaa21Af0CYF7/26mqHquAPJiANYtFEKNIlPEsw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR04MB5148

On 14.03.2022 05:01, Tian, Kevin wrote:
>> From: Jan Beulich <jbeulich@suse.com>
>> Sent: Friday, February 18, 2022 4:31 PM
>>
>> On 18.02.2022 06:20, Tian, Kevin wrote:
>>>> From: Jan Beulich <jbeulich@suse.com>
>>>> Sent: Tuesday, January 11, 2022 12:36 AM
>>>>
>>>> When a page table ends up with no present entries left, it can be
>>>> replaced by a non-present entry at the next higher level. The page table
>>>> itself can then be scheduled for freeing.
>>>>
>>>> Note that while its output isn't used there yet,
>>>> pt_update_contig_markers() right away needs to be called in all places
>>>> where entries get updated, not just the one where entries get cleared.
>>>>
>>>> Note further that while pt_update_contig_markers() updates perhaps
>>>> several PTEs within the table, since these are changes to "avail" bits
>>>> only I do not think that cache flushing would be needed afterwards. Such
>>>> cache flushing (of entire pages, unless adding yet more logic to me more
>>>> selective) would be quite noticable performance-wise (very prominent
>>>> during Dom0 boot).
>>>>
>>>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>>>> ---
>>>> v3: Properly bound loop. Re-base over changes earlier in the series.
>>>> v2: New.
>>>> ---
>>>> The hang during boot on my Latitude E6410 (see the respective code
>>>> comment) was pretty close after iommu_enable_translation(). No errors,
>>>> no watchdog would kick in, just sometimes the first few pixel lines of
>>>> the next log message's (XEN) prefix would have made it out to the screen
>>>> (and there's no serial there). It's been a lot of experimenting until I
>>>> figured the workaround (which I consider ugly, but halfway acceptable).
>>>> I've been trying hard to make sure the workaround wouldn't be masking a
>>>> real issue, yet I'm still wary of it possibly doing so ... My best guess
>>>> at this point is that on these old IOMMUs the ignored bits 52...61
>>>> aren't really ignored for present entries, but also aren't "reserved"
>>>> enough to trigger faults. This guess is from having tried to set other
>>>
>>> Is this machine able to capture any VT-d faults before?
>>
>> Not sure what you mean here. I don't think I can trigger any I/O at this
>> point in time, and hence I also couldn't try to trigger a fault. But if
>> the question is whether fault reporting at this time actually works,
>> then yes, I think so: This is during Dom0 construction, i.e. late enough
>> for fault reporting to be fully set up and enabled.
>>
> 
> My point was that with your guess that the ignored bits are not
> ignored some VT-d faults should be triggered. If the reason why
> you cannot observe such faults is because they happened too
> early so no much can be shown on the screen then trying to
> setting those bits at much later point might get more shown to
> verify your guess. 

Pretty clearly there aren't any faults. And in fact my suspicion is
that the bits are used for addressing memory, and then the memory
access hangs (doesn't complete).

> btw any progress since last post? How urgent do you want this
> feature in (compared to the issue that it may paper over)? 

Well, one way or another the issue needs to be dealt with for this
series to eventually go in. To be honest I hadn't expected that it
would still be pending ...

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 07:39:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 07:39:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290012.491843 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfIA-0006wa-P6; Mon, 14 Mar 2022 07:38:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290012.491843; Mon, 14 Mar 2022 07:38:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfIA-0006wT-M5; Mon, 14 Mar 2022 07:38:58 +0000
Received: by outflank-mailman (input) for mailman id 290012;
 Mon, 14 Mar 2022 07:38:56 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=29fN=TZ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nTfI8-0006wI-HA
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 07:38:56 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id cd599dac-a369-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 08:38:55 +0100 (CET)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur02lp2057.outbound.protection.outlook.com [104.47.4.57]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-35-J9gMnWyhO3e8BQG_0tNmuw-1; Mon, 14 Mar 2022 08:38:54 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DU2PR04MB8584.eurprd04.prod.outlook.com (2603:10a6:10:2db::24)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.28; Mon, 14 Mar
 2022 07:38:52 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 07:38:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cd599dac-a369-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647243535;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=8fyARW3nTs4h55ajbPYaYn+ov08rkctESCSIL6uVmvI=;
	b=d4PmNDlh6XIDvtRjIoYUAEj2e8FZ7lrUFj7Gu/Mkk2AAUy7so+LBAjSom97N0SAqEG8TJ4
	WCRQ+RJGPLS/qDS687qEq3qQKyOCund05WwzuHjJ4gohPWGuGM34qxSPorFTu+k5YlZEO1
	3LuKAJJlvUIaBdZiUnMk4B9QbIMDkqw=
X-MC-Unique: J9gMnWyhO3e8BQG_0tNmuw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=cgWGGz4uAL6LhuUz1KXOGJeBwaK5xKcJIoTOe4BoVe2HSs/gWSoOzK4RSlJUAQaaiCxJ4u0o/Rlo2bqmiO5hebZaWS/37Vj4LkaR49JjL+nbVMzzGkeHs3tK9RX3vTHT05ce4JIzzQA3pRIzZrfcHfq1VKuBe4KDC8lojZRX1pukMIpHFhvJ16SdGz+Knq6zAAqMa7ao5cJWlytlRgwvHD3p4Q1pP3DKo15Tz0HSuYwmKdGI0xomFYMZcsIkDRZD7dTxlFSW31EqIiHmp1Bjl3nyD8iiIkecK6xMZ0/zwPeJ3xYUvFfRfgC2pw80dKcn0DWmipeVlATuwb2aN1681g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=hRRw4IP1eypNffha/k/89U6VzeJcJUQm5DJaJah8q6k=;
 b=NigqOF6f7LvGSs2BrTzaKfjEMmwDxwdS/bDzA9uUEDwbPRdQ5iqjoNvbDFXrxjq4YNaHf/fTJNJHKLOMjBPqXc4SmTP1PW6eBZBIKXq3hVtRsN73Nd5T8DIpMzgyoQiGMFLD2eMZlOOpIltYiVHPBskEcXDUV0aOJ21KPI+MysFlTbTV/UFPgSCLVSDfPXYnqzXvscuTv3PiyhnFvglMmaRDV/evZB3j+x6W1tFG6D3QnJIGYarLN4lOk6EIBM4Z806umqj3mXxHMjODmga35iKeQNpRjlPDpJ2WQLZHnrsTg9qmuQFasyTqgaU8Sfrt3R6kWRZAo/7m8gFolWwuxQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <bdd016c0-b02b-3128-7187-d781b6f88dea@suse.com>
Date: Mon, 14 Mar 2022 08:38:52 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2] x86: avoid SORT_BY_INIT_PRIORITY with old GNU ld
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
References: <97bebbfa-b5e8-4c57-162f-2a052de92f02@suse.com>
 <Yitd9RNJf1vvOsf4@Air-de-Roger>
 <517b0f83-ba5e-3aaf-9c06-9b7078b816ec@suse.com>
 <Yitlw1EN+egVJ4xD@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <Yitlw1EN+egVJ4xD@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM5PR0101CA0011.eurprd01.prod.exchangelabs.com
 (2603:10a6:206:16::24) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 4a1d3eb1-0866-477b-4a16-08da058dafc0
X-MS-TrafficTypeDiagnostic: DU2PR04MB8584:EE_
X-Microsoft-Antispam-PRVS:
	<DU2PR04MB85844A4AE97D90A7B3194FBAB30F9@DU2PR04MB8584.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	C3a2Wg9r94BOQlQ/WLcpTR9D252XnJc+ommrSKwX4nefpePjg4C+wzvWn12ory3J0F8MJyUD1kiLXE3b2fwOuSHZuoaxQwFrQYGzr2boTQ9ZPu9tKXBvNDQ5GtBYRtLfPdhwbm9NylU2laJdSH2/bPQncNUPQiZSGrWx53XQnL0fdZjMA5+BXfkDIkq9iapllX2UasijLOFsg7Cu9OwnRgw78GPwHywZv3cbI4QGgc55kgsS2VPqaH/ZhF+su+1ffX/aHaRqJCNtZwvljQRpDjA/CRKWTGrqCIuETOiBJEAFcbsMZphvWD4JT68yZwF9DjW4ZXKGxxChfsnjesNuDsA0mhLUit0NrIfjdCE8NQ+OeKIUIogox3hXezIqoaINhENJtcGCRSMHXpg55Hkiq/y2GtKoaE0PwXegMoevcEzUqNEQa7RAz5pWqH9o09TJOfbIEBHv+r58MMQ7DJwVga7QuaPBNWzhNv5rBAqzQe4PcGz3Mz/bboFN+Y0bTb/41Yku71fD+rfmiapwYQpPbIC/gUFmNOJQ+s8zXkaRRlWDJTW7YrseGK50SEpRW82hcYp0zsYsmEDxtu1ST7Lp3PL9WdxgqSjuu1bRI4G/4cplEDXTDReRiGpcbYdH0uk8vOHYUFIoNqQA1ZCcqeyiFG3bPw3Uetm6NmfEKwIhpR0gyetbaGK1j0v/uMH04KKAbwX8SGqTL1MH01u5k2oRaLubiKxSfS/PgHBZfO5oUxg=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6916009)(54906003)(316002)(36756003)(66946007)(508600001)(8936002)(6486002)(66476007)(5660300002)(2906002)(38100700002)(8676002)(4326008)(66556008)(31696002)(86362001)(26005)(2616005)(6512007)(6506007)(31686004)(83380400001)(186003)(53546011)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?NzxO1r3NsEyGSg0KlLlWVr+RiXBdCDEX8MA37U8MwAvsJuPMND1n/lfC+h9+?=
 =?us-ascii?Q?nwhVnsl6X9q+cgMJKxk74GibhRULqgyF4+3V47chifiOPTdoQYfPp6aiPsFG?=
 =?us-ascii?Q?IeeJ9qfpbRtI3Y6AIULbMMUAV60zVp6n02AJZHCNF3P4Af7cYl1ZwanIxTyd?=
 =?us-ascii?Q?azkYa5OX8rucXGYqyuWc5i3u39DtzDZu7+V5/3pJl9FwTo0LPrvUeezB7cLD?=
 =?us-ascii?Q?rAU+KGl/IBnR7zfkfKsA8ygU+O/l25weWRKG+iU459h0q8+F9mSAgfU89YtC?=
 =?us-ascii?Q?H+/JWk1l5+dL3v4G9UlL4y4az/Sf5mYp+Mi2h3YJSG6AA3S3VPBTfnAcgFiA?=
 =?us-ascii?Q?1L2YgdH3QxOd2D9OWYXKezyCFKTxcDdsyCaI+L7rJnSjILpJ4GK+qK875NKH?=
 =?us-ascii?Q?HGP/yRyHGfH7sk8St4UX9KK8lHzTn7rzVU/vWK9mMIvBTrnqZHSj3hnxNXry?=
 =?us-ascii?Q?S8WkzThP9XqYGPtXYOZmI/L8SQbiCdxJVD8eIUwqUfszC97B2naid7aEkug3?=
 =?us-ascii?Q?16kx2LCpOLUsk/Lf/XbkgWKVEgMS7/M4bnMkAIZZ093RHBTGnT1MmkFrDDhj?=
 =?us-ascii?Q?c+9jL2jDIfMvTsHpQsx1Ag2or0hgg2mrzp7JatgHvj1HQqxU1f9rlEBK2/sZ?=
 =?us-ascii?Q?tbbdeopGbTXQH9lnumtXOK0xf4s/R6L+JvBVBa6Ld1hxVzdtJAARb2zI57ms?=
 =?us-ascii?Q?RKY2lU83mPWihKRim7EDQz5fgvPqkTZhtyL+LQuHx8mvZhTrRuL0u44x+dia?=
 =?us-ascii?Q?cLZBVOJe2rdjTcgyF1RTwk8FZlohh1uOLUCASj4ac+88VM1zQA2vPm8MBnRg?=
 =?us-ascii?Q?+d+FtrOv308wmpjZYGrSRvmnIXv3pm2BF2VvH+k29cTz6rvuehGnGyE3lExu?=
 =?us-ascii?Q?yFBGgwLwPfYFaccH94Diwwnhx8Wpo0dwOYt+VKCBNo1kK7vYVXvPQaMUW/HG?=
 =?us-ascii?Q?4T/kcd/XzEgCN/Z2tkTmqXMcH8ea2he1LtT84AtMabXJzU6y0ndCmch0IK1y?=
 =?us-ascii?Q?IOUDVyIZ5v3KLDJdDyfVEN25SlkVQXSn80LrfShu1HKLV1s/Jj1iSety5Czl?=
 =?us-ascii?Q?6xhM5YPhJ3eESHckDcq78WMu+i9mj9DMBl+zhWvuyT61XrOSYYN3+W2YR/6W?=
 =?us-ascii?Q?K7zk3qZhm9kZIPnk5UqYSuAAIAHEDIjlQcPdWL/PiK6BYumUQctLa0TYz7lM?=
 =?us-ascii?Q?cm1dzGFngDX3/jPIQI/GyP+8LAVpRLRDN7JOfuX76zm5/NyCL5WywwF2XvJn?=
 =?us-ascii?Q?TaS9CHqL4TRY/w2UA1vNqt8m5sLFp/T0uETcbbMsPbtWmtWIUGtRNLpMAbpp?=
 =?us-ascii?Q?C1RtaBiZereKeg4mTx9jsm0EawsMZ6wMpGXODmRAfs3qwBDYHw1mbRWsp5vp?=
 =?us-ascii?Q?rjq8pJZfKRRigtmiASvPfTMeKJxRCmDPBc/aSX7+OjdxUH9SmtP2AsvyCnvJ?=
 =?us-ascii?Q?WXi4iXOi+T5te/xUwcy3G0/iHuMas3fz?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4a1d3eb1-0866-477b-4a16-08da058dafc0
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 07:38:52.4738
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: boR31ZHNpSBfSruHeQXHJY/TZKNZzbCjHd7jPXg81+w/D/6JiNG/b/6kXx6wmKnj/JyC6JHyCkttcnitM0hRLQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DU2PR04MB8584

On 11.03.2022 16:07, Roger Pau Monn=C3=A9 wrote:
> On Fri, Mar 11, 2022 at 03:55:57PM +0100, Jan Beulich wrote:
>> On 11.03.2022 15:34, Roger Pau Monn=C3=A9 wrote:
>>> On Fri, Mar 11, 2022 at 02:28:40PM +0100, Jan Beulich wrote:
>>>> Support for this construct was added in 2.22 only. Avoid the need to
>>>> introduce logic to probe for linker script capabilities by (ab)using t=
he
>>>> probe for a command line option having appeared at about the same time=
.
>>>>
>>>> Fixes: 4b7fd8153ddf ("x86: fold sections in final binaries")
>>>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>>>> ---
>>>> v2: Always define HAVE_LD_SORT_BY_INIT_PRIORITY when using LLVM ld.
>>>>
>>>> --- a/xen/arch/x86/arch.mk
>>>> +++ b/xen/arch/x86/arch.mk
>>>> @@ -73,6 +73,16 @@ ifeq ($(CONFIG_UBSAN),y)
>>>>  $(call cc-option-add,CFLAGS_UBSAN,CC,-fno-sanitize=3Dalignment)
>>>>  endif
>>>> =20
>>>> +ifeq ($(call success,$(LD) --version | head -n 1 | grep -q "GNU ld"),=
y)
>>>
>>> You are not going to like this, but I think this should live in
>>> xen/Kconfig together with CC_IS_{GCC,CLANG}, ie: LD_IS_GNU or similar.
>>>
>>> It's possible we will need this in the future in other places, so
>>> having it in Kconfig makes sense.
>>
>> Despite me not liking this (until, as said elsewhere, we've properly
>> settled on either approach) I did actually consider doing like you
>> suggest. But: I would have to introduce there more than I need here,
>> just for consistency's sake, and I wouldn't have a way to test the
>> LLD part of it (I did check - none of the distros where I chose to
>> install Clang offer the linker). I realize I could ask you to help
>> with the testing, but then the first point would remain. I'd prefer
>> if for this simple build fix it was okay to go the old fashioned
>> route ...
>=20
> I would be fine with you just introducing LD_IS_GNU. That's all we
> need so far. We can introduce LD_IS_LLVM if/when required. I prefer
> that asymmetry rather than doing the detection here.

Yet I'm not happy to go this route. I'm only willing to do this
consistently, but that in turn not without us having formally sat down
and discussed the overall model to use. The only short term alternative
I see is to go back to SORT() unilaterally, hoping that for now
different priorities won't be encountered.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 07:43:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 07:43:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290018.491854 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfMd-0008QQ-Ge; Mon, 14 Mar 2022 07:43:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290018.491854; Mon, 14 Mar 2022 07:43:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfMd-0008QJ-DX; Mon, 14 Mar 2022 07:43:35 +0000
Received: by outflank-mailman (input) for mailman id 290018;
 Mon, 14 Mar 2022 07:43:33 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=29fN=TZ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nTfMb-0008QD-R9
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 07:43:33 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 72575da4-a36a-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 08:43:32 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2168.outbound.protection.outlook.com [104.47.17.168]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-33-GwQdPVcJOPiVvfW_DIAV3Q-1; Mon, 14 Mar 2022 08:43:30 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM6PR04MB4520.eurprd04.prod.outlook.com (2603:10a6:20b:24::25)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.28; Mon, 14 Mar
 2022 07:43:29 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 07:43:29 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 72575da4-a36a-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647243812;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=caPMxhOaA7FMzpgkEUcDzeKrDT9weGYZMQ4B6P849V8=;
	b=Wrdtix4R2atCw06leFjkgWdhb7Y/rBY6diwk0pW196wFR9JEJeYpXj9EjySX2wYJGXlGEk
	Cg+0lQrucubv87wXiQ9nhCCX6XD4k367CFXTypj62JlmbjQiWxxkzOYhy5ZL5eCVAN8iN5
	OsP+9RcB99Tv6ufiWBHOqwo95Jx7+2k=
X-MC-Unique: GwQdPVcJOPiVvfW_DIAV3Q-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=nw/WA3XvRdJTtSYl+f+pWTS3ylJEKtbySL4k+l5eK3HkTW5f0Tv1Gdt+pOBXFSry6g4UGNRENEmmORTvANtTjTl+XsXCeK0l3FK3uVAA0Oct0FemCOhMTorId2VI8MSUrRc44yL6ogVu0sX7PZzw87RKPkCvBme2sZjvSwmYqj7ZrTTYiffH6Qa4dpP3dVrkMQXnqVtg34Wb6ovJWcoJLQxVSldng6hQpgg0pNl0gQnGwT4uZypHM4BAVh+YDsfNHoxZJ9zG2UkYA+VgSTqphkbLM1Wd9lKAcriO/y8IagfzttGbpe0F6iEhmSxzEvkKUcQ8eM9uYpngRoPrDQbT3w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=9hza/3FclnI0odoXnUN3BG5VQ7t9Sfqk9PQTc5q7brs=;
 b=e8wsn0tf6sSKgkQafcCvmeT3y8um4INpR2J3Y2SQWHOQHEPjM2RpKG4usslEScoMV4ya8zFWGVPO+IrWMgfoYXDN1wF8p9wt+Qd+CRz0VHiw2xIEP++tRO7bLWA7vWhU/qp6z+KyrGkpbu0Md44pwyEuihssrPcGtUAfjqZr12KY03qmSSybBzcLLCKms8wcLW0sdcH8SJgL0oErGECyozEun8gTD8IJwRJadIJ0w22c4YOFt6O9who0n9IN4nl5LpsD4b7cuQWBFuJNu38O/Dmbsryn8r0hbu1povA9kVuRRPQsa2ozouYHsuoiXsGrQXO76aQUMA3o4mGfqEO0PQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <cdbd90a7-bf4e-4ff6-0e95-0671ad553b83@suse.com>
Date: Mon, 14 Mar 2022 08:43:28 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: x86/vmx: Don't spuriously crash the domain when INIT is received
Content-Language: en-US
To: "Tian, Kevin" <kevin.tian@intel.com>
CC: =?UTF-8?Q?Pau_Monn=c3=a9=2c_Roger?= <roger.pau@citrix.com>,
 Wei Liu <wl@xen.org>, "Nakajima, Jun" <jun.nakajima@intel.com>,
 Thiner Logoer <logoerthiner1@163.com>,
 "Marczykowski, Marek" <marmarek@invisiblethingslab.com>,
 Xen-devel <xen-devel@lists.xenproject.org>,
 "Cooper, Andrew" <andrew.cooper3@citrix.com>
References: <20220224194853.17774-1-andrew.cooper3@citrix.com>
 <20220224194853.17774-3-andrew.cooper3@citrix.com>
 <12d8b90b-15b0-c094-71e5-35cfdbfe72b4@suse.com>
 <51ef6bd1-bcd9-9a3a-e902-887d42d7dd7e@citrix.com>
 <bb4b4106-f49d-2b50-1eb9-eb450f6b24fa@suse.com>
 <965e91fa-1f1e-7c57-5a71-a09b170a7d9f@citrix.com>
 <2e1dcfb8-20ae-26b2-427d-9c19bd8c8add@suse.com>
 <BN9PR11MB52767BF5573E31241734F2A28C0F9@BN9PR11MB5276.namprd11.prod.outlook.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <BN9PR11MB52767BF5573E31241734F2A28C0F9@BN9PR11MB5276.namprd11.prod.outlook.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR06CA0183.eurprd06.prod.outlook.com
 (2603:10a6:20b:45d::17) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 237153bb-dae3-4991-686b-08da058e54b9
X-MS-TrafficTypeDiagnostic: AM6PR04MB4520:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB45201713FE7FA01A89CCCF1EB30F9@AM6PR04MB4520.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	XXAYJ9stZWJXCS1Rymmmvk/2ljMDkC18UzuLzudYYVk06oFi3BnUm8aCP+VZ5YiL0gRzYgyxFEcoZISxSfUvdJSymaXeNEs0M1RyHxymk0J8LOSQxavrJqq9lEabospJ1w+ClQ+tmWVKAkZK5Af2RfH+6NBqoMyEk2G1+Vf25rV5c5szRiNpYZzHdC3TAAUZmf36wJoj+8MivuYkM7yu5dYrNcmT2t4439Zh00bRjjDavLZRkOawzrQ++Ih/ZqXqYsbvaVX0w9rdU5485LJkAVkIJ2OEFq1Ns0E19DOon+Fd5LSB2EEh2MjumLolzuu/nv8CAqN1XSUVvDUIyvNAkia5mS0j+GY8tQmy3MfUpHGP7XbvBPTTLHGKWeSHZHmGI4OzuMIVQ7wDaRiRxIVtlNw8+dEQCFI+RPl/tlyJJHnhlI5xUsnap3ThlR60qqOH0/k8UabflPZxtahI/kziHQo+mM8NY8dO/Ff9/8tP4d11SHP9gED36+Qe2qRqjvCrrV0RHJvHMZ4pusGpiaQ7fJ9/J8/cB76y6maY6pQe+iQouKVYhWHYiwrWMIjuvVBA4cC3CKRrPhT0CrZNY7fpqYPSCNIkgVl7zYltD7EXO4Tru9ISxs+8RnPR1Si+mGabEcsPLfpkur1lWNgwszxwz/KNpamOEI+3tmi2j/zutmVF5lIpZWwS8qyk2WCMEP7YxtqcvHBeFz2/Ku+2Z3lGeOOYXgyVASjru1IIQQqR0Io=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6916009)(54906003)(38100700002)(316002)(66556008)(66946007)(66476007)(8676002)(4326008)(31686004)(36756003)(5660300002)(6506007)(6486002)(83380400001)(31696002)(2616005)(508600001)(26005)(186003)(8936002)(2906002)(53546011)(6512007)(86362001)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?ARd5LX0akHSA9O4GwnxuP3xVBn7+8D8k5INQUWpzu6BJexeWCXo+/iZnn8eZ?=
 =?us-ascii?Q?vw6nCJ5mUP3WFZMqrv/N0ybIK7YledDecA1UmO7sAGk36mCZ0dtQ0NbWue4d?=
 =?us-ascii?Q?Hy321ThyVBYbtruy8tOKGqC+x+QzyScCtxIebmWqxcI1HkCZXBrOoKf513OT?=
 =?us-ascii?Q?v+wMuuY0Af0q5poaH6AvT6BJgwwKbRTZDgW0cPuxTGNNSGKZ18E0ja9cX+mN?=
 =?us-ascii?Q?aSBjH14Xcz8d62ixtNlc8lXprSnrO7q9RxX2/dIHTsDAISoWa3lIRWfEn27u?=
 =?us-ascii?Q?PudoZCd8vw7m4hTq1vUfBwJZz1SNlF1TiIbcEh3TRgOFrWXfxgo/ktuG03n2?=
 =?us-ascii?Q?DFLwAbADbAnii1C8SrR821FIItbLjbO5m59LnWX9xK+Ayu+JCQm/w13rU9qW?=
 =?us-ascii?Q?euk8Y4aYpVRC61fdmniynmmKTvAhM4SmIRs1mHTObj/wBYyHjcDZnD7engGZ?=
 =?us-ascii?Q?uV7/mnFeZgsS6j83knt23N2wvYmEs+Wx+2lcsQRtbPKHQv06KiSAoim0GHZh?=
 =?us-ascii?Q?WENPWPKax+wu5IcT8Rwyz9MVFyk6kzDkjLWNqoQKqkeZ2TvapghEiSQ6tpdQ?=
 =?us-ascii?Q?ONV2SsH+zfNWi1TrKQD+BLOHQbj8JofBOVDx3a52/LZbaGOjHNa+mX68o4j8?=
 =?us-ascii?Q?bsCyJMG67LrG5v7to/zXveOR5PSur/ZFDahePVPHDxlFsXRdD+iVvp28LBPS?=
 =?us-ascii?Q?uF3GtY/osaKFbrwJy43AurpDIxZp9L+R5AqlbDiGkSXdWyB45M6wdRl+qoIk?=
 =?us-ascii?Q?u0cng8wUQ0b9TLvUUDp8kpraN+AH2gN2ZtpR36ISqvz7kFr2sr+yfq+v8Zki?=
 =?us-ascii?Q?m76uZ+h924l/ehp97oCaNJIhQvHhgZ01WNu0fTkbJiwkpwaLtZy0AgiRAg9k?=
 =?us-ascii?Q?LC+FI3ThvZl5iN7bD/o7/ytAhg9Tf4xvybIMpYwCOS7VLpq1WMNMpNs0AbGc?=
 =?us-ascii?Q?skF3sFDu4kF3pF+8AD7+29K8uX6+pFA9EKd9z5zsyiVK7E+q2cza9uhjxJHX?=
 =?us-ascii?Q?nt4lWnO37C4Fg4v+V4HW+U4wejiU/DJpAPneq3SlIyZC07YVxhoTWKKlT1kk?=
 =?us-ascii?Q?g5IWu+gE9qWb2exmkWkvvaLk9UDIrwyr+v9nICDEC13DBtYtKAew0Il1aNuP?=
 =?us-ascii?Q?Upszo7H2jp1X/UzNF1vsF6S7VOl0fvj7k8FnoyWq6yQZ0siB2zwuCYDW46Qo?=
 =?us-ascii?Q?2CGGzCOtiuTDFrjf+XvZF0MOeFVhjCf939ten8MACViZapGKFhF8A5lTsV6e?=
 =?us-ascii?Q?6HuatutTnH2LdYmTYNexOhSUAwsQ9Q/9cNGJ3oQQ94axsr7vBa4RZguyENVo?=
 =?us-ascii?Q?VcA8gVz1TugspoZw4oCy7JlZZKsaWGjvsKfKENMj/O/gyKE3U6GZlBQGW/Nx?=
 =?us-ascii?Q?/B1p09La3t2OQeBgQtThYeCiHijY772C/CC/XgDsX24qJOEzDcT5FAvqWM/P?=
 =?us-ascii?Q?tKgT16qRdX5tCwrFmKdJuYWwzoddMENr?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 237153bb-dae3-4991-686b-08da058e54b9
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 07:43:29.2840
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Oz//y7+IBhQzuBYzUfJquYjYYJTGAjkwi2/NXFkCiwqDmBC5fE8pPeKONmITUbyCZpn/OJSwURzbejbQDU7N5A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB4520

On 14.03.2022 07:35, Tian, Kevin wrote:
>> From: Jan Beulich <jbeulich@suse.com>
>> Sent: Monday, February 28, 2022 3:36 PM
>>
>> On 25.02.2022 18:11, Andrew Cooper wrote:
>>> On 25/02/2022 13:19, Jan Beulich wrote:
>>>> On 25.02.2022 13:28, Andrew Cooper wrote:
>>>>> On 25/02/2022 08:44, Jan Beulich wrote:
>>>>>> On 24.02.2022 20:48, Andrew Cooper wrote:
>>>>>>> In VMX operation, the handling of INIT IPIs is changed.
>> EXIT_REASON_INIT has
>>>>>>> nothing to do with the guest in question, simply signals that an IN=
IT
>> was
>>>>>>> received.
>>>>>>>
>>>>>>> Ignoring the INIT is probably the wrong thing to do, but is helpful=
 for
>>>>>>> debugging.  Crashing the domain which happens to be in context is
>> definitely
>>>>>>> wrong.  Print an error message and continue.
>>>>>>>
>>>>>>> Discovered as collateral damage from when an AP triple faults on S3
>> resume on
>>>>>>> Intel TigerLake platforms.
>>>>>> I'm afraid I don't follow the scenario, which was (only) outlined in
>>>>>> patch 1: Why would the BSP receive INIT in this case?
>>>>> SHUTDOWN is a signal emitted by a core when it can't continue.=C2=A0 =
Triple
>>>>> fault is one cause, but other sources include a double #MC, etc.
>>>>>
>>>>> Some external component, in the PCH I expect, needs to turn this into=
 a
>>>>> platform reset, because one malfunctioning core can't.=C2=A0 It is wh=
y a
>>>>> triple fault on any logical processor brings the whole system down.
>>>> I'm afraid this doesn't answer my question. Clearly the system didn't
>>>> shut down.
>>>
>>> Indeed, *because* Xen caught and ignored the INIT which was otherwise
>>> supposed to do it.
>>>
>>>>  Hence I still don't see why the BSP would see INIT in the
>>>> first place.
>>>>
>>>>>> And it also cannot be that the INIT was received by the vCPU while
>> running on
>>>>>> another CPU:
>>>>> It's nothing (really) to do with the vCPU.=C2=A0 INIT is a external s=
ignal to
>>>>> the (real) APIC, just like NMI/etc.
>>>>>
>>>>> It is the next VMEntry on a CPU which received INIT that suffers a
>>>>> VMEntry failure, and the VMEntry failure has nothing to do with the
>>>>> contents of the VMCS.
>>>>>
>>>>> Importantly for Xen however, this isn't applicable for scheduling PV
>>>>> vCPUs, which is why dom0 wasn't the one that crashed.=C2=A0 This actu=
ally
>>>>> meant that dom0 was alive an usable, albeit it sharing all vCPUs on a
>>>>> single CPU.
>>>>>
>>>>>
>>>>> The change in INIT behaviour exists for TXT, where is it critical tha=
t
>>>>> software can clear secrets from RAM before resetting.=C2=A0 I'm not w=
anting
>>>>> to get into any of that because it's far more complicated than I have
>>>>> time to fix.
>>>> I guess there's something hidden behind what you say here, like INIT
>>>> only being latched, but this latched state then causing the VM entry
>>>> failure. Which would mean that really the INIT was a signal for the
>>>> system to shut down / shutting down.
>>>
>>> Yes.
>=20
> why is INIT latched in root mode (take effect until vmentry) instead of
> directly causing the CPU to reset?
>=20
>>>
>>>> In which case arranging to
>>>> continue by ignoring the event in VMX looks wrong. Simply crashing
>>>> the guest would then be wrong as well, of course. We should shut
>>>> down instead.
>>>
>>> It is software's discretion what to do when an INIT is caught, even if
>>> the expectation is to honour it fairly promptly.
>>>
>>>> But I don't think I see the full picture here yet, unless your
>>>> mentioning of TXT was actually implying that TXT was active at the
>>>> point of the crash (which I don't think was said anywhere).
>>>
>>> This did cause confusion during debugging.=C2=A0 As far as we can tell,=
 TXT
>>> is not active, but the observed behaviour certainly looks like TXT is
>>> active.
>>>
>>> Then again, reset is a platform behaviour, not architectural.=C2=A0 Als=
o,
>>> it's my understanding that Intel does not support S3 on TigerLake
>>> (opting to only support S0ix instead), so I'm guessing that "Linux S3"
>>> as it's called in the menu is something retrofitted by the OEM.
>>>
>>> But overall, the point isn't really about what triggered the INIT.=C2=
=A0 We
>>> also shouldn't nuke an innocent VM if an INIT IPI slips through
>>> interrupt remapping.
>>
>> But we also shouldn't continue in such a case as if nothing had happened
>> at all, should we?
>>
>=20
> Now there are two problems:
>=20
> 1) An innocent VM is killed;
> 2) The system continues as if nothing had happened;
>=20
> Andrew's patch fixes 1) which imo is welcomed anyway.
>=20
> 2) certainly needs more work but could come after 1).=20

That's one way to look at things, sure, and if you agree it makes sense
to address 1), I won't go as far as trying to block such a change. But
it feels wrong to me - 2) working properly really includes 1) plus the
killing of all other innocent VMs that were running at the time.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 08:11:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 08:11:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290033.491864 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfnD-000435-0f; Mon, 14 Mar 2022 08:11:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290033.491864; Mon, 14 Mar 2022 08:11:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfnC-00042y-TY; Mon, 14 Mar 2022 08:11:02 +0000
Received: by outflank-mailman (input) for mailman id 290033;
 Mon, 14 Mar 2022 08:11:01 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTfnB-00042o-Bi; Mon, 14 Mar 2022 08:11:01 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTfnB-00046p-4z; Mon, 14 Mar 2022 08:11:01 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTfnA-0003KE-Lz; Mon, 14 Mar 2022 08:11:00 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTfnA-0004Jo-LY; Mon, 14 Mar 2022 08:11:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=5sbG9pfHdLyIcZaxIlNjlbCUEEvP6nP6CQeSg5VJmpQ=; b=fJzRaSEvct37CGQDnUhMCZjJ3R
	OnnqBYWihV092Kdl/ucZqePgndfZkybI2V83TPP4jk5XghUmfSulJw+Mr4RQF+58i75u/juYhkCp/
	ycuDrEbgGuEuDPctcet4FptKNTFQ1n0Oz3wYOymNydJwo0CV53KkO28KJ4WSj4XrT4rQ=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168578-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168578: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=10b4c8f3b75f765a5d210aa6f2fbab100955062e
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 14 Mar 2022 08:11:00 +0000

flight 168578 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168578/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 10b4c8f3b75f765a5d210aa6f2fbab100955062e
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   13 days
Failing since        168258  2022-03-01 01:55:31 Z   13 days  129 attempts
Testing same since   168578  2022-03-14 04:40:31 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Li, Zhihao <zhihao.li@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 584 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 08:19:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 08:19:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290042.491877 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfv4-0004o5-Tv; Mon, 14 Mar 2022 08:19:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290042.491877; Mon, 14 Mar 2022 08:19:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTfv4-0004ny-O7; Mon, 14 Mar 2022 08:19:10 +0000
Received: by outflank-mailman (input) for mailman id 290042;
 Mon, 14 Mar 2022 08:19:09 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=29fN=TZ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nTfv3-0004ns-Kv
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 08:19:09 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6b3673fe-a36f-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 09:19:08 +0100 (CET)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur01lp2054.outbound.protection.outlook.com [104.47.0.54]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-37-AT1oR1vSMPyTL5xNMHZhbA-1; Mon, 14 Mar 2022 09:19:06 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB9PR04MB8091.eurprd04.prod.outlook.com (2603:10a6:10:245::7) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.28; Mon, 14 Mar
 2022 08:19:04 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 08:19:04 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6b3673fe-a36f-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647245947;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=YVsBmFmdgSbFkdZvrhIfNVDVCeQ5KTbUoAktJq4DXWo=;
	b=W+G5lO2O6ewMplXy7JOWXtZllqFb7f7k7NL/GIXPWEvoq3nQIP2ztsh5CNquGaLL8iPQlT
	CVlIS5vXkJEaWtzM0MjT6Dt07YGpvLR3saC5jXE52yfkPyvMEHfxkBSeqp0IHilp6sctQK
	XdLdEAgUhpXN0jwAW1Lm+pXnro4eczc=
X-MC-Unique: AT1oR1vSMPyTL5xNMHZhbA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Axi9sqgfuU3uBfpXBI5Qhsm2iKbGYeSnXVDtpcX/Ij4gYaKzA6a2HgC2uMLpflH9oBIRvzcRHo2E1mVLtrA5br9110wvyO6inHawN61UlHxDnIT9xumdGktMOTHREJnSp+OdqDVOW9RWYYwebMJIt0OkkVTNk+rEz5USV9s63bGMXwg/u/DNOTK6mpgaRUNHZzS5/ddW5DvHMAUEC6DlGfctwU+fx+wIc4NoJB52E8rF7T9IQp6Xz1AdRzqvhMhwS5ZVM8u3N7C1IY0Z4uUU7SLAfMlJe4TB6+cXSBphn+233GBgDWHBdZfk5CwTWPmAi/pg3+KUrWG6tXLeV1eN3Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=FcHUJUWBjb4wEBCuUAYWXA1O8KtGAoONnd+8DFGM3jw=;
 b=bPFpDltMNvZRdjj6AEORJMEJT4HijcSZxilnaDiEJSXkbPAs/0hRttmn8J+VtHK6qNLYViX2HWoRo5nvn+uqQlYFv5XrBkb6myw+kaWAR+m8zyP2gvaC04cpVXJF+X87iRMsd3Fqn+K57XBUbNxWNlkChQV4gkcu3K3N4FPHJRYHfsOJ/wRie7JL15T0jQzLQP0NtUDNfFvmAt1Y8uPuUkxrhjN/q8ebwUaRUeg9Zt4cKcDThfxWZNSmEZXNFL5WYlNt46D3TuRJ/DW6cagRCIHfVgsC9WNlQBmCkMjO8pzlPnhbLut/lIPUpUCcy26LUc1Uc/QyfSeuNXWHKvIA9g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <8ec77c15-7c98-edc1-2f6b-f1d62d15b2a1@suse.com>
Date: Mon, 14 Mar 2022 09:19:01 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v3 4/4] x86/APIC: make connections between seemingly
 arbitrary numbers
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
References: <35cb3c72-05ba-24c7-1fdd-3ee1aced3aec@suse.com>
 <123a9ae8-caab-01ae-5bea-8c590bd8f9d9@suse.com>
 <YitbhmgGy4Yh8PoP@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YitbhmgGy4Yh8PoP@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS8P250CA0017.EURP250.PROD.OUTLOOK.COM
 (2603:10a6:20b:330::22) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2e6614f0-e3bf-4076-9261-08da05934d23
X-MS-TrafficTypeDiagnostic: DB9PR04MB8091:EE_
X-Microsoft-Antispam-PRVS:
	<DB9PR04MB8091AAB6356C5518A999588AB30F9@DB9PR04MB8091.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2616005)(8936002)(6666004)(66476007)(66556008)(66946007)(508600001)(53546011)(6506007)(31686004)(26005)(5660300002)(186003)(6916009)(6512007)(6486002)(54906003)(36756003)(38100700002)(2906002)(31696002)(83380400001)(316002)(4326008)(8676002)(86362001)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?oQA0fFtIWk/zRSszDFpSQ3Eixbxon+qwXfv8wmr6EWav17OPxyescW6JgN6J?=
 =?us-ascii?Q?u2gYkESmc3kLAk6Eu8QhaCk8JsyPxZdnqSiWJzOutPAahuu+fNXiHZtkLa9h?=
 =?us-ascii?Q?W7AycsZpaCc24PY7IPVhod2ImZTuRHoaKdpotycOqGNmih/ryENzwZJdGulw?=
 =?us-ascii?Q?2bIJe6/pb/PiKO0GvBPa8Bkh373OJeey+CSmBWX8BakmaPzPubo1v8/3MCas?=
 =?us-ascii?Q?KBsZuN0NFIudZQOVsv37H3a5KGpZdGH/JuJcQQIhkbbJ/CbwL3aNCYLWPx9A?=
 =?us-ascii?Q?GoQAk1DwUigVkgaLMrdhtaWK0no/0B6XOVcMrIDAysSL3rfKR305pds+1l+S?=
 =?us-ascii?Q?tdELhja5k7ihZdyIogd2UKDo92Pi/VxrKkYyaAwKYxyKReDpec4QHV1ERm7s?=
 =?us-ascii?Q?o08BWmzz4G9acgbsUEkMi3AICrri1fWi2g5jClfBeuAgvzXo2PawGdq01LH8?=
 =?us-ascii?Q?eGzjjvF2pfd0vIv+Lw2zxOc4E0eY6oQJdLZ5rl43lNbPlU2x3KE00HMKo8fC?=
 =?us-ascii?Q?H4dSPQpuYqXtW869Wj7v7RYJyUShwuXRGyQ1jOFhI/pyhhlI7qp8yPFbxvQ6?=
 =?us-ascii?Q?HJw46kMzhSc6oBGqNrPFfRQO7Fxm0tIi1o/kw0fRDACeZCHFSd0/SKNnN/YI?=
 =?us-ascii?Q?xTOc+129sAy/1zdqxid9t+RNN7iBbPehaWnrHZ1SST3/iDfrGbhN8ZuO7TTZ?=
 =?us-ascii?Q?LpCJw66gjH83DeA4giTtM0ItouelE6WwBhcaS2s8AePELDw7NEVMpfSngpur?=
 =?us-ascii?Q?ZChzTfmy27eY4+KwTbbb/jUlHt/fPP3zMrixRrQBkvl/kwyt9hx2N4mGGyg6?=
 =?us-ascii?Q?mxPAk4nUUoLEr2iyrdehxMMuPNIjl7P0TP+DB+BvMvxRS0jw1j4/N2WmtapQ?=
 =?us-ascii?Q?eihCweZR2YuDfsaVuL3KdZyMBy+h5ZCi++i6kDBrFE0oMxYiP4P0r7C871C0?=
 =?us-ascii?Q?y37Mpk33hl9MTZFCNv3FPW/HhC20FJklzantKyxLfOLDotQHmuMPeT6tX/lU?=
 =?us-ascii?Q?JC97mezbW1Gjkm5pQ67g7v28CIviLW/SF93ZEx8k/dGJidhajMd662EX+iax?=
 =?us-ascii?Q?Hxn/NAOQLzMrHhiUcGYVaFkGXqjjuvFcquNoYFJbIUD05ggGkuMvlwxsENpD?=
 =?us-ascii?Q?lZKNitYOz8VQdEuqahAWTbwV0GKLLf7pGhVbLUlce/oIBk61N3RDHHKo/nHh?=
 =?us-ascii?Q?ezULyHucJvjjOTTtbp247bTYHcpTUBn1SGFhxWGxsMnzS8UsK9bNMfnD25AO?=
 =?us-ascii?Q?dkBvHNC6jNd5osgNw1IFs5+tqfAmr7cNRBEsi8RHGEqPhHou6BXYos44/a8G?=
 =?us-ascii?Q?RAk5NtAo6+W6n2rdqhahGe1VGvYwM9dAuMrTL7UaRi/s3xgoIm3MX9wdQlP8?=
 =?us-ascii?Q?5vP0vkdLtn0f8OhYEsFthcVI6ggUq0GlAYcegs2quCyYaZ3htXc+2LKYEtE9?=
 =?us-ascii?Q?z8tPneuVfwi2WNNAMo2MUbZ6RAfLQhVP?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 2e6614f0-e3bf-4076-9261-08da05934d23
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 08:19:04.0260
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: VDo16VhM/cn7quBOKoDlbzPhCs7aSoBc878+5RVh7A67zZu3oPYltbtEBTaxSXHcvLBrA+SAdknpJ8mTQlZs2A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR04MB8091

On 11.03.2022 15:24, Roger Pau Monn=C3=A9 wrote:
> On Mon, Feb 14, 2022 at 10:25:57AM +0100, Jan Beulich wrote:
>> Making adjustments to arbitrarily chosen values shouldn't require
>> auditing the code for possible derived numbers - such a change should
>> be doable in a single place, having an effect on all code depending on
>> that choice.
>>
>> For one make the TDCR write actually use APIC_DIVISOR. With the
>> necessary mask constant introduced, also use that in vLAPIC code. While
>> introducing the constant, drop APIC_TDR_DIV_TMBASE: The bit has been
>> undefined in halfway recent SDM and PM versions.
>>
>> And then introduce a constant tying together the scale used when
>> converting nanoseconds to bus clocks.
>>
>> No functional change intended.
>>
>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>=20
> Reviewed-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>

Thanks.

>> ---
>> I thought we have a generic "glue" macro, but I couldn't find one. Hence
>> I'm (ab)using _AC().
>=20
> I would be fine if you want to introduce something right in this
> commit to cover those needs, using _AC is not overly nice (or
> clear) IMO.

Hmm, I was rather hoping that you (or someone else) would point me
at what I thought I'm overlooking. If anything I'd likely clone
Linux'es __PASTE() (avoiding the leading underscores), but their
placement in linux/compiler_types.h seems pretty arbitrary and
hence not a good guideline for placement in our tree. To be honest
the only thing that would seem halfway consistent to me would be a
separate header, yet that seems somewhat overkill ... Or wait -
maybe xen/lib.h could be viewed as kind of suitable. Of course
there's then the immediate question of whether to make _AC() use
the new macro instead of open-coding it.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 08:25:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 08:25:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290047.491887 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTg0w-0006HZ-Nd; Mon, 14 Mar 2022 08:25:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290047.491887; Mon, 14 Mar 2022 08:25:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTg0w-0006HS-J0; Mon, 14 Mar 2022 08:25:14 +0000
Received: by outflank-mailman (input) for mailman id 290047;
 Mon, 14 Mar 2022 08:25:13 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=29fN=TZ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nTg0v-0006HM-J5
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 08:25:13 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4487ee75-a370-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 09:25:12 +0100 (CET)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur01lp2052.outbound.protection.outlook.com [104.47.0.52]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-17-Pu4N3Z9iNGKrlqk7nsrPHA-1; Mon, 14 Mar 2022 09:25:11 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR04MB5604.eurprd04.prod.outlook.com (2603:10a6:208:134::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.28; Mon, 14 Mar
 2022 08:25:09 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 08:25:09 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4487ee75-a370-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647246312;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=YQTVvli47pDSWgVq9yNlw1cixIGf43PzZyNqo+pTbwo=;
	b=GXirM0XECA+Rwg7OFvv6qvWd3Wh4zZM14h68gc/RswttoDl/uZTwNw6SHgNEELcgdYt/dk
	VUK7bYmO+GpdsENd+BWvfjldSCqeDh8P665cBCUTbWgnrdPmbw5ONbpGfRukY3skV3Ij6M
	guhTbyHnzRybQgmvO+B4x2+j0xVva/4=
X-MC-Unique: Pu4N3Z9iNGKrlqk7nsrPHA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=XUZP/Wgx/A+3QVNe6QQyhg18t2ej4QHLdKAJOHZUvsmBL9ge02/OT0ACC3f5mhkO09pHGRZmshRQn8SEza5p77F1oi+JwgAsh3HOAlR3R+6+ozc0Ze3Au2mNANmhD1VOFAh+/D/+J8VHZqAi0I0Qeqdw7OsoPpOAS9ymWPPm3/wkODxmIliV3dIByk4ZdjqUF3EzINAHWMV/PU58USuVfDNlKMOkALtfVq0yr7twN26EPEXeWHFNWawCcDmrTTrxUt/6pBdSfNi9Qc0L42jmxM4YphjrOeB8OClbgzDR9f/VpxgKHq3yCsHLRE8859OK/BeyuC4ImZGGmUBF5/WGEw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=I8HsELeuSl5qSC96BUnbXHlryahWZFIYkzCkhT54+4s=;
 b=MXUnNlXBdgZzOmtOGKKKW/dH8toVPUJ2UQA6QmFlCqLcF4E5/s2wq7xHB1HcTNKsoIv8WjXDqw0PYF1ql1YZqEZcSelFQxHgdZXoehysxZKqYPH21UNzQKUEAR3f4BMkr6x4wgYxbQRa6p2uHIdIGusQcsdb7njqXww3n7x1s8skP03NvlYGyHwB2q3n1ZgtQRPQMyGG9XAE/fEnXu01crEFmpYDdJj9ZYm7bsyXQSZb9oGAZzR+fgoct1o+39H9l62tbbVmc12l54aXgqNn4B33VERcuYUOrMM5PJ5J8w7OnptqJwA7huvdhHabSSB3hQVjrTXI0H/sopbrXLnWFQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <b6769525-0bbf-c735-70cd-d5c13ab232c8@suse.com>
Date: Mon, 14 Mar 2022 09:25:07 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v3 3/4] x86/APIC: skip unnecessary parts of
 __setup_APIC_LVTT()
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
References: <35cb3c72-05ba-24c7-1fdd-3ee1aced3aec@suse.com>
 <c679a11a-d2b5-403a-5341-3e00ac91ff45@suse.com>
 <YitXHaekQk1aK1i2@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YitXHaekQk1aK1i2@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR06CA0217.eurprd06.prod.outlook.com
 (2603:10a6:20b:45e::17) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0659cd5d-3fa8-4832-436c-08da0594270e
X-MS-TrafficTypeDiagnostic: AM0PR04MB5604:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB56043542A965BAEBCFD92AAEB30F9@AM0PR04MB5604.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6916009)(8936002)(5660300002)(54906003)(316002)(8676002)(4326008)(6486002)(86362001)(66476007)(66556008)(66946007)(26005)(31696002)(186003)(2616005)(6506007)(53546011)(36756003)(2906002)(31686004)(6512007)(38100700002)(508600001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?/04BeAiUKhM4C6ktEMH3dgcHJqKXBTt4TueqoRNPLO/OBIKgQpJ1i1QKCF0I?=
 =?us-ascii?Q?K3ZrTyp4BtV34T63O6cWl9arPwNGZ5kwo0QQP0+S5JQPxvXXmrc5beknifDt?=
 =?us-ascii?Q?Gy3Prxg04kglBbIRwkHIDR9q73xSDdcgrHWRCAfuBrOcYP9Mw3iFL0jci2ex?=
 =?us-ascii?Q?PG5hPt4snkuqqg3+ChfhFlz5F5juutWrNZ+kzBogWgQuwV5b28ZX2w1G9WP2?=
 =?us-ascii?Q?R2yhwOpIkVUUpxBoa02Ps3uVdelBX3y//PVn6fuT3qBS1DXRmtsH2k9WrsAl?=
 =?us-ascii?Q?CKoGCurv0Nm2SAZHpd+QAwzHzaRtjLehCA79Bk1uyPPRERJIo/5fHqnVP3tU?=
 =?us-ascii?Q?pkMIpHC5wIXKCJb7ph1L683SuaDeWHxee3Nszm8illmfxBX/Kvl1aMd9GMnq?=
 =?us-ascii?Q?nAfW3B6OizvGeOQBz2mLT5VFAcMv2LmE6BI5DY6PrcfSNqb33m6zIubN+W+n?=
 =?us-ascii?Q?R6fyAxXf3rvUiFRexCHj0O+prHDBfaLdHpmPVFZ/Xe4umqNQqkgem7SvwNWO?=
 =?us-ascii?Q?7LOHJMB0VUp/Z8zwRqAkGusP3gtqKBqbj7Xp0FIU1HAGqSVjGSd9YfOSpMtA?=
 =?us-ascii?Q?AVvUi+mGtxd3Q/Y/gK4JoXtMUhlAF7y9McdZlaUVNZMaCBg8o0vfmMujm57Z?=
 =?us-ascii?Q?Oln8tc1cF+/5x64BRgQP5AGnJDFlpkeyPf/XnxUilJ5ChqLcWde7+eDv3FRd?=
 =?us-ascii?Q?sR4o+fTxDLdT1O4oJ8lqh0QGjy+VptaMXIk2PbwVr9ClBC3qZbF78JzdSI1z?=
 =?us-ascii?Q?TuGwZ6osTqAxnXcIXHdMzRSgZs7gv94tWEyPx5U0haweodGxMJkcDNmcIK5W?=
 =?us-ascii?Q?3mraaJw/syy0FN8+WsS/sR/gHsE4/xQrZM38tQB0STlYMRqX0HFLlFd8hrOS?=
 =?us-ascii?Q?c1AUxpOai0DBZu24Zkbx9qhkp41BStSt+mFQMfLa8sWfSgwFr/+CcaSaQahR?=
 =?us-ascii?Q?q887q/nibbh0cYCkkQ4/3qhGI0mX3yQaghPyOoGTn0cGlWUk/nIIEowzutm5?=
 =?us-ascii?Q?tpWJ5skEHWBgd5mtgzj8SkVpp+aGE+S71KfdzTH7nb/g3esRpa6f+S+YTUw8?=
 =?us-ascii?Q?mlcRU5hSGLvd94FmVfxEdApP6CXRmKBM5J86uLsgjoWgPMFZD8cOv4dmzNyL?=
 =?us-ascii?Q?tFf0J9pNUBLGIm/Q94dmby2YZw5qadb2SXUlLaOOW0Mz2QP+dJvJlzIhyqZr?=
 =?us-ascii?Q?1FfjeJVR/GJlQwHFr4B8AKJcNzhXM+3KRNlN7EOweM7w9nQY2rjmUp2FjUtB?=
 =?us-ascii?Q?4o3Hjn8R6NMzYxCuLnurHEx6KybT6mtw7GjhLysVZyPHtttdFCih6lPbGLWb?=
 =?us-ascii?Q?Zrzc8/efjdDPgrAGqRJeIqwMEaTqcJzC2L02pwAQMdC1/Yx/+sUEBuLPzFZT?=
 =?us-ascii?Q?vSylR9VUELIIhnt/qn2ZJJm2QMf4EvGR2IivSWoWIDJR7gsOfiR8FNiUz48v?=
 =?us-ascii?Q?msa8l4OXnPYTPhHQCOb6hJN/sJTjrndB?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0659cd5d-3fa8-4832-436c-08da0594270e
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 08:25:09.6297
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: XfGCG3mnfwZ7Q8zzslh3Y6kZ6VliBcN/psQxFSYXLtc0IUaYRxX/OYUXIWAqsPl5rZ5bdztMZxpNaj5DgVSF/g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB5604

On 11.03.2022 15:05, Roger Pau Monn=C3=A9 wrote:
> On Mon, Feb 14, 2022 at 10:25:31AM +0100, Jan Beulich wrote:
>> In TDT mode there's no point writing TDCR or TMICT, while outside of
>> that mode there's no need for the MFENCE.
>>
>> No change intended to overall functioning.
>>
>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>=20
> I've got some comments below, now that the current proposal is bad,
> but I think we could simplify a bit more.

I'm struggling with the sentence; perhaps s/now/not/ was meant?

>> --- a/xen/arch/x86/apic.c
>> +++ b/xen/arch/x86/apic.c
>> @@ -1059,24 +1059,25 @@ static void __setup_APIC_LVTT(unsigned i
>>  {
>>      unsigned int lvtt_value, tmp_value;
>> =20
>> -    /* NB. Xen uses local APIC timer in one-shot mode. */
>> -    lvtt_value =3D /*APIC_TIMER_MODE_PERIODIC |*/ LOCAL_TIMER_VECTOR;
>> -
>>      if ( tdt_enabled )
>>      {
>> -        lvtt_value &=3D (~APIC_TIMER_MODE_MASK);
>> -        lvtt_value |=3D APIC_TIMER_MODE_TSC_DEADLINE;
>> +        lvtt_value =3D APIC_TIMER_MODE_TSC_DEADLINE | LOCAL_TIMER_VECTO=
R;
>> +        apic_write(APIC_LVTT, lvtt_value);
>> +
>> +        /*
>> +         * See Intel SDM: TSC-Deadline Mode chapter. In xAPIC mode,
>> +         * writing to the APIC LVTT and TSC_DEADLINE MSR isn't serializ=
ed.
>> +         * According to Intel, MFENCE can do the serialization here.
>> +         */
>> +        asm volatile( "mfence" : : : "memory" );
>> +
>> +        return;
>>      }
>> =20
>> +    /* NB. Xen uses local APIC timer in one-shot mode. */
>> +    lvtt_value =3D /*APIC_TIMER_MODE_PERIODIC |*/ LOCAL_TIMER_VECTOR;
>=20
> While here I wouldn't mind if you replaced the comment(s) here with
> APIC_TIMER_MODE_ONESHOT. I think that's clearer.
>=20
> I wouldn't mind if you did something like:
>=20
> unsigned int lvtt_value =3D (tdt_enabled ? APIC_TIMER_MODE_TSC_DEADLINE
>                                        : APIC_TIMER_MODE_ONESHOT) |
>                           LOCAL_TIMER_VECTOR;

I'm happy to switch to using APIC_TIMER_MODE_ONESHOT, but ...

> apic_write(APIC_LVTT, lvtt_value);
>=20
> if ( tdt_enabled )
> {
>     MFENCE;
>     return;
> }

... I'd prefer to stick to just a single tdt_enabled conditional.
But then I'm also unclear about your use of "comment(s)" - what is
the (optional?) plural referring to?

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 08:56:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 08:56:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290053.491897 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTgV5-0001NI-7H; Mon, 14 Mar 2022 08:56:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290053.491897; Mon, 14 Mar 2022 08:56:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTgV5-0001NB-4E; Mon, 14 Mar 2022 08:56:23 +0000
Received: by outflank-mailman (input) for mailman id 290053;
 Mon, 14 Mar 2022 08:56:21 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=knG6=TZ=citrix.com=prvs=0654505ba=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nTgV3-0001Le-2i
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 08:56:21 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 99fe3c72-a374-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 09:56:15 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 99fe3c72-a374-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647248176;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=VBJoX8tiXlgRO5qb4sY8hEOLWi2vWuNChQvlx8Q3OzA=;
  b=UCZqsdglQ7lwxDZb1Ss3TBGLF++vAwSpwTgvmrkDG/tAF0y54pBnD3Tq
   JWYgUlFOCLZisO3itsCYa1fNcCnGcYUupHGopgbKtxZKEJ25pxEDst5fx
   5tOK3b5FlCV0aUSO/YYi6AduX70kHn6MlYy9rurJFD6s3x7M+bwdw03Cj
   s=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66162254
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:p1gAja3lvNSed0hFWvbD5dBxkn2cJEfYwER7XKvMYLTBsI5bpzIOm
 mAaDTjTPf+DMDb3fYtxOY2z909XuMWGmNNgTQBspC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUx3YDga++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /1KjpiiTzcZBJeVwsQ9DzpXUD1zGolvreqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHxO4wSoDd4xCzxBvc6W5HTBa7N4Le02R9u2JkQR6yDO
 6L1bxJdYQXcaB1XNGsRBbkRpcHrlmvcQgVx/Qf9Sa0fvDGIkV0ZPKLWGMXRUsyHQ4NShEnwj
 nLL+SH1Dw8XMPSbyCGZ6TS8i+nXhyT5VYkOUrqi+ZZCglee22gSAx0+TkagrL+yjUvWZj5EA
 xVKoGx09/F0rRH1CImmN/GlnJKalhknX8hWI90A0ljX6oqIwAnaGmUjahcUPbTKq/QKbTAt0
 1aImfbgCjpurKCZRBqhy1uEkd+hEXNLdDFfPEfoWSNAuoC++99r0nojW/45SMaIYsvJ9SYcK
 txghAw3nP0tgMECzM1XFniX0mv39vAlouPYjzg7v15JDCskPuZJhKTysDA3CMqsy67DEjG8U
 IAswZT20Qz3JcjleNaxaOsMBqq1wP2OLSfRh1Vid7F4qWjyoi/8J9gPv2gmTKuMDirjUWW1C
 HI/RCsLvMMDVJdURfIfj32N5zQCkvG7SIWNugH8ZdtSeJlhHDJrDwk1DXN8K1vFyRB2+YlmY
 M/zWZ/1UR4yVPQ2pBLrFrx1+eJ6mUgDKZb7GMmTI+KPiuHFOhZ4iN4tbTOzUwzOxPjd8VuPr
 IoHaZfiJtc2eLSWXxQ7OLU7dDgiBXM6GYr3u4pQcOuCKRBhA2YvF7naxrZJRmCvt/09ejvgl
 p1lZnJl9Q==
IronPort-HdrOrdr: A9a23:N4um1KPnRMeWycBcTsWjsMiBIKoaSvp037BN7TEXdfU1SL39qy
 nKpp8mPHDP5Ar5NEtOpTniAsm9qBHnm6KdiLN5Vd3OYOCMggqVBbAnwYz+wyDxXw3Sn9QtsJ
 uIqpIOa+EY22IK7/rH3A==
X-IronPort-AV: E=Sophos;i="5.90,180,1643691600"; 
   d="scan'208";a="66162254"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=TloaKuuuzjY0PQH29kJew8n+2xjrgK/o4t7TKmiBgU2CshlgN5kwIB6ulzAZwMFc2wMab1urAmHPfDzspT7xXyRf9xXPR9xCfpu67KRMTgDNWMrFUbK7Xzqdp3Z2MHguCvaqzrJ41X9lnNvJBu0cIE9nslEwgrG1+izqsGMpBM++WID9U8hnc1dki455CTg2Y1iU2wuF0+F14MDrDE/5hiUYITeJjyQXleuQDNPBKaZBGDuQmO1fJxtLYlRpByGkWPb3NrSGiODClOOkUlGXASLBreBXdxcwrXKcDQQh7M2U+fKUI5PX8Wf7tpkZHGOEtZthvHOxNoBaji1D9q210A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=poKvJJ6nelKY3DJA2ef1LFVjaP9p0DQCrGcNsDXoJ/U=;
 b=NxIdylsBkRY9lx1/04AxQaG3mvdjOnJE2JZbLYN3lNhum55lH6CTxTbQBwHMWHyBylfdj7bzDafmtx8m59MzaHYxFB8vKTexu65NOXighxDvxpT5ODU/8IoK7obU9kkN2BTzIZOOHijhMBLXq6L8v7IMB7X35A/OtideFgMtfMdbVBDzm9oKIH8lwz2tdJXrGSfJtKrAU9/LLog4S+L3JVY+bkvdH2eT0QgOjw9mUlJl7V0bGipdtmvPvGnCZdmhUw6cB6qaD0utBFkU/e5PTYPm9Ic8+US1dnOGAtabBKpu+YIlCaqJLfuvLIH0ANDEi40XwbxHqX2ehESqOHbUWw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=poKvJJ6nelKY3DJA2ef1LFVjaP9p0DQCrGcNsDXoJ/U=;
 b=K1MDko0Q1C6j3tmmNq+XLP/GLs+Xxia6tB9Qq0pHWIHq+uif8ngclCvhd7rJqb7HVTOAjypJkAcUPVkkq2Kd7z3GoCCFOGeK8GtgHwDx3W5HvOTVfSZc9BQ/2p4xnga4BYGnItpAtq5TPdFJ30eu01XTd3OGwj1dDOPgYYIUTCg=
Date: Mon, 14 Mar 2022 09:56:00 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH v3 4/4] x86/APIC: make connections between seemingly
 arbitrary numbers
Message-ID: <Yi8DIDGwb/4jYWI8@Air-de-Roger>
References: <35cb3c72-05ba-24c7-1fdd-3ee1aced3aec@suse.com>
 <123a9ae8-caab-01ae-5bea-8c590bd8f9d9@suse.com>
 <YitbhmgGy4Yh8PoP@Air-de-Roger>
 <8ec77c15-7c98-edc1-2f6b-f1d62d15b2a1@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <8ec77c15-7c98-edc1-2f6b-f1d62d15b2a1@suse.com>
X-ClientProxiedBy: MR2P264CA0006.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:500:1::18) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 9ea31d98-0777-406d-611c-08da05987a35
X-MS-TrafficTypeDiagnostic: BYAPR03MB4135:EE_
X-Microsoft-Antispam-PRVS: <BYAPR03MB4135B75F256846D2B99C755C8F0F9@BYAPR03MB4135.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(6666004)(9686003)(6916009)(54906003)(316002)(6512007)(53546011)(6506007)(4326008)(33716001)(38100700002)(8676002)(6486002)(66946007)(66556008)(66476007)(508600001)(86362001)(85182001)(5660300002)(8936002)(83380400001)(26005)(2906002)(82960400001)(186003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?Q29xUUN4UzJvb0t6QWdxRC9EdTJZY2s3clM3L0p4Z3U0QXBFaFBhb1RwOHlU?=
 =?utf-8?B?alF2d0h0UjRnM1FDK201RzVYZVgweTFRQ012REJab3FVNXlKVzcxTTdGNXpm?=
 =?utf-8?B?bzMweXRjOVl0SnR5c0lUY0VwTzVYMDVnYkxwb0xlNVBoaUV2dkpkNU9xbVNX?=
 =?utf-8?B?WmN3NkZoRDBhNXN0aVQ1RnhmQUZrVUtjZzhLUFR4V2ZHa29Jb0FWS1ZvQlJu?=
 =?utf-8?B?VFBoVzBJNnJTZFhuUGw0NDY3L0JjeXp0MEVBUFVVQ3VFYVVhL3daL284UVVo?=
 =?utf-8?B?SzN5M2VGWStjYWRiMW1pYkVFQVZndmNaMXQwK1lCNnJ2OWk0SlluVndFdUtF?=
 =?utf-8?B?Mk9iZ3pTbktXTG9QNGtJY3FlN2EvVE05aUxhTEF2QlZSa2JaTDB4eWJaWXNX?=
 =?utf-8?B?Smt5YmUzT3ZnK3FZaVkyWFIwenA2YmdYNzNLMEdrL2FLaWh2c2FtenB4d1B1?=
 =?utf-8?B?ZUNXUUU1Smp1QnBDQUtNUlNOZXZWSmNjS0gvY25XZUEwZEdNVk9VVUdBWGJN?=
 =?utf-8?B?WTNIY0hneEFBTzBGa2E5S0VlNkRPS2I5TnVEVjJvL2lkR0l2M2p4NGlKOWpp?=
 =?utf-8?B?V3JKcG1LV21oYXpzUHJDdTFNL1MxTG15bmJWZUx1YWtKTDVEb1FEc0V4aEpm?=
 =?utf-8?B?TGtLQURCejhEMU5YMEJBVkJrTUVxU3VNdVZMdHRJWnkrUWg1OC9XcDNveDNM?=
 =?utf-8?B?V2xjVkFuV1Z6NWRFRDIzM2pmNkNldVdrc0pKOFNQVHo5YVNGNUk2MXlUNXhB?=
 =?utf-8?B?cHkzQ3hNVUphRTZMNmMwZmhHbHJGVVZoRkZEZmhURnNHbzZjbHZxZDVqOEtO?=
 =?utf-8?B?U1d4eFM1RmQyUVFScThVbFRxZUNRVzFYZ3R0STZqL2cxVDBKeVJYeTBQdW42?=
 =?utf-8?B?WXd5ZW8wRFMrNFE3STRxak8ybGRwWk5nWjBLZjcwSklhK0Z5TFdscXhGdHFF?=
 =?utf-8?B?RVZuMno3amRwUlRmQkw2WDZWOWpzQ0I1Qkw4OTFkUHhlQ0p2TUZKOUg0c0hL?=
 =?utf-8?B?LzlRcFFKWjBkZDNKbHY2WEFsRVFWcnhWVEdKOThiV2RkeEs2Qm02aUJpWFpy?=
 =?utf-8?B?d282SFNvaUJMWDl6NmkvSUp1eVpOdU1jRUM0WnI3MnFDRWJLRmVZa1NpWGRp?=
 =?utf-8?B?UG51VlJrTW9RVlFoZlozam9oNDdFSjd5N3BGbE5aSGlPaFpWYlpDZ05acFB0?=
 =?utf-8?B?Z28wNGxodmVpT29ZVE5nSU1ZZFRuN1hpczhDMFRBWWd4Vng3eVhBWDNNNGdi?=
 =?utf-8?B?cDQzbGJMdkQvamllRTJZYWo3UUFVRjYrempxMzl3RENxRkhTS0FXMnp4TDF2?=
 =?utf-8?B?K2ZnS3JqWFVRd3NhaEVybEhpY0taVmplcjYxdlRzVUZOR2kzQ01xZnZ2Y1hW?=
 =?utf-8?B?b1hsTU8rN0hzVWFjbGdOcHVIK0xsbERsYkViZHBsbzVGYmtvaFJsUFBON1pO?=
 =?utf-8?B?OG5iWVhYRUNYdlk1Y2UvYmVOZ252SHhwcGNBWmhTTU1NRHZZcVZPMlhyZkNT?=
 =?utf-8?B?eUpUTVNRc0laclVOeG5ady9YdWEyNHgwWXAxdVh6L01WdHlvMXEwWTgzTzNz?=
 =?utf-8?B?cnBZKzdqSUxFRmNnZld0WVJqa2pIT1NjYUxmY1JBTk9IWjk1V3Q5WmtSZW5H?=
 =?utf-8?B?ZlE4WTRtMFRGKzJUa01qYnArNWhiOTNCcWpFS1RzbWxKQW5uZm85Y3BiS0Zq?=
 =?utf-8?B?K1h4TWNqbkNSdmZaWU1ZSnNUaWEzTHhYTWo0bG5nTWhJQjIwNGZuK1hyUnVw?=
 =?utf-8?B?V0tXNWsrd1RNZEtKblppMHk0ZndTd0ZYQnhLWHo1SzNBbmlNWW5ubTJudTRh?=
 =?utf-8?B?b2Y2eXhZZUZNa3llWFRnQzNQdDU4ekc1bDdJaXV2SlY5RVh5dDdoQkdNMFdK?=
 =?utf-8?B?TnJvR0UxUlZudkZDd3RhbFJlOW9LSjdoTWdYN01FaHpoanhaMzVIWlBEcmdG?=
 =?utf-8?Q?G2CqmHx0Mgw/zn51RVId8IfNBANJjIuI?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 9ea31d98-0777-406d-611c-08da05987a35
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 08:56:07.2176
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: ccPM0yszG/qN1KDMX8C97fHIM+ZTC8ZPfId3k2MeeovyZHrdJPNeDgy2cA+EXAOHmKRkEti5D1gMGTycuKgWCA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB4135
X-OriginatorOrg: citrix.com

On Mon, Mar 14, 2022 at 09:19:01AM +0100, Jan Beulich wrote:
> On 11.03.2022 15:24, Roger Pau Monné wrote:
> > On Mon, Feb 14, 2022 at 10:25:57AM +0100, Jan Beulich wrote:
> >> Making adjustments to arbitrarily chosen values shouldn't require
> >> auditing the code for possible derived numbers - such a change should
> >> be doable in a single place, having an effect on all code depending on
> >> that choice.
> >>
> >> For one make the TDCR write actually use APIC_DIVISOR. With the
> >> necessary mask constant introduced, also use that in vLAPIC code. While
> >> introducing the constant, drop APIC_TDR_DIV_TMBASE: The bit has been
> >> undefined in halfway recent SDM and PM versions.
> >>
> >> And then introduce a constant tying together the scale used when
> >> converting nanoseconds to bus clocks.
> >>
> >> No functional change intended.
> >>
> >> Signed-off-by: Jan Beulich <jbeulich@suse.com>
> > 
> > Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>
> 
> Thanks.
> 
> >> ---
> >> I thought we have a generic "glue" macro, but I couldn't find one. Hence
> >> I'm (ab)using _AC().
> > 
> > I would be fine if you want to introduce something right in this
> > commit to cover those needs, using _AC is not overly nice (or
> > clear) IMO.
> 
> Hmm, I was rather hoping that you (or someone else) would point me
> at what I thought I'm overlooking. If anything I'd likely clone
> Linux'es __PASTE() (avoiding the leading underscores), but their
> placement in linux/compiler_types.h seems pretty arbitrary and
> hence not a good guideline for placement in our tree. To be honest
> the only thing that would seem halfway consistent to me would be a
> separate header, yet that seems somewhat overkill ... Or wait -
> maybe xen/lib.h could be viewed as kind of suitable. Of course
> there's then the immediate question of whether to make _AC() use
> the new macro instead of open-coding it.

I think if possible _AC should be switched to use the new macro, yes.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 08:58:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 08:58:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290057.491909 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTgXJ-0001yy-Lp; Mon, 14 Mar 2022 08:58:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290057.491909; Mon, 14 Mar 2022 08:58:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTgXJ-0001yr-I0; Mon, 14 Mar 2022 08:58:41 +0000
Received: by outflank-mailman (input) for mailman id 290057;
 Mon, 14 Mar 2022 08:58:40 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=knG6=TZ=citrix.com=prvs=0654505ba=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nTgXI-0001yl-8G
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 08:58:40 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ef7e20db-a374-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 09:58:38 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ef7e20db-a374-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647248318;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=ZFFM/itOkTN/0Y50A1TbqHa3ajb9EbVM4EBoxW40c/8=;
  b=Elg1V8QgeeqZHPBEvujpJXA7iJjrrJgozextcq6a9f7EOdtcNjzY+0li
   OTGLfmfkWapcUF+O8vycyRAf6+rDCrFWis2owbjuubCcxXAUbCNyrcyQq
   P64e3Bu45QV+aoH5gwALmLKFVvvGHRB1yL0EygNG+pXjAPCM2aJIy73l5
   8=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66079555
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:diPaSK6Q8z2SdqeeUDVYRQxRtDvHchMFZxGqfqrLsTDasY5as4F+v
 jMbCGuPO/iLYWL1e9l0Po3j8U8CsJCAmtBrSQJvqyBhHi5G8cbLO4+Ufxz6V8+wwmwvb67FA
 +E2MISowBUcFyeEzvuVGuG96yE6j8lkf5KkYAL+EnkZqTRMFWFw0XqPp8Zj2tQy2YPgX1vU0
 T/Pi5a31GGNimYc3l08s8pvmDs31BglkGpF1rCWTakjUG72zxH5PrpGTU2CByKQrr1vNvy7X
 47+IISRpQs1yfuP5uSNyd4XemVSKlLb0JPnZnB+A8BOiTAazsA+PzpS2FPxpi67hh3Q9+2dx
 umhurSVGToJN7+UpN8cWjsCSjw5JbFoxLLudC3XXcy7lyUqclPpyvRqSko3IZcZ6qB8BmQmG
 f4wcW5XKErZ3qTvnez9GrIEascLdaEHOKsFvX5t13fBBOsOSpHfWaTao9Rf2V/cg+gQQ66BN
 pdENFKDajzgUjlwO01LD6gBp+COqiDATGMb93uK8P9fD2/7k1UqjemF3MDuUsOObdVYmACfv
 G2u13T0BFQWOcKSzRKB82mwnanfkCXjQoUQGbaksPlwjzW7xGYeFRkXXluTuuSihwi1XNc3F
 qAP0nNw9+5orhXtF4SjGU3jyJKZgvICc/8ALs0z+lmx8avdwVzAGy8cUhB9ZfVz4afaWgcW/
 lOOmtroAxlmv7uUVW+R+9+okN+iBcQGBTRcPHFZFGPp9/Gm+dhu1UyXEr6PBYbv1rXI9SfML
 ydmRcTUr5EaloY12qqy5jgraBr898GSHmbZCug6N19JDz+Vhqb4PeRECnCBtJ6sybp1qXHb4
 BA5dzC2trxmMH10vHXlrB8xNL+o/e2ZFzbXnERiGZIsnxz0pSL8JNEPumkhex4xWirhRdMOS
 BWP0T69GbcJZCf6BUOJS9/Z5zsWIVjISo2+C6G8gitmaZltbg6XlByClmbLt10BZHMEyPllU
 b/CKJ7EJS9DVcxPkWrnL89AgORD7n1vmgvuqWXTkk3PPUy2PyXOF9/o8TKmM4gE0U9ziF6Mo
 ogFaJfSlUk3vS+XSnC/zLP/5GsidBATLZv3t9ZWZqiEJA9nE3smEPjf3fUqfIkNokifvr6gE
 q2VMqOA9GfCuA==
IronPort-HdrOrdr: A9a23:1E+o4qGCP0gV2QShpLqFCpHXdLJyesId70hD6qkvc3Nom52j+/
 xGws536faVslcssHFJo6HmBEClewKnyXcT2/htAV7CZnichILMFu9fBOTZsl/d8kHFh4tgPO
 JbAtRD4b7LfClHZKTBkXCF+r8bqbHtmsDY5ts2jU0dNT2CA5sQkTuRYTzrdHGeKjM2YabQQ/
 Gnl7V6TnebCDwqR/X+IkNAc/nIptXNmp6jSRkaByQ/4A3LqT+z8rb1HzWRwx9bClp0sP0f2F
 mAtza8yrSosvm9xBOZ/2jP765OkN+k7tdYHsSDhuUcNz2poAe1Y4ZKXaGEoVkO0aqSwWdvtO
 OJjwYrPsx15X+UVmapoSH10w2l6zoq42+K8y7uvVLT5ejCAB4qActIgoxUNjHD7VA7gd162K
 VXm0qEqpt+F3r77WvAzumNcysvulu/oHIkn+JWpWdYS5EiZLhYqpFa1F9JEa0HADnx5OkcYa
 VT5fnnlbdrmG6hHjDkVjEF+q3uYp1zJGbKfqE6gL3a79AM90oJjXfxx6Qk7wM9HdwGOtx5Dt
 //Q9dVfYF1P78rhJ1GdZU8qOuMexrwqEH3QSuvyWqOLtBzB5uKke+y3IkI
X-IronPort-AV: E=Sophos;i="5.90,180,1643691600"; 
   d="scan'208";a="66079555"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=NBlLRDiESJxKY9aaDkzSqojQ/K9eD4OYx4lgvJch4AosN9zPfmPc+bacT1B7f0tdXWSJwtU9qD4Mqitu2nErY9Deqba1DY8pTPX0Y3aKTVN6pyH4GuSy53PbUe5nP2mwufr6EqYHb5zCXVAy2+rSJeCMRK0urCcaXF+fuNlVL4ygZUl4MMiAHEUtfjhmPUiznO0Zib5ljemKuNlOJglLv6Y3qpx4Bcjselo5FkUsse0TmTuoEGNykfrYjdmyYVIMIwcVsvbTOPaSiwbzHdJojO3dHUc7pXUzHIzNZasui130jgEGvzdwvuCgSLb8+BS5K24bNK8tMGjqYTsWt+6cVw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=6S3Ekb9PqgBkjODl0iEcXIH39Gu1GjWx+vf/VFmcyFA=;
 b=GxSg+rdCC+SlpX+gp76hussg6aynHwXbh37YJOA+Wpro4XqCfUvR19MOp6Up1MsINrK7msm0uRU3Pkpo0vTxi5zTDR/mwNNU2lg23cWRpZEjY2MDhBxfSa1GDFWnnM8RXxs7DtE0ExPzkh8zVN/cbDGz3dh4tBlwMKTfWJMAfF/u+ThGG0dQZOpls/0dCi3DGVAoGa9YktQRwnv3hFvWdCrA7TFNDJrKoKg3ZJ6pwCAqAPQQ13H2FD2X2e/HH6ZhvQlyHmiSx5lYPkPRGFQygrgU1evVhH9WWX5AI5WCHCEwbZNKxbaEnoo88WFCH2mvy++jg67Lke1fYf5wyq8BjA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=6S3Ekb9PqgBkjODl0iEcXIH39Gu1GjWx+vf/VFmcyFA=;
 b=hHyTMIkEh5OojykHehyzwwBVeZtTW8NjpcfGhnNGtxlSfZE1qAQGJfjAisaf+enHKvVWin4v6VI7FJWHtEaCYV+MeQvrVlpMAKU06lCXs+xllSe7hr/hHpyFzPB6z/R9P9BlNh3X18jNJbqeGj15u/XUvbvcBsv/nV+3GRWD5PA=
Date: Mon, 14 Mar 2022 09:58:29 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Andrew
 Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH v3 3/4] x86/APIC: skip unnecessary parts of
 __setup_APIC_LVTT()
Message-ID: <Yi8DtXURk3vejz43@Air-de-Roger>
References: <35cb3c72-05ba-24c7-1fdd-3ee1aced3aec@suse.com>
 <c679a11a-d2b5-403a-5341-3e00ac91ff45@suse.com>
 <YitXHaekQk1aK1i2@Air-de-Roger>
 <b6769525-0bbf-c735-70cd-d5c13ab232c8@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <b6769525-0bbf-c735-70cd-d5c13ab232c8@suse.com>
X-ClientProxiedBy: FR0P281CA0086.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:1e::22) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0260528f-c33e-4c9d-0791-08da0598d15f
X-MS-TrafficTypeDiagnostic: BYAPR03MB4135:EE_
X-Microsoft-Antispam-PRVS: <BYAPR03MB4135B9AFBBCFA179C7637F788F0F9@BYAPR03MB4135.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(8936002)(85182001)(5660300002)(82960400001)(186003)(2906002)(26005)(33716001)(4326008)(38100700002)(6916009)(54906003)(6666004)(9686003)(316002)(6512007)(53546011)(6506007)(86362001)(508600001)(6486002)(8676002)(66556008)(66946007)(66476007);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?M1UxZDFpelFsTHQxTlZaSkl4RmhBcXhvVEFUYjEzOFM4NzhJQUxHQkpXKzNZ?=
 =?utf-8?B?QWFXZUg2Q2JmNzRFc2dtZjNIRkprUGg5bHVEYWdxVEFKQnVQUzZqU0l2dGhx?=
 =?utf-8?B?S0gzRUx4Mk5xS2lPSDZaNTVTc01NK0k0bGhldW1PL3RaQXFYZXN3WFdwUzhw?=
 =?utf-8?B?ZUlVaFpGMVk4cG1wT1JzeGV6aFBFY2tkRVlyLzJqemZmL3lhS1B2ZEdqMkk5?=
 =?utf-8?B?ODBsaTUyRldrS0d0TkVXTzd3VnNENUY4Nlh2ai9VRk83a2dHMUVjS2RWdFdN?=
 =?utf-8?B?Ky9uUjAwTzR0WWtidGNnVU8yM1VLZXVNckNsclY3QW5EcXdhL21YV0wra0Vt?=
 =?utf-8?B?VWZhSHJubjdxeEREb3NqeHJ1Tzdrd0l3UnNMVUorK1pGb3dTYnNnTUVqQTVr?=
 =?utf-8?B?bVk5eWs5ZGN6TnA5SjhrdUFqSEdHckl4MU5ISXBYRDJ0UFZHRU5lMlN5WEx6?=
 =?utf-8?B?YU83NWlqa0tNM3NkdGJSOWZ1Vmg3NGhXazNtR1RsRUtaYU1EemZ3RGs0Ym54?=
 =?utf-8?B?SmN4TWJYeFlQLzVvaXVHM2RseDYrME5mc3ViUmlxcDQyclYzV0tGM3JLdW5p?=
 =?utf-8?B?Z0RmS0dxK0hud1NVaWh3MVdOOVp0a0xXendQT0tKZStWS0VDNEc5eEVYbXhE?=
 =?utf-8?B?N2tyT010ZzY4YVZGdWhtRy8vSlpUVHkrS0JZd0dqZWVOR2NBYzdmTEoybTgx?=
 =?utf-8?B?aHZqTHUwT1ZGWEVTaDI1OTJCYXdNZDFoYVhZU2JTVGJVQTY0UjFTcUdDQXBL?=
 =?utf-8?B?aWVkWG9CYXE5b291cTRjakNKYUVmSU5uQ05oS2VNVmF5a01TV00rT1VUcHhs?=
 =?utf-8?B?eUJUSFhMQ2J1MzFnN0w5RHdjSERicHVSRjJTTFFKQ3pZY2pSQVRvNlJJSlE2?=
 =?utf-8?B?ck1MSlUwSUJ5cU8xYUwrK092NDIrWHJMZWYrUkdiR1YvejJBMzBoN3Z4M1J6?=
 =?utf-8?B?N0QybHJsY20yUEszbWVCWmFjV1IwVm9CbzQ5Nmhyc0hZSUg4bmpFTzJ4czlj?=
 =?utf-8?B?a24rdDg5c0RLbkF3WkNnVWV0ZW9XclNQYWZMLzdYd2ZCM2t4czErTlZQakli?=
 =?utf-8?B?R3hXdG5DdGxUWlZFbytON2dMNUk3eGRjQXJzeS91NThUS1p2eE5YU2owNkZa?=
 =?utf-8?B?d1RFMkVLeDBNZ0RSMTJvRDE4NkFpZ3BnVUxWWUN1d2FRZFJvRW1rcjJqc2Jp?=
 =?utf-8?B?ckRrM0I4UFkvSGtlelJNUVFnSWxkZ3FvcjVGK1FTQTB0eDRqQmtBaE1WUXZz?=
 =?utf-8?B?Uk1jclBwWnJlYkZoTkx5WXYvY2FkMThHWTBwb3pRK3phYkozMHNhVU1RZXZu?=
 =?utf-8?B?Y3RBVFdnOEtTOTVuYTB4U2NuaDcyMmF5MFk2L3Zua0FLVUFHKzN2NUkyd2h1?=
 =?utf-8?B?ekIvcHdUQUlwMnVXaVkvNFdvT3liL0VBSWpIRXVqR2cwR0dQbk5TMTZLWm1O?=
 =?utf-8?B?U0xSR1JLemJoaVBNazIzVTEySjBSeCtxam5oVUYraXk5U3ZJL1ozZnJNMU5S?=
 =?utf-8?B?SHZBWVRmTUNPdHhkdHQrNWxmZVYvVEgyMm1nMTNlSXduRTRWVi9pem51Zlhz?=
 =?utf-8?B?Y1ViM0RiWGZMMGM1L0QyS3kzbFpSVzl3TkI1R0I3dzlqemFHb3c3N09oVjd5?=
 =?utf-8?B?RU8wWTBkTDdVSXlRdUtnYW13LytOYUFXQ1dLeGNWcjgwdmdpU1RSU0J1RjlJ?=
 =?utf-8?B?SFJCbUVGbVc0eWlmYlZqMllxWTRUeEtQMWVER1EwYnVKRDlxOWV2ZXYxZ21k?=
 =?utf-8?B?RHUzSldJVkp4dWk0Mk9LcExES0VPQzJkU1QvU3Uxc1JHRDlyRHlyV3ZGTVFC?=
 =?utf-8?B?dHNoT0loYVRVTjMzYUdBVVB3bzBlKzJVVHVlcjA3bGtuYmNIZ01LZkh0ZFE0?=
 =?utf-8?B?SjBhcDA5NDRsSnR0bFZ5c0dQclkvMEVuaUZsZndCc2llK3ZWNWhjcEU3c2c2?=
 =?utf-8?B?YjdHamgvZWlzT3ZSV1RpL2VnbS8yUTU3cmIyWmVSTzBhcUtyaTdvV3pXd3NZ?=
 =?utf-8?B?d3dWZWx0bDd3PT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 0260528f-c33e-4c9d-0791-08da0598d15f
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 08:58:33.3430
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Ccz3lly4o4Bqvcj2OyPFCZd13VYzIQbXKtL99VJTpBiXaXt83fc0+76ARb3KMEQnHk3dEFIpO3uT7wo4dZT9GA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB4135
X-OriginatorOrg: citrix.com

On Mon, Mar 14, 2022 at 09:25:07AM +0100, Jan Beulich wrote:
> On 11.03.2022 15:05, Roger Pau Monné wrote:
> > On Mon, Feb 14, 2022 at 10:25:31AM +0100, Jan Beulich wrote:
> >> In TDT mode there's no point writing TDCR or TMICT, while outside of
> >> that mode there's no need for the MFENCE.
> >>
> >> No change intended to overall functioning.
> >>
> >> Signed-off-by: Jan Beulich <jbeulich@suse.com>
> > 
> > I've got some comments below, now that the current proposal is bad,
> > but I think we could simplify a bit more.
> 
> I'm struggling with the sentence; perhaps s/now/not/ was meant?

Indeed, s/now/not/ is what I meant.

> >> --- a/xen/arch/x86/apic.c
> >> +++ b/xen/arch/x86/apic.c
> >> @@ -1059,24 +1059,25 @@ static void __setup_APIC_LVTT(unsigned i
> >>  {
> >>      unsigned int lvtt_value, tmp_value;
> >>  
> >> -    /* NB. Xen uses local APIC timer in one-shot mode. */
> >> -    lvtt_value = /*APIC_TIMER_MODE_PERIODIC |*/ LOCAL_TIMER_VECTOR;
> >> -
> >>      if ( tdt_enabled )
> >>      {
> >> -        lvtt_value &= (~APIC_TIMER_MODE_MASK);
> >> -        lvtt_value |= APIC_TIMER_MODE_TSC_DEADLINE;
> >> +        lvtt_value = APIC_TIMER_MODE_TSC_DEADLINE | LOCAL_TIMER_VECTOR;
> >> +        apic_write(APIC_LVTT, lvtt_value);
> >> +
> >> +        /*
> >> +         * See Intel SDM: TSC-Deadline Mode chapter. In xAPIC mode,
> >> +         * writing to the APIC LVTT and TSC_DEADLINE MSR isn't serialized.
> >> +         * According to Intel, MFENCE can do the serialization here.
> >> +         */
> >> +        asm volatile( "mfence" : : : "memory" );
> >> +
> >> +        return;
> >>      }
> >>  
> >> +    /* NB. Xen uses local APIC timer in one-shot mode. */
> >> +    lvtt_value = /*APIC_TIMER_MODE_PERIODIC |*/ LOCAL_TIMER_VECTOR;
> > 
> > While here I wouldn't mind if you replaced the comment(s) here with
> > APIC_TIMER_MODE_ONESHOT. I think that's clearer.
> > 
> > I wouldn't mind if you did something like:
> > 
> > unsigned int lvtt_value = (tdt_enabled ? APIC_TIMER_MODE_TSC_DEADLINE
> >                                        : APIC_TIMER_MODE_ONESHOT) |
> >                           LOCAL_TIMER_VECTOR;
> 
> I'm happy to switch to using APIC_TIMER_MODE_ONESHOT, but ...
> 
> > apic_write(APIC_LVTT, lvtt_value);
> > 
> > if ( tdt_enabled )
> > {
> >     MFENCE;
> >     return;
> > }
> 
> ... I'd prefer to stick to just a single tdt_enabled conditional.
> But then I'm also unclear about your use of "comment(s)" - what is
> the (optional?) plural referring to?

I considered the switch to use APIC_TIMER_MODE_ONESHOT one comment,
while the switch to set lvtt_value only once another one.

I'm fine if you want to leave the layout as-is while using
APIC_TIMER_MODE_ONESHOT.

Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 09:05:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 09:05:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290064.491920 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTge3-0003XG-K3; Mon, 14 Mar 2022 09:05:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290064.491920; Mon, 14 Mar 2022 09:05:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTge3-0003X9-FT; Mon, 14 Mar 2022 09:05:39 +0000
Received: by outflank-mailman (input) for mailman id 290064;
 Mon, 14 Mar 2022 09:05:38 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=knG6=TZ=citrix.com=prvs=0654505ba=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nTge2-0003X3-9G
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 09:05:38 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e8635898-a375-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 10:05:36 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e8635898-a375-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647248736;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=7f3FHybYmBRtMV3SY7h+9wnyt7PDiERXxkmS4Z6l5DE=;
  b=KDWwot4jSpl9yeR3JJKYkLAYPxYCXf3fvnVz4GY1ArljQWV3zpPADzAc
   TBxPlI9uhS5RVVlxIkDuKO/uG4mc6xm5enIJePoBYwCQSZFgfS29E+pPz
   ltfcxJMK0h9u918JiPNPknDhKMe3LMiL7yYxb7zuNA5d+ySi7QvsL14bd
   Y=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66554970
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:ohbssK79ImKvACswGUMDpQxRtDvHchMFZxGqfqrLsTDasY5as4F+v
 mEZXjvTOfaLa2rwftt0PI6+8hlV7cCBzdVjGwdqqy9gHi5G8cbLO4+Ufxz6V8+wwmwvb67FA
 +E2MISowBUcFyeEzvuVGuG96yE6j8lkf5KkYAL+EnkZqTRMFWFw0XqPp8Zj2tQy2YPgX1vU0
 T/Pi5a31GGNimYc3l08s8pvmDs31BglkGpF1rCWTakjUG72zxH5PrpGTU2CByKQrr1vNvy7X
 47+IISRpQs1yfuP5uSNyd4XemVSKlLb0JPnZnB+A8BOiTAazsA+PzpS2FPxpi67hh3Q9+2dx
 umhurSVWCE0A7XDmdgGcDkCEQR/BvZ24JD+dC3XXcy7lyUqclPpyvRqSko3IZcZ6qB8BmQmG
 f4wcW5XKErZ3qTvnez9GrIEascLdaEHOKsFvX5t13fBBOsOSpHfWaTao9Rf2V/cg+gQQ6uDO
 5tGMVKDajziPidfHWodFK40leX1iECvSy1nk2288P9fD2/7k1UqjemF3MDuUsOObdVYmACfv
 G2u13T0BFQWOcKSzRKB82mwnanfkCXjQoUQGbaksPlwjzW7xGYeFRkXXluTuuSihwi1XNc3F
 qAP0nNw9+5orhXtF4SjGU3jyJKZgvICc/9BNfAH8A6M9rH3w1ybI2k/FQ5ZR+Vz4afaWgcW/
 lOOmtroAxlmv7uUVW+R+9+okN+iBcQGBTRcPHFZFGPp9/Gm+dhu1UyXEr6PBYbv1rXI9SfML
 ydmRcTUr5EaloY12qqy5jgraBr898GSHmbZCug6N19JDz+Vhqb4PeRECnCBtJ6sybp1qXHb4
 BA5dzC2trxmMH10vHXlrB8xNL+o/e2ZFzbXnERiGZIsnxz0pSL8JNEPumkhex4xWirhRdMOS
 BWP0T69GbcJZCf6BUOJS9/Z5zsWIVjISo2+C6G8gitmaZltbg6XlByClmbLt10BZHMEyPllU
 b/CKJ7EJS9DVcxPkWrnL89AgORD7n1vmgvuqWXTkk3PPUy2PyXOF9/o8TKmM4gE0U9ziF6Mo
 ogFaJfSlUk3vS+XSnC/zLP/5GsidBATLZv3t9ZWZqiEJA9nE3smEPjf3fUqfIkNokifvrygE
 q2VMqOA9GfCuA==
IronPort-HdrOrdr: A9a23:HQya061CXe660Nj+A2xAFQqjBVByeYIsimQD101hICG9Lfb2qy
 n+ppgmPEHP5Qr5OEtApTiBUJPwJk800aQFm7X5Wo3SITUO2VHYV72KiLGN/9SOIVydygcw79
 YET0E6MqyNMbEYt7eK3ODbKadY/DDvysnB7o2/vhRQpENRGtldBm9Ce3im+yZNNW977PQCZf
 6hDp0tnUveRZ1bVLXyOlA1G8z44/HbnpPvZhALQzYh9Qm1lDutrJr3CQKR0BsyWy5Ghe5Kyx
 mOryXJooGY992rwB7V0GHeq7xQhdva09NGQOiBkNIcJDnAghuhIK5hR7qBljYop/zH0idgrP
 D85zMbe+hj4XLYeW+45TPrxgnbyT4rr0TvzFeJ6EGT1vDRdXYfMY5slIhZehzW5w4Lp9dnyp
 9G2Gqfqt5+EQ7AtD6V3amGazha0m6P5VYym+8aiHJSFaEEbqVKkIAZ9ERJVL8dASPB7pw9Gu
 UGNrCR2B9vSyLaU5nlhBgu/DT1NU5DXStuA3Jy9/B96gIm0kyQlCAjtY4idnRpzuNId3AL3Z
 WADk1SrsA8ciYnV9MMOA4/e7rENoXse2O7DIvAGyWvKEk4U0i93qIfpo9FoN2XRA==
X-IronPort-AV: E=Sophos;i="5.90,180,1643691600"; 
   d="scan'208";a="66554970"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=a1bVnN9sI5r3xddNXZ0v8fWj24Lcb8W7Fi4kqkBzuyA2KX0yAMNADbSkKjgFRwTnIu8DoZMeNRKyxii4oPpdApIsiOIczJcASLswrQTL3vX6BVH2MT/NDaqIHtkHlkAlDKopI9ufDU3PDctpeZS/v/X6zUe2YU7PlwHOKI2pv/aprckMTUvM1K6hcUsVZ+GmetMATjm7Qh18hgVGOZ+HKkFZ1AQvxB0SLIQQfmrS+zcLk9+ICdu3Mll3Bf5I/eTbJwORyTp2R5dAYUbC8+v+4sK5tY/ay+5Zj6fTrDS5I9N5tF4c6WR6qeaupXlFxxqiuYhMt87Z7lXeFN441g74bA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=o/K3+KEk8psRZATLFl+Eews4VxIIWVr363BhTaQLETI=;
 b=YwZEBzLeiwJnzgMwWJdtchAQI2HI6/PzWtDTLqJDKK4R7R2KwPPcuj+bGJtMbDbIpamrS0Yjj26u2Sf8bgkU0snzVbekPp4/07v/wNin+WAhC0eNjwPIfdi/G/L9sNPNgyLtwmTT8gtmbYsBQ9RQ/6zKaeXnWK7DWbjY60yikQP7VK+sBJTM752W2LF8VMqUxB2OeQvkhNn4l9O5TGS0zshhmtn2+bST/hlZQ/EOcXQuFADQodVIkED7mz1BbLYKceptAYM8fX/VHvqt8+li42cwV5gyJRIH7PXVJag5o3WvOB+YLXrnucEwk/XaNb6zmN3VY4f7WdtZxYXyvUiRXg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=o/K3+KEk8psRZATLFl+Eews4VxIIWVr363BhTaQLETI=;
 b=fHJP6D+RUQ+VbwOOpUvLwSZW7EHUn0seBSiv3lCMbuKsT8DKz3/NKoa3tQozz96liP+SskGr05op01znSaCf58Mf30CwHY3UlZlwwvnE57UNsO9Qu3tggtkMb03+zC86ajUzlflYNfwT6lNv0ZHaAh/mk68qadldq+aoAiAtxWM=
Date: Mon, 14 Mar 2022 10:05:27 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Andrew
 Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH v2] x86: avoid SORT_BY_INIT_PRIORITY with old GNU ld
Message-ID: <Yi8FVxTu/r8cUVt3@Air-de-Roger>
References: <97bebbfa-b5e8-4c57-162f-2a052de92f02@suse.com>
 <Yitd9RNJf1vvOsf4@Air-de-Roger>
 <517b0f83-ba5e-3aaf-9c06-9b7078b816ec@suse.com>
 <Yitlw1EN+egVJ4xD@Air-de-Roger>
 <bdd016c0-b02b-3128-7187-d781b6f88dea@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <bdd016c0-b02b-3128-7187-d781b6f88dea@suse.com>
X-ClientProxiedBy: MR1P264CA0027.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:501:2f::14) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 4d22cc07-86bc-475c-3cab-08da0599caad
X-MS-TrafficTypeDiagnostic: BN7PR03MB4356:EE_
X-Microsoft-Antispam-PRVS: <BN7PR03MB4356C35281C0FC21E49244C98F0F9@BN7PR03MB4356.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(33716001)(508600001)(6916009)(2906002)(6486002)(54906003)(53546011)(85182001)(83380400001)(6506007)(26005)(186003)(8676002)(82960400001)(316002)(66946007)(66556008)(5660300002)(66476007)(4326008)(8936002)(6666004)(9686003)(38100700002)(6512007)(86362001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?MlZQc1Rmc25xMnFQZFA4L3VrQmd2Vy81VTFmR1ZMN1FNbjFEbm1JNmtLUjl5?=
 =?utf-8?B?enQ0SlkrejVjV1J2ODE2L2kzNEViVERiS2tVU3MyUVpaWUp2WE1VTkRSdDVD?=
 =?utf-8?B?VDROQWw5Y3lEVloxWFY4WmlrMlhlSFVRMkw1K0hPVDQ2cXFPOWlXb3FPekhn?=
 =?utf-8?B?L1RySWZCRXBYVUJIbkQ1WXBrcXZSZlo4WTh4Rnh1MWhCVS9BVVBsSTI0dTlP?=
 =?utf-8?B?UzRZa0srSW9zbHQ2OWU3WVUyK0tuYXRhYnkyNUhrWDB2NGxTemt0ditYYUUv?=
 =?utf-8?B?RVBCL0FvNy9rMTBIenJpbXFDZkk3SWpKRGovU052a1RORStNYmYyaDRBU2tE?=
 =?utf-8?B?eE96NENFZ044MDV1a01La1lpajVWWkNrTzdycDZwZitTTWpGQ01XQjdEUTNv?=
 =?utf-8?B?QVRQVXNpc1FEOFhTTWxNSzg1SUFETEFDZVdaMXJSMlA2RjFMWlVFc2lyT3hk?=
 =?utf-8?B?T3FKTzdJNlQrWlZZRWdQV2lqOVpjb0Q4aEFEeTc5dEN0MkhmUmNTTkVXYTNL?=
 =?utf-8?B?L1pQVGVJRG1vWGtSZktPK2FBeHFLMnlxQW1oNjBKNm9STWppeVRwNXhTZUNt?=
 =?utf-8?B?Uy9WdWluUEY2d2JOYks1cTlzYnM2VmJ3d2hFMGd1Nm80K2FkcG5OVkg1aDhk?=
 =?utf-8?B?TDloWjJtQVJwUDFaNnZNME0rSWh3TTZHd1YrTG12czRXMXZoOUxHYytuQTdZ?=
 =?utf-8?B?ZldHVTVyV0NuM2R6SnRBY2J1cTVyV0oxRVJRUnZ2TGRiWmFNdkdmcVF5YXZx?=
 =?utf-8?B?bGRLR3pRZ3A3RVRTYWtKY00ySVZqb0p5SEhrNUFtSnlVZXhwSGRmQ09PWXJT?=
 =?utf-8?B?R1BOOXRWUlVYN1l2blZ0K1duRUdlUVFlSzlSZzd3ZWRaU21GTDZyRUhxT1dD?=
 =?utf-8?B?Rk1pNDFNMnVuT2FUeW1PcE4zMDBBKys5cWlzdDFYWVZOK3d2UjBCZGVFMTVq?=
 =?utf-8?B?bHNRajVBRFZsUENJbXc3OEx5TWJvL0JDeHNlN0dLNVRyQ1lTc1JVbkxieE10?=
 =?utf-8?B?UGdCanZTQmpXenBEQWt3Y1pDUGJTUUNXZXI4bmMzUmtiMjVSTlRhYld1NlpR?=
 =?utf-8?B?VW1WY3FnSWN0eFNDdG5YRFBYdnMwelh6QUtNVllyZmlOTkFmQWF3UFZPMXNu?=
 =?utf-8?B?b2xhZkNKaDVQKy9XRDlrbDU1Wk1lWGJhby9xNjF4SFY3YkdLRXVqZVFQMG55?=
 =?utf-8?B?WHlIdjhadTJPdkg5Z3hNQmh4SlQvYTNKdE5TZVpPSS8yY1VNcFBjQWZyOWpP?=
 =?utf-8?B?c2hQWTAwS255aG1keStpSkJ3QUF4RmhtenE4VEl6TFRJeE8xamg3SmdNL1NZ?=
 =?utf-8?B?akVNeWdyckR6VWNaMVg5NXNVSWRoYWh4RVFrUXIzdWRzYlZNamc1V2hjb3Vu?=
 =?utf-8?B?MG9Ic0NnSkRLNU9VL0N0SGNPdmk5dlZqZ2FCbnk4MzZrMUx5M1Q1SHpxNWdn?=
 =?utf-8?B?UzI1RDBDS0J5bWZrN3hHa25xWjRidGRkWERGWXpZTElSb0craXpaZTUwYlZ3?=
 =?utf-8?B?SktxVUh0eXBMSWtXV3FGQjZuSXJBazZXbWdoMUtBRDhEMW9uQmFpNnFzM0dt?=
 =?utf-8?B?WVdOWHEyNkZTK1RQYzVMSC94Y05ZL05uMTN2NkRoS0I5cHZjWGdBbHloMkp2?=
 =?utf-8?B?RjFsYmVKZlVlZVRNTzE2UGEvR1pZUUt2cGpDZTBTMCtHVjRlQlpJbFN5VHFK?=
 =?utf-8?B?aWZuckt1d29sSkNmUnY2WTZmSU5pdHlHSnZuOHpBbFViWVcwZ201cVZja0Ny?=
 =?utf-8?B?QmJabjNmc1J5cUg1NzJMMXpmY2d4R3A1Q0FrN0VqVHdhU3ZYRGMwUHMybDVR?=
 =?utf-8?B?QWJrOU8xQmplbjZHRTVpNmtFVnQvdGZLdnNtS0pRL1FzRERpVzhlYUlFK1dj?=
 =?utf-8?B?bzFkbWgzRkV1U2pkaCtVa3JIUjAvSUx6eHkveElvRUswYkE0RWdBMGZvNTVs?=
 =?utf-8?B?RzUvbkE1eVM1dTA5aVp1N0pQRUNkaGs2Um45aWNlTVBTbGZjUzc3WFFBakN0?=
 =?utf-8?B?WkN2T3lFTXRBPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 4d22cc07-86bc-475c-3cab-08da0599caad
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 09:05:31.6082
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: iwW2Q3734D7ek3R12O5K9GgaHs6WoHJEO1Foew/onOPEDBnuUJhqnRtlzUq3t9FpGkhi1TMZ5QfcVTsiwiVZzw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN7PR03MB4356
X-OriginatorOrg: citrix.com

On Mon, Mar 14, 2022 at 08:38:52AM +0100, Jan Beulich wrote:
> On 11.03.2022 16:07, Roger Pau Monné wrote:
> > On Fri, Mar 11, 2022 at 03:55:57PM +0100, Jan Beulich wrote:
> >> On 11.03.2022 15:34, Roger Pau Monné wrote:
> >>> On Fri, Mar 11, 2022 at 02:28:40PM +0100, Jan Beulich wrote:
> >>>> Support for this construct was added in 2.22 only. Avoid the need to
> >>>> introduce logic to probe for linker script capabilities by (ab)using the
> >>>> probe for a command line option having appeared at about the same time.
> >>>>
> >>>> Fixes: 4b7fd8153ddf ("x86: fold sections in final binaries")
> >>>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
> >>>> ---
> >>>> v2: Always define HAVE_LD_SORT_BY_INIT_PRIORITY when using LLVM ld.
> >>>>
> >>>> --- a/xen/arch/x86/arch.mk
> >>>> +++ b/xen/arch/x86/arch.mk
> >>>> @@ -73,6 +73,16 @@ ifeq ($(CONFIG_UBSAN),y)
> >>>>  $(call cc-option-add,CFLAGS_UBSAN,CC,-fno-sanitize=alignment)
> >>>>  endif
> >>>>  
> >>>> +ifeq ($(call success,$(LD) --version | head -n 1 | grep -q "GNU ld"),y)
> >>>
> >>> You are not going to like this, but I think this should live in
> >>> xen/Kconfig together with CC_IS_{GCC,CLANG}, ie: LD_IS_GNU or similar.
> >>>
> >>> It's possible we will need this in the future in other places, so
> >>> having it in Kconfig makes sense.
> >>
> >> Despite me not liking this (until, as said elsewhere, we've properly
> >> settled on either approach) I did actually consider doing like you
> >> suggest. But: I would have to introduce there more than I need here,
> >> just for consistency's sake, and I wouldn't have a way to test the
> >> LLD part of it (I did check - none of the distros where I chose to
> >> install Clang offer the linker). I realize I could ask you to help
> >> with the testing, but then the first point would remain. I'd prefer
> >> if for this simple build fix it was okay to go the old fashioned
> >> route ...
> > 
> > I would be fine with you just introducing LD_IS_GNU. That's all we
> > need so far. We can introduce LD_IS_LLVM if/when required. I prefer
> > that asymmetry rather than doing the detection here.
> 
> Yet I'm not happy to go this route. I'm only willing to do this
> consistently, but that in turn not without us having formally sat down
> and discussed the overall model to use. The only short term alternative
> I see is to go back to SORT() unilaterally, hoping that for now
> different priorities won't be encountered.

Would you be fine if it was a patch of mine that introduces
LD_IS_{GNU,LLVM} to xen/Kconfig (Acked by someone else) and then you
use it here?

I realize this is tricking you, but I would rather get this unblocked
if possible.

While I can agree to test for features in Makefiles closer to the
place where they are used, I don't like doing the version checks in
Makefiles, much less arch-specific ones.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 09:21:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 09:21:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290069.491931 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTgtJ-0002Ih-Tc; Mon, 14 Mar 2022 09:21:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290069.491931; Mon, 14 Mar 2022 09:21:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTgtJ-0002IZ-Na; Mon, 14 Mar 2022 09:21:25 +0000
Received: by outflank-mailman (input) for mailman id 290069;
 Mon, 14 Mar 2022 09:21:24 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=65Xv=TZ=gmail.com=raphning@srs-se1.protection.inumbo.net>)
 id 1nTgtI-0002IT-Fg
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 09:21:24 +0000
Received: from mail-wr1-x433.google.com (mail-wr1-x433.google.com
 [2a00:1450:4864:20::433])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 1d1e1270-a378-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 10:21:22 +0100 (CET)
Received: by mail-wr1-x433.google.com with SMTP id j17so22874382wrc.0
 for <xen-devel@lists.xenproject.org>; Mon, 14 Mar 2022 02:21:22 -0700 (PDT)
Received: from dev-dsk-raphning-1b-027ba2d5.eu-west-1.amazon.com
 (54-240-197-225.amazon.com. [54.240.197.225])
 by smtp.gmail.com with ESMTPSA id
 l10-20020a056000022a00b001f017dfb5cdsm18596668wrz.90.2022.03.14.02.21.21
 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128);
 Mon, 14 Mar 2022 02:21:21 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1d1e1270-a378-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:mime-version
         :content-transfer-encoding;
        bh=lNBQso0zhHWbsx6FmHoKXMM8CPTES/RyOqRD8pydHKg=;
        b=LPnb3glCoavj7nj0vQJRRbcCa1zH37VaG3cp9sN4eizjmzOTJoqa8mBqc/hDHpB7vo
         f/k8oCsxa0oSdqNjowLpY9oasqbMM3ou4hr1H4oXr/ulKGT5h+AJ8VlC+xM+Tn06lqd6
         F1RNw3fGEvQvONvATv3LFIRhWcZga9k7SGzVV1IlxeknrPDddsX57t6jyZyHvwzMBJou
         wGpnnrqUEzxXxrjKnGVFXk1Tp7Q/TLnGwEEp3JUbuCDEsSm8Mn4FCrApAU3Z4tls2kV2
         rX2NJa2tfZQZoJNY0+cMMGMRWjqZxTMS4HBcUP/GabwSRYirFGnGLdS/iFC40CUAGqIf
         VBhQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version
         :content-transfer-encoding;
        bh=lNBQso0zhHWbsx6FmHoKXMM8CPTES/RyOqRD8pydHKg=;
        b=mczRBT3tcb1ChPXT0QD+0t9zjxRfyys9KEjcmpu1laU3cmFNne7a7Fky72nH04T7ko
         jzcGy+j2xZVliYR9odBGpincFnLNLDk9FoxNtidl+rv4vEaOckmIL0qEwWo/j74uQU6K
         gSLSDZK98zA23T+/mKXB0XzV7dJ3dOfVssfdEWjr1Y45xi4Fy9ICcacotuWL3cgC4p6t
         IVwGMj8AbV/CzLhQghAqTZfgo8FYE9H9Ah+2M8yU7yLgZrQ3ahytIAGYP48nbOr7j0TT
         5MXRaMgZd/ukppXhjo3KiAX50Jdx7beJgD4Yjd3UoNF0QrS0HvjF/Q/YunZZ7rg3C6Wh
         pC1Q==
X-Gm-Message-State: AOAM532Uc32dzdixMAFpchiiiVYaBL1dlfv+uUVhlnE1QkBthRhivtxk
	qWMQqbZgLlsxTRC0igD23as=
X-Google-Smtp-Source: ABdhPJysTeuj9cLYwR/EO8Cg7/8pmF0BRM3ZE7pAXsWPH0Nvn3mCL8wB+ycEHtE1pZSqV2SOMa2t1w==
X-Received: by 2002:adf:a198:0:b0:1f0:2477:3b79 with SMTP id u24-20020adfa198000000b001f024773b79mr15423960wru.24.1647249681665;
        Mon, 14 Mar 2022 02:21:21 -0700 (PDT)
From: Raphael Ning <raphning@gmail.com>
To: Simon Horman <horms@verge.net.au>
Cc: kexec@lists.infradead.org,
	Raphael Ning <raphning@gmail.com>,
	Julien Grall <julien@xen.org>,
	xen-devel@lists.xenproject.org,
	Raphael Ning <raphning@amazon.com>
Subject: [PATCH] kexec-xen: Allow xen_kexec_exec() to return in case of Live Update
Date: Mon, 14 Mar 2022 09:21:15 +0000
Message-Id: <20220314092115.48309-1-raphning@gmail.com>
X-Mailer: git-send-email 2.32.0
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Raphael Ning <raphning@amazon.com>

Currently, my_exec() does not expect the Xen KEXEC_CMD_kexec hypercall
to return on success, because it assumes that the hypercall always
triggers an immediate reboot. However, for Live Update, the hypercall
merely schedules the kexec operation and returns; the actual reboot
happens asynchronously. [1]

Therefore, rework the Xen code path of my_exec() such that it does not
treat a successfully processed Live Update request as an error. Also,
rephrase the comment above the function to remove ambiguity.

[1] https://lists.xen.org/archives/html/xen-devel/2021-05/msg00286.html

Signed-off-by: Raphael Ning <raphning@amazon.com>
---
 kexec/kexec-xen.c |  9 ++++++---
 kexec/kexec.c     | 23 +++++++++++++++++++----
 kexec/kexec.h     |  2 +-
 3 files changed, 26 insertions(+), 8 deletions(-)

diff --git a/kexec/kexec-xen.c b/kexec/kexec-xen.c
index 47da3da466f0..44c64d99c566 100644
--- a/kexec/kexec-xen.c
+++ b/kexec/kexec-xen.c
@@ -247,21 +247,24 @@ int xen_kexec_status(uint64_t kexec_flags)
 	return ret;
 }
 
-void xen_kexec_exec(uint64_t kexec_flags)
+int xen_kexec_exec(uint64_t kexec_flags)
 {
 	xc_interface *xch;
 	uint8_t type = KEXEC_TYPE_DEFAULT;
+	int ret;
 
 	xch = xc_interface_open(NULL, NULL, 0);
 	if (!xch)
-		return;
+		return -1;
 
 	if (kexec_flags & KEXEC_LIVE_UPDATE)
 		type = KEXEC_TYPE_LIVE_UPDATE;
 
-	xc_kexec_exec(xch, type);
+	ret = xc_kexec_exec(xch, type);
 
 	xc_interface_close(xch);
+
+	return ret;
 }
 
 #else /* ! HAVE_LIBXENCTRL */
diff --git a/kexec/kexec.c b/kexec/kexec.c
index 7e4787bc8211..e7861049bbea 100644
--- a/kexec/kexec.c
+++ b/kexec/kexec.c
@@ -902,13 +902,28 @@ static int my_shutdown(void)
 }
 
 /*
- *	Exec the new kernel (reboot)
+ *	Exec the new kernel. If successful, this triggers an immediate reboot
+ *	and does not return, but Xen Live Update is an exception (more on this
+ *	below).
  */
 static int my_exec(void)
 {
-	if (xen_present())
-		xen_kexec_exec(kexec_flags);
-	else
+	if (xen_present()) {
+		int ret;
+
+		/*
+		 * There are two cases in which the Xen hypercall may return:
+		 * 1) An error occurred, e.g. the kexec image was not loaded.
+		 *    The exact error is indicated by errno.
+		 * 2) Live Update was successfully scheduled. Note that unlike
+		 *    a normal kexec, Live Update happens asynchronously, i.e.
+		 *    the hypercall merely schedules the kexec operation and
+		 *    returns immediately.
+		 */
+		ret = xen_kexec_exec(kexec_flags);
+		if ((kexec_flags & KEXEC_LIVE_UPDATE) && !ret)
+			return 0;
+	} else
 		reboot(LINUX_REBOOT_CMD_KEXEC);
 	/* I have failed if I make it here */
 	fprintf(stderr, "kexec failed: %s\n", 
diff --git a/kexec/kexec.h b/kexec/kexec.h
index 595dd681db6d..0f97a974cb8a 100644
--- a/kexec/kexec.h
+++ b/kexec/kexec.h
@@ -324,7 +324,7 @@ void cmdline_add_liveupdate(char **base);
 int xen_present(void);
 int xen_kexec_load(struct kexec_info *info);
 int xen_kexec_unload(uint64_t kexec_flags);
-void xen_kexec_exec(uint64_t kexec_flags);
+int xen_kexec_exec(uint64_t kexec_flags);
 int xen_kexec_status(uint64_t kexec_flags);
 
 extern unsigned long long get_kernel_sym(const char *text);
-- 
2.32.0



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 09:38:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 09:38:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290074.491942 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTh9U-00040N-8r; Mon, 14 Mar 2022 09:38:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290074.491942; Mon, 14 Mar 2022 09:38:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTh9U-00040G-5m; Mon, 14 Mar 2022 09:38:08 +0000
Received: by outflank-mailman (input) for mailman id 290074;
 Mon, 14 Mar 2022 09:38:06 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=29fN=TZ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nTh9S-000408-Rb
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 09:38:06 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 72c06cde-a37a-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 10:38:05 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2109.outbound.protection.outlook.com [104.47.17.109]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-32-UoKF5rtrO3SODQ2nU1KiqQ-1; Mon, 14 Mar 2022 10:38:03 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DU2PR04MB8854.eurprd04.prod.outlook.com (2603:10a6:10:2e1::8) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.28; Mon, 14 Mar
 2022 09:38:01 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 09:38:01 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 72c06cde-a37a-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647250684;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=ylrmY1DQcoHjDrSmaGgq2k0zUW7qX6s7Qo6DgPJp7Sw=;
	b=aMm/rVMnSERTfzZBBh1QjQfiSfYAV4SjjBY8bq/OggpMEf7hK+sA2A866RrgQhwqngzBBO
	MDhGzJBDPVMyXZqsi3ptjSPE6Igk4uernweaxXnjSCzGSAk+H51WXe7AqFxcxyFb8X25n8
	eGjpRDnIYAaUZhmbABPbEM7Dk3He3P0=
X-MC-Unique: UoKF5rtrO3SODQ2nU1KiqQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ZzfHCCggBUOCGkZMOkrI5KC5qIwZAF4sPPzObvcv8qnchd1A9oQTc0TiIVziXem4zV11VjTfWQZUxG91189h7GhgIsiUVp1epGi7oU447sscni7WGtCTwYeyBrUSSk8Htxzj3hE1k0c45MxzYxPaOOJU/4ZPPRz6WoQfNkMGneD9lTaW0TEoEXk3UEmAYDyBsNBT4c8e1Z6+CXYOQLezlVgjmeRa7f9hRbuTknoLabRzslpOumaHciYdSytebw1+oNEW7+5B6Mq+OjaM4bxnWzTFXMWgeCpufBj3YrhMHOS8zcPo//2x70t4i3tlyejiJNQUeLPEY9siDauFZqkN1A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=VG69AyWawrszyq0Ct22IOp+yjoHIItGki86NOBH86TE=;
 b=OAygGi19ThS1SMXlm6JKZva/Z0BFMuAM0b9vfHGg9WYt8Kr4aLpa8jaNkOFFucj1dld2cowYHr5qBhou1uOz6mH+cA+mEwBpy5MM1REEIazAai4ZbV6i3vv268TGiCuQOVRGBjFhBI04ZTlEE5ZtRH+bhKMeb8kg3A0VbaYnLBdbLuPRoRuDSIEF3VfJjeYLczXENdygUgxJ2XpJG3Jxx5hh60QxG8SfMgnTSf74EdfuYeUCYMmg/FRA4K0IHyi3iJzaUsWZvkC7oUvNh0+70mdPgMwH/POavdkO6LzzcEkl8KpX8AOBKdnVecZU+gvuZYk5pyFnOotfHZhDPi20IA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <fbe0e0f0-85dd-434b-aca5-fa513b720c0b@suse.com>
Date: Mon, 14 Mar 2022 10:38:00 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2] x86: avoid SORT_BY_INIT_PRIORITY with old GNU ld
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
References: <97bebbfa-b5e8-4c57-162f-2a052de92f02@suse.com>
 <Yitd9RNJf1vvOsf4@Air-de-Roger>
 <517b0f83-ba5e-3aaf-9c06-9b7078b816ec@suse.com>
 <Yitlw1EN+egVJ4xD@Air-de-Roger>
 <bdd016c0-b02b-3128-7187-d781b6f88dea@suse.com>
 <Yi8FVxTu/r8cUVt3@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <Yi8FVxTu/r8cUVt3@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: FR3P281CA0049.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:4a::22) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 58fca123-2713-409c-eac1-08da059e54e6
X-MS-TrafficTypeDiagnostic: DU2PR04MB8854:EE_
X-Microsoft-Antispam-PRVS:
	<DU2PR04MB88544B78BB714A5CE8FF8B4DB30F9@DU2PR04MB8854.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	xS1/3UvbHfb1u6sIC6o7WoY/tKyvpW6VOmkPLqCcd4irPst73xicQwhG6n/ghwH342QQMvAGyG8nWCYAhwGiaEFAvn3PaV52weZhnnd46g4nHZizQ9yhleIMeCr42CaB07I39cYe7lTEWhJbN2h6a3SXkMxOpAfKVL/+5WqeSMXx9d0dJP2emRAlk+ehhUWLHhk1FMCFbS68IKWRJ+N7pELVxn17Iy4Bt80ZpoyGqd80+bsaLL/9whGlboPX0EwLDLLm7gfFyfAm+uWAVLEiH4adV3knaXrb6Mo2oguEBwi9QlrbDNeOcpxUPUrYleTQACa1nCJGbeC8m03TNqxh50lf4ucHPxBtgIHhfwiaawA5r2CNIQSw0cXl3kyKfvKiJiKUVlKGtNvPalRyQAPbywzG5L7zBsQH7XDvAPzzzn+F96LPOsAmSl7vhE2VG/oIvgOOiRgGCbA9RnllK8NBfh7TPwE8I5YwxfpSPA4ActqtSloeNjX96UdUCBo6VB76CXs+Nrw4XURNyROV1EZnZW9y7a1jojrRyYWwZcZdc2FjIB/C4YOVypWPYQmi9TDTyMWrqNudv55OeMAuWYthaWoaBYDRK9w4k8DbG8QMLGzTtclPQPiwE43M8wL1+vDm2teY0Gep6Q0VA2GLMismMUvu2mZoYBwdJC7QdDMfXZHaiYqxfITcpyVY78HH37jg6i4FACXXWlTKWkHTQnocs8VSPqcmFrLB96T3S8K5qXQ=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(8936002)(8676002)(4326008)(38100700002)(5660300002)(31696002)(86362001)(66476007)(66556008)(66946007)(6486002)(508600001)(6916009)(316002)(36756003)(53546011)(54906003)(83380400001)(26005)(186003)(2616005)(31686004)(6506007)(2906002)(6512007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?g0IOrXR8MqL8rmCN0mCGRyKfQyoZZ5kGh5BXqTAvbFM9XuuC+t2s+fLQyzSW?=
 =?us-ascii?Q?aOo1NAlrHpeSVr4BsCQNEykM3hhekhehloTs+/wML4CUE9KMLCA7AzMjXbV/?=
 =?us-ascii?Q?KRADN0jpFvnkgIjZI3MtvTvd0nicqIYHGCQ6r3E9IEEwWlnOF/iqvtxQ9sz+?=
 =?us-ascii?Q?4cOCcgl17s9GduKDhVNWN2Bowp0TJlOd+hgxlfeGpaRpiudkhAYAfoGzOKOd?=
 =?us-ascii?Q?5i0SZO73W2Zm5VxtW0UIgorcFImN3knu+7vmdQKpSfzTt/AOhFIGELbtizaW?=
 =?us-ascii?Q?BijHr/Ga3XUCBqTaVNZDEX1niTawM32RpRJBJuVv/q++c2Oiomz+y+0bW9yY?=
 =?us-ascii?Q?mT2tFn+bJ3Tw1+JvjECJNT11wAD5fz5j1EsIYPHBOxfqh43KAkND8T8NU23k?=
 =?us-ascii?Q?T+N3bmL69pvKzqFYtm1gYu46XlQyTW2s/6w1QxEDomSfCUNzdi5iuzGNLBEC?=
 =?us-ascii?Q?j/KiZ53gAkvR7Txf85J9hcVznOZMTfYBja3br3y08MONU964RDm/kuDehGhe?=
 =?us-ascii?Q?SLXIzJ23SIetsANeKR2xLuRNmfElF9NAbKnya2pvs+lSzr6X9wYIg4bA1Smx?=
 =?us-ascii?Q?1jG6WSzzIEqkandwRpy3xkQiVLpZBACZ1yXj4lvCHE/FHDXM5gqR5XEQSROC?=
 =?us-ascii?Q?7q1jtb7aZVR2P8kF2+3NT9tTn9IWBMvX4k2RNwHndHa286WJmGOc2DQzZSUl?=
 =?us-ascii?Q?kjs2qmN3XpbQb5jGz6DGmbbmkgokedQeVmOiVwYU0q+mzALQ4bwRzaeKRiUz?=
 =?us-ascii?Q?zzvhxvcoFTg+Kg1D5m1nWDsBuzC17YxXP5MWAFPJ5DyKTNIDPUBZejyC9xlU?=
 =?us-ascii?Q?UCX3C38RYU6oM2yelf9p6x8ufritlzTKS18SHcNZVQ77aJoiw0Awj4CCk5ee?=
 =?us-ascii?Q?l3tjI8hJQvpuVem23xrD7nkmfVPwikQ5Pf9AX1PvuxXh/J0jRlTZkryxbe9p?=
 =?us-ascii?Q?g21K3PmRtvjS42zuuOvL+JBQMGJybdINIPTL+N1mTEtViiE2Z2HefsMJ3kcp?=
 =?us-ascii?Q?yjoyHXGXBRe0+HAn5OpE+SLAK8OSzhnToHQ9/YrdhPR2Olw/8wHwlTFamUOy?=
 =?us-ascii?Q?B1W3gr23kCWQ3IaKCo6ZSWM+rLd3z1NWhtQ1eIbUuX2eKokSq33M0HlfWHWY?=
 =?us-ascii?Q?a78p8Sw4QlMtqRu5vdoQ5L50dsMhpVyfcFCLkNDJmMOZizsehkntyCdBMzIg?=
 =?us-ascii?Q?dWLCdb4vNY2YR7/UVKOwQ0aSZVRfYsuRYUOJf1hahLhLZZiCIPP0fp3VPOnI?=
 =?us-ascii?Q?nGjeoK46oWajrgamfLsCZRN/ih8iiYX2hno+iRARprsdEKBX52fgtT7Dz6xh?=
 =?us-ascii?Q?Dlq+fTrzmRgt5/erT7Jiohatdb8Z3gKllecTITv/97hdrDFGKuGIdAxxmKog?=
 =?us-ascii?Q?sFQCywPAJZbAfreNioEf+fFBMmIk5lT01olbbtLD9ELm2IV+2PeX0/chUJYb?=
 =?us-ascii?Q?ZqCv83vR1RxpVUcN6yc1Wj2kOxF+Y4ZL?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 58fca123-2713-409c-eac1-08da059e54e6
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 09:38:01.5925
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 7lM8vXK69F1hwMuTj6Xk3sm9cppXsSuTTyYdlSVhcqAwuf3lSWVMXI3Yx7TVszS4DTDuLgezy8MY5mJ4toYNVQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DU2PR04MB8854

On 14.03.2022 10:05, Roger Pau Monn=C3=A9 wrote:
> On Mon, Mar 14, 2022 at 08:38:52AM +0100, Jan Beulich wrote:
>> On 11.03.2022 16:07, Roger Pau Monn=C3=A9 wrote:
>>> On Fri, Mar 11, 2022 at 03:55:57PM +0100, Jan Beulich wrote:
>>>> On 11.03.2022 15:34, Roger Pau Monn=C3=A9 wrote:
>>>>> On Fri, Mar 11, 2022 at 02:28:40PM +0100, Jan Beulich wrote:
>>>>>> Support for this construct was added in 2.22 only. Avoid the need to
>>>>>> introduce logic to probe for linker script capabilities by (ab)using=
 the
>>>>>> probe for a command line option having appeared at about the same ti=
me.
>>>>>>
>>>>>> Fixes: 4b7fd8153ddf ("x86: fold sections in final binaries")
>>>>>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>>>>>> ---
>>>>>> v2: Always define HAVE_LD_SORT_BY_INIT_PRIORITY when using LLVM ld.
>>>>>>
>>>>>> --- a/xen/arch/x86/arch.mk
>>>>>> +++ b/xen/arch/x86/arch.mk
>>>>>> @@ -73,6 +73,16 @@ ifeq ($(CONFIG_UBSAN),y)
>>>>>>  $(call cc-option-add,CFLAGS_UBSAN,CC,-fno-sanitize=3Dalignment)
>>>>>>  endif
>>>>>> =20
>>>>>> +ifeq ($(call success,$(LD) --version | head -n 1 | grep -q "GNU ld"=
),y)
>>>>>
>>>>> You are not going to like this, but I think this should live in
>>>>> xen/Kconfig together with CC_IS_{GCC,CLANG}, ie: LD_IS_GNU or similar=
.
>>>>>
>>>>> It's possible we will need this in the future in other places, so
>>>>> having it in Kconfig makes sense.
>>>>
>>>> Despite me not liking this (until, as said elsewhere, we've properly
>>>> settled on either approach) I did actually consider doing like you
>>>> suggest. But: I would have to introduce there more than I need here,
>>>> just for consistency's sake, and I wouldn't have a way to test the
>>>> LLD part of it (I did check - none of the distros where I chose to
>>>> install Clang offer the linker). I realize I could ask you to help
>>>> with the testing, but then the first point would remain. I'd prefer
>>>> if for this simple build fix it was okay to go the old fashioned
>>>> route ...
>>>
>>> I would be fine with you just introducing LD_IS_GNU. That's all we
>>> need so far. We can introduce LD_IS_LLVM if/when required. I prefer
>>> that asymmetry rather than doing the detection here.
>>
>> Yet I'm not happy to go this route. I'm only willing to do this
>> consistently, but that in turn not without us having formally sat down
>> and discussed the overall model to use. The only short term alternative
>> I see is to go back to SORT() unilaterally, hoping that for now
>> different priorities won't be encountered.
>=20
> Would you be fine if it was a patch of mine that introduces
> LD_IS_{GNU,LLVM} to xen/Kconfig (Acked by someone else) and then you
> use it here?
>=20
> I realize this is tricking you, but I would rather get this unblocked
> if possible.

Well, yes, if the construct had been there, I certainly would have used it
(somewhat hesitantly maybe).

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 09:39:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 09:39:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290080.491953 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nThB9-0004fO-O8; Mon, 14 Mar 2022 09:39:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290080.491953; Mon, 14 Mar 2022 09:39:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nThB9-0004fH-Jt; Mon, 14 Mar 2022 09:39:51 +0000
Received: by outflank-mailman (input) for mailman id 290080;
 Mon, 14 Mar 2022 09:39:50 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=JTg9=TZ=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nThB8-0004f9-D4
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 09:39:50 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b0f90aa5-a37a-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 10:39:49 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id D904C210FE
 for <xen-devel@lists.xenproject.org>; Mon, 14 Mar 2022 09:39:48 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id C49CA13B2B
 for <xen-devel@lists.xenproject.org>; Mon, 14 Mar 2022 09:39:48 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id rC0uLmQNL2KVcAAAMHmgww
 (envelope-from <jgross@suse.com>)
 for <xen-devel@lists.xenproject.org>; Mon, 14 Mar 2022 09:39:48 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b0f90aa5-a37a-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647250788; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=4oMwhLtNSY0dANrfEaGPHs6ABlfisenzF1qytq77EQE=;
	b=QwqvD2mIFD/GArQZyvMD/dzS5psiQDlaugNxFq9V5k9wQurqa9q33ZOhmyy/5/PvNVY5wc
	EW3Rtxx/FxWyXhAbjYafiAyb7gB2bPtykC17hjv9QEy06RzRsetcpWtn/M3Ouh1ZZ2ldO7
	D56caxe4+yzAHtp7ueca+Th9jSv5ooU=
Message-ID: <2851e287-8b37-822e-f363-492e46af28cc@suse.com>
Date: Mon, 14 Mar 2022 10:39:48 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] include/public: add command result definitions to
 vscsiif.h
Content-Language: en-US
To: xen-devel@lists.xenproject.org
References: <20220228112224.18942-1-jgross@suse.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <20220228112224.18942-1-jgross@suse.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------08C7iluchGlib5pdNTxrpvBU"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------08C7iluchGlib5pdNTxrpvBU
Content-Type: multipart/mixed; boundary="------------4EwdI0uyC0uPEVXFvmGbvxuy";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Message-ID: <2851e287-8b37-822e-f363-492e46af28cc@suse.com>
Subject: Re: [PATCH] include/public: add command result definitions to
 vscsiif.h
References: <20220228112224.18942-1-jgross@suse.com>
In-Reply-To: <20220228112224.18942-1-jgross@suse.com>

--------------4EwdI0uyC0uPEVXFvmGbvxuy
Content-Type: multipart/mixed; boundary="------------pJSWg1pk9MmnUioD0iwpGi0x"

--------------pJSWg1pk9MmnUioD0iwpGi0x
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

UGluZz8NCg0KT24gMjguMDIuMjIgMTI6MjIsIEp1ZXJnZW4gR3Jvc3Mgd3JvdGU6DQo+IFRo
ZSByZXN1bHQgZmllbGQgb2Ygc3RydWN0IHZzY3NpaWZfcmVzcG9uc2UgaXMgbGFja2luZyBh
IGRldGFpbGVkDQo+IGRlZmluaXRpb24uIFRvZGF5IHRoZSBMaW51eCBrZXJuZWwgaW50ZXJu
YWwgc2NzaSBkZWZpbml0aW9ucyBhcmUgYmVpbmcNCj4gdXNlZCwgd2hpY2ggaXMgbm90IGEg
c2FuZSBpbnRlcmZhY2UgZm9yIGEgUFYgZGV2aWNlIGRyaXZlci4NCj4gDQo+IEFkZCBtYWNy
b3MgdG8gY2hhbmdlIHRoYXQgYnkgdXNpbmcgdG9kYXkncyB2YWx1ZXMgaW4gdGhlIFhFTiBu
YW1lc3BhY2UuDQo+IA0KPiBTaWduZWQtb2ZmLWJ5OiBKdWVyZ2VuIEdyb3NzIDxqZ3Jvc3NA
c3VzZS5jb20+DQo+IC0tLQ0KPiAgIHhlbi9pbmNsdWRlL3B1YmxpYy9pby92c2NzaWlmLmgg
fCAyNyArKysrKysrKysrKysrKysrKysrKysrKysrKysNCj4gICAxIGZpbGUgY2hhbmdlZCwg
MjcgaW5zZXJ0aW9ucygrKQ0KPiANCj4gZGlmZiAtLWdpdCBhL3hlbi9pbmNsdWRlL3B1Ymxp
Yy9pby92c2NzaWlmLmggYi94ZW4vaW5jbHVkZS9wdWJsaWMvaW8vdnNjc2lpZi5oDQo+IGlu
ZGV4IGM5Y2ViMTg4NGQuLjE3YTkwMzNiNDMgMTAwNjQ0DQo+IC0tLSBhL3hlbi9pbmNsdWRl
L3B1YmxpYy9pby92c2NzaWlmLmgNCj4gKysrIGIveGVuL2luY2x1ZGUvcHVibGljL2lvL3Zz
Y3NpaWYuaA0KPiBAQCAtMzE1LDYgKzMxNSwzMyBAQCBzdHJ1Y3QgdnNjc2lpZl9yZXNwb25z
ZSB7DQo+ICAgfTsNCj4gICB0eXBlZGVmIHN0cnVjdCB2c2NzaWlmX3Jlc3BvbnNlIHZzY3Np
aWZfcmVzcG9uc2VfdDsNCj4gICANCj4gKy8qIFNDU0kgSS9PIHN0YXR1cyBmcm9tIHZzY3Np
aWZfcmVzcG9uc2UtPnJzbHQgKi8NCj4gKyNkZWZpbmUgWEVOX1ZTQ1NJSUZfUlNMVF9TVEFU
VVMoeCkgICh4ICYgMHgwMGZmKQ0KPiArDQo+ICsvKiBIb3N0IEkvTyBzdGF0dXMgZnJvbSB2
c2NzaWlmX3Jlc3BvbnNlLT5yc2x0ICovDQo+ICsjZGVmaW5lIFhFTl9WU0NTSUlGX1JTTFRf
SE9TVCh4KSAgICAoKHVuc2lnbmVkKXggPj4gMTYpDQo+ICsjZGVmaW5lIFhFTl9WU0NTSUlG
X1JTTFRfSE9TVF9PSyAgICAgICAgIDANCj4gKyNkZWZpbmUgWEVOX1ZTQ1NJSUZfUlNMVF9I
T1NUX05PX0NPTk4gICAgMSAvKiBDb3VsZG4ndCBjb25uZWN0IGJlZm9yZSB0aW1lb3V0ICov
DQo+ICsjZGVmaW5lIFhFTl9WU0NTSUlGX1JTTFRfSE9TVF9CVVNfQlVTWSAgIDIgLyogQlVT
IGJ1c3kgdGhyb3VnaCB0aW1lb3V0ICovDQo+ICsjZGVmaW5lIFhFTl9WU0NTSUlGX1JTTFRf
SE9TVF9USU1FX09VVCAgIDMgLyogVElNRUQgT1VUIGZvciBvdGhlciByZWFzb24gKi8NCj4g
KyNkZWZpbmUgWEVOX1ZTQ1NJSUZfUlNMVF9IT1NUX0JBRF9UQVJHICAgNCAvKiBCQUQgdGFy
Z2V0ICovDQo+ICsjZGVmaW5lIFhFTl9WU0NTSUlGX1JTTFRfSE9TVF9BQk9SVCAgICAgIDUg
LyogQWJvcnQgZm9yIHNvbWUgb3RoZXIgcmVhc29uICovDQo+ICsjZGVmaW5lIFhFTl9WU0NT
SUlGX1JTTFRfSE9TVF9QQVJJVFkgICAgIDYgLyogUGFyaXR5IGVycm9yICovDQo+ICsjZGVm
aW5lIFhFTl9WU0NTSUlGX1JTTFRfSE9TVF9FUlJPUiAgICAgIDcgLyogSW50ZXJuYWwgZXJy
b3IgKi8NCj4gKyNkZWZpbmUgWEVOX1ZTQ1NJSUZfUlNMVF9IT1NUX1JFU0VUICAgICAgOCAv
KiBSZXNldCBieSBzb21lYm9keSAqLw0KPiArI2RlZmluZSBYRU5fVlNDU0lJRl9SU0xUX0hP
U1RfQkFEX0lOVFIgICA5IC8qIFVuZXhwZWN0ZWQgaW50ZXJydXB0ICovDQo+ICsjZGVmaW5l
IFhFTl9WU0NTSUlGX1JTTFRfSE9TVF9QQVNTVEhSICAgMTAgLyogRm9yY2UgY29tbWFuZCBw
YXN0IG1pZC1sYXllciAqLw0KPiArI2RlZmluZSBYRU5fVlNDU0lJRl9SU0xUX0hPU1RfU09G
VF9FUlIgIDExIC8qIFJldHJ5IHJlcXVlc3RlZCAqLw0KPiArI2RlZmluZSBYRU5fVlNDU0lJ
Rl9SU0xUX0hPU1RfSU1NX1JFVFIgIDEyIC8qIEhpZGRlbiByZXRyeSByZXF1ZXN0ZWQgKi8N
Cj4gKyNkZWZpbmUgWEVOX1ZTQ1NJSUZfUlNMVF9IT1NUX1JFUVVFVUUgICAxMyAvKiBSZXF1
ZXVlIGNvbW1hbmQgcmVxdWVzdGVkICovDQo+ICsjZGVmaW5lIFhFTl9WU0NTSUlGX1JTTFRf
SE9TVF9ESVNSVVBUICAgMTQgLyogVHJhbnNwb3J0IGVycm9yIGRpc3J1cHRlZCBJL08gKi8N
Cj4gKyNkZWZpbmUgWEVOX1ZTQ1NJSUZfUlNMVF9IT1NUX0ZBSUxGQVNUICAxNSAvKiBUcmFu
c3BvcnQgY2xhc3MgZmFzdGZhaWxlZCAqLw0KPiArI2RlZmluZSBYRU5fVlNDU0lJRl9SU0xU
X0hPU1RfVEFSR19GQUlMIDE2IC8qIFBlcm1hbmVudCB0YXJnZXQgZmFpbHVyZSAqLw0KPiAr
I2RlZmluZSBYRU5fVlNDU0lJRl9SU0xUX0hPU1RfTkVYX0ZBSUwgIDE3IC8qIFBlcm1hbmVu
dCBuZXh1cyBmYWlsdXJlIG9uIHBhdGggKi8NCj4gKyNkZWZpbmUgWEVOX1ZTQ1NJSUZfUlNM
VF9IT1NUX05PTUVNICAgICAxOCAvKiBTcGFjZSBhbGxvY2F0aW9uIGZhaWxlZCAqLw0KPiAr
I2RlZmluZSBYRU5fVlNDU0lJRl9SU0xUX0hPU1RfTUVEX0VSUiAgIDE5IC8qIE1lZGl1bSBl
cnJvciAqLw0KPiArI2RlZmluZSBYRU5fVlNDU0lJRl9SU0xUX0hPU1RfTUFSR0lOQUwgIDIw
IC8qIFRyYW5zcG9ydCBtYXJnaW5hbCBlcnJvcnMgKi8NCj4gKw0KPiAgIERFRklORV9SSU5H
X1RZUEVTKHZzY3NpaWYsIHN0cnVjdCB2c2NzaWlmX3JlcXVlc3QsIHN0cnVjdCB2c2NzaWlm
X3Jlc3BvbnNlKTsNCj4gICANCj4gICANCg0K
--------------pJSWg1pk9MmnUioD0iwpGi0x
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------pJSWg1pk9MmnUioD0iwpGi0x--

--------------4EwdI0uyC0uPEVXFvmGbvxuy--

--------------08C7iluchGlib5pdNTxrpvBU
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIvDWQFAwAAAAAACgkQsN6d1ii/Ey/3
egf/Tp4eNHxUX56EmRFlAOEk94ZgqzgxqTuoOjF6/QQuVKP0BDbgq9NEtctxrAu7XaDjZTR2xhtF
+8+FJCk2Ph29bKE/m5WThXH6i8CzA7GYLUfu/CMoLfzW1J1WAnLCS+v9pRR+ylAlZa+hXg5Bfukg
LmMTHScUsoHIxwMgCu3tbDM0hVqE8h6D3iWgkUsFnJwga3GnrTf7KxzGylKq/V/a1gCGkLsjE5nz
ftfysyzRky87N1+TvAHadynvzgsloSLR+O6riaqJwFJrF1qzISn4O2R9xIvuC06Ia1K8eCdHarv0
XLnC4F4avDKqM/jarNLMEoIkRpGcw8evYkbHQ3OZ4A==
=HsP3
-----END PGP SIGNATURE-----

--------------08C7iluchGlib5pdNTxrpvBU--


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 09:56:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 09:56:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290089.491984 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nThQq-0007H6-Cj; Mon, 14 Mar 2022 09:56:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290089.491984; Mon, 14 Mar 2022 09:56:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nThQq-0007Gz-9Q; Mon, 14 Mar 2022 09:56:04 +0000
Received: by outflank-mailman (input) for mailman id 290089;
 Mon, 14 Mar 2022 09:56:02 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=29fN=TZ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nThQo-0007Gt-CZ
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 09:56:02 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id efafb49e-a37c-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 10:55:53 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2173.outbound.protection.outlook.com [104.47.17.173]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-41-mJWOeCTVORqKsdkJt_56OA-2; Mon, 14 Mar 2022 10:55:59 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM6PR0402MB3928.eurprd04.prod.outlook.com (2603:10a6:209:1a::23)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.28; Mon, 14 Mar
 2022 09:55:57 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 09:55:57 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: efafb49e-a37c-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647251760;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=Eo+xw9p77kynjZIIpg66+KaL6SeUbRKQioFIpIOtbI0=;
	b=IAVNIBwyk/CSzAUL1/mX6QADQ/uZS0k5vmfVOespYnBmIvlXX3RT5zKxFnV7l+SgXhJgm7
	v1LK/FtNjzHxasa0u55zXvBFA0CsVEIGa1NjATF1jO1VjdC+ogi6iS7FnpmZPLoKk954G7
	a3u2C1QbYxQ4KiNjB7m5f5q7g9fFSeM=
X-MC-Unique: mJWOeCTVORqKsdkJt_56OA-2
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=BeUe5RqvrUZxiAI8AyTokEroYff5F3N2YOGBikyp+YIik5VujPEiAQ3//NUVEoP8NpDQpf2fyeM7PEdow00lOMTAcoL/wpLtkvlPZBo8lK1aKx7tMmkhBVIF28hXhpdY2r8jGNX8RjeiwUDBt2TWcmUHYilivBEx7eVG4S2JB/0R1QUcuD5pQQbUZYlPxkSu2M/+oJVAtnRcestoqdZvUZ0621pjkC5pXA5lCEr1N5Y1Si/nClqrLZWEbSMejbwcgaRSQ0/i7kqb7O2OMbfBu4A0jx6D13pDyCVhjlI1s9iX+gA7H44QibdPeEmt11RuOXWKe6JwZaLdGgBW6utdMA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Eo+xw9p77kynjZIIpg66+KaL6SeUbRKQioFIpIOtbI0=;
 b=LwIJ/oCgzehoTZyAXyBZNH6GWQP2VH1FfI3jPPk0iRtRQl7oVAFWxvpMOl8PV8oplgtYPo3Qdfltm0uION5sogwzlAvp/VqGWJJur+fP8b9kwoYqV7jmuXA7kni+VPDxUWI3AXpuyvHESz/rJk+iPZCAPBC2Riep5jQbCGuqOAuFjp8ZXn1DATlPz3Ty8zL2buOR6uPidx1fbTgcIgErQ1w+lYIJxNrfkfrWNRP7qKMjFFE1wsE9KPpqpYXM7hPVm+pcvwUP7N2nIow4TDKVwFCHXV3jYK7e6F4e4VNqz+JZXO2RGBbrS5rjTOOX0SxHjeFyMjid2XYvsRezOa7V6Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <c489f4f8-c24e-ba73-b33e-b797527d25ac@suse.com>
Date: Mon, 14 Mar 2022 10:55:55 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] include/public: add command result definitions to
 vscsiif.h
Content-Language: en-US
To: Juergen Gross <jgross@suse.com>
References: <20220228112224.18942-1-jgross@suse.com>
Cc: xen-devel@lists.xenproject.org
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220228112224.18942-1-jgross@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6PR05CA0009.eurprd05.prod.outlook.com
 (2603:10a6:20b:2e::22) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: d5016832-8162-4be9-e119-08da05a0d5f4
X-MS-TrafficTypeDiagnostic: AM6PR0402MB3928:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<AM6PR0402MB3928185C83CAB26121A1EFB7B30F9@AM6PR0402MB3928.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	cVQY2nWvgDB8Yj8RLLUF92UXQ/dvAculVgxfUdE6JxXFaDUawwQwEJQKBTk7qH0Xr+DV8rhZ/4rdt8Gkb1tCOQ/kcE5iGhkve661a1Y0W8sOF4wKFIknwtwHOCYnPIRGYNx/zZZ85KLSFZrmWESs66KXXu/DuET4XyUZSht5NRTiCGhir7xxCO2nzR7o3bAVMupa1198fuh8mAObVLqsm8X9hqAYoKVMm3D5JgpUJ22Ks5N9r7vNFP6Sk8uTxfOCbZDvjCVtgm2lLP4JYJI249XV5jfCXoavxm6WUPtnj5dlJIW33FDsIkIda+Vm4BPUUg40d14bkBtDV/7oq6ft8dyPAsnUk1cFGay/NrCr5rN+NAsd2JTP7cPaRBK7hcsr9yIeAeUtzAXSeSQQlCtE6QL3UtFWhBfSxScbV06HYBvjtg1VsdcfwxAx57ilUqqH/DXi4iKLl/HVF+CRBr9Zppux+p18tuI6zBQwGg7xm961ND+PyyHeg3jXO9oOBcSwBvJ4mbhvaraV+mJlYwsBooBXzETEf2BBPCjwlYVIs2dWfwGSabPHOnfXWhXuBLT56glemlQ4Vs9/btpolaNRWl4tztheE5S6T50LvKyJS44GqlgUkj3HsAAzc22n+1YdjRTmFd9RZUNGckA09s6N/8kLJ0mYFIt56yuHNVDXFynyra9rZzE/RqtFCql+SSogoZKL7JfhOOm0zagiDytpFLM9+V4k9iNuuiwrVdLZzDM=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(26005)(186003)(2616005)(6512007)(86362001)(2906002)(6506007)(31696002)(53546011)(6486002)(38100700002)(508600001)(6862004)(4326008)(8676002)(66946007)(66556008)(66476007)(5660300002)(36756003)(8936002)(6636002)(37006003)(83380400001)(316002)(31686004)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?cmpEUjdhMkR3bmEwNDFSOTJ5T2NrT05sZmdkTTdpaG9Od0MyS3UzSEdHMFlu?=
 =?utf-8?B?U3NuQm4vYTVBeDRjV2ltK3dHcGhHdDNTUnI3ZlhkM0N4V29uWXdacUdWM3M0?=
 =?utf-8?B?RFhkR25QVjFLQ3VnUlNIRkJlK2lBaFhDcmxNblliVENMWCtUTEtJZTBHWjhw?=
 =?utf-8?B?SEtFMFZzSERZeTdWOUVhSXh6RVpvOFRhVlBnbC9rald0VDlxWk5xZko5RXow?=
 =?utf-8?B?dkdqUERRcFpJaDlUL3F3NlJWbW5vUHRkcjRBTlB0OW5EY01wT0NSdGlGenc2?=
 =?utf-8?B?Uldtd3YvQmM0enQxaFg3ODNaUzVUMllMaWJod3Rpdk5PME9sL0RkL2o1dVR4?=
 =?utf-8?B?WVlzWU1EWU9PWHdPLzNQaU1HM0JWMDYxNTdLRkNLZjk3a1lFeWxSVjMvbzNJ?=
 =?utf-8?B?THpXQ0poaGY0WWszaHZwNWd5WnlTTjcrSFd3QjJBanUyTnNVVzEzbmN2RmtH?=
 =?utf-8?B?REJqc3JKaVlqdFZJOGJLdVRic1VzU3dPYjFzc3B1QmFjTEdOWW9RM2MxZlpO?=
 =?utf-8?B?OEQyS1FxQU5oVnowTTZLWDFILzErM0VLUnBOcDBzMExWa1c4RnVnWmJVVWNE?=
 =?utf-8?B?dDNYcGl5bHBJN01RUEdld21kZlljRWRqb0lnZExDT1BIZ09OTzZ6eUxRTFk5?=
 =?utf-8?B?WndrMkNoZlhpL292TVV5bmlsOGUwakpzdTBoZUtZdlFkdGI0NVZvRGpCV0Nl?=
 =?utf-8?B?STFhdUs4bEZYUGpxajdiMzRvbTNjWXA2VUJWZ0dLVS82bit5OXV2WkVKSGxm?=
 =?utf-8?B?MUtmWXg0RVhISVdKZXdYWEJSSStpdnFreHd2aElOZWM1ZEVLcjFYZ2VtQVNN?=
 =?utf-8?B?SzRyYW4rcEgydVg1QlpvQ2ZoK0x4SFl5VGdSY3NoZmt0Q2hSUUJQdWlQN3JE?=
 =?utf-8?B?UndPR0tWeHY5Uk1Wc2wzMEFoelNrSUY5MXhTUzkzMDdHQmdWRXNGZm4yWC9r?=
 =?utf-8?B?RjB4RVpHdzFETUtVYUVjMno5MjdkZ05OazZzYWlUcW1ZY1AvMFJmc2NrZjRF?=
 =?utf-8?B?ZHlmQkt2N2xGbVBLUHlYVllnY1BDbldkeG5xTkdOc0ttTkkyS3NBL3UyL2RE?=
 =?utf-8?B?a3B1STB2TVNHZjg5U3VEdW56K2xudGcvZzEzVlJ0U1dVa1grT0VmdXY0VHl6?=
 =?utf-8?B?djc5Tlc5ellxcWdzREh0Q3JWcHMvZjNjbW5nRk1saFNUQ2JMQVdNbTRKc2w4?=
 =?utf-8?B?STdxLzRnM2VnNUppVWdhN0JDUXErQ0daWlZTL0ZIMGJ4ZTc5TjFGRmoxcVVi?=
 =?utf-8?B?Q2lJNExqUkEzc0J5VHVCaUpGcktrMmkwalhXc0o2dDloTHhkZE12Q0R2VVF4?=
 =?utf-8?B?WlRMb3VUR3V1MUVTSDFyK1JVdnhrMDlUN1Zybi9jQlpxNHdTQXVBRWFwVXBm?=
 =?utf-8?B?NkRUdTdnY1MwT3RFc1NnazZRbVpjdTU2bW03VHVyK1hLbHdYU3duNjRyN1lz?=
 =?utf-8?B?K2hrVUVFODFqZDZ5eklXN1lYLzE2cyt4V2RQZWFsN2pUdmU4TjAwakEvNzhz?=
 =?utf-8?B?ell1WFNhMy9jMnZySWFmeE9wWjNFdTlTQXRYSWlzcHlEV3FMTE5NeWlYUTFx?=
 =?utf-8?B?czBEWUt1dWhnaU5EY1FEbHA3bEpocXRTb1lWUWNWOXc2aFdScGt4ZUNqcmJZ?=
 =?utf-8?B?S3ZVUjdsNHVUSFlnWURKQ1NWeU9sZzFDUVhpc2piYnFtb05ZSnVBUmN2RGRL?=
 =?utf-8?B?NWoxak9kTERKcXRDSG83SktFVHVSdHpFdVZjTlRpbE14a1IvYk1nR25iT0NP?=
 =?utf-8?B?TmFJb0pvU283bG1JSlBmU3ZwR0VMNk5ITWoxOUYrUnk0MnNFM0JSNEtheHpz?=
 =?utf-8?B?VGEvcEtrd0JKZVEyZC9JdGx4aVJReko4dnl1SmY4eUVVUldKU05OM0VqalVo?=
 =?utf-8?B?Z0JCTFNBcGNyVFQ3WWRrQUppZ3ZweTJ3blM0eXUzd3pJU3lsaTZEdXg0QVpT?=
 =?utf-8?Q?mwVM8cZQ3bACN2bMTODUgyMCt0doqTOo?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d5016832-8162-4be9-e119-08da05a0d5f4
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 09:55:57.1035
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: vEEhGYwDg2jBiFcc2E9G9ULGVExUc2GvxN2LcWJWfIeVff3F/Uo62BEFS0BaoD1P/UT8i+mWAne12NsWbPVdqg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR0402MB3928

On 28.02.2022 12:22, Juergen Gross wrote:
> --- a/xen/include/public/io/vscsiif.h
> +++ b/xen/include/public/io/vscsiif.h
> @@ -315,6 +315,33 @@ struct vscsiif_response {
>  };
>  typedef struct vscsiif_response vscsiif_response_t;
>  
> +/* SCSI I/O status from vscsiif_response->rslt */
> +#define XEN_VSCSIIF_RSLT_STATUS(x)  (x & 0x00ff)

No #define-s for individual values for this? I see the backend use
e.g. SUCCESS and FAILED, wherever these come from ...

Also please parenthesize x here and ...

> +/* Host I/O status from vscsiif_response->rslt */
> +#define XEN_VSCSIIF_RSLT_HOST(x)    ((unsigned)x >> 16)

... here.

You cast to unsigned here, but rslt is a signed field. Is it really
the entire upper 16 bits that are the host I/O status?

> +#define XEN_VSCSIIF_RSLT_HOST_OK         0
> +#define XEN_VSCSIIF_RSLT_HOST_NO_CONN    1 /* Couldn't connect before timeout */
> +#define XEN_VSCSIIF_RSLT_HOST_BUS_BUSY   2 /* BUS busy through timeout */
> +#define XEN_VSCSIIF_RSLT_HOST_TIME_OUT   3 /* TIMED OUT for other reason */
> +#define XEN_VSCSIIF_RSLT_HOST_BAD_TARG   4 /* BAD target */

Are the all-upper-case words really in need of mirroring this
aspect from Linux? To me it gives the impression of this being
acronyms of some sort at the first glance.

> +#define XEN_VSCSIIF_RSLT_HOST_ABORT      5 /* Abort for some other reason */
> +#define XEN_VSCSIIF_RSLT_HOST_PARITY     6 /* Parity error */
> +#define XEN_VSCSIIF_RSLT_HOST_ERROR      7 /* Internal error */
> +#define XEN_VSCSIIF_RSLT_HOST_RESET      8 /* Reset by somebody */
> +#define XEN_VSCSIIF_RSLT_HOST_BAD_INTR   9 /* Unexpected interrupt */
> +#define XEN_VSCSIIF_RSLT_HOST_PASSTHR   10 /* Force command past mid-layer */
> +#define XEN_VSCSIIF_RSLT_HOST_SOFT_ERR  11 /* Retry requested */
> +#define XEN_VSCSIIF_RSLT_HOST_IMM_RETR  12 /* Hidden retry requested */
> +#define XEN_VSCSIIF_RSLT_HOST_REQUEUE   13 /* Requeue command requested */
> +#define XEN_VSCSIIF_RSLT_HOST_DISRUPT   14 /* Transport error disrupted I/O */
> +#define XEN_VSCSIIF_RSLT_HOST_FAILFAST  15 /* Transport class fastfailed */
> +#define XEN_VSCSIIF_RSLT_HOST_TARG_FAIL 16 /* Permanent target failure */
> +#define XEN_VSCSIIF_RSLT_HOST_NEX_FAIL  17 /* Permanent nexus failure on path */
> +#define XEN_VSCSIIF_RSLT_HOST_NOMEM     18 /* Space allocation failed */
> +#define XEN_VSCSIIF_RSLT_HOST_MED_ERR   19 /* Medium error */
> +#define XEN_VSCSIIF_RSLT_HOST_MARGINAL  20 /* Transport marginal errors */

Some of the name shortening that you did, comparing with the
Linux names, has gone a little too far for my taste. But you're
the maintainer ...

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 10:00:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 10:00:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290093.491995 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nThVY-0000Q5-0M; Mon, 14 Mar 2022 10:00:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290093.491995; Mon, 14 Mar 2022 10:00:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nThVX-0000Py-Ro; Mon, 14 Mar 2022 10:00:55 +0000
Received: by outflank-mailman (input) for mailman id 290093;
 Mon, 14 Mar 2022 10:00:55 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=V24r=TZ=xen.org=julien@srs-se1.protection.inumbo.net>)
 id 1nThVW-0000Ps-TK
 for xen-devel@lists.xen.org; Mon, 14 Mar 2022 10:00:55 +0000
Received: from mail.xenproject.org (mail.xenproject.org [104.130.215.37])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a1f0af21-a37d-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 11:00:53 +0100 (CET)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nThVT-0001FO-On; Mon, 14 Mar 2022 10:00:51 +0000
Received: from gw1.octic.net ([81.187.162.82] helo=[10.0.1.193])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nThVT-0003up-Iu; Mon, 14 Mar 2022 10:00:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a1f0af21-a37d-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=Fx+hiWYfzPVZVzTD2vYyiLrLdz5SWQnLfAvaQT0sd0c=; b=UEYTKhYMHhA4/rkqFusFYxBf8h
	fZvgjyI7XK3ywOYBmocR2t+zxWMMmeZFe1kIxPU1kethdAuttn7Tap6Tl6bcbyletPgpcPZNMp/kp
	ncAFIFzDowjbn27hM5dfwhxtSLIoW31Bo+RS5p0V05Qxi9GV5kxZjeAUi1tSpK3/9qN4=;
Message-ID: <91222ce2-05d4-3a75-6da0-f9a8066e6fb7@xen.org>
Date: Mon, 14 Mar 2022 10:00:49 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH] MAINTAINERS: Propose Henry Wang as the new release
 manager
To: George Dunlap <george.dunlap@citrix.com>, xen-devel@lists.xen.org
Cc: Henry Wang <Henry.Wang@arm.com>, Wei Liu <wl@xen.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Roger Pau Monne <roger.pau@citrix.com>,
 Stefano Stabellini <sstabellini@kernel.org>
References: <20220310214655.14510-1-george.dunlap@citrix.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220310214655.14510-1-george.dunlap@citrix.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi George,

On 10/03/2022 21:46, George Dunlap wrote:
> ARM has proposed Henry Wang as a release manager for 4.17.  Signify
> this by giving him maintainership over CHANGELOG.md.
> 
> Below is an introduction given by Bertrand Marquis:
> 
> Henry Wang is an open-source software engineer at Arm focusing on the
> hypervisor and virtualization technology. Before joining the
> AIS-Hypervisor team, he was one of the leading Arm contributors of the
> Rust-VMM and the Cloud Hypervisor community.  He is the Arm reviewer
> of the Cloud Hypervisor project. His work includes basic project
> enabling on Arm platform, Arm device emulation, advanced features
> support on Arm and bug fixes.
> 
> After joining the AIS-Hypervisor team at Arm, he has been involved in Xen feature
> development on Arm in various areas, including:
> 
> 1. Xen Arm MPAM extension research and PoC: Ongoing, the design will
> share in xen-devel soon.
> 
> 2. Port of Xen to Arm MPU systems: Working together with Penny Zheng
> on coding and testing, will be soon sent to xen-devel.
> 
> 3. Static Xen heap on Arm: Work done but depend on the direct mapping
> series from Penny Zheng, will be upstreamed in the next weeks.
> 
> 4. Virtio PoC for Xen on Arm using kvmtool as the Xen virtio backend:
> Work done, including the enabling of the virtio and the virtio
> performance tuning.
> 
> 5. Participated in code reviews and discussions in xen-devel,
> including the foreign memory mapping series from EPAM, etc.
> 
> Signed-off-by: George Dunlap <george.dunlap@citrix.com>

Acked-by: Julien Grall <jgrall@amazon.com>

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 10:12:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 10:12:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290097.492006 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nThgP-0001yG-08; Mon, 14 Mar 2022 10:12:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290097.492006; Mon, 14 Mar 2022 10:12:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nThgO-0001y9-TK; Mon, 14 Mar 2022 10:12:08 +0000
Received: by outflank-mailman (input) for mailman id 290097;
 Mon, 14 Mar 2022 10:12:07 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=knG6=TZ=citrix.com=prvs=0654505ba=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nThgN-0001y3-7u
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 10:12:07 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 31ad074e-a37f-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 11:12:05 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 31ad074e-a37f-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647252725;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=zv5uAO8qzBqigJWP27coeik+Bss8ugvYoY4kO9XMijU=;
  b=NMncnTtOtXiZo7oTjZRdqQG/JJ/n84D0Edj7v7jxViJoIuDteJfdPdGG
   GuVd3BzoKuK/huwPuYwKyqD0KKtw0ke2FvTWz8+3o/TLy3O01hBZLYNCZ
   hA+PbZujm1/XToU4w+4t9T+j7hkggdaSQSlyliDctKY5rJsj+cKplMtGd
   k=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65630459
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:0kCrQakh0qnJ6RIxRTNDuWfo5gwnJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xJOWDqObqvcN2L9f9BzaI+z9E5T7MSByNViSwQ4+yhhESMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiWl/V4
 LsenuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYZzcwZ73wh9YhbyJpHTlRG6tG47zeGC3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3oHZvwCufFf87aZvCX7/L9ZlT2zJYasVmQ6uAP
 JJFNGsHgBLoPCNSNlo3C8MHkOaWol/nbWZmuk+buv9ii4TU5FMoi+W8WDbPQfS0QsFSkledt
 3jx1W3zCREHN/SS0TOAtHmrg4fnhjjnUYgfELm58P9Cg1CJwGEXThoMWjOTq/SjllS3Xd4ZL
 kUO4zcvtoA77kntRd74NzW7rWCFuFgAWtNWO+w89AyJjKHT5m6xBHUCCDhIa9Uktco/bT0sy
 lKN2djuAFRHr7m9WX+bsLCOoluaKSUTaGMPeyIAZQ8E+MX45pE+iArVSdRuG7Lzicf6cRnyz
 CqNtzMWnKgIgIgA0KDT1VLahzOhoLDZQwhz4R/YNkqn5A5kYI+uZ6Sz9EPWq/1HKe6kokKp5
 SZe3ZLEtaZXUM/LxHflrPgx8K+BycacaS3gnmxTI6IQ+SyC3XijZoNJ2WQrTKt2CfosdTjsa
 U7VnApe4p5PIXenBZNKj5KN59cClva5S4m8PhzARp8XO8UqKlfblM17TRTIt10BhnTAhk3W1
 X2zVc+3RUgXBq18pNZdb7dMiOR7rszSKI66eHwa8/hF+efEDJJ2Ye1cWLdrUgzexPnYyDg5C
 /4Fa6O3J+x3CYUSmBX//48JNkwtJnMmH53woME/XrfdflU/ST57U6COmOtJl2lZc0N9zLugw
 51AchUAlAqXaYPvdG1mlUyPmJuwBM0i/BrXzAQnPEqy2mhLXGpcxPx3SnfDRpF+rLYL5actF
 5EtIpzcatwSGmWv02lMNvHV8d09HClHcCrTZkJJlhBkJMU+L+EIk/e5FjbSGN4mVXPm65Fh/
 +X+ims2g/MrHmxfMSofU9r2p3uZtnkBguNiGUzOJ9hYYkL394Z2bSf2i5cKzwskdX0vGhPyO
 96qPCol
IronPort-HdrOrdr: A9a23:4kXOe65YIXmTMCHw1QPXwVGBI+orL9Y04lQ7vn2ZFiY7TiXIra
 yTdaoguCMc6AxxZJkh8erwX5VoZUmsj6KdhrNhQItKPTOWw1dASbsN0WKM+UyDJ8STzJ856U
 4kSdkDNDSSNykKsS+Z2njALz9I+rDum8rJ9ITjJjVWPHlXgslbnnlE422gYytLrWd9dP4E/M
 323Ls5m9PsQwVdUiz9bUN1KtTrlpnurtbLcBQGDxko5E2nii6p0qfzF1y90g0FWz1C7L8++S
 yd+jaJq5mLgrWe8FvxxmXT55NZlJ/IzcZCPtWFjowwJi/3ggilSYx9U/mpvSwzosuo9FE2+e
 O86SsIDoBW0Tf8b2u1qRzi103J1ysv0WbrzRuijX7qsaXCNUQHIvsEobgcXgrS6kImst05+r
 lMxXilu51eCg6FtDjh5vDTPisa2HackD4Hq6o+nnZfWYwRZPt6tooE5n5YF58GAWbT9J0nKu
 9zF8vRjcwmPm9yV0qp/lWH/ebcHUjaRny9Mwo/U42uonRrdUlCvgolLJd1pAZEyHo/I6M0kN
 gsfJ4Y0I2mdfVmHp6VNN1xMfdfNVa9My4kEFjiaGgPR5t3c04klfbMkcEIDaeRCds18Kc=
X-IronPort-AV: E=Sophos;i="5.90,180,1643691600"; 
   d="scan'208";a="65630459"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=XE5aaaZk3nY1rLF9adNvXsDpnkDCVDz810POPLMEllTXJAOZc2LMcQtdaLBlwONDIfwRpUB3vxVn2J23JVORHd5RF/4bsQ/hFRJBa+Vc5TbBlleOTtiVSQB3sBzgPP+UnhUd1I1bi6oH4+Ng31OzY60KEISWGPmgG+eFARifjLZ36Ktu+QSLbo/yIgNkX3amDrHZVVWIX/VD6Z1PBwKRX2G07r9WSml2jPNMZVSst+ukxEhMtPHVXAArKKPoZARrb1qIplxcTARiFEc40HqowGi7wg0a83uJEhMt5rMJ29hkZmfIIbaQbcQn1csNqSl9Utfwg5IXvYgymsNUOPL0JQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=9Jb21lfm/wSqQ5efYaylQA2Z6Zyxhioh8co7CAx/ljE=;
 b=eCGohDRowWqTcMj6zcB3rofZGy5VzH9cB3jnGQTPoGsKvPBWZq42tXW6sS56YGRoDFY/EQ99QoFv59aGQZCBtFS4ubQpicDqusXmumlRH5fgyw83ySuBrHyVZdoAUHvEcRrCj3i8eR7iD3hPHdQixyJeAsar7yiBdTOg7JhX3hghe+QqrExDO8D6eiozQJ6s+yiXcBtG8xI6zQiXjSEpyfBTdX4EN/4ZeY/Ig8Ftfj666RpM4WqlDOICZxTOY9SBnsmg44zdkxo4U0fS1uDNSlI7n+5ZSgfcYHE3AH1aqRPaHqpG8bFVYTFRkXA1TkYxChlTl39ImPaNoN7p4U2HmA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=9Jb21lfm/wSqQ5efYaylQA2Z6Zyxhioh8co7CAx/ljE=;
 b=hag3Q4pr83rM0fDkm9HKxKO4Ml17t1lEzftXI6Yf4iKz/8ZBaDzf08na9H9WoSJDpWXQnScW8lHpXu/r1FH/fvcUndfx0xxXZZpMvRg/d5PyhDJTU49sivHK4Y+yZBxdMKv4VzkAEsXRjqFravtKs6NW18npGwQpJL1wNOkYmyE=
Date: Mon, 14 Mar 2022 11:11:51 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jane Malalane <jane.malalane@citrix.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, Anthony
 PERARD <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, Andrew
 Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>, Julien Grall <julien@xen.org>, Stefano
 Stabellini <sstabellini@kernel.org>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>, Bertrand Marquis <bertrand.marquis@arm.com>,
	Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian <kevin.tian@intel.com>
Subject: Re: [PATCH v7 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Message-ID: <Yi8U565Ghg5qomFh@Air-de-Roger>
References: <20220311152107.2918-1-jane.malalane@citrix.com>
 <20220311152107.2918-2-jane.malalane@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <20220311152107.2918-2-jane.malalane@citrix.com>
X-ClientProxiedBy: MR1P264CA0139.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:501:51::20) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f0c6464c-41f8-44e8-9bf0-08da05a312d0
X-MS-TrafficTypeDiagnostic: BN6PR03MB2578:EE_
X-LD-Processed: 335836de-42ef-43a2-b145-348c2ee9ca5b,ExtAddr
X-Microsoft-Antispam-PRVS: <BN6PR03MB2578D1B574FD5A63D6EB92088F0F9@BN6PR03MB2578.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(26005)(6862004)(186003)(8676002)(4326008)(82960400001)(66476007)(66556008)(38100700002)(66946007)(6666004)(6486002)(6636002)(54906003)(8936002)(508600001)(86362001)(6506007)(316002)(6512007)(9686003)(5660300002)(85182001)(33716001)(7416002)(2906002)(83380400001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?SHZHSy9ZUG9UbUZrbjFhekxSMXg4WjVablg0TUlOVHRaV0hnWlo2OEIwQnRD?=
 =?utf-8?B?NXFjUHBTODBZdXphSU1RWldwNmcySmtxTVBobVd6RVNpMXJzeXZYSG5TSmlZ?=
 =?utf-8?B?UnlUR1RYNmtmV2dOcTByWFdZMEUyWW1ZRFNvQXlwMWJHcmdENXhwcG84L09C?=
 =?utf-8?B?TEJWSmIwdjBxcHphemg0QTJ5L0tZR0pyeU5JaldWbFZvQ1E2Z01WZ1NJMSsr?=
 =?utf-8?B?K1JrdUhTakxpNE1CY2Zidm13bnZmdGRrMVI1eGdRRFZHVFlVTGdJSDFUVFFo?=
 =?utf-8?B?djZRZ3F5d3BPL1hjb0FlcE5uVXAwTUhya3VMQkNhSk5sS3BPOE1hbmdBZFEw?=
 =?utf-8?B?SzlMWmdaODZRdVFSSTJhZmx2STJ2TVdXK3AralMyRzNRUjFIeGg1cFVNUXp1?=
 =?utf-8?B?RjJuc1NwRUo3dXNqWXR5VkNyMVhSSVlkNDB2dHIvc1MwM2FtcU05bUJoaGcr?=
 =?utf-8?B?cmdqbkxCWitmbkNNcVA4dEZNUDYzci9LYVhzMEttVkpBaGNLTEFOc3JmUnBh?=
 =?utf-8?B?Z2s1UEdTL0hPOUExeldtVW5CVmxmdU00cDVVcWVIVW0zNjM0TE1ndlgwUytk?=
 =?utf-8?B?bE1pSHoxNVpGSU1UYk1vZlNxMVBPbWdCamF0c3dMcXVxNWtqcjkrK0JsKzJr?=
 =?utf-8?B?dnlkTERUOTJ4Yi82OXdVT04zbzFVK3c3SjJIUEYxaC82SW00YkIwcXh0RDI2?=
 =?utf-8?B?SWNQSUd4cDBSL2ZJNWkzay9TS04ybElDZ2xYOTdNbW54S24wZWRtS0tlUG5p?=
 =?utf-8?B?bjhOZC9XcEdMSlJFdDNxUmxqbmR5SU5VOHZWeFZoR2pXSjAyd3hTTDBrZENk?=
 =?utf-8?B?N1h5NU9KQk1MakFOYlVITnhWcEdnUENBNkw5UmNqb0FHZU1HdXdPZkVqRHg1?=
 =?utf-8?B?VkRLa0xvYVgxMk5SSlJma2Z1WUNzMG04QVUrTWovSnNyYkVQMmZPWkJOVDVt?=
 =?utf-8?B?dE9IMU0vdnNvbmR2MEgrVEJveGFLeUs1dms4RjVhbnZrZUVISi9IcC9Ud21E?=
 =?utf-8?B?TkJNNmdkOHB3R3RVNGJITGx2YkpxNW93UmhpOVRUcnpacWkrYkh0Ky9PeUFX?=
 =?utf-8?B?U1hjYWpVbHdJNzNNejlvM2NJUFlNU201OUFGdEhtaVBBeGlSMk1QOWpianlV?=
 =?utf-8?B?OWt2RlUzOHlDTVg0bTZzZHVPZDZWQzdvdWtZbVZrbWRRNnVtNWhkNHhnNWt5?=
 =?utf-8?B?WlpVNjY0T3ZCUjM3Uzk3OXI3bGw1SVJWVGRvbzZ2VHExbnJGWFF6K1paeEhL?=
 =?utf-8?B?aEZDRjRBclpReHQ3QVBMQWcxd3dtOTl2RmJMRGswS3p2bDdYQnpVV3k0Y3RP?=
 =?utf-8?B?b1JuRU4vZUV6cHFId3RORzYyYWhJeThTTzdLVklnZUlWZVFseFl0T0dpditv?=
 =?utf-8?B?Qi9NWjBGcVEzVi91eFYwSzRKV0NSUUVKdGlOWjJaVEQ3QUNrSHdhbnVIc3Zr?=
 =?utf-8?B?Q2tzeDVHUzZPK09hSXV4am4zZkZ4VmhwRkxBbEt2U3NLclBQeVJ0OE9mRjNm?=
 =?utf-8?B?T08rUFJTYUIxekNkZEJjakJMSlJ2UTNrSjlVMG9hbjVrY0YrOEVqdHR4bVVP?=
 =?utf-8?B?VUdHZ3lIZVlQWlNOblpVWlA5T3RiWC9rOVB0aHNOcWdrRnlqbzFKVEhSUXFN?=
 =?utf-8?B?MkJ6Y0lia2xMQU82ZlAzWmxST0tybTNsbjViMWovTk9oS1NGZzNjZGltbklj?=
 =?utf-8?B?dFJuazVhdmpVQWY5U2lLSEprbmNUTDYvRmtkWGRpZ1lpcDJuVS9melJLTGwz?=
 =?utf-8?B?K2crSTRZN3AxdHdaY21CeFhFR3NUTzRncGRxVVZGMHcvTmVIaGJ2cjRLa1RX?=
 =?utf-8?B?aEVYUjI1S2Q1eTI4TEdHRHZOUUVnUVBzZ0hsYUJHaDJ2NHFXTk55M1VGUDJO?=
 =?utf-8?B?YXlPa3ErV2UvTHFGYzdUelNQVDNDQ0U0ZkdKaTlSeXFVNTVSbWlXODh4QU1G?=
 =?utf-8?B?aDNsak0ydlVmTm5YTVZiRjVPdlBYMzltdEVER3c4U0tlTWx3RU16eGlMMGUx?=
 =?utf-8?B?clkvd2ZYa0RnPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: f0c6464c-41f8-44e8-9bf0-08da05a312d0
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 10:11:58.1846
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: p2ufmq1+IfnCDLtBu6aGvwB77xWr/o9NYzfEIrgBX2jysYfNEYCFGKvuLrci8JKbfWXGO83XamTuzBK/cs4Iwg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR03MB2578
X-OriginatorOrg: citrix.com

On Fri, Mar 11, 2022 at 03:21:06PM +0000, Jane Malalane wrote:
> Add XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC and
> XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC to report accelerated xapic
> and x2apic, on x86 hardware.
> No such features are currently implemented on AMD hardware.
> 
> HW assisted xAPIC virtualization will be reported if HW, at the
> minimum, supports virtualize_apic_accesses as this feature alone means
> that an access to the APIC page will cause an APIC-access VM exit. An
> APIC-access VM exit provides a VMM with information about the access
> causing the VM exit, unlike a regular EPT fault, thus simplifying some
> internal handling.
> 
> HW assisted x2APIC virtualization will be reported if HW supports
> virtualize_x2apic_mode and, at least, either apic_reg_virt or
> virtual_intr_delivery. This also means that
> sysctl follows the conditionals in vmx_vlapic_msr_changed().
> 
> For that purpose, also add an arch-specific "capabilities" parameter
> to struct xen_sysctl_physinfo.
> 
> Note that this interface is intended to be compatible with AMD so that
> AVIC support can be introduced in a future patch. Unlike Intel that
> has multiple controls for APIC Virtualization, AMD has one global
> 'AVIC Enable' control bit, so fine-graining of APIC virtualization
> control cannot be done on a common interface.
> 
> Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
> Signed-off-by: Jane Malalane <jane.malalane@citrix.com>

Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>

Given the request by Kevin, I think you should at least add a comment
in the commit message that exposing the feature is a pre-requisite in
order to make it a per-domain settable, which is the end goal here.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 10:42:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 10:42:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290110.492035 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTi9t-00069Y-Tl; Mon, 14 Mar 2022 10:42:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290110.492035; Mon, 14 Mar 2022 10:42:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTi9t-00069Q-QU; Mon, 14 Mar 2022 10:42:37 +0000
Received: by outflank-mailman (input) for mailman id 290110;
 Mon, 14 Mar 2022 10:42:36 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=knG6=TZ=citrix.com=prvs=0654505ba=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nTi9s-00060M-EW
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 10:42:36 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 70426cb3-a383-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 11:42:27 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 70426cb3-a383-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647254554;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=oek5U41y4/vRcEsYQ5GGW8iFpxrIbmE4AvxhxqQRSBE=;
  b=Pncjc8v9ctiGGi9cgRjBdyNXdJn9JsFp14DK1aqhuephBzAdap1wzFuE
   lM0nw0onyJtCuwdvbm+u718pHFFT5Ir16D5GJVN7g5YwFRRAyhOxTdkF6
   HJOQXdVHa/Uh9jGnOpBjtsAhUMBaGXzJ/m08nLJxa9FyRYjXtbMhsVZyy
   E=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66086240
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:U+nlt6NFrvV/whfvrR1Ml8FynXyQoLVcMsEvi/4bfWQNrUp0hDQHm
 DZNXj3UbK2MMGT9ed0kaI3l8xhS6sXTytJiSwto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi29Iw2LBVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Z7
 tpsm7fuQigSfajShuczVB9kMH1eMvgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALNs7kMZlZonh95TrYEewnUdbIRKCiCdpwgmlo1p4UQa62i
 8wxbGJJMyT4Tz52K3QKT60Ukdy6qXrybGgNwL6SjfVuuDWCpOBr65D2K8bccNGOQcRTn26bq
 3jA8mC/BQsVXPSd1D6E/3SEluLJ2yThV+o6Krq88fJ7hUyJ8UYaAhYWSFiTrOGwjwi1XNc3A
 0Ad5CcGt6U5802vCN7nUHWQv3qsrhMaHd1KHIUS+AyLj6bZ/QudLmwFVSJaLswrstcsQj4n3
 UPPmMnmbRRturCITXOW9p+PsCi/fyMSKAcqZyAeShAey8L+u4x1hRXKJuuPC4bs0IezQ2uph
 WnX8m5u3N3/kPLnyY2d8nHpqGyniaOKSxAr5SvQWF6GsiN2MdvNi5OT1XDX6vNJLYC8R1aHv
 WQZl8X20N3iHa1hhwTWHrxTQejBC+KtdWSF3AUxR8VJGyGFoSbLQGxG3N1pyK6F2O4gcCShX
 kLcsBg5CHR7bCrzNv8fj25c5q0XIUnc+TbNC6q8gjlmOMEZmOq7EMZGPxL44owVuBJw+ZzTw
 L/CGSpWMV4UCL580B29TPoH3Lkgy0gWnD2PGsmqkE7/juXHPBZ5rIvp13PUMogEAF6s+l2Jo
 76zyePXo/mgbAEOSnaOqtNCRbz7BXM6GYr3u6Rqmh2reWJb9JUaI6aJm9sJItU994wMz7ug1
 iztCydwlQuk7VWaeFriV5yWQO62NXqJhSlgZnJE0JfB8yVLXLtDG49ELsppJ+Z7rLI/pRO2J
 tFcE/i97j10Ym2v0xwWbIXnrZwkcxKuhAmUODGibiR5dJllLzElMPe9Fucz3EHi1haKiPY=
IronPort-HdrOrdr: A9a23:/IMwJ63hEheAEKG9qcP01gqjBV5yeYIsimQD101hICG9Lfb2qy
 n+ppgmPEHP5Qr5OEtApTiBUJPwJk800aQFm7X5XI3SJzUO3VHHEGgM1/qB/9SNIVyaygcZ79
 YcT0EcMqyPMbEZt7eC3ODQKb9Jq7PmgcOVbKXlvg9QpGlRGt5dBmxCe2Cm+yNNNW177c1TLu
 vh2iMLnUvoRV0nKuCAQlUVVenKoNPG0LrgfB49HhYirC2Dlymh5rLWGwWRmk52aUIF/Z4StU
 z+1yDp7KSqtP+2jjfaym/o9pxT3P/s0MFKCsCggtUcbh/slgGrToJ8XKDqhkF8nMifrHIR1P
 XcqRYpOMp+r1vXY2GOuBPonzLt1T4/gkWSvWOwsD/Gm4jUVTg6A81OicZyaR3C8Xctu9l6ze
 Ziw3+Zn4A/N2KNoA3No/zzEz16nEu9pnQv1cQJiWZEbIcYYLhN6aQC4UJuFosaFi6S0vFrLA
 BXNrCT2B9qSyLaU5iA1VMfgOBEH05DVCtue3Jy9fB8iFNt7TNEJ0hx/r1rop5PzuN+d3B+3Z
 W1Dk1ZrsA+ciYoV9MPOA4ge7rBNoWfe2O7DIqtSW6XZp3vfUi97qLK3A==
X-IronPort-AV: E=Sophos;i="5.90,180,1643691600"; 
   d="scan'208";a="66086240"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=kiwLDzQZDW7eaSGis+XaOtLssI6S8CimRKQbNJMw/4OeYyx3Bqs7DMZZxRvfHXXUnNx2XEMxIFXXBrW1Y4oHDjN/hvIpotWaWshVj9ekhIlAoZTdDonq2cHpBqFGdzlw8rYB4gqKOq1SMcgtCuIksWSZZN+6be+wkxKA7KbJbV44bcbifdWdGp/wbH0mCFKKoOrhYw1HjCLIR9RSXexK8nuXkZLcyqpePgmK8VdzykO4eGiQJyXW2ltL6I0E1jN8DyNU64wsomyi6Qxic9tiYEgc9AG7QJNnu5DxthuigCBER6REeJKxbuQaxqlDyay4IeFn8TNwnIEI+sy+eI980w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=54YlXkTlmBA8Eqmdazo/ysd/STr03vF7a/Sa5wn0D5c=;
 b=ev8Ubvkop0sppOJqics+EvpCrEVwOh35F7IsZPZy2dupGAb1GU1nJHs3sY5X2UWsF81mUWwXB3Ca0R12HNcnDB/qnkl3tFvIc0TCKLJPkXuwWG3Um5PVRhDNOMxyHu1x42BGdVW3NezZd9c4Kcf2amCoPWUodVBP7+pA/wbwa3ovq7JU0Gk6Vu/2SNVVPwKLeJBe0vXQmNiMNGM4JDHnm32t5DO+XtlyjyhipBu34C9Ohh94uQdukHp+HDrz8iFrCwHWyOrmErNJyYLPsQi4JSMzNE0retYovvW2iGKFNgFEQGd1hWlCN1qd6dAUFslH5XQpcOoQJz71u/4CIPdBQA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=54YlXkTlmBA8Eqmdazo/ysd/STr03vF7a/Sa5wn0D5c=;
 b=SdFVfehqZesUcN11U1vPQgttuAIxPEUizHqJisGmsEMNWGVLOems8dmIIZxjiZTq5z5WQew6M0bQdkN8v6aPXrvgwdTYpVRUu73oPXiIdgRE3YHdPTTuQh061JklQriI3cyPD7Wc8WZZLgiIePWQOIQjBikZyGxPKa4I94xOs30=
Date: Mon, 14 Mar 2022 11:42:23 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jane Malalane <jane.malalane@citrix.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, Anthony
 PERARD <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, Andrew
 Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>, Julien Grall <julien@xen.org>, Stefano
 Stabellini <sstabellini@kernel.org>, Christian Lindig
	<christian.lindig@citrix.com>, David Scott <dave@recoil.org>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH v7 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Message-ID: <Yi8cD6rFvLxmz8en@Air-de-Roger>
References: <20220311152107.2918-1-jane.malalane@citrix.com>
 <20220311152107.2918-3-jane.malalane@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <20220311152107.2918-3-jane.malalane@citrix.com>
X-ClientProxiedBy: PAZP264CA0087.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:102:1fa::7) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 414cbf30-0065-4bdd-015d-08da05a75606
X-MS-TrafficTypeDiagnostic: SJ0PR03MB6731:EE_
X-Microsoft-Antispam-PRVS: <SJ0PR03MB6731FD6E6DBEC2F4AAB464858F0F9@SJ0PR03MB6731.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: pC3wY/axmL17LlzV3gr9Wef+37791ZmVhq74jzL6eFIoMPcuWC5elhq2jBEXvn5uJjrnrhAzObvyzdEXUOBxLTPxBN8Lh+n+sVhuowcFKSaPq76Pc7Ay6JIIEjDlN1H+JdJVswI3s06gopG+O+0Jk7CqOf+ba9SyBAPCMGnHNDpmo/0SVLJA+Z2dnYjX6dzpte5wveSpzfMR4AQV+9Jhx+RtFzELgns1ViVUjEh4kwTlKaP1fs/KDyFnN/fDlFVJ9xl+8w8RNptU2AuraoydVnLivYjxrmExy/eZP+mj/Bzzw69opWKD756Jaz1GcxsZr+sZyvHfZ6XBFQCfu3QpDGP8MSQuyFimtDSki2a+pFsVXJYGMH/Vk0tyXEPcFYQZPc4snZQn0bO0K+kH1ZvvSVLD9S+iNPFPMvv8SxXizkpglMmWGXrVTJu+ZwfEAuwEkq7v6uONWOHxp5gz9cP2QZKrD2a8wNvRuDGmFsnJTXQXYA3Z4aC96cAT+KxULbsAY0hi/7DuxRfiychkpfk8rbfJJNb/IR7shJoJjbyoBLMuSxXkQuJbOQfEHlV4horO0mqv5pYpBcC0hSIZgO7Fhl6KRBSOMPYApdFrT6Duqj09WpGPRBVwKO2yv2NIV6dIvIl3pSyagR4N359b5oz96A==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(54906003)(316002)(6636002)(6486002)(85182001)(5660300002)(508600001)(86362001)(8936002)(8676002)(38100700002)(66946007)(66556008)(6666004)(4326008)(6862004)(9686003)(66476007)(82960400001)(6512007)(6506007)(186003)(26005)(33716001)(2906002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?UUpDbkFSN1BIV3lkQW9oekxNOXhIcUZvbmREQ0lUb2k3M0dzSGpiM1pFTnBx?=
 =?utf-8?B?MTVzeU40cFg1MGc4R1pTWjd2SGNPQjRLUW1xWjZoR2JndkZyM1ZiZEhETnMy?=
 =?utf-8?B?MTF1MHJqZWFVWFFMTW9aSVhNTVFLWmNVakVjRlFhZ1FlYVg0TGttWWxUQnU5?=
 =?utf-8?B?b016NzJxVTNRbzRwYVo0NkF2TEMzczBZSU5OOWxFdTF2SlkyM2w4VnowNFpQ?=
 =?utf-8?B?TFdxclhpZ3B3ZllJUGNLRkd5ZGJnR0crSlY0RW83aUhRcnlzbXIvUWlpUHZO?=
 =?utf-8?B?a1NUTEowb0RhOE51NVNoTzJDTCtkdTJjVllJWlpzYVQ0SzlLREgra1RjaWk3?=
 =?utf-8?B?VTZma0xtbmlwTGMvRVk1MmpHVWtsUXhDTCs4YjRWMVhMUzdXK0dhUkMvSkpO?=
 =?utf-8?B?L3UyVmRPSjZQLysrMU1kR1BUcTFxOVpnZ2FjSU4rLzBWNzh6T0dDKzBUd1Bz?=
 =?utf-8?B?ajM5N3I5aXNacVJxNTNlSkJrVTBnSUFJZldaUHpqODdWQVRuQkFsdnhwcUFB?=
 =?utf-8?B?ZDhZdXY4ODBic2lnNDBuNi9LcDRPK2lpRWQrd3NoMS9uL21rNzY4TzU0eWRw?=
 =?utf-8?B?SkRkajF5aFJTcjdDUFlxeWxNVDJnNC9ibzVlTitFTzlKNTVpWXEwenlEdDlI?=
 =?utf-8?B?RFR6OEFZc1R6K1JHNVg3dC9mSVYzNWQ1UXAyMlJtZEo2L0JYYy9sZHdRTWJE?=
 =?utf-8?B?SzAyVVNENmlyS2RKTGJpZXQ4SXZJY2NONStYQ0Y2c1o4L0hUVGRkNWpmVnNX?=
 =?utf-8?B?Mi8xODQ5bU5PSGRJSXdVZGJ2TVhzRjQrMWxyWjhhZUZSbUpKQ3ZWcWZRNUQx?=
 =?utf-8?B?MUlUdTFsSytlV1N0RnVoTFh6dTMwQ09JUTEzbDFBTWMxTFpwNVluTUkrVStM?=
 =?utf-8?B?dVdCT1JYOTBJcWk4c09YWEVHSDBpSWJxNVpScEQyNEtJU1psU2JOL1JSOVZ6?=
 =?utf-8?B?ckNkaHlZS0FLK1pkem5wc0pPOFBZdlB1aWZ3ZzJ6TFVKY0NnL2p6QVVnN0hK?=
 =?utf-8?B?dTNHVG5OVlRDOFJteTFGR0diN0pKeTIxVjJ3Tzd2UllRRlpHNnhhMHZmZFp4?=
 =?utf-8?B?TzNCdEpYb3RBbTZBWFNNQzJBZmRnYUNMRDhFUEdlU0NiZXB1V093Kyt2bUZ6?=
 =?utf-8?B?RVFwemFWNnZrMmc0bU9OTEY5YU9LY0dxdm53Q3ZMd0ZKQ1hSVDJVenAxYk5q?=
 =?utf-8?B?U20vMnRrWEJZQkxubVVDZFZhY0lFMVNSRVFNWmIyQlJyQWxGTzRBcEFpUUJ0?=
 =?utf-8?B?NGY0Vk53ZDlVY1hTa0RxSk5HYVRzM1Zha2lkVzNicVVHZUxFMlZnbHpkQTRr?=
 =?utf-8?B?MldOMFNPbElSKzY3TG94UDQ1ZEthU2h0a0NIQjdIKytWNXVHb2NHMXlzcUNZ?=
 =?utf-8?B?ZGYwNE1aVFBVQUJkRUpDWnhqU1hZbFZjZ0lZUmxqNk5XNEV1c0h2dEY5K1Ba?=
 =?utf-8?B?Z2pJNWpiRThGbm9wMTk0VkJ4bTRIMlR5OGM3SkVnWXdadHJoOUFZWnhKbjJa?=
 =?utf-8?B?cUxrc1J1aC8wQnVWWDdaYjEvTjhSZGRlaG5STExZOHhZenpYTVcxbkRtS2cv?=
 =?utf-8?B?Rm1weERmNmJlTUcvV1ZoQ1NPN0NBd3hpTEdHQUJ5Q1J5ZXlKV1paQmRJc09C?=
 =?utf-8?B?eXA2YkliaEJ6YllrZysrSm0xaUVFUW9VNkwwaVJpZ3I1b0N2K1RnK1BOMXZY?=
 =?utf-8?B?ZzUyRkd2NmRzWU5aR1drRnFUOFp1YTVzaWU4eEwrVHVIWmJrdS9nMHdBVjJi?=
 =?utf-8?B?WUdXTUc4QlU4aGg0UmxhYy8rY29QYnlERDBxakJ3VE5rNFlSQnladUxTMStE?=
 =?utf-8?B?Rkkzc0FsWnc2NHlFZXorSGtWOVp6MUdLMlp4ZEkyMjQyVlBBSC9ZSVhIODFD?=
 =?utf-8?B?d1VaRjJEY1NtUlhKbHZwNzhtSGFaT1FKQ1JWTmovbGhKRnNpcmtSdWwzQTUw?=
 =?utf-8?B?OW0wNGxGRlI4ZnU2azFVOW5qdWJ5Wkl5eWNDakJZYzFDL3ViUFZDRXV2d1lM?=
 =?utf-8?B?RFExbTZhcE9nPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 414cbf30-0065-4bdd-015d-08da05a75606
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 10:42:28.8976
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: XWygmQAlB3JKFU315/p74oEJDamfaaVKcqjYExgdCE9PVF/TNeaCBKbmcur8qz4Og6u6aEuFf7F6b4JLxweV7Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR03MB6731
X-OriginatorOrg: citrix.com

On Fri, Mar 11, 2022 at 03:21:07PM +0000, Jane Malalane wrote:
> diff --git a/tools/xl/xl_parse.c b/tools/xl/xl_parse.c
> index 117fcdcb2b..0ab9b145fe 100644
> --- a/tools/xl/xl_parse.c
> +++ b/tools/xl/xl_parse.c
> @@ -1681,6 +1681,22 @@ void parse_config_data(const char *config_source,
>          xlu_cfg_get_defbool(config, "vpt_align", &b_info->u.hvm.vpt_align, 0);
>          xlu_cfg_get_defbool(config, "apic", &b_info->apic, 0);
>  
> +        e = xlu_cfg_get_long(config, "assisted_xapic", &l , 0);
> +        if ((e == ESRCH && assisted_xapic != -1)) /* use global default if present */
> +            libxl_defbool_set(&b_info->arch_x86.assisted_xapic, assisted_xapic);
> +        else if (!e)
> +            libxl_defbool_set(&b_info->arch_x86.assisted_xapic, l);
> +        else
> +            exit(1);
> +
> +        e = xlu_cfg_get_long(config, "assisted_x2apic", &l, 0);
> +        if ((e == ESRCH && assisted_x2apic != -1)) /* use global default if present */
> +            libxl_defbool_set(&b_info->arch_x86.assisted_x2apic, assisted_x2apic);
> +        else if (!e)
> +            libxl_defbool_set(&b_info->arch_x86.assisted_x2apic, l);
> +        else
> +            exit(1);

I think the placement here is not fully correct, as this is a
LIBXL_DOMAIN_TYPE_HVM only code section. We need this also for
LIBXL_DOMAIN_TYPE_PVH (or for !LIBXL_DOMAIN_TYPE_PV if that's
easier).

The rest LGTM.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 10:56:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 10:56:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290137.492046 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTiMu-0008E0-4S; Mon, 14 Mar 2022 10:56:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290137.492046; Mon, 14 Mar 2022 10:56:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTiMu-0008Dt-1K; Mon, 14 Mar 2022 10:56:04 +0000
Received: by outflank-mailman (input) for mailman id 290137;
 Mon, 14 Mar 2022 10:56:03 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=knG6=TZ=citrix.com=prvs=0654505ba=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nTiMt-0008Dn-6C
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 10:56:03 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 5114be56-a385-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 11:55:54 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5114be56-a385-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647255361;
  h=from:to:cc:subject:date:message-id:
   content-transfer-encoding:mime-version;
  bh=F08nsH28stFZOmUBv3c0cZFqPtgTIGzThzdk56xOyS0=;
  b=N6fhGOqlu5zRpTTKkWd5oMMFEEkUCPSi0oaVzB2w0MI8+BhSMn52qj0E
   lLac8grDhOjglnvtKv7SV2FGkRmdig3kFgvPgpAdoATa9QhI7rNJxW2bl
   VABGq24lW8TB1IlbwMxDhPQXeo+ChZ4H1pEX7n4bUowFy3oMNcVGBWejj
   M=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66086948
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:SwUgR67r5fT/NzQSuq95cQxRtBLHchMFZxGqfqrLsTDasY5as4F+v
 mcYDD2AOv+ON2bzfdkgaNzjpxkCuZHcmIBlTAFv+31mHi5G8cbLO4+Ufxz6V8+wwmwvb67FA
 +E2MISowBUcFyeEzvuVGuG96yE6j8lkf5KkYAL+EnkZqTRMFWFw0XqPp8Zj2tQy2YPgX1vU0
 T/Pi5a31GGNimYc3l08s8pvmDs31BglkGpF1rCWTakjUG72zxH5PrpGTU2CByKQrr1vNvy7X
 47+IISRpQs1yfuP5uSNyd4XemVSKlLb0JPnZnB+A8BOiTAazsA+PzpS2FPxpi67hh3Q9+2dx
 umhurSVRCJuOJ3ett8RDQtqMSFsB6J0xuTYdC3XXcy7lyUqclPpyvRqSko3IZcZ6qB8BmQmG
 f4wcW5XKErZ3qTvnez9GrIEascLdaEHOKsFvX5t13fBBOsOSpHfWaTao9Rf2V/cg+gQQ66OO
 ZtFOVKDajzQTzZ+GFQpGqkvkaChrHPGc2FaqV6K8P9fD2/7k1UqjemF3MDuUseRWcxfk0Kcp
 2TH12f0GBcXMJqY0zXt2m2orv/Cm2X8Qo16PL+l8v9nhnWDy2pVDwcZPXOrrP/8hkOgVtZ3L
 00P5jFovaU07FasTNT2Q1u/unHslhwWVsdUEuY6wBqQ0aeS6AGcblXoVRYYNoZg7pVvA2V3i
 BnZxLsFGACDrpWwRFfa8IeGgwi+ZzonD28QXyA2c1AatoyLTJ4IsjrDSdNqEaiQh9LzGC3tz
 z3ikBXSl4n/nuZQifzloAmvbyaE48GQE1Vrvlm/sneNtFsRWWKzW2C/BbE3B95kJZ3RcFSOt
 WNsdyO2vLFXVsHleMBgrYww8FCVCxStbWe0bb1HRcBJG9GRF5mLJ9w43d2GDB01WvvogBewC
 KMphStf5YVIIFyhZrJtboS6BqwClPa8So20CaqMMYUXOvCdkTNrGwk0OSatM53FyhBwwcnTx
 7/GGSpTMZrqIfs+l2fnLwvs+bQq2jo/1QvuqWPTlHyaPU6lTCfNE98taQLWBshgtf/siFiFo
 r53aprRoz0CAbKWX8Ui2dNKRbz8BSNgXs6eRg0+XrPrHzeK70l6Uq6Pm+x9I9I590mX/8+Rl
 kyAtoZj4AOXrVXMKBmQa2Alb7XqXJ1lqmk8MzBqNlGts0XPq671ts/zq7NfkWEbydFe
IronPort-HdrOrdr: A9a23:u7bzaan7+rgxvdu4wdzzjsL7GdvpDfPEimdD5ihNYBxZY6Wkfp
 +V8sjzhCWatN9OYh0dcLC7WJVpQRvnhPlICO4qTMqftWjdyRGVxeRZjLcKrAeQYhEWmtQtsJ
 uIEJIOduEYb2IK9foSiTPQe71LrajlgcKVbI/lvghQpGpRGsddBmlCe2Km+hocfng7OXN1Lu
 vU2uN34x6bPVgHZMWyAXcIG8DFut3wjZrjJToLHQQu5gWihS6hrOeSKWnS4j4uFxd0hZsy+2
 nMlAL0oo2lrvGA0xfZk0ve9Y5fltfNwsZKQOaMls8WADPxjRvAXvUoZ5Sy+BQO5M2/4lcjl9
 fB5z8mIsRI8nvUOlq4pBP8sjOQpAoG2jvH8xu1kHHjqcv2SHYREMxan79UdRPf9g4JoMx8+L
 gj5RPUi7NnSTf72Ajt7dnBUB9n0mCup2A5rOIVh3tDFaMDdb5qq5AF9k89KuZMIMvD0vFoLA
 BSNrCc2B4PGmnqL0wx/1MfiuBEZ05DUStvGSM5y4+oOzs/pgEN86JX/r1cop46zuNMd3B13Z
 W0Dk1WrsA8ciZvV9MHOA4ge7rBNoWfe2O7DIqtSW6XZp3vfUi97qLK3A==
X-IronPort-AV: E=Sophos;i="5.90,180,1643691600"; 
   d="scan'208";a="66086948"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=d+AMKrkilGHEoJjacGS5EncYb1y8R5Nqc2BjD6gRoFiOkwBJae2tH8ersShQV8agibMDnRhNI4Fs8vWyI6thgbsJjRP8brEGUtIL+LKdlBx9rGIG1794EImOzcUTYqOCCYSNHIJQC4dP9bjI0KZamOMJxMnru56znlQBbMhx09cp74cUHdg9yQQkIOSz9wn4narCy/7a1bg4maSuy5KwVnnvIDCl/S0s+OCJt9onmXDW0+hDp2PAPsYiXrSSh82kq3A7wC4h94NFmq1YbrRsxlgagcCBgzd5KXte6WFoCpkb/pStLt9B6ZlYcU7L0AljfLHO1szoicBBLX37cqWvDQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=fB61Y6AkgCFoXtQB7EJYvUC5iJfNzDs4sVa702nQGcU=;
 b=eLKcOfYdv8nrGCa4hSXdClTieeMltVORki0Z/upuyrdnkejnQoay3AIgTQk85eGx95sBVdMjBVtK1/idmwLvzWnI2A6PixKbK/YNOMSZUJ/G/7rqv9xmn+z+OId2YxIwfNBrF5rA7mhxwVuOrZBQ7AUOzwGUAxZ4sn9oT1XFaGMk57O5oxtrfBqiP94nwBidg0rN4pblHopA7TGE5MNzu70sOSHT496P/v4LQZN1UaKWyG8Gy23Rgvi4NFAB3ZL6BY1aM2rUvbdNP/pV2N+P3EYg71m3qfL8N2lsVJVqu6yPNk3dtCqlao2U2KmH0aIcX/1Nq1blAwFZmSeFk+bcKg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=fB61Y6AkgCFoXtQB7EJYvUC5iJfNzDs4sVa702nQGcU=;
 b=UzB68vWhMKf98pG+vCEsuoXE41Oz8nmRz7tE/ulDpyqiOxl0vFjfOdtgCCC/45WISDf5NzNqOvbTkDjH9+PaJ4YDJ9a4ZJtCHlGpRrFEMRjcFFGMqFI5at1MRGt+8KkThVhCDc45blbXTRrH/nYyDbFCnrK7I847MZbjXijt6HM=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, "Jan
 Beulich" <jbeulich@suse.com>, Julien Grall <julien@xen.org>, "Stefano
 Stabellini" <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
Subject: [PATCH] kconfig: detect LD implementation
Date: Mon, 14 Mar 2022 11:55:35 +0100
Message-ID: <20220314105535.13518-1-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: MR2P264CA0100.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:500:33::16) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c55975ce-dbad-4f10-758f-08da05a92e34
X-MS-TrafficTypeDiagnostic: CY4PR03MB2725:EE_
X-Microsoft-Antispam-PRVS: <CY4PR03MB272526C813C49FDF2AAC80678F0F9@CY4PR03MB2725.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(316002)(83380400001)(2906002)(86362001)(4326008)(8676002)(66556008)(38100700002)(66476007)(66946007)(6506007)(508600001)(6666004)(8936002)(2616005)(1076003)(6916009)(6512007)(54906003)(6486002)(36756003)(5660300002)(26005)(186003)(82960400001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?Q09icURwOFBHUWVqblBvY2dzYUxXemYvSjQ0NDBpVmc5U056U3R0bC84aDMw?=
 =?utf-8?B?TzJHdHNvamgyamVISk1mUVhrWUZrdTl5am1TNDBjRmpTNnA1d1RuUjlMWDBz?=
 =?utf-8?B?dnNpamV1TFluZ0k5V1loWkFNMUljOXhlblZxbm9sQmRYYnRBMGFqZ0hDbS9S?=
 =?utf-8?B?MThaYlFmS0Jvell1aEpTSXJ6ZXIxcmM4Z0xEZjk5aDJoZDhiK096alJTQnB3?=
 =?utf-8?B?Y0pMWG9TVzRqcktKdVcyUWxsZkhmZW8yOEhaVUw3TUpwZVdTUUFEdng3MjZv?=
 =?utf-8?B?MjJFL3JoSnpxNjRpSXNqS3UvaWkvbEhDOVV5NnFyWE1BbG1jajF5TFZtZFhH?=
 =?utf-8?B?L0FuRHYxV3dWMFlENjBWUU4rV3NQelAydWtOV1pGWmFreDZydjR3Q3NUYStP?=
 =?utf-8?B?RmRPN1k2dTJRZHQrall1RmtldXU5OURJWnJZRzhrempuU29jYUlXMjd3V3hi?=
 =?utf-8?B?c1pielBLTFhnbWdFSitEU1MyYnVWbFB0eUVmVi82Z01JTU1wNWcwNnJlcC96?=
 =?utf-8?B?Mi93NmxJY1pmWW5JUjFsdFhOdEloRTYrU0YrM1N4a0tZK3FvYXhKYm5IQ2ZY?=
 =?utf-8?B?Z0tNbzZZY05INngyY0dmbW1uQ2ZvNmU1WnFXMU93VUlsSzI5YkcyYVJZL3o4?=
 =?utf-8?B?aUgweVJ2NjFqVmJKVkI0NUdxc3lQdStqZktXSkNVOXNEbHdyazBIanZMaHFm?=
 =?utf-8?B?OFdJM1pTYllPT3RMZjVoYU9jT2I3VnZKK09vdThaMUNzRWhOREJZTnRzd2Fy?=
 =?utf-8?B?THZhZmxpOTQvcy8yemUrcnMydUJGVTRjSE9iNVFFZFRVSU80dGZySEZvZU1p?=
 =?utf-8?B?SDF5V05FdDZobDAyd0R2dEo1ODZWVjNwQWtWMXdpanF1WmMzNmZNMCtMM0ky?=
 =?utf-8?B?dUl0REtmQkhodTV0QW1pVjRFSk9EVGx0bFFrS0R0Z3l3MG5rMXZWZHpDc0N0?=
 =?utf-8?B?QXdacS8rbXh6VUU5SzBhSGdrZ0sydzkxQVpWdCtUSzlhRzVTUHNkT2xTWTVY?=
 =?utf-8?B?TC9BdlZZTXZRUDhlSThOSFNnWjc1VWxjUUF1K1hGSHVmTnBlWTg3cGVVZDVh?=
 =?utf-8?B?Y0FadVh1U3FUNmt0S2ZkV1BCdmZYUnVqWXRhcmpmc2ZtRWd6d0xFMTdWeGNz?=
 =?utf-8?B?Z0REVklWT1BLaGhpRVFLRlRaM08zU0FBczJZWUIvSFd0eUdSZFlpRTZRbk9P?=
 =?utf-8?B?T0FLeHdKTXRPYU92czRES2Z5bURvZE0xYWJOS05sZHpoTTJQOUdmVGsrdHZM?=
 =?utf-8?B?MEdNR2RRMDVaK0wrQ3BXUjFJWGMvNTJLelR5Ri9UQUMxaFBvZkZGeWRZUTZL?=
 =?utf-8?B?UEc0ZzM4VEN3aHR3VVdzeWdrS2t6Tk1hQ0xWTFNjdC8vTmtGdXAzbVVvT29O?=
 =?utf-8?B?T0Fsb21KTEREbkl5Zis3S0MzWFpIU1N0ZWV1YW9FNkkzcVgrVytxcE9yVEFE?=
 =?utf-8?B?RlR1Nm5SZjdTRHFjdS9tL0x2ZFN4WmhERHJMRDNJLzVSK1V5N3BCemVsNEVn?=
 =?utf-8?B?MU8xaWthV1dyakRQRldXMTU2anU4MXZxaGZsVkhDNDFrZEVBNzJQY0xmSWx0?=
 =?utf-8?B?bE8xaTIwNlU1ai83c3RqRmszTzlnaXNjSmRkSnU2M0hwbFpPMlNJNHplQWpt?=
 =?utf-8?B?NlJLa0hyVVh4aTEyMXBSbVh5VDBJQjZnY2xBa2lWcDVpU0x2QWhFN0pFWHBu?=
 =?utf-8?B?MHVrd1Fsb0hrdWl0V0hmVjlVeVY5bHcvMitZd0pCbncvdVhaMjZSQ0t2eFN1?=
 =?utf-8?B?ZS9UU3lWUTVOeXA2M3pxRG0vUXVNTWlwUXV6V0lnWUNQRjdaZm4xRkdCbGV0?=
 =?utf-8?B?djJWVW9FemhvK1FiMVlIanRLTWVRcGV1bzJSTWRJd1lrRXVUa0VIMXI1ZUFs?=
 =?utf-8?B?Sm13U3MvT3dVRWpFa3U1dnYvemtiWGVpZXZReDUrRHdEM1BqTFlpd0ZJaTZx?=
 =?utf-8?B?dmtnSFFPYlVEMW54MzFPYXZjSFRVMTBFcVl3ZGdLcTd2cHJuSlF4TnpJbnBM?=
 =?utf-8?B?ZE1hMi9BalpnPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: c55975ce-dbad-4f10-758f-08da05a92e34
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 10:55:41.0866
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 1WnZJ/rtvBDxwfmrTMcbCJIbutPbE68W3f5rxm2KkiZX/ZeeZk0q5OaVgYLQnw46xbpXKSGFx59Kp2frwFbSnA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR03MB2725
X-OriginatorOrg: citrix.com

Detect GNU and LLVM ld implementations. This is required for further
patches that will introduce diverging behaviour depending on the
linker implementation in use.

Note that LLVM ld returns "compatible with GNU linkers" as part of the
version string, so be on the safe side and use '^' to only match at
the start of the line in case LLVM ever decides to change the text to
use "compatible with GNU ld" instead.

Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
 xen/Kconfig | 6 ++++++
 1 file changed, 6 insertions(+)

diff --git a/xen/Kconfig b/xen/Kconfig
index d134397a0b..e8d5e70d46 100644
--- a/xen/Kconfig
+++ b/xen/Kconfig
@@ -23,6 +23,12 @@ config CLANG_VERSION
 	int
 	default $(shell,$(BASEDIR)/scripts/clang-version.sh $(CC))
 
+config LD_IS_GNU
+	def_bool $(success,$(LD) --version | head -n 1 | grep -q "^GNU ld")
+
+config LD_IS_LLVM
+	def_bool $(success,$(LD) --version | head -n 1 | grep -q "^LLD")
+
 # -fvisibility=hidden reduces -fpic cost, if it's available
 config CC_HAS_VISIBILITY_ATTRIBUTE
 	def_bool $(cc-option,-fvisibility=hidden)
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 11:00:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 11:00:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290141.492057 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTiQr-0001Kh-LY; Mon, 14 Mar 2022 11:00:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290141.492057; Mon, 14 Mar 2022 11:00:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTiQr-0001Ka-I9; Mon, 14 Mar 2022 11:00:09 +0000
Received: by outflank-mailman (input) for mailman id 290141;
 Mon, 14 Mar 2022 11:00:07 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTiQp-0001IX-Kl; Mon, 14 Mar 2022 11:00:07 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTiQp-0002Cn-IG; Mon, 14 Mar 2022 11:00:07 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTiQp-0001NM-7K; Mon, 14 Mar 2022 11:00:07 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTiQp-00067Y-6s; Mon, 14 Mar 2022 11:00:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=m+BNFiDT5x64TsrT/P9J9Fc7GJw71xk/86WZZaE7Z2o=; b=G3FDfLKkcC1WwbLJHPWPmI4AfV
	Q9MpxM8ka+IqqW0f3/cVbdjUwgRn1Uxufn6b3dFrxMfA+sK4I6fpSO6rhzDgO98q16xO9HaPi2AzW
	s3qJERcuLpDXSWciJMTR1vLDg4ounse4SKcPSbuhDe8h1d+UqoXTs4PMuyrQFlCAxQJc=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168579-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168579: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=a13dfc769bd7097d8d9ffe3e029a2c1d062d712b
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 14 Mar 2022 11:00:07 +0000

flight 168579 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168579/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 a13dfc769bd7097d8d9ffe3e029a2c1d062d712b
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   14 days
Failing since        168258  2022-03-01 01:55:31 Z   13 days  130 attempts
Testing same since   168579  2022-03-14 08:41:36 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 629 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 11:00:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 11:00:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290150.492068 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTiRd-0001wM-44; Mon, 14 Mar 2022 11:00:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290150.492068; Mon, 14 Mar 2022 11:00:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTiRd-0001wF-0d; Mon, 14 Mar 2022 11:00:57 +0000
Received: by outflank-mailman (input) for mailman id 290150;
 Mon, 14 Mar 2022 11:00:56 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=0cW6=TZ=citrix.com=prvs=065348267=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nTiRc-0001w5-3j
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 11:00:56 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ff5ab574-a385-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 12:00:46 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ff5ab574-a385-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647255654;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=cdyEoBU/f1cnQ43XUIskjAet3xho8xWImznx9yUFDrc=;
  b=cdxQ1xFjs1o8zJhYFDlPRs9kNioYkuh7BFcO6zbbrOR0TgVVoyFp9aVU
   YYt46cG6AWcB5Uag3SyfzORx3fyZSz7Zfj1rfA9QWqwgBKZEFLaMLBLFp
   rnjh9MFqbfzET+l4/jlM3E6Kdk8c68NldzZaYh0EUtTFo/D38lQ8gjKUR
   8=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 66562350
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:e0rf4KplmGQFcJ9DiZP4/BBZPnheBmIIZRIvgKrLsJaIsI4StFCzt
 garIBnQPP+LNDage9B0aom+pk8GvMPQzdZjT1Ruqy9nESlEpJuZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 I+q+qUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBGv2WwfU4XEViHXtZD+5k17/lA2XivpnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVI5DfVF/s5B7vERL3H/4Rw1zYsnMFeW/3ZY
 qL1bBIxMkmeOUYSYj/7DroArcCPnCO8eAdn9nmemPsx2neU6R5Yhe2F3N39JYXRGJQ9clyjj
 n3C13T0BFcdLtP34T+M6HelnOLMtSL9RoMJFbe8++JqgVuc3WgaAlsdUl7Tiem0jAuyVsxSL
 2QQ+zEytu4i+UqzVN7/Uhak5nmesXY0efBdDuk74wGl0bfP7kCSAW1sc9JaQIV47olsH2Vsj
 wLX2YOybdByjFGLYVbNrO6FiDzuAyZPCl1BRwAEbykYvta29enfkSnzZtpkFae0iPj8Fjfx3
 y2GoUACulkDsSIY//7lpA6a2lpAsrCMF1dovVuPAgpJ+ysjPOaYi5qUBU83BBqqBKKQVRG/s
 XcNgKByB8heXMjWxERhrAjgdYxFBspp0hWB2zaD/LF7rlxBHkJPmqgKvFlDyL9BaJpsRNMQS
 Ba7VfltzJFSJmC2SqR8fpi8Dc8npYC5S4i6D6GLNIIRPcEpHONiwM2JTRTMt10BbWB2yf1vU
 XtlWZvE4Ykm5VRPk2PtGrZ1PU4DzSEi32LDLa0XPDz8uYdykEW9EO9fWHPXN7hRxPrd/G39r
 oYOX+PXmk43eLCvPUHqHXs7cAliwY4TXsut9aS6t4erf2JbJY3WI6SIkO17JNA9wfg9eyWh1
 ijVZ3K0AWHX3RXvQThmoFg5AF8zdf6TdU4GABE=
IronPort-HdrOrdr: A9a23:cPdSHqDmP59tFC/lHemf55DYdb4zR+YMi2TDgXoBMCC9E/bo8v
 xH/pwgvyMc7Qx9ZJhOo7y90cW7Lk80lqQFg7X5X43DYOC8ghrPEGgK1+KLqAEIfReRygc379
 YCT0ERMrzN5fcRt7eD3OEVeexQpOVuUcqT9IDj80s=
X-IronPort-AV: E=Sophos;i="5.90,180,1643691600"; 
   d="scan'208";a="66562350"
From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Jan Beulich
	<JBeulich@suse.com>, =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?=
	<roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
	=?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?=
	<marmarek@invisiblethingslab.com>
Subject: [PATCH] x86/cet: Clear IST supervisor token busy bits on S3 resume
Date: Mon, 14 Mar 2022 11:00:34 +0000
Message-ID: <20220314110034.28498-1-andrew.cooper3@citrix.com>
X-Mailer: git-send-email 2.11.0
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

Stacks are not freed across S3.  Execution just stops, leaving supervisor
token busy bits active.  Fixing this for the primary shadow stack was done
previously, but there is a (rare) risk that an IST token is left busy too.
This will manifest as #DF next time the IST vector gets used.

Introduce rdssp() and wrss() helpers in a new shstk.h, cleaning up
fixup_exception_return() and explaining the trick with the literal 1.

Then this infrastructure to rewrite the IST tokens in load_system_tables()
when all the other IST details are being set up.  In the case that an IST
token were left busy across S3, this will clear the busy bit before the stack
gets used.

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
---
CC: Jan Beulich <JBeulich@suse.com>
CC: Roger Pau Monné <roger.pau@citrix.com>
CC: Wei Liu <wl@xen.org>
CC: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
---
 xen/arch/x86/cpu/common.c        | 25 ++++++++++++++++++----
 xen/arch/x86/include/asm/shstk.h | 46 ++++++++++++++++++++++++++++++++++++++++
 xen/arch/x86/traps.c             |  8 +++----
 3 files changed, 70 insertions(+), 9 deletions(-)
 create mode 100644 xen/arch/x86/include/asm/shstk.h

diff --git a/xen/arch/x86/cpu/common.c b/xen/arch/x86/cpu/common.c
index bd2207163a35..6eab7dbe894c 100644
--- a/xen/arch/x86/cpu/common.c
+++ b/xen/arch/x86/cpu/common.c
@@ -13,6 +13,7 @@
 #include <asm/apic.h>
 #include <asm/random.h>
 #include <asm/setup.h>
+#include <asm/shstk.h>
 #include <mach_apic.h>
 #include <public/sysctl.h> /* for XEN_INVALID_{SOCKET,CORE}_ID */
 
@@ -826,15 +827,31 @@ void load_system_tables(void)
 	 */
 	if (cpu_has_xen_shstk) {
 		volatile uint64_t *ist_ssp = tss_page->ist_ssp;
+		unsigned long
+			mce_ssp = stack_top + (IST_MCE * IST_SHSTK_SIZE) - 8,
+			nmi_ssp = stack_top + (IST_NMI * IST_SHSTK_SIZE) - 8,
+			db_ssp  = stack_top + (IST_DB  * IST_SHSTK_SIZE) - 8,
+			df_ssp  = stack_top + (IST_DF  * IST_SHSTK_SIZE) - 8;
 
 		ist_ssp[0] = 0x8600111111111111ul;
-		ist_ssp[IST_MCE] = stack_top + (IST_MCE * IST_SHSTK_SIZE) - 8;
-		ist_ssp[IST_NMI] = stack_top + (IST_NMI * IST_SHSTK_SIZE) - 8;
-		ist_ssp[IST_DB]	 = stack_top + (IST_DB	* IST_SHSTK_SIZE) - 8;
-		ist_ssp[IST_DF]	 = stack_top + (IST_DF	* IST_SHSTK_SIZE) - 8;
+		ist_ssp[IST_MCE] = mce_ssp;
+		ist_ssp[IST_NMI] = nmi_ssp;
+		ist_ssp[IST_DB]	 = db_ssp;
+		ist_ssp[IST_DF]	 = df_ssp;
 		for ( i = IST_DF + 1; i < ARRAY_SIZE(tss_page->ist_ssp); ++i )
 			ist_ssp[i] = 0x8600111111111111ul;
 
+		if (rdssp() != SSP_NO_SHSTK) {
+			/*
+			 * Rewrite supervisor tokens when shadow stacks are
+			 * active.  This resets any busy bits left across S3.
+			 */
+			wrss(mce_ssp, _p(mce_ssp));
+			wrss(nmi_ssp, _p(nmi_ssp));
+			wrss(db_ssp,  _p(db_ssp));
+			wrss(df_ssp,  _p(df_ssp));
+		}
+
 		wrmsrl(MSR_INTERRUPT_SSP_TABLE, (unsigned long)ist_ssp);
 	}
 
diff --git a/xen/arch/x86/include/asm/shstk.h b/xen/arch/x86/include/asm/shstk.h
new file mode 100644
index 000000000000..a26e3c70f0c6
--- /dev/null
+++ b/xen/arch/x86/include/asm/shstk.h
@@ -0,0 +1,46 @@
+/******************************************************************************
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; If not, see <http://www.gnu.org/licenses/>.
+ *
+ * Copyright (c) 2022 Citrix Systems Ltd.
+ */
+#ifndef XEN_ASM_SHSTK_H
+#define XEN_ASM_SHSTK_H
+
+/*
+ * RDSSP is a nop when shadow stacks are active.  Also, SSP has a minimum
+ * alignment of 4 which enforced by hardware.
+ *
+ * We load 1 into a register, then RDSSP.  If shadow stacks are not active,
+ * RDSSP is a nop, and the 1 is preserved.  If shadow stacks are active, the 1
+ * is clobbered with the real SSP, which has the bottom two bits clear.
+ */
+#define SSP_NO_SHSTK 1
+
+static inline unsigned long rdssp(void)
+{
+    unsigned long ssp;
+
+    asm volatile ( "rdsspq %0" : "=r" (ssp) : "0" (SSP_NO_SHSTK) );
+
+    return ssp;
+}
+
+static inline void wrss(unsigned long val, unsigned long *ptr)
+{
+    asm ( "wrssq %[val], %[ptr]"
+          : [ptr] "=m" (*ptr)
+          : [val] "r" (val) );
+}
+
+#endif /* XEN_ASM_SHSTK_H */
diff --git a/xen/arch/x86/traps.c b/xen/arch/x86/traps.c
index a2278d9499d0..86595479707a 100644
--- a/xen/arch/x86/traps.c
+++ b/xen/arch/x86/traps.c
@@ -84,6 +84,7 @@
 #include <asm/pv/traps.h>
 #include <asm/pv/trace.h>
 #include <asm/pv/mm.h>
+#include <asm/shstk.h>
 
 /*
  * opt_nmi: one of 'ignore', 'dom0', or 'fatal'.
@@ -868,8 +869,7 @@ static void fixup_exception_return(struct cpu_user_regs *regs,
     {
         unsigned long ssp, *ptr, *base;
 
-        asm ( "rdsspq %0" : "=r" (ssp) : "0" (1) );
-        if ( ssp == 1 )
+        if ( (ssp = rdssp()) == SSP_NO_SHSTK )
             goto shstk_done;
 
         ptr = _p(ssp);
@@ -898,9 +898,7 @@ static void fixup_exception_return(struct cpu_user_regs *regs,
              */
             if ( ptr[0] == regs->rip && ptr[1] == regs->cs )
             {
-                asm ( "wrssq %[fix], %[stk]"
-                      : [stk] "=m" (ptr[0])
-                      : [fix] "r" (fixup) );
+                wrss(fixup, ptr);
                 goto shstk_done;
             }
         }
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 11:45:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 11:45:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290157.492079 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTj8f-0006YE-DR; Mon, 14 Mar 2022 11:45:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290157.492079; Mon, 14 Mar 2022 11:45:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTj8f-0006Y7-AI; Mon, 14 Mar 2022 11:45:25 +0000
Received: by outflank-mailman (input) for mailman id 290157;
 Mon, 14 Mar 2022 11:45:23 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTj8d-0006Xx-Pd; Mon, 14 Mar 2022 11:45:23 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTj8d-0002xn-ML; Mon, 14 Mar 2022 11:45:23 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTj8d-0002ZG-90; Mon, 14 Mar 2022 11:45:23 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTj8d-0000na-8Y; Mon, 14 Mar 2022 11:45:23 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=IbnISYI00nFXbbz/QLLG3npUcoSPFRGEWrC+EsNoFGg=; b=xM89OShwfVjorPw7vg2RoCAHeR
	izniyCBMZFfQ51Po33WME8JsuskvEXBG3dR1Uuj5m9pqBEjmXg0joQZdoKiT8Y1fYjl0xIqbugN8J
	J4Mcn17SIodsskGWS2vkQWStANAECfhPLlmuEx/g6xtnMmTf3jCrSK7E+o7bpcPS3bOk=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168573-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168573: tolerable FAIL
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-qemuu-freebsd11-amd64:guest-start/freebsd.repeat:fail:heisenbug
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=6ff9a7e62b8c43fe3e9d360fbd49d5854787bc39
X-Osstest-Versions-That:
    xen=6ff9a7e62b8c43fe3e9d360fbd49d5854787bc39
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 14 Mar 2022 11:45:23 +0000

flight 168573 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168573/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-qemuu-freebsd11-amd64 21 guest-start/freebsd.repeat fail pass in 168545

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168545
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168545
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168545
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168545
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168545
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168545
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168545
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168545
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168545
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168545
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168545
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168545
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass

version targeted for testing:
 xen                  6ff9a7e62b8c43fe3e9d360fbd49d5854787bc39
baseline version:
 xen                  6ff9a7e62b8c43fe3e9d360fbd49d5854787bc39

Last test of basis   168573  2022-03-14 01:51:48 Z    0 days
Testing same since                          (not found)         0 attempts

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       fail    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Published tested tree is already up to date.



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 11:56:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 11:56:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290169.492090 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTjJi-0008CQ-Oo; Mon, 14 Mar 2022 11:56:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290169.492090; Mon, 14 Mar 2022 11:56:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTjJi-0008CJ-Lu; Mon, 14 Mar 2022 11:56:50 +0000
Received: by outflank-mailman (input) for mailman id 290169;
 Mon, 14 Mar 2022 11:56:48 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTjJg-0008C9-T4; Mon, 14 Mar 2022 11:56:48 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTjJg-00038f-RM; Mon, 14 Mar 2022 11:56:48 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTjJg-0002pN-Cn; Mon, 14 Mar 2022 11:56:48 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTjJg-0004WR-CL; Mon, 14 Mar 2022 11:56:48 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=LRkQ9KgOGIhWMj9exR0kGDNsqtBZ1b7iRtO6yNr9WZs=; b=UWacz7fsyKWoL2FEkvIQg0k43h
	B4BONXQSiTcNYDMQNwHRrM9hXZc5lxMc/4tO53sry+cgePp4Lasrm1L/RzFtdpiNlUV5GCirCuNxF
	rHmdHvQPsYtV2gOpPx7OU1bz0fFi9Xc42xTnD7d1DGC9VvGwu7IeAJYdJxft/2mJC/4M=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168581-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168581: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=a13dfc769bd7097d8d9ffe3e029a2c1d062d712b
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 14 Mar 2022 11:56:48 +0000

flight 168581 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168581/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 a13dfc769bd7097d8d9ffe3e029a2c1d062d712b
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   14 days
Failing since        168258  2022-03-01 01:55:31 Z   13 days  131 attempts
Testing same since   168579  2022-03-14 08:41:36 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 629 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 12:12:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 12:12:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290189.492101 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTjYX-0002TH-FV; Mon, 14 Mar 2022 12:12:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290189.492101; Mon, 14 Mar 2022 12:12:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTjYX-0002TA-An; Mon, 14 Mar 2022 12:12:09 +0000
Received: by outflank-mailman (input) for mailman id 290189;
 Mon, 14 Mar 2022 12:12:08 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=mLdE=TZ=invisiblethingslab.com=marmarek@srs-se1.protection.inumbo.net>)
 id 1nTjYW-0002T4-HA
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 12:12:08 +0000
Received: from wout3-smtp.messagingengine.com (wout3-smtp.messagingengine.com
 [64.147.123.19]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f0fed5e2-a38f-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 13:11:57 +0100 (CET)
Received: from compute3.internal (compute3.nyi.internal [10.202.2.43])
 by mailout.west.internal (Postfix) with ESMTP id E9F3A3200C4A
 for <xen-devel@lists.xenproject.org>; Mon, 14 Mar 2022 08:12:04 -0400 (EDT)
Received: from mailfrontend1 ([10.202.2.162])
 by compute3.internal (MEProxy); Mon, 14 Mar 2022 08:12:05 -0400
Received: by mail.messagingengine.com (Postfix) with ESMTPA for
 <xen-devel@lists.xenproject.org>; Mon, 14 Mar 2022 08:12:03 -0400 (EDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f0fed5e2-a38f-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:content-type:date:date:from:from
	:in-reply-to:message-id:mime-version:reply-to:sender:subject
	:subject:to:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender
	:x-sasl-enc; s=fm2; bh=WJaavbppBbDykN/gozQA4SsbY4XMOo60fQI2ApBw9
	30=; b=FffC23GLxhgObHTj9Xb9112uCVpB8XONGcPKkiAIuXzC+GNwGnm7u9y3V
	RBtX3mHsLbO5D6xrFxFj75qQtI9VbJ7Xbr66A0DT07n24g2fjG4ZW16B6NV+TarH
	cOG4uaD+Sb1O1N+qTp0PcyYPE8ahbqMr3T0OubfZHqfdzkT9fF+2ixu/UeBZ7E5a
	KMJ7DMmPfHcNNwHIadcWA2Rtj0zEfZjzBMHwkU+pw1CAEkOBu05+Q31qV4I5SUhz
	kOm543nTz1tvkYY8VtQEuhq44a0S4k2e+/834Z4pisI69yRDk0tUspLsHmBM79FS
	NXv64PsyTWtK2Uu6btP7/dIkWud0A==
X-ME-Sender: <xms:FDEvYuONGkRY0ypFNi9ozSTw8Vy9Pb68bYwOs3Tu3_B2WdX5xvZeYw>
    <xme:FDEvYs93Asrv0jHvAq13VK2Spv7N8y4gB4NHlDrBh32u50VZasPoe4a26SdsT0aAo
    hFt0mLJ7DhHFQ>
X-ME-Received: <xmr:FDEvYlRV5SaxWIdWLHFTNv7QXt2ekj_lVgqkfjBz8dPrWjGmEC-yeDB79EwAA7xpt5OHDQR4dEHHLnC4lMqyRy_AQGtnesIyiQ>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddruddvkedgfeeiucetufdoteggodetrfdotf
    fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen
    uceurghilhhouhhtmecufedttdenucenucfjughrpeffhffvuffkgggtugesghdtreertd
    dtjeenucfhrhhomhepofgrrhgvkhcuofgrrhgtiiihkhhofihskhhiqdfikphrvggtkhhi
    uceomhgrrhhmrghrvghksehinhhvihhsihgslhgvthhhihhnghhslhgrsgdrtghomheqne
    cuggftrfgrthhtvghrnhepteduteeiudevkeegvefhtdekhfelgffhhedukedvvdeuuddv
    jeehvddtieehudfgnecuffhomhgrihhnpehgihhthhhusgdrtghomhenucevlhhushhtvg
    hrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpehmrghrmhgrrhgvkhesihhn
    vhhishhisghlvghthhhinhhgshhlrggsrdgtohhm
X-ME-Proxy: <xmx:FDEvYus4omBJ-amrsk_KOPIfc_Ci5F7XU-BspFmjeRukX4583tYvjQ>
    <xmx:FDEvYmciHWNQ11CP8jzEysPCOQ3Y857c7foX5SYBAFlb7scOQPaOBQ>
    <xmx:FDEvYi3MKuraA71Kt1srVdWwnJcblrKblbtoruFV69NYMel4g3g_PA>
    <xmx:FDEvYgqyq1AE9DDhaFOGyxVsNGw0z8eDOCa13wdIoAkNhvM5o8u1bw>
Date: Mon, 14 Mar 2022 13:12:01 +0100
From: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: xen-devel <xen-devel@lists.xenproject.org>
Subject: System hangs shortly after S3 resume, if suspended for a longer time
Message-ID: <Yi8xEf0eUsh0ObPT@mail-itl>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="2mOIVKUrHDzd1AkA"
Content-Disposition: inline


--2mOIVKUrHDzd1AkA
Content-Type: text/plain; protected-headers=v1; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Date: Mon, 14 Mar 2022 13:12:01 +0100
From: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: xen-devel <xen-devel@lists.xenproject.org>
Subject: System hangs shortly after S3 resume, if suspended for a longer time

Hi,

I have another S3 issue, on the TGL system (the one with S3 present). If
I suspend it for a short time, it works. But if I suspend it for longer,
then it hangs shortly after resume - sometimes dom0's screenlocker
manages to display password prompt, sometimes not even that.
I have console on this system (it is the Intel LPSS one...), but I don't
see anything interesting there. When it hangs, it stops responding to
triple Ctrl-a too. Adding sync_console (Xen) and no_console_suspend
(Linux) doesn't give much more info.

I haven't exactly figured out what "longer" means. 1h is enough, 1min is
not.

Another user reported similar issue here:
https://github.com/QubesOS/qubes-issues/issues/7340
That system uses totally different firmware (Lenovo vs Coreboot + EDK2).
While it doesn't completely rule out firmware issue, I'd say it's
unlikely in this case.

--=20
Best Regards,
Marek Marczykowski-G=C3=B3recki
Invisible Things Lab

--2mOIVKUrHDzd1AkA
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAmIvMREACgkQ24/THMrX
1yzYwQf/dsqltCUW1GQom1Q/5R9U/nEve8ru3XxZ0sOQjYRXsYL3Z4CVHgz4i7vs
ZnBj4qtcBflIq+R6P2L5cywOY+rK6FGJSzbIKtezqV2LGz7Ho/eokuho4wwz2QYx
nkTBdC0tJ4KeeHz3pAlqbz47Hx9gasTa0fzszuHAAAddWa/+9YPUnXqnTWH9/B2g
mnFMiY4161Kt6WZ1kJhfGWm65C6TNRb5pVibaISaTYKUEKfe8FFAPWj4wem7f+Fs
AkDfosyZ26N5KRUPNZ0OuYHr3LrrF2oLawkwBe4WMChElEeROsDwI6XntTZrVL8R
Ew4lpBvdMOjD3JAvmUnZ1csPrpeTlg==
=g8y2
-----END PGP SIGNATURE-----

--2mOIVKUrHDzd1AkA--


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 12:14:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 12:14:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290196.492112 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTjae-0003Av-Pn; Mon, 14 Mar 2022 12:14:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290196.492112; Mon, 14 Mar 2022 12:14:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTjae-0003Ao-Ms; Mon, 14 Mar 2022 12:14:20 +0000
Received: by outflank-mailman (input) for mailman id 290196;
 Mon, 14 Mar 2022 12:14:19 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=MH4y=TZ=gmail.com=tamas.k.lengyel@srs-se1.protection.inumbo.net>)
 id 1nTjad-0003Ag-HV
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 12:14:19 +0000
Received: from mail-io1-xd35.google.com (mail-io1-xd35.google.com
 [2607:f8b0:4864:20::d35])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3f9b7bf2-a390-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 13:14:08 +0100 (CET)
Received: by mail-io1-xd35.google.com with SMTP id c23so17904866ioi.4
 for <xen-devel@lists.xenproject.org>; Mon, 14 Mar 2022 05:14:18 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3f9b7bf2-a390-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=XC9DAivyB6HxgtBw4YyJ36grCfwHFxWkSLJqL382uFk=;
        b=AxScWBRBNjaC8tfE6uRNd+KpApFB2Oa0yEnfcBRo+ryPWs192LCcg6TDYLwMLxNYwA
         pMmpr9vjoa7U8sVCnpEv/gKN1euPhthLwb02gWwWp6I5v37CgVHcuXr/hGrChKqpmSOQ
         fT2sjbvHWGZ+prcj8/TBYffKWTYOpM9nkGlxr8mv7vUsyYGvUyBEs7zivO4/uY+SiqoV
         K6UMEILq4tr6wE/M92nvqrwhqT9ukDv7rCXdAdT32MHcKX1zBhv6S+V2H4npy5nVSAv7
         HU7pKGLiw46B+f785nMlAfyWQp0DkKD6zjORdZOF7PZTEraGaHWUV8BaWHXQ3i40CPVG
         /+TA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=XC9DAivyB6HxgtBw4YyJ36grCfwHFxWkSLJqL382uFk=;
        b=XVTui8BYQ/t7ZECXOUCYqS/9mlCEH9/S3cA0H9CYzeJStU+XGf841wc0/eCK1y1cfj
         qXL8RPhFrXwf/f9WXqdVM4vEDbcIYOok4w9xBQEPoTjeonNaI1DcmCcFmn0ZIatsqCxQ
         KGzDeXODqfoP9Pm7NcA4pgQofZcj0l5+wtVHZdaicY1coYgUvwCwItyGjZs9zrZ6Rz8m
         Degmi2cY2f/h+fQvyWDdb0JTwpbKM11Y5v/x0DeAt5w8YB8fltBaHinJSBTb7xEYI8+c
         +hzSf/Uw41tVZxMhP4I+fp3CJ1ZiQPexMzdcsCRKHnRu1UuyEdWHbdRvpSBiTeciC2cB
         zPlg==
X-Gm-Message-State: AOAM533ibET1D9OCedA8kA6NInEMUAa5xb7qioN95OHTUsYt7hsLqKg1
	X3H2b9acIQyzxiLbD53ffLFfYL+mTGygB93wATNx28jj
X-Google-Smtp-Source: ABdhPJwAJpxaoHhpR0JrV1n7jlyVyCpSj8imONThALlzSZLvFpXEswbgHY2e9jDq0leaI/YU8YwjajdGUv99VngPL/w=
X-Received: by 2002:a05:6638:2402:b0:317:b520:62ba with SMTP id
 z2-20020a056638240200b00317b52062bamr20281932jat.238.1647260057315; Mon, 14
 Mar 2022 05:14:17 -0700 (PDT)
MIME-Version: 1.0
References: <05d0a5b5c18d667a5527e6f834347f54a10309da.1646937728.git.tamas.lengyel@intel.com>
 <BN9PR11MB5276E96E39209EDCCED5E9198C0F9@BN9PR11MB5276.namprd11.prod.outlook.com>
In-Reply-To: <BN9PR11MB5276E96E39209EDCCED5E9198C0F9@BN9PR11MB5276.namprd11.prod.outlook.com>
From: Tamas K Lengyel <tamas.k.lengyel@gmail.com>
Date: Mon, 14 Mar 2022 08:13:41 -0400
Message-ID: <CABfawhmZLyZdSbK0sr4t_WoYx6uYOV2bH89bX4ET0kzeQiY0-A@mail.gmail.com>
Subject: Re: [PATCH] x86/hvm: Include interruptibility state in hvm_hw_cpu
To: "Tian, Kevin" <kevin.tian@intel.com>
Cc: "Lengyel, Tamas" <tamas.lengyel@intel.com>, 
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "Beulich, Jan" <JBeulich@suse.com>, 
	"Cooper, Andrew" <andrew.cooper3@citrix.com>, =?UTF-8?Q?Pau_Monn=C3=A9=2C_Roger?= <roger.pau@citrix.com>, 
	Wei Liu <wl@xen.org>, "Nakajima, Jun" <jun.nakajima@intel.com>
Content-Type: text/plain; charset="UTF-8"

On Mon, Mar 14, 2022 at 3:22 AM Tian, Kevin <kevin.tian@intel.com> wrote:
>
> > From: Lengyel, Tamas <tamas.lengyel@intel.com>
> > Sent: Friday, March 11, 2022 2:45 AM
> >
> > During VM fork resetting a failed vmentry has been observed when the reset
> > is performed immediately after a STI instruction executed. This is due to
> > the guest interruptibility state in the VMCS being modified by STI but the
> > subsequent reset removes the IF bit from FLAGS, causing the failed vmentry.
>
> I didn't get the rationale here. Before this patch the interruptibility state is
> not saved/restored thus I suppose after reset it will be cleared thus aligned
> with RFLAGS.IF=0. Can you elaborate a bit how exactly above problem is
> caused?

The problem is that the interruptibility state is not cleared and thus
isn't aligned with RFLAGS.IF=0 after RFLAGS is reset. They go out of
sync leading to the failed vmentry. The interruptibility state needs
to be included in the hvm hw cpu struct for it to get re-aligned
during reset to avoid the failed vmentry.

>
> >
> > Include the interruptibility state information in the public hvm_hw_cpu struct
> > so that the CPU can be safely saved/restored.
> >
> > Signed-off-by: Tamas K Lengyel <tamas.lengyel@intel.com>
> > ---
> >  xen/arch/x86/hvm/hvm.c                 |  9 +++++----
> >  xen/arch/x86/hvm/vmx/vmx.c             |  4 ++++
> >  xen/arch/x86/include/asm/hvm/hvm.h     | 26
>
> Why is this change only applied to vmx instead of svm?

VM forking is implemented only for vmx, thus this change is only
relevant where a VM would be immediately reset after a STI
instruction. Normal VM save/restore/migration doesn't attempt to
capture a VM state immediately after STI thus it's not relevant for
SVM.

Tamas


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 12:17:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 12:17:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290200.492123 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTjdV-0003nr-7q; Mon, 14 Mar 2022 12:17:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290200.492123; Mon, 14 Mar 2022 12:17:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTjdV-0003nk-4t; Mon, 14 Mar 2022 12:17:17 +0000
Received: by outflank-mailman (input) for mailman id 290200;
 Mon, 14 Mar 2022 12:17:15 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTjdT-0003nX-CC; Mon, 14 Mar 2022 12:17:15 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTjdT-0003Wr-88; Mon, 14 Mar 2022 12:17:15 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTjdS-0003Ki-Ss; Mon, 14 Mar 2022 12:17:14 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTjdS-0000HH-ST; Mon, 14 Mar 2022 12:17:14 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=4VcZGUTynynw7cIfEdvRO3wafeUDkhV462kTFKcBzjs=; b=JKOi0dHOHnaqRHSjKg3x2T6E+S
	C7Oaoo+SwMB0Nmb3TKBGDgwJMTx4p80m6CH+Fk6Dx+ZqwFaIgNRmdLYBGR3tn5bV+PrXFDuZJPKTY
	+ZiO0m5fSOQI2zpZgN0Rxy2nVkRUFqrN4OzlosLn1lIPLTOfftZ3pqvaNXfBIDBoHMgs=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168577-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168577: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=2804fa912fa160e38e4ce7f537b6f6e1dcd5ee9d
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 14 Mar 2022 12:17:14 +0000

flight 168577 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168577/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              2804fa912fa160e38e4ce7f537b6f6e1dcd5ee9d
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  612 days
Failing since        151818  2020-07-11 04:18:52 Z  611 days  593 attempts
Testing same since   168522  2022-03-12 04:18:54 Z    2 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Haonan Wang <hnwanga1@gmail.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Martin Pitt <mpitt@debian.org>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 100900 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 12:31:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 12:31:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290208.492134 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTjr8-0006Is-Hm; Mon, 14 Mar 2022 12:31:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290208.492134; Mon, 14 Mar 2022 12:31:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTjr8-0006Il-Dx; Mon, 14 Mar 2022 12:31:22 +0000
Received: by outflank-mailman (input) for mailman id 290208;
 Mon, 14 Mar 2022 12:31:21 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=J1jB=TZ=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nTjr6-0006If-Mp
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 12:31:20 +0000
Received: from EUR01-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur01on0614.outbound.protection.outlook.com
 [2a01:111:f400:fe02::614])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 9f5763c5-a392-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 13:31:08 +0100 (CET)
Received: from AM5PR0601CA0035.eurprd06.prod.outlook.com
 (2603:10a6:203:68::21) by PAXPR08MB7368.eurprd08.prod.outlook.com
 (2603:10a6:102:22a::13) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26; Mon, 14 Mar
 2022 12:31:15 +0000
Received: from VE1EUR03FT013.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:203:68:cafe::fa) by AM5PR0601CA0035.outlook.office365.com
 (2603:10a6:203:68::21) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.23 via Frontend
 Transport; Mon, 14 Mar 2022 12:31:15 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT013.mail.protection.outlook.com (10.152.19.37) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Mon, 14 Mar 2022 12:31:15 +0000
Received: ("Tessian outbound 341d209a0e52:v113");
 Mon, 14 Mar 2022 12:31:14 +0000
Received: from f2084ae6d7d0.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 B7A8CD84-7F5C-46DD-9722-4B73DC07B0DF.1; 
 Mon, 14 Mar 2022 12:31:08 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id f2084ae6d7d0.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Mon, 14 Mar 2022 12:31:08 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by AM8PR08MB5651.eurprd08.prod.outlook.com (2603:10a6:20b:1c4::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.25; Mon, 14 Mar
 2022 12:31:06 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 12:31:06 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9f5763c5-a392-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=8bM1Gm+RvVmUA+1zyEjvmswn5Rv6KWFgmLnYkWdQqsU=;
 b=nx0mZeyxPLhzkswHe3cRCuyVxUKFH5+yXatz4RSQxQGtlNrL9Y/x8+w45lNgjMnc4qVERXuGWcUTS7XalnV56tBoe1X4gxEk0q9OTbw8qSqZFCKR8nEBGRpRvtAbTArsJ7Xw2WMYFHs3jkpQbL6YKA/1kKptTvLs/czsk6XmKhc=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: be4e28bf5fc133e4
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=KcvYXCJx6ewEwJI+74QGa/Yvt2ddw5Qh6ThrmpVTF81mvdYAsZTx/5oCpGEtbOwKCqV9h6vn2DIHqD3LtpoES0qKz4uayMewmyCVglQO9OO1kzggLziKnETNyqgV1gB3F4naU2rXXqs5bJ9iVvB9NqKCNJZSuRCdkxF06dRg15WzBWc3MoWowfn258SLHrTBO93Bol1y1rZY5njxkZanjrBgXP4mLpWDMcY76XylYQ1mbbvHZ6kYEDD36iw/EQ3iqHShzjdv4gRuHgISGEG2Sfk+lOKPd5rWRdk9oOqw1kZw6jVZmo8a7OwoJ79+mba/IoK80d2T1BKnxkHs/TuqCA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=8bM1Gm+RvVmUA+1zyEjvmswn5Rv6KWFgmLnYkWdQqsU=;
 b=CAxLmuflo/s3NxfZUlU97AnKWMdr+HC7Cn3Z5I5EXjBsFThupBzLoJFvy/mATDIcRO2mJkaVOPG6UJJnVgj9kAGFPjBqiIVt+P8+UZJPRpw8RyhZvLUKWWXnt9Ynq/zRjxJqZlrhgOXgspXumsAKKf2f50uNlHfIjhi9ICuCSo5B1CfSwrWpqNRNs55TCK5rV/mAZ6JtCsGqltyeB+N4NZTIjFTmVc9fD4DRLBEhRCyiSP80dVIEIeR5qWrYh7oPdWnj4JY/VrHXYXglh0o28uF6RKJNwJKxmjAutBo1HOz7qPBXuvTo2N4AUEKcwP73mNpskb8b3mzobimpsUx34w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=8bM1Gm+RvVmUA+1zyEjvmswn5Rv6KWFgmLnYkWdQqsU=;
 b=nx0mZeyxPLhzkswHe3cRCuyVxUKFH5+yXatz4RSQxQGtlNrL9Y/x8+w45lNgjMnc4qVERXuGWcUTS7XalnV56tBoe1X4gxEk0q9OTbw8qSqZFCKR8nEBGRpRvtAbTArsJ7Xw2WMYFHs3jkpQbL6YKA/1kKptTvLs/czsk6XmKhc=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Vikram Garhwal <fnu.vikram@xilinx.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, "sstabellini@kernel.org"
	<sstabellini@kernel.org>, "julien@xen.org" <julien@xen.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, "volodymyr_babchuk@epam.com"
	<volodymyr_babchuk@epam.com>
Subject: Re: [XEN][RFC PATCH v3 01/14] xen/arm/device: Remove __init from
 function type
Thread-Topic: [XEN][RFC PATCH v3 01/14] xen/arm/device: Remove __init from
 function type
Thread-Index: AQHYMyVyyZZSb95l5UaUheP8eaC2Lqy+2HMA
Date: Mon, 14 Mar 2022 12:31:06 +0000
Message-ID: <337CEFA8-895C-4B5D-810A-3D4E2927CE01@arm.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
 <20220308194704.14061-2-fnu.vikram@xilinx.com>
In-Reply-To: <20220308194704.14061-2-fnu.vikram@xilinx.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: acdfd66e-74b9-4a09-f31f-08da05b68824
x-ms-traffictypediagnostic:
	AM8PR08MB5651:EE_|VE1EUR03FT013:EE_|PAXPR08MB7368:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR08MB73687FB6740A5E5993E83E3CE40F9@PAXPR08MB7368.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 A+iTgmO+271BaShS2PBYBX7YVHCXncyM/A96mTuLz/eQiu4LtBJDxlZgNN97L3rXGrw0e/aalm2S8lsPazDUz1FKrKPAIkTIGOmCp2TDUZzHK1zobV2YsjEl3C6/WKL/GJEXv18QJTk5nGDEdEKte4OrGClQwuQKgRSaiUej6aOoUAMYf3z0kty1/wn7S+EB9DNkUYvcgRkbdw8F4YycDaP3LSj5oSlt6lPJGUvtRy9hwEKg6vqVaJxbAB6hEIC8tBQjFiXwDJzp0xc+EfCg4t2GYGX/BLeOvJ4/nIVi1QzcZKzW9urDrwZF2uy3CAm8MpGkzYMNT046ikOR0r0VkBjuUwU0YmmJ/dEsDK+v25nFgNncZNNZkoxbFDSJu9k6jyJLUBrb3582r+3ZsYaz1NU8CIrSTAXbeZvgvyTBoQw3ZGUdSxCeH5qovJcLv7sfus89Y3Nv8/LROHZu6JUzNjp56Hb9cvA46NsangXePqpOl2HwYv1rJol1MA8qccUMEGenwYBGiGq/zikiCENLnmQsl0EExpaKys/KVpHwKOKqJYSSapJ+jlqDYPi5+1joCr9J3DNB/Sqvp8oxT9gsbHa8ydr7hSzlafmfIc+SuzmkYEGNvjGfYS9/W7k1+My/zg1ke36CdHAAjgmxBWmimjEn5pb/X+0P5bTwc+XWtTx+Qe2WXUR/7JViaQh1k6XVlykkNbTYO/gFbaWO5Vz96MOh0cbi1LDhrCTAqpSdkyKkpUbbHqzha1mI8LImqHck
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(86362001)(122000001)(33656002)(2616005)(38070700005)(6916009)(5660300002)(6512007)(6506007)(6486002)(8936002)(83380400001)(316002)(54906003)(36756003)(186003)(26005)(30864003)(4326008)(76116006)(66946007)(53546011)(2906002)(91956017)(8676002)(66446008)(66556008)(38100700002)(64756008)(66476007)(71200400001)(508600001)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <5F167E6048F8BA41BC9150F2DF55C6C4@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM8PR08MB5651
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT013.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	a0e9e64a-8add-4626-70f2-08da05b682bb
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(30864003)(47076005)(2906002)(508600001)(40460700003)(5660300002)(36860700001)(8936002)(36756003)(83380400001)(336012)(86362001)(6486002)(54906003)(33656002)(316002)(107886003)(26005)(186003)(82310400004)(81166007)(6512007)(6506007)(8676002)(4326008)(6862004)(70586007)(70206006)(2616005)(356005)(53546011);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 12:31:15.1249
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: acdfd66e-74b9-4a09-f31f-08da05b68824
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT013.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB7368



> On 8 Mar 2022, at 19:46, Vikram Garhwal <fnu.vikram@xilinx.com> wrote:
>=20
> Change function type of following function to access during runtime:
>    1. map_irq_to_domain()
>    2. handle_device_interrupt()
>    3. map_range_to_domain()
>    4. unflatten_dt_node()
>    5. unflatten_device_tree()
>=20
> Move map_irq_to_domain(), handle_device_interrupt() and map_range_to_doma=
in() to
> device.c.
>=20
> These changes are done to support the dynamic programming of a nodes wher=
e an
> overlay node will be added to fdt and unflattened node will be added to d=
t_host.
> Furthermore, IRQ and mmio mapping will be done for the added node.
>=20
> Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com>
> ---
> xen/arch/arm/device.c            | 136 +++++++++++++++++++++++++++++
> xen/arch/arm/domain_build.c      | 142 -------------------------------
> xen/arch/arm/include/asm/setup.h |   3 +
> xen/common/device_tree.c         |  20 ++---
> xen/include/xen/device_tree.h    |   5 ++
> 5 files changed, 154 insertions(+), 152 deletions(-)
>=20
> diff --git a/xen/arch/arm/device.c b/xen/arch/arm/device.c
> index 70cd6c1a19..0dfd33b33e 100644
> --- a/xen/arch/arm/device.c
> +++ b/xen/arch/arm/device.c
> @@ -21,6 +21,9 @@
> #include <xen/errno.h>
> #include <xen/init.h>
> #include <xen/lib.h>
> +#include <xen/iocap.h>
> +#include <asm/domain_build.h>
> +#include <asm/setup.h>
>=20
> extern const struct device_desc _sdevice[], _edevice[];
> extern const struct acpi_device_desc _asdevice[], _aedevice[];
> @@ -84,6 +87,139 @@ enum device_class device_get_class(const struct dt_de=
vice_node *dev)
>     return DEVICE_UNKNOWN;
> }
>=20
> +int map_irq_to_domain(struct domain *d, unsigned int irq,
> +                      bool need_mapping, const char *devname)
> +{
> +    int res;
> +
> +    res =3D irq_permit_access(d, irq);
> +    if ( res )
> +    {
> +        printk(XENLOG_ERR "Unable to permit to dom%u access to IRQ %u\n"=
,
> +               d->domain_id, irq);
> +        return res;
> +    }
> +
> +    if ( need_mapping )
> +    {
> +        /*
> +         * Checking the return of vgic_reserve_virq is not
> +         * necessary. It should not fail except when we try to map
> +         * the IRQ twice. This can legitimately happen if the IRQ is sha=
red
> +         */
> +        vgic_reserve_virq(d, irq);
> +
> +        res =3D route_irq_to_guest(d, irq, irq, devname);
> +        if ( res < 0 )
> +        {
> +            printk(XENLOG_ERR "Unable to map IRQ%"PRId32" to dom%d\n",
> +                   irq, d->domain_id);
> +            return res;
> +        }
> +    }
> +
> +    dt_dprintk("  - IRQ: %u\n", irq);
> +    return 0;
> +}
> +
> +int map_range_to_domain(const struct dt_device_node *dev,
> +                        u64 addr, u64 len, void *data)
> +{
> +    struct map_range_data *mr_data =3D data;
> +    struct domain *d =3D mr_data->d;
> +    int res;
> +
> +    res =3D iomem_permit_access(d, paddr_to_pfn(addr),
> +            paddr_to_pfn(PAGE_ALIGN(addr + len - 1)));

Hi Vikram,

Why the if ( strncasecmp(dt_node_full_name(dev), "/reserved-memory/",
strlen("/reserved-memory/")) !=3D 0 ) was dropped?


> +    if ( res )
> +    {
> +        printk(XENLOG_ERR "Unable to permit to dom%d access to"
> +                " 0x%"PRIx64" - 0x%"PRIx64"\n",
> +                d->domain_id,
> +                addr & PAGE_MASK, PAGE_ALIGN(addr + len) - 1);
> +        return res;
> +    }
> +
> +    if ( !mr_data->skip_mapping )
> +    {
> +        res =3D map_regions_p2mt(d,
> +                               gaddr_to_gfn(addr),
> +                               PFN_UP(len),
> +                               maddr_to_mfn(addr),
> +                               mr_data->p2mt);
> +
> +        if ( res < 0 )
> +        {
> +            printk(XENLOG_ERR "Unable to map 0x%"PRIx64
> +                   " - 0x%"PRIx64" in domain %d\n",
> +                   addr & PAGE_MASK, PAGE_ALIGN(addr + len) - 1,
> +                   d->domain_id);
> +            return res;
> +        }
> +    }
> +
> +    dt_dprintk("  - MMIO: %010"PRIx64" - %010"PRIx64" P2MType=3D%x\n",
> +               addr, addr + len, mr_data->p2mt);
> +
> +    return 0;
> +}
> +
> +/*
> + * handle_device_interrupts retrieves the interrupts configuration from
> + * a device tree node and maps those interrupts to the target domain.
> + *
> + * Returns:
> + *   < 0 error
> + *   0   success
> + */
> +int handle_device_interrupts(struct domain *d,
> +                             struct dt_device_node *dev,
> +                             bool need_mapping)
> +{
> +    unsigned int i, nirq;
> +    int res;
> +    struct dt_raw_irq rirq;
> +
> +    nirq =3D dt_number_of_irq(dev);
> +
> +    /* Give permission and map IRQs */
> +    for ( i =3D 0; i < nirq; i++ )
> +    {
> +        res =3D dt_device_get_raw_irq(dev, i, &rirq);
> +        if ( res )
> +        {
> +            printk(XENLOG_ERR "Unable to retrieve irq %u for %s\n",
> +                   i, dt_node_full_name(dev));
> +            return res;
> +        }
> +
> +        /*
> +         * Don't map IRQ that have no physical meaning
> +         * ie: IRQ whose controller is not the GIC
> +         */
> +        if ( rirq.controller !=3D dt_interrupt_controller )
> +        {
> +            dt_dprintk("irq %u not connected to primary controller. Conn=
ected to %s\n",
> +                      i, dt_node_full_name(rirq.controller));
> +            continue;
> +        }
> +
> +        res =3D platform_get_irq(dev, i);
> +        if ( res < 0 )
> +        {
> +            printk(XENLOG_ERR "Unable to get irq %u for %s\n",
> +                   i, dt_node_full_name(dev));
> +            return res;
> +        }
> +
> +        res =3D map_irq_to_domain(d, res, need_mapping, dt_node_name(dev=
));
> +        if ( res )
> +            return res;
> +    }
> +
> +    return 0;
> +}
> +
> /*
>  * Local variables:
>  * mode: C
> diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
> index 8be01678de..b06770a2af 100644
> --- a/xen/arch/arm/domain_build.c
> +++ b/xen/arch/arm/domain_build.c
> @@ -1794,41 +1794,6 @@ int __init make_chosen_node(const struct kernel_in=
fo *kinfo)
>     return res;
> }
>=20
> -int __init map_irq_to_domain(struct domain *d, unsigned int irq,
> -                             bool need_mapping, const char *devname)
> -{
> -    int res;
> -
> -    res =3D irq_permit_access(d, irq);
> -    if ( res )
> -    {
> -        printk(XENLOG_ERR "Unable to permit to dom%u access to IRQ %u\n"=
,
> -               d->domain_id, irq);
> -        return res;
> -    }
> -
> -    if ( need_mapping )
> -    {
> -        /*
> -         * Checking the return of vgic_reserve_virq is not
> -         * necessary. It should not fail except when we try to map
> -         * the IRQ twice. This can legitimately happen if the IRQ is sha=
red
> -         */
> -        vgic_reserve_virq(d, irq);
> -
> -        res =3D route_irq_to_guest(d, irq, irq, devname);
> -        if ( res < 0 )
> -        {
> -            printk(XENLOG_ERR "Unable to map IRQ%"PRId32" to dom%d\n",
> -                   irq, d->domain_id);
> -            return res;
> -        }
> -    }
> -
> -    dt_dprintk("  - IRQ: %u\n", irq);
> -    return 0;
> -}
> -
> static int __init map_dt_irq_to_domain(const struct dt_device_node *dev,
>                                        const struct dt_irq *dt_irq,
>                                        void *data)
> @@ -1860,57 +1825,6 @@ static int __init map_dt_irq_to_domain(const struc=
t dt_device_node *dev,
>     return 0;
> }
>=20
> -int __init map_range_to_domain(const struct dt_device_node *dev,
> -                               u64 addr, u64 len, void *data)
> -{
> -    struct map_range_data *mr_data =3D data;
> -    struct domain *d =3D mr_data->d;
> -    int res;
> -
> -    /*
> -     * reserved-memory regions are RAM carved out for a special purpose.
> -     * They are not MMIO and therefore a domain should not be able to
> -     * manage them via the IOMEM interface.
> -     */
> -    if ( strncasecmp(dt_node_full_name(dev), "/reserved-memory/",
> -                     strlen("/reserved-memory/")) !=3D 0 )
> -    {
> -        res =3D iomem_permit_access(d, paddr_to_pfn(addr),
> -                paddr_to_pfn(PAGE_ALIGN(addr + len - 1)));
> -        if ( res )
> -        {
> -            printk(XENLOG_ERR "Unable to permit to dom%d access to"
> -                    " 0x%"PRIx64" - 0x%"PRIx64"\n",
> -                    d->domain_id,
> -                    addr & PAGE_MASK, PAGE_ALIGN(addr + len) - 1);
> -            return res;
> -        }
> -    }
> -
> -    if ( !mr_data->skip_mapping )
> -    {
> -        res =3D map_regions_p2mt(d,
> -                               gaddr_to_gfn(addr),
> -                               PFN_UP(len),
> -                               maddr_to_mfn(addr),
> -                               mr_data->p2mt);
> -
> -        if ( res < 0 )
> -        {
> -            printk(XENLOG_ERR "Unable to map 0x%"PRIx64
> -                   " - 0x%"PRIx64" in domain %d\n",
> -                   addr & PAGE_MASK, PAGE_ALIGN(addr + len) - 1,
> -                   d->domain_id);
> -            return res;
> -        }
> -    }
> -
> -    dt_dprintk("  - MMIO: %010"PRIx64" - %010"PRIx64" P2MType=3D%x\n",
> -               addr, addr + len, mr_data->p2mt);
> -
> -    return 0;
> -}
> -
> /*
>  * For a node which describes a discoverable bus (such as a PCI bus)
>  * then we may need to perform additional mappings in order to make
> @@ -1938,62 +1852,6 @@ static int __init map_device_children(const struct=
 dt_device_node *dev,
>     return 0;
> }
>=20
> -/*
> - * handle_device_interrupts retrieves the interrupts configuration from
> - * a device tree node and maps those interrupts to the target domain.
> - *
> - * Returns:
> - *   < 0 error
> - *   0   success
> - */
> -static int __init handle_device_interrupts(struct domain *d,
> -                                           struct dt_device_node *dev,
> -                                           bool need_mapping)
> -{
> -    unsigned int i, nirq;
> -    int res;
> -    struct dt_raw_irq rirq;
> -
> -    nirq =3D dt_number_of_irq(dev);
> -
> -    /* Give permission and map IRQs */
> -    for ( i =3D 0; i < nirq; i++ )
> -    {
> -        res =3D dt_device_get_raw_irq(dev, i, &rirq);
> -        if ( res )
> -        {
> -            printk(XENLOG_ERR "Unable to retrieve irq %u for %s\n",
> -                   i, dt_node_full_name(dev));
> -            return res;
> -        }
> -
> -        /*
> -         * Don't map IRQ that have no physical meaning
> -         * ie: IRQ whose controller is not the GIC
> -         */
> -        if ( rirq.controller !=3D dt_interrupt_controller )
> -        {
> -            dt_dprintk("irq %u not connected to primary controller. Conn=
ected to %s\n",
> -                      i, dt_node_full_name(rirq.controller));
> -            continue;
> -        }
> -
> -        res =3D platform_get_irq(dev, i);
> -        if ( res < 0 )
> -        {
> -            printk(XENLOG_ERR "Unable to get irq %u for %s\n",
> -                   i, dt_node_full_name(dev));
> -            return res;
> -        }
> -
> -        res =3D map_irq_to_domain(d, res, need_mapping, dt_node_name(dev=
));
> -        if ( res )
> -            return res;
> -    }
> -
> -    return 0;
> -}
> -
> /*
>  * For a given device node:
>  *  - Give permission to the guest to manage IRQ and MMIO range
> diff --git a/xen/arch/arm/include/asm/setup.h b/xen/arch/arm/include/asm/=
setup.h
> index 7a1e1d6798..8a26f1845c 100644
> --- a/xen/arch/arm/include/asm/setup.h
> +++ b/xen/arch/arm/include/asm/setup.h
> @@ -134,6 +134,9 @@ void device_tree_get_reg(const __be32 **cell, u32 add=
ress_cells,
> u32 device_tree_get_u32(const void *fdt, int node,
>                         const char *prop_name, u32 dflt);
>=20
> +int handle_device_interrupts(struct domain *d, struct dt_device_node *de=
v,
> +                             bool need_mapping);
> +
> int map_range_to_domain(const struct dt_device_node *dev,
>                         u64 addr, u64 len, void *data);
>=20
> diff --git a/xen/common/device_tree.c b/xen/common/device_tree.c
> index 4aae281e89..f43d66a501 100644
> --- a/xen/common/device_tree.c
> +++ b/xen/common/device_tree.c
> @@ -1811,12 +1811,12 @@ int dt_count_phandle_with_args(const struct dt_de=
vice_node *np,
>  * @allnextpp: pointer to ->allnext from last allocated device_node
>  * @fpsize: Size of the node path up at the current depth.
>  */
> -static unsigned long __init unflatten_dt_node(const void *fdt,
> -                                              unsigned long mem,
> -                                              unsigned long *p,
> -                                              struct dt_device_node *dad=
,
> -                                              struct dt_device_node ***a=
llnextpp,
> -                                              unsigned long fpsize)
> +static unsigned long unflatten_dt_node(const void *fdt,
> +                                       unsigned long mem,
> +                                       unsigned long *p,
> +                                       struct dt_device_node *dad,
> +                                       struct dt_device_node ***allnextp=
p,
> +                                       unsigned long fpsize)
> {
>     struct dt_device_node *np;
>     struct dt_property *pp, **prev_pp =3D NULL;
> @@ -2047,7 +2047,7 @@ static unsigned long __init unflatten_dt_node(const=
 void *fdt,
> }
>=20
> /**
> - * __unflatten_device_tree - create tree of device_nodes from flat blob
> + * unflatten_device_tree - create tree of device_nodes from flat blob
>  *
>  * unflattens a device-tree, creating the
>  * tree of struct device_node. It also fills the "name" and "type"
> @@ -2056,8 +2056,8 @@ static unsigned long __init unflatten_dt_node(const=
 void *fdt,
>  * @fdt: The fdt to expand
>  * @mynodes: The device_node tree created by the call
>  */
> -static void __init __unflatten_device_tree(const void *fdt,
> -                                           struct dt_device_node **mynod=
es)
> +void unflatten_device_tree(const void *fdt,
> +                           struct dt_device_node **mynodes)
> {
>     unsigned long start, mem, size;
>     struct dt_device_node **allnextp =3D mynodes;
> @@ -2179,7 +2179,7 @@ dt_find_interrupt_controller(const struct dt_device=
_match *matches)
>=20
> void __init dt_unflatten_host_device_tree(void)
> {
> -    __unflatten_device_tree(device_tree_flattened, &dt_host);
> +    unflatten_device_tree(device_tree_flattened, &dt_host);
>     dt_alias_scan();
> }
>=20
> diff --git a/xen/include/xen/device_tree.h b/xen/include/xen/device_tree.=
h
> index fd6cd00b43..06d7866c10 100644
> --- a/xen/include/xen/device_tree.h
> +++ b/xen/include/xen/device_tree.h
> @@ -177,6 +177,11 @@ int device_tree_for_each_node(const void *fdt, int n=
ode,
>  */
> void dt_unflatten_host_device_tree(void);
>=20
> +/*
> + * unflatten any device tree.
> + */
> +void unflatten_device_tree(const void *fdt, struct dt_device_node **myno=
des);
> +
> /**
>  * IRQ translation callback
>  * TODO: For the moment we assume that we only have ONE

NIT: there are some minor code style issues, like indentation that could be=
 fixed

Cheers,
Luca



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 12:33:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 12:33:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290214.492144 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTjta-0006yD-2p; Mon, 14 Mar 2022 12:33:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290214.492144; Mon, 14 Mar 2022 12:33:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTjtZ-0006y6-Vt; Mon, 14 Mar 2022 12:33:53 +0000
Received: by outflank-mailman (input) for mailman id 290214;
 Mon, 14 Mar 2022 12:33:53 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTjtZ-0006xw-64; Mon, 14 Mar 2022 12:33:53 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTjtY-0003oB-U6; Mon, 14 Mar 2022 12:33:52 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTjtY-0003hV-Ho; Mon, 14 Mar 2022 12:33:52 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTjtY-0004yg-HO; Mon, 14 Mar 2022 12:33:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Iq8PgS5IPOD7CSDvjWMpyd/fwPsWi0sjEIFpzChz+IU=; b=4MmST0DDeeD6kEf4XZqVtT2SHW
	2/ed64kQjzDZg3w5cE0Qm06LCB4xYNwMUgA9HfwKDPJXPJgNW7NfBt88aFb4mYAFwauQQfymabjC+
	JgH7D1i8idMJUj+AoUrf0AXD6A60frgzm8JTes3RYUxcOLpCnupFZwUM88LAEizCn93Q=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168575-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168575: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl-shadow:guest-start/debian.repeat:fail:heisenbug
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:guest-start.2:fail:heisenbug
    linux-linus:test-armhf-armhf-xl-rtds:guest-stop:fail:allowable
    linux-linus:test-amd64-amd64-xl-xsm:guest-start/debian.repeat:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=09688c0166e76ce2fb85e86b9d99be8b0084cdf9
X-Osstest-Versions-That:
    linux=f0e18b03fcafd8344539101f564ae358950ae892
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 14 Mar 2022 12:33:52 +0000

flight 168575 linux-linus real [real]
flight 168582 linux-linus real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168575/
http://logs.test-lab.xenproject.org/osstest/logs/168582/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-shadow 22 guest-start/debian.repeat fail pass in 168582-retest
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 19 guest-start.2 fail pass in 168582-retest

Regressions which are regarded as allowable (not blocking):
 test-armhf-armhf-xl-rtds     17 guest-stop               fail REGR. vs. 168563

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-xsm      22 guest-start/debian.repeat    fail  like 168563
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168563
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168563
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168563
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168563
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168563
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168563
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168563
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168563
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                09688c0166e76ce2fb85e86b9d99be8b0084cdf9
baseline version:
 linux                f0e18b03fcafd8344539101f564ae358950ae892

Last test of basis   168563  2022-03-13 19:10:54 Z    0 days
Testing same since   168575  2022-03-14 03:07:00 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Linus Torvalds <torvalds@linux-foundation.org>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           fail    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      fail    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   fail    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   f0e18b03fcaf..09688c0166e7  09688c0166e76ce2fb85e86b9d99be8b0084cdf9 -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 12:37:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 12:37:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290222.492156 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTjxO-0007e4-KD; Mon, 14 Mar 2022 12:37:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290222.492156; Mon, 14 Mar 2022 12:37:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTjxO-0007dx-H8; Mon, 14 Mar 2022 12:37:50 +0000
Received: by outflank-mailman (input) for mailman id 290222;
 Mon, 14 Mar 2022 12:37:49 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTjxN-0007dn-3A; Mon, 14 Mar 2022 12:37:49 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTjxN-0003sk-2L; Mon, 14 Mar 2022 12:37:49 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTjxM-0003nH-OD; Mon, 14 Mar 2022 12:37:48 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTjxM-0002Ig-Nk; Mon, 14 Mar 2022 12:37:48 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=0IG1hzNBEE0T1uXXdsOKjznk6BSMUKSVDgTzQ11SZC8=; b=YxDJ2oUZRJvSwRGobSakvodv/O
	tQCyLgdfRV4STkcuScOwaE2AVuTevTLU46Oa4EkLVG13IdoVXQHcszo+kTx2FYXJQsKUpk4M+ZcM3
	8ZQ3tlod6zazxpUxUciRTbhCUdoTVMWlIYItv3SxKJvxk5lMxSNDEjAmIHawE9rBBoH4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168583-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168583: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=a13dfc769bd7097d8d9ffe3e029a2c1d062d712b
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 14 Mar 2022 12:37:48 +0000

flight 168583 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168583/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 a13dfc769bd7097d8d9ffe3e029a2c1d062d712b
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   14 days
Failing since        168258  2022-03-01 01:55:31 Z   13 days  132 attempts
Testing same since   168579  2022-03-14 08:41:36 Z    0 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 629 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 12:42:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 12:42:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290230.492167 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTk1p-0000jy-78; Mon, 14 Mar 2022 12:42:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290230.492167; Mon, 14 Mar 2022 12:42:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTk1p-0000jr-4I; Mon, 14 Mar 2022 12:42:25 +0000
Received: by outflank-mailman (input) for mailman id 290230;
 Mon, 14 Mar 2022 12:42:23 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=J1jB=TZ=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nTk1n-0000jl-9j
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 12:42:23 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05on20607.outbound.protection.outlook.com
 [2a01:111:f400:7e1a::607])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 30ea24d1-a394-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 13:42:21 +0100 (CET)
Received: from AM6PR08CA0017.eurprd08.prod.outlook.com (2603:10a6:20b:b2::29)
 by HE1PR0801MB2042.eurprd08.prod.outlook.com (2603:10a6:3:51::17)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Mon, 14 Mar
 2022 12:42:18 +0000
Received: from VE1EUR03FT058.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:b2:cafe::66) by AM6PR08CA0017.outlook.office365.com
 (2603:10a6:20b:b2::29) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.20 via Frontend
 Transport; Mon, 14 Mar 2022 12:42:18 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT058.mail.protection.outlook.com (10.152.19.86) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Mon, 14 Mar 2022 12:42:17 +0000
Received: ("Tessian outbound 63bb5eb69ee8:v113");
 Mon, 14 Mar 2022 12:42:17 +0000
Received: from ad008974ef6b.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 0018B616-153F-4635-AE9F-A077899014BA.1; 
 Mon, 14 Mar 2022 12:42:06 +0000
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id ad008974ef6b.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Mon, 14 Mar 2022 12:42:06 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by DB6PR0801MB1846.eurprd08.prod.outlook.com (2603:10a6:4:35::23)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Mon, 14 Mar
 2022 12:42:03 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 12:42:03 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 30ea24d1-a394-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=QHcdCaGd8oyPvXE0Sr7we+zDitMGndsC7EB/+CgeQgI=;
 b=vOfaMG5LqmHWXcwy71Em1k4dcZW/DURrNuFCIQrHTW6btOG8uYNBFyvQkjfqXW71NrmCnwokcPKpT9+Ffgre+S1iabukyJuwIwbRNceg7RRzCYXveaiL9Ef8wCM0BaOm2t4MYRcPC8mtnW4fzXAZfkqo7YUeC2WbnayfIpgs+2o=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: bb53414a3438cfdd
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=OMFJFx3ys93fJquTK3J2sNzgzRVDRj2LQLcWdLF6v9NeUG+O0cUDrr3wPPDTH2Oj6VqugMRxhlDSEPX8y8Wz4cFbO37j8sJymppn7JGtLI95PlCiY/5+qOdyT3zhRLpF2jadr8aON3kYFy0i3eMicDJlvAeiZFocP0uzCO4O5TyBjiDJe6mlB3rcgIh/quc+mkZmbaAknQpY7d8F8VeCROIzKLsYfwXT5Evd2p1Bggug8fUCSHuL/7gFp/rPxtFTX31LWdYv1YP36zapS1JVgAP/ycNaZnPtveNR0C/bCQNhfjLkHmbwl7SiOfwy3mvmCP+HqQ0WQGAnLZ645sKgnA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=QHcdCaGd8oyPvXE0Sr7we+zDitMGndsC7EB/+CgeQgI=;
 b=CpTIvRPZIruheVyGsj73VFuZBVUE3XDMjVCwBXCyRUrMGTcO5DcID/1MtmzAvU4X3z5VaW7LGRIaXsIzoh3V8sEL/TxGU+WxxzQMqqbi1h/O+TCyNO1/Ys/crlhvG77T9K6QBwi8KFG2R3kG8sEqE54sJCz/GSCDyyEzOt1v/oEWxMz5x8Ahc2qvlXKgrFfsk9plqlG3VDyc14yhkGUnqdrBjoeIFaQaU5I2kuiV+iqnzZoDWzeRk2lyThGtAsMqm/kUI3+WQIy6m0HzOI82InHVJBeA8GG4f2lmfV63UgChBj5M1fUyq84KNUV+genmwaqYocmGPS/0rSqFhBKMfw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=QHcdCaGd8oyPvXE0Sr7we+zDitMGndsC7EB/+CgeQgI=;
 b=vOfaMG5LqmHWXcwy71Em1k4dcZW/DURrNuFCIQrHTW6btOG8uYNBFyvQkjfqXW71NrmCnwokcPKpT9+Ffgre+S1iabukyJuwIwbRNceg7RRzCYXveaiL9Ef8wCM0BaOm2t4MYRcPC8mtnW4fzXAZfkqo7YUeC2WbnayfIpgs+2o=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Vikram Garhwal <fnu.vikram@xilinx.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, "sstabellini@kernel.org"
	<sstabellini@kernel.org>, "julien@xen.org" <julien@xen.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, "volodymyr_babchuk@epam.com"
	<volodymyr_babchuk@epam.com>
Subject: Re: [XEN][RFC PATCH v3 02/14] xen/arm: Add CONFIG_OVERLAY_DTB
Thread-Topic: [XEN][RFC PATCH v3 02/14] xen/arm: Add CONFIG_OVERLAY_DTB
Thread-Index: AQHYMyVkQjjiWQv/5kKMcBJgNYO1iqy+24MA
Date: Mon, 14 Mar 2022 12:42:03 +0000
Message-ID: <80BF9536-1FFE-413E-90A9-FA4CF0A86FF2@arm.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
 <20220308194704.14061-3-fnu.vikram@xilinx.com>
In-Reply-To: <20220308194704.14061-3-fnu.vikram@xilinx.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: f697b9f0-d3d8-4de4-28d4-08da05b812e5
x-ms-traffictypediagnostic:
	DB6PR0801MB1846:EE_|VE1EUR03FT058:EE_|HE1PR0801MB2042:EE_
X-Microsoft-Antispam-PRVS:
	<HE1PR0801MB204295601AF3E8B7865BA3C6E40F9@HE1PR0801MB2042.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 yd2w1pDs6bkp/bvYTcX/d6lE2qfp8HmD/fBxtwtLMkg3JWZkgYKw0nrr58ySth7YkVOZaTso4lWccDmoz82ZgjSOUtt4qc9JWmB4ZPi8YXyWSZMMMwvRzzZGt0sXIRFVHfCjPHNOJOnwVf7RCOO0ljLQIjeaFSTfNUYFs+TxLUrbzUhhg8/vwEuykHjuWgC0k5AftXJo8kPtjYp16+giOKlKQ+S1UhJS3uaX4hjTc36jU2MfHTV/XccFRofIxzPSewyiK2VUr0MiA0YVUwNgdOelfeccEfcQIOuCdbJTqcQZ6s6NyEvcSLotOhFAtRDK7q9x1pfof86+uBR4NMRHRRN94qUhTMz/Uo+xTXGksSioruwNIr6LsAPgBogyWBKHa41lINYQpcxBU6dn35zyZ9IN6hAfNTo2yg9jNcNH3a5nR4/8v3PVNav4VnXEqHSGyx/5EkHBj4/0w42SLQdZ6TSKOn1pCTDp+H9V2/xNz6QSXAfIQRhnyTG9j37VeXXPgMqtf5LUtuSRjYW3b3P79T92BMtyGSgKCFfzKOGD/kpZNHZMGZnTpwt40u5HgMGlU2rag1uZ1Jc7bo+vOT8wWgqHTiiA5agdgmDP8aM73GRK0dA7GgF8VA14/yXoibvH0RjJUkYqO8CPCTzLnACRDJQKWEDmZDNPOXGOeJ0FA88tT0fHgA7NAhVf+7xkBsstuopt3drANhhklwRVII7GM/Yo6OHLXPhGP+2Yd83RRqs700/qpmvmMPu3/nY+XOGn
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(4326008)(54906003)(6916009)(6512007)(316002)(122000001)(6506007)(53546011)(38100700002)(76116006)(64756008)(8676002)(6486002)(66446008)(91956017)(33656002)(66946007)(66556008)(66476007)(508600001)(71200400001)(86362001)(5660300002)(8936002)(36756003)(26005)(2616005)(2906002)(186003)(38070700005)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <61B24A84003FEC499B346E55E0E2CCC6@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0801MB1846
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT058.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	e7dfe598-1c22-49f9-c2f4-08da05b80a91
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(316002)(2906002)(86362001)(36860700001)(40460700003)(47076005)(4326008)(6862004)(8676002)(82310400004)(107886003)(70206006)(70586007)(6506007)(53546011)(508600001)(8936002)(2616005)(356005)(6512007)(54906003)(336012)(6486002)(36756003)(33656002)(26005)(5660300002)(186003)(81166007);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 12:42:17.4538
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: f697b9f0-d3d8-4de4-28d4-08da05b812e5
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT058.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0801MB2042
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From xen-devel-bounces@lists.xenproject.org Mon Mar 14 13:05:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 13:05:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290236.492178 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTkO2-0003Tl-68; Mon, 14 Mar 2022 13:05:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290236.492178; Mon, 14 Mar 2022 13:05:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTkO2-0003Te-3E; Mon, 14 Mar 2022 13:05:22 +0000
Received: by outflank-mailman (input) for mailman id 290236;
 Mon, 14 Mar 2022 13:05:20 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=ga0j=TZ=aim.com=brchuckz@srs-se1.protection.inumbo.net>)
 id 1nTkO0-0003TY-P4
 for xen-devel@lists.xen.org; Mon, 14 Mar 2022 13:05:20 +0000
Received: from sonic312-23.consmr.mail.gq1.yahoo.com
 (sonic312-23.consmr.mail.gq1.yahoo.com [98.137.69.204])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 649bcbea-a397-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 14:05:18 +0100 (CET)
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic312.consmr.mail.gq1.yahoo.com with HTTP; Mon, 14 Mar 2022 13:05:16 +0000
Received: by kubenode500.mail-prod1.omega.bf1.yahoo.com (VZM Hermes SMTP
 Server) with ESMTPA ID 2e193dbbba14615f6983e46b43673bb2; 
 Mon, 14 Mar 2022 13:05:11 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 649bcbea-a397-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netscape.net; s=a2048; t=1647263116; bh=0t02d+58EaghGfC/9KD+R1B9d9MUI2zCPgUOGNTnFLY=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From:Subject:Reply-To; b=k8jeuIV1XOzWHaqLfMD2yn8hXAMgKNvbTjR5TZhFuMFLvRsZD9vipgiPlat6uzhwNxzvEOgPqQTeKLZ1s5CDHIx7zErDou1nK3PsqQ/Bqkpi+7JLaodCdhES0x7R6eWDUwv9MOdOP11jOp5zJS8iXWTZiPkZMKOKDNNSJarimUJW4xvZYL8aLqEQFWr8YOAFGLJXcxUFYf8cPWx0K0CnQS6sLcxQmXLDtszI/eyw8TChB+D7ElU8/wPSPFmhZyf2VjRO0f/QWN+ovyLtbRXEZ2sPKsxUPZ+U4mGbV6BalHsnbj/8du46CdpOKGhMwBX8Lc6cgdFPizRecQHzVuCwjw==
X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1647263116; bh=a3jlBYHu7A4kaOOjoCxaFZbOGq6wgAIk+UYiDUabWET=; h=X-Sonic-MF:Date:Subject:To:From:From:Subject; b=qlITPZxeYbc9bJ1/5WdYBnrNe6nJG/dfY/Ybppqmmy3d0V0scG0mDC29rab/090eZUn1ixKkmKmogjJbTp8MKNaonrAy4dVRLOaL368AZhAVrlYkF0MudToH6+gp/K+lY3vsCuUZvQ0a5V9sgilueDFSpyJEzbc+T0s/7JMqwb1ZO8NZnab7mR0jbZZI6XPTzN64dxAngvliU+Wdq60kMLcF8q+kisovaIhxAKc0ncjX33jc8BhJyBf4ZCiX6EEozUP7rFh6q0rL9CHv9ir837V33t21FZMtZsJS0+6JZxgw0wJyTunkXv03Zg7qv85PCyDJeIDLwwqglNLGOejMIA==
X-YMail-OSG: lZlEVRIVM1mFSyc7w1eeMBgR6JGVJfaNbiAAC4z9ePD4X.XhTCULLwrg2WJDF1a
 .FcB5jwwwcMywuA1kObcldGU4MlAGq2WHCcybaUmfencAH8Kk1mkC4E6QT6Xq2tJi9ErvYh6jNDl
 zCz2qTt27Vq3tFEFPKp0lrIKkWvRt14xf5pNqXLorYqqrp.kFU6vLTqOs7pvTUwDmz4xkOHVxqjV
 _Bm.2RF9iOh4DmIZCyipp3S1jq7bP6tuThPgCcK9zcOr0HP96D75BkKvS2d0ix_3DYVKo6t.P38d
 5XMkpqpCYu1vJg8KF4JKakyj1EIA8N9Lsffqe5ywvYR8X7.JKtQNK_.WMfqkhsjG1hOGEeRtJaNp
 ZxTVDfGr20veHS3ziaWTLg63e_4MyX42JDEp4NLA2T1q2a65LJg_dMeaAFkHU902qpbfvNPZzkH0
 dTRCdFX5TIcm8oONG.74EiNIizsxXLStzDABcZcQlp6tWGti3RBGumVtP7n2zZ1KtpHLdi2y0y49
 aL8SLWtCRULdVrcl_2Wq_lKnDZ7kqyYxRLqsgUXaXZRRQGfeu.s0I._MgQxDkm7lxtVmhNCv5Dsg
 XWPstmaF2HrO0mJJP7lC2jGV17qdbovrbbfpPb7SsRDF_fCL1SSG8BJKZqab.aOnisKlRkxgQ1UJ
 VzUUU9ndccXmbeAqufxZhc.J4MO_hnLPFk8KcfGZSEItDIo0Xi8ZtrnzeC4GtTjUiBLslHzmCSxW
 GtImaHgluXImdOZoMaSeeR7j9CHUr2CuaZ60J1UGx2EraaNpxMnz9ivmkLWFLQwFiymMwxh8sVYY
 8Os4o3s_cdARINklPDb6M5nYi9hrUCcIG7DnZcB3u8TrTcGHwAClkELp1nJFOjIrVpvnwQGzouYP
 n4MK.giaWNW59DWYDDMR.U7DuexbJ88HzBZFEolXdEEeIYKrtSAfF7vSY6gd9ifsN51i.rZzDlv1
 eh.7DO796m9W7LHoKVgNVttMEztBUcpA1_I4wxCacZwrUSN54sdpC_E3aaOClJfaHWuOQ_4XVjTj
 7qbaltDyBRpau2vjgdzQt4bJ8koglQRgLt9267VLIHS_t3DzreEAgimfhyDMPw1Oi2jwiLxWmN5J
 LMdUdyFbdQK7WUdDmztWKM8ZiFEC7zRkNcFz3_ZDpGqUfiXPgXm2ojaJWhaB3ZzT1d17vRBCgZn_
 6SrutesrTaaShI9TVpiWXXqFzWPzzdK0B4I7Tkbd1uNMtQzNK6Q5q3dUwqoomfoLDmC6rU_Vcd20
 fosqrbY6P3cpDfVx3CW1FwlNuTE4k8oyZbTQBslfY1ctAsFw4.egz5tibsBP7w3HaGHtZiOpu7CL
 5S9BEBO9TnDBjqM8RVLQNF0MDg_hLeUqd8rQ8XlrvZgiOfG5a6fsGxKkucyNzo8saLL9gvXHLQUZ
 wbVx95uxyoCJXFdHwRiTyFo8xi2o6Z5PnzIa84QKE5tmWOiYntS_5fjmvrJoj9uFMTqDLmOHubPo
 BOEbSv9s37mpB3dgZ6bjbHJGijbZU7og8cUkKPA6c9Fscfz_3BxoHgM26OR4JleqcwHuI4.PlT7O
 pSV1kOvCUDhfJFdc9stCbBEODPEDIaAQx3Udb3P4jHGXyeJZCDU0g01v_9oaWBwoqFr7nNL2TLz0
 zxaExBkiTUeWOZ5MISN9a35WJ5boV0kcY0sQIrEUmAlWpY4DqtzXSr.06QtbpXuiLZk1MqKcBd7t
 3hj6Gnh4ko8vT_lYv3RUWCJD6Yh.PVpmkY6gOadEgHcRvXqW3mFZk.A5RSzuJMw7JcVSx_CzXU5z
 Fh_w75jSOPOypQHpmgpNTF0QrCromYuVxAwAnNolSYBUwChxofFy2b35LrXdO1GYMOVEkilGpSmK
 iaogWqlJ00A9.dhf5MbWq8_zTEQExsCBS528W9Yganicf.xncFSlCFzVJihssbZY.biCRfmsFgJ_
 cJ.cKEN0V9bTNuwbiJIrOdPoxD.Wsp.A59Id9TEOrvkux_PZW.qmnxukmwMn1Voin8VLVsMxX5ob
 C.5CkwmNQq_I6.Bre5k7gOd2B68rXIpP479wLJ4n.A.iLFTn1PMJ2Dt2ai81qEW5ZSLReRmFTEhK
 kKY2EUvnS4HhfI5ae9JWNSu8NHXmqSv.utJhJrdU9XS1MW5eLBQmPSx7f11E38QG6IeDHI._t9FD
 xnMF1RmeJxXeoy4davF8ZTr_UwicEdVgLRJTxlE49XxPZQt9d4Qj8EqwPdVJtKzAwC9A_RiklXu.
 dBkbBgg--
X-Sonic-MF: <brchuckz@aim.com>
Message-ID: <ebb36b59-45a4-eb51-7a36-2aeb3ce969c5@netscape.net>
Date: Mon, 14 Mar 2022 09:05:09 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: BUG: libxenlight fails to grant permission to access Intel IGD
 Opregion
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>
Cc: xen-devel@lists.xen.org
References: <4703b7f1-8d3c-5128-213c-e39f487e4cde.ref@netscape.net>
 <4703b7f1-8d3c-5128-213c-e39f487e4cde@netscape.net>
 <2e74415a-d0d4-321b-be2e-a14db297c51a@suse.com>
 <ed955608-9c62-3dc8-fbcc-df5b4d3c5e46@netscape.net>
 <e0a49022-097b-b9ae-eff9-eb2111e7acb9@netscape.net>
 <d3f31e6a-706e-cc24-1d9d-d78ace0cc705@suse.com>
From: Chuck Zmudzinski <brchuckz@netscape.net>
In-Reply-To: <d3f31e6a-706e-cc24-1d9d-d78ace0cc705@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Mailer: WebService/1.1.19878 mail.backend.jedi.jws.acl:role.jedi.acl.token.atz.jws.hermes.aol
Content-Length: 616



On 3/14/22 3:26 AM, Jan Beulich wrote:
> On 11.03.2022 21:35, Chuck Zmudzinski wrote:
>> So my only question is:
>>
>> Is it proper to include header files from tools/firmware/hvmloader in
>> tools/libs/light/libxl_pci.c ?
> No, it certainly is not.
>
> Jan
>

That's a relief, because if if was proper, I wouldn't know
how to do it properly. Instead, I wrote a patch that defines
the macros I need in tools/libs/light/libxl_pci.c with the same
values they have in tools/firmware/hvmloader.

When you get a chance, can you take a look at it?
I cc'd the patch to you because of it's reference to hvmloader.

Chuck


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 13:07:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 13:07:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290239.492188 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTkQ9-00044V-J5; Mon, 14 Mar 2022 13:07:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290239.492188; Mon, 14 Mar 2022 13:07:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTkQ9-00044O-GL; Mon, 14 Mar 2022 13:07:33 +0000
Received: by outflank-mailman (input) for mailman id 290239;
 Mon, 14 Mar 2022 13:07:32 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTkQ8-00044E-OZ; Mon, 14 Mar 2022 13:07:32 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTkQ8-0004P4-LP; Mon, 14 Mar 2022 13:07:32 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTkQ8-0004UK-BA; Mon, 14 Mar 2022 13:07:32 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTkQ8-0000qG-Ag; Mon, 14 Mar 2022 13:07:32 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=56beYuQVimZPuZrthzmqO+fnJyS+6fTTzasRPgeV48U=; b=xJZmSeAI2NXlGV4RmF5CWDnNOv
	b/L0lPWxAT61L6mFVSGgEaQQzkAPBJWohePcq8+8j+amb6T7ATIzh+k/8zbWjhWjZafflDWAD/VDG
	rzeK9r6glBPrlE1LUQQdZHJPPlv2Q9YyvrIWG4Mdc3lehMaTjEMXrvPzG8LrMFYH21r4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168580-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168580: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=dedb0aa42c6d1ee31805dfc61630db2c41117330
X-Osstest-Versions-That:
    xen=6ff9a7e62b8c43fe3e9d360fbd49d5854787bc39
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 14 Mar 2022 13:07:32 +0000

flight 168580 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168580/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  dedb0aa42c6d1ee31805dfc61630db2c41117330
baseline version:
 xen                  6ff9a7e62b8c43fe3e9d360fbd49d5854787bc39

Last test of basis   168509  2022-03-10 19:01:48 Z    3 days
Testing same since   168580  2022-03-14 10:01:40 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Jan Beulich <jbeulich@suse.com>
  Roger Pau Monné <roger.pau@citrix.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   6ff9a7e62b..dedb0aa42c  dedb0aa42c6d1ee31805dfc61630db2c41117330 -> smoke


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 13:42:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 13:42:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290248.492200 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTkyH-0000Ei-Df; Mon, 14 Mar 2022 13:42:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290248.492200; Mon, 14 Mar 2022 13:42:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTkyH-0000Eb-Ap; Mon, 14 Mar 2022 13:42:49 +0000
Received: by outflank-mailman (input) for mailman id 290248;
 Mon, 14 Mar 2022 13:42:47 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTkyF-0000EP-Ji; Mon, 14 Mar 2022 13:42:47 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTkyF-000500-GJ; Mon, 14 Mar 2022 13:42:47 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTkyF-0005FO-1a; Mon, 14 Mar 2022 13:42:47 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTkyF-00066V-18; Mon, 14 Mar 2022 13:42:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=F3agmsRNKbEpQERGJH5U4VVDr4Oe4WvfXEVMEBGqlBc=; b=Xpf5tNiboZ1JleFfNj3COMyQZr
	SwdoTLbdREsbWXnKN5w9fgpk5wuECyTYkJEB8isqh+Utg1RADfX7/nvMe3gtqdUb+4AQF4IvPOerm
	ynXV7r7f9hUacozOdvKbYc3AUhpM1oF36up9Jo8ZR+vMOAzZSDO1Gptzl1vPddc0dvRI=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168584-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168584: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=a13dfc769bd7097d8d9ffe3e029a2c1d062d712b
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 14 Mar 2022 13:42:47 +0000

flight 168584 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168584/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 a13dfc769bd7097d8d9ffe3e029a2c1d062d712b
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   14 days
Failing since        168258  2022-03-01 01:55:31 Z   13 days  133 attempts
Testing same since   168579  2022-03-14 08:41:36 Z    0 days    4 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 629 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 14:16:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 14:16:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290256.492211 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTlUz-0003ud-4a; Mon, 14 Mar 2022 14:16:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290256.492211; Mon, 14 Mar 2022 14:16:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTlUz-0003uW-0o; Mon, 14 Mar 2022 14:16:37 +0000
Received: by outflank-mailman (input) for mailman id 290256;
 Mon, 14 Mar 2022 14:16:36 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=29fN=TZ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nTlUy-0003uQ-D7
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 14:16:36 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 5a34426c-a3a1-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 15:16:34 +0100 (CET)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur03lp2059.outbound.protection.outlook.com [104.47.9.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-38-BwRe6lNQMYGeUGr60DaZ0w-1; Mon, 14 Mar 2022 15:16:32 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB7PR04MB5995.eurprd04.prod.outlook.com (2603:10a6:10:8e::14) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.28; Mon, 14 Mar
 2022 14:16:30 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 14:16:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5a34426c-a3a1-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647267393;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=lKy9kjb4F95P5+EZuYqqtKU6trViXlEUaxZ/EqpPj8w=;
	b=OUjxjJmOUAsz4ZD4e+2wisrV8T39qdZ8St3GeQRRuCE58FBiExAxmL7kXNaAwdTpdgHGsW
	2zw0N7w2Cjvovz+pj9R/F28IfTe3sP19qj1at0qd48ANHoOf4mnBFtr/Ot/6AyO/zLdAiA
	S8C/Bw8zOAQDD7nfpWE/HThhzXhoxjc=
X-MC-Unique: BwRe6lNQMYGeUGr60DaZ0w-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=XFA3uquhWfE4LI1miSKfSBGXaKbU2bhNcRvHJCtL+zYetv1rL+kQ1u+u0QSi+XHuriQdtaA0rQmAGZrAO/JUN5NV9uw3Nnx6QEFQsBv4EeDe3eLVc86naf1E6ZRoGei8rdLhhJOokjXsNOyZ1ReUrIpEqjaCk1dvJrc+npm9aORdEYl4eknmAPQa1MMONCcH4zYWbqYv1fWdF8YATdKL7qvhDzC2eEaFtMu1zM4gXh/Q5c0PwObspr/+xnNHAthlk1cD/CXi2xRLIPigZNKUbOVf5GZN9bFdf48jMJ1mAl8yhbjGkaFbDRa2eZVtO/umWFyEnW+pe6kUMO0JEX7x9Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=lKy9kjb4F95P5+EZuYqqtKU6trViXlEUaxZ/EqpPj8w=;
 b=mRKwymn8j0wT/0hlEk+C+lqTl4XR7LCkFV4tCnWsRO+oKO0TBCKI0jEO/XO8Kkgz+HrUSLNTMTpWMKjaZ9t0YkwHChOUwQRoA9EqH7WnQZwNQqTjSIGZLaRAvj56QR69CkAaZuP3pb0ljONzqQmb0pP+YSpIgoz1VW2XeJL16iJ7IzqMjcboH9MdyDndlVrLk/YUxJrnE6kY8jF4WAVO4KyhDbpFJsm59vZ9wiKxoY02pOlRWJ7Yfv+jSP6ypQS8aX7H99YGrhpNY/kNTulV4WLnb0tE6FPG1rB0oAYd/DRXzxKVJ0nLtWpfhjg4l7HioJ1oA+2wJsRgm3J2Nca+Tg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <c542fbe6-8910-4dd3-aa6b-41af647c728e@suse.com>
Date: Mon, 14 Mar 2022 15:16:28 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] x86/cet: Clear IST supervisor token busy bits on S3
 resume
Content-Language: en-US
To: Andrew Cooper <andrew.cooper3@citrix.com>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?=
 <marmarek@invisiblethingslab.com>, Xen-devel <xen-devel@lists.xenproject.org>
References: <20220314110034.28498-1-andrew.cooper3@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220314110034.28498-1-andrew.cooper3@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM5PR1001CA0021.EURPRD10.PROD.OUTLOOK.COM
 (2603:10a6:206:2::34) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5761c702-5dd7-4e64-3895-08da05c53c0d
X-MS-TrafficTypeDiagnostic: DB7PR04MB5995:EE_
X-Microsoft-Antispam-PRVS:
	<DB7PR04MB599571433E8005C9F359AEDBB30F9@DB7PR04MB5995.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(316002)(86362001)(38100700002)(31696002)(6486002)(6916009)(54906003)(5660300002)(8936002)(2906002)(66946007)(4326008)(8676002)(66556008)(66476007)(36756003)(83380400001)(2616005)(508600001)(6506007)(6512007)(186003)(26005)(53546011)(31686004)(2004002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?aEppWFVCSzdaaU44cjZxMUtvOEdnUTRmakorcUpiUGJNTVdTLy9lc1RvQmRP?=
 =?utf-8?B?TVUvaEJxbkJkSWtKSHJ0WWFXWUxUS3MySC9KS213MXhMcEMrT052c0N6MWYw?=
 =?utf-8?B?YVA0SWhha0dhanViU1J0SFBzS0ZYczNBVy9qcndaeit4QWRER2J0RzhvQ3Rp?=
 =?utf-8?B?dStCU3pLcDhJVWM3Z0JDSkloTktwSXVwbncwVHE4b2gyb29wOWdBeXpieGRk?=
 =?utf-8?B?NHgvTzVFL0RRKzVBTlg4ajVzZmMwWEJETDJRV1ZmTDhockRYSjdQVElldVpE?=
 =?utf-8?B?c0NKUlR5eEw1Y0ZoSVV0TVR3UVRHKzZrNzdMckQyZEVNVnpOcVZZM0JRWm5z?=
 =?utf-8?B?bHN2bEFydzFqZFpzOWs5NmZVRk5vaDVkY2g3VnBiYkM2bFFRRFFKWVA0QnFk?=
 =?utf-8?B?OXVCT0ZkM2xvUEUyc3hzWFVmbUN2djdwakt1UXFlQXZ1dlNheU5hOEwyMENo?=
 =?utf-8?B?ejBEWEJXek9jVVp3UWV2SFVHRnY0ZzhCanc5R0J4VWEvQ1FWNmJkZGdFWi91?=
 =?utf-8?B?ZzM0VDE2QlA5Mm1ZR2NDWkpPSjZRR0k1QWs0Y1FqYWtuRmg3bGk1VkNNcjVj?=
 =?utf-8?B?WTVOV2tGWUh6L3NpdnZ2N21XdHFyRXpvSEN3RG5JdjM0TFFZZmlWejlsbTlx?=
 =?utf-8?B?ak9LcEJMTnVrbjBqZFhYVHZUOEVaWWNPMElyWE9NdGp5N0hGQ3NyWW5yMkEy?=
 =?utf-8?B?VHQ1SHRMOVkrVS9LS2VGdGltcmd0WmszU1A0R2owR2JiSzc1TytZMVhtSjNR?=
 =?utf-8?B?K3psYUxOK2NRRkNDa1RQZFpyQjRVcGFFS1BUM3BHUTQwdDNyZkVlTStVQXZI?=
 =?utf-8?B?MUFPL2ZFT1A1TVp0dmZnaTJMMVBycTByS1NoL1JpM1g4K2xocWpiMUFtVXI3?=
 =?utf-8?B?RE5lcGZuOW5KUyt4UEN1NGF3Uzh6R2cxTkZBUGhnczNINmpxY3FBdllBV3Fi?=
 =?utf-8?B?K1hNQlBhNkNHckQvZnJ3RXdybTZSUDEwNHRnbUVIS1cyN0tQb0pxUyt3ZGND?=
 =?utf-8?B?RU41b3FKYm44VUpWSTJZcGRVdnZrcStXWVdSRHlKSXljbVdRVktaT3ZnaHdl?=
 =?utf-8?B?ZkZwZHFWZEhESTJCV3BuaEFPSnVSSnd5MTR1cGxWTEJmTU8vTzkxMzZqWDZK?=
 =?utf-8?B?UjVXdDFqeW00dGVDRWdwUnc1VDBjUm5RZHVaNlVocWZxN3A1L1ZqOFBJcHA3?=
 =?utf-8?B?anVJK0xMT1dHNU81N0RUaGZsdUJseEUyNXVRRjYvY25GM1JIRUtBNlZvUEJv?=
 =?utf-8?B?b2NacDJhWVplL0djeE1aTDh2b0trSkVRK1pkeFJDWFJpQmFJLzlTRXFJRys5?=
 =?utf-8?B?NW9FMG4yRnJVVlNxK2VBM1oveW1OK0ZTRFVRVEZnNDQ4aENsK0FFMVBIbDM1?=
 =?utf-8?B?QTEycWR4NlJ4dGV5aVpJR3dYSVhKQTlHV0hLemhaQmQ3anRLLzVBZUdlU2Vh?=
 =?utf-8?B?aGV5UnlVcG8zZ29aSmxzalRzVlVybUF0SW9wRVMrWlJkOC9MSFRNZjdiaTRZ?=
 =?utf-8?B?MS82M0pINXlSTWhOVGt6MXpScU85SHF1a24wYVdmbGp0K0I2MXZCeCtoRlJv?=
 =?utf-8?B?L2ZkL0lLdnZQVjMvUTNJaHdlb1FaVFU1Y1lNYmhkVmZSU3d0V3VMUjRXNmNi?=
 =?utf-8?B?aWVxbHlaTjVNTVMzQmVqMit5VVE3cVk5a0hYUjVjbFphMmtUNFdaTEJPT2o2?=
 =?utf-8?B?RjNRUysrMGxRYWdzMlhyUTgwSGwycnJ4ZEcvOEhJNWsrWXVuS0JHdE1kWlVD?=
 =?utf-8?B?cHNMd0pVc0pNZTBtbktYRXJtYTZvN3krcDc1RFBuNU9zVjhxU1Y0OG1BUkg4?=
 =?utf-8?B?QVNmb2dSQllkYkE5dklEUUZYWUdXQllBYVpwc3BORnZLNGI2ZlpVNFFuc3FD?=
 =?utf-8?B?UDR6N0hqdTkva2FOU3ppdEtKUktSbXJ6VGlZb1lMT2VrU3E0R29jcnc2M2Ra?=
 =?utf-8?Q?Q8vC16g9H5vZ9FZ/eWNv3OQ7hWh7ykw+?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5761c702-5dd7-4e64-3895-08da05c53c0d
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 14:16:30.1948
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: qP75UEEd3bc5V0uGqaFPIeo56sgp+BfsplwSb1bkuwq6o7iCxdwtUMZ4nQSNIw/gmIpD6nJKGEtB3izzsMJ2/g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR04MB5995

On 14.03.2022 12:00, Andrew Cooper wrote:
> Stacks are not freed across S3.  Execution just stops, leaving supervisor
> token busy bits active.  Fixing this for the primary shadow stack was done
> previously, but there is a (rare) risk that an IST token is left busy too.
> This will manifest as #DF next time the IST vector gets used.

Under what (rare) condition would this happen? The only scenario I could
come up with (which wouldn't result in a crash anyway) is the NMI watchdog
hitting after a CPU was already taken offline, and the handler not
managing to complete before power is cut. I think it would help to mention
one such specific case.

> --- /dev/null
> +++ b/xen/arch/x86/include/asm/shstk.h
> @@ -0,0 +1,46 @@
> +/******************************************************************************
> + * This program is free software; you can redistribute it and/or modify
> + * it under the terms of the GNU General Public License as published by
> + * the Free Software Foundation; either version 2 of the License, or
> + * (at your option) any later version.
> + *
> + * This program is distributed in the hope that it will be useful,
> + * but WITHOUT ANY WARRANTY; without even the implied warranty of
> + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
> + * GNU General Public License for more details.
> + *
> + * You should have received a copy of the GNU General Public License
> + * along with this program; If not, see <http://www.gnu.org/licenses/>.
> + *
> + * Copyright (c) 2022 Citrix Systems Ltd.
> + */
> +#ifndef XEN_ASM_SHSTK_H
> +#define XEN_ASM_SHSTK_H
> +
> +/*
> + * RDSSP is a nop when shadow stacks are active.

I guess there's a "not" missing here, supported by ...

>  Also, SSP has a minimum
> + * alignment of 4 which enforced by hardware.
> + *
> + * We load 1 into a register, then RDSSP.  If shadow stacks are not active,
> + * RDSSP is a nop, and the 1 is preserved.

... this. As an alternative I wouldn't mind if you removed the redundancy.
Then
Reviewed-by: Jan Beulich <jbeulich@suse.com>

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 14:30:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 14:30:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290262.492222 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTlhy-0005oS-E4; Mon, 14 Mar 2022 14:30:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290262.492222; Mon, 14 Mar 2022 14:30:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTlhy-0005nm-9z; Mon, 14 Mar 2022 14:30:02 +0000
Received: by outflank-mailman (input) for mailman id 290262;
 Mon, 14 Mar 2022 14:30:01 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=29fN=TZ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nTlhx-0005gD-DC
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 14:30:01 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3ab9be30-a3a3-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 15:30:00 +0100 (CET)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur01lp2052.outbound.protection.outlook.com [104.47.0.52]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-19-hDASDS4bMwSrnRMU3r5jFg-1; Mon, 14 Mar 2022 15:29:58 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR0402MB3891.eurprd04.prod.outlook.com (2603:10a6:208:f::23)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.28; Mon, 14 Mar
 2022 14:29:57 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 14:29:57 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3ab9be30-a3a3-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647268200;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=tYHR7PcaYqY7VjWLjnvS5cXYPgv6I6R4EJ2G8G7mzGg=;
	b=WZAncF29+vW+6SIWs+Uzqtx3Xstq1k4Iw2nEttBECwECEVZuDopnUaBfWTsbGHU0tJAtZ4
	e/kRFyK/9WNxyiAqVxmkdaC5c/36Ln7rwjKaLKEhFpb23nRmM72xHQzOT8y5GH5DGXcr6E
	MiSP6BmkepCFNSItQP9rRJ5/0jIp6t0=
X-MC-Unique: hDASDS4bMwSrnRMU3r5jFg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=RxLqbWcqkxA++sRHmIiJVvRAfayi2sqeshw6hKBNqRfxtiQllqupUczWiUIUtd5yNFIdwtwsj6nUoMKiQlvH+o7SiphK3idzSsbB8KUEgD6BlLWONxNQnY9LceM/B0adrhIy37/2XJUBoeGpB8YRPeug5Ml9kJlmOgsJOLurU5kb8A58GNwqrV0fNFjWNNlTDEMeZs5+QAvHnI0I3B1sZICTcEBS6ZS6t8kajsXdqk1p2QBIRexRwbbOqjzWnvw4Bsh3r+zM1FqecA1AzH8AaajLxxBxYQ7osd/397HcL/7FAp8qGueMarPMY86exRTfnDqR4I+Y+cKZaOBP3J6wEg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=tYHR7PcaYqY7VjWLjnvS5cXYPgv6I6R4EJ2G8G7mzGg=;
 b=L7ai+ao8muujJCaqc4quA/ufRepYQGfWD8GyQjVvsIi/jR4mJUBpkhYOuJZXX/Q+zg2bsqrGnOYJtR/6HEkc3mPU4c2OGSQoQlxHal1UfF3gimZzspf1tsEE34yJ3QK01SjTInoES7eV7j9TEkQe9vhKux7n6J5lU5Zy+GCH+OtlIDddAihp9Vm5iAmB5HlYObCf+H5KCBqugg0ohg4BOZC9x3ZGWfvFTUvDE8iQJ6QnBxvGtnq4qnkukw4RnRhmvLtpzf3k0LAfz+YVCOVMVkh+x/bKFIwV8ks3YpNxj2Cg/Us/PXdx6f1rrJNzJ/91H9grmITZouD4JETJOEVTBQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <eb3316ac-0ab7-5cd8-85b6-164ffc78e725@suse.com>
Date: Mon, 14 Mar 2022 15:29:55 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] x86/cet: Clear IST supervisor token busy bits on S3
 resume
Content-Language: en-US
To: Andrew Cooper <andrew.cooper3@citrix.com>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?=
 <marmarek@invisiblethingslab.com>, Xen-devel <xen-devel@lists.xenproject.org>
References: <20220314110034.28498-1-andrew.cooper3@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220314110034.28498-1-andrew.cooper3@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8PR05CA0023.eurprd05.prod.outlook.com
 (2603:10a6:20b:311::28) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 56f67a7b-0718-469d-121d-08da05c71ce9
X-MS-TrafficTypeDiagnostic: AM0PR0402MB3891:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR0402MB3891A5561FC1984E5AE522B6B30F9@AM0PR0402MB3891.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(4326008)(6916009)(54906003)(6512007)(316002)(6506007)(53546011)(38100700002)(8676002)(31696002)(6486002)(66556008)(66476007)(66946007)(508600001)(86362001)(31686004)(5660300002)(4744005)(8936002)(36756003)(83380400001)(26005)(2906002)(186003)(2616005)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?N2xrV0paelE2R1JmL1cxa21TNXBGR0RWUHN2aHJWNWUrNTQwSHhoUHJoZmxN?=
 =?utf-8?B?UHd0UjZHTkU1eW5raVF3bkZyeklQZHAyV2RSQ1ZyZ1VxRys5ODBBL2NHS2Fl?=
 =?utf-8?B?R2cvRDdGRklVNUd1U2lNSWJsa1didEtCb2pXSldIcDJ2dzMrUGV1aktEa25k?=
 =?utf-8?B?cFVvaWwrL0NxdmFiYnZjVnhyWUxCNTNZbjJxVVV6aGRtSWw2b1NxaVk0YUox?=
 =?utf-8?B?UGlHZndIRVl2NGJucDltVG9yTC9ZcUlISEswNld1Z3hQYmNwQVFtbnd5TzAz?=
 =?utf-8?B?M0xXQlBMbW9Tb2FPcERJSkNDZ240eEQ0TStDNm9nK3FvZCtTTjBNUE1ZQktV?=
 =?utf-8?B?VCtXZG9xamROUlBaNyt1a0RueDk4NFo0Um1zMVArRjl4eHh4N2ZteVNkN2FJ?=
 =?utf-8?B?L2hTRVZtOTFsNm1RZHhiMDNoRUR2M0hkZ2JqbGwxbGV0bWNuQldzb0I5SWdW?=
 =?utf-8?B?cXpIVXNGM2kzK2RNc3p1V3ZJMUVDUmkxVFFJQU1XYkw0ZE43VHZtaHJKOFZ1?=
 =?utf-8?B?d3plditpQy9SUFdEQ3A0WkE1VGlhZHlGSGNQaXZ3MnloZE9uK003NjJRSk1o?=
 =?utf-8?B?SEJ0dS9EYXdaU1dkdnE5VGFZNWs5elp2RTVLQ25iQWY2WWNRMjB2Y0kyMXMv?=
 =?utf-8?B?RkFoZnl4WXhXV25jSmpYU3l1L0dNL2RaRm9nb1dtUUVXcGxPb2xYWVdZZmlV?=
 =?utf-8?B?TXhUV2hiQjBxYXdqYmQwZlN0YmtqR2NWZmRTdmVrbHY3VXNPZTVQQlErUEQr?=
 =?utf-8?B?c3N4Ukk1b0VOZEk5RlpCcHBVRSt2R1pBZmJlQ2NqRWNXYkYrQmk5K3BhVEpY?=
 =?utf-8?B?dmZqZXMzcGxpdE9DdmlVUFZndTUxdm0zMTNwcDZvM3ZsVE15V054Wm1scklK?=
 =?utf-8?B?RGJYNjZ0ajFVZWdsQmpwMk1vZW54RFRkN3hPSG9NU0dSbW5taTQ5K285bC9B?=
 =?utf-8?B?blgvMk11OWUzQS9za3V3OEQ5dnFqc3NmQ0lwRVhpWDgvRU9oRmJKVXFjcW5u?=
 =?utf-8?B?dUc4RkUzckxSUmZHZ3pOREFBcTZSSStsMzNmNmhXREIyU1d3emJjTUxscWt5?=
 =?utf-8?B?VE9YS1dxQUJuWlVsN2Q2OE13ZStFYllHalBvMkRiN3FaRzJyU1U2SU52RS9S?=
 =?utf-8?B?M3ZEY0lvUGxLVExJQ2JVb3JsL0N6V3haZFp3QVQvTkdEWFA4U3FZaDFUR244?=
 =?utf-8?B?SFlkRk1UQWpMRVVEVHdxaTBrRTd4NTVBYW0raTVwRFIwREVRTTdzQnF3bWJ4?=
 =?utf-8?B?VVVFT3MrNzBnQWpPNXRJZTQ3Yk44YjduR3FqT1MzL2xqWTM0Zy9hckRUSEdQ?=
 =?utf-8?B?SytqLzdwdG42S29KT2c2Q3o0UlNhcysxbjRXVWsyclhMdk1LclorRGp0TFpz?=
 =?utf-8?B?RDNWWnNEMUhtUlRrVnBOOEpnVGNKb2xPOHd2MHUvUmFVYjRwSnowT3daWjlG?=
 =?utf-8?B?SUtieFh2Zkd5REM5cHF4YjNreWlla0I4ZllpQmVteittbzd3TDBxeUxrRjda?=
 =?utf-8?B?WDBNRHVwdVdpWFgrRlBNaDI4UysycVNKM2JxamREdW5sL2lEMTJkRFJGa3Zt?=
 =?utf-8?B?Q0VBaWtZN0hNd2J5SmN6L0YrR2pWTTdkZ0U4T3N4N3VTUTdnOXlLWElvVUR6?=
 =?utf-8?B?dUNGVjZTTndMRmJkRVdqd0F6NnVjWWMya1ZYV1F2S2swSVF5UnB0UGxFM29E?=
 =?utf-8?B?V1BwSzQyMTMvZ0laZE1OTm9XVmoyWWxPUjZMOTFWT29Gd21OYnJndnU2cEVM?=
 =?utf-8?B?NDhxZ1k1N0xqa2FabDduVWh1VkhWcC95dXlqZmxUVlU3WUlnS04wSWFBdVo3?=
 =?utf-8?B?ejFXRWZpWEQ2UXZpWmNUaTRwNVZPMnJ5RHFBUk82ZjVaVGJESXp6aVZTWmEr?=
 =?utf-8?B?bjFKcjBYd1FjUXR2ZDZxdXFJalg2UmR5RnlsYURodWFnQnBVZVlyTUQvVGdZ?=
 =?utf-8?Q?Ajii03yzj6cQSb3TckK+8FE8B3KkejNA?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 56f67a7b-0718-469d-121d-08da05c71ce9
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 14:29:56.9888
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 3jxAkzQZL0fg98lwN7Hvork5XSZ97Wne+RVMKtJK8T+j53ZrSrxGYnUXwZEGxZi1SMazc0VQaYxqFV5qFVQqIQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR0402MB3891

On 14.03.2022 12:00, Andrew Cooper wrote:
> Stacks are not freed across S3.  Execution just stops, leaving supervisor
> token busy bits active.  Fixing this for the primary shadow stack was done
> previously, but there is a (rare) risk that an IST token is left busy too.
> This will manifest as #DF next time the IST vector gets used.

Thinking about it some more - wouldn't it be more natural to turn off
CET as CPUs are being brought down (and for the BSP as late as possible
before actually invoking S3)? That way no new busy bits can be written
anymore.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 14:56:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 14:56:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290266.492232 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTm7N-0000ig-IH; Mon, 14 Mar 2022 14:56:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290266.492232; Mon, 14 Mar 2022 14:56:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTm7N-0000iZ-FJ; Mon, 14 Mar 2022 14:56:17 +0000
Received: by outflank-mailman (input) for mailman id 290266;
 Mon, 14 Mar 2022 14:56:15 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=J1jB=TZ=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nTm7L-0000iT-I4
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 14:56:15 +0000
Received: from EUR01-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur01on0604.outbound.protection.outlook.com
 [2a01:111:f400:fe02::604])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id e4b80388-a3a6-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 15:56:14 +0100 (CET)
Received: from AS8PR04CA0018.eurprd04.prod.outlook.com (2603:10a6:20b:310::23)
 by AS8PR08MB7127.eurprd08.prod.outlook.com (2603:10a6:20b:402::10)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26; Mon, 14 Mar
 2022 14:56:03 +0000
Received: from VE1EUR03FT064.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:310:cafe::fa) by AS8PR04CA0018.outlook.office365.com
 (2603:10a6:20b:310::23) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.28 via Frontend
 Transport; Mon, 14 Mar 2022 14:56:03 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT064.mail.protection.outlook.com (10.152.19.210) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.23 via Frontend Transport; Mon, 14 Mar 2022 14:56:02 +0000
Received: ("Tessian outbound 31aeb3346a45:v113");
 Mon, 14 Mar 2022 14:56:02 +0000
Received: from 0ad6f785708d.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 0AF10DFE-A8E1-4A33-BBA3-CBF64F90C72A.1; 
 Mon, 14 Mar 2022 14:55:55 +0000
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 0ad6f785708d.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Mon, 14 Mar 2022 14:55:55 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by PAXPR08MB7366.eurprd08.prod.outlook.com (2603:10a6:102:227::22)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26; Mon, 14 Mar
 2022 14:55:54 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 14:55:54 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e4b80388-a3a6-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=BacHihNTF2bMzOQgA4Nux/Vnrm6x5FsZOAffWd65By0=;
 b=6zZJOKx3zhQoKz8f7+yC8nxlNlAOvJsjhUfShtp5DmAneRwf8mtmr2+c6Kw/mGqqxyilz9A4MB6OPM7v9CvNb1iPi4TOpq38x5eLplH6P+y0JtLl3FgBV+T9kRyZClTBvdTJ5RJsc/UJEu0Dpz4UppHcN99ZSoD/bUg/xb03YiU=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: d7af06639b8022bc
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Yrqkqt1AkoJ7eU6vsToQHpWLKUGUHacTbrEeR32U2NGOVTl+vp4/uwomxGppGuOTNgyAbsRiDxNnJx61XjRNLn6F4HhFnlWpKxTZtxSkqfBABNd61NIJ7Ps7l4b0kD+zek8biMiJkmZh7q/sq5zII/kf8hDZ6Qf//1VVWM+nTaEmqLNlKi2X6QZwHBXkOdhubMstqxhGFoI2WsMUe7TGIY3wVQhCZwhXCUHUT0EPkv3xHrc/J31x2MEsAAfmTgWQcddnpUzxw8I8jDTqhnmiVgUThMqNMFOv3I6jeUxPGclRIkpEejELl5AxSwxKfcN9DkpUEZSFJwC/+wQgki6qvA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=BacHihNTF2bMzOQgA4Nux/Vnrm6x5FsZOAffWd65By0=;
 b=AgdxF2t3HYxuOCtdoqExXx9t1ceF+kb0u8MOoUMffgkVP33KaNQ5oulHorPb+yM12wuEK0NyRT6fxP7AKW+VXDO6M/7j8p3sKkernDlDajot1zjS4FzixZDpfSyDxuh/BukmH0hYX2spohSE9TrnmpoYdvpOsHf0Xk0uxHJQkWABXT+bAiYE6ztU6ys00ceRvvI7MHvfxKfFjVWfQ1ElpBb3eFGdkqIK9r226SSHHFpDabK4Ub2y20oDTbgWsElFpt0gILgWAiu2xC5Q/E6NkKOOLtiudFOTmCqkHuMLdvWkIun3Mkc93MLo0vn2P6H/4HvcOJsgQ5gcA3xPO13Ngg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=BacHihNTF2bMzOQgA4Nux/Vnrm6x5FsZOAffWd65By0=;
 b=6zZJOKx3zhQoKz8f7+yC8nxlNlAOvJsjhUfShtp5DmAneRwf8mtmr2+c6Kw/mGqqxyilz9A4MB6OPM7v9CvNb1iPi4TOpq38x5eLplH6P+y0JtLl3FgBV+T9kRyZClTBvdTJ5RJsc/UJEu0Dpz4UppHcN99ZSoD/bUg/xb03YiU=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Vikram Garhwal <fnu.vikram@xilinx.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, "sstabellini@kernel.org"
	<sstabellini@kernel.org>, "julien@xen.org" <julien@xen.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, "volodymyr_babchuk@epam.com"
	<volodymyr_babchuk@epam.com>
Subject: Re: [XEN][RFC PATCH v3 04/14] libfdt: overlay: change
 overlay_get_target()
Thread-Topic: [XEN][RFC PATCH v3 04/14] libfdt: overlay: change
 overlay_get_target()
Thread-Index: AQHYMyVnZI3aVfFucEmpq1nEsQJaNqy/AOmA
Date: Mon, 14 Mar 2022 14:55:54 +0000
Message-ID: <2F06E8B7-B1C7-40A8-8695-841B0BC1DAEE@arm.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
 <20220308194704.14061-5-fnu.vikram@xilinx.com>
In-Reply-To: <20220308194704.14061-5-fnu.vikram@xilinx.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 65199cf2-c2d0-4db3-75b2-08da05cac24f
x-ms-traffictypediagnostic:
	PAXPR08MB7366:EE_|VE1EUR03FT064:EE_|AS8PR08MB7127:EE_
X-Microsoft-Antispam-PRVS:
	<AS8PR08MB7127EF454A87E3C9B7270990E40F9@AS8PR08MB7127.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 7ExfF86OCiAnhEJ1YGRSBcxBR0M0Iagi5zgADVJkCX9B3e9d8pMreOngMh3mCLNWgRwlhqAiTjDueYiF5ENUoPVjnSEgnGsaogJMpm+SEEGtMAqyCHClZhdWWUYfDEFpcrcwiStUX0lw/V6acixljSR5ovvuEj40czSYoNL8Pur1jKI5fXh3/rxu+QsfyAmsub08M9w7edM+e9/pGmNMJqEzzab3gy+rwTICIOSordf1/4sqsKbokBeRSjMxgPDAN+badXszkVvxXxFq+PJrTL/1lhrCGlduTTb4q70OZDlyZd1WVDbRT0SPaX3r4rqRrHLdfQ18BBM/84ChoM6Gb7RUwcnq5pxf7XGz/2f4rK2ep6RtEqEcqwkF5olhbjU+Fb6A5QyWk21/T5E60nZs2o2kFDbARDtD92XddziPnj+eMgZatertro85IhzgRJOMJkYPH5CCqDDTV24ydqt31RjhVsv2hnZeiX+80xDBSLSdaQAlPwxdZ3uE2K3En/4LowgXDVYImuUnlLJ6AjLwlBzR/MQwCR0rEIKIh7GGgklEc5kqzf+2QhMD6XlRrCj/5gkO/KC42HO8jbYPHSmD+40G+UYwCnZuluA58LwWT/8mxMVTD4pS6ArOTj0aqJW92OzZ3wbvvzCC3Mi46Sk8o1RQhYJ2VSPaQsY1cnl+rfnVXP4Y66blzPBata3mg+xe+AY5YaW3s9z7WJwA+DcjUMy2fh7gUVzoGlUAocq0DdDqEDML7PhwthZ5ND672w/Y
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(4326008)(54906003)(6916009)(316002)(6512007)(33656002)(122000001)(53546011)(6506007)(38100700002)(64756008)(76116006)(8676002)(6486002)(91956017)(66946007)(66556008)(66476007)(66446008)(508600001)(86362001)(71200400001)(5660300002)(4744005)(8936002)(36756003)(26005)(2616005)(2906002)(186003)(38070700005)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <FF3D02EBAB16684F8E05B1F69AEF120E@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB7366
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT064.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	a8fe1407-23d9-4eee-ee00-08da05cabd67
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(6512007)(6486002)(36756003)(70206006)(70586007)(40460700003)(6506007)(4326008)(336012)(6862004)(508600001)(8676002)(33656002)(53546011)(47076005)(36860700001)(8936002)(81166007)(5660300002)(107886003)(316002)(82310400004)(54906003)(2616005)(2906002)(4744005)(186003)(86362001)(26005)(356005);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 14:56:02.6763
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 65199cf2-c2d0-4db3-75b2-08da05cac24f
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT064.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR08MB7127
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From xen-devel-bounces@lists.xenproject.org Mon Mar 14 15:33:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 15:33:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290278.492247 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTmgn-0005Uq-82; Mon, 14 Mar 2022 15:32:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290278.492247; Mon, 14 Mar 2022 15:32:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTmgn-0005Uj-52; Mon, 14 Mar 2022 15:32:53 +0000
Received: by outflank-mailman (input) for mailman id 290278;
 Mon, 14 Mar 2022 15:32:51 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=knG6=TZ=citrix.com=prvs=0654505ba=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nTmgl-0005Ub-8I
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 15:32:51 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 007d224f-a3ac-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 16:32:49 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 007d224f-a3ac-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647271969;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=E9OS8d9jzjZQfY6n0u6QyB/ndXIcII+2g2Wq8WAnwU0=;
  b=h2cDzYTu+u3IZhh4gsM52aduOY8gN7dL+vpy+AENMjeax+3wZOq5wKE1
   Q6VEyPPO9R4RuYbbimNWSnWFRcY8rBRICf84WczOQTXCSw6TkLBQz2PzV
   4Wl4CHXc13bSOm82CjmsKbKRRH2nOv6urdguC127eKIcp6jc/HLvkMZB+
   8=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66187930
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:tnIkdaA9I+cGyxVW/yvjw5YqxClBgxIJ4kV8jS/XYbTApGgmgWYPm
 GIdUW7TP/qPZmfzc4siYNu090MHscPRztFrQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vg3tYy6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPh98
 v8Sp8ORdTsnBYGVlL0ceTJ2KTlHaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguw5K8bmJsUHs2xIxjDFF/c2B5vERs0m4PcGgm5g2ZEVRZ4yY
 eIYOWZxdhj9cyRLK0gcFrJuv7u5libgJmgwRFW9+vNsvjm7IBZK+KjgNp/Zd8KHQe1Rn12Ev
 STW8mLhGBYYOdeDjz2f/RqEmevnjS79HoUIG9WQ9PRnnVmSzWw7EwANWB2wpvzRt6Klc4sBc
 QpOoHNo9PVsshzwJjXgY/GmiHK+lEEOBPtsL+MBxFiBk6v+yCijHlFRG1atd+canMMxQDUr0
 HqAkNXoGSFjvdWpdJ6NyluHhWjsYHZIdAfucQdBFFJYuIe7/OnfmzqVFr5e/LiJYsoZ8N0a6
 xSDt2AAiroalqbnPI3rrAmc01pASnUkJzPZBzk7vEr4tGuVh6b/PuREDGQ3Ct4acO6koqGp5
 iRspiRnxLlm4WuxvCKMWv4RO7qi+uyINjbR6XY2QcV+rmXyoSb8ItkIiN2bGKuOGpxYEQIFn
 WeJ4V8BjHOtFCbCgVBLj3KZVJ1xkPmI+SXNXfHIdNteCqWdhyfclByCkXW4hji3+GB1yPlXE
 c7CLa6EUCZLYYw6nWHeb7pMjtcWKtUWmDq7qWbTlE/8j9JzpRe9FN84Dbd5Rrtgvf3e/1mNr
 Yo32gnj40w3bdASqxL/qOY7BVsLMWI6FdbxrclWffSEOQ1oBCcqDPq5/F/rU9U790iJvo8kJ
 k2AZ3I=
IronPort-HdrOrdr: A9a23:NstrdqjdLhnWoPWiqjXpAe0Q4XBQXzZ13DAbv31ZSRFFG/FwyP
 rAoB1L73PJYWgqNU3I+ergBEGBKUmskqKdxbNhR4tKPTOWw1dASbsN0WKM+UyDJ8STzJ856U
 4kSdkCNDSSNykFsS+Z2njALz9I+rDum8rJ9ITjJjVWPHlXgslbnnhE422gYytLrWd9dP4E/M
 323Ls6m9PsQwVfUu2LQl0+G8TTrdzCk5zrJTYAGh4c8QGLyRel8qTzHRS01goXF2on+8ZozU
 H11yjCoomzufCyzRHRk0fV8pRtgdPkjv9OHtaFhMQ5IijlziyoeINicbufuy1dmpDm1H8a1P
 335zswNcV67H3cOkmzvBvWwgHllA0j7nfzoGXo9UfLkIjcfnYXGsBBjYVWfl/y8Ew7puxx16
 pNwiawq4dXJQmoplWw2/H4EzVR0makq3srluAey1ZFV5EFVbNXpYsDuGtIDZY7Gj7g4oxPKp
 giMCjl3ocZTbqmVQGZgoE2q+bcHkjbXy32CHTqg/blnAS/xxtCvgglLM92pAZ0yHtycegH2w
 3+CNUZqFh/dL5mUUtDPpZzfSKWMB27ffueChPlHbzYfJt3SU4l7aSHpYkI2A==
X-IronPort-AV: E=Sophos;i="5.90,181,1643691600"; 
   d="scan'208";a="66187930"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=PlAqaXM1DAmvayt18UpsSERCEbe0L2CRd7w3FuF1/VO84XpDR2TLY7Q5NuiEHxrQrMRohagbYHYPNu7pb6+rgtc59TsorwKOAWONenseQ7HEbAEZDMdDeeqlI9yq8cDXOkMsi/yLcIM+g3rPUk0ce1TMfJG9QTlGULTEvqFPP6zzeSmFUFzrXDyzn5mFU9RkZDfv4+qLe/DAFckWkSIIZh0LkENRQGoJZmSudR66RF5h3VX69wKz0Yz4JwvVDO4FBdpvc9Z2G66phR8PUomm1YiBBYMPYxcfbe4LqRogP7iCtu+sy0BS1JlIS3AP7x7XyD9KJe2jgyS403OEbxN1fA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=bWeRYe84E+mnxzJfF2PeK0WPHzXUiM7smqvJeYTiW6Y=;
 b=mqqETKGOYKUs/h5rQ3sBUksitZl7fHak5FBvSEnOXAdaPv49CgffbtD/8NPz3f8kuYntS7mwWH9GLgf2M16QouM1q2Q81tCo/Q0O97Hc9xrYn+jN9csFHsu2j3+Ye0IDN6lMjUv8fXtzP+DF+uWnHtbSQL3EPWq387HFVUQFWMjBNA7RQ1kQnhhsXGvJlylf/ld6HEPRZVrydIpoSJ64lrbuVsmntQD1Blg6dXi1HSFUHoGwEIeeNEoaui3Mc/0dR27HTxxxXsckRDd6rXw4b1XWcaMhDgj7cJS7JIhDNK/rTVaDfx49lHYZaHTRa8/8sQpF4oJ7vBIZy4Sp4IVj5A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=bWeRYe84E+mnxzJfF2PeK0WPHzXUiM7smqvJeYTiW6Y=;
 b=A8zSYTs/YFzzMbDX4Qpp6CjpS5sPPUicF+OhzHKC2+fht8AlQMj6ejX0aCjKL2nylwJ8C705K4nKuOTsbAvvY08RjKyzIw/EDDyBjGWgtoFq8VVeHe4u7dcwSrQnnJl4eZMu8w4jDbDFC9pGn0j/iYagLOC0ClORjiBIU3DxJME=
Date: Mon, 14 Mar 2022 16:32:26 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH 3/3] amd/msr: implement VIRT_SPEC_CTRL for HVM guests
 using legacy SSBD
Message-ID: <Yi9gCkK3Qhr3awNI@Air-de-Roger>
References: <20220201164651.6369-1-roger.pau@citrix.com>
 <20220201164651.6369-4-roger.pau@citrix.com>
 <63da71fb-820f-bab5-4cec-f9ec54ffbce1@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <63da71fb-820f-bab5-4cec-f9ec54ffbce1@suse.com>
X-ClientProxiedBy: MR2P264CA0064.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:500:31::28) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5b0da6f5-4bde-4893-167f-08da05cfdb72
X-MS-TrafficTypeDiagnostic: BN3PR03MB2387:EE_
X-Microsoft-Antispam-PRVS: <BN3PR03MB2387E5E3B31EA141E98254CB8F0F9@BN3PR03MB2387.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(6666004)(8936002)(66946007)(38100700002)(53546011)(508600001)(4744005)(6506007)(5660300002)(26005)(66476007)(66556008)(82960400001)(85182001)(186003)(9686003)(6512007)(6916009)(6486002)(54906003)(2906002)(33716001)(316002)(83380400001)(4326008)(8676002)(86362001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?ekthNmRRM0ZGalpsT01aT050Rk9nSGxuWmM1dXUvYU9TL0lQSndLR1NlMy91?=
 =?utf-8?B?dGN4WGF2MHhFWCt4Q3lJS05hOEljMVAwUjNGZ0Mxd0o5WEl2Vk5UZEZqSzZU?=
 =?utf-8?B?WHdWaG9JWFFKN0ZqQXRjNXhQY2lubWJTRGZqNkVVMkZTNXhDN0tUMjhKZXNB?=
 =?utf-8?B?SzdsZ01rNjlMcmlSWlBEaUxod2xuZ09QZDhjWTRObGIzOUhPZ1ZwdDdZSDEv?=
 =?utf-8?B?bnBENWNGditySHRGVUJLNysrb0xRZDIzZlp5ZmNJTHJiWVRURnRzQUY3U0JO?=
 =?utf-8?B?QmszakZWdVh3OWt6QVk5UkRESGFRazBpVXpzTzBTTzZvVVgxZkNoS21hTkIy?=
 =?utf-8?B?V0VoMEhQZXlXOGxkUFErNW91Y3Z0amF2Q3VodkJ0WHYxMGFzV1B5b0IyWGhZ?=
 =?utf-8?B?T3FydzJnd21seXBYc0kvZUtBSzNlS3JaS3ErV2FmalcyV1dqVEpza3Q0WXpM?=
 =?utf-8?B?NUNGRTQxT2x6RVZZWklWL3JBSlZDU0tCWDhuZ0Q2SkVmaFBFUjBRM1F1amlr?=
 =?utf-8?B?cVIyL3lRbGgrSVJNV3lZWW9GTlJud0o5WnlMVGhkUEg2UVlUNjJDeS9ZZUpR?=
 =?utf-8?B?cHMwNXhaS29sUUlYRjNDRkQ2RVlJejRzd3JYdFFzYkZnR2pVUTFFam1zTm16?=
 =?utf-8?B?WmQ4VlgrVGZ6anNCeEVXMkpTeFp0WHNrajNPSlljS3Vua2J2OFVpR2xIMFBj?=
 =?utf-8?B?b0l3QVlWWkN3MC82eTVkUXNVclRVS1dZTHBReUJHcnk2MFpXeFlTZEsvUzV2?=
 =?utf-8?B?RlRyRXU2Mnlsa0k2YUJJaHBHSGR4ZE5WNUZhS3l6MDRSZlFyR003RU9lMzE4?=
 =?utf-8?B?UzY4WW9iWU13eVRDWGgyQ25pZEJDOXBpODVtRkhyYmk1Y0podS9BUHpyYm5T?=
 =?utf-8?B?bDA2bGtsdXk0TnoxQTBUUmNHaDVpak9hN1llZjc5cXQzSldja3lmU2IzZ0M5?=
 =?utf-8?B?aExRZDdjY3hIbHJocDVXY2plUDFuTXlmcDd5dnc1K2JTNVBOWkxlRElObU1o?=
 =?utf-8?B?SW1ibmUrdS9OYmFtL1R2Zk5RRzcrcUlMNzhObmYyVForVGlSVXlNdHQwYU9G?=
 =?utf-8?B?LzNzOEx3Z01jdkRDQWRWd3JZNzh3NitBbXlkNlpqQ2dRK0MwOExlYVB0RjZi?=
 =?utf-8?B?SGFlcFpMNXl0MHF0UjV2RXp3M2ZUTnRpaERiUDNnNnY0OHdJTXJFcG1TVnJ0?=
 =?utf-8?B?ZllPL3pLSWp2VFB5UjZvblJoUTVjNjl6TUdSN21XbWJCWWlHcVJZdlB2V2gv?=
 =?utf-8?B?dVFqcXNYYVd3ZC9jMjkvZmpORndYcjIyc3NOcXNxSklqWE9RaENBcjV5Q2Jr?=
 =?utf-8?B?V1g5NFYvTFB0QTFPNDZFbTRGckFFOFZ6YXVRMURyQ2dscVJQNldjY0pJRVg4?=
 =?utf-8?B?azlwZkg4M0h2MmVlbngvM2lXMVAreFZFNlI5Q3VSTW9wcVFrZjN5cEJla2xm?=
 =?utf-8?B?eVNTZWdXaVl4ZWgvM1RvVjJpa0xWVG9nTUpvTDIxZ3FjSHBxbEI2T3N0TmU5?=
 =?utf-8?B?blVrc2VCSnhMUTBSNGxrTjNzWkxVMU1RRUdYbkVUY3pjazJkM0NYb1RzdmNB?=
 =?utf-8?B?S3FnS2tKb0pHZUoyMENOdmJ6Vk5qbjhJcHdOd3RZSXoxVHJIRW0vNDZZbHF0?=
 =?utf-8?B?Vk1RUnB3UHhzL2NaSEt1S0RLZElrYkhheHI1SmVEeWxTQm9wVnJvUCtNZ3hl?=
 =?utf-8?B?RFNCSlpOWlhXSEQxZkNOY1hsOHJ5azB2T3dtckcvQWI2YmRYczhkMDIrQkRW?=
 =?utf-8?B?QW1nTEc3R1RrRHJnOWFwQkkyNkdnUWlkWDZxRml3ODdCSFhyclVKeE1BdEhl?=
 =?utf-8?B?aDBvcmRZRXhUNzVCanF2bVdEaFljTTU4eHZYb3FUZ0ZQMGkxUFd6cVNZUzdR?=
 =?utf-8?B?aFRDbTFPUFJhS2N3MFVCQXZMZ3FEWDdVblZESXRQOXExZnhNS090YXUxM1VC?=
 =?utf-8?Q?dEGyGbtDHu9KoYvcDWzjTSK4o6dTJquC?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 5b0da6f5-4bde-4893-167f-08da05cfdb72
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 15:32:32.5808
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: CjmDSO4WH8hIvkEzGtO7L8nMC7yuKOTZftvN6jgf5CIrWjf/SmZ8PVM1kNp9Tg+7JyQt19MJMINeF2ituJlkOA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN3PR03MB2387
X-OriginatorOrg: citrix.com

On Mon, Feb 14, 2022 at 05:44:01PM +0100, Jan Beulich wrote:
> On 01.02.2022 17:46, Roger Pau Monne wrote:
> > +	ASSERT(core->count <= c->x86_num_siblings);
> > +	if ((enable  && core->count == 1) ||
> > +	    (!enable && core->count == 0))
> 
> Maybe simply "if ( core->count == enable )"? Or do compilers not like
> comparisons with booleans?

I had it like that, but decided to switch to the current code just
before sending because I think it's clearer. I didn't get complaints
from compilers, but I felt it was kind of abusing to compare a boolean
with and integer.

If you wish I can restore to that form.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 15:36:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 15:36:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290284.492259 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTmjz-0006BN-Sm; Mon, 14 Mar 2022 15:36:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290284.492259; Mon, 14 Mar 2022 15:36:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTmjz-0006BG-P8; Mon, 14 Mar 2022 15:36:11 +0000
Received: by outflank-mailman (input) for mailman id 290284;
 Mon, 14 Mar 2022 15:36:11 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=J1jB=TZ=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nTmjz-0006BA-6r
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 15:36:11 +0000
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur02on0617.outbound.protection.outlook.com
 [2a01:111:f400:fe07::617])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 73a96c44-a3ac-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 16:36:01 +0100 (CET)
Received: from AS8P251CA0026.EURP251.PROD.OUTLOOK.COM (2603:10a6:20b:2f2::17)
 by DBBPR08MB6105.eurprd08.prod.outlook.com (2603:10a6:10:20d::11)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.21; Mon, 14 Mar
 2022 15:35:59 +0000
Received: from AM5EUR03FT044.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:2f2:cafe::b2) by AS8P251CA0026.outlook.office365.com
 (2603:10a6:20b:2f2::17) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26 via Frontend
 Transport; Mon, 14 Mar 2022 15:35:59 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT044.mail.protection.outlook.com (10.152.17.56) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Mon, 14 Mar 2022 15:35:59 +0000
Received: ("Tessian outbound 826a6d8e58c3:v113");
 Mon, 14 Mar 2022 15:35:58 +0000
Received: from 27c59a146418.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 7BADE2D3-336A-441F-83B1-094EB06F7971.1; 
 Mon, 14 Mar 2022 15:35:49 +0000
Received: from EUR03-VE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 27c59a146418.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Mon, 14 Mar 2022 15:35:49 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by AM0PR08MB4082.eurprd08.prod.outlook.com (2603:10a6:208:12e::27)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Mon, 14 Mar
 2022 15:35:45 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 15:35:45 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 73a96c44-a3ac-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=mkD05uplLEp7mBYLZoJBUEKsIlaEpaz0CRsM2QYgifY=;
 b=7/fEreNmGOVtYHeiAQjfsDN2OHmXjgOL3ym5GoOJ3gQrdlKF75tzEjd3HTNiWrFi9Q8eVxWsSqW++GZC6kVMoEruJgAQmgC7CV3Fmvhwyxu9VWl4wHOjB4M7tBPvpNNgMfoeS3M06thMee3t1m9F2XAC3xfz2bsE2UKH+4e/6pI=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: bc7e1ede03485260
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Mjt+0pTtt5hY+qXuaSUD5/aa5r/3UqgrkNj1tMOm3osRtHMcB00Q5qCwytDJ2phzpfLi+nYdJxPqdE9R49O3qis3LHXgqRy9Dhc3K3I0fgu2KwXyuNNDTXTdeHTi2ixAuaq4enSFVDaOllNvNcvoI+1doJiE/BeJB2FnlJ/TwmVcabrb9SPqSomKCIJAjUJi8YQZpzAZGbixfUXeRx25b5tbftyNCsdVWn+lO9nUYCu4cATtPtJEtx1deDAkTNsC7XDU+Q4y2nWMmTJlGE+aSXa9i85EQV5CjmUy0UijWUWCtW4iBM0OToCtSkaBSBUdYCzzYy2/aao55/oj4tkTMg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=mkD05uplLEp7mBYLZoJBUEKsIlaEpaz0CRsM2QYgifY=;
 b=KOWgfvyPnSj4JUpAAX550c01D8Etxxd2bDqgP05/hxgL9OoS+FBfRiIkMZQ6SKwsUOp/xEPzBuRx02/2/P7pboAO3WkQs64Gm96CrbM/QslK4NDNrZNBQzwabeTdwRzBIr3nCQqfQQFHdPElhJAXCw7UxOnlHXB5KZ7WCal/UCvmAlLSN9PUGh16O9FBCmYL+/Hf0pxZOxkXy7qtd+YRP5zYT0RvPOE22nUtA8mncJeqSgmWkQL5iYYKH3dF72cadXTE/nGUmnX/ziaOn68rRi3sVkgaAwA37t9ughGIBVEKFQ/R/fqs+eCZ+RHEEUp9+WMsvuJir/0VgE50WAWdqQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=mkD05uplLEp7mBYLZoJBUEKsIlaEpaz0CRsM2QYgifY=;
 b=7/fEreNmGOVtYHeiAQjfsDN2OHmXjgOL3ym5GoOJ3gQrdlKF75tzEjd3HTNiWrFi9Q8eVxWsSqW++GZC6kVMoEruJgAQmgC7CV3Fmvhwyxu9VWl4wHOjB4M7tBPvpNNgMfoeS3M06thMee3t1m9F2XAC3xfz2bsE2UKH+4e/6pI=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Vikram Garhwal <fnu.vikram@xilinx.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, "sstabellini@kernel.org"
	<sstabellini@kernel.org>, "julien@xen.org" <julien@xen.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, "volodymyr_babchuk@epam.com"
	<volodymyr_babchuk@epam.com>
Subject: Re: [XEN][RFC PATCH v3 05/14] xen/device-tree: Add
 _dt_find_node_by_path() to find nodes in device tree
Thread-Topic: [XEN][RFC PATCH v3 05/14] xen/device-tree: Add
 _dt_find_node_by_path() to find nodes in device tree
Thread-Index: AQHYMyVuH8IU/vkP80S9r/WX11Sag6y/DAsA
Date: Mon, 14 Mar 2022 15:35:45 +0000
Message-ID: <238C7B4B-B1DB-4870-B7DD-979749FBA977@arm.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
 <20220308194704.14061-6-fnu.vikram@xilinx.com>
In-Reply-To: <20220308194704.14061-6-fnu.vikram@xilinx.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 88e132d7-6eff-488c-dcaf-08da05d056a6
x-ms-traffictypediagnostic:
	AM0PR08MB4082:EE_|AM5EUR03FT044:EE_|DBBPR08MB6105:EE_
X-Microsoft-Antispam-PRVS:
	<DBBPR08MB6105F1D52B7D8AAE270D7EADE40F9@DBBPR08MB6105.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 3/dURJA+JJrRx3+Fg6laI5p57Lu8wGeGO68YyRLH1T3jLb/5xGcqdtufMt7SwGZKmVdsOaLbreILotmyCJx9iMiR8a0VziNg0wBYH6dyKtd4zo66YzwOq+j88KRlYVjIeeSEhdAfyGoSaizaD/6LLMNkCFpMjHxZTFmRWwarhchWTTiTnEw9ubR0PIhapYJCOhxM3y1vRm0tcxenqpDutnqJN6yq7nIkkpkxTbs/wVC4XpgDzwrCeR6vGYIEBLs+od6wt8JiyTgxckUBb6X5EiNp8JxV5J/TxQCuwbKG+Fng68LXAMqXRnvvPXI8AUou5j7NuYOpJTJIx7a0kvqaftTkfQAXEIgF4fnmxIk/AqC2YF3ewoGWRMFSH1EWRQv8qnmuCBpiS8GhNkHn6QQmsq1ILuW4Pou+2dliUyxZ+o8MqQfjI8az2Sq1V55w1uYYnEtqcZCgWYGMOTYx2D4/ySpoOaYXT9Zuay+wfa1VA5mkH/EDWuDLjOY3WNnZudrp2zpIpUahhg0xgWfJTWoX7CvvXJ3FdigLuDMpzN7dp4vOicCSM146NCxScdaBua5R6s+rPl9u0vuRGjYC2Doc4swo0bk0ZU/zrAaOi9f2lCqS/mE/WGHe10M7HcVLjSdiusEuTx+8WgHVXLjg/sHSXwCPpRq4ZBU2w++o7WgMa2WBRQmSbhq0nMOEMV1XEW26SERSEnvqm1dCN0aNFCXBl1rpzSnviHzDcD0DCEo/LGpWwGFpTWElMF6RwcUr5pBUGrcj3wf6CycV3q2BV5sSrg==
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(38070700005)(86362001)(38100700002)(122000001)(66946007)(66556008)(66446008)(91956017)(64756008)(66476007)(6916009)(316002)(4326008)(5660300002)(76116006)(8676002)(54906003)(2906002)(83380400001)(8936002)(36756003)(2616005)(186003)(71200400001)(26005)(6486002)(508600001)(53546011)(6506007)(6512007)(33656002)(37363002)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <D9A5AB5386FAA24D96D837B6CF227DA8@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB4082
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT044.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	1dab651c-d19f-407a-76cf-08da05d04e5d
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(83380400001)(36756003)(2616005)(107886003)(2906002)(6862004)(4326008)(8676002)(70586007)(70206006)(186003)(26005)(336012)(53546011)(508600001)(6512007)(6506007)(47076005)(36860700001)(8936002)(82310400004)(33656002)(316002)(86362001)(6486002)(54906003)(5660300002)(81166007)(40460700003)(356005)(37363002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 15:35:59.0677
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 88e132d7-6eff-488c-dcaf-08da05d056a6
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT044.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB6105
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From xen-devel-bounces@lists.xenproject.org Mon Mar 14 15:45:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 15:45:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290288.492270 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTmsz-0007l7-Ps; Mon, 14 Mar 2022 15:45:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290288.492270; Mon, 14 Mar 2022 15:45:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTmsz-0007l0-M4; Mon, 14 Mar 2022 15:45:29 +0000
Received: by outflank-mailman (input) for mailman id 290288;
 Mon, 14 Mar 2022 15:45:28 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=J1jB=TZ=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nTmsy-0007ku-2j
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 15:45:28 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04on060b.outbound.protection.outlook.com
 [2a01:111:f400:fe0d::60b])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c4a5d91f-a3ad-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 16:45:27 +0100 (CET)
Received: from AM5PR1001CA0014.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:206:2::27)
 by HE1PR0801MB1929.eurprd08.prod.outlook.com (2603:10a6:3:50::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26; Mon, 14 Mar
 2022 15:45:21 +0000
Received: from AM5EUR03FT055.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:206:2:cafe::5d) by AM5PR1001CA0014.outlook.office365.com
 (2603:10a6:206:2::27) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.20 via Frontend
 Transport; Mon, 14 Mar 2022 15:45:21 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT055.mail.protection.outlook.com (10.152.17.214) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Mon, 14 Mar 2022 15:45:20 +0000
Received: ("Tessian outbound 741ca6c82739:v113");
 Mon, 14 Mar 2022 15:45:20 +0000
Received: from 8e710da06b42.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 8E841923-5AAE-4233-BD26-D781D33A611E.1; 
 Mon, 14 Mar 2022 15:45:09 +0000
Received: from EUR03-VE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 8e710da06b42.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Mon, 14 Mar 2022 15:45:09 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by AS8PR08MB5912.eurprd08.prod.outlook.com (2603:10a6:20b:29f::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Mon, 14 Mar
 2022 15:45:07 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 15:45:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c4a5d91f-a3ad-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=TSP5qxlPbkb/wXyKUn/g/JMQjPLtHaHj4o2z7D2JHCw=;
 b=DjnDpKQUrm6mddzSFCONnTG9GjOGneyPbGRJTXavHBz2PgVlJVGXeL8CTzbDXgMrQloNSTsqnCAFxK4NuhygB/Ckq4DlgZr9LJ6qxQk90mB5GY3h2eXieGtW4kIiKHNl71EbEtyugLK7UIpJCW2vOpqc3eI9wZ1toyRFFHlR9VQ=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 9724f29130723f29
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=CkK7t25wch+alkNli+y0EDHQo2ZcxwIlOPtDU75LT2fsKG6Z6wNlQraUrHdjnkZun7nsTraP8uRUxVWdZFkDASRGQpxQtlrJ6XOu53j7QaejheSYXy5JJOqRdzas1Oz5UrKGD46bA/vEPJFAV7wFezjn4YBYY7b4PXgLWGtvmjuvMxKyytxl1FBZDBmioFaUScprg3I52X10h3KLrNegeFgifh7wlYjk4MGbJBVx2Kkt8sq1OlZsX2Qnxlpo3vXym4wRfnxnSybEmJi1jRrpm6nGLsFRQKJCg5zStgMfsM0wjkCS44DMo9EzrY8jCRl1UTIZrAE0uQLsSeDojZg+xQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=TSP5qxlPbkb/wXyKUn/g/JMQjPLtHaHj4o2z7D2JHCw=;
 b=JDyFaoHq6Km/WPKKuPSbjVjzZst/dL+bgb/f/vReE9rP61ZNAZSKHaItRhOWvaV+II5Q9UAumXdl4FZz6PMNIU/tMeRG7MhDKypNOo0TYcaROUQRGvCSyulm23oGIFyE/EJEyNX3+rWBiav+vESnUQ1HjUKbs+eug1GMBFKkNQHnTEOSoYeGdQd2yX1uLqNIBcDcLuOzPFtnjheo7fM21jm49Y+qKBrB3imFi3FsC8u+n4nZjJt5+/LVZYgpmNAdRNcfZZXUckxYX0LwZ6WcDXrIFBYqmz9SFRkonQuoKH3LJNfQEKwVfsU2UBpahQgFHPfgzKpu0hApebaiVkq81w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=TSP5qxlPbkb/wXyKUn/g/JMQjPLtHaHj4o2z7D2JHCw=;
 b=DjnDpKQUrm6mddzSFCONnTG9GjOGneyPbGRJTXavHBz2PgVlJVGXeL8CTzbDXgMrQloNSTsqnCAFxK4NuhygB/Ckq4DlgZr9LJ6qxQk90mB5GY3h2eXieGtW4kIiKHNl71EbEtyugLK7UIpJCW2vOpqc3eI9wZ1toyRFFHlR9VQ=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Vikram Garhwal <fnu.vikram@xilinx.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, "sstabellini@kernel.org"
	<sstabellini@kernel.org>, "julien@xen.org" <julien@xen.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, "volodymyr_babchuk@epam.com"
	<volodymyr_babchuk@epam.com>
Subject: Re: [XEN][RFC PATCH v3 06/14] xen/smmu: Add remove_device callback
 for smmu_iommu ops
Thread-Topic: [XEN][RFC PATCH v3 06/14] xen/smmu: Add remove_device callback
 for smmu_iommu ops
Thread-Index: AQHYMyV2HGYvXqb6DEeqlGy6Hds1/ay/DqkA
Date: Mon, 14 Mar 2022 15:45:07 +0000
Message-ID: <1373EBBD-1145-4608-B236-0047C4B5FFB2@arm.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
 <20220308194704.14061-7-fnu.vikram@xilinx.com>
In-Reply-To: <20220308194704.14061-7-fnu.vikram@xilinx.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 47d6970b-14ca-41b0-2afa-08da05d1a589
x-ms-traffictypediagnostic:
	AS8PR08MB5912:EE_|AM5EUR03FT055:EE_|HE1PR0801MB1929:EE_
X-Microsoft-Antispam-PRVS:
	<HE1PR0801MB1929651622C25E30059EAB5DE40F9@HE1PR0801MB1929.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 sboyCVtszvbMchj9RBv34qpp855EzLFWB4rHJ1h964plnD+DRI/bwHKPi9YCX+PSlwpHWwfg+GwhyvjyfTPVe26pPnki4iRPIvWcd7r6CzPZ6nIEnIhXVbsPc8a51HF/qtNOoAtFJ0d5/jB0UR0xGydL5CIICaCBPgAnmPor4HJoylyVDMGTMdp8scnn4y+UZAaVTuTgurD4iBEJs1+NMtZ3gLQprBYYA0ulVHS9L4AYWyxdZnNJrtEFNC5w9cOTEInKuKUxnqNEjE/WtLaXdobrEc8YO1PnfXetMBYWtVOfR7axaP9CbEvCBD7JIVX3Rrl8gbIVHevSM/VbZ+FqmlxrOc6bVIsHQ/zH6LDh1uA87VwmS6UUKZXZEAN0UJg9F3p9qQYIPvx6lZsj7gqe7uMov9ILOPgua4FctgcqDP/CLyhU3fyCsHnnpUesINKYS7gxQbrciE2/ICmQjsDn0YS+L9d9Kw4yTVHRtUzhFFIdGQKKZMCSveiR4VvXwfrXuDWZ4nvopQFX+hSvdIPL/iDJuwm7+h6wv3kiUmaH66wDTGpNHJJgMjlJ+tIlbamxWwgvrgoU0tqDzxas51DyiFwg+UUHdo0JlQFopCj6qHHM4GKwjtmRr1MTEzOqjY4HB8o9Dxl2UVEyjhfTTLHbTw3WpjoFDysgvQCsbaeGsR2G8oEL0AXRLAry7lKZJKID6XCxiViPtKQLRNPDoqBBspagabvvDE3ISRcBoMQE02/xj1rTpT7Cohs1lYEep7XO
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(71200400001)(33656002)(54906003)(508600001)(6916009)(38070700005)(6486002)(4744005)(5660300002)(316002)(36756003)(86362001)(8936002)(38100700002)(66476007)(6506007)(8676002)(64756008)(76116006)(66556008)(91956017)(2616005)(53546011)(66946007)(66446008)(4326008)(6512007)(122000001)(2906002)(26005)(186003)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <A4BB5AB6AD221247BD43AFD290F06A62@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR08MB5912
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT055.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	45580a40-6ad0-4ace-da33-08da05d19d62
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(26005)(4326008)(82310400004)(6512007)(33656002)(86362001)(336012)(2616005)(107886003)(6862004)(70206006)(70586007)(186003)(54906003)(508600001)(6486002)(4744005)(356005)(81166007)(2906002)(36756003)(6506007)(53546011)(36860700001)(47076005)(8676002)(8936002)(40460700003)(316002)(5660300002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 15:45:20.9255
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 47d6970b-14ca-41b0-2afa-08da05d1a589
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT055.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0801MB1929



> On 8 Mar 2022, at 19:46, Vikram Garhwal <fnu.vikram@xilinx.com> wrote:
>=20
> Add remove_device callback for removing the device entry from smmu-master=
 using
> following steps:
> 1. Find if SMMU master exists for the device node.
> 2. Remove the SMMU master
>=20
> Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com>

Seems ok to me,

Reviewed-by: Luca Fancellu <luca.fancellu@arm.com>




From xen-devel-bounces@lists.xenproject.org Mon Mar 14 15:52:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 15:52:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290292.492281 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTmzp-0000u4-GB; Mon, 14 Mar 2022 15:52:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290292.492281; Mon, 14 Mar 2022 15:52:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTmzp-0000tx-DJ; Mon, 14 Mar 2022 15:52:33 +0000
Received: by outflank-mailman (input) for mailman id 290292;
 Mon, 14 Mar 2022 15:52:31 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=29fN=TZ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nTmzn-0000tr-J0
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 15:52:31 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c10d779f-a3ae-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 16:52:30 +0100 (CET)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2056.outbound.protection.outlook.com [104.47.14.56]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-23-wDLHUocZNVyyjx1CPQF_WA-1; Mon, 14 Mar 2022 16:52:28 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM6PR04MB4856.eurprd04.prod.outlook.com (2603:10a6:20b:b::13) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.28; Mon, 14 Mar
 2022 15:52:27 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 15:52:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c10d779f-a3ae-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647273149;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=gi0kvoCeGznfWH/zlTRfHM4dCGkcCkj+iXUc8/BeZcc=;
	b=IumD+gmjk8eueQtHZJw0TgoL8o3Ne0rgnuTaPwXJ80f8vfeAdIjKLeartnDOTzBhA/o2Nk
	SFEpBYBCTa6gt+NQiabyMlt99q8aQHR9/EdGdUD23ZY9IO98iiY0uDxagz7HCoVjXcqrs4
	YwmSzKdJ4ugZXX1l5tJ549nPlUIgWJ0=
X-MC-Unique: wDLHUocZNVyyjx1CPQF_WA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=MwiNYeFQuUoGS8s4knv1aES06J5OijafuATSUFN/qL6XFGc4hrmzMiz/vpALA4xO6sfVr7T1/u49m1ucE8VD2UX19A5YVs5Ecm1V4Q8g1iJtKFo+cAf5MgYNO2UtJNiodWClhqFDiGcmFcQ0o17PYl5iALhQc6UIZoloNTJEyR4z+skOEwki61Sp2gEmbEl/kQ9zPYNqFzw2FJF471M09e9uX8gJg3pjkQpLVksc9EshC/l7ezLeCt42vV6mRe20W6Lr9vrbv26yK7xDq9OqmbjCtMcbeXGqqXJcFa5GSVRLAjKbDWsEv+12BOHq8bGDrTi7CpoMUd2qxT3PPYIsrw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=r6vE5WWcQP6eabTvZAxGrySwv542C5lwLueZFCRXq2s=;
 b=AK++5qtpy54MBt4Rye3dyKe0Ze8oS/s8U8oCTIuf7omptJkv9Kud5idKGN0XI1JTRQEg6npFhA27kjpm6MdPC2Zb/cffdSVka3Qm9l7UO0WVlb9h0/EYP3Y/Ym1Ajpw8W/lvabuSojLZkK6Z6I9+X2gRtYMVGR5U5AAdGQ0yLhuXgIvIy0a0+vAYrvbyZrOSexsveeHuEo7jfpNS0LAfhYqZ+TVyMk2uCh4OWVjjgmdtdSfiuNjggPVY31bDvRYLfyBqXk2RRQxcfkZLHJS2fA1wir5HQ3F7PnZcKo8KU72CxvGnu613RPiuOEh8G3Da+sUVIDDI7Y9D+r4b7gE7Qg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <0b463533-3070-9de7-2fa8-bc502d47f748@suse.com>
Date: Mon, 14 Mar 2022 16:52:25 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH 3/3] amd/msr: implement VIRT_SPEC_CTRL for HVM guests
 using legacy SSBD
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220201164651.6369-1-roger.pau@citrix.com>
 <20220201164651.6369-4-roger.pau@citrix.com>
 <63da71fb-820f-bab5-4cec-f9ec54ffbce1@suse.com>
 <Yi9gCkK3Qhr3awNI@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <Yi9gCkK3Qhr3awNI@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR07CA0026.eurprd07.prod.outlook.com
 (2603:10a6:20b:46c::31) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0bfb1e30-9e22-4fab-d9a4-08da05d2a363
X-MS-TrafficTypeDiagnostic: AM6PR04MB4856:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB4856242359DE58FE8D82186EB30F9@AM6PR04MB4856.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6506007)(53546011)(4744005)(31686004)(66946007)(2906002)(508600001)(36756003)(31696002)(8936002)(66476007)(66556008)(5660300002)(2616005)(38100700002)(26005)(83380400001)(186003)(316002)(8676002)(54906003)(86362001)(6486002)(4326008)(6916009)(6512007)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?0TqEUSOc5uQCONIY+VGb0WNNvhKXYOo6QisQdmtRqCvPucYIh0OsG2hCL6PI?=
 =?us-ascii?Q?/9lHCDMMiHOtnhRJjgGdvtvnzsnMj/3KEX82ArtNBi1bNEF5Uit2nRNXkC17?=
 =?us-ascii?Q?ElXSpx+EZec+O8v3KPSmyLNyQVvVwpMPO+KZVv4z8+4SxdQtPvtpelJ/vQh9?=
 =?us-ascii?Q?BU3jxnwdzOR7B9rp6PK537IrGH5Hxexs+Dp4ZMoKF7k8M9LxG+bFQbkI45I3?=
 =?us-ascii?Q?vKdL7TpueXAgw/T7fh04mkSrpYym/6Ykug/3Q5i3JKwUOD6QWHoyGR6+4BWT?=
 =?us-ascii?Q?UYSIq2HGgE43wONoKfztfXCr5QrPXhnVQiP3Lo5a/91Uf6dycH7JWE9PUk9D?=
 =?us-ascii?Q?Zb7vAWebPhkLYAABjIsDmXd5r1qcm9sf70o2zauv4YvJTnbTWxsQFqo7t+9U?=
 =?us-ascii?Q?KfvTexDji7vLRjrEHX6TsppMBp5XiTQcqZZ5lZLzmCGp2DW7+GoJAb9EWkM/?=
 =?us-ascii?Q?VYUaqdmIYrvnDFTibrzR+xzpYaE0UjPV4KzC35f0bQselfdyBzcpJoabW3Mm?=
 =?us-ascii?Q?TTXggZmt36pEBAGE57i/lXgVTvccnhCqkrk2O48HEMOx1RPhJbBqQS17K8Cu?=
 =?us-ascii?Q?wB6UWYldP9KnN5AYbMErP8z/oQ+H1APsKthugnY92qd6Ak6xOfEnk5kT4Yrx?=
 =?us-ascii?Q?kxYb8uJ/TLWr8fjcAmVqql3PMd2jr8dIyhh8WuHE9hQJvQkLMCDBF12/A1wX?=
 =?us-ascii?Q?gE14U3jCwAENKiCHJVW+SCNUB2Eg6YhQyGKCqrhu0DB/1YWcfE9RrxLLRjV8?=
 =?us-ascii?Q?6cqPO1h/ZRmDljEhgszIrJVxLylktpqzr38WS25eR5KWwVnRG2Y02t6xITKl?=
 =?us-ascii?Q?25w4iyrOHzihqOIAkqYOrAvcciO3myBMoLYkQ1A/M/4E4vcZQEfHxBPKuaMN?=
 =?us-ascii?Q?Kquk7B7LXqUXDUk0bbPyreoism8Ljblk8PHGy7HRro7krapZ3vtYhPkJAYcx?=
 =?us-ascii?Q?NWXfKPvjfVVHMLOZ9MhfDJMmYVkJK3PcrEu+tuYzVfxek3wnrT8A0Lv3ZF2B?=
 =?us-ascii?Q?Db3/yOOcEUo5EHh1GvGso4fhM7jZdamIDjWB1pN2pT33BjAPxoPHamBdi2+4?=
 =?us-ascii?Q?+7fHoPYKXJFXz0/NCY1c9GAiuGVf9Nt11+6P5H5XDXZK9/rtiKjcz236y5SC?=
 =?us-ascii?Q?JiJ0rMDaOrWsWQ0eu58fMXMhhi9nzbK5Ykwy9p5+IB9DmxMh6IUEmFuKBRvs?=
 =?us-ascii?Q?WEtfKnY+T6X73YY47RGqzIYytCG04isDLg4A2PDjCWYlf7K97FXqM+K5qN6g?=
 =?us-ascii?Q?XHBoGSF1sp4iGUnfudWfautRUMlT624Nmk2oP9qpG0sPThdlqkc2mKGf5Nfx?=
 =?us-ascii?Q?en5Sc98PQqsaFFjPL23FZuvImWiXVyolCjSWbaJyqM2PQN6PfU3Uwp9SpPep?=
 =?us-ascii?Q?TnL2S8t93opkAjgQ+tMVbo3zi66aPt0+2hbd1WZSD+ZD6v5+JzA1kT+DvL+J?=
 =?us-ascii?Q?BeUxiUg1fh4PsUL7ALqJcufqLwjRxlZR?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0bfb1e30-9e22-4fab-d9a4-08da05d2a363
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 15:52:27.0097
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: lPjde4ebsSIyI2kV1JlfyPKscyyXfhuJ82/KWCXIYzDFuIrzHx3qv/mhQ3rJdEnE25aSfFLtq4+i748F1tCXSw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB4856

On 14.03.2022 16:32, Roger Pau Monn=C3=A9 wrote:
> On Mon, Feb 14, 2022 at 05:44:01PM +0100, Jan Beulich wrote:
>> On 01.02.2022 17:46, Roger Pau Monne wrote:
>>> +	ASSERT(core->count <=3D c->x86_num_siblings);
>>> +	if ((enable  && core->count =3D=3D 1) ||
>>> +	    (!enable && core->count =3D=3D 0))
>>
>> Maybe simply "if ( core->count =3D=3D enable )"? Or do compilers not lik=
e
>> comparisons with booleans?
>=20
> I had it like that, but decided to switch to the current code just
> before sending because I think it's clearer. I didn't get complaints
> from compilers, but I felt it was kind of abusing to compare a boolean
> with and integer.
>=20
> If you wish I can restore to that form.

Well, if you don't like that alternative form, and since I don't like
the redundancy, how about

    if ( enable ? core->count =3D=3D 1 : !core->count )

? It was actually via this transformation how I landed at what I did
suggest.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 15:58:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 15:58:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290298.492292 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTn5m-0001kC-Av; Mon, 14 Mar 2022 15:58:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290298.492292; Mon, 14 Mar 2022 15:58:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTn5m-0001k5-7n; Mon, 14 Mar 2022 15:58:42 +0000
Received: by outflank-mailman (input) for mailman id 290298;
 Mon, 14 Mar 2022 15:58:41 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=J1jB=TZ=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nTn5k-0001jz-VV
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 15:58:41 +0000
Received: from EUR01-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur01on0608.outbound.protection.outlook.com
 [2a01:111:f400:fe1e::608])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 9cd032c8-a3af-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 16:58:39 +0100 (CET)
Received: from DU2PR04CA0055.eurprd04.prod.outlook.com (2603:10a6:10:234::30)
 by DB8PR08MB4058.eurprd08.prod.outlook.com (2603:10a6:10:aa::18) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.25; Mon, 14 Mar
 2022 15:58:36 +0000
Received: from DB5EUR03FT040.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:234:cafe::25) by DU2PR04CA0055.outlook.office365.com
 (2603:10a6:10:234::30) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26 via Frontend
 Transport; Mon, 14 Mar 2022 15:58:36 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT040.mail.protection.outlook.com (10.152.20.243) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Mon, 14 Mar 2022 15:58:36 +0000
Received: ("Tessian outbound 63bb5eb69ee8:v113");
 Mon, 14 Mar 2022 15:58:36 +0000
Received: from dba508e38c02.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 E28E4428-10C7-4889-AA68-207655280CAB.1; 
 Mon, 14 Mar 2022 15:58:26 +0000
Received: from EUR01-HE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id dba508e38c02.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Mon, 14 Mar 2022 15:58:26 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by AM6PR08MB4167.eurprd08.prod.outlook.com (2603:10a6:20b:ad::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26; Mon, 14 Mar
 2022 15:58:22 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 15:58:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9cd032c8-a3af-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=tZ0teu4xHkZMW5oIDulrSlOAgq2X79hUYcgZGFr32Fw=;
 b=vCeIIY1SCV/SU/hCMJAWDi0jY2ZwXEAkj+lwC9rpQ3xD6tNNwYh/pHZSHRmDfUskdmhT88r5P/2ePds3qKBcxMDFsQuX3j8zNFOxZhIFrO1SHDpbkF1XfqYeCR6KjxFfBOG7OREof2QJ55lf4s/D9JhjISLZlcGSWdRITK70weU=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 3c8149e39e275731
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=iQJ0258Mm37+ENhouwf8jomwENrYouUm0yAU14Ut3v6KltPKH9coKPCcVUX/v8pO8WPaKATs3lsYRGCuZnNOlhwBpEM9vOGK/a+iL+pI7jV8Bw1u6qtk34OjBOOog2fgnQoHWJw+sqJvvudj9Z++4h5Nu8ipYQXm2IUJXc9IClHSYwQ/QwssrJRXzsJ6/turFtT0L1qSoSM+BIBE4UVhE4d2hZFSqBa9PdjnO3wdlVzVg3Vyvo2+e8gfwM08R6NFaIBGz26sRrUup8vLgz6EqgDxZ9i/fT9/jNCr7lyjuSdIBwBGk1euq6mNHGxUYD7k+Nq9fsEcgD8iWjT85sgICQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=tZ0teu4xHkZMW5oIDulrSlOAgq2X79hUYcgZGFr32Fw=;
 b=c9I94y/c3UDCIGhejYIjwBP7yZ6yZ7M9OhUct4PJ6xtFKOzoC/cpupcQy4bnCvlcVd+q5FtXdbGhktUFISQy9PRJYYkYN9waWd4Cc8evIO1HeCy/XD3lWyGwxxKL797Z322cH3wH7DYfiyYVUNjnX2uMDp5zFVByvuETs51s1uyJfbNXoMIhht281/4mjhZKNg+5LWPc2jQq0nYPaBzYCo+3i1/4+93fPesbeH9HJgNsxYdEHggiIuDEC/0mApit4sQStu2i9JW7EH4LrXrmbIjbR6pEY6rxIvhckzYdh/iptIhvGtS90N3qqrjNwYXNi5+/LZ3ivmizmAK0qUYczg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=tZ0teu4xHkZMW5oIDulrSlOAgq2X79hUYcgZGFr32Fw=;
 b=vCeIIY1SCV/SU/hCMJAWDi0jY2ZwXEAkj+lwC9rpQ3xD6tNNwYh/pHZSHRmDfUskdmhT88r5P/2ePds3qKBcxMDFsQuX3j8zNFOxZhIFrO1SHDpbkF1XfqYeCR6KjxFfBOG7OREof2QJ55lf4s/D9JhjISLZlcGSWdRITK70weU=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Vikram Garhwal <fnu.vikram@xilinx.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, "sstabellini@kernel.org"
	<sstabellini@kernel.org>, "julien@xen.org" <julien@xen.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, "volodymyr_babchuk@epam.com"
	<volodymyr_babchuk@epam.com>
Subject: Re: [XEN][RFC PATCH v3 07/14] xen/iommu: Move spin_lock from
 iommu_dt_device_is_assigned to caller
Thread-Topic: [XEN][RFC PATCH v3 07/14] xen/iommu: Move spin_lock from
 iommu_dt_device_is_assigned to caller
Thread-Index: AQHYMyV0/VHCKbIU/Emb5cXwtoiAAKy/El2A
Date: Mon, 14 Mar 2022 15:58:22 +0000
Message-ID: <BAAC4BA1-BFB2-4B6B-A7FB-4AA1ECE58F29@arm.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
 <20220308194704.14061-8-fnu.vikram@xilinx.com>
In-Reply-To: <20220308194704.14061-8-fnu.vikram@xilinx.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 012ff2ed-4d7e-4f76-3a99-08da05d37f86
x-ms-traffictypediagnostic:
	AM6PR08MB4167:EE_|DB5EUR03FT040:EE_|DB8PR08MB4058:EE_
X-Microsoft-Antispam-PRVS:
	<DB8PR08MB405889DC7689232B20B4CAB7E40F9@DB8PR08MB4058.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 qUuB0dirm5IiSRPK0g6lEOx5/Vy3SWwWJGG3svKlD14FKXhlelGlq1ppJJTMYl45fOzJoYjeVr9n1z1Iz/B3E0NLdAUpKms+L+cqKPlIdgEKbeeuBuxX84cmaHgspxlaVLXiYoPyHjTJqkc66WSsWahOw0EWifT9gUU/XphC+IpjTKVK/mXTtsxitYhludNI3b37kPpflcDTWFh+7BTpKKsd3YEiXSEKyo2iSYtLVb7PZCTrzS5xTMm9V9y2W3w8pnxzY9mhg+h8qdS5f6Ak4kcOPmV1GQAWCtXS4042DUJ1AqEzGxbY2dlSdbwcV5jHw7PVOP8zb1AhIceQ27eMGJm09e3I3lyKwr4O/SIfykfCNZwYCnfpe5LaeWVpiabIXRlEr4Af7T/ExqqXnxwHtov07KigHwDT+x5muNrQfPOh/e1tkdY2U81rQL3PkjrjrPkzY85bRH3YlX/aB8hFeIFEycPcqtIsTUywTynyadDA13qxAmly20N7ft8zJwMrVqk7gCTiAkF6KA13Q9No+eMBNbabixFPliIYYs06ysrJd5QsRzKDf+Ct6avnjYpj9MhIZCGxjQmTc/pAT4Ie+TVSvRNN15aHQVGfYF+Brh0ZhrJCmorDPTA3zxmx9zltjmXdrCAP8mgFI9EXDuSmjV3tP6vlXhHs5OPwSVCqOv4+JC6dxs0A9yeZ+ptszyW6Y/DPOnrsD8F8mL+DOMc4IhsL+kuNLm8XDOS1kHXsE/cLj7RhXXnwV5dfVUjOLF6I
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(71200400001)(36756003)(2906002)(38100700002)(6486002)(122000001)(8676002)(38070700005)(5660300002)(316002)(6506007)(8936002)(53546011)(83380400001)(2616005)(4326008)(26005)(6512007)(76116006)(33656002)(91956017)(54906003)(508600001)(6916009)(186003)(66946007)(66556008)(64756008)(66476007)(66446008)(86362001)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <C40EA242E6D40243A4432242B6AD195B@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4167
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT040.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	4950d6f7-8a43-4a2e-9f0a-08da05d3772c
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(6486002)(36860700001)(8936002)(5660300002)(336012)(54906003)(8676002)(316002)(70206006)(70586007)(6862004)(4326008)(26005)(86362001)(186003)(107886003)(2616005)(6506007)(47076005)(356005)(81166007)(53546011)(2906002)(6512007)(36756003)(33656002)(40460700003)(83380400001)(82310400004)(508600001);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 15:58:36.1931
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 012ff2ed-4d7e-4f76-3a99-08da05d37f86
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT040.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR08MB4058



> On 8 Mar 2022, at 19:46, Vikram Garhwal <fnu.vikram@xilinx.com> wrote:
>=20
> Rename iommu_dt_device_is_assigned() to iommu_dt_device_is_assigned_lock(=
).
>=20
> Moving spin_lock to caller was done to prevent the concurrent access to
> iommu_dt_device_is_assigned while doing add/remove/assign/deassign.
>=20
> Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com>
> ---
> xen/drivers/passthrough/device_tree.c | 11 +++++++----
> 1 file changed, 7 insertions(+), 4 deletions(-)
>=20
> diff --git a/xen/drivers/passthrough/device_tree.c b/xen/drivers/passthro=
ugh/device_tree.c
> index 98f2aa0dad..b3b04f8e03 100644
> --- a/xen/drivers/passthrough/device_tree.c
> +++ b/xen/drivers/passthrough/device_tree.c
> @@ -83,16 +83,14 @@ fail:
>     return rc;
> }
>=20
> -static bool_t iommu_dt_device_is_assigned(const struct dt_device_node *d=
ev)
> +static bool_t iommu_dt_device_is_assigned_lock(const struct dt_device_no=
de *dev)
> {
>     bool_t assigned =3D 0;
>=20

You can add an ASSERT(spin_is_locked(&dtdevs_lock)); to be sure, however th=
e name is pretty clear,
so for me with or without it:

Reviewed-by: Luca Fancellu <luca.fancellu@arm.com>

>     if ( !dt_device_is_protected(dev) )
>         return 0;
>=20
> -    spin_lock(&dtdevs_lock);
>     assigned =3D !list_empty(&dev->domain_list);
> -    spin_unlock(&dtdevs_lock);
>=20
>     return assigned;
> }
> @@ -225,12 +223,17 @@ int iommu_do_dt_domctl(struct xen_domctl *domctl, s=
truct domain *d,
>=20
>         if ( domctl->cmd =3D=3D XEN_DOMCTL_test_assign_device )
>         {
> -            if ( iommu_dt_device_is_assigned(dev) )
> +            spin_lock(&dtdevs_lock);
> +
> +            if ( iommu_dt_device_is_assigned_lock(dev) )
>             {
>                 printk(XENLOG_G_ERR "%s already assigned.\n",
>                        dt_node_full_name(dev));
>                 ret =3D -EINVAL;
>             }
> +
> +            spin_unlock(&dtdevs_lock);
> +
>             break;
>         }
>=20
>=20



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 16:01:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 16:01:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290302.492303 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTn8K-0003dK-Pp; Mon, 14 Mar 2022 16:01:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290302.492303; Mon, 14 Mar 2022 16:01:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTn8K-0003dB-LB; Mon, 14 Mar 2022 16:01:20 +0000
Received: by outflank-mailman (input) for mailman id 290302;
 Mon, 14 Mar 2022 16:01:19 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=QtFe=TZ=redhat.com=armbru@srs-se1.protection.inumbo.net>)
 id 1nTn8J-0003d5-9E
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 16:01:19 +0000
Received: from us-smtp-delivery-124.mimecast.com
 (us-smtp-delivery-124.mimecast.com [170.10.133.124])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id fb2b79ca-a3af-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 17:01:18 +0100 (CET)
Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com
 [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS
 (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 us-mta-626-M2Tne6xGPg2n2NYdBr40Ew-1; Mon, 14 Mar 2022 12:01:13 -0400
Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.rdu2.redhat.com
 [10.11.54.8])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 226C32999B2F;
 Mon, 14 Mar 2022 16:01:11 +0000 (UTC)
Received: from blackfin.pond.sub.org (unknown [10.36.112.3])
 by smtp.corp.redhat.com (Postfix) with ESMTPS id 114ACC44AE7;
 Mon, 14 Mar 2022 16:01:10 +0000 (UTC)
Received: by blackfin.pond.sub.org (Postfix, from userid 1000)
 id A1CFC21E66D4; Mon, 14 Mar 2022 17:01:08 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fb2b79ca-a3af-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
	s=mimecast20190719; t=1647273676;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=LjuojNlljLxHI2R7532V3Nrcf8uo+00tFTpTU3tAPp8=;
	b=C/wqKWVeFh2EezhqK9KdTSC8PPrYpMLi4Veu07P6l4sTXYG/o5DecU04Wa5l0ZPnqriV6q
	hk0Ou9j8l0wOThiAJHgbY1jxF5YwunTjH3+FfzwAvE/IFilyuoRX44/mM+zGYca3XVVJYX
	TU6AxWvN7Fy8vqkx1yW27ZCB0Fel8yQ=
X-MC-Unique: M2Tne6xGPg2n2NYdBr40Ew-1
From: Markus Armbruster <armbru@redhat.com>
To: qemu-devel@nongnu.org
Cc: Paolo Bonzini <pbonzini@redhat.com>,
	Richard Henderson <richard.henderson@linaro.org>,
	Gerd Hoffmann <kraxel@redhat.com>,
	Christian Schoenebeck <qemu_oss@crudebyte.com>,
	"Gonglei (Arei)" <arei.gonglei@huawei.com>,
	=?UTF-8?q?Marc-Andr=C3=A9=20Lureau?= <marcandre.lureau@redhat.com>,
	"Michael S. Tsirkin" <mst@redhat.com>,
	Igor Mammedov <imammedo@redhat.com>,
	Ani Sinha <ani@anisinha.ca>,
	Laurent Vivier <lvivier@redhat.com>,
	Amit Shah <amit@kernel.org>,
	Peter Maydell <peter.maydell@linaro.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Anthony Perard <anthony.perard@citrix.com>,
	Paul Durrant <paul@xen.org>,
	=?UTF-8?q?Herv=C3=A9=20Poussineau?= <hpoussin@reactos.org>,
	Aleksandar Rikalo <aleksandar.rikalo@syrmia.com>,
	Corey Minyard <cminyard@mvista.com>,
	Patrick Venture <venture@google.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Peter Xu <peterx@redhat.com>,
	Jason Wang <jasowang@redhat.com>,
	=?UTF-8?q?C=C3=A9dric=20Le=20Goater?= <clg@kaod.org>,
	Daniel Henrique Barboza <danielhb413@gmail.com>,
	David Gibson <david@gibson.dropbear.id.au>,
	Greg Kurz <groug@kaod.org>,
	=?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Jean-Christophe Dubois <jcd@tribudubois.net>,
	Keith Busch <kbusch@kernel.org>,
	Klaus Jensen <its@irrelevant.dk>,
	Yuval Shaia <yuval.shaia.ml@gmail.com>,
	Yoshinori Sato <ysato@users.sourceforge.jp>,
	Magnus Damm <magnus.damm@gmail.com>,
	Fabien Chouteau <chouteau@adacore.com>,
	KONRAD Frederic <frederic.konrad@adacore.com>,
	Mark Cave-Ayland <mark.cave-ayland@ilande.co.uk>,
	Artyom Tarasenko <atar4qemu@gmail.com>,
	Alex Williamson <alex.williamson@redhat.com>,
	Eric Auger <eric.auger@redhat.com>,
	Max Filippov <jcmvbkbc@gmail.com>,
	Juan Quintela <quintela@redhat.com>,
	"Dr. David Alan Gilbert" <dgilbert@redhat.com>,
	Konstantin Kostiuk <kkostiuk@redhat.com>,
	Michael Roth <michael.roth@amd.com>,
	=?UTF-8?q?Daniel=20P=2E=20Berrang=C3=A9?= <berrange@redhat.com>,
	Pavel Dovgalyuk <pavel.dovgaluk@ispras.ru>,
	=?UTF-8?q?Alex=20Benn=C3=A9e?= <alex.bennee@linaro.org>,
	David Hildenbrand <david@redhat.com>,
	Wenchao Wang <wenchao.wang@intel.com>,
	Colin Xu <colin.xu@intel.com>,
	Kamil Rytarowski <kamil@netbsd.org>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Cornelia Huck <cohuck@redhat.com>,
	Thomas Huth <thuth@redhat.com>,
	Eric Blake <eblake@redhat.com>,
	Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>,
	John Snow <jsnow@redhat.com>,
	kvm@vger.kernel.org,
	qemu-arm@nongnu.org,
	xen-devel@lists.xenproject.org,
	qemu-ppc@nongnu.org,
	qemu-block@nongnu.org,
	haxm-team@intel.com,
	qemu-s390x@nongnu.org
Subject: [PATCH 0/3] Use g_new() & friends where that makes obvious
Date: Mon, 14 Mar 2022 17:01:05 +0100
Message-Id: <20220314160108.1440470-1-armbru@redhat.com>
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.85 on 10.11.54.8
Authentication-Results: relay.mimecast.com;
	auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=armbru@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Transfer-Encoding: 8bit
Content-Type: text/plain; charset="US-ASCII"

g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
for two reasons.  One, it catches multiplication overflowing size_t.
Two, it returns T * rather than void *, which lets the compiler catch
more type errors.

This series only touches allocations with size arguments of the form
sizeof(T).  It's mechanical, except for a tiny fix in PATCH 2.

PATCH 1 adds the Coccinelle script.

PATCH 2 cleans up the virtio-9p subsystem, and fixes a harmless typing
error uncovered by the cleanup.

PATCH 3 cleans up everything else.  I started to split it up, but
splitting is a lot of decisions, and I just can't see the value.

For instance, MAINTAINERS tells me to split for subsystem "virtio",
patching

    hw/char/virtio-serial-bus.c
    hw/display/virtio-gpu.c
    hw/net/virtio-net.c
    hw/virtio/virtio-crypto.c
    hw/virtio/virtio-iommu.c
    hw/virtio/virtio.c

But it also tells me to split for subsystem "Character devices",
patching

    hw/char/parallel.c                       |  2 +-
    hw/char/riscv_htif.c                     |  2 +-
    hw/char/virtio-serial-bus.c              |  6 +-

and for subsystem "Network devices", patching

    hw/net/virtio-net.c

and for subsystem "virtio-gpu", patching

    hw/display/virtio-gpu.c

I guess I'd go with "virtio".  Six files down, 103 to go.  Thanks, but
no thanks.

Since the transformation is local to a function call, dropping is
completely safe.  We can deal with conflicts by dropping conflicting
hunks, with "git-pull -s recursive -X ours".  Or drop entire files
with conflicts.

If you want me to split off certain parts, please tell me exactly what
you want split off, and I'll gladly do the splitting.  I don't mind
the splitting part, I do mind the *thinking* part.

Markus Armbruster (3):
  scripts/coccinelle: New use-g_new-etc.cocci
  9pfs: Use g_new() & friends where that makes obvious sense
  Use g_new() & friends where that makes obvious sense

 scripts/coccinelle/use-g_new-etc.cocci   | 75 ++++++++++++++++++++++++
 include/qemu/timer.h                     |  2 +-
 accel/kvm/kvm-all.c                      |  6 +-
 accel/tcg/tcg-accel-ops-mttcg.c          |  2 +-
 accel/tcg/tcg-accel-ops-rr.c             |  4 +-
 audio/audio.c                            |  4 +-
 audio/audio_legacy.c                     |  6 +-
 audio/dsoundaudio.c                      |  2 +-
 audio/jackaudio.c                        |  6 +-
 audio/paaudio.c                          |  4 +-
 backends/cryptodev.c                     |  2 +-
 contrib/vhost-user-gpu/vhost-user-gpu.c  |  2 +-
 cpus-common.c                            |  4 +-
 dump/dump.c                              |  2 +-
 hw/9pfs/9p-proxy.c                       |  2 +-
 hw/9pfs/9p-synth.c                       |  4 +-
 hw/9pfs/9p.c                             |  8 +--
 hw/9pfs/codir.c                          |  6 +-
 hw/acpi/hmat.c                           |  2 +-
 hw/audio/intel-hda.c                     |  2 +-
 hw/char/parallel.c                       |  2 +-
 hw/char/riscv_htif.c                     |  2 +-
 hw/char/virtio-serial-bus.c              |  6 +-
 hw/core/irq.c                            |  2 +-
 hw/core/reset.c                          |  2 +-
 hw/display/pxa2xx_lcd.c                  |  2 +-
 hw/display/tc6393xb.c                    |  2 +-
 hw/display/virtio-gpu.c                  |  4 +-
 hw/display/xenfb.c                       |  4 +-
 hw/dma/rc4030.c                          |  4 +-
 hw/i2c/core.c                            |  4 +-
 hw/i2c/i2c_mux_pca954x.c                 |  2 +-
 hw/i386/amd_iommu.c                      |  4 +-
 hw/i386/intel_iommu.c                    |  2 +-
 hw/i386/xen/xen-hvm.c                    | 10 ++--
 hw/i386/xen/xen-mapcache.c               | 14 ++---
 hw/input/lasips2.c                       |  2 +-
 hw/input/pckbd.c                         |  2 +-
 hw/input/ps2.c                           |  4 +-
 hw/input/pxa2xx_keypad.c                 |  2 +-
 hw/input/tsc2005.c                       |  3 +-
 hw/intc/riscv_aclint.c                   |  6 +-
 hw/intc/xics.c                           |  2 +-
 hw/m68k/virt.c                           |  2 +-
 hw/mips/mipssim.c                        |  2 +-
 hw/misc/applesmc.c                       |  2 +-
 hw/misc/imx6_src.c                       |  2 +-
 hw/misc/ivshmem.c                        |  4 +-
 hw/net/virtio-net.c                      |  4 +-
 hw/nvme/ns.c                             |  2 +-
 hw/pci-host/pnv_phb3.c                   |  2 +-
 hw/pci-host/pnv_phb4.c                   |  2 +-
 hw/pci/pcie_sriov.c                      |  2 +-
 hw/ppc/e500.c                            |  2 +-
 hw/ppc/ppc.c                             |  8 +--
 hw/ppc/ppc405_boards.c                   |  4 +-
 hw/ppc/ppc405_uc.c                       | 18 +++---
 hw/ppc/ppc4xx_devs.c                     |  2 +-
 hw/ppc/ppc_booke.c                       |  4 +-
 hw/ppc/spapr.c                           |  2 +-
 hw/ppc/spapr_events.c                    |  2 +-
 hw/ppc/spapr_hcall.c                     |  2 +-
 hw/ppc/spapr_numa.c                      |  3 +-
 hw/rdma/vmw/pvrdma_dev_ring.c            |  2 +-
 hw/rdma/vmw/pvrdma_qp_ops.c              |  6 +-
 hw/sh4/r2d.c                             |  4 +-
 hw/sh4/sh7750.c                          |  2 +-
 hw/sparc/leon3.c                         |  2 +-
 hw/sparc64/sparc64.c                     |  4 +-
 hw/timer/arm_timer.c                     |  2 +-
 hw/timer/slavio_timer.c                  |  2 +-
 hw/vfio/pci.c                            |  4 +-
 hw/vfio/platform.c                       |  4 +-
 hw/virtio/virtio-crypto.c                |  2 +-
 hw/virtio/virtio-iommu.c                 |  2 +-
 hw/virtio/virtio.c                       |  5 +-
 hw/xtensa/xtfpga.c                       |  2 +-
 linux-user/syscall.c                     |  2 +-
 migration/dirtyrate.c                    |  4 +-
 migration/multifd-zlib.c                 |  4 +-
 migration/ram.c                          |  2 +-
 monitor/misc.c                           |  2 +-
 monitor/qmp-cmds.c                       |  2 +-
 qga/commands-win32.c                     |  8 +--
 qga/commands.c                           |  2 +-
 qom/qom-qmp-cmds.c                       |  2 +-
 replay/replay-char.c                     |  4 +-
 replay/replay-events.c                   | 10 ++--
 scripts/coverity-scan/model.c            |  2 +-
 semihosting/config.c                     |  2 +-
 softmmu/bootdevice.c                     |  4 +-
 softmmu/dma-helpers.c                    |  4 +-
 softmmu/memory_mapping.c                 |  2 +-
 target/i386/cpu-sysemu.c                 |  2 +-
 target/i386/hax/hax-accel-ops.c          |  4 +-
 target/i386/nvmm/nvmm-accel-ops.c        |  4 +-
 target/i386/whpx/whpx-accel-ops.c        |  4 +-
 target/i386/whpx/whpx-all.c              |  2 +-
 target/s390x/cpu-sysemu.c                |  2 +-
 tests/qtest/virtio-9p-test.c             |  4 +-
 tests/unit/test-hbitmap.c                |  2 +-
 tests/unit/test-qmp-cmds.c               | 14 ++---
 tests/unit/test-qobject-output-visitor.c |  2 +-
 tests/unit/test-vmstate.c                | 42 ++++++-------
 ui/vnc-enc-tight.c                       |  2 +-
 util/envlist.c                           |  2 +-
 util/hbitmap.c                           |  2 +-
 util/main-loop.c                         |  2 +-
 util/qemu-timer.c                        |  2 +-
 util/vfio-helpers.c                      |  4 +-
 110 files changed, 284 insertions(+), 214 deletions(-)
 create mode 100644 scripts/coccinelle/use-g_new-etc.cocci

--
2.35.1



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 16:01:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 16:01:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290303.492314 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTn8Y-0003y3-1g; Mon, 14 Mar 2022 16:01:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290303.492314; Mon, 14 Mar 2022 16:01:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTn8X-0003xu-TM; Mon, 14 Mar 2022 16:01:33 +0000
Received: by outflank-mailman (input) for mailman id 290303;
 Mon, 14 Mar 2022 16:01:33 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=QtFe=TZ=redhat.com=armbru@srs-se1.protection.inumbo.net>)
 id 1nTn8W-0003d5-Ai
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 16:01:32 +0000
Received: from us-smtp-delivery-124.mimecast.com
 (us-smtp-delivery-124.mimecast.com [170.10.133.124])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 01a26e47-a3b0-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 17:01:28 +0100 (CET)
Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com
 [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS
 (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 us-mta-546-SmpJQmU2OgCTMkIkFKxUGQ-1; Mon, 14 Mar 2022 12:01:15 -0400
Received: from smtp.corp.redhat.com (int-mx09.intmail.prod.int.rdu2.redhat.com
 [10.11.54.9])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by mimecast-mx02.redhat.com (Postfix) with ESMTPS id DF4251C0E34A;
 Mon, 14 Mar 2022 16:01:11 +0000 (UTC)
Received: from blackfin.pond.sub.org (unknown [10.36.112.3])
 by smtp.corp.redhat.com (Postfix) with ESMTPS id 3C1597BA37F;
 Mon, 14 Mar 2022 16:01:11 +0000 (UTC)
Received: by blackfin.pond.sub.org (Postfix, from userid 1000)
 id AF6FA21D1F5B; Mon, 14 Mar 2022 17:01:08 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 01a26e47-a3b0-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
	s=mimecast20190719; t=1647273687;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=yMtoObiWCfqe5R+pcF8iPjXIhHe/cQVf2Nn1gpi+h4g=;
	b=BbwDKyrI6hWdrsso4H3B7Ha5NSPhNAbYbump284xJVTPqiACQ4pd07G6AKli29I0VSxGf1
	k6mRq132uOMYaJaUjAZF8c4VVNlqr+1YE9vUo7KngUSndjOUEs0EEO08nrMJNiazzst2V9
	fcGqTSbFEhVyhfRRGbhlvGNJMQO+7Lw=
X-MC-Unique: SmpJQmU2OgCTMkIkFKxUGQ-1
From: Markus Armbruster <armbru@redhat.com>
To: qemu-devel@nongnu.org
Cc: Paolo Bonzini <pbonzini@redhat.com>,
	Richard Henderson <richard.henderson@linaro.org>,
	Gerd Hoffmann <kraxel@redhat.com>,
	Christian Schoenebeck <qemu_oss@crudebyte.com>,
	"Gonglei (Arei)" <arei.gonglei@huawei.com>,
	=?UTF-8?q?Marc-Andr=C3=A9=20Lureau?= <marcandre.lureau@redhat.com>,
	"Michael S. Tsirkin" <mst@redhat.com>,
	Igor Mammedov <imammedo@redhat.com>,
	Ani Sinha <ani@anisinha.ca>,
	Laurent Vivier <lvivier@redhat.com>,
	Amit Shah <amit@kernel.org>,
	Peter Maydell <peter.maydell@linaro.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Anthony Perard <anthony.perard@citrix.com>,
	Paul Durrant <paul@xen.org>,
	=?UTF-8?q?Herv=C3=A9=20Poussineau?= <hpoussin@reactos.org>,
	Aleksandar Rikalo <aleksandar.rikalo@syrmia.com>,
	Corey Minyard <cminyard@mvista.com>,
	Patrick Venture <venture@google.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Peter Xu <peterx@redhat.com>,
	Jason Wang <jasowang@redhat.com>,
	=?UTF-8?q?C=C3=A9dric=20Le=20Goater?= <clg@kaod.org>,
	Daniel Henrique Barboza <danielhb413@gmail.com>,
	David Gibson <david@gibson.dropbear.id.au>,
	Greg Kurz <groug@kaod.org>,
	=?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Jean-Christophe Dubois <jcd@tribudubois.net>,
	Keith Busch <kbusch@kernel.org>,
	Klaus Jensen <its@irrelevant.dk>,
	Yuval Shaia <yuval.shaia.ml@gmail.com>,
	Yoshinori Sato <ysato@users.sourceforge.jp>,
	Magnus Damm <magnus.damm@gmail.com>,
	Fabien Chouteau <chouteau@adacore.com>,
	KONRAD Frederic <frederic.konrad@adacore.com>,
	Mark Cave-Ayland <mark.cave-ayland@ilande.co.uk>,
	Artyom Tarasenko <atar4qemu@gmail.com>,
	Alex Williamson <alex.williamson@redhat.com>,
	Eric Auger <eric.auger@redhat.com>,
	Max Filippov <jcmvbkbc@gmail.com>,
	Juan Quintela <quintela@redhat.com>,
	"Dr. David Alan Gilbert" <dgilbert@redhat.com>,
	Konstantin Kostiuk <kkostiuk@redhat.com>,
	Michael Roth <michael.roth@amd.com>,
	=?UTF-8?q?Daniel=20P=2E=20Berrang=C3=A9?= <berrange@redhat.com>,
	Pavel Dovgalyuk <pavel.dovgaluk@ispras.ru>,
	=?UTF-8?q?Alex=20Benn=C3=A9e?= <alex.bennee@linaro.org>,
	David Hildenbrand <david@redhat.com>,
	Wenchao Wang <wenchao.wang@intel.com>,
	Colin Xu <colin.xu@intel.com>,
	Kamil Rytarowski <kamil@netbsd.org>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Cornelia Huck <cohuck@redhat.com>,
	Thomas Huth <thuth@redhat.com>,
	Eric Blake <eblake@redhat.com>,
	Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>,
	John Snow <jsnow@redhat.com>,
	kvm@vger.kernel.org,
	qemu-arm@nongnu.org,
	xen-devel@lists.xenproject.org,
	qemu-ppc@nongnu.org,
	qemu-block@nongnu.org,
	haxm-team@intel.com,
	qemu-s390x@nongnu.org
Subject: [PATCH 3/3] Use g_new() & friends where that makes obvious sense
Date: Mon, 14 Mar 2022 17:01:08 +0100
Message-Id: <20220314160108.1440470-4-armbru@redhat.com>
In-Reply-To: <20220314160108.1440470-1-armbru@redhat.com>
References: <20220314160108.1440470-1-armbru@redhat.com>
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.85 on 10.11.54.9
Authentication-Results: relay.mimecast.com;
	auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=armbru@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Transfer-Encoding: 8bit
Content-Type: text/plain; charset="US-ASCII"

g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
for two reasons.  One, it catches multiplication overflowing size_t.
Two, it returns T * rather than void *, which lets the compiler catch
more type errors.

This commit only touches allocations with size arguments of the form
sizeof(T).

Patch created mechanically with:

    $ spatch --in-place --sp-file scripts/coccinelle/use-g_new-etc.cocci \
	     --macro-file scripts/cocci-macro-file.h FILES...

Signed-off-by: Markus Armbruster <armbru@redhat.com>
---
 include/qemu/timer.h                     |  2 +-
 accel/kvm/kvm-all.c                      |  6 ++--
 accel/tcg/tcg-accel-ops-mttcg.c          |  2 +-
 accel/tcg/tcg-accel-ops-rr.c             |  4 +--
 audio/audio.c                            |  4 +--
 audio/audio_legacy.c                     |  6 ++--
 audio/dsoundaudio.c                      |  2 +-
 audio/jackaudio.c                        |  6 ++--
 audio/paaudio.c                          |  4 +--
 backends/cryptodev.c                     |  2 +-
 contrib/vhost-user-gpu/vhost-user-gpu.c  |  2 +-
 cpus-common.c                            |  4 +--
 dump/dump.c                              |  2 +-
 hw/acpi/hmat.c                           |  2 +-
 hw/audio/intel-hda.c                     |  2 +-
 hw/char/parallel.c                       |  2 +-
 hw/char/riscv_htif.c                     |  2 +-
 hw/char/virtio-serial-bus.c              |  6 ++--
 hw/core/irq.c                            |  2 +-
 hw/core/reset.c                          |  2 +-
 hw/display/pxa2xx_lcd.c                  |  2 +-
 hw/display/tc6393xb.c                    |  2 +-
 hw/display/virtio-gpu.c                  |  4 +--
 hw/display/xenfb.c                       |  4 +--
 hw/dma/rc4030.c                          |  4 +--
 hw/i2c/core.c                            |  4 +--
 hw/i2c/i2c_mux_pca954x.c                 |  2 +-
 hw/i386/amd_iommu.c                      |  4 +--
 hw/i386/intel_iommu.c                    |  2 +-
 hw/i386/xen/xen-hvm.c                    | 10 +++---
 hw/i386/xen/xen-mapcache.c               | 14 ++++----
 hw/input/lasips2.c                       |  2 +-
 hw/input/pckbd.c                         |  2 +-
 hw/input/ps2.c                           |  4 +--
 hw/input/pxa2xx_keypad.c                 |  2 +-
 hw/input/tsc2005.c                       |  3 +-
 hw/intc/riscv_aclint.c                   |  6 ++--
 hw/intc/xics.c                           |  2 +-
 hw/m68k/virt.c                           |  2 +-
 hw/mips/mipssim.c                        |  2 +-
 hw/misc/applesmc.c                       |  2 +-
 hw/misc/imx6_src.c                       |  2 +-
 hw/misc/ivshmem.c                        |  4 +--
 hw/net/virtio-net.c                      |  4 +--
 hw/nvme/ns.c                             |  2 +-
 hw/pci-host/pnv_phb3.c                   |  2 +-
 hw/pci-host/pnv_phb4.c                   |  2 +-
 hw/pci/pcie_sriov.c                      |  2 +-
 hw/ppc/e500.c                            |  2 +-
 hw/ppc/ppc.c                             |  8 ++---
 hw/ppc/ppc405_boards.c                   |  4 +--
 hw/ppc/ppc405_uc.c                       | 18 +++++-----
 hw/ppc/ppc4xx_devs.c                     |  2 +-
 hw/ppc/ppc_booke.c                       |  4 +--
 hw/ppc/spapr.c                           |  2 +-
 hw/ppc/spapr_events.c                    |  2 +-
 hw/ppc/spapr_hcall.c                     |  2 +-
 hw/ppc/spapr_numa.c                      |  3 +-
 hw/rdma/vmw/pvrdma_dev_ring.c            |  2 +-
 hw/rdma/vmw/pvrdma_qp_ops.c              |  6 ++--
 hw/sh4/r2d.c                             |  4 +--
 hw/sh4/sh7750.c                          |  2 +-
 hw/sparc/leon3.c                         |  2 +-
 hw/sparc64/sparc64.c                     |  4 +--
 hw/timer/arm_timer.c                     |  2 +-
 hw/timer/slavio_timer.c                  |  2 +-
 hw/vfio/pci.c                            |  4 +--
 hw/vfio/platform.c                       |  4 +--
 hw/virtio/virtio-crypto.c                |  2 +-
 hw/virtio/virtio-iommu.c                 |  2 +-
 hw/virtio/virtio.c                       |  5 ++-
 hw/xtensa/xtfpga.c                       |  2 +-
 linux-user/syscall.c                     |  2 +-
 migration/dirtyrate.c                    |  4 +--
 migration/multifd-zlib.c                 |  4 +--
 migration/ram.c                          |  2 +-
 monitor/misc.c                           |  2 +-
 monitor/qmp-cmds.c                       |  2 +-
 qga/commands-win32.c                     |  8 ++---
 qga/commands.c                           |  2 +-
 qom/qom-qmp-cmds.c                       |  2 +-
 replay/replay-char.c                     |  4 +--
 replay/replay-events.c                   | 10 +++---
 scripts/coverity-scan/model.c            |  2 +-
 semihosting/config.c                     |  2 +-
 softmmu/bootdevice.c                     |  4 +--
 softmmu/dma-helpers.c                    |  4 +--
 softmmu/memory_mapping.c                 |  2 +-
 target/i386/cpu-sysemu.c                 |  2 +-
 target/i386/hax/hax-accel-ops.c          |  4 +--
 target/i386/nvmm/nvmm-accel-ops.c        |  4 +--
 target/i386/whpx/whpx-accel-ops.c        |  4 +--
 target/i386/whpx/whpx-all.c              |  2 +-
 target/s390x/cpu-sysemu.c                |  2 +-
 tests/unit/test-hbitmap.c                |  2 +-
 tests/unit/test-qmp-cmds.c               | 14 ++++----
 tests/unit/test-qobject-output-visitor.c |  2 +-
 tests/unit/test-vmstate.c                | 42 ++++++++++++------------
 ui/vnc-enc-tight.c                       |  2 +-
 util/envlist.c                           |  2 +-
 util/hbitmap.c                           |  2 +-
 util/main-loop.c                         |  2 +-
 util/qemu-timer.c                        |  2 +-
 util/vfio-helpers.c                      |  4 +--
 104 files changed, 197 insertions(+), 202 deletions(-)

diff --git a/include/qemu/timer.h b/include/qemu/timer.h
index 88ef114689..ee071e07d1 100644
--- a/include/qemu/timer.h
+++ b/include/qemu/timer.h
@@ -520,7 +520,7 @@ static inline QEMUTimer *timer_new_full(QEMUTimerListGroup *timer_list_group,
                                         int scale, int attributes,
                                         QEMUTimerCB *cb, void *opaque)
 {
-    QEMUTimer *ts = g_malloc0(sizeof(QEMUTimer));
+    QEMUTimer *ts = g_new0(QEMUTimer, 1);
     timer_init_full(ts, timer_list_group, type, scale, attributes, cb, opaque);
     return ts;
 }
diff --git a/accel/kvm/kvm-all.c b/accel/kvm/kvm-all.c
index 0e66ebb497..1510856a3b 100644
--- a/accel/kvm/kvm-all.c
+++ b/accel/kvm/kvm-all.c
@@ -1646,7 +1646,7 @@ void kvm_memory_listener_register(KVMState *s, KVMMemoryListener *kml,
 {
     int i;
 
-    kml->slots = g_malloc0(s->nr_slots * sizeof(KVMSlot));
+    kml->slots = g_new0(KVMSlot, s->nr_slots);
     kml->as_id = as_id;
 
     for (i = 0; i < s->nr_slots; i++) {
@@ -1941,7 +1941,7 @@ int kvm_irqchip_send_msi(KVMState *s, MSIMessage msg)
             return virq;
         }
 
-        route = g_malloc0(sizeof(KVMMSIRoute));
+        route = g_new0(KVMMSIRoute, 1);
         route->kroute.gsi = virq;
         route->kroute.type = KVM_IRQ_ROUTING_MSI;
         route->kroute.flags = 0;
@@ -3243,7 +3243,7 @@ int kvm_insert_breakpoint(CPUState *cpu, target_ulong addr,
             return 0;
         }
 
-        bp = g_malloc(sizeof(struct kvm_sw_breakpoint));
+        bp = g_new(struct kvm_sw_breakpoint, 1);
         bp->pc = addr;
         bp->use_count = 1;
         err = kvm_arch_insert_sw_breakpoint(cpu, bp);
diff --git a/accel/tcg/tcg-accel-ops-mttcg.c b/accel/tcg/tcg-accel-ops-mttcg.c
index dc421c8fd7..ea2b741deb 100644
--- a/accel/tcg/tcg-accel-ops-mttcg.c
+++ b/accel/tcg/tcg-accel-ops-mttcg.c
@@ -143,7 +143,7 @@ void mttcg_start_vcpu_thread(CPUState *cpu)
     g_assert(tcg_enabled());
     tcg_cpu_init_cflags(cpu, current_machine->smp.max_cpus > 1);
 
-    cpu->thread = g_malloc0(sizeof(QemuThread));
+    cpu->thread = g_new0(QemuThread, 1);
     cpu->halt_cond = g_malloc0(sizeof(QemuCond));
     qemu_cond_init(cpu->halt_cond);
 
diff --git a/accel/tcg/tcg-accel-ops-rr.c b/accel/tcg/tcg-accel-ops-rr.c
index a805fb6bdd..b287110766 100644
--- a/accel/tcg/tcg-accel-ops-rr.c
+++ b/accel/tcg/tcg-accel-ops-rr.c
@@ -280,8 +280,8 @@ void rr_start_vcpu_thread(CPUState *cpu)
     tcg_cpu_init_cflags(cpu, false);
 
     if (!single_tcg_cpu_thread) {
-        cpu->thread = g_malloc0(sizeof(QemuThread));
-        cpu->halt_cond = g_malloc0(sizeof(QemuCond));
+        cpu->thread = g_new0(QemuThread, 1);
+        cpu->halt_cond = g_new0(QemuCond, 1);
         qemu_cond_init(cpu->halt_cond);
 
         /* share a single thread for all cpus with TCG */
diff --git a/audio/audio.c b/audio/audio.c
index a88572e713..4c20a4bf58 100644
--- a/audio/audio.c
+++ b/audio/audio.c
@@ -1734,7 +1734,7 @@ static AudioState *audio_init(Audiodev *dev, const char *name)
         audio_validate_opts(dev, &error_abort);
     }
 
-    s = g_malloc0(sizeof(AudioState));
+    s = g_new0(AudioState, 1);
     s->dev = dev;
 
     QLIST_INIT (&s->hw_head_out);
@@ -2109,7 +2109,7 @@ void audio_parse_option(const char *opt)
 
     audio_validate_opts(dev, &error_fatal);
 
-    e = g_malloc0(sizeof(AudiodevListEntry));
+    e = g_new0(AudiodevListEntry, 1);
     e->dev = dev;
     QSIMPLEQ_INSERT_TAIL(&audiodevs, e, next);
 }
diff --git a/audio/audio_legacy.c b/audio/audio_legacy.c
index 0fe827b057..595949f52c 100644
--- a/audio/audio_legacy.c
+++ b/audio/audio_legacy.c
@@ -328,8 +328,8 @@ static void handle_per_direction(
 
 static AudiodevListEntry *legacy_opt(const char *drvname)
 {
-    AudiodevListEntry *e = g_malloc0(sizeof(AudiodevListEntry));
-    e->dev = g_malloc0(sizeof(Audiodev));
+    AudiodevListEntry *e = g_new0(AudiodevListEntry, 1);
+    e->dev = g_new0(Audiodev, 1);
     e->dev->id = g_strdup(drvname);
     e->dev->driver = qapi_enum_parse(
         &AudiodevDriver_lookup, drvname, -1, &error_abort);
@@ -508,7 +508,7 @@ static void lv_free(Visitor *v)
 
 static Visitor *legacy_visitor_new(void)
 {
-    LegacyPrintVisitor *lv = g_malloc0(sizeof(LegacyPrintVisitor));
+    LegacyPrintVisitor *lv = g_new0(LegacyPrintVisitor, 1);
 
     lv->visitor.start_struct = lv_start_struct;
     lv->visitor.end_struct = lv_end_struct;
diff --git a/audio/dsoundaudio.c b/audio/dsoundaudio.c
index 231f3e65b3..2b41db217e 100644
--- a/audio/dsoundaudio.c
+++ b/audio/dsoundaudio.c
@@ -623,7 +623,7 @@ static void *dsound_audio_init(Audiodev *dev)
 {
     int err;
     HRESULT hr;
-    dsound *s = g_malloc0(sizeof(dsound));
+    dsound *s = g_new0(dsound, 1);
     AudiodevDsoundOptions *dso;
 
     assert(dev->driver == AUDIODEV_DRIVER_DSOUND);
diff --git a/audio/jackaudio.c b/audio/jackaudio.c
index bf757250b5..5bdf3d7a78 100644
--- a/audio/jackaudio.c
+++ b/audio/jackaudio.c
@@ -97,9 +97,9 @@ static void qjack_buffer_create(QJackBuffer *buffer, int channels, int frames)
     buffer->used     = 0;
     buffer->rptr     = 0;
     buffer->wptr     = 0;
-    buffer->data     = g_malloc(channels * sizeof(float *));
+    buffer->data     = g_new(float *, channels);
     for (int i = 0; i < channels; ++i) {
-        buffer->data[i] = g_malloc(frames * sizeof(float));
+        buffer->data[i] = g_new(float, frames);
     }
 }
 
@@ -453,7 +453,7 @@ static int qjack_client_init(QJackClient *c)
     jack_on_shutdown(c->client, qjack_shutdown, c);
 
     /* allocate and register the ports */
-    c->port = g_malloc(sizeof(jack_port_t *) * c->nchannels);
+    c->port = g_new(jack_port_t *, c->nchannels);
     for (int i = 0; i < c->nchannels; ++i) {
 
         char port_name[16];
diff --git a/audio/paaudio.c b/audio/paaudio.c
index a53ed85e0b..ed4f4376c4 100644
--- a/audio/paaudio.c
+++ b/audio/paaudio.c
@@ -760,7 +760,7 @@ static int qpa_validate_per_direction_opts(Audiodev *dev,
 /* common */
 static void *qpa_conn_init(const char *server)
 {
-    PAConnection *c = g_malloc0(sizeof(PAConnection));
+    PAConnection *c = g_new0(PAConnection, 1);
     QTAILQ_INSERT_TAIL(&pa_conns, c, list);
 
     c->mainloop = pa_threaded_mainloop_new();
@@ -849,7 +849,7 @@ static void *qpa_audio_init(Audiodev *dev)
         return NULL;
     }
 
-    g = g_malloc0(sizeof(paaudio));
+    g = g_new0(paaudio, 1);
     server = popts->has_server ? popts->server : NULL;
 
     g->dev = dev;
diff --git a/backends/cryptodev.c b/backends/cryptodev.c
index bf52476166..2b105e433c 100644
--- a/backends/cryptodev.c
+++ b/backends/cryptodev.c
@@ -39,7 +39,7 @@ cryptodev_backend_new_client(const char *model,
 {
     CryptoDevBackendClient *cc;
 
-    cc = g_malloc0(sizeof(CryptoDevBackendClient));
+    cc = g_new0(CryptoDevBackendClient, 1);
     cc->model = g_strdup(model);
     if (name) {
         cc->name = g_strdup(name);
diff --git a/contrib/vhost-user-gpu/vhost-user-gpu.c b/contrib/vhost-user-gpu/vhost-user-gpu.c
index 611360e6b4..bfb8d93cf8 100644
--- a/contrib/vhost-user-gpu/vhost-user-gpu.c
+++ b/contrib/vhost-user-gpu/vhost-user-gpu.c
@@ -455,7 +455,7 @@ vg_create_mapping_iov(VuGpu *g,
         return -1;
     }
 
-    *iov = g_malloc0(sizeof(struct iovec) * ab->nr_entries);
+    *iov = g_new0(struct iovec, ab->nr_entries);
     for (i = 0; i < ab->nr_entries; i++) {
         uint64_t len = ents[i].length;
         (*iov)[i].iov_len = ents[i].length;
diff --git a/cpus-common.c b/cpus-common.c
index 6e73d3e58d..db459b41ce 100644
--- a/cpus-common.c
+++ b/cpus-common.c
@@ -160,7 +160,7 @@ void async_run_on_cpu(CPUState *cpu, run_on_cpu_func func, run_on_cpu_data data)
 {
     struct qemu_work_item *wi;
 
-    wi = g_malloc0(sizeof(struct qemu_work_item));
+    wi = g_new0(struct qemu_work_item, 1);
     wi->func = func;
     wi->data = data;
     wi->free = true;
@@ -305,7 +305,7 @@ void async_safe_run_on_cpu(CPUState *cpu, run_on_cpu_func func,
 {
     struct qemu_work_item *wi;
 
-    wi = g_malloc0(sizeof(struct qemu_work_item));
+    wi = g_new0(struct qemu_work_item, 1);
     wi->func = func;
     wi->data = data;
     wi->free = true;
diff --git a/dump/dump.c b/dump/dump.c
index a84d8b1598..f57ed76fa7 100644
--- a/dump/dump.c
+++ b/dump/dump.c
@@ -2041,7 +2041,7 @@ void qmp_dump_guest_memory(bool paging, const char *file,
 DumpGuestMemoryCapability *qmp_query_dump_guest_memory_capability(Error **errp)
 {
     DumpGuestMemoryCapability *cap =
-                                  g_malloc0(sizeof(DumpGuestMemoryCapability));
+                                  g_new0(DumpGuestMemoryCapability, 1);
     DumpGuestMemoryFormatList **tail = &cap->formats;
 
     /* elf is always available */
diff --git a/hw/acpi/hmat.c b/hw/acpi/hmat.c
index 6913ebf730..3a6d51282a 100644
--- a/hw/acpi/hmat.c
+++ b/hw/acpi/hmat.c
@@ -128,7 +128,7 @@ static void build_hmat_lb(GArray *table_data, HMAT_LB_Info *hmat_lb,
     }
 
     /* Latency or Bandwidth Entries */
-    entry_list = g_malloc0(num_initiator * num_target * sizeof(uint16_t));
+    entry_list = g_new0(uint16_t, num_initiator * num_target);
     for (i = 0; i < hmat_lb->list->len; i++) {
         lb_data = &g_array_index(hmat_lb->list, HMAT_LB_Data, i);
         index = lb_data->initiator * num_target + lb_data->target;
diff --git a/hw/audio/intel-hda.c b/hw/audio/intel-hda.c
index 5f8a878f20..686fb94d5c 100644
--- a/hw/audio/intel-hda.c
+++ b/hw/audio/intel-hda.c
@@ -473,7 +473,7 @@ static void intel_hda_parse_bdl(IntelHDAState *d, IntelHDAStream *st)
     addr = intel_hda_addr(st->bdlp_lbase, st->bdlp_ubase);
     st->bentries = st->lvi +1;
     g_free(st->bpl);
-    st->bpl = g_malloc(sizeof(bpl) * st->bentries);
+    st->bpl = g_new(bpl, st->bentries);
     for (i = 0; i < st->bentries; i++, addr += 16) {
         pci_dma_read(&d->pci, addr, buf, 16);
         st->bpl[i].addr  = le64_to_cpu(*(uint64_t *)buf);
diff --git a/hw/char/parallel.c b/hw/char/parallel.c
index adb9bd9be3..f735a6cd7f 100644
--- a/hw/char/parallel.c
+++ b/hw/char/parallel.c
@@ -622,7 +622,7 @@ bool parallel_mm_init(MemoryRegion *address_space,
 {
     ParallelState *s;
 
-    s = g_malloc0(sizeof(ParallelState));
+    s = g_new0(ParallelState, 1);
     s->irq = irq;
     qemu_chr_fe_init(&s->chr, chr, &error_abort);
     s->it_shift = it_shift;
diff --git a/hw/char/riscv_htif.c b/hw/char/riscv_htif.c
index 729edbf968..6577f0e640 100644
--- a/hw/char/riscv_htif.c
+++ b/hw/char/riscv_htif.c
@@ -248,7 +248,7 @@ HTIFState *htif_mm_init(MemoryRegion *address_space, MemoryRegion *main_mem,
     tohost_offset = tohost_addr - base;
     fromhost_offset = fromhost_addr - base;
 
-    HTIFState *s = g_malloc0(sizeof(HTIFState));
+    HTIFState *s = g_new0(HTIFState, 1);
     s->address_space = address_space;
     s->main_mem = main_mem;
     s->main_mem_ram_ptr = memory_region_get_ram_ptr(main_mem);
diff --git a/hw/char/virtio-serial-bus.c b/hw/char/virtio-serial-bus.c
index f01ec2137c..6048d408b8 100644
--- a/hw/char/virtio-serial-bus.c
+++ b/hw/char/virtio-serial-bus.c
@@ -1055,10 +1055,8 @@ static void virtio_serial_device_realize(DeviceState *dev, Error **errp)
     QTAILQ_INIT(&vser->ports);
 
     vser->bus.max_nr_ports = vser->serial.max_virtserial_ports;
-    vser->ivqs = g_malloc(vser->serial.max_virtserial_ports
-                          * sizeof(VirtQueue *));
-    vser->ovqs = g_malloc(vser->serial.max_virtserial_ports
-                          * sizeof(VirtQueue *));
+    vser->ivqs = g_new(VirtQueue *, vser->serial.max_virtserial_ports);
+    vser->ovqs = g_new(VirtQueue *, vser->serial.max_virtserial_ports);
 
     /* Add a queue for host to guest transfers for port 0 (backward compat) */
     vser->ivqs[0] = virtio_add_queue(vdev, 128, handle_input);
diff --git a/hw/core/irq.c b/hw/core/irq.c
index 8a9cbdd556..741219277b 100644
--- a/hw/core/irq.c
+++ b/hw/core/irq.c
@@ -115,7 +115,7 @@ static void qemu_splitirq(void *opaque, int line, int level)
 
 qemu_irq qemu_irq_split(qemu_irq irq1, qemu_irq irq2)
 {
-    qemu_irq *s = g_malloc0(2 * sizeof(qemu_irq));
+    qemu_irq *s = g_new0(qemu_irq, 2);
     s[0] = irq1;
     s[1] = irq2;
     return qemu_allocate_irq(qemu_splitirq, s, 0);
diff --git a/hw/core/reset.c b/hw/core/reset.c
index 9c477f2bf5..36be82c491 100644
--- a/hw/core/reset.c
+++ b/hw/core/reset.c
@@ -40,7 +40,7 @@ static QTAILQ_HEAD(, QEMUResetEntry) reset_handlers =
 
 void qemu_register_reset(QEMUResetHandler *func, void *opaque)
 {
-    QEMUResetEntry *re = g_malloc0(sizeof(QEMUResetEntry));
+    QEMUResetEntry *re = g_new0(QEMUResetEntry, 1);
 
     re->func = func;
     re->opaque = opaque;
diff --git a/hw/display/pxa2xx_lcd.c b/hw/display/pxa2xx_lcd.c
index 2887ce496b..0f06ed6e9f 100644
--- a/hw/display/pxa2xx_lcd.c
+++ b/hw/display/pxa2xx_lcd.c
@@ -1427,7 +1427,7 @@ PXA2xxLCDState *pxa2xx_lcdc_init(MemoryRegion *sysmem,
 {
     PXA2xxLCDState *s;
 
-    s = (PXA2xxLCDState *) g_malloc0(sizeof(PXA2xxLCDState));
+    s = g_new0(PXA2xxLCDState, 1);
     s->invalidated = 1;
     s->irq = irq;
     s->sysmem = sysmem;
diff --git a/hw/display/tc6393xb.c b/hw/display/tc6393xb.c
index 1f28223c7b..c7beba453b 100644
--- a/hw/display/tc6393xb.c
+++ b/hw/display/tc6393xb.c
@@ -540,7 +540,7 @@ TC6393xbState *tc6393xb_init(MemoryRegion *sysmem, uint32_t base, qemu_irq irq)
         },
     };
 
-    s = (TC6393xbState *) g_malloc0(sizeof(TC6393xbState));
+    s = g_new0(TC6393xbState, 1);
     s->irq = irq;
     s->gpio_in = qemu_allocate_irqs(tc6393xb_gpio_set, s, TC6393XB_GPIOS);
 
diff --git a/hw/display/virtio-gpu.c b/hw/display/virtio-gpu.c
index c6dc818988..529b5246b2 100644
--- a/hw/display/virtio-gpu.c
+++ b/hw/display/virtio-gpu.c
@@ -831,9 +831,9 @@ int virtio_gpu_create_mapping_iov(VirtIOGPU *g,
             }
 
             if (!(v % 16)) {
-                *iov = g_realloc(*iov, sizeof(struct iovec) * (v + 16));
+                *iov = g_renew(struct iovec, *iov, v + 16);
                 if (addr) {
-                    *addr = g_realloc(*addr, sizeof(uint64_t) * (v + 16));
+                    *addr = g_renew(uint64_t, *addr, v + 16);
                 }
             }
             (*iov)[v].iov_base = map;
diff --git a/hw/display/xenfb.c b/hw/display/xenfb.c
index 838260b6ad..cea10fe3c7 100644
--- a/hw/display/xenfb.c
+++ b/hw/display/xenfb.c
@@ -496,8 +496,8 @@ static int xenfb_map_fb(struct XenFB *xenfb)
     n_fbdirs = xenfb->fbpages * mode / 8;
     n_fbdirs = DIV_ROUND_UP(n_fbdirs, XC_PAGE_SIZE);
 
-    pgmfns = g_malloc0(sizeof(xen_pfn_t) * n_fbdirs);
-    fbmfns = g_malloc0(sizeof(xen_pfn_t) * xenfb->fbpages);
+    pgmfns = g_new0(xen_pfn_t, n_fbdirs);
+    fbmfns = g_new0(xen_pfn_t, xenfb->fbpages);
 
     xenfb_copy_mfns(mode, n_fbdirs, pgmfns, pd);
     map = xenforeignmemory_map(xen_fmem, xenfb->c.xendev.dom,
diff --git a/hw/dma/rc4030.c b/hw/dma/rc4030.c
index e4d2f1725b..aa1d323a36 100644
--- a/hw/dma/rc4030.c
+++ b/hw/dma/rc4030.c
@@ -646,8 +646,8 @@ static rc4030_dma *rc4030_allocate_dmas(void *opaque, int n)
     struct rc4030DMAState *p;
     int i;
 
-    s = (rc4030_dma *)g_new0(rc4030_dma, n);
-    p = (struct rc4030DMAState *)g_new0(struct rc4030DMAState, n);
+    s = g_new0(rc4030_dma, n);
+    p = g_new0(struct rc4030DMAState, n);
     for (i = 0; i < n; i++) {
         p->opaque = opaque;
         p->n = i;
diff --git a/hw/i2c/core.c b/hw/i2c/core.c
index 0e7d2763b9..d0cb2d32fa 100644
--- a/hw/i2c/core.c
+++ b/hw/i2c/core.c
@@ -274,7 +274,7 @@ static int i2c_slave_post_load(void *opaque, int version_id)
     bus = I2C_BUS(qdev_get_parent_bus(DEVICE(dev)));
     if ((bus->saved_address == dev->address) ||
         (bus->saved_address == I2C_BROADCAST)) {
-        node = g_malloc(sizeof(struct I2CNode));
+        node = g_new(struct I2CNode, 1);
         node->elt = dev;
         QLIST_INSERT_HEAD(&bus->current_devs, node, next);
     }
@@ -319,7 +319,7 @@ static bool i2c_slave_match(I2CSlave *candidate, uint8_t address,
                             bool broadcast, I2CNodeList *current_devs)
 {
     if ((candidate->address == address) || (broadcast)) {
-        I2CNode *node = g_malloc(sizeof(struct I2CNode));
+        I2CNode *node = g_new(struct I2CNode, 1);
         node->elt = candidate;
         QLIST_INSERT_HEAD(current_devs, node, next);
         return true;
diff --git a/hw/i2c/i2c_mux_pca954x.c b/hw/i2c/i2c_mux_pca954x.c
index a9517b612a..3945de795c 100644
--- a/hw/i2c/i2c_mux_pca954x.c
+++ b/hw/i2c/i2c_mux_pca954x.c
@@ -71,7 +71,7 @@ static bool pca954x_match(I2CSlave *candidate, uint8_t address,
 
     /* They are talking to the mux itself (or all devices enabled). */
     if ((candidate->address == address) || broadcast) {
-        I2CNode *node = g_malloc(sizeof(struct I2CNode));
+        I2CNode *node = g_new(struct I2CNode, 1);
         node->elt = candidate;
         QLIST_INSERT_HEAD(current_devs, node, next);
         if (!broadcast) {
diff --git a/hw/i386/amd_iommu.c b/hw/i386/amd_iommu.c
index 4d13d8e697..9dd9b0ecf2 100644
--- a/hw/i386/amd_iommu.c
+++ b/hw/i386/amd_iommu.c
@@ -1405,7 +1405,7 @@ static AddressSpace *amdvi_host_dma_iommu(PCIBus *bus, void *opaque, int devfn)
 
     /* allocate memory during the first run */
     if (!iommu_as) {
-        iommu_as = g_malloc0(sizeof(AMDVIAddressSpace *) * PCI_DEVFN_MAX);
+        iommu_as = g_new0(AMDVIAddressSpace *, PCI_DEVFN_MAX);
         s->address_spaces[bus_num] = iommu_as;
     }
 
@@ -1413,7 +1413,7 @@ static AddressSpace *amdvi_host_dma_iommu(PCIBus *bus, void *opaque, int devfn)
     if (!iommu_as[devfn]) {
         snprintf(name, sizeof(name), "amd_iommu_devfn_%d", devfn);
 
-        iommu_as[devfn] = g_malloc0(sizeof(AMDVIAddressSpace));
+        iommu_as[devfn] = g_new0(AMDVIAddressSpace, 1);
         iommu_as[devfn]->bus_num = (uint8_t)bus_num;
         iommu_as[devfn]->devfn = (uint8_t)devfn;
         iommu_as[devfn]->iommu_state = s;
diff --git a/hw/i386/intel_iommu.c b/hw/i386/intel_iommu.c
index 32471a44cb..c64aa81a83 100644
--- a/hw/i386/intel_iommu.c
+++ b/hw/i386/intel_iommu.c
@@ -3416,7 +3416,7 @@ VTDAddressSpace *vtd_find_add_as(IntelIOMMUState *s, PCIBus *bus, int devfn)
     if (!vtd_dev_as) {
         snprintf(name, sizeof(name), "vtd-%02x.%x", PCI_SLOT(devfn),
                  PCI_FUNC(devfn));
-        vtd_bus->dev_as[devfn] = vtd_dev_as = g_malloc0(sizeof(VTDAddressSpace));
+        vtd_bus->dev_as[devfn] = vtd_dev_as = g_new0(VTDAddressSpace, 1);
 
         vtd_dev_as->bus = bus;
         vtd_dev_as->devfn = (uint8_t)devfn;
diff --git a/hw/i386/xen/xen-hvm.c b/hw/i386/xen/xen-hvm.c
index cf8e500514..0731f70410 100644
--- a/hw/i386/xen/xen-hvm.c
+++ b/hw/i386/xen/xen-hvm.c
@@ -396,7 +396,7 @@ go_physmap:
 
     mr_name = memory_region_name(mr);
 
-    physmap = g_malloc(sizeof(XenPhysmap));
+    physmap = g_new(XenPhysmap, 1);
 
     physmap->start_addr = start_addr;
     physmap->size = size;
@@ -1281,7 +1281,7 @@ static void xen_read_physmap(XenIOState *state)
         return;
 
     for (i = 0; i < num; i++) {
-        physmap = g_malloc(sizeof (XenPhysmap));
+        physmap = g_new(XenPhysmap, 1);
         physmap->phys_offset = strtoull(entries[i], NULL, 16);
         snprintf(path, sizeof(path),
                 "/local/domain/0/device-model/%d/physmap/%s/start_addr",
@@ -1410,7 +1410,7 @@ void xen_hvm_init_pc(PCMachineState *pcms, MemoryRegion **ram_memory)
     xen_pfn_t ioreq_pfn;
     XenIOState *state;
 
-    state = g_malloc0(sizeof (XenIOState));
+    state = g_new0(XenIOState, 1);
 
     state->xce_handle = xenevtchn_open(NULL, 0);
     if (state->xce_handle == NULL) {
@@ -1463,7 +1463,7 @@ void xen_hvm_init_pc(PCMachineState *pcms, MemoryRegion **ram_memory)
     }
 
     /* Note: cpus is empty at this point in init */
-    state->cpu_by_vcpu_id = g_malloc0(max_cpus * sizeof(CPUState *));
+    state->cpu_by_vcpu_id = g_new0(CPUState *, max_cpus);
 
     rc = xen_set_ioreq_server_state(xen_domid, state->ioservid, true);
     if (rc < 0) {
@@ -1472,7 +1472,7 @@ void xen_hvm_init_pc(PCMachineState *pcms, MemoryRegion **ram_memory)
         goto err;
     }
 
-    state->ioreq_local_port = g_malloc0(max_cpus * sizeof (evtchn_port_t));
+    state->ioreq_local_port = g_new0(evtchn_port_t, max_cpus);
 
     /* FIXME: how about if we overflow the page here? */
     for (i = 0; i < max_cpus; i++) {
diff --git a/hw/i386/xen/xen-mapcache.c b/hw/i386/xen/xen-mapcache.c
index f2ef977963..a2f93096e7 100644
--- a/hw/i386/xen/xen-mapcache.c
+++ b/hw/i386/xen/xen-mapcache.c
@@ -108,7 +108,7 @@ void xen_map_cache_init(phys_offset_to_gaddr_t f, void *opaque)
     unsigned long size;
     struct rlimit rlimit_as;
 
-    mapcache = g_malloc0(sizeof (MapCache));
+    mapcache = g_new0(MapCache, 1);
 
     mapcache->phys_offset_to_gaddr = f;
     mapcache->opaque = opaque;
@@ -164,8 +164,8 @@ static void xen_remap_bucket(MapCacheEntry *entry,
 
     trace_xen_remap_bucket(address_index);
 
-    pfns = g_malloc0(nb_pfn * sizeof (xen_pfn_t));
-    err = g_malloc0(nb_pfn * sizeof (int));
+    pfns = g_new0(xen_pfn_t, nb_pfn);
+    err = g_new0(int, nb_pfn);
 
     if (entry->vaddr_base != NULL) {
         if (!(entry->flags & XEN_MAPCACHE_ENTRY_DUMMY)) {
@@ -231,8 +231,8 @@ static void xen_remap_bucket(MapCacheEntry *entry,
     entry->vaddr_base = vaddr_base;
     entry->paddr_index = address_index;
     entry->size = size;
-    entry->valid_mapping = (unsigned long *) g_malloc0(sizeof(unsigned long) *
-            BITS_TO_LONGS(size >> XC_PAGE_SHIFT));
+    entry->valid_mapping = g_new0(unsigned long,
+                                  BITS_TO_LONGS(size >> XC_PAGE_SHIFT));
 
     if (dummy) {
         entry->flags |= XEN_MAPCACHE_ENTRY_DUMMY;
@@ -319,7 +319,7 @@ tryagain:
         pentry = free_pentry;
     }
     if (!entry) {
-        entry = g_malloc0(sizeof (MapCacheEntry));
+        entry = g_new0(MapCacheEntry, 1);
         pentry->next = entry;
         xen_remap_bucket(entry, NULL, cache_size, address_index, dummy);
     } else if (!entry->lock) {
@@ -353,7 +353,7 @@ tryagain:
 
     mapcache->last_entry = entry;
     if (lock) {
-        MapCacheRev *reventry = g_malloc0(sizeof(MapCacheRev));
+        MapCacheRev *reventry = g_new0(MapCacheRev, 1);
         entry->lock++;
         if (entry->lock == 0) {
             fprintf(stderr,
diff --git a/hw/input/lasips2.c b/hw/input/lasips2.c
index 68d741d342..94f18be4cd 100644
--- a/hw/input/lasips2.c
+++ b/hw/input/lasips2.c
@@ -266,7 +266,7 @@ void lasips2_init(MemoryRegion *address_space,
 {
     LASIPS2State *s;
 
-    s = g_malloc0(sizeof(LASIPS2State));
+    s = g_new0(LASIPS2State, 1);
 
     s->irq = irq;
     s->mouse.id = 1;
diff --git a/hw/input/pckbd.c b/hw/input/pckbd.c
index 1773db0d25..4efdf75620 100644
--- a/hw/input/pckbd.c
+++ b/hw/input/pckbd.c
@@ -649,7 +649,7 @@ void i8042_mm_init(qemu_irq kbd_irq, qemu_irq mouse_irq,
                    MemoryRegion *region, ram_addr_t size,
                    hwaddr mask)
 {
-    KBDState *s = g_malloc0(sizeof(KBDState));
+    KBDState *s = g_new0(KBDState, 1);
 
     s->irq_kbd = kbd_irq;
     s->irq_mouse = mouse_irq;
diff --git a/hw/input/ps2.c b/hw/input/ps2.c
index 6236711e1b..c16df1de7a 100644
--- a/hw/input/ps2.c
+++ b/hw/input/ps2.c
@@ -1226,7 +1226,7 @@ static QemuInputHandler ps2_keyboard_handler = {
 
 void *ps2_kbd_init(void (*update_irq)(void *, int), void *update_arg)
 {
-    PS2KbdState *s = (PS2KbdState *)g_malloc0(sizeof(PS2KbdState));
+    PS2KbdState *s = g_new0(PS2KbdState, 1);
 
     trace_ps2_kbd_init(s);
     s->common.update_irq = update_irq;
@@ -1248,7 +1248,7 @@ static QemuInputHandler ps2_mouse_handler = {
 
 void *ps2_mouse_init(void (*update_irq)(void *, int), void *update_arg)
 {
-    PS2MouseState *s = (PS2MouseState *)g_malloc0(sizeof(PS2MouseState));
+    PS2MouseState *s = g_new0(PS2MouseState, 1);
 
     trace_ps2_mouse_init(s);
     s->common.update_irq = update_irq;
diff --git a/hw/input/pxa2xx_keypad.c b/hw/input/pxa2xx_keypad.c
index 7f2f739fb3..3dd03e8c9f 100644
--- a/hw/input/pxa2xx_keypad.c
+++ b/hw/input/pxa2xx_keypad.c
@@ -306,7 +306,7 @@ PXA2xxKeyPadState *pxa27x_keypad_init(MemoryRegion *sysmem,
 {
     PXA2xxKeyPadState *s;
 
-    s = (PXA2xxKeyPadState *) g_malloc0(sizeof(PXA2xxKeyPadState));
+    s = g_new0(PXA2xxKeyPadState, 1);
     s->irq = irq;
 
     memory_region_init_io(&s->iomem, NULL, &pxa2xx_keypad_ops, s,
diff --git a/hw/input/tsc2005.c b/hw/input/tsc2005.c
index 55d61cc843..14698ce109 100644
--- a/hw/input/tsc2005.c
+++ b/hw/input/tsc2005.c
@@ -489,8 +489,7 @@ void *tsc2005_init(qemu_irq pintdav)
 {
     TSC2005State *s;
 
-    s = (TSC2005State *)
-            g_malloc0(sizeof(TSC2005State));
+    s = g_new0(TSC2005State, 1);
     s->x = 400;
     s->y = 240;
     s->pressure = false;
diff --git a/hw/intc/riscv_aclint.c b/hw/intc/riscv_aclint.c
index f1a5d3d284..e43b050e92 100644
--- a/hw/intc/riscv_aclint.c
+++ b/hw/intc/riscv_aclint.c
@@ -235,7 +235,7 @@ static void riscv_aclint_mtimer_realize(DeviceState *dev, Error **errp)
                           s, TYPE_RISCV_ACLINT_MTIMER, s->aperture_size);
     sysbus_init_mmio(SYS_BUS_DEVICE(dev), &s->mmio);
 
-    s->timer_irqs = g_malloc(sizeof(qemu_irq) * s->num_harts);
+    s->timer_irqs = g_new(qemu_irq, s->num_harts);
     qdev_init_gpio_out(dev, s->timer_irqs, s->num_harts);
 
     /* Claim timer interrupt bits */
@@ -292,7 +292,7 @@ DeviceState *riscv_aclint_mtimer_create(hwaddr addr, hwaddr size,
         RISCVCPU *rvcpu = RISCV_CPU(cpu);
         CPURISCVState *env = cpu ? cpu->env_ptr : NULL;
         riscv_aclint_mtimer_callback *cb =
-            g_malloc0(sizeof(riscv_aclint_mtimer_callback));
+            g_new0(riscv_aclint_mtimer_callback, 1);
 
         if (!env) {
             g_free(cb);
@@ -393,7 +393,7 @@ static void riscv_aclint_swi_realize(DeviceState *dev, Error **errp)
                           TYPE_RISCV_ACLINT_SWI, RISCV_ACLINT_SWI_SIZE);
     sysbus_init_mmio(SYS_BUS_DEVICE(dev), &swi->mmio);
 
-    swi->soft_irqs = g_malloc(sizeof(qemu_irq) * swi->num_harts);
+    swi->soft_irqs = g_new(qemu_irq, swi->num_harts);
     qdev_init_gpio_out(dev, swi->soft_irqs, swi->num_harts);
 
     /* Claim software interrupt bits */
diff --git a/hw/intc/xics.c b/hw/intc/xics.c
index 48a835eab7..24e67020db 100644
--- a/hw/intc/xics.c
+++ b/hw/intc/xics.c
@@ -604,7 +604,7 @@ static void ics_realize(DeviceState *dev, Error **errp)
         error_setg(errp, "Number of interrupts needs to be greater 0");
         return;
     }
-    ics->irqs = g_malloc0(ics->nr_irqs * sizeof(ICSIRQState));
+    ics->irqs = g_new0(ICSIRQState, ics->nr_irqs);
 
     qemu_register_reset(ics_reset_handler, ics);
 }
diff --git a/hw/m68k/virt.c b/hw/m68k/virt.c
index bbaf630bbf..8e630282e0 100644
--- a/hw/m68k/virt.c
+++ b/hw/m68k/virt.c
@@ -132,7 +132,7 @@ static void virt_init(MachineState *machine)
         exit(1);
     }
 
-    reset_info = g_malloc0(sizeof(ResetInfo));
+    reset_info = g_new0(ResetInfo, 1);
 
     /* init CPUs */
     cpu = M68K_CPU(cpu_create(machine->cpu_type));
diff --git a/hw/mips/mipssim.c b/hw/mips/mipssim.c
index 2325e7e05a..27a46bd538 100644
--- a/hw/mips/mipssim.c
+++ b/hw/mips/mipssim.c
@@ -162,7 +162,7 @@ mips_mipssim_init(MachineState *machine)
     cpu = mips_cpu_create_with_clock(machine->cpu_type, cpuclk);
     env = &cpu->env;
 
-    reset_info = g_malloc0(sizeof(ResetData));
+    reset_info = g_new0(ResetData, 1);
     reset_info->cpu = cpu;
     reset_info->vector = env->active_tc.PC;
     qemu_register_reset(main_cpu_reset, reset_info);
diff --git a/hw/misc/applesmc.c b/hw/misc/applesmc.c
index 1b9acaf1d3..81cd6b6423 100644
--- a/hw/misc/applesmc.c
+++ b/hw/misc/applesmc.c
@@ -253,7 +253,7 @@ static void applesmc_add_key(AppleSMCState *s, const char *key,
 {
     struct AppleSMCData *def;
 
-    def = g_malloc0(sizeof(struct AppleSMCData));
+    def = g_new0(struct AppleSMCData, 1);
     def->key = key;
     def->len = len;
     def->data = data;
diff --git a/hw/misc/imx6_src.c b/hw/misc/imx6_src.c
index 79f4375911..7b0e968804 100644
--- a/hw/misc/imx6_src.c
+++ b/hw/misc/imx6_src.c
@@ -151,7 +151,7 @@ static void imx6_defer_clear_reset_bit(int cpuid,
         return;
     }
 
-    ri = g_malloc(sizeof(struct SRCSCRResetInfo));
+    ri = g_new(struct SRCSCRResetInfo, 1);
     ri->s = s;
     ri->reset_bit = reset_shift;
 
diff --git a/hw/misc/ivshmem.c b/hw/misc/ivshmem.c
index 299837e5c1..b54778ada5 100644
--- a/hw/misc/ivshmem.c
+++ b/hw/misc/ivshmem.c
@@ -411,7 +411,7 @@ static void resize_peers(IVShmemState *s, int nb_peers)
     assert(nb_peers > old_nb_peers);
     IVSHMEM_DPRINTF("bumping storage to %d peers\n", nb_peers);
 
-    s->peers = g_realloc(s->peers, nb_peers * sizeof(Peer));
+    s->peers = g_renew(Peer, s->peers, nb_peers);
     s->nb_peers = nb_peers;
 
     for (i = old_nb_peers; i < nb_peers; i++) {
@@ -728,7 +728,7 @@ static void ivshmem_reset(DeviceState *d)
 static int ivshmem_setup_interrupts(IVShmemState *s, Error **errp)
 {
     /* allocate QEMU callback data for receiving interrupts */
-    s->msi_vectors = g_malloc0(s->vectors * sizeof(MSIVector));
+    s->msi_vectors = g_new0(MSIVector, s->vectors);
 
     if (ivshmem_has_feature(s, IVSHMEM_MSI)) {
         if (msix_init_exclusive_bar(PCI_DEVICE(s), s->vectors, 1, errp)) {
diff --git a/hw/net/virtio-net.c b/hw/net/virtio-net.c
index b02a0632df..bd121103f3 100644
--- a/hw/net/virtio-net.c
+++ b/hw/net/virtio-net.c
@@ -1994,7 +1994,7 @@ static void virtio_net_rsc_cache_buf(VirtioNetRscChain *chain,
     VirtioNetRscSeg *seg;
 
     hdr_len = chain->n->guest_hdr_len;
-    seg = g_malloc(sizeof(VirtioNetRscSeg));
+    seg = g_new(VirtioNetRscSeg, 1);
     seg->buf = g_malloc(hdr_len + sizeof(struct eth_header)
         + sizeof(struct ip6_header) + VIRTIO_NET_MAX_TCP_PAYLOAD);
     memcpy(seg->buf, buf, size);
@@ -3442,7 +3442,7 @@ static void virtio_net_device_realize(DeviceState *dev, Error **errp)
         virtio_cleanup(vdev);
         return;
     }
-    n->vqs = g_malloc0(sizeof(VirtIONetQueue) * n->max_queue_pairs);
+    n->vqs = g_new0(VirtIONetQueue, n->max_queue_pairs);
     n->curr_queue_pairs = 1;
     n->tx_timeout = n->net_conf.txtimer;
 
diff --git a/hw/nvme/ns.c b/hw/nvme/ns.c
index 8a3613d9ab..324f53ea0c 100644
--- a/hw/nvme/ns.c
+++ b/hw/nvme/ns.c
@@ -268,7 +268,7 @@ static void nvme_ns_init_zoned(NvmeNamespace *ns)
 
     nvme_ns_zoned_init_state(ns);
 
-    id_ns_z = g_malloc0(sizeof(NvmeIdNsZoned));
+    id_ns_z = g_new0(NvmeIdNsZoned, 1);
 
     /* MAR/MOR are zeroes-based, FFFFFFFFFh means no limit */
     id_ns_z->mar = cpu_to_le32(ns->params.max_active_zones - 1);
diff --git a/hw/pci-host/pnv_phb3.c b/hw/pci-host/pnv_phb3.c
index aafd46b635..ac6fe48975 100644
--- a/hw/pci-host/pnv_phb3.c
+++ b/hw/pci-host/pnv_phb3.c
@@ -946,7 +946,7 @@ static AddressSpace *pnv_phb3_dma_iommu(PCIBus *bus, void *opaque, int devfn)
     }
 
     if (ds == NULL) {
-        ds = g_malloc0(sizeof(PnvPhb3DMASpace));
+        ds = g_new0(PnvPhb3DMASpace, 1);
         ds->bus = bus;
         ds->devfn = devfn;
         ds->pe_num = PHB_INVALID_PE;
diff --git a/hw/pci-host/pnv_phb4.c b/hw/pci-host/pnv_phb4.c
index b5b384e9ee..d0d1612e1e 100644
--- a/hw/pci-host/pnv_phb4.c
+++ b/hw/pci-host/pnv_phb4.c
@@ -1466,7 +1466,7 @@ static AddressSpace *pnv_phb4_dma_iommu(PCIBus *bus, void *opaque, int devfn)
     ds = pnv_phb4_dma_find(phb, bus, devfn);
 
     if (ds == NULL) {
-        ds = g_malloc0(sizeof(PnvPhb4DMASpace));
+        ds = g_new0(PnvPhb4DMASpace, 1);
         ds->bus = bus;
         ds->devfn = devfn;
         ds->pe_num = PHB_INVALID_PE;
diff --git a/hw/pci/pcie_sriov.c b/hw/pci/pcie_sriov.c
index 87abad6ac8..8e3faf1f59 100644
--- a/hw/pci/pcie_sriov.c
+++ b/hw/pci/pcie_sriov.c
@@ -177,7 +177,7 @@ static void register_vfs(PCIDevice *dev)
     assert(sriov_cap > 0);
     num_vfs = pci_get_word(dev->config + sriov_cap + PCI_SRIOV_NUM_VF);
 
-    dev->exp.sriov_pf.vf = g_malloc(sizeof(PCIDevice *) * num_vfs);
+    dev->exp.sriov_pf.vf = g_new(PCIDevice *, num_vfs);
     assert(dev->exp.sriov_pf.vf);
 
     trace_sriov_register_vfs(dev->name, PCI_SLOT(dev->devfn),
diff --git a/hw/ppc/e500.c b/hw/ppc/e500.c
index 960e7efcd3..c7e6767f91 100644
--- a/hw/ppc/e500.c
+++ b/hw/ppc/e500.c
@@ -899,7 +899,7 @@ void ppce500_init(MachineState *machine)
         if (!i) {
             /* Primary CPU */
             struct boot_info *boot_info;
-            boot_info = g_malloc0(sizeof(struct boot_info));
+            boot_info = g_new0(struct boot_info, 1);
             qemu_register_reset(ppce500_cpu_reset, cpu);
             env->load_info = boot_info;
         } else {
diff --git a/hw/ppc/ppc.c b/hw/ppc/ppc.c
index 9e99625ea9..faa02d6710 100644
--- a/hw/ppc/ppc.c
+++ b/hw/ppc/ppc.c
@@ -1063,7 +1063,7 @@ clk_setup_cb cpu_ppc_tb_init (CPUPPCState *env, uint32_t freq)
     PowerPCCPU *cpu = env_archcpu(env);
     ppc_tb_t *tb_env;
 
-    tb_env = g_malloc0(sizeof(ppc_tb_t));
+    tb_env = g_new0(ppc_tb_t, 1);
     env->tb_env = tb_env;
     tb_env->flags = PPC_DECR_UNDERFLOW_TRIGGERED;
     if (is_book3s_arch2x(env)) {
@@ -1338,8 +1338,8 @@ clk_setup_cb ppc_40x_timers_init (CPUPPCState *env, uint32_t freq,
 
     trace_ppc40x_timers_init(freq);
 
-    tb_env = g_malloc0(sizeof(ppc_tb_t));
-    ppc40x_timer = g_malloc0(sizeof(ppc40x_timer_t));
+    tb_env = g_new0(ppc_tb_t, 1);
+    ppc40x_timer = g_new0(ppc40x_timer_t, 1);
 
     env->tb_env = tb_env;
     tb_env->flags = PPC_DECR_UNDERFLOW_TRIGGERED;
@@ -1447,7 +1447,7 @@ int ppc_dcr_init (CPUPPCState *env, int (*read_error)(int dcrn),
 {
     ppc_dcr_t *dcr_env;
 
-    dcr_env = g_malloc0(sizeof(ppc_dcr_t));
+    dcr_env = g_new0(ppc_dcr_t, 1);
     dcr_env->read_error = read_error;
     dcr_env->write_error = write_error;
     env->dcr_env = dcr_env;
diff --git a/hw/ppc/ppc405_boards.c b/hw/ppc/ppc405_boards.c
index 3ae2b36373..7e1a4ac955 100644
--- a/hw/ppc/ppc405_boards.c
+++ b/hw/ppc/ppc405_boards.c
@@ -130,7 +130,7 @@ static void ref405ep_fpga_init(MemoryRegion *sysmem, uint32_t base)
     ref405ep_fpga_t *fpga;
     MemoryRegion *fpga_memory = g_new(MemoryRegion, 1);
 
-    fpga = g_malloc0(sizeof(ref405ep_fpga_t));
+    fpga = g_new0(ref405ep_fpga_t, 1);
     memory_region_init_io(fpga_memory, NULL, &ref405ep_fpga_ops, fpga,
                           "fpga", 0x00000100);
     memory_region_add_subregion(sysmem, base, fpga_memory);
@@ -431,7 +431,7 @@ static void taihu_cpld_init(MemoryRegion *sysmem, uint32_t base)
     taihu_cpld_t *cpld;
     MemoryRegion *cpld_memory = g_new(MemoryRegion, 1);
 
-    cpld = g_malloc0(sizeof(taihu_cpld_t));
+    cpld = g_new0(taihu_cpld_t, 1);
     memory_region_init_io(cpld_memory, NULL, &taihu_cpld_ops, cpld, "cpld", 0x100);
     memory_region_add_subregion(sysmem, base, cpld_memory);
     qemu_register_reset(&taihu_cpld_reset, cpld);
diff --git a/hw/ppc/ppc405_uc.c b/hw/ppc/ppc405_uc.c
index 8aacd275a6..36c8ba6f3c 100644
--- a/hw/ppc/ppc405_uc.c
+++ b/hw/ppc/ppc405_uc.c
@@ -215,7 +215,7 @@ void ppc4xx_plb_init(CPUPPCState *env)
 {
     ppc4xx_plb_t *plb;
 
-    plb = g_malloc0(sizeof(ppc4xx_plb_t));
+    plb = g_new0(ppc4xx_plb_t, 1);
     ppc_dcr_register(env, PLB3A0_ACR, plb, &dcr_read_plb, &dcr_write_plb);
     ppc_dcr_register(env, PLB4A0_ACR, plb, &dcr_read_plb, &dcr_write_plb);
     ppc_dcr_register(env, PLB0_ACR, plb, &dcr_read_plb, &dcr_write_plb);
@@ -300,7 +300,7 @@ static void ppc4xx_pob_init(CPUPPCState *env)
 {
     ppc4xx_pob_t *pob;
 
-    pob = g_malloc0(sizeof(ppc4xx_pob_t));
+    pob = g_new0(ppc4xx_pob_t, 1);
     ppc_dcr_register(env, POB0_BEAR, pob, &dcr_read_pob, &dcr_write_pob);
     ppc_dcr_register(env, POB0_BESR0, pob, &dcr_read_pob, &dcr_write_pob);
     ppc_dcr_register(env, POB0_BESR1, pob, &dcr_read_pob, &dcr_write_pob);
@@ -380,7 +380,7 @@ static void ppc4xx_opba_init(hwaddr base)
 
     trace_opba_init(base);
 
-    opba = g_malloc0(sizeof(ppc4xx_opba_t));
+    opba = g_new0(ppc4xx_opba_t, 1);
     memory_region_init_io(&opba->io, NULL, &opba_ops, opba, "opba", 0x002);
     memory_region_add_subregion(get_system_memory(), base, &opba->io);
     qemu_register_reset(ppc4xx_opba_reset, opba);
@@ -575,7 +575,7 @@ void ppc405_ebc_init(CPUPPCState *env)
 {
     ppc4xx_ebc_t *ebc;
 
-    ebc = g_malloc0(sizeof(ppc4xx_ebc_t));
+    ebc = g_new0(ppc4xx_ebc_t, 1);
     qemu_register_reset(&ebc_reset, ebc);
     ppc_dcr_register(env, EBC0_CFGADDR,
                      ebc, &dcr_read_ebc, &dcr_write_ebc);
@@ -658,7 +658,7 @@ static void ppc405_dma_init(CPUPPCState *env, qemu_irq irqs[4])
 {
     ppc405_dma_t *dma;
 
-    dma = g_malloc0(sizeof(ppc405_dma_t));
+    dma = g_new0(ppc405_dma_t, 1);
     memcpy(dma->irqs, irqs, 4 * sizeof(qemu_irq));
     qemu_register_reset(&ppc405_dma_reset, dma);
     ppc_dcr_register(env, DMA0_CR0,
@@ -757,7 +757,7 @@ static void ppc405_gpio_init(hwaddr base)
 
     trace_ppc405_gpio_init(base);
 
-    gpio = g_malloc0(sizeof(ppc405_gpio_t));
+    gpio = g_new0(ppc405_gpio_t, 1);
     memory_region_init_io(&gpio->io, NULL, &ppc405_gpio_ops, gpio, "pgio", 0x038);
     memory_region_add_subregion(get_system_memory(), base, &gpio->io);
     qemu_register_reset(&ppc405_gpio_reset, gpio);
@@ -906,7 +906,7 @@ static void ppc405_ocm_init(CPUPPCState *env)
 {
     ppc405_ocm_t *ocm;
 
-    ocm = g_malloc0(sizeof(ppc405_ocm_t));
+    ocm = g_new0(ppc405_ocm_t, 1);
     /* XXX: Size is 4096 or 0x04000000 */
     memory_region_init_ram(&ocm->isarc_ram, NULL, "ppc405.ocm", 4 * KiB,
                            &error_fatal);
@@ -1148,7 +1148,7 @@ static void ppc4xx_gpt_init(hwaddr base, qemu_irq irqs[5])
 
     trace_ppc4xx_gpt_init(base);
 
-    gpt = g_malloc0(sizeof(ppc4xx_gpt_t));
+    gpt = g_new0(ppc4xx_gpt_t, 1);
     for (i = 0; i < 5; i++) {
         gpt->irqs[i] = irqs[i];
     }
@@ -1399,7 +1399,7 @@ static void ppc405ep_cpc_init (CPUPPCState *env, clk_setup_t clk_setup[8],
 {
     ppc405ep_cpc_t *cpc;
 
-    cpc = g_malloc0(sizeof(ppc405ep_cpc_t));
+    cpc = g_new0(ppc405ep_cpc_t, 1);
     memcpy(cpc->clk_setup, clk_setup,
            PPC405EP_CLK_NB * sizeof(clk_setup_t));
     cpc->jtagid = 0x20267049;
diff --git a/hw/ppc/ppc4xx_devs.c b/hw/ppc/ppc4xx_devs.c
index e7d82ae501..737c0896b4 100644
--- a/hw/ppc/ppc4xx_devs.c
+++ b/hw/ppc/ppc4xx_devs.c
@@ -389,7 +389,7 @@ void ppc4xx_sdram_init (CPUPPCState *env, qemu_irq irq, int nbanks,
 {
     ppc4xx_sdram_t *sdram;
 
-    sdram = g_malloc0(sizeof(ppc4xx_sdram_t));
+    sdram = g_new0(ppc4xx_sdram_t, 1);
     sdram->irq = irq;
     sdram->nbanks = nbanks;
     sdram->ram_memories = ram_memories;
diff --git a/hw/ppc/ppc_booke.c b/hw/ppc/ppc_booke.c
index 10b643861f..ca22da196a 100644
--- a/hw/ppc/ppc_booke.c
+++ b/hw/ppc/ppc_booke.c
@@ -337,8 +337,8 @@ void ppc_booke_timers_init(PowerPCCPU *cpu, uint32_t freq, uint32_t flags)
     booke_timer_t *booke_timer;
     int ret = 0;
 
-    tb_env      = g_malloc0(sizeof(ppc_tb_t));
-    booke_timer = g_malloc0(sizeof(booke_timer_t));
+    tb_env      = g_new0(ppc_tb_t, 1);
+    booke_timer = g_new0(booke_timer_t, 1);
 
     cpu->env.tb_env = tb_env;
     tb_env->flags = flags | PPC_TIMER_BOOKE | PPC_DECR_ZERO_TRIGGERED;
diff --git a/hw/ppc/spapr.c b/hw/ppc/spapr.c
index 953fc65fa8..a4372ba189 100644
--- a/hw/ppc/spapr.c
+++ b/hw/ppc/spapr.c
@@ -3601,7 +3601,7 @@ static SpaprDimmState *spapr_pending_dimm_unplugs_add(SpaprMachineState *spapr,
      */
     ds = spapr_pending_dimm_unplugs_find(spapr, dimm);
     if (!ds) {
-        ds = g_malloc0(sizeof(SpaprDimmState));
+        ds = g_new0(SpaprDimmState, 1);
         ds->nr_lmbs = nr_lmbs;
         ds->dimm = dimm;
         QTAILQ_INSERT_HEAD(&spapr->pending_dimm_unplugs, ds, next);
diff --git a/hw/ppc/spapr_events.c b/hw/ppc/spapr_events.c
index 630e86282c..4508e40814 100644
--- a/hw/ppc/spapr_events.c
+++ b/hw/ppc/spapr_events.c
@@ -594,7 +594,7 @@ static void spapr_hotplug_req_event(uint8_t hp_id, uint8_t hp_action,
     struct rtas_event_log_v6_hp *hp;
 
     entry = g_new(SpaprEventLogEntry, 1);
-    new_hp = g_malloc0(sizeof(struct hp_extended_log));
+    new_hp = g_new0(struct hp_extended_log, 1);
     entry->extended_log = new_hp;
 
     v6hdr = &new_hp->v6hdr;
diff --git a/hw/ppc/spapr_hcall.c b/hw/ppc/spapr_hcall.c
index f008290787..7c8bb76f99 100644
--- a/hw/ppc/spapr_hcall.c
+++ b/hw/ppc/spapr_hcall.c
@@ -1596,7 +1596,7 @@ static target_ulong h_enter_nested(PowerPCCPU *cpu,
         return H_PARAMETER;
     }
 
-    spapr_cpu->nested_host_state = g_try_malloc(sizeof(CPUPPCState));
+    spapr_cpu->nested_host_state = g_try_new(CPUPPCState, 1);
     if (!spapr_cpu->nested_host_state) {
         return H_NO_MEM;
     }
diff --git a/hw/ppc/spapr_numa.c b/hw/ppc/spapr_numa.c
index 4f93bdefec..d7c0e212ba 100644
--- a/hw/ppc/spapr_numa.c
+++ b/hw/ppc/spapr_numa.c
@@ -436,8 +436,7 @@ int spapr_numa_write_assoc_lookup_arrays(SpaprMachineState *spapr, void *fdt,
     int i;
 
     /* ibm,associativity-lookup-arrays */
-    int_buf = g_malloc0((nr_nodes * max_distance_ref_points + 2) *
-                        sizeof(uint32_t));
+    int_buf = g_new0(uint32_t, nr_nodes * max_distance_ref_points + 2);
     cur_index = int_buf;
     int_buf[0] = cpu_to_be32(nr_nodes);
      /* Number of entries per associativity list */
diff --git a/hw/rdma/vmw/pvrdma_dev_ring.c b/hw/rdma/vmw/pvrdma_dev_ring.c
index 42130667a7..598e6adc5e 100644
--- a/hw/rdma/vmw/pvrdma_dev_ring.c
+++ b/hw/rdma/vmw/pvrdma_dev_ring.c
@@ -41,7 +41,7 @@ int pvrdma_ring_init(PvrdmaRing *ring, const char *name, PCIDevice *dev,
     qatomic_set(&ring->ring_state->cons_head, 0);
     */
     ring->npages = npages;
-    ring->pages = g_malloc0(npages * sizeof(void *));
+    ring->pages = g_new0(void *, npages);
 
     for (i = 0; i < npages; i++) {
         if (!tbl[i]) {
diff --git a/hw/rdma/vmw/pvrdma_qp_ops.c b/hw/rdma/vmw/pvrdma_qp_ops.c
index 8050287a6c..bd7cbf2bdf 100644
--- a/hw/rdma/vmw/pvrdma_qp_ops.c
+++ b/hw/rdma/vmw/pvrdma_qp_ops.c
@@ -154,7 +154,7 @@ void pvrdma_qp_send(PVRDMADev *dev, uint32_t qp_handle)
         CompHandlerCtx *comp_ctx;
 
         /* Prepare CQE */
-        comp_ctx = g_malloc(sizeof(CompHandlerCtx));
+        comp_ctx = g_new(CompHandlerCtx, 1);
         comp_ctx->dev = dev;
         comp_ctx->cq_handle = qp->send_cq_handle;
         comp_ctx->cqe.wr_id = wqe->hdr.wr_id;
@@ -217,7 +217,7 @@ void pvrdma_qp_recv(PVRDMADev *dev, uint32_t qp_handle)
         CompHandlerCtx *comp_ctx;
 
         /* Prepare CQE */
-        comp_ctx = g_malloc(sizeof(CompHandlerCtx));
+        comp_ctx = g_new(CompHandlerCtx, 1);
         comp_ctx->dev = dev;
         comp_ctx->cq_handle = qp->recv_cq_handle;
         comp_ctx->cqe.wr_id = wqe->hdr.wr_id;
@@ -259,7 +259,7 @@ void pvrdma_srq_recv(PVRDMADev *dev, uint32_t srq_handle)
         CompHandlerCtx *comp_ctx;
 
         /* Prepare CQE */
-        comp_ctx = g_malloc(sizeof(CompHandlerCtx));
+        comp_ctx = g_new(CompHandlerCtx, 1);
         comp_ctx->dev = dev;
         comp_ctx->cq_handle = srq->recv_cq_handle;
         comp_ctx->cqe.wr_id = wqe->hdr.wr_id;
diff --git a/hw/sh4/r2d.c b/hw/sh4/r2d.c
index 72759413f3..39fc4f19d9 100644
--- a/hw/sh4/r2d.c
+++ b/hw/sh4/r2d.c
@@ -190,7 +190,7 @@ static qemu_irq *r2d_fpga_init(MemoryRegion *sysmem,
 {
     r2d_fpga_t *s;
 
-    s = g_malloc0(sizeof(r2d_fpga_t));
+    s = g_new0(r2d_fpga_t, 1);
 
     s->irl = irl;
 
@@ -248,7 +248,7 @@ static void r2d_init(MachineState *machine)
     cpu = SUPERH_CPU(cpu_create(machine->cpu_type));
     env = &cpu->env;
 
-    reset_info = g_malloc0(sizeof(ResetData));
+    reset_info = g_new0(ResetData, 1);
     reset_info->cpu = cpu;
     reset_info->vector = env->pc;
     qemu_register_reset(main_cpu_reset, reset_info);
diff --git a/hw/sh4/sh7750.c b/hw/sh4/sh7750.c
index 43dfb6497b..c77792d150 100644
--- a/hw/sh4/sh7750.c
+++ b/hw/sh4/sh7750.c
@@ -770,7 +770,7 @@ SH7750State *sh7750_init(SuperHCPU *cpu, MemoryRegion *sysmem)
     SysBusDevice *sb;
     MemoryRegion *mr, *alias;
 
-    s = g_malloc0(sizeof(SH7750State));
+    s = g_new0(SH7750State, 1);
     s->cpu = cpu;
     s->periph_freq = 60000000; /* 60MHz */
     memory_region_init_io(&s->iomem, NULL, &sh7750_mem_ops, s,
diff --git a/hw/sparc/leon3.c b/hw/sparc/leon3.c
index 7b4dec1721..a9f2496827 100644
--- a/hw/sparc/leon3.c
+++ b/hw/sparc/leon3.c
@@ -241,7 +241,7 @@ static void leon3_generic_hw_init(MachineState *machine)
     cpu_sparc_set_id(env, 0);
 
     /* Reset data */
-    reset_info        = g_malloc0(sizeof(ResetData));
+    reset_info        = g_new0(ResetData, 1);
     reset_info->cpu   = cpu;
     reset_info->sp    = LEON3_RAM_OFFSET + ram_size;
     qemu_register_reset(main_cpu_reset, reset_info);
diff --git a/hw/sparc64/sparc64.c b/hw/sparc64/sparc64.c
index 8654e955eb..72f0849f50 100644
--- a/hw/sparc64/sparc64.c
+++ b/hw/sparc64/sparc64.c
@@ -81,7 +81,7 @@ static CPUTimer *cpu_timer_create(const char *name, SPARCCPU *cpu,
                                   QEMUBHFunc *cb, uint32_t frequency,
                                   uint64_t disabled_mask, uint64_t npt_mask)
 {
-    CPUTimer *timer = g_malloc0(sizeof(CPUTimer));
+    CPUTimer *timer = g_new0(CPUTimer, 1);
 
     timer->name = name;
     timer->frequency = frequency;
@@ -288,7 +288,7 @@ SPARCCPU *sparc64_cpu_devinit(const char *cpu_type, uint64_t prom_addr)
                                     hstick_frequency, TICK_INT_DIS,
                                     TICK_NPT_MASK);
 
-    reset_info = g_malloc0(sizeof(ResetData));
+    reset_info = g_new0(ResetData, 1);
     reset_info->cpu = cpu;
     reset_info->prom_addr = prom_addr;
     qemu_register_reset(main_cpu_reset, reset_info);
diff --git a/hw/timer/arm_timer.c b/hw/timer/arm_timer.c
index 15caff0e41..84cf2726bb 100644
--- a/hw/timer/arm_timer.c
+++ b/hw/timer/arm_timer.c
@@ -176,7 +176,7 @@ static arm_timer_state *arm_timer_init(uint32_t freq)
 {
     arm_timer_state *s;
 
-    s = (arm_timer_state *)g_malloc0(sizeof(arm_timer_state));
+    s = g_new0(arm_timer_state, 1);
     s->freq = freq;
     s->control = TIMER_CTRL_IE;
 
diff --git a/hw/timer/slavio_timer.c b/hw/timer/slavio_timer.c
index 03e33fc592..90fdce4c44 100644
--- a/hw/timer/slavio_timer.c
+++ b/hw/timer/slavio_timer.c
@@ -400,7 +400,7 @@ static void slavio_timer_init(Object *obj)
         uint64_t size;
         char timer_name[20];
 
-        tc = g_malloc0(sizeof(TimerContext));
+        tc = g_new0(TimerContext, 1);
         tc->s = s;
         tc->timer_index = i;
 
diff --git a/hw/vfio/pci.c b/hw/vfio/pci.c
index 7b45353ce2..436b5cbcb1 100644
--- a/hw/vfio/pci.c
+++ b/hw/vfio/pci.c
@@ -1529,8 +1529,8 @@ static int vfio_msix_setup(VFIOPCIDevice *vdev, int pos, Error **errp)
     int ret;
     Error *err = NULL;
 
-    vdev->msix->pending = g_malloc0(BITS_TO_LONGS(vdev->msix->entries) *
-                                    sizeof(unsigned long));
+    vdev->msix->pending = g_new0(unsigned long,
+                                 BITS_TO_LONGS(vdev->msix->entries));
     ret = msix_init(&vdev->pdev, vdev->msix->entries,
                     vdev->bars[vdev->msix->table_bar].mr,
                     vdev->msix->table_bar, vdev->msix->table_offset,
diff --git a/hw/vfio/platform.c b/hw/vfio/platform.c
index f8f08a0f36..5af73f9287 100644
--- a/hw/vfio/platform.c
+++ b/hw/vfio/platform.c
@@ -71,7 +71,7 @@ static VFIOINTp *vfio_init_intp(VFIODevice *vbasedev,
     sysbus_init_irq(sbdev, &intp->qemuirq);
 
     /* Get an eventfd for trigger */
-    intp->interrupt = g_malloc0(sizeof(EventNotifier));
+    intp->interrupt = g_new0(EventNotifier, 1);
     ret = event_notifier_init(intp->interrupt, 0);
     if (ret) {
         g_free(intp->interrupt);
@@ -82,7 +82,7 @@ static VFIOINTp *vfio_init_intp(VFIODevice *vbasedev,
     }
     if (vfio_irq_is_automasked(intp)) {
         /* Get an eventfd for resample/unmask */
-        intp->unmask = g_malloc0(sizeof(EventNotifier));
+        intp->unmask = g_new0(EventNotifier, 1);
         ret = event_notifier_init(intp->unmask, 0);
         if (ret) {
             g_free(intp->interrupt);
diff --git a/hw/virtio/virtio-crypto.c b/hw/virtio/virtio-crypto.c
index 54f9bbb789..dcd80b904d 100644
--- a/hw/virtio/virtio-crypto.c
+++ b/hw/virtio/virtio-crypto.c
@@ -812,7 +812,7 @@ static void virtio_crypto_device_realize(DeviceState *dev, Error **errp)
 
     virtio_init(vdev, "virtio-crypto", VIRTIO_ID_CRYPTO, vcrypto->config_size);
     vcrypto->curr_queues = 1;
-    vcrypto->vqs = g_malloc0(sizeof(VirtIOCryptoQueue) * vcrypto->max_queues);
+    vcrypto->vqs = g_new0(VirtIOCryptoQueue, vcrypto->max_queues);
     for (i = 0; i < vcrypto->max_queues; i++) {
         vcrypto->vqs[i].dataq =
                  virtio_add_queue(vdev, 1024, virtio_crypto_handle_dataq_bh);
diff --git a/hw/virtio/virtio-iommu.c b/hw/virtio/virtio-iommu.c
index 239fe97b12..664cbd9583 100644
--- a/hw/virtio/virtio-iommu.c
+++ b/hw/virtio/virtio-iommu.c
@@ -316,7 +316,7 @@ static AddressSpace *virtio_iommu_find_add_as(PCIBus *bus, void *opaque,
         char *name = g_strdup_printf("%s-%d-%d",
                                      TYPE_VIRTIO_IOMMU_MEMORY_REGION,
                                      mr_index++, devfn);
-        sdev = sbus->pbdev[devfn] = g_malloc0(sizeof(IOMMUDevice));
+        sdev = sbus->pbdev[devfn] = g_new0(IOMMUDevice, 1);
 
         sdev->viommu = s;
         sdev->bus = bus;
diff --git a/hw/virtio/virtio.c b/hw/virtio/virtio.c
index 9e8f51dfb0..32b1859391 100644
--- a/hw/virtio/virtio.c
+++ b/hw/virtio/virtio.c
@@ -2380,8 +2380,7 @@ VirtQueue *virtio_add_queue(VirtIODevice *vdev, int queue_size,
     vdev->vq[i].vring.num_default = queue_size;
     vdev->vq[i].vring.align = VIRTIO_PCI_VRING_ALIGN;
     vdev->vq[i].handle_output = handle_output;
-    vdev->vq[i].used_elems = g_malloc0(sizeof(VirtQueueElement) *
-                                       queue_size);
+    vdev->vq[i].used_elems = g_new0(VirtQueueElement, queue_size);
 
     return &vdev->vq[i];
 }
@@ -3228,7 +3227,7 @@ void virtio_init(VirtIODevice *vdev, const char *name,
     qatomic_set(&vdev->isr, 0);
     vdev->queue_sel = 0;
     vdev->config_vector = VIRTIO_NO_VECTOR;
-    vdev->vq = g_malloc0(sizeof(VirtQueue) * VIRTIO_QUEUE_MAX);
+    vdev->vq = g_new0(VirtQueue, VIRTIO_QUEUE_MAX);
     vdev->vm_running = runstate_is_running();
     vdev->broken = false;
     for (i = 0; i < VIRTIO_QUEUE_MAX; i++) {
diff --git a/hw/xtensa/xtfpga.c b/hw/xtensa/xtfpga.c
index 17f087b395..c1e004e882 100644
--- a/hw/xtensa/xtfpga.c
+++ b/hw/xtensa/xtfpga.c
@@ -126,7 +126,7 @@ static const MemoryRegionOps xtfpga_fpga_ops = {
 static XtfpgaFpgaState *xtfpga_fpga_init(MemoryRegion *address_space,
                                          hwaddr base, uint32_t freq)
 {
-    XtfpgaFpgaState *s = g_malloc(sizeof(XtfpgaFpgaState));
+    XtfpgaFpgaState *s = g_new(XtfpgaFpgaState, 1);
 
     memory_region_init_io(&s->iomem, NULL, &xtfpga_fpga_ops, s,
                           "xtfpga.fpga", 0x10000);
diff --git a/linux-user/syscall.c b/linux-user/syscall.c
index b9b18a7eaf..75ed71eb46 100644
--- a/linux-user/syscall.c
+++ b/linux-user/syscall.c
@@ -5076,7 +5076,7 @@ do_ioctl_usbdevfs_submiturb(const IOCTLEntry *ie, uint8_t *buf_temp,
     target_size = thunk_type_size(arg_type, THUNK_TARGET);
 
     /* construct host copy of urb and metadata */
-    lurb = g_try_malloc0(sizeof(struct live_urb));
+    lurb = g_try_new0(struct live_urb, 1);
     if (!lurb) {
         return -TARGET_ENOMEM;
     }
diff --git a/migration/dirtyrate.c b/migration/dirtyrate.c
index d65e744af9..aace12a787 100644
--- a/migration/dirtyrate.c
+++ b/migration/dirtyrate.c
@@ -91,7 +91,7 @@ static struct DirtyRateInfo *query_dirty_rate_info(void)
 {
     int i;
     int64_t dirty_rate = DirtyStat.dirty_rate;
-    struct DirtyRateInfo *info = g_malloc0(sizeof(DirtyRateInfo));
+    struct DirtyRateInfo *info = g_new0(DirtyRateInfo, 1);
     DirtyRateVcpuList *head = NULL, **tail = &head;
 
     info->status = CalculatingState;
@@ -112,7 +112,7 @@ static struct DirtyRateInfo *query_dirty_rate_info(void)
             info->sample_pages = 0;
             info->has_vcpu_dirty_rate = true;
             for (i = 0; i < DirtyStat.dirty_ring.nvcpu; i++) {
-                DirtyRateVcpu *rate = g_malloc0(sizeof(DirtyRateVcpu));
+                DirtyRateVcpu *rate = g_new0(DirtyRateVcpu, 1);
                 rate->id = DirtyStat.dirty_ring.rates[i].id;
                 rate->dirty_rate = DirtyStat.dirty_ring.rates[i].dirty_rate;
                 QAPI_LIST_APPEND(tail, rate);
diff --git a/migration/multifd-zlib.c b/migration/multifd-zlib.c
index aba1c88a0c..3a7ae44485 100644
--- a/migration/multifd-zlib.c
+++ b/migration/multifd-zlib.c
@@ -43,7 +43,7 @@ struct zlib_data {
  */
 static int zlib_send_setup(MultiFDSendParams *p, Error **errp)
 {
-    struct zlib_data *z = g_malloc0(sizeof(struct zlib_data));
+    struct zlib_data *z = g_new0(struct zlib_data, 1);
     z_stream *zs = &z->zs;
 
     zs->zalloc = Z_NULL;
@@ -164,7 +164,7 @@ static int zlib_send_prepare(MultiFDSendParams *p, Error **errp)
  */
 static int zlib_recv_setup(MultiFDRecvParams *p, Error **errp)
 {
-    struct zlib_data *z = g_malloc0(sizeof(struct zlib_data));
+    struct zlib_data *z = g_new0(struct zlib_data, 1);
     z_stream *zs = &z->zs;
 
     p->data = z;
diff --git a/migration/ram.c b/migration/ram.c
index 170e522a1f..3532f64ecb 100644
--- a/migration/ram.c
+++ b/migration/ram.c
@@ -2059,7 +2059,7 @@ int ram_save_queue_pages(const char *rbname, ram_addr_t start, ram_addr_t len)
     }
 
     struct RAMSrcPageRequest *new_entry =
-        g_malloc0(sizeof(struct RAMSrcPageRequest));
+        g_new0(struct RAMSrcPageRequest, 1);
     new_entry->rb = ramblock;
     new_entry->offset = start;
     new_entry->len = len;
diff --git a/monitor/misc.c b/monitor/misc.c
index b1839cb8ee..a756dbd6db 100644
--- a/monitor/misc.c
+++ b/monitor/misc.c
@@ -1028,7 +1028,7 @@ void qmp_getfd(const char *fdname, Error **errp)
         return;
     }
 
-    monfd = g_malloc0(sizeof(mon_fd_t));
+    monfd = g_new0(mon_fd_t, 1);
     monfd->name = g_strdup(fdname);
     monfd->fd = fd;
 
diff --git a/monitor/qmp-cmds.c b/monitor/qmp-cmds.c
index ad82c275c4..0b04855ce8 100644
--- a/monitor/qmp-cmds.c
+++ b/monitor/qmp-cmds.c
@@ -318,7 +318,7 @@ ACPIOSTInfoList *qmp_query_acpi_ospm_status(Error **errp)
 
 MemoryInfo *qmp_query_memory_size_summary(Error **errp)
 {
-    MemoryInfo *mem_info = g_malloc0(sizeof(MemoryInfo));
+    MemoryInfo *mem_info = g_new0(MemoryInfo, 1);
     MachineState *ms = MACHINE(qdev_get_machine());
 
     mem_info->base_memory = ms->ram_size;
diff --git a/qga/commands-win32.c b/qga/commands-win32.c
index 4fbbad793f..3c428213db 100644
--- a/qga/commands-win32.c
+++ b/qga/commands-win32.c
@@ -949,7 +949,7 @@ static GuestDiskAddressList *build_guest_disk_info(char *guid, Error **errp)
         } else if (last_err == ERROR_INVALID_FUNCTION) {
             /* Possibly CD-ROM or a shared drive. Try to pass the volume */
             g_debug("volume not on disk");
-            disk = g_malloc0(sizeof(GuestDiskAddress));
+            disk = g_new0(GuestDiskAddress, 1);
             disk->has_dev = true;
             disk->dev = g_strdup(name);
             get_single_disk_info(0xffffffff, disk, &local_err);
@@ -972,7 +972,7 @@ static GuestDiskAddressList *build_guest_disk_info(char *guid, Error **errp)
 
     /* Go through each extent */
     for (i = 0; i < extents->NumberOfDiskExtents; i++) {
-        disk = g_malloc0(sizeof(GuestDiskAddress));
+        disk = g_new0(GuestDiskAddress, 1);
 
         /* Disk numbers directly correspond to numbers used in UNCs
          *
@@ -1076,7 +1076,7 @@ GuestDiskInfoList *qmp_guest_get_disks(Error **errp)
             sdn.DeviceNumber);
 
         g_debug("  number: %lu", sdn.DeviceNumber);
-        address = g_malloc0(sizeof(GuestDiskAddress));
+        address = g_new0(GuestDiskAddress, 1);
         address->has_dev = true;
         address->dev = g_strdup(disk->name);
         get_single_disk_info(sdn.DeviceNumber, address, &local_err);
@@ -1368,7 +1368,7 @@ qmp_guest_fstrim(bool has_minimum, int64_t minimum, Error **errp)
             continue;
         }
 
-        uc_path = g_malloc(sizeof(WCHAR) * char_count);
+        uc_path = g_new(WCHAR, char_count);
         if (!GetVolumePathNamesForVolumeNameW(guid, uc_path, char_count,
                                               &char_count) || !*uc_path) {
             /* strange, but this condition could be faced even with size == 2 */
diff --git a/qga/commands.c b/qga/commands.c
index 80501e4a73..72e6022207 100644
--- a/qga/commands.c
+++ b/qga/commands.c
@@ -244,7 +244,7 @@ static char **guest_exec_get_args(const strList *entry, bool log)
 
     str = g_malloc(str_size);
     *str = 0;
-    args = g_malloc(count * sizeof(char *));
+    args = g_new(char *, count);
     for (it = entry; it != NULL; it = it->next) {
         args[i++] = it->value;
         pstrcat(str, str_size, it->value);
diff --git a/qom/qom-qmp-cmds.c b/qom/qom-qmp-cmds.c
index 2d6f41ecc7..2e63a4c184 100644
--- a/qom/qom-qmp-cmds.c
+++ b/qom/qom-qmp-cmds.c
@@ -49,7 +49,7 @@ ObjectPropertyInfoList *qmp_qom_list(const char *path, Error **errp)
 
     object_property_iter_init(&iter, obj);
     while ((prop = object_property_iter_next(&iter))) {
-        ObjectPropertyInfo *value = g_malloc0(sizeof(ObjectPropertyInfo));
+        ObjectPropertyInfo *value = g_new0(ObjectPropertyInfo, 1);
 
         QAPI_LIST_PREPEND(props, value);
 
diff --git a/replay/replay-char.c b/replay/replay-char.c
index dc0002367e..d2025948cf 100644
--- a/replay/replay-char.c
+++ b/replay/replay-char.c
@@ -50,7 +50,7 @@ void replay_register_char_driver(Chardev *chr)
 
 void replay_chr_be_write(Chardev *s, uint8_t *buf, int len)
 {
-    CharEvent *event = g_malloc0(sizeof(CharEvent));
+    CharEvent *event = g_new0(CharEvent, 1);
 
     event->id = find_char_driver(s);
     if (event->id < 0) {
@@ -85,7 +85,7 @@ void replay_event_char_read_save(void *opaque)
 
 void *replay_event_char_read_load(void)
 {
-    CharEvent *event = g_malloc0(sizeof(CharEvent));
+    CharEvent *event = g_new0(CharEvent, 1);
 
     event->id = replay_get_byte();
     replay_get_array_alloc(&event->buf, &event->len);
diff --git a/replay/replay-events.c b/replay/replay-events.c
index 15983dd250..ac47c89834 100644
--- a/replay/replay-events.c
+++ b/replay/replay-events.c
@@ -119,7 +119,7 @@ void replay_add_event(ReplayAsyncEventKind event_kind,
         return;
     }
 
-    Event *event = g_malloc0(sizeof(Event));
+    Event *event = g_new0(Event, 1);
     event->event_kind = event_kind;
     event->opaque = opaque;
     event->opaque2 = opaque2;
@@ -243,17 +243,17 @@ static Event *replay_read_event(int checkpoint)
         }
         break;
     case REPLAY_ASYNC_EVENT_INPUT:
-        event = g_malloc0(sizeof(Event));
+        event = g_new0(Event, 1);
         event->event_kind = replay_state.read_event_kind;
         event->opaque = replay_read_input_event();
         return event;
     case REPLAY_ASYNC_EVENT_INPUT_SYNC:
-        event = g_malloc0(sizeof(Event));
+        event = g_new0(Event, 1);
         event->event_kind = replay_state.read_event_kind;
         event->opaque = 0;
         return event;
     case REPLAY_ASYNC_EVENT_CHAR_READ:
-        event = g_malloc0(sizeof(Event));
+        event = g_new0(Event, 1);
         event->event_kind = replay_state.read_event_kind;
         event->opaque = replay_event_char_read_load();
         return event;
@@ -263,7 +263,7 @@ static Event *replay_read_event(int checkpoint)
         }
         break;
     case REPLAY_ASYNC_EVENT_NET:
-        event = g_malloc0(sizeof(Event));
+        event = g_new0(Event, 1);
         event->event_kind = replay_state.read_event_kind;
         event->opaque = replay_event_net_load();
         return event;
diff --git a/scripts/coverity-scan/model.c b/scripts/coverity-scan/model.c
index 9d4fba53d9..30bea672e1 100644
--- a/scripts/coverity-scan/model.c
+++ b/scripts/coverity-scan/model.c
@@ -356,7 +356,7 @@ int g_poll (GPollFD *fds, unsigned nfds, int timeout)
 typedef struct _GIOChannel GIOChannel;
 GIOChannel *g_io_channel_unix_new(int fd)
 {
-    GIOChannel *c = g_malloc0(sizeof(GIOChannel));
+    GIOChannel *c = g_new0(GIOChannel, 1);
     __coverity_escape__(fd);
     return c;
 }
diff --git a/semihosting/config.c b/semihosting/config.c
index 137171b717..6d48ec9566 100644
--- a/semihosting/config.c
+++ b/semihosting/config.c
@@ -98,7 +98,7 @@ static int add_semihosting_arg(void *opaque,
     if (strcmp(name, "arg") == 0) {
         s->argc++;
         /* one extra element as g_strjoinv() expects NULL-terminated array */
-        s->argv = g_realloc(s->argv, (s->argc + 1) * sizeof(void *));
+        s->argv = g_renew(void *, s->argv, s->argc + 1);
         s->argv[s->argc - 1] = val;
         s->argv[s->argc] = NULL;
     }
diff --git a/softmmu/bootdevice.c b/softmmu/bootdevice.c
index add4e3d2d1..c0713bfa9f 100644
--- a/softmmu/bootdevice.c
+++ b/softmmu/bootdevice.c
@@ -166,7 +166,7 @@ void add_boot_device_path(int32_t bootindex, DeviceState *dev,
 
     del_boot_device_path(dev, suffix);
 
-    node = g_malloc0(sizeof(FWBootEntry));
+    node = g_new0(FWBootEntry, 1);
     node->bootindex = bootindex;
     node->suffix = g_strdup(suffix);
     node->dev = dev;
@@ -367,7 +367,7 @@ void add_boot_device_lchs(DeviceState *dev, const char *suffix,
 
     assert(dev != NULL || suffix != NULL);
 
-    node = g_malloc0(sizeof(FWLCHSEntry));
+    node = g_new0(FWLCHSEntry, 1);
     node->suffix = g_strdup(suffix);
     node->dev = dev;
     node->lcyls = lcyls;
diff --git a/softmmu/dma-helpers.c b/softmmu/dma-helpers.c
index 160095e4ba..7820fec54c 100644
--- a/softmmu/dma-helpers.c
+++ b/softmmu/dma-helpers.c
@@ -29,7 +29,7 @@ MemTxResult dma_memory_set(AddressSpace *as, dma_addr_t addr,
 void qemu_sglist_init(QEMUSGList *qsg, DeviceState *dev, int alloc_hint,
                       AddressSpace *as)
 {
-    qsg->sg = g_malloc(alloc_hint * sizeof(ScatterGatherEntry));
+    qsg->sg = g_new(ScatterGatherEntry, alloc_hint);
     qsg->nsg = 0;
     qsg->nalloc = alloc_hint;
     qsg->size = 0;
@@ -42,7 +42,7 @@ void qemu_sglist_add(QEMUSGList *qsg, dma_addr_t base, dma_addr_t len)
 {
     if (qsg->nsg == qsg->nalloc) {
         qsg->nalloc = 2 * qsg->nalloc + 1;
-        qsg->sg = g_realloc(qsg->sg, qsg->nalloc * sizeof(ScatterGatherEntry));
+        qsg->sg = g_renew(ScatterGatherEntry, qsg->sg, qsg->nalloc);
     }
     qsg->sg[qsg->nsg].base = base;
     qsg->sg[qsg->nsg].len = len;
diff --git a/softmmu/memory_mapping.c b/softmmu/memory_mapping.c
index 8320165ea2..f6f0a829fd 100644
--- a/softmmu/memory_mapping.c
+++ b/softmmu/memory_mapping.c
@@ -42,7 +42,7 @@ static void create_new_memory_mapping(MemoryMappingList *list,
 {
     MemoryMapping *memory_mapping;
 
-    memory_mapping = g_malloc(sizeof(MemoryMapping));
+    memory_mapping = g_new(MemoryMapping, 1);
     memory_mapping->phys_addr = phys_addr;
     memory_mapping->virt_addr = virt_addr;
     memory_mapping->length = length;
diff --git a/target/i386/cpu-sysemu.c b/target/i386/cpu-sysemu.c
index 37b7c562f5..e254d8ba10 100644
--- a/target/i386/cpu-sysemu.c
+++ b/target/i386/cpu-sysemu.c
@@ -313,7 +313,7 @@ GuestPanicInformation *x86_cpu_get_crash_info(CPUState *cs)
     GuestPanicInformation *panic_info = NULL;
 
     if (hyperv_feat_enabled(cpu, HYPERV_FEAT_CRASH)) {
-        panic_info = g_malloc0(sizeof(GuestPanicInformation));
+        panic_info = g_new0(GuestPanicInformation, 1);
 
         panic_info->type = GUEST_PANIC_INFORMATION_TYPE_HYPER_V;
 
diff --git a/target/i386/hax/hax-accel-ops.c b/target/i386/hax/hax-accel-ops.c
index 136630e9b2..18114fe34d 100644
--- a/target/i386/hax/hax-accel-ops.c
+++ b/target/i386/hax/hax-accel-ops.c
@@ -61,8 +61,8 @@ static void hax_start_vcpu_thread(CPUState *cpu)
 {
     char thread_name[VCPU_THREAD_NAME_SIZE];
 
-    cpu->thread = g_malloc0(sizeof(QemuThread));
-    cpu->halt_cond = g_malloc0(sizeof(QemuCond));
+    cpu->thread = g_new0(QemuThread, 1);
+    cpu->halt_cond = g_new0(QemuCond, 1);
     qemu_cond_init(cpu->halt_cond);
 
     snprintf(thread_name, VCPU_THREAD_NAME_SIZE, "CPU %d/HAX",
diff --git a/target/i386/nvmm/nvmm-accel-ops.c b/target/i386/nvmm/nvmm-accel-ops.c
index f788f75289..6c46101ac1 100644
--- a/target/i386/nvmm/nvmm-accel-ops.c
+++ b/target/i386/nvmm/nvmm-accel-ops.c
@@ -64,8 +64,8 @@ static void nvmm_start_vcpu_thread(CPUState *cpu)
 {
     char thread_name[VCPU_THREAD_NAME_SIZE];
 
-    cpu->thread = g_malloc0(sizeof(QemuThread));
-    cpu->halt_cond = g_malloc0(sizeof(QemuCond));
+    cpu->thread = g_new0(QemuThread, 1);
+    cpu->halt_cond = g_new0(QemuCond, 1);
     qemu_cond_init(cpu->halt_cond);
     snprintf(thread_name, VCPU_THREAD_NAME_SIZE, "CPU %d/NVMM",
              cpu->cpu_index);
diff --git a/target/i386/whpx/whpx-accel-ops.c b/target/i386/whpx/whpx-accel-ops.c
index 1d30e4e2ed..dd2a9f7657 100644
--- a/target/i386/whpx/whpx-accel-ops.c
+++ b/target/i386/whpx/whpx-accel-ops.c
@@ -64,8 +64,8 @@ static void whpx_start_vcpu_thread(CPUState *cpu)
 {
     char thread_name[VCPU_THREAD_NAME_SIZE];
 
-    cpu->thread = g_malloc0(sizeof(QemuThread));
-    cpu->halt_cond = g_malloc0(sizeof(QemuCond));
+    cpu->thread = g_new0(QemuThread, 1);
+    cpu->halt_cond = g_new0(QemuCond, 1);
     qemu_cond_init(cpu->halt_cond);
     snprintf(thread_name, VCPU_THREAD_NAME_SIZE, "CPU %d/WHPX",
              cpu->cpu_index);
diff --git a/target/i386/whpx/whpx-all.c b/target/i386/whpx/whpx-all.c
index c7e25abf42..9fd287e5d4 100644
--- a/target/i386/whpx/whpx-all.c
+++ b/target/i386/whpx/whpx-all.c
@@ -1354,7 +1354,7 @@ int whpx_init_vcpu(CPUState *cpu)
         }
     }
 
-    vcpu = g_malloc0(sizeof(struct whpx_vcpu));
+    vcpu = g_new0(struct whpx_vcpu, 1);
 
     if (!vcpu) {
         error_report("WHPX: Failed to allocte VCPU context.");
diff --git a/target/s390x/cpu-sysemu.c b/target/s390x/cpu-sysemu.c
index 5471e01ee8..948e4bd3e0 100644
--- a/target/s390x/cpu-sysemu.c
+++ b/target/s390x/cpu-sysemu.c
@@ -76,7 +76,7 @@ static GuestPanicInformation *s390_cpu_get_crash_info(CPUState *cs)
     S390CPU *cpu = S390_CPU(cs);
 
     cpu_synchronize_state(cs);
-    panic_info = g_malloc0(sizeof(GuestPanicInformation));
+    panic_info = g_new0(GuestPanicInformation, 1);
 
     panic_info->type = GUEST_PANIC_INFORMATION_TYPE_S390;
     panic_info->u.s390.core = cpu->env.core_id;
diff --git a/tests/unit/test-hbitmap.c b/tests/unit/test-hbitmap.c
index b6726cf76b..a4fe067917 100644
--- a/tests/unit/test-hbitmap.c
+++ b/tests/unit/test-hbitmap.c
@@ -113,7 +113,7 @@ static void hbitmap_test_truncate_impl(TestHBitmapData *data,
 
     n = hbitmap_test_array_size(size);
     m = hbitmap_test_array_size(data->old_size);
-    data->bits = g_realloc(data->bits, sizeof(unsigned long) * n);
+    data->bits = g_renew(unsigned long, data->bits, n);
     if (n > m) {
         memset(&data->bits[m], 0x00, sizeof(unsigned long) * (n - m));
     }
diff --git a/tests/unit/test-qmp-cmds.c b/tests/unit/test-qmp-cmds.c
index faa858624a..6085c09995 100644
--- a/tests/unit/test-qmp-cmds.c
+++ b/tests/unit/test-qmp-cmds.c
@@ -82,8 +82,8 @@ UserDefTwo *qmp_user_def_cmd2(UserDefOne *ud1a,
                               Error **errp)
 {
     UserDefTwo *ret;
-    UserDefOne *ud1c = g_malloc0(sizeof(UserDefOne));
-    UserDefOne *ud1d = g_malloc0(sizeof(UserDefOne));
+    UserDefOne *ud1c = g_new0(UserDefOne, 1);
+    UserDefOne *ud1d = g_new0(UserDefOne, 1);
 
     ud1c->string = strdup(ud1a->string);
     ud1c->integer = ud1a->integer;
@@ -344,23 +344,23 @@ static void test_dealloc_types(void)
     UserDefOne *ud1test, *ud1a, *ud1b;
     UserDefOneList *ud1list;
 
-    ud1test = g_malloc0(sizeof(UserDefOne));
+    ud1test = g_new0(UserDefOne, 1);
     ud1test->integer = 42;
     ud1test->string = g_strdup("hi there 42");
 
     qapi_free_UserDefOne(ud1test);
 
-    ud1a = g_malloc0(sizeof(UserDefOne));
+    ud1a = g_new0(UserDefOne, 1);
     ud1a->integer = 43;
     ud1a->string = g_strdup("hi there 43");
 
-    ud1b = g_malloc0(sizeof(UserDefOne));
+    ud1b = g_new0(UserDefOne, 1);
     ud1b->integer = 44;
     ud1b->string = g_strdup("hi there 44");
 
-    ud1list = g_malloc0(sizeof(UserDefOneList));
+    ud1list = g_new0(UserDefOneList, 1);
     ud1list->value = ud1a;
-    ud1list->next = g_malloc0(sizeof(UserDefOneList));
+    ud1list->next = g_new0(UserDefOneList, 1);
     ud1list->next->value = ud1b;
 
     qapi_free_UserDefOneList(ud1list);
diff --git a/tests/unit/test-qobject-output-visitor.c b/tests/unit/test-qobject-output-visitor.c
index 34d67a439a..6af4c33eec 100644
--- a/tests/unit/test-qobject-output-visitor.c
+++ b/tests/unit/test-qobject-output-visitor.c
@@ -338,7 +338,7 @@ static void test_visitor_out_union_flat(TestOutputVisitorData *data,
 {
     QDict *qdict;
 
-    UserDefFlatUnion *tmp = g_malloc0(sizeof(UserDefFlatUnion));
+    UserDefFlatUnion *tmp = g_new0(UserDefFlatUnion, 1);
     tmp->enum1 = ENUM_ONE_VALUE1;
     tmp->string = g_strdup("str");
     tmp->integer = 41;
diff --git a/tests/unit/test-vmstate.c b/tests/unit/test-vmstate.c
index 4688c03ea7..6a417bb102 100644
--- a/tests/unit/test-vmstate.c
+++ b/tests/unit/test-vmstate.c
@@ -1002,22 +1002,22 @@ static TestGTreeDomain *create_first_domain(void)
     TestGTreeMapping *map_a, *map_b;
     TestGTreeInterval *a, *b;
 
-    domain = g_malloc0(sizeof(TestGTreeDomain));
+    domain = g_new0(TestGTreeDomain, 1);
     domain->id = 6;
 
-    a = g_malloc0(sizeof(TestGTreeInterval));
+    a = g_new0(TestGTreeInterval, 1);
     a->low = 0x1000;
     a->high = 0x1FFF;
 
-    b = g_malloc0(sizeof(TestGTreeInterval));
+    b = g_new0(TestGTreeInterval, 1);
     b->low = 0x4000;
     b->high = 0x4FFF;
 
-    map_a = g_malloc0(sizeof(TestGTreeMapping));
+    map_a = g_new0(TestGTreeMapping, 1);
     map_a->phys_addr = 0xa000;
     map_a->flags = 1;
 
-    map_b = g_malloc0(sizeof(TestGTreeMapping));
+    map_b = g_new0(TestGTreeMapping, 1);
     map_b->phys_addr = 0xe0000;
     map_b->flags = 2;
 
@@ -1120,7 +1120,7 @@ static void diff_iommu(TestGTreeIOMMU *iommu1, TestGTreeIOMMU *iommu2)
 
 static void test_gtree_load_domain(void)
 {
-    TestGTreeDomain *dest_domain = g_malloc0(sizeof(TestGTreeDomain));
+    TestGTreeDomain *dest_domain = g_new0(TestGTreeDomain, 1);
     TestGTreeDomain *orig_domain = create_first_domain();
     QEMUFile *fload, *fsave;
     char eof;
@@ -1185,7 +1185,7 @@ uint8_t iommu_dump[] = {
 
 static TestGTreeIOMMU *create_iommu(void)
 {
-    TestGTreeIOMMU *iommu = g_malloc0(sizeof(TestGTreeIOMMU));
+    TestGTreeIOMMU *iommu = g_new0(TestGTreeIOMMU, 1);
     TestGTreeDomain *first_domain = create_first_domain();
     TestGTreeDomain *second_domain;
     TestGTreeMapping *map_c;
@@ -1196,7 +1196,7 @@ static TestGTreeIOMMU *create_iommu(void)
                                      NULL,
                                      destroy_domain);
 
-    second_domain = g_malloc0(sizeof(TestGTreeDomain));
+    second_domain = g_new0(TestGTreeDomain, 1);
     second_domain->id = 5;
     second_domain->mappings = g_tree_new_full((GCompareDataFunc)interval_cmp,
                                               NULL,
@@ -1206,11 +1206,11 @@ static TestGTreeIOMMU *create_iommu(void)
     g_tree_insert(iommu->domains, GUINT_TO_POINTER(6), first_domain);
     g_tree_insert(iommu->domains, (gpointer)0x0000000000000005, second_domain);
 
-    c = g_malloc0(sizeof(TestGTreeInterval));
+    c = g_new0(TestGTreeInterval, 1);
     c->low = 0x1000000;
     c->high = 0x1FFFFFF;
 
-    map_c = g_malloc0(sizeof(TestGTreeMapping));
+    map_c = g_new0(TestGTreeMapping, 1);
     map_c->phys_addr = 0xF000000;
     map_c->flags = 0x3;
 
@@ -1235,7 +1235,7 @@ static void test_gtree_save_iommu(void)
 
 static void test_gtree_load_iommu(void)
 {
-    TestGTreeIOMMU *dest_iommu = g_malloc0(sizeof(TestGTreeIOMMU));
+    TestGTreeIOMMU *dest_iommu = g_new0(TestGTreeIOMMU, 1);
     TestGTreeIOMMU *orig_iommu = create_iommu();
     QEMUFile *fsave, *fload;
     char eof;
@@ -1274,11 +1274,11 @@ static uint8_t qlist_dump[] = {
 
 static TestQListContainer *alloc_container(void)
 {
-    TestQListElement *a = g_malloc(sizeof(TestQListElement));
-    TestQListElement *b = g_malloc(sizeof(TestQListElement));
-    TestQListElement *c = g_malloc(sizeof(TestQListElement));
-    TestQListElement *d = g_malloc(sizeof(TestQListElement));
-    TestQListContainer *container = g_malloc(sizeof(TestQListContainer));
+    TestQListElement *a = g_new(TestQListElement, 1);
+    TestQListElement *b = g_new(TestQListElement, 1);
+    TestQListElement *c = g_new(TestQListElement, 1);
+    TestQListElement *d = g_new(TestQListElement, 1);
+    TestQListContainer *container = g_new(TestQListContainer, 1);
 
     a->id = 0x0a;
     b->id = 0x0b00;
@@ -1332,11 +1332,11 @@ static void manipulate_container(TestQListContainer *c)
      TestQListElement *prev = NULL, *iter = QLIST_FIRST(&c->list);
      TestQListElement *elem;
 
-     elem = g_malloc(sizeof(TestQListElement));
+     elem = g_new(TestQListElement, 1);
      elem->id = 0x12;
      QLIST_INSERT_AFTER(iter, elem, next);
 
-     elem = g_malloc(sizeof(TestQListElement));
+     elem = g_new(TestQListElement, 1);
      elem->id = 0x13;
      QLIST_INSERT_HEAD(&c->list, elem, next);
 
@@ -1345,11 +1345,11 @@ static void manipulate_container(TestQListContainer *c)
         iter = QLIST_NEXT(iter, next);
      }
 
-     elem = g_malloc(sizeof(TestQListElement));
+     elem = g_new(TestQListElement, 1);
      elem->id = 0x14;
      QLIST_INSERT_BEFORE(prev, elem, next);
 
-     elem = g_malloc(sizeof(TestQListElement));
+     elem = g_new(TestQListElement, 1);
      elem->id = 0x15;
      QLIST_INSERT_AFTER(prev, elem, next);
 
@@ -1370,7 +1370,7 @@ static void test_load_qlist(void)
 {
     QEMUFile *fsave, *fload;
     TestQListContainer *orig_container = alloc_container();
-    TestQListContainer *dest_container = g_malloc0(sizeof(TestQListContainer));
+    TestQListContainer *dest_container = g_new0(TestQListContainer, 1);
     char eof;
 
     QLIST_INIT(&dest_container->list);
diff --git a/ui/vnc-enc-tight.c b/ui/vnc-enc-tight.c
index cebd35841a..7b86a4713d 100644
--- a/ui/vnc-enc-tight.c
+++ b/ui/vnc-enc-tight.c
@@ -1477,7 +1477,7 @@ static int send_sub_rect(VncState *vs, int x, int y, int w, int h)
 #endif
 
     if (!color_count_palette) {
-        color_count_palette = g_malloc(sizeof(VncPalette));
+        color_count_palette = g_new(VncPalette, 1);
         vnc_tight_cleanup_notifier.notify = vnc_tight_cleanup;
         qemu_thread_atexit_add(&vnc_tight_cleanup_notifier);
     }
diff --git a/util/envlist.c b/util/envlist.c
index 2bcc13f094..ab5553498a 100644
--- a/util/envlist.c
+++ b/util/envlist.c
@@ -217,7 +217,7 @@ envlist_to_environ(const envlist_t *envlist, size_t *count)
 	struct envlist_entry *entry;
 	char **env, **penv;
 
-	penv = env = g_malloc((envlist->el_count + 1) * sizeof(char *));
+	penv = env = g_new(char *, envlist->el_count + 1);
 
 	for (entry = envlist->el_entries.lh_first; entry != NULL;
 	    entry = entry->ev_link.le_next) {
diff --git a/util/hbitmap.c b/util/hbitmap.c
index dd0501d9a7..ea989e1f0e 100644
--- a/util/hbitmap.c
+++ b/util/hbitmap.c
@@ -862,7 +862,7 @@ void hbitmap_truncate(HBitmap *hb, uint64_t size)
         }
         old = hb->sizes[i];
         hb->sizes[i] = size;
-        hb->levels[i] = g_realloc(hb->levels[i], size * sizeof(unsigned long));
+        hb->levels[i] = g_renew(unsigned long, hb->levels[i], size);
         if (!shrink) {
             memset(&hb->levels[i][old], 0x00,
                    (size - old) * sizeof(*hb->levels[i]));
diff --git a/util/main-loop.c b/util/main-loop.c
index 4d5a5b9943..b7b0ce4ca0 100644
--- a/util/main-loop.c
+++ b/util/main-loop.c
@@ -273,7 +273,7 @@ static PollingEntry *first_polling_entry;
 int qemu_add_polling_cb(PollingFunc *func, void *opaque)
 {
     PollingEntry **ppe, *pe;
-    pe = g_malloc0(sizeof(PollingEntry));
+    pe = g_new0(PollingEntry, 1);
     pe->func = func;
     pe->opaque = opaque;
     for(ppe = &first_polling_entry; *ppe != NULL; ppe = &(*ppe)->next);
diff --git a/util/qemu-timer.c b/util/qemu-timer.c
index f36c75e594..a670a57881 100644
--- a/util/qemu-timer.c
+++ b/util/qemu-timer.c
@@ -100,7 +100,7 @@ QEMUTimerList *timerlist_new(QEMUClockType type,
     QEMUTimerList *timer_list;
     QEMUClock *clock = qemu_clock_ptr(type);
 
-    timer_list = g_malloc0(sizeof(QEMUTimerList));
+    timer_list = g_new0(QEMUTimerList, 1);
     qemu_event_init(&timer_list->timers_done_ev, true);
     timer_list->clock = clock;
     timer_list->notify_cb = cb;
diff --git a/util/vfio-helpers.c b/util/vfio-helpers.c
index 00a80431a0..b037d5faa5 100644
--- a/util/vfio-helpers.c
+++ b/util/vfio-helpers.c
@@ -279,8 +279,8 @@ static void collect_usable_iova_ranges(QEMUVFIOState *s, void *buf)
     s->nb_iova_ranges = cap_iova_range->nr_iovas;
     if (s->nb_iova_ranges > 1) {
         s->usable_iova_ranges =
-            g_realloc(s->usable_iova_ranges,
-                      s->nb_iova_ranges * sizeof(struct IOVARange));
+            g_renew(struct IOVARange, s->usable_iova_ranges,
+                    s->nb_iova_ranges);
     }
 
     for (i = 0; i < s->nb_iova_ranges; i++) {
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 16:01:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 16:01:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290306.492325 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTn8h-0004Nn-Dl; Mon, 14 Mar 2022 16:01:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290306.492325; Mon, 14 Mar 2022 16:01:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTn8h-0004Ne-9f; Mon, 14 Mar 2022 16:01:43 +0000
Received: by outflank-mailman (input) for mailman id 290306;
 Mon, 14 Mar 2022 16:01:42 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=QtFe=TZ=redhat.com=armbru@srs-se1.protection.inumbo.net>)
 id 1nTn8f-0003d5-SB
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 16:01:41 +0000
Received: from us-smtp-delivery-124.mimecast.com
 (us-smtp-delivery-124.mimecast.com [170.10.129.124])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 08438bf1-a3b0-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 17:01:40 +0100 (CET)
Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com
 [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS
 (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 us-mta-629-QY0a79qXNymPxjJmfg1VZQ-1; Mon, 14 Mar 2022 12:01:35 -0400
Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.rdu2.redhat.com
 [10.11.54.3])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 2F806899ED9;
 Mon, 14 Mar 2022 16:01:33 +0000 (UTC)
Received: from blackfin.pond.sub.org (unknown [10.36.112.3])
 by smtp.corp.redhat.com (Postfix) with ESMTPS id CF49A1111C68;
 Mon, 14 Mar 2022 16:01:09 +0000 (UTC)
Received: by blackfin.pond.sub.org (Postfix, from userid 1000)
 id AA31321D1F58; Mon, 14 Mar 2022 17:01:08 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 08438bf1-a3b0-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
	s=mimecast20190719; t=1647273698;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=jyh5Aky+XmxKXch9GhHyv+ocJ1z/NmLUE6mIW6ga0GM=;
	b=HO91wm7njYYk/5a+8raPj8UPRfHoswl/9zzk2hiFTBJ0jbRzqeQjvudETv87ilMZ6rp6jw
	inBaFYCytD89ojVF4LDXdNnh1zOrX+DveEBqWjO+LLckX0sAM8p0EwOQU7alU4SRuvTO2R
	oJBdVROVIjGE4ebucx886Y5DucC5B2g=
X-MC-Unique: QY0a79qXNymPxjJmfg1VZQ-1
From: Markus Armbruster <armbru@redhat.com>
To: qemu-devel@nongnu.org
Cc: Paolo Bonzini <pbonzini@redhat.com>,
	Richard Henderson <richard.henderson@linaro.org>,
	Gerd Hoffmann <kraxel@redhat.com>,
	Christian Schoenebeck <qemu_oss@crudebyte.com>,
	"Gonglei (Arei)" <arei.gonglei@huawei.com>,
	=?UTF-8?q?Marc-Andr=C3=A9=20Lureau?= <marcandre.lureau@redhat.com>,
	"Michael S. Tsirkin" <mst@redhat.com>,
	Igor Mammedov <imammedo@redhat.com>,
	Ani Sinha <ani@anisinha.ca>,
	Laurent Vivier <lvivier@redhat.com>,
	Amit Shah <amit@kernel.org>,
	Peter Maydell <peter.maydell@linaro.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Anthony Perard <anthony.perard@citrix.com>,
	Paul Durrant <paul@xen.org>,
	=?UTF-8?q?Herv=C3=A9=20Poussineau?= <hpoussin@reactos.org>,
	Aleksandar Rikalo <aleksandar.rikalo@syrmia.com>,
	Corey Minyard <cminyard@mvista.com>,
	Patrick Venture <venture@google.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Peter Xu <peterx@redhat.com>,
	Jason Wang <jasowang@redhat.com>,
	=?UTF-8?q?C=C3=A9dric=20Le=20Goater?= <clg@kaod.org>,
	Daniel Henrique Barboza <danielhb413@gmail.com>,
	David Gibson <david@gibson.dropbear.id.au>,
	Greg Kurz <groug@kaod.org>,
	=?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Jean-Christophe Dubois <jcd@tribudubois.net>,
	Keith Busch <kbusch@kernel.org>,
	Klaus Jensen <its@irrelevant.dk>,
	Yuval Shaia <yuval.shaia.ml@gmail.com>,
	Yoshinori Sato <ysato@users.sourceforge.jp>,
	Magnus Damm <magnus.damm@gmail.com>,
	Fabien Chouteau <chouteau@adacore.com>,
	KONRAD Frederic <frederic.konrad@adacore.com>,
	Mark Cave-Ayland <mark.cave-ayland@ilande.co.uk>,
	Artyom Tarasenko <atar4qemu@gmail.com>,
	Alex Williamson <alex.williamson@redhat.com>,
	Eric Auger <eric.auger@redhat.com>,
	Max Filippov <jcmvbkbc@gmail.com>,
	Juan Quintela <quintela@redhat.com>,
	"Dr. David Alan Gilbert" <dgilbert@redhat.com>,
	Konstantin Kostiuk <kkostiuk@redhat.com>,
	Michael Roth <michael.roth@amd.com>,
	=?UTF-8?q?Daniel=20P=2E=20Berrang=C3=A9?= <berrange@redhat.com>,
	Pavel Dovgalyuk <pavel.dovgaluk@ispras.ru>,
	=?UTF-8?q?Alex=20Benn=C3=A9e?= <alex.bennee@linaro.org>,
	David Hildenbrand <david@redhat.com>,
	Wenchao Wang <wenchao.wang@intel.com>,
	Colin Xu <colin.xu@intel.com>,
	Kamil Rytarowski <kamil@netbsd.org>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Cornelia Huck <cohuck@redhat.com>,
	Thomas Huth <thuth@redhat.com>,
	Eric Blake <eblake@redhat.com>,
	Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>,
	John Snow <jsnow@redhat.com>,
	kvm@vger.kernel.org,
	qemu-arm@nongnu.org,
	xen-devel@lists.xenproject.org,
	qemu-ppc@nongnu.org,
	qemu-block@nongnu.org,
	haxm-team@intel.com,
	qemu-s390x@nongnu.org
Subject: [PATCH 2/3] 9pfs: Use g_new() & friends where that makes obvious sense
Date: Mon, 14 Mar 2022 17:01:07 +0100
Message-Id: <20220314160108.1440470-3-armbru@redhat.com>
In-Reply-To: <20220314160108.1440470-1-armbru@redhat.com>
References: <20220314160108.1440470-1-armbru@redhat.com>
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.78 on 10.11.54.3
Authentication-Results: relay.mimecast.com;
	auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=armbru@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Transfer-Encoding: 8bit
Content-Type: text/plain; charset="US-ASCII"

g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
for two reasons.  One, it catches multiplication overflowing size_t.
Two, it returns T * rather than void *, which lets the compiler catch
more type errors.

This commit only touches allocations with size arguments of the form
sizeof(T).

Patch created mechanically with:

    $ spatch --in-place --sp-file scripts/coccinelle/use-g_new-etc.cocci \
	     --macro-file scripts/cocci-macro-file.h FILES...

Except this uncovers a typing error:

    ../hw/9pfs/9p.c:855:13: warning: incompatible pointer types assigning to 'QpfEntry *' from 'QppEntry *' [-Wincompatible-pointer-types]
	    val = g_new0(QppEntry, 1);
		^ ~~~~~~~~~~~~~~~~~~~
    1 warning generated.

Harmless, because QppEntry is larger than QpfEntry.  Fix to allocate a
QpfEntry instead.

Cc: Greg Kurz <groug@kaod.org>
Cc: Christian Schoenebeck <qemu_oss@crudebyte.com>
Signed-off-by: Markus Armbruster <armbru@redhat.com>
---
 hw/9pfs/9p-proxy.c           | 2 +-
 hw/9pfs/9p-synth.c           | 4 ++--
 hw/9pfs/9p.c                 | 8 ++++----
 hw/9pfs/codir.c              | 6 +++---
 tests/qtest/virtio-9p-test.c | 4 ++--
 5 files changed, 12 insertions(+), 12 deletions(-)

diff --git a/hw/9pfs/9p-proxy.c b/hw/9pfs/9p-proxy.c
index 8b4b5cf7dc..4c5e0fc217 100644
--- a/hw/9pfs/9p-proxy.c
+++ b/hw/9pfs/9p-proxy.c
@@ -1187,7 +1187,7 @@ static int proxy_parse_opts(QemuOpts *opts, FsDriverEntry *fs, Error **errp)
 
 static int proxy_init(FsContext *ctx, Error **errp)
 {
-    V9fsProxy *proxy = g_malloc(sizeof(V9fsProxy));
+    V9fsProxy *proxy = g_new(V9fsProxy, 1);
     int sock_id;
 
     if (ctx->export_flags & V9FS_PROXY_SOCK_NAME) {
diff --git a/hw/9pfs/9p-synth.c b/hw/9pfs/9p-synth.c
index b3080e415b..d99d263985 100644
--- a/hw/9pfs/9p-synth.c
+++ b/hw/9pfs/9p-synth.c
@@ -49,7 +49,7 @@ static V9fsSynthNode *v9fs_add_dir_node(V9fsSynthNode *parent, int mode,
 
     /* Add directory type and remove write bits */
     mode = ((mode & 0777) | S_IFDIR) & ~(S_IWUSR | S_IWGRP | S_IWOTH);
-    node = g_malloc0(sizeof(V9fsSynthNode));
+    node = g_new0(V9fsSynthNode, 1);
     if (attr) {
         /* We are adding .. or . entries */
         node->attr = attr;
@@ -128,7 +128,7 @@ int qemu_v9fs_synth_add_file(V9fsSynthNode *parent, int mode,
     }
     /* Add file type and remove write bits */
     mode = ((mode & 0777) | S_IFREG);
-    node = g_malloc0(sizeof(V9fsSynthNode));
+    node = g_new0(V9fsSynthNode, 1);
     node->attr         = &node->actual_attr;
     node->attr->inode  = synth_node_count++;
     node->attr->nlink  = 1;
diff --git a/hw/9pfs/9p.c b/hw/9pfs/9p.c
index a6d6b3f835..8e9d4aea73 100644
--- a/hw/9pfs/9p.c
+++ b/hw/9pfs/9p.c
@@ -324,7 +324,7 @@ static V9fsFidState *alloc_fid(V9fsState *s, int32_t fid)
             return NULL;
         }
     }
-    f = g_malloc0(sizeof(V9fsFidState));
+    f = g_new0(V9fsFidState, 1);
     f->fid = fid;
     f->fid_type = P9_FID_NONE;
     f->ref = 1;
@@ -804,7 +804,7 @@ static int qid_inode_prefix_hash_bits(V9fsPDU *pdu, dev_t dev)
 
     val = qht_lookup(&pdu->s->qpd_table, &lookup, hash);
     if (!val) {
-        val = g_malloc0(sizeof(QpdEntry));
+        val = g_new0(QpdEntry, 1);
         *val = lookup;
         affix = affixForIndex(pdu->s->qp_affix_next);
         val->prefix_bits = affix.bits;
@@ -852,7 +852,7 @@ static int qid_path_fullmap(V9fsPDU *pdu, const struct stat *stbuf,
             return -ENFILE;
         }
 
-        val = g_malloc0(sizeof(QppEntry));
+        val = g_new0(QpfEntry, 1);
         *val = lookup;
 
         /* new unique inode and device combo */
@@ -928,7 +928,7 @@ static int qid_path_suffixmap(V9fsPDU *pdu, const struct stat *stbuf,
             return -ENFILE;
         }
 
-        val = g_malloc0(sizeof(QppEntry));
+        val = g_new0(QppEntry, 1);
         *val = lookup;
 
         /* new unique inode affix and device combo */
diff --git a/hw/9pfs/codir.c b/hw/9pfs/codir.c
index 75148bc985..93ba44fb75 100644
--- a/hw/9pfs/codir.c
+++ b/hw/9pfs/codir.c
@@ -141,9 +141,9 @@ static int do_readdir_many(V9fsPDU *pdu, V9fsFidState *fidp,
 
         /* append next node to result chain */
         if (!e) {
-            *entries = e = g_malloc0(sizeof(V9fsDirEnt));
+            *entries = e = g_new0(V9fsDirEnt, 1);
         } else {
-            e = e->next = g_malloc0(sizeof(V9fsDirEnt));
+            e = e->next = g_new0(V9fsDirEnt, 1);
         }
         e->dent = qemu_dirent_dup(dent);
 
@@ -163,7 +163,7 @@ static int do_readdir_many(V9fsPDU *pdu, V9fsFidState *fidp,
                 break;
             }
 
-            e->st = g_malloc0(sizeof(struct stat));
+            e->st = g_new0(struct stat, 1);
             memcpy(e->st, &stbuf, sizeof(struct stat));
         }
 
diff --git a/tests/qtest/virtio-9p-test.c b/tests/qtest/virtio-9p-test.c
index 01ca076afe..e28c71bd8f 100644
--- a/tests/qtest/virtio-9p-test.c
+++ b/tests/qtest/virtio-9p-test.c
@@ -468,12 +468,12 @@ static void v9fs_rreaddir(P9Req *req, uint32_t *count, uint32_t *nentries,
          togo -= 13 + 8 + 1 + 2 + slen, ++n)
     {
         if (!e) {
-            e = g_malloc(sizeof(struct V9fsDirent));
+            e = g_new(struct V9fsDirent, 1);
             if (entries) {
                 *entries = e;
             }
         } else {
-            e = e->next = g_malloc(sizeof(struct V9fsDirent));
+            e = e->next = g_new(struct V9fsDirent, 1);
         }
         e->next = NULL;
         /* qid[13] offset[8] type[1] name[s] */
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 16:02:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 16:02:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290311.492335 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTn91-00053B-Mb; Mon, 14 Mar 2022 16:02:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290311.492335; Mon, 14 Mar 2022 16:02:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTn91-000534-JP; Mon, 14 Mar 2022 16:02:03 +0000
Received: by outflank-mailman (input) for mailman id 290311;
 Mon, 14 Mar 2022 16:02:02 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=QtFe=TZ=redhat.com=armbru@srs-se1.protection.inumbo.net>)
 id 1nTn8z-0004hK-U4
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 16:02:02 +0000
Received: from us-smtp-delivery-124.mimecast.com
 (us-smtp-delivery-124.mimecast.com [170.10.129.124])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 14e8d663-a3b0-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 17:02:01 +0100 (CET)
Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com
 [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS
 (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 us-mta-9-UabhmwAwMlifXCrqqDrRsA-1; Mon, 14 Mar 2022 12:01:55 -0400
Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.rdu2.redhat.com
 [10.11.54.5])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by mimecast-mx02.redhat.com (Postfix) with ESMTPS id D33101C0E341;
 Mon, 14 Mar 2022 16:01:51 +0000 (UTC)
Received: from blackfin.pond.sub.org (unknown [10.36.112.3])
 by smtp.corp.redhat.com (Postfix) with ESMTPS id CF56C2D47A;
 Mon, 14 Mar 2022 16:01:09 +0000 (UTC)
Received: by blackfin.pond.sub.org (Postfix, from userid 1000)
 id A56DA21D1F55; Mon, 14 Mar 2022 17:01:08 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 14e8d663-a3b0-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
	s=mimecast20190719; t=1647273720;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=489E4pWkjEIWhUhrxb8XebOf0gy71B5KdIis0MfEsAQ=;
	b=ajIsXftbN4SdI5u5HZjuAqpT77hzOGnC/OQQwY3j821n1fh3E9lteZc1e+wVwC6NBKiAAu
	6NJjGrHwpmDSO3mViRlh1bd/UJaXM1z5JlrEks7kUTCGDOyMCVeO90uULxPkGyMsHz2ybE
	EgOBfoGNC9msTLaJLVIFhlcvbrJ5Gb0=
X-MC-Unique: UabhmwAwMlifXCrqqDrRsA-1
From: Markus Armbruster <armbru@redhat.com>
To: qemu-devel@nongnu.org
Cc: Paolo Bonzini <pbonzini@redhat.com>,
	Richard Henderson <richard.henderson@linaro.org>,
	Gerd Hoffmann <kraxel@redhat.com>,
	Christian Schoenebeck <qemu_oss@crudebyte.com>,
	"Gonglei (Arei)" <arei.gonglei@huawei.com>,
	=?UTF-8?q?Marc-Andr=C3=A9=20Lureau?= <marcandre.lureau@redhat.com>,
	"Michael S. Tsirkin" <mst@redhat.com>,
	Igor Mammedov <imammedo@redhat.com>,
	Ani Sinha <ani@anisinha.ca>,
	Laurent Vivier <lvivier@redhat.com>,
	Amit Shah <amit@kernel.org>,
	Peter Maydell <peter.maydell@linaro.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Anthony Perard <anthony.perard@citrix.com>,
	Paul Durrant <paul@xen.org>,
	=?UTF-8?q?Herv=C3=A9=20Poussineau?= <hpoussin@reactos.org>,
	Aleksandar Rikalo <aleksandar.rikalo@syrmia.com>,
	Corey Minyard <cminyard@mvista.com>,
	Patrick Venture <venture@google.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Peter Xu <peterx@redhat.com>,
	Jason Wang <jasowang@redhat.com>,
	=?UTF-8?q?C=C3=A9dric=20Le=20Goater?= <clg@kaod.org>,
	Daniel Henrique Barboza <danielhb413@gmail.com>,
	David Gibson <david@gibson.dropbear.id.au>,
	Greg Kurz <groug@kaod.org>,
	=?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Jean-Christophe Dubois <jcd@tribudubois.net>,
	Keith Busch <kbusch@kernel.org>,
	Klaus Jensen <its@irrelevant.dk>,
	Yuval Shaia <yuval.shaia.ml@gmail.com>,
	Yoshinori Sato <ysato@users.sourceforge.jp>,
	Magnus Damm <magnus.damm@gmail.com>,
	Fabien Chouteau <chouteau@adacore.com>,
	KONRAD Frederic <frederic.konrad@adacore.com>,
	Mark Cave-Ayland <mark.cave-ayland@ilande.co.uk>,
	Artyom Tarasenko <atar4qemu@gmail.com>,
	Alex Williamson <alex.williamson@redhat.com>,
	Eric Auger <eric.auger@redhat.com>,
	Max Filippov <jcmvbkbc@gmail.com>,
	Juan Quintela <quintela@redhat.com>,
	"Dr. David Alan Gilbert" <dgilbert@redhat.com>,
	Konstantin Kostiuk <kkostiuk@redhat.com>,
	Michael Roth <michael.roth@amd.com>,
	=?UTF-8?q?Daniel=20P=2E=20Berrang=C3=A9?= <berrange@redhat.com>,
	Pavel Dovgalyuk <pavel.dovgaluk@ispras.ru>,
	=?UTF-8?q?Alex=20Benn=C3=A9e?= <alex.bennee@linaro.org>,
	David Hildenbrand <david@redhat.com>,
	Wenchao Wang <wenchao.wang@intel.com>,
	Colin Xu <colin.xu@intel.com>,
	Kamil Rytarowski <kamil@netbsd.org>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Cornelia Huck <cohuck@redhat.com>,
	Thomas Huth <thuth@redhat.com>,
	Eric Blake <eblake@redhat.com>,
	Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>,
	John Snow <jsnow@redhat.com>,
	kvm@vger.kernel.org,
	qemu-arm@nongnu.org,
	xen-devel@lists.xenproject.org,
	qemu-ppc@nongnu.org,
	qemu-block@nongnu.org,
	haxm-team@intel.com,
	qemu-s390x@nongnu.org
Subject: [PATCH 1/3] scripts/coccinelle: New use-g_new-etc.cocci
Date: Mon, 14 Mar 2022 17:01:06 +0100
Message-Id: <20220314160108.1440470-2-armbru@redhat.com>
In-Reply-To: <20220314160108.1440470-1-armbru@redhat.com>
References: <20220314160108.1440470-1-armbru@redhat.com>
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.79 on 10.11.54.5
Authentication-Results: relay.mimecast.com;
	auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=armbru@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Transfer-Encoding: 8bit
Content-Type: text/plain; charset="US-ASCII"

This is the semantic patch from commit b45c03f585 "arm: Use g_new() &
friends where that makes obvious sense".

Signed-off-by: Markus Armbruster <armbru@redhat.com>
---
 scripts/coccinelle/use-g_new-etc.cocci | 75 ++++++++++++++++++++++++++
 1 file changed, 75 insertions(+)
 create mode 100644 scripts/coccinelle/use-g_new-etc.cocci

diff --git a/scripts/coccinelle/use-g_new-etc.cocci b/scripts/coccinelle/use-g_new-etc.cocci
new file mode 100644
index 0000000000..e2280e93b3
--- /dev/null
+++ b/scripts/coccinelle/use-g_new-etc.cocci
@@ -0,0 +1,75 @@
+// Use g_new() & friends where that makes obvious sense
+@@
+type T;
+@@
+-g_malloc(sizeof(T))
++g_new(T, 1)
+@@
+type T;
+@@
+-g_try_malloc(sizeof(T))
++g_try_new(T, 1)
+@@
+type T;
+@@
+-g_malloc0(sizeof(T))
++g_new0(T, 1)
+@@
+type T;
+@@
+-g_try_malloc0(sizeof(T))
++g_try_new0(T, 1)
+@@
+type T;
+expression n;
+@@
+-g_malloc(sizeof(T) * (n))
++g_new(T, n)
+@@
+type T;
+expression n;
+@@
+-g_try_malloc(sizeof(T) * (n))
++g_try_new(T, n)
+@@
+type T;
+expression n;
+@@
+-g_malloc0(sizeof(T) * (n))
++g_new0(T, n)
+@@
+type T;
+expression n;
+@@
+-g_try_malloc0(sizeof(T) * (n))
++g_try_new0(T, n)
+@@
+type T;
+expression p, n;
+@@
+-g_realloc(p, sizeof(T) * (n))
++g_renew(T, p, n)
+@@
+type T;
+expression p, n;
+@@
+-g_try_realloc(p, sizeof(T) * (n))
++g_try_renew(T, p, n)
+@@
+type T;
+expression n;
+@@
+-(T *)g_new(T, n)
++g_new(T, n)
+@@
+type T;
+expression n;
+@@
+-(T *)g_new0(T, n)
++g_new0(T, n)
+@@
+type T;
+expression p, n;
+@@
+-(T *)g_renew(T, p, n)
++g_renew(T, p, n)
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 16:08:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 16:08:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290319.492346 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTnFF-0006Dl-DV; Mon, 14 Mar 2022 16:08:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290319.492346; Mon, 14 Mar 2022 16:08:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTnFF-0006De-AL; Mon, 14 Mar 2022 16:08:29 +0000
Received: by outflank-mailman (input) for mailman id 290319;
 Mon, 14 Mar 2022 16:08:28 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=qs9R=TZ=linaro.org=peter.maydell@srs-se1.protection.inumbo.net>)
 id 1nTnFE-0006DY-N9
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 16:08:28 +0000
Received: from mail-yb1-xb30.google.com (mail-yb1-xb30.google.com
 [2607:f8b0:4864:20::b30])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id fb5b7ce1-a3b0-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 17:08:27 +0100 (CET)
Received: by mail-yb1-xb30.google.com with SMTP id g1so31761804ybe.4
 for <xen-devel@lists.xenproject.org>; Mon, 14 Mar 2022 09:08:27 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fb5b7ce1-a3b0-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=linaro.org; s=google;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=2HGDRUKrwEN1d1K0bkDUZOaGvLo7SAJZqfbA6vVtahI=;
        b=SdKfd/jbfGl52GQYetUtYUdEOsWHs/OwcXpH/I1S9dZeNmPMmDUjhk4fg2k0fckDY0
         t23UvUz0VX5KFhJVhe9QE4pxDN4WgSxdl2ub9UvFNGfWLksZPY3qve78zZUa/T+keflA
         4AqyVh/8j+AuQSOjaa97O9K94KoTPLgUsD1vsKJvk2RgSco0dDjxktClnkVR6rNfUD1j
         zklsyhplOXYFaLqTldx9pYgtu++atT9y1Dw4Ghx51Wl3kAxno8itR1Ko8ofxlm++dFis
         qihdx8K0f1b56+t1POBlkbGHXwMXu7ECfibDcuW0asoel4nuFfOu+/4Uh3pw02Ppe5lO
         w2XQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=2HGDRUKrwEN1d1K0bkDUZOaGvLo7SAJZqfbA6vVtahI=;
        b=Jt2lDzgRQL9FLAqa00dVbQrQ3C27zIEj8RalzFSv8nvVncGICCODENi/EacTcrrixs
         9zJz8l44g+QB1ZhV50ZyVh20cQDAR8FaNJsV9MmBL7y49UeNng1vWKyyN5Ji6x6SnVfU
         +JcZ9RuNl3ceZox9rWRIC1NL+Mvr50g5IoKrbzf4RgTaEx2WXjxk5uqzODP6V+hkOYJ7
         3sPgRtgp3x/LdtLRDgq1o0jc3MPyZCRP4KQBT+2wGOZ/tRaGrQQoxG5mwAgB/NOeGPd6
         vnteSDdWQsKpYf2gO0nsNS3l+Sh/emb0UrP2g9/e5VO1Vv/azSMc+EaCthvmZAKHp4+m
         6Qgg==
X-Gm-Message-State: AOAM531F7aoTziOoMruxrcbFbdRt5QbvLSlmNxoODOfua5zpGSuIPWIw
	BddXe8rGhdwWs4jadaeJCswATbF70Ce6A52gPzeHqg==
X-Google-Smtp-Source: ABdhPJyW6M/Aw8hf4XdJy6WjUtmqQsp6CbpUtiBE5nkkoLRyKFw/dasDSxXiwKCdKxH3YAqMGp/y61XBal4OddxiDeY=
X-Received: by 2002:a5b:350:0:b0:628:86b8:6e09 with SMTP id
 q16-20020a5b0350000000b0062886b86e09mr18269446ybp.39.1647274106395; Mon, 14
 Mar 2022 09:08:26 -0700 (PDT)
MIME-Version: 1.0
References: <20220314160108.1440470-1-armbru@redhat.com> <20220314160108.1440470-4-armbru@redhat.com>
In-Reply-To: <20220314160108.1440470-4-armbru@redhat.com>
From: Peter Maydell <peter.maydell@linaro.org>
Date: Mon, 14 Mar 2022 16:08:15 +0000
Message-ID: <CAFEAcA8Tb7e+mJGaietc5si7_xZWxbTixcTSvNpB9wH_LQJ7kQ@mail.gmail.com>
Subject: Re: [PATCH 3/3] Use g_new() & friends where that makes obvious sense
To: Markus Armbruster <armbru@redhat.com>
Cc: qemu-devel@nongnu.org, Paolo Bonzini <pbonzini@redhat.com>, 
	Richard Henderson <richard.henderson@linaro.org>, Gerd Hoffmann <kraxel@redhat.com>, 
	Christian Schoenebeck <qemu_oss@crudebyte.com>, "Gonglei (Arei)" <arei.gonglei@huawei.com>, 
	=?UTF-8?B?TWFyYy1BbmRyw6kgTHVyZWF1?= <marcandre.lureau@redhat.com>, 
	"Michael S. Tsirkin" <mst@redhat.com>, Igor Mammedov <imammedo@redhat.com>, Ani Sinha <ani@anisinha.ca>, 
	Laurent Vivier <lvivier@redhat.com>, Amit Shah <amit@kernel.org>, 
	Stefano Stabellini <sstabellini@kernel.org>, Anthony Perard <anthony.perard@citrix.com>, 
	Paul Durrant <paul@xen.org>, =?UTF-8?Q?Herv=C3=A9_Poussineau?= <hpoussin@reactos.org>, 
	Aleksandar Rikalo <aleksandar.rikalo@syrmia.com>, Corey Minyard <cminyard@mvista.com>, 
	Patrick Venture <venture@google.com>, Eduardo Habkost <eduardo@habkost.net>, 
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>, Peter Xu <peterx@redhat.com>, 
	Jason Wang <jasowang@redhat.com>, =?UTF-8?Q?C=C3=A9dric_Le_Goater?= <clg@kaod.org>, 
	Daniel Henrique Barboza <danielhb413@gmail.com>, David Gibson <david@gibson.dropbear.id.au>, 
	Greg Kurz <groug@kaod.org>, =?UTF-8?Q?Philippe_Mathieu=2DDaud=C3=A9?= <f4bug@amsat.org>, 
	Jean-Christophe Dubois <jcd@tribudubois.net>, Keith Busch <kbusch@kernel.org>, 
	Klaus Jensen <its@irrelevant.dk>, Yuval Shaia <yuval.shaia.ml@gmail.com>, 
	Yoshinori Sato <ysato@users.sourceforge.jp>, Magnus Damm <magnus.damm@gmail.com>, 
	Fabien Chouteau <chouteau@adacore.com>, KONRAD Frederic <frederic.konrad@adacore.com>, 
	Mark Cave-Ayland <mark.cave-ayland@ilande.co.uk>, Artyom Tarasenko <atar4qemu@gmail.com>, 
	Alex Williamson <alex.williamson@redhat.com>, Eric Auger <eric.auger@redhat.com>, 
	Max Filippov <jcmvbkbc@gmail.com>, Juan Quintela <quintela@redhat.com>, 
	"Dr. David Alan Gilbert" <dgilbert@redhat.com>, Konstantin Kostiuk <kkostiuk@redhat.com>, 
	Michael Roth <michael.roth@amd.com>, =?UTF-8?Q?Daniel_P=2E_Berrang=C3=A9?= <berrange@redhat.com>, 
	Pavel Dovgalyuk <Pavel.Dovgaluk@ispras.ru>, =?UTF-8?B?QWxleCBCZW5uw6ll?= <alex.bennee@linaro.org>, 
	David Hildenbrand <david@redhat.com>, Wenchao Wang <wenchao.wang@intel.com>, Colin Xu <colin.xu@intel.com>, 
	Kamil Rytarowski <kamil@netbsd.org>, Reinoud Zandijk <reinoud@netbsd.org>, 
	Sunil Muthuswamy <sunilmut@microsoft.com>, Cornelia Huck <cohuck@redhat.com>, 
	Thomas Huth <thuth@redhat.com>, Eric Blake <eblake@redhat.com>, 
	Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>, John Snow <jsnow@redhat.com>, kvm@vger.kernel.org, 
	qemu-arm@nongnu.org, xen-devel@lists.xenproject.org, qemu-ppc@nongnu.org, 
	qemu-block@nongnu.org, haxm-team@intel.com, qemu-s390x@nongnu.org
Content-Type: text/plain; charset="UTF-8"

On Mon, 14 Mar 2022 at 16:01, Markus Armbruster <armbru@redhat.com> wrote:
>
> g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
> for two reasons.  One, it catches multiplication overflowing size_t.
> Two, it returns T * rather than void *, which lets the compiler catch
> more type errors.
>
> This commit only touches allocations with size arguments of the form
> sizeof(T).
>
> Patch created mechanically with:
>
>     $ spatch --in-place --sp-file scripts/coccinelle/use-g_new-etc.cocci \
>              --macro-file scripts/cocci-macro-file.h FILES...
>
> Signed-off-by: Markus Armbruster <armbru@redhat.com>
> ---

>  104 files changed, 197 insertions(+), 202 deletions(-)

I'm not going to say you must split this patch up. I'm just going to
say that I personally am not looking at it, because it's too big
for me to deal with.

-- PMM


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 16:19:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 16:19:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290324.492358 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTnQ9-0007nw-Ew; Mon, 14 Mar 2022 16:19:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290324.492358; Mon, 14 Mar 2022 16:19:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTnQ9-0007np-Bi; Mon, 14 Mar 2022 16:19:45 +0000
Received: by outflank-mailman (input) for mailman id 290324;
 Mon, 14 Mar 2022 16:19:44 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=29fN=TZ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nTnQ8-0007nj-9O
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 16:19:44 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 8e223b17-a3b2-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 17:19:42 +0100 (CET)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04lp2059.outbound.protection.outlook.com [104.47.13.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-41-0PDbdx2XNEmNV71punguOQ-1; Mon, 14 Mar 2022 17:19:41 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM0PR04MB6164.eurprd04.prod.outlook.com (2603:10a6:208:13b::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.28; Mon, 14 Mar
 2022 16:19:39 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 16:19:39 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8e223b17-a3b2-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647274782;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=MC1aTq8eBPqoW7LhedZJT2jYiMxUdc6PUR427adhDGM=;
	b=bGGkTDxGND24GGED+vbRTxvbKBfFLqd5RiXHH37HF9ZwZ4XWQjaVdMnzQn51ohkJgQZ/zo
	3HSC1lhTSJ5EAY5Z3OCFw3WSoSL7F5LvDIITe6mrIKnXnL95UjxcORWUyaVXwpFsO18qtS
	VCmhxjfoGdk8bju6jwzP3nHbZpbXBv8=
X-MC-Unique: 0PDbdx2XNEmNV71punguOQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=kt8657JLAIJ2gxOmGh4eJLZPJkNb42X+MvoMSgAr0aSPXkgObeXBPKjS2dXjta3u86YAVVhOs6sHYS/4Y2HETUJdW5SdhotCFhbNLhuNVr6MGyIbZl3dii52h1TROHkviNeHnwYV9DW+rwQ9WLicoomeaXNP3zMGQmcdcr355DjW3tqBp2wB/RW8m0OGlsy28D5qjKNqgYTcOSKpdHk62yZUgUxXWFE5CtMyoQjqMabhMX36BbvQ4JgDGSeMPbsZPyDDsecrhZxa7uDBZsRASMVJw7YoC71foynDGIi5AI+oO12SJhqYE2XmRnHKn+HhPVn12Qo009kE1uK9N04Ljg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=1vamNvXXFeAoiY8vR1OqjNhR9vHUC1PgaJARD/Mh/ts=;
 b=Pv1qxTTNAKFSURj0HbIwvsd+lli7gCVm889IAYpAbFiu3YJNGUwPPkE+8hJAC34oOdeIeUmt/gPM/Rlw2sxK1cQZqMfpRsgzdu9hR7A+YOQ1mXQob32Abdsn7HV8OffzsLispHg8uwK1QvugLLX/f4dV5D62RecQsSwf624NHiK+l5LAdkCJzWs72AVYRO7VSFsPYgsFgm3nJ1MyJQcC3PH4O+9Gtzds+c5/Ns+sw4PyyZA4DG+qzJEV41KVyK3a2cAQb1kbnhBVEiRvEGm0TN3hUAapLSFsJyIS8J8M+P7GFLJOwj6MvN7+MWPslLgVwKKMibua6I7dmMz2M0DfeA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <d6bcee5b-abbd-5cef-f174-8609df94603e@suse.com>
Date: Mon, 14 Mar 2022 17:19:37 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v3 2/4] x86/APIC: calibrate against platform timer when
 possible
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
References: <35cb3c72-05ba-24c7-1fdd-3ee1aced3aec@suse.com>
 <cb7dd6bc-79a4-2137-5e82-805b9daf5d58@suse.com>
 <YitSc/Ky6PJb5ndV@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YitSc/Ky6PJb5ndV@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: FR3P281CA0022.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:1c::10) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0aa2260b-cf4b-4037-a6ae-08da05d6704a
X-MS-TrafficTypeDiagnostic: AM0PR04MB6164:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB6164A479C655D8D560A268C5B30F9@AM0PR04MB6164.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(83380400001)(186003)(38100700002)(26005)(2616005)(31686004)(36756003)(2906002)(8676002)(4326008)(8936002)(5660300002)(6512007)(6506007)(66476007)(54906003)(6916009)(31696002)(66946007)(66556008)(53546011)(508600001)(6486002)(316002)(86362001)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?qX/rOcr6BRMrxcRdzGzO4XOtibiuj8Gq7Nqgn5s3wSoKtPWSt5mxmmHMjtWp?=
 =?us-ascii?Q?oyXnaJVfMJpgHvnr30ERtsNuFo3U8y70pwZFtAZS+rHPrzMiP0yJXLk2Gfv/?=
 =?us-ascii?Q?QK3l335ZL9HJ1+W+4vqHLyH9H7E5IR2oCZXyMsZcC9VXloDDrykdLN9+NYlA?=
 =?us-ascii?Q?khwTJzZknM1UMieQl5kS15QYQLK79EQfC2GwfNGDs7eFG3cnGqhNSwC8YrqK?=
 =?us-ascii?Q?Dot8CHyGil4isXKMGUUP1lu481w54kqGx3gcPVzsf/MMwfnpTqnf6mX/1FZv?=
 =?us-ascii?Q?/nlhQ1ZjpvL2CwupKkQBxJP5V86fbMDvIFiEFdBy9vZ+QXFxVRPYLIPG/cVm?=
 =?us-ascii?Q?AjqH0uFiW+YwfKVGf9nRABjnOjcEngoTbIpODvFPXX50xZyeQHesLYumVPj4?=
 =?us-ascii?Q?lOxS01v6Odm9mJD4YIi76N9Sm2ho6BrpQlfCU/oyj6h60K9NbYj3t+LY32Xw?=
 =?us-ascii?Q?Ko/TdYEDsSnZxv3NRV0JnhZCpsgp62H1slgf78gjHyrTYSvd2ohBxDhsESe9?=
 =?us-ascii?Q?flkocojI4xYetrC1oXbV+2IHB3UPPxO0z4BAgIxyhDe0zjTkN+pU/P0Sbi+Y?=
 =?us-ascii?Q?hoiRUKYzu9j69Cd6Q/+KiRFhRjdT7JT1HvWBCzyXYj/MEvByR/YbBitPomxO?=
 =?us-ascii?Q?Ww9ZIyOEdVTpese26sByCohdcmq2zDM0Z3ehwoJdLKni3ZqLc/K2uXDe/IFu?=
 =?us-ascii?Q?9M8OI8LADB8ag2IPoAO5UMKjU2R7nTOhWzAEgs0EVwECVAXnmAcUxY9UucIp?=
 =?us-ascii?Q?D8U8TVXV4CWdSzKgXg+GLv11svS3hnaYSyamaxAiXsb72sKxswNqv1Zzmr1L?=
 =?us-ascii?Q?a3Nfmxezl3Td7h0eIVcCgeOcZT3I25/j3xrGKpW1xVfJBhKY0iffEvBCcNY+?=
 =?us-ascii?Q?ZC+R1uxglqYVapjIhOUgX52pmEKRjK4PBtmA0EwCNJtsnNW/oV1l3tdJiWRO?=
 =?us-ascii?Q?Zfft3zd5KA4V1RbgZvknesZ+TMPFbAhspAtDt7oIjcDOO7Pg/QnZFNMQprm/?=
 =?us-ascii?Q?hKzLmhZckVdD9zqA90krv40YxiT3jieffTo3PCwud3FUEDE4G37J51uxkjLl?=
 =?us-ascii?Q?ftX8hEPAz1X5uiB1BpGE66zU2F3p5AKzBnARHmPlzx4r3pzOdxFdrAk1MQLn?=
 =?us-ascii?Q?CSNV2AJvUBrmy8Gl2Kszc7xGnFI9ECzbE0qTqOHQttG4lpFRZgfZsvjszFV1?=
 =?us-ascii?Q?F9LzjGpAhXToBzQTcF95rx5LfNQFOaPLTTC5UInLLrsZIV5utjZI70wmO3n9?=
 =?us-ascii?Q?ThiY4DANN2n3fo/JcnLL5aIW2vnrZw0bQDsGyO4NRRu42cPQTqkETAIaZddd?=
 =?us-ascii?Q?ifx8S8lrw2ai6ZXNNyoZhZbYUljleBbpdQ3vMGxv39sATyOEwLN27PIyfKu2?=
 =?us-ascii?Q?LKUKD7OLWjiGc8Ae9hRtkhnsIGnems2yRvwOJeCw5NhMlJAeZbhmK5klDD8c?=
 =?us-ascii?Q?LEkaonYPN3dTHX8cm56nJcnPtu2ugQXe?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0aa2260b-cf4b-4037-a6ae-08da05d6704a
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 16:19:39.2833
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: HRRbmBXKve5T/8wVHUJClFCTtV7QcR8R9lkzubxVGH2o/bffWoYXkBJkPfe44zsWVhJe6AB5G6GQ1NJnvSZUUQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB6164

On 11.03.2022 14:45, Roger Pau Monn=C3=A9 wrote:
> On Mon, Feb 14, 2022 at 10:25:11AM +0100, Jan Beulich wrote:
>> Use the original calibration against PIT only when the platform timer
>> is PIT. This implicitly excludes the "xen_guest" case from using the PIT
>> logic (init_pit() fails there, and as of 5e73b2594c54 ["x86/time: minor
>> adjustments to init_pit()"] using_pit also isn't being set too early
>> anymore), so the respective hack there can be dropped at the same time.
>> This also reduces calibration time from 100ms to 50ms, albeit this step
>> is being skipped as of 0731a56c7c72 ("x86/APIC: no need for timer
>> calibration when using TDT") anyway.
>>
>> While re-indenting the PIT logic in calibrate_APIC_clock(), besides
>> adjusting style also switch around the 2nd TSC/TMCCT read pair, to match
>> the order of the 1st one, yielding more consistent deltas.
>>
>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>> ---
>> Open-coding apic_read() in read_tmcct() isn't overly nice, but I wanted
>> to avoid x2apic_enabled being evaluated twice in close succession. (The
>> barrier is there just in case only anyway: While this RDMSR isn't
>> serializing, I'm unaware of any statement whether it can also be
>> executed speculatively, like RDTSC can.) An option might be to move the
>> function to apic.c such that it would also be used by
>> calibrate_APIC_clock().
>=20
> I think that would make sense. Or else it's kind of orthogonal that we
> use a barrier in calibrate_apic_timer but not in calibrate_APIC_clock.

But there is a barrier there, via rdtsc_ordered(). Thinking about
this again, I'm not not even sure I'd like to use the helper in
calibrate_APIC_clock(), as there's no need to have two barriers
there.

But I guess I'll move the function in any event, so it at least
feels less like a layering violation. But I still would want to
avoid calling apic_read(), i.e. the function would remain as is
(albeit perhaps renamed as becoming non-static).

> But maybe we can get rid of the open-coded PIT calibration in
> calibrate_APIC_clock? (see below)
>=20
>> --- a/xen/arch/x86/time.c
>> +++ b/xen/arch/x86/time.c
>> @@ -26,6 +26,7 @@
>>  #include <xen/symbols.h>
>>  #include <xen/keyhandler.h>
>>  #include <xen/guest_access.h>
>> +#include <asm/apic.h>
>>  #include <asm/io.h>
>>  #include <asm/iocap.h>
>>  #include <asm/msr.h>
>> @@ -1004,6 +1005,78 @@ static u64 __init init_platform_timer(vo
>>      return rc;
>>  }
>> =20
>> +static uint32_t __init read_tmcct(void)
>> +{
>> +    if ( x2apic_enabled )
>> +    {
>> +        alternative("lfence", "mfence", X86_FEATURE_MFENCE_RDTSC);
>> +        return apic_rdmsr(APIC_TMCCT);
>> +    }
>> +
>> +    return apic_mem_read(APIC_TMCCT);
>> +}
>> +
>> +static uint64_t __init read_pt_and_tmcct(uint32_t *tmcct)
>> +{
>> +    uint32_t tmcct_prev =3D *tmcct =3D read_tmcct(), tmcct_min =3D ~0;
>> +    uint64_t best =3D best;
>> +    unsigned int i;
>> +
>> +    for ( i =3D 0; ; ++i )
>> +    {
>> +        uint64_t pt =3D plt_src.read_counter();
>> +        uint32_t tmcct_cur =3D read_tmcct();
>> +        uint32_t tmcct_delta =3D tmcct_prev - tmcct_cur;
>> +
>> +        if ( tmcct_delta < tmcct_min )
>> +        {
>> +            tmcct_min =3D tmcct_delta;
>> +            *tmcct =3D tmcct_cur;
>> +            best =3D pt;
>> +        }
>> +        else if ( i > 2 )
>> +            break;
>> +
>> +        tmcct_prev =3D tmcct_cur;
>> +    }
>> +
>> +    return best;
>> +}
>> +
>> +uint64_t __init calibrate_apic_timer(void)
>> +{
>> +    uint32_t start, end;
>> +    uint64_t count =3D read_pt_and_tmcct(&start), elapsed;
>> +    uint64_t target =3D CALIBRATE_VALUE(plt_src.frequency), actual;
>> +    uint64_t mask =3D (uint64_t)~0 >> (64 - plt_src.counter_bits);
>> +
>> +    /*
>> +     * PIT cannot be used here as it requires the timer interrupt to ma=
intain
>> +     * its 32-bit software counter, yet here we run with IRQs disabled.
>> +     */
>=20
> The reasoning in calibrate_APIC_clock to have interrupts disabled
> doesn't apply anymore I would think (interrupts are already enabled
> when we get there),

setup_boot_APIC_clock() disables IRQs before calling
calibrate_APIC_clock(). Whether the reasoning still applies is hard
to tell - I at least cannot claim I fully understand the concern.

> and hence it seems to me that calibrate_APIC_clock
> could be called with interrupts enabled and we could remove the
> open-coded usage of the PIT in calibrate_APIC_clock.

I won't exclude this might be possible, but it would mean changing
a path which is hardly ever used nowadays. While on one hand this
means hardly anyone might notice, otoh it also means possible
breakage might not be noticed until far in the future. It anyway
feels too much for a single change to also alter calibration against
PIT right here.

One thing seems quite clear though: Doing any of this with interrupts
enabled increases the chances for the read pairs to not properly
correlate, due to an interrupt happening in the middle. This alone is
a reason for me to want to keep IRQs off here.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 16:33:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 16:33:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290330.492369 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTnd0-0001pV-S2; Mon, 14 Mar 2022 16:33:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290330.492369; Mon, 14 Mar 2022 16:33:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTnd0-0001pO-Oj; Mon, 14 Mar 2022 16:33:02 +0000
Received: by outflank-mailman (input) for mailman id 290330;
 Mon, 14 Mar 2022 16:33:01 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTncz-0001pE-7j; Mon, 14 Mar 2022 16:33:01 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTncz-000068-5o; Mon, 14 Mar 2022 16:33:01 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTncy-00025s-N9; Mon, 14 Mar 2022 16:33:00 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTncy-0003MM-Ke; Mon, 14 Mar 2022 16:33:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=yjEaNYPiJSuaQq7QH6JUARLdSpX2DHcJBS7WQXoN+K4=; b=y50QcH8Orx8b4JIhBW4AhGxZx1
	rPNq3YsiVSXY/OyWRCNT68y/gqUuWM0dq3vl1sagTLMVWsFYgK582FrqnoWw5TEN0CbsOHjs2+sWn
	puaT8/sHsNsgGReWF1yd+4tW7btEMRnE1Sc/ANNUgCpJqL7RqDDYbOtLl9OTevTrOL3Q=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168587-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168587: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=a13dfc769bd7097d8d9ffe3e029a2c1d062d712b
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 14 Mar 2022 16:33:00 +0000

flight 168587 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168587/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 a13dfc769bd7097d8d9ffe3e029a2c1d062d712b
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   14 days
Failing since        168258  2022-03-01 01:55:31 Z   13 days  134 attempts
Testing same since   168579  2022-03-14 08:41:36 Z    0 days    5 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 629 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 16:36:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 16:36:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290338.492380 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTngP-0002Sc-BM; Mon, 14 Mar 2022 16:36:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290338.492380; Mon, 14 Mar 2022 16:36:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTngP-0002SV-8P; Mon, 14 Mar 2022 16:36:33 +0000
Received: by outflank-mailman (input) for mailman id 290338;
 Mon, 14 Mar 2022 16:36:31 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Zml5=TZ=strugglers.net=andy@srs-se1.protection.inumbo.net>)
 id 1nTngN-0002SP-Mh
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 16:36:31 +0000
Received: from mail.bitfolk.com (mail.bitfolk.com [2001:ba8:1f1:f019::25])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id e57210a6-a3b4-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 17:36:29 +0100 (CET)
Received: from andy by mail.bitfolk.com with local (Exim 4.89)
 (envelope-from <andy@strugglers.net>)
 id 1nTngJ-0005oD-PT; Mon, 14 Mar 2022 16:36:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e57210a6-a3b4-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bitfolk.com
	; s=alpha; h=Content-Type:MIME-Version:Message-ID:Subject:Cc:To:From:Date:
	Sender:Reply-To:Content-Transfer-Encoding:Content-ID:Content-Description:
	Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:
	In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:List-Subscribe:
	List-Post:List-Owner:List-Archive;
	bh=8uJnhy1bbsD1TNqDTRNKKLOV7YlCNlGnT/Ct3vHmX1w=; b=ZE2bEIbwaPB9XDo3bA9KmwikOT
	fjQw2bvv7AGb4nDVo55q7Dt6/mB+24Vkiszz6LwUziqr6MD96+AJaWz6TgZiX58Dy/I87OQEw5wBT
	yAibmISmdMHrE5GtZes6SkU+DRZ5pViIQzwlfo6HHjPJOe+FHn7XWpeznsm0Q96Xp3LPdC608fynz
	bjpnPsywsIkkzfy5WE4q/kDG4SF9jmgRxZ3llV3bl2ErmorgAW0OMV2TwGUorEOREQ9ebgewoCI46
	uDpBhWBmRWTjuqKyPsBI2xW1zurnPrBOHpDUiukhEEHI6oX7rV/+rWONLUrEKSHjq4ErW3g8MepXj
	JlnxLhSQ==;
Date: Mon, 14 Mar 2022 16:36:27 +0000
From: Andy Smith <andy@strugglers.net>
To: xen-devel@lists.xenproject.org
Cc: mikeh@csits.net
Subject: Some feature requests for guest consoles
Message-ID: <20220314163627.4pck24ahx6igggff@bitfolk.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
OpenPGP: id=BF15490B; url=http://strugglers.net/~andy/pubkey.asc
X-URL: http://strugglers.net/wiki/User:Andy
User-Agent: NeoMutt/20170113 (1.7.2)
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Mail-From: andy@strugglers.net
X-SA-Exim-Scanned: No (on mail.bitfolk.com); SAEximRunCond expanded to false

Hi,

Mike H <mikeh@csits.net> made a feature request in:

    https://lists.xenproject.org/archives/html/xen-users/2022-03/msg00009.html

for the Xen guest console as connected to with "xl console" to
correctly support the terminal size rather than always being 80x20.

Additionally I wondered about some other features:

- Ability to remap the "magic sysrq" key combination which is
  ctrl-o, and possibly disable it while leaving "xl sysrq" and
  /proc/sysrq-trigger in the guest generally working.

  Reason: guest administrators are often inexperienced with the
  details of Xen. ctrl-o is a bad choice because it's actually the
  "save buffer" shortcut in the popular editor nano. On more than
  one occasion I have had guest administrators be editing a file
  with nano on their console, they go to save it with ctrl-o which
  appears to do nothing (because Xen is waiting for the sysrq
  command that follows), so they do ctrl-o again which is taken as
  being command 'o' - immediate power off! I have had an emergency
  support ticket about this because "my guest randomly crashed while
  I was editing a file".

  I would therefore like to remap "magic sysrq" to something more
  obscure, or failing that disable it in guests as we/they will use
  "xl sysrq" instead.

A couple of other things which may already be possible but I don't
know how, so if anyone's done it maybe they could give hints:

- Systematically and automatically log all guest console activity to
  individual files without interfering with the ability to use "xl
  console"

- Somehow plumb the xenconsole pty to a web terminal like xterm.js

Thanks!
Andy


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 16:52:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 16:52:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290344.492390 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTnw0-0004zU-QV; Mon, 14 Mar 2022 16:52:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290344.492390; Mon, 14 Mar 2022 16:52:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTnw0-0004zN-NV; Mon, 14 Mar 2022 16:52:40 +0000
Received: by outflank-mailman (input) for mailman id 290344;
 Mon, 14 Mar 2022 16:52:40 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=QtFe=TZ=redhat.com=armbru@srs-se1.protection.inumbo.net>)
 id 1nTnw0-0004zH-25
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 16:52:40 +0000
Received: from us-smtp-delivery-124.mimecast.com
 (us-smtp-delivery-124.mimecast.com [170.10.133.124])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 2769e280-a3b7-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 17:52:38 +0100 (CET)
Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com
 [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS
 (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 us-mta-278-N1xO-bcsMhWHXGmr0LX6PA-1; Mon, 14 Mar 2022 12:52:36 -0400
Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.rdu2.redhat.com
 [10.11.54.8])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 3E815801585;
 Mon, 14 Mar 2022 16:52:34 +0000 (UTC)
Received: from blackfin.pond.sub.org (unknown [10.36.112.3])
 by smtp.corp.redhat.com (Postfix) with ESMTPS id 5D70AC50942;
 Mon, 14 Mar 2022 16:52:33 +0000 (UTC)
Received: by blackfin.pond.sub.org (Postfix, from userid 1000)
 id 30A6821E66C8; Mon, 14 Mar 2022 17:52:32 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2769e280-a3b7-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
	s=mimecast20190719; t=1647276757;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=hoVbdS414dD8S5HvfKlVfGNq0xYQ8aEfO5LCXtdVxms=;
	b=XG3499nnTatsMPDMTbFpCMpbjY6G1YBx3fWhZiqGJjID5p4RAhr4oXTc4kG9yTtNOwGtMK
	3HbiGiVANS4sFip//5DAS7mPICDz1EyJ3ZtLdAtJwqzGGXq6TLvrqIxequ5aEgcOaLJ0dt
	3IzzmQziLHa/oyRXAMD/iEQYw9I6DAg=
X-MC-Unique: N1xO-bcsMhWHXGmr0LX6PA-1
From: Markus Armbruster <armbru@redhat.com>
To: Peter Maydell <peter.maydell@linaro.org>
Cc: Markus Armbruster <armbru@redhat.com>,  qemu-devel@nongnu.org,  Paolo
 Bonzini <pbonzini@redhat.com>,  Richard Henderson
 <richard.henderson@linaro.org>,  Gerd Hoffmann <kraxel@redhat.com>,
  Christian Schoenebeck <qemu_oss@crudebyte.com>,  "Gonglei (Arei)"
 <arei.gonglei@huawei.com>,  =?utf-8?Q?Marc-Andr=C3=A9?= Lureau
 <marcandre.lureau@redhat.com>,  "Michael S. Tsirkin" <mst@redhat.com>,
  Igor Mammedov <imammedo@redhat.com>,  Ani Sinha <ani@anisinha.ca>,
  Laurent Vivier <lvivier@redhat.com>,  Amit Shah <amit@kernel.org>,
  Stefano Stabellini <sstabellini@kernel.org>,  Anthony Perard
 <anthony.perard@citrix.com>,  Paul Durrant <paul@xen.org>,  =?utf-8?Q?Her?=
 =?utf-8?Q?v=C3=A9?=
 Poussineau <hpoussin@reactos.org>,  Aleksandar Rikalo
 <aleksandar.rikalo@syrmia.com>,  Corey Minyard <cminyard@mvista.com>,
  Patrick Venture <venture@google.com>,  Eduardo Habkost
 <eduardo@habkost.net>,  Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
  Peter Xu <peterx@redhat.com>,  Jason Wang <jasowang@redhat.com>,
  =?utf-8?Q?C=C3=A9dric?=
 Le Goater <clg@kaod.org>,  Daniel Henrique Barboza
 <danielhb413@gmail.com>,  David Gibson <david@gibson.dropbear.id.au>,
  Greg Kurz <groug@kaod.org>,  Philippe =?utf-8?Q?Mathieu-Daud=C3=A9?=
 <f4bug@amsat.org>,
  Jean-Christophe Dubois <jcd@tribudubois.net>,  Keith Busch
 <kbusch@kernel.org>,  Klaus Jensen <its@irrelevant.dk>,  Yuval Shaia
 <yuval.shaia.ml@gmail.com>,  Yoshinori Sato <ysato@users.sourceforge.jp>,
  Magnus Damm <magnus.damm@gmail.com>,  Fabien Chouteau
 <chouteau@adacore.com>,  KONRAD Frederic <frederic.konrad@adacore.com>,
  Mark Cave-Ayland <mark.cave-ayland@ilande.co.uk>,  Artyom Tarasenko
 <atar4qemu@gmail.com>,  Alex Williamson <alex.williamson@redhat.com>,
  Eric Auger <eric.auger@redhat.com>,  Max Filippov <jcmvbkbc@gmail.com>,
  Juan Quintela <quintela@redhat.com>,  "Dr. David Alan Gilbert"
 <dgilbert@redhat.com>,  Konstantin Kostiuk <kkostiuk@redhat.com>,  Michael
 Roth <michael.roth@amd.com>,  Daniel P. =?utf-8?Q?Berrang=C3=A9?=
 <berrange@redhat.com>,
  Pavel Dovgalyuk <Pavel.Dovgaluk@ispras.ru>,  Alex =?utf-8?Q?Benn=C3=A9e?=
 <alex.bennee@linaro.org>,  David Hildenbrand <david@redhat.com>,  Wenchao
 Wang <wenchao.wang@intel.com>,  Kamil Rytarowski <kamil@netbsd.org>,
  Reinoud Zandijk <reinoud@netbsd.org>,  Sunil Muthuswamy
 <sunilmut@microsoft.com>,  Cornelia Huck <cohuck@redhat.com>,  Thomas Huth
 <thuth@redhat.com>,  Eric Blake <eblake@redhat.com>,  Vladimir
 Sementsov-Ogievskiy <vsementsov@virtuozzo.com>,  John Snow
 <jsnow@redhat.com>,  kvm@vger.kernel.org,  qemu-arm@nongnu.org,
  xen-devel@lists.xenproject.org,  qemu-ppc@nongnu.org,
  qemu-block@nongnu.org,  haxm-team@intel.com,  qemu-s390x@nongnu.org
Subject: Re: [PATCH 3/3] Use g_new() & friends where that makes obvious sense
References: <20220314160108.1440470-1-armbru@redhat.com>
	<20220314160108.1440470-4-armbru@redhat.com>
	<CAFEAcA8Tb7e+mJGaietc5si7_xZWxbTixcTSvNpB9wH_LQJ7kQ@mail.gmail.com>
Date: Mon, 14 Mar 2022 17:52:32 +0100
In-Reply-To: <CAFEAcA8Tb7e+mJGaietc5si7_xZWxbTixcTSvNpB9wH_LQJ7kQ@mail.gmail.com>
	(Peter Maydell's message of "Mon, 14 Mar 2022 16:08:15 +0000")
Message-ID: <87k0cwqxwv.fsf@pond.sub.org>
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.2 (gnu/linux)
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.85 on 10.11.54.8
Authentication-Results: relay.mimecast.com;
	auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=armbru@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain

Peter Maydell <peter.maydell@linaro.org> writes:

> On Mon, 14 Mar 2022 at 16:01, Markus Armbruster <armbru@redhat.com> wrote:
>>
>> g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
>> for two reasons.  One, it catches multiplication overflowing size_t.
>> Two, it returns T * rather than void *, which lets the compiler catch
>> more type errors.
>>
>> This commit only touches allocations with size arguments of the form
>> sizeof(T).
>>
>> Patch created mechanically with:
>>
>>     $ spatch --in-place --sp-file scripts/coccinelle/use-g_new-etc.cocci \
>>              --macro-file scripts/cocci-macro-file.h FILES...
>>
>> Signed-off-by: Markus Armbruster <armbru@redhat.com>
>> ---
>
>>  104 files changed, 197 insertions(+), 202 deletions(-)
>
> I'm not going to say you must split this patch up. I'm just going to
> say that I personally am not looking at it, because it's too big
> for me to deal with.

As with all big but trivial Coccinelle patches, reviewing the Coccinelle
script and a reasonably representative sample of its output is almost
certainly a better use of reviewer time than attempting to get all the
patches reviewed.  They are mind-numbingly dull!

For what it's worth, we've used this script several times before.  Last
in commit bdd81addf4.



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 17:06:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 17:06:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290358.492409 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTo9J-0006l0-6X; Mon, 14 Mar 2022 17:06:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290358.492409; Mon, 14 Mar 2022 17:06:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTo9J-0006kt-3A; Mon, 14 Mar 2022 17:06:25 +0000
Received: by outflank-mailman (input) for mailman id 290358;
 Mon, 14 Mar 2022 17:06:23 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=Hqvf=TZ=kaod.org=clg@srs-se1.protection.inumbo.net>)
 id 1nTo9H-0006kn-G1
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 17:06:23 +0000
Received: from smtpout3.mo529.mail-out.ovh.net
 (smtpout3.mo529.mail-out.ovh.net [46.105.54.81])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 1254ee7b-a3b9-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 18:06:21 +0100 (CET)
Received: from mxplan5.mail.ovh.net (unknown [10.109.156.136])
 by mo529.mail-out.ovh.net (Postfix) with ESMTPS id F3D6CE9D33AE;
 Mon, 14 Mar 2022 18:06:17 +0100 (CET)
Received: from kaod.org (37.59.142.106) by DAG4EX1.mxp5.local (172.16.2.31)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Mon, 14 Mar
 2022 18:06:15 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1254ee7b-a3b9-11ec-8eba-a37418f5ba1a
Authentication-Results: garm.ovh; auth=pass (GARM-106R006711b171a-688b-46e4-a7cc-d210997aca55,
                    00B622A560025FB732B9BA5E5C4E2A2293E53F9D) smtp.auth=clg@kaod.org
X-OVh-ClientIp: 82.64.250.170
Message-ID: <286084fe-dec4-2473-db64-4bbe7bd9145e@kaod.org>
Date: Mon, 14 Mar 2022 18:06:14 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH 3/3] Use g_new() & friends where that makes obvious sense
Content-Language: en-US
To: Markus Armbruster <armbru@redhat.com>, <qemu-devel@nongnu.org>
CC: Paolo Bonzini <pbonzini@redhat.com>, Richard Henderson
	<richard.henderson@linaro.org>, Gerd Hoffmann <kraxel@redhat.com>, Christian
 Schoenebeck <qemu_oss@crudebyte.com>, "Gonglei (Arei)"
	<arei.gonglei@huawei.com>, =?UTF-8?Q?Marc-Andr=c3=a9_Lureau?=
	<marcandre.lureau@redhat.com>, "Michael S. Tsirkin" <mst@redhat.com>, Igor
 Mammedov <imammedo@redhat.com>, Ani Sinha <ani@anisinha.ca>, Laurent Vivier
	<lvivier@redhat.com>, Amit Shah <amit@kernel.org>, Peter Maydell
	<peter.maydell@linaro.org>, Stefano Stabellini <sstabellini@kernel.org>,
	Anthony Perard <anthony.perard@citrix.com>, Paul Durrant <paul@xen.org>,
	=?UTF-8?Q?Herv=c3=a9_Poussineau?= <hpoussin@reactos.org>, Aleksandar Rikalo
	<aleksandar.rikalo@syrmia.com>, Corey Minyard <cminyard@mvista.com>, Patrick
 Venture <venture@google.com>, Eduardo Habkost <eduardo@habkost.net>, Marcel
 Apfelbaum <marcel.apfelbaum@gmail.com>, Peter Xu <peterx@redhat.com>, Jason
 Wang <jasowang@redhat.com>, Daniel Henrique Barboza <danielhb413@gmail.com>,
	David Gibson <david@gibson.dropbear.id.au>, Greg Kurz <groug@kaod.org>,
	=?UTF-8?Q?Philippe_Mathieu-Daud=c3=a9?= <f4bug@amsat.org>, Jean-Christophe
 Dubois <jcd@tribudubois.net>, Keith Busch <kbusch@kernel.org>, Klaus Jensen
	<its@irrelevant.dk>, Yuval Shaia <yuval.shaia.ml@gmail.com>, Yoshinori Sato
	<ysato@users.sourceforge.jp>, Magnus Damm <magnus.damm@gmail.com>, Fabien
 Chouteau <chouteau@adacore.com>, KONRAD Frederic
	<frederic.konrad@adacore.com>, Mark Cave-Ayland
	<mark.cave-ayland@ilande.co.uk>, Artyom Tarasenko <atar4qemu@gmail.com>, Alex
 Williamson <alex.williamson@redhat.com>, Eric Auger <eric.auger@redhat.com>,
	Max Filippov <jcmvbkbc@gmail.com>, Juan Quintela <quintela@redhat.com>, "Dr.
 David Alan Gilbert" <dgilbert@redhat.com>, Konstantin Kostiuk
	<kkostiuk@redhat.com>, Michael Roth <michael.roth@amd.com>,
	=?UTF-8?Q?Daniel_P=2e_Berrang=c3=a9?= <berrange@redhat.com>, Pavel Dovgalyuk
	<pavel.dovgaluk@ispras.ru>, =?UTF-8?Q?Alex_Benn=c3=a9e?=
	<alex.bennee@linaro.org>, David Hildenbrand <david@redhat.com>, Wenchao Wang
	<wenchao.wang@intel.com>, Colin Xu <colin.xu@intel.com>, Kamil Rytarowski
	<kamil@netbsd.org>, Reinoud Zandijk <reinoud@netbsd.org>, Sunil Muthuswamy
	<sunilmut@microsoft.com>, Cornelia Huck <cohuck@redhat.com>, Thomas Huth
	<thuth@redhat.com>, Eric Blake <eblake@redhat.com>, Vladimir
 Sementsov-Ogievskiy <vsementsov@virtuozzo.com>, John Snow <jsnow@redhat.com>,
	<kvm@vger.kernel.org>, <qemu-arm@nongnu.org>,
	<xen-devel@lists.xenproject.org>, <qemu-ppc@nongnu.org>,
	<qemu-block@nongnu.org>, <haxm-team@intel.com>, <qemu-s390x@nongnu.org>
References: <20220314160108.1440470-1-armbru@redhat.com>
 <20220314160108.1440470-4-armbru@redhat.com>
From: =?UTF-8?Q?C=c3=a9dric_Le_Goater?= <clg@kaod.org>
In-Reply-To: <20220314160108.1440470-4-armbru@redhat.com>
Content-Type: text/plain; charset="UTF-8"; format=flowed
Content-Transfer-Encoding: 8bit
X-Originating-IP: [37.59.142.106]
X-ClientProxiedBy: DAG8EX2.mxp5.local (172.16.2.72) To DAG4EX1.mxp5.local
 (172.16.2.31)
X-Ovh-Tracer-GUID: 1f43e3ab-c662-4fb9-88a2-4f7a133485e2
X-Ovh-Tracer-Id: 8505329372638186397
X-VR-SPAMSTATE: OK
X-VR-SPAMSCORE: -100
X-VR-SPAMCAUSE: gggruggvucftvghtrhhoucdtuddrgedvvddruddvkedgleehucetufdoteggodetrfdotffvucfrrhhofhhilhgvmecuqfggjfdpvefjgfevmfevgfenuceurghilhhouhhtmecuhedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmnecujfgurhepkfffgggfuffvfhfhjggtgfhisehtkeertddtfeejnecuhfhrohhmpeevrogurhhitggpnfgvpgfiohgrthgvrhcuoegtlhhgsehkrghougdrohhrgheqnecuggftrfgrthhtvghrnhepieegvdffkeegfeetuddttddtveduiefhgeduffekiedtkeekteekhfffleevleelnecukfhppedtrddtrddtrddtpdefjedrheelrddugedvrddutdeinecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehmohguvgepshhmthhpohhuthdphhgvlhhopehmgihplhgrnhehrdhmrghilhdrohhvhhdrnhgvthdpihhnvghtpedtrddtrddtrddtpdhmrghilhhfrhhomheptghlgheskhgrohgurdhorhhgpdhnsggprhgtphhtthhopedupdhrtghpthhtohepghhrohhugheskhgrohgurdhorhhg

On 3/14/22 17:01, Markus Armbruster wrote:
> g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
> for two reasons.  One, it catches multiplication overflowing size_t.
> Two, it returns T * rather than void *, which lets the compiler catch
> more type errors.
> 
> This commit only touches allocations with size arguments of the form
> sizeof(T).
> 
> Patch created mechanically with:
> 
>      $ spatch --in-place --sp-file scripts/coccinelle/use-g_new-etc.cocci \
> 	     --macro-file scripts/cocci-macro-file.h FILES...
> 
> Signed-off-by: Markus Armbruster <armbru@redhat.com>
> ---
>   include/qemu/timer.h                     |  2 +-
>   accel/kvm/kvm-all.c                      |  6 ++--
>   accel/tcg/tcg-accel-ops-mttcg.c          |  2 +-
>   accel/tcg/tcg-accel-ops-rr.c             |  4 +--
>   audio/audio.c                            |  4 +--
>   audio/audio_legacy.c                     |  6 ++--
>   audio/dsoundaudio.c                      |  2 +-
>   audio/jackaudio.c                        |  6 ++--
>   audio/paaudio.c                          |  4 +--
>   backends/cryptodev.c                     |  2 +-
>   contrib/vhost-user-gpu/vhost-user-gpu.c  |  2 +-
>   cpus-common.c                            |  4 +--
>   dump/dump.c                              |  2 +-
>   hw/acpi/hmat.c                           |  2 +-
>   hw/audio/intel-hda.c                     |  2 +-
>   hw/char/parallel.c                       |  2 +-
>   hw/char/riscv_htif.c                     |  2 +-
>   hw/char/virtio-serial-bus.c              |  6 ++--
>   hw/core/irq.c                            |  2 +-
>   hw/core/reset.c                          |  2 +-
>   hw/display/pxa2xx_lcd.c                  |  2 +-
>   hw/display/tc6393xb.c                    |  2 +-
>   hw/display/virtio-gpu.c                  |  4 +--
>   hw/display/xenfb.c                       |  4 +--
>   hw/dma/rc4030.c                          |  4 +--
>   hw/i2c/core.c                            |  4 +--
>   hw/i2c/i2c_mux_pca954x.c                 |  2 +-
>   hw/i386/amd_iommu.c                      |  4 +--
>   hw/i386/intel_iommu.c                    |  2 +-
>   hw/i386/xen/xen-hvm.c                    | 10 +++---
>   hw/i386/xen/xen-mapcache.c               | 14 ++++----
>   hw/input/lasips2.c                       |  2 +-
>   hw/input/pckbd.c                         |  2 +-
>   hw/input/ps2.c                           |  4 +--
>   hw/input/pxa2xx_keypad.c                 |  2 +-
>   hw/input/tsc2005.c                       |  3 +-
>   hw/intc/riscv_aclint.c                   |  6 ++--
>   hw/intc/xics.c                           |  2 +-
>   hw/m68k/virt.c                           |  2 +-
>   hw/mips/mipssim.c                        |  2 +-
>   hw/misc/applesmc.c                       |  2 +-
>   hw/misc/imx6_src.c                       |  2 +-
>   hw/misc/ivshmem.c                        |  4 +--
>   hw/net/virtio-net.c                      |  4 +--
>   hw/nvme/ns.c                             |  2 +-
>   hw/pci-host/pnv_phb3.c                   |  2 +-
>   hw/pci-host/pnv_phb4.c                   |  2 +-
>   hw/pci/pcie_sriov.c                      |  2 +-
>   hw/ppc/e500.c                            |  2 +-
>   hw/ppc/ppc.c                             |  8 ++---
>   hw/ppc/ppc405_boards.c                   |  4 +--
>   hw/ppc/ppc405_uc.c                       | 18 +++++-----
>   hw/ppc/ppc4xx_devs.c                     |  2 +-
>   hw/ppc/ppc_booke.c                       |  4 +--
>   hw/ppc/spapr.c                           |  2 +-
>   hw/ppc/spapr_events.c                    |  2 +-
>   hw/ppc/spapr_hcall.c                     |  2 +-
>   hw/ppc/spapr_numa.c                      |  3 +-
>   hw/rdma/vmw/pvrdma_dev_ring.c            |  2 +-
>   hw/rdma/vmw/pvrdma_qp_ops.c              |  6 ++--
>   hw/sh4/r2d.c                             |  4 +--
>   hw/sh4/sh7750.c                          |  2 +-
>   hw/sparc/leon3.c                         |  2 +-
>   hw/sparc64/sparc64.c                     |  4 +--
>   hw/timer/arm_timer.c                     |  2 +-
>   hw/timer/slavio_timer.c                  |  2 +-
>   hw/vfio/pci.c                            |  4 +--
>   hw/vfio/platform.c                       |  4 +--
>   hw/virtio/virtio-crypto.c                |  2 +-
>   hw/virtio/virtio-iommu.c                 |  2 +-
>   hw/virtio/virtio.c                       |  5 ++-
>   hw/xtensa/xtfpga.c                       |  2 +-
>   linux-user/syscall.c                     |  2 +-
>   migration/dirtyrate.c                    |  4 +--
>   migration/multifd-zlib.c                 |  4 +--
>   migration/ram.c                          |  2 +-
>   monitor/misc.c                           |  2 +-
>   monitor/qmp-cmds.c                       |  2 +-
>   qga/commands-win32.c                     |  8 ++---
>   qga/commands.c                           |  2 +-
>   qom/qom-qmp-cmds.c                       |  2 +-
>   replay/replay-char.c                     |  4 +--
>   replay/replay-events.c                   | 10 +++---
>   scripts/coverity-scan/model.c            |  2 +-
>   semihosting/config.c                     |  2 +-
>   softmmu/bootdevice.c                     |  4 +--
>   softmmu/dma-helpers.c                    |  4 +--
>   softmmu/memory_mapping.c                 |  2 +-
>   target/i386/cpu-sysemu.c                 |  2 +-
>   target/i386/hax/hax-accel-ops.c          |  4 +--
>   target/i386/nvmm/nvmm-accel-ops.c        |  4 +--
>   target/i386/whpx/whpx-accel-ops.c        |  4 +--
>   target/i386/whpx/whpx-all.c              |  2 +-
>   target/s390x/cpu-sysemu.c                |  2 +-
>   tests/unit/test-hbitmap.c                |  2 +-
>   tests/unit/test-qmp-cmds.c               | 14 ++++----
>   tests/unit/test-qobject-output-visitor.c |  2 +-
>   tests/unit/test-vmstate.c                | 42 ++++++++++++------------
>   ui/vnc-enc-tight.c                       |  2 +-
>   util/envlist.c                           |  2 +-
>   util/hbitmap.c                           |  2 +-
>   util/main-loop.c                         |  2 +-
>   util/qemu-timer.c                        |  2 +-
>   util/vfio-helpers.c                      |  4 +--
>   104 files changed, 197 insertions(+), 202 deletions(-)

PPC part:
  Reviewed-by: Cédric Le Goater <clg@kaod.org>

Thanks,

C.



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 17:16:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 17:16:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290376.492424 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nToIu-0008T5-99; Mon, 14 Mar 2022 17:16:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290376.492424; Mon, 14 Mar 2022 17:16:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nToIu-0008Sy-6B; Mon, 14 Mar 2022 17:16:20 +0000
Received: by outflank-mailman (input) for mailman id 290376;
 Mon, 14 Mar 2022 17:16:18 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=29fN=TZ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nToIs-0008Ss-Bu
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 17:16:18 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 74a44297-a3ba-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 18:16:16 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2110.outbound.protection.outlook.com [104.47.17.110]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-25-evL1bKcDMMiSPLiwLWf1Jw-1; Mon, 14 Mar 2022 18:16:14 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DBBPR04MB7611.eurprd04.prod.outlook.com (2603:10a6:10:1f4::24)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.28; Mon, 14 Mar
 2022 17:16:13 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 17:16:12 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 74a44297-a3ba-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647278175;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=2+j6yRR5WwWJnlRNRwOWZfqK9FAiUwmthpUrg3fdSbk=;
	b=HxYMmIAAc+cutWIt/1TGOVj/B4vS6OWUS0lFLzOHRyCRoUx2wQM3dH8fHzLkxxay1j4PPr
	Wm3iF83z3dm1eAW21CORGUUB9YXPQ8ikuuBY0q8CwcqvE2HUzR6U2jOTTOuHaoC9jG3qAc
	d/ly8kTzSMdsMuExJleNdx9++sONK5Q=
X-MC-Unique: evL1bKcDMMiSPLiwLWf1Jw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ZHdk3NP1ggcBtk+s5zrpXOETUqDUnDjnDJjmeqQpQ4OfkZzARJA9Y5yGD9dDun8dXaLh57Zbvroxuh1j8UPrdNv3XMmBWyXmO+yzh5pyF7Lj7sG9AM4+heoIq/eUXp66u4ALS8XCQQbF4t+R/ORaleNdihEQG/Ue6e3XLh9TyPtVJkfgEtA33zc0Tkk3a+Ow8uGtPVuStGkVjy2Tlu5nqMUE3PSHsxS+QfHOM8wVVxNylILYZKb62NTahlc4TywcUA6FxOECyxhhOkFzxH7/bTc2KB4bGZGLqG1/DodwsbXaaqFwkmiC6zIQ5imx/AFCmAWnOZKgJQD385dxSyxfbA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=2+j6yRR5WwWJnlRNRwOWZfqK9FAiUwmthpUrg3fdSbk=;
 b=OurIAN2woBA1AIpH/S7yS+/M/ah5xcpdFqjYlwdfaD+mbXgD5tguoVtCI1Mo5G5z9pB4VoSVAEaZ2Ei4AGyYFZsYeXaMjAHWef1Wvq0eywvCCqsD9FDK/ahTlcdmmEdLc8ITL68dXwF1SyAyBYk4x8+9bJW9F/5jdpDpOVe5cR0yU5f9FEaBwijsA7Pfzj43OHxApRT/4hWGWvdN7mtU51F5g2k8cqaQcXX0rMXUdroYOuFSDYvJvvl1B3pKYrfHdY3Iau/6OnurrxE+bWUj0Zg45iN12ED7j4RNVM92YzC6ZqnUuXSkBHACZNdLLoauzsgq3wteMMuOhPbUE7RScg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <5c39e5c3-6e9e-e009-177b-495d80b6ea62@suse.com>
Date: Mon, 14 Mar 2022 18:16:10 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Julien Grall <julien@xen.org>, Stefano Stabellini
 <sstabellini@kernel.org>, Volodymyr Babchuk <volodymyr_babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH] Arm: arrange to have linker script honor dependencies (again)
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P194CA0031.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:209:90::44) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 37381e14-61e9-4960-3d57-08da05de56ea
X-MS-TrafficTypeDiagnostic: DBBPR04MB7611:EE_
X-Microsoft-Antispam-PRVS:
	<DBBPR04MB76111D959D78BDA5E5CEF06BB30F9@DBBPR04MB7611.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(26005)(186003)(8676002)(66476007)(66556008)(4326008)(38100700002)(66946007)(8936002)(6486002)(54906003)(6916009)(508600001)(86362001)(6506007)(316002)(5660300002)(31696002)(31686004)(6512007)(2616005)(36756003)(4744005)(2906002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?V2dhSnZFSHN1U1Fjalc5V0dHbW1TakxLWmw5RisybDFvN0svbkJpdTRDY2pU?=
 =?utf-8?B?YnJoNklTRDFNZjVTdFo4dkcvNDB5TXdPa25yNWtnTE01VkxGNlFpcm9GWlA2?=
 =?utf-8?B?NGtCN3gxeHFkcGZsOCtQa2lBcEJwN2N5VVYzRG52Sk1LZ0VUeXE2bnFNdnJZ?=
 =?utf-8?B?clhidzEzQ3MzK2g3UnVjY0VwV3JGMGVLWlVmUXJWdENEa01FTEU1WFo3YU5V?=
 =?utf-8?B?bDMzRjdYL2ZWRERvRWJneENqTjljazhYdXZuSDhMRDBPM000blFPdWRZUXJF?=
 =?utf-8?B?ZlRNbER0R09XUHJhMVhwaE9vSE5EQUlQUThGZVRqV0lMbWVIRENNL2VvclRx?=
 =?utf-8?B?R2hmL1JaMjFuOTltcFFKaE1qWXlaT1NrS1BGck9ZamxyQm9GZXR6WXg3aWlj?=
 =?utf-8?B?anN5cVQ5V3g3dmRlU0IwZk9QaWJDQ3FFTDM3ZFkwMjFzeGMxOFl4NXFVOTg0?=
 =?utf-8?B?MWl1aHlKRVQrM2QyVkdzU1hBV1lTSkR3OHl1bE9IVVE2bjBhd01KdStMbERu?=
 =?utf-8?B?NVh5Qkp2dEF1dkxPWFZhQkJwUlkvL21FRU9wVzRNcytRUWpGaUN5M0hpVVdZ?=
 =?utf-8?B?SjhoVUpEMkdBUE9UclYzV244TTJrR3BZM2hqL0grRldGZzhJSVdTNExEaG1u?=
 =?utf-8?B?L25Lc0VjOXR0V0FHTXVMRWtGVzJYOVBER3NJT0N2WFFQMisybzBOc2RVNEJn?=
 =?utf-8?B?T3JHa1U0YXk4MXYrNm5BZzM4NE81c2lmN1pRUVBpY3EyMWlIdTFRa3VaVzJi?=
 =?utf-8?B?c2pFSTRqdGpvTWFuZk9LM21YV0lMc3loQ3N5dTJsSmhKdmhHb2xmcFVCQWU3?=
 =?utf-8?B?U1pWNjdZd1djUU1Gc2o4ZFRxc0VObkhhMGVuQzRHWkc2bnpXbzhEZlNTWGt6?=
 =?utf-8?B?RkNDeEZMS2I3aGFhckhGYUFndEVGK0xMa3JOVnZFM0E4UXIvY2puWGZqK2Ru?=
 =?utf-8?B?dEVuNk1vU2NaZG8vcTNGWDhsc3Z2VEFCQzFNWW1XMEJPMmliUnNxSHpEb201?=
 =?utf-8?B?M3J0cm5YNGNWWm05Qi8rL2JhSlluTis2YUJieW5kUjJWUlROY1RQbW5iZk9y?=
 =?utf-8?B?eldWZ0UvbkpUemdOS1RoTG1NU3Zsd1o0TUlJWDNsSlYxeFY0c3VGd2piRUxZ?=
 =?utf-8?B?c1ZaNTI2UW1KL2xyd2lsdU9RMXdmQXFJd3p3anFZZG1vYjV4YWU2bEhsdkpF?=
 =?utf-8?B?YnBOVSt3NyttTWhuM3JSckJHSTc2UHo5M210Skxtc2hEdE9ERjdKbU9DbUdN?=
 =?utf-8?B?N3grSkhPcUZGQWl6UE02dkNuT051NllSNmZPbmpxQWNYMUN6V1B6cE1NejR2?=
 =?utf-8?B?QmZCeGM4dlphYzZoMmMvaFpEVTFQRkhKWmxQUG1oUTgwWWk4alVzVnBjMzQw?=
 =?utf-8?B?OVBES00yTjdCek9PVld0MlUyRzRoOUtWSWtkamUzc2tWRUJiL2VVS3dLNFQ3?=
 =?utf-8?B?Ymp6bURiN0FNdkhzNm5vcFgzWlhwVFJFOHJ0aHdNWEI3TDRQcmxQdnFIM0lR?=
 =?utf-8?B?R2VqZmRRTDZRV0gxVkQxYmZqUzdHQjFacmQ0MnNNSEowem9wbFlXbk1Bam9j?=
 =?utf-8?B?VFBTTVB5TkluSGJVUmJyQ2tYbnZ4VG5xS3lEd0ZEOFl0U05ENllpaXFmTVlD?=
 =?utf-8?B?VG9NVXRCMGJVRFlJYWt3bjF6azNXSGd4V2MrK3B6NERBUU1YOEQzcEZpSVMw?=
 =?utf-8?B?Lzc1eEc2NkZZRUkxM3E1S0dSaWdmYUN0QS8rdnBtcUcvY05oMWFXdXFQQjJq?=
 =?utf-8?B?cVRpSjh1OC9wTFhMZWJPL0htbmxHbEJGQjdEVWpLU3ZQWTRJM2lpTlphc1I0?=
 =?utf-8?B?VUlIL1JEOUJDdEwyN2lMNGk5ZXpTY1NEZVRmT3hqbXR6Q3ErOHAvWXhzLytr?=
 =?utf-8?B?TWVkUzZQUGVWQkppZlVkOXF5SmpaclBrMUxqN2c5MDhZQVpGTkZwdEk0ekVY?=
 =?utf-8?Q?WPPPnfUf9JldhACiafNxiENhryIx9fMl?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 37381e14-61e9-4960-3d57-08da05de56ea
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 17:16:12.7135
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: /vZP4GMAwHV4kn1owav3UAQzUdqNTRFkpSUlZEnAwbpIH/5gHAZYMPGNg1A8snaapCFt/4P4zUDdi+vK29xVQg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR04MB7611

The if_changed macro leads to dependencies being recorded in .*.d, which
aren't loaded anymore. Use if_changed_dep instead, like x86 does.

Fixes: 06ef696c85a7 ("build: introduce if_changed_deps")
Signed-off-by: Jan Beulich <jbeulich@suse.com>

--- a/xen/arch/arm/Makefile
+++ b/xen/arch/arm/Makefile
@@ -112,7 +112,7 @@ $(TARGET)-syms: $(BASEDIR)/prelink.o $(o
 include:
 
 $(obj)/xen.lds: $(src)/xen.lds.S FORCE
-	$(call if_changed,cpp_lds_S)
+	$(call if_changed_dep,cpp_lds_S)
 
 $(obj)/dtb.o: $(patsubst "%",%,$(CONFIG_DTB_FILE))
 



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 17:35:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 17:35:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290385.492435 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTobR-0002bX-Ue; Mon, 14 Mar 2022 17:35:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290385.492435; Mon, 14 Mar 2022 17:35:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTobR-0002bQ-Ri; Mon, 14 Mar 2022 17:35:29 +0000
Received: by outflank-mailman (input) for mailman id 290385;
 Mon, 14 Mar 2022 17:35:29 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=J1jB=TZ=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nTobR-0002bK-4e
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 17:35:29 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04on0610.outbound.protection.outlook.com
 [2a01:111:f400:fe0c::610])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 22663be3-a3bd-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 18:35:27 +0100 (CET)
Received: from DB6PR1001CA0018.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:4:b7::28)
 by AM0PR08MB4483.eurprd08.prod.outlook.com (2603:10a6:208:145::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.25; Mon, 14 Mar
 2022 17:35:15 +0000
Received: from DB5EUR03FT039.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:4:b7:cafe::99) by DB6PR1001CA0018.outlook.office365.com
 (2603:10a6:4:b7::28) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22 via Frontend
 Transport; Mon, 14 Mar 2022 17:35:15 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT039.mail.protection.outlook.com (10.152.21.120) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Mon, 14 Mar 2022 17:35:15 +0000
Received: ("Tessian outbound 1f399c739551:v113");
 Mon, 14 Mar 2022 17:35:15 +0000
Received: from 64347d83d306.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 093EC78E-DFE6-4DFC-97EE-CBD89DEBD7F4.1; 
 Mon, 14 Mar 2022 17:35:04 +0000
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 64347d83d306.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Mon, 14 Mar 2022 17:35:04 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by VI1PR0801MB2031.eurprd08.prod.outlook.com (2603:10a6:800:8b::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.25; Mon, 14 Mar
 2022 17:34:58 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 17:34:57 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 22663be3-a3bd-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=iJDL7ccx5slMFHnI8wW4Mi3rtx40GYNDx/jcbdVxNkU=;
 b=xuPm7wRn8zSak2pp5vYWG64wl62R6aWIoQtUMtGBTsJkkzbQD2cnfh9r4/m4gjvMRwdiPk8orr/u+KnTWvPJClxttRLqHX2YLXAHABj1gbE5h5u8nxfItIeA7YRwt2uEvOOPlEyleDQSXrGhQb9iDCFMo56EZcyo/Y93ulcnkrM=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 63af4ccee43c779c
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=EwRAHQqE0iFWHwInheFEVWatqea7JEt4njNEktvZ1uMYjyIc3Vka5i4uTRKLSmaeCAtD98+HWr6WIrfTKOZJE6cn0/P4/KcIiyxoLu45bygC+R2vlCvy2yjHcpFqR4iidADVsRXAyLGNTajO747C6CfTB4tMLwffLmZfNrzKU28dP2HbYdDo0vtn810SZIoOWuMIKJhNMTHCmqhMvAsYy+2pO4v1AtD03GZC7RQ1SAgCL+07Odqw7wl3LZtQx+Ut8zldwzaIdvXi1ohH+Vq/76cBY4CsJgHA3YGjSDabfbLMwkNLL/W8lggZhs+ETUCS+xzWIMOx/M7NCHj7pvnDsw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=iJDL7ccx5slMFHnI8wW4Mi3rtx40GYNDx/jcbdVxNkU=;
 b=PZtgxOtFGEuvrK/cNiHDsI0EveGoeVHX3epP+TlnvLhTqEl0RO/aPdnZkdmLadtcrkcp+HD7FNBU4mH5RoIZcnD7ho/GrwtTIgcRUaMChHUJcuju9Wg0JVvuGuTGiRcwxGTz6laiGTvDkTU/e0QQKV5wt0duzJoCdtgQof4mILKwLFz2AI3v6ukfdFVsSQoRTxpXVV+PC6Xmb14z9P+4AyA/O9Cq8xqtRTofKnfTAltsPacTbtNgRUSyjuvoxMOR2RMCuP6d77tTAQW4rwAJta3AN2feecF2u6C5hv+2zg9etvbNsBsdDCqATL5h5TzB8+j8hVFDwHHF2x6DE3ST3A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=iJDL7ccx5slMFHnI8wW4Mi3rtx40GYNDx/jcbdVxNkU=;
 b=xuPm7wRn8zSak2pp5vYWG64wl62R6aWIoQtUMtGBTsJkkzbQD2cnfh9r4/m4gjvMRwdiPk8orr/u+KnTWvPJClxttRLqHX2YLXAHABj1gbE5h5u8nxfItIeA7YRwt2uEvOOPlEyleDQSXrGhQb9iDCFMo56EZcyo/Y93ulcnkrM=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Vikram Garhwal <fnu.vikram@xilinx.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, "sstabellini@kernel.org"
	<sstabellini@kernel.org>, "julien@xen.org" <julien@xen.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, "volodymyr_babchuk@epam.com"
	<volodymyr_babchuk@epam.com>
Subject: Re: [XEN][RFC PATCH v3 08/14] xen/iommu: protect
 iommu_add_dt_device() with dtdevs_lock
Thread-Topic: [XEN][RFC PATCH v3 08/14] xen/iommu: protect
 iommu_add_dt_device() with dtdevs_lock
Thread-Index: AQHYMyVll+vC1BXMkUCqASVymvvkmKy/LVYA
Date: Mon, 14 Mar 2022 17:34:55 +0000
Message-ID: <5A6431AB-E5AB-48BB-9C5D-6098FC5392B9@arm.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
 <20220308194704.14061-9-fnu.vikram@xilinx.com>
In-Reply-To: <20220308194704.14061-9-fnu.vikram@xilinx.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: e599d783-c84e-4681-4f15-08da05e1002e
x-ms-traffictypediagnostic:
	VI1PR0801MB2031:EE_|DB5EUR03FT039:EE_|AM0PR08MB4483:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR08MB44837E8518DF26138C820DADE40F9@AM0PR08MB4483.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(6506007)(91956017)(53546011)(66946007)(5660300002)(2906002)(38070700005)(508600001)(8936002)(36756003)(76116006)(66446008)(64756008)(66476007)(66556008)(2616005)(38100700002)(26005)(83380400001)(186003)(316002)(122000001)(8676002)(54906003)(86362001)(6486002)(33656002)(4326008)(71200400001)(6512007)(6916009)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <C8C27670A242A64F9F82897FC3BB3E48@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB2031
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT039.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	5c8a7b87-2e69-4a87-9c6f-08da05e0f54b
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(2616005)(107886003)(6506007)(53546011)(336012)(81166007)(6512007)(356005)(86362001)(26005)(47076005)(83380400001)(186003)(36860700001)(6862004)(4326008)(8936002)(8676002)(5660300002)(70206006)(70586007)(82310400004)(36756003)(2906002)(33656002)(508600001)(6486002)(40460700003)(316002)(54906003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 17:35:15.5161
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: e599d783-c84e-4681-4f15-08da05e1002e
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT039.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB4483



> On 8 Mar 2022, at 19:46, Vikram Garhwal <fnu.vikram@xilinx.com> wrote:
>=20
> Protect iommu_add_dt_device() with dtdevs_lock to prevent concurrent acce=
ss add.
>=20
> Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com>

Reviewed-by: Luca Fancellu <luca.fancellu@arm.com>

> ---
> xen/drivers/passthrough/device_tree.c | 9 ++++++++-
> 1 file changed, 8 insertions(+), 1 deletion(-)
>=20
> diff --git a/xen/drivers/passthrough/device_tree.c b/xen/drivers/passthro=
ugh/device_tree.c
> index b3b04f8e03..776809a8f2 100644
> --- a/xen/drivers/passthrough/device_tree.c
> +++ b/xen/drivers/passthrough/device_tree.c
> @@ -145,6 +145,8 @@ int iommu_add_dt_device(struct dt_device_node *np)
>     if ( dev_iommu_fwspec_get(dev) )
>         return 0;
>=20
> +    spin_lock(&dtdevs_lock);
> +
>     /*
>      * According to the Documentation/devicetree/bindings/iommu/iommu.txt
>      * from Linux.
> @@ -157,7 +159,10 @@ int iommu_add_dt_device(struct dt_device_node *np)
>          * these callback implemented.
>          */
>         if ( !ops->add_device || !ops->dt_xlate )
> -            return -EINVAL;
> +        {
> +            rc =3D -EINVAL;
> +            goto fail;
> +        }
>=20
>         if ( !dt_device_is_available(iommu_spec.np) )
>             break;
> @@ -188,6 +193,8 @@ int iommu_add_dt_device(struct dt_device_node *np)
>     if ( rc < 0 )
>         iommu_fwspec_free(dev);
>=20
> +fail:
> +    spin_unlock(&dtdevs_lock);
>     return rc;
> }
>=20
>=20



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 17:39:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 17:39:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290390.492446 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTofg-0003N6-GB; Mon, 14 Mar 2022 17:39:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290390.492446; Mon, 14 Mar 2022 17:39:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTofg-0003Mz-D7; Mon, 14 Mar 2022 17:39:52 +0000
Received: by outflank-mailman (input) for mailman id 290390;
 Mon, 14 Mar 2022 17:39:51 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=hER8=TZ=redhat.com=berrange@srs-se1.protection.inumbo.net>)
 id 1nToff-0003Mt-GN
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 17:39:51 +0000
Received: from us-smtp-delivery-124.mimecast.com
 (us-smtp-delivery-124.mimecast.com [170.10.133.124])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id bf180a91-a3bd-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 18:39:50 +0100 (CET)
Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com
 [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS
 (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 us-mta-614-5i1UFKH3MraiAoloP0STSQ-1; Mon, 14 Mar 2022 13:39:47 -0400
Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.rdu2.redhat.com
 [10.11.54.7])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 6CE36180139E;
 Mon, 14 Mar 2022 17:39:44 +0000 (UTC)
Received: from redhat.com (unknown [10.33.36.154])
 by smtp.corp.redhat.com (Postfix) with ESMTPS id D155F140EBFE;
 Mon, 14 Mar 2022 17:39:32 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: bf180a91-a3bd-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
	s=mimecast20190719; t=1647279589;
	h=from:from:reply-to:reply-to:subject:subject:date:date:
	 message-id:message-id:to:to:cc:cc:mime-version:mime-version:
	 content-type:content-type:in-reply-to:in-reply-to:  references:references;
	bh=FuV+LXYAzCN8GlqarfyjrOMJEbdlSdj/IkmrSiaMB84=;
	b=El1/ONl2inauvOAIAvIeGtqHlhujr6thnWgq4rqNVIhQ/xPECvvhCYjnt0x++mzPqKXKbq
	Ovg13P+U0zEtL1nURITgDKHjdaTpB6puPUlOb1grUspKzz9oN7Z+acVf7LtSQL2Oz5YTQ2
	2ojURgn+LjNdOkd86+8fHnb8/SmOlBk=
X-MC-Unique: 5i1UFKH3MraiAoloP0STSQ-1
Date: Mon, 14 Mar 2022 17:39:30 +0000
From: Daniel =?utf-8?B?UC4gQmVycmFuZ8Op?= <berrange@redhat.com>
To: Markus Armbruster <armbru@redhat.com>
Cc: Peter Maydell <peter.maydell@linaro.org>, qemu-devel@nongnu.org,
	Paolo Bonzini <pbonzini@redhat.com>,
	Richard Henderson <richard.henderson@linaro.org>,
	Gerd Hoffmann <kraxel@redhat.com>,
	Christian Schoenebeck <qemu_oss@crudebyte.com>,
	"Gonglei (Arei)" <arei.gonglei@huawei.com>,
	=?utf-8?Q?Marc-Andr=C3=A9?= Lureau <marcandre.lureau@redhat.com>,
	"Michael S. Tsirkin" <mst@redhat.com>,
	Igor Mammedov <imammedo@redhat.com>, Ani Sinha <ani@anisinha.ca>,
	Laurent Vivier <lvivier@redhat.com>, Amit Shah <amit@kernel.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Anthony Perard <anthony.perard@citrix.com>,
	Paul Durrant <paul@xen.org>,
	=?utf-8?B?SGVydsOp?= Poussineau <hpoussin@reactos.org>,
	Aleksandar Rikalo <aleksandar.rikalo@syrmia.com>,
	Corey Minyard <cminyard@mvista.com>,
	Patrick Venture <venture@google.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Peter Xu <peterx@redhat.com>, Jason Wang <jasowang@redhat.com>,
	=?utf-8?Q?C=C3=A9dric?= Le Goater <clg@kaod.org>,
	Daniel Henrique Barboza <danielhb413@gmail.com>,
	David Gibson <david@gibson.dropbear.id.au>,
	Greg Kurz <groug@kaod.org>,
	Philippe =?utf-8?Q?Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Jean-Christophe Dubois <jcd@tribudubois.net>,
	Keith Busch <kbusch@kernel.org>, Klaus Jensen <its@irrelevant.dk>,
	Yuval Shaia <yuval.shaia.ml@gmail.com>,
	Yoshinori Sato <ysato@users.sourceforge.jp>,
	Magnus Damm <magnus.damm@gmail.com>,
	Fabien Chouteau <chouteau@adacore.com>,
	KONRAD Frederic <frederic.konrad@adacore.com>,
	Mark Cave-Ayland <mark.cave-ayland@ilande.co.uk>,
	Artyom Tarasenko <atar4qemu@gmail.com>,
	Alex Williamson <alex.williamson@redhat.com>,
	Eric Auger <eric.auger@redhat.com>,
	Max Filippov <jcmvbkbc@gmail.com>,
	Juan Quintela <quintela@redhat.com>,
	"Dr. David Alan Gilbert" <dgilbert@redhat.com>,
	Konstantin Kostiuk <kkostiuk@redhat.com>,
	Michael Roth <michael.roth@amd.com>,
	Pavel Dovgalyuk <Pavel.Dovgaluk@ispras.ru>,
	Alex =?utf-8?Q?Benn=C3=A9e?= <alex.bennee@linaro.org>,
	David Hildenbrand <david@redhat.com>,
	Wenchao Wang <wenchao.wang@intel.com>,
	Kamil Rytarowski <kamil@netbsd.org>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Cornelia Huck <cohuck@redhat.com>, Thomas Huth <thuth@redhat.com>,
	Eric Blake <eblake@redhat.com>,
	Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>,
	John Snow <jsnow@redhat.com>, kvm@vger.kernel.org,
	qemu-arm@nongnu.org, xen-devel@lists.xenproject.org,
	qemu-ppc@nongnu.org, qemu-block@nongnu.org, haxm-team@intel.com,
	qemu-s390x@nongnu.org
Subject: Re: [PATCH 3/3] Use g_new() & friends where that makes obvious sense
Message-ID: <Yi990ucCF/ZWeDbU@redhat.com>
Reply-To: Daniel =?utf-8?B?UC4gQmVycmFuZ8Op?= <berrange@redhat.com>
References: <20220314160108.1440470-1-armbru@redhat.com>
 <20220314160108.1440470-4-armbru@redhat.com>
 <CAFEAcA8Tb7e+mJGaietc5si7_xZWxbTixcTSvNpB9wH_LQJ7kQ@mail.gmail.com>
 <87k0cwqxwv.fsf@pond.sub.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <87k0cwqxwv.fsf@pond.sub.org>
User-Agent: Mutt/2.1.5 (2021-12-30)
X-Scanned-By: MIMEDefang 2.85 on 10.11.54.7

On Mon, Mar 14, 2022 at 05:52:32PM +0100, Markus Armbruster wrote:
> Peter Maydell <peter.maydell@linaro.org> writes:
> 
> > On Mon, 14 Mar 2022 at 16:01, Markus Armbruster <armbru@redhat.com> wrote:
> >>
> >> g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
> >> for two reasons.  One, it catches multiplication overflowing size_t.
> >> Two, it returns T * rather than void *, which lets the compiler catch
> >> more type errors.
> >>
> >> This commit only touches allocations with size arguments of the form
> >> sizeof(T).
> >>
> >> Patch created mechanically with:
> >>
> >>     $ spatch --in-place --sp-file scripts/coccinelle/use-g_new-etc.cocci \
> >>              --macro-file scripts/cocci-macro-file.h FILES...
> >>
> >> Signed-off-by: Markus Armbruster <armbru@redhat.com>
> >> ---
> >
> >>  104 files changed, 197 insertions(+), 202 deletions(-)
> >
> > I'm not going to say you must split this patch up. I'm just going to
> > say that I personally am not looking at it, because it's too big
> > for me to deal with.
> 
> As with all big but trivial Coccinelle patches, reviewing the Coccinelle
> script and a reasonably representative sample of its output is almost
> certainly a better use of reviewer time than attempting to get all the
> patches reviewed.  They are mind-numbingly dull!
> 
> For what it's worth, we've used this script several times before.  Last
> in commit bdd81addf4.

This Coccinelle is simple enough to understand, that I'd suggest that
once we merge the Coccinelle script itself, then for ongoing usage,
its output can be considered effectively pre-reviewed.

The reviewer can just re-run the Coccinelle script themselves to prove
it has the same output as the submitter claims, to validate no manual
changes are hidden in the middle of the automated patch.

Regards,
Daniel
-- 
|: https://berrange.com      -o-    https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org         -o-            https://fstop138.berrange.com :|
|: https://entangle-photo.org    -o-    https://www.instagram.com/dberrange :|



From xen-devel-bounces@lists.xenproject.org Mon Mar 14 17:50:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 17:50:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290398.492457 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTopw-0005l0-Lq; Mon, 14 Mar 2022 17:50:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290398.492457; Mon, 14 Mar 2022 17:50:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTopw-0005kt-Ic; Mon, 14 Mar 2022 17:50:28 +0000
Received: by outflank-mailman (input) for mailman id 290398;
 Mon, 14 Mar 2022 17:50:26 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=J1jB=TZ=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nTopu-0005kn-Ix
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 17:50:26 +0000
Received: from EUR01-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur01on0622.outbound.protection.outlook.com
 [2a01:111:f400:fe1f::622])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 39f3299c-a3bf-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 18:50:25 +0100 (CET)
Received: from AM7PR03CA0013.eurprd03.prod.outlook.com (2603:10a6:20b:130::23)
 by AM6PR08MB4149.eurprd08.prod.outlook.com (2603:10a6:20b:b0::27)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26; Mon, 14 Mar
 2022 17:50:17 +0000
Received: from VE1EUR03FT014.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:130:cafe::14) by AM7PR03CA0013.outlook.office365.com
 (2603:10a6:20b:130::23) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26 via Frontend
 Transport; Mon, 14 Mar 2022 17:50:16 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT014.mail.protection.outlook.com (10.152.19.38) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Mon, 14 Mar 2022 17:50:16 +0000
Received: ("Tessian outbound 18e50a6f0513:v113");
 Mon, 14 Mar 2022 17:50:15 +0000
Received: from aab43fb04fd5.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 8CDCF891-5CFE-499A-85F1-9F5DCDF2CABF.1; 
 Mon, 14 Mar 2022 17:50:09 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id aab43fb04fd5.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Mon, 14 Mar 2022 17:50:09 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by DBBPR08MB4821.eurprd08.prod.outlook.com (2603:10a6:10:d5::22) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.25; Mon, 14 Mar
 2022 17:50:07 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 17:50:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 39f3299c-a3bf-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=xiG+/a6mvwD6GubzpusYumkwSGLXGuQwmI4TO6kbxUY=;
 b=wxoimGHJZldPMufcVGeEep+EGiU92LKeljJuipvO5I04++9lpWY7mTzbROp5yguXeYbm7ZiMxlhwCp3Qd/NAX4k56SKZeVnkLs6ouhy+W3nu1vy7dVT6P7mXpF+S1tXm4XwwZ4ddGiq4uaBZ7upghuPziuZFeQK4lXa5Lr6VaHk=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: cd5e977986559a17
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=JVv1wg57utP8vH/2pxROAY3hK+PdBK4AbqiRyqQtEC9G/AuZRDg9AaLNWI4F6bfx8FMS3GtYd/LBy1p5f5UkxqL99zyjElCW0mG/gtqdemjC47Mi0metAggEY25fyJKHGuyr+gf2Pd9eOWWef7viFqOkBwV3cGJ4ujmNZ7jdZmd7dIZaKMgqhONO3EjA9CyRVbzwPb7ZOHfYc/CkFc9OLb43Sgi7Alnf/22aKbqkz3mWGIXfn6F3rLHlonb2pJTgQvYwKNIcD1wdu+PrjTice/tsg2OXGFDBhmo5+1sGUD3HAMvqgol3CqzKy3VLiI26L9U7o5KJd15EZuytqOjQOQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=xiG+/a6mvwD6GubzpusYumkwSGLXGuQwmI4TO6kbxUY=;
 b=eTfVB9ifjLvugLr2TRIeqlKUs4awO7mRLAkE05IVMbteoYhstD87sgjHPzTnOG+GzcNc2e7vXogrx1J7KtlMAClH0pdCC2GlAgYxW1XxtGB4IwQ+W6iEoGlcHfETnMCrqbsfEhq+vWcS3wMfUl+0tZfR3x2YD4BbmGOZKX2X6yE/GAvK0Kq1MYcd8N9MiF18/wQjjMLeUd49dCBz733Tp9x7Q4EU2pNbKdbT9rE0MEX03nHCnjAdeTWzZ6CClXgXHlE4YAoMDFqbe6CsuOmAT9Smni/0CUBo7HKr7fJhsAa5lz7ZCNVM9iQtUG2NEP1govtG4G53vQ0wYDeJx2YrGw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=xiG+/a6mvwD6GubzpusYumkwSGLXGuQwmI4TO6kbxUY=;
 b=wxoimGHJZldPMufcVGeEep+EGiU92LKeljJuipvO5I04++9lpWY7mTzbROp5yguXeYbm7ZiMxlhwCp3Qd/NAX4k56SKZeVnkLs6ouhy+W3nu1vy7dVT6P7mXpF+S1tXm4XwwZ4ddGiq4uaBZ7upghuPziuZFeQK4lXa5Lr6VaHk=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Vikram Garhwal <fnu.vikram@xilinx.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, "sstabellini@kernel.org"
	<sstabellini@kernel.org>, "julien@xen.org" <julien@xen.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, "volodymyr_babchuk@epam.com"
	<volodymyr_babchuk@epam.com>, Jan Beulich <jbeulich@suse.com>, Paul Durrant
	<paul@xen.org>
Subject: Re: [XEN][RFC PATCH v3 09/14] xen/iommu: Introduce
 iommu_remove_dt_device()
Thread-Topic: [XEN][RFC PATCH v3 09/14] xen/iommu: Introduce
 iommu_remove_dt_device()
Thread-Index: AQHYMyV0f/eLDa9bQkuzPbuk19t2X6y/MZYA
Date: Mon, 14 Mar 2022 17:50:07 +0000
Message-ID: <996B7C26-0D15-40FC-BE58-84B4A1F51A62@arm.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
 <20220308194704.14061-10-fnu.vikram@xilinx.com>
In-Reply-To: <20220308194704.14061-10-fnu.vikram@xilinx.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: bdf15f30-ed92-4c14-6af1-08da05e3191c
x-ms-traffictypediagnostic:
	DBBPR08MB4821:EE_|VE1EUR03FT014:EE_|AM6PR08MB4149:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR08MB4149E71C85A5ED94E4205F2CE40F9@AM6PR08MB4149.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(2616005)(508600001)(186003)(26005)(6486002)(6512007)(6506007)(71200400001)(33656002)(122000001)(38070700005)(38100700002)(86362001)(8936002)(4326008)(8676002)(64756008)(66946007)(66446008)(66476007)(66556008)(83380400001)(2906002)(91956017)(36756003)(54906003)(76116006)(316002)(6916009)(5660300002)(4744005)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <20A3933821160245B389E8BFAAC43BBA@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB4821
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT014.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	e7a9f19e-334a-4c54-654a-08da05e31406
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	UPeCzRZW/3QdG9nX+Ca7NRBwKOMbIkbFpqchTpRCziUaMWVZOTZhbMdgS4UtUh3eqzUlvlhGG8NtYX7ixNCB7bB8rA6GdAq/Xg1tJWE0g7sllDbeulapkCtNKko2ts57I/zyDS+kkoOlSt899PI6tYyYJgWU6YEsfTflCTQm4zUr4gBQ+5WY1Mx37sPPguzfTGHEJftB0IXdJx2jVGWHQ3zgGVYh8a2eVs4WP1THiSYKcTFFFtEFnyKtpZrivHhYzvgxgriVvxJHdXiBb1NSBbfLxBReWDCDavpwK+SMHLkpUqBlze2Y+qUBdNPDo/DKeJfUH9EclYd2Zp5TDaFaePBdf+iyFuTpD8ipbaxhmVCaTstMhjfkp2gyNvND3ilyvxWtO8j40/9OfuqHFPZVGnrGJ6cSQfRvIt5E154Bd9/n+pkA888Wbg3WZcV3ic9bJv/ftEhvPTCgk04ED9hdV35PbfciQhD2SWfbqNr4gl47Krmzd+qX/nclwS3KWCFdgj4pyxz7hmehpIlRdFPKGPMsC+OZbzYcsrSpSKCK1YNfscjs6DJyojGmu4Geu17+swodYtigzlfuQSX++jWmW4IML/fqlo/SwtZd2FKF2LEk64nXBKD8ylojxTwUUGxRY9VG0v+Ox4mWJNxX9K5DxZr+3sTsnhTsmz7fdqpbJQoM9zHRU4e2zBPU3katwLEs
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(4326008)(8676002)(6862004)(81166007)(356005)(40460700003)(186003)(83380400001)(86362001)(2616005)(6512007)(6506007)(47076005)(26005)(336012)(36756003)(70586007)(70206006)(508600001)(82310400004)(316002)(54906003)(36860700001)(33656002)(8936002)(6486002)(4744005)(5660300002)(2906002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 17:50:16.2260
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: bdf15f30-ed92-4c14-6af1-08da05e3191c
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT014.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4149
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From xen-devel-bounces@lists.xenproject.org Mon Mar 14 17:51:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 17:51:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290402.492468 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nToqx-0006KL-WF; Mon, 14 Mar 2022 17:51:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290402.492468; Mon, 14 Mar 2022 17:51:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nToqx-0006KE-TC; Mon, 14 Mar 2022 17:51:31 +0000
Received: by outflank-mailman (input) for mailman id 290402;
 Mon, 14 Mar 2022 17:51:31 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nToqx-0006K4-3n
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 17:51:31 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nToqw-0001TH-PF; Mon, 14 Mar 2022 17:51:30 +0000
Received: from 54-240-197-227.amazon.com ([54.240.197.227]
 helo=[10.95.108.113]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nToqw-0007Xn-Cw; Mon, 14 Mar 2022 17:51:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=rIHRv8j7t8+DZwbL0NTRlq8iORU869D1M/ZXmw4LRxM=; b=jyyjIIZXVUCtH6MI7r/5E70Jti
	IlP0FLUGEOrkYCGsOWmGmjXx/QarCZA0+rd9N3ix3/HrNzsWdG4yHgkhNrRvrcsihNlkzgVAymYH5
	/fACkp0c4BtRruD1fZe7BDNA60zEVPQ9yNKwqBXMPA1+3igwgEs3eqbWiXLphOgfvmkE=;
Message-ID: <62ef9311-6cca-9679-b818-5ba6256d49d6@xen.org>
Date: Mon, 14 Mar 2022 17:51:28 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH] Arm: arrange to have linker script honor dependencies
 (again)
To: Jan Beulich <jbeulich@suse.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Volodymyr Babchuk <volodymyr_babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>
References: <5c39e5c3-6e9e-e009-177b-495d80b6ea62@suse.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <5c39e5c3-6e9e-e009-177b-495d80b6ea62@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Jan,

On 14/03/2022 17:16, Jan Beulich wrote:
> The if_changed macro leads to dependencies being recorded in .*.d, which
> aren't loaded anymore. Use if_changed_dep instead, like x86 does.
> 
> Fixes: 06ef696c85a7 ("build: introduce if_changed_deps")
> Signed-off-by: Jan Beulich <jbeulich@suse.com>

Acked-by: Julien Grall <jgrall@amazon.com>

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 18:07:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 18:07:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290406.492478 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTp65-00085M-9O; Mon, 14 Mar 2022 18:07:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290406.492478; Mon, 14 Mar 2022 18:07:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTp65-00085F-6S; Mon, 14 Mar 2022 18:07:09 +0000
Received: by outflank-mailman (input) for mailman id 290406;
 Mon, 14 Mar 2022 18:07:07 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nTp63-000859-RB
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 18:07:07 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nTp63-0001pd-AJ; Mon, 14 Mar 2022 18:07:07 +0000
Received: from 54-240-197-227.amazon.com ([54.240.197.227]
 helo=[10.95.108.113]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nTp63-0000DC-2T; Mon, 14 Mar 2022 18:07:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=B7ksyr2oyt7YIOrTBBmeo4nDaJpGUzRTiU9BA15K3FQ=; b=iUlZ/3EKQO2u/Ye1bXaTx/RLWt
	fxQstmA3qjZiDMJcm+MyxM5/0Zqk/E8ChBxTAcVtGdN8m+tnIXFEvF/6p3znT7yOcaGtq+9DVv1Vu
	r9OwY5xXTrQG4q4hG4vxZjRjLFUZXPk1rf7qNa1hFvvVyd+RYKTuE1VswJ3yaBI+Yzkk=;
Message-ID: <10ce8bd9-68c1-19df-8f62-3918c5a2ce2e@xen.org>
Date: Mon, 14 Mar 2022 18:07:04 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [XEN v10 0/4] xen/arm64: io: Decode ldr/str post-indexing
 instruction
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>,
 xen-devel@lists.xenproject.org
Cc: sstabellini@kernel.org, stefanos@xilinx.com, Volodymyr_Babchuk@epam.com,
 bertrand.marquis@arm.com, andrew.cooper3@citrix.com,
 george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org,
 roger.pau@citrix.com, Ayan Kumar Halder <ayankuma@xilinx.com>
References: <20220310174501.62040-1-ayankuma@xilinx.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220310174501.62040-1-ayankuma@xilinx.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

On 10/03/2022 17:44, Ayan Kumar Halder wrote:
> Hi All,

Hi Ayan,

Thank you for your contribution.

> Ayan Kumar Halder (4):
>    xen/arm64: Decode ldr/str post increment operations
>    xen/arm64: io: Support instructions (for which ISS is not valid) on
>      emulated MMIO region using MMIO/ioreq handler
>    xen/arm64: io: Handle the abort due to access to stage1 translation
>      table

I have committed the first 3 patches. Patch #4 requires more discussion.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 18:12:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 18:12:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290413.492502 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTpB3-0001Ka-2M; Mon, 14 Mar 2022 18:12:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290413.492502; Mon, 14 Mar 2022 18:12:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTpB2-0001KT-UN; Mon, 14 Mar 2022 18:12:16 +0000
Received: by outflank-mailman (input) for mailman id 290413;
 Mon, 14 Mar 2022 18:12:15 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=OavK=TZ=apertussolutions.com=dpsmith@srs-se1.protection.inumbo.net>)
 id 1nTpB1-0001KM-MM
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 18:12:15 +0000
Received: from sender4-of-o51.zoho.com (sender4-of-o51.zoho.com
 [136.143.188.51]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4500d762-a3c2-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 19:12:13 +0100 (CET)
Received: from [10.10.1.138] (static-72-81-132-2.bltmmd.fios.verizon.net
 [72.81.132.2]) by mx.zohomail.com
 with SMTPS id 1647281529709100.52692257812805;
 Mon, 14 Mar 2022 11:12:09 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4500d762-a3c2-11ec-853b-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; t=1647281530; cv=none; 
	d=zohomail.com; s=zohoarc; 
	b=L4hJLxPaAYjiLSt3Iyen65FwVa7iYIIefs0/8hjMPC+KYXfsThtg2tBnRs4KoMzF+Klfd3H4mZ7Pwm+AdE2zrc7fvTijJGnRvb2DsEmrk1W9lFXxKXwGvlsOjn0+zO2/4ThKnaYM2BggOKbpgBf7unYs6mIDv8NfiMNiuZi7S2Q=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; 
	t=1647281530; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; 
	bh=SPQMz7Zv6+r0nf9UUfJhgeNkOosKuGtugZznTP1PR0g=; 
	b=jif2lTy9KsZtNHY+njgHgXAru/hm7sW5fvWWjuQtyfRo1weGu6f5mMsf9SLm40fepVKRfo31FiT+nzITYkbL+g2nF0UOuh86PKR9QUyeK0gFFSYZ9kQ1pC+yPz05JHbhCTMpWvw7Un8pApppWm1nqueLWX6T5iRcW+w7R/L+e40=
ARC-Authentication-Results: i=1; mx.zohomail.com;
	dkim=pass  header.i=apertussolutions.com;
	spf=pass  smtp.mailfrom=dpsmith@apertussolutions.com;
	dmarc=pass header.from=<dpsmith@apertussolutions.com>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1647281530;
	s=zoho; d=apertussolutions.com; i=dpsmith@apertussolutions.com;
	h=Message-ID:Date:MIME-Version:Subject:Subject:To:To:Cc:Cc:References:From:From:In-Reply-To:Content-Type:Content-Transfer-Encoding:Message-Id:Reply-To;
	bh=SPQMz7Zv6+r0nf9UUfJhgeNkOosKuGtugZznTP1PR0g=;
	b=DYpvj8TeE8tiSI8FM+QTMglH6jQW44C/OIJT3i/jA7Kv/9OyV76Va2rgaTjinmgz
	HOPhspQeNX1QF8wO+p4beLh/D6JsoI1VUYfTFPjn/i6kGiQLUsWVTcdS1Q56d9hAKTr
	n9oUU7TIzPA2Xa7X87BIH5O5pYLNKcDDmvkZyPik=
Message-ID: <33fdcbae-e083-ce1d-a5c8-d89e8ecbfddd@apertussolutions.com>
Date: Mon, 14 Mar 2022 13:25:04 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v4 11/11] xen/x86: remove cf_check attribute from
 hypercall handlers
Content-Language: en-US
To: Juergen Gross <jgross@suse.com>, xen-devel@lists.xenproject.org
Cc: Jan Beulich <jbeulich@suse.com>, Andrew Cooper
 <andrew.cooper3@citrix.com>, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?=
 <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Christopher Clark <christopher.w.clark@gmail.com>,
 Dario Faggioli <dfaggioli@suse.com>, Daniel De Graaf <dgdegra@tycho.nsa.gov>
References: <20220310073420.15622-1-jgross@suse.com>
 <20220310073420.15622-12-jgross@suse.com>
From: "Daniel P. Smith" <dpsmith@apertussolutions.com>
In-Reply-To: <20220310073420.15622-12-jgross@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ZohoMailClient: External

On 3/10/22 02:34, Juergen Gross wrote:
> Now that the hypercall handlers are all being called directly instead
> through a function vector, the "cf_check" attribute can be removed.
> 
> Signed-off-by: Juergen Gross <jgross@suse.com>
> ---
> V4:
> - new patch
> ---
>  xen/arch/x86/compat.c               |  6 +++---
>  xen/arch/x86/cpu/mcheck/mce.c       |  2 +-
>  xen/arch/x86/cpu/vpmu.c             |  2 +-
>  xen/arch/x86/domain.c               |  3 +--
>  xen/arch/x86/hvm/dm.c               |  2 +-
>  xen/arch/x86/hvm/hvm.c              |  2 +-
>  xen/arch/x86/hvm/hypercall.c        |  6 +++---
>  xen/arch/x86/mm.c                   | 12 ++++++------
>  xen/arch/x86/mm/paging.c            |  2 +-
>  xen/arch/x86/physdev.c              |  2 +-
>  xen/arch/x86/platform_hypercall.c   |  2 +-
>  xen/arch/x86/pv/callback.c          | 16 ++++++++--------
>  xen/arch/x86/pv/descriptor-tables.c |  8 ++++----
>  xen/arch/x86/pv/iret.c              |  4 ++--
>  xen/arch/x86/pv/misc-hypercalls.c   | 10 +++++-----
>  xen/arch/x86/pv/shim.c              |  4 ++--
>  xen/arch/x86/x86_64/compat/mm.c     |  2 +-
>  xen/common/argo.c                   |  4 ++--
>  xen/common/compat/grant_table.c     |  2 +-
>  xen/common/compat/kernel.c          |  2 +-
>  xen/common/compat/memory.c          |  3 +--
>  xen/common/dm.c                     |  2 +-
>  xen/common/domain.c                 |  2 +-
>  xen/common/domctl.c                 |  2 +-
>  xen/common/event_channel.c          |  2 +-
>  xen/common/grant_table.c            |  3 +--
>  xen/common/hypfs.c                  |  2 +-
>  xen/common/kernel.c                 |  2 +-
>  xen/common/kexec.c                  |  4 ++--
>  xen/common/memory.c                 |  2 +-
>  xen/common/multicall.c              |  3 +--
>  xen/common/sched/compat.c           |  2 +-
>  xen/common/sched/core.c             |  4 ++--
>  xen/common/sysctl.c                 |  2 +-
>  xen/common/xenoprof.c               |  2 +-
>  xen/drivers/char/console.c          |  2 +-
>  xen/scripts/gen_hypercall.awk       |  2 +-
>  xen/xsm/xsm_core.c                  |  4 ++--
>  38 files changed, 67 insertions(+), 71 deletions(-)
>

<snip/>

> diff --git a/xen/xsm/xsm_core.c b/xen/xsm/xsm_core.c
> index 2286a502e3..eaa028109b 100644
> --- a/xen/xsm/xsm_core.c
> +++ b/xen/xsm/xsm_core.c
> @@ -219,13 +219,13 @@ bool __init has_xsm_magic(paddr_t start)
>  
>  #endif
>  
> -long cf_check do_xsm_op(XEN_GUEST_HANDLE_PARAM(void) op)
> +long do_xsm_op(XEN_GUEST_HANDLE_PARAM(void) op)
>  {
>      return xsm_do_xsm_op(op);
>  }
>  
>  #ifdef CONFIG_COMPAT
> -int cf_check compat_xsm_op(XEN_GUEST_HANDLE_PARAM(void) op)
> +int compat_xsm_op(XEN_GUEST_HANDLE_PARAM(void) op)
>  {
>      return xsm_do_compat_op(op);
>  }

Reviewed-by: Daniel P. Smith <dpsmith@apertussolutions.com>


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 19:00:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 19:00:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290422.492512 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTpvB-0006DP-Pj; Mon, 14 Mar 2022 18:59:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290422.492512; Mon, 14 Mar 2022 18:59:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTpvB-0006DI-Md; Mon, 14 Mar 2022 18:59:57 +0000
Received: by outflank-mailman (input) for mailman id 290422;
 Mon, 14 Mar 2022 18:59:56 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nTpvA-0006DC-9Q
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 18:59:56 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nTpv9-0002iE-7e; Mon, 14 Mar 2022 18:59:55 +0000
Received: from 54-240-197-227.amazon.com ([54.240.197.227]
 helo=[10.95.108.113]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nTpv9-0003Yt-11; Mon, 14 Mar 2022 18:59:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=wUMMu6JHKIccap/X+FGwmbytiaOaNrrDZ1ytxXP3zYQ=; b=kCwyB9X+mAloSG/LcdUkBRh7qr
	JXXUK+uiYGXuGy38Fruu4MpZOeiKWUC10QutlhjL9HTSlYDNwT8e5E+lGCCQtb/ubvP9oNncA+RzD
	JFXTfTlEhL/0Z1zZnuMnxXsYCtluv/5+3acGb9BuNLsmw/yWqtpg37ZhchLo6YPJ32sk=;
Message-ID: <e7e38143-8ebe-942c-c85b-20604fdc1470@xen.org>
Date: Mon, 14 Mar 2022 18:59:52 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH 22/36] xen/arch: init cache coloring conf for Xen
To: Marco Solieri <marco.solieri@minervasys.tech>,
 xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>, Luca Miccio <206497@studenti.unimore.it>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-23-marco.solieri@minervasys.tech>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220304174701.1453977-23-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 04/03/2022 17:46, Marco Solieri wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> Add initialization for Xen coloring data. By default, use the lowest
> color index available.
> 
> Benchmarking the VM interrupt response time provides an estimation of
> LLC usage by Xen's most latency-critical runtime task.  Results on Arm
> Cortex-A53 on Xilinx Zynq UltraScale+ XCZU9EG show that one color, which
> reserves 64 KiB of L2, is enough to attain best responsiveness.
> 
> More colors are instead very likely to be needed on processors whose L1
> cache is physically-indexed and physically-tagged, such as Cortex-A57.
> In such cases, coloring applies to L1 also, and there typically are two
> distinct L1-colors. Therefore, reserving only one color for Xen would
> senselessly partitions a cache memory that is already private, i.e.
> underutilize it. The default amount of Xen colors is thus set to one.
> 
> Signed-off-by: Luca Miccio <206497@studenti.unimore.it>
> Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
> ---
>   xen/arch/arm/coloring.c | 31 ++++++++++++++++++++++++++++++-
>   1 file changed, 30 insertions(+), 1 deletion(-)
> 
> diff --git a/xen/arch/arm/coloring.c b/xen/arch/arm/coloring.c
> index d1ac193a80..761414fcd7 100644
> --- a/xen/arch/arm/coloring.c
> +++ b/xen/arch/arm/coloring.c
> @@ -30,10 +30,18 @@
>   #include <asm/coloring.h>
>   #include <asm/io.h>
>   
> +/* By default Xen uses the lowestmost color */
> +#define XEN_COLOR_DEFAULT_MASK 0x0001

You are setting a uint32_t value. So it should be 0x00000001.

But I think it is a bit confusing to define a mask here. Instead, I 
would define the color ID and set the bit.

> +#define XEN_COLOR_DEFAULT_NUM 1
> +/* Current maximum useful colors */
> +#define MAX_XEN_COLOR   128 > +
>   /* Number of color(s) assigned to Xen */
>   static uint32_t xen_col_num;
>   /* Coloring configuration of Xen as bitmask */
>   static uint32_t xen_col_mask[MAX_COLORS_CELLS];
> +/* Xen colors IDs */
> +static uint32_t xen_col_list[MAX_XEN_COLOR];

Why do we need to store xen colors in both a bitmask form and an array 
of color ID?

>   
>   /* Number of color(s) assigned to Dom0 */
>   static uint32_t dom0_col_num;
> @@ -216,7 +224,7 @@ uint32_t get_max_colors(void)
>   
>   bool __init coloring_init(void)
>   {
> -    int i;
> +    int i, rc;
>   
>       printk(XENLOG_INFO "Initialize XEN coloring: \n");
>       /*
> @@ -266,6 +274,27 @@ bool __init coloring_init(void)
>       printk(XENLOG_INFO "Color bits in address: 0x%"PRIx64"\n", addr_col_mask);
>       printk(XENLOG_INFO "Max number of colors: %u\n", max_col_num);
>   
> +    if ( !xen_col_num )
> +    {
> +        xen_col_mask[0] = XEN_COLOR_DEFAULT_MASK;
> +        xen_col_num = XEN_COLOR_DEFAULT_NUM;
> +        printk(XENLOG_WARNING "Xen color configuration not found. Using default\n");
> +    }
> +
> +    printk(XENLOG_INFO "Xen color configuration: 0x%"PRIx32"%"PRIx32"%"PRIx32"%"PRIx32"\n",
> +            xen_col_mask[3], xen_col_mask[2], xen_col_mask[1], xen_col_mask[0]);

You are making the assumption that MAX_COLORS_CELLS is always 4. This 
may be more or worse less. So this should be rework to avoid making any 
assumption on the size.

I expect switching to the generic bitmask will help here.

> +    rc = copy_mask_to_list(xen_col_mask, xen_col_list, xen_col_num);
> +
> +    if ( rc )
> +        return false;
> +
> +    for ( i = 0; i < xen_col_num; i++ )
> +        if ( xen_col_list[i] > (max_col_num - 1) )
> +        {
> +            printk(XENLOG_ERR "ERROR: max. color value not supported\n");
> +            return false;
> +        }
> +
>       return true;
>   }
>   

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 19:22:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 19:22:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290428.492524 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTqGp-0001GZ-Kr; Mon, 14 Mar 2022 19:22:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290428.492524; Mon, 14 Mar 2022 19:22:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTqGp-0001GS-Hs; Mon, 14 Mar 2022 19:22:19 +0000
Received: by outflank-mailman (input) for mailman id 290428;
 Mon, 14 Mar 2022 19:22:18 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=bxqh=TZ=linaro.org=alex.bennee@srs-se1.protection.inumbo.net>)
 id 1nTqGo-0001GM-MA
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 19:22:18 +0000
Received: from mail-ej1-x631.google.com (mail-ej1-x631.google.com
 [2a00:1450:4864:20::631])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 0f80256b-a3cc-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 20:22:17 +0100 (CET)
Received: by mail-ej1-x631.google.com with SMTP id bi12so36373431ejb.3
 for <xen-devel@lists.xenproject.org>; Mon, 14 Mar 2022 12:22:17 -0700 (PDT)
Received: from zen.linaroharston ([51.148.130.216])
 by smtp.gmail.com with ESMTPSA id
 z23-20020a170906435700b006b0e62bee84sm7117295ejm.115.2022.03.14.12.22.15
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Mon, 14 Mar 2022 12:22:15 -0700 (PDT)
Received: from zen (localhost [127.0.0.1])
 by zen.linaroharston (Postfix) with ESMTP id 0921D1FFB7;
 Mon, 14 Mar 2022 19:22:15 +0000 (GMT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0f80256b-a3cc-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=linaro.org; s=google;
        h=references:user-agent:from:to:cc:subject:date:in-reply-to
         :message-id:mime-version:content-transfer-encoding;
        bh=tycv6HJZUTnQM7on2TavcKhNCFhbcZz1vxyWXIQR71o=;
        b=A0oYLouNRVTZ4V9w3HZxOkB6cJW9hiI3hbFyTqQMx9TKG2yR59woJojs96yqxoBIuC
         YUMI4L32csrMTrJ97Quu8vYBMDdCkobHf+Ilop8Mi2A98XMYLmS6xUm59zLvi0olWvPO
         epYH0BSvosR26pLIH2BGasEfulC8lnKJcQI5bMuiy0mk3M9L7uraIExkoDhzQ+YH/Qiu
         wf7HJSEQuk606ZD7pnYWZGLuoUahygOlfF++b9QAxAvINlDfnwldYbX0i0mMsTl+PIPZ
         X4cBbVK210OAe7WBg8X3EeM3L2anNSTnuu/JTD1/Av9oTe1rBpyrU9Wnoq81+J1uK0F+
         fZUw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:references:user-agent:from:to:cc:subject:date
         :in-reply-to:message-id:mime-version:content-transfer-encoding;
        bh=tycv6HJZUTnQM7on2TavcKhNCFhbcZz1vxyWXIQR71o=;
        b=ujHVPLdyfqdQ7M74z5S8kYHneufd0IlFukjnX4LNkFqQIsDqB0Qrbyu4vt/TUt3Pax
         vhfBKyDDcIVQTBsfTwV5xM4bwBqyvqVpBNrzFE5RzWenzGu8tE1NNvfk62/7KgRSLP5G
         sl/NjSYj1lxpPgJXiaqHH/eDzrCMp9PaVfHOsO2AuDplagSu6Py8v81RQF4mkGhCv0EV
         7sRZ3SWr3jVlhyn01+fTWfTv6O50RbwWSpQoj9u0QHgs29mWMg1Qmz82nKY05QfiO2kx
         CblXCDIxLFut2viQtSNecY5GFKOweaXSGgARQSAk5FFYe9CctYXMwlMc6A5+UZ7bdk/j
         yxhg==
X-Gm-Message-State: AOAM533Yo/LofDIGNSSDsLAM3nELsxatjwUH3NMp06IWBW0tcXyG9w5f
	2SrEWx3V9OkHqBg4K2BK1Fa9lg==
X-Google-Smtp-Source: ABdhPJzkkqh2Xbgzr0Voz+O2btuSoaFXnwIpWuwZz7MTY1zqLt/vbXJsWFBor8uL64fKWDLfruKO9g==
X-Received: by 2002:a17:907:3e1d:b0:6d7:1031:7e0 with SMTP id hp29-20020a1709073e1d00b006d7103107e0mr19280967ejc.580.1647285736651;
        Mon, 14 Mar 2022 12:22:16 -0700 (PDT)
References: <20220314160108.1440470-1-armbru@redhat.com>
 <20220314160108.1440470-2-armbru@redhat.com>
User-agent: mu4e 1.7.10; emacs 28.0.92
From: Alex =?utf-8?Q?Benn=C3=A9e?= <alex.bennee@linaro.org>
To: Markus Armbruster <armbru@redhat.com>
Cc: qemu-devel@nongnu.org, Paolo Bonzini <pbonzini@redhat.com>, Richard
 Henderson <richard.henderson@linaro.org>, Gerd Hoffmann
 <kraxel@redhat.com>, Christian Schoenebeck <qemu_oss@crudebyte.com>,
 "Gonglei (Arei)" <arei.gonglei@huawei.com>, =?utf-8?Q?Marc-Andr=C3=A9?=
 Lureau
 <marcandre.lureau@redhat.com>, "Michael S. Tsirkin" <mst@redhat.com>, Igor
 Mammedov <imammedo@redhat.com>, Ani Sinha <ani@anisinha.ca>, Laurent
 Vivier <lvivier@redhat.com>, Amit Shah <amit@kernel.org>, Peter Maydell
 <peter.maydell@linaro.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Anthony Perard <anthony.perard@citrix.com>, Paul Durrant <paul@xen.org>,
 =?utf-8?Q?Herv=C3=A9?= Poussineau <hpoussin@reactos.org>, Aleksandar Rikalo
 <aleksandar.rikalo@syrmia.com>, Corey Minyard <cminyard@mvista.com>,
 Patrick Venture <venture@google.com>, Eduardo Habkost
 <eduardo@habkost.net>, Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
 Peter Xu <peterx@redhat.com>, Jason Wang <jasowang@redhat.com>,
 =?utf-8?Q?C=C3=A9dric?= Le
 Goater <clg@kaod.org>, Daniel Henrique Barboza <danielhb413@gmail.com>,
 David Gibson <david@gibson.dropbear.id.au>, Greg Kurz <groug@kaod.org>,
 Philippe =?utf-8?Q?Mathieu-Daud=C3=A9?= <f4bug@amsat.org>, Jean-Christophe
 Dubois
 <jcd@tribudubois.net>, Keith Busch <kbusch@kernel.org>, Klaus Jensen
 <its@irrelevant.dk>, Yuval Shaia <yuval.shaia.ml@gmail.com>, Yoshinori
 Sato <ysato@users.sourceforge.jp>, Magnus Damm <magnus.damm@gmail.com>,
 Fabien Chouteau <chouteau@adacore.com>, KONRAD Frederic
 <frederic.konrad@adacore.com>, Mark Cave-Ayland
 <mark.cave-ayland@ilande.co.uk>, Artyom Tarasenko <atar4qemu@gmail.com>,
 Alex Williamson <alex.williamson@redhat.com>, Eric Auger
 <eric.auger@redhat.com>, Max Filippov <jcmvbkbc@gmail.com>, Juan Quintela
 <quintela@redhat.com>, "Dr. David Alan Gilbert" <dgilbert@redhat.com>,
 Konstantin Kostiuk <kkostiuk@redhat.com>, Michael Roth
 <michael.roth@amd.com>, =?utf-8?Q?Daniel_P=2E_Berrang=C3=A9?=
 <berrange@redhat.com>, Pavel
 Dovgalyuk <pavel.dovgaluk@ispras.ru>, David Hildenbrand
 <david@redhat.com>, Wenchao Wang <wenchao.wang@intel.com>, Colin Xu
 <colin.xu@intel.com>, Kamil Rytarowski <kamil@netbsd.org>, Reinoud Zandijk
 <reinoud@netbsd.org>, Sunil Muthuswamy <sunilmut@microsoft.com>, Cornelia
 Huck <cohuck@redhat.com>, Thomas Huth <thuth@redhat.com>, Eric Blake
 <eblake@redhat.com>, Vladimir Sementsov-Ogievskiy
 <vsementsov@virtuozzo.com>, John Snow <jsnow@redhat.com>,
 kvm@vger.kernel.org, qemu-arm@nongnu.org, xen-devel@lists.xenproject.org,
 qemu-ppc@nongnu.org, qemu-block@nongnu.org, haxm-team@intel.com,
 qemu-s390x@nongnu.org
Subject: Re: [PATCH 1/3] scripts/coccinelle: New use-g_new-etc.cocci
Date: Mon, 14 Mar 2022 19:22:09 +0000
In-reply-to: <20220314160108.1440470-2-armbru@redhat.com>
Message-ID: <87ilsg5ogp.fsf@linaro.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable


Markus Armbruster <armbru@redhat.com> writes:

> This is the semantic patch from commit b45c03f585 "arm: Use g_new() &
> friends where that makes obvious sense".
>
> Signed-off-by: Markus Armbruster <armbru@redhat.com>

Reviewed-by: Alex Benn=C3=A9e <alex.bennee@linaro.org>

--=20
Alex Benn=C3=A9e


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 19:23:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 19:23:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290431.492534 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTqHh-0001nX-UK; Mon, 14 Mar 2022 19:23:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290431.492534; Mon, 14 Mar 2022 19:23:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTqHh-0001nQ-RR; Mon, 14 Mar 2022 19:23:13 +0000
Received: by outflank-mailman (input) for mailman id 290431;
 Mon, 14 Mar 2022 19:23:12 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=bxqh=TZ=linaro.org=alex.bennee@srs-se1.protection.inumbo.net>)
 id 1nTqHg-0001ms-Qs
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 19:23:12 +0000
Received: from mail-ed1-x534.google.com (mail-ed1-x534.google.com
 [2a00:1450:4864:20::534])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 303c9231-a3cc-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 20:23:12 +0100 (CET)
Received: by mail-ed1-x534.google.com with SMTP id b15so17261696edn.4
 for <xen-devel@lists.xenproject.org>; Mon, 14 Mar 2022 12:23:12 -0700 (PDT)
Received: from zen.linaroharston ([51.148.130.216])
 by smtp.gmail.com with ESMTPSA id
 sa13-20020a1709076d0d00b006ce3ef8e1d4sm7068524ejc.31.2022.03.14.12.23.10
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Mon, 14 Mar 2022 12:23:10 -0700 (PDT)
Received: from zen (localhost [127.0.0.1])
 by zen.linaroharston (Postfix) with ESMTP id 117581FFB7;
 Mon, 14 Mar 2022 19:23:10 +0000 (GMT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 303c9231-a3cc-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=linaro.org; s=google;
        h=references:user-agent:from:to:cc:subject:date:in-reply-to
         :message-id:mime-version:content-transfer-encoding;
        bh=vwsEf23SGv9uU5Z5WKKS3nYhdclo4TxJUctKhcssOgU=;
        b=qvTNjBOvKwjtOKZE7TV+144NPqDHMdIuTMR2L4vLzrDFbF50W8MgId7xWklR7gQ7ee
         m1QhfAaSvZnLn66ax1xooADuhGrNNgCne1BBid6u3Gh0LdRB3DCFqDiSzHPBkvSQU7/1
         ARfBXBv6cFzOjaWh+JerzOI2v5WTvgqMRdwX3XRYHJOQ/bMo0EPsBvdMJlCcZ2qiedRE
         03E/08n9fH/SPMmg8wDKXE3wezITjh0Ku7x2GHRQJxOB28dnC8WtnI6ZBWinc58SZVuy
         SMn1h1Gw/QOgZrbW+ApQnfN+ZY7XwXBwNNPCZU9vR3Re+TkWn2jpxFHrOTbRTUk37cfE
         AgaQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:references:user-agent:from:to:cc:subject:date
         :in-reply-to:message-id:mime-version:content-transfer-encoding;
        bh=vwsEf23SGv9uU5Z5WKKS3nYhdclo4TxJUctKhcssOgU=;
        b=zfGDTR7XxIx7sIi8fQVGQsMwo/8MPScPxvIlaMiKo7r02Nrd6XFLGTIAQk0xn7zTbY
         puqDw8ODQET2t7BP8RR34zA2N9S5++hfDfWcIr2fEmLJ+e1PJoazlhavyDblLYe+4wob
         xj6s4T73e/s9w0J22UejksoEz76Y4Vw1InkIuSw3hkbak6SKNoV4RFCK2zSqxJ+IGGAd
         ygxavWQxM6cxxa91KCwED6oDoi3cOxtr8hWUA2+S7LdScKRZbZfukGr5R//vpozwuF24
         cpOriSy+3Ol5M3CJTaNMUKR5vh11AFvyCF+CE3BauxaBLIeGVz9wcHxAdAeVcbAyWLOH
         Sd+Q==
X-Gm-Message-State: AOAM5314TNyfabEbrPj8HTs4IgkZgpj53EcQcproxeaJ/UlW+gDISJ/C
	CVFSGs7bFNa9XtG0emDVCwNHIw==
X-Google-Smtp-Source: ABdhPJxcq//GLw34w34R/ZbAznfxC0Uo39AL2FcFmtAlAOmZNvx3LMgnwn1d/9NJkypRc95UVUwxTA==
X-Received: by 2002:a05:6402:b42:b0:415:e6e7:65aa with SMTP id bx2-20020a0564020b4200b00415e6e765aamr21292242edb.105.1647285791693;
        Mon, 14 Mar 2022 12:23:11 -0700 (PDT)
References: <20220314160108.1440470-1-armbru@redhat.com>
 <20220314160108.1440470-3-armbru@redhat.com>
User-agent: mu4e 1.7.10; emacs 28.0.92
From: Alex =?utf-8?Q?Benn=C3=A9e?= <alex.bennee@linaro.org>
To: Markus Armbruster <armbru@redhat.com>
Cc: qemu-devel@nongnu.org, Paolo Bonzini <pbonzini@redhat.com>, Richard
 Henderson <richard.henderson@linaro.org>, Gerd Hoffmann
 <kraxel@redhat.com>, Christian Schoenebeck <qemu_oss@crudebyte.com>,
 "Gonglei (Arei)" <arei.gonglei@huawei.com>, =?utf-8?Q?Marc-Andr=C3=A9?=
 Lureau
 <marcandre.lureau@redhat.com>, "Michael S. Tsirkin" <mst@redhat.com>, Igor
 Mammedov <imammedo@redhat.com>, Ani Sinha <ani@anisinha.ca>, Laurent
 Vivier <lvivier@redhat.com>, Amit Shah <amit@kernel.org>, Peter Maydell
 <peter.maydell@linaro.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Anthony Perard <anthony.perard@citrix.com>, Paul Durrant <paul@xen.org>,
 =?utf-8?Q?Herv=C3=A9?= Poussineau <hpoussin@reactos.org>, Aleksandar Rikalo
 <aleksandar.rikalo@syrmia.com>, Corey Minyard <cminyard@mvista.com>,
 Patrick Venture <venture@google.com>, Eduardo Habkost
 <eduardo@habkost.net>, Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
 Peter Xu <peterx@redhat.com>, Jason Wang <jasowang@redhat.com>,
 =?utf-8?Q?C=C3=A9dric?= Le
 Goater <clg@kaod.org>, Daniel Henrique Barboza <danielhb413@gmail.com>,
 David Gibson <david@gibson.dropbear.id.au>, Greg Kurz <groug@kaod.org>,
 Philippe =?utf-8?Q?Mathieu-Daud=C3=A9?= <f4bug@amsat.org>, Jean-Christophe
 Dubois
 <jcd@tribudubois.net>, Keith Busch <kbusch@kernel.org>, Klaus Jensen
 <its@irrelevant.dk>, Yuval Shaia <yuval.shaia.ml@gmail.com>, Yoshinori
 Sato <ysato@users.sourceforge.jp>, Magnus Damm <magnus.damm@gmail.com>,
 Fabien Chouteau <chouteau@adacore.com>, KONRAD Frederic
 <frederic.konrad@adacore.com>, Mark Cave-Ayland
 <mark.cave-ayland@ilande.co.uk>, Artyom Tarasenko <atar4qemu@gmail.com>,
 Alex Williamson <alex.williamson@redhat.com>, Eric Auger
 <eric.auger@redhat.com>, Max Filippov <jcmvbkbc@gmail.com>, Juan Quintela
 <quintela@redhat.com>, "Dr. David Alan Gilbert" <dgilbert@redhat.com>,
 Konstantin Kostiuk <kkostiuk@redhat.com>, Michael Roth
 <michael.roth@amd.com>, =?utf-8?Q?Daniel_P=2E_Berrang=C3=A9?=
 <berrange@redhat.com>, Pavel
 Dovgalyuk <pavel.dovgaluk@ispras.ru>, David Hildenbrand
 <david@redhat.com>, Wenchao Wang <wenchao.wang@intel.com>, Colin Xu
 <colin.xu@intel.com>, Kamil Rytarowski <kamil@netbsd.org>, Reinoud Zandijk
 <reinoud@netbsd.org>, Sunil Muthuswamy <sunilmut@microsoft.com>, Cornelia
 Huck <cohuck@redhat.com>, Thomas Huth <thuth@redhat.com>, Eric Blake
 <eblake@redhat.com>, Vladimir Sementsov-Ogievskiy
 <vsementsov@virtuozzo.com>, John Snow <jsnow@redhat.com>,
 kvm@vger.kernel.org, qemu-arm@nongnu.org, xen-devel@lists.xenproject.org,
 qemu-ppc@nongnu.org, qemu-block@nongnu.org, haxm-team@intel.com,
 qemu-s390x@nongnu.org
Subject: Re: [PATCH 2/3] 9pfs: Use g_new() & friends where that makes
 obvious sense
Date: Mon, 14 Mar 2022 19:23:04 +0000
In-reply-to: <20220314160108.1440470-3-armbru@redhat.com>
Message-ID: <87ee345of5.fsf@linaro.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable


Markus Armbruster <armbru@redhat.com> writes:

> g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
> for two reasons.  One, it catches multiplication overflowing size_t.
> Two, it returns T * rather than void *, which lets the compiler catch
> more type errors.
>
> This commit only touches allocations with size arguments of the form
> sizeof(T).
>
> Patch created mechanically with:
>
>     $ spatch --in-place --sp-file scripts/coccinelle/use-g_new-etc.cocci \
> 	     --macro-file scripts/cocci-macro-file.h FILES...
>
> Except this uncovers a typing error:
>
>     ../hw/9pfs/9p.c:855:13: warning: incompatible pointer types assigning=
 to 'QpfEntry *' from 'QppEntry *' [-Wincompatible-pointer-types]
> 	    val =3D g_new0(QppEntry, 1);
> 		^ ~~~~~~~~~~~~~~~~~~~
>     1 warning generated.
>
> Harmless, because QppEntry is larger than QpfEntry.  Fix to allocate a
> QpfEntry instead.
>
> Cc: Greg Kurz <groug@kaod.org>
> Cc: Christian Schoenebeck <qemu_oss@crudebyte.com>
> Signed-off-by: Markus Armbruster <armbru@redhat.com>

Reviewed-by: Alex Benn=C3=A9e <alex.bennee@linaro.org>

--=20
Alex Benn=C3=A9e


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 19:23:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 19:23:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290435.492546 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTqIM-0002Mg-89; Mon, 14 Mar 2022 19:23:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290435.492546; Mon, 14 Mar 2022 19:23:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTqIM-0002MZ-4b; Mon, 14 Mar 2022 19:23:54 +0000
Received: by outflank-mailman (input) for mailman id 290435;
 Mon, 14 Mar 2022 19:23:53 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nTqIL-0002MT-DU
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 19:23:53 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nTqIK-0003AN-H4; Mon, 14 Mar 2022 19:23:52 +0000
Received: from 54-240-197-227.amazon.com ([54.240.197.227]
 helo=[10.95.108.113]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nTqIK-0005Oi-AR; Mon, 14 Mar 2022 19:23:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:Cc:From:
	References:To:Subject:MIME-Version:Date:Message-ID;
	bh=Gx1T1YwN8lncQCfM4GtnxhUbRf9XrOEGHRpQ1DFMTTc=; b=xdXJSkReqAN+vf1IQ0+KHb6xBg
	X/nqVuTbPLdzp353tDVSbITM2tmmtY3tLVzpgYGfVv3Ce10PzNM/QKlW2bP8fXGFPa2PWWzrY2ZSJ
	r29jVTyG5c/fWvXN8gxoflvSB+Z/JDx0HIysISnBBlIwFglp5APTprk6AQ76d+Pms3kE=;
Message-ID: <ed3d12df-e616-8dd3-cb0c-e200f83869d8@xen.org>
Date: Mon, 14 Mar 2022 19:23:49 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH 23/36] xen/arch: coloring: manually calculate Xen physical
 addresses
To: Marco Solieri <marco.solieri@minervasys.tech>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-24-marco.solieri@minervasys.tech>
From: Julien Grall <julien@xen.org>
Cc: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 "lucmiccio@gmail.com" <lucmiccio@gmail.com>
In-Reply-To: <20220304174701.1453977-24-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 04/03/2022 17:46, Marco Solieri wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> During Xen coloring procedure, we need to manually calculate consecutive
> physical addresses that conform to the color selection. Add an helper
> function that does this operation. The latter will return the next
> address that conforms to Xen color selection.
> 
> The next_colored function is architecture dependent and the provided
> implementation is for ARMv8.
> 
> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
> ---
>   xen/arch/arm/coloring.c             | 43 +++++++++++++++++++++++++++++
>   xen/arch/arm/include/asm/coloring.h | 14 ++++++++++
>   2 files changed, 57 insertions(+)
> 
> diff --git a/xen/arch/arm/coloring.c b/xen/arch/arm/coloring.c
> index 761414fcd7..aae3c77a7b 100644
> --- a/xen/arch/arm/coloring.c
> +++ b/xen/arch/arm/coloring.c
> @@ -222,6 +222,49 @@ uint32_t get_max_colors(void)
>       return max_col_num;
>   }
>   
> +paddr_t next_xen_colored(paddr_t phys)
> +{
> +    unsigned int i;
> +    unsigned int col_next_number = 0;
> +    unsigned int col_cur_number = (phys & addr_col_mask) >> PAGE_SHIFT;
> +    int overrun = 0;

This only looks to be used as an unsigned value. So please use 'unsigned 
int'.

> +    paddr_t ret;
> +
> +    /*
> +     * Check if address color conforms to Xen selection. If it does, return
> +     * the address as is.
> +     */
> +    for( i = 0; i < xen_col_num; i++)

Coding style: missing space after 'for' and before ')'.

> +        if ( col_cur_number == xen_col_list[i] )
> +            return phys;
> +
> +    /* Find next col */
> +    for( i = xen_col_num -1 ; i >= 0; i--)

i is unsigned. So the 'i >= 0' will always be true as it will wrap to 
2^32 - 1. What did you intend to check?

Coding style: missing space after 'for', '-' and before ')'.

> +    {
> +        if ( col_cur_number > xen_col_list[i])

Coding style: missing space before ')'.

> +        {
> +            /* Need to start to first element and add a way_size */
> +            if ( i == (xen_col_num - 1) )
> +            {
> +                col_next_number = xen_col_list[0];
> +                overrun = 1;
> +            }
> +            else
> +            {
> +                col_next_number = xen_col_list[i+1];

Coding style: Missing space before and after '+'.

> +                overrun = 0;
> +            }
> +            break;
> +        }
> +    }
> +
> +    /* Align phys to way_size */
> +    ret = phys - (PAGE_SIZE * col_cur_number);

I am not sure to understand how the comment is matching with the code. 
 From the comment, I would expect the expression to contain 'way_size'.

> +    /* Add the offset based on color selection*/

Coding style: missing space before '*/'.

> +    ret += (PAGE_SIZE * (col_next_number)) + (way_size*overrun);
Coding style: Missing space before and after '*'.

> +    return ret;
> +}
> +
>   bool __init coloring_init(void)
>   {
>       int i, rc;
> diff --git a/xen/arch/arm/include/asm/coloring.h b/xen/arch/arm/include/asm/coloring.h
> index 22e67dc9d8..8c4525677c 100644
> --- a/xen/arch/arm/include/asm/coloring.h
> +++ b/xen/arch/arm/include/asm/coloring.h
> @@ -28,6 +28,20 @@
>   
>   bool __init coloring_init(void);
>   
> +/*
> + * Return physical page address that conforms to the colors selection
> + * given in col_selection_mask after @param phys.
> + *
> + * @param phys         Physical address start.
> + * @param addr_col_mask        Mask specifying the bits available for coloring.
> + * @param col_selection_mask   Mask asserting the color bits to be used,
> + * must not be 0.

The function belows have only one parameter. Yet, you are description 3 
parameters here.

> + *
> + * @return The lowest physical page address being greater or equal than
> + * 'phys' and belonging to Xen color selection
> + */
> +paddr_t next_xen_colored(paddr_t phys);
> +
>   /*
>    * Check colors of a given domain.
>    * Return true if check passed, false otherwise.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 19:24:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 19:24:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290440.492557 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTqJ4-0002w8-Go; Mon, 14 Mar 2022 19:24:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290440.492557; Mon, 14 Mar 2022 19:24:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTqJ4-0002w1-Du; Mon, 14 Mar 2022 19:24:38 +0000
Received: by outflank-mailman (input) for mailman id 290440;
 Mon, 14 Mar 2022 19:24:37 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nTqJ2-0002vn-Ul
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 19:24:36 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nTqJ2-0003Ba-B4; Mon, 14 Mar 2022 19:24:36 +0000
Received: from 54-240-197-227.amazon.com ([54.240.197.227]
 helo=[10.95.108.113]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nTqJ2-0005Qx-4n; Mon, 14 Mar 2022 19:24:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=8gtPwiqOeQZnseOV29wmVeGpt4i/hWpcXBGZOXmEd6c=; b=SdVsxZdxIEfRZRCO6Pj+c/ypHY
	pEQPIxxiTE+rWhhDMUU0dIW1tOdkvnyCa0y7OV3/bi9jaKBy6Jyzio1tEM0VPMj+n+mQufOFZtpiz
	1avqCkw7alVrTVU8FCnAmb1MuS6lpzil6OCYqjVzcPKCRsOQodTBGiKbC5Euy7GoSA0o=;
Message-ID: <af4b8672-2a23-af3f-dd1c-cf44bb601304@xen.org>
Date: Mon, 14 Mar 2022 19:24:33 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH 24/36] xen/arm: enable consider_modules for coloring
To: Marco Solieri <marco.solieri@minervasys.tech>,
 xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-25-marco.solieri@minervasys.tech>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220304174701.1453977-25-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 04/03/2022 17:46, Marco Solieri wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> In order to relocate Xen the function get_xen_paddr will be used in the
> following patches. The method has "consider_modules" as a prerequisite
> so it has to be enabled both for ARM32 and coloring.
> 
> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> ---
>   xen/arch/arm/setup.c | 2 +-
>   1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c
> index f39c62ea70..0bfe12da57 100644
> --- a/xen/arch/arm/setup.c
> +++ b/xen/arch/arm/setup.c
> @@ -442,7 +442,7 @@ static void * __init relocate_fdt(paddr_t dtb_paddr, size_t dtb_size)
>       return fdt;
>   }
>   
> -#ifdef CONFIG_ARM_32
> +#if defined (CONFIG_ARM_32) || (CONFIG_COLORING)

Please fold this change in the first use of consider_modules().

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 19:59:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 19:59:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290445.492568 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTqqg-0006nF-4p; Mon, 14 Mar 2022 19:59:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290445.492568; Mon, 14 Mar 2022 19:59:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTqqg-0006n8-1O; Mon, 14 Mar 2022 19:59:22 +0000
Received: by outflank-mailman (input) for mailman id 290445;
 Mon, 14 Mar 2022 19:59:20 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nTqqd-0006n2-UT
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 19:59:20 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nTqqc-0003nJ-PZ; Mon, 14 Mar 2022 19:59:18 +0000
Received: from 54-240-197-227.amazon.com ([54.240.197.227]
 helo=[10.95.108.113]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nTqqc-0007g6-IS; Mon, 14 Mar 2022 19:59:18 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=TCx7fjvhguwkk+Gvjd1ppgqZnz4Y5FhQ+r0yB8QX7ac=; b=IfC/oC3Z5StuHbDJ0fx2H6UWtV
	HoEfkkiGbUzV8f8CIYFqEkbfmG5elyp2PMenLEildzoDTCXWA3DUStgxT7tTRvmW9QEOiuEj/gTtA
	T3TYzhWY6TPwaA4J1Oubn81uBC4D1QRhK6KQOoH2/OIFXYWYONrymrnyQOBNinELXTBs=;
Message-ID: <615a8ef4-57f5-7499-eba9-10c025c9e062@xen.org>
Date: Mon, 14 Mar 2022 19:59:15 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH 26/36] xen/arm: add argument to remove_early_mappings
To: Marco Solieri <marco.solieri@minervasys.tech>,
 xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-27-marco.solieri@minervasys.tech>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220304174701.1453977-27-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Marco,

On 04/03/2022 17:46, Marco Solieri wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> Upcoming patches will need to remove temporary mappings created during
> Xen coloring process. The function remove_early_mappings does what we
> need but it is case-specific. Parametrize the function to avoid code
> replication.
> 
> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
> Acked-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
> ---
>   xen/arch/arm/include/asm/mm.h | 2 +-
>   xen/arch/arm/mm.c             | 8 ++++----
>   xen/arch/arm/setup.c          | 3 ++-
>   3 files changed, 7 insertions(+), 6 deletions(-)
> 
> diff --git a/xen/arch/arm/include/asm/mm.h b/xen/arch/arm/include/asm/mm.h
> index 9ac1767595..041ec4ee70 100644
> --- a/xen/arch/arm/include/asm/mm.h
> +++ b/xen/arch/arm/include/asm/mm.h
> @@ -184,7 +184,7 @@ extern void setup_pagetables(unsigned long boot_phys_offset, paddr_t xen_paddr);
>   /* Map FDT in boot pagetable */
>   extern void *early_fdt_map(paddr_t fdt_paddr);
>   /* Remove early mappings */
> -extern void remove_early_mappings(void);
> +extern void remove_early_mappings(unsigned long va, unsigned long size);
>   /* Allocate and initialise pagetables for a secondary CPU. Sets init_ttbr to the
>    * new page table */
>   extern int init_secondary_pagetables(int cpu);
> diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
> index fd7a313d88..d69f18b5d2 100644
> --- a/xen/arch/arm/mm.c
> +++ b/xen/arch/arm/mm.c
> @@ -597,13 +597,13 @@ void * __init early_fdt_map(paddr_t fdt_paddr)
>       return fdt_virt;
>   }
>   
> -void __init remove_early_mappings(void)
> +void __init remove_early_mappings(unsigned long va, unsigned long size)
>   {
>       lpae_t pte = {0};
> -    write_pte(xen_second + second_table_offset(BOOT_FDT_VIRT_START), pte);
> -    write_pte(xen_second + second_table_offset(BOOT_FDT_VIRT_START + SZ_2M),
> +    write_pte(xen_second + second_table_offset(va), pte);
> +    write_pte(xen_second + second_table_offset(va + size),
>                 pte);

The original goal of this code was to remove 2 entries. Each entry 
covering 2MB.

Anyone calling with size == 2MB will expect a single mapping to be 
removed. But 4MB worth of memory will be removed.

Effectively, remove_early_mappings() is not generic enough to be 
parametrized. I also don't think this function should be parametrized.
The goal is to remove any mappings that was created during early boot.

I will have a look at how you use it before making any suggestions.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 20:05:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 20:05:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290451.492579 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTqvy-0008KO-Sl; Mon, 14 Mar 2022 20:04:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290451.492579; Mon, 14 Mar 2022 20:04:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTqvy-0008KH-Pe; Mon, 14 Mar 2022 20:04:50 +0000
Received: by outflank-mailman (input) for mailman id 290451;
 Mon, 14 Mar 2022 20:04:49 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nTqvx-0008Jv-Do
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 20:04:49 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nTqvw-0003zS-LO; Mon, 14 Mar 2022 20:04:48 +0000
Received: from 54-240-197-227.amazon.com ([54.240.197.227]
 helo=[10.95.108.113]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nTqvw-00089o-E4; Mon, 14 Mar 2022 20:04:48 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=sHF1qc9LISx5MQC1Iy3sXQ7I+qZTL7b+HYRhyvmRhqw=; b=NaMBC6fN9AUKLy0vhiydrttnfw
	BfAZjM/lsVIby7ALnIrMVSPsJ0y8f+FhWhSfwJ0BnZTlamMVIKp8Bhp8sBw8aWoLqFuY2N5ILsOf7
	FoqIaAwojCeHQ0HlQknLJm271mNgqhmeYwLEZb0iGiUF5yf4EayYdnMFpvuXQVKLh8mg=;
Message-ID: <b323355e-7b3f-07c0-7a0a-d1cb8efe9a7b@xen.org>
Date: Mon, 14 Mar 2022 20:04:46 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH 31/36] Disable coloring if static memory support is
 selected
To: Marco Solieri <marco.solieri@minervasys.tech>,
 xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-32-marco.solieri@minervasys.tech>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220304174701.1453977-32-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Marco,

On 04/03/2022 17:46, Marco Solieri wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> Static memory assumes to have physically contiguous memory mapped to
> domains. This assumption cannot be made when coloring is enabled.
> These two features have to be mutually exclusive.

I understand that at runtime, you want them to be mutually exclusive.
But I am not sure to understand why this needs to be mutually exclusive 
at compile time.

In fact, I think it would be nice if we have a same binary Xen that can 
be used with/without coloring. Could you outline any reasons that would 
make this goal difficult to achieve?

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 20:09:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 20:09:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290455.492590 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTr0t-0000gz-G6; Mon, 14 Mar 2022 20:09:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290455.492590; Mon, 14 Mar 2022 20:09:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTr0t-0000gs-D0; Mon, 14 Mar 2022 20:09:55 +0000
Received: by outflank-mailman (input) for mailman id 290455;
 Mon, 14 Mar 2022 20:09:53 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=bxqh=TZ=linaro.org=alex.bennee@srs-se1.protection.inumbo.net>)
 id 1nTr0r-0000gm-O3
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 20:09:53 +0000
Received: from mail-ed1-x52e.google.com (mail-ed1-x52e.google.com
 [2a00:1450:4864:20::52e])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b506d6bd-a3d2-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 21:09:51 +0100 (CET)
Received: by mail-ed1-x52e.google.com with SMTP id c20so21482524edr.8
 for <xen-devel@lists.xenproject.org>; Mon, 14 Mar 2022 13:09:51 -0700 (PDT)
Received: from zen.linaroharston ([51.148.130.216])
 by smtp.gmail.com with ESMTPSA id
 rv11-20020a17090710cb00b006d5c0cd5e0dsm7168399ejb.82.2022.03.14.13.09.49
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Mon, 14 Mar 2022 13:09:49 -0700 (PDT)
Received: from zen (localhost [127.0.0.1])
 by zen.linaroharston (Postfix) with ESMTP id 1FAB51FFB7;
 Mon, 14 Mar 2022 20:09:49 +0000 (GMT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b506d6bd-a3d2-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=linaro.org; s=google;
        h=references:user-agent:from:to:cc:subject:date:in-reply-to
         :message-id:mime-version:content-transfer-encoding;
        bh=TyjIR8cu39wafofM+zk55pMOkvXNU/TH+17qM8XX/mo=;
        b=bXMVXacOlW6oQtjRy6EEwOPK02lVKTTyd6/63WJ9myEU1O9NELNBNQFwJwnU1Q+IV4
         a78TJqmzB0yQV61DcsiteBFtBrYAxi4UyScHw46RQ01k7cch+G5Ewh1QQePtNuyWlHgn
         vzFykmfP7UPG0DGfUPYpQGUs3MPI/Uz7x8ZBLCOnfYh841aN/yYy991ZkoY8y96vevQT
         rYgPvCHsucOivuwXVbuFg8WfMPJoEnRA0iEIV6Ki9rvqrDNfEdtjhtuyFT6UDnYOPX1z
         T77pzcl0RkLg4VymdgVZj8xTOFCCNeA8qOc10IeoZnUENHsGsyVB5/919v10tE9Dn4b+
         YYtA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:references:user-agent:from:to:cc:subject:date
         :in-reply-to:message-id:mime-version:content-transfer-encoding;
        bh=TyjIR8cu39wafofM+zk55pMOkvXNU/TH+17qM8XX/mo=;
        b=65bikc6a6sOKxZhHIDTUEjbxBnj4FzKf2/3FZQfLaKA9g2fUhLn3/6oufgMsupCiOy
         8z0p9NaEcLfU1nVI2SdbgVseL/Gh680cw/SQyxRu78n7BapScIKCE4u/8NRDgxQRmaoK
         S2m1IdofpG+A9M4XkaZiAQE3Ql6a4c9QXzI/VibQofx4UOJ5aMaVVMtKD/0NfQlkA5en
         NJhK2UBfEHcsS4uSubZrF7Gyufrs2LqrGynnZpxMSSARoW+O5KvP4hU4itNTCfGzVxAF
         s7dtfwkvTMTMYjcd7GhMzZ46stLvVf8nnXtUE4KrPldqgBV9ig9NLa1IGDRmH7884Akr
         Spkg==
X-Gm-Message-State: AOAM533W8EtRKTfHiAf/45T4ry4tBD+KkTZL0BSisQnUjUr3Rw6HwuLS
	jwU89hpG47XXZLyyM3LpdVDuxQ==
X-Google-Smtp-Source: ABdhPJzoiP+70QZTfjJbS19fTL4Aqo4JVXWpmjHO/0lg4tfXpYs79y9/OcB3nK2PUGv+/u/9Tt6Yvg==
X-Received: by 2002:a05:6402:d08:b0:418:82ff:5aae with SMTP id eb8-20020a0564020d0800b0041882ff5aaemr6605923edb.400.1647288591372;
        Mon, 14 Mar 2022 13:09:51 -0700 (PDT)
References: <20220314160108.1440470-1-armbru@redhat.com>
 <20220314160108.1440470-4-armbru@redhat.com>
User-agent: mu4e 1.7.10; emacs 28.0.92
From: Alex =?utf-8?Q?Benn=C3=A9e?= <alex.bennee@linaro.org>
To: Markus Armbruster <armbru@redhat.com>
Cc: qemu-devel@nongnu.org, Paolo Bonzini <pbonzini@redhat.com>, Richard
 Henderson <richard.henderson@linaro.org>, Gerd Hoffmann
 <kraxel@redhat.com>, Christian Schoenebeck <qemu_oss@crudebyte.com>,
 "Gonglei (Arei)" <arei.gonglei@huawei.com>, =?utf-8?Q?Marc-Andr=C3=A9?=
 Lureau
 <marcandre.lureau@redhat.com>, "Michael S. Tsirkin" <mst@redhat.com>, Igor
 Mammedov <imammedo@redhat.com>, Ani Sinha <ani@anisinha.ca>, Laurent
 Vivier <lvivier@redhat.com>, Amit Shah <amit@kernel.org>, Peter Maydell
 <peter.maydell@linaro.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Anthony Perard <anthony.perard@citrix.com>, Paul Durrant <paul@xen.org>,
 =?utf-8?Q?Herv=C3=A9?= Poussineau <hpoussin@reactos.org>, Aleksandar Rikalo
 <aleksandar.rikalo@syrmia.com>, Corey Minyard <cminyard@mvista.com>,
 Patrick Venture <venture@google.com>, Eduardo Habkost
 <eduardo@habkost.net>, Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
 Peter Xu <peterx@redhat.com>, Jason Wang <jasowang@redhat.com>,
 =?utf-8?Q?C=C3=A9dric?= Le
 Goater <clg@kaod.org>, Daniel Henrique Barboza <danielhb413@gmail.com>,
 David Gibson <david@gibson.dropbear.id.au>, Greg Kurz <groug@kaod.org>,
 Philippe =?utf-8?Q?Mathieu-Daud=C3=A9?= <f4bug@amsat.org>, Jean-Christophe
 Dubois
 <jcd@tribudubois.net>, Keith Busch <kbusch@kernel.org>, Klaus Jensen
 <its@irrelevant.dk>, Yuval Shaia <yuval.shaia.ml@gmail.com>, Yoshinori
 Sato <ysato@users.sourceforge.jp>, Magnus Damm <magnus.damm@gmail.com>,
 Fabien Chouteau <chouteau@adacore.com>, KONRAD Frederic
 <frederic.konrad@adacore.com>, Mark Cave-Ayland
 <mark.cave-ayland@ilande.co.uk>, Artyom Tarasenko <atar4qemu@gmail.com>,
 Alex Williamson <alex.williamson@redhat.com>, Eric Auger
 <eric.auger@redhat.com>, Max Filippov <jcmvbkbc@gmail.com>, Juan Quintela
 <quintela@redhat.com>, "Dr. David Alan Gilbert" <dgilbert@redhat.com>,
 Konstantin Kostiuk <kkostiuk@redhat.com>, Michael Roth
 <michael.roth@amd.com>, =?utf-8?Q?Daniel_P=2E_Berrang=C3=A9?=
 <berrange@redhat.com>, Pavel
 Dovgalyuk <pavel.dovgaluk@ispras.ru>, David Hildenbrand
 <david@redhat.com>, Wenchao Wang <wenchao.wang@intel.com>, Kamil
 Rytarowski <kamil@netbsd.org>, Reinoud Zandijk <reinoud@netbsd.org>, Sunil
 Muthuswamy <sunilmut@microsoft.com>, Cornelia Huck <cohuck@redhat.com>,
 Thomas Huth <thuth@redhat.com>, Eric Blake <eblake@redhat.com>, Vladimir
 Sementsov-Ogievskiy <vsementsov@virtuozzo.com>, John Snow
 <jsnow@redhat.com>, kvm@vger.kernel.org, qemu-arm@nongnu.org,
 xen-devel@lists.xenproject.org, qemu-ppc@nongnu.org,
 qemu-block@nongnu.org, haxm-team@intel.com, qemu-s390x@nongnu.org
Subject: Re: [PATCH 3/3] Use g_new() & friends where that makes obvious sense
Date: Mon, 14 Mar 2022 19:48:47 +0000
In-reply-to: <20220314160108.1440470-4-armbru@redhat.com>
Message-ID: <877d8w5m9e.fsf@linaro.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable


Markus Armbruster <armbru@redhat.com> writes:

> g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
> for two reasons.  One, it catches multiplication overflowing size_t.
> Two, it returns T * rather than void *, which lets the compiler catch
> more type errors.
>
> This commit only touches allocations with size arguments of the form
> sizeof(T).
>
> Patch created mechanically with:
>
>     $ spatch --in-place --sp-file scripts/coccinelle/use-g_new-etc.cocci \
> 	     --macro-file scripts/cocci-macro-file.h FILES...
>
> Signed-off-by: Markus Armbruster <armbru@redhat.com>
<snip>
> --- a/audio/jackaudio.c
> +++ b/audio/jackaudio.c
> @@ -97,9 +97,9 @@ static void qjack_buffer_create(QJackBuffer *buffer, in=
t channels, int frames)
>      buffer->used     =3D 0;
>      buffer->rptr     =3D 0;
>      buffer->wptr     =3D 0;
> -    buffer->data     =3D g_malloc(channels * sizeof(float *));
> +    buffer->data     =3D g_new(float *, channels);
>      for (int i =3D 0; i < channels; ++i) {
> -        buffer->data[i] =3D g_malloc(frames * sizeof(float));
> +        buffer->data[i] =3D g_new(float, frames);

Are these actually buffers of pointers to floats? I guess I leave that
to the JACK experts...

>      }
>  }
>=20=20
> @@ -453,7 +453,7 @@ static int qjack_client_init(QJackClient *c)
>      jack_on_shutdown(c->client, qjack_shutdown, c);
>=20=20
>      /* allocate and register the ports */
> -    c->port =3D g_malloc(sizeof(jack_port_t *) * c->nchannels);
> +    c->port =3D g_new(jack_port_t *, c->nchannels);
>      for (int i =3D 0; i < c->nchannels; ++i) {

I guess JACK just likes double indirection...

>=20=20
>          char port_name[16];
<snip>
> --- a/hw/pci/pcie_sriov.c
> +++ b/hw/pci/pcie_sriov.c
> @@ -177,7 +177,7 @@ static void register_vfs(PCIDevice *dev)
>      assert(sriov_cap > 0);
>      num_vfs =3D pci_get_word(dev->config + sriov_cap + PCI_SRIOV_NUM_VF);
>=20=20
> -    dev->exp.sriov_pf.vf =3D g_malloc(sizeof(PCIDevice *) * num_vfs);
> +    dev->exp.sriov_pf.vf =3D g_new(PCIDevice *, num_vfs);
>      assert(dev->exp.sriov_pf.vf);

So what I find confusing about the conversion of sizeof(foo *) is that
while the internal sizeof in g_new is unaffected I think the casting
ends up as

 foo **

but I guess the compiler would have complained so maybe I don't
understand the magic enough.

<snip>
> index 42130667a7..598e6adc5e 100644
> --- a/hw/rdma/vmw/pvrdma_dev_ring.c
> +++ b/hw/rdma/vmw/pvrdma_dev_ring.c
> @@ -41,7 +41,7 @@ int pvrdma_ring_init(PvrdmaRing *ring, const char *name=
, PCIDevice *dev,
>      qatomic_set(&ring->ring_state->cons_head, 0);
>      */
>      ring->npages =3D npages;
> -    ring->pages =3D g_malloc0(npages * sizeof(void *));
> +    ring->pages =3D g_new0(void *, npages);

At least here ring->pages agrees about void ** being the result.

<snip>

So other than my queries about the sizeof(foo *) which I'd like someone
to assuage me of my concerns it looks like the script has done a
thorough mechanical job as all good scripts should ;-)

Reviewed-by: Alex Benn=C3=A9e <alex.bennee@linaro.org>

--=20
Alex Benn=C3=A9e


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 21:50:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 21:50:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290463.492601 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTsZY-00036F-N0; Mon, 14 Mar 2022 21:49:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290463.492601; Mon, 14 Mar 2022 21:49:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTsZY-000368-JO; Mon, 14 Mar 2022 21:49:48 +0000
Received: by outflank-mailman (input) for mailman id 290463;
 Mon, 14 Mar 2022 21:49:47 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=WDqM=TZ=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nTsZW-000362-On
 for xen-devel@lists.xen.org; Mon, 14 Mar 2022 21:49:46 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a7fb55a6-a3e0-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 22:49:44 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 2A9BFB8104A;
 Mon, 14 Mar 2022 21:49:42 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5AF40C340E9;
 Mon, 14 Mar 2022 21:49:40 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a7fb55a6-a3e0-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647294580;
	bh=4vwLbzFgvDvk6KFpsR5PTdGgxDOhtYqyDJqRCKkQyb4=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=A++Df845vISkTGM4x/maqYKBQrmSw4W84zwZv30m8offWS+dUssBFbq/3smHZ2dDS
	 9h817yF5LxOt6sjNYZNsPbmRDd9OfNQ886+X3BkgvoqrfuxhQyDRljXyhk4jKjdQL9
	 xqayvmr+8Er01nzXRAb7xNMA8ITMk6ArItqZpqFEiLw7zNsDdQBwRXCeuJh9GzmRGk
	 j3wQc8N7b5mABacblbo/kXoOoyLy2Es3qlR/KC167yKM4gGu1lC8hFn39wDobJuFJs
	 X04khQCxjzyPs/InE87AppmtEgl4u9F0rFaYXBwnq1JnHY663RvISdB9hmBjq+Yq7o
	 ZsbLlEFJjPVfw==
Date: Mon, 14 Mar 2022 14:49:39 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: George Dunlap <george.dunlap@citrix.com>
cc: xen-devel@lists.xen.org, Henry Wang <Henry.Wang@arm.com>, 
    Wei Liu <wl@xen.org>, Andrew Cooper <andrew.cooper3@citrix.com>, 
    Jan Beulich <jbeulich@suse.com>, Roger Pau Monne <roger.pau@citrix.com>, 
    Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>
Subject: Re: [PATCH] MAINTAINERS: Propose Henry Wang as the new release
 manager
In-Reply-To: <20220310214655.14510-1-george.dunlap@citrix.com>
Message-ID: <alpine.DEB.2.22.394.2203141449160.3497@ubuntu-linux-20-04-desktop>
References: <20220310214655.14510-1-george.dunlap@citrix.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Thu, 10 Mar 2022, George Dunlap wrote:
> ARM has proposed Henry Wang as a release manager for 4.17.  Signify
> this by giving him maintainership over CHANGELOG.md.
> 
> Below is an introduction given by Bertrand Marquis:
> 
> Henry Wang is an open-source software engineer at Arm focusing on the
> hypervisor and virtualization technology. Before joining the
> AIS-Hypervisor team, he was one of the leading Arm contributors of the
> Rust-VMM and the Cloud Hypervisor community.  He is the Arm reviewer
> of the Cloud Hypervisor project. His work includes basic project
> enabling on Arm platform, Arm device emulation, advanced features
> support on Arm and bug fixes.
> 
> After joining the AIS-Hypervisor team at Arm, he has been involved in Xen feature
> development on Arm in various areas, including:
> 
> 1. Xen Arm MPAM extension research and PoC: Ongoing, the design will
> share in xen-devel soon.
> 
> 2. Port of Xen to Arm MPU systems: Working together with Penny Zheng
> on coding and testing, will be soon sent to xen-devel.
> 
> 3. Static Xen heap on Arm: Work done but depend on the direct mapping
> series from Penny Zheng, will be upstreamed in the next weeks.
> 
> 4. Virtio PoC for Xen on Arm using kvmtool as the Xen virtio backend:
> Work done, including the enabling of the virtio and the virtio
> performance tuning.
> 
> 5. Participated in code reviews and discussions in xen-devel,
> including the foreign memory mapping series from EPAM, etc.
> 
> Signed-off-by: George Dunlap <george.dunlap@citrix.com>

Acked-by: Stefano Stabellini <sstabellini@kernel.org>


> ---
> CC: Henry Wang <Henry.Wang@arm.com>
>  CC: Ian Jackson <iwj@xenproject.org>
> CC: Wei Liu <wl@xen.org>
> CC: Andrew Cooper <andrew.cooper3@citrix.com>
> CC: Jan Beulich <jbeulich@suse.com>
> CC: Roger Pau Monne <roger.pau@citrix.com>
> CC: Stefano Stabellini <sstabellini@kernel.org>
> CC: Julien Grall <julien@xen.org>
> ---
>  MAINTAINERS | 1 +
>  1 file changed, 1 insertion(+)
> 
> diff --git a/MAINTAINERS b/MAINTAINERS
> index d4b06f5bfb..6a097b43eb 100644
> --- a/MAINTAINERS
> +++ b/MAINTAINERS
> @@ -255,6 +255,7 @@ S:	Supported
>  F:	xen/drivers/passthrough/arm/smmu-v3.c
>  
>  Change Log
> +M:	Henry Wang <Henry.Wang@arm.com>
>  R:	Community Manager <community.manager@xenproject.org>
>  S:	Maintained
>  F:	CHANGELOG.md
> -- 
> 2.35.1
> 


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 21:58:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 21:58:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290467.492612 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTsiM-0004hs-Hw; Mon, 14 Mar 2022 21:58:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290467.492612; Mon, 14 Mar 2022 21:58:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTsiM-0004hl-Ex; Mon, 14 Mar 2022 21:58:54 +0000
Received: by outflank-mailman (input) for mailman id 290467;
 Mon, 14 Mar 2022 21:58:52 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nTsiK-0004he-Gn
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 21:58:52 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nTsiJ-0005th-QG; Mon, 14 Mar 2022 21:58:51 +0000
Received: from gw1.octic.net ([81.187.162.82] helo=[10.0.1.102])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nTsiJ-0007IQ-GA; Mon, 14 Mar 2022 21:58:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:Subject:
	From:References:Cc:To:MIME-Version:Date:Message-ID;
	bh=HyAYD4ovjWOWEyEbghE36rUuqJ6Y0G9aLSKDAU2dNNw=; b=60Il0xISd/QxJzhMnRu1oHdsUN
	32rDWg1FzmP5AT5AQUBzguYa9e0tNiOwq9lP7oXwuLmw3Fxti7yBdTn5XAWV3nQKMGyYospkJDT1g
	OPaRsYqKCZy8LdDpPOo22UdyJXsSqm0Jdq0l/O7Zroo4GLBeTAFeOpVWDXTKAX7YnWeE=;
Message-ID: <7f4da97f-643a-8d25-4f76-b58cf1833fc3@xen.org>
Date: Mon, 14 Mar 2022 21:58:48 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
To: Marco Solieri <marco.solieri@minervasys.tech>,
 xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-28-marco.solieri@minervasys.tech>
From: Julien Grall <julien@xen.org>
Subject: Re: [PATCH 27/36] xen/arch: add coloring support for Xen
In-Reply-To: <20220304174701.1453977-28-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Marco,

On 04/03/2022 17:46, Marco Solieri wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> Introduce a new implementation of setup_pagetables that uses coloring
> logic in order to isolate Xen code using its color selection.
> Page tables construction is essentially copied, except for the xenmap
> table, where coloring logic is needed.  Given the absence of a contiguous
> physical mapping, pointers to next level tables need to be manually
> calculated.
> 
> Xen code is relocated in strided mode using the same coloring logic as
> the one in xenmap table by using a temporary colored mapping that will
> be destroyed after switching the TTBR register.
> 
> Keep Xen text section mapped in the newly created pagetables.
> The boot process relies on computing needed physical addresses of Xen
> code by using a shift, but colored mapping is not linear and not easily
> computable. Therefore, the old Xen code is temporarily kept and used to
> boot secondary CPUs until they switch to the colored mapping, which is
> accessed using the handy macro virt_old.  After the boot process, the old
> Xen code memory is reset and its mapping is destroyed.
> 
> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
> ---
>   xen/arch/arm/include/asm/coloring.h |  13 ++
>   xen/arch/arm/include/asm/mm.h       |   7 ++
>   xen/arch/arm/mm.c                   | 186 +++++++++++++++++++++++++++-
>   xen/arch/arm/psci.c                 |   4 +-
>   xen/arch/arm/setup.c                |  21 +++-
>   xen/arch/arm/smpboot.c              |  19 ++-
>   6 files changed, 241 insertions(+), 9 deletions(-)
> 
> diff --git a/xen/arch/arm/include/asm/coloring.h b/xen/arch/arm/include/asm/coloring.h
> index 8c4525677c..424f6c2b04 100644
> --- a/xen/arch/arm/include/asm/coloring.h
> +++ b/xen/arch/arm/include/asm/coloring.h
> @@ -26,6 +26,17 @@
>   #ifdef CONFIG_COLORING
>   #include <xen/sched.h>
>   
> +/*
> + * Amount of memory that we need to map in order to color Xen.  The value
> + * depends on the maximum number of available colors of the hardware.  The
> + * memory size is pessimistically calculated assuming only one color is used,
> + * which means that any pages belonging to any other color has to be skipped.
> + */
> +#define XEN_COLOR_MAP_SIZE \
> +	((((_end - _start) * get_max_colors())\
> +		+ (XEN_PADDR_ALIGN-1)) & ~(XEN_PADDR_ALIGN-1))

This is an open-coded version of ROUNDUP. Looking at the number, if we 
assume the maximum number of colors (128) and Xen of 2MB. We would end 
up to reserve 256MB of memory for Xen.

This sounds quite a lot to me. This might be acceptable for a first 
approach, but I am wondering if there are a way to reduce the size?

> +#define XEN_COLOR_MAP_SIZE_M (XEN_COLOR_MAP_SIZE >> 20)
> +
>   bool __init coloring_init(void);
>   
>   /*
> @@ -67,6 +78,8 @@ unsigned long color_from_page(struct page_info *pg);
>   /* Return the maximum available number of colors supported by the hardware */
>   uint32_t get_max_colors(void);
>   #else /* !CONFIG_COLORING */
> +#define XEN_COLOR_MAP_SIZE (_end - _start)
> +
>   static inline bool __init coloring_init(void)
>   {
>       return true;
> diff --git a/xen/arch/arm/include/asm/mm.h b/xen/arch/arm/include/asm/mm.h
> index 041ec4ee70..1422091436 100644
> --- a/xen/arch/arm/include/asm/mm.h
> +++ b/xen/arch/arm/include/asm/mm.h
> @@ -362,6 +362,13 @@ void clear_and_clean_page(struct page_info *page);
>   
>   unsigned int arch_get_dma_bitsize(void);
>   
> +#ifdef CONFIG_COLORING
> +#define virt_boot_xen(virt)\
> +    (vaddr_t)((virt - XEN_VIRT_START) + BOOT_RELOC_VIRT_START)
> +#else
> +#define virt_boot_xen(virt) virt
> +#endif
> +
>   #endif /*  __ARCH_ARM_MM__ */
>   /*
>    * Local variables:
> diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
> index d69f18b5d2..53ea13641b 100644
> --- a/xen/arch/arm/mm.c
> +++ b/xen/arch/arm/mm.c
> @@ -42,6 +42,7 @@
>   #include <xen/libfdt/libfdt.h>
>   
>   #include <asm/setup.h>
> +#include <asm/coloring.h>
>   
>   /* Override macros from asm/page.h to make them work with mfn_t */
>   #undef virt_to_mfn
> @@ -110,6 +111,9 @@ DEFINE_BOOT_PAGE_TABLE(boot_second_id);
>   DEFINE_BOOT_PAGE_TABLE(boot_third_id);
>   DEFINE_BOOT_PAGE_TABLE(boot_second);
>   DEFINE_BOOT_PAGE_TABLE(boot_third);
> +#ifdef CONFIG_COLORING
> +DEFINE_BOOT_PAGE_TABLE(boot_colored_xen);
> +#endif

DEFINE_BOOT_PAGE_TABLE() should only be used for page-tables that will 
be used before switching to the C world. AFAICT, boot_colored_xen is 
only going to be access in the C world, so you should use 
DEFINE_PAGE_TABLE().

>   
>   /* Main runtime page tables */
>   
> @@ -632,6 +636,166 @@ static void clear_table(void *table)
>       clean_and_invalidate_dcache_va_range(table, PAGE_SIZE);
>   }
>   
> +#ifdef CONFIG_COLORING
> +/*
> + * Translate a Xen (.text) virtual address to the colored physical one
> + * depending on the hypervisor configuration.
> + * N.B: this function must be used only when migrating from non colored to
> + * colored pagetables since it assumes to have the temporary mappings created
> + * during setup_pagetables that starts from BOOT_RELOC_VIRT_START.
> + * After the migration we have to use virt_to_maddr.
> + */
> +static paddr_t virt_to_maddr_colored(vaddr_t virt)
> +{
> +    unsigned int va_offset;
> +
> +    va_offset = virt - XEN_VIRT_START;
> +    return __pa(BOOT_RELOC_VIRT_START + va_offset);
> +}
> +
> +static void __init coloring_temp_mappings(paddr_t xen_paddr, vaddr_t virt_start)

This code is making some assumptions about virt_start (e.g. it has to be 
in the first 512MB of the address space. Given that the address is 
always the same, I think it would be better to drop the parameter and 
hardocode the value.

> +{
> +    int i;

unsigned int please.

> +    lpae_t pte;
> +    unsigned int xen_text_size = (_end - _start);
> +
> +    xen_text_size = PAGE_ALIGN(xen_text_size);

None of the memory between _end and the next page can really be used for 
other purpose. So I think it would be better to make sure that _end is 
always page aligned.

To do that, you would need to modify xen.lds.S.

> +
> +    pte = mfn_to_xen_entry(maddr_to_mfn(__pa(boot_second)), MT_NORMAL);

maddr_to_mfn(__pa()) is an open-coded version of virt_to_mfn().

> +    pte.pt.table = 1;
> +    boot_first[first_table_offset(virt_start)] = pte;
> +
> +    pte = mfn_to_xen_entry(maddr_to_mfn(__pa(boot_colored_xen)), MT_NORMAL);
> +    pte.pt.table = 1;
> +    boot_second[second_table_offset(virt_start)] = pte;

This is live page-table. So you want to use write_pte(). Also, I would 
link the page table *after* boot_colored_xen has been fully populated.

If you don't do that, you would need to use write_pte() as well below.

> +
> +    for ( i = 0; i < (xen_text_size/PAGE_SIZE); i++ )

Coding style: missing space before and after '/'.

> +    {
> +        mfn_t mfn;

Coding style: we usually add a blank line after the declarations.

That said, this variable seems to be a bit pointless as you use it only 
once below.

> +        xen_paddr = next_xen_colored(xen_paddr);
> +        mfn = maddr_to_mfn(xen_paddr);
> +        pte = mfn_to_xen_entry(mfn, MT_NORMAL);
> +        pte.pt.table = 1; /* 4k mappings always have this bit set */

For new code, I would like if we avoid mentionning a particular page and 
use the level where the mapping happens. In this case, it would be a 
level 3 mapping.

> +        boot_colored_xen[i] = pte;
> +        xen_paddr += PAGE_SIZE;
> +    }
> + > +   flush_xen_tlb_local();

The flush is not necessary as the entry in boot_second should be freed. 
If it were not, then you would have to use the break-before-make 
sequence (i.e. remove the entry, flush, add the entry) to avoid any issue.

> +}
> +
> +/*
> + * Boot-time pagetable setup with coloring support
> + * Changes here may need matching changes in head.S

I am not overly happy to see setup_pagetables() completely duplicated. I 
hope we can drop the non-coloring version at some point, but in the 
meantime I think we should try to adapt the existing one.

This would also help to review/maintain the code.

> + *
> + * The process can be explained as follows:
> + * - Create a temporary colored mapping that conforms to Xen color selection.
> + * - Update all the pagetables links that point to the next level table(s):
> + * this process is crucial beacause the translation tables are not physically
> + * contiguous and we cannot calculate the physical addresses by using the
> + * standard method (physical offset). In order to get the correct physical
> + * address we use virt_to_maddr_colored that translates the virtual address
> + * into a physical one based on the Xen coloring configuration.
> + * - Copy Xen to the new location.
> + * - Update TTBR0_EL2 with the new root page table address.
> + */
> +void __init setup_pagetables(unsigned long boot_phys_offset, paddr_t xen_paddr)
> +{
> +    int i;
> +    lpae_t pte, *p;
> +    paddr_t pt_phys;
> +    mfn_t pt_phys_mfn;
> +    paddr_t _xen_paddr = xen_paddr;
> +
> +    phys_offset = boot_phys_offset;
> +
> +    ASSERT((_end - _start) < SECOND_SIZE);

_end and _start are not going to change. So I think this should be an 
ASSERT as part of the linker script.

[...]

> +    /* ... DTB */
> +    pte = boot_second[second_table_offset(BOOT_FDT_VIRT_START)];
> +    xen_second[second_table_offset(BOOT_FDT_VIRT_START)] = pte;
> +    pte = boot_second[second_table_offset(BOOT_FDT_VIRT_START + SZ_2M)];
> +    xen_second[second_table_offset(BOOT_FDT_VIRT_START + SZ_2M)] = pte;

The DTB will not be used right after the switch_ttbr(). So I would 
prefer if we call early_fdt_map() again after the switch.

> +
> +    /* Update the value of init_ttbr */
> +    init_ttbr = virt_to_maddr_colored((vaddr_t)xen_pgtable);
> +    clean_dcache(init_ttbr);

I don't much like the idea to set init_ttbr in a different place for 
coloring. See more below.

> +
> +    /* Copy Xen to the new location */
> +    memcpy((void*)BOOT_RELOC_VIRT_START,
> +        (const void*)XEN_VIRT_START, (_end - _start));
> +    clean_dcache_va_range((void*)BOOT_RELOC_VIRT_START, (_end - _start)); > +
> +    /* Change ttbr */
> +    switch_ttbr(init_ttbr);
> +
> +    /*
> +     * Keep mapped old Xen memory in a contiguous mapping
> +     * for other cpus to boot. This mapping will also replace the
> +     * one created at the beginning of setup_pagetables.
> +     */

AFAICT, the second CPUs will never run using the virtual address 
BOOT_RELOC_VIRT_START. You only seem to use it so you can conveniently 
translate the address using virt_to_* helper.

> +    create_mappings(xen_second, BOOT_RELOC_VIRT_START,
> +                paddr_to_pfn(XEN_VIRT_START + phys_offset),
> +                SZ_2M >> PAGE_SHIFT, SZ_2M);

This call will create a 2MB mapping. We only guarantee that Xen will be 
4KB aligned.

In addition to Xen, we don't know what we will in memory right after Xen 
(assuming it is less than 2MB). This may be device memory and could 
result to weird issue.

But, as I wrote above, the virtual mapping doesn't look to be used by 
the secondary CPUs. So I would rather prefer if we don't introduce that 
extra mapping and temporarily map/unmap if CPU0 needs to access it 
temporarily.

> +
> +    xen_pt_enforce_wnx();
> +}
> +#else
>   /* Boot-time pagetable setup.
>    * Changes here may need matching changes in head.S */
>   void __init setup_pagetables(unsigned long boot_phys_offset, paddr_t xen_paddr)
> @@ -721,6 +885,7 @@ void __init setup_pagetables(unsigned long boot_phys_offset, paddr_t xen_paddr)
>       per_cpu(xen_dommap, 0) = cpu0_dommap;
>   #endif
>   }
> +#endif /* !CONFIG_COLORING */
>   
>   static void clear_boot_pagetables(void)
>   {
> @@ -735,6 +900,9 @@ static void clear_boot_pagetables(void)
>   #endif
>       clear_table(boot_second);
>       clear_table(boot_third);
> +#ifdef CONFIG_COLORING
> +    clear_table(boot_colored_xen);
> +#endif

The boot_colored_xen is going to be touched by the secondary CPUs. So 
this doesn't need to be cleared.

>   }
>   
>   #ifdef CONFIG_ARM_64
> @@ -742,10 +910,16 @@ int init_secondary_pagetables(int cpu)
>   {
>       clear_boot_pagetables();
>   
> +    /*
> +     * For coloring the value of the ttbr was already set up during
> +     * setup_pagetables.
> +     */
> +#ifndef CONFIG_COLORING

This is not necessary if...

>       /* Set init_ttbr for this CPU coming up. All CPus share a single setof
>        * pagetables, but rewrite it each time for consistency with 32 bit. */
>       init_ttbr = (uintptr_t) xen_pgtable + phys_offset;

... virt_to_maddr() here.

>       clean_dcache(init_ttbr);
> +#endif
>       return 0;
>   }
>   #else
> @@ -859,12 +1033,20 @@ void __init setup_xenheap_mappings(unsigned long base_mfn,
>           else if ( xenheap_first_first_slot == -1)
>           {
>               /* Use xenheap_first_first to bootstrap the mappings */
> -            first = xenheap_first_first;
> +            paddr_t phys_addr;
> +
> +            /*
> +             * At this stage is safe to use virt_to_maddr because Xen mapping
> +             * is already in place. Using virt_to_maddr allows us to unify
> +             * codepath with and without cache coloring enabled.
> +             */
> +            phys_addr = virt_to_maddr((vaddr_t)xenheap_first_first);
> +            pte = mfn_to_xen_entry(maddr_to_mfn(phys_addr),MT_NORMAL);
>   
> -            pte = pte_of_xenaddr((vaddr_t)xenheap_first_first);
>               pte.pt.table = 1;
>               write_pte(p, pte);
>   
> +            first = xenheap_first_first;
>               xenheap_first_first_slot = slot;
>           }
>           else
> diff --git a/xen/arch/arm/psci.c b/xen/arch/arm/psci.c
> index 0c90c2305c..d443fac6a2 100644
> --- a/xen/arch/arm/psci.c
> +++ b/xen/arch/arm/psci.c
> @@ -25,6 +25,7 @@
>   #include <asm/cpufeature.h>
>   #include <asm/psci.h>
>   #include <asm/acpi.h>
> +#include <asm/coloring.h>
>   
>   /*
>    * While a 64-bit OS can make calls with SMC32 calling conventions, for
> @@ -49,7 +50,8 @@ int call_psci_cpu_on(int cpu)
>   {
>       struct arm_smccc_res res;
>   
> -    arm_smccc_smc(psci_cpu_on_nr, cpu_logical_map(cpu), __pa(init_secondary),
> +    arm_smccc_smc(psci_cpu_on_nr, cpu_logical_map(cpu),
> +                  __pa(virt_boot_xen((vaddr_t)init_secondary)),
>                     &res);
>   
>       return PSCI_RET(res);
> diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c
> index 13b10515a8..294b806120 100644
> --- a/xen/arch/arm/setup.c
> +++ b/xen/arch/arm/setup.c
> @@ -924,6 +924,7 @@ void __init start_xen(unsigned long boot_phys_offset,
>       struct domain *d;
>       int rc;
>       paddr_t xen_paddr = (paddr_t)(_start + boot_phys_offset);
> +    uint32_t xen_size = (_end - _start);

You are setting the size here but...

>   
>       dcache_line_bytes = read_dcache_line_bytes();
>   
> @@ -952,13 +953,16 @@ void __init start_xen(unsigned long boot_phys_offset,
>       if ( !coloring_init() )
>           panic("Xen Coloring support: setup failed\n");
>   
> +    xen_size = XEN_COLOR_MAP_SIZE;

... overwrite it before using it. Shouldn't this be in the '#ifdef' below?

> +#ifdef CONFIG_COLORING
> +    xen_paddr = get_xen_paddr(xen_size);
> +#endif
> +
>       /* Register Xen's load address as a boot module. */
> -    xen_bootmodule = add_boot_module(BOOTMOD_XEN, xen_paddr,
> -                             (paddr_t)(uintptr_t)(_end - _start + 1), false);
> +    xen_bootmodule = add_boot_module(BOOTMOD_XEN, xen_paddr, xen_size, false);
>       BUG_ON(!xen_bootmodule);
>   
>       setup_pagetables(boot_phys_offset, xen_paddr);
> -

Spurious change.

>       setup_mm();
>   
>       /* Parse the ACPI tables for possible boot-time configuration */
> @@ -1072,6 +1076,17 @@ void __init start_xen(unsigned long boot_phys_offset,
>   
>       setup_virt_paging();
>   
> +    /*
> +     * This removal is useful if cache coloring is enabled but
> +     * it should not affect non coloring configuration.
> +     * The removal is done earlier than discard_initial_modules
> +     * beacuse in do_initcalls there is the livepatch support
> +     * setup which uses the virtual addresses starting from
> +     * BOOT_RELOC_VIRT_START.
> +     * Remove coloring mappings to expose a clear state to the
> +     * livepatch module.
> +     */
> +    remove_early_mappings(BOOT_RELOC_VIRT_START, SZ_2M);
>       do_initcalls();
>   
>       /*
> diff --git a/xen/arch/arm/smpboot.c b/xen/arch/arm/smpboot.c
> index 7bfd0a73a7..5ef68976c9 100644
> --- a/xen/arch/arm/smpboot.c
> +++ b/xen/arch/arm/smpboot.c
> @@ -438,6 +438,7 @@ int __cpu_up(unsigned int cpu)
>   {
>       int rc;
>       s_time_t deadline;
> +    vaddr_t *smp_up_cpu_addr;
>   
>       printk("Bringing up CPU%d\n", cpu);
>   
> @@ -453,10 +454,22 @@ int __cpu_up(unsigned int cpu)
>       /* Tell the remote CPU what its logical CPU ID is. */
>       init_data.cpuid = cpu;
>   
> +    /*
> +     * If coloring is enabled, non-Master CPUs boot using the old Xen code.
> +     * During the boot process each cpu is booted one after another using the
> +     * smp_cpu_cpu variable. This variable is accessed in head.S using its
> +     * physical address.
> +     * That address is calculated using the physical offset of the old Xen
> +     * code. With coloring we can not rely anymore on that offset. For this
> +     * reason in order to boot the other cpus we rely on the old xen code that
> +     * was mapped during tables setup in mm.c so that we can use the old physical
> +     * offset and the old head.S code also. In order to modify the old Xen code
> +     * we need to access it using the mapped done in color_xen.
> +     */
> +    smp_up_cpu_addr = (vaddr_t *)virt_boot_xen((vaddr_t)&smp_up_cpu);

smp_up_cpu is defined as unsigned long. So shouldn't the cast be 
(unsigned long *)?

> +    *smp_up_cpu_addr = cpu_logical_map(cpu);

Why is this line moved before the comment: "/* Open ... */"?

>       /* Open the gate for this CPU */
> -    smp_up_cpu = cpu_logical_map(cpu);
> -    clean_dcache(smp_up_cpu);
> -
> +    clean_dcache(*smp_up_cpu_addr);
>       rc = arch_cpu_up(cpu);
>   
>       console_end_sync();

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 22:07:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 22:07:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290473.492622 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTsqR-0006FE-IA; Mon, 14 Mar 2022 22:07:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290473.492622; Mon, 14 Mar 2022 22:07:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTsqR-0006F7-FP; Mon, 14 Mar 2022 22:07:15 +0000
Received: by outflank-mailman (input) for mailman id 290473;
 Mon, 14 Mar 2022 22:07:14 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nTsqQ-0006Ez-9o
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 22:07:14 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nTsqP-00064s-Ol; Mon, 14 Mar 2022 22:07:13 +0000
Received: from gw1.octic.net ([81.187.162.82] helo=[10.0.1.102])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nTsqP-00084d-HE; Mon, 14 Mar 2022 22:07:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:Subject:
	From:References:Cc:To:MIME-Version:Date:Message-ID;
	bh=b5rG/0rd0ntDk4bfE98IN9mCR1FrVs+Kcr900eCZF7I=; b=mgvpEyfm9tt0kZPVMq8yawhdKs
	S6SH/diUu8RowaCzJx74uy6eR38LlU4sOBbHJ0mGmrRiQe8NumuTA8DzH0aps7ZHUitPTb+nhorLg
	5yer4iG/8QBptiR5eBQYagRLGS1NrNZYVNKSprPErPX/VkeHKcjBQVdgDZGdwKngTYqg=;
Message-ID: <e55e0377-dba1-aac3-6628-b1b371269815@xen.org>
Date: Mon, 14 Mar 2022 22:07:11 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
To: Marco Solieri <marco.solieri@minervasys.tech>,
 xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-34-marco.solieri@minervasys.tech>
From: Julien Grall <julien@xen.org>
Subject: Re: [PATCH 33/36] doc, xen-command-line: introduce coloring options
In-Reply-To: <20220304174701.1453977-34-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Marco,

On 04/03/2022 17:46, Marco Solieri wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> Four additional parameters in the Xen command line are used to define
> the underlying coloring policy, which is not directly configurable
> otherwise.
> 
> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
> ---
>   docs/misc/xen-command-line.pandoc | 51 +++++++++++++++++++++++++++++--
>   1 file changed, 49 insertions(+), 2 deletions(-)
> 
> diff --git a/docs/misc/xen-command-line.pandoc b/docs/misc/xen-command-line.pandoc
> index efda335652..a472d51cf9 100644
> --- a/docs/misc/xen-command-line.pandoc
> +++ b/docs/misc/xen-command-line.pandoc
> @@ -299,6 +299,20 @@ can be maintained with the pv-shim mechanism.
>       cause Xen not to use Indirect Branch Tracking even when support is
>       available in hardware.
>   
> +### buddy\_size (arm64)
> +> `= <size in megabyte>`
> +
> +> Default: `64 MB`
> +
> +Amount of memory reserved for the buddy allocator when colored allocator is
> +active. This options is useful only if coloring support is enabled.
> +The colored allocator is meant as an alternative to the buddy allocator,
> +since its allocation policy is by definition incompatible with the
> +generic one. Since the Xen heap systems is not colored yet, we need to
> +support the coexistence of the two allocators for now. This parameter, which is
> +optional and for expert only, is used to set the amount of memory reserved to
> +the buddy allocator.

A few questions:
   - How did you chose the default?
   - How can a user decide the size of the buddy_size?

> +
>   ### clocksource (x86)
>   > `= pit | hpet | acpi | tsc`
>   
> @@ -884,7 +898,17 @@ Controls for the dom0 IOMMU setup.
>   
>       Incorrect use of this option may result in a malfunctioning system.
>   
> -### dom0_ioports_disable (x86)

This change sounds unrelated to the patch itself. I would also expect 
that we would want to backport it. So can this be backported.

> +### dom0\_colors (arm64)
> +> `= List of <integer>-<integer>`
> +
> +> Default: `All available colors`
> +
> +Specify dom0 color configuration. If the parameter is not set, all available
> +colors are chosen and the user is warned on Xen's serial console. This color
> +configuration acts also as the default one for all DomUs that do not have any
> +explicit color assignment in their configuration file.
> +
> +### dom0\_ioports\_disable (x86)
>   > `= List of <hex>-<hex>`
>   
>   Specify a list of IO ports to be excluded from dom0 access.
> @@ -2625,6 +2649,20 @@ unknown NMIs will still be processed.
>   Set the NMI watchdog timeout in seconds.  Specifying `0` will turn off
>   the watchdog.
>   
> +### way\_size (arm64)
> +> `= <size in byte>`
> +
> +> Default: `Obtained from the hardware`
> +
> +Specify the way size of the Last Level Cache. This parameter is only useful with
> +coloring support enabled. It is an optional, expert-only parameter and it is
> +used to calculate what bits in the physical address can be used by the coloring
> +algorithm, and thus the maximum available colors on the platform. It can be
> +obtained by dividing the total LLC size by the number of associativity ways.
> +By default, the value is also automatically computed during coloring
> +initialization to avoid any kind of misconfiguration. For this reason, it is
> +highly recommended to use this boot argument with specific needs only.

Given the last two sentences, why would someone wants to use it?

> +
>   ### x2apic (x86)
>   > `= <boolean>`
>   
> @@ -2642,7 +2680,16 @@ In the case that x2apic is in use, this option switches between physical and
>   clustered mode.  The default, given no hint from the **FADT**, is cluster
>   mode.
>   
> -### xenheap_megabytes (arm32)

Same here.

> +### xen\_colors (arm64)
> +> `= List of <integer>-<integer>`
> +
> +> Default: `0-0: the lowermost color`
> +
> +Specify Xen color configuration.
> +Two colors are most likely needed on platforms where private caches are
> +physically indexed, e.g. the L1 instruction cache of the Arm Cortex-A57.

How can someone decide the number of colors to be used for Xen?

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 22:17:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 22:17:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290477.492634 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTt0L-0007qb-Hf; Mon, 14 Mar 2022 22:17:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290477.492634; Mon, 14 Mar 2022 22:17:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTt0L-0007qU-Eh; Mon, 14 Mar 2022 22:17:29 +0000
Received: by outflank-mailman (input) for mailman id 290477;
 Mon, 14 Mar 2022 22:17:27 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nTt0J-0007qO-M6
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 22:17:27 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nTt0I-0006FC-TE; Mon, 14 Mar 2022 22:17:26 +0000
Received: from home.octic.net ([81.187.162.82] helo=[10.0.1.102])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nTt0I-0000N1-NB; Mon, 14 Mar 2022 22:17:26 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:Subject:
	From:References:Cc:To:MIME-Version:Date:Message-ID;
	bh=/JMkfVbjvJoUrBVgIkbk7OJ/HowPnJtGt7OZ1kUa3bM=; b=leX+sgX4MgC3Qx+Js6CyHsJzg5
	6gRocbAI2nxjEuZxiTq+GEN95FYnRNmbsPgelh7yAKSboto9mWMAiBvkMlKTWgGPEfADYvkq/ybnM
	FCPFH30/1s7u69U1WyNYsfxaixtAAvI95+zYUKuAKuLIMVlxuVgXYY830Ez5w1BUYSWo=;
Message-ID: <0bba1cf7-dd08-c908-251d-e712eb819a8a@xen.org>
Date: Mon, 14 Mar 2022 22:17:24 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
To: Marco Solieri <marco.solieri@minervasys.tech>,
 xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-36-marco.solieri@minervasys.tech>
From: Julien Grall <julien@xen.org>
Subject: Re: [PATCH 35/36] doc, device-tree: introduce 'colors' property
In-Reply-To: <20220304174701.1453977-36-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 04/03/2022 17:47, Marco Solieri wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> Dom0less uses device tree for DomUs when booting them without using
> Dom0. Add a new device tree property 'colors' that specifies the
> coloring configuration for DomUs when using Dom0less.
> 
> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>

The documentation is small enough that I would prefer if this is folded 
in the patch parsing the property.

> ---
>   docs/misc/arm/device-tree/booting.txt | 3 +++
>   1 file changed, 3 insertions(+)
> 
> diff --git a/docs/misc/arm/device-tree/booting.txt b/docs/misc/arm/device-tree/booting.txt
> index a94125394e..44971bfe60 100644
> --- a/docs/misc/arm/device-tree/booting.txt
> +++ b/docs/misc/arm/device-tree/booting.txt
> @@ -162,6 +162,9 @@ with the following properties:
>   
>       An integer specifying the number of vcpus to allocate to the guest.
>   
> +- colors
> +    A 64 bit bitmask specifying the color configuration for the guest.

Why are we limiting dom0less domUs to 64 colors when Xen can support up 
to 128 colors (potentially more in the future)?

To avoid tie the bindings too much to Xen, I would instead explicitly 
list the colors. Something like:

colors = < 10 20 30 >

This would also help users that manually write the DT to confirm they 
put the correct numbers.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 22:40:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 22:40:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290482.492645 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTtMm-0002zW-Dz; Mon, 14 Mar 2022 22:40:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290482.492645; Mon, 14 Mar 2022 22:40:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTtMm-0002zP-At; Mon, 14 Mar 2022 22:40:40 +0000
Received: by outflank-mailman (input) for mailman id 290482;
 Mon, 14 Mar 2022 22:40:38 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=zLdK=TZ=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nTtMk-0002yY-36
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 22:40:38 +0000
Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com
 [205.220.165.32]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c3028d0c-a3e7-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 23:40:36 +0100 (CET)
Received: from pps.filterd (m0246617.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 22EKrrsg003078; 
 Mon, 14 Mar 2022 22:39:41 GMT
Received: from aserp3020.oracle.com (aserp3020.oracle.com [141.146.126.70])
 by mx0b-00069f02.pphosted.com with ESMTP id 3et5fu1pce-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Mon, 14 Mar 2022 22:39:41 +0000
Received: from pps.filterd (aserp3020.oracle.com [127.0.0.1])
 by aserp3020.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 22EMVjAR111023;
 Mon, 14 Mar 2022 22:39:40 GMT
Received: from nam10-bn7-obe.outbound.protection.outlook.com
 (mail-bn7nam10lp2109.outbound.protection.outlook.com [104.47.70.109])
 by aserp3020.oracle.com with ESMTP id 3et64jgy7h-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Mon, 14 Mar 2022 22:39:40 +0000
Received: from CH0PR10MB5020.namprd10.prod.outlook.com (2603:10b6:610:c0::22)
 by CH0PR10MB5115.namprd10.prod.outlook.com (2603:10b6:610:c4::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Mon, 14 Mar
 2022 22:39:38 +0000
Received: from CH0PR10MB5020.namprd10.prod.outlook.com
 ([fe80::e52b:dcd7:84b9:cbd0]) by CH0PR10MB5020.namprd10.prod.outlook.com
 ([fe80::e52b:dcd7:84b9:cbd0%9]) with mapi id 15.20.5061.028; Mon, 14 Mar 2022
 22:39:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c3028d0c-a3e7-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=YUB3eyOnJQjBJ29CUuL6JrbNLuLwNjWuywF7K5wFCzg=;
 b=wcT5+HWZUtlaqV9xbhwbwgjKtgxbYWoJpxJsmyNRy1cu9NIyDDl84ZcmQxAV1jAxG/lb
 2A9pq25IdVO2RJKktbnxBgnLZRc8zrwMpYRVWFBRc9SrZNKBYijoyH+UMUgfShOvK8Xx
 ZcHz/a4/nmS/T8TzE9O+ANjNUy1sUKXKKG5zPIgivN6mmGzd1YVHuZKaJoipqQBkcrsQ
 OlKlGXEyzVs/rpR9k71yYnAAX0xMiiGccxFU3vky2HwJKpwPTLAMfnhRUMdLJtiqHPiO
 8eGZul6SK4gHUoNLusiJCeDlgWhbx8yZN1dcly2SJw51YzTfbHwtpIvatiOa+RJWjY7T 6Q== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=lND4Kd5AF0MzEjgziIBmsPBR9ab6DWR+ODdTU9sJhmxd/aW+3lqhHgJlwEybqQcK5wvka/pgU4wQ8iLTjtkbcZLLlA3jSb0guuhALqD27c6Uqs6w4kNPkKlM9fYrrBWnKLARUKBwg7XYHZxCYmlODD1U4wv/scj41QqukCAzbH4T3UIvWBTLW3Zzql3PfWryzsPgGbGeri4NgFns2RgStoI4hPn9BR01crulKlhol52YRZzWnPodfnx8bJJDQrIrnrraHp0Lu0cSUmgoqiX7ZcQRl7ChOx9ZG3X44m8tVJX+ZrKsX/dRrHJ+Whxz/hSbulV3fBWgZBtgP7FB7gg2HA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=YUB3eyOnJQjBJ29CUuL6JrbNLuLwNjWuywF7K5wFCzg=;
 b=O0+zzUGW9wpSqP6kbMqJ0x4bUcxLQX6e6tiExVq9iAAa2Rb0E37dlE24qNL5hxsqvS9O88dG6PMnzEmBp/yjBCwMoEfkYwm2SwwOHp3P+R9X3AaIRKK76eNSvun8ploaJybrAwRX62v3Zz2fIHxs+qu73BhB4A4l30cgHu4qocWJXOOEZH3VvK2WwoAq2WsYeDpA+KjLXi3Ek5f8pEuysRQ2bzJvRHdj7K9rDZWHCZUREjvQeo6Je1RQPurY15iArQA7Fch0Rtix2qEwUsNdKJaszIe7Va1wL4tjPMNVOcU6HrOb+9h0Rn9ftSjeF4G8r52iVRuG6jvuBhG6TFveZw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=YUB3eyOnJQjBJ29CUuL6JrbNLuLwNjWuywF7K5wFCzg=;
 b=mpN+wyd3xPOapE4hcyl/a0BoNEn233/KW75faPdYP8gGdiriezxx+vnRAPE7Uxkc7qK0AR0UCJroOOVy/38GKYfkwL8tgG+FSaST2mkmhLIB14o8lZx16lae7QAJN4RliEa8ORTen/vB2MDqDJZFWABNFG+5vj1tlLUreb9gK2A=
Message-ID: <4d800aa8-5e38-1ad9-284f-1754c83d0f8a@oracle.com>
Date: Mon, 14 Mar 2022 18:39:21 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH 12/15] swiotlb: provide swiotlb_init variants that remap
 the buffer
Content-Language: en-US
To: Christoph Hellwig <hch@lst.de>, iommu@lists.linux-foundation.org
Cc: x86@kernel.org, Anshuman Khandual <anshuman.khandual@arm.com>,
        Tom Lendacky <thomas.lendacky@amd.com>,
        Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
        Stefano Stabellini <sstabellini@kernel.org>,
        Juergen Gross
 <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
        David Woodhouse <dwmw2@infradead.org>,
        Lu Baolu <baolu.lu@linux.intel.com>,
        Robin Murphy <robin.murphy@arm.com>,
        linux-arm-kernel@lists.infradead.org, xen-devel@lists.xenproject.org,
        linux-ia64@vger.kernel.org, linux-mips@vger.kernel.org,
        linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org,
        linux-s390@vger.kernel.org, linux-hyperv@vger.kernel.org,
        tboot-devel@lists.sourceforge.net, linux-pci@vger.kernel.org
References: <20220314073129.1862284-1-hch@lst.de>
 <20220314073129.1862284-13-hch@lst.de>
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
In-Reply-To: <20220314073129.1862284-13-hch@lst.de>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: BYAPR05CA0010.namprd05.prod.outlook.com
 (2603:10b6:a03:c0::23) To CH0PR10MB5020.namprd10.prod.outlook.com
 (2603:10b6:610:c0::22)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 10731717-0988-4e71-1982-08da060b8564
X-MS-TrafficTypeDiagnostic: CH0PR10MB5115:EE_
X-Microsoft-Antispam-PRVS: 
	<CH0PR10MB51153240CDB5265CD0BA78358A0F9@CH0PR10MB5115.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	J3bgRFBLV/4FRgN5UplzfxvwakHV2UmmO8g0f87nGPRZfXHD4NSaijqc7RoHFmRaqtX49TpKjWOpbouoB2SGc+RrfYZzX8bQWvabweaYhGYYB9PpA5Pbz0M8t0DiMqr/zNY3Zq34XRrmqONoaEMoX76Ng8hYOPxd6/CJFTQU8PKXF4AGEjsJ5oZzJxQ+eucZ1464gVpUNWczWBsX/r+O1IcRejrf/58Dmb8tAA65sJfEyi9bFvpbZVQNjVjt8gV4TTChzDSAcKRSb2k9MgrY+Tney28oF4YtrVPVJRUwMOHusls5WPYum2IWzNXr7wtWpJU+2JTsceAHTmomPKvtbk5VXKZe/62ggyDoOFgqW7Lorki3EtKfSz4iJl+8NZHsNP4W/vWshmi2mqPiSrV9qWejkBLcQtwBxOlqPoTnslyFTVGExp1f2j673XerQl49ljAFhHModZOzcQG92ZT4GyMf0tMFs1hqfqAx0pQ3/u8EFhZeEKMOpFHRZjNFH9vR5y1H2tSbhe/zYdye5GVy6lj6DmrhfUqZeZe7LB55GYwvwvtjc/4Fj1pey6OHDiUkQErKbU3LUXPY4JGOi4yRkz9gzNICM6g9z3/kGGVo0EAAiWVzesHtWSXDCYbTQPA6Wi9lPJ3x8ODVBGiqsY8ipJg1zBDO1XdyC474qq0xUx6JdkqG+VuYGaGgOoIKB3xIrehaUE5U3+qi6YckknYJKO1NFl/hSBP1wiO8DfDloBW4M0AmVhrpkkx4GoEHA8rp
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CH0PR10MB5020.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(54906003)(38100700002)(316002)(66946007)(31686004)(66476007)(66556008)(8676002)(36756003)(4326008)(31696002)(5660300002)(83380400001)(6666004)(8936002)(44832011)(6486002)(86362001)(6512007)(6506007)(2616005)(53546011)(186003)(26005)(2906002)(508600001)(7416002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?WU1oQzdxaGo2Snp3b0RmZ3h3d3BzSk9GSlQ1SHNDSUZ3ellic0Exb2xZWkNP?=
 =?utf-8?B?YWQrMzJHT01ZWGt1WmRJdTA1L2ZtQldybjJ1NDFCTjJVOFZrcGNCTlNrVWxM?=
 =?utf-8?B?ampXdmNsdVlldWxaUUR3WDlkZ0FlQ0hXemdyaEx3Si9IR0NKZU9FaFlKbnll?=
 =?utf-8?B?dHRIZFJ4ZXNFNUpXUVk1b2pVMTUybHhwSW5PVHhEMnV5cUs5UmRoeVFFcENx?=
 =?utf-8?B?VGNydmcycXAyQ0w4L2lmQkdYSDNGSzZIdE11OW5saU5TOE1OYllOcHJLOVBq?=
 =?utf-8?B?MkhuNk1ZOHBMcjdtQmt3YTY1eWQvSWh3Sm1vZG8vSzB0SjZzOXBVUjgrakpB?=
 =?utf-8?B?T0E3MGdQek55T21kUllyOWdDWS8veTJrRTdMNDdtaGRSN0FDbVVRNHdSRnhC?=
 =?utf-8?B?eTJCVmtoYTlmVDgzY0tOajhEK29lTENlUkxwY2xFTkJ6eDRFdmJBYUROMURC?=
 =?utf-8?B?OXFKVmhWWXp4QmtsdGY3UlU0ZldhNG1VVVZXZmwvUSthK0VlNlpoWERiUGJL?=
 =?utf-8?B?VjlRSjY2MDNnbVh5STN5U2FXUmVRQXBYVTlYcUtHb0xJclZrOE43d2pFNmFR?=
 =?utf-8?B?cHQ0bjhoeitCbk5EVXU3bk9EeGlQQ3JLdSswSFl0dWZPblRxaHcwbmo2UWJ3?=
 =?utf-8?B?b1psYm94enlpK3orUWFFb2FFUXBocUw1S2sweURFKzMxU0YyWmZaMUdscVZ4?=
 =?utf-8?B?NU1zTWVnSWdTRE9vdXArUnZCa2Y3Q1VkZzVGc1hYT2R0VU9ySnVGRFhFUmdF?=
 =?utf-8?B?NUNidzRoa0h0WStVYTlHVWcyRE1HR3NhSWVsZTArcjJVYXV1dzRkcWVkRXhQ?=
 =?utf-8?B?Z01KSytUUWJ1Ykh4V052dWYyMmo0NStqdURRbWNpSEZOV001aG1Jb3JMNHk0?=
 =?utf-8?B?Q2FLZmJzV3pDVnVZMHdWaFg3TUs4RDZUR3N1b1BhRVRWMTVHdEY3NjFoREc0?=
 =?utf-8?B?RFhzS2RsdCtLWFVSUWdCdHZUdmNkU1Q0NTFudk15RndtdG8ybkNFNUVjVUxU?=
 =?utf-8?B?MEJoaTNtSCs3N1dZQmRjZzB3R0xsL2MySWM0QXBkZTgwYWRoSy9nc2JvQnFE?=
 =?utf-8?B?MG5NMjEyeGhkWWRCMmNja2dST0svQlFQMHdhWlRQMk9Fd2Q3WUltdnR6SFRq?=
 =?utf-8?B?WkF0Z2N6R2JUMk5GUVlYTkZRYTZTUFk1UlppdUpvRGZIVk5MRENla0pmck9E?=
 =?utf-8?B?b3pGRllCcjZWVHZIMjd6NUJZWElJM0hQUDNBTVZ3cndOTzU5aTcvS1BMRFpn?=
 =?utf-8?B?YVFadk5NTUh5emE3Rkt1UGVVQ05OU1g4RzBXbUptTWVpN28zZmpmN2VXYlpw?=
 =?utf-8?B?akN0R3NKRDlpdHpMZmQzSmhDd2xGTVVqbDZyakxVV0w3V1oyU0VqSDIzVjZB?=
 =?utf-8?B?dXRQUE5WMWpqTkpGcjdiWC9La0x1bTF2SU16SXl2R2U5ZkpVTHRVYlFHY1Fy?=
 =?utf-8?B?QnB2a084VWdmRjQxcXZXbnlHMHA0dGpXOTRlQUM3SkZkajRSdVpWRUJqSEIr?=
 =?utf-8?B?VjFpUlZyN3Bkbzl3dUpLNklNdDR3a0ZhQW5RR3ZBSGUxazF4YlVLL01FdFlB?=
 =?utf-8?B?ZzhDdnhvaDF1SnlPMjNMODlBdjR1bXNJN0ZLMm45bk9Oc2tkRENYRGtNWG1P?=
 =?utf-8?B?S1R0ZUpCQTVXamVmSEdrMk1WQS9vUVZmdDhKUm5jUmZiVEhpL0NRZ0V6SDVV?=
 =?utf-8?B?Um9NQ3N6VXdvT25Rb0tralQvT3ZQdjFKM1l4bkVzTGNoS3RHVm1ibEVXbHdV?=
 =?utf-8?B?cm5Nb1BXTHlsZmo5Ykk1c0dpUVhob2FrVWZoYVpnV3RkSnpyQzhGNmFTbjNG?=
 =?utf-8?B?NGZXeXVlWVJibzBVaXQ3c25zek9xbmR6VjVxQVBIOUdkWFpxeWNFa0UwUk5w?=
 =?utf-8?B?b3VoSWdJZjBhRy9yZnA1SEVsRFZSOWVTZExiUHp0R3dEYW5CVG5TTVNLbTlu?=
 =?utf-8?B?emZVekYrVnM5aXNQUTQxWXRxK2I1dldVcmFDZFhVTm5VREFVbVFPQ1VWMHVp?=
 =?utf-8?B?RkUzbGMyVzBRPT0=?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 10731717-0988-4e71-1982-08da060b8564
X-MS-Exchange-CrossTenant-AuthSource: CH0PR10MB5020.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 22:39:38.0870
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: WvgZpS9smdVuPGmXNwQvWZfoQLLUQM2dYH7gq67QBBhZq4r3Lxl10xnErMBwsSzsIwoKaDtLJgBNkQpT6hIV5pwkkHyVpny1eCaQiJ8Nblk=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH0PR10MB5115
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10286 signatures=693139
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 adultscore=0 phishscore=0
 malwarescore=0 mlxscore=0 suspectscore=0 spamscore=0 bulkscore=0
 mlxlogscore=999 classifier=spam adjust=0 reason=mlx scancount=1
 engine=8.12.0-2202240000 definitions=main-2203140128
X-Proofpoint-GUID: M_Ojeg5hmnV_qlJcsebHEPBLHVZta-Ao
X-Proofpoint-ORIG-GUID: M_Ojeg5hmnV_qlJcsebHEPBLHVZta-Ao


On 3/14/22 3:31 AM, Christoph Hellwig wrote:
> -void __init swiotlb_init(bool addressing_limit, unsigned int flags)
> +void __init swiotlb_init_remap(bool addressing_limit, unsigned int flags,
> +		int (*remap)(void *tlb, unsigned long nslabs))
>   {
> -	size_t bytes = PAGE_ALIGN(default_nslabs << IO_TLB_SHIFT);
> +	unsigned long nslabs = default_nslabs;
> +	size_t bytes;
>   	void *tlb;
>   
>   	if (!addressing_limit && !swiotlb_force_bounce)
> @@ -271,12 +273,24 @@ void __init swiotlb_init(bool addressing_limit, unsigned int flags)
>   	 * allow to pick a location everywhere for hypervisors with guest
>   	 * memory encryption.
>   	 */
> +retry:
> +	bytes = PAGE_ALIGN(default_nslabs << IO_TLB_SHIFT);
>   	if (flags & SWIOTLB_ANY)
>   		tlb = memblock_alloc(bytes, PAGE_SIZE);
>   	else
>   		tlb = memblock_alloc_low(bytes, PAGE_SIZE);
>   	if (!tlb)
>   		goto fail;
> +	if (remap && remap(tlb, nslabs) < 0) {
> +		memblock_free(tlb, PAGE_ALIGN(bytes));
> +
> +		/* Min is 2MB */
> +		if (nslabs <= 1024)


This is IO_TLB_MIN_SLABS, isn't it? (Xen code didn't say so but that's what it meant to say I believe)


> +			panic("%s: Failed to remap %zu bytes\n",
> +			      __func__, bytes);
> +		nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
> +		goto retry;
> +	}
>
> @@ -303,6 +323,7 @@ int swiotlb_init_late(size_t size, gfp_t gfp_mask)
>   	if (swiotlb_force_disable)
>   		return 0;
>   
> +retry:
>   	order = get_order(nslabs << IO_TLB_SHIFT);
>   	nslabs = SLABS_PER_PAGE << order;
>   	bytes = nslabs << IO_TLB_SHIFT;
> @@ -317,6 +338,17 @@ int swiotlb_init_late(size_t size, gfp_t gfp_mask)
>   
>   	if (!vstart)
>   		return -ENOMEM;
> +	if (remap)
> +		rc = remap(vstart, nslabs);
> +	if (rc) {
> +		free_pages((unsigned long)vstart, order);
> +
> +		/* Min is 2MB */
> +		if (nslabs <= 1024)


Same here.


-boris


> +			return rc;
> +		nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
> +		goto retry;
> +	}
>   
>   	if (order != get_order(bytes)) {
>   		pr_warn("only able to allocate %ld MB\n",


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 22:43:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 22:43:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290486.492655 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTtP1-0003b8-Rd; Mon, 14 Mar 2022 22:42:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290486.492655; Mon, 14 Mar 2022 22:42:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTtP1-0003b1-O3; Mon, 14 Mar 2022 22:42:59 +0000
Received: by outflank-mailman (input) for mailman id 290486;
 Mon, 14 Mar 2022 22:42:59 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTtP1-0003ap-65; Mon, 14 Mar 2022 22:42:59 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTtP1-0006fd-2x; Mon, 14 Mar 2022 22:42:59 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTtP0-00040J-Mq; Mon, 14 Mar 2022 22:42:58 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTtP0-0006cj-MQ; Mon, 14 Mar 2022 22:42:58 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=r5HqknWTJ5im0/vHXD4P5Li3/28vNTQv+rYeJlg7uEY=; b=JXOqEix0wGpjUom835lNAIh2/Q
	KFqQSrEi3lKnYSzz7vgmnxnAFFKgekqirLEADT3e22d6lfvOhxic2hkD2KzrjIUq4VDUMnag9Go5j
	CEWu03kk4ZWxPfOsx13nfGdwmfs0gJ5TMjJdV7Ge3ZSpqGb+DIkeiZDYa2/hkLcSf+aU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168589-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168589: regressions - FAIL
X-Osstest-Failures:
    xen-unstable-smoke:build-amd64:xen-build:fail:regression
    xen-unstable-smoke:test-armhf-armhf-xl:xen-boot:fail:regression
    xen-unstable-smoke:build-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-unstable-smoke:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-unstable-smoke:test-amd64-amd64-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=fef5531fd8f311b347970568d77e7bf4feffd7fb
X-Osstest-Versions-That:
    xen=dedb0aa42c6d1ee31805dfc61630db2c41117330
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 14 Mar 2022 22:42:58 +0000

flight 168589 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168589/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168580
 test-armhf-armhf-xl           8 xen-boot                 fail REGR. vs. 168580

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  fef5531fd8f311b347970568d77e7bf4feffd7fb
baseline version:
 xen                  dedb0aa42c6d1ee31805dfc61630db2c41117330

Last test of basis   168580  2022-03-14 10:01:40 Z    0 days
Testing same since   168589  2022-03-14 19:00:27 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
  Ayan Kumar Halder <ayankuma@xilinx.com>
  Julien Grall <jgrall@amazon.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  fail    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          blocked 
 test-armhf-armhf-xl                                          fail    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    blocked 
 test-amd64-amd64-libvirt                                     blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit fef5531fd8f311b347970568d77e7bf4feffd7fb
Author: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
Date:   Thu Mar 10 17:45:00 2022 +0000

    xen/arm64: io: Handle the abort due to access to stage1 translation table
    
    If the abort was caused due to access to stage1 translation table, Xen
    will try to set the p2m entry (assuming that the Stage 1 translation
    table is in the non MMIO region).
    If there is no such entry found, then Xen will try to map the address as
    a MMIO region (assuming that the Stage 1 translation table is in the
    direct MMIO region).
    
    If that fails as well, then there are the two following scenarios:-
    1. Stage 1 translation table being in an emulated MMIO region - Xen
    can read the region, but it has no way to return the value read to the
    CPU page table walker (which tries to go through the stage1 tables to
    resolve the translation fault).
    
    2. Stage 1 translation table address is invalid.
    
    In both the above scenarios, Xen will forward the abort to the guest.
    
    Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
    Reviewed-by: Julien Grall <jgrall@amazon.com>

commit 9e5a68a6652cc54ce3cb3b0ce208eeed79d5aeb5
Author: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
Date:   Thu Mar 10 17:44:59 2022 +0000

    xen/arm64: io: Support instructions (for which ISS is not valid) on emulated MMIO region using MMIO/ioreq handler
    
    When an instruction is trapped in Xen due to translation fault, Xen
    checks if the ISS is invalid (for data abort) or it is an instruction
    abort. If so, Xen tries to resolve the translation fault using p2m page
    tables. In case of data abort, Xen will try to map the mmio region to
    the guest (ie tries to emulate the mmio region).
    
    If the ISS is not valid and it is a data abort, then Xen tries to
    decode the instruction. In case of ioreq, Xen  saves the decoding state,
    rn and imm9 to vcpu_io. Whenever the vcpu handles the ioreq successfully,
    it will read the decoding state to determine if the instruction decoded
    was a ldr/str post indexing (ie INSTR_LDR_STR_POSTINDEXING). If so, it
    uses these details to post increment rn.
    
    In case of mmio handler, if the mmio operation was successful, then Xen
    retrives the decoding state, rn and imm9. For state ==
    INSTR_LDR_STR_POSTINDEXING, Xen will update rn.
    
    If there is an error encountered while decoding/executing the instruction,
    Xen will forward the abort to the guest.
    
    Also, the logic to infer the type of instruction has been moved from
    try_handle_mmio() to try_decode_instruction() which is called before.
    try_handle_mmio() is solely responsible for handling the mmio operation.
    
    Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
    Acked-by: Julien Grall <jgrall@amazon.com>
    Reviewed-by: Stefano Stabellini <sstabellini@kernel.org>

commit f9dd8436e3b826e4ca2284effa4c0285527ea763
Author: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
Date:   Thu Mar 10 17:44:58 2022 +0000

    xen/arm64: Decode ldr/str post increment operations
    
    At the moment, Xen does not decode any of the arm64 instructions. This
    means that when hsr_dabt.isv == 0, Xen cannot handle those instructions.
    This will lead to Xen to abort the guests (from which those instructions
    originate).
    
    With this patch, Xen is able to decode ldr/str post indexing instructions.
    These are a subset of instructions for which hsr_dabt.isv == 0.
    
    The following instructions are now supported by Xen :-
    1.      ldr     x2,    [x1],    #8
    2.      ldr     w2,    [x1],    #-4
    3.      ldr     x2,    [x1],    #-8
    4.      ldr     w2,    [x1],    #4
    5.      ldrh    w2,    [x1],    #2
    6.      ldrb    w2,    [x1],    #1
    7.      str     x2,    [x1],    #8
    8.      str     w2,    [x1],    #-4
    9.      strh    w2,    [x1],    #2
    10.     strb    w2,    [x1],    #1
    
    In the subsequent patch, decode_arm64() will get invoked when
    hsr_dabt.isv == 0.
    
    Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
    Reviewed-by: Stefano Stabellini <sstabellini@kernel.org>
(qemu changes not included)


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 22:55:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 22:55:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290496.492667 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTtat-0005JS-4S; Mon, 14 Mar 2022 22:55:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290496.492667; Mon, 14 Mar 2022 22:55:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTtat-0005JL-1M; Mon, 14 Mar 2022 22:55:15 +0000
Received: by outflank-mailman (input) for mailman id 290496;
 Mon, 14 Mar 2022 22:55:14 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=bxqh=TZ=linaro.org=alex.bennee@srs-se1.protection.inumbo.net>)
 id 1nTtas-0005JA-4K
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 22:55:14 +0000
Received: from mail-ej1-x632.google.com (mail-ej1-x632.google.com
 [2a00:1450:4864:20::632])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id cda81d26-a3e9-11ec-853b-5f4723681683;
 Mon, 14 Mar 2022 23:55:11 +0100 (CET)
Received: by mail-ej1-x632.google.com with SMTP id yy13so37429686ejb.2
 for <xen-devel@lists.xenproject.org>; Mon, 14 Mar 2022 15:55:11 -0700 (PDT)
Received: from zen.linaroharston ([51.148.130.216])
 by smtp.gmail.com with ESMTPSA id
 f7-20020a17090631c700b006b293ddbca1sm7314593ejf.35.2022.03.14.15.55.09
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Mon, 14 Mar 2022 15:55:10 -0700 (PDT)
Received: from zen (localhost [127.0.0.1])
 by zen.linaroharston (Postfix) with ESMTP id 47A0E1FFB7;
 Mon, 14 Mar 2022 22:55:09 +0000 (GMT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cda81d26-a3e9-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=linaro.org; s=google;
        h=references:user-agent:from:to:cc:subject:date:in-reply-to
         :message-id:mime-version:content-transfer-encoding;
        bh=y2Q/inabtnNQGMD1STwoVXN1cYBrHr5EEIPdNdUQA8M=;
        b=B3Ph160SYsccuR00NVF/PocSGd5KiKeGpNJQ+RhhnFCFJnM/0IodWWwadeJcwcmY+1
         p7mK/8zR77h4sFn6DIJS4jdi8ycIdBa6GBZQ6BXKTb3vVVmexiMZjgQShP38GekQRhLR
         OFFa1yqM6ceyWSEt+cqGDYutIRVgD92f7oipq5Mg9BeeGJDwvUB0CNZczv+2oAKHL7RU
         XtPyTH4G288CVUiVrITqt6JutYE0Qb0TgEX3xgugz+3QvZ9/Wgx/vbThbekaqzBLCdmr
         djWEZim/YuTV6z1bWLbTLYuLWSD1hi3Ql3isNXnEieORmw90FONvnt5WSh0jULarEWnD
         mY5Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:references:user-agent:from:to:cc:subject:date
         :in-reply-to:message-id:mime-version:content-transfer-encoding;
        bh=y2Q/inabtnNQGMD1STwoVXN1cYBrHr5EEIPdNdUQA8M=;
        b=nt4RsFw7IJKzMgIm9J9k3tHQtwxZkyM5XT5FmMcCNunOWFvq5vYddC+8A+OY7MJy+/
         lO/Yx6McR2v/nq471hopV9VjRvdSAgsOIzAgpORr+rwbwLVJj6ScysCZIK/cj5oySZ0O
         xqSwAVj/OD92Gie2Gsb7ZE8TC1DfrF8AV5+L5aptNzltx0p3XP65CmdC5FMPX4qYLqFr
         3hZAwQxhEniXE70R2ccJWUYpiGGb52ijpVE0zA3uNFCPJoQFyn1yIuHIkOBcL9W5BP/o
         N35BErJ3S/fK4nhbpEcDsPdLwAgr2e8Kw/6DsEIRDQP8HYrOAD1F1hYKroHgKb+bqaQp
         Ugpw==
X-Gm-Message-State: AOAM530wYltHrbiQJE3cJz/YpZSsSpf5Ef+6Z1W5hTKCWe8FCNHUhHfY
	JjJTJgn1fRO2eM3UznOUnJQ+FQ==
X-Google-Smtp-Source: ABdhPJwH8+Emwxdug9WRaA5Pn7fnzwuIyGSHomy+CWFwvXssMscVFR/0TRAwIvo8vB6/HLdlnvsYkw==
X-Received: by 2002:a17:907:3f9c:b0:6d8:116d:476b with SMTP id hr28-20020a1709073f9c00b006d8116d476bmr20220654ejc.432.1647298511045;
        Mon, 14 Mar 2022 15:55:11 -0700 (PDT)
References: <20220314160108.1440470-1-armbru@redhat.com>
 <20220314160108.1440470-4-armbru@redhat.com>
User-agent: mu4e 1.7.10; emacs 28.0.92
From: Alex =?utf-8?Q?Benn=C3=A9e?= <alex.bennee@linaro.org>
To: Markus Armbruster <armbru@redhat.com>
Cc: qemu-devel@nongnu.org, Paolo Bonzini <pbonzini@redhat.com>, Richard
 Henderson <richard.henderson@linaro.org>, Gerd Hoffmann
 <kraxel@redhat.com>, Christian Schoenebeck <qemu_oss@crudebyte.com>,
 "Gonglei (Arei)" <arei.gonglei@huawei.com>, =?utf-8?Q?Marc-Andr=C3=A9?=
 Lureau
 <marcandre.lureau@redhat.com>, "Michael S. Tsirkin" <mst@redhat.com>, Igor
 Mammedov <imammedo@redhat.com>, Ani Sinha <ani@anisinha.ca>, Laurent
 Vivier <lvivier@redhat.com>, Amit Shah <amit@kernel.org>, Peter Maydell
 <peter.maydell@linaro.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Anthony Perard <anthony.perard@citrix.com>, Paul Durrant <paul@xen.org>,
 =?utf-8?Q?Herv=C3=A9?= Poussineau <hpoussin@reactos.org>, Aleksandar Rikalo
 <aleksandar.rikalo@syrmia.com>, Corey Minyard <cminyard@mvista.com>,
 Patrick Venture <venture@google.com>, Eduardo Habkost
 <eduardo@habkost.net>, Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
 Peter Xu <peterx@redhat.com>, Jason Wang <jasowang@redhat.com>,
 =?utf-8?Q?C=C3=A9dric?= Le
 Goater <clg@kaod.org>, Daniel Henrique Barboza <danielhb413@gmail.com>,
 David Gibson <david@gibson.dropbear.id.au>, Greg Kurz <groug@kaod.org>,
 Philippe =?utf-8?Q?Mathieu-Daud=C3=A9?= <f4bug@amsat.org>, Jean-Christophe
 Dubois
 <jcd@tribudubois.net>, Keith Busch <kbusch@kernel.org>, Klaus Jensen
 <its@irrelevant.dk>, Yuval Shaia <yuval.shaia.ml@gmail.com>, Yoshinori
 Sato <ysato@users.sourceforge.jp>, Magnus Damm <magnus.damm@gmail.com>,
 Fabien Chouteau <chouteau@adacore.com>, KONRAD Frederic
 <frederic.konrad@adacore.com>, Mark Cave-Ayland
 <mark.cave-ayland@ilande.co.uk>, Artyom Tarasenko <atar4qemu@gmail.com>,
 Alex Williamson <alex.williamson@redhat.com>, Eric Auger
 <eric.auger@redhat.com>, Max Filippov <jcmvbkbc@gmail.com>, Juan Quintela
 <quintela@redhat.com>, "Dr. David Alan Gilbert" <dgilbert@redhat.com>,
 Konstantin Kostiuk <kkostiuk@redhat.com>, Michael Roth
 <michael.roth@amd.com>, =?utf-8?Q?Daniel_P=2E_Berrang=C3=A9?=
 <berrange@redhat.com>, Pavel
 Dovgalyuk <pavel.dovgaluk@ispras.ru>, David Hildenbrand
 <david@redhat.com>, Wenchao Wang <wenchao.wang@intel.com>, Colin Xu
 <colin.xu@intel.com>, Kamil Rytarowski <kamil@netbsd.org>, Reinoud Zandijk
 <reinoud@netbsd.org>, Sunil Muthuswamy <sunilmut@microsoft.com>, Cornelia
 Huck <cohuck@redhat.com>, Thomas Huth <thuth@redhat.com>, Eric Blake
 <eblake@redhat.com>, Vladimir Sementsov-Ogievskiy
 <vsementsov@virtuozzo.com>, John Snow <jsnow@redhat.com>,
 kvm@vger.kernel.org, qemu-arm@nongnu.org, xen-devel@lists.xenproject.org,
 qemu-ppc@nongnu.org, qemu-block@nongnu.org, haxm-team@intel.com,
 qemu-s390x@nongnu.org
Subject: Re: [PATCH 3/3] Use g_new() & friends where that makes obvious sense
Date: Mon, 14 Mar 2022 22:52:52 +0000
In-reply-to: <20220314160108.1440470-4-armbru@redhat.com>
Message-ID: <87y21c401e.fsf@linaro.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable


Markus Armbruster <armbru@redhat.com> writes:

> g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
> for two reasons.  One, it catches multiplication overflowing size_t.
> Two, it returns T * rather than void *, which lets the compiler catch
> more type errors.
>
<snip>
> diff --git a/semihosting/config.c b/semihosting/config.c
> index 137171b717..6d48ec9566 100644
> --- a/semihosting/config.c
> +++ b/semihosting/config.c
> @@ -98,7 +98,7 @@ static int add_semihosting_arg(void *opaque,
>      if (strcmp(name, "arg") =3D=3D 0) {
>          s->argc++;
>          /* one extra element as g_strjoinv() expects NULL-terminated arr=
ay */
> -        s->argv =3D g_realloc(s->argv, (s->argc + 1) * sizeof(void *));
> +        s->argv =3D g_renew(void *, s->argv, s->argc + 1);

This did indeed break CI because s->argv is an array of *char:

../semihosting/config.c:101:17: error: assignment to =E2=80=98const char **=
=E2=80=99 from incompatible pointer type =E2=80=98void **=E2=80=99 [-Werror=
=3Dincompatible-pointer-types]
  101 |         s->argv =3D g_renew(void *, s->argv, s->argc + 1);
      |                 ^
cc1: all warnings being treated as errors

So it did the job of type checking but failed to build ;-)


--=20
Alex Benn=C3=A9e


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 23:07:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 23:07:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290501.492681 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTtmA-0006zS-6j; Mon, 14 Mar 2022 23:06:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290501.492681; Mon, 14 Mar 2022 23:06:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTtmA-0006zL-3a; Mon, 14 Mar 2022 23:06:54 +0000
Received: by outflank-mailman (input) for mailman id 290501;
 Mon, 14 Mar 2022 23:06:52 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nTtm8-0006zF-9v
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 23:06:52 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nTtm7-00075P-Kn; Mon, 14 Mar 2022 23:06:51 +0000
Received: from 54-240-197-227.amazon.com ([54.240.197.227]
 helo=[10.95.108.113]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nTtm7-0003aZ-EH; Mon, 14 Mar 2022 23:06:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=rTZpWIrKVeO9IgxrNOBvjhdBktnXBBXe/eHKVytrGEM=; b=glMJSxYQJAylPAOE8f43YbdgIh
	eK4TmyEoq0DGvICbAYNhaVVvgwtcRRzaOwJyx4eNYwbarE21bqpdaEMs2PXzCUGv3Nl4BLiw72BBa
	uvGHZFiGxcpV37yamgLnSOs7R3bk74Q2QN0AMqOWZAT4jHRs2+eIolSX/Zd6JuKxBRng=;
Message-ID: <1cc71b20-ef2b-dd46-3a84-466e114eb32b@xen.org>
Date: Mon, 14 Mar 2022 23:06:48 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [XEN v10 2/4] xen/arm64: io: Support instructions (for which ISS
 is not valid) on emulated MMIO region using MMIO/ioreq handler
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>,
 xen-devel@lists.xenproject.org
Cc: sstabellini@kernel.org, stefanos@xilinx.com, Volodymyr_Babchuk@epam.com,
 bertrand.marquis@arm.com, andrew.cooper3@citrix.com,
 george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org,
 roger.pau@citrix.com, Ayan Kumar Halder <ayankuma@xilinx.com>
References: <20220310174501.62040-1-ayankuma@xilinx.com>
 <20220310174501.62040-3-ayankuma@xilinx.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220310174501.62040-3-ayankuma@xilinx.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Ayan,

On 10/03/2022 17:44, Ayan Kumar Halder wrote:
> diff --git a/xen/arch/arm/arm32/traps.c b/xen/arch/arm/arm32/traps.c
> index 9c9790a6d1..159e3cef8b 100644
> --- a/xen/arch/arm/arm32/traps.c
> +++ b/xen/arch/arm/arm32/traps.c
> @@ -18,9 +18,11 @@
>   
>   #include <xen/lib.h>
>   #include <xen/kernel.h>
> +#include <xen/sched.h>
>   
>   #include <public/xen.h>
>   
> +#include <asm/mmio.h>
>   #include <asm/processor.h>
>   #include <asm/traps.h>
>   
> @@ -82,6 +84,15 @@ void do_trap_data_abort(struct cpu_user_regs *regs)
>           do_unexpected_trap("Data Abort", regs);
>   }
>   
> +void post_increment_register(const struct instr_details *instr)
> +{
> +    /*
> +     * We have not implemented decoding of post indexing instructions for 32 bit.
> +     * Thus, this should be unreachable.
> +     */
> +    domain_crash(current->domain);

Osstest [1] is reporting a crash here. This is because 
post_increment_register() is called unconditionally.

I think you need to add:

if ( instr->state != INSTR_LDR_STR_POSTINDEXING )

Also, given this is called unconditionally, I think the function needs 
to be renamed to some more generic. Maybe finalize_instr_emulation() or 
similar.

I have decided to revert this patch and patch #3 for now. Please test it 
on arm32 and respin it.

While you are at it, please make sure the title is no longer than
80 characters.

Cheers,


> +}
> +


[1] 
http://logs.test-lab.xenproject.org/osstest/logs/168589/test-armhf-armhf-xl/info.html

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 23:10:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 23:10:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290505.492692 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTtp9-0007js-MO; Mon, 14 Mar 2022 23:09:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290505.492692; Mon, 14 Mar 2022 23:09:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTtp9-0007jl-JC; Mon, 14 Mar 2022 23:09:59 +0000
Received: by outflank-mailman (input) for mailman id 290505;
 Mon, 14 Mar 2022 23:09:58 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=zLdK=TZ=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nTtp8-0007jf-1s
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 23:09:58 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id dc337bfe-a3eb-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 00:09:55 +0100 (CET)
Received: from pps.filterd (m0246631.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 22EKrjwt008028; 
 Mon, 14 Mar 2022 23:08:15 GMT
Received: from userp3020.oracle.com (userp3020.oracle.com [156.151.31.79])
 by mx0b-00069f02.pphosted.com with ESMTP id 3et5s6hn37-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Mon, 14 Mar 2022 23:08:14 +0000
Received: from pps.filterd (userp3020.oracle.com [127.0.0.1])
 by userp3020.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 22EMppAP056598;
 Mon, 14 Mar 2022 23:08:13 GMT
Received: from nam12-mw2-obe.outbound.protection.outlook.com
 (mail-mw2nam12lp2040.outbound.protection.outlook.com [104.47.66.40])
 by userp3020.oracle.com with ESMTP id 3et6573b8x-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Mon, 14 Mar 2022 23:08:13 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
 by BN0PR10MB5335.namprd10.prod.outlook.com (2603:10b6:408:127::23)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.23; Mon, 14 Mar
 2022 23:08:11 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755]) by BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755%7]) with mapi id 15.20.5061.029; Mon, 14 Mar 2022
 23:08:11 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: dc337bfe-a3eb-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=aAP2rN1XS/6FTcwwbQ7XuGbBn7vgmces63OYSfVHz3c=;
 b=Xm+vlTtZdgncnoQIwq1TczdI1m8y0vFUjox/5FBp1R0IbsGeHf144m9WB8Fh20O96ThA
 yTg6SXLPiA1Kmfs42pfbrlqAyUbOMH9/Sg4TKptZa1X5fkcikSr7Qbvy2f74WjoM9mjs
 pYy1isIEzAstdmAVEl2Fo0ggQr+Oqt0Lt4rlW2RpN+pZWMwVZKHyHVWi1/9hVuVs9abh
 kw3v0DLyqULxT5aSbcPgsjL98aEITAyTdUWQszgtdedJT6wrnjB3NGTtHFUlsz1fAt1w
 Wld7OX8MqXrK+Dg2boxBWuV3N+q4MOv0583VUp1o7Is+ULVcrJc92o+HJIpCSl0YSaPa rg== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=KHL5BKK+VmQRxkAeSDZ8vJlJrkjcHXe/X/ICoERJF2PGEDB77y3VqdS4tEY6GN2Oe1DRKll6yFaQQWxq52GVLksLrNGXuUvsJA4uMrtwTMWXKxb+HiQms/KT/Sed5glwhZpFgK5FxVn+pGtz7IqCpqAexwHcgilpXdXGjRyHckSdGb+Xhg4kEvVesAKNe22JGvv213bcH7uw40VI0cztXGgS+io0sLASz8faFccoXQMLoq77zgGA+T224oEwqOijhzJ7pzZwW53McpApCl7S1p6o2U/3iCoUQfLT28OpaYjj00AkCGokvWokUgz48nqIgqSnpgPB1oPJF6lTQz0ZkA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=aAP2rN1XS/6FTcwwbQ7XuGbBn7vgmces63OYSfVHz3c=;
 b=VaGKfBz1Y3QDfKmZgoz5Aw6IIAg0v+KXuPBWMb78NnTxoA6b1eLvgZP5aor9UVqHkr7ks4gew0xE46+7ZlyM/vG3nKAUdoV85h08hIub1YnYzwYgg/br9iQk1lsJBk1OhmiA+J9IVXU9m6IYarDxniUnDn38i1oHnwbOqH0B3FBTjcge7vGcH48jV91qW4kiTmpOTkhwDly5VkUmSdSpTyfOnllBQ3pIXMU4k6yzO1yjL9/8qJb9q2mB9KtoLWTiml6xHMxNuUDgxXHQ2gCo3gg4ElnsfffCDNjobfBxMy1+FuM0usIWzeYRRWuS3wBPJZv3v5D55QegP+IYXlMULg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=aAP2rN1XS/6FTcwwbQ7XuGbBn7vgmces63OYSfVHz3c=;
 b=YSKxrCGuZKi1ps+y920yVbNCy5o4rXyUZa7HRfqg9JYIOAVpgcWi7XPxUushapFPMytqTwtZiy8zoeUtIKipYLTecLQWAruidqTO+DNkzwbxKhifJBByPRx8SugDw34xQqZItpyWbpirw4crRdDrIDC5qrUL25YvR+4qkjTNudg=
Message-ID: <6a43380c-b873-3f8e-5d5b-4a066ee57ac2@oracle.com>
Date: Mon, 14 Mar 2022 19:07:44 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH 13/15] swiotlb: merge swiotlb-xen initialization into
 swiotlb
Content-Language: en-US
To: Christoph Hellwig <hch@lst.de>, iommu@lists.linux-foundation.org
Cc: x86@kernel.org, Anshuman Khandual <anshuman.khandual@arm.com>,
        Tom Lendacky <thomas.lendacky@amd.com>,
        Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
        Stefano Stabellini <sstabellini@kernel.org>,
        Juergen Gross
 <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
        David Woodhouse <dwmw2@infradead.org>,
        Lu Baolu <baolu.lu@linux.intel.com>,
        Robin Murphy <robin.murphy@arm.com>,
        linux-arm-kernel@lists.infradead.org, xen-devel@lists.xenproject.org,
        linux-ia64@vger.kernel.org, linux-mips@vger.kernel.org,
        linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org,
        linux-s390@vger.kernel.org, linux-hyperv@vger.kernel.org,
        tboot-devel@lists.sourceforge.net, linux-pci@vger.kernel.org
References: <20220314073129.1862284-1-hch@lst.de>
 <20220314073129.1862284-14-hch@lst.de>
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
In-Reply-To: <20220314073129.1862284-14-hch@lst.de>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: SJ0PR03CA0030.namprd03.prod.outlook.com
 (2603:10b6:a03:33a::35) To BLAPR10MB5009.namprd10.prod.outlook.com
 (2603:10b6:208:321::10)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0e2481bc-d1b4-44ae-eac5-08da060f80e9
X-MS-TrafficTypeDiagnostic: BN0PR10MB5335:EE_
X-Microsoft-Antispam-PRVS: 
	<BN0PR10MB533595ADFCE33B7C4903371F8A0F9@BN0PR10MB5335.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BLAPR10MB5009.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(186003)(2616005)(83380400001)(86362001)(26005)(38100700002)(31696002)(2906002)(66946007)(66556008)(66476007)(54906003)(31686004)(316002)(4326008)(36756003)(8676002)(53546011)(7416002)(8936002)(5660300002)(508600001)(44832011)(6512007)(6666004)(6486002)(6506007)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?V2JVbExGNDc4MmpiL3RkUFVkUDlURXF6OEx3dWNNUDZ5OVhsOEU1RG44UXY2?=
 =?utf-8?B?bURKcnV6VDIvV0t3eExSMzhqcFZWT0Rxd3E2dFVmSGMyNUVRdFhINVVGemdW?=
 =?utf-8?B?WmEvdDNHc0NhcUtUdjc1YkxvM01TZHhSTnR0eUVDL2x4clozYmpmOGJsWFNn?=
 =?utf-8?B?SllWQlJ3MW1kUE1rRnhZdHliSnRiS3VlcDFZaFdUVUJxL250eGdUZ0I1TFJO?=
 =?utf-8?B?THhKZDNZMm0wR3lmZWkwV3E2ZUpPNDBuWS9xQnNGR3VNNGEwdjh4YnFlL3ZE?=
 =?utf-8?B?dTdoaUtJWk5mclpoakdDYW81eGZXTDB2QkhpTW14QkJmekYwMzVzdElnd0tk?=
 =?utf-8?B?WnFEOEcwL3FLcW5FWkdXTE5NT055cWI1K0JtcGNHM24rWHRyYUNJc0pUanRu?=
 =?utf-8?B?M3FDZkJ0aCtmNURmaU5LeVErR1NaOFhEdFZOcFVZMWc2eU00LzViWFFCdGRW?=
 =?utf-8?B?KzBtWUZlRk5WWExHN3NvSjVwVGZiSFlQTG1zb0o3L01UTnpDa3RYQms1eHVu?=
 =?utf-8?B?ZHBzMkU5UGh6UEV2eXFzb09tcGpWM29oVTdkMHQrR1dWcXl6dnNUYmRrVU1h?=
 =?utf-8?B?Vk1Zb3VaVlZrK3M2Q3l2UjNXQ0JBVzliQTBjSXhXUWp1ZG5aUmJ0OTBna0FB?=
 =?utf-8?B?S3IwZk9SS0xpUnFVMFFhdUVjeWFmK3ovTDdpSmNGZFVIOFAwcVdvK2NBa2o4?=
 =?utf-8?B?VEtMTUtDazVqM2VrZ2twSHQ1blVuMTdSdExKOUdTaHhTK3NDNEZlZmRwNTVk?=
 =?utf-8?B?NXpvSkhGWGdCMk5heE9LUDIrYWZZeE9BZ1I0alFhL3d0ZzEvUVVMSWdxc2ly?=
 =?utf-8?B?M0JoZE1VM2N0QWlTbjFDZHdkWlN0Zzd6OWpJdHRDVy9TS3BUWm02dklHRjQy?=
 =?utf-8?B?alFBc29md3d1N3AwWFhlZDhFM0ZmQ0RTTnFjUGpxS0xQckJraUZ2QmxoWkJX?=
 =?utf-8?B?ZEMzWUd4Mll3Q0tDaGxBN2RFa2VEM1pIUVhYVldkS2hCL0ZpOHZBSnFRRmcy?=
 =?utf-8?B?RVhQVVZGanowRHkyR2RaQUpnRnJUTnVybUc5YkJZTmllSjNvc3pBWVRTeHIx?=
 =?utf-8?B?TUxiemczZVFNZFREK0VMNnljRytGL1pXNVo1WWJ6WnJLdEtaNVdaZXVUTTRS?=
 =?utf-8?B?RzFZeTBPZGo3NFpBejc1cUZYZUhJM2JWWEJuOUJBZENGSDRZWmNuZytmUG9m?=
 =?utf-8?B?d1JhczExaUZCVWVLR3dvTVZWOXBJWm4vQ1dRUVFPd3BPb3YxMzZQUk5nMzlZ?=
 =?utf-8?B?NUpIMlJkbnVmbFc1UmIyaWhRVForVDFHR284djljOFpTZXpROWpIVUpSWG45?=
 =?utf-8?B?N3JKU1JmOGh6TG1QTi9RUUZBaG9XdHhuZTd4UG54cnBRaFExdkNMM0c5aGdo?=
 =?utf-8?B?clF1OVkwWVNZUlRadWdJUTZaa29BUnh5UnUrWmVSQU1FT1JnVFRhT2d0ZDJ0?=
 =?utf-8?B?WGx3TmpFUDRmS3NBTEhUd0VkMmMvQWpBR2JhV2hqZ2hMSW5yVUF6RzJraVp3?=
 =?utf-8?B?Y1NkWEh6em5PUGlpcEtkZVkvMXFTVkxlbTFnSVFJQzhIMGRGS0R3UWNNVlVG?=
 =?utf-8?B?K25FRHRKNCt5bVJmbjNDd0dnd1I1Y2VZdTFWS0NjWEVwZWt4S3I1b0ZzTUR0?=
 =?utf-8?B?aXExMVBITjAwczR0OGRwUDJwY25lQWx6eVBnU3ZUUEVKdE92M2pteHlUTSt5?=
 =?utf-8?B?c2ZiRnNKSE5FSUZiOFJCOXp3dldBTXR6MUoyaWx6dzRFLzN1OXBIUTVkMzN5?=
 =?utf-8?B?WittK1lINUZrVEJxVEhraDBDR0tZYitQbWRDMHRpK1B0ZEJsZG8rcWxLOHU4?=
 =?utf-8?B?ZVVXZnNjNVJuZlU3c2UxN3JHTFIyYlo1b2dkb0VaQ1JkL0VBYTgvaThzd2hR?=
 =?utf-8?B?K0FRVk9NY3pQWHFMbWd2eWZ3ZUM3aDdTSEpIa2hIZ1JjYmNYMXZHKzZ2RmxW?=
 =?utf-8?B?R0M2ODJjUVdoQmUvQWUvZ210dXNCSDRZS1N5S3ROUC9ldjJEcmNyL05zN0xr?=
 =?utf-8?B?c3RRWVZYT1ZnPT0=?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0e2481bc-d1b4-44ae-eac5-08da060f80e9
X-MS-Exchange-CrossTenant-AuthSource: BLAPR10MB5009.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 23:08:10.9538
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: WzJfRGGEtHiA7QsBW9U1/PvJGCmtp/3nWmc6fTXss12IyNyYilzRQhaQsKHE1B24o6wOdHZLetdZU4UPJSECm6WOby8LohrxCCXzP6PFltU=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN0PR10MB5335
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10286 signatures=693139
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 spamscore=0
 malwarescore=0 adultscore=0 bulkscore=0 mlxscore=0 mlxlogscore=939
 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1
 engine=8.12.0-2202240000 definitions=main-2203140131
X-Proofpoint-GUID: RnEdNpa8mj2ie4a-z_0lChTHqkc_NM84
X-Proofpoint-ORIG-GUID: RnEdNpa8mj2ie4a-z_0lChTHqkc_NM84


On 3/14/22 3:31 AM, Christoph Hellwig wrote:
> -
>   static void __init pci_xen_swiotlb_init(void)
>   {
>   	if (!xen_initial_domain() && !x86_swiotlb_enable)
>   		return;
>   	x86_swiotlb_enable = true;
> -	xen_swiotlb = true;
> -	xen_swiotlb_init_early();
> +	swiotlb_init_remap(true, x86_swiotlb_flags, xen_swiotlb_fixup);


I think we need to have SWIOTLB_ANY set in x86_swiotlb_flags here.



>   	dma_ops = &xen_swiotlb_dma_ops;
>   	if (IS_ENABLED(CONFIG_PCI))
>   		pci_request_acs();
> @@ -88,14 +85,16 @@ static void __init pci_xen_swiotlb_init(void)
>   
>   int pci_xen_swiotlb_init_late(void)
>   {
> -	int rc;
> -
> -	if (xen_swiotlb)
> +	if (dma_ops == &xen_swiotlb_dma_ops)
>   		return 0;
>   
> -	rc = xen_swiotlb_init();
> -	if (rc)
> -		return rc;
> +	/* we can work with the default swiotlb */
> +	if (!io_tlb_default_mem.nslabs) {
> +		int rc = swiotlb_init_late(swiotlb_size_or_default(),
> +					   GFP_KERNEL, xen_swiotlb_fixup);


This may be comment for previous patch but looking at swiotlb_init_late():


retry:
         order = get_order(nslabs << IO_TLB_SHIFT);
         nslabs = SLABS_PER_PAGE << order;
         bytes = nslabs << IO_TLB_SHIFT;

         while ((SLABS_PER_PAGE << order) > IO_TLB_MIN_SLABS) {
                 vstart = (void *)__get_free_pages(gfp_mask | __GFP_NOWARN,
                                                   order);
                 if (vstart)
                         break;
                 order--;
         }

         if (!vstart)
                 return -ENOMEM;
         if (remap)
                 rc = remap(vstart, nslabs);
         if (rc) {
                 free_pages((unsigned long)vstart, order);

                 /* Min is 2MB */
                 if (nslabs <= 1024)
                         return rc;
                 nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
                 goto retry;
         }

         if (order != get_order(bytes)) {
                 pr_warn("only able to allocate %ld MB\n",
                         (PAGE_SIZE << order) >> 20);
                 nslabs = SLABS_PER_PAGE << order; <=======
         }

         rc = swiotlb_late_init_with_tbl(vstart, nslabs);

Notice that we don't do remap() after final update to nslabs. We should.



-boris


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 23:13:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 23:13:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290511.492711 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTtsC-0000nE-7V; Mon, 14 Mar 2022 23:13:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290511.492711; Mon, 14 Mar 2022 23:13:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTtsC-0000n7-3m; Mon, 14 Mar 2022 23:13:08 +0000
Received: by outflank-mailman (input) for mailman id 290511;
 Mon, 14 Mar 2022 23:13:06 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=zLdK=TZ=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nTtsA-0000n1-PR
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 23:13:06 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4d4e034c-a3ec-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 00:13:05 +0100 (CET)
Received: from pps.filterd (m0246631.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 22EKrivV008016; 
 Mon, 14 Mar 2022 23:12:26 GMT
Received: from userp3020.oracle.com (userp3020.oracle.com [156.151.31.79])
 by mx0b-00069f02.pphosted.com with ESMTP id 3et5s6hn77-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Mon, 14 Mar 2022 23:12:26 +0000
Received: from pps.filterd (userp3020.oracle.com [127.0.0.1])
 by userp3020.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 22EMptt9056697;
 Mon, 14 Mar 2022 23:12:25 GMT
Received: from nam11-co1-obe.outbound.protection.outlook.com
 (mail-co1nam11lp2168.outbound.protection.outlook.com [104.47.56.168])
 by userp3020.oracle.com with ESMTP id 3et6573cnv-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Mon, 14 Mar 2022 23:12:25 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
 by CH0PR10MB4876.namprd10.prod.outlook.com (2603:10b6:610:c9::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.24; Mon, 14 Mar
 2022 23:12:22 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755]) by BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755%7]) with mapi id 15.20.5061.029; Mon, 14 Mar 2022
 23:12:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4d4e034c-a3ec-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=3MuYOLTOkylaHJzU8Tl5QA/7wYuewROYqN/cIfLF+8A=;
 b=J+m3UbiqtVgkvu8k8QZVKYh9CY9axDk5lvp0P/BqCLjEvOJlFzTwl7bdJoqT4LnIkNX/
 InIWL8qw0yoSVl27o87NFLXAa7LknZcfV8JHp72xnr+7y5cZfucPRz3SkeF3cL8O8pSE
 um+LaWXiC3+1kqsIeLaECkK7kuV2jNo//5/eGcGJ7LA9zSLeQGKH2d0U0zHoBct2q95z
 WBpS+byK5nxux83VQ3hTuzvGcv9kWENpN/+yA/MyDD1drzdfDbp+JZrATGqRhXEOl/G7
 1T38tqi2/C6/dJpJYOE4QyLM4/WIC0NfZ5CwKoG6ZXwD0YNpzEtgtrgkfq6iwQRmDVkK CA== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=aKaTad3FPHeZAPyJave5/Te4e/R8bfgkZ6OENMhHOkz1cB9XTEoBWAqZcKpxruc8bdQpIw9/TnU4GuHpWp9sSfSQr9cigVrIlPvEfL9i8Pp9JzEGSr1Qr/ttp4IOl8ztfGoySqL2Qs8OO7ZUTDYarcddPQU5gTHSecwRfCxQ0kNtOp+qKSrGrf01RVsmRMeaZhqnRqnkJW+uCqym1RzibotPqfqe3NcNpk3GrYKsTCBhxyA1h8X15OhOtr1UtvXIMOuzgscV8LRb6TPUZ3drODl4aUPXKpwL16frkqxpmNhuSUDEYIwz/O7PxYykb8zploF7Y1WFJzokiJNgnyCsjw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=3MuYOLTOkylaHJzU8Tl5QA/7wYuewROYqN/cIfLF+8A=;
 b=fFqf1COeKM460F7stQVFHzX1oMZicnWpgRGzk3+CD7j/cjXwzVxhntGHO9wMCF/tY0RExb+zjzJ0pHC7WKVajxZviZ5Ft8ovgmkh/qace9hblVTRg65NSqatCedb5jfYpYhLlOlV4ORbXkkxDITIPn2aCBLvNCZYj81W8keYyYjkRY6QcgpCe3k0Qm1FEulBmlSx2BfqZBAV2oiXDA5Ixd1yLBXR4m863gMxDd/k2eLFpGjpAe4/U53bTFDibHK6DuGyysQg6a9bOl/iqyNbLWPEjW38/VG9nVy6I6z32pk7uH/IGBQq71FdKzuwt+IeRUBlts3XlonXD6ZCHzICjA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=3MuYOLTOkylaHJzU8Tl5QA/7wYuewROYqN/cIfLF+8A=;
 b=ZYUAgIkCRev6z5c70z+1eL4y3OWTbnItacc0OGfmGKHX41+lAr5slHePQwU0bw5vn6JQLspBTkt9T4N40Npbt8b77/dyvxVsKeDcupCo1WUdXG8U+waXxfSxLZNOCM5f72lacuUV/26lk1CBeK+w6Mki8MpUVNU2NbnmRh+nQDw=
Message-ID: <ab552f6a-958a-e8c8-037f-b143119fefe5@oracle.com>
Date: Mon, 14 Mar 2022 19:11:55 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH 14/15] swiotlb: remove swiotlb_init_with_tbl and
 swiotlb_init_late_with_tbl
Content-Language: en-US
To: Christoph Hellwig <hch@lst.de>, iommu@lists.linux-foundation.org
Cc: x86@kernel.org, Anshuman Khandual <anshuman.khandual@arm.com>,
        Tom Lendacky <thomas.lendacky@amd.com>,
        Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
        Stefano Stabellini <sstabellini@kernel.org>,
        Juergen Gross
 <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
        David Woodhouse <dwmw2@infradead.org>,
        Lu Baolu <baolu.lu@linux.intel.com>,
        Robin Murphy <robin.murphy@arm.com>,
        linux-arm-kernel@lists.infradead.org, xen-devel@lists.xenproject.org,
        linux-ia64@vger.kernel.org, linux-mips@vger.kernel.org,
        linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org,
        linux-s390@vger.kernel.org, linux-hyperv@vger.kernel.org,
        tboot-devel@lists.sourceforge.net, linux-pci@vger.kernel.org
References: <20220314073129.1862284-1-hch@lst.de>
 <20220314073129.1862284-15-hch@lst.de>
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
In-Reply-To: <20220314073129.1862284-15-hch@lst.de>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: SJ0PR05CA0174.namprd05.prod.outlook.com
 (2603:10b6:a03:339::29) To BLAPR10MB5009.namprd10.prod.outlook.com
 (2603:10b6:208:321::10)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ce63db34-f038-43d7-af15-08da0610185c
X-MS-TrafficTypeDiagnostic: CH0PR10MB4876:EE_
X-Microsoft-Antispam-PRVS: 
	<CH0PR10MB487647FAA3AB7F33C110390F8A0F9@CH0PR10MB4876.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BLAPR10MB5009.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(38100700002)(316002)(2616005)(508600001)(66946007)(66556008)(66476007)(8676002)(4326008)(31696002)(6486002)(26005)(31686004)(53546011)(6506007)(36756003)(83380400001)(44832011)(6512007)(2906002)(5660300002)(7416002)(54906003)(8936002)(6666004)(86362001)(186003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?YjBocEZiT2RNV2RCVXYzZFltWkgrUk0reHJDS3RpdzBjYURyM0d1SE4veU5u?=
 =?utf-8?B?NkcyY2o3cnBzMmdhWFVQdHUzZTI4d0swU1hhNURhZjI5ZEphZkpsWEhzQ3Fm?=
 =?utf-8?B?VUVxR0VjaE94VHJBcEUzQy9meFM1ZWdNQUNPcjd5dVN5UHRWUjIvS1RrQXMr?=
 =?utf-8?B?Zi9sbFc4VGoxcktwM0xwYkdyQW9KYlNuNXdwRFBrMTNSOGNDS2JwakhPenYr?=
 =?utf-8?B?a3lkWUdRZFZMNVljeUZUWFBuQVpoVjdXbTVXcjFVSnlNVVUvdWJpQXdRTXU5?=
 =?utf-8?B?UE8wb3FRSFVBRjdEcXFoeXdpZVRncFV4NVJKWkJBeXozMTBoVjcvd01vN1Nt?=
 =?utf-8?B?Wm5pQ3ZFZUR4eUZKNXAyS09HNkJieStVOURFZ0xLV3IvTStRcHR0ay9LNVRD?=
 =?utf-8?B?cWF3SU5SeWZHU005REpzMExuOG5iaXZiQTZPaER0Q05wenNIdnJ3TU5yeEM3?=
 =?utf-8?B?c09sMktyV0dyUHVRZVF3UEh6TU1wQ1ZGWm44ZTZ6S3BjUXlvdnhFV2FSRFZH?=
 =?utf-8?B?dU9yU0c0ZGVKREJnTUxuZFY3aDJnWTJYYXdXV1BFaHhQSzMyeHYzOFVDVlJi?=
 =?utf-8?B?NzgybHROVUlFbmhlRmszb25PRkdONnVUS0lrSEtRUE9Ja09UTFZqNFVBWnkw?=
 =?utf-8?B?U0NROUxQc2VmU2VScXM3V3Q5UG5YTEFsWmx1ZEVWWm5UN3NSVG1HazhZQXJ4?=
 =?utf-8?B?MGFFNlFQeXhDVzlvZEl6Q3ZIbnVHZWhiRWNZQ3BXbXoyY1dDSzVHdmtkeWZp?=
 =?utf-8?B?U0Rlc0pUOCtNV2xscURVUHVjTkZwOFI2UklhMTEvaHZhNjdPQzNDUVBZTGJY?=
 =?utf-8?B?WFRjZ1ExMWhCMHpqWDI2YjlxREJXaHJLNWJaYWgvQ1oxOHBEc2Rkd3cvQkI3?=
 =?utf-8?B?U29BSHpyWXJXOTJNR1hjSFE5YkpzMEdGR0M3bWZ0dlVRdDAycytOZHNmOUpv?=
 =?utf-8?B?QitsVW13RlNKWkF4dElCdVRZckxRWU1iVWtDWDJhalZjSVBwMmdvSEZjQjRQ?=
 =?utf-8?B?ODM3bDV2aFFEY3RGVW5vMEtqclpzK1NuVms5Qm1zbTdWNG1YYUJyRU50SXlB?=
 =?utf-8?B?blVEVktUOWpvTFgvdEJEYkJldnhSVkJEQzM5QVZ3cXhwNm9kbnhocHFLK2RC?=
 =?utf-8?B?U2pDOWJQUVFkc3oxdTQvMkp4a0l2QUd3NE9ic3VKOEFrQUszUlVxK3NnRkJ3?=
 =?utf-8?B?SThqaVM0WGhzTWJVVUsxOVBERmpPYXlMSjk1MGxXSlZMcjZLYityTXdoaEN0?=
 =?utf-8?B?TDZpejQyZVEzSm1XS1NUVEQ3OHdFWUplWTFmZ1ExZGsxUHQ1OWthdlRueG9j?=
 =?utf-8?B?bEwxbEF4bnZoU1JZZ3hjb1NCMWovSzI1a2dTaUlxV1k1Y21GaXFOVXBmWm41?=
 =?utf-8?B?Sng3dTJPalI5U29XMXhrWVY2R2FHeHVHQVpiOHg3QXJpR09Gbmd3S0hQcDJl?=
 =?utf-8?B?Z1B0dURaMFhHc016eXFPSjJuakRYeDJEVndKS2VnNlhIcWhpekxoR081VDhs?=
 =?utf-8?B?bWtJdk9PaFAvMm56Q0FNK1UxUnA5OGxhcHFNQjJFTjhqVER0UWtoT2RqWXdS?=
 =?utf-8?B?MFFzMXFtRWQxVXlaTnhFOG9YeS9Ua010VEp3VXpoQWgvdEl0MzQrVm9jYUt6?=
 =?utf-8?B?ZFNSY2JmWEtLOVJjL0xmSFFETTRETFdQNXUzUlNRekVHMUxTcGVSNUtlSjJE?=
 =?utf-8?B?RjNrNThsSWN2d3ZtNGZkTDZwam5iNzFKUCtLM1hWOW1zdWh1WkhPQkM4c1Fo?=
 =?utf-8?B?c0lEUk9zbUhKaCttTXRGUHh4dTF3SldRQnFNREF3L3ZEWEd2cE1iMHJ1bFlx?=
 =?utf-8?B?dk82RFI4ZkdrUGp6L1Z3WEZKKyt2U1M4LytGV2hQdkJwNCtlT3RZNVBQZTZC?=
 =?utf-8?B?RkY0QU5kT1pPeGx0SkIvU0NvWndkeXJTa3lCUFRxYkFOOC94ak00eW4zdVNG?=
 =?utf-8?B?MzFDOVBUa3E0cnphQmNCWVRna3JyUHRLUmxkMWk3bGc1SUtVbzIyR3ZRZ3RJ?=
 =?utf-8?B?eHJLc01WdnJBPT0=?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ce63db34-f038-43d7-af15-08da0610185c
X-MS-Exchange-CrossTenant-AuthSource: BLAPR10MB5009.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 23:12:22.6035
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: gUi5UAK090Z5OyKDyRjbcj49X/ouK7laefLVWkhlXxliWGdCYmMOYFUXxjGj2lOX33YemdheTJ0wZW3e1PMBLMKNWmszMJpYSmJavDlJVag=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH0PR10MB4876
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10286 signatures=693139
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 spamscore=0
 malwarescore=0 adultscore=0 bulkscore=0 mlxscore=0 mlxlogscore=999
 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1
 engine=8.12.0-2202240000 definitions=main-2203140131
X-Proofpoint-GUID: ACQ41wJtjvZxEcuTUN7WbifiatMsXeKI
X-Proofpoint-ORIG-GUID: ACQ41wJtjvZxEcuTUN7WbifiatMsXeKI


On 3/14/22 3:31 AM, Christoph Hellwig wrote:
> @@ -314,6 +293,7 @@ void __init swiotlb_init(bool addressing_limit, unsigned int flags)
>   int swiotlb_init_late(size_t size, gfp_t gfp_mask,
>   		int (*remap)(void *tlb, unsigned long nslabs))
>   {
> +	struct io_tlb_mem *mem = &io_tlb_default_mem;
>   	unsigned long nslabs = ALIGN(size >> IO_TLB_SHIFT, IO_TLB_SEGSIZE);
>   	unsigned long bytes;
>   	unsigned char *vstart = NULL;
> @@ -355,33 +335,28 @@ int swiotlb_init_late(size_t size, gfp_t gfp_mask,
>   			(PAGE_SIZE << order) >> 20);
>   		nslabs = SLABS_PER_PAGE << order;
>   	}
> -	rc = swiotlb_late_init_with_tbl(vstart, nslabs);
> -	if (rc)
> -		free_pages((unsigned long)vstart, order);
> -
> -	return rc;
> -}
> -
> -int
> -swiotlb_late_init_with_tbl(char *tlb, unsigned long nslabs)
> -{
> -	struct io_tlb_mem *mem = &io_tlb_default_mem;
> -	unsigned long bytes = nslabs << IO_TLB_SHIFT;
>   
> -	if (swiotlb_force_disable)
> -		return 0;
> +	if (remap)
> +		rc = remap(vstart, nslabs);
> +	if (rc) {
> +		free_pages((unsigned long)vstart, order);
>   
> -	/* protect against double initialization */
> -	if (WARN_ON_ONCE(mem->nslabs))
> -		return -ENOMEM;
> +		/* Min is 2MB */
> +		if (nslabs <= 1024)
> +			return rc;
> +		nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
> +		goto retry;
> +	}


We now end up with two attempts to remap. I think this second one is what we want since it solves the problem I pointed in previous patch.


-boris




From xen-devel-bounces@lists.xenproject.org Mon Mar 14 23:27:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 23:27:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290519.492728 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTu5z-0002Xv-J9; Mon, 14 Mar 2022 23:27:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290519.492728; Mon, 14 Mar 2022 23:27:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTu5z-0002Xo-ES; Mon, 14 Mar 2022 23:27:23 +0000
Received: by outflank-mailman (input) for mailman id 290519;
 Mon, 14 Mar 2022 23:27:22 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=WDqM=TZ=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nTu5y-0002Xi-LF
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 23:27:22 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4b46203f-a3ee-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 00:27:21 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 9AFE36147F;
 Mon, 14 Mar 2022 23:27:19 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8DE34C340E9;
 Mon, 14 Mar 2022 23:27:18 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4b46203f-a3ee-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647300439;
	bh=3Wap272+qg908H5ORdKriCtZeQQd2FRPtBIoRz+lgjk=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=emXu/RobeHBWY1hjjUno1Npso1xtQySGAMbd997JKMfZC4mqDyHv9lOq5wNFIBiR1
	 vkgMg2zGHLchJj1bfOFEkCnTghWhsORQg2WzSE/Ej/HL6oCccZkS8jNtmnNHjJDiOt
	 ZwgrqVqbZ7VGKUvgdICUPwlr58BIlh8rA3C2tW6UDyQ5HMjURNautaP08j6+Uhb7vR
	 5dSreMUfYYJAxtj2NAbOqpFctQbNbJu9cdCwc55TbUXHoz+fY91cO2tNtT+udzxE3H
	 ibDefwxOcD2oD4Zoq6NGc8KCWHdnYDATakgLJEFOVszdx2Mq+GZ3RLP/dv31QYn6w8
	 B/G/cZlwICjlg==
Date: Mon, 14 Mar 2022 16:27:17 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Julien Grall <julien@xen.org>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    xen-devel@lists.xenproject.org, marco.solieri@minervasys.tech, 
    lucmiccio@gmail.com, Julien Grall <jgrall@amazon.com>, 
    Bertrand Marquis <bertrand.marquis@arm.com>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH early-RFC 4/5] xen/arm: mm: Rework switch_ttbr()
In-Reply-To: <78cd8ea7-e37a-d3d9-d2d1-6686ca491925@xen.org>
Message-ID: <alpine.DEB.2.22.394.2203141624310.3497@ubuntu-linux-20-04-desktop>
References: <20220309112048.17377-1-julien@xen.org> <20220309112048.17377-5-julien@xen.org> <alpine.DEB.2.22.394.2203111710300.3497@ubuntu-linux-20-04-desktop> <78cd8ea7-e37a-d3d9-d2d1-6686ca491925@xen.org>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Sat, 12 Mar 2022, Julien Grall wrote:
> On 12/03/2022 01:17, Stefano Stabellini wrote:
> > On Wed, 9 Mar 2022, Julien Grall wrote:
> > As far as I can tell this should work for coloring too. In the case of
> > coloring:
> > 
> >      /* running on the old mapping, same as non-coloring */
> >      update_identity_mapping(true);
> > 
> >      /* jumping to the 1:1 mapping of the old Xen and switching to the
> >       * new pagetable */
> >      fn(ttbr);
> > 
> >      /* new pagetable is enabled, now we are back to addresses greater
> >       * than XEN_VIRT_START, which correspond to new cache-colored Xen */
> >      update_identity_mapping(false);
> > 
> > 
> > The only doubt that I have is: are we sure than a single page of 1:1
> > mapping is enough? What if:
> > 
> > virt_to_maddr(switch_ttbr_id) - virt_to_maddr(_start) > PAGE_SIZE
> 
> switch_ttbr_id() is placed before _end_boot (this needs to be renamed). We are
> veryfing a link time (see the check in xen.lds.S) that _end_boot - _start is
> always smaller than 4KB.

Yes I see:
ASSERT( _end_boot - start <= PAGE_SIZE, "Boot code is larger than 4K")

Excellent!


> At the moment, the size is less than 2KB. So we have plenty of space to grow.
> Also, there are some code that is technically not used while using the ID map.
> So if necessary we can shrink the size to always fit in a PAGE_SIZE.

+1


> > We might have to do a 1:1 mapping of size = _end-_start. It would work
> > with coloring too because we are doing a 1:1 mapping of the old copy of
> > Xen which is non-colored and contiguous (not the new copy which is
> > colored and fragmented).
> 
> I would like to keep the size of the ID mapping to the strict minimum. A
> PAGE_SIZE should be sufficient for most of what we need in Xen.

Yep


> This would help to get rid of the old copy of Xen in case of the cache
> coloring. Otherwise, you technically have to keep it forever if you plan to
> support suspend/resume or even allow CPU hotplug.
> 
> Furthemore, if you keep the two copy around, it is more difficult to know
> which mapping is used and we increase the risk to use the wrong one. For
> instance, the current implementation of cache coloring is clearing the wrong
> set of boot pagetables.
 
Right. Given that we know it is a single page, then we could use a 1:1
of the colored copy without issues.


From xen-devel-bounces@lists.xenproject.org Mon Mar 14 23:37:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 23:37:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290523.492738 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTuFg-0004A5-EP; Mon, 14 Mar 2022 23:37:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290523.492738; Mon, 14 Mar 2022 23:37:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTuFg-00049y-BR; Mon, 14 Mar 2022 23:37:24 +0000
Received: by outflank-mailman (input) for mailman id 290523;
 Mon, 14 Mar 2022 23:37:23 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=zLdK=TZ=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nTuFf-00049s-8x
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 23:37:23 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id b1254480-a3ef-11ec-853b-5f4723681683;
 Tue, 15 Mar 2022 00:37:21 +0100 (CET)
Received: from pps.filterd (m0246632.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 22EKru3S015173; 
 Mon, 14 Mar 2022 23:37:17 GMT
Received: from userp3020.oracle.com (userp3020.oracle.com [156.151.31.79])
 by mx0b-00069f02.pphosted.com with ESMTP id 3et60rhna1-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Mon, 14 Mar 2022 23:37:16 +0000
Received: from pps.filterd (userp3020.oracle.com [127.0.0.1])
 by userp3020.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 22ENGNkc096994;
 Mon, 14 Mar 2022 23:37:15 GMT
Received: from nam12-dm6-obe.outbound.protection.outlook.com
 (mail-dm6nam12lp2176.outbound.protection.outlook.com [104.47.59.176])
 by userp3020.oracle.com with ESMTP id 3et6573scw-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Mon, 14 Mar 2022 23:37:15 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
 by MWHPR1001MB2336.namprd10.prod.outlook.com (2603:10b6:301:2b::22)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.25; Mon, 14 Mar
 2022 23:37:13 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755]) by BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755%7]) with mapi id 15.20.5061.029; Mon, 14 Mar 2022
 23:37:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b1254480-a3ef-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=Sx8/aMjm83VjielJtGlhHtv+nnnu7ze9WKCqHQlY3f0=;
 b=eKRGzcHpDfVDRmQdnO5uDWzo65Jkt8SdFgcDPwl2lVU4HU8JbL5oh5+9dvgAPB0sWsG5
 VGDFzTOrH9l01L5lPdy5vApYUitVlrobbsbeLmDF3wU0PgzPEgjnwAXhp7o+SETaCz6X
 Hbnzd71/myNAM3jat9bguPWHiu00ErFhfTWGQFkUseQePAp2x4g8MO3jVm6BJvFUvEQ5
 SXDZ+JqGWzTcMMpOug6pIebKmbEnCWmkK2QJ/bqr+BF8kKCbQ3dRIPzFg8d1K/gpYlrv
 D1asUnLB5EdkycERXof5WfVJiP49jzk7UEQHcLOg4gg/NYQWbzvtLkNNW+rjgDLO3FIs 7w== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=V1n9lAD3JPm3q6vuG7t5SZs+IGqdwyPQgdXtFIRsZ2FcEFN9TH/pDIW0Ua7y1JszJryrKqb0gOglb3wrYqz86+rztlFMKK8HPjiVI1WtCmpvXggG15aYQDrRyAGk51se14zOA7jQ5JjGPEGNGVQYBCWbpoiaJ0NSxq8Hhxc9/NoSJz5Rp9TwUhY0HK78hfi0XqL4LcNXgryYQoGBB+71s0WW6R8AhPsE/zWv3GVNGSAWdXgqcs5B5uW0Bml0p6NJrWPGupIkEJ0hQ8pTAMgZmMiOZNnybszXcbCIotmXskhWVpfQ80DVlISFUYXCb8GNsa+C3t0elCLb2/Hz+gMG9Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Sx8/aMjm83VjielJtGlhHtv+nnnu7ze9WKCqHQlY3f0=;
 b=U6+L1wnovZuC7V2TyMJ1VbnqNcGmBbBGl4pfmx3TYGNZZUvrdnCQiD0YD1ew2Jic7GUM7kX04MJ3+SdCAPZSmxcUZp7DY8ejX64es6Ul0KfvCYoNBDtLyKSqI7M/jbGQXj9h73qQgM/0rZ8dawTjG/+6TcBJkJvSV4DTxNsW0f+V6tC1k5Faz7gDjEOwH/Go/4M1caWyz675OhuoE2JX2Mg+gUt5kuK2EvfxPGaoDxfZ8MJPmcpWO7eioEINkCS9GKog2o3uqfHKzK2IYlg9/ffsy4teJ9Gx/ZyFYYuuFKjlFR2Uf5OnlDGqpRD5IGPEfT7Znh40UOLKZ6V1Kb8Hyw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Sx8/aMjm83VjielJtGlhHtv+nnnu7ze9WKCqHQlY3f0=;
 b=x0rE9+1RAVt9zolAgTWMoTUEMROHETiFR/e5FP+pX/bvXVcZUamL/HW0PyQhylrSLQZ0/EDf914V7vQeM1G6ZyDt4w746MlLNjWbxt4oE523Zy70VEgq4h6IAuS2n30SlIb72Gjpw32uSXvDdhIxRWSVa6nTTWOAHGxBa7IRGD4=
Message-ID: <63365484-7035-f2bd-5317-2e95d65993f7@oracle.com>
Date: Mon, 14 Mar 2022 19:37:03 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH 1/2] xen/grant-table: remove gnttab_*transfer*() functions
Content-Language: en-US
To: Juergen Gross <jgross@suse.com>, xen-devel@lists.xenproject.org,
        linux-kernel@vger.kernel.org
Cc: Stefano Stabellini <sstabellini@kernel.org>
References: <20220311103429.12845-1-jgross@suse.com>
 <20220311103429.12845-2-jgross@suse.com>
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
In-Reply-To: <20220311103429.12845-2-jgross@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: DM5PR04CA0036.namprd04.prod.outlook.com
 (2603:10b6:3:12b::22) To BLAPR10MB5009.namprd10.prod.outlook.com
 (2603:10b6:208:321::10)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c7254098-7673-4b3c-45ad-08da061390f7
X-MS-TrafficTypeDiagnostic: MWHPR1001MB2336:EE_
X-Microsoft-Antispam-PRVS: 
	<MWHPR1001MB2336C87F7EE50E00FBA337478A0F9@MWHPR1001MB2336.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BLAPR10MB5009.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6666004)(6512007)(6506007)(86362001)(31696002)(2616005)(26005)(186003)(53546011)(38100700002)(5660300002)(4744005)(316002)(4326008)(44832011)(8676002)(6486002)(66556008)(66946007)(66476007)(8936002)(508600001)(31686004)(36756003)(2906002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?cDM0bWw5MTVRaXVVVkN2TXVOMERud3kwQmdac3pVNmVOZHhpTU41aHYzNnZH?=
 =?utf-8?B?aW1MMEJYOWFCRUtqdU1wZXp2dnhGbHp5d0xmNFpkN1ExU21yZitrVk0rUjAz?=
 =?utf-8?B?T1lLdE52VWVsVjRCVUVjREE5MUxMLzlVaTFWd0h1M0FSTTJKVTZFTVoxeVNM?=
 =?utf-8?B?SGVScDZmWHJ4QmhWREFMMWlxeUI2ZksvS0lqa3BqTy84UzNQejZjRncvWFN0?=
 =?utf-8?B?OHNPYlNXQXVrNVI1YTBFTWJMdVZIRFpMTnAraTU3bnpuUEU4ajBuSjZoZGs3?=
 =?utf-8?B?QkJqNW5KSDI2WC9oaWgzQndqSnE3VGwxenduTktoS3BGUlpKdnRKSEdjbldl?=
 =?utf-8?B?dkthYmgvdHVOOVMvVndIVGxaQitMMnpyMHp6NVF3WUloSjZXcVNSZEZOcjZX?=
 =?utf-8?B?TUp1Q0ZYOUdqSFpkMGkxMlNjTkJabmZUUm53NlAyWXVBUHJ0VlZuNk1LUTFP?=
 =?utf-8?B?cGVCTHVEK0dNMXYxM1VGWEEyWUViYzRCK0c0MUR2OWx5c2RKbDFkTGVQQXNw?=
 =?utf-8?B?Z3R6a2FCWDRrUlQyZHFwNi9WbWFYYW1BS1hIanpsOE1FekVRenhJQ0NidWoy?=
 =?utf-8?B?MEUrcnR2OVIvbndmdWdxaHE2clo3Q25MektqbUxadHRyUm1ocURtS2JjQ3cz?=
 =?utf-8?B?cnVNNzk0czczSWVrbDRWZjE1b1lIZGE5OU01M2lUc055RVV5WjVXbzQ3YjZO?=
 =?utf-8?B?UCtPbnVQUkh0M0N1TXAxNjRlTTlsVFZsMUZ2WjBYNkRlNmdMd0QvWEtXVmgx?=
 =?utf-8?B?UW10Tkk3U1NCeFpvMnFKNy9KYStqU3A2MXhtMFF3N3RWMmY2dDdnWVZSQlNO?=
 =?utf-8?B?dUdQSityTmtsZll2UXFqQ1ROcVdYWkRyT2tUenlYQWNCZDZCNmY4d2R4NXpK?=
 =?utf-8?B?S1o2S0xlaTl4STVJQjlENkNodWxyMTdpWVlRQUNFaFlpUzB6T0xXMlNIVkZP?=
 =?utf-8?B?VmhYWkkzY3FReDFCellzcnNId01xK1NLZjZHSlREQ0N2T0g3ZmFITXRUaVVi?=
 =?utf-8?B?Q2pFYTBOeGZqOGdsSWhGdnI3d0VMKzFraEdmdUZpNmpBck9JMy9YSXB2K0J3?=
 =?utf-8?B?OVk0dVlRemZHOGE5Y2JMTXZPYWFJemd3SzhaaUdNcUcvRXFURDVGd21uN21i?=
 =?utf-8?B?UjgrcmdBaU9qM0plSHZaSGVNOEM2K3QvL1Y5VGYzSk00MXZKeUxZYkZiOWdY?=
 =?utf-8?B?Tmd6bFYzWjNaSytiVFU4UDNvZXJLSG9LaFJJYUpLNWpqZEdqMTgvMjY4dE5s?=
 =?utf-8?B?bTcxL3ExSm9PKzhSc3JSVFdLdWJyRWN0QU9oYWVNNGg5VEZaN1FsMlp4QVFv?=
 =?utf-8?B?ZGtMU3AvYmdlU0ZaS3lRdDNQTHJtL0ROeTlZWDdnOTVOWUZNRmxKc0ZHRkxC?=
 =?utf-8?B?eDJXNisyQTRoa2k4TmNqNW0wcWM0VjIwTVQ1eDM4cEFwRFlSK05oNmlHYVVt?=
 =?utf-8?B?d1dNWXNYRlVBYzZSVHVaWEdsSC9KMjBwMmRZQWowNE14R3NMQk1QNjJUbElP?=
 =?utf-8?B?Wlk2YTVCV01GVkk3U0NkdmMwaWlFVldSM0trY2ZoUWdWdGxSMXFVdUxrM21G?=
 =?utf-8?B?Nk9UYjZ6WTVHTyszeXBMVlJIcncycllhbDBqeVJWZGJKR09TNlVLSDlvYjhv?=
 =?utf-8?B?Y0FtNEhJaDVkV1g3aFBpV29lRy9oVWVpWU5FTldSaExoazhvZ1ExNDVpdzg5?=
 =?utf-8?B?QzNqa1cyQnRDT2VhTGhMLzVMMTl5Y2R4MS9yczBjTUd3WjB0WTRYblhSZitV?=
 =?utf-8?B?OGtaMXV2Ukh5MTZOOUgzREsxVERUSjAxNS9WLytyWnpVNU5UNVNyekxFT2FV?=
 =?utf-8?B?T0FmaVd4Wnh4MndzeU9ZNUNxQUFsOXk4UVF2OXdJRi9MMUJULzNEUWZ1VzMw?=
 =?utf-8?B?NGpITHI2clc2ajFTdkdpLzhiUnJMdFhvVnBEWWlZcEFFQXk4Y0MwTTNlK3pm?=
 =?utf-8?B?emRFWWFvd3NzYzFUeHJuQlpXVHdCL1E4V1k0dTYwanpTWTcwUlFHb0xnZkdS?=
 =?utf-8?B?cS9CaWVZeEt3PT0=?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c7254098-7673-4b3c-45ad-08da061390f7
X-MS-Exchange-CrossTenant-AuthSource: BLAPR10MB5009.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Mar 2022 23:37:13.6365
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: NBNZ5ZKb8iV1nregaX1Jbt8hI11CBw/0/itvd6JcTKnUYZM69uAY2oIcR5IHhtj5qyXZBpIdzPt2bOoK7o1s7F4o5aH8g+QqNLZHY6KXInE=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR1001MB2336
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10286 signatures=693139
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 spamscore=0
 malwarescore=0 adultscore=0 bulkscore=0 mlxscore=0 mlxlogscore=999
 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1
 engine=8.12.0-2202240000 definitions=main-2203140132
X-Proofpoint-ORIG-GUID: 3a9BGKFCgKYkn1Q9MJLdoUTO35UXNdXe
X-Proofpoint-GUID: 3a9BGKFCgKYkn1Q9MJLdoUTO35UXNdXe


On 3/11/22 5:34 AM, Juergen Gross wrote:
> All grant table operations related to the "transfer" functionality
> are unused currently. There have been users in the old days of the
> "Xen-o-Linux" kernel, but those didn't make it upstream.
>
> So remove the "transfer" related functions.


Do we need to assert somewhere that transfer flags are not set?


-boris




From xen-devel-bounces@lists.xenproject.org Mon Mar 14 23:48:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 14 Mar 2022 23:48:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290529.492756 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTuQf-0005xL-HB; Mon, 14 Mar 2022 23:48:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290529.492756; Mon, 14 Mar 2022 23:48:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTuQf-0005xE-Cf; Mon, 14 Mar 2022 23:48:45 +0000
Received: by outflank-mailman (input) for mailman id 290529;
 Mon, 14 Mar 2022 23:48:43 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=WDqM=TZ=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nTuQd-0005wy-GK
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 23:48:43 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 46e82060-a3f1-11ec-853b-5f4723681683;
 Tue, 15 Mar 2022 00:48:41 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 7E785B80FC0;
 Mon, 14 Mar 2022 23:48:40 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id CEA45C340E9;
 Mon, 14 Mar 2022 23:48:38 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 46e82060-a3f1-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647301719;
	bh=t41VCd1KKEI44yeVCJQLO6Xji4UkgthrX5AnegupC5g=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=Ycrs7/B+EnHkpB4G6UGImc2CnaojtSLGL8TeRxWvWWeBohth9vJ1WKBrXfusjLDkx
	 D9dlWLh0QpM9TZMWVFZZX+X9uxCjvC5aHlDvog9v8/JsnclwWIwQU4zB+KKxeOft7v
	 zwv3sHCW5Br5lueYxfiSvcbxeGt7Bj+fUGcZagfNFrGPxWh2aAAb5eVw1MQ24D96wj
	 DCIoaeVLmYzSwWSaXBbiYrzHwIU9jnXwcWTDHKqubFV9zFmWxEZ8zP+ZXqMPgbQdqz
	 iFrIbwJrWS+5q4niIiAhr0PoxGW1zBWONbrj/iDEBE4twXaFv/MPV+KTxdwJtY47Fn
	 iHvgEy26Wokrg==
Date: Mon, 14 Mar 2022 16:48:38 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Julien Grall <julien@xen.org>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    xen-devel@lists.xenproject.org, marco.solieri@minervasys.tech, 
    lucmiccio@gmail.com, Julien Grall <jgrall@amazon.com>, 
    Bertrand Marquis <bertrand.marquis@arm.com>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH early-RFC 4/5] xen/arm: mm: Rework switch_ttbr()
In-Reply-To: <ece8f698-0abd-42eb-625e-693f69f02e27@xen.org>
Message-ID: <alpine.DEB.2.22.394.2203141459360.3497@ubuntu-linux-20-04-desktop>
References: <20220309112048.17377-1-julien@xen.org> <20220309112048.17377-5-julien@xen.org> <alpine.DEB.2.22.394.2203111721130.3497@ubuntu-linux-20-04-desktop> <ece8f698-0abd-42eb-625e-693f69f02e27@xen.org>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Sat, 12 Mar 2022, Julien Grall wrote:
> On 12/03/2022 01:31, Stefano Stabellini wrote:
> > On Wed, 9 Mar 2022, Julien Grall wrote:
> > > From: Julien Grall <jgrall@amazon.com>
> > > 
> > > At the moment, switch_ttbr() is switching the TTBR whilst the MMU is
> > > still on.
> > > 
> > > Switching TTBR is like replacing existing mappings with new ones. So
> > > we need to follow the break-before-make sequence.
> > > 
> > > In this case, it means the MMU needs to be switched off while the
> > > TTBR is updated. In order to disable the MMU, we need to first
> > > jump to an identity mapping.
> > > 
> > > Rename switch_ttbr() to switch_ttbr_id() and create an helper on
> > > top to temporary map the identity mapping and call switch_ttbr()
> > > via the identity address.
> > > 
> > > switch_ttbr_id() is now reworked to temporarily turn off the MMU
> > > before updating the TTBR.
> > > 
> > > We also need to make sure the helper switch_ttbr() is part of the
> > > identity mapping. So move _end_boot past it.
> > > 
> > > Take the opportunity to instruction cache flush as the operation is
> > > only necessary when the memory is updated.
> > > 
> > > Signed-off-by: Julien Grall <jgrall@amazon.com>
> > > 
> > > ---
> > > 
> > >      TODO:
> > >          * Rename _end_boot to _end_id_mapping or similar
> > >          * Check the memory barriers
> > >          * I suspect the instruction cache flush will be necessary
> > >            for cache coloring.
> > > ---
> > >   xen/arch/arm/arm64/head.S | 31 ++++++++++++++++++++-----------
> > >   xen/arch/arm/mm.c         | 14 +++++++++++++-
> > >   2 files changed, 33 insertions(+), 12 deletions(-)
> > > 
> > > diff --git a/xen/arch/arm/arm64/head.S b/xen/arch/arm/arm64/head.S
> > > index 878649280d73..c5cc72b8fe6f 100644
> > > --- a/xen/arch/arm/arm64/head.S
> > > +++ b/xen/arch/arm/arm64/head.S
> > > @@ -803,36 +803,45 @@ fail:   PRINT("- Boot failed -\r\n")
> > >           b     1b
> > >   ENDPROC(fail)
> > >   -GLOBAL(_end_boot)
> > > -
> > >   /*
> > >    * Switch TTBR
> > >    *
> > >    * x0    ttbr
> > >    *
> > > - * TODO: This code does not comply with break-before-make.
> > > + * XXX: Check the barriers
> > >    */
> > > -ENTRY(switch_ttbr)
> > > +ENTRY(switch_ttbr_id)
> > >           dsb   sy                     /* Ensure the flushes happen before
> > >                                         * continuing */
> > >           isb                          /* Ensure synchronization with
> > > previous
> > >                                         * changes to text */
> > > +
> > > +        /* Turn off MMU */
> > > +        mrs    x1, SCTLR_EL2
> > > +        bic    x1, x1, #SCTLR_Axx_ELx_M
> > > +        msr    SCTLR_EL2, x1
> > > +        dsb    sy
> > > +        isb
> > > +
> > >           tlbi   alle2                 /* Flush hypervisor TLB */
> > > -        ic     iallu                 /* Flush I-cache */
> > >           dsb    sy                    /* Ensure completion of TLB flush
> > > */
> > >           isb
> > >   -        msr    TTBR0_EL2, x0
> > > +        msr   TTBR0_EL2, x0
> > > +
> > > +        mrs   x1, SCTLR_EL2
> > > +        orr   x1, x1, #SCTLR_Axx_ELx_M  /* Enable MMU */
> > > +        msr   SCTLR_EL2, x1
> > >             isb                          /* Ensure synchronization with
> > > previous
> > >                                         * changes to text */
> > > -        tlbi   alle2                 /* Flush hypervisor TLB */
> > > -        ic     iallu                 /* Flush I-cache */
> > > -        dsb    sy                    /* Ensure completion of TLB flush */
> > > -        isb
> > > +        /* Turn on the MMU */
> > > +
> > >             ret
> > > -ENDPROC(switch_ttbr)
> > > +ENDPROC(switch_ttbr_id)
> > > +
> > > +GLOBAL(_end_boot)
> > >     #ifdef CONFIG_EARLY_PRINTK
> > >   /*
> > > diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
> > > index 5c4dece16f7f..a53760af7af0 100644
> > > --- a/xen/arch/arm/mm.c
> > > +++ b/xen/arch/arm/mm.c
> > > @@ -660,7 +660,19 @@ static void xen_pt_enforce_wnx(void)
> > >       flush_xen_tlb_local();
> > >   }
> > >   -extern void switch_ttbr(uint64_t ttbr);
> > > +extern void switch_ttbr_id(uint64_t ttbr);
> > > +
> > > +typedef void (switch_ttbr_fn)(uint64_t ttbr);
> > > +
> > > +static void switch_ttbr(uint64_t ttbr)
> > > +{
> > > +    vaddr_t id_addr = virt_to_maddr(switch_ttbr_id);
> > > +    switch_ttbr_fn *fn = (switch_ttbr_fn *)id_addr;
> > > +
> > > +    update_identity_mapping(true);
> > > +    fn(ttbr);
> > > +    update_identity_mapping(false);
> > > +}
> > 
> > Controversial question: does it really matter that XEN_VIRT_START >
> > 512GB and that _start < 512GB?
> > 
> > I am totally fine with the limit, I am just brainstorming: given that
> > the mapping is used very temporarely, it wouldn't really be an issue if
> > it conflicts with something important. Let's say that it conflicts with
> > the VMAP or the FRAMETABLE. As long as:
> > 
> > - we save the current mapping
> > - update it with the Xen 1:1
> > - switch_ttbr
> > - remove Xen 1:1
> > - restore mapping
> > 
> > It should work, right? Basically, a mapping conflict shouldn't be an
> > issue given that the mapping has only to live long enough to call
> > switch_ttbr_id.
> 
> Today switch_ttbr() is called before we initialized most of the memory layout.
> So clashing with the VMAP and frametable is not a problem.
> 
> However, the identity mapping may also clash with the region used to map Xen.
> That said, technically, we are not able to handle Xen when its start address
> is in region 2MB + 4K to 4MB (Xen is loaded at a 4KB aligned address).
> 
> The trouble is some features (e.g. UBSAN, GCOV) can generate Xen image over
> 2MB. IOW, the range where Xen cannot be loaded will increase.
> 
> This is an issue because AFAIK, there is no away to tell GRUB "You can't load
> Xen at this region". But even if there were one, I feel this restriction is
> sort of random.
> 
> I already wrote a patch to get rid of the restriction. The code is not too bad
> (we only need an extra indirection). But I haven't sent it yet because it is
> less critical with the re-shuffling of the memory layout.

Interesting! I am curious: how did you manage to do it?

For now and for this series the current approach and the 512GB limit are
fine. My replies here are brainstorming to see if there are potential
alternatives in the future in case the need arises.

I can see that a clash with Xen mapping could be problematic and the
chances of that happening are low but non-zero. We could make sure that
ImageBuilder always picks safe addresses and that would help but
wouldn't remove the issue if someone is not using ImageBuilder.


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 00:00:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 00:00:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290533.492766 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTubp-0000Vh-Vx; Tue, 15 Mar 2022 00:00:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290533.492766; Tue, 15 Mar 2022 00:00:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTubp-0000Va-SG; Tue, 15 Mar 2022 00:00:17 +0000
Received: by outflank-mailman (input) for mailman id 290533;
 Tue, 15 Mar 2022 00:00:15 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=AqxF=T2=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nTubn-0000VU-QL
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 00:00:15 +0000
Received: from sin.source.kernel.org (sin.source.kernel.org
 [2604:1380:40e1:4800::1])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id e12f54ee-a3f2-11ec-853b-5f4723681683;
 Tue, 15 Mar 2022 01:00:13 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by sin.source.kernel.org (Postfix) with ESMTPS id 1D754CE16F9;
 Tue, 15 Mar 2022 00:00:06 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 82170C340E9;
 Tue, 15 Mar 2022 00:00:03 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e12f54ee-a3f2-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647302404;
	bh=qF2Kiv1yBWM6zFZu7vu4vkmgVsDPPK9bUwo+CMzG77s=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=CxQznLVvPAMHVLObot/GbKAGNBs3wp/Zo7J//e5fa5RGl/JAcrYpHk7dFYXJ+dCyc
	 yFp/t/ucQtYgdUQQRIyugjt0bw6neR65fWz4Mw2wQpqjjnNDOhxJr7SqJvB+dScWOI
	 FWaPNn7YRGzQ0CCDI4WX3HGCjk3WcedTK4ZKrUhQL/ZjI62kK/fSKVT6fnNg8LwsV7
	 O+N86nVOy9ALX/s25HJpQGYpv30ak+B6D/CFn8xWL4gwGSW9Q/HStnRPdXpxBq2xEr
	 XfmlQm0hAt72Py8IAnH8MpwztAqekJ4fXRmnodDkCqvESbpDzlwteZaCwLl1CvtOpX
	 4SrZDmHAzylBg==
Date: Mon, 14 Mar 2022 17:00:02 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Christoph Hellwig <hch@lst.de>
cc: iommu@lists.linux-foundation.org, x86@kernel.org, 
    Anshuman Khandual <anshuman.khandual@arm.com>, 
    Tom Lendacky <thomas.lendacky@amd.com>, 
    Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>, 
    Stefano Stabellini <sstabellini@kernel.org>, 
    Boris Ostrovsky <boris.ostrovsky@oracle.com>, 
    Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>, 
    David Woodhouse <dwmw2@infradead.org>, Lu Baolu <baolu.lu@linux.intel.com>, 
    Robin Murphy <robin.murphy@arm.com>, linux-arm-kernel@lists.infradead.org, 
    xen-devel@lists.xenproject.org, linux-ia64@vger.kernel.org, 
    linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, 
    linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org, 
    linux-hyperv@vger.kernel.org, tboot-devel@lists.sourceforge.net, 
    linux-pci@vger.kernel.org
Subject: Re: [PATCH 13/15] swiotlb: merge swiotlb-xen initialization into
 swiotlb
In-Reply-To: <20220314073129.1862284-14-hch@lst.de>
Message-ID: <alpine.DEB.2.22.394.2203141659210.3497@ubuntu-linux-20-04-desktop>
References: <20220314073129.1862284-1-hch@lst.de> <20220314073129.1862284-14-hch@lst.de>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Mon, 14 Mar 2022, Christoph Hellwig wrote:
> Reuse the generic swiotlb initialization for xen-swiotlb.  For ARM/ARM64
> this works trivially, while for x86 xen_swiotlb_fixup needs to be passed
> as the remap argument to swiotlb_init_remap/swiotlb_init_late.
> 
> Signed-off-by: Christoph Hellwig <hch@lst.de>

For arch/arm/xen and drivers/xen/swiotlb-xen.c

Reviewed-by: Stefano Stabellini <sstabellini@kernel.org>


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 01:06:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 01:06:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290550.492801 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTve5-0004tC-C4; Tue, 15 Mar 2022 01:06:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290550.492801; Tue, 15 Mar 2022 01:06:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTve5-0004t5-8j; Tue, 15 Mar 2022 01:06:41 +0000
Received: by outflank-mailman (input) for mailman id 290550;
 Tue, 15 Mar 2022 01:06:40 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTve4-0004sv-2q; Tue, 15 Mar 2022 01:06:40 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTve4-0006aS-0K; Tue, 15 Mar 2022 01:06:40 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTve3-0008Oj-I5; Tue, 15 Mar 2022 01:06:39 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTve3-0003CO-Hd; Tue, 15 Mar 2022 01:06:39 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=iViSgi1tmbUSvNE52W9KkhiHK+hcmwQ00vagW2qrHVw=; b=C+rdw8bzVEgvFkXfRgwvncynDR
	zem5gpE7+XeTb+zBH+425JTKrI4HLgCH4AyAM9Hfn95whOzu05cxCV1luoWm7alGO/0R7VusyWAEK
	Gh5Z44jRpm/M33AsHmXA/qY900XSHrvAvUYMI4S2blTP9XVQjYHZmTrQL6Htaxo7OF9E=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168586-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168586: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=15df33ceb73cb6bb3c6736cf4d2cff51129ed4b4
X-Osstest-Versions-That:
    qemuu=1416688c53be6535be755b44c15fb2eb9defd20f
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 15 Mar 2022 01:06:39 +0000

flight 168586 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168586/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168510
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168510
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168510
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168510
 test-armhf-armhf-xl-rtds     18 guest-start/debian.repeat    fail  like 168510
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168510
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168510
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168510
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168510
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 qemuu                15df33ceb73cb6bb3c6736cf4d2cff51129ed4b4
baseline version:
 qemuu                1416688c53be6535be755b44c15fb2eb9defd20f

Last test of basis   168510  2022-03-10 19:38:23 Z    4 days
Testing same since   168586  2022-03-14 13:37:01 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Michael Lambert <mlambert@quicinc.com>
  Peter Maydell <peter.maydell@linaro.org>
  Richard Henderson <richard.henderson@linaro.org>
  Taylor Simpson <tsimpson@quicinc.com>
  Zongyuan Li <zongyuan.li@smartx.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   1416688c53..15df33ceb7  15df33ceb73cb6bb3c6736cf4d2cff51129ed4b4 -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 01:10:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 01:10:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290557.492812 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTvhX-0006Ox-S5; Tue, 15 Mar 2022 01:10:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290557.492812; Tue, 15 Mar 2022 01:10:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTvhX-0006Oq-PF; Tue, 15 Mar 2022 01:10:15 +0000
Received: by outflank-mailman (input) for mailman id 290557;
 Tue, 15 Mar 2022 01:10:14 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTvhW-0006Og-37; Tue, 15 Mar 2022 01:10:14 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTvhW-0006ej-2G; Tue, 15 Mar 2022 01:10:14 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTvhV-0008Sg-Pg; Tue, 15 Mar 2022 01:10:13 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTvhV-0000ca-PC; Tue, 15 Mar 2022 01:10:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=PaZezfYDm5w+p4uc4fOjvI6M25RvX9C8rwAz+0eD8eM=; b=1U+STk1YsDth4uvivbSaLZiGMp
	A85lq8AtJuGmWEuZKv+NH+LCmaCb3ZciZDMIIKvXyjU4LLnA6ncAKic8blLRTj28Gz/SdsuozIDwq
	6kFqE4YNttOLOBZV4fjF2/i8HReZtfLDBJvDZZUXvwbeptWDcEpamHIvGfsHgv0zVHME=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168588-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168588: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=a13dfc769bd7097d8d9ffe3e029a2c1d062d712b
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 15 Mar 2022 01:10:13 +0000

flight 168588 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168588/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 a13dfc769bd7097d8d9ffe3e029a2c1d062d712b
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   14 days
Failing since        168258  2022-03-01 01:55:31 Z   13 days  135 attempts
Testing same since   168579  2022-03-14 08:41:36 Z    0 days    6 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 629 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 02:16:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 02:16:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290577.492865 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTwj8-0005eJ-PV; Tue, 15 Mar 2022 02:15:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290577.492865; Tue, 15 Mar 2022 02:15:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTwj8-0005eC-MQ; Tue, 15 Mar 2022 02:15:58 +0000
Received: by outflank-mailman (input) for mailman id 290577;
 Tue, 15 Mar 2022 02:15:57 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTwj7-0005e2-8W; Tue, 15 Mar 2022 02:15:57 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTwj7-0008Bw-6H; Tue, 15 Mar 2022 02:15:57 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTwj6-0001YI-Pz; Tue, 15 Mar 2022 02:15:56 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTwj6-00018U-PY; Tue, 15 Mar 2022 02:15:56 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=ccGN/Z5ZWtOBPTxhwDGbew5k+J9nBW3eU9huaEFPovc=; b=osDpc1PtgBDvhOfcKLANXsHB1i
	OI4kXprbHbZgIBWCy3+MR7bTURpIDgrFELdBozRLipb0X9cp/+ZeN+X3xPck9Sz0pizF1tRHl3pQN
	ubOGe/fjXlWXJ5ti+UDYSvsvAMPZ1ib9UpJLPjqTXhmjCpVCA3GQpmsM5IIkgMyag+FA=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168585-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168585: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemuu-ovmf-amd64:guest-localmigrate/x10:fail:heisenbug
    xen-unstable:test-amd64-i386-xl-qemuu-debianhvm-i386-xsm:debian-hvm-install:fail:heisenbug
    xen-unstable:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:allowable
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=dedb0aa42c6d1ee31805dfc61630db2c41117330
X-Osstest-Versions-That:
    xen=6ff9a7e62b8c43fe3e9d360fbd49d5854787bc39
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 15 Mar 2022 02:15:56 +0000

flight 168585 xen-unstable real [real]
flight 168592 xen-unstable real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168585/
http://logs.test-lab.xenproject.org/osstest/logs/168592/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-qemuu-ovmf-amd64 18 guest-localmigrate/x10 fail pass in 168592-retest
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm 12 debian-hvm-install fail pass in 168592-retest

Regressions which are regarded as allowable (not blocking):
 test-armhf-armhf-xl-rtds    18 guest-start/debian.repeat fail REGR. vs. 168573

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168573
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168573
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168573
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168573
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168573
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168573
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168573
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168573
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168573
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168573
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168573
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168573
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass

version targeted for testing:
 xen                  dedb0aa42c6d1ee31805dfc61630db2c41117330
baseline version:
 xen                  6ff9a7e62b8c43fe3e9d360fbd49d5854787bc39

Last test of basis   168573  2022-03-14 01:51:48 Z    1 days
Testing same since   168585  2022-03-14 13:36:52 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Jan Beulich <jbeulich@suse.com>
  Roger Pau Monné <roger.pau@citrix.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  fail    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         fail    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   6ff9a7e62b..dedb0aa42c  dedb0aa42c6d1ee31805dfc61630db2c41117330 -> master


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 02:21:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 02:21:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290586.492875 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTwoa-0007HW-K7; Tue, 15 Mar 2022 02:21:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290586.492875; Tue, 15 Mar 2022 02:21:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTwoa-0007HP-HI; Tue, 15 Mar 2022 02:21:36 +0000
Received: by outflank-mailman (input) for mailman id 290586;
 Tue, 15 Mar 2022 02:21:35 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTwoZ-0007HF-Lv; Tue, 15 Mar 2022 02:21:35 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTwoZ-0008HX-Jh; Tue, 15 Mar 2022 02:21:35 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTwoZ-0001lU-C4; Tue, 15 Mar 2022 02:21:35 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTwoZ-0004CL-Bc; Tue, 15 Mar 2022 02:21:35 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=KJL+pQjCjMAXqkdDVS2ppiUYtJ4rmvuRtmAWYxr96e8=; b=UPx477/aVvCrgys19Xo2GE/RAR
	/n8+GX6KT2IBisEHKkkAwO9ZmckA2IWUSsO7NHIAlsK6/8z+KROfFRpZ1v5rfqn+WXXPbB4q/Ml7U
	K6Hm+4nRk15MN8FTK+WZiiZ6oVsjQ0QiodfFD4AanGeSRBGgNlsylEWoNvuIu1TBqQIY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168591-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168591: regressions - FAIL
X-Osstest-Failures:
    xen-unstable-smoke:build-amd64:xen-build:fail:regression
    xen-unstable-smoke:test-armhf-armhf-xl:xen-boot:fail:regression
    xen-unstable-smoke:build-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-unstable-smoke:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-unstable-smoke:test-amd64-amd64-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=fef5531fd8f311b347970568d77e7bf4feffd7fb
X-Osstest-Versions-That:
    xen=dedb0aa42c6d1ee31805dfc61630db2c41117330
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 15 Mar 2022 02:21:35 +0000

flight 168591 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168591/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168580
 test-armhf-armhf-xl           8 xen-boot                 fail REGR. vs. 168580

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  fef5531fd8f311b347970568d77e7bf4feffd7fb
baseline version:
 xen                  dedb0aa42c6d1ee31805dfc61630db2c41117330

Last test of basis   168580  2022-03-14 10:01:40 Z    0 days
Testing same since   168589  2022-03-14 19:00:27 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
  Ayan Kumar Halder <ayankuma@xilinx.com>
  Julien Grall <jgrall@amazon.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  fail    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          blocked 
 test-armhf-armhf-xl                                          fail    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    blocked 
 test-amd64-amd64-libvirt                                     blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit fef5531fd8f311b347970568d77e7bf4feffd7fb
Author: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
Date:   Thu Mar 10 17:45:00 2022 +0000

    xen/arm64: io: Handle the abort due to access to stage1 translation table
    
    If the abort was caused due to access to stage1 translation table, Xen
    will try to set the p2m entry (assuming that the Stage 1 translation
    table is in the non MMIO region).
    If there is no such entry found, then Xen will try to map the address as
    a MMIO region (assuming that the Stage 1 translation table is in the
    direct MMIO region).
    
    If that fails as well, then there are the two following scenarios:-
    1. Stage 1 translation table being in an emulated MMIO region - Xen
    can read the region, but it has no way to return the value read to the
    CPU page table walker (which tries to go through the stage1 tables to
    resolve the translation fault).
    
    2. Stage 1 translation table address is invalid.
    
    In both the above scenarios, Xen will forward the abort to the guest.
    
    Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
    Reviewed-by: Julien Grall <jgrall@amazon.com>

commit 9e5a68a6652cc54ce3cb3b0ce208eeed79d5aeb5
Author: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
Date:   Thu Mar 10 17:44:59 2022 +0000

    xen/arm64: io: Support instructions (for which ISS is not valid) on emulated MMIO region using MMIO/ioreq handler
    
    When an instruction is trapped in Xen due to translation fault, Xen
    checks if the ISS is invalid (for data abort) or it is an instruction
    abort. If so, Xen tries to resolve the translation fault using p2m page
    tables. In case of data abort, Xen will try to map the mmio region to
    the guest (ie tries to emulate the mmio region).
    
    If the ISS is not valid and it is a data abort, then Xen tries to
    decode the instruction. In case of ioreq, Xen  saves the decoding state,
    rn and imm9 to vcpu_io. Whenever the vcpu handles the ioreq successfully,
    it will read the decoding state to determine if the instruction decoded
    was a ldr/str post indexing (ie INSTR_LDR_STR_POSTINDEXING). If so, it
    uses these details to post increment rn.
    
    In case of mmio handler, if the mmio operation was successful, then Xen
    retrives the decoding state, rn and imm9. For state ==
    INSTR_LDR_STR_POSTINDEXING, Xen will update rn.
    
    If there is an error encountered while decoding/executing the instruction,
    Xen will forward the abort to the guest.
    
    Also, the logic to infer the type of instruction has been moved from
    try_handle_mmio() to try_decode_instruction() which is called before.
    try_handle_mmio() is solely responsible for handling the mmio operation.
    
    Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
    Acked-by: Julien Grall <jgrall@amazon.com>
    Reviewed-by: Stefano Stabellini <sstabellini@kernel.org>

commit f9dd8436e3b826e4ca2284effa4c0285527ea763
Author: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
Date:   Thu Mar 10 17:44:58 2022 +0000

    xen/arm64: Decode ldr/str post increment operations
    
    At the moment, Xen does not decode any of the arm64 instructions. This
    means that when hsr_dabt.isv == 0, Xen cannot handle those instructions.
    This will lead to Xen to abort the guests (from which those instructions
    originate).
    
    With this patch, Xen is able to decode ldr/str post indexing instructions.
    These are a subset of instructions for which hsr_dabt.isv == 0.
    
    The following instructions are now supported by Xen :-
    1.      ldr     x2,    [x1],    #8
    2.      ldr     w2,    [x1],    #-4
    3.      ldr     x2,    [x1],    #-8
    4.      ldr     w2,    [x1],    #4
    5.      ldrh    w2,    [x1],    #2
    6.      ldrb    w2,    [x1],    #1
    7.      str     x2,    [x1],    #8
    8.      str     w2,    [x1],    #-4
    9.      strh    w2,    [x1],    #2
    10.     strb    w2,    [x1],    #1
    
    In the subsequent patch, decode_arm64() will get invoked when
    hsr_dabt.isv == 0.
    
    Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
    Reviewed-by: Stefano Stabellini <sstabellini@kernel.org>
(qemu changes not included)


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 02:25:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 02:25:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290593.492887 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTwsk-0007wq-8G; Tue, 15 Mar 2022 02:25:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290593.492887; Tue, 15 Mar 2022 02:25:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTwsk-0007wj-3y; Tue, 15 Mar 2022 02:25:54 +0000
Received: by outflank-mailman (input) for mailman id 290593;
 Tue, 15 Mar 2022 02:25:52 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTwsi-0007wE-O2; Tue, 15 Mar 2022 02:25:52 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTwsi-0008MB-MN; Tue, 15 Mar 2022 02:25:52 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTwsi-0001uy-A4; Tue, 15 Mar 2022 02:25:52 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTwsi-0000FL-9b; Tue, 15 Mar 2022 02:25:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Message-Id:Subject:To;
	bh=ANzwJuF3/XDajjEVF2Jur/vuQ6m3Pu3fqrEyv4CiBHc=; b=UExBaQrxvOzKTEp5u9vI4sO+bo
	V2cF/2hWnRQdy4xhobVCBjRekvTkr+DcbvvUNJFAp8yjbWsGEa3m2feooTs0jp9Usdw0RtHrJ+6/a
	xiSq150mk6P6tRJKVm/g5XFoSxSoTzT5bEeaRt0eK/1xy1fJHSbjFjKqyO173k7NbgPg=;
To: xen-devel@lists.xenproject.org
Subject: [xen-unstable-smoke bisection] complete build-amd64
Message-Id: <E1nTwsi-0000FL-9b@osstest.test-lab.xenproject.org>
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 15 Mar 2022 02:25:52 +0000

branch xen-unstable-smoke
xenbranch xen-unstable-smoke
job build-amd64
testid xen-build

Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: xen git://xenbits.xen.org/xen.git

*** Found and reproduced problem changeset ***

  Bug is in tree:  xen git://xenbits.xen.org/xen.git
  Bug introduced:  9e5a68a6652cc54ce3cb3b0ce208eeed79d5aeb5
  Bug not present: f9dd8436e3b826e4ca2284effa4c0285527ea763
  Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/168603/


  commit 9e5a68a6652cc54ce3cb3b0ce208eeed79d5aeb5
  Author: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
  Date:   Thu Mar 10 17:44:59 2022 +0000
  
      xen/arm64: io: Support instructions (for which ISS is not valid) on emulated MMIO region using MMIO/ioreq handler
      
      When an instruction is trapped in Xen due to translation fault, Xen
      checks if the ISS is invalid (for data abort) or it is an instruction
      abort. If so, Xen tries to resolve the translation fault using p2m page
      tables. In case of data abort, Xen will try to map the mmio region to
      the guest (ie tries to emulate the mmio region).
      
      If the ISS is not valid and it is a data abort, then Xen tries to
      decode the instruction. In case of ioreq, Xen  saves the decoding state,
      rn and imm9 to vcpu_io. Whenever the vcpu handles the ioreq successfully,
      it will read the decoding state to determine if the instruction decoded
      was a ldr/str post indexing (ie INSTR_LDR_STR_POSTINDEXING). If so, it
      uses these details to post increment rn.
      
      In case of mmio handler, if the mmio operation was successful, then Xen
      retrives the decoding state, rn and imm9. For state ==
      INSTR_LDR_STR_POSTINDEXING, Xen will update rn.
      
      If there is an error encountered while decoding/executing the instruction,
      Xen will forward the abort to the guest.
      
      Also, the logic to infer the type of instruction has been moved from
      try_handle_mmio() to try_decode_instruction() which is called before.
      try_handle_mmio() is solely responsible for handling the mmio operation.
      
      Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
      Acked-by: Julien Grall <jgrall@amazon.com>
      Reviewed-by: Stefano Stabellini <sstabellini@kernel.org>


For bisection revision-tuple graph see:
   http://logs.test-lab.xenproject.org/osstest/results/bisect/xen-unstable-smoke/build-amd64.xen-build.html
Revision IDs in each graph node refer, respectively, to the Trees above.

----------------------------------------
Running cs-bisection-step --graph-out=/home/logs/results/bisect/xen-unstable-smoke/build-amd64.xen-build --summary-out=tmp/168603.bisection-summary --basis-template=168580 --blessings=real,real-bisect,real-retry xen-unstable-smoke build-amd64 xen-build
Searching for failure / basis pass:
 168591 fail [host=himrod1] / 168580 [host=himrod2] 168509 [host=himrod2] 168495 ok.
Failure / basis pass flights: 168591 / 168495
(tree with no url: minios)
(tree with no url: ovmf)
(tree with no url: seabios)
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: xen git://xenbits.xen.org/xen.git
Latest 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 fef5531fd8f311b347970568d77e7bf4feffd7fb
Basis pass 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 5142dc5c25e317c208e3dc16d16b664b9f05dab5
Generating revisions with ./adhoc-revtuple-generator  git://xenbits.xen.org/qemu-xen-traditional.git#3d273dd05e51e5a1ffba3d98c7437ee84e8f8764-3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 git://xenbits.xen.org/qemu-xen.git#a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42-a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 git://xenbits.xen.org/xen.git#5142dc5c25e317c208e3dc16d16b664b9f05dab5-fef5531fd8f311b347970568d77e7bf4feffd7fb
>From git://cache:9419/git://xenbits.xen.org/xen
   6ff9a7e62b..dedb0aa42c  master     -> origin/master
Loaded 5001 nodes in revision graph
Searching for test results:
 168495 pass 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 5142dc5c25e317c208e3dc16d16b664b9f05dab5
 168509 [host=himrod2]
 168580 [host=himrod2]
 168589 fail 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 fef5531fd8f311b347970568d77e7bf4feffd7fb
 168590 pass 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 5142dc5c25e317c208e3dc16d16b664b9f05dab5
 168593 fail 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 fef5531fd8f311b347970568d77e7bf4feffd7fb
 168594 pass 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 3f809886988767fff46f440f4fc6d252fb586ace
 168595 pass 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 dedb0aa42c6d1ee31805dfc61630db2c41117330
 168596 pass 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 f9dd8436e3b826e4ca2284effa4c0285527ea763
 168597 fail 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 9e5a68a6652cc54ce3cb3b0ce208eeed79d5aeb5
 168598 pass 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 f9dd8436e3b826e4ca2284effa4c0285527ea763
 168599 fail 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 9e5a68a6652cc54ce3cb3b0ce208eeed79d5aeb5
 168600 pass 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 f9dd8436e3b826e4ca2284effa4c0285527ea763
 168591 fail 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 fef5531fd8f311b347970568d77e7bf4feffd7fb
 168603 fail 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 9e5a68a6652cc54ce3cb3b0ce208eeed79d5aeb5
Searching for interesting versions
 Result found: flight 168495 (pass), for basis pass
 For basis failure, parent search stopping at 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 f9dd8436e3b826e4ca2284effa4c0285527ea763, results HASH(0x55566074f348) HASH(0x55566074e8a0) HASH(0x555660756588) For basis failure, parent search stopping at 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 dedb0aa42c6d1ee31805dfc61630db2c41117330, results HASH(0x55566074d318) For basis failure, parent search stopping at 3d273dd05e51e5a1\
 ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 3f809886988767fff46f440f4fc6d252fb586ace, results HASH(0x55566074b310) For basis failure, parent search stopping at 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 5142dc5c25e317c208e3dc16d16b664b9f05dab5, results HASH(0x555660741920) HASH(0x555660748a08) Result found: flight 168589 (fail), for basis failure (at ancestor ~307)
 Repro found: flight 168590 (pass), for basis pass
 Repro found: flight 168591 (fail), for basis failure
 0 revisions at 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 a68d6d311c2d1fd9d2fa9a0768ea2353e8a79b42 f9dd8436e3b826e4ca2284effa4c0285527ea763
No revisions left to test, checking graph state.
 Result found: flight 168596 (pass), for last pass
 Result found: flight 168597 (fail), for first failure
 Repro found: flight 168598 (pass), for last pass
 Repro found: flight 168599 (fail), for first failure
 Repro found: flight 168600 (pass), for last pass
 Repro found: flight 168603 (fail), for first failure

*** Found and reproduced problem changeset ***

  Bug is in tree:  xen git://xenbits.xen.org/xen.git
  Bug introduced:  9e5a68a6652cc54ce3cb3b0ce208eeed79d5aeb5
  Bug not present: f9dd8436e3b826e4ca2284effa4c0285527ea763
  Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/168603/


  commit 9e5a68a6652cc54ce3cb3b0ce208eeed79d5aeb5
  Author: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
  Date:   Thu Mar 10 17:44:59 2022 +0000
  
      xen/arm64: io: Support instructions (for which ISS is not valid) on emulated MMIO region using MMIO/ioreq handler
      
      When an instruction is trapped in Xen due to translation fault, Xen
      checks if the ISS is invalid (for data abort) or it is an instruction
      abort. If so, Xen tries to resolve the translation fault using p2m page
      tables. In case of data abort, Xen will try to map the mmio region to
      the guest (ie tries to emulate the mmio region).
      
      If the ISS is not valid and it is a data abort, then Xen tries to
      decode the instruction. In case of ioreq, Xen  saves the decoding state,
      rn and imm9 to vcpu_io. Whenever the vcpu handles the ioreq successfully,
      it will read the decoding state to determine if the instruction decoded
      was a ldr/str post indexing (ie INSTR_LDR_STR_POSTINDEXING). If so, it
      uses these details to post increment rn.
      
      In case of mmio handler, if the mmio operation was successful, then Xen
      retrives the decoding state, rn and imm9. For state ==
      INSTR_LDR_STR_POSTINDEXING, Xen will update rn.
      
      If there is an error encountered while decoding/executing the instruction,
      Xen will forward the abort to the guest.
      
      Also, the logic to infer the type of instruction has been moved from
      try_handle_mmio() to try_decode_instruction() which is called before.
      try_handle_mmio() is solely responsible for handling the mmio operation.
      
      Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
      Acked-by: Julien Grall <jgrall@amazon.com>
      Reviewed-by: Stefano Stabellini <sstabellini@kernel.org>

Revision graph left in /home/logs/results/bisect/xen-unstable-smoke/build-amd64.xen-build.{dot,ps,png,html,svg}.
----------------------------------------
168603: tolerable ALL FAIL

flight 168603 xen-unstable-smoke real-bisect [real]
http://logs.test-lab.xenproject.org/osstest/logs/168603/

Failures :-/ but no regressions.

Tests which did not succeed,
including tests which could not be run:
 build-amd64                   6 xen-build               fail baseline untested


jobs:
 build-amd64                                                  fail    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 02:58:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 02:58:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290602.492901 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTxNy-0003TN-Fa; Tue, 15 Mar 2022 02:58:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290602.492901; Tue, 15 Mar 2022 02:58:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTxNy-0003TE-CX; Tue, 15 Mar 2022 02:58:10 +0000
Received: by outflank-mailman (input) for mailman id 290602;
 Tue, 15 Mar 2022 02:58:08 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTxNw-0003T4-OL; Tue, 15 Mar 2022 02:58:08 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTxNw-0000Ri-MD; Tue, 15 Mar 2022 02:58:08 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTxNw-0003fL-3B; Tue, 15 Mar 2022 02:58:08 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTxNw-0007VW-2k; Tue, 15 Mar 2022 02:58:08 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=7KURwjpJKMNR0oMbEzTC8Sy53hWjK6NFKQpzja9dpms=; b=PrUirCVdB42NQ1BHd4CFX8hTn1
	GPNAnbhqrNoz5Ogpio4IjisBTaloWV1qQnRKM16ViFaz3ni5T+VYtdo3Laq9F7bGH8zANXXFhJ/kn
	3VfwU1C5+QJnCYUMzypmeU1ZZaDfN3dFlo5b/l2BrgLeP9BRM46KL2rww0X5kVaHKXwI=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168602-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168602: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=a13dfc769bd7097d8d9ffe3e029a2c1d062d712b
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 15 Mar 2022 02:58:08 +0000

flight 168602 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168602/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 a13dfc769bd7097d8d9ffe3e029a2c1d062d712b
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   14 days
Failing since        168258  2022-03-01 01:55:31 Z   14 days  136 attempts
Testing same since   168579  2022-03-14 08:41:36 Z    0 days    7 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 629 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 04:15:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 04:15:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290610.492912 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTyZx-0003r9-4y; Tue, 15 Mar 2022 04:14:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290610.492912; Tue, 15 Mar 2022 04:14:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTyZx-0003r2-0F; Tue, 15 Mar 2022 04:14:37 +0000
Received: by outflank-mailman (input) for mailman id 290610;
 Tue, 15 Mar 2022 04:14:35 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTyZv-0003qs-NM; Tue, 15 Mar 2022 04:14:35 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTyZv-0001uf-LJ; Tue, 15 Mar 2022 04:14:35 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nTyZu-0006Sr-MS; Tue, 15 Mar 2022 04:14:34 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nTyZu-0001it-LZ; Tue, 15 Mar 2022 04:14:34 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=9r0cw1ZLpY2ND6AMIF/A2WSBXMNUO3FC5Xzgu2zaQoM=; b=cr5sS/5BC3I5Dt0yw8uUW52IQA
	vrfvOR67xshzjPWyvhIpeh1keV0/Mg6h534H6MtVd09CwBeBnqF3+s/XPE+aE26DhJa5ffckKl3Mz
	oWM7pukbch8t+IP2/wK0XUdzpD8OMEB9sZxXUZPHQyfEJuiXH28WW7y+DFe3vSMPxsyA=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168606-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168606: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=a13dfc769bd7097d8d9ffe3e029a2c1d062d712b
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 15 Mar 2022 04:14:34 +0000

flight 168606 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168606/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 a13dfc769bd7097d8d9ffe3e029a2c1d062d712b
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   14 days
Failing since        168258  2022-03-01 01:55:31 Z   14 days  137 attempts
Testing same since   168579  2022-03-14 08:41:36 Z    0 days    8 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 629 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 05:11:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 05:11:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290418.492928 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTzSf-0002nV-KU; Tue, 15 Mar 2022 05:11:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290418.492928; Tue, 15 Mar 2022 05:11:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTzSf-0002mw-FQ; Tue, 15 Mar 2022 05:11:09 +0000
Received: by outflank-mailman (input) for mailman id 290418;
 Mon, 14 Mar 2022 18:47:22 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=AfWQ=TZ=gmail.com=philippe.mathieu.daude@srs-se1.protection.inumbo.net>)
 id 1nTpiz-00051r-U5
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 18:47:22 +0000
Received: from mail-pf1-x429.google.com (mail-pf1-x429.google.com
 [2607:f8b0:4864:20::429])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2cd31309-a3c7-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 19:47:19 +0100 (CET)
Received: by mail-pf1-x429.google.com with SMTP id h2so11524383pfh.6
 for <xen-devel@lists.xenproject.org>; Mon, 14 Mar 2022 11:47:19 -0700 (PDT)
Received: from [192.168.1.115] ([185.126.107.38])
 by smtp.gmail.com with ESMTPSA id
 k14-20020a056a00134e00b004f83f05608esm2061600pfu.31.2022.03.14.11.47.01
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Mon, 14 Mar 2022 11:47:17 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2cd31309-a3c7-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=message-id:date:mime-version:user-agent:subject:content-language:to
         :cc:references:from:in-reply-to:content-transfer-encoding;
        bh=3D0LjBNgeX0U7Mj4vXtRyZDTtfua4bw8Cy52CIrKEcE=;
        b=bfJjZ7cZndCjiv9SqHZ+gz/0oKTvtPYtt1gyUvSRswS4RFTsSgGz7nyM7i3zTsn0l7
         TrXxYHSA7bX7Fzgiv1e9Iq6gmhINLk7AIsPQriBACClelMz0NCtN/89NlMGaZHFIEEHe
         /OhsYPq9qlQnLm0YMaVyIacmu7wCbANhH2Z2P4N0wSykFtKrau7nb3gBpQsmYUKVBk6m
         E8WpjP0G7/3p45G4eCysz94M/86UmhtbyPnn54CCc6qGUdooPX6Yp49QzyFe0M/Xy3jo
         1qqQkUXRdKhFns65phIRg7cAgWHXb57FXw5ZrQBHTbqa96fWU7mOCIdjQB+niAOpUT4z
         co/g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:message-id:date:mime-version:user-agent:subject
         :content-language:to:cc:references:from:in-reply-to
         :content-transfer-encoding;
        bh=3D0LjBNgeX0U7Mj4vXtRyZDTtfua4bw8Cy52CIrKEcE=;
        b=A7AfBBzx4Fw6109UgVSVPWycQsrVUY+/6jhF9+ZO+fnkDMyHAHzPsDU9J1cKukLhyQ
         JAq2vbhAbIbJAi/9i2JLk6gvgSzR/JvLuPx4Xw/32Pqt8uAG6hOrTqevzcRKQ7V14aAu
         n1NX8bPBjZfADfi5gjvM/y6K35AgCB0WDg7cKYfJNSzqVv40HgJnvE9Gy2lgfUc1fH4o
         5M+9aPU+lV74iwIQvU+PJyzEYori/MbicGC8RzrR229zvewdZ4j9h7wa1Y2yGevWxFEh
         83pKReAol95DyamhTIi6YMGSD1OnveLu5+nrmHHn3NYajkEmwnylLxe9lVqi3yEaLQKy
         8l9w==
X-Gm-Message-State: AOAM531/se7n5Lc0KGvuCxK1p2ceD14GOyxH6fnJ5rqqnnxhuJSd1mIJ
	DQG6k1MnPT9GWeeGggvoP90=
X-Google-Smtp-Source: ABdhPJwzbMEzP8c3c5sDX3mZK/oaJ86+KZMRKvtRIkv5Sn/gYzmdRImdNKkSWPP0IhMCI2ss///OUA==
X-Received: by 2002:a63:ba47:0:b0:380:493a:7ed6 with SMTP id l7-20020a63ba47000000b00380493a7ed6mr20860797pgu.355.1647283638334;
        Mon, 14 Mar 2022 11:47:18 -0700 (PDT)
Message-ID: <78a0febe-348a-8398-c57a-4b58038d041d@gmail.com>
Date: Mon, 14 Mar 2022 19:46:59 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH 2/3] 9pfs: Use g_new() & friends where that makes obvious
 sense
Content-Language: en-US
To: Christian Schoenebeck <qemu_oss@crudebyte.com>, qemu-devel@nongnu.org
Cc: Markus Armbruster <armbru@redhat.com>,
 Peter Maydell <peter.maydell@linaro.org>,
 Daniel Henrique Barboza <danielhb413@gmail.com>, kvm@vger.kernel.org,
 "Michael S. Tsirkin" <mst@redhat.com>, Jason Wang <jasowang@redhat.com>,
 Yuval Shaia <yuval.shaia.ml@gmail.com>, Peter Xu <peterx@redhat.com>,
 Klaus Jensen <its@irrelevant.dk>,
 KONRAD Frederic <frederic.konrad@adacore.com>,
 Konstantin Kostiuk <kkostiuk@redhat.com>, Gerd Hoffmann <kraxel@redhat.com>,
 Ani Sinha <ani@anisinha.ca>, Reinoud Zandijk <reinoud@netbsd.org>,
 Eric Blake <eblake@redhat.com>, Sunil Muthuswamy <sunilmut@microsoft.com>,
 Stefano Stabellini <sstabellini@kernel.org>, xen-devel@lists.xenproject.org,
 Yoshinori Sato <ysato@users.sourceforge.jp>,
 Juan Quintela <quintela@redhat.com>, John Snow <jsnow@redhat.com>,
 Paul Durrant <paul@xen.org>, Magnus Damm <magnus.damm@gmail.com>,
 Kamil Rytarowski <kamil@netbsd.org>, "Gonglei (Arei)"
 <arei.gonglei@huawei.com>, =?UTF-8?Q?Herv=c3=a9_Poussineau?=
 <hpoussin@reactos.org>, Mich ael Roth <michael.roth@amd.com>,
 Anthony Perard <anthony.perard@citrix.com>,
 =?UTF-8?Q?Marc-Andr=c3=a9_Lureau?= <marcandre.lureau@redhat.com>,
 Artyom Tarasenko <atar4qemu@gmail.com>, Laurent Vivier <lvivier@redhat.com>,
 Aleksandar Rikalo <aleksandar.rikalo@syrmia.com>, Amit Shah
 <amit@kernel.org>, Mark Cave-Ayland <mark.cave-ayland@ilande.co.uk>,
 haxm-team@intel.com, Richard Henderson <richard.henderson@linaro.org>,
 Greg Kurz <groug@kaod.org>, Fabien Chouteau <chouteau@adacore.com>,
 "Dr. David Alan Gilbert" <dgilbert@redhat.com>,
 Thomas Huth <thuth@redhat.com>, Eric Auger <eric.auger@redhat.com>,
 Alex Williamson <alex.williamson@redhat.com>, qemu-arm@nongnu.org,
 =?UTF-8?Q?C=c3=a9dric_Le_Goater?= <clg@kaod.org>,
 Pavel Dovgalyuk <pavel.dovgaluk@ispras.ru>,
 Paolo Bonzini <pbonzini@redhat.com>, Keith Busch <kbusch@kernel.org>,
 qemu-ppc@nongnu.org, David Hildenbrand <david@redhat.com>,
 =?UTF-8?Q?Alex_Benn=c3=a9e?= <alex.bennee@linaro.org>,
 David Gibson <david@gibson.dropbear.id.au>,
 Eduardo Habkost <eduardo@habkost.net>,
 Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>,
 =?UTF-8?Q?Daniel_P=2e_Berrang=c3=a9?= <berrange@redhat.com>,
 qemu-block@nongnu.org, Max Filippov <jcmvbkbc@gmail.com>,
 qemu-s390x@nongnu.org, Patrick Venture <venture@google.com>,
 Cornelia Huck <cohuck@redhat.com>, =?UTF-8?Q?Philippe_Mathieu-Daud=c3=a9?=
 <f4bug@amsat.org>, Jean-Christophe Dubois <jcd@tribudubois.net>,
 Corey Minyard <cminyard@mvista.com>, Wenchao Wang <wenchao.wang@intel.com>,
 Igor Mammedov <imammedo@redhat.com>, Colin Xu <colin.xu@intel.com>
References: <20220314160108.1440470-1-armbru@redhat.com>
 <20220314160108.1440470-3-armbru@redhat.com> <2292394.T0kE68JRDY@silver>
From: =?UTF-8?Q?Philippe_Mathieu-Daud=c3=a9?=
 <philippe.mathieu.daude@gmail.com>
In-Reply-To: <2292394.T0kE68JRDY@silver>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi Christian,

On 14/3/22 17:42, Christian Schoenebeck wrote:
> On Montag, 14. März 2022 17:01:07 CET Markus Armbruster wrote:
>> g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
>> for two reasons.  One, it catches multiplication overflowing size_t.
>> Two, it returns T * rather than void *, which lets the compiler catch
>> more type errors.
>>
>> This commit only touches allocations with size arguments of the form
>> sizeof(T).
>>
>> Patch created mechanically with:
>>
>>      $ spatch --in-place --sp-file scripts/coccinelle/use-g_new-etc.cocci \
>> 	     --macro-file scripts/cocci-macro-file.h FILES...
>>
>> Except this uncovers a typing error:
>>
>>      ../hw/9pfs/9p.c:855:13: warning: incompatible pointer types assigning to
>> 'QpfEntry *' from 'QppEntry *' [-Wincompatible-pointer-types] val =
>> g_new0(QppEntry, 1);
>> 		^ ~~~~~~~~~~~~~~~~~~~
>>      1 warning generated.
>>
>> Harmless, because QppEntry is larger than QpfEntry.  Fix to allocate a
>> QpfEntry instead.
>>
>> Cc: Greg Kurz <groug@kaod.org>
>> Cc: Christian Schoenebeck <qemu_oss@crudebyte.com>
>> Signed-off-by: Markus Armbruster <armbru@redhat.com>
>> ---
> 
> Reviewed-by: Christian Schoenebeck <qemu_oss@crudebyte.com>

FYI your domain is also quarantined by Google:

ARC-Authentication-Results: i=1; mx.google.com;
        dkim=fail header.i=@crudebyte.com header.s=lizzy header.b=olij9WvS;
        spf=softfail (google.com: domain of transitioning 
qemu_oss@crudebyte.com does not designate 172.105.152.211 as permitted 
sender) smtp.mailfrom=qemu_oss@crudebyte.com;
        dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=QUARANTINE) 
header.from=crudebyte.com
Received-SPF: softfail (google.com: domain of transitioning 
qemu_oss@crudebyte.com does not designate 172.105.152.211 as permitted 
sender) client-ip=172.105.152.211;
Authentication-Results: mx.google.com;
        dkim=fail header.i=@crudebyte.com header.s=lizzy header.b=olij9WvS;
        spf=softfail (google.com: domain of transitioning 
qemu_oss@crudebyte.com does not designate 172.105.152.211 as permitted 
sender) smtp.mailfrom=qemu_oss@crudebyte.com;
        dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=QUARANTINE) 
header.from=crudebyte.com
X-Rspamd-Queue-Id: AC61617709E
X-Spamd-Result: default: False [-2.01 / 7.00]; 
BAYES_HAM(-3.00)[100.00%]; SUSPICIOUS_RECIPS(1.50)[]; 
DMARC_POLICY_ALLOW(-0.50)[crudebyte.com,quarantine]; 
MID_RHS_NOT_FQDN(0.50)[]; R_DKIM_ALLOW(-0.20)[crudebyte.com:s=lizzy]; 
R_SPF_ALLOW(-0.20)[+ip4:91.194.90.13]; MIME_GOOD(-0.10)[text/plain]; 
MX_GOOD(-0.01)[]; RCVD_COUNT_ZERO(0.00)[0]; ASN(0.00)[asn:51167, 
ipnet:91.194.90.0/23, country:DE]; MIME_TRACE(0.00)[0:+]; 
FREEMAIL_CC(0.00)[redhat.com,linaro.org,gmail.com,vger.kernel.org,irrelevant.dk,adacore.com,anisinha.ca,netbsd.org,microsoft.com,kernel.org,lists.xenproject.org,users.sourceforge.jp,xen.org,huawei.com,reactos.org,amd.com,citrix.com,syrmia.com,ilande.co.uk,intel.com,kaod.org,nongnu.org,ispras.ru,gibson.dropbear.id.au,habkost.net,virtuozzo.com,google.com,amsat.org,tribudubois.net,mvista.com]; 
FROM_EQ_ENVFROM(0.00)[]; NEURAL_HAM(-0.00)[-0.923]; ARC_NA(0.00)[]; 
DKIM_TRACE(0.00)[crudebyte.com:+]; FROM_HAS_DN(0.00)[]; 
RCPT_COUNT_GT_50(0.00)[66]; TO_DN_SOME(0.00)[]; 
TO_MATCH_ENVRCPT_SOME(0.00)[]; TAGGED_RCPT(0.00)[]; 
RCVD_IN_DNSWL_FAIL(0.00)[91.194.90.13:server fail]
X-Rspamd-Server: atlanta189


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 05:11:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 05:11:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290342.492923 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTzSf-0002kI-A3; Tue, 15 Mar 2022 05:11:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290342.492923; Tue, 15 Mar 2022 05:11:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nTzSf-0002kB-6l; Tue, 15 Mar 2022 05:11:09 +0000
Received: by outflank-mailman (input) for mailman id 290342;
 Mon, 14 Mar 2022 16:41:30 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=AfWQ=TZ=gmail.com=philippe.mathieu.daude@srs-se1.protection.inumbo.net>)
 id 1nTnlC-0003yM-9y
 for xen-devel@lists.xenproject.org; Mon, 14 Mar 2022 16:41:30 +0000
Received: from mail-pj1-x102b.google.com (mail-pj1-x102b.google.com
 [2607:f8b0:4864:20::102b])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 98629fdc-a3b5-11ec-8eba-a37418f5ba1a;
 Mon, 14 Mar 2022 17:41:29 +0100 (CET)
Received: by mail-pj1-x102b.google.com with SMTP id v4so15267725pjh.2
 for <xen-devel@lists.xenproject.org>; Mon, 14 Mar 2022 09:41:29 -0700 (PDT)
Received: from [192.168.1.115] ([185.126.107.38])
 by smtp.gmail.com with ESMTPSA id
 s1-20020a056a00178100b004f731a1a952sm22043486pfg.168.2022.03.14.09.41.12
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Mon, 14 Mar 2022 09:41:27 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 98629fdc-a3b5-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=message-id:date:mime-version:user-agent:subject:content-language:to
         :cc:references:from:in-reply-to:content-transfer-encoding;
        bh=W0zrBM+N0hxFD4HvfoclDpELnmJr/18GN6q0lPZatEw=;
        b=fmpUDGOi8OZUJgMmHkU4ZiecIW8QqM1a02qsRb5yuKVzZqkKGRd0gAv5AfPJZciLC2
         wyfwXolLcpsITp6G/VgGOl4n+QuCOLQk3Yq16Z7BHeO1D5wgcSAf/IDLm72KrjEXZHV/
         M4BRhf0N2E/JnyG/RHuUFZTe+nWC8OwxMU8ozx661gpkTL/UO2ghlDIt48sBGxo0Msdh
         /YNfia3uEbrZh1oI7H2fo/d1bB9/w6wpunLJALQRD5SqFqrj8TQigLM4Ted+4sWSxOKR
         FPVMqV/tM1261P8Mf1g7qtmMopnyahbNNaai7t7ssi2iWy+HgxXH9dvrAsqdbHKia6V5
         abag==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:message-id:date:mime-version:user-agent:subject
         :content-language:to:cc:references:from:in-reply-to
         :content-transfer-encoding;
        bh=W0zrBM+N0hxFD4HvfoclDpELnmJr/18GN6q0lPZatEw=;
        b=JYZT9tBkiEvRYq2cyLNeekmY7jOWZuVMxN4vTpXPPD7BER5n+0DRwX2Cw+oFrx4fsw
         d7kaYyuFPqpuXXFw+LjYbMRqg4AWXqkbSRx7LBQG5yOqNP6p8eNdCCiDR/Y0fiGH4s3S
         JBq+7HJ0/k5q1VBNSdmIs/JDk/JJZNSQSdJBj5aTuHnLo8tW+qS/Igx34MlUmEwxSoQs
         gbw95TQuYvYiilT30EISc+Da2aFnR3x3bToOfusSQgQV+CZ62EtRFl/+lnNXSi9/+Se6
         V93JXji9RT5AkleA3ElTHJ2TN0h45WTHSscEe9qFhz12R1QODWjHkZNhfRJd2HHK2MjK
         k4kw==
X-Gm-Message-State: AOAM5309KTeSqDxD/aG5ZAqMv0Hb4kQekI4E5SKNDw/8cKg01eF+5dKM
	46adlp0f9awtpeV3qwdMhRY=
X-Google-Smtp-Source: ABdhPJwPi5HHkN9qRkorFbCauI5zttPHA5P4ioPiaxV0wCn1Jl6lXBIv9n8vWOh2Ce6Vb5rH2bPC8Q==
X-Received: by 2002:a17:90a:1b4a:b0:1bf:1112:5ef with SMTP id q68-20020a17090a1b4a00b001bf111205efmr36323pjq.143.1647276087626;
        Mon, 14 Mar 2022 09:41:27 -0700 (PDT)
Message-ID: <8ac83023-3609-4b24-6ffc-9f93478ce69b@gmail.com>
Date: Mon, 14 Mar 2022 17:41:09 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH 0/3] Use g_new() & friends where that makes obvious
Content-Language: en-US
To: Markus Armbruster <armbru@redhat.com>, qemu-devel@nongnu.org
Cc: Paolo Bonzini <pbonzini@redhat.com>,
 Richard Henderson <richard.henderson@linaro.org>,
 Gerd Hoffmann <kraxel@redhat.com>,
 Christian Schoenebeck <qemu_oss@crudebyte.com>,
 "Gonglei (Arei)" <arei.gonglei@huawei.com>,
 =?UTF-8?Q?Marc-Andr=c3=a9_Lureau?= <marcandre.lureau@redhat.com>,
 "Michael S. Tsirkin" <mst@redhat.com>, Igor Mammedov <imammedo@redhat.com>,
 Ani Sinha <ani@anisinha.ca>, Laurent Vivier <lvivier@redhat.com>,
 Amit Shah <amit@kernel.org>, Peter Maydell <peter.maydell@linaro.org>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Anthony Perard <anthony.perard@citrix.com>, Paul Durrant <paul@xen.org>,
 =?UTF-8?Q?Herv=c3=a9_Poussineau?= <hpoussin@reactos.org>,
 Aleksandar Rikalo <aleksandar.rikalo@syrmia.com>,
 Corey Minyard <cminyard@mvista.com>, Patrick Venture <venture@google.com>,
 Eduardo Habkost <eduardo@habkost.net>,
 Marcel Apfelbaum <marcel.apfelbaum@gmail.com>, Peter Xu <peterx@redhat.com>,
 Jason Wang <jasowang@redhat.com>, =?UTF-8?Q?C=c3=a9dric_Le_Goater?=
 <clg@kaod.org>, Daniel Henrique Barboza <danielhb413@gmail.com>,
 David Gibson <david@gibson.dropbear.id.au>, Greg Kurz <groug@kaod.org>,
 =?UTF-8?Q?Philippe_Mathieu-Daud=c3=a9?= <f4bug@amsat.org>,
 Jean-Christophe Dubois <jcd@tribudubois.net>, Keith Busch
 <kbusch@kernel.org>, Klaus Jensen <its@irrelevant.dk>,
 Yuval Shaia <yuval.shaia.ml@gmail.com>,
 Yoshinori Sato <ysato@users.sourceforge.jp>,
 Magnus Damm <magnus.damm@gmail.com>, Fabien Chouteau <chouteau@adacore.com>,
 KONRAD Frederic <frederic.konrad@adacore.com>,
 Mark Cave-Ayland <mark.cave-ayland@ilande.co.uk>,
 Artyom Tarasenko <atar4qemu@gmail.com>,
 Alex Williamson <alex.williamson@redhat.com>,
 Eric Auger <eric.auger@redhat.com>, Max Filippov <jcmvbkbc@gmail.com>,
 Juan Quintela <quintela@redhat.com>,
 "Dr. David Alan Gilbert" <dgilbert@redhat.com>,
 Konstantin Kostiuk <kkostiuk@redhat.com>, Michael Roth
 <michael.roth@amd.com>, =?UTF-8?Q?Daniel_P=2e_Berrang=c3=a9?=
 <berrange@redhat.com>, Pavel Dovgalyuk <pavel.dovgaluk@ispras.ru>,
 =?UTF-8?Q?Alex_Benn=c3=a9e?= <alex.bennee@linaro.org>,
 David Hildenbrand <david@redhat.com>, Wenchao Wang <wenchao.wang@intel.com>,
 Colin Xu <colin.xu@intel.com>, Kamil Rytarowski <kamil@netbsd.org>,
 Reinoud Zandijk <reinoud@netbsd.org>,
 Sunil Muthuswamy <sunilmut@microsoft.com>, Cornelia Huck
 <cohuck@redhat.com>, Thomas Huth <thuth@redhat.com>,
 Eric Blake <eblake@redhat.com>,
 Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>,
 John Snow <jsnow@redhat.com>, kvm@vger.kernel.org, qemu-arm@nongnu.org,
 xen-devel@lists.xenproject.org, qemu-ppc@nongnu.org, qemu-block@nongnu.org,
 haxm-team@intel.com, qemu-s390x@nongnu.org
References: <20220314160108.1440470-1-armbru@redhat.com>
From: =?UTF-8?Q?Philippe_Mathieu-Daud=c3=a9?=
 <philippe.mathieu.daude@gmail.com>
In-Reply-To: <20220314160108.1440470-1-armbru@redhat.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

On 14/3/22 17:01, Markus Armbruster wrote:
> g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
> for two reasons.  One, it catches multiplication overflowing size_t.
> Two, it returns T * rather than void *, which lets the compiler catch
> more type errors.
> 
> This series only touches allocations with size arguments of the form
> sizeof(T).  It's mechanical, except for a tiny fix in PATCH 2.
> 
> PATCH 1 adds the Coccinelle script.
> 
> PATCH 2 cleans up the virtio-9p subsystem, and fixes a harmless typing
> error uncovered by the cleanup.
> 
> PATCH 3 cleans up everything else.  I started to split it up, but
> splitting is a lot of decisions, and I just can't see the value.
> 
> For instance, MAINTAINERS tells me to split for subsystem "virtio",
> patching
> 
>      hw/char/virtio-serial-bus.c
>      hw/display/virtio-gpu.c
>      hw/net/virtio-net.c
>      hw/virtio/virtio-crypto.c
>      hw/virtio/virtio-iommu.c
>      hw/virtio/virtio.c
> 
> But it also tells me to split for subsystem "Character devices",
> patching
> 
>      hw/char/parallel.c                       |  2 +-
>      hw/char/riscv_htif.c                     |  2 +-
>      hw/char/virtio-serial-bus.c              |  6 +-
> 
> and for subsystem "Network devices", patching
> 
>      hw/net/virtio-net.c
> 
> and for subsystem "virtio-gpu", patching
> 
>      hw/display/virtio-gpu.c
> 
> I guess I'd go with "virtio".  Six files down, 103 to go.  Thanks, but
> no thanks.
> 
> Since the transformation is local to a function call, dropping is
> completely safe.  We can deal with conflicts by dropping conflicting
> hunks, with "git-pull -s recursive -X ours".  Or drop entire files
> with conflicts.
> 
> If you want me to split off certain parts, please tell me exactly what
> you want split off, and I'll gladly do the splitting.  I don't mind
> the splitting part, I do mind the *thinking* part.
> 
> Markus Armbruster (3):
>    scripts/coccinelle: New use-g_new-etc.cocci
>    9pfs: Use g_new() & friends where that makes obvious sense
>    Use g_new() & friends where that makes obvious sense

Series:
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 06:05:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 06:05:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290626.492945 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU0IS-0000np-DZ; Tue, 15 Mar 2022 06:04:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290626.492945; Tue, 15 Mar 2022 06:04:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU0IS-0000ni-AL; Tue, 15 Mar 2022 06:04:40 +0000
Received: by outflank-mailman (input) for mailman id 290626;
 Tue, 15 Mar 2022 06:04:39 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RDYY=T2=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nU0IR-0000nc-2O
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 06:04:39 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id cad1030b-a425-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 07:04:36 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 5000D1F37E;
 Tue, 15 Mar 2022 06:04:36 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id F29AE1333E;
 Tue, 15 Mar 2022 06:04:35 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id bdP3OXMsMGLXMAAAMHmgww
 (envelope-from <jgross@suse.com>); Tue, 15 Mar 2022 06:04:35 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cad1030b-a425-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647324276; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=e/GLtn5AEFEJ7QEX63zN4iT5Q81OAoidRdo+GYn5568=;
	b=MHZ+4pO7+82e3UpB8db69LL9Tnp2Dy9O4pzN1zQ7B8Kfo7ST8yi6fpzoJrVfQfaQdMsEsA
	3QiYTZ+GeTWW0835/Ro4Ouce64qnUXxpZGT5778JQOAIpsGdTJborJsghND7QALQ56Rdus
	nAd/6WiJuqWjVKMGTQq9D+CoDB+lbUc=
Message-ID: <aee7dedf-3f70-da48-8be5-3d7cc9ec392c@suse.com>
Date: Tue, 15 Mar 2022 07:04:35 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Content-Language: en-US
To: Stefano Stabellini <sstabellini@kernel.org>,
 Luca Fancellu <Luca.Fancellu@arm.com>
Cc: Xen-devel <xen-devel@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>,
 Julien Grall <julien@xen.org>, Bertrand Marquis <Bertrand.Marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Wei Liu <wl@xen.org>, Dario Faggioli <dfaggioli@suse.com>
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-5-luca.fancellu@arm.com>
 <alpine.DEB.2.22.394.2203101957370.3497@ubuntu-linux-20-04-desktop>
 <A34CF75A-8139-4A4A-A1AE-3BA74E70DE55@arm.com>
 <alpine.DEB.2.22.394.2203111600330.3497@ubuntu-linux-20-04-desktop>
From: Juergen Gross <jgross@suse.com>
Subject: Re: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
In-Reply-To: <alpine.DEB.2.22.394.2203111600330.3497@ubuntu-linux-20-04-desktop>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------npWiV4YWQl4BQKAK0YzpuUB8"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------npWiV4YWQl4BQKAK0YzpuUB8
Content-Type: multipart/mixed; boundary="------------SLCFNqISoOlD0mHB2HcowaWU";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Stefano Stabellini <sstabellini@kernel.org>,
 Luca Fancellu <Luca.Fancellu@arm.com>
Cc: Xen-devel <xen-devel@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>,
 Julien Grall <julien@xen.org>, Bertrand Marquis <Bertrand.Marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Wei Liu <wl@xen.org>, Dario Faggioli <dfaggioli@suse.com>
Message-ID: <aee7dedf-3f70-da48-8be5-3d7cc9ec392c@suse.com>
Subject: Re: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-5-luca.fancellu@arm.com>
 <alpine.DEB.2.22.394.2203101957370.3497@ubuntu-linux-20-04-desktop>
 <A34CF75A-8139-4A4A-A1AE-3BA74E70DE55@arm.com>
 <alpine.DEB.2.22.394.2203111600330.3497@ubuntu-linux-20-04-desktop>
In-Reply-To: <alpine.DEB.2.22.394.2203111600330.3497@ubuntu-linux-20-04-desktop>

--------------SLCFNqISoOlD0mHB2HcowaWU
Content-Type: multipart/mixed; boundary="------------RW7RotpJaUSl4lrAq898j6oG"

--------------RW7RotpJaUSl4lrAq898j6oG
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------RW7RotpJaUSl4lrAq898j6oG
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------RW7RotpJaUSl4lrAq898j6oG--

--------------SLCFNqISoOlD0mHB2HcowaWU--

--------------npWiV4YWQl4BQKAK0YzpuUB8
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIwLHMFAwAAAAAACgkQsN6d1ii/Ey8W
pAf/RHM6BGhzTguo8RL4fhKS8TJES7igcqn4t6EVZshY4wci1F22t5NQxD7yZshu5upYmShLCmsw
YPQhRtMJH9XC1AiU7NjkVAKd1FLcMVx52YPeck42Xr1v5hX6caO/O9Eq8gngJq9UaPJxi8rATFY7
Txj+heD4kW3CYjQjGvN97R56cUxDCaiYVef7qVQFtVbmMcCA0jUdBlcoKzJPKYAl5Iqs9C6sAL3N
kWcXADbHo68z8/vnnOFPwsrSAIKqt5X390pkOT12BebdGZft3mU2MEw5thTTYRNig6w5AePXluNw
yRP0BkdyKjlGl9uNXPx0mA1VrO7ytL9QZ4m++8yY7g==
=KU5B
-----END PGP SIGNATURE-----

--------------npWiV4YWQl4BQKAK0YzpuUB8--


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 06:10:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 06:10:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290631.492956 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU0Ny-0002Qq-4E; Tue, 15 Mar 2022 06:10:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290631.492956; Tue, 15 Mar 2022 06:10:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU0Ny-0002Qj-1L; Tue, 15 Mar 2022 06:10:22 +0000
Received: by outflank-mailman (input) for mailman id 290631;
 Tue, 15 Mar 2022 06:10:21 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RDYY=T2=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nU0Nw-0002Qd-VM
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 06:10:20 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 978435cb-a426-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 07:10:20 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id B5C8E1F391;
 Tue, 15 Mar 2022 06:10:19 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 91F9B1333E;
 Tue, 15 Mar 2022 06:10:19 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id TYYDIsstMGKOMgAAMHmgww
 (envelope-from <jgross@suse.com>); Tue, 15 Mar 2022 06:10:19 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 978435cb-a426-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647324619; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=VBMUNurecPF8Y85BnPuMM4wfLEGKltenwgjpYkSDT+s=;
	b=sZolrUCxYPQvi/BHcF3UJt08AscdC4sI33LAKS/jmq8MYkYqjIYlnTgBdaLxCGGJonyy6t
	LGR1aA79id76b6DWEHF0dalvRRssYscuOx1yiR+7pfrraDGV15Ew14BQi4lr3+2ohHJrVR
	gHKgbi9YzGZaF04odj4Yklqgaeq78+o=
Message-ID: <1633fb91-3771-e37c-14ce-43f1b0cda6a0@suse.com>
Date: Tue, 15 Mar 2022 07:10:19 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH 1/2] xen/grant-table: remove gnttab_*transfer*() functions
Content-Language: en-US
To: Boris Ostrovsky <boris.ostrovsky@oracle.com>,
 xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org
Cc: Stefano Stabellini <sstabellini@kernel.org>
References: <20220311103429.12845-1-jgross@suse.com>
 <20220311103429.12845-2-jgross@suse.com>
 <63365484-7035-f2bd-5317-2e95d65993f7@oracle.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <63365484-7035-f2bd-5317-2e95d65993f7@oracle.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------EEIkysVNYzUiG06vSeZ1qouw"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------EEIkysVNYzUiG06vSeZ1qouw
Content-Type: multipart/mixed; boundary="------------zaOqujjtlt1VlU0O9yUFZMcY";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Boris Ostrovsky <boris.ostrovsky@oracle.com>,
 xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org
Cc: Stefano Stabellini <sstabellini@kernel.org>
Message-ID: <1633fb91-3771-e37c-14ce-43f1b0cda6a0@suse.com>
Subject: Re: [PATCH 1/2] xen/grant-table: remove gnttab_*transfer*() functions
References: <20220311103429.12845-1-jgross@suse.com>
 <20220311103429.12845-2-jgross@suse.com>
 <63365484-7035-f2bd-5317-2e95d65993f7@oracle.com>
In-Reply-To: <63365484-7035-f2bd-5317-2e95d65993f7@oracle.com>

--------------zaOqujjtlt1VlU0O9yUFZMcY
Content-Type: multipart/mixed; boundary="------------wU4WnJfcRK4iZYGFdve8dTAt"

--------------wU4WnJfcRK4iZYGFdve8dTAt
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------wU4WnJfcRK4iZYGFdve8dTAt
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------wU4WnJfcRK4iZYGFdve8dTAt--

--------------zaOqujjtlt1VlU0O9yUFZMcY--

--------------EEIkysVNYzUiG06vSeZ1qouw
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIwLcsFAwAAAAAACgkQsN6d1ii/Ey8I
7QgAiF6wFA5yY04zgn6CQwqX1adP+E1VtWJ8sWb3d4FZnlSs6MB9eeggPF8yknmaWzhBCFQiXDXk
Brr4CVryD9lBc0ZSvgB7DmxAlxgA6XfZce+8rlY0LDqElhBy0PZ+YH4QNnhb0HchUtbl4/w8Iafh
XWNpEcAP5hkOo0oFeny6N2RinnxWrQUecNyASdwKc/35HXnvcriiJ2YQ1uFowE2Hu0cxtG5vCpn3
K7b8Vdd+e/YbBG3H0ulwP8aE3v1bJDq4/BSz3b/5anIVPKjIIk+R1t0l73aQt6+EWACZMT1svn9r
LWSQ5AdvRg8omZjJu02sKxT7n4QbpF9owGdYkugn8w==
=+ElC
-----END PGP SIGNATURE-----

--------------EEIkysVNYzUiG06vSeZ1qouw--


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 06:19:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 06:19:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290634.492966 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU0Wh-0003Fs-10; Tue, 15 Mar 2022 06:19:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290634.492966; Tue, 15 Mar 2022 06:19:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU0Wg-0003Fl-UL; Tue, 15 Mar 2022 06:19:22 +0000
Received: by outflank-mailman (input) for mailman id 290634;
 Tue, 15 Mar 2022 06:19:21 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU0Wf-0003FZ-IO; Tue, 15 Mar 2022 06:19:21 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU0Wf-0004M4-Ep; Tue, 15 Mar 2022 06:19:21 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU0Wf-0003Oe-3i; Tue, 15 Mar 2022 06:19:21 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nU0Wf-0002YK-33; Tue, 15 Mar 2022 06:19:21 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=PA591aFFwJjBIPr9IRbtsdMc7SwVGAbwaFVvXallqds=; b=xxJ8SP4VI7Y2qTEYal1cyhV/C4
	+Dn9qQ3kAIihDnq4bTUKPIq1/bqnSiaNrjEjrQvwJXoGjLwCvu3DE4j4j5QrZbIigG3AsrQC2ZYof
	XuqxAMIEcRJdoQhkpQBOGB52uHInYf5Dx+cA3p+QZFckk7qxv9jNZgmio+ylTQNWA/Og=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168609-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168609: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=a13dfc769bd7097d8d9ffe3e029a2c1d062d712b
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 15 Mar 2022 06:19:21 +0000

flight 168609 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168609/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 a13dfc769bd7097d8d9ffe3e029a2c1d062d712b
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   14 days
Failing since        168258  2022-03-01 01:55:31 Z   14 days  138 attempts
Testing same since   168579  2022-03-14 08:41:36 Z    0 days    9 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 629 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 06:36:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 06:36:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290641.492977 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU0nD-0005ku-ES; Tue, 15 Mar 2022 06:36:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290641.492977; Tue, 15 Mar 2022 06:36:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU0nD-0005kn-Bd; Tue, 15 Mar 2022 06:36:27 +0000
Received: by outflank-mailman (input) for mailman id 290641;
 Tue, 15 Mar 2022 06:36:25 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nUHZ=T2=lst.de=hch@srs-se1.protection.inumbo.net>)
 id 1nU0nB-0005kh-97
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 06:36:25 +0000
Received: from verein.lst.de (verein.lst.de [213.95.11.211])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 386e3c66-a42a-11ec-853b-5f4723681683;
 Tue, 15 Mar 2022 07:36:18 +0100 (CET)
Received: by verein.lst.de (Postfix, from userid 2407)
 id 2BC5468AFE; Tue, 15 Mar 2022 07:36:18 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 386e3c66-a42a-11ec-853b-5f4723681683
Date: Tue, 15 Mar 2022 07:36:18 +0100
From: Christoph Hellwig <hch@lst.de>
To: Boris Ostrovsky <boris.ostrovsky@oracle.com>
Cc: Christoph Hellwig <hch@lst.de>, iommu@lists.linux-foundation.org,
	x86@kernel.org, Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org, linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org, tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: Re: [PATCH 12/15] swiotlb: provide swiotlb_init variants that
 remap the buffer
Message-ID: <20220315063618.GA1244@lst.de>
References: <20220314073129.1862284-1-hch@lst.de> <20220314073129.1862284-13-hch@lst.de> <4d800aa8-5e38-1ad9-284f-1754c83d0f8a@oracle.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <4d800aa8-5e38-1ad9-284f-1754c83d0f8a@oracle.com>
User-Agent: Mutt/1.5.17 (2007-11-01)

On Mon, Mar 14, 2022 at 06:39:21PM -0400, Boris Ostrovsky wrote:
> This is IO_TLB_MIN_SLABS, isn't it? (Xen code didn't say so but that's what it meant to say I believe)

Yes, that makes much more sense.  I've switched the patch to use
IO_TLB_MIN_SLABS and drop the 2MB comment in both places.

Can I get a review with that fixed up?

---
>From 153085bf3e6e69d676bef0fb96395a86fb8122f5 Mon Sep 17 00:00:00 2001
From: Christoph Hellwig <hch@lst.de>
Date: Mon, 14 Mar 2022 08:02:57 +0100
Subject: swiotlb: provide swiotlb_init variants that remap the buffer

To shared more code between swiotlb and xen-swiotlb, offer a
swiotlb_init_remap interface and add a remap callback to
swiotlb_init_late that will allow Xen to remap the buffer the
buffer without duplicating much of the logic.

Signed-off-by: Christoph Hellwig <hch@lst.de>
---
 arch/x86/pci/sta2x11-fixup.c |  2 +-
 include/linux/swiotlb.h      |  5 ++++-
 kernel/dma/swiotlb.c         | 36 +++++++++++++++++++++++++++++++++---
 3 files changed, 38 insertions(+), 5 deletions(-)

diff --git a/arch/x86/pci/sta2x11-fixup.c b/arch/x86/pci/sta2x11-fixup.c
index c7e6faf59a861..7368afc039987 100644
--- a/arch/x86/pci/sta2x11-fixup.c
+++ b/arch/x86/pci/sta2x11-fixup.c
@@ -57,7 +57,7 @@ static void sta2x11_new_instance(struct pci_dev *pdev)
 		int size = STA2X11_SWIOTLB_SIZE;
 		/* First instance: register your own swiotlb area */
 		dev_info(&pdev->dev, "Using SWIOTLB (size %i)\n", size);
-		if (swiotlb_init_late(size, GFP_DMA))
+		if (swiotlb_init_late(size, GFP_DMA, NULL))
 			dev_emerg(&pdev->dev, "init swiotlb failed\n");
 	}
 	list_add(&instance->list, &sta2x11_instance_list);
diff --git a/include/linux/swiotlb.h b/include/linux/swiotlb.h
index ee655f2e4d28b..7b50c82f84ce9 100644
--- a/include/linux/swiotlb.h
+++ b/include/linux/swiotlb.h
@@ -36,8 +36,11 @@ struct scatterlist;
 
 int swiotlb_init_with_tbl(char *tlb, unsigned long nslabs, unsigned int flags);
 unsigned long swiotlb_size_or_default(void);
+void __init swiotlb_init_remap(bool addressing_limit, unsigned int flags,
+	int (*remap)(void *tlb, unsigned long nslabs));
+int swiotlb_init_late(size_t size, gfp_t gfp_mask,
+	int (*remap)(void *tlb, unsigned long nslabs));
 extern int swiotlb_late_init_with_tbl(char *tlb, unsigned long nslabs);
-int swiotlb_init_late(size_t size, gfp_t gfp_mask);
 extern void __init swiotlb_update_mem_attributes(void);
 
 phys_addr_t swiotlb_tbl_map_single(struct device *hwdev, phys_addr_t phys,
diff --git a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c
index 79641c446d284..b3d4f24fb5f5e 100644
--- a/kernel/dma/swiotlb.c
+++ b/kernel/dma/swiotlb.c
@@ -256,9 +256,11 @@ int __init swiotlb_init_with_tbl(char *tlb, unsigned long nslabs,
  * Statically reserve bounce buffer space and initialize bounce buffer data
  * structures for the software IO TLB used to implement the DMA API.
  */
-void __init swiotlb_init(bool addressing_limit, unsigned int flags)
+void __init swiotlb_init_remap(bool addressing_limit, unsigned int flags,
+		int (*remap)(void *tlb, unsigned long nslabs))
 {
-	size_t bytes = PAGE_ALIGN(default_nslabs << IO_TLB_SHIFT);
+	unsigned long nslabs = default_nslabs;
+	size_t bytes;
 	void *tlb;
 
 	if (!addressing_limit && !swiotlb_force_bounce)
@@ -271,12 +273,23 @@ void __init swiotlb_init(bool addressing_limit, unsigned int flags)
 	 * allow to pick a location everywhere for hypervisors with guest
 	 * memory encryption.
 	 */
+retry:
+	bytes = PAGE_ALIGN(default_nslabs << IO_TLB_SHIFT);
 	if (flags & SWIOTLB_ANY)
 		tlb = memblock_alloc(bytes, PAGE_SIZE);
 	else
 		tlb = memblock_alloc_low(bytes, PAGE_SIZE);
 	if (!tlb)
 		goto fail;
+	if (remap && remap(tlb, nslabs) < 0) {
+		memblock_free(tlb, PAGE_ALIGN(bytes));
+
+		if (nslabs <= IO_TLB_MIN_SLABS)
+			panic("%s: Failed to remap %zu bytes\n",
+			      __func__, bytes);
+		nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
+		goto retry;
+	}
 	if (swiotlb_init_with_tbl(tlb, default_nslabs, flags))
 		goto fail_free_mem;
 	return;
@@ -287,12 +300,18 @@ void __init swiotlb_init(bool addressing_limit, unsigned int flags)
 	pr_warn("Cannot allocate buffer");
 }
 
+void __init swiotlb_init(bool addressing_limit, unsigned int flags)
+{
+	return swiotlb_init_remap(addressing_limit, flags, NULL);
+}
+
 /*
  * Systems with larger DMA zones (those that don't support ISA) can
  * initialize the swiotlb later using the slab allocator if needed.
  * This should be just like above, but with some error catching.
  */
-int swiotlb_init_late(size_t size, gfp_t gfp_mask)
+int swiotlb_init_late(size_t size, gfp_t gfp_mask,
+		int (*remap)(void *tlb, unsigned long nslabs))
 {
 	unsigned long nslabs = ALIGN(size >> IO_TLB_SHIFT, IO_TLB_SEGSIZE);
 	unsigned long bytes;
@@ -303,6 +322,7 @@ int swiotlb_init_late(size_t size, gfp_t gfp_mask)
 	if (swiotlb_force_disable)
 		return 0;
 
+retry:
 	order = get_order(nslabs << IO_TLB_SHIFT);
 	nslabs = SLABS_PER_PAGE << order;
 	bytes = nslabs << IO_TLB_SHIFT;
@@ -317,6 +337,16 @@ int swiotlb_init_late(size_t size, gfp_t gfp_mask)
 
 	if (!vstart)
 		return -ENOMEM;
+	if (remap)
+		rc = remap(vstart, nslabs);
+	if (rc) {
+		free_pages((unsigned long)vstart, order);
+ 
+		if (IO_TLB_MIN_SLABS <= 1024)
+			return rc;
+		nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
+		goto retry;
+	}
 
 	if (order != get_order(bytes)) {
 		pr_warn("only able to allocate %ld MB\n",
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 06:48:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 06:48:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290644.492989 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU0yu-0007YE-Hk; Tue, 15 Mar 2022 06:48:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290644.492989; Tue, 15 Mar 2022 06:48:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU0yu-0007Y7-Ee; Tue, 15 Mar 2022 06:48:32 +0000
Received: by outflank-mailman (input) for mailman id 290644;
 Tue, 15 Mar 2022 06:48:31 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=nUHZ=T2=lst.de=hch@srs-se1.protection.inumbo.net>)
 id 1nU0yt-0007Y1-NZ
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 06:48:31 +0000
Received: from verein.lst.de (verein.lst.de [213.95.11.211])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ec51fe2b-a42b-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 07:48:30 +0100 (CET)
Received: by verein.lst.de (Postfix, from userid 2407)
 id 5D2E468AFE; Tue, 15 Mar 2022 07:48:26 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ec51fe2b-a42b-11ec-8eba-a37418f5ba1a
Date: Tue, 15 Mar 2022 07:48:26 +0100
From: Christoph Hellwig <hch@lst.de>
To: Boris Ostrovsky <boris.ostrovsky@oracle.com>
Cc: Christoph Hellwig <hch@lst.de>, iommu@lists.linux-foundation.org,
	x86@kernel.org, Anshuman Khandual <anshuman.khandual@arm.com>,
	Tom Lendacky <thomas.lendacky@amd.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Juergen Gross <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org,
	xen-devel@lists.xenproject.org, linux-ia64@vger.kernel.org,
	linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org,
	linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org,
	linux-hyperv@vger.kernel.org, tboot-devel@lists.sourceforge.net,
	linux-pci@vger.kernel.org
Subject: Re: [PATCH 13/15] swiotlb: merge swiotlb-xen initialization into
 swiotlb
Message-ID: <20220315064826.GA1508@lst.de>
References: <20220314073129.1862284-1-hch@lst.de> <20220314073129.1862284-14-hch@lst.de> <6a43380c-b873-3f8e-5d5b-4a066ee57ac2@oracle.com>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="WYTEVAkct0FjGQmd"
Content-Disposition: inline
In-Reply-To: <6a43380c-b873-3f8e-5d5b-4a066ee57ac2@oracle.com>
User-Agent: Mutt/1.5.17 (2007-11-01)


--WYTEVAkct0FjGQmd
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

On Mon, Mar 14, 2022 at 07:07:44PM -0400, Boris Ostrovsky wrote:
>> +	swiotlb_init_remap(true, x86_swiotlb_flags, xen_swiotlb_fixup);
>
>
> I think we need to have SWIOTLB_ANY set in x86_swiotlb_flags here.

Yes.

> Notice that we don't do remap() after final update to nslabs. We should.

Indeed.  I've pushed the fixed patches to the git tree and attached
the patches 12, 13 and 14 in case that is easier:

--WYTEVAkct0FjGQmd
Content-Type: text/x-patch; charset=us-ascii
Content-Disposition: attachment; filename="0012-swiotlb-provide-swiotlb_init-variants-that-remap-the.patch"

>From 6d72b98620281984ae778659cedeb369e82af8d8 Mon Sep 17 00:00:00 2001
From: Christoph Hellwig <hch@lst.de>
Date: Mon, 14 Mar 2022 08:02:57 +0100
Subject: swiotlb: provide swiotlb_init variants that remap the buffer

To shared more code between swiotlb and xen-swiotlb, offer a
swiotlb_init_remap interface and add a remap callback to
swiotlb_init_late that will allow Xen to remap the buffer the
buffer without duplicating much of the logic.

Signed-off-by: Christoph Hellwig <hch@lst.de>
---
 arch/x86/pci/sta2x11-fixup.c |  2 +-
 include/linux/swiotlb.h      |  5 ++++-
 kernel/dma/swiotlb.c         | 36 +++++++++++++++++++++++++++++++++---
 3 files changed, 38 insertions(+), 5 deletions(-)

diff --git a/arch/x86/pci/sta2x11-fixup.c b/arch/x86/pci/sta2x11-fixup.c
index c7e6faf59a861..7368afc039987 100644
--- a/arch/x86/pci/sta2x11-fixup.c
+++ b/arch/x86/pci/sta2x11-fixup.c
@@ -57,7 +57,7 @@ static void sta2x11_new_instance(struct pci_dev *pdev)
 		int size = STA2X11_SWIOTLB_SIZE;
 		/* First instance: register your own swiotlb area */
 		dev_info(&pdev->dev, "Using SWIOTLB (size %i)\n", size);
-		if (swiotlb_init_late(size, GFP_DMA))
+		if (swiotlb_init_late(size, GFP_DMA, NULL))
 			dev_emerg(&pdev->dev, "init swiotlb failed\n");
 	}
 	list_add(&instance->list, &sta2x11_instance_list);
diff --git a/include/linux/swiotlb.h b/include/linux/swiotlb.h
index ee655f2e4d28b..7b50c82f84ce9 100644
--- a/include/linux/swiotlb.h
+++ b/include/linux/swiotlb.h
@@ -36,8 +36,11 @@ struct scatterlist;
 
 int swiotlb_init_with_tbl(char *tlb, unsigned long nslabs, unsigned int flags);
 unsigned long swiotlb_size_or_default(void);
+void __init swiotlb_init_remap(bool addressing_limit, unsigned int flags,
+	int (*remap)(void *tlb, unsigned long nslabs));
+int swiotlb_init_late(size_t size, gfp_t gfp_mask,
+	int (*remap)(void *tlb, unsigned long nslabs));
 extern int swiotlb_late_init_with_tbl(char *tlb, unsigned long nslabs);
-int swiotlb_init_late(size_t size, gfp_t gfp_mask);
 extern void __init swiotlb_update_mem_attributes(void);
 
 phys_addr_t swiotlb_tbl_map_single(struct device *hwdev, phys_addr_t phys,
diff --git a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c
index 79641c446d284..c37fd3d1c97f7 100644
--- a/kernel/dma/swiotlb.c
+++ b/kernel/dma/swiotlb.c
@@ -256,9 +256,11 @@ int __init swiotlb_init_with_tbl(char *tlb, unsigned long nslabs,
  * Statically reserve bounce buffer space and initialize bounce buffer data
  * structures for the software IO TLB used to implement the DMA API.
  */
-void __init swiotlb_init(bool addressing_limit, unsigned int flags)
+void __init swiotlb_init_remap(bool addressing_limit, unsigned int flags,
+		int (*remap)(void *tlb, unsigned long nslabs))
 {
-	size_t bytes = PAGE_ALIGN(default_nslabs << IO_TLB_SHIFT);
+	unsigned long nslabs = default_nslabs;
+	size_t bytes;
 	void *tlb;
 
 	if (!addressing_limit && !swiotlb_force_bounce)
@@ -271,12 +273,23 @@ void __init swiotlb_init(bool addressing_limit, unsigned int flags)
 	 * allow to pick a location everywhere for hypervisors with guest
 	 * memory encryption.
 	 */
+retry:
+	bytes = PAGE_ALIGN(default_nslabs << IO_TLB_SHIFT);
 	if (flags & SWIOTLB_ANY)
 		tlb = memblock_alloc(bytes, PAGE_SIZE);
 	else
 		tlb = memblock_alloc_low(bytes, PAGE_SIZE);
 	if (!tlb)
 		goto fail;
+	if (remap && remap(tlb, nslabs) < 0) {
+		memblock_free(tlb, PAGE_ALIGN(bytes));
+
+		if (nslabs <= IO_TLB_MIN_SLABS)
+			panic("%s: Failed to remap %zu bytes\n",
+			      __func__, bytes);
+		nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
+		goto retry;
+	}
 	if (swiotlb_init_with_tbl(tlb, default_nslabs, flags))
 		goto fail_free_mem;
 	return;
@@ -287,12 +300,18 @@ void __init swiotlb_init(bool addressing_limit, unsigned int flags)
 	pr_warn("Cannot allocate buffer");
 }
 
+void __init swiotlb_init(bool addressing_limit, unsigned int flags)
+{
+	return swiotlb_init_remap(addressing_limit, flags, NULL);
+}
+
 /*
  * Systems with larger DMA zones (those that don't support ISA) can
  * initialize the swiotlb later using the slab allocator if needed.
  * This should be just like above, but with some error catching.
  */
-int swiotlb_init_late(size_t size, gfp_t gfp_mask)
+int swiotlb_init_late(size_t size, gfp_t gfp_mask,
+		int (*remap)(void *tlb, unsigned long nslabs))
 {
 	unsigned long nslabs = ALIGN(size >> IO_TLB_SHIFT, IO_TLB_SEGSIZE);
 	unsigned long bytes;
@@ -303,6 +322,7 @@ int swiotlb_init_late(size_t size, gfp_t gfp_mask)
 	if (swiotlb_force_disable)
 		return 0;
 
+retry:
 	order = get_order(nslabs << IO_TLB_SHIFT);
 	nslabs = SLABS_PER_PAGE << order;
 	bytes = nslabs << IO_TLB_SHIFT;
@@ -323,6 +343,16 @@ int swiotlb_init_late(size_t size, gfp_t gfp_mask)
 			(PAGE_SIZE << order) >> 20);
 		nslabs = SLABS_PER_PAGE << order;
 	}
+	if (remap)
+		rc = remap(vstart, nslabs);
+	if (rc) {
+		free_pages((unsigned long)vstart, order);
+ 
+		if (IO_TLB_MIN_SLABS <= 1024)
+			return rc;
+		nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
+		goto retry;
+	}
 	rc = swiotlb_late_init_with_tbl(vstart, nslabs);
 	if (rc)
 		free_pages((unsigned long)vstart, order);
-- 
2.30.2


--WYTEVAkct0FjGQmd
Content-Type: text/x-patch; charset=us-ascii
Content-Disposition: attachment; filename="0013-swiotlb-merge-swiotlb-xen-initialization-into-swiotl.patch"

>From abfe30ed0a7cd3ca97824d9062a655215ddee7f2 Mon Sep 17 00:00:00 2001
From: Christoph Hellwig <hch@lst.de>
Date: Mon, 14 Mar 2022 07:58:45 +0100
Subject: swiotlb: merge swiotlb-xen initialization into swiotlb

Reuse the generic swiotlb initialization for xen-swiotlb.  For ARM/ARM64
this works trivially, while for x86 xen_swiotlb_fixup needs to be passed
as the remap argument to swiotlb_init_remap/swiotlb_init_late.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Reviewed-by: Stefano Stabellini <sstabellini@kernel.org>
---
 arch/arm/xen/mm.c               |  21 +++---
 arch/x86/include/asm/xen/page.h |   5 --
 arch/x86/kernel/pci-dma.c       |  20 ++---
 drivers/xen/swiotlb-xen.c       | 128 +-------------------------------
 include/xen/arm/page.h          |   1 -
 include/xen/swiotlb-xen.h       |   8 +-
 6 files changed, 28 insertions(+), 155 deletions(-)

diff --git a/arch/arm/xen/mm.c b/arch/arm/xen/mm.c
index 28c2070602535..ff05a7899cb86 100644
--- a/arch/arm/xen/mm.c
+++ b/arch/arm/xen/mm.c
@@ -23,22 +23,20 @@
 #include <asm/xen/hypercall.h>
 #include <asm/xen/interface.h>
 
-unsigned long xen_get_swiotlb_free_pages(unsigned int order)
+static gfp_t xen_swiotlb_gfp(void)
 {
 	phys_addr_t base;
-	gfp_t flags = __GFP_NOWARN|__GFP_KSWAPD_RECLAIM;
 	u64 i;
 
 	for_each_mem_range(i, &base, NULL) {
 		if (base < (phys_addr_t)0xffffffff) {
 			if (IS_ENABLED(CONFIG_ZONE_DMA32))
-				flags |= __GFP_DMA32;
-			else
-				flags |= __GFP_DMA;
-			break;
+				return __GFP_DMA32;
+			return __GFP_DMA;
 		}
 	}
-	return __get_free_pages(flags, order);
+
+	return GFP_KERNEL;
 }
 
 static bool hypercall_cflush = false;
@@ -140,10 +138,13 @@ static int __init xen_mm_init(void)
 	if (!xen_swiotlb_detect())
 		return 0;
 
-	rc = xen_swiotlb_init();
 	/* we can work with the default swiotlb */
-	if (rc < 0 && rc != -EEXIST)
-		return rc;
+	if (!io_tlb_default_mem.nslabs) {
+		rc = swiotlb_init_late(swiotlb_size_or_default(),
+				       xen_swiotlb_gfp(), NULL);
+		if (rc < 0)
+			return rc;
+	}
 
 	cflush.op = 0;
 	cflush.a.dev_bus_addr = 0;
diff --git a/arch/x86/include/asm/xen/page.h b/arch/x86/include/asm/xen/page.h
index e989bc2269f54..1fc67df500145 100644
--- a/arch/x86/include/asm/xen/page.h
+++ b/arch/x86/include/asm/xen/page.h
@@ -357,9 +357,4 @@ static inline bool xen_arch_need_swiotlb(struct device *dev,
 	return false;
 }
 
-static inline unsigned long xen_get_swiotlb_free_pages(unsigned int order)
-{
-	return __get_free_pages(__GFP_NOWARN, order);
-}
-
 #endif /* _ASM_X86_XEN_PAGE_H */
diff --git a/arch/x86/kernel/pci-dma.c b/arch/x86/kernel/pci-dma.c
index a705a199bf8a3..30bbe4abb5d61 100644
--- a/arch/x86/kernel/pci-dma.c
+++ b/arch/x86/kernel/pci-dma.c
@@ -72,15 +72,13 @@ static inline void __init pci_swiotlb_detect(void)
 #endif /* CONFIG_SWIOTLB */
 
 #ifdef CONFIG_SWIOTLB_XEN
-static bool xen_swiotlb;
-
 static void __init pci_xen_swiotlb_init(void)
 {
 	if (!xen_initial_domain() && !x86_swiotlb_enable)
 		return;
 	x86_swiotlb_enable = true;
-	xen_swiotlb = true;
-	xen_swiotlb_init_early();
+	x86_swiotlb_flags |= SWIOTLB_ANY;
+	swiotlb_init_remap(true, x86_swiotlb_flags, xen_swiotlb_fixup);
 	dma_ops = &xen_swiotlb_dma_ops;
 	if (IS_ENABLED(CONFIG_PCI))
 		pci_request_acs();
@@ -88,14 +86,16 @@ static void __init pci_xen_swiotlb_init(void)
 
 int pci_xen_swiotlb_init_late(void)
 {
-	int rc;
-
-	if (xen_swiotlb)
+	if (dma_ops == &xen_swiotlb_dma_ops)
 		return 0;
 
-	rc = xen_swiotlb_init();
-	if (rc)
-		return rc;
+	/* we can work with the default swiotlb */
+	if (!io_tlb_default_mem.nslabs) {
+		int rc = swiotlb_init_late(swiotlb_size_or_default(),
+					   GFP_KERNEL, xen_swiotlb_fixup);
+		if (rc < 0)
+			return rc;
+	}
 
 	/* XXX: this switches the dma ops under live devices! */
 	dma_ops = &xen_swiotlb_dma_ops;
diff --git a/drivers/xen/swiotlb-xen.c b/drivers/xen/swiotlb-xen.c
index c2da3eb4826e8..df8085b50df10 100644
--- a/drivers/xen/swiotlb-xen.c
+++ b/drivers/xen/swiotlb-xen.c
@@ -104,7 +104,7 @@ static int is_xen_swiotlb_buffer(struct device *dev, dma_addr_t dma_addr)
 	return 0;
 }
 
-static int xen_swiotlb_fixup(void *buf, unsigned long nslabs)
+int xen_swiotlb_fixup(void *buf, unsigned long nslabs)
 {
 	int rc;
 	unsigned int order = get_order(IO_TLB_SEGSIZE << IO_TLB_SHIFT);
@@ -130,132 +130,6 @@ static int xen_swiotlb_fixup(void *buf, unsigned long nslabs)
 	return 0;
 }
 
-enum xen_swiotlb_err {
-	XEN_SWIOTLB_UNKNOWN = 0,
-	XEN_SWIOTLB_ENOMEM,
-	XEN_SWIOTLB_EFIXUP
-};
-
-static const char *xen_swiotlb_error(enum xen_swiotlb_err err)
-{
-	switch (err) {
-	case XEN_SWIOTLB_ENOMEM:
-		return "Cannot allocate Xen-SWIOTLB buffer\n";
-	case XEN_SWIOTLB_EFIXUP:
-		return "Failed to get contiguous memory for DMA from Xen!\n"\
-		    "You either: don't have the permissions, do not have"\
-		    " enough free memory under 4GB, or the hypervisor memory"\
-		    " is too fragmented!";
-	default:
-		break;
-	}
-	return "";
-}
-
-int xen_swiotlb_init(void)
-{
-	enum xen_swiotlb_err m_ret = XEN_SWIOTLB_UNKNOWN;
-	unsigned long bytes = swiotlb_size_or_default();
-	unsigned long nslabs = bytes >> IO_TLB_SHIFT;
-	unsigned int order, repeat = 3;
-	int rc = -ENOMEM;
-	char *start;
-
-	if (io_tlb_default_mem.nslabs) {
-		pr_warn("swiotlb buffer already initialized\n");
-		return -EEXIST;
-	}
-
-retry:
-	m_ret = XEN_SWIOTLB_ENOMEM;
-	order = get_order(bytes);
-
-	/*
-	 * Get IO TLB memory from any location.
-	 */
-#define SLABS_PER_PAGE (1 << (PAGE_SHIFT - IO_TLB_SHIFT))
-#define IO_TLB_MIN_SLABS ((1<<20) >> IO_TLB_SHIFT)
-	while ((SLABS_PER_PAGE << order) > IO_TLB_MIN_SLABS) {
-		start = (void *)xen_get_swiotlb_free_pages(order);
-		if (start)
-			break;
-		order--;
-	}
-	if (!start)
-		goto exit;
-	if (order != get_order(bytes)) {
-		pr_warn("Warning: only able to allocate %ld MB for software IO TLB\n",
-			(PAGE_SIZE << order) >> 20);
-		nslabs = SLABS_PER_PAGE << order;
-		bytes = nslabs << IO_TLB_SHIFT;
-	}
-
-	/*
-	 * And replace that memory with pages under 4GB.
-	 */
-	rc = xen_swiotlb_fixup(start, nslabs);
-	if (rc) {
-		free_pages((unsigned long)start, order);
-		m_ret = XEN_SWIOTLB_EFIXUP;
-		goto error;
-	}
-	rc = swiotlb_late_init_with_tbl(start, nslabs);
-	if (rc)
-		return rc;
-	return 0;
-error:
-	if (nslabs > 1024 && repeat--) {
-		/* Min is 2MB */
-		nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
-		bytes = nslabs << IO_TLB_SHIFT;
-		pr_info("Lowering to %luMB\n", bytes >> 20);
-		goto retry;
-	}
-exit:
-	pr_err("%s (rc:%d)\n", xen_swiotlb_error(m_ret), rc);
-	return rc;
-}
-
-#ifdef CONFIG_X86
-void __init xen_swiotlb_init_early(void)
-{
-	unsigned long bytes = swiotlb_size_or_default();
-	unsigned long nslabs = bytes >> IO_TLB_SHIFT;
-	unsigned int repeat = 3;
-	char *start;
-	int rc;
-
-retry:
-	/*
-	 * Get IO TLB memory from any location.
-	 */
-	start = memblock_alloc(PAGE_ALIGN(bytes),
-			       IO_TLB_SEGSIZE << IO_TLB_SHIFT);
-	if (!start)
-		panic("%s: Failed to allocate %lu bytes\n",
-		      __func__, PAGE_ALIGN(bytes));
-
-	/*
-	 * And replace that memory with pages under 4GB.
-	 */
-	rc = xen_swiotlb_fixup(start, nslabs);
-	if (rc) {
-		memblock_free(start, PAGE_ALIGN(bytes));
-		if (nslabs > 1024 && repeat--) {
-			/* Min is 2MB */
-			nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
-			bytes = nslabs << IO_TLB_SHIFT;
-			pr_info("Lowering to %luMB\n", bytes >> 20);
-			goto retry;
-		}
-		panic("%s (rc:%d)", xen_swiotlb_error(XEN_SWIOTLB_EFIXUP), rc);
-	}
-
-	if (swiotlb_init_with_tbl(start, nslabs, SWIOTLB_VERBOSE))
-		panic("Cannot allocate SWIOTLB buffer");
-}
-#endif /* CONFIG_X86 */
-
 static void *
 xen_swiotlb_alloc_coherent(struct device *hwdev, size_t size,
 			   dma_addr_t *dma_handle, gfp_t flags,
diff --git a/include/xen/arm/page.h b/include/xen/arm/page.h
index ac1b654705631..7e199c6656b90 100644
--- a/include/xen/arm/page.h
+++ b/include/xen/arm/page.h
@@ -115,6 +115,5 @@ static inline bool set_phys_to_machine(unsigned long pfn, unsigned long mfn)
 bool xen_arch_need_swiotlb(struct device *dev,
 			   phys_addr_t phys,
 			   dma_addr_t dev_addr);
-unsigned long xen_get_swiotlb_free_pages(unsigned int order);
 
 #endif /* _ASM_ARM_XEN_PAGE_H */
diff --git a/include/xen/swiotlb-xen.h b/include/xen/swiotlb-xen.h
index b3e647f86e3e2..590ceb923f0c8 100644
--- a/include/xen/swiotlb-xen.h
+++ b/include/xen/swiotlb-xen.h
@@ -10,8 +10,12 @@ void xen_dma_sync_for_cpu(struct device *dev, dma_addr_t handle,
 void xen_dma_sync_for_device(struct device *dev, dma_addr_t handle,
 			     size_t size, enum dma_data_direction dir);
 
-int xen_swiotlb_init(void);
-void __init xen_swiotlb_init_early(void);
+#ifdef CONFIG_SWIOTLB_XEN
+int xen_swiotlb_fixup(void *buf, unsigned long nslabs);
+#else
+#define xen_swiotlb_fixup NULL
+#endif
+
 extern const struct dma_map_ops xen_swiotlb_dma_ops;
 
 #endif /* __LINUX_SWIOTLB_XEN_H */
-- 
2.30.2


--WYTEVAkct0FjGQmd
Content-Type: text/x-patch; charset=us-ascii
Content-Disposition: attachment; filename="0014-swiotlb-remove-swiotlb_init_with_tbl-and-swiotlb_ini.patch"

>From 2e7a39f16760d3c0076691a3358d3c7499805687 Mon Sep 17 00:00:00 2001
From: Christoph Hellwig <hch@lst.de>
Date: Tue, 15 Mar 2022 07:41:04 +0100
Subject: swiotlb: remove swiotlb_init_with_tbl and swiotlb_init_late_with_tbl

No users left.

Signed-off-by: Christoph Hellwig <hch@lst.de>
---
 include/linux/swiotlb.h |  2 --
 kernel/dma/swiotlb.c    | 77 +++++++++++------------------------------
 2 files changed, 20 insertions(+), 59 deletions(-)

diff --git a/include/linux/swiotlb.h b/include/linux/swiotlb.h
index 7b50c82f84ce9..7ed35dd3de6e7 100644
--- a/include/linux/swiotlb.h
+++ b/include/linux/swiotlb.h
@@ -34,13 +34,11 @@ struct scatterlist;
 /* default to 64MB */
 #define IO_TLB_DEFAULT_SIZE (64UL<<20)
 
-int swiotlb_init_with_tbl(char *tlb, unsigned long nslabs, unsigned int flags);
 unsigned long swiotlb_size_or_default(void);
 void __init swiotlb_init_remap(bool addressing_limit, unsigned int flags,
 	int (*remap)(void *tlb, unsigned long nslabs));
 int swiotlb_init_late(size_t size, gfp_t gfp_mask,
 	int (*remap)(void *tlb, unsigned long nslabs));
-extern int swiotlb_late_init_with_tbl(char *tlb, unsigned long nslabs);
 extern void __init swiotlb_update_mem_attributes(void);
 
 phys_addr_t swiotlb_tbl_map_single(struct device *hwdev, phys_addr_t phys,
diff --git a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c
index c37fd3d1c97f7..cb930d064e813 100644
--- a/kernel/dma/swiotlb.c
+++ b/kernel/dma/swiotlb.c
@@ -225,33 +225,6 @@ static void swiotlb_init_io_tlb_mem(struct io_tlb_mem *mem, phys_addr_t start,
 	return;
 }
 
-int __init swiotlb_init_with_tbl(char *tlb, unsigned long nslabs,
-		unsigned int flags)
-{
-	struct io_tlb_mem *mem = &io_tlb_default_mem;
-	size_t alloc_size;
-
-	if (swiotlb_force_disable)
-		return 0;
-
-	/* protect against double initialization */
-	if (WARN_ON_ONCE(mem->nslabs))
-		return -ENOMEM;
-
-	alloc_size = PAGE_ALIGN(array_size(sizeof(*mem->slots), nslabs));
-	mem->slots = memblock_alloc(alloc_size, PAGE_SIZE);
-	if (!mem->slots)
-		panic("%s: Failed to allocate %zu bytes align=0x%lx\n",
-		      __func__, alloc_size, PAGE_SIZE);
-
-	swiotlb_init_io_tlb_mem(mem, __pa(tlb), nslabs, false);
-	mem->force_bounce = flags & SWIOTLB_FORCE;
-
-	if (flags & SWIOTLB_VERBOSE)
-		swiotlb_print_info();
-	return 0;
-}
-
 /*
  * Statically reserve bounce buffer space and initialize bounce buffer data
  * structures for the software IO TLB used to implement the DMA API.
@@ -259,7 +232,9 @@ int __init swiotlb_init_with_tbl(char *tlb, unsigned long nslabs,
 void __init swiotlb_init_remap(bool addressing_limit, unsigned int flags,
 		int (*remap)(void *tlb, unsigned long nslabs))
 {
+	struct io_tlb_mem *mem = &io_tlb_default_mem;
 	unsigned long nslabs = default_nslabs;
+	size_t alloc_size = PAGE_ALIGN(array_size(sizeof(*mem->slots), nslabs));
 	size_t bytes;
 	void *tlb;
 
@@ -280,7 +255,8 @@ void __init swiotlb_init_remap(bool addressing_limit, unsigned int flags,
 	else
 		tlb = memblock_alloc_low(bytes, PAGE_SIZE);
 	if (!tlb)
-		goto fail;
+		panic("%s: failed to allocate tlb structure\n", __func__);
+
 	if (remap && remap(tlb, nslabs) < 0) {
 		memblock_free(tlb, PAGE_ALIGN(bytes));
 
@@ -290,14 +266,17 @@ void __init swiotlb_init_remap(bool addressing_limit, unsigned int flags,
 		nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
 		goto retry;
 	}
-	if (swiotlb_init_with_tbl(tlb, default_nslabs, flags))
-		goto fail_free_mem;
-	return;
 
-fail_free_mem:
-	memblock_free(tlb, bytes);
-fail:
-	pr_warn("Cannot allocate buffer");
+	mem->slots = memblock_alloc(alloc_size, PAGE_SIZE);
+	if (!mem->slots)
+		panic("%s: Failed to allocate %zu bytes align=0x%lx\n",
+		      __func__, alloc_size, PAGE_SIZE);
+
+	swiotlb_init_io_tlb_mem(mem, __pa(tlb), default_nslabs, false);
+	mem->force_bounce = flags & SWIOTLB_FORCE;
+
+	if (flags & SWIOTLB_VERBOSE)
+		swiotlb_print_info();
 }
 
 void __init swiotlb_init(bool addressing_limit, unsigned int flags)
@@ -313,6 +292,7 @@ void __init swiotlb_init(bool addressing_limit, unsigned int flags)
 int swiotlb_init_late(size_t size, gfp_t gfp_mask,
 		int (*remap)(void *tlb, unsigned long nslabs))
 {
+	struct io_tlb_mem *mem = &io_tlb_default_mem;
 	unsigned long nslabs = ALIGN(size >> IO_TLB_SHIFT, IO_TLB_SEGSIZE);
 	unsigned long bytes;
 	unsigned char *vstart = NULL;
@@ -353,33 +333,16 @@ int swiotlb_init_late(size_t size, gfp_t gfp_mask,
 		nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));
 		goto retry;
 	}
-	rc = swiotlb_late_init_with_tbl(vstart, nslabs);
-	if (rc)
-		free_pages((unsigned long)vstart, order);
-
-	return rc;
-}
-
-int
-swiotlb_late_init_with_tbl(char *tlb, unsigned long nslabs)
-{
-	struct io_tlb_mem *mem = &io_tlb_default_mem;
-	unsigned long bytes = nslabs << IO_TLB_SHIFT;
-
-	if (swiotlb_force_disable)
-		return 0;
-
-	/* protect against double initialization */
-	if (WARN_ON_ONCE(mem->nslabs))
-		return -ENOMEM;
 
 	mem->slots = (void *)__get_free_pages(GFP_KERNEL | __GFP_ZERO,
 		get_order(array_size(sizeof(*mem->slots), nslabs)));
-	if (!mem->slots)
+	if (!mem->slots) {
+		free_pages((unsigned long)vstart, order);
 		return -ENOMEM;
+	}
 
-	set_memory_decrypted((unsigned long)tlb, bytes >> PAGE_SHIFT);
-	swiotlb_init_io_tlb_mem(mem, virt_to_phys(tlb), nslabs, true);
+	set_memory_decrypted((unsigned long)vstart, bytes >> PAGE_SHIFT);
+	swiotlb_init_io_tlb_mem(mem, virt_to_phys(vstart), nslabs, true);
 
 	swiotlb_print_info();
 	return 0;
-- 
2.30.2


--WYTEVAkct0FjGQmd--


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 07:23:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 07:23:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290649.493000 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU1Vz-0003gy-9g; Tue, 15 Mar 2022 07:22:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290649.493000; Tue, 15 Mar 2022 07:22:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU1Vz-0003gr-6C; Tue, 15 Mar 2022 07:22:43 +0000
Received: by outflank-mailman (input) for mailman id 290649;
 Tue, 15 Mar 2022 07:22:42 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=GQWC=T2=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nU1Vy-0003gl-3E
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 07:22:42 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id b247e001-a430-11ec-853b-5f4723681683;
 Tue, 15 Mar 2022 08:22:40 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2111.outbound.protection.outlook.com [104.47.18.111]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-40-WvRVBxHnPDCbGRm7L1fmiQ-1; Tue, 15 Mar 2022 08:22:38 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by DB3PR0402MB3913.eurprd04.prod.outlook.com (2603:10a6:8:3::15) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.28; Tue, 15 Mar
 2022 07:22:36 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.028; Tue, 15 Mar 2022
 07:22:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b247e001-a430-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647328959;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=u72Vg7qMfFNjQ1OsUo4s7WCJxv1LyPu6VoVAmgl3OJE=;
	b=hC9khRMpVQZAYb4p1atsvtXaA7jmF3XM/FadGk3WDby+j5xcpwT65OmLPpacYAmJJ4TKxv
	8xuoUN2uhpRUMWjDEWZ+my99AVFOND8OAJmBV7antqb2UgdSIhoClr2HkIbClmtgH5qK5T
	0+kTW2fv8L+BCDUH8ZrJVtmdbfUFzJ4=
X-MC-Unique: WvRVBxHnPDCbGRm7L1fmiQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Wpk4/mrzFmmNh75h9GqlQqqiDiMv9YuZzpyAoV2wDw1UH31bxTl/Etp2myE8UFg/FttW2qEqfUvd3eVLXUdeQtxAOW1azF3I2izffcXZaS8dS/X4UGvUutzjxWuUB4+XAY2s/AKSUxlJt+yv+e1iB+8kXPyh4HDTaJAyEPbpsKY0uWXD+uiUaWxGggPgFBpM1WZQHhOMcmgJqvLlUa6cM6Emv1FA3RrIeFq15M0vBVUnli2lWkxJnrRUgl1RoBaRo5uqusMwK1aHvAex+5AnVywg13CSwLxWudhrx6dktHrWsFR6JmtlhhuE9Lbu/9/s/aU0dZOtKXrdh2Sj9IKtCg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=u72Vg7qMfFNjQ1OsUo4s7WCJxv1LyPu6VoVAmgl3OJE=;
 b=dtxYMEfFvQDg+Nhffzvg7P7IG/kRFD5qNWR7yy7wkNQgpJN8jOf9YeAQA8lhyUi2USh1h22gF7anoBEX1sm0AyMG2c1vz1uoVGDpQXVJsbXvbhc8FGaCFtBOylAgHEmxJj8amIUMkiVAQMYPIzszEEn35fsS8okVAfv40smNepH107N1SiNfnU+wGzOP2zfVnEl13u/P7guw5u1s52yu91HLftPdgw0u4O80eimmHvyCFRPxpjb/vLNOEAoo7HNC3D32kMADZjX+OBeFlGDF2C7lREr0+Vpp/larqpMKIbn8S0FrlKeW1AlY6NvnqfDL3hIuvMd4crBlLyNmbPkuCA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <12d7cad7-f4fb-f28b-8839-33d8b3532959@suse.com>
Date: Tue, 15 Mar 2022 08:22:34 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [XEN v10 2/4] xen/arm64: io: Support instructions (for which ISS
 is not valid) on emulated MMIO region using MMIO/ioreq handler
Content-Language: en-US
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
Cc: sstabellini@kernel.org, stefanos@xilinx.com, julien@xen.org,
 Volodymyr_Babchuk@epam.com, bertrand.marquis@arm.com,
 andrew.cooper3@citrix.com, george.dunlap@citrix.com, wl@xen.org,
 paul@xen.org, roger.pau@citrix.com, Ayan Kumar Halder <ayankuma@xilinx.com>,
 xen-devel@lists.xenproject.org
References: <20220310174501.62040-1-ayankuma@xilinx.com>
 <20220310174501.62040-3-ayankuma@xilinx.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220310174501.62040-3-ayankuma@xilinx.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6PR05CA0001.eurprd05.prod.outlook.com
 (2603:10a6:20b:2e::14) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f6be6782-eae8-4284-1686-08da0654948d
X-MS-TrafficTypeDiagnostic: DB3PR0402MB3913:EE_
X-Microsoft-Antispam-PRVS:
	<DB3PR0402MB39137DF9159648B8D54BE846B3109@DB3PR0402MB3913.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6506007)(83380400001)(316002)(53546011)(36756003)(8936002)(2906002)(86362001)(26005)(6916009)(186003)(6486002)(508600001)(8676002)(6512007)(2616005)(31686004)(66556008)(4326008)(66946007)(66476007)(38100700002)(31696002)(5660300002)(7416002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?eXBnRGZUODlweTZrVHpTeXIvbWpKeUZpMCtEVm1yc0czVnNUWFNSMGYrZ2JD?=
 =?utf-8?B?NUNLR2RiRzBVdTRBUmNXTmlNNzNTOGxWSllQelZSVDUrTVhVNnE4S1VQV2ZZ?=
 =?utf-8?B?c1VwVkhFQlBleE1wcXViSCtWMGVEMGpYanMxdXRxMVg2ZHFUbjlHRnQyY0xO?=
 =?utf-8?B?OWdBdUo1bWRKUVlkVTJFNXRyQXhyZ2g3emtkTVZtb1JaVWptT2dBdm1JbFhk?=
 =?utf-8?B?cE9FMHptUFErK3dpcVhwZ0gwdXJvVngwMml4cElDRjRnQ2dVb3JNOHlNRXFN?=
 =?utf-8?B?YVdSMlE5eDVXZE9UK1lHYVN6ZmxOMCtOczdycElNVWhOai9ZYWh3dmJYWEVv?=
 =?utf-8?B?Vk9jSEc1NFBDZ2p1c1hsWkpoZVEwbFV1WGVHdDZDZHgyT1dGQnUzZ2JpdkFs?=
 =?utf-8?B?aTNMelhRR3luSFA2VFJlcEt0WEdIREdCZFZKTDB2Nkd2ei9qNVBvQ2ZINThC?=
 =?utf-8?B?bTZlWjFFTWhHd1k0R2k1NCthVEliOTdrVTVMWXFjbVJ2UG8yMUlUSWl6QmlH?=
 =?utf-8?B?SUlMdTZpUzVEVktEOG5HZ2JpY0M1TDlma2RaeXFHYWZSR1JVWERjSEI5ZDA5?=
 =?utf-8?B?WWRCQjhuZ2d4RmF1b2cwRXoyTUpXViswM1JGRkhlN0xLb3R4RmgvZkNXanpq?=
 =?utf-8?B?TzF2U1JxVG9FOS90bDNwMWFGRzl3Slh0Yk5YSGFVN0s0VVNhY1dTc1ZCcjVX?=
 =?utf-8?B?VXpVL0FvTGtxbjhFT1NFZW9WbDJTZC92VHpYK1RyMmJxMStrS0pXVHZKMmg3?=
 =?utf-8?B?VDFUcEhpa1A2dURoWEJDT3NlcTZyM0ZnZTlVWitOS05pc0R6Q0ZFNlhNMjhM?=
 =?utf-8?B?eEltQzZ5NDB1b0Z1aDJrWk1NY2FnczcrZ3grYmNhaGhEOUFoNmc2L1VEYVBK?=
 =?utf-8?B?eWM4SlpBNGdLTE5pRW11UnpiMWdEaVJyL3FjTmI5VGJJSWM2NldESVJtZzdn?=
 =?utf-8?B?NVhJUXJjZk9NeXo1aDFFcjN5L0FScW1yY0htNnBYbkdORHlGUzNyaVZNd1ZR?=
 =?utf-8?B?dWo5VEpwODNnUmNmb2Z0MldIenE0eG54MDNkNnhIdFVSbHB4T20rRFVyRldE?=
 =?utf-8?B?UWw2Vmo2N2gxSFJnY2x6NmVmWG9hK2JKcWdabXo3YkRqelAxTzlqVCtwNlRT?=
 =?utf-8?B?SzZPRWF1UjZKMk01eTE0SHNHQTBsMngybVRYUHFnbFl1VWFiMHMvMWY0d3BO?=
 =?utf-8?B?dGdYNW9Kd25DRUtBMDZUejJrOHljUXhMaldyT1V4aGl3Rkg2VG1iQ0IxTS9a?=
 =?utf-8?B?K3NWVTdNajBuU2kzQzVnZHZWT3dsam10eTBwcERDV3Z3WExWcWF6bGFES3Bi?=
 =?utf-8?B?TGY0MkFlOFZLRU1TVGRSTW90LzFUZGkxZDhmZEVEZE9BZkFWQkJRU1B2cEZ5?=
 =?utf-8?B?NDZTa2FIaU5VWk5vbjIyclkwK0dHWHlLelRCai80dzk4RGNBRjZWN0xtOXZW?=
 =?utf-8?B?bDVnVnV2aWNGM0ZCblJBbmk4TE9YNXJDYXdTY0NDb0Nwa3RCNzdjMU5md3BM?=
 =?utf-8?B?eU8vUy85Z0FFZEhzMEJJYWdGeHFLTVRxY0plVDhZOFAvM3V6TnQyNStlaEZ2?=
 =?utf-8?B?TFpkNDIvSVlzb3J5TjRxQUlXTUVLQzdUOWw4c2Fua1N1WXB2NE81bGlVQTk5?=
 =?utf-8?B?VXFTYVNBUVNxQ3AyR3I3N2trMDdTSGNodEd6K0s1NXVKWmNJQjMrYzRMYlpW?=
 =?utf-8?B?RWxrbjJkMHFpb28zdm1WWGNjRFNpaXFBWENUMkVuR0Nzd2pmNlB5a0Iyb3JP?=
 =?utf-8?B?ZUZBTllwRWNPaDV4TlpLbVlXZ2I2UFh3cXZON0JXZTI3SnBkMHBFa1JXdk8r?=
 =?utf-8?B?RVByalpUTHdVaUFQWE9kMjZTV0I2bHBLdDg0ZXJDaTJvT0lQcGZHK095R2RI?=
 =?utf-8?B?bU1hc2xyS2RvN1A5RzZqaml1b3RON2NKTmRueHljMXV6bEhQNVFzMUxWRk1w?=
 =?utf-8?Q?vDuv8BACEfqarZfeL0r0FoYe50Wf9+K6?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f6be6782-eae8-4284-1686-08da0654948d
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Mar 2022 07:22:36.7358
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 68O5CAoRIZEOKqQt+goPYNujgSjeo1q+C32oZj6hrS587wRYv4OolDM6pLdbxjRI8nqmdCiUOGxvKQ2EZgPcww==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB3PR0402MB3913

On 10.03.2022 18:44, Ayan Kumar Halder wrote:
> When an instruction is trapped in Xen due to translation fault, Xen
> checks if the ISS is invalid (for data abort) or it is an instruction
> abort. If so, Xen tries to resolve the translation fault using p2m page
> tables. In case of data abort, Xen will try to map the mmio region to
> the guest (ie tries to emulate the mmio region).
> 
> If the ISS is not valid and it is a data abort, then Xen tries to
> decode the instruction. In case of ioreq, Xen  saves the decoding state,
> rn and imm9 to vcpu_io. Whenever the vcpu handles the ioreq successfully,
> it will read the decoding state to determine if the instruction decoded
> was a ldr/str post indexing (ie INSTR_LDR_STR_POSTINDEXING). If so, it
> uses these details to post increment rn.
> 
> In case of mmio handler, if the mmio operation was successful, then Xen
> retrives the decoding state, rn and imm9. For state ==
> INSTR_LDR_STR_POSTINDEXING, Xen will update rn.
> 
> If there is an error encountered while decoding/executing the instruction,
> Xen will forward the abort to the guest.
> 
> Also, the logic to infer the type of instruction has been moved from
> try_handle_mmio() to try_decode_instruction() which is called before.
> try_handle_mmio() is solely responsible for handling the mmio operation.
> 
> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>

In addition to the boot crash on 32-bit Arm there's also an early
build failure on x86:

In file included from arch/x86/x86_64/asm-offsets.c:11:
./include/xen/sched.h:164:26: error: field 'info' has incomplete type
     struct arch_vcpu_io  info;
                          ^~~~

Note how on Arm you have ...

> --- a/xen/arch/arm/include/asm/domain.h
> +++ b/xen/arch/arm/include/asm/domain.h
> @@ -281,6 +281,10 @@ static inline void arch_vcpu_block(struct vcpu *v) {}
>  /* vPCI is not available on Arm */
>  #define has_vpci(d)    ({ (void)(d); false; })
>  
> +struct arch_vcpu_io {
> +    struct instr_details dabt_instr; /* when the instruction is decoded */
> +};

... this in asm/domain.h, and thus visible to xen/sched.h, while on x86
you have ...

> --- a/xen/arch/x86/include/asm/ioreq.h
> +++ b/xen/arch/x86/include/asm/ioreq.h
> @@ -26,6 +26,9 @@
>  #include <asm/hvm/ioreq.h>
>  #endif
>  
> +struct arch_vcpu_io {
> +};

... this in a header which xen/sched.h doesn't end up including. I would
like to ask that you arrange locally for at least an x86 build test
whenever you touch code which might also affect x86.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 07:52:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 07:52:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290654.493017 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU1yo-0007Lt-LN; Tue, 15 Mar 2022 07:52:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290654.493017; Tue, 15 Mar 2022 07:52:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU1yo-0007Lm-I4; Tue, 15 Mar 2022 07:52:30 +0000
Received: by outflank-mailman (input) for mailman id 290654;
 Tue, 15 Mar 2022 07:52:29 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=GQWC=T2=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nU1yn-0007Lg-8n
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 07:52:29 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id dbf0015a-a434-11ec-853b-5f4723681683;
 Tue, 15 Mar 2022 08:52:27 +0100 (CET)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur01lp2051.outbound.protection.outlook.com [104.47.2.51]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-22-wTihynskOcuYRnbjvyKeYg-1; Tue, 15 Mar 2022 08:52:26 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by HE1PR04MB3193.eurprd04.prod.outlook.com (2603:10a6:7:22::14) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.28; Tue, 15 Mar
 2022 07:52:25 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.028; Tue, 15 Mar 2022
 07:52:25 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: dbf0015a-a434-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647330747;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=I7dnC4DWt8NPoO0cXObtun/M/SFzVw5ZzESLj3cnNAE=;
	b=mDMrQw6Rl5ML9i6C5DBc3DlHrVw60jogeQqQaPJWKJVAAbn5iUr/PZwehR/DiCKnBUr+Z+
	zzw8Er0RjXzljiiqHXjp6ah5OqELRkT9AOkA0tTxVcPQldisnok+/ETyPLoqofLLlKXEEs
	GB6Ikj+Y339IknnZVzY1wNLx0t1L7qk=
X-MC-Unique: wTihynskOcuYRnbjvyKeYg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=giXaX+j17JDTJrBw0Qs90CdrSCyVKfSyNhKx74knJSISvBvWzUoGOgGUMpA5lbeLQgx6cfLHce5L/IwjSHhI30MaxsldeQQS9c1zniAsz8OFtsHC/W7pmckRkAVONKVMUCXs/LWX5HxelDdnSyWKn0FKGH3OqQlNxQ57yvt6NF2h/R6iwfzCECd4gm+HTlU0G6NKsl2Cw5g+UDcihw3pdwLvkqALeLMKMZkDKsntK54j+2Gh90KmJk7Q37j4FLUV7RZ/8Fg3I/lyWR49eG4Ueq535CORPPQ/dNBPhRqf8rxKjN0DkL7b266L0fsV2zxSPKxLJfMjE9naogvY1GIgww==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=I7dnC4DWt8NPoO0cXObtun/M/SFzVw5ZzESLj3cnNAE=;
 b=FirpFQlvg2PkVUTKhlN1JEnv/Q9bwqVYUxc7p14I3aEegNW/1/OzcCvnNKIin5nrw9xorsW1+Pc7lfBJt/OqxG/zcOUmlu1T1clxlomJXD48iiNBtgZhah9p/fhVDlBJF+vaxprGQhU7ag7ylPYAta58rCf1COdl13UAZ6ZxgIuvpYpUvK2YoMV0WgHEtN0C9yo1g5ECIz4lpqJB7yOPwCzaawpV9VabkhHX4yXzoypltmCkbCt/gJCnNJTnYy089sgMeizJC1Ka768UUpXhXrNuOiALOTjbJGb3tNw/q0Iji++jmc5y4ppluPdafIl91bLIiymvQmHdshwbbZ7sXg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <adb20db9-a38f-538a-a3a9-a5f7968fafc8@suse.com>
Date: Tue, 15 Mar 2022 08:52:23 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: Some feature requests for guest consoles
Content-Language: en-US
To: Andy Smith <andy@strugglers.net>
Cc: mikeh@csits.net, xen-devel@lists.xenproject.org
References: <20220314163627.4pck24ahx6igggff@bitfolk.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220314163627.4pck24ahx6igggff@bitfolk.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM7PR03CA0006.eurprd03.prod.outlook.com
 (2603:10a6:20b:130::16) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: bbbcf476-67dc-455b-831c-08da0658be70
X-MS-TrafficTypeDiagnostic: HE1PR04MB3193:EE_
X-Microsoft-Antispam-PRVS:
	<HE1PR04MB319346B78ED239BB576AC649B3109@HE1PR04MB3193.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2906002)(6486002)(36756003)(5660300002)(316002)(6506007)(53546011)(8936002)(38100700002)(8676002)(83380400001)(2616005)(26005)(6512007)(31686004)(4326008)(508600001)(6916009)(186003)(66946007)(66476007)(86362001)(31696002)(66556008)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?THRlbEF4bWsvTWxuUTBaS3ZlZ2x5emhFUW1idGo0TlhUbCtKTlN4dWlmZkZj?=
 =?utf-8?B?QktSODVlWFBYSWF2ODdwMlkrd05hZG5tY2EyV09Zeml5QllDZ1hJWlpzd29C?=
 =?utf-8?B?aUE3SVVTdmszejJaMWd6eU8rVmtFN2Y3MlFGQzlaR3B6Y203ZVVPNENNdnlZ?=
 =?utf-8?B?c3FTNU9PbVRqcktSN09xMGs5eUpYQVJqeGJDQkJMZzVOTEZuL0h6SGczKzFt?=
 =?utf-8?B?T0FTMW9xaTNFNk5hL010elFOREhENXNIcDlYVE9lTWJhZ2tGc21mOW9yNzVB?=
 =?utf-8?B?V08wZGorNVZpS0RNcStndDN3OGNpRWs4ZDFTbUJNTHFRZEV6eE52T0pUOGRk?=
 =?utf-8?B?WGxPT2xlRVo0SWxSM29kMFFoWHJ1MjNyaWNLcHBsajdhNWg3TWx3eThwWmdq?=
 =?utf-8?B?NmRPNFJHN3FBRmpoa0lpNWg4eHlnb2hwRm16Z3NEL2ZRMUJscDJkTWR4d3Za?=
 =?utf-8?B?dzMvL3hmRUdVQzJIZkxtUGdNSW9rRUZEUGxnV1RFTUZLZ3hBbERka0ppMnhy?=
 =?utf-8?B?L205U0tScExQd0w2NnFBQ0NUTXNvdDlZbVE1c0lOVXdJQm1pd0ROL1d2TzdV?=
 =?utf-8?B?RkZ6R1lJSVhHdDVJQm5ydEptZzV6SGhPSU83RFdPUmV1RXZHWFNKSWRma1Y5?=
 =?utf-8?B?eHBOZEoxT1hneTIvTG9id3N3aDN6bU9iZzY4cTlyd1ZzcjZIbEhWQTZUZG9i?=
 =?utf-8?B?NW9ZS2l2UGFrcEdNRFpJOGs2WE5qNEpLbXE2K3ZOSGRyb3cybWVuMFNxSloz?=
 =?utf-8?B?cTcvdFZvbGhEN2hvemxMNUExYkErdDRVZC81RC9wQ3RsaFpCbzh0RGIzTFA4?=
 =?utf-8?B?RUVPNHZIbER5RWRTdlVKbzZVMXFRM0FaY1FudzZ5djcyaXlVa05ZMTMySS82?=
 =?utf-8?B?aXl0Vk1WVmNYdUJJdHVZWk5kZndKY3d4djI2L2pheGczVUo3eXpGQkNhNDRs?=
 =?utf-8?B?RzdSTEI1QUNmb1oyZnJkZENMN1plR0J2RzFEbmR1WXRSZUNsYmw5K3hsVmht?=
 =?utf-8?B?RU1XNFBldHZicGNtYW8zNS9GUDhKU0dwMlU0SkVOS0c0SjQ0U3EwYjJhYXFM?=
 =?utf-8?B?d3hZdjRjdGtqeUhwMWFoQ09HL1Z4dXRoNnpDVFpoQ0lIYTBiL0FjZzhMS3NU?=
 =?utf-8?B?cHhzYnU5TFcrOE5aSjVkcUdIV2xMOG91K2xjRk5VOHR6KzFXR08yVU9kb0xX?=
 =?utf-8?B?bU43aExNdTVuNkN1ZWQzbVREeGt2OW15NDdvRTYveWcxdFdreERLa1pyeWQ3?=
 =?utf-8?B?YTJqcDErU1JWMnZ2NG1pS3BlOWV2bjI5NjVpcXZsdUFKZ216ZTJPV1k3Yi8x?=
 =?utf-8?B?MUUxRG5SamV0MlRKcElOUlBvRDdqRlR3STMyNGtsNGs1Q1B3WDI1dWZDVEY3?=
 =?utf-8?B?aWdKR05VQjRlR0NadFErZWxEbmY2RXpyQ2VFaWJKTUtKWWZrMWVRbkJaUGxE?=
 =?utf-8?B?NCt2VWdUU2R4S2xHZ1lPSGJMWXlqeFFoWFUwdWtKamhwVExLVlNyV3NzbDR6?=
 =?utf-8?B?MytHVmoxTmZ4UHJQSDMwSWVOVFczL0F6c293dnZTZGo2eDU1OUZRdzF4bk5j?=
 =?utf-8?B?NWpwZy9mdXZqb00rRFMySnltNTZtT1JlS05TNjBucTF3NDlQRXhXdjY0MWh2?=
 =?utf-8?B?UnQvR3ZIbDhIT1ptWjdROFF2Y3REZFI1dXNZbHNVeGNQQWJCWkM4NDRjL2ZG?=
 =?utf-8?B?NFpBN21jMzlwT2F1aGRyREpFazBuTTlkUmNUdmxybW1Ca0psdnlxbWdaVE93?=
 =?utf-8?B?amFtdXF2RlFxUEdHcno2amxBQW1HVVVaMkQ0eU5FNHF0NU44aDBVaUZ6RG1Q?=
 =?utf-8?B?R3ZFZTd0NmhHWnE0c0I5YUpRaEhtRVBzTExaUW9YelpNNG1KOU5lOThrUDVZ?=
 =?utf-8?B?dWx0cUhrM3ZocUc0dG5pUWVTSHRUWXhzRksxTEtEWFFqNk5Jd091N1ZISS9H?=
 =?utf-8?Q?LJKfiGpL6WztXBDR0feWGQDe/E/zCuMB?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: bbbcf476-67dc-455b-831c-08da0658be70
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Mar 2022 07:52:24.9842
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: VPKZxSpEn6AhlGcW3QTI6cudp4vXUU0TT5O0xCLEBlCCBYqrGAR8J9sy+8BACSOZnkPXSZtx1cjMWjRg9apIvQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR04MB3193

On 14.03.2022 17:36, Andy Smith wrote:
> - Ability to remap the "magic sysrq" key combination which is
>   ctrl-o, and possibly disable it while leaving "xl sysrq" and
>   /proc/sysrq-trigger in the guest generally working.
> 
>   Reason: guest administrators are often inexperienced with the
>   details of Xen. ctrl-o is a bad choice because it's actually the
>   "save buffer" shortcut in the popular editor nano. On more than
>   one occasion I have had guest administrators be editing a file
>   with nano on their console, they go to save it with ctrl-o which
>   appears to do nothing (because Xen is waiting for the sysrq
>   command that follows), so they do ctrl-o again which is taken as
>   being command 'o' - immediate power off! I have had an emergency
>   support ticket about this because "my guest randomly crashed while
>   I was editing a file".
> 
>   I would therefore like to remap "magic sysrq" to something more
>   obscure, or failing that disable it in guests as we/they will use
>   "xl sysrq" instead.

Without meaning to turn down the request, I'd like to point out that
- as of Linux commit 368c1e3249af (over 13 years ago) pressing ^O
  twice does not have the described effect, but actually means an
  individual ^O to be sent to the application,
- independent of that commit ^O followed by another ^O would not
  trigger the 'o' sysrq handler, but do nothing; said sysrq handler
  would be triggered when ^O is followed by O or o (without Ctrl),
- this sysrq triggering model isn't specific to Xen (and hence
  sending the request here may not reach the necessary audience) -
  besides being implemented in code common to all hvc drivers, it
  is additionally handled by some non-hvc tty drivers as well.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 07:54:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 07:54:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290657.493027 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU20G-0007v9-Vo; Tue, 15 Mar 2022 07:54:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290657.493027; Tue, 15 Mar 2022 07:54:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU20G-0007v2-Sp; Tue, 15 Mar 2022 07:54:00 +0000
Received: by outflank-mailman (input) for mailman id 290657;
 Tue, 15 Mar 2022 07:54:00 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=FlxB=T2=kaod.org=groug@srs-se1.protection.inumbo.net>)
 id 1nU20G-0007uw-HV
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 07:54:00 +0000
Received: from us-smtp-delivery-44.mimecast.com
 (us-smtp-delivery-44.mimecast.com [207.211.30.44])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 11a056d2-a435-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 08:53:59 +0100 (CET)
Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com
 [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS
 (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 us-mta-41-wQ12KsT-PDSqq8y9SNA3Rw-1; Tue, 15 Mar 2022 03:53:56 -0400
Received: from smtp.corp.redhat.com (int-mx09.intmail.prod.int.rdu2.redhat.com
 [10.11.54.9])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 25BE18001EA;
 Tue, 15 Mar 2022 07:53:54 +0000 (UTC)
Received: from bahia (unknown [10.39.192.202])
 by smtp.corp.redhat.com (Postfix) with ESMTP id ED3FC7CB810;
 Tue, 15 Mar 2022 07:53:43 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 11a056d2-a435-11ec-8eba-a37418f5ba1a
X-MC-Unique: wQ12KsT-PDSqq8y9SNA3Rw-1
Date: Tue, 15 Mar 2022 08:53:42 +0100
From: Greg Kurz <groug@kaod.org>
To: Markus Armbruster <armbru@redhat.com>
Cc: qemu-devel@nongnu.org, Paolo Bonzini <pbonzini@redhat.com>, Richard
 Henderson <richard.henderson@linaro.org>, Gerd Hoffmann
 <kraxel@redhat.com>, Christian Schoenebeck <qemu_oss@crudebyte.com>,
 "Gonglei (Arei)" <arei.gonglei@huawei.com>, =?UTF-8?B?TWFyYy1BbmRyw6k=?=
 Lureau <marcandre.lureau@redhat.com>, "Michael S. Tsirkin"
 <mst@redhat.com>, Igor Mammedov <imammedo@redhat.com>, Ani Sinha
 <ani@anisinha.ca>, Laurent Vivier <lvivier@redhat.com>, Amit Shah
 <amit@kernel.org>, Peter Maydell <peter.maydell@linaro.org>, Stefano
 Stabellini <sstabellini@kernel.org>, Anthony Perard
 <anthony.perard@citrix.com>, Paul Durrant <paul@xen.org>, =?UTF-8?B?SGVy?=
 =?UTF-8?B?dsOp?= Poussineau <hpoussin@reactos.org>, Aleksandar Rikalo
 <aleksandar.rikalo@syrmia.com>, Corey Minyard <cminyard@mvista.com>,
 Patrick Venture <venture@google.com>, Eduardo Habkost
 <eduardo@habkost.net>, Marcel Apfelbaum <marcel.apfelbaum@gmail.com>, Peter
 Xu <peterx@redhat.com>, Jason Wang <jasowang@redhat.com>, =?UTF-8?B?Q8Op?=
 =?UTF-8?B?ZHJpYw==?= Le Goater <clg@kaod.org>, Daniel Henrique Barboza
 <danielhb413@gmail.com>, David Gibson <david@gibson.dropbear.id.au>,
 Philippe =?UTF-8?B?TWF0aGlldS1EYXVkw6k=?= <f4bug@amsat.org>,
 Jean-Christophe Dubois <jcd@tribudubois.net>, Keith Busch
 <kbusch@kernel.org>, Klaus Jensen <its@irrelevant.dk>, Yuval Shaia
 <yuval.shaia.ml@gmail.com>, Yoshinori Sato <ysato@users.sourceforge.jp>,
 Magnus Damm <magnus.damm@gmail.com>, Fabien Chouteau
 <chouteau@adacore.com>, KONRAD Frederic <frederic.konrad@adacore.com>, Mark
 Cave-Ayland <mark.cave-ayland@ilande.co.uk>, Artyom Tarasenko
 <atar4qemu@gmail.com>, Alex Williamson <alex.williamson@redhat.com>, Eric
 Auger <eric.auger@redhat.com>, Max Filippov <jcmvbkbc@gmail.com>, Juan
 Quintela <quintela@redhat.com>, "Dr. David Alan Gilbert"
 <dgilbert@redhat.com>, Konstantin Kostiuk <kkostiuk@redhat.com>, Michael
 Roth <michael.roth@amd.com>, "Daniel P. =?UTF-8?B?QmVycmFuZ8Op?="
 <berrange@redhat.com>, Pavel Dovgalyuk <pavel.dovgaluk@ispras.ru>, Alex
 =?UTF-8?B?QmVubsOpZQ==?= <alex.bennee@linaro.org>, David Hildenbrand
 <david@redhat.com>, Wenchao Wang <wenchao.wang@intel.com>, Colin Xu
 <colin.xu@intel.com>, Kamil Rytarowski <kamil@netbsd.org>, Reinoud Zandijk
 <reinoud@netbsd.org>, Sunil Muthuswamy <sunilmut@microsoft.com>, Cornelia
 Huck <cohuck@redhat.com>, Thomas Huth <thuth@redhat.com>, Eric Blake
 <eblake@redhat.com>, Vladimir Sementsov-Ogievskiy
 <vsementsov@virtuozzo.com>, John Snow <jsnow@redhat.com>,
 kvm@vger.kernel.org, qemu-arm@nongnu.org, xen-devel@lists.xenproject.org,
 qemu-ppc@nongnu.org, qemu-block@nongnu.org, haxm-team@intel.com,
 qemu-s390x@nongnu.org
Subject: Re: [PATCH 2/3] 9pfs: Use g_new() & friends where that makes
 obvious sense
Message-ID: <20220315085342.2b07eff8@bahia>
In-Reply-To: <20220314160108.1440470-3-armbru@redhat.com>
References: <20220314160108.1440470-1-armbru@redhat.com>
	<20220314160108.1440470-3-armbru@redhat.com>
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.85 on 10.11.54.9
Authentication-Results: relay.mimecast.com;
	auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=groug@kaod.org
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: kaod.org
Content-Type: text/plain; charset=WINDOWS-1252
Content-Transfer-Encoding: quoted-printable

On Mon, 14 Mar 2022 17:01:07 +0100
Markus Armbruster <armbru@redhat.com> wrote:

> g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
> for two reasons.  One, it catches multiplication overflowing size_t.
> Two, it returns T * rather than void *, which lets the compiler catch
> more type errors.
>=20
> This commit only touches allocations with size arguments of the form
> sizeof(T).
>=20
> Patch created mechanically with:
>=20
>     $ spatch --in-place --sp-file scripts/coccinelle/use-g_new-etc.cocci =
\
> =09     --macro-file scripts/cocci-macro-file.h FILES...
>=20
> Except this uncovers a typing error:
>=20
>     ../hw/9pfs/9p.c:855:13: warning: incompatible pointer types assigning=
 to 'QpfEntry *' from 'QppEntry *' [-Wincompatible-pointer-types]
> =09    val =3D g_new0(QppEntry, 1);
> =09=09^ ~~~~~~~~~~~~~~~~~~~
>     1 warning generated.
>=20
> Harmless, because QppEntry is larger than QpfEntry.  Fix to allocate a
> QpfEntry instead.
>=20
> Cc: Greg Kurz <groug@kaod.org>
> Cc: Christian Schoenebeck <qemu_oss@crudebyte.com>
> Signed-off-by: Markus Armbruster <armbru@redhat.com>
> ---

Reviewed-by: Greg Kurz <groug@kaod.org>

>  hw/9pfs/9p-proxy.c           | 2 +-
>  hw/9pfs/9p-synth.c           | 4 ++--
>  hw/9pfs/9p.c                 | 8 ++++----
>  hw/9pfs/codir.c              | 6 +++---
>  tests/qtest/virtio-9p-test.c | 4 ++--
>  5 files changed, 12 insertions(+), 12 deletions(-)
>=20
> diff --git a/hw/9pfs/9p-proxy.c b/hw/9pfs/9p-proxy.c
> index 8b4b5cf7dc..4c5e0fc217 100644
> --- a/hw/9pfs/9p-proxy.c
> +++ b/hw/9pfs/9p-proxy.c
> @@ -1187,7 +1187,7 @@ static int proxy_parse_opts(QemuOpts *opts, FsDrive=
rEntry *fs, Error **errp)
> =20
>  static int proxy_init(FsContext *ctx, Error **errp)
>  {
> -    V9fsProxy *proxy =3D g_malloc(sizeof(V9fsProxy));
> +    V9fsProxy *proxy =3D g_new(V9fsProxy, 1);
>      int sock_id;
> =20
>      if (ctx->export_flags & V9FS_PROXY_SOCK_NAME) {
> diff --git a/hw/9pfs/9p-synth.c b/hw/9pfs/9p-synth.c
> index b3080e415b..d99d263985 100644
> --- a/hw/9pfs/9p-synth.c
> +++ b/hw/9pfs/9p-synth.c
> @@ -49,7 +49,7 @@ static V9fsSynthNode *v9fs_add_dir_node(V9fsSynthNode *=
parent, int mode,
> =20
>      /* Add directory type and remove write bits */
>      mode =3D ((mode & 0777) | S_IFDIR) & ~(S_IWUSR | S_IWGRP | S_IWOTH);
> -    node =3D g_malloc0(sizeof(V9fsSynthNode));
> +    node =3D g_new0(V9fsSynthNode, 1);
>      if (attr) {
>          /* We are adding .. or . entries */
>          node->attr =3D attr;
> @@ -128,7 +128,7 @@ int qemu_v9fs_synth_add_file(V9fsSynthNode *parent, i=
nt mode,
>      }
>      /* Add file type and remove write bits */
>      mode =3D ((mode & 0777) | S_IFREG);
> -    node =3D g_malloc0(sizeof(V9fsSynthNode));
> +    node =3D g_new0(V9fsSynthNode, 1);
>      node->attr         =3D &node->actual_attr;
>      node->attr->inode  =3D synth_node_count++;
>      node->attr->nlink  =3D 1;
> diff --git a/hw/9pfs/9p.c b/hw/9pfs/9p.c
> index a6d6b3f835..8e9d4aea73 100644
> --- a/hw/9pfs/9p.c
> +++ b/hw/9pfs/9p.c
> @@ -324,7 +324,7 @@ static V9fsFidState *alloc_fid(V9fsState *s, int32_t =
fid)
>              return NULL;
>          }
>      }
> -    f =3D g_malloc0(sizeof(V9fsFidState));
> +    f =3D g_new0(V9fsFidState, 1);
>      f->fid =3D fid;
>      f->fid_type =3D P9_FID_NONE;
>      f->ref =3D 1;
> @@ -804,7 +804,7 @@ static int qid_inode_prefix_hash_bits(V9fsPDU *pdu, d=
ev_t dev)
> =20
>      val =3D qht_lookup(&pdu->s->qpd_table, &lookup, hash);
>      if (!val) {
> -        val =3D g_malloc0(sizeof(QpdEntry));
> +        val =3D g_new0(QpdEntry, 1);
>          *val =3D lookup;
>          affix =3D affixForIndex(pdu->s->qp_affix_next);
>          val->prefix_bits =3D affix.bits;
> @@ -852,7 +852,7 @@ static int qid_path_fullmap(V9fsPDU *pdu, const struc=
t stat *stbuf,
>              return -ENFILE;
>          }
> =20
> -        val =3D g_malloc0(sizeof(QppEntry));
> +        val =3D g_new0(QpfEntry, 1);
>          *val =3D lookup;
> =20
>          /* new unique inode and device combo */
> @@ -928,7 +928,7 @@ static int qid_path_suffixmap(V9fsPDU *pdu, const str=
uct stat *stbuf,
>              return -ENFILE;
>          }
> =20
> -        val =3D g_malloc0(sizeof(QppEntry));
> +        val =3D g_new0(QppEntry, 1);
>          *val =3D lookup;
> =20
>          /* new unique inode affix and device combo */
> diff --git a/hw/9pfs/codir.c b/hw/9pfs/codir.c
> index 75148bc985..93ba44fb75 100644
> --- a/hw/9pfs/codir.c
> +++ b/hw/9pfs/codir.c
> @@ -141,9 +141,9 @@ static int do_readdir_many(V9fsPDU *pdu, V9fsFidState=
 *fidp,
> =20
>          /* append next node to result chain */
>          if (!e) {
> -            *entries =3D e =3D g_malloc0(sizeof(V9fsDirEnt));
> +            *entries =3D e =3D g_new0(V9fsDirEnt, 1);
>          } else {
> -            e =3D e->next =3D g_malloc0(sizeof(V9fsDirEnt));
> +            e =3D e->next =3D g_new0(V9fsDirEnt, 1);
>          }
>          e->dent =3D qemu_dirent_dup(dent);
> =20
> @@ -163,7 +163,7 @@ static int do_readdir_many(V9fsPDU *pdu, V9fsFidState=
 *fidp,
>                  break;
>              }
> =20
> -            e->st =3D g_malloc0(sizeof(struct stat));
> +            e->st =3D g_new0(struct stat, 1);
>              memcpy(e->st, &stbuf, sizeof(struct stat));
>          }
> =20
> diff --git a/tests/qtest/virtio-9p-test.c b/tests/qtest/virtio-9p-test.c
> index 01ca076afe..e28c71bd8f 100644
> --- a/tests/qtest/virtio-9p-test.c
> +++ b/tests/qtest/virtio-9p-test.c
> @@ -468,12 +468,12 @@ static void v9fs_rreaddir(P9Req *req, uint32_t *cou=
nt, uint32_t *nentries,
>           togo -=3D 13 + 8 + 1 + 2 + slen, ++n)
>      {
>          if (!e) {
> -            e =3D g_malloc(sizeof(struct V9fsDirent));
> +            e =3D g_new(struct V9fsDirent, 1);
>              if (entries) {
>                  *entries =3D e;
>              }
>          } else {
> -            e =3D e->next =3D g_malloc(sizeof(struct V9fsDirent));
> +            e =3D e->next =3D g_new(struct V9fsDirent, 1);
>          }
>          e->next =3D NULL;
>          /* qid[13] offset[8] type[1] name[s] */



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 07:57:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 07:57:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290662.493038 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU23D-0000Cg-GF; Tue, 15 Mar 2022 07:57:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290662.493038; Tue, 15 Mar 2022 07:57:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU23D-0000CZ-DP; Tue, 15 Mar 2022 07:57:03 +0000
Received: by outflank-mailman (input) for mailman id 290662;
 Tue, 15 Mar 2022 07:57:02 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU23C-0000CP-KJ; Tue, 15 Mar 2022 07:57:02 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU23C-00062r-H2; Tue, 15 Mar 2022 07:57:02 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU23C-0000YO-68; Tue, 15 Mar 2022 07:57:02 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nU23C-0008FT-5e; Tue, 15 Mar 2022 07:57:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Qu9OKtcihT6gDitNuiiKuwYfWm9sOqGClirSicR6mbo=; b=NqiTywVOVYxtPqDjP+TfUv0NYe
	GIp/vxNRNpmlrP8XcarD9spVeJJ7zJ7bF/Eokqf2qoq93RNvhDN6EDkP5C+MPPbL/xfjhuvh5tICR
	fCRHhvgev9cbN8VZzk7MGm64QdaABdwinGAhSVHfxHuTQHeeYHD5JxY9iD66nTngVZl8=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168607-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168607: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=07aebcd55fd2f7997e9fe50a6c849c8a12ec2e68
X-Osstest-Versions-That:
    xen=dedb0aa42c6d1ee31805dfc61630db2c41117330
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 15 Mar 2022 07:57:02 +0000

flight 168607 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168607/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  07aebcd55fd2f7997e9fe50a6c849c8a12ec2e68
baseline version:
 xen                  dedb0aa42c6d1ee31805dfc61630db2c41117330

Last test of basis   168580  2022-03-14 10:01:40 Z    0 days
Failing since        168589  2022-03-14 19:00:27 Z    0 days    3 attempts
Testing same since   168607  2022-03-15 03:02:22 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
  Ayan Kumar Halder <ayankuma@xilinx.com>
  Julien Grall <jgrall@amazon.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   dedb0aa42c..07aebcd55f  07aebcd55fd2f7997e9fe50a6c849c8a12ec2e68 -> smoke


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 08:41:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 08:41:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290679.493049 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU2jf-0006EK-6Y; Tue, 15 Mar 2022 08:40:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290679.493049; Tue, 15 Mar 2022 08:40:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU2jf-0006ED-3U; Tue, 15 Mar 2022 08:40:55 +0000
Received: by outflank-mailman (input) for mailman id 290679;
 Tue, 15 Mar 2022 08:40:53 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=CG/1=T2=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nU2jd-0006E4-3h
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 08:40:53 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on20629.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::629])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 9dbee0fe-a43b-11ec-853b-5f4723681683;
 Tue, 15 Mar 2022 09:40:50 +0100 (CET)
Received: from DU2P250CA0023.EURP250.PROD.OUTLOOK.COM (2603:10a6:10:231::28)
 by DB6PR0802MB2455.eurprd08.prod.outlook.com (2603:10a6:4:a0::15) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26; Tue, 15 Mar
 2022 08:40:33 +0000
Received: from DB5EUR03FT015.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:231:cafe::1) by DU2P250CA0023.outlook.office365.com
 (2603:10a6:10:231::28) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26 via Frontend
 Transport; Tue, 15 Mar 2022 08:40:33 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT015.mail.protection.outlook.com (10.152.20.145) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Tue, 15 Mar 2022 08:40:32 +0000
Received: ("Tessian outbound 2877e54fe176:v113");
 Tue, 15 Mar 2022 08:40:32 +0000
Received: from 6c3b5ba84082.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 E87B0038-DD4D-4BD4-A603-C77B2D5781FA.1; 
 Tue, 15 Mar 2022 08:40:26 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 6c3b5ba84082.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 15 Mar 2022 08:40:26 +0000
Received: from VI1PR08MB3967.eurprd08.prod.outlook.com (2603:10a6:803:df::16)
 by AM0PR08MB3809.eurprd08.prod.outlook.com (2603:10a6:208:103::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.25; Tue, 15 Mar
 2022 08:40:24 +0000
Received: from VI1PR08MB3967.eurprd08.prod.outlook.com
 ([fe80::479:b7f8:ba2a:4a74]) by VI1PR08MB3967.eurprd08.prod.outlook.com
 ([fe80::479:b7f8:ba2a:4a74%5]) with mapi id 15.20.5061.029; Tue, 15 Mar 2022
 08:40:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9dbee0fe-a43b-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=dQGHfPhFLIgM6vRyHj6xjcp5iy3AxVUs608c3Pon0PU=;
 b=nghOCDW2Q7wbIzKWo9zgkL9hKSXdBpNASMof24zZZGilwQ10p5nRvTT94QG3WAlMWpNSlR60AH310F1sIJxPoaTMz2IGnZSiNPoj5TsLIXhIMIBEAGc/MNSLXtHmul2YFI0tTspsUWq/tN4xCTZjqYFduXHYCDKnwFcrqeb61m0=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 731868234aa37c73
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Oc2d9S5kb+0ac4HAPrFGjYBb46pMqHT8NpCukp2Vma9VXpq7ZMpGg476pj1Z5eOkYitDxbszLTdUefxIIV/zaw5AI0EH8yTo5871ALENJjSAyF4NgCK2pL8T5Gt5MkfOiG6aDMxntumyJhas1HcvPmgcE1F7lux1dCosQ6rbJHzX9ns6hw5aEMxD3YP9b7Jrv1vaWokvmQ63tJa6TceKyKIS/I+uCQja77R6HBOpdFf2YWRV9YR2J2mMGKJgwgQ2QgKtTBIC6YILmorL8nw+T/nGHypX87RQsHCSO2I+mgdrwcVbtDEAQOZKvE9bItxJkaYlR+to4LnrXMu7kJ2VYA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=dQGHfPhFLIgM6vRyHj6xjcp5iy3AxVUs608c3Pon0PU=;
 b=hjHVphlaVCOWkpXlvDTyH9lYcLKwjG01/BZV7CJk4zER1V82u9Msvq0M0tvtE7nI/EXO0+C96bAfSdnQWOa4Ei+upeTceQrHdQXChTQXvVkdukNetknBjcS92/Mmkx0MJl4x3VDh67tgaQ1WUb7xuc5gXrQFkkQfI2us9JU19kxUQAyOArsg2bNOBTUOyvcUiAbK4wYpkGhq0eFIdAKYex6Rba36/Xq4YTLxJn/gsgMkPmcQ+G/Gx8yDBhKy7mrqf8BxoR12j/XmvjIqitxoEh+zorCJbJsRj0Aq/Y5buBRnp0AuSbqnS6zDCHz4oN8F2a/Y0+XM/3HJgV+YVk2AdA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=dQGHfPhFLIgM6vRyHj6xjcp5iy3AxVUs608c3Pon0PU=;
 b=nghOCDW2Q7wbIzKWo9zgkL9hKSXdBpNASMof24zZZGilwQ10p5nRvTT94QG3WAlMWpNSlR60AH310F1sIJxPoaTMz2IGnZSiNPoj5TsLIXhIMIBEAGc/MNSLXtHmul2YFI0tTspsUWq/tN4xCTZjqYFduXHYCDKnwFcrqeb61m0=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Juergen Gross <jgross@suse.com>
CC: Stefano Stabellini <sstabellini@kernel.org>, Xen-devel
	<xen-devel@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>, Julien Grall
	<julien@xen.org>, Bertrand Marquis <Bertrand.Marquis@arm.com>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, Jan
 Beulich <jbeulich@suse.com>, Wei Liu <wl@xen.org>, Dario Faggioli
	<dfaggioli@suse.com>
Subject: Re: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Topic: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Index: AQHYNKHSvTK6bj2+f02v/DWZHCtE9qy5jxyAgACrU4CAAKeKgIAFGdqAgAAriQA=
Date: Tue, 15 Mar 2022 08:40:24 +0000
Message-ID: <927CBDC0-4141-4964-84E3-8AF1ED491527@arm.com>
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-5-luca.fancellu@arm.com>
 <alpine.DEB.2.22.394.2203101957370.3497@ubuntu-linux-20-04-desktop>
 <A34CF75A-8139-4A4A-A1AE-3BA74E70DE55@arm.com>
 <alpine.DEB.2.22.394.2203111600330.3497@ubuntu-linux-20-04-desktop>
 <aee7dedf-3f70-da48-8be5-3d7cc9ec392c@suse.com>
In-Reply-To: <aee7dedf-3f70-da48-8be5-3d7cc9ec392c@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 391e9eb8-d008-49ad-6a21-08da065f77d5
x-ms-traffictypediagnostic:
	AM0PR08MB3809:EE_|DB5EUR03FT015:EE_|DB6PR0802MB2455:EE_
X-Microsoft-Antispam-PRVS:
	<DB6PR0802MB24554E7DDB2F9CE48514D44EE4109@DB6PR0802MB2455.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 ICfke8udB8gH60liL5JBcNERVPWgctwnmd4c8yfSKkdrHSx/cMPjQSUdoYMPxD185O8uV5nrGJFVM2EHOPulfPYeY1c6zJPoaabUgNqbQeeG0XOosBta9BDHPy0N2+iWkZyNyDo6dmo9SOr5VAhx4g/rn7dbFgQEjToKRBOE3CpuHWu0GEyD1kOxxsbNNbjLNqeMYJ8LFdzT3U51huwlGZ2EuoglNayPAAg8COsKLjvaGyLZiyhZrvcv+BKYb6cLQ5GtUxbEET5FddxNKwf/wPm36WQLSVq+csUBFILSuCIZgc5D78y0MHodQD7y7+7V56774zND+lJaOGWOv1DSM/h6PXBikZU0NG85s4E9Qsca1voOWw5hDNO5ZQs/6dXpoI/axF7R7HveP121ujvFyFsB+Qkgn/aT0NoJDyoM/sGrqWZWITJmC0s1jKqk/gPxIfWZqxJNGjSDIYfFa9bIUlhOfBnZnWMkAebNJeGwtups2MLN30Z/LwuoTOLvw7gES65S7+ChSSTMabB/UZlYIBOt22WCdKGyple2+CoqQX3f8u96z4H13lkbW4/sWfH/RKeXBpWlSMVG9PU2Wdne7OiHelmSKZcaAyUjXQhkhsqXS67tjqKzaxmw+yJOskjqNezIpzr0vzO5K9AsCjMHXdQhkxPvSFVmQ63sLNuCIChkrfoqFAY483Osog0r5P2EPHjkaPBRW9pJYcu93hySoMeO3ToqyEXB6LeBBXXL8hGeYAGPMZ65yLYds8LfJx5g
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR08MB3967.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(508600001)(38100700002)(2616005)(8676002)(5660300002)(33656002)(54906003)(316002)(36756003)(83380400001)(6916009)(7416002)(86362001)(66556008)(66946007)(64756008)(76116006)(66476007)(66446008)(4326008)(6486002)(91956017)(38070700005)(26005)(71200400001)(186003)(8936002)(122000001)(6512007)(2906002)(4744005)(6506007)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <22482FCF6F3C3B46B5F0E265B159BA60@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB3809
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT015.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	93d899c8-cee5-4c04-11e4-08da065f72fb
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(70586007)(33656002)(81166007)(356005)(186003)(336012)(82310400004)(8936002)(26005)(36756003)(6862004)(4326008)(6512007)(86362001)(40460700003)(2906002)(47076005)(36860700001)(4744005)(83380400001)(5660300002)(6486002)(107886003)(2616005)(8676002)(54906003)(316002)(70206006)(6506007)(508600001);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Mar 2022 08:40:32.8406
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 391e9eb8-d008-49ad-6a21-08da065f77d5
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT015.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0802MB2455


> Hmm, this will fail the ASSERT(spin_is_locked(&cpupool_lock)) in
> __cpupool_find_by_id().
>=20
> I think you need to use cpupool_get_by_id() and cpupool_put() by making t=
hem
> globally visible (move their prototypes to sched.h).

Hi Juergen,

Yes I was thinking more to a __init wrapper that takes the lock and calls _=
_cpupool_find_by_id,
this to avoid exporting cpupool_put outside since we would be the only user=
.
But I would like your opinion on that.

Cheers,
Luca

>=20
>=20
> Juergen
> <OpenPGP_0xB0DE9DD628BF132F.asc>



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 09:04:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 09:04:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290683.493061 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU36k-0000PW-5d; Tue, 15 Mar 2022 09:04:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290683.493061; Tue, 15 Mar 2022 09:04:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU36k-0000PP-18; Tue, 15 Mar 2022 09:04:46 +0000
Received: by outflank-mailman (input) for mailman id 290683;
 Tue, 15 Mar 2022 09:04:44 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=GQWC=T2=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nU36i-0000PJ-NW
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 09:04:44 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f2091cee-a43e-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 10:04:43 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2113.outbound.protection.outlook.com [104.47.17.113]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-6-7_AUUunwOAKQF68zTnmx3g-1; Tue, 15 Mar 2022 10:04:38 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by HE1PR0401MB2233.eurprd04.prod.outlook.com (2603:10a6:3:1e::17)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.28; Tue, 15 Mar
 2022 09:04:36 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.028; Tue, 15 Mar 2022
 09:04:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f2091cee-a43e-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647335079;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=dTbIv+AledwC3Bds8nLJu90vJtRVynY21RnFWjLEn1U=;
	b=Q3iZe/M5ie04H+Ucb3ynhx3HpFrEBn56ZFtFvWiXLOZRMJ9DmYLhsv9Ny31JejdFhnpE0g
	znClLQcvuU7HlN1cU6uH8NipOAXlNgz0UXteuhvbNV7FBI8HDGK4hasb+A2MK4iTVxbCIZ
	NkY6O4EypHSpZPfVFlburTXbmOtf8QU=
X-MC-Unique: 7_AUUunwOAKQF68zTnmx3g-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=JT+Wgy59GakRrZ7sXgDZ7JPiggBQkVOXxhnTWlNL2R/vSeZtUIP7S4BVnxHMW+oVlXKwGiPghgphaqYTOPeV3HBRTyqc00s77hOcZ/q2ASahBKjqCgUKhKPxp8aqYTGf9OVTc+9TLbYYcqcTnfgWiJBsfovDX2YApScDARAj8Nc8fIaF0jEBI4Z9jGd6qTRNuqv26V5t7uccecSumXwsoSVIV4dcr9xiFa8P47rvZZJbrO3u5CR0ca5SaAwHXUZXGYh2ANvNMTR2geVLHpSRFCUTh6NsZiDhCGdLzmLHimv/xB0wnXNfACHXj10ydAkARn+VJtON00BIbZ8r4Bb5yQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Yr3wtAgn6fDHoSE6/i4LwSDxC4WhrsFiGbmPYwV+CiY=;
 b=Q6YrMOa95L/5dBkMXpyTwW6rrAUS+FNPreFHvpt8OO2+G4+h30kzvfyhyAmqjiXtKLcIVatId37Xq7qqClEm5LS0bIUcY6LRvrW2Vd+jhcQhQHf2+XOyeBElXU9GgmvrOa1pxmJoxAjyB4e5fHLEHkjrTQiaIzvXdgPrnjvVZxaheqOe+G1+PVP04Mv7cPnFsIGtXRa1USI7iKkEfY9AgXSSkexZRYRrf6g+J3Oo/e5ruzKWFR9I7kGfdDtep6XJ2wzgQrgZ3F06Rav3wR0GMVfy83CTjucgRpPVThxrqaBF+jgdLURHLou8x7pW7WQWKBdNjCEuh7nkzw3tRERj9Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <2587e3e4-14d6-6523-c844-384452659543@suse.com>
Date: Tue, 15 Mar 2022 10:04:34 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH 2/2] ns16550: Add support for Intel LPSS UART
Content-Language: en-US
To: =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?=
 <marmarek@invisiblethingslab.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220310143403.50944-1-marmarek@invisiblethingslab.com>
 <20220310143403.50944-2-marmarek@invisiblethingslab.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220310143403.50944-2-marmarek@invisiblethingslab.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6P194CA0064.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:209:84::41) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 56b1ca67-7de0-4614-aeee-08da0662d431
X-MS-TrafficTypeDiagnostic: HE1PR0401MB2233:EE_
X-Microsoft-Antispam-PRVS:
	<HE1PR0401MB2233BB1E5C1F4490050D4EA9B3109@HE1PR0401MB2233.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(4744005)(6506007)(36756003)(31686004)(26005)(186003)(53546011)(54906003)(5660300002)(86362001)(8936002)(6916009)(6512007)(2906002)(2616005)(316002)(38100700002)(6486002)(66946007)(508600001)(66556008)(66476007)(31696002)(4326008)(8676002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?2k2om2McHrtg4/FY0pvdySc56TgbHwap1CnC49QKTlV/3w5meIxcDSMFiUly?=
 =?us-ascii?Q?MLSLsOJRkuIC8/iTC6Ldk3qlLFlT9CyQrrREjj7Q75jA/WF+NLqKbAblqtF1?=
 =?us-ascii?Q?mkdDURC5+DVYPpUpAV5Vnb43atiOIm4d8OQY1nij++tITFe1RF1SfPxHUnSt?=
 =?us-ascii?Q?KzSouXzT3kmAixoYwMlllmUuJxGco/aoOw85hrCvrGxcaCjQaxHBtufeywqZ?=
 =?us-ascii?Q?Rxgs+2lk9I4x46KTyn9TitgSghWh2u+Cn/XO6VmeYS1m5Ilgsma/8wbeWAHd?=
 =?us-ascii?Q?+00E5evxRT6Qm1TcNYnFSEjOjx9PfwuZJQe//+vCd0KmmXzVTDjDPbr/L7Qh?=
 =?us-ascii?Q?ixXLLhjhTTZFFTmiUEiuYl9Mz00/USqS8qQsd2rvrQrbByKF98rhSJTliGej?=
 =?us-ascii?Q?CPwMfEJPma1PZ+Zz9iKrvsB6rQvqNPdrlbNm+88SCAlnBEqRqlF2C5g5oK+Q?=
 =?us-ascii?Q?dI3U+Br2Ms1eif5idKX6c0A2ucgttjt2bo9kOxMVmDvc0zSnFRlUu1Sjer1a?=
 =?us-ascii?Q?XrXeejceVAGEjvcCB5kBtu3YDkNqiZNWljfpWX2Y62RVrGU17rUYN+IL8dQW?=
 =?us-ascii?Q?IvO//iy53mNemVuPuCeLtpL8g6gkHQAMMNVu2ovOGxdwdx6NtjgZgV+nTG9p?=
 =?us-ascii?Q?iq4aZZXmAxiF3Ty0OWgYXy9leaEh0/09Ln6bxP1NC9Klhw7ncAbus6PvfY6g?=
 =?us-ascii?Q?4s44bEPfEzW35zz9P5iaPQPfxNGEVl6qjytcj8N/DF8WY3qoCgoQinKtv9Zt?=
 =?us-ascii?Q?VJUvHUih0c7c6hZ4ac+RR9/uu1JFAhke5yJ+/S0byeVgF0XVmvvFA3MoeVxl?=
 =?us-ascii?Q?oKck6jScdu9+vINsZ8pmyb3qxj1XE6WwzPgYBr4ORlpe2I7GKFGNlhiAoCCT?=
 =?us-ascii?Q?PynWMXLhzWNw0TwbdPKinEHcojQki/E3uARGDvwau2u3nFczg9J77scQdjG9?=
 =?us-ascii?Q?6t6q8p1GqdK27rTp5nljNQ9Zem+3dJoSfW8bhVmjL7O7By8Hnnf8gHUKrZI4?=
 =?us-ascii?Q?2U0TBZe2CRHCIm0eyK+UaTGzubE3bx1c+XP5cc1dLV8QGBPiCWihRVAI9O2Q?=
 =?us-ascii?Q?BER5uph2GxneAltHaMLb2FhObKQIXtKS2zm8hQYWn0qbe1cK038Mgs5XJzRh?=
 =?us-ascii?Q?oh/C5JLiq1k8S7Ww3vqYY7zC+f7S38z5SUhWIVYaEKqZCK7dcFawQv6EGfUT?=
 =?us-ascii?Q?UyxjFn9V4EOi7d3ySJS/0aejEzQjozq+IZ6ID6ba3cYVxpVgBqr3R8Xl8PUO?=
 =?us-ascii?Q?w+VgqGVOcwDcSEhdoelc5TPL2Sr4uHNCujKIRsL56SO3/kGrqRC+xemlSl1D?=
 =?us-ascii?Q?wBVdMNTwAytvgLI4RcUWK2ZZYTp4D1HdDfkI83eH6AT+3x5kEXaKJQTl72WK?=
 =?us-ascii?Q?NbNV+xZJ/2jd7two/bNP6CWmSICVr/qiUE0U/AbeXvBv9C2zMtDZfpeCzQYQ?=
 =?us-ascii?Q?9Z5B/cEBpgOlHpbmGYRE3VoX1as3nxNk?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 56b1ca67-7de0-4614-aeee-08da0662d431
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Mar 2022 09:04:36.4965
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: uKP4C/ZxBTD/2ZRgfLaRyu0h3TB2hZ/pE342xzQSXVX+JqMqkArxC9Z/fnYA3FpPcmLfcpeTq2JtoCBzNdHNmA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0401MB2233

On 10.03.2022 15:34, Marek Marczykowski-G=C3=B3recki wrote:
> This adds support for serial console as found in a laptop with TGL-LP
> (StarBook MkV). Since the device is on the bus 0, it needs to be enabled
> via "com1=3D...,amt", not just "...,pci".
>=20
> Device specification is in Intel docs 631119-007 and 631120-001.
>=20
> Signed-off-by: Marek Marczykowski-G=C3=B3recki <marmarek@invisiblethingsl=
ab.com>

Reviewed-by: Jan Beulich <jbeulich@suse.com>

> ---
> This adds only a single device (UART#2) to the table - the only one I
> have present, but the specification includes other device ids too. Should=
 I
> add them too? I don't have a way to test that, though.

Personally I would have added the other ones as well, likely even going
further and including those from the other 500 Series variant as well,
and maybe yet further including e.g. 600 Series IDs too. But if you
want to restrict this to what you can test, that's certainly fine.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 09:08:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 09:08:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290687.493072 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU3A9-00017t-Jg; Tue, 15 Mar 2022 09:08:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290687.493072; Tue, 15 Mar 2022 09:08:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU3A9-00017m-Gi; Tue, 15 Mar 2022 09:08:17 +0000
Received: by outflank-mailman (input) for mailman id 290687;
 Tue, 15 Mar 2022 09:08:16 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=9Ouo=T2=redhat.com=eblake@srs-se1.protection.inumbo.net>)
 id 1nU3A8-00017e-13
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 09:08:16 +0000
Received: from us-smtp-delivery-124.mimecast.com
 (us-smtp-delivery-124.mimecast.com [170.10.133.124])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 69d5bdde-a43f-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 10:08:11 +0100 (CET)
Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com
 [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS
 (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 us-mta-398-licyuROAPcScV15uQzTVhQ-1; Tue, 15 Mar 2022 05:07:58 -0400
Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.rdu2.redhat.com
 [10.11.54.2])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by mimecast-mx02.redhat.com (Postfix) with ESMTPS id C84D0803B22;
 Tue, 15 Mar 2022 09:07:56 +0000 (UTC)
Received: from redhat.com (unknown [10.22.17.185])
 by smtp.corp.redhat.com (Postfix) with ESMTPS id 9478240C128B;
 Tue, 15 Mar 2022 09:07:50 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 69d5bdde-a43f-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
	s=mimecast20190719; t=1647335280;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=x2QdncLjS9RyVOy6Iatqoky3XG297fiHr6QRUqmYbXw=;
	b=i6zaMYfVvOYLgg8pBXl5ABhkHzJVhuWK9bIAnkzG4OE7yATYB+Y+uz2cQSDFGoGon/egnO
	HNQ4WhA4CtvH3r0dluV4kgLmj9qjynW89++TmzZh8UiGa+19Yj99l3pgiFe6tly7ANKxKY
	Nogl5mmB1jO6QjBJG0koaLK1Qwd3YAw=
X-MC-Unique: licyuROAPcScV15uQzTVhQ-1
Date: Tue, 15 Mar 2022 04:07:48 -0500
From: Eric Blake <eblake@redhat.com>
To: Markus Armbruster <armbru@redhat.com>
Cc: qemu-devel@nongnu.org, Paolo Bonzini <pbonzini@redhat.com>,
	Richard Henderson <richard.henderson@linaro.org>,
	Gerd Hoffmann <kraxel@redhat.com>,
	Christian Schoenebeck <qemu_oss@crudebyte.com>,
	"Gonglei (Arei)" <arei.gonglei@huawei.com>,
	=?utf-8?Q?Marc-Andr=C3=A9?= Lureau <marcandre.lureau@redhat.com>,
	"Michael S. Tsirkin" <mst@redhat.com>,
	Igor Mammedov <imammedo@redhat.com>, Ani Sinha <ani@anisinha.ca>,
	Laurent Vivier <lvivier@redhat.com>, Amit Shah <amit@kernel.org>,
	Peter Maydell <peter.maydell@linaro.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Anthony Perard <anthony.perard@citrix.com>,
	Paul Durrant <paul@xen.org>,
	=?utf-8?B?SGVydsOp?= Poussineau <hpoussin@reactos.org>,
	Aleksandar Rikalo <aleksandar.rikalo@syrmia.com>,
	Corey Minyard <cminyard@mvista.com>,
	Patrick Venture <venture@google.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Peter Xu <peterx@redhat.com>, Jason Wang <jasowang@redhat.com>,
	=?utf-8?Q?C=C3=A9dric?= Le Goater <clg@kaod.org>,
	Daniel Henrique Barboza <danielhb413@gmail.com>,
	David Gibson <david@gibson.dropbear.id.au>,
	Greg Kurz <groug@kaod.org>,
	Philippe =?utf-8?Q?Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Jean-Christophe Dubois <jcd@tribudubois.net>,
	Keith Busch <kbusch@kernel.org>, Klaus Jensen <its@irrelevant.dk>,
	Yuval Shaia <yuval.shaia.ml@gmail.com>,
	Yoshinori Sato <ysato@users.sourceforge.jp>,
	Magnus Damm <magnus.damm@gmail.com>,
	Fabien Chouteau <chouteau@adacore.com>,
	KONRAD Frederic <frederic.konrad@adacore.com>,
	Mark Cave-Ayland <mark.cave-ayland@ilande.co.uk>,
	Artyom Tarasenko <atar4qemu@gmail.com>,
	Alex Williamson <alex.williamson@redhat.com>,
	Eric Auger <eric.auger@redhat.com>,
	Max Filippov <jcmvbkbc@gmail.com>,
	Juan Quintela <quintela@redhat.com>,
	"Dr. David Alan Gilbert" <dgilbert@redhat.com>,
	Konstantin Kostiuk <kkostiuk@redhat.com>,
	Michael Roth <michael.roth@amd.com>,
	Daniel =?utf-8?B?UC4gQmVycmFuZ8Op?= <berrange@redhat.com>,
	Pavel Dovgalyuk <pavel.dovgaluk@ispras.ru>,
	Alex =?utf-8?Q?Benn=C3=A9e?= <alex.bennee@linaro.org>,
	David Hildenbrand <david@redhat.com>,
	Wenchao Wang <wenchao.wang@intel.com>,
	Colin Xu <colin.xu@intel.com>, Kamil Rytarowski <kamil@netbsd.org>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Cornelia Huck <cohuck@redhat.com>, Thomas Huth <thuth@redhat.com>,
	Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>,
	John Snow <jsnow@redhat.com>, kvm@vger.kernel.org,
	qemu-arm@nongnu.org, xen-devel@lists.xenproject.org,
	qemu-ppc@nongnu.org, qemu-block@nongnu.org, haxm-team@intel.com,
	qemu-s390x@nongnu.org
Subject: Re: [PATCH 3/3] Use g_new() & friends where that makes obvious sense
Message-ID: <20220315090748.acju5mjbe4tax272@redhat.com>
References: <20220314160108.1440470-1-armbru@redhat.com>
 <20220314160108.1440470-4-armbru@redhat.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20220314160108.1440470-4-armbru@redhat.com>
User-Agent: NeoMutt/20211029-427-23b03a
X-Scanned-By: MIMEDefang 2.84 on 10.11.54.2

On Mon, Mar 14, 2022 at 05:01:08PM +0100, Markus Armbruster wrote:
> g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
> for two reasons.  One, it catches multiplication overflowing size_t.
> Two, it returns T * rather than void *, which lets the compiler catch
> more type errors.
> 
> This commit only touches allocations with size arguments of the form
> sizeof(T).
> 
> Patch created mechanically with:
> 
>     $ spatch --in-place --sp-file scripts/coccinelle/use-g_new-etc.cocci \
> 	     --macro-file scripts/cocci-macro-file.h FILES...
> 
> Signed-off-by: Markus Armbruster <armbru@redhat.com>
> ---

I agree that this is mechanical, but...

<snip>
>  qga/commands-win32.c                     |  8 ++---
>  qga/commands.c                           |  2 +-
>  qom/qom-qmp-cmds.c                       |  2 +-
>  replay/replay-char.c                     |  4 +--
>  replay/replay-events.c                   | 10 +++---
>  scripts/coverity-scan/model.c            |  2 +-

...are we sure we want to touch this particular file?

> diff --git a/scripts/coverity-scan/model.c b/scripts/coverity-scan/model.c
> index 9d4fba53d9..30bea672e1 100644
> --- a/scripts/coverity-scan/model.c
> +++ b/scripts/coverity-scan/model.c
> @@ -356,7 +356,7 @@ int g_poll (GPollFD *fds, unsigned nfds, int timeout)
>  typedef struct _GIOChannel GIOChannel;
>  GIOChannel *g_io_channel_unix_new(int fd)
>  {
> -    GIOChannel *c = g_malloc0(sizeof(GIOChannel));
> +    GIOChannel *c = g_new0(GIOChannel, 1);
>      __coverity_escape__(fd);
>      return c;
>  }

Our model has a definition of g_malloc0(), but I'm not sure whether
Coverity picks up the macro g_new0() in the same manner.

-- 
Eric Blake, Principal Software Engineer
Red Hat, Inc.           +1-919-301-3266
Virtualization:  qemu.org | libvirt.org



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 09:12:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 09:12:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290691.493083 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU3E8-0002Zr-9j; Tue, 15 Mar 2022 09:12:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290691.493083; Tue, 15 Mar 2022 09:12:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU3E8-0002Zk-5M; Tue, 15 Mar 2022 09:12:24 +0000
Received: by outflank-mailman (input) for mailman id 290691;
 Tue, 15 Mar 2022 09:12:22 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RDYY=T2=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nU3E6-0002Ze-L2
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 09:12:22 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id fdaebd66-a43f-11ec-853b-5f4723681683;
 Tue, 15 Mar 2022 10:12:20 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 6618421901;
 Tue, 15 Mar 2022 09:12:08 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 1037013B4E;
 Tue, 15 Mar 2022 09:12:08 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id wCqkAmhYMGKoeAAAMHmgww
 (envelope-from <jgross@suse.com>); Tue, 15 Mar 2022 09:12:08 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fdaebd66-a43f-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647335528; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=bcbkZVqaOrCkFX57kjDdpHCszAiSvLyzmm9ad99vOOs=;
	b=haUHfMnTLlQMLvhaSpZbj7ma3s/Oj+TAUd08AH9jC13ymqFOIa5cHQNCxg48TZ6l353njY
	cXxyccLiEjbJ8KomPEkwHouvN9U8TDi8c7cklyy9JoVYiGrdpfEWowoPrl3IET4oqOD14+
	YmN2t/0jBNkLn/zFIpQlqR7DDiAFyi0=
Message-ID: <d2b97836-4a63-e81d-1b84-c7779bb95b76@suse.com>
Date: Tue, 15 Mar 2022 10:12:07 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Content-Language: en-US
To: Luca Fancellu <Luca.Fancellu@arm.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Xen-devel <xen-devel@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>,
 Julien Grall <julien@xen.org>, Bertrand Marquis <Bertrand.Marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Wei Liu <wl@xen.org>, Dario Faggioli <dfaggioli@suse.com>
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-5-luca.fancellu@arm.com>
 <alpine.DEB.2.22.394.2203101957370.3497@ubuntu-linux-20-04-desktop>
 <A34CF75A-8139-4A4A-A1AE-3BA74E70DE55@arm.com>
 <alpine.DEB.2.22.394.2203111600330.3497@ubuntu-linux-20-04-desktop>
 <aee7dedf-3f70-da48-8be5-3d7cc9ec392c@suse.com>
 <927CBDC0-4141-4964-84E3-8AF1ED491527@arm.com>
From: Juergen Gross <jgross@suse.com>
Subject: Re: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
In-Reply-To: <927CBDC0-4141-4964-84E3-8AF1ED491527@arm.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------SASOe40gDflniFGIPMpnSPS0"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------SASOe40gDflniFGIPMpnSPS0
Content-Type: multipart/mixed; boundary="------------ZH53dJm4qcVDFEB6cZZT32OV";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Luca Fancellu <Luca.Fancellu@arm.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Xen-devel <xen-devel@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>,
 Julien Grall <julien@xen.org>, Bertrand Marquis <Bertrand.Marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Wei Liu <wl@xen.org>, Dario Faggioli <dfaggioli@suse.com>
Message-ID: <d2b97836-4a63-e81d-1b84-c7779bb95b76@suse.com>
Subject: Re: [PATCH v2 4/6] xen/cpupool: Create different cpupools at boot
 time
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-5-luca.fancellu@arm.com>
 <alpine.DEB.2.22.394.2203101957370.3497@ubuntu-linux-20-04-desktop>
 <A34CF75A-8139-4A4A-A1AE-3BA74E70DE55@arm.com>
 <alpine.DEB.2.22.394.2203111600330.3497@ubuntu-linux-20-04-desktop>
 <aee7dedf-3f70-da48-8be5-3d7cc9ec392c@suse.com>
 <927CBDC0-4141-4964-84E3-8AF1ED491527@arm.com>
In-Reply-To: <927CBDC0-4141-4964-84E3-8AF1ED491527@arm.com>

--------------ZH53dJm4qcVDFEB6cZZT32OV
Content-Type: multipart/mixed; boundary="------------N18Dp0koENvntFmM0ZlwYzc5"

--------------N18Dp0koENvntFmM0ZlwYzc5
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------N18Dp0koENvntFmM0ZlwYzc5
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----

xsBNBFOMcBYBCACgGjqjoGvbEouQZw/ToiBg9W98AlM2QHV+iNHsEs7kxWhKMjri
oyspZKOBycWxw3ie3j9uvg9EOB3aN4xiTv4qbnGiTr3oJhkB1gsb6ToJQZ8uxGq2
kaV2KL9650I1SJvedYm8Of8Zd621lSmoKOwlNClALZNew72NjJLEzTalU1OdT7/i
1TXkH09XSSI8mEQ/ouNcMvIJNwQpd369y9bfIhWUiVXEK7MlRgUG6MvIj6Y3Am/B
BLUVbDa4+gmzDC9ezlZkTZG2t14zWPvxXP3FAp2pkW0xqG7/377qptDmrk42GlSK
N4z76ELnLxussxc7I2hx18NUcbP8+uty4bMxABEBAAHNHEp1ZXJnZW4gR3Jvc3Mg
PGpnQHBmdXBmLm5ldD7CwHkEEwECACMFAlOMcBYCGwMHCwkIBwMCAQYVCAIJCgsE
FgIDAQIeAQIXgAAKCRCw3p3WKL8TL0KdB/93FcIZ3GCNwFU0u3EjNbNjmXBKDY4F
UGNQH2lvWAUy+dnyThpwdtF/jQ6j9RwE8VP0+NXcYpGJDWlNb9/JmYqLiX2Q3Tye
vpB0CA3dbBQp0OW0fgCetToGIQrg0MbD1C/sEOv8Mr4NAfbauXjZlvTj30H2jO0u
+6WGM6nHwbh2l5O8ZiHkH32iaSTfN7Eu5RnNVUJbvoPHZ8SlM4KWm8rG+lIkGurq
qu5gu8q8ZMKdsdGC4bBxdQKDKHEFExLJK/nRPFmAuGlId1E3fe10v5QL+qHI3EIP
tyfE7i9Hz6rVwi7lWKgh7pe0ZvatAudZ+JNIlBKptb64FaiIOAWDCx1SzR9KdWVy
Z2VuIEdyb3NzIDxqZ3Jvc3NAc3VzZS5jb20+wsB5BBMBAgAjBQJTjHCvAhsDBwsJ
CAcDAgEGFQgCCQoLBBYCAwECHgECF4AACgkQsN6d1ii/Ey/HmQf/RtI7kv5A2PS4
RF7HoZhPVPogNVbC4YA6lW7DrWf0teC0RR3MzXfy6pJ+7KLgkqMlrAbN/8Dvjoz7
8X+5vhH/rDLa9BuZQlhFmvcGtCF8eR0T1v0nC/nuAFVGy+67q2DH8As3KPu0344T
BDpAvr2uYM4tSqxK4DURx5INz4ZZ0WNFHcqsfvlGJALDeE0LhITTd9jLzdDad1pQ
SToCnLl6SBJZjDOX9QQcyUigZFtCXFst4dlsvddrxyqT1f17+2cFSdu7+ynLmXBK
7abQ3rwJY8SbRO2iRulogc5vr/RLMMlscDAiDkaFQWLoqHHOdfO9rURssHNN8WkM
nQfvUewRz80hSnVlcmdlbiBHcm9zcyA8amdyb3NzQG5vdmVsbC5jb20+wsB5BBMB
AgAjBQJTjHDXAhsDBwsJCAcDAgEGFQgCCQoLBBYCAwECHgECF4AACgkQsN6d1ii/
Ey8PUQf/ehmgCI9jB9hlgexLvgOtf7PJnFOXgMLdBQgBlVPO3/D9R8LtF9DBAFPN
hlrsfIG/SqICoRCqUcJ96Pn3P7UUinFG/I0ECGF4EvTE1jnDkfJZr6jrbjgyoZHi
w/4BNwSTL9rWASyLgqlA8u1mf+c2yUwcGhgkRAd1gOwungxcwzwqgljf0N51N5Jf
VRHRtyfwq/ge+YEkDGcTU6Y0sPOuj4Dyfm8fJzdfHNQsWq3PnczLVELStJNdapwP
OoE+lotufe3AM2vAEYJ9rTz3Cki4JFUsgLkHFqGZarrPGi1eyQcXeluldO3m91NK
/1xMI3/+8jbO0tsn1tqSEUGIJi7ox80eSnVlcmdlbiBHcm9zcyA8amdyb3NzQHN1
c2UuZGU+wsB5BBMBAgAjBQJTjHDrAhsDBwsJCAcDAgEGFQgCCQoLBBYCAwECHgEC
F4AACgkQsN6d1ii/Ey+LhQf9GL45eU5vOowA2u5N3g3OZUEBmDHVVbqMtzwlmNC4
k9Kx39r5s2vcFl4tXqW7g9/ViXYuiDXb0RfUpZiIUW89siKrkzmQ5dM7wRqzgJpJ
wK8Bn2MIxAKArekWpiCKvBOB/Cc+3EXE78XdlxLyOi/NrmSGRIov0karw2RzMNOu
5D+jLRZQd1Sv27AR+IP3I8U4aqnhLpwhK7MEy9oCILlgZ1QZe49kpcumcZKORmzB
TNh30FVKK1EvmV2xAKDoaEOgQB4iFQLhJCdP1I5aSgM5IVFdn7v5YgEYuJYx37Io
N1EblHI//x/e2AaIHpzK5h88NEawQsaNRpNSrcfbFmAg987ATQRTjHAWAQgAyzH6
AOODMBjgfWE9VeCgsrwH3exNAU32gLq2xvjpWnHIs98ndPUDpnoxWQugJ6MpMncr
0xSwFmHEgnSEjK/PAjppgmyc57BwKII3sV4on+gDVFJR6Y8ZRwgnBC5mVM6JjQ5x
Dk8WRXljExRfUX9pNhdE5eBOZJrDRoLUmmjDtKzWaDhIg/+1Hzz93X4fCQkNVbVF
LELU9bMaLPBG/x5q4iYZ2k2ex6d47YE1ZFdMm6YBYMOljGkZKwYde5ldM9mo45mm
we0icXKLkpEdIXKTZeKDO+Hdv1aqFuAcccTg9RXDQjmwhC3yEmrmcfl0+rPghO0I
v3OOImwTEe4co3c1mwARAQABwsBfBBgBAgAJBQJTjHAWAhsMAAoJELDendYovxMv
Q/gH/1ha96vm4P/L+bQpJwrZ/dneZcmEwTbe8YFsw2V/Buv6Z4Mysln3nQK5ZadD
534CF7TDVft7fC4tU4PONxF5D+/tvgkPfDAfF77zy2AH1vJzQ1fOU8lYFpZXTXIH
b+559UqvIB8AdgR3SAJGHHt4RKA0F7f5ipYBBrC6cyXJyyoprT10EMvU8VGiwXvT
yJz3fjoYsdFzpWPlJEBRMedCot60g5dmbdrZ5DWClAr0yau47zpWj3enf1tLWaqc
suylWsviuGjKGw7KHQd3bxALOknAp4dN3QwBYCKuZ7AddY9yjynVaD5X7nF9nO5B
jR/i1DG86lem3iBDXzXsZDn8R38=3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------N18Dp0koENvntFmM0ZlwYzc5--

--------------ZH53dJm4qcVDFEB6cZZT32OV--

--------------SASOe40gDflniFGIPMpnSPS0
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIwWGcFAwAAAAAACgkQsN6d1ii/Ey/A
Mgf/Tnrk8KR3JbY/WmiFQFPVRlEgr8+rHqfGH9RaV+EO60ODsWEAhiUYhMvAqd3q8fvvVMeV/Yyz
sslNKa3S7F7468suH1UE983k7UrFz5IQaxtupi8OOVuPOyJOXbPTpGALHYfTZidr0v12BI4XZdVx
39ofv3pEfJxOMgCf5QtxR6bxo+0a59F1yn+HsNvNetyr/GIWDZ055Ya5bw4RO22rSGeGI3GhAe6r
XSPjsAJn1gdKjGQ0tsySjs/QhnIt84ZPsu+eF1jKNg02LL+Glz/azEhNCZTjTC4cVi8jQwuhC6Qx
zNAfD6kCGqNL+tiNAb7IOUo/lubjUqK/lajQ5vLhMw==
=INxy
-----END PGP SIGNATURE-----

--------------SASOe40gDflniFGIPMpnSPS0--


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 09:13:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 09:13:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290693.493094 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU3Eq-00036Q-Hz; Tue, 15 Mar 2022 09:13:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290693.493094; Tue, 15 Mar 2022 09:13:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU3Eq-00036J-Eh; Tue, 15 Mar 2022 09:13:08 +0000
Received: by outflank-mailman (input) for mailman id 290693;
 Tue, 15 Mar 2022 09:13:06 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fAQZ=T2=citrix.com=prvs=0668da279=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nU3Eo-000364-HT
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 09:13:06 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 1d2ececd-a440-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 10:13:04 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1d2ececd-a440-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647335584;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=nytKIHuNmeKDGtWkw17nH15DWyH3LYfdFWJ48+7Qaqs=;
  b=Qe5QbQMYZdYdShWXhnRqPesRmf+tUT06GU906Msg9TzCPv0PHExVZUJ7
   GtsMr6auxencnzdo0y+roB+ivR9MEIiUR3CfUUcN1YNBtG26yOEQn92te
   ZL3NZ7oPK0UuQDkSd7wRFTX4PNM1Dqp5qPPolJ9eD7z/qY83CuoWrtHPC
   U=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66258733
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:GzQnOq9U+p6XKiAIwhuxDrUDl36TJUtcMsCJ2f8bNWPcYEJGY0x3y
 DMcCmuPb/mMM2unL9Byatu18U1T6sXcm4IyGgtuq308E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oHkW1rlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnaWKWDxwEY/Coc9DAjRdAhBZNKIY1rCSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFJkYtXx6iynQEN4tQIzZQrWM7thdtNs1rp4QR6uOO
 JFCAdZpRB3taj1CG2oMM4I7mNW5uWbteTJkhXvA8MLb5ECMlVcsgdABKuH9ZdiiVchT2EGCq
 Qru72n/Rx0XKtGb4T6E6W63wP/CmzvhX4AfH6H+8eRl6HWRzGEODBwdVXOgvOK0zEW5Xrpix
 1c8o3R06/JorQryE4e7D0bQTGO4UgA0YuBBKLQVyg+04fSFzgOIN08NQWBvZ4lz3CMpfgAC2
 liMltLvIDVgtryJVH6QnoupQSOO1Ts9djFbO3JdJecRy5y6+dxo0EqTJjp2OPTt5uAZDw0c1
 NxjQMIWo7wIxfAG2Kyglbwsq2L9/8OZJuLZC+i+Y45E0u+bTNP9D2BLwQKChRqlEGp/ZgLZ1
 JTjs5LChN3i9bnXyESwrBwlRdlFHcqtPjzGmkJIFJI87Tmr8HPLVdkOvG4kdR0waJZdI2WBj
 KrvVeV5v8Y70JyCN/MfXm5MI55ykfiI+SrNC5g4keaikrAuLVTarUmClGab3nz3kVhErE3ME
 czzTCpYNl5DUf4P5GPvH481iOZ3rghjlTK7bc2qlHyPjOvBDEN5vJ9YaTNimMhit/jayOgUm
 v4CX/a3J+J3C7SvPHOIrdZNcTjn7xETXPjLliCeTcbaSiJOE2A9Ef7Bh7Qnfo1uhaNOkenUu
 Hq6XydlJJDX3BUr9S3ihqhfVY7S
IronPort-HdrOrdr: A9a23:NR9pZq9y8J015TKy1Nhuk+E6db1zdoMgy1knxilNoENuHfBwxv
 rDoB1E73LJYVYqOU3Jmbi7Sc69qFfnhORICO4qTMqftWjdyRCVxeRZg7cKrAeQeREWmtQtsJ
 uINpIOdOEYbmIK/PoSgjPIaurIqePvmMvD5Za8854ud3ATV0gJ1XYGNu/xKDwReOApP+tcKH
 LKjfA32AZINE5nJviTNz0gZazuttfLnJXpbVovAAMm0hCHiXeN5KThGxaV8x8CW3cXqI1Su1
 Ttokjc3OGOovu7whjT2yv66IlXosLozp9mCNaXgsYYBz3wgkKDZZhnWZeFoDcpydvfo2oCoZ
 3pmVMNLs5z43TeciWcpgbs4RDp1HIU53rr2Taj8AzeiP28YAh/J9tKhIpffBecwVEnpstA3K
 VC2H/cn4ZLDDvb9R6NqOTgZlVPrA6ZsHAimekcgzh0So0FcoJcqoQZ4Qd8DIoAJiTn84oqed
 MeQP003MwmMG9yUkqp/lWGmLeXLzcO91a9MwU/U/WuonZrdCsT9Tpb+CQd9k1wgK7VBaM0ot
 gsCZ4Y542mfvVmHZ6VO91xM/dfKla9Ny4kY1jiaGgOKsk8SgfwQtjMkfEI2N0=
X-IronPort-AV: E=Sophos;i="5.90,182,1643691600"; 
   d="scan'208";a="66258733"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=l9G850S9vR1otsqpE1bh2Ofn3A8nQkBxH9uBjxaORwvjsETtxbwDtgmlHPqtmDsHwx6pkqrdQ+f5A0NbMspexuh7NGkvXbx2rOXTeSSedNF0000E3PqJGgLxLMVUrbMM/ZMjaI3jTxjgrJozqFqUtuqKZYAf3/jc+k68ae2DBrK3Fc8yznG9vcCd5yB+7r5fDI2Ypys0R/AKMizCAS0lYolkgFqteApYzuaN1WWH77gfsO1Y98SxYuRmsANEJrBSW+IVD6uR2WRJcUEBLKuwSljoM+RAq6iJ5v5Nw/eS+K6fx6SkDsxzadK9i3K89s0mCzCHJnrfYYcrqz3S2QLPVg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ulnSyNwM29gB7uPPz885DJ6bbRUuMWcBYf/B3mmJW80=;
 b=OVNMsOKzsMe0aIA7b3FJq9KoizS22a0yO5wrry5KUqB9LXUy92sOPcecu4x+/KdXh1wYaLu4x/HhgUIRxIhxToHqKN0CyrHOY3pUVStMX1rGiU1cJHqxUormFgxmsY58Xy5mlQbCdjednSlCTDlW2nBAIvZTFoqPxwvPIOv15xJRrPr+htKsME7WVYScCP07CJfR65wrMTMYY82nLCsuaS/hJbwaYmwt4+CHGhAEa8/PFOvW56vKOhPt6LJ6pRaiKKBxVwsB2rLh7KhPFkiwwa6jsgBHDyJ/fI/M4ERhlJEu/a2Hf6XvRPmwBi4a92g1m68rJ5wccgW+RD+uBOZM3A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=ulnSyNwM29gB7uPPz885DJ6bbRUuMWcBYf/B3mmJW80=;
 b=MdBoodKZBUvByxkGn4u60KHtwoZpV3P+cZYbGKszuQK62BtLgTK9GAB96x1OISPJQWBlZY9n3qY6/g+l70nwYler1LPQyLu0P8wuL3OKJtx/amDroy3ueXejkmsVtldt6HpRmJjZ2WakptVVKRfKhSXK64bGaHp6Wu+GXOJ3VaI=
Date: Tue, 15 Mar 2022 10:12:51 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Andrew
 Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH v3 2/4] x86/APIC: calibrate against platform timer when
 possible
Message-ID: <YjBYk+xJMh1I6nrM@Air-de-Roger>
References: <35cb3c72-05ba-24c7-1fdd-3ee1aced3aec@suse.com>
 <cb7dd6bc-79a4-2137-5e82-805b9daf5d58@suse.com>
 <YitSc/Ky6PJb5ndV@Air-de-Roger>
 <d6bcee5b-abbd-5cef-f174-8609df94603e@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <d6bcee5b-abbd-5cef-f174-8609df94603e@suse.com>
X-ClientProxiedBy: MR2P264CA0023.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:500:1::35) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 9272e8c8-ea6c-4ef3-9d70-08da0663fef5
X-MS-TrafficTypeDiagnostic: DM5PR03MB2811:EE_
X-Microsoft-Antispam-PRVS: <DM5PR03MB2811B19B78D0C671BDD6EC4D8F109@DM5PR03MB2811.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(8936002)(82960400001)(38100700002)(5660300002)(33716001)(6916009)(54906003)(83380400001)(86362001)(316002)(2906002)(26005)(186003)(508600001)(6666004)(85182001)(6506007)(66476007)(66556008)(66946007)(6512007)(6486002)(9686003)(4326008)(8676002)(53546011)(67856001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?RWpieUVOK0ZLTys5eUoyWW1ybFQwbXplY1BZeWRRYXIzOElJbklmZGdJY01o?=
 =?utf-8?B?UnVOMXJscElQVjQxekdVUHh3ZjRpOCs2L0dBMUNKZXBaQUlzTGgyZFlIdTF4?=
 =?utf-8?B?OWdUQ3VPOEdSNmVDc1NJbkZORWo0ZFkxSDR3UHg1OEo1WHNReDNWWmNMQUds?=
 =?utf-8?B?d1lEdkRweDdIeVk2UlZmK3lIdUdaZHFZcjBPRTRtZzR0L2l5ZXFwNDBvRXZq?=
 =?utf-8?B?MUpTY1dabnY5c3dIaEgxUHU3NkFXRWtUd2phQWtCdDl5allNY2NlK2l6T2o0?=
 =?utf-8?B?L0lZU3dHbWlLWWZyWWw2NnZnTDdnb3pVS3VpYktXUjRUeHJqbGpFbFg2ZVBv?=
 =?utf-8?B?eUwwcmI0NTZITlQ0ejF0dFpsLzlvdGdzem1rbHJPUDJZUkYzNVlURm5oeHpz?=
 =?utf-8?B?THYvR2x6b3RDUXo5cEZCNzBCMFBtZnZmblVNNTlHd1VCSFZSd0FGMG1JN3dV?=
 =?utf-8?B?T2p6VmFOVW5yTVQ5VGE3ZzlwdzJwd1hCRE9HakxGYytZZTNoY05QeEQ1MnFC?=
 =?utf-8?B?ZUhMM2ZTdFlrR2ErYnM2MkJTaUJRenFpR1E3VjVGdnFXbVB3eHo5NHZSS004?=
 =?utf-8?B?NGg0TWYxWDdla0NLS3FTeWFtRFdPMHZQS3RjUi85RFI3NlFycXhmRmJWR29s?=
 =?utf-8?B?UHBRRG8wT1BtbitqNDBsT2poQm5rV25kT3huNEhlVlZjblhOWU5waUxaOER3?=
 =?utf-8?B?MzdQM2V2MmZTY21YL0dJamZpOERJQk1YaTd4cm4xTXdlQ05HWWllUzcvczl3?=
 =?utf-8?B?NThvL25id09BaG13WGJrQk9pYTc0TXFaQm12WEw2NzVzVHIvY0E5V1pWWFI5?=
 =?utf-8?B?aTNBRHAvSmFkaWhvcUl0VzZUM0hGSzI0eWNPamxOOHpaWUZCMDh2dTNseGlB?=
 =?utf-8?B?L0MxMHBnWWNTV2psVFAxZ3NwYlQvSEMvVlkrcUdBR2xSL2hNUDRSeFRHeHF3?=
 =?utf-8?B?cFN3dldzNk1wSXYvYXZaSHkwTjdMOUJ5Q0tEVExGSUFjR0xadEtzZ1J4UjBV?=
 =?utf-8?B?UmlWNS9FUTNqY3RzZHVXU25MYjVERXlQdytlMU96M1NCR1FtUGJoRFE0bmZz?=
 =?utf-8?B?cURpY1gvL2pxREZ2SThLSi9sRTI5UldiYWpaazBPMGdxNkwvUFMzRitDMHFK?=
 =?utf-8?B?eHgrY3UxUklZcU16UWIxU0NuY2Q0ZXg4QTBFS0orK25PQlRMUWRLbVovNVNW?=
 =?utf-8?B?VngvL09VWDNQUThVeGFaaDU4dEZJcGZvZEF6aTBmTHI0TkFhM3RoM0tYNEF0?=
 =?utf-8?B?QkpKZ2Z3MXk1T1RJZi92T3FOanJmUDNZRGtLdjFvTHhrSndPRE4zcENRSWt2?=
 =?utf-8?B?aE1RMG8vM0VDalZRZXRmRWJTeHZteUdSUGdNMWx3R1dsNWsvRTM2OWNlS3ZV?=
 =?utf-8?B?cFVHSU1IallWUEo4MGNza1FJM1JLcnFIcFd1dGp0b1loclpIQ1lGdnQ5YStE?=
 =?utf-8?B?Q0VxbXhMR29UeDZtdUJHTUNOQ3EzUGkzNlhicXZCczJndDlMRHRzc3d5eUFQ?=
 =?utf-8?B?QTBjVXBUeFhPbCtrVTUvOXlNV1NDQ3haaTBDY1djbDdRcmlFQ3o3eVp3MytG?=
 =?utf-8?B?NW5uV1RYWWorellHeFRmbG41R3BXQU9ROHBtRVpyNmRuZlRtUEVlanJtOS9a?=
 =?utf-8?B?NGl3VGlwL3crb2VOcTlDdGpMSVgvcmRyVFFHaXB2aXl5S0xTRFMvazlNcDAy?=
 =?utf-8?B?ZFl5RU5ubUFJUFRES1NralhyNVlXVE1hTmFXc0ZwNzRHVk9WMTBMZUxsQndL?=
 =?utf-8?B?Mk85MGl2UkhkUHFZanZmS1QrQjd0a3Z0aUxYMURIbFRMMnhIVDlDbVJ1OEVH?=
 =?utf-8?B?eGdTYm1sdksrY3QzSzFVdVM4aUJMbWJ6VHRsTm53ZnFPWE9jcUZSbWVVKyt6?=
 =?utf-8?B?ZENQTjlYMCtXT2hib2M0RkNreElRNmdQQlRUVVlOZktPL25EZDNmOC9Pc1pa?=
 =?utf-8?Q?rxEv7w1JYGRy7AJafoE1zG8GcQVbzfHw?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 9272e8c8-ea6c-4ef3-9d70-08da0663fef5
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Mar 2022 09:12:57.6790
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Ehuxuu4S1PPNBwpTGztqHA5mNElAI4jBnhmDeXgQAIBvuNJse5ezZgqjHY1SbUK9Cvbp9auFLRG/+4K69wDsqg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR03MB2811
X-OriginatorOrg: citrix.com

On Mon, Mar 14, 2022 at 05:19:37PM +0100, Jan Beulich wrote:
> On 11.03.2022 14:45, Roger Pau Monné wrote:
> > On Mon, Feb 14, 2022 at 10:25:11AM +0100, Jan Beulich wrote:
> >> Use the original calibration against PIT only when the platform timer
> >> is PIT. This implicitly excludes the "xen_guest" case from using the PIT
> >> logic (init_pit() fails there, and as of 5e73b2594c54 ["x86/time: minor
> >> adjustments to init_pit()"] using_pit also isn't being set too early
> >> anymore), so the respective hack there can be dropped at the same time.
> >> This also reduces calibration time from 100ms to 50ms, albeit this step
> >> is being skipped as of 0731a56c7c72 ("x86/APIC: no need for timer
> >> calibration when using TDT") anyway.
> >>
> >> While re-indenting the PIT logic in calibrate_APIC_clock(), besides
> >> adjusting style also switch around the 2nd TSC/TMCCT read pair, to match
> >> the order of the 1st one, yielding more consistent deltas.
> >>
> >> Signed-off-by: Jan Beulich <jbeulich@suse.com>
> >> ---
> >> Open-coding apic_read() in read_tmcct() isn't overly nice, but I wanted
> >> to avoid x2apic_enabled being evaluated twice in close succession. (The
> >> barrier is there just in case only anyway: While this RDMSR isn't
> >> serializing, I'm unaware of any statement whether it can also be
> >> executed speculatively, like RDTSC can.) An option might be to move the
> >> function to apic.c such that it would also be used by
> >> calibrate_APIC_clock().
> > 
> > I think that would make sense. Or else it's kind of orthogonal that we
> > use a barrier in calibrate_apic_timer but not in calibrate_APIC_clock.
> 
> But there is a barrier there, via rdtsc_ordered(). Thinking about
> this again, I'm not not even sure I'd like to use the helper in
> calibrate_APIC_clock(), as there's no need to have two barriers
> there.
> 
> But I guess I'll move the function in any event, so it at least
> feels less like a layering violation. But I still would want to
> avoid calling apic_read(), i.e. the function would remain as is
> (albeit perhaps renamed as becoming non-static).
> 
> > But maybe we can get rid of the open-coded PIT calibration in
> > calibrate_APIC_clock? (see below)
> > 
> >> --- a/xen/arch/x86/time.c
> >> +++ b/xen/arch/x86/time.c
> >> @@ -26,6 +26,7 @@
> >>  #include <xen/symbols.h>
> >>  #include <xen/keyhandler.h>
> >>  #include <xen/guest_access.h>
> >> +#include <asm/apic.h>
> >>  #include <asm/io.h>
> >>  #include <asm/iocap.h>
> >>  #include <asm/msr.h>
> >> @@ -1004,6 +1005,78 @@ static u64 __init init_platform_timer(vo
> >>      return rc;
> >>  }
> >>  
> >> +static uint32_t __init read_tmcct(void)
> >> +{
> >> +    if ( x2apic_enabled )
> >> +    {
> >> +        alternative("lfence", "mfence", X86_FEATURE_MFENCE_RDTSC);
> >> +        return apic_rdmsr(APIC_TMCCT);
> >> +    }
> >> +
> >> +    return apic_mem_read(APIC_TMCCT);
> >> +}
> >> +
> >> +static uint64_t __init read_pt_and_tmcct(uint32_t *tmcct)
> >> +{
> >> +    uint32_t tmcct_prev = *tmcct = read_tmcct(), tmcct_min = ~0;
> >> +    uint64_t best = best;
> >> +    unsigned int i;
> >> +
> >> +    for ( i = 0; ; ++i )
> >> +    {
> >> +        uint64_t pt = plt_src.read_counter();
> >> +        uint32_t tmcct_cur = read_tmcct();
> >> +        uint32_t tmcct_delta = tmcct_prev - tmcct_cur;
> >> +
> >> +        if ( tmcct_delta < tmcct_min )
> >> +        {
> >> +            tmcct_min = tmcct_delta;
> >> +            *tmcct = tmcct_cur;
> >> +            best = pt;
> >> +        }
> >> +        else if ( i > 2 )
> >> +            break;
> >> +
> >> +        tmcct_prev = tmcct_cur;
> >> +    }
> >> +
> >> +    return best;
> >> +}
> >> +
> >> +uint64_t __init calibrate_apic_timer(void)
> >> +{
> >> +    uint32_t start, end;
> >> +    uint64_t count = read_pt_and_tmcct(&start), elapsed;
> >> +    uint64_t target = CALIBRATE_VALUE(plt_src.frequency), actual;
> >> +    uint64_t mask = (uint64_t)~0 >> (64 - plt_src.counter_bits);
> >> +
> >> +    /*
> >> +     * PIT cannot be used here as it requires the timer interrupt to maintain
> >> +     * its 32-bit software counter, yet here we run with IRQs disabled.
> >> +     */
> > 
> > The reasoning in calibrate_APIC_clock to have interrupts disabled
> > doesn't apply anymore I would think (interrupts are already enabled
> > when we get there),
> 
> setup_boot_APIC_clock() disables IRQs before calling
> calibrate_APIC_clock(). Whether the reasoning still applies is hard
> to tell - I at least cannot claim I fully understand the concern.

Me neither, I'm not sure what will explicitly need the first
interrupt, and why further interrupts won't be fine.

Also interrupts are already enabled before calling
calibrate_APIC_clock() (as it's setup_boot_APIC_clock() that disables
them), so this whole thing about getting the first interrupt seems
very bogus and plain wrong.

> > and hence it seems to me that calibrate_APIC_clock
> > could be called with interrupts enabled and we could remove the
> > open-coded usage of the PIT in calibrate_APIC_clock.
> 
> I won't exclude this might be possible, but it would mean changing
> a path which is hardly ever used nowadays. While on one hand this
> means hardly anyone might notice, otoh it also means possible
> breakage might not be noticed until far in the future. It anyway
> feels too much for a single change to also alter calibration against
> PIT right here.

You are already changing this path by using a clocksource different
than PIT to perform the calibration.

> One thing seems quite clear though: Doing any of this with interrupts
> enabled increases the chances for the read pairs to not properly
> correlate, due to an interrupt happening in the middle. This alone is
> a reason for me to want to keep IRQs off here.

Right, TSC calibration is also done with interrupts disabled, so it
does seem correct to do the same here for APIC.

Maybe it would be cleaner to hide the specific PIT logic in
calibrate_apic_timer() so that we could remove get_8254_timer_count()
and wait_8254_wraparound() from apic.c and apic.c doesn't have any PIT
specific code anymore?

I think using channel 2 like it's used for the TSC calibration won't
be possible at this point, since it will skew read_pit_count() users?
In any case if we disable interrupts those will already be skewed
because the timer won't be rearmed until interrupts are enabled.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 09:48:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 09:48:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290701.493104 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU3mF-0006fR-BL; Tue, 15 Mar 2022 09:47:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290701.493104; Tue, 15 Mar 2022 09:47:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU3mF-0006fK-8N; Tue, 15 Mar 2022 09:47:39 +0000
Received: by outflank-mailman (input) for mailman id 290701;
 Tue, 15 Mar 2022 09:47:38 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU3mE-0006fA-HK; Tue, 15 Mar 2022 09:47:38 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU3mE-000081-En; Tue, 15 Mar 2022 09:47:38 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU3mE-0005YT-53; Tue, 15 Mar 2022 09:47:38 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nU3mE-00029B-4d; Tue, 15 Mar 2022 09:47:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=41v4h3xAAe6WXEtY+tdnFiSKBgJ4kdTmUStJHRWGHRk=; b=b/M/WEro2MaBoh5iCz2Th74exQ
	vXbz0DV68CRW4pOJPyrqaCJ1qvFFbjxFmUcIU7wSO6jw+QZ0TKtzgWJ+YJdkSNIIVmiwWAGGH3lXq
	a/muGa07SUL31c8/glIi0fYRBVUhH5KhWT1ye9Su0rXhzK1EtaKNZn97Gsv/zeUFw+hk=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168601-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168601: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=352998df1c53b366413690d95b35f76d0721ebed
X-Osstest-Versions-That:
    qemuu=15df33ceb73cb6bb3c6736cf4d2cff51129ed4b4
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 15 Mar 2022 09:47:38 +0000

flight 168601 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168601/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168586
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168586
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168586
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168586
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168586
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168586
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168586
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168586
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 qemuu                352998df1c53b366413690d95b35f76d0721ebed
baseline version:
 qemuu                15df33ceb73cb6bb3c6736cf4d2cff51129ed4b4

Last test of basis   168586  2022-03-14 13:37:01 Z    0 days
Testing same since   168601  2022-03-15 01:37:08 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Patrick Venture <venture@google.com>
  Peter Maydell <peter.maydell@linaro.org>
  Philippe Mathieu-Daudé <f4bug@amsat.org>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   15df33ceb7..352998df1c  352998df1c53b366413690d95b35f76d0721ebed -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 10:03:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 10:03:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290710.493116 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU419-0000pm-TN; Tue, 15 Mar 2022 10:03:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290710.493116; Tue, 15 Mar 2022 10:03:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU419-0000pf-Pg; Tue, 15 Mar 2022 10:03:03 +0000
Received: by outflank-mailman (input) for mailman id 290710;
 Tue, 15 Mar 2022 10:03:03 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fAQZ=T2=citrix.com=prvs=0668da279=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nU418-0000pZ-Un
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 10:03:02 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 0808eaea-a447-11ec-853b-5f4723681683;
 Tue, 15 Mar 2022 11:02:57 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0808eaea-a447-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647338577;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=DeSJ2a0H4s1/C65Q4p3lPmSxVcMpFg4jGEQrdru9JxU=;
  b=F6IAYUiMZNTbPSRoH1vfwO3qiyufHLwiD47lf/p9ZEkKjG+qADpSSQxR
   fDOph4v8oqBpH/CvqV2smDWZ3pitZmAqdjEPutesxJddI8H+GTnV/ZG+4
   317US1BWLNcqi9CHzzbdCxm0JeWfZymnLp80NX0GRjnEdOuHW3XhGTyD8
   U=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65733602
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:oOnLbqlWGCMDbUrY+bB9stPo5gxfJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xIXDWqGafeLYGSje911bNnn8EJTscDVx4RhTAQ5/yE8ESMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiWl7V4
 7senuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYUTwzb53sydwhY0cJGA9iGJMa4OTDCC3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3oHZvwCufFf87aZvCX7/L9ZlT2zJYasVmQ6uBP
 JFHMWAHgBLoQjB2H3k3JZMCufb4on7cThwA+EK+nP9ii4TU5FMoi+W8WDbPQfSRXtlclEuco
 mPA/kz6DwscOdjZziCKmlqzgsffkCW9X5gdfJWo+/gvjFCNy2g7DBwNSUD9sfS/klS5Wd9UN
 woT4CVGha077kmiVNT+dxy+vn+fvxQYVsZQEus18wWEwOzf5APxLmoZSj9MbvQ2uclwQiYlv
 neLld70AT1ksJWOVGmQsLyTqFuP1TM9dDFYI3VeFE1cvoel8NpbYg/zoshLCJWv3+3VSAnM8
 27bpwYiootPlZUP/vDulbzYuA6Eqp/MRw8zwwzYWGO58w90DLKYi5yUBUvztqgZctvAJrWVl
 D1dwpXFsrhSZX2YvHbVKNjhCo1F8Bps3Nf0pVd0V6cs+D22k5JIVdABuWouTKuF3yttRNMIX
 KMxkV4JjHOwFCHzBUOSX25XI59ypUQHPY65Ps04lvIUPvBMmPavpUmCn3K40WH3i1QLmqoiI
 5qdesvEJS9EVfs9nWDvHbdEi+VDKsUCKYX7HsmTI/OPi+b2WZJoYe1dbAvmgh4RsctoXzk5A
 /4AbpDXmn2zocX1YzXN8J57ELz5BSNTOHwCkOQOLrTrClM/QAkJUqaNqZt8K90Nt/kEzY/go
 yDiMnK0PXKi3BUr3y3RMSs9AF4uNL4ixU8G0dsEZg/5hSJ8Pd7xsM/ytfIfJNEayQCq9tYtJ
 9EtcMScGPVfDDPB/jUWd57mq4J+Mh+sgGqz0+CNPVDTo7YIq9T1x+LZ
IronPort-HdrOrdr: A9a23:v2aFOqr3dvdVDr1nceHy020aV5vPL9V00zEX/kB9WHVpm5Oj+f
 xGzc516farslossREb+expOMG7MBXhHLpOkPQs1NCZLXXbUQqTXftfBO7ZogEIdBeOk9K1uZ
 0QF5SWTeeAcmSS7vyKkDVQcexQuOVvmZrA7Yy1ogYPPGNXguNbnnxE426gYzxLrWJ9dOME/f
 Snl616T23KQwVoUi33PAhPY8Hz4/nw0L72ax8PABAqrCGIkDOT8bb/VzyVxA0XXT9jyaortT
 GtqX212oyT99WAjjPM3W7a6Jpb3PPn19t4HcSJzuwYMC/lhAqEbJloH5eCoDc2iuey70tCqq
 iHnz4Qe+BIr1/BdGC8phXgnyHmzTYV8nfnjWSVhHPyyPaJMg4SOo5kv8Z0YxHZ400vsJVXy6
 RQxV+UsJJREFfpgDn9z8KgbWAlqmOE5V4Z1cIDhX1WVoUTLJVLq5YEwU9TGJAcWArn9YEcFv
 V0Bs203ocYTbqjVQGYgoBT+q3uYpxqdS32AHTq+/blnwS+pUoJjnfxn6ck7zI9HJFUcegy2w
 2LCNUtqFh0dL5lUUtMPpZzfSKJMB25ffvtChPaHb21LtBOB5ryw6SHlIndotvaP6A18A==
X-IronPort-AV: E=Sophos;i="5.90,183,1643691600"; 
   d="scan'208";a="65733602"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=VBEyGpmrwJBViSqAUEfdGtXADHQxialMu7yzoPIb7VZAd4y5FON5vcYj98ZOIAFYL5htpvhn03kNIgQjGyIw1NbkMdnqHVfSPKvSYEg06UhzIyH9jZt3PrGazTjxnHRjvU6IYI7XDr8t0dsppAfmfD7ZTg5n4PYyq2Z7BFsWjPaQQMqlwxsW+JjqgjOBZhMLW9Sr0ESU7dwVig5MTn20wBNQgWJHe/UBgqmu97UW+o41kwOXZvWycarkefgn1qjNpnqtiwKl/KleH7FmETTYp+OyTZiLX+RwFbGcmPpUAgTID8o7VYuoXQ+gzZ8610fij+QeRL3JXfxz9ZAA/8WzVA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=OYHjW+oh1C0V3IAAXUINnLbbiPqWendHECTKZN4od/A=;
 b=Vad6EM0bcsV/BN3PV37lxYAHA7Y9aMSooq9tLMPW5ano2Fp3zm5xY/OvWR3QeeZdN79EKHA5Jx+fZG5xz2Vqh43h/uHfGnB7N/LbMuwgGrBPHGGd7HzTkj8NG1oM/t1QfB2IFBBYffArrf5LJ8PUWOGooFJBfjAijSGBCRSFgbquG/tDAKDP0FgXjgu9Q2n/jJPcTOPOHurPUFDUYAi+KoCGkqzEShPRgKg1GCiOAb+1jJyXpcNUTHVYh9f3lm4OEIMb+cQPEJ4W8L6qH3MLvND2zU80O6wkHuDcB9gzj9gJDCBXgZwKFRnXtEq256uyHGBI+hM6pyK5YJy0hKyGmQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=OYHjW+oh1C0V3IAAXUINnLbbiPqWendHECTKZN4od/A=;
 b=w8o5U6FpULCSZAK85P3nhglKtLH/li3ld5VfgpSa/WADjeVPyhGvq43+c1iU58z5m6qpWhMS7QWBHcJ/M7Sy8lSyYF2TASTfWLiUmIhcXMEhogMGziElb72M448I3Nh+VhRdenwd0A/YW9Hg4aIzSnYgj26/1gcUOQjR8W3kC3g=
Date: Tue, 15 Mar 2022 11:02:22 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?=
	<marmarek@invisiblethingslab.com>
CC: Julien Grall <julien@xen.org>, Jan Beulich <jbeulich@suse.com>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Stefano Stabellini <sstabellini@kernel.org>, Wei
 Liu <wl@xen.org>, <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH 1/2] ns16550: reject IRQ above nr_irqs
Message-ID: <YjBkLgpfAlPwtwiA@Air-de-Roger>
References: <Yiojgxgd4amSjHog@Air-de-Roger>
 <3055b4a5-2d55-9cf1-1069-8c57208bf0af@xen.org> <YiopXU65pAlnNVNI@mail-itl>
 <d2c63630-6ab3-b4dd-128e-72f871fb9e08@xen.org> <Yisp0Q/cNGbgsO/7@mail-itl>
 <2a5c59ad-2fa5-b668-8bce-0d55e89a4afd@xen.org>
 <Yitk68wpP8HV4od9@Air-de-Roger>
 <5cedf43b-3903-9668-69a0-01b8ba339ba7@xen.org>
 <YituGsgaGaGSIMZ1@Air-de-Roger> <Yit5rnJnOu1VMIn1@mail-itl>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <Yit5rnJnOu1VMIn1@mail-itl>
X-ClientProxiedBy: LO4P123CA0475.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:1a8::12) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 80695629-a1fd-4481-c394-08da066ae8d3
X-MS-TrafficTypeDiagnostic: BN3PR03MB2244:EE_
X-Microsoft-Antispam-PRVS: <BN3PR03MB2244F25EE107EBB742234F418F109@BN3PR03MB2244.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(4326008)(8676002)(66476007)(66946007)(66556008)(33716001)(38100700002)(316002)(82960400001)(186003)(26005)(5660300002)(8936002)(2906002)(86362001)(4744005)(6506007)(6666004)(6512007)(9686003)(54906003)(6916009)(508600001)(6486002)(85182001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?ODdMTTVpN2oyemdTOUxoMS9QRmpsUWZ5YkpON2d0WUQ4MFE0RFIvMWtsNDg4?=
 =?utf-8?B?NU9WaVZ1Q2hKZElRWXIzdXZnU0JUS2V4citHUlRTMVNCUUdOemNLckUxT3Vq?=
 =?utf-8?B?YllveEpodUFoZ0o0VHNPdnlTRnZzMTNOSnVRd0xsdXZaR1hwZWpkSkYxRXNh?=
 =?utf-8?B?NGdxaHNhSXJ5emNpQlVpcWh6bVBUazNXWmlqNGtqdEJ2MmdrVVh3ckw4cnlw?=
 =?utf-8?B?UXM4ZjZ5V2psbSsrbGVxZ3dVOFI2c3pUbnhqcTV2K05BMFZ0VkdVOGtVYmVK?=
 =?utf-8?B?RmMzZTFqUXpndERzNVQ2MFB2Sk8yQ3I2MDFGWDFGbFpYZGJLN2cwQ25tTHRX?=
 =?utf-8?B?eFhrYlNRaWpydFg0NzhubXEvczVnM0VDQ1gvd1Fhc3B4N3VCbzZnemY1THp3?=
 =?utf-8?B?eHJTSDM2ak1KUlZ6UHBlWVFuRnBIRnBSU09RZG1KTHRjWWJGUmFlaVg5b1hz?=
 =?utf-8?B?WFdudy9jZnV2NFFmbWJ2ZXlLK25iTFJhUm9BaFptWDh0ejQ4em1vdDE0bWxP?=
 =?utf-8?B?VXRkUEJlTTE3azRocEFzRXpjKzRYckFBcDhXUHRSemFHUnpNajNhRHZqbUJT?=
 =?utf-8?B?MFVpcjgzOUVGOXBzcUwyNnkySi9jL1JHNWJpYXpvMDRNcDFSL2tLaS9KanZa?=
 =?utf-8?B?MWJRbjIrS3pYSnl0ejBMN1R5ODJRN3BoR29GRjVqQkFIcEFrdlM5b0dQd2tp?=
 =?utf-8?B?aytzTGJpcGliQ1dHQjArWGUxQlc5T2FSRnEvcUdMV3RQVnN2NDVSdTVzYlp6?=
 =?utf-8?B?a1pyNyt3MElGN3RsYkt6MUV1U29BOFdyb2pvUFQrc0VRb0lTK0JSSGZad3Uw?=
 =?utf-8?B?OThzMUkxWFpVZlpDSzk5Wll2eFhEdWhwTHh6TDNPcWxNSnJTZXJubkY2bWp2?=
 =?utf-8?B?T3dYZmFGN3NJUkdyZUdvSGJtOHduMHQwc1J0RFhvM2hBL1B4N1JPUkppTlVm?=
 =?utf-8?B?WFdLd1diTlNiejlWRFA5cEJTeFM5M0xUcjVlOXdNckZ3YzlEamFGdWhuUGtQ?=
 =?utf-8?B?Tk13STVhZlYwN3pFTGtTYXRQMlIxUjFqQ0lyOTI1d1hHdVkyUU9xMm84cGNE?=
 =?utf-8?B?dk5vUFZMWHZKZE1RL3lNYStyOVFyMU1sb2s1OCt4VFE4bFRMTExVUGUrT0Vz?=
 =?utf-8?B?NGVVUVNISUNDNE9MNVpKNkh2b3VFbVpyYWdiWW9hV2dDU1pCU0tDTTZQOU96?=
 =?utf-8?B?a3hIQXc5Q1ZWRzZTcWdMS1lyZ0tGVUdJYnVoS1VnVlo0L0ZWY3NMelQzc1U5?=
 =?utf-8?B?YjdKdzZkWE4yZGdjZnhhSzhydS9yRFJNRTVLb3c2TkRkdUp6VStzMmtYMlp6?=
 =?utf-8?B?Z0RWZm5aYXNteFhOZWZ6bHdhdWNPNUhCeXVLaVg2d200T3BtQkt5bFo0UEZY?=
 =?utf-8?B?YldiaWJYbkh0S1FucG01ZlpJdk53WE5yb3NNZHF4M3IvNGg2ckdOZE82ZkdP?=
 =?utf-8?B?WnFqd0gzRkhwdC9idFd3c1JaajdJTHZLK0Y2Y2tlbGVaa21yRHlBT1c5T0JQ?=
 =?utf-8?B?R0ZsanpDSWxjbXFPV3RFL21JNVkxNERmeVcwME8zc1BIQUxmajJyVjVMSEI3?=
 =?utf-8?B?RFpLUzZYbFBlbk9PM0lxMVlxTFhKWWM3UUQ4WXlEdTltZnZYd1EwN3Y2OW9T?=
 =?utf-8?B?ZitiZjZDNnVFV2swd05jdERQZEtIMEtuYWNPaUFJeWlYUWhjaUdpRWhZdW1M?=
 =?utf-8?B?OXJCQmRteFRaditXczJ3VWlPUllWd2VHMHhWN0FRbjJWM2dIbFVTWUdoSDBP?=
 =?utf-8?B?ZFN5RTFMNS8yK084QldYTDFQekNrV2dNS2xxaHM4VVJBL25WbVJiRjBGc1FG?=
 =?utf-8?B?S25jeG5lVEVFUEZBNXZ3bGNTOHNuY013WEdoeWNCOUsyVExWbEJ3bHpHWjJj?=
 =?utf-8?B?alJ4ajJEbmE1L2YwcHRmUG8xbkxRSzZkTXFNTkZNMFpMTzdERVl3VVFEMExI?=
 =?utf-8?B?clFhWWcyZUFSeXRvekVCM1lqNWJjSTIzOGwyRHZZQlRhcUlVT1VvNjdPVkdl?=
 =?utf-8?B?OHFYakVOZVNBPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 80695629-a1fd-4481-c394-08da066ae8d3
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Mar 2022 10:02:27.1182
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: qblN0KyOHvc6gCAcZW1b2zu5yarimfTu38JkfJVXPkbC8VQ2xHxSIJxRQnz9qT5Tf56eG2HfUWFAU6zzh6GjIA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN3PR03MB2244
X-OriginatorOrg: citrix.com

On Fri, Mar 11, 2022 at 05:32:45PM +0100, Marek Marczykowski-Górecki wrote:
> On Fri, Mar 11, 2022 at 04:43:22PM +0100, Roger Pau Monné wrote:
> > Sorry, maybe this wasn't clear. My suggestion was not to just do this
> > fix and call it done, but rather to add this check for sanity and then
> > figure out how to properly handle this specific device.
> 
> Yes, I agree. Having it properly configured is preferred. Linux manages
> to do that, but I'm not sure how exactly. But ...

I think it might get the interrupt from ACPI data, which is likely out
of scope for Xen. Can you take a look at ACPI data from the box and
see whether the interrupt is reported there? (search for a _CRS method
belonging to the LPSS device)

Sadly the LPSS spec doesn't contain any help regarding the usage of
0xff in the Interrupt Line register. Out of curiosity, can you print
what's in the Interrupt Pin register? (PCI_INTERRUPT_PIN)

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 10:11:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 10:11:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290714.493126 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU48t-0002Ky-MF; Tue, 15 Mar 2022 10:11:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290714.493126; Tue, 15 Mar 2022 10:11:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU48t-0002Kr-J7; Tue, 15 Mar 2022 10:11:03 +0000
Received: by outflank-mailman (input) for mailman id 290714;
 Tue, 15 Mar 2022 10:11:02 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=CG/1=T2=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nU48r-0002Kl-NA
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 10:11:02 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on20631.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::631])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 366b1f1f-a448-11ec-853b-5f4723681683;
 Tue, 15 Mar 2022 11:11:00 +0100 (CET)
Received: from DB6P193CA0013.EURP193.PROD.OUTLOOK.COM (2603:10a6:6:29::23) by
 AM0PR08MB3635.eurprd08.prod.outlook.com (2603:10a6:208:d3::28) with
 Microsoft
 SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.25; Tue, 15 Mar 2022 10:10:50 +0000
Received: from DB5EUR03FT054.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:6:29:cafe::72) by DB6P193CA0013.outlook.office365.com
 (2603:10a6:6:29::23) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22 via Frontend
 Transport; Tue, 15 Mar 2022 10:10:50 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT054.mail.protection.outlook.com (10.152.20.248) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Tue, 15 Mar 2022 10:10:49 +0000
Received: ("Tessian outbound 2877e54fe176:v113");
 Tue, 15 Mar 2022 10:10:49 +0000
Received: from 010d0aba4a80.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 609CAC82-C630-4B36-AE6D-812487B015CA.1; 
 Tue, 15 Mar 2022 10:10:43 +0000
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 010d0aba4a80.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 15 Mar 2022 10:10:43 +0000
Received: from VI1PR08MB3967.eurprd08.prod.outlook.com (2603:10a6:803:df::16)
 by DB9PR08MB7038.eurprd08.prod.outlook.com (2603:10a6:10:2ce::19)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Tue, 15 Mar
 2022 10:10:41 +0000
Received: from VI1PR08MB3967.eurprd08.prod.outlook.com
 ([fe80::479:b7f8:ba2a:4a74]) by VI1PR08MB3967.eurprd08.prod.outlook.com
 ([fe80::479:b7f8:ba2a:4a74%5]) with mapi id 15.20.5061.029; Tue, 15 Mar 2022
 10:10:41 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 366b1f1f-a448-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=0Xd9tJPmVHqwTMr8HrUReVlY39b81yZ3QyHJIENAIsg=;
 b=9q9hMxrxdNvtkYhXgBGS2bglKivEvEWpNW0IQrtIE9v5xcVvNf8hsHJYkWsc9CVuwToGsYnFCpUbliWwSxLoAvg74/4wvmIulZ8k5n7gYj2OdDpT5DAuXquwA4tp00uO/+vmFI430T5600llbJKSWlG4H9XN86Jfh1tdjWXW2Ls=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 3bc1c6264e32a537
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=MTd2Aa8YBLyFGeTeY5uSjv+21EuROhfF120Zlz6i94yVT7Y2s1gPgvllKAH2zViFPhrMek7mUucpDQmryaskLs2OdRig+uIdRdSm3vJzuDL2OE//EYdSRDPeyFrORZ4BADVSd+ERPPRUjPuv+0Wn56Q8XJhisXnFVL9eCQnfznXU/qjG7CnUDEl131de+Brj7qqOqgvuzhFM3QSg6qM36XHWvexZPvFZO6z4gBc1No5NnAd7dPkej9qefi7lqzjnh5oSWKu21Fs8GJL+eaoHoYHufenRe+G1fPrJRgGCQpJRu6c5jKiYQ7eRINOMqtGLaq69ErhQpE2WlfLVwqhayQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=0Xd9tJPmVHqwTMr8HrUReVlY39b81yZ3QyHJIENAIsg=;
 b=nM9wWA8CVfvYTfsOndxCAGoaHPIt/qH8kF7hhu0upS83fs0hglGjLsCZR4oK3nPt5MJtNqPby8J1wiKup1G/nSLDTqDZHAOoQmWUA8a1WO2AsQRxOAdog5MPXlnk0Oi1d3rzrEQILAPIBDdW878NMOmJUF0QspGOsZwIvSAOSAuMS7jBVY9CdxbvsYX+bSlRx7ZEgVZDbMRaFVTSCmNWnSflXptNhIIZM3IQG8kwhhtjSgrXi1EjN3Q6rEArFP7f8MXoNAjLgBubiJxYP/43xI5Q4QVmCKvGAqP4BIQWrz7SxLQGcmoJ3dFhFjlryt9qS3d+lPruT0NmDcY/T2SNWA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=0Xd9tJPmVHqwTMr8HrUReVlY39b81yZ3QyHJIENAIsg=;
 b=9q9hMxrxdNvtkYhXgBGS2bglKivEvEWpNW0IQrtIE9v5xcVvNf8hsHJYkWsc9CVuwToGsYnFCpUbliWwSxLoAvg74/4wvmIulZ8k5n7gYj2OdDpT5DAuXquwA4tp00uO/+vmFI430T5600llbJKSWlG4H9XN86Jfh1tdjWXW2Ls=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Vikram Garhwal <fnu.vikram@xilinx.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Stefano Stabellini
	<sstabellini@kernel.org>, "julien@xen.org" <julien@xen.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, "volodymyr_babchuk@epam.com"
	<volodymyr_babchuk@epam.com>, Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>
Subject: Re: [XEN][RFC PATCH v3 10/14] xen/arm: Implement device tree node
 removal functionalities
Thread-Topic: [XEN][RFC PATCH v3 10/14] xen/arm: Implement device tree node
 removal functionalities
Thread-Index: AQHYMyWCd0PyEjstNUKgDSNIsR/0BKzAQ40A
Date: Tue, 15 Mar 2022 10:10:40 +0000
Message-ID: <D75E31B5-3A23-4CD1-B81F-A792A4B88586@arm.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
 <20220308194704.14061-11-fnu.vikram@xilinx.com>
In-Reply-To: <20220308194704.14061-11-fnu.vikram@xilinx.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 5e843277-adf1-4a66-d3be-08da066c1491
x-ms-traffictypediagnostic:
	DB9PR08MB7038:EE_|DB5EUR03FT054:EE_|AM0PR08MB3635:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR08MB36352F779713CC26F2B5E270E4109@AM0PR08MB3635.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR08MB3967.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(83380400001)(54906003)(316002)(36756003)(71200400001)(6512007)(6916009)(2906002)(6506007)(186003)(26005)(2616005)(8676002)(38100700002)(64756008)(66476007)(66556008)(91956017)(76116006)(66946007)(66446008)(86362001)(8936002)(38070700005)(33656002)(4326008)(5660300002)(508600001)(122000001)(6486002)(403724002)(2004002)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <88BC69CD595E4841998F0FD9B05BD690@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR08MB7038
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT054.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	ef56161a-ebc5-4969-a7b5-08da066c0f73
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(6486002)(36860700001)(336012)(5660300002)(54906003)(316002)(26005)(8676002)(70206006)(70586007)(4326008)(86362001)(6862004)(186003)(2616005)(8936002)(47076005)(6506007)(81166007)(356005)(33656002)(36756003)(2906002)(40460700003)(83380400001)(6512007)(82310400004)(508600001)(403724002)(2004002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Mar 2022 10:10:49.7587
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 5e843277-adf1-4a66-d3be-08da066c1491
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT054.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB3635

>=20
> diff --git a/xen/common/Makefile b/xen/common/Makefile
> index dc8d3a13f5..2eb5734f8e 100644
> --- a/xen/common/Makefile
> +++ b/xen/common/Makefile
> @@ -54,6 +54,7 @@ obj-y +=3D wait.o
> obj-bin-y +=3D warning.init.o
> obj-$(CONFIG_XENOPROF) +=3D xenoprof.o
> obj-y +=3D xmalloc_tlsf.o
> +obj-$(CONFIG_OVERLAY_DTB) +=3D dt_overlay.o

I think the entries are in alphabetical order, this should be added after +=
=3D domain.o

> +/*
> + * overlay_get_nodes_info will get the all node's full name with path. T=
his is
> + * useful when checking node for duplication i.e. dtbo tries to add node=
s which
> + * already exists in device tree.
> + */
> +static int overlay_get_nodes_info(const void *fdto, char ***nodes_full_p=
ath,
> +                                  unsigned int num_overlay_nodes)
> +{
> +    int fragment;
> +    unsigned int node_num =3D 0;
> +
> +    *nodes_full_path =3D xmalloc_bytes(num_overlay_nodes * sizeof(char *=
));

Here you can use xzalloc_bytes and...

> +
> +    if ( *nodes_full_path =3D=3D NULL )
> +        return -ENOMEM;
> +    memset(*nodes_full_path, 0x0, num_overlay_nodes * sizeof(char *));

Get rid of this memset

> +
> +/* Remove nodes from dt_host. */
> +static int remove_nodes(char **full_dt_node_path, int **nodes_irq,
> +                        int *node_num_irq, unsigned int num_nodes)
> +{
> +    struct domain *d =3D hardware_domain;
> +    int rc =3D 0;
> +    struct dt_device_node *overlay_node;
> +    unsigned int naddr;
> +    unsigned int i, j, nirq;
> +    u64 addr, size;
> +    domid_t domid =3D 0;
> +
> +    for ( j =3D 0; j < num_nodes; j++ )
> +    {
> +        dt_dprintk("Finding node %s in the dt_host\n", full_dt_node_path=
[j]);
> +
> +        overlay_node =3D dt_find_node_by_path(full_dt_node_path[j]);
> +
> +        if ( overlay_node =3D=3D NULL )
> +        {
> +            printk(XENLOG_ERR "Device %s is not present in the tree. Rem=
oving nodes failed\n",
> +                   full_dt_node_path[j]);
> +            return -EINVAL;
> +        }
> +
> +        domid =3D dt_device_used_by(overlay_node);
> +
> +        dt_dprintk("Checking if node %s is used by any domain\n",
> +                   full_dt_node_path[j]);
> +
> +        /* Remove the node iff it's assigned to domain 0 or domain io. *=
/
> +        if ( domid !=3D 0 && domid !=3D DOMID_IO )
> +        {
> +            printk(XENLOG_ERR "Device %s as it is being used by domain %=
d. Removing nodes failed\n",
> +                   full_dt_node_path[j], domid);
> +            return -EINVAL;
> +        }
> +
> +        dt_dprintk("Removing node: %s\n", full_dt_node_path[j]);
> +
> +        nirq =3D node_num_irq[j];
> +
> +        /* Remove IRQ permission */
> +        for ( i =3D 0; i < nirq; i++ )
> +        {
> +            rc =3D nodes_irq[j][i];
> +            /*
> +             * TODO: We don't handle shared IRQs for now. So, it is assu=
med that
> +             * the IRQs was not shared with another domain.
> +             */
> +            rc =3D irq_deny_access(d, rc);
> +            if ( rc )
> +            {
> +                printk(XENLOG_ERR "unable to revoke access for irq %u fo=
r %s\n",
> +                       i, dt_node_full_name(overlay_node));
> +                return rc;
> +            }
> +        }
> +
> +        rc =3D iommu_remove_dt_device(overlay_node);
> +        if ( rc !=3D 0 && rc !=3D -ENXIO )
> +            return rc;
> +
> +        naddr =3D dt_number_of_address(overlay_node);
> +
> +        /* Remove mmio access. */
> +        for ( i =3D 0; i < naddr; i++ )
> +        {
> +            rc =3D dt_device_get_address(overlay_node, i, &addr, &size);
> +            if ( rc )
> +            {
> +                printk(XENLOG_ERR "Unable to retrieve address %u for %s\=
n",
> +                       i, dt_node_full_name(overlay_node));
> +                return rc;
> +            }
> +
> +            rc =3D iomem_deny_access(d, paddr_to_pfn(addr),
> +                                   paddr_to_pfn(PAGE_ALIGN(addr + size -=
 1)));
> +            if ( rc )
> +            {
> +                printk(XENLOG_ERR "Unable to remove dom%d access to"
> +                        " 0x%"PRIx64" - 0x%"PRIx64"\n",
> +                        d->domain_id,
> +                        addr & PAGE_MASK, PAGE_ALIGN(addr + size) - 1);

NIT: here in each line under XENLOG_ERR, there is an extra space, these lin=
es
Could be aligned to XENLOG_ERR, just for code style purpose.

> +                return rc;
> +            }
> +        }
> +
> +        rc =3D dt_overlay_remove_node(overlay_node);
> +        if ( rc )
> +            return rc;
> +    }
> +
> +    return rc;
> +}
> +
>=20
> +long dt_sysctl(struct xen_sysctl *op)
> +{
> +    long ret =3D 0;
> +    void *overlay_fdt;
> +    char **nodes_full_path =3D NULL;
> +    unsigned int num_overlay_nodes =3D 0;
> +
> +    if ( op->u.dt_overlay.overlay_fdt_size <=3D 0 )
> +        return -EINVAL;
> +
> +    overlay_fdt =3D xmalloc_bytes(op->u.dt_overlay.overlay_fdt_size);
> +
> +    if ( overlay_fdt =3D=3D NULL )
> +        return -ENOMEM;
> +
> +    ret =3D copy_from_guest(overlay_fdt, op->u.dt_overlay.overlay_fdt,
> +                         op->u.dt_overlay.overlay_fdt_size);
> +    if ( ret )
> +    {
> +        gprintk(XENLOG_ERR, "copy from guest failed\n");
> +        xfree(overlay_fdt);
> +
> +        return -EFAULT;
> +    }
> +
> +    switch ( op->u.dt_overlay.overlay_op )
> +    {
> +    case XEN_SYSCTL_DT_OVERLAY_REMOVE:
> +        ret =3D check_overlay_fdt(overlay_fdt,
> +                                op->u.dt_overlay.overlay_fdt_size);
> +        if ( ret )
> +        {
> +            ret =3D -EFAULT;
> +            break;
> +        }
> +
> +        num_overlay_nodes =3D overlay_node_count(overlay_fdt);
> +        if ( num_overlay_nodes =3D=3D 0 )
> +        {
> +            ret =3D -ENOMEM;
> +            break;
> +        }
> +
> +        ret =3D overlay_get_nodes_info(overlay_fdt, &nodes_full_path,
> +                                     num_overlay_nodes);
> +        if ( ret )
> +             break;
> +
> +        ret =3D handle_remove_overlay_nodes(nodes_full_path,
> +                                          num_overlay_nodes);
> +        break;
> +
> +    default:
> +        break;
> +    }
> +
> +    if ( nodes_full_path !=3D NULL )
> +    {
> +        int I;

unsigned int

> +        for ( i =3D 0; i < num_overlay_nodes && nodes_full_path[i] !=3D =
NULL; i++ )
> +        {
> +            xfree(nodes_full_path[i]);
> +        }
> +        xfree(nodes_full_path);
> +    }
> +
> +    return ret;
> +}
> diff --git a/xen/common/sysctl.c b/xen/common/sysctl.c
> index fc4a0b31d6..d685c07159 100644
> --- a/xen/common/sysctl.c
> +++ b/xen/common/sysctl.c
> @@ -29,6 +29,10 @@
> #include <xen/livepatch.h>
> #include <xen/coverage.h>
>=20
> +#ifdef CONFIG_OVERLAY_DTB
> +#include <xen/dt_overlay.h>
> +#endif

Maybe this header can be included anyway, removing ifdefs, and...

> +
> long cf_check do_sysctl(XEN_GUEST_HANDLE_PARAM(xen_sysctl_t) u_sysctl)
> {
>     long ret =3D 0;
> @@ -482,6 +486,12 @@ long cf_check do_sysctl(XEN_GUEST_HANDLE_PARAM(xen_s=
ysctl_t) u_sysctl)
>             copyback =3D 1;
>         break;
>=20
> +#ifdef CONFIG_OVERLAY_DTB
> +    case XEN_SYSCTL_overlay:
> +        ret =3D dt_sysctl(op);
> +        break;
> +#endif

Also here you can remove ifdefs and use the header to switch between the re=
al implementation
or a static inline returning error if CONFIG_OVERLAY_DTB is not enabled, ta=
ke a look in
livepatch_op(struct xen_sysctl_livepatch_op *op).

dt_sysctl can take struct xen_sysctl_dt_overlay* as input.

> +
>     default:
>         ret =3D arch_do_sysctl(op, u_sysctl);
>         copyback =3D 0;
> diff --git a/xen/include/public/sysctl.h b/xen/include/public/sysctl.h
> index 55252e97f2..e256aeb7c6 100644
> --- a/xen/include/public/sysctl.h
> +++ b/xen/include/public/sysctl.h
> @@ -1069,6 +1069,22 @@ typedef struct xen_sysctl_cpu_policy xen_sysctl_cp=
u_policy_t;
> DEFINE_XEN_GUEST_HANDLE(xen_sysctl_cpu_policy_t);
> #endif
>=20
> +#define XEN_SYSCTL_DT_OVERLAY_REMOVE                2
> +
> +/*
> + * XEN_SYSCTL_dt_overlay
> + * Performs addition/removal of device tree nodes under parent node usin=
g dtbo.
> + * This does in three steps:
> + *  - Adds/Removes the nodes from dt_host.
> + *  - Adds/Removes IRQ permission for the nodes.
> + *  - Adds/Removes MMIO accesses.
> + */
> +struct xen_sysctl_dt_overlay {
> +    XEN_GUEST_HANDLE_64(void) overlay_fdt;
> +    uint32_t overlay_fdt_size;  /* Overlay dtb size. */
> +    uint8_t overlay_op; /* Add or remove. */
> +};
> +
> struct xen_sysctl {
>     uint32_t cmd;
> #define XEN_SYSCTL_readconsole                    1
> @@ -1099,6 +1115,7 @@ struct xen_sysctl {
> #define XEN_SYSCTL_livepatch_op                  27
> /* #define XEN_SYSCTL_set_parameter              28 */
> #define XEN_SYSCTL_get_cpu_policy                29
> +#define XEN_SYSCTL_dt_overlay                    30
>     uint32_t interface_version; /* XEN_SYSCTL_INTERFACE_VERSION */
>     union {
>         struct xen_sysctl_readconsole       readconsole;
> @@ -1129,6 +1146,7 @@ struct xen_sysctl {
> #if defined(__i386__) || defined(__x86_64__)
>         struct xen_sysctl_cpu_policy        cpu_policy;
> #endif
> +        struct xen_sysctl_dt_overlay        dt_overlay;

Here I would need an opinion from someone more experienced, but I think whe=
n a change
is made in this structure, XEN_SYSCTL_INTERFACE_VERSION should be bumped?

>         uint8_t                             pad[128];
>     } u;
> };
> diff --git a/xen/include/xen/dt_overlay.h b/xen/include/xen/dt_overlay.h
> new file mode 100644
> index 0000000000..525818b77c
> --- /dev/null
> +++ b/xen/include/xen/dt_overlay.h
> @@ -0,0 +1,47 @@
> +/*
> + * xen/common/dt_overlay.c

Typo: dt_overlay.h

> + *
> + * Device tree overlay suppoert in Xen.

Typo: support

> + *
> + * Copyright (c) 2021 Xilinx Inc.
> + * Written by Vikram Garhwal <fnu.vikram@xilinx.com>
> + *
> + * This program is free software; you can redistribute it and/or
> + * modify it under the terms and conditions of the GNU General Public
> + * License, version 2, as published by the Free Software Foundation.
> + *
> + * This program is distributed in the hope that it will be useful,
> + * but WITHOUT ANY WARRANTY; without even the implied warranty of
> + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
> + * GNU General Public License for more details.
> + */
> +#ifndef __XEN_DT_SYSCTL_H__
> +#define __XEN_DT_SYSCTL_H__
> +
> +#include <xen/list.h>
> +#include <xen/libfdt/libfdt.h>
> +#include <xen/device_tree.h>
> +#include <public/sysctl.h>

In case you decide to pass struct xen_sysctl_dt_overlay to dt_sysctl, you c=
an remove
#include <public/sysctl.h> and use a forward declaration to struct xen_sysc=
tl_dt_overlay
instead.

> +
> +/*
> + * overlay_node_track describes information about added nodes through dt=
bo.
> + * @entry: List pointer.
> + * @dt_host_new: Pointer to the updated dt_host_new unflattened 'updated=
 fdt'.
> + * @fdt: Stores the fdt.
> + * @nodes_fullname: Stores the full name of nodes.
> + * @nodes_irq: Stores the IRQ added from overlay dtb.
> + * @node_num_irq: Stores num of IRQ for each node in overlay dtb.
> + * @num_nodes: Stores total number of nodes in overlay dtb.
> + */
> +struct overlay_track {
> +    struct list_head entry;
> +    struct dt_device_node *dt_host_new;
> +    void *fdt;
> +    char **nodes_fullname;
> +    int **nodes_irq;
> +    int *node_num_irq;
> +    unsigned int num_nodes;
> +};
> +
> +long dt_sysctl(struct xen_sysctl *op);
> +#endif
>=20



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 10:39:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 10:39:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290721.493138 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU4aX-00052o-2p; Tue, 15 Mar 2022 10:39:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290721.493138; Tue, 15 Mar 2022 10:39:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU4aW-00052h-Vz; Tue, 15 Mar 2022 10:39:36 +0000
Received: by outflank-mailman (input) for mailman id 290721;
 Tue, 15 Mar 2022 10:39:36 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=GQWC=T2=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nU4aW-00052b-0b
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 10:39:36 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 34902818-a44c-11ec-853b-5f4723681683;
 Tue, 15 Mar 2022 11:39:35 +0100 (CET)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2055.outbound.protection.outlook.com [104.47.14.55]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-40-YKeAfTEHMO-quzbs9WoQIg-2; Tue, 15 Mar 2022 11:39:33 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR0401MB2304.eurprd04.prod.outlook.com (2603:10a6:800:29::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.29; Tue, 15 Mar
 2022 10:39:31 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.028; Tue, 15 Mar 2022
 10:39:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 34902818-a44c-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647340774;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=s/1wiHtSL0i0MY21LkUrdrI/DRQ0WkbNBRiueP9tmJ0=;
	b=KOF/lJKM3h0LVy92wHTwfuvR2YHu8e6webC2s22wvmpZWnUXDAkVN4w2SDO9iAWioW83YJ
	MYs+A0JC/PbVa9c1uzATmYi6rOWz6NbtRa0rRD7YAcvouT/B93H3QWjXUF9uUMM68nH3Hy
	kt/zXH9VPDPyg1uEiFv8RBJjlQA2MMw=
X-MC-Unique: YKeAfTEHMO-quzbs9WoQIg-2
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ct8ghhXl71XkpH6qQlUQumSOlALqOMrXy9HGUp9E/nZ8wL3Aoj34pKxmKaS1uOmomub92kQUfuCxSycSvAR7OxkqLkMU+kdSFrtro9auAUn+dbCcl18bYd8zD3JbXlTiIXMZz2vmuQ4kvK9duLksal/dlsT0AupUuYqDOvg1hZVhgFij6oeLCeRPIKGTMGLvozbdO11j0J/3roFX9GWew+9W7m/GZRU6VT+Eq+tqCPLrL20LQIx+fSwDtJKVnSKh5Os5+KeQDuSpkbKk+2Qph5GVpGpQ4o0vlWuLGkGQm3vjjUpzHMdduljtmru8BGpntRw/4q9aqjY9WkbL3Ptjsg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=LOlg7nswpJcal2tuosNigguHrBNlq57YL/eqSdJKXXQ=;
 b=QFHkYMS4J/bMgNHRJpONv7PCye4sCSNp+epL5NBne66w+69UfGvKv98OtpsRzmAv6TKSTbbJkgk3mvNU4cbJID2kyZgKPOicmqmudQH52wzGtxh1shYB59X6ITBi11cDxCtd5RuZn1qxbNUhth/MqlalfcGvTjfW3dyuv5m7/oCcxRaNAgPNhxDAGmAAxNg8448/HjHshn8ReQP5Fm3ILKxfP9BQHFVjMr/pzI18InGoDJ8SBSYcBwJVoHJ/MBHULPZmwg6O+J88H35eWcXYjxTSsZYpU3DW0yqWIOqJNJUYGfvNX2wcQVpcyWgcW7LjjBzjqcRyBYoqJ2vNJKt9HQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <cd5c9fe4-6065-9c22-1a39-c9a5a77ea01d@suse.com>
Date: Tue, 15 Mar 2022 11:39:29 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v3 2/4] x86/APIC: calibrate against platform timer when
 possible
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
References: <35cb3c72-05ba-24c7-1fdd-3ee1aced3aec@suse.com>
 <cb7dd6bc-79a4-2137-5e82-805b9daf5d58@suse.com>
 <YitSc/Ky6PJb5ndV@Air-de-Roger>
 <d6bcee5b-abbd-5cef-f174-8609df94603e@suse.com>
 <YjBYk+xJMh1I6nrM@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YjBYk+xJMh1I6nrM@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6P195CA0043.EURP195.PROD.OUTLOOK.COM
 (2603:10a6:209:87::20) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: d488b16d-ddc5-4665-55df-08da067016ac
X-MS-TrafficTypeDiagnostic: VI1PR0401MB2304:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR0401MB230448348FDE333AE25DDA64B3109@VI1PR0401MB2304.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(508600001)(26005)(36756003)(6506007)(186003)(5660300002)(54906003)(2906002)(8676002)(6916009)(66476007)(31696002)(53546011)(66946007)(86362001)(66556008)(31686004)(8936002)(4326008)(38100700002)(6486002)(316002)(83380400001)(2616005)(6512007)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?kA2H0JyQ1dltETavLkj3OWHZowsC7nOeGv0ikdMXzna7zxKUaJvzMmjFJcvq?=
 =?us-ascii?Q?FvioQXvNp0QYA+uISHAOFwMC7VAbX/q3mYMwVfxlHGVkzpBg39FXAvZZJQBw?=
 =?us-ascii?Q?aH6G7zCt8x896lk6ZrhLG4lHiTaVblAEAoUwFHe4xZflwOmPpxayI9xXqFeE?=
 =?us-ascii?Q?UdwcBXpvPfx9hqq4+QKR4a3WlMB4i5j0aLkbiWOoiKsF9XnLyryefk+3jZU9?=
 =?us-ascii?Q?fqlE2Og+weoOWpHRDrAKU7OSBkT0jk/p6K+GKjCifucA6Sxpui65+v/XtWPX?=
 =?us-ascii?Q?JanttBFczxQmwyvN0nFldyCmMuFDVIrdTgzOubrbiVyDgWvvKy0oGRI5dRAY?=
 =?us-ascii?Q?7VimJ5XZkyssO6E6vyCct/1oWBsb88bJt72CkF2EE4KT9c7TkTjZSpmxXur3?=
 =?us-ascii?Q?6P5yuXP0eKEzdXgj0Boz7CzsgSLDqehgYaPniVZX/IKdaOunLysqfvaK5RTH?=
 =?us-ascii?Q?zcYkMMbODIJKDn87lcJPNQE6LNVMAOEvvAZWy+0hZjFIpHS9ooV1feU7Ag+V?=
 =?us-ascii?Q?NrRLFydhsICfH3mJbELPSDsZSwuMnvE24xoiGFYKIg4P+SSt588vicWnqKEk?=
 =?us-ascii?Q?p/iHvOcnlBBrcRURNagcrSo0sKVRuQPSTGm3gLL6A2Bcvvoo156S5+sdR5gf?=
 =?us-ascii?Q?KrFU9tTx00tAqm8Oh5c5rIBiXQMAPDR54nfLV3nH+bcWhh634htDMSsoo8p2?=
 =?us-ascii?Q?juVItBiMY6RlUaG+fOhZ0ttLGYVaowShNk78ZNexOFitJPKm3MIiQtiBEeHq?=
 =?us-ascii?Q?qYF/SQqac0EVQePSpd1Xbwsf6RO60YPrV2h38o0/0RBtAxIq8rztInExTUOB?=
 =?us-ascii?Q?kwEI84vZyq5toi3m/0BSLA3A017/FaCF0G2CuN8CP/RLaNmIFpNcJa4+xKhZ?=
 =?us-ascii?Q?wm0APAWVTHIlJgc9sxxaVBBbB0058NsdnClaqA3Auq3QQMazzpTXupgQ9KLO?=
 =?us-ascii?Q?l65OQVuiH+pbn19Z3gMESosfZfRgo6VKbuPygyJeR0A02hbOcvwOZkQjI7Gz?=
 =?us-ascii?Q?u5wPvR4JmYm1QNKCP5DvdWtYIAiHxBgajgrxNbw6HCL+wWHNa2vd9SJq6BNU?=
 =?us-ascii?Q?tx/vfHyysBnDl5tK8vIgykeTogYPl3K+pl5jYtR8ge5E4GhKBtysa0RQlhvx?=
 =?us-ascii?Q?PU81E9eOyJrf2K88JhYHfyLkb7UaPIP+o2lL9rYf/+2vRrZkfn8ksarLJ8J4?=
 =?us-ascii?Q?NzQaMYLm031uHXRnpNhDv/yezBGKFKY6dRz+99zASYYBxdNNQHP7SMqy4+TL?=
 =?us-ascii?Q?+j6mtZxnR2UodPqmysldFPvKwmkVu6P0Rv+qTDu/HDf/hmX4s3IUYNK7bDoo?=
 =?us-ascii?Q?GRFQtfAQR7B79t5OTw97gSVsnPse0yA/mpz1gGgqRlewqbv2z+O5MaztTxZT?=
 =?us-ascii?Q?zOGZQHqS7mVvBTCUTt5/zZzz2Yw+59Gl3weMGTG7ReN1vvYVPeLCYzYHx8bu?=
 =?us-ascii?Q?v2z8rzIk9oIe2I8UvjxnVHDyERnQsQYZ?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d488b16d-ddc5-4665-55df-08da067016ac
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Mar 2022 10:39:31.5811
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 7l3E4qJC+yEsmfSjLpOwgF9sIY3zfoekbZXWGCBm58V25XdIoMWgWii0Ygwe9qZ7sodldZqFrYIyfYMuzGWmwg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0401MB2304

On 15.03.2022 10:12, Roger Pau Monn=C3=A9 wrote:
> On Mon, Mar 14, 2022 at 05:19:37PM +0100, Jan Beulich wrote:
>> One thing seems quite clear though: Doing any of this with interrupts
>> enabled increases the chances for the read pairs to not properly
>> correlate, due to an interrupt happening in the middle. This alone is
>> a reason for me to want to keep IRQs off here.
>=20
> Right, TSC calibration is also done with interrupts disabled, so it
> does seem correct to do the same here for APIC.
>=20
> Maybe it would be cleaner to hide the specific PIT logic in
> calibrate_apic_timer() so that we could remove get_8254_timer_count()
> and wait_8254_wraparound() from apic.c and apic.c doesn't have any PIT
> specific code anymore?

Yes, that's certainly a further cleanup step to take (saying this
without actually having tried, so there may be obstacles).

Jan

> I think using channel 2 like it's used for the TSC calibration won't
> be possible at this point, since it will skew read_pit_count() users?
> In any case if we disable interrupts those will already be skewed
> because the timer won't be rearmed until interrupts are enabled.
>=20
> Thanks, Roger.
>=20



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 10:41:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 10:41:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290724.493149 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU4cC-0006Np-Ey; Tue, 15 Mar 2022 10:41:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290724.493149; Tue, 15 Mar 2022 10:41:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU4cC-0006Ni-BW; Tue, 15 Mar 2022 10:41:20 +0000
Received: by outflank-mailman (input) for mailman id 290724;
 Tue, 15 Mar 2022 10:41:19 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=CG/1=T2=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nU4cB-0006Na-8g
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 10:41:19 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04on060f.outbound.protection.outlook.com
 [2a01:111:f400:fe0c::60f])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 710ef813-a44c-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 11:41:17 +0100 (CET)
Received: from AM6P194CA0056.EURP194.PROD.OUTLOOK.COM (2603:10a6:209:84::33)
 by VI1PR08MB2672.eurprd08.prod.outlook.com (2603:10a6:802:1c::27) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26; Tue, 15 Mar
 2022 10:41:13 +0000
Received: from VE1EUR03FT040.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:84:cafe::39) by AM6P194CA0056.outlook.office365.com
 (2603:10a6:209:84::33) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.28 via Frontend
 Transport; Tue, 15 Mar 2022 10:41:13 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT040.mail.protection.outlook.com (10.152.18.210) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Tue, 15 Mar 2022 10:41:12 +0000
Received: ("Tessian outbound 2877e54fe176:v113");
 Tue, 15 Mar 2022 10:41:12 +0000
Received: from b0a174fb6fab.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 260E6020-10AB-4DBB-AC02-C62AF9C83E0A.1; 
 Tue, 15 Mar 2022 10:41:03 +0000
Received: from EUR01-VE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id b0a174fb6fab.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 15 Mar 2022 10:41:03 +0000
Received: from VI1PR08MB3967.eurprd08.prod.outlook.com (2603:10a6:803:df::16)
 by AM8PR08MB6468.eurprd08.prod.outlook.com (2603:10a6:20b:360::11)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Tue, 15 Mar
 2022 10:40:59 +0000
Received: from VI1PR08MB3967.eurprd08.prod.outlook.com
 ([fe80::479:b7f8:ba2a:4a74]) by VI1PR08MB3967.eurprd08.prod.outlook.com
 ([fe80::479:b7f8:ba2a:4a74%5]) with mapi id 15.20.5061.029; Tue, 15 Mar 2022
 10:40:58 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 710ef813-a44c-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=szTfdxs5M/Msha/s8hkQD54iMpyHA5nPfE70MdCR6yQ=;
 b=aluFm55kuVGGqJ0Rw/5dX+tfR/vG/NtXPB/djS/YBZOFovUu6bVQMMS1l9mdXZkPcBoyVNJEwtEjoAvzw9Q6ZrDup06wX9KGGpP1PMgkba6dZ+/9eyZGFrZoU9+n1XlySawHxgNmvXbSHnrsrcJZvMfpBOWB2qO/ZFH3OGH2YXQ=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 28b81b67bc7919e9
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=OU7/qBCfuLoKud40tZs1UZWaaxsc3O1clDAELOFv4VrkUDduTxsjjUhtkAb+bUJbb+FjctuIMq1QSUdY9K8RyuusnakPK8f4ORmW8MEDoK/QgmAgn4oSGo2A7f07SQWQ7Qpc9zjhNu7fGqISJnpXLSLyIAPEYckzqnR3NmQwwGB55Gf/oTqRQhy+UIkGKxnPAKfYodI2bLggMNh6YtHuYp9zy//XETMQ9avbqBGMrf+F/RnAOI0pWezSdzyo67zNpc680fPYzpHxomaxa13wzxpP8pQLcOJ2ODh4bNZBvnTaIu5AwftKYf0D8co6fRwUCY4wFSc2Uqo41ugAcqN/Ow==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=szTfdxs5M/Msha/s8hkQD54iMpyHA5nPfE70MdCR6yQ=;
 b=mIqTtt6sHCHS9r/fgCzt1oZr1D4msHGi5hKVmbPv4tnawtas4XZl2jJ/PjxmEce9IJvOD7IZBL+4GKrTW5SkES1MIs4eUGuiLJZyqQOdz8I7kOqcr6+VKp+leX13shqo6qSbLIuLn6KF9UovEO5iU6RDlebdpP8I4YeNwWFUisIzbYTDUR0woShd48Lrfd1kBv5vvcLBWL92Za2okfLmgk49u0yfWqSbVuFmkqpV0HLq+EJznYGWgMViXT0RoKRe+XsqSZjSh2kwdhIE+4cmYrWMHU3uAQCDUV4TZmpR2us+oHoqHkfgKZwn1ifefE0iKLDFQimtLTqYHcIjubkWmg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=szTfdxs5M/Msha/s8hkQD54iMpyHA5nPfE70MdCR6yQ=;
 b=aluFm55kuVGGqJ0Rw/5dX+tfR/vG/NtXPB/djS/YBZOFovUu6bVQMMS1l9mdXZkPcBoyVNJEwtEjoAvzw9Q6ZrDup06wX9KGGpP1PMgkba6dZ+/9eyZGFrZoU9+n1XlySawHxgNmvXbSHnrsrcJZvMfpBOWB2qO/ZFH3OGH2YXQ=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Vikram Garhwal <fnu.vikram@xilinx.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Stefano Stabellini
	<sstabellini@kernel.org>, "julien@xen.org" <julien@xen.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, "volodymyr_babchuk@epam.com"
	<volodymyr_babchuk@epam.com>, Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>
Subject: Re: [XEN][RFC PATCH v3 11/14] xen/arm: Implement device tree node
 addition functionalities
Thread-Topic: [XEN][RFC PATCH v3 11/14] xen/arm: Implement device tree node
 addition functionalities
Thread-Index: AQHYMyVzdRh4vWYAmEuwX+X13mbNP6zATAOA
Date: Tue, 15 Mar 2022 10:40:57 +0000
Message-ID: <C32F96D8-8602-48EA-B676-645C792642F0@arm.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
 <20220308194704.14061-12-fnu.vikram@xilinx.com>
In-Reply-To: <20220308194704.14061-12-fnu.vikram@xilinx.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: be96289a-1a22-4eb7-1e6b-08da0670533b
x-ms-traffictypediagnostic:
	AM8PR08MB6468:EE_|VE1EUR03FT040:EE_|VI1PR08MB2672:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR08MB2672A8FA57C201F1149C1F3EE4109@VI1PR08MB2672.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR08MB3967.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(26005)(2616005)(186003)(2906002)(5660300002)(8936002)(6512007)(6506007)(33656002)(36756003)(71200400001)(508600001)(6486002)(83380400001)(38070700005)(86362001)(91956017)(54906003)(76116006)(6916009)(316002)(38100700002)(122000001)(4326008)(8676002)(66946007)(66556008)(66446008)(66476007)(64756008)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <BC39EFF40FE22E418E5F8C4C437F8B28@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM8PR08MB6468
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT040.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	42dd75aa-3547-4cc8-9c98-08da06704a85
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(83380400001)(356005)(336012)(81166007)(26005)(186003)(2906002)(6862004)(36756003)(5660300002)(8936002)(33656002)(4326008)(8676002)(70206006)(70586007)(6486002)(82310400004)(86362001)(6512007)(316002)(40460700003)(2616005)(47076005)(36860700001)(508600001)(6506007)(54906003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Mar 2022 10:41:12.7739
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: be96289a-1a22-4eb7-1e6b-08da0670533b
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT040.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB2672
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From xen-devel-bounces@lists.xenproject.org Tue Mar 15 10:50:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 10:50:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290727.493160 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU4kj-0007sR-BL; Tue, 15 Mar 2022 10:50:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290727.493160; Tue, 15 Mar 2022 10:50:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU4kj-0007sK-7U; Tue, 15 Mar 2022 10:50:09 +0000
Received: by outflank-mailman (input) for mailman id 290727;
 Tue, 15 Mar 2022 10:50:07 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=CG/1=T2=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nU4kh-0007ny-Cd
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 10:50:07 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05on20616.outbound.protection.outlook.com
 [2a01:111:f400:7d00::616])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ac3c4397-a44d-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 11:50:05 +0100 (CET)
Received: from DB8PR04CA0002.eurprd04.prod.outlook.com (2603:10a6:10:110::12)
 by AM0PR08MB3009.eurprd08.prod.outlook.com (2603:10a6:208:66::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Tue, 15 Mar
 2022 10:50:02 +0000
Received: from DB5EUR03FT013.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:110:cafe::90) by DB8PR04CA0002.outlook.office365.com
 (2603:10a6:10:110::12) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.28 via Frontend
 Transport; Tue, 15 Mar 2022 10:50:02 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT013.mail.protection.outlook.com (10.152.20.105) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Tue, 15 Mar 2022 10:50:02 +0000
Received: ("Tessian outbound 18e50a6f0513:v113");
 Tue, 15 Mar 2022 10:50:02 +0000
Received: from ad1b7f1063a4.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 EEF7EDE4-9468-4835-BA17-18AC43C8BC8B.1; 
 Tue, 15 Mar 2022 10:49:51 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id ad1b7f1063a4.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 15 Mar 2022 10:49:51 +0000
Received: from VI1PR08MB3967.eurprd08.prod.outlook.com (2603:10a6:803:df::16)
 by AM0PR08MB3041.eurprd08.prod.outlook.com (2603:10a6:208:5c::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.24; Tue, 15 Mar
 2022 10:49:49 +0000
Received: from VI1PR08MB3967.eurprd08.prod.outlook.com
 ([fe80::479:b7f8:ba2a:4a74]) by VI1PR08MB3967.eurprd08.prod.outlook.com
 ([fe80::479:b7f8:ba2a:4a74%5]) with mapi id 15.20.5061.029; Tue, 15 Mar 2022
 10:49:48 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ac3c4397-a44d-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=4/0ZxOlFSt+JpaPDDFNnM0cjDKFQZOl+CG4o5PcQgd4=;
 b=Nk71zB/E0HXjB6bPFQgBr+gRZ/9X1l6S28PbQK/3ElqIA3m5N1UPrPauy4dCVi75JuGpk2AE5EtOozT0dF+musrZvGYhXx8UiiO/Gmo87VUIJOBbRS5wqBEDCgLAaRCK3m7FX3eP1odCcniL58shjmgFQ8RGwmWTM9XLm/CydGA=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: d4edfa8dd4866a65
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=IC4T2icbfF3Xa2iW3xvdxl9nTAvTvbfygX3hELIdA3iBdlBREyc23tDcwGw+GqWme49/b3x8+QWnSDi+G2m7Wvc1MqRuQXQZoTIVo60TmGQMPZ8P/BQ8LKmIvBLR/JL+kJ/LHC2u3DshQHthlGkABFNjIGzzIBuEQL3f4IwqzU/ruqdk2wZKNa3dR3aaKri0phPmMVY7vxb3j3YZLRVbDQ3088hxkh/LdBCEYqr0ij9Uu+zbtnv2CV2Pznb65hlDivRNEpbv2M7jq8QfmYQVITuL6241iLt4EinLx7GHj9Ql0ou9aXGFePrMeAn78Gh3rrY7wDtZNvcJ3GEe97vzew==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=4/0ZxOlFSt+JpaPDDFNnM0cjDKFQZOl+CG4o5PcQgd4=;
 b=myVAT+6dDpmYzi7pYvkPmODZgU153QyIHriPlKvm2+RrMKnpOObYxCWr2sm4F94CgafIe40SGQJXGiUT/BKtuW2cHQ9pzQgSv61kz3/70M1plRrTjOSVHVmotKFx3nJad93wBI3sL1HzfiRn+RaYjz+FPMILMpMG3xhEzk/USQt94Bqc9EpTsBZMkb2JIk4HnAtnbS1raP6v5fQJrxDrZGEvx7JTuKyDOB9UZgTi/UZX866ebVdty51474qG5Szk/6KD3j73jpnuGvXJsreiV3rtgP3D3kcoFoE9nIDeBA9RberI3UrH5a7UidnuE+lhwhBZ+NFAI5p7XqZddiqyMA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=4/0ZxOlFSt+JpaPDDFNnM0cjDKFQZOl+CG4o5PcQgd4=;
 b=Nk71zB/E0HXjB6bPFQgBr+gRZ/9X1l6S28PbQK/3ElqIA3m5N1UPrPauy4dCVi75JuGpk2AE5EtOozT0dF+musrZvGYhXx8UiiO/Gmo87VUIJOBbRS5wqBEDCgLAaRCK3m7FX3eP1odCcniL58shjmgFQ8RGwmWTM9XLm/CydGA=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Vikram Garhwal <fnu.vikram@xilinx.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, "sstabellini@kernel.org"
	<sstabellini@kernel.org>, "julien@xen.org" <julien@xen.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, "volodymyr_babchuk@epam.com"
	<volodymyr_babchuk@epam.com>, Wei Liu <wl@xen.org>, Anthony PERARD
	<anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>
Subject: Re: [XEN][RFC PATCH v3 12/14] tools/libs/ctrl: Implement new xc
 interfaces for dt overlay
Thread-Topic: [XEN][RFC PATCH v3 12/14] tools/libs/ctrl: Implement new xc
 interfaces for dt overlay
Thread-Index: AQHYMyVwhcvCOHGT7kKCLwt0mHExGazATnuA
Date: Tue, 15 Mar 2022 10:49:48 +0000
Message-ID: <DF0CEB0D-9B6B-45D9-B104-3F2AE5DA9208@arm.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
 <20220308194704.14061-13-fnu.vikram@xilinx.com>
In-Reply-To: <20220308194704.14061-13-fnu.vikram@xilinx.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 4b75fad8-31eb-4e28-da1c-08da06718edd
x-ms-traffictypediagnostic:
	AM0PR08MB3041:EE_|DB5EUR03FT013:EE_|AM0PR08MB3009:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR08MB3009EAF8FE6DAA434C0C8591E4109@AM0PR08MB3009.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR08MB3967.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(2906002)(38100700002)(122000001)(86362001)(38070700005)(2616005)(6512007)(6916009)(186003)(26005)(54906003)(508600001)(71200400001)(6506007)(6486002)(4326008)(8676002)(64756008)(66446008)(66476007)(5660300002)(76116006)(66946007)(8936002)(66556008)(316002)(83380400001)(91956017)(36756003)(33656002)(2004002)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <551D585A6EF1F842A99D984340F1EA41@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB3041
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT013.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	d70dfaa4-08f8-40fe-3b78-08da067186d8
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(36860700001)(2906002)(356005)(81166007)(86362001)(40460700003)(2616005)(6512007)(107886003)(336012)(54906003)(186003)(26005)(508600001)(6506007)(6486002)(4326008)(6862004)(8676002)(5660300002)(8936002)(70586007)(70206006)(47076005)(316002)(83380400001)(33656002)(82310400004)(36756003)(2004002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Mar 2022 10:50:02.4165
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 4b75fad8-31eb-4e28-da1c-08da06718edd
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT013.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB3009

>=20
> diff --git a/tools/libs/ctrl/Makefile b/tools/libs/ctrl/Makefile
> index ef7362327f..848a8737c7 100644
> --- a/tools/libs/ctrl/Makefile
> +++ b/tools/libs/ctrl/Makefile
> @@ -3,6 +3,7 @@ include $(XEN_ROOT)/tools/Rules.mk
>=20
> SRCS-y       +=3D xc_altp2m.c
> SRCS-y       +=3D xc_cpupool.c
> +SRCS-y       +=3D xc_overlay.c

I think these entries are in alphabetical order

> SRCS-y       +=3D xc_domain.c
> SRCS-y       +=3D xc_evtchn.c
> SRCS-y       +=3D xc_gnttab.c
> diff --git a/tools/libs/ctrl/xc_overlay.c b/tools/libs/ctrl/xc_overlay.c
> new file mode 100644
> index 0000000000..8fe780d75a
> --- /dev/null
> +++ b/tools/libs/ctrl/xc_overlay.c
> @@ -0,0 +1,51 @@
> +/*
> + *

This blank line can be removed=20

> + * Overlay control functions.
> + * Copyright (C) 2021 Xilinx Inc.
> + * Author Vikram Garhwal <fnu.vikram@xilinx.com>
> + *
> + * This library is free software; you can redistribute it and/or
> + * modify it under the terms of the GNU Lesser General Public
> + * License as published by the Free Software Foundation;
> + * version 2.1 of the License.
> + *
> + * This library is distributed in the hope that it will be useful,
> + * but WITHOUT ANY WARRANTY; without even the implied warranty of
> + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
> + * Lesser General Public License for more details.
> + *
> + * You should have received a copy of the GNU Lesser General Public
> + * License along with this library; If not, see <http://www.gnu.org/lice=
nses/>.
> + */
> +
> +#include "xc_bitops.h"
> +#include "xc_private.h"
> +#include <xen/hvm/hvm_op.h>
> +#include <libfdt.h>
> +
> +int xc_dt_overlay(xc_interface *xch, void *overlay_fdt, int overlay_fdt_=
size,
> +                  uint8_t overlay_op)
> +{
> +    int err;
> +    DECLARE_SYSCTL;
> +
> +    DECLARE_HYPERCALL_BOUNCE(overlay_fdt, overlay_fdt_size,
> +                        XC_HYPERCALL_BUFFER_BOUNCE_IN);

XC_HYPERCALL_BUFFER_BOUNCE_IN can stay at the same level of overlay_fdt




From xen-devel-bounces@lists.xenproject.org Tue Mar 15 10:58:44 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 10:58:44 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290733.493171 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU4sy-0000Gd-A6; Tue, 15 Mar 2022 10:58:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290733.493171; Tue, 15 Mar 2022 10:58:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU4sy-0000GW-75; Tue, 15 Mar 2022 10:58:40 +0000
Received: by outflank-mailman (input) for mailman id 290733;
 Tue, 15 Mar 2022 10:58:39 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=MOId=T2=redhat.com=dgilbert@srs-se1.protection.inumbo.net>)
 id 1nU4sx-0000GQ-8a
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 10:58:39 +0000
Received: from us-smtp-delivery-124.mimecast.com
 (us-smtp-delivery-124.mimecast.com [170.10.129.124])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id dc8e66c4-a44e-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 11:58:37 +0100 (CET)
Received: from mail-wr1-f72.google.com (mail-wr1-f72.google.com
 [209.85.221.72]) by relay.mimecast.com with ESMTP with STARTTLS
 (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 us-mta-619-qGsAbB09OBG8g52H0ioF-A-1; Tue, 15 Mar 2022 06:58:34 -0400
Received: by mail-wr1-f72.google.com with SMTP id
 f14-20020adfc98e000000b001e8593b40b0so5150803wrh.14
 for <xen-devel@lists.xenproject.org>; Tue, 15 Mar 2022 03:58:33 -0700 (PDT)
Received: from work-vm (cpc109025-salf6-2-0-cust480.10-2.cable.virginm.net.
 [82.30.61.225]) by smtp.gmail.com with ESMTPSA id
 l41-20020a05600c1d2900b00389d3e18f8esm2188196wms.26.2022.03.15.03.58.29
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Tue, 15 Mar 2022 03:58:31 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: dc8e66c4-a44e-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
	s=mimecast20190719; t=1647341915;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=j4q1mDkTkfU3rhMwSrf7xL1WLfewGHyjSGlrtIXdyt8=;
	b=T7EDu2xV275NETyx7EG9BEbB+wO4fU9kQnmfUAsW5KXsY2bPrdqAMjN80fndtWGiVyVxSp
	Dfi1veKNTP0twdnT3vIPv8kr//a24jtyl8WbM3yDUG4c05PB7asyNU1Kb3GvLM4NYIT7KW
	wsMeecsMTnMUmjaLcPitSUqa8nRoweQ=
X-MC-Unique: qGsAbB09OBG8g52H0ioF-A-1
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:date:from:to:cc:subject:message-id:references
         :mime-version:content-disposition:in-reply-to:user-agent;
        bh=j4q1mDkTkfU3rhMwSrf7xL1WLfewGHyjSGlrtIXdyt8=;
        b=Hf/ypqYsO+dC2f87X6/Mr26ciBcUknLPZiYjtSkddoz5IegncKEoGnOmi6Wr62e3BV
         3BH98VyafLjWS1bBH6ofmdlxE+kjXM16YLBeMAxp83E8CjTH0Gs1JxKGDHx9HR+iL64+
         Ii5Cb7FZ1TTpbw4NOfIoXMbMxIN3PeKOQ1MIRKFIrlqqsS/TVDkjZMcmwZoFSKfr+U8L
         h5HbzLxGGLADzi/eseO250qpcFycCZc3bH5+hHyiZkRJ0jXmrCQ3HpckMGbDw+d0MzMt
         G9CgXhKjddw+ylzCsCYT7mFA7zSUxl2XBWhZ5XCRAycuQ6kzCVCojUmIew4hDLGW0iuE
         +95g==
X-Gm-Message-State: AOAM531oUhXD2qMFrAR1C4cwrcSVlGT7TA6eY4SNkEc/srSHKR92/EBV
	phUXxSosRd/9ouk72/RcjqXTRzOLJUz3kjtErB13zzXbOgjRwnGwtdEPth66Ax0jeUeRXgqgyn5
	V9KkAWFDtsJLdWdbtGwyTx1ogTLM=
X-Received: by 2002:adf:e704:0:b0:203:750b:3d8 with SMTP id c4-20020adfe704000000b00203750b03d8mr19437745wrm.623.1647341912945;
        Tue, 15 Mar 2022 03:58:32 -0700 (PDT)
X-Google-Smtp-Source: ABdhPJy8F5reu0obf+EcRrMdtMT6tiW8zTCLp5lDbrl9sclZsfIDBUU+L8B96ElFqtFOlRiqihEQ9A==
X-Received: by 2002:adf:e704:0:b0:203:750b:3d8 with SMTP id c4-20020adfe704000000b00203750b03d8mr19437702wrm.623.1647341912687;
        Tue, 15 Mar 2022 03:58:32 -0700 (PDT)
Date: Tue, 15 Mar 2022 10:58:28 +0000
From: "Dr. David Alan Gilbert" <dgilbert@redhat.com>
To: Markus Armbruster <armbru@redhat.com>
Cc: qemu-devel@nongnu.org, Paolo Bonzini <pbonzini@redhat.com>,
	Richard Henderson <richard.henderson@linaro.org>,
	Gerd Hoffmann <kraxel@redhat.com>,
	Christian Schoenebeck <qemu_oss@crudebyte.com>,
	"Gonglei (Arei)" <arei.gonglei@huawei.com>,
	=?iso-8859-1?Q?Marc-Andr=E9?= Lureau <marcandre.lureau@redhat.com>,
	"Michael S. Tsirkin" <mst@redhat.com>,
	Igor Mammedov <imammedo@redhat.com>, Ani Sinha <ani@anisinha.ca>,
	Laurent Vivier <lvivier@redhat.com>, Amit Shah <amit@kernel.org>,
	Peter Maydell <peter.maydell@linaro.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Anthony Perard <anthony.perard@citrix.com>,
	Paul Durrant <paul@xen.org>,
	=?iso-8859-1?Q?Herv=E9?= Poussineau <hpoussin@reactos.org>,
	Aleksandar Rikalo <aleksandar.rikalo@syrmia.com>,
	Corey Minyard <cminyard@mvista.com>,
	Patrick Venture <venture@google.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Peter Xu <peterx@redhat.com>, Jason Wang <jasowang@redhat.com>,
	=?iso-8859-1?Q?C=E9dric?= Le Goater <clg@kaod.org>,
	Daniel Henrique Barboza <danielhb413@gmail.com>,
	David Gibson <david@gibson.dropbear.id.au>,
	Greg Kurz <groug@kaod.org>,
	Philippe =?iso-8859-1?Q?Mathieu-Daud=E9?= <f4bug@amsat.org>,
	Jean-Christophe Dubois <jcd@tribudubois.net>,
	Keith Busch <kbusch@kernel.org>, Klaus Jensen <its@irrelevant.dk>,
	Yuval Shaia <yuval.shaia.ml@gmail.com>,
	Yoshinori Sato <ysato@users.sourceforge.jp>,
	Magnus Damm <magnus.damm@gmail.com>,
	Fabien Chouteau <chouteau@adacore.com>,
	KONRAD Frederic <frederic.konrad@adacore.com>,
	Mark Cave-Ayland <mark.cave-ayland@ilande.co.uk>,
	Artyom Tarasenko <atar4qemu@gmail.com>,
	Alex Williamson <alex.williamson@redhat.com>,
	Eric Auger <eric.auger@redhat.com>,
	Max Filippov <jcmvbkbc@gmail.com>,
	Juan Quintela <quintela@redhat.com>,
	Konstantin Kostiuk <kkostiuk@redhat.com>,
	Michael Roth <michael.roth@amd.com>,
	Daniel =?iso-8859-1?Q?P=2E_Berrang=E9?= <berrange@redhat.com>,
	Pavel Dovgalyuk <pavel.dovgaluk@ispras.ru>,
	Alex =?iso-8859-1?Q?Benn=E9e?= <alex.bennee@linaro.org>,
	David Hildenbrand <david@redhat.com>,
	Wenchao Wang <wenchao.wang@intel.com>,
	Colin Xu <colin.xu@intel.com>, Kamil Rytarowski <kamil@netbsd.org>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Cornelia Huck <cohuck@redhat.com>, Thomas Huth <thuth@redhat.com>,
	Eric Blake <eblake@redhat.com>,
	Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>,
	John Snow <jsnow@redhat.com>, kvm@vger.kernel.org,
	qemu-arm@nongnu.org, xen-devel@lists.xenproject.org,
	qemu-ppc@nongnu.org, qemu-block@nongnu.org, haxm-team@intel.com,
	qemu-s390x@nongnu.org
Subject: Re: [PATCH 3/3] Use g_new() & friends where that makes obvious sense
Message-ID: <YjBxVFUw2DtBniYS@work-vm>
References: <20220314160108.1440470-1-armbru@redhat.com>
 <20220314160108.1440470-4-armbru@redhat.com>
MIME-Version: 1.0
In-Reply-To: <20220314160108.1440470-4-armbru@redhat.com>
User-Agent: Mutt/2.1.5 (2021-12-30)
Authentication-Results: relay.mimecast.com;
	auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=dgilbert@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

* Markus Armbruster (armbru@redhat.com) wrote:
> g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
> for two reasons.  One, it catches multiplication overflowing size_t.
> Two, it returns T * rather than void *, which lets the compiler catch
> more type errors.
> 
> This commit only touches allocations with size arguments of the form
> sizeof(T).
> 
> Patch created mechanically with:
> 
>     $ spatch --in-place --sp-file scripts/coccinelle/use-g_new-etc.cocci \
> 	     --macro-file scripts/cocci-macro-file.h FILES...
> 
> Signed-off-by: Markus Armbruster <armbru@redhat.com>

Just a small patch then...

> diff --git a/migration/dirtyrate.c b/migration/dirtyrate.c
> index d65e744af9..aace12a787 100644
> --- a/migration/dirtyrate.c
> +++ b/migration/dirtyrate.c
> @@ -91,7 +91,7 @@ static struct DirtyRateInfo *query_dirty_rate_info(void)
>  {
>      int i;
>      int64_t dirty_rate = DirtyStat.dirty_rate;
> -    struct DirtyRateInfo *info = g_malloc0(sizeof(DirtyRateInfo));
> +    struct DirtyRateInfo *info = g_new0(DirtyRateInfo, 1);
>      DirtyRateVcpuList *head = NULL, **tail = &head;
>  
>      info->status = CalculatingState;
> @@ -112,7 +112,7 @@ static struct DirtyRateInfo *query_dirty_rate_info(void)
>              info->sample_pages = 0;
>              info->has_vcpu_dirty_rate = true;
>              for (i = 0; i < DirtyStat.dirty_ring.nvcpu; i++) {
> -                DirtyRateVcpu *rate = g_malloc0(sizeof(DirtyRateVcpu));
> +                DirtyRateVcpu *rate = g_new0(DirtyRateVcpu, 1);
>                  rate->id = DirtyStat.dirty_ring.rates[i].id;
>                  rate->dirty_rate = DirtyStat.dirty_ring.rates[i].dirty_rate;
>                  QAPI_LIST_APPEND(tail, rate);
> diff --git a/migration/multifd-zlib.c b/migration/multifd-zlib.c
> index aba1c88a0c..3a7ae44485 100644
> --- a/migration/multifd-zlib.c
> +++ b/migration/multifd-zlib.c
> @@ -43,7 +43,7 @@ struct zlib_data {
>   */
>  static int zlib_send_setup(MultiFDSendParams *p, Error **errp)
>  {
> -    struct zlib_data *z = g_malloc0(sizeof(struct zlib_data));
> +    struct zlib_data *z = g_new0(struct zlib_data, 1);
>      z_stream *zs = &z->zs;
>  
>      zs->zalloc = Z_NULL;
> @@ -164,7 +164,7 @@ static int zlib_send_prepare(MultiFDSendParams *p, Error **errp)
>   */
>  static int zlib_recv_setup(MultiFDRecvParams *p, Error **errp)
>  {
> -    struct zlib_data *z = g_malloc0(sizeof(struct zlib_data));
> +    struct zlib_data *z = g_new0(struct zlib_data, 1);
>      z_stream *zs = &z->zs;
>  
>      p->data = z;
> diff --git a/migration/ram.c b/migration/ram.c
> index 170e522a1f..3532f64ecb 100644
> --- a/migration/ram.c
> +++ b/migration/ram.c
> @@ -2059,7 +2059,7 @@ int ram_save_queue_pages(const char *rbname, ram_addr_t start, ram_addr_t len)
>      }
>  
>      struct RAMSrcPageRequest *new_entry =
> -        g_malloc0(sizeof(struct RAMSrcPageRequest));
> +        g_new0(struct RAMSrcPageRequest, 1);
>      new_entry->rb = ramblock;
>      new_entry->offset = start;
>      new_entry->len = len;

For migration:
Acked-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
-- 
Dr. David Alan Gilbert / dgilbert@redhat.com / Manchester, UK



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 10:58:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 10:58:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290734.493182 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU4tE-0000eQ-Ji; Tue, 15 Mar 2022 10:58:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290734.493182; Tue, 15 Mar 2022 10:58:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU4tE-0000eJ-GE; Tue, 15 Mar 2022 10:58:56 +0000
Received: by outflank-mailman (input) for mailman id 290734;
 Tue, 15 Mar 2022 10:58:55 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=CG/1=T2=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nU4tD-0000GQ-Ky
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 10:58:55 +0000
Received: from EUR02-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur02on062e.outbound.protection.outlook.com
 [2a01:111:f400:fe06::62e])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e78b9c32-a44e-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 11:58:54 +0100 (CET)
Received: from AS8PR04CA0117.eurprd04.prod.outlook.com (2603:10a6:20b:31e::32)
 by VI1PR08MB3053.eurprd08.prod.outlook.com (2603:10a6:803:45::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Tue, 15 Mar
 2022 10:58:45 +0000
Received: from VE1EUR03FT006.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:31e:cafe::ed) by AS8PR04CA0117.outlook.office365.com
 (2603:10a6:20b:31e::32) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26 via Frontend
 Transport; Tue, 15 Mar 2022 10:58:45 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT006.mail.protection.outlook.com (10.152.18.116) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Tue, 15 Mar 2022 10:58:44 +0000
Received: ("Tessian outbound 341d209a0e52:v113");
 Tue, 15 Mar 2022 10:58:43 +0000
Received: from eac9dcd7204b.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 2B5BCB34-884A-49C0-8BCA-D8412B6E3A7D.1; 
 Tue, 15 Mar 2022 10:58:33 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id eac9dcd7204b.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 15 Mar 2022 10:58:33 +0000
Received: from VI1PR08MB3967.eurprd08.prod.outlook.com (2603:10a6:803:df::16)
 by DB6PR0802MB2440.eurprd08.prod.outlook.com (2603:10a6:4:a1::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26; Tue, 15 Mar
 2022 10:58:31 +0000
Received: from VI1PR08MB3967.eurprd08.prod.outlook.com
 ([fe80::479:b7f8:ba2a:4a74]) by VI1PR08MB3967.eurprd08.prod.outlook.com
 ([fe80::479:b7f8:ba2a:4a74%5]) with mapi id 15.20.5061.029; Tue, 15 Mar 2022
 10:58:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e78b9c32-a44e-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=u2iUBtFb6wgOOtVsH/St+g3ZUduNdVvSYAEGJ0srPCg=;
 b=Id2kVXy+WuO9InpcmVDKB3xSwS0u/nqXoBEPzAC72KXtdXCd2eBl1QzESoOeo5yHGH6SDis8DwvCjauf8uA6a/t2K5g/5mLIwuxruJvneoSmGrS4xD2s8Dws3og7WUudlIxKfiCUGgEL/9WJyDVglwAlZHXusUsp37VPa7wcZ9Y=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 3b9c94ea2f3c22ef
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=AAhf/8EDQ9HR0kxHdbrPyws7Ophmmz+qpMwupQJ9ulHkDUcmPPF1VACo2JCNHIvKXJ+4DNvAymKGzjdu2WVuOvVfOfTiZYNbvuWPhdNTUWxOc0r52jWRMR8d0zw+W0CyJ/Vm/4IhG3AlraCxLQIbqdvPf/W3vKO2D+WnZF334bAatk66UyzTFiVEuhoqG1p2jS0KJ2+OGji0ku5SddNp3S6i16hNjVtwduk5KW9d+ujrBV0Gl4LOdJXUhLbJkQ30yo1hihhzXRimgAy68hmWspFrqEahMZZ6x8DTcRBDXkmNq6ojYx4P/lzrxEUM/2AWoYkwRdCVFKT+YtPe7LhAbA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=u2iUBtFb6wgOOtVsH/St+g3ZUduNdVvSYAEGJ0srPCg=;
 b=LuuhEKwrAcuSdVxez9E9L9vBeUGSFY9beG98J0uv233U/dUlwmOOV4hngIXOYPm2zBpF3ccJNJoSqJ4rmmd4UMu6QbOMvYrUufOr9ssi/Wo6L1WPqHOsYQDh49++wTshcbbyPfUm1BSATs1XjdEsXhNEia2hp76l2yxTeT8QyLIy3m/q0gkwrO7/J9LfkJemmiwwO0eYLPK8u3tMXTkLgkIoFVkP4bEtq+wdAxYfCUScJOSgMoJLRVA4TyVGHPennxbq5lePEiEgWJ0ZEfhAo/24jqKofTSLbBH/3xo8WT0vIanulYYNfok5OWnZHBhDUnv9tftXrfjvfr3MNtKTbg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=u2iUBtFb6wgOOtVsH/St+g3ZUduNdVvSYAEGJ0srPCg=;
 b=Id2kVXy+WuO9InpcmVDKB3xSwS0u/nqXoBEPzAC72KXtdXCd2eBl1QzESoOeo5yHGH6SDis8DwvCjauf8uA6a/t2K5g/5mLIwuxruJvneoSmGrS4xD2s8Dws3og7WUudlIxKfiCUGgEL/9WJyDVglwAlZHXusUsp37VPa7wcZ9Y=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Vikram Garhwal <fnu.vikram@xilinx.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, "sstabellini@kernel.org"
	<sstabellini@kernel.org>, "julien@xen.org" <julien@xen.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, "volodymyr_babchuk@epam.com"
	<volodymyr_babchuk@epam.com>, Wei Liu <wl@xen.org>, Anthony PERARD
	<anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>
Subject: Re: [XEN][RFC PATCH v3 13/14] tools/libs/light: Implement new libxl
 functions for device tree overlay ops
Thread-Topic: [XEN][RFC PATCH v3 13/14] tools/libs/light: Implement new libxl
 functions for device tree overlay ops
Thread-Index: AQHYMyVytmqJkB3Zs0+KbfmENe/kvazAUOoA
Date: Tue, 15 Mar 2022 10:58:30 +0000
Message-ID: <ED974219-775B-47D4-8EF5-63F0068EF632@arm.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
 <20220308194704.14061-14-fnu.vikram@xilinx.com>
In-Reply-To: <20220308194704.14061-14-fnu.vikram@xilinx.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 3dcf5d55-af51-4eb3-51c4-08da0672c5f4
x-ms-traffictypediagnostic:
	DB6PR0802MB2440:EE_|VE1EUR03FT006:EE_|VI1PR08MB3053:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR08MB30534EDB414CCBC04A709D68E4109@VI1PR08MB3053.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR08MB3967.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(2616005)(316002)(122000001)(8676002)(26005)(186003)(83380400001)(71200400001)(4326008)(38100700002)(6916009)(6512007)(86362001)(54906003)(33656002)(6486002)(38070700005)(558084003)(5660300002)(2906002)(6506007)(66946007)(91956017)(53546011)(66446008)(64756008)(66476007)(66556008)(76116006)(508600001)(8936002)(36756003)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <4A1CECB081D3E04989F60E10440D0251@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0802MB2440
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT006.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	46a15ba0-ff3b-403d-a09d-08da0672bdec
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(53546011)(6506007)(6486002)(6862004)(4326008)(8676002)(336012)(54906003)(26005)(186003)(508600001)(558084003)(82310400004)(107886003)(33656002)(36756003)(8936002)(47076005)(5660300002)(70586007)(70206006)(83380400001)(316002)(2906002)(356005)(36860700001)(81166007)(2616005)(6512007)(86362001)(40460700003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Mar 2022 10:58:44.2414
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 3dcf5d55-af51-4eb3-51c4-08da0672c5f4
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT006.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB3053

DQoNCj4gT24gOCBNYXIgMjAyMiwgYXQgMTk6NDcsIFZpa3JhbSBHYXJod2FsIDxmbnUudmlrcmFt
QHhpbGlueC5jb20+IHdyb3RlOg0KPiANCj4gU2lnbmVkLW9mZi1ieTogVmlrcmFtIEdhcmh3YWwg
PGZudS52aWtyYW1AeGlsaW54LmNvbT4NCg0KSSBkb27igJl0IGtub3cgaWYgYW4gZW1wdHkgY29t
bWl0IG1lc3NhZ2UgaXMgb2sgaGVyZSwgd2lsbCBsZWF2ZSB0byB0aGUgbWFpbnRhaW5lcg0KdGhl
IGNob2ljZSwgZm9yIG1lIHRoZSBjb2RlIGxvb2tzIG9rDQoNClJldmlld2VkLWJ5OiBMdWNhIEZh
bmNlbGx1IDxsdWNhLmZhbmNlbGx1QGFybS5jb20+DQoNCg0K


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 11:38:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 11:38:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290754.493212 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU5Vg-0005PJ-Rg; Tue, 15 Mar 2022 11:38:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290754.493212; Tue, 15 Mar 2022 11:38:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU5Vg-0005PC-OX; Tue, 15 Mar 2022 11:38:40 +0000
Received: by outflank-mailman (input) for mailman id 290754;
 Tue, 15 Mar 2022 11:38:39 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=GQWC=T2=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nU5Vf-0005P6-K1
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 11:38:39 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 741ad558-a454-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 12:38:37 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2113.outbound.protection.outlook.com [104.47.18.113]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-38-oCCE11cXNQ2hWIIyAr4PwA-2; Tue, 15 Mar 2022 12:38:36 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR04MB4237.eurprd04.prod.outlook.com (2603:10a6:803:3e::24)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.29; Tue, 15 Mar
 2022 11:38:32 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.028; Tue, 15 Mar 2022
 11:38:32 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 741ad558-a454-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647344317;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=dZvx1MHyumdEYfCvg/DWVJqlP4uJVcd3ZDKREXVk+XA=;
	b=WioYWbko4c0mYHyb+8wASW9L0KHiry4OjMw67H31nqYDLmAFaDWgsd3e++G6+u8Ygcn5el
	qQNwG8y/geDH8YVYBeuppZfnOprK14tzSpyAH4DEGdKaUVuy/mlcRS8PyTa7vVqWfVJhbP
	sITsOFZ75hhmS1HNNSONNVEeqjCqoJI=
X-MC-Unique: oCCE11cXNQ2hWIIyAr4PwA-2
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=j6lUMSKjKarx0mW/9pmhTQgapbcW5Nu8L9tkP7ETe78IRTSvlz5kD9LSE4Y5D2WD+2ZcmGbtL6WrlZXDBcKNCwjg628q+bYK4TZ6O71V+Gl+iuhv1i8vzq5GFRQMSS7/e7iniOM3z3ihXcwsXVrshBNWxw/Bdh/XXdIEzoISb6Bw2xczHB3u2mG96X7F3INZI6tzegqlrhNCTre1Ljw2tL2PJCQ7lKtGm2w9LmvM20NcCkNRXxwo0nHpLRnL7kzBgVbj/Zc0rACJDfX0R6/Q3QOzwV21bNawDWtCWETnhgS4r2x1zdj9uTGxGJbHU/P2uYqpHwfFWKTOVjw8jYNnLQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=dZvx1MHyumdEYfCvg/DWVJqlP4uJVcd3ZDKREXVk+XA=;
 b=lNwATcGPHEQYRvm7DKdYfXcB60JlULb8VI++lqkIoCruNUwThSrtF++7U+mZDBPRI5JH9lLzmJEvoBQlPRdnMwM8y2cJ4/B0dlwdhWH9eHXWfogeBvwz3jqOnD4AaHH6jJ9EZeoFzO2LzrheIkLBqgriZTpE57UZozD4pieZTJxKqgiHNT3zCIZM/5AuFzsMcITPPSXSrukyoYTJnoIYE0vbJzuxDnokBiFf5t8bFAaWSR+a2BznxBpwep1eIpx+8Zb9geeO8pLqT6jPSHvQX+txxZ/igWG5g+k4eF/w0PqBh5jtBeCbWq8z7gQVeyGwENXl6xDvs4hsYYj2m9RPYQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <23f5afb4-c712-f872-acee-7f18b98b73e6@suse.com>
Date: Tue, 15 Mar 2022 12:38:30 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [XEN PATCH] tools/libs/light/libxl_pci.c: explicitly grant access
 to Intel IGD opregion
Content-Language: en-US
To: Chuck Zmudzinski <brchuckz@netscape.net>
Cc: Wei Liu <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>,
 Juergen Gross <jgross@suse.com>, xen-devel@lists.xenproject.org
References: <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz.ref@netscape.net>
 <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz@netscape.net>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz@netscape.net>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: FR3P281CA0077.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:1f::10) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: cd026408-939d-4d2c-9af6-08da067854f9
X-MS-TrafficTypeDiagnostic: VI1PR04MB4237:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB4237BFE8FD864A22EF773819B3109@VI1PR04MB4237.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(508600001)(6506007)(53546011)(2906002)(36756003)(6512007)(316002)(6486002)(54906003)(6916009)(66556008)(66946007)(66476007)(4326008)(8676002)(5660300002)(8936002)(31696002)(86362001)(31686004)(38100700002)(26005)(2616005)(186003)(83380400001)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?R1BSelBHSktTRTVsemI1RktRb2FtVVVmeU5BdlR6WFhiMXMzV2pUT3dzYTI2?=
 =?utf-8?B?a21tRlpSeHJuTHFkM0lQUnZibnBIOGtnN3FkVWRTa1BIL2RvSmtuVGpVZ1k0?=
 =?utf-8?B?K0pzWlFYZzJJYWtQYjRyNVRIZlFRaStXVDF2WmN6NWxwYzhYWEd2SW5RamlZ?=
 =?utf-8?B?VERBRUtxOXhWdUtySVRDajBNY09tSHNyRGJtcURTNkpPNzQzNUNBNjRYTUIx?=
 =?utf-8?B?TVlXRHJRbGVlaWJ6dEhsWGVBRjFKUVBza0VTOEZOMTMydXZVTVhJOU5Ec3Z5?=
 =?utf-8?B?MTliK2pCOXROeFMrV2xFeDloL1R4U1RYQ1lJeXdCUWlJa2NUMDhtOTBmRENk?=
 =?utf-8?B?R1RWVkpiZTd6aklBbHRVK1Z6YVpaMXdwYU8rTlJxR2tTOWxXUWZXclBDVFll?=
 =?utf-8?B?MXp6YWtsSmZGS0g5WGVVL28xdVNram0vaVlmbElXU29RNWEvMHI1eG5ScWtF?=
 =?utf-8?B?YmRSRjhMNHE5MWZBRUN4VC92N0pzKzlvdW1vK0lEQ21LYm8wVmZlTlROZDc3?=
 =?utf-8?B?SWpGSWxVUm5hMXU3bDUzSytKSzdoQ1pLWUFMdS8rbjdmS1ZJT1huTi9rbmxU?=
 =?utf-8?B?R3N6OVllbHRyOHR1V09sQUxVeHh5RDJvdGNzVUFudDRITUpmQW5DbS9SU2Jr?=
 =?utf-8?B?VXhpTnN2YzVGdmtFNXBsMW1rbkpaN1pvbm85LzlXRFM5b3lCZFZMUFZHM1Nl?=
 =?utf-8?B?T0tFNnVtV0x2cDl1SFRZaE9jLzlWVUF6VndBMTBIWXp0elRyc3dYaDNEcTE2?=
 =?utf-8?B?K014U3Zvcm9DVndkSVpEaFcwRWgxS01WazNMUWVaY3dON1VZOWtHQSsvS2Rh?=
 =?utf-8?B?bUFXVXMvdDZ3ckZQOFlRMHhzUU03T1ZRelk1OUZGVXJMZ0NoS0tlSEZTbk1T?=
 =?utf-8?B?dmVrMWxNTE9JV0k2ZWJrMlpWMzFaMEZENXZxT1ZlVVRVaVV3RXV5WE5VVVJM?=
 =?utf-8?B?SGUvOGI2UGNhUXlBTThDU2krbklvd3JZMjlITTBaeksySzA4WXF5Wkp4SFNl?=
 =?utf-8?B?M2ZJWGlOeDczcTZkZllCSUlrQ09JZmNtbW5xL1dXZDlHK09PTnBJSFovY0Uy?=
 =?utf-8?B?b2ZtOU5hZFFQSm9sREQvM3hTK1NvK3hWN3JzbE5od3V3bmdIVXNnQ1RzdmVp?=
 =?utf-8?B?dWMvSHF5SVZLNUZZaFFOTjFKak0vWFpXUCsxVDA5bjVWWFA5a0x6bHdPcXdz?=
 =?utf-8?B?bmsrWXNQUmhwNWhNMjRWOGJ6alNkd1JST05BTTFIQzI3b1B3WGMrQTV4c0Vw?=
 =?utf-8?B?ZVEyN00wYlJaZnJDZXdWczR4cXh3U3JwZmMvU3ROUlQyMEdVRFAxdTBMcGhp?=
 =?utf-8?B?NngzYlJ4dzZpRCsxckRtRFFUQWt1QVpxcjBUUEFqSjVLcC82azVrRk5CbE0y?=
 =?utf-8?B?d0hoN2FIaVJ5N0VaZ3dmNVFPanpmbUZWeTJ1SU1WM1I2L2psUk4yUXB1VFU1?=
 =?utf-8?B?UmRuV1MvZVlwZnJQRjhvZVd2RkpzQXZHdDVQdmZKQjJDa3RYamhESFhSUTBM?=
 =?utf-8?B?K1ZmT0x0K0VuK2ZKeUFNWkNDOFNsOHRoa05VdWJ6Ny9ER1hpNnNFNGJuSmVy?=
 =?utf-8?B?cmlIdnhrUXQrUm1tZ1FnaXM2dFZHUmRQSW9MY1F4b0xNQW83UUt6VVd3ajdV?=
 =?utf-8?B?T1JGU2I4c2xqdmhFZTIxSVBuaG9TNXhXRUdRSjFIazhqbTdXczRHdEVkUzRk?=
 =?utf-8?B?d2NaK3puUW1LTmRMWE9maFFZQ2pXSTlSR0dzdUFneVh4d3VuVzA5M3o1WUs5?=
 =?utf-8?B?SHNsKzQ5QmZhbGl2OXhRUDllb3RvRDZDNEVnQXdOMDVBOU5PbUUrc3hEM0NX?=
 =?utf-8?B?NkRjUVRLdEFXMTZIZHJuSFRrK0JmYWFZZzRpR2NxNDY4cjBYV0FZem1VTlBu?=
 =?utf-8?B?Rit4T2psa3NtWHFVSmR5ZlgyVXFDZU9kdHJkL3RTWFZ5b1A0Y0o0b2U4cXQz?=
 =?utf-8?Q?DejgIXBBmLnsXqUpVoRESwOONYL4lwcg?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: cd026408-939d-4d2c-9af6-08da067854f9
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Mar 2022 11:38:31.9551
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: jqtfw8MhHWV4kih4gnJGkErbcwEipVGogROt+rp+F6iTrtqB+YbU/1hEAPyxZOcTvzOyB055gvi2VB6NId97Ig==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB4237

On 14.03.2022 04:41, Chuck Zmudzinski wrote:
> Fixes: abfb006f1ff4 (tools/libxl: explicitly grant access to needed I/O-memory ranges)
> Fixes: 0561e1f01e87 (xen/common: do not implicitly permit access to mapped I/O memory)
> Backport: 4.12+

Just fyi: This is fine to have as a tag, but it wouldn't be backported
farther than to 4.15.

Apart from this largely some style issues (see below), but please
realize that I'm not a libxl maintainer and hence I may not have good
enough knowledge of, in particular, potential unwritten conventions.

> @@ -610,6 +612,45 @@ out:
>      return ret;
>  }
>  
> +static uint32_t sysfs_dev_get_igd_opregion(libxl__gc *gc,
> +                                           libxl_device_pci *pci)
> +{
> +    char *pci_device_config_path =
> +            GCSPRINTF(SYSFS_PCI_DEV"/"PCI_BDF"/config",
> +                      pci->domain, pci->bus, pci->dev, pci->func);
> +    size_t read_items;
> +    uint32_t igd_opregion;
> +    uint32_t error = 0xffffffff;

I think this constant wants to gain a #define, to be able to correlate
the use sites. I'm also not sure of the value - in principle the
register can hold this value, but of course then it won't be 3 pages.
Maybe the error check further down should be to see whether adding 2
to the value would overflow in 32 bits? (In that case a #define may
not be needed anymore, as there wouldn't be multiple instances of the
constant in the code.)

> +
> +    FILE *f = fopen(pci_device_config_path, "r");
> +    if (!f) {

While libxl has some special style rules, I think it still wants a
blank line between declaration(s) and statement(s), just like we
expect elsewhere. Effectively you want to simply move the blank line
you have one line down.

> @@ -2531,6 +2572,37 @@ int libxl__grant_vga_iomem_permission(libxl__gc *gc, const uint32_t domid,
>                    domid, vga_iomem_start, (vga_iomem_start + 0x20 - 1));
>              return ret;
>          }
> +
> +        /* If this is an Intel IGD, allow access to the IGD opregion */
> +        if (!libxl__is_igd_vga_passthru(gc, d_config)) return 0;

Despite the provision for "return" or alike to go on the same line
as an error code check, I don't think this is okay here. It would be
if, as iirc generally expected in libxl, you latched the function
return value into a local variable named "rc" (I think).

> +        uint32_t igd_opregion = sysfs_dev_get_igd_opregion(gc, pci);
> +        uint32_t error = 0xffffffff;

Please don't mix declarations and statements. I also don't think
"error" is really necessary as a local variable, but with the change
suggested above it might disappear anyway.

> +        if (igd_opregion == error) break;

Like above I'm not sure this is okay to all live on one line. I also
think it would be nice if you used "return 0" or "break" consistently.
Of course a related question is whether failure here should actually
be reported to the caller.

> +        vga_iomem_start = ( (uint64_t) igd_opregion ) >> XC_PAGE_SHIFT;

There's no need for a cast here, as you're right-shifting. Also
(just fyi) there would have been three to many spaces here. I'm
additionally not certain whether re-using a variable for a purpose
not matching its name is deemed acceptable by libxl maintainers.

> +        ret = xc_domain_iomem_permission(CTX->xch, stubdom_domid,
> +                                         vga_iomem_start,
> +                                         IGD_OPREGION_PAGES, 1);
> +        if (ret < 0) {
> +            LOGED(ERROR, domid,
> +                  "failed to give stubdom%d access to iomem range "
> +                  "%"PRIx64"-%"PRIx64" for IGD passthru",
> +                  stubdom_domid, vga_iomem_start, (vga_iomem_start +
> +                                                IGD_OPREGION_PAGES - 1));
> +            return ret;
> +        }

I have to admit that I find it odd that this is done unconditionally,
but I notice the same is done in pre-existing code. I would have
expected this to happen only when there actually is a device model
stub domain.

Jan

> +        ret = xc_domain_iomem_permission(CTX->xch, domid,
> +                                         vga_iomem_start,
> +                                         IGD_OPREGION_PAGES, 1);
> +        if (ret < 0) {
> +            LOGED(ERROR, domid,
> +                  "failed to give dom%d access to iomem range "
> +                  "%"PRIx64"-%"PRIx64" for IGD passthru",
> +                  domid, vga_iomem_start, (vga_iomem_start +
> +                                           IGD_OPREGION_PAGES - 1));
> +            return ret;
> +        }
>          break;
>      }
>  



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 11:49:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 11:49:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290759.493223 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU5gM-0006vJ-16; Tue, 15 Mar 2022 11:49:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290759.493223; Tue, 15 Mar 2022 11:49:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU5gL-0006vC-U5; Tue, 15 Mar 2022 11:49:41 +0000
Received: by outflank-mailman (input) for mailman id 290759;
 Tue, 15 Mar 2022 11:49:41 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=GQWC=T2=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nU5gL-0006v6-92
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 11:49:41 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id fe9755fc-a455-11ec-853b-5f4723681683;
 Tue, 15 Mar 2022 12:49:39 +0100 (CET)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur02lp2059.outbound.protection.outlook.com [104.47.4.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-28-OBMdrwm4NWWvrlwLbU35QQ-1; Tue, 15 Mar 2022 12:49:38 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM6PR04MB4565.eurprd04.prod.outlook.com (2603:10a6:20b:25::27)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.28; Tue, 15 Mar
 2022 11:49:36 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5061.028; Tue, 15 Mar 2022
 11:49:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fe9755fc-a455-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647344979;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=KhYhhaPJca2TdZrfrFQl2b9CBf3Fl8SouBs5ymmkyuI=;
	b=AWAAneUmYUWt6lsOqrwbv46Q5XZjNjYjM45vmmByOaXAGhZOc61znstZi5Zcs/bh2jRoZX
	hwTuPlkoFhrF0e1H5bt+rBvXz7r3rMt0MlH2m4abonC3HICCZZdvj0pOkdWYAoXFgkTTQr
	ankKCLklKk0TRad3i0WagMYj3zLIbs4=
X-MC-Unique: OBMdrwm4NWWvrlwLbU35QQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=TOUJRV/fUPcj3nc5pQQ8NN/e1lFNN9vd5Tng6ULbamAEMzvonh8OD8R8EUMX4V4V/trpwV8sM5sGj0SoGxIhX0fLYe8I2Es7ezSQunURhz4VBnij8i5gT2l5dKQOx0CJKrSF5qoLuweRXKciknz9NNavznSdPB/E6/5kdORF5Fd9vX4NuuIX8Y/crvuNsSBxEL3sfBYZWduN1TUY/5xG2G8aw59Wqoslr3Zd7HYGatg2Y/OEE2A0xHFN4fEIfITIKGFI2NU4FvYXRyd7nMaMiNkzraG23MvyHQBmN7sV40Wz7eqXSGNtwjJ4HIRztCzet92g9u74HHUVM09w0SgwpQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=KhYhhaPJca2TdZrfrFQl2b9CBf3Fl8SouBs5ymmkyuI=;
 b=iKM6MMX/oVHzDYyYM+LLj2g3CiBoWNlnDMaDSuN1TYlAOapmQ5EB/JTcVQHNgKRoxUDXNnE6o9RlDhMzvCzrk49dPPDNxL2vOsabr8jBzFue6KHSixS1VUiD2NGzNHBgfCmpRnctrcsnEtzN6dP35OXad0vfcxBLP7qfvPzCKHe4FBeNmBkWD/iEOw26hPoYPomrlkKm828fDQsgkq41KSomGuVlu7Km2UqEGbzFpKLfwk8MhAeYte5SCx0Dywh7dj7gCjWDrV9rztQmmcmIllOWuQsY6J7kqcgH3mtrmZvVn7LRGQO6SkKrGblOqB9Ba7PXyE7alLXOL0i7Q+jH+A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <c2943ff5-50ff-1eec-e322-6acc1879e7af@suse.com>
Date: Tue, 15 Mar 2022 12:49:34 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH] x86: re-inline indirect CALL/JMP
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P195CA0007.EURP195.PROD.OUTLOOK.COM
 (2603:10a6:209:81::20) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: b3129320-7a6c-442d-5f4c-08da0679e127
X-MS-TrafficTypeDiagnostic: AM6PR04MB4565:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB45655C4F1C9BC2A972A9546EB3109@AM6PR04MB4565.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(4326008)(5660300002)(38100700002)(31696002)(66946007)(66476007)(8936002)(66556008)(86362001)(8676002)(6486002)(966005)(508600001)(316002)(6916009)(54906003)(36756003)(83380400001)(26005)(2616005)(186003)(31686004)(2906002)(6506007)(6512007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?T0lsT3FxZ2VIWGwrZDVxYTlESlFLc2VNbDZzSlh6SndTMm54SlB4SGZtdC8r?=
 =?utf-8?B?Q2czQnh4VU1rbWVHcEkvdkkyaUFHb2V3cDcvUVN3di8wOXczYjRJeW1pUnM0?=
 =?utf-8?B?N3hsODNpNWFBSEFuR2J0YmJMQjJybkpoYmE0eVhkSEp2eGZiZFVRcnk4d0Jl?=
 =?utf-8?B?WHlHVERCWStTbldjcVR3MW5tMFNBdll1SjdlcWp0VkljamZPdk5DeDRnUTFB?=
 =?utf-8?B?OEtZRGVEeE50RW4xM0tkL0hSNnB1bXpqQjQwWHJoQVM5eEt6N1NGdlAvTVJw?=
 =?utf-8?B?UFkwTGhpUSt3ZUJvb3JpWW9GNFJOLzR6MFVJNEpIZXVvdUJxVmlTRlFpVzJV?=
 =?utf-8?B?KzU0N0lReGJLN0FBc1hhWmRRYXFUYXhXVFZycEhpM2w1Q0Yxd3JBNFlaWmlI?=
 =?utf-8?B?Z3AyTUZlaFpjN09HeDhhNXNMV2hIUVpuVkErNWtGU2N6K0JZbDFNR2c0RGVY?=
 =?utf-8?B?bllyRUpIMHFHOG5SRHkvcno4TlhZVXovUFU5M0J2LzVITnVYZ2tqZytqbFBr?=
 =?utf-8?B?REFnVGl5aEhMTVdxK0NLclZ0NUtPZERhT29CcU9XNGFKZlp0UlRaWFdwQWlZ?=
 =?utf-8?B?TjJsWndSa0diblQ4cGx2TVk2NUJkTFNnbktNd0dvZGVCdmk1d29LNTFxbVZU?=
 =?utf-8?B?TzBrejYxa3RWQmhWeGV1V0w2V0c0TGpqYWhyQjVleCtXNWZxUkY2V1RVelpR?=
 =?utf-8?B?R0lwU3lWcWgvNlpTREQ0WEtyeTJmTE41Z2ZPNE15blRITjBHcDVQNUptSDlW?=
 =?utf-8?B?WWUxMlQrZ2NEY0h1TGV5RnV4M2dOT2JpNjUwbTB1RFlPM21mZ1VVQU9nTXhH?=
 =?utf-8?B?OFRrZFd4OHJvS212bHdTWHVQc3NLbnM3c1daM3JHZFZmb1dvWXNrMWlYeFl4?=
 =?utf-8?B?VEI5UFZlOXVFN2hTdVh5eSsyWTFoemNDY29tbmJOV3ZqR2NyQUhqZWh6SjYv?=
 =?utf-8?B?UWYrc3RpMUFwbTNxM3hOZFVOWW5RRDIxY0RQb29mMmNUUEJlcHhtaWhsNnVx?=
 =?utf-8?B?WDFVa1pXL1EzOUkrZS9BM3hMZ0pMYVUwY3RpMEZZdTFHVTJsczdKWlo3azZj?=
 =?utf-8?B?c3ZYR0VuZXQ2OGR2MDVuTXdCR1RURnRsY0NoaktlOE9IK1JGWWJrdFpGZGRB?=
 =?utf-8?B?djIwbkk3MksrcFVuTEFVNkJDQUJjV0lUSmFFeE1vNUNuRDAvOFUva1E5ZGFr?=
 =?utf-8?B?MDV5ZHhWWjVPeGJVQm44SktvQXg3UnIwZ050eXU2d3pEMVJiZyt3UVdVKzVM?=
 =?utf-8?B?WE13LzVhNW56cGtjQVk3ZS9Zamh1V0g2RTIwMmRiSHJRTkpJdThtaGc3cDM3?=
 =?utf-8?B?eEVXdjdQVTBiSTdRcWlpZ0lCNFUrTDlObURlcEtGQ3NxRXJyREtjRmJYSmdp?=
 =?utf-8?B?bGNGdkJkcWpCRjNTMmxTNHgyUGNQVmdPdVY1bUxkcStUTUFVOXFzb29uRUwz?=
 =?utf-8?B?Y2Fac0h3ZzQ1MUFWQUZaQzlKMWVlSDZZVjJtUmlJWTdiN1dneXFwc3Q3NjA5?=
 =?utf-8?B?ZGdkc2Qxc3pWUTdwY1JHS1VwMW5ycVJYNVBYY2Q3ZG5vK3pKWmRJWWZhOWF1?=
 =?utf-8?B?dlRUYnNRNWk0a2ZlaDBYaXg1aVNMdFE0bkZUWlJsNnpwcGozOTVxTEhGbzF0?=
 =?utf-8?B?NWU5QmdPc3lWc1RRNnhmVi9nSzg2emdTam5RTVhwWkJ3aXdZN21OMkFOaWQx?=
 =?utf-8?B?SXEwZ0FNTTlaUEl0ME9pMTFCeEh1bzhmbTlVazcvd0xHbmtHUUF2VER0Vmhw?=
 =?utf-8?B?MGNNNS9HWVdQYXpkVndtNHcxVXpnaHlrTDdRSFlFbngrZUR3ajVYV0I0WnlU?=
 =?utf-8?B?ZWthTmZTTml5eDRPdGZvR2F3a0oxSVJ2VlMydkt2K3FMSlRBZUJuRVJHeTlS?=
 =?utf-8?B?YWhZN0dmT1AwMDdZaCsydzdsWGVzQXorU2k4T0lqaXM1b1I4QkVTcTJzeHZw?=
 =?utf-8?Q?/AIGSw5EZgdUHgc5EqNoZzTdmGqAzHb6?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b3129320-7a6c-442d-5f4c-08da0679e127
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Mar 2022 11:49:36.5547
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: f4WydoumyxMI8ra0vOVpn/xTzLbpmRaBDVS+TqGLmltPctH5qonObEwhwytZbd8ZUVxcuZSaILHVQdPatxFJkQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB4565

Using the same thunk for heterogeneous calls (i.e. ones to functions
with entirely different parameter types) is a problem: Speculation may
e.g. result in use as pointers for arguments which are are actually
integers. This is a result of target prediction information being tied
to the address of the RET instruction in each thunk (of which we've got
only 15, and of which in turn a fair share of the call sites use the
single one where %rax is holding the target address).

Except when actually using the full retpoline, arrange for alternatives
patching to put the JMP and LFENCE forms of the thunk back inline.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
I'm sure I didn't get the reasoning right / complete; I'd appreciate
clear enough indication of what needs adding/changing.

Some of the changes to may not strictly be necessary:
- INDIRECT_BRANCH: We don't have any uses left in assembly code.
- GEN_INDIRECT_THUNK: Continuing to patch the thunks when they're not
  used is merely pointless. The change, however, is more in anticipation
  that X86_FEATURE_IND_THUNK_{LFENCE,JMP} may not be fully suitable
  names anymore when the code gets inlined (at least I probably wouldn't
  call such "thunk" anymore).

While perhaps not a big problem, I'd like to point out that this more
than doubles the size of the .altinstr_replacement section (with an
accordingly large increase of .altinstructions), unless we were to make
use of "x86/alternatives: allow replacement code snippets to be merged"
(which of course affects only .altinstr_replacement).

--- a/xen/Makefile
+++ b/xen/Makefile
@@ -195,7 +195,7 @@ t2 = $(call as-insn,$(CC) -I$(BASEDIR)/a
 # https://bugs.llvm.org/show_bug.cgi?id=36110
 t3 = $(call as-insn,$(CC),".macro FOO;.endm"$(close); asm volatile $(open)".macro FOO;.endm",-no-integrated-as)
 
-CLANG_FLAGS += $(call or,$(t1),$(t2),$(t3))
+CLANG_FLAGS += $(call or,$(t1),$(t2),$(t3),-DCLANG_INTEGRATED_AS)
 endif
 
 CLANG_FLAGS += -Werror=unknown-warning-option
--- a/xen/arch/x86/Makefile
+++ b/xen/arch/x86/Makefile
@@ -240,7 +240,7 @@ $(obj)/efi/buildid.o $(obj)/efi/relocs-d
 .PHONY: include
 include: $(BASEDIR)/arch/x86/include/asm/asm-macros.h
 
-$(obj)/asm-macros.i: CFLAGS-y += -D__ASSEMBLY__ -P
+$(obj)/asm-macros.i: CFLAGS-y += -D__ASSEMBLY__ -D__ASM_MACROS__ -P
 
 $(BASEDIR)/arch/x86/include/asm/asm-macros.h: $(obj)/asm-macros.i $(src)/Makefile
 	$(call filechk,asm-macros.h)
--- a/xen/arch/x86/alternative.c
+++ b/xen/arch/x86/alternative.c
@@ -244,11 +244,19 @@ static void init_or_livepatch _apply_alt
 
             a->priv = 1;
 
-            /* Nothing useful to do? */
-            if ( toolchain_nops_are_ideal || a->pad_len <= 1 )
+            /* No padding at all? */
+            if ( !a->pad_len )
                 continue;
 
-            add_nops(buf, a->pad_len);
+            /* For a JMP to an indirect thunk, replace NOP by INT3. */
+            if ( IS_ENABLED(CONFIG_SPECULATIVE_HARDEN_BRANCH) &&
+                 a->cpuid == X86_FEATURE_IND_THUNK_JMP && orig[0] == 0xe9 )
+                memset(buf, 0xcc, a->pad_len);
+            /* Nothing useful to do? */
+            else if ( toolchain_nops_are_ideal || a->pad_len <= 1 )
+                continue;
+            else
+                add_nops(buf, a->pad_len);
             text_poke(orig + a->orig_len, buf, a->pad_len);
             continue;
         }
@@ -330,7 +338,12 @@ static void init_or_livepatch _apply_alt
 
         a->priv = 1;
 
-        add_nops(buf + a->repl_len, total_len - a->repl_len);
+        /* When re-inlining an indirect JMP, pad it by INT3, not NOPs. */
+        if ( IS_ENABLED(CONFIG_SPECULATIVE_HARDEN_BRANCH) &&
+             a->cpuid == X86_FEATURE_IND_THUNK_JMP && orig[0] == 0xe9 )
+            memset(buf + a->repl_len, 0xcc, total_len - a->repl_len);
+        else
+            add_nops(buf + a->repl_len, total_len - a->repl_len);
         text_poke(orig, buf, total_len);
     }
 
--- a/xen/arch/x86/asm-macros.c
+++ b/xen/arch/x86/asm-macros.c
@@ -1,2 +1,3 @@
 #include <asm/asm-defns.h>
 #include <asm/alternative-asm.h>
+#include <asm/spec_ctrl_asm.h>
--- a/xen/arch/x86/extable.c
+++ b/xen/arch/x86/extable.c
@@ -98,12 +98,42 @@ search_exception_table(const struct cpu_
          regs->rsp > (unsigned long)regs &&
          regs->rsp < (unsigned long)get_cpu_info() )
     {
-        unsigned long retptr = *(unsigned long *)regs->rsp;
+        unsigned long retaddr = *(unsigned long *)regs->rsp;
+        unsigned long retptr = 0;
+        unsigned int pad = 0;
 
-        region = find_text_region(retptr);
-        retptr = region && region->ex
-                 ? search_one_extable(region->ex, region->ex_end - 1, retptr)
-                 : 0;
+        region = find_text_region(retaddr);
+        while ( region && region->ex )
+        {
+            retptr = search_one_extable(region->ex, region->ex_end - 1,
+                                        retaddr + pad);
+            if ( !retptr )
+            {
+                /*
+                 * Indirect call thunk patching can lead to NOP padding between
+                 * the CALL and the recovery entry recorded in .fixup.  Skip
+                 * past such NOPs.  See asm/nops.h for the forms possible and
+                 * note that no more than 3 bytes of padding will be present.
+                 */
+                const uint8_t *ptr = (void *)retaddr + pad;
+
+                switch ( ptr[0] )
+                {
+                case 0x66:
+                case 0x90:
+                    if ( ++pad > 3 )
+                        break;
+                    continue;
+
+                case 0x0f:
+                    if ( pad || ptr[1] != 0x1f || ptr[2] != 0x00 )
+                        break;
+                    pad = 3;
+                    continue;
+                }
+            }
+            break;
+        }
         if ( retptr )
         {
             /*
--- a/xen/arch/x86/include/asm/asm-defns.h
+++ b/xen/arch/x86/include/asm/asm-defns.h
@@ -33,7 +33,13 @@
         $done = 0
         .irp reg, ax, cx, dx, bx, bp, si, di, 8, 9, 10, 11, 12, 13, 14, 15
         .ifeqs "\arg", "%r\reg"
+#ifdef __ASM_MACROS__
             \insn __x86_indirect_thunk_r\reg
+#else
+            ALTERNATIVE_2 "\insn __x86_indirect_thunk_r\reg", \
+                          "lfence; \insn *\arg", X86_FEATURE_IND_THUNK_LFENCE, \
+                          "\insn *\arg", X86_FEATURE_IND_THUNK_JMP
+#endif
             $done = 1
            .exitm
         .endif
--- a/xen/arch/x86/include/asm/spec_ctrl_asm.h
+++ b/xen/arch/x86/include/asm/spec_ctrl_asm.h
@@ -20,7 +20,7 @@
 #ifndef __X86_SPEC_CTRL_ASM_H__
 #define __X86_SPEC_CTRL_ASM_H__
 
-#ifdef __ASSEMBLY__
+#if defined(__ASSEMBLY__) && !defined(__ASM_MACROS__)
 #include <asm/msr-index.h>
 #include <asm/spec_ctrl.h>
 
@@ -300,7 +300,50 @@ UNLIKELY_DISPATCH_LABEL(\@_serialise):
 .L\@_skip:
 .endm
 
-#endif /* __ASSEMBLY__ */
+#elif defined(__ASM_MACROS__) && defined(CONFIG_INDIRECT_THUNK) && \
+      !defined(CLANG_INTEGRATED_AS)
+
+/*
+ * To allow re-inlining of indirect branches, override CALL and JMP insn
+ * mnemonics, to attach alternatives patching data.
+ */
+.macro call operand:vararg
+    branch$ call \operand
+.endm
+.macro callq operand:vararg
+    branch$ callq \operand
+.endm
+.macro jmp operand:vararg
+    branch$ jmp \operand
+.endm
+.macro branch$ insn:req, operand:vararg
+    .purgem \insn
+
+    $done = 0
+    .irp reg, ax, cx, dx, bx, bp, si, di, 8, 9, 10, 11, 12, 13, 14, 15
+        .ifeqs "\operand", "__x86_indirect_thunk_r\reg"
+            ALTERNATIVE_2 "\insn \operand", \
+                          "lfence; \insn *%r\reg", X86_FEATURE_IND_THUNK_LFENCE, \
+                          "\insn *%r\reg", X86_FEATURE_IND_THUNK_JMP
+            $done = 1
+            .exitm
+        .endif
+        .ifeqs "\operand", "__x86_indirect_thunk_r\reg\(@plt)"
+            .error "unexpected: \insn \operand"
+            .exitm
+        .endif
+    .endr
+
+    .if !$done
+        \insn \operand
+    .endif
+
+    .macro \insn operand:vararg
+        branch$ \insn \\(operand)
+    .endm
+.endm
+
+#endif /* __ASSEMBLY__ / __ASM_MACROS__ */
 #endif /* !__X86_SPEC_CTRL_ASM_H__ */
 
 /*
--- a/xen/arch/x86/indirect-thunk.S
+++ b/xen/arch/x86/indirect-thunk.S
@@ -38,9 +38,13 @@
         .section .text.__x86_indirect_thunk_\reg, "ax", @progbits
 
 ENTRY(__x86_indirect_thunk_\reg)
+#ifdef CLANG_INTEGRATED_AS
         ALTERNATIVE_2 __stringify(IND_THUNK_RETPOLINE \reg),              \
         __stringify(IND_THUNK_LFENCE \reg), X86_FEATURE_IND_THUNK_LFENCE, \
         __stringify(IND_THUNK_JMP \reg),    X86_FEATURE_IND_THUNK_JMP
+#else
+        IND_THUNK_RETPOLINE \reg
+#endif
 
         int3 /* Halt straight-line speculation */
 



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 12:12:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 12:12:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290766.493234 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU622-0001tz-3g; Tue, 15 Mar 2022 12:12:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290766.493234; Tue, 15 Mar 2022 12:12:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU622-0001ts-0Q; Tue, 15 Mar 2022 12:12:06 +0000
Received: by outflank-mailman (input) for mailman id 290766;
 Tue, 15 Mar 2022 12:12:04 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=CG/1=T2=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nU620-0001tm-Iy
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 12:12:04 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04on0622.outbound.protection.outlook.com
 [2a01:111:f400:fe0d::622])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 1ccd7e27-a459-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 13:12:01 +0100 (CET)
Received: from AS9PR06CA0090.eurprd06.prod.outlook.com (2603:10a6:20b:464::7)
 by PAXPR08MB7383.eurprd08.prod.outlook.com (2603:10a6:102:22e::13)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.23; Tue, 15 Mar
 2022 12:11:50 +0000
Received: from VE1EUR03FT052.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:464:cafe::ad) by AS9PR06CA0090.outlook.office365.com
 (2603:10a6:20b:464::7) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.25 via Frontend
 Transport; Tue, 15 Mar 2022 12:11:50 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT052.mail.protection.outlook.com (10.152.19.173) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Tue, 15 Mar 2022 12:11:49 +0000
Received: ("Tessian outbound 18e50a6f0513:v113");
 Tue, 15 Mar 2022 12:11:49 +0000
Received: from 4baf0c564e4f.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 CCFA2197-1772-4002-B036-DDF0526C972D.1; 
 Tue, 15 Mar 2022 12:11:37 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 4baf0c564e4f.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 15 Mar 2022 12:11:37 +0000
Received: from VI1PR08MB3967.eurprd08.prod.outlook.com (2603:10a6:803:df::16)
 by AM5PR0801MB1859.eurprd08.prod.outlook.com (2603:10a6:203:49::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.25; Tue, 15 Mar
 2022 12:11:36 +0000
Received: from VI1PR08MB3967.eurprd08.prod.outlook.com
 ([fe80::479:b7f8:ba2a:4a74]) by VI1PR08MB3967.eurprd08.prod.outlook.com
 ([fe80::479:b7f8:ba2a:4a74%5]) with mapi id 15.20.5061.029; Tue, 15 Mar 2022
 12:11:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1ccd7e27-a459-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=TVAmjpd1CCzL+Vp50+ccT1pWv7M3Arh/X4BNW9B9INQ=;
 b=ElTiB3/wm48wnNjVYEtlJS86BvrdIEJiD9mveV5OqZIzvo/tAcl7A1MSgP/bOgStj7AI36RSjeBOrL1a0o862dhAKs0chgRKz3+4f1D83cKrzsw54XNkdDW+OWKQVaYna0uWyBzoBqMq2lJf2D7U6b079RwEZdacZ3Tt2kRTtsk=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 48ae17a974f51e96
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=jtUonbrhGejQco+4M1MWMGeg6RiecHgeuP0SpJeciYifmRQ7CrExzBjsLABzVaO3BvGhRsqGPLoH7VUh2678fGLCQPbZLe1WVFQ0vG8nPya7Sv+9If53/DXDd4tWgFqkAfGMndQfE8pFNp5hsZfOwl78W3cCz0Vj1JPB/SO0k0Ycc/j4ySlkQc0j7FRUICcHcw/baKKfHejBjHHGG7T1j3071gEtF+EY+bDDN/619Mx6n0aFBtlTvUhJbUG1ySrk+mu6qnm6TA3B3ys/LIWDb5zP2XFvS1xCTUUMZD2rDxmlE8LG8EYzfr59AlfrDigQ9Fp4uyOvU5CpCP30PwIZFQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=TVAmjpd1CCzL+Vp50+ccT1pWv7M3Arh/X4BNW9B9INQ=;
 b=ckpGAo2phJBxAXlAoNppq58KWhalCTDoIS6GeVJIR2jR+IMOvZgbl64z5xdj5qe2NwpuUYzN0pKBCbAYLSnZk2+ycv9dX3XWVVsJx/E45etljzMLbQGd7HZrn2Tn1IJRT4pP0H7NARFTBzKf8CnBJ6K0v3HqqWj5D3sCnwpZX4gDlZqrynSEatNdh8InBpbv/xLTTcvbood/TdtIAeq/z+40eSplZATPysu5dgpSntTD89k6eQdazl/N8vbz1kL9hpFYyrBxLnWeTteb5lFAonYKS9DaUso1ayr2Rj7v6f4VUgZcSd2tC8h08UNS2ovbLJ8qoi396OoQuyMFmA7xOA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=TVAmjpd1CCzL+Vp50+ccT1pWv7M3Arh/X4BNW9B9INQ=;
 b=ElTiB3/wm48wnNjVYEtlJS86BvrdIEJiD9mveV5OqZIzvo/tAcl7A1MSgP/bOgStj7AI36RSjeBOrL1a0o862dhAKs0chgRKz3+4f1D83cKrzsw54XNkdDW+OWKQVaYna0uWyBzoBqMq2lJf2D7U6b079RwEZdacZ3Tt2kRTtsk=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Vikram Garhwal <fnu.vikram@xilinx.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, "sstabellini@kernel.org"
	<sstabellini@kernel.org>, "julien@xen.org" <julien@xen.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, "volodymyr_babchuk@epam.com"
	<volodymyr_babchuk@epam.com>, Wei Liu <wl@xen.org>, Anthony PERARD
	<anthony.perard@citrix.com>
Subject: Re: [XEN][RFC PATCH v3 14/14] tools/xl: Add new xl command overlay
 for device tree overlay support
Thread-Topic: [XEN][RFC PATCH v3 14/14] tools/xl: Add new xl command overlay
 for device tree overlay support
Thread-Index: AQHYMyV7Tz8Y/V6GBEKWpNuLuSXXYKzAZVaA
Date: Tue, 15 Mar 2022 12:11:35 +0000
Message-ID: <C65BA40D-E35D-403A-A544-18A9EE80D3AD@arm.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
 <20220308194704.14061-15-fnu.vikram@xilinx.com>
In-Reply-To: <20220308194704.14061-15-fnu.vikram@xilinx.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: d1e89e8e-beb1-4b05-6ce2-08da067cfbe2
x-ms-traffictypediagnostic:
	AM5PR0801MB1859:EE_|VE1EUR03FT052:EE_|PAXPR08MB7383:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR08MB73839D56DF365EA43E35617BE4109@PAXPR08MB7383.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 8bLZlwa9e5dCCclcZ//eEASdimFu/PIAcFLXHMfiTus1os8w49NG1DBsNbVQfwObQUIsP8krYAp/imEZC0MHW+ls9+boCY81MVc/UlWZpPMA+KUuffDyVqRD9uB55gItgBBxih1/QFB6aItsxTL+eHdG0cVAjQRtpRVPsvjlxRXU0Y1CBWoV2uQV1WFgdMP+F+yf6AZtvM9Le5q+CiTmH9uzwdxjW3ZoN9uE9YoZeqn3Ev/1+zAQn5CoFIJ7wDuatw4s24gukoKQy5ooZm6KALwwGtciohbpnN0+Qh53062PEjc+o+9BzrlayKk7btnxBs2MWy6ePaohBDE/va8dAX5R9hlc2r19H7c1YBb9eSgj7QKDutvbIY8hF3mNZIbkQ7arIYm+hJ0GWYjYf4V/Qk4EKvBvSjNHwv+GA3MZDFq01DOv+Gd/WwmcisbNMdb0usPQl8f2/SUauIT5CqcW2i5xiRNVjBDU8/MQCv9wDFv9rO7g7FsGtMG2rwSRX2s8rQsde4oZCHigMXfD2uT5NzH2L1yJO7pZcJJ1D9gNFroYI7H460DACF6Vn2xOdNLMVd2o73aopVqOLjN2EhMlb8oMDk4iDVb0A1mcTUfu4RotXNJOCFnKPwEjerc35AKjhcS0h4T9R6p7hTiY6Vq7DvmZAQbVks/PVc3oeBgQeUE0tNSIiiiwAbiKp+Y/t6Kz79UJ2fO+5U17UEMNJWs58V8x5BZxR/BpxhSgMpmxjTC1kCHJE+gAvbehykos2uT6
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR08MB3967.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(316002)(38100700002)(6486002)(86362001)(91956017)(53546011)(122000001)(54906003)(6916009)(8936002)(83380400001)(76116006)(8676002)(6512007)(64756008)(66446008)(66556008)(66476007)(66946007)(36756003)(508600001)(6506007)(2616005)(5660300002)(186003)(71200400001)(26005)(38070700005)(4326008)(2906002)(33656002)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <9840A62848903D41AD99768E1BABBD5C@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0801MB1859
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT052.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	d9b9ab8b-151b-4e6c-cde4-08da067cf3b6
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(316002)(6862004)(8676002)(36756003)(2906002)(54906003)(70206006)(70586007)(4326008)(53546011)(33656002)(6486002)(6506007)(6512007)(5660300002)(8936002)(508600001)(356005)(336012)(26005)(81166007)(186003)(2616005)(47076005)(107886003)(83380400001)(86362001)(36860700001)(40460700003)(82310400004);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Mar 2022 12:11:49.6884
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: d1e89e8e-beb1-4b05-6ce2-08da067cfbe2
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT052.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB7383



> On 8 Mar 2022, at 19:47, Vikram Garhwal <fnu.vikram@xilinx.com> wrote:
>=20
> Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com>
> ---
> tools/xl/xl.h           |  4 ++++
> tools/xl/xl_cmdtable.c  |  6 ++++++
> tools/xl/xl_vmcontrol.c | 45 +++++++++++++++++++++++++++++++++++++++++
> 3 files changed, 55 insertions(+)
>=20
> diff --git a/tools/xl/xl.h b/tools/xl/xl.h
> index c5c4bedbdd..604fd5bb94 100644
> --- a/tools/xl/xl.h
> +++ b/tools/xl/xl.h
> @@ -97,6 +97,9 @@ struct save_file_header {
>=20
> #define SAVEFILE_BYTEORDER_VALUE ((uint32_t)0x01020304UL)
>=20
> +#define XL_DT_OVERLAY_ADD                   1
> +#define XL_DT_OVERLAY_REMOVE                2

Maybe you can get rid of them and ...

> +
> void save_domain_core_begin(uint32_t domid,
>                             int preserve_domid,
>                             const char *override_config_file,
> @@ -139,6 +142,7 @@ int main_shutdown(int argc, char **argv);
> int main_reboot(int argc, char **argv);
> int main_list(int argc, char **argv);
> int main_vm_list(int argc, char **argv);
> +int main_dt_overlay(int argc, char **argv);
> int main_create(int argc, char **argv);
> int main_config_update(int argc, char **argv);
> int main_button_press(int argc, char **argv);
> diff --git a/tools/xl/xl_cmdtable.c b/tools/xl/xl_cmdtable.c
> index 661323d488..5812d19db8 100644
> --- a/tools/xl/xl_cmdtable.c
> +++ b/tools/xl/xl_cmdtable.c
> @@ -20,6 +20,12 @@
> #include "xl.h"
>=20
> const struct cmd_spec cmd_table[] =3D {
> +    { "overlay",
> +      &main_dt_overlay, 1, 1,
> +      "Add/Remove a device tree overlay",
> +      "add/remove <.dtbo>"
> +      "-h print this help\n"
> +    },
>     { "create",
>       &main_create, 1, 1,
>       "Create a domain from config file <filename>",
> diff --git a/tools/xl/xl_vmcontrol.c b/tools/xl/xl_vmcontrol.c
> index 435155a033..76b969dc33 100644
> --- a/tools/xl/xl_vmcontrol.c
> +++ b/tools/xl/xl_vmcontrol.c
> @@ -1262,6 +1262,51 @@ int main_create(int argc, char **argv)
>     return 0;
> }
>=20
> +int main_dt_overlay(int argc, char **argv)
> +{
> +    const char *overlay_ops =3D argv[1];
> +    const char *overlay_config_file =3D argv[2];
> +    void *overlay_dtb =3D NULL;
> +    int rc;
> +    uint8_t op;
> +    int overlay_dtb_size =3D 0;
> +
> +    if (overlay_ops =3D=3D NULL) {
> +        fprintf(stderr, "No overlay operation mode provided\n");
> +        return ERROR_FAIL;
> +    }
> +
> +    if (strcmp(overlay_ops, "add") =3D=3D 0)
> +        op =3D XL_DT_OVERLAY_ADD;
> +    else if (strcmp(overlay_ops, "remove") =3D=3D 0)
> +        op =3D XL_DT_OVERLAY_REMOVE;

Use them there, maybe defining const int <name> =3D <value>

Since these values are only used there




From xen-devel-bounces@lists.xenproject.org Tue Mar 15 12:31:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 12:31:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290770.493245 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU6Kh-0004Hr-NW; Tue, 15 Mar 2022 12:31:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290770.493245; Tue, 15 Mar 2022 12:31:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU6Kh-0004Hk-KI; Tue, 15 Mar 2022 12:31:23 +0000
Received: by outflank-mailman (input) for mailman id 290770;
 Tue, 15 Mar 2022 12:31:23 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU6Kg-0004Ha-Va; Tue, 15 Mar 2022 12:31:22 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU6Kg-000306-Tt; Tue, 15 Mar 2022 12:31:22 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU6Kg-0005Nf-Ew; Tue, 15 Mar 2022 12:31:22 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nU6Kg-0003Pk-E4; Tue, 15 Mar 2022 12:31:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=MjDhfedNLUKCzIoV/SJ8TSqulh4nitJD9+3nrpzrB10=; b=EXL7tUL+fJvTUMgZtKvIhERqU5
	2ciRWLT3xUATaLU6N5NoA24CjQVmWIDeLYFLQK5/UWApmCCsk+OrRuL6gojrCdjZiyA0F2164KAg6
	n2fQGA4D4sMNy6XMNq8t1KM6+6WmT7iTLOpv8E8Fm6wD7hFOs/1l/Fezq8IKWGlhqjC4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168610-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168610: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=a13dfc769bd7097d8d9ffe3e029a2c1d062d712b
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 15 Mar 2022 12:31:22 +0000

flight 168610 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168610/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 a13dfc769bd7097d8d9ffe3e029a2c1d062d712b
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   15 days
Failing since        168258  2022-03-01 01:55:31 Z   14 days  139 attempts
Testing same since   168579  2022-03-14 08:41:36 Z    1 days   10 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 629 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 13:24:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 13:24:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290778.493256 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU79X-00012T-Iq; Tue, 15 Mar 2022 13:23:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290778.493256; Tue, 15 Mar 2022 13:23:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU79X-00012M-Fe; Tue, 15 Mar 2022 13:23:55 +0000
Received: by outflank-mailman (input) for mailman id 290778;
 Tue, 15 Mar 2022 13:23:53 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU79V-00012B-Ts; Tue, 15 Mar 2022 13:23:53 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU79V-0003rL-Rz; Tue, 15 Mar 2022 13:23:53 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU79V-0007Cf-Hu; Tue, 15 Mar 2022 13:23:53 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nU79V-0001EU-HQ; Tue, 15 Mar 2022 13:23:53 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=r+VLWpChW/okAr0Q/TapuSpEbgQrSNfnZQXmjOp5+fU=; b=Zw601yVYGrXTVmifKC4AioAVvN
	9vFdK5TUAKmZaLFis7f22dV6z2v0aNLqEO61zLcBLX3OaM+IPqbvcHCM3TJe24eY/pLQ/fucTu48h
	V8gHGyyZTCWNVFrWJdXHn5sJ4ikezV1rXwluoc7pJyWStQfZl+R9FXUFLoepzVVTwqtc=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168614-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168614: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=a13dfc769bd7097d8d9ffe3e029a2c1d062d712b
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 15 Mar 2022 13:23:53 +0000

flight 168614 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168614/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 a13dfc769bd7097d8d9ffe3e029a2c1d062d712b
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   15 days
Failing since        168258  2022-03-01 01:55:31 Z   14 days  140 attempts
Testing same since   168579  2022-03-14 08:41:36 Z    1 days   11 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 629 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 13:34:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 13:34:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290785.493267 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU7Jb-0002XD-Jz; Tue, 15 Mar 2022 13:34:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290785.493267; Tue, 15 Mar 2022 13:34:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU7Jb-0002X6-Gl; Tue, 15 Mar 2022 13:34:19 +0000
Received: by outflank-mailman (input) for mailman id 290785;
 Tue, 15 Mar 2022 13:34:18 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU7Ja-0002Ww-9i; Tue, 15 Mar 2022 13:34:18 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU7Ja-00041S-3v; Tue, 15 Mar 2022 13:34:18 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU7JZ-0007bs-MQ; Tue, 15 Mar 2022 13:34:17 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nU7JZ-00079X-Ly; Tue, 15 Mar 2022 13:34:17 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=7pCdmL/Q3QNEePT2Vio4IUvx+INAnofLizo86gAA9y4=; b=AKbunWAfb4RPgA+uMOeq9vuTRz
	FIhfTdPA3m7/A9jGg2221yQLvlO+v48hU4xU/OUsWTUEihJR0xRty5fVIBcwgCCfQ2xgSU6UuRyQk
	cpcfAmg+6wmdXm204LPNzrs7/aCivmpUskQHEC209yd49yzivd/KrBL+e/DL32H/SQCg=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168604-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168604: tolerable FAIL
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=dedb0aa42c6d1ee31805dfc61630db2c41117330
X-Osstest-Versions-That:
    xen=dedb0aa42c6d1ee31805dfc61630db2c41117330
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 15 Mar 2022 13:34:17 +0000

flight 168604 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168604/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168585
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168585
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168585
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168585
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168585
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168585
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168585
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168585
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168585
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168585
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168585
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168585
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass

version targeted for testing:
 xen                  dedb0aa42c6d1ee31805dfc61630db2c41117330
baseline version:
 xen                  dedb0aa42c6d1ee31805dfc61630db2c41117330

Last test of basis   168604  2022-03-15 02:17:58 Z    0 days
Testing same since                          (not found)         0 attempts

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Published tested tree is already up to date.



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 13:49:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 13:49:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290797.493278 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU7YY-0004EL-8v; Tue, 15 Mar 2022 13:49:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290797.493278; Tue, 15 Mar 2022 13:49:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU7YY-0004EE-5L; Tue, 15 Mar 2022 13:49:46 +0000
Received: by outflank-mailman (input) for mailman id 290797;
 Tue, 15 Mar 2022 13:49:44 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=1u5x=T2=redhat.com=armbru@srs-se1.protection.inumbo.net>)
 id 1nU7YV-0004E5-Tf
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 13:49:44 +0000
Received: from us-smtp-delivery-124.mimecast.com
 (us-smtp-delivery-124.mimecast.com [170.10.133.124])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id c3a1df5b-a466-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 14:49:42 +0100 (CET)
Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com
 [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS
 (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 us-mta-562-LiPRJB8QPOiCtDGK4ztl3A-1; Tue, 15 Mar 2022 09:49:38 -0400
Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.rdu2.redhat.com
 [10.11.54.8])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 3195780281B;
 Tue, 15 Mar 2022 13:49:36 +0000 (UTC)
Received: from blackfin.pond.sub.org (unknown [10.36.112.3])
 by smtp.corp.redhat.com (Postfix) with ESMTPS id 56CE3C44AE5;
 Tue, 15 Mar 2022 13:49:35 +0000 (UTC)
Received: by blackfin.pond.sub.org (Postfix, from userid 1000)
 id 2DEBE21E66CE; Tue, 15 Mar 2022 14:49:34 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c3a1df5b-a466-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
	s=mimecast20190719; t=1647352181;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=5HlQ4H+cbLWxhYmsVyucCORxv3SL1m40NFO11ExzIrY=;
	b=GVufNkuacXagA8pTrioB7mXvyo1bkE8zJShX2HqpG9YrvxaXSibhwqBTizjTQbrreectpL
	PcHp1DEVrSKs2hopZC8JwujY8Qi2Y0WfSydcdn/7UAwx5En1UK1jsPr0Zvvvqvm2OKGXMm
	jwWrzQxcE6fMwQy+GfwntEsO+qiC4aY=
X-MC-Unique: LiPRJB8QPOiCtDGK4ztl3A-1
From: Markus Armbruster <armbru@redhat.com>
To: Alex =?utf-8?Q?Benn=C3=A9e?= <alex.bennee@linaro.org>
Cc: qemu-devel@nongnu.org,  Paolo Bonzini <pbonzini@redhat.com>,  Richard
 Henderson <richard.henderson@linaro.org>,  Gerd Hoffmann
 <kraxel@redhat.com>,  Christian Schoenebeck <qemu_oss@crudebyte.com>,
  "Gonglei (Arei)" <arei.gonglei@huawei.com>,  =?utf-8?Q?Marc-Andr=C3=A9?=
 Lureau
 <marcandre.lureau@redhat.com>,  "Michael S. Tsirkin" <mst@redhat.com>,
  Igor Mammedov <imammedo@redhat.com>,  Ani Sinha <ani@anisinha.ca>,
  Laurent Vivier <lvivier@redhat.com>,  Amit Shah <amit@kernel.org>,  Peter
 Maydell <peter.maydell@linaro.org>,  Stefano Stabellini
 <sstabellini@kernel.org>,  Anthony Perard <anthony.perard@citrix.com>,
  Paul Durrant <paul@xen.org>,  =?utf-8?Q?Herv=C3=A9?= Poussineau
 <hpoussin@reactos.org>,
  Aleksandar Rikalo <aleksandar.rikalo@syrmia.com>,  Corey Minyard
 <cminyard@mvista.com>,  Patrick Venture <venture@google.com>,  Eduardo
 Habkost <eduardo@habkost.net>,  Marcel Apfelbaum
 <marcel.apfelbaum@gmail.com>,  Peter Xu <peterx@redhat.com>,  Jason Wang
 <jasowang@redhat.com>,  =?utf-8?Q?C=C3=A9dric?= Le Goater <clg@kaod.org>,
  Daniel Henrique
 Barboza <danielhb413@gmail.com>,  David Gibson
 <david@gibson.dropbear.id.au>,  Greg Kurz <groug@kaod.org>,  Philippe
 =?utf-8?Q?Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,  Jean-Christophe Dubois
 <jcd@tribudubois.net>,  Keith Busch <kbusch@kernel.org>,  Klaus Jensen
 <its@irrelevant.dk>,  Yuval Shaia <yuval.shaia.ml@gmail.com>,  Yoshinori
 Sato <ysato@users.sourceforge.jp>,  Magnus Damm <magnus.damm@gmail.com>,
  Fabien Chouteau <chouteau@adacore.com>,  KONRAD Frederic
 <frederic.konrad@adacore.com>,  Mark Cave-Ayland
 <mark.cave-ayland@ilande.co.uk>,  Artyom Tarasenko <atar4qemu@gmail.com>,
  Alex Williamson <alex.williamson@redhat.com>,  Eric Auger
 <eric.auger@redhat.com>,  Max Filippov <jcmvbkbc@gmail.com>,  Juan
 Quintela <quintela@redhat.com>,  "Dr. David Alan Gilbert"
 <dgilbert@redhat.com>,  Konstantin Kostiuk <kkostiuk@redhat.com>,  Michael
 Roth <michael.roth@amd.com>,  Daniel P. =?utf-8?Q?Berrang=C3=A9?=
 <berrange@redhat.com>,
  Pavel Dovgalyuk <pavel.dovgaluk@ispras.ru>,  David Hildenbrand
 <david@redhat.com>,  Wenchao Wang <wenchao.wang@intel.com>,  Kamil
 Rytarowski <kamil@netbsd.org>,  Reinoud Zandijk <reinoud@netbsd.org>,
  Sunil Muthuswamy <sunilmut@microsoft.com>,  Cornelia Huck
 <cohuck@redhat.com>,  Thomas Huth <thuth@redhat.com>,  Eric Blake
 <eblake@redhat.com>,  Vladimir Sementsov-Ogievskiy
 <vsementsov@virtuozzo.com>,  John Snow <jsnow@redhat.com>,
  kvm@vger.kernel.org,  qemu-arm@nongnu.org,
  xen-devel@lists.xenproject.org,  qemu-ppc@nongnu.org,
  qemu-block@nongnu.org,  haxm-team@intel.com,  qemu-s390x@nongnu.org
Subject: Re: [PATCH 3/3] Use g_new() & friends where that makes obvious sense
References: <20220314160108.1440470-1-armbru@redhat.com>
	<20220314160108.1440470-4-armbru@redhat.com>
	<877d8w5m9e.fsf@linaro.org>
Date: Tue, 15 Mar 2022 14:49:34 +0100
In-Reply-To: <877d8w5m9e.fsf@linaro.org> ("Alex =?utf-8?Q?Benn=C3=A9e=22's?=
 message of "Mon, 14
	Mar 2022 19:48:47 +0000")
Message-ID: <87ilsfl40h.fsf@pond.sub.org>
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.2 (gnu/linux)
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.85 on 10.11.54.8
Authentication-Results: relay.mimecast.com;
	auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=armbru@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Alex Benn=C3=A9e <alex.bennee@linaro.org> writes:

> Markus Armbruster <armbru@redhat.com> writes:
>
>> g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
>> for two reasons.  One, it catches multiplication overflowing size_t.
>> Two, it returns T * rather than void *, which lets the compiler catch
>> more type errors.
>>
>> This commit only touches allocations with size arguments of the form
>> sizeof(T).
>>
>> Patch created mechanically with:
>>
>>     $ spatch --in-place --sp-file scripts/coccinelle/use-g_new-etc.cocci=
 \
>> =09     --macro-file scripts/cocci-macro-file.h FILES...
>>
>> Signed-off-by: Markus Armbruster <armbru@redhat.com>

[...]

>> --- a/hw/pci/pcie_sriov.c
>> +++ b/hw/pci/pcie_sriov.c
>> @@ -177,7 +177,7 @@ static void register_vfs(PCIDevice *dev)
>>      assert(sriov_cap > 0);
>>      num_vfs =3D pci_get_word(dev->config + sriov_cap + PCI_SRIOV_NUM_VF=
);
>> =20
>> -    dev->exp.sriov_pf.vf =3D g_malloc(sizeof(PCIDevice *) * num_vfs);
>> +    dev->exp.sriov_pf.vf =3D g_new(PCIDevice *, num_vfs);
>>      assert(dev->exp.sriov_pf.vf);
>
> So what I find confusing about the conversion of sizeof(foo *) is that
> while the internal sizeof in g_new is unaffected I think the casting
> ends up as
>
>  foo **

Yes.  g_malloc(...) returns void *.  g_new(T, ...) returns T *.

> but I guess the compiler would have complained so maybe I don't
> understand the magic enough.

It doesn't complain here because dev->exp.sriov_pf.vf is of type
PCIDevice **:

    struct PCIESriovPF {
        uint16_t num_vfs;   /* Number of virtual functions created */
        uint8_t vf_bar_type[PCI_NUM_REGIONS];   /* Store type for each VF b=
ar */
        const char *vfname; /* Reference to the device type used for the VF=
s */
        PCIDevice **vf;     /* Pointer to an array of num_vfs VF devices */
    };

It does complain when the types don't match, as shown in PATCH 2.

> <snip>
>> index 42130667a7..598e6adc5e 100644
>> --- a/hw/rdma/vmw/pvrdma_dev_ring.c
>> +++ b/hw/rdma/vmw/pvrdma_dev_ring.c
>> @@ -41,7 +41,7 @@ int pvrdma_ring_init(PvrdmaRing *ring, const char *nam=
e, PCIDevice *dev,
>>      qatomic_set(&ring->ring_state->cons_head, 0);
>>      */
>>      ring->npages =3D npages;
>> -    ring->pages =3D g_malloc0(npages * sizeof(void *));
>> +    ring->pages =3D g_new0(void *, npages);
>
> At least here ring->pages agrees about void ** being the result.
>
> <snip>
>
> So other than my queries about the sizeof(foo *) which I'd like someone
> to assuage me of my concerns it looks like the script has done a
> thorough mechanical job as all good scripts should ;-)
>
> Reviewed-by: Alex Benn=C3=A9e <alex.bennee@linaro.org>

Thanks!



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 13:59:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 13:59:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290800.493288 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU7i1-0005j7-5p; Tue, 15 Mar 2022 13:59:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290800.493288; Tue, 15 Mar 2022 13:59:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU7i1-0005j0-30; Tue, 15 Mar 2022 13:59:33 +0000
Received: by outflank-mailman (input) for mailman id 290800;
 Tue, 15 Mar 2022 13:59:31 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=1u5x=T2=redhat.com=armbru@srs-se1.protection.inumbo.net>)
 id 1nU7hz-0005is-LC
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 13:59:31 +0000
Received: from us-smtp-delivery-124.mimecast.com
 (us-smtp-delivery-124.mimecast.com [170.10.129.124])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 220ca81e-a468-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 14:59:30 +0100 (CET)
Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com
 [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS
 (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 us-mta-297-Upv_Mb-OOSWIHvms5WArsw-1; Tue, 15 Mar 2022 09:59:27 -0400
Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.rdu2.redhat.com
 [10.11.54.8])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by mimecast-mx02.redhat.com (Postfix) with ESMTPS id E16CB3C18527;
 Tue, 15 Mar 2022 13:59:25 +0000 (UTC)
Received: from blackfin.pond.sub.org (unknown [10.36.112.3])
 by smtp.corp.redhat.com (Postfix) with ESMTPS id 6292CC50943;
 Tue, 15 Mar 2022 13:59:25 +0000 (UTC)
Received: by blackfin.pond.sub.org (Postfix, from userid 1000)
 id 1623721E6821; Tue, 15 Mar 2022 14:59:24 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 220ca81e-a468-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
	s=mimecast20190719; t=1647352769;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=10cE4rX5AbTqcs0aOxAVWmDdYLmGBY4pMBpqNlvJA4U=;
	b=Mz6d7MRvE+R6RdUDAME0LXcTPbKdLy8CO6kCklO/epM2H43jw1K6plw07N/cMK8t4c5KMl
	41IW08UUnOjb560qxCiqnyby20BkINaiScDdZPWoT6nFzAsgijhHOR0hoZR0YQDeNou4KJ
	tYOD0BNVi5exL8VcFakI8BFYjSu+f2A=
X-MC-Unique: Upv_Mb-OOSWIHvms5WArsw-1
From: Markus Armbruster <armbru@redhat.com>
To: Alex =?utf-8?Q?Benn=C3=A9e?= <alex.bennee@linaro.org>
Cc: qemu-devel@nongnu.org,  Paolo Bonzini <pbonzini@redhat.com>,  Richard
 Henderson <richard.henderson@linaro.org>,  Gerd Hoffmann
 <kraxel@redhat.com>,  Christian Schoenebeck <qemu_oss@crudebyte.com>,
  "Gonglei (Arei)" <arei.gonglei@huawei.com>,  =?utf-8?Q?Marc-Andr=C3=A9?=
 Lureau
 <marcandre.lureau@redhat.com>,  "Michael S. Tsirkin" <mst@redhat.com>,
  Igor Mammedov <imammedo@redhat.com>,  Ani Sinha <ani@anisinha.ca>,
  Laurent Vivier <lvivier@redhat.com>,  Amit Shah <amit@kernel.org>,  Peter
 Maydell <peter.maydell@linaro.org>,  Stefano Stabellini
 <sstabellini@kernel.org>,  Anthony Perard <anthony.perard@citrix.com>,
  Paul Durrant <paul@xen.org>,  =?utf-8?Q?Herv=C3=A9?= Poussineau
 <hpoussin@reactos.org>,
  Aleksandar Rikalo <aleksandar.rikalo@syrmia.com>,  Corey Minyard
 <cminyard@mvista.com>,  Patrick Venture <venture@google.com>,  Eduardo
 Habkost <eduardo@habkost.net>,  Marcel Apfelbaum
 <marcel.apfelbaum@gmail.com>,  Peter Xu <peterx@redhat.com>,  Jason Wang
 <jasowang@redhat.com>,  =?utf-8?Q?C=C3=A9dric?= Le Goater <clg@kaod.org>,
  Daniel Henrique
 Barboza <danielhb413@gmail.com>,  David Gibson
 <david@gibson.dropbear.id.au>,  Greg Kurz <groug@kaod.org>,  Philippe
 =?utf-8?Q?Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,  Jean-Christophe Dubois
 <jcd@tribudubois.net>,  Keith Busch <kbusch@kernel.org>,  Klaus Jensen
 <its@irrelevant.dk>,  Yuval Shaia <yuval.shaia.ml@gmail.com>,  Yoshinori
 Sato <ysato@users.sourceforge.jp>,  Magnus Damm <magnus.damm@gmail.com>,
  Fabien Chouteau <chouteau@adacore.com>,  KONRAD Frederic
 <frederic.konrad@adacore.com>,  Mark Cave-Ayland
 <mark.cave-ayland@ilande.co.uk>,  Artyom Tarasenko <atar4qemu@gmail.com>,
  Alex Williamson <alex.williamson@redhat.com>,  Eric Auger
 <eric.auger@redhat.com>,  Max Filippov <jcmvbkbc@gmail.com>,  Juan
 Quintela <quintela@redhat.com>,  "Dr. David Alan Gilbert"
 <dgilbert@redhat.com>,  Konstantin Kostiuk <kkostiuk@redhat.com>,  Michael
 Roth <michael.roth@amd.com>,  Daniel P. =?utf-8?Q?Berrang=C3=A9?=
 <berrange@redhat.com>,
  Pavel Dovgalyuk <pavel.dovgaluk@ispras.ru>,  David Hildenbrand
 <david@redhat.com>,  Wenchao Wang <wenchao.wang@intel.com>,  Colin Xu
 <colin.xu@intel.com>,  Kamil Rytarowski <kamil@netbsd.org>,  Reinoud
 Zandijk <reinoud@netbsd.org>,  Sunil Muthuswamy <sunilmut@microsoft.com>,
  Cornelia Huck <cohuck@redhat.com>,  Thomas Huth <thuth@redhat.com>,  Eric
 Blake <eblake@redhat.com>,  Vladimir Sementsov-Ogievskiy
 <vsementsov@virtuozzo.com>,  John Snow <jsnow@redhat.com>,
  kvm@vger.kernel.org,  qemu-arm@nongnu.org,
  xen-devel@lists.xenproject.org,  qemu-ppc@nongnu.org,
  qemu-block@nongnu.org,  haxm-team@intel.com,  qemu-s390x@nongnu.org
Subject: Re: [PATCH 3/3] Use g_new() & friends where that makes obvious sense
References: <20220314160108.1440470-1-armbru@redhat.com>
	<20220314160108.1440470-4-armbru@redhat.com>
	<87y21c401e.fsf@linaro.org>
Date: Tue, 15 Mar 2022 14:59:24 +0100
In-Reply-To: <87y21c401e.fsf@linaro.org> ("Alex =?utf-8?Q?Benn=C3=A9e=22's?=
 message of "Mon, 14
	Mar 2022 22:52:52 +0000")
Message-ID: <875yofl3k3.fsf@pond.sub.org>
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.2 (gnu/linux)
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.85 on 10.11.54.8
Authentication-Results: relay.mimecast.com;
	auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=armbru@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Alex Benn=C3=A9e <alex.bennee@linaro.org> writes:

> Markus Armbruster <armbru@redhat.com> writes:
>
>> g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
>> for two reasons.  One, it catches multiplication overflowing size_t.
>> Two, it returns T * rather than void *, which lets the compiler catch
>> more type errors.
>>
> <snip>
>> diff --git a/semihosting/config.c b/semihosting/config.c
>> index 137171b717..6d48ec9566 100644
>> --- a/semihosting/config.c
>> +++ b/semihosting/config.c
>> @@ -98,7 +98,7 @@ static int add_semihosting_arg(void *opaque,
>>      if (strcmp(name, "arg") =3D=3D 0) {
>>          s->argc++;
>>          /* one extra element as g_strjoinv() expects NULL-terminated ar=
ray */
>> -        s->argv =3D g_realloc(s->argv, (s->argc + 1) * sizeof(void *));
>> +        s->argv =3D g_renew(void *, s->argv, s->argc + 1);
>
> This did indeed break CI because s->argv is an array of *char:
>
> ../semihosting/config.c:101:17: error: assignment to =E2=80=98const char =
**=E2=80=99 from incompatible pointer type =E2=80=98void **=E2=80=99 [-Werr=
or=3Dincompatible-pointer-types]
>   101 |         s->argv =3D g_renew(void *, s->argv, s->argc + 1);
>       |                 ^
> cc1: all warnings being treated as errors
>
> So it did the job of type checking but failed to build ;-)

You found a hole in my compile testing, thanks!

I got confused about the configuration of my build trees.  Catching such
mistakes is what CI is for :)



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 14:03:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 14:03:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290809.493304 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU7lb-0007H3-Ny; Tue, 15 Mar 2022 14:03:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290809.493304; Tue, 15 Mar 2022 14:03:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU7lb-0007Gw-KN; Tue, 15 Mar 2022 14:03:15 +0000
Received: by outflank-mailman (input) for mailman id 290809;
 Tue, 15 Mar 2022 14:03:14 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=1u5x=T2=redhat.com=armbru@srs-se1.protection.inumbo.net>)
 id 1nU7la-0007GI-H2
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 14:03:14 +0000
Received: from us-smtp-delivery-124.mimecast.com
 (us-smtp-delivery-124.mimecast.com [170.10.133.124])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a715c491-a468-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 15:03:13 +0100 (CET)
Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com
 [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS
 (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 us-mta-266-LExbIUHVMB2k-e1e--Crmg-1; Tue, 15 Mar 2022 10:03:10 -0400
Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.rdu2.redhat.com
 [10.11.54.8])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by mimecast-mx02.redhat.com (Postfix) with ESMTPS id B7419380390A;
 Tue, 15 Mar 2022 14:03:03 +0000 (UTC)
Received: from blackfin.pond.sub.org (unknown [10.36.112.3])
 by smtp.corp.redhat.com (Postfix) with ESMTPS id 5CC1AC53741;
 Tue, 15 Mar 2022 14:03:03 +0000 (UTC)
Received: by blackfin.pond.sub.org (Postfix, from userid 1000)
 id 32B4B21E6821; Tue, 15 Mar 2022 15:03:02 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a715c491-a468-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
	s=mimecast20190719; t=1647352992;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=MKik6AtmKkZjLoAeTfrbKw62PODykM0Fa40qjwa00Cw=;
	b=ZrZAqGVau8Sxjhc1470Ore8CqkcIMd+pDFtNFQrHlYA42vbX1e7hHa8W7U2QUY7hPrtHZH
	p8VOrwdl4jo398nH1DmNDop5BScXTBFMPBnxmIfxolAmQyPAixvwYsBHAtxWgS3CNsu14r
	U582pLsrl2QE/sa2sxl76NEESQgtWWs=
X-MC-Unique: LExbIUHVMB2k-e1e--Crmg-1
From: Markus Armbruster <armbru@redhat.com>
To: Eric Blake <eblake@redhat.com>
Cc: qemu-devel@nongnu.org,  Paolo Bonzini <pbonzini@redhat.com>,  Richard
 Henderson <richard.henderson@linaro.org>,  Gerd Hoffmann
 <kraxel@redhat.com>,  Christian Schoenebeck <qemu_oss@crudebyte.com>,
  "Gonglei (Arei)" <arei.gonglei@huawei.com>,  =?utf-8?Q?Marc-Andr=C3=A9?=
 Lureau
 <marcandre.lureau@redhat.com>,  "Michael S. Tsirkin" <mst@redhat.com>,
  Igor Mammedov <imammedo@redhat.com>,  Ani Sinha <ani@anisinha.ca>,
  Laurent Vivier <lvivier@redhat.com>,  Amit Shah <amit@kernel.org>,  Peter
 Maydell <peter.maydell@linaro.org>,  Stefano Stabellini
 <sstabellini@kernel.org>,  Anthony Perard <anthony.perard@citrix.com>,
  Paul Durrant <paul@xen.org>,  =?utf-8?Q?Herv=C3=A9?= Poussineau
 <hpoussin@reactos.org>,
  Aleksandar Rikalo <aleksandar.rikalo@syrmia.com>,  Corey Minyard
 <cminyard@mvista.com>,  Patrick Venture <venture@google.com>,  Eduardo
 Habkost <eduardo@habkost.net>,  Marcel Apfelbaum
 <marcel.apfelbaum@gmail.com>,  Peter Xu <peterx@redhat.com>,  Jason Wang
 <jasowang@redhat.com>,  =?utf-8?Q?C=C3=A9dric?= Le Goater <clg@kaod.org>,
  Daniel Henrique
 Barboza <danielhb413@gmail.com>,  David Gibson
 <david@gibson.dropbear.id.au>,  Greg Kurz <groug@kaod.org>,  Philippe
 =?utf-8?Q?Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,  Jean-Christophe Dubois
 <jcd@tribudubois.net>,  Keith Busch <kbusch@kernel.org>,  Klaus Jensen
 <its@irrelevant.dk>,  Yuval Shaia <yuval.shaia.ml@gmail.com>,  Yoshinori
 Sato <ysato@users.sourceforge.jp>,  Magnus Damm <magnus.damm@gmail.com>,
  Fabien Chouteau <chouteau@adacore.com>,  KONRAD Frederic
 <frederic.konrad@adacore.com>,  Mark Cave-Ayland
 <mark.cave-ayland@ilande.co.uk>,  Artyom Tarasenko <atar4qemu@gmail.com>,
  Alex Williamson <alex.williamson@redhat.com>,  Eric Auger
 <eric.auger@redhat.com>,  Max Filippov <jcmvbkbc@gmail.com>,  Juan
 Quintela <quintela@redhat.com>,  "Dr. David Alan Gilbert"
 <dgilbert@redhat.com>,  Konstantin Kostiuk <kkostiuk@redhat.com>,  Michael
 Roth <michael.roth@amd.com>,  Daniel P. =?utf-8?Q?Berrang=C3=A9?=
 <berrange@redhat.com>,
  Pavel Dovgalyuk <pavel.dovgaluk@ispras.ru>,  Alex =?utf-8?Q?Benn=C3=A9e?=
 <alex.bennee@linaro.org>,  David Hildenbrand <david@redhat.com>,  Wenchao
 Wang <wenchao.wang@intel.com>,  Colin Xu <colin.xu@intel.com>,  Kamil
 Rytarowski <kamil@netbsd.org>,  Reinoud Zandijk <reinoud@netbsd.org>,
  Sunil Muthuswamy <sunilmut@microsoft.com>,  Cornelia Huck
 <cohuck@redhat.com>,  Thomas Huth <thuth@redhat.com>,  Vladimir
 Sementsov-Ogievskiy <vsementsov@virtuozzo.com>,  John Snow
 <jsnow@redhat.com>,  kvm@vger.kernel.org,  qemu-arm@nongnu.org,
  xen-devel@lists.xenproject.org,  qemu-ppc@nongnu.org,
  qemu-block@nongnu.org,  haxm-team@intel.com,  qemu-s390x@nongnu.org
Subject: Re: [PATCH 3/3] Use g_new() & friends where that makes obvious sense
References: <20220314160108.1440470-1-armbru@redhat.com>
	<20220314160108.1440470-4-armbru@redhat.com>
	<20220315090748.acju5mjbe4tax272@redhat.com>
Date: Tue, 15 Mar 2022 15:03:02 +0100
In-Reply-To: <20220315090748.acju5mjbe4tax272@redhat.com> (Eric Blake's
	message of "Tue, 15 Mar 2022 04:07:48 -0500")
Message-ID: <87zglrjotl.fsf@pond.sub.org>
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.2 (gnu/linux)
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.85 on 10.11.54.8
Authentication-Results: relay.mimecast.com;
	auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=armbru@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain

Eric Blake <eblake@redhat.com> writes:

> On Mon, Mar 14, 2022 at 05:01:08PM +0100, Markus Armbruster wrote:
>> g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
>> for two reasons.  One, it catches multiplication overflowing size_t.
>> Two, it returns T * rather than void *, which lets the compiler catch
>> more type errors.
>> 
>> This commit only touches allocations with size arguments of the form
>> sizeof(T).
>> 
>> Patch created mechanically with:
>> 
>>     $ spatch --in-place --sp-file scripts/coccinelle/use-g_new-etc.cocci \
>> 	     --macro-file scripts/cocci-macro-file.h FILES...
>> 
>> Signed-off-by: Markus Armbruster <armbru@redhat.com>
>> ---
>
> I agree that this is mechanical, but...
>
> <snip>
>>  qga/commands-win32.c                     |  8 ++---
>>  qga/commands.c                           |  2 +-
>>  qom/qom-qmp-cmds.c                       |  2 +-
>>  replay/replay-char.c                     |  4 +--
>>  replay/replay-events.c                   | 10 +++---
>>  scripts/coverity-scan/model.c            |  2 +-
>
> ...are we sure we want to touch this particular file?

Good catch!

>> diff --git a/scripts/coverity-scan/model.c b/scripts/coverity-scan/model.c
>> index 9d4fba53d9..30bea672e1 100644
>> --- a/scripts/coverity-scan/model.c
>> +++ b/scripts/coverity-scan/model.c
>> @@ -356,7 +356,7 @@ int g_poll (GPollFD *fds, unsigned nfds, int timeout)
>>  typedef struct _GIOChannel GIOChannel;
>>  GIOChannel *g_io_channel_unix_new(int fd)
>>  {
>> -    GIOChannel *c = g_malloc0(sizeof(GIOChannel));
>> +    GIOChannel *c = g_new0(GIOChannel, 1);
>>      __coverity_escape__(fd);
>>      return c;
>>  }
>
> Our model has a definition of g_malloc0(), but I'm not sure whether
> Coverity picks up the macro g_new0() in the same manner.

I believe it does, by parsing the macro definition from the header.

Regardless, I'd prefer to keep model.c self-contained.  I'll drop this
hunk.

Thanks!



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 14:08:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 14:08:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290813.493314 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU7qC-0007wD-9G; Tue, 15 Mar 2022 14:08:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290813.493314; Tue, 15 Mar 2022 14:08:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU7qC-0007w6-6O; Tue, 15 Mar 2022 14:08:00 +0000
Received: by outflank-mailman (input) for mailman id 290813;
 Tue, 15 Mar 2022 14:07:58 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Oahv=T2=gmail.com=philippe.mathieu.daude@srs-se1.protection.inumbo.net>)
 id 1nU7qA-0007w0-JL
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 14:07:58 +0000
Received: from mail-pj1-x102d.google.com (mail-pj1-x102d.google.com
 [2607:f8b0:4864:20::102d])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 500f3e4c-a469-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 15:07:57 +0100 (CET)
Received: by mail-pj1-x102d.google.com with SMTP id
 m11-20020a17090a7f8b00b001beef6143a8so2508790pjl.4
 for <xen-devel@lists.xenproject.org>; Tue, 15 Mar 2022 07:07:57 -0700 (PDT)
Received: from [192.168.1.115] ([185.126.107.38])
 by smtp.gmail.com with ESMTPSA id
 m125-20020a628c83000000b004f7baad5c20sm10671055pfd.144.2022.03.15.07.07.39
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Tue, 15 Mar 2022 07:07:55 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 500f3e4c-a469-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=message-id:date:mime-version:user-agent:subject:content-language:to
         :cc:references:from:in-reply-to:content-transfer-encoding;
        bh=n5RJV7EKOnS1kazx80dECSrxKL3JUdNPyUQ+rH9sbVY=;
        b=HJForaCGjZ8+I/OPktEd9hFdMN585TTk+jl0Z7jRfAN/CjsP95sSEv7t3CUHUya9Fq
         cmUxhqCxwnY8Jq9ZkM9jf+mTNdryW8tioEHIGLTnxomd2LGvSvmFeOEFu1+TJUQv/gsA
         YaORRHawDzG1lXX9EHWybS1bRAYDLNtJF2kJHqL54XciTXijv6ZA3GOWFkvtFiHLZ+SA
         4kf26f+rEExuA6NlZ1qB3stka8I1CYBJz/5JQegh/lDX4u2BnNEce4wHmJ5LrJiopGsP
         QZQsfwz8N7g6wzUwgwsojTXJm7WfA39eegwwQBtQsfwcFCsGITjD3GnOhrtFtvdHKflj
         KUvQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:message-id:date:mime-version:user-agent:subject
         :content-language:to:cc:references:from:in-reply-to
         :content-transfer-encoding;
        bh=n5RJV7EKOnS1kazx80dECSrxKL3JUdNPyUQ+rH9sbVY=;
        b=TDPDAQZRqVg0zMTqfwQ+3wwo7gTgkCSQ3ruw1yz7YSyL4HduFGyCLCdyyRd0RD8g/K
         X49UuJgA6SYvvriWzfTBXaGrsMZTVZe75pWMs81jH1gWdS6zPLa+eCot7bPupqM+xheL
         acrphT0uVPyxpfVq5ST0zT6hVT568n0tq5G79bfV8CwDUaPbfzSuFl9hBBqTKaHbO/6e
         H880oTkTjPDbj72gevblPTuhRSd/ZGM+c0YBWMoDrtRRhz7LbZ/7G/OghaNvyg9Vg4gv
         Z6kFsvK68w9v03eqKgjEIJ6iYlehHZYx8hC5KgxhIZ4V1TNEC2xTtY66cVCnDRYOKZy9
         lzxQ==
X-Gm-Message-State: AOAM532modj0hPGj1q8mHvQVrU7oE4J/G0v2BNFozM6sVDv6iKHpReBm
	8h+3jPZIyFWcXUgfsUtUX/Q=
X-Google-Smtp-Source: ABdhPJzx03KXda7KzQgJ08jUr9c6CHZ/lPdQQFMd5dF0oFpdZHS7Vx/Bjs3VhxRjXoejIy7drn4agA==
X-Received: by 2002:a17:902:9b97:b0:153:85ac:abc0 with SMTP id y23-20020a1709029b9700b0015385acabc0mr7132480plp.100.1647353275700;
        Tue, 15 Mar 2022 07:07:55 -0700 (PDT)
Message-ID: <02307072-4bff-dbbb-67fb-ca9800c34b3c@gmail.com>
Date: Tue, 15 Mar 2022 15:07:36 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.1
Subject: Re: [PATCH 3/3] Use g_new() & friends where that makes obvious sense
Content-Language: en-US
To: Markus Armbruster <armbru@redhat.com>,
 =?UTF-8?Q?Alex_Benn=c3=a9e?= <alex.bennee@linaro.org>
Cc: qemu-devel@nongnu.org, Paolo Bonzini <pbonzini@redhat.com>,
 Richard Henderson <richard.henderson@linaro.org>,
 Gerd Hoffmann <kraxel@redhat.com>,
 Christian Schoenebeck <qemu_oss@crudebyte.com>,
 "Gonglei (Arei)" <arei.gonglei@huawei.com>,
 =?UTF-8?Q?Marc-Andr=c3=a9_Lureau?= <marcandre.lureau@redhat.com>,
 "Michael S. Tsirkin" <mst@redhat.com>, Igor Mammedov <imammedo@redhat.com>,
 Ani Sinha <ani@anisinha.ca>, Laurent Vivier <lvivier@redhat.com>,
 Amit Shah <amit@kernel.org>, Peter Maydell <peter.maydell@linaro.org>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Anthony Perard <anthony.perard@citrix.com>, Paul Durrant <paul@xen.org>,
 =?UTF-8?Q?Herv=c3=a9_Poussineau?= <hpoussin@reactos.org>,
 Aleksandar Rikalo <aleksandar.rikalo@syrmia.com>,
 Corey Minyard <cminyard@mvista.com>, Patrick Venture <venture@google.com>,
 Eduardo Habkost <eduardo@habkost.net>,
 Marcel Apfelbaum <marcel.apfelbaum@gmail.com>, Peter Xu <peterx@redhat.com>,
 Jason Wang <jasowang@redhat.com>, =?UTF-8?Q?C=c3=a9dric_Le_Goater?=
 <clg@kaod.org>, Daniel Henrique Barboza <danielhb413@gmail.com>,
 David Gibson <david@gibson.dropbear.id.au>, Greg Kurz <groug@kaod.org>,
 =?UTF-8?Q?Philippe_Mathieu-Daud=c3=a9?= <f4bug@amsat.org>,
 Jean-Christophe Dubois <jcd@tribudubois.net>, Keith Busch
 <kbusch@kernel.org>, Klaus Jensen <its@irrelevant.dk>,
 Yuval Shaia <yuval.shaia.ml@gmail.com>,
 Yoshinori Sato <ysato@users.sourceforge.jp>,
 Magnus Damm <magnus.damm@gmail.com>, Fabien Chouteau <chouteau@adacore.com>,
 KONRAD Frederic <frederic.konrad@adacore.com>,
 Mark Cave-Ayland <mark.cave-ayland@ilande.co.uk>,
 Artyom Tarasenko <atar4qemu@gmail.com>,
 Alex Williamson <alex.williamson@redhat.com>,
 Eric Auger <eric.auger@redhat.com>, Max Filippov <jcmvbkbc@gmail.com>,
 Juan Quintela <quintela@redhat.com>,
 "Dr. David Alan Gilbert" <dgilbert@redhat.com>,
 Konstantin Kostiuk <kkostiuk@redhat.com>, Michael Roth
 <michael.roth@amd.com>, =?UTF-8?Q?Daniel_P=2e_Berrang=c3=a9?=
 <berrange@redhat.com>, Pavel Dovgalyuk <pavel.dovgaluk@ispras.ru>,
 David Hildenbrand <david@redhat.com>, Wenchao Wang <wenchao.wang@intel.com>,
 Colin Xu <colin.xu@intel.com>, Kamil Rytarowski <kamil@netbsd.org>,
 Reinoud Zandijk <reinoud@netbsd.org>,
 Sunil Muthuswamy <sunilmut@microsoft.com>, Cornelia Huck
 <cohuck@redhat.com>, Thomas Huth <thuth@redhat.com>,
 Eric Blake <eblake@redhat.com>,
 Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>,
 John Snow <jsnow@redhat.com>, kvm@vger.kernel.org, qemu-arm@nongnu.org,
 xen-devel@lists.xenproject.org, qemu-ppc@nongnu.org, qemu-block@nongnu.org,
 haxm-team@intel.com, qemu-s390x@nongnu.org
References: <20220314160108.1440470-1-armbru@redhat.com>
 <20220314160108.1440470-4-armbru@redhat.com> <87y21c401e.fsf@linaro.org>
 <875yofl3k3.fsf@pond.sub.org>
From: =?UTF-8?Q?Philippe_Mathieu-Daud=c3=a9?=
 <philippe.mathieu.daude@gmail.com>
In-Reply-To: <875yofl3k3.fsf@pond.sub.org>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

On 15/3/22 14:59, Markus Armbruster wrote:
> Alex Bennée <alex.bennee@linaro.org> writes:
> 
>> Markus Armbruster <armbru@redhat.com> writes:
>>
>>> g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
>>> for two reasons.  One, it catches multiplication overflowing size_t.
>>> Two, it returns T * rather than void *, which lets the compiler catch
>>> more type errors.
>>>
>> <snip>
>>> diff --git a/semihosting/config.c b/semihosting/config.c
>>> index 137171b717..6d48ec9566 100644
>>> --- a/semihosting/config.c
>>> +++ b/semihosting/config.c
>>> @@ -98,7 +98,7 @@ static int add_semihosting_arg(void *opaque,
>>>       if (strcmp(name, "arg") == 0) {
>>>           s->argc++;
>>>           /* one extra element as g_strjoinv() expects NULL-terminated array */
>>> -        s->argv = g_realloc(s->argv, (s->argc + 1) * sizeof(void *));
>>> +        s->argv = g_renew(void *, s->argv, s->argc + 1);
>>
>> This did indeed break CI because s->argv is an array of *char:
>>
>> ../semihosting/config.c:101:17: error: assignment to ‘const char **’ from incompatible pointer type ‘void **’ [-Werror=incompatible-pointer-types]
>>    101 |         s->argv = g_renew(void *, s->argv, s->argc + 1);
>>        |                 ^
>> cc1: all warnings being treated as errors
>>
>> So it did the job of type checking but failed to build ;-)
> 
> You found a hole in my compile testing, thanks!
> 
> I got confused about the configuration of my build trees.  Catching such
> mistakes is what CI is for :)

FYI Alex fixed this here:
https://lore.kernel.org/qemu-devel/20220315121251.2280317-8-alex.bennee@linaro.org/

So your series could go on top (modulo the Coverity change).



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 14:10:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 14:10:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290818.493326 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU7sU-0000vJ-Py; Tue, 15 Mar 2022 14:10:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290818.493326; Tue, 15 Mar 2022 14:10:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU7sU-0000vC-Mb; Tue, 15 Mar 2022 14:10:22 +0000
Received: by outflank-mailman (input) for mailman id 290818;
 Tue, 15 Mar 2022 14:10:20 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=CN+Q=T2=gmail.com=dpsmith.dev@srs-se1.protection.inumbo.net>)
 id 1nU7sS-0000v6-NL
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 14:10:20 +0000
Received: from mail-qv1-xf35.google.com (mail-qv1-xf35.google.com
 [2607:f8b0:4864:20::f35])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a505d9f7-a469-11ec-853b-5f4723681683;
 Tue, 15 Mar 2022 15:10:19 +0100 (CET)
Received: by mail-qv1-xf35.google.com with SMTP id im7so15063569qvb.4
 for <xen-devel@lists.xenproject.org>; Tue, 15 Mar 2022 07:10:19 -0700 (PDT)
Received: from [10.10.1.138] (static-72-81-132-2.bltmmd.fios.verizon.net.
 [72.81.132.2]) by smtp.gmail.com with ESMTPSA id
 v12-20020a05622a130c00b002e1b3ccd9adsm11032306qtk.79.2022.03.15.07.10.16
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Tue, 15 Mar 2022 07:10:17 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a505d9f7-a469-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=message-id:date:mime-version:user-agent:subject:content-language:to
         :cc:references:from:in-reply-to:content-transfer-encoding;
        bh=Fd21nn7utQUFzxQeohDqeIbJOfE8Y2VfTpbAVYToe/Y=;
        b=hCC4Dz84tLvXl4s6U8hdazZJePjFF2Bp5TZrfNn/RZvTuctV+PfkfGOanm+ZhHGotU
         pFsqZ1QBieppcVs97MfewBcT2DA9ACkZVtLMtmsxB2fQ5bHueN8R6IO7oDik+tOH1RPQ
         0ob6H0lFv3uZjjafaz46KtHhUmAdd4aWTQjdGjoGX2U/RKGf66+zpe3dYEg25KH7GG1U
         Vt3XDiRa/uSUPUmzlCDDTKELAew+Ha4rvQ5fA1TYBHnN9kG1xUr1wgBvsENzAcUEXSDM
         XOczYDo55MEd98ha03r9TrEuTlAbnhm1XpSlYSEwxu/ZUNg3hK35MiDRR4qrkhlfjO2I
         sPaQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:message-id:date:mime-version:user-agent:subject
         :content-language:to:cc:references:from:in-reply-to
         :content-transfer-encoding;
        bh=Fd21nn7utQUFzxQeohDqeIbJOfE8Y2VfTpbAVYToe/Y=;
        b=eci77LBSw9ODVrY8OLigMAejPzQScvPj6OpUxiVv0V7XD11TGXIB9Y5iejfSb36lCb
         QAI+XN3z6rtVVOP1EZZWY3wygjFi7eWpuANTARSue641Iq0Eo3rvLz/tAAJTIG0303F0
         sgVUjSl4rsp+dit5rVemhL1EeafUkoi0sZiIEnUzGojhM3mdXtZ3lV0CWqRlkpyiLn8a
         e/x0PyAaaEuQAvXFQzseE/7WXitipwNcZlKrz10gbNKQIRe+pVeK7XtXBaeVhYJtnZSL
         B3aI+ir7Nn6bUr5H1uCFaeY8yG6XJXNyHwC5LVO38UUd1q0Kwn9ou888lQON516bxSJy
         oHdA==
X-Gm-Message-State: AOAM533GDnI9mFq0RrcMlXLfTiWehcSkVU37gW9X6VA1o0wHE+OF1TJ1
	UUM1jxut5BtsCx9B267QZIA=
X-Google-Smtp-Source: ABdhPJw5JfLj5DL/EeJyw9y6tmsMMc6KxbiIcZGH052bb3lQ2q/72N1oPnS9uLL3GptGX+yn7zVdTQ==
X-Received: by 2002:a05:6214:2581:b0:440:b232:1ecc with SMTP id fq1-20020a056214258100b00440b2321eccmr7378182qvb.120.1647353418408;
        Tue, 15 Mar 2022 07:10:18 -0700 (PDT)
Message-ID: <2f05e63a-96c3-e78f-f7e4-36fd17fcd58c@gmail.com>
Date: Tue, 15 Mar 2022 10:10:15 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v3 2/5] xen: make evtchn_alloc_unbound public
Content-Language: en-US
To: Stefano Stabellini <sstabellini@kernel.org>,
 xen-devel@lists.xenproject.org
Cc: jgross@suse.com, Bertrand.Marquis@arm.com, julien@xen.org,
 Volodymyr_Babchuk@epam.com, Luca Miccio <lucmiccio@gmail.com>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Wei Liu <wl@xen.org>
References: <alpine.DEB.2.22.394.2201281330520.27308@ubuntu-linux-20-04-desktop>
 <20220128213307.2822078-2-sstabellini@kernel.org>
From: "Daniel P. Smith" <dpsmith.dev@gmail.com>
In-Reply-To: <20220128213307.2822078-2-sstabellini@kernel.org>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

On 1/28/22 16:33, Stefano Stabellini wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> The xenstore event channel will be allocated for dom0less domains. It is
> necessary to have access to the evtchn_alloc_unbound function to do
> that, so make evtchn_alloc_unbound public.
> 
> Add a skip_xsm parameter to allow disabling the XSM check in
> evtchn_alloc_unbound (xsm_evtchn_unbound wouldn't work for a call
> originated from Xen before running any domains.)
> 
> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
> CC: Julien Grall <julien@xen.org>
> CC: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
> CC: Bertrand Marquis <bertrand.marquis@arm.com>
> CC: Andrew Cooper <andrew.cooper3@citrix.com>
> CC: George Dunlap <george.dunlap@citrix.com>
> CC: Jan Beulich <jbeulich@suse.com>
> CC: Wei Liu <wl@xen.org>
> ---
> Changes v3:
> - expose evtchn_alloc_unbound, assing a skip_xsm parameter
> ---
>  xen/common/event_channel.c | 13 ++++++++-----
>  xen/include/xen/event.h    |  3 +++
>  2 files changed, 11 insertions(+), 5 deletions(-)
> 
> diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c
> index da88ad141a..be57d00a15 100644
> --- a/xen/common/event_channel.c
> +++ b/xen/common/event_channel.c
> @@ -284,7 +284,7 @@ void evtchn_free(struct domain *d, struct evtchn *chn)
>      xsm_evtchn_close_post(chn);
>  }
>  
> -static int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
> +int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc, bool skip_xsm)
>  {
>      struct evtchn *chn;
>      struct domain *d;
> @@ -301,9 +301,12 @@ static int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
>          ERROR_EXIT_DOM(port, d);
>      chn = evtchn_from_port(d, port);
>  
> -    rc = xsm_evtchn_unbound(XSM_TARGET, d, chn, alloc->remote_dom);
> -    if ( rc )
> -        goto out;
> +    if ( !skip_xsm )
> +    {
> +        rc = xsm_evtchn_unbound(XSM_TARGET, d, chn, alloc->remote_dom);
> +        if ( rc )
> +            goto out;
> +    }

Please do not subvert the security framework because it causes an
inconvenience. As Jan recommended, work within the XSM check to allow
your access so that we may ensure it is done safely. If you need any
help making modifications to XSM, please do not hesitate to reach out as
I will gladly help.

>      evtchn_write_lock(chn);
>  
> @@ -1195,7 +1198,7 @@ long do_event_channel_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
>          struct evtchn_alloc_unbound alloc_unbound;
>          if ( copy_from_guest(&alloc_unbound, arg, 1) != 0 )
>              return -EFAULT;
> -        rc = evtchn_alloc_unbound(&alloc_unbound);
> +        rc = evtchn_alloc_unbound(&alloc_unbound, false);
>          if ( !rc && __copy_to_guest(arg, &alloc_unbound, 1) )
>              rc = -EFAULT; /* Cleaning up here would be a mess! */
>          break;
> diff --git a/xen/include/xen/event.h b/xen/include/xen/event.h
> index 21c95e14fd..0a2cdedf7d 100644
> --- a/xen/include/xen/event.h
> +++ b/xen/include/xen/event.h
> @@ -68,6 +68,9 @@ int evtchn_close(struct domain *d1, int port1, bool guest);
>  /* Free an event channel. */
>  void evtchn_free(struct domain *d, struct evtchn *chn);
>  
> +/* Create a new event channel port */
> +int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc, bool skip_xsm);
> +
>  /* Allocate a specific event channel port. */
>  int evtchn_allocate_port(struct domain *d, unsigned int port);
>  


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 14:18:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 14:18:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290821.493337 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU80J-0001e9-Ko; Tue, 15 Mar 2022 14:18:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290821.493337; Tue, 15 Mar 2022 14:18:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU80J-0001e2-Ha; Tue, 15 Mar 2022 14:18:27 +0000
Received: by outflank-mailman (input) for mailman id 290821;
 Tue, 15 Mar 2022 14:18:26 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fAQZ=T2=citrix.com=prvs=0668da279=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nU80I-0001dw-Li
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 14:18:26 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id c53a3bc3-a46a-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 15:18:24 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c53a3bc3-a46a-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647353904;
  h=from:to:cc:subject:date:message-id:
   content-transfer-encoding:mime-version;
  bh=tluMWh6jAeaWvyZmULYct3wk37bdHQOQKk1VmBtS/EU=;
  b=DPyUDuT3KWRETXsV7z7Fca0xAK1lgaSmuQPogVl98/tVrI5kaI3mIY6q
   tazeudDVQU3Bu9lVL1pJuB/OWq8LOHGNDS6CsGvzHM1CQJkCR9X63cvFx
   Ae8x55DA9OYG4CCtrRSZPUsOqsd5miQjZKa1oadeFFWd6IVdZ5C+avhoH
   g=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66685535
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:jbBnzqx8oeTE+eOSxt16t+cgxirEfRIJ4+MujC+fZmUNrF6WrkUAy
 2YeWT/VPa2LZDP8ct0gaYu+8R5UsJDcx9M2HQZpqyAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2IXhWGthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 Nplp8WIbFYCMbT2vs8ebDYHAzNXFqlN9+qSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DJoQQt2sm1TjEJf0nXYrCU+PB4towMDIY2J4QTauDP
 JdxhTxHZQ36eiNSNAsuEMw9uduXu3yibnpzgQfAzUYwyzeKl1EguFT3C/LKfvSaSMMTmVyXz
 krE9WnkBhARNPSE1CGItHmrg4fnjS79HY4fCrC83vprm0GIgHweDgUMUlm2quX/jVSxM++zM
 GRNpHBo9/JrshX2EJ+tBHVUvUJooDYOAuJ1QsY18Tur4anrzFmJFEEvSjVOPYlOWNANeRQm0
 VqAntXMDDNpsaGIRX/1yop4vQ9eKgBOczZcOHZsoR8tpoC6/dpt1k6nosNLSvbdszHjJd3nL
 9lmRgAajq5bs8ME3r7TEbvv02P1/cihouLYC2zqsoOZAuFROdbNi2+AswGzARN8wGCxFQHpU
 J8swZT20Qz2JcvR/BFhuc1UdF1T296LMSfHnXlkFIQ7+jKm9haLJN4Mv2svfh4zYp9eI1cFh
 XM/XysKvfe/21PwMcdKj3+ZUZx2ncAM6/y4PhwrUja+SscoL1LWlM2fTUWRw3rsgCARfVIXY
 v+mnTKXJS9CU8xPlWPuL89EiOND7n1ulAv7GMGgpzz6gOX2WZJgYepcWLd4Rrtit/3sTcS82
 4s3CvZmPD0ECbygOHaLqdBPRb3IRFBiba3LRwVsXrfrCiJtGX07Cu+XxrUkeod/mL9SmPuO9
 Xa4MnK0AnKl7ZEbAW1mskxeVY4=
IronPort-HdrOrdr: A9a23:Luukla3JrY3SmL0pZgV71QqjBNEkLtp133Aq2lEZdPU1SKylfq
 WV98jzuiWYtN98YhsdcLO7WZVoP0myyXcd2+B4AV7IZmXbUQWTQr1f0Q==
X-IronPort-AV: E=Sophos;i="5.90,183,1643691600"; 
   d="scan'208";a="66685535"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=bBJaLXkdFWrrBKdyxkk54eAeV0StClXDneqv606POtqfEuzwNnMpNnUFjSdFmdLksJNU8O9oamAScNu42Qmz2DQ4QX4ySkGzRAVOCFDNAJcXzdDwfo48aL8ZNIlNG25xRm+C4d22z4hhnlwRnx082CHw5tZ1tB27/L16gwqWfKXUyzwNAFNBaW2HR5hBYyJ6iqUH5aEv2VdiG6GzpN4boYaHD3X4rV2XxH81yop9jT62q08YmQeTKI/fk9FZfs7d3LXTvcd+aZ8lppM0EDJ5bNt/Aco4Di24pGDZ6zu3FKwv6Xf3xkDUSqnm1cCtTCj0P/lR/lvGNOobM1aN2x/5xw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Bg8XsokNI9BTbZP2j0kZdtOCd/WehMCLEDrmvQYDE00=;
 b=T/gpEThYBaBrsfzhOgBfvcGNm9fEI6nOVV7NkMltlpS8lbXoqUEfQqWHfBjvLmq/WU1cwh+JKD48LnU4LgXBXTL4daUiE+ucOnRnUwowIoN+NSOWWa4qSypr5ydS8wPtHAbC1NxFGd/u12r/Olo9QOJxDDLxZDDkmAqJVHpKJB9dsJX109vOIZq70IYscPkK+ZOfTKvhmu4fn9CJPLbLIj8QUMMNA3/fAbPJuz53Eb6wVvUQtO4DuwfwZEk830dD/xYooWdgrcYt5PgA/F7kRpef8o87/RQwUX+1k756ZsAecExPsUqEJJNVe62YzOyuqBSfFGjMLxMuO8vVFGNm7A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Bg8XsokNI9BTbZP2j0kZdtOCd/WehMCLEDrmvQYDE00=;
 b=Um95l9wKzchcvwbW0S66Q80VwLD1ftCyGXyhwpShthRHw3H5KzTh/YFbdNCn3B6gyxdytJ0DvuleX2GyYECkCvD4WBCIclzD17R89k5n0YFuzgcMXM5SdoEtKuiyAA0M5uJtLUOw7O7dOgpQ3mueEUl2k3/QBgmK78dMSiL8vi4=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: [PATCH v2 0/3] amd/msr: implement MSR_VIRT_SPEC_CTRL for HVM guests
Date: Tue, 15 Mar 2022 15:18:04 +0100
Message-ID: <20220315141807.22770-1-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO3P123CA0017.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:ba::22) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 1ec9e0b0-6cbd-4d5d-0fa2-08da068ea6b5
X-MS-TrafficTypeDiagnostic: CY4PR03MB2902:EE_
X-Microsoft-Antispam-PRVS: <CY4PR03MB2902E38DB3D47226291770408F109@CY4PR03MB2902.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(6512007)(5660300002)(6506007)(38100700002)(8936002)(6486002)(6916009)(8676002)(36756003)(508600001)(82960400001)(186003)(26005)(1076003)(83380400001)(66556008)(66476007)(66946007)(86362001)(6666004)(2906002)(316002)(2616005)(54906003)(4326008);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?bkRqMWsydDlOdDNheVVOKzFmS0pvMG5WL3NmcCtpdStnS01qZkZ3Nyt5akpq?=
 =?utf-8?B?Uk9aYWdSMVlEbjI2dkpHckhzZ0k0M2d0YUYyTHVBcmxRcjAxZ2pNSTZwMGhv?=
 =?utf-8?B?NlhnakxBQTRvbjZmdnZGR0swNmo2bi9iY2I0ejdiNi9qYkswb2gwNU9lQjJn?=
 =?utf-8?B?cFI2Q1NsdEdYSVdtQ3ErT3FmOVlMOGFwYytaWXJZbERmWDNWbmZCVmVnS0hx?=
 =?utf-8?B?VFllQjlmam01NEJHa1RFbzBBYUFXVHdsbEk3aEtJaUk0ekhQeTgremxpcm9D?=
 =?utf-8?B?Zlc2NTFCMXNtUDNlWlBXRkFyUnBncVpURlNVWG5CY3k3cW83T2ZXdDVsbkhO?=
 =?utf-8?B?VGhFV2txdktQa1pIa2NYZHJQWkttZGZEb1ArT0srbC9aRmNTSjFzNlo5a2dm?=
 =?utf-8?B?QkJMRS9kUzVpd0IwcnliTktjZkdrTUtCYjZmcWd1OHc2VEx3K2hROFhhMnlR?=
 =?utf-8?B?Nmw3VTZOc2w1c2VUOEk3ZmNXZnBjYjQ5dFZnUEJnQWJKd0pjVzU5SEFiYXJS?=
 =?utf-8?B?MnpRazVPRHY5SUVpZ3pOcmNTMU1sSVNjSHl2TEhpMS82bkwvNzh0TWplRDRC?=
 =?utf-8?B?YkZYYjJoVEYreXJtNmEydzVzbE1ORkU3NitucTlBNDUrc2piOEpnVHRFakVE?=
 =?utf-8?B?REw2NHJqQmhmOEZGOUZ6MW94alVNKytCYVJLelI4R0JoYW1FQ2ljbG9jdnFU?=
 =?utf-8?B?dHdoVnBreG0vYlI1M1F6TWpIM1lYMXR4TktMUzBMSCtEVVk0aUNmeFhRQVg3?=
 =?utf-8?B?b1RpK1BnSXc3Y2FVOUQ2Y2lvSEpTUi95WjhaTkVUZU5SMkFnNDk2ZFFqN3Ru?=
 =?utf-8?B?bGhjTU1LenR0QTRMK3FONXB5b0lBeXNsK0pqUE03SW1MaHdzeFRweXZMUmsx?=
 =?utf-8?B?YWF6OFdsR1AxemhXaGdHMnp0djhtMENJTUViR3QwdllxV3dSL1JXL3Z0eHFq?=
 =?utf-8?B?ZjI1TGI3WGIwUzVXMUp4ZHA2SXduUFNmVXQ2R0pIU3RIb3llamdaTDdlNktT?=
 =?utf-8?B?TlFDdUhKa3B1SEhLVnhySHN1bWhsNWZOWHBDZUEyaHVYR1dxQkpXRktpanZ0?=
 =?utf-8?B?Z3preVZVeUE0NG11d1J3VUVTNHhyNnAwVXFXc1R6aEcvM0l3U09XYk5zc0pm?=
 =?utf-8?B?YkdTNldML2thamd3cXVsTU0wM2YzV2grNXF2cmxtQkRpUVJueENmcFMyNUp5?=
 =?utf-8?B?aHJHaWN6Wi9ZdlMzYzhsTjl0MFUxRlBEWWs4NkwvVEtjMTAzb1VZcmtoM2g3?=
 =?utf-8?B?TURaQlhNWElRRHY3ditCNWNHNGQxU2RIVzY1YjZWSi9kcmVQZ3MvczU4cXdl?=
 =?utf-8?B?MHZ6MzNTTFVqZS9nT1VKZHRSK2FteExkZ2FaVjNTb3JYc2Y4NjE3QnVxYjhF?=
 =?utf-8?B?S0RlRG1Tb1FFcC85OUNEOHFLTllROEJYS2QzaU9teFp4OExDT1hZSm5HdXQ3?=
 =?utf-8?B?RFVCOUQvV3VLTUd1U3p1LzlUck1GcWFHUzNvLzUxOTVxaGVjTW55RzRtVFZ4?=
 =?utf-8?B?TGdXTjl2a2toTDZjUU5kb2dxd1VpTXBjTWRHRFBJOURreTNEVDgrZGlCa2d0?=
 =?utf-8?B?eUxHV2l1THdnaDBPTnVIdTFReFczMlhDRnd0amowNGY5ZWFCczR3RVFJTzNp?=
 =?utf-8?B?ZW81K0k0MklQZXNHKzlsVk5FRStIY0VWUVV3SDJ0RmZmakI1SHN0dnBHVlZZ?=
 =?utf-8?B?UWJDWUFIQ0pqSElJaDVRUFFDTzd2QmxQZHFjL1QyVWUxb3M0a09KK2lvZDJn?=
 =?utf-8?B?cXFoMUtzNWVwT0RYTDVGOCs3dU5rNFFtb2ZkaWFyMi8zTnAvQ2piTW1kSDVD?=
 =?utf-8?B?ZkZsSUV4UGtQRnFiLzZVZUM3VkdQQ3BnWWJkdkRsZXJGWnFUcXBwaUo5Uk50?=
 =?utf-8?B?NU1RWlVMTVp1bVVGNSsyWnA1eHM3eUtuenBvVUJuUnBVSlpCNUNFcEdKYUE2?=
 =?utf-8?Q?1MkcDhXGJLbtjYShPhYkFjb3QETvnSP4?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 1ec9e0b0-6cbd-4d5d-0fa2-08da068ea6b5
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Mar 2022 14:18:18.2102
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: QWanpaslFzZMLnD54U3BSidL2K9GaXk1AZGU9Z2vO9OrrR5yWHRS3tUW92HpBcOx2yeElAsN2CJGtJSQ1GtgXA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR03MB2902
X-OriginatorOrg: citrix.com

Hello,

The following series implements support for MSR_VIRT_SPEC_CTRL
(VIRT_SSBD) on different AMD CPU families.

Note that the support is added backwards, starting with the newer CPUs
that support MSR_SPEC_CTRL and moving to the older ones either using
MSR_VIRT_SPEC_CTRL or the SSBD bit in LS_CFG.

Xen is still free to use it's own SSBD setting, as the selection is
context switched on vm{entry,exit}.

On Zen2 and later, SPEC_CTRL.SSBD exists and should be used in
preference to VIRT_SPEC_CTRL.SSBD.  However, for migration
compatibility, Xen offers VIRT_SSBD to guests (in the max CPUID policy,
not default) implemented in terms of SPEC_CTRL.SSBD.

On Fam15h thru Zen1, Xen exposes VIRT_SSBD to guests by default to
abstract away the model and/or hypervisor specific differences in
MSR_LS_CFG/MSR_VIRT_SPEC_CTRL.

Note that if the hardware itself does offer VIRT_SSBD (ie: very likely
when running virtualized on < Zen2 hardware) and not AMD_SSBD Xen will
allow untrapped access to MSR_VIRT_SPEC_CTRL for HVM guests.

So the implementation of VIRT_SSBD exposed to HVM guests will use one of
the following underlying mechanisms, in the preference order listed
below:

 * SPEC_CTRL.SSBD. (patch 1)
 * VIRT_SPEC_CTRL.SSBD (untrapped). (patch 2).
 * Non-architectural way using LS_CFG. (patch 3)

Thanks, Roger.

Roger Pau Monne (3):
  amd/msr: implement VIRT_SPEC_CTRL for HVM guests on top of SPEC_CTRL
  amd/msr: allow passthrough of VIRT_SPEC_CTRL for HVM guests
  amd/msr: implement VIRT_SPEC_CTRL for HVM guests using legacy SSBD

 xen/arch/x86/cpu/amd.c                      | 116 +++++++++++++++++---
 xen/arch/x86/cpuid.c                        |  28 +++++
 xen/arch/x86/hvm/hvm.c                      |   1 +
 xen/arch/x86/hvm/svm/entry.S                |   6 +
 xen/arch/x86/hvm/svm/svm.c                  |  49 +++++++++
 xen/arch/x86/include/asm/amd.h              |   4 +
 xen/arch/x86/include/asm/cpufeatures.h      |   1 +
 xen/arch/x86/include/asm/msr.h              |  14 +++
 xen/arch/x86/msr.c                          |  27 +++++
 xen/arch/x86/spec_ctrl.c                    |  12 +-
 xen/include/public/arch-x86/cpufeatureset.h |   2 +-
 11 files changed, 241 insertions(+), 19 deletions(-)

-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 14:18:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 14:18:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290822.493348 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU80M-0001u6-TB; Tue, 15 Mar 2022 14:18:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290822.493348; Tue, 15 Mar 2022 14:18:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU80M-0001tz-Q0; Tue, 15 Mar 2022 14:18:30 +0000
Received: by outflank-mailman (input) for mailman id 290822;
 Tue, 15 Mar 2022 14:18:29 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fAQZ=T2=citrix.com=prvs=0668da279=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nU80L-0001tV-Ec
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 14:18:29 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c72c5938-a46a-11ec-853b-5f4723681683;
 Tue, 15 Mar 2022 15:18:27 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c72c5938-a46a-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647353907;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:content-transfer-encoding:mime-version;
  bh=9MPsHR97DoIpOGZHfzNhOigQex5YmJVhFOV5plhigM4=;
  b=F07RrxHSIF/oR9DK7cT3Hx1pXnnC1ruAu7erSU215+ZFgWi9ZnlFsyiC
   D46AAXr6uHR5uRHZzEkbaxsYSVAzbQdZ3Exzr1eIP+1sT5nEHuPHcCX1d
   CTkrPAaEya9vNfDgJCZAyMu/phiOQERvm4UZ6Gn/mVXRekco1AMfB4dEI
   E=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65756320
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:u63cnqvbJttPEqhSkBTWcoaMEefnVEFeMUV32f8akzHdYApBsoF/q
 tZmKTqOM/+DYGqgftwnO9mzphwFuJDcmtQ1TFM6pCs2HiMX+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jU5
 IupyyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi8IJ4PhldYAdiNkKAc9OZB0yY7ecEKW5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AO
 pVEN2E1NHwsZTVNH0tJKNE+ptv4pV2hUWIJmXaXi/QOtj27IAtZj+G2bYu9lsaxbdpRtlaVo
 CTB5WuRKhMQOcGbyDGF2mmxneKJliT+MKoCGbv9+vN0jVm7wm0IFAZQRVa9ueO+iEO1R5RYM
 UN8x8Y1hfFsrgrxFIC7BkDm5i7f1vIBZzZOO8wjxiyA+Lfx2TqiICsAcwxwWcV3juZjEFTGy
 WS1t9/uADVutpicRnSc6qqYoFuOBMQFEYMRTXRaFFVYurEPtKl210uSFYg7TMZZm/WvQVnNL
 ya2QD/Sbln5peoCzO2F8F/OmFpATbCZH1dutm07so9Ihz6VhbJJhaT1sTA3Dt4ade51q2VtW
 lBfw6ByC8hUUfmweNSlGrllIV1Qz6/t3MfgqVBuBYI90D+m5mSue4tdiBknehs2aJdeIGW5O
 RWJ0e+02HO1FCDzBUOQS9jtY/nGMIC6TYi1PhwqRocmjmdNmP+vo3g1OB/4M5HFm0kwi6AvU
 ap3gu73ZUv2/Z9PlWLsL89EiOdD7nlnmQv7GMCqpzz6gOH2TCPEFt843K6mM7lRAFWs+16Or
 b6y9qKiln1ibQEJSnKOoNBJcgxScyRT6FKfg5U/S9Nv6zFOQQkJI/TQ3akga8pimaFUnf3P5
 XazRglTz1+XuJENAV/ihqxLAF83YatCkA==
IronPort-HdrOrdr: A9a23:8E5XY6Ng8SCf5cBcTqKjsMiBIKoaSvp037BL7SBMoHluGfBw+P
 rCoB1273XJYVUqOU3I5+ruBEDoexq1yXcf2+Us1NmZMjXbhA==
X-IronPort-AV: E=Sophos;i="5.90,183,1643691600"; 
   d="scan'208";a="65756320"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=GTg1HWzoNOCs30EYOPA6EBRQ3tk2N9qel7QFV1yiN5AWQ5TZ4HF2F4Q/IgFV5bdiQXM/if6/+7QUNajiLjEQSPNrWFoF/YORUrtW1DxUcAKFYlPlg2AVutAUrnk4t3e0fU9bpNWKXGifF+q6gEk6xyQMBTt5504JQSSGKa+M/8DWsv4/3nxWx73qvG4cD18PuCxW3bUI3ohgeu07xNQT82/lT5Vg9c+F8uocHjL2F7YAAoKrpESCQtvUJAvzomrolMu+F48hsAFkH1Bn9ljuiBFj2dgdscgWkF4ilKSySbhN8nSoM/aN5cNk5Cfaja3gYWka2VNsQ7fFwieFw/NErw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ydoKvzijOpuejbc717jjBMoXN5ikPR5XfqS80f3JJYA=;
 b=nu5CQuiLTxOxZ2fhSPEEgmZzpvpiq+0hfPbI3ehlWWG7vQtAYhoy41NCUZ+8jX7WrXsI9Lgy1fcpkBNCsoEMzLxau+Pu35L+k5WVR93+9vgvixPjn7l2o7HKN/n3JjsuRAbmB6rSiF0Clh/BSHIHdYrKg+zLJ0NJ4XaT+nJszzmgQB/F7E8iOrdK4z3NxeJvnCDSuaZ4XAex7UJ8uSJCSxXccU+ilys4trQiD5fSk4Ga9a5/P2scAX7yB3A+EiXTHlAKavoRlxO1pFoB02vZrz7f/OvRbHzpJlCVzWVZICXBdyNtvSVvxWAvYoXOq/MQPEbTFYIheWxMQVJUGpl3jA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=ydoKvzijOpuejbc717jjBMoXN5ikPR5XfqS80f3JJYA=;
 b=exBqVDW0VW0oPMHxDYTnMH5yivyC2sN14ZgK51x0b0WeOeD9B1hK4ZaArWNLhQKqhXGIN03v5QXeYAByLzHtWMJGHd3VbimB1wGeDmTqOeXINCxGMU3xkDzETKjRZDv7wHN4REdy5bW5JRCAWSXfuyqpstTn6QpKHSbDADjqy/Y=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: [PATCH v2 1/3] amd/msr: implement VIRT_SPEC_CTRL for HVM guests on top of SPEC_CTRL
Date: Tue, 15 Mar 2022 15:18:05 +0100
Message-ID: <20220315141807.22770-2-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220315141807.22770-1-roger.pau@citrix.com>
References: <20220315141807.22770-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO4P123CA0449.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:1a9::22) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5d667fb2-6e6c-4f79-bb7f-08da068ea949
X-MS-TrafficTypeDiagnostic: DM4PR03MB6860:EE_
X-Microsoft-Antispam-PRVS: <DM4PR03MB6860C22C7280F3CD0DCB89768F109@DM4PR03MB6860.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(82960400001)(6666004)(6506007)(6512007)(54906003)(316002)(6916009)(8676002)(66476007)(66556008)(6486002)(66946007)(4326008)(38100700002)(508600001)(2906002)(8936002)(1076003)(2616005)(36756003)(186003)(26005)(5660300002)(83380400001)(86362001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?MWVSTDhCVEp5UUlQTWhteExhb3grU0ZDTnluYmFHWDNoR2tQNlBSaWVyanQz?=
 =?utf-8?B?b3lyR0Jyb0JZbmVKRTJGcGlKL2hYSDdtRW1TS3UzY0hib2R4VmRBWndxeVdJ?=
 =?utf-8?B?RkVFS2FyUk13cUxBaVZFTW9oY1NIVi8yRHNTWkduYlQrVG15REhpUHNYNGda?=
 =?utf-8?B?MlBvUWU0Unc0LzI3TU1tUjIzU3pXZTladmFKc0R0TjlIM2lZckhGUlZzR1RN?=
 =?utf-8?B?Zy8wVWxUR0cxcmR3c2c0NG5HMjJQRExCSXMyc0RRYmNPK1o0dHF4M2VnU1p6?=
 =?utf-8?B?R2MvVE1UVXhpVE0ybVExNWdIZUNwSEs3Ny95SkZDNERiZE5zQWp1VHVUV2ph?=
 =?utf-8?B?ZFE4dzZQZjZtbkEranM3V1ltaWl0ZHhiZVViVC94SVAxVUg0MTdVZ2N6dkQr?=
 =?utf-8?B?NHc0MWF5aEtEMmhYamZ4K0EvZXkyOWFTdVA5YnBoTmI3Q1BCd0xPTGorUDhD?=
 =?utf-8?B?eC9NM2J0Ulcyb1hRc0M0V0F2bitNWlJxQ0ppbVljQm1TR09mRFp2bEwrTUMz?=
 =?utf-8?B?YWtqUnJ4RUpVbnN1dE5EY3psbnVNb2ZZWmZYd1d3Vk81WlBYYzVOcC9Ud3Vm?=
 =?utf-8?B?azdOVFJxbXRvVlU1UHNnNlViZWpoN0JyNm8rVkxyVlJIL1RHTzFtVFN4WFJV?=
 =?utf-8?B?c0p2RXY1QjkzMVFZRXdoanhhWWlZSWk1VFV5ZU1uenA2NzlJVkp1SEpoM0U4?=
 =?utf-8?B?RE8wWldDQTQwQzYyekd0NnpEbytVL1o5MVQvdVh6VW84VDFKbEZ1bXRWZENP?=
 =?utf-8?B?WDBQRXRWSlk3R0xSR0VIbHptSitFM3VXNk1USlFLVXFON1YwUmgyZ2IvM0hZ?=
 =?utf-8?B?RnBQanpsVmp2bFBoNXV3M0xRbTJINHhCZm80cWZOUUs1bTB2cW92dUhFSEQv?=
 =?utf-8?B?NFU5VzZEOVF6MlNoSE93Y2cvKzFZUldERlIrZURwWmxvcG1qSEFobmJuRDhG?=
 =?utf-8?B?TWloOXJpWEhEZEwvcjZYeG1FeTdHcVVad1Q5bnpuZ3pyUnZuN1hsSGhzbUNk?=
 =?utf-8?B?Uyt3dkpUR01UZUdHbnFEamdQR2t3K0Vqd1RCbkUwU3VLRnU2M2IwOGRxSGZI?=
 =?utf-8?B?VklXeHBvRTg3NmNWdnk2V2cwckhvSHFvWGprMEt4NjRJNFY4Zjg2Y2FBOU1x?=
 =?utf-8?B?UHhFYy81eVVtWHNnR0ZDTkhJTUROdjRQWXlxMHB2VS8zZGxTQzlBeXdEbmN1?=
 =?utf-8?B?K0hzRmp6MGlXbDdBbS9IbWxkUitZNWxQQjVuN2ZoU3NDOEFXMUtRYWhTTkY3?=
 =?utf-8?B?cmlUc2ZRNUJlTEN3cE96NzRTQlZKU3dhYXduNmM1amVEVjBXY2dOZkh1eGQ2?=
 =?utf-8?B?Qnd5ZjZmODRoM0I2RGVsdDlEcDFHYnc5OGt1N0FMV3J3akdOZWtaRG14U1ZI?=
 =?utf-8?B?bUJJMXM4am16Wk41S2cxNU1JUmM0RG5MUC96Rnk4WVNRZ3pyeWRSV05MT3pV?=
 =?utf-8?B?ZHJaVWx0RU5oMVdvQ3NXSGdQeGtTajBsZHFBVUJ0TDdUWU5QT2VRb0RYYXgv?=
 =?utf-8?B?RG5ZYnRlbHBhWlN2amJZMExSczk1ck9RS2xPZkxNS1BheEhFdkN0cml1ZlA5?=
 =?utf-8?B?ejduZlRhbld3ZENsR2pMUGtyckhPcjdhU3JHYW9MaklFYk8yK1U4Z255L29S?=
 =?utf-8?B?OWNLK2JHNkcvSE95eDBDaTFLNFJwL01jN2hZa1p1L0k2LzRrOFdLSWNmZllD?=
 =?utf-8?B?M0pvalgwK2dFaERHbVorL0o3VkhzQUNPVmxBSGJxOG94MXIvU3hpeVQySFVa?=
 =?utf-8?B?UlNSQktDVFNRa0R0TEtkSFI3MjdKVTdra1ZFNGFuQ1lReVdDL2FGV2FwNzVk?=
 =?utf-8?B?aE1zWEFyRUJ4Wjg5c1ZYcVp0dFNCVVJxTWJBSWtRU0lDY2wxNzZYdWN2V2Y4?=
 =?utf-8?B?ZS95cWIyN21vN2s1N29JaWlvQ0p6anBQZnNOS3NtVEJtbkVabmx3WGxHRjYz?=
 =?utf-8?B?QUFwSi9rNklObm8zUExjWUFaa0MySGVtOW51K3RvRGxqRkFJTURHVVRYVDdL?=
 =?utf-8?B?djFiaHJ5VTBnPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 5d667fb2-6e6c-4f79-bb7f-08da068ea949
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Mar 2022 14:18:22.3681
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: i2QFGp8HIxJUHTfnvt4Yw52SS5jNzyKt74vk6BVFzqWoTut5ff5QtE4vXVYmfmuxVuOV0a7+ssyGB42O6I/8Sw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR03MB6860
X-OriginatorOrg: citrix.com

Use the logic to set shadow SPEC_CTRL values in order to implement
support for VIRT_SPEC_CTRL (signaled by VIRT_SSBD CPUID flag) for HVM
guests. This includes using the spec_ctrl vCPU MSR variable to store
the guest set value of VIRT_SPEC_CTRL.SSBD, which will be OR'ed with
any SPEC_CTRL values being set by the guest.

On hardware having SPEC_CTRL VIRT_SPEC_CTRL will not be offered by
default to guests. VIRT_SPEC_CTRL will only be part of the max CPUID
policy so it can be enabled for compatibility purposes.

Note that '!' is used in order to tag the VIRT_SSBD feature as
specially handled. It's possible for the feature to be available to
guests on hardware that doesn't support it natively, for example when
implemented as done by this patch on top of SPEC_CTRL.SSBD (AMD_SSBD).

Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
Changes since v1:
 - Only expose VIRT_SSBD if AMD_SSBD is available on the host.
 - Revert change to msr-sc= command line option documentation.
 - Only set or clear the SSBD bit of spec_ctrl.
---
 xen/arch/x86/cpuid.c                        |  7 +++++++
 xen/arch/x86/hvm/hvm.c                      |  1 +
 xen/arch/x86/include/asm/msr.h              |  4 ++++
 xen/arch/x86/msr.c                          | 21 +++++++++++++++++++++
 xen/arch/x86/spec_ctrl.c                    |  3 ++-
 xen/include/public/arch-x86/cpufeatureset.h |  2 +-
 6 files changed, 36 insertions(+), 2 deletions(-)

diff --git a/xen/arch/x86/cpuid.c b/xen/arch/x86/cpuid.c
index bb554b06a7..4ca77ea870 100644
--- a/xen/arch/x86/cpuid.c
+++ b/xen/arch/x86/cpuid.c
@@ -543,6 +543,13 @@ static void __init calculate_hvm_max_policy(void)
         __clear_bit(X86_FEATURE_IBRSB, hvm_featureset);
         __clear_bit(X86_FEATURE_IBRS, hvm_featureset);
     }
+    else if ( boot_cpu_has(X86_FEATURE_AMD_SSBD) )
+        /*
+         * If SPEC_CTRL.SSBD is available VIRT_SPEC_CTRL.SSBD can be exposed
+         * and implemented using the former. Expose in the max policy only as
+         * the preference is for guests to use SPEC_CTRL.SSBD if available.
+         */
+        __set_bit(X86_FEATURE_VIRT_SSBD, hvm_featureset);
 
     /*
      * With VT-x, some features are only supported by Xen if dedicated
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index 709a4191ef..595858f2a7 100644
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -1334,6 +1334,7 @@ static const uint32_t msrs_to_send[] = {
     MSR_INTEL_MISC_FEATURES_ENABLES,
     MSR_IA32_BNDCFGS,
     MSR_IA32_XSS,
+    MSR_VIRT_SPEC_CTRL,
     MSR_AMD64_DR0_ADDRESS_MASK,
     MSR_AMD64_DR1_ADDRESS_MASK,
     MSR_AMD64_DR2_ADDRESS_MASK,
diff --git a/xen/arch/x86/include/asm/msr.h b/xen/arch/x86/include/asm/msr.h
index ce4fe51afe..ab6fbb5051 100644
--- a/xen/arch/x86/include/asm/msr.h
+++ b/xen/arch/x86/include/asm/msr.h
@@ -291,6 +291,7 @@ struct vcpu_msrs
 {
     /*
      * 0x00000048 - MSR_SPEC_CTRL
+     * 0xc001011f - MSR_VIRT_SPEC_CTRL (if X86_FEATURE_AMD_SSBD)
      *
      * For PV guests, this holds the guest kernel value.  It is accessed on
      * every entry/exit path.
@@ -306,6 +307,9 @@ struct vcpu_msrs
      * We must clear/restore Xen's value before/after VMRUN to avoid unduly
      * influencing the guest.  In order to support "behind the guest's back"
      * protections, we load this value (commonly 0) before VMRUN.
+     *
+     * Once of such "behind the guest's back" usages is setting SPEC_CTRL.SSBD
+     * if the guest sets VIRT_SPEC_CTRL.SSBD.
      */
     struct {
         uint32_t raw;
diff --git a/xen/arch/x86/msr.c b/xen/arch/x86/msr.c
index 01a15857b7..b212acf29d 100644
--- a/xen/arch/x86/msr.c
+++ b/xen/arch/x86/msr.c
@@ -381,6 +381,13 @@ int guest_rdmsr(struct vcpu *v, uint32_t msr, uint64_t *val)
                ? K8_HWCR_TSC_FREQ_SEL : 0;
         break;
 
+    case MSR_VIRT_SPEC_CTRL:
+        if ( !cp->extd.virt_ssbd )
+            goto gp_fault;
+
+        *val = msrs->spec_ctrl.raw & SPEC_CTRL_SSBD;
+        break;
+
     case MSR_AMD64_DE_CFG:
         if ( !(cp->x86_vendor & (X86_VENDOR_AMD | X86_VENDOR_HYGON)) )
             goto gp_fault;
@@ -666,6 +673,20 @@ int guest_wrmsr(struct vcpu *v, uint32_t msr, uint64_t val)
             wrmsr_tsc_aux(val);
         break;
 
+    case MSR_VIRT_SPEC_CTRL:
+        if ( !cp->extd.virt_ssbd )
+            goto gp_fault;
+
+        /*
+         * Only supports SSBD bit, the rest are ignored. Only modify the SSBD
+         * bit in case other bits are set.
+         */
+        if ( val & SPEC_CTRL_SSBD )
+            msrs->spec_ctrl.raw |= SPEC_CTRL_SSBD;
+        else
+            msrs->spec_ctrl.raw &= ~SPEC_CTRL_SSBD;
+        break;
+
     case MSR_AMD64_DE_CFG:
         /*
          * OpenBSD 6.7 will panic if writing to DE_CFG triggers a #GP:
diff --git a/xen/arch/x86/spec_ctrl.c b/xen/arch/x86/spec_ctrl.c
index 1408e4c7ab..f338bfe292 100644
--- a/xen/arch/x86/spec_ctrl.c
+++ b/xen/arch/x86/spec_ctrl.c
@@ -402,12 +402,13 @@ static void __init print_details(enum ind_thunk thunk, uint64_t caps)
      * mitigation support for guests.
      */
 #ifdef CONFIG_HVM
-    printk("  Support for HVM VMs:%s%s%s%s%s\n",
+    printk("  Support for HVM VMs:%s%s%s%s%s%s\n",
            (boot_cpu_has(X86_FEATURE_SC_MSR_HVM) ||
             boot_cpu_has(X86_FEATURE_SC_RSB_HVM) ||
             boot_cpu_has(X86_FEATURE_MD_CLEAR)   ||
             opt_eager_fpu)                           ? ""               : " None",
            boot_cpu_has(X86_FEATURE_SC_MSR_HVM)      ? " MSR_SPEC_CTRL" : "",
+           boot_cpu_has(X86_FEATURE_SC_MSR_HVM)      ? " MSR_VIRT_SPEC_CTRL" : "",
            boot_cpu_has(X86_FEATURE_SC_RSB_HVM)      ? " RSB"           : "",
            opt_eager_fpu                             ? " EAGER_FPU"     : "",
            boot_cpu_has(X86_FEATURE_MD_CLEAR)        ? " MD_CLEAR"      : "");
diff --git a/xen/include/public/arch-x86/cpufeatureset.h b/xen/include/public/arch-x86/cpufeatureset.h
index 9cee4b439e..b797c6bea1 100644
--- a/xen/include/public/arch-x86/cpufeatureset.h
+++ b/xen/include/public/arch-x86/cpufeatureset.h
@@ -265,7 +265,7 @@ XEN_CPUFEATURE(IBRS_SAME_MODE, 8*32+19) /*S  IBRS provides same-mode protection
 XEN_CPUFEATURE(NO_LMSL,       8*32+20) /*S  EFER.LMSLE no longer supported. */
 XEN_CPUFEATURE(AMD_PPIN,      8*32+23) /*   Protected Processor Inventory Number */
 XEN_CPUFEATURE(AMD_SSBD,      8*32+24) /*S  MSR_SPEC_CTRL.SSBD available */
-XEN_CPUFEATURE(VIRT_SSBD,     8*32+25) /*   MSR_VIRT_SPEC_CTRL.SSBD */
+XEN_CPUFEATURE(VIRT_SSBD,     8*32+25) /*!s MSR_VIRT_SPEC_CTRL.SSBD */
 XEN_CPUFEATURE(SSB_NO,        8*32+26) /*A  Hardware not vulnerable to SSB */
 XEN_CPUFEATURE(PSFD,          8*32+28) /*S  MSR_SPEC_CTRL.PSFD */
 
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 14:18:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 14:18:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290823.493359 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU80T-0002Eb-9d; Tue, 15 Mar 2022 14:18:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290823.493359; Tue, 15 Mar 2022 14:18:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU80T-0002ES-5X; Tue, 15 Mar 2022 14:18:37 +0000
Received: by outflank-mailman (input) for mailman id 290823;
 Tue, 15 Mar 2022 14:18:35 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fAQZ=T2=citrix.com=prvs=0668da279=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nU80R-0001tV-AD
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 14:18:35 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id cab58265-a46a-11ec-853b-5f4723681683;
 Tue, 15 Mar 2022 15:18:33 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cab58265-a46a-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647353913;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:content-transfer-encoding:mime-version;
  bh=VQdgUnCUfYFDHd3pkVOFKBaIkP7wrJBtsUs922WQFKA=;
  b=PELV7RZPIyQCYY+BJr0gVPQGUDCWg2XiMhrVssOpA9ERqUnPznsZwyAh
   MpvHr6Hobdc39fEuXROB8vgd/rGEAjRWevTxmSxVeCWg1fPgm+Jk+S5cb
   A68lSzY8sArvJ59nbdHXyTnCtJSNQ7jRRuDYM90G06uvG2Zac+RemmTsQ
   A=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66284748
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:Uxi1jaq6DaR0DJdP2XMXPYO5dcBeBmIPZRIvgKrLsJaIsI4StFCzt
 garIBmOOquPZ2ahfd4kPduz9hkO78TTydAyTgpo/HwxQSsX95uZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 I6q+KUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBHLWVmsMhWQthOH98FqxJ6r3sfT+lmJnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVI1zbWAOxgWZnea67L+cVZzHE7gcUm8fP2O
 ZRDOWYwMESojxtnZkcqN7YUoc2Shlr+YzBjjFy4j5hr7D2GpOB2+Oe0a4eEEjCQfu1Kmm6Iq
 2SA+H72ajkYPtGCzTuO8lq3m/TC2yj8Xeo6BLC+s/JnnlCX7mgSEwENE0u2p+GjjUyzUM4ZL
 FYbkhfCtoBrqhbtFIOkGUTl/jjU5XbwRua8DcUY8FiP7Zbe8T+yWGovTzFTavd689UfEGlCO
 kCyo/vlAjlmsbuwQH2b96uJoT7aBRX5PVPudgdfE1JbvoCLTJUby0uWE409SPLdYsjdQ2mY/
 tyckMQpa1z/Z+Yv3r7zw13IiinESnPhHl9svVW/so5IA2pEiG+Zi26AtACzARVodt/xory9U
 J4swJD2AAcmV83lqcB1aL9RdIxFHt7cWNEmvXZhHoM66xOm8GO5cIZb7VlWfRk1bZxVI2azM
 BaJ42u9AaO/2lPxNMebhKrrV6wXIVXIT4y5Bpg4kPITCnSOSON31H43PhPBt4wcuEMtjbs+K
 f+mnTWEVh4n5VBc5GPuHY81iOZzrghnnD+7bc2rnnyPjOvFDFbIGOhtDbd7Rr1ghE9yiF6Oq
 Ig32grj40g3bdASlQGMqN9Ndw9WdSZnbX00wuQOHtO+zsNdMDhJI9fawK87epwjmKJQl+zS+
 Wq6VFMew1367UAr4y3RApy/QNsDhapCkE8=
IronPort-HdrOrdr: A9a23:8dgbNq52eMBdMSlSLwPXwXyBI+orL9Y04lQ7vn2ZFiY6TiXIra
 +TdaoguSMc0AxhJE3Jmbi7Sc29qADnhOFICOgqTPuftWzd2VdAQ7sSlbcKrweQeREWs9QtqJ
 uIEJIOR+EYb2IK9voSiTPQe71Lrbn3k5xAx92utUuFJjsaDJ2Imj0JczpzZXcGIjWua6BJca
 a0145inX6NaH4XZsO0Cj0uRO7YveDGk5rgfFovGwMnwBPmt0Ln1JfKVzyjmjsOWTJGxrkvtU
 LflRbi26mlu/anjjfBym7o6YhMkteJ8KoDOCXMsLlUFtzfsHfrWG1TYczGgNnzmpDq1L8eqq
 iOn/7nBbU115qeRBDynfKn4Xif7N9n0Q6S9bbfuwq7nSQ8LwhKUPaoQuliA0PkAgMbzaFB+b
 MO0GSDu5VNCxTc2Cz7+tjTThlv0lG5uHw4jIco/jdiuKYlGfZsRLYkjQto+VY7bVbHwZFiFP
 MrANDX5f5Qf1/fZ3fFvnN3yNjpWngoBB+JTkULp8TQilFt7T1E5lpdwNZakmYL9Zo7RZUB7+
 PYMr5wnLULSsMNd6pyCOoIXMPyAG3QRhDHNn6UPD3cZes6EmOIr4Sy7KQ+5emsdpBNxJwumI
 7ZWFcdrmI2c1KGM7z54HSKyGG7fIyQZ0We9igF3ekLhlTVfsufDRG+
X-IronPort-AV: E=Sophos;i="5.90,183,1643691600"; 
   d="scan'208";a="66284748"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=YpVTgfNYFoFWCNMi63RuJLAmsrt98MyVZRLAKe5WIbuYY0bTBKhUsPaeStjfnemyVeCbZnZKmBHbvref11LHmrmiAwhp9ib1mYw4zKL+8MB2b325gJhC4IuPzyFe0mmi8Rpdqe2Ed5ymjF0bXZKeS3qL6b9jWyY4U00ARUXa/Dr+rpq3H09Qf8Nqoy2wkJp6rpQRJtkRXax0LEQGUYePWbj5txTNkzvptdY5HD7fN0ZjwxaghVxu1pTe8QKDBtY8zTTlYTvnRMUnvLyzlb1UXERD3/kB+L5/lGoFOwo+IhiLfvjJGqbX+9ChgLhdZqOVQO5k6eM63PeJDJSfoPcDDw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=uCY9jrv6ZyMmWIRCjtWORu39xudmg3JPkZR3mtNiFVY=;
 b=Tyib4wNdrqFe2ITTiikBG/KRCjXh1gffLgGQkzULf3oQT2MqqBO+9qy7GLG7RxKabdEz4R7b/7SWoGF5N1AugN1CoJJ4S4/ZNc7riz/N77+ybPY0I3WLeXv4d8ces/8jdfFDAjTFZWb4OqgKlGeZBzHsy3cVEXbT8bD0GrkBIcQSf/82DFgAtL16OXFSVOdqyy36fnY/Dbb2NyVvlBsIqZrrj1QkOmaliv+kfJEybnTK/TMAw75WqB1+7g4VQUqMDa0cqNgrxSZmfWjjZiyBDXe1i8njXhp4MKRw4EQfEFPonu38Akvcwh3iOtui/G6+BD1oPeWFG6+ipJzitAW4iw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=uCY9jrv6ZyMmWIRCjtWORu39xudmg3JPkZR3mtNiFVY=;
 b=cG9WPBV5NaE3Qmv+j1FVz6XGk2VmJIMNleOWEmknZhyWfNzQ58b8XiV5ZMAGhOa+FFlvh6JYiKA+/VqxJWAlVpcZncynYYS0udCWR0/ynDDFPigvGAWCqSIVP3+lpZcO9xlhxwRTevYUoY+LoRENJ2BLcflO7m3UIo7LVOo6dWE=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: [PATCH v2 2/3] amd/msr: allow passthrough of VIRT_SPEC_CTRL for HVM guests
Date: Tue, 15 Mar 2022 15:18:06 +0100
Message-ID: <20220315141807.22770-3-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220315141807.22770-1-roger.pau@citrix.com>
References: <20220315141807.22770-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO4P123CA0118.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:192::15) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 23229218-56cd-4b62-12bf-08da068eac70
X-MS-TrafficTypeDiagnostic: CY4PR03MB2902:EE_
X-Microsoft-Antispam-PRVS: <CY4PR03MB29022F5BDB8CC3F5841D39898F109@CY4PR03MB2902.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(6512007)(5660300002)(6506007)(38100700002)(8936002)(6486002)(6916009)(8676002)(36756003)(508600001)(82960400001)(186003)(26005)(1076003)(83380400001)(66556008)(66476007)(66946007)(86362001)(6666004)(2906002)(316002)(2616005)(54906003)(4326008);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?SjNGbXY4UnRmTWQ1N3BCazdRcW1FZVRxS2JJeUxBaElSNS9raEQ5UVY3aStJ?=
 =?utf-8?B?YUs1Tk9tWkpxaFBTNjJPamc3Y1lzV3NXOFZVcEZsaWVlZ2VCVDNPUENQNHV6?=
 =?utf-8?B?bzJKVmt1UWZrOGZZYXhTTkt5WUd0bjlOM2tWeStGbkxNTERlQjFtdGx2bXNI?=
 =?utf-8?B?TzZLYlVNU1hKVEltVDJJSHJJMG5ESzYrOVpCdkgwNFpGamk4Zm5XODJNc2M5?=
 =?utf-8?B?VjBTNXBHMlJwR2tNeHJNL1MvMkYyeHhVN0swNE5tbWZsb3NuV2dNeTlpRDVD?=
 =?utf-8?B?VUkvT2RIMzgzUnl0aWdiTTEzQkR1S0c5YlBVTzJvb1dGMWZmN0hMN3pDT0Ev?=
 =?utf-8?B?RStZUG5uZDJhTUY2anJJM2pPcER0VXFPbS9uT20wQ0FQenBmNGM1UmZ6YlF5?=
 =?utf-8?B?N1ByZzE5ODBodlg0eTZSWEFkZCtZWDVpTmtnUGJHYlRrcWVZMUV6NTE5dTli?=
 =?utf-8?B?b3lISGJxb0x1NkJEajVmZmk2K1dXWTlFamJjaHhGSGRSbW1aWXQ3d0ZmeFJ5?=
 =?utf-8?B?VXA1US84b1ZNZkZjQ1RRdzdCbUlSSit5MmpPUXFmcDh3OTE2VVBRMG8wRlhy?=
 =?utf-8?B?anNlQkJkcmJ4d0piM25vaDlEZHp3T1pnZHFEU1ZUZTVPT1g5eHg5OWo2b3Z6?=
 =?utf-8?B?Y09rSEx5cFg0OUdNQzNoa2N3TkdQcnJXTk42RXVVWHBRUHY0cytzK1ZhcmY5?=
 =?utf-8?B?aTFpdjA2UkdLTjBxS2pvT1lMa1hqZXVHNUhDQ3JKekgwbVQ4dDZXYlBueHlu?=
 =?utf-8?B?SVc5bDhCOTJYUWNqc2xUSS9Pd0xhaXd1TDh6TUhXdjJDVE00SlcwaDRydzQ1?=
 =?utf-8?B?ZE9rdjAyK3F6VG9UT015YUFYTDlzUWRTZ0dSbEdOTis5MFdWbk1NK2pXMy9M?=
 =?utf-8?B?Y0l5ejdPRXRBS2Y2ZzNOK2JORSsxNUJDWnorSmVBNWxnQWNUWTd2cXJvMG5B?=
 =?utf-8?B?eHJxRUNWNjZ2QUpCYVAyUG0wMW04b0Frbk1pT1RDdVlKUG1NMitXUEZHWW9J?=
 =?utf-8?B?ai94eHZZeUhFc2g2b2U2aXdpUmxvbGdHL1k5OHd0VjhEaHgyVG5DakxxNVFp?=
 =?utf-8?B?b1hvMlF6T3ZXK0ZhdzY5U1J0TG4rSUJuNXE1S3VsY244bXFYTzkxc1JzNzRS?=
 =?utf-8?B?Sk4yODg3VHdRenZGZDJROU02M0JIVlExV1E1cTVpQ0NqZ3FZZnMyVFFEZUlY?=
 =?utf-8?B?cHV6WENBZlNtQTBDRnc2cCtIRnk2dTRZbFhCN3VicVcxUHJQaG42RkdRdk1I?=
 =?utf-8?B?VTNPK1RFVGpkTGdFRXZVU3ZaYTNHQmpicS84dldSR0o4N1A2SWw3clB3NGVJ?=
 =?utf-8?B?c2RxZ0RUWWYwYnYvTnJXMUJMTVUyNGZuV3V0ZG5KZ21lYjRlS1J1TXlKdlAx?=
 =?utf-8?B?Z2ZTSE01V3N2ZS9DdkttcmdXcjBrK3YrZzZjTVpWb2ZEVm5tUzV0S0hBeUJ0?=
 =?utf-8?B?K1VFUGRxQVFjd1lsMVFMbWgvLy8xQVdwWjdTRU5DTkxpWWloU2pvZjAvOXFT?=
 =?utf-8?B?Y0tjaU1qYkU3NlFLeFo0aWc2SWlmaER2OWx0MEpZeVhJNTdXREV6ejArTHdG?=
 =?utf-8?B?TGJLVzduWVpkTFltQ3U0WjRMWU5DdU1iN3ZtQkpBNWdiSE9EU0xOSWxIT0RQ?=
 =?utf-8?B?eVg4WUVYVGZFd3R0djh2a2RGVm5QemNRb0l2YnBzSzFaMkZiUnNMNGhERnI1?=
 =?utf-8?B?c2hwcExJeVY1R1ZJS3ArRjdDMFNTdFlscExCVS9LdnVmT1VFaGlOOCtLbmtL?=
 =?utf-8?B?TXVMSXhtbVB5bWdNTlhNaHZpclh3M3pWVE9wOUtNVVdjMEhJTmVGYTI3TlRK?=
 =?utf-8?B?bGFpMUhuemkxbGZ6MXhBQ3dvWWx3NHRKQ1dyUXY4MDNFSzlOTnY4NTZZOFBv?=
 =?utf-8?B?ZzlvU0tXZFBzb0x4Q01icmphKzNTbHZnTGI3ZjN4WlIyUkkxWHd2alFuamUw?=
 =?utf-8?B?VUw1d1cwalA2cGlTTjI4NkpjbU50c25mMW5Xc0hhT1B2T1oyT1lnbklTTnB5?=
 =?utf-8?B?Q0U5Vmk1RmRBPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 23229218-56cd-4b62-12bf-08da068eac70
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Mar 2022 14:18:27.6131
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: xAQKJjFNmLb1kwLVt+EawgWDoGwWmOugLy21dUr5/jDl9rHP9VrW9rsuj8yl2nYvJIUKGvabPBuvVP2OPzG1dw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR03MB2902
X-OriginatorOrg: citrix.com

Allow HVM guests untrapped access to MSR_VIRT_SPEC_CTRL if the
hardware has support for it. This requires adding logic in the
vm{entry,exit} paths for SVM in order to context switch between the
hypervisor value and the guest one. The added handlers for context
switch will also be used for the legacy SSBD support.

Introduce a new synthetic feature leaf (X86_FEATURE_VIRT_SC_MSR_HVM)
to signal whether VIRT_SPEC_CTRL needs to be handled on guest
vm{entry,exit}.

Note the change in the handling of VIRT_SSBD in the featureset
description. The change from 's' to 'S' is due to the fact that now if
VIRT_SSBD is exposed by the hardware it can be passed through to HVM
guests.

Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
Changes since v1:
 - Introduce virt_spec_ctrl vCPU field.
 - Context switch VIRT_SPEC_CTRL on vmentry/vmexit separately from
   SPEC_CTRL.
---
 xen/arch/x86/cpuid.c                        | 11 ++++++
 xen/arch/x86/hvm/svm/entry.S                |  6 ++++
 xen/arch/x86/hvm/svm/svm.c                  | 39 +++++++++++++++++++++
 xen/arch/x86/include/asm/cpufeatures.h      |  1 +
 xen/arch/x86/include/asm/msr.h              | 10 ++++++
 xen/arch/x86/spec_ctrl.c                    |  9 ++++-
 xen/include/public/arch-x86/cpufeatureset.h |  2 +-
 7 files changed, 76 insertions(+), 2 deletions(-)

diff --git a/xen/arch/x86/cpuid.c b/xen/arch/x86/cpuid.c
index 4ca77ea870..91e53284fc 100644
--- a/xen/arch/x86/cpuid.c
+++ b/xen/arch/x86/cpuid.c
@@ -534,6 +534,10 @@ static void __init calculate_hvm_max_policy(void)
          raw_cpuid_policy.basic.sep )
         __set_bit(X86_FEATURE_SEP, hvm_featureset);
 
+    if ( !boot_cpu_has(X86_FEATURE_VIRT_SC_MSR_HVM) )
+        /* Clear VIRT_SSBD if VIRT_SPEC_CTRL is not exposed to guests. */
+        __clear_bit(X86_FEATURE_VIRT_SSBD, hvm_featureset);
+
     /*
      * If Xen isn't virtualising MSR_SPEC_CTRL for HVM guests (functional
      * availability, or admin choice), hide the feature.
@@ -590,6 +594,13 @@ static void __init calculate_hvm_def_policy(void)
     guest_common_feature_adjustments(hvm_featureset);
     guest_common_default_feature_adjustments(hvm_featureset);
 
+    /*
+     * AMD_SSBD if preferred over VIRT_SSBD, so don't expose the later by
+     * default if the former is available.
+     */
+    if ( boot_cpu_has(X86_FEATURE_AMD_SSBD) )
+        __clear_bit(X86_FEATURE_VIRT_SSBD, hvm_featureset);
+
     sanitise_featureset(hvm_featureset);
     cpuid_featureset_to_policy(hvm_featureset, p);
     recalculate_xstate(p);
diff --git a/xen/arch/x86/hvm/svm/entry.S b/xen/arch/x86/hvm/svm/entry.S
index 4ae55a2ef6..e2c104bb1e 100644
--- a/xen/arch/x86/hvm/svm/entry.S
+++ b/xen/arch/x86/hvm/svm/entry.S
@@ -57,6 +57,9 @@ __UNLIKELY_END(nsvm_hap)
 
         clgi
 
+        ALTERNATIVE "", STR(call vmentry_virt_spec_ctrl), \
+                        X86_FEATURE_VIRT_SC_MSR_HVM
+
         /* WARNING! `ret`, `call *`, `jmp *` not safe beyond this point. */
         /* SPEC_CTRL_EXIT_TO_SVM       Req: b=curr %rsp=regs/cpuinfo, Clob: acd */
         .macro svm_vmentry_spec_ctrl
@@ -114,6 +117,9 @@ __UNLIKELY_END(nsvm_hap)
         ALTERNATIVE "", svm_vmexit_spec_ctrl, X86_FEATURE_SC_MSR_HVM
         /* WARNING! `ret`, `call *`, `jmp *` not safe before this point. */
 
+        ALTERNATIVE "", STR(call vmexit_virt_spec_ctrl), \
+                        X86_FEATURE_VIRT_SC_MSR_HVM
+
         stgi
 GLOBAL(svm_stgi_label)
         mov  %rsp,%rdi
diff --git a/xen/arch/x86/hvm/svm/svm.c b/xen/arch/x86/hvm/svm/svm.c
index 64a45045da..73a0af599b 100644
--- a/xen/arch/x86/hvm/svm/svm.c
+++ b/xen/arch/x86/hvm/svm/svm.c
@@ -52,6 +52,7 @@
 #include <asm/hvm/svm/svmdebug.h>
 #include <asm/hvm/svm/nestedsvm.h>
 #include <asm/hvm/nestedhvm.h>
+#include <asm/spec_ctrl.h>
 #include <asm/x86_emulate.h>
 #include <public/sched.h>
 #include <asm/hvm/vpt.h>
@@ -610,6 +611,14 @@ static void cf_check svm_cpuid_policy_changed(struct vcpu *v)
     svm_intercept_msr(v, MSR_SPEC_CTRL,
                       cp->extd.ibrs ? MSR_INTERCEPT_NONE : MSR_INTERCEPT_RW);
 
+    /*
+     * Give access to MSR_VIRT_SPEC_CTRL if the guest has been told about it
+     * and the hardware implements it.
+     */
+    svm_intercept_msr(v, MSR_VIRT_SPEC_CTRL,
+                      cp->extd.virt_ssbd && cpu_has_virt_ssbd ?
+                      MSR_INTERCEPT_NONE : MSR_INTERCEPT_RW);
+
     /* Give access to MSR_PRED_CMD if the guest has been told about it. */
     svm_intercept_msr(v, MSR_PRED_CMD,
                       cp->extd.ibpb ? MSR_INTERCEPT_NONE : MSR_INTERCEPT_RW);
@@ -3105,6 +3114,36 @@ void svm_vmexit_handler(struct cpu_user_regs *regs)
     vmcb_set_vintr(vmcb, intr);
 }
 
+/* Called with GIF=0. */
+void vmexit_virt_spec_ctrl(void)
+{
+    unsigned int val = opt_ssbd ? SPEC_CTRL_SSBD : 0;
+
+    if ( cpu_has_virt_ssbd )
+    {
+        unsigned int lo, hi;
+
+        /*
+         * Need to read from the hardware because VIRT_SPEC_CTRL is not context
+         * switched by the hardware, and we allow the guest untrapped access to
+         * the register.
+         */
+        rdmsr(MSR_VIRT_SPEC_CTRL, lo, hi);
+        if ( val != lo )
+            wrmsr(MSR_VIRT_SPEC_CTRL, val, 0);
+        current->arch.msrs->virt_spec_ctrl.raw = lo;
+    }
+}
+
+/* Called with GIF=0. */
+void vmentry_virt_spec_ctrl(void)
+{
+    unsigned int val = current->arch.msrs->virt_spec_ctrl.raw;
+
+    if ( val != (opt_ssbd ? SPEC_CTRL_SSBD : 0) )
+        wrmsr(MSR_VIRT_SPEC_CTRL, val, 0);
+}
+
 /*
  * Local variables:
  * mode: C
diff --git a/xen/arch/x86/include/asm/cpufeatures.h b/xen/arch/x86/include/asm/cpufeatures.h
index 7413febd7a..2240547b64 100644
--- a/xen/arch/x86/include/asm/cpufeatures.h
+++ b/xen/arch/x86/include/asm/cpufeatures.h
@@ -40,6 +40,7 @@ XEN_CPUFEATURE(SC_VERW_HVM,       X86_SYNTH(24)) /* VERW used by Xen for HVM */
 XEN_CPUFEATURE(SC_VERW_IDLE,      X86_SYNTH(25)) /* VERW used by Xen for idle */
 XEN_CPUFEATURE(XEN_SHSTK,         X86_SYNTH(26)) /* Xen uses CET Shadow Stacks */
 XEN_CPUFEATURE(XEN_IBT,           X86_SYNTH(27)) /* Xen uses CET Indirect Branch Tracking */
+XEN_CPUFEATURE(VIRT_SC_MSR_HVM,   X86_SYNTH(28)) /* MSR_VIRT_SPEC_CTRL exposed to HVM */
 
 /* Bug words follow the synthetic words. */
 #define X86_NR_BUG 1
diff --git a/xen/arch/x86/include/asm/msr.h b/xen/arch/x86/include/asm/msr.h
index ab6fbb5051..460aabe84f 100644
--- a/xen/arch/x86/include/asm/msr.h
+++ b/xen/arch/x86/include/asm/msr.h
@@ -375,6 +375,16 @@ struct vcpu_msrs
      */
     uint32_t tsc_aux;
 
+    /*
+     * 0xc001011f - MSR_VIRT_SPEC_CTRL (if !X86_FEATURE_AMD_SSBD)
+     *
+     * AMD only. Guest selected value, saved and restored on guest VM
+     * entry/exit.
+     */
+    struct {
+        uint32_t raw;
+    } virt_spec_ctrl;
+
     /*
      * 0xc00110{27,19-1b} MSR_AMD64_DR{0-3}_ADDRESS_MASK
      *
diff --git a/xen/arch/x86/spec_ctrl.c b/xen/arch/x86/spec_ctrl.c
index f338bfe292..0d5ec877d1 100644
--- a/xen/arch/x86/spec_ctrl.c
+++ b/xen/arch/x86/spec_ctrl.c
@@ -406,9 +406,12 @@ static void __init print_details(enum ind_thunk thunk, uint64_t caps)
            (boot_cpu_has(X86_FEATURE_SC_MSR_HVM) ||
             boot_cpu_has(X86_FEATURE_SC_RSB_HVM) ||
             boot_cpu_has(X86_FEATURE_MD_CLEAR)   ||
+            boot_cpu_has(X86_FEATURE_VIRT_SC_MSR_HVM) ||
             opt_eager_fpu)                           ? ""               : " None",
            boot_cpu_has(X86_FEATURE_SC_MSR_HVM)      ? " MSR_SPEC_CTRL" : "",
-           boot_cpu_has(X86_FEATURE_SC_MSR_HVM)      ? " MSR_VIRT_SPEC_CTRL" : "",
+           (boot_cpu_has(X86_FEATURE_SC_MSR_HVM) ||
+            boot_cpu_has(X86_FEATURE_VIRT_SC_MSR_HVM)) ? " MSR_VIRT_SPEC_CTRL"
+                                                       : "",
            boot_cpu_has(X86_FEATURE_SC_RSB_HVM)      ? " RSB"           : "",
            opt_eager_fpu                             ? " EAGER_FPU"     : "",
            boot_cpu_has(X86_FEATURE_MD_CLEAR)        ? " MD_CLEAR"      : "");
@@ -1069,6 +1072,10 @@ void __init init_speculation_mitigations(void)
             setup_force_cpu_cap(X86_FEATURE_SC_MSR_HVM);
     }
 
+    /* Support VIRT_SPEC_CTRL.SSBD if AMD_SSBD is not available. */
+    if ( opt_msr_sc_hvm && !cpu_has_amd_ssbd && cpu_has_virt_ssbd )
+        setup_force_cpu_cap(X86_FEATURE_VIRT_SC_MSR_HVM);
+
     /* If we have IBRS available, see whether we should use it. */
     if ( has_spec_ctrl && ibrs )
         default_xen_spec_ctrl |= SPEC_CTRL_IBRS;
diff --git a/xen/include/public/arch-x86/cpufeatureset.h b/xen/include/public/arch-x86/cpufeatureset.h
index b797c6bea1..0639b9faf2 100644
--- a/xen/include/public/arch-x86/cpufeatureset.h
+++ b/xen/include/public/arch-x86/cpufeatureset.h
@@ -265,7 +265,7 @@ XEN_CPUFEATURE(IBRS_SAME_MODE, 8*32+19) /*S  IBRS provides same-mode protection
 XEN_CPUFEATURE(NO_LMSL,       8*32+20) /*S  EFER.LMSLE no longer supported. */
 XEN_CPUFEATURE(AMD_PPIN,      8*32+23) /*   Protected Processor Inventory Number */
 XEN_CPUFEATURE(AMD_SSBD,      8*32+24) /*S  MSR_SPEC_CTRL.SSBD available */
-XEN_CPUFEATURE(VIRT_SSBD,     8*32+25) /*!s MSR_VIRT_SPEC_CTRL.SSBD */
+XEN_CPUFEATURE(VIRT_SSBD,     8*32+25) /*!S MSR_VIRT_SPEC_CTRL.SSBD */
 XEN_CPUFEATURE(SSB_NO,        8*32+26) /*A  Hardware not vulnerable to SSB */
 XEN_CPUFEATURE(PSFD,          8*32+28) /*S  MSR_SPEC_CTRL.PSFD */
 
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 14:18:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 14:18:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290824.493370 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU80W-0002XH-Ik; Tue, 15 Mar 2022 14:18:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290824.493370; Tue, 15 Mar 2022 14:18:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU80W-0002X8-FJ; Tue, 15 Mar 2022 14:18:40 +0000
Received: by outflank-mailman (input) for mailman id 290824;
 Tue, 15 Mar 2022 14:18:38 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fAQZ=T2=citrix.com=prvs=0668da279=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nU80U-0001dw-GL
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 14:18:38 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id cd046a9f-a46a-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 15:18:36 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cd046a9f-a46a-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647353916;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:content-transfer-encoding:mime-version;
  bh=pmw0n5EiSj/Gg8CcI/wnNglcX0lP9n/ViiMh4cLvFpU=;
  b=SoI+ZJqFSnSTqBYxUJjYjqnrTbg1dGJDjGntwo70yB5BvKhVzD2vbAFE
   7saWV1BGLkF0CQ7M4ympod4btDr4YPlj8nwEH4vUgHyN9xGndkhkyIr7m
   TrOMwtYnkETn8KRv7XlyzU/of7IfaHcPPCo6zytdVJ21nADg/byXjoCDH
   8=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65756333
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:mE/+P6hxmHeXQiCRtbPo2rv7X161fhAKZh0ujC45NGQN5FlHY01je
 htvXGzTb6mDZGDxLt1xPI7goU1SvsfTz4NjHgJrpCEzQSkb9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFrQ4
 YiaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YV0WPYH+uOgmaEl3SRBlEPdnx5b4A0Hq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bkmtnwjzDS+4vXLjIQrnQ5M8e1zA17ixLNaiDO
 JdHMmE0BPjGSxgVNEsvV5QUpdqxiXquXC10rXS1nrVitgA/yyQuieOwYbI5YOeiWsF9jkue4
 GXc8AzRABsXKdiewjqt6W+3i6nEmiaTcJIfEvi0++BnhHWXx3cPE1sGWF2ju/67h0WiHdVFJ
 CQpFjEG9PZoshbxF5+kAkP+8CXsUgMgt8R4SdI5xDOtxpHvsynDN3MpFB9+QeMEjZpjLdA17
 WOhk9TsDD1plbSaT3OB67uZxQ+P1TgpwXwqPnFdE1ZcizX3iMRq10+UEI4/eEKgpoetcQwc1
 Qxmu8TXa187qccQn5u28lnc695HjsiYF1Vljuk7s4/M0++YWGJHT9HwgbQ4xawZRGp8crVnl
 CNc8yR5xLpSZaxhbATXHI0w8EuVz/iEKibAplVkAoMs8T+gk1b6I9wPumAkfR05a5xeEdMMX
 KM1kVgIjHO0FCH2BZKbnqrrU5h6pUQePYmNug/ogipmPcEqKV7vENBGbk+MxWH9+HXAYolkU
 ap3hf2EVC5AYYw+lWLeb75EjdcDm3BvrUuOFMuT50n2jtKjiIu9FO5tGEGQddow8K7siFyTq
 76zwePRkE4BOAA/CwGKmbMuwacidiFqW8qp95QJKoZu4GNOQQkcNhMY+pt4E6RNlKVJjObYu
 Ha7X05T0l3kgnPbbw6NbxhehHnHBP6TcVpT0fQQAGuV
IronPort-HdrOrdr: A9a23:GpX6d6oiOgW5nfm54QGasOkaV5pIeYIsimQD101hICG9E/b5qy
 nKpp8mPHDP5Qr5NEtLpTniAsi9qA3nmqKdiLN5VYtKNzOLhILHFu9f0bc=
X-IronPort-AV: E=Sophos;i="5.90,183,1643691600"; 
   d="scan'208";a="65756333"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=D3CF3vPZhvE4JNhxDFB2NTdHUbHjLVGzu1+6FDfalrCuDhPhfXUZnzRNx5FQTOI4jF6AuzpjVpUSpp+vDC54xbDYUe4eOYI5nZzIfwfNZTQHBmA++H4L3GPuYLiIdFBlBSujPtOXYsFsgFvJ/cCi1NheY7tfIESM6yAdGP4RG/6VD3PHR57aD7Jys0lD5b8jzTe3Kow8oLoDTo5DhQyAZsh9aTOnbyy3vBjmzFmOW17o9JTOg+POAP3qPwzzZu4SVFEogkrI8QzKq1AcEAXz2sSl9Gl71Wr+L5BLmcOnanRADFlDHH5ZiRHChl6dxxkR7A2+UL/jQglerjVQXk0TUw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=2ahOA0++gPYSAW5JG8yCQm/xSXxp3ybZIcobHc88tnw=;
 b=L1C8MZjXn9wVnhJHtbobX8Ovuw2DmDxUJxGDszjdJOiDvAWRufctWLbJskBC8MglwuaN5NtioXvw/N0rjcMRjZEl+Wfjc2vjq/DP/S+OtaEmFb2CrvEkRRiaK8dfDW3kkX4ljYpMkVPXfFiXBQiGTrNA4t2eIFMea3mGcrsmj54igW9qJ6lkpsbhhPr4yHr/H2odOqYS+xV7XKIY5xMOUTjwtqtdS/SnG4kDlmUXYFpVzDBrXTDSnGjzI5NcuOmOMwvkxe4dGxTo5zdZsQK7Ny5t08VC92cLol6qmG77x7VjLh5gVYzOs4t1WmKfPVYL4CuSwGaVTafR/ufTRwNo1g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=2ahOA0++gPYSAW5JG8yCQm/xSXxp3ybZIcobHc88tnw=;
 b=M7eF+xc3U06cztmKQWQ+esRfCzpLEOwARTrBv3IfMYbavxtxK4qnTKz5Ay4gdqR90POYvNi2L92oyH0cBXRyofPnADozDY3HastvzpCacY9pQMyScLSSYWP2yMEHZGiS+ZZBvzXE9hxTVe7IUsZna0QYhXEJ1MGdt85dum75INU=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: [PATCH v2 3/3] amd/msr: implement VIRT_SPEC_CTRL for HVM guests using legacy SSBD
Date: Tue, 15 Mar 2022 15:18:07 +0100
Message-ID: <20220315141807.22770-4-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220315141807.22770-1-roger.pau@citrix.com>
References: <20220315141807.22770-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO2P265CA0102.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:c::18) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 50b178cf-0cca-45a4-30b3-08da068eaf40
X-MS-TrafficTypeDiagnostic: CY4PR03MB2902:EE_
X-Microsoft-Antispam-PRVS: <CY4PR03MB2902EDD96DD120C09F345E428F109@CY4PR03MB2902.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(6512007)(5660300002)(6506007)(38100700002)(8936002)(6486002)(6916009)(8676002)(36756003)(508600001)(82960400001)(186003)(26005)(1076003)(83380400001)(966005)(66556008)(66476007)(66946007)(86362001)(6666004)(2906002)(316002)(2616005)(54906003)(4326008);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?UGtLbVprRkYzbkhKaDhNZDBRajlLYnV0YlNEb3hiOTJYeGNjTEphZ2xVZnRn?=
 =?utf-8?B?SDVBTXJHZ1RjSEIwOS9pUjZ6S3BDUXNYWXg1V3ZOMVRub1o1QXFZUHhRa3o4?=
 =?utf-8?B?MmZZeGdPclpRWUhvZ1dDYXhyL1IvWmp0T2RyZnUxMmd5OTRXcjkzY3luK3g5?=
 =?utf-8?B?Z3VqUCtHUWtRUG1ZZytaTzBTL2t2VENUam44VzZXMCtKbG1sdm5MSU5PUS9E?=
 =?utf-8?B?enNlMzRQb3pyK1hLbklqVFpLQUJGNkRoeXN1aEpLYmNhN0FiSDlYM0g0NkhI?=
 =?utf-8?B?N0lnTEZUSUxSVmFqNUxicm81TlVqS3BOc1h2Uk1mb2V5MGlleVBybk83bkpx?=
 =?utf-8?B?RGh2RmlLV2IrQ2ZYb1JNeTFpbUcwNFVCZUNlazhuZHhraVk2RjE4cWlLMFps?=
 =?utf-8?B?bEgwYTVWT3JqRXNvSVRBUkN2bGJIdGdEbmc0bnFScjRsdzVYdzAzZFNDeW1w?=
 =?utf-8?B?aGZTVjdqOURIS29lL2pOUGYvNGFkOXhSNk9RWURHOUxwN2d0L1E1THEyYUZJ?=
 =?utf-8?B?d2J3aDFEUitnQzg5SjQ2ZVY0N2w3ZDR0N01HRmNIaUNWYmViV1JtMXJIK0pL?=
 =?utf-8?B?YzU0TDBrYVkvbWxKOTR0a2RZSWJUZThKMnZ4RG5FZkd5cU93eVlmTmhJbndE?=
 =?utf-8?B?amR5RTFiWFBjblFOWjVETXBPYTQ1Q3JGWXBwUG9HVUFLb3UzdERySDBRUjMw?=
 =?utf-8?B?QUcrRVYzTFR0eDJPTFdQeGhTUWM3V3JiWW8zNFVYdzF1cSttL2Y4MGRjbHhR?=
 =?utf-8?B?TlJCNUpPblhXRkNGbUhJb3drcG9vUGtXY1plRnFzUzFHMTVHdVpZMTZYZ2JQ?=
 =?utf-8?B?Nmt3TmN2Y3dGeW5MMVhHb0IxMmljTzBMMU9pODBuY01UUlp2M1dGbWoxVitn?=
 =?utf-8?B?OG5FeENnZU01Ti8yQ25QSW1pODZmcDdSU056WEN3RVh4aXJ6cVdMb1F2REJs?=
 =?utf-8?B?eGlNWlNZVldMc2NTeUw1VzNFRmxKRHc0bTNTdG5PL2UzQ0ErY1JyN1M3YlUz?=
 =?utf-8?B?Y1RwUGxjU0RqN2lscWFzSVY5NkxyTU1MSGtLeklTempnV0Q1QkJhTk5BWUl6?=
 =?utf-8?B?NHh1c3ZwandoSjhuZXVXWW5HWkdibk9oQkpKdENQN3ZSNmNPN3Jsd24ybXEr?=
 =?utf-8?B?NnlieWtxejVqa1NDb21MYWVDSjR4dnhPMUtuU2QrclBWaVY0di84enRoQ2FM?=
 =?utf-8?B?ajRHQjZaN0JENTVHNmc3eUI3K1Q1eE5JL2hWVlBwd2x1a2drV0JobDBIMnZi?=
 =?utf-8?B?Wmk0OFY3WlJ5QVRWYnFNOUxNUDNrdzJsdFV5RDQvRlBOZUtyTkRCcDM5clNt?=
 =?utf-8?B?aktoSzl5dWpqK2ZkekZhTlBnUmRHN0w0RjdFTzVEaGFHWm1CcUg5N3hVb0Jk?=
 =?utf-8?B?MnRRLy92K3pxVjBJd2VOdU1oejZSVGV0L3cwVng2eVpGOWtGbUcwSnFWMW5t?=
 =?utf-8?B?TGJOQW9EQWNtSXMrQmpCb1FQaDh4WjJMbHV1Q2lCTUZzdStqdDFlb1lmUHhj?=
 =?utf-8?B?RkNLYThhRkhnVzJDOWxjU3k2ZzRUWi96UlVwVENiSFJ2OEVwRWNyQWlYSkhX?=
 =?utf-8?B?L21oZGYyUTNjTlo1cFViY2JGLytqRnRzWmJrY1lxaG5jVlpjcDl6anZ2R1ZO?=
 =?utf-8?B?LzRtVG0yRjlMVGoxOTlTV0NwYUNuaVYvVENrWUlPSmIxM1M5bnhyT3JMS1dy?=
 =?utf-8?B?anIwZXdGSE80NURVV0JhUFVpanA5a1pDYWNsMkUwTFl5K1NHb3hQNmJHVDJQ?=
 =?utf-8?B?ODNxOUVaeHJ1eUx4YW8yU3VUcTNUdUN3eW9mVE85MTRSaWVmaklIazJnRHBn?=
 =?utf-8?B?WEtuWjdhYnlKVmRkcVBRYndhRm1YOGxoQTdyTnN2ei9rbDBTTk8zeHUwSkFj?=
 =?utf-8?B?ZXQ4RWVCTWdIaUFQQ2RmemlETWxscDNpNFRoSWYwVVNIeEl3QStnWXNPUXdD?=
 =?utf-8?B?eXpKb2ZocHVnUHpPRUZOMXNiM2JFZEd5aVFNOThmYzU3eE1UbEo1OTd1Sldp?=
 =?utf-8?B?dER4aFg5MjV3PT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 50b178cf-0cca-45a4-30b3-08da068eaf40
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Mar 2022 14:18:32.3407
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: o5jcZjORmQ6n/fr+eocHKMifrW8dC9IwiFvvgMs6/bc911Tf9R+JEF2M3/EApGacEQrsDKCZnIlwqhNpIk+RBA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR03MB2902
X-OriginatorOrg: citrix.com

Expose VIRT_SSBD to guests if the hardware supports setting SSBD in
the LS_CFG MSR (a.k.a. non-architectural way). Different AMD CPU
families use different bits in LS_CFG, so exposing VIRT_SPEC_CTRL.SSBD
allows for an unified way of exposing SSBD support to guests on AMD
hardware that's compatible migration wise, regardless of what
underlying mechanism is used to set SSBD.

Note that on AMD Family 17h (Zen 1) the value of SSBD in LS_CFG is
shared between threads on the same core, so there's extra logic in
order to synchronize the value and have SSBD set as long as one of the
threads in the core requires it to be set. Such logic also requires
extra storage for each thread state, which is allocated at
initialization time.

Do the context switching of the SSBD selection in LS_CFG between
hypervisor and guest in the same handler that's already used to switch
the value of VIRT_SPEC_CTRL in the hardware when supported.

Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
Changes since v1:
 - Report legacy SSBD support using a global variable.
 - Use ro_after_init for ssbd_max_cores.
 - Handle boot_cpu_data.x86_num_siblings < 1.
 - Add comment regarding _irqsave usage in amd_set_legacy_ssbd.
---
 xen/arch/x86/cpu/amd.c         | 116 ++++++++++++++++++++++++++++-----
 xen/arch/x86/cpuid.c           |  10 +++
 xen/arch/x86/hvm/svm/svm.c     |  12 +++-
 xen/arch/x86/include/asm/amd.h |   4 ++
 xen/arch/x86/msr.c             |  22 ++++---
 xen/arch/x86/spec_ctrl.c       |   4 +-
 6 files changed, 141 insertions(+), 27 deletions(-)

diff --git a/xen/arch/x86/cpu/amd.c b/xen/arch/x86/cpu/amd.c
index 4999f8be2b..63d466b1df 100644
--- a/xen/arch/x86/cpu/amd.c
+++ b/xen/arch/x86/cpu/amd.c
@@ -48,6 +48,7 @@ boolean_param("allow_unsafe", opt_allow_unsafe);
 
 /* Signal whether the ACPI C1E quirk is required. */
 bool __read_mostly amd_acpi_c1e_quirk;
+bool __ro_after_init amd_legacy_ssbd;
 
 static inline int rdmsr_amd_safe(unsigned int msr, unsigned int *lo,
 				 unsigned int *hi)
@@ -685,23 +686,10 @@ void amd_init_lfence(struct cpuinfo_x86 *c)
  * Refer to the AMD Speculative Store Bypass whitepaper:
  * https://developer.amd.com/wp-content/resources/124441_AMD64_SpeculativeStoreBypassDisable_Whitepaper_final.pdf
  */
-void amd_init_ssbd(const struct cpuinfo_x86 *c)
+static bool set_legacy_ssbd(const struct cpuinfo_x86 *c, bool enable)
 {
 	int bit = -1;
 
-	if (cpu_has_ssb_no)
-		return;
-
-	if (cpu_has_amd_ssbd) {
-		/* Handled by common MSR_SPEC_CTRL logic */
-		return;
-	}
-
-	if (cpu_has_virt_ssbd) {
-		wrmsrl(MSR_VIRT_SPEC_CTRL, opt_ssbd ? SPEC_CTRL_SSBD : 0);
-		return;
-	}
-
 	switch (c->x86) {
 	case 0x15: bit = 54; break;
 	case 0x16: bit = 33; break;
@@ -715,20 +703,114 @@ void amd_init_ssbd(const struct cpuinfo_x86 *c)
 		if (rdmsr_safe(MSR_AMD64_LS_CFG, val) ||
 		    ({
 			    val &= ~mask;
-			    if (opt_ssbd)
+			    if (enable)
 				    val |= mask;
 			    false;
 		    }) ||
 		    wrmsr_safe(MSR_AMD64_LS_CFG, val) ||
 		    ({
 			    rdmsrl(MSR_AMD64_LS_CFG, val);
-			    (val & mask) != (opt_ssbd * mask);
+			    (val & mask) != (enable * mask);
 		    }))
 			bit = -1;
 	}
 
-	if (bit < 0)
+	return bit >= 0;
+}
+
+void amd_init_ssbd(const struct cpuinfo_x86 *c)
+{
+	if (cpu_has_ssb_no)
+		return;
+
+	if (cpu_has_amd_ssbd) {
+		/* Handled by common MSR_SPEC_CTRL logic */
+		return;
+	}
+
+	if (cpu_has_virt_ssbd) {
+		wrmsrl(MSR_VIRT_SPEC_CTRL, opt_ssbd ? SPEC_CTRL_SSBD : 0);
+		return;
+	}
+
+	if (!set_legacy_ssbd(c, opt_ssbd))
+	{
 		printk_once(XENLOG_ERR "No SSBD controls available\n");
+		if (amd_legacy_ssbd)
+			panic("CPU feature mismatch: no legacy SSBD\n");
+	}
+	else if ( c == &boot_cpu_data )
+		amd_legacy_ssbd = true;
+}
+
+static struct ssbd_core {
+    spinlock_t lock;
+    unsigned int count;
+} *ssbd_core;
+static unsigned int __ro_after_init ssbd_max_cores;
+
+bool __init amd_setup_legacy_ssbd(void)
+{
+	unsigned int i;
+
+	if (boot_cpu_data.x86 != 0x17 || boot_cpu_data.x86_num_siblings <= 1)
+		return true;
+
+	/*
+	 * One could be forgiven for thinking that c->x86_max_cores is the
+	 * correct value to use here.
+	 *
+	 * However, that value is derived from the current configuration, and
+	 * c->cpu_core_id is sparse on all but the top end CPUs.  Derive
+	 * max_cpus from ApicIdCoreIdSize which will cover any sparseness.
+	 */
+	if (boot_cpu_data.extended_cpuid_level >= 0x80000008) {
+		ssbd_max_cores = 1u << MASK_EXTR(cpuid_ecx(0x80000008), 0xf000);
+		ssbd_max_cores /= boot_cpu_data.x86_num_siblings;
+	}
+	if (!ssbd_max_cores)
+		return false;
+
+	/* Max is two sockets for Fam17h hardware. */
+	ssbd_core = xzalloc_array(struct ssbd_core, ssbd_max_cores * 2);
+	if (!ssbd_core)
+		return false;
+
+	for (i = 0; i < ssbd_max_cores * 2; i++) {
+		spin_lock_init(&ssbd_core[i].lock);
+		/* Record initial state, also applies to any hotplug CPU. */
+		if (opt_ssbd)
+			ssbd_core[i].count = boot_cpu_data.x86_num_siblings;
+	}
+
+	return true;
+}
+
+void amd_set_legacy_ssbd(bool enable)
+{
+	const struct cpuinfo_x86 *c = &current_cpu_data;
+	struct ssbd_core *core;
+	unsigned long flags;
+
+	if (c->x86 != 0x17 || c->x86_num_siblings <= 1) {
+		BUG_ON(!set_legacy_ssbd(c, enable));
+		return;
+	}
+
+	BUG_ON(c->phys_proc_id >= 2);
+	BUG_ON(c->cpu_core_id >= ssbd_max_cores);
+	core = &ssbd_core[c->phys_proc_id * ssbd_max_cores + c->cpu_core_id];
+	/*
+	 * Use irqsave variant to make check_lock() happy. When called from
+	 * vm{exit,entry}_virt_spec_ctrl GIF=0, but the state of IF could be 1,
+	 * thus fooling the spinlock check.
+	 */
+	spin_lock_irqsave(&core->lock, flags);
+	core->count += enable ? 1 : -1;
+	ASSERT(core->count <= c->x86_num_siblings);
+	if (enable ? core->count == 1 : !core->count)
+		BUG_ON(!set_legacy_ssbd(c, enable));
+	spin_unlock_irqrestore(&core->lock, flags);
 }
 
 void __init detect_zen2_null_seg_behaviour(void)
diff --git a/xen/arch/x86/cpuid.c b/xen/arch/x86/cpuid.c
index 91e53284fc..e278fee689 100644
--- a/xen/arch/x86/cpuid.c
+++ b/xen/arch/x86/cpuid.c
@@ -537,6 +537,16 @@ static void __init calculate_hvm_max_policy(void)
     if ( !boot_cpu_has(X86_FEATURE_VIRT_SC_MSR_HVM) )
         /* Clear VIRT_SSBD if VIRT_SPEC_CTRL is not exposed to guests. */
         __clear_bit(X86_FEATURE_VIRT_SSBD, hvm_featureset);
+    else
+        /*
+         * Expose VIRT_SSBD if VIRT_SPEC_CTRL is supported, as that implies the
+         * underlying hardware is capable of setting SSBD using
+         * non-architectural way or VIRT_SSBD is available.
+         *
+         * Note that if the hardware supports VIRT_SSBD natively this setting
+         * will just override an already set bit.
+         */
+        __set_bit(X86_FEATURE_VIRT_SSBD, hvm_featureset);
 
     /*
      * If Xen isn't virtualising MSR_SPEC_CTRL for HVM guests (functional
diff --git a/xen/arch/x86/hvm/svm/svm.c b/xen/arch/x86/hvm/svm/svm.c
index 73a0af599b..43fc9a3f8e 100644
--- a/xen/arch/x86/hvm/svm/svm.c
+++ b/xen/arch/x86/hvm/svm/svm.c
@@ -3132,7 +3132,12 @@ void vmexit_virt_spec_ctrl(void)
         if ( val != lo )
             wrmsr(MSR_VIRT_SPEC_CTRL, val, 0);
         current->arch.msrs->virt_spec_ctrl.raw = lo;
+
+        return;
     }
+
+    if ( val != current->arch.msrs->virt_spec_ctrl.raw )
+        amd_set_legacy_ssbd(val & SPEC_CTRL_SSBD);
 }
 
 /* Called with GIF=0. */
@@ -3141,7 +3146,12 @@ void vmentry_virt_spec_ctrl(void)
     unsigned int val = current->arch.msrs->virt_spec_ctrl.raw;
 
     if ( val != (opt_ssbd ? SPEC_CTRL_SSBD : 0) )
-        wrmsr(MSR_VIRT_SPEC_CTRL, val, 0);
+    {
+        if ( cpu_has_virt_ssbd )
+            wrmsr(MSR_VIRT_SPEC_CTRL, val, 0);
+        else
+            amd_set_legacy_ssbd(val & SPEC_CTRL_SSBD);
+    }
 }
 
 /*
diff --git a/xen/arch/x86/include/asm/amd.h b/xen/arch/x86/include/asm/amd.h
index a82382e6bf..6a42f68542 100644
--- a/xen/arch/x86/include/asm/amd.h
+++ b/xen/arch/x86/include/asm/amd.h
@@ -151,4 +151,8 @@ void check_enable_amd_mmconf_dmi(void);
 extern bool amd_acpi_c1e_quirk;
 void amd_check_disable_c1e(unsigned int port, u8 value);
 
+extern bool amd_legacy_ssbd;
+bool amd_setup_legacy_ssbd(void);
+void amd_set_legacy_ssbd(bool enable);
+
 #endif /* __AMD_H__ */
diff --git a/xen/arch/x86/msr.c b/xen/arch/x86/msr.c
index b212acf29d..1f4b63a497 100644
--- a/xen/arch/x86/msr.c
+++ b/xen/arch/x86/msr.c
@@ -385,7 +385,10 @@ int guest_rdmsr(struct vcpu *v, uint32_t msr, uint64_t *val)
         if ( !cp->extd.virt_ssbd )
             goto gp_fault;
 
-        *val = msrs->spec_ctrl.raw & SPEC_CTRL_SSBD;
+        if ( cpu_has_amd_ssbd )
+            *val = msrs->spec_ctrl.raw & SPEC_CTRL_SSBD;
+        else
+            *val = msrs->virt_spec_ctrl.raw;
         break;
 
     case MSR_AMD64_DE_CFG:
@@ -677,14 +680,17 @@ int guest_wrmsr(struct vcpu *v, uint32_t msr, uint64_t val)
         if ( !cp->extd.virt_ssbd )
             goto gp_fault;
 
-        /*
-         * Only supports SSBD bit, the rest are ignored. Only modify the SSBD
-         * bit in case other bits are set.
-         */
-        if ( val & SPEC_CTRL_SSBD )
-            msrs->spec_ctrl.raw |= SPEC_CTRL_SSBD;
+        /* Only supports SSBD bit, the rest are ignored. */
+        if ( cpu_has_amd_ssbd )
+        {
+            /* Only modify the SSBD bit in case other bits are set. */
+            if ( val & SPEC_CTRL_SSBD )
+                msrs->spec_ctrl.raw |= SPEC_CTRL_SSBD;
+            else
+                msrs->spec_ctrl.raw &= ~SPEC_CTRL_SSBD;
+        }
         else
-            msrs->spec_ctrl.raw &= ~SPEC_CTRL_SSBD;
+            msrs->virt_spec_ctrl.raw = val & SPEC_CTRL_SSBD;
         break;
 
     case MSR_AMD64_DE_CFG:
diff --git a/xen/arch/x86/spec_ctrl.c b/xen/arch/x86/spec_ctrl.c
index 0d5ec877d1..495e6f9405 100644
--- a/xen/arch/x86/spec_ctrl.c
+++ b/xen/arch/x86/spec_ctrl.c
@@ -22,6 +22,7 @@
 #include <xen/param.h>
 #include <xen/warning.h>
 
+#include <asm/amd.h>
 #include <asm/hvm/svm/svm.h>
 #include <asm/microcode.h>
 #include <asm/msr.h>
@@ -1073,7 +1074,8 @@ void __init init_speculation_mitigations(void)
     }
 
     /* Support VIRT_SPEC_CTRL.SSBD if AMD_SSBD is not available. */
-    if ( opt_msr_sc_hvm && !cpu_has_amd_ssbd && cpu_has_virt_ssbd )
+    if ( opt_msr_sc_hvm && !cpu_has_amd_ssbd &&
+         (cpu_has_virt_ssbd || (amd_legacy_ssbd && amd_setup_legacy_ssbd())) )
         setup_force_cpu_cap(X86_FEATURE_VIRT_SC_MSR_HVM);
 
     /* If we have IBRS available, see whether we should use it. */
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 14:30:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 14:30:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290837.493381 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU8BN-0004yJ-Pi; Tue, 15 Mar 2022 14:29:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290837.493381; Tue, 15 Mar 2022 14:29:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU8BN-0004yC-MS; Tue, 15 Mar 2022 14:29:53 +0000
Received: by outflank-mailman (input) for mailman id 290837;
 Tue, 15 Mar 2022 14:29:52 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU8BM-0004y2-NZ; Tue, 15 Mar 2022 14:29:52 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU8BM-00055l-Ks; Tue, 15 Mar 2022 14:29:52 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU8BM-000134-8f; Tue, 15 Mar 2022 14:29:52 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nU8BM-00060b-8B; Tue, 15 Mar 2022 14:29:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=gAIgHzaI+K82Bk3TcOrCLYFh4NhAGKGlhmhbfY7xgjs=; b=i5ZPSyh62lYYH4uJSyQtxJTByy
	bEKxcoAhxnmKeI4wzKqNbcon32UJZxd3CVkXwscVz0WKEb4brKRp/RFTHTmnFWvdo7InPJJsRqJM4
	KJX3IVD+frIT7KNn0+K6JdJxevgmNjucGOLqvwKSxhjhsX17SlSjVA9pn34RQXzeaxaA=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168608-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168608: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=2804fa912fa160e38e4ce7f537b6f6e1dcd5ee9d
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 15 Mar 2022 14:29:52 +0000

flight 168608 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168608/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              2804fa912fa160e38e4ce7f537b6f6e1dcd5ee9d
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  613 days
Failing since        151818  2020-07-11 04:18:52 Z  612 days  594 attempts
Testing same since   168522  2022-03-12 04:18:54 Z    3 days    4 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Haonan Wang <hnwanga1@gmail.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Martin Pitt <mpitt@debian.org>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 100900 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 14:42:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 14:42:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290845.493391 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU8ND-0007GE-06; Tue, 15 Mar 2022 14:42:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290845.493391; Tue, 15 Mar 2022 14:42:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU8NC-0007G7-TO; Tue, 15 Mar 2022 14:42:06 +0000
Received: by outflank-mailman (input) for mailman id 290845;
 Tue, 15 Mar 2022 14:42:05 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=1u5x=T2=redhat.com=armbru@srs-se1.protection.inumbo.net>)
 id 1nU8NB-0007Fw-4G
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 14:42:05 +0000
Received: from us-smtp-delivery-124.mimecast.com
 (us-smtp-delivery-124.mimecast.com [170.10.133.124])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 13b20ae8-a46e-11ec-853b-5f4723681683;
 Tue, 15 Mar 2022 15:42:03 +0100 (CET)
Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com
 [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS
 (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 us-mta-638-2vIvU3WdPUWYbINmL8lYeg-1; Tue, 15 Mar 2022 10:42:01 -0400
Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.rdu2.redhat.com
 [10.11.54.5])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by mimecast-mx02.redhat.com (Postfix) with ESMTPS id BA3492999B47;
 Tue, 15 Mar 2022 14:41:58 +0000 (UTC)
Received: from blackfin.pond.sub.org (unknown [10.36.112.3])
 by smtp.corp.redhat.com (Postfix) with ESMTPS id E65822EFB0;
 Tue, 15 Mar 2022 14:41:57 +0000 (UTC)
Received: by blackfin.pond.sub.org (Postfix, from userid 1000)
 id C2F2121E66FC; Tue, 15 Mar 2022 15:41:56 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 13b20ae8-a46e-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
	s=mimecast20190719; t=1647355322;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=F9p92xVdbAU558Jcfq2dXxSaOx5fAK5gBBxvOK2lDYo=;
	b=At5nnrjDBwjZ1UORLtere9g2Yn5yjcK5zGtosgm7bkYVNe4ZyD+SiDuMgNXLQui7IQ8zt5
	uwHWSYnNqFgrYrJdy2P1DoVY00QM67kDMH++gY3a1Wx5CN4y/5SE5/Ud8GfUlpc+DILQDn
	EJssbVC67n9VXKexP57qQpEh/RZLpeI=
X-MC-Unique: 2vIvU3WdPUWYbINmL8lYeg-1
From: Markus Armbruster <armbru@redhat.com>
To: qemu-devel@nongnu.org
Cc: Paolo Bonzini <pbonzini@redhat.com>,
	Richard Henderson <richard.henderson@linaro.org>,
	Gerd Hoffmann <kraxel@redhat.com>,
	Christian Schoenebeck <qemu_oss@crudebyte.com>,
	"Gonglei (Arei)" <arei.gonglei@huawei.com>,
	=?UTF-8?q?Marc-Andr=C3=A9=20Lureau?= <marcandre.lureau@redhat.com>,
	"Michael S. Tsirkin" <mst@redhat.com>,
	Igor Mammedov <imammedo@redhat.com>,
	Ani Sinha <ani@anisinha.ca>,
	Laurent Vivier <lvivier@redhat.com>,
	Amit Shah <amit@kernel.org>,
	Peter Maydell <peter.maydell@linaro.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Anthony Perard <anthony.perard@citrix.com>,
	Paul Durrant <paul@xen.org>,
	=?UTF-8?q?Herv=C3=A9=20Poussineau?= <hpoussin@reactos.org>,
	Aleksandar Rikalo <aleksandar.rikalo@syrmia.com>,
	Corey Minyard <cminyard@mvista.com>,
	Patrick Venture <venture@google.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Peter Xu <peterx@redhat.com>,
	Jason Wang <jasowang@redhat.com>,
	=?UTF-8?q?C=C3=A9dric=20Le=20Goater?= <clg@kaod.org>,
	Daniel Henrique Barboza <danielhb413@gmail.com>,
	David Gibson <david@gibson.dropbear.id.au>,
	Greg Kurz <groug@kaod.org>,
	=?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Jean-Christophe Dubois <jcd@tribudubois.net>,
	Keith Busch <kbusch@kernel.org>,
	Klaus Jensen <its@irrelevant.dk>,
	Yuval Shaia <yuval.shaia.ml@gmail.com>,
	Yoshinori Sato <ysato@users.sourceforge.jp>,
	Magnus Damm <magnus.damm@gmail.com>,
	Fabien Chouteau <chouteau@adacore.com>,
	KONRAD Frederic <frederic.konrad@adacore.com>,
	Mark Cave-Ayland <mark.cave-ayland@ilande.co.uk>,
	Artyom Tarasenko <atar4qemu@gmail.com>,
	Alex Williamson <alex.williamson@redhat.com>,
	Eric Auger <eric.auger@redhat.com>,
	Max Filippov <jcmvbkbc@gmail.com>,
	Juan Quintela <quintela@redhat.com>,
	"Dr. David Alan Gilbert" <dgilbert@redhat.com>,
	Konstantin Kostiuk <kkostiuk@redhat.com>,
	Michael Roth <michael.roth@amd.com>,
	=?UTF-8?q?Daniel=20P=2E=20Berrang=C3=A9?= <berrange@redhat.com>,
	Pavel Dovgalyuk <pavel.dovgaluk@ispras.ru>,
	=?UTF-8?q?Alex=20Benn=C3=A9e?= <alex.bennee@linaro.org>,
	David Hildenbrand <david@redhat.com>,
	Wenchao Wang <wenchao.wang@intel.com>,
	Kamil Rytarowski <kamil@netbsd.org>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Cornelia Huck <cohuck@redhat.com>,
	Thomas Huth <thuth@redhat.com>,
	Eric Blake <eblake@redhat.com>,
	Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>,
	John Snow <jsnow@redhat.com>,
	kvm@vger.kernel.org,
	qemu-arm@nongnu.org,
	xen-devel@lists.xenproject.org,
	qemu-ppc@nongnu.org,
	qemu-block@nongnu.org,
	haxm-team@intel.com,
	qemu-s390x@nongnu.org
Subject: [PATCH v2 1/3] scripts/coccinelle: New use-g_new-etc.cocci
Date: Tue, 15 Mar 2022 15:41:54 +0100
Message-Id: <20220315144156.1595462-2-armbru@redhat.com>
In-Reply-To: <20220315144156.1595462-1-armbru@redhat.com>
References: <20220315144156.1595462-1-armbru@redhat.com>
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.79 on 10.11.54.5
Authentication-Results: relay.mimecast.com;
	auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=armbru@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

This is the semantic patch from commit b45c03f585 "arm: Use g_new() &
friends where that makes obvious sense".

Signed-off-by: Markus Armbruster <armbru@redhat.com>
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
---
 scripts/coccinelle/use-g_new-etc.cocci | 75 ++++++++++++++++++++++++++
 1 file changed, 75 insertions(+)
 create mode 100644 scripts/coccinelle/use-g_new-etc.cocci

diff --git a/scripts/coccinelle/use-g_new-etc.cocci b/scripts/coccinelle/use-g_new-etc.cocci
new file mode 100644
index 0000000000..e2280e93b3
--- /dev/null
+++ b/scripts/coccinelle/use-g_new-etc.cocci
@@ -0,0 +1,75 @@
+// Use g_new() & friends where that makes obvious sense
+@@
+type T;
+@@
+-g_malloc(sizeof(T))
++g_new(T, 1)
+@@
+type T;
+@@
+-g_try_malloc(sizeof(T))
++g_try_new(T, 1)
+@@
+type T;
+@@
+-g_malloc0(sizeof(T))
++g_new0(T, 1)
+@@
+type T;
+@@
+-g_try_malloc0(sizeof(T))
++g_try_new0(T, 1)
+@@
+type T;
+expression n;
+@@
+-g_malloc(sizeof(T) * (n))
++g_new(T, n)
+@@
+type T;
+expression n;
+@@
+-g_try_malloc(sizeof(T) * (n))
++g_try_new(T, n)
+@@
+type T;
+expression n;
+@@
+-g_malloc0(sizeof(T) * (n))
++g_new0(T, n)
+@@
+type T;
+expression n;
+@@
+-g_try_malloc0(sizeof(T) * (n))
++g_try_new0(T, n)
+@@
+type T;
+expression p, n;
+@@
+-g_realloc(p, sizeof(T) * (n))
++g_renew(T, p, n)
+@@
+type T;
+expression p, n;
+@@
+-g_try_realloc(p, sizeof(T) * (n))
++g_try_renew(T, p, n)
+@@
+type T;
+expression n;
+@@
+-(T *)g_new(T, n)
++g_new(T, n)
+@@
+type T;
+expression n;
+@@
+-(T *)g_new0(T, n)
++g_new0(T, n)
+@@
+type T;
+expression p, n;
+@@
+-(T *)g_renew(T, p, n)
++g_renew(T, p, n)
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 14:42:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 14:42:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290846.493397 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU8ND-0007Jl-8r; Tue, 15 Mar 2022 14:42:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290846.493397; Tue, 15 Mar 2022 14:42:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU8ND-0007IP-41; Tue, 15 Mar 2022 14:42:07 +0000
Received: by outflank-mailman (input) for mailman id 290846;
 Tue, 15 Mar 2022 14:42:05 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=1u5x=T2=redhat.com=armbru@srs-se1.protection.inumbo.net>)
 id 1nU8NB-0007Fw-L8
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 14:42:05 +0000
Received: from us-smtp-delivery-124.mimecast.com
 (us-smtp-delivery-124.mimecast.com [170.10.129.124])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 13e8aac8-a46e-11ec-853b-5f4723681683;
 Tue, 15 Mar 2022 15:42:03 +0100 (CET)
Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com
 [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS
 (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 us-mta-539-B7jc6o2xM2CidF8CYWCU4w-1; Tue, 15 Mar 2022 10:42:01 -0400
Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.rdu2.redhat.com
 [10.11.54.2])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by mimecast-mx02.redhat.com (Postfix) with ESMTPS id DA65E10184A3;
 Tue, 15 Mar 2022 14:41:58 +0000 (UTC)
Received: from blackfin.pond.sub.org (unknown [10.36.112.3])
 by smtp.corp.redhat.com (Postfix) with ESMTPS id E64E540FF40A;
 Tue, 15 Mar 2022 14:41:57 +0000 (UTC)
Received: by blackfin.pond.sub.org (Postfix, from userid 1000)
 id C792F21D1F57; Tue, 15 Mar 2022 15:41:56 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 13e8aac8-a46e-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
	s=mimecast20190719; t=1647355322;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=iLfyluImzysLOPkiTvJo2zm+5FjLUH+6CI5H86s0TvU=;
	b=ERV5yuTHo16lD/0D4SgrNWtldjf+jt812GLaWHU/5niI+mLkOMbmWZ9Ydyont0SSJtrM4c
	98rOoKKGnuOshBMY8lz668lmZDjZMTh5S6v6J/h1g951n0DI49wtvk+4YCpcU5gJB7wcGD
	C4UYt09PSfdnlRxswQBG6MSkOzEKLho=
X-MC-Unique: B7jc6o2xM2CidF8CYWCU4w-1
From: Markus Armbruster <armbru@redhat.com>
To: qemu-devel@nongnu.org
Cc: Paolo Bonzini <pbonzini@redhat.com>,
	Richard Henderson <richard.henderson@linaro.org>,
	Gerd Hoffmann <kraxel@redhat.com>,
	Christian Schoenebeck <qemu_oss@crudebyte.com>,
	"Gonglei (Arei)" <arei.gonglei@huawei.com>,
	=?UTF-8?q?Marc-Andr=C3=A9=20Lureau?= <marcandre.lureau@redhat.com>,
	"Michael S. Tsirkin" <mst@redhat.com>,
	Igor Mammedov <imammedo@redhat.com>,
	Ani Sinha <ani@anisinha.ca>,
	Laurent Vivier <lvivier@redhat.com>,
	Amit Shah <amit@kernel.org>,
	Peter Maydell <peter.maydell@linaro.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Anthony Perard <anthony.perard@citrix.com>,
	Paul Durrant <paul@xen.org>,
	=?UTF-8?q?Herv=C3=A9=20Poussineau?= <hpoussin@reactos.org>,
	Aleksandar Rikalo <aleksandar.rikalo@syrmia.com>,
	Corey Minyard <cminyard@mvista.com>,
	Patrick Venture <venture@google.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Peter Xu <peterx@redhat.com>,
	Jason Wang <jasowang@redhat.com>,
	=?UTF-8?q?C=C3=A9dric=20Le=20Goater?= <clg@kaod.org>,
	Daniel Henrique Barboza <danielhb413@gmail.com>,
	David Gibson <david@gibson.dropbear.id.au>,
	Greg Kurz <groug@kaod.org>,
	=?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Jean-Christophe Dubois <jcd@tribudubois.net>,
	Keith Busch <kbusch@kernel.org>,
	Klaus Jensen <its@irrelevant.dk>,
	Yuval Shaia <yuval.shaia.ml@gmail.com>,
	Yoshinori Sato <ysato@users.sourceforge.jp>,
	Magnus Damm <magnus.damm@gmail.com>,
	Fabien Chouteau <chouteau@adacore.com>,
	KONRAD Frederic <frederic.konrad@adacore.com>,
	Mark Cave-Ayland <mark.cave-ayland@ilande.co.uk>,
	Artyom Tarasenko <atar4qemu@gmail.com>,
	Alex Williamson <alex.williamson@redhat.com>,
	Eric Auger <eric.auger@redhat.com>,
	Max Filippov <jcmvbkbc@gmail.com>,
	Juan Quintela <quintela@redhat.com>,
	"Dr. David Alan Gilbert" <dgilbert@redhat.com>,
	Konstantin Kostiuk <kkostiuk@redhat.com>,
	Michael Roth <michael.roth@amd.com>,
	=?UTF-8?q?Daniel=20P=2E=20Berrang=C3=A9?= <berrange@redhat.com>,
	Pavel Dovgalyuk <pavel.dovgaluk@ispras.ru>,
	=?UTF-8?q?Alex=20Benn=C3=A9e?= <alex.bennee@linaro.org>,
	David Hildenbrand <david@redhat.com>,
	Wenchao Wang <wenchao.wang@intel.com>,
	Kamil Rytarowski <kamil@netbsd.org>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Cornelia Huck <cohuck@redhat.com>,
	Thomas Huth <thuth@redhat.com>,
	Eric Blake <eblake@redhat.com>,
	Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>,
	John Snow <jsnow@redhat.com>,
	kvm@vger.kernel.org,
	qemu-arm@nongnu.org,
	xen-devel@lists.xenproject.org,
	qemu-ppc@nongnu.org,
	qemu-block@nongnu.org,
	haxm-team@intel.com,
	qemu-s390x@nongnu.org
Subject: [PATCH v2 2/3] 9pfs: Use g_new() & friends where that makes obvious sense
Date: Tue, 15 Mar 2022 15:41:55 +0100
Message-Id: <20220315144156.1595462-3-armbru@redhat.com>
In-Reply-To: <20220315144156.1595462-1-armbru@redhat.com>
References: <20220315144156.1595462-1-armbru@redhat.com>
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.84 on 10.11.54.2
Authentication-Results: relay.mimecast.com;
	auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=armbru@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
for two reasons.  One, it catches multiplication overflowing size_t.
Two, it returns T * rather than void *, which lets the compiler catch
more type errors.

This commit only touches allocations with size arguments of the form
sizeof(T).

Initial patch created mechanically with:

    $ spatch --in-place --sp-file scripts/coccinelle/use-g_new-etc.cocci \
	     --macro-file scripts/cocci-macro-file.h FILES...

This uncovers a typing error:

    ../hw/9pfs/9p.c: In function ‘qid_path_fullmap’:
    ../hw/9pfs/9p.c:855:13: error: assignment to ‘QpfEntry *’ from incompatible pointer type ‘QppEntry *’ [-Werror=incompatible-pointer-types]
      855 |         val = g_new0(QppEntry, 1);
	  |             ^

Harmless, because QppEntry is larger than QpfEntry.  Manually fixed to
allocate a QpfEntry instead.

Cc: Greg Kurz <groug@kaod.org>
Cc: Christian Schoenebeck <qemu_oss@crudebyte.com>
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
Reviewed-by: Christian Schoenebeck <qemu_oss@crudebyte.com>
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
Reviewed-by: Greg Kurz <groug@kaod.org>
---
 hw/9pfs/9p-proxy.c           | 2 +-
 hw/9pfs/9p-synth.c           | 4 ++--
 hw/9pfs/9p.c                 | 8 ++++----
 hw/9pfs/codir.c              | 6 +++---
 tests/qtest/virtio-9p-test.c | 4 ++--
 5 files changed, 12 insertions(+), 12 deletions(-)

diff --git a/hw/9pfs/9p-proxy.c b/hw/9pfs/9p-proxy.c
index 8b4b5cf7dc..4c5e0fc217 100644
--- a/hw/9pfs/9p-proxy.c
+++ b/hw/9pfs/9p-proxy.c
@@ -1187,7 +1187,7 @@ static int proxy_parse_opts(QemuOpts *opts, FsDriverEntry *fs, Error **errp)
 
 static int proxy_init(FsContext *ctx, Error **errp)
 {
-    V9fsProxy *proxy = g_malloc(sizeof(V9fsProxy));
+    V9fsProxy *proxy = g_new(V9fsProxy, 1);
     int sock_id;
 
     if (ctx->export_flags & V9FS_PROXY_SOCK_NAME) {
diff --git a/hw/9pfs/9p-synth.c b/hw/9pfs/9p-synth.c
index b3080e415b..d99d263985 100644
--- a/hw/9pfs/9p-synth.c
+++ b/hw/9pfs/9p-synth.c
@@ -49,7 +49,7 @@ static V9fsSynthNode *v9fs_add_dir_node(V9fsSynthNode *parent, int mode,
 
     /* Add directory type and remove write bits */
     mode = ((mode & 0777) | S_IFDIR) & ~(S_IWUSR | S_IWGRP | S_IWOTH);
-    node = g_malloc0(sizeof(V9fsSynthNode));
+    node = g_new0(V9fsSynthNode, 1);
     if (attr) {
         /* We are adding .. or . entries */
         node->attr = attr;
@@ -128,7 +128,7 @@ int qemu_v9fs_synth_add_file(V9fsSynthNode *parent, int mode,
     }
     /* Add file type and remove write bits */
     mode = ((mode & 0777) | S_IFREG);
-    node = g_malloc0(sizeof(V9fsSynthNode));
+    node = g_new0(V9fsSynthNode, 1);
     node->attr         = &node->actual_attr;
     node->attr->inode  = synth_node_count++;
     node->attr->nlink  = 1;
diff --git a/hw/9pfs/9p.c b/hw/9pfs/9p.c
index a6d6b3f835..8e9d4aea73 100644
--- a/hw/9pfs/9p.c
+++ b/hw/9pfs/9p.c
@@ -324,7 +324,7 @@ static V9fsFidState *alloc_fid(V9fsState *s, int32_t fid)
             return NULL;
         }
     }
-    f = g_malloc0(sizeof(V9fsFidState));
+    f = g_new0(V9fsFidState, 1);
     f->fid = fid;
     f->fid_type = P9_FID_NONE;
     f->ref = 1;
@@ -804,7 +804,7 @@ static int qid_inode_prefix_hash_bits(V9fsPDU *pdu, dev_t dev)
 
     val = qht_lookup(&pdu->s->qpd_table, &lookup, hash);
     if (!val) {
-        val = g_malloc0(sizeof(QpdEntry));
+        val = g_new0(QpdEntry, 1);
         *val = lookup;
         affix = affixForIndex(pdu->s->qp_affix_next);
         val->prefix_bits = affix.bits;
@@ -852,7 +852,7 @@ static int qid_path_fullmap(V9fsPDU *pdu, const struct stat *stbuf,
             return -ENFILE;
         }
 
-        val = g_malloc0(sizeof(QppEntry));
+        val = g_new0(QpfEntry, 1);
         *val = lookup;
 
         /* new unique inode and device combo */
@@ -928,7 +928,7 @@ static int qid_path_suffixmap(V9fsPDU *pdu, const struct stat *stbuf,
             return -ENFILE;
         }
 
-        val = g_malloc0(sizeof(QppEntry));
+        val = g_new0(QppEntry, 1);
         *val = lookup;
 
         /* new unique inode affix and device combo */
diff --git a/hw/9pfs/codir.c b/hw/9pfs/codir.c
index 75148bc985..93ba44fb75 100644
--- a/hw/9pfs/codir.c
+++ b/hw/9pfs/codir.c
@@ -141,9 +141,9 @@ static int do_readdir_many(V9fsPDU *pdu, V9fsFidState *fidp,
 
         /* append next node to result chain */
         if (!e) {
-            *entries = e = g_malloc0(sizeof(V9fsDirEnt));
+            *entries = e = g_new0(V9fsDirEnt, 1);
         } else {
-            e = e->next = g_malloc0(sizeof(V9fsDirEnt));
+            e = e->next = g_new0(V9fsDirEnt, 1);
         }
         e->dent = qemu_dirent_dup(dent);
 
@@ -163,7 +163,7 @@ static int do_readdir_many(V9fsPDU *pdu, V9fsFidState *fidp,
                 break;
             }
 
-            e->st = g_malloc0(sizeof(struct stat));
+            e->st = g_new0(struct stat, 1);
             memcpy(e->st, &stbuf, sizeof(struct stat));
         }
 
diff --git a/tests/qtest/virtio-9p-test.c b/tests/qtest/virtio-9p-test.c
index 01ca076afe..e28c71bd8f 100644
--- a/tests/qtest/virtio-9p-test.c
+++ b/tests/qtest/virtio-9p-test.c
@@ -468,12 +468,12 @@ static void v9fs_rreaddir(P9Req *req, uint32_t *count, uint32_t *nentries,
          togo -= 13 + 8 + 1 + 2 + slen, ++n)
     {
         if (!e) {
-            e = g_malloc(sizeof(struct V9fsDirent));
+            e = g_new(struct V9fsDirent, 1);
             if (entries) {
                 *entries = e;
             }
         } else {
-            e = e->next = g_malloc(sizeof(struct V9fsDirent));
+            e = e->next = g_new(struct V9fsDirent, 1);
         }
         e->next = NULL;
         /* qid[13] offset[8] type[1] name[s] */
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 14:42:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 14:42:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290847.493414 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU8NI-0007p0-Ls; Tue, 15 Mar 2022 14:42:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290847.493414; Tue, 15 Mar 2022 14:42:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU8NI-0007on-Ht; Tue, 15 Mar 2022 14:42:12 +0000
Received: by outflank-mailman (input) for mailman id 290847;
 Tue, 15 Mar 2022 14:42:11 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=1u5x=T2=redhat.com=armbru@srs-se1.protection.inumbo.net>)
 id 1nU8NH-0007nJ-8Z
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 14:42:11 +0000
Received: from us-smtp-delivery-124.mimecast.com
 (us-smtp-delivery-124.mimecast.com [170.10.129.124])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 1378d06f-a46e-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 15:42:07 +0100 (CET)
Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com
 [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS
 (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 us-mta-641-eIeJ3d8PN2almpoA8lzYrg-1; Tue, 15 Mar 2022 10:42:00 -0400
Received: from smtp.corp.redhat.com (int-mx10.intmail.prod.int.rdu2.redhat.com
 [10.11.54.10])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by mimecast-mx02.redhat.com (Postfix) with ESMTPS id DD2F4181A0E0;
 Tue, 15 Mar 2022 14:41:58 +0000 (UTC)
Received: from blackfin.pond.sub.org (unknown [10.36.112.3])
 by smtp.corp.redhat.com (Postfix) with ESMTPS id E64864B8D42;
 Tue, 15 Mar 2022 14:41:57 +0000 (UTC)
Received: by blackfin.pond.sub.org (Postfix, from userid 1000)
 id BF2CC21E66C8; Tue, 15 Mar 2022 15:41:56 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1378d06f-a46e-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
	s=mimecast20190719; t=1647355321;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=GC7qJg4HFbw11AF4VnR1TT/IY6FAlLGNtDHM0c9A3dc=;
	b=JTi73Y5Vqnd3OskajZfFj0B1vAK32p4dkXdN9/Ed7DHaSmqC7DzCnSXjrMyEJAyzzJrIqT
	/GCSowrk3X4Pf30wiaymCcyZGrg16D6BRvgPXRXGKg8mb18qoBKQuwGb/MCnYN+QY78u93
	8sIU4czPsNVcKj9r8H9bQNQPYbftmCo=
X-MC-Unique: eIeJ3d8PN2almpoA8lzYrg-1
From: Markus Armbruster <armbru@redhat.com>
To: qemu-devel@nongnu.org
Cc: Paolo Bonzini <pbonzini@redhat.com>,
	Richard Henderson <richard.henderson@linaro.org>,
	Gerd Hoffmann <kraxel@redhat.com>,
	Christian Schoenebeck <qemu_oss@crudebyte.com>,
	"Gonglei (Arei)" <arei.gonglei@huawei.com>,
	=?UTF-8?q?Marc-Andr=C3=A9=20Lureau?= <marcandre.lureau@redhat.com>,
	"Michael S. Tsirkin" <mst@redhat.com>,
	Igor Mammedov <imammedo@redhat.com>,
	Ani Sinha <ani@anisinha.ca>,
	Laurent Vivier <lvivier@redhat.com>,
	Amit Shah <amit@kernel.org>,
	Peter Maydell <peter.maydell@linaro.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Anthony Perard <anthony.perard@citrix.com>,
	Paul Durrant <paul@xen.org>,
	=?UTF-8?q?Herv=C3=A9=20Poussineau?= <hpoussin@reactos.org>,
	Aleksandar Rikalo <aleksandar.rikalo@syrmia.com>,
	Corey Minyard <cminyard@mvista.com>,
	Patrick Venture <venture@google.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Peter Xu <peterx@redhat.com>,
	Jason Wang <jasowang@redhat.com>,
	=?UTF-8?q?C=C3=A9dric=20Le=20Goater?= <clg@kaod.org>,
	Daniel Henrique Barboza <danielhb413@gmail.com>,
	David Gibson <david@gibson.dropbear.id.au>,
	Greg Kurz <groug@kaod.org>,
	=?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Jean-Christophe Dubois <jcd@tribudubois.net>,
	Keith Busch <kbusch@kernel.org>,
	Klaus Jensen <its@irrelevant.dk>,
	Yuval Shaia <yuval.shaia.ml@gmail.com>,
	Yoshinori Sato <ysato@users.sourceforge.jp>,
	Magnus Damm <magnus.damm@gmail.com>,
	Fabien Chouteau <chouteau@adacore.com>,
	KONRAD Frederic <frederic.konrad@adacore.com>,
	Mark Cave-Ayland <mark.cave-ayland@ilande.co.uk>,
	Artyom Tarasenko <atar4qemu@gmail.com>,
	Alex Williamson <alex.williamson@redhat.com>,
	Eric Auger <eric.auger@redhat.com>,
	Max Filippov <jcmvbkbc@gmail.com>,
	Juan Quintela <quintela@redhat.com>,
	"Dr. David Alan Gilbert" <dgilbert@redhat.com>,
	Konstantin Kostiuk <kkostiuk@redhat.com>,
	Michael Roth <michael.roth@amd.com>,
	=?UTF-8?q?Daniel=20P=2E=20Berrang=C3=A9?= <berrange@redhat.com>,
	Pavel Dovgalyuk <pavel.dovgaluk@ispras.ru>,
	=?UTF-8?q?Alex=20Benn=C3=A9e?= <alex.bennee@linaro.org>,
	David Hildenbrand <david@redhat.com>,
	Wenchao Wang <wenchao.wang@intel.com>,
	Kamil Rytarowski <kamil@netbsd.org>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Cornelia Huck <cohuck@redhat.com>,
	Thomas Huth <thuth@redhat.com>,
	Eric Blake <eblake@redhat.com>,
	Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>,
	John Snow <jsnow@redhat.com>,
	kvm@vger.kernel.org,
	qemu-arm@nongnu.org,
	xen-devel@lists.xenproject.org,
	qemu-ppc@nongnu.org,
	qemu-block@nongnu.org,
	haxm-team@intel.com,
	qemu-s390x@nongnu.org
Subject: [PATCH v2 0/3] Use g_new() & friends where that makes obvious sense
Date: Tue, 15 Mar 2022 15:41:53 +0100
Message-Id: <20220315144156.1595462-1-armbru@redhat.com>
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.85 on 10.11.54.10
Authentication-Results: relay.mimecast.com;
	auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=armbru@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
for two reasons.  One, it catches multiplication overflowing size_t.
Two, it returns T * rather than void *, which lets the compiler catch
more type errors.

This series only touches allocations with size arguments of the form
sizeof(T).  It's mechanical, except for a tiny fix in PATCH 2.

PATCH 1 adds the Coccinelle script.

PATCH 2 cleans up the virtio-9p subsystem, and fixes a harmless typing
error uncovered by the cleanup.

PATCH 3 cleans up everything else.  I started to split it up, but
splitting is a lot of decisions, and I just can't see the value.

For instance, MAINTAINERS tells me to split for subsystem "virtio",
patching

    hw/char/virtio-serial-bus.c
    hw/display/virtio-gpu.c
    hw/net/virtio-net.c
    hw/virtio/virtio-crypto.c
    hw/virtio/virtio-iommu.c
    hw/virtio/virtio.c

But it also tells me to split for subsystem "Character devices",
patching

    hw/char/parallel.c                       |  2 +-
    hw/char/riscv_htif.c                     |  2 +-
    hw/char/virtio-serial-bus.c              |  6 +-

and for subsystem "Network devices", patching

    hw/net/virtio-net.c

and for subsystem "virtio-gpu", patching

    hw/display/virtio-gpu.c

I guess I'd go with "virtio".  Six files down, 103 to go.  Thanks, but
no thanks.

Since the transformation is local to a function call, dropping is
completely safe.  We can deal with conflicts by dropping conflicting
hunks, with "git-pull -s recursive -X ours".  Or drop entire files
with conflicts.

If you want me to split off certain parts, please tell me exactly what
you want split off, and I'll gladly do the splitting.  I don't mind
the splitting part, I do mind the *thinking* part.

I backed out two changes made by the Coccinelle script:
scripts/coverity-scan/model.c, because that's special, and
semihosting/config.c, because it has a typing error similar to the one
fixed in PATCH 2, and Alex already posted a patch for it.

v2:
* PATCH 3: Change to scripts/coverity-scan/model.c dropped [Eric]
* PATCH 3: Change to semihosting/config.c dropped [Alex]
* Commit messages tweaked

Markus Armbruster (3):
  scripts/coccinelle: New use-g_new-etc.cocci
  9pfs: Use g_new() & friends where that makes obvious sense
  Use g_new() & friends where that makes obvious sense

 scripts/coccinelle/use-g_new-etc.cocci   | 75 ++++++++++++++++++++++++
 include/qemu/timer.h                     |  2 +-
 accel/kvm/kvm-all.c                      |  6 +-
 accel/tcg/tcg-accel-ops-mttcg.c          |  2 +-
 accel/tcg/tcg-accel-ops-rr.c             |  4 +-
 audio/audio.c                            |  4 +-
 audio/audio_legacy.c                     |  6 +-
 audio/dsoundaudio.c                      |  2 +-
 audio/jackaudio.c                        |  6 +-
 audio/paaudio.c                          |  4 +-
 backends/cryptodev.c                     |  2 +-
 contrib/vhost-user-gpu/vhost-user-gpu.c  |  2 +-
 cpus-common.c                            |  4 +-
 dump/dump.c                              |  2 +-
 hw/9pfs/9p-proxy.c                       |  2 +-
 hw/9pfs/9p-synth.c                       |  4 +-
 hw/9pfs/9p.c                             |  8 +--
 hw/9pfs/codir.c                          |  6 +-
 hw/acpi/hmat.c                           |  2 +-
 hw/audio/intel-hda.c                     |  2 +-
 hw/char/parallel.c                       |  2 +-
 hw/char/riscv_htif.c                     |  2 +-
 hw/char/virtio-serial-bus.c              |  6 +-
 hw/core/irq.c                            |  2 +-
 hw/core/reset.c                          |  2 +-
 hw/display/pxa2xx_lcd.c                  |  2 +-
 hw/display/tc6393xb.c                    |  2 +-
 hw/display/virtio-gpu.c                  |  4 +-
 hw/display/xenfb.c                       |  4 +-
 hw/dma/rc4030.c                          |  4 +-
 hw/i2c/core.c                            |  4 +-
 hw/i2c/i2c_mux_pca954x.c                 |  2 +-
 hw/i386/amd_iommu.c                      |  4 +-
 hw/i386/intel_iommu.c                    |  2 +-
 hw/i386/xen/xen-hvm.c                    | 10 ++--
 hw/i386/xen/xen-mapcache.c               | 14 ++---
 hw/input/lasips2.c                       |  2 +-
 hw/input/pckbd.c                         |  2 +-
 hw/input/ps2.c                           |  4 +-
 hw/input/pxa2xx_keypad.c                 |  2 +-
 hw/input/tsc2005.c                       |  3 +-
 hw/intc/riscv_aclint.c                   |  6 +-
 hw/intc/xics.c                           |  2 +-
 hw/m68k/virt.c                           |  2 +-
 hw/mips/mipssim.c                        |  2 +-
 hw/misc/applesmc.c                       |  2 +-
 hw/misc/imx6_src.c                       |  2 +-
 hw/misc/ivshmem.c                        |  4 +-
 hw/net/virtio-net.c                      |  4 +-
 hw/nvme/ns.c                             |  2 +-
 hw/pci-host/pnv_phb3.c                   |  2 +-
 hw/pci-host/pnv_phb4.c                   |  2 +-
 hw/pci/pcie_sriov.c                      |  2 +-
 hw/ppc/e500.c                            |  2 +-
 hw/ppc/ppc.c                             |  8 +--
 hw/ppc/ppc405_boards.c                   |  4 +-
 hw/ppc/ppc405_uc.c                       | 18 +++---
 hw/ppc/ppc4xx_devs.c                     |  2 +-
 hw/ppc/ppc_booke.c                       |  4 +-
 hw/ppc/spapr.c                           |  2 +-
 hw/ppc/spapr_events.c                    |  2 +-
 hw/ppc/spapr_hcall.c                     |  2 +-
 hw/ppc/spapr_numa.c                      |  3 +-
 hw/rdma/vmw/pvrdma_dev_ring.c            |  2 +-
 hw/rdma/vmw/pvrdma_qp_ops.c              |  6 +-
 hw/sh4/r2d.c                             |  4 +-
 hw/sh4/sh7750.c                          |  2 +-
 hw/sparc/leon3.c                         |  2 +-
 hw/sparc64/sparc64.c                     |  4 +-
 hw/timer/arm_timer.c                     |  2 +-
 hw/timer/slavio_timer.c                  |  2 +-
 hw/vfio/pci.c                            |  4 +-
 hw/vfio/platform.c                       |  4 +-
 hw/virtio/virtio-crypto.c                |  2 +-
 hw/virtio/virtio-iommu.c                 |  2 +-
 hw/virtio/virtio.c                       |  5 +-
 hw/xtensa/xtfpga.c                       |  2 +-
 linux-user/syscall.c                     |  2 +-
 migration/dirtyrate.c                    |  4 +-
 migration/multifd-zlib.c                 |  4 +-
 migration/ram.c                          |  2 +-
 monitor/misc.c                           |  2 +-
 monitor/qmp-cmds.c                       |  2 +-
 qga/commands-win32.c                     |  8 +--
 qga/commands.c                           |  2 +-
 qom/qom-qmp-cmds.c                       |  2 +-
 replay/replay-char.c                     |  4 +-
 replay/replay-events.c                   | 10 ++--
 softmmu/bootdevice.c                     |  4 +-
 softmmu/dma-helpers.c                    |  4 +-
 softmmu/memory_mapping.c                 |  2 +-
 target/i386/cpu-sysemu.c                 |  2 +-
 target/i386/hax/hax-accel-ops.c          |  4 +-
 target/i386/nvmm/nvmm-accel-ops.c        |  4 +-
 target/i386/whpx/whpx-accel-ops.c        |  4 +-
 target/i386/whpx/whpx-all.c              |  2 +-
 target/s390x/cpu-sysemu.c                |  2 +-
 tests/qtest/virtio-9p-test.c             |  4 +-
 tests/unit/test-hbitmap.c                |  2 +-
 tests/unit/test-qmp-cmds.c               | 14 ++---
 tests/unit/test-qobject-output-visitor.c |  2 +-
 tests/unit/test-vmstate.c                | 42 ++++++-------
 ui/vnc-enc-tight.c                       |  2 +-
 util/envlist.c                           |  2 +-
 util/hbitmap.c                           |  2 +-
 util/main-loop.c                         |  2 +-
 util/qemu-timer.c                        |  2 +-
 util/vfio-helpers.c                      |  4 +-
 108 files changed, 282 insertions(+), 212 deletions(-)
 create mode 100644 scripts/coccinelle/use-g_new-etc.cocci

-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 14:42:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 14:42:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290848.493425 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU8NN-0008Bm-Ua; Tue, 15 Mar 2022 14:42:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290848.493425; Tue, 15 Mar 2022 14:42:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU8NN-0008Bd-Qr; Tue, 15 Mar 2022 14:42:17 +0000
Received: by outflank-mailman (input) for mailman id 290848;
 Tue, 15 Mar 2022 14:42:16 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=1u5x=T2=redhat.com=armbru@srs-se1.protection.inumbo.net>)
 id 1nU8NM-0007nJ-7E
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 14:42:16 +0000
Received: from us-smtp-delivery-124.mimecast.com
 (us-smtp-delivery-124.mimecast.com [170.10.129.124])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 16329168-a46e-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 15:42:13 +0100 (CET)
Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com
 [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS
 (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 us-mta-489-KoLFHDU6ORCzxdociODm7g-1; Tue, 15 Mar 2022 10:42:02 -0400
Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.rdu2.redhat.com
 [10.11.54.1])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by mimecast-mx02.redhat.com (Postfix) with ESMTPS id E7F3F2999B4D;
 Tue, 15 Mar 2022 14:41:59 +0000 (UTC)
Received: from blackfin.pond.sub.org (unknown [10.36.112.3])
 by smtp.corp.redhat.com (Postfix) with ESMTPS id 392A640CFD0E;
 Tue, 15 Mar 2022 14:41:59 +0000 (UTC)
Received: by blackfin.pond.sub.org (Postfix, from userid 1000)
 id CCFCA21D1F5A; Tue, 15 Mar 2022 15:41:56 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 16329168-a46e-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
	s=mimecast20190719; t=1647355326;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=66PttAMaDePnZpAaERjhmXYLkWYyqtV8i1H4LCrJWaI=;
	b=OQeeXjVKdDIg126ycOH3r3eoHQFZv1df4YfND2zzVx+UANv//TPBuU24urRH8QFKA7KGmM
	AZtqLoiMmYwrwEzqFb7rLKnuosssTRQhVWwwByS744w3T1ajiRUnXCSVJ5sYDG9HwwE6Sd
	eDJDnbSUILusf/S0wwfSGqiPpNHosBs=
X-MC-Unique: KoLFHDU6ORCzxdociODm7g-1
From: Markus Armbruster <armbru@redhat.com>
To: qemu-devel@nongnu.org
Cc: Paolo Bonzini <pbonzini@redhat.com>,
	Richard Henderson <richard.henderson@linaro.org>,
	Gerd Hoffmann <kraxel@redhat.com>,
	Christian Schoenebeck <qemu_oss@crudebyte.com>,
	"Gonglei (Arei)" <arei.gonglei@huawei.com>,
	=?UTF-8?q?Marc-Andr=C3=A9=20Lureau?= <marcandre.lureau@redhat.com>,
	"Michael S. Tsirkin" <mst@redhat.com>,
	Igor Mammedov <imammedo@redhat.com>,
	Ani Sinha <ani@anisinha.ca>,
	Laurent Vivier <lvivier@redhat.com>,
	Amit Shah <amit@kernel.org>,
	Peter Maydell <peter.maydell@linaro.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Anthony Perard <anthony.perard@citrix.com>,
	Paul Durrant <paul@xen.org>,
	=?UTF-8?q?Herv=C3=A9=20Poussineau?= <hpoussin@reactos.org>,
	Aleksandar Rikalo <aleksandar.rikalo@syrmia.com>,
	Corey Minyard <cminyard@mvista.com>,
	Patrick Venture <venture@google.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Peter Xu <peterx@redhat.com>,
	Jason Wang <jasowang@redhat.com>,
	=?UTF-8?q?C=C3=A9dric=20Le=20Goater?= <clg@kaod.org>,
	Daniel Henrique Barboza <danielhb413@gmail.com>,
	David Gibson <david@gibson.dropbear.id.au>,
	Greg Kurz <groug@kaod.org>,
	=?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Jean-Christophe Dubois <jcd@tribudubois.net>,
	Keith Busch <kbusch@kernel.org>,
	Klaus Jensen <its@irrelevant.dk>,
	Yuval Shaia <yuval.shaia.ml@gmail.com>,
	Yoshinori Sato <ysato@users.sourceforge.jp>,
	Magnus Damm <magnus.damm@gmail.com>,
	Fabien Chouteau <chouteau@adacore.com>,
	KONRAD Frederic <frederic.konrad@adacore.com>,
	Mark Cave-Ayland <mark.cave-ayland@ilande.co.uk>,
	Artyom Tarasenko <atar4qemu@gmail.com>,
	Alex Williamson <alex.williamson@redhat.com>,
	Eric Auger <eric.auger@redhat.com>,
	Max Filippov <jcmvbkbc@gmail.com>,
	Juan Quintela <quintela@redhat.com>,
	"Dr. David Alan Gilbert" <dgilbert@redhat.com>,
	Konstantin Kostiuk <kkostiuk@redhat.com>,
	Michael Roth <michael.roth@amd.com>,
	=?UTF-8?q?Daniel=20P=2E=20Berrang=C3=A9?= <berrange@redhat.com>,
	Pavel Dovgalyuk <pavel.dovgaluk@ispras.ru>,
	=?UTF-8?q?Alex=20Benn=C3=A9e?= <alex.bennee@linaro.org>,
	David Hildenbrand <david@redhat.com>,
	Wenchao Wang <wenchao.wang@intel.com>,
	Kamil Rytarowski <kamil@netbsd.org>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Cornelia Huck <cohuck@redhat.com>,
	Thomas Huth <thuth@redhat.com>,
	Eric Blake <eblake@redhat.com>,
	Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>,
	John Snow <jsnow@redhat.com>,
	kvm@vger.kernel.org,
	qemu-arm@nongnu.org,
	xen-devel@lists.xenproject.org,
	qemu-ppc@nongnu.org,
	qemu-block@nongnu.org,
	haxm-team@intel.com,
	qemu-s390x@nongnu.org
Subject: [PATCH v2 3/3] Use g_new() & friends where that makes obvious sense
Date: Tue, 15 Mar 2022 15:41:56 +0100
Message-Id: <20220315144156.1595462-4-armbru@redhat.com>
In-Reply-To: <20220315144156.1595462-1-armbru@redhat.com>
References: <20220315144156.1595462-1-armbru@redhat.com>
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.84 on 10.11.54.1
Authentication-Results: relay.mimecast.com;
	auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=armbru@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
for two reasons.  One, it catches multiplication overflowing size_t.
Two, it returns T * rather than void *, which lets the compiler catch
more type errors.

This commit only touches allocations with size arguments of the form
sizeof(T).

Patch created mechanically with:

    $ spatch --in-place --sp-file scripts/coccinelle/use-g_new-etc.cocci \
	     --macro-file scripts/cocci-macro-file.h FILES...

Signed-off-by: Markus Armbruster <armbru@redhat.com>
Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
Reviewed-by: Cédric Le Goater <clg@kaod.org>
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
Acked-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
---
 include/qemu/timer.h                     |  2 +-
 accel/kvm/kvm-all.c                      |  6 ++--
 accel/tcg/tcg-accel-ops-mttcg.c          |  2 +-
 accel/tcg/tcg-accel-ops-rr.c             |  4 +--
 audio/audio.c                            |  4 +--
 audio/audio_legacy.c                     |  6 ++--
 audio/dsoundaudio.c                      |  2 +-
 audio/jackaudio.c                        |  6 ++--
 audio/paaudio.c                          |  4 +--
 backends/cryptodev.c                     |  2 +-
 contrib/vhost-user-gpu/vhost-user-gpu.c  |  2 +-
 cpus-common.c                            |  4 +--
 dump/dump.c                              |  2 +-
 hw/acpi/hmat.c                           |  2 +-
 hw/audio/intel-hda.c                     |  2 +-
 hw/char/parallel.c                       |  2 +-
 hw/char/riscv_htif.c                     |  2 +-
 hw/char/virtio-serial-bus.c              |  6 ++--
 hw/core/irq.c                            |  2 +-
 hw/core/reset.c                          |  2 +-
 hw/display/pxa2xx_lcd.c                  |  2 +-
 hw/display/tc6393xb.c                    |  2 +-
 hw/display/virtio-gpu.c                  |  4 +--
 hw/display/xenfb.c                       |  4 +--
 hw/dma/rc4030.c                          |  4 +--
 hw/i2c/core.c                            |  4 +--
 hw/i2c/i2c_mux_pca954x.c                 |  2 +-
 hw/i386/amd_iommu.c                      |  4 +--
 hw/i386/intel_iommu.c                    |  2 +-
 hw/i386/xen/xen-hvm.c                    | 10 +++---
 hw/i386/xen/xen-mapcache.c               | 14 ++++----
 hw/input/lasips2.c                       |  2 +-
 hw/input/pckbd.c                         |  2 +-
 hw/input/ps2.c                           |  4 +--
 hw/input/pxa2xx_keypad.c                 |  2 +-
 hw/input/tsc2005.c                       |  3 +-
 hw/intc/riscv_aclint.c                   |  6 ++--
 hw/intc/xics.c                           |  2 +-
 hw/m68k/virt.c                           |  2 +-
 hw/mips/mipssim.c                        |  2 +-
 hw/misc/applesmc.c                       |  2 +-
 hw/misc/imx6_src.c                       |  2 +-
 hw/misc/ivshmem.c                        |  4 +--
 hw/net/virtio-net.c                      |  4 +--
 hw/nvme/ns.c                             |  2 +-
 hw/pci-host/pnv_phb3.c                   |  2 +-
 hw/pci-host/pnv_phb4.c                   |  2 +-
 hw/pci/pcie_sriov.c                      |  2 +-
 hw/ppc/e500.c                            |  2 +-
 hw/ppc/ppc.c                             |  8 ++---
 hw/ppc/ppc405_boards.c                   |  4 +--
 hw/ppc/ppc405_uc.c                       | 18 +++++-----
 hw/ppc/ppc4xx_devs.c                     |  2 +-
 hw/ppc/ppc_booke.c                       |  4 +--
 hw/ppc/spapr.c                           |  2 +-
 hw/ppc/spapr_events.c                    |  2 +-
 hw/ppc/spapr_hcall.c                     |  2 +-
 hw/ppc/spapr_numa.c                      |  3 +-
 hw/rdma/vmw/pvrdma_dev_ring.c            |  2 +-
 hw/rdma/vmw/pvrdma_qp_ops.c              |  6 ++--
 hw/sh4/r2d.c                             |  4 +--
 hw/sh4/sh7750.c                          |  2 +-
 hw/sparc/leon3.c                         |  2 +-
 hw/sparc64/sparc64.c                     |  4 +--
 hw/timer/arm_timer.c                     |  2 +-
 hw/timer/slavio_timer.c                  |  2 +-
 hw/vfio/pci.c                            |  4 +--
 hw/vfio/platform.c                       |  4 +--
 hw/virtio/virtio-crypto.c                |  2 +-
 hw/virtio/virtio-iommu.c                 |  2 +-
 hw/virtio/virtio.c                       |  5 ++-
 hw/xtensa/xtfpga.c                       |  2 +-
 linux-user/syscall.c                     |  2 +-
 migration/dirtyrate.c                    |  4 +--
 migration/multifd-zlib.c                 |  4 +--
 migration/ram.c                          |  2 +-
 monitor/misc.c                           |  2 +-
 monitor/qmp-cmds.c                       |  2 +-
 qga/commands-win32.c                     |  8 ++---
 qga/commands.c                           |  2 +-
 qom/qom-qmp-cmds.c                       |  2 +-
 replay/replay-char.c                     |  4 +--
 replay/replay-events.c                   | 10 +++---
 softmmu/bootdevice.c                     |  4 +--
 softmmu/dma-helpers.c                    |  4 +--
 softmmu/memory_mapping.c                 |  2 +-
 target/i386/cpu-sysemu.c                 |  2 +-
 target/i386/hax/hax-accel-ops.c          |  4 +--
 target/i386/nvmm/nvmm-accel-ops.c        |  4 +--
 target/i386/whpx/whpx-accel-ops.c        |  4 +--
 target/i386/whpx/whpx-all.c              |  2 +-
 target/s390x/cpu-sysemu.c                |  2 +-
 tests/unit/test-hbitmap.c                |  2 +-
 tests/unit/test-qmp-cmds.c               | 14 ++++----
 tests/unit/test-qobject-output-visitor.c |  2 +-
 tests/unit/test-vmstate.c                | 42 ++++++++++++------------
 ui/vnc-enc-tight.c                       |  2 +-
 util/envlist.c                           |  2 +-
 util/hbitmap.c                           |  2 +-
 util/main-loop.c                         |  2 +-
 util/qemu-timer.c                        |  2 +-
 util/vfio-helpers.c                      |  4 +--
 102 files changed, 195 insertions(+), 200 deletions(-)

diff --git a/include/qemu/timer.h b/include/qemu/timer.h
index 88ef114689..ee071e07d1 100644
--- a/include/qemu/timer.h
+++ b/include/qemu/timer.h
@@ -520,7 +520,7 @@ static inline QEMUTimer *timer_new_full(QEMUTimerListGroup *timer_list_group,
                                         int scale, int attributes,
                                         QEMUTimerCB *cb, void *opaque)
 {
-    QEMUTimer *ts = g_malloc0(sizeof(QEMUTimer));
+    QEMUTimer *ts = g_new0(QEMUTimer, 1);
     timer_init_full(ts, timer_list_group, type, scale, attributes, cb, opaque);
     return ts;
 }
diff --git a/accel/kvm/kvm-all.c b/accel/kvm/kvm-all.c
index 0e66ebb497..1510856a3b 100644
--- a/accel/kvm/kvm-all.c
+++ b/accel/kvm/kvm-all.c
@@ -1646,7 +1646,7 @@ void kvm_memory_listener_register(KVMState *s, KVMMemoryListener *kml,
 {
     int i;
 
-    kml->slots = g_malloc0(s->nr_slots * sizeof(KVMSlot));
+    kml->slots = g_new0(KVMSlot, s->nr_slots);
     kml->as_id = as_id;
 
     for (i = 0; i < s->nr_slots; i++) {
@@ -1941,7 +1941,7 @@ int kvm_irqchip_send_msi(KVMState *s, MSIMessage msg)
             return virq;
         }
 
-        route = g_malloc0(sizeof(KVMMSIRoute));
+        route = g_new0(KVMMSIRoute, 1);
         route->kroute.gsi = virq;
         route->kroute.type = KVM_IRQ_ROUTING_MSI;
         route->kroute.flags = 0;
@@ -3243,7 +3243,7 @@ int kvm_insert_breakpoint(CPUState *cpu, target_ulong addr,
             return 0;
         }
 
-        bp = g_malloc(sizeof(struct kvm_sw_breakpoint));
+        bp = g_new(struct kvm_sw_breakpoint, 1);
         bp->pc = addr;
         bp->use_count = 1;
         err = kvm_arch_insert_sw_breakpoint(cpu, bp);
diff --git a/accel/tcg/tcg-accel-ops-mttcg.c b/accel/tcg/tcg-accel-ops-mttcg.c
index dc421c8fd7..ea2b741deb 100644
--- a/accel/tcg/tcg-accel-ops-mttcg.c
+++ b/accel/tcg/tcg-accel-ops-mttcg.c
@@ -143,7 +143,7 @@ void mttcg_start_vcpu_thread(CPUState *cpu)
     g_assert(tcg_enabled());
     tcg_cpu_init_cflags(cpu, current_machine->smp.max_cpus > 1);
 
-    cpu->thread = g_malloc0(sizeof(QemuThread));
+    cpu->thread = g_new0(QemuThread, 1);
     cpu->halt_cond = g_malloc0(sizeof(QemuCond));
     qemu_cond_init(cpu->halt_cond);
 
diff --git a/accel/tcg/tcg-accel-ops-rr.c b/accel/tcg/tcg-accel-ops-rr.c
index a805fb6bdd..b287110766 100644
--- a/accel/tcg/tcg-accel-ops-rr.c
+++ b/accel/tcg/tcg-accel-ops-rr.c
@@ -280,8 +280,8 @@ void rr_start_vcpu_thread(CPUState *cpu)
     tcg_cpu_init_cflags(cpu, false);
 
     if (!single_tcg_cpu_thread) {
-        cpu->thread = g_malloc0(sizeof(QemuThread));
-        cpu->halt_cond = g_malloc0(sizeof(QemuCond));
+        cpu->thread = g_new0(QemuThread, 1);
+        cpu->halt_cond = g_new0(QemuCond, 1);
         qemu_cond_init(cpu->halt_cond);
 
         /* share a single thread for all cpus with TCG */
diff --git a/audio/audio.c b/audio/audio.c
index a88572e713..4c20a4bf58 100644
--- a/audio/audio.c
+++ b/audio/audio.c
@@ -1734,7 +1734,7 @@ static AudioState *audio_init(Audiodev *dev, const char *name)
         audio_validate_opts(dev, &error_abort);
     }
 
-    s = g_malloc0(sizeof(AudioState));
+    s = g_new0(AudioState, 1);
     s->dev = dev;
 
     QLIST_INIT (&s->hw_head_out);
@@ -2109,7 +2109,7 @@ void audio_parse_option(const char *opt)
 
     audio_validate_opts(dev, &error_fatal);
 
-    e = g_malloc0(sizeof(AudiodevListEntry));
+    e = g_new0(AudiodevListEntry, 1);
     e->dev = dev;
     QSIMPLEQ_INSERT_TAIL(&audiodevs, e, next);
 }
diff --git a/audio/audio_legacy.c b/audio/audio_legacy.c
index 0fe827b057..595949f52c 100644
--- a/audio/audio_legacy.c
+++ b/audio/audio_legacy.c
@@ -328,8 +328,8 @@ static void handle_per_direction(
 
 static AudiodevListEntry *legacy_opt(const char *drvname)
 {
-    AudiodevListEntry *e = g_malloc0(sizeof(AudiodevListEntry));
-    e->dev = g_malloc0(sizeof(Audiodev));
+    AudiodevListEntry *e = g_new0(AudiodevListEntry, 1);
+    e->dev = g_new0(Audiodev, 1);
     e->dev->id = g_strdup(drvname);
     e->dev->driver = qapi_enum_parse(
         &AudiodevDriver_lookup, drvname, -1, &error_abort);
@@ -508,7 +508,7 @@ static void lv_free(Visitor *v)
 
 static Visitor *legacy_visitor_new(void)
 {
-    LegacyPrintVisitor *lv = g_malloc0(sizeof(LegacyPrintVisitor));
+    LegacyPrintVisitor *lv = g_new0(LegacyPrintVisitor, 1);
 
     lv->visitor.start_struct = lv_start_struct;
     lv->visitor.end_struct = lv_end_struct;
diff --git a/audio/dsoundaudio.c b/audio/dsoundaudio.c
index 231f3e65b3..2b41db217e 100644
--- a/audio/dsoundaudio.c
+++ b/audio/dsoundaudio.c
@@ -623,7 +623,7 @@ static void *dsound_audio_init(Audiodev *dev)
 {
     int err;
     HRESULT hr;
-    dsound *s = g_malloc0(sizeof(dsound));
+    dsound *s = g_new0(dsound, 1);
     AudiodevDsoundOptions *dso;
 
     assert(dev->driver == AUDIODEV_DRIVER_DSOUND);
diff --git a/audio/jackaudio.c b/audio/jackaudio.c
index bf757250b5..5bdf3d7a78 100644
--- a/audio/jackaudio.c
+++ b/audio/jackaudio.c
@@ -97,9 +97,9 @@ static void qjack_buffer_create(QJackBuffer *buffer, int channels, int frames)
     buffer->used     = 0;
     buffer->rptr     = 0;
     buffer->wptr     = 0;
-    buffer->data     = g_malloc(channels * sizeof(float *));
+    buffer->data     = g_new(float *, channels);
     for (int i = 0; i < channels; ++i) {
-        buffer->data[i] = g_malloc(frames * sizeof(float));
+        buffer->data[i] = g_new(float, frames);
     }
 }
 
@@ -453,7 +453,7 @@ static int qjack_client_init(QJackClient *c)
     jack_on_shutdown(c->client, qjack_shutdown, c);
 
     /* allocate and register the ports */
-    c->port = g_malloc(sizeof(jack_port_t *) * c->nchannels);
+    c->port = g_new(jack_port_t *, c->nchannels);
     for (int i = 0; i < c->nchannels; ++i) {
 
         char port_name[16];
diff --git a/audio/paaudio.c b/audio/paaudio.c
index a53ed85e0b..ed4f4376c4 100644
--- a/audio/paaudio.c
+++ b/audio/paaudio.c
@@ -760,7 +760,7 @@ static int qpa_validate_per_direction_opts(Audiodev *dev,
 /* common */
 static void *qpa_conn_init(const char *server)
 {
-    PAConnection *c = g_malloc0(sizeof(PAConnection));
+    PAConnection *c = g_new0(PAConnection, 1);
     QTAILQ_INSERT_TAIL(&pa_conns, c, list);
 
     c->mainloop = pa_threaded_mainloop_new();
@@ -849,7 +849,7 @@ static void *qpa_audio_init(Audiodev *dev)
         return NULL;
     }
 
-    g = g_malloc0(sizeof(paaudio));
+    g = g_new0(paaudio, 1);
     server = popts->has_server ? popts->server : NULL;
 
     g->dev = dev;
diff --git a/backends/cryptodev.c b/backends/cryptodev.c
index bf52476166..2b105e433c 100644
--- a/backends/cryptodev.c
+++ b/backends/cryptodev.c
@@ -39,7 +39,7 @@ cryptodev_backend_new_client(const char *model,
 {
     CryptoDevBackendClient *cc;
 
-    cc = g_malloc0(sizeof(CryptoDevBackendClient));
+    cc = g_new0(CryptoDevBackendClient, 1);
     cc->model = g_strdup(model);
     if (name) {
         cc->name = g_strdup(name);
diff --git a/contrib/vhost-user-gpu/vhost-user-gpu.c b/contrib/vhost-user-gpu/vhost-user-gpu.c
index 611360e6b4..bfb8d93cf8 100644
--- a/contrib/vhost-user-gpu/vhost-user-gpu.c
+++ b/contrib/vhost-user-gpu/vhost-user-gpu.c
@@ -455,7 +455,7 @@ vg_create_mapping_iov(VuGpu *g,
         return -1;
     }
 
-    *iov = g_malloc0(sizeof(struct iovec) * ab->nr_entries);
+    *iov = g_new0(struct iovec, ab->nr_entries);
     for (i = 0; i < ab->nr_entries; i++) {
         uint64_t len = ents[i].length;
         (*iov)[i].iov_len = ents[i].length;
diff --git a/cpus-common.c b/cpus-common.c
index 6e73d3e58d..db459b41ce 100644
--- a/cpus-common.c
+++ b/cpus-common.c
@@ -160,7 +160,7 @@ void async_run_on_cpu(CPUState *cpu, run_on_cpu_func func, run_on_cpu_data data)
 {
     struct qemu_work_item *wi;
 
-    wi = g_malloc0(sizeof(struct qemu_work_item));
+    wi = g_new0(struct qemu_work_item, 1);
     wi->func = func;
     wi->data = data;
     wi->free = true;
@@ -305,7 +305,7 @@ void async_safe_run_on_cpu(CPUState *cpu, run_on_cpu_func func,
 {
     struct qemu_work_item *wi;
 
-    wi = g_malloc0(sizeof(struct qemu_work_item));
+    wi = g_new0(struct qemu_work_item, 1);
     wi->func = func;
     wi->data = data;
     wi->free = true;
diff --git a/dump/dump.c b/dump/dump.c
index a84d8b1598..f57ed76fa7 100644
--- a/dump/dump.c
+++ b/dump/dump.c
@@ -2041,7 +2041,7 @@ void qmp_dump_guest_memory(bool paging, const char *file,
 DumpGuestMemoryCapability *qmp_query_dump_guest_memory_capability(Error **errp)
 {
     DumpGuestMemoryCapability *cap =
-                                  g_malloc0(sizeof(DumpGuestMemoryCapability));
+                                  g_new0(DumpGuestMemoryCapability, 1);
     DumpGuestMemoryFormatList **tail = &cap->formats;
 
     /* elf is always available */
diff --git a/hw/acpi/hmat.c b/hw/acpi/hmat.c
index 6913ebf730..3a6d51282a 100644
--- a/hw/acpi/hmat.c
+++ b/hw/acpi/hmat.c
@@ -128,7 +128,7 @@ static void build_hmat_lb(GArray *table_data, HMAT_LB_Info *hmat_lb,
     }
 
     /* Latency or Bandwidth Entries */
-    entry_list = g_malloc0(num_initiator * num_target * sizeof(uint16_t));
+    entry_list = g_new0(uint16_t, num_initiator * num_target);
     for (i = 0; i < hmat_lb->list->len; i++) {
         lb_data = &g_array_index(hmat_lb->list, HMAT_LB_Data, i);
         index = lb_data->initiator * num_target + lb_data->target;
diff --git a/hw/audio/intel-hda.c b/hw/audio/intel-hda.c
index 5f8a878f20..686fb94d5c 100644
--- a/hw/audio/intel-hda.c
+++ b/hw/audio/intel-hda.c
@@ -473,7 +473,7 @@ static void intel_hda_parse_bdl(IntelHDAState *d, IntelHDAStream *st)
     addr = intel_hda_addr(st->bdlp_lbase, st->bdlp_ubase);
     st->bentries = st->lvi +1;
     g_free(st->bpl);
-    st->bpl = g_malloc(sizeof(bpl) * st->bentries);
+    st->bpl = g_new(bpl, st->bentries);
     for (i = 0; i < st->bentries; i++, addr += 16) {
         pci_dma_read(&d->pci, addr, buf, 16);
         st->bpl[i].addr  = le64_to_cpu(*(uint64_t *)buf);
diff --git a/hw/char/parallel.c b/hw/char/parallel.c
index adb9bd9be3..f735a6cd7f 100644
--- a/hw/char/parallel.c
+++ b/hw/char/parallel.c
@@ -622,7 +622,7 @@ bool parallel_mm_init(MemoryRegion *address_space,
 {
     ParallelState *s;
 
-    s = g_malloc0(sizeof(ParallelState));
+    s = g_new0(ParallelState, 1);
     s->irq = irq;
     qemu_chr_fe_init(&s->chr, chr, &error_abort);
     s->it_shift = it_shift;
diff --git a/hw/char/riscv_htif.c b/hw/char/riscv_htif.c
index 729edbf968..6577f0e640 100644
--- a/hw/char/riscv_htif.c
+++ b/hw/char/riscv_htif.c
@@ -248,7 +248,7 @@ HTIFState *htif_mm_init(MemoryRegion *address_space, MemoryRegion *main_mem,
     tohost_offset = tohost_addr - base;
     fromhost_offset = fromhost_addr - base;
 
-    HTIFState *s = g_malloc0(sizeof(HTIFState));
+    HTIFState *s = g_new0(HTIFState, 1);
     s->address_space = address_space;
     s->main_mem = main_mem;
     s->main_mem_ram_ptr = memory_region_get_ram_ptr(main_mem);
diff --git a/hw/char/virtio-serial-bus.c b/hw/char/virtio-serial-bus.c
index f01ec2137c..6048d408b8 100644
--- a/hw/char/virtio-serial-bus.c
+++ b/hw/char/virtio-serial-bus.c
@@ -1055,10 +1055,8 @@ static void virtio_serial_device_realize(DeviceState *dev, Error **errp)
     QTAILQ_INIT(&vser->ports);
 
     vser->bus.max_nr_ports = vser->serial.max_virtserial_ports;
-    vser->ivqs = g_malloc(vser->serial.max_virtserial_ports
-                          * sizeof(VirtQueue *));
-    vser->ovqs = g_malloc(vser->serial.max_virtserial_ports
-                          * sizeof(VirtQueue *));
+    vser->ivqs = g_new(VirtQueue *, vser->serial.max_virtserial_ports);
+    vser->ovqs = g_new(VirtQueue *, vser->serial.max_virtserial_ports);
 
     /* Add a queue for host to guest transfers for port 0 (backward compat) */
     vser->ivqs[0] = virtio_add_queue(vdev, 128, handle_input);
diff --git a/hw/core/irq.c b/hw/core/irq.c
index 8a9cbdd556..741219277b 100644
--- a/hw/core/irq.c
+++ b/hw/core/irq.c
@@ -115,7 +115,7 @@ static void qemu_splitirq(void *opaque, int line, int level)
 
 qemu_irq qemu_irq_split(qemu_irq irq1, qemu_irq irq2)
 {
-    qemu_irq *s = g_malloc0(2 * sizeof(qemu_irq));
+    qemu_irq *s = g_new0(qemu_irq, 2);
     s[0] = irq1;
     s[1] = irq2;
     return qemu_allocate_irq(qemu_splitirq, s, 0);
diff --git a/hw/core/reset.c b/hw/core/reset.c
index 9c477f2bf5..36be82c491 100644
--- a/hw/core/reset.c
+++ b/hw/core/reset.c
@@ -40,7 +40,7 @@ static QTAILQ_HEAD(, QEMUResetEntry) reset_handlers =
 
 void qemu_register_reset(QEMUResetHandler *func, void *opaque)
 {
-    QEMUResetEntry *re = g_malloc0(sizeof(QEMUResetEntry));
+    QEMUResetEntry *re = g_new0(QEMUResetEntry, 1);
 
     re->func = func;
     re->opaque = opaque;
diff --git a/hw/display/pxa2xx_lcd.c b/hw/display/pxa2xx_lcd.c
index 2887ce496b..0f06ed6e9f 100644
--- a/hw/display/pxa2xx_lcd.c
+++ b/hw/display/pxa2xx_lcd.c
@@ -1427,7 +1427,7 @@ PXA2xxLCDState *pxa2xx_lcdc_init(MemoryRegion *sysmem,
 {
     PXA2xxLCDState *s;
 
-    s = (PXA2xxLCDState *) g_malloc0(sizeof(PXA2xxLCDState));
+    s = g_new0(PXA2xxLCDState, 1);
     s->invalidated = 1;
     s->irq = irq;
     s->sysmem = sysmem;
diff --git a/hw/display/tc6393xb.c b/hw/display/tc6393xb.c
index 1f28223c7b..c7beba453b 100644
--- a/hw/display/tc6393xb.c
+++ b/hw/display/tc6393xb.c
@@ -540,7 +540,7 @@ TC6393xbState *tc6393xb_init(MemoryRegion *sysmem, uint32_t base, qemu_irq irq)
         },
     };
 
-    s = (TC6393xbState *) g_malloc0(sizeof(TC6393xbState));
+    s = g_new0(TC6393xbState, 1);
     s->irq = irq;
     s->gpio_in = qemu_allocate_irqs(tc6393xb_gpio_set, s, TC6393XB_GPIOS);
 
diff --git a/hw/display/virtio-gpu.c b/hw/display/virtio-gpu.c
index c6dc818988..529b5246b2 100644
--- a/hw/display/virtio-gpu.c
+++ b/hw/display/virtio-gpu.c
@@ -831,9 +831,9 @@ int virtio_gpu_create_mapping_iov(VirtIOGPU *g,
             }
 
             if (!(v % 16)) {
-                *iov = g_realloc(*iov, sizeof(struct iovec) * (v + 16));
+                *iov = g_renew(struct iovec, *iov, v + 16);
                 if (addr) {
-                    *addr = g_realloc(*addr, sizeof(uint64_t) * (v + 16));
+                    *addr = g_renew(uint64_t, *addr, v + 16);
                 }
             }
             (*iov)[v].iov_base = map;
diff --git a/hw/display/xenfb.c b/hw/display/xenfb.c
index 838260b6ad..cea10fe3c7 100644
--- a/hw/display/xenfb.c
+++ b/hw/display/xenfb.c
@@ -496,8 +496,8 @@ static int xenfb_map_fb(struct XenFB *xenfb)
     n_fbdirs = xenfb->fbpages * mode / 8;
     n_fbdirs = DIV_ROUND_UP(n_fbdirs, XC_PAGE_SIZE);
 
-    pgmfns = g_malloc0(sizeof(xen_pfn_t) * n_fbdirs);
-    fbmfns = g_malloc0(sizeof(xen_pfn_t) * xenfb->fbpages);
+    pgmfns = g_new0(xen_pfn_t, n_fbdirs);
+    fbmfns = g_new0(xen_pfn_t, xenfb->fbpages);
 
     xenfb_copy_mfns(mode, n_fbdirs, pgmfns, pd);
     map = xenforeignmemory_map(xen_fmem, xenfb->c.xendev.dom,
diff --git a/hw/dma/rc4030.c b/hw/dma/rc4030.c
index e4d2f1725b..aa1d323a36 100644
--- a/hw/dma/rc4030.c
+++ b/hw/dma/rc4030.c
@@ -646,8 +646,8 @@ static rc4030_dma *rc4030_allocate_dmas(void *opaque, int n)
     struct rc4030DMAState *p;
     int i;
 
-    s = (rc4030_dma *)g_new0(rc4030_dma, n);
-    p = (struct rc4030DMAState *)g_new0(struct rc4030DMAState, n);
+    s = g_new0(rc4030_dma, n);
+    p = g_new0(struct rc4030DMAState, n);
     for (i = 0; i < n; i++) {
         p->opaque = opaque;
         p->n = i;
diff --git a/hw/i2c/core.c b/hw/i2c/core.c
index 0e7d2763b9..d0cb2d32fa 100644
--- a/hw/i2c/core.c
+++ b/hw/i2c/core.c
@@ -274,7 +274,7 @@ static int i2c_slave_post_load(void *opaque, int version_id)
     bus = I2C_BUS(qdev_get_parent_bus(DEVICE(dev)));
     if ((bus->saved_address == dev->address) ||
         (bus->saved_address == I2C_BROADCAST)) {
-        node = g_malloc(sizeof(struct I2CNode));
+        node = g_new(struct I2CNode, 1);
         node->elt = dev;
         QLIST_INSERT_HEAD(&bus->current_devs, node, next);
     }
@@ -319,7 +319,7 @@ static bool i2c_slave_match(I2CSlave *candidate, uint8_t address,
                             bool broadcast, I2CNodeList *current_devs)
 {
     if ((candidate->address == address) || (broadcast)) {
-        I2CNode *node = g_malloc(sizeof(struct I2CNode));
+        I2CNode *node = g_new(struct I2CNode, 1);
         node->elt = candidate;
         QLIST_INSERT_HEAD(current_devs, node, next);
         return true;
diff --git a/hw/i2c/i2c_mux_pca954x.c b/hw/i2c/i2c_mux_pca954x.c
index a9517b612a..3945de795c 100644
--- a/hw/i2c/i2c_mux_pca954x.c
+++ b/hw/i2c/i2c_mux_pca954x.c
@@ -71,7 +71,7 @@ static bool pca954x_match(I2CSlave *candidate, uint8_t address,
 
     /* They are talking to the mux itself (or all devices enabled). */
     if ((candidate->address == address) || broadcast) {
-        I2CNode *node = g_malloc(sizeof(struct I2CNode));
+        I2CNode *node = g_new(struct I2CNode, 1);
         node->elt = candidate;
         QLIST_INSERT_HEAD(current_devs, node, next);
         if (!broadcast) {
diff --git a/hw/i386/amd_iommu.c b/hw/i386/amd_iommu.c
index 4d13d8e697..9dd9b0ecf2 100644
--- a/hw/i386/amd_iommu.c
+++ b/hw/i386/amd_iommu.c
@@ -1405,7 +1405,7 @@ static AddressSpace *amdvi_host_dma_iommu(PCIBus *bus, void *opaque, int devfn)
 
     /* allocate memory during the first run */
     if (!iommu_as) {
-        iommu_as = g_malloc0(sizeof(AMDVIAddressSpace *) * PCI_DEVFN_MAX);
+        iommu_as = g_new0(AMDVIAddressSpace *, PCI_DEVFN_MAX);
         s->address_spaces[bus_num] = iommu_as;
     }
 
@@ -1413,7 +1413,7 @@ static AddressSpace *amdvi_host_dma_iommu(PCIBus *bus, void *opaque, int devfn)
     if (!iommu_as[devfn]) {
         snprintf(name, sizeof(name), "amd_iommu_devfn_%d", devfn);
 
-        iommu_as[devfn] = g_malloc0(sizeof(AMDVIAddressSpace));
+        iommu_as[devfn] = g_new0(AMDVIAddressSpace, 1);
         iommu_as[devfn]->bus_num = (uint8_t)bus_num;
         iommu_as[devfn]->devfn = (uint8_t)devfn;
         iommu_as[devfn]->iommu_state = s;
diff --git a/hw/i386/intel_iommu.c b/hw/i386/intel_iommu.c
index 32471a44cb..c64aa81a83 100644
--- a/hw/i386/intel_iommu.c
+++ b/hw/i386/intel_iommu.c
@@ -3416,7 +3416,7 @@ VTDAddressSpace *vtd_find_add_as(IntelIOMMUState *s, PCIBus *bus, int devfn)
     if (!vtd_dev_as) {
         snprintf(name, sizeof(name), "vtd-%02x.%x", PCI_SLOT(devfn),
                  PCI_FUNC(devfn));
-        vtd_bus->dev_as[devfn] = vtd_dev_as = g_malloc0(sizeof(VTDAddressSpace));
+        vtd_bus->dev_as[devfn] = vtd_dev_as = g_new0(VTDAddressSpace, 1);
 
         vtd_dev_as->bus = bus;
         vtd_dev_as->devfn = (uint8_t)devfn;
diff --git a/hw/i386/xen/xen-hvm.c b/hw/i386/xen/xen-hvm.c
index cf8e500514..0731f70410 100644
--- a/hw/i386/xen/xen-hvm.c
+++ b/hw/i386/xen/xen-hvm.c
@@ -396,7 +396,7 @@ go_physmap:
 
     mr_name = memory_region_name(mr);
 
-    physmap = g_malloc(sizeof(XenPhysmap));
+    physmap = g_new(XenPhysmap, 1);
 
     physmap->start_addr = start_addr;
     physmap->size = size;
@@ -1281,7 +1281,7 @@ static void xen_read_physmap(XenIOState *state)
         return;
 
     for (i = 0; i < num; i++) {
-        physmap = g_malloc(sizeof (XenPhysmap));
+        physmap = g_new(XenPhysmap, 1);
         physmap->phys_offset = strtoull(entries[i], NULL, 16);
         snprintf(path, sizeof(path),
                 "/local/domain/0/device-model/%d/physmap/%s/start_addr",
@@ -1410,7 +1410,7 @@ void xen_hvm_init_pc(PCMachineState *pcms, MemoryRegion **ram_memory)
     xen_pfn_t ioreq_pfn;
     XenIOState *state;
 
-    state = g_malloc0(sizeof (XenIOState));
+    state = g_new0(XenIOState, 1);
 
     state->xce_handle = xenevtchn_open(NULL, 0);
     if (state->xce_handle == NULL) {
@@ -1463,7 +1463,7 @@ void xen_hvm_init_pc(PCMachineState *pcms, MemoryRegion **ram_memory)
     }
 
     /* Note: cpus is empty at this point in init */
-    state->cpu_by_vcpu_id = g_malloc0(max_cpus * sizeof(CPUState *));
+    state->cpu_by_vcpu_id = g_new0(CPUState *, max_cpus);
 
     rc = xen_set_ioreq_server_state(xen_domid, state->ioservid, true);
     if (rc < 0) {
@@ -1472,7 +1472,7 @@ void xen_hvm_init_pc(PCMachineState *pcms, MemoryRegion **ram_memory)
         goto err;
     }
 
-    state->ioreq_local_port = g_malloc0(max_cpus * sizeof (evtchn_port_t));
+    state->ioreq_local_port = g_new0(evtchn_port_t, max_cpus);
 
     /* FIXME: how about if we overflow the page here? */
     for (i = 0; i < max_cpus; i++) {
diff --git a/hw/i386/xen/xen-mapcache.c b/hw/i386/xen/xen-mapcache.c
index f2ef977963..a2f93096e7 100644
--- a/hw/i386/xen/xen-mapcache.c
+++ b/hw/i386/xen/xen-mapcache.c
@@ -108,7 +108,7 @@ void xen_map_cache_init(phys_offset_to_gaddr_t f, void *opaque)
     unsigned long size;
     struct rlimit rlimit_as;
 
-    mapcache = g_malloc0(sizeof (MapCache));
+    mapcache = g_new0(MapCache, 1);
 
     mapcache->phys_offset_to_gaddr = f;
     mapcache->opaque = opaque;
@@ -164,8 +164,8 @@ static void xen_remap_bucket(MapCacheEntry *entry,
 
     trace_xen_remap_bucket(address_index);
 
-    pfns = g_malloc0(nb_pfn * sizeof (xen_pfn_t));
-    err = g_malloc0(nb_pfn * sizeof (int));
+    pfns = g_new0(xen_pfn_t, nb_pfn);
+    err = g_new0(int, nb_pfn);
 
     if (entry->vaddr_base != NULL) {
         if (!(entry->flags & XEN_MAPCACHE_ENTRY_DUMMY)) {
@@ -231,8 +231,8 @@ static void xen_remap_bucket(MapCacheEntry *entry,
     entry->vaddr_base = vaddr_base;
     entry->paddr_index = address_index;
     entry->size = size;
-    entry->valid_mapping = (unsigned long *) g_malloc0(sizeof(unsigned long) *
-            BITS_TO_LONGS(size >> XC_PAGE_SHIFT));
+    entry->valid_mapping = g_new0(unsigned long,
+                                  BITS_TO_LONGS(size >> XC_PAGE_SHIFT));
 
     if (dummy) {
         entry->flags |= XEN_MAPCACHE_ENTRY_DUMMY;
@@ -319,7 +319,7 @@ tryagain:
         pentry = free_pentry;
     }
     if (!entry) {
-        entry = g_malloc0(sizeof (MapCacheEntry));
+        entry = g_new0(MapCacheEntry, 1);
         pentry->next = entry;
         xen_remap_bucket(entry, NULL, cache_size, address_index, dummy);
     } else if (!entry->lock) {
@@ -353,7 +353,7 @@ tryagain:
 
     mapcache->last_entry = entry;
     if (lock) {
-        MapCacheRev *reventry = g_malloc0(sizeof(MapCacheRev));
+        MapCacheRev *reventry = g_new0(MapCacheRev, 1);
         entry->lock++;
         if (entry->lock == 0) {
             fprintf(stderr,
diff --git a/hw/input/lasips2.c b/hw/input/lasips2.c
index 68d741d342..94f18be4cd 100644
--- a/hw/input/lasips2.c
+++ b/hw/input/lasips2.c
@@ -266,7 +266,7 @@ void lasips2_init(MemoryRegion *address_space,
 {
     LASIPS2State *s;
 
-    s = g_malloc0(sizeof(LASIPS2State));
+    s = g_new0(LASIPS2State, 1);
 
     s->irq = irq;
     s->mouse.id = 1;
diff --git a/hw/input/pckbd.c b/hw/input/pckbd.c
index 1773db0d25..4efdf75620 100644
--- a/hw/input/pckbd.c
+++ b/hw/input/pckbd.c
@@ -649,7 +649,7 @@ void i8042_mm_init(qemu_irq kbd_irq, qemu_irq mouse_irq,
                    MemoryRegion *region, ram_addr_t size,
                    hwaddr mask)
 {
-    KBDState *s = g_malloc0(sizeof(KBDState));
+    KBDState *s = g_new0(KBDState, 1);
 
     s->irq_kbd = kbd_irq;
     s->irq_mouse = mouse_irq;
diff --git a/hw/input/ps2.c b/hw/input/ps2.c
index 6236711e1b..c16df1de7a 100644
--- a/hw/input/ps2.c
+++ b/hw/input/ps2.c
@@ -1226,7 +1226,7 @@ static QemuInputHandler ps2_keyboard_handler = {
 
 void *ps2_kbd_init(void (*update_irq)(void *, int), void *update_arg)
 {
-    PS2KbdState *s = (PS2KbdState *)g_malloc0(sizeof(PS2KbdState));
+    PS2KbdState *s = g_new0(PS2KbdState, 1);
 
     trace_ps2_kbd_init(s);
     s->common.update_irq = update_irq;
@@ -1248,7 +1248,7 @@ static QemuInputHandler ps2_mouse_handler = {
 
 void *ps2_mouse_init(void (*update_irq)(void *, int), void *update_arg)
 {
-    PS2MouseState *s = (PS2MouseState *)g_malloc0(sizeof(PS2MouseState));
+    PS2MouseState *s = g_new0(PS2MouseState, 1);
 
     trace_ps2_mouse_init(s);
     s->common.update_irq = update_irq;
diff --git a/hw/input/pxa2xx_keypad.c b/hw/input/pxa2xx_keypad.c
index 7f2f739fb3..3dd03e8c9f 100644
--- a/hw/input/pxa2xx_keypad.c
+++ b/hw/input/pxa2xx_keypad.c
@@ -306,7 +306,7 @@ PXA2xxKeyPadState *pxa27x_keypad_init(MemoryRegion *sysmem,
 {
     PXA2xxKeyPadState *s;
 
-    s = (PXA2xxKeyPadState *) g_malloc0(sizeof(PXA2xxKeyPadState));
+    s = g_new0(PXA2xxKeyPadState, 1);
     s->irq = irq;
 
     memory_region_init_io(&s->iomem, NULL, &pxa2xx_keypad_ops, s,
diff --git a/hw/input/tsc2005.c b/hw/input/tsc2005.c
index 55d61cc843..14698ce109 100644
--- a/hw/input/tsc2005.c
+++ b/hw/input/tsc2005.c
@@ -489,8 +489,7 @@ void *tsc2005_init(qemu_irq pintdav)
 {
     TSC2005State *s;
 
-    s = (TSC2005State *)
-            g_malloc0(sizeof(TSC2005State));
+    s = g_new0(TSC2005State, 1);
     s->x = 400;
     s->y = 240;
     s->pressure = false;
diff --git a/hw/intc/riscv_aclint.c b/hw/intc/riscv_aclint.c
index f1a5d3d284..e43b050e92 100644
--- a/hw/intc/riscv_aclint.c
+++ b/hw/intc/riscv_aclint.c
@@ -235,7 +235,7 @@ static void riscv_aclint_mtimer_realize(DeviceState *dev, Error **errp)
                           s, TYPE_RISCV_ACLINT_MTIMER, s->aperture_size);
     sysbus_init_mmio(SYS_BUS_DEVICE(dev), &s->mmio);
 
-    s->timer_irqs = g_malloc(sizeof(qemu_irq) * s->num_harts);
+    s->timer_irqs = g_new(qemu_irq, s->num_harts);
     qdev_init_gpio_out(dev, s->timer_irqs, s->num_harts);
 
     /* Claim timer interrupt bits */
@@ -292,7 +292,7 @@ DeviceState *riscv_aclint_mtimer_create(hwaddr addr, hwaddr size,
         RISCVCPU *rvcpu = RISCV_CPU(cpu);
         CPURISCVState *env = cpu ? cpu->env_ptr : NULL;
         riscv_aclint_mtimer_callback *cb =
-            g_malloc0(sizeof(riscv_aclint_mtimer_callback));
+            g_new0(riscv_aclint_mtimer_callback, 1);
 
         if (!env) {
             g_free(cb);
@@ -393,7 +393,7 @@ static void riscv_aclint_swi_realize(DeviceState *dev, Error **errp)
                           TYPE_RISCV_ACLINT_SWI, RISCV_ACLINT_SWI_SIZE);
     sysbus_init_mmio(SYS_BUS_DEVICE(dev), &swi->mmio);
 
-    swi->soft_irqs = g_malloc(sizeof(qemu_irq) * swi->num_harts);
+    swi->soft_irqs = g_new(qemu_irq, swi->num_harts);
     qdev_init_gpio_out(dev, swi->soft_irqs, swi->num_harts);
 
     /* Claim software interrupt bits */
diff --git a/hw/intc/xics.c b/hw/intc/xics.c
index 48a835eab7..24e67020db 100644
--- a/hw/intc/xics.c
+++ b/hw/intc/xics.c
@@ -604,7 +604,7 @@ static void ics_realize(DeviceState *dev, Error **errp)
         error_setg(errp, "Number of interrupts needs to be greater 0");
         return;
     }
-    ics->irqs = g_malloc0(ics->nr_irqs * sizeof(ICSIRQState));
+    ics->irqs = g_new0(ICSIRQState, ics->nr_irqs);
 
     qemu_register_reset(ics_reset_handler, ics);
 }
diff --git a/hw/m68k/virt.c b/hw/m68k/virt.c
index bbaf630bbf..8e630282e0 100644
--- a/hw/m68k/virt.c
+++ b/hw/m68k/virt.c
@@ -132,7 +132,7 @@ static void virt_init(MachineState *machine)
         exit(1);
     }
 
-    reset_info = g_malloc0(sizeof(ResetInfo));
+    reset_info = g_new0(ResetInfo, 1);
 
     /* init CPUs */
     cpu = M68K_CPU(cpu_create(machine->cpu_type));
diff --git a/hw/mips/mipssim.c b/hw/mips/mipssim.c
index 2325e7e05a..27a46bd538 100644
--- a/hw/mips/mipssim.c
+++ b/hw/mips/mipssim.c
@@ -162,7 +162,7 @@ mips_mipssim_init(MachineState *machine)
     cpu = mips_cpu_create_with_clock(machine->cpu_type, cpuclk);
     env = &cpu->env;
 
-    reset_info = g_malloc0(sizeof(ResetData));
+    reset_info = g_new0(ResetData, 1);
     reset_info->cpu = cpu;
     reset_info->vector = env->active_tc.PC;
     qemu_register_reset(main_cpu_reset, reset_info);
diff --git a/hw/misc/applesmc.c b/hw/misc/applesmc.c
index 1b9acaf1d3..81cd6b6423 100644
--- a/hw/misc/applesmc.c
+++ b/hw/misc/applesmc.c
@@ -253,7 +253,7 @@ static void applesmc_add_key(AppleSMCState *s, const char *key,
 {
     struct AppleSMCData *def;
 
-    def = g_malloc0(sizeof(struct AppleSMCData));
+    def = g_new0(struct AppleSMCData, 1);
     def->key = key;
     def->len = len;
     def->data = data;
diff --git a/hw/misc/imx6_src.c b/hw/misc/imx6_src.c
index 79f4375911..7b0e968804 100644
--- a/hw/misc/imx6_src.c
+++ b/hw/misc/imx6_src.c
@@ -151,7 +151,7 @@ static void imx6_defer_clear_reset_bit(int cpuid,
         return;
     }
 
-    ri = g_malloc(sizeof(struct SRCSCRResetInfo));
+    ri = g_new(struct SRCSCRResetInfo, 1);
     ri->s = s;
     ri->reset_bit = reset_shift;
 
diff --git a/hw/misc/ivshmem.c b/hw/misc/ivshmem.c
index 299837e5c1..b54778ada5 100644
--- a/hw/misc/ivshmem.c
+++ b/hw/misc/ivshmem.c
@@ -411,7 +411,7 @@ static void resize_peers(IVShmemState *s, int nb_peers)
     assert(nb_peers > old_nb_peers);
     IVSHMEM_DPRINTF("bumping storage to %d peers\n", nb_peers);
 
-    s->peers = g_realloc(s->peers, nb_peers * sizeof(Peer));
+    s->peers = g_renew(Peer, s->peers, nb_peers);
     s->nb_peers = nb_peers;
 
     for (i = old_nb_peers; i < nb_peers; i++) {
@@ -728,7 +728,7 @@ static void ivshmem_reset(DeviceState *d)
 static int ivshmem_setup_interrupts(IVShmemState *s, Error **errp)
 {
     /* allocate QEMU callback data for receiving interrupts */
-    s->msi_vectors = g_malloc0(s->vectors * sizeof(MSIVector));
+    s->msi_vectors = g_new0(MSIVector, s->vectors);
 
     if (ivshmem_has_feature(s, IVSHMEM_MSI)) {
         if (msix_init_exclusive_bar(PCI_DEVICE(s), s->vectors, 1, errp)) {
diff --git a/hw/net/virtio-net.c b/hw/net/virtio-net.c
index b02a0632df..bd121103f3 100644
--- a/hw/net/virtio-net.c
+++ b/hw/net/virtio-net.c
@@ -1994,7 +1994,7 @@ static void virtio_net_rsc_cache_buf(VirtioNetRscChain *chain,
     VirtioNetRscSeg *seg;
 
     hdr_len = chain->n->guest_hdr_len;
-    seg = g_malloc(sizeof(VirtioNetRscSeg));
+    seg = g_new(VirtioNetRscSeg, 1);
     seg->buf = g_malloc(hdr_len + sizeof(struct eth_header)
         + sizeof(struct ip6_header) + VIRTIO_NET_MAX_TCP_PAYLOAD);
     memcpy(seg->buf, buf, size);
@@ -3442,7 +3442,7 @@ static void virtio_net_device_realize(DeviceState *dev, Error **errp)
         virtio_cleanup(vdev);
         return;
     }
-    n->vqs = g_malloc0(sizeof(VirtIONetQueue) * n->max_queue_pairs);
+    n->vqs = g_new0(VirtIONetQueue, n->max_queue_pairs);
     n->curr_queue_pairs = 1;
     n->tx_timeout = n->net_conf.txtimer;
 
diff --git a/hw/nvme/ns.c b/hw/nvme/ns.c
index 8a3613d9ab..324f53ea0c 100644
--- a/hw/nvme/ns.c
+++ b/hw/nvme/ns.c
@@ -268,7 +268,7 @@ static void nvme_ns_init_zoned(NvmeNamespace *ns)
 
     nvme_ns_zoned_init_state(ns);
 
-    id_ns_z = g_malloc0(sizeof(NvmeIdNsZoned));
+    id_ns_z = g_new0(NvmeIdNsZoned, 1);
 
     /* MAR/MOR are zeroes-based, FFFFFFFFFh means no limit */
     id_ns_z->mar = cpu_to_le32(ns->params.max_active_zones - 1);
diff --git a/hw/pci-host/pnv_phb3.c b/hw/pci-host/pnv_phb3.c
index aafd46b635..ac6fe48975 100644
--- a/hw/pci-host/pnv_phb3.c
+++ b/hw/pci-host/pnv_phb3.c
@@ -946,7 +946,7 @@ static AddressSpace *pnv_phb3_dma_iommu(PCIBus *bus, void *opaque, int devfn)
     }
 
     if (ds == NULL) {
-        ds = g_malloc0(sizeof(PnvPhb3DMASpace));
+        ds = g_new0(PnvPhb3DMASpace, 1);
         ds->bus = bus;
         ds->devfn = devfn;
         ds->pe_num = PHB_INVALID_PE;
diff --git a/hw/pci-host/pnv_phb4.c b/hw/pci-host/pnv_phb4.c
index b5b384e9ee..d0d1612e1e 100644
--- a/hw/pci-host/pnv_phb4.c
+++ b/hw/pci-host/pnv_phb4.c
@@ -1466,7 +1466,7 @@ static AddressSpace *pnv_phb4_dma_iommu(PCIBus *bus, void *opaque, int devfn)
     ds = pnv_phb4_dma_find(phb, bus, devfn);
 
     if (ds == NULL) {
-        ds = g_malloc0(sizeof(PnvPhb4DMASpace));
+        ds = g_new0(PnvPhb4DMASpace, 1);
         ds->bus = bus;
         ds->devfn = devfn;
         ds->pe_num = PHB_INVALID_PE;
diff --git a/hw/pci/pcie_sriov.c b/hw/pci/pcie_sriov.c
index 87abad6ac8..8e3faf1f59 100644
--- a/hw/pci/pcie_sriov.c
+++ b/hw/pci/pcie_sriov.c
@@ -177,7 +177,7 @@ static void register_vfs(PCIDevice *dev)
     assert(sriov_cap > 0);
     num_vfs = pci_get_word(dev->config + sriov_cap + PCI_SRIOV_NUM_VF);
 
-    dev->exp.sriov_pf.vf = g_malloc(sizeof(PCIDevice *) * num_vfs);
+    dev->exp.sriov_pf.vf = g_new(PCIDevice *, num_vfs);
     assert(dev->exp.sriov_pf.vf);
 
     trace_sriov_register_vfs(dev->name, PCI_SLOT(dev->devfn),
diff --git a/hw/ppc/e500.c b/hw/ppc/e500.c
index 960e7efcd3..c7e6767f91 100644
--- a/hw/ppc/e500.c
+++ b/hw/ppc/e500.c
@@ -899,7 +899,7 @@ void ppce500_init(MachineState *machine)
         if (!i) {
             /* Primary CPU */
             struct boot_info *boot_info;
-            boot_info = g_malloc0(sizeof(struct boot_info));
+            boot_info = g_new0(struct boot_info, 1);
             qemu_register_reset(ppce500_cpu_reset, cpu);
             env->load_info = boot_info;
         } else {
diff --git a/hw/ppc/ppc.c b/hw/ppc/ppc.c
index 9e99625ea9..faa02d6710 100644
--- a/hw/ppc/ppc.c
+++ b/hw/ppc/ppc.c
@@ -1063,7 +1063,7 @@ clk_setup_cb cpu_ppc_tb_init (CPUPPCState *env, uint32_t freq)
     PowerPCCPU *cpu = env_archcpu(env);
     ppc_tb_t *tb_env;
 
-    tb_env = g_malloc0(sizeof(ppc_tb_t));
+    tb_env = g_new0(ppc_tb_t, 1);
     env->tb_env = tb_env;
     tb_env->flags = PPC_DECR_UNDERFLOW_TRIGGERED;
     if (is_book3s_arch2x(env)) {
@@ -1338,8 +1338,8 @@ clk_setup_cb ppc_40x_timers_init (CPUPPCState *env, uint32_t freq,
 
     trace_ppc40x_timers_init(freq);
 
-    tb_env = g_malloc0(sizeof(ppc_tb_t));
-    ppc40x_timer = g_malloc0(sizeof(ppc40x_timer_t));
+    tb_env = g_new0(ppc_tb_t, 1);
+    ppc40x_timer = g_new0(ppc40x_timer_t, 1);
 
     env->tb_env = tb_env;
     tb_env->flags = PPC_DECR_UNDERFLOW_TRIGGERED;
@@ -1447,7 +1447,7 @@ int ppc_dcr_init (CPUPPCState *env, int (*read_error)(int dcrn),
 {
     ppc_dcr_t *dcr_env;
 
-    dcr_env = g_malloc0(sizeof(ppc_dcr_t));
+    dcr_env = g_new0(ppc_dcr_t, 1);
     dcr_env->read_error = read_error;
     dcr_env->write_error = write_error;
     env->dcr_env = dcr_env;
diff --git a/hw/ppc/ppc405_boards.c b/hw/ppc/ppc405_boards.c
index 3ae2b36373..7e1a4ac955 100644
--- a/hw/ppc/ppc405_boards.c
+++ b/hw/ppc/ppc405_boards.c
@@ -130,7 +130,7 @@ static void ref405ep_fpga_init(MemoryRegion *sysmem, uint32_t base)
     ref405ep_fpga_t *fpga;
     MemoryRegion *fpga_memory = g_new(MemoryRegion, 1);
 
-    fpga = g_malloc0(sizeof(ref405ep_fpga_t));
+    fpga = g_new0(ref405ep_fpga_t, 1);
     memory_region_init_io(fpga_memory, NULL, &ref405ep_fpga_ops, fpga,
                           "fpga", 0x00000100);
     memory_region_add_subregion(sysmem, base, fpga_memory);
@@ -431,7 +431,7 @@ static void taihu_cpld_init(MemoryRegion *sysmem, uint32_t base)
     taihu_cpld_t *cpld;
     MemoryRegion *cpld_memory = g_new(MemoryRegion, 1);
 
-    cpld = g_malloc0(sizeof(taihu_cpld_t));
+    cpld = g_new0(taihu_cpld_t, 1);
     memory_region_init_io(cpld_memory, NULL, &taihu_cpld_ops, cpld, "cpld", 0x100);
     memory_region_add_subregion(sysmem, base, cpld_memory);
     qemu_register_reset(&taihu_cpld_reset, cpld);
diff --git a/hw/ppc/ppc405_uc.c b/hw/ppc/ppc405_uc.c
index 8aacd275a6..36c8ba6f3c 100644
--- a/hw/ppc/ppc405_uc.c
+++ b/hw/ppc/ppc405_uc.c
@@ -215,7 +215,7 @@ void ppc4xx_plb_init(CPUPPCState *env)
 {
     ppc4xx_plb_t *plb;
 
-    plb = g_malloc0(sizeof(ppc4xx_plb_t));
+    plb = g_new0(ppc4xx_plb_t, 1);
     ppc_dcr_register(env, PLB3A0_ACR, plb, &dcr_read_plb, &dcr_write_plb);
     ppc_dcr_register(env, PLB4A0_ACR, plb, &dcr_read_plb, &dcr_write_plb);
     ppc_dcr_register(env, PLB0_ACR, plb, &dcr_read_plb, &dcr_write_plb);
@@ -300,7 +300,7 @@ static void ppc4xx_pob_init(CPUPPCState *env)
 {
     ppc4xx_pob_t *pob;
 
-    pob = g_malloc0(sizeof(ppc4xx_pob_t));
+    pob = g_new0(ppc4xx_pob_t, 1);
     ppc_dcr_register(env, POB0_BEAR, pob, &dcr_read_pob, &dcr_write_pob);
     ppc_dcr_register(env, POB0_BESR0, pob, &dcr_read_pob, &dcr_write_pob);
     ppc_dcr_register(env, POB0_BESR1, pob, &dcr_read_pob, &dcr_write_pob);
@@ -380,7 +380,7 @@ static void ppc4xx_opba_init(hwaddr base)
 
     trace_opba_init(base);
 
-    opba = g_malloc0(sizeof(ppc4xx_opba_t));
+    opba = g_new0(ppc4xx_opba_t, 1);
     memory_region_init_io(&opba->io, NULL, &opba_ops, opba, "opba", 0x002);
     memory_region_add_subregion(get_system_memory(), base, &opba->io);
     qemu_register_reset(ppc4xx_opba_reset, opba);
@@ -575,7 +575,7 @@ void ppc405_ebc_init(CPUPPCState *env)
 {
     ppc4xx_ebc_t *ebc;
 
-    ebc = g_malloc0(sizeof(ppc4xx_ebc_t));
+    ebc = g_new0(ppc4xx_ebc_t, 1);
     qemu_register_reset(&ebc_reset, ebc);
     ppc_dcr_register(env, EBC0_CFGADDR,
                      ebc, &dcr_read_ebc, &dcr_write_ebc);
@@ -658,7 +658,7 @@ static void ppc405_dma_init(CPUPPCState *env, qemu_irq irqs[4])
 {
     ppc405_dma_t *dma;
 
-    dma = g_malloc0(sizeof(ppc405_dma_t));
+    dma = g_new0(ppc405_dma_t, 1);
     memcpy(dma->irqs, irqs, 4 * sizeof(qemu_irq));
     qemu_register_reset(&ppc405_dma_reset, dma);
     ppc_dcr_register(env, DMA0_CR0,
@@ -757,7 +757,7 @@ static void ppc405_gpio_init(hwaddr base)
 
     trace_ppc405_gpio_init(base);
 
-    gpio = g_malloc0(sizeof(ppc405_gpio_t));
+    gpio = g_new0(ppc405_gpio_t, 1);
     memory_region_init_io(&gpio->io, NULL, &ppc405_gpio_ops, gpio, "pgio", 0x038);
     memory_region_add_subregion(get_system_memory(), base, &gpio->io);
     qemu_register_reset(&ppc405_gpio_reset, gpio);
@@ -906,7 +906,7 @@ static void ppc405_ocm_init(CPUPPCState *env)
 {
     ppc405_ocm_t *ocm;
 
-    ocm = g_malloc0(sizeof(ppc405_ocm_t));
+    ocm = g_new0(ppc405_ocm_t, 1);
     /* XXX: Size is 4096 or 0x04000000 */
     memory_region_init_ram(&ocm->isarc_ram, NULL, "ppc405.ocm", 4 * KiB,
                            &error_fatal);
@@ -1148,7 +1148,7 @@ static void ppc4xx_gpt_init(hwaddr base, qemu_irq irqs[5])
 
     trace_ppc4xx_gpt_init(base);
 
-    gpt = g_malloc0(sizeof(ppc4xx_gpt_t));
+    gpt = g_new0(ppc4xx_gpt_t, 1);
     for (i = 0; i < 5; i++) {
         gpt->irqs[i] = irqs[i];
     }
@@ -1399,7 +1399,7 @@ static void ppc405ep_cpc_init (CPUPPCState *env, clk_setup_t clk_setup[8],
 {
     ppc405ep_cpc_t *cpc;
 
-    cpc = g_malloc0(sizeof(ppc405ep_cpc_t));
+    cpc = g_new0(ppc405ep_cpc_t, 1);
     memcpy(cpc->clk_setup, clk_setup,
            PPC405EP_CLK_NB * sizeof(clk_setup_t));
     cpc->jtagid = 0x20267049;
diff --git a/hw/ppc/ppc4xx_devs.c b/hw/ppc/ppc4xx_devs.c
index e7d82ae501..737c0896b4 100644
--- a/hw/ppc/ppc4xx_devs.c
+++ b/hw/ppc/ppc4xx_devs.c
@@ -389,7 +389,7 @@ void ppc4xx_sdram_init (CPUPPCState *env, qemu_irq irq, int nbanks,
 {
     ppc4xx_sdram_t *sdram;
 
-    sdram = g_malloc0(sizeof(ppc4xx_sdram_t));
+    sdram = g_new0(ppc4xx_sdram_t, 1);
     sdram->irq = irq;
     sdram->nbanks = nbanks;
     sdram->ram_memories = ram_memories;
diff --git a/hw/ppc/ppc_booke.c b/hw/ppc/ppc_booke.c
index 10b643861f..ca22da196a 100644
--- a/hw/ppc/ppc_booke.c
+++ b/hw/ppc/ppc_booke.c
@@ -337,8 +337,8 @@ void ppc_booke_timers_init(PowerPCCPU *cpu, uint32_t freq, uint32_t flags)
     booke_timer_t *booke_timer;
     int ret = 0;
 
-    tb_env      = g_malloc0(sizeof(ppc_tb_t));
-    booke_timer = g_malloc0(sizeof(booke_timer_t));
+    tb_env      = g_new0(ppc_tb_t, 1);
+    booke_timer = g_new0(booke_timer_t, 1);
 
     cpu->env.tb_env = tb_env;
     tb_env->flags = flags | PPC_TIMER_BOOKE | PPC_DECR_ZERO_TRIGGERED;
diff --git a/hw/ppc/spapr.c b/hw/ppc/spapr.c
index 953fc65fa8..a4372ba189 100644
--- a/hw/ppc/spapr.c
+++ b/hw/ppc/spapr.c
@@ -3601,7 +3601,7 @@ static SpaprDimmState *spapr_pending_dimm_unplugs_add(SpaprMachineState *spapr,
      */
     ds = spapr_pending_dimm_unplugs_find(spapr, dimm);
     if (!ds) {
-        ds = g_malloc0(sizeof(SpaprDimmState));
+        ds = g_new0(SpaprDimmState, 1);
         ds->nr_lmbs = nr_lmbs;
         ds->dimm = dimm;
         QTAILQ_INSERT_HEAD(&spapr->pending_dimm_unplugs, ds, next);
diff --git a/hw/ppc/spapr_events.c b/hw/ppc/spapr_events.c
index 630e86282c..4508e40814 100644
--- a/hw/ppc/spapr_events.c
+++ b/hw/ppc/spapr_events.c
@@ -594,7 +594,7 @@ static void spapr_hotplug_req_event(uint8_t hp_id, uint8_t hp_action,
     struct rtas_event_log_v6_hp *hp;
 
     entry = g_new(SpaprEventLogEntry, 1);
-    new_hp = g_malloc0(sizeof(struct hp_extended_log));
+    new_hp = g_new0(struct hp_extended_log, 1);
     entry->extended_log = new_hp;
 
     v6hdr = &new_hp->v6hdr;
diff --git a/hw/ppc/spapr_hcall.c b/hw/ppc/spapr_hcall.c
index f008290787..7c8bb76f99 100644
--- a/hw/ppc/spapr_hcall.c
+++ b/hw/ppc/spapr_hcall.c
@@ -1596,7 +1596,7 @@ static target_ulong h_enter_nested(PowerPCCPU *cpu,
         return H_PARAMETER;
     }
 
-    spapr_cpu->nested_host_state = g_try_malloc(sizeof(CPUPPCState));
+    spapr_cpu->nested_host_state = g_try_new(CPUPPCState, 1);
     if (!spapr_cpu->nested_host_state) {
         return H_NO_MEM;
     }
diff --git a/hw/ppc/spapr_numa.c b/hw/ppc/spapr_numa.c
index 4f93bdefec..d7c0e212ba 100644
--- a/hw/ppc/spapr_numa.c
+++ b/hw/ppc/spapr_numa.c
@@ -436,8 +436,7 @@ int spapr_numa_write_assoc_lookup_arrays(SpaprMachineState *spapr, void *fdt,
     int i;
 
     /* ibm,associativity-lookup-arrays */
-    int_buf = g_malloc0((nr_nodes * max_distance_ref_points + 2) *
-                        sizeof(uint32_t));
+    int_buf = g_new0(uint32_t, nr_nodes * max_distance_ref_points + 2);
     cur_index = int_buf;
     int_buf[0] = cpu_to_be32(nr_nodes);
      /* Number of entries per associativity list */
diff --git a/hw/rdma/vmw/pvrdma_dev_ring.c b/hw/rdma/vmw/pvrdma_dev_ring.c
index 42130667a7..598e6adc5e 100644
--- a/hw/rdma/vmw/pvrdma_dev_ring.c
+++ b/hw/rdma/vmw/pvrdma_dev_ring.c
@@ -41,7 +41,7 @@ int pvrdma_ring_init(PvrdmaRing *ring, const char *name, PCIDevice *dev,
     qatomic_set(&ring->ring_state->cons_head, 0);
     */
     ring->npages = npages;
-    ring->pages = g_malloc0(npages * sizeof(void *));
+    ring->pages = g_new0(void *, npages);
 
     for (i = 0; i < npages; i++) {
         if (!tbl[i]) {
diff --git a/hw/rdma/vmw/pvrdma_qp_ops.c b/hw/rdma/vmw/pvrdma_qp_ops.c
index 8050287a6c..bd7cbf2bdf 100644
--- a/hw/rdma/vmw/pvrdma_qp_ops.c
+++ b/hw/rdma/vmw/pvrdma_qp_ops.c
@@ -154,7 +154,7 @@ void pvrdma_qp_send(PVRDMADev *dev, uint32_t qp_handle)
         CompHandlerCtx *comp_ctx;
 
         /* Prepare CQE */
-        comp_ctx = g_malloc(sizeof(CompHandlerCtx));
+        comp_ctx = g_new(CompHandlerCtx, 1);
         comp_ctx->dev = dev;
         comp_ctx->cq_handle = qp->send_cq_handle;
         comp_ctx->cqe.wr_id = wqe->hdr.wr_id;
@@ -217,7 +217,7 @@ void pvrdma_qp_recv(PVRDMADev *dev, uint32_t qp_handle)
         CompHandlerCtx *comp_ctx;
 
         /* Prepare CQE */
-        comp_ctx = g_malloc(sizeof(CompHandlerCtx));
+        comp_ctx = g_new(CompHandlerCtx, 1);
         comp_ctx->dev = dev;
         comp_ctx->cq_handle = qp->recv_cq_handle;
         comp_ctx->cqe.wr_id = wqe->hdr.wr_id;
@@ -259,7 +259,7 @@ void pvrdma_srq_recv(PVRDMADev *dev, uint32_t srq_handle)
         CompHandlerCtx *comp_ctx;
 
         /* Prepare CQE */
-        comp_ctx = g_malloc(sizeof(CompHandlerCtx));
+        comp_ctx = g_new(CompHandlerCtx, 1);
         comp_ctx->dev = dev;
         comp_ctx->cq_handle = srq->recv_cq_handle;
         comp_ctx->cqe.wr_id = wqe->hdr.wr_id;
diff --git a/hw/sh4/r2d.c b/hw/sh4/r2d.c
index 72759413f3..39fc4f19d9 100644
--- a/hw/sh4/r2d.c
+++ b/hw/sh4/r2d.c
@@ -190,7 +190,7 @@ static qemu_irq *r2d_fpga_init(MemoryRegion *sysmem,
 {
     r2d_fpga_t *s;
 
-    s = g_malloc0(sizeof(r2d_fpga_t));
+    s = g_new0(r2d_fpga_t, 1);
 
     s->irl = irl;
 
@@ -248,7 +248,7 @@ static void r2d_init(MachineState *machine)
     cpu = SUPERH_CPU(cpu_create(machine->cpu_type));
     env = &cpu->env;
 
-    reset_info = g_malloc0(sizeof(ResetData));
+    reset_info = g_new0(ResetData, 1);
     reset_info->cpu = cpu;
     reset_info->vector = env->pc;
     qemu_register_reset(main_cpu_reset, reset_info);
diff --git a/hw/sh4/sh7750.c b/hw/sh4/sh7750.c
index 43dfb6497b..c77792d150 100644
--- a/hw/sh4/sh7750.c
+++ b/hw/sh4/sh7750.c
@@ -770,7 +770,7 @@ SH7750State *sh7750_init(SuperHCPU *cpu, MemoryRegion *sysmem)
     SysBusDevice *sb;
     MemoryRegion *mr, *alias;
 
-    s = g_malloc0(sizeof(SH7750State));
+    s = g_new0(SH7750State, 1);
     s->cpu = cpu;
     s->periph_freq = 60000000; /* 60MHz */
     memory_region_init_io(&s->iomem, NULL, &sh7750_mem_ops, s,
diff --git a/hw/sparc/leon3.c b/hw/sparc/leon3.c
index 7b4dec1721..a9f2496827 100644
--- a/hw/sparc/leon3.c
+++ b/hw/sparc/leon3.c
@@ -241,7 +241,7 @@ static void leon3_generic_hw_init(MachineState *machine)
     cpu_sparc_set_id(env, 0);
 
     /* Reset data */
-    reset_info        = g_malloc0(sizeof(ResetData));
+    reset_info        = g_new0(ResetData, 1);
     reset_info->cpu   = cpu;
     reset_info->sp    = LEON3_RAM_OFFSET + ram_size;
     qemu_register_reset(main_cpu_reset, reset_info);
diff --git a/hw/sparc64/sparc64.c b/hw/sparc64/sparc64.c
index 8654e955eb..72f0849f50 100644
--- a/hw/sparc64/sparc64.c
+++ b/hw/sparc64/sparc64.c
@@ -81,7 +81,7 @@ static CPUTimer *cpu_timer_create(const char *name, SPARCCPU *cpu,
                                   QEMUBHFunc *cb, uint32_t frequency,
                                   uint64_t disabled_mask, uint64_t npt_mask)
 {
-    CPUTimer *timer = g_malloc0(sizeof(CPUTimer));
+    CPUTimer *timer = g_new0(CPUTimer, 1);
 
     timer->name = name;
     timer->frequency = frequency;
@@ -288,7 +288,7 @@ SPARCCPU *sparc64_cpu_devinit(const char *cpu_type, uint64_t prom_addr)
                                     hstick_frequency, TICK_INT_DIS,
                                     TICK_NPT_MASK);
 
-    reset_info = g_malloc0(sizeof(ResetData));
+    reset_info = g_new0(ResetData, 1);
     reset_info->cpu = cpu;
     reset_info->prom_addr = prom_addr;
     qemu_register_reset(main_cpu_reset, reset_info);
diff --git a/hw/timer/arm_timer.c b/hw/timer/arm_timer.c
index 15caff0e41..84cf2726bb 100644
--- a/hw/timer/arm_timer.c
+++ b/hw/timer/arm_timer.c
@@ -176,7 +176,7 @@ static arm_timer_state *arm_timer_init(uint32_t freq)
 {
     arm_timer_state *s;
 
-    s = (arm_timer_state *)g_malloc0(sizeof(arm_timer_state));
+    s = g_new0(arm_timer_state, 1);
     s->freq = freq;
     s->control = TIMER_CTRL_IE;
 
diff --git a/hw/timer/slavio_timer.c b/hw/timer/slavio_timer.c
index 03e33fc592..90fdce4c44 100644
--- a/hw/timer/slavio_timer.c
+++ b/hw/timer/slavio_timer.c
@@ -400,7 +400,7 @@ static void slavio_timer_init(Object *obj)
         uint64_t size;
         char timer_name[20];
 
-        tc = g_malloc0(sizeof(TimerContext));
+        tc = g_new0(TimerContext, 1);
         tc->s = s;
         tc->timer_index = i;
 
diff --git a/hw/vfio/pci.c b/hw/vfio/pci.c
index 7b45353ce2..436b5cbcb1 100644
--- a/hw/vfio/pci.c
+++ b/hw/vfio/pci.c
@@ -1529,8 +1529,8 @@ static int vfio_msix_setup(VFIOPCIDevice *vdev, int pos, Error **errp)
     int ret;
     Error *err = NULL;
 
-    vdev->msix->pending = g_malloc0(BITS_TO_LONGS(vdev->msix->entries) *
-                                    sizeof(unsigned long));
+    vdev->msix->pending = g_new0(unsigned long,
+                                 BITS_TO_LONGS(vdev->msix->entries));
     ret = msix_init(&vdev->pdev, vdev->msix->entries,
                     vdev->bars[vdev->msix->table_bar].mr,
                     vdev->msix->table_bar, vdev->msix->table_offset,
diff --git a/hw/vfio/platform.c b/hw/vfio/platform.c
index f8f08a0f36..5af73f9287 100644
--- a/hw/vfio/platform.c
+++ b/hw/vfio/platform.c
@@ -71,7 +71,7 @@ static VFIOINTp *vfio_init_intp(VFIODevice *vbasedev,
     sysbus_init_irq(sbdev, &intp->qemuirq);
 
     /* Get an eventfd for trigger */
-    intp->interrupt = g_malloc0(sizeof(EventNotifier));
+    intp->interrupt = g_new0(EventNotifier, 1);
     ret = event_notifier_init(intp->interrupt, 0);
     if (ret) {
         g_free(intp->interrupt);
@@ -82,7 +82,7 @@ static VFIOINTp *vfio_init_intp(VFIODevice *vbasedev,
     }
     if (vfio_irq_is_automasked(intp)) {
         /* Get an eventfd for resample/unmask */
-        intp->unmask = g_malloc0(sizeof(EventNotifier));
+        intp->unmask = g_new0(EventNotifier, 1);
         ret = event_notifier_init(intp->unmask, 0);
         if (ret) {
             g_free(intp->interrupt);
diff --git a/hw/virtio/virtio-crypto.c b/hw/virtio/virtio-crypto.c
index 54f9bbb789..dcd80b904d 100644
--- a/hw/virtio/virtio-crypto.c
+++ b/hw/virtio/virtio-crypto.c
@@ -812,7 +812,7 @@ static void virtio_crypto_device_realize(DeviceState *dev, Error **errp)
 
     virtio_init(vdev, "virtio-crypto", VIRTIO_ID_CRYPTO, vcrypto->config_size);
     vcrypto->curr_queues = 1;
-    vcrypto->vqs = g_malloc0(sizeof(VirtIOCryptoQueue) * vcrypto->max_queues);
+    vcrypto->vqs = g_new0(VirtIOCryptoQueue, vcrypto->max_queues);
     for (i = 0; i < vcrypto->max_queues; i++) {
         vcrypto->vqs[i].dataq =
                  virtio_add_queue(vdev, 1024, virtio_crypto_handle_dataq_bh);
diff --git a/hw/virtio/virtio-iommu.c b/hw/virtio/virtio-iommu.c
index 239fe97b12..664cbd9583 100644
--- a/hw/virtio/virtio-iommu.c
+++ b/hw/virtio/virtio-iommu.c
@@ -316,7 +316,7 @@ static AddressSpace *virtio_iommu_find_add_as(PCIBus *bus, void *opaque,
         char *name = g_strdup_printf("%s-%d-%d",
                                      TYPE_VIRTIO_IOMMU_MEMORY_REGION,
                                      mr_index++, devfn);
-        sdev = sbus->pbdev[devfn] = g_malloc0(sizeof(IOMMUDevice));
+        sdev = sbus->pbdev[devfn] = g_new0(IOMMUDevice, 1);
 
         sdev->viommu = s;
         sdev->bus = bus;
diff --git a/hw/virtio/virtio.c b/hw/virtio/virtio.c
index 9e8f51dfb0..32b1859391 100644
--- a/hw/virtio/virtio.c
+++ b/hw/virtio/virtio.c
@@ -2380,8 +2380,7 @@ VirtQueue *virtio_add_queue(VirtIODevice *vdev, int queue_size,
     vdev->vq[i].vring.num_default = queue_size;
     vdev->vq[i].vring.align = VIRTIO_PCI_VRING_ALIGN;
     vdev->vq[i].handle_output = handle_output;
-    vdev->vq[i].used_elems = g_malloc0(sizeof(VirtQueueElement) *
-                                       queue_size);
+    vdev->vq[i].used_elems = g_new0(VirtQueueElement, queue_size);
 
     return &vdev->vq[i];
 }
@@ -3228,7 +3227,7 @@ void virtio_init(VirtIODevice *vdev, const char *name,
     qatomic_set(&vdev->isr, 0);
     vdev->queue_sel = 0;
     vdev->config_vector = VIRTIO_NO_VECTOR;
-    vdev->vq = g_malloc0(sizeof(VirtQueue) * VIRTIO_QUEUE_MAX);
+    vdev->vq = g_new0(VirtQueue, VIRTIO_QUEUE_MAX);
     vdev->vm_running = runstate_is_running();
     vdev->broken = false;
     for (i = 0; i < VIRTIO_QUEUE_MAX; i++) {
diff --git a/hw/xtensa/xtfpga.c b/hw/xtensa/xtfpga.c
index 17f087b395..c1e004e882 100644
--- a/hw/xtensa/xtfpga.c
+++ b/hw/xtensa/xtfpga.c
@@ -126,7 +126,7 @@ static const MemoryRegionOps xtfpga_fpga_ops = {
 static XtfpgaFpgaState *xtfpga_fpga_init(MemoryRegion *address_space,
                                          hwaddr base, uint32_t freq)
 {
-    XtfpgaFpgaState *s = g_malloc(sizeof(XtfpgaFpgaState));
+    XtfpgaFpgaState *s = g_new(XtfpgaFpgaState, 1);
 
     memory_region_init_io(&s->iomem, NULL, &xtfpga_fpga_ops, s,
                           "xtfpga.fpga", 0x10000);
diff --git a/linux-user/syscall.c b/linux-user/syscall.c
index b9b18a7eaf..75ed71eb46 100644
--- a/linux-user/syscall.c
+++ b/linux-user/syscall.c
@@ -5076,7 +5076,7 @@ do_ioctl_usbdevfs_submiturb(const IOCTLEntry *ie, uint8_t *buf_temp,
     target_size = thunk_type_size(arg_type, THUNK_TARGET);
 
     /* construct host copy of urb and metadata */
-    lurb = g_try_malloc0(sizeof(struct live_urb));
+    lurb = g_try_new0(struct live_urb, 1);
     if (!lurb) {
         return -TARGET_ENOMEM;
     }
diff --git a/migration/dirtyrate.c b/migration/dirtyrate.c
index d65e744af9..aace12a787 100644
--- a/migration/dirtyrate.c
+++ b/migration/dirtyrate.c
@@ -91,7 +91,7 @@ static struct DirtyRateInfo *query_dirty_rate_info(void)
 {
     int i;
     int64_t dirty_rate = DirtyStat.dirty_rate;
-    struct DirtyRateInfo *info = g_malloc0(sizeof(DirtyRateInfo));
+    struct DirtyRateInfo *info = g_new0(DirtyRateInfo, 1);
     DirtyRateVcpuList *head = NULL, **tail = &head;
 
     info->status = CalculatingState;
@@ -112,7 +112,7 @@ static struct DirtyRateInfo *query_dirty_rate_info(void)
             info->sample_pages = 0;
             info->has_vcpu_dirty_rate = true;
             for (i = 0; i < DirtyStat.dirty_ring.nvcpu; i++) {
-                DirtyRateVcpu *rate = g_malloc0(sizeof(DirtyRateVcpu));
+                DirtyRateVcpu *rate = g_new0(DirtyRateVcpu, 1);
                 rate->id = DirtyStat.dirty_ring.rates[i].id;
                 rate->dirty_rate = DirtyStat.dirty_ring.rates[i].dirty_rate;
                 QAPI_LIST_APPEND(tail, rate);
diff --git a/migration/multifd-zlib.c b/migration/multifd-zlib.c
index aba1c88a0c..3a7ae44485 100644
--- a/migration/multifd-zlib.c
+++ b/migration/multifd-zlib.c
@@ -43,7 +43,7 @@ struct zlib_data {
  */
 static int zlib_send_setup(MultiFDSendParams *p, Error **errp)
 {
-    struct zlib_data *z = g_malloc0(sizeof(struct zlib_data));
+    struct zlib_data *z = g_new0(struct zlib_data, 1);
     z_stream *zs = &z->zs;
 
     zs->zalloc = Z_NULL;
@@ -164,7 +164,7 @@ static int zlib_send_prepare(MultiFDSendParams *p, Error **errp)
  */
 static int zlib_recv_setup(MultiFDRecvParams *p, Error **errp)
 {
-    struct zlib_data *z = g_malloc0(sizeof(struct zlib_data));
+    struct zlib_data *z = g_new0(struct zlib_data, 1);
     z_stream *zs = &z->zs;
 
     p->data = z;
diff --git a/migration/ram.c b/migration/ram.c
index 170e522a1f..3532f64ecb 100644
--- a/migration/ram.c
+++ b/migration/ram.c
@@ -2059,7 +2059,7 @@ int ram_save_queue_pages(const char *rbname, ram_addr_t start, ram_addr_t len)
     }
 
     struct RAMSrcPageRequest *new_entry =
-        g_malloc0(sizeof(struct RAMSrcPageRequest));
+        g_new0(struct RAMSrcPageRequest, 1);
     new_entry->rb = ramblock;
     new_entry->offset = start;
     new_entry->len = len;
diff --git a/monitor/misc.c b/monitor/misc.c
index b1839cb8ee..a756dbd6db 100644
--- a/monitor/misc.c
+++ b/monitor/misc.c
@@ -1028,7 +1028,7 @@ void qmp_getfd(const char *fdname, Error **errp)
         return;
     }
 
-    monfd = g_malloc0(sizeof(mon_fd_t));
+    monfd = g_new0(mon_fd_t, 1);
     monfd->name = g_strdup(fdname);
     monfd->fd = fd;
 
diff --git a/monitor/qmp-cmds.c b/monitor/qmp-cmds.c
index ad82c275c4..0b04855ce8 100644
--- a/monitor/qmp-cmds.c
+++ b/monitor/qmp-cmds.c
@@ -318,7 +318,7 @@ ACPIOSTInfoList *qmp_query_acpi_ospm_status(Error **errp)
 
 MemoryInfo *qmp_query_memory_size_summary(Error **errp)
 {
-    MemoryInfo *mem_info = g_malloc0(sizeof(MemoryInfo));
+    MemoryInfo *mem_info = g_new0(MemoryInfo, 1);
     MachineState *ms = MACHINE(qdev_get_machine());
 
     mem_info->base_memory = ms->ram_size;
diff --git a/qga/commands-win32.c b/qga/commands-win32.c
index 4fbbad793f..3c428213db 100644
--- a/qga/commands-win32.c
+++ b/qga/commands-win32.c
@@ -949,7 +949,7 @@ static GuestDiskAddressList *build_guest_disk_info(char *guid, Error **errp)
         } else if (last_err == ERROR_INVALID_FUNCTION) {
             /* Possibly CD-ROM or a shared drive. Try to pass the volume */
             g_debug("volume not on disk");
-            disk = g_malloc0(sizeof(GuestDiskAddress));
+            disk = g_new0(GuestDiskAddress, 1);
             disk->has_dev = true;
             disk->dev = g_strdup(name);
             get_single_disk_info(0xffffffff, disk, &local_err);
@@ -972,7 +972,7 @@ static GuestDiskAddressList *build_guest_disk_info(char *guid, Error **errp)
 
     /* Go through each extent */
     for (i = 0; i < extents->NumberOfDiskExtents; i++) {
-        disk = g_malloc0(sizeof(GuestDiskAddress));
+        disk = g_new0(GuestDiskAddress, 1);
 
         /* Disk numbers directly correspond to numbers used in UNCs
          *
@@ -1076,7 +1076,7 @@ GuestDiskInfoList *qmp_guest_get_disks(Error **errp)
             sdn.DeviceNumber);
 
         g_debug("  number: %lu", sdn.DeviceNumber);
-        address = g_malloc0(sizeof(GuestDiskAddress));
+        address = g_new0(GuestDiskAddress, 1);
         address->has_dev = true;
         address->dev = g_strdup(disk->name);
         get_single_disk_info(sdn.DeviceNumber, address, &local_err);
@@ -1368,7 +1368,7 @@ qmp_guest_fstrim(bool has_minimum, int64_t minimum, Error **errp)
             continue;
         }
 
-        uc_path = g_malloc(sizeof(WCHAR) * char_count);
+        uc_path = g_new(WCHAR, char_count);
         if (!GetVolumePathNamesForVolumeNameW(guid, uc_path, char_count,
                                               &char_count) || !*uc_path) {
             /* strange, but this condition could be faced even with size == 2 */
diff --git a/qga/commands.c b/qga/commands.c
index 80501e4a73..72e6022207 100644
--- a/qga/commands.c
+++ b/qga/commands.c
@@ -244,7 +244,7 @@ static char **guest_exec_get_args(const strList *entry, bool log)
 
     str = g_malloc(str_size);
     *str = 0;
-    args = g_malloc(count * sizeof(char *));
+    args = g_new(char *, count);
     for (it = entry; it != NULL; it = it->next) {
         args[i++] = it->value;
         pstrcat(str, str_size, it->value);
diff --git a/qom/qom-qmp-cmds.c b/qom/qom-qmp-cmds.c
index 2d6f41ecc7..2e63a4c184 100644
--- a/qom/qom-qmp-cmds.c
+++ b/qom/qom-qmp-cmds.c
@@ -49,7 +49,7 @@ ObjectPropertyInfoList *qmp_qom_list(const char *path, Error **errp)
 
     object_property_iter_init(&iter, obj);
     while ((prop = object_property_iter_next(&iter))) {
-        ObjectPropertyInfo *value = g_malloc0(sizeof(ObjectPropertyInfo));
+        ObjectPropertyInfo *value = g_new0(ObjectPropertyInfo, 1);
 
         QAPI_LIST_PREPEND(props, value);
 
diff --git a/replay/replay-char.c b/replay/replay-char.c
index dc0002367e..d2025948cf 100644
--- a/replay/replay-char.c
+++ b/replay/replay-char.c
@@ -50,7 +50,7 @@ void replay_register_char_driver(Chardev *chr)
 
 void replay_chr_be_write(Chardev *s, uint8_t *buf, int len)
 {
-    CharEvent *event = g_malloc0(sizeof(CharEvent));
+    CharEvent *event = g_new0(CharEvent, 1);
 
     event->id = find_char_driver(s);
     if (event->id < 0) {
@@ -85,7 +85,7 @@ void replay_event_char_read_save(void *opaque)
 
 void *replay_event_char_read_load(void)
 {
-    CharEvent *event = g_malloc0(sizeof(CharEvent));
+    CharEvent *event = g_new0(CharEvent, 1);
 
     event->id = replay_get_byte();
     replay_get_array_alloc(&event->buf, &event->len);
diff --git a/replay/replay-events.c b/replay/replay-events.c
index 15983dd250..ac47c89834 100644
--- a/replay/replay-events.c
+++ b/replay/replay-events.c
@@ -119,7 +119,7 @@ void replay_add_event(ReplayAsyncEventKind event_kind,
         return;
     }
 
-    Event *event = g_malloc0(sizeof(Event));
+    Event *event = g_new0(Event, 1);
     event->event_kind = event_kind;
     event->opaque = opaque;
     event->opaque2 = opaque2;
@@ -243,17 +243,17 @@ static Event *replay_read_event(int checkpoint)
         }
         break;
     case REPLAY_ASYNC_EVENT_INPUT:
-        event = g_malloc0(sizeof(Event));
+        event = g_new0(Event, 1);
         event->event_kind = replay_state.read_event_kind;
         event->opaque = replay_read_input_event();
         return event;
     case REPLAY_ASYNC_EVENT_INPUT_SYNC:
-        event = g_malloc0(sizeof(Event));
+        event = g_new0(Event, 1);
         event->event_kind = replay_state.read_event_kind;
         event->opaque = 0;
         return event;
     case REPLAY_ASYNC_EVENT_CHAR_READ:
-        event = g_malloc0(sizeof(Event));
+        event = g_new0(Event, 1);
         event->event_kind = replay_state.read_event_kind;
         event->opaque = replay_event_char_read_load();
         return event;
@@ -263,7 +263,7 @@ static Event *replay_read_event(int checkpoint)
         }
         break;
     case REPLAY_ASYNC_EVENT_NET:
-        event = g_malloc0(sizeof(Event));
+        event = g_new0(Event, 1);
         event->event_kind = replay_state.read_event_kind;
         event->opaque = replay_event_net_load();
         return event;
diff --git a/softmmu/bootdevice.c b/softmmu/bootdevice.c
index add4e3d2d1..c0713bfa9f 100644
--- a/softmmu/bootdevice.c
+++ b/softmmu/bootdevice.c
@@ -166,7 +166,7 @@ void add_boot_device_path(int32_t bootindex, DeviceState *dev,
 
     del_boot_device_path(dev, suffix);
 
-    node = g_malloc0(sizeof(FWBootEntry));
+    node = g_new0(FWBootEntry, 1);
     node->bootindex = bootindex;
     node->suffix = g_strdup(suffix);
     node->dev = dev;
@@ -367,7 +367,7 @@ void add_boot_device_lchs(DeviceState *dev, const char *suffix,
 
     assert(dev != NULL || suffix != NULL);
 
-    node = g_malloc0(sizeof(FWLCHSEntry));
+    node = g_new0(FWLCHSEntry, 1);
     node->suffix = g_strdup(suffix);
     node->dev = dev;
     node->lcyls = lcyls;
diff --git a/softmmu/dma-helpers.c b/softmmu/dma-helpers.c
index 160095e4ba..7820fec54c 100644
--- a/softmmu/dma-helpers.c
+++ b/softmmu/dma-helpers.c
@@ -29,7 +29,7 @@ MemTxResult dma_memory_set(AddressSpace *as, dma_addr_t addr,
 void qemu_sglist_init(QEMUSGList *qsg, DeviceState *dev, int alloc_hint,
                       AddressSpace *as)
 {
-    qsg->sg = g_malloc(alloc_hint * sizeof(ScatterGatherEntry));
+    qsg->sg = g_new(ScatterGatherEntry, alloc_hint);
     qsg->nsg = 0;
     qsg->nalloc = alloc_hint;
     qsg->size = 0;
@@ -42,7 +42,7 @@ void qemu_sglist_add(QEMUSGList *qsg, dma_addr_t base, dma_addr_t len)
 {
     if (qsg->nsg == qsg->nalloc) {
         qsg->nalloc = 2 * qsg->nalloc + 1;
-        qsg->sg = g_realloc(qsg->sg, qsg->nalloc * sizeof(ScatterGatherEntry));
+        qsg->sg = g_renew(ScatterGatherEntry, qsg->sg, qsg->nalloc);
     }
     qsg->sg[qsg->nsg].base = base;
     qsg->sg[qsg->nsg].len = len;
diff --git a/softmmu/memory_mapping.c b/softmmu/memory_mapping.c
index 8320165ea2..f6f0a829fd 100644
--- a/softmmu/memory_mapping.c
+++ b/softmmu/memory_mapping.c
@@ -42,7 +42,7 @@ static void create_new_memory_mapping(MemoryMappingList *list,
 {
     MemoryMapping *memory_mapping;
 
-    memory_mapping = g_malloc(sizeof(MemoryMapping));
+    memory_mapping = g_new(MemoryMapping, 1);
     memory_mapping->phys_addr = phys_addr;
     memory_mapping->virt_addr = virt_addr;
     memory_mapping->length = length;
diff --git a/target/i386/cpu-sysemu.c b/target/i386/cpu-sysemu.c
index 37b7c562f5..e254d8ba10 100644
--- a/target/i386/cpu-sysemu.c
+++ b/target/i386/cpu-sysemu.c
@@ -313,7 +313,7 @@ GuestPanicInformation *x86_cpu_get_crash_info(CPUState *cs)
     GuestPanicInformation *panic_info = NULL;
 
     if (hyperv_feat_enabled(cpu, HYPERV_FEAT_CRASH)) {
-        panic_info = g_malloc0(sizeof(GuestPanicInformation));
+        panic_info = g_new0(GuestPanicInformation, 1);
 
         panic_info->type = GUEST_PANIC_INFORMATION_TYPE_HYPER_V;
 
diff --git a/target/i386/hax/hax-accel-ops.c b/target/i386/hax/hax-accel-ops.c
index 136630e9b2..18114fe34d 100644
--- a/target/i386/hax/hax-accel-ops.c
+++ b/target/i386/hax/hax-accel-ops.c
@@ -61,8 +61,8 @@ static void hax_start_vcpu_thread(CPUState *cpu)
 {
     char thread_name[VCPU_THREAD_NAME_SIZE];
 
-    cpu->thread = g_malloc0(sizeof(QemuThread));
-    cpu->halt_cond = g_malloc0(sizeof(QemuCond));
+    cpu->thread = g_new0(QemuThread, 1);
+    cpu->halt_cond = g_new0(QemuCond, 1);
     qemu_cond_init(cpu->halt_cond);
 
     snprintf(thread_name, VCPU_THREAD_NAME_SIZE, "CPU %d/HAX",
diff --git a/target/i386/nvmm/nvmm-accel-ops.c b/target/i386/nvmm/nvmm-accel-ops.c
index f788f75289..6c46101ac1 100644
--- a/target/i386/nvmm/nvmm-accel-ops.c
+++ b/target/i386/nvmm/nvmm-accel-ops.c
@@ -64,8 +64,8 @@ static void nvmm_start_vcpu_thread(CPUState *cpu)
 {
     char thread_name[VCPU_THREAD_NAME_SIZE];
 
-    cpu->thread = g_malloc0(sizeof(QemuThread));
-    cpu->halt_cond = g_malloc0(sizeof(QemuCond));
+    cpu->thread = g_new0(QemuThread, 1);
+    cpu->halt_cond = g_new0(QemuCond, 1);
     qemu_cond_init(cpu->halt_cond);
     snprintf(thread_name, VCPU_THREAD_NAME_SIZE, "CPU %d/NVMM",
              cpu->cpu_index);
diff --git a/target/i386/whpx/whpx-accel-ops.c b/target/i386/whpx/whpx-accel-ops.c
index 1d30e4e2ed..dd2a9f7657 100644
--- a/target/i386/whpx/whpx-accel-ops.c
+++ b/target/i386/whpx/whpx-accel-ops.c
@@ -64,8 +64,8 @@ static void whpx_start_vcpu_thread(CPUState *cpu)
 {
     char thread_name[VCPU_THREAD_NAME_SIZE];
 
-    cpu->thread = g_malloc0(sizeof(QemuThread));
-    cpu->halt_cond = g_malloc0(sizeof(QemuCond));
+    cpu->thread = g_new0(QemuThread, 1);
+    cpu->halt_cond = g_new0(QemuCond, 1);
     qemu_cond_init(cpu->halt_cond);
     snprintf(thread_name, VCPU_THREAD_NAME_SIZE, "CPU %d/WHPX",
              cpu->cpu_index);
diff --git a/target/i386/whpx/whpx-all.c b/target/i386/whpx/whpx-all.c
index c7e25abf42..9fd287e5d4 100644
--- a/target/i386/whpx/whpx-all.c
+++ b/target/i386/whpx/whpx-all.c
@@ -1354,7 +1354,7 @@ int whpx_init_vcpu(CPUState *cpu)
         }
     }
 
-    vcpu = g_malloc0(sizeof(struct whpx_vcpu));
+    vcpu = g_new0(struct whpx_vcpu, 1);
 
     if (!vcpu) {
         error_report("WHPX: Failed to allocte VCPU context.");
diff --git a/target/s390x/cpu-sysemu.c b/target/s390x/cpu-sysemu.c
index 5471e01ee8..948e4bd3e0 100644
--- a/target/s390x/cpu-sysemu.c
+++ b/target/s390x/cpu-sysemu.c
@@ -76,7 +76,7 @@ static GuestPanicInformation *s390_cpu_get_crash_info(CPUState *cs)
     S390CPU *cpu = S390_CPU(cs);
 
     cpu_synchronize_state(cs);
-    panic_info = g_malloc0(sizeof(GuestPanicInformation));
+    panic_info = g_new0(GuestPanicInformation, 1);
 
     panic_info->type = GUEST_PANIC_INFORMATION_TYPE_S390;
     panic_info->u.s390.core = cpu->env.core_id;
diff --git a/tests/unit/test-hbitmap.c b/tests/unit/test-hbitmap.c
index b6726cf76b..a4fe067917 100644
--- a/tests/unit/test-hbitmap.c
+++ b/tests/unit/test-hbitmap.c
@@ -113,7 +113,7 @@ static void hbitmap_test_truncate_impl(TestHBitmapData *data,
 
     n = hbitmap_test_array_size(size);
     m = hbitmap_test_array_size(data->old_size);
-    data->bits = g_realloc(data->bits, sizeof(unsigned long) * n);
+    data->bits = g_renew(unsigned long, data->bits, n);
     if (n > m) {
         memset(&data->bits[m], 0x00, sizeof(unsigned long) * (n - m));
     }
diff --git a/tests/unit/test-qmp-cmds.c b/tests/unit/test-qmp-cmds.c
index faa858624a..6085c09995 100644
--- a/tests/unit/test-qmp-cmds.c
+++ b/tests/unit/test-qmp-cmds.c
@@ -82,8 +82,8 @@ UserDefTwo *qmp_user_def_cmd2(UserDefOne *ud1a,
                               Error **errp)
 {
     UserDefTwo *ret;
-    UserDefOne *ud1c = g_malloc0(sizeof(UserDefOne));
-    UserDefOne *ud1d = g_malloc0(sizeof(UserDefOne));
+    UserDefOne *ud1c = g_new0(UserDefOne, 1);
+    UserDefOne *ud1d = g_new0(UserDefOne, 1);
 
     ud1c->string = strdup(ud1a->string);
     ud1c->integer = ud1a->integer;
@@ -344,23 +344,23 @@ static void test_dealloc_types(void)
     UserDefOne *ud1test, *ud1a, *ud1b;
     UserDefOneList *ud1list;
 
-    ud1test = g_malloc0(sizeof(UserDefOne));
+    ud1test = g_new0(UserDefOne, 1);
     ud1test->integer = 42;
     ud1test->string = g_strdup("hi there 42");
 
     qapi_free_UserDefOne(ud1test);
 
-    ud1a = g_malloc0(sizeof(UserDefOne));
+    ud1a = g_new0(UserDefOne, 1);
     ud1a->integer = 43;
     ud1a->string = g_strdup("hi there 43");
 
-    ud1b = g_malloc0(sizeof(UserDefOne));
+    ud1b = g_new0(UserDefOne, 1);
     ud1b->integer = 44;
     ud1b->string = g_strdup("hi there 44");
 
-    ud1list = g_malloc0(sizeof(UserDefOneList));
+    ud1list = g_new0(UserDefOneList, 1);
     ud1list->value = ud1a;
-    ud1list->next = g_malloc0(sizeof(UserDefOneList));
+    ud1list->next = g_new0(UserDefOneList, 1);
     ud1list->next->value = ud1b;
 
     qapi_free_UserDefOneList(ud1list);
diff --git a/tests/unit/test-qobject-output-visitor.c b/tests/unit/test-qobject-output-visitor.c
index 34d67a439a..6af4c33eec 100644
--- a/tests/unit/test-qobject-output-visitor.c
+++ b/tests/unit/test-qobject-output-visitor.c
@@ -338,7 +338,7 @@ static void test_visitor_out_union_flat(TestOutputVisitorData *data,
 {
     QDict *qdict;
 
-    UserDefFlatUnion *tmp = g_malloc0(sizeof(UserDefFlatUnion));
+    UserDefFlatUnion *tmp = g_new0(UserDefFlatUnion, 1);
     tmp->enum1 = ENUM_ONE_VALUE1;
     tmp->string = g_strdup("str");
     tmp->integer = 41;
diff --git a/tests/unit/test-vmstate.c b/tests/unit/test-vmstate.c
index 4688c03ea7..6a417bb102 100644
--- a/tests/unit/test-vmstate.c
+++ b/tests/unit/test-vmstate.c
@@ -1002,22 +1002,22 @@ static TestGTreeDomain *create_first_domain(void)
     TestGTreeMapping *map_a, *map_b;
     TestGTreeInterval *a, *b;
 
-    domain = g_malloc0(sizeof(TestGTreeDomain));
+    domain = g_new0(TestGTreeDomain, 1);
     domain->id = 6;
 
-    a = g_malloc0(sizeof(TestGTreeInterval));
+    a = g_new0(TestGTreeInterval, 1);
     a->low = 0x1000;
     a->high = 0x1FFF;
 
-    b = g_malloc0(sizeof(TestGTreeInterval));
+    b = g_new0(TestGTreeInterval, 1);
     b->low = 0x4000;
     b->high = 0x4FFF;
 
-    map_a = g_malloc0(sizeof(TestGTreeMapping));
+    map_a = g_new0(TestGTreeMapping, 1);
     map_a->phys_addr = 0xa000;
     map_a->flags = 1;
 
-    map_b = g_malloc0(sizeof(TestGTreeMapping));
+    map_b = g_new0(TestGTreeMapping, 1);
     map_b->phys_addr = 0xe0000;
     map_b->flags = 2;
 
@@ -1120,7 +1120,7 @@ static void diff_iommu(TestGTreeIOMMU *iommu1, TestGTreeIOMMU *iommu2)
 
 static void test_gtree_load_domain(void)
 {
-    TestGTreeDomain *dest_domain = g_malloc0(sizeof(TestGTreeDomain));
+    TestGTreeDomain *dest_domain = g_new0(TestGTreeDomain, 1);
     TestGTreeDomain *orig_domain = create_first_domain();
     QEMUFile *fload, *fsave;
     char eof;
@@ -1185,7 +1185,7 @@ uint8_t iommu_dump[] = {
 
 static TestGTreeIOMMU *create_iommu(void)
 {
-    TestGTreeIOMMU *iommu = g_malloc0(sizeof(TestGTreeIOMMU));
+    TestGTreeIOMMU *iommu = g_new0(TestGTreeIOMMU, 1);
     TestGTreeDomain *first_domain = create_first_domain();
     TestGTreeDomain *second_domain;
     TestGTreeMapping *map_c;
@@ -1196,7 +1196,7 @@ static TestGTreeIOMMU *create_iommu(void)
                                      NULL,
                                      destroy_domain);
 
-    second_domain = g_malloc0(sizeof(TestGTreeDomain));
+    second_domain = g_new0(TestGTreeDomain, 1);
     second_domain->id = 5;
     second_domain->mappings = g_tree_new_full((GCompareDataFunc)interval_cmp,
                                               NULL,
@@ -1206,11 +1206,11 @@ static TestGTreeIOMMU *create_iommu(void)
     g_tree_insert(iommu->domains, GUINT_TO_POINTER(6), first_domain);
     g_tree_insert(iommu->domains, (gpointer)0x0000000000000005, second_domain);
 
-    c = g_malloc0(sizeof(TestGTreeInterval));
+    c = g_new0(TestGTreeInterval, 1);
     c->low = 0x1000000;
     c->high = 0x1FFFFFF;
 
-    map_c = g_malloc0(sizeof(TestGTreeMapping));
+    map_c = g_new0(TestGTreeMapping, 1);
     map_c->phys_addr = 0xF000000;
     map_c->flags = 0x3;
 
@@ -1235,7 +1235,7 @@ static void test_gtree_save_iommu(void)
 
 static void test_gtree_load_iommu(void)
 {
-    TestGTreeIOMMU *dest_iommu = g_malloc0(sizeof(TestGTreeIOMMU));
+    TestGTreeIOMMU *dest_iommu = g_new0(TestGTreeIOMMU, 1);
     TestGTreeIOMMU *orig_iommu = create_iommu();
     QEMUFile *fsave, *fload;
     char eof;
@@ -1274,11 +1274,11 @@ static uint8_t qlist_dump[] = {
 
 static TestQListContainer *alloc_container(void)
 {
-    TestQListElement *a = g_malloc(sizeof(TestQListElement));
-    TestQListElement *b = g_malloc(sizeof(TestQListElement));
-    TestQListElement *c = g_malloc(sizeof(TestQListElement));
-    TestQListElement *d = g_malloc(sizeof(TestQListElement));
-    TestQListContainer *container = g_malloc(sizeof(TestQListContainer));
+    TestQListElement *a = g_new(TestQListElement, 1);
+    TestQListElement *b = g_new(TestQListElement, 1);
+    TestQListElement *c = g_new(TestQListElement, 1);
+    TestQListElement *d = g_new(TestQListElement, 1);
+    TestQListContainer *container = g_new(TestQListContainer, 1);
 
     a->id = 0x0a;
     b->id = 0x0b00;
@@ -1332,11 +1332,11 @@ static void manipulate_container(TestQListContainer *c)
      TestQListElement *prev = NULL, *iter = QLIST_FIRST(&c->list);
      TestQListElement *elem;
 
-     elem = g_malloc(sizeof(TestQListElement));
+     elem = g_new(TestQListElement, 1);
      elem->id = 0x12;
      QLIST_INSERT_AFTER(iter, elem, next);
 
-     elem = g_malloc(sizeof(TestQListElement));
+     elem = g_new(TestQListElement, 1);
      elem->id = 0x13;
      QLIST_INSERT_HEAD(&c->list, elem, next);
 
@@ -1345,11 +1345,11 @@ static void manipulate_container(TestQListContainer *c)
         iter = QLIST_NEXT(iter, next);
      }
 
-     elem = g_malloc(sizeof(TestQListElement));
+     elem = g_new(TestQListElement, 1);
      elem->id = 0x14;
      QLIST_INSERT_BEFORE(prev, elem, next);
 
-     elem = g_malloc(sizeof(TestQListElement));
+     elem = g_new(TestQListElement, 1);
      elem->id = 0x15;
      QLIST_INSERT_AFTER(prev, elem, next);
 
@@ -1370,7 +1370,7 @@ static void test_load_qlist(void)
 {
     QEMUFile *fsave, *fload;
     TestQListContainer *orig_container = alloc_container();
-    TestQListContainer *dest_container = g_malloc0(sizeof(TestQListContainer));
+    TestQListContainer *dest_container = g_new0(TestQListContainer, 1);
     char eof;
 
     QLIST_INIT(&dest_container->list);
diff --git a/ui/vnc-enc-tight.c b/ui/vnc-enc-tight.c
index cebd35841a..7b86a4713d 100644
--- a/ui/vnc-enc-tight.c
+++ b/ui/vnc-enc-tight.c
@@ -1477,7 +1477,7 @@ static int send_sub_rect(VncState *vs, int x, int y, int w, int h)
 #endif
 
     if (!color_count_palette) {
-        color_count_palette = g_malloc(sizeof(VncPalette));
+        color_count_palette = g_new(VncPalette, 1);
         vnc_tight_cleanup_notifier.notify = vnc_tight_cleanup;
         qemu_thread_atexit_add(&vnc_tight_cleanup_notifier);
     }
diff --git a/util/envlist.c b/util/envlist.c
index 2bcc13f094..ab5553498a 100644
--- a/util/envlist.c
+++ b/util/envlist.c
@@ -217,7 +217,7 @@ envlist_to_environ(const envlist_t *envlist, size_t *count)
 	struct envlist_entry *entry;
 	char **env, **penv;
 
-	penv = env = g_malloc((envlist->el_count + 1) * sizeof(char *));
+	penv = env = g_new(char *, envlist->el_count + 1);
 
 	for (entry = envlist->el_entries.lh_first; entry != NULL;
 	    entry = entry->ev_link.le_next) {
diff --git a/util/hbitmap.c b/util/hbitmap.c
index dd0501d9a7..ea989e1f0e 100644
--- a/util/hbitmap.c
+++ b/util/hbitmap.c
@@ -862,7 +862,7 @@ void hbitmap_truncate(HBitmap *hb, uint64_t size)
         }
         old = hb->sizes[i];
         hb->sizes[i] = size;
-        hb->levels[i] = g_realloc(hb->levels[i], size * sizeof(unsigned long));
+        hb->levels[i] = g_renew(unsigned long, hb->levels[i], size);
         if (!shrink) {
             memset(&hb->levels[i][old], 0x00,
                    (size - old) * sizeof(*hb->levels[i]));
diff --git a/util/main-loop.c b/util/main-loop.c
index 4d5a5b9943..b7b0ce4ca0 100644
--- a/util/main-loop.c
+++ b/util/main-loop.c
@@ -273,7 +273,7 @@ static PollingEntry *first_polling_entry;
 int qemu_add_polling_cb(PollingFunc *func, void *opaque)
 {
     PollingEntry **ppe, *pe;
-    pe = g_malloc0(sizeof(PollingEntry));
+    pe = g_new0(PollingEntry, 1);
     pe->func = func;
     pe->opaque = opaque;
     for(ppe = &first_polling_entry; *ppe != NULL; ppe = &(*ppe)->next);
diff --git a/util/qemu-timer.c b/util/qemu-timer.c
index f36c75e594..a670a57881 100644
--- a/util/qemu-timer.c
+++ b/util/qemu-timer.c
@@ -100,7 +100,7 @@ QEMUTimerList *timerlist_new(QEMUClockType type,
     QEMUTimerList *timer_list;
     QEMUClock *clock = qemu_clock_ptr(type);
 
-    timer_list = g_malloc0(sizeof(QEMUTimerList));
+    timer_list = g_new0(QEMUTimerList, 1);
     qemu_event_init(&timer_list->timers_done_ev, true);
     timer_list->clock = clock;
     timer_list->notify_cb = cb;
diff --git a/util/vfio-helpers.c b/util/vfio-helpers.c
index 00a80431a0..b037d5faa5 100644
--- a/util/vfio-helpers.c
+++ b/util/vfio-helpers.c
@@ -279,8 +279,8 @@ static void collect_usable_iova_ranges(QEMUVFIOState *s, void *buf)
     s->nb_iova_ranges = cap_iova_range->nr_iovas;
     if (s->nb_iova_ranges > 1) {
         s->usable_iova_ranges =
-            g_realloc(s->usable_iova_ranges,
-                      s->nb_iova_ranges * sizeof(struct IOVARange));
+            g_renew(struct IOVARange, s->usable_iova_ranges,
+                    s->nb_iova_ranges);
     }
 
     for (i = 0; i < s->nb_iova_ranges; i++) {
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 14:43:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 14:43:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290861.493435 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU8Ot-0001Dp-Fu; Tue, 15 Mar 2022 14:43:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290861.493435; Tue, 15 Mar 2022 14:43:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU8Ot-0001Di-D2; Tue, 15 Mar 2022 14:43:51 +0000
Received: by outflank-mailman (input) for mailman id 290861;
 Tue, 15 Mar 2022 14:43:50 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=1u5x=T2=redhat.com=armbru@srs-se1.protection.inumbo.net>)
 id 1nU8Os-0001DW-AR
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 14:43:50 +0000
Received: from us-smtp-delivery-124.mimecast.com
 (us-smtp-delivery-124.mimecast.com [170.10.133.124])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 52cc8dea-a46e-11ec-853b-5f4723681683;
 Tue, 15 Mar 2022 15:43:49 +0100 (CET)
Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com
 [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS
 (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 us-mta-552-6t54DpkdO-mMtdvZzz0Pxg-1; Tue, 15 Mar 2022 10:43:45 -0400
Received: from smtp.corp.redhat.com (int-mx09.intmail.prod.int.rdu2.redhat.com
 [10.11.54.9])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 9DFC6811E76;
 Tue, 15 Mar 2022 14:43:42 +0000 (UTC)
Received: from blackfin.pond.sub.org (unknown [10.36.112.3])
 by smtp.corp.redhat.com (Postfix) with ESMTPS id 4A695555C90;
 Tue, 15 Mar 2022 14:43:42 +0000 (UTC)
Received: by blackfin.pond.sub.org (Postfix, from userid 1000)
 id 417E921E66D4; Tue, 15 Mar 2022 15:43:41 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 52cc8dea-a46e-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
	s=mimecast20190719; t=1647355428;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=H3Y1eIuJE5MHxgIwEc5Fk8JyYg2+dU4dKOkAeXX524I=;
	b=S548N/LDeQqTJ6yJISHbwJWzNRUEks7RQqM0SHpT+623Z7e4o6j0MHT/qzub1X/hvSR/pT
	wPv89Gf5vhQyCGtMb7n5TT1x8WxVNOeZMVKESOTX+vCl3hovuAHQxLxv30amuRbJM+Ks1E
	nOIFSMEj/0fVtU5YTY5B8nsJmZevnt8=
X-MC-Unique: 6t54DpkdO-mMtdvZzz0Pxg-1
From: Markus Armbruster <armbru@redhat.com>
To: Philippe =?utf-8?Q?Mathieu-Daud=C3=A9?=
 <philippe.mathieu.daude@gmail.com>
Cc: Alex =?utf-8?Q?Benn=C3=A9e?= <alex.bennee@linaro.org>,
  qemu-devel@nongnu.org,  Paolo
 Bonzini <pbonzini@redhat.com>,  Richard Henderson
 <richard.henderson@linaro.org>,  Gerd Hoffmann <kraxel@redhat.com>,
  Christian Schoenebeck <qemu_oss@crudebyte.com>,  "Gonglei (Arei)"
 <arei.gonglei@huawei.com>,  =?utf-8?Q?Marc-Andr=C3=A9?= Lureau
 <marcandre.lureau@redhat.com>,  "Michael S. Tsirkin" <mst@redhat.com>,
  Igor Mammedov <imammedo@redhat.com>,  Ani Sinha <ani@anisinha.ca>,
  Laurent Vivier <lvivier@redhat.com>,  Amit Shah <amit@kernel.org>,  Peter
 Maydell <peter.maydell@linaro.org>,  Stefano Stabellini
 <sstabellini@kernel.org>,  Anthony Perard <anthony.perard@citrix.com>,
  Paul Durrant <paul@xen.org>,  =?utf-8?Q?Herv=C3=A9?= Poussineau
 <hpoussin@reactos.org>,
  Aleksandar Rikalo <aleksandar.rikalo@syrmia.com>,  Corey Minyard
 <cminyard@mvista.com>,  Patrick Venture <venture@google.com>,  Eduardo
 Habkost <eduardo@habkost.net>,  Marcel Apfelbaum
 <marcel.apfelbaum@gmail.com>,  Peter Xu <peterx@redhat.com>,  Jason Wang
 <jasowang@redhat.com>,  =?utf-8?Q?C=C3=A9dric?= Le Goater <clg@kaod.org>,
  Daniel Henrique
 Barboza <danielhb413@gmail.com>,  David Gibson
 <david@gibson.dropbear.id.au>,  Greg Kurz <groug@kaod.org>,  Philippe
 =?utf-8?Q?Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,  Jean-Christophe Dubois
 <jcd@tribudubois.net>,  Keith Busch <kbusch@kernel.org>,  Klaus Jensen
 <its@irrelevant.dk>,  Yuval Shaia <yuval.shaia.ml@gmail.com>,  Yoshinori
 Sato <ysato@users.sourceforge.jp>,  Magnus Damm <magnus.damm@gmail.com>,
  Fabien Chouteau <chouteau@adacore.com>,  KONRAD Frederic
 <frederic.konrad@adacore.com>,  Mark Cave-Ayland
 <mark.cave-ayland@ilande.co.uk>,  Artyom Tarasenko <atar4qemu@gmail.com>,
  Alex Williamson <alex.williamson@redhat.com>,  Eric Auger
 <eric.auger@redhat.com>,  Max Filippov <jcmvbkbc@gmail.com>,  Juan
 Quintela <quintela@redhat.com>,  "Dr. David Alan Gilbert"
 <dgilbert@redhat.com>,  Konstantin Kostiuk <kkostiuk@redhat.com>,  Michael
 Roth <michael.roth@amd.com>,  Daniel P. =?utf-8?Q?Berrang=C3=A9?=
 <berrange@redhat.com>,
  Pavel Dovgalyuk <pavel.dovgaluk@ispras.ru>,  David Hildenbrand
 <david@redhat.com>,  Wenchao Wang <wenchao.wang@intel.com>,  Colin Xu
 <colin.xu@intel.com>,  Kamil Rytarowski <kamil@netbsd.org>,  Reinoud
 Zandijk <reinoud@netbsd.org>,  Sunil Muthuswamy <sunilmut@microsoft.com>,
  Cornelia Huck <cohuck@redhat.com>,  Thomas Huth <thuth@redhat.com>,  Eric
 Blake <eblake@redhat.com>,  Vladimir Sementsov-Ogievskiy
 <vsementsov@virtuozzo.com>,  John Snow <jsnow@redhat.com>,
  kvm@vger.kernel.org,  qemu-arm@nongnu.org,
  xen-devel@lists.xenproject.org,  qemu-ppc@nongnu.org,
  qemu-block@nongnu.org,  haxm-team@intel.com,  qemu-s390x@nongnu.org
Subject: Re: [PATCH 3/3] Use g_new() & friends where that makes obvious sense
References: <20220314160108.1440470-1-armbru@redhat.com>
	<20220314160108.1440470-4-armbru@redhat.com>
	<87y21c401e.fsf@linaro.org> <875yofl3k3.fsf@pond.sub.org>
	<02307072-4bff-dbbb-67fb-ca9800c34b3c@gmail.com>
Date: Tue, 15 Mar 2022 15:43:41 +0100
In-Reply-To: <02307072-4bff-dbbb-67fb-ca9800c34b3c@gmail.com> ("Philippe
	=?utf-8?Q?Mathieu-Daud=C3=A9=22's?= message of "Tue, 15 Mar 2022 15:07:36
 +0100")
Message-ID: <875yofjmxu.fsf@pond.sub.org>
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.2 (gnu/linux)
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.85 on 10.11.54.9
Authentication-Results: relay.mimecast.com;
	auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=armbru@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Philippe Mathieu-Daud=C3=A9 <philippe.mathieu.daude@gmail.com> writes:

> On 15/3/22 14:59, Markus Armbruster wrote:
>> Alex Benn=C3=A9e <alex.bennee@linaro.org> writes:
>>=20
>>> Markus Armbruster <armbru@redhat.com> writes:
>>>
>>>> g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
>>>> for two reasons.  One, it catches multiplication overflowing size_t.
>>>> Two, it returns T * rather than void *, which lets the compiler catch
>>>> more type errors.
>>>>
>>> <snip>
>>>> diff --git a/semihosting/config.c b/semihosting/config.c
>>>> index 137171b717..6d48ec9566 100644
>>>> --- a/semihosting/config.c
>>>> +++ b/semihosting/config.c
>>>> @@ -98,7 +98,7 @@ static int add_semihosting_arg(void *opaque,
>>>>       if (strcmp(name, "arg") =3D=3D 0) {
>>>>           s->argc++;
>>>>           /* one extra element as g_strjoinv() expects NULL-terminated=
 array */
>>>> -        s->argv =3D g_realloc(s->argv, (s->argc + 1) * sizeof(void *)=
);
>>>> +        s->argv =3D g_renew(void *, s->argv, s->argc + 1);
>>>
>>> This did indeed break CI because s->argv is an array of *char:
>>>
>>> ../semihosting/config.c:101:17: error: assignment to =E2=80=98const cha=
r **=E2=80=99 from incompatible pointer type =E2=80=98void **=E2=80=99 [-We=
rror=3Dincompatible-pointer-types]
>>>    101 |         s->argv =3D g_renew(void *, s->argv, s->argc + 1);
>>>        |                 ^
>>> cc1: all warnings being treated as errors
>>>
>>> So it did the job of type checking but failed to build ;-)
>>
>> You found a hole in my compile testing, thanks!
>>
>> I got confused about the configuration of my build trees.  Catching such
>> mistakes is what CI is for :)
>
> FYI Alex fixed this here:
> https://lore.kernel.org/qemu-devel/20220315121251.2280317-8-alex.bennee@l=
inaro.org/
>
> So your series could go on top (modulo the Coverity change).

I dropped this hunk in v2.

Whether my v2 or Alex's series goes in first doesn't matter.



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 14:58:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 14:58:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290864.493447 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU8cY-0002qI-Om; Tue, 15 Mar 2022 14:57:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290864.493447; Tue, 15 Mar 2022 14:57:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU8cY-0002qB-KV; Tue, 15 Mar 2022 14:57:58 +0000
Received: by outflank-mailman (input) for mailman id 290864;
 Tue, 15 Mar 2022 14:57:57 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fAQZ=T2=citrix.com=prvs=0668da279=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nU8cX-0002q5-8L
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 14:57:57 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4aea0d29-a470-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 15:57:55 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4aea0d29-a470-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647356275;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=qIlSUsFjHCq0QIbHY9K1bZ/RzTm0z0GJXOrnw2tOaCM=;
  b=e2WWBlK2RC2JOJF4loFkylINXfcubtVvaZLwHEp6EsnQ305ya6qo+FL4
   6Wjdek/FakF/dJ13XsfpfF5/YRt/9jevFb+HOY1o6q6uyCJggzDHetoyY
   OZGAUS5VYVjoe0PAJK/TuaLcgZ1uOCYjz/r5MFtpGT22ozPsaQeUTwbqV
   A=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66690182
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:ongI8aMkTBvLOHLvrR2yl8FynXyQoLVcMsEvi/4bfWQNrUok3zwGz
 mUdDD2FPq6OYWShf9FzatnnpEpQvJ7WmtNrGwto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi29Mw2rBVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Z5
 +dKhIS6VgMVP7zdycMPXzkIKQ1hIvgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALNs7kMZlZonh95TrYEewnUdbIRKCiCdpwgmlu15gXTay2i
 8wxdCJ1NQb5WRpzYA0eNrtitd7xqkvBSmgNwL6SjfVuuDWCpOBr65DyNPLFd9rMQt9a9m6Iq
 2SD82nnDxUyMN2E1SHD4n+qnvXIny7wRMQVDrLQ3vxgjUCXx2cTIAYLTlb9qv684nNSQPoGd
 RZSoHB36/Fvqgr7FbERQiFUvlarjBktQ9BPF9E7+RDc7bjYw1ajKncbG2sphMMdiOc6Qjkj1
 1msltzvBCByvLD9dU9x5ot4vhvpZ3FLcDZqiTssCFJcvoK9+N1bYgfnFI4LLUKjsjHi9dgcK
 RiupTN2ubgchNVjO06TrQGe2GLESnQko2cICuTrsoCNs1sRiG2NPdXABb3nARBod97xor6p5
 iRspiRmxLpSZaxhbQTUKAn3IJmn5uyeLBrXikN1Ep8q+lyFoiD/ItoBumgkdB4zaK7onAMFh
 meI4Gu9A7cJYBOXgVJfOdrtW6zGM4C9fTgaahwkRoUXOcUgHON21CpveVSRzwjQfLsEyskC1
 WOgWZ/0Vx4yUP0/pBLvHrt1+eJ7l0gWmDKILbimnkvP7FZrTCPMIVvzGADVNb5RAWLtiFi9z
 uuzwOPRkkQBCrKiOneLmWPRRHhTRUUG6VnNg5U/XsaIIxZ8GXFnDPnUwLg7fJdikbgTneDNl
 kxRkGcCoLYjrRUr8Tm3V00=
IronPort-HdrOrdr: A9a23:vfXOdKqe4ITAPo0z4xIGtc8aV5vPL9V00zEX/kB9WHVpm5Oj+f
 xGzc516farslossREb+expOMG7MBXhHLpOkPQs1NCZLXXbUQqTXftfBO7ZogEIdBeOk9K1uZ
 0QF5SWTeeAcmSS7vyKkDVQcexQuOVvmZrA7Yy1ogYPPGNXguNbnnxE426gYzxLrWJ9dOME/f
 Snl616T23KQwVoUi33PAhPY8Hz4/nw0L72ax8PABAqrCGIkDOT8bb/VzyVxA0XXT9jyaortT
 GtqX212oyT99WAjjPM3W7a6Jpb3PPn19t4HcSJzuwYMC/lhAqEbJloH5eCoDc2iuey70tCqq
 iHnz4Qe+BIr1/BdGC8phXgnyHmzTYV8nfnjWSVhHPyyPaJMg4SOo5kv8Z0YxHZ400vsJVXy6
 RQxV+UsJJREFfpgDn9z8KgbWAlqmOE5V4Z1cIDhX1WVoUTLJVLq5YEwU9TGJAcWArn9YEcFv
 V0Bs203ocYTbqjVQGYgoBT+q3uYpxqdS32AHTq+/blnwS+pUoJjnfxn6ck7zI9HJFUcegy2w
 2LCNUtqFh0dL5lUUtMPpZzfSKJMB25ffvtChPaHb21LtBOB5ryw6SHlIndotvaP6A18A==
X-IronPort-AV: E=Sophos;i="5.90,183,1643691600"; 
   d="scan'208";a="66690182"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=VotHjPFkgWSphSgvdFetkIQj7fpSpAU3DP+abwmiYl8MRi1ZbnKJo9UvS+xt6seWjbqGcZ9sBxV91iDHFD14zJG764FKmn7YrdF9g3QF4HMTmJF8GnMqmEH39WcjUxir8AIL2tMUKpzABNAmEB2xketWlViNR7IRg9cTQnnDfMW2dI6uCmIgn1NtT7f3seWTLu7piSvtxF3KMZEZc4IObCnil91hv1mwWdKqWW+keWwVm6boJM3I+PKC0ypnPUZ0U03stYhxSIPiOVVt6Z21LMc/z4vgs6DjKaM2nNqHxBm/dsCCyxwpVY36MOqw1BcvAnFQEfNBqBNRFj7TIB9Rrw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=YNSnrKjl/m+Pog4sW9a2Tkjw856be0UitwDrlge7P00=;
 b=c22FixoDa3U8/LMLemFxQsYEp4ubXk/iDnTzolG/xIKQq9gf35S1ijMsfJD0cQMcRmT1/4pq/sATM5YBM54et2acOTfJGujVTIlJq7auONNsgg1gqTHhIlt/l6VTttZpgSVIYwognftbMtqJcmXFoPHYciBA4Lo8qFWBl++5HRszutQ+to2XGk/QwMN4JMQWi6Afo9sm9Ldq8VuMbBBQ4Tx447ls+YxJWqOXYnzcTYynKijGigrxn83gIJ01S/SIr6tQZOSwopdMmWfI0QQM0RRjDlCvkjB2rhS0+5df1J7GaX401JSgCPAQGvA+CS+2LGjczH8+577vBtjPLY0wpQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=YNSnrKjl/m+Pog4sW9a2Tkjw856be0UitwDrlge7P00=;
 b=CNKhlE3j9NRBVqUnPM8v1FcyA/R22ERp0PVDZAFVS1qWLh4CLob8zKLmT+ooPI4chhh46SvHuYkBS9K3kGdissoKweY+Q8ClDvq8BKkk1dnbl1X7dg99ojaf2IsAcaCsrKb4dgXxWUzrukv+pHxMXlUZbS8pck2doA46lPEKAAI=
Date: Tue, 15 Mar 2022 15:57:44 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH v3 2/4] x86/APIC: calibrate against platform timer when
 possible
Message-ID: <YjCpaGhm7OjXFraY@Air-de-Roger>
References: <35cb3c72-05ba-24c7-1fdd-3ee1aced3aec@suse.com>
 <cb7dd6bc-79a4-2137-5e82-805b9daf5d58@suse.com>
 <YitSc/Ky6PJb5ndV@Air-de-Roger>
 <d6bcee5b-abbd-5cef-f174-8609df94603e@suse.com>
 <YjBYk+xJMh1I6nrM@Air-de-Roger>
 <cd5c9fe4-6065-9c22-1a39-c9a5a77ea01d@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <cd5c9fe4-6065-9c22-1a39-c9a5a77ea01d@suse.com>
X-ClientProxiedBy: LO2P265CA0140.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:9f::32) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 84cace53-46e6-4c64-15a0-08da06942c81
X-MS-TrafficTypeDiagnostic: CO2PR03MB2341:EE_
X-Microsoft-Antispam-PRVS: <CO2PR03MB234103E2D3959004AEA15D078F109@CO2PR03MB2341.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(6512007)(9686003)(5660300002)(2906002)(83380400001)(85182001)(33716001)(6666004)(66556008)(82960400001)(26005)(186003)(8676002)(8936002)(66476007)(4326008)(38100700002)(66946007)(53546011)(86362001)(6506007)(316002)(54906003)(6486002)(6916009)(508600001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?Z25iUTFlU3Q0MDUyNmNrcUtsYWN4cnBsNU5Ub1VqMmpOK2Y2TFl3VHlINHZ0?=
 =?utf-8?B?R2JobVFDcHo1QW5HK2dNR0NFOC84aCtlYkgvNEZSb3R1WEJJVXhiN3NHUnF5?=
 =?utf-8?B?NGZJUFdEbFRVVEZxcmppLzh5TEtDamYyZGdEazVwODhKQk45NlRSVXp0c1Vj?=
 =?utf-8?B?RkM0dWtoc0k0cm1GazZvZ2ZnTlRkNzVhbm9nZ0VEM3pWK0UvM1JGeTlLWmJ2?=
 =?utf-8?B?ZE9jMkNUTGlQbVFIb25lUnJ3dFlRL25DZGwvN1dQaW9TRlB4cWUzaFd6ZE1N?=
 =?utf-8?B?ZEtsWlNkcDAwa3NESXN1UnlsRmluVWM3ODJ5eXdQT2F4NWhkVWJpWnc3SE9C?=
 =?utf-8?B?R0R2TGxGbWwvTTZhcWFNMlIvUk02dUJVaFY3T1B5a1g4Z0p3cVRoUW9lYWhy?=
 =?utf-8?B?ZDQ0cG5CUEhBaVY5UGNCTys2TjFaZnhXRHVrcGhZbG84WVJTUDZqTGxEdlZR?=
 =?utf-8?B?N2x5V3ZhOG00cWZKbHRDd1pqdkpjdkhWSmljQTdwVkNBNU1OZVJDbUZGM1N0?=
 =?utf-8?B?U0d6QithZjJFMHcvUXVxTlg5YzQzZDlzanY3T04vN1hjTlVCZWR2UE5VUEZp?=
 =?utf-8?B?eXYvR2tzdFhVZVRwNG84QWNoS2dEaHFSUmVDbWxQbTFuc21QbGNEYU53MURz?=
 =?utf-8?B?K1B1QTByV21hUmtkRng3S050SGxqWXRFNmVXUGJFV3Z1d0RVZDEvczVFTXlo?=
 =?utf-8?B?U1FDcGxmMmNwNzJ2R1JCYUZVcGM4YnNoMy84MGo3VEFjS2Jva1U1UG0yUUU1?=
 =?utf-8?B?TkZYZ29jYUZWU2dqYlFzeHdJVmNWS1JjbWtKY09JRU1IRFg1cXMyeGVPRlho?=
 =?utf-8?B?M3lINHZpU1I3USt4dXFYb3BqSEE2ZFA0Y21uWGdsOTdCMit0RFYrV0o0cGlh?=
 =?utf-8?B?YUNwT1R2NVVxZFZXRDdEb2VOUENjMVBRRWtZYnltTXlYSVV5Nkl2ZDdidlY2?=
 =?utf-8?B?THl1NE9hQ0NZT3cwT3pkbUNNcHBOcllieWF4aWFSb2xtb0k2NTFYV1JiSWt4?=
 =?utf-8?B?OFZTNTVLSDZPWVZ4V0JOSmlyUmE3Wi8xSTB1VUtrZ3dkVEsvdXJjbzEyY2pr?=
 =?utf-8?B?ZTRhMVBRYWxBS2VQODc2ci83bmtRTTVpL09HTGQ4SnMyOFIzdmI5WGxuVXpI?=
 =?utf-8?B?VU44RVBaSjR4VkVObFJ0dVBlejhJYWF0Sis1TzIvVTNmeHFlbXJpM1EwZ3dN?=
 =?utf-8?B?SVFSY0lHZENhWVZYdlpTSlNKaUpOTEVraXNkcFpBNnV1bXFnVk53MUFpNG5P?=
 =?utf-8?B?bkpIeWNBVG1PblZmR1UveUkvZmZnRTl1RzhmcnhSaFFhajl5TzIvV01zMC92?=
 =?utf-8?B?R0p3NXpOdEJIb0FjdDBsemFyZ1pBck5lVm9ocmNvVnNkRkNUTDNZZStDUDhu?=
 =?utf-8?B?ZklXRmtTMWQvdFlqYnppMVBzUmtXSDA4elh5Q2hQZXZCL1hxaHJpVHErWDJ5?=
 =?utf-8?B?K1U4aDdadXlSMnB5a3VQVmltaDcvOWZqZ01QMVovT2RIZlNGa2JaaTdTOTFP?=
 =?utf-8?B?SldVRlEyV0xwc2tBb0ltL1gzcnpkbTZBcDRkNnVnbnFZT2oxYlcvUWFBbE5l?=
 =?utf-8?B?Zk9qbHZBelBtUEVuSkNuK2pEclJEUHFpMUluWHlQWnhROVArQjJrbGVyS3Zm?=
 =?utf-8?B?N2ZyYlBkTVJvL1I2VVhQK1JBcHR6bFVvNXFzaDVMbTY0bkY0aGs3aHFYMlMr?=
 =?utf-8?B?YkxEU3FhZ3JBMTg1b0FWWGJ3dU15RmNKWDl0REVxYUsxR1EyZERCYTJzd0ky?=
 =?utf-8?B?QTFiRFN4eS9yU3lnQUpCb2lIQVYzZDN2QkYyck9hT2xWT3RkT05hb0N1b0Rj?=
 =?utf-8?B?SC9HK1U0Zmp5NkV0a0d4amhMa01zL1dzcGZncWdob0kyckY2RE9XbmZOU1hq?=
 =?utf-8?B?eGZqRzFWcDg0OWxNVmVTeHphSXlrZ0lkc1FwZmlHeXFianVnZG40eHh5QXJq?=
 =?utf-8?B?OHhnYmJJeWxxQVJqTGxnaHVNcjFiUjY1dWZkTzBxaFFiS0RTT2NuT010dzY1?=
 =?utf-8?B?QnhHWk5KaDVRPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 84cace53-46e6-4c64-15a0-08da06942c81
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Mar 2022 14:57:49.9961
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: YaKc0QPBqHBgKdE4nP0mFALf30gbMnbrexPgF7A0xLY9cF/vPu8Cw7TD13+dZyqZLzhJMxNFOWrIJsDEQenWCA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO2PR03MB2341
X-OriginatorOrg: citrix.com

On Tue, Mar 15, 2022 at 11:39:29AM +0100, Jan Beulich wrote:
> On 15.03.2022 10:12, Roger Pau Monné wrote:
> > On Mon, Mar 14, 2022 at 05:19:37PM +0100, Jan Beulich wrote:
> >> One thing seems quite clear though: Doing any of this with interrupts
> >> enabled increases the chances for the read pairs to not properly
> >> correlate, due to an interrupt happening in the middle. This alone is
> >> a reason for me to want to keep IRQs off here.
> > 
> > Right, TSC calibration is also done with interrupts disabled, so it
> > does seem correct to do the same here for APIC.
> > 
> > Maybe it would be cleaner to hide the specific PIT logic in
> > calibrate_apic_timer() so that we could remove get_8254_timer_count()
> > and wait_8254_wraparound() from apic.c and apic.c doesn't have any PIT
> > specific code anymore?
> 
> Yes, that's certainly a further cleanup step to take (saying this
> without actually having tried, so there may be obstacles).

OK, I think you are planning to post a new version of this to avoid
open-coding apic_read() in read_tmcct()?

TBH the PIT calibration done in calibrate_APIC_clock seems fairly
bogus, as it's possible the counter wraps around more than once
between calls when running virtualized. Maybe reprogramming channel 2
would be better, as then at least wrap around would be detected
(albeit it's unclear how much delta we would have between the counter
reaching 0 and Xen realizing).

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 15:03:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 15:03:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290867.493458 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU8i9-0004G5-CJ; Tue, 15 Mar 2022 15:03:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290867.493458; Tue, 15 Mar 2022 15:03:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU8i9-0004Fy-8y; Tue, 15 Mar 2022 15:03:45 +0000
Received: by outflank-mailman (input) for mailman id 290867;
 Tue, 15 Mar 2022 15:03:44 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU8i8-0004Fo-N5; Tue, 15 Mar 2022 15:03:44 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU8i8-0005iK-LS; Tue, 15 Mar 2022 15:03:44 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU8i8-0002J2-7c; Tue, 15 Mar 2022 15:03:44 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nU8i8-0005U8-77; Tue, 15 Mar 2022 15:03:44 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=/gqU2H0/onu8N+R6i61ZejaN2MO2HxnmdbUVIjkY3KU=; b=sgFNlko5vplLyVbz8XKUTdIyY+
	kvr6DSbI8xwiVWQ5M8i+IKRudBVl855KwZH5Az2pZsuUQc5g/a7UIrJVzSVxK9e7DG10BnxKMHRPJ
	4HqYhSYf1adWQTv2EQuhMrrVXlOREvK/mdKAdu0HO6Ei8GrdE5VgYGgYgMmzzjxMWU1E=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168613-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168613: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=c7a80bc50ac768b4eecaad85b77ae45790c93c73
X-Osstest-Versions-That:
    xen=07aebcd55fd2f7997e9fe50a6c849c8a12ec2e68
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 15 Mar 2022 15:03:44 +0000

flight 168613 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168613/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  c7a80bc50ac768b4eecaad85b77ae45790c93c73
baseline version:
 xen                  07aebcd55fd2f7997e9fe50a6c849c8a12ec2e68

Last test of basis   168607  2022-03-15 03:02:22 Z    0 days
Testing same since   168613  2022-03-15 12:01:42 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Jan Beulich <jbeulich@suse.com>
  Julien Grall <jgrall@amazon.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   07aebcd55f..c7a80bc50a  c7a80bc50ac768b4eecaad85b77ae45790c93c73 -> smoke


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 15:21:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 15:21:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290875.493472 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU8zd-0006eJ-0D; Tue, 15 Mar 2022 15:21:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290875.493472; Tue, 15 Mar 2022 15:21:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU8zc-0006eC-S5; Tue, 15 Mar 2022 15:21:48 +0000
Received: by outflank-mailman (input) for mailman id 290875;
 Tue, 15 Mar 2022 15:21:48 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU8zc-0006e2-1U; Tue, 15 Mar 2022 15:21:48 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU8zb-00060p-Us; Tue, 15 Mar 2022 15:21:47 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nU8zb-0003ip-82; Tue, 15 Mar 2022 15:21:47 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nU8zb-0005YI-7b; Tue, 15 Mar 2022 15:21:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=xxhv9Rh1V4sSrhSIo7/Jcw+KwrAU53GxjE2OBxytoOo=; b=sjkWqulJjOxAMMuAF5HgUSydNC
	8+1G5RFqmpaUcB5iL4KFM8MPTF25njAkyWlB2/byO+qpe3ZFbhTs+Dl6yRnOPGN7Gc3eHV+1/ExUv
	yjDDXQxJxd3jE3QnBO7Nv+Qhn0CoV/omEicnE0a8Xe1vefy0TtoIuobBR0EO7IsgKiKY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168616-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168616: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=a13dfc769bd7097d8d9ffe3e029a2c1d062d712b
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 15 Mar 2022 15:21:47 +0000

flight 168616 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168616/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 a13dfc769bd7097d8d9ffe3e029a2c1d062d712b
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   15 days
Failing since        168258  2022-03-01 01:55:31 Z   14 days  141 attempts
Testing same since   168579  2022-03-14 08:41:36 Z    1 days   12 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 629 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 15:41:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 15:41:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290886.493483 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU9IX-0000iS-R8; Tue, 15 Mar 2022 15:41:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290886.493483; Tue, 15 Mar 2022 15:41:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU9IX-0000iL-OD; Tue, 15 Mar 2022 15:41:21 +0000
Received: by outflank-mailman (input) for mailman id 290886;
 Tue, 15 Mar 2022 15:41:20 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fAQZ=T2=citrix.com=prvs=0668da279=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nU9IV-0000iF-SL
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 15:41:20 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 59cee5b6-a476-11ec-853b-5f4723681683;
 Tue, 15 Mar 2022 16:41:17 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 59cee5b6-a476-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647358878;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=xMiR+WXhgBAnfOEaJmGFhhQFyqGX3QlQhKpL6tr9GJc=;
  b=BZUcSCFpo0y1M8CPVO6RaLSDSbY61DKL1StT3v7OcLxjBgOiOxvv5w3C
   t/khXSVdTLTujilqX1uH4to3qg5ElTkxyYJsPnOlVuNbZq5YiOBhojdb4
   8+CjcrIs17Nyl5wuyxJkXw6vOyPlIY9IeQc7HqmmmC4Y4g/ae6yPmbAlf
   g=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 68659485
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:pIqJCq/S7oM4yJ7C2rFZDrUDmH6TJUtcMsCJ2f8bNWPcYEJGY0x3z
 jZOWG/TPanYZTPzL9F3PIq2/UIP7ZOAmNJrSAo/rys8E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oHkW1jlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnY2LQywgO5/tovYMXAtBEwBcEo1s+paSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFJkYtXx6iynQEN4tQIzZQrWM7thdtNs1rp4eQ6uPO
 5pEAdZpRCnDRBFxOn01Mcw3rsyGinrfTD5m9E3A8MLb5ECMlVcsgdABKuH9dtuHT8hRtk+dr
 3DB+SL1D3kyN9uZ0zOJtG2tguznmjnyU4YfUra/85ZCkFCVg2AeFhASfV+6uuWizF6zXcpFL
 E4Z8TZoqrI9nHFHVfGkAUf++iTd+EdBBZwASIXW9T1h1ILF2AyyD202bwRTedM0rc8XZxMK/
 F2gyoaB6SNUjJWZTneU97GxpDy0ODQIIWJqWRLoXTfp8PG4/tht00unosJLVffs04arQW2YL
 yWi9nBWulkFsSIcO0xXF3jjiinkmJXGRxVdCu7/DjP8tVMRiGJIiuWVBbnnARRocd7xorqp5
 iFsdy2iAAYmVsnleMulGrllIV1Rz6zZWAAweHY2d3Xbyxyj+mS4Yadb6yxkKUFiP64sIGG1P
 xWC41oLtMYJZhNGiJObharqUqzGKoC6SbzYug38NIISMvCdiifalM2RWaJg9z+0yxV9+U3OE
 ZyabdytHR4n5VdPl1KLqxMm+eZznEgWnDqLLbiilkjP+efONRa9FOZeWHPTP79R0U9xiFiMm
 zqpH5DRkEs3vSyXSnS/zLP/2nhRdCllX8+q85ILHgNBSyI/cFwc5zbq6epJU6RunrhPl/eO+
 Xe4W0RCz0H4i2GBIgKPAk2PopuzNXqjhRrX5RARAGs=
IronPort-HdrOrdr: A9a23:RgwTaavWy0RJcJE02meFyN5c7skCmIMji2hC6mlwRA09TyXGra
 6TdaUguiMc1gx8ZJhBo7C90KnpewK7yXdQ2/htAV7CZnidhILMFuBfBOTZsljd8kHFh4pgPO
 JbAtRD4b7LfClHZKTBkXGF+r8bqbHtms3Y5pa9854ud3AQV0gJ1XYGNu/xKDwOeOApP+tfKH
 LKjfA32AZINE5nJviTNz0gZazuttfLnJXpbVovAAMm0hCHiXeN5KThGxaV8x8CW3cXqI1Su1
 Ttokjc3OGOovu7whjT2yv66IlXosLozp9mCNaXgsYYBz3wgkKDZZhnWZeFoDcpydvfo2oCoZ
 3pmVMNLs5z43TeciWcpgbs4RDp1HIU53rr2Taj8AzeiP28YAh/J9tKhIpffBecwVEnpstA3K
 VC2H/cn4ZLDDvb9R6NqOTgZlVPrA6ZsHAimekcgzh0So0FcoJcqoQZ4Qd8DIoAJiTn84oqed
 MeQP003MwmMG9yUkqp/lWGmLeXLzcO91a9MwU/U/WuonZrdCsT9Tpb+CQd9k1wgK7VBaM0ot
 gsCZ4Y542mfvVmHZ6VO91xM/dfKla9Ny4kY1jiaGgOKsk8SgfwQtjMkfEI2N0=
X-IronPort-AV: E=Sophos;i="5.90,184,1643691600"; 
   d="scan'208";a="68659485"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=jhnLw5vDJml3adG7mIMFxdFbGwcf88l81y/vAwReiKzAiMmLPI8ETUM0K85NAllx0W6yfZr5V2t0evV4yv5IK1NVUZwfPSt5tjcawF0WlJ52KnN8Yq6DraQ83fWtUbTAF7R4GyHa/PzcMXAZ7AvNTp2DDgu5+rhh9gUtLjCD1M2Vlg/gW0DYwysRFgv916vWvq3lADOYEtrhr8RrN3R5yHaHC4UojyQaJ1/R1EogXHKnIFAQlB7VdEdDYKyWnghH3NxfWZBHhFiqgwfp9Kf7kLLMF55TyqxxAWyxJYrfP2gwiB5/n+ChImZTx+i9+4vU9r5w/FfrPUzecDC1EUNtZw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=xMiR+WXhgBAnfOEaJmGFhhQFyqGX3QlQhKpL6tr9GJc=;
 b=THYWolL0wl2amPtO28xroOg3iOAUrE/UiMhbPoOtwnU80ck2mG7h7yvqGYrScwGm5Q0e065UjfaXmCr3SOKIJMxxetTBzo7SdO6rghRtX7Kh9lJ4wmAWEz1BvTArgJe18f8CAFP3iEsY+xk1aYxh+a5N4Km7/1T5THmZlmoWVAvtOyFpLerhD8NOQGUV+iqMUVRksdeupLW61ihHNRBN3sGsZ5+mZFAhr9irXOBYK61QGhuQCAHB62kuitQn1kzd6vcNMq+tvaGws7ImtPFXz6DLYdUae7+cnGad+KGWbSEuZL79bqlQNfvL3Ii1Iasc8k6ht3f4+vL2T8eukbSn7w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=xMiR+WXhgBAnfOEaJmGFhhQFyqGX3QlQhKpL6tr9GJc=;
 b=wPWrscJlXwOKSr+0DqKJL9ZWiQWbXjk4O4Lr9elK9lHZCWE+HPH8NVbJtna3dGY6Gx+VR5Rgy3THWvm167xwwhTx1EeebekPNJg90Xhyuj+MJSH/1YKIhn4CAOrFf4/w+ZqCOL2B49+bwChzNBE9Si1XwIX9xwxT3hxXJLQB0uo=
Date: Tue, 15 Mar 2022 16:41:07 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>, Ross Lagerwall
	<ross.lagerwall@citrix.com>, <doebel@amazon.de>
Subject: Re: [PATCH 3/3] livepatch: correctly handle altinstruction sections
Message-ID: <YjCzk+CAs72d9Vy5@Air-de-Roger>
References: <20220310150834.98815-1-roger.pau@citrix.com>
 <20220310150834.98815-4-roger.pau@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <20220310150834.98815-4-roger.pau@citrix.com>
X-ClientProxiedBy: LO2P265CA0440.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:e::20) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 40e3b6b7-c07a-4832-79f4-08da069a3c01
X-MS-TrafficTypeDiagnostic: BY5PR03MB4933:EE_
X-Microsoft-Antispam-PRVS: <BY5PR03MB49337A24E044233BAE1222AB8F109@BY5PR03MB4933.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(26005)(186003)(6506007)(6666004)(9686003)(6512007)(2906002)(4744005)(8936002)(5660300002)(33716001)(508600001)(54906003)(6486002)(6916009)(66476007)(66556008)(66946007)(4326008)(8676002)(316002)(38100700002)(86362001)(85182001)(82960400001)(67856001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?VGxESVBXV3FXS3FLSU1DaGVKMTN4Q2dtUWw2TWtiQ1lEdWtYTXNIbytNWWs1?=
 =?utf-8?B?RE40SEcwdm1VNFRtVU1OOXl4QWc0SGlSRWRNU1FpUTRRZndLUnkxb1NzMk5Y?=
 =?utf-8?B?Tk1leXUxUEk5R0k1YUpJQ2ZtbldWYzBOb2pCemtnOW9aNEVmVldrd0hyNGFX?=
 =?utf-8?B?bEI5Y3B3Rk56RkNPKzFMVG1oTUdDc0hGZExZVzB6dzIwb3BMbnVSMUV3OWpv?=
 =?utf-8?B?Lys5eHNnTysrUUFKSmdVZlZncm94MUFIeHFFc210S2VaNy9MQkh0RlpVdjVX?=
 =?utf-8?B?bkVaNEdFaWpXbHNQWmVSMXdMQzZ0RmtSK0FIS0ZHbEhzVk5CM0tVWk03OEdF?=
 =?utf-8?B?V2pHMUd3SkNNKzJlZzFGWGs5dko1Z2p3L3VFcjNyd1dNRWZ2QnA5N1NPUlYx?=
 =?utf-8?B?MWpuWFB4eUJ0YVJCSjZCU3JsSGFQaWgxOTV6dUEzZEFPTWFKTFdEMFJ0Ymoz?=
 =?utf-8?B?VDRlemRqU01CQlVXcXlxdlhHTEYzcEtET3UwQ1RLQU9PdWVkQk5lWFFBWjdi?=
 =?utf-8?B?T2o0VEtJN2lzVHl1Z1RrRTBOS3lhYVNsQVdaWFpMSzFMQkJ1TlNvRlVDdUl6?=
 =?utf-8?B?RGJqdjhTVUNBQjBVNmprdkJBN09HeXM5bDNMWFlZU20zcFdUamFGSlpvdGhO?=
 =?utf-8?B?S2RrNFhaT1hsSld0ajlhcnRLYThnUVZwTGNRQzlaSjJxV3VrRkRmQXYyNzFZ?=
 =?utf-8?B?NGVaTXN6U3VNbUpwTHlFbXNHWEllcmJFN1B2TURXaU1HL0p6RFN6Yjg3TUla?=
 =?utf-8?B?WkUzY1lIWGc1ZFlmVjZPY3ljWUZsUlp4VEgvSzV0c2lGUkhJbEZQaXY4c0Yz?=
 =?utf-8?B?RitFNmcvM08vQS9ENUc3SGxUN3ZPYy8wU2Y0dk9zNitxU2h2VlpOTExsQlhT?=
 =?utf-8?B?bGpTcTFBR2xxdVVESTR5Qm1zMzJlcldpZkRGZzR4clFON1dlRmVxMkNpMHFK?=
 =?utf-8?B?UmVaK3RPN0hGcG9FVlNLSDNLOXU2MHdsZXdaU1hrWEtnRUZXNktsVUF2a3FK?=
 =?utf-8?B?WitPN0wwS0hCOXhWTjRrUkRxQWc1VXhKOGVydXpPdlJuOUxNM0srOVB4WXFW?=
 =?utf-8?B?aURGYUxlYjVTaUprZXRKT3VabVdBUHI3TWZkczR0TU1OdEV4UDZJaFpUQnVD?=
 =?utf-8?B?OTZ6MWkwV1ROVURXQVNReUpQWmZ5UWNVTUVwek8yYVQ1RWVEWmxMbmM2MU42?=
 =?utf-8?B?OU8rM3JWRHpXakdQcEZ6b3NpSlFrWUgwQzhrSmc5bW8rZzl3ODZuZUFMd2Rs?=
 =?utf-8?B?czgwVWswUmd1b1NPTDc3VmFXTENLM0xraTZlS0s4eFBOVUc4VFZSK1c0Sm8x?=
 =?utf-8?B?c09TWHkxMTRSUU1nUmxaVUdGbGZaUktLWXBTTGc0aXp5TFNHU2hwZzVxV1Jk?=
 =?utf-8?B?TkdBdXJTOUhDb1Bhb0FHSmxVejRlcnBPTUFzRlloazdyem9OcWc1allUMjRw?=
 =?utf-8?B?azdkOFUrMzMxd2FkRXQ3c1ltd1Y0T3hhYkNlRmJHNWJCTk5NYytaYjU4L0sv?=
 =?utf-8?B?TzljT0x6aEw2bDZyTEpaT1NhaFZTTnIxRlVBZHRvUzB2L0RNa2lxa1hJelFi?=
 =?utf-8?B?dnRMZG1WU1BJWkQ5aWc5cXJxYXEzR0VqQ0FrN0N3bWVja2xsSVBoR3RZaUR4?=
 =?utf-8?B?Y05RL0R5WU1LZk1Fa3BhWlEzZWpSOFBkbFhUd3hGNmRHZmpibWpOdlAwQUw1?=
 =?utf-8?B?ZkxFZ1VkcE96cTVVRC9nd2JlQnMzUDZodnFqVnJsN0Zhc1o5WWJTY2NGd2Nx?=
 =?utf-8?B?aUR5ajM1MzBhdzVSeStpcWE5bUtxRVU2L2tyRFBjRVdVRkhqNTYwNzhENmVG?=
 =?utf-8?B?aDIyU0drUk1zWXVUWXYwdE1WbFVsYVNCREV5bmh1VmhHbW5Cc1hkejdHSDBl?=
 =?utf-8?B?WE9RdVVlelJCNDZSV1UzM3hBMTk5TEJ4b3N4U1lNWEhETDE3TmlyVVFZMjZG?=
 =?utf-8?B?VEFxQ0FxTVZBZkJ1T2wva3VqSzJtZ3pjRnlwRnRBbThNMTVkOFNGWmloMVV2?=
 =?utf-8?B?RmNUT2xWazBnPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 40e3b6b7-c07a-4832-79f4-08da069a3c01
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Mar 2022 15:41:12.9524
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 3wvKiSvERo2sfHJ6cFpVlNB0Te45uvu/TYZr9zirxXrcpSO6S9Syc+Unaezy2CqEJwIPbx/7i4i28UPNCIwp3g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR03MB4933
X-OriginatorOrg: citrix.com

On Thu, Mar 10, 2022 at 04:08:34PM +0100, Roger Pau Monne wrote:
> The current handling of altinstructions sections by the livepatch
> tools is incorrect, as on Xen those sections are part of .init and
> thus discarded after load. Correctly handle them by just ignoring, as
> it's done with other .init related sections.

I think my logic here is wrong.

While looking at something else I realized that livepatch does support
'.altinstructions', as it needs to be able to patch the contents of
the payload that is being loaded - hence ignoring any '.altintr*'
section at patch generation is not OK.

I have to withdraw this patch, will likely repost with the other
sections that do need to be ignored.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 16:17:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 16:17:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290890.493494 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU9rj-0004bG-M1; Tue, 15 Mar 2022 16:17:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290890.493494; Tue, 15 Mar 2022 16:17:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nU9rj-0004b9-Is; Tue, 15 Mar 2022 16:17:43 +0000
Received: by outflank-mailman (input) for mailman id 290890;
 Tue, 15 Mar 2022 16:17:42 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Tp7D=T2=linaro.org=alex.bennee@srs-se1.protection.inumbo.net>)
 id 1nU9ri-0004b0-DM
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 16:17:42 +0000
Received: from mail-ed1-x532.google.com (mail-ed1-x532.google.com
 [2a00:1450:4864:20::532])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 6a891b7e-a47b-11ec-853b-5f4723681683;
 Tue, 15 Mar 2022 17:17:37 +0100 (CET)
Received: by mail-ed1-x532.google.com with SMTP id w25so1247848edi.11
 for <xen-devel@lists.xenproject.org>; Tue, 15 Mar 2022 09:17:37 -0700 (PDT)
Received: from zen.linaroharston ([51.148.130.216])
 by smtp.gmail.com with ESMTPSA id
 b2-20020a17090630c200b006d58f94acecsm8336787ejb.210.2022.03.15.09.17.29
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Tue, 15 Mar 2022 09:17:29 -0700 (PDT)
Received: from zen (localhost [127.0.0.1])
 by zen.linaroharston (Postfix) with ESMTP id DA6F31FFB7;
 Tue, 15 Mar 2022 16:17:28 +0000 (GMT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6a891b7e-a47b-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=linaro.org; s=google;
        h=references:user-agent:from:to:cc:subject:date:in-reply-to
         :message-id:mime-version:content-transfer-encoding;
        bh=wXepQw3GedEOnaEjjgwFEek2uNakl81Uh1kkTxXNANY=;
        b=F3aar3/x2xxvS9vcYKe1Mvtt1EqSsoBASuRUnpfeFf/9QOsQ9EirTU+5UXDPWgmmQ8
         5aWvQ4a3Y7i7pCgV7ZVmsL5EF/adYmtKzIJ1VD+N7zzHTEfgamSkXC88A13R9+XsM+6j
         XdcergIRGV2qgbcn3PqCtfRAhEgxMt67cMDmLaMAwSD7Fl7pSesd8mjtrJziHfqos0pY
         s47rwsq519gPX+/mzmV77GPfGgrLuVYkpyNn/zQcK7+OdEoRjVMtv8d0wWIbjC2XY1VD
         DNGxi9oX8hgtbjXgoEM6RD5NdFDbYHGbi4Eqpu8VsTHOFLEwbPSYq0l80owiW4tZ/TN7
         HE1Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:references:user-agent:from:to:cc:subject:date
         :in-reply-to:message-id:mime-version:content-transfer-encoding;
        bh=wXepQw3GedEOnaEjjgwFEek2uNakl81Uh1kkTxXNANY=;
        b=rZOdoj63B8gyCAh0W1Uk/k5Dlq341ZV208oBTUZ8F4VrR1bwK4esvtbWod00de+nTe
         XSLt5PtZQQZQ5wTKcoprJ0qoJTdoAWtsPZfRpKbYPtarmh5jt0tooe2143Ciz/57Gusj
         FPTRSAriqEzSPVEaEnWxXtqxpgHQjhfqy7tzcfZyBCwpQOn4a/2lDwovcmHCyPba2q4P
         wDxbclWnh945u4u87bmDNZgO+hiviXcV0amSmcPwTB235N7PBOygS2HjclFJnFfTcnwG
         kjBkLhqbhQvHQqPg8xhGXEyUL9glNHbGhxC2xgsgFNGFxB1Vtxtg1GvKrgOt4Api3w9L
         oGgg==
X-Gm-Message-State: AOAM532pXuQedIyHP7z9Siq51fpBvbaB+SjMhSNHGMSCF5BkCEAUsQ1c
	U2FovR4uFAieA+s9mTZLSXh9/Q==
X-Google-Smtp-Source: ABdhPJzU1QhvRlda48ErEhrpsRbj6BfjaKE2lwF+Chi9fW6LBiwHjRi2bbN5qpfgAEHV/EV9wPxPow==
X-Received: by 2002:a05:6402:14b:b0:418:d06e:5d38 with SMTP id s11-20020a056402014b00b00418d06e5d38mr2452698edu.90.1647361051297;
        Tue, 15 Mar 2022 09:17:31 -0700 (PDT)
References: <20220314160108.1440470-1-armbru@redhat.com>
 <20220314160108.1440470-4-armbru@redhat.com> <87y21c401e.fsf@linaro.org>
 <875yofl3k3.fsf@pond.sub.org>
 <02307072-4bff-dbbb-67fb-ca9800c34b3c@gmail.com>
 <875yofjmxu.fsf@pond.sub.org>
User-agent: mu4e 1.7.10; emacs 28.0.92
From: Alex =?utf-8?Q?Benn=C3=A9e?= <alex.bennee@linaro.org>
To: Markus Armbruster <armbru@redhat.com>
Cc: Philippe =?utf-8?Q?Mathieu-Daud=C3=A9?=
 <philippe.mathieu.daude@gmail.com>,
 qemu-devel@nongnu.org, Paolo  Bonzini <pbonzini@redhat.com>, Richard
 Henderson <richard.henderson@linaro.org>, Gerd Hoffmann
 <kraxel@redhat.com>, Christian Schoenebeck <qemu_oss@crudebyte.com>,
 "Gonglei (Arei)" <arei.gonglei@huawei.com>, =?utf-8?Q?Marc-Andr=C3=A9?=
 Lureau
 <marcandre.lureau@redhat.com>, "Michael S. Tsirkin" <mst@redhat.com>, Igor
 Mammedov <imammedo@redhat.com>, Ani Sinha <ani@anisinha.ca>, Laurent
 Vivier <lvivier@redhat.com>, Amit Shah <amit@kernel.org>, Peter  Maydell
 <peter.maydell@linaro.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Anthony Perard <anthony.perard@citrix.com>, Paul Durrant <paul@xen.org>,
 =?utf-8?Q?Herv=C3=A9?= Poussineau <hpoussin@reactos.org>, Aleksandar Rikalo
 <aleksandar.rikalo@syrmia.com>, Corey Minyard <cminyard@mvista.com>,
 Patrick Venture <venture@google.com>, Eduardo  Habkost
 <eduardo@habkost.net>, Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
 Peter Xu <peterx@redhat.com>, Jason Wang <jasowang@redhat.com>,
 =?utf-8?Q?C=C3=A9dric?= Le
 Goater <clg@kaod.org>, Daniel Henrique  Barboza <danielhb413@gmail.com>,
 David Gibson <david@gibson.dropbear.id.au>, Greg Kurz <groug@kaod.org>,
 Philippe  =?utf-8?Q?Mathieu-Daud=C3=A9?= <f4bug@amsat.org>, Jean-Christophe
 Dubois
 <jcd@tribudubois.net>, Keith Busch <kbusch@kernel.org>, Klaus Jensen
 <its@irrelevant.dk>, Yuval Shaia <yuval.shaia.ml@gmail.com>, Yoshinori
  Sato <ysato@users.sourceforge.jp>, Magnus Damm <magnus.damm@gmail.com>,
 Fabien Chouteau <chouteau@adacore.com>, KONRAD Frederic
 <frederic.konrad@adacore.com>, Mark Cave-Ayland
 <mark.cave-ayland@ilande.co.uk>, Artyom Tarasenko <atar4qemu@gmail.com>,
 Alex Williamson <alex.williamson@redhat.com>, Eric Auger
 <eric.auger@redhat.com>, Max Filippov <jcmvbkbc@gmail.com>, Juan  Quintela
 <quintela@redhat.com>, "Dr. David Alan Gilbert" <dgilbert@redhat.com>,
 Konstantin Kostiuk <kkostiuk@redhat.com>, Michael  Roth
 <michael.roth@amd.com>, =?utf-8?Q?Daniel_P=2E_Berrang=C3=A9?=
 <berrange@redhat.com>, Pavel
 Dovgalyuk <pavel.dovgaluk@ispras.ru>, David Hildenbrand
 <david@redhat.com>, Wenchao Wang <wenchao.wang@intel.com>, Colin Xu
 <colin.xu@intel.com>, Kamil Rytarowski <kamil@netbsd.org>, Reinoud
  Zandijk <reinoud@netbsd.org>, Sunil Muthuswamy <sunilmut@microsoft.com>,
 Cornelia Huck <cohuck@redhat.com>, Thomas Huth <thuth@redhat.com>, Eric
  Blake <eblake@redhat.com>, Vladimir Sementsov-Ogievskiy
 <vsementsov@virtuozzo.com>, John Snow <jsnow@redhat.com>,
 kvm@vger.kernel.org, qemu-arm@nongnu.org, xen-devel@lists.xenproject.org,
 qemu-ppc@nongnu.org, qemu-block@nongnu.org, haxm-team@intel.com,
 qemu-s390x@nongnu.org
Subject: Re: [PATCH 3/3] Use g_new() & friends where that makes obvious sense
Date: Tue, 15 Mar 2022 16:16:54 +0000
In-reply-to: <875yofjmxu.fsf@pond.sub.org>
Message-ID: <875yof42cn.fsf@linaro.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable


Markus Armbruster <armbru@redhat.com> writes:

> Philippe Mathieu-Daud=C3=A9 <philippe.mathieu.daude@gmail.com> writes:
>
>> On 15/3/22 14:59, Markus Armbruster wrote:
>>> Alex Benn=C3=A9e <alex.bennee@linaro.org> writes:
>>>=20
>>>> Markus Armbruster <armbru@redhat.com> writes:
>>>>
>>>>> g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
>>>>> for two reasons.  One, it catches multiplication overflowing size_t.
>>>>> Two, it returns T * rather than void *, which lets the compiler catch
>>>>> more type errors.
>>>>>
>>>> <snip>
>>>>> diff --git a/semihosting/config.c b/semihosting/config.c
>>>>> index 137171b717..6d48ec9566 100644
>>>>> --- a/semihosting/config.c
>>>>> +++ b/semihosting/config.c
>>>>> @@ -98,7 +98,7 @@ static int add_semihosting_arg(void *opaque,
>>>>>       if (strcmp(name, "arg") =3D=3D 0) {
>>>>>           s->argc++;
>>>>>           /* one extra element as g_strjoinv() expects NULL-terminate=
d array */
>>>>> -        s->argv =3D g_realloc(s->argv, (s->argc + 1) * sizeof(void *=
));
>>>>> +        s->argv =3D g_renew(void *, s->argv, s->argc + 1);
>>>>
>>>> This did indeed break CI because s->argv is an array of *char:
>>>>
>>>> ../semihosting/config.c:101:17: error: assignment to =E2=80=98const ch=
ar **=E2=80=99 from incompatible pointer type =E2=80=98void **=E2=80=99 [-W=
error=3Dincompatible-pointer-types]
>>>>    101 |         s->argv =3D g_renew(void *, s->argv, s->argc + 1);
>>>>        |                 ^
>>>> cc1: all warnings being treated as errors
>>>>
>>>> So it did the job of type checking but failed to build ;-)
>>>
>>> You found a hole in my compile testing, thanks!
>>>
>>> I got confused about the configuration of my build trees.  Catching such
>>> mistakes is what CI is for :)
>>
>> FYI Alex fixed this here:
>> https://lore.kernel.org/qemu-devel/20220315121251.2280317-8-alex.bennee@=
linaro.org/
>>
>> So your series could go on top (modulo the Coverity change).
>
> I dropped this hunk in v2.
>
> Whether my v2 or Alex's series goes in first doesn't matter.

That's great. Thanks for finding the ugliness in the first place ;-)

--=20
Alex Benn=C3=A9e


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 16:53:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 16:53:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290893.493505 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUAPz-0000K3-9L; Tue, 15 Mar 2022 16:53:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290893.493505; Tue, 15 Mar 2022 16:53:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUAPz-0000Jw-6H; Tue, 15 Mar 2022 16:53:07 +0000
Received: by outflank-mailman (input) for mailman id 290893;
 Tue, 15 Mar 2022 16:53:06 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUAPy-0000Jm-4H; Tue, 15 Mar 2022 16:53:06 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUAPy-00083w-0G; Tue, 15 Mar 2022 16:53:06 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUAPx-00073n-PU; Tue, 15 Mar 2022 16:53:05 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUAPx-0001T5-P2; Tue, 15 Mar 2022 16:53:05 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=GUngWHCg4xUyP+QMSMNrtnCPq9V3ikdSf6l02DoSnjI=; b=lxvpTXeeY+RYdwpKTwPMtfPfJo
	cM5biepS34z2tXfHdUN7V3A2CfJLwiRSRHTbabXEoAT84Fp62JSiWiwwyieWYeqK0Q2UsvoQq/Xwn
	0ppxsCHMWD23jaOi3W3rcIzDYuModp2dhHQdRPKL95JVs2B37afd2bx/e0i3VeBYVDR8=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168617-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168617: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c8ea48bdf95532f9a3a4c39a154c09988566901f
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 15 Mar 2022 16:53:05 +0000

flight 168617 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168617/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c8ea48bdf95532f9a3a4c39a154c09988566901f
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   15 days
Failing since        168258  2022-03-01 01:55:31 Z   14 days  142 attempts
Testing same since   168617  2022-03-15 15:41:41 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 653 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 16:54:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 16:54:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290900.493516 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUAQu-0000r1-LX; Tue, 15 Mar 2022 16:54:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290900.493516; Tue, 15 Mar 2022 16:54:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUAQu-0000qu-HN; Tue, 15 Mar 2022 16:54:04 +0000
Received: by outflank-mailman (input) for mailman id 290900;
 Tue, 15 Mar 2022 16:54:03 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=WDZV=T2=citrix.com=prvs=066e9a523=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nUAQt-0000cD-Ew
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 16:54:03 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 826ccd5e-a480-11ec-853b-5f4723681683;
 Tue, 15 Mar 2022 17:54:00 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 826ccd5e-a480-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647363241;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=H0SNGKWs4zG8ho5bjRotDJE8ddvOcKGQyN+7cYpu6zk=;
  b=RXjcKOo0gvmSaEpis3/eJPsUWfRE/HFMo7v4VMRQPPr8BVu3PayWlCsQ
   DfWaDqagIGGPEnrYpPQeyZLarW1sh+RnkJG1rIaqhT+ll8Nwyd+5ye7Dz
   E61K/0koqbtCqr9jjwQICMcu9PEiMg3ssbiHHGffWYxcHVoLcWB/Iyklg
   8=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 65775682
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:kY4/za8l15Ysr+N6UUhPDrUDpH6TJUtcMsCJ2f8bNWPcYEJGY0x3z
 GFJCmyAaKmJZzfwco0lPoS+p0kF6MeAyt83SAVtqig8E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oHkW1jlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnbCLSyowOaf2pLkiDkV5SmJGD4MY2rCSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFKoZtmtt0nfyCvE+TIqYa67L+cVZzHE7gcUm8fP2O
 ZdGNmcxPE6ojxtnK3NKAq0fhtuTnSfdYgZUommql4Mw2j2GpOB2+Oe0a4eEEjCQfu1Kmm6Iq
 2SA+H72ajkfPcaawCCI8VqtgPHOhiLxXI8OFLy++eVuiVfVzWsWYDUGWF3+rfSnh0qWX9NEN
 1dS6icotbI19kGgUp/6RRLQiFyuswMYWtFQO/Yn8wzLwa3Rizt1HUBdEGQHMoZ/8pZrG3p6j
 Tdlgu8FGxRDi7+4UHWXzIvJkm7uGHFWFV0sOw0LGF5tD8bYnKk/iRfGT9BGGaGzj8HoFTyY/
 w1mvBTSlJ1I05dVivzTEUTvxmv1+8OXFlJdChD/BDrN0+9vWGKyi2VEA3D/5O0IEouWR0LpU
 JMsy5nHt7Bm4X1geUWwrAQx8FOBuq7t3N702wcH83wdG9KFoCbLkWd4um0WGauRGpxYEQIFm
 WeK0e+r2LddPWGxcYh8aJ+rBsIhwMDITIq5CaqFNIMUMsErLmdrGR2Cg2bLhggBd2B2zckC1
 WqzK57wXR7294w6pNZJewvt+eBynX1vrY8ibZv60w6mwdKjiI29Et843K+1Rrlhtsus+VyNm
 /4Gbpfi40gPAYXWP3iMmaZOfA9iEJTOLc2vwyChXrXYeVQO9aBII6K5/I7NjKQ+xvULzLiUp
 i/hMqKaoXKm7UD6xcyxQigLQNvSsVxX9hrX4QRE0Y6U5kUe
IronPort-HdrOrdr: A9a23:aPMvgaE8D5576uXtpLqE5seALOsnbusQ8zAXP0AYc31om6uj5q
 aTdZUgpHjJYVkqKRIdcLy7V5VoIkmskaKdg7NhX4tKNTOO0ADDQe1fBOPZskTd8kbFltK1u5
 0PT0EHMqyUMWRH
X-IronPort-AV: E=Sophos;i="5.90,184,1643691600"; 
   d="scan'208";a="65775682"
From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Jan Beulich
	<JBeulich@suse.com>, =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?=
	<roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
	=?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?=
	<marmarek@invisiblethingslab.com>
Subject: [PATCH] x86/cet: Remove writeable mapping of the BSPs shadow stack
Date: Tue, 15 Mar 2022 16:53:40 +0000
Message-ID: <20220315165340.32144-1-andrew.cooper3@citrix.com>
X-Mailer: git-send-email 2.11.0
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

An unintended consequence of the BSP using cpu0_stack[] is that writeable
mappings to the BSPs shadow stacks are retained in the bss.  This renders
CET-SS almost useless, as an attacker can update both return addresses and the
ret will not fault.

We specifically don't want the shatter the superpage mapping .data/.bss, so
the only way to fix this is to not have the BSP stack in the main Xen image.

Break cpu_alloc_stack() out of cpu_smpboot_alloc(), and dynamically allocate
the BSP stack as early as reasonable in __start_xen().  As a consequence,
there is no need to delay the BSP's memguard_guard_stack() call.

Copy the top of cpu info block just before switching to use the new stack.
Fix a latent bug by setting %rsp to info->guest_cpu_user_regs rather than
->es; this would be buggy if reinit_bsp_stack() called schedule() (which
rewrites the GPR block) directly, but luckily it doesn't.

Finally, move cpu0_stack[] into .init, so it can be reclaimed after boot.

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
---
CC: Jan Beulich <JBeulich@suse.com>
CC: Roger Pau Monné <roger.pau@citrix.com>
CC: Wei Liu <wl@xen.org>
CC: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
---
 xen/arch/x86/include/asm/smp.h |  2 ++
 xen/arch/x86/setup.c           | 20 +++++++++++++-------
 xen/arch/x86/smpboot.c         | 26 +++++++++++++++++++-------
 xen/arch/x86/xen.lds.S         |  4 ++--
 4 files changed, 36 insertions(+), 16 deletions(-)

diff --git a/xen/arch/x86/include/asm/smp.h b/xen/arch/x86/include/asm/smp.h
index 1747772d232e..41a3b6a0dadf 100644
--- a/xen/arch/x86/include/asm/smp.h
+++ b/xen/arch/x86/include/asm/smp.h
@@ -85,6 +85,8 @@ extern cpumask_t **socket_cpumask;
 extern unsigned int disabled_cpus;
 extern bool unaccounted_cpus;
 
+void *cpu_alloc_stack(unsigned int cpu);
+
 #endif /* !__ASSEMBLY__ */
 
 #endif
diff --git a/xen/arch/x86/setup.c b/xen/arch/x86/setup.c
index 22a9885dee5c..1f816ce05a07 100644
--- a/xen/arch/x86/setup.c
+++ b/xen/arch/x86/setup.c
@@ -148,7 +148,7 @@ cpumask_t __read_mostly cpu_present_map;
 
 unsigned long __read_mostly xen_phys_start;
 
-char __section(".bss.stack_aligned") __aligned(STACK_SIZE)
+char __section("init.bss.stack_aligned") __aligned(STACK_SIZE)
     cpu0_stack[STACK_SIZE];
 
 /* Used by the BSP/AP paths to find the higher half stack mapping to use. */
@@ -712,7 +712,6 @@ static void __init noreturn reinit_bsp_stack(void)
     percpu_traps_init();
 
     stack_base[0] = stack;
-    memguard_guard_stack(stack);
 
     rc = setup_cpu_root_pgt(0);
     if ( rc )
@@ -886,6 +885,8 @@ void __init noreturn __start_xen(unsigned long mbi_p)
 {
     char *memmap_type = NULL;
     char *cmdline, *kextra, *loader;
+    void *bsp_stack;
+    struct cpu_info *info = get_cpu_info(), *bsp_info;
     unsigned int initrdidx, num_parked = 0;
     multiboot_info_t *mbi;
     module_t *mod;
@@ -918,7 +919,7 @@ void __init noreturn __start_xen(unsigned long mbi_p)
     /* Full exception support from here on in. */
 
     rdmsrl(MSR_EFER, this_cpu(efer));
-    asm volatile ( "mov %%cr4,%0" : "=r" (get_cpu_info()->cr4) );
+    asm volatile ( "mov %%cr4,%0" : "=r" (info->cr4) );
 
     /* Enable NMIs.  Our loader (e.g. Tboot) may have left them disabled. */
     enable_nmis();
@@ -1703,6 +1704,10 @@ void __init noreturn __start_xen(unsigned long mbi_p)
      */
     vm_init();
 
+    bsp_stack = cpu_alloc_stack(0);
+    if ( !bsp_stack )
+        panic("No memory for BSP stack\n");
+
     console_init_ring();
     vesa_init();
 
@@ -1974,17 +1979,18 @@ void __init noreturn __start_xen(unsigned long mbi_p)
 
     if ( bsp_delay_spec_ctrl )
     {
-        struct cpu_info *info = get_cpu_info();
-
         info->spec_ctrl_flags &= ~SCF_use_shadow;
         barrier();
         wrmsrl(MSR_SPEC_CTRL, default_xen_spec_ctrl);
         info->last_spec_ctrl = default_xen_spec_ctrl;
     }
 
-    /* Jump to the 1:1 virtual mappings of cpu0_stack. */
+    /* Copy the cpu info block, and move onto the BSP stack. */
+    bsp_info = get_cpu_info_from_stack((unsigned long)bsp_stack);
+    *bsp_info = *info;
+
     asm volatile ("mov %[stk], %%rsp; jmp %c[fn]" ::
-                  [stk] "g" (__va(__pa(get_stack_bottom()))),
+                  [stk] "g" (&bsp_info->guest_cpu_user_regs),
                   [fn] "i" (reinit_bsp_stack) : "memory");
     unreachable();
 }
diff --git a/xen/arch/x86/smpboot.c b/xen/arch/x86/smpboot.c
index 709704d71ada..b46fd9ab18e4 100644
--- a/xen/arch/x86/smpboot.c
+++ b/xen/arch/x86/smpboot.c
@@ -1023,6 +1023,23 @@ static void cpu_smpboot_free(unsigned int cpu, bool remove)
     }
 }
 
+void *cpu_alloc_stack(unsigned int cpu)
+{
+    nodeid_t node = cpu_to_node(cpu);
+    unsigned int memflags = 0;
+    void *stack;
+
+    if ( node != NUMA_NO_NODE )
+        memflags = MEMF_node(node);
+
+    stack = alloc_xenheap_pages(STACK_ORDER, memflags);
+
+    if ( stack )
+        memguard_guard_stack(stack);
+
+    return stack;
+}
+
 static int cpu_smpboot_alloc(unsigned int cpu)
 {
     struct cpu_info *info;
@@ -1035,15 +1052,10 @@ static int cpu_smpboot_alloc(unsigned int cpu)
     if ( node != NUMA_NO_NODE )
         memflags = MEMF_node(node);
 
-    if ( stack_base[cpu] == NULL )
-    {
-        stack_base[cpu] = alloc_xenheap_pages(STACK_ORDER, memflags);
-        if ( !stack_base[cpu] )
+    if ( stack_base[cpu] == NULL &&
+         (stack_base[cpu] = cpu_alloc_stack(cpu)) == NULL )
             goto out;
 
-        memguard_guard_stack(stack_base[cpu]);
-    }
-
     info = get_cpu_info_from_stack((unsigned long)stack_base[cpu]);
     info->processor_id = cpu;
     info->per_cpu_offset = __per_cpu_offset[cpu];
diff --git a/xen/arch/x86/xen.lds.S b/xen/arch/x86/xen.lds.S
index 4103763f6391..9cd4fe417e14 100644
--- a/xen/arch/x86/xen.lds.S
+++ b/xen/arch/x86/xen.lds.S
@@ -215,8 +215,9 @@ SECTIONS
   } PHDR(text)
   DECL_SECTION(.init.data) {
 #endif
+       . = ALIGN(STACK_SIZE);
+       *(.init.bss.stack_aligned)
 
-       . = ALIGN(POINTER_ALIGN);
        __initdata_cf_clobber_start = .;
        *(.init.data.cf_clobber)
        *(.init.rodata.cf_clobber)
@@ -300,7 +301,6 @@ SECTIONS
 
   DECL_SECTION(.bss) {
        __bss_start = .;
-       *(.bss.stack_aligned)
        *(.bss.page_aligned*)
        . = ALIGN(PAGE_SIZE);
        __per_cpu_start = .;
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Tue Mar 15 17:25:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 17:25:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290906.493527 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUAvf-0004N9-9p; Tue, 15 Mar 2022 17:25:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290906.493527; Tue, 15 Mar 2022 17:25:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUAvf-0004N2-6V; Tue, 15 Mar 2022 17:25:51 +0000
Received: by outflank-mailman (input) for mailman id 290906;
 Tue, 15 Mar 2022 17:25:49 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=w9QY=T2=aim.com=brchuckz@srs-se1.protection.inumbo.net>)
 id 1nUAvd-0004Mw-Bj
 for xen-devel@lists.xen.org; Tue, 15 Mar 2022 17:25:49 +0000
Received: from sonic309-21.consmr.mail.gq1.yahoo.com
 (sonic309-21.consmr.mail.gq1.yahoo.com [98.137.65.147])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f20d6070-a484-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 18:25:47 +0100 (CET)
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic309.consmr.mail.gq1.yahoo.com with HTTP; Tue, 15 Mar 2022 17:25:43 +0000
Received: by hermes--canary-production-bf1-ff8c5d676-2sm24 (VZM Hermes SMTP
 Server) with ESMTPA ID 970a7cb24095610cfceb0a4285b9bafe; 
 Tue, 15 Mar 2022 17:25:40 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f20d6070-a484-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netscape.net; s=a2048; t=1647365143; bh=/GH9rXBVOrh+r5btEEYMd5e5xYLXrOt+SuXPidbyhR0=; h=Date:Subject:References:To:From:In-Reply-To:From:Subject:Reply-To; b=jJ0N1+CzY/HJO3pYbdPULZPggtKpbfK1ySbeUiAuD2HP3OvRj3owmqAY/+KZ7Uxsl/UWq9MeYfTZ3WHbMpO8s+krIhAdkYxwY9VN9/Pl0JfyLiid6wyzN/HHqpDNjJJdZ7lsFX/1NO3X+zttPLsEJlAjcuGSXZj8zC2OrkKcictEDGenwfM35c0bizpvJ11XnvUE8fFvzIjZsW2elyZ9D/mNUdiIT7KHvKlJcoxlz9dOGIeFsMUoAtYSqwJfmRo1ZOVTsMsSipYW5cTdKX6SFA/7TXYBszl64HlCc1LiS4+hiwW0WfZ/jccPLNFbRW3RD9+zyT5dOicVAk9ID3EwOA==
X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1647365143; bh=DOaR/+gdEwIBnB5hyCbXTwbivNbhnk4xoveuJ55eCfD=; h=X-Sonic-MF:Date:Subject:To:From:From:Subject; b=ncY/4rc0ChQ/GQtYLgXoIw24L/5UFHa+zTqVBNL2JpPvPGUhIdzH9yaTW5wc10MN2on6LuBve5UZXCPg+zm/P1YCFNmmVav2joPdDq0J1rCbsQKg+hntBvzpW3fPdxrtONme5P4M/Iax+ag37RGG5YHq/sz91KKHvX1msmYcPublH0Wu+hlkA7hB2uODOW+5WZwEAyJKyu4FW5kuPJSRdsmdANaoCusfYz/92wImqL/niP8HcVZm6gnImSUC348JjLaEPmlBrSYz0szPZtLyDlQkEh3ZeC6JcwgX5NJtVRCBYb2e3P2IElATdKDhpkDrnFFhl+i84zTeLRTO/8+kgw==
X-YMail-OSG: 4s14emQVM1k8A5dFioa37dHxZ7QqexA6.GK5x4scAI4_6HDEIErKq8N.MKirPWR
 hD9lX_wjRcKVPzAaAMxdIVSiP8UlynzG9b43gGCScQ_Fm4UyFSPRZuOuqyIxZixU_amem_MAVB4h
 TugVBG6gu.MEt6ivPiwH721ickPOe3Sfy.Bgfuv0fQX_6rgCxarYIS0O1YvFhQw_WVtLBl3NdSJT
 6qgMM6_BHrXO7y7YVJsqwsxKTaSYlM6KGx359dfoa4duqpEQAZpCUivCetudHkKOK1BY6AQUWqi1
 m6qQabAU9wYxTKy697X19Z4uhe0Onw5Kl1Hj4nd512R.2KIlHWuHIbR4qG32OVWv7bv3Z8St4hxF
 0MSVtqp.Z_CvC7mVNOJdPqN9zPBd.pc7SX2eeWQaXVv8GCrw23.0aniDPndOn1QwFW3i2u7Ctt82
 .Hx4B1fYEoH4Qs8AOJ8zbBAwhSu1gOb9xjU6MZGGLQTFkzOSJ35VN8qviROfFjq850dilp1KMxh4
 WqrpUbLfpM4h8_WRUYOfLnw1q1zEtZEMDx_dVZr.Kbs4aIxS4AG1f9cENoyqffw8NFO4REJbMKti
 9sq6h5CwblIH6X61DDpBQuWdUGlypxYMe35BYJ_MYSDXv.KEpDQq2tn0o2EhkW8NuipClUgm3DGz
 LkLhAsNcGtzmMHybTGup300Jm2oMGiYgO3wGZAUWk_abbjuTOSQ9rG7OKqn9pcaf2FBY3qBRUiYO
 8VYa8FWwQSjJCwo_y2An7Edc75F1epOypAzQIfV_etxHE8j4j08Xc.JU7FIhOfcHKei1dOZ2T6Nz
 Cl5YPDNgmb2bOf5SyC30NZBAr7lq5DTdVNHn4P1OJqeskRWpkYd2wByzZsVsrnI3Ta1qzsI9w2BW
 Szui9B1c7iSm.AUa5W2CjL0JU1xFw8hLPMUBf8wPvF33vJTFA_vpGmgJ0fV1.Jb7AFTkudjfxX5z
 Mi2o0OGbUmVgA2nYYyq2RE.uAFM6d7wFcmPYSKFNaNIqMEGZ7QOWJxbLAA0b6uDtdE2o1pEg2lRA
 _.yYLJWZQGta5gh3xCx8PUX_XyMOTma9bPrpOteWDYNgsvtzml6PrPeJAlOnCHc5mIOksahjENDK
 yuuk49BPeo6lQnatYkxC61MPXgKJq6WMouto4Hwj4jCgFnxI2Y9M.utmrrO0D7Pgs2w86aYRLr5p
 LzCaQEcBgbw4h3PC4u1b0VFKPPdM.XaY6VGHrovIQ70AppK4xRy4OLCb8.Dk7ccPdnFgwgtsZwAp
 wlBAxdCIZKfJzxOuhZtj.npX8VkKXkkjcqiDaHc6M5qeC_aBFz_j5H0JE7T388qjwoy5SeX5vFtv
 sxplLcG6IeufwstkUbK8FKFLQ06hdzEOHZLQy4LVH9EOrnhjy5C15XRGd2ACKrp_1Q1maytE.l.I
 1t3hDFCYRDRKEPz1iOImd0tWWxQY1hjfBHDpK2xWsla_T89dNKd9KqUnjoP3n9A0cBuIE7kLhfRX
 x3SHgzrhAZW0hM9Ibpy_n.S3bvBmCm239USSei_Q7BT8vjSHC.7Pkb9H9hOe75gRfPhDy5zRIscK
 LnEQmCVoxZ407rxB9X8m1VJt2oLPO3Re6MpPc2pLd8mjwh.ZVySz.QCHQTK5_ddOgOLoljNi7vwx
 DTFHPtrVY06QZvTbldpVstibnmT9.QJOpLqMddn54JOwgO7ck9XyXdP.y0_EW8wUU4qUTf4QoHiE
 iTeVydIqRNjhWfCvd_jxTlP78MS9XVpUBDMygGLGFer3V_7lY2sI6w7RUyTU8H0wgoL9ea_yaHGA
 VwU_y8iLhmJIfFiJdmuYExKFwGGII8Dx0jvFBVD3Cx_.8vC2UZKQv89G5KTjtzz5HjqyIr7UFNZO
 MQAXRKkfSJUq5YLs87SQcb2HcFK6JWSBts2qXU1wqWlrRW.iFAHgkZeNPvrm27bqbKYc_OsnHP5Z
 mbABgQs6HQEn1xG.lxspVc31ee8RYXMBkNduZ.SVa1tDKjMGpzW_NRodR5ZSJQRb.R1ul4Z0YSio
 njBDSWhqq8Wb5FWIEb3RGymWmtBsC8B9FVqPqN8afP9nImac74F8IMFbu_QgB4F203J7vOqlamf7
 3LUL1vfEF5Lf9B8ybXI6rn3OrAZ5SyQUsEEtKtPPy3td.rjGc0XDBvONKRds54aqAujCc7VxLCkN
 xegUPcHNyKa.dzS4k82n7u6t2WCvKhsFKpaaaVLEM9GG4AzfhP9YIaEXWVyTYGlyhA9Vce0I.d44
 Pxxkp
X-Sonic-MF: <brchuckz@aim.com>
Message-ID: <01dc645f-6c98-0d93-6882-6e2f4dd29e8b@netscape.net>
Date: Tue, 15 Mar 2022 13:25:38 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: [XEN PATCH] tools/libs/light/libxl_pci.c: explicitly grant access to
 Intel IGD opregion
Content-Language: en-US
References: <b11b0b13-4f10-7d77-d02d-bb9a22bce887@netscape.net>
To: xen-devel@lists.xen.org
From: Chuck Zmudzinski <brchuckz@netscape.net>
In-Reply-To: <b11b0b13-4f10-7d77-d02d-bb9a22bce887@netscape.net>
X-Forwarded-Message-Id: <b11b0b13-4f10-7d77-d02d-bb9a22bce887@netscape.net>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-Mailer: WebService/1.1.19878 mail.backend.jedi.jws.acl:role.jedi.acl.token.atz.jws.hermes.aol
Content-Length: 10239

On 3/15/2022 7:38 AM, Jan Beulich wrote:
> On 14.03.2022 04:41, Chuck Zmudzinski wrote:
>> Fixes: abfb006f1ff4 (tools/libxl: explicitly grant access to needed 
>> I/O-memory ranges)
>> Fixes: 0561e1f01e87 (xen/common: do not implicitly permit access to 
>> mapped I/O memory)
>> Backport: 4.12+
> Just fyi: This is fine to have as a tag, but it wouldn't be backported
> farther than to 4.15.

That's entirely reasonable. I understand this is a bug fix, not a
security issue.

> Apart from this largely some style issues (see below), but please
> realize that I'm not a libxl maintainer and hence I may not have good
> enough knowledge of, in particular, potential unwritten conventions.

I will take your comments into consideration regarding style before
writing the next version of the patch, and carefully check libxl's
coding style file.

>>
>> @@ -610,6 +612,45 @@ out: return ret; } +static uint32_t 
>> sysfs_dev_get_igd_opregion(libxl__gc *gc, + libxl_device_pci *pci) +{ 
>> + char *pci_device_config_path = + 
>> GCSPRINTF(SYSFS_PCI_DEV"/"PCI_BDF"/config", + pci->domain, pci->bus, 
>> pci->dev, pci->func); + size_t read_items; + uint32_t igd_opregion; + 
>> uint32_t error = 0xffffffff;
> I think this constant wants to gain a #define, to be able to correlate
> the use sites. I'm also not sure of the value - in principle the
> register can hold this value, but of course then it won't be 3 pages.

What we are storing as the return value is the starting address,
not the size, of the opregion, and that is a 32-bit value. If we
cannot read it, we return 0xffffffff instead to indicate the error
that we were unable to read the starting address of the opregion
from the config attribute in sysfs. The 32-bit value we are looking for
is read at offset 0xfc from the start of the config attribute of the
Intel IGD in sysfs. The offset 0xfc is defined by PCI_INTEL_OPREGION
both here and in hvmloader (and also in Qemu). The data that is
read at this offset from the start of the config attribute of the Intel
IGD in sysfs is the 32-bit address of the start of the opregion.

> Maybe the error check further down should be to see whether adding 2
> to the value would overflow in 32 bits? (In that case a #define may
> not be needed anymore, as there wouldn't be multiple instances of the
> constant in the code.)

That would work also. Please not that I chose that value for an error
value consistent with the way the current function sysfs_dev_get_vendor
does it. While that function does not assign the variable 'error' to
its return value for an error, which in that case is 0xffff because
that function returns uint16_t instead of uint32_t,
I chose to explicitly assign the error variable to that value to help make
the code more readable. Your  comment that this could be a #define
instead is good. I also think we should use a #define for the error return
value of the sysfs_dev_get_vendor function Something like:

#define ERROR_16    0xffff
#define ERROR_32    0xffffffff

might be appropriate. But that would be touching code unrelated to
this bug fix. I think again the libxl maintainers should weigh in about
what to do here. They might let me take this opportunity to update
and improve the style of the patched file in other functions in the
file not related to this bug fix but I am not inclined to do that without
an explicit request from them to do so. So I am not sure yet what I will
do in the next version of the patch, but I will address your concerns here
and try to explain my reasoning for the changes in the changelog for
version 2 of the patch.

>> +
>> + FILE *f = fopen(pci_device_config_path, "r");
>> + if (!f) {
> While libxl has some special style rules, I think it still wants a
> blank line between declaration(s) and statement(s), just like we
> expect elsewhere. Effectively you want to simply move the blank line
> you have one line down. I can double check in libxlt's coding style file.

I think I followed the same style here as the existing sysfs_dev_get_xxx
functions. I will double check that and use the same style the other
functions use unless they clearly violate the rules, and note that I
deviated from the style of the existing functions to conform to current
coding style and suggest a subsequent patch to update the style of
the other functions.

>> @@ -2531,6 +2572,37 @@ int 
>> libxl__grant_vga_iomem_permission(libxl__gc *gc, const uint32_t domid,
>> domid, vga_iomem_start, (vga_iomem_start + 0x20 - 1));
>> return ret;
>> }
>> +
>> + /* If this is an Intel IGD, allow access to the IGD opregion */
>> + if (!libxl__is_igd_vga_passthru(gc, d_config)) return 0;
> Despite the provision for "return" or alike to go on the same line
> as an error code check, I don't think this is okay here. It would be
> if, as iirc generally expected in libxl, you latched the function
> return value into a local variable named "rc" (I think).

I will double check how the function being patched handles the return
value. I don't even remember if it has a local variable named rc for a 
return
value. IIRC it was either ret or 0. I understand that libxl expects rc to be
used these days, though. This might be another candidate for updating the
file to libxl's current standards.

>> + uint32_t igd_opregion = sysfs_dev_get_igd_opregion(gc, pci);
>> + uint32_t error = 0xffffffff;
> Please don't mix declarations and statements.

I presume you are saying these two lines should be re-written as:

uint32_t igd_opregion;
unti32_t error;

igd_opregion = sysfs_dev_get_igd_opregion(gc, pci);
error = 0xffff;

Please reply if my understanding here is not correct.

> I also don't think
> "error" is really necessary as a local variable, but with the change
> suggested above it might disappear anyway.

I do plan for the next version of the patch to use a #define for this 
instead
of the error variable (or add 2 to overflow it), so it will disappear in the
next version.
>> + if (igd_opregion == error) break;
> Like above I'm not sure this is okay to all live on one line. I also
> think it would be nice if you used "return 0" or "break" consistently.
> Of course a related question is whether failure here should actually
> be reported to the caller.

Good points here. I agree about consistency with break and return 0.
I will change this to return 0 and move it to the next line. I do not
want to change the current meaning of the return value
without knowledge of how the caller uses the return value.
IIRC, currently the function always returns 0 unless it encounters a 
negative
return value from xc_domain_iomem_permission, in which case it returns
that negative value to indicate an error to the caller. So if we return 
anything
other than 0 here, we might be returning an error code that the caller does
not expect or interpret correctly. I will also consider putting an error 
message
here before returning 0. A message something like "dom%d: Intel IGD
detected, but could not find IGD opregion" would explain the error that
happens here. I don't think a non-zero error code to the caller is
appropriate here, though, because, as already mentioned, IIRC this might
return a value the caller does not interpret correctly. If it is 
necessary to
return an error to the caller here instead of 0, it will be necessary to 
ensure
all callers of this function will interpret it correctly. I would 
suggest an error
return value greater than 0 to distinguish it from the return value < 0 
which
indicates an error from xc_domain_iomem_permission, but I hope libxl
maintainers will accept a return value of 0 here, at least for this 
patch. A later
patch could re-work the return value of this function which would also 
probably
require touching the caller(s) of this function to properly respond to this
particular error which is different from an error from 
xc_domain_iomem_permission.
In any case, I will double-check to see if my current understanding of the
meaning of the return value is correct before writing the next version 
of the
patch. For now, I will  use return 0 instead of break here and move it 
to the next
line, unless I hear otherwise from the libxl maintainers.

>> + vga_iomem_start = ( (uint64_t) igd_opregion ) >> XC_PAGE_SHIFT;
> There's no need for a cast here, as you're right-shifting. Also
> (just fyi) there would have been three to many spaces here. I'm
> additionally not certain whether re-using a variable for a purpose
> not matching its name is deemed acceptable by libxl maintainers.

I wrote it that way expecting a compiler error if I didn't do the cast.
I have not checked if the cast is necessary, though, and maybe you
are right. I will check and see if it is necessary by removing the cast
and see if the compiler complains.

If the cast is not needed, I will just use the 32-bit igd_opregion variable
when calling xc_domain_iomem_permission instead of the 64-bit
vga_iomem_start variable. I will remove the three spaces and use a
more descriptive variable instead of re-using vga_iomem_start if the
compiler insists on the cast from 32-bit to 64-bit.

>> + ret = xc_domain_iomem_permission(CTX->xch, stubdom_domid,
>> + vga_iomem_start,
>> + IGD_OPREGION_PAGES, 1);
>> + if (ret < 0) {
>> + LOGED(ERROR, domid,
>> + "failed to give stubdom%d access to iomem range "
>> + "%"PRIx64"-%"PRIx64" for IGD passthru",
>> + stubdom_domid, vga_iomem_start, (vga_iomem_start +
>> + IGD_OPREGION_PAGES - 1));
>> + return ret;
>> + }
> I have to admit that I find it odd that this is done unconditionally,
> but I notice the same is done in pre-existing code. I would have
> expected this to happen only when there actually is a device model
> stub domain.

I don't understand how that works either. All my tests have been with
the device model running as a process in dom0. I am thinking maybe
in that case it just uses dom0 for the stub domain, but I have not checked
that. I will check it by dumping the value of stubdom_domid to a log in my
next test.

Thank you for responding promptly. Now I have some work to do writing
the next version of the patch and documenting it clearly in its changelog.
It will take me a while - I will spend enough time on it so hopefully the
libxl maintainers don't have to spend so much time on it.

Chuck


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 17:41:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 17:41:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290910.493538 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUBAh-0006i8-Ks; Tue, 15 Mar 2022 17:41:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290910.493538; Tue, 15 Mar 2022 17:41:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUBAh-0006i1-HN; Tue, 15 Mar 2022 17:41:23 +0000
Received: by outflank-mailman (input) for mailman id 290910;
 Tue, 15 Mar 2022 17:41:22 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=R8Gi=T2=linuxfoundation.org=gregkh@srs-se1.protection.inumbo.net>)
 id 1nUBAg-0006hv-Pp
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 17:41:22 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 1e9fb63c-a487-11ec-853b-5f4723681683;
 Tue, 15 Mar 2022 18:41:20 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 805A8615D9;
 Tue, 15 Mar 2022 17:41:18 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2C2B7C340E8;
 Tue, 15 Mar 2022 17:41:15 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1e9fb63c-a487-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org;
	s=korg; t=1647366077;
	bh=EmukrZJTdPmX8L6VDOzfmJxS+zks3StStKzljU+KjtE=;
	h=Date:From:To:Cc:Subject:References:In-Reply-To:From;
	b=vieN7aSfas4bwleZQHaaKc295kUVhZzTXvlvwVkk4vzdb7Wgna7FFSScJko73nmLs
	 8AvMlkMjJuD+XC6wp6kbCMKA5XWcYPdqvQp3rI6nRLi7VBwkLIpauQ06Nik/oDH9ol
	 XP+Ps48LyJwWQ7Kz6051771iMJwhU/gqzkoze/Qk=
Date: Tue, 15 Mar 2022 18:41:09 +0100
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: Juergen Gross <jgross@suse.com>
Cc: xen-devel@lists.xenproject.org, linux-usb@vger.kernel.org,
	linux-kernel@vger.kernel.org
Subject: Re: [PATCH] xen/usb: harden xen_hcd against malicious backends
Message-ID: <YjDPtRhdrtY6tpvc@kroah.com>
References: <20220311103509.12908-1-jgross@suse.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20220311103509.12908-1-jgross@suse.com>

On Fri, Mar 11, 2022 at 11:35:09AM +0100, Juergen Gross wrote:
> Make sure a malicious backend can't cause any harm other than wrong
> I/O data.
> 
> Missing are verification of the request id in a response, sanitizing
> the reported actual I/O length, and protection against interrupt storms
> from the backend.
> 
> Signed-off-by: Juergen Gross <jgross@suse.com>
> ---
>  drivers/usb/host/xen-hcd.c | 57 ++++++++++++++++++++++++++++----------
>  1 file changed, 43 insertions(+), 14 deletions(-)

Fails to apply to my tree:

checking file drivers/usb/host/xen-hcd.c
Hunk #2 succeeded at 720 (offset -1 lines).
Hunk #3 succeeded at 807 (offset -3 lines).
Hunk #4 succeeded at 934 (offset -5 lines).
Hunk #5 FAILED at 986.
Hunk #6 succeeded at 1003 with fuzz 1 (offset -10 lines).
Hunk #7 succeeded at 1048 (offset -10 lines).
Hunk #8 succeeded at 1072 (offset -10 lines).
Hunk #9 succeeded at 1161 (offset -10 lines).
Hunk #10 succeeded at 1516 (offset -10 lines).
1 out of 10 hunks FAILED

Any hints?

thanks,

greg k-h


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 17:45:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 17:45:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290913.493548 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUBF3-0007L0-5d; Tue, 15 Mar 2022 17:45:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290913.493548; Tue, 15 Mar 2022 17:45:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUBF3-0007Kt-2b; Tue, 15 Mar 2022 17:45:53 +0000
Received: by outflank-mailman (input) for mailman id 290913;
 Tue, 15 Mar 2022 17:45:51 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=WDZV=T2=citrix.com=prvs=066e9a523=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nUBF1-0007Kn-Ps
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 17:45:51 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id bf3cead9-a487-11ec-853b-5f4723681683;
 Tue, 15 Mar 2022 18:45:49 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: bf3cead9-a487-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647366350;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=tdqwOLsydB3QGIE8UtWDUhYHs6hDV7qNDrCkFHQ/LMU=;
  b=Wsi9gd2KGardq+P5RRZLAIDHuTQc10tvyr1WFvs5nV4OvbKPrfLXkXDJ
   UC+KRSdFTao/pkx4hvq4KkgKN1v9r5X3oei+QYxi5eaRC9MrxO3HsMi8B
   oHQ9u1FplJ0WhC58bUntV60PaVVc426MI+d5s9CqI9vYiec8UjzH51F9z
   w=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 68673786
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:zFNvF6s9ZXuK92LLrs1yA9ffMOfnVN5eMUV32f8akzHdYApBsoF/q
 tZmKWGOa6nfYTbyL48jaoTi9UgA6sKBmoRlTlBo+Xw2EC5G+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jU5
 IupyyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi8bJ6aRlusUSiVWLB1SHKkZ/5XJYlmW5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvllJyz3DAOlgapfEW6jQvvdT3Ssqh9AIFvHbD
 yYcQWQ/MkubPE0RUrsRIJJuvuL1nFXOSGxdrn6Qorpt+0vC7TUkhdABN/KKI4fXFK25hH2wp
 H/C/mn/KgEXMpqY0zXt2nCmi/LLnCj7cJkPD7D+/flv6HWMwkQDBRtQUkG0ydGikVK3Ud9bL
 00S+wItoLI0+UjtScPyNzW0rneLsR8bX9t4CPAh5UeGza+8yxaUAC0IQyBMbPQitdQqXno62
 1mRhdTrCDdz9rqPRhq18qqfpHW8MC4eIGsGeAcNVw5D6N7myKkxgQjIVc1LC7Oug5v+HjSY6
 y+HrW41h7gVpccR0uOw+lWvvt63jsGXFEhvvFyRBz/7qFMiDGK4W2C2wWrC5qtOI4+Acle+g
 FQln5eZxu5NLLjYwURhX94xNL2u4v+ENhjVjlhuA4Qt+lyRxpKzQWxDyGogfRk0a67obResO
 RaO4l0JuPe/KVPwNcdKj5SN59PGJEQKPfDsTbjqY9VHefCdnyfXrXg1NSZ8M40A+XXAcJ3T2
 7/GKa5A7l5AUMyLKQZaoc9GidfHIQhkmQvuqWjTlUjP7FZnTCf9pU05GFWPdPsly6iPvR/Y9
 d1SX+PTlUkACrykO3OHqNRJRbzvEZTdLcuvwyCwXrTfSjeK5Ul7U6OBqV/fU9ENc1tpehfgo
 SjmBx4wJKvXjnzbMwSaAk2Pm5u0NauTWUkTZHR2VX7xgiBLSd/2sM83KstmFZF6pbcL5aMlE
 JE4lzCoX60npsLvoG9GM/EQbeVKKXyWuO55F3H8MWZlIMI4GVChFx2NVlKHyRTixxGf7KMWi
 7ahyhnaUdwEQQFjB9zRc/Wh0xW6un11pQ64dxGgzgV7EKk0zLVXFg==
IronPort-HdrOrdr: A9a23:2TpiYa4UJfrFgBrNjAPXwWaBI+orL9Y04lQ7vn2ZFiY7TiXIra
 yTdaoguCMc0AxhJU3Jmbi7Scy9qeu1z+873WBjB8bfYOCAghrnEGgC1/qv/9SEIUPDH4FmpN
 5dmsRFeb7N5B1B/LzHCWqDYpcdKbu8gdiVbI7lph8HJ2ALV0gj1XYDNu/yKDwseOAsP+tcKH
 Po3Lsgm9PWQwVxUi3UPAhmY8Hz4/nw0L72ax8PABAqrCOUiymz1bL8Gx+Emj8DTjJm294ZgC
 j4uj28wp/mn+Cwyxfa2WOWxY9RgsHdxtxKA9HJotQJKw/rlh2jaO1aKv6/VXEO0aOSAWQR4Z
 3xSiQbToNOArTqDyeISC7WqkzdOfAVmibfIBGj8CPeSIfCNU0H4oJ69Pxkm13imhAdVZhHod
 J2NyjyjesnMTrQ2Cv6/NTGTBdsiw69pmcji/caizhFXZIZc6I5l/1VwKp5KuZIIMvB0vFuLA
 CuNrCp2N9GNVeBK3zJtGhmx9KhGnw1AxedW0AH/siYySJfknx1x1YRgJV3pAZMyLstD51fo+
 jUOKVhk79DCscQcKJmHe8EBc+6EHbETx7AOH+bZV7nCKYEMXTQrIOf2sR+2Mi6PJgTiJcikp
 XIV11V8WY0ZkL1EMWLmIZG9xjcKV/NKwgFCvsukKSRloeMNoYDaxfzO2zGu/HQ1skiPg==
X-IronPort-AV: E=Sophos;i="5.90,184,1643691600"; 
   d="scan'208";a="68673786"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=fd3CkHmW9DXQCqPIMyLT0TS+Rc5Nr7ZCpieupJRIpF/zdSI1yfdWPKZ23/N1Q00KvhW7PJ/KUKaRl6/YeKoHp2mlAIIF4S/c8lesD3qywN4/IHlVp7c0BGjQ5FiAxA8vjPN9ygC5f8knHwu84aTSwkPx48Yf2q/IxfiEZ2XDNXBQMRwCl1IgSxC6w9rFXeeFo01sxZUvweC2n7L81aXn9cnfNFDHtVr/AW5thQxW1/LkRhXgsuzPbwKGWrQ2wIrS8Jod5HtKx5OZIYnyDgW6fB6GLotTJFReTJAXmO+uzMQw5DvUPptWgUQtjU/rkLd69Oplze3fd5G04MxN674JYw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=tdqwOLsydB3QGIE8UtWDUhYHs6hDV7qNDrCkFHQ/LMU=;
 b=K4McM3JZfWAPDUllIZBCtaXNABYm6miNift5SiaBxYzCISZrfPeYHfEmreWGfNQYwjUNpLpgt3Hk/JR5fiRN9FiKlxJ1JWNMu7MFV5EABcHP8Mx3D2wfhpuJ+98Vst9ivFiHUCgdlI5r/OfIkI/63ppriRUbVPYMwwoclRa01dOs0LVhLL0isASuA6DTa78r/J3XhTQJv4ohmZy8IxzYIUoHkp2hB70oQiOjmiPS4LFl9p0MNc67tPYHDlZ7ZqK/zyIwXetWxHQoyJdqSeFBQ0oqVgl4bfCU2HQi3BumeKGeakW3Bnowf49NAzUsYtTIkuKTOVLS65AWOa/Hj+f1Wg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=tdqwOLsydB3QGIE8UtWDUhYHs6hDV7qNDrCkFHQ/LMU=;
 b=rnDmAvL6GRdA2jKgBGagbUUfMhqwZ8/COQkaucjqaBYXCQ9AjNS3LeXxd45aASamIG9tUW/Qr04oRNhI6BJdJcJJXOHZYyPoG3nTAA6t5nTtNTUi09YtJSKuLiIgp4VsCPp4UOEVqjLnwpOvJfRIgXNfWgzu2XZQKPxYoz3XzN8=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Luca Fancellu <luca.fancellu@arm.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: "wei.chen@arm.com" <wei.chen@arm.com>, Juergen Gross <jgross@suse.com>,
	Dario Faggioli <dfaggioli@suse.com>, George Dunlap
	<George.Dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien Grall
	<julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, Wei Liu
	<wl@xen.org>
Subject: Re: [PATCH v2 2/6] xen/sched: create public function for cpupools
 creation
Thread-Topic: [PATCH v2 2/6] xen/sched: create public function for cpupools
 creation
Thread-Index: AQHYNKHhVJSeUIj1QkeG/vMUhWMLjKzAv7cA
Date: Tue, 15 Mar 2022 17:45:42 +0000
Message-ID: <ab2df199-ea89-d965-f0cf-ef7fb48a949e@citrix.com>
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-3-luca.fancellu@arm.com>
In-Reply-To: <20220310171019.6170-3-luca.fancellu@arm.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 39b3adbd-f37f-46e4-12da-08da06aba086
x-ms-traffictypediagnostic: CY4PR03MB2664:EE_
x-microsoft-antispam-prvs: <CY4PR03MB266411539EAF8B4AF47C1E26BA109@CY4PR03MB2664.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: W4p4PKzYHdnoZQHGT9ds0J4Blss2UHU0WvO8MP14riXQXs9ipDMQy3kzZUOFSYoIb5v5unQE7GERJwMdTmECEaktZvGwN7nRkeWlWyA0PnOYGarXIGbZl5L8Y9RzsrCwvaE0c/uBx6rfWW4U4Io0xRoI1h/6vEpo6ZpteRHn3S/vwynXfsBiw8fB8Tva9FgErGi/MRadK6rhYYXZNSw4sfp+w15so4wrVgO5P1+/qSmsPSCgre+jWVf9v7ACyTaHBvwuIjjaMZB1ATENKdp7BSjES85s1h04V9eIoa1zR6RZcWnFZvH3vvE+791RS0p9q61df4AJZ1FczHpM25e/CVgl0NIjINNPey0qcsQO2V9WRyzrSP4w5pnXECi0r+zJej/7nM2USqXnxzOeyFWMBawjmxXQEOu14pW+8MVqyqetr/dwbNsItTxPCl7TB8POVWOSavvBACikOi4uszuAaOx8BUh6xgQWhfW3UfzAnHh/29aJFqgQ4ppD3hsdhKlB49iN5g0hBs0YUZnU4THmGBzok+KrW0XyOj8BmZkg3sG6BYQdeexDcSELQkqG9O0Mi9YA71L0utT/UgzJXGmMFnVDul9Msl0lS52IWbn0INnDIOboPT+ft58TyiholfDWRkPUtdiRjgXuATyluL4HIbOxvq5RfbvTaKKHOR6cxoExyM4akyrWX3/b/GcZF4HJJNjdMniSRFgx2Do02XowIptLuv0S346YUQ05uvw9+loeKYdR39DQNUU1jIehg9aV0TWkT4kkj5UHUoeWXx+JXg==
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(38100700002)(6486002)(71200400001)(2616005)(508600001)(122000001)(2906002)(36756003)(31686004)(26005)(5660300002)(6512007)(6506007)(8936002)(186003)(38070700005)(8676002)(316002)(110136005)(54906003)(64756008)(82960400001)(91956017)(66946007)(4326008)(66446008)(66476007)(66556008)(76116006)(53546011)(31696002)(86362001)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?NGhQeVFiSyszOFFrQ1Jva00yTHJIQTRHbDFaeElUa2dkaWxvQkJZeVBpbERE?=
 =?utf-8?B?K0xwWUtpd3ZKR0hnTzVPQk5KQXdoY0pUWHh6NXZ6VTZ3SjJlZDdWVEU1WTJz?=
 =?utf-8?B?VlpZaGZKSm02NEdRSVNQYXJURzcyZmhES3NRYlBCdjFDeFI4b3QzdWFabVNH?=
 =?utf-8?B?Qm1UbmpLdy9MdUtiTzlZVDhHbkxSOWdpVzhNZm45V29QTmQrRjA4NEdKcmVU?=
 =?utf-8?B?OEg5a3BNRDE1NkRYYk1DZTA5b09FdnN1Y0wyRHlVaU5lcTVCUzB4R1BqanpY?=
 =?utf-8?B?UjN6cUJpdW1CbWVjR1JQcElURVdTRzRmQ1I0YWozcFR1cWc4NkVWbm9ienY2?=
 =?utf-8?B?Qk4xVitscmxmbEorTDV5Z09NZ0lTN2MrRVE4YkJTNXBFUk90RU8wY3B2MW9i?=
 =?utf-8?B?SjR1TFlxcjFGMVJNWnpwNmdueEM0clBSNEF1Tzc3ZmtJbnNXOGUxMFlwQ0Zo?=
 =?utf-8?B?OWl3aDcyU1JNazdqZkVsbHdvSWV4OGFKWTB2aXVkOEdhbG9YeUt0azczZTR5?=
 =?utf-8?B?UUhQYVM5bkRnNjR6UnB2ZkdNTDNMVGlzdythV1pJVjE0Y2JvN0lVaVFqTkRE?=
 =?utf-8?B?Y3BVS3dXM3lIN096NXlGMnVlc1ZqbitBYlRCeHdYeGg3R3dWMDRkVUwwajVW?=
 =?utf-8?B?YXpsY3VnL1dyWXRIR2cxMEhYc0o1SGZZMG9qRndGSnBIVXVuYUVBMGdXeWdK?=
 =?utf-8?B?bUFQTk1jcE9vek9ucEk0d08vNURHR3N4WCtKYkJnTlgxelQvc3VDSTc4S085?=
 =?utf-8?B?VEdqS2s3NHJwYTIxbHFvZkt2UEFTdlhOSTFhU0duSVplbWh0ZTBLYnExdC9z?=
 =?utf-8?B?VDBGQ2Y5MEdVUm9MZXRWTlVDUkJtMGtTdlVRczF3ZHJwcjA5Z0dyM2drRmlm?=
 =?utf-8?B?bjR2ZXRMKy9HYm1DUVhXTktDVkVZUjBDZWRKRzhvcTZFYjFaRWwyU3E5bHJI?=
 =?utf-8?B?MFhqYk1MbUZzdmFZNnF4RDN4YmdYemlTREQxdkNlT2k4aVdkZnhDSXJoaVBE?=
 =?utf-8?B?c3VqbHVWeThGWEdLa25aeUduNWFFSms5YWlIS2hPWUdGRlRwd1BBQnNFY01H?=
 =?utf-8?B?RkNrcmdtZUw2a0h0Yzg0VHA5Z3RwbEhKTHZkcDg4NkFhdXpKaTV6Q3VNeXlv?=
 =?utf-8?B?UCsyNStlZU51WGY5bVgxek1WNVduYTB6VzlNcTVhODFWaFNYcGpRRVUvNlUz?=
 =?utf-8?B?NTl4aHBzWjBPQ0VJblUyUFZ1eHZCdXI1QktuQjgwNDlubWRKNTNlQmRLZnlL?=
 =?utf-8?B?d3IxVlVqajd5VmNJUXVadllkSGMzczdEdS80MU04WGt2cXBWdW9CZ09tSWpC?=
 =?utf-8?B?K0d3UzFROGpWOE43R25ZbkVWU3FkWWNSWjYvQlBKdGE1QnAyUHd6MElOY1Fn?=
 =?utf-8?B?YXVrQm5JaDEwcE45WU9nbUowRkRjSllyTS9kb2xBY0IrdzdTbDlPQWV5TGJx?=
 =?utf-8?B?SjBVYVd0aXJkaVlMS21MWHk0MFFKeEM3N0JiODRzRVk4UU1SZmJwTXpiM245?=
 =?utf-8?B?cURrU3ZZNGRCWDN3Sjh1bllCdHV4WXZ6MHVXb0xuZ2oxeGIyUndWekZUV0cx?=
 =?utf-8?B?MEh4MUtzVnhpZ2hvQjZKV3JuajlRT2JTbVY5WVNHaEdvekRjTGZMb3VhTTVt?=
 =?utf-8?B?NEl2MXRqa0RuMmpzWUhnRGFtazJHMnlhMTFkZGovL2VUSEJleXY2RjFKZjlN?=
 =?utf-8?B?b3hSdGxnK2trUzJOWW5xaW9MN1NJUmZncVU1d1Z0VTZzaGFUZ05ZaVE2OXh4?=
 =?utf-8?B?TndsUkdDR0dheUJaNzF0T1dlSXUwNmp3c2gweDVGTjRxSFJLYXhiWGxYTkw1?=
 =?utf-8?B?VFRQT3lJNWd1dnNwemRTQUhGdnh5bGJlUkU5NStBRGpZWTBIWExyZzRSWmxa?=
 =?utf-8?B?aElRNjdBYjFSTkVGdjNZV2cwRWkvU21wREtTcGwyUHhEeTdjYmYzMGpQZmZP?=
 =?utf-8?Q?DMmEzwoX8k0l/dLbzCfsASOOOyNSNWWa?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <6C49AF86F1BBF349A35894669B2442A7@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 39b3adbd-f37f-46e4-12da-08da06aba086
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Mar 2022 17:45:42.6318
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 6Ar2EG8vkLHWBzlMinaPCgvEEKctw7JSHZlgjuR/JQcXT7fKvqulfv77RWl8jZFBqXpv33z0NjJfTTMjH1u3C0XKv3vcjy/bqGMU8ZkvqE4=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR03MB2664
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Tue Mar 15 17:50:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 17:50:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290919.493559 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUBJo-0000PP-QQ; Tue, 15 Mar 2022 17:50:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290919.493559; Tue, 15 Mar 2022 17:50:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUBJo-0000PI-NU; Tue, 15 Mar 2022 17:50:48 +0000
Received: by outflank-mailman (input) for mailman id 290919;
 Tue, 15 Mar 2022 17:50:46 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=CG/1=T2=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nUBJm-0000PC-Ke
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 17:50:46 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04on0606.outbound.protection.outlook.com
 [2a01:111:f400:fe0d::606])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 70a2beda-a488-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 18:50:45 +0100 (CET)
Received: from DB6PR07CA0097.eurprd07.prod.outlook.com (2603:10a6:6:2c::11) by
 PAXPR08MB7122.eurprd08.prod.outlook.com (2603:10a6:102:205::11) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.25; Tue, 15 Mar
 2022 17:50:42 +0000
Received: from DB5EUR03FT034.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:6:2c:cafe::32) by DB6PR07CA0097.outlook.office365.com
 (2603:10a6:6:2c::11) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.7 via Frontend
 Transport; Tue, 15 Mar 2022 17:50:42 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT034.mail.protection.outlook.com (10.152.20.87) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Tue, 15 Mar 2022 17:50:42 +0000
Received: ("Tessian outbound 31aeb3346a45:v113");
 Tue, 15 Mar 2022 17:50:42 +0000
Received: from 19ec52f9c2e4.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 B2DE541E-06CC-45CF-A944-8346B06C8AFF.1; 
 Tue, 15 Mar 2022 17:50:31 +0000
Received: from EUR02-VE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 19ec52f9c2e4.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 15 Mar 2022 17:50:31 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by DB7PR08MB3644.eurprd08.prod.outlook.com (2603:10a6:10:4d::15) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26; Tue, 15 Mar
 2022 17:50:20 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5061.029; Tue, 15 Mar 2022
 17:50:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 70a2beda-a488-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=O7y2d/oRAkaL4YdWMZFQJAxitro2bMzVLalVsVklBPI=;
 b=jm+g3efCLeLm+8Jm70LDnhvb6wA5PEwaI/kCIr+mTmXxXDfENO8YqS9u/F8aHmqrCrXqwROnvism2a+0poyAvH+WfwnnLc0v3I+P6L+SP/OsrTG12PxxZg6jQpp/l6g3rGcpF8MGnmEGGBnBvmkkh8HLfl/AVlsKaTlXXwtR+Yw=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 74f5ca99f93d8e75
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=dQSUmry2iREd0uQL66JaU1uTfp28BHBl5D3o6ivfgt22JZAsneRauZaSVztHLPMk66bP5WT0yqUSYRCLUCbf0l/wMfHKQdeHtD5K6WdcbZz6jfdBDEUWJ0WneTfHSMZ6ic58elwnKCITbcs6koZguA6dC+Jr1pEYhB6tlCg1cTCyiweJKs6v7DQKr4BI1mx16k2VMRIzcy32z9tWIBGGmIZmOA8aUpofEBlsMEM1dorjibM42kq/3JWUS2dB2UTNM6JbZsPuVozipVHeaVqY3s5qoH9I4ekrpSRlt2OPPFIlQJwW6fCUuHG6XE3N4i/iUYtr2XaDKSlAwPGkWCt8dA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=O7y2d/oRAkaL4YdWMZFQJAxitro2bMzVLalVsVklBPI=;
 b=Ptg01z9d0GRPtpeb/0J+yirH4S5nFpHejNLueT+BARK2zSy1MXNgjLytUIxmnTl1Xf/iKTWFYewq26hV1icfhv6W7NiQyayJNL3BtmvQUU7PLNInf3lO4fGz6SwT7FH7hXYYs0V0AzlyhWSuwr/CbQcoBL1Dv0dELUmSNq4ITJu6NzJiB79g43Ghf0tec6SwijxtFS0ZRTvZz2RElmN2kYC2n5rPd4WE00lSV8rdBE1wHMuUNFEBJM8sete4YgdTgGMqQtWNFvkXoNzLAfNP/jx9nq/GNIoRKBq34wDlapIaHRFkvWcMXJYc01QtNvXgGjJBDUvIAV7kBj0B645Szw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=O7y2d/oRAkaL4YdWMZFQJAxitro2bMzVLalVsVklBPI=;
 b=jm+g3efCLeLm+8Jm70LDnhvb6wA5PEwaI/kCIr+mTmXxXDfENO8YqS9u/F8aHmqrCrXqwROnvism2a+0poyAvH+WfwnnLc0v3I+P6L+SP/OsrTG12PxxZg6jQpp/l6g3rGcpF8MGnmEGGBnBvmkkh8HLfl/AVlsKaTlXXwtR+Yw=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Wei
 Chen <Wei.Chen@arm.com>, Juergen Gross <jgross@suse.com>, Dario Faggioli
	<dfaggioli@suse.com>, George Dunlap <George.Dunlap@citrix.com>, Jan Beulich
	<jbeulich@suse.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH v2 2/6] xen/sched: create public function for cpupools
 creation
Thread-Topic: [PATCH v2 2/6] xen/sched: create public function for cpupools
 creation
Thread-Index: AQHYNKHPindJgoRlsE6X+ucflL5fkqzAv7cAgAABSoA=
Date: Tue, 15 Mar 2022 17:50:20 +0000
Message-ID: <776C4F32-A01C-48F5-9A43-C8F94633E2F3@arm.com>
References: <20220310171019.6170-1-luca.fancellu@arm.com>
 <20220310171019.6170-3-luca.fancellu@arm.com>
 <ab2df199-ea89-d965-f0cf-ef7fb48a949e@citrix.com>
In-Reply-To: <ab2df199-ea89-d965-f0cf-ef7fb48a949e@citrix.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 81f0ab96-538d-4ea6-d110-08da06ac531d
x-ms-traffictypediagnostic:
	DB7PR08MB3644:EE_|DB5EUR03FT034:EE_|PAXPR08MB7122:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR08MB7122E00562AA10D950A4D6DAE4109@PAXPR08MB7122.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 eD4cZaABiDa0X37EDf7QAxFpwtnJuYaoznwYS6sIyXT5KwXwWmFiRpQd9UWhy62SSDbR6skphmBiXg8hfDQn0bWHJ3YRmlNfAJgPudd74VrwVcE885+lOl4904ZUj5PE5yiVTRtPXal7ZVzmkikAqhLDs2ayc3b/XcRhMFEJMrQLrfyGtbt1U/uLxjdnZ2r/6t3r9vDDRlTgjUXPd/fnn8hsiT53/dBsNCPtr/njS5azx3NGQgX+PslYw6QcpZ1sb+UKQv5h1znOcfBgQikdt49JZTC41sMiyd0fZMrvFlXPrQMaWUNhnwyMazJc/g/P0rkSYWisgY4OqAInvF8yM+O3LVOv8iR6jAyh3Qiuj7VfqU2g3ppYCAEH9McdsdlA7zEzo0yRo+/JnE5IWjhMwOoYbs65gHqQobLytfNHspPpVg8tlqUMXiOE8xsNjOl0qngAHVnvhQmeia5sxyN92hrPZB5wqK61+j8xvf4SCaZ7JAqNWOo9YnMafk/ueSwHG9YZswreBs0Qv26eMVaJsicbfrtO6MJrvtXl4seeslidnsHd5puGlC2xTWcvL05biE5OqGaBm55Z2ja2DDZZppPexTYLykzUaATxiCtO+urfC2LOkdckQ/hDrue6fcFrGg0+6EZvxk6z728IzT/3lfLOMZC+wfHaWMS8zIiPHwep+UOGg68IC6bSRGSB9Q5hPFUhMSTSlxBv2BnFPW3ARVFfs5ficvQAdnU99eC4MeWeBgpiuCHnRtVKu6czvZQ6
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(66476007)(2906002)(66946007)(64756008)(66446008)(76116006)(66556008)(91956017)(4326008)(8676002)(33656002)(8936002)(5660300002)(36756003)(54906003)(6916009)(316002)(26005)(508600001)(71200400001)(2616005)(186003)(38070700005)(38100700002)(122000001)(86362001)(6486002)(53546011)(6506007)(6512007)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <534C7C39CBD5EC43801B01096D9A7A3D@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR08MB3644
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT034.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	6c6e06a6-75ae-49eb-1650-08da06ac460a
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(8676002)(70206006)(2616005)(70586007)(6862004)(40460700003)(4326008)(33656002)(36860700001)(336012)(5660300002)(26005)(186003)(82310400004)(86362001)(6512007)(508600001)(6506007)(53546011)(2906002)(6486002)(356005)(8936002)(81166007)(54906003)(316002)(47076005)(36756003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Mar 2022 17:50:42.4794
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 81f0ab96-538d-4ea6-d110-08da06ac531d
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT034.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB7122
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From xen-devel-bounces@lists.xenproject.org Tue Mar 15 18:31:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 18:31:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290922.493571 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUBx5-0004fV-0i; Tue, 15 Mar 2022 18:31:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290922.493571; Tue, 15 Mar 2022 18:31:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUBx4-0004fO-Tc; Tue, 15 Mar 2022 18:31:22 +0000
Received: by outflank-mailman (input) for mailman id 290922;
 Tue, 15 Mar 2022 18:31:21 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=w9QY=T2=aim.com=brchuckz@srs-se1.protection.inumbo.net>)
 id 1nUBx2-0004fI-MS
 for xen-devel@lists.xen.org; Tue, 15 Mar 2022 18:31:21 +0000
Received: from sonic307-55.consmr.mail.gq1.yahoo.com
 (sonic307-55.consmr.mail.gq1.yahoo.com [98.137.64.31])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 18ac10a6-a48e-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 19:31:16 +0100 (CET)
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic307.consmr.mail.gq1.yahoo.com with HTTP; Tue, 15 Mar 2022 18:31:14 +0000
Received: by hermes--canary-production-bf1-ff8c5d676-gcp4r (VZM Hermes SMTP
 Server) with ESMTPA ID 3cf9313018d59551d96e7b7a84034beb; 
 Tue, 15 Mar 2022 18:31:10 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 18ac10a6-a48e-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netscape.net; s=a2048; t=1647369074; bh=oho/+qOw29G0gsInJoiLP2QFv/JNVB5CxhH6u6tiO7w=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From:Subject:Reply-To; b=Fni9KFhk20yUZISR7PzfRx+ASa2BNC18HfVYZenPE70ZsBEdAFB7LrB/fGnJAM87sUeqGSYQ71mUHfU6z0SRlhoBp+q7Xjfky1BFQHTGW40G8uwQBHJ8o6wIBhI8G/JkFP7h/VBS5hzmh91orFqdpYa35SHkn6faxdjGKxvSwqOo/haujf2t6BCwOLl05MTkmsLfLLwO4g202RQYdoJZcrrQFIvLc35SUGw9ypii+wheWy38xV5y/GtJgra6ABbtXnw2ov+gCja42rvipv7R52agbUw3QNU7mRPBhnKHPEePd35QJE3i7M2c3QvD2qdAOdLJOFIDVqliUazsSa69MQ==
X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1647369074; bh=LPWiX+Y8PAZmnS7CGV5HGCjecUzjVtplsNypTVo8aBC=; h=X-Sonic-MF:Date:Subject:To:From:From:Subject; b=QUM+WqJIcmjDkD34wekLh61FilTisKnlulJ7AuSjXH58hHtsjlQHDLMLe6ZzyFUQC19OyDD4z58s3h+ib8EVK34uhDECVlja65AKQgfGsjqA9Hkk/1amQm6w6PK0u9/gO46WCsL47bDGiZDgRBOxRrv68A5Py73VGEZ/XdnkVup17wUOL9jEb38ux1rOeC7MlADcPefxWB8tKSw+xT4nlnJTEuQG2BNyb5+/umaPezgUOixgfN0kA/rvZV2mLABjtcDdhyMZUge6gKyONOUVrK/tlaGO5byT/EkpbAiFwuTz3HkdYPS8OJGJy7G+mFZ8ocEXmDOTAGxrKSJv7EM99g==
X-YMail-OSG: jgCi8yQVM1kDD_9BUHUyZ9NspAzfBsjPZWx5a_OXRuxl.OKX4cPu7ExfzpNqQ..
 iAZmVDGDABMzWmNqWVcqLa4qCXV_.eivvGCqBKr_6iZuIkkuW5pmVg7Czbg_h_g1.lp.gUHDiKO.
 zYPzNuQ._u4OMnSedmCQPi04weHA79X7zqNPbYxuej.qRkaaL8Dj9LvbxtRh9JhDORHqd_AGtiRH
 yyruPzKEDxkYFGd7cV0anGSKZ6GRJSHew_e6VpoS2UQQapBM_gkEB0.N_MRPDtUbjvc2Q4rJimwp
 kPbadwLg.EwqaJxCKcgbABmmPWN4z.3HcIRbrLZdfzby4nTqO2tngY_N5FH0AsDHs8v9ReSf023i
 rjZ_2dQ2aYNpivcwzsOlZ.ZQsDaFcS8_w92r.ar98kQ0W8KS7j3gVF2ZYnzZTuWkOJcjyBcndaf.
 0kZ0700Yi8kOuhb72vx4L4J5POHw_j2dPoG5cP_OVO3PIYjsb8SlnYiNOKMBybYLxyMiGnem375Y
 .Vp9rDKKshDA2uMJOUnf_hpbazm5tbMCWvR41MZXkX_Syv.nx0RQK1cM8EmQZMPitNquOWmbeBDC
 ilc2I6.SQFjgdY34vq_SLFeM1E7u7svCNcDyPFl8iG_lEx9MWxyNjEQ2eUW.Wvh2OB7kiJICx77.
 Iush6Ohulops.n2c7aoGF7NKRNX1H7UM2ZRNDX7nC9y6K4f2Vpv0WQZZsPZcJrEIW5Qnt59HxuPo
 Do3wzdBksXfxDelsbJDpJaCVKzTnNiDNCjY49yo3jHOHiNTjPo1tBjQx9S3_2CHnHSS9iMnQnU.7
 ClspwLGSFRwPoRxXSkZaoNtjuei75XoEH_g2tghvgfzfFdkevsaYebYcVJm.R6gY98.H34.q2.YJ
 behgfR.z3xeQb2kVtzuyQrxVxWdm3mlLdq1GYAYiCmHKzXA0vG3zchtLgGdKAezEfQp2JPNSqt5d
 amedKnyM0vkFWaB01E5RBVnK7DdkBYUVatVZMTwYJ21zSBu8JcMAj16Cgt7ttirB98qfDdziKaQW
 fhcNeoZA.4bxY6Jjo7QYJY4xd4tH9BBndXcRw0Dh3dSHKY1jme3Rqj9m1b48rC_js233Ru6yhqdd
 jXkb_OiouhRIMdIBifxGV9lVNCcIBagy484ng1tT1M4AYk5hS14_n503HeHXs_AXspmZOkcyf6X1
 2RC1DyuYd4_.qkcIVWFcBXPJneFat2WyIMniM1Gf0IQ6HZoddEXbgbGP_rp_NU0_Fv0w2Ifk4AQf
 cSQ2GzttfgRTH0c8cC34ANxCUqT9hfNajQd_EsAvPhZyzpM6WlVBBitA2FbjcU5nWI61_nOe6bj4
 cHvZZuYAYNtudrRGmXfOHPCy6uEcQ8TbZ4aWifvRjWuqyJiQdo93GD2BdP5mX9EzLzla5MguXuF0
 __3jEsyAY3hHr_iU45nUb9PCc0MxfPoL4eYyHwLkqpcbufTA9Bs9b2ieqeU8.83fYhcr.P2OLfBf
 XYCHFZpxA2BjRWCk5XQULt4e9zqMcgX8.1hDEwk6oiiD4fOPaYs1Erg78_4uvbZ0OH4pM3VtaXJs
 g9mkQONGwnj2K4_a3v0nYhfHpjz3THdgkK991smWgIJ8w9Gd_1aHhANsViU5vm4j216yuFvoEiPx
 pZO0y2MwTM3RoZfUtwJ5TW8mbbtkZ.i4EPhSvzZY7oIpC1BFMAFIERvhgvNRGU0CmnK3U8JuAw1c
 Xba..cKihGDQGnKJjOqcN._XKvXkxAraUvx9pmUxm_95VSKMl7VgaK7h3wThn000c7MkqUZDvBRE
 N3FoNWcJMmtj32jh4Z5AFPB1izbaKoZVwQah7d2yccN58gi06ukBP.VAKpJmJhN5EQGLUZWRN5Y0
 LEeNVkjN2I46oO_q0YiTmOYDsZy.AXnmPp2jcp17BC4.LB4n.9fIKUGD8vq7LhZqLyFa1iHK_60h
 RnTEGJkNep2FCHD9C1dz9FrwqPYv20CGIE6SHZCaBsz3MTz4cAZyLHlIuz6pRzsy7gTVNKmQ3lEW
 Pr7yFLdwF67ae58EZUbFc3ziSHxQQ3gbY1op2D_qt04tWad0n8mPO85_CrmUnKuoAtXHqIII8LkD
 sbCdfpnjxOHUWo4iY3eQ5U3XfgQLva5L.1LEzpDdCY62LuBljaXYOwOB3hm8P9H3MNGPs1dbw.eZ
 xBohaz6l5CkoM5Dfk2YIR18h_2PoK_yCDKuFwzKXxdG9pT74gpi.Vb8BUkKilJDc7QlouYT847Co
 9n8rsxeuEuJl5og--
X-Sonic-MF: <brchuckz@aim.com>
Message-ID: <99a88a66-c1e8-61a2-f4d3-3fb7202424b2@netscape.net>
Date: Tue, 15 Mar 2022 14:31:08 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [XEN PATCH] tools/libs/light/libxl_pci.c: explicitly grant access
 to Intel IGD opregion
Content-Language: en-US
To: xen-devel@lists.xen.org
Cc: Wei Liu <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>,
 Juergen Gross <jgross@suse.com>
References: <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz.ref@netscape.net>
 <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz@netscape.net>
 <23f5afb4-c712-f872-acee-7f18b98b73e6@suse.com>
From: Chuck Zmudzinski <brchuckz@netscape.net>
In-Reply-To: <23f5afb4-c712-f872-acee-7f18b98b73e6@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-Mailer: WebService/1.1.19878 mail.backend.jedi.jws.acl:role.jedi.acl.token.atz.jws.hermes.aol
Content-Length: 10787

On 3/15/22 7:38 AM, Jan Beulich wrote:
> On 14.03.2022 04:41, Chuck Zmudzinski wrote:
>> Fixes: abfb006f1ff4 (tools/libxl: explicitly grant access to needed I/O-memory ranges)
>> Fixes: 0561e1f01e87 (xen/common: do not implicitly permit access to mapped I/O memory)
>> Backport: 4.12+
> Just fyi: This is fine to have as a tag, but it wouldn't be backported
> farther than to 4.15.

That's entirely reasonable. I understand this is a bug fix, not a
security issue.
>
> Apart from this largely some style issues (see below), but please
> realize that I'm not a libxl maintainer and hence I may not have good
> enough knowledge of, in particular, potential unwritten conventions.

I will take your comments into consideration regarding style before
writing the next version of the patch, and carefully check libxl's
coding style file.
>
>> @@ -610,6 +612,45 @@ out:
>>       return ret;
>>   }
>>   
>> +static uint32_t sysfs_dev_get_igd_opregion(libxl__gc *gc,
>> +                                           libxl_device_pci *pci)
>> +{
>> +    char *pci_device_config_path =
>> +            GCSPRINTF(SYSFS_PCI_DEV"/"PCI_BDF"/config",
>> +                      pci->domain, pci->bus, pci->dev, pci->func);
>> +    size_t read_items;
>> +    uint32_t igd_opregion;
>> +    uint32_t error = 0xffffffff;
> I think this constant wants to gain a #define, to be able to correlate
> the use sites. I'm also not sure of the value - in principle the
> register can hold this value, but of course then it won't be 3 pages.

What we are storing as the return value is the starting address,
not the size, of the opregion, and that is a 32-bit value. If we
cannot read it, we return 0xffffffff instead to indicate the error
that we were unable to read the starting address of the opregion
from the config attribute in sysfs. The 32-bit value we are looking for
is read at offset 0xfc from the start of the config attribute of the
Intel IGD in sysfs. The offset 0xfc is defined by PCI_INTEL_OPREGION
both here and in hvmloader (and also in Qemu). The data that is
read at this offset from the start of the config attribute of the Intel
IGD in sysfs is the 32-bit address of the start of the opregion.
> Maybe the error check further down should be to see whether adding 2
> to the value would overflow in 32 bits? (In that case a #define may
> not be needed anymore, as there wouldn't be multiple instances of the
> constant in the code.)

That would work also. Please not that I chose that value for an error
value consistent with the way the current function sysfs_dev_get_vendor
does it. While that function does not assign the variable 'error' to
its return value for an error, which in that case is 0xffff because
that function returns uint16_t instead of uint32_t,
I chose to explicitly assign the error variable to that value to help make
the code more readable. Your  comment that this could be a #define
instead is good. I also think we should use a #define for the error return
value of the sysfs_dev_get_vendor function Something like:

#define ERROR_16    0xffff
#define ERROR_32    0xffffffff

might be appropriate. But that would be touching code unrelated to
this bug fix. I think again the libxl maintainers should weigh in about
what to do here. They might let me take this opportunity to update
and improve the style of the patched file in other functions in the
file not related to this bug fix but I am not inclined to do that without
an explicit request from them to do so. So I am not sure yet what I will
do in the next version of the patch, but I will address your concerns here
and try to explain my reasoning for the changes in the changelog for
version 2 of the patch.
>
>> +
>> +    FILE *f = fopen(pci_device_config_path, "r");
>> +    if (!f) {
> While libxl has some special style rules, I think it still wants a
> blank line between declaration(s) and statement(s), just like we
> expect elsewhere. Effectively you want to simply move the blank line
> you have one line down.

I think I followed the same style here as the existing sysfs_dev_get_xxx
functions. I will double check that and use the same style the other
functions use unless they clearly violate the rules, and note that I
deviated from the style of the existing functions to conform to current
coding style and suggest a subsequent patch to update the style of
the other functions.
>
>> @@ -2531,6 +2572,37 @@ int libxl__grant_vga_iomem_permission(libxl__gc *gc, const uint32_t domid,
>>                     domid, vga_iomem_start, (vga_iomem_start + 0x20 - 1));
>>               return ret;
>>           }
>> +
>> +        /* If this is an Intel IGD, allow access to the IGD opregion */
>> +        if (!libxl__is_igd_vga_passthru(gc, d_config)) return 0;
> Despite the provision for "return" or alike to go on the same line
> as an error code check, I don't think this is okay here. It would be
> if, as iirc generally expected in libxl, you latched the function
> return value into a local variable named "rc" (I think).

I will double check how the function being patched handles the return
value. I don't even remember if it has a local variable named rc for a 
return
value. IIRC it was either ret or 0. I understand that libxl expects rc to be
used these days, though. This might be another candidate for updating the
file to libxl's current standards.
>
>> +        uint32_t igd_opregion = sysfs_dev_get_igd_opregion(gc, pci);
>> +        uint32_t error = 0xffffffff;
> Please don't mix declarations and statements.

I presume you are saying these two lines should be re-written as:

uint32_t igd_opregion;
unti32_t error;

igd_opregion = sysfs_dev_get_igd_opregion(gc, pci);
error = 0xffff;

Please reply if my understanding here is not correct.
> I also don't think
> "error" is really necessary as a local variable, but with the change
> suggested above it might disappear anyway.

I do plan for the next version of the patch to use a #define for
this instead of the error variable (or add 2 to overflow it), so it
will disappear in the next version.
>
>> +        if (igd_opregion == error) break;
> Like above I'm not sure this is okay to all live on one line. I also
> think it would be nice if you used "return 0" or "break" consistently.
> Of course a related question is whether failure here should actually
> be reported to the caller.

Good points here. I agree about consistency with break and return 0.
I will change this to return 0 and move it to the next line. I do not
want to change the current meaning of the return value
without knowledge of how the caller uses the return value.
IIRC, currently the function always returns 0 unless it encounters a
negative return value from xc_domain_iomem_permission, in which
case it returns that negative value to indicate an error to the caller.
So if we return anything other than 0 here, we might be returning
an error code that the caller does not expect or interpret correctly.
I will also consider putting an error message here before returning 0.
A message something like "dom%d: Intel IGD detected, but could
not find IGD opregion" would explain the error that happens here.
I don't think a non-zero error code to the caller is appropriate here,
though, because, as already mentioned, IIRC this might return a
value the caller does not interpret correctly. If it is necessary to
return an error to the caller here instead of 0, it will be necessary to
ensure all callers of this function will interpret it correctly. I would
suggest an error return value greater than 0 to distinguish it from
the return value < 0 which indicates an error from
xc_domain_iomem_permission, but I hope libxl maintainers will
accept a return value of 0 here, at least for this patch. A later patch
could re-work the return value of this function which would also
probably require touching the caller(s) of this function to properly
respond to this particular error which is different from an error from
xc_domain_iomem_permission. In any case, I will double-check to
see if my current understanding of the meaning of the return value
is correct before writing the next version of the patch. For now, I
will use return 0 instead of break here and move it to the next
line, unless I hear otherwise from the libxl maintainers.
>
>> +        vga_iomem_start = ( (uint64_t) igd_opregion ) >> XC_PAGE_SHIFT;
> There's no need for a cast here, as you're right-shifting. Also
> (just fyi) there would have been three to many spaces here. I'm
> additionally not certain whether re-using a variable for a purpose
> not matching its name is deemed acceptable by libxl maintainers.

I wrote it that way expecting a compiler error if I didn't do the cast.
I have not checked if the cast is necessary, though, and maybe you
are right. I will check and see if it is necessary by removing the cast
and see if the compiler complains.

If the cast is not needed, I will just use the 32-bit igd_opregion variable
when calling xc_domain_iomem_permission instead of the 64-bit
vga_iomem_start variable. I will remove the three spaces and use a
more descriptive variable instead of re-using vga_iomem_start if the
compiler insists on the cast from 32-bit to 64-bit.
>
>> +        ret = xc_domain_iomem_permission(CTX->xch, stubdom_domid,
>> +                                         vga_iomem_start,
>> +                                         IGD_OPREGION_PAGES, 1);
>> +        if (ret < 0) {
>> +            LOGED(ERROR, domid,
>> +                  "failed to give stubdom%d access to iomem range "
>> +                  "%"PRIx64"-%"PRIx64" for IGD passthru",
>> +                  stubdom_domid, vga_iomem_start, (vga_iomem_start +
>> +                                                IGD_OPREGION_PAGES - 1));
>> +            return ret;
>> +        }
> I have to admit that I find it odd that this is done unconditionally,
> but I notice the same is done in pre-existing code. I would have
> expected this to happen only when there actually is a device model
> stub domain.

I don't understand how that works either. All my tests have been with
the device model running as a process in dom0. I am thinking maybe
in that case it just uses dom0 for the stub domain, but I have not checked
that. I will check it by dumping the value of stubdom_domid to a log in my
next test.

Thank you for responding promptly. Now I have some work to do writing
the next version of the patch and documenting it clearly in its changelog.
It will take me a while - I will spend enough time on it so hopefully the
libxl maintainers don't have to spend so much time on it.

Chuck

N.B. I forgot to send this reply to xen-devel and cc the libxl
maintainers, so I am doing so here. I also re-formatted my replies
to avoid lines with too many characters. Sorry for the
confusion.


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 19:01:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 19:01:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290926.493582 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUCQ7-00081l-66; Tue, 15 Mar 2022 19:01:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290926.493582; Tue, 15 Mar 2022 19:01:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUCQ7-00081e-38; Tue, 15 Mar 2022 19:01:23 +0000
Received: by outflank-mailman (input) for mailman id 290926;
 Tue, 15 Mar 2022 19:01:22 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nUCQ6-00081Y-MJ
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 19:01:22 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nUCQ6-0001yj-9A; Tue, 15 Mar 2022 19:01:22 +0000
Received: from [54.239.6.190] (helo=[192.168.16.242])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nUCQ6-0004js-2F; Tue, 15 Mar 2022 19:01:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=SP0tmeUyzxwICiIUGW9GoHAi0WHMnqWubiNtTK5JWJI=; b=bWFbb11sqYo1v2pDNARdxbVCgN
	ZBjnZZnpKZIGVCSRNHk2mRBzK+oYUHW+GOw6FIhOkIfzvnoi+R73LfkwO6nu6oXCNi0E3Pz5lyetJ
	AkZguHXfB2kZqMwJqnuVyFu8rkurrqBia8kE/PVGqpRmKE1BPYJxgsXyzQxdi715DlvA=;
Message-ID: <26d41f77-085a-62e4-088b-49dcda63c100@xen.org>
Date: Tue, 15 Mar 2022 19:01:20 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH early-RFC 4/5] xen/arm: mm: Rework switch_ttbr()
To: Stefano Stabellini <sstabellini@kernel.org>
Cc: xen-devel@lists.xenproject.org, marco.solieri@minervasys.tech,
 lucmiccio@gmail.com, Julien Grall <jgrall@amazon.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
References: <20220309112048.17377-1-julien@xen.org>
 <20220309112048.17377-5-julien@xen.org>
 <alpine.DEB.2.22.394.2203111721130.3497@ubuntu-linux-20-04-desktop>
 <ece8f698-0abd-42eb-625e-693f69f02e27@xen.org>
 <alpine.DEB.2.22.394.2203141459360.3497@ubuntu-linux-20-04-desktop>
From: Julien Grall <julien@xen.org>
In-Reply-To: <alpine.DEB.2.22.394.2203141459360.3497@ubuntu-linux-20-04-desktop>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Stefano,

On 14/03/2022 23:48, Stefano Stabellini wrote:
>>> - we save the current mapping
>>> - update it with the Xen 1:1
>>> - switch_ttbr
>>> - remove Xen 1:1
>>> - restore mapping
>>>
>>> It should work, right? Basically, a mapping conflict shouldn't be an
>>> issue given that the mapping has only to live long enough to call
>>> switch_ttbr_id.
>>
>> Today switch_ttbr() is called before we initialized most of the memory layout.
>> So clashing with the VMAP and frametable is not a problem.
>>
>> However, the identity mapping may also clash with the region used to map Xen.
>> That said, technically, we are not able to handle Xen when its start address
>> is in region 2MB + 4K to 4MB (Xen is loaded at a 4KB aligned address).
>>
>> The trouble is some features (e.g. UBSAN, GCOV) can generate Xen image over
>> 2MB. IOW, the range where Xen cannot be loaded will increase.
>>
>> This is an issue because AFAIK, there is no away to tell GRUB "You can't load
>> Xen at this region". But even if there were one, I feel this restriction is
>> sort of random.
>>
>> I already wrote a patch to get rid of the restriction. The code is not too bad
>> (we only need an extra indirection). But I haven't sent it yet because it is
>> less critical with the re-shuffling of the memory layout.
> 
> Interesting! I am curious: how did you manage to do it?

When the identity mapping is clashing with Xen runtime address, I am 
creating a temporary mapping for Xen at a different fixed address.

Once the MMU is turned on, we can jump to the temporary mapping. After 
that we are safe to remove the identity mapping and create the runtime 
Xen mapping. The last step is to jump on the runtime mapping and then 
remove the temporary mapping.

> 
> For now and for this series the current approach and the 512GB limit are
> fine. My replies here are brainstorming to see if there are potential
> alternatives in the future in case the need arises.

On Arm64, we have 256TB worth of virtual address. So I think we can 
easily spare 512GB for the foreseeable :).

If we are at the point where we can't space 512GB, then we would need to 
have a more dynamic layout as I plan on arm32.

Xen would still be mapped at a specific virtual address so we don't need 
to update the relocations. But we could decide at runtime the position 
of other large mappings (e.g. vmap, domheap).

Probably the safest way is to link Xen at a very high address. It is 
quite unlikely that Xen will be loaded at such high address.

If it is, we could exceptionally relocate Xen (with this series it 
should be safer to do). That said, I would like to avoid relocating Xen 
until we see a use for that.

> 
> I can see that a clash with Xen mapping could be problematic and the
> chances of that happening are low but non-zero. We could make sure that
> ImageBuilder always picks safe addresses and that would help but
> wouldn't remove the issue if someone is not using ImageBuilder.

AFAIU, ImageBuilder is here to cater U-boot users. I am not too worry 
about those setups because a user can pick any address they want. So as 
long as Xen print an error during the clash (already the case), the user 
can easily update their scripts.

This is more a problem for UEFI/GRUB where, AFAICT, we can't control 
where Xen will be loaded.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 19:23:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 19:23:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290931.493593 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUClc-00025R-5D; Tue, 15 Mar 2022 19:23:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290931.493593; Tue, 15 Mar 2022 19:23:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUClc-00025K-24; Tue, 15 Mar 2022 19:23:36 +0000
Received: by outflank-mailman (input) for mailman id 290931;
 Tue, 15 Mar 2022 19:23:34 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nUCla-00025E-Nh
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 19:23:34 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nUClZ-0002Jz-Su; Tue, 15 Mar 2022 19:23:33 +0000
Received: from [54.239.6.190] (helo=[192.168.16.242])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nUClZ-00061W-Lz; Tue, 15 Mar 2022 19:23:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=jJDAz0e6MfGGTFFbfnL6SdREDwms3mTsp/t17W9rZPs=; b=DClykW+cjW2q8rYZAEbPPHCG91
	ELiqEW3I1OJOtoHJzRPkdYLygHlGZEjsd8ltJiA4+9j15rk6NF0ceA+BfD+UIfQV+48U+nvT/MgkW
	tbnBNHYD1VzU/W9RYqPPEoCKd+jJ+0dPD4JuBQv+CxHDu4i/ylH86DB0QvF1yA0EgBS8=;
Message-ID: <7584307c-9b58-5199-b3ff-0eba2a356325@xen.org>
Date: Tue, 15 Mar 2022 19:23:31 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH 36/36] doc, arm: add usage documentation for cache
 coloring support
To: Marco Solieri <marco.solieri@minervasys.tech>,
 xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Luca Miccio <lucmiccio@gmail.com>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-37-marco.solieri@minervasys.tech>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220304174701.1453977-37-marco.solieri@minervasys.tech>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Marco,

On 04/03/2022 17:47, Marco Solieri wrote:
> From: Luca Miccio <lucmiccio@gmail.com>
> 
> Add basic documentation that shows how cache coloring support can be
> used in Xen. It introduces the basic concepts behind cache coloring,
> defines the cache selection format, and explains how to assign colors to
> the supported domains: Dom0, DomUs and Xen itself. Known issues are
> also reported.
> 
> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
> ---
>   docs/misc/arm/cache_coloring.rst | 191 +++++++++++++++++++++++++++++++
>   1 file changed, 191 insertions(+)
>   create mode 100644 docs/misc/arm/cache_coloring.rst
> 
> diff --git a/docs/misc/arm/cache_coloring.rst b/docs/misc/arm/cache_coloring.rst
> new file mode 100644
> index 0000000000..082afb1b6c
> --- /dev/null
> +++ b/docs/misc/arm/cache_coloring.rst
> @@ -0,0 +1,191 @@
> +Xen coloring support user's guide
> +=================================
> +
> +The cache coloring support in Xen allows to reserve last level cache partition
AFAICT, the code is assuming that the Last level cache is L3. However, 
this documentation looks generic enough that someone could think it can 
be used on any platforms.

> +for Dom0, DomUs and Xen itself. Currently only ARM64 is supported.

What is missing to support arm32?

> +
> +In order to enable and use it, few steps are needed.
> +
> +- Enable coloring in XEN configuration file.
> +
> +        CONFIG_COLORING=y
> +
> +- Enable/disable debug information (optional).
> +
> +        CONFIG_COLORING_DEBUG=y/n

This option doesn't seem to exist.

> +
> +Before digging into configuration instructions, configurers should first

I would write "system integrator" rather than "configurers".

> +understand the basics of cache coloring.

I read this as a suggestion to read external documentation. Do you have 
good pointer?

> +
> +Background
> +**********
> +
> +Cache hierarchy of a modern multi-core CPU typically has first levels dedicated
> +to each core (hence using multiple cache units), while the last level is shared
> +among all of them. Such configuration implies that memory operations on one
> +core (e.g. running a DomU) are able to generate interference on another core
> +(e.g .hosting another DomU). Cache coloring allows eliminating this
> +mutual interference, and thus guaranteeing higher and more predictable
> +performances for memory accesses.
> +The key concept underlying cache coloring is a fragmentation of the memory
> +space into a set of sub-spaces called colors that are mapped to disjoint cache
> +partitions. Technically, the whole memory space is first divided into a number
> +of subsequent regions. Then each region is in turn divided into a number of
> +subsequent sub-colors. The generic i-th color is then obtained by all the
> +i-th sub-colors in each region.
> +
> +.. raw:: html
> +
> +    <pre>
> +                            Region j            Region j+1
> +                .....................   ............
> +                .                     . .
> +                .                       .
> +            _ _ _______________ _ _____________________ _ _
> +                |     |     |     |     |     |     |
> +                | c_0 | c_1 |     | c_n | c_0 | c_1 |
> +           _ _ _|_____|_____|_ _ _|_____|_____|_____|_ _ _
> +                    :                       :
> +                    :                       :...         ... .
> +                    :                            color 0
> +                    :...........................         ... .
> +                                                :
> +          . . ..................................:
> +    </pre>
> +
> +There are two pragmatic lesson to be learnt.
> +
> +1. If one wants to avoid cache interference between two domains, different
> +   colors needs to be used for their memory.
> +
> +2. Color assignment must privilege contiguity in the partitioning. E.g.,
> +   assigning colors (0,1) to domain I  and (2,3) to domain  J is better than
> +   assigning colors (0,2) to I and (1,3) to J.
> +
> +
> +Color(s) selection format
> +**************************
> +
> +Regardless of the domain that has to be colored (Dom0, DomUs and Xen),

Xen is not really a domain. How about 'memory pool'?

> +the color selection can be expressed using the same syntax.  In particular,

Here you are saying the syntax is the same for everyone. But below, you 
provide a new syntax for dom0less domUs.

> +the latter is expressed as a comma-separated list of hyphen-separated intervals
> +of color numbers, as in `0-4,5-8,10-15`.  Ranges are always represented using
> +strings. Note that no spaces are allowed.
> +
> +The number of available colors depends on the LLC layout of the specific
> +platform and determines the maximum allowed value.  This number can be either
> +calculated [#f1]_ or read from the output given by the hypervisor during boot,
> +if DEBUG logging is enabled.

I think it would be good to print the number of colors even in non-debug 
build.

> +
> +Examples:
> +
> ++---------------------+-----------------------------------+
> +|**Configuration**    |**Actual selection**               |
> ++---------------------+-----------------------------------+
> +|  1-2,5-8            | [1, 2, 5, 6, 7, 8]                |
> ++---------------------+-----------------------------------+
> +|  0-8,3-8            | [0, 1, 2, 3, 4, 5, 6, 7, 8]       |
> ++---------------------+-----------------------------------+
> +|  0-0                | [0]                               |
> ++---------------------+-----------------------------------+

0-0 is a bit odd to write. I would consider to allow a system integrator 
to simply write '0'.

> +
> +General coloring parameters
> +***************************
> +
> +Four additional parameters in the Xen command line are used to define the
> +underlying coloring policy, which is not directly configurable otherwise.
> +
> +Please refer to the relative documentation in docs/man/xl.cfg.pod.5.in.
> +
> +Dom0less support
> +****************
> +Support for the Dom0less experimental features is provided. Color selection for

I don't understand the first sentence. Are you saying dom0less domUs 
support is experimental or the support for coloring dom0less domUs is 
experimental?

> +a virtual machine is defined by the attribute `colors`, whose format is not a
> +string for ranges list, but a bitmask. It suffices to set all and only the bits
> +having a position equal to the chosen colors, leaving unset all the others. For
> +example, if we choose 8 colors out of 16, we can use a bitmask with 8 bits set
> +and 8 bit unset, like:
> +

[...]

> +Known issues
> +************
> +
> +Explicitly define way_size in QEMU
> +##################################
> +
> +Currently, QEMU does not have a comprehensive cache model, so the cache coloring
> +support fails to detect a cache geometry where to operate. In this case, the
> +boot hangs as soon as the Xen image is loaded. To overcome this issue, it is
> +enough to specify the way_size parameter in the command line. Any multiple
> +greater than 1 of the page size allows the coloring mechanism to work, but the
> +precise behavior on the system that QEMU is emulating can be obtained with its
> +way_size. For instance, set way_size=65536.

Can we consider to fix QEMU?

> +
> +
> +Fail to boot colored DomUs with large memory size
> +#################################################
> +
> +If the kernel used for Dom0 does not contain the upstream commit

Dom0 is technically not tie to Linux. So please be explicit and write 
"Linux kernel".

> +3941552aec1e04d63999988a057ae09a1c56ebeb and uses the hypercall buffer device,
> +colored DomUs with memory size larger then 127 MB cannot be created. This is
> +caused by the default limit of this buffer of 64 pages. The solution is to
> +manually apply the above patch, or to check if there is an updated version of
> +the kernel in use for Dom0 that contains this change.

I don't understand how coloring is coming in the equation here. Can you 
provide more details?

> +
> +Notes:
> +******
> +
> +.. [#f1] To compute the number of available colors on a platform, one can simply
> +  divide `way_size` by `page_size`, where: `page_size` is the size of the page
> +  used on the system (usually 4 KiB);

It is fairly common for a CPU to support multiple page granularities 
(i.e 4KB, 16KB, 64KB). The Arm Arm architecture allows each level to use 
a different granularity.

For instance, dom0 may use 64KB page granularity, domU 4KB. Xen will 
always use 4KB for now.

So can you clarify what you mean by page used on the system? Is it Xen 
page granularity?


>  `way_size` is size of each LLC way.  For
> +  example, an Arm Cortex-A53 with a 16-ways associative 1 MiB LLC enable 16
> +  colors, when pages are 4 KiB.
> +
> +

NIT: One newline should be sufficient here.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 20:00:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 20:00:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290935.493603 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUDL2-0006Ik-VC; Tue, 15 Mar 2022 20:00:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290935.493603; Tue, 15 Mar 2022 20:00:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUDL2-0006Id-SA; Tue, 15 Mar 2022 20:00:12 +0000
Received: by outflank-mailman (input) for mailman id 290935;
 Tue, 15 Mar 2022 20:00:12 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUDL2-0006IT-Cf; Tue, 15 Mar 2022 20:00:12 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUDL2-00031P-9d; Tue, 15 Mar 2022 20:00:12 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUDL1-0000Mr-Ra; Tue, 15 Mar 2022 20:00:11 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUDL1-0006cR-Qo; Tue, 15 Mar 2022 20:00:11 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=DLpLnDsStAaO46EzEcRUmQYtNI4PB49HgsxpyMJVVMw=; b=cLTNOilSXzalijWEnkjr8pBk52
	FA29N5FfVMjBV/HngxU01TAwHDH+37wJbPglHxADsYkj3WwEDfd95pHWI2IXKAh+K7RWGN4xeyKnT
	zJi9N1Ota5x8xKUABmwq1A0A0/dNbhC6vn3gDyz5BWz/z52KQEA/zVu0JrgkBre8bW4k=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168612-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168612: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow:guest-localmigrate/x10:fail:heisenbug
    qemu-mainline:test-arm64-arm64-libvirt-raw:guest-start:fail:heisenbug
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=6f4fe14b46f0a161f94e3f6e98690ac38184b0be
X-Osstest-Versions-That:
    qemuu=352998df1c53b366413690d95b35f76d0721ebed
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 15 Mar 2022 20:00:11 +0000

flight 168612 qemu-mainline real [real]
flight 168619 qemu-mainline real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168612/
http://logs.test-lab.xenproject.org/osstest/logs/168619/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow 18 guest-localmigrate/x10 fail pass in 168619-retest
 test-arm64-arm64-libvirt-raw 13 guest-start         fail pass in 168619-retest

Tests which did not succeed, but are not blocking:
 test-arm64-arm64-libvirt-raw 14 migrate-support-check fail in 168619 never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check fail in 168619 never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168601
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168601
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168601
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168601
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168601
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168601
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168601
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168601
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 qemuu                6f4fe14b46f0a161f94e3f6e98690ac38184b0be
baseline version:
 qemuu                352998df1c53b366413690d95b35f76d0721ebed

Last test of basis   168601  2022-03-15 01:37:08 Z    0 days
Testing same since   168612  2022-03-15 10:09:41 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Peter Maydell <peter.maydell@linaro.org>
  Richard Henderson <richard.henderson@linaro.org>
  Thomas Huth <thuth@redhat.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 fail    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              fail    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   352998df1c..6f4fe14b46  6f4fe14b46f0a161f94e3f6e98690ac38184b0be -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 20:41:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 20:41:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290945.493615 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUDyR-0002BE-A4; Tue, 15 Mar 2022 20:40:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290945.493615; Tue, 15 Mar 2022 20:40:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUDyR-0002B7-74; Tue, 15 Mar 2022 20:40:55 +0000
Received: by outflank-mailman (input) for mailman id 290945;
 Tue, 15 Mar 2022 20:40:53 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUDyP-0002Ax-JC; Tue, 15 Mar 2022 20:40:53 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUDyP-0003ie-GB; Tue, 15 Mar 2022 20:40:53 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUDyP-0002aH-4X; Tue, 15 Mar 2022 20:40:53 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUDyP-00025n-44; Tue, 15 Mar 2022 20:40:53 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=YGAS7rywDNadS+exLhUOzP0Erm5zaTxhAkNVKmL7Zt0=; b=foNmn0EezzmYCOcORir9SKlt3h
	RfdSuspFiWol1CqJSueKorwxP7tzb7L7XGTfyLzVGTFq0Ttn6dt6VPsJB+IRwH1FY+LhXX2fNxRIt
	ABxcQjQmBMcQyK/6YviAOXnOsRropRUTk06dwLzeaahNopWiOZFxV67CwvH+6nxekfnM=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168618-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168618: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c8ea48bdf95532f9a3a4c39a154c09988566901f
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 15 Mar 2022 20:40:53 +0000

flight 168618 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168618/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c8ea48bdf95532f9a3a4c39a154c09988566901f
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   15 days
Failing since        168258  2022-03-01 01:55:31 Z   14 days  143 attempts
Testing same since   168617  2022-03-15 15:41:41 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 653 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 22:28:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 22:28:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290958.493625 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUFeP-0003cv-2A; Tue, 15 Mar 2022 22:28:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290958.493625; Tue, 15 Mar 2022 22:28:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUFeO-0003co-VY; Tue, 15 Mar 2022 22:28:20 +0000
Received: by outflank-mailman (input) for mailman id 290958;
 Tue, 15 Mar 2022 22:28:19 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUFeN-0003ce-Bx; Tue, 15 Mar 2022 22:28:19 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUFeN-0005jC-01; Tue, 15 Mar 2022 22:28:19 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUFeM-0007dL-Pk; Tue, 15 Mar 2022 22:28:18 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUFeM-00050v-PK; Tue, 15 Mar 2022 22:28:18 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=v5CDmkKCEnCo3dRdbx8ixkdcgI6qeLU6jUX7l8WbYpc=; b=5w98gRqPdtkGBfU/S/Db6Cm7HA
	fo5R1PuaNfpUUhnDqFE11ufPtvRtE5wOOw/9hlt5snUkeKqSE5QQqXhrnnuUFU/UTTtGpksRuBNAl
	7fJw44M829lbaEvTrUndZW9FnVjsvFgWa8AqpYXIUOfLOpdACa69qXMOSbsqICbdvebQ=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168622-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168622: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c8ea48bdf95532f9a3a4c39a154c09988566901f
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 15 Mar 2022 22:28:18 +0000

flight 168622 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168622/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c8ea48bdf95532f9a3a4c39a154c09988566901f
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   15 days
Failing since        168258  2022-03-01 01:55:31 Z   14 days  144 attempts
Testing same since   168617  2022-03-15 15:41:41 Z    0 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 653 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 22:43:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 22:43:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290968.493637 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUFse-0005vW-HX; Tue, 15 Mar 2022 22:43:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290968.493637; Tue, 15 Mar 2022 22:43:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUFse-0005vP-Cj; Tue, 15 Mar 2022 22:43:04 +0000
Received: by outflank-mailman (input) for mailman id 290968;
 Tue, 15 Mar 2022 22:43:03 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Tvka=T2=amd.com=vikram.garhwal@srs-se1.protection.inumbo.net>)
 id 1nUFsd-0005vJ-5u
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 22:43:03 +0000
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (unknown
 [2a01:111:f400:fe59::4c])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 437f8f06-a4b1-11ec-853b-5f4723681683;
 Tue, 15 Mar 2022 23:43:00 +0100 (CET)
Received: from BN9PR03CA0303.namprd03.prod.outlook.com (2603:10b6:408:112::8)
 by BL0PR02MB5459.namprd02.prod.outlook.com (2603:10b6:208:89::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Tue, 15 Mar
 2022 22:42:56 +0000
Received: from BN1NAM02FT010.eop-nam02.prod.protection.outlook.com
 (2603:10b6:408:112:cafe::82) by BN9PR03CA0303.outlook.office365.com
 (2603:10b6:408:112::8) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14 via Frontend
 Transport; Tue, 15 Mar 2022 22:42:56 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (149.199.62.198) by
 BN1NAM02FT010.mail.protection.outlook.com (10.13.2.128) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5081.14 via Frontend Transport; Tue, 15 Mar 2022 22:42:56 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 15 Mar 2022 15:42:55 -0700
Received: from smtp.xilinx.com (172.19.127.95) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 15 Mar 2022 15:42:55 -0700
Received: from [172.19.2.115] (port=33400 helo=xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <vikram.garhwal@amd.com>)
 id 1nUFsV-0001B8-EH; Tue, 15 Mar 2022 15:42:55 -0700
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 437f8f06-a4b1-11ec-853b-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=DeR1IaIdFH9uWaFnfYyP57gNeYduRg5eEc4vLQnTFlWledSfTjGbheLuSSX5P4OkFRv/TKcTOjfRycuuJ0i/N9vS8QHntP0YCDH7KT9mOSmoLajfmEgGxqd2ZB6wdxd1rkYS1F++FBRa2qoELNHsAnXQedH4653PUXY4/nuYPUWvwjPfKiYYw0PiWeRKHOGI7D8NK9FAwVRC4cWD0cLBW67d4fijwIT3mB8QdxoQUpn+1HOhQK6i6lZu3eSmWZJXDDltln7GPNXEpuU+237i7PtC9zi4Qa/CaToDhFyOv5ximYOTKBXpYGY2q8SjIU4xTaGj36v4qM7nKtxr4A6MzA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=+U0W1Iu6BxPOkDWEESgLC37DUIsqQ5OriJDWMOsc4Fg=;
 b=b7ucYfpMtoI+1xQPFD50tXOsnnQFzkBe1T5sejq/ZUerVVCAM9uwJNOc1v6M14rJjtffTNty04mRViSg+smqIqQteNPLT4n+ZD53R9y/oOtth9sTpirewXiiLgGj5xghjJei8fi47YQlqoOTtCBPAya77vi3u4/ba+LVcQeP+JGxUtx1P1IAImxYvjsAv/+y0Uhw3u8Ej66N46ZY/WA6AAh0QuNaOA161JgKswRrUBu+Gkv9wWCAl4KK7XYKb1O8cHIUGpImm0t4HWrcrb9Prkinj3wxDkhLJhPSvZ9h/hOUiRo0jV6rtITRdigWlLuxuliJggHYV8GIvKrMxW+ZSw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=softfail (sender ip
 is 149.199.62.198) smtp.rcpttodomain=arm.com smtp.mailfrom=amd.com;
 dmarc=fail (p=quarantine sp=quarantine pct=100) action=quarantine
 header.from=amd.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=+U0W1Iu6BxPOkDWEESgLC37DUIsqQ5OriJDWMOsc4Fg=;
 b=jrRV+LtBoctIzN/DffHSc3YzyhwM8j1SyicEwjAVQ5aIdCUFYfl+uIvF8bZPXaxVeQxYG1AsLtcfQN3ueEtu8xQlFZ0DPvsrxGUV12nEaOhHbQtTH3BrfeZN1jb3A802zZYGg2sbvyR9Gbr8N8oW08oxUovnI+5374OaS0fPGAg=
X-MS-Exchange-Authentication-Results: spf=softfail (sender IP is
 149.199.62.198) smtp.mailfrom=amd.com; dkim=none (message not signed)
 header.d=none;dmarc=fail action=quarantine header.from=amd.com;
Received-SPF: SoftFail (protection.outlook.com: domain of transitioning
 amd.com discourages use of 149.199.62.198 as permitted sender)
Date: Tue, 15 Mar 2022 15:42:55 -0700
From: Vikram Garhwal <vikram.garhwal@amd.com>
To: Luca Fancellu <Luca.Fancellu@arm.com>
CC: Vikram Garhwal <fnu.vikram@xilinx.com>, Xen-devel
	<xen-devel@lists.xenproject.org>, "sstabellini@kernel.org"
	<sstabellini@kernel.org>, "julien@xen.org" <julien@xen.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, "volodymyr_babchuk@epam.com"
	<volodymyr_babchuk@epam.com>
Subject: Re: [XEN][RFC PATCH v3 01/14] xen/arm/device: Remove __init from
 function type
Message-ID: <20220315224252.GB23054@xilinx.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
 <20220308194704.14061-2-fnu.vikram@xilinx.com>
 <337CEFA8-895C-4B5D-810A-3D4E2927CE01@arm.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
In-Reply-To: <337CEFA8-895C-4B5D-810A-3D4E2927CE01@arm.com>
User-Agent: Mutt/1.9.4 (2018-02-28)
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: aeb4219e-eff6-4ab2-80f6-08da06d52636
X-MS-TrafficTypeDiagnostic: BL0PR02MB5459:EE_
X-Microsoft-Antispam-PRVS:
	<BL0PR02MB545963B9F4BD268AA7DE2A589F109@BL0PR02MB5459.namprd02.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 2
X-MS-Exchange-AntiSpam-Relay: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.62.198;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:xsj-pvapexch02.xlnx.xilinx.com;PTR:unknown-62-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(47076005)(86362001)(83380400001)(40460700003)(82310400004)(356005)(9786002)(8936002)(7636003)(5660300002)(508600001)(8676002)(35950700001)(4326008)(2906002)(70206006)(70586007)(44832011)(30864003)(1076003)(53546011)(336012)(36756003)(26005)(316002)(33656002)(9686003)(6916009)(7696005)(54906003);DIR:OUT;SFP:1022;
X-OriginatorOrg: xilinx.onmicrosoft.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Mar 2022 22:42:56.3847
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: aeb4219e-eff6-4ab2-80f6-08da06d52636
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.62.198];Helo=[xsj-pvapexch02.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	BN1NAM02FT010.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR02MB5459

On Mon, Mar 14, 2022 at 12:31:06PM +0000, Luca Fancellu wrote:
> 
> 
> > On 8 Mar 2022, at 19:46, Vikram Garhwal <fnu.vikram@xilinx.com> wrote:
> > 
> > Change function type of following function to access during runtime:
> >    1. map_irq_to_domain()
> >    2. handle_device_interrupt()
> >    3. map_range_to_domain()
> >    4. unflatten_dt_node()
> >    5. unflatten_device_tree()
> > 
> > Move map_irq_to_domain(), handle_device_interrupt() and map_range_to_domain() to
> > device.c.
> > 
> > These changes are done to support the dynamic programming of a nodes where an
> > overlay node will be added to fdt and unflattened node will be added to dt_host.
> > Furthermore, IRQ and mmio mapping will be done for the added node.
> > 
> > Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com>
> > ---
> > xen/arch/arm/device.c            | 136 +++++++++++++++++++++++++++++
> > xen/arch/arm/domain_build.c      | 142 -------------------------------
> > xen/arch/arm/include/asm/setup.h |   3 +
> > xen/common/device_tree.c         |  20 ++---
> > xen/include/xen/device_tree.h    |   5 ++
> > 5 files changed, 154 insertions(+), 152 deletions(-)
> > 
> > diff --git a/xen/arch/arm/device.c b/xen/arch/arm/device.c
> > index 70cd6c1a19..0dfd33b33e 100644
> > --- a/xen/arch/arm/device.c
> > +++ b/xen/arch/arm/device.c
> > @@ -21,6 +21,9 @@
> > #include <xen/errno.h>
> > #include <xen/init.h>
> > #include <xen/lib.h>
> > +#include <xen/iocap.h>
> > +#include <asm/domain_build.h>
> > +#include <asm/setup.h>
> > 
> > extern const struct device_desc _sdevice[], _edevice[];
> > extern const struct acpi_device_desc _asdevice[], _aedevice[];
> > @@ -84,6 +87,139 @@ enum device_class device_get_class(const struct dt_device_node *dev)
> >     return DEVICE_UNKNOWN;
> > }
> > 
> > +int map_irq_to_domain(struct domain *d, unsigned int irq,
> > +                      bool need_mapping, const char *devname)
> > +{
> > +    int res;
> > +
> > +    res = irq_permit_access(d, irq);
> > +    if ( res )
> > +    {
> > +        printk(XENLOG_ERR "Unable to permit to dom%u access to IRQ %u\n",
> > +               d->domain_id, irq);
> > +        return res;
> > +    }
> > +
> > +    if ( need_mapping )
> > +    {
> > +        /*
> > +         * Checking the return of vgic_reserve_virq is not
> > +         * necessary. It should not fail except when we try to map
> > +         * the IRQ twice. This can legitimately happen if the IRQ is shared
> > +         */
> > +        vgic_reserve_virq(d, irq);
> > +
> > +        res = route_irq_to_guest(d, irq, irq, devname);
> > +        if ( res < 0 )
> > +        {
> > +            printk(XENLOG_ERR "Unable to map IRQ%"PRId32" to dom%d\n",
> > +                   irq, d->domain_id);
> > +            return res;
> > +        }
> > +    }
> > +
> > +    dt_dprintk("  - IRQ: %u\n", irq);
> > +    return 0;
> > +}
> > +
> > +int map_range_to_domain(const struct dt_device_node *dev,
> > +                        u64 addr, u64 len, void *data)
> > +{
> > +    struct map_range_data *mr_data = data;
> > +    struct domain *d = mr_data->d;
> > +    int res;
> > +
> > +    res = iomem_permit_access(d, paddr_to_pfn(addr),
> > +            paddr_to_pfn(PAGE_ALIGN(addr + len - 1)));
> 
> Hi Vikram,
> 
> Why the if ( strncasecmp(dt_node_full_name(dev), "/reserved-memory/",
> strlen("/reserved-memory/")) != 0 ) was dropped?
> 
> 
Hi Luca,
Thanks for spotting this. Yeah, I messed this while porting the patches from
internal to upstream Xen.
Will address this in v4!

@everyone, apologies for resending the same email. Previous one didn't make to
xen-devel due to change in my email ID.

Regards,
Vikram
> > +    if ( res )
> > +    {
> > +        printk(XENLOG_ERR "Unable to permit to dom%d access to"
> > +                " 0x%"PRIx64" - 0x%"PRIx64"\n",
> > +                d->domain_id,
> > +                addr & PAGE_MASK, PAGE_ALIGN(addr + len) - 1);
> > +        return res;
> > +    }
> > +
> > +    if ( !mr_data->skip_mapping )
> > +    {
> > +        res = map_regions_p2mt(d,
> > +                               gaddr_to_gfn(addr),
> > +                               PFN_UP(len),
> > +                               maddr_to_mfn(addr),
> > +                               mr_data->p2mt);
> > +
> > +        if ( res < 0 )
> > +        {
> > +            printk(XENLOG_ERR "Unable to map 0x%"PRIx64
> > +                   " - 0x%"PRIx64" in domain %d\n",
> > +                   addr & PAGE_MASK, PAGE_ALIGN(addr + len) - 1,
> > +                   d->domain_id);
> > +            return res;
> > +        }
> > +    }
> > +
> > +    dt_dprintk("  - MMIO: %010"PRIx64" - %010"PRIx64" P2MType=%x\n",
> > +               addr, addr + len, mr_data->p2mt);
> > +
> > +    return 0;
> > +}
> > +
> > +/*
> > + * handle_device_interrupts retrieves the interrupts configuration from
> > + * a device tree node and maps those interrupts to the target domain.
> > + *
> > + * Returns:
> > + *   < 0 error
> > + *   0   success
> > + */
> > +int handle_device_interrupts(struct domain *d,
> > +                             struct dt_device_node *dev,
> > +                             bool need_mapping)
> > +{
> > +    unsigned int i, nirq;
> > +    int res;
> > +    struct dt_raw_irq rirq;
> > +
> > +    nirq = dt_number_of_irq(dev);
> > +
> > +    /* Give permission and map IRQs */
> > +    for ( i = 0; i < nirq; i++ )
> > +    {
> > +        res = dt_device_get_raw_irq(dev, i, &rirq);
> > +        if ( res )
> > +        {
> > +            printk(XENLOG_ERR "Unable to retrieve irq %u for %s\n",
> > +                   i, dt_node_full_name(dev));
> > +            return res;
> > +        }
> > +
> > +        /*
> > +         * Don't map IRQ that have no physical meaning
> > +         * ie: IRQ whose controller is not the GIC
> > +         */
> > +        if ( rirq.controller != dt_interrupt_controller )
> > +        {
> > +            dt_dprintk("irq %u not connected to primary controller. Connected to %s\n",
> > +                      i, dt_node_full_name(rirq.controller));
> > +            continue;
> > +        }
> > +
> > +        res = platform_get_irq(dev, i);
> > +        if ( res < 0 )
> > +        {
> > +            printk(XENLOG_ERR "Unable to get irq %u for %s\n",
> > +                   i, dt_node_full_name(dev));
> > +            return res;
> > +        }
> > +
> > +        res = map_irq_to_domain(d, res, need_mapping, dt_node_name(dev));
> > +        if ( res )
> > +            return res;
> > +    }
> > +
> > +    return 0;
> > +}
> > +
> > /*
> >  * Local variables:
> >  * mode: C
> > diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
> > index 8be01678de..b06770a2af 100644
> > --- a/xen/arch/arm/domain_build.c
> > +++ b/xen/arch/arm/domain_build.c
> > @@ -1794,41 +1794,6 @@ int __init make_chosen_node(const struct kernel_info *kinfo)
> >     return res;
> > }
> > 
> > -int __init map_irq_to_domain(struct domain *d, unsigned int irq,
> > -                             bool need_mapping, const char *devname)
> > -{
> > -    int res;
> > -
> > -    res = irq_permit_access(d, irq);
> > -    if ( res )
> > -    {
> > -        printk(XENLOG_ERR "Unable to permit to dom%u access to IRQ %u\n",
> > -               d->domain_id, irq);
> > -        return res;
> > -    }
> > -
> > -    if ( need_mapping )
> > -    {
> > -        /*
> > -         * Checking the return of vgic_reserve_virq is not
> > -         * necessary. It should not fail except when we try to map
> > -         * the IRQ twice. This can legitimately happen if the IRQ is shared
> > -         */
> > -        vgic_reserve_virq(d, irq);
> > -
> > -        res = route_irq_to_guest(d, irq, irq, devname);
> > -        if ( res < 0 )
> > -        {
> > -            printk(XENLOG_ERR "Unable to map IRQ%"PRId32" to dom%d\n",
> > -                   irq, d->domain_id);
> > -            return res;
> > -        }
> > -    }
> > -
> > -    dt_dprintk("  - IRQ: %u\n", irq);
> > -    return 0;
> > -}
> > -
> > static int __init map_dt_irq_to_domain(const struct dt_device_node *dev,
> >                                        const struct dt_irq *dt_irq,
> >                                        void *data)
> > @@ -1860,57 +1825,6 @@ static int __init map_dt_irq_to_domain(const struct dt_device_node *dev,
> >     return 0;
> > }
> > 
> > -int __init map_range_to_domain(const struct dt_device_node *dev,
> > -                               u64 addr, u64 len, void *data)
> > -{
> > -    struct map_range_data *mr_data = data;
> > -    struct domain *d = mr_data->d;
> > -    int res;
> > -
> > -    /*
> > -     * reserved-memory regions are RAM carved out for a special purpose.
> > -     * They are not MMIO and therefore a domain should not be able to
> > -     * manage them via the IOMEM interface.
> > -     */
> > -    if ( strncasecmp(dt_node_full_name(dev), "/reserved-memory/",
> > -                     strlen("/reserved-memory/")) != 0 )
> > -    {
> > -        res = iomem_permit_access(d, paddr_to_pfn(addr),
> > -                paddr_to_pfn(PAGE_ALIGN(addr + len - 1)));
> > -        if ( res )
> > -        {
> > -            printk(XENLOG_ERR "Unable to permit to dom%d access to"
> > -                    " 0x%"PRIx64" - 0x%"PRIx64"\n",
> > -                    d->domain_id,
> > -                    addr & PAGE_MASK, PAGE_ALIGN(addr + len) - 1);
> > -            return res;
> > -        }
> > -    }
> > -
> > -    if ( !mr_data->skip_mapping )
> > -    {
> > -        res = map_regions_p2mt(d,
> > -                               gaddr_to_gfn(addr),
> > -                               PFN_UP(len),
> > -                               maddr_to_mfn(addr),
> > -                               mr_data->p2mt);
> > -
> > -        if ( res < 0 )
> > -        {
> > -            printk(XENLOG_ERR "Unable to map 0x%"PRIx64
> > -                   " - 0x%"PRIx64" in domain %d\n",
> > -                   addr & PAGE_MASK, PAGE_ALIGN(addr + len) - 1,
> > -                   d->domain_id);
> > -            return res;
> > -        }
> > -    }
> > -
> > -    dt_dprintk("  - MMIO: %010"PRIx64" - %010"PRIx64" P2MType=%x\n",
> > -               addr, addr + len, mr_data->p2mt);
> > -
> > -    return 0;
> > -}
> > -
> > /*
> >  * For a node which describes a discoverable bus (such as a PCI bus)
> >  * then we may need to perform additional mappings in order to make
> > @@ -1938,62 +1852,6 @@ static int __init map_device_children(const struct dt_device_node *dev,
> >     return 0;
> > }
> > 
> > -/*
> > - * handle_device_interrupts retrieves the interrupts configuration from
> > - * a device tree node and maps those interrupts to the target domain.
> > - *
> > - * Returns:
> > - *   < 0 error
> > - *   0   success
> > - */
> > -static int __init handle_device_interrupts(struct domain *d,
> > -                                           struct dt_device_node *dev,
> > -                                           bool need_mapping)
> > -{
> > -    unsigned int i, nirq;
> > -    int res;
> > -    struct dt_raw_irq rirq;
> > -
> > -    nirq = dt_number_of_irq(dev);
> > -
> > -    /* Give permission and map IRQs */
> > -    for ( i = 0; i < nirq; i++ )
> > -    {
> > -        res = dt_device_get_raw_irq(dev, i, &rirq);
> > -        if ( res )
> > -        {
> > -            printk(XENLOG_ERR "Unable to retrieve irq %u for %s\n",
> > -                   i, dt_node_full_name(dev));
> > -            return res;
> > -        }
> > -
> > -        /*
> > -         * Don't map IRQ that have no physical meaning
> > -         * ie: IRQ whose controller is not the GIC
> > -         */
> > -        if ( rirq.controller != dt_interrupt_controller )
> > -        {
> > -            dt_dprintk("irq %u not connected to primary controller. Connected to %s\n",
> > -                      i, dt_node_full_name(rirq.controller));
> > -            continue;
> > -        }
> > -
> > -        res = platform_get_irq(dev, i);
> > -        if ( res < 0 )
> > -        {
> > -            printk(XENLOG_ERR "Unable to get irq %u for %s\n",
> > -                   i, dt_node_full_name(dev));
> > -            return res;
> > -        }
> > -
> > -        res = map_irq_to_domain(d, res, need_mapping, dt_node_name(dev));
> > -        if ( res )
> > -            return res;
> > -    }
> > -
> > -    return 0;
> > -}
> > -
> > /*
> >  * For a given device node:
> >  *  - Give permission to the guest to manage IRQ and MMIO range
> > diff --git a/xen/arch/arm/include/asm/setup.h b/xen/arch/arm/include/asm/setup.h
> > index 7a1e1d6798..8a26f1845c 100644
> > --- a/xen/arch/arm/include/asm/setup.h
> > +++ b/xen/arch/arm/include/asm/setup.h
> > @@ -134,6 +134,9 @@ void device_tree_get_reg(const __be32 **cell, u32 address_cells,
> > u32 device_tree_get_u32(const void *fdt, int node,
> >                         const char *prop_name, u32 dflt);
> > 
> > +int handle_device_interrupts(struct domain *d, struct dt_device_node *dev,
> > +                             bool need_mapping);
> > +
> > int map_range_to_domain(const struct dt_device_node *dev,
> >                         u64 addr, u64 len, void *data);
> > 
> > diff --git a/xen/common/device_tree.c b/xen/common/device_tree.c
> > index 4aae281e89..f43d66a501 100644
> > --- a/xen/common/device_tree.c
> > +++ b/xen/common/device_tree.c
> > @@ -1811,12 +1811,12 @@ int dt_count_phandle_with_args(const struct dt_device_node *np,
> >  * @allnextpp: pointer to ->allnext from last allocated device_node
> >  * @fpsize: Size of the node path up at the current depth.
> >  */
> > -static unsigned long __init unflatten_dt_node(const void *fdt,
> > -                                              unsigned long mem,
> > -                                              unsigned long *p,
> > -                                              struct dt_device_node *dad,
> > -                                              struct dt_device_node ***allnextpp,
> > -                                              unsigned long fpsize)
> > +static unsigned long unflatten_dt_node(const void *fdt,
> > +                                       unsigned long mem,
> > +                                       unsigned long *p,
> > +                                       struct dt_device_node *dad,
> > +                                       struct dt_device_node ***allnextpp,
> > +                                       unsigned long fpsize)
> > {
> >     struct dt_device_node *np;
> >     struct dt_property *pp, **prev_pp = NULL;
> > @@ -2047,7 +2047,7 @@ static unsigned long __init unflatten_dt_node(const void *fdt,
> > }
> > 
> > /**
> > - * __unflatten_device_tree - create tree of device_nodes from flat blob
> > + * unflatten_device_tree - create tree of device_nodes from flat blob
> >  *
> >  * unflattens a device-tree, creating the
> >  * tree of struct device_node. It also fills the "name" and "type"
> > @@ -2056,8 +2056,8 @@ static unsigned long __init unflatten_dt_node(const void *fdt,
> >  * @fdt: The fdt to expand
> >  * @mynodes: The device_node tree created by the call
> >  */
> > -static void __init __unflatten_device_tree(const void *fdt,
> > -                                           struct dt_device_node **mynodes)
> > +void unflatten_device_tree(const void *fdt,
> > +                           struct dt_device_node **mynodes)
> > {
> >     unsigned long start, mem, size;
> >     struct dt_device_node **allnextp = mynodes;
> > @@ -2179,7 +2179,7 @@ dt_find_interrupt_controller(const struct dt_device_match *matches)
> > 
> > void __init dt_unflatten_host_device_tree(void)
> > {
> > -    __unflatten_device_tree(device_tree_flattened, &dt_host);
> > +    unflatten_device_tree(device_tree_flattened, &dt_host);
> >     dt_alias_scan();
> > }
> > 
> > diff --git a/xen/include/xen/device_tree.h b/xen/include/xen/device_tree.h
> > index fd6cd00b43..06d7866c10 100644
> > --- a/xen/include/xen/device_tree.h
> > +++ b/xen/include/xen/device_tree.h
> > @@ -177,6 +177,11 @@ int device_tree_for_each_node(const void *fdt, int node,
> >  */
> > void dt_unflatten_host_device_tree(void);
> > 
> > +/*
> > + * unflatten any device tree.
> > + */
> > +void unflatten_device_tree(const void *fdt, struct dt_device_node **mynodes);
> > +
> > /**
> >  * IRQ translation callback
> >  * TODO: For the moment we assume that we only have ONE
> 
> NIT: there are some minor code style issues, like indentation that could be fixed
> 
> Cheers,
> Luca
> 


From xen-devel-bounces@lists.xenproject.org Tue Mar 15 23:20:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 15 Mar 2022 23:20:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290973.493648 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUGSa-0001lf-Bx; Tue, 15 Mar 2022 23:20:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290973.493648; Tue, 15 Mar 2022 23:20:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUGSa-0001lY-8l; Tue, 15 Mar 2022 23:20:12 +0000
Received: by outflank-mailman (input) for mailman id 290973;
 Tue, 15 Mar 2022 23:20:11 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=4IiT=T2=tklengyel.com=tamas@srs-se1.protection.inumbo.net>)
 id 1nUGSZ-0001lS-56
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 23:20:11 +0000
Received: from MTA-14-4.privateemail.com (mta-14-4.privateemail.com
 [198.54.118.206]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 74490d9a-a4b6-11ec-8eba-a37418f5ba1a;
 Wed, 16 Mar 2022 00:20:09 +0100 (CET)
Received: from mta-14.privateemail.com (localhost [127.0.0.1])
 by mta-14.privateemail.com (Postfix) with ESMTP id AEB3C18000A4;
 Tue, 15 Mar 2022 19:20:07 -0400 (EDT)
Received: from toma-xps.localdomain (unknown [10.20.151.199])
 by mta-14.privateemail.com (Postfix) with ESMTPA id C928F18000A5;
 Tue, 15 Mar 2022 19:20:02 -0400 (EDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 74490d9a-a4b6-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1647386407;
	bh=MzJE/NNvN5RBHoVLDcrekrjcRxeVw3x+iltc0TQduGY=;
	h=From:To:Cc:Subject:Date:From;
	b=jVcfeP5Dp0jTI6CRndoGVTOUGVM7I95IaXPHT57ZjXENdQWj44bEYpeXAEgTPeCK5
	 bho5WSrjbquXejyF+9+fV3FjJJJSyqOUhY78hhMBr+mepqVVdIDbGUjxTMslKpZ92L
	 Muntt/XJYdJa7xTh1jDnI7lqyQf6jU0vrCleGzsBacveymm9fnFk+2u60H+UCfeGwi
	 T1PnvlrCEXgPCEJdxti2CtPGgqQgzC3bCN+Up+KuyxllKn5lQvGBTIqK/xOch79P2i
	 Mu9ZVT7eNqhzme2xfWzcKJcDKbnet1cRJCW55wwH6ceeb/xtn2tDFFM7N+WAe8KRKi
	 3cDlxkeEF+Qyw==
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1647386407;
	bh=MzJE/NNvN5RBHoVLDcrekrjcRxeVw3x+iltc0TQduGY=;
	h=From:To:Cc:Subject:Date:From;
	b=jVcfeP5Dp0jTI6CRndoGVTOUGVM7I95IaXPHT57ZjXENdQWj44bEYpeXAEgTPeCK5
	 bho5WSrjbquXejyF+9+fV3FjJJJSyqOUhY78hhMBr+mepqVVdIDbGUjxTMslKpZ92L
	 Muntt/XJYdJa7xTh1jDnI7lqyQf6jU0vrCleGzsBacveymm9fnFk+2u60H+UCfeGwi
	 T1PnvlrCEXgPCEJdxti2CtPGgqQgzC3bCN+Up+KuyxllKn5lQvGBTIqK/xOch79P2i
	 Mu9ZVT7eNqhzme2xfWzcKJcDKbnet1cRJCW55wwH6ceeb/xtn2tDFFM7N+WAe8KRKi
	 3cDlxkeEF+Qyw==
From: Tamas K Lengyel <tamas@tklengyel.com>
To: xen-devel@lists.xenproject.org
Cc: Tamas K Lengyel <tamas@tklengyel.com>,
	Wei Liu <wl@xen.org>,
	Anthony PERARD <anthony.perard@citrix.com>,
	Juergen Gross <jgross@suse.com>
Subject: [PATCH] tools/ctrl: add xc_domain_hvm_getcontext_size
Date: Tue, 15 Mar 2022 19:19:52 -0400
Message-Id: <20220315231952.7831-1-tamas@tklengyel.com>
X-Mailer: git-send-email 2.32.0
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-Virus-Scanned: ClamAV using ClamSMTP

Current users of xc_domain_hvm_getcontext_partial rely on knowing ahead of time
the size of the requested HVM context. This isn't exactly prudent as the size
may change across Xen versions, requiring callers to re-compile in lockstep
with the Xen headers. This isn't an issue for in-tree tools and libraries,
but out-of-tree tools that supposed to work across all Xen versions, like
LibVMI, would fail to work after a size change to any of the HVM contexts.

Add xc_domain_hvm_getcontext_size so that external callers can at least be
backwards compatible with various HVM context sizes by maintaining their
own internal definitions of them and not relying on the current Xen header. It
is preferred to know the exact size Xen is going to return instead of guessing
by associating the HVM context sizes with Xen releases. The underlying domctl
has supported returning the context size to begin with, so with this change
we are just exposing that functionality to the users of libxc.

Signed-off-by: Tamas K Lengyel <tamas@tklengyel.com>
---
 tools/include/xenctrl.h     | 12 ++++++++++++
 tools/libs/ctrl/xc_domain.c | 21 +++++++++++++++++++++
 2 files changed, 33 insertions(+)

diff --git a/tools/include/xenctrl.h b/tools/include/xenctrl.h
index 95bd5eca67..ee5095a892 100644
--- a/tools/include/xenctrl.h
+++ b/tools/include/xenctrl.h
@@ -787,6 +787,18 @@ int xc_domain_hvm_getcontext_partial(xc_interface *xch,
                                      uint16_t instance,
                                      void *ctxt_buf,
                                      uint32_t size);
+/**
+ * This function returns the size of the specified context of a hvm domain
+ * @parm xch a handle to an open hypervisor interface
+ * @parm domid the domain to get information from
+ * @parm typecode which type of elemnt required
+ * @parm instance which instance of the type
+ * @return size on success, 0 on failure
+ */
+unsigned long xc_domain_hvm_getcontext_size(xc_interface *xch,
+                                            uint32_t domid,
+                                            uint16_t typecode,
+                                            uint16_t instance);
 
 /**
  * This function will set the context for hvm domain
diff --git a/tools/libs/ctrl/xc_domain.c b/tools/libs/ctrl/xc_domain.c
index ef62f66009..f52d089999 100644
--- a/tools/libs/ctrl/xc_domain.c
+++ b/tools/libs/ctrl/xc_domain.c
@@ -510,6 +510,27 @@ int xc_domain_hvm_getcontext_partial(xc_interface *xch,
     return ret ? -1 : 0;
 }
 
+unsigned long xc_domain_hvm_getcontext_size(xc_interface *xch,
+                                            uint32_t domid,
+                                            uint16_t typecode,
+                                            uint16_t instance)
+{
+    int ret;
+    void *p = NULL;
+    DECLARE_DOMCTL;
+    DECLARE_HYPERCALL_BOUNCE(p, 0, XC_HYPERCALL_BUFFER_BOUNCE_OUT);
+
+    domctl.cmd = XEN_DOMCTL_gethvmcontext_partial;
+    domctl.domain = domid;
+    domctl.u.hvmcontext_partial.type = typecode;
+    domctl.u.hvmcontext_partial.instance = instance;
+    set_xen_guest_handle(domctl.u.hvmcontext_partial.buffer, p);
+
+    ret = do_domctl(xch, &domctl);
+
+    return ret ? 0 : domctl.u.hvmcontext_partial.bufsz;
+}
+
 /* set info to hvm guest for restore */
 int xc_domain_hvm_setcontext(xc_interface *xch,
                              uint32_t domid,
-- 
2.32.0



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 00:02:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 00:02:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290978.493659 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUH6x-0006Yr-0C; Wed, 16 Mar 2022 00:01:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290978.493659; Wed, 16 Mar 2022 00:01:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUH6w-0006Yk-T9; Wed, 16 Mar 2022 00:01:54 +0000
Received: by outflank-mailman (input) for mailman id 290978;
 Wed, 16 Mar 2022 00:01:53 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUH6v-0006Ya-B7; Wed, 16 Mar 2022 00:01:53 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUH6v-0007sf-3A; Wed, 16 Mar 2022 00:01:53 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUH6u-0002id-Lg; Wed, 16 Mar 2022 00:01:52 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUH6u-0008VX-LD; Wed, 16 Mar 2022 00:01:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=0MZFSoJ/oNdUQrBlTWY0QMRX02nn3GEfEV9Xzg8zHAQ=; b=OxszT+s9gCT5yJfiDevfg5o9d7
	NPonb/9AiXU0UXw4Gbn4pCbOAYDkpYij32WixfMRhPnFcaU5ma1MlOdhbMLWUmCSzCYuoyPB+1o2Q
	4juhsCM/MRbTvEgQ6KP9ZllTECZeeREqz7LcbQNyYo5WgFY56QnI+GWld+VHR3ZH/7GI=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168623-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168623: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c8ea48bdf95532f9a3a4c39a154c09988566901f
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 16 Mar 2022 00:01:52 +0000

flight 168623 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168623/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c8ea48bdf95532f9a3a4c39a154c09988566901f
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   15 days
Failing since        168258  2022-03-01 01:55:31 Z   14 days  145 attempts
Testing same since   168617  2022-03-15 15:41:41 Z    0 days    4 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 653 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 00:33:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 00:33:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290986.493670 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUHaz-0001Pd-8a; Wed, 16 Mar 2022 00:32:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290986.493670; Wed, 16 Mar 2022 00:32:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUHaz-0001PW-4v; Wed, 16 Mar 2022 00:32:57 +0000
Received: by outflank-mailman (input) for mailman id 290986;
 Wed, 16 Mar 2022 00:32:56 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUHay-0001PM-1l; Wed, 16 Mar 2022 00:32:56 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUHax-0008NT-UH; Wed, 16 Mar 2022 00:32:55 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUHax-0003x2-FW; Wed, 16 Mar 2022 00:32:55 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUHax-0006xu-F0; Wed, 16 Mar 2022 00:32:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=fA1/mo+CN2IdhWoN3Q/Ou+6jfbhZR4mfRL7GHGN/+Qs=; b=mEJXzFaVUCTO5ps83mhMLnU4Ie
	f0LDbR4Z3Kd8ygrknz3cMPs36hPIyK3wwb5vl68PJLdnQ805J1yILJWFMGBsX/Fph37UrOUiOAmcw
	ZNBh3PELoBbAj/elnUjVNKZJ5On4fPb8Gswpvmkfn3lFVeRCNox3/61E7xhNP/05z0aw=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168615-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168615: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:debian-hvm-install:fail:heisenbug
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=07aebcd55fd2f7997e9fe50a6c849c8a12ec2e68
X-Osstest-Versions-That:
    xen=dedb0aa42c6d1ee31805dfc61630db2c41117330
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 16 Mar 2022 00:32:55 +0000

flight 168615 xen-unstable real [real]
flight 168624 xen-unstable real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168615/
http://logs.test-lab.xenproject.org/osstest/logs/168624/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm 12 debian-hvm-install fail pass in 168624-retest

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168604
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168604
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168604
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168604
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168604
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168604
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168604
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168604
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168604
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168604
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168604
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168604
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass

version targeted for testing:
 xen                  07aebcd55fd2f7997e9fe50a6c849c8a12ec2e68
baseline version:
 xen                  dedb0aa42c6d1ee31805dfc61630db2c41117330

Last test of basis   168604  2022-03-15 02:17:58 Z    0 days
Testing same since   168615  2022-03-15 13:39:34 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
  Ayan Kumar Halder <ayankuma@xilinx.com>
  Julien Grall <jgrall@amazon.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 fail    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   dedb0aa42c..07aebcd55f  07aebcd55fd2f7997e9fe50a6c849c8a12ec2e68 -> master


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 00:41:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 00:41:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291000.493701 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUHih-0003Ag-GL; Wed, 16 Mar 2022 00:40:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291000.493701; Wed, 16 Mar 2022 00:40:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUHih-0003AZ-BU; Wed, 16 Mar 2022 00:40:55 +0000
Received: by outflank-mailman (input) for mailman id 291000;
 Wed, 16 Mar 2022 00:40:54 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=EkWL=T3=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nUHif-0003AT-Tj
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 00:40:54 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ba42ac2f-a4c1-11ec-8eba-a37418f5ba1a;
 Wed, 16 Mar 2022 01:40:51 +0100 (CET)
Received: from pps.filterd (m0246631.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 22FKiVtF011483; 
 Wed, 16 Mar 2022 00:39:56 GMT
Received: from aserp3020.oracle.com (aserp3020.oracle.com [141.146.126.70])
 by mx0b-00069f02.pphosted.com with ESMTP id 3et5s6mref-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Wed, 16 Mar 2022 00:39:56 +0000
Received: from pps.filterd (aserp3020.oracle.com [127.0.0.1])
 by aserp3020.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 22G0W1lN149534;
 Wed, 16 Mar 2022 00:39:54 GMT
Received: from nam12-mw2-obe.outbound.protection.outlook.com
 (mail-mw2nam12lp2046.outbound.protection.outlook.com [104.47.66.46])
 by aserp3020.oracle.com with ESMTP id 3et64kc83y-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Wed, 16 Mar 2022 00:39:54 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
 by BY5PR10MB4147.namprd10.prod.outlook.com (2603:10b6:a03:20e::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Wed, 16 Mar
 2022 00:39:51 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755]) by BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755%9]) with mapi id 15.20.5081.014; Wed, 16 Mar 2022
 00:39:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ba42ac2f-a4c1-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=djr6kN0TcawL+ku/NK2R0BtYVj8lg5bDD1C02JuafMc=;
 b=EBYUADnZPAOiAe6ii2Z0V+oPucuY/Cn266HvKd5+/l46tYcXVvj7/YitoCXO8zmROodR
 h6OJ5ORH5KnLf52aiKKxUKCdV2BiW5Mt4M8AgloktDvi6pR8RAqzTRn57DaA6SOhw3j4
 V9HrGVZHStjvj+iuXGRtDBzRs3hwncQWPiO+ZZvHbM+TwidRrOo3+/VqltYiP2hJQZQY
 B0oYHq5xATW7YHTcOwrc5bsbyngL35yzxKZaetRItMww9TbzIEWsbr3IEbVC27SHlkMi
 YHdtMgHIFsnI76td2YA9MQYKoSWw9BLR8fh/TqPbPODOYyO+FJnF+ijki5HCwbJU6RsJ Uw== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=NCf1GgmtgU38mK3x65627G1OHXxN9fBlOrOzqvWNaC5H5COvyCcmdOi/ZxWSBB5pKMnGlUWX42HlduLuWgBnaKl8ca8mbOH5KWYvyBhcCYLDAkpGMx7gF5hv+0qt+un2SbrKfhCkjpoEsuSM2g7JqQ0OdIQgQsozeNguicDaxmIOupUPUwGJZq03vwEew2hCGVdIZfrCNvq7tZiGg7bFkhK0YpRWEre5VgSgyi2s5YLdw+Gp83SNKRSwZhrg9SBQj+yJCGpeO3KN4k45ZbZClb/b1KBFoER+ihdNVyQXbgop9n3Nu3miDvGSQ6BX00H29nSia21iZw1yzFTvW+iUfA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=djr6kN0TcawL+ku/NK2R0BtYVj8lg5bDD1C02JuafMc=;
 b=dtE4oz7YZxKUYUofSCCAVkvQRBm4EGM/hPwXLL+y9NNadZekU7K7NCy1glPwFLG6tKNbGLCyWFggYGVEY1m5AmBTrdjeRUlD/tVzz0yhas1nkgsF1rQHR5WUK+Z4whkfO3Qalq3KBO6sBLKrJ/EXIr25e2BcgX6B5PcE1mGX7X1A0do1YbwadmzmHwmeW9+tZM88uSU5I2S8Giuu1SOgfZuIG8iMyvFigOXZ9GA0kgCIXy+UAIO8j3rDkG2o67K71rApAusnhS1apVejtZsMy0GgCFA8kNGjZFwkhgbADbhzAsJGK698BOSzijRXFFh6gqYQ7D5F+WvA5aNYn/v5tQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=djr6kN0TcawL+ku/NK2R0BtYVj8lg5bDD1C02JuafMc=;
 b=jx0go0yY6nbYsdwLI+pIXNpFlvP59jfq7l0bVX7CKVkiei3RaaIgql97qHG3X9Q6SjPE+zT8lHXm3lELEbP45kc5rvh+aIk61yv3tPKn8hjd6K133om7KrgJovt+eElqZfMuXs4YAlW9MRz5zLC79/P0bCNjWL2YQt4/uGaSieQ=
Message-ID: <3a8cc553-4b60-b6bb-a2d8-2b33c4c1cf23@oracle.com>
Date: Tue, 15 Mar 2022 20:39:29 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH 12/15] swiotlb: provide swiotlb_init variants that remap
 the buffer
Content-Language: en-US
To: Christoph Hellwig <hch@lst.de>
Cc: iommu@lists.linux-foundation.org, x86@kernel.org,
        Anshuman Khandual <anshuman.khandual@arm.com>,
        Tom Lendacky <thomas.lendacky@amd.com>,
        Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
        Stefano Stabellini <sstabellini@kernel.org>,
        Juergen Gross
 <jgross@suse.com>, Joerg Roedel <joro@8bytes.org>,
        David Woodhouse <dwmw2@infradead.org>,
        Lu Baolu <baolu.lu@linux.intel.com>,
        Robin Murphy <robin.murphy@arm.com>,
        linux-arm-kernel@lists.infradead.org, xen-devel@lists.xenproject.org,
        linux-ia64@vger.kernel.org, linux-mips@vger.kernel.org,
        linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org,
        linux-s390@vger.kernel.org, linux-hyperv@vger.kernel.org,
        tboot-devel@lists.sourceforge.net, linux-pci@vger.kernel.org
References: <20220314073129.1862284-1-hch@lst.de>
 <20220314073129.1862284-13-hch@lst.de>
 <4d800aa8-5e38-1ad9-284f-1754c83d0f8a@oracle.com>
 <20220315063618.GA1244@lst.de>
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
In-Reply-To: <20220315063618.GA1244@lst.de>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: SN1PR12CA0075.namprd12.prod.outlook.com
 (2603:10b6:802:20::46) To BLAPR10MB5009.namprd10.prod.outlook.com
 (2603:10b6:208:321::10)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 3e5cdd27-5357-4844-66be-08da06e57b07
X-MS-TrafficTypeDiagnostic: BY5PR10MB4147:EE_
X-Microsoft-Antispam-PRVS: 
	<BY5PR10MB414758A1650DD7DEDCA267AA8A119@BY5PR10MB4147.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	Uy1tmGQRi05CoYG/1TM0569ITNymGf/zYpC7r28gCMp0pa423BF75gvKu00jVL7g9ths/7kV+CPK19h2EJTCErXbcns4YEVEXELJl6tprFPrOtyJuCfCCjJ7TJrxqdlT87yL0toLjH2MQIp8RuCLBBX63CZin+2EOK66ceYJ6+1e59TDw8Of9zJ4fmh2uBaWjH+aGh5ULM322wwzr/TkD3w+H8TOKxGjYX5QV20Ev/Fe2oIe2PKRJWiyIloskXk03tRUtSc9U0hbKG8UtM4DLC5m0K4Ru1P9BkjP4zRH3poSKDSnRKVsy5mBy5JlepNhX+AlErQcPFa8uXFdq09eL1bITYtcx7s37h8D1cgRpOBQIqEEq2vjZHNs3XMjLdVLLi48XkL2TToqDp19eKdukQt9nIDcorhnfSvfkUuI2CbFPoV3U7ch6VCWI2ISLpWQbmJzMPG3LHE+FGZfmeydUzOGOmaE7HVgqdAQJUKlMnChBNC+GswPSQgW9LFrmrJdJ4R7AML6uyzZhnZW/r8DwF037RzPcuu6mjPfZc3410bgPuIkZLLLzd3RyTvEUCrTIXlAzbgzUS8Lax7HErG+HaG7jKJcLzyv4ws1ZOUmlicBCRQ9DCbBu8HTKr+CohONxpbIt/sVstytQygqJXUNpRpdlJSPBHbkY0Ty0wusYuKaCwYR1a1wC5RuZP2Zpe/hGLVr0UVPNoVjBlHLY6Lv+VtVL8MvcKl1DLVQF67GsHGoFgcVKviraS/FWpR5lI4A
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BLAPR10MB5009.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(508600001)(6486002)(86362001)(31696002)(54906003)(316002)(6916009)(2616005)(53546011)(6506007)(6666004)(26005)(186003)(83380400001)(6512007)(8936002)(44832011)(7416002)(5660300002)(8676002)(66476007)(66556008)(4326008)(66946007)(2906002)(31686004)(38100700002)(36756003)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?NU45NTZoaENrVkdoL3U4SjRhTjJLRmxRR2VjYytKZXU4Q0RDWEZQMUE5RWNv?=
 =?utf-8?B?dDJ5WmVjZ1daVWd4cWNlekl4NG9aakhhZGV1NmxKcWl2VEJ3aWFvbE1Sc0R3?=
 =?utf-8?B?RTBEZitVaUVRSHJKNTZrQ0NQeEgralArK2p2c1Q5YUhVa1Yvb040alJUU204?=
 =?utf-8?B?dllEdi9Tc3M0d3lFM01hUEk5Z0JLNFZ0UlVsRlF2emFHMTVtTjdQcTJkYXds?=
 =?utf-8?B?eHZVaUxsdWUzQ05SNnhLRmxkcXF2ODlVblNHRHBmcFkzL2UwZVVwZXlNMEdy?=
 =?utf-8?B?T1A2QmhjTUZRWEZUTVlvRndpOERITUl4WC9WcnJINGNGblpKREJPZjArWlNt?=
 =?utf-8?B?TnBqMmZ3U0Eyd0p2cHNxMW54dytHd1JHY0VacldwaEFObVdpcTVicGxsUnQw?=
 =?utf-8?B?Q041ZFNBbkdwTDljNnhDYythc0h1dkVxazB1N0tlME5tR1B1WXlVeXFaNmNK?=
 =?utf-8?B?ZGxFRVY0OVNTZW1UeW82cGRQNjhQRzdpQTc1dHM1dWx3ZDBIUEdndnd5S001?=
 =?utf-8?B?enhlWHhHanZjQk9EK0pvaTJYVjRTenNwUmJ2NGFSMTBLZHhiN01heXg3R09R?=
 =?utf-8?B?VUdwSVZUL21PbkhVV1JXbklZMzJENkRQbGpmZVptWDRkWDhqbzluWWpOdFVX?=
 =?utf-8?B?dkxLUm92czJHTGo3QXpXekVFaXZKbTdrNnZuM0FGL0tLZldIZ2h3TkRpTHhw?=
 =?utf-8?B?aFpOOXl6OWxjR1FPWjhQcFdTN1F0K3RndlBER2E5U2ZFeEdDSWpaalNKYS92?=
 =?utf-8?B?OGFCZkp6eW16cHZCOVdNR1pTdTk0Kzk5ZmJPeXluTk5BNFpqdlF3d0FyKzdX?=
 =?utf-8?B?VkViRVFKa0s4bytINzc2UWRVM2EwOENiTWM5VEpnYWRUMGZhVHJMQ09ZVmN2?=
 =?utf-8?B?NVRkdGcvVDZjTzFXTDlrT0NRb3Z6ZnEzT3BCbG9lWERBUUxTbGxuNFozNWJj?=
 =?utf-8?B?Q2pGRFhYYy8ydmV2Q1VVcllRMnVpbk5KT0pmTFRkcGJnQnBHMGY0STh4OVFU?=
 =?utf-8?B?K1VId0ZManJkM09XZHBOdnNFYVNNNmpEd2FJMDM1VWxrZnJQbjl1eitJeTFN?=
 =?utf-8?B?N29nd05EQndrU3dMaGpvUXZOS0RVRjZpMHlLZ0p4TnhOUTlFbldjWlZ0MTgy?=
 =?utf-8?B?cG5EQldKb1Zhb0VhYkJ6cDFBUUx5anRlTjh6bStXOGFtRUdDS01hekd3U25Q?=
 =?utf-8?B?ZmkwRG5GZVBUTjd5SXhUc1FOUlRFd1Z3TVFOcXVFM3pyQUZiWE1hbHpqc0x1?=
 =?utf-8?B?V3dHM1gzQnAwM29PZG9yd2RYb1Bkb2Nhd1BkcnVTUVFTeldRQlZNcUZhRGhk?=
 =?utf-8?B?REltYTdidGE2Nm43MUxQWEl0QXA0RFdnZHkzVHY2OTNOemhLYlM5UFBKdDh5?=
 =?utf-8?B?dmJLSTZycGVhRG9PSGMxdEJVQndSN1FLM2tBYzZUS3k1VXdPTVhDT1IwWmhh?=
 =?utf-8?B?SWhicCtQdmJzVDc5dy9KVTNrREM2cXRxUnJoa3NNWVozeXZyblJJbVFXbDhr?=
 =?utf-8?B?YzQwMVVtZEttR0QzUjJCTVRHMFh6RDFqRlF6b3hQbzdDMXI1U29QM01WVzRB?=
 =?utf-8?B?c29mWGwwVzJyQVprSEdDdjRpWTdJaGZrTjlidzNYYWFNZlZRU3hQb0lwdkJs?=
 =?utf-8?B?SGp5TFRoYWN0QTFIZmR1OFJvcEQ0d1FUYjhOczkvSHBLNUMrUnJoTU5iVTlG?=
 =?utf-8?B?MENmTy9tTVRmUFFNUzhMdUdscFNQVFdkb25WdFIwcldSZzJlUHRjY1BYbTRC?=
 =?utf-8?B?NS92TE00QitoYmdkd3pIVGVPaG9ZMUlZOENadHpnQVcyellmSFExUVN6aEFh?=
 =?utf-8?B?Z3RaMWxXZHBLdDNCSVpraWpPSUZLNFRqc1VZNDYzbXd3aEI5bnlQRHF3emt6?=
 =?utf-8?B?MDBWd1VKcmZOVlk5eXVrQlNVL2xCV2RjS0JScS85TnFraCtEaVBEeWVua1BY?=
 =?utf-8?B?Uzd3cUc0YmhCeW1iYkNhN2x0aDFQcGEwT3pHRVIyV2hINFJhelFzajFmSE0w?=
 =?utf-8?B?LzdOVWVsTjNBPT0=?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3e5cdd27-5357-4844-66be-08da06e57b07
X-MS-Exchange-CrossTenant-AuthSource: BLAPR10MB5009.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Mar 2022 00:39:51.0206
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 9TF2vJtebLSAdleNi6D9YetFLcgmSTX4xMsfZC7SUCCVEZYWXQpsxgZnKXWVvpiGxky5mlpaee7FuakjCFAEO10lkRh1KySJSMuwMBNfLwA=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR10MB4147
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10287 signatures=693139
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 adultscore=0 phishscore=0
 malwarescore=0 mlxscore=0 suspectscore=0 spamscore=0 bulkscore=0
 mlxlogscore=999 classifier=spam adjust=0 reason=mlx scancount=1
 engine=8.12.0-2202240000 definitions=main-2203160001
X-Proofpoint-GUID: eIH6PojFSQs8pjue0vLu4KGA-a1ppM4Y
X-Proofpoint-ORIG-GUID: eIH6PojFSQs8pjue0vLu4KGA-a1ppM4Y



On 3/15/22 2:36 AM, Christoph Hellwig wrote:

> @@ -271,12 +273,23 @@ void __init swiotlb_init(bool addressing_limit, unsigned int flags)
>   	 * allow to pick a location everywhere for hypervisors with guest
>   	 * memory encryption.
>   	 */
> +retry:
> +	bytes = PAGE_ALIGN(default_nslabs << IO_TLB_SHIFT);
>   	if (flags & SWIOTLB_ANY)
>   		tlb = memblock_alloc(bytes, PAGE_SIZE);
>   	else
>   		tlb = memblock_alloc_low(bytes, PAGE_SIZE);
>   	if (!tlb)
>   		goto fail;
> +	if (remap && remap(tlb, nslabs) < 0) {
> +		memblock_free(tlb, PAGE_ALIGN(bytes));
> +
> +		if (nslabs <= IO_TLB_MIN_SLABS)
> +			panic("%s: Failed to remap %zu bytes\n",
> +			      __func__, bytes);
> +		nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));


I spoke with Konrad (who wrote the original patch --- f4b2f07b2ed9b469ead87e06fc2fc3d12663a725) and apparently the reason for 2MB was to optimize for Xen's slab allocator, it had nothing to do with IO_TLB_MIN_SLABS. Since this is now common code we should not expose Xen-specific optimizations here and smaller values will still work so IO_TLB_MIN_SLABS is fine.

I think this should be mentioned in the commit message though, probably best in the next patch where you switch to this code.

As far as the hunk above, I don't think we need the max() here: with IO_TLB_MIN_SLABS being 512 we may get stuck in an infinite loop. Something like

	nslabs = ALIGN(nslabs >> 1, IO_TLB_SEGSIZE);
	if (nslabs <= IO_TLB_MIN_SLABS)
		panic()

should be sufficient.


> +		goto retry;
> +	}
>   	if (swiotlb_init_with_tbl(tlb, default_nslabs, flags))
>   		goto fail_free_mem;
>   	return;
> @@ -287,12 +300,18 @@ void __init swiotlb_init(bool addressing_limit, unsigned int flags)
>   	pr_warn("Cannot allocate buffer");
>   }
>   
> +void __init swiotlb_init(bool addressing_limit, unsigned int flags)
> +{
> +	return swiotlb_init_remap(addressing_limit, flags, NULL);
> +}
> +
>   /*
>    * Systems with larger DMA zones (those that don't support ISA) can
>    * initialize the swiotlb later using the slab allocator if needed.
>    * This should be just like above, but with some error catching.
>    */
> -int swiotlb_init_late(size_t size, gfp_t gfp_mask)
> +int swiotlb_init_late(size_t size, gfp_t gfp_mask,
> +		int (*remap)(void *tlb, unsigned long nslabs))
>   {
>   	unsigned long nslabs = ALIGN(size >> IO_TLB_SHIFT, IO_TLB_SEGSIZE);
>   	unsigned long bytes;
> @@ -303,6 +322,7 @@ int swiotlb_init_late(size_t size, gfp_t gfp_mask)
>   	if (swiotlb_force_disable)
>   		return 0;
>   
> +retry:
>   	order = get_order(nslabs << IO_TLB_SHIFT);
>   	nslabs = SLABS_PER_PAGE << order;
>   	bytes = nslabs << IO_TLB_SHIFT;
> @@ -317,6 +337,16 @@ int swiotlb_init_late(size_t size, gfp_t gfp_mask)
>   
>   	if (!vstart)
>   		return -ENOMEM;
> +	if (remap)
> +		rc = remap(vstart, nslabs);
> +	if (rc) {
> +		free_pages((unsigned long)vstart, order);
> +
> +		if (IO_TLB_MIN_SLABS <= 1024)
> +			return rc;
> +		nslabs = max(1024UL, ALIGN(nslabs >> 1, IO_TLB_SEGSIZE));


Same here. (The 'if' check above is wrong anyway).

Patches 13 and 14 look good.


-boris



> +		goto retry;
> +	}
>   
>   	if (order != get_order(bytes)) {
>   		pr_warn("only able to allocate %ld MB\n",


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 00:52:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 00:52:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291003.493712 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUHtx-0004h6-Fd; Wed, 16 Mar 2022 00:52:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291003.493712; Wed, 16 Mar 2022 00:52:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUHtx-0004gz-CF; Wed, 16 Mar 2022 00:52:33 +0000
Received: by outflank-mailman (input) for mailman id 291003;
 Wed, 16 Mar 2022 00:52:31 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=EkWL=T3=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nUHtv-0004gt-Mq
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 00:52:31 +0000
Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com
 [205.220.165.32]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 5a66713f-a4c3-11ec-8eba-a37418f5ba1a;
 Wed, 16 Mar 2022 01:52:30 +0100 (CET)
Received: from pps.filterd (m0246629.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 22FKiJue018383; 
 Wed, 16 Mar 2022 00:52:25 GMT
Received: from userp3030.oracle.com (userp3030.oracle.com [156.151.31.80] (may
 be forged)) by mx0b-00069f02.pphosted.com with ESMTP id 3et5xwmj9j-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Wed, 16 Mar 2022 00:52:25 +0000
Received: from pps.filterd (userp3030.oracle.com [127.0.0.1])
 by userp3030.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 22G0p2gl019150;
 Wed, 16 Mar 2022 00:52:23 GMT
Received: from nam11-dm6-obe.outbound.protection.outlook.com
 (mail-dm6nam11lp2169.outbound.protection.outlook.com [104.47.57.169])
 by userp3030.oracle.com with ESMTP id 3et65ps3q0-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Wed, 16 Mar 2022 00:52:23 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
 by DM8PR10MB5495.namprd10.prod.outlook.com (2603:10b6:8:22::12) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.25; Wed, 16 Mar
 2022 00:52:22 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755]) by BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755%9]) with mapi id 15.20.5081.014; Wed, 16 Mar 2022
 00:52:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5a66713f-a4c3-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=D5oGmtdNMTtm5LFPAJodjB22eG2v5qOL+g66G6N6cVo=;
 b=XeI2cQoUJxfDKOWIoB7+DzflwZ7KGeHu66DCQM6g3R1nAmP9W5+9/1gYlBKRZ8jjHgmH
 jfKsCL4pvjpZ0a7N3z6FRNcFVMT5rjOZ3Aj0Wz3QKeya2Xwfk4QYVDH8JI9BgEeL6g6o
 1mscbBBUw5HzWlULgVmr/BzAze5uGXGqHQENg3VmTWkN47MKe+5hUObNHB/p7IpxH40Q
 BS3u25Y680kgYestlEkpQTTcbvhrs9k7Mw6VTosAtr8VZX0lnHHTgmYIDAt7BkNGKt+B
 tBfGECxzaQN1DsYWjViEtMW+Qw6yMiqW8A+rko2M/39KsP31zTplbyRe1lJTCVthqRcH Ag== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=cZmB0YM4Y5Xjp2lDcXPf0qqLZTzNjbAI6gzICxgEd/VN9wgLBnxOncVdH6Fko/h8IoXFStnseAMiXY0FsyYPWBCxaHHh7/JUb7EB2TIHJNAexoJucc/UjFpV0uSk/jZFQolgUOw3xOx9s4PQ6jkaQrwN15Xg2XCDuiEJwum7KscTVLSuuNyPf3NOyvfwq5TO4VeURc14SMaXZQm+HWfxduAIoc4MCzKJ7OMJ+jhCuT/hiKNMvSb5kPVw4ICQ3+r4HGE5Qz4xPKY9xyoiyA2ybUiLOgLMqo9EAmcqqb+VKvqjrNobOs2TOggvaTt4pVLuIUSKYhaIihWNz/xN6xnxVQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=D5oGmtdNMTtm5LFPAJodjB22eG2v5qOL+g66G6N6cVo=;
 b=atz74ony4w9QefwUs1T5OaO4mE3bUPcWwqB2ymscUHFoP3Xs1F/2TR9EFE7jHIgIqwdP+z60aKik2zTuVDhKrgEAcYY/benuVxcIOsVz78fOZK/f6UQilmyISBETbbSAtp/aXa/+jCS2dCMwlZap8sugmSswgMO4aU6QEMC9DKYM+n18drGmiGBm/2pZGjU4V1Fa5f6uCNop+X/J8JOg3Wm9bPJBbg2ferqTzTivIbT4YBJpZDCkDiwUuc6v93C3W342YyvKuU6dJQ4b1C9x+QZDVF5y8NXqDEwq6P93aANKQUilstTjR7L0kRzwcZtFGzA/q+8lIoiaw2eJ5FlhmA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=D5oGmtdNMTtm5LFPAJodjB22eG2v5qOL+g66G6N6cVo=;
 b=q+NQo+SkH+zbNrWhZHcxoW0XH5Bl36LozEALMXaF8AGtQrIffDxXeQHhtWn1eXOH01m0cPs5qUj3kavx5F9QTU02luzqz+KfQxsZpaV/w33gitLPNFp3NZFd3kKzLygIryxOlYc4ocx42qLN99seVYCMG1NPSlFTUVydstb5EA4=
Message-ID: <30c3da01-5284-6915-cc91-188577ed148d@oracle.com>
Date: Tue, 15 Mar 2022 20:52:11 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH 1/2] xen/grant-table: remove gnttab_*transfer*() functions
Content-Language: en-US
To: Juergen Gross <jgross@suse.com>, xen-devel@lists.xenproject.org,
        linux-kernel@vger.kernel.org
Cc: Stefano Stabellini <sstabellini@kernel.org>
References: <20220311103429.12845-1-jgross@suse.com>
 <20220311103429.12845-2-jgross@suse.com>
 <63365484-7035-f2bd-5317-2e95d65993f7@oracle.com>
 <1633fb91-3771-e37c-14ce-43f1b0cda6a0@suse.com>
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
In-Reply-To: <1633fb91-3771-e37c-14ce-43f1b0cda6a0@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: SJ0PR03CA0124.namprd03.prod.outlook.com
 (2603:10b6:a03:33c::9) To BLAPR10MB5009.namprd10.prod.outlook.com
 (2603:10b6:208:321::10)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: fe94ae3b-ef47-4564-5615-08da06e73abc
X-MS-TrafficTypeDiagnostic: DM8PR10MB5495:EE_
X-Microsoft-Antispam-PRVS: 
	<DM8PR10MB5495D5707AC814D8FD657D2E8A119@DM8PR10MB5495.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	4APOm1SrBtQsYyaX/VOJV0NZ0F8/0rrlsqluUUCxIX6FVHa9JsqIIxTpxDNyrJijtsNPq0VjBX485waIKpFcFA6bBtTAs/uOpF7N9YwIAbjAg/SOfy0/lrBI3ApSC5ue/H/rifi0D5FuWSP3NWMcB/08LFNsgi6lZsRBjotJnKvrlNcXYu3/GyXR2vt97vDm/Ei+u323Y2rXMZNsTG/NHSZLFm4agp3oW7HEJlm4ntPjNRVlpV/3V8GdFo477A+ZvrL0sDBWzAFwAZU1QD4h7clQvF3k1DabC1xwlvdbiX4fV97Pd8L231uwoZ85lQiJNvWvFe6j6J6Vg9A3tYidSH4dNCVZTguJ42gJGv9qcu80QdaGKD+pVhF1PbgjYB6EQGCyGrFQ0FTFRZ1KE79ipZryosGnn5UHAA6u7sY0yQPumbTEUq+Z6scv0eWvhvnN7b1lZv4QFZNzXgGVgwppHYVxqhZN1MOCIym1uj4pSSnJm+KSwu0rF9oHkgMvKjKXMJTUPsAMObSmChEOZukgPFys8BwNwpUuQ2bnVwgC04+ZV7U/OIXG4ZpTxwNEmIwTYhNCXfHhBo2eSFgFsVaeH996hNCASwSXw7jbhVh/L+AMn/t9LWujG4JfGgzlEt9A+p8TMsaLukzo+OWKE77RH4wY7sUFFZpfGtxt7jvwso12axETLftEHR4sbq0p5vIOSZv6UbfINXcK+SyaieVAme98n76AMmWk+8V3pvmugOB6AgA9ymg0S3K2QCzuH0/l
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BLAPR10MB5009.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(316002)(2906002)(36756003)(66946007)(508600001)(8936002)(4744005)(66476007)(6486002)(44832011)(5660300002)(38100700002)(4326008)(8676002)(31696002)(66556008)(86362001)(31686004)(6512007)(2616005)(6666004)(6506007)(53546011)(186003)(26005)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?TWdyaS9LVEdYV2VNN1lUWGxlQVJoSnNpQStSek1OdytkTHI2MlRWVS9lLy9L?=
 =?utf-8?B?SDJURmxFRTl6Y2Fra3U3UWZEU2tPZDl0QyswdHBRWWRvekdwRjkwN3lIZjI4?=
 =?utf-8?B?bUJaTVBKbW1WVktHZG1oYlcwaWJsMCtUUzVjTllXMytNY3YzelJDN1pjUFk1?=
 =?utf-8?B?OGVESnl4bUlnd0tEKytycTFpUmRkOUxTbXhFdndJbGNQOHpNSW9xVWdwL0Nl?=
 =?utf-8?B?cnI3QlhnMnl0VndzTXM3YStUVUVXMDgxai93Y1Q4L29SOFpiVjE0Y3NKYlVl?=
 =?utf-8?B?Wk5sRHZxdzliMVJKaDhwNVc3ZkUxdTNoVWtuZERaMTN4OG05NEE5RnVGNEdJ?=
 =?utf-8?B?WG5ZSGNWeENxc0ljU3FQMVo1Y2hFL21nRTZXM1FFTEdlL3RtdHhxNDNtVXRQ?=
 =?utf-8?B?MWp3NjRpWHkxT2ZWTDl4ZldVVUp4aUdZVmNTVmVwL0RnbVZWSlJhbUxOVWh3?=
 =?utf-8?B?ODhGbVZpWDhpMTRoNlRQSGZUL0lleE9tdXhJcWsyVzY3c1FwRHJZckd0NUpo?=
 =?utf-8?B?MXREVldDTEJNLzR2QlRkSnIvdkNOTlY4Q3U5WjQyYUpLalZhZ0pOS0ZFdEt6?=
 =?utf-8?B?N0xTN0pVQlk1SzRSZ0g2NC9Ud0lORXRaOVZWTWhDbnQzUHplV0pEM3ZHNGxh?=
 =?utf-8?B?cENHSkc4RUdJVzlRSGZDN2JYRXc2OUExUk1WcUdoMmUxc01CaFpvMDh5L24y?=
 =?utf-8?B?U2hQNWlNMitLSFVPcmFJNXE1OHBkQW5RbWhncUFtY2Y1eHhRSXAzR01NWkoz?=
 =?utf-8?B?QlQ5c0FoYVJEY0M5THhkWlpScjlZdUpRcTJ0bEloa0FFZXZOTGFQRWRadlRH?=
 =?utf-8?B?bk43V0VBbXRiVzFyS0xtMFd1U2F5aU1taDRaYW5LZmlFRzBydTJCS2dDTkRu?=
 =?utf-8?B?bUs4SWJyaUd2ZjNrczlNcUhRODkrUGQvR0NJOXd0NUIzd3lKSlBRQStnVWRD?=
 =?utf-8?B?UkNHMUxVQ2gvbm5TTHJILzYyamNVNEJHb01OV2szcTV6K1pFQzZKZGdteGxz?=
 =?utf-8?B?QnNEVm85VE5yMk5kT202M0J3T3hSb3JyWUREZlF5Z21hdVJJeDlURmp0cnhm?=
 =?utf-8?B?Y1JpazF3SEtLRW1QMDRKN3RQQzY2dmVTWlZtMHcwYUptVnBXYnVobjJMTlhh?=
 =?utf-8?B?ZkVzV2llR2V4UjZmb1FVb3c3MEpVSmpJQ1NCbE1CRng4QVZma3JPNUIxNEsx?=
 =?utf-8?B?Nzh4L0pVdDRIRjBQRlJRRE9GTlJXMEs4RGFtOE1rS0NtOXJGSDNvNjBsdE9w?=
 =?utf-8?B?SDI2eWQrZEMyekJmVDI4dGNjcU9LRHZLMTBLa1dNZ0x5bVZqc29UUUxMclI3?=
 =?utf-8?B?Vnd2THpZeWFmQTlNQVk4RTVSZHhsWnVrZHZSeEl4Y0dmNDh1V1JXOUpZV0xH?=
 =?utf-8?B?cGVzd2x0K25LMjVwSEUvY01MWjJnYWdyc05Nc1dlQ0FSWGdXSWVGY3RjbTZv?=
 =?utf-8?B?RThYemFDSVZTM3RIR3IwMk12aVFXaGJNeWtya3hjc1k5ZUU2Q3M2Nlc2TG5z?=
 =?utf-8?B?dWNTUUtiM1VjaUtRUkVyRUFPWXc3NkdJbjUzTW1sMVYvUHJBMEZIL0xBTTB1?=
 =?utf-8?B?U3pMa25XaUpVQWxXN1F1ZVZ5VjZVSldTdUxVVWRKTmpUTkFTSUtDNUxwQS9q?=
 =?utf-8?B?c0VLSGI4V0xzeUdNekRvTlNDekJoQUpKbktyd1QrQ25jWk1tcVkxYU1TRVVu?=
 =?utf-8?B?NHZ0a0IyKzdyV2RtMkFkcyszUlZMdlVZTFBRaWIrb0x4eDBLd2hMZVc3am90?=
 =?utf-8?B?WjFVWTZVVDhXSklseEY3NHcyL3FZM1l4ajFHNTgrZDZ4UWd6eXdZRTRQTk54?=
 =?utf-8?B?WVd3WEczVERzYkozenBuMXMwYzlhWjJrYTNKY1VsUnlmWjNIeTFSTVRYRXVD?=
 =?utf-8?B?dmF0em5SM3dIVUpXVzd1K0oyUWphY1ljTU5EWXpnZkgzUWRSUmcrLy83S0M1?=
 =?utf-8?B?TVJsT1Y5OFlWQTBqbnNnaUpPVkJGL2E3WmlraDA5eUV1YmlHM2NGTDdmaVVi?=
 =?utf-8?B?WjhqR1BCcUx3PT0=?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: fe94ae3b-ef47-4564-5615-08da06e73abc
X-MS-Exchange-CrossTenant-AuthSource: BLAPR10MB5009.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Mar 2022 00:52:22.1479
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: maD0d0gFZLX2CLbALkBrVdSDZAcekyv63DRGWVOUvGpdNoLNgEP1ajkBaxW6GCG08pE5NqL/5DR17NvFlOgj8th/Ok5YfK6DiumgkoumUck=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM8PR10MB5495
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10287 signatures=693139
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxlogscore=999 phishscore=0
 suspectscore=0 adultscore=0 spamscore=0 bulkscore=0 malwarescore=0
 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1
 engine=8.12.0-2202240000 definitions=main-2203160003
X-Proofpoint-GUID: 0YRsdI6P-oItgD7VcED4I7DCD-vxJUwv
X-Proofpoint-ORIG-GUID: 0YRsdI6P-oItgD7VcED4I7DCD-vxJUwv



On 3/15/22 2:10 AM, Juergen Gross wrote:
> On 15.03.22 00:37, Boris Ostrovsky wrote:
>>
>> On 3/11/22 5:34 AM, Juergen Gross wrote:
>>> All grant table operations related to the "transfer" functionality
>>> are unused currently. There have been users in the old days of the
>>> "Xen-o-Linux" kernel, but those didn't make it upstream.
>>>
>>> So remove the "transfer" related functions.
>>
>>
>> Do we need to assert somewhere that transfer flags are not set?
> 
> This would be an orthogonal change, right? My patch is just removing
> never called functions.
> 

I was thinking of having this done as part of code removal (maybe as a separate patch).


> In any case I believe checking those flags is the job of the hypervisor.
> If an operation is illegal due to a transfer flag being set, it needs to
> be rejected at hypervisor level.

True.

Reviewed-by: Boris Ostrovsky <boris.ostrovsky@oracle.com>


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 01:28:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 01:28:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291007.493723 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUISL-0005QM-6B; Wed, 16 Mar 2022 01:28:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291007.493723; Wed, 16 Mar 2022 01:28:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUISL-0005QF-2K; Wed, 16 Mar 2022 01:28:05 +0000
Received: by outflank-mailman (input) for mailman id 291007;
 Wed, 16 Mar 2022 01:28:03 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=SzCg=T3=aim.com=brchuckz@srs-se1.protection.inumbo.net>)
 id 1nUISJ-0005Q9-2b
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 01:28:03 +0000
Received: from sonic308-8.consmr.mail.gq1.yahoo.com
 (sonic308-8.consmr.mail.gq1.yahoo.com [98.137.68.32])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 506d0f73-a4c8-11ec-853b-5f4723681683;
 Wed, 16 Mar 2022 02:28:00 +0100 (CET)
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic308.consmr.mail.gq1.yahoo.com with HTTP; Wed, 16 Mar 2022 01:27:58 +0000
Received: by kubenode521.mail-prod1.omega.ne1.yahoo.com (VZM Hermes SMTP
 Server) with ESMTPA ID 7cb405e66a15f40978b8915c0788dcd7; 
 Wed, 16 Mar 2022 01:27:55 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 506d0f73-a4c8-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netscape.net; s=a2048; t=1647394078; bh=i74NpBZTlnJtZy5cWd/xbyKRu8h0jzVV3zJBMfLtQgM=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From:Subject:Reply-To; b=ooWS9h4yYOK/rqq6SCm/mQa8Mbo+wMsyzPhB1czDfoxk/07n0Uy5oS6BWlTG6xu+1MkBnYS1QqVvB59MnaqElD3Nnx6CA+KDMVx15+eZ867gh49WmDmn5GY0g2kEQ35vJyJ6z448VPF663N2NDgWYuW+BNoprzHEhhLpcw3t8kfdf1PzCGutZSO/+e897VXBfOWjtYvPBVQf4PDIT56IJkjOhJPf1mY8Rm1lDLQUS3MOwUBzwZuTd0bVNGe51TqBu15qaH+X4JJdOtufWBSRLPt2RBWvEZ8zo3gT+SbTOonowjFwLtvLota4kmXlZEgGXPiP5FnPLMCXtxprbOWfMg==
X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1647394078; bh=rTv3Zj1YkWRRzqqTDJyFXpSBpytOJiFz6EDNIiGrTtB=; h=X-Sonic-MF:Date:Subject:To:From:From:Subject; b=bcrkbK2rnzSnP6IlYA3RQU+kDns7qrO2AfN7lg2No+x7La79AT4XTAqofixJXvhSH+xFpGM5N3CShTlzbBB+iuN8Zu0FDWz+xWyWfQYUOdqDGBlPVAyzH0+3/7FIRcjxkSK1y8nYU3nWUQJyz9CyVWG1jqzgoToQWUbgq5cUO/eokCp8RTjpE+gCcNNvVPsSuCVgEmngHtXorPobajzc9ojAL824ATZ9wRL/u65SL2UZLQWN5Vdr2a97EAEUz8EYECugb8uru025XIEHq9K8pwYzbopPloIeDvIvZ+ZuGtmwQvUWONC3l/Epe/WGWAtKbA5fEDDdQKYTf/51ST+NqA==
X-YMail-OSG: kmjE2uUVM1n5mUISPaoaHJzednOQMni5YMCmTuyOPpZPAQ3Pl02JHe_B7gQBExM
 xAUT2OnD9rTU4.3QI0BuOqiIUGU5zyQL0VoBlqZKK2U8nSMw0.oIjfKiQZ7zyMvOqtDDTQHXYwzZ
 kwmrgaa_XiCqoEwhOL.v9TfAlYuw57QkzUlh265We7vcMrZa2T1M.dXR2J.4jLWIYaC4YAKnFGMo
 C.7v1PLOQ6UL4g0d4kh2K4q4vzHaD4ciSHUCzsKYOl2la3tyuHkh0bGeGaiNtL5sAS0.0S2LVpiF
 UM9HiwkUGTk86TbKSwSi4J_jsNSwg9jaUHFVu66qAVqYKPQ94BI_czfc7oDQB9YpKALkz9az1lgP
 tqz_PijJILfth_TXFguUTB0qPm5lxo1zIK2Dyw63mEdvQ36RYAI0MwTnjgq8G6jZGupweuFnHTiU
 0zbcmygtZUQvdUxWpjG_OBsRW0QowTfp1DQfm66fbaJbnUMQh5rJ0bBSVbyAMpLWVr4AHBnMX1z6
 _ANyNCMwUK5taytjjcodoO1p3fpQY2KvU77OhZvlFDxz6L7MHGxZO.hVBKx9Je0I9QIHorH.z9t3
 k4HE7J3Gk6Qgpe.e55y1XHjJOeY418t_Dw38s0h5z.QrnfiAErwGw3YBqFfkYbDbxhuT.GPPoLT6
 e18du394Qs6KNCjqh.jWa0rc8Q84kaI_8LjTAVQiBVLa47u1GIYg8Fw82JCVNRYeQ8XBbyuTFiJB
 gQa.VovHkA.rt4aJZypPUPoaZRve3k6mUSBl7KTPZ1OkitJPmn1WvMyO76UhO3G2PLuULB4jVWDH
 rjoSbnP.B.ngq353ptYNw2VrH.rj7PyecFC.S0bAIWdjs9yMngMdR2jJSc7xbIBF8jl6ieXIsPcJ
 h8tMrEvhM7uFsyid2_VuOr15ounL0DSvCBb3q913uJumY_ii4KTCBqH3rqEXxhqTFja1_z8jaypg
 wMPKjQYEqLuj7lOsnqnlIuhNVyNzsLWVSGwnZDp6EkvJZTHG.3O2S.mDb04PAsyxxPbCAG8jn.uG
 hiYvUNlK21qqvO7VK4WQkHM8f3sVE_eQM7_oAo6hFwYwdoudjpOnS2tsBaCPSfazFm6_ZBBpEXn1
 3n.ak22Y83c3eekffoVM6M0m4aUSpl5XPxsqDbDvmYGaVdfc_zpBWhycrp01k_QtsB6jvz33SGmf
 mQ.eZLdDruVzYAP7WPnGIX3C2ZTGoVEuGSn.5NZl8USg.fjHNwBOFmjmNBQ5xg76BtxbKv1EPnE.
 ll5ws0G9dj8OIG7JKGpWv2m8OL2Flb685BfiHXKXL24b_.McCBH0uJsijffAapFBsvbyHmC4Kdx.
 qDWtlG90tFAUPWRX4lKiOIIfH7vrJ7S3fLnRD7odtzC2GkNc0kDP5PJLFbM6rb60UvnzQ7jbhgFq
 qz00iRl2GMvXlwgX4OK7Ar5PN2FZ5kiH8bkC_BRsUXA9qHU7YvlciSbRvGHwnK1vBhftGD8sbLs4
 cdrRrx4_gv6E130HrlYXlJIlRcW2qx1JsRUAuB4gxOvSfUj5b1BApLxHDJQlwtiqFRy18X.Rl2id
 _Jgl6.dclhiNeR1v2_qpXKiWIIIWrsES_uYtwjdmIWhYZ.eBhzhaVscrGHxm1rvPxONrTW6qbVN2
 1bhvex9XlNeGoJlI1u7ZaT.lhewTLi_I4PvjQ7.nPPXI5e.lUs.AeZKVluWHYgD0cKnM.EE7psk5
 N4Ox8RCT.bO_Ih0wkHp5trtIgkwm3ickd2dgQzrEMwi7E8u2rP0.tiOfVrdh1Z9dojcYrm8.0eNB
 LmSMn8nD.5OY683FEjQgUj0arxCS9pTkKdF0v8u0NGYKvuf9BZfsWGRwa_IoW6oM1NRh4K4MQhca
 rjzj5dv6VrfcCtDVFn6ydN_WPR_X0BsbsVX4ioMLt8DhhPEz32p.9_PpVM3SZj_cmuNzd4yD79Kl
 Og.M18BRgYRNQivc1S4dm.HMl4OjHNxuXMg52Mxe3wkiiQVQo_gjMZ6QwbWbVzF8wjwOjA8Ng3vt
 w9Qz7MfFeLshHyhhjY4j6yyHMWlBVM0iILcxWxzoZtQIPC9YUNSilYmiVnfejTAaE1johd4U7UQd
 2jCU7qBXZvi9RNbswV3TzjwTtGpA29JiF3OF9Cmt_l5Xemi2u0ZBKlVIhsIy_VvmCqSTaVpK_HVQ
 JD9ooO55FEkIp20GMfEXfCXIkGuxdAJFY7HfW58XDJ7Q0x8o5P2HId4OJGN3MRN0z_KeZUuOnRCr
 7Sur2f5g5
X-Sonic-MF: <brchuckz@aim.com>
Message-ID: <da166412-9765-039f-9248-869204d78c36@netscape.net>
Date: Tue, 15 Mar 2022 21:27:54 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [XEN PATCH] tools/libs/light/libxl_pci.c: explicitly grant access
 to Intel IGD opregion
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>
Cc: Wei Liu <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>,
 Juergen Gross <jgross@suse.com>, xen-devel@lists.xenproject.org
References: <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz.ref@netscape.net>
 <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz@netscape.net>
 <23f5afb4-c712-f872-acee-7f18b98b73e6@suse.com>
From: Chuck Zmudzinski <brchuckz@netscape.net>
In-Reply-To: <23f5afb4-c712-f872-acee-7f18b98b73e6@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Mailer: WebService/1.1.19878 mail.backend.jedi.jws.acl:role.jedi.acl.token.atz.jws.hermes.aol
Content-Length: 1845



On 3/15/22 7:38 AM, Jan Beulich wrote:
> On 14.03.2022 04:41, Chuck Zmudzinski wrote:
>
>> @@ -610,6 +612,45 @@ out:
>>       return ret;
>>   }
>>   
>> +static uint32_t sysfs_dev_get_igd_opregion(libxl__gc *gc,
>> +                                           libxl_device_pci *pci)
>> +{
>> +    char *pci_device_config_path =
>> +            GCSPRINTF(SYSFS_PCI_DEV"/"PCI_BDF"/config",
>> +                      pci->domain, pci->bus, pci->dev, pci->func);
>> +    size_t read_items;
>> +    uint32_t igd_opregion;
>> +    uint32_t error = 0xffffffff;
> I think this constant wants to gain a #define, to be able to correlate
> the use sites. I'm also not sure of the value - in principle the
> register can hold this value, but of course then it won't be 3 pages.
>

I have one more comment to add here. I am not intending
to define igd_opregion as a data structure 3 pages (12k)
long, much less as a pointer to such a structure. However,
it would be nice to have access to the actual data structure
in libxl, because we could use it to validate its contents.
I looked in the code for the i915 Linux kernel module, and
the IGD opregion does have a signature that we could check
if we have access to it. That would mitigate my concerns
expressed in my first version of the patch about a false
positive when identifying an Intel IGD. Hvmloader should
probably also do this check before it maps the Intel IGD
into guest memory if that is possible. However, I expect
that it is not a memory that libxl has access to. It is
probably a structure in kernel space, but it might be
possible for libxl to ask the hypervisor for access to it.
Perhaps the libxl maintainers can shed some light on that
possibility. If this is possible, I will include such a check for
the validity of the contents in the IGD in version 2 of the
patch.

Regards,

Chuck


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 02:53:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 02:53:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291019.493733 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUJmc-00068s-Hu; Wed, 16 Mar 2022 02:53:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291019.493733; Wed, 16 Mar 2022 02:53:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUJmc-00068l-Du; Wed, 16 Mar 2022 02:53:06 +0000
Received: by outflank-mailman (input) for mailman id 291019;
 Wed, 16 Mar 2022 02:53:05 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUJmb-00068b-L0; Wed, 16 Mar 2022 02:53:05 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUJmb-00081I-J4; Wed, 16 Mar 2022 02:53:05 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUJmb-0003cl-3g; Wed, 16 Mar 2022 02:53:05 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUJmb-0000Nb-3G; Wed, 16 Mar 2022 02:53:05 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=5ay5zEg9p1BaLBL3PKtk0W262iesldIZFNvgHHL4qNs=; b=6vJbKGKNrcs9n2Pd2vLuC0JwrO
	QSxR8SDaytzM0RlflGMIE55KmOEDwXWFTtAZhsmFReznAr+gPaRgKvVC3QXp2hgPbKGPSbDa2txtE
	cDRbPUHXjFH+RcXxNtKEMU+0JyDvv2Iu9tOSF+Dw4iYhMAl39VvQyjDIp/GUERLkCU1s=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168625-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168625: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c8ea48bdf95532f9a3a4c39a154c09988566901f
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 16 Mar 2022 02:53:05 +0000

flight 168625 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168625/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c8ea48bdf95532f9a3a4c39a154c09988566901f
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   15 days
Failing since        168258  2022-03-01 01:55:31 Z   15 days  146 attempts
Testing same since   168617  2022-03-15 15:41:41 Z    0 days    5 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 653 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 03:48:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 03:48:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291028.493745 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUKdq-0002st-G9; Wed, 16 Mar 2022 03:48:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291028.493745; Wed, 16 Mar 2022 03:48:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUKdq-0002sm-D9; Wed, 16 Mar 2022 03:48:06 +0000
Received: by outflank-mailman (input) for mailman id 291028;
 Wed, 16 Mar 2022 03:48:05 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUKdp-0002sc-Ll; Wed, 16 Mar 2022 03:48:05 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUKdp-0000UU-IZ; Wed, 16 Mar 2022 03:48:05 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUKdp-00060W-7j; Wed, 16 Mar 2022 03:48:05 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUKdp-0004FZ-7J; Wed, 16 Mar 2022 03:48:05 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=l2/uQdeS2glb2k/RKVRX/+RCXfZFv8Vt1Oq1obpKhSM=; b=fiUqe4ZAdLOhGbQbiONgeIeHcK
	eVMUpaxFDb4ZHfJaB5uOGNLF3fQ1kos9le3TrXGpnJS43f5pUYDJ7monSuUy8o7NzaTAUe1uVemvK
	ITZ+tqGAjU32apr9vABqTP9UWU1rR/MKaJ2CewJB9FLfdEWGtP2boZh5Tmyn0i7BKQz8=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168627-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168627: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c8ea48bdf95532f9a3a4c39a154c09988566901f
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 16 Mar 2022 03:48:05 +0000

flight 168627 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168627/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c8ea48bdf95532f9a3a4c39a154c09988566901f
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   15 days
Failing since        168258  2022-03-01 01:55:31 Z   15 days  147 attempts
Testing same since   168617  2022-03-15 15:41:41 Z    0 days    6 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 653 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 04:03:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 04:03:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291035.493755 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUKsX-0005Fv-PD; Wed, 16 Mar 2022 04:03:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291035.493755; Wed, 16 Mar 2022 04:03:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUKsX-0005Fo-MG; Wed, 16 Mar 2022 04:03:17 +0000
Received: by outflank-mailman (input) for mailman id 291035;
 Wed, 16 Mar 2022 04:03:17 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUKsW-0005Fe-UV; Wed, 16 Mar 2022 04:03:16 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUKsW-0000ph-NC; Wed, 16 Mar 2022 04:03:16 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUKsW-0006cR-AA; Wed, 16 Mar 2022 04:03:16 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUKsW-0003jJ-9e; Wed, 16 Mar 2022 04:03:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=ncnqf/ivm9d6dgRLfuzKWgnTp9X1f0hNp5IJSb1NPBE=; b=OvqupM/vk9/lmuO4vNYFhAtJe7
	HT6fjMDQm9L1ZpoYyEEPjb2i0vtvI9AqW5JXA1/u9eDNj2YogY5Jqq/vscdTVlNCELfqAiFB5RLLp
	HEu1sHIkmWKu5+c7MZ6zhlLjeQFqZK/oCX15NKmxZQDwX7a3SzH36fJXTDAxnp2pkipw=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168620-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168620: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-freebsd11-amd64:guest-start:fail:heisenbug
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=56e337f2cf1326323844927a04e9dbce9a244835
X-Osstest-Versions-That:
    linux=09688c0166e76ce2fb85e86b9d99be8b0084cdf9
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 16 Mar 2022 04:03:16 +0000

flight 168620 linux-linus real [real]
flight 168628 linux-linus real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168620/
http://logs.test-lab.xenproject.org/osstest/logs/168628/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-freebsd11-amd64 13 guest-start     fail pass in 168628-retest

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168575
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168575
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168575
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168575
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168575
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168575
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168575
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168575
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                56e337f2cf1326323844927a04e9dbce9a244835
baseline version:
 linux                09688c0166e76ce2fb85e86b9d99be8b0084cdf9

Last test of basis   168575  2022-03-14 03:07:00 Z    2 days
Testing same since   168620  2022-03-15 18:10:19 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bartosz Golaszewski <brgl@bgdev.pl>
  Eli Cohen <elic@nvidia.com>
  Jason Wang <jasowang@redhat.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Michael S. Tsirkin <mst@redhat.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             fail    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   09688c0166e7..56e337f2cf13  56e337f2cf1326323844927a04e9dbce9a244835 -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 05:15:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 05:15:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290965.493767 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nULzk-0004bL-6I; Wed, 16 Mar 2022 05:14:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290965.493767; Wed, 16 Mar 2022 05:14:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nULzk-0004bE-38; Wed, 16 Mar 2022 05:14:48 +0000
Received: by outflank-mailman (input) for mailman id 290965;
 Tue, 15 Mar 2022 22:30:01 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Tvka=T2=amd.com=vikram.garhwal@srs-se1.protection.inumbo.net>)
 id 1nUFg1-0004Aw-Cw
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 22:30:01 +0000
Received: from NAM02-DM3-obe.outbound.protection.outlook.com (unknown
 [2a01:111:f400:7e83::45])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 71e26543-a4af-11ec-8eba-a37418f5ba1a;
 Tue, 15 Mar 2022 23:29:58 +0100 (CET)
Received: from DM5PR21CA0006.namprd21.prod.outlook.com (2603:10b6:3:ac::16) by
 SJ0PR02MB8766.namprd02.prod.outlook.com (2603:10b6:a03:3d8::6) with
 Microsoft
 SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14; Tue, 15 Mar 2022 22:29:56 +0000
Received: from DM3NAM02FT058.eop-nam02.prod.protection.outlook.com
 (2603:10b6:3:ac:cafe::36) by DM5PR21CA0006.outlook.office365.com
 (2603:10b6:3:ac::16) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14 via Frontend
 Transport; Tue, 15 Mar 2022 22:29:56 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (149.199.62.198) by
 DM3NAM02FT058.mail.protection.outlook.com (10.13.5.42) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5061.22 via Frontend Transport; Tue, 15 Mar 2022 22:29:55 +0000
Received: from xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 15 Mar 2022 15:29:51 -0700
Received: from smtp.xilinx.com (172.19.127.96) by
 xsj-pvapexch02.xlnx.xilinx.com (172.19.86.41) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 15 Mar 2022 15:29:51 -0700
Received: from [172.19.2.115] (port=33390 helo=xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <vikram.garhwal@amd.com>)
 id 1nUFfr-00023D-4F; Tue, 15 Mar 2022 15:29:51 -0700
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 71e26543-a4af-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=OauZIzfM02fl4GhLQk/xojHg2dYk/LRd8j0UNhdqbYVCIF9rk6NUGTNZREFXkpeelxrJm0CKzbDVX7gyCIApgmmoJw5rzc4wsusEqjVV+3bd442gxsRPSyC7Ft4YRGrGY3t4tgiQAP5Ibja2t3AxPv1eXpbvWHWugeCOAbYKoLn1Ovc/F/nV18CBTGJdN1eTHWEj2QCK6fDwAx8+8pFy8YnZSjWuReREjBqo46FS47VwjDvShTozejQ6yCSA7kSbIMfZO6lFrD/FLTLxPL/zDiOKQ+AKGLMWlsG88eTs+g7bP/tFQZic2J6d5Ly2jbJuEBwyRTcFbsNG23GWNBPYxQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=tUVNUAbPpfhC7PSf79ggsWAwd/dzcuMt9kx31RElC4w=;
 b=h4wSMvtKyxPitdGJrV3NiAwFFqgMQ543WdL2MiCMKM15RG/fwlgU93NsaacoUHALDVc1R01aG7tKVtjt14gngcapfcwDE2EqKl+8pLGijYV6vd5sgkFIruZ3kbbKG90aCAa7XyYEH1C5a409ob6zGTOs6HzNVK5tWjKUj7JzDDXfreAn7/BX0zlTDWYh3Qy+BiuSNo6t/+vJ99pNQU6USTxKxEHaEQrD8fqpYcAGEi/jruX/+DYGL2pgOMM/y2U0lry4+UDjm2Vwqrlc/HoQFrBCknl2KcSPvtFDfU1hpSJXuH/aKn6CTh5Ua62bIDn3eh/kACdHS4HnbT1dtHPqdQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=softfail (sender ip
 is 149.199.62.198) smtp.rcpttodomain=arm.com smtp.mailfrom=amd.com;
 dmarc=fail (p=quarantine sp=quarantine pct=100) action=quarantine
 header.from=amd.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=tUVNUAbPpfhC7PSf79ggsWAwd/dzcuMt9kx31RElC4w=;
 b=cccZDWo1duilI5MFJrXhzKdCaFUcOluJ/chqVDukennGwbAA7DT8SNh7dHNqQninAgdXgoDwNciPCwl6I41TNmxzpMJ9cIjxUfmxtQPjYP+3zS9pF3rTjCiQMMkAFBfi3yZaoMwyXe79hjhKaPQSq9/I98FdN/txevS2ttjqPrU=
X-MS-Exchange-Authentication-Results: spf=softfail (sender IP is
 149.199.62.198) smtp.mailfrom=amd.com; dkim=none (message not signed)
 header.d=none;dmarc=fail action=quarantine header.from=amd.com;
Received-SPF: SoftFail (protection.outlook.com: domain of transitioning
 amd.com discourages use of 149.199.62.198 as permitted sender)
Date: Tue, 15 Mar 2022 15:29:51 -0700
From: Vikram Garhwal <vikram.garhwal@amd.com>
To: Luca Fancellu <Luca.Fancellu@arm.com>
CC: Vikram Garhwal <fnu.vikram@xilinx.com>, Xen-devel
	<xen-devel@lists.xenproject.org>, "sstabellini@kernel.org"
	<sstabellini@kernel.org>, "julien@xen.org" <julien@xen.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, "volodymyr_babchuk@epam.com"
	<volodymyr_babchuk@epam.com>
Subject: Re: [XEN][RFC PATCH v3 01/14] xen/arm/device: Remove __init from
 function type
Message-ID: <20220315222949.GA23054@xilinx.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
 <20220308194704.14061-2-fnu.vikram@xilinx.com>
 <337CEFA8-895C-4B5D-810A-3D4E2927CE01@arm.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
In-Reply-To: <337CEFA8-895C-4B5D-810A-3D4E2927CE01@arm.com>
User-Agent: Mutt/1.9.4 (2018-02-28)
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 04a942af-d10f-4e4f-e32b-08da06d354c3
X-MS-TrafficTypeDiagnostic: SJ0PR02MB8766:EE_
X-Microsoft-Antispam-PRVS:
	<SJ0PR02MB8766D2EBA3B2E75B707E1BD79F109@SJ0PR02MB8766.namprd02.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 2
X-MS-Exchange-AntiSpam-Relay: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.62.198;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:xsj-pvapexch02.xlnx.xilinx.com;PTR:unknown-62-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(5660300002)(35950700001)(2906002)(83380400001)(1076003)(6916009)(40460700003)(54906003)(36756003)(8936002)(86362001)(336012)(316002)(9786002)(30864003)(7696005)(53546011)(47076005)(7636003)(508600001)(33656002)(356005)(26005)(9686003)(44832011)(82310400004)(8676002)(70586007)(70206006)(4326008);DIR:OUT;SFP:1022;
X-OriginatorOrg: xilinx.onmicrosoft.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Mar 2022 22:29:55.5399
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 04a942af-d10f-4e4f-e32b-08da06d354c3
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.62.198];Helo=[xsj-pvapexch02.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DM3NAM02FT058.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR02MB8766

On Mon, Mar 14, 2022 at 12:31:06PM +0000, Luca Fancellu wrote:
> 
> 
> > On 8 Mar 2022, at 19:46, Vikram Garhwal <fnu.vikram@xilinx.com> wrote:
> > 
> > Change function type of following function to access during runtime:
> >    1. map_irq_to_domain()
> >    2. handle_device_interrupt()
> >    3. map_range_to_domain()
> >    4. unflatten_dt_node()
> >    5. unflatten_device_tree()
> > 
> > Move map_irq_to_domain(), handle_device_interrupt() and map_range_to_domain() to
> > device.c.
> > 
> > These changes are done to support the dynamic programming of a nodes where an
> > overlay node will be added to fdt and unflattened node will be added to dt_host.
> > Furthermore, IRQ and mmio mapping will be done for the added node.
> > 
> > Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com>
> > ---
> > xen/arch/arm/device.c            | 136 +++++++++++++++++++++++++++++
> > xen/arch/arm/domain_build.c      | 142 -------------------------------
> > xen/arch/arm/include/asm/setup.h |   3 +
> > xen/common/device_tree.c         |  20 ++---
> > xen/include/xen/device_tree.h    |   5 ++
> > 5 files changed, 154 insertions(+), 152 deletions(-)
> > 
> > diff --git a/xen/arch/arm/device.c b/xen/arch/arm/device.c
> > index 70cd6c1a19..0dfd33b33e 100644
> > --- a/xen/arch/arm/device.c
> > +++ b/xen/arch/arm/device.c
> > @@ -21,6 +21,9 @@
> > #include <xen/errno.h>
> > #include <xen/init.h>
> > #include <xen/lib.h>
> > +#include <xen/iocap.h>
> > +#include <asm/domain_build.h>
> > +#include <asm/setup.h>
> > 
> > extern const struct device_desc _sdevice[], _edevice[];
> > extern const struct acpi_device_desc _asdevice[], _aedevice[];
> > @@ -84,6 +87,139 @@ enum device_class device_get_class(const struct dt_device_node *dev)
> >     return DEVICE_UNKNOWN;
> > }
> > 
> > +int map_irq_to_domain(struct domain *d, unsigned int irq,
> > +                      bool need_mapping, const char *devname)
> > +{
> > +    int res;
> > +
> > +    res = irq_permit_access(d, irq);
> > +    if ( res )
> > +    {
> > +        printk(XENLOG_ERR "Unable to permit to dom%u access to IRQ %u\n",
> > +               d->domain_id, irq);
> > +        return res;
> > +    }
> > +
> > +    if ( need_mapping )
> > +    {
> > +        /*
> > +         * Checking the return of vgic_reserve_virq is not
> > +         * necessary. It should not fail except when we try to map
> > +         * the IRQ twice. This can legitimately happen if the IRQ is shared
> > +         */
> > +        vgic_reserve_virq(d, irq);
> > +
> > +        res = route_irq_to_guest(d, irq, irq, devname);
> > +        if ( res < 0 )
> > +        {
> > +            printk(XENLOG_ERR "Unable to map IRQ%"PRId32" to dom%d\n",
> > +                   irq, d->domain_id);
> > +            return res;
> > +        }
> > +    }
> > +
> > +    dt_dprintk("  - IRQ: %u\n", irq);
> > +    return 0;
> > +}
> > +
> > +int map_range_to_domain(const struct dt_device_node *dev,
> > +                        u64 addr, u64 len, void *data)
> > +{
> > +    struct map_range_data *mr_data = data;
> > +    struct domain *d = mr_data->d;
> > +    int res;
> > +
> > +    res = iomem_permit_access(d, paddr_to_pfn(addr),
> > +            paddr_to_pfn(PAGE_ALIGN(addr + len - 1)));
> 
> Hi Vikram,
> 
> Why the if ( strncasecmp(dt_node_full_name(dev), "/reserved-memory/",
> strlen("/reserved-memory/")) != 0 ) was dropped?
> 
Hi Luca,
Thanks for spotting this. Yeah, I messed this while porting the patches from 
internal to upstream Xen.
Will address this in v4!

> 
> > +    if ( res )
> > +    {
> > +        printk(XENLOG_ERR "Unable to permit to dom%d access to"
> > +                " 0x%"PRIx64" - 0x%"PRIx64"\n",
> > +                d->domain_id,
> > +                addr & PAGE_MASK, PAGE_ALIGN(addr + len) - 1);
> > +        return res;
> > +    }
> > +
> > +    if ( !mr_data->skip_mapping )
> > +    {
> > +        res = map_regions_p2mt(d,
> > +                               gaddr_to_gfn(addr),
> > +                               PFN_UP(len),
> > +                               maddr_to_mfn(addr),
> > +                               mr_data->p2mt);
> > +
> > +        if ( res < 0 )
> > +        {
> > +            printk(XENLOG_ERR "Unable to map 0x%"PRIx64
> > +                   " - 0x%"PRIx64" in domain %d\n",
> > +                   addr & PAGE_MASK, PAGE_ALIGN(addr + len) - 1,
> > +                   d->domain_id);
> > +            return res;
> > +        }
> > +    }
> > +
> > +    dt_dprintk("  - MMIO: %010"PRIx64" - %010"PRIx64" P2MType=%x\n",
> > +               addr, addr + len, mr_data->p2mt);
> > +
> > +    return 0;
> > +}
> > +
> > +/*
> > + * handle_device_interrupts retrieves the interrupts configuration from
> > + * a device tree node and maps those interrupts to the target domain.
> > + *
> > + * Returns:
> > + *   < 0 error
> > + *   0   success
> > + */
> > +int handle_device_interrupts(struct domain *d,
> > +                             struct dt_device_node *dev,
> > +                             bool need_mapping)
> > +{
> > +    unsigned int i, nirq;
> > +    int res;
> > +    struct dt_raw_irq rirq;
> > +
> > +    nirq = dt_number_of_irq(dev);
> > +
> > +    /* Give permission and map IRQs */
> > +    for ( i = 0; i < nirq; i++ )
> > +    {
> > +        res = dt_device_get_raw_irq(dev, i, &rirq);
> > +        if ( res )
> > +        {
> > +            printk(XENLOG_ERR "Unable to retrieve irq %u for %s\n",
> > +                   i, dt_node_full_name(dev));
> > +            return res;
> > +        }
> > +
> > +        /*
> > +         * Don't map IRQ that have no physical meaning
> > +         * ie: IRQ whose controller is not the GIC
> > +         */
> > +        if ( rirq.controller != dt_interrupt_controller )
> > +        {
> > +            dt_dprintk("irq %u not connected to primary controller. Connected to %s\n",
> > +                      i, dt_node_full_name(rirq.controller));
> > +            continue;
> > +        }
> > +
> > +        res = platform_get_irq(dev, i);
> > +        if ( res < 0 )
> > +        {
> > +            printk(XENLOG_ERR "Unable to get irq %u for %s\n",
> > +                   i, dt_node_full_name(dev));
> > +            return res;
> > +        }
> > +
> > +        res = map_irq_to_domain(d, res, need_mapping, dt_node_name(dev));
> > +        if ( res )
> > +            return res;
> > +    }
> > +
> > +    return 0;
> > +}
> > +
> > /*
> >  * Local variables:
> >  * mode: C
> > diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
> > index 8be01678de..b06770a2af 100644
> > --- a/xen/arch/arm/domain_build.c
> > +++ b/xen/arch/arm/domain_build.c
> > @@ -1794,41 +1794,6 @@ int __init make_chosen_node(const struct kernel_info *kinfo)
> >     return res;
> > }
> > 
> > -int __init map_irq_to_domain(struct domain *d, unsigned int irq,
> > -                             bool need_mapping, const char *devname)
> > -{
> > -    int res;
> > -
> > -    res = irq_permit_access(d, irq);
> > -    if ( res )
> > -    {
> > -        printk(XENLOG_ERR "Unable to permit to dom%u access to IRQ %u\n",
> > -               d->domain_id, irq);
> > -        return res;
> > -    }
> > -
> > -    if ( need_mapping )
> > -    {
> > -        /*
> > -         * Checking the return of vgic_reserve_virq is not
> > -         * necessary. It should not fail except when we try to map
> > -         * the IRQ twice. This can legitimately happen if the IRQ is shared
> > -         */
> > -        vgic_reserve_virq(d, irq);
> > -
> > -        res = route_irq_to_guest(d, irq, irq, devname);
> > -        if ( res < 0 )
> > -        {
> > -            printk(XENLOG_ERR "Unable to map IRQ%"PRId32" to dom%d\n",
> > -                   irq, d->domain_id);
> > -            return res;
> > -        }
> > -    }
> > -
> > -    dt_dprintk("  - IRQ: %u\n", irq);
> > -    return 0;
> > -}
> > -
> > static int __init map_dt_irq_to_domain(const struct dt_device_node *dev,
> >                                        const struct dt_irq *dt_irq,
> >                                        void *data)
> > @@ -1860,57 +1825,6 @@ static int __init map_dt_irq_to_domain(const struct dt_device_node *dev,
> >     return 0;
> > }
> > 
> > -int __init map_range_to_domain(const struct dt_device_node *dev,
> > -                               u64 addr, u64 len, void *data)
> > -{
> > -    struct map_range_data *mr_data = data;
> > -    struct domain *d = mr_data->d;
> > -    int res;
> > -
> > -    /*
> > -     * reserved-memory regions are RAM carved out for a special purpose.
> > -     * They are not MMIO and therefore a domain should not be able to
> > -     * manage them via the IOMEM interface.
> > -     */
> > -    if ( strncasecmp(dt_node_full_name(dev), "/reserved-memory/",
> > -                     strlen("/reserved-memory/")) != 0 )
> > -    {
> > -        res = iomem_permit_access(d, paddr_to_pfn(addr),
> > -                paddr_to_pfn(PAGE_ALIGN(addr + len - 1)));
> > -        if ( res )
> > -        {
> > -            printk(XENLOG_ERR "Unable to permit to dom%d access to"
> > -                    " 0x%"PRIx64" - 0x%"PRIx64"\n",
> > -                    d->domain_id,
> > -                    addr & PAGE_MASK, PAGE_ALIGN(addr + len) - 1);
> > -            return res;
> > -        }
> > -    }
> > -
> > -    if ( !mr_data->skip_mapping )
> > -    {
> > -        res = map_regions_p2mt(d,
> > -                               gaddr_to_gfn(addr),
> > -                               PFN_UP(len),
> > -                               maddr_to_mfn(addr),
> > -                               mr_data->p2mt);
> > -
> > -        if ( res < 0 )
> > -        {
> > -            printk(XENLOG_ERR "Unable to map 0x%"PRIx64
> > -                   " - 0x%"PRIx64" in domain %d\n",
> > -                   addr & PAGE_MASK, PAGE_ALIGN(addr + len) - 1,
> > -                   d->domain_id);
> > -            return res;
> > -        }
> > -    }
> > -
> > -    dt_dprintk("  - MMIO: %010"PRIx64" - %010"PRIx64" P2MType=%x\n",
> > -               addr, addr + len, mr_data->p2mt);
> > -
> > -    return 0;
> > -}
> > -
> > /*
> >  * For a node which describes a discoverable bus (such as a PCI bus)
> >  * then we may need to perform additional mappings in order to make
> > @@ -1938,62 +1852,6 @@ static int __init map_device_children(const struct dt_device_node *dev,
> >     return 0;
> > }
> > 
> > -/*
> > - * handle_device_interrupts retrieves the interrupts configuration from
> > - * a device tree node and maps those interrupts to the target domain.
> > - *
> > - * Returns:
> > - *   < 0 error
> > - *   0   success
> > - */
> > -static int __init handle_device_interrupts(struct domain *d,
> > -                                           struct dt_device_node *dev,
> > -                                           bool need_mapping)
> > -{
> > -    unsigned int i, nirq;
> > -    int res;
> > -    struct dt_raw_irq rirq;
> > -
> > -    nirq = dt_number_of_irq(dev);
> > -
> > -    /* Give permission and map IRQs */
> > -    for ( i = 0; i < nirq; i++ )
> > -    {
> > -        res = dt_device_get_raw_irq(dev, i, &rirq);
> > -        if ( res )
> > -        {
> > -            printk(XENLOG_ERR "Unable to retrieve irq %u for %s\n",
> > -                   i, dt_node_full_name(dev));
> > -            return res;
> > -        }
> > -
> > -        /*
> > -         * Don't map IRQ that have no physical meaning
> > -         * ie: IRQ whose controller is not the GIC
> > -         */
> > -        if ( rirq.controller != dt_interrupt_controller )
> > -        {
> > -            dt_dprintk("irq %u not connected to primary controller. Connected to %s\n",
> > -                      i, dt_node_full_name(rirq.controller));
> > -            continue;
> > -        }
> > -
> > -        res = platform_get_irq(dev, i);
> > -        if ( res < 0 )
> > -        {
> > -            printk(XENLOG_ERR "Unable to get irq %u for %s\n",
> > -                   i, dt_node_full_name(dev));
> > -            return res;
> > -        }
> > -
> > -        res = map_irq_to_domain(d, res, need_mapping, dt_node_name(dev));
> > -        if ( res )
> > -            return res;
> > -    }
> > -
> > -    return 0;
> > -}
> > -
> > /*
> >  * For a given device node:
> >  *  - Give permission to the guest to manage IRQ and MMIO range
> > diff --git a/xen/arch/arm/include/asm/setup.h b/xen/arch/arm/include/asm/setup.h
> > index 7a1e1d6798..8a26f1845c 100644
> > --- a/xen/arch/arm/include/asm/setup.h
> > +++ b/xen/arch/arm/include/asm/setup.h
> > @@ -134,6 +134,9 @@ void device_tree_get_reg(const __be32 **cell, u32 address_cells,
> > u32 device_tree_get_u32(const void *fdt, int node,
> >                         const char *prop_name, u32 dflt);
> > 
> > +int handle_device_interrupts(struct domain *d, struct dt_device_node *dev,
> > +                             bool need_mapping);
> > +
> > int map_range_to_domain(const struct dt_device_node *dev,
> >                         u64 addr, u64 len, void *data);
> > 
> > diff --git a/xen/common/device_tree.c b/xen/common/device_tree.c
> > index 4aae281e89..f43d66a501 100644
> > --- a/xen/common/device_tree.c
> > +++ b/xen/common/device_tree.c
> > @@ -1811,12 +1811,12 @@ int dt_count_phandle_with_args(const struct dt_device_node *np,
> >  * @allnextpp: pointer to ->allnext from last allocated device_node
> >  * @fpsize: Size of the node path up at the current depth.
> >  */
> > -static unsigned long __init unflatten_dt_node(const void *fdt,
> > -                                              unsigned long mem,
> > -                                              unsigned long *p,
> > -                                              struct dt_device_node *dad,
> > -                                              struct dt_device_node ***allnextpp,
> > -                                              unsigned long fpsize)
> > +static unsigned long unflatten_dt_node(const void *fdt,
> > +                                       unsigned long mem,
> > +                                       unsigned long *p,
> > +                                       struct dt_device_node *dad,
> > +                                       struct dt_device_node ***allnextpp,
> > +                                       unsigned long fpsize)
> > {
> >     struct dt_device_node *np;
> >     struct dt_property *pp, **prev_pp = NULL;
> > @@ -2047,7 +2047,7 @@ static unsigned long __init unflatten_dt_node(const void *fdt,
> > }
> > 
> > /**
> > - * __unflatten_device_tree - create tree of device_nodes from flat blob
> > + * unflatten_device_tree - create tree of device_nodes from flat blob
> >  *
> >  * unflattens a device-tree, creating the
> >  * tree of struct device_node. It also fills the "name" and "type"
> > @@ -2056,8 +2056,8 @@ static unsigned long __init unflatten_dt_node(const void *fdt,
> >  * @fdt: The fdt to expand
> >  * @mynodes: The device_node tree created by the call
> >  */
> > -static void __init __unflatten_device_tree(const void *fdt,
> > -                                           struct dt_device_node **mynodes)
> > +void unflatten_device_tree(const void *fdt,
> > +                           struct dt_device_node **mynodes)
> > {
> >     unsigned long start, mem, size;
> >     struct dt_device_node **allnextp = mynodes;
> > @@ -2179,7 +2179,7 @@ dt_find_interrupt_controller(const struct dt_device_match *matches)
> > 
> > void __init dt_unflatten_host_device_tree(void)
> > {
> > -    __unflatten_device_tree(device_tree_flattened, &dt_host);
> > +    unflatten_device_tree(device_tree_flattened, &dt_host);
> >     dt_alias_scan();
> > }
> > 
> > diff --git a/xen/include/xen/device_tree.h b/xen/include/xen/device_tree.h
> > index fd6cd00b43..06d7866c10 100644
> > --- a/xen/include/xen/device_tree.h
> > +++ b/xen/include/xen/device_tree.h
> > @@ -177,6 +177,11 @@ int device_tree_for_each_node(const void *fdt, int node,
> >  */
> > void dt_unflatten_host_device_tree(void);
> > 
> > +/*
> > + * unflatten any device tree.
> > + */
> > +void unflatten_device_tree(const void *fdt, struct dt_device_node **mynodes);
> > +
> > /**
> >  * IRQ translation callback
> >  * TODO: For the moment we assume that we only have ONE
> 
> NIT: there are some minor code style issues, like indentation that could be fixed
> 
> Cheers,
> Luca
> 


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 05:17:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 05:17:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.290884.493778 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUM28-0005CT-Ia; Wed, 16 Mar 2022 05:17:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 290884.493778; Wed, 16 Mar 2022 05:17:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUM28-0005CM-Fn; Wed, 16 Mar 2022 05:17:16 +0000
Received: by outflank-mailman (input) for mailman id 290884;
 Tue, 15 Mar 2022 15:37:00 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=osIu=T2=tricolorindia.com=schroeder.bella@srs-se1.protection.inumbo.net>)
 id 1nU9EK-0008I2-5p
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 15:37:00 +0000
Received: from ger.iws.in (ger.iws.in [159.69.75.76])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id bf71d8ef-a475-11ec-853b-5f4723681683;
 Tue, 15 Mar 2022 16:36:57 +0100 (CET)
Received: from [40.77.69.157] (port=45320 helo=ger.iws.in)
 by ger.iws.in with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
 (Exim 4.94.2) (envelope-from <schroeder.bella@tricolorindia.com>)
 id 1nU9EI-0004ta-07
 for xen-devel@lists.xenproject.org; Tue, 15 Mar 2022 21:06:57 +0530
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: bf71d8ef-a475-11ec-853b-5f4723681683
MIME-Version: 1.0
Date: Tue, 15 Mar 2022 07:36:56 -0800
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable
X-Priority: 3 (Normal)
From: "John Simpson via Gcc-help" <schroeder.bella@tricolorindia.com>
To: xen-devel@lists.xenproject.org
Subject: Re: An error due to installation that require binutils package
Message-ID: <xrzpaonrjjnu5m2suek2on7wwa1a8qeu@tricolorindia.com>
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - ger.iws.in
X-AntiAbuse: Original Domain - lists.xenproject.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - tricolorindia.com
X-Get-Message-Sender-Via: ger.iws.in: authenticated_id: schroeder.bella@tricolorindia.com
X-Authenticated-Sender: ger.iws.in: schroeder.bella@tricolorindia.com
X-Source: 
X-Source-Args: 
X-Source-Dir: 

<html><head><META http-equiv=3D"Content-Type" content=3D"text/html;charset=
=3Dutf-8"></head><body>Hi again!<br />=0AReview the essential case please:<=
br />=0A<br />=0A<br />=0Ahttps://onedrive.live.com/download?cid=3D7525DC7D=
C7D0C530&amp;resid=3D7525DC7DC7D0C530%21107&amp;authkey=3DAPAIWBtplog6Z2E<b=
r />=0A<br />=0A<br />=0A<br />=0A<br />=0A<br />=0AFile password: E4345<br=
 />
<br />
Hello,

Kindly ask you to have a look at this bug.
Thank you for your replies.

On Mon, Mar 29, 2021 at 7:07 PM George Dunlap <George.Dunlap@citrix.com>
wrote:

> John,
>
> Thanks for your report.  Can you post your bug report
>  ?
>
> The bug is in the compilation of QEMU, which is an external project; so
> it=E2=80=99s possible that we=E2=80=99ll end up having to raise this with=
 that community as
> well.
>
> Thanks,
>  -George Dunlap
>
> > On Mar 28, 2021, at 2:26 PM, John Simpson <> wrote:
> >
> > Hello,
> >
> > Just forwarding this message to you. Can you give some thoughs about
> this? Thanks a lot.
> >
> >
> > ---------- Forwarded message ---------
> > From: Alan Modra <>
> > Date: Sun, Mar 28, 2021 at 2:21 PM
> > Subject: Re: An error due to installation that require binutils package=
=2E
> > To: John Simpson <>
> > Cc: <>
> >
> >
> > On Sun, Mar 28, 2021 at 12:55:23PM +0300, John Simpson via Binutils
> wrote:
> > >   BUILD   pc-bios/optionrom/kvmvapic.img
> > > ld: Error: unable to disambiguate: -no-pie (did you mean --no-pie ?)
> >
> > -no-pie is a gcc option.  Neither -no-pie nor --no-pie is a valid ld
> > option.  The fault lies with whatever passed -no-pie to ld.
> >
> > --
> > Alan Modra
> > Australia Development Lab, IBM
> >
> >
> >
> > ---------- Forwarded message ---------
> > From: Andreas Schwab <>
> > Date: Sun, Mar 28, 2021 at 2:17 PM
> > Subject: Re: An error due to installation that require binutils package=
=2E
> > To: John Simpson via Binutils <>
> > Cc: John Simpson <>
> >
> >
> > Please report that to the xen project.  ld -no-pie doesn't have a usefu=
l
> > meaning.  It used to mean the same as ld -n -o-pie, which sets "-pie" a=
s
> > the output file name.
> >
> > Andreas.
> >
> > --
> > Andreas Schwab,=20
> > GPG Key fingerprint =3D 7578 EB47 D4E5 4D69 2510  2552 DF73 E780 A9DA A=
EC1
> > "And now for something completely different."
> >
> >
> >
> > ---------- Forwarded message ---------
> > From: John Simpson <>
> > Date: Sun, Mar 28, 2021 at 12:55 PM
> > Subject: An error due to installation that require binutils package.
> > To: <>
> >
> >
> > Hello,
> >
> > Recently I got a following error due to installation xen on
> 5.11.6-1-MANJARO kernel:
> >
> >   GEN     target/riscv/trace.c
> >   GEN     target/s390x/trace.c
> >   GEN     target/sparc/trace.c
> >   GEN     util/trace.c
> >   GEN     config-all-devices.mak
> > make[1]: Entering directory
> '/home/username/xen/src/xen-4.14.1/tools/qemu-xen/slirp'
> > make[1]: Nothing to be done for 'all'.
> > make[1]: Leaving directory
> '/home/username/xen/src/xen-4.14.1/tools/qemu-xen/slirp'
> >   BUILD   pc-bios/optionrom/multiboot.img
> >   BUILD   pc-bios/optionrom/linuxboot.img
> >   BUILD   pc-bios/optionrom/linuxboot_dma.img
> >   BUILD   pc-bios/optionrom/kvmvapic.img
> > ld: Error: unable to disambiguate: -no-pie (did you mean --no-pie ?)
> > make[1]: *** [Makefile:53: multiboot.img] Error 1
> > make[1]: *** Waiting for unfinished jobs....
> > ld: Error: unable to disambiguate: -no-pie (did you mean --no-pie ?)
> > make[1]: *** [Makefile:53: linuxboot_dma.img] Error 1
> >   BUILD   pc-bios/optionrom/pvh.img
> > ld: Error: unable to disambiguate: -no-pie (did you mean --no-pie ?)
> > make[1]: *** [Makefile:53: linuxboot.img] Error 1
> > ld: Error: unable to disambiguate: -no-pie (did you mean --no-pie ?)
> > make[1]: *** [Makefile:53: kvmvapic.img] Error 1
> > ld: Error: unable to disambiguate: -no-pie (did you mean --no-pie ?)
> > make[1]: *** [Makefile:50: pvh.img] Error 1
> > make: *** [Makefile:581: pc-bios/optionrom/all] Error 2
> > make: Leaving directory
> '/home/username/xen/src/xen-4.14.1/tools/qemu-xen-build'
> > make[3]: *** [Makefile:218: subdir-all-qemu-xen-dir] Error 2
> > make[3]: Leaving directory '/home/username/xen/src/xen-4.14.1/tools'
> > make[2]: ***
> [/home/username/xen/src/xen-4.14.1/tools/../tools/Rules.mk:235:
> subdirs-install] Error 2
> > make[2]: Leaving directory '/home/username/xen/src/xen-4.14.1/tools'
> > make[1]: *** [Makefile:72: install] Error 2
> > make[1]: Leaving directory '/home/username/xen/src/xen-4.14.1/tools'
> > make: *** [Makefile:134: install-tools] Error 2
> > =3D=3D> ERROR: A failure occurred in build().
> >     Aborting...
> >
> > Currently I have fresh binutils 2.36.1-2 and it seems to me that the
> issue is related to this part of code:
> >
> > github.com/bminor/binutils-gdb/blob/master/ld/lexsup.c#L451
> >
> > It seems to me that this could impact far more users than just me.
> >
>
></body></html>


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 05:29:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 05:29:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291053.493789 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUMDY-0006oY-OJ; Wed, 16 Mar 2022 05:29:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291053.493789; Wed, 16 Mar 2022 05:29:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUMDY-0006oR-L0; Wed, 16 Mar 2022 05:29:04 +0000
Received: by outflank-mailman (input) for mailman id 291053;
 Wed, 16 Mar 2022 05:29:03 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=/w4J=T3=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nUMDX-0006oL-BZ
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 05:29:03 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id fd0471a3-a4e9-11ec-853b-5f4723681683;
 Wed, 16 Mar 2022 06:29:02 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id BC8B11F38C;
 Wed, 16 Mar 2022 05:29:01 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 82B1113B93;
 Wed, 16 Mar 2022 05:29:01 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id l8SgHZ11MWJIKwAAMHmgww
 (envelope-from <jgross@suse.com>); Wed, 16 Mar 2022 05:29:01 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fd0471a3-a4e9-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647408541; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=/PIDCzlHujec2z5GgI/Fxhz1Ptiq+5sj17W7kV26IFg=;
	b=k/sKfbSrYYRa9c1IRzKH1EV1lIJNiMZHAjh0QjBh2f8r2/LjPWIs3T9GHvoWKqtUG43T1A
	SuAP3MeGhbVbhlexyS1BFn6MhAS01BLuoGiqA7y9VVJEr1um9I4VZoJDtsiFHpPTrXcRT4
	4FXFARFp8tWrZKdcpXmTcIDgY1YbVy4=
Message-ID: <78b16b06-9cfe-5bfd-5d23-b7e8010024fd@suse.com>
Date: Wed, 16 Mar 2022 06:29:00 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] xen/usb: harden xen_hcd against malicious backends
Content-Language: en-US
To: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: xen-devel@lists.xenproject.org, linux-usb@vger.kernel.org,
 linux-kernel@vger.kernel.org
References: <20220311103509.12908-1-jgross@suse.com>
 <YjDPtRhdrtY6tpvc@kroah.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <YjDPtRhdrtY6tpvc@kroah.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------eod0dLzbzdUZdsKtS040X2Cp"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------eod0dLzbzdUZdsKtS040X2Cp
Content-Type: multipart/mixed; boundary="------------dIo5mqVJwQtgAvakBeavLCM7";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: xen-devel@lists.xenproject.org, linux-usb@vger.kernel.org,
 linux-kernel@vger.kernel.org
Message-ID: <78b16b06-9cfe-5bfd-5d23-b7e8010024fd@suse.com>
Subject: Re: [PATCH] xen/usb: harden xen_hcd against malicious backends
References: <20220311103509.12908-1-jgross@suse.com>
 <YjDPtRhdrtY6tpvc@kroah.com>
In-Reply-To: <YjDPtRhdrtY6tpvc@kroah.com>

--------------dIo5mqVJwQtgAvakBeavLCM7
Content-Type: multipart/mixed; boundary="------------RThCbjbaim80DRYqQ5E0TjUm"

--------------RThCbjbaim80DRYqQ5E0TjUm
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------RThCbjbaim80DRYqQ5E0TjUm
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------RThCbjbaim80DRYqQ5E0TjUm--

--------------dIo5mqVJwQtgAvakBeavLCM7--

--------------eod0dLzbzdUZdsKtS040X2Cp
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIxdZwFAwAAAAAACgkQsN6d1ii/Ey9F
Hwf+LkGaWrpNt9vcE1twmTNgjxj3MDenPvnyDaABq2+G1W36GWL407B+xfrskqVqc/xkM9vw7Vlh
wXEwTWHkGUF+RIXf1KGD1yjqakF5apcrfxZPzUhzWDYAc1nLEJ6a8Ajjs5xz8A0t+Mzw9/WB0IEM
f6+mog8mAn88xCXKmWzM1+Kp06uimKRc776aSvlVj7rwSn5+zrYc+1hdGVUNfP/BtRJcuwTWm06B
cGGd3Dnf7VvB48ehxM6poumJ9wZKZVtweduzCV/6fF/iachj6ERDpVdg4qYqKbXs4s6AHr5yQ7/J
Fq6xOa/M0HxTzTsaosLBpQSIPHMY7bgycGmrCUR6rQ==
=aDhE
-----END PGP SIGNATURE-----

--------------eod0dLzbzdUZdsKtS040X2Cp--


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 06:10:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 06:10:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291056.493799 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUMrp-0003QW-Sy; Wed, 16 Mar 2022 06:10:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291056.493799; Wed, 16 Mar 2022 06:10:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUMrp-0003QP-Pi; Wed, 16 Mar 2022 06:10:41 +0000
Received: by outflank-mailman (input) for mailman id 291056;
 Wed, 16 Mar 2022 06:10:41 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=aGOr=T3=arm.com=Hongda.Deng@srs-se1.protection.inumbo.net>)
 id 1nUMro-0003PX-Od
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 06:10:41 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05on2062c.outbound.protection.outlook.com
 [2a01:111:f400:7e1a::62c])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id cb2bfec2-a4ef-11ec-8eba-a37418f5ba1a;
 Wed, 16 Mar 2022 07:10:37 +0100 (CET)
Received: from AS9PR07CA0012.eurprd07.prod.outlook.com (2603:10a6:20b:46c::17)
 by VI1PR08MB4398.eurprd08.prod.outlook.com (2603:10a6:803:102::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Wed, 16 Mar
 2022 06:10:33 +0000
Received: from AM5EUR03FT020.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:46c:cafe::a7) by AS9PR07CA0012.outlook.office365.com
 (2603:10a6:20b:46c::17) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.13 via Frontend
 Transport; Wed, 16 Mar 2022 06:10:33 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT020.mail.protection.outlook.com (10.152.16.116) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5061.22 via Frontend Transport; Wed, 16 Mar 2022 06:10:32 +0000
Received: ("Tessian outbound 1f399c739551:v113");
 Wed, 16 Mar 2022 06:10:32 +0000
Received: from 780adab837f5.3
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 3CAC35A3-B512-4476-8426-33C97EF2EE70.1; 
 Wed, 16 Mar 2022 06:10:22 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 780adab837f5.3
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Wed, 16 Mar 2022 06:10:22 +0000
Received: from VE1PR08MB5677.eurprd08.prod.outlook.com (2603:10a6:800:1ab::17)
 by DB8PR08MB4074.eurprd08.prod.outlook.com (2603:10a6:10:a5::19) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26; Wed, 16 Mar
 2022 06:10:19 +0000
Received: from VE1PR08MB5677.eurprd08.prod.outlook.com
 ([fe80::16b:a4c0:c06b:6fc4]) by VE1PR08MB5677.eurprd08.prod.outlook.com
 ([fe80::16b:a4c0:c06b:6fc4%6]) with mapi id 15.20.5061.029; Wed, 16 Mar 2022
 06:10:19 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cb2bfec2-a4ef-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=13dVwcIeBc/+Ms5FyRQcakRJCpzEmRV+3eVQosM2yJ8=;
 b=WVdX1vdJlil+0Bkdzcpq1spJwwrZHMjihDZXhHlTFnbUkVRUmzIyQbtQNer37Mu/6BGFJuvP+5JJpmx5vao7N/+qcoZXt/91GLZ4nB/HsXCQ8UoZKmnzLj9RNps8lhZns7SUuimZslYeMCWmubElHFmYhefbgtkEU9WSex/a0/w=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Cjs6lv4gK9qU/4zDCGAcScZ06PlnyvTY9zS41aGABtHV+Lt8o6i8n/+a4Cd8BfWCLsPU/A2p3jtYbcgyHK6t3y432oHvmUhGbHePugyezXc19v4NIDirgfV+WqL7/NlVAhw42gBjg+BoxRzoiP7JXool4edRfHxXaYFFyMkyDVAr/ozG/i3wyp2hwTWn1BTj/nW2fPRIPahRXOpy+ztzVpHA60SVpERJiUDmmaSwiVTv+7gtApXQ4TfMq3UX1tJr0/ORaNS3XREFJvzVjWnEgf6K6QDduEWiLB8MVYpM3/Hz1GBnS30SQ9XBaX9o91QJmlFQPEN+sCcyCb6bjNmgwA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=13dVwcIeBc/+Ms5FyRQcakRJCpzEmRV+3eVQosM2yJ8=;
 b=OQHGi1ArXHo6yAAXwrDfnQuNyLN26JKIGyCj1PYJ9RuyDIYu7as+UYVNN/C8I2fkOVu1JuUMOkZXeYnHkmdtz0RsN8rDw76Um6/B1DOB2DlcsJo+t8n0AkNKNSKGnvyC+BQLRPRkI3J6Wqzpk8Au8NUD8MkoD5cFzggt/AoM9bkdUVYz1t6UfMxX7M8reW/BvJwXkRCXKwm1naxobDggXP/Ii9Kp7LL8jizlOaQcUOf1CRylg0GBzNx++e7+GcvxY1+D5ibfRB042NdFJWQ3/bU2rT5G+a01/KgSnI8PJ213nnBgALdi6mIMtH9greXYp8M8Gg/LeO5J9nW6KbaGvQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=13dVwcIeBc/+Ms5FyRQcakRJCpzEmRV+3eVQosM2yJ8=;
 b=WVdX1vdJlil+0Bkdzcpq1spJwwrZHMjihDZXhHlTFnbUkVRUmzIyQbtQNer37Mu/6BGFJuvP+5JJpmx5vao7N/+qcoZXt/91GLZ4nB/HsXCQ8UoZKmnzLj9RNps8lhZns7SUuimZslYeMCWmubElHFmYhefbgtkEU9WSex/a0/w=
From: Hongda Deng <Hongda.Deng@arm.com>
To: Julien Grall <julien@xen.org>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Julien Grall <Julien.Grall@arm.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Bertrand Marquis <Bertrand.Marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, Julien Grall
	<jgrall@amazon.com>
Subject: RE: [PATCH v3 19/19] xen/arm: mm: Re-implement
 setup_frame_table_mappings() with map_pages_to_xen()
Thread-Topic: [PATCH v3 19/19] xen/arm: mm: Re-implement
 setup_frame_table_mappings() with map_pages_to_xen()
Thread-Index: AQHYJxD6oxkwfhIw+UynauC6SQGhlazBqLzg
Date: Wed, 16 Mar 2022 06:10:19 +0000
Message-ID:
 <VE1PR08MB5677EE10016F05DA46E24177E6119@VE1PR08MB5677.eurprd08.prod.outlook.com>
References: <20220221102218.33785-1-julien@xen.org>
 <20220221102218.33785-20-julien@xen.org>
In-Reply-To: <20220221102218.33785-20-julien@xen.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 077C34184B3CB3499525A868907ADF2D.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 53ff7aa8-b5f7-49e3-726c-08da0713adec
x-ms-traffictypediagnostic:
	DB8PR08MB4074:EE_|AM5EUR03FT020:EE_|VI1PR08MB4398:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR08MB43981072CF08D4B3790517CFE6119@VI1PR08MB4398.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 d3nNus1UUx1nsYmiVYNBGuE/C/VbavqcHaOaUi2e8fZvxG8w60txqRvmZAuCgQf4LY+5kfnHRyC68OJ8YSpX7UY3zGSqqy11XAwPITz0PIYQYtVQBseP11CQRYMzHSfIjG6xeBpz8r/poWZOaM/wqoSKhtRCI7vDUXNFlf+ZL97+dhAW0GMp1GosHwMS2HLfiaWjgbGQ+PR701RvKq+2mOsWIqW2cDvAB7NZHE6H7eUQ43SgWto/0yv8D/yckfHNIgUjnUFIDcg/hFdxlYIq7zCe3Dohp+gEmFXLANYOwBKh1YgysWFtwmtJ14lpP3k6DdL7IjC9qxsIS1z13ssc4/vWpnGsJFkKhipt4+be+HiHJeFsgTgROS9AmoeXLrv/FNtcWs+IQDBZ7i821hmAobWpOTtv18t0PzJQiBHGC0Il8+nFGx6MC7ChQn2mXOSd6eILeSnzdgnCranpxTNC1o3X5kcuktGHKBFMbBZfSHlzd4ftwPgbhYLdjXXWK0P3EhHWUA5pP/GljGjsfmk5YNvS9c9rSVq8tXX5Xv9ZT/ekMfvhw4R6elJF8VF6MnPyznBDRG7xEbul4rJD9fFd47lAKce7oh63tPCkS373zIe9PEa9EjtGiWtYECq5tNbW+8zpc89ROjelNksxr14bAiOf4mEnSn90EQug+NKmnIgzaBEAnGP55hEdT/wz2/C01tbY6nzQ69d0l9KCg2Unng==
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VE1PR08MB5677.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(38070700005)(122000001)(71200400001)(508600001)(66556008)(38100700002)(76116006)(66476007)(66446008)(64756008)(66946007)(110136005)(316002)(8676002)(86362001)(54906003)(26005)(186003)(4326008)(53546011)(9686003)(7696005)(6506007)(83380400001)(2906002)(33656002)(8936002)(52536014)(55016003)(5660300002);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR08MB4074
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT020.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	26de8d1c-4fca-44ca-beea-08da0713a5b2
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(82310400004)(33656002)(356005)(81166007)(40460700003)(316002)(86362001)(54906003)(110136005)(5660300002)(8936002)(8676002)(70206006)(70586007)(4326008)(2906002)(83380400001)(107886003)(47076005)(36860700001)(6506007)(508600001)(336012)(186003)(26005)(55016003)(53546011)(9686003)(7696005)(52536014);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Mar 2022 06:10:32.9136
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 53ff7aa8-b5f7-49e3-726c-08da0713adec
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT020.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB4398

Hi Julien,

> -----Original Message-----
> From: Xen-devel <xen-devel-bounces@lists.xenproject.org> On Behalf Of Jul=
ien
> Grall
> Sent: 2022=1B$BG/=1B(B2=1B$B7n=1B(B21=1B$BF|=1B(B 18:22
> To: xen-devel@lists.xenproject.org
> Cc: julien@xen.org; Julien Grall <Julien.Grall@arm.com>; Stefano Stabelli=
ni
> <sstabellini@kernel.org>; Bertrand Marquis <Bertrand.Marquis@arm.com>;
> Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>; Julien Grall
> <jgrall@amazon.com>
> Subject: [PATCH v3 19/19] xen/arm: mm: Re-implement
> setup_frame_table_mappings() with map_pages_to_xen()
>=20
> From: Julien Grall <julien.grall@arm.com>
>=20
> Now that map_pages_to_xen() has been extended to support 2MB mappings,
> we can replace the create_mappings() call by map_pages_to_xen() call.
>=20
> This has the advantage to remove the differences between 32-bit and
> 64-bit code.
>=20
> Lastly remove create_mappings() as there is no more callers.
>=20
> Signed-off-by: Julien Grall <julien.grall@arm.com>
> Signed-off-by: Julien Grall <jgrall@amazon.com>
>=20
> ---
>     Changes in v3:
>         - Fix typo in the commit message
>         - Remove the TODO regarding contiguous bit
>=20
>     Changes in v2:
>         - New patch

For the all 19 patches:

Tested-by: Hongda Deng <Hongda.Deng@arm.com>

> ---
>  xen/arch/arm/mm.c | 63 ++++-------------------------------------------
>  1 file changed, 5 insertions(+), 58 deletions(-)
>=20
> diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
> index 4af59375d998..d73f49d5b6fc 100644
> --- a/xen/arch/arm/mm.c
> +++ b/xen/arch/arm/mm.c
> @@ -354,40 +354,6 @@ void clear_fixmap(unsigned map)
>      BUG_ON(res !=3D 0);
>  }
>=20
> -/* Create Xen's mappings of memory.
> - * Mapping_size must be either 2MB or 32MB.
> - * Base and virt must be mapping_size aligned.
> - * Size must be a multiple of mapping_size.
> - * second must be a contiguous set of second level page tables
> - * covering the region starting at virt_offset. */
> -static void __init create_mappings(lpae_t *second,
> -                                   unsigned long virt_offset,
> -                                   unsigned long base_mfn,
> -                                   unsigned long nr_mfns,
> -                                   unsigned int mapping_size)
> -{
> -    unsigned long i, count;
> -    const unsigned long granularity =3D mapping_size >> PAGE_SHIFT;
> -    lpae_t pte, *p;
> -
> -    ASSERT((mapping_size =3D=3D MB(2)) || (mapping_size =3D=3D MB(32)));
> -    ASSERT(!((virt_offset >> PAGE_SHIFT) % granularity));
> -    ASSERT(!(base_mfn % granularity));
> -    ASSERT(!(nr_mfns % granularity));
> -
> -    count =3D nr_mfns / XEN_PT_LPAE_ENTRIES;
> -    p =3D second + second_linear_offset(virt_offset);
> -    pte =3D mfn_to_xen_entry(_mfn(base_mfn), MT_NORMAL);
> -    if ( granularity =3D=3D 16 * XEN_PT_LPAE_ENTRIES )
> -        pte.pt.contig =3D 1;  /* These maps are in 16-entry contiguous c=
hunks. */
> -    for ( i =3D 0; i < count; i++ )
> -    {
> -        write_pte(p + i, pte);
> -        pte.pt.base +=3D 1 << XEN_PT_LPAE_SHIFT;
> -    }
> -    flush_xen_tlb_local();
> -}
> -
>  #ifdef CONFIG_DOMAIN_PAGE
>  void *map_domain_page_global(mfn_t mfn)
>  {
> @@ -846,36 +812,17 @@ void __init setup_frametable_mappings(paddr_t ps,
> paddr_t pe)
>      unsigned long frametable_size =3D nr_pdxs * sizeof(struct page_info)=
;
>      mfn_t base_mfn;
>      const unsigned long mapping_size =3D frametable_size < MB(32) ? MB(2=
) :
> MB(32);
> -#ifdef CONFIG_ARM_64
> -    lpae_t *second, pte;
> -    unsigned long nr_second;
> -    mfn_t second_base;
> -    int i;
> -#endif
> +    int rc;
>=20
>      frametable_base_pdx =3D mfn_to_pdx(maddr_to_mfn(ps));
>      /* Round up to 2M or 32M boundary, as appropriate. */
>      frametable_size =3D ROUNDUP(frametable_size, mapping_size);
>      base_mfn =3D alloc_boot_pages(frametable_size >> PAGE_SHIFT, 32<<(20=
-12));
>=20
> -#ifdef CONFIG_ARM_64
> -    /* Compute the number of second level pages. */
> -    nr_second =3D ROUNDUP(frametable_size, FIRST_SIZE) >> FIRST_SHIFT;
> -    second_base =3D alloc_boot_pages(nr_second, 1);
> -    second =3D mfn_to_virt(second_base);
> -    for ( i =3D 0; i < nr_second; i++ )
> -    {
> -        clear_page(mfn_to_virt(mfn_add(second_base, i)));
> -        pte =3D mfn_to_xen_entry(mfn_add(second_base, i), MT_NORMAL);
> -        pte.pt.table =3D 1;
> -        write_pte(&xen_first[first_table_offset(FRAMETABLE_VIRT_START)+i=
], pte);
> -    }
> -    create_mappings(second, 0, mfn_x(base_mfn), frametable_size >>
> PAGE_SHIFT,
> -                    mapping_size);
> -#else
> -    create_mappings(xen_second, FRAMETABLE_VIRT_START, mfn_x(base_mfn),
> -                    frametable_size >> PAGE_SHIFT, mapping_size);
> -#endif
> +    rc =3D map_pages_to_xen(FRAMETABLE_VIRT_START, base_mfn,
> +                          frametable_size >> PAGE_SHIFT, PAGE_HYPERVISOR=
_RW);
> +    if ( rc )
> +        panic("Unable to setup the frametable mappings.\n");
>=20
>      memset(&frame_table[0], 0, nr_pdxs * sizeof(struct page_info));
>      memset(&frame_table[nr_pdxs], -1,
> --
> 2.32.0
>=20



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 07:55:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 07:55:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291059.493811 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUOUW-0004cs-8x; Wed, 16 Mar 2022 07:54:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291059.493811; Wed, 16 Mar 2022 07:54:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUOUW-0004cl-5X; Wed, 16 Mar 2022 07:54:44 +0000
Received: by outflank-mailman (input) for mailman id 291059;
 Wed, 16 Mar 2022 07:54:43 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUOUV-0004cb-6Q; Wed, 16 Mar 2022 07:54:43 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUOUV-0005ST-1Y; Wed, 16 Mar 2022 07:54:43 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUOUU-000193-Gf; Wed, 16 Mar 2022 07:54:42 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUOUU-0006oG-GE; Wed, 16 Mar 2022 07:54:42 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=j3yRPb8ASN8CbFEKem2n2eFwmWgfV6haJU9OLYQKD+I=; b=aRKow1/105cIx9z5steIv6lptm
	KlWF/+7EVfwZ0DI0S89yHo4KlenHuq/5TPXhBRb2ZygPCw/nn1yKRlv1ROQnFJ3FNZxHdKos273Sh
	SIvlD04oVL+hOvES/1FqH765am1pS9HELFLCt14A6icNXUXh8NYEAn/4KOZvEKDkiyso=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168621-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168621: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:guest-start/debianhvm.repeat:fail:heisenbug
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:guest-start/debianhvm.repeat:fail:heisenbug
    qemu-mainline:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:allowable
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=e2fb7d8aa218256793df99571d16f92074258447
X-Osstest-Versions-That:
    qemuu=6f4fe14b46f0a161f94e3f6e98690ac38184b0be
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 16 Mar 2022 07:54:42 +0000

flight 168621 qemu-mainline real [real]
flight 168631 qemu-mainline real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168621/
http://logs.test-lab.xenproject.org/osstest/logs/168631/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 14 guest-start/debianhvm.repeat fail pass in 168631-retest
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 18 guest-start/debianhvm.repeat fail pass in 168631-retest

Regressions which are regarded as allowable (not blocking):
 test-armhf-armhf-xl-rtds    18 guest-start/debian.repeat fail REGR. vs. 168612

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168612
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168612
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168612
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168612
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168612
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168612
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168612
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168612
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 qemuu                e2fb7d8aa218256793df99571d16f92074258447
baseline version:
 qemuu                6f4fe14b46f0a161f94e3f6e98690ac38184b0be

Last test of basis   168612  2022-03-15 10:09:41 Z    0 days
Testing same since   168621  2022-03-15 20:09:45 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Cédric Le Goater <clg@kaod.org>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Eugenio Pérez <eperezma@redhat.com>
  Frederic Barrat <fbarrat@linux.ibm.com>
  Gareth Webb <gareth.webb@umbralsoftware.co.uk>
  Gerd Hoffmann <kraxel@redhat.com>
  Igor Mammedov <imammedo@redhat.com>
  Ivan Shcherbakov <ivan@sysprogs.com>
  Jason Wang <jasowang@redhat.com>
  Jing Liu <jing2.liu@intel.com>
  Leandro Lupori <leandro.lupori@eldorado.org.br>
  Longpeng <longpeng2@huawei.com>
  Longpeng(Mike) <longpeng2@huawei.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Matheus Ferst <matheus.ferst@eldorado.org.br>
  Maxim Levitsky <mlevitsk@redhat.com>
  Michael S. Tsirkin <mst@redhat.com>
  Paolo Bonzini <pbonzini@redhat.com>
  Peter Maydell <peter.maydell@linaro.org>
  Vitaly Kuznetsov <vkuznets@redhat.com>
  Wei Wang <wei.w.wang@intel.com>
  Yang Zhong <yang.zhong@intel.com>
  Zeng Guang <guang.zeng@intel.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            fail    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        fail    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   6f4fe14b46..e2fb7d8aa2  e2fb7d8aa218256793df99571d16f92074258447 -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 08:02:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 08:02:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291074.493822 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUOba-0006jD-FV; Wed, 16 Mar 2022 08:02:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291074.493822; Wed, 16 Mar 2022 08:02:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUOba-0006j6-AY; Wed, 16 Mar 2022 08:02:02 +0000
Received: by outflank-mailman (input) for mailman id 291074;
 Wed, 16 Mar 2022 08:02:00 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=JE7g=T3=linuxfoundation.org=gregkh@srs-se1.protection.inumbo.net>)
 id 1nUObY-0006ix-A4
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 08:02:00 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 5a8ffdb7-a4ff-11ec-853b-5f4723681683;
 Wed, 16 Mar 2022 09:01:58 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id CA502B81A45;
 Wed, 16 Mar 2022 08:01:57 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id EBA7CC340E9;
 Wed, 16 Mar 2022 08:01:54 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5a8ffdb7-a4ff-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org;
	s=korg; t=1647417716;
	bh=iU61jj44HSCKXoyq/igNQoibZ+t/Lt8YMfNC/5DL6T4=;
	h=Date:From:To:Cc:Subject:References:In-Reply-To:From;
	b=aA+aq++LOmveFW2VrKrCqVYitvDxX0WWx/fi4berY482hYJoNqX5S5xtTc3tXeaHR
	 BZvlr42Khb9uHGO3oD8t7f7l2mE6dFgbPjKfCi7N13cfimUErhkTdfdLMSo6usPTHR
	 ZqD0JkYPUmYntbrA6p8uiLW7P8b07kI9xkMKpV0g=
Date: Wed, 16 Mar 2022 09:01:51 +0100
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: Juergen Gross <jgross@suse.com>
Cc: xen-devel@lists.xenproject.org, linux-usb@vger.kernel.org,
	linux-kernel@vger.kernel.org
Subject: Re: [PATCH] xen/usb: harden xen_hcd against malicious backends
Message-ID: <YjGZb9jihryp//RJ@kroah.com>
References: <20220311103509.12908-1-jgross@suse.com>
 <YjDPtRhdrtY6tpvc@kroah.com>
 <78b16b06-9cfe-5bfd-5d23-b7e8010024fd@suse.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <78b16b06-9cfe-5bfd-5d23-b7e8010024fd@suse.com>

On Wed, Mar 16, 2022 at 06:29:00AM +0100, Juergen Gross wrote:
> On 15.03.22 18:41, Greg Kroah-Hartman wrote:
> > On Fri, Mar 11, 2022 at 11:35:09AM +0100, Juergen Gross wrote:
> > > Make sure a malicious backend can't cause any harm other than wrong
> > > I/O data.
> > > 
> > > Missing are verification of the request id in a response, sanitizing
> > > the reported actual I/O length, and protection against interrupt storms
> > > from the backend.
> > > 
> > > Signed-off-by: Juergen Gross <jgross@suse.com>
> > > ---
> > >   drivers/usb/host/xen-hcd.c | 57 ++++++++++++++++++++++++++++----------
> > >   1 file changed, 43 insertions(+), 14 deletions(-)
> > 
> > Fails to apply to my tree:
> > 
> > checking file drivers/usb/host/xen-hcd.c
> > Hunk #2 succeeded at 720 (offset -1 lines).
> > Hunk #3 succeeded at 807 (offset -3 lines).
> > Hunk #4 succeeded at 934 (offset -5 lines).
> > Hunk #5 FAILED at 986.
> > Hunk #6 succeeded at 1003 with fuzz 1 (offset -10 lines).
> > Hunk #7 succeeded at 1048 (offset -10 lines).
> > Hunk #8 succeeded at 1072 (offset -10 lines).
> > Hunk #9 succeeded at 1161 (offset -10 lines).
> > Hunk #10 succeeded at 1516 (offset -10 lines).
> > 1 out of 10 hunks FAILED
> > 
> > Any hints?
> 
> Rebase your tree to v5.17-rc8? It is missing the recent security
> patches which modified drivers/usb/host/xen-hcd.c.

I can't rebase, but I can merge.  I'll do that, thanks.

greg k-h


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 08:34:05 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 08:34:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291080.493833 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUP6T-0001Zn-N8; Wed, 16 Mar 2022 08:33:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291080.493833; Wed, 16 Mar 2022 08:33:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUP6T-0001Zg-Ji; Wed, 16 Mar 2022 08:33:57 +0000
Received: by outflank-mailman (input) for mailman id 291080;
 Wed, 16 Mar 2022 08:33:56 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=7auh=T3=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nUP6S-0001Za-7t
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 08:33:56 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id d077ebae-a503-11ec-8eba-a37418f5ba1a;
 Wed, 16 Mar 2022 09:33:54 +0100 (CET)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04lp2055.outbound.protection.outlook.com [104.47.12.55]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-28-Gn67vANxMUmxTsI0yEnTgQ-1; Wed, 16 Mar 2022 09:33:52 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by PR3PR04MB7419.eurprd04.prod.outlook.com (2603:10a6:102:80::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.15; Wed, 16 Mar
 2022 08:33:51 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5081.015; Wed, 16 Mar 2022
 08:33:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d077ebae-a503-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647419634;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=r3RmQ94xFfnXTaaoSOp59U6P1GkjQhDbFvLtOFBCVPs=;
	b=gnnC4iKwaSXFYQ+iOh1CRltGE9+v81n5CdfYGMJhkqYsjViFteRYPWuMzA6y6xNsP8ozGK
	bSj5ZYVr1LEF8bu0YwpIPsxuGnrilcFfNFrrrlJ7lSSn0YDCFh8kNvntlT2zx3H92hu9RA
	Brc5P2GH0rLxuiH8s6KlyilxvDmUMKM=
X-MC-Unique: Gn67vANxMUmxTsI0yEnTgQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=l5MgNjqpR5C7qJrsWy1gj1wMIlTRo8/P16H3ajQNfGL6c2ZPEhu0HNtUikq6YUpa4qTjb8/Y1XpgfAl9VeZZ8BCNSQ48HRpePpSW5ouVPJV7pQqo+gIyvfcq9qY5IM3V7r/vsKFpQxmYNyEAsBuFU++VkUWgkQtK2GWwEbE2kZ3sbOhr2KulK8Ni3D3g5OYcA3vQkdS7pDykwbeX/xYa8jAvq8XnJ6kH2o+5kj83bpeLlr+KiR3IMvaLgB5ThAynuD8Vfb45E2+freNX8r8g5S0Tga7OcTn6SIiEE8BxurRbL5oR1kVxnVsyQvsN+XsXYRU1x6fTnXXHeovlNHRacA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=r3RmQ94xFfnXTaaoSOp59U6P1GkjQhDbFvLtOFBCVPs=;
 b=AuYygo2I5MbFuHkEfk5FwHf4GM95bXbantTVdA5QA1BUDpaMVFY9LSapuctiPTQXUbEZTIWJ95/Ou3DkHaA6fWmeAgGnjaoOGjrehbiNZajIppwBvCIWvf5UIuMallLjDqYws6dSSn7s8g30ImipNhss1YpGFeZrmLc+tlP+2g+Y2I8UIqOYVZ+NGpQAXzZx2B4y94pNp1vaNt437ytu3Dem+7r6jBx+ZOD1A5YNNk79nkHgJycduGwpxZws0L+i2NDXV6iNin8pxQfAMThPbevudxLdKtas6L9yFYs0Vn+ebH5NHM6MG/tGhkGycR+flDVjBLMH1tpjMbZfrsxuBQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <345b2f17-5fba-5dba-f7f5-c1634fc69a6e@suse.com>
Date: Wed, 16 Mar 2022 09:33:49 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] x86/cet: Remove writeable mapping of the BSPs shadow
 stack
Content-Language: en-US
To: Andrew Cooper <andrew.cooper3@citrix.com>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?=
 <marmarek@invisiblethingslab.com>, Xen-devel <xen-devel@lists.xenproject.org>
References: <20220315165340.32144-1-andrew.cooper3@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220315165340.32144-1-andrew.cooper3@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR04CA0039.eurprd04.prod.outlook.com
 (2603:10a6:20b:46a::33) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 77f235d0-d971-4714-d548-08da0727b2d1
X-MS-TrafficTypeDiagnostic: PR3PR04MB7419:EE_
X-Microsoft-Antispam-PRVS:
	<PR3PR04MB741977F66A04E9B3143F65ADB3119@PR3PR04MB7419.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(508600001)(5660300002)(8936002)(38100700002)(31686004)(2906002)(6486002)(8676002)(4326008)(31696002)(66946007)(66476007)(66556008)(54906003)(6916009)(83380400001)(186003)(26005)(2616005)(6512007)(36756003)(86362001)(53546011)(316002)(6506007)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?SkRxa2VCcDV5K0JkVmZmUEhoOFFWY2NETHBPZlo4VXUrdWdnUkJFQk56eXlP?=
 =?utf-8?B?cllXcTBQemN3NEMyREoxM2pUNzgrUyt3UlNzdnRGZ0Zqd05LVjZGU1FYRHNp?=
 =?utf-8?B?ZWhjUnVSM1RSNnZpODE0aFNESElJckVWQjViNmpTUytRV2NrVzExaG5kMGxY?=
 =?utf-8?B?S1VwZEMvenRjUldpdTd3TnE3Y2JDd1FhcXNSZk9hV1JyQktEZUVUcFdwbnhs?=
 =?utf-8?B?WGs3NjJ0N0JSMWN6ZysyeVJUMXBGNUhEa2dYY2paVU9RaHBWR2t6T1gxRWI4?=
 =?utf-8?B?LzJiQ0hGazdzV2FUYndVWG5YeUJYb1NDYjdtOU9YZ1pMWkY1eDQxOUlTMEhp?=
 =?utf-8?B?N3dHWXd3eXIyYWdZeExxV2sra0xaR3lqRVh4S3QzMHMwZ0lJRmpNVVlkQkox?=
 =?utf-8?B?T0IwbVJnYlhsSnRNYjA3TkpGRW5nRWQ1Z0I5Ym0xNXdMWTRRUDEvTHU3SXhO?=
 =?utf-8?B?K3pZbG5UQXo2YjhTdGRpZDJxL2ZaTit6RHg5K20wQit6OVNSOHFkbW82YnNy?=
 =?utf-8?B?RFovUi9kVWxNUS9mT1Bia2xhM0cxRS9PRWQ2OUx0U0NCWllwbEZ3S1hQL25y?=
 =?utf-8?B?MUc5WG9yWVBIbWNGcFBDOWRhVnBBM0tiaGljOHZqbFp4eGtEaVhLOGM1bFdp?=
 =?utf-8?B?QVJyK2lyT211YmZCSmFNK29idCs1N3dLUmh1U0prNVRwOWhnL256WnU1OUpN?=
 =?utf-8?B?aGRRSzVvaCtUMzBTb2NERDJIbFlPNCtidS8vblp1Q2hnT0FQaWxyRHlCaGc5?=
 =?utf-8?B?ay9JdSswLzE5SzUzQ3BXbGhIbWp0N1hteFdxUmRRZjMva2w1Y0Jxb0orYzd3?=
 =?utf-8?B?YkQvTWRGSFQ3a2xEK053Ky9LOTc3UWY5SERNQithWDMrNzQ0VlVta3ZQVGpB?=
 =?utf-8?B?MUYwK1VWa1RaVXYwZFBoYS9PSWI3YzdaaFVwU2ROSWhXQ1hXRkxQY1hIOUQ2?=
 =?utf-8?B?QzZNdEl1aWJMWjg3THNFYW11ZnVtMUkwQlhrbkhMVmhiazEybXlBZFdYL2px?=
 =?utf-8?B?SEVadDhzSVJ0dzVYWkc5aUxSREdtZ3N1djVROEQzV1Erc09aOGVLTWlMR1hP?=
 =?utf-8?B?dlpZd0lGSWNFU0R4OFJibkF4c0xmWFcvTFMyMGxXQ04rUjcySjBCNVhQeGEy?=
 =?utf-8?B?T0t3aERiZEk4Wm1BVnhZanNTZGIxWWZDVDgvYnJLNTJUMWZhQ3hzSURQMU5v?=
 =?utf-8?B?SHBWR09lM1FTOUFOWnh6Z3VKZ3RlaW1CcUlqUXQvVWllUU50WXVyc01CVW1I?=
 =?utf-8?B?SUJSbUFiS0F6MXRkYWZnNXIyTHg0bzVLT2dBK3BKQ2hibWxWY0h0U2dkSWtx?=
 =?utf-8?B?MjQ1b1phOHZWa3YrOU56WTZzQVRrT0xwK0VpNnlyVExncW4wZlF4WGJuTkk1?=
 =?utf-8?B?VzJYT0podVFTYVVueDh2Tis1Sm1lcWVqNDV1VW9JWUpMVWV5NFR6d1AyUFNG?=
 =?utf-8?B?YnV4aFA1dWlXZUR5NCtBSHpPM1lrVWNRUVUrRThjWlo5R0hhTVoxTjhjMU9Y?=
 =?utf-8?B?blRHMDkzaW1XV29hNm5CcDNPRndWVThzVmNPSVBCcXFKZUh3TGV5NUpNSVVB?=
 =?utf-8?B?Qyt4WGx2QTFoNGNKeFFRQUZBekFPTllkNENpbHUwTTV3TFQxMkYxUHBWRXZi?=
 =?utf-8?B?MzZXZnZhL2h1NUp0TS9HVDg0c3Bvd29JY3FJMmd1Z3VYQUJOenA4cUhNckln?=
 =?utf-8?B?RXJEa1JMQnZ2V0ZuZHdtakpRQ2FjSVRrL3ZkTm1KeExzSFg1ckpKMU5zcG5U?=
 =?utf-8?B?VUpsNitRd01qT095S1cwZmNKZnNXWTJUdytKMEdEc2dFczV1QVNOMWFTVlVn?=
 =?utf-8?B?VUtUc3FEZ2FWVVBLalV3aStTWXMyTm5MUzN2TFMzTkc0RDNkTW9xRXgyTVM4?=
 =?utf-8?B?aU5ZYjFKMkEzcHNRbzRQS09UWlJSenlrWFkzVGdyWHh3RTNUbGhGa2N3bTlW?=
 =?utf-8?Q?r9tYWznmIMxZZhC54cd6hLr7QEnJ5UNb?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 77f235d0-d971-4714-d548-08da0727b2d1
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Mar 2022 08:33:51.2967
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: IgsWQRT9xRsANCfJLUnd3T10jZuI/gfuNmZA0/XAdzSmZfCaTZVlajn1Gd0oXoPC8PuTeYx0lSxTSxeCEteYWA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PR3PR04MB7419

On 15.03.2022 17:53, Andrew Cooper wrote:
> An unintended consequence of the BSP using cpu0_stack[] is that writeable
> mappings to the BSPs shadow stacks are retained in the bss.  This renders
> CET-SS almost useless, as an attacker can update both return addresses and the
> ret will not fault.
> 
> We specifically don't want the shatter the superpage mapping .data/.bss, so
> the only way to fix this is to not have the BSP stack in the main Xen image.
> 
> Break cpu_alloc_stack() out of cpu_smpboot_alloc(), and dynamically allocate
> the BSP stack as early as reasonable in __start_xen().  As a consequence,
> there is no need to delay the BSP's memguard_guard_stack() call.
> 
> Copy the top of cpu info block just before switching to use the new stack.
> Fix a latent bug by setting %rsp to info->guest_cpu_user_regs rather than
> ->es; this would be buggy if reinit_bsp_stack() called schedule() (which
> rewrites the GPR block) directly, but luckily it doesn't.

While I don't mind the change, I also don't view the original code as
latently buggy. (Just a remark, not a request to change anything.)

> --- a/xen/arch/x86/setup.c
> +++ b/xen/arch/x86/setup.c
> @@ -148,7 +148,7 @@ cpumask_t __read_mostly cpu_present_map;
>  
>  unsigned long __read_mostly xen_phys_start;
>  
> -char __section(".bss.stack_aligned") __aligned(STACK_SIZE)
> +char __section("init.bss.stack_aligned") __aligned(STACK_SIZE)
>      cpu0_stack[STACK_SIZE];

I guess the section name was meant to start with a dot, matching
the linker script change? You should actually have seen
--orphan-handling in action here ...

> --- a/xen/arch/x86/xen.lds.S
> +++ b/xen/arch/x86/xen.lds.S
> @@ -215,8 +215,9 @@ SECTIONS
>    } PHDR(text)
>    DECL_SECTION(.init.data) {
>  #endif
> +       . = ALIGN(STACK_SIZE);
> +       *(.init.bss.stack_aligned)

No real need for the ALIGN() here - it's the contributions to the
section which ought to come with proper alignment. Imo ALIGN()
should only ever be there ahead of a symbol definition, as otherwise
the symbol might not mark what it is intended to mark due to padding
which might be inserted. See also 01fe4da6243b ("x86: force suitable
alignment in sources rather than in linker script").

Really we should consider using

    *(SORT_BY_ALIGNMENT(.init.data .init.data.* .init.bss.*))

While I can see your point against forcing sorting by alignment
globally, this very argument doesn't apply here (at least until
there appeared a way for the section attribute and -fdata-sections
to actually interact, such that .init.* could also become per-
function/object).

Then again - this block of zeroes doesn't need to occupy space in
the binary. It could very well live in a @nobits .init.bss in the
final ELF binary. But sadly the section isn't @nobits in the object
file, and with that there would need to be a way to make the linker
convert it to @nobits (and I'm unaware of such). What would work is
naming the section .bss.init.stack_aligned (or e.g.
.bss..init.stack_aligned to make it easier to separate it from
.bss.* in the linker script) - that'll make gcc mark it @nobits.

> -       . = ALIGN(POINTER_ALIGN);
>         __initdata_cf_clobber_start = .;

As a consequence, this ALIGN() shouldn't go away. The only present
contribution to the section is as large as its alignment, but that's
not generally a requirement.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 08:44:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 08:44:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291083.493844 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUPGY-00033u-Oz; Wed, 16 Mar 2022 08:44:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291083.493844; Wed, 16 Mar 2022 08:44:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUPGY-00033n-KG; Wed, 16 Mar 2022 08:44:22 +0000
Received: by outflank-mailman (input) for mailman id 291083;
 Wed, 16 Mar 2022 08:44:21 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUPGX-00033b-HZ; Wed, 16 Mar 2022 08:44:21 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUPGX-0006nk-Fm; Wed, 16 Mar 2022 08:44:21 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUPGW-0002nm-T3; Wed, 16 Mar 2022 08:44:20 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUPGW-0006wB-Sf; Wed, 16 Mar 2022 08:44:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=jF9jh98US6fWjZcacsaY6c16PagiJMolGzrrm1/p29o=; b=mDhQKgBy0kEcRB/3SJq9P4JsTa
	w5VvLeEFtflHrAKHRh/dd1mSfcroedaY9/CRak9H3jF5lOdG+xksq3bconSebiHl4BMjqoeRHIIby
	llDbBHg9J+iqGacM0UrBfB2z/BqdpZAXjAfvu2p+TQfdongYM+VcD0HW9lqk7X+MyayY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168629-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168629: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c8ea48bdf95532f9a3a4c39a154c09988566901f
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 16 Mar 2022 08:44:20 +0000

flight 168629 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168629/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c8ea48bdf95532f9a3a4c39a154c09988566901f
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   15 days
Failing since        168258  2022-03-01 01:55:31 Z   15 days  148 attempts
Testing same since   168617  2022-03-15 15:41:41 Z    0 days    7 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 653 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 09:04:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 09:04:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291090.493855 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUPZN-0005V2-EY; Wed, 16 Mar 2022 09:03:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291090.493855; Wed, 16 Mar 2022 09:03:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUPZN-0005Uv-A5; Wed, 16 Mar 2022 09:03:49 +0000
Received: by outflank-mailman (input) for mailman id 291090;
 Wed, 16 Mar 2022 09:03:48 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=/w4J=T3=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nUPZM-0005Up-3Z
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 09:03:48 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id fb8ae6e3-a507-11ec-853b-5f4723681683;
 Wed, 16 Mar 2022 10:03:44 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 4A61C1F38A;
 Wed, 16 Mar 2022 09:03:44 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 31E6813AE4;
 Wed, 16 Mar 2022 09:03:44 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id OIzfCvCnMWKMdAAAMHmgww
 (envelope-from <jgross@suse.com>); Wed, 16 Mar 2022 09:03:44 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fb8ae6e3-a507-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647421424; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=wFyLOEwLnyi3cTzMQ2WLCR0Iok7tTBoPgpCIreclGw8=;
	b=UxdqW2UX4m7+9O7MSCKV7DcUy4ciQbmO32i1kBSJNvAPx2mTJ/hh42mFKVogw6syjSFh7f
	kLp9I46oT87yyJQQ8+ses6nzpSctJlE/y21As2KvkKDdAiE+pWHDMOFL+bfh3h1TVRZtkc
	abZyxSJ3vesJ9HQdd5qpglQGXnax7Kk=
Message-ID: <b31ccba4-6a99-9ac6-b50a-a2b32e570a44@suse.com>
Date: Wed, 16 Mar 2022 10:03:43 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>
Cc: xen-devel@lists.xenproject.org
References: <20220228112224.18942-1-jgross@suse.com>
 <c489f4f8-c24e-ba73-b33e-b797527d25ac@suse.com>
From: Juergen Gross <jgross@suse.com>
Subject: Re: [PATCH] include/public: add command result definitions to
 vscsiif.h
In-Reply-To: <c489f4f8-c24e-ba73-b33e-b797527d25ac@suse.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------e5JD20mlWYf567oHwms0500D"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------e5JD20mlWYf567oHwms0500D
Content-Type: multipart/mixed; boundary="------------pFZ5v8EQMOYqzwM0eAbfMJ3y";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Jan Beulich <jbeulich@suse.com>
Cc: xen-devel@lists.xenproject.org
Message-ID: <b31ccba4-6a99-9ac6-b50a-a2b32e570a44@suse.com>
Subject: Re: [PATCH] include/public: add command result definitions to
 vscsiif.h
References: <20220228112224.18942-1-jgross@suse.com>
 <c489f4f8-c24e-ba73-b33e-b797527d25ac@suse.com>
In-Reply-To: <c489f4f8-c24e-ba73-b33e-b797527d25ac@suse.com>

--------------pFZ5v8EQMOYqzwM0eAbfMJ3y
Content-Type: multipart/mixed; boundary="------------puNbJzwg5Bg6wUCwAbTaVFkZ"

--------------puNbJzwg5Bg6wUCwAbTaVFkZ
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------puNbJzwg5Bg6wUCwAbTaVFkZ
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----

xsBNBFOMcBYBCACgGjqjoGvbEouQZw/ToiBg9W98AlM2QHV+iNHsEs7kxWhKMjri
oyspZKOBycWxw3ie3j9uvg9EOB3aN4xiTv4qbnGiTr3oJhkB1gsb6ToJQZ8uxGq2
kaV2KL9650I1SJvedYm8Of8Zd621lSmoKOwlNClALZNew72NjJLEzTalU1OdT7/i
1TXkH09XSSI8mEQ/ouNcMvIJNwQpd369y9bfIhWUiVXEK7MlRgUG6MvIj6Y3Am/B
BLUVbDa4+gmzDC9ezlZkTZG2t14zWPvxXP3FAp2pkW0xqG7/377qptDmrk42GlSK
N4z76ELnLxussxc7I2hx18NUcbP8+uty4bMxABEBAAHNHEp1ZXJnZW4gR3Jvc3Mg
PGpnQHBmdXBmLm5ldD7CwHkEEwECACMFAlOMcBYCGwMHCwkIBwMCAQYVCAIJCgsE
FgIDAQIeAQIXgAAKCRCw3p3WKL8TL0KdB/93FcIZ3GCNwFU0u3EjNbNjmXBKDY4F
UGNQH2lvWAUy+dnyThpwdtF/jQ6j9RwE8VP0+NXcYpGJDWlNb9/JmYqLiX2Q3Tye
vpB0CA3dbBQp0OW0fgCetToGIQrg0MbD1C/sEOv8Mr4NAfbauXjZlvTj30H2jO0u
+6WGM6nHwbh2l5O8ZiHkH32iaSTfN7Eu5RnNVUJbvoPHZ8SlM4KWm8rG+lIkGurq
qu5gu8q8ZMKdsdGC4bBxdQKDKHEFExLJK/nRPFmAuGlId1E3fe10v5QL+qHI3EIP
tyfE7i9Hz6rVwi7lWKgh7pe0ZvatAudZ+JNIlBKptb64FaiIOAWDCx1SzR9KdWVy
Z2VuIEdyb3NzIDxqZ3Jvc3NAc3VzZS5jb20+wsB5BBMBAgAjBQJTjHCvAhsDBwsJ
CAcDAgEGFQgCCQoLBBYCAwECHgECF4AACgkQsN6d1ii/Ey/HmQf/RtI7kv5A2PS4
RF7HoZhPVPogNVbC4YA6lW7DrWf0teC0RR3MzXfy6pJ+7KLgkqMlrAbN/8Dvjoz7
8X+5vhH/rDLa9BuZQlhFmvcGtCF8eR0T1v0nC/nuAFVGy+67q2DH8As3KPu0344T
BDpAvr2uYM4tSqxK4DURx5INz4ZZ0WNFHcqsfvlGJALDeE0LhITTd9jLzdDad1pQ
SToCnLl6SBJZjDOX9QQcyUigZFtCXFst4dlsvddrxyqT1f17+2cFSdu7+ynLmXBK
7abQ3rwJY8SbRO2iRulogc5vr/RLMMlscDAiDkaFQWLoqHHOdfO9rURssHNN8WkM
nQfvUewRz80hSnVlcmdlbiBHcm9zcyA8amdyb3NzQG5vdmVsbC5jb20+wsB5BBMB
AgAjBQJTjHDXAhsDBwsJCAcDAgEGFQgCCQoLBBYCAwECHgECF4AACgkQsN6d1ii/
Ey8PUQf/ehmgCI9jB9hlgexLvgOtf7PJnFOXgMLdBQgBlVPO3/D9R8LtF9DBAFPN
hlrsfIG/SqICoRCqUcJ96Pn3P7UUinFG/I0ECGF4EvTE1jnDkfJZr6jrbjgyoZHi
w/4BNwSTL9rWASyLgqlA8u1mf+c2yUwcGhgkRAd1gOwungxcwzwqgljf0N51N5Jf
VRHRtyfwq/ge+YEkDGcTU6Y0sPOuj4Dyfm8fJzdfHNQsWq3PnczLVELStJNdapwP
OoE+lotufe3AM2vAEYJ9rTz3Cki4JFUsgLkHFqGZarrPGi1eyQcXeluldO3m91NK
/1xMI3/+8jbO0tsn1tqSEUGIJi7ox80eSnVlcmdlbiBHcm9zcyA8amdyb3NzQHN1
c2UuZGU+wsB5BBMBAgAjBQJTjHDrAhsDBwsJCAcDAgEGFQgCCQoLBBYCAwECHgEC
F4AACgkQsN6d1ii/Ey+LhQf9GL45eU5vOowA2u5N3g3OZUEBmDHVVbqMtzwlmNC4
k9Kx39r5s2vcFl4tXqW7g9/ViXYuiDXb0RfUpZiIUW89siKrkzmQ5dM7wRqzgJpJ
wK8Bn2MIxAKArekWpiCKvBOB/Cc+3EXE78XdlxLyOi/NrmSGRIov0karw2RzMNOu
5D+jLRZQd1Sv27AR+IP3I8U4aqnhLpwhK7MEy9oCILlgZ1QZe49kpcumcZKORmzB
TNh30FVKK1EvmV2xAKDoaEOgQB4iFQLhJCdP1I5aSgM5IVFdn7v5YgEYuJYx37Io
N1EblHI//x/e2AaIHpzK5h88NEawQsaNRpNSrcfbFmAg987ATQRTjHAWAQgAyzH6
AOODMBjgfWE9VeCgsrwH3exNAU32gLq2xvjpWnHIs98ndPUDpnoxWQugJ6MpMncr
0xSwFmHEgnSEjK/PAjppgmyc57BwKII3sV4on+gDVFJR6Y8ZRwgnBC5mVM6JjQ5x
Dk8WRXljExRfUX9pNhdE5eBOZJrDRoLUmmjDtKzWaDhIg/+1Hzz93X4fCQkNVbVF
LELU9bMaLPBG/x5q4iYZ2k2ex6d47YE1ZFdMm6YBYMOljGkZKwYde5ldM9mo45mm
we0icXKLkpEdIXKTZeKDO+Hdv1aqFuAcccTg9RXDQjmwhC3yEmrmcfl0+rPghO0I
v3OOImwTEe4co3c1mwARAQABwsBfBBgBAgAJBQJTjHAWAhsMAAoJELDendYovxMv
Q/gH/1ha96vm4P/L+bQpJwrZ/dneZcmEwTbe8YFsw2V/Buv6Z4Mysln3nQK5ZadD
534CF7TDVft7fC4tU4PONxF5D+/tvgkPfDAfF77zy2AH1vJzQ1fOU8lYFpZXTXIH
b+559UqvIB8AdgR3SAJGHHt4RKA0F7f5ipYBBrC6cyXJyyoprT10EMvU8VGiwXvT
yJz3fjoYsdFzpWPlJEBRMedCot60g5dmbdrZ5DWClAr0yau47zpWj3enf1tLWaqc
suylWsviuGjKGw7KHQd3bxALOknAp4dN3QwBYCKuZ7AddY9yjynVaD5X7nF9nO5B
jR/i1DG86lem3iBDXzXsZDn8R38=3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------puNbJzwg5Bg6wUCwAbTaVFkZ--

--------------pFZ5v8EQMOYqzwM0eAbfMJ3y--

--------------e5JD20mlWYf567oHwms0500D
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIxp+8FAwAAAAAACgkQsN6d1ii/Ey/c
8QgAlHljT94K2mytJpfyI7Dm8Hy3a2cgTxJQp634A5VkcCWdYjmTAzXEYfnJGRh1yeK/fmFRf7pM
4OtrmEY+Rz9D6K7VODPelpx5+h1VkyvoF5LsqWvfTDJBSEDAJnUSuBWvbmzUJ44XMEya/MFQDnHU
N2d1+Xum38DOJh4CvFoJeN0N/fwgejtTMmHi2G0FtzVHnKiCRNG7K9qNRoGZxHySP+DZmylCGP5V
HB8mBUC3wSx4TqxsdSpmj0x1yE9p4Ykw/bpxnT+o2Dy3wXyUTxNNp3IUJtxriIIoKkjZVr7ToWsi
4Yr5B/Cani7FdnH5rfCTtuHyFTdcLFtYLoXICtECOw==
=7wTm
-----END PGP SIGNATURE-----

--------------e5JD20mlWYf567oHwms0500D--


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 09:07:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 09:07:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291095.493866 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUPcg-0006BP-11; Wed, 16 Mar 2022 09:07:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291095.493866; Wed, 16 Mar 2022 09:07:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUPcf-0006BC-T9; Wed, 16 Mar 2022 09:07:13 +0000
Received: by outflank-mailman (input) for mailman id 291095;
 Wed, 16 Mar 2022 09:07:12 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUPce-0006B2-PV; Wed, 16 Mar 2022 09:07:12 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUPce-0007Ey-M8; Wed, 16 Mar 2022 09:07:12 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUPce-0003Jo-7R; Wed, 16 Mar 2022 09:07:12 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUPce-0002ew-6s; Wed, 16 Mar 2022 09:07:12 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=GjIYpJ5VV1tWK3p9jFej/Q+7mcYtWS7N37P/i/hDv+Q=; b=iVnjMQA1oa2pVsPZE1ZPyb1wm5
	Z6I2S8BS5Deo9JodLrnTRHM0ha7wN20xHehAiekpy7eixfjGHM883MtY5VtgKtSTtSwJQPKI9RWLB
	zpB8UcYyP7mfdQ0vldldQ1UyfMtfvyWIKj5CkqZ+x+07/Osv08GDejEnhAKKlvpWqR5g=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168626-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168626: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-rtds:guest-localmigrate/x10:fail:allowable
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=c7a80bc50ac768b4eecaad85b77ae45790c93c73
X-Osstest-Versions-That:
    xen=07aebcd55fd2f7997e9fe50a6c849c8a12ec2e68
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 16 Mar 2022 09:07:12 +0000

flight 168626 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168626/

Failures :-/ but no regressions.

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-rtds     20 guest-localmigrate/x10   fail REGR. vs. 168615

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168615
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168615
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168615
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168615
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168615
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168615
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168615
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168615
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168615
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168615
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168615
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168615
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass

version targeted for testing:
 xen                  c7a80bc50ac768b4eecaad85b77ae45790c93c73
baseline version:
 xen                  07aebcd55fd2f7997e9fe50a6c849c8a12ec2e68

Last test of basis   168615  2022-03-15 13:39:34 Z    0 days
Testing same since   168626  2022-03-16 00:38:21 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Jan Beulich <jbeulich@suse.com>
  Julien Grall <jgrall@amazon.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     fail    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   07aebcd55f..c7a80bc50a  c7a80bc50ac768b4eecaad85b77ae45790c93c73 -> master


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 09:10:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 09:10:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291102.493877 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUPfN-0006oY-GR; Wed, 16 Mar 2022 09:10:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291102.493877; Wed, 16 Mar 2022 09:10:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUPfN-0006oR-Ci; Wed, 16 Mar 2022 09:10:01 +0000
Received: by outflank-mailman (input) for mailman id 291102;
 Wed, 16 Mar 2022 09:09:59 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=7auh=T3=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nUPfL-0006oK-5o
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 09:09:59 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id d9e150fb-a508-11ec-8eba-a37418f5ba1a;
 Wed, 16 Mar 2022 10:09:57 +0100 (CET)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur03lp2059.outbound.protection.outlook.com [104.47.9.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-38-CWqGqfA6MwW_4lJmZG-jeQ-1; Wed, 16 Mar 2022 10:09:56 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by VI1PR04MB5070.eurprd04.prod.outlook.com (2603:10a6:803:57::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.28; Wed, 16 Mar
 2022 09:09:53 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5081.015; Wed, 16 Mar 2022
 09:09:53 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d9e150fb-a508-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647421797;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=cx4tnqs/wWARA+sl3FemMKoPttYmicbLY2XbWDuaZOA=;
	b=iDP5t5VwzvLM1SQM/jOvAAj+h+bBSjS8QxEzMgk+4L5nFl3mbZOr8eJyNYFx7BjinFeBX1
	xNWK/XxuNxjakzRsHuQIh6Xc3VrQgzU5B/qM22H7TGoZzJNNygUlzqxI/6c2flae+s0uGV
	WLQrK4Hf3TxGVA9pUphZ6EVExeh6pgk=
X-MC-Unique: CWqGqfA6MwW_4lJmZG-jeQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=RxPRNIAxl+74KBMK76Rc6pP/LAckfDSFqhN6Y0py2JfHlhKifr3nOCW/Xo9G73Au2/xtlRKWYN8MiPSK+1JWE653SPvxlLqcclEDRv7haft5/xWUhHXUiKCF8AyqtBKudQ3A3cCHIuds5xGjutJx2MQir88wz4LtbM0+7vsROtzssz393AkFrgV3b1B6tU2p1CWZMwSoJl86ruCYSvuna89+WdxYVAGvIMTwtaaVUoHJiA6Gw4uEsDiqNxy0+tcuu1NTGW5ij2Ohk7HH6sIWhpGJtCou4nVoMSiiigC3V7WeAxIMVo2j9nZSJ2VRiEBe+uheFV/5St6wXqfIYLIjNQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=cx4tnqs/wWARA+sl3FemMKoPttYmicbLY2XbWDuaZOA=;
 b=QQqZrs54yOKq/SFtgM0WzhhqHz80kiDO8HuX28ABIhXQQx543kVKHw1UbqkZvba7OhTor43dtE297RxCqnHkXpAoI+ERuSBwYQs3Uqv9PCj+oWcbJQf+vaAvBjYIiqT1FyQ4SC5UJYexJ73N2esoSjUExiWYqhqBh6wUXorIFXAtAsZfIPRUQqldySmxW8BmlYN99x0Ytb9gTWbDV0DIv0uHs2J8a7BS0zuc2fuPi5hw4+3EjPRvST1YXt8NsjGHALci87KEuZC/d/sdAu8+IcAFIquGdSqsd3OCGypyfrNMz9597nemJ1QyC38TjV7BWV5URsbM22l0GMHUhm6JqA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <e836cd5d-b59e-948f-5de2-61766377b27d@suse.com>
Date: Wed, 16 Mar 2022 10:09:51 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] include/public: add command result definitions to
 vscsiif.h
Content-Language: en-US
To: Juergen Gross <jgross@suse.com>
Cc: xen-devel@lists.xenproject.org
References: <20220228112224.18942-1-jgross@suse.com>
 <c489f4f8-c24e-ba73-b33e-b797527d25ac@suse.com>
 <b31ccba4-6a99-9ac6-b50a-a2b32e570a44@suse.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <b31ccba4-6a99-9ac6-b50a-a2b32e570a44@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P192CA0010.EURP192.PROD.OUTLOOK.COM
 (2603:10a6:209:83::23) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: e37d3a4e-d749-4772-5621-08da072cbb83
X-MS-TrafficTypeDiagnostic: VI1PR04MB5070:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB5070CDB226111F70A270A3DCB3119@VI1PR04MB5070.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	Wm25CvH8cwXAsiaYFY4Uj6jugmQ4T6pTzMI46nTeXwsHF+1rjmBxZOz96uO4eyUsAxkJG2wBICwZGpaKj0oz2E8sC3X2QSDlvSFMNsXOCcMhBqhbaDzcdIx6Cf682WaNuuhaLxA/9/0WWFg8gg62QJ1mpY2nrWbkopNcsnZjJrJaRG9YeYd5KJSBl2F8O9FL2mTcLfiLWJZYSIJ0SZBgLbQHvpUYLMwzK5/ajJjeoIBXe4yPX+AxUhMv/TYZm+9eZ7lBJ3ghOej4hKjSqQaQ3OcV6ZiYF7lui7CQsN/coorvqj7BuSDqI3q61AWym8I73q/uFW+P/3DnnDoxmDJKxClVBVNdoCYyyPakiQx969IUOxtGfyGzu9iEp9i9QD4PJOlOE/RYFac+4Jq+7pAMw1S2InrG+ryrRoxc6F9AOsi6KNHgq0xGLQmpdL3UIl78VrAchXW+dete5sScsQxEU/vvuA9KtxkVx/4ZH09vkak+VSPlRXq7ZQdqL5qgM9Uei2mYjfihbEMSEcLXSEdWV9yrwvLijo6yoe5ggxZd2LBR0eADfPAuZnweMZObJMo3q+qv5RazdGPeOpRvJuZ7kWoXhTajjsnYFq+Cjzn3rtXXTtKiz+4rJ1oKALADHobcRVcDW8k2gCMXUrAyj7hplGMPk5aUkSvb3DNbjxZJqPpBt8DTNBexERSTCx85JAlS5FJ3+XcItfhTUlHB2oMB3vDycZ5iSrepoLdLZmsBR2rR/euun+cijj3Tke5BjVYs
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(83380400001)(2616005)(36756003)(8936002)(2906002)(66946007)(66556008)(6862004)(4326008)(8676002)(186003)(26005)(53546011)(6506007)(6512007)(66476007)(31686004)(508600001)(31696002)(38100700002)(86362001)(6636002)(316002)(5660300002)(37006003)(6486002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?RVMzZEFFMWs0MC93S2xoNmF2UzA3MUtOQmJjdUVwR2JKMXNJaXJUb2tNWXNl?=
 =?utf-8?B?YUpNTTZaVGhzT0J2bE1LbDY3YWZEMFB6cXdxT1J2MGJESkxwanJFeVQ2U0FN?=
 =?utf-8?B?R1ZvQkNOdTI3b3hUWGtDaGM1bWlVcFZ0dlhzVzZiTVBrVm4zZ1lTeGgya0kx?=
 =?utf-8?B?enFHS2hNRkdUUGZoY1diNVRIN2R0YmdCVTltbDJvekppaUMwRkFEMmdnaDlz?=
 =?utf-8?B?bUxhaS85OHdITG5RWGFETitOQkRVaU9MbFFtM0hOcFhSb0RCK1FEWXlZQVE1?=
 =?utf-8?B?anYwK21mWGNIQllTS1pTcU5hM0ZZQkF6K25kbXZUM1RLalNSWWRBS0M1Yy9t?=
 =?utf-8?B?eURZTTFnR3EyaDZTRTNGcDdwSHE3emVrQ0ZXYXlwb1d1aS9pQUFEd29CYkRu?=
 =?utf-8?B?Nm16bFVoNWxzc2tsbUVBc3RKTnUxSHRDOFpqR1JLZzV1RUoyQXpjTHBxUGJq?=
 =?utf-8?B?eVZLOWQ4dEQ0UUR6NEFyZEVVdWRlYldSVHIyOXdIbDdRaTJwaWJaYXpnV2pR?=
 =?utf-8?B?UkVUclliS0E1aVVpTjN2TTlQOEdpdUFEOUQ0VmVsOW11dXRiUHQxc21xWitl?=
 =?utf-8?B?VE8vT0x1c1QrWjRzNjdla2w5dHc3YWRscklaajFrTUtOSXNZd0lJKzhHLzkz?=
 =?utf-8?B?NEF0TTF4MUZWUVB6WTZETUdocFZIZXprSkVXRDhGbzI0QURRZTZUQTlZUWZL?=
 =?utf-8?B?c3RVSU1SdkxHYjRwMi8zMlNPbEpGbmprN0RrTEVFcjRPaXFkK1VkZmczTGdD?=
 =?utf-8?B?ZkdSSDdxK3RKS2Vac282RHBtVDlMN3ZONDIyRWF3eTRpTmZ4S1M4anFPUmNI?=
 =?utf-8?B?ZU1sY3k5Y2tGZ0ZxQjlpTDBYUEtsbnZxMFVxQy9xaUk2ekVja21yL214cTY0?=
 =?utf-8?B?UXJ2QUJCTURvZTFMVE5EcXcwUDZBdUpEN1IrRkJwbzRsNWI0elNjK3BxbXBp?=
 =?utf-8?B?QTlUczZ1S3c1Mk02MlpRTFhrQmVTdmE3K0cvZEVVcWZwWC9vLzNKNG1lcXRB?=
 =?utf-8?B?L04xUE5kOHZ0Q3AwcWIvT1M3SHd1OTY4MWZMSjNnYTUyWGYvSDhucWRKM0Nq?=
 =?utf-8?B?TE9xeVJrbHhLeC80QmJmUHp1NE0wMzhzN1VMSmY3WHNzei9YcFcza25icm1K?=
 =?utf-8?B?VFVFeWNQbm5ER1EraUVaNDBpN09sTUE3TFJtM28rSS93dXMzTFhqelhwZEpN?=
 =?utf-8?B?WmdIM0syTzRjb1dOVDdENUFCZi9KeUtIejBTTUhNeGxKdkxqaXFBQWRwMG5Y?=
 =?utf-8?B?QTRhSEdLUXVwV2FnYVRjQ3ZuOE84YmdWUjA1aTByaExQcVQ4Mm5jVUkwL0RK?=
 =?utf-8?B?dkR0bkdZUFk4NUtTVTAwaHF6V1RWa09Fbzh3WFlHVHlEMzFXa21zbmVmeHJ4?=
 =?utf-8?B?TUZEdEFIMjZnaWpSTklvc0JaZ25FMVBieTNndzNlQWdFdmc0ZDBQblZEbGhP?=
 =?utf-8?B?OHppSzBjZkJtNERzdEZpQTRUUU8yTzBDMGE2RGE0Y0czVWtpam16YkNVR3Nv?=
 =?utf-8?B?aW8ycEFQcm8wVE1SL1B3a3FWNTVpWnc5ellEN3huODVMVjdKY1d0dldpaWE5?=
 =?utf-8?B?eUdtakpkV3pPSVA1d05GcFAwTklqK1IyZ3BUYmxuYmwvVUVhZVh5QjRuUW1R?=
 =?utf-8?B?NUtYTkMzWFh3RU1oY0NEYVd3NkViQ3ptQkRWUXFWSlVYUEVDaDJ1RzFycmIz?=
 =?utf-8?B?YjNNN096aGFvK05BN3MzelJaM0JkcW1rOVI0QStCVFZRZzFabVVzcUpIc0Z5?=
 =?utf-8?B?Tmx5RFpxaWJFMXp5dERZb29HcjFJQk1QeC91enlGN1NvOS9yQ1NHNGpCM05s?=
 =?utf-8?B?Y1BpbDZOT2lJQkhjbitjNE9uT3ZDTW5XUXFFSHJHVXpoRU5LdDB6Tzc0d2hC?=
 =?utf-8?B?RnBqRDhQWFZPaTRKclQ4dmxJTm9JUm0rbExnRWI4c0Z2aVlrcWVhZXBoWCtk?=
 =?utf-8?Q?AoQsXrw45GjSuJ/BEqTVHF/PqRWYYwxk?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e37d3a4e-d749-4772-5621-08da072cbb83
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Mar 2022 09:09:53.6623
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: DvXonVu9uy417W5buOJy6kXnmNWEuibZpKvKyYez4lPkhFu+YoohsyBxPSVTbHe7Ak23PUhkQl4J4TUBKtoekg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB5070

On 16.03.2022 10:03, Juergen Gross wrote:
> On 14.03.22 10:55, Jan Beulich wrote:
>> On 28.02.2022 12:22, Juergen Gross wrote:
>>> +#define XEN_VSCSIIF_RSLT_HOST_OK         0
>>> +#define XEN_VSCSIIF_RSLT_HOST_NO_CONN    1 /* Couldn't connect before timeout */
>>> +#define XEN_VSCSIIF_RSLT_HOST_BUS_BUSY   2 /* BUS busy through timeout */
>>> +#define XEN_VSCSIIF_RSLT_HOST_TIME_OUT   3 /* TIMED OUT for other reason */
>>> +#define XEN_VSCSIIF_RSLT_HOST_BAD_TARG   4 /* BAD target */
>>
>> Are the all-upper-case words really in need of mirroring this
>> aspect from Linux? To me it gives the impression of this being
>> acronyms of some sort at the first glance.
> 
> The backend can return all these values, so I think I need to define
> them here.

Oh, I realize I didn't say so explicitly and hence what I said
ended up being ambiguous: The remark was only about the all-
upper-case words in the comments. I would think they can be
spelled normally.

>>> +#define XEN_VSCSIIF_RSLT_HOST_ABORT      5 /* Abort for some other reason */
>>> +#define XEN_VSCSIIF_RSLT_HOST_PARITY     6 /* Parity error */
>>> +#define XEN_VSCSIIF_RSLT_HOST_ERROR      7 /* Internal error */
>>> +#define XEN_VSCSIIF_RSLT_HOST_RESET      8 /* Reset by somebody */
>>> +#define XEN_VSCSIIF_RSLT_HOST_BAD_INTR   9 /* Unexpected interrupt */
>>> +#define XEN_VSCSIIF_RSLT_HOST_PASSTHR   10 /* Force command past mid-layer */
>>> +#define XEN_VSCSIIF_RSLT_HOST_SOFT_ERR  11 /* Retry requested */
>>> +#define XEN_VSCSIIF_RSLT_HOST_IMM_RETR  12 /* Hidden retry requested */
>>> +#define XEN_VSCSIIF_RSLT_HOST_REQUEUE   13 /* Requeue command requested */
>>> +#define XEN_VSCSIIF_RSLT_HOST_DISRUPT   14 /* Transport error disrupted I/O */
>>> +#define XEN_VSCSIIF_RSLT_HOST_FAILFAST  15 /* Transport class fastfailed */
>>> +#define XEN_VSCSIIF_RSLT_HOST_TARG_FAIL 16 /* Permanent target failure */
>>> +#define XEN_VSCSIIF_RSLT_HOST_NEX_FAIL  17 /* Permanent nexus failure on path */
>>> +#define XEN_VSCSIIF_RSLT_HOST_NOMEM     18 /* Space allocation failed */
>>> +#define XEN_VSCSIIF_RSLT_HOST_MED_ERR   19 /* Medium error */
>>> +#define XEN_VSCSIIF_RSLT_HOST_MARGINAL  20 /* Transport marginal errors */
>>
>> Some of the name shortening that you did, comparing with the
>> Linux names, has gone a little too far for my taste. But you're
>> the maintainer ...
> 
> There are basically the following alternatives:
> 
> - use longer names (using the Linux names would end up in e.g.
>    XEN_VSCSIIF_RSLT_HOST_TRANSPORT_DISRUPTED, making it 10 chars longer
> - drop some part of the common prefix, e.g. the "RSLT_HOST_" part
> - keep it as is
> 
> I'm basically fine with any of those.

My personal preference would be in the order you named the
alternatives, perhaps with prepending them by "use longer names,
but in extreme cases not quite as long as Linux'es".

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 09:13:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 09:13:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291110.493900 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUPj7-0008PZ-8w; Wed, 16 Mar 2022 09:13:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291110.493900; Wed, 16 Mar 2022 09:13:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUPj7-0008PS-5l; Wed, 16 Mar 2022 09:13:53 +0000
Received: by outflank-mailman (input) for mailman id 291110;
 Wed, 16 Mar 2022 09:13:51 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=vd9D=T3=citrix.com=prvs=067d42de6=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nUPj5-0008PI-Mw
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 09:13:51 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6341909f-a509-11ec-8eba-a37418f5ba1a;
 Wed, 16 Mar 2022 10:13:49 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6341909f-a509-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647422029;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=mUWg029r82H/GghoniZcMOpYWm1pwuDOVotMfQ6qkXY=;
  b=hquO9XngWyJPp9AnUCvOt8/urr+wvebfROGUT1F7QmzIL6D84W0b2Rv3
   YaZyqe8Ci4jqSWzL5AGIvcOPi8LIcDXFV1vpyTiDhKxdQyxMFL5JltCps
   pugYRn4Dm08Z6gVQTwDbbmghX2W/lVSz71Jve2tb4UoAsxCYFiXVZkn/d
   g=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 66366073
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:sHZ7JqwkADazyfOHvsF6t+dSxirEfRIJ4+MujC+fZmUNrF6WrkVSx
 jEdWmjXP6yLNGbzKt4jPdmx9R5VvpKHzNBqHVdoqSAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2IbhWWthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 Npl6LaSSSByHbH1h8sfUTBZPjNffvRl9+qSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DHooZtzdFxDXQCf8gTLjIQrnQ5M8e1zA17ixLNaiAP
 JRHMWU0BPjGSy1CGg0wE7Iap72DvSjtch8Fkg+HqaVitgA/yyQuieOwYbI5YOeiVchT20qVu
 G/C12D4GQ0BcsySzyKf9XChjfOJmjn0ML/+D5XhqKQs2gfKgDVOVltGDjNXvMVVlGbjcfBfD
 Bc35hMxgqow3U2GXPi+Bj639SvsUgEnZ/JcFOgz6Qeow6XS4hqECmVscgOteODKp+dtG2V0i
 wbhc8fBQGU27ebLES71GqK892vaBMQDEYMVicbopyMh6sKrnow8hwmnoj1LQP/s1Y2d9d0dL
 lm3QMkCa1c70JZjO0aTpwmvb9eQSn7hFVZdCuL/BD7N0++BTNT5D7FEEHCChRq6EK6XT0Oao
 F8PkNWE4eYFAPmlzXLRH79cRujzt6/falUwZGKD+bF6rlxBHFb5IehtDMxWfh81Yq7ohxe0C
 KMshe+hzMAKZyb7BUOGS4mwF94r3cDd+SfNDZjpgi51SsEpLmevpXg2DWbJhjyFuBV8wMkXZ
 MbAGe7xXClyNEiS5GfvLwvr+eRwnX5WKKK6bc2T8ilLJpLFPS/LE+hZaAXSBg37hYvdyDjoH
 x9kH5Pi431ivCfWO0E7LaZ7wYg2EEUG
IronPort-HdrOrdr: A9a23:7IiSdq5ZmkDielpqUQPXwMbXdLJyesId70hD6qhwISY1TiX+rb
 HJoB17726StN9/YgBCpTntAsa9qBDnhPpICOsqTNWftWDd0QPCRuwP0WKL+UyYJ8SUzI5gPM
 lbHZSWcOeAaGRHsQ==
X-IronPort-AV: E=Sophos;i="5.90,186,1643691600"; 
   d="scan'208";a="66366073"
From: Jane Malalane <jane.malalane@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Jane Malalane <jane.malalane@citrix.com>
Subject: [PATCH v8 0/2] xen: Report and use hardware APIC virtualization capabilities
Date: Wed, 16 Mar 2022 09:13:13 +0000
Message-ID: <20220316091315.19281-1-jane.malalane@citrix.com>
X-Mailer: git-send-email 2.11.0
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

Jane Malalane (2):
  xen+tools: Report Interrupt Controller Virtualization capabilities on
    x86
  x86/xen: Allow per-domain usage of hardware virtualized APIC

 docs/man/xl.cfg.5.pod.in              | 15 ++++++++++++++
 docs/man/xl.conf.5.pod.in             | 12 +++++++++++
 tools/golang/xenlight/helpers.gen.go  | 16 ++++++++++++++
 tools/golang/xenlight/types.gen.go    |  4 ++++
 tools/include/libxl.h                 | 14 +++++++++++++
 tools/libs/light/libxl.c              |  3 +++
 tools/libs/light/libxl_arch.h         |  9 ++++++--
 tools/libs/light/libxl_arm.c          | 14 ++++++++++---
 tools/libs/light/libxl_create.c       | 22 ++++++++++++--------
 tools/libs/light/libxl_types.idl      |  4 ++++
 tools/libs/light/libxl_x86.c          | 39 +++++++++++++++++++++++++++++++++--
 tools/ocaml/libs/xc/xenctrl.ml        |  7 +++++++
 tools/ocaml/libs/xc/xenctrl.mli       |  7 +++++++
 tools/ocaml/libs/xc/xenctrl_stubs.c   | 17 ++++++++++++---
 tools/xl/xl.c                         |  8 +++++++
 tools/xl/xl.h                         |  2 ++
 tools/xl/xl_info.c                    |  6 ++++--
 tools/xl/xl_parse.c                   | 18 ++++++++++++++++
 xen/arch/x86/domain.c                 | 29 +++++++++++++++++++++++++-
 xen/arch/x86/hvm/hvm.c                |  3 +++
 xen/arch/x86/hvm/vmx/vmcs.c           | 13 ++++++++++++
 xen/arch/x86/hvm/vmx/vmx.c            | 13 ++++--------
 xen/arch/x86/include/asm/hvm/domain.h |  6 ++++++
 xen/arch/x86/include/asm/hvm/hvm.h    | 10 +++++++++
 xen/arch/x86/sysctl.c                 |  4 ++++
 xen/arch/x86/traps.c                  |  5 +++--
 xen/include/public/arch-x86/xen.h     |  2 ++
 xen/include/public/sysctl.h           | 11 +++++++++-
 28 files changed, 279 insertions(+), 34 deletions(-)

-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 09:13:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 09:13:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291111.493910 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUPj8-0000E7-Gp; Wed, 16 Mar 2022 09:13:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291111.493910; Wed, 16 Mar 2022 09:13:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUPj8-0000Dy-DY; Wed, 16 Mar 2022 09:13:54 +0000
Received: by outflank-mailman (input) for mailman id 291111;
 Wed, 16 Mar 2022 09:13:53 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=vd9D=T3=citrix.com=prvs=067d42de6=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nUPj7-0008PI-1g
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 09:13:53 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 651c0fb5-a509-11ec-8eba-a37418f5ba1a;
 Wed, 16 Mar 2022 10:13:51 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 651c0fb5-a509-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647422031;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=vZZlcKTtbRnFFHp3E66kwq4RBmkizerX9CX2DDe7g1k=;
  b=EYq3y3uUkOx3owlSt12Qq3tU85amP4ktpGbfZ6eT0tlDqU3ahpb+AgE6
   hR9qxuxqT21VfX6HAPI83LqmIwDHjDmDLBUEceA5KZMpr3pP4kM9diSSG
   96AZbCtFHAtWK+keAN9if1+y5zD678bf0MkoUuLj1Ur3cHDEt8VNtxcUh
   Y=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 66366074
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:2Wmw4awNqXeKypDdCWV6t+euxirEfRIJ4+MujC+fZmUNrF6WrkVRm
 2RKXjuFPv2NYWGjKoojPIi39EIO65/Um4MwHQI6rSAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2IbhWWthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 Npl6LaSSSByHbH1h8sfUTBZPjNffvRl9+qSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DHooZtzdFxDXQCf8gTLjIQrnQ5M8e1zA17ixLNaiAP
 JRHMWUzBPjGSxJlAHsLEo0GoNn21lzyKRZ+qE2ZqrVitgA/yyQuieOwYbI5YOeie8JRmUqJo
 3PcyE7wCBoaKd+3xCKM9zSngeqntTjgRIsYGbm89/hrqF6e3GoeDFsRT1TTifO0kFKkUtRTb
 Ukd4DMzrLMa/VauCNL6WnWQo3OavxhaR9tZFcU77h2Azuzf5APxLmoZSHhHYd8vts4zTBQr0
 EOEm5XiAjkHmL+aU3WG7Z+PsCi/fyMSKAcqdSICCAcI/dTniIUylQ7UCMZuFravid/4Ei22x
 CqFxAA8jbgOic8A142g4EvKxTmro/DhTBMx5wjRdnKo6EV+foHNT5OswUjW67BHNonxc7Wal
 CFawY7EtrlIVMzT0nzWKAkQIF23z6uvEj372n1zJoYO9TaE+lOxXMMJwz4rcS+FLf04UTPuZ
 UbSvyZY65lSIGamYMdLXm6hNyg55fO+TIq4D5g4evILO8EsL1HfoEmCcGbKhwjQfF4QfbbT0
 HtxWeKlFj4kBKtu11JarM9NgOZwlkjSKY4+LK0XLihLM5LDPBZ5qp9faTNii9zVCovf+G05F
 P4Fa6O3J+13CrGWX8Uu2dd7wao2BXY6H4vqjMdca/SOJAFrcEl4VaOOm+J7ItY1xv4P/gstw
 p1bchQBoLYYrSebQThml1g5MO+/NXqBhS9T0dMQ0aaAhCF4PNfHAFY3fJorZ7g3nNGPPtYvJ
 8Tpj/6oW6wVIhyeomx1RcCk8ORKKUT67SrTbnHNSGVuIPZdq/nhp4aMkv3Hr3JVUEJadKIW/
 tWd6+8sacFaFlo4U5qONq7HIpHYlSF1pd+elnDgerF7EHgAOqAwQ8Atppfb+/0xFCg=
IronPort-HdrOrdr: A9a23:E/TS9K6uPubtq6tocgPXwPDXdLJyesId70hD6qhwISY6TiX+rb
 HWoB17726TtN9/YhEdcLy7VJVoBEmskKKdgrNhWotKPjOW21dARbsKheCJrgEIWReOktK1vZ
 0QC5SWY+eQMbEVt6nHCXGDYrQd/OU=
X-IronPort-AV: E=Sophos;i="5.90,186,1643691600"; 
   d="scan'208";a="66366074"
From: Jane Malalane <jane.malalane@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Jane Malalane <jane.malalane@citrix.com>, Wei Liu <wl@xen.org>, "Anthony
 PERARD" <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien Grall
	<julien@xen.org>, "Stefano Stabellini" <sstabellini@kernel.org>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian
	<kevin.tian@intel.com>, =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?=
	<roger.pau@citrix.com>
Subject: [PATCH v8 1/2] xen+tools: Report Interrupt Controller Virtualization capabilities on x86
Date: Wed, 16 Mar 2022 09:13:14 +0000
Message-ID: <20220316091315.19281-2-jane.malalane@citrix.com>
X-Mailer: git-send-email 2.11.0
In-Reply-To: <20220316091315.19281-1-jane.malalane@citrix.com>
References: <20220316091315.19281-1-jane.malalane@citrix.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

Add XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC and
XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC to report accelerated xAPIC and
x2APIC, on x86 hardware. This is so that xAPIC and x2APIC virtualization
can subsequently be enabled on a per-domain basis.
No such features are currently implemented on AMD hardware.

HW assisted xAPIC virtualization will be reported if HW, at the
minimum, supports virtualize_apic_accesses as this feature alone means
that an access to the APIC page will cause an APIC-access VM exit. An
APIC-access VM exit provides a VMM with information about the access
causing the VM exit, unlike a regular EPT fault, thus simplifying some
internal handling.

HW assisted x2APIC virtualization will be reported if HW supports
virtualize_x2apic_mode and, at least, either apic_reg_virt or
virtual_intr_delivery. This also means that
sysctl follows the conditionals in vmx_vlapic_msr_changed().

For that purpose, also add an arch-specific "capabilities" parameter
to struct xen_sysctl_physinfo.

Note that this interface is intended to be compatible with AMD so that
AVIC support can be introduced in a future patch. Unlike Intel that
has multiple controls for APIC Virtualization, AMD has one global
'AVIC Enable' control bit, so fine-graining of APIC virtualization
control cannot be done on a common interface.

Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Jane Malalane <jane.malalane@citrix.com>
---
CC: Wei Liu <wl@xen.org>
CC: Anthony PERARD <anthony.perard@citrix.com>
CC: Juergen Gross <jgross@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>
CC: George Dunlap <george.dunlap@citrix.com>
CC: Jan Beulich <jbeulich@suse.com>
CC: Julien Grall <julien@xen.org>
CC: Stefano Stabellini <sstabellini@kernel.org>
CC: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
CC: Bertrand Marquis <bertrand.marquis@arm.com>
CC: Jun Nakajima <jun.nakajima@intel.com>
CC: Kevin Tian <kevin.tian@intel.com>
CC: "Roger Pau Monné" <roger.pau@citrix.com>

v8:
 * Improve commit message

v7:
 * Make sure assisted_x{2}apic_available evaluates to false, to ensure
   Xen builds, when !CONFIG_HVM
 * Fix coding style issues

v6:
 * Limit abi check to x86
 * Fix coding style issue

v5:
 * Have assisted_xapic_available solely depend on
   cpu_has_vmx_virtualize_apic_accesses and assisted_x2apic_available
   depend on cpu_has_vmx_virtualize_x2apic_mode and
   cpu_has_vmx_apic_reg_virt OR cpu_has_vmx_virtual_intr_delivery

v4:
 * Fallback to the original v2/v1 conditions for setting
   assisted_xapic_available and assisted_x2apic_available so that in
   the future APIC virtualization can be exposed on AMD hardware
   since fine-graining of "AVIC" is not supported, i.e., AMD solely
   uses "AVIC Enable". This also means that sysctl mimics what's
   exposed in CPUID

v3:
 * Define XEN_SYSCTL_PHYSCAP_ARCH_MAX for ABI checking and actually
   set "arch_capbilities", via a call to c_bitmap_to_ocaml_list()
 * Have assisted_x2apic_available only depend on
   cpu_has_vmx_virtualize_x2apic_mode

v2:
 * Use one macro LIBXL_HAVE_PHYSINFO_ASSISTED_APIC instead of two
 * Pass xcpyshinfo as a pointer in libxl__arch_get_physinfo
 * Set assisted_x{2}apic_available to be conditional upon "bsp" and
   annotate it with __ro_after_init
 * Change XEN_SYSCTL_PHYSCAP_ARCH_ASSISTED_X{2}APIC to
   _X86_ASSISTED_X{2}APIC
 * Keep XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X{2}APIC contained within
   sysctl.h
 * Fix padding introduced in struct xen_sysctl_physinfo and bump
   XEN_SYSCTL_INTERFACE_VERSION
---
 tools/golang/xenlight/helpers.gen.go |  4 ++++
 tools/golang/xenlight/types.gen.go   |  2 ++
 tools/include/libxl.h                |  7 +++++++
 tools/libs/light/libxl.c             |  3 +++
 tools/libs/light/libxl_arch.h        |  4 ++++
 tools/libs/light/libxl_arm.c         |  5 +++++
 tools/libs/light/libxl_types.idl     |  2 ++
 tools/libs/light/libxl_x86.c         | 11 +++++++++++
 tools/ocaml/libs/xc/xenctrl.ml       |  5 +++++
 tools/ocaml/libs/xc/xenctrl.mli      |  5 +++++
 tools/ocaml/libs/xc/xenctrl_stubs.c  | 15 +++++++++++++--
 tools/xl/xl_info.c                   |  6 ++++--
 xen/arch/x86/hvm/hvm.c               |  3 +++
 xen/arch/x86/hvm/vmx/vmcs.c          |  9 +++++++++
 xen/arch/x86/include/asm/hvm/hvm.h   |  5 +++++
 xen/arch/x86/sysctl.c                |  4 ++++
 xen/include/public/sysctl.h          | 11 ++++++++++-
 17 files changed, 96 insertions(+), 5 deletions(-)

diff --git a/tools/golang/xenlight/helpers.gen.go b/tools/golang/xenlight/helpers.gen.go
index b746ff1081..dd4e6c9f14 100644
--- a/tools/golang/xenlight/helpers.gen.go
+++ b/tools/golang/xenlight/helpers.gen.go
@@ -3373,6 +3373,8 @@ x.CapVmtrace = bool(xc.cap_vmtrace)
 x.CapVpmu = bool(xc.cap_vpmu)
 x.CapGnttabV1 = bool(xc.cap_gnttab_v1)
 x.CapGnttabV2 = bool(xc.cap_gnttab_v2)
+x.CapAssistedXapic = bool(xc.cap_assisted_xapic)
+x.CapAssistedX2Apic = bool(xc.cap_assisted_x2apic)
 
  return nil}
 
@@ -3407,6 +3409,8 @@ xc.cap_vmtrace = C.bool(x.CapVmtrace)
 xc.cap_vpmu = C.bool(x.CapVpmu)
 xc.cap_gnttab_v1 = C.bool(x.CapGnttabV1)
 xc.cap_gnttab_v2 = C.bool(x.CapGnttabV2)
+xc.cap_assisted_xapic = C.bool(x.CapAssistedXapic)
+xc.cap_assisted_x2apic = C.bool(x.CapAssistedX2Apic)
 
  return nil
  }
diff --git a/tools/golang/xenlight/types.gen.go b/tools/golang/xenlight/types.gen.go
index b1e84d5258..87be46c745 100644
--- a/tools/golang/xenlight/types.gen.go
+++ b/tools/golang/xenlight/types.gen.go
@@ -1014,6 +1014,8 @@ CapVmtrace bool
 CapVpmu bool
 CapGnttabV1 bool
 CapGnttabV2 bool
+CapAssistedXapic bool
+CapAssistedX2Apic bool
 }
 
 type Connectorinfo struct {
diff --git a/tools/include/libxl.h b/tools/include/libxl.h
index 51a9b6cfac..94e6355822 100644
--- a/tools/include/libxl.h
+++ b/tools/include/libxl.h
@@ -528,6 +528,13 @@
 #define LIBXL_HAVE_MAX_GRANT_VERSION 1
 
 /*
+ * LIBXL_HAVE_PHYSINFO_ASSISTED_APIC indicates that libxl_physinfo has
+ * cap_assisted_xapic and cap_assisted_x2apic fields, which indicates
+ * the availability of x{2}APIC hardware assisted virtualization.
+ */
+#define LIBXL_HAVE_PHYSINFO_ASSISTED_APIC 1
+
+/*
  * libxl ABI compatibility
  *
  * The only guarantee which libxl makes regarding ABI compatibility
diff --git a/tools/libs/light/libxl.c b/tools/libs/light/libxl.c
index a0bf7d186f..6d699951e2 100644
--- a/tools/libs/light/libxl.c
+++ b/tools/libs/light/libxl.c
@@ -15,6 +15,7 @@
 #include "libxl_osdeps.h"
 
 #include "libxl_internal.h"
+#include "libxl_arch.h"
 
 int libxl_ctx_alloc(libxl_ctx **pctx, int version,
                     unsigned flags, xentoollog_logger * lg)
@@ -410,6 +411,8 @@ int libxl_get_physinfo(libxl_ctx *ctx, libxl_physinfo *physinfo)
     physinfo->cap_gnttab_v2 =
         !!(xcphysinfo.capabilities & XEN_SYSCTL_PHYSCAP_gnttab_v2);
 
+    libxl__arch_get_physinfo(physinfo, &xcphysinfo);
+
     GC_FREE;
     return 0;
 }
diff --git a/tools/libs/light/libxl_arch.h b/tools/libs/light/libxl_arch.h
index 1522ecb97f..207ceac6a1 100644
--- a/tools/libs/light/libxl_arch.h
+++ b/tools/libs/light/libxl_arch.h
@@ -86,6 +86,10 @@ int libxl__arch_extra_memory(libxl__gc *gc,
                              uint64_t *out);
 
 _hidden
+void libxl__arch_get_physinfo(libxl_physinfo *physinfo,
+                              const xc_physinfo_t *xcphysinfo);
+
+_hidden
 void libxl__arch_update_domain_config(libxl__gc *gc,
                                       libxl_domain_config *dst,
                                       const libxl_domain_config *src);
diff --git a/tools/libs/light/libxl_arm.c b/tools/libs/light/libxl_arm.c
index eef1de0939..39fdca1b49 100644
--- a/tools/libs/light/libxl_arm.c
+++ b/tools/libs/light/libxl_arm.c
@@ -1431,6 +1431,11 @@ int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
     return rc;
 }
 
+void libxl__arch_get_physinfo(libxl_physinfo *physinfo,
+                              const xc_physinfo_t *xcphysinfo)
+{
+}
+
 void libxl__arch_update_domain_config(libxl__gc *gc,
                                       libxl_domain_config *dst,
                                       const libxl_domain_config *src)
diff --git a/tools/libs/light/libxl_types.idl b/tools/libs/light/libxl_types.idl
index 2a42da2f7d..42ac6c357b 100644
--- a/tools/libs/light/libxl_types.idl
+++ b/tools/libs/light/libxl_types.idl
@@ -1068,6 +1068,8 @@ libxl_physinfo = Struct("physinfo", [
     ("cap_vpmu", bool),
     ("cap_gnttab_v1", bool),
     ("cap_gnttab_v2", bool),
+    ("cap_assisted_xapic", bool),
+    ("cap_assisted_x2apic", bool),
     ], dir=DIR_OUT)
 
 libxl_connectorinfo = Struct("connectorinfo", [
diff --git a/tools/libs/light/libxl_x86.c b/tools/libs/light/libxl_x86.c
index 1feadebb18..e0a06ecfe3 100644
--- a/tools/libs/light/libxl_x86.c
+++ b/tools/libs/light/libxl_x86.c
@@ -866,6 +866,17 @@ int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
     return rc;
 }
 
+void libxl__arch_get_physinfo(libxl_physinfo *physinfo,
+                              const xc_physinfo_t *xcphysinfo)
+{
+    physinfo->cap_assisted_xapic =
+        !!(xcphysinfo->arch_capabilities &
+           XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC);
+    physinfo->cap_assisted_x2apic =
+        !!(xcphysinfo->arch_capabilities &
+           XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC);
+}
+
 void libxl__arch_update_domain_config(libxl__gc *gc,
                                       libxl_domain_config *dst,
                                       const libxl_domain_config *src)
diff --git a/tools/ocaml/libs/xc/xenctrl.ml b/tools/ocaml/libs/xc/xenctrl.ml
index 7503031d8f..712456e098 100644
--- a/tools/ocaml/libs/xc/xenctrl.ml
+++ b/tools/ocaml/libs/xc/xenctrl.ml
@@ -127,6 +127,10 @@ type physinfo_cap_flag =
 	| CAP_Gnttab_v1
 	| CAP_Gnttab_v2
 
+type physinfo_arch_cap_flag =
+	| CAP_X86_ASSISTED_XAPIC
+	| CAP_X86_ASSISTED_X2APIC
+
 type physinfo =
 {
 	threads_per_core : int;
@@ -140,6 +144,7 @@ type physinfo =
 	(* XXX hw_cap *)
 	capabilities     : physinfo_cap_flag list;
 	max_nr_cpus      : int;
+	arch_capabilities : physinfo_arch_cap_flag list;
 }
 
 type version =
diff --git a/tools/ocaml/libs/xc/xenctrl.mli b/tools/ocaml/libs/xc/xenctrl.mli
index d1d9c9247a..b034434f68 100644
--- a/tools/ocaml/libs/xc/xenctrl.mli
+++ b/tools/ocaml/libs/xc/xenctrl.mli
@@ -112,6 +112,10 @@ type physinfo_cap_flag =
   | CAP_Gnttab_v1
   | CAP_Gnttab_v2
 
+type physinfo_arch_cap_flag =
+  | CAP_X86_ASSISTED_XAPIC
+  | CAP_X86_ASSISTED_X2APIC
+
 type physinfo = {
   threads_per_core : int;
   cores_per_socket : int;
@@ -123,6 +127,7 @@ type physinfo = {
   scrub_pages      : nativeint;
   capabilities     : physinfo_cap_flag list;
   max_nr_cpus      : int; (** compile-time max possible number of nr_cpus *)
+  arch_capabilities : physinfo_arch_cap_flag list;
 }
 type version = { major : int; minor : int; extra : string; }
 type compile_info = {
diff --git a/tools/ocaml/libs/xc/xenctrl_stubs.c b/tools/ocaml/libs/xc/xenctrl_stubs.c
index 5b4fe72c8d..7e9c32ad1b 100644
--- a/tools/ocaml/libs/xc/xenctrl_stubs.c
+++ b/tools/ocaml/libs/xc/xenctrl_stubs.c
@@ -712,7 +712,7 @@ CAMLprim value stub_xc_send_debug_keys(value xch, value keys)
 CAMLprim value stub_xc_physinfo(value xch)
 {
 	CAMLparam1(xch);
-	CAMLlocal2(physinfo, cap_list);
+	CAMLlocal3(physinfo, cap_list, arch_cap_list);
 	xc_physinfo_t c_physinfo;
 	int r;
 
@@ -731,7 +731,7 @@ CAMLprim value stub_xc_physinfo(value xch)
 		/* ! XEN_SYSCTL_PHYSCAP_ XEN_SYSCTL_PHYSCAP_MAX max */
 		(c_physinfo.capabilities);
 
-	physinfo = caml_alloc_tuple(10);
+	physinfo = caml_alloc_tuple(11);
 	Store_field(physinfo, 0, Val_int(c_physinfo.threads_per_core));
 	Store_field(physinfo, 1, Val_int(c_physinfo.cores_per_socket));
 	Store_field(physinfo, 2, Val_int(c_physinfo.nr_cpus));
@@ -743,6 +743,17 @@ CAMLprim value stub_xc_physinfo(value xch)
 	Store_field(physinfo, 8, cap_list);
 	Store_field(physinfo, 9, Val_int(c_physinfo.max_cpu_id + 1));
 
+#if defined(__i386__) || defined(__x86_64__)
+	/*
+	 * arch_capabilities: physinfo_arch_cap_flag list;
+	 */
+	arch_cap_list = c_bitmap_to_ocaml_list
+		/* ! physinfo_arch_cap_flag CAP_ none */
+		/* ! XEN_SYSCTL_PHYSCAP_ XEN_SYSCTL_PHYSCAP_X86_MAX max */
+		(c_physinfo.arch_capabilities);
+	Store_field(physinfo, 10, arch_cap_list);
+#endif
+
 	CAMLreturn(physinfo);
 }
 
diff --git a/tools/xl/xl_info.c b/tools/xl/xl_info.c
index 712b7638b0..3205270754 100644
--- a/tools/xl/xl_info.c
+++ b/tools/xl/xl_info.c
@@ -210,7 +210,7 @@ static void output_physinfo(void)
          info.hw_cap[4], info.hw_cap[5], info.hw_cap[6], info.hw_cap[7]
         );
 
-    maybe_printf("virt_caps              :%s%s%s%s%s%s%s%s%s%s%s\n",
+    maybe_printf("virt_caps              :%s%s%s%s%s%s%s%s%s%s%s%s%s\n",
          info.cap_pv ? " pv" : "",
          info.cap_hvm ? " hvm" : "",
          info.cap_hvm && info.cap_hvm_directio ? " hvm_directio" : "",
@@ -221,7 +221,9 @@ static void output_physinfo(void)
          info.cap_vmtrace ? " vmtrace" : "",
          info.cap_vpmu ? " vpmu" : "",
          info.cap_gnttab_v1 ? " gnttab-v1" : "",
-         info.cap_gnttab_v2 ? " gnttab-v2" : ""
+         info.cap_gnttab_v2 ? " gnttab-v2" : "",
+         info.cap_assisted_xapic ? " assisted_xapic" : "",
+         info.cap_assisted_x2apic ? " assisted_x2apic" : ""
         );
 
     vinfo = libxl_get_version_info(ctx);
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index 709a4191ef..e5dde9f8ce 100644
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -117,6 +117,9 @@ static const char __initconst warning_hvm_fep[] =
 static bool_t __initdata opt_altp2m_enabled = 0;
 boolean_param("altp2m", opt_altp2m_enabled);
 
+bool __ro_after_init assisted_xapic_available;
+bool __ro_after_init assisted_x2apic_available;
+
 static int cf_check cpu_callback(
     struct notifier_block *nfb, unsigned long action, void *hcpu)
 {
diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
index e1e1fa14e6..77ce0b2121 100644
--- a/xen/arch/x86/hvm/vmx/vmcs.c
+++ b/xen/arch/x86/hvm/vmx/vmcs.c
@@ -343,6 +343,15 @@ static int vmx_init_vmcs_config(bool bsp)
             MSR_IA32_VMX_PROCBASED_CTLS2, &mismatch);
     }
 
+    /* Check whether hardware supports accelerated xapic and x2apic. */
+    if ( bsp )
+    {
+        assisted_xapic_available = cpu_has_vmx_virtualize_apic_accesses;
+        assisted_x2apic_available = cpu_has_vmx_virtualize_x2apic_mode &&
+                                    (cpu_has_vmx_apic_reg_virt ||
+                                     cpu_has_vmx_virtual_intr_delivery);
+    }
+
     /* The IA32_VMX_EPT_VPID_CAP MSR exists only when EPT or VPID available */
     if ( _vmx_secondary_exec_control & (SECONDARY_EXEC_ENABLE_EPT |
                                         SECONDARY_EXEC_ENABLE_VPID) )
diff --git a/xen/arch/x86/include/asm/hvm/hvm.h b/xen/arch/x86/include/asm/hvm/hvm.h
index 5b7ec0cf69..e0d9348878 100644
--- a/xen/arch/x86/include/asm/hvm/hvm.h
+++ b/xen/arch/x86/include/asm/hvm/hvm.h
@@ -373,6 +373,9 @@ int hvm_get_param(struct domain *d, uint32_t index, uint64_t *value);
 #define hvm_tsc_scaling_ratio(d) \
     ((d)->arch.hvm.tsc_scaling_ratio)
 
+extern bool assisted_xapic_available;
+extern bool assisted_x2apic_available;
+
 #define hvm_get_guest_time(v) hvm_get_guest_time_fixed(v, 0)
 
 #define hvm_paging_enabled(v) \
@@ -872,6 +875,8 @@ static inline void hvm_set_reg(struct vcpu *v, unsigned int reg, uint64_t val)
 #define hvm_tsc_scaling_supported false
 #define hap_has_1gb false
 #define hap_has_2mb false
+#define assisted_xapic_available false
+#define assisted_x2apic_available false
 
 #define hvm_paging_enabled(v) ((void)(v), false)
 #define hvm_wp_enabled(v) ((void)(v), false)
diff --git a/xen/arch/x86/sysctl.c b/xen/arch/x86/sysctl.c
index f82abc2488..716525f72f 100644
--- a/xen/arch/x86/sysctl.c
+++ b/xen/arch/x86/sysctl.c
@@ -135,6 +135,10 @@ void arch_do_physinfo(struct xen_sysctl_physinfo *pi)
         pi->capabilities |= XEN_SYSCTL_PHYSCAP_hap;
     if ( IS_ENABLED(CONFIG_SHADOW_PAGING) )
         pi->capabilities |= XEN_SYSCTL_PHYSCAP_shadow;
+    if ( assisted_xapic_available )
+        pi->arch_capabilities |= XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC;
+    if ( assisted_x2apic_available )
+        pi->arch_capabilities |= XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC;
 }
 
 long arch_do_sysctl(
diff --git a/xen/include/public/sysctl.h b/xen/include/public/sysctl.h
index 55252e97f2..fbb9912067 100644
--- a/xen/include/public/sysctl.h
+++ b/xen/include/public/sysctl.h
@@ -35,7 +35,7 @@
 #include "domctl.h"
 #include "physdev.h"
 
-#define XEN_SYSCTL_INTERFACE_VERSION 0x00000014
+#define XEN_SYSCTL_INTERFACE_VERSION 0x00000015
 
 /*
  * Read console content from Xen buffer ring.
@@ -111,6 +111,13 @@ struct xen_sysctl_tbuf_op {
 /* Max XEN_SYSCTL_PHYSCAP_* constant.  Used for ABI checking. */
 #define XEN_SYSCTL_PHYSCAP_MAX XEN_SYSCTL_PHYSCAP_gnttab_v2
 
+/* The platform supports x{2}apic hardware assisted emulation. */
+#define XEN_SYSCTL_PHYSCAP_X86_ASSISTED_XAPIC  (1u << 0)
+#define XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC (1u << 1)
+
+/* Max XEN_SYSCTL_PHYSCAP_X86__* constant. Used for ABI checking. */
+#define XEN_SYSCTL_PHYSCAP_X86_MAX XEN_SYSCTL_PHYSCAP_X86_ASSISTED_X2APIC
+
 struct xen_sysctl_physinfo {
     uint32_t threads_per_core;
     uint32_t cores_per_socket;
@@ -120,6 +127,8 @@ struct xen_sysctl_physinfo {
     uint32_t max_node_id; /* Largest possible node ID on this host */
     uint32_t cpu_khz;
     uint32_t capabilities;/* XEN_SYSCTL_PHYSCAP_??? */
+    uint32_t arch_capabilities;/* XEN_SYSCTL_PHYSCAP_{X86,ARM,...}_??? */
+    uint32_t pad;
     uint64_aligned_t total_pages;
     uint64_aligned_t free_pages;
     uint64_aligned_t scrub_pages;
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 09:13:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 09:13:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291112.493922 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUPjA-0000Vw-QA; Wed, 16 Mar 2022 09:13:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291112.493922; Wed, 16 Mar 2022 09:13:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUPjA-0000Vl-MN; Wed, 16 Mar 2022 09:13:56 +0000
Received: by outflank-mailman (input) for mailman id 291112;
 Wed, 16 Mar 2022 09:13:55 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=vd9D=T3=citrix.com=prvs=067d42de6=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nUPj9-0008PI-2G
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 09:13:55 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 65057e98-a509-11ec-8eba-a37418f5ba1a;
 Wed, 16 Mar 2022 10:13:52 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 65057e98-a509-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647422032;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=RLOT1QfgaB7C5/5YGgXslAyIoo8YUPKfbfBK9aOfEIQ=;
  b=R/gyD++CMjkknbNLNSuaS3de6wv6yb/KIYBnbE29ZLStJOA6GkU3YTiZ
   BORBz7dIiGAFD09+3dJSPHSfuXOkMl2Gv7I2pxXKCXXYpEuWGYdsS/H+c
   7xI1RPAACpuUwOvPKwlO4BBfpbuiIAm9E2SefGl0so9+DK/hlGFg7PvlY
   M=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 68731751
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:ghgplKnEXcl11xmAoYYput/o5gxhJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xJJWDiAOqqCN2DxLtlyaoqz8UpSvcfdydE1TgVvqC48QSMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiWl3V4
 7senuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYUlwPH6/Fp/4ncgBbTRpSY6dr0eLrCC3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3mHhmwHf8BPIvRZnFTo3B5MNC3Sd2jcdLdRrbT
 5RJNmE2M0mZC/FJElo0K84jhOj0umPEdj8IrQ2RmIo75HeGmWSd15CyaYGIK7RmX/59hV2Er
 2jL+2D4BBAyN9GFzzeBtHW2iYfnnz7/WY8UPK218LhtmlL77lIUDBoaRF6qu86Tg0S1W89cA
 0EM8y9opq83nGSnR8fwdwe1q3mFulgbQdU4O+818gaW0YLP/h2UQGMDS1ZpeNEg8cM7WzEu/
 luIhM/yQyxitqWPTnCQ/avSqim9UQAKKUcSaClCShEKi/HhqowuihPETv54DbW4yNbyHFnNL
 yui9XZkwe9J1IhSivv9rQuvby+QSobhVVUTxwfeYXifzxp6OrWJOYaFwAX3xKMVRGqGdWWps
 H8BksmYyekBC5CRiSCAKNkw8KGVC+Wta2OF3wM2d3U133H0oiP4I9gMiN1rDB0xWvvobwMFd
 6M6Vel5wJZIdEWnYqZsC25aI5R7lPOwfTgJux29UzavXnSTXFLflM2NTRTJt4wIrKTKufpnU
 Xt8WZzwZUv28Yw9kFKLqx41iNfHPBwWy2LJXozcxB+6y7eYb3P9Ye5bbATUP7pgtvPd+l+9H
 zNj2y2ikEw3vArWOHW/zGLuBQpScShT6W7e9qS7idJv0iI5QTp8Wpc9MJsqepB/nrQ9qws71
 irVZ6Os83Km3SevAVzTMhhLMeqzNb4i/SNTFXF9Zj6Ahil8CbtDGY9CLvPbi5F8r7c9pRO1J
 tFYE/i97gNnEW2WpW5CMcGj8OSPtn2D3GqzAsZsWxBnF7YIeuAD0oWMktfHnMXWMheKiA==
IronPort-HdrOrdr: A9a23:HIZ1ga2opdd2ElyFt8jwdQqjBIgkLtp133Aq2lEZdPRUGvb4qy
 nIpoVi6faUskdpZJhOo6HiBEDtexzhHNtOkO0s1NSZLW/bUQmTXeNfBOLZqlWKcUCTygce79
 YGT0EXMqyKMbEQt6bHCWeDferIuOP3lZyVuQ==
X-IronPort-AV: E=Sophos;i="5.90,186,1643691600"; 
   d="scan'208";a="68731751"
From: Jane Malalane <jane.malalane@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Jane Malalane <jane.malalane@citrix.com>, Wei Liu <wl@xen.org>, "Anthony
 PERARD" <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien Grall
	<julien@xen.org>, "Stefano Stabellini" <sstabellini@kernel.org>, Christian
 Lindig <christian.lindig@citrix.com>, David Scott <dave@recoil.org>,
	"Volodymyr Babchuk" <Volodymyr_Babchuk@epam.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>
Subject: [PATCH v8 2/2] x86/xen: Allow per-domain usage of hardware virtualized APIC
Date: Wed, 16 Mar 2022 09:13:15 +0000
Message-ID: <20220316091315.19281-3-jane.malalane@citrix.com>
X-Mailer: git-send-email 2.11.0
In-Reply-To: <20220316091315.19281-1-jane.malalane@citrix.com>
References: <20220316091315.19281-1-jane.malalane@citrix.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

Introduce a new per-domain creation x86 specific flag to
select whether hardware assisted virtualization should be used for
x{2}APIC.

A per-domain option is added to xl in order to select the usage of
x{2}APIC hardware assisted virtualization, as well as a global
configuration option.

Having all APIC interaction exit to Xen for emulation is slow and can
induce much overhead. Hardware can speed up x{2}APIC by decoding the
APIC access and providing a VM exit with a more specific exit reason
than a regular EPT fault or by altogether avoiding a VM exit.

On the other hand, being able to disable x{2}APIC hardware assisted
virtualization can be useful for testing and debugging purposes.

Note: vmx_install_vlapic_mapping doesn't require modifications
regardless of whether the guest has "Virtualize APIC accesses" enabled
or not, i.e., setting the APIC_ACCESS_ADDR VMCS field is fine so long
as virtualize_apic_accesses is supported by the CPU.

Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Jane Malalane <jane.malalane@citrix.com>
---
CC: Wei Liu <wl@xen.org>
CC: Anthony PERARD <anthony.perard@citrix.com>
CC: Juergen Gross <jgross@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>
CC: George Dunlap <george.dunlap@citrix.com>
CC: Jan Beulich <jbeulich@suse.com>
CC: Julien Grall <julien@xen.org>
CC: Stefano Stabellini <sstabellini@kernel.org>
CC: Christian Lindig <christian.lindig@citrix.com>
CC: David Scott <dave@recoil.org>
CC: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
CC: "Roger Pau Monné" <roger.pau@citrix.com>

v8:
 * Widen assisted_x{2}apic parsing to PVH guests in
   parse_config_data()

v7:
 * Fix void return in libxl__arch_domain_build_info_setdefault
 * Fix style issues
 * Use EINVAL when rejecting assisted_x{2}apic for PV guests and
   ENODEV otherwise, when assisted_x{2}apic isn't supported
 * Define has_assisted_x{2}apic macros for when !CONFIG_HVM
 * Replace "EPT" fault reference with "p2m" fault since the former is
   Intel-specific

v6:
 * Use ENODEV instead of EINVAL when rejecting assisted_x{2}apic
   for PV guests
 * Move has_assisted_x{2}apic macros out of an Intel specific header
 * Remove references to Intel specific features in documentation

v5:
 * Revert v4 changes in vmx_vlapic_msr_changed(), preserving the use of
   the has_assisted_x{2}apic macros
 * Following changes in assisted_x{2}apic_available definitions in
   patch 1, retighten conditionals for setting
   XEN_HVM_CPUID_APIC_ACCESS_VIRT and XEN_HVM_CPUID_X2APIC_VIRT in
   cpuid_hypervisor_leaves()

v4:
 * Add has_assisted_x{2}apic macros and use them where appropriate
 * Replace CPU checks with per-domain assisted_x{2}apic control
   options in vmx_vlapic_msr_changed() and cpuid_hypervisor_leaves(),
   following edits to assisted_x{2}apic_available definitions in
   patch 1
   Note: new assisted_x{2}apic_available definitions make later
   cpu_has_vmx_apic_reg_virt and cpu_has_vmx_virtual_intr_delivery
   checks redundant in vmx_vlapic_msr_changed()

v3:
 * Change info in xl.cfg to better express reality and fix
   capitalization of x{2}apic
 * Move "physinfo" variable definition to the beggining of
   libxl__domain_build_info_setdefault()
 * Reposition brackets in if statement to match libxl coding style
 * Shorten logic in libxl__arch_domain_build_info_setdefault()
 * Correct dprintk message in arch_sanitise_domain_config()
 * Make appropriate changes in vmx_vlapic_msr_changed() and
   cpuid_hypervisor_leaves() for amended "assisted_x2apic" bit
 * Remove unneeded parantheses

v2:
 * Add a LIBXL_HAVE_ASSISTED_APIC macro
 * Pass xcpyshinfo as a pointer in libxl__arch_get_physinfo
 * Add a return statement in now "int"
   libxl__arch_domain_build_info_setdefault()
 * Preserve libxl__arch_domain_build_info_setdefault 's location in
   libxl_create.c
 * Correct x{2}apic default setting logic in
   libxl__arch_domain_prepare_config()
 * Correct logic for parsing assisted_x{2}apic host/guest options in
   xl_parse.c and initialize them to -1 in xl.c
 * Use guest options directly in vmx_vlapic_msr_changed
 * Fix indentation of bool assisted_x{2}apic in struct hvm_domain
 * Add a change in xenctrl_stubs.c to pass xenctrl ABI checks
---
 docs/man/xl.cfg.5.pod.in              | 15 +++++++++++++++
 docs/man/xl.conf.5.pod.in             | 12 ++++++++++++
 tools/golang/xenlight/helpers.gen.go  | 12 ++++++++++++
 tools/golang/xenlight/types.gen.go    |  2 ++
 tools/include/libxl.h                 |  7 +++++++
 tools/libs/light/libxl_arch.h         |  5 +++--
 tools/libs/light/libxl_arm.c          |  9 ++++++---
 tools/libs/light/libxl_create.c       | 22 +++++++++++++---------
 tools/libs/light/libxl_types.idl      |  2 ++
 tools/libs/light/libxl_x86.c          | 28 ++++++++++++++++++++++++++--
 tools/ocaml/libs/xc/xenctrl.ml        |  2 ++
 tools/ocaml/libs/xc/xenctrl.mli       |  2 ++
 tools/ocaml/libs/xc/xenctrl_stubs.c   |  2 +-
 tools/xl/xl.c                         |  8 ++++++++
 tools/xl/xl.h                         |  2 ++
 tools/xl/xl_parse.c                   | 18 ++++++++++++++++++
 xen/arch/x86/domain.c                 | 29 ++++++++++++++++++++++++++++-
 xen/arch/x86/hvm/vmx/vmcs.c           |  4 ++++
 xen/arch/x86/hvm/vmx/vmx.c            | 13 ++++---------
 xen/arch/x86/include/asm/hvm/domain.h |  6 ++++++
 xen/arch/x86/include/asm/hvm/hvm.h    |  5 +++++
 xen/arch/x86/traps.c                  |  5 +++--
 xen/include/public/arch-x86/xen.h     |  2 ++
 23 files changed, 183 insertions(+), 29 deletions(-)

diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in
index b98d161398..6d98d73d76 100644
--- a/docs/man/xl.cfg.5.pod.in
+++ b/docs/man/xl.cfg.5.pod.in
@@ -1862,6 +1862,21 @@ firmware tables when using certain older guest Operating
 Systems. These tables have been superseded by newer constructs within
 the ACPI tables.
 
+=item B<assisted_xapic=BOOLEAN>
+
+B<(x86 only)> Enables or disables hardware assisted virtualization for
+xAPIC. With this option enabled, a memory-mapped APIC access will be
+decoded by hardware and either issue a more specific VM exit than just
+a p2m fault, or altogether avoid a VM exit. The
+default is settable via L<xl.conf(5)>.
+
+=item B<assisted_x2apic=BOOLEAN>
+
+B<(x86 only)> Enables or disables hardware assisted virtualization for
+x2APIC. With this option enabled, certain accesses to MSR APIC
+registers will avoid a VM exit into the hypervisor. The default is
+settable via L<xl.conf(5)>.
+
 =item B<nx=BOOLEAN>
 
 B<(x86 only)> Hides or exposes the No-eXecute capability. This allows a guest
diff --git a/docs/man/xl.conf.5.pod.in b/docs/man/xl.conf.5.pod.in
index df20c08137..95d136d1ea 100644
--- a/docs/man/xl.conf.5.pod.in
+++ b/docs/man/xl.conf.5.pod.in
@@ -107,6 +107,18 @@ Sets the default value for the C<max_grant_version> domain config value.
 
 Default: maximum grant version supported by the hypervisor.
 
+=item B<assisted_xapic=BOOLEAN>
+
+If enabled, domains will use xAPIC hardware assisted virtualization by default.
+
+Default: enabled if supported.
+
+=item B<assisted_x2apic=BOOLEAN>
+
+If enabled, domains will use x2APIC hardware assisted virtualization by default.
+
+Default: enabled if supported.
+
 =item B<vif.default.script="PATH">
 
 Configures the default hotplug script used by virtual network devices.
diff --git a/tools/golang/xenlight/helpers.gen.go b/tools/golang/xenlight/helpers.gen.go
index dd4e6c9f14..dece545ee0 100644
--- a/tools/golang/xenlight/helpers.gen.go
+++ b/tools/golang/xenlight/helpers.gen.go
@@ -1120,6 +1120,12 @@ x.ArchArm.Vuart = VuartType(xc.arch_arm.vuart)
 if err := x.ArchX86.MsrRelaxed.fromC(&xc.arch_x86.msr_relaxed);err != nil {
 return fmt.Errorf("converting field ArchX86.MsrRelaxed: %v", err)
 }
+if err := x.ArchX86.AssistedXapic.fromC(&xc.arch_x86.assisted_xapic);err != nil {
+return fmt.Errorf("converting field ArchX86.AssistedXapic: %v", err)
+}
+if err := x.ArchX86.AssistedX2Apic.fromC(&xc.arch_x86.assisted_x2apic);err != nil {
+return fmt.Errorf("converting field ArchX86.AssistedX2Apic: %v", err)
+}
 x.Altp2M = Altp2MMode(xc.altp2m)
 x.VmtraceBufKb = int(xc.vmtrace_buf_kb)
 if err := x.Vpmu.fromC(&xc.vpmu);err != nil {
@@ -1605,6 +1611,12 @@ xc.arch_arm.vuart = C.libxl_vuart_type(x.ArchArm.Vuart)
 if err := x.ArchX86.MsrRelaxed.toC(&xc.arch_x86.msr_relaxed); err != nil {
 return fmt.Errorf("converting field ArchX86.MsrRelaxed: %v", err)
 }
+if err := x.ArchX86.AssistedXapic.toC(&xc.arch_x86.assisted_xapic); err != nil {
+return fmt.Errorf("converting field ArchX86.AssistedXapic: %v", err)
+}
+if err := x.ArchX86.AssistedX2Apic.toC(&xc.arch_x86.assisted_x2apic); err != nil {
+return fmt.Errorf("converting field ArchX86.AssistedX2Apic: %v", err)
+}
 xc.altp2m = C.libxl_altp2m_mode(x.Altp2M)
 xc.vmtrace_buf_kb = C.int(x.VmtraceBufKb)
 if err := x.Vpmu.toC(&xc.vpmu); err != nil {
diff --git a/tools/golang/xenlight/types.gen.go b/tools/golang/xenlight/types.gen.go
index 87be46c745..253c9ad93d 100644
--- a/tools/golang/xenlight/types.gen.go
+++ b/tools/golang/xenlight/types.gen.go
@@ -520,6 +520,8 @@ Vuart VuartType
 }
 ArchX86 struct {
 MsrRelaxed Defbool
+AssistedXapic Defbool
+AssistedX2Apic Defbool
 }
 Altp2M Altp2MMode
 VmtraceBufKb int
diff --git a/tools/include/libxl.h b/tools/include/libxl.h
index 94e6355822..cdcccd6d01 100644
--- a/tools/include/libxl.h
+++ b/tools/include/libxl.h
@@ -535,6 +535,13 @@
 #define LIBXL_HAVE_PHYSINFO_ASSISTED_APIC 1
 
 /*
+ * LIBXL_HAVE_ASSISTED_APIC indicates that libxl_domain_build_info has
+ * assisted_xapic and assisted_x2apic fields for enabling hardware
+ * assisted virtualization for x{2}apic per domain.
+ */
+#define LIBXL_HAVE_ASSISTED_APIC 1
+
+/*
  * libxl ABI compatibility
  *
  * The only guarantee which libxl makes regarding ABI compatibility
diff --git a/tools/libs/light/libxl_arch.h b/tools/libs/light/libxl_arch.h
index 207ceac6a1..03b89929e6 100644
--- a/tools/libs/light/libxl_arch.h
+++ b/tools/libs/light/libxl_arch.h
@@ -71,8 +71,9 @@ void libxl__arch_domain_create_info_setdefault(libxl__gc *gc,
                                                libxl_domain_create_info *c_info);
 
 _hidden
-void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
-                                              libxl_domain_build_info *b_info);
+int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
+                                             libxl_domain_build_info *b_info,
+                                             const libxl_physinfo *physinfo);
 
 _hidden
 int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
diff --git a/tools/libs/light/libxl_arm.c b/tools/libs/light/libxl_arm.c
index 39fdca1b49..7dee2afd4b 100644
--- a/tools/libs/light/libxl_arm.c
+++ b/tools/libs/light/libxl_arm.c
@@ -1384,14 +1384,15 @@ void libxl__arch_domain_create_info_setdefault(libxl__gc *gc,
     }
 }
 
-void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
-                                              libxl_domain_build_info *b_info)
+int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
+                                             libxl_domain_build_info *b_info,
+                                             const libxl_physinfo *physinfo)
 {
     /* ACPI is disabled by default */
     libxl_defbool_setdefault(&b_info->acpi, false);
 
     if (b_info->type != LIBXL_DOMAIN_TYPE_PV)
-        return;
+        return 0;
 
     LOG(DEBUG, "Converting build_info to PVH");
 
@@ -1399,6 +1400,8 @@ void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
     memset(&b_info->u, '\0', sizeof(b_info->u));
     b_info->type = LIBXL_DOMAIN_TYPE_INVALID;
     libxl_domain_build_info_init_type(b_info, LIBXL_DOMAIN_TYPE_PVH);
+
+    return 0;
 }
 
 int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
diff --git a/tools/libs/light/libxl_create.c b/tools/libs/light/libxl_create.c
index 15ed021f41..88d08d7277 100644
--- a/tools/libs/light/libxl_create.c
+++ b/tools/libs/light/libxl_create.c
@@ -75,6 +75,7 @@ int libxl__domain_build_info_setdefault(libxl__gc *gc,
                                         libxl_domain_build_info *b_info)
 {
     int i, rc;
+    libxl_physinfo info;
 
     if (b_info->type != LIBXL_DOMAIN_TYPE_HVM &&
         b_info->type != LIBXL_DOMAIN_TYPE_PV &&
@@ -264,7 +265,18 @@ int libxl__domain_build_info_setdefault(libxl__gc *gc,
     if (!b_info->event_channels)
         b_info->event_channels = 1023;
 
-    libxl__arch_domain_build_info_setdefault(gc, b_info);
+    rc = libxl_get_physinfo(CTX, &info);
+    if (rc) {
+        LOG(ERROR, "failed to get hypervisor info");
+        return rc;
+    }
+
+    rc = libxl__arch_domain_build_info_setdefault(gc, b_info, &info);
+    if (rc) {
+        LOG(ERROR, "unable to set domain arch build info defaults");
+        return rc;
+    }
+
     libxl_defbool_setdefault(&b_info->dm_restrict, false);
 
     if (b_info->iommu_memkb == LIBXL_MEMKB_DEFAULT)
@@ -457,14 +469,6 @@ int libxl__domain_build_info_setdefault(libxl__gc *gc,
     }
 
     if (b_info->max_grant_version == LIBXL_MAX_GRANT_DEFAULT) {
-        libxl_physinfo info;
-
-        rc = libxl_get_physinfo(CTX, &info);
-        if (rc) {
-            LOG(ERROR, "failed to get hypervisor info");
-            return rc;
-        }
-
         if (info.cap_gnttab_v2)
             b_info->max_grant_version = 2;
         else if (info.cap_gnttab_v1)
diff --git a/tools/libs/light/libxl_types.idl b/tools/libs/light/libxl_types.idl
index 42ac6c357b..db5eb0a0b3 100644
--- a/tools/libs/light/libxl_types.idl
+++ b/tools/libs/light/libxl_types.idl
@@ -648,6 +648,8 @@ libxl_domain_build_info = Struct("domain_build_info",[
                                ("vuart", libxl_vuart_type),
                               ])),
     ("arch_x86", Struct(None, [("msr_relaxed", libxl_defbool),
+                               ("assisted_xapic", libxl_defbool),
+                               ("assisted_x2apic", libxl_defbool),
                               ])),
     # Alternate p2m is not bound to any architecture or guest type, as it is
     # supported by x86 HVM and ARM support is planned.
diff --git a/tools/libs/light/libxl_x86.c b/tools/libs/light/libxl_x86.c
index e0a06ecfe3..46d4de22d1 100644
--- a/tools/libs/light/libxl_x86.c
+++ b/tools/libs/light/libxl_x86.c
@@ -23,6 +23,15 @@ int libxl__arch_domain_prepare_config(libxl__gc *gc,
     if (libxl_defbool_val(d_config->b_info.arch_x86.msr_relaxed))
         config->arch.misc_flags |= XEN_X86_MSR_RELAXED;
 
+    if (d_config->c_info.type != LIBXL_DOMAIN_TYPE_PV)
+    {
+        if (libxl_defbool_val(d_config->b_info.arch_x86.assisted_xapic))
+            config->arch.misc_flags |= XEN_X86_ASSISTED_XAPIC;
+
+        if (libxl_defbool_val(d_config->b_info.arch_x86.assisted_x2apic))
+            config->arch.misc_flags |= XEN_X86_ASSISTED_X2APIC;
+    }
+
     return 0;
 }
 
@@ -819,11 +828,26 @@ void libxl__arch_domain_create_info_setdefault(libxl__gc *gc,
 {
 }
 
-void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
-                                              libxl_domain_build_info *b_info)
+int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
+                                             libxl_domain_build_info *b_info,
+                                             const libxl_physinfo *physinfo)
 {
     libxl_defbool_setdefault(&b_info->acpi, true);
     libxl_defbool_setdefault(&b_info->arch_x86.msr_relaxed, false);
+
+    if (b_info->type != LIBXL_DOMAIN_TYPE_PV) {
+        libxl_defbool_setdefault(&b_info->arch_x86.assisted_xapic,
+                             physinfo->cap_assisted_xapic);
+        libxl_defbool_setdefault(&b_info->arch_x86.assisted_x2apic,
+                             physinfo->cap_assisted_x2apic);
+    }
+    else if (!libxl_defbool_is_default(b_info->arch_x86.assisted_xapic) ||
+             !libxl_defbool_is_default(b_info->arch_x86.assisted_x2apic)) {
+        LOG(ERROR, "Interrupt Controller Virtualization not supported for PV");
+        return ERROR_INVAL;
+    }
+
+    return 0;
 }
 
 int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
diff --git a/tools/ocaml/libs/xc/xenctrl.ml b/tools/ocaml/libs/xc/xenctrl.ml
index 712456e098..32f3028828 100644
--- a/tools/ocaml/libs/xc/xenctrl.ml
+++ b/tools/ocaml/libs/xc/xenctrl.ml
@@ -50,6 +50,8 @@ type x86_arch_emulation_flags =
 
 type x86_arch_misc_flags =
 	| X86_MSR_RELAXED
+	| X86_ASSISTED_XAPIC
+	| X86_ASSISTED_X2APIC
 
 type xen_x86_arch_domainconfig =
 {
diff --git a/tools/ocaml/libs/xc/xenctrl.mli b/tools/ocaml/libs/xc/xenctrl.mli
index b034434f68..d0fcbc8866 100644
--- a/tools/ocaml/libs/xc/xenctrl.mli
+++ b/tools/ocaml/libs/xc/xenctrl.mli
@@ -44,6 +44,8 @@ type x86_arch_emulation_flags =
 
 type x86_arch_misc_flags =
   | X86_MSR_RELAXED
+  | X86_ASSISTED_XAPIC
+  | X86_ASSISTED_X2APIC
 
 type xen_x86_arch_domainconfig = {
   emulation_flags: x86_arch_emulation_flags list;
diff --git a/tools/ocaml/libs/xc/xenctrl_stubs.c b/tools/ocaml/libs/xc/xenctrl_stubs.c
index 7e9c32ad1b..5df8aaa58f 100644
--- a/tools/ocaml/libs/xc/xenctrl_stubs.c
+++ b/tools/ocaml/libs/xc/xenctrl_stubs.c
@@ -239,7 +239,7 @@ CAMLprim value stub_xc_domain_create(value xch, value wanted_domid, value config
 
 		cfg.arch.misc_flags = ocaml_list_to_c_bitmap
 			/* ! x86_arch_misc_flags X86_ none */
-			/* ! XEN_X86_ XEN_X86_MSR_RELAXED all */
+			/* ! XEN_X86_ XEN_X86_ASSISTED_X2APIC max */
 			(VAL_MISC_FLAGS);
 
 #undef VAL_MISC_FLAGS
diff --git a/tools/xl/xl.c b/tools/xl/xl.c
index 2d1ec18ea3..31eb223309 100644
--- a/tools/xl/xl.c
+++ b/tools/xl/xl.c
@@ -57,6 +57,8 @@ int max_grant_frames = -1;
 int max_maptrack_frames = -1;
 int max_grant_version = LIBXL_MAX_GRANT_DEFAULT;
 libxl_domid domid_policy = INVALID_DOMID;
+int assisted_xapic = -1;
+int assisted_x2apic = -1;
 
 xentoollog_level minmsglevel = minmsglevel_default;
 
@@ -201,6 +203,12 @@ static void parse_global_config(const char *configfile,
     if (!xlu_cfg_get_long (config, "claim_mode", &l, 0))
         claim_mode = l;
 
+    if (!xlu_cfg_get_long (config, "assisted_xapic", &l, 0))
+        assisted_xapic = l;
+
+    if (!xlu_cfg_get_long (config, "assisted_x2apic", &l, 0))
+        assisted_x2apic = l;
+
     xlu_cfg_replace_string (config, "remus.default.netbufscript",
         &default_remus_netbufscript, 0);
     xlu_cfg_replace_string (config, "colo.default.proxyscript",
diff --git a/tools/xl/xl.h b/tools/xl/xl.h
index c5c4bedbdd..528deb3feb 100644
--- a/tools/xl/xl.h
+++ b/tools/xl/xl.h
@@ -286,6 +286,8 @@ extern libxl_bitmap global_vm_affinity_mask;
 extern libxl_bitmap global_hvm_affinity_mask;
 extern libxl_bitmap global_pv_affinity_mask;
 extern libxl_domid domid_policy;
+extern int assisted_xapic;
+extern int assisted_x2apic;
 
 enum output_format {
     OUTPUT_FORMAT_JSON,
diff --git a/tools/xl/xl_parse.c b/tools/xl/xl_parse.c
index 117fcdcb2b..f118dc7e97 100644
--- a/tools/xl/xl_parse.c
+++ b/tools/xl/xl_parse.c
@@ -2761,6 +2761,24 @@ skip_usbdev:
 
     xlu_cfg_get_defbool(config, "vpmu", &b_info->vpmu, 0);
 
+    if (b_info->type != LIBXL_DOMAIN_TYPE_PV) {
+        e = xlu_cfg_get_long(config, "assisted_xapic", &l , 0);
+        if ((e == ESRCH && assisted_xapic != -1)) /* use global default if present */
+            libxl_defbool_set(&b_info->arch_x86.assisted_xapic, assisted_xapic);
+        else if (!e)
+            libxl_defbool_set(&b_info->arch_x86.assisted_xapic, l);
+        else
+            exit(1);
+
+        e = xlu_cfg_get_long(config, "assisted_x2apic", &l, 0);
+        if ((e == ESRCH && assisted_x2apic != -1)) /* use global default if present */
+            libxl_defbool_set(&b_info->arch_x86.assisted_x2apic, assisted_x2apic);
+        else if (!e)
+            libxl_defbool_set(&b_info->arch_x86.assisted_x2apic, l);
+        else
+        exit(1);
+    }
+
     xlu_cfg_destroy(config);
 }
 
diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c
index a5048ed654..279936a016 100644
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -50,6 +50,7 @@
 #include <asm/cpuidle.h>
 #include <asm/mpspec.h>
 #include <asm/ldt.h>
+#include <asm/hvm/domain.h>
 #include <asm/hvm/hvm.h>
 #include <asm/hvm/nestedhvm.h>
 #include <asm/hvm/support.h>
@@ -619,6 +620,8 @@ int arch_sanitise_domain_config(struct xen_domctl_createdomain *config)
     bool hvm = config->flags & XEN_DOMCTL_CDF_hvm;
     bool hap = config->flags & XEN_DOMCTL_CDF_hap;
     bool nested_virt = config->flags & XEN_DOMCTL_CDF_nested_virt;
+    bool assisted_xapic = config->arch.misc_flags & XEN_X86_ASSISTED_XAPIC;
+    bool assisted_x2apic = config->arch.misc_flags & XEN_X86_ASSISTED_X2APIC;
     unsigned int max_vcpus;
 
     if ( hvm ? !hvm_enabled : !IS_ENABLED(CONFIG_PV) )
@@ -685,13 +688,31 @@ int arch_sanitise_domain_config(struct xen_domctl_createdomain *config)
         }
     }
 
-    if ( config->arch.misc_flags & ~XEN_X86_MSR_RELAXED )
+    if ( config->arch.misc_flags & ~(XEN_X86_MSR_RELAXED |
+                                     XEN_X86_ASSISTED_XAPIC |
+                                     XEN_X86_ASSISTED_X2APIC) )
     {
         dprintk(XENLOG_INFO, "Invalid arch misc flags %#x\n",
                 config->arch.misc_flags);
         return -EINVAL;
     }
 
+    if ( (assisted_xapic || assisted_x2apic) && !hvm )
+    {
+        dprintk(XENLOG_INFO,
+                "Interrupt Controller Virtualization not supported for PV\n");
+        return -EINVAL;
+    }
+
+    if ( (assisted_xapic && !assisted_xapic_available) ||
+         (assisted_x2apic && !assisted_x2apic_available) )
+    {
+        dprintk(XENLOG_INFO,
+                "Hardware assisted x%sAPIC requested but not available\n",
+                assisted_xapic && !assisted_xapic_available ? "" : "2");
+        return -ENODEV;
+    }
+
     return 0;
 }
 
@@ -864,6 +885,12 @@ int arch_domain_create(struct domain *d,
 
     d->arch.msr_relaxed = config->arch.misc_flags & XEN_X86_MSR_RELAXED;
 
+    d->arch.hvm.assisted_xapic =
+        config->arch.misc_flags & XEN_X86_ASSISTED_XAPIC;
+
+    d->arch.hvm.assisted_x2apic =
+        config->arch.misc_flags & XEN_X86_ASSISTED_X2APIC;
+
     return 0;
 
  fail:
diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
index 77ce0b2121..47c27740d3 100644
--- a/xen/arch/x86/hvm/vmx/vmcs.c
+++ b/xen/arch/x86/hvm/vmx/vmcs.c
@@ -1157,6 +1157,10 @@ static int construct_vmcs(struct vcpu *v)
         __vmwrite(PLE_WINDOW, ple_window);
     }
 
+    if ( !has_assisted_xapic(d) )
+        v->arch.hvm.vmx.secondary_exec_control &=
+            ~SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES;
+
     if ( cpu_has_vmx_secondary_exec_control )
         __vmwrite(SECONDARY_VM_EXEC_CONTROL,
                   v->arch.hvm.vmx.secondary_exec_control);
diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
index c075370f64..949ddd684c 100644
--- a/xen/arch/x86/hvm/vmx/vmx.c
+++ b/xen/arch/x86/hvm/vmx/vmx.c
@@ -3344,16 +3344,11 @@ static void vmx_install_vlapic_mapping(struct vcpu *v)
 
 void vmx_vlapic_msr_changed(struct vcpu *v)
 {
-    int virtualize_x2apic_mode;
     struct vlapic *vlapic = vcpu_vlapic(v);
     unsigned int msr;
 
-    virtualize_x2apic_mode = ( (cpu_has_vmx_apic_reg_virt ||
-                                cpu_has_vmx_virtual_intr_delivery) &&
-                               cpu_has_vmx_virtualize_x2apic_mode );
-
-    if ( !cpu_has_vmx_virtualize_apic_accesses &&
-         !virtualize_x2apic_mode )
+    if ( !has_assisted_xapic(v->domain) &&
+         !has_assisted_x2apic(v->domain) )
         return;
 
     vmx_vmcs_enter(v);
@@ -3363,7 +3358,7 @@ void vmx_vlapic_msr_changed(struct vcpu *v)
     if ( !vlapic_hw_disabled(vlapic) &&
          (vlapic_base_address(vlapic) == APIC_DEFAULT_PHYS_BASE) )
     {
-        if ( virtualize_x2apic_mode && vlapic_x2apic_mode(vlapic) )
+        if ( has_assisted_x2apic(v->domain) && vlapic_x2apic_mode(vlapic) )
         {
             v->arch.hvm.vmx.secondary_exec_control |=
                 SECONDARY_EXEC_VIRTUALIZE_X2APIC_MODE;
@@ -3384,7 +3379,7 @@ void vmx_vlapic_msr_changed(struct vcpu *v)
                 vmx_clear_msr_intercept(v, MSR_X2APIC_SELF, VMX_MSR_W);
             }
         }
-        else
+        else if ( has_assisted_xapic(v->domain) )
             v->arch.hvm.vmx.secondary_exec_control |=
                 SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES;
     }
diff --git a/xen/arch/x86/include/asm/hvm/domain.h b/xen/arch/x86/include/asm/hvm/domain.h
index 698455444e..92bf53483c 100644
--- a/xen/arch/x86/include/asm/hvm/domain.h
+++ b/xen/arch/x86/include/asm/hvm/domain.h
@@ -117,6 +117,12 @@ struct hvm_domain {
 
     bool                   is_s3_suspended;
 
+    /* xAPIC hardware assisted virtualization. */
+    bool                   assisted_xapic;
+
+    /* x2APIC hardware assisted virtualization. */
+    bool                   assisted_x2apic;
+
     /* hypervisor intercepted msix table */
     struct list_head       msixtbl_list;
 
diff --git a/xen/arch/x86/include/asm/hvm/hvm.h b/xen/arch/x86/include/asm/hvm/hvm.h
index e0d9348878..6ecbe22cc9 100644
--- a/xen/arch/x86/include/asm/hvm/hvm.h
+++ b/xen/arch/x86/include/asm/hvm/hvm.h
@@ -376,6 +376,9 @@ int hvm_get_param(struct domain *d, uint32_t index, uint64_t *value);
 extern bool assisted_xapic_available;
 extern bool assisted_x2apic_available;
 
+#define has_assisted_xapic(d) ((d)->arch.hvm.assisted_xapic)
+#define has_assisted_x2apic(d) ((d)->arch.hvm.assisted_x2apic)
+
 #define hvm_get_guest_time(v) hvm_get_guest_time_fixed(v, 0)
 
 #define hvm_paging_enabled(v) \
@@ -878,6 +881,8 @@ static inline void hvm_set_reg(struct vcpu *v, unsigned int reg, uint64_t val)
 #define assisted_xapic_available false
 #define assisted_x2apic_available false
 
+#define has_assisted_xapic(d) ((void)(d), false)
+#define has_assisted_x2apic(d) ((void)(d), false)
 #define hvm_paging_enabled(v) ((void)(v), false)
 #define hvm_wp_enabled(v) ((void)(v), false)
 #define hvm_pcid_enabled(v) ((void)(v), false)
diff --git a/xen/arch/x86/traps.c b/xen/arch/x86/traps.c
index a2278d9499..a8dba88916 100644
--- a/xen/arch/x86/traps.c
+++ b/xen/arch/x86/traps.c
@@ -1121,7 +1121,8 @@ void cpuid_hypervisor_leaves(const struct vcpu *v, uint32_t leaf,
         if ( !is_hvm_domain(d) || subleaf != 0 )
             break;
 
-        if ( cpu_has_vmx_apic_reg_virt )
+        if ( cpu_has_vmx_apic_reg_virt &&
+             has_assisted_xapic(d) )
             res->a |= XEN_HVM_CPUID_APIC_ACCESS_VIRT;
 
         /*
@@ -1130,7 +1131,7 @@ void cpuid_hypervisor_leaves(const struct vcpu *v, uint32_t leaf,
          * and wrmsr in the guest will run without VMEXITs (see
          * vmx_vlapic_msr_changed()).
          */
-        if ( cpu_has_vmx_virtualize_x2apic_mode &&
+        if ( has_assisted_x2apic(d) &&
              cpu_has_vmx_apic_reg_virt &&
              cpu_has_vmx_virtual_intr_delivery )
             res->a |= XEN_HVM_CPUID_X2APIC_VIRT;
diff --git a/xen/include/public/arch-x86/xen.h b/xen/include/public/arch-x86/xen.h
index 7acd94c8eb..9da32c6239 100644
--- a/xen/include/public/arch-x86/xen.h
+++ b/xen/include/public/arch-x86/xen.h
@@ -317,6 +317,8 @@ struct xen_arch_domainconfig {
  * doesn't allow the guest to read or write to the underlying MSR.
  */
 #define XEN_X86_MSR_RELAXED (1u << 0)
+#define XEN_X86_ASSISTED_XAPIC (1u << 1)
+#define XEN_X86_ASSISTED_X2APIC (1u << 2)
     uint32_t misc_flags;
 };
 
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 09:23:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 09:23:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291121.493932 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUPs3-0002g1-UJ; Wed, 16 Mar 2022 09:23:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291121.493932; Wed, 16 Mar 2022 09:23:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUPs3-0002fu-QV; Wed, 16 Mar 2022 09:23:07 +0000
Received: by outflank-mailman (input) for mailman id 291121;
 Wed, 16 Mar 2022 09:23:06 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=/w4J=T3=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nUPs2-0002fo-Q7
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 09:23:06 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id af636a25-a50a-11ec-8eba-a37418f5ba1a;
 Wed, 16 Mar 2022 10:23:05 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 0FF4E1F38C;
 Wed, 16 Mar 2022 09:23:05 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id EC015139FE;
 Wed, 16 Mar 2022 09:23:04 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id zsP+N3isMWJbfQAAMHmgww
 (envelope-from <jgross@suse.com>); Wed, 16 Mar 2022 09:23:04 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: af636a25-a50a-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647422585; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=92IYh2EHXhcp2ghi4d653UoN8re1uPGJeBITLLs/VPw=;
	b=pnR1hlkowJOXArKNT96pSZfDoI8wPrIPU1dlIvnftR2LskICiPLdHb/cdsbixcc+GUVHqz
	qZYPtvc+T2PavNXC1H43tRkXQz3CfmJVt07gFlklfsP99fs3QkXsQEtNAXmavzmrnj02Rb
	Z6N227UEpuEj5O3Z645woXq9h/x8Yzo=
Message-ID: <245b98ef-e0b3-daee-b186-020abbe53b92@suse.com>
Date: Wed, 16 Mar 2022 10:23:04 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] include/public: add command result definitions to
 vscsiif.h
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>
Cc: xen-devel@lists.xenproject.org
References: <20220228112224.18942-1-jgross@suse.com>
 <c489f4f8-c24e-ba73-b33e-b797527d25ac@suse.com>
 <b31ccba4-6a99-9ac6-b50a-a2b32e570a44@suse.com>
 <e836cd5d-b59e-948f-5de2-61766377b27d@suse.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <e836cd5d-b59e-948f-5de2-61766377b27d@suse.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------06cPaq5Ej0NAIMRw4tFitcJI"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------06cPaq5Ej0NAIMRw4tFitcJI
Content-Type: multipart/mixed; boundary="------------SMk0y100lipGo1YQsjzlYZ0n";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Jan Beulich <jbeulich@suse.com>
Cc: xen-devel@lists.xenproject.org
Message-ID: <245b98ef-e0b3-daee-b186-020abbe53b92@suse.com>
Subject: Re: [PATCH] include/public: add command result definitions to
 vscsiif.h
References: <20220228112224.18942-1-jgross@suse.com>
 <c489f4f8-c24e-ba73-b33e-b797527d25ac@suse.com>
 <b31ccba4-6a99-9ac6-b50a-a2b32e570a44@suse.com>
 <e836cd5d-b59e-948f-5de2-61766377b27d@suse.com>
In-Reply-To: <e836cd5d-b59e-948f-5de2-61766377b27d@suse.com>

--------------SMk0y100lipGo1YQsjzlYZ0n
Content-Type: multipart/mixed; boundary="------------ZYqOcLw0W6faGQSxsk48E3fz"

--------------ZYqOcLw0W6faGQSxsk48E3fz
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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==

--------------ZYqOcLw0W6faGQSxsk48E3fz
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------ZYqOcLw0W6faGQSxsk48E3fz--

--------------SMk0y100lipGo1YQsjzlYZ0n--

--------------06cPaq5Ej0NAIMRw4tFitcJI
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIxrHgFAwAAAAAACgkQsN6d1ii/Ey8n
ZAf/aIEzrc5cLTySwrtaiylCLyAbYZcCzAkRXUEBmRnh3rVJQrpcndZP/RiNgdWvoV+J53X/Jofh
fbEGIMcQCe6tk3Q9NcD1veYs7tFQ1XX8p74NouozA7E7EUQsciUfSCvP9TcZxuju0Xg4HsIWgRfz
8HmZVzqznux9pmRFG4d4qrGsoHfxhBUj8eEkKQLDWOLNTzirkm959cI6TPR7XKGIwsmK0IlrlNgb
sNUDDR1gnFGatGb6adxhGhtv5AxMubz5bUr7Ha0f+Any/WoFNA8qYEYelr+q6ti/UhiUgGrbXx8B
efJ7lFyOyux8yKzDthWclMfuYPnmRpBhOa2rtc4dFQ==
=Rntt
-----END PGP SIGNATURE-----

--------------06cPaq5Ej0NAIMRw4tFitcJI--


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 09:53:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 09:53:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291124.493943 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUQL4-0005xV-AC; Wed, 16 Mar 2022 09:53:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291124.493943; Wed, 16 Mar 2022 09:53:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUQL4-0005xO-76; Wed, 16 Mar 2022 09:53:06 +0000
Received: by outflank-mailman (input) for mailman id 291124;
 Wed, 16 Mar 2022 09:53:05 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=VrKn=T3=redhat.com=marcandre.lureau@srs-se1.protection.inumbo.net>)
 id 1nUQL2-0005xF-SX
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 09:53:05 +0000
Received: from us-smtp-delivery-124.mimecast.com
 (us-smtp-delivery-124.mimecast.com [170.10.133.124])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id dd0dfee1-a50e-11ec-8eba-a37418f5ba1a;
 Wed, 16 Mar 2022 10:53:01 +0100 (CET)
Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com
 [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS
 (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 us-mta-362-eMiwzf7yMr-kZSvuTsrX5Q-1; Wed, 16 Mar 2022 05:52:56 -0400
Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.rdu2.redhat.com
 [10.11.54.1])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 2586F801585;
 Wed, 16 Mar 2022 09:52:55 +0000 (UTC)
Received: from localhost (unknown [10.39.208.13])
 by smtp.corp.redhat.com (Postfix) with ESMTP id BDAAC40B42BB;
 Wed, 16 Mar 2022 09:52:51 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: dd0dfee1-a50e-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
	s=mimecast20190719; t=1647424379;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=I73njCNnCVu6pztcu4EGw/yGZZMgbThgSSGf9KeeX7M=;
	b=KKaPElc6Y3AltkZZfv46LNewBioB9+XQIGE0JmbSGZ5JPhkNVYkW7zuB20pN00Sx6609/Z
	onqZ6JBRhCDtifmBym3A1TBcmJuuSCesG4T+NiZmzvP+Zs1CZFRZQGHTYj5oSxCSKohTzI
	94cTmugZA6CbcPUKWsvX8cw+aNTt8H8=
X-MC-Unique: eMiwzf7yMr-kZSvuTsrX5Q-1
From: marcandre.lureau@redhat.com
To: qemu-devel@nongnu.org
Cc: =?UTF-8?q?Marc-Andr=C3=A9=20Lureau?= <marcandre.lureau@redhat.com>,
	Gerd Hoffmann <kraxel@redhat.com>,
	Christian Schoenebeck <qemu_oss@crudebyte.com>,
	=?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Thomas Huth <huth@tuxfamily.org>,
	Stefan Hajnoczi <stefanha@redhat.com>,
	Kevin Wolf <kwolf@redhat.com>,
	Hanna Reitz <hreitz@redhat.com>,
	"Richard W.M. Jones" <rjones@redhat.com>,
	Warner Losh <imp@bsdimp.com>,
	Kyle Evans <kevans@freebsd.org>,
	Greg Kurz <groug@kaod.org>,
	"Michael S. Tsirkin" <mst@redhat.com>,
	Igor Mammedov <imammedo@redhat.com>,
	Ani Sinha <ani@anisinha.ca>,
	Huacai Chen <chenhuacai@kernel.org>,
	Jiaxun Yang <jiaxun.yang@flygoat.com>,
	Aurelien Jarno <aurelien@aurel32.net>,
	Jiri Pirko <jiri@resnulli.us>,
	Jason Wang <jasowang@redhat.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Anthony Perard <anthony.perard@citrix.com>,
	Paul Durrant <paul@xen.org>,
	Paolo Bonzini <pbonzini@redhat.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Yanan Wang <wangyanan55@huawei.com>,
	Markus Armbruster <armbru@redhat.com>,
	Michael Roth <michael.roth@amd.com>,
	=?UTF-8?q?Daniel=20P=2E=20Berrang=C3=A9?= <berrange@redhat.com>,
	"Dr. David Alan Gilbert" <dgilbert@redhat.com>,
	Eric Blake <eblake@redhat.com>,
	Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>,
	Konstantin Kostiuk <kkostiuk@redhat.com>,
	Laurent Vivier <lvivier@redhat.com>,
	qemu-block@nongnu.org (open list:blkverify),
	xen-devel@lists.xenproject.org (open list:X86 Xen CPUs)
Subject: [PATCH 07/27] Replace GCC_FMT_ATTR with G_GNUC_PRINTF
Date: Wed, 16 Mar 2022 13:52:48 +0400
Message-Id: <20220316095248.2613601-1-marcandre.lureau@redhat.com>
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.84 on 10.11.54.1
Authentication-Results: relay.mimecast.com;
	auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=marcandre.lureau@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

From: Marc-André Lureau <marcandre.lureau@redhat.com>

One less qemu-specific macro. It also helps to make some headers/units
only depend on glib, and thus moved in standalone projects eventually.

Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
---
 audio/audio.h                           |  4 +--
 block/qcow2.h                           |  2 +-
 bsd-user/qemu.h                         |  2 +-
 hw/display/qxl.h                        |  2 +-
 hw/net/rocker/rocker.h                  |  2 +-
 hw/xen/xen_pt.h                         |  2 +-
 include/chardev/char-fe.h               |  2 +-
 include/disas/dis-asm.h                 |  2 +-
 include/hw/acpi/aml-build.h             | 12 +++----
 include/hw/core/cpu.h                   |  2 +-
 include/hw/hw.h                         |  2 +-
 include/hw/virtio/virtio.h              |  2 +-
 include/hw/xen/xen-bus-helper.h         |  4 +--
 include/hw/xen/xen-bus.h                |  4 +--
 include/hw/xen/xen_common.h             |  2 +-
 include/hw/xen/xen_pvdev.h              |  2 +-
 include/monitor/monitor.h               |  4 +--
 include/qapi/error.h                    | 20 ++++++------
 include/qapi/qmp/qjson.h                |  8 ++---
 include/qemu/buffer.h                   |  2 +-
 include/qemu/compiler.h                 | 11 ++-----
 include/qemu/error-report.h             | 24 +++++++-------
 include/qemu/log-for-trace.h            |  2 +-
 include/qemu/log.h                      |  2 +-
 include/qemu/qemu-print.h               |  8 ++---
 include/qemu/readline.h                 |  2 +-
 qga/guest-agent-core.h                  |  2 +-
 qga/vss-win32/requester.h               |  2 +-
 scripts/cocci-macro-file.h              |  2 +-
 tests/qtest/libqos/libqtest.h           | 42 ++++++++++++-------------
 tests/qtest/libqtest-single.h           |  2 +-
 tests/qtest/migration-helpers.h         |  6 ++--
 audio/alsaaudio.c                       |  4 +--
 audio/dsoundaudio.c                     |  4 +--
 audio/ossaudio.c                        |  4 +--
 audio/paaudio.c                         |  2 +-
 audio/sdlaudio.c                        |  2 +-
 block/blkverify.c                       |  2 +-
 block/ssh.c                             |  4 +--
 fsdev/9p-marshal.c                      |  2 +-
 fsdev/virtfs-proxy-helper.c             |  2 +-
 hw/9pfs/9p.c                            |  2 +-
 hw/acpi/aml-build.c                     |  4 +--
 hw/mips/fuloong2e.c                     |  2 +-
 hw/mips/malta.c                         |  2 +-
 hw/net/rtl8139.c                        |  2 +-
 hw/virtio/virtio.c                      |  2 +-
 io/channel-websock.c                    |  2 +-
 monitor/hmp.c                           |  4 +--
 nbd/server.c                            | 10 +++---
 qemu-img.c                              |  4 +--
 qemu-io.c                               |  2 +-
 qobject/json-parser.c                   |  2 +-
 softmmu/qtest.c                         |  4 +--
 tests/qtest/libqtest.c                  |  2 +-
 tests/unit/test-qobject-input-visitor.c |  4 +--
 audio/coreaudio.m                       |  4 +--
 scripts/checkpatch.pl                   |  2 +-
 58 files changed, 130 insertions(+), 137 deletions(-)

diff --git a/audio/audio.h b/audio/audio.h
index c8bde536b5cd..cbb10f4816e5 100644
--- a/audio/audio.h
+++ b/audio/audio.h
@@ -91,8 +91,8 @@ typedef struct QEMUAudioTimeStamp {
     uint64_t old_ts;
 } QEMUAudioTimeStamp;
 
-void AUD_vlog (const char *cap, const char *fmt, va_list ap) GCC_FMT_ATTR(2, 0);
-void AUD_log (const char *cap, const char *fmt, ...) GCC_FMT_ATTR(2, 3);
+void AUD_vlog (const char *cap, const char *fmt, va_list ap) G_GNUC_PRINTF(2, 0);
+void AUD_log (const char *cap, const char *fmt, ...) G_GNUC_PRINTF(2, 3);
 
 void AUD_register_card (const char *name, QEMUSoundCard *card);
 void AUD_remove_card (QEMUSoundCard *card);
diff --git a/block/qcow2.h b/block/qcow2.h
index fd48a89d452c..ba436a8d0d68 100644
--- a/block/qcow2.h
+++ b/block/qcow2.h
@@ -838,7 +838,7 @@ int qcow2_update_header(BlockDriverState *bs);
 
 void qcow2_signal_corruption(BlockDriverState *bs, bool fatal, int64_t offset,
                              int64_t size, const char *message_format, ...)
-                             GCC_FMT_ATTR(5, 6);
+                             G_GNUC_PRINTF(5, 6);
 
 int qcow2_validate_table(BlockDriverState *bs, uint64_t offset,
                          uint64_t entries, size_t entry_len,
diff --git a/bsd-user/qemu.h b/bsd-user/qemu.h
index af272c2a802a..21c06f2e7003 100644
--- a/bsd-user/qemu.h
+++ b/bsd-user/qemu.h
@@ -175,7 +175,7 @@ abi_long do_netbsd_syscall(void *cpu_env, int num, abi_long arg1,
 abi_long do_openbsd_syscall(void *cpu_env, int num, abi_long arg1,
                             abi_long arg2, abi_long arg3, abi_long arg4,
                             abi_long arg5, abi_long arg6);
-void gemu_log(const char *fmt, ...) GCC_FMT_ATTR(1, 2);
+void gemu_log(const char *fmt, ...) G_GNUC_PRINTF(1, 2);
 extern __thread CPUState *thread_cpu;
 void cpu_loop(CPUArchState *env);
 char *target_strerror(int err);
diff --git a/hw/display/qxl.h b/hw/display/qxl.h
index 30d21f4d0bdc..e74de9579df3 100644
--- a/hw/display/qxl.h
+++ b/hw/display/qxl.h
@@ -149,7 +149,7 @@ OBJECT_DECLARE_SIMPLE_TYPE(PCIQXLDevice, PCI_QXL)
 /* qxl.c */
 void *qxl_phys2virt(PCIQXLDevice *qxl, QXLPHYSICAL phys, int group_id);
 void qxl_set_guest_bug(PCIQXLDevice *qxl, const char *msg, ...)
-    GCC_FMT_ATTR(2, 3);
+    G_GNUC_PRINTF(2, 3);
 
 void qxl_spice_update_area(PCIQXLDevice *qxl, uint32_t surface_id,
                            struct QXLRect *area, struct QXLRect *dirty_rects,
diff --git a/hw/net/rocker/rocker.h b/hw/net/rocker/rocker.h
index 412fa44d0171..f85354d9d136 100644
--- a/hw/net/rocker/rocker.h
+++ b/hw/net/rocker/rocker.h
@@ -30,7 +30,7 @@
         fprintf(stderr, "%s ROCKER: " fmt, nowstr, ## __VA_ARGS__);\
     } while (0)
 #else
-static inline GCC_FMT_ATTR(1, 2) int DPRINTF(const char *fmt, ...)
+static inline G_GNUC_PRINTF(1, 2) int DPRINTF(const char *fmt, ...)
 {
     return 0;
 }
diff --git a/hw/xen/xen_pt.h b/hw/xen/xen_pt.h
index c74c4678f20d..6b8e13cdeed5 100644
--- a/hw/xen/xen_pt.h
+++ b/hw/xen/xen_pt.h
@@ -9,7 +9,7 @@
 bool xen_igd_gfx_pt_enabled(void);
 void xen_igd_gfx_pt_set(bool value, Error **errp);
 
-void xen_pt_log(const PCIDevice *d, const char *f, ...) GCC_FMT_ATTR(2, 3);
+void xen_pt_log(const PCIDevice *d, const char *f, ...) G_GNUC_PRINTF(2, 3);
 
 #define XEN_PT_ERR(d, _f, _a...) xen_pt_log(d, "%s: Error: "_f, __func__, ##_a)
 
diff --git a/include/chardev/char-fe.h b/include/chardev/char-fe.h
index 867ef1b3b28a..8c420fa36e3c 100644
--- a/include/chardev/char-fe.h
+++ b/include/chardev/char-fe.h
@@ -172,7 +172,7 @@ void qemu_chr_fe_set_open(CharBackend *be, int fe_open);
  * Chardev.
  */
 void qemu_chr_fe_printf(CharBackend *be, const char *fmt, ...)
-    GCC_FMT_ATTR(2, 3);
+    G_GNUC_PRINTF(2, 3);
 
 
 typedef gboolean (*FEWatchFunc)(void *do_not_use, GIOCondition condition, void *data);
diff --git a/include/disas/dis-asm.h b/include/disas/dis-asm.h
index 102a1e7f504e..fadf6a65ef15 100644
--- a/include/disas/dis-asm.h
+++ b/include/disas/dis-asm.h
@@ -269,7 +269,7 @@ typedef struct symbol_cache_entry
 } asymbol;
 
 typedef int (*fprintf_function)(FILE *f, const char *fmt, ...)
-    GCC_FMT_ATTR(2, 3);
+    G_GNUC_PRINTF(2, 3);
 
 enum dis_insn_type {
   dis_noninsn,			/* Not a valid instruction */
diff --git a/include/hw/acpi/aml-build.h b/include/hw/acpi/aml-build.h
index 8346003a224b..d1fb08514bfa 100644
--- a/include/hw/acpi/aml-build.h
+++ b/include/hw/acpi/aml-build.h
@@ -289,7 +289,7 @@ void free_aml_allocator(void);
 void aml_append(Aml *parent_ctx, Aml *child);
 
 /* non block AML object primitives */
-Aml *aml_name(const char *name_format, ...) GCC_FMT_ATTR(1, 2);
+Aml *aml_name(const char *name_format, ...) G_GNUC_PRINTF(1, 2);
 Aml *aml_name_decl(const char *name, Aml *val);
 Aml *aml_debug(void);
 Aml *aml_return(Aml *val);
@@ -344,13 +344,13 @@ Aml *aml_irq_no_flags(uint8_t irq);
 Aml *aml_named_field(const char *name, unsigned length);
 Aml *aml_reserved_field(unsigned length);
 Aml *aml_local(int num);
-Aml *aml_string(const char *name_format, ...) GCC_FMT_ATTR(1, 2);
+Aml *aml_string(const char *name_format, ...) G_GNUC_PRINTF(1, 2);
 Aml *aml_lnot(Aml *arg);
 Aml *aml_equal(Aml *arg1, Aml *arg2);
 Aml *aml_lgreater(Aml *arg1, Aml *arg2);
 Aml *aml_lgreater_equal(Aml *arg1, Aml *arg2);
 Aml *aml_processor(uint8_t proc_id, uint32_t pblk_addr, uint8_t pblk_len,
-                   const char *name_format, ...) GCC_FMT_ATTR(4, 5);
+                   const char *name_format, ...) G_GNUC_PRINTF(4, 5);
 Aml *aml_eisaid(const char *str);
 Aml *aml_word_bus_number(AmlMinFixed min_fixed, AmlMaxFixed max_fixed,
                          AmlDecode dec, uint16_t addr_gran,
@@ -384,8 +384,8 @@ Aml *aml_sleep(uint64_t msec);
 Aml *aml_i2c_serial_bus_device(uint16_t address, const char *resource_source);
 
 /* Block AML object primitives */
-Aml *aml_scope(const char *name_format, ...) GCC_FMT_ATTR(1, 2);
-Aml *aml_device(const char *name_format, ...) GCC_FMT_ATTR(1, 2);
+Aml *aml_scope(const char *name_format, ...) G_GNUC_PRINTF(1, 2);
+Aml *aml_device(const char *name_format, ...) G_GNUC_PRINTF(1, 2);
 Aml *aml_method(const char *name, int arg_count, AmlSerializeFlag sflag);
 Aml *aml_if(Aml *predicate);
 Aml *aml_else(void);
@@ -460,7 +460,7 @@ build_xsdt(GArray *table_data, BIOSLinker *linker, GArray *table_offsets,
 
 int
 build_append_named_dword(GArray *array, const char *name_format, ...)
-GCC_FMT_ATTR(2, 3);
+G_GNUC_PRINTF(2, 3);
 
 void build_append_gas(GArray *table, AmlAddressSpace as,
                       uint8_t bit_width, uint8_t bit_offset,
diff --git a/include/hw/core/cpu.h b/include/hw/core/cpu.h
index 0efc6153ed03..136973655c1a 100644
--- a/include/hw/core/cpu.h
+++ b/include/hw/core/cpu.h
@@ -1016,7 +1016,7 @@ int cpu_watchpoint_address_matches(CPUState *cpu, vaddr addr, vaddr len);
 AddressSpace *cpu_get_address_space(CPUState *cpu, int asidx);
 
 void QEMU_NORETURN cpu_abort(CPUState *cpu, const char *fmt, ...)
-    GCC_FMT_ATTR(2, 3);
+    G_GNUC_PRINTF(2, 3);
 
 /* $(top_srcdir)/cpu.c */
 void cpu_class_init_props(DeviceClass *dc);
diff --git a/include/hw/hw.h b/include/hw/hw.h
index fc5301f29372..34377f5309d3 100644
--- a/include/hw/hw.h
+++ b/include/hw/hw.h
@@ -5,6 +5,6 @@
 #error Cannot include hw/hw.h from user emulation
 #endif
 
-void QEMU_NORETURN hw_error(const char *fmt, ...) GCC_FMT_ATTR(1, 2);
+void QEMU_NORETURN hw_error(const char *fmt, ...) G_GNUC_PRINTF(1, 2);
 
 #endif
diff --git a/include/hw/virtio/virtio.h b/include/hw/virtio/virtio.h
index f095637058dc..b31c4507f5dd 100644
--- a/include/hw/virtio/virtio.h
+++ b/include/hw/virtio/virtio.h
@@ -169,7 +169,7 @@ void virtio_init(VirtIODevice *vdev, const char *name,
                          uint16_t device_id, size_t config_size);
 void virtio_cleanup(VirtIODevice *vdev);
 
-void virtio_error(VirtIODevice *vdev, const char *fmt, ...) GCC_FMT_ATTR(2, 3);
+void virtio_error(VirtIODevice *vdev, const char *fmt, ...) G_GNUC_PRINTF(2, 3);
 
 /* Set the child bus name. */
 void virtio_device_set_child_bus_name(VirtIODevice *vdev, char *bus_name);
diff --git a/include/hw/xen/xen-bus-helper.h b/include/hw/xen/xen-bus-helper.h
index 4c0f747445c2..629a904d1a86 100644
--- a/include/hw/xen/xen-bus-helper.h
+++ b/include/hw/xen/xen-bus-helper.h
@@ -22,11 +22,11 @@ void xs_node_destroy(struct xs_handle *xsh,  xs_transaction_t tid,
 void xs_node_vprintf(struct xs_handle *xsh,  xs_transaction_t tid,
                      const char *node, const char *key, Error **errp,
                      const char *fmt, va_list ap)
-    GCC_FMT_ATTR(6, 0);
+    G_GNUC_PRINTF(6, 0);
 void xs_node_printf(struct xs_handle *xsh,  xs_transaction_t tid,
                     const char *node, const char *key, Error **errp,
                     const char *fmt, ...)
-    GCC_FMT_ATTR(6, 7);
+    G_GNUC_PRINTF(6, 7);
 
 /* Read from node/key unless node is empty, in which case read from key */
 int xs_node_vscanf(struct xs_handle *xsh,  xs_transaction_t tid,
diff --git a/include/hw/xen/xen-bus.h b/include/hw/xen/xen-bus.h
index 6bdbf3ff8220..713e763348f4 100644
--- a/include/hw/xen/xen-bus.h
+++ b/include/hw/xen/xen-bus.h
@@ -88,10 +88,10 @@ enum xenbus_state xen_device_backend_get_state(XenDevice *xendev);
 
 void xen_device_backend_printf(XenDevice *xendev, const char *key,
                                const char *fmt, ...)
-    GCC_FMT_ATTR(3, 4);
+    G_GNUC_PRINTF(3, 4);
 void xen_device_frontend_printf(XenDevice *xendev, const char *key,
                                 const char *fmt, ...)
-    GCC_FMT_ATTR(3, 4);
+    G_GNUC_PRINTF(3, 4);
 
 int xen_device_frontend_scanf(XenDevice *xendev, const char *key,
                               const char *fmt, ...);
diff --git a/include/hw/xen/xen_common.h b/include/hw/xen/xen_common.h
index a8118b41acfb..179741ff791c 100644
--- a/include/hw/xen/xen_common.h
+++ b/include/hw/xen/xen_common.h
@@ -358,7 +358,7 @@ static inline int xen_restrict(domid_t domid)
 void destroy_hvm_domain(bool reboot);
 
 /* shutdown/destroy current domain because of an error */
-void xen_shutdown_fatal_error(const char *fmt, ...) GCC_FMT_ATTR(1, 2);
+void xen_shutdown_fatal_error(const char *fmt, ...) G_GNUC_PRINTF(1, 2);
 
 #ifdef HVM_PARAM_VMPORT_REGS_PFN
 static inline int xen_get_vmport_regs_pfn(xc_interface *xc, domid_t dom,
diff --git a/include/hw/xen/xen_pvdev.h b/include/hw/xen/xen_pvdev.h
index 83e5174d9029..7cd4bc2b8284 100644
--- a/include/hw/xen/xen_pvdev.h
+++ b/include/hw/xen/xen_pvdev.h
@@ -76,6 +76,6 @@ void xen_pv_unbind_evtchn(struct XenLegacyDevice *xendev);
 int xen_pv_send_notify(struct XenLegacyDevice *xendev);
 
 void xen_pv_printf(struct XenLegacyDevice *xendev, int msg_level,
-                   const char *fmt, ...)  GCC_FMT_ATTR(3, 4);
+                   const char *fmt, ...)  G_GNUC_PRINTF(3, 4);
 
 #endif /* QEMU_HW_XEN_PVDEV_H */
diff --git a/include/monitor/monitor.h b/include/monitor/monitor.h
index 12d395d62d6b..cc4cc6c6adcf 100644
--- a/include/monitor/monitor.h
+++ b/include/monitor/monitor.h
@@ -32,8 +32,8 @@ int monitor_get_fd(Monitor *mon, const char *fdname, Error **errp);
 int monitor_fd_param(Monitor *mon, const char *fdname, Error **errp);
 
 int monitor_vprintf(Monitor *mon, const char *fmt, va_list ap)
-    GCC_FMT_ATTR(2, 0);
-int monitor_printf(Monitor *mon, const char *fmt, ...) GCC_FMT_ATTR(2, 3);
+    G_GNUC_PRINTF(2, 0);
+int monitor_printf(Monitor *mon, const char *fmt, ...) G_GNUC_PRINTF(2, 3);
 void monitor_flush(Monitor *mon);
 int monitor_set_cpu(Monitor *mon, int cpu_index);
 int monitor_get_cpu_index(Monitor *mon);
diff --git a/include/qapi/error.h b/include/qapi/error.h
index 4a9260b0cc00..d798faeec3e9 100644
--- a/include/qapi/error.h
+++ b/include/qapi/error.h
@@ -320,7 +320,7 @@ ErrorClass error_get_class(const Error *err);
 void error_setg_internal(Error **errp,
                          const char *src, int line, const char *func,
                          const char *fmt, ...)
-    GCC_FMT_ATTR(5, 6);
+    G_GNUC_PRINTF(5, 6);
 
 /*
  * Just like error_setg(), with @os_error info added to the message.
@@ -336,7 +336,7 @@ void error_setg_internal(Error **errp,
 void error_setg_errno_internal(Error **errp,
                                const char *fname, int line, const char *func,
                                int os_error, const char *fmt, ...)
-    GCC_FMT_ATTR(6, 7);
+    G_GNUC_PRINTF(6, 7);
 
 #ifdef _WIN32
 /*
@@ -350,7 +350,7 @@ void error_setg_errno_internal(Error **errp,
 void error_setg_win32_internal(Error **errp,
                                const char *src, int line, const char *func,
                                int win32_err, const char *fmt, ...)
-    GCC_FMT_ATTR(6, 7);
+    G_GNUC_PRINTF(6, 7);
 #endif
 
 /*
@@ -383,21 +383,21 @@ void error_propagate(Error **dst_errp, Error *local_err);
  */
 void error_propagate_prepend(Error **dst_errp, Error *local_err,
                              const char *fmt, ...)
-    GCC_FMT_ATTR(3, 4);
+    G_GNUC_PRINTF(3, 4);
 
 /*
  * Prepend some text to @errp's human-readable error message.
  * The text is made by formatting @fmt, @ap like vprintf().
  */
 void error_vprepend(Error *const *errp, const char *fmt, va_list ap)
-    GCC_FMT_ATTR(2, 0);
+    G_GNUC_PRINTF(2, 0);
 
 /*
  * Prepend some text to @errp's human-readable error message.
  * The text is made by formatting @fmt, ... like printf().
  */
 void error_prepend(Error *const *errp, const char *fmt, ...)
-    GCC_FMT_ATTR(2, 3);
+    G_GNUC_PRINTF(2, 3);
 
 /*
  * Append a printf-style human-readable explanation to an existing error.
@@ -414,7 +414,7 @@ void error_prepend(Error *const *errp, const char *fmt, ...)
  * newline.
  */
 void error_append_hint(Error *const *errp, const char *fmt, ...)
-    GCC_FMT_ATTR(2, 3);
+    G_GNUC_PRINTF(2, 3);
 
 /*
  * Convenience function to report open() failure.
@@ -458,13 +458,13 @@ void error_report_err(Error *err);
  * Convenience function to error_prepend(), warn_report() and free @err.
  */
 void warn_reportf_err(Error *err, const char *fmt, ...)
-    GCC_FMT_ATTR(2, 3);
+    G_GNUC_PRINTF(2, 3);
 
 /*
  * Convenience function to error_prepend(), error_report() and free @err.
  */
 void error_reportf_err(Error *err, const char *fmt, ...)
-    GCC_FMT_ATTR(2, 3);
+    G_GNUC_PRINTF(2, 3);
 
 /*
  * Just like error_setg(), except you get to specify the error class.
@@ -477,7 +477,7 @@ void error_reportf_err(Error *err, const char *fmt, ...)
 void error_set_internal(Error **errp,
                         const char *src, int line, const char *func,
                         ErrorClass err_class, const char *fmt, ...)
-    GCC_FMT_ATTR(6, 7);
+    G_GNUC_PRINTF(6, 7);
 
 /*
  * Make @errp parameter easier to use regardless of argument value
diff --git a/include/qapi/qmp/qjson.h b/include/qapi/qmp/qjson.h
index 593b40b4e0a4..7bd8d2de1b33 100644
--- a/include/qapi/qmp/qjson.h
+++ b/include/qapi/qmp/qjson.h
@@ -17,13 +17,13 @@
 QObject *qobject_from_json(const char *string, Error **errp);
 
 QObject *qobject_from_vjsonf_nofail(const char *string, va_list ap)
-    GCC_FMT_ATTR(1, 0);
+    G_GNUC_PRINTF(1, 0);
 QObject *qobject_from_jsonf_nofail(const char *string, ...)
-    GCC_FMT_ATTR(1, 2);
+    G_GNUC_PRINTF(1, 2);
 QDict *qdict_from_vjsonf_nofail(const char *string, va_list ap)
-    GCC_FMT_ATTR(1, 0);
+    G_GNUC_PRINTF(1, 0);
 QDict *qdict_from_jsonf_nofail(const char *string, ...)
-    GCC_FMT_ATTR(1, 2);
+    G_GNUC_PRINTF(1, 2);
 
 GString *qobject_to_json(const QObject *obj);
 GString *qobject_to_json_pretty(const QObject *obj, bool pretty);
diff --git a/include/qemu/buffer.h b/include/qemu/buffer.h
index d34d2c857ccc..e95dfd696ca8 100644
--- a/include/qemu/buffer.h
+++ b/include/qemu/buffer.h
@@ -49,7 +49,7 @@ struct Buffer {
  * to identify in debug traces.
  */
 void buffer_init(Buffer *buffer, const char *name, ...)
-        GCC_FMT_ATTR(2, 3);
+        G_GNUC_PRINTF(2, 3);
 
 /**
  * buffer_shrink:
diff --git a/include/qemu/compiler.h b/include/qemu/compiler.h
index 3baa5e3790f7..f2bd050e3b9a 100644
--- a/include/qemu/compiler.h
+++ b/include/qemu/compiler.h
@@ -79,19 +79,12 @@
 #define QEMU_BUILD_BUG_ON_ZERO(x) (sizeof(QEMU_BUILD_BUG_ON_STRUCT(x)) - \
                                    sizeof(QEMU_BUILD_BUG_ON_STRUCT(x)))
 
-#if defined(__clang__)
-/* clang doesn't support gnu_printf, so use printf. */
-# define GCC_FMT_ATTR(n, m) __attribute__((format(printf, n, m)))
-#else
-/* Use gnu_printf (qemu uses standard format strings). */
-# define GCC_FMT_ATTR(n, m) __attribute__((format(gnu_printf, n, m)))
-# if defined(_WIN32)
+#if !defined(__clang__) && defined(_WIN32)
 /*
  * Map __printf__ to __gnu_printf__ because we want standard format strings even
  * when MinGW or GLib include files use __printf__.
  */
-#  define __printf__ __gnu_printf__
-# endif
+# define __printf__ __gnu_printf__
 #endif
 
 #ifndef __has_warning
diff --git a/include/qemu/error-report.h b/include/qemu/error-report.h
index 9d197daca387..33e662db44c6 100644
--- a/include/qemu/error-report.h
+++ b/include/qemu/error-report.h
@@ -30,23 +30,23 @@ void loc_set_none(void);
 void loc_set_cmdline(char **argv, int idx, int cnt);
 void loc_set_file(const char *fname, int lno);
 
-int error_vprintf(const char *fmt, va_list ap) GCC_FMT_ATTR(1, 0);
-int error_printf(const char *fmt, ...) GCC_FMT_ATTR(1, 2);
-int error_vprintf_unless_qmp(const char *fmt, va_list ap) GCC_FMT_ATTR(1, 0);
-int error_printf_unless_qmp(const char *fmt, ...) GCC_FMT_ATTR(1, 2);
+int error_vprintf(const char *fmt, va_list ap) G_GNUC_PRINTF(1, 0);
+int error_printf(const char *fmt, ...) G_GNUC_PRINTF(1, 2);
+int error_vprintf_unless_qmp(const char *fmt, va_list ap) G_GNUC_PRINTF(1, 0);
+int error_printf_unless_qmp(const char *fmt, ...) G_GNUC_PRINTF(1, 2);
 
-void error_vreport(const char *fmt, va_list ap) GCC_FMT_ATTR(1, 0);
-void warn_vreport(const char *fmt, va_list ap) GCC_FMT_ATTR(1, 0);
-void info_vreport(const char *fmt, va_list ap) GCC_FMT_ATTR(1, 0);
+void error_vreport(const char *fmt, va_list ap) G_GNUC_PRINTF(1, 0);
+void warn_vreport(const char *fmt, va_list ap) G_GNUC_PRINTF(1, 0);
+void info_vreport(const char *fmt, va_list ap) G_GNUC_PRINTF(1, 0);
 
-void error_report(const char *fmt, ...) GCC_FMT_ATTR(1, 2);
-void warn_report(const char *fmt, ...) GCC_FMT_ATTR(1, 2);
-void info_report(const char *fmt, ...) GCC_FMT_ATTR(1, 2);
+void error_report(const char *fmt, ...) G_GNUC_PRINTF(1, 2);
+void warn_report(const char *fmt, ...) G_GNUC_PRINTF(1, 2);
+void info_report(const char *fmt, ...) G_GNUC_PRINTF(1, 2);
 
 bool error_report_once_cond(bool *printed, const char *fmt, ...)
-    GCC_FMT_ATTR(2, 3);
+    G_GNUC_PRINTF(2, 3);
 bool warn_report_once_cond(bool *printed, const char *fmt, ...)
-    GCC_FMT_ATTR(2, 3);
+    G_GNUC_PRINTF(2, 3);
 
 void error_init(const char *argv0);
 
diff --git a/include/qemu/log-for-trace.h b/include/qemu/log-for-trace.h
index 2f0a5b080eab..5e415172278a 100644
--- a/include/qemu/log-for-trace.h
+++ b/include/qemu/log-for-trace.h
@@ -30,6 +30,6 @@ static inline bool qemu_loglevel_mask(int mask)
 }
 
 /* main logging function */
-int GCC_FMT_ATTR(1, 2) qemu_log(const char *fmt, ...);
+int G_GNUC_PRINTF(1, 2) qemu_log(const char *fmt, ...);
 
 #endif
diff --git a/include/qemu/log.h b/include/qemu/log.h
index 9b8066020729..5739c7e6d819 100644
--- a/include/qemu/log.h
+++ b/include/qemu/log.h
@@ -96,7 +96,7 @@ static inline void qemu_log_unlock(FILE *fd)
 
 /* vfprintf-like logging function
  */
-static inline void GCC_FMT_ATTR(1, 0)
+static inline void G_GNUC_PRINTF(1, 0)
 qemu_log_vprintf(const char *fmt, va_list va)
 {
     QemuLogFile *logfile;
diff --git a/include/qemu/qemu-print.h b/include/qemu/qemu-print.h
index 40b596262fae..1b70920648b8 100644
--- a/include/qemu/qemu-print.h
+++ b/include/qemu/qemu-print.h
@@ -13,11 +13,11 @@
 #ifndef QEMU_PRINT_H
 #define QEMU_PRINT_H
 
-int qemu_vprintf(const char *fmt, va_list ap) GCC_FMT_ATTR(1, 0);
-int qemu_printf(const char *fmt, ...) GCC_FMT_ATTR(1, 2);
+int qemu_vprintf(const char *fmt, va_list ap) G_GNUC_PRINTF(1, 0);
+int qemu_printf(const char *fmt, ...) G_GNUC_PRINTF(1, 2);
 
 int qemu_vfprintf(FILE *stream, const char *fmt, va_list ap)
-    GCC_FMT_ATTR(2, 0);
-int qemu_fprintf(FILE *stream, const char *fmt, ...) GCC_FMT_ATTR(2, 3);
+    G_GNUC_PRINTF(2, 0);
+int qemu_fprintf(FILE *stream, const char *fmt, ...) G_GNUC_PRINTF(2, 3);
 
 #endif
diff --git a/include/qemu/readline.h b/include/qemu/readline.h
index e81258322be6..622aa4564f67 100644
--- a/include/qemu/readline.h
+++ b/include/qemu/readline.h
@@ -5,7 +5,7 @@
 #define READLINE_MAX_CMDS 64
 #define READLINE_MAX_COMPLETIONS 256
 
-typedef void GCC_FMT_ATTR(2, 3) ReadLinePrintfFunc(void *opaque,
+typedef void G_GNUC_PRINTF(2, 3) ReadLinePrintfFunc(void *opaque,
                                                    const char *fmt, ...);
 typedef void ReadLineFlushFunc(void *opaque);
 typedef void ReadLineFunc(void *opaque, const char *str,
diff --git a/qga/guest-agent-core.h b/qga/guest-agent-core.h
index 9d01ea9c82ab..29cd50402fdb 100644
--- a/qga/guest-agent-core.h
+++ b/qga/guest-agent-core.h
@@ -36,7 +36,7 @@ void ga_command_state_free(GACommandState *cs);
 bool ga_logging_enabled(GAState *s);
 void ga_disable_logging(GAState *s);
 void ga_enable_logging(GAState *s);
-void GCC_FMT_ATTR(1, 2) slog(const gchar *fmt, ...);
+void G_GNUC_PRINTF(1, 2) slog(const gchar *fmt, ...);
 void ga_set_response_delimited(GAState *s);
 bool ga_is_frozen(GAState *s);
 void ga_set_frozen(GAState *s);
diff --git a/qga/vss-win32/requester.h b/qga/vss-win32/requester.h
index 5a8e8faf0cea..ecc5f2acb4fd 100644
--- a/qga/vss-win32/requester.h
+++ b/qga/vss-win32/requester.h
@@ -25,7 +25,7 @@ struct Error;
 typedef void (*ErrorSetFunc)(struct Error **errp,
                              const char *src, int line, const char *func,
                              int win32_err, const char *fmt, ...)
-    GCC_FMT_ATTR(6, 7);
+    G_GNUC_PRINTF(6, 7);
 typedef struct ErrorSet {
     ErrorSetFunc error_setg_win32_wrapper;
     struct Error **errp;        /* restriction: must not be null */
diff --git a/scripts/cocci-macro-file.h b/scripts/cocci-macro-file.h
index 20eea6b708f5..c2fcea8e77a2 100644
--- a/scripts/cocci-macro-file.h
+++ b/scripts/cocci-macro-file.h
@@ -34,7 +34,7 @@
 #define QEMU_BUILD_BUG_ON(x) \
     typedef char cat2(qemu_build_bug_on__,__LINE__)[(x)?-1:1] __attribute__((unused));
 
-#define GCC_FMT_ATTR(n, m) __attribute__((format(gnu_printf, n, m)))
+#define G_GNUC_PRINTF(n, m) __attribute__((format(gnu_printf, n, m)))
 
 #define xglue(x, y) x ## y
 #define glue(x, y) xglue(x, y)
diff --git a/tests/qtest/libqos/libqtest.h b/tests/qtest/libqos/libqtest.h
index cf38d273f5c0..552667f17e37 100644
--- a/tests/qtest/libqos/libqtest.h
+++ b/tests/qtest/libqos/libqtest.h
@@ -31,7 +31,7 @@ typedef struct QTestState QTestState;
  *
  * Returns: #QTestState instance.
  */
-QTestState *qtest_initf(const char *fmt, ...) GCC_FMT_ATTR(1, 2);
+QTestState *qtest_initf(const char *fmt, ...) G_GNUC_PRINTF(1, 2);
 
 /**
  * qtest_vinitf:
@@ -43,7 +43,7 @@ QTestState *qtest_initf(const char *fmt, ...) GCC_FMT_ATTR(1, 2);
  *
  * Returns: #QTestState instance.
  */
-QTestState *qtest_vinitf(const char *fmt, va_list ap) GCC_FMT_ATTR(1, 0);
+QTestState *qtest_vinitf(const char *fmt, va_list ap) G_GNUC_PRINTF(1, 0);
 
 /**
  * qtest_init:
@@ -106,7 +106,7 @@ void qtest_quit(QTestState *s);
  */
 QDict *qtest_qmp_fds(QTestState *s, int *fds, size_t fds_num,
                      const char *fmt, ...)
-    GCC_FMT_ATTR(4, 5);
+    G_GNUC_PRINTF(4, 5);
 
 /**
  * qtest_qmp:
@@ -118,7 +118,7 @@ QDict *qtest_qmp_fds(QTestState *s, int *fds, size_t fds_num,
  * Sends a QMP message to QEMU and returns the response.
  */
 QDict *qtest_qmp(QTestState *s, const char *fmt, ...)
-    GCC_FMT_ATTR(2, 3);
+    G_GNUC_PRINTF(2, 3);
 
 /**
  * qtest_qmp_send:
@@ -130,7 +130,7 @@ QDict *qtest_qmp(QTestState *s, const char *fmt, ...)
  * Sends a QMP message to QEMU and leaves the response in the stream.
  */
 void qtest_qmp_send(QTestState *s, const char *fmt, ...)
-    GCC_FMT_ATTR(2, 3);
+    G_GNUC_PRINTF(2, 3);
 
 /**
  * qtest_qmp_send_raw:
@@ -141,7 +141,7 @@ void qtest_qmp_send(QTestState *s, const char *fmt, ...)
  * this is useful for negative tests.
  */
 void qtest_qmp_send_raw(QTestState *s, const char *fmt, ...)
-    GCC_FMT_ATTR(2, 3);
+    G_GNUC_PRINTF(2, 3);
 
 /**
  * qtest_socket_server:
@@ -165,7 +165,7 @@ int qtest_socket_server(const char *socket_path);
  */
 QDict *qtest_vqmp_fds(QTestState *s, int *fds, size_t fds_num,
                       const char *fmt, va_list ap)
-    GCC_FMT_ATTR(4, 0);
+    G_GNUC_PRINTF(4, 0);
 
 /**
  * qtest_vqmp:
@@ -178,7 +178,7 @@ QDict *qtest_vqmp_fds(QTestState *s, int *fds, size_t fds_num,
  * Sends a QMP message to QEMU and returns the response.
  */
 QDict *qtest_vqmp(QTestState *s, const char *fmt, va_list ap)
-    GCC_FMT_ATTR(2, 0);
+    G_GNUC_PRINTF(2, 0);
 
 /**
  * qtest_qmp_vsend_fds:
@@ -194,7 +194,7 @@ QDict *qtest_vqmp(QTestState *s, const char *fmt, va_list ap)
  */
 void qtest_qmp_vsend_fds(QTestState *s, int *fds, size_t fds_num,
                          const char *fmt, va_list ap)
-    GCC_FMT_ATTR(4, 0);
+    G_GNUC_PRINTF(4, 0);
 
 /**
  * qtest_qmp_vsend:
@@ -207,7 +207,7 @@ void qtest_qmp_vsend_fds(QTestState *s, int *fds, size_t fds_num,
  * Sends a QMP message to QEMU and leaves the response in the stream.
  */
 void qtest_qmp_vsend(QTestState *s, const char *fmt, va_list ap)
-    GCC_FMT_ATTR(2, 0);
+    G_GNUC_PRINTF(2, 0);
 
 /**
  * qtest_qmp_receive_dict:
@@ -269,7 +269,7 @@ QDict *qtest_qmp_event_ref(QTestState *s, const char *event);
  *
  * Returns: the command's output.  The caller should g_free() it.
  */
-char *qtest_hmp(QTestState *s, const char *fmt, ...) GCC_FMT_ATTR(2, 3);
+char *qtest_hmp(QTestState *s, const char *fmt, ...) G_GNUC_PRINTF(2, 3);
 
 /**
  * qtest_hmpv:
@@ -283,7 +283,7 @@ char *qtest_hmp(QTestState *s, const char *fmt, ...) GCC_FMT_ATTR(2, 3);
  * Returns: the command's output.  The caller should g_free() it.
  */
 char *qtest_vhmp(QTestState *s, const char *fmt, va_list ap)
-    GCC_FMT_ATTR(2, 0);
+    G_GNUC_PRINTF(2, 0);
 
 void qtest_module_load(QTestState *s, const char *prefix, const char *libname);
 
@@ -688,17 +688,17 @@ void qtest_remove_abrt_handler(void *data);
  * the response.
  */
 void qtest_qmp_assert_success(QTestState *qts, const char *fmt, ...)
-    GCC_FMT_ATTR(2, 3);
+    G_GNUC_PRINTF(2, 3);
 
 QDict *qmp_fd_receive(int fd);
 void qmp_fd_vsend_fds(int fd, int *fds, size_t fds_num,
-                      const char *fmt, va_list ap) GCC_FMT_ATTR(4, 0);
-void qmp_fd_vsend(int fd, const char *fmt, va_list ap) GCC_FMT_ATTR(2, 0);
-void qmp_fd_send(int fd, const char *fmt, ...) GCC_FMT_ATTR(2, 3);
-void qmp_fd_send_raw(int fd, const char *fmt, ...) GCC_FMT_ATTR(2, 3);
-void qmp_fd_vsend_raw(int fd, const char *fmt, va_list ap) GCC_FMT_ATTR(2, 0);
-QDict *qmp_fdv(int fd, const char *fmt, va_list ap) GCC_FMT_ATTR(2, 0);
-QDict *qmp_fd(int fd, const char *fmt, ...) GCC_FMT_ATTR(2, 3);
+                      const char *fmt, va_list ap) G_GNUC_PRINTF(4, 0);
+void qmp_fd_vsend(int fd, const char *fmt, va_list ap) G_GNUC_PRINTF(2, 0);
+void qmp_fd_send(int fd, const char *fmt, ...) G_GNUC_PRINTF(2, 3);
+void qmp_fd_send_raw(int fd, const char *fmt, ...) G_GNUC_PRINTF(2, 3);
+void qmp_fd_vsend_raw(int fd, const char *fmt, va_list ap) G_GNUC_PRINTF(2, 0);
+QDict *qmp_fdv(int fd, const char *fmt, va_list ap) G_GNUC_PRINTF(2, 0);
+QDict *qmp_fd(int fd, const char *fmt, ...) G_GNUC_PRINTF(2, 3);
 
 /**
  * qtest_cb_for_every_machine:
@@ -750,7 +750,7 @@ void qtest_qmp_device_add_qdict(QTestState *qts, const char *drv,
  * Generic hot-plugging test via the device_add QMP command.
  */
 void qtest_qmp_device_add(QTestState *qts, const char *driver, const char *id,
-                          const char *fmt, ...) GCC_FMT_ATTR(4, 5);
+                          const char *fmt, ...) G_GNUC_PRINTF(4, 5);
 
 /**
  * qtest_qmp_add_client:
diff --git a/tests/qtest/libqtest-single.h b/tests/qtest/libqtest-single.h
index 0d7f568678e5..b0838b9e0e71 100644
--- a/tests/qtest/libqtest-single.h
+++ b/tests/qtest/libqtest-single.h
@@ -52,7 +52,7 @@ static inline void qtest_end(void)
  *
  * Sends a QMP message to QEMU and returns the response.
  */
-GCC_FMT_ATTR(1, 2)
+G_GNUC_PRINTF(1, 2)
 static inline QDict *qmp(const char *fmt, ...)
 {
     va_list ap;
diff --git a/tests/qtest/migration-helpers.h b/tests/qtest/migration-helpers.h
index d63bba9630f9..555adafce129 100644
--- a/tests/qtest/migration-helpers.h
+++ b/tests/qtest/migration-helpers.h
@@ -16,13 +16,13 @@
 
 extern bool got_stop;
 
-GCC_FMT_ATTR(3, 4)
+G_GNUC_PRINTF(3, 4)
 QDict *wait_command_fd(QTestState *who, int fd, const char *command, ...);
 
-GCC_FMT_ATTR(2, 3)
+G_GNUC_PRINTF(2, 3)
 QDict *wait_command(QTestState *who, const char *command, ...);
 
-GCC_FMT_ATTR(3, 4)
+G_GNUC_PRINTF(3, 4)
 void migrate_qmp(QTestState *who, const char *uri, const char *fmt, ...);
 
 QDict *migrate_query(QTestState *who);
diff --git a/audio/alsaaudio.c b/audio/alsaaudio.c
index b04716a6cc21..4a61378cd757 100644
--- a/audio/alsaaudio.c
+++ b/audio/alsaaudio.c
@@ -72,7 +72,7 @@ struct alsa_params_obt {
     snd_pcm_uframes_t samples;
 };
 
-static void GCC_FMT_ATTR (2, 3) alsa_logerr (int err, const char *fmt, ...)
+static void G_GNUC_PRINTF (2, 3) alsa_logerr (int err, const char *fmt, ...)
 {
     va_list ap;
 
@@ -83,7 +83,7 @@ static void GCC_FMT_ATTR (2, 3) alsa_logerr (int err, const char *fmt, ...)
     AUD_log (AUDIO_CAP, "Reason: %s\n", snd_strerror (err));
 }
 
-static void GCC_FMT_ATTR (3, 4) alsa_logerr2 (
+static void G_GNUC_PRINTF (3, 4) alsa_logerr2 (
     int err,
     const char *typ,
     const char *fmt,
diff --git a/audio/dsoundaudio.c b/audio/dsoundaudio.c
index 231f3e65b3c8..d5bb0d9f51c6 100644
--- a/audio/dsoundaudio.c
+++ b/audio/dsoundaudio.c
@@ -222,7 +222,7 @@ static void dsound_log_hresult (HRESULT hr)
     AUD_log (AUDIO_CAP, "Reason: %s\n", str);
 }
 
-static void GCC_FMT_ATTR (2, 3) dsound_logerr (
+static void G_GNUC_PRINTF (2, 3) dsound_logerr (
     HRESULT hr,
     const char *fmt,
     ...
@@ -237,7 +237,7 @@ static void GCC_FMT_ATTR (2, 3) dsound_logerr (
     dsound_log_hresult (hr);
 }
 
-static void GCC_FMT_ATTR (3, 4) dsound_logerr2 (
+static void G_GNUC_PRINTF (3, 4) dsound_logerr2 (
     HRESULT hr,
     const char *typ,
     const char *fmt,
diff --git a/audio/ossaudio.c b/audio/ossaudio.c
index da9c232222e3..8e075edb70d6 100644
--- a/audio/ossaudio.c
+++ b/audio/ossaudio.c
@@ -63,7 +63,7 @@ struct oss_params {
     int fragsize;
 };
 
-static void GCC_FMT_ATTR (2, 3) oss_logerr (int err, const char *fmt, ...)
+static void G_GNUC_PRINTF (2, 3) oss_logerr (int err, const char *fmt, ...)
 {
     va_list ap;
 
@@ -74,7 +74,7 @@ static void GCC_FMT_ATTR (2, 3) oss_logerr (int err, const char *fmt, ...)
     AUD_log (AUDIO_CAP, "Reason: %s\n", strerror (err));
 }
 
-static void GCC_FMT_ATTR (3, 4) oss_logerr2 (
+static void G_GNUC_PRINTF (3, 4) oss_logerr2 (
     int err,
     const char *typ,
     const char *fmt,
diff --git a/audio/paaudio.c b/audio/paaudio.c
index a53ed85e0b82..b7c6a1266b96 100644
--- a/audio/paaudio.c
+++ b/audio/paaudio.c
@@ -43,7 +43,7 @@ typedef struct {
 
 static void qpa_conn_fini(PAConnection *c);
 
-static void GCC_FMT_ATTR (2, 3) qpa_logerr (int err, const char *fmt, ...)
+static void G_GNUC_PRINTF (2, 3) qpa_logerr (int err, const char *fmt, ...)
 {
     va_list ap;
 
diff --git a/audio/sdlaudio.c b/audio/sdlaudio.c
index 797b47bbddb1..68a237b76b45 100644
--- a/audio/sdlaudio.c
+++ b/audio/sdlaudio.c
@@ -55,7 +55,7 @@ typedef struct SDLVoiceIn {
     SDL_AudioDeviceID devid;
 } SDLVoiceIn;
 
-static void GCC_FMT_ATTR (1, 2) sdl_logerr (const char *fmt, ...)
+static void G_GNUC_PRINTF (1, 2) sdl_logerr (const char *fmt, ...)
 {
     va_list ap;
 
diff --git a/block/blkverify.c b/block/blkverify.c
index 53ba1c919572..e4a37af3b2ef 100644
--- a/block/blkverify.c
+++ b/block/blkverify.c
@@ -44,7 +44,7 @@ typedef struct BlkverifyRequest {
     QEMUIOVector *raw_qiov;     /* cloned I/O vector for raw file */
 } BlkverifyRequest;
 
-static void GCC_FMT_ATTR(2, 3) blkverify_err(BlkverifyRequest *r,
+static void G_GNUC_PRINTF(2, 3) blkverify_err(BlkverifyRequest *r,
                                              const char *fmt, ...)
 {
     va_list ap;
diff --git a/block/ssh.c b/block/ssh.c
index a64db146dbdc..a2dc64653699 100644
--- a/block/ssh.c
+++ b/block/ssh.c
@@ -108,7 +108,7 @@ static void ssh_state_free(BDRVSSHState *s)
     }
 }
 
-static void GCC_FMT_ATTR(3, 4)
+static void G_GNUC_PRINTF(3, 4)
 session_error_setg(Error **errp, BDRVSSHState *s, const char *fs, ...)
 {
     va_list args;
@@ -133,7 +133,7 @@ session_error_setg(Error **errp, BDRVSSHState *s, const char *fs, ...)
     g_free(msg);
 }
 
-static void GCC_FMT_ATTR(3, 4)
+static void G_GNUC_PRINTF(3, 4)
 sftp_error_setg(Error **errp, BDRVSSHState *s, const char *fs, ...)
 {
     va_list args;
diff --git a/fsdev/9p-marshal.c b/fsdev/9p-marshal.c
index 51881fe22010..f9b0336cd59d 100644
--- a/fsdev/9p-marshal.c
+++ b/fsdev/9p-marshal.c
@@ -27,7 +27,7 @@ void v9fs_string_free(V9fsString *str)
     str->size = 0;
 }
 
-void GCC_FMT_ATTR(2, 3)
+void G_GNUC_PRINTF(2, 3)
 v9fs_string_sprintf(V9fsString *str, const char *fmt, ...)
 {
     va_list ap;
diff --git a/fsdev/virtfs-proxy-helper.c b/fsdev/virtfs-proxy-helper.c
index 15c0e79b067b..d06a0f7b8326 100644
--- a/fsdev/virtfs-proxy-helper.c
+++ b/fsdev/virtfs-proxy-helper.c
@@ -57,7 +57,7 @@ static bool is_daemon;
 static bool get_version; /* IOC getversion IOCTL supported */
 static char *prog_name;
 
-static void GCC_FMT_ATTR(2, 3) do_log(int loglevel, const char *format, ...)
+static void G_GNUC_PRINTF(2, 3) do_log(int loglevel, const char *format, ...)
 {
     va_list ap;
 
diff --git a/hw/9pfs/9p.c b/hw/9pfs/9p.c
index a6d6b3f83567..a91d24c0acae 100644
--- a/hw/9pfs/9p.c
+++ b/hw/9pfs/9p.c
@@ -203,7 +203,7 @@ void v9fs_path_free(V9fsPath *path)
 }
 
 
-void GCC_FMT_ATTR(2, 3)
+void G_GNUC_PRINTF(2, 3)
 v9fs_path_sprintf(V9fsPath *path, const char *fmt, ...)
 {
     va_list ap;
diff --git a/hw/acpi/aml-build.c b/hw/acpi/aml-build.c
index 1773cf55f1ee..4086879ebff9 100644
--- a/hw/acpi/aml-build.c
+++ b/hw/acpi/aml-build.c
@@ -207,7 +207,7 @@ build_append_nameseg(GArray *array, const char *seg)
     g_array_append_vals(array, "____", ACPI_NAMESEG_LEN - len);
 }
 
-static void GCC_FMT_ATTR(2, 0)
+static void G_GNUC_PRINTF(2, 0)
 build_append_namestringv(GArray *array, const char *format, va_list ap)
 {
     char *s;
@@ -270,7 +270,7 @@ build_append_namestringv(GArray *array, const char *format, va_list ap)
     g_strfreev(segs);
 }
 
-GCC_FMT_ATTR(2, 3)
+G_GNUC_PRINTF(2, 3)
 static void build_append_namestring(GArray *array, const char *format, ...)
 {
     va_list ap;
diff --git a/hw/mips/fuloong2e.c b/hw/mips/fuloong2e.c
index c1b8066a13b0..c9f14e70a077 100644
--- a/hw/mips/fuloong2e.c
+++ b/hw/mips/fuloong2e.c
@@ -72,7 +72,7 @@ static struct _loaderparams {
     const char *initrd_filename;
 } loaderparams;
 
-static void GCC_FMT_ATTR(3, 4) prom_set(uint32_t *prom_buf, int index,
+static void G_GNUC_PRINTF(3, 4) prom_set(uint32_t *prom_buf, int index,
                                         const char *string, ...)
 {
     va_list ap;
diff --git a/hw/mips/malta.c b/hw/mips/malta.c
index 55037eb90f0e..6288511723e1 100644
--- a/hw/mips/malta.c
+++ b/hw/mips/malta.c
@@ -995,7 +995,7 @@ static void write_bootloader(uint8_t *base, uint64_t run_addr,
 
 }
 
-static void GCC_FMT_ATTR(3, 4) prom_set(uint32_t *prom_buf, int index,
+static void G_GNUC_PRINTF(3, 4) prom_set(uint32_t *prom_buf, int index,
                                         const char *string, ...)
 {
     va_list ap;
diff --git a/hw/net/rtl8139.c b/hw/net/rtl8139.c
index 90b4fc63ce64..6b65823b4bf8 100644
--- a/hw/net/rtl8139.c
+++ b/hw/net/rtl8139.c
@@ -86,7 +86,7 @@
 #  define DPRINTF(fmt, ...) \
     do { fprintf(stderr, "RTL8139: " fmt, ## __VA_ARGS__); } while (0)
 #else
-static inline GCC_FMT_ATTR(1, 2) int DPRINTF(const char *fmt, ...)
+static inline G_GNUC_PRINTF(1, 2) int DPRINTF(const char *fmt, ...)
 {
     return 0;
 }
diff --git a/hw/virtio/virtio.c b/hw/virtio/virtio.c
index 9e8f51dfb03b..89c261da0208 100644
--- a/hw/virtio/virtio.c
+++ b/hw/virtio/virtio.c
@@ -3580,7 +3580,7 @@ void virtio_device_set_child_bus_name(VirtIODevice *vdev, char *bus_name)
     vdev->bus_name = g_strdup(bus_name);
 }
 
-void GCC_FMT_ATTR(2, 3) virtio_error(VirtIODevice *vdev, const char *fmt, ...)
+void G_GNUC_PRINTF(2, 3) virtio_error(VirtIODevice *vdev, const char *fmt, ...)
 {
     va_list ap;
 
diff --git a/io/channel-websock.c b/io/channel-websock.c
index 70889bb54da5..55145a6a8c5d 100644
--- a/io/channel-websock.c
+++ b/io/channel-websock.c
@@ -157,7 +157,7 @@ enum {
     QIO_CHANNEL_WEBSOCK_OPCODE_PONG = 0xA
 };
 
-static void GCC_FMT_ATTR(2, 3)
+static void G_GNUC_PRINTF(2, 3)
 qio_channel_websock_handshake_send_res(QIOChannelWebsock *ioc,
                                        const char *resmsg,
                                        ...)
diff --git a/monitor/hmp.c b/monitor/hmp.c
index 569066036dc1..24fd2e5f34bf 100644
--- a/monitor/hmp.c
+++ b/monitor/hmp.c
@@ -308,7 +308,7 @@ void help_cmd(Monitor *mon, const char *name)
 static const char *pch;
 static sigjmp_buf expr_env;
 
-static void GCC_FMT_ATTR(2, 3) QEMU_NORETURN
+static void G_GNUC_PRINTF(2, 3) QEMU_NORETURN
 expr_error(Monitor *mon, const char *fmt, ...)
 {
     va_list ap;
@@ -1462,7 +1462,7 @@ static void monitor_event(void *opaque, QEMUChrEvent event)
  * These functions just adapt the readline interface in a typesafe way.  We
  * could cast function pointers but that discards compiler checks.
  */
-static void GCC_FMT_ATTR(2, 3) monitor_readline_printf(void *opaque,
+static void G_GNUC_PRINTF(2, 3) monitor_readline_printf(void *opaque,
                                                        const char *fmt, ...)
 {
     MonitorHMP *mon = opaque;
diff --git a/nbd/server.c b/nbd/server.c
index 5da884c2fc35..735381aacfcb 100644
--- a/nbd/server.c
+++ b/nbd/server.c
@@ -213,7 +213,7 @@ static int nbd_negotiate_send_rep(NBDClient *client, uint32_t type,
 
 /* Send an error reply.
  * Return -errno on error, 0 on success. */
-static int GCC_FMT_ATTR(4, 0)
+static int G_GNUC_PRINTF(4, 0)
 nbd_negotiate_send_rep_verr(NBDClient *client, uint32_t type,
                             Error **errp, const char *fmt, va_list va)
 {
@@ -253,7 +253,7 @@ nbd_sanitize_name(const char *name)
 
 /* Send an error reply.
  * Return -errno on error, 0 on success. */
-static int GCC_FMT_ATTR(4, 5)
+static int G_GNUC_PRINTF(4, 5)
 nbd_negotiate_send_rep_err(NBDClient *client, uint32_t type,
                            Error **errp, const char *fmt, ...)
 {
@@ -269,7 +269,7 @@ nbd_negotiate_send_rep_err(NBDClient *client, uint32_t type,
 /* Drop remainder of the current option, and send a reply with the
  * given error type and message. Return -errno on read or write
  * failure; or 0 if connection is still live. */
-static int GCC_FMT_ATTR(4, 0)
+static int G_GNUC_PRINTF(4, 0)
 nbd_opt_vdrop(NBDClient *client, uint32_t type, Error **errp,
               const char *fmt, va_list va)
 {
@@ -282,7 +282,7 @@ nbd_opt_vdrop(NBDClient *client, uint32_t type, Error **errp,
     return ret;
 }
 
-static int GCC_FMT_ATTR(4, 5)
+static int G_GNUC_PRINTF(4, 5)
 nbd_opt_drop(NBDClient *client, uint32_t type, Error **errp,
              const char *fmt, ...)
 {
@@ -296,7 +296,7 @@ nbd_opt_drop(NBDClient *client, uint32_t type, Error **errp,
     return ret;
 }
 
-static int GCC_FMT_ATTR(3, 4)
+static int G_GNUC_PRINTF(3, 4)
 nbd_opt_invalid(NBDClient *client, Error **errp, const char *fmt, ...)
 {
     int ret;
diff --git a/qemu-img.c b/qemu-img.c
index 5dffb3e61601..1caddfb23a71 100644
--- a/qemu-img.c
+++ b/qemu-img.c
@@ -99,7 +99,7 @@ static void format_print(void *opaque, const char *name)
     printf(" %s", name);
 }
 
-static void QEMU_NORETURN GCC_FMT_ATTR(1, 2) error_exit(const char *fmt, ...)
+static void QEMU_NORETURN G_GNUC_PRINTF(1, 2) error_exit(const char *fmt, ...)
 {
     va_list ap;
 
@@ -284,7 +284,7 @@ static QemuOptsList qemu_source_opts = {
     },
 };
 
-static int GCC_FMT_ATTR(2, 3) qprintf(bool quiet, const char *fmt, ...)
+static int G_GNUC_PRINTF(2, 3) qprintf(bool quiet, const char *fmt, ...)
 {
     int ret = 0;
     if (!quiet) {
diff --git a/qemu-io.c b/qemu-io.c
index 3924639b92bd..e45a15c41aac 100644
--- a/qemu-io.c
+++ b/qemu-io.c
@@ -329,7 +329,7 @@ static char *get_prompt(void)
     return prompt;
 }
 
-static void GCC_FMT_ATTR(2, 3) readline_printf_func(void *opaque,
+static void G_GNUC_PRINTF(2, 3) readline_printf_func(void *opaque,
                                                     const char *fmt, ...)
 {
     va_list ap;
diff --git a/qobject/json-parser.c b/qobject/json-parser.c
index 008b326fb81a..d498db6e7027 100644
--- a/qobject/json-parser.c
+++ b/qobject/json-parser.c
@@ -54,7 +54,7 @@ static QObject *parse_value(JSONParserContext *ctxt);
 /**
  * Error handler
  */
-static void GCC_FMT_ATTR(3, 4) parse_error(JSONParserContext *ctxt,
+static void G_GNUC_PRINTF(3, 4) parse_error(JSONParserContext *ctxt,
                                            JSONToken *token, const char *msg, ...)
 {
     va_list ap;
diff --git a/softmmu/qtest.c b/softmmu/qtest.c
index 8b7cb6aa8e46..cc586233a974 100644
--- a/softmmu/qtest.c
+++ b/softmmu/qtest.c
@@ -288,7 +288,7 @@ static void qtest_send_prefix(CharBackend *chr)
             (long) tv.tv_sec, (long) tv.tv_usec);
 }
 
-static void GCC_FMT_ATTR(1, 2) qtest_log_send(const char *fmt, ...)
+static void G_GNUC_PRINTF(1, 2) qtest_log_send(const char *fmt, ...)
 {
     va_list ap;
 
@@ -318,7 +318,7 @@ static void qtest_send(CharBackend *chr, const char *str)
     qtest_server_send(qtest_server_send_opaque, str);
 }
 
-static void GCC_FMT_ATTR(2, 3) qtest_sendf(CharBackend *chr,
+static void G_GNUC_PRINTF(2, 3) qtest_sendf(CharBackend *chr,
                                            const char *fmt, ...)
 {
     va_list ap;
diff --git a/tests/qtest/libqtest.c b/tests/qtest/libqtest.c
index 9dac018fcba0..dc5566ccfd60 100644
--- a/tests/qtest/libqtest.c
+++ b/tests/qtest/libqtest.c
@@ -437,7 +437,7 @@ static void qtest_client_socket_send(QTestState *s, const char *buf)
     socket_send(s->fd, buf, strlen(buf));
 }
 
-static void GCC_FMT_ATTR(2, 3) qtest_sendf(QTestState *s, const char *fmt, ...)
+static void G_GNUC_PRINTF(2, 3) qtest_sendf(QTestState *s, const char *fmt, ...)
 {
     va_list ap;
 
diff --git a/tests/unit/test-qobject-input-visitor.c b/tests/unit/test-qobject-input-visitor.c
index 6f59a7f43249..22538f814099 100644
--- a/tests/unit/test-qobject-input-visitor.c
+++ b/tests/unit/test-qobject-input-visitor.c
@@ -64,7 +64,7 @@ static Visitor *test_init_internal(TestInputVisitorData *data, bool keyval,
     return data->qiv;
 }
 
-static GCC_FMT_ATTR(3, 4)
+static G_GNUC_PRINTF(3, 4)
 Visitor *visitor_input_test_init_full(TestInputVisitorData *data,
                                       bool keyval,
                                       const char *json_string, ...)
@@ -79,7 +79,7 @@ Visitor *visitor_input_test_init_full(TestInputVisitorData *data,
     return v;
 }
 
-static GCC_FMT_ATTR(2, 3)
+static G_GNUC_PRINTF(2, 3)
 Visitor *visitor_input_test_init(TestInputVisitorData *data,
                                  const char *json_string, ...)
 {
diff --git a/audio/coreaudio.m b/audio/coreaudio.m
index 3186b68474d0..4695291621a3 100644
--- a/audio/coreaudio.m
+++ b/audio/coreaudio.m
@@ -211,7 +211,7 @@ static void coreaudio_logstatus (OSStatus status)
     AUD_log (AUDIO_CAP, "Reason: %s\n", str);
 }
 
-static void GCC_FMT_ATTR (2, 3) coreaudio_logerr (
+static void G_GNUC_PRINTF (2, 3) coreaudio_logerr (
     OSStatus status,
     const char *fmt,
     ...
@@ -226,7 +226,7 @@ static void GCC_FMT_ATTR (2, 3) coreaudio_logerr (
     coreaudio_logstatus (status);
 }
 
-static void GCC_FMT_ATTR (3, 4) coreaudio_logerr2 (
+static void G_GNUC_PRINTF (3, 4) coreaudio_logerr2 (
     OSStatus status,
     const char *typ,
     const char *fmt,
diff --git a/scripts/checkpatch.pl b/scripts/checkpatch.pl
index ddd8148d87e5..a07f0effb540 100755
--- a/scripts/checkpatch.pl
+++ b/scripts/checkpatch.pl
@@ -227,7 +227,7 @@ our $Attribute	= qr{
 			QEMU_WARN_UNUSED_RESULT|
 			QEMU_SENTINEL|
 			QEMU_PACKED|
-			GCC_FMT_ATTR
+			G_GNUC_PRINTF
 		  }x;
 our $Modifier;
 our $Inline	= qr{inline};
-- 
2.35.1.273.ge6ebfd0e8cbb



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 10:29:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 10:29:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291131.493955 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUQty-00015e-9M; Wed, 16 Mar 2022 10:29:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291131.493955; Wed, 16 Mar 2022 10:29:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUQty-00015X-6B; Wed, 16 Mar 2022 10:29:10 +0000
Received: by outflank-mailman (input) for mailman id 291131;
 Wed, 16 Mar 2022 10:29:09 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=u7dg=T3=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nUQtx-00015R-46
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 10:29:09 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id e8625005-a513-11ec-8eba-a37418f5ba1a;
 Wed, 16 Mar 2022 11:29:07 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id D10731476;
 Wed, 16 Mar 2022 03:29:05 -0700 (PDT)
Received: from [10.57.71.197] (unknown [10.57.71.197])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 372003F73D;
 Wed, 16 Mar 2022 03:29:04 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e8625005-a513-11ec-8eba-a37418f5ba1a
Message-ID: <14a1e221-7a55-42f5-6eb5-03b64e20e337@arm.com>
Date: Wed, 16 Mar 2022 11:28:48 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [PATCH] kconfig: detect LD implementation
Content-Language: en-US
To: Roger Pau Monne <roger.pau@citrix.com>, xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Wei Liu <wl@xen.org>
References: <20220314105535.13518-1-roger.pau@citrix.com>
From: Michal Orzel <michal.orzel@arm.com>
In-Reply-To: <20220314105535.13518-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

Hi Roger,

On 14.03.2022 11:55, Roger Pau Monne wrote:
> Detect GNU and LLVM ld implementations. This is required for further
> patches that will introduce diverging behaviour depending on the
> linker implementation in use.
> 
> Note that LLVM ld returns "compatible with GNU linkers" as part of the
> version string, so be on the safe side and use '^' to only match at
> the start of the line in case LLVM ever decides to change the text to
> use "compatible with GNU ld" instead.
> 
> Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
> ---
>  xen/Kconfig | 6 ++++++
>  1 file changed, 6 insertions(+)
> 
> diff --git a/xen/Kconfig b/xen/Kconfig
> index d134397a0b..e8d5e70d46 100644
> --- a/xen/Kconfig
> +++ b/xen/Kconfig
> @@ -23,6 +23,12 @@ config CLANG_VERSION
>  	int
>  	default $(shell,$(BASEDIR)/scripts/clang-version.sh $(CC))
>  
> +config LD_IS_GNU
> +	def_bool $(success,$(LD) --version | head -n 1 | grep -q "^GNU ld")
> +> +config LD_IS_LLVM
> +	def_bool $(success,$(LD) --version | head -n 1 | grep -q "^LLD")
> +
>  # -fvisibility=hidden reduces -fpic cost, if it's available
>  config CC_HAS_VISIBILITY_ATTRIBUTE
>  	def_bool $(cc-option,-fvisibility=hidden)

NIT: You do not really need to use head especiialy if grep for the beginning of a line.
With or without this:
Reviewed-by: Michal Orzel <michal.orzel@arm.com>

Cheers,
Michal


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 10:44:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 10:44:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291134.493969 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUR8d-0003P7-Je; Wed, 16 Mar 2022 10:44:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291134.493969; Wed, 16 Mar 2022 10:44:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUR8d-0003P0-GF; Wed, 16 Mar 2022 10:44:19 +0000
Received: by outflank-mailman (input) for mailman id 291134;
 Wed, 16 Mar 2022 10:44:18 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=7auh=T3=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nUR8c-0003Ou-1U
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 10:44:18 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 06e5b388-a516-11ec-8eba-a37418f5ba1a;
 Wed, 16 Mar 2022 11:44:17 +0100 (CET)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2056.outbound.protection.outlook.com [104.47.14.56]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-20-HeE4QRPAMdOZ3m5rkBa-_Q-1; Wed, 16 Mar 2022 11:44:15 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM6PR04MB6087.eurprd04.prod.outlook.com (2603:10a6:20b:73::20)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Wed, 16 Mar
 2022 10:44:13 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5081.015; Wed, 16 Mar 2022
 10:44:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 06e5b388-a516-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647427456;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=xjoIcQZg/CYfbxLC/sWCrL3cKB4thKIIuGW0AERhs4U=;
	b=E5+GxzYqoTXlzJNXevRvbTLqkhA/BxxRoE71yNTU5IK3FufKFHc3EgngkW2ZyaeMWEBdv/
	LzmwtmoKZZgJqVMwNoExSksfWYJXSZ+xLW300c+FQVc48B7BpJXaoL5aGfdxRzATZIIQ0l
	hrBymESwnC2L1c05jwzLm+Y/95iQgu4=
X-MC-Unique: HeE4QRPAMdOZ3m5rkBa-_Q-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=UeqgUEPVKk+MTFiXza1ct5xRzDdbKpAuCvstI7bYuCK/gvuaWzLlP7asyUuAv/yWFU0axQsByObdEKvHeugtcpCaYnv6Gq5NifLj/Zok7Ta+ji3AzZnp4Ax3GU55vh942PYw/yOA7pByG3MPdgjfCvnfPNh3s4cdqg666pJkmG/9do618s18HGIt0qmAHwlSMYrw0HC9q8T450wncbY7JRKvSDGwxNhMnFcankEm6QnLPgdfayIadiD5/TmqRnBAW+Y/Q734X0sAdK3DTSNkPcGWhUSqmfnQofOnn2IXqvS7hN7OK4L3oan8CLEu6C7XUykUsuEzbETbcpMZXZHwGQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=xjoIcQZg/CYfbxLC/sWCrL3cKB4thKIIuGW0AERhs4U=;
 b=ogd1csjJttV3/2PX2jBrUImNtJHTYLGbA+fIqTorY/yJgzvyUGcCr1kSOeMtWMnkE7ECd2xuT7kGj4r1U9bNl06kHdwFzQMq66PlUQd6vOUAlLUDyYXaPxdfGysR+H4n6VulTs4GsiHqi3nejfF90PoOrLjBpfBsqLjcDUZcUxT9jryFNTGq957r5tXWoc9ufr1POeOsJ4zAbZgtX9ajo0wjjXcIKwLobJw1d0N4XUpl/4XGrTGETfq6TTMn2cmbx4nEuexAL/gHch08a5shg/3dyANiNOS0XzUzN13ZCU0lR4rcZ2UyFsTe8szoLB8aO4OYfmyhHKYJwT4z1+k/vA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <cadc8c33-5310-ed9d-69c1-96e41f266b39@suse.com>
Date: Wed, 16 Mar 2022 11:43:58 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH] x86emul/test: correct VSCALEF{P,S}{S,D} entries in predicates
 test
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM5PR04CA0029.eurprd04.prod.outlook.com
 (2603:10a6:206:1::42) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: e8cc663c-26c9-437a-7277-08da0739e75a
X-MS-TrafficTypeDiagnostic: AM6PR04MB6087:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB6087C1C320CE9F8985414B6CB3119@AM6PR04MB6087.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	bio6y9P8p7K5Sspqy9V4ppZ7bnXaNOqzDkAHvGULNEM+G6MN4AenL9S73UXxzHW+J4kvJfytWLt2K4f8oxViirr3vIxybEIoFpmUGedbfb8z/QRArxZ6Q4AuxrvrjDEFTzHzj5czdsqH+T29eBx7ZsEmbcpptp+fdfGdp4AFiUUGNY2L09NMon+/v+HXngSZprREdEk0zGI7qfaa6jIumaliygB/iJls7NoXOThzykcMl3g20wmPT2RrfcxVG5J/A3UTSXUsLejkqCcTAZcWaCbBVKlm8UpnmxX4DPZnUOyzSMAyMEL0VEBR7HifT4cBJxxF1wn0i8yq5sMvv/3P1plYXMQz88vyPMSx0Wkcsg8BPoXxRnqGwiGZLQMoYbsQdN5Re9Ur4tw6BX5UrG/sop1cqC5yyQ5YllmnGzDBIaTcOTReac8CMdLgFQTQCWBnSnp4MZEqV0HjZXaK5ZIIIwmkQdsc6HtMztCK9/W3W/aMjEgojzgB+oyY/Vp2DZKxXXAUtteOvqTrmsLZmiuU/YrElF3ORKmkebyA/Px+TjtEIEpDC2O0kIOPi0tqCqOIOvOurZfB+synfbEvUxkz9px2Wh38e/+p0RxB/5s1yz5CsjQ7AjnBXgTQN2HXoT0z9nnMqoKP+8qRom0f7QH+g8V+dltaAgKhxyG9WqFE2n7mfpn3tyGBxmCLbwjn4dBOZPhfXkxvldh7sjRxaQ3L5WJomlOVrmG+CPiUnkAOHno=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66556008)(6506007)(38100700002)(6666004)(6512007)(66946007)(316002)(66476007)(6916009)(2616005)(54906003)(8936002)(4744005)(6486002)(508600001)(2906002)(26005)(31696002)(186003)(31686004)(86362001)(5660300002)(36756003)(4326008)(8676002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?RGUzWXJGZG9wSmdGNEZpeTRoTEg5akJ6WVZRa1VnNndGcytZN3grREdYOHBk?=
 =?utf-8?B?YVNCSHViT21YSm8rZHFpQmZ0YXpaT3ptaHFZQ0RXLytwaDJPOHNKRlBNMHRQ?=
 =?utf-8?B?U2VSVm1HUFV2c0s1aG12aGhNc2lXTnpqNDhIRFpLdXIvMUFUQUJ5VmhPVnR5?=
 =?utf-8?B?OTNza0tncDFTcjFCV0NhUVBjOUlYVjAyWktEV0cxMTQvKzhiUzBwcytJTlVT?=
 =?utf-8?B?MS96YUNTcCtkU1lKSFhURUJUNElMMHZzVGlIUElWeHo3T0xZZGFqeWpQWlZB?=
 =?utf-8?B?NFlXcXJ4NzBRWDl4NzNXbDBIcmxPc1BBZzdnYW50UXVyT2JzN1RqSnNHVStm?=
 =?utf-8?B?c21HeUdKckl6NGZPSFBLY2FLWWdzRzdDR01sYytkamx0dW1aUkp1b21RVDU5?=
 =?utf-8?B?T2tpYlRrV1A3RzA3OGVWZE1kT1lvZWt6aGFqK1BRSzdzWHJLUkhEVU5kbVJx?=
 =?utf-8?B?a1RxR3haYXlncW95ZUxZOHhaOW1KeEJENmZuaTJkTm9aaWkwN0lKRml1NW5E?=
 =?utf-8?B?YUEvbm9DZmp4NklyNTVTc2RvNXZRYldUb1gxdExYL2hNQjZadDRkSGxraW5w?=
 =?utf-8?B?TmdzOS84ZUJBV0ZmYTZTcXV6N1o5TnBYTUlRRlFEZTgrOG1FOHI2aWg2QkpW?=
 =?utf-8?B?R1BwdDFMNEpRNmJEamZwT3VPVm5jakZ3dVFldDZyS3g0bE9pTk1ZU0M5eFBC?=
 =?utf-8?B?QUFaWjkwaTNaZmVJRUx4M3pSTHNERVQ5UHNlTmNEV0tnL0xsaE9qcTZMR1Fj?=
 =?utf-8?B?QnVETjlQczVsOTkvQU1CN2tJNE1oT0xrbHJnenlOYTYydUIzckcrQnlVeFZ3?=
 =?utf-8?B?WjJqejI1aWFIZllNaThOSGVuZnhFNHd6cVV6elEwQnFNcjN3KzNyVmhOTjY1?=
 =?utf-8?B?VkwyZzAyY1EvM01MUkVVKzNIKzYySURyM3k4dzczRC9kSDFyWENEd0F5ZGNa?=
 =?utf-8?B?b3NpcGNyZldrbytJWnZiOU85TUw2bWRRSmtGN25HbnhRd2RLdGVadzhVQTdB?=
 =?utf-8?B?R2I3U2d3UDQ4TkxpRndWRmd0L3NMelpZVC9sd3BiMWdmelBMTWRLT3FZMFBB?=
 =?utf-8?B?NkEwNU11b2tuU2hicHJIeFN3Qy9ydTgzODArdGFEa3AyaDV4eW1CWWxoWmZ0?=
 =?utf-8?B?MmhzVjJ3SGJSTUVqeWVzNFlDV0R5TVM0L2l5bnNPRmI5YjZoWGV4R2hmcjU2?=
 =?utf-8?B?Z05oZmpiZ0hXbGZ2T09HTjVzMlhzSHdPYjVhOC81V21oZEZ0TExUd1dFdDdB?=
 =?utf-8?B?YW40bk40TUpPTUpHcmxaaTB6dFpIajc5N2w0SFdiZmVnRmVYWFRjb1FNZU5x?=
 =?utf-8?B?SzJZeDFxSzhDTU5nVlZ4cGlnY09FZDR6cW84Q1JqSTdsSjJKMTFkdUxpb3BJ?=
 =?utf-8?B?Tk9ZZ1NBTFZ5dUxUNkRyZVlNOHI3T1I0QWx6U09oYTZsYVhGME9nVXpUODBD?=
 =?utf-8?B?aVJKOUxOZXlsRU1RSXBhQmFFREdMbmU4dWt1VnZsUWxqaGZvd1JVL2M1Rkxs?=
 =?utf-8?B?RDZmRDc4V1M3ZktMMGF4OFNRSFEzanJ4ci9CYlRkUE9DbjBVYXpqUlVPeVlo?=
 =?utf-8?B?aWVXeXZ3RE5JVWpLSDBYVXdESExUaGtudDNaMlp5Sld6Nm4rUWlPWE9aL1JF?=
 =?utf-8?B?NGVtVXZ3S0svbVhUaENvcmhobUtYN3IyM1FabzhBZGRaN1V0THZMdE4vdnl6?=
 =?utf-8?B?RTdlVnB6d25HMnpEK1JEanFoVERudEgxWGxBT0swQVRoSzNYNlhIWTFvaExr?=
 =?utf-8?B?OGw2YlRPc25SYnI0TDRONGRuUVk0OHdQY2trdVgxN3prUXN0Rm45OWJIMFln?=
 =?utf-8?B?YVBMNDRiQ2tsdURIRERzMVlRa0drU3ZXQmw1cm81cHI4Y3hQa3VmdUYxS1Vy?=
 =?utf-8?B?MFVoTlRyMnNkamNDc25xWmJNVU83akdHZGtJSGY5cXkyVEI4Y3ZTNXp6OFdB?=
 =?utf-8?Q?yfCJmND/Er7aBBiIbAJwDAopg9DCEHyD?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e8cc663c-26c9-437a-7277-08da0739e75a
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Mar 2022 10:44:13.5620
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: SJEpsa00sJnd1+/rSxVYtGyhiHnxS1AxP5CpBCfbvxWIDOMo1yvjPOm3l14cm05xCYYod2/Jfo7fPuZ5wC+eAg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB6087

I can't see why these would want / need to suppress testing of the
register forms of the insns. Quite likely a copy-and-paste oversight
when originally creating the table.

Signed-off-by: Jan Beulich <jbeulich@suse.com>

--- a/tools/tests/x86_emulator/predicates.c
+++ b/tools/tests/x86_emulator/predicates.c
@@ -1822,8 +1822,8 @@ static const struct evex {
     { { 0x2a }, 2, F, R, pfx_66, W0, Ln }, /* vmovntdqa */
     { { 0x2a, 0xc0 }, 2, F, N, pfx_f3, W1, Ln }, /* vpbroadcastmb2q */
     { { 0x2b }, 2, T, R, pfx_66, W0, Ln }, /* vpackusdw */
-    { { 0x2c }, 2, F, R, pfx_66, Wn, Ln }, /* vscalefp{s,d} */
-    { { 0x2d }, 2, F, R, pfx_66, Wn, LIG }, /* vscalefs{s,d} */
+    { { 0x2c }, 2, T, R, pfx_66, Wn, Ln }, /* vscalefp{s,d} */
+    { { 0x2d }, 2, T, R, pfx_66, Wn, LIG }, /* vscalefs{s,d} */
     { { 0x30 }, 2, T, R, pfx_66, WIG, Ln }, /* vpmovzxbw */
     { { 0x30 }, 2, T, W, pfx_f3, W0, Ln }, /* vpmovwb */
     { { 0x31 }, 2, T, R, pfx_66, WIG, Ln }, /* vpmovzxbd */



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 10:46:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 10:46:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291137.493979 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nURAE-0003zm-V3; Wed, 16 Mar 2022 10:45:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291137.493979; Wed, 16 Mar 2022 10:45:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nURAE-0003zf-S3; Wed, 16 Mar 2022 10:45:58 +0000
Received: by outflank-mailman (input) for mailman id 291137;
 Wed, 16 Mar 2022 10:45:57 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=7auh=T3=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nURAD-0003zX-Lq
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 10:45:57 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 42081096-a516-11ec-853b-5f4723681683;
 Wed, 16 Mar 2022 11:45:56 +0100 (CET)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2056.outbound.protection.outlook.com [104.47.14.56]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-40-BuFaEF_LPIyESW-Kht-VZw-1; Wed, 16 Mar 2022 11:45:53 +0100
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com (2603:10a6:803:e7::16)
 by AM6PR04MB6087.eurprd04.prod.outlook.com (2603:10a6:20b:73::20)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Wed, 16 Mar
 2022 10:45:52 +0000
Received: from VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0]) by VI1PR04MB5600.eurprd04.prod.outlook.com
 ([fe80::e8ce:db1c:5bb0:af0%6]) with mapi id 15.20.5081.015; Wed, 16 Mar 2022
 10:45:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 42081096-a516-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647427556;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=eMIuBjeuO9vEqUrYE9n3lGQ5dKRqgk72MpQfcGDuly8=;
	b=mCVsMMDNNt4bMNi5G45MJurv9x70LEMhXKFFMdrIkmdmZ2dWk3qPzVzeNWK2o1UDdbu0/Y
	xK+Uu89qWIMhULK2T37mhwfM2gpjlZqVhPc9h//bKUx6lxZoa2PndQ1WxwZRbVmcTA785r
	zTAQtVL1zrNnbt7fB6ouissgYdLiqVw=
X-MC-Unique: BuFaEF_LPIyESW-Kht-VZw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=bTsX7DoihiMdesUeiWvFbmtjY90H9TD22cxD3vn9AaByEs1rUGUOjVKl4DvU7brZemT+a8AHb1/AwyJHwrLgYerC17XmlNIkHi5RCJxv5Ewe4Tor8cdjn7wBV2APR7aHjW470wyFU77B0CqbwV4GsbObZRWvbl5smKev2H83ZQ8evTE41t+T8oQD6vWKqwl2ntHe4SYLiHJ66MOUMePB36LElmpD5QKFyC+B0lWJ+mtLDoL6ek2K9RaoErkn1NAbiLpQAEnV1mZmqM4Bz1+yo8EhIovhwTkjfezg8zG6fSclo1PKR5DwK2ekFtc5uACs/zx183KnEQdBhci8CBziAg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=eMIuBjeuO9vEqUrYE9n3lGQ5dKRqgk72MpQfcGDuly8=;
 b=j8RN4eToomj2DM9BgglR1jnd30+xNn37wrKx1Y0EeEk8hOeyGbFfS3EJtR8GnJQ7/U7PHe9lr+0YdTrgIkoQVPnS0R8uPakswLeY6Y//dmPWIs6dK418HkNWvJoNchW9xz0FP52pPymNqauwMD89RX8hY2aDRv+GJDmmS9mksbn2Z7NPrshr/KSsTtL1p3axI9eEu3oqbTmFc557fLmO7irFHQM2vgNfJK02ZrzPqOoPJOMG22Szp9ieQneg2YeFos2272568azo+ydGS3k4eIAnGV1BNVQdTp2Aa3QWvMt1hapcbi8LigR+IGP1rhsGlN259skaXYx8DC+Pb5EKIQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <85dd9ad2-0eea-432c-24d2-40c6530776dc@suse.com>
Date: Wed, 16 Mar 2022 11:45:50 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH] x86emul/test: correct VCVTUSI2S{S,D} comments in predicates
 test
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P194CA0092.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:209:8f::33) To VI1PR04MB5600.eurprd04.prod.outlook.com
 (2603:10a6:803:e7::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: e54ec119-5400-43c3-46bd-08da073a241e
X-MS-TrafficTypeDiagnostic: AM6PR04MB6087:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB6087D396B6E4311F2E81621AB3119@AM6PR04MB6087.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR04MB5600.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66556008)(6506007)(38100700002)(6512007)(66946007)(316002)(66476007)(6916009)(2616005)(54906003)(8936002)(4744005)(6486002)(508600001)(2906002)(26005)(31696002)(186003)(31686004)(86362001)(5660300002)(36756003)(4326008)(8676002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?NlFtUzR0eWRicWVjMHE0bGFtVGl6VEQ0b05mODdRS1NoSDdpc3UwWnFnTFZp?=
 =?utf-8?B?cGM1VHNmK3k1ZVVBVkpXKzVxdmF5RitTdDRySXZsWGJVYmV1a2xHUDB0Y0J6?=
 =?utf-8?B?dkh5djNFQmsxWjd2WFNwSzY3US90MGFYZTBPNG85LzJDZTdpZ2h0ZFVwakZO?=
 =?utf-8?B?NHhoWEMwZmNRTkNVUWJ6SjVyRmdLNlNrVXpEcTJ3Z09rUWxJbmo1VkZrZUxP?=
 =?utf-8?B?bHlsdDFmaFl4RTltb05PUnpyMjVZaE4rbHN2aHdCcGxXMmtiWDFDcktQTFk2?=
 =?utf-8?B?U1pkczh5L1g0UkpscStoaHBCdTV4dnpuL1Y4S1MxTjJxTVNiSmxjTk93V0ZF?=
 =?utf-8?B?NFlwd3BCQndtWGRzLzNvUnc2U3RObW02c3ZQdEJpMU5zWE5QTjkrMU0wL002?=
 =?utf-8?B?LzFjWWU4bDV5YVBMZkZ2NFFhWDlkWHdqdmxBV3RmY1U2VUNDQjI5VGxLVjU2?=
 =?utf-8?B?WUU2TGpFK09Wdzl3TUZUalZzTVZqU2pnT1NBT3dlLzdSQ2VHZEEzYlg4bjlH?=
 =?utf-8?B?eGhxekJWWEpmZWpjT29kL1liQkNWVjJnd3c3VkVoM1pmU3hlUjU4KzhuS0wz?=
 =?utf-8?B?NVFhTTN1ZkxHb2d1RkZmcnh2aGVtMnlIZHQyNWdiZWlBUXA4dlFLaTF6WGZs?=
 =?utf-8?B?Nm9helpqb2FrSE50NHpIRm16QkZGbzB6KzA3Mmp3L1A0T3hYVk1SL0hDelpM?=
 =?utf-8?B?eU81dkw2WnZWU2haTmxqSEllaU1KMTFmZVFFaUZQWXJycmkzZkQwTUhNZDVv?=
 =?utf-8?B?d29XS1EvNHJDNzlGeis0T1JuNG0zRXl3LzV6a2ErZzlaUXVpd3hSdEJqU2NQ?=
 =?utf-8?B?dno4UzByUnpYeWhpY0xjdHFKSmQvNnZNMWFYZk1pcUJFeGFmeXcvdlhhOEpU?=
 =?utf-8?B?aVJ3YTM5ZnhHaWFMTHFNVUFxZlFQeFhaOG8xS0Z1SEtySk4yS2FpOGJBR0Jl?=
 =?utf-8?B?OHF4TWU3Z0xNWWliYUozMW9NTjhEQklTRm1OZ255Tmd3WlZiQ0NDeVJuRS9z?=
 =?utf-8?B?dHQvNEJzUlBIOUN3ZEhPdm9rbjBSREtkMGJ4akluSG9VR2J3RHVGWHhMVnRW?=
 =?utf-8?B?aVJNZVBIVFVpK2RFRm5hODdNNm91SDVjaGdHcXBEclRpYjNEUmIyeU01a2pL?=
 =?utf-8?B?MXFsV2pFOHJqTGZyQ3pLT1hNTzNqYng0VllmNTUza1pxR0tLd2tUQVFMeFdT?=
 =?utf-8?B?RXVKTS8wa0dzbGFuREdoS2UzVFRjcjVZQk5oZWR2QkpuMTVRQzJzek5zWS9m?=
 =?utf-8?B?MjZUa0MvYjBiRmlNeXJqeEdJc2o1cjEwQmNIYUc4SHBYc1pQU01CQUJGcUJU?=
 =?utf-8?B?bmRZOUlzci9MTUY5SWFKVVB4TUcrckYxOGZMV25qRDFnM0crb2hKRzRrZDAz?=
 =?utf-8?B?M1YzUkhSaXhWUXFBSS9EaTZKWWgwSDkwaTZueGhXUWZiQ2U5bCtaK25CeU9x?=
 =?utf-8?B?TG5UMzV2blFMWEsvZG5sOFR2MU5JeGpER2Y4K3B3NjBvd3NCNTdzYy9lU2Jh?=
 =?utf-8?B?Q3FQcVNGOHdnN21JOEppdHVRZ3NwaXBzMXR4b3RJZjlkRkVQd3E5c1lsWTJh?=
 =?utf-8?B?T0ZPOU52VDNUd0NxdHpyUmtieGZMVTN0VVc4YmxJN3Mra1NmbmdiM1kxQmE2?=
 =?utf-8?B?SXVNZFgxMHFtUkVLbFBHanVwcHVwdmtQQUtkaVZxc2pBWlJnRkZtZnkvUisy?=
 =?utf-8?B?cnJtVzNLZjUyL1Fad3AxQzJLRFNkZnhyWEhUVVloQzRQL0RlNjJ6eGNpQmov?=
 =?utf-8?B?QnlKbnBaSmRRb1RsQjZNc0t5a2N4NHlsZXQxeEhIS3FKcnppVzdNNWlIYmN0?=
 =?utf-8?B?R0IvRHF3cEhublNUZzI4MjNmNzdxWldCQkdLMXJ1OXhlNTQ1OE1pNlRCeVVQ?=
 =?utf-8?B?TS9SeGJBKzFqNmlzWVVBd1RVZDU4ejg4NVBHRHlwdmVTbXdTOGk1V2YrK3Zv?=
 =?utf-8?Q?xCXDRto1HtaQnIV/XOxwHV4toN/p5KXU?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e54ec119-5400-43c3-46bd-08da073a241e
X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5600.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Mar 2022 10:45:52.3526
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: CjGbJyjUjjvh/DN3CpuYblVbxi+707G6DcI0/khGc0FixgnYWrEIAWZisD2TgPsuURswii87l5lLYP1QeLj2AQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB6087

These were missing the size-indicating suffixes.

Signed-off-by: Jan Beulich <jbeulich@suse.com>

--- a/tools/tests/x86_emulator/predicates.c
+++ b/tools/tests/x86_emulator/predicates.c
@@ -1712,8 +1712,8 @@ static const struct evex {
     { { 0x7a }, 2, T, R, pfx_f3, Wn, Ln }, /* vcvtu{d,q}2pd */
     { { 0x7a }, 2, T, R, pfx_f2, Wn, Ln }, /* vcvtu{d,q}2ps */
     { { 0x7b }, 2, T, R, pfx_66, Wn, Ln }, /* vcvtp{s,d}2qq */
-    { { 0x7b }, 2, T, R, pfx_f3, Wn, LIG }, /* vcvtusi2s */
-    { { 0x7b }, 2, T, R, pfx_f2, Wn, LIG }, /* vcvtusi2s */
+    { { 0x7b }, 2, T, R, pfx_f3, Wn, LIG }, /* vcvtusi2ss */
+    { { 0x7b }, 2, T, R, pfx_f2, Wn, LIG }, /* vcvtusi2sd */
     { { 0x7e }, 2, T, W, pfx_66, Wn, L0 }, /* vmov{d,q} */
     { { 0x7e }, 2, T, R, pfx_f3, W1, L0 }, /* vmovq */
     { { 0x7f }, 2, T, W, pfx_66, Wn, Ln }, /* vmovdqa{32,64} */



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 10:54:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 10:54:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291141.493990 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nURIb-0005SM-QC; Wed, 16 Mar 2022 10:54:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291141.493990; Wed, 16 Mar 2022 10:54:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nURIb-0005SF-NE; Wed, 16 Mar 2022 10:54:37 +0000
Received: by outflank-mailman (input) for mailman id 291141;
 Wed, 16 Mar 2022 10:54:37 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nURIb-0005S5-3a; Wed, 16 Mar 2022 10:54:37 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nURIa-0000gl-NI; Wed, 16 Mar 2022 10:54:36 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nURIa-00089J-Fe; Wed, 16 Mar 2022 10:54:36 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nURIa-0006Wk-FC; Wed, 16 Mar 2022 10:54:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=aXfhCEitHwVZIrDFasQge7i8GfHacO+/8UgWDQ04Yfw=; b=wdQaUZTGcOcvgT1+w32ke9SGb2
	yE1zsAqjerHD1jQLqMYihJI3tUIPR+HCsVStHU46njARJWUyhTUXwzwmXy798wMRBVOZphXTnYazm
	QbI3aW7YB7uQnwSE7oPMdtCNpYJSv0viUmw3c3twc0NpzNduCoSwwWm8UpFdG0CpoHTs=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168634-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168634: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=33438f7354af9c04cb296fb15a7a79c2c3944c0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 16 Mar 2022 10:54:36 +0000

flight 168634 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168634/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 33438f7354af9c04cb296fb15a7a79c2c3944c0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   16 days
Failing since        168258  2022-03-01 01:55:31 Z   15 days  149 attempts
Testing same since   168634  2022-03-16 09:11:34 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 698 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 10:58:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 10:58:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291150.494002 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nURMb-0006BD-En; Wed, 16 Mar 2022 10:58:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291150.494002; Wed, 16 Mar 2022 10:58:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nURMb-0006B6-Bj; Wed, 16 Mar 2022 10:58:45 +0000
Received: by outflank-mailman (input) for mailman id 291150;
 Wed, 16 Mar 2022 10:58:44 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nURMa-0006Aw-CI; Wed, 16 Mar 2022 10:58:44 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nURMa-0000lC-Ag; Wed, 16 Mar 2022 10:58:44 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nURMZ-0008I8-RN; Wed, 16 Mar 2022 10:58:43 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nURMZ-0001Wh-Qw; Wed, 16 Mar 2022 10:58:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=bnzKfretMCgpg6CvP1LegiAKQhxH7OgD3lv1Fvfh0Nw=; b=BpARjh8aCqUoaIBQA75bnBex75
	yGYytP6kGQrzkYGJUQbcIzjJ6z2K1WJh3pqBdUB28sEoK+3oJYsaOEWjDblaiOL6811dld5i9/b/T
	2d5ZJIDqXwmGY6eWdKlVW7x6h8bYAEMBFV9tLorIqdqeRwyLZY3A/fDau3WXtLBQ7vvU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168630-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168630: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=22188790cad490f51e73dabcac65736c3b8871a7
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 16 Mar 2022 10:58:43 +0000

flight 168630 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168630/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              22188790cad490f51e73dabcac65736c3b8871a7
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  614 days
Failing since        151818  2020-07-11 04:18:52 Z  613 days  595 attempts
Testing same since   168630  2022-03-16 04:18:55 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Haonan Wang <hnwanga1@gmail.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Martin Pitt <mpitt@debian.org>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 100999 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 12:08:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 12:08:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291166.494013 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUSRf-0004s2-Ch; Wed, 16 Mar 2022 12:08:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291166.494013; Wed, 16 Mar 2022 12:08:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUSRf-0004rv-9Y; Wed, 16 Mar 2022 12:08:03 +0000
Received: by outflank-mailman (input) for mailman id 291166;
 Wed, 16 Mar 2022 12:08:02 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=r1vk=T3=redhat.com=rjones@srs-se1.protection.inumbo.net>)
 id 1nUSRd-0004ro-VZ
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 12:08:02 +0000
Received: from us-smtp-delivery-124.mimecast.com
 (us-smtp-delivery-124.mimecast.com [170.10.129.124])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id b8d43574-a521-11ec-853b-5f4723681683;
 Wed, 16 Mar 2022 13:08:00 +0100 (CET)
Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com
 [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS
 (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 us-mta-43-Yzg7gNJ1OcuUqGNCspEPWA-1; Wed, 16 Mar 2022 08:07:56 -0400
Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.rdu2.redhat.com
 [10.11.54.8])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 46F6080088A;
 Wed, 16 Mar 2022 12:07:55 +0000 (UTC)
Received: from localhost (unknown [10.39.192.129])
 by smtp.corp.redhat.com (Postfix) with ESMTP id 72BC3C33265;
 Wed, 16 Mar 2022 12:07:54 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b8d43574-a521-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
	s=mimecast20190719; t=1647432479;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=2hI9oM4T/Cw4CENK1lsjhdZP+mZpEDPOyBD7/RkxbPg=;
	b=iNpsv52f29zOUHFEcOxN0kacOu4+maPFlm2juNTLMUZDpr2PkUuGAVTlKL8JLTBYBe1R8T
	XZyzlOY5HVzoQN+DnUVP2yySxVcnIyFdj7dZGqOqw1iiJZmbearVnjwy2bXdbpe/v00jSW
	AKcWio1jF5SHMuM2s0JaFh0Cws93dR0=
X-MC-Unique: Yzg7gNJ1OcuUqGNCspEPWA-1
Date: Wed, 16 Mar 2022 12:07:53 +0000
From: "Richard W.M. Jones" <rjones@redhat.com>
To: marcandre.lureau@redhat.com
Cc: qemu-devel@nongnu.org, Gerd Hoffmann <kraxel@redhat.com>,
	Christian Schoenebeck <qemu_oss@crudebyte.com>,
	Philippe =?iso-8859-1?Q?Mathieu-Daud=E9?= <f4bug@amsat.org>,
	Thomas Huth <huth@tuxfamily.org>,
	Stefan Hajnoczi <stefanha@redhat.com>,
	Kevin Wolf <kwolf@redhat.com>, Hanna Reitz <hreitz@redhat.com>,
	Warner Losh <imp@bsdimp.com>, Kyle Evans <kevans@freebsd.org>,
	Greg Kurz <groug@kaod.org>, "Michael S. Tsirkin" <mst@redhat.com>,
	Igor Mammedov <imammedo@redhat.com>, Ani Sinha <ani@anisinha.ca>,
	Huacai Chen <chenhuacai@kernel.org>,
	Jiaxun Yang <jiaxun.yang@flygoat.com>,
	Aurelien Jarno <aurelien@aurel32.net>,
	Jiri Pirko <jiri@resnulli.us>, Jason Wang <jasowang@redhat.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Anthony Perard <anthony.perard@citrix.com>,
	Paul Durrant <paul@xen.org>, Paolo Bonzini <pbonzini@redhat.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Yanan Wang <wangyanan55@huawei.com>,
	Markus Armbruster <armbru@redhat.com>,
	Michael Roth <michael.roth@amd.com>,
	Daniel =?iso-8859-1?Q?P=2E_Berrang=E9?= <berrange@redhat.com>,
	"Dr. David Alan Gilbert" <dgilbert@redhat.com>,
	Eric Blake <eblake@redhat.com>,
	Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>,
	Konstantin Kostiuk <kkostiuk@redhat.com>,
	Laurent Vivier <lvivier@redhat.com>,
	"open list:blkverify" <qemu-block@nongnu.org>,
	"open list:X86 Xen CPUs" <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH 07/27] Replace GCC_FMT_ATTR with G_GNUC_PRINTF
Message-ID: <20220316120753.GI1127@redhat.com>
References: <20220316095248.2613601-1-marcandre.lureau@redhat.com>
MIME-Version: 1.0
In-Reply-To: <20220316095248.2613601-1-marcandre.lureau@redhat.com>
User-Agent: Mutt/1.5.21 (2010-09-15)
X-Scanned-By: MIMEDefang 2.85 on 10.11.54.8
Authentication-Results: relay.mimecast.com;
	auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=rjones@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: 8bit

On Wed, Mar 16, 2022 at 01:52:48PM +0400, marcandre.lureau@redhat.com wrote:
> From: Marc-Andr Lureau <marcandre.lureau@redhat.com>
> 
> One less qemu-specific macro. It also helps to make some headers/units
> only depend on glib, and thus moved in standalone projects eventually.
> 
> Signed-off-by: Marc-Andr Lureau <marcandre.lureau@redhat.com>

I checked the replacements and couldn't spot any differences (I assume
you used a 'perl -pi.bak -e s///' or similar rather than doing it by
hand?).  Also I checked the macro definitions in
include/qemu/compiler.h vs /usr/include/glib-2.0/glib/gmacros.h and
they're pretty much identical.  I even learned about gnu_printf.  So:

Reviewed-by: Richard W.M. Jones <rjones@redhat.com>

Shouldn't there be a hunk which removes the definition of GCC_FMT_ATTR
from include/qemu/compiler.h?  Maybe that's in another place in the
patch series.

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
Read my programming and virtualization blog: http://rwmj.wordpress.com
virt-top is 'top' for virtual machines.  Tiny program with many
powerful monitoring features, net stats, disk stats, logging, etc.
http://people.redhat.com/~rjones/virt-top



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 12:19:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 12:19:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291170.494024 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUSc8-0006MR-Bd; Wed, 16 Mar 2022 12:18:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291170.494024; Wed, 16 Mar 2022 12:18:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUSc8-0006MK-8j; Wed, 16 Mar 2022 12:18:52 +0000
Received: by outflank-mailman (input) for mailman id 291170;
 Wed, 16 Mar 2022 12:18:50 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=SzCg=T3=aim.com=brchuckz@srs-se1.protection.inumbo.net>)
 id 1nUSc6-0006ME-4h
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 12:18:50 +0000
Received: from sonic317-22.consmr.mail.gq1.yahoo.com
 (sonic317-22.consmr.mail.gq1.yahoo.com [98.137.66.148])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3a575f15-a523-11ec-853b-5f4723681683;
 Wed, 16 Mar 2022 13:18:48 +0100 (CET)
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic317.consmr.mail.gq1.yahoo.com with HTTP; Wed, 16 Mar 2022 12:18:45 +0000
Received: by hermes--canary-production-bf1-766d6d57f5-vvkg6 (VZM Hermes SMTP
 Server) with ESMTPA ID 1f01f6795a4446279f3e878a779a2024; 
 Wed, 16 Mar 2022 12:18:41 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3a575f15-a523-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netscape.net; s=a2048; t=1647433125; bh=9nP1084hJi4wGprAACjUhacQ+LJh8avpuJxGyZJ132Y=; h=Date:Subject:From:To:Cc:References:In-Reply-To:From:Subject:Reply-To; b=UkTj+ID4dDE5OywjSTasPvHVwxfSc1hDtQUNAfceBbY0YRblJKTs5TjognGZ6b6vi09G4mh48FB/eWod0jcEntoRJ3+mn61p8kmaciYhcU3SUTxaOgJRMOy04F9l4NHTsuNRxEiADfH0JbdnbUZJcOg2wSOJ1SN4DCXTMvRrCFV8OLKcXgkTJbfqpCF6SHetYBIKS+HWilWQtQP8cgt1/bDEOMHIFfBrLkEKlegltgPEgYt1Xk5F9CL1dBomlTDbsUnw5cwNMf+lMrGhYCmuunY0ZzeqWwOI13xm78oOIzfw642ZyLMd+Qaclh9+JiZ0OKDg/kHb6670SdzhcW5r3A==
X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1647433125; bh=CEzL6TGYtr3wSg6WHBwYGsmTXtKGWVODu8SkScZiYU9=; h=X-Sonic-MF:Date:Subject:From:To:From:Subject; b=n4qDFmg9MIsSFsTTDWuLVtmUYJ0P5x10SGnWJWwCeiJqtkO+0SFnR3p4BWZ1oaB50lTCLf704iuZRLTLo/345++GXcdYwW/Crhr57WqlF3Ws1AYOfYIMcLb+9nM2UMlL15dmbWNjbLvW7GT6JWTBP2/ThgI2oEHupn+4hzvtQviHtRU2kMo3XIcorlIiQ0IvGCFKYEnrxVkdwWcRvTWohRGhywDbhvf/FVrYqOwbcblHrSBaThkJz1G2xKry3dKW1S0vnNSxzrLwQtIh8G1VGQxi591tKujwYNkBAM3Aua+qcKpjUwORjwFeMgX6QygdJdu3+lZSDEAsFdW1ljwFOw==
X-YMail-OSG: 4AN5O1QVM1mv6193izsaxTQNWWQXMS7cUOSslrErdlDIt9xO3nKhNuFBq15LS8n
 FHIWViXTtGV0j.hrMchT6RZxAL5kwzV.e1F7il2mc7ks9e81xDzu2TwrfdjD87xbPJxTW0zDf9am
 VM7ZzdB._Z0O9T3aAoL_WLbNSObbcGly_jPVi19.ahcZYcba2LqkX.iuUvHf30xbTHJr3p0rmzKO
 Fw5z3yWh7ZW85G6VWUP3X.XDzNeQLSHFBYmo8qGVVludHP3dt4JFTKXqLLV9aIbvfIOMH.x1URNH
 ZStg4iVMxMmYPuRRUDWgJ3XTdM4NZ4tZo_2Zy1lh67w49sxisYVzFURu1oFhry0fdT1i83PynDjp
 ZJCW520zm1PHiZqE6.m7wpBAZS9WAbBPI4F732g8ykPn1jy6z1eCqOkbzgZpycSjgEMZ_gO_.iIC
 2.uG5Wmb1XqigmHeIhAKNvExieIHWPyh6ZbskYyOej__KJoZkcIf44TJoXtF5aAbcjgs5Z1ZAXo_
 JyZFssw6BdLAnuITkc7k3sZigdYwV3GSH5g6z.aPlC3SmHQU2az9NCpwXDhREmw3z9pok68FK2fS
 jelAks7fkCF52tRdDv3UTXhvJ0k.yJoECthATULx.p9XAwz1ZXomn3cWAWSOlg96leDCbVvwjkuV
 nkcxMk8RHCfOj3AwO_k3lk5.Vh7WfQasrYSXqa9W.XLYWkJzl9cDda5hMEaPqwucypnQuDeufyDx
 GDodTo56rxxNammCkbXQjwS.5Gr4Zdr_q3xpIxAjO.AdXMXULejSMXBt8_IzHb4kjwrnR1Ru0HdW
 3MkcpswBB0fjIpju07ruI762qeMBSmMtaCdzqItCnK.83obUsEvgvCXSeTCjedMqTqpBkyb3GH71
 IIn8t6o4VibLhfolgO8DisPLfcu6u6Mhn8AsiqkhB_F9ked0RN92E_dfKHOfl9bBT7JRzhJ6cjI7
 CXdt_sgtQvnbdM3_wRpy.cXuqm0LKhB_ve4SzvOH.JJKxuUWrFV5i83HYdLhGNYI_QY2bSi1YQMA
 _ZEj4NcR0dI21cgEV3F5u2vUxgY9vXHgp0uvZseaIFNAqq8jZpfEg12IzXIPUhHMQsX.snxJZoBW
 jxWgoHmepgFJ8aYwRm3p21fzl07YHGvXm62Unz2RH21Q6eeQ8h8JtmYCsf1kqn.iY2KE64jI8TZu
 50T4latDd9gc.6VaiRCAc8RWUxsJMX7qYFiUzTq64nNW2AQRQv1g9zSqULQS5m0XnY_lDd03lQYP
 aQ.5mWC9NrVKc8emwKElX9idO2nxOQQGjVbZ_wnAwZE_1QT37lGjWRUfyUKquy5eKjm1Qk3CARbG
 OA106kmUIaocDiTVKZDKmCximFvxUvZCV8W7ghdhdkmplVIKWlNEZJI0sfBqQJS3bG0boRqAyLcf
 K.crYrAqoR7h3D.GFLajER2jn8HPqoSC3ev0inflPsyF6jcAah5S.IrcD1rpSKBCwDmXTmcjTB3H
 6Lsvrvj4jj_NpuZaLDXrDY0GS8hBNhlqCkfsBQNb.CSWLU61rw48ubev2NoPrWBPSO6prsqjqeYE
 oxM6_sjh7N2e_M.hGa.Rbhpm5bINQn0h8mGmOSV699g2gGS5sUA2bjQCYPk8ewKxE1OCHiv_V4Pv
 nHej4T8lKPijAXnA6fE2KlQqCWjk_75KhhwdmyOmt_rwpZeHWyZb36tPQarEtGm0hO1bhr1NbpCG
 B59kC2IZZuwbhpICw2XxH.J7uTs6n8C2BiDvsx9vCfkNVDvYdsa6eZTmipUuKQgTm.ywBcjKnCYd
 bRuN2eV2fkQgUoYcTPE6M_AkYSsKSxLnfdHD7EiHpdve9T7FgjMqfsLwNIIOrmz6cKdAVGkaH9ZT
 CdTtYo6cTo_yrRt.mqiBiy1jhLpSMN3oPxBzovJZdJli7YJU2pBa1eUAF6nw6XmQj73.cAd1AL.E
 5BJ4hjQTKGdL49S1wXyLNewkaJ8R9cHe90j0GiOx301fytIm_p0mnaBHtTOnyMnleMUx45oXZIGN
 ZKWsCN16xhsIZxIoCauZ_d6Mg3X0zhokaVtYHmzXGN8pW6_KP.vlnBCh1wxIkHymIwCcCk2_w8Nm
 ujfHqYA7zJP5g9mc.jjcLuYojpX9gf.jA.UBIyzRkBnS_NUdnCTFCn2iCLtHUHHgik8QXXf_Vens
 UcCZChq1joWsrUlrt97qaLIWdS.DYuKEg0A.7YC3cklz9r27iBLS3DrSGYawt350vzh7kSM0f0Gq
 ZMr86Vu4DrFlbjH_QtpdW7NQu2s0q6RrntsRFx1t9AqGtpVNInSv7AY_EferhMXbvcKgE1_u2Tk7
 rniPU54i0958.daoHmz6.wq7UWT4EAfk1t6mx_tNVdbhlT12j6ico2oQOIg--
X-Sonic-MF: <brchuckz@aim.com>
Message-ID: <84f852b5-82cd-ae9e-5f31-97b6e8d78f2d@netscape.net>
Date: Wed, 16 Mar 2022 08:18:39 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [XEN PATCH] tools/libs/light/libxl_pci.c: explicitly grant access
 to Intel IGD opregion
Content-Language: en-US
From: Chuck Zmudzinski <brchuckz@netscape.net>
To: Jan Beulich <jbeulich@suse.com>
Cc: Wei Liu <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>,
 Juergen Gross <jgross@suse.com>, xen-devel@lists.xenproject.org
References: <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz.ref@netscape.net>
 <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz@netscape.net>
 <23f5afb4-c712-f872-acee-7f18b98b73e6@suse.com>
 <da166412-9765-039f-9248-869204d78c36@netscape.net>
In-Reply-To: <da166412-9765-039f-9248-869204d78c36@netscape.net>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-Mailer: WebService/1.1.19878 mail.backend.jedi.jws.acl:role.jedi.acl.token.atz.jws.hermes.aol
Content-Length: 2804

On 3/15/2022 9:27 PM, Chuck Zmudzinski wrote:
>
>
> On 3/15/22 7:38 AM, Jan Beulich wrote:
>> On 14.03.2022 04:41, Chuck Zmudzinski wrote:
>>
>>> @@ -610,6 +612,45 @@ out:
>>>       return ret;
>>>   }
>>>   +static uint32_t sysfs_dev_get_igd_opregion(libxl__gc *gc,
>>> +                                           libxl_device_pci *pci)
>>> +{
>>> +    char *pci_device_config_path =
>>> +            GCSPRINTF(SYSFS_PCI_DEV"/"PCI_BDF"/config",
>>> +                      pci->domain, pci->bus, pci->dev, pci->func);
>>> +    size_t read_items;
>>> +    uint32_t igd_opregion;
>>> +    uint32_t error = 0xffffffff;
>> I think this constant wants to gain a #define, to be able to correlate
>> the use sites. I'm also not sure of the value - in principle the
>> register can hold this value, but of course then it won't be 3 pages.
>>
>
> I have one more comment to add here. I am not intending
> to define igd_opregion as a data structure 3 pages (12k)

Correction: Actually, the igd_opregion itself would be 2 pages.
The three pages comes from the fact that it is not guaranteed
to be page aligned, so it will take three pages to ensure
that it will be fully mapped to the guest. From the commit
message in hvmloader that increased it from two to three
pages:

From: Keir Fraser <keir@xxxxxxx>
Date: Thu, 10 Jan 2013 17:26:24 +0000 (+0000)
Subject: hvmloader: Allocate 3 pages for Intel GPU OpRegion passthrough.
X-Git-Tag: 4.3.0-rc1~546
X-Git-Url:
https://xenbits.xen.org/gitweb/?p=xen.git;a=commitdiff_plain;h=408a9e56343b006c9e58a334f0b97dd2deedf9ac

hvmloader: Allocate 3 pages for Intel GPU OpRegion passthrough.

The 8kB region may not be page aligned, hence requiring 3 pages to
be mapped through.

Signed-off-by: Keir Fraser <keir@xxxxxxx>

In tests on my system, this is true. It was, IIRC,
0x18 (24) bytes offset from a page boundary.

This has an unfortunate side effect of granting
access to one page that the guest does not really
need access to. My well-behaved and trusted Linux
and Windows guests only request the two pages of
the igd_opregion, but it could have accessed the 24
bytes before it or the (4k - 24) bytes after it. I don't
think that greatly increases the security risk of including
this patch, because I think with passthrough of PCI
devices, it must always be to a trusted guest for it to
be secure. I don't think an attacker who gained control
over a guest that has PCI devices passed through to it
would need this exploit to successfully attack the dom0
or control domain from the guest. The damage could
be done whether or not the attacker has access to
that extra page if the attacker gained full control over
a guest with PCI devices passed through to it.

Regards,

Chuck


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 13:09:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 13:09:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291175.494035 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUTOU-00031w-3h; Wed, 16 Mar 2022 13:08:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291175.494035; Wed, 16 Mar 2022 13:08:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUTOU-00031p-0O; Wed, 16 Mar 2022 13:08:50 +0000
Received: by outflank-mailman (input) for mailman id 291175;
 Wed, 16 Mar 2022 13:08:48 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUTOS-00031f-8Q; Wed, 16 Mar 2022 13:08:48 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUTOS-0002yY-5t; Wed, 16 Mar 2022 13:08:48 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUTOR-0006Dv-Q8; Wed, 16 Mar 2022 13:08:47 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUTOR-0007sd-Pi; Wed, 16 Mar 2022 13:08:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=woiNO4ZvN5THK7fCSVyolSLrfh+V9jwL2zju6kAjfZw=; b=VIYE4OxhufY4emnIq9o6bmqZuq
	ehLOYG/AeXxQ235wgssTJYpENU+P6sBF0WUITNgUlyGawrTdFkCCBQ/loaoxUsrakbJU8CPzJfyyJ
	2fTvtpibCdSFWUQEyC4IDhYiaFUVfj8/iIdnhmerZ2XIj0lq/SuVuQS3oPpQha/tHTMA=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168635-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168635: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=33438f7354af9c04cb296fb15a7a79c2c3944c0a
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 16 Mar 2022 13:08:47 +0000

flight 168635 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168635/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 33438f7354af9c04cb296fb15a7a79c2c3944c0a
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   16 days
Failing since        168258  2022-03-01 01:55:31 Z   15 days  150 attempts
Testing same since   168634  2022-03-16 09:11:34 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 698 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 13:12:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 13:12:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291182.494046 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUTRl-0004Q6-JA; Wed, 16 Mar 2022 13:12:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291182.494046; Wed, 16 Mar 2022 13:12:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUTRl-0004Pz-GB; Wed, 16 Mar 2022 13:12:13 +0000
Received: by outflank-mailman (input) for mailman id 291182;
 Wed, 16 Mar 2022 13:12:11 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=SsrA=T3=citrix.com=prvs=067c1f106=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nUTRj-0004Pt-Jg
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 13:12:11 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id aea3f896-a52a-11ec-853b-5f4723681683;
 Wed, 16 Mar 2022 14:12:09 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: aea3f896-a52a-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647436329;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=u7hDWoxS+34gyfjcBBLKForO1fKGP3KgSHWnPRU5r50=;
  b=ZgfJiAfiDhqeudrDuxL13voOf/fOZSx4WlYefbw/qX/qg6qILzu70Bob
   8tSjlnpwhSmSKelp9JWoeL81J9taE2/g/ZqsKVMhRS1fyOBFLxfS7N6qt
   uR5NsfnLvXXHD/FqhPBdGGlCISMbdLXxmxAnsCYCR9DPXHXBg+vSR/W6j
   M=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66311278
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:KRyr+aAICT309hVW/zvjw5YqxClBgxIJ4kV8jS/XYbTApDgm1WMEz
 jdMDDvSaPiMajHwedsnbdyypkwPv5SBxt8yQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vg3NYy6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhP4
 c9oiaCbdzwVAZfzgegecUZbGQ1xaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguwKKsXxMZxZkXZn1TzDVt4tQIzZQrWM7thdtNs1rp4QRq+HP
 ZVJAdZpRDnZXTBLCmhPM7Jkpt2lvVTGb2NfkE3A8MLb5ECMlVcsgdABKuH9ZdiiVchT2EGCq
 Qru72n/Rx0XKtGb4T6E6W63wP/CmzvhX4AfH6H+8eRl6HWRzGEODBwdVXOgvOK0zEW5Xrpix
 1c8o3R06/JorQryE4e7D0bQTGO4UgA0ZfNKNtEGwz+29pXu3B+VBUpbTTRtZ4lz3CMpfgAC2
 liMltLvIDVgtryJVH6QnoupQSOO1Ts9djFbO3JdJecRy5y6+dxo0EqTJjp2OPTt5uAZDw0c1
 NxjQMIWo7wIxfAG2Kyglbwsq2L9/8OZJuLZC+i+Y45E0u+bTNP9D2BLwQKChRqlEGp/ZgLZ1
 JTjs5LChN3i9bnXyESwrBwlRdlFHcqtPjzGmkJIFJI87Tmr8HPLVdkOvG4kdR0waJZdI2WBj
 KrvVeV5v8Y70JyCN/MfXm5MI55ykfiI+SrNC5g4keaikrAuLVTarUmClGab3nz3kVhErE3ME
 czzTCpYNl5DUf4P5GPvH481iOZ3rghjlTK7bc2qlHyPjOvBDEN5vJ9YaTNimMhit/jayOgUm
 v4CX/a3J+J3C7SvPHOIrdZNcTjn7xETXPjLliCeTcbaSiJOE2A9Ef7Bh7Qnfo1uhaNOkenUu
 Hq6XydlJJDX3xUr9S3ihqhfVY7S
IronPort-HdrOrdr: A9a23:t5v/bK1zIhmDDDU/7kNKFAqjBRxyeYIsimQD101hICG9Lfb2qy
 n+ppgmPEHP5Qr5AEtQ5OxpOMG7MBbhHQYc2/hfAV7QZnibhILOFvAt0WKC+UytJ8SazIBgPM
 hbAtFD4bHLfDtHZIPBkXOF+rUbsZi6GcKT9J/jJh5WJGkAAcAB0+46MHfhLqQffngcOXNTLu
 v52iMznUvHRZ1hVLXdOpBqZZmgm/T70LbdJTIWDR8u7weDyRmy7qThLhSe1hACFxtS3LYL6w
 H+4kzEz5Tml8v+5g7X1mfV4ZgTssDm0MF/CMuFjdVQAinwizyveJ9qV9S5zXMISaCUmRQXee
 v30lMd1vdImjTsl6aO0F3QMjzboXMTArnZuAalaDXY0JTErXkBerV8bMpiA2XkAgwbzYtBOe
 twrhKkX9A8N2KwoA3to9fPTB1kjUyyvD4rlvMSlWVWVc8EZKZWtpF3xjIfLH4sJlOy1GkcKp
 gnMCgc3ocjTXqKK3TC+mV/yt2lWXo+Wh+AX0gZo8SQlzxbhmpwwUcUzNEW2i5ozuNxd7BUo+
 Dfdqh4nrBHScEbKap7GecaWMOyTmjAWwjFPm6eKUnuUKsHJ3XOoZjq56hd3pDhRLUYiJ8p3J
 jRWlJRsmA/P0roFM2VxZVOtgvARW2sNA6dvP22J6IJzYEUaICbQxFrEmpe4PdIi89vd/HmZw
 ==
X-IronPort-AV: E=Sophos;i="5.90,186,1643691600"; 
   d="scan'208";a="66311278"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=V+O/3ZlRonscei/2MZ6zzd2KMoop0Vj9g5+oAqUhpVD3U7ENV336WadkRjlLgF/HJMLWatR708p5ZbF+yWXb7/+/9Hdfl22PvEdc8PQYGawLM/A1HmGCwp6LmfUz18T2sdIL3p9nDRfbMFmFJzhP0/WooLTYIcFqwPZtzgQkDhZHUKXL+Pa/LhDblGh1M1hoK1wXMcfIkdylHC0QnenyxsB4MOlw0AueTNCK4k1OLcLPfkgQ49S6n/gt6I7XqtEzrO2+XQ81JzYFG2qcAJSB5ijhI+5YrGTS+ISSrzyYzMelU3vmMaB9aUdnaEFAbquEKzO8WG9m1SM+/P64llRpug==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=u7hDWoxS+34gyfjcBBLKForO1fKGP3KgSHWnPRU5r50=;
 b=FE/KLuBlBSpEaSTzaDo5opww1pMcU+jR05SfIRqnOiOfv2n3shF0cMsb992+5JkJXMpY6I7zSFQQOe1wEZoOp9hVSybb+ntC1XFXPF5ETslnIzO89isvJi+ym/cxbDh8H65l6lwm8gYjQ8/zWyEpRo/KQAR0hIYjfDWKlZqEtRFQzVriQWbOqv3jzZzC8hnygcz7KdVbqs7R9BpOwL43E0Yn9fLJH6RVFuWlDVYpVoY1lTQZ3CVdBqXIb4cRiinUwLomIwJCFwcwOlvrLQcfHW4z6jYBlhj3MpXorLTcAgcNhxCEN6dJcFQvly0wJRY2bBOUO1hLhEtHq4VxJ3bwcA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=u7hDWoxS+34gyfjcBBLKForO1fKGP3KgSHWnPRU5r50=;
 b=Zzt/YTE7v5ckWNxM3XFOHc/roxl0toUUPeEcMdAEE4+u5ITUoNUnzbrXO6TNXv1bl2emsvuSZGJwH15mSCzEgO40nAUN3gcQsLrmTtG77JOOmEI9P5fvfittrEnuBVqDPUlcQlymnw2ZHmYqfdEIg41y5st0saINJkr6w5vZbqk=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Wei Liu <wl@xen.org>, Roger Pau Monne <roger.pau@citrix.com>
Subject: Re: [PATCH] x86emul/test: correct VCVTUSI2S{S,D} comments in
 predicates test
Thread-Topic: [PATCH] x86emul/test: correct VCVTUSI2S{S,D} comments in
 predicates test
Thread-Index: AQHYOSMTF1LKw8bS+UCSoPU3HI63yazB/JSA
Date: Wed, 16 Mar 2022 13:12:04 +0000
Message-ID: <ead1f73c-0d7e-3ee8-f464-a0ca28c9fd62@citrix.com>
References: <85dd9ad2-0eea-432c-24d2-40c6530776dc@suse.com>
In-Reply-To: <85dd9ad2-0eea-432c-24d2-40c6530776dc@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 7c6e8bdb-d077-4b4d-ed33-08da074e9133
x-ms-traffictypediagnostic: DM5PR03MB3306:EE_
x-microsoft-antispam-prvs: <DM5PR03MB3306319C9331CAC65FDEDC35BA119@DM5PR03MB3306.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: RlK/JByb2Y+Z8DIA6BqbVof/EkNfEvCuyXyMV40O9pNn9f/1FD0SzXaaKFvslFmVS25NXf3qL1Mb+YvzNR/FfJviaQA9LNv+zt6tK5ZsatYHaWmqZ1IlR3WmTu+jD4Vjy5GsrkSN/ZL01sTX9F4Auf5hkmlkU5SueQsufT3lSc/r7ZT8sG8ek1smYSZVgw3SPx9M54pJulyspR/q47WaGKbwFgtTiqNNk/jj66k+tMqqU+YHoTBfMlRBvWqV/Xl6/Mi9/WXMfGnkt3xUiEr4Y++FE14GW3RejU7XxH7cMpfZBVzhMl0InL2S2uPvM82QNFJ/KvK8X0YMIc0y+w8dSoiZztNdR3yCwdZqfrogyFAp1Qs3bYcGPeYtkH+tCa3bDEKVzreMXVKNWDrTxeKCvAoNkqZVRoQDIDxtlTsGAXtWv+eTtWQp2bG+dYQx0vXnztwMtB6D3aojctQxWuneSt5/hmBmAUnsxtj3ZUF0Z2WI9D6+hSm+jjs5s2EmJ5+s26l5H3jNSAVMv96D92hWVxCGjGehx3bGua6A9MGZqfuUlEl5Y+7gOfC6JUxr6ikAW7idpfkk8F9Z9lebt5eUDmQGUmtDNl8fK8rosTAhGhds3g8m3I6qvALIFA9bzpQgKLUizUeC3K5uF46z8YrlQwjIoj7V5wFK06Be68VBTnwhumYS+Yl/sbKzAVoIpsohn+XADLZWQKstYfPrjOUAPqevqAP2FaMnCGAdhJXtAmr/ahzWWiQKaeppsPKe7DZOhVmr5cZC1OCX9Cbyn7mVJg==
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(82960400001)(71200400001)(38100700002)(2616005)(122000001)(316002)(8676002)(26005)(186003)(4326008)(110136005)(6512007)(86362001)(54906003)(6486002)(107886003)(5660300002)(2906002)(31696002)(38070700005)(6506007)(31686004)(91956017)(66946007)(53546011)(64756008)(66446008)(66476007)(66556008)(508600001)(76116006)(36756003)(558084003)(8936002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?UFlocVA0Qm1ScHRiWk54eDRkMXdTQTNxQjdPVTVCOHphOFJaSGtiWlRqT0xJ?=
 =?utf-8?B?Q3NsdVdlQXU2NGJrTHY0eDMza3gwL2t2Qng4emdmNWFxT1NjdHRYbEdXRGx2?=
 =?utf-8?B?VG9YUVcrYkxGNjBlazZHVDdPdDkxVzBvUU5Od1pzcElqYmw4SDlzNzJpYjA3?=
 =?utf-8?B?MVlrUnRIaTFUY043WHlKQ00zMFB3SmtSTG14Y3dwVTlnd1NRVm9LK1ZIWmJ0?=
 =?utf-8?B?VFlSVGhFRzNNWmhDWTh0dDF5T3E3MlorQUVFQnNIN05pYjcvaEc4YTluRGVT?=
 =?utf-8?B?ZmdsL2lGdGY2Q0t1V1B2UVRGZ2VoVE45RjdRa1p1V01NRTk0Qmg3VmZxSEc0?=
 =?utf-8?B?T2dVemZCVHJMVVJhQUIzWks0S1NPVnZTcGpyZXJnYk1DVlQ2dXFhcnNoZFJS?=
 =?utf-8?B?OGZPVS9HTGVxRXA2WTJlblhVb3dTSUFhb1B6dHB1cXZ2d0hVclVWejlSSjJl?=
 =?utf-8?B?U2ovZWtFK3JFNDRpRGJYeklkU1hieUkwUC9aazgxZXJTYnA1aGlGRVlkdG5E?=
 =?utf-8?B?UGIrL2VCOWphdDdQY2VBRFhSMmJ2YkFhREN6N2VqOVN0M09UbTRvR1Z3QWoy?=
 =?utf-8?B?U3g1MUt4d3VsK2drMEpyK1Y4S3VpTnlzTXhHUG1FZTZUVTYreS9VMlBmS2hL?=
 =?utf-8?B?NWZRS1h6NTV6UlV6aU42T0VKdkJwNVduUXlELy9DbzdiMkZJUHFPWmhQclk2?=
 =?utf-8?B?SjJrTDdUSnl0SG4vZHV1K2tQWFpleUJlMDhvalAyTW1xb202b0RtVE9FUzNk?=
 =?utf-8?B?K1h5SmRFTFZOR21GRW9FWEwwQ2ZtelBJSnNLWGNHaEs3RnFNUkpGRDRtekEx?=
 =?utf-8?B?NVE4MHRKU3VxdGRSdXM2a1dEc29rRFQ1bkM1VXhHbUZRVEFJaWhWbVl1VlpB?=
 =?utf-8?B?WXU4TGtiVVJTek5IZWs4SXlnL0hITUt3ZzdZSjJQcldJNkk3dEpqL0t6TFZq?=
 =?utf-8?B?SW9zWEpTbUlEUFNQTHMvUWg1Y2U3VHYzRTFjcW9lOEF0Mkt6M0twSUY1Q1dF?=
 =?utf-8?B?bi9yQUZTaTk5NU4vL3IwSmt0MHJzNUV3Z0I3RStLN3JiN3Q1cnQ5QUl3ektR?=
 =?utf-8?B?VEpucUxQNWFLeEJqMWVPTXFadUFmUklTeW9BSklOdHdFdmxRUFBST2JDcTdM?=
 =?utf-8?B?MXVvRXhXOUVHYXp5a21JYU15UTdnWHYzQW5KK21mRDNWcHk5S2R1MTRJb0Mz?=
 =?utf-8?B?eElLRUI4NWpaai9DUHlnNk1tQXkwcFJaNXpUbXQvVVFPZHdIZjJkcGtvMGln?=
 =?utf-8?B?WmxSZWxoZlRKM3oyaTU2K2RnR2ltU2IreFZrejVVQWFLOGMzcVVCTnd4Ukkz?=
 =?utf-8?B?RW5HaW83QVZwdyswanVvdFdKcTcvS0YzcU4xNEI3K2hJNGx3SUc2dEtRemZ0?=
 =?utf-8?B?cE9nbllGQVhCU1JPanY2UWZQNlBmYnNLWHBmMms3akljY0RwMWRyclVRd0dE?=
 =?utf-8?B?VTVTZFZXVTgvZVUvNktjbC9JeTc4OEc2cmRTd2FjemliREhpS1RPSHlZbExH?=
 =?utf-8?B?cmlPUDZlZlExK1E3YTVsQkl5RGVFN1psTFIvR2xqak1DakErcGo0M2xsRG9p?=
 =?utf-8?B?bjYybkppekFYTGZ2QnBzSmpUNXU0NUZ2b1d5Mm5xYjFvWGYxRlJ6S3NXTldr?=
 =?utf-8?B?ZkNmemRBdG1NTklKTzA5UHdFb0E3OXpHOWNldDZnUkx0YlBUYzExZXdCNmh1?=
 =?utf-8?B?YVBCdWJiZTBodnVpNjAvSnlZTytWUjY5bE1EMDd6ekliRG9DMTlTMnk3N0pr?=
 =?utf-8?B?WGtnOFVqU3ArRllIMzlxOVBRdDBUeUFsWGFGRWZaMklIUnBldFpjdExCTGVs?=
 =?utf-8?B?YjdkMktzTVhldGpZdkxPa0U4NzBaZ1dGL3lNWWdYSkdXNnhiTXMxZ3VHcnN3?=
 =?utf-8?B?ajlCQXFWdmJVQlVzOFVlOGJvemtsYndkYjY0WjhKdXF5UVV3d2h3TW1YWHdq?=
 =?utf-8?Q?UBfOO7e4RBpmd6TT3Rd2LYRB6GXZ2x5F?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <BF319104D5E5D340BFF201E4361C6492@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7c6e8bdb-d077-4b4d-ed33-08da074e9133
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Mar 2022 13:12:04.8945
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 4NbQosFz3/bC30TFc9WJdWlD1JcExxNqXeFB6J5R0S1EIkOkMpgUiTrhJGusLjpCjR4KA04uqyxaCRDeQk+8Dnj2yV4YcH/ua5d2dIGG2Us=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR03MB3306
X-OriginatorOrg: citrix.com

T24gMTYvMDMvMjAyMiAxMDo0NSwgSmFuIEJldWxpY2ggd3JvdGU6DQo+IFRoZXNlIHdlcmUgbWlz
c2luZyB0aGUgc2l6ZS1pbmRpY2F0aW5nIHN1ZmZpeGVzLg0KPg0KPiBTaWduZWQtb2ZmLWJ5OiBK
YW4gQmV1bGljaCA8amJldWxpY2hAc3VzZS5jb20+DQoNCkFja2VkLWJ5OiBBbmRyZXcgQ29vcGVy
IDxhbmRyZXcuY29vcGVyM0BjaXRyaXguY29tPg0K


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 13:12:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 13:12:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291187.494057 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUTSH-0004xI-02; Wed, 16 Mar 2022 13:12:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291187.494057; Wed, 16 Mar 2022 13:12:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUTSG-0004xB-TB; Wed, 16 Mar 2022 13:12:44 +0000
Received: by outflank-mailman (input) for mailman id 291187;
 Wed, 16 Mar 2022 13:12:43 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=SsrA=T3=citrix.com=prvs=067c1f106=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nUTSF-0004ne-IG
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 13:12:43 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id c15357ad-a52a-11ec-8eba-a37418f5ba1a;
 Wed, 16 Mar 2022 14:12:42 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c15357ad-a52a-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647436362;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=qgrN9qCKWRTkoyS+nzaFnibP3J8EdIgeNnMadD/71Ds=;
  b=ia/KfAExTG1gUfXmQUCaxUoPBxUkV7hguBt0rZ8hJLIZPoP2xW4zl61v
   15IZ07sXlZmfwGmcHRhOtXq6k0qWvy8a5LR9CfLb231Rwc915K4/fR0ym
   Dd2G6Qxa5JyUYmM2S/+66ujNO9OUqoSurLTsDn8+hgJqrvktSxcps+YF7
   o=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66786621
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:1WbIAaLulylpYNfIFE+Rw5UlxSXFcZb7ZxGr2PjKsXjdYENSgzMGz
 zAWWjjUbKzeZmXxe951Poy2/EoPuJOAn9VmS1FlqX01Q3x08seUXt7xwmUcns+xwm8vaGo9s
 q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUYYoAQgsA148IMsdoUg7wbRh2dc22YLR7z6l4
 rseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3fMldG0DQUIhMdtNWc
 s6YpF2PEsE1yD92Yj+tuu6TnkTn2dc+NyDW4pZdc/DKbhSvOkXee0v0XRYRQR4/ttmHozx+4
 PVSu42oFkQvB6CSiNhFUxBEQjMiJYQTrdcrIVDn2SCS50jPcn+qyPRyFkAme4Yf/46bA0kXq
 6ZecmpUKEne2aTmm9pXScE17ignBODtMJkSpTdLyjbBAOx9aZvCX7/L9ZlT2zJYasVmQ6iBN
 5RHM2MHgBLobyF3eUczIY4Es8zy2SL7SB9mgm+UnP9ii4TU5FMoi+W8WDbPQfSVQe1Fk0Deo
 XjJl0zpDxdfONGBxD6t9nO3mvSJjS79QJgVFrCz6rhtmlL77m4ZBQASVFC7ieKkkUP4UNVaQ
 3H44QJ38/J0rhbyCICgAVvo+xZooyLwRfJwDOMr8F7OzJPZvRalXmgNUm9TNMQP4ZpeqSMR6
 neFmNbgBDpKubKTSG6A+rr8kQ5eKRT5PkdZO3ZaEFJtD83L5dhq00mRFooL/Lud1IWdJN3m/
 9ydQMHSbZ03hNVD6ai09Euvb9mE9smQFV5dCuk6swuYAuJFiGyNOtTABbvzt68owGOlor+p5
 yBsdy+2trxmMH11vHbRKNjh5Znwjxp/DBXSgER0A74q/Cm39niocOh4uW8iex04aJ9eKWazO
 ic/XD+9ArcIZRNGioctP+qM5zkCl/C8RbwJqNiJBjaxXnSBXFDep3w/DaJh92vsjFItgckC1
 WSzKq6R4YIhIf0/llKeHr5FuZdyn3xW7T6DFPjTkkX8uZLDNSH9dFvwGAbXBgzPxPjf+1u9H
 hc2H5bi9iizp8WlO3iJq9FPdQ5WRZX5bLivw/Fqmie4ClMOMEkqCuPLwKNnfIpgnq9PkfzP8
 G37UUhdoGcTT1WdQelWQhiPsI/SYKs=
IronPort-HdrOrdr: A9a23:dl3bCKPpaavgeMBcTvmjsMiBIKoaSvp037BL7TEWdfU7SK2lfq
 yV/MjztiWE7wr5OktQ/OxoUZPoKRi3mPIbj7X5W43SPzUO01HYSL2Kg7GSoQEJx0XFh5NgPN
 xbAtFD4RnLfCAK9reBkXWFL+o=
X-IronPort-AV: E=Sophos;i="5.90,186,1643691600"; 
   d="scan'208";a="66786621"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=eGk2dEFTltuIfXC/1rmSvKXkFgFxHOj/dHjDrqSFWob8rpePbV4eoQNJace7r3VUld/5SJfelwhaFhmd5j29XD8a1dIgNQtcFIUiydq5wUzmdC3/J6YUH0MQddxWK/Ajja7GMMisqARWQMmEs7Z31Dkg8VwhfxJtLcnnBc6XsxjXAmnBIZA33XqgS+KLlPWHwT2unnpNWtY2unTON/H4awKQN4ms3h0b4zt4ZZ8w32auS7GEY2zYBc8l1Rs5AXyxc325ugPQhn7/IJLMISzto2MLvR/yETDqaeMTJ7Tt27FM7MGZaGBs4p1QcDnQ9LCB95S/+ulaVEmh2k1+i2TC7A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=qgrN9qCKWRTkoyS+nzaFnibP3J8EdIgeNnMadD/71Ds=;
 b=DOYEF3ARPmFR+EivePPZG3ssMl40Wueg0nbsA0OcgmUKJ47gYoq8Ol3dZ+YC/klHLjQZ2UXkoyajZjcyz0V8t1M7Mq2q76Kjjwd97368O20qUvsfzdX21b/jSz3e9+5YM9qoJc4K7nATGKNtU6tHYOnd6yfpIRIQ74WoinT5ybfBsFidPCxfQisnV8dt9pmFdL0gt/rFBwSZ20XXdXr0Mhs2cY/7ixZo9/HTRoQrCACfwmjVCJ2Y0SRleGnp60od/DqVOI8X7vwrE4rcOudDHlZaldx07vhwtibQJp8Ex3pqFhtN4Qpfv0lYJK2SeOCUhJFZgBEpYm0d+bnhlK+kOA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=qgrN9qCKWRTkoyS+nzaFnibP3J8EdIgeNnMadD/71Ds=;
 b=cMOCGDlROqy06tCRnb4fMBJPJhxAixSwnKVD0M59eEL8gOEleZ3eYVtqqje7O/KQoYKry20pUyXis1wK6rHGSXDrJgs3o5NeVlG49vsMbl0dD+mKrhI7Dqu0AsyIb6OX9Xx30hT4wdo8HaszZcvycDf5OGdOF/INuqIXvvpOMzs=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Wei Liu <wl@xen.org>, Roger Pau Monne <roger.pau@citrix.com>
Subject: Re: [PATCH] x86emul/test: correct VSCALEF{P,S}{S,D} entries in
 predicates test
Thread-Topic: [PATCH] x86emul/test: correct VSCALEF{P,S}{S,D} entries in
 predicates test
Thread-Index: AQHYOSLNg3H8C77Xb0mvzMc8RyaswKzB/LuA
Date: Wed, 16 Mar 2022 13:12:35 +0000
Message-ID: <0dd4a4cc-cc8a-9c7c-e1bd-28e947b5b037@citrix.com>
References: <cadc8c33-5310-ed9d-69c1-96e41f266b39@suse.com>
In-Reply-To: <cadc8c33-5310-ed9d-69c1-96e41f266b39@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 7d53b709-62b6-4de4-e7a4-08da074ea363
x-ms-traffictypediagnostic: DM5PR03MB3306:EE_
x-microsoft-antispam-prvs: <DM5PR03MB3306ED989EF8FD671AAE85C1BA119@DM5PR03MB3306.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(82960400001)(71200400001)(38100700002)(2616005)(122000001)(316002)(8676002)(26005)(186003)(4326008)(110136005)(6512007)(86362001)(54906003)(6486002)(107886003)(5660300002)(2906002)(31696002)(38070700005)(6506007)(31686004)(91956017)(66946007)(53546011)(64756008)(66446008)(66476007)(66556008)(508600001)(76116006)(36756003)(558084003)(8936002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?dEhBWFlwMnFxcnlaQWNUZFRpczVpRitKM0twalRkMm5UTllpSmVCWlArR1lZ?=
 =?utf-8?B?M3ErUnlzS2Z2OGZYdXU2a0hza25sc1Y3NDhCMnZsRzEwNFBqaVk1d3RpNjlE?=
 =?utf-8?B?NlNWY1V2cGo0dEE3QVFwY3lhS0U4VHNNMnlzbEtzOTNaUnlFN256NDFiLzRi?=
 =?utf-8?B?NkZIbVhuMjRUL0IwYzU4bTQzQVduZXhtTzZRSVcwS0V5b0NDbEpSejI0VnFZ?=
 =?utf-8?B?OGtvNUN3eUgycVVFZVpBV2NXOGdOTVA0WWs2amR4YTdEMXVoVjY4WXFFRUtx?=
 =?utf-8?B?OTlUbjYzdHNCSkVmY1ZmS1BYdytuY0hLaDIrNXJGNzc3d1AxT2NycVRLY0cv?=
 =?utf-8?B?UXdENzBOcm0rY0JmUmJZRmxSN0NKYlVSTzFmamkvZlZxZXBMaXJ1Q3ZacFBP?=
 =?utf-8?B?YVhhTjlFczdGUXVlT0pIeHZQOThNcWU0Nzl0dzZiRmM3c0k3K1l4SzZPckhi?=
 =?utf-8?B?UlMzWkd4QXZveG1ZWm5ZUGJrOWZTZDE0bDcvUjFDNjROT25wZDBucDB5UzJR?=
 =?utf-8?B?OGl3MVBjSWp0Wmh4M2lzMlhiTFJoRks0TUdRT0dzSG5ybzFoNmlaelFLejly?=
 =?utf-8?B?WE53TWs2ZmtqekhvZXBsdDg2elRyTnVRL2hodG5WS2kzUytzaUk0VVVlaExz?=
 =?utf-8?B?cnNIWUpteDFzZUlVRTZwMEswQko4dVRqeVJINEZMS2x5SVBYQWs1S3ZUTGkw?=
 =?utf-8?B?QjVKaE56SkhvVjU5aTNtWEJUVTVXTG00QUNlMER0MnhJZ0J6SzFEdmtaYmtF?=
 =?utf-8?B?VHZUakJRaWprK0drUWVCRk5jcGE3dzlLMU9TampSdGpkWlp5c0JUbC9HaDVL?=
 =?utf-8?B?OHNDT0xyelVzeE1jR2o5MEhmVUg0Mi8rbjl3cUdNcDlQaXhJeWM4cGVpb0Jl?=
 =?utf-8?B?SlRmeWhWZ0dDSzQ0R1lacVhSTkwxSkFvTzBBckJXc0xWcXBuTDQxVkwvV0lT?=
 =?utf-8?B?ejdHQ3J5TE9mRk12ZkRwdlVzdzlidW1iNUs0RWQ2eW5odzVnQ3dhdmhZL2Z5?=
 =?utf-8?B?NEZjd3NtdncxaDVmNlBJSXA4Vkxmek9nd094MkhpNnNoWmhhbkpHZVRBbEt4?=
 =?utf-8?B?L0R4V2FyOE5BTnFvMjk0TzNRSHhCMk83ZFFYZTRSZGtwMk02WERaQUVnWGFF?=
 =?utf-8?B?TTI5OE1IQ3RVeVl3bTVFbXNSR0puM09NeFdMRStqSWZrM1p0N21LSHArVDZ0?=
 =?utf-8?B?S2NwaXRkRzBTOTltazhYOC9sNVZHRXMyMFlaT2twZCtwV1BWVzBQeEcySTRx?=
 =?utf-8?B?VGNPWFNNQ05LUzdLcUY5RWVpOUZialAzczRiYXc2NDBMUmdJYmlBRHRHby9P?=
 =?utf-8?B?cEpvK1RMeVFEWEZyZW51eFNWTUx1QUROVnFQNzdQTGhzSDlSS0kxZGlLMG1I?=
 =?utf-8?B?azErNmM2YkcrYTlYdkdranJvNXpXVC9wa1NQOEtmVmVneXl3Q01iZ2ZDaW5I?=
 =?utf-8?B?ZDJaOGVnWmZOMjk0ZzVyckZoQWR2TCtOT3E3d3dUNk1YYlorREVDWWs5bXRF?=
 =?utf-8?B?czYrRU1WdzdJandOa2xRTXNFcmhCcTFjS1pOTzBTZ3NFLzZORFF1Zld2VTUz?=
 =?utf-8?B?czNkcWMydUZlanVYQnlKeHJYdGdMMjZKNmlqSFNyd1M3QnhUd3NFMmU5R1pV?=
 =?utf-8?B?QXU0cnZna0JqS21ydURZVXRiaEM4N2tkeUpsR2Q3N1hqUnd1M2JrSGtpYVNV?=
 =?utf-8?B?dWNpeXBGelRUMlMxVHZCV3NnWGhaR25CWFIzNUpkbDRGMmh2eWJXRkdYcUNt?=
 =?utf-8?B?UmhmcFRaRm9MZlFPOUVKcFF1RFowRjJEZTkybVlvQ0haRFdROUpWOEZrd21h?=
 =?utf-8?B?Z1Z0eU9oWlcvUkQ1YjJHbUNieVhrVHRtZHRZOEE3SndyNktnbmNNS1dHWW9y?=
 =?utf-8?B?L1E2RzMzRndpdnBlWkJDYlUwd2JuNnMwOCtlT2h6NE5oVm5aWHJwNkxRQU1n?=
 =?utf-8?Q?MJI828HLyaTQHVDCVPycdznHBR4SMCzT?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <B6F9AF8204201048AF4A2B1C91E24E39@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7d53b709-62b6-4de4-e7a4-08da074ea363
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Mar 2022 13:12:35.5173
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: SVN9Cttq5ZUKYBbtPvpL/hwM+aByezXxmDIwZJAqQNAlRQ7L3SlYIRa0gOUUIVEnLNI8OHxJdlt12mgekvOw+ot/tVQvxDWgf6DUbS2Mox4=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR03MB3306
X-OriginatorOrg: citrix.com

T24gMTYvMDMvMjAyMiAxMDo0MywgSmFuIEJldWxpY2ggd3JvdGU6DQo+IEkgY2FuJ3Qgc2VlIHdo
eSB0aGVzZSB3b3VsZCB3YW50IC8gbmVlZCB0byBzdXBwcmVzcyB0ZXN0aW5nIG9mIHRoZQ0KPiBy
ZWdpc3RlciBmb3JtcyBvZiB0aGUgaW5zbnMuIFF1aXRlIGxpa2VseSBhIGNvcHktYW5kLXBhc3Rl
IG92ZXJzaWdodA0KPiB3aGVuIG9yaWdpbmFsbHkgY3JlYXRpbmcgdGhlIHRhYmxlLg0KPg0KPiBT
aWduZWQtb2ZmLWJ5OiBKYW4gQmV1bGljaCA8amJldWxpY2hAc3VzZS5jb20+DQoNCkFja2VkLWJ5
OiBBbmRyZXcgQ29vcGVyIDxhbmRyZXcuY29vcGVyM0BjaXRyaXguY29tPg0K


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 13:16:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 13:16:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291190.494067 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUTVc-0005i8-Ep; Wed, 16 Mar 2022 13:16:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291190.494067; Wed, 16 Mar 2022 13:16:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUTVc-0005i1-Bu; Wed, 16 Mar 2022 13:16:12 +0000
Received: by outflank-mailman (input) for mailman id 291190;
 Wed, 16 Mar 2022 13:16:10 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=cw/8=T3=gmail.com=philippe.mathieu.daude@srs-se1.protection.inumbo.net>)
 id 1nUTVa-0005hv-Sh
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 13:16:10 +0000
Received: from mail-wm1-x333.google.com (mail-wm1-x333.google.com
 [2a00:1450:4864:20::333])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3ea3c16e-a52b-11ec-853b-5f4723681683;
 Wed, 16 Mar 2022 14:16:09 +0100 (CET)
Received: by mail-wm1-x333.google.com with SMTP id
 n33-20020a05600c3ba100b003832caf7f3aso2525389wms.0
 for <xen-devel@lists.xenproject.org>; Wed, 16 Mar 2022 06:16:09 -0700 (PDT)
Received: from [192.168.1.115] ([185.126.107.38])
 by smtp.gmail.com with ESMTPSA id
 x3-20020a5d6b43000000b001e317fb86ecsm1699775wrw.57.2022.03.16.06.16.06
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Wed, 16 Mar 2022 06:16:08 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3ea3c16e-a52b-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=message-id:date:mime-version:user-agent:subject:content-language:to
         :cc:references:from:in-reply-to:content-transfer-encoding;
        bh=4JyIZgrE4P1Kn4wn07mmEvGGdYL63aqq7IDLnDUN0K4=;
        b=jU1+7OR0KHqAMwZSSC/AcyyfNbvez9kPQm09bYq4lrlWZsb0JAXV8pFTYoGRmngNft
         wJVP/QRVBGT+zv4eB7b9kU3ehp5LKO0WZ241yTPHIFn23dA8DNQyDwwq6TTIaAucarMx
         cCZEjICjiQ1nMgKmycyXt3ZIUCZ7jCx4yEFukj3M5rc2dCO1w1nqxGMYzD666z5c2biF
         AsVuyY0vGpjDnccH35/Y61O1IYfAkXZVlhVqWKvtWrHjwED0ttkaPnOgPke7EOw/tEzy
         O5DNRh+0bmuNwiDRZM4zCec1pjoaHyA2Fc8ZeODmMFP21dvx3i6g6cFJJDUN3+FiAJJv
         ZG4g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:message-id:date:mime-version:user-agent:subject
         :content-language:to:cc:references:from:in-reply-to
         :content-transfer-encoding;
        bh=4JyIZgrE4P1Kn4wn07mmEvGGdYL63aqq7IDLnDUN0K4=;
        b=ABNrlgB4g7+lIDnwqRrPAJCPy3KLhO0Blt0426hAEzFfU9eSf/SGoJvARAE6k4kqc2
         lvp5FwJJCsyLnpfb5FxBltJd62t3m0lMws3YnNwNoWE9phgDQCFZtRqCeIicx5CB8pti
         9T/ZYom7ofjbrpOzD0oTcBmu1gQYSJ71O56DyN7BKN/KYFl0n9EunkVUvhzguJro2WYu
         YFedP42aVz3FKSXh6IClM2yn+kURpKytzOOueX53PVgsZzeSAMU/ar4a0blYwDm4HpZw
         l+9dMezgmLhEZvsOqkq36RPe4/munZ53CV9nPswoR5bSXUcWpTdZvXMPGT7QvsjWogFq
         efNA==
X-Gm-Message-State: AOAM531r86YX5vd7MTK46BJsrk0Nj2qxUJ61IzAQkYWLpOMNnB85HJmC
	DVUKM9Td6KqfmvmuNZM8jXg=
X-Google-Smtp-Source: ABdhPJxZB6EkbrGbgbe1OHgAv3zK0P0DzBIxwvVRDujT7ZmPCtls8E9A1Qp3gQmydUuyyzx17yk30Q==
X-Received: by 2002:a05:600c:35ce:b0:38c:7457:425 with SMTP id r14-20020a05600c35ce00b0038c74570425mr484570wmq.200.1647436569158;
        Wed, 16 Mar 2022 06:16:09 -0700 (PDT)
Message-ID: <dce310d7-35a6-d3df-734a-c9d184fc282c@gmail.com>
Date: Wed, 16 Mar 2022 14:16:05 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH 07/27] Replace GCC_FMT_ATTR with G_GNUC_PRINTF
Content-Language: en-US
To: marcandre.lureau@redhat.com, qemu-devel@nongnu.org
Cc: Gerd Hoffmann <kraxel@redhat.com>,
 Christian Schoenebeck <qemu_oss@crudebyte.com>,
 =?UTF-8?Q?Philippe_Mathieu-Daud=c3=a9?= <f4bug@amsat.org>,
 Thomas Huth <huth@tuxfamily.org>, Stefan Hajnoczi <stefanha@redhat.com>,
 Kevin Wolf <kwolf@redhat.com>, Hanna Reitz <hreitz@redhat.com>,
 "Richard W.M. Jones" <rjones@redhat.com>, Warner Losh <imp@bsdimp.com>,
 Kyle Evans <kevans@freebsd.org>, Greg Kurz <groug@kaod.org>,
 "Michael S. Tsirkin" <mst@redhat.com>, Igor Mammedov <imammedo@redhat.com>,
 Ani Sinha <ani@anisinha.ca>, Huacai Chen <chenhuacai@kernel.org>,
 Jiaxun Yang <jiaxun.yang@flygoat.com>, Aurelien Jarno
 <aurelien@aurel32.net>, Jiri Pirko <jiri@resnulli.us>,
 Jason Wang <jasowang@redhat.com>, Stefano Stabellini
 <sstabellini@kernel.org>, Anthony Perard <anthony.perard@citrix.com>,
 Paul Durrant <paul@xen.org>, Paolo Bonzini <pbonzini@redhat.com>,
 Eduardo Habkost <eduardo@habkost.net>,
 Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
 Yanan Wang <wangyanan55@huawei.com>, Markus Armbruster <armbru@redhat.com>,
 Michael Roth <michael.roth@amd.com>, =?UTF-8?Q?Daniel_P=2e_Berrang=c3=a9?=
 <berrange@redhat.com>, "Dr. David Alan Gilbert" <dgilbert@redhat.com>,
 Eric Blake <eblake@redhat.com>,
 Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>,
 Konstantin Kostiuk <kkostiuk@redhat.com>, Laurent Vivier
 <lvivier@redhat.com>, "open list:blkverify" <qemu-block@nongnu.org>,
 "open list:X86 Xen CPUs" <xen-devel@lists.xenproject.org>
References: <20220316095248.2613601-1-marcandre.lureau@redhat.com>
From: =?UTF-8?Q?Philippe_Mathieu-Daud=c3=a9?=
 <philippe.mathieu.daude@gmail.com>
In-Reply-To: <20220316095248.2613601-1-marcandre.lureau@redhat.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

On 16/3/22 10:52, marcandre.lureau@redhat.com wrote:
> From: Marc-André Lureau <marcandre.lureau@redhat.com>
> 
> One less qemu-specific macro. It also helps to make some headers/units
> only depend on glib, and thus moved in standalone projects eventually.
> 
> Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
> ---
>   audio/audio.h                           |  4 +--
>   block/qcow2.h                           |  2 +-
>   bsd-user/qemu.h                         |  2 +-
>   hw/display/qxl.h                        |  2 +-
>   hw/net/rocker/rocker.h                  |  2 +-
>   hw/xen/xen_pt.h                         |  2 +-
>   include/chardev/char-fe.h               |  2 +-
>   include/disas/dis-asm.h                 |  2 +-
>   include/hw/acpi/aml-build.h             | 12 +++----
>   include/hw/core/cpu.h                   |  2 +-
>   include/hw/hw.h                         |  2 +-
>   include/hw/virtio/virtio.h              |  2 +-
>   include/hw/xen/xen-bus-helper.h         |  4 +--
>   include/hw/xen/xen-bus.h                |  4 +--
>   include/hw/xen/xen_common.h             |  2 +-
>   include/hw/xen/xen_pvdev.h              |  2 +-
>   include/monitor/monitor.h               |  4 +--
>   include/qapi/error.h                    | 20 ++++++------
>   include/qapi/qmp/qjson.h                |  8 ++---
>   include/qemu/buffer.h                   |  2 +-
>   include/qemu/compiler.h                 | 11 ++-----
>   include/qemu/error-report.h             | 24 +++++++-------
>   include/qemu/log-for-trace.h            |  2 +-
>   include/qemu/log.h                      |  2 +-
>   include/qemu/qemu-print.h               |  8 ++---
>   include/qemu/readline.h                 |  2 +-
>   qga/guest-agent-core.h                  |  2 +-
>   qga/vss-win32/requester.h               |  2 +-
>   scripts/cocci-macro-file.h              |  2 +-
>   tests/qtest/libqos/libqtest.h           | 42 ++++++++++++-------------
>   tests/qtest/libqtest-single.h           |  2 +-
>   tests/qtest/migration-helpers.h         |  6 ++--
>   audio/alsaaudio.c                       |  4 +--
>   audio/dsoundaudio.c                     |  4 +--
>   audio/ossaudio.c                        |  4 +--
>   audio/paaudio.c                         |  2 +-
>   audio/sdlaudio.c                        |  2 +-
>   block/blkverify.c                       |  2 +-
>   block/ssh.c                             |  4 +--
>   fsdev/9p-marshal.c                      |  2 +-
>   fsdev/virtfs-proxy-helper.c             |  2 +-
>   hw/9pfs/9p.c                            |  2 +-
>   hw/acpi/aml-build.c                     |  4 +--
>   hw/mips/fuloong2e.c                     |  2 +-
>   hw/mips/malta.c                         |  2 +-
>   hw/net/rtl8139.c                        |  2 +-
>   hw/virtio/virtio.c                      |  2 +-
>   io/channel-websock.c                    |  2 +-
>   monitor/hmp.c                           |  4 +--
>   nbd/server.c                            | 10 +++---
>   qemu-img.c                              |  4 +--
>   qemu-io.c                               |  2 +-
>   qobject/json-parser.c                   |  2 +-
>   softmmu/qtest.c                         |  4 +--
>   tests/qtest/libqtest.c                  |  2 +-
>   tests/unit/test-qobject-input-visitor.c |  4 +--
>   audio/coreaudio.m                       |  4 +--
>   scripts/checkpatch.pl                   |  2 +-
>   58 files changed, 130 insertions(+), 137 deletions(-)

> diff --git a/include/qemu/compiler.h b/include/qemu/compiler.h
> index 3baa5e3790f7..f2bd050e3b9a 100644
> --- a/include/qemu/compiler.h
> +++ b/include/qemu/compiler.h
> @@ -79,19 +79,12 @@
>   #define QEMU_BUILD_BUG_ON_ZERO(x) (sizeof(QEMU_BUILD_BUG_ON_STRUCT(x)) - \
>                                      sizeof(QEMU_BUILD_BUG_ON_STRUCT(x)))
>   
> -#if defined(__clang__)
> -/* clang doesn't support gnu_printf, so use printf. */
> -# define GCC_FMT_ATTR(n, m) __attribute__((format(printf, n, m)))
> -#else
> -/* Use gnu_printf (qemu uses standard format strings). */
> -# define GCC_FMT_ATTR(n, m) __attribute__((format(gnu_printf, n, m)))
> -# if defined(_WIN32)
> +#if !defined(__clang__) && defined(_WIN32)
>   /*
>    * Map __printf__ to __gnu_printf__ because we want standard format strings even
>    * when MinGW or GLib include files use __printf__.
>    */
> -#  define __printf__ __gnu_printf__
> -# endif
> +# define __printf__ __gnu_printf__
>   #endif

Can we also poison GCC_FMT_ATTR? Maybe split in 2 patches, 1 converting
and another removing unused & poisoning?


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 13:28:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 13:28:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291194.494079 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUThJ-0007EO-HP; Wed, 16 Mar 2022 13:28:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291194.494079; Wed, 16 Mar 2022 13:28:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUThJ-0007EH-ED; Wed, 16 Mar 2022 13:28:17 +0000
Received: by outflank-mailman (input) for mailman id 291194;
 Wed, 16 Mar 2022 13:28:16 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=H0j4=T3=redhat.com=thuth@srs-se1.protection.inumbo.net>)
 id 1nUThH-0007Ds-VD
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 13:28:16 +0000
Received: from us-smtp-delivery-124.mimecast.com
 (us-smtp-delivery-124.mimecast.com [170.10.133.124])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ee142e00-a52c-11ec-8eba-a37418f5ba1a;
 Wed, 16 Mar 2022 14:28:14 +0100 (CET)
Received: from mail-wm1-f72.google.com (mail-wm1-f72.google.com
 [209.85.128.72]) by relay.mimecast.com with ESMTP with STARTTLS
 (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 us-mta-396-8wrryEzXNdW42AT0M0hL5Q-1; Wed, 16 Mar 2022 09:28:11 -0400
Received: by mail-wm1-f72.google.com with SMTP id
 h127-20020a1c2185000000b0038c6f7e22a4so785317wmh.9
 for <xen-devel@lists.xenproject.org>; Wed, 16 Mar 2022 06:28:11 -0700 (PDT)
Received: from [192.168.42.76] (tmo-065-170.customers.d1-online.com.
 [80.187.65.170]) by smtp.gmail.com with ESMTPSA id
 h12-20020a5d548c000000b001f1f99e7792sm1611088wrv.111.2022.03.16.06.28.07
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Wed, 16 Mar 2022 06:28:09 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ee142e00-a52c-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
	s=mimecast20190719; t=1647437293;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=ZC7G6AJDV2FZQS3DCTZOZRK0y7+mf4m3fLbuWOiH0EY=;
	b=YpILD2rIuaA/aFHAUW7QGPNZBJ5GMY3k5pllp8qTRs69/jx5//CyiozE76DvonHX3kqETH
	ys9992E9QVmQ1YUgcF7opH4y1BGiFOA9x3LyAdA+RTMMmTuSVkvwHbVzQ0vLKEmYaG1V0m
	uxG0DyefuM2OlY7n7dMGlm3z4zv6C0g=
X-MC-Unique: 8wrryEzXNdW42AT0M0hL5Q-1
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:message-id:date:mime-version:user-agent:subject
         :content-language:to:cc:references:from:in-reply-to
         :content-transfer-encoding;
        bh=ZC7G6AJDV2FZQS3DCTZOZRK0y7+mf4m3fLbuWOiH0EY=;
        b=tpEVdefcZzQG+w0IWpJq8UJwkVMv6IddA7d93uf/RkflmePLEFwo4r6/X2jJsmio0M
         1bXlvfVKxBptg0uJQHRTBMqitD38RPpzE5Fz4K5QQjatOxW2m9OaYFxCx4AC23UUE72X
         ub4DDACoxWWUeo7slUKFBhmgcbP8SHZJLYVr+ja1Z1pJr6nkG9OCujs+jARao8B6PDiP
         pG5dcstFDUEQAouDSqKjLfpJaiZnjVogt+lMl8Rps/mUkGT/2YLRov4qAaddpZFvULzY
         PLt80f+12QtsM1IrmyWbwwZDxEJXUYT7hMPt6MHqWab4lq7xDPcecNezE8hvdqvB6D+j
         tuBA==
X-Gm-Message-State: AOAM532Tr7EjlPJ2KXhRD3J3311BpP9RNjY0oLelsm10q1c70VZQ9vjH
	NKzwDD1ROKjJ9kcXPkciJwG9PnXW2iohtxoQIsy/aB//TOqxf59kynYC95vChRVmVkpx/tt5sFz
	I0c5gLgFYbpRUVhQVa5T/n5J/0ZU=
X-Received: by 2002:a5d:6244:0:b0:1e7:686d:41e7 with SMTP id m4-20020a5d6244000000b001e7686d41e7mr23735539wrv.491.1647437290681;
        Wed, 16 Mar 2022 06:28:10 -0700 (PDT)
X-Google-Smtp-Source: ABdhPJyhkthpk8CALWRyrP6UeSAiyc5PyjeBcZW4vlkIsrNdk9/MSR23usQzwXkariPWi5l9c/S4aw==
X-Received: by 2002:a5d:6244:0:b0:1e7:686d:41e7 with SMTP id m4-20020a5d6244000000b001e7686d41e7mr23735511wrv.491.1647437290396;
        Wed, 16 Mar 2022 06:28:10 -0700 (PDT)
Message-ID: <617011dd-6d19-cb2d-c98d-747e1821d545@redhat.com>
Date: Wed, 16 Mar 2022 14:28:06 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.0
Subject: Re: [PATCH 07/27] Replace GCC_FMT_ATTR with G_GNUC_PRINTF
To: =?UTF-8?Q?Philippe_Mathieu-Daud=c3=a9?=
 <philippe.mathieu.daude@gmail.com>, marcandre.lureau@redhat.com,
 qemu-devel@nongnu.org
Cc: Gerd Hoffmann <kraxel@redhat.com>,
 Christian Schoenebeck <qemu_oss@crudebyte.com>,
 =?UTF-8?Q?Philippe_Mathieu-Daud=c3=a9?= <f4bug@amsat.org>,
 Thomas Huth <huth@tuxfamily.org>, Stefan Hajnoczi <stefanha@redhat.com>,
 Kevin Wolf <kwolf@redhat.com>, Hanna Reitz <hreitz@redhat.com>,
 "Richard W.M. Jones" <rjones@redhat.com>, Warner Losh <imp@bsdimp.com>,
 Kyle Evans <kevans@freebsd.org>, Greg Kurz <groug@kaod.org>,
 "Michael S. Tsirkin" <mst@redhat.com>, Igor Mammedov <imammedo@redhat.com>,
 Ani Sinha <ani@anisinha.ca>, Huacai Chen <chenhuacai@kernel.org>,
 Jiaxun Yang <jiaxun.yang@flygoat.com>, Aurelien Jarno
 <aurelien@aurel32.net>, Jiri Pirko <jiri@resnulli.us>,
 Jason Wang <jasowang@redhat.com>, Stefano Stabellini
 <sstabellini@kernel.org>, Anthony Perard <anthony.perard@citrix.com>,
 Paul Durrant <paul@xen.org>, Paolo Bonzini <pbonzini@redhat.com>,
 Eduardo Habkost <eduardo@habkost.net>,
 Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
 Yanan Wang <wangyanan55@huawei.com>, Markus Armbruster <armbru@redhat.com>,
 Michael Roth <michael.roth@amd.com>, =?UTF-8?Q?Daniel_P=2e_Berrang=c3=a9?=
 <berrange@redhat.com>, "Dr. David Alan Gilbert" <dgilbert@redhat.com>,
 Eric Blake <eblake@redhat.com>,
 Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>,
 Konstantin Kostiuk <kkostiuk@redhat.com>, Laurent Vivier
 <lvivier@redhat.com>, "open list:blkverify" <qemu-block@nongnu.org>,
 "open list:X86 Xen CPUs" <xen-devel@lists.xenproject.org>
References: <20220316095248.2613601-1-marcandre.lureau@redhat.com>
 <dce310d7-35a6-d3df-734a-c9d184fc282c@gmail.com>
From: Thomas Huth <thuth@redhat.com>
In-Reply-To: <dce310d7-35a6-d3df-734a-c9d184fc282c@gmail.com>
Authentication-Results: relay.mimecast.com;
	auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=thuth@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Language: en-US
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

On 16/03/2022 14.16, Philippe Mathieu-Daudé wrote:
> On 16/3/22 10:52, marcandre.lureau@redhat.com wrote:
>> From: Marc-André Lureau <marcandre.lureau@redhat.com>
>>
>> One less qemu-specific macro. It also helps to make some headers/units
>> only depend on glib, and thus moved in standalone projects eventually.
>>
>> Signed-off-by: Marc-André Lureau <marcandre.lureau@redhat.com>
>> ---
>>   audio/audio.h                           |  4 +--
>>   block/qcow2.h                           |  2 +-
>>   bsd-user/qemu.h                         |  2 +-
>>   hw/display/qxl.h                        |  2 +-
>>   hw/net/rocker/rocker.h                  |  2 +-
>>   hw/xen/xen_pt.h                         |  2 +-
>>   include/chardev/char-fe.h               |  2 +-
>>   include/disas/dis-asm.h                 |  2 +-
>>   include/hw/acpi/aml-build.h             | 12 +++----
>>   include/hw/core/cpu.h                   |  2 +-
>>   include/hw/hw.h                         |  2 +-
>>   include/hw/virtio/virtio.h              |  2 +-
>>   include/hw/xen/xen-bus-helper.h         |  4 +--
>>   include/hw/xen/xen-bus.h                |  4 +--
>>   include/hw/xen/xen_common.h             |  2 +-
>>   include/hw/xen/xen_pvdev.h              |  2 +-
>>   include/monitor/monitor.h               |  4 +--
>>   include/qapi/error.h                    | 20 ++++++------
>>   include/qapi/qmp/qjson.h                |  8 ++---
>>   include/qemu/buffer.h                   |  2 +-
>>   include/qemu/compiler.h                 | 11 ++-----
>>   include/qemu/error-report.h             | 24 +++++++-------
>>   include/qemu/log-for-trace.h            |  2 +-
>>   include/qemu/log.h                      |  2 +-
>>   include/qemu/qemu-print.h               |  8 ++---
>>   include/qemu/readline.h                 |  2 +-
>>   qga/guest-agent-core.h                  |  2 +-
>>   qga/vss-win32/requester.h               |  2 +-
>>   scripts/cocci-macro-file.h              |  2 +-
>>   tests/qtest/libqos/libqtest.h           | 42 ++++++++++++-------------
>>   tests/qtest/libqtest-single.h           |  2 +-
>>   tests/qtest/migration-helpers.h         |  6 ++--
>>   audio/alsaaudio.c                       |  4 +--
>>   audio/dsoundaudio.c                     |  4 +--
>>   audio/ossaudio.c                        |  4 +--
>>   audio/paaudio.c                         |  2 +-
>>   audio/sdlaudio.c                        |  2 +-
>>   block/blkverify.c                       |  2 +-
>>   block/ssh.c                             |  4 +--
>>   fsdev/9p-marshal.c                      |  2 +-
>>   fsdev/virtfs-proxy-helper.c             |  2 +-
>>   hw/9pfs/9p.c                            |  2 +-
>>   hw/acpi/aml-build.c                     |  4 +--
>>   hw/mips/fuloong2e.c                     |  2 +-
>>   hw/mips/malta.c                         |  2 +-
>>   hw/net/rtl8139.c                        |  2 +-
>>   hw/virtio/virtio.c                      |  2 +-
>>   io/channel-websock.c                    |  2 +-
>>   monitor/hmp.c                           |  4 +--
>>   nbd/server.c                            | 10 +++---
>>   qemu-img.c                              |  4 +--
>>   qemu-io.c                               |  2 +-
>>   qobject/json-parser.c                   |  2 +-
>>   softmmu/qtest.c                         |  4 +--
>>   tests/qtest/libqtest.c                  |  2 +-
>>   tests/unit/test-qobject-input-visitor.c |  4 +--
>>   audio/coreaudio.m                       |  4 +--
>>   scripts/checkpatch.pl                   |  2 +-
>>   58 files changed, 130 insertions(+), 137 deletions(-)
> 
>> diff --git a/include/qemu/compiler.h b/include/qemu/compiler.h
>> index 3baa5e3790f7..f2bd050e3b9a 100644
>> --- a/include/qemu/compiler.h
>> +++ b/include/qemu/compiler.h
>> @@ -79,19 +79,12 @@
>>   #define QEMU_BUILD_BUG_ON_ZERO(x) (sizeof(QEMU_BUILD_BUG_ON_STRUCT(x)) - \
>>                                      sizeof(QEMU_BUILD_BUG_ON_STRUCT(x)))
>> -#if defined(__clang__)
>> -/* clang doesn't support gnu_printf, so use printf. */
>> -# define GCC_FMT_ATTR(n, m) __attribute__((format(printf, n, m)))
>> -#else
>> -/* Use gnu_printf (qemu uses standard format strings). */
>> -# define GCC_FMT_ATTR(n, m) __attribute__((format(gnu_printf, n, m)))
>> -# if defined(_WIN32)
>> +#if !defined(__clang__) && defined(_WIN32)
>>   /*
>>    * Map __printf__ to __gnu_printf__ because we want standard format 
>> strings even
>>    * when MinGW or GLib include files use __printf__.
>>    */
>> -#  define __printf__ __gnu_printf__
>> -# endif
>> +# define __printf__ __gnu_printf__
>>   #endif
> 
> Can we also poison GCC_FMT_ATTR? Maybe split in 2 patches, 1 converting
> and another removing unused & poisoning?

I don't think that poisoning is required here since this macro is not used 
in "#ifdef" statements - so the compiler will complain to you if you still 
try to use it after the removal.

  Thomas



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 13:30:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 13:30:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291199.494090 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUTjV-0000BL-1v; Wed, 16 Mar 2022 13:30:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291199.494090; Wed, 16 Mar 2022 13:30:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUTjU-0000BE-V0; Wed, 16 Mar 2022 13:30:32 +0000
Received: by outflank-mailman (input) for mailman id 291199;
 Wed, 16 Mar 2022 13:30:31 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5zDN=T3=redhat.com=berrange@srs-se1.protection.inumbo.net>)
 id 1nUTjT-0000B6-Oc
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 13:30:31 +0000
Received: from us-smtp-delivery-124.mimecast.com
 (us-smtp-delivery-124.mimecast.com [170.10.129.124])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3eb97306-a52d-11ec-853b-5f4723681683;
 Wed, 16 Mar 2022 14:30:29 +0100 (CET)
Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com
 [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS
 (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 us-mta-377-UC8-YLvZOc2NKSj3QhDYXg-1; Wed, 16 Mar 2022 09:30:11 -0400
Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.rdu2.redhat.com
 [10.11.54.5])
 (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 447933802ACE;
 Wed, 16 Mar 2022 13:30:10 +0000 (UTC)
Received: from redhat.com (unknown [10.39.195.81])
 by smtp.corp.redhat.com (Postfix) with ESMTPS id 51AA830B9D;
 Wed, 16 Mar 2022 13:29:23 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3eb97306-a52d-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
	s=mimecast20190719; t=1647437428;
	h=from:from:reply-to:reply-to:subject:subject:date:date:
	 message-id:message-id:to:to:cc:cc:mime-version:mime-version:
	 content-type:content-type:in-reply-to:in-reply-to:  references:references;
	bh=TVu/CeOwg7TjRwgWWJUd3qigmb0rClTETSGukZB9kvE=;
	b=fED5cCUiCguwoFHGFb32sHckPXpg0kQcGdgipvfTsBaX8oVIh21DKIuC2RUXFS7C0LKDVn
	k9t3CLAw7ENN+X9lTLj7Gnl6p9WaCTH18uwZ9zQV+QKbLx8mu549YQXnqk6eytHt8LfV2p
	Pd5lCwwpDIo7e5dWW5PbHHZsaVcQtXI=
X-MC-Unique: UC8-YLvZOc2NKSj3QhDYXg-1
Date: Wed, 16 Mar 2022 13:29:17 +0000
From: Daniel =?utf-8?B?UC4gQmVycmFuZ8Op?= <berrange@redhat.com>
To: marcandre.lureau@redhat.com
Cc: qemu-devel@nongnu.org, Gerd Hoffmann <kraxel@redhat.com>,
	Christian Schoenebeck <qemu_oss@crudebyte.com>,
	Philippe =?utf-8?Q?Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Thomas Huth <huth@tuxfamily.org>,
	Stefan Hajnoczi <stefanha@redhat.com>,
	Kevin Wolf <kwolf@redhat.com>, Hanna Reitz <hreitz@redhat.com>,
	"Richard W.M. Jones" <rjones@redhat.com>,
	Warner Losh <imp@bsdimp.com>, Kyle Evans <kevans@freebsd.org>,
	Greg Kurz <groug@kaod.org>, "Michael S. Tsirkin" <mst@redhat.com>,
	Igor Mammedov <imammedo@redhat.com>, Ani Sinha <ani@anisinha.ca>,
	Huacai Chen <chenhuacai@kernel.org>,
	Jiaxun Yang <jiaxun.yang@flygoat.com>,
	Aurelien Jarno <aurelien@aurel32.net>,
	Jiri Pirko <jiri@resnulli.us>, Jason Wang <jasowang@redhat.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Anthony Perard <anthony.perard@citrix.com>,
	Paul Durrant <paul@xen.org>, Paolo Bonzini <pbonzini@redhat.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Yanan Wang <wangyanan55@huawei.com>,
	Markus Armbruster <armbru@redhat.com>,
	Michael Roth <michael.roth@amd.com>,
	"Dr. David Alan Gilbert" <dgilbert@redhat.com>,
	Eric Blake <eblake@redhat.com>,
	Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>,
	Konstantin Kostiuk <kkostiuk@redhat.com>,
	Laurent Vivier <lvivier@redhat.com>,
	"open list:blkverify" <qemu-block@nongnu.org>,
	"open list:X86 Xen CPUs" <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH 07/27] Replace GCC_FMT_ATTR with G_GNUC_PRINTF
Message-ID: <YjHmLTI+geU4S9Wq@redhat.com>
Reply-To: Daniel =?utf-8?B?UC4gQmVycmFuZ8Op?= <berrange@redhat.com>
References: <20220316095248.2613601-1-marcandre.lureau@redhat.com>
MIME-Version: 1.0
In-Reply-To: <20220316095248.2613601-1-marcandre.lureau@redhat.com>
User-Agent: Mutt/2.1.5 (2021-12-30)
X-Scanned-By: MIMEDefang 2.79 on 10.11.54.5
Authentication-Results: relay.mimecast.com;
	auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=berrange@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline

On Wed, Mar 16, 2022 at 01:52:48PM +0400, marcandre.lureau@redhat.com wrote:
> diff --git a/include/qemu/compiler.h b/include/qemu/compiler.h
> index 3baa5e3790f7..f2bd050e3b9a 100644
> --- a/include/qemu/compiler.h
> +++ b/include/qemu/compiler.h
> @@ -79,19 +79,12 @@
>  #define QEMU_BUILD_BUG_ON_ZERO(x) (sizeof(QEMU_BUILD_BUG_ON_STRUCT(x)) - \
>                                     sizeof(QEMU_BUILD_BUG_ON_STRUCT(x)))
>  
> -#if defined(__clang__)
> -/* clang doesn't support gnu_printf, so use printf. */
> -# define GCC_FMT_ATTR(n, m) __attribute__((format(printf, n, m)))
> -#else
> -/* Use gnu_printf (qemu uses standard format strings). */
> -# define GCC_FMT_ATTR(n, m) __attribute__((format(gnu_printf, n, m)))
> -# if defined(_WIN32)
> +#if !defined(__clang__) && defined(_WIN32)
>  /*
>   * Map __printf__ to __gnu_printf__ because we want standard format strings even
>   * when MinGW or GLib include files use __printf__.
>   */
> -#  define __printf__ __gnu_printf__
> -# endif
> +# define __printf__ __gnu_printf__
>  #endif

I'm not convinced we shold have this remaining define, even
before your patch.

For code we've implemented, we should have used __gnu_printf__
already if we know it uses GNU format on Windows.

For code in GLib, its header file uses __gnu_printf__ for anything
that relies on its portable printf replacement, which is basically
everything in GLib.

For anything else we should honour whatever they declare, and not
assume their impl is the GNU one.


I guess it is easy enough to validate by deleting this and seeing
if we get any warnings from the mingw CI jobs about printf/gnu_printf
mismatch.

With regards,
Daniel
-- 
|: https://berrange.com      -o-    https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org         -o-            https://fstop138.berrange.com :|
|: https://entangle-photo.org    -o-    https://www.instagram.com/dberrange :|



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 13:34:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 13:34:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291202.494101 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUTmq-0000pB-IS; Wed, 16 Mar 2022 13:34:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291202.494101; Wed, 16 Mar 2022 13:34:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUTmq-0000p4-F1; Wed, 16 Mar 2022 13:34:00 +0000
Received: by outflank-mailman (input) for mailman id 291202;
 Wed, 16 Mar 2022 13:33:59 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=jsVq=T3=redhat.com=mlureau@srs-se1.protection.inumbo.net>)
 id 1nUTmp-0000oy-AG
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 13:33:59 +0000
Received: from us-smtp-delivery-124.mimecast.com
 (us-smtp-delivery-124.mimecast.com [170.10.133.124])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id bb0e8ae5-a52d-11ec-853b-5f4723681683;
 Wed, 16 Mar 2022 14:33:58 +0100 (CET)
Received: from mail-yb1-f200.google.com (mail-yb1-f200.google.com
 [209.85.219.200]) by relay.mimecast.com with ESMTP with STARTTLS
 (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 us-mta-622-_NNioYcIP9WhOQ01ANdRPA-1; Wed, 16 Mar 2022 09:33:51 -0400
Received: by mail-yb1-f200.google.com with SMTP id
 x11-20020a5b0f0b000000b0062277953037so1908597ybr.21
 for <xen-devel@lists.xenproject.org>; Wed, 16 Mar 2022 06:33:51 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: bb0e8ae5-a52d-11ec-853b-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
	s=mimecast20190719; t=1647437637;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=tVXhblBb5SreSeVVw+xb8VxFfEeV/tL7QjK64epniIU=;
	b=Co1NkUC+oaAH1AYatBzwwIcWCFZ/ThoOaWcAqJaOuGyvpKRYVKFyIrL6qgAPG2W1NmGOXl
	CIEgP/+OEDSw47YRhHU2k15aARR9VG/MKwMNjNiiFSnDEd7izjsL4IR2P2MlP4Gzjj0Wgg
	CFXTpGI/u0gf+9WhNHt6GphQNu+hYkA=
X-MC-Unique: _NNioYcIP9WhOQ01ANdRPA-1
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc:content-transfer-encoding;
        bh=tVXhblBb5SreSeVVw+xb8VxFfEeV/tL7QjK64epniIU=;
        b=cJRa5Df755zqaZ/8IfhzUZbh+UPrjJma/umddfzCaLIGhn5mI/aAUefYB8SIyfnA2S
         XWpBJbWPf9MOT6vpmDnMHC7XmfLU1scGbbe2lO1I+EItLvsDG6ZMr1WGQka6n9N71Mf5
         a1q7NfD9LanbfkSERgEWv9fkBiW/tiYuZMFkVbYCtmd5QP7jppiEUqJFDkfYkJSD4jTj
         EYtUAp7PYo0evlGIaxusdu+ke/Pln7/eusTjW8Lmn5eHyM+lFqbTac4baHB4+4JJ0H1W
         GGmGlYt5vzVV9hadJrs7RZt42fP4kQtVIp9Kc3eKfH1VFprMeG0vubfJ63QbGnuhSDk/
         EkOQ==
X-Gm-Message-State: AOAM532HA5eRaWIwDvFXnuAyh9YAlncnUSS+IAJ/tvoDpZ/apY1fD4Zb
	Pua/HBc+O8nDgLcLsV8t3qeoeAYQN6yKxlqre8b3DaOZgfv0XIxiONuWhfejHsr1nNl6WQTjglL
	AxlF/fyAdaU6zcjJ/68L8OyVgy2g1SgQ82yiaBPGjoq0=
X-Received: by 2002:a05:690c:10f:b0:2e0:f11a:b3fc with SMTP id bd15-20020a05690c010f00b002e0f11ab3fcmr29274341ywb.267.1647437630865;
        Wed, 16 Mar 2022 06:33:50 -0700 (PDT)
X-Google-Smtp-Source: ABdhPJyd+fGnhMwpIXXBVeuxcYAvCN4MAT6xHvnnj/sg34jGu9nhEMsL2aZ6KJPJIR+r76H9SnkTm8FmDanqg/NI+b4=
X-Received: by 2002:a05:690c:10f:b0:2e0:f11a:b3fc with SMTP id
 bd15-20020a05690c010f00b002e0f11ab3fcmr29274278ywb.267.1647437630545; Wed, 16
 Mar 2022 06:33:50 -0700 (PDT)
MIME-Version: 1.0
References: <20220316095248.2613601-1-marcandre.lureau@redhat.com> <YjHmLTI+geU4S9Wq@redhat.com>
In-Reply-To: <YjHmLTI+geU4S9Wq@redhat.com>
From: =?UTF-8?B?TWFyYy1BbmRyw6kgTHVyZWF1?= <marcandre.lureau@redhat.com>
Date: Wed, 16 Mar 2022 17:33:39 +0400
Message-ID: <CAMxuvaz=+wsAA5QXkV8TmgPpXZJxwGYk1HXoCwQH2u9i2dGaqA@mail.gmail.com>
Subject: Re: [PATCH 07/27] Replace GCC_FMT_ATTR with G_GNUC_PRINTF
To: =?UTF-8?Q?Daniel_P=2E_Berrang=C3=A9?= <berrange@redhat.com>
Cc: qemu-devel <qemu-devel@nongnu.org>, Gerd Hoffmann <kraxel@redhat.com>, 
	Christian Schoenebeck <qemu_oss@crudebyte.com>, =?UTF-8?Q?Philippe_Mathieu=2DDaud=C3=A9?= <f4bug@amsat.org>, 
	Thomas Huth <huth@tuxfamily.org>, Stefan Hajnoczi <stefanha@redhat.com>, Kevin Wolf <kwolf@redhat.com>, 
	Hanna Reitz <hreitz@redhat.com>, "Richard W.M. Jones" <rjones@redhat.com>, Warner Losh <imp@bsdimp.com>, 
	Kyle Evans <kevans@freebsd.org>, Greg Kurz <groug@kaod.org>, 
	"Michael S. Tsirkin" <mst@redhat.com>, Igor Mammedov <imammedo@redhat.com>, Ani Sinha <ani@anisinha.ca>, 
	Huacai Chen <chenhuacai@kernel.org>, Jiaxun Yang <jiaxun.yang@flygoat.com>, 
	Aurelien Jarno <aurelien@aurel32.net>, Jiri Pirko <jiri@resnulli.us>, 
	Jason Wang <jasowang@redhat.com>, Stefano Stabellini <sstabellini@kernel.org>, 
	Anthony Perard <anthony.perard@citrix.com>, Paul Durrant <paul@xen.org>, 
	Paolo Bonzini <pbonzini@redhat.com>, Eduardo Habkost <eduardo@habkost.net>, 
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>, Yanan Wang <wangyanan55@huawei.com>, 
	Markus Armbruster <armbru@redhat.com>, Michael Roth <michael.roth@amd.com>, 
	"Dr. David Alan Gilbert" <dgilbert@redhat.com>, Eric Blake <eblake@redhat.com>, 
	Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>, Konstantin Kostiuk <kkostiuk@redhat.com>, 
	Laurent Vivier <lvivier@redhat.com>, "open list:blkverify" <qemu-block@nongnu.org>, 
	"open list:X86 Xen CPUs" <xen-devel@lists.xenproject.org>
Authentication-Results: relay.mimecast.com;
	auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=mlureau@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi

On Wed, Mar 16, 2022 at 5:30 PM Daniel P. Berrang=C3=A9 <berrange@redhat.co=
m> wrote:
>
> On Wed, Mar 16, 2022 at 01:52:48PM +0400, marcandre.lureau@redhat.com wro=
te:
> > diff --git a/include/qemu/compiler.h b/include/qemu/compiler.h
> > index 3baa5e3790f7..f2bd050e3b9a 100644
> > --- a/include/qemu/compiler.h
> > +++ b/include/qemu/compiler.h
> > @@ -79,19 +79,12 @@
> >  #define QEMU_BUILD_BUG_ON_ZERO(x) (sizeof(QEMU_BUILD_BUG_ON_STRUCT(x))=
 - \
> >                                     sizeof(QEMU_BUILD_BUG_ON_STRUCT(x))=
)
> >
> > -#if defined(__clang__)
> > -/* clang doesn't support gnu_printf, so use printf. */
> > -# define GCC_FMT_ATTR(n, m) __attribute__((format(printf, n, m)))
> > -#else
> > -/* Use gnu_printf (qemu uses standard format strings). */
> > -# define GCC_FMT_ATTR(n, m) __attribute__((format(gnu_printf, n, m)))
> > -# if defined(_WIN32)
> > +#if !defined(__clang__) && defined(_WIN32)
> >  /*
> >   * Map __printf__ to __gnu_printf__ because we want standard format st=
rings even
> >   * when MinGW or GLib include files use __printf__.
> >   */
> > -#  define __printf__ __gnu_printf__
> > -# endif
> > +# define __printf__ __gnu_printf__
> >  #endif
>
> I'm not convinced we shold have this remaining define, even
> before your patch.
>
> For code we've implemented, we should have used __gnu_printf__
> already if we know it uses GNU format on Windows.
>
> For code in GLib, its header file uses __gnu_printf__ for anything
> that relies on its portable printf replacement, which is basically
> everything in GLib.
>
> For anything else we should honour whatever they declare, and not
> assume their impl is the GNU one.
>
>
> I guess it is easy enough to validate by deleting this and seeing
> if we get any warnings from the mingw CI jobs about printf/gnu_printf
> mismatch.

Please comment on that thread:
https://patchew.org/QEMU/20220224183701.608720-1-marcandre.lureau@redhat.co=
m/20220224183701.608720-6-marcandre.lureau@redhat.com/

>
> With regards,
> Daniel
> --
> |: https://berrange.com      -o-    https://www.flickr.com/photos/dberran=
ge :|
> |: https://libvirt.org         -o-            https://fstop138.berrange.c=
om :|
> |: https://entangle-photo.org    -o-    https://www.instagram.com/dberran=
ge :|
>



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 14:01:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 14:01:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291206.494112 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUUCw-00049Q-Km; Wed, 16 Mar 2022 14:00:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291206.494112; Wed, 16 Mar 2022 14:00:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUUCw-00049J-Hm; Wed, 16 Mar 2022 14:00:58 +0000
Received: by outflank-mailman (input) for mailman id 291206;
 Wed, 16 Mar 2022 14:00:58 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=SsrA=T3=citrix.com=prvs=067c1f106=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nUUCv-00049D-Rf
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 14:00:57 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 7e743842-a531-11ec-8eba-a37418f5ba1a;
 Wed, 16 Mar 2022 15:00:55 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 7e743842-a531-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647439255;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=TVpTXaf+woNqce4s8oOkHm8+irO56d3CPGK/X51t9WA=;
  b=SWZidK3WBazgQbbNHyPVTyz6tTUvQKzQ4RMQwefn2zS0xQ3+WKBV4eu0
   Lt5InZHhvAHyEfxAc+1YLRz/BB+JbGDFUPcBslGOIciAlbCszA4JdJ9UC
   lOMMsoN4mfToGnnSJU8J87yf6doB+pxy0ffN/7Wi6vtITPgLOTD7Qe8zN
   4=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 65858839
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:Tk6c2qmHenlXD82VfxQECXzo5gyEJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xIaC2vVbKrbYzf8Kdh+YIy0phlX78XWztFiSAdrrXtmESMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiWl3V4
 7senuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYRQACYoeUt+onSxhfMQJjFLVUoZPmCC3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3k3ds1zzGS90hRojOWf7i7t5ExjYgwMtJGJ4yY
 uJHNGoyPESbMnWjPH9PGJsburihoUXlahMbqUm7lY4l4lrqmVkZPL/Fb4OOJ43iqd9utlmcj
 nLL+SL+GB5yHP61xCeB83msrvTShi69U4UXfJWo+/gvjFCNy2g7DBwNSUD9sfS/klS5Wd9UN
 woT4CVGkEQp3BX1FJ+nBUT++SPa+E5HMzZNLwEkwA2K4fb+uymXPHAFSRxidfU+ppYaZBV/g
 zdlgOjVLTBotbSUT1eU+bGVsS6+NEApEIMSWcMXZVBbuoe++enfmjqKF48+S/Dt0rUZDBmqm
 1i3QD4Ca6L/ZCLh/4Gy5hj5jj2lvfAlpSZlt1yMDgpJAu6UDbNJhrBEC3CGtZ6sz67DFzFtW
 UTofeDFtIji6rnXyESwrB0lRu3B2hp8GGS0baRTN5cg7S+x3HWoYJpd5jpzTG8wbJpbI26zO
 RWD4FkLjHO2AJdMRfQuC25WI552pZUM6Py/DqyEBjawSsUZmPC7ENFGOhfLgjGFfLkEmqAjI
 5aLGftA/l5BYZmLOAGeHr9HuZdyn3hW7TqKGfjTkkT2uZLDNSX9YepUbzOzghURsfrsTPP9q
 I0EaaNnCnx3DYXDX8Ug2dVKfA5QciRjW8yeRg4+XrfrHzeK0VoJU5f5qY7NsaQ/90iJvo8kJ
 k2AZ3I=
IronPort-HdrOrdr: A9a23:TVSLvKpoau7gmc8JFqODGlEaV5oneYIsimQD101hICG8cqSj+f
 xG+85rsiMc6QxhPE3I9urhBEDtex/hHP1OkOws1NWZLWrbUQKTRekIh+bfKlXbakvDH4VmtJ
 uIHZIQNDSJNykZsfrH
X-IronPort-AV: E=Sophos;i="5.90,186,1643691600"; 
   d="scan'208";a="65858839"
From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Jan Beulich
	<JBeulich@suse.com>, =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?=
	<roger.pau@citrix.com>, Wei Liu <wl@xen.org>
Subject: [PATCH] x86/spec-ctrl: Knobs for STIBP and PSFD, and follow hardware STIBP hint
Date: Wed, 16 Mar 2022 14:00:35 +0000
Message-ID: <20220316140035.32057-1-andrew.cooper3@citrix.com>
X-Mailer: git-send-email 2.11.0
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

STIBP and PSFD are slightly weird bits, because they're both implied by other
bits in MSR_SPEC_CTRL.  Add fine grain controls for them, and take the
implications into account when setting IBRS/SSBD.

Rearrange the IBPB text/variables/logic to keep all the MSR_SPEC_CTRL bits
together, for consistency.

However, AMD have a hardware hint CPUID bit recommending that STIBP be set
uniaterally.  This is advertised on Zen3, so follow the recommendation.  This
is the only default change.

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
---
CC: Jan Beulich <JBeulich@suse.com>
CC: Roger Pau Monné <roger.pau@citrix.com>
CC: Wei Liu <wl@xen.org>
---
 docs/misc/xen-command-line.pandoc | 20 +++++++++----
 xen/arch/x86/spec_ctrl.c          | 59 ++++++++++++++++++++++++++++++++++++---
 2 files changed, 70 insertions(+), 9 deletions(-)

diff --git a/docs/misc/xen-command-line.pandoc b/docs/misc/xen-command-line.pandoc
index 1dc7e1ca0706..6fa1fe97aeeb 100644
--- a/docs/misc/xen-command-line.pandoc
+++ b/docs/misc/xen-command-line.pandoc
@@ -2254,8 +2254,8 @@ By default SSBD will be mitigated at runtime (i.e `ssbd=runtime`).
 
 ### spec-ctrl (x86)
 > `= List of [ <bool>, xen=<bool>, {pv,hvm,msr-sc,rsb,md-clear}=<bool>,
->              bti-thunk=retpoline|lfence|jmp, {ibrs,ibpb,ssbd,eager-fpu,
->              l1d-flush,branch-harden,srb-lock}=<bool> ]`
+>              bti-thunk=retpoline|lfence|jmp, {ibrs,stibp,ssbd,psfd,ibpb,
+>              eager-fpu,l1d-flush,branch-harden,srb-lock}=<bool> ]`
 
 Controls for speculative execution sidechannel mitigations.  By default, Xen
 will pick the most appropriate mitigations based on compiled in support,
@@ -2306,9 +2306,10 @@ On hardware supporting IBRS (Indirect Branch Restricted Speculation), the
 If Xen is not using IBRS itself, functionality is still set up so IBRS can be
 virtualised for guests.
 
-On hardware supporting IBPB (Indirect Branch Prediction Barrier), the `ibpb=`
-option can be used to force (the default) or prevent Xen from issuing branch
-prediction barriers on vcpu context switches.
+On hardware supporting STIBP (Single Thread Indirect Branch Predictors), the
+`stibp=` option can be used to force or prevent Xen using the feature itself.
+By default, Xen will use STIBP when IBRS is in use (IBRS implies STIBP), and
+when hardware hints recommend using it as a blanket setting.
 
 On hardware supporting SSBD (Speculative Store Bypass Disable), the `ssbd=`
 option can be used to force or prevent Xen using the feature itself.  On AMD
@@ -2316,6 +2317,15 @@ hardware, this is a global option applied at boot, and not virtualised for
 guest use.  On Intel hardware, the feature is virtualised for guests,
 independently of Xen's choice of setting.
 
+On hardware supporting PSFD (Predictive Store Forwarding Disable), the `psfd=`
+option can be used to force or prevent Xen using the feature itself.  By
+default, Xen will not use PSFD.  PSFD is implied by SSBD, and SSBD is off by
+default.
+
+On hardware supporting IBPB (Indirect Branch Prediction Barrier), the `ibpb=`
+option can be used to force (the default) or prevent Xen from issuing branch
+prediction barriers on vcpu context switches.
+
 On all hardware, the `eager-fpu=` option can be used to force or prevent Xen
 from using fully eager FPU context switches.  This is currently implemented as
 a global control.  By default, Xen will choose to use fully eager context
diff --git a/xen/arch/x86/spec_ctrl.c b/xen/arch/x86/spec_ctrl.c
index 1408e4c7abd0..446b62486447 100644
--- a/xen/arch/x86/spec_ctrl.c
+++ b/xen/arch/x86/spec_ctrl.c
@@ -48,9 +48,13 @@ static enum ind_thunk {
     THUNK_LFENCE,
     THUNK_JMP,
 } opt_thunk __initdata = THUNK_DEFAULT;
+
 static int8_t __initdata opt_ibrs = -1;
+int8_t __initdata opt_stibp = -1;
+bool __read_mostly opt_ssbd;
+int8_t __initdata opt_psfd = -1;
+
 bool __read_mostly opt_ibpb = true;
-bool __read_mostly opt_ssbd = false;
 int8_t __read_mostly opt_eager_fpu = -1;
 int8_t __read_mostly opt_l1d_flush = -1;
 static bool __initdata opt_branch_harden = true;
@@ -170,12 +174,18 @@ static int __init cf_check parse_spec_ctrl(const char *s)
             else
                 rc = -EINVAL;
         }
+
         else if ( (val = parse_boolean("ibrs", s, ss)) >= 0 )
             opt_ibrs = val;
-        else if ( (val = parse_boolean("ibpb", s, ss)) >= 0 )
-            opt_ibpb = val;
+        else if ( (val = parse_boolean("stibp", s, ss)) >= 0 )
+            opt_stibp = val;
         else if ( (val = parse_boolean("ssbd", s, ss)) >= 0 )
             opt_ssbd = val;
+        else if ( (val = parse_boolean("psfd", s, ss)) >= 0 )
+            opt_psfd = val;
+
+        else if ( (val = parse_boolean("ibpb", s, ss)) >= 0 )
+            opt_ibpb = val;
         else if ( (val = parse_boolean("eager-fpu", s, ss)) >= 0 )
             opt_eager_fpu = val;
         else if ( (val = parse_boolean("l1d-flush", s, ss)) >= 0 )
@@ -367,7 +377,7 @@ static void __init print_details(enum ind_thunk thunk, uint64_t caps)
                "\n");
 
     /* Settings for Xen's protection, irrespective of guests. */
-    printk("  Xen settings: BTI-Thunk %s, SPEC_CTRL: %s%s%s%s, Other:%s%s%s%s%s\n",
+    printk("  Xen settings: BTI-Thunk %s, SPEC_CTRL: %s%s%s%s%s, Other:%s%s%s%s%s\n",
            thunk == THUNK_NONE      ? "N/A" :
            thunk == THUNK_RETPOLINE ? "RETPOLINE" :
            thunk == THUNK_LFENCE    ? "LFENCE" :
@@ -381,6 +391,9 @@ static void __init print_details(enum ind_thunk thunk, uint64_t caps)
            (!boot_cpu_has(X86_FEATURE_SSBD) &&
             !boot_cpu_has(X86_FEATURE_AMD_SSBD))     ? "" :
            (default_xen_spec_ctrl & SPEC_CTRL_SSBD)  ? " SSBD+" : " SSBD-",
+           (!boot_cpu_has(X86_FEATURE_PSFD) &&
+            !boot_cpu_has(X86_FEATURE_INTEL_PSFD))   ? "" :
+           (default_xen_spec_ctrl & SPEC_CTRL_PSFD)  ? " PSFD+" : " PSFD-",
            !(caps & ARCH_CAPS_TSX_CTRL)              ? "" :
            (opt_tsx & 1)                             ? " TSX+" : " TSX-",
            !cpu_has_srbds_ctrl                       ? "" :
@@ -1070,12 +1083,50 @@ void __init init_speculation_mitigations(void)
 
     /* If we have IBRS available, see whether we should use it. */
     if ( has_spec_ctrl && ibrs )
+    {
+        /* IBRS implies STIBP.  */
+        if ( opt_stibp == -1 )
+            opt_stibp = 1;
+
         default_xen_spec_ctrl |= SPEC_CTRL_IBRS;
+    }
+
+    /* Use STIBP by default if the hardware hint is set. */
+    if ( opt_stibp == -1 && boot_cpu_has(X86_FEATURE_STIBP_ALWAYS) )
+        opt_stibp = 1;
+
+    /*
+     * Otherwise, don't use STIBP by default.  It has some severe performance
+     * implications on older hardware.
+     */
+    if ( opt_stibp == -1 )
+        opt_stibp = 0;
+
+    if ( opt_stibp && (boot_cpu_has(X86_FEATURE_STIBP) ||
+                       boot_cpu_has(X86_FEATURE_AMD_STIBP)) )
+        default_xen_spec_ctrl |= SPEC_CTRL_STIBP;
 
     /* If we have SSBD available, see whether we should use it. */
     if ( opt_ssbd && (boot_cpu_has(X86_FEATURE_SSBD) ||
                       boot_cpu_has(X86_FEATURE_AMD_SSBD)) )
+    {
+        /* SSBD implies PSFD */
+        if ( opt_psfd == -1 )
+            opt_psfd = 1;
+
         default_xen_spec_ctrl |= SPEC_CTRL_SSBD;
+    }
+
+    /*
+     * Don't use PSFD by default.  AMD designed the predictor to auto-clear on
+     * privilege change.  PSFD is implied by SSBD, which is off by default.
+     */
+    if ( opt_psfd == -1 )
+        opt_psfd = 0;
+
+    if ( opt_psfd && (boot_cpu_has(X86_FEATURE_PSFD) ||
+                      boot_cpu_has(X86_FEATURE_INTEL_PSFD)) )
+        default_xen_spec_ctrl |= SPEC_CTRL_PSFD;
 
     /*
      * PV guests can create RSB entries for any linear address they control,
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 16:10:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 16:10:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291210.494126 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUWEC-0008Vp-0h; Wed, 16 Mar 2022 16:10:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291210.494126; Wed, 16 Mar 2022 16:10:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUWEB-0008Vi-Sh; Wed, 16 Mar 2022 16:10:23 +0000
Received: by outflank-mailman (input) for mailman id 291210;
 Wed, 16 Mar 2022 16:10:21 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=/w4J=T3=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nUWE9-0008Vc-Rw
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 16:10:21 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 8feae865-a543-11ec-853c-5f4723681683;
 Wed, 16 Mar 2022 17:10:14 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 4B3962112B;
 Wed, 16 Mar 2022 16:10:20 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 0EE23139B5;
 Wed, 16 Mar 2022 16:10:20 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id GLtmAuwLMmK2OwAAMHmgww
 (envelope-from <jgross@suse.com>); Wed, 16 Mar 2022 16:10:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8feae865-a543-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647447020; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=tN8OsMtRYtol/EJRpHheAzvEZdyyzUH3LNGhAdLsDFU=;
	b=jXvFtHRCwGGc+K+fStsf6puXTNUkXP5sVl/a6vYyviLfp3LtU0HiYF8tk0Yqqe6e0/tsgH
	Mfp0r3Tp7S5NuozqOqGoVWPN5xgsk5FkCHFdjHXc3TGtS/wXMoVH8Qz0odPXhZWNNfjdLG
	oVus3b0Cp5NoSY9AFemVqLIYCeftbvw=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>
Subject: [PATCH 1/3] tools/xenstore: add documentation for new set/get-feature commands
Date: Wed, 16 Mar 2022 17:10:15 +0100
Message-Id: <20220316161017.3579-2-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220316161017.3579-1-jgross@suse.com>
References: <20220316161017.3579-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Add documentation for two new Xenstore wire commands SET_FEATURE and
GET_FEATURE used to set or query the Xenstore features visible in the
ring page of a given domain.

Signed-off-by: Juergen Gross <jgross@suse.com>
---
 docs/misc/xenstore-ring.txt |  1 +
 docs/misc/xenstore.txt      | 12 ++++++++++++
 2 files changed, 13 insertions(+)

diff --git a/docs/misc/xenstore-ring.txt b/docs/misc/xenstore-ring.txt
index f91accb5b0..bd000f694e 100644
--- a/docs/misc/xenstore-ring.txt
+++ b/docs/misc/xenstore-ring.txt
@@ -68,6 +68,7 @@ Mask    Description
 -----------------------------------------------------------------
 1       Ring reconnection (see the ring reconnection feature below)
 2       Connection error indicator (see connection error feature below)
+4       GET_FEATURE and SET_FEATURE Xenstore wire commands are available
 
 The "Connection state" field is used to request a ring close and reconnect.
 The "Connection state" field only contains valid data if the server has
diff --git a/docs/misc/xenstore.txt b/docs/misc/xenstore.txt
index ea3d8be177..31e3d53c52 100644
--- a/docs/misc/xenstore.txt
+++ b/docs/misc/xenstore.txt
@@ -332,6 +332,18 @@ SET_TARGET		<domid>|<tdomid>|
 
 	xenstored prevents the use of SET_TARGET other than by dom0.
 
+GET_FEATURE		<domid>|		<value>|
+SET_FEATURE		<domid>|<value>|
+	Returns or sets the contents of the "feature" field located at
+	offset 2064 of the Xenstore ring page of the domain specified by
+	<domid>. <value> is a decimal number being a logical or of the
+	feature bits as defined in docs/misc/xenstore-ring.txt. Trying
+	to set a bit for a feature not being supported by the running
+	Xenstore will be denied.
+
+	xenstored prevents the use of GET_FEATURE and SET_FEATURE other
+	than by dom0.
+
 ---------- Miscellaneous ----------
 
 CONTROL			<command>|[<parameters>|]
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 16:10:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 16:10:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291211.494137 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUWEV-0000SY-BF; Wed, 16 Mar 2022 16:10:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291211.494137; Wed, 16 Mar 2022 16:10:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUWEV-0000SR-8E; Wed, 16 Mar 2022 16:10:43 +0000
Received: by outflank-mailman (input) for mailman id 291211;
 Wed, 16 Mar 2022 16:10:42 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=/w4J=T3=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nUWEU-0000RR-CB
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 16:10:42 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 94030128-a543-11ec-8eba-a37418f5ba1a;
 Wed, 16 Mar 2022 17:10:39 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 8B7401F391;
 Wed, 16 Mar 2022 16:10:20 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 51DF5139B5;
 Wed, 16 Mar 2022 16:10:20 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id oBO3EuwLMmK2OwAAMHmgww
 (envelope-from <jgross@suse.com>); Wed, 16 Mar 2022 16:10:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 94030128-a543-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647447020; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=pkuTgxN7TeNQXPeaFQVVyGlZfccct+K6q4AfMKtVTGQ=;
	b=pdBV5B0mbXbb1QqOCmmnh5ccCEQXXCH4k99Y6RH6YdeB6+5aBbfXEpX++TAiM63b/q+pif
	OcJ4xO88YFW7eFaMhekGiptKI/LwUsL/eJLk2nOWxJWLOolFz46LloKSWOorqMMP9x78Nq
	8qMkaT7EzFhAKHDWxPMGjsrNt8zCfoE=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>
Subject: [PATCH 2/3] tools/xenstore: add documentation for new set/get-quota commands
Date: Wed, 16 Mar 2022 17:10:16 +0100
Message-Id: <20220316161017.3579-3-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220316161017.3579-1-jgross@suse.com>
References: <20220316161017.3579-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Add documentation for two new Xenstore wire commands SET_QUOTA and
GET_QUOTA used to set or query the Xenstore quota of a given domain.

Signed-off-by: Juergen Gross <jgross@suse.com>
---
 docs/misc/xenstore-ring.txt |  1 +
 docs/misc/xenstore.txt      | 12 ++++++++++++
 2 files changed, 13 insertions(+)

diff --git a/docs/misc/xenstore-ring.txt b/docs/misc/xenstore-ring.txt
index bd000f694e..0cb72a3e35 100644
--- a/docs/misc/xenstore-ring.txt
+++ b/docs/misc/xenstore-ring.txt
@@ -69,6 +69,7 @@ Mask    Description
 1       Ring reconnection (see the ring reconnection feature below)
 2       Connection error indicator (see connection error feature below)
 4       GET_FEATURE and SET_FEATURE Xenstore wire commands are available
+8       GET_QUOTA and SET_QUOTA Xenstore wire commands are available
 
 The "Connection state" field is used to request a ring close and reconnect.
 The "Connection state" field only contains valid data if the server has
diff --git a/docs/misc/xenstore.txt b/docs/misc/xenstore.txt
index 31e3d53c52..dd75a81328 100644
--- a/docs/misc/xenstore.txt
+++ b/docs/misc/xenstore.txt
@@ -344,6 +344,18 @@ SET_FEATURE		<domid>|<value>|
 	xenstored prevents the use of GET_FEATURE and SET_FEATURE other
 	than by dom0.
 
+GET_QUOTA		<domid>|<quota>|	<value>|
+SET_QUOTA		<domid>|<quota>|<value>|
+	Returns or sets a quota value for the domain being specified by
+	<domid>. <quota> is one of "nodes", "watches", "transactions",
+	"node-size" or "permissions". <value> is a decimal number
+	specifying the quota value, with "0" having the special meaning
+	of quota checks being disabled. The initial quota settings for
+	a domain are the global ones of Xenstore.
+
+	xenstored prevents the use of GET_QUOTA and SET_QUOTA other
+	than by dom0.
+
 ---------- Miscellaneous ----------
 
 CONTROL			<command>|[<parameters>|]
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 16:10:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 16:10:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291212.494142 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUWEV-0000W6-Nk; Wed, 16 Mar 2022 16:10:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291212.494142; Wed, 16 Mar 2022 16:10:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUWEV-0000Uh-Gy; Wed, 16 Mar 2022 16:10:43 +0000
Received: by outflank-mailman (input) for mailman id 291212;
 Wed, 16 Mar 2022 16:10:42 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=/w4J=T3=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nUWEU-0000RR-Qb
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 16:10:42 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 93cf928a-a543-11ec-8eba-a37418f5ba1a;
 Wed, 16 Mar 2022 17:10:39 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 077BF21108;
 Wed, 16 Mar 2022 16:10:20 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id C0A3F139B5;
 Wed, 16 Mar 2022 16:10:19 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id rnCsLesLMmK2OwAAMHmgww
 (envelope-from <jgross@suse.com>); Wed, 16 Mar 2022 16:10:19 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 93cf928a-a543-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647447020; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:  content-transfer-encoding:content-transfer-encoding;
	bh=hZKD0EuTc6WQXVOTuJxQoolqoYXnAFSSnw7fgb9wYmQ=;
	b=VZ+kkIbd02t4dK03Jr3BAxZ/CFOFjXOwUiEyKhermAHZjL5tgRYuCm+Jlsn92Otc/2ipr7
	N3An5DNKRI2mpzmrokc+l2budEABb3TgTefk64HzcMu+Igt+PtvVavhevb9mSPvZWLIpaj
	5kr4QyUiueHc+quGGm7WoCqhK5I1TQU=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>
Subject: [PATCH 0/3] tools/xenstore: add some new features to the documentation
Date: Wed, 16 Mar 2022 17:10:14 +0100
Message-Id: <20220316161017.3579-1-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

In the past there have been spotted some shortcomings in the Xenstore
interface, which should be repaired. Those are in detail:

- Using driver domains for large number of domains needs per domain
  Xenstore quota [1]. The feedback sent was rather slim (one reply),
  but it was preferring a new set of wire commands.

- XSA-349 [2] has shown that the current definition of watches is not
  optimal, as it will trigger lots of events when a single one would
  suffice: for detecting new backend devices the backends in the Linux
  kernel are registering a watch for e.g. "/local/domain/0/backend"
  which will fire for ANY sub-node written below this node (on a test
  machine this added up to 91 watch events for only 3 devices).
  This can be limited dramatically by extending the XS_WATCH command
  to take another optional parameter specifying the depth of
  subdirectories to be considered for sending watch events ("0" would
  trigger a watch event only if the watched node itself being written).

- New features like above being added might make migration of guests
  between hosts with different Xenstore variants harder, so it should
  be possible to set the available feature set per domain. For socket
  connections it should be possible to read the available features.

- The special watches @introduceDomain and @releaseDomain are rather
  cumbersome to use, as they only tell you that SOME domain has been
  introduced/released. Any consumer of those watches needs to scan
  all domains on the host in order to find out the domid, causing
  significant pressure on the dominfo hypercall (imagine a system
  with 1000 domains running and one domain dying - there will be more
  than 1000 watch events triggered and 1000 xl daemons will try to
  find out whether "their" domain has died). Those watches should be
  enhanced to optionally be specific to a single domain and to let the
  event carry the related domid.

As some of those extensions will need to be considered in the Xenstore
migration stream, they should be defined in one go (in fact the 4th one
wouldn't need that, but it can easily be connected to the 2nd one).
As such extensions need to be flagged in the "features" in the ring
page anyway, it is fine to implement them independently.

Add the documentation of the new commands/features.

[1]: https://lists.xen.org/archives/html/xen-devel/2020-06/msg00291.html
[2]: http://xenbits.xen.org/xsa/advisory-349.html

Juergen Gross (3):
  tools/xenstore: add documentation for new set/get-feature commands
  tools/xenstore: add documentation for new set/get-quota commands
  tools/xenstore: add documentation for extended watch command

 docs/misc/xenstore-ring.txt |  3 +++
 docs/misc/xenstore.txt      | 40 ++++++++++++++++++++++++++++++++++---
 2 files changed, 40 insertions(+), 3 deletions(-)

-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 16:10:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 16:10:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291213.494157 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUWEW-0000wG-Tn; Wed, 16 Mar 2022 16:10:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291213.494157; Wed, 16 Mar 2022 16:10:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUWEW-0000vB-QT; Wed, 16 Mar 2022 16:10:44 +0000
Received: by outflank-mailman (input) for mailman id 291213;
 Wed, 16 Mar 2022 16:10:43 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=/w4J=T3=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nUWEV-0000RR-9D
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 16:10:43 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 9434545b-a543-11ec-8eba-a37418f5ba1a;
 Wed, 16 Mar 2022 17:10:40 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id CB8E4212C6;
 Wed, 16 Mar 2022 16:10:20 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 930DF139B5;
 Wed, 16 Mar 2022 16:10:20 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id 2E2tIuwLMmK2OwAAMHmgww
 (envelope-from <jgross@suse.com>); Wed, 16 Mar 2022 16:10:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9434545b-a543-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647447020; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=LgNIQyH5+Xwv5DmZji7YTH5ZmS1Ip538z39IFfnqOPE=;
	b=YkZYeQzdQsLlfTJZTh1fsGrn3xCSLeDEjKPXT+iJ22ANeLVauU7LwDzQG1YKHwDVBjMuli
	v6+rrvhB+6jbvIjuTx5mIW24tCry+Wt4Lo9gofxmHK7gg9qyjUdvEvQL/fh0zjwnsSFWDV
	9NF/MowsvlBbroHve/UQV0eHK/n7eeU=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>
Subject: [PATCH 3/3] tools/xenstore: add documentation for extended watch command
Date: Wed, 16 Mar 2022 17:10:17 +0100
Message-Id: <20220316161017.3579-4-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220316161017.3579-1-jgross@suse.com>
References: <20220316161017.3579-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Add documentation for an extension of the WATCH command used to limit
the scope of watched paths. Additionally it enables to receive more
information in the events related to special watches (@introduceDomain
or @releaseDomain).

Signed-off-by: Juergen Gross <jgross@suse.com>
---
 docs/misc/xenstore-ring.txt |  1 +
 docs/misc/xenstore.txt      | 16 +++++++++++++---
 2 files changed, 14 insertions(+), 3 deletions(-)

diff --git a/docs/misc/xenstore-ring.txt b/docs/misc/xenstore-ring.txt
index 0cb72a3e35..eaa6d0a1a3 100644
--- a/docs/misc/xenstore-ring.txt
+++ b/docs/misc/xenstore-ring.txt
@@ -70,6 +70,7 @@ Mask    Description
 2       Connection error indicator (see connection error feature below)
 4       GET_FEATURE and SET_FEATURE Xenstore wire commands are available
 8       GET_QUOTA and SET_QUOTA Xenstore wire commands are available
+16      WATCH can take a third parameter limiting its scope
 
 The "Connection state" field is used to request a ring close and reconnect.
 The "Connection state" field only contains valid data if the server has
diff --git a/docs/misc/xenstore.txt b/docs/misc/xenstore.txt
index dd75a81328..f86c6d9757 100644
--- a/docs/misc/xenstore.txt
+++ b/docs/misc/xenstore.txt
@@ -188,7 +188,7 @@ SET_PERMS		<path>|<perm-as-string>|+?
 
 ---------- Watches ----------
 
-WATCH			<wpath>|<token>|?
+WATCH			<wpath>|<token>|[<depth>|]?
 	Adds a watch.
 
 	When a <path> is modified (including path creation, removal,
@@ -199,7 +199,11 @@ WATCH			<wpath>|<token>|?
 	matching watch results in a WATCH_EVENT message (see below).
 
 	The event's path matches the watch's <wpath> if it is an child
-	of <wpath>.
+	of <wpath>. This match can be limited by specifying <depth> (a
+	decimal value of 0 or larger): it denotes the directory levels
+	below <wpath> to consider for a match ("0" would not match for
+	a child of <wpath>, "1" would match only for a direct child,
+	etc.).
 
 	<wpath> can be a <path> to watch or @<wspecial>.  In the
 	latter case <wspecial> may have any syntax but it matches
@@ -210,7 +214,13 @@ WATCH			<wpath>|<token>|?
 				shutdown, and also on RELEASE
 				and domain destruction
 	<wspecial> events are sent to privileged callers or explicitly
-	via SET_PERMS enabled domains only.
+	via SET_PERMS enabled domains only. The semantics for a
+	specification of <depth> differ for generating <wspecial>
+	events: specifying "1" will report the related domid by using
+	@<wspecial>/<domid> for the reported path. Other <depth>
+	values are not supported.
+	For @releaseDomain it is possible to watch only for a specific
+	domain by specifying @releaseDomain/<domid> for the path.
 
 	When a watch is first set up it is triggered once straight
 	away, with <path> equal to <wpath>.  Watches may be triggered
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 16:47:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 16:47:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291225.494170 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUWnl-0005F8-OT; Wed, 16 Mar 2022 16:47:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291225.494170; Wed, 16 Mar 2022 16:47:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUWnl-0005F1-L7; Wed, 16 Mar 2022 16:47:09 +0000
Received: by outflank-mailman (input) for mailman id 291225;
 Wed, 16 Mar 2022 16:47:08 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUWnk-0005Er-9V; Wed, 16 Mar 2022 16:47:08 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUWnk-0007Hk-1y; Wed, 16 Mar 2022 16:47:08 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUWnj-0001JP-Fm; Wed, 16 Mar 2022 16:47:07 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUWnj-0002yH-FI; Wed, 16 Mar 2022 16:47:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=lCH4aFhlI7U6n+dvwcrWOSyfdxgrJH1djlG5J0ENSuw=; b=lzjpmFqADXEo0E2lR/T91VgxWy
	WhOeTuchNTBvGQwzvlirD+F4nOyzHAijR6pDM7493z4U+CyIk+1qXxHwIzWaTsOUKDr3hBhv460YS
	I1jspo05rFQKuLoZedAJpfGQHph94d+kAplhqDPTEtuNo8I+OqdZO6xluJci1no+v6L8=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168632-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168632: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=d6f229f9a0592c4d5beb0a5c4e024231c27680d3
X-Osstest-Versions-That:
    qemuu=e2fb7d8aa218256793df99571d16f92074258447
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 16 Mar 2022 16:47:07 +0000

flight 168632 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168632/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168621
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168621
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168621
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168621
 test-armhf-armhf-xl-rtds     18 guest-start/debian.repeat    fail  like 168621
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168621
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168621
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168621
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168621
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 qemuu                d6f229f9a0592c4d5beb0a5c4e024231c27680d3
baseline version:
 qemuu                e2fb7d8aa218256793df99571d16f92074258447

Last test of basis   168621  2022-03-15 20:09:45 Z    0 days
Testing same since   168632  2022-03-16 07:58:00 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Akihiko Odaki <akihiko.odaki@gmail.com>
  Alex Bennée <alex.bennee@linaro.org>
  Cameron Esfahani <dirty@apple.com>
  Carwyn Ellis <carwynellis@gmail.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Gustavo Noronha Silva <gustavo@noronha.dev.br>
  Markus Armbruster <armbru@redhat.com>
  Paolo Bonzini <pbonzini@redhat.com>
  Peter Maydell <peter.maydell@linaro.org>
  Philippe Mathieu-Daudé <f4bug@amsat.org>
  Roman Bolshakov <r.bolshakov@yadro.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   e2fb7d8aa2..d6f229f9a0  d6f229f9a0592c4d5beb0a5c4e024231c27680d3 -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 18:11:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 18:11:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291234.494181 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUY7E-0005c9-1h; Wed, 16 Mar 2022 18:11:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291234.494181; Wed, 16 Mar 2022 18:11:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUY7D-0005c2-Tx; Wed, 16 Mar 2022 18:11:19 +0000
Received: by outflank-mailman (input) for mailman id 291234;
 Wed, 16 Mar 2022 18:11:19 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=GRoA=T3=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nUY7C-0005bg-QF
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 18:11:19 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on20620.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::620])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 777a4c54-a554-11ec-853c-5f4723681683;
 Wed, 16 Mar 2022 19:11:16 +0100 (CET)
Received: from DU2P251CA0007.EURP251.PROD.OUTLOOK.COM (2603:10a6:10:230::9) by
 AM7PR08MB5384.eurprd08.prod.outlook.com (2603:10a6:20b:10c::10) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Wed, 16 Mar
 2022 18:11:06 +0000
Received: from DB5EUR03FT058.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:230:cafe::7e) by DU2P251CA0007.outlook.office365.com
 (2603:10a6:10:230::9) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14 via Frontend
 Transport; Wed, 16 Mar 2022 18:11:06 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT058.mail.protection.outlook.com (10.152.20.255) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Wed, 16 Mar 2022 18:11:05 +0000
Received: ("Tessian outbound 741ca6c82739:v113");
 Wed, 16 Mar 2022 18:11:05 +0000
Received: from 4357fa95633b.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 94F4DF71-EF83-43D3-A579-AB33F3F6A674.1; 
 Wed, 16 Mar 2022 18:10:59 +0000
Received: from EUR03-VE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 4357fa95633b.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Wed, 16 Mar 2022 18:10:59 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by AM6PR08MB3398.eurprd08.prod.outlook.com (2603:10a6:20b:4e::23)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26; Wed, 16 Mar
 2022 18:10:56 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5061.029; Wed, 16 Mar 2022
 18:10:56 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 777a4c54-a554-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=G4OfeHp9GRcdBoo1Jl4lhr5/XWFubcYDm2UoXTWZMxA=;
 b=tX9bOiPRmSIwN3mbhcqT8sMJ4rbMxmdZDnEeXJ69d14E8QbXlQ3bNzh6M2C/93ovChUERQEm8U/rJypb0jNo+WwNd16aIgG9CWb32NR8IpPujTG3n/L4SxeM0fQTCadDKElFduuwBcrTS2cA385yTddwTUDYIJ3X+TFUQP4OuCg=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 3f5985618e0bc537
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=iiwegMvmvwFio5NJe80e9A/expUgnKfgO/j7C1qUA5x3swcAl+ur2MzY6qpmQ0J3ZHUyeCLoU688uVaOAx3fHnAJ3gakGrHm7w94EJFqvNr92zvLPRPxkx6+/CNMFNgY/hJGbanCiGZBpZOWOVa2T92z+hdzFIoGdyPbGe1ekBDwbYtUC/TaAhuUwvtu0qkV18zpdhA01PZvCd3/ebVKsU9MAG+z8qLCLs8PDhmFTP1adKRD4JBER0eJhGrlZW/7Kx+sUckrTAQwJfjDm2SMSN8tPkSRoPiMMUYc8VQYiadDWg+xYUZ2NDoeZa+qdM5/SCMkdZ5WO8Wo7jrh0MIbcw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=G4OfeHp9GRcdBoo1Jl4lhr5/XWFubcYDm2UoXTWZMxA=;
 b=L2wT1EBIHv8jtNc5Sw2XHHwJZQqEe5HDHreszV+R1JamPGDqbFHG0vCuslqMiSt9czEGevORWoJOvMWNzjDLqORm8T/3CKNA0tzeSIr5SG/fUki+kfAF16sBEcZvPU9onXB9fU2gEcwJVcMqSMTS0Wlw58oX5b02GhtoVSJvv8zDZX4vYuLCwlZfXy6aMZA6E8JIE4G7/aUUKTJle6O8UYPH8gFWc7wXCqfVYPyrWo892jdmauBQeohLHC8WXcDC2ciBUi88IAH/6gU6CWQhPwSpdens9PqGIVrK83AySelaCG87U/M9eOXkFc9bKdOpaIYGgy5Ncjy6X+x7LWHUdg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=G4OfeHp9GRcdBoo1Jl4lhr5/XWFubcYDm2UoXTWZMxA=;
 b=tX9bOiPRmSIwN3mbhcqT8sMJ4rbMxmdZDnEeXJ69d14E8QbXlQ3bNzh6M2C/93ovChUERQEm8U/rJypb0jNo+WwNd16aIgG9CWb32NR8IpPujTG3n/L4SxeM0fQTCadDKElFduuwBcrTS2cA385yTddwTUDYIJ3X+TFUQP4OuCg=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Juergen Gross <jgross@suse.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, Jan
 Beulich <jbeulich@suse.com>, Julien Grall <julien@xen.org>, Stefano
 Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH 1/3] tools/xenstore: add documentation for new
 set/get-feature commands
Thread-Topic: [PATCH 1/3] tools/xenstore: add documentation for new
 set/get-feature commands
Thread-Index: AQHYOVBscI1UHS2ILkaJ88oOeht+3KzCT7sA
Date: Wed, 16 Mar 2022 18:10:56 +0000
Message-ID: <A1F622D1-9323-45FD-9E46-EE42FC58F518@arm.com>
References: <20220316161017.3579-1-jgross@suse.com>
 <20220316161017.3579-2-jgross@suse.com>
In-Reply-To: <20220316161017.3579-2-jgross@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 12619a3e-1022-4593-3542-08da0778567f
x-ms-traffictypediagnostic:
	AM6PR08MB3398:EE_|DB5EUR03FT058:EE_|AM7PR08MB5384:EE_
X-Microsoft-Antispam-PRVS:
	<AM7PR08MB538405E1447DED05960C9AFBE4119@AM7PR08MB5384.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(4326008)(8936002)(71200400001)(5660300002)(6916009)(54906003)(66446008)(8676002)(64756008)(6486002)(508600001)(316002)(66946007)(66476007)(66556008)(76116006)(26005)(38100700002)(91956017)(38070700005)(83380400001)(33656002)(86362001)(2906002)(6512007)(6506007)(36756003)(53546011)(186003)(122000001)(2616005)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <B3CDBD6F9F78C646BF7A1D6BBA775FDE@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB3398
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT058.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	89b3f09e-3986-4fb8-33ea-08da07785151
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(2906002)(26005)(36756003)(2616005)(83380400001)(336012)(186003)(82310400004)(8936002)(33656002)(81166007)(356005)(47076005)(36860700001)(86362001)(6862004)(4326008)(5660300002)(70586007)(70206006)(8676002)(508600001)(40460700003)(6486002)(54906003)(6512007)(316002)(6506007)(53546011);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Mar 2022 18:11:05.4837
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 12619a3e-1022-4593-3542-08da0778567f
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT058.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM7PR08MB5384



> On 16 Mar 2022, at 16:10, Juergen Gross <jgross@suse.com> wrote:
>=20
> Add documentation for two new Xenstore wire commands SET_FEATURE and
> GET_FEATURE used to set or query the Xenstore features visible in the
> ring page of a given domain.
>=20
> Signed-off-by: Juergen Gross <jgross@suse.com>

Reviewed-by: Luca Fancellu <luca.fancellu@arm.com>

Cheers,
Luca

> ---
> docs/misc/xenstore-ring.txt |  1 +
> docs/misc/xenstore.txt      | 12 ++++++++++++
> 2 files changed, 13 insertions(+)
>=20
> diff --git a/docs/misc/xenstore-ring.txt b/docs/misc/xenstore-ring.txt
> index f91accb5b0..bd000f694e 100644
> --- a/docs/misc/xenstore-ring.txt
> +++ b/docs/misc/xenstore-ring.txt
> @@ -68,6 +68,7 @@ Mask    Description
> -----------------------------------------------------------------
> 1       Ring reconnection (see the ring reconnection feature below)
> 2       Connection error indicator (see connection error feature below)
> +4       GET_FEATURE and SET_FEATURE Xenstore wire commands are available
>=20
> The "Connection state" field is used to request a ring close and reconnec=
t.
> The "Connection state" field only contains valid data if the server has
> diff --git a/docs/misc/xenstore.txt b/docs/misc/xenstore.txt
> index ea3d8be177..31e3d53c52 100644
> --- a/docs/misc/xenstore.txt
> +++ b/docs/misc/xenstore.txt
> @@ -332,6 +332,18 @@ SET_TARGET		<domid>|<tdomid>|
>=20
> 	xenstored prevents the use of SET_TARGET other than by dom0.
>=20
> +GET_FEATURE		<domid>|		<value>|
> +SET_FEATURE		<domid>|<value>|
> +	Returns or sets the contents of the "feature" field located at
> +	offset 2064 of the Xenstore ring page of the domain specified by
> +	<domid>. <value> is a decimal number being a logical or of the
> +	feature bits as defined in docs/misc/xenstore-ring.txt. Trying
> +	to set a bit for a feature not being supported by the running
> +	Xenstore will be denied.
> +
> +	xenstored prevents the use of GET_FEATURE and SET_FEATURE other
> +	than by dom0.
> +
> ---------- Miscellaneous ----------
>=20
> CONTROL			<command>|[<parameters>|]
> --=20
> 2.34.1
>=20
>=20



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 18:11:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 18:11:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291237.494192 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUY7l-00062X-Bu; Wed, 16 Mar 2022 18:11:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291237.494192; Wed, 16 Mar 2022 18:11:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUY7l-00062Q-7Q; Wed, 16 Mar 2022 18:11:53 +0000
Received: by outflank-mailman (input) for mailman id 291237;
 Wed, 16 Mar 2022 18:11:51 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUY7j-000629-Sy; Wed, 16 Mar 2022 18:11:51 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUY7j-0000Ko-QT; Wed, 16 Mar 2022 18:11:51 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUY7j-0005Ts-By; Wed, 16 Mar 2022 18:11:51 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUY7j-0006fD-BV; Wed, 16 Mar 2022 18:11:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=7P2LLQondlk3JT6Ms2+L6cnjMvY/w0zfKFKIItQNZ0c=; b=MXnSS1mcFNg7bcCPViT9auVyWS
	CHwYPbC95Gr2GGHJc+JX9Tnx65R4MK+3DAc4AmjyOjV9n/fR0LEYgy5pO2Hy1v+tVcC0o/2uU276A
	MaNjGUwuGN7eA5MTVM9BI2PBXq67AWiJ8kvwXFfWsYruNlvDKarDPJePIc2S7f6IyloE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168637-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168637: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=5b56c52b5c1cc817a1ddac7f03aa6a02aeab4c04
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 16 Mar 2022 18:11:51 +0000

flight 168637 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168637/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 5b56c52b5c1cc817a1ddac7f03aa6a02aeab4c04
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   16 days
Failing since        168258  2022-03-01 01:55:31 Z   15 days  151 attempts
Testing same since   168637  2022-03-16 13:10:25 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 714 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 18:12:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 18:12:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291244.494203 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUY8T-0006gD-LV; Wed, 16 Mar 2022 18:12:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291244.494203; Wed, 16 Mar 2022 18:12:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUY8T-0006g6-IT; Wed, 16 Mar 2022 18:12:37 +0000
Received: by outflank-mailman (input) for mailman id 291244;
 Wed, 16 Mar 2022 18:12:36 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=GRoA=T3=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nUY8S-0005bg-Ap
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 18:12:36 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05on20609.outbound.protection.outlook.com
 [2a01:111:f400:7e1a::609])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a79a01f7-a554-11ec-853c-5f4723681683;
 Wed, 16 Mar 2022 19:12:35 +0100 (CET)
Received: from DB6PR0301CA0099.eurprd03.prod.outlook.com (2603:10a6:6:30::46)
 by AM4PR08MB2659.eurprd08.prod.outlook.com (2603:10a6:205:e::24) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Wed, 16 Mar
 2022 18:12:32 +0000
Received: from DB5EUR03FT019.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:6:30:cafe::d2) by DB6PR0301CA0099.outlook.office365.com
 (2603:10a6:6:30::46) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.28 via Frontend
 Transport; Wed, 16 Mar 2022 18:12:32 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT019.mail.protection.outlook.com (10.152.20.163) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Wed, 16 Mar 2022 18:12:32 +0000
Received: ("Tessian outbound 341d209a0e52:v113");
 Wed, 16 Mar 2022 18:12:32 +0000
Received: from 618860f71bae.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 C27574B7-B79F-4E1D-9AE0-45DF6520CA0D.1; 
 Wed, 16 Mar 2022 18:12:25 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 618860f71bae.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Wed, 16 Mar 2022 18:12:25 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by AM6PR08MB3398.eurprd08.prod.outlook.com (2603:10a6:20b:4e::23)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26; Wed, 16 Mar
 2022 18:12:20 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5061.029; Wed, 16 Mar 2022
 18:12:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a79a01f7-a554-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=mHZialGADjbLJ70K07850pUREdwwBrKyAsJHH4pFviY=;
 b=Q0kDgk5bS6Egrkv4IJolsNA/bRvgAbLW8ivJe6dBjdxx7AcA04TJmyi+VOKt+z76i91VSK+7HrhfHoXRZ+kY134Xn0e9ho9iHend1DF/h12tWpXO9wciTKyKSTLf6sWxJ0oWbAvQCvUGFf8oLI7u9wI3LaP8WCiGz3ugMaHLWmw=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 0aadb15de7744754
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Rfg/5zBVEfblMzgacXYYmVLqs4E519mhX7OA4awK5ndru3IXA5mg7ihq1l/eO10M8HgzZOx31Y3s5LW1TOYWMkwNh6mVti2ZgbJZZZuXOq8YD7Ejd3XHbEcZae+DjSCyn3rNhowfu3tm6catSvmHDYWUt/H1Ez9QsEsz6IMYgz6O0pqaUHGmphN72zgcZNklezvLdIZqByCD7VLJKyPSgTlyhWxepsuPIkj5K2gmbWvbJRcE09evxA1eimYI+D+WrVJ18lC0Tn0mgshhxHsAsHrZwiShg4rT1uSjJGOhyUmk1k2T3eBF9Eb36bobqT0T6xdm+G0DSB69zCfB7pk6Hg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=mHZialGADjbLJ70K07850pUREdwwBrKyAsJHH4pFviY=;
 b=Qb0ZWB7YDUsEBPXTOswd0/klo0jGJoSPsmZ+Kad+5z566sxkD0z9EyCxyjWlLvnGx6LFaK6Ps4nJE7tjB1kfK6BOzyyxr0kg5POMPM2uY2JZ040DDibDgqlx8sYEbcJFcErZAiWAFhBD8B6JzP2DTKDC8coxigfTXzAnA7JOrUcwxPG3GEYIYrCpiFNFWkPhOrzvwjq7G1vroj1Il7KaTS3Srt8qxxMqNJHdHQsnOEC+9kwu7kvbnRj0z4IOs8Z+GpnIN8dLW5H1zF7Ky1WHa05juV0nhvGgwbKGTKR+rZAoGlahefL3CmslqgC1ZzIY3Oe3yKVCPEayR8m3e0PUzQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=mHZialGADjbLJ70K07850pUREdwwBrKyAsJHH4pFviY=;
 b=Q0kDgk5bS6Egrkv4IJolsNA/bRvgAbLW8ivJe6dBjdxx7AcA04TJmyi+VOKt+z76i91VSK+7HrhfHoXRZ+kY134Xn0e9ho9iHend1DF/h12tWpXO9wciTKyKSTLf6sWxJ0oWbAvQCvUGFf8oLI7u9wI3LaP8WCiGz3ugMaHLWmw=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Juergen Gross <jgross@suse.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, Jan
 Beulich <jbeulich@suse.com>, Julien Grall <julien@xen.org>, Stefano
 Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH 2/3] tools/xenstore: add documentation for new
 set/get-quota commands
Thread-Topic: [PATCH 2/3] tools/xenstore: add documentation for new
 set/get-quota commands
Thread-Index: AQHYOVBw8wvXKdegjkeLoNnCEyRo9KzCUB6A
Date: Wed, 16 Mar 2022 18:12:20 +0000
Message-ID: <8DFD23A1-8445-4187-8F95-A543C27CB07B@arm.com>
References: <20220316161017.3579-1-jgross@suse.com>
 <20220316161017.3579-3-jgross@suse.com>
In-Reply-To: <20220316161017.3579-3-jgross@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 26a7796b-62ae-4dd7-102d-08da07788a53
x-ms-traffictypediagnostic:
	AM6PR08MB3398:EE_|DB5EUR03FT019:EE_|AM4PR08MB2659:EE_
X-Microsoft-Antispam-PRVS:
	<AM4PR08MB26598A0DDEAFE13626ACDB4EE4119@AM4PR08MB2659.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 nN2i51mIb5FWmc6LaT6WDy15R3rDmiCVzElLXiBD39XtPfuk7XCgRhKuj32795PkwhL84L/G1pMbDmachJcB4RW8YI+SVox+3WpeWtLWAK2kqX5lTINgYgBHZtUFue88ogaaPxkXqqoklql1yU2UDUWTT3Hfx18eC08P7hPelrozFi7b9xZNkI6jF+IZ/SU9SjJclmSEipOSXS3dgt2kWKBu1Lz+jKnlCwWb+hHq0AnS2zQD6GM5UE2qa3dZXOuGfRiuq98bGBy2bIuNk65jmv8nj6NgL6fGt/aCGABQJ1wmT64PCB4QxvY2ZODHj44KGjKvq7biMlzpeLcUCvdLqas2+B9T2VjjyIpmvha3CgPo7z1lF6hEsIxtqygqgLZUW0g/rf5eG4pMiqKnDQ36/3cTEpLfcRtxbLThw1v+dUvLVsQuvc8ycSiqwLKs1PIoc8cIQUiuyQvBR+XXcqkzv1niVOKxHvW6jD8uPlxgC8OCvl3+67DvsXZ3OjPmW/MWOjdcULTqnac78fc+FW3r7RlUZxXnzAFeAxLbpcLVlixObFk6LtZKF0kfr29QC8E/TDXv8tW2K62qcEnERBI65fSVfDJAvCQPaCxwr1hhP3/fmdNsJnwLVqwmSg/sC2CDsmEYcFeOZLErfVzAdCbHburldsZgkp+M442lxWpmeu5/nVQ2eRaOjm8otHyupiXiWXnqMgOphH0nEK3hf6aIgFU9nrXTw98ovP40oUrROvFHqPTIZCzDAXST1MCm3sdy
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(15650500001)(4326008)(8936002)(71200400001)(5660300002)(6916009)(54906003)(66446008)(8676002)(64756008)(6486002)(508600001)(316002)(66946007)(66476007)(66556008)(76116006)(26005)(38100700002)(91956017)(38070700005)(83380400001)(33656002)(86362001)(2906002)(6512007)(6506007)(36756003)(53546011)(186003)(122000001)(2616005)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <A3678B76DF88AD4F8EA3EA846EBCE8D4@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB3398
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT019.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	0e9d85b8-5980-4ce0-cd5b-08da07788317
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	/YFjBhcb28GGBcbC0dIqq8n2fYNnzQ2V+kJnHxk1FhKDjGxjI5FCcr+N4St6BLCDBZrEoA/Eu962zpP/DEE4e4x6+kuyn4bAPXwwpFPbGVultXdzoArK7qnPhajQ4TSG7gxVd4hJTswcs1go4zfq2MOJljzmvgmlpY4Ae/7HjVQwPpw2l7RHiqKSCzNoEwLETuAc6/qiTQbbnhCADlubYsSasUq5qZwwHOvTwI2x113LMX90eTwS27GvHZk7nIga8XcmnFndqZswQGwj+OztiS55sLZZxF1bf3UQ3JoLDSiD2YP8yzdThyaHSHej0xMvFm4ID/uSS+/3Z4zAaVemqhWnVAAhMLHB6naCRdQA/u1JEiiWoQ4T201+VM8j6lsVStGRxsxyTblgBIztUWZap1auUrV0SajSRkv9R3bAXB3TPWkoMD2U8B+EmUCSFjAw/6i9O1qWJ/BkJq1S9IXkM5ZKsYV78dWtlyC4t1ii+9+a7C98rLq/FDl+IJ+13sR8Xgj8mWL2sgDa6qaphwDFoCwIxuiLh1clVkofMchEvMaJ/SWaAlru7ncxODgIq1ORDUzwH5TYL6tNX90lK4T5lQ41kpMd+wI1UITYv+TuPZCC/SNwoQZIPAQCTtKpL3FG88JlhB7rCQan7qQUWFf0jzTnCxODf+aF09cFGi58nHL7uMURnLIlEZsjaKaA4hbK
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(86362001)(33656002)(8936002)(2906002)(82310400004)(356005)(81166007)(186003)(40460700003)(54906003)(6512007)(316002)(2616005)(26005)(336012)(508600001)(53546011)(6486002)(6506007)(70206006)(70586007)(6862004)(8676002)(4326008)(83380400001)(47076005)(5660300002)(36860700001)(36756003)(15650500001);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Mar 2022 18:12:32.4515
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 26a7796b-62ae-4dd7-102d-08da07788a53
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT019.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR08MB2659



> On 16 Mar 2022, at 16:10, Juergen Gross <jgross@suse.com> wrote:
>=20
> Add documentation for two new Xenstore wire commands SET_QUOTA and
> GET_QUOTA used to set or query the Xenstore quota of a given domain.
>=20
> Signed-off-by: Juergen Gross <jgross@suse.com>

Reviewed-by: Luca Fancellu <luca.fancellu@arm.com>

Cheers,
Luca

> ---
> docs/misc/xenstore-ring.txt |  1 +
> docs/misc/xenstore.txt      | 12 ++++++++++++
> 2 files changed, 13 insertions(+)
>=20
> diff --git a/docs/misc/xenstore-ring.txt b/docs/misc/xenstore-ring.txt
> index bd000f694e..0cb72a3e35 100644
> --- a/docs/misc/xenstore-ring.txt
> +++ b/docs/misc/xenstore-ring.txt
> @@ -69,6 +69,7 @@ Mask    Description
> 1       Ring reconnection (see the ring reconnection feature below)
> 2       Connection error indicator (see connection error feature below)
> 4       GET_FEATURE and SET_FEATURE Xenstore wire commands are available
> +8       GET_QUOTA and SET_QUOTA Xenstore wire commands are available
>=20
> The "Connection state" field is used to request a ring close and reconnec=
t.
> The "Connection state" field only contains valid data if the server has
> diff --git a/docs/misc/xenstore.txt b/docs/misc/xenstore.txt
> index 31e3d53c52..dd75a81328 100644
> --- a/docs/misc/xenstore.txt
> +++ b/docs/misc/xenstore.txt
> @@ -344,6 +344,18 @@ SET_FEATURE		<domid>|<value>|
> 	xenstored prevents the use of GET_FEATURE and SET_FEATURE other
> 	than by dom0.
>=20
> +GET_QUOTA		<domid>|<quota>|	<value>|
> +SET_QUOTA		<domid>|<quota>|<value>|
> +	Returns or sets a quota value for the domain being specified by
> +	<domid>. <quota> is one of "nodes", "watches", "transactions",
> +	"node-size" or "permissions". <value> is a decimal number
> +	specifying the quota value, with "0" having the special meaning
> +	of quota checks being disabled. The initial quota settings for
> +	a domain are the global ones of Xenstore.
> +
> +	xenstored prevents the use of GET_QUOTA and SET_QUOTA other
> +	than by dom0.
> +
> ---------- Miscellaneous ----------
>=20
> CONTROL			<command>|[<parameters>|]
> --=20
> 2.34.1
>=20
>=20



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 18:17:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 18:17:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291249.494214 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUYCn-0007TY-Du; Wed, 16 Mar 2022 18:17:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291249.494214; Wed, 16 Mar 2022 18:17:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUYCn-0007TR-Ap; Wed, 16 Mar 2022 18:17:05 +0000
Received: by outflank-mailman (input) for mailman id 291249;
 Wed, 16 Mar 2022 18:17:05 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=GRoA=T3=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nUYCm-0007TL-U3
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 18:17:05 +0000
Received: from EUR03-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur03on0600.outbound.protection.outlook.com
 [2a01:111:f400:fe0a::600])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4794b915-a555-11ec-853c-5f4723681683;
 Wed, 16 Mar 2022 19:17:03 +0100 (CET)
Received: from AM5PR0601CA0062.eurprd06.prod.outlook.com (2603:10a6:206::27)
 by DB7PR08MB3547.eurprd08.prod.outlook.com (2603:10a6:10:4f::27) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.25; Wed, 16 Mar
 2022 18:17:01 +0000
Received: from AM5EUR03FT013.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:206:0:cafe::72) by AM5PR0601CA0062.outlook.office365.com
 (2603:10a6:206::27) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14 via Frontend
 Transport; Wed, 16 Mar 2022 18:17:01 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT013.mail.protection.outlook.com (10.152.16.140) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Wed, 16 Mar 2022 18:17:00 +0000
Received: ("Tessian outbound 741ca6c82739:v113");
 Wed, 16 Mar 2022 18:17:00 +0000
Received: from 8830ec9a8197.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 C86A487E-CC1D-4A3C-BC0C-989A89B2B95C.1; 
 Wed, 16 Mar 2022 18:16:53 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 8830ec9a8197.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Wed, 16 Mar 2022 18:16:53 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by DB7PR08MB2987.eurprd08.prod.outlook.com (2603:10a6:5:1c::25) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.28; Wed, 16 Mar
 2022 18:16:52 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5061.029; Wed, 16 Mar 2022
 18:16:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4794b915-a555-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=1LPbMz1+hxUjd+1jANi9gXQwCmrboKPbX+r2mfQ8QT4=;
 b=W1zTaA6FmhxJf5irX3W9Yx45cWpkt0P6NefR/x1I1Qkiiqr98lSHZy9v2rgTgRDFq+t0hRF6zp2g6r6x+hWlPi/E5Jvfo9wCaLV2jZqha5Uue2khSMQE1Sv4yxhggW4E3cbtxhUqRXFuTmITZCv+qEUcHZp/JD8h0yiS5jkt0F0=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 433635942d133f32
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=D9GVLzY6COHb22T/7C8TD3h+WVBE2xMoUGOsJAypMIY6UBiD8gIL4Y9qUhtWoTsQKMmFyhQCJKJmT3N02FxFV1XGIzUZSUWTvpK5dsPJMkfiQlyYYuzmDpR/5RP5fqYUdRXoat8ZeqLTaLUK5vTW7wxFbg1SnRUfM+PyEYlNbieuvpJ0IoDTpyMYexIh4hm5xV1lsPoaW3jP9tNPwjzHa0q8WvJB3sQRQ4ChwR0cL+kKRXRucNrSpuqqjV14YgBrgePk93/yAXgDk/bqk6p0AtjTgEJ+nviZc0BTMNALddz5FUbNACGgT3IcybP2VGlxWzo4BdxK4uPpZbGoFLGs5A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=1LPbMz1+hxUjd+1jANi9gXQwCmrboKPbX+r2mfQ8QT4=;
 b=ew7qUdsaz1wIzbgm2FThj7MXpNjz1NqozZP0LUxlaMWLESgR0smLYhDATmJRBFh/2LgC+gP0NS1giaVzJJ9UJSleV9+vozA0mYcCwpbKgxkVZe3Tg5+q0ydpjz5o+HJcupqqC5TAxxpxuJGCPP7r6np9S08PUeB2uqsu/N4bgnUiccwrIjHFxp/bpt4nxzZQ2XUBxlTRy/MJLD2NEzYr/QTZv+ehSMQ110lDSJ/CC7RO5VSZZLcHhESim+PhATW4cpavRY3Iw93pmOOMD1mxtHoOQYxhFLaoaZBpHlV/2+xYu/pdBNs0H0aGlMPcprdlkJxvXiyGhT7BGwSZTNY8BA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=1LPbMz1+hxUjd+1jANi9gXQwCmrboKPbX+r2mfQ8QT4=;
 b=W1zTaA6FmhxJf5irX3W9Yx45cWpkt0P6NefR/x1I1Qkiiqr98lSHZy9v2rgTgRDFq+t0hRF6zp2g6r6x+hWlPi/E5Jvfo9wCaLV2jZqha5Uue2khSMQE1Sv4yxhggW4E3cbtxhUqRXFuTmITZCv+qEUcHZp/JD8h0yiS5jkt0F0=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Juergen Gross <jgross@suse.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, Jan
 Beulich <jbeulich@suse.com>, Julien Grall <julien@xen.org>, Stefano
 Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH 3/3] tools/xenstore: add documentation for extended watch
 command
Thread-Topic: [PATCH 3/3] tools/xenstore: add documentation for extended watch
 command
Thread-Index: AQHYOVBwqPi09a60w0Ci2FVt6reoH6zCUWQA
Date: Wed, 16 Mar 2022 18:16:52 +0000
Message-ID: <6D6D470C-C6A6-440D-B70D-C9737853D050@arm.com>
References: <20220316161017.3579-1-jgross@suse.com>
 <20220316161017.3579-4-jgross@suse.com>
In-Reply-To: <20220316161017.3579-4-jgross@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: b012c227-3a34-4cc4-dfc7-08da07792a40
x-ms-traffictypediagnostic:
	DB7PR08MB2987:EE_|AM5EUR03FT013:EE_|DB7PR08MB3547:EE_
X-Microsoft-Antispam-PRVS:
	<DB7PR08MB3547A2A392899F81AAF2C31DE4119@DB7PR08MB3547.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(4326008)(66446008)(8676002)(66556008)(122000001)(26005)(38100700002)(64756008)(186003)(83380400001)(53546011)(86362001)(2616005)(6506007)(6512007)(36756003)(76116006)(66946007)(508600001)(38070700005)(316002)(6916009)(54906003)(33656002)(91956017)(8936002)(66476007)(6486002)(2906002)(5660300002)(71200400001)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <DBAB908765B1AD499221A90619A1E44A@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR08MB2987
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT013.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	d2b922db-3209-4841-587e-08da07792588
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(53546011)(6506007)(2906002)(186003)(26005)(82310400004)(508600001)(6512007)(6486002)(86362001)(2616005)(47076005)(70206006)(40460700003)(6862004)(5660300002)(8936002)(36860700001)(83380400001)(336012)(316002)(356005)(81166007)(54906003)(33656002)(8676002)(70586007)(4326008)(36756003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Mar 2022 18:17:00.6897
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: b012c227-3a34-4cc4-dfc7-08da07792a40
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT013.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR08MB3547
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From xen-devel-bounces@lists.xenproject.org Wed Mar 16 18:39:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 18:39:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291252.494225 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUYYF-0001TL-5L; Wed, 16 Mar 2022 18:39:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291252.494225; Wed, 16 Mar 2022 18:39:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUYYF-0001TE-2U; Wed, 16 Mar 2022 18:39:15 +0000
Received: by outflank-mailman (input) for mailman id 291252;
 Wed, 16 Mar 2022 18:39:13 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Ybcc=T3=gmail.com=raphning@srs-se1.protection.inumbo.net>)
 id 1nUYYD-0001T8-PF
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 18:39:13 +0000
Received: from mail-wm1-x336.google.com (mail-wm1-x336.google.com
 [2a00:1450:4864:20::336])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 5fc02b8e-a558-11ec-8eba-a37418f5ba1a;
 Wed, 16 Mar 2022 19:39:12 +0100 (CET)
Received: by mail-wm1-x336.google.com with SMTP id
 m42-20020a05600c3b2a00b00382ab337e14so3713830wms.3
 for <xen-devel@lists.xenproject.org>; Wed, 16 Mar 2022 11:39:12 -0700 (PDT)
Received: from dev-dsk-raphning-1b-027ba2d5.eu-west-1.amazon.com
 (54-240-197-233.amazon.com. [54.240.197.233])
 by smtp.gmail.com with ESMTPSA id
 r4-20020a05600c35c400b00389f368cf1esm975314wmq.40.2022.03.16.11.39.10
 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128);
 Wed, 16 Mar 2022 11:39:11 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5fc02b8e-a558-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:mime-version
         :content-transfer-encoding;
        bh=7hTe8lqUiQDtRa2eY7/ZeO/Y25PyQNsO2Qnt46oLy3Y=;
        b=mT46jWmHmz9VfTAbZ416/td5UINURUvs0TJNEqPRoQSTpuK1eb6zWj7jxSuqZzMY5v
         e9k8lRE3JzCQlcBNGdkTDGuj/mmMWE+LeVROAHMOukcVxnOBXCzNTOkZpQzW+Q12AFXF
         /22r4hGVAplRoLHn3lBEpDeBarOzO2aQ/KXfsVs0tMPjaZ0Kru45y8umicU4W6P2Nyf8
         17zHSy9TB1a0e6FVvegDtDQKI8/lC1mdfV6eoxSWo3c8tlk9prUWcWv3knoTbIW3iQNs
         n4L/GqSzooqwWgB5ldLzq1tlKprSgYppJc8wHM3BzdFrAtLXih6Hz968phrtLCq8kFWA
         aVdw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version
         :content-transfer-encoding;
        bh=7hTe8lqUiQDtRa2eY7/ZeO/Y25PyQNsO2Qnt46oLy3Y=;
        b=NWDzpKSee+vBNmyamMpAujdRsu2B95FzpdxZ1RCvS25vQBPNzSANKUkxU3Y4wuD2ii
         oxMqRsOlHNmyUFnt7uCVcUKkiE13WNG8VMd+Q//yiIYQur6jWwAy27Rp9p972sBdLI2d
         MKa+dAO0tnGhscrpr/oyxUVxPPNTbnvvMvP1BbLZsG0vg9xUIjEYTLEgUpbeOUifK2b/
         x39MVbnnJLdncKFFN2tW/7B2B4s/WDwtjos8hDQXqlfz6EkM4VlxAi65gv34l1UqsyEK
         tCcViFp1wSX115IN0nZsr0dnTlMm91/BmPYniJsleE6MPDGKq5cka6aY2XsMyQaS+RKy
         x5cg==
X-Gm-Message-State: AOAM5337lyf+EOqmu20iarJV8KQPChHtYI9a8fu6Z28qMytMPFHikshg
	lfrWZaKbeHYyj/NtJ2045Iw1VoZlBIqBpzvv
X-Google-Smtp-Source: ABdhPJwJSwDpjRLgkpBFdDwAmL+zFum5LxzHvz3UWLoG6C5yDmhDomO90pIDvRnzZ77YkTGlNCVX3g==
X-Received: by 2002:a1c:7c06:0:b0:389:7fd0:f6ec with SMTP id x6-20020a1c7c06000000b003897fd0f6ecmr8318170wmc.44.1647455951712;
        Wed, 16 Mar 2022 11:39:11 -0700 (PDT)
From: Raphael Ning <raphning@gmail.com>
To: xen-devel@lists.xenproject.org
Cc: Raphael Ning <raphning@gmail.com>,
	Raphael Ning <raphning@amazon.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	David Vrabel <dvrabel@amazon.co.uk>
Subject: [XEN PATCH] evtchn/fifo: Don't set PENDING bit if guest misbehaves
Date: Wed, 16 Mar 2022 18:38:41 +0000
Message-Id: <6b84a20b2753130cc62406a0fd14d2708f6f504b.1647455219.git.raphning@amazon.com>
X-Mailer: git-send-email 2.32.0
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Raphael Ning <raphning@amazon.com>

Currently, evtchn_fifo_set_pending() will mark the event as PENDING even
if it fails to lock the FIFO event queue(s), or if the guest has not
initialized the FIFO control block for the target vCPU. A well-behaved
guest should never trigger either of these cases.

There is no good reason to set the PENDING bit (the guest should not
depend on this behaviour anyway) or check for pollers in such corner
cases, so skip that. In fact, both the comment above the for loop and
the commit message for

 41a822c39263 xen/events: rework fifo queue locking

suggest that the bit should be set after the FIFO queue(s) are locked.

Take the opportunity to rename the was_pending variable (flipping its
sense) and switch to the standard bool type.

Suggested-by: David Vrabel <dvrabel@amazon.co.uk>
Signed-off-by: Raphael Ning <raphning@amazon.com>
---
 xen/common/event_fifo.c | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/xen/common/event_fifo.c b/xen/common/event_fifo.c
index ed4d3beb10f3..6c74ccebebb7 100644
--- a/xen/common/event_fifo.c
+++ b/xen/common/event_fifo.c
@@ -165,7 +165,7 @@ static void cf_check evtchn_fifo_set_pending(
     unsigned int port;
     event_word_t *word;
     unsigned long flags;
-    bool_t was_pending;
+    bool_t check_pollers = false;
     struct evtchn_fifo_queue *q, *old_q;
     unsigned int try;
     bool linked = true;
@@ -226,8 +226,6 @@ static void cf_check evtchn_fifo_set_pending(
         spin_unlock_irqrestore(&q->lock, flags);
     }
 
-    was_pending = guest_test_and_set_bit(d, EVTCHN_FIFO_PENDING, word);
-
     /* If we didn't get the lock bail out. */
     if ( try == 3 )
     {
@@ -249,6 +247,8 @@ static void cf_check evtchn_fifo_set_pending(
         goto unlock;
     }
 
+    check_pollers = !guest_test_and_set_bit(d, EVTCHN_FIFO_PENDING, word);
+
     /*
      * Link the event if it unmasked and not already linked.
      */
@@ -314,7 +314,7 @@ static void cf_check evtchn_fifo_set_pending(
                                  &v->evtchn_fifo->control_block->ready) )
         vcpu_mark_events_pending(v);
 
-    if ( !was_pending )
+    if ( check_pollers )
         evtchn_check_pollers(d, port);
 }
 
-- 
2.32.0



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 18:59:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 18:59:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291255.494235 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUYrT-0003qd-QO; Wed, 16 Mar 2022 18:59:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291255.494235; Wed, 16 Mar 2022 18:59:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUYrT-0003qW-NS; Wed, 16 Mar 2022 18:59:07 +0000
Received: by outflank-mailman (input) for mailman id 291255;
 Wed, 16 Mar 2022 18:59:06 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=EYuC=T3=srcf.net=amc96@srs-se1.protection.inumbo.net>)
 id 1nUYrS-0003qQ-O2
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 18:59:06 +0000
Received: from ppsw-31.csi.cam.ac.uk (ppsw-31.csi.cam.ac.uk [131.111.8.131])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 25878cbf-a55b-11ec-853c-5f4723681683;
 Wed, 16 Mar 2022 19:59:04 +0100 (CET)
Received: from hades.srcf.societies.cam.ac.uk ([131.111.179.67]:49448)
 by ppsw-31.csi.cam.ac.uk (ppsw.cam.ac.uk [131.111.8.137]:25)
 with esmtps (TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
 id 1nUYrI-0006yT-Jx (Exim 4.95) (return-path <amc96@srcf.net>);
 Wed, 16 Mar 2022 18:58:56 +0000
Received: from [192.168.1.30] (unknown [84.66.49.165])
 (Authenticated sender: amc96)
 by hades.srcf.societies.cam.ac.uk (Postfix) with ESMTPSA id D916D1FB1C;
 Wed, 16 Mar 2022 18:58:55 +0000 (GMT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 25878cbf-a55b-11ec-853c-5f4723681683
X-Cam-AntiVirus: no malware found
X-Cam-ScannerInfo: https://help.uis.cam.ac.uk/email-scanner-virus
Message-ID: <e07d0eda-c117-c83e-227e-7a934585f265@srcf.net>
Date: Wed, 16 Mar 2022 18:58:55 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [XEN PATCH] evtchn/fifo: Don't set PENDING bit if guest
 misbehaves
Content-Language: en-GB
To: Raphael Ning <raphning@gmail.com>, xen-devel@lists.xenproject.org
Cc: Raphael Ning <raphning@amazon.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Wei Liu <wl@xen.org>, David Vrabel <dvrabel@amazon.co.uk>
References: <6b84a20b2753130cc62406a0fd14d2708f6f504b.1647455219.git.raphning@amazon.com>
From: Andrew Cooper <amc96@srcf.net>
In-Reply-To: <6b84a20b2753130cc62406a0fd14d2708f6f504b.1647455219.git.raphning@amazon.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

On 16/03/2022 18:38, Raphael Ning wrote:
> From: Raphael Ning <raphning@amazon.com>
>
> Currently, evtchn_fifo_set_pending() will mark the event as PENDING even
> if it fails to lock the FIFO event queue(s), or if the guest has not
> initialized the FIFO control block for the target vCPU. A well-behaved
> guest should never trigger either of these cases.
>
> There is no good reason to set the PENDING bit (the guest should not
> depend on this behaviour anyway) or check for pollers in such corner
> cases, so skip that. In fact, both the comment above the for loop and
> the commit message for
>
>  41a822c39263 xen/events: rework fifo queue locking
>
> suggest that the bit should be set after the FIFO queue(s) are locked.
>
> Take the opportunity to rename the was_pending variable (flipping its
> sense) and switch to the standard bool type.
>
> Suggested-by: David Vrabel <dvrabel@amazon.co.uk>
> Signed-off-by: Raphael Ning <raphning@amazon.com>
> ---
>  xen/common/event_fifo.c | 8 ++++----
>  1 file changed, 4 insertions(+), 4 deletions(-)
>
> diff --git a/xen/common/event_fifo.c b/xen/common/event_fifo.c
> index ed4d3beb10f3..6c74ccebebb7 100644
> --- a/xen/common/event_fifo.c
> +++ b/xen/common/event_fifo.c
> @@ -165,7 +165,7 @@ static void cf_check evtchn_fifo_set_pending(
>      unsigned int port;
>      event_word_t *word;
>      unsigned long flags;
> -    bool_t was_pending;
> +    bool_t check_pollers = false;

Considering your commit message, did you intend to change this to bool?

Can be fixed on commit.  Acked-by: Andrew Cooper <andrew.cooper3@citrix.com>

~Andrew

P.S. David - do you want your maintainership back?  None of this code
has undergone any major changes since you wrote it.


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 19:23:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 19:23:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291258.494246 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUZEl-00072e-Qv; Wed, 16 Mar 2022 19:23:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291258.494246; Wed, 16 Mar 2022 19:23:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUZEl-00072X-Nv; Wed, 16 Mar 2022 19:23:11 +0000
Received: by outflank-mailman (input) for mailman id 291258;
 Wed, 16 Mar 2022 19:23:10 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=SsrA=T3=citrix.com=prvs=067c1f106=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nUZEj-00072R-SX
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 19:23:10 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 812e1206-a55e-11ec-8eba-a37418f5ba1a;
 Wed, 16 Mar 2022 20:23:07 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 812e1206-a55e-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647458587;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=YyJiFnqb2mvWHh6Pi1BTMc8UiOIEWmx0GZL2NWtEag0=;
  b=Abh7pkDsw8dL6ltDvkpK1SW9QZPA/N2mAL049EP9b9A6X4bNOzhsFh0Y
   Ism1401KVysoTK6UKaVgKDPXt9K6scEoCgg6B56Jq5IWnvEAQH1UukUiE
   NC3nVX5GxeNKoYNBkmLQdi/zvpk1kajG7Y75CwLBUe6r0vUsF4QYgTjiL
   M=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66425336
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:zY1T4KCaUdaRLRVW/xTjw5YqxClBgxIJ4kV8jS/XYbTApGx332MHn
 GBNWG+AaPuJZzTxKd9zPIji9U0O75GDy9MyQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vg3NYy6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhyx
 /FurJWQVT4JYJfNvMZaTAVjSj1XaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguwKKsXxMZxZkXZn1TzDVt4tQIzZQrWM7thdtNs1rp4QQayDP
 JFHAdZpRBr5QCUUNwc7MZMvv6SBhn7wTjZajk3A8MLb5ECMlVcsgdABKuH9f9WQQMxPk0Wwp
 2TY/n/4CBUXKNyezzWe9numwOTImEvTSI8UUbG16PNuqFmS3XAITg0bU0Ohpvu0gVL4XMhQQ
 2QW8Cczqak59GSwU8LwGRa/pRasoRo0S9dWVeog52mwJrH8uljDQDJeF3gYNYJg5JReqSEWO
 kGhnNzNJiVmkKGsaSyn95O26iyuAnEJBDpXDcMbdjct797mqYA1qxvASNd/DaK45uHI9SHML
 yOi93Zn2ehK5SIf/+DipA2c3WrwznTcZlRtjjg7SF5J+e+QiGSNQ4WzoWbW4v9bRGpyZgnQ5
 SNU8yRyAQ1nMH1sqMBvaLhVdF1Kz6zcWNE5vbKJN8J5n9hK0yT/Fb28GBkkeC9U3j8sIFcFm
 nP7twJL/4N0N3C3d6JxaI/ZI510kfe6RI68DKCNNIAmjn1NmOmvp3gGiam4hTyFraTRuftnZ
 cfznTiEUB729piLPBLpHrxAgNfHNwg1xH/JRICT8vhU+eH2WZJhcp9caAHmRrlgtMus+VyJm
 /4CZ5ri40gOC4XWP3iImbP/2HhXdBDX87it8JcJHgNCSyI7cFwc5wj5mupwJdY6w/wLyo8lP
 BiVAydl9bY2vlWeQS2iYXF/crL/G5F5qHMwJys3Oli0nXMkZO6SAG03LvPboZFPGDRf8MNJ
IronPort-HdrOrdr: A9a23:Dr9hSajuNFXE30z1DMOo4pTusXBQX3p13DAbv31ZSRFFG/FwyP
 rBoB1L73DJYWgqNE3IwerwRJVpQRvnhPpICRF4B8btYOCUghrWEGgE1/qi/9SAIVywygc578
 ZdmsdFeaXN5DRB/KTHCUyDYqsdKbq8geCVbIXlvgxQpGhRAskKhWoYe2Wm+w9NNXN77PICZc
 ChD6F81l2dkAEsH72G7w4+Lo7+TrPw5ffbSC9DIyRixBiFjDuu5rK/OQOfxA0iXzRGxqpn2X
 TZkiTij5/T8M2T+1v57Sv+/p5WkNzuxp9oH8qXkPUYLT3ql0KBeJlhYbufpzo4ydvfqmrC0e
 O85ivIDf4DrE85TVvF5ycFHDOQiQrG3kWSjWNwR0GT+fARCghKUPapzrgpDCcxo3BQze2Ulp
 g7gl5x/qAnfi8p1k7Glqj1fgAvmUyurXU4l+kPy3RZTIsFcbdU6ZcS5UVPDf47bWjHAa0cYa
 FT5fvnlb1rmJKhHgfkl3gqxMbpUmU4Hx+ATERHssuJ0yJOlHQ8y0cD3sQQknoJ6Zp4EvB/lq
 j5G7UtkKsLQt4dbKp7CutEScyrCnbVSRaJNG6JO1zoGKwOJnqIoZ/q57c+4v2sZfUzvdYPsY
 WEVEkduX85ekroB8HL1JpX8grVSGH4RjjpwtE23ekxhlQ9fsucDcSuciFaryL7mYRsPiTyYY
 fGBK5r
X-IronPort-AV: E=Sophos;i="5.90,187,1643691600"; 
   d="scan'208";a="66425336"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=MJw2r4XtmMoKdpqtLP5XoLOrOD9Asx3dVV4BBExi7/ga2NxNHs6y26M/eoR7lSZVxpFQxjjchp7Sk7LAF5skdtUEncmd1Ako+/S/qFiv/gj7BWSgzSKD3eAiwHXpQSbImsfXUIaVVpb52cb1OeJ63S9oLoAb7YUOhqApjeIYCdLHgDiyGPE/VMegFb9xAQZpoJc0tA/AJ9xdJ/j9lbuQtLTM9/DF/PFRu/wzaTx/SnfBy8u0jwXPIaVC4yzxkVt8OE9+Q5XZLVjXEYayUCRMPNDhGvP4n0oXpKBGzZ4wqTazWVKDJ2IsCXjjK8v6w7KTKjpOvlkTDBS/vRBKfSuBIw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=YyJiFnqb2mvWHh6Pi1BTMc8UiOIEWmx0GZL2NWtEag0=;
 b=JpEwGILQyFmhck9k6rwE9gzMau09NDCw0W3ytre8Kg76haIIYs+Nr0UxL3xGawk9xUDpvNl6nJ9TTE7jRttHQf1Nk7xNrPQgYxB9eqS5gVPYhkRAD9klbae9Vn6qaWd+FNYSV2oGNRL8kd1eGmx7OIa7ArUe1OiVkVcpnWt35RDRwlwkKXTt5tT7CAy1fVc5ZfXHPSjV/lL0QJpIBQu27qf1OSKHArcbAqlhlSGFJnzAJSgNzXncxBuQ/eOiinYrJjnM6qrrldeCl5SLLg9qcF7owCM3KSW+sUpbn7M2Uxq94voURgaC9xLn9HeiKOdz85IxX6TSuSAXfLWzgm23iA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=YyJiFnqb2mvWHh6Pi1BTMc8UiOIEWmx0GZL2NWtEag0=;
 b=LRFP89mFHenQIoB8eIwqIjBDzV3loaNY5GjQIaWi5Ah6YzODF2fNcGhj+9XKM6I1yHzeojr+6E9sIgqMKMAhks5BuAxeV3RHntPSQcrSX4QSDjk1SuRnea5+bmZZDs4kZ9LwRQ44FY79QgFjJNa3KHFuzaRHbUPdv5rYQUD9yIs=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
	=?utf-8?B?TWFyZWsgTWFyY3p5a293c2tpLUfDs3JlY2tp?=
	<marmarek@invisiblethingslab.com>, Xen-devel <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH] x86/cet: Remove writeable mapping of the BSPs shadow
 stack
Thread-Topic: [PATCH] x86/cet: Remove writeable mapping of the BSPs shadow
 stack
Thread-Index: AQHYOI1bRL6jiuzp4UWoineooRKJ46zBsAOAgAC1YIA=
Date: Wed, 16 Mar 2022 19:23:00 +0000
Message-ID: <101d1e70-51c7-036d-c5e2-fd382a2be7a8@citrix.com>
References: <20220315165340.32144-1-andrew.cooper3@citrix.com>
 <345b2f17-5fba-5dba-f7f5-c1634fc69a6e@suse.com>
In-Reply-To: <345b2f17-5fba-5dba-f7f5-c1634fc69a6e@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 397e0a45-28ff-45be-977a-08da07826282
x-ms-traffictypediagnostic: SN6PR03MB4078:EE_
x-microsoft-antispam-prvs: <SN6PR03MB4078598796B79066C5396EBFBA119@SN6PR03MB4078.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(4326008)(38070700005)(186003)(26005)(83380400001)(36756003)(31686004)(2906002)(5660300002)(8936002)(64756008)(54906003)(66476007)(66446008)(6916009)(66946007)(76116006)(508600001)(66556008)(91956017)(8676002)(53546011)(2616005)(31696002)(6512007)(316002)(6506007)(86362001)(82960400001)(38100700002)(122000001)(6486002)(71200400001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?aVlLK1ZZMG5jK3UxcDFhdVBkNlVKa3d4UnZvd0dkSUtNQ2ZFcVMvbXNVcmsy?=
 =?utf-8?B?VURwdm5jUHY5SURkWEIwb3VOVjVOaU1QWFkzeURtbllkLzExbTI5U1ZrOTU1?=
 =?utf-8?B?NHNmcnhwMjJSdG1PRERlczJNSU9WMUNpQVF6TUNST0FrN0Q4N0dlOU9jVncr?=
 =?utf-8?B?QkJxWXViVVJRQWdvZDl2cVpYNnY5U2V3SVVBWHNEN3hJYkVadFpNbWtRRnZa?=
 =?utf-8?B?MkRBT1ZZUWN6V1lNRDgydXVicVd4YjIzNzZDUGVKWUNvMTVRb3Q3ZHFSWWNH?=
 =?utf-8?B?RUhnWEFwKzVicWZjVnBhZzZOUi9tSHZhNW5tUWloYld1bjZwRUg5MXY2Rmps?=
 =?utf-8?B?TkxxT1VyM0Zwc2JQWEwzUWVzWDArS3VDckpWOE5YWHM1UDZMWG81Tkh2VXdo?=
 =?utf-8?B?Nmh6ZHlvcHpYcHBGQ2JIU2JkcmV0eWNRRXVWSFpickxSVXo4em13b2YyM1Uz?=
 =?utf-8?B?bmJlNFhYMUVaVlVYSlBDaTE1bEQrQjVFdDRNeFF0blNhK0J0eTRtUmdzNHF4?=
 =?utf-8?B?c2w2SGhpbGVBaHpIckFjZzV6MXZuaGlscG1XdFo5eGJpUFlRYndqZzBnZDVX?=
 =?utf-8?B?N3BmMUlwNzJVZmRCNVhRVTVMdThoZlgveWtDaCtoYWFNZ0YrT2o0ZUJtN2hn?=
 =?utf-8?B?VEZtc1RQT3lVR3ZkME1JaDJRYnp4Y2Z6T2dqRVpIWUNRTDE4YndSWmRvT0Fx?=
 =?utf-8?B?dEszcm1LcFZralJkL2lSQ3lzckV6OTRDeERDempxUXY2Q2tpR1NDQzJjMEQ1?=
 =?utf-8?B?ektWNWRIMTllUGJhcEhQZUxDNVF1bUtlZ0N0K2dsMEEvbURpMjhYTjM4TVRv?=
 =?utf-8?B?K1ozdGMzcHVCSWxWUVEvUitRMEIrVEFmd1Q5TVFWZmVwODMzUUh6RXpGbG1v?=
 =?utf-8?B?dS9sYnFzZkdDcm5IUlJmd3lqd2JWTElLUnp1Mm1DWXVEY2NhV3R6YnNsTDls?=
 =?utf-8?B?R201RHNLOEpKT1Y3cWZ3Y2hRWlk0d0ZxenVDUkhwdXY5bnMwYy9pc1FBVFRK?=
 =?utf-8?B?T3oyc2g1dG40aGFXME0wblJrQ1JNVkFEM2MrS3dxSFBhWkJQaG83WWoydllR?=
 =?utf-8?B?azcwTWdSSTZYMVFJVXRkYWtITkZZMkVneWtoNGFJMHhOMERzM1RtWVhhZUdF?=
 =?utf-8?B?Y3VsZnFZVDZpSWNWUmExbzR6UWdrN3g5dHBncW8ra2Z3TW9SL09BcWpqL21X?=
 =?utf-8?B?YlcxKzdMTGZoQmlkNGM1dFhWZE9KRkRZL3VZVVArNW5WUnlRWTJJTVlaakZi?=
 =?utf-8?B?TWVpaW8vcnYwMEJSQ095QXlEaGFLcXZkcmkwMG5PNEZITlJhV2d5eUUxbWJF?=
 =?utf-8?B?eHFQRDVSWGhsdFIzTkhVL2VvejJITHRJVXpCakJEQmhSSjcrajJheHcza2FV?=
 =?utf-8?B?OVBlZlNzMW9ERjZRRjhDM0dHeHpFM01WVWNFZWRxYngySFl1REpoUGhscHVT?=
 =?utf-8?B?Rit4NlJ1Rll4aDhjaWZxaDEyd0N0RUh3Tk9vOCtPcytVSTlNbUJsay8rSnAv?=
 =?utf-8?B?dTdzVE5RZWpJOENLSkp5dzcycWpGL0YyUnRneXVzVEplWitJeGRUSWViaFZS?=
 =?utf-8?B?YUtBMTB3VThPKzhPbnRSaFFCK3JkemlOSnZnOWtmdTZZMDBmb0pudUxQQm4w?=
 =?utf-8?B?eFJCOWQ3SDR3RGJ2K1hkOWwwY0lRRFVSNWsvU2ptYXVxNWl5eWFYakJtWDF1?=
 =?utf-8?B?UXlTOTdpelRnaUI3WFc2Wi9sWlBJZVdlWUVPdjQ1WFdqdEcyNVAreUMrbzFh?=
 =?utf-8?B?VU1XYktnWHhZM042bEdVd0NmVzRuTU5McmdXaEJaWXpQRGlmZmRaT1g1RlI4?=
 =?utf-8?B?Vi9LdnhiQVQ1QnZnRmh0SklPalNzVW1NK3VwcG1aVERtd21jYnN4bkorWHNG?=
 =?utf-8?B?S200VVB2eStlM05Id2RhRmxoTDVmN0ZlNjdyYkUwZWdJMEVQdGJlUHBWaVl4?=
 =?utf-8?Q?9e2jp0PPWMKu3mE1u+OQeuqX+kZMV4eD?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <6F8A9B5A7C72FC4BB1F512F04308CED6@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 397e0a45-28ff-45be-977a-08da07826282
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Mar 2022 19:23:00.3558
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 9DGvcQciPeEXwFQHQaM8xZsBtH7G+DR80r50XHKEe+wDjWTm5l4j/pZLsde6vjhYqrwcInzjs+T18W3+Aib+db6QCu1qOjIRghySn5yStUc=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR03MB4078
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Wed Mar 16 19:40:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 19:40:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291263.494257 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUZVt-00010k-Dn; Wed, 16 Mar 2022 19:40:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291263.494257; Wed, 16 Mar 2022 19:40:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUZVt-00010d-Ah; Wed, 16 Mar 2022 19:40:53 +0000
Received: by outflank-mailman (input) for mailman id 291263;
 Wed, 16 Mar 2022 19:40:51 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUZVr-00010T-P2; Wed, 16 Mar 2022 19:40:51 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUZVr-0001pf-L8; Wed, 16 Mar 2022 19:40:51 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUZVr-0002N4-2V; Wed, 16 Mar 2022 19:40:51 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUZVr-00053u-1W; Wed, 16 Mar 2022 19:40:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=BV+93m2PvewxosZd+bh+vqGBgvnC+JgKFaS52TtZpUw=; b=lHlJOJkGgTlLdE0GfVf/uHGKXe
	wRHSscrrn8I/gFpCQliVXf/6NXHu2iq9nXbv+7QCmcKc80UaYk8Y228zR77DYtRgG4TxQqxZMcOZB
	WgqPDOYzNtWnFyavE6AZDyE6U5GP1+X0PrF4mQvyCKTPcW1O6mwEERbwDOcWPflUWDCg=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168633-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168633: tolerable FAIL
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-rtds:guest-localmigrate/x10:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=c7a80bc50ac768b4eecaad85b77ae45790c93c73
X-Osstest-Versions-That:
    xen=c7a80bc50ac768b4eecaad85b77ae45790c93c73
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 16 Mar 2022 19:40:51 +0000

flight 168633 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168633/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-rtds     20 guest-localmigrate/x10       fail  like 168626
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168626
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168626
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168626
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168626
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168626
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168626
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168626
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168626
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168626
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168626
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168626
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168626
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass

version targeted for testing:
 xen                  c7a80bc50ac768b4eecaad85b77ae45790c93c73
baseline version:
 xen                  c7a80bc50ac768b4eecaad85b77ae45790c93c73

Last test of basis   168633  2022-03-16 09:10:52 Z    0 days
Testing same since                          (not found)         0 attempts

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     fail    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Published tested tree is already up to date.



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 19:49:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 19:49:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291270.494269 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUZeL-0001hs-AF; Wed, 16 Mar 2022 19:49:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291270.494269; Wed, 16 Mar 2022 19:49:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUZeL-0001hl-76; Wed, 16 Mar 2022 19:49:37 +0000
Received: by outflank-mailman (input) for mailman id 291270;
 Wed, 16 Mar 2022 19:49:36 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=jsVq=T3=redhat.com=mlureau@srs-se1.protection.inumbo.net>)
 id 1nUZeK-0001hf-5R
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 19:49:36 +0000
Received: from us-smtp-delivery-124.mimecast.com
 (us-smtp-delivery-124.mimecast.com [170.10.133.124])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3392e318-a562-11ec-853c-5f4723681683;
 Wed, 16 Mar 2022 20:49:34 +0100 (CET)
Received: from mail-yb1-f200.google.com (mail-yb1-f200.google.com
 [209.85.219.200]) by relay.mimecast.com with ESMTP with STARTTLS
 (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 us-mta-300-5k3ZlA9gPBWd8pTW0v7EAA-1; Wed, 16 Mar 2022 15:49:29 -0400
Received: by mail-yb1-f200.google.com with SMTP id
 a18-20020a25bad2000000b0063360821ea7so2749376ybk.15
 for <xen-devel@lists.xenproject.org>; Wed, 16 Mar 2022 12:49:29 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3392e318-a562-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
	s=mimecast20190719; t=1647460173;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=HmPkR8F5cUuO9WSmmjvcC0eujKaJVhXkybKoNOXuAPc=;
	b=KUlevViYkFywSJJnf3W/3OsLBpt4QckKJVUvhFZEyfRczXPmCU4JKGDkSrFpTt1a1env7U
	iT3cpLVZ/yaYnvd1tGGbPDWhzqOYMIxP13MPBZPGw3gf3mS5IkiO8905ke4WKztfpMjAWR
	qCHbefnk/5MWTDrlZCKIWcUIfJfKcM4=
X-MC-Unique: 5k3ZlA9gPBWd8pTW0v7EAA-1
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc:content-transfer-encoding;
        bh=HmPkR8F5cUuO9WSmmjvcC0eujKaJVhXkybKoNOXuAPc=;
        b=fH2dWtoz4+Ny3UAseaIV8X2aFLdZ/YFAy/t2D8IZ/8LPNYtzZu+7RRHkVZeyKVBM6m
         CU1c6m75HLO1zMkvQoAickrcwwSPLGZTCohTPh69K6q01Q/yxgCXFrdNYxjDw9q6rGRR
         axLsgKgUOtJSeIqXLAKKZ1TDOKTdVAbzQTeXpY0n4DNvIptc1UAxQ8RXwFOVHWUDwGVd
         Nql7owW7SHu8kWqnMLXZ23iLBvU9bHyhISovj8+ndJjZ1MLsWatkmsdhvDjucychN5yY
         GAxU5ECp23xgNGx38tyq2NQ71CT2HIqT/5rvYsA1fhkrk9n03h72AzMCf8r2J5XSUR+y
         4Bgg==
X-Gm-Message-State: AOAM5328xrmM8Vbx671/XCDP/ZyKSHoqGx/48LlzsYgdjeU4+roDg1Mb
	6+QP+oBxq9jZUzkn+ko16nk93MAyPZkrapxbZYTcDWEEWNkJmv9qPxVzuNl7waLs9lf3/esQjgF
	Ha6JvmUt4pX8ck8Mb0Gm6h9wtBdmdbMhypCyRsEJIbWI=
X-Received: by 2002:a81:5dd5:0:b0:2dc:19cf:17ac with SMTP id r204-20020a815dd5000000b002dc19cf17acmr2000989ywb.312.1647460169191;
        Wed, 16 Mar 2022 12:49:29 -0700 (PDT)
X-Google-Smtp-Source: ABdhPJxs4vlxPHCmvEL+QLl58POsRAsEEFv0xU2PEoCp4EY5TZRS202MXzdEQ/4+iJ8gmvsW+OKdw3ICcTS33kiccxg=
X-Received: by 2002:a81:5dd5:0:b0:2dc:19cf:17ac with SMTP id
 r204-20020a815dd5000000b002dc19cf17acmr2000957ywb.312.1647460168968; Wed, 16
 Mar 2022 12:49:28 -0700 (PDT)
MIME-Version: 1.0
References: <20220316095248.2613601-1-marcandre.lureau@redhat.com>
 <dce310d7-35a6-d3df-734a-c9d184fc282c@gmail.com> <617011dd-6d19-cb2d-c98d-747e1821d545@redhat.com>
In-Reply-To: <617011dd-6d19-cb2d-c98d-747e1821d545@redhat.com>
From: =?UTF-8?B?TWFyYy1BbmRyw6kgTHVyZWF1?= <marcandre.lureau@redhat.com>
Date: Wed, 16 Mar 2022 23:49:17 +0400
Message-ID: <CAMxuvawgFL4w73ZUmk9ib5FOmU5Wc05=7gga2ZJqpWpF=VkWFw@mail.gmail.com>
Subject: Re: [PATCH 07/27] Replace GCC_FMT_ATTR with G_GNUC_PRINTF
To: Thomas Huth <thuth@redhat.com>
Cc: =?UTF-8?Q?Philippe_Mathieu=2DDaud=C3=A9?= <philippe.mathieu.daude@gmail.com>, 
	qemu-devel <qemu-devel@nongnu.org>, Gerd Hoffmann <kraxel@redhat.com>, 
	Christian Schoenebeck <qemu_oss@crudebyte.com>, =?UTF-8?Q?Philippe_Mathieu=2DDaud=C3=A9?= <f4bug@amsat.org>, 
	Thomas Huth <huth@tuxfamily.org>, Stefan Hajnoczi <stefanha@redhat.com>, Kevin Wolf <kwolf@redhat.com>, 
	Hanna Reitz <hreitz@redhat.com>, "Richard W.M. Jones" <rjones@redhat.com>, Warner Losh <imp@bsdimp.com>, 
	Kyle Evans <kevans@freebsd.org>, Greg Kurz <groug@kaod.org>, 
	"Michael S. Tsirkin" <mst@redhat.com>, Igor Mammedov <imammedo@redhat.com>, Ani Sinha <ani@anisinha.ca>, 
	Huacai Chen <chenhuacai@kernel.org>, Jiaxun Yang <jiaxun.yang@flygoat.com>, 
	Aurelien Jarno <aurelien@aurel32.net>, Jiri Pirko <jiri@resnulli.us>, 
	Jason Wang <jasowang@redhat.com>, Stefano Stabellini <sstabellini@kernel.org>, 
	Anthony Perard <anthony.perard@citrix.com>, Paul Durrant <paul@xen.org>, 
	Paolo Bonzini <pbonzini@redhat.com>, Eduardo Habkost <eduardo@habkost.net>, 
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>, Yanan Wang <wangyanan55@huawei.com>, 
	Markus Armbruster <armbru@redhat.com>, Michael Roth <michael.roth@amd.com>, 
	=?UTF-8?Q?Daniel_P=2E_Berrang=C3=A9?= <berrange@redhat.com>, 
	"Dr. David Alan Gilbert" <dgilbert@redhat.com>, Eric Blake <eblake@redhat.com>, 
	Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>, Konstantin Kostiuk <kkostiuk@redhat.com>, 
	Laurent Vivier <lvivier@redhat.com>, "open list:blkverify" <qemu-block@nongnu.org>, 
	"open list:X86 Xen CPUs" <xen-devel@lists.xenproject.org>
Authentication-Results: relay.mimecast.com;
	auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=mlureau@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi

On Wed, Mar 16, 2022 at 5:28 PM Thomas Huth <thuth@redhat.com> wrote:
>
> On 16/03/2022 14.16, Philippe Mathieu-Daud=C3=A9 wrote:
> > On 16/3/22 10:52, marcandre.lureau@redhat.com wrote:
> >> From: Marc-Andr=C3=A9 Lureau <marcandre.lureau@redhat.com>
> >>
> >> One less qemu-specific macro. It also helps to make some headers/units
> >> only depend on glib, and thus moved in standalone projects eventually.
> >>
> >> Signed-off-by: Marc-Andr=C3=A9 Lureau <marcandre.lureau@redhat.com>
> >> ---
> >>   audio/audio.h                           |  4 +--
> >>   block/qcow2.h                           |  2 +-
> >>   bsd-user/qemu.h                         |  2 +-
> >>   hw/display/qxl.h                        |  2 +-
> >>   hw/net/rocker/rocker.h                  |  2 +-
> >>   hw/xen/xen_pt.h                         |  2 +-
> >>   include/chardev/char-fe.h               |  2 +-
> >>   include/disas/dis-asm.h                 |  2 +-
> >>   include/hw/acpi/aml-build.h             | 12 +++----
> >>   include/hw/core/cpu.h                   |  2 +-
> >>   include/hw/hw.h                         |  2 +-
> >>   include/hw/virtio/virtio.h              |  2 +-
> >>   include/hw/xen/xen-bus-helper.h         |  4 +--
> >>   include/hw/xen/xen-bus.h                |  4 +--
> >>   include/hw/xen/xen_common.h             |  2 +-
> >>   include/hw/xen/xen_pvdev.h              |  2 +-
> >>   include/monitor/monitor.h               |  4 +--
> >>   include/qapi/error.h                    | 20 ++++++------
> >>   include/qapi/qmp/qjson.h                |  8 ++---
> >>   include/qemu/buffer.h                   |  2 +-
> >>   include/qemu/compiler.h                 | 11 ++-----
> >>   include/qemu/error-report.h             | 24 +++++++-------
> >>   include/qemu/log-for-trace.h            |  2 +-
> >>   include/qemu/log.h                      |  2 +-
> >>   include/qemu/qemu-print.h               |  8 ++---
> >>   include/qemu/readline.h                 |  2 +-
> >>   qga/guest-agent-core.h                  |  2 +-
> >>   qga/vss-win32/requester.h               |  2 +-
> >>   scripts/cocci-macro-file.h              |  2 +-
> >>   tests/qtest/libqos/libqtest.h           | 42 ++++++++++++-----------=
--
> >>   tests/qtest/libqtest-single.h           |  2 +-
> >>   tests/qtest/migration-helpers.h         |  6 ++--
> >>   audio/alsaaudio.c                       |  4 +--
> >>   audio/dsoundaudio.c                     |  4 +--
> >>   audio/ossaudio.c                        |  4 +--
> >>   audio/paaudio.c                         |  2 +-
> >>   audio/sdlaudio.c                        |  2 +-
> >>   block/blkverify.c                       |  2 +-
> >>   block/ssh.c                             |  4 +--
> >>   fsdev/9p-marshal.c                      |  2 +-
> >>   fsdev/virtfs-proxy-helper.c             |  2 +-
> >>   hw/9pfs/9p.c                            |  2 +-
> >>   hw/acpi/aml-build.c                     |  4 +--
> >>   hw/mips/fuloong2e.c                     |  2 +-
> >>   hw/mips/malta.c                         |  2 +-
> >>   hw/net/rtl8139.c                        |  2 +-
> >>   hw/virtio/virtio.c                      |  2 +-
> >>   io/channel-websock.c                    |  2 +-
> >>   monitor/hmp.c                           |  4 +--
> >>   nbd/server.c                            | 10 +++---
> >>   qemu-img.c                              |  4 +--
> >>   qemu-io.c                               |  2 +-
> >>   qobject/json-parser.c                   |  2 +-
> >>   softmmu/qtest.c                         |  4 +--
> >>   tests/qtest/libqtest.c                  |  2 +-
> >>   tests/unit/test-qobject-input-visitor.c |  4 +--
> >>   audio/coreaudio.m                       |  4 +--
> >>   scripts/checkpatch.pl                   |  2 +-
> >>   58 files changed, 130 insertions(+), 137 deletions(-)
> >
> >> diff --git a/include/qemu/compiler.h b/include/qemu/compiler.h
> >> index 3baa5e3790f7..f2bd050e3b9a 100644
> >> --- a/include/qemu/compiler.h
> >> +++ b/include/qemu/compiler.h
> >> @@ -79,19 +79,12 @@
> >>   #define QEMU_BUILD_BUG_ON_ZERO(x) (sizeof(QEMU_BUILD_BUG_ON_STRUCT(x=
)) - \
> >>                                      sizeof(QEMU_BUILD_BUG_ON_STRUCT(x=
)))
> >> -#if defined(__clang__)
> >> -/* clang doesn't support gnu_printf, so use printf. */
> >> -# define GCC_FMT_ATTR(n, m) __attribute__((format(printf, n, m)))
> >> -#else
> >> -/* Use gnu_printf (qemu uses standard format strings). */
> >> -# define GCC_FMT_ATTR(n, m) __attribute__((format(gnu_printf, n, m)))
> >> -# if defined(_WIN32)
> >> +#if !defined(__clang__) && defined(_WIN32)
> >>   /*
> >>    * Map __printf__ to __gnu_printf__ because we want standard format
> >> strings even
> >>    * when MinGW or GLib include files use __printf__.
> >>    */
> >> -#  define __printf__ __gnu_printf__
> >> -# endif
> >> +# define __printf__ __gnu_printf__
> >>   #endif
> >
> > Can we also poison GCC_FMT_ATTR? Maybe split in 2 patches, 1 converting
> > and another removing unused & poisoning?
>
> I don't think that poisoning is required here since this macro is not use=
d
> in "#ifdef" statements - so the compiler will complain to you if you stil=
l
> try to use it after the removal.

Yes (same for other macros in this series)
thanks



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 20:13:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 20:13:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291275.494279 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUa1f-000513-As; Wed, 16 Mar 2022 20:13:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291275.494279; Wed, 16 Mar 2022 20:13:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUa1f-00050w-82; Wed, 16 Mar 2022 20:13:43 +0000
Received: by outflank-mailman (input) for mailman id 291275;
 Wed, 16 Mar 2022 20:13:41 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=SsrA=T3=citrix.com=prvs=067c1f106=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nUa1d-00050q-O6
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 20:13:41 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 911de443-a565-11ec-8eba-a37418f5ba1a;
 Wed, 16 Mar 2022 21:13:40 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 911de443-a565-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647461620;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=OhaY+uVYpEHCSCw5BSSoElCvVNP506Gsq8VSkbZbBjA=;
  b=CDFQ/DrsoBYnf6ILGIBCN4nIvT5etNqdQPCVixlOc9DoD8+EMETBYWGG
   7Ngjj0Zm6bUGbNtc41NA7EJtIpDXvXZyryOYGsjHL18e59XG0DtWryMgn
   5vAC2WAFKMmErKm+/zslmoi6ZNva85vwHeIqe32KFTDCChEzbDeYaxU0k
   E=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66429712
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:v2jFhq9KJjqRTvJ0/xgYDrUDvX6TJUtcMsCJ2f8bNWPcYEJGY0x3y
 WsZX2iDbvaKamP2coh0O4Xj9UgFuMXUn9VkQFY9+Xo8E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oHnW1nlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnZCuayIXJ6eXofQAcDJaNhwlEPQc4LCSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFKoZtmtt0nfyCvE+TIqYa67L+cVZzHE7gcUm8fP2O
 ZRFM2swNU6ojxtnZ1UwJbgwn/+TvkL6MHpCtEnLu48H/D2GpOB2+Oe0a4eEEjCQfu1Ql1ydr
 3jL/Ez4BA8bL92VzTeZ8nOqifTLlCm9U4UXfJWo+/gvjFCNy2g7DBwNSUD9sfS/klS5Wd9UN
 woT4CVGhao4+VGvT9L9dwalu3PCtRkZM/JPF8Uq5QfLzbDbizt1HUBdEGQHMoZ/8pZrG3p6j
 Tdlgu8FGxRjrp+wd2uXrY6EsBCZOw0odkJbPzcLGF5tD8bYnKk/iRfGT9BGGaGzj8HoFTyY/
 w1mvBTSlJ1I05dVivzTEUTvxmv1+8OXFlJdChD/BDrN0+9vWGKyi2VEA3D/5O0IEouWR0LpU
 JMsy5nHt7Bm4X1geUWwrAQx8FOBuq7t3N702wcH83wdG9KFoCbLkWd4um0WGauRGpxYEQIFm
 WeK0e+r2LddPWGxcYh8aJ+rBsIhwMDITIq5CaqFNIMUMsErLmdrGR2Cg2bLhggBd2B2zckC1
 WqzK57wXR7294w6pNZJewvt+eBynX1vrY8ibZv60w6mwdKjiI29Et843K+1Rrlhtsus+VyNm
 /4Gbpfi40gPAYXWP3iMmaZOfA9iEJTOLc2vwyChXrXYeVQO9aBII6K5/I7NjKQ+xvULzLiUp
 i/hMqKaoXKm7UD6xcyxQikLQJvkXIplrGJ9OiopPF2y3GMkb5rp56AaH6bbt5F8nAC/5ZaYl
 8U4Rvg=
IronPort-HdrOrdr: A9a23:vuCi460X2wSeJZHC0eQyuwqjBRxyeYIsimQD101hICG9Lfb2qy
 n+ppgmPEHP5Qr5AEtQ5OxpOMG7MBbhHQYc2/hfAV7QZnibhILOFvAt0WKC+UytJ8SazIBgPM
 hbAtFD4bHLfDtHZIPBkXOF+rUbsZi6GcKT9J/jJh5WJGkAAcAB0+46MHfhLqQffngcOXNTLu
 v52iMznUvHRZ1hVLXdOpBqZZmgm/T70LbdJTIWDR8u7weDyRmy7qThLhSe1hACFxtS3LYL6w
 H+4kzEz5Tml8v+5g7X1mfV4ZgTssDm0MF/CMuFjdVQAinwizyveJ9qV9S5zXMISaCUmRQXee
 v30lMd1vdImjTsl6aO0F3QMjzboXMTArnZuAalaDXY0JTErXkBerV8bMpiA2XkAgwbzYtBOe
 twrhKkX9A8N2KwoA3to9fPTB1kjUyyvD4rlvMSlWVWVc8EZKZWtpF3xjIfLH4sJlOy1GkcKp
 gnMCgc3ocjTXqKK3TC+mV/yt2lWXo+Wh+AX0gZo8SQlzxbhmpwwUcUzNEW2i5ozuNxd7BUo+
 Dfdqh4nrBHScEbKap7GecaWMOyTmjAWwjFPm6eKUnuUKsHJ3XOoZjq56hd3pDhRLUYiJ8p3J
 jRWlJRsmA/P0roFM2VxZVOtgvARW2sNA6dvP22J6IJzYEUaICbQxFrEmpe4PdIi89vd/HmZw
 ==
X-IronPort-AV: E=Sophos;i="5.90,187,1643691600"; 
   d="scan'208";a="66429712"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=MMEQGLWtIjtvtjtiZtB+Mt9kswHsve1bunLFQN6O8edYRRCW+orCW3j9U0eQm/Vrj76OIfJLvYIXVKq/r6bLyXp42dZAB64Fbdl2NiW1BHbZfkMYIRO3L5J70OP0DACOkIcdZzYQ4fqG0g6nBTx51a0xGC+h36KXGcg5fP8oLOn7vWKxIkvCIfPKMHW6EDy4Vn7Wqlt/EL+kBfLSsR/bL4jgNng3Be7GbSPY4QSkE+lEFqf1m+GteebyfSDj2Se5GNjuacDIsLxmZmqCIP3vh+hd2SB2Paqjf++ExeX5pHExFv0xRCOht7tQR/3SWxvSW6XYLo0txkrd/garOYgj4g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=OhaY+uVYpEHCSCw5BSSoElCvVNP506Gsq8VSkbZbBjA=;
 b=e1xZUY5sjCvLxeooR6SvnZOQU6eddhRA25GPQp0WLW90qzdduRw3C82vlanmX1lHV33rwtkKBDhDjJANUbF751GbIYAF7HFcZk3QjPE1ut0vzrTHRqTM38V/0dhuMSFSNqARaJolsu9PKZjpNcRvz9CgSSEwfm/QTlZBUx2tVSBUDM44gga3oLzYNFrqjvVYGeMnxQZngfYzFGnfPMAecscuyMtaMpRqjEZwe1Z97Envj1/d9sLK2JAh/D+V1IKF2UgAJCyodeG2q7Po3whtfyShVL1L6Vc8TLTk6JqR7aa6CkMdUVe7AnMoWL/MUfCB7ZYioUy2fE5tv1ewqQT4nQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=OhaY+uVYpEHCSCw5BSSoElCvVNP506Gsq8VSkbZbBjA=;
 b=fX34KUpqXzWAF74RBglVOLPEl2mz8lGw94H9wDyP4DB7bCuCt3hercY3sfRXMCLcw0mD6V0++YvCiU7N7oad41zp9nHAqx0XGOb3QcXu0WXru5/Ln076VW80lcSBdmarTIiTHUCEzgmBHexGlTcOtY33hfMd5k2aZ3ISePh1YwI=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
	=?utf-8?B?TWFyZWsgTWFyY3p5a293c2tpLUfDs3JlY2tp?=
	<marmarek@invisiblethingslab.com>, Xen-devel <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH] x86/cet: Clear IST supervisor token busy bits on S3
 resume
Thread-Topic: [PATCH] x86/cet: Clear IST supervisor token busy bits on S3
 resume
Thread-Index: AQHYN5LV95qT5IqqP0y7/NV/gPy3Uqy+7QsAgAOIboA=
Date: Wed, 16 Mar 2022 20:13:34 +0000
Message-ID: <d0296479-316c-07fa-c929-af75e3cfec66@citrix.com>
References: <20220314110034.28498-1-andrew.cooper3@citrix.com>
 <c542fbe6-8910-4dd3-aa6b-41af647c728e@suse.com>
In-Reply-To: <c542fbe6-8910-4dd3-aa6b-41af647c728e@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: fdda305b-6d5a-476f-3ce8-08da078972c3
x-ms-traffictypediagnostic: MN2PR03MB4640:EE_
x-microsoft-antispam-prvs: <MN2PR03MB46404B2FED6CD3C23D182B78BA119@MN2PR03MB4640.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(8936002)(2906002)(6916009)(54906003)(38070700005)(4326008)(8676002)(26005)(186003)(31686004)(31696002)(86362001)(71200400001)(316002)(122000001)(36756003)(82960400001)(38100700002)(6486002)(64756008)(66556008)(91956017)(5660300002)(83380400001)(76116006)(66446008)(66946007)(66476007)(2616005)(6512007)(508600001)(53546011)(6506007)(2004002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?cGtseExrMUJmeGZiaVpNODJwc0RJZnErek9NdDYyZyt4MXNEclNWQitELzdm?=
 =?utf-8?B?Zkc0OTZVMUgvNDBibjFJcDFPZDcwRGMwa0hRc0Noa3FRaGF5bmFFN001SnV0?=
 =?utf-8?B?Ry8xcjIxTGlBdHFxeUQvaU1jRk8yU1dWOUxQT2J3dldmZ0VyRVhlRXdTTWY2?=
 =?utf-8?B?aXBYQlpsWi9QcGhvdFdac1NGa2RTNVJSQzNvZDJxY3Q4SEIyVXl5UXFWY041?=
 =?utf-8?B?amQrQWhaRnpVWk9Xd3Bxd3pIYVYwdWdZd3VOdzRnNTJyUzZXKytUK0FTZXIx?=
 =?utf-8?B?SU93QlBpM0JDOXRtYWovcUs4bUh1VUdFQ2RHOFlRUmd1TEs1ZTN3RGhodGE2?=
 =?utf-8?B?SHdnU0pTK3V6Z29GZnp3U0wxWWVnQ21yOHk0UERWd0VtV3lLOHRiTWxWaDZs?=
 =?utf-8?B?UGxTeTBlY0QvTXAxRHllMjR1QlEyODlFcUlURkFCQlV3c1JvWVF4SlU2UjVr?=
 =?utf-8?B?NmxlQkJ2SnhQSUllQTBnZFJRNGZWcnB3TkhqcldZY3I2YXZKUFhCZjlNckpx?=
 =?utf-8?B?UU5CTmdJUkxacXdDdHd3bEpSdGhPWStGMHhxMHZiYnFnWUNzTW9iMUc2Q3pm?=
 =?utf-8?B?MU9wcFpMK2R6WVJYanRjQ04xTE1VcjJUSWc1ZDRiQXozTldaQ3l0bFBFYmpB?=
 =?utf-8?B?QzcwTjdYeURmZUZCWTE0bXBONXZwQnhYT1hBbklRMDBsT0hmdkRiMm51L3Zn?=
 =?utf-8?B?ZFhRZXA2MkJXM1NLUENwQy9DNHp1Y2tMa0VxYVY1VkVOZytrZUpVdGJ2TklD?=
 =?utf-8?B?aEdKNlU2TFZNcDgvbGoveFk1ZFd5RUJ6b0Q0TGQ0bGtYWUcyZ2xWZVpjNFVF?=
 =?utf-8?B?dWhLYUUvbklFakxOaG5DTXpnVGwycU9sTDQvTjJZR2QrNzNDT2RocXFnSXNj?=
 =?utf-8?B?bUtxSHB6K0RLL0tLb2xFc29KRUwrTlFrc0J4am5yblFWRy8zWWJDUXA4amxn?=
 =?utf-8?B?KzRzQk5pbkhFQ3BIa1VkMkIwOVhyU1lYQXAyQW9FWmZ6cXBKUjFNeWtZbWJ6?=
 =?utf-8?B?d3V4NVE1ZUI4eXVkbkRMZGJINzZ0U3pJM01vZFQySVVhc3pKMk9sbWQ2SW5G?=
 =?utf-8?B?SVJQeE5KNzVuUVRNRytFSkppYkxLMzlHK1VpbjB0ZUhOQ1lQbzdUWDdiUktO?=
 =?utf-8?B?RXBDS3RYc043Tlc1dU1ReGM3M3dmN05OeHpJQkJLOEk4MmtFdmlYYlV1Wm5I?=
 =?utf-8?B?KytxRHR5dS9GU2pLQlJ5WVp1RzdmelBTcnRKWWxIWG5aY0hUZUNjZ3ZpNkQz?=
 =?utf-8?B?OVc2TE9STHROU2Y2NXlsNUlwK2FTbkNGbmYwSHFzQWRPb29uWkxHa1JqRjZY?=
 =?utf-8?B?KzNtVDFxODRZemIyRmlFMkNmVDhsM3JRdXNWR0VUMDJhdHdEcUJGZnpVRlMy?=
 =?utf-8?B?MFJ3bU96MzNXOFN3U2piU0lTZWhaTlc4bWdST2xuQk1jZlJ4ZWR1eThPYW5r?=
 =?utf-8?B?cGgzOUliTHFEL3IvUUZsT0svdjNVRXNqWnNRZUxRcXJGbTUxbW9FUkpsMUY0?=
 =?utf-8?B?SVBJdUdlM2tsYmF5YXZ0Qjk1UkJrVUJDMStmRGU2WGxKY0dJQ2wxQlBuaEkw?=
 =?utf-8?B?WXA0Tng2Y0ZnK1pxU3VpQi9mUVRQWGltdU1SQlVNdFhESFE2VVQvM0Q2Zkxy?=
 =?utf-8?B?NEEvTmpHNkt5ZGovZmVsQmdWaUV4UTFDeHV0SlJmVkx3cHBwa2Zoc09qU2s1?=
 =?utf-8?B?aEVLaG00ZHFPU01SS3NCZ2xVeG9YV2lMTEg4QmlPd0hPaHhzZkZzQjBhRm1a?=
 =?utf-8?B?NUNFR21XM0o0d044eUJiRzIrRTA1N3pOSnh3U2lDeHhmWjBnTlMzbWc4cVFp?=
 =?utf-8?B?OXVFNFNGR2NkUzVqSzhKNUxwNUlYcmVVTWxqZGROcWFEeS9RdW8zdURSUFpI?=
 =?utf-8?B?ZEs3UkNJdnZyU3JLTVVuOHlhMnZQaXY1MWhtSmMxaFVWaW4ycnBNbHMvZi9u?=
 =?utf-8?Q?02+Ub0y/ctmVQZ8Zom0Vz5/hG+2CqPQK?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <B494C0720114EC4DA9C591BF977511E6@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: fdda305b-6d5a-476f-3ce8-08da078972c3
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Mar 2022 20:13:34.2720
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: X1Wrc7Cc2JzOAe+7k4ZJQU7kFWWySVvm3XsbLS95GTyI4Qtyk3iTjOc+YFSyn2rn7kqTTe9P+zjNN5KgNoDlVqMg8WInfh3iw9p45UW3TiA=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR03MB4640
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Wed Mar 16 20:57:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 20:57:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291278.494291 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUahc-0000mh-MQ; Wed, 16 Mar 2022 20:57:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291278.494291; Wed, 16 Mar 2022 20:57:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUahc-0000ma-Ia; Wed, 16 Mar 2022 20:57:04 +0000
Received: by outflank-mailman (input) for mailman id 291278;
 Wed, 16 Mar 2022 20:57:04 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=SsrA=T3=citrix.com=prvs=067c1f106=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nUahb-0000mU-Jf
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 20:57:04 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 9f0c5dbe-a56b-11ec-8eba-a37418f5ba1a;
 Wed, 16 Mar 2022 21:57:00 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9f0c5dbe-a56b-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647464220;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=VgySFfHdbaCVSIEys9jxPhUbGA9vV3rmvJ7Y1Ffdl28=;
  b=ZDK+3XsikKKK2XwgYzEb1O4kx/FR23wNx2TaXcFhgNGPWt29vYx+kY4Y
   4dnVZZcBZXFF3r2begI9ImQcQT/fNiMlPlybunRr+G48aZoii3Fj0W3ph
   UOLp/1GjCwHCxufTzqe61CYO+Ew2MhsvrwFTH0BdJe/QGaUY9kSY3vpBr
   k=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66837902
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:EUnO76Nn/W6//H7vrR2Yl8FynXyQoLVcMsEvi/4bfWQNrUor3zZTz
 GRMD2rQa/eJZGvyet50PY/no0oO7MOEm941Sgto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi29Aw27BVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Zx
 NF0r66tEC4See7VtrUtfgBVLQx/IvgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALBc/nJo4A/FpnyinUF60OSpHfWaTao9Rf2V/cg+gQQ6aFO
 JtBM1KDajzlfBd9K3AUEa4Hnf+Di1vCVGRjrVys8P9fD2/7k1UqjemF3MDuUtmDX8BchEubj
 mPA4WXiAxseOcCfyDyK6XaljKnEmiaTcJIfEvi0++BnhHWXx3cPE1sGWF2ju/67h0WiHdVFJ
 CQ8+CAjsKwz/0yDVcTmUluzp3vslgEYc8pdFas98g7l90bPy1/HXC5eFGcHMYF48p9tLdA36
 rOXt9/tPCZdreS8cjXe75nFnR6rNBY4LHBXMEfoUjA5y9XkpYgyiDfGQdBiDLO5g7XJJN3g/
 9yZhHNg3utO1Kbnw43+pAma2Gz0+vAlWyZvvm3qsnSZAhSVjWJPT6ih8hDl4PlJN+51pXHR7
 SFfy6ByAA3jZKxhdRBhos1QRNlFBN7faVUwZGKD+bF6r1xBHFb5IehtDMlWfhsBDyr9UWaBj
 LXvkQ1Q/oRPG3ChcLV6ZYm8Y+xzk/S/T4W/D6qEN4AUCnSUSONh1Ho3DaJ39zqx+HXAbIllY
 cvLGSpSJSty5VtbIMqeGL5GjO5DKtEWzmLPX5HrpylLIpLFDEN5vYwtaQPUBshgtfvsiFyMr
 753apvboz0CAbaWSnSGruYuwaUicCFT6Wbe8JcMKIZu42NORQkcNhMm6eh4KtI/wPgNyLugE
 7PUchYw9WcTTEbvcG2iQntidKnuTdB4q3c6NjYrJlGmxz4oZoPH0UvVX8JfkWUPnAC78cNJc
 g==
IronPort-HdrOrdr: A9a23:H6XyjaPcckFzsMBcT2/155DYdb4zR+YMi2TDiHofdfUFSKClfp
 6V8cjzjSWE9Qr4WBkb6LW90DHpewKSyXcH2/hsAV7EZniphILIFvAv0WKG+VPd8kLFh5dgPM
 tbAstD4ZjLfCJHZKXBkUiF+rQbsaG6GcmT7I+0pRYMcegpUdAa0+4QMHfBLqQcfngjOXNNLu
 v72iMxnUvGRZ14VLXYOlA1G8z44/HbnpPvZhALQzQ97hOVsD+u4LnmVzCFwxY3SVp0sPcf2F
 mAtza8yrSosvm9xBOZ/XTU9Y5qlNzozcYGLNCQi/ISNi7nhm+TFcdcsvy5zXIISdOUmRIXee
 r30lAd1gNImjXsl1SO0F7QMs/boW8TAjHZuAelaDDY0LPErXoBerR8bMRiA0HkAgMbzaFBOO
 gg5RPpi7NHSRzHhyjz/N7OSlVjkVe1u2MrlaoJg2VYSpZ2Us4bkWUzxjIdLH47JlOz1GnnKp
 gbMOjMoPJNNV+KZXHQuWdihNSqQ3QoBx+DBkwPoNac3TRalG1wixJw/r1Tol4QsJYmD5VU7e
 XNNapl0LlIU88NdKp4QOMMW9G+BGDBSQ/FdGiSPVPkHqcaPG+lke+83JwloOWxPJAYxpo7n5
 rMFFteqG4pYkrrTdaD2ZVamyq9NllVnQ6dvf22y6IJyIEUHoCbQhFrYGpe5vednw==
X-IronPort-AV: E=Sophos;i="5.90,187,1643691600"; 
   d="scan'208";a="66837902"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=kW9/nncQ/1EIrUBuuNhy/oYnY1AwiaGij6E25+7nSzI/vLHRj9Ba/GnNkf1jjARa2zbvi73ypl7iU4MURZrox/pG8X2OM6ON42dSqauC1+QYH0wABBegjRC0KjtTknsznj02Bgj32jFmS7ZNWkQe+nV8196cEza1nHUxQkDGAa00AZJfYxdZEx2GYqEwgzRZJF5ofv0lRsEvBGPkLoE9A2IAcJXNsT6HkJ4p+xQ8mP1Y9tG1MMucXxbGOwn3Mv15rYVdpi9/ZSM0NUlgB7lPaJ/Lsf+1+dyzvazTAyU8Dl8KX/BBE3flnZim5ahN4MZlMp6lbd9V05YC1h7VQU6H1A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=VgySFfHdbaCVSIEys9jxPhUbGA9vV3rmvJ7Y1Ffdl28=;
 b=UswdiMPJ94NsdHdruYnYCEw88AXrW0knLhAFvMpiBXQ3DWi+JXZfoL8GSDuGRYRfQ+ZrxF3Ecggb7mdDQn8DtPsj23sdXJw5uYDwiCgnJkjcOrTOiwJsxIZ2bbjMbBD03WUohojRWFGZYvOFmTqGIxkxDOepT6xRc0J3fLhXC03Sm+FL1jj7sq64w/u7/KugSz55qBR/aJtvz1wDdb2I+FzPhYslM9xDyJsHH6liidN+7Kh2z1dMoO0+pErFnmWyhiK03L4RnJyz3iTPR5s7yD5BRHDLtv+ROp3Dalvg7cqoaf2UOo3XBcWzXH1TAkF3z87/WK3eZLMeq9CNfenXLA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=VgySFfHdbaCVSIEys9jxPhUbGA9vV3rmvJ7Y1Ffdl28=;
 b=NP0YZoeR1c8VTWze+B3iLbdqdr6Ol9ThHMbFI5qIZOzT7SI2Pqzvp5+SCcL6PZbmu6qBH+vmuY0X49Ijcjb3zw646edxUYDc/6GWJxQ+YF/eejiSimptZ1/EIWLmeYqwXLCDoeO9SDOqDj+kFz80EQYLEo2UZ0shyVCoFZkNgCY=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
	=?utf-8?B?TWFyZWsgTWFyY3p5a293c2tpLUfDs3JlY2tp?=
	<marmarek@invisiblethingslab.com>, Xen-devel <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH] x86/cet: Clear IST supervisor token busy bits on S3
 resume
Thread-Topic: [PATCH] x86/cet: Clear IST supervisor token busy bits on S3
 resume
Thread-Index: AQHYN5LV95qT5IqqP0y7/NV/gPy3Uqy+8M2AgAOQxYA=
Date: Wed, 16 Mar 2022 20:56:52 +0000
Message-ID: <42d12b90-7f25-2e2e-93fb-398b3ed8edc9@citrix.com>
References: <20220314110034.28498-1-andrew.cooper3@citrix.com>
 <eb3316ac-0ab7-5cd8-85b6-164ffc78e725@suse.com>
In-Reply-To: <eb3316ac-0ab7-5cd8-85b6-164ffc78e725@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 1b34f73d-a7cc-4f14-5bc9-08da078f7f5e
x-ms-traffictypediagnostic: BYAPR03MB4549:EE_
x-microsoft-antispam-prvs: <BYAPR03MB454977446CF39CE2157B4CD0BA119@BYAPR03MB4549.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(8936002)(2906002)(316002)(4326008)(8676002)(5660300002)(64756008)(54906003)(71200400001)(76116006)(6916009)(66556008)(66446008)(4744005)(66476007)(2616005)(53546011)(66946007)(86362001)(82960400001)(91956017)(508600001)(38100700002)(31696002)(6512007)(122000001)(36756003)(6506007)(186003)(38070700005)(6486002)(26005)(83380400001)(31686004)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?T0g0N1B5aUlsRUVjL0V0TGpEV0dKSFdrTjhKL1UrYkVhbzE4UTJNdEdTTlVO?=
 =?utf-8?B?R0YyYU9raUFibklWVVpWTVVPSnVpU1NuNWdBdkZDR2ZCY3JlM09hOTAzZXIx?=
 =?utf-8?B?U1hBYTI0QVcvc29vdW10eUFNN2tSMmpSRmV1UVVuZ3JNMjk0SVlWR1ZzOUIw?=
 =?utf-8?B?ZWh5Q1U1dGJuYlB2STRHY3pBSjRWeDBJejNKUDlZa1Jib1ZYak0vSXdLY1BU?=
 =?utf-8?B?QjdVL1drQnhsdnVxajkyTGFRd3lQOXp4T3d5S2dhUVhaZSt0L2ZKR0pKRFdV?=
 =?utf-8?B?MStzWk1ZUmp5Y1R0Y1R1Skc0OW95UGp1UjFzVjRhK3ZEVlluZ2pUaHlnemhQ?=
 =?utf-8?B?L1VEUWc1V29JM1J5bjFlQTJkSFNFQ2pxcklhTG5xcWltTmRnWUQva3pMbEFB?=
 =?utf-8?B?blFSUFBRSDBVdnZTWUJGS3NPc3A2SzArMHNBNXoxYUVjNFdBcWFxbzdSWEd0?=
 =?utf-8?B?eXcwUlVFOXlSbVBTN3U4QVF5U3paOUZvVjQxckcrTzF4UXd2dzN0K3Vwdmkw?=
 =?utf-8?B?R1AvOTdEYW53L3UwSXJrbWRTSXh3WG92QUphejdPUVhCL200Q2lUL3Q2aUtR?=
 =?utf-8?B?OGtYTlJPaUFlSWRadUZCak1EQ210bEJZNUFUZ09Yb2dSOWUzeFhsVjlGdHBo?=
 =?utf-8?B?RlJHeGVFQ1U2VmNSOHNBOGFNeTJOS0diR2dnQVhISkhXaEt4d05xZnVLcThw?=
 =?utf-8?B?Sy9GdVovc3doc0lqVmRWSGVpSUlyd1ZVVGhmcUhEU2hDcCtpd0ZiajVva2pi?=
 =?utf-8?B?bFh6REVDb1puN1JvQVVDVjlCdHJRZ3pXd3ZSVjVac2NwZ1dIS0xqMldTUjEr?=
 =?utf-8?B?RWlsZ3JIVEhSczNOVktDa3BHc1pyNCs2TU9LK0FPeG5Ld0MvOXpZaG94RmpB?=
 =?utf-8?B?Wm5rQktycXEySWt4WDBLTG5BS0ZSZ0FNUzBNZzJhYnpaRTczbWUrYjFkQkdh?=
 =?utf-8?B?WEJ0eE1haUhFRUFJQ3Ftb3Z0VlAwdVk5ZkM0cGJtaTdTTkRCdWNheDJjNTc3?=
 =?utf-8?B?eVdudWdVN2drRElrS3Vrc1QraXVpaE1uZXJKU0s2emYveW5naVZra1dvRUs0?=
 =?utf-8?B?aDZUMGdZL3V6Z1RZZU0wNkJ3WXlyWndDTFlpa2pIMzN6L3NhanA3V1NlY0Q5?=
 =?utf-8?B?NFZrdE9WaXJJWEpNblFKN2JLVStZeGE5YmUwT1lTeHhYMHR6U0E3NlZOZTdh?=
 =?utf-8?B?NWt1N0krMEM2b2RKS2RMNWhuNy9jVUFzVHEwNTkvdWdIVlNjcEZnQmZyVWdI?=
 =?utf-8?B?MHRveEp5MjArbGk3T09FaUk2NklhU3Y5eFg0cXlDdnZ1RE4yTEV0QTc5RVhw?=
 =?utf-8?B?WUlsTXR6bnp4bXVXOFI4SFdMVmp6Mmh3WWpxNThwNUJzbVNFNnBvZTFYTDly?=
 =?utf-8?B?c1dHcXpMTlV3L285dFU2NkFjamFtM0tuSzR5VkNhMnM5ejFVSi9GRE9iM29K?=
 =?utf-8?B?TDNKbDYvMzFYUVpXb2U0a2dsb2pYb1RvejVPQnRKSXByR1htS1FmcDN4S3pJ?=
 =?utf-8?B?N1MwQzFXZ0hjOVFYNUg5MmRRNDdlb0pabk4xcTk4T2hLbzhSZnRIczNpaDJr?=
 =?utf-8?B?S3RNZTNSZllyVjl5cjhZRjRKd3R1VTB1RHZ2cGUyakQ1S3Z3WGxGN1UvR1Zm?=
 =?utf-8?B?TDFRbitmRkpRR0dZbllLZzNocStmNERDWG05SGxKMW1mL01PQjIwTHZHVUZk?=
 =?utf-8?B?OGVOa1lnTEd6Z2Ntb09QNjhxdmQ1dUJyM0c5eUdaR2V1QW52TXlld3RHRXZs?=
 =?utf-8?B?SFJBbzJYaHM2dVFnb0pDNDlHc2R2Tk1uM0JsN1hNbVVBWGIzNzRjcFFBZ1Z4?=
 =?utf-8?B?U2JFYmdDOU5oVFM2ZENxcUVBWHhVcHc4blV1VmoreE5KZWYrQWxReXlHRmpp?=
 =?utf-8?B?YmdNR3hjSklEVjdjeDRMQlRvem45bE9DQm04YmRxYlpESEJ6VCtYNVpqdCtL?=
 =?utf-8?Q?VuhMqiyuJ90TKZShP84qnPH0fDdTxUNE?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <79DF40B88769A347BFCD6CDF03D7D076@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1b34f73d-a7cc-4f14-5bc9-08da078f7f5e
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Mar 2022 20:56:52.3860
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: aMNw6EBAog+K4ZwqwyPu5ExmOOrfqFyLocsTNsYaZ4kdWzwgRVWHyM3PI3NHWbYJxN9PgacDFDIpPGlYI5F7CRf7O3lc0rbGt4gQ190v++U=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB4549
X-OriginatorOrg: citrix.com

T24gMTQvMDMvMjAyMiAxNDoyOSwgSmFuIEJldWxpY2ggd3JvdGU6DQo+IE9uIDE0LjAzLjIwMjIg
MTI6MDAsIEFuZHJldyBDb29wZXIgd3JvdGU6DQo+PiBTdGFja3MgYXJlIG5vdCBmcmVlZCBhY3Jv
c3MgUzMuICBFeGVjdXRpb24ganVzdCBzdG9wcywgbGVhdmluZyBzdXBlcnZpc29yDQo+PiB0b2tl
biBidXN5IGJpdHMgYWN0aXZlLiAgRml4aW5nIHRoaXMgZm9yIHRoZSBwcmltYXJ5IHNoYWRvdyBz
dGFjayB3YXMgZG9uZQ0KPj4gcHJldmlvdXNseSwgYnV0IHRoZXJlIGlzIGEgKHJhcmUpIHJpc2sg
dGhhdCBhbiBJU1QgdG9rZW4gaXMgbGVmdCBidXN5IHRvby4NCj4+IFRoaXMgd2lsbCBtYW5pZmVz
dCBhcyAjREYgbmV4dCB0aW1lIHRoZSBJU1QgdmVjdG9yIGdldHMgdXNlZC4NCj4gVGhpbmtpbmcg
YWJvdXQgaXQgc29tZSBtb3JlIC0gd291bGRuJ3QgaXQgYmUgbW9yZSBuYXR1cmFsIHRvIHR1cm4g
b2ZmDQo+IENFVCBhcyBDUFVzIGFyZSBiZWluZyBicm91Z2h0IGRvd24gKGFuZCBmb3IgdGhlIEJT
UCBhcyBsYXRlIGFzIHBvc3NpYmxlDQo+IGJlZm9yZSBhY3R1YWxseSBpbnZva2luZyBTMyk/IFRo
YXQgd2F5IG5vIG5ldyBidXN5IGJpdHMgY2FuIGJlIHdyaXR0ZW4NCj4gYW55bW9yZS4NCg0KSSBk
aWQgY29uc2lkZXIgdGhhdCwgYnV0IEkgZG9uJ3Qgd2FudCB0byBnbyBkb3duIHRoYXQgcm91dGUu
wqAgSXQncyB0b28NCmVhc3kgdG8gbGV0IHRoYXQgdHVybiBpbnRvIGEgYnVnIHdoZXJlIHdlIGZh
aWwgdG8gdHVybiBzaHN0ayBiYWNrIG9uLA0KcGFydGljdWxhcmx5IGFzIHdlIGhhdmUgY3B1IHBh
cmtpbmcgcmF0aGVyIHRoYW4gZnVsbCBvZmZsaW5lLg0KDQpJdCdzIGZhciBzYWZlciBJTU8gdG8g
ZW5zdXJlIHRoYXQgc2hzdGsgaXMgYWN0aXZlIGZvciBhbGwgYWN0aXZpdGllcyBpbg0KWGVuIGNv
bnRleHQuDQoNCn5BbmRyZXcNCg==


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 21:06:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 21:06:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291281.494302 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUaqJ-0002HP-Ib; Wed, 16 Mar 2022 21:06:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291281.494302; Wed, 16 Mar 2022 21:06:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUaqJ-0002HI-En; Wed, 16 Mar 2022 21:06:03 +0000
Received: by outflank-mailman (input) for mailman id 291281;
 Wed, 16 Mar 2022 21:06:01 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUaqH-0002H8-R5; Wed, 16 Mar 2022 21:06:01 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUaqH-0003N2-PG; Wed, 16 Mar 2022 21:06:01 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUaqH-0005eu-8o; Wed, 16 Mar 2022 21:06:01 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUaqH-0005la-8M; Wed, 16 Mar 2022 21:06:01 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=0zIdnq9Q24RRRJwJjJGZgPLB54IU8DDAySlACCI+LtA=; b=kxbJnBtnxczMnsFaEX+jSJWbG1
	YW+PwryolNGdqg05kB8GAQM+gUY2PMsuM6fDR7ungfryEZadLF05+Fnw7i6svgnnVedH8MR4oJ+T9
	VSaYJBZlJdmbOwGh59caa8+dJgwH/OYGRZkM3ntyWDWKokeWrhQ/6fQCwKZ+szgQFHh4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168639-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168639: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=5b56c52b5c1cc817a1ddac7f03aa6a02aeab4c04
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 16 Mar 2022 21:06:01 +0000

flight 168639 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168639/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 5b56c52b5c1cc817a1ddac7f03aa6a02aeab4c04
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   16 days
Failing since        168258  2022-03-01 01:55:31 Z   15 days  152 attempts
Testing same since   168637  2022-03-16 13:10:25 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 714 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 16 21:47:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 21:47:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291290.494312 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUbUc-0006YG-Ry; Wed, 16 Mar 2022 21:47:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291290.494312; Wed, 16 Mar 2022 21:47:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUbUc-0006Y9-P0; Wed, 16 Mar 2022 21:47:42 +0000
Received: by outflank-mailman (input) for mailman id 291290;
 Wed, 16 Mar 2022 21:47:41 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=EkWL=T3=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nUbUb-0006Y3-6x
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 21:47:41 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b2ab84b9-a572-11ec-8eba-a37418f5ba1a;
 Wed, 16 Mar 2022 22:47:39 +0100 (CET)
Received: from pps.filterd (m0246632.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 22GLECbl018264; 
 Wed, 16 Mar 2022 21:47:34 GMT
Received: from aserp3030.oracle.com ([141.146.126.71])
 by mx0b-00069f02.pphosted.com with ESMTP id 3et60rqn52-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Wed, 16 Mar 2022 21:47:33 +0000
Received: from pps.filterd (aserp3030.oracle.com [127.0.0.1])
 by aserp3030.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 22GLlXmU176458;
 Wed, 16 Mar 2022 21:47:33 GMT
Received: from nam04-bn8-obe.outbound.protection.outlook.com
 (mail-bn8nam08lp2044.outbound.protection.outlook.com [104.47.74.44])
 by aserp3030.oracle.com with ESMTP id 3et64u0stp-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Wed, 16 Mar 2022 21:47:32 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
 by BL0PR10MB3010.namprd10.prod.outlook.com (2603:10b6:208:78::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Wed, 16 Mar
 2022 21:47:31 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755]) by BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755%9]) with mapi id 15.20.5081.014; Wed, 16 Mar 2022
 21:47:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b2ab84b9-a572-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=SQrzOtnMG/wcNwNmnSt9cDGGmhrYkh0Z85FxZnyOaRA=;
 b=lXtGiSLMQIAvpMScQmGku8zIoaJuax13keI7aQu/B0C9m70yL1FJUQm3x5qxz/ojgjTu
 dNlvAIPj8J8fdzsVFThEkCWeQ7aSxT6znLrdLDN/GhFIgNttuNltCR/GOmEqkIuLwg8C
 6WhcZdktmdHngB0tf1HYJ1R4qX4qgvORuxavt/k36AQhBWK2lC8weobERaOvUBevkkfR
 Ld3zYE5xEqe9FXtCogBOi3dVfxXdErWs8OO2ecYUTKweogRmN5aBJTeRXEQI8SNLBtpH
 Y9TmcvVlKixF4TMxVUHlrAkJ9KbBqkxXkPNWbaBaGCctfVpE6RTS03DJ/W6GgVOnOfxZ lg== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=a9zhUtagWbnlXshAFU4nCdukOJTXnKzK9qu44xrj1jH9Q1OvuyB7a5p4U460w8R9wuCsuTxNpdOnydkQt1pJbREb7fIBOMXVcAU9Ac1n7Q4mBXsgcoZ7ljXTypkP+nVeT1O+Nq/ysQCfinfvyI8ULp/Rio29yiKNHn5lCiUT4/T7NSVXPMOmPzof4L2kuoWhtm1Vl3IR2LWToYIzW44AoAYYPOsfoQWnum1NgcCZa7Rh1CFOTjTDn9Q8OzZUO0WXOV2kMpjFySGMe2YvVNiveEWoCnQaLYmQcNMeQMsbQFNmDkEUAWoLo8ATNitSMXeKrvQYKOS52Ic5jnbCKf2Lwg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=SQrzOtnMG/wcNwNmnSt9cDGGmhrYkh0Z85FxZnyOaRA=;
 b=gs3FwZngx1mudAtVV0O5ph7oRe2Kn7x35DyTc5PCo+mExQe3uSzFt+SakfJuaewxrrCl7ScWaUpWpLJ3EDqMVgef05Nc62LAjqysVGXA/ryI6m4kPpzdNq5nv7wI66ke/exlvwq3kK8R4j1Yw7bFrdGMz1Si43kC7AHT3ESlkqv2RVPFjUSsbb6VYTsgp8iWJL/M6St8M+lz9uVYKy4Oc+IkdaQHlZZ7tTkEvf9xqbCA31PN3wqOPnUaIN/MhzuGPMgpFfqQlWqlVRZqFjrdFQ0cmpAqbeiBKYhDEQ0luPoEdBjzjQPTZVXUGjFWFXJxjlTKwGTqGehVmLXk7YGVSA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=SQrzOtnMG/wcNwNmnSt9cDGGmhrYkh0Z85FxZnyOaRA=;
 b=DReRNtuW2N1W1fwSAiMOMEJbsdlW0XD77Lto5EjrzTQ25UeFrZtUAMmAroZMIfepzrmUevuMKSbIMo5xKUiAdTwKOT1V3KBpLpXNQz7jXH5t1ZGeo2KPDPGauBjL+ek40KekFulVZbw9m6G4hqY5P2XRETMmINSWoClVRaZ29ws=
Message-ID: <2bb2c005-ae5b-22ad-2431-2bd3ed0f89f8@oracle.com>
Date: Wed, 16 Mar 2022 17:47:23 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH 1/2] xen/grant-table: remove gnttab_*transfer*() functions
Content-Language: en-US
To: Juergen Gross <jgross@suse.com>, xen-devel@lists.xenproject.org,
        linux-kernel@vger.kernel.org
Cc: Stefano Stabellini <sstabellini@kernel.org>
References: <20220311103429.12845-1-jgross@suse.com>
 <20220311103429.12845-2-jgross@suse.com>
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
In-Reply-To: <20220311103429.12845-2-jgross@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: SA9PR11CA0024.namprd11.prod.outlook.com
 (2603:10b6:806:6e::29) To BLAPR10MB5009.namprd10.prod.outlook.com
 (2603:10b6:208:321::10)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 6e72ff0b-4265-4b8f-f12c-08da07969271
X-MS-TrafficTypeDiagnostic: BL0PR10MB3010:EE_
X-Microsoft-Antispam-PRVS: 
	<BL0PR10MB3010FD7F007E6A35234DC9128A119@BL0PR10MB3010.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BLAPR10MB5009.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(26005)(508600001)(186003)(44832011)(4744005)(6666004)(8676002)(4326008)(6486002)(8936002)(66556008)(66476007)(66946007)(5660300002)(6512007)(316002)(2906002)(31696002)(38100700002)(6506007)(2616005)(36756003)(31686004)(86362001)(53546011)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?bjNwcjNnZEljVmRkNmJPVEhOVnU5di8vaU9tZWRpL1hUSXhoNGM4MUIzQzZS?=
 =?utf-8?B?b3h2VzMyOC9ta1NyZGowdFlkZ1ZFWFlKaWpnNmJ3dmd4SWsvclREdElsNlJP?=
 =?utf-8?B?ZFdKLzZ5MjRCcVZPc0U4RWRWL1V3c0twUTNqZDJEUlBBeUd3RVJNcFFuUDRt?=
 =?utf-8?B?WHZmaUxsTWlGWTlIZ3FMNE12RDhSR0Jwd0lIMTA0Vm1mMUtFb3pBQkxZbWxI?=
 =?utf-8?B?aUV5M0JrNWxJNzRWTzh6bEZYWThlbE9QZlhqOVE5ZlNvNS9adXovVWdNNEo4?=
 =?utf-8?B?aHNBdWVlTWdVazlKUUgzTHdqRTFqazYyaXlyM0hYSDUvZzJmbFFsejRjT2t6?=
 =?utf-8?B?VTFIN3dVc1Y5aWt0ODBkeVZDYmM1MTRhMDZneE43TSt5aDFqMWRkM3NpbWxM?=
 =?utf-8?B?TVVsZ1NBMEh1bW41TnA1aE80SjZoMU9PMXp6RlBBRGx1SThWd0ZybVl1aTRJ?=
 =?utf-8?B?WVk0YkhDakFnT01HOUhBSTg5TnhCbVhuUi9Hd2ZSc2N2U2JyQWtIS3hhYkts?=
 =?utf-8?B?UDZrOWpLdytHUmVzR0wyQ2F6NmI1U2cvZm5WeGw1MkNyNVNxbmZHc3ZiM2lB?=
 =?utf-8?B?YVNmL1RMSTFYakh5QmNuUnhqV3VFK01UWStub3p4b3F5ZUowV3drS2FoZnll?=
 =?utf-8?B?emVtcjBZN3VrMWdQeEliTkVGbUxFbzNoZE94YnlKenhQS0NlVFhHTTM5QUUz?=
 =?utf-8?B?MUNTdGIrRDY3WERhTDBpaDU5T2txS2dOdFMwSEZyWDJuM3poNU83UnREaCtv?=
 =?utf-8?B?MXQxa05DRHBrdldKd2loK3dvL0hNTzc3dTRxTThaR3EwZWFiNlREeXljcjU3?=
 =?utf-8?B?OUtYNDNQR2srUGdtU2VwM1dxdWRPNVBueVdaazlOMm5pOTNuMGJMZGZweExm?=
 =?utf-8?B?MW92UE9UcFBzc0RlVktpMkRFa1NLMDlsRFFiUDErejdTWVZCQ2JWWHRaUUpx?=
 =?utf-8?B?YVpnVVF1QVRqRzZzcDJUa2Fhdm8wczRhSUJMZzlNbi9PS0VJK0VJdjdlMEhW?=
 =?utf-8?B?SlJWV2F6Z3k0L3lmU2h3NE04RzVsZnRIMWM4UG5mQWwrSnp0eGtJWDVhMk8r?=
 =?utf-8?B?U1k0TkcvWXV4MUIwanJSamtDZUM5UDA3WEtCYk9nVEFJVHlBRjVOVkd4YlAx?=
 =?utf-8?B?aEhIdzZ3TnY5V2NQK1k5ZXZXZzRyVDg0c0MzMVc5WE5EUVFHVDJNK1lQOHV2?=
 =?utf-8?B?cktTSFNsRnloV3ZtVEQ1Z3VTWGNMNll2aTZMcDZvRWZvS0MyUXpzc0lQWTdN?=
 =?utf-8?B?VnI3bnlTeG0wK05BTnlWMVpuVGc4VmxjTHNOcHNxem5PNjVoVERnNUZVMUJX?=
 =?utf-8?B?MDZDN2IyeHdYN1p3aW9QSXdYcTh5OGZnSUZweWVKcnB5WjRPb1hKdEE3dVRF?=
 =?utf-8?B?cURRMGxDL2FiREQ1Q3hOeHNUZVZSRDlLbWZCRkNhQklZd0tNcGxpb2k5RW1z?=
 =?utf-8?B?MnBXT2QwZXFXekIxdStjVzc3L2h5L0JPTVdKZDhlYk9TNnZobWdkam9JTTFz?=
 =?utf-8?B?TjBCQy9FMDlJTS9TZU96Zk1kWVlZZldleTl5dnJ1Z0p0eXpnSVpMZEdRb0JZ?=
 =?utf-8?B?eGVXZDJKd09HUm9qcHFsM05aR2NiUE4vOG4vSnI3VjNQVkFSMFo4REFHeUNt?=
 =?utf-8?B?Z2xhZGFDT2ZrUEQrdVZSNXoxb3JETkEvMHZFM1NBeEdrU0FEbERVcHRQODBW?=
 =?utf-8?B?RGlEWFppb3h1VUE5ZTFVYzk2VllMa2dEaTN6M0JTdGNWU0hWVUhIcStXcmoz?=
 =?utf-8?B?R1hJQkkrREZvc1Bxd2lLcWJSbGJDNEk0Q1ZnRmFUK3lQNlR2eWdsbUhqNTBT?=
 =?utf-8?B?WXNHTG50RUY5N1BjeFFETlJNT0VpTXBOdUFSU0NFa0JuTE4zMzVINWhjblhz?=
 =?utf-8?B?RnN1N1pOcWF3MHh3RHpIUmFCSWtSM0Q2a0JvU3BXRjBzb094SFhFREdqMkNI?=
 =?utf-8?B?cXJ5bW4wK01YTVJVNlc4aFJWbFl4dG9HNmh4clJ6MHM0cGRjR1BpN2NBK1My?=
 =?utf-8?B?bTZjM0g4Qkd3PT0=?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6e72ff0b-4265-4b8f-f12c-08da07969271
X-MS-Exchange-CrossTenant-AuthSource: BLAPR10MB5009.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Mar 2022 21:47:31.1650
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: nTD9L/df1lFOH/NU5HLQhc8tptAiZzgUMz6c97UjpyU8HJY+mTgAxevQF3hXhq9o2I+Y4Tk5fZ5ZmoDvgB0tTSbcV1yIBD/X8t7Ha6tg/Sw=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR10MB3010
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10288 signatures=693715
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 malwarescore=0 bulkscore=0 phishscore=0
 suspectscore=0 mlxscore=0 adultscore=0 spamscore=0 mlxlogscore=999
 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2202240000
 definitions=main-2203160130
X-Proofpoint-ORIG-GUID: 3q97bpQdqQmetV7m1i-HmLRXH01CVMtm
X-Proofpoint-GUID: 3q97bpQdqQmetV7m1i-HmLRXH01CVMtm


On 3/11/22 5:34 AM, Juergen Gross wrote:
> All grant table operations related to the "transfer" functionality
> are unused currently. There have been users in the old days of the
> "Xen-o-Linux" kernel, but those didn't make it upstream.
>
> So remove the "transfer" related functions.
>
> Signed-off-by: Juergen Gross <jgross@suse.com>


Applied to for-linus-5.18 (both patches)



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 21:48:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 21:48:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291293.494323 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUbVV-00076q-52; Wed, 16 Mar 2022 21:48:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291293.494323; Wed, 16 Mar 2022 21:48:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUbVV-00076j-20; Wed, 16 Mar 2022 21:48:37 +0000
Received: by outflank-mailman (input) for mailman id 291293;
 Wed, 16 Mar 2022 21:48:36 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=EkWL=T3=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nUbVU-00076Z-4L
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 21:48:36 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d37aa3d4-a572-11ec-853c-5f4723681683;
 Wed, 16 Mar 2022 22:48:34 +0100 (CET)
Received: from pps.filterd (m0246631.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 22GLE99c030868; 
 Wed, 16 Mar 2022 21:48:25 GMT
Received: from userp3020.oracle.com (userp3020.oracle.com [156.151.31.79])
 by mx0b-00069f02.pphosted.com with ESMTP id 3et5s6qp7h-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Wed, 16 Mar 2022 21:48:25 +0000
Received: from pps.filterd (userp3020.oracle.com [127.0.0.1])
 by userp3020.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 22GLjxkq041330;
 Wed, 16 Mar 2022 21:48:24 GMT
Received: from nam04-bn8-obe.outbound.protection.outlook.com
 (mail-bn8nam08lp2043.outbound.protection.outlook.com [104.47.74.43])
 by userp3020.oracle.com with ESMTP id 3et65913aq-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Wed, 16 Mar 2022 21:48:24 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
 by BL0PR10MB3010.namprd10.prod.outlook.com (2603:10b6:208:78::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Wed, 16 Mar
 2022 21:48:22 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755]) by BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755%9]) with mapi id 15.20.5081.014; Wed, 16 Mar 2022
 21:48:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d37aa3d4-a572-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=wZtpzwDGjiPae7stspqZY4t+SgZzNALigEBwA7Pgq5c=;
 b=EJ15RyoY1kolOEjR9nboFDgfLmkRYRK13Uvh+zlAGdQ7hAzbSJi035dKwM1jrg1rAxKH
 RJ4qjHNiH4z0m/qcwluyWNBjOYWW7H9OitEwJR4DrFuID01hPBV1q/uw/J3La/DCATQN
 TR87YO43K6suSccG/4fV5Ew9TyiU7DGaXV6o7klelGyqREkhxVpVZ0T8RUJCTMhKo0+8
 m2OOdu5FrPi5StYKuu5YUUdQ8S/h+YglJROjcVybx54+yfkvacfyUoiYLz5SYFSKrCWO
 oaa+ywM66v0axuaEXC/dZfy3Yv5EHOK63fjLSeoK314Mjp0/zR2UkRrHTjueuFQOmV5z tQ== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=CDCZo4/FgBX0Ws86n72zk7Vwctx6hhcmZ+ERawAkn4QLHd2swEuQa+4tvUWvGSkfSVYO/8Lhuwvatn8H9/KSPoGfig1uhPz9/RUY0DKgNittx+gpiD1Ddc/HlgYh8ODoHd8cA3UOXrrlpujfcRE6ftm4LbU4qeQQqNo1XYyXYHdCrbLct9LUIFeAAv5LKbdh0vCHC9QvpNBIgHD11tsItzSjk2Gakp/Pm+qClMzoeZxYALOL1Z/EBLN3KBJHW+SiML3xcIHDbRxqvpKWCu1FNNDN6eR7KIr6AVsb35TrERDIrdCwyzUSrqjI/RvMwUS0LfycqgZhBQm4rQQ7f3jCGQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=wZtpzwDGjiPae7stspqZY4t+SgZzNALigEBwA7Pgq5c=;
 b=hpbFVePbLVIAGu3MaZTlP1oQL6WXo6YDKp/J7WwZrpMAPez/crQSUDNpbsYJEDq7VXOcIicW6S9Sd+/fUrWZKOVaBSaCP7Pku4FC/IvHPpbUG4kRWOiEWZKwG6BhoalUgzyn19b4YicK1o6v/fyBkp5wO4LDJQsN26+oNQITwjz3sJU5Rsj/d+2NDhCtEVYbFc5mJSxCrffnxPax8gDR4zE7XQfsSvYHXaWVxPlF6RaaVEWELrJ6+TdPppBbs2HqE2mBSlSkxeA3mB6II3mIyxanly9ZhZqVA9mplyYl0vNIhWoCUXEAWkE25Iwj2gRRG6J3TZjPs30xcGAoNVl1Eg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=wZtpzwDGjiPae7stspqZY4t+SgZzNALigEBwA7Pgq5c=;
 b=I7VErfIY/sNYoKPLIAoAQHA4khzoCuB+WAQpuuawWrC8IBeeL7LMj2XKYMmz4G4EmXFyZcMRRoecLoLNL/sxt5eS9l0ZzDcTHQ4jHfuoruCA9DOK8dUp7AgY/2D+gTfv879QUxso8olF/11ZrlJFJm6GP/gUZ3skQ6azzEUOc+E=
Message-ID: <a0dc57da-43c4-7532-34ac-290add25bccf@oracle.com>
Date: Wed, 16 Mar 2022 17:48:16 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH] arch:x86:xen: Remove unnecessary assignment in
 xen_apic_read()
Content-Language: en-US
To: jianchunfu <jianchunfu@cmss.chinamobile.com>, tglx@linutronix.de
Cc: x86@kernel.org, hpa@zytor.com, sstabellini@kernel.org,
        xen-devel@lists.xenproject.org, trivial@kernel.org
References: <20220314070514.2602-1-jianchunfu@cmss.chinamobile.com>
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
In-Reply-To: <20220314070514.2602-1-jianchunfu@cmss.chinamobile.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: SA9PR11CA0001.namprd11.prod.outlook.com
 (2603:10b6:806:6e::6) To BLAPR10MB5009.namprd10.prod.outlook.com
 (2603:10b6:208:321::10)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 170dc5bd-d7ce-4649-d81b-08da0796b0f7
X-MS-TrafficTypeDiagnostic: BL0PR10MB3010:EE_
X-Microsoft-Antispam-PRVS: 
	<BL0PR10MB30102C4D6A5565075ECFF0988A119@BL0PR10MB3010.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BLAPR10MB5009.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(26005)(508600001)(186003)(44832011)(4744005)(6666004)(8676002)(4326008)(6486002)(8936002)(66556008)(66476007)(66946007)(5660300002)(6512007)(316002)(2906002)(31696002)(38100700002)(6506007)(2616005)(36756003)(31686004)(86362001)(53546011)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?ekVBdk5BVlllV1ZZQURtSURSQ1MyRDNyNmFnWXY5cWNRRGhmL0x5UmpwZEUy?=
 =?utf-8?B?dWF5K2M1dXlhajRLNGxaclZ6SGtuVW5QN05KYmRwRXJ6OStCR3FEYTVEcEFt?=
 =?utf-8?B?S3NsV05yWFI1dU1TVWRmZkpVdUcxUWhHR2UvV29oM3VIUGlsQklZcW9hemNV?=
 =?utf-8?B?bm9GcThIMEFzKzVLNHNrTHZjM1I0Q21UeTVRL3ZkMHhVRFJsYXJpUzdMREJF?=
 =?utf-8?B?VXhGWlZPSDB4Y2QvSjg1TFIvQzdYekdickpkSjNZRElXeERKOWRYM0FKMXFO?=
 =?utf-8?B?N1RVTUVLZXRzQk9oSmRsQ2N6ZkY2a1poWVh4R2VhRjlBeUZXNUR3REdZeDJY?=
 =?utf-8?B?UWtUV3QwazNQVE0vR012TE44Y013WTE4dDJ4Uk8wRzZoN0hoRDRWRDE0Y3I4?=
 =?utf-8?B?TTNVWEYwcm5FMHV3RDZ2YlQ2ci9yZTlNNVFQNVJNMVgvNmRFTGJPWHVheWV0?=
 =?utf-8?B?RTBZNUpmcm9xYUtXOVQxc1ZFMVN4WHh5WHliOUk3Ymd6bCt6cDlLWWRpblp6?=
 =?utf-8?B?bTUzem02ZHZwS2xUNkdhZHVOUThKTUtGSkdPSFRLTi9FKy9xMUJHSWxMMlFh?=
 =?utf-8?B?bDZIKy8yRzMvVlAwaUd6ZU9meTBhbk4vdHhDWGxoV0RmblVWRUoyVkJHTDlR?=
 =?utf-8?B?MXd5MWQwUmRnM2lDTEplTlZFRm1XenN2bEpKTVRKSGV3dEdmL2tSYXlkUHhL?=
 =?utf-8?B?SnUvVmFaMlYwRFNnM0tjRXFYNkFZREtHblJZSzhqUWRmUmRrQVpQRW1reFd1?=
 =?utf-8?B?cGFIM1F6Y1pKV2JHVWFtRnYycGVTVm1JZ0I2NDRyczE3ODhFV2UxZW9tQjhn?=
 =?utf-8?B?dm5MVktqOU5VWDNnZ1pOS25nUVlhUks4eDNwbXhuODJFUDhrNmxZdHZLYkhO?=
 =?utf-8?B?RnQxWXp0QjQvbXI1NzBOM0hldUZtdWw3YjJzaUIzcFIvdWsrc0Z2eWJ1TXZH?=
 =?utf-8?B?aHpHK2JReG9tZ3B5UzEwVUtjcjErNzR4QlVpaDR4QVppbmMvaXRjR1RJNjhr?=
 =?utf-8?B?bGlBNXhoNlE4L3lYVS91eGZ0NUpYQnlKcURrcXhQWVZUdmx5ZVFHRHUrMGE3?=
 =?utf-8?B?QmZTOFRTSTkvQWtlNzF4K1FzM2tRZEFyQ1RSYVlSaWFmYTczQURYVlhDaDRD?=
 =?utf-8?B?OTVlMDFpdFh1YVRXV1NMcXJlUHBsL2FDcEowY3RpSnd2SGg2VXJGeDdOYm53?=
 =?utf-8?B?YTE1SVFnN1J1dHBSV3YvOGJoRCt6dDM4T3pFSStDMWlGNllPWFJYTUlNb00z?=
 =?utf-8?B?UDdPcHFzOTV2YllRSDFodi9QQlVNWHFaU2pFY2JRbG9oNXJhcEFmY2pnTlRv?=
 =?utf-8?B?eU00WFVYcno2c2Y1Ly8rU3N3cm8xZlhpYlpMSi9KQW1KdXdPVHZCOElkNmRV?=
 =?utf-8?B?NDRRY3FEYjYxbi9xRVpReXZUY3d3RlJVNmhPZFBkdkJlMFJ1L0R5S1BlV2ty?=
 =?utf-8?B?MzBRbGF0WURUWnN6WHZhK3BiZFhPQ1VpSzZKbkQvclBpMmxnTFZJTGpwQXNk?=
 =?utf-8?B?b2VqTlpocDlLYXpoT2lScFVHWFd3dzQvMVpBQm1BaHkzSDRwT3JCLzNocjdj?=
 =?utf-8?B?cmFXcXlOZWN4ekIzZTBEd3RjcnpNaHlPOEhGSWdtakNqM1NJK3lVUm5uTG5U?=
 =?utf-8?B?RTVManprUUlCTUI5TXFNeUNEUEVPYmY1N2twYzNhN0txb1R4Q1NWMmZRN29y?=
 =?utf-8?B?MWxvdVlMN3d5VVNqSHF3VzNxZjgwYjF1MEd0ZExkcGh6TDVFbXdNeG8venZV?=
 =?utf-8?B?S0dMVi9XMjRvTVdLeHhzaWpBMFI0Tko3ZG0zYWozU2lKOFh3emNMYys1NFIw?=
 =?utf-8?B?TlJ5VDJyOGJJYVVvNHI1czhzcjJyTUVTM1VQbTF1RkU4WGIvd1FibytlQjhO?=
 =?utf-8?B?MTRUSWc4QXNTR1FWcmJ3V3RzbGFoYTB1MldMQWQ1ZkFzRncrblR0MWZ4UGFW?=
 =?utf-8?B?bXZ1Wm9aUEVDbkRybGVJTGpJY0cyQkdmU1oyMXJvb2M4eFd2ZWF6NW9EYXpL?=
 =?utf-8?B?OGtsTE13bWRRPT0=?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 170dc5bd-d7ce-4649-d81b-08da0796b0f7
X-MS-Exchange-CrossTenant-AuthSource: BLAPR10MB5009.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Mar 2022 21:48:22.4523
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: e2giQyHTqsH/KJZQ07yZbj//HXZptc9Jctlw2qvxgcc7NTSEeGE/eAwzZBudl2Ihc5IJpOmxxlaeiQv1k3nY72YIgeNnjZjR+2gNQYaEohI=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR10MB3010
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10288 signatures=693715
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 spamscore=0
 malwarescore=0 adultscore=0 bulkscore=0 mlxscore=0 mlxlogscore=999
 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1
 engine=8.12.0-2202240000 definitions=main-2203160130
X-Proofpoint-GUID: 7kg-Cmerxm5AtnlyXtOpgq8Waoc75Wvv
X-Proofpoint-ORIG-GUID: 7kg-Cmerxm5AtnlyXtOpgq8Waoc75Wvv


On 3/14/22 3:05 AM, jianchunfu wrote:
> In the function xen_apic_read(), the initialized value of 'ret' is unused
> because it will be assigned by the function HYPERVISOR_platform_op(),
> thus remove it.
>
> Signed-off-by: jianchunfu <jianchunfu@cmss.chinamobile.com>


Reviewed-by: Boris Ostrovsky <boris.ostrovsky@oracle.com>


Applied to for-linus-5.18 (both patches)



From xen-devel-bounces@lists.xenproject.org Wed Mar 16 21:59:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 16 Mar 2022 21:59:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291296.494334 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUbfO-0000Bp-4O; Wed, 16 Mar 2022 21:58:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291296.494334; Wed, 16 Mar 2022 21:58:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUbfO-0000Bi-0x; Wed, 16 Mar 2022 21:58:50 +0000
Received: by outflank-mailman (input) for mailman id 291296;
 Wed, 16 Mar 2022 21:58:48 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=79/6=T3=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nUbfM-0000Bc-4v
 for xen-devel@lists.xenproject.org; Wed, 16 Mar 2022 21:58:48 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 409c6adc-a574-11ec-8eba-a37418f5ba1a;
 Wed, 16 Mar 2022 22:58:46 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 49FB9B81CE8;
 Wed, 16 Mar 2022 21:58:45 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8C3FFC340EC;
 Wed, 16 Mar 2022 21:58:43 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 409c6adc-a574-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647467924;
	bh=m9a45UArasMKXAuzGU+/iR16SFfI45YODgIE0+d6UqY=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=hlCnXA7/OYiVj77Dcly3yajnIZQJcCoHqnY2fTKUxRFPmbjNiuhkGsJEPoyjdZPGq
	 iYzpRA5AIQNewI2SXyDXMQw+mdqjLruNm4O1Gc1sjrgGmWF0rIAGOCjHeWsx8HDPd0
	 ujewsumqE4FcZAMUinGAI/8yn8dwgCJg4sLMoje3LZCFrKzBglCQoeJ3I5Uc9lW+V4
	 xqvZ5drJRkgpg9uu+9lXg/WFNkcw8vQdWD1E44gvtm1CmMroPPvfU7YudPJc6MPT9q
	 toX3RjJ4hyjmQAnJWiQZdXq7s7YKQxIZdM+oRnPrwSy+R52CLBiEjAfjGv8guVrPqB
	 ZBuU4Uuond40g==
Date: Wed, 16 Mar 2022 14:58:43 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Julien Grall <julien@xen.org>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    xen-devel@lists.xenproject.org, marco.solieri@minervasys.tech, 
    lucmiccio@gmail.com, Julien Grall <jgrall@amazon.com>, 
    Bertrand Marquis <bertrand.marquis@arm.com>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH early-RFC 4/5] xen/arm: mm: Rework switch_ttbr()
In-Reply-To: <26d41f77-085a-62e4-088b-49dcda63c100@xen.org>
Message-ID: <alpine.DEB.2.22.394.2203161457410.3497@ubuntu-linux-20-04-desktop>
References: <20220309112048.17377-1-julien@xen.org> <20220309112048.17377-5-julien@xen.org> <alpine.DEB.2.22.394.2203111721130.3497@ubuntu-linux-20-04-desktop> <ece8f698-0abd-42eb-625e-693f69f02e27@xen.org> <alpine.DEB.2.22.394.2203141459360.3497@ubuntu-linux-20-04-desktop>
 <26d41f77-085a-62e4-088b-49dcda63c100@xen.org>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Tue, 15 Mar 2022, Julien Grall wrote:
> On 14/03/2022 23:48, Stefano Stabellini wrote:
> > > > - we save the current mapping
> > > > - update it with the Xen 1:1
> > > > - switch_ttbr
> > > > - remove Xen 1:1
> > > > - restore mapping
> > > > 
> > > > It should work, right? Basically, a mapping conflict shouldn't be an
> > > > issue given that the mapping has only to live long enough to call
> > > > switch_ttbr_id.
> > > 
> > > Today switch_ttbr() is called before we initialized most of the memory
> > > layout.
> > > So clashing with the VMAP and frametable is not a problem.
> > > 
> > > However, the identity mapping may also clash with the region used to map
> > > Xen.
> > > That said, technically, we are not able to handle Xen when its start
> > > address
> > > is in region 2MB + 4K to 4MB (Xen is loaded at a 4KB aligned address).
> > > 
> > > The trouble is some features (e.g. UBSAN, GCOV) can generate Xen image
> > > over
> > > 2MB. IOW, the range where Xen cannot be loaded will increase.
> > > 
> > > This is an issue because AFAIK, there is no away to tell GRUB "You can't
> > > load
> > > Xen at this region". But even if there were one, I feel this restriction
> > > is
> > > sort of random.
> > > 
> > > I already wrote a patch to get rid of the restriction. The code is not too
> > > bad
> > > (we only need an extra indirection). But I haven't sent it yet because it
> > > is
> > > less critical with the re-shuffling of the memory layout.
> > 
> > Interesting! I am curious: how did you manage to do it?
> 
> When the identity mapping is clashing with Xen runtime address, I am creating
> a temporary mapping for Xen at a different fixed address.
> 
> Once the MMU is turned on, we can jump to the temporary mapping. After that we
> are safe to remove the identity mapping and create the runtime Xen mapping.
> The last step is to jump on the runtime mapping and then remove the temporary
> mapping.

Cool! I was guessing something along those lines.



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 01:39:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 01:39:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291302.494346 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUf6S-0001e3-Ah; Thu, 17 Mar 2022 01:39:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291302.494346; Thu, 17 Mar 2022 01:39:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUf6S-0001dv-4p; Thu, 17 Mar 2022 01:39:00 +0000
Received: by outflank-mailman (input) for mailman id 291302;
 Thu, 17 Mar 2022 01:38:59 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=MbXJ=T4=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nUf6Q-0001dp-Vw
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 01:38:59 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 02d83079-a593-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 02:38:57 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 1353DB80E52;
 Thu, 17 Mar 2022 01:38:56 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 4CD0AC340E9;
 Thu, 17 Mar 2022 01:38:54 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 02d83079-a593-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647481134;
	bh=H0F6Wz1va9oERxHgLC57PfEnviO0kHl6ZVBPWhaWBCY=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=RdnPTiBpzZPFxysKrWBg6u8SdbmIxKuN+N2/YLmsEBBYNZ2Xil7u9UXrXf4HLtFaK
	 sCSkXpY9gUqBEipitkOw7C+C4pPyQLP1MwvhQKq835W0rHCaaueBUqzVuhKzILknfS
	 ZGqRx/Ut0xAPOnFh3/5SeemdaBOxadRuY46c5Yhpz5/2ahvKYck8i3HMtzQa7RB9ps
	 U5S6A5TwZZGtw//6qG6GH/clpK+Va+HqBD4uDatsd8M2S0e+1I5YCzGDaq9teEXpv6
	 /acPtFLd6321MAPq4Dvy+4X48X2T1Namt1/i55TSTBWRMl2mtfBXz4OnwU0VhMmf2I
	 qJlqE4CwjgpUA==
Date: Wed, 16 Mar 2022 18:38:53 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Julien Grall <julien@xen.org>
cc: Stefano Stabellini <sstabellini@kernel.org>, cardoe@cardoe.com, wl@xen.org, 
    andrew.cooper3@citrix.com, xen-devel@lists.xenproject.org, 
    Stefano Stabellini <stefano.stabellini@xilinx.com>, 
    anthony.perard@citrix.com, bertrand.marquis@arm.com
Subject: Re: [PATCH RESEND 2/2] gitlab-ci: add an ARM32 qemu-based smoke
 test
In-Reply-To: <2aaddfc5-0502-fd0a-6393-63a17c7f6778@xen.org>
Message-ID: <alpine.DEB.2.22.394.2203161508200.3497@ubuntu-linux-20-04-desktop>
References: <20210714004854.31135-2-sstabellini@kernel.org> <2aaddfc5-0502-fd0a-6393-63a17c7f6778@xen.org>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

+Anthony, Bertrand


Apologies, this feel through the cracks!

Also considering the recent arm32 xen breakage, which could have been
caught by gitlab-ci before commit, I am keen on getting this short
series in.  Better late than never :-)

I forward-ported the series to staging with minimal changes and it still
works! I'll send out an update shortly to xen-devel. I am also replying
here because there is an interesting open question about Debian Jessie
below.

One note: in case you didn't notice, we already have a couple of arm64
and one x86 test in gitlab-ci using QEMU and they all follow the same
pattern, with similar scripts to the one added here, see for instance
automation/scripts/qemu-smoke-arm64.sh.


On Wed, 21 Jul 2021, Julien Grall wrote:
> Hi Stefano,
> 
> On 14/07/2021 01:48, Stefano Stabellini wrote:
> > Add a minimal ARM32 smoke test based on qemu-system-arm, as provided by
> > the test-artifacts qemu container. The minimal test simply boots Xen
> > (built from previous build stages) and Dom0. The test is fetching the
> > Dom0 kernel and initrd from Debian Jessie: they work just fine and this
> > way we don't have to maintain a build for them too.
> 
> Debian Jessie is not in LTS anymore. I am entirely sure how long this will
> still be available (older release seems to have disappeared). I would suggest
> to use Bullseye or at least Buster.

This is a good point and unfortunately I don't have a good answer. I
tried to use Bullseye and Buster kernels but neither of them work. I
don't know why. I tried to use a couple of kernels from Alpine Linux,
but they also don't work.

Curious I started bisecting kernels using "make multi_v7_defconfig +
CONFIG_XEN" and discovered that something broke with the 4.9 release.
Up until 4.8 they work fine in the default config. I have not
investigated further yet.

We still have a few months of support in Debian Jessie. My suggestion is
to go with Debian Jessie for now in this series. Then depending on the
result of the kernel investigation we can decide what to do.

I could also move the fetching of the kernel and initrd from
qemu-smoke-arm32.sh to the containiner build so that if Debian Jessie
goes offline it wouldn't affect us immediately. Not required as of now,
but could be good to do.

 
> > Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
> > ---
> >   automation/gitlab-ci/test.yaml         | 23 ++++++++
> >   automation/scripts/qemu-smoke-arm32.sh | 72 ++++++++++++++++++++++++++
> >   2 files changed, 95 insertions(+)
> >   create mode 100755 automation/scripts/qemu-smoke-arm32.sh
> > 
> > diff --git a/automation/gitlab-ci/test.yaml b/automation/gitlab-ci/test.yaml
> > index d3b670b156..7f942dd64b 100644
> > --- a/automation/gitlab-ci/test.yaml
> > +++ b/automation/gitlab-ci/test.yaml
> > @@ -71,6 +71,29 @@ qemu-smoke-arm64-gcc:
> >       - /^coverity-tested\/.*/
> >       - /^stable-.*/
> >   +qemu-smoke-arm32-gcc:
> > +  stage: test
> > +  image: registry.gitlab.com/xen-project/xen/${CONTAINER}
> > +  variables:
> > +    CONTAINER: debian:unstable-arm64v8
> > +  script:
> > +    - ./automation/scripts/qemu-smoke-arm32.sh 2>&1 | tee
> > qemu-smoke-arm32.log
> > +  dependencies:
> > +    - debian-unstable-gcc-arm32
> > +    - qemu-system-aarch64-6.0.0-arm32-export
> > +  artifacts:
> > +    paths:
> > +      - smoke.serial
> > +      - '*.log'
> > +    when: always
> > +  tags:
> > +    - arm64
> > +  except:
> > +    - master
> > +    - smoke
> > +    - /^coverity-tested\/.*/
> > +    - /^stable-.*/
> > +
> >   qemu-smoke-x86-64-gcc:
> >     stage: test
> >     image: registry.gitlab.com/xen-project/xen/${CONTAINER}
> > diff --git a/automation/scripts/qemu-smoke-arm32.sh
> > b/automation/scripts/qemu-smoke-arm32.sh
> > new file mode 100755
> > index 0000000000..4126be2042
> > --- /dev/null
> > +++ b/automation/scripts/qemu-smoke-arm32.sh
> > @@ -0,0 +1,72 @@
> > +#!/bin/bash
> > +
> > +set -ex
> > +
> > +# Install QEMU
> 
> The bits below doesn't seem to install QEMU. Do you mean "prepare the image"?

I updated the comment


> > +export DEBIAN_FRONTENT=noninteractive
> > +apt-get -qy update
> > +apt-get -qy install --no-install-recommends device-tree-compiler \
> > +                                            curl
> > +
> > +cd binaries
> > +curl -fsSLO
> > http://http.us.debian.org/debian/dists/jessie/main/installer-armhf/current/images/netboot/vmlinuz
> > +curl -fsSLO
> > http://http.us.debian.org/debian/dists/jessie/main/installer-armhf/current/images/netboot/initrd.gz
> 
> OOI, does this mean all our instances are running in the US?

Yes. However, I wanted to replace this link with one of those links that
serves you the best mirror available at the moment. But I couldn't find
any. So I left it as is.

 
> > +
> > +kernel=`stat -L --printf="%s" vmlinuz`
> > +initrd=`stat -L --printf="%s" initrd.gz`
> > +
> 
> NIT: I would suggest to add a comment similar to:
> 
> # For Xen, we need a couple of more node. Dump the DT from QEMU and add them

I updated the comment


> > +# XXX QEMU looks for "efi-virtio.rom" even if it is unneeded
> 
> Is this a problem with the package?

Yes it is a problem with both QEMU (which shouldn't be looking for
efi-virtio.rom when calling dumpdtb) and also the package (that doesn't
provide it).

We have the same workaround in all the qemu scripts under automation.


> > +curl -fsSLO https://github.com/qemu/qemu/raw/v5.2.0/pc-bios/efi-virtio.rom
> > +./qemu-system-arm \
> > +   -machine virt-6.0 \
> > +   -machine virtualization=true \
> > +   -smp 4 \
> > +   -m 2048 \
> > +   -serial stdio \
> > +   -monitor none \
> > +   -display none \
> > +   -machine dumpdtb=virt.dtb
> > +
> > +dtc -I dtb -O dts virt.dtb > virt.dts
> 
> IIRC, Alex was working on add multiboot support in QEMU. Do you know what's
> the state?

I don't know the latest


> > +
> > +cat >> virt.dts << EOF
> > +/ {
> > +	chosen {
> > +		#address-cells = <0x2>;
> > +		#size-cells = <0x2>;
> > +		stdout-path = "/pl011@9000000";
> > +        xen,xen-bootargs = "console=dtuart dtuart=/pl011@9000000
> > dom0_mem=1G dom0_max_vcpus=1 bootscrub=0";
> 
> Given that QEMU will expose 4 CPUs, any reason to limit dom0 to 1?

Good idea, I did that


> > +		xen,dom0-bootargs = "console=tty0 console=hvc0 earlyprintk
> > clk_ignore_unused root=/dev/ram0 rdinit=/bin/sh init=/bin/sh";
> > +		dom0 {
> > +			compatible = "xen,linux-zimage",
> > "xen,multiboot-module";
> > +			reg = <0x0 0x1000000 0x0 $kernel>;
> > +		};
> > +        dom0-ramdisk {
> > +			compatible = "xen,linux-initrd",
> > "xen,multiboot-module";
> > +			reg = <0x0 0x3200000 0x0 $initrd>;
> > +		};
> > +	};
> > +};
> > +EOF
> > +dtc -I dts -O dtb virt.dts > virt.dtb
> > +
> > +rm -f smoke.serial
> > +set +e
> > +timeout -k 1 240 \
> > +./qemu-system-arm \
> > +   -machine virt-6.0 \
> > +   -machine virtualization=true \
> > +   -smp 4 \
> > +   -m 2048 \
> 
> Given seem to be a bit wasteful (and will definitely slow down Xen boot). As
> this is a smoke, can we consider to drop to 512?

Yes, also good idea. I dropped dom0_mem to 512 and here -m 1024. Less
than that, it leads to a boot error (I haven't investigated).


> > +   -serial stdio \
> > +   -monitor none \
> > +   -display none \
> > +   -dtb virt.dtb \
> > +   -no-reboot \
> > +   -kernel ./xen \
> > +   -device loader,file=./vmlinuz,addr=0x1000000 \
> > +   -device loader,file=./initrd.gz,addr=0x3200000 |& tee smoke.serial
> > +
> > +set -e
> > +(grep -q "^BusyBox" smoke.serial) || exit 1
> 
> So this look for "BusyBox" anywhere in the log. What if there is a crash just
> after "BusyBox"? Is there something different we can grep?

I am not sure, there isn't much after "BusyBox" because the initrd is
basically empty (appended below the last few lines for your reference).
Also keeping in mind that all the QEMU tests today check for "BusyBox",
I would leave it as is.

---
BusyBox v1.22.1 (Debian 1:1.22.0-9+deb8u1) built-in shell (ash)
Enter 'help' for a list of built-in commands.
/bin/sh: can't access tty; job control turned off
~ #


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 01:46:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 01:46:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291307.494356 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUfE1-00038L-5C; Thu, 17 Mar 2022 01:46:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291307.494356; Thu, 17 Mar 2022 01:46:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUfE1-00038E-2D; Thu, 17 Mar 2022 01:46:49 +0000
Received: by outflank-mailman (input) for mailman id 291307;
 Thu, 17 Mar 2022 01:46:47 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=MbXJ=T4=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nUfDz-000388-JV
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 01:46:47 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 1ad1d5db-a594-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 02:46:46 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 15347B81C9C;
 Thu, 17 Mar 2022 01:46:46 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 53FFBC340E9;
 Thu, 17 Mar 2022 01:46:44 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1ad1d5db-a594-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647481604;
	bh=57r/Ka2G2mfrlgt9RSWL2njmSxj73wQzOI4QDL2HYgE=;
	h=Date:From:To:cc:Subject:From;
	b=TS1GWOjYHePqTe/Uwy0Q6TBxPaJnRurtH7jthOtfoHtB3O0JPREOfGYvNh/KIUSes
	 XbM0qlNU2gzHxDAvGEpXmhcSgt8Tals9ZnlqMRaFaaTRsd0miHKOboYg9CPhcgWno1
	 vev13dce9wkxBX6J/2eojF5Gd7UH45zvFoOEo9ricygGFYThId7+2mhJ4KqwMmth4L
	 akXKgFhbAs7zfdfWjxAYpLVX/MLYjGoOicYNeX5dhRz8tWvm0Tso+W/lF0FFeVRsNs
	 J0380OvTeQRlqJUgY7Ux8HLJrBIDd2ZZIJv64gCS9qzpOog5ncuC8qrpZWF/IlpdHp
	 v/ir3LKCxbkcg==
Date: Wed, 16 Mar 2022 18:46:43 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: xen-devel@lists.xenproject.org
cc: sstabellini@kernel.org, cardoe@cardoe.com, wl@xen.org, 
    andrew.cooper3@citrix.com, anthony.perard@citrix.com, 
    bertrand.marquis@arm.com
Subject: [PATCH v2 0/2] automation: qemu32 smoke test
Message-ID: <alpine.DEB.2.22.394.2203161843230.3497@ubuntu-linux-20-04-desktop>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

Hi all,

This small series adds a simple Xen + Dom0 boot arm32 test to gitlab-ci
using QEMU, similar to the existing tests for arm64 and x86.

Cheers,

Stefano

Stefano Stabellini (2):
      gitlab-ci: add qemu-system-arm to the existing tests-artifacts container
      gitlab-ci: add an ARM32 qemu-based smoke test

 automation/gitlab-ci/build.yaml                    | 14 ++++-
 automation/gitlab-ci/test.yaml                     | 27 +++++++-
 automation/scripts/qemu-smoke-arm32.sh             | 72 ++++++++++++++++++++++
 ...arm64v8.dockerfile => 6.0.0-arm64v8.dockerfile} |  5 +-
 4 files changed, 112 insertions(+), 6 deletions(-)
 create mode 100755 automation/scripts/qemu-smoke-arm32.sh
 rename automation/tests-artifacts/qemu-system-aarch64/{5.2.0-arm64v8.dockerfile => 6.0.0-arm64v8.dockerfile} (95%)


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 01:47:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 01:47:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291308.494368 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUfEC-0003SC-Dj; Thu, 17 Mar 2022 01:47:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291308.494368; Thu, 17 Mar 2022 01:47:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUfEC-0003S3-Ab; Thu, 17 Mar 2022 01:47:00 +0000
Received: by outflank-mailman (input) for mailman id 291308;
 Thu, 17 Mar 2022 01:46:58 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=MbXJ=T4=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nUfEA-0003RA-Pq
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 01:46:58 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 21107169-a594-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 02:46:57 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id CB0ABB80E52;
 Thu, 17 Mar 2022 01:46:56 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 30B85C340E9;
 Thu, 17 Mar 2022 01:46:55 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 21107169-a594-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647481615;
	bh=YALhvSEx1aookkEzabIVxbZJIqKyYf9mFu7U9r5ckv8=;
	h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
	b=PtHNwJ/v3IVe/bImjbIyJIc1nm1wldSpbuTBlcHoTc2A2PDNTX5qMydAKsySXUTCJ
	 qQq+u1Hgv9anx0E9nd4I/O7/mxpv5jPXeKxa9Rhx6W9flzRhErlhM9Hs9Zp//EG0L2
	 Urbg5JOZyvT/p6TPAKhddTGQzYpAT2dtxJbvPGHWBAA4mJvKIRyYKvnWbXKbKqePcb
	 /7boD7yJSn/7nOW7sSfTcNFhZf8ic75D8GxzkzfRlV+NkBLwQHEpQwKHY5JvNWuGtg
	 7gPkZVWuCAeNkDsQ2Cxc62/eSoSTeHIiyz0UjPsqo1GLPSMfrSd806+bex/OJCISl+
	 PBXCiKgLQ6pKw==
From: Stefano Stabellini <sstabellini@kernel.org>
To: xen-devel@lists.xenproject.org
Cc: sstabellini@kernel.org,
	cardoe@cardoe.com,
	wl@xen.org,
	andrew.cooper3@citrix.com,
	anthony.perard@citrix.com,
	bertrand.marquis@arm.com,
	Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: [PATCH v2 1/2] gitlab-ci: add qemu-system-arm to the existing tests-artifacts container
Date: Wed, 16 Mar 2022 18:46:52 -0700
Message-Id: <20220317014653.2427386-1-sstabellini@kernel.org>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <alpine.DEB.2.22.394.2203161843230.3497@ubuntu-linux-20-04-desktop>
References: <alpine.DEB.2.22.394.2203161843230.3497@ubuntu-linux-20-04-desktop>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Stefano Stabellini <stefano.stabellini@xilinx.com>

Add qemu-system-arm to the existing test-artifacts qemu container (which
doesn't get build for every iteration but only updated once in a while.)

With qemu-system-arm available, we'll be able to run ARM32 tests.

This patch also bumps the QEMU version to v6.0.0 for both arm32 and
arm64 (the test-artifacts container is one, shared for both).

Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
---
 automation/gitlab-ci/build.yaml                    | 14 ++++++++++++--
 automation/gitlab-ci/test.yaml                     |  4 ++--
 ...arm64v8.dockerfile => 6.0.0-arm64v8.dockerfile} |  5 +++--
 3 files changed, 17 insertions(+), 6 deletions(-)
 rename automation/tests-artifacts/qemu-system-aarch64/{5.2.0-arm64v8.dockerfile => 6.0.0-arm64v8.dockerfile} (95%)

diff --git a/automation/gitlab-ci/build.yaml b/automation/gitlab-ci/build.yaml
index cc36428cf5..72f2a317ac 100644
--- a/automation/gitlab-ci/build.yaml
+++ b/automation/gitlab-ci/build.yaml
@@ -591,9 +591,9 @@ kernel-5.9.9-arm64-export:
   tags:
     - arm64
 
-qemu-system-aarch64-5.2.0-arm64-export:
+qemu-system-aarch64-6.0.0-arm64-export:
   stage: build
-  image: registry.gitlab.com/xen-project/xen/tests-artifacts/qemu-system-aarch64:5.2.0-arm64v8
+  image: registry.gitlab.com/xen-project/xen/tests-artifacts/qemu-system-aarch64:6.0.0-arm64v8
   script:
     - mkdir binaries && cp /qemu-system-aarch64 binaries/qemu-system-aarch64
   artifacts:
@@ -602,6 +602,16 @@ qemu-system-aarch64-5.2.0-arm64-export:
   tags:
     - arm64
 
+qemu-system-aarch64-6.0.0-arm32-export:
+  stage: build
+  image: registry.gitlab.com/xen-project/xen/tests-artifacts/qemu-system-aarch64:6.0.0-arm64v8
+  script:
+    - mkdir binaries && cp /qemu-system-arm binaries/qemu-system-arm
+  artifacts:
+    paths:
+      - binaries/qemu-system-arm
+  tags:
+    - arm64
 
 # x86_64 test artifacts
 
diff --git a/automation/gitlab-ci/test.yaml b/automation/gitlab-ci/test.yaml
index 47e8704df3..ec2a2e1607 100644
--- a/automation/gitlab-ci/test.yaml
+++ b/automation/gitlab-ci/test.yaml
@@ -33,7 +33,7 @@ qemu-alpine-arm64-gcc:
     - alpine-3.12-gcc-arm64
     - alpine-3.12-arm64-rootfs-export
     - kernel-5.9.9-arm64-export
-    - qemu-system-aarch64-5.2.0-arm64-export
+    - qemu-system-aarch64-6.0.0-arm64-export
   artifacts:
     paths:
       - smoke.serial
@@ -81,7 +81,7 @@ qemu-smoke-arm64-gcc:
   dependencies:
     - debian-unstable-gcc-arm64
     - kernel-5.9.9-arm64-export
-    - qemu-system-aarch64-5.2.0-arm64-export
+    - qemu-system-aarch64-6.0.0-arm64-export
   artifacts:
     paths:
       - smoke.serial
diff --git a/automation/tests-artifacts/qemu-system-aarch64/5.2.0-arm64v8.dockerfile b/automation/tests-artifacts/qemu-system-aarch64/6.0.0-arm64v8.dockerfile
similarity index 95%
rename from automation/tests-artifacts/qemu-system-aarch64/5.2.0-arm64v8.dockerfile
rename to automation/tests-artifacts/qemu-system-aarch64/6.0.0-arm64v8.dockerfile
index e105a1c636..793432d40b 100644
--- a/automation/tests-artifacts/qemu-system-aarch64/5.2.0-arm64v8.dockerfile
+++ b/automation/tests-artifacts/qemu-system-aarch64/6.0.0-arm64v8.dockerfile
@@ -3,7 +3,7 @@ LABEL maintainer.name="The Xen Project" \
       maintainer.email="xen-devel@lists.xenproject.org"
 
 ENV DEBIAN_FRONTEND=noninteractive
-ENV QEMU_VERSION=5.2.0
+ENV QEMU_VERSION=6.0.0
 ENV USER root
 
 RUN mkdir /build
@@ -25,7 +25,7 @@ RUN apt-get update && \
     tar xvJf qemu-"$QEMU_VERSION".tar.xz && \
     cd qemu-"$QEMU_VERSION" && \
     ./configure                \
-        --target-list=aarch64-softmmu \
+        --target-list=arm-softmmu,aarch64-softmmu \
         --enable-system        \
         --disable-blobs        \
         --disable-bsd-user     \
@@ -68,6 +68,7 @@ RUN apt-get update && \
     && \
     make -j$(nproc) && \
     cp ./build/qemu-system-aarch64 / && \
+    cp ./build/qemu-system-arm / && \
     cd /build && \
     rm -rf qemu-"$QEMU_VERSION"* && \
     apt-get autoremove -y && \
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 01:47:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 01:47:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291309.494379 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUfED-0003ij-Lu; Thu, 17 Mar 2022 01:47:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291309.494379; Thu, 17 Mar 2022 01:47:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUfED-0003iM-Hd; Thu, 17 Mar 2022 01:47:01 +0000
Received: by outflank-mailman (input) for mailman id 291309;
 Thu, 17 Mar 2022 01:46:59 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=MbXJ=T4=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nUfEB-0003RA-Hx
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 01:46:59 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 21275354-a594-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 02:46:58 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id A697860B38;
 Thu, 17 Mar 2022 01:46:56 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id BCE81C36AE2;
 Thu, 17 Mar 2022 01:46:55 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 21275354-a594-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647481616;
	bh=G1Wy2NSZrz87jgZI1YnX2YFk559ZAdmMFvJt2aVzrpU=;
	h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
	b=cfs9H/ois/FiUrsGhlwCj4/Ks1XAgseJTEvANktBADmp6zUgqDn8T5Fo3c8psxmel
	 7yXAWtc6IY5hkDZDMhUy2GBEvOK6GwG8izMwVx54dPA/R4h9KUEksJd3gklJ4jic4X
	 NPoad+oRnDDPb0wUc9tGS99b+crXAiwfXJ6k2lx/l6h3L2at3SiWtvKAEU7HSyo+J+
	 pRjPlaq05VRg8/u4Izxp0JOZaqmEYlr/tiVA0TwoY78qLzsOJtRUk0MurwyryqbPyE
	 NuVZtvyCM7TXm921fB2y+cVE6D3NGro+2AsU3HzslCli9gbofkJhWw9xDOU5GL+4W8
	 vAAjBTglC39Ig==
From: Stefano Stabellini <sstabellini@kernel.org>
To: xen-devel@lists.xenproject.org
Cc: sstabellini@kernel.org,
	cardoe@cardoe.com,
	wl@xen.org,
	andrew.cooper3@citrix.com,
	anthony.perard@citrix.com,
	bertrand.marquis@arm.com,
	Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: [PATCH v2 2/2] gitlab-ci: add an ARM32 qemu-based smoke test
Date: Wed, 16 Mar 2022 18:46:53 -0700
Message-Id: <20220317014653.2427386-2-sstabellini@kernel.org>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <alpine.DEB.2.22.394.2203161843230.3497@ubuntu-linux-20-04-desktop>
References: <alpine.DEB.2.22.394.2203161843230.3497@ubuntu-linux-20-04-desktop>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Add a minimal ARM32 smoke test based on qemu-system-arm, as provided by
the test-artifacts qemu container. The minimal test simply boots Xen
(built from previous build stages) and Dom0. The test is fetching the
Dom0 kernel and initrd from Debian Jessie: they work just fine and this
way we don't have to maintain a build for them too.

Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>

---
Changes in v2:
- improve comments
- don't limit dom0 cpus
- decrease mem to 1024M and dom0_mem=512M
- use Debian Bullseye instead of Jessie
---
 automation/gitlab-ci/test.yaml         | 23 ++++++++
 automation/scripts/qemu-smoke-arm32.sh | 72 ++++++++++++++++++++++++++
 2 files changed, 95 insertions(+)
 create mode 100755 automation/scripts/qemu-smoke-arm32.sh

diff --git a/automation/gitlab-ci/test.yaml b/automation/gitlab-ci/test.yaml
index ec2a2e1607..42cd725a12 100644
--- a/automation/gitlab-ci/test.yaml
+++ b/automation/gitlab-ci/test.yaml
@@ -95,6 +95,29 @@ qemu-smoke-arm64-gcc:
     - /^coverity-tested\/.*/
     - /^stable-.*/
 
+qemu-smoke-arm32-gcc:
+  stage: test
+  image: registry.gitlab.com/xen-project/xen/${CONTAINER}
+  variables:
+    CONTAINER: debian:unstable-arm64v8
+  script:
+    - ./automation/scripts/qemu-smoke-arm32.sh 2>&1 | tee qemu-smoke-arm32.log
+  dependencies:
+    - debian-unstable-gcc-arm32
+    - qemu-system-aarch64-6.0.0-arm32-export
+  artifacts:
+    paths:
+      - smoke.serial
+      - '*.log'
+    when: always
+  tags:
+    - arm64
+  except:
+    - master
+    - smoke
+    - /^coverity-tested\/.*/
+    - /^stable-.*/
+
 qemu-smoke-x86-64-gcc:
   stage: test
   image: registry.gitlab.com/xen-project/xen/${CONTAINER}
diff --git a/automation/scripts/qemu-smoke-arm32.sh b/automation/scripts/qemu-smoke-arm32.sh
new file mode 100755
index 0000000000..11883bed3c
--- /dev/null
+++ b/automation/scripts/qemu-smoke-arm32.sh
@@ -0,0 +1,72 @@
+#!/bin/bash
+
+set -ex
+
+export DEBIAN_FRONTENT=noninteractive
+apt-get -qy update
+apt-get -qy install --no-install-recommends device-tree-compiler \
+                                            curl
+
+cd binaries
+curl -fsSLO http://http.us.debian.org/debian/dists/jessie/main/installer-armhf/current/images/netboot/vmlinuz
+curl -fsSLO http://http.us.debian.org/debian/dists/jessie/main/installer-armhf/current/images/netboot/initrd.gz
+
+kernel=`stat -L --printf="%s" vmlinuz`
+initrd=`stat -L --printf="%s" initrd.gz`
+
+# For Xen, we need a couple of more node. Dump the DT from QEMU and add them
+# XXX QEMU looks for "efi-virtio.rom" even if it is unneeded
+curl -fsSLO https://github.com/qemu/qemu/raw/v5.2.0/pc-bios/efi-virtio.rom
+./qemu-system-arm \
+   -machine virt-6.0 \
+   -machine virtualization=true \
+   -smp 4 \
+   -m 1024 \
+   -serial stdio \
+   -monitor none \
+   -display none \
+   -machine dumpdtb=virt.dtb
+
+dtc -I dtb -O dts virt.dtb > virt.dts
+
+cat >> virt.dts << EOF
+/ {
+	chosen {
+		#address-cells = <0x2>;
+		#size-cells = <0x2>;
+		stdout-path = "/pl011@9000000";
+        xen,xen-bootargs = "console=dtuart dtuart=/pl011@9000000 dom0_mem=512M bootscrub=0";
+		xen,dom0-bootargs = "console=tty0 console=hvc0 earlyprintk clk_ignore_unused root=/dev/ram0 rdinit=/bin/sh init=/bin/sh";
+		dom0 {
+			compatible = "xen,linux-zimage", "xen,multiboot-module";
+			reg = <0x0 0x1000000 0x0 $kernel>;
+		};
+        dom0-ramdisk {
+			compatible = "xen,linux-initrd", "xen,multiboot-module";
+			reg = <0x0 0x3200000 0x0 $initrd>;
+		};
+	};
+};
+EOF
+dtc -I dts -O dtb virt.dts > virt.dtb
+
+rm -f smoke.serial
+set +e
+timeout -k 1 240 \
+./qemu-system-arm \
+   -machine virt-6.0 \
+   -machine virtualization=true \
+   -smp 4 \
+   -m 1024 \
+   -serial stdio \
+   -monitor none \
+   -display none \
+   -dtb virt.dtb \
+   -no-reboot \
+   -kernel ./xen \
+   -device loader,file=./vmlinuz,addr=0x1000000 \
+   -device loader,file=./initrd.gz,addr=0x3200000 |& tee smoke.serial
+
+set -e
+(grep -q "^BusyBox" smoke.serial) || exit 1
+exit 0
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 01:59:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 01:59:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291316.494389 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUfQF-0005oy-If; Thu, 17 Mar 2022 01:59:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291316.494389; Thu, 17 Mar 2022 01:59:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUfQF-0005or-Ew; Thu, 17 Mar 2022 01:59:27 +0000
Received: by outflank-mailman (input) for mailman id 291316;
 Thu, 17 Mar 2022 01:59:25 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUfQD-0005oh-U5; Thu, 17 Mar 2022 01:59:25 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUfQD-0006EC-QK; Thu, 17 Mar 2022 01:59:25 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUfQD-00018O-6k; Thu, 17 Mar 2022 01:59:25 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUfQD-0002o0-6I; Thu, 17 Mar 2022 01:59:25 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=2VmNmmD75ncZlRV2cHfK2tnq3HCSpVJt36qvqU2+grI=; b=uP+pbqnY5UPJdDNkKK7Nem/f6n
	dmcgzC+mgm4dHnPS79YzUyql+Hm2rGIpK+4AJQOuXX43E60Fs8nnAng/CBNvLyJmcmYU0Xruz/Od3
	zeL/UCMJAuDGaLaIw3pQOQ8NA+CEIoEWstfj2KoI63Tw8VHDVzTD61dxKoAmJ9uvP4ec=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168636-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-5.4 test] 168636: regressions - FAIL
X-Osstest-Failures:
    linux-5.4:test-amd64-amd64-dom0pvh-xl-intel:guest-localmigrate:fail:regression
    linux-5.4:test-amd64-i386-xl-qemut-debianhvm-i386-xsm:debian-hvm-install:fail:heisenbug
    linux-5.4:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=70f77a2cb5281ad0b08a0bbdeeba885984c399dd
X-Osstest-Versions-That:
    linux=1346e17653a52c2042a486c7726f92e81481c8ec
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 17 Mar 2022 01:59:25 +0000

flight 168636 linux-5.4 real [real]
flight 168641 linux-5.4 real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168636/
http://logs.test-lab.xenproject.org/osstest/logs/168641/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-dom0pvh-xl-intel 18 guest-localmigrate  fail REGR. vs. 168515

Tests which are failing intermittently (not blocking):
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm 12 debian-hvm-install fail pass in 168641-retest

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168515
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168515
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168515
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168515
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168515
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168515
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168515
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168515
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168515
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168515
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168515
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168515
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                70f77a2cb5281ad0b08a0bbdeeba885984c399dd
baseline version:
 linux                1346e17653a52c2042a486c7726f92e81481c8ec

Last test of basis   168515  2022-03-11 10:43:35 Z    5 days
Testing same since   168636  2022-03-16 12:41:53 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Alexei Starovoitov <ast@kernel.org>
  Andrew Morton <akpm@linux-foundation.org>
  Aneesh Kumar K.V <aneesh.kumar@linux.ibm.com>
  Arnd Bergmann <arnd@arndb.de>
  Bartosz Golaszewski <brgl@bgdev.pl>
  Borislav Petkov <bp@suse.de>
  Claudiu Beznea <claudiu.beznea@microchip.com>
  Clément Léger <clement.leger@bootlin.com>
  Dan Carpenter <dan.carpenter@oracle.com>
  David S. Miller <davem@davemloft.net>
  Duoming Zhou <duoming@zju.edu.cn>
  Emil Renner Berthing <kernel@esmil.dk>
  Eric Dumazet <edumazet@google.com>
  Florian Fainelli <f.fainelli@gmail.com>
  Greg Kroah-Hartman <gregkh@linuxfoundation.org>
  Gregory CLEMENT <gregory.clement@bootlin.com>
  Guenter Roeck <linux@roeck-us.net>
  Guillaume Nault <gnault@redhat.com>
  Hulk Robot <hulkrobot@huawei.com>
  Jakub Kicinski <kuba@kernel.org>
  Jason Wang <jasowang@redhat.com>
  Jeremy Linton <jeremy.linton@arm.com>
  Jernej Skrabec <jernej.skrabec@gmail.com>
  Jia-Ju Bai <baijiaju1990@gmail.com>
  Jiasheng Jiang <jiasheng@iscas.ac.cn>
  Joel Stanley <joel@jms.id.au>
  Jon Hunter <jonathanh@nvidia.com>
  Josh Triplett <josh@joshtriplett.org>
  Kris Bahnsen <kris@embeddedTS.com>
  Krish Sadhukhan <krish.sadhukhan@oracle.com>
  Kumar Kartikeya Dwivedi <memxor@gmail.com>
  Liam Merwick <liam.merwick@oracle.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Linux Kernel Functional Testing <lkft@linaro.org>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Mark Featherston <mark@embeddedTS.com>
  Maxime Ripard <maxime@cerno.tech>
  Miaoqian Lin <linmq006@gmail.com>
  Michael S. Tsirkin <mst@redhat.com>
  Mike Kravetz <mike.kravetz@oracle.com>
  Miklos Szeredi <mszeredi@redhat.com>
  Mohammad Kabat <mohammadkab@nvidia.com>
  Moshe Shemesh <moshe@nvidia.com>
  Nathan Chancellor <nathan@kernel.org>
  Niels Dossche <dossche.niels@gmail.com>
  Niels Dossche <niels.dossche@ugent.be>
  Pali Rohár <pali@kernel.org>
  Palmer Dabbelt <palmer@rivosinc.com>
  Paolo Bonzini <pbonzini@redhat.com>
  Pavel Skripkin <paskripkin@gmail.com>
  Peter Robinson <pbrobinson@gmail.com>
  Randy Dunlap <rdunlap@infradead.org>
  Robert Hancock <robert.hancock@calian.com>
  Rong Chen <rong.chen@amlogic.com>
  Russell King (Oracle) <rmk+kernel@armlinux.org.uk>
  Saeed Mahameed <saeedm@nvidia.com>
  Sasha Levin <sashal@kernel.org>
  Scott McNutt <scott.mcnutt@siriusxm.com>
  Stephen Boyd <sboyd@kernel.org>
  Steven Rostedt (Google) <rostedt@goodmis.org>
  Sudip Mukherjee <sudip.mukherjee@codethink.co.uk>
  suresh kumar <suresh2514@gmail.com>
  Sven Schnelle <svens@linux.ibm.com>
  Taniya Das <tdas@codeaurora.org>
  Theodore Ts'o <tytso@mit.edu>
  Tom Rix <trix@redhat.com>
  Ulf Hansson <ulf.hansson@linaro.org>
  Xie Yongji <xieyongji@bytedance.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  fail    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            fail    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 1327 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 02:52:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 02:52:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291334.494404 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUgF7-0003hK-D2; Thu, 17 Mar 2022 02:52:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291334.494404; Thu, 17 Mar 2022 02:52:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUgF7-0003hC-9h; Thu, 17 Mar 2022 02:52:01 +0000
Received: by outflank-mailman (input) for mailman id 291334;
 Thu, 17 Mar 2022 02:52:01 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUgF6-0003h0-VW; Thu, 17 Mar 2022 02:52:00 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUgF6-0007bB-Tf; Thu, 17 Mar 2022 02:52:00 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUgF6-0003AZ-NN; Thu, 17 Mar 2022 02:52:00 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUgF6-0006pC-Mt; Thu, 17 Mar 2022 02:52:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=tBAv+TZLXDrh/MSi7J8OzvHQ98WLfmgKB5kSG0BJZwc=; b=j50t2NQ1y9SSjD2+rCVsjub3ze
	yhKnXhn+ZPy7PMAmwqhc5Chtn5suSQjEjIPsCnf+fLfnQV/HEQVhASzuuJWrksPuAbiZeDlEI7HoP
	MPf9RakndcJbG99QF+NNE4bdSeCK5Z8/ojs8sMBYpV5Ha+rDOI/fGyUX2k9YlVEq6jj0=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168640-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168640: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=5b56c52b5c1cc817a1ddac7f03aa6a02aeab4c04
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 17 Mar 2022 02:52:00 +0000

flight 168640 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168640/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 5b56c52b5c1cc817a1ddac7f03aa6a02aeab4c04
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   16 days
Failing since        168258  2022-03-01 01:55:31 Z   16 days  153 attempts
Testing same since   168637  2022-03-16 13:10:25 Z    0 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 714 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 03:43:44 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 03:43:44 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291344.494421 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUh32-0000Ny-EQ; Thu, 17 Mar 2022 03:43:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291344.494421; Thu, 17 Mar 2022 03:43:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUh32-0000Nr-Ah; Thu, 17 Mar 2022 03:43:36 +0000
Received: by outflank-mailman (input) for mailman id 291344;
 Thu, 17 Mar 2022 03:43:35 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUh31-0000Nh-6O; Thu, 17 Mar 2022 03:43:35 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUh31-0008SX-21; Thu, 17 Mar 2022 03:43:35 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUh30-0004q2-Lq; Thu, 17 Mar 2022 03:43:34 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUh30-00066P-LM; Thu, 17 Mar 2022 03:43:34 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=So8RZBt5NW1+uZHl4oDW8ekTGowVo9MA/0M4gFZ7xQQ=; b=3XYQJtgtnQM+35VUcTUk390ai+
	a+hJiLraIaPt8+kxSeOxBQ1SXxBYyBTidg7sjQ7mijK4DfMw3BXJB08tvLUjBwWo6dXi75fT0X4ly
	9E19QWAXsHodwsDuPRk4FxGGf1qfDW3NZGKRLkmwn9vBgjF/5UkUIJmFL7SuQKJLlmvs=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168645-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168645: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=5b56c52b5c1cc817a1ddac7f03aa6a02aeab4c04
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 17 Mar 2022 03:43:34 +0000

flight 168645 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168645/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 5b56c52b5c1cc817a1ddac7f03aa6a02aeab4c04
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   16 days
Failing since        168258  2022-03-01 01:55:31 Z   16 days  154 attempts
Testing same since   168637  2022-03-16 13:10:25 Z    0 days    4 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 714 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 05:38:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 05:38:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291356.494438 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUiq6-00034b-V4; Thu, 17 Mar 2022 05:38:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291356.494438; Thu, 17 Mar 2022 05:38:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUiq6-00034U-S8; Thu, 17 Mar 2022 05:38:22 +0000
Received: by outflank-mailman (input) for mailman id 291356;
 Thu, 17 Mar 2022 05:38:21 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUiq5-00034K-8W; Thu, 17 Mar 2022 05:38:21 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUiq5-0002Q0-5b; Thu, 17 Mar 2022 05:38:21 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUiq4-0001va-OA; Thu, 17 Mar 2022 05:38:20 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUiq4-0006KX-Nf; Thu, 17 Mar 2022 05:38:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=XttoFOzQ9HMphhZ1o764cTVug64agrtkBdvfVNymD94=; b=UJcqzdnL4kClEsDvD3QyIwFofk
	ITTV85sqqw1KRQER+C5gaJUGsUXhsHo17HKi5hBEz3zWNbd3Noayb6H+uTFmm+JEwhplkWyp3qzjj
	BZKbsyChvLIC20ySSjaHh3ubL77zId2+QiDn9mV72dQPSrm24Yx2ttg7rkzBtnsnWEJs=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168648-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168648: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=5b56c52b5c1cc817a1ddac7f03aa6a02aeab4c04
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 17 Mar 2022 05:38:20 +0000

flight 168648 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168648/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 5b56c52b5c1cc817a1ddac7f03aa6a02aeab4c04
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   16 days
Failing since        168258  2022-03-01 01:55:31 Z   16 days  155 attempts
Testing same since   168637  2022-03-16 13:10:25 Z    0 days    5 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 714 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 05:40:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 05:40:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291354.494449 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUirv-0004OO-BU; Thu, 17 Mar 2022 05:40:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291354.494449; Thu, 17 Mar 2022 05:40:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUirv-0004OH-8Y; Thu, 17 Mar 2022 05:40:15 +0000
Received: by outflank-mailman (input) for mailman id 291354;
 Thu, 17 Mar 2022 05:17:30 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ek4T=T4=ispras.ru=pavel.dovgalyuk@srs-se1.protection.inumbo.net>)
 id 1nUiVu-0001GL-4z
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 05:17:30 +0000
Received: from mail.ispras.ru (mail.ispras.ru [83.149.199.84])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 89adf9db-a5b1-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 06:17:28 +0100 (CET)
Received: from [10.12.102.111] (unknown [85.142.117.226])
 by mail.ispras.ru (Postfix) with ESMTPSA id 5A3F1405A19B;
 Thu, 17 Mar 2022 05:01:08 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 89adf9db-a5b1-11ec-853c-5f4723681683
Message-ID: <0a1fbad0-0e4d-661d-c25a-7a7d70896eb2@ispras.ru>
Date: Thu, 17 Mar 2022 08:01:08 +0300
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [PATCH v2 3/3] Use g_new() & friends where that makes obvious
 sense
Content-Language: en-US
To: Markus Armbruster <armbru@redhat.com>, qemu-devel@nongnu.org
Cc: Paolo Bonzini <pbonzini@redhat.com>,
 Richard Henderson <richard.henderson@linaro.org>,
 Gerd Hoffmann <kraxel@redhat.com>,
 Christian Schoenebeck <qemu_oss@crudebyte.com>,
 "Gonglei (Arei)" <arei.gonglei@huawei.com>,
 =?UTF-8?Q?Marc-Andr=c3=a9_Lureau?= <marcandre.lureau@redhat.com>,
 "Michael S. Tsirkin" <mst@redhat.com>, Igor Mammedov <imammedo@redhat.com>,
 Ani Sinha <ani@anisinha.ca>, Laurent Vivier <lvivier@redhat.com>,
 Amit Shah <amit@kernel.org>, Peter Maydell <peter.maydell@linaro.org>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Anthony Perard <anthony.perard@citrix.com>, Paul Durrant <paul@xen.org>,
 =?UTF-8?Q?Herv=c3=a9_Poussineau?= <hpoussin@reactos.org>,
 Aleksandar Rikalo <aleksandar.rikalo@syrmia.com>,
 Corey Minyard <cminyard@mvista.com>, Patrick Venture <venture@google.com>,
 Eduardo Habkost <eduardo@habkost.net>,
 Marcel Apfelbaum <marcel.apfelbaum@gmail.com>, Peter Xu <peterx@redhat.com>,
 Jason Wang <jasowang@redhat.com>, =?UTF-8?Q?C=c3=a9dric_Le_Goater?=
 <clg@kaod.org>, Daniel Henrique Barboza <danielhb413@gmail.com>,
 David Gibson <david@gibson.dropbear.id.au>, Greg Kurz <groug@kaod.org>,
 =?UTF-8?Q?Philippe_Mathieu-Daud=c3=a9?= <f4bug@amsat.org>,
 Jean-Christophe Dubois <jcd@tribudubois.net>, Keith Busch
 <kbusch@kernel.org>, Klaus Jensen <its@irrelevant.dk>,
 Yuval Shaia <yuval.shaia.ml@gmail.com>,
 Yoshinori Sato <ysato@users.sourceforge.jp>,
 Magnus Damm <magnus.damm@gmail.com>, Fabien Chouteau <chouteau@adacore.com>,
 KONRAD Frederic <frederic.konrad@adacore.com>,
 Mark Cave-Ayland <mark.cave-ayland@ilande.co.uk>,
 Artyom Tarasenko <atar4qemu@gmail.com>,
 Alex Williamson <alex.williamson@redhat.com>,
 Eric Auger <eric.auger@redhat.com>, Max Filippov <jcmvbkbc@gmail.com>,
 Juan Quintela <quintela@redhat.com>,
 "Dr. David Alan Gilbert" <dgilbert@redhat.com>,
 Konstantin Kostiuk <kkostiuk@redhat.com>, Michael Roth
 <michael.roth@amd.com>, =?UTF-8?Q?Daniel_P=2e_Berrang=c3=a9?=
 <berrange@redhat.com>, Pavel Dovgalyuk <pavel.dovgaluk@ispras.ru>,
 =?UTF-8?Q?Alex_Benn=c3=a9e?= <alex.bennee@linaro.org>,
 David Hildenbrand <david@redhat.com>, Wenchao Wang <wenchao.wang@intel.com>,
 Kamil Rytarowski <kamil@netbsd.org>, Reinoud Zandijk <reinoud@netbsd.org>,
 Sunil Muthuswamy <sunilmut@microsoft.com>, Cornelia Huck
 <cohuck@redhat.com>, Thomas Huth <thuth@redhat.com>,
 Eric Blake <eblake@redhat.com>,
 Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>,
 John Snow <jsnow@redhat.com>, kvm@vger.kernel.org, qemu-arm@nongnu.org,
 xen-devel@lists.xenproject.org, qemu-ppc@nongnu.org, qemu-block@nongnu.org,
 haxm-team@intel.com, qemu-s390x@nongnu.org
References: <20220315144156.1595462-1-armbru@redhat.com>
 <20220315144156.1595462-4-armbru@redhat.com>
From: Pavel Dovgalyuk <pavel.dovgalyuk@ispras.ru>
In-Reply-To: <20220315144156.1595462-4-armbru@redhat.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

On 15.03.2022 17:41, Markus Armbruster wrote:
> g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
> for two reasons.  One, it catches multiplication overflowing size_t.
> Two, it returns T * rather than void *, which lets the compiler catch
> more type errors.
> 
> This commit only touches allocations with size arguments of the form
> sizeof(T).
> 
> Patch created mechanically with:
> 
>      $ spatch --in-place --sp-file scripts/coccinelle/use-g_new-etc.cocci \
> 	     --macro-file scripts/cocci-macro-file.h FILES...
> 
> Signed-off-by: Markus Armbruster <armbru@redhat.com>
> Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
> Reviewed-by: Cédric Le Goater <clg@kaod.org>
> Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
> Acked-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
> ---
>   replay/replay-char.c                     |  4 +--
>   replay/replay-events.c                   | 10 +++---
> 

Reviewed-by: Pavel Dovgalyuk <Pavel.Dovgalyuk@ispras.ru>

> diff --git a/replay/replay-char.c b/replay/replay-char.c
> index dc0002367e..d2025948cf 100644
> --- a/replay/replay-char.c
> +++ b/replay/replay-char.c
> @@ -50,7 +50,7 @@ void replay_register_char_driver(Chardev *chr)
>   
>   void replay_chr_be_write(Chardev *s, uint8_t *buf, int len)
>   {
> -    CharEvent *event = g_malloc0(sizeof(CharEvent));
> +    CharEvent *event = g_new0(CharEvent, 1);
>   
>       event->id = find_char_driver(s);
>       if (event->id < 0) {
> @@ -85,7 +85,7 @@ void replay_event_char_read_save(void *opaque)
>   
>   void *replay_event_char_read_load(void)
>   {
> -    CharEvent *event = g_malloc0(sizeof(CharEvent));
> +    CharEvent *event = g_new0(CharEvent, 1);
>   
>       event->id = replay_get_byte();
>       replay_get_array_alloc(&event->buf, &event->len);
> diff --git a/replay/replay-events.c b/replay/replay-events.c
> index 15983dd250..ac47c89834 100644
> --- a/replay/replay-events.c
> +++ b/replay/replay-events.c
> @@ -119,7 +119,7 @@ void replay_add_event(ReplayAsyncEventKind event_kind,
>           return;
>       }
>   
> -    Event *event = g_malloc0(sizeof(Event));
> +    Event *event = g_new0(Event, 1);
>       event->event_kind = event_kind;
>       event->opaque = opaque;
>       event->opaque2 = opaque2;
> @@ -243,17 +243,17 @@ static Event *replay_read_event(int checkpoint)
>           }
>           break;
>       case REPLAY_ASYNC_EVENT_INPUT:
> -        event = g_malloc0(sizeof(Event));
> +        event = g_new0(Event, 1);
>           event->event_kind = replay_state.read_event_kind;
>           event->opaque = replay_read_input_event();
>           return event;
>       case REPLAY_ASYNC_EVENT_INPUT_SYNC:
> -        event = g_malloc0(sizeof(Event));
> +        event = g_new0(Event, 1);
>           event->event_kind = replay_state.read_event_kind;
>           event->opaque = 0;
>           return event;
>       case REPLAY_ASYNC_EVENT_CHAR_READ:
> -        event = g_malloc0(sizeof(Event));
> +        event = g_new0(Event, 1);
>           event->event_kind = replay_state.read_event_kind;
>           event->opaque = replay_event_char_read_load();
>           return event;
> @@ -263,7 +263,7 @@ static Event *replay_read_event(int checkpoint)
>           }
>           break;
>       case REPLAY_ASYNC_EVENT_NET:
> -        event = g_malloc0(sizeof(Event));
> +        event = g_new0(Event, 1);
>           event->event_kind = replay_state.read_event_kind;
>           event->opaque = replay_event_net_load();
>           return event;


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 05:55:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 05:55:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291365.494460 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUj6U-000604-N4; Thu, 17 Mar 2022 05:55:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291365.494460; Thu, 17 Mar 2022 05:55:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUj6U-0005zx-Il; Thu, 17 Mar 2022 05:55:18 +0000
Received: by outflank-mailman (input) for mailman id 291365;
 Thu, 17 Mar 2022 05:55:17 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3VDd=T4=intel.com=kevin.tian@srs-se1.protection.inumbo.net>)
 id 1nUj6T-0005zr-4h
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 05:55:17 +0000
Received: from mga17.intel.com (mga17.intel.com [192.55.52.151])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ceb88551-a5b6-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 06:55:14 +0100 (CET)
Received: from fmsmga001.fm.intel.com ([10.253.24.23])
 by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 16 Mar 2022 22:55:10 -0700
Received: from orsmsx603.amr.corp.intel.com ([10.22.229.16])
 by fmsmga001.fm.intel.com with ESMTP; 16 Mar 2022 22:55:10 -0700
Received: from orsmsx607.amr.corp.intel.com (10.22.229.20) by
 ORSMSX603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21; Wed, 16 Mar 2022 22:55:09 -0700
Received: from ORSEDG602.ED.cps.intel.com (10.7.248.7) by
 orsmsx607.amr.corp.intel.com (10.22.229.20) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21 via Frontend Transport; Wed, 16 Mar 2022 22:55:09 -0700
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (104.47.56.173)
 by edgegateway.intel.com (134.134.137.103) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.1.2308.21; Wed, 16 Mar 2022 22:55:09 -0700
Received: from BN9PR11MB5276.namprd11.prod.outlook.com (13.101.156.242) by
 MN2PR11MB3597.namprd11.prod.outlook.com (20.178.251.157) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14; Thu, 17 Mar 2022 05:55:07 +0000
Received: from BN9PR11MB5276.namprd11.prod.outlook.com
 ([fe80::c8aa:b5b2:dc34:e893]) by BN9PR11MB5276.namprd11.prod.outlook.com
 ([fe80::c8aa:b5b2:dc34:e893%8]) with mapi id 15.20.5081.014; Thu, 17 Mar 2022
 05:55:06 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ceb88551-a5b6-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;
  t=1647496514; x=1679032514;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-transfer-encoding:mime-version;
  bh=ZLKtX1MqicQrdOmkggv7LPVFrM59lsFn+8kyk7iXBd0=;
  b=Z22tOiGtLa8TY3slYkXXLFmNnmUdpGVHKD7Ha1D7LL7UMyUTLsWhof+t
   06RAwsAMFFSkYdSobU/Ij6rI1zIHMKH9zzUE3aZ7c0pskEKa4TGgl5jrt
   YkjdkliJxlwRA117vtOwBGazRaAl8DM9nfcxfWOwVQq1AImnDSI2ywCpE
   T5HWUq7+TJANjGtqHojo2LoIyv6FpKuiLRM0IXNneQ1lOxXUE165fh3sH
   syNNcj8gS0bc4d+ga4yW6UjjOUc1B00mP8aViuIxtkSJ0ux2UVjTPrYOT
   Kb7ad2kXxYrnQe3QYYljymVqsBsxU3ewWUkx7ykK8F3XrVvrTRJJ/r7D/
   w==;
X-IronPort-AV: E=McAfee;i="6200,9189,10288"; a="237395643"
X-IronPort-AV: E=Sophos;i="5.90,188,1643702400"; 
   d="scan'208";a="237395643"
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.90,188,1643702400"; 
   d="scan'208";a="690837324"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ECO+hQxITh8K0vs3wd4wavLnNLkGjgOtMiKcnCF8SUY7xhhtbA0V+FuEP1ZH5kRBxJkCwXEAvNrNRulXBAEZ3UFH+61oW5tVUoESXJrjuOyzPUtu7ktc+jScB2lFUrAP+sXpN/DSgmat+JTn59F0Ler/3YPoeFJWKpOE48qpy3KqkhKS7zXxEhyiBdsavk3mmhK3rrsxAvWkwn4XmC43jDB9OQPUDMh8Shu98SjDv0gNCA/7q41wMpsIPXZ+SuBxC+PxnkPKmhJn5VeIeeXEB8nubNKLdvrrB1OWYr26QluF4oB6LaJdsWmtzYjnH/g4OZ8JSMU1e52Z3OyN6c7T5A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ZLKtX1MqicQrdOmkggv7LPVFrM59lsFn+8kyk7iXBd0=;
 b=R1ejOyl/pnArIboyxw2zzQjTw5SRaAf+KS/eolHBPpaNPCFlwkhECuyqTeQwxZxpBI7UWfQgBrbokzJYoPh1xICZQ211MGUSqYZekXu3UFQBWqeqny+aKccm1kmJq+re1NVbQ9EWpdskLzgZLjaOnu0Jx7rNnfViWgx+gte9jwveFmCxHcdRT5uiA/7Qm3M+WZmEb0owBrTPOAV55uJv73hlLgXqeEIa0Zgksg924Whd2v92vQBPozV/UX8l7bERH6b3AbSKQW/7iG+zEywF1zM1lJPY8Tt4yaJMJfFzDS9k7kvGJ2bRN4EM/LOLlvalrPY5yLMmjVZF5ulCZIwdLw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com;
 dkim=pass header.d=intel.com; arc=none
From: "Tian, Kevin" <kevin.tian@intel.com>
To: "Beulich, Jan" <JBeulich@suse.com>
CC: "Cooper, Andrew" <andrew.cooper3@citrix.com>, Paul Durrant <paul@xen.org>,
	=?utf-8?B?UGF1IE1vbm7DqSwgUm9nZXI=?= <roger.pau@citrix.com>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Subject: RE: [PATCH v3 20/23] VT-d: free all-empty page tables
Thread-Topic: [PATCH v3 20/23] VT-d: free all-empty page tables
Thread-Index: AQHYBkBAHcUqxDPFCEWIL9jRoPTFzayZAFJQgAA29ICAJWrDAIAAPPsAgASap8A=
Date: Thu, 17 Mar 2022 05:55:06 +0000
Message-ID: <BN9PR11MB5276A8DF0810DE510C1294038C129@BN9PR11MB5276.namprd11.prod.outlook.com>
References: <76cb9f26-e316-98a2-b1ba-e51e3d20f335@suse.com>
 <807a48fe-3829-d976-75dc-1767d32fb0f4@suse.com>
 <BN9PR11MB527622E58C2E4EF90CF29EF88C379@BN9PR11MB5276.namprd11.prod.outlook.com>
 <9432990c-6de4-ad12-e9fa-12792200748a@suse.com>
 <BN9PR11MB5276930B2AFE79C4961E66548C0F9@BN9PR11MB5276.namprd11.prod.outlook.com>
 <ca2ad24a-0703-de6c-81a5-e01615f93d21@suse.com>
In-Reply-To: <ca2ad24a-0703-de6c-81a5-e01615f93d21@suse.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=intel.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: e2187d17-0176-440c-5c96-08da07dab059
x-ms-traffictypediagnostic: MN2PR11MB3597:EE_
x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr
x-microsoft-antispam-prvs: <MN2PR11MB359703CC22A7280C6C37AC448C129@MN2PR11MB3597.namprd11.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: Flvp4md2VYjp+kE8T1lygV5w4b9gsl9nQzEdriot+cGLqe5Hgyai8tCbpM0rnd5+5JQwf4zNTPkQe+annzKeHetms2goddsDK82y4g7gEwTBWf1/R5BGZXd62xCHHb8Yw6uzxNrMmLqsVO04RWQaFUzjh56Y2KCC2hWNq9dPUGLD+foMafSgBXw9UFzp8w5W27Fo4+8mn0z9Z+Eh21MOZuubC0B1P9Ck34bm62Z7uKes+1wxdbI1gwex5LKGD+b6X24PrA0GLJZoo1gn2tKV5pCApLV6SOkauUm9skN2ZB/g5BSfAL4HSQkOm7MXvB2Z+jWxcje9FWUD1PqMh3B3eSiKOQEOUtqV+/WT/v5hFW+h82DnhhGWylDUK6G7XSkgFkOEF8rqIMi3OGYp9QdP5gql3OFSxWlUBgV/lmjm1QnVTIOy1a5uiXew/xX8TAIi190NOP2KdsRTud0YoG4P4GwtCxOxppqWVLWdIgSgI9oyBCMSsaBGK2/UKCGsZu735s3MjoZ4Toptn1J7x+e/raYEw4FartmxMFkwpfGDufWIVPJ9G0J7n2etnYgAio5UAIyTZJLCv9sa3b7olOQODFH61ZAw7P2//GmW0YDoQBWi6ulP6LFFun4q6vyM2hRyOw7A57IoI+SDJH0deM+C29Xpr9qfehXe7DyVGRFEU6veMRYqZSxUpDrd3QCTJopmvhlZDTqiVn5kGbWMvM86yA==
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BN9PR11MB5276.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(55016003)(54906003)(6916009)(53546011)(7696005)(508600001)(316002)(6506007)(38100700002)(83380400001)(26005)(186003)(8936002)(52536014)(2906002)(82960400001)(122000001)(9686003)(86362001)(71200400001)(38070700005)(5660300002)(8676002)(66476007)(66946007)(66446008)(64756008)(33656002)(76116006)(66556008)(4326008);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?a3d5cWZ2em1PUWlYdzVaM0NXVU92SGh1czlQcHNSVkk0Unp4MGF2NEplTE0z?=
 =?utf-8?B?SjQ4VllnUlZvcnZWNmRGK1hGaGpHSWo0THRZd2JDcHEreVZQZTkzSUtjRGxN?=
 =?utf-8?B?d0Q3eS9ITnpvN3JOSmlyemlISC8zZUhNeUxmeXlsNlM3MjJxcHA0TFRPbFcx?=
 =?utf-8?B?M0R5TjNlSUpXNm9KdWVuWVZuSllHYlVIVWU4L1lYMURpTk1iZFJlNkl4M0ZN?=
 =?utf-8?B?NkZhWlY3QlJucDNESTdpckNKazJJTVB6d2I0UmJWRjBibFl0dVNZZXA2Vjho?=
 =?utf-8?B?cUxTSFBQeDdnOTlMb1VsRERiOXhzTzI0RVhqNTlHVFVhVFZmSDVud1FBbGkz?=
 =?utf-8?B?UDJ2YmpxcVUraFNISnlEWlNWdFNicFFZT2FDVzlEZXp0TjMyWVN3cDV4L1JT?=
 =?utf-8?B?Nzlwd00zcjhjNVBjUEhtTytwaTVXWHpzSS9LWmp3NC9TUzRDWFRZU01RTEJO?=
 =?utf-8?B?UWRKaVhsbTR1ODN0ZGl1WklZUHhxeS9XeGM5VVNxeWk1dkNNU0ZpYnNzMzVy?=
 =?utf-8?B?b0xjOU1oUDl3QUlmMVVUYW94SjBpd080MmRSZSsyQi9iTzd3WmU5THZsZEY4?=
 =?utf-8?B?TU5IQ1pKL0ZrZ2pyeHR5WW1tQU11d3h4QnVjcjdZZk1ueVhRbFYyM1FFZHA2?=
 =?utf-8?B?eVZnbFYzNTF6UFI3RzVUQ0s3bEZyRHBjcjQ4RmNOeFVzY2thUWNzTkJXS0lp?=
 =?utf-8?B?UXFuY1JtTkVXdmV0MCtlYVVzelgzS3J5bkJCN0Yvckp4Y3pYTDYxeVlPVmd5?=
 =?utf-8?B?THlMS2x0UFVEV0M1QTB6VjZGeWtkQ3ByUndtQkJYcFNGSTJFWUptSFUwVWsw?=
 =?utf-8?B?Zk8vWUtMRXFVaU1ZdEtrVCtaV0ZvVi9Nd1BwMnBFTUVCUFBmVGxTd3dkWHhO?=
 =?utf-8?B?NWNnYStURW9IQnpwaEk3bmVRZlJYMzI0Y1hJOVVnVHRlY0luNjgxUVZGemJI?=
 =?utf-8?B?dDVsTjI2ajZLZmVWcUlKdnNTUUZaVE8zN3pBdVBRRjlQQjUwYndKV1dRb1J1?=
 =?utf-8?B?OFJEamVYYmxxK2JOUUd2TytVaW5WUGdkeGQ0NTBDS3RWSGhpUnhBWlc2bDZh?=
 =?utf-8?B?cCtVOTU5VGw2djB6WU41Y0R6T1BkejZpTUg5RGg1SkVZU29JUDdocUJ0S2hr?=
 =?utf-8?B?aWNTcU5ac0ptN0ZIdnEweDNteG1MRzNqUVFWbTRjWHl5S1BDQ2llUGZtRkxa?=
 =?utf-8?B?TWpNY3lBcndHZ1orcjlEVDZFSkRLdTBIVC92OVZxQ1NSZ3hIaTVHak9HSW9Z?=
 =?utf-8?B?WXI0Z24rdzFnNUVuaThHVUxuOStCcmNOZnNwUE8zRnlQVnBLTWVBZ044UU15?=
 =?utf-8?B?eG9pb20vR0pzeE5BN216d0tEZVovKzdEdE5JVk1ETzlpcERscFRBQi92aDJG?=
 =?utf-8?B?RWlxQ2xCM2xlb09ham1yQ2g3My9uNkZrZU55ait6Q1BpLzlpWlpXN3pUbm16?=
 =?utf-8?B?d002TWtnT1FDUDJmdkZNSEpaTnRpQVlVTVRrV3dKbTEzSlBTWmRNSmUrdnly?=
 =?utf-8?B?TWVxRlc4eG1tVHFnN0UzMS9UQUFKS0hxSWU5SEdaQ3d2T3o0VXUrN0RsdmJO?=
 =?utf-8?B?OTlhdTZrNXE0Q0NyTkIxSVpXNVA0SjBYNGNqekxEQldXUXhFR05VNXJMb082?=
 =?utf-8?B?MGZtVVh2RFpQd1BTZ1M3RmhKZWdMN0JEYnRyS1dlTnA1VTBlRmhYY1JkaHB4?=
 =?utf-8?B?cFQ3d3liUEdlUm5BZTZTcWZ3TDdmYkJjVmtYUVI4YnBIN2Z5VkQ0NUxQREZp?=
 =?utf-8?B?SlVxT3d2RkJlcmNRU1ZZSEFoN2JPc21qM3lublZNVWRyMzNYbFFyT01iUEEx?=
 =?utf-8?B?MXJNa1FFVDV2Z2tlQ1NlWlVtWDJoMk5lRk41M3BkNGQrN3J6aWlxTnpsMFBx?=
 =?utf-8?B?V3NheVV0VHkvbGhVclh6MmdIWHAzazFHVXVOb2d6M0pCanlBYTVtby93bExj?=
 =?utf-8?Q?4zqCs/Le6+/UX8TK84GmHZlfeYs3jWNv?=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN9PR11MB5276.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e2187d17-0176-440c-5c96-08da07dab059
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Mar 2022 05:55:06.8008
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: CtluKq7lCwfUIC0gc3iIBPLGA6ELORGuXRs6/diF7h4dpRc/pkkc7C+VYWTw2saJx3PKM5AdUlouSwcHVzJG3w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB3597
X-OriginatorOrg: intel.com
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From xen-devel-bounces@lists.xenproject.org Thu Mar 17 05:57:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 05:57:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291370.494470 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUj8U-0006ef-74; Thu, 17 Mar 2022 05:57:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291370.494470; Thu, 17 Mar 2022 05:57:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUj8U-0006eY-3q; Thu, 17 Mar 2022 05:57:22 +0000
Received: by outflank-mailman (input) for mailman id 291370;
 Thu, 17 Mar 2022 05:57:20 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=31/0=T4=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nUj8S-0006eS-GS
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 05:57:20 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 1af76e5f-a5b7-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 06:57:19 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id B7ADB21108;
 Thu, 17 Mar 2022 05:57:18 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 7101913ACB;
 Thu, 17 Mar 2022 05:57:18 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id tm16Gb7NMmISRQAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 17 Mar 2022 05:57:18 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1af76e5f-a5b7-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647496638; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=VizSblfrjmFLn02MdaRQgXPBqZBpwRj89jy2v8VdHGM=;
	b=DdzduMDoqdk+TSYQTQDfV9r6tFQ/+nk/HxZrXWAGIz321cYGJT510LtrExYfS1ZUhd5T+w
	vERZb2X0MiKw4+rgHs79NmKyMv/PL/bjQSFEbwpJirY7542u5A+ibrs9QoYS1WA/64+5qY
	F6PLbfF03itOqAQCRkCGU3FGnSOZ81k=
Message-ID: <772301b5-f398-7b90-d8a2-9838a13077b1@suse.com>
Date: Thu, 17 Mar 2022 06:57:17 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH 3/3] tools/xenstore: add documentation for extended watch
 command
Content-Language: en-US
To: Luca Fancellu <Luca.Fancellu@arm.com>
Cc: Xen-devel <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Wei Liu <wl@xen.org>
References: <20220316161017.3579-1-jgross@suse.com>
 <20220316161017.3579-4-jgross@suse.com>
 <6D6D470C-C6A6-440D-B70D-C9737853D050@arm.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <6D6D470C-C6A6-440D-B70D-C9737853D050@arm.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------a5PMFBS0XtKkS5NKQK1tmFDE"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------a5PMFBS0XtKkS5NKQK1tmFDE
Content-Type: multipart/mixed; boundary="------------5v3cmZA2rUNkMIr6f2RYwb0S";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Luca Fancellu <Luca.Fancellu@arm.com>
Cc: Xen-devel <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Wei Liu <wl@xen.org>
Message-ID: <772301b5-f398-7b90-d8a2-9838a13077b1@suse.com>
Subject: Re: [PATCH 3/3] tools/xenstore: add documentation for extended watch
 command
References: <20220316161017.3579-1-jgross@suse.com>
 <20220316161017.3579-4-jgross@suse.com>
 <6D6D470C-C6A6-440D-B70D-C9737853D050@arm.com>
In-Reply-To: <6D6D470C-C6A6-440D-B70D-C9737853D050@arm.com>

--------------5v3cmZA2rUNkMIr6f2RYwb0S
Content-Type: multipart/mixed; boundary="------------0ckPro94yWcvpa55C02uTjoS"

--------------0ckPro94yWcvpa55C02uTjoS
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------0ckPro94yWcvpa55C02uTjoS
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------0ckPro94yWcvpa55C02uTjoS--

--------------5v3cmZA2rUNkMIr6f2RYwb0S--

--------------a5PMFBS0XtKkS5NKQK1tmFDE
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIyzb0FAwAAAAAACgkQsN6d1ii/Ey/R
pwf9GHOkmEbyGNJIAhnyhDivevJzLAM3balCa/kfiNJujCpqd5zgRlUGvzPQk0AIE0xEB4G5ZNkB
Hna3OHBWGDhlx+jEuZOh1+mEsdNhOoF76GsqXedBYDWId+zyV7sI8oX1TzrFi2brbo3PzDeVDEva
5Lchwug49/L+cMkvqJ1ojo+gibv7OH51do5O8ObcX8NFV+HI630tZu6/SU5WFPsaGhPX3KG4E6nC
55Wpd+yYyEFLjIpTGY8PVQZv9w5AYrGvHaj0LQeqbMrFWaXg8JraEWTt9QXEl0/fK04fQyL2PAIU
xBcVtiSf5r/tqgOVHP27vnOwG0GbBSDgz9O/w8LOaA==
=Co9X
-----END PGP SIGNATURE-----

--------------a5PMFBS0XtKkS5NKQK1tmFDE--


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 05:58:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 05:58:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291373.494482 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUj9E-0007Eo-GN; Thu, 17 Mar 2022 05:58:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291373.494482; Thu, 17 Mar 2022 05:58:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUj9E-0007Eg-Cz; Thu, 17 Mar 2022 05:58:08 +0000
Received: by outflank-mailman (input) for mailman id 291373;
 Thu, 17 Mar 2022 05:58:06 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3VDd=T4=intel.com=kevin.tian@srs-se1.protection.inumbo.net>)
 id 1nUj9C-0006eS-Hn
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 05:58:06 +0000
Received: from mga02.intel.com (mga02.intel.com [134.134.136.20])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3434aa6e-a5b7-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 06:58:03 +0100 (CET)
Received: from fmsmga001.fm.intel.com ([10.253.24.23])
 by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 16 Mar 2022 22:58:00 -0700
Received: from orsmsx603.amr.corp.intel.com ([10.22.229.16])
 by fmsmga001.fm.intel.com with ESMTP; 16 Mar 2022 22:58:00 -0700
Received: from orsmsx609.amr.corp.intel.com (10.22.229.22) by
 ORSMSX603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21; Wed, 16 Mar 2022 22:57:59 -0700
Received: from ORSEDG601.ED.cps.intel.com (10.7.248.6) by
 orsmsx609.amr.corp.intel.com (10.22.229.22) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21 via Frontend Transport; Wed, 16 Mar 2022 22:57:59 -0700
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (104.47.70.107)
 by edgegateway.intel.com (134.134.137.102) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.1.2308.21; Wed, 16 Mar 2022 22:57:59 -0700
Received: from BN9PR11MB5276.namprd11.prod.outlook.com (13.101.156.242) by
 MN2PR11MB3597.namprd11.prod.outlook.com (20.178.251.157) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14; Thu, 17 Mar 2022 05:57:57 +0000
Received: from BN9PR11MB5276.namprd11.prod.outlook.com
 ([fe80::c8aa:b5b2:dc34:e893]) by BN9PR11MB5276.namprd11.prod.outlook.com
 ([fe80::c8aa:b5b2:dc34:e893%8]) with mapi id 15.20.5081.014; Thu, 17 Mar 2022
 05:57:57 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3434aa6e-a5b7-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;
  t=1647496683; x=1679032683;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-transfer-encoding:mime-version;
  bh=smKKZUagFrMqDo1NtoNicuK9dofLgfAbLKYfHZGANkU=;
  b=ijuFoTFdJrRHvAyWkv9rp0vN1F397BZtFG5n2RIee08WepeKMLYf3Y1X
   5NY6P/l2nonwfsxWRdUOk/ccorTBL+GCZyWqqr9N6C8Q8QLP90x+VCRuo
   MYqyRMGxuSH+rGtUNpYlv/thATuIeq3zPeHdXTSkzkWUnB+zGIai+NhcW
   5gCxYrKlp8RNSGmCN1qcC5Wx/S4dqPaMjxPi8rdwhcHxToBIL2PiW0+me
   yGMl04SfgJmrUf3gNYt+smV7JWrffEZtNyyMHYMHFc2XybQI11jFkt1on
   q+umoK3g6MRsB2JuF+cp83kDg4CrEIfUdpt/FM5PAc3RxIsiw5G+K6ATM
   A==;
X-IronPort-AV: E=McAfee;i="6200,9189,10288"; a="244242979"
X-IronPort-AV: E=Sophos;i="5.90,188,1643702400"; 
   d="scan'208";a="244242979"
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.90,188,1643702400"; 
   d="scan'208";a="690837895"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=NjbiFmJPW/w3a4VE5zy69IExqH5Pul4QqYtObGxaWUZ98yNdnEHkmqUoFmNW108V7/WyC8Z26wI23yOZL9pNSwkXCzexNw4Y4tStmQApzhy6ccnGS77DIvKj43zz+V31Wm417ntQRXT/PcQx6t1FWeVuUyDE6DwP8ges/0UCiByDt6/GfUe7eyVmjXTxI29eXHF3llF8o5OSFPeL0Cx0V6UcOtJret+LBKPKZcdH8k4TmSXy54qu63pd2Q2E9Syvs2wGmjOEiLGGcDwdEuNnz+FB0WM3ztRUCcHh+v9qkftZMqMHA0RzDBF7ZhEdsSTmxkOWN6zYcHG72cU2uvXlSA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=smKKZUagFrMqDo1NtoNicuK9dofLgfAbLKYfHZGANkU=;
 b=On8s5Ep7tKtDTwOYab80Hu1hy6hW2/1ltWtM+nPE2+cqNmu4FETgBQslRNBuaukOzsBZH3ZNEan/vn5gvIHbEZCK/nGJVcUDP6LsDL7QsaqgNsZIDKqo4E3ZnsVeg+wBzhVATKVWyvk9ZqxgbY0KNV7MKudaISMve0MtjiVceCjkMMgmzYBZ+jgUdL4YXFFs81IVCPhJhhhnfGzSatI3RtrPAqBeB+iOHK/Tr3qOoH0sUwha//6Dvgl7J9bYvtALKiC16afb6LfaHjeC0o2q9PAcjULXeDbVnS1tA4bhgxoMqy2Hpqz1ZPuxZFyvks8DRJTo32jbjUKDV5/uS2oJOQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com;
 dkim=pass header.d=intel.com; arc=none
From: "Tian, Kevin" <kevin.tian@intel.com>
To: "Beulich, Jan" <JBeulich@suse.com>
CC: =?utf-8?B?UGF1IE1vbm7DqSwgUm9nZXI=?= <roger.pau@citrix.com>, Wei Liu
	<wl@xen.org>, "Nakajima, Jun" <jun.nakajima@intel.com>, Thiner Logoer
	<logoerthiner1@163.com>, "Marczykowski, Marek"
	<marmarek@invisiblethingslab.com>, Xen-devel
	<xen-devel@lists.xenproject.org>, "Cooper, Andrew"
	<andrew.cooper3@citrix.com>
Subject: RE: x86/vmx: Don't spuriously crash the domain when INIT is received
Thread-Topic: x86/vmx: Don't spuriously crash the domain when INIT is received
Thread-Index: AQHYKbevPQACrsDTpUmflGdlWuTEmayj9FgAgAA+nwCAAA5IgIAAQNmAgAQWIgCAFe3v8IAAFMoAgASY4xA=
Date: Thu, 17 Mar 2022 05:57:57 +0000
Message-ID: <BN9PR11MB527622D1D0881131EA3241588C129@BN9PR11MB5276.namprd11.prod.outlook.com>
References: <20220224194853.17774-1-andrew.cooper3@citrix.com>
 <20220224194853.17774-3-andrew.cooper3@citrix.com>
 <12d8b90b-15b0-c094-71e5-35cfdbfe72b4@suse.com>
 <51ef6bd1-bcd9-9a3a-e902-887d42d7dd7e@citrix.com>
 <bb4b4106-f49d-2b50-1eb9-eb450f6b24fa@suse.com>
 <965e91fa-1f1e-7c57-5a71-a09b170a7d9f@citrix.com>
 <2e1dcfb8-20ae-26b2-427d-9c19bd8c8add@suse.com>
 <BN9PR11MB52767BF5573E31241734F2A28C0F9@BN9PR11MB5276.namprd11.prod.outlook.com>
 <cdbd90a7-bf4e-4ff6-0e95-0671ad553b83@suse.com>
In-Reply-To: <cdbd90a7-bf4e-4ff6-0e95-0671ad553b83@suse.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=intel.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 5db99e39-742e-4d32-e27c-08da07db15e6
x-ms-traffictypediagnostic: MN2PR11MB3597:EE_
x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr
x-microsoft-antispam-prvs: <MN2PR11MB35974803795B5DAF780571DE8C129@MN2PR11MB3597.namprd11.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BN9PR11MB5276.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(9686003)(82960400001)(122000001)(66476007)(66946007)(66446008)(64756008)(33656002)(76116006)(66556008)(5660300002)(8676002)(4326008)(86362001)(71200400001)(38070700005)(508600001)(7696005)(316002)(53546011)(6506007)(38100700002)(55016003)(54906003)(6916009)(2906002)(52536014)(8936002)(26005)(186003)(83380400001);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?STRCdHVVdVZiSXVmZkhZeXpIWnk2c0daN2ZEaTdHQ3BtNnZiVFdCWTYwWUI3?=
 =?utf-8?B?RXBaQmJJUUNBbmJYWlBzbmdsSXEzdkJrU2JLUm5YZHp0em5qaytueHhkbXVS?=
 =?utf-8?B?MTNyMkIxQ1pWblBnWXBPVDJKYlU1UkxPa0FaUUdxQmdKbmtMNzFsNXY0OUpF?=
 =?utf-8?B?aVJ6RGlxeE9wLzk1c2swcmZEc3JncFN0YzIyb2lWYkNyN1ZaZUZsdVN2QS9t?=
 =?utf-8?B?TUM5eFhXZjlFYUkxSEFsYk12MS9lbEgyc3lxVldMZWtsSzhvbEJWa2lMMnhh?=
 =?utf-8?B?RW4zQWpacXRjdVM2TXNkemJHWkI2emtvMzd2M3BnaitBaENJbCtzY3lScEVy?=
 =?utf-8?B?anpHUHhvY0ErcStTM3NVWHhWRXkvZU54U25SL1JqenlzcC91THhtVEx0V0Vo?=
 =?utf-8?B?WVg5aktQSWpUWVlKV3RIM1gvb2hkaFVVNDllTDQ4MHpQWVNReHdlV2dSbHFT?=
 =?utf-8?B?ZmQvMmNXcUV0UVhRSWU0L2NERFdnMDQ0aXgrMS9zZGl1Mkg5elQ5cDRiUGQv?=
 =?utf-8?B?czRaWDJyc05WR2Z3N2pzR0hRYjZCTjVPRXkvRmtud2FYLzcwTjR3VGhIaytZ?=
 =?utf-8?B?aFc5RVlJSUtNWE1DdU9hdjdTck40dElkdjR4Nm5tZHdNL3B0cy9NR2doTGcy?=
 =?utf-8?B?MTdZcUwzYUhOalFiWitWVDM5RDNwTEtOcXBhZXJlWkNjdXVVTzJFYmdDcC9i?=
 =?utf-8?B?MHZGbm1GaUp1c2ZlQUdoWVR1SDExQms5UEdYM0I4SldxL2JTdyswalZVMXpr?=
 =?utf-8?B?MmE4a1BSUEg5eFl4eTFBZVBCQzUvWW02a3NqYWpWalkzNk5HK21kdmFUNmlw?=
 =?utf-8?B?SWY3TXpiZkhUTHYrNUdMdkdTN1lmZ3FWZ2ZrQW4zSUxpc3dieDhveE9OMGIx?=
 =?utf-8?B?TEswM1N1eDhKdW52NHpCNmtxTDBJWUhoSmZEb1ZpQmVQTFFqQnJYUmpmLzhk?=
 =?utf-8?B?SVZkVHNHTXc4cU1LOC9yUFFVc2tXZkdlcHpoOWFEUFpLMXU2czVnbmZLeElC?=
 =?utf-8?B?a3kzT3VkdkFRRkUyUnlaRHZ5Rk1BZDZpQzF4dWd5a25MdTRjM05QWE0zd2Zj?=
 =?utf-8?B?OEhwdTdUaVVhUHM1NWhVQkhLaDlWdDl6L1dROHMrdHNyZGthdGMzdEVVaEpH?=
 =?utf-8?B?OXRsbDUwckVrSzVmdWdCU3o5VENzUmh0bXh0bVA2QnV2UERMYldzdG1tYzNF?=
 =?utf-8?B?Q2pYZGMyQU1Wa1VTektjQThva3lhMTJEUjFTOVRYN3NtaFJpR25XWkt0bi9X?=
 =?utf-8?B?YW84SzJsSWdRQ1BHTC9MdWJOQ0p5TlhnK0ZsZndhNlNNTDlhZVAweCtndWkx?=
 =?utf-8?B?QmQ0TExyZHVZaWZxb1JKOWF6K09wRUJXNVZSUVdhTXo5RzJtclFaU1NDTGpR?=
 =?utf-8?B?QWw1YSsyYlRKZUgrQS9sOHlIZkJEUm9kU2wzWnFCNjl3S0x6Z0FxTXRYMldC?=
 =?utf-8?B?d01RMXc1TWhoYW9qWXpEcy81YmZhT1dvcEx5YjlUa1FkUUMwVnBnSENIMjhK?=
 =?utf-8?B?OXppdWRkam5DNGNJMUhEMU0zdVpzejJuTzRCblByenNXVmlJOWR1a0RjUjV1?=
 =?utf-8?B?Tmh3R2pkSlFJTER2VDBSRHZpNmozaS9OM0dERlFhejVYMjc1a2ZSVHA3aWVy?=
 =?utf-8?B?UDJCWWFodmR0VktsdjJjKzdtcks4Y1hDdytQZmJPdHZTcFdJWWRzbzBBUUFJ?=
 =?utf-8?B?eUpmTTdLelpwQWlMOEl5YjN2UVlGdmgxWmk4SVJrSkNKL0ZTK2UyWU9EWGVU?=
 =?utf-8?B?QmM2NG5WVmJZb1VXeGpQVmJKVEgvZ2tTRFl6TGMxVVMrMGhWcW5NN2hYaDBX?=
 =?utf-8?B?UVowcnBiOW5qSUVVZGFZMTV6MFUyNEdYM3ZZWFNReUR6dGFJQ045Y2NYaVRv?=
 =?utf-8?B?YlNhd05oa1R5OXZIM3ZsVTBESVdKK05vNlFBZ09WTUpLTXJBdjcvMWFWMHFp?=
 =?utf-8?Q?atnYu7sonl7GvABmeghGYDCU1DH4RWnv?=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN9PR11MB5276.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5db99e39-742e-4d32-e27c-08da07db15e6
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Mar 2022 05:57:57.1313
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: WDRCfNCZpYCsSKrXtVvGKCth2kR2IzTYDYclyx4JEahWLSH27f2hjFjrOpUl/fgB0rLORv3jHa6LX5GdMi2T4A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB3597
X-OriginatorOrg: intel.com

PiBGcm9tOiBKYW4gQmV1bGljaCA8amJldWxpY2hAc3VzZS5jb20+DQo+IFNlbnQ6IE1vbmRheSwg
TWFyY2ggMTQsIDIwMjIgMzo0MyBQTQ0KPiANCj4gT24gMTQuMDMuMjAyMiAwNzozNSwgVGlhbiwg
S2V2aW4gd3JvdGU6DQo+ID4+IEZyb206IEphbiBCZXVsaWNoIDxqYmV1bGljaEBzdXNlLmNvbT4N
Cj4gPj4gU2VudDogTW9uZGF5LCBGZWJydWFyeSAyOCwgMjAyMiAzOjM2IFBNDQo+ID4+DQo+ID4+
IE9uIDI1LjAyLjIwMjIgMTg6MTEsIEFuZHJldyBDb29wZXIgd3JvdGU6DQo+ID4+PiBPbiAyNS8w
Mi8yMDIyIDEzOjE5LCBKYW4gQmV1bGljaCB3cm90ZToNCj4gPj4+PiBPbiAyNS4wMi4yMDIyIDEz
OjI4LCBBbmRyZXcgQ29vcGVyIHdyb3RlOg0KPiA+Pj4+PiBPbiAyNS8wMi8yMDIyIDA4OjQ0LCBK
YW4gQmV1bGljaCB3cm90ZToNCj4gPj4+Pj4+IE9uIDI0LjAyLjIwMjIgMjA6NDgsIEFuZHJldyBD
b29wZXIgd3JvdGU6DQo+ID4+Pj4+Pj4gSW4gVk1YIG9wZXJhdGlvbiwgdGhlIGhhbmRsaW5nIG9m
IElOSVQgSVBJcyBpcyBjaGFuZ2VkLg0KPiA+PiBFWElUX1JFQVNPTl9JTklUIGhhcw0KPiA+Pj4+
Pj4+IG5vdGhpbmcgdG8gZG8gd2l0aCB0aGUgZ3Vlc3QgaW4gcXVlc3Rpb24sIHNpbXBseSBzaWdu
YWxzIHRoYXQgYW4gSU5JVA0KPiA+PiB3YXMNCj4gPj4+Pj4+PiByZWNlaXZlZC4NCj4gPj4+Pj4+
Pg0KPiA+Pj4+Pj4+IElnbm9yaW5nIHRoZSBJTklUIGlzIHByb2JhYmx5IHRoZSB3cm9uZyB0aGlu
ZyB0byBkbywgYnV0IGlzIGhlbHBmdWwgZm9yDQo+ID4+Pj4+Pj4gZGVidWdnaW5nLiAgQ3Jhc2hp
bmcgdGhlIGRvbWFpbiB3aGljaCBoYXBwZW5zIHRvIGJlIGluIGNvbnRleHQgaXMNCj4gPj4gZGVm
aW5pdGVseQ0KPiA+Pj4+Pj4+IHdyb25nLiAgUHJpbnQgYW4gZXJyb3IgbWVzc2FnZSBhbmQgY29u
dGludWUuDQo+ID4+Pj4+Pj4NCj4gPj4+Pj4+PiBEaXNjb3ZlcmVkIGFzIGNvbGxhdGVyYWwgZGFt
YWdlIGZyb20gd2hlbiBhbiBBUCB0cmlwbGUgZmF1bHRzIG9uIFMzDQo+ID4+IHJlc3VtZSBvbg0K
PiA+Pj4+Pj4+IEludGVsIFRpZ2VyTGFrZSBwbGF0Zm9ybXMuDQo+ID4+Pj4+PiBJJ20gYWZyYWlk
IEkgZG9uJ3QgZm9sbG93IHRoZSBzY2VuYXJpbywgd2hpY2ggd2FzIChvbmx5KSBvdXRsaW5lZCBp
bg0KPiA+Pj4+Pj4gcGF0Y2ggMTogV2h5IHdvdWxkIHRoZSBCU1AgcmVjZWl2ZSBJTklUIGluIHRo
aXMgY2FzZT8NCj4gPj4+Pj4gU0hVVERPV04gaXMgYSBzaWduYWwgZW1pdHRlZCBieSBhIGNvcmUg
d2hlbiBpdCBjYW4ndCBjb250aW51ZS7CoCBUcmlwbGUNCj4gPj4+Pj4gZmF1bHQgaXMgb25lIGNh
dXNlLCBidXQgb3RoZXIgc291cmNlcyBpbmNsdWRlIGEgZG91YmxlICNNQywgZXRjLg0KPiA+Pj4+
Pg0KPiA+Pj4+PiBTb21lIGV4dGVybmFsIGNvbXBvbmVudCwgaW4gdGhlIFBDSCBJIGV4cGVjdCwg
bmVlZHMgdG8gdHVybiB0aGlzIGludG8NCj4gYQ0KPiA+Pj4+PiBwbGF0Zm9ybSByZXNldCwgYmVj
YXVzZSBvbmUgbWFsZnVuY3Rpb25pbmcgY29yZSBjYW4ndC7CoCBJdCBpcyB3aHkgYQ0KPiA+Pj4+
PiB0cmlwbGUgZmF1bHQgb24gYW55IGxvZ2ljYWwgcHJvY2Vzc29yIGJyaW5ncyB0aGUgd2hvbGUg
c3lzdGVtIGRvd24uDQo+ID4+Pj4gSSdtIGFmcmFpZCB0aGlzIGRvZXNuJ3QgYW5zd2VyIG15IHF1
ZXN0aW9uLiBDbGVhcmx5IHRoZSBzeXN0ZW0gZGlkbid0DQo+ID4+Pj4gc2h1dCBkb3duLg0KPiA+
Pj4NCj4gPj4+IEluZGVlZCwgKmJlY2F1c2UqIFhlbiBjYXVnaHQgYW5kIGlnbm9yZWQgdGhlIElO
SVQgd2hpY2ggd2FzIG90aGVyd2lzZQ0KPiA+Pj4gc3VwcG9zZWQgdG8gZG8gaXQuDQo+ID4+Pg0K
PiA+Pj4+ICBIZW5jZSBJIHN0aWxsIGRvbid0IHNlZSB3aHkgdGhlIEJTUCB3b3VsZCBzZWUgSU5J
VCBpbiB0aGUNCj4gPj4+PiBmaXJzdCBwbGFjZS4NCj4gPj4+Pg0KPiA+Pj4+Pj4gQW5kIGl0IGFs
c28gY2Fubm90IGJlIHRoYXQgdGhlIElOSVQgd2FzIHJlY2VpdmVkIGJ5IHRoZSB2Q1BVIHdoaWxl
DQo+ID4+IHJ1bm5pbmcgb24NCj4gPj4+Pj4+IGFub3RoZXIgQ1BVOg0KPiA+Pj4+PiBJdCdzIG5v
dGhpbmcgKHJlYWxseSkgdG8gZG8gd2l0aCB0aGUgdkNQVS7CoCBJTklUIGlzIGEgZXh0ZXJuYWwg
c2lnbmFsIHRvDQo+ID4+Pj4+IHRoZSAocmVhbCkgQVBJQywganVzdCBsaWtlIE5NSS9ldGMuDQo+
ID4+Pj4+DQo+ID4+Pj4+IEl0IGlzIHRoZSBuZXh0IFZNRW50cnkgb24gYSBDUFUgd2hpY2ggcmVj
ZWl2ZWQgSU5JVCB0aGF0IHN1ZmZlcnMgYQ0KPiA+Pj4+PiBWTUVudHJ5IGZhaWx1cmUsIGFuZCB0
aGUgVk1FbnRyeSBmYWlsdXJlIGhhcyBub3RoaW5nIHRvIGRvIHdpdGggdGhlDQo+ID4+Pj4+IGNv
bnRlbnRzIG9mIHRoZSBWTUNTLg0KPiA+Pj4+Pg0KPiA+Pj4+PiBJbXBvcnRhbnRseSBmb3IgWGVu
IGhvd2V2ZXIsIHRoaXMgaXNuJ3QgYXBwbGljYWJsZSBmb3Igc2NoZWR1bGluZyBQVg0KPiA+Pj4+
PiB2Q1BVcywgd2hpY2ggaXMgd2h5IGRvbTAgd2Fzbid0IHRoZSBvbmUgdGhhdCBjcmFzaGVkLsKg
IFRoaXMgYWN0dWFsbHkNCj4gPj4+Pj4gbWVhbnQgdGhhdCBkb20wIHdhcyBhbGl2ZSBhbiB1c2Fi
bGUsIGFsYmVpdCBpdCBzaGFyaW5nIGFsbCB2Q1BVcyBvbiBhDQo+ID4+Pj4+IHNpbmdsZSBDUFUu
DQo+ID4+Pj4+DQo+ID4+Pj4+DQo+ID4+Pj4+IFRoZSBjaGFuZ2UgaW4gSU5JVCBiZWhhdmlvdXIg
ZXhpc3RzIGZvciBUWFQsIHdoZXJlIGlzIGl0IGNyaXRpY2FsIHRoYXQNCj4gPj4+Pj4gc29mdHdh
cmUgY2FuIGNsZWFyIHNlY3JldHMgZnJvbSBSQU0gYmVmb3JlIHJlc2V0dGluZy7CoCBJJ20gbm90
IHdhbnRpbmcNCj4gPj4+Pj4gdG8gZ2V0IGludG8gYW55IG9mIHRoYXQgYmVjYXVzZSBpdCdzIGZh
ciBtb3JlIGNvbXBsaWNhdGVkIHRoYW4gSSBoYXZlDQo+ID4+Pj4+IHRpbWUgdG8gZml4Lg0KPiA+
Pj4+IEkgZ3Vlc3MgdGhlcmUncyBzb21ldGhpbmcgaGlkZGVuIGJlaGluZCB3aGF0IHlvdSBzYXkg
aGVyZSwgbGlrZSBJTklUDQo+ID4+Pj4gb25seSBiZWluZyBsYXRjaGVkLCBidXQgdGhpcyBsYXRj
aGVkIHN0YXRlIHRoZW4gY2F1c2luZyB0aGUgVk0gZW50cnkNCj4gPj4+PiBmYWlsdXJlLiBXaGlj
aCB3b3VsZCBtZWFuIHRoYXQgcmVhbGx5IHRoZSBJTklUIHdhcyBhIHNpZ25hbCBmb3IgdGhlDQo+
ID4+Pj4gc3lzdGVtIHRvIHNodXQgZG93biAvIHNodXR0aW5nIGRvd24uDQo+ID4+Pg0KPiA+Pj4g
WWVzLg0KPiA+DQo+ID4gd2h5IGlzIElOSVQgbGF0Y2hlZCBpbiByb290IG1vZGUgKHRha2UgZWZm
ZWN0IHVudGlsIHZtZW50cnkpIGluc3RlYWQgb2YNCj4gPiBkaXJlY3RseSBjYXVzaW5nIHRoZSBD
UFUgdG8gcmVzZXQ/DQo+ID4NCj4gPj4+DQo+ID4+Pj4gSW4gd2hpY2ggY2FzZSBhcnJhbmdpbmcg
dG8NCj4gPj4+PiBjb250aW51ZSBieSBpZ25vcmluZyB0aGUgZXZlbnQgaW4gVk1YIGxvb2tzIHdy
b25nLiBTaW1wbHkgY3Jhc2hpbmcNCj4gPj4+PiB0aGUgZ3Vlc3Qgd291bGQgdGhlbiBiZSB3cm9u
ZyBhcyB3ZWxsLCBvZiBjb3Vyc2UuIFdlIHNob3VsZCBzaHV0DQo+ID4+Pj4gZG93biBpbnN0ZWFk
Lg0KPiA+Pj4NCj4gPj4+IEl0IGlzIHNvZnR3YXJlJ3MgZGlzY3JldGlvbiB3aGF0IHRvIGRvIHdo
ZW4gYW4gSU5JVCBpcyBjYXVnaHQsIGV2ZW4gaWYNCj4gPj4+IHRoZSBleHBlY3RhdGlvbiBpcyB0
byBob25vdXIgaXQgZmFpcmx5IHByb21wdGx5Lg0KPiA+Pj4NCj4gPj4+PiBCdXQgSSBkb24ndCB0
aGluayBJIHNlZSB0aGUgZnVsbCBwaWN0dXJlIGhlcmUgeWV0LCB1bmxlc3MgeW91cg0KPiA+Pj4+
IG1lbnRpb25pbmcgb2YgVFhUIHdhcyBhY3R1YWxseSBpbXBseWluZyB0aGF0IFRYVCB3YXMgYWN0
aXZlIGF0IHRoZQ0KPiA+Pj4+IHBvaW50IG9mIHRoZSBjcmFzaCAod2hpY2ggSSBkb24ndCB0aGlu
ayB3YXMgc2FpZCBhbnl3aGVyZSkuDQo+ID4+Pg0KPiA+Pj4gVGhpcyBkaWQgY2F1c2UgY29uZnVz
aW9uIGR1cmluZyBkZWJ1Z2dpbmcuwqAgQXMgZmFyIGFzIHdlIGNhbiB0ZWxsLCBUWFQNCj4gPj4+
IGlzIG5vdCBhY3RpdmUsIGJ1dCB0aGUgb2JzZXJ2ZWQgYmVoYXZpb3VyIGNlcnRhaW5seSBsb29r
cyBsaWtlIFRYVCBpcw0KPiA+Pj4gYWN0aXZlLg0KPiA+Pj4NCj4gPj4+IFRoZW4gYWdhaW4sIHJl
c2V0IGlzIGEgcGxhdGZvcm0gYmVoYXZpb3VyLCBub3QgYXJjaGl0ZWN0dXJhbC7CoCBBbHNvLA0K
PiA+Pj4gaXQncyBteSB1bmRlcnN0YW5kaW5nIHRoYXQgSW50ZWwgZG9lcyBub3Qgc3VwcG9ydCBT
MyBvbiBUaWdlckxha2UNCj4gPj4+IChvcHRpbmcgdG8gb25seSBzdXBwb3J0IFMwaXggaW5zdGVh
ZCksIHNvIEknbSBndWVzc2luZyB0aGF0ICJMaW51eCBTMyINCj4gPj4+IGFzIGl0J3MgY2FsbGVk
IGluIHRoZSBtZW51IGlzIHNvbWV0aGluZyByZXRyb2ZpdHRlZCBieSB0aGUgT0VNLg0KPiA+Pj4N
Cj4gPj4+IEJ1dCBvdmVyYWxsLCB0aGUgcG9pbnQgaXNuJ3QgcmVhbGx5IGFib3V0IHdoYXQgdHJp
Z2dlcmVkIHRoZSBJTklULsKgIFdlDQo+ID4+PiBhbHNvIHNob3VsZG4ndCBudWtlIGFuIGlubm9j
ZW50IFZNIGlmIGFuIElOSVQgSVBJIHNsaXBzIHRocm91Z2gNCj4gPj4+IGludGVycnVwdCByZW1h
cHBpbmcuDQo+ID4+DQo+ID4+IEJ1dCB3ZSBhbHNvIHNob3VsZG4ndCBjb250aW51ZSBpbiBzdWNo
IGEgY2FzZSBhcyBpZiBub3RoaW5nIGhhZCBoYXBwZW5lZA0KPiA+PiBhdCBhbGwsIHNob3VsZCB3
ZT8NCj4gPj4NCj4gPg0KPiA+IE5vdyB0aGVyZSBhcmUgdHdvIHByb2JsZW1zOg0KPiA+DQo+ID4g
MSkgQW4gaW5ub2NlbnQgVk0gaXMga2lsbGVkOw0KPiA+IDIpIFRoZSBzeXN0ZW0gY29udGludWVz
IGFzIGlmIG5vdGhpbmcgaGFkIGhhcHBlbmVkOw0KPiA+DQo+ID4gQW5kcmV3J3MgcGF0Y2ggZml4
ZXMgMSkgd2hpY2ggaW1vIGlzIHdlbGNvbWVkIGFueXdheS4NCj4gPg0KPiA+IDIpIGNlcnRhaW5s
eSBuZWVkcyBtb3JlIHdvcmsgYnV0IGNvdWxkIGNvbWUgYWZ0ZXIgMSkuDQo+IA0KPiBUaGF0J3Mg
b25lIHdheSB0byBsb29rIGF0IHRoaW5ncywgc3VyZSwgYW5kIGlmIHlvdSBhZ3JlZSBpdCBtYWtl
cyBzZW5zZQ0KPiB0byBhZGRyZXNzIDEpLCBJIHdvbid0IGdvIGFzIGZhciBhcyB0cnlpbmcgdG8g
YmxvY2sgc3VjaCBhIGNoYW5nZS4gQnV0DQo+IGl0IGZlZWxzIHdyb25nIHRvIG1lIC0gMikgd29y
a2luZyBwcm9wZXJseSByZWFsbHkgaW5jbHVkZXMgMSkgcGx1cyB0aGUNCj4ga2lsbGluZyBvZiBh
bGwgb3RoZXIgaW5ub2NlbnQgVk1zIHRoYXQgd2VyZSBydW5uaW5nIGF0IHRoZSB0aW1lLg0KPiAN
Cg0KSSBmZWVsIHRoYXQgMikgd2lsbCBiZSBkb25lIGluIGEgd2F5IHRoYXQgdGhlIGFkbWluIGNh
biBjaG9vc2UgdGhlDQpwb2xpY3kuIEl0IGNvdWxkIGJlIGtpbGxpbmcgYWxsIFZNcyBvciBpbiBh
IG1vZGUgd2hlcmUgZnVydGhlciANCmRpYWdub3NlIGlzIGFsbG93ZWQuIEdpdmVuIHRoYXQgcGFy
dCBpcyB1bmNsZWFyIGF0IHRoaXMgcG9pbnQsIEknbQ0KaW5jbGluZWQgdG8gYWNrIDEpIGZpcnN0
Og0KDQpSZXZpZXdlZC1ieTogS2V2aW4gVGlhbiA8a2V2aW4udGlhbkBpbnRlbC5jb20+DQoNClRo
YW5rcw0KS2V2aW4NCg==


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 06:09:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 06:09:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291378.494493 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUjKU-0000WZ-Ny; Thu, 17 Mar 2022 06:09:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291378.494493; Thu, 17 Mar 2022 06:09:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUjKU-0000WS-Kw; Thu, 17 Mar 2022 06:09:46 +0000
Received: by outflank-mailman (input) for mailman id 291378;
 Thu, 17 Mar 2022 06:09:45 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3VDd=T4=intel.com=kevin.tian@srs-se1.protection.inumbo.net>)
 id 1nUjKT-0000Vz-Bx
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 06:09:45 +0000
Received: from mga07.intel.com (mga07.intel.com [134.134.136.100])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d590aae1-a5b8-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 07:09:44 +0100 (CET)
Received: from orsmga008.jf.intel.com ([10.7.209.65])
 by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 16 Mar 2022 23:09:41 -0700
Received: from orsmsx603.amr.corp.intel.com ([10.22.229.16])
 by orsmga008.jf.intel.com with ESMTP; 16 Mar 2022 23:09:41 -0700
Received: from orsmsx609.amr.corp.intel.com (10.22.229.22) by
 ORSMSX603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21; Wed, 16 Mar 2022 23:09:40 -0700
Received: from ORSEDG601.ED.cps.intel.com (10.7.248.6) by
 orsmsx609.amr.corp.intel.com (10.22.229.22) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21 via Frontend Transport; Wed, 16 Mar 2022 23:09:40 -0700
Received: from NAM10-DM6-obe.outbound.protection.outlook.com (104.47.58.105)
 by edgegateway.intel.com (134.134.137.102) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.1.2308.21; Wed, 16 Mar 2022 23:09:40 -0700
Received: from BN9PR11MB5276.namprd11.prod.outlook.com (2603:10b6:408:135::18)
 by DM6PR11MB3802.namprd11.prod.outlook.com (2603:10b6:5:143::30) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26; Thu, 17 Mar
 2022 06:09:38 +0000
Received: from BN9PR11MB5276.namprd11.prod.outlook.com
 ([fe80::c8aa:b5b2:dc34:e893]) by BN9PR11MB5276.namprd11.prod.outlook.com
 ([fe80::c8aa:b5b2:dc34:e893%8]) with mapi id 15.20.5081.014; Thu, 17 Mar 2022
 06:09:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d590aae1-a5b8-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;
  t=1647497384; x=1679033384;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-transfer-encoding:mime-version;
  bh=wN7koKXZBXPWqPTLF/mnwgFdVLMxZ59WtsUHzv8TZV4=;
  b=ctn4ez1kCvU9kpGytJ5/NDPzafShVAbUtbpnk51CLIhyFc5ZWLP+FgWw
   fHropeO+nEq82WguwT7+erisjMTLb7eKSB5w4eT4JFhJGIj5Tr7NBN/Rb
   IGTCuU8gcNEDaD5qRv2vnaocYM8/2MB+oa9laPPb4Vx6QcFBx1iqu0DqK
   IoMyNV/f7yF86rjZXPmq7BQCJA2hj9bHvl9wIru5uqy2SPW4A+HGta3K6
   JxjPBNxDbiak0yMyVRzveZxKZtbNCpU8vH3IQz063QCbHstEYbHf/bnAl
   KxkKGOAXValB7mkYlLmc4gtY94Wpvhf+2DV8es85sedOjACn4oWgGjovn
   A==;
X-IronPort-AV: E=McAfee;i="6200,9189,10288"; a="320002951"
X-IronPort-AV: E=Sophos;i="5.90,188,1643702400"; 
   d="scan'208";a="320002951"
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.90,188,1643702400"; 
   d="scan'208";a="557793751"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=jcWc3JrjhN2hBV7FKdzrh4l1yVlX7EsS14qUCGG1QgD/hcxW187+FbCOKxtcmSqGuoAk2/dVJn0zFm3N3CCpOTdqihlodbHNsvsmHnvrgeg/Hg8YXPr7/Zc7Dt4xROMs8F/wUyPax5X6fy9j7OzK9+VbrOec/zCRhS8khnL3b8gSm9TyMzOlZ1275ShhCyjeRn0Jy3VpjlbGRdtZqjvdxl8VS8JDvBgIqUCwkk5FWXkvmZ3ZPx/eQ/WYRZjENIvO8brrGyp2EjL1F2U2Bb3IfDc51BzQ8RYsSFzB9xQ3SUrkIGix4MySeTcBmrvVtMu2sOvXg1x08URg6Ew1olmXOA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=wN7koKXZBXPWqPTLF/mnwgFdVLMxZ59WtsUHzv8TZV4=;
 b=UA1fWIUf5s2Krewk5WLlbsw4jprRNIOs3DbPTmWOyf3SzyuWjkKXcdzOCSjzztAd8YKk0asBfWIhMdK5nt/8uRt7iNu3LP8rXekRZQGmmSy/GWhGYmFcXw3yZNH1rodmcH7nJ4hqxxFZzddPRhaFJpR7VB9HUi1R4hv3wEuTzDxW0CSB9+WR2JZmsF/hZjzaaLABkcrCsHp5lkJc4A1RUEThldMzccHtooL5Cbzxg7r48+3KdjOT6VQkF1TCMcoeIW1+lpBedX7v7Z6pgTz1rhGkHDIZEhTz0xLtJhFSQ9TOc7ZUPi+KG+JB3FnYCcuyF1S1MrkTMRTn33tYV8nXfA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com;
 dkim=pass header.d=intel.com; arc=none
From: "Tian, Kevin" <kevin.tian@intel.com>
To: Tamas K Lengyel <tamas.k.lengyel@gmail.com>
CC: "Lengyel, Tamas" <tamas.lengyel@intel.com>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "Beulich,
 Jan" <JBeulich@suse.com>, "Cooper, Andrew" <andrew.cooper3@citrix.com>,
	=?utf-8?B?UGF1IE1vbm7DqSwgUm9nZXI=?= <roger.pau@citrix.com>, Wei Liu
	<wl@xen.org>, "Nakajima, Jun" <jun.nakajima@intel.com>
Subject: RE: [PATCH] x86/hvm: Include interruptibility state in hvm_hw_cpu
Thread-Topic: [PATCH] x86/hvm: Include interruptibility state in hvm_hw_cpu
Thread-Index: AQHYNK72F/eE81SIoUqvccI09xMIhKy+fRzggABTaICABE+GoA==
Date: Thu, 17 Mar 2022 06:09:38 +0000
Message-ID: <BN9PR11MB527623CD66F0F606BD0CF5F98C129@BN9PR11MB5276.namprd11.prod.outlook.com>
References: <05d0a5b5c18d667a5527e6f834347f54a10309da.1646937728.git.tamas.lengyel@intel.com>
 <BN9PR11MB5276E96E39209EDCCED5E9198C0F9@BN9PR11MB5276.namprd11.prod.outlook.com>
 <CABfawhmZLyZdSbK0sr4t_WoYx6uYOV2bH89bX4ET0kzeQiY0-A@mail.gmail.com>
In-Reply-To: <CABfawhmZLyZdSbK0sr4t_WoYx6uYOV2bH89bX4ET0kzeQiY0-A@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
dlp-version: 11.6.401.20
dlp-product: dlpe-windows
dlp-reaction: no-action
authentication-results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=intel.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 7b1c8063-cb3c-446e-2205-08da07dcb7da
x-ms-traffictypediagnostic: DM6PR11MB3802:EE_
x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr
x-microsoft-antispam-prvs: <DM6PR11MB38025E79F4AFC24522DEB47F8C129@DM6PR11MB3802.namprd11.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BN9PR11MB5276.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(7696005)(6506007)(83380400001)(53546011)(33656002)(9686003)(52536014)(55016003)(5660300002)(2906002)(8936002)(122000001)(38100700002)(86362001)(76116006)(71200400001)(64756008)(66556008)(66476007)(66446008)(66946007)(38070700005)(508600001)(82960400001)(107886003)(4326008)(26005)(186003)(54906003)(316002)(6916009)(8676002);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?YzVDOXdnLy8rSFUrTWsxd3RSd2VGemxtb0cxNnpxNnVPVGlCQ2dOMFQvdHJa?=
 =?utf-8?B?UE5YV1orNXd0OTROcitkVVFUeUlEM2FLMEhOaUlUcDNjRllHRkQ4akZXTEpV?=
 =?utf-8?B?VmcyaE9rQUJBdkZOWlRLNG43VEtqRGhrd29IMWN2M2Y1ZDNqd2Ficm5HRSs4?=
 =?utf-8?B?MHZWZjVxRGpLYzNUWDJ6engxMU1qU2lSVzNZOU4ycnE4b0EvVFlmam9mQmRW?=
 =?utf-8?B?UXFkWlJFbkdzTVl0ZDhTb2g4QXZLcEJ2VmV2c1JTbzlLQlA5THZmQURGajI5?=
 =?utf-8?B?aWxuQmNnc1VJSFArSWRLNjVTaU90WXByTzJKOEN5SkpSNmhYSm00bk1BYU9T?=
 =?utf-8?B?bHJMVjJmTzZNK3U0aUJYVDV3K0tBbDNQSGlQeHFFc0c4VGFpYWhrSjFmVTJP?=
 =?utf-8?B?RGtSVzltaWRHUlgxY0lERkZuZ1Q5b1pBeFJtNGcxdU9PLzd6d3NqNFBnWFhK?=
 =?utf-8?B?Nml2aE5hcWhrS2EzWFJwWW5Ta2g4TWZ0TXh2NXI5d1dEUWlTaTVtTnZhNytN?=
 =?utf-8?B?NWc2SXYvQnNUaTJpcTVkZVBuU2U5VGdObkxVUEc4NmZkazM1K2lhLzNsNFlQ?=
 =?utf-8?B?UkFtdlg3MGFDWXp2OWlKUkFTbG1oWVQxSEEzajhQMVUxKzZnVGxESUVLdWJ0?=
 =?utf-8?B?MEhyMnpneFBOTXpDOEdKSEdDMENSMWFoVFNBK3RwUzBPenVMTFhXLzRpTm40?=
 =?utf-8?B?aGZlTzRsNDJGVjlqOW1TdTJmMW1qbXQ0bVRKYzBEaXVsMURyTXphR0FVM28x?=
 =?utf-8?B?OXVnRWxZcnBwc3BPenpzRm5UYUZXblJoekVPRGpVaGw2Rm5NeXZRVFltYlda?=
 =?utf-8?B?NDRkcWpYSDR0RTBYdWp5RTBtUzlNZkg2am5lMHM4WWpqV3E0WDE2MDlYUkhv?=
 =?utf-8?B?VUJTajZpU29qNkRkWmVnVER2RG1DUnJKOGdWeGgrYUs1WkpkSTBINURtQnJl?=
 =?utf-8?B?azN4VVpPdkhaeHNFL0p2ZW5IRGRMN0REQXBqYThicmhZOCtaY1NGWEgzSkRF?=
 =?utf-8?B?TjFtWUQwS0lSd2xxQ1l6b0xTajFIdUFsTkFrYWpUMEt5cW16cFMzY0lkZFY3?=
 =?utf-8?B?MlRBYlVLZHZuZDdrSmJxMlZVSmFSMy8yY2xvRnVyZnNndkVXQWxQSnMxaDdx?=
 =?utf-8?B?YXQzMm9McUNEeHpUYWVNREVMbkxzUVlEb1pOSGduc04ydXRMMUxMOWxzVmhl?=
 =?utf-8?B?dEhlTW5DY0pEQUVRWFg3eDZHRWFndkU3OXNFS0tIR3NJTEViLy85L21WOG9j?=
 =?utf-8?B?MERQSEhyc3hKQWNDZTQzcWJKTWlpOW1mdi9QbnI5WUtVbFdOZFdsS2M1MDBn?=
 =?utf-8?B?ODREajd6NjZEcVdIaXFhRmJLMkZYT09hSnBrRFlDa0N1Um9PR3Z1U1dkNDR1?=
 =?utf-8?B?WUxINiswTmttTXBNZ2o2anpQdEUyVFY5S1JVTVpEMDFKUFB3ZTVHbVpoKzhR?=
 =?utf-8?B?cXRiK1A3MWhaZWI4Z09hcklLU3hRMnc2eVU2RmtCWE9vT0hSZlduMXdqMGxi?=
 =?utf-8?B?SzlPV2MyQk1hakFtWFd1aDBoVldHMzZaRWw4WnZtK2Y4b2IrcHVDVzV3QUh0?=
 =?utf-8?B?SWdKT3JUS2F0V050SDB2K052a1ExTk0rL09uekpDclpGa3hJL0FqN3I1VGZB?=
 =?utf-8?B?b0ljQVJyazlNbkxDQ2ZuV1VBK0psak1hdE9ZMmpSVy9JSGZWY3BhMUFBM1dl?=
 =?utf-8?B?ZUlVRkNFRjN1MnRrSUQraVhhV0xQcDdUd2RpeXR5L1pNRDd1dTVST2RNU3dp?=
 =?utf-8?B?MTUxaFRWcDBSR0lqMWFxZ3prN0hBOEhrd1BxOTNDN0hMYjlCVTJmWEVHV3hE?=
 =?utf-8?B?M0pNbTNNYXdoWkV2dVVWMERoQnFrcklDNGJsb1lVZ1dmWWxYUUhiVEczT0JN?=
 =?utf-8?B?b01XN3RLSnN2dkxkR0tyci9zUDd3L0Z5dGtFZ3VSRm5JNVVVaHN2eGV4Z2Fl?=
 =?utf-8?Q?Jh3HgsMY6oSlB0clxvWpQKU544tGKOC8?=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN9PR11MB5276.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7b1c8063-cb3c-446e-2205-08da07dcb7da
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Mar 2022 06:09:38.3353
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: o7sqLKTMbaH89b3fwgGbjrsHxRUCLgGD7fkJdqorrcZZB/YlMSyCiJI9jil2pzh76mhYaYBHSGSmOjYjs80pVQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR11MB3802
X-OriginatorOrg: intel.com
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From xen-devel-bounces@lists.xenproject.org Thu Mar 17 06:12:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 06:12:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291381.494504 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUjMv-0001sp-58; Thu, 17 Mar 2022 06:12:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291381.494504; Thu, 17 Mar 2022 06:12:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUjMv-0001si-1x; Thu, 17 Mar 2022 06:12:17 +0000
Received: by outflank-mailman (input) for mailman id 291381;
 Thu, 17 Mar 2022 06:12:15 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3VDd=T4=intel.com=kevin.tian@srs-se1.protection.inumbo.net>)
 id 1nUjMt-0001sX-5X
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 06:12:15 +0000
Received: from mga05.intel.com (mga05.intel.com [192.55.52.43])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 2e7ba7a9-a5b9-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 07:12:12 +0100 (CET)
Received: from orsmga003.jf.intel.com ([10.7.209.27])
 by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 16 Mar 2022 23:12:10 -0700
Received: from fmsmsx601.amr.corp.intel.com ([10.18.126.81])
 by orsmga003.jf.intel.com with ESMTP; 16 Mar 2022 23:12:09 -0700
Received: from fmsmsx605.amr.corp.intel.com (10.18.126.85) by
 fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21; Wed, 16 Mar 2022 23:12:09 -0700
Received: from FMSEDG603.ED.cps.intel.com (10.1.192.133) by
 fmsmsx605.amr.corp.intel.com (10.18.126.85) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2308.21 via Frontend Transport; Wed, 16 Mar 2022 23:12:09 -0700
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (104.47.66.48) by
 edgegateway.intel.com (192.55.55.68) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.1.2308.21; Wed, 16 Mar 2022 23:12:09 -0700
Received: from BN9PR11MB5276.namprd11.prod.outlook.com (2603:10b6:408:135::18)
 by CY4PR11MB1829.namprd11.prod.outlook.com (2603:10b6:903:124::11)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Thu, 17 Mar
 2022 06:12:07 +0000
Received: from BN9PR11MB5276.namprd11.prod.outlook.com
 ([fe80::c8aa:b5b2:dc34:e893]) by BN9PR11MB5276.namprd11.prod.outlook.com
 ([fe80::c8aa:b5b2:dc34:e893%8]) with mapi id 15.20.5081.014; Thu, 17 Mar 2022
 06:12:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2e7ba7a9-a5b9-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;
  t=1647497532; x=1679033532;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-transfer-encoding:mime-version;
  bh=Q4ENddaUx/bUDeC3qYEfcwx/vy1LKYr46FFO4X1mPIo=;
  b=JdFUQ2/4bsi5PQX6McOGnG0YEdSMBa6ogvenkrMHBH99GCUhyRfywgza
   cUztx2XELOJzT0xZNpuINGpCkc689lk9iOH5GtUsyQs8tchY3Xj67ojFT
   rEXdi2207Hd+QhJj08qlQT5CU6TGdY5nv3W9wI8khlMQ5V2kMpjxdlITM
   xINeud45K4h3I3onjOsIIhsqxsaSE2nRbv55g9lSXf0hqnpkXqw6tUC3c
   r/rH4mzRthUQEvmS9dJymhxhDHkftUKB7qu12vHsv6EEyg1FOdouK9heR
   AKOw15AEpS5sHCV0DM/813NaEv6d2nt4BE8IAfd4hdwXVeqHGoMqjjBi9
   Q==;
X-IronPort-AV: E=McAfee;i="6200,9189,10288"; a="343228217"
X-IronPort-AV: E=Sophos;i="5.90,188,1643702400"; 
   d="scan'208";a="343228217"
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.90,188,1643702400"; 
   d="scan'208";a="498721335"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=EcocA+ijsMluq2QMY/Ru26ZZeoYsNdchD0Txq1K0s8kNe8FXYRPsMMliK73oUbgGp0eViqYBm+gB+17jycvBxthKBTnWUqeaXShhLDEYNX3iSu1CtKS59xk3j6JX776WPUviExSz51z9YH/ihiH6ZxSVVNUJw9SUhO+Lyu3Nm9X7CqLOavOedI+weSbj/ZipUMAYy+8PIDXYRMaIDqfPz6QumX4tvBYPN5j9OgzWy0G1g+LlFBw/jKW3O+Ibg7n4lc306MYuFDKTzdJcArKDPaY3cwaxoT1ypJSaad918uhnrxvlQ3m5gkp4bF0b+7juCsqMRVy/hzsuaQ/0W5V63g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Q4ENddaUx/bUDeC3qYEfcwx/vy1LKYr46FFO4X1mPIo=;
 b=dM0p4n5nbMejMJwvWJrO9TnmhXLq5EnCIpvGfSCbiLwctDBnKTrz/DcZnqwQ+bmLMD7h9+AEzXpt1694HXbrVSR+6o3IvbYHBzseejLHgVMBqXQjaxeIQP3Ra2Uh5VR4x2JdjcDFITq9qe3s4WZH9wbRAvOvCQgEi4ul6ySkkWbljhZL7i+lymKUj94/YXxbUlJ/D3yWX2oOl+N1QuGm73odnnhfIUuK/QA7b3UjO/rA/91pV9DayIxgtY5WLUzDVwjRGLAoCMG402gp591Bg9x7LPjRDhi4Ip69UXw1isgMYko2i+1j7oZKvlfrexa8AWTgv2B+/gXZ1aVCcn8Jow==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com;
 dkim=pass header.d=intel.com; arc=none
From: "Tian, Kevin" <kevin.tian@intel.com>
To: Jane Malalane <jane.malalane@citrix.com>, Xen-devel
	<xen-devel@lists.xenproject.org>
CC: Wei Liu <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>, "Gross,
 Jurgen" <jgross@suse.com>, "Cooper, Andrew" <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>, "Beulich, Jan" <JBeulich@suse.com>,
	Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, Bertrand Marquis
	<bertrand.marquis@arm.com>, "Nakajima, Jun" <jun.nakajima@intel.com>,
	=?utf-8?B?UGF1IE1vbm7DqSwgUm9nZXI=?= <roger.pau@citrix.com>
Subject: RE: [PATCH v8 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Thread-Topic: [PATCH v8 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Thread-Index: AQHYORZzW1HbDqXDDkezKIlkax4dHKzDGQUw
Date: Thu, 17 Mar 2022 06:12:06 +0000
Message-ID: <BN9PR11MB5276A2530409A5DF781FED218C129@BN9PR11MB5276.namprd11.prod.outlook.com>
References: <20220316091315.19281-1-jane.malalane@citrix.com>
 <20220316091315.19281-2-jane.malalane@citrix.com>
In-Reply-To: <20220316091315.19281-2-jane.malalane@citrix.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
dlp-version: 11.6.401.20
dlp-product: dlpe-windows
dlp-reaction: no-action
authentication-results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=intel.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 838e7742-bc9d-4cdd-25e3-08da07dd105d
x-ms-traffictypediagnostic: CY4PR11MB1829:EE_
x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr
x-microsoft-antispam-prvs: <CY4PR11MB182998A313A42730288CB9748C129@CY4PR11MB1829.namprd11.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BN9PR11MB5276.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(30864003)(5660300002)(83380400001)(66446008)(66476007)(8676002)(64756008)(66556008)(38070700005)(4326008)(76116006)(66946007)(508600001)(71200400001)(110136005)(7416002)(52536014)(54906003)(33656002)(82960400001)(26005)(122000001)(9686003)(8936002)(2906002)(6506007)(7696005)(86362001)(38100700002)(316002)(55016003)(186003)(21314003);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?QWVseUpnQWVXRDl3UE92dW1wRHYxL2ZpSXlZem1hMGZ0cXZiQkIxbFErVEhU?=
 =?utf-8?B?UUxBK0pSdGtOWjczSHByV3ZaWnNSV205WDFJei9ZWDhWRDZxRno2MmtUdVdh?=
 =?utf-8?B?TnVsdGR5MkxmY1dkZEJwSzV2YS9XVUtrVjFDNG9oU2lFNmw2c0JwQm5PSkoy?=
 =?utf-8?B?MGZYRXZjckFJWlp2bmlCZnJEd3Izei92aWlrMWdlQTNGQzdWQ2dmMlFSdi9V?=
 =?utf-8?B?Vk1KNVo2OXQ0ZVN1OFBzOFp1TmhHWXo4ei9FanRNZ3ZVM1UybkJINDZnc1Nx?=
 =?utf-8?B?SjdTOXh4ZWowZFZKZlh3WW9aQkMyL0R6YTZocVZ1NWRackF2TjgzNWg3a3Bq?=
 =?utf-8?B?UmJrK01ObDRyVlVMSS9Qd0U5bGhJNW02MGlJT3E0SDI2alo3bi82S29qaXMz?=
 =?utf-8?B?bmd2SmZRcTEwaDJGYjZSN0Z0a3JkTlM2cnd0SzN0MThFQ2NIU1NoUHVMTGhY?=
 =?utf-8?B?bmhQcmFtMUJkQzgwTGFSNHovVUErbTFNVmEyMVVnUFIzY1Nscjgwd3NPeDNu?=
 =?utf-8?B?dy9xUWFJREd0NmpjV2xPc1l0R2p4bXl1d3plWGRxMlFMVHVkNFpPMWNWYWJR?=
 =?utf-8?B?T05STWNGRTAyZnUwMG94ZnpDKzRKUXZyN2hlNVc2Z3dpV2ErYlJvMG1rbkN2?=
 =?utf-8?B?WCsvNHMrSjNxekRvdmZKZ3BYNkdsSnZMZ3ZpN0xxQVYxNkdqSUlsMGV6dWVM?=
 =?utf-8?B?b0xHWnlXd1ZHQnNRSEl5V3BSYlFYb2h5U01qSzRuSnVoRFc5VkdNZUZSTWdU?=
 =?utf-8?B?Yzk1NnFkODcrMmVPY216dXFDdVpkZzQzZnpjRVJIR09kdTBJTXdlMUE2VUo1?=
 =?utf-8?B?MUFCUjJxY1ZKb04xUzRWdjZFdjBNbFAvUHRnTWNkaHVQbGJQQTRlWnRlSWtk?=
 =?utf-8?B?b1l2Mm5IdW9DbTNKYUZMUGdxMUVUMGVIbWZaWnZtS0JSZkJUMElneS9vVmp4?=
 =?utf-8?B?T2ZXZDBFUTV6ZHZDN2VtbFRtaE1PeERoSEMzL2pNaHA1WkRJcUx6UWdMWDQ4?=
 =?utf-8?B?UXdGclpCajFCVHpuaEZWbGZBYkl2S2lQN2xhd1ZKT0ZoUUY2VmpONkNBS2Q1?=
 =?utf-8?B?MFBWWE91a24yRitrQTBKNmViVVhISUUvTmt5bFFCWjJ1S3I0UU9zdDhYYmw0?=
 =?utf-8?B?dmFHTDh3UmhOU1l3eFUvcEx3b293VUdNbGc4NkV0TTcvQzBYdXBPZUd6ZWpr?=
 =?utf-8?B?YXNZbWJOWHRvbkdJckp3RElLUDVjc0R1dGJZNTMwdEpsOCt2SFR0cW14Wmxk?=
 =?utf-8?B?TjNtL1NVN1hvYlI2TExWN3lDa2VLcGhDMjZKT0xmY2o3dDN5bkg4c2Y4ZGE4?=
 =?utf-8?B?SGViTUN1c2FhdG9iMVlKOFprRXF3VlBkOU5Fei9lNjE5T1FWOVpiUGZjM1l0?=
 =?utf-8?B?NUE2ZUJ2VE8weXZwQkRqK3E5aVh5emdOdEY1NHFaeThSMWVrQkR4bjE5OVV5?=
 =?utf-8?B?cFNkdTV1K0I3RThabVBRaW84QW1VWkZscllZbkE5QjBKUHpYTXdiZnk4Y25w?=
 =?utf-8?B?Sk4vRVdvMEZzdFBISyttc1ZnWXdqOUYzenJqVmIzenQyd1NyZDdDM3c1L1p3?=
 =?utf-8?B?RDVTa0lNQXFWbnRJMU94M3BMOWRKVTVLWHYzVXpIbTJHUFBpVHRlb3NTRGNG?=
 =?utf-8?B?eE05V3hkc3BXZGhmeSs0S1YzUC9iUFRiM21IYXgwM21LRDM5eHR4dE5FWkRR?=
 =?utf-8?B?cFZhdTg0SEgxVDJ5ZmJsdnBIYUVrbUN4Wk1xMWVQenR5Si9ISE4wZDNZLzFs?=
 =?utf-8?B?SlhERmpRb2xEWjZWeGdCa1FQc1BuN2phd05oTUphMzNVVTQ3aUw2NlppdzFn?=
 =?utf-8?B?cVlHNTRzenBoSDFSRllYZHdCakVIMVlCWFNlZFpyb1JVUFpkM3BVaFFhOGR2?=
 =?utf-8?B?aHFhUktxeTFCRkZrSnh4NEt6d1c5b0crMGVSLy9Gc2V3UDFENlpWcTVBUkhQ?=
 =?utf-8?Q?OP1JYRlQgWszk1qgT7Jt49eRDjWtyW8W?=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN9PR11MB5276.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 838e7742-bc9d-4cdd-25e3-08da07dd105d
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Mar 2022 06:12:06.8021
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: y4/Y2Q54EprNe4Ixxq0btuVZlFnQwJOTGOhaPyPwmJvCkIMA0kKWzZCQhKKXl4rkJLwavRJJYsjvOMFE9g5ZfA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR11MB1829
X-OriginatorOrg: intel.com
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From xen-devel-bounces@lists.xenproject.org Thu Mar 17 06:28:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 06:28:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291389.494521 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUjcL-0003Wq-OF; Thu, 17 Mar 2022 06:28:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291389.494521; Thu, 17 Mar 2022 06:28:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUjcL-0003Wj-LD; Thu, 17 Mar 2022 06:28:13 +0000
Received: by outflank-mailman (input) for mailman id 291389;
 Thu, 17 Mar 2022 06:28:11 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=31/0=T4=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nUjcJ-0003Wd-I8
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 06:28:11 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6a11b4ad-a5bb-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 07:28:10 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 774F71F390;
 Thu, 17 Mar 2022 06:28:09 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 2D78A13B5B;
 Thu, 17 Mar 2022 06:28:09 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id a5e4CfnUMmJfTgAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 17 Mar 2022 06:28:09 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6a11b4ad-a5bb-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647498489; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=l46J9Xru5lxaBROA1BJkncApOixQ/U5xA4PiRKXbwqA=;
	b=ifDsjhPkSoDVYG+oR3YuYc5ctVypNDST7mfHwzNMJTaPPXk8Fg2mYzX8bgGZo8JFqtc7GM
	Fea807mFt2RSyGmV7LjOyuLOUNlqfjIEK5cgOi+Wv6JFPH46WQReGYf20v+QEhfImGIaRV
	SpcN0GgYyi6QmhRpglwwhzQ/Qtx5Oz8=
Message-ID: <cb193980-c3e2-23ae-df4d-d0fb2e8da65c@suse.com>
Date: Thu, 17 Mar 2022 07:28:08 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Content-Language: en-US
To: Raphael Ning <raphning@gmail.com>, xen-devel@lists.xenproject.org
Cc: Raphael Ning <raphning@amazon.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Wei Liu <wl@xen.org>, David Vrabel <dvrabel@amazon.co.uk>
References: <6b84a20b2753130cc62406a0fd14d2708f6f504b.1647455219.git.raphning@amazon.com>
From: Juergen Gross <jgross@suse.com>
Subject: Re: [XEN PATCH] evtchn/fifo: Don't set PENDING bit if guest
 misbehaves
In-Reply-To: <6b84a20b2753130cc62406a0fd14d2708f6f504b.1647455219.git.raphning@amazon.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------CoXc84h21r0Z99y06de166ht"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------CoXc84h21r0Z99y06de166ht
Content-Type: multipart/mixed; boundary="------------HxTdQASlXDUdDkKrMidFsQxr";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Raphael Ning <raphning@gmail.com>, xen-devel@lists.xenproject.org
Cc: Raphael Ning <raphning@amazon.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Wei Liu <wl@xen.org>, David Vrabel <dvrabel@amazon.co.uk>
Message-ID: <cb193980-c3e2-23ae-df4d-d0fb2e8da65c@suse.com>
Subject: Re: [XEN PATCH] evtchn/fifo: Don't set PENDING bit if guest
 misbehaves
References: <6b84a20b2753130cc62406a0fd14d2708f6f504b.1647455219.git.raphning@amazon.com>
In-Reply-To: <6b84a20b2753130cc62406a0fd14d2708f6f504b.1647455219.git.raphning@amazon.com>

--------------HxTdQASlXDUdDkKrMidFsQxr
Content-Type: multipart/mixed; boundary="------------o7BfRg4EenAv8SGBMEsAqiph"

--------------o7BfRg4EenAv8SGBMEsAqiph
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------o7BfRg4EenAv8SGBMEsAqiph
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------o7BfRg4EenAv8SGBMEsAqiph--

--------------HxTdQASlXDUdDkKrMidFsQxr--

--------------CoXc84h21r0Z99y06de166ht
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIy1PgFAwAAAAAACgkQsN6d1ii/Ey8p
Cwf+IEQU0tD8lPbUz0Tmx9C1frorTTFv5FasQTMEaz2ZB0PO26lhss8ymsTN2V/Am9y87jzaeYq2
sGVpNaT7NEvGWzTRNr/+rNmREpOyCg9hleqpWghJyIlF7Locmte/sEnY6wWDMRqkQDWpSHe0dVeK
rUk6AShTSCc+B58Ft5REm9VO7kqFkva86RzD0cQgkH+Avm/BdRiIfVzvI7T6Tx6c3r/ejOaUQFeA
PPhrCiAp67gqURIgoDrAyn//0rbBZgFJa1+uWdlleRhx3MIcidGfG4TTvR8d5N2Oc/5Qj8yI6FJo
w4P2Eq/3zlmTxvArroYAS5EkDy5zPb4gOlduLFCAHg==
=/86i
-----END PGP SIGNATURE-----

--------------CoXc84h21r0Z99y06de166ht--


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 06:33:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 06:33:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291392.494532 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUjhR-0004vV-C2; Thu, 17 Mar 2022 06:33:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291392.494532; Thu, 17 Mar 2022 06:33:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUjhR-0004vO-8y; Thu, 17 Mar 2022 06:33:29 +0000
Received: by outflank-mailman (input) for mailman id 291392;
 Thu, 17 Mar 2022 06:33:29 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUjhQ-0004vE-UL; Thu, 17 Mar 2022 06:33:28 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUjhQ-0003SM-ST; Thu, 17 Mar 2022 06:33:28 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUjhQ-0004eF-Eo; Thu, 17 Mar 2022 06:33:28 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUjhQ-0001Dj-EL; Thu, 17 Mar 2022 06:33:28 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=dimUl7hNKSG0uJ4hqqQvg/oVRabl5Agtov48wY96uQc=; b=tdHXXFRI4bamO4Um4ptuww3BTF
	9GrWVmBe/JTnxSbJMdm4f9jFICwsDsaX/YbCNyhGORsdBCMgRRw5g3DwuexecQWL2EE+UzqdyiHrR
	LjM01TT0xar9qbVQVeyhDsL8kR9FQqieGn9FIB+OoUHIWvDRdpfrze2Uk2xzXNtiuv5w=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168638-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168638: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-armhf-armhf-libvirt-raw:xen-boot:fail:heisenbug
    qemu-mainline:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:debian-hvm-install:fail:heisenbug
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=1d60bb4b14601e38ed17384277aa4c30c57925d3
X-Osstest-Versions-That:
    qemuu=d6f229f9a0592c4d5beb0a5c4e024231c27680d3
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 17 Mar 2022 06:33:28 +0000

flight 168638 qemu-mainline real [real]
flight 168647 qemu-mainline real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168638/
http://logs.test-lab.xenproject.org/osstest/logs/168647/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-armhf-armhf-libvirt-raw  8 xen-boot            fail pass in 168647-retest
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm 12 debian-hvm-install fail pass in 168647-retest

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check fail in 168647 like 168632
 test-armhf-armhf-libvirt-raw 14 migrate-support-check fail in 168647 never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168632
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168632
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168632
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168632
 test-armhf-armhf-xl-rtds     18 guest-start/debian.repeat    fail  like 168632
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168632
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168632
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168632
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 qemuu                1d60bb4b14601e38ed17384277aa4c30c57925d3
baseline version:
 qemuu                d6f229f9a0592c4d5beb0a5c4e024231c27680d3

Last test of basis   168632  2022-03-16 07:58:00 Z    0 days
Testing same since   168638  2022-03-16 17:09:39 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Alex Bennée <alex.bennee@linaro.org>
  Beraldo Leal <bleal@redhat.com>
  Ilya Leoshkevich <iii@linux.ibm.com>
  Max Filippov <jcmvbkbc@gmail.com>
  Peter Maydell <peter.maydell@linaro.org>
  Philippe Mathieu-Daudé <f4bug@amsat.org>
  Richard Henderson <richard.henderson@linaro.org>
  Thomas Huth <thuth@redhat.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 fail    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 fail    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   d6f229f9a0..1d60bb4b14  1d60bb4b14601e38ed17384277aa4c30c57925d3 -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 06:33:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 06:33:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291397.494543 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUjhn-0005NS-Lz; Thu, 17 Mar 2022 06:33:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291397.494543; Thu, 17 Mar 2022 06:33:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUjhn-0005NL-Ii; Thu, 17 Mar 2022 06:33:51 +0000
Received: by outflank-mailman (input) for mailman id 291397;
 Thu, 17 Mar 2022 06:33:51 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUjhm-0005N1-Vz; Thu, 17 Mar 2022 06:33:50 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUjhm-0003Sa-V6; Thu, 17 Mar 2022 06:33:50 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUjhm-0004fg-Mu; Thu, 17 Mar 2022 06:33:50 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUjhm-0001Yg-MP; Thu, 17 Mar 2022 06:33:50 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Zj+qLXqbvu0Q5jjCUeAgRHCaD9qL8MzzGYAidVt+Qa4=; b=yCg/puLOD0LdKM8qHlngpT+Js0
	EnrxW3VQqaqBqoBSoqqTO06EI8RdEh2vwTERxcSV+2DzVyW43mZAUGd9r7NQmBUdAdHIXAY2o885n
	+VsD4CLv6rjGtRgucoAj3QCnVE3sqHCb5duKHoHyXLtt/eJbe1+SKkhEgbzNPAsGJHKg=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168651-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168651: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=5b56c52b5c1cc817a1ddac7f03aa6a02aeab4c04
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 17 Mar 2022 06:33:50 +0000

flight 168651 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168651/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 5b56c52b5c1cc817a1ddac7f03aa6a02aeab4c04
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   16 days
Failing since        168258  2022-03-01 01:55:31 Z   16 days  156 attempts
Testing same since   168637  2022-03-16 13:10:25 Z    0 days    6 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 714 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 07:53:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 07:53:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291410.494554 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUkwE-00050R-Jt; Thu, 17 Mar 2022 07:52:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291410.494554; Thu, 17 Mar 2022 07:52:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUkwE-00050K-Gu; Thu, 17 Mar 2022 07:52:50 +0000
Received: by outflank-mailman (input) for mailman id 291410;
 Thu, 17 Mar 2022 07:52:49 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=JNAg=T4=citrix.com=prvs=0684b021b=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nUkwC-00050E-Ps
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 07:52:49 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3a8bef0e-a5c7-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 08:52:46 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3a8bef0e-a5c7-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647503566;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=A8ONnt8AcPoeAjNOD87dCRq3tkO8EVRp2arPjCAlSY4=;
  b=OtRs1hplnhdEjlVvtLWr2+hnQ6Uo/1LU62Fpqtu8YyF5NNf74sizTUJq
   CVgwRhUr34NZ70OFAi6g/7zPWhut9MToPXykGGurQuT7/GVhGK9Yfz4cg
   JlHTup/3m2H864WFNpW2Pbb0RFnMKSIAoRD7zaDqN58K0Pv6I6VWIJsOS
   E=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66483578
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:TmQjbKyt2WFKTxwORSR6t+fixirEfRIJ4+MujC+fZmUNrF6WrkUGx
 2tKUW3XPfrbMTPyLoggaNjg8x9QuJTdmtNhSQE6/CAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2IfhWmthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 Nplraa1bBx4L7X3nvVAWj98LDEjL4xK5+qSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DJoQQt2sm1TjEJf0nXYrCU+PB4towMDIY2J4STa2DO
 JpxhTxHYEjsegdEAXksCpsErcyMg1/vTDcHpwfAzUYwyzeKl1EguFT3C/LXZ9iLSMN9jkue4
 GXc8AzRGQoGPdaSzT6E9HOEheLVmy7/HoUIG9WQ6fpCkFCVgGsJB3U+UFqwofC9zEmkSd9bA
 0UO/2wlqq1a3FymSJzxUgO1pFaAvwUAQJxAHusi8gaPx6HIpQGDCQAsTDRMddgnv88eXiEx2
 xmCmNaBONB0mOTLEzTHrO7S9G7sf3hORYMfWcMaZRM/5vz48ZArtRTeE99FNJGl08/UFS6ll
 lhmsxMCr7kUiMcK0YCy8lbGny+gq/D1c+Il2unEdjn7t10kPeZJc6TtsAGGtqgYcO51W3Hb5
 BA5d96iAPfi5H1nvAiEW60zEb6g/J5p2xWM0Ac0T/HNG9lAkkNPnLy8AhkjfC+F0e5eIFcFh
 XM/XysLuPe/21PwMcdKj3qZUZhC8EQZPY2NugroRtRPeINtUwSM4TtjY0Wdt0i0zhRzzfxgY
 M3FKZnxZZr/NUiB5GDqLwv6+eV3rh3SOEuJHcyrp/hZ+ef2iIGppUctbwLVM7FRAFKsqwTJ6
 ddPX/ZmOD0EONASlhL/qNZJRXhTdCBTLcmv96R/K77SSiI7STpJI6KAntscl3lNwv09ehHgp
 SrmBCe1CTPX2BX6FOl9Qis6Oe21Ason8y5T0O5FFQ/A5kXPqL2Htc83X5A2YaMm5Kpky/t1R
 OMCYMKOHrJETTGvxtjXRcCVQFBKHPhzuT+zAg==
IronPort-HdrOrdr: A9a23:qRIOKKCP7OPkjYflHehOsceALOsnbusQ8zAXPh9KJiC9I/b1qy
 nxppkmPH/P6Qr4WBkb6Le90Y27MAnhHPlOkPQs1NaZLXLbUQ6TQr2KgrGSoQEIdxeOk9K1kJ
 0QD5SWa+eAfGSS7/yKmTVQeuxIqLLskNHKuQ6d9QYUcegDUdAf0+4TMHf8LqQZfngjOXJvf6
 Dsmfav6gDQMUg/X4CePD0oTuLDr9rEmNbPZgMHPQcu7E2rgSmz4LD3PhCE1lNGOgk/i4sKwC
 zgqUjU96+ju/a0xlv10HLS1Y1fnJ/ExsFYDMKBp8AJInHHixquZq5mR7qe1QpF692H2RIPqp
 3hsh0gN8N85zf4eXy0mwLk303a3DMn+xbZuCilqEqmhfa8aCMxCsJHi44cWADe8VAcsNZ117
 8O936FtrJMZCmw0xjV1pztbVVHh0C0qX0tnao4lHpES7YTb7dXsMg24F5VKpEdByj3gbpXXN
 WGNPuspcq+TGnqL0ww5gJUsZ+RtzUIb1q7q3E5y4KoO2M8pgE686MarPZv6kvouqhNDqWs3N
 60QZiApIs+PvP+UpgNdtvpYfHHfFAlEii8eV57HzzcZdQ60jT22trK3Ik=
X-IronPort-AV: E=Sophos;i="5.90,188,1643691600"; 
   d="scan'208";a="66483578"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=HHB50wz0/yrtQkajHsEUi4uM1jqPrtdqLR0gVtwIGgLrFrixvlB7vw3w9TwGTv5XY+grB/VuYnZ8bg+nNAnfEiYgu7il5o5d8Sc35SM9WHDimVAnXPUgrAFUSFrKkUNyxW46Ks4ccRCP1CCRJeyHKiKxQ8FWUUXX1hRlCp9i+sjIUilpCpovMSDqK7B65DaEbej+kicK+6k1dDP/P491jU0nKbCTmowU5iib+C4QscHnMTfbKra198dzxN12cCjEyTAdygFLXO7RKb8QPkNLH7onAM8O4kOErXZtnIjBkAbVUw2CFMsrHxiTzsQw2JKtP4+MH5P52mT2jaNEz64csQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=PoyyrdDumEhsF7RjQ9qbWjxO0DhwMSSye0BgW8p7cNk=;
 b=gzyKLMLOxb8BcfGl0lFUlTYAYWIZy+qwc8htmxxg721eaFlEZ2f1EXfPV6GVkJ0ddacRLB4ATIt90Zsym7oWcZdKTwMwdpFRlGGW2HKAiZ8XwJQsy81AiX4blitEJAwo7aTytSkRrU9UlbQ9NJ97W321bsuWfNfFFPguPSKlUtXt1m39M1RyVNSTkmbkOX110UjJms/Ska8ZPKgqSZeGMpVGVWmyIDgWBNVY9KfaXOwLJItCdee9MVBYxMPdtbsb0LJXKBr7fGxvDDFznbqMda0zKdAGef4Xi8YzOv/Zsj8682B2yQGgroKmpu/QxU/AhB3GqVhfx6l8biCLB4KALA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=PoyyrdDumEhsF7RjQ9qbWjxO0DhwMSSye0BgW8p7cNk=;
 b=oYKquuSC+iQaMmqcy85orfEDgflZyd0hnSbozGBkz+jFX80Tjjkf2+qOCsW89a7ofUqdR8tYelJHsR+JHOK+vfEC9d1NXlnycVzTo8B1H3LBcdwp6LWZAlrb6oQzE2NQJ3m+rdvH3mGKTru9qh6IRS3UkN48yAbhVPRzmBfzbNk=
Date: Thu, 17 Mar 2022 08:52:30 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Michal Orzel <michal.orzel@arm.com>
CC: <xen-devel@lists.xenproject.org>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, Jan
 Beulich <jbeulich@suse.com>, Julien Grall <julien@xen.org>, Stefano
 Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH] kconfig: detect LD implementation
Message-ID: <YjLovq90OMScqBNL@Air-de-Roger>
References: <20220314105535.13518-1-roger.pau@citrix.com>
 <14a1e221-7a55-42f5-6eb5-03b64e20e337@arm.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <14a1e221-7a55-42f5-6eb5-03b64e20e337@arm.com>
X-ClientProxiedBy: FR3P281CA0047.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:4a::10) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: e279f8fa-3b2d-4bfe-ba76-08da07eb1938
X-MS-TrafficTypeDiagnostic: BL1PR03MB5959:EE_
X-Microsoft-Antispam-PRVS: <BL1PR03MB595969F1C756E41AB473242F8F129@BL1PR03MB5959.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(6916009)(54906003)(86362001)(2906002)(83380400001)(508600001)(6486002)(38100700002)(5660300002)(316002)(85182001)(33716001)(6666004)(6506007)(6512007)(9686003)(53546011)(66946007)(8676002)(4326008)(66476007)(66556008)(26005)(186003)(8936002)(82960400001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?c1l3NFQzSkxaNUk0UXgrMjV2Rk9Tc2UzMGN5ekdlZEhXMU9tWGtnTDhiYjU5?=
 =?utf-8?B?empFNXJ0REFBaG1IM29mS2FsZmxVM2FLOUhzcnc5eHFkbDhUQVhpQ0NrTHM3?=
 =?utf-8?B?L0VUNzFUZlhla0ptRVRIZ2U0aExneXd0REJFQjBIaHZ5L3VCVlBVYXlTanNz?=
 =?utf-8?B?dmI3TEozaWN6QVdkS3hkc3Nvek1nL3B3OHI1Qmg4SzZhNW1WR2V1dHRCUVEy?=
 =?utf-8?B?U05jdUNxYlZTNDhNNURZSkxBd3RsMHJXMUN6L0s5OEFuSnYxS1ExdXgxa1hX?=
 =?utf-8?B?NTBqcVZsN0t2ZWRJajZqL3A4VEZwSHdnbGlLOVJtTUIxZGR1WFk1SWtDelNo?=
 =?utf-8?B?bnRKdUM4MzVldWE4S0xGV3Jwc1ZrbkhSQkt0bGZheC80RzYxNzVTWlUvN1Rh?=
 =?utf-8?B?N214dVF1cWtJV1FmeUhXRXdzSWdGN2lGTHFVN3V4OUhiZDdrUlBPelR6b0R0?=
 =?utf-8?B?UkpyNUtnTzBDa0JKb3V6N0NYZ2RYT2wrK3pQL2RKQUxZOEU3dXNETnp2MHZG?=
 =?utf-8?B?TFdwV3oydmtSdU95aVZ0YTcrbTQ0RjRScmVYeVZXZU5QQ2QvbTlVT2VGWEoz?=
 =?utf-8?B?SHdIWlVFWlJrck5LdzVFbm5ub1NqRGtHa2toOTI4OVl3ZE1zTHdndHowVDd4?=
 =?utf-8?B?NEhNWkVJdW41eDhPTk9aYld3Q3JPN3pOUk9sWElNN0RSbzF0RXNYNm9ZbEtM?=
 =?utf-8?B?NlZjSnVCSHV2R3lGTnA0VVVmRmJXYUlQQmVERWRnNEFrdzN0d2h6RkZ4azU0?=
 =?utf-8?B?bVZBR0VyQTh0V0xycmt4NHpQWkV1RFJFOWJ5WDRDL0svQVhvMTJ2UUVUbTVW?=
 =?utf-8?B?WlJDOGJpSnltdjB0ZE80RjNJdHFtYWgxN3lTRHQ2enNqYjB2dFFVSU1SY0RX?=
 =?utf-8?B?REdsR0tJZWt3MmRFN3hmRzg2NXBhenFnbFBRVXdaS2x1Tjg4Mnp1ZU9qWGNQ?=
 =?utf-8?B?U3crWVhsTkk0aTduM0hVbFUvWUc1MTQ1MkN6TjF3TGtFQjdZd1FQODZoR05r?=
 =?utf-8?B?NGVCc2xTREN3VXZlZ2lXQVpyc213UXhPTU02ZjBiMUpwMVZzY0ZpWVR6ZGVU?=
 =?utf-8?B?czFDUjhjZVZVZUlzSDBsTlpDMHRlZ3BZaXowdW1SL2tRUlBHQXo1ckxuSkp0?=
 =?utf-8?B?UVBHT0Qwc1NybitQektjdmU5T1VyYUtJWU53QkhKTGxWRk5VbjVkdnFMazIr?=
 =?utf-8?B?NFdSZkR2Z0k1eXVFaTNHdlpzL001d3Q3TlEvYmtaTzF2dFVOUFlFbUw0dGMv?=
 =?utf-8?B?TTV2TWo4Z1hDSjJ2QmpUVlVrbFVKWDk4cmhnKzFIMXpyMndCTkFFODRkTVdQ?=
 =?utf-8?B?bUFoWjZJRnljUlJ3aWpKR0JPcUVBajRwaGh3NzBJSHd0ZDNjanFHVXNYSFg2?=
 =?utf-8?B?M3ZMSnhTbUR0Wi9aZXgrWE9tUlpvRG9BOE5wTUJaOWE0OENuR0p6Yk1sWC9t?=
 =?utf-8?B?dTVmd3J4dmVoRVlSQlIyUmZLc2VuSERlY3NnYU9aYUhOR1V6eWp4cW9ObFRW?=
 =?utf-8?B?Y1V2TmY2eWpjWnhqeVpHS0xOalJBT3JTYUpMYTh5cUtZbURqeUUvWHAzRnFG?=
 =?utf-8?B?SUR3a2E1b2dXRExCRTZtVzdaQ1Y5TXZvdHpJT1JHK1VoV3dEdGJuZUtrbHUv?=
 =?utf-8?B?cWlCNVI4bmxyMnlvNUt5VzRHS1V0VnhUeG52LzkwUU9ZblJjOVBhenNLOVhG?=
 =?utf-8?B?VW9xNFAzSCtkT1VBd1gzUjNKMHVwcHNNZGxuNjBldXkyT3FiQU85UUszVDk4?=
 =?utf-8?B?ZXJwUHBKVkJQODM2KzdMSkxlWlJzUi9LaGtqVnQ0VzFmbHlZaXdURFNWS0gy?=
 =?utf-8?B?SEdJbDVGZXNKdm9kYmFUUzcySmhDenFQNmxUZEhWeEp1SmFJcGo3SmIySGFn?=
 =?utf-8?B?QTJMbi9LczlMSHNia1ErTzRnTzhsSGFSWXVsUUtndklkRzNSVEp6MmErUXVI?=
 =?utf-8?Q?FTVXjVgP6999Admv3FEv+HYYMC7yJNsD?=
X-MS-Exchange-CrossTenant-Network-Message-Id: e279f8fa-3b2d-4bfe-ba76-08da07eb1938
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 07:52:35.0703
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: TIeCN/RKO6ysaSAvGW4eYHXWI4KesOpIUS1aHz3qRgL9K63w4o8E0vefMFcCN+6lzMrwk59iGePcKAqiw1pReg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL1PR03MB5959
X-OriginatorOrg: citrix.com

On Wed, Mar 16, 2022 at 11:28:48AM +0100, Michal Orzel wrote:
> Hi Roger,
> 
> On 14.03.2022 11:55, Roger Pau Monne wrote:
> > Detect GNU and LLVM ld implementations. This is required for further
> > patches that will introduce diverging behaviour depending on the
> > linker implementation in use.
> > 
> > Note that LLVM ld returns "compatible with GNU linkers" as part of the
> > version string, so be on the safe side and use '^' to only match at
> > the start of the line in case LLVM ever decides to change the text to
> > use "compatible with GNU ld" instead.
> > 
> > Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
> > ---
> >  xen/Kconfig | 6 ++++++
> >  1 file changed, 6 insertions(+)
> > 
> > diff --git a/xen/Kconfig b/xen/Kconfig
> > index d134397a0b..e8d5e70d46 100644
> > --- a/xen/Kconfig
> > +++ b/xen/Kconfig
> > @@ -23,6 +23,12 @@ config CLANG_VERSION
> >  	int
> >  	default $(shell,$(BASEDIR)/scripts/clang-version.sh $(CC))
> >  
> > +config LD_IS_GNU
> > +	def_bool $(success,$(LD) --version | head -n 1 | grep -q "^GNU ld")
> > +> +config LD_IS_LLVM
> > +	def_bool $(success,$(LD) --version | head -n 1 | grep -q "^LLD")
> > +
> >  # -fvisibility=hidden reduces -fpic cost, if it's available
> >  config CC_HAS_VISIBILITY_ATTRIBUTE
> >  	def_bool $(cc-option,-fvisibility=hidden)
> 
> NIT: You do not really need to use head especiialy if grep for the beginning of a line.

I'm afraid I don't agree. We use head because we only want to match
against the first line of the output, and then we use '^' to match at
the beginning of such line. Without using head we would end up
matching at the beginning of any line present in the output.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 08:45:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 08:45:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291424.494571 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUllS-0002Qh-Vk; Thu, 17 Mar 2022 08:45:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291424.494571; Thu, 17 Mar 2022 08:45:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUllS-0002Qa-SO; Thu, 17 Mar 2022 08:45:46 +0000
Received: by outflank-mailman (input) for mailman id 291424;
 Thu, 17 Mar 2022 08:45:46 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=loIP=T4=cantab.net=dvrabel@srs-se1.protection.inumbo.net>)
 id 1nUllS-0002QS-7u
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 08:45:46 +0000
Received: from smarthost01a.ixn.mail.zen.net.uk
 (smarthost01a.ixn.mail.zen.net.uk [212.23.1.20])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a241d435-a5ce-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 09:45:45 +0100 (CET)
Received: from [82.70.146.41] (helo=pear.davidvrabel.org.uk)
 by smarthost01a.ixn.mail.zen.net.uk with esmtps
 (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1)
 (envelope-from <dvrabel@cantab.net>)
 id 1nUllP-00059Y-Ub; Thu, 17 Mar 2022 08:45:43 +0000
Received: from apple.davidvrabel.org.uk ([82.70.146.43])
 by pear.davidvrabel.org.uk with esmtp (Exim 4.92)
 (envelope-from <dvrabel@cantab.net>)
 id 1nUllO-00071h-Pd; Thu, 17 Mar 2022 08:45:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a241d435-a5ce-11ec-8eba-a37418f5ba1a
Message-ID: <0811ec9b-2bf0-89cc-027c-3edd56e1c990@cantab.net>
Date: Thu, 17 Mar 2022 08:45:43 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-GB
To: Juergen Gross <jgross@suse.com>, Raphael Ning <raphning@gmail.com>,
 xen-devel@lists.xenproject.org
Cc: Raphael Ning <raphning@amazon.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Wei Liu <wl@xen.org>, David Vrabel <dvrabel@amazon.co.uk>
References: <6b84a20b2753130cc62406a0fd14d2708f6f504b.1647455219.git.raphning@amazon.com>
 <cb193980-c3e2-23ae-df4d-d0fb2e8da65c@suse.com>
From: David Vrabel <dvrabel@cantab.net>
In-Reply-To: <cb193980-c3e2-23ae-df4d-d0fb2e8da65c@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-SA-Exim-Connect-IP: 82.70.146.43
X-SA-Exim-Mail-From: dvrabel@cantab.net
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on
	pear.davidvrabel.org.uk
X-Spam-Level: 
X-Spam-Status: No, score=-1.2 required=5.0 tests=BAYES_00,SPF_SOFTFAIL
	autolearn=no autolearn_force=no version=3.4.2
Subject: Re: [XEN PATCH] evtchn/fifo: Don't set PENDING bit if guest
 misbehaves
X-SA-Exim-Version: 4.2.1 (built Wed, 08 May 2019 21:11:16 +0000)
X-SA-Exim-Scanned: Yes (on pear.davidvrabel.org.uk)
X-Originating-smarthost01a-IP: [82.70.146.41]
Feedback-ID: 82.70.146.41



On 17/03/2022 06:28, Juergen Gross wrote:
> On 16.03.22 19:38, Raphael Ning wrote:
>> From: Raphael Ning <raphning@amazon.com>
>>
>> Currently, evtchn_fifo_set_pending() will mark the event as PENDING even
>> if it fails to lock the FIFO event queue(s), or if the guest has not
>> initialized the FIFO control block for the target vCPU. A well-behaved
>> guest should never trigger either of these cases.
> 
> Is this true even for the resume case e.g. after a migration?
> 
> The guests starts on the new host with no FIFO control block for any
> vcpu registered, so couldn't an event get lost with your patch in case
> it was sent before the target vcpu's control block gets registered?

An event that is PENDING but not LINKED is not reachable by the guest so 
it won't ever see such an event, so the event is lost whether the P bit 
is set or not.

Guests ensure that event channels are not bound to VCPUs that don't 
(yet) have FIFO control blocks.

For example, in Linux xen_irq_resume() reinitializes the control blocks 
(in xen_evtchn_resume()) before restoring any of the event channels.

David


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 08:56:05 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 08:56:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291427.494582 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUlvF-0003v7-UN; Thu, 17 Mar 2022 08:55:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291427.494582; Thu, 17 Mar 2022 08:55:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUlvF-0003v0-RM; Thu, 17 Mar 2022 08:55:53 +0000
Received: by outflank-mailman (input) for mailman id 291427;
 Thu, 17 Mar 2022 08:55:52 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RBlk=T4=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nUlvE-0003uu-31
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 08:55:52 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 0b0eb9a0-a5d0-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 09:55:50 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2112.outbound.protection.outlook.com [104.47.18.112]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-30-VGZI8ge8OESSGE-ypJANyw-1; Thu, 17 Mar 2022 09:55:48 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM9PR04MB8809.eurprd04.prod.outlook.com (2603:10a6:20b:408::9)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.15; Thu, 17 Mar
 2022 08:55:47 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d%9]) with mapi id 15.20.5081.017; Thu, 17 Mar 2022
 08:55:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0b0eb9a0-a5d0-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647507349;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=J0WQxJiYeovZM0eZB03v/+TH3KSM5K/BTwmc+se3C2w=;
	b=fH9HKAJe56BZPiZQRR6onPjNLOvkCS/bbl2fdLZOidUaCFtrfekOQS4WwkxeQQrJTykM+G
	1I2F8JOhU7K7MAvTHAml6VnJ/oK7JXmAOIGUlTI9CNYGKuEgbQqr2fF+4Eai8avBFDuBG3
	74198cSzvlaBv0qOcGL1lt7OuibIK5A=
X-MC-Unique: VGZI8ge8OESSGE-ypJANyw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=lvO2Q/+kgPIm8QxF94+/eYVeS+qGDgIC7q1PQJUNq+wEYT9EWhMchUZI7EmCxoMbHCivZoSHJs1rZ56KN3w7XoBJJFq9GmpKXdiQRQL0wHz22OF8xwo5uzkf4oAdjHKi5jIcM1940otBufd0vvjh+yMTioGcEtK129DEOemmy/W0SaGa5zf8KLD2Qp9M6xgTVtgPSIepXv9hdUoL1A/U571KRaw7x0LGuPXIvVE0fb4QqNwmwF0i2xGn4uwAYggKDzpw/HGqS6EpqLPiBIHxlurmGL6HwtGXxLta9V9KY75rVwjEtwsguB0nLdddkUfNHvkn6vjQU1B1fm4IL9zyZA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=J0WQxJiYeovZM0eZB03v/+TH3KSM5K/BTwmc+se3C2w=;
 b=nY5v90TnI8zI3Sh/wc+YkJxEfFvhL7WJVpifDXX4klp+OjM+NPKJzTQJWMQIu+Jvu9BqA/VB0GE0bfjp+x5xF0lBy27ptCDcW12cAm0R7RjIC27hRf+rBhrDLjbhqP3hT/4H7tuh7IO0DRnjnGapKeuZNhuwCwco56TvfabE4icS9B2oRKImpGs7e9c/P4EYLJhVmmCxe1FcR8M6OT3RZpCkDTQXBGECELVoVc9s/y3UmD+JtP9AuzrB5BwbcaRNr9oH7bwArk1LBpTBCnVE5Hf8saGbS4F0PmHvSyAgJk5aLYm13+n+cwmFPwzK7zWFyu7EGTxO9WKiAG0U0WrXkA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <ba5f6a5f-2acf-cc9f-e371-3fd334442318@suse.com>
Date: Thu, 17 Mar 2022 09:55:45 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v3 20/23] VT-d: free all-empty page tables
Content-Language: en-US
To: "Tian, Kevin" <kevin.tian@intel.com>
Cc: "Cooper, Andrew" <andrew.cooper3@citrix.com>, Paul Durrant
 <paul@xen.org>, =?UTF-8?Q?Pau_Monn=c3=a9=2c_Roger?= <roger.pau@citrix.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <76cb9f26-e316-98a2-b1ba-e51e3d20f335@suse.com>
 <807a48fe-3829-d976-75dc-1767d32fb0f4@suse.com>
 <BN9PR11MB527622E58C2E4EF90CF29EF88C379@BN9PR11MB5276.namprd11.prod.outlook.com>
 <9432990c-6de4-ad12-e9fa-12792200748a@suse.com>
 <BN9PR11MB5276930B2AFE79C4961E66548C0F9@BN9PR11MB5276.namprd11.prod.outlook.com>
 <ca2ad24a-0703-de6c-81a5-e01615f93d21@suse.com>
 <BN9PR11MB5276A8DF0810DE510C1294038C129@BN9PR11MB5276.namprd11.prod.outlook.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <BN9PR11MB5276A8DF0810DE510C1294038C129@BN9PR11MB5276.namprd11.prod.outlook.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9P194CA0020.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:20b:46d::20) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f38deeac-32fe-4afd-5fd2-08da07f3ed98
X-MS-TrafficTypeDiagnostic: AM9PR04MB8809:EE_
X-Microsoft-Antispam-PRVS:
	<AM9PR04MB88091E14772121B4F2972B58B3129@AM9PR04MB8809.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(5660300002)(83380400001)(66556008)(66946007)(66476007)(6486002)(38100700002)(508600001)(6506007)(53546011)(2616005)(6512007)(8676002)(4326008)(26005)(186003)(8936002)(2906002)(54906003)(6916009)(36756003)(86362001)(31696002)(31686004)(316002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?MDRRN213VUk3Qm56dzllRUhjUjVJNzJlcWNDMTUyRG1ZYi9CeW5KVHI3cGRZ?=
 =?utf-8?B?SEpSaWVkSDNFWE1aU0k5RUY4VmN4K3BTWTROb21SOFlzOGxJNGdZTUliY3Ji?=
 =?utf-8?B?NXBvM0YwL1VxT1kzeVBCQWR2OHZkSkx1OHF3eHNqakRmTWpITFJ0WU5MUEoz?=
 =?utf-8?B?OVZDZ0w1L2JSMGIwbzhaRHZtTU1DZlVHUHZ2YW9HcUZhNC9yWXAxUmFqVzBu?=
 =?utf-8?B?cXVnUzZTQ2FHOVdPVnhnV05CM3k0VEpKRGw1eFRLT2Q2djcvelRMUGpVKzVz?=
 =?utf-8?B?SUZCWHcxZFArQVBBWUtJMUxkMnJRL2tvcHhzR3Y3VndKalB3ZkN4aFAwdDBL?=
 =?utf-8?B?QjB0bm5jdW9HWnFKempHNm1OV2xBOTEyTnVqMk9RdXIyRkRZWDcwVkdwQlln?=
 =?utf-8?B?cUpwajVLbFJoQmdJUjZ3QWtTR2JGei93K2lpeTVGaW90eGtEd2Q2bFpuT1NM?=
 =?utf-8?B?Q1RocEFjYjcvUlVrVFdodTFlR0NrMDhxejFmT1YwcGh6YWc3UGFMOFZla3Za?=
 =?utf-8?B?Z3hwYWcweUlhcUhSTGhEeHN6R2NoR3Y3c2wxT2YzN3ViVmhXMGlCc3VNNmVE?=
 =?utf-8?B?cWhpU0Jja1R0b0J1ODJtN2d5SXViQXhSaGZ0ZFRzWkNiN1QyeFRUNEUyZEJP?=
 =?utf-8?B?eXZjSEZPT2QxSUQvcXVoclIwdHdyWWFUMXRhclRwNC92bXZwL1U1ak9LOTVs?=
 =?utf-8?B?UXdsU1N4VUZONXdFeWsvR05vWktLclZ6NHRrcmhrZk1USC9lVnV6aC8xaEcr?=
 =?utf-8?B?Y1ZLRDJ5WkZ4ZjBsb1g2QmF1alM4QWN6YXlodFlRR3NpVjQ0U05Da0ZTWlJw?=
 =?utf-8?B?eHl0aGhIN3dIbGhGRlVmWUEyM0wzdlFaU1lreXRHUVlpSlRLN0dqNmpGNnBJ?=
 =?utf-8?B?TTFjOFBYOWVpRHlzV3FnK01yVmxBbUg1VmpNNHV6MU9sTVI0NWE1R2hYbGo0?=
 =?utf-8?B?VFJOdG5mOVgzYWxMelZPdlNwZHlqREtCSEFxTFE1Tjg3akdURTBaeFJvclZW?=
 =?utf-8?B?WXd6NGEvMXVNWHl5QWFlQUEvS0RzMlJCL0ttSktGcDAzOG5VTFlsc24wcUVX?=
 =?utf-8?B?YWRxSnV2d1dteDJHQktkNkN3dUc2VkpLbkVEM2pUN2lERWpUV1Y5K1A5QTJD?=
 =?utf-8?B?NnlSZDJqaTdPcEtKOG1hVTZBRUdaWHZxM3o2N2p6QmdIcGpoWFZBVXBnQ2pr?=
 =?utf-8?B?RFdhdGkzVmZISmtyQ0U5bHRCZWVCcUdJQ3hpR25NekczTk5BY2RwM09qRkFi?=
 =?utf-8?B?cmpTYnlJM0lsdk1ReU5lMWVXczhGa0syOXVNZ0MyTkM4a2tCZW1DbjhlUWpi?=
 =?utf-8?B?UlpHMFhPRHF2dC91cUhzOGFXRGFFdzJmbWhtYStkejZJWEZWTmhzVTBlNEVJ?=
 =?utf-8?B?TDBMY2hFVW50ZnpvdUE0RUFmd2hUVGp0VERrb292S2dsaE9KU2l2NHRzblNx?=
 =?utf-8?B?Vm93b1ZJdjRyQXJnQmxMR1pCVVRKZVdMYTNlTmdRekN6dmdaZ3hmdVNFczRr?=
 =?utf-8?B?M1lSVExsNmhpdmQxTk5pdFBDc1ZZR29tbndyRFZjczdzVlVCeHJmVGRnVGh0?=
 =?utf-8?B?NGxwTXpVdzhka3VSODJaaDJqak1nS3QzS1E2N01WNzBuNW5RTERJWUUyVFZT?=
 =?utf-8?B?bm9NdDNGRS9iMUFiZ3lzVUxVUXpzdmNETGlLQmMzanh1Z2JTNWlkZmYzN2JO?=
 =?utf-8?B?aVpXQXhqck9sbEhXVVI5TFdDM1RKZmRGNVNFVWVnMWE5RURla0tzNVBtYXJM?=
 =?utf-8?B?VWJhSFkwL1c0bVF0bStCZ3ZCcll5bzBpdWpCTVhVaVVPYUF4R1E1QkRZSTZj?=
 =?utf-8?B?THZwZlpOWHB4VG1xbC9MMHhlSitmTUNyVk1keWtLUGVoZGdiTnFkRmNuZzhR?=
 =?utf-8?B?dE9CWWEzVGovR2g2ZHZJMElKdW16SHoxdndOdG9VRnJsOUJLak0xS3o0SzVR?=
 =?utf-8?Q?7kBZi2e/1YxFegpOQQC30MjOJCno0oWY?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f38deeac-32fe-4afd-5fd2-08da07f3ed98
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 08:55:47.1917
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: MlX5B5lEuAkICrjhkioXYPclZPgXFJwYO2Xyh1Ci9NulI6rBrpO5mPlpKP3j86yZMZsqid6C1DFSOcue5t4Krg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR04MB8809

On 17.03.2022 06:55, Tian, Kevin wrote:
>> From: Jan Beulich <jbeulich@suse.com>
>> Sent: Monday, March 14, 2022 3:33 PM
>>
>> On 14.03.2022 05:01, Tian, Kevin wrote:
>>>> From: Jan Beulich <jbeulich@suse.com>
>>>> Sent: Friday, February 18, 2022 4:31 PM
>>>>
>>>> On 18.02.2022 06:20, Tian, Kevin wrote:
>>>>>> From: Jan Beulich <jbeulich@suse.com>
>>>>>> Sent: Tuesday, January 11, 2022 12:36 AM
>>>>>>
>>>>>> When a page table ends up with no present entries left, it can be
>>>>>> replaced by a non-present entry at the next higher level. The page table
>>>>>> itself can then be scheduled for freeing.
>>>>>>
>>>>>> Note that while its output isn't used there yet,
>>>>>> pt_update_contig_markers() right away needs to be called in all places
>>>>>> where entries get updated, not just the one where entries get cleared.
>>>>>>
>>>>>> Note further that while pt_update_contig_markers() updates perhaps
>>>>>> several PTEs within the table, since these are changes to "avail" bits
>>>>>> only I do not think that cache flushing would be needed afterwards.
>> Such
>>>>>> cache flushing (of entire pages, unless adding yet more logic to me
>> more
>>>>>> selective) would be quite noticable performance-wise (very prominent
>>>>>> during Dom0 boot).
>>>>>>
>>>>>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>>>>>> ---
>>>>>> v3: Properly bound loop. Re-base over changes earlier in the series.
>>>>>> v2: New.
>>>>>> ---
>>>>>> The hang during boot on my Latitude E6410 (see the respective code
>>>>>> comment) was pretty close after iommu_enable_translation(). No
>> errors,
>>>>>> no watchdog would kick in, just sometimes the first few pixel lines of
>>>>>> the next log message's (XEN) prefix would have made it out to the
>> screen
>>>>>> (and there's no serial there). It's been a lot of experimenting until I
>>>>>> figured the workaround (which I consider ugly, but halfway acceptable).
>>>>>> I've been trying hard to make sure the workaround wouldn't be
>> masking a
>>>>>> real issue, yet I'm still wary of it possibly doing so ... My best guess
>>>>>> at this point is that on these old IOMMUs the ignored bits 52...61
>>>>>> aren't really ignored for present entries, but also aren't "reserved"
>>>>>> enough to trigger faults. This guess is from having tried to set other
>>>>>
>>>>> Is this machine able to capture any VT-d faults before?
>>>>
>>>> Not sure what you mean here. I don't think I can trigger any I/O at this
>>>> point in time, and hence I also couldn't try to trigger a fault. But if
>>>> the question is whether fault reporting at this time actually works,
>>>> then yes, I think so: This is during Dom0 construction, i.e. late enough
>>>> for fault reporting to be fully set up and enabled.
>>>>
>>>
>>> My point was that with your guess that the ignored bits are not
>>> ignored some VT-d faults should be triggered. If the reason why
>>> you cannot observe such faults is because they happened too
>>> early so no much can be shown on the screen then trying to
>>> setting those bits at much later point might get more shown to
>>> verify your guess.
>>
>> Pretty clearly there aren't any faults. And in fact my suspicion is
>> that the bits are used for addressing memory, and then the memory
>> access hangs (doesn't complete).
>>
>>> btw any progress since last post? How urgent do you want this
>>> feature in (compared to the issue that it may paper over)?
>>
>> Well, one way or another the issue needs to be dealt with for this
>> series to eventually go in. To be honest I hadn't expected that it
>> would still be pending ...
>>
> 
> Sorry I didn't get your meaning. Do you mean that you didn't
> expect that I haven't given r-b or that you haven't found time
> to root-cause this issue?

Neither - the comment about the series as a whole still being pending
was a general one. After all it's been over half a year since the
original posting of the first parts of it.

As to root-causing this issue: I don't see any reasonable way for me
to do so. Hence it's not a matter of finding time anymore (that was
only the case until I could actually associate the behavior with the
one specific piece of code that causes it), but a matter of simply
not being in the position to sensibly try to dig deeper. I continue
to think that the only reasonable way to gain further insight is for
someone with access to the sources of the (I assume) involved
microcode in the chipset to spell out what the expected behavior
given that microcode would actually be. Without such knowledge I do
not see any alternative to what I'm currently doing to document and
work around the issue. Yet I also understand that given this is
rather old hardware, there's little interest at Intel to actually
put time into such research.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 08:58:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 08:58:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291432.494593 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUlyB-0004bR-Ge; Thu, 17 Mar 2022 08:58:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291432.494593; Thu, 17 Mar 2022 08:58:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUlyB-0004bK-Di; Thu, 17 Mar 2022 08:58:55 +0000
Received: by outflank-mailman (input) for mailman id 291432;
 Thu, 17 Mar 2022 08:58:53 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=JNAg=T4=citrix.com=prvs=0684b021b=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nUly9-0004b7-15
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 08:58:53 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 75776b75-a5d0-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 09:58:50 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 75776b75-a5d0-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647507529;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=l8GLEEwnbe7OOOmFYUtxO1nFZn0Wa2yh9vObo5mXMJs=;
  b=JcTCWE1ViBx6jqyOOWJn8F/cPVehSkDfCMSaT3ALlMtXzqYzQCbwUORM
   0KDi9g0PmLe+FT+on2PUc/lWPlmufNdJHRzc8mngn8hd3RF+lWZfzs4vt
   csX3ViJE5d2V+a0zkZ4V6gfFrNI3j9rVSgOq+2QnVTGknyuO0Cy73tX7u
   k=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 68844461
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:syAe1qx+Ka/V63asUhp6t+fKxirEfRIJ4+MujC+fZmUNrF6WrkUFx
 2NMUGGDPPmDZWakfdBwPYq1801X7ZDQmNYwG1BqpCAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2IfhWmthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 NpluIfveEQTIaP1ob4QaBZjHRpcOLdh5+qSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DJoQQt2sm1TjEJf0nXYrCU+PB4towMDIY2JAeQaqCO
 ZNxhTxHUEvdRBRhIEssDdEko/uUmnDZLw9HkQfAzUYwyzeKl1EguFT3C/LOYcCDT8hRmkeep
 0rF8n7/DxVcM8aQoRKH73ati+nnjS79HoUIG9WQyPluh1GCw30JPzcfX1C7vPqRh1a3XpRUL
 El80iYns6Ua7kGgSdj5GRqirxasoRo0S9dWVeog52ml2qfSpgqUGGUAZjpAc8A98t87QyQw0
 V2ElM+vAiZg2JWXQ3+A8rafrRupJDMYa2QFYEcsTwQf5ML4iJoulR+JRdFmeJNZlfWsR2u2m
 WrT6nFj2fND1qbnyplX43jKmG2d5aLWQDcMvAjsUVmr1SF8fqm6MtnABUfg0d5MK4OQT1+kt
 XcCmtSD4O1mMaxhhBBhU81WQuj3uq/t3Cn0xAc2QsJ/r2jFF2uLJ9g43d1oGKt+3i/okxfNa
 VSbhw5e7YQ70JCCPf4uONLZ5yjHIMHd+TXZuhL8M4ImjntZLlbvEMRSiai4hTyFfK8Ey/1XB
 HtjWZzwZUv28Iw+pNZMe88T0KUw2gc1zn7JSJbwwnyPiOTCOyLIFu5fbgPRM4jVCZ9oRi2Pr
 76z0OPQl31ivBDWOHGLoeb/03hXRZTEOXwGg5MOLbPSSuaXMGogF+XQ0dscl39NxMxoehPz1
 ijlACdwkQOn7VWecFniQi0zOdvHAMckxVpmbHNEALpd8yV6CWpZxPxELMVfkHhO3LEL8MOYu
 NFeIpTeWKsTEmqbk9nfBLGkxLFfmN2QrVvmFwKuYSQlfo4mQArM+9T+eRDo+jVIBS2y3fbSa
 ZX8vu8HafLvnzhfMfs=
IronPort-HdrOrdr: A9a23:qKtNPqNoxYTcI8BcTy/155DYdb4zR+YMi2TDiHoedfUFSKOlfp
 6V8MjztSWVtN4QMEtQ/+xoHJPwPE80lKQFm7X5WI3CYOCIghrMEGgP1/qH/9SkIVyDygc/79
 YQT0EdMqyJMbESt6+Ti2PUYrVQouVvsprY/ts2p00dMz2CAJsQljuRZDzrdXGfE2J9dOUE/d
 enl4J6jgvlXU5SQtWwB3EDUeSGj9rXlKj+aRpDIxI88gGBgR6h9ba/SnGjr10jegIK5Y1n3X
 nOkgT/6Knmm/anyiXE32uWy5hNgtPuxvZKGcTJoMkILTfHjBquee1aKva/lQFwhNvqxEchkd
 HKrRtlF8Nv60nJdmXwmhfp0xmI6kdY11bSjXujxVfzq83wQzw3T+Bbg5hCTxff4008+Plhza
 NixQuixtVqJCKFuB64y8nDVhlsmEbxi2Eli/Qvg3tWVpZbQKNNrLYY4FheHP47bW7HAbgcYa
 hT5fznlbZrmQvwVQGbgoAv+q3gYp0LJGbJfqBY0fblkQS/nxhCvj8lLYIk7zI9HakGOup5Dt
 T/Q9RVfY51P70rhIJGdZE8qJiMeyXwqSylChPmHb2gLtBCB07w
X-IronPort-AV: E=Sophos;i="5.90,188,1643691600"; 
   d="scan'208";a="68844461"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Vd/04xypcdu/Vvq0RjCC6YudvNoYWrTTcGLlJlNTllyw5VKi1mKODd+83eW9BK0+uJtRbeQsnZYAGvbCRcUuMX6SMceAnGZvOJmnNS0g+Q2tE8XGQ9xHYZuY3NtOQcytAdTg82g/BCpmV+aWI22wI3++7AsdwMQGVOLbLC8+ZgiU1jy4mkK3EmR9AyeeS5OMcI7s1w/BdpSynfANxtYDo5nXqbF/qmo6jazwqZVL8cCgxewbsVGTmYHb0Z92zGrcmzA7Uy2HsjadnRF92w5rjeJPvSFvnIErNnlYnZUhKmAXaX0rKZOo7qGTLMQsgWPYMx9WgaCUUeC+pKTERSrbXw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=X4/+wJrNxh4ulhPDpxuCfdXARuFYHN5yB94CVG8WkgY=;
 b=LwgV0O3febcKBjwjsdJSM5hINflONNAZZAYy/KzZeS5XQW1ZS3Z7mKEzmKfXXnFkf5nD8HYE9ijRphvj5V4t+Hr+Rs50d01zhXGCc68g7BqKZ6kXbi8et8cKy8ku8sNOeSiYQMyPE7TO93sn1oQKM97kW9rkpADQMcpmE0i+vdD1yjzjj0WDyo1Rq9lZdK1AafcOVMSw9XXS7aFWnIjfZJh+6XuCRZ1L2EBnYwS87vJ9/g9YqYkwI5YOyowXc8yroWmfQ9UGsEcWUXoq/ng/CouScdc/4yVWxYEdgyPVGE96j6PHvH7pC3Kr8vBheDAIIfswsO8jh2E81mUXFLlPeA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=X4/+wJrNxh4ulhPDpxuCfdXARuFYHN5yB94CVG8WkgY=;
 b=tQYDBX/Bf+NXP9Je9NpTZxZHTpQx9jJEZTt9cGKRugP3htY5UOH4+Q++f9TarpzQOUJClkls5DkDz6egjQbk3HE5S+uRHrWLWgF4ToD0NiI5p8/udYrsXze+H7WTPPMlY9zEdE5Qejuc0rNyH4CKtSx5pXw9XNTiL4vKGb1kHKw=
Date: Thu, 17 Mar 2022 09:58:15 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jane Malalane <jane.malalane@citrix.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, "Anthony
 PERARD" <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien Grall
	<julien@xen.org>, "Stefano Stabellini" <sstabellini@kernel.org>, Christian
 Lindig <christian.lindig@citrix.com>, David Scott <dave@recoil.org>,
	"Volodymyr Babchuk" <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH v8 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Message-ID: <YjL4J9wDGCtc/rRv@Air-de-Roger>
References: <20220316091315.19281-1-jane.malalane@citrix.com>
 <20220316091315.19281-3-jane.malalane@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <20220316091315.19281-3-jane.malalane@citrix.com>
X-ClientProxiedBy: MR2P264CA0157.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:501:1::20) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 42499481-8188-43fb-a05c-08da07f44926
X-MS-TrafficTypeDiagnostic: MWHPR03MB2847:EE_
X-Microsoft-Antispam-PRVS: <MWHPR03MB2847224ED311F8AB616585C48F129@MWHPR03MB2847.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(2906002)(6486002)(508600001)(83380400001)(85182001)(6666004)(6506007)(86362001)(6512007)(9686003)(33716001)(186003)(26005)(82960400001)(8936002)(4326008)(8676002)(6862004)(66556008)(66476007)(66946007)(6636002)(54906003)(38100700002)(316002)(5660300002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?MVBJcmhONUNiNVJtazF4SU1BbEZQZzBBNlcrZlNWZHRoTXB2NmxxMVRGeStK?=
 =?utf-8?B?VmVrWWM2Qms2NEphUTlDRG1QK00zVWxISWxOQmF5bExyTVdRamlRcUV1bU41?=
 =?utf-8?B?RCtIK05ZcFlvRkZYSkM2N2RZNDBWTVo4bE9BQTR1SEprUzhhMmdRajY0WlRJ?=
 =?utf-8?B?aWd4NThBTHNydDRLUWF1bmREb0FjVzBSRDk3RDYySGF4V09BaFJBcGVWQlVL?=
 =?utf-8?B?RGZNMlBYa0lsWFJNckcyNUwrZWRWVDBuZjFOS09XN3ljdndUNlUzcXZiV2c2?=
 =?utf-8?B?R3Bwd3psQmtPNDJkeE0yMUFnNkJNK2N1Q1VDellPakllTXpWMExoYU5WOFZB?=
 =?utf-8?B?a3M0eDEyWU1nWmcxUzZTOTFQbnh6c0p4Z3orMWF0MlFSM0E4SWpRWThuMVN1?=
 =?utf-8?B?ejdqUi9jR2tkelhTbUJST1M5dVZJVHZFMXVaY0VOTlN0Ymdmd2NqWENtam1z?=
 =?utf-8?B?ZzJNZkZUa092ZXc3R3BUNFVLOU9qdFFLL1pLYlhpWk8xYTVTK2QzMm00WHU0?=
 =?utf-8?B?SVY0NDc0NlFwcTFWSmpTVFl5cWRtWjllR3ZSRnhnVWRqTUkxY24yMDRVRmZ5?=
 =?utf-8?B?S29nZ2JjVnFjeGxaTFpBNXN2eVo2SnpHTHVOQUVUcHprQjRQazR6azk4c2xB?=
 =?utf-8?B?UENBOHpSYUtyVlFRbHdxWE03QnBzT2VIM2FGS2xKREo2d1NTSFkwQ0JBdjJO?=
 =?utf-8?B?eHVqb1R0eXREV2Y4WDU5eU1KNU5ZalFZSHdnaFRlU3piQ0tPQjVmanMwQ1Zy?=
 =?utf-8?B?cXBlMVo3cDl0SkxlcWpDcDJNeHE3bGZhaXV6bWMzL2pnZnV6Z3VLWUptRGxT?=
 =?utf-8?B?WnVvcjhiYk9tZ25SZnR4MmlvaWp5aU1lSVdMNVBDbGpwQmdpV1o5dEtUdWhz?=
 =?utf-8?B?MDdvQzVBenFYeWpCUGkrMGo4Wk9saGlpL0ovWFBLRnpjcnkwVEhNaitnSWlF?=
 =?utf-8?B?OWk4MlAyWE43MXpVWUlrV2YyZEFSczE0cU1XYXFBWk54N3F4TW1ETEJ5S0M2?=
 =?utf-8?B?VGtPM3pBK1dTUzdMN0hibnk4Ry9UTjRkNnJFY016TGxOZW1kSkpEbmlub2ZN?=
 =?utf-8?B?ZjFBSW50eitFazllY3kxakpUeWFscDJKYTN0ZHhucVlzc2ZkelZscWNZVUk5?=
 =?utf-8?B?b1RXSnJJVC9qTVF1c1oydHI1dkFsZHkrSFp3K3BLUGRuV3FtQ2k1Y1BHOWxV?=
 =?utf-8?B?ZmgrMXVYYUFLeWpBNFZ2Y0V3NXVsSmRFODRYYmYrMU5IUmhwOCtjQW15cjlQ?=
 =?utf-8?B?Q3lSZklzRHlTZ0hQSmpjdER5bVR4eUFyWWNEVUJwWkwzUXJQM1Z6bm0zenl0?=
 =?utf-8?B?UVVMZWo5bEdrNm9MMmp4eGJmTFFWaTVHSk5TY2c3YVZoR3haMHZ1WmpsdFcz?=
 =?utf-8?B?OGR1UFpxNW5VVXNTRjRUREpKdVdwZjdEY0ZJbk5xN1I0dGdUT1ZOQmhWVk8w?=
 =?utf-8?B?My9oRnFkcEFpTlZmQi9ER242Z0k3Qlk0OWljRWJvTXdEVzh4ZUJva2pQb3BI?=
 =?utf-8?B?WUVKKzFrNlZsRzlHQVEvYlRWSmk3OFhUVE9rR1JsS0M3bGlMQUZGT2JWNjl5?=
 =?utf-8?B?S3pIVXludE9TeWlZRGpNbTZ6aUtvaHFBMlBBNzZBRjIwYzFWSk83bDRiWWsw?=
 =?utf-8?B?Z3dCOWZxc2IxaWRmb3kzemZMSDBIV2wwMzNEckJGdkFCbjhGQlpvNldHV1U5?=
 =?utf-8?B?ZGdQZWVEcEVyeXZkVkJqS1l6TkVYMktUbUZ0K0pDcEE3RmtwZUs5bVBGK3lY?=
 =?utf-8?B?ZU1kVTk0UUg0cEJqTDhxRXhud2xvTGYyTGVjSXQwSCtyT2p2UmI0d2x3R0Rr?=
 =?utf-8?B?OThCRDYvQkoyMVN3NGJJS3UxZ2hGaktXQU0vaHNWaGNXR24vOE9aY3RLajZC?=
 =?utf-8?B?RVlZejBnK2dFbDFvNjNXQ1c4Y2Rwb2dFSC9UbEEyenJGQ3dNNTJ1aTZpbTVl?=
 =?utf-8?B?eHhpMlVTbENoa21GVGMxT3gwbDlBU1g3MGxPdElQMzBkUXNJckJqTEo0c3ZH?=
 =?utf-8?B?RndPQjJsc2h3PT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 42499481-8188-43fb-a05c-08da07f44926
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 08:58:20.9216
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: g+GpWDvwynbOON0JoMqT9KAs8FQXD+BzeAmkpSeHrkFIX/QrjCD1CHW5AYztJhANIBQbVrsRTtxkbqN/Nxs5RQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR03MB2847
X-OriginatorOrg: citrix.com

On Wed, Mar 16, 2022 at 09:13:15AM +0000, Jane Malalane wrote:
> Introduce a new per-domain creation x86 specific flag to
> select whether hardware assisted virtualization should be used for
> x{2}APIC.
> 
> A per-domain option is added to xl in order to select the usage of
> x{2}APIC hardware assisted virtualization, as well as a global
> configuration option.
> 
> Having all APIC interaction exit to Xen for emulation is slow and can
> induce much overhead. Hardware can speed up x{2}APIC by decoding the
> APIC access and providing a VM exit with a more specific exit reason
> than a regular EPT fault or by altogether avoiding a VM exit.
> 
> On the other hand, being able to disable x{2}APIC hardware assisted
> virtualization can be useful for testing and debugging purposes.
> 
> Note: vmx_install_vlapic_mapping doesn't require modifications
> regardless of whether the guest has "Virtualize APIC accesses" enabled
> or not, i.e., setting the APIC_ACCESS_ADDR VMCS field is fine so long
> as virtualize_apic_accesses is supported by the CPU.

Have you tested migration of guests with this patch applied?

We need to be careful so that a guest that doesn't have
assisted_x{2}apic set in the config file can be migrated between hosts
that have different support for hardware assisted x{2}APIC
virtualization.

Ie: we need to make sure the selection of arch_x86.assisted_x{2}apic
is only present in the migration stream when explicitly set in the
configuration file.

> diff --git a/tools/libs/light/libxl_x86.c b/tools/libs/light/libxl_x86.c
> index e0a06ecfe3..46d4de22d1 100644
> --- a/tools/libs/light/libxl_x86.c
> +++ b/tools/libs/light/libxl_x86.c
> @@ -23,6 +23,15 @@ int libxl__arch_domain_prepare_config(libxl__gc *gc,
>      if (libxl_defbool_val(d_config->b_info.arch_x86.msr_relaxed))
>          config->arch.misc_flags |= XEN_X86_MSR_RELAXED;
>  
> +    if (d_config->c_info.type != LIBXL_DOMAIN_TYPE_PV)
> +    {
> +        if (libxl_defbool_val(d_config->b_info.arch_x86.assisted_xapic))
> +            config->arch.misc_flags |= XEN_X86_ASSISTED_XAPIC;
> +
> +        if (libxl_defbool_val(d_config->b_info.arch_x86.assisted_x2apic))
> +            config->arch.misc_flags |= XEN_X86_ASSISTED_X2APIC;
> +    }
> +
>      return 0;
>  }
>  
> @@ -819,11 +828,26 @@ void libxl__arch_domain_create_info_setdefault(libxl__gc *gc,
>  {
>  }
>  
> -void libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
> -                                              libxl_domain_build_info *b_info)
> +int libxl__arch_domain_build_info_setdefault(libxl__gc *gc,
> +                                             libxl_domain_build_info *b_info,
> +                                             const libxl_physinfo *physinfo)
>  {
>      libxl_defbool_setdefault(&b_info->acpi, true);
>      libxl_defbool_setdefault(&b_info->arch_x86.msr_relaxed, false);
> +
> +    if (b_info->type != LIBXL_DOMAIN_TYPE_PV) {
> +        libxl_defbool_setdefault(&b_info->arch_x86.assisted_xapic,
> +                             physinfo->cap_assisted_xapic);
> +        libxl_defbool_setdefault(&b_info->arch_x86.assisted_x2apic,
> +                             physinfo->cap_assisted_x2apic);

Nit: the split lines would better be adjusted to match the
indentation of the first parameter.

libxl_defbool_setdefault(&b_info->arch_x86.assisted_xapic,
                         physinfo->cap_assisted_xapic);

> +    }
> +    else if (!libxl_defbool_is_default(b_info->arch_x86.assisted_xapic) ||
> +             !libxl_defbool_is_default(b_info->arch_x86.assisted_x2apic)) {
> +        LOG(ERROR, "Interrupt Controller Virtualization not supported for PV");
> +        return ERROR_INVAL;
> +    }
> +
> +    return 0;
>  }
>  
>  int libxl__arch_passthrough_mode_setdefault(libxl__gc *gc,
> diff --git a/tools/ocaml/libs/xc/xenctrl.ml b/tools/ocaml/libs/xc/xenctrl.ml
> index 712456e098..32f3028828 100644
> --- a/tools/ocaml/libs/xc/xenctrl.ml
> +++ b/tools/ocaml/libs/xc/xenctrl.ml
> @@ -50,6 +50,8 @@ type x86_arch_emulation_flags =
>  
>  type x86_arch_misc_flags =
>  	| X86_MSR_RELAXED
> +	| X86_ASSISTED_XAPIC
> +	| X86_ASSISTED_X2APIC
>  
>  type xen_x86_arch_domainconfig =
>  {
> diff --git a/tools/ocaml/libs/xc/xenctrl.mli b/tools/ocaml/libs/xc/xenctrl.mli
> index b034434f68..d0fcbc8866 100644
> --- a/tools/ocaml/libs/xc/xenctrl.mli
> +++ b/tools/ocaml/libs/xc/xenctrl.mli
> @@ -44,6 +44,8 @@ type x86_arch_emulation_flags =
>  
>  type x86_arch_misc_flags =
>    | X86_MSR_RELAXED
> +  | X86_ASSISTED_XAPIC
> +  | X86_ASSISTED_X2APIC
>  
>  type xen_x86_arch_domainconfig = {
>    emulation_flags: x86_arch_emulation_flags list;
> diff --git a/tools/ocaml/libs/xc/xenctrl_stubs.c b/tools/ocaml/libs/xc/xenctrl_stubs.c
> index 7e9c32ad1b..5df8aaa58f 100644
> --- a/tools/ocaml/libs/xc/xenctrl_stubs.c
> +++ b/tools/ocaml/libs/xc/xenctrl_stubs.c
> @@ -239,7 +239,7 @@ CAMLprim value stub_xc_domain_create(value xch, value wanted_domid, value config
>  
>  		cfg.arch.misc_flags = ocaml_list_to_c_bitmap
>  			/* ! x86_arch_misc_flags X86_ none */
> -			/* ! XEN_X86_ XEN_X86_MSR_RELAXED all */
> +			/* ! XEN_X86_ XEN_X86_ASSISTED_X2APIC max */

In order to simplify adding new options we would generally introduce
a:

#define XEN_X86_MISC_FLAGS_MAX XEN_X86_ASSISTED_X2APIC

In include/public/arch-x86/xen.h so that adding new flags doesn't
require changing the Ocaml code here. This wasn't done before because
there was a single flag.

>  			(VAL_MISC_FLAGS);
>  
>  #undef VAL_MISC_FLAGS
> diff --git a/tools/xl/xl.c b/tools/xl/xl.c
> index 2d1ec18ea3..31eb223309 100644
> --- a/tools/xl/xl.c
> +++ b/tools/xl/xl.c
> @@ -57,6 +57,8 @@ int max_grant_frames = -1;
>  int max_maptrack_frames = -1;
>  int max_grant_version = LIBXL_MAX_GRANT_DEFAULT;
>  libxl_domid domid_policy = INVALID_DOMID;
> +int assisted_xapic = -1;
> +int assisted_x2apic = -1;
>  
>  xentoollog_level minmsglevel = minmsglevel_default;
>  
> @@ -201,6 +203,12 @@ static void parse_global_config(const char *configfile,
>      if (!xlu_cfg_get_long (config, "claim_mode", &l, 0))
>          claim_mode = l;
>  
> +    if (!xlu_cfg_get_long (config, "assisted_xapic", &l, 0))
> +        assisted_xapic = l;
> +
> +    if (!xlu_cfg_get_long (config, "assisted_x2apic", &l, 0))
> +        assisted_x2apic = l;
> +
>      xlu_cfg_replace_string (config, "remus.default.netbufscript",
>          &default_remus_netbufscript, 0);
>      xlu_cfg_replace_string (config, "colo.default.proxyscript",
> diff --git a/tools/xl/xl.h b/tools/xl/xl.h
> index c5c4bedbdd..528deb3feb 100644
> --- a/tools/xl/xl.h
> +++ b/tools/xl/xl.h
> @@ -286,6 +286,8 @@ extern libxl_bitmap global_vm_affinity_mask;
>  extern libxl_bitmap global_hvm_affinity_mask;
>  extern libxl_bitmap global_pv_affinity_mask;
>  extern libxl_domid domid_policy;
> +extern int assisted_xapic;
> +extern int assisted_x2apic;
>  
>  enum output_format {
>      OUTPUT_FORMAT_JSON,
> diff --git a/tools/xl/xl_parse.c b/tools/xl/xl_parse.c
> index 117fcdcb2b..f118dc7e97 100644
> --- a/tools/xl/xl_parse.c
> +++ b/tools/xl/xl_parse.c
> @@ -2761,6 +2761,24 @@ skip_usbdev:
>  
>      xlu_cfg_get_defbool(config, "vpmu", &b_info->vpmu, 0);
>  
> +    if (b_info->type != LIBXL_DOMAIN_TYPE_PV) {
> +        e = xlu_cfg_get_long(config, "assisted_xapic", &l , 0);
> +        if ((e == ESRCH && assisted_xapic != -1)) /* use global default if present */
> +            libxl_defbool_set(&b_info->arch_x86.assisted_xapic, assisted_xapic);
> +        else if (!e)
> +            libxl_defbool_set(&b_info->arch_x86.assisted_xapic, l);
> +        else
> +            exit(1);
> +
> +        e = xlu_cfg_get_long(config, "assisted_x2apic", &l, 0);
> +        if ((e == ESRCH && assisted_x2apic != -1)) /* use global default if present */
> +            libxl_defbool_set(&b_info->arch_x86.assisted_x2apic, assisted_x2apic);
> +        else if (!e)
> +            libxl_defbool_set(&b_info->arch_x86.assisted_x2apic, l);
> +        else
> +        exit(1);

Indentation seems wrong in the line above.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 09:17:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 09:17:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291436.494604 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUmFy-0006yK-VN; Thu, 17 Mar 2022 09:17:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291436.494604; Thu, 17 Mar 2022 09:17:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUmFy-0006yD-Rz; Thu, 17 Mar 2022 09:17:18 +0000
Received: by outflank-mailman (input) for mailman id 291436;
 Thu, 17 Mar 2022 09:17:17 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=TrlV=T4=arm.com=Jiamei.Xie@srs-se1.protection.inumbo.net>)
 id 1nUmFw-0006y6-PQ
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 09:17:16 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05on2062a.outbound.protection.outlook.com
 [2a01:111:f400:7d00::62a])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 087a718b-a5d3-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 10:17:14 +0100 (CET)
Received: from AM6P194CA0010.EURP194.PROD.OUTLOOK.COM (2603:10a6:209:90::23)
 by GV1PR08MB7315.eurprd08.prod.outlook.com (2603:10a6:150:1e::15) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.25; Thu, 17 Mar
 2022 09:17:11 +0000
Received: from VE1EUR03FT015.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:90:cafe::4a) by AM6P194CA0010.outlook.office365.com
 (2603:10a6:209:90::23) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14 via Frontend
 Transport; Thu, 17 Mar 2022 09:17:10 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT015.mail.protection.outlook.com (10.152.18.176) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Thu, 17 Mar 2022 09:17:09 +0000
Received: ("Tessian outbound 741ca6c82739:v113");
 Thu, 17 Mar 2022 09:17:09 +0000
Received: from d85763797fb7.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 DCD3ED34-667F-494B-ACDB-9F7BC90ABDCD.1; 
 Thu, 17 Mar 2022 09:17:03 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id d85763797fb7.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 17 Mar 2022 09:17:03 +0000
Received: from VI1PR08MB3056.eurprd08.prod.outlook.com (2603:10a6:803:3d::28)
 by VI1PR08MB3229.eurprd08.prod.outlook.com (2603:10a6:803:47::29)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.15; Thu, 17 Mar
 2022 09:17:00 +0000
Received: from VI1PR08MB3056.eurprd08.prod.outlook.com
 ([fe80::c4d3:b586:a5c0:153b]) by VI1PR08MB3056.eurprd08.prod.outlook.com
 ([fe80::c4d3:b586:a5c0:153b%3]) with mapi id 15.20.5081.015; Thu, 17 Mar 2022
 09:17:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 087a718b-a5d3-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=TVTayEo9cd7za1xsfn+am72yC0vKL+VYANv8573DfDw=;
 b=xW8i93iZEyIsXPDYTgZOLo4iEAlzSJY02N+nNBJQx6GbVrNy4vbyvX/TacqehVOaxZSbkCTtg5FQ7CIcZ9+tk3G4uDUKFslwPgT/OOuPldEsFb8u0iLFbsjewR8itoP1BWwr4HpMm5loQkRtXIbpxCoGOQPMYuuCQzILNWrlzXQ=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=lDblQblYkznqnytIj4e//SgD5wrz3XcoS88oatBDbZGSm+6cEBLarawIrEUYHzYhN7PQneMInStiJZOY9NdNGrEx7S82GxrXerxxjKW570CNa4Wc34Q3wjgy7nwIsUC2srYjBzsZxHsGawJNTa1K7nn8OjSzg6ZkLd13IxocSf8MrPlXAdzm8BOLRIp+f5E/FeQyoiSP8GE6XquDun2coNXjzkWQ79RoKm96nyfGHCoYtiUT2zxtqgB3aCg/36naP7yMvJs4bs+3nb/1uSJSnc/PqDtEQj/nXlBOLHHSshOlyWL8mmVDzy7d8nMuu+UQtdqNIInQMFTfN7PPiJS8yw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=TVTayEo9cd7za1xsfn+am72yC0vKL+VYANv8573DfDw=;
 b=FIGf6jD98UK0zhxhRlwljOiQoIvXOgNHe81MsawBGRru3mgA8jN2g2uOatVENCJKHlL1yIUDxMSvx4P4mcZxFWxgBGk4rInL2hx91AmjpmWs92w6b0LYGfUBH3RzmilCUBJMFpQ0Ibeu6SJigeQIwwfOYwMOs80Rin5khaikyA3ufghKbCDXsPegbj95HBo6sgraJXo3Bn6mcchWPf7ORm3ukB7Gd/Gw/qEqRsejozfMBHIgzAhAS4j2pWPqBODAo5S+YTHBJJavjRTpiB2aKIqAetQcKd5TnrKCBaK/IMNXY+jTGWiu9m61r6PgCasN2uXgcNnNfz39jjB20IqJnA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=TVTayEo9cd7za1xsfn+am72yC0vKL+VYANv8573DfDw=;
 b=xW8i93iZEyIsXPDYTgZOLo4iEAlzSJY02N+nNBJQx6GbVrNy4vbyvX/TacqehVOaxZSbkCTtg5FQ7CIcZ9+tk3G4uDUKFslwPgT/OOuPldEsFb8u0iLFbsjewR8itoP1BWwr4HpMm5loQkRtXIbpxCoGOQPMYuuCQzILNWrlzXQ=
From: Jiamei Xie <Jiamei.Xie@arm.com>
To: Ross Lagerwall <ross.lagerwall@citrix.com>, Bjoern Doebel
	<doebel@amazon.de>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, Roger
 Pau Monne <roger.pau@citrix.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Subject: RE: [PATCH v5 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
Thread-Topic: [PATCH v5 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
Thread-Index: AQHYM8WNmsy9ALsOG0iEitvyqooH8ay3Sg6AgAwMHmA=
Date: Thu, 17 Mar 2022 09:17:00 +0000
Message-ID:
 <VI1PR08MB3056A7F7E5DC1DD68212A57692129@VI1PR08MB3056.eurprd08.prod.outlook.com>
References:
 <03798b67ec3a892a302e6be5d87ea676e6376036.1646837462.git.doebel@amazon.de>
 <5cdd27addcec926eb48fdeab08ad3371e7c3fd7c.1646837462.git.doebel@amazon.de>
 <PH0PR03MB6382E2AD10AEF1BC48C55093F00A9@PH0PR03MB6382.namprd03.prod.outlook.com>
In-Reply-To:
 <PH0PR03MB6382E2AD10AEF1BC48C55093F00A9@PH0PR03MB6382.namprd03.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: CC3C2EF04C013348B1A67974E9C35952.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 3f924c61-5e24-448b-5870-08da07f6ea4e
x-ms-traffictypediagnostic:
	VI1PR08MB3229:EE_|VE1EUR03FT015:EE_|GV1PR08MB7315:EE_
X-Microsoft-Antispam-PRVS:
	<GV1PR08MB731550CE1FDC2654E2785C8092129@GV1PR08MB7315.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR08MB3056.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(86362001)(38070700005)(55016003)(83380400001)(52536014)(2906002)(33656002)(38100700002)(186003)(26005)(8936002)(122000001)(64756008)(110136005)(66446008)(66476007)(8676002)(316002)(66946007)(76116006)(66556008)(4326008)(71200400001)(53546011)(508600001)(7696005)(6506007)(9686003)(54906003)(5660300002);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB3229
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT015.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	89346977-5d56-43aa-9d2f-08da07f6e4cd
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(316002)(54906003)(4326008)(5660300002)(52536014)(110136005)(336012)(8676002)(8936002)(9686003)(26005)(70206006)(83380400001)(7696005)(186003)(47076005)(82310400004)(33656002)(6506007)(36860700001)(508600001)(53546011)(2906002)(70586007)(86362001)(356005)(107886003)(40460700003)(55016003)(81166007);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 09:17:09.9136
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 3f924c61-5e24-448b-5870-08da07f6ea4e
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT015.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: GV1PR08MB7315

Hi  Bjoern,

> -----Original Message-----
> From: Xen-devel <xen-devel-bounces@lists.xenproject.org> On Behalf Of
> Ross Lagerwall
> Sent: 2022=1B$BG/=1B(B3=1B$B7n=1B(B10=1B$BF|=1B(B 1:12
> To: Bjoern Doebel <doebel@amazon.de>; xen-devel@lists.xenproject.org
> Cc: Michael Kurth <mku@amazon.de>; Martin Pohlack
> <mpohlack@amazon.de>; Roger Pau Monne <roger.pau@citrix.com>;
> Andrew Cooper <Andrew.Cooper3@citrix.com>; Konrad Rzeszutek Wilk
> <konrad.wilk@oracle.com>
> Subject: Re: [PATCH v5 2/2] xen/x86: Livepatch: support patching CET-
> enhanced functions
>=20
> > From: Bjoern Doebel <doebel@amazon.de>
> > Sent: Wednesday, March 9, 2022 2:53 PM
> > To: xen-devel@lists.xenproject.org <xen-devel@lists.xenproject.org>
> > Cc: Michael Kurth <mku@amazon.de>; Martin Pohlack
> <mpohlack@amazon.de>; Roger Pau Monne <roger.pau@citrix.com>;
> Andrew Cooper <Andrew.Cooper3@citrix.com>; Bjoern Doebel
> <doebel@amazon.de>; Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>;
> Ross Lagerwall <ross.lagerwall@citrix.com>
> > Subject: [PATCH v5 2/2] xen/x86: Livepatch: support patching CET-
> enhanced functions
> >
> > Xen enabled CET for supporting architectures. The control flow aspect o=
f
> > CET expects functions that can be called indirectly (i.e., via function
> > pointers) to start with an ENDBR64 instruction. Otherwise a control flo=
w
> > exception is raised.
> >
> > This expectation breaks livepatching flows because we patch functions b=
y
> > overwriting their first 5 bytes with a JMP + <offset>, thus breaking th=
e
> > ENDBR64. We fix this by checking the start of a patched function for
> > being ENDBR64. In the positive case we move the livepatch JMP to start
> > behind the ENDBR64 instruction.
> >
> > To avoid having to guess the ENDBR64 offset again on patch reversal
> > (which might race with other mechanisms adding/removing ENDBR
> > dynamically), use the livepatch metadata to store the computed offset
> > along with the saved bytes of the overwritten function.
> >
> > Signed-off-by: Bjoern Doebel <doebel@amazon.de>
> > Acked-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
> > CC: Ross Lagerwall <ross.lagerwall@citrix.com>
>=20
> Reviewed-by: Ross Lagerwall <ross.lagerwall@citrix.com>

Tested-by: Jiamei xie <jiamei.xie@arm.com>

Cheers,=20
Jiamei


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 09:17:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 09:17:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291439.494614 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUmGH-0007MJ-B0; Thu, 17 Mar 2022 09:17:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291439.494614; Thu, 17 Mar 2022 09:17:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUmGH-0007MA-7v; Thu, 17 Mar 2022 09:17:37 +0000
Received: by outflank-mailman (input) for mailman id 291439;
 Thu, 17 Mar 2022 09:17:36 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RBlk=T4=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nUmGF-0006y6-Rb
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 09:17:35 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 14c8c830-a5d3-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 10:17:35 +0100 (CET)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2050.outbound.protection.outlook.com [104.47.14.50]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-23-rIr4e2BLP3uQaqmrYvZRzA-1; Thu, 17 Mar 2022 10:17:33 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM5PR04MB3299.eurprd04.prod.outlook.com (2603:10a6:206:d::30) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Thu, 17 Mar
 2022 09:17:32 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d%9]) with mapi id 15.20.5081.017; Thu, 17 Mar 2022
 09:17:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 14c8c830-a5d3-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647508654;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=0A0DD8xoSN/xSURiI+VTXGfezKsw6/gfLZ4R3L92edE=;
	b=luIKv2prIMP0Xh+VKaBX05wQK7YmmLilA32w4JWCDzQywCHmYQKBlTwJicGHvXy6TvgmR8
	fgHRkO5X/kGMAIhU/LeKhRuRwCXOXOHMAV2HentUWRqymCZNWA6IGgKabjKABmWvjZq78z
	9GhDZzYJSSSn+M+6zBiUo3EsPZ+lCtE=
X-MC-Unique: rIr4e2BLP3uQaqmrYvZRzA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ASyZrU00ZDty9b4tmNDGuR6Zr2GDlzVY3IOCasrGVtYyIpq1qmeD8Pdj6eOX3Kwu/QK5YDu5RTKW75kGakgJ4EAqYeQJ2+vBeakE4QDaO70ytOgi7Wm53heYr0WfEhbfqoQ6QPsnCWvfVzMzwUpYbSh68kLfWxDqIqMlRlhKE3kpaYDkIsdIrbae4laXF4RrpS1/SiLASbdPi5DPRsp/6iVtduaAvsNZjS/mSLx+x5+a7PSKDPyyP5YlPPlLFoL7l2bF5HbsHVbIXFlMqatkkf0mkaSMyEpECs+rDZYqX/whO0nCx0YhWBhyU2aHyYTbxpqVErqCZP/yrMsN8ywl2A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=zYhkLTumvEsULc9IAoj6RJhmvVG9juxDdMNjXQr2V7Y=;
 b=AsUKyPl0lpYvOwrALUIEXtuq7sfGwVHcvf6wHTbmqKjaxwpbrqGqnNm/jpjsr4PMHKYYp/fHQVlalXR7zSFTwcj7Ob2OyHkf/2AFlA9A5b4BFlXEMOA1ArZEitaH5+wVEBrIty5vV7L7xrTa9o2RB1M+XtYW2tNLmMu44o2GQ9WSOpAcXNB2+uwdxwfNiktwqmbuF0qfbA4pkH+6R7hwQGhgSqyZrZbJXsN4ClStiPSQy7GthTmxT+i+20+S0SEe1qqaPz8lhn8TiqekjtslrVPSPBsOhdaE+ysB0g7FC4qwXEXKSGZjb2eW4WBkm3ja0s+rxyiaTzuwcYbgCOozuA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <2adbd1dc-38f9-21b2-b38a-06835aa164d0@suse.com>
Date: Thu, 17 Mar 2022 10:17:29 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] x86/cet: Remove writeable mapping of the BSPs shadow
 stack
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?=
 <marmarek@invisiblethingslab.com>, Xen-devel <xen-devel@lists.xenproject.org>
References: <20220315165340.32144-1-andrew.cooper3@citrix.com>
 <345b2f17-5fba-5dba-f7f5-c1634fc69a6e@suse.com>
 <101d1e70-51c7-036d-c5e2-fd382a2be7a8@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <101d1e70-51c7-036d-c5e2-fd382a2be7a8@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS8P251CA0003.EURP251.PROD.OUTLOOK.COM
 (2603:10a6:20b:2f2::23) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 6b88c5de-31f2-40e4-ead3-08da07f6f729
X-MS-TrafficTypeDiagnostic: AM5PR04MB3299:EE_
X-Microsoft-Antispam-PRVS:
	<AM5PR04MB329925EA4A718084667CA2CEB3129@AM5PR04MB3299.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	8GCAjKQ8FoiJCDKWzvYJuIwCBANHSFs3HF/v0pwkp7nxEvYdF+nxXV+SfyztqFt8hweQUiPxvurUuZbkyWbElvhmd1o0oTyw/PiAi3hwXsmnorxxLtK2iFYYivqUQl6vwjrk5JQ4ZdSMuRh53lPljWBcZJPg+CzwemsYPAkqydQJ6Qj8nvj0zJWZMXcOflufPzs4g6juVYAV25FISP7LOlyL9lIFzNvFCgPx9SwQ4JjANHOUx2+SKCJryMEzt+8jGtemu/MoYPWq5hTsTQK59hVVvSybWqH/tDNd2kwUa54C+nZqG1wz5VtJN6wowvdg9y591eH1lEFR2thOPS0WhralLj9LOoDDAVP2PXCiVP30UJkmvdhjWKxWMvlbCPBMOLYumDCvSYgb/XWn8Z9V60/hqe3LMAKJm65/yzU6+31JQki4sYRY/hoYF0ma9z41cH4XhDrCKGJVEjssQtMGeK/Q2BpHWe8zsens4oS0ZEXxr4L35Bm/SoIKvpYJrr/X5c7dW67iNoFluYKz76Pf6aM3EDSFv7xzcoi1w8AixH9wXZtrBQjN02T5EzggJaMRkCOgCNR4bwnSy391CtPO2gqlJkrwJiskazB8X+S+4AKTRlsGAMc/aZ6BhE4b+FETZZQyQj3LkDhnlP6FvtxerH9D1wOECic8vkyjgzTgXQqJkvWCOtw3xsq37kanGNsx6RffvaPzkpSm3GYAb48uv/xBFU5STrQReDm3ZY9Y9j8=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(38100700002)(53546011)(36756003)(86362001)(6506007)(26005)(186003)(2616005)(31696002)(83380400001)(508600001)(6512007)(6486002)(66556008)(316002)(66476007)(8676002)(6916009)(31686004)(4326008)(54906003)(66946007)(8936002)(2906002)(5660300002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?yFjkSHDqDwNZY/l5OLanK4ps//jD+j8xNQebwMn92MRBPRbd6JvLmZr9Se5H?=
 =?us-ascii?Q?XAPq92CDjyjLP5X2K6NXp+w2EJUqtD8Y3y2gTfV/1c5aaxD05ondVykCiRDx?=
 =?us-ascii?Q?PrfJsdfJ8JNT9Tp19Yc2jTQa8312FuOwpTAd/dbw+afkoacCtEvWi7N0Zaq0?=
 =?us-ascii?Q?w+33i9M6Y2vrQbS1HeuEHBX3k/nr6PeHLN85Q7Jg5deiBA+X/lLD4OvOTCTv?=
 =?us-ascii?Q?KRtwlhWNBKQApwgkaUmMvdet+yN9FIm6YLJAXQY3BtZ7qQ41w+n6EWQVbLlZ?=
 =?us-ascii?Q?Jn56HjDMwgB3Pb1VA9poAdJdwIpKtl5FmNfRm1D2ppSE82iaAdoZwhtub9Te?=
 =?us-ascii?Q?X8jRRIIFUwPAkTtk8YRfQslKrQjF7PRbMWAP4FciCr0evA81sAiU2G/4ZBlJ?=
 =?us-ascii?Q?oALouki/Qqd7l2OnN/Pc4nnDVlj58+c+fLp6ppMN6XDIUUXpq61biLCRwUGr?=
 =?us-ascii?Q?9TL9llAtA63vfPTTVn9VcobAl0QIpdz9AWc6tMFWxxUi/eZiimO0NP8921YT?=
 =?us-ascii?Q?uPzeYr+8amdw/kIvWXlaONmAaT7oGqJnmrr5n/Rh3d83blOF/4iS6bZez8qK?=
 =?us-ascii?Q?IhSetQFtGLdiUj82O9lrKspYCti2q5JBzCcRyupb+ZZs5VZ7UsWK9WOYHsZa?=
 =?us-ascii?Q?BcGMEzSH9RuNvoZe28oWcxOQ1RQ/kMcpUlSRk7LDl6pntJ6iGRaDsqq90clQ?=
 =?us-ascii?Q?tAFV875/HMrA33rCsL5IB6pMFeEdA2C5bJSmuVa5XEAReSlbnjowR7c+8e/p?=
 =?us-ascii?Q?KiCq2k6Zq5YBklI4N2HHAAANrynlERmF8uqY1MocNwLeOhQMRnRTjQkVkK7f?=
 =?us-ascii?Q?V2YnP5JVLtNUVp32ZEDTdIbhYHv8pXmfm3XKSj80/yFk4yXtbHlfOX9bjgoP?=
 =?us-ascii?Q?96QAJZb8xyn8m0qT2MG7W6dqDLGpQR/k1r5cRuMucAN9mPbYMJrCB3zdIOVP?=
 =?us-ascii?Q?SifnnOwHMl/NROkWy50NWBZWRVuSz+ugx1jQWumva0lTzYuJWTfLDAOvA+2M?=
 =?us-ascii?Q?RG1cXmRZHg6Npsziyqlk+iZOsQZhwnlb07gP4RLWXt/W7i9+wXfdehFAkJGv?=
 =?us-ascii?Q?tJWezFi6HXnlSK0sY0fSE4s+yysCTbVuO264k5f4A5Jcm3pYmF32Zn9hZ7a0?=
 =?us-ascii?Q?wvQ2Si6kvwSaH5vjVgDvBJKEnab8TQLSZKrghZu4J4GkBoBleZrzJxyy5EvR?=
 =?us-ascii?Q?mCnRfJ0ZhctbBecPiXmf5HYO4ZhZzCg0HNfqIE+Ir0f/rzSQxMfb4Hc/xgsz?=
 =?us-ascii?Q?Jde2Bh1T7meM2fC57pauZAFIaZK58RvnwplhhjPwcHq1jSc+WbOdZlJygxR7?=
 =?us-ascii?Q?LMQKJmCfUDFjRKW+x3khct2L98IzPQjR8MvwnaVvOrPNrpifN+PAgpQRNI3W?=
 =?us-ascii?Q?fVrr/Qwu9kuSNyoWZiBqYYehbWEVRXeVuak/YMAxrvngsRIN/Md+uM/O5R3C?=
 =?us-ascii?Q?uDIdoSXnZZCHufhl86SWwOGmZm4NvgWG?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6b88c5de-31f2-40e4-ead3-08da07f6f729
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 09:17:31.7977
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: dpkWLEUV2g498AgayU91ykT3qIf1h5d0wf+X5Y87pBErhveDvSXFbnZdVJlUa4egwgB/3jODeMhGlYSYL4c9gQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR04MB3299

On 16.03.2022 20:23, Andrew Cooper wrote:
> On 16/03/2022 08:33, Jan Beulich wrote:
>> On 15.03.2022 17:53, Andrew Cooper wrote:
>>> --- a/xen/arch/x86/xen.lds.S
>>> +++ b/xen/arch/x86/xen.lds.S
>>> @@ -215,8 +215,9 @@ SECTIONS
>>>    } PHDR(text)
>>>    DECL_SECTION(.init.data) {
>>>  #endif
>>> +       . =3D ALIGN(STACK_SIZE);
>>> +       *(.init.bss.stack_aligned)
>> No real need for the ALIGN() here - it's the contributions to the
>> section which ought to come with proper alignment. Imo ALIGN()
>> should only ever be there ahead of a symbol definition, as otherwise
>> the symbol might not mark what it is intended to mark due to padding
>> which might be inserted. See also 01fe4da6243b ("x86: force suitable
>> alignment in sources rather than in linker script").
>>
>> Really we should consider using
>>
>>     *(SORT_BY_ALIGNMENT(.init.data .init.data.* .init.bss.*))
>>
>> While I can see your point against forcing sorting by alignment
>> globally, this very argument doesn't apply here (at least until
>> there appeared a way for the section attribute and -fdata-sections
>> to actually interact, such that .init.* could also become per-
>> function/object).
>>
>> Then again - this block of zeroes doesn't need to occupy space in
>> the binary.
>=20
> It already occupies space, because of mkelf32.

Hmm, yes, and not just because of mkelf32: Since we munge everything
in a single PT_LOAD segment in the linker script, all of .init.*
necessarily has space allocated.

>>  It could very well live in a @nobits .init.bss in the
>> final ELF binary. But sadly the section isn't @nobits in the object
>> file, and with that there would need to be a way to make the linker
>> convert it to @nobits (and I'm unaware of such). What would work is
>> naming the section .bss.init.stack_aligned (or e.g.
>> .bss..init.stack_aligned to make it easier to separate it from
>> .bss.* in the linker script) - that'll make gcc mark it @nobits.
>=20
> Living in .bss would prevent it from being reclaimed.=C2=A0 We've got sev=
eral
> nasty bugs from shooting holes in the Xen image, and too many special
> cases already.

I didn't suggest to put it in .bss; the suggested name was merely so
that gcc would mark the section @nobits and we could exclude the
section from what makes in into .bss in the final image independent
of .init.* vs .bss.* ordering in the linker script. But anyway - with
the above this aspect is now moot anyway.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 09:46:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 09:46:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291444.494626 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUmhk-0002SA-LZ; Thu, 17 Mar 2022 09:46:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291444.494626; Thu, 17 Mar 2022 09:46:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUmhk-0002S3-IK; Thu, 17 Mar 2022 09:46:00 +0000
Received: by outflank-mailman (input) for mailman id 291444;
 Thu, 17 Mar 2022 09:45:59 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUmhj-0002Rt-Nb; Thu, 17 Mar 2022 09:45:59 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUmhj-0007FZ-KJ; Thu, 17 Mar 2022 09:45:59 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUmhj-0006nl-81; Thu, 17 Mar 2022 09:45:59 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUmhj-0004xN-7Z; Thu, 17 Mar 2022 09:45:59 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=AIo0Z8XD087AT96P09op2tjxJugsVtYEQgWl8j7L9SA=; b=nQ6Nox15C3fgKyKDjjKrlc+PFT
	YFK5xibZFIC8RQl2Nz3JjgKWsZu1jNKO9eNhqoAsXv9lz13+KWwxig/5YeWcvoUgcoIzGy+R/6bkO
	4B8TjKV1xtEx0nRVqssklGTaxDauxNhKZMvT7IBxHbpIYhyTk5Y+jmQ6gbGe8VlD1TEc=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168649-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168649: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-pvops:kernel-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=e5c10018c5917d07ee23579ad5a8de3e2818d030
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 17 Mar 2022 09:45:59 +0000

flight 168649 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168649/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-arm64-pvops             6 kernel-build             fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              e5c10018c5917d07ee23579ad5a8de3e2818d030
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  615 days
Failing since        151818  2020-07-11 04:18:52 Z  614 days  596 attempts
Testing same since   168649  2022-03-17 04:19:07 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Haonan Wang <hnwanga1@gmail.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Martin Pitt <mpitt@debian.org>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            fail    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 101191 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 09:58:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 09:58:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291454.494643 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUmtu-00042Z-Sp; Thu, 17 Mar 2022 09:58:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291454.494643; Thu, 17 Mar 2022 09:58:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUmtu-00042S-Pj; Thu, 17 Mar 2022 09:58:34 +0000
Received: by outflank-mailman (input) for mailman id 291454;
 Thu, 17 Mar 2022 09:58:33 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RBlk=T4=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nUmts-00042M-SX
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 09:58:33 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ccacd163-a5d8-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 10:58:31 +0100 (CET)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur01lp2050.outbound.protection.outlook.com [104.47.0.50]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-25-rOs40LkkPPubQGGw5NAyUQ-1; Thu, 17 Mar 2022 10:58:29 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by HE1PR04MB3068.eurprd04.prod.outlook.com (2603:10a6:7:21::13) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.29; Thu, 17 Mar
 2022 09:58:25 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d%9]) with mapi id 15.20.5081.017; Thu, 17 Mar 2022
 09:58:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ccacd163-a5d8-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647511110;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=ZklsvcfisBfRstzsvUpH+Z1Nwq1WZ+inWhlObqE1dg8=;
	b=gPa364GkehT7UNV3TiQ6VxKe/MmnxJDJ8pAPSOy/ohFfj73kKZS3k5mDAps57UyDbXtZSx
	pUKTfYVsfeDljxu7Z4u/9ECFkMlGDchHpXvwVXB7fYEE4CFtFiih3n73IB/uHGKl8s94+z
	cYGvZjZNHGCcZmorGmbm5oCFy4COnzs=
X-MC-Unique: rOs40LkkPPubQGGw5NAyUQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Mexw3tiNTs+OOoCSiERhjezTsbEWrjJ5rYP4XvEuamv2ENkL8MHgXN+z5C1ozIKbYdorUTOLF1sfKuiNk+txDOmqd4d12pG4d4pj8bjI596P1o9G7OGanxWj5cKVhW/bYxm7T6cLjljopSF+9pKcTtMzH0PeRvT2voNsT7ThOouGgwU2QFHTBj9g6Jul2C1pbF6xz9vTZajAlBTymxtvmG/fr4h/ukzuEsfiPq6b7cjLVirOifbu5wqrLYNcKR3OAgZfdSjrxMMj2sueCN5qn12yUt/iYcgKUFOSDU5q9YNdnQoDyB4JXw4Mk331ZrRPz+Vcg/KZ3wgsA5AXsfZ7Zg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ZklsvcfisBfRstzsvUpH+Z1Nwq1WZ+inWhlObqE1dg8=;
 b=IEMTwPKXZNDMyaBukM5cjV/coq+fUd0qcZK7J0VB04CYoRl7/2PqN1CqvqOiZ/0l2pWT/AEvAadjOHYfuifQGZXm5jo51AjZyw2iMX1SWy80c19/jfrSMdvcVqL8ojn/S7sbkgQ7N2FYbHkq5zlgUli616DIrT67494pxrLxeYmYKLlfWwhcGApy01vPUcmlq6k/3AZA4idfG5xhxhLEUsTQ1CDv6utxGIctJDB3kgHY7/nU2rrepYi7cNGU6W3DqjG9KAzeo0RTWarLSt9adOw93J0jsRPGs8gCb0u8dWo5u+NSHIHQImHv6n21p1w4KNMmJpqfXm8td6CMexo35g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <33b82344-733f-8567-5b6d-5a972ebc367a@suse.com>
Date: Thu, 17 Mar 2022 10:58:22 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] x86/spec-ctrl: Knobs for STIBP and PSFD, and follow
 hardware STIBP hint
Content-Language: en-US
To: Andrew Cooper <andrew.cooper3@citrix.com>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Wei Liu <wl@xen.org>, Xen-devel <xen-devel@lists.xenproject.org>
References: <20220316140035.32057-1-andrew.cooper3@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220316140035.32057-1-andrew.cooper3@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR0301CA0053.eurprd03.prod.outlook.com
 (2603:10a6:20b:469::33) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: a79a0db3-8921-42c5-4993-08da07fcad3f
X-MS-TrafficTypeDiagnostic: HE1PR04MB3068:EE_
X-Microsoft-Antispam-PRVS:
	<HE1PR04MB306840E42C6A72A1A4B1A9EAB3129@HE1PR04MB3068.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(26005)(83380400001)(66556008)(2616005)(4326008)(186003)(8676002)(66476007)(66946007)(31696002)(6486002)(54906003)(6916009)(86362001)(508600001)(53546011)(316002)(6512007)(6506007)(8936002)(36756003)(31686004)(2906002)(5660300002)(38100700002)(43740500002)(45980500001)(309714004);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?cWZhK1E5Z1hvV24yck5RcmtFbUFSQUtmeFh3SE9rQkU1OW1XV2hvei9LQ0F5?=
 =?utf-8?B?bEFHY1A4dG9sa01HeW1LWTZJWGs4ZHpEQVZmdHJFOVhjNHY3OWF2Si92anps?=
 =?utf-8?B?aDI0cGJubUFRbnZUV3B3T0gySzNuNXZGblpXWlR6aFVrV29yRGw2c21QU3Zn?=
 =?utf-8?B?d09Sc1MvemIxeEVHRFAvNFU3MDNuRE5rdFBvRFN4VkoyZDRhdTNGNWNTcmNF?=
 =?utf-8?B?OERGNjR0ZmF3NFI5WEJVYWJEMFdMcUM2Wm8zdEJESHJFOG5HaysyZVZyYzBu?=
 =?utf-8?B?M3FJUm92ZXhPREVIMmQvTHNRVXhnTUs4eFV4VWxmN3NwODZkQlBjNlFDSlVJ?=
 =?utf-8?B?WGN1dmF5OHJEbDNPWWZZS0paeDlFVUcrekxicTlKL25WcWZMVkFKdTV0d2t3?=
 =?utf-8?B?SUZ4Tm5UQXpZNEdoY0ZNWUs5c2FPbGd2NllldGxEWDJ1VjQ3U2JQQ3FQZE15?=
 =?utf-8?B?eU56UjFCMGJ0eUx4Znl5TnZ6QjhNeThmckt6amUyZk0wLzV5WXlOVVVwcWJL?=
 =?utf-8?B?Tmd0a3VEc0tRS2hRVmpxdFNTK0FpQmZJbUxhbU9Hb05DR2h3VHJDWmk3T01r?=
 =?utf-8?B?RXpKKzBuVkVQbGRYY3l0U3NtUk1nTmpOMGhpVmdLVk10dGFEa2FKRXJPR0J1?=
 =?utf-8?B?SWRKVGJTei9MZ1cwUTAxa2xkeHlIeDJRNGdpcmlZODZReWJtOGlOOGRqVFh6?=
 =?utf-8?B?Mjk1WDVJcWlmbTZEeHJkRy92NE9TbDR4bHZPNUdENmtRT3JvQ1d3QVNBZGhh?=
 =?utf-8?B?WVFOUEIzMHdUS2dzR2pEVUl5RWc1R0lNYkVtWTAxTzQ3UFRTeVFIdzhVVmEr?=
 =?utf-8?B?TFFjWU9qd3B6Zmx6bWtYNEl5b0xPZXRkdnJTVGlCcmJ2eUQzcDJUQ2ZLbG5K?=
 =?utf-8?B?a21wRUd1KzIzMk91M3NSWXF1dE16OVlrYklXTEt3Y0Nob2pWK3NsbS83a2Jk?=
 =?utf-8?B?eGlHVG9pS2kwWWxZeXRVZE5Hem5jbkNzWjlRckpwN1BhaVRYdHAxM1pjRm1t?=
 =?utf-8?B?R3VTQUFoSTFVOUQ0K0JnNG9GOENJQ0hleVR4VS8vUng0QzJraU1ycTUrYVpQ?=
 =?utf-8?B?UDI3QlJpSC9HazJHQk1tcGtGcnMwcmpkWEhlRXVXcDdoWVhSTWtXbVJVamNt?=
 =?utf-8?B?Q1JoKzhPNzNKbVUrZUZHeHlSZ0ZHRjdmMHRlbmltOWRHdndpeWNvRXN3TVVx?=
 =?utf-8?B?aFdUZUMyNnBCRk5FVUlnVVhZNzJreUhEb1BoMExEZlNqamMvSEx4Zmg4dUpH?=
 =?utf-8?B?NHhOWFh1WmdTZzlUcU4rVTZ0OFFDL0Vtb3FoV2p1WldBYkpYRHVHczBKUG8z?=
 =?utf-8?B?NjRhMjNVNTk4dU55aC8xV0syVGNHYTVyWCtaNFViNUJGMWRNUDBTZGpNQ2FC?=
 =?utf-8?B?ZElBeWFYSGFUMkIreXdIb1pvS09lK2ZsdHYzSzg4ZUlzcXQvWEFjRFduaUxJ?=
 =?utf-8?B?TTJzSVlrUk5BSWVZZkFWcVhPTTl2ekMwR1FPQkxHcWJsY084YllGL2FneENQ?=
 =?utf-8?B?VE9yejdFRUlRNFlMeEtaMkh3dDdLNmsvTlNTRm9MS2twUDVZcitpUnNoVlQz?=
 =?utf-8?B?SENNa0FIek9MWnpSM214YzIvdzQ3WCtqeDhJYmh1djdrcVBueVcxMVNlM1JT?=
 =?utf-8?B?eGRUNy85eE5EV1FOTjB3WWdFYmpDTUVhOGp5N3gvKzFKNnhDZnFnY01jSm01?=
 =?utf-8?B?Z1FMcVVaajdFWFkrclZoZkdhYWNtQ1EydnBveUk0UlVZNzVzdHZDcnFYeVFV?=
 =?utf-8?B?c0doMHZUdUF5bTBuMmRMMG9oeFliWnRvbWRqY081UEdOSWl4RDVVK2dRbEZO?=
 =?utf-8?B?NldrVmxpUGtRaDJIak1zdzVaeHB2OWZRbTVHMUtpMXdpTXVXaVhWOEh4N3JV?=
 =?utf-8?B?QkFSOURtUElwZVdFQStzTXJhSjRhZWhjb3lnQ3JjV21IcGpBQ0pobDRybXJI?=
 =?utf-8?Q?E7NeeAgpe3A2THOBaxZH99XyL/5zg2wy?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a79a0db3-8921-42c5-4993-08da07fcad3f
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 09:58:24.7823
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: WSq3WOJtIugLDpinnHPa7Llb+Sj4ltuPtDk4PHgD8302KdcEnT0Mtp1Lxtxcs+tlbrPDn8lQFlHhugpNaWqJuA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR04MB3068

On 16.03.2022 15:00, Andrew Cooper wrote:
> STIBP and PSFD are slightly weird bits, because they're both implied by other
> bits in MSR_SPEC_CTRL.  Add fine grain controls for them, and take the
> implications into account when setting IBRS/SSBD.
> 
> Rearrange the IBPB text/variables/logic to keep all the MSR_SPEC_CTRL bits
> together, for consistency.
> 
> However, AMD have a hardware hint CPUID bit recommending that STIBP be set
> uniaterally.  This is advertised on Zen3, so follow the recommendation.  This
> is the only default change.
> 
> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>

In principle
Reviewed-by: Jan Beulich <jbeulich@suse.com>
but I have two comments:

> @@ -170,12 +174,18 @@ static int __init cf_check parse_spec_ctrl(const char *s)
>              else
>                  rc = -EINVAL;
>          }
> +
>          else if ( (val = parse_boolean("ibrs", s, ss)) >= 0 )
>              opt_ibrs = val;
> -        else if ( (val = parse_boolean("ibpb", s, ss)) >= 0 )
> -            opt_ibpb = val;
> +        else if ( (val = parse_boolean("stibp", s, ss)) >= 0 )
> +            opt_stibp = val;
>          else if ( (val = parse_boolean("ssbd", s, ss)) >= 0 )
>              opt_ssbd = val;
> +        else if ( (val = parse_boolean("psfd", s, ss)) >= 0 )
> +            opt_psfd = val;
> +
> +        else if ( (val = parse_boolean("ibpb", s, ss)) >= 0 )
> +            opt_ibpb = val;
>          else if ( (val = parse_boolean("eager-fpu", s, ss)) >= 0 )
>              opt_eager_fpu = val;
>          else if ( (val = parse_boolean("l1d-flush", s, ss)) >= 0 )

Personally I find blank lines ahead of "else if" misleading. Could I
talk you into moving ibrs+stibp and ssbd+psfd close to the end of this
(immediately ahead of "else"), prefixing each pair with a comment about
one feature implying the other (and hence the comments replacing the
blank lines)?

Otoh I notice that we already have blank lines elsewhere in the middle
if this block of code, but at least there they're accompanied by a
comment making more obvious why there is such separation. Which means
as an intermediate approach I'd be okay with no re-ordering, but with
comments added.

> @@ -1070,12 +1083,50 @@ void __init init_speculation_mitigations(void)
>  
>      /* If we have IBRS available, see whether we should use it. */
>      if ( has_spec_ctrl && ibrs )
> +    {
> +        /* IBRS implies STIBP.  */
> +        if ( opt_stibp == -1 )
> +            opt_stibp = 1;
> +
>          default_xen_spec_ctrl |= SPEC_CTRL_IBRS;
> +    }
> +
> +    /* Use STIBP by default if the hardware hint is set. */
> +    if ( opt_stibp == -1 && boot_cpu_has(X86_FEATURE_STIBP_ALWAYS) )
> +        opt_stibp = 1;
> +
> +    /*
> +     * Otherwise, don't use STIBP by default.  It has some severe performance
> +     * implications on older hardware.
> +     */
> +    if ( opt_stibp == -1 )
> +        opt_stibp = 0;

I'd find this easier to read if written along the lines of

    if ( opt_stibp == -1 )
    {
        /*
         * Use STIBP by default if the hardware hint is set.  Otherwise,
         * don't use STIBP by default.  It has some severe performance
         * implications on older hardware.
         */
        opt_stibp = !!boot_cpu_has(X86_FEATURE_STIBP_ALWAYS);
    }

FTAOD I'm not going to insist on either adjustment.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 10:00:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 10:00:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291460.494657 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUmvi-0005UM-E1; Thu, 17 Mar 2022 10:00:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291460.494657; Thu, 17 Mar 2022 10:00:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUmvi-0005UF-B0; Thu, 17 Mar 2022 10:00:26 +0000
Received: by outflank-mailman (input) for mailman id 291460;
 Thu, 17 Mar 2022 10:00:24 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=TrlV=T4=arm.com=Jiamei.Xie@srs-se1.protection.inumbo.net>)
 id 1nUmvg-0005U5-Rn
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 10:00:24 +0000
Received: from EUR01-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur01on0631.outbound.protection.outlook.com
 [2a01:111:f400:fe02::631])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 0f88c97f-a5d9-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 11:00:23 +0100 (CET)
Received: from AS9P194CA0001.EURP194.PROD.OUTLOOK.COM (2603:10a6:20b:46d::9)
 by AM9PR08MB7101.eurprd08.prod.outlook.com (2603:10a6:20b:41a::18) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Thu, 17 Mar
 2022 10:00:20 +0000
Received: from VE1EUR03FT006.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:46d:cafe::2d) by AS9P194CA0001.outlook.office365.com
 (2603:10a6:20b:46d::9) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.25 via Frontend
 Transport; Thu, 17 Mar 2022 10:00:20 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT006.mail.protection.outlook.com (10.152.18.116) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Thu, 17 Mar 2022 10:00:20 +0000
Received: ("Tessian outbound 18e50a6f0513:v113");
 Thu, 17 Mar 2022 10:00:20 +0000
Received: from bcd9ed9075ee.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 A71E2B30-510D-4EA7-8456-DD89B484AF99.1; 
 Thu, 17 Mar 2022 10:00:09 +0000
Received: from EUR01-VE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id bcd9ed9075ee.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 17 Mar 2022 10:00:09 +0000
Received: from VI1PR08MB3056.eurprd08.prod.outlook.com (2603:10a6:803:3d::28)
 by PA4PR08MB6045.eurprd08.prod.outlook.com (2603:10a6:102:ef::10)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Thu, 17 Mar
 2022 10:00:06 +0000
Received: from VI1PR08MB3056.eurprd08.prod.outlook.com
 ([fe80::c4d3:b586:a5c0:153b]) by VI1PR08MB3056.eurprd08.prod.outlook.com
 ([fe80::c4d3:b586:a5c0:153b%3]) with mapi id 15.20.5081.015; Thu, 17 Mar 2022
 10:00:05 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0f88c97f-a5d9-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=uul8onTcrtpbmCKemTjiveyt/ma5fUZH87SZfsagwKM=;
 b=KRo+HOqP7IghxHwPTt4nimLNYF3XvNhi8JiRrUHRNwpaJJji8/0MW+g2pwB8U4HHgom3WGg473Fx4Wo3nHhc1S38sYFJljqra8NbsTZEvSz8GhbW/OYy3qp9foW8w2xGj86MEUzrd/CqEYn+JrDQalCTm7G2JnN9YWu8fMJUGHY=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=bKPvyFjQ6KJf5jKMDQJc4O9hYHDEjG0yqBufW9U5IY1OcCOjBmSI5iupTVvSkpekJzGrWU6RJxw32FhG+gkT7/64RQLirWgbd8Dqot0frobEJcf882TVeZMchAjRKOYhZuqIIKNnFi2K7zKkT1XG/PceyyvAysnW01cU+XnsecdoZ2uLMmie42vOAwNtnaZQHU0yaADHZZmMnzrdpTKjrDQcKL0Dlae4cfSu3jU/v8yAZpodn/8rKypP0EjaWS9wB7yzXMh5KKS51TvZ2NLkA04hNj9m8+K/5Kb5h9R27i0ZMwWgc9JnfMJxBNtd58bGVC9LvjDxdhFqGSde/++l+A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=uul8onTcrtpbmCKemTjiveyt/ma5fUZH87SZfsagwKM=;
 b=eIAyr7oO2MvqOYlb5Mm/CvDfegscB5fPtfHD5A/tExFODoQ/jqy2FGlgnz9DV+MvjDbpFEWoJC+VZNEek8KOMBSrt+H+qeVD9v1s4VSv2QcYMIF+4aHBPU2RZB8Sh/9PZ0QSR1cDkY+FTlGrn5IwvZzfQHBuSQJVY9bz44Ny0ObgBkrEQ2ETR9AjTojXpu+5oQilMJlvW1nDv4UBN9xc/yDhaeLBbKfe16FdiNKAue9WwX9Vn0wJkNYoyjHWfpzE61DA6Bq00UkTlZgso/zSJfE4vzLyUum4rGojk/l4vPXYwOD0N2P9OKoJgofe4FcyU8ahbBaUYh3ursq6wM7gSg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=uul8onTcrtpbmCKemTjiveyt/ma5fUZH87SZfsagwKM=;
 b=KRo+HOqP7IghxHwPTt4nimLNYF3XvNhi8JiRrUHRNwpaJJji8/0MW+g2pwB8U4HHgom3WGg473Fx4Wo3nHhc1S38sYFJljqra8NbsTZEvSz8GhbW/OYy3qp9foW8w2xGj86MEUzrd/CqEYn+JrDQalCTm7G2JnN9YWu8fMJUGHY=
From: Jiamei Xie <Jiamei.Xie@arm.com>
To: Jiamei Xie <Jiamei.Xie@arm.com>, Ross Lagerwall
	<ross.lagerwall@citrix.com>, Bjoern Doebel <doebel@amazon.de>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, Roger
 Pau Monne <roger.pau@citrix.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Subject: RE: [PATCH v5 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
Thread-Topic: [PATCH v5 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
Thread-Index: AQHYM8WNmsy9ALsOG0iEitvyqooH8ay3Sg6AgAwMHmCAAAypgA==
Date: Thu, 17 Mar 2022 10:00:05 +0000
Message-ID:
 <VI1PR08MB30562C85CEF556F385DF695F92129@VI1PR08MB3056.eurprd08.prod.outlook.com>
References:
 <03798b67ec3a892a302e6be5d87ea676e6376036.1646837462.git.doebel@amazon.de>
 <5cdd27addcec926eb48fdeab08ad3371e7c3fd7c.1646837462.git.doebel@amazon.de>
 <PH0PR03MB6382E2AD10AEF1BC48C55093F00A9@PH0PR03MB6382.namprd03.prod.outlook.com>
 <VI1PR08MB3056A7F7E5DC1DD68212A57692129@VI1PR08MB3056.eurprd08.prod.outlook.com>
In-Reply-To:
 <VI1PR08MB3056A7F7E5DC1DD68212A57692129@VI1PR08MB3056.eurprd08.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: A7E856C19DDBE44B80D504B5758813BF.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 1dae7b63-8e6e-424e-3d5d-08da07fcf23c
x-ms-traffictypediagnostic:
	PA4PR08MB6045:EE_|VE1EUR03FT006:EE_|AM9PR08MB7101:EE_
X-Microsoft-Antispam-PRVS:
	<AM9PR08MB71017B2FBA56E91B0DB8124292129@AM9PR08MB7101.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VI1PR08MB3056.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(2906002)(38100700002)(86362001)(38070700005)(122000001)(2940100002)(9686003)(110136005)(186003)(71200400001)(26005)(54906003)(508600001)(7696005)(53546011)(6506007)(64756008)(66446008)(8676002)(4326008)(66476007)(5660300002)(52536014)(66556008)(76116006)(66946007)(8936002)(83380400001)(55016003)(316002)(33656002);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR08MB6045
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT006.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	a1677ee6-077c-4713-3506-08da07fce997
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(36860700001)(2940100002)(9686003)(356005)(81166007)(47076005)(33656002)(70206006)(5660300002)(82310400004)(8676002)(4326008)(70586007)(86362001)(107886003)(7696005)(508600001)(316002)(6506007)(55016003)(110136005)(54906003)(40460700003)(8936002)(52536014)(2906002)(336012)(186003)(83380400001)(26005)(53546011);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 10:00:20.2439
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 1dae7b63-8e6e-424e-3d5d-08da07fcf23c
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT006.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR08MB7101



> -----Original Message-----
> From: Xen-devel <xen-devel-bounces@lists.xenproject.org> On Behalf Of
> Jiamei Xie
> Sent: 2022=1B$BG/=1B(B3=1B$B7n=1B(B17=1B$BF|=1B(B 17:17
> To: Ross Lagerwall <ross.lagerwall@citrix.com>; Bjoern Doebel
> <doebel@amazon.de>; xen-devel@lists.xenproject.org
> Cc: Michael Kurth <mku@amazon.de>; Martin Pohlack
> <mpohlack@amazon.de>; Roger Pau Monne <roger.pau@citrix.com>;
> Andrew Cooper <Andrew.Cooper3@citrix.com>; Konrad Rzeszutek Wilk
> <konrad.wilk@oracle.com>
> Subject: RE: [PATCH v5 2/2] xen/x86: Livepatch: support patching CET-
> enhanced functions
>=20
> Hi  Bjoern,
>=20
> > -----Original Message-----
> > From: Xen-devel <xen-devel-bounces@lists.xenproject.org> On Behalf Of
> > Ross Lagerwall
> > Sent: 2022=1B$BG/=1B(B3=1B$B7n=1B(B10=1B$BF|=1B(B 1:12
> > To: Bjoern Doebel <doebel@amazon.de>; xen-devel@lists.xenproject.org
> > Cc: Michael Kurth <mku@amazon.de>; Martin Pohlack
> > <mpohlack@amazon.de>; Roger Pau Monne <roger.pau@citrix.com>;
> > Andrew Cooper <Andrew.Cooper3@citrix.com>; Konrad Rzeszutek Wilk
> > <konrad.wilk@oracle.com>
> > Subject: Re: [PATCH v5 2/2] xen/x86: Livepatch: support patching CET-
> > enhanced functions
> >
> > > From: Bjoern Doebel <doebel@amazon.de>
> > > Sent: Wednesday, March 9, 2022 2:53 PM
> > > To: xen-devel@lists.xenproject.org <xen-devel@lists.xenproject.org>
> > > Cc: Michael Kurth <mku@amazon.de>; Martin Pohlack
> > <mpohlack@amazon.de>; Roger Pau Monne <roger.pau@citrix.com>;
> > Andrew Cooper <Andrew.Cooper3@citrix.com>; Bjoern Doebel
> > <doebel@amazon.de>; Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>;
> > Ross Lagerwall <ross.lagerwall@citrix.com>
> > > Subject: [PATCH v5 2/2] xen/x86: Livepatch: support patching CET-
> > enhanced functions
> > >
> > > Xen enabled CET for supporting architectures. The control flow aspect=
 of
> > > CET expects functions that can be called indirectly (i.e., via functi=
on
> > > pointers) to start with an ENDBR64 instruction. Otherwise a control f=
low
> > > exception is raised.
> > >
> > > This expectation breaks livepatching flows because we patch functions=
 by
> > > overwriting their first 5 bytes with a JMP + <offset>, thus breaking =
the
> > > ENDBR64. We fix this by checking the start of a patched function for
> > > being ENDBR64. In the positive case we move the livepatch JMP to star=
t
> > > behind the ENDBR64 instruction.
> > >
> > > To avoid having to guess the ENDBR64 offset again on patch reversal
> > > (which might race with other mechanisms adding/removing ENDBR
> > > dynamically), use the livepatch metadata to store the computed offset
> > > along with the saved bytes of the overwritten function.
> > >
> > > Signed-off-by: Bjoern Doebel <doebel@amazon.de>
> > > Acked-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
> > > CC: Ross Lagerwall <ross.lagerwall@citrix.com>
> >
> > Reviewed-by: Ross Lagerwall <ross.lagerwall@citrix.com>
>=20
> Tested-by: Jiamei xie <jiamei.xie@arm.com>
>=20
> Cheers,
> Jiamei
Sorry I forgot to add the scope I tested in last email. I tested it on armv=
8a. It worked fine and  didn't break arm.
Tested-by: Jiamei xie <jiamei.xie@arm.com>
> Cheers,
> Jiamei



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 10:02:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 10:02:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291463.494667 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUmxp-00067x-QW; Thu, 17 Mar 2022 10:02:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291463.494667; Thu, 17 Mar 2022 10:02:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUmxp-00067q-Nb; Thu, 17 Mar 2022 10:02:37 +0000
Received: by outflank-mailman (input) for mailman id 291463;
 Thu, 17 Mar 2022 10:02:37 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=hAZZ=T4=citrix.com=prvs=068f51ced=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nUmxo-00067k-TT
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 10:02:37 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 5d1fa310-a5d9-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 11:02:34 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5d1fa310-a5d9-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647511354;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=QOkGG/mkDiGgS/npBNx/ai2OE1b789ixepmDnoSfjrY=;
  b=cgl71R/fgdgA+Nr7ZSXC1BdyQNlyCu1PFS5NmC5YnbQUko4DOnhw/gYD
   06HFX98KLN7rTTwVLl5jDJ4/+IWWZm2M/QmitJt4cgkUtXagEOwcX0cDo
   k57u5pAseHuwoa2LJehhds7oAPNdLS79sBlUOTSR8TaPREwfpjKRF35hU
   I=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 66883879
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:/0sDm6Ny8fICY/vvrR2Vl8FynXyQoLVcMsEvi/4bfWQNrUpz3jQCz
 jMXXjyBP/jeM2D3ctx1Pdix/ENS7Z/dyNViTQto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi29Ew27BVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Z+
 e1OuZa5cxwQMI7Jh+QWbj5/FghiBPgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALBc/nJo4A/FpnyinUF60OSpHfWaTao9Rf2V/cg+gQQ6aOP
 JpGOFKDajz7cSIIBggQLqscv/WuvyLAWD1irVO88P9fD2/7k1UqjemF3MDuUtCNSM9Ymm6Ro
 2vU+GK/DhxyHNmc1BKM93u+gemJkS6TcIcKE728//VpqFSWz34UDlsaWDOTsfS/z0KzRd9bA
 0gV4TY167g/8lSxSdvwVAH+p2SL1jY+cddNF+wx6CmW17HZpQ2eAwAsUTppeNEg8sgsSlQXO
 kShxo2zQ2Y16fvMFCzbpuz8QS6O1TY9HFcBaSUNdxA87frmv4E4szXoS/9/Kfvg5jHqIg3Yz
 zePpSk4orwci88Xyqm2lWz6byKQSovhFVBsuFiONo6xxkYgPdP+OdT0gbTOxawYRLt1WGVtq
 5TtdyK2yOkVRa+AmyWWKAnmNOH4vq3VWNEwbLMGInXAy9hP0yP7FWyzyGsnTKuMDiriUWW1C
 KM0kVkNjKK/xFPwMcdKj3uZUqzGN5TIG9X/TezzZdFTeJV3fwLv1HgwORHMgj+0yhZ0zvxX1
 XKnnSCEVypy5UNPlmbeegvg+eVzmnBWKZ37GPgXMChLIZLBPSXIGN/pwXOFb/wj7bPsnekm2
 403Cid+8D0GCLeWSnCOqeY7dAlWRVBmVcGeg5EGLYarf1s5cFzN/teMmNvNjaQ+xP8L/goJl
 1ngMnJlJK3X3iSWd1/VNig9NNsCn/9X9BoGAMDlBn7ws1BLXGplxP53m0cfFVX/yNFe8A==
IronPort-HdrOrdr: A9a23:+tcvV61puvCwmsRnm+23WwqjBLwkLtp133Aq2lEZdPRUGvb4qy
 nIpoV86faUskd3ZJhOo6HiBEDtexzhHP1OkO0s1NWZLWvbUQKTRekIh+aP/9SJIVyGygc378
 ddmsZFZuEYdWIK6PrH3A==
X-IronPort-AV: E=Sophos;i="5.90,188,1643691600"; 
   d="scan'208";a="66883879"
From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Jan Beulich
	<JBeulich@suse.com>, =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?=
	<roger.pau@citrix.com>, Wei Liu <wl@xen.org>, Bjoern Doebel
	<doebel@amazon.de>, Michael Kurth <mku@amazon.de>, Martin Pohlack
	<mpohlack@amazon.de>
Subject: [PATCH] x86/cet: Use dedicated NOP4 for cf_clobber
Date: Thu, 17 Mar 2022 10:02:04 +0000
Message-ID: <20220317100204.16391-1-andrew.cooper3@citrix.com>
X-Mailer: git-send-email 2.11.0
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

For livepatching, we need to look at a potentially clobbered function and
determine whether it used to have an ENDBR64 instruction.

Use a non-default 4-byte P6 long nop, not emitted by toolchains, and extend
check-endbr.sh to look for it.

The choice of nop has some complicated consequences.  nopw (%rax) has a ModRM
byte of 0, which the Bourne compatible shells unconditionally strip from
parameters, meaning that we can't pass it to `grep -aob`.

Therefore, use nopw (%rcx) so the ModRM byte becomes 1.

This then demonstrates another bug.  Under perl regexes, \1 thru \9 are
subpattern matches, and not octal escapes.  Switch the `grep -P` runes to use
hex escapes instead.

The build time check then requires that the endbr64 poison have the same
treatment as endbr64 to avoid placing the byte pattern in immediate operands.

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
---
CC: Jan Beulich <JBeulich@suse.com>
CC: Roger Pau Monné <roger.pau@citrix.com>
CC: Wei Liu <wl@xen.org>
CC: Bjoern Doebel <doebel@amazon.de>
CC: Michael Kurth <mku@amazon.de>
CC: Martin Pohlack <mpohlack@amazon.de>

v2:
 * Check for the poison byte pattern in check-endbr.sh
 * Use nopw (%rcx) to work around shell NUL (mis)features
 * Use hex escapes to work around Perl subpattern matches

Jan: As you had the buggy grep, can you please confirm that hex escapes work.
---
 xen/arch/x86/alternative.c       |  2 +-
 xen/arch/x86/include/asm/endbr.h | 26 ++++++++++++++++++++++++++
 xen/tools/check-endbr.sh         | 12 +++++++-----
 3 files changed, 34 insertions(+), 6 deletions(-)

diff --git a/xen/arch/x86/alternative.c b/xen/arch/x86/alternative.c
index d41eeef1bcaf..0c6fc7b4fb0c 100644
--- a/xen/arch/x86/alternative.c
+++ b/xen/arch/x86/alternative.c
@@ -362,7 +362,7 @@ static void init_or_livepatch _apply_alternatives(struct alt_instr *start,
             if ( !is_kernel_text(ptr) || !is_endbr64(ptr) )
                 continue;
 
-            add_nops(ptr, ENDBR64_LEN);
+            place_endbr64_poison(ptr);
             clobbered++;
         }
 
diff --git a/xen/arch/x86/include/asm/endbr.h b/xen/arch/x86/include/asm/endbr.h
index 6090afeb0bd8..d946fac13130 100644
--- a/xen/arch/x86/include/asm/endbr.h
+++ b/xen/arch/x86/include/asm/endbr.h
@@ -52,4 +52,30 @@ static inline void place_endbr64(void *ptr)
     *(uint32_t *)ptr = gen_endbr64();
 }
 
+/*
+ * After clobbering ENDBR64, we may need to confirm that the site used to
+ * contain an ENDBR64 instruction.  Use an encoding which isn't the default
+ * P6_NOP4.  Specifically, nopw (%rcx)
+ */
+static inline uint32_t __attribute_const__ gen_endbr64_poison(void)
+{
+    uint32_t res;
+
+    asm ( "mov $~0x011f0f66, %[res]\n\t"
+          "not %[res]\n\t"
+          : [res] "=&r" (res) );
+
+    return res;
+}
+
+static inline bool is_endbr64_poison(const void *ptr)
+{
+    return *(const uint32_t *)ptr == gen_endbr64_poison();
+}
+
+static inline void place_endbr64_poison(void *ptr)
+{
+    *(uint32_t *)ptr = gen_endbr64_poison();
+}
+
 #endif /* XEN_ASM_ENDBR_H */
diff --git a/xen/tools/check-endbr.sh b/xen/tools/check-endbr.sh
index 9799c451a18d..126a2a14d44e 100755
--- a/xen/tools/check-endbr.sh
+++ b/xen/tools/check-endbr.sh
@@ -27,7 +27,7 @@ echo "X" | grep -aob "X" -q 2>/dev/null ||
 # Check whether grep supports Perl regexps. Older GNU grep doesn't reliably
 # find binary patterns otherwise.
 perl_re=true
-echo "X" | grep -aobP "\130" -q 2>/dev/null || perl_re=false
+echo "X" | grep -aobP "\x58" -q 2>/dev/null || perl_re=false
 
 #
 # First, look for all the valid endbr64 instructions.
@@ -45,13 +45,15 @@ echo "X" | grep -aobP "\130" -q 2>/dev/null || perl_re=false
 ${OBJDUMP} -j .text $1 -d -w | grep '	endbr64 *$' | cut -f 1 -d ':' > $VALID &
 
 #
-# Second, look for any endbr64 byte sequence
+# Second, look for any endbr64 or nop4 poison byte sequences
 # This has a couple of complications:
 #
 # 1) Grep binary search isn't VMA aware.  Copy .text out as binary, causing
 #    the grep offset to be from the start of .text.
 #
 # 2) dash's printf doesn't understand hex escapes, hence the use of octal.
+#    `grep -P` on the other hand can interpret hex escapes, and must use them
+#    to avoid \1 thru \9 being interpreted as subpatterns matches.
 #
 # 3) AWK can't add 64bit integers, because internally all numbers are doubles.
 #    When the upper bits are set, the exponents worth of precision is lost in
@@ -67,9 +69,9 @@ eval $(${OBJDUMP} -j .text $1 -h |
 ${OBJCOPY} -j .text $1 -O binary $TEXT_BIN
 if $perl_re
 then
-    LC_ALL=C grep -aobP '\363\17\36\372' $TEXT_BIN
+    LC_ALL=C grep -aobP '\xf3\x0f\x1e\xfa|\x66\x0f\x1f\x01' $TEXT_BIN
 else
-    grep -aob "$(printf '\363\17\36\372')" $TEXT_BIN
+    grep -aob -e "$(printf '\363\17\36\372')" -e "$(printf '\146\17\37\1')" $TEXT_BIN
 fi | awk -F':' '{printf "%s%x\n", "'$vma_hi'", int(0x'$vma_lo') + $1}' > $ALL
 
 # Wait for $VALID to become complete
@@ -90,6 +92,6 @@ nr_bad=$(wc -l < $BAD)
 [ "$nr_bad" -eq 0 ] && exit 0
 
 # Failure
-echo "$MSG_PFX Fail: Found ${nr_bad} embedded endbr64 instructions" >&2
+echo "$MSG_PFX Fail: Found ${nr_bad} embedded endbr64 or poison instructions" >&2
 ${ADDR2LINE} -afip -e $1 < $BAD >&2
 exit 1
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 10:07:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 10:07:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291466.494679 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUn23-0006lo-Cq; Thu, 17 Mar 2022 10:06:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291466.494679; Thu, 17 Mar 2022 10:06:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUn23-0006lh-9H; Thu, 17 Mar 2022 10:06:59 +0000
Received: by outflank-mailman (input) for mailman id 291466;
 Thu, 17 Mar 2022 10:06:58 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUn22-0006lX-H6; Thu, 17 Mar 2022 10:06:58 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUn22-0007gx-E0; Thu, 17 Mar 2022 10:06:58 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUn22-0007vs-5I; Thu, 17 Mar 2022 10:06:58 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUn22-0001N5-4O; Thu, 17 Mar 2022 10:06:58 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=WA9IbF+pcSaZkEN3nWTrxr93l1w3GLKObIiiP07x43A=; b=cARjZ/8OxmsgMJTcUsp2XZYvX1
	dlt26ZqdzF8vUe8qeAAnDJKG8FgaLyrdBSuNmQRO85xSINmYzHKqQ5QmREjR97ku2+LO645VzZN+t
	RIL1Ekr6Sf1F5B5+4wRCkaEL7+UoDJGkKU0fyCCy4H8xezRsqWTBTuJb1HEYue5DEbpE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168642-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168642: trouble: broken/fail/pass
X-Osstest-Failures:
    xen-unstable:test-armhf-armhf-libvirt-raw:<job status>:broken:regression
    xen-unstable:test-armhf-armhf-libvirt-raw:host-install(5):broken:heisenbug
    xen-unstable:test-armhf-armhf-examine:host-install:broken:heisenbug
    xen-unstable:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:debian-hvm-install:fail:heisenbug
    xen-unstable:test-amd64-i386-xl-qemuu-debianhvm-i386-xsm:debian-hvm-install:fail:heisenbug
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-rtds:guest-localmigrate/x10:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=c7a80bc50ac768b4eecaad85b77ae45790c93c73
X-Osstest-Versions-That:
    xen=c7a80bc50ac768b4eecaad85b77ae45790c93c73
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 17 Mar 2022 10:06:58 +0000

flight 168642 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168642/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-armhf-armhf-libvirt-raw    <job status>                 broken

Tests which are failing intermittently (not blocking):
 test-armhf-armhf-libvirt-raw  5 host-install(5)          broken pass in 168633
 test-armhf-armhf-examine      5 host-install             broken pass in 168633
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 12 debian-hvm-install fail pass in 168633
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm 12 debian-hvm-install fail pass in 168633

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check fail in 168633 like 168626
 test-armhf-armhf-libvirt-raw 14 migrate-support-check fail in 168633 never pass
 test-amd64-amd64-xl-rtds     20 guest-localmigrate/x10       fail  like 168633
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168633
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168633
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168633
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168633
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168633
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168633
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168633
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168633
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168633
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168633
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168633
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass

version targeted for testing:
 xen                  c7a80bc50ac768b4eecaad85b77ae45790c93c73
baseline version:
 xen                  c7a80bc50ac768b4eecaad85b77ae45790c93c73

Last test of basis   168642  2022-03-17 01:54:07 Z    0 days
Testing same since                          (not found)         0 attempts

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  fail    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        fail    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     fail    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 broken  
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     fail    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job test-armhf-armhf-libvirt-raw broken
broken-step test-armhf-armhf-libvirt-raw host-install(5)
broken-step test-armhf-armhf-examine host-install

Published tested tree is already up to date.



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 10:11:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 10:11:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291475.494690 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUn6F-0008FW-4J; Thu, 17 Mar 2022 10:11:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291475.494690; Thu, 17 Mar 2022 10:11:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUn6E-0008FP-Vn; Thu, 17 Mar 2022 10:11:18 +0000
Received: by outflank-mailman (input) for mailman id 291475;
 Thu, 17 Mar 2022 10:11:17 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RBlk=T4=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nUn6D-0008FJ-CP
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 10:11:17 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 94dd9ef5-a5da-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 11:11:16 +0100 (CET)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur01lp2056.outbound.protection.outlook.com [104.47.2.56]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-4-SBjhr-97PGK2YMIcidY4cw-1; Thu, 17 Mar 2022 11:11:14 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by DU0PR04MB9276.eurprd04.prod.outlook.com (2603:10a6:10:357::7) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.28; Thu, 17 Mar
 2022 10:11:12 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d%9]) with mapi id 15.20.5081.017; Thu, 17 Mar 2022
 10:11:12 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 94dd9ef5-a5da-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647511876;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=+madevhF2zZVgyj8oCCWeGB9AspF0VxYF+fSbePcGM4=;
	b=B0iVapEk6WiSu8BC6yz5I8GZX364FBYPEk0JZfqy8z1nPK1HuGx6+uPIzcQw94yfIetiLl
	OjZGaD/SDCM4cOdKXy0Ilpr7TNysoZ4j07lcT/t0VvFbeh9MGnglfQq3rdFx4Jhb+fgLOw
	dQKPTwiWU1WW6DeG6jQ6hErLRGF7Em0=
X-MC-Unique: SBjhr-97PGK2YMIcidY4cw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=EvssoNoR5hga1JwA7riNP78oY7HqBKTUV3MUXqx+MtIbEYsnn7gg1SHA1PYAY3R5ejAXx0vYRuotHZBVMQrtOwHLbPR4cPPVpxHW0qVWMyTBHVDLSCvyiG0V17xiISoK8U8dkPY/GgEgcU20ZUn1+Q2bL+ggD6GC5IX3LnFYyXCUfu1ydoBs83dpbMbTPfjbzr3edaQ5PeTP71r+2DGpr+otBuNIDGWyh+foDqnBj3PeSBRXMfatbVkfTyl/o5fwFSwGqzm8aq//wA7CVtiR27shz7b9y8+b/SNpOcWm8+7oCk+hC0qRQJptNry1SWspxV0eTGbjaNNKMprlVLKeiw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ciXfkNKFsYPy2ZFbOWkf5THmn8+TOYjlAZNARB2E6k4=;
 b=YdnaP2uRf+fLpytym/HZGm9nPF3TK7JizVbxtEQm3bNG+WPHchBtjOm7RJUywLHmxsQ5w29BkAfSnVg8H5xJp1eh9kQWtVxoiNPv6EzEXxZscClt+eMALKRGTSc1izhTI4rrFpSl0qHXylHuA3EYhmluVwsW3D7tM++G3RzdQfxhyzIxU4i4UM4uR1gynJNMTg6ZNZS5ula23vlSr0lIM+YizI0GEBz1KGiTgW0QkQZV0T9Xe7UfqDab8fWO/ECFgH+ei9MWfNpH/pNEUaXM21Q3Z7TNMEY5G5D9ah0TVbByl0B7cW0XMAVT0ok2uUtJT4CNID1k7r9jVfd73cpORg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <dd743f1e-b3c1-5f46-66e1-f72272aeb04a@suse.com>
Date: Thu, 17 Mar 2022 11:11:10 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v5 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
Content-Language: en-US
To: Jiamei Xie <Jiamei.Xie@arm.com>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>,
 Roger Pau Monne <roger.pau@citrix.com>,
 Andrew Cooper <Andrew.Cooper3@citrix.com>,
 Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
 Ross Lagerwall <ross.lagerwall@citrix.com>, Bjoern Doebel
 <doebel@amazon.de>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <03798b67ec3a892a302e6be5d87ea676e6376036.1646837462.git.doebel@amazon.de>
 <5cdd27addcec926eb48fdeab08ad3371e7c3fd7c.1646837462.git.doebel@amazon.de>
 <PH0PR03MB6382E2AD10AEF1BC48C55093F00A9@PH0PR03MB6382.namprd03.prod.outlook.com>
 <VI1PR08MB3056A7F7E5DC1DD68212A57692129@VI1PR08MB3056.eurprd08.prod.outlook.com>
 <VI1PR08MB30562C85CEF556F385DF695F92129@VI1PR08MB3056.eurprd08.prod.outlook.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <VI1PR08MB30562C85CEF556F385DF695F92129@VI1PR08MB3056.eurprd08.prod.outlook.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6PR01CA0061.eurprd01.prod.exchangelabs.com
 (2603:10a6:20b:e0::38) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 6c94ed3e-8f42-4e40-2c5e-08da07fe76f5
X-MS-TrafficTypeDiagnostic: DU0PR04MB9276:EE_
X-Microsoft-Antispam-PRVS:
	<DU0PR04MB92768FDAC9E6C9D137732088B3129@DU0PR04MB9276.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6506007)(53546011)(6916009)(54906003)(6512007)(31686004)(36756003)(508600001)(6486002)(31696002)(2616005)(5660300002)(2906002)(186003)(26005)(8936002)(8676002)(66476007)(38100700002)(4326008)(66946007)(83380400001)(316002)(66556008)(86362001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?xJg3m85zJqkxLMbGVo2HKnZfvCQkf6nlNHlCvnG6kZv5Uc3DkJ78eYtEuy0X?=
 =?us-ascii?Q?cpbQFhyh2LGM6R5SiHg40CpVMeI8Kcr02YKmt6BTCvTwJnp+5jgMGBC83B7s?=
 =?us-ascii?Q?9uXFCVnuuSwt5o01ad37WBw8cEIAohmKEg0yZi+kKR1KccqZLpn8uBWzlLwl?=
 =?us-ascii?Q?yYJazkSdkclVfeMLGj1ShFBX9YDJe+sCQ3Hf8PqrmSG0Txj0BuTLd7GYwq0m?=
 =?us-ascii?Q?S0H5SRGV1xi4T74RROGmdFLiw9bHDCMTJIkAjP74kS3kO0iFRmYiSbzsTaso?=
 =?us-ascii?Q?A1sO8V26yFs95UN6Hv7V4VEU5fn4mIAH/xz/Q/nACQ59HKU8we4fzLsQH01e?=
 =?us-ascii?Q?UiJYkOi8bj06PxxJKny2SRpzrl6EZqI1grprlD9Y2uhiQMPvfqy+sT7JjdYR?=
 =?us-ascii?Q?IDPHl+g1BGr3gPfoQUm7iFKxYcYvwde11EtNHBkmBHmdBrtdpXA5j7ehy6Zs?=
 =?us-ascii?Q?yiYOB/j72DNp9UVmsXUXfcuVSjL9zfkRiaKzJAtonhEpHnjqsdz833QeHmXz?=
 =?us-ascii?Q?j2aOXAlkq79t7TRa4dGADjmnZE/5XwUaxywj2OgQATxRCq5i3/7BuZdzt9xF?=
 =?us-ascii?Q?vo8+ZhYAjBER120pM0Hxyt77P45OHsWuQ1OWYuzo0oipNPh+zUkktcQT/FRD?=
 =?us-ascii?Q?W/9XJcZ28J4nLML1lRsnglqwW4jTKdJJyl09hzVv2q/eG2xnLXCDTaOcSi/h?=
 =?us-ascii?Q?bzfNmX0dathyJreeliVMgGdtospEZLE+sxpq70bNq/9J8brglwu1ArjrZ/YE?=
 =?us-ascii?Q?wdNVfR2eIOcv1B+IIH2Yp7VzHRDtUGI4DdRHvavIWJYWWNldL2rdrFHbAHRq?=
 =?us-ascii?Q?7xyijEHadW9mju7UynTLXa9MTMk9BsULUGN9i0M09Kxut62YdBOdV7rL7xsO?=
 =?us-ascii?Q?Y022YLSHe+m/Sj8XEoeEIpLCNhtJ08psJ/y4YS8g79hGwK0gtS9FDoAISbHS?=
 =?us-ascii?Q?keAIT4nN5tMMIL12gKadFPMs2cuPBRO5FuyCkqMRTlwESrc/F8k6MInkKUKU?=
 =?us-ascii?Q?bMfuSnSf4gQV+1rxOEu1h6J3olmnD0zcVGNoIDJinchIf8X5kfecm9CI5Ykc?=
 =?us-ascii?Q?JlaBsjbIxi7Zueusm2TDrgKcyjL+aItLjxK/kXL7XJ+dYsRBnlOtYHXeLiB2?=
 =?us-ascii?Q?yDaRj+yIwYD8XkO1Il5WFT8j+I5Fsg+wek2/7NVlceO1U90KLlqgx6bpYykh?=
 =?us-ascii?Q?KpnmTsHWdyvDMD0RIPwSG7+JSVCyF/RZNYT3ZGDAvKUKylO6EwEas+zlRe51?=
 =?us-ascii?Q?PQzsMRDbbvwzWo5IdVy8k2OCeVUnB4ZI/hehLCe7OoEAVJx6Ol8WJ3PpOsXc?=
 =?us-ascii?Q?0yQ4nGWFfdIeQzxUosCWg5JAarcVK54SwiuGLKgaxvq2Ysnr535XMwnWsGbU?=
 =?us-ascii?Q?csrCEPNwMkHjartjqv0AYlfHSDrUiShs8k1BIhlud3KqJzmKb7ahxKE7qudZ?=
 =?us-ascii?Q?FOycwBBmLnqj0c7h6/hSJ48va8sS0KQL?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6c94ed3e-8f42-4e40-2c5e-08da07fe76f5
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 10:11:12.7400
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: BbQPxO11jkirwibjF+Qq1MpjUUYWAaFKK5h/VR33X11bSHXy9/85KRut261b3avnDFhVT2MfK5A/LUKsFYE2XA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DU0PR04MB9276

On 17.03.2022 11:00, Jiamei Xie wrote:
>> -----Original Message-----
>> From: Xen-devel <xen-devel-bounces@lists.xenproject.org> On Behalf Of
>> Jiamei Xie
>> Sent: 2022=E5=B9=B43=E6=9C=8817=E6=97=A5 17:17
>>
>>> -----Original Message-----
>>> From: Xen-devel <xen-devel-bounces@lists.xenproject.org> On Behalf Of
>>> Ross Lagerwall
>>> Sent: 2022=E5=B9=B43=E6=9C=8810=E6=97=A5 1:12
>>> To: Bjoern Doebel <doebel@amazon.de>; xen-devel@lists.xenproject.org
>>> Cc: Michael Kurth <mku@amazon.de>; Martin Pohlack
>>> <mpohlack@amazon.de>; Roger Pau Monne <roger.pau@citrix.com>;
>>> Andrew Cooper <Andrew.Cooper3@citrix.com>; Konrad Rzeszutek Wilk
>>> <konrad.wilk@oracle.com>
>>> Subject: Re: [PATCH v5 2/2] xen/x86: Livepatch: support patching CET-
>>> enhanced functions
>>>
>>>> From: Bjoern Doebel <doebel@amazon.de>
>>>> Sent: Wednesday, March 9, 2022 2:53 PM
>>>> To: xen-devel@lists.xenproject.org <xen-devel@lists.xenproject.org>
>>>> Cc: Michael Kurth <mku@amazon.de>; Martin Pohlack
>>> <mpohlack@amazon.de>; Roger Pau Monne <roger.pau@citrix.com>;
>>> Andrew Cooper <Andrew.Cooper3@citrix.com>; Bjoern Doebel
>>> <doebel@amazon.de>; Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>;
>>> Ross Lagerwall <ross.lagerwall@citrix.com>
>>>> Subject: [PATCH v5 2/2] xen/x86: Livepatch: support patching CET-
>>> enhanced functions
>>>>
>>>> Xen enabled CET for supporting architectures. The control flow aspect =
of
>>>> CET expects functions that can be called indirectly (i.e., via functio=
n
>>>> pointers) to start with an ENDBR64 instruction. Otherwise a control fl=
ow
>>>> exception is raised.
>>>>
>>>> This expectation breaks livepatching flows because we patch functions =
by
>>>> overwriting their first 5 bytes with a JMP + <offset>, thus breaking t=
he
>>>> ENDBR64. We fix this by checking the start of a patched function for
>>>> being ENDBR64. In the positive case we move the livepatch JMP to start
>>>> behind the ENDBR64 instruction.
>>>>
>>>> To avoid having to guess the ENDBR64 offset again on patch reversal
>>>> (which might race with other mechanisms adding/removing ENDBR
>>>> dynamically), use the livepatch metadata to store the computed offset
>>>> along with the saved bytes of the overwritten function.
>>>>
>>>> Signed-off-by: Bjoern Doebel <doebel@amazon.de>
>>>> Acked-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
>>>> CC: Ross Lagerwall <ross.lagerwall@citrix.com>
>>>
>>> Reviewed-by: Ross Lagerwall <ross.lagerwall@citrix.com>
>>
>> Tested-by: Jiamei xie <jiamei.xie@arm.com>
>>
>> Cheers,
>> Jiamei
> Sorry I forgot to add the scope I tested in last email. I tested it on ar=
mv8a. It worked fine and  didn't break arm.
> Tested-by: Jiamei xie <jiamei.xie@arm.com>

Yet in any event there's meanwhile been a v6, so I'm unsure of taking the
tag over there.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 10:14:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 10:14:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291478.494701 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUn91-0000Pr-HX; Thu, 17 Mar 2022 10:14:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291478.494701; Thu, 17 Mar 2022 10:14:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUn91-0000Pk-EH; Thu, 17 Mar 2022 10:14:11 +0000
Received: by outflank-mailman (input) for mailman id 291478;
 Thu, 17 Mar 2022 10:14:10 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=zfHd=T4=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nUn8z-0000Pe-Ra
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 10:14:10 +0000
Received: from NAM10-MW2-obe.outbound.protection.outlook.com
 (mail-mw2nam10on20607.outbound.protection.outlook.com
 [2a01:111:f400:7e89::607])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id fa0b009f-a5da-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 11:14:07 +0100 (CET)
Received: from SA9PR13CA0075.namprd13.prod.outlook.com (2603:10b6:806:23::20)
 by SA0PR02MB7465.namprd02.prod.outlook.com (2603:10b6:806:da::8) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.25; Thu, 17 Mar
 2022 10:14:03 +0000
Received: from SN1NAM02FT0017.eop-nam02.prod.protection.outlook.com
 (2603:10b6:806:23::4) by SA9PR13CA0075.outlook.office365.com
 (2603:10b6:806:23::20) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.8 via Frontend
 Transport; Thu, 17 Mar 2022 10:14:03 +0000
Received: from xir-pvapexch02.xlnx.xilinx.com (149.199.80.198) by
 SN1NAM02FT0017.mail.protection.outlook.com (10.97.4.104) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5081.14 via Frontend Transport; Thu, 17 Mar 2022 10:14:02 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) by
 xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Thu, 17 Mar 2022 10:14:01 +0000
Received: from smtp.xilinx.com (172.21.105.198) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Thu, 17 Mar 2022 10:14:01 +0000
Received: from [10.71.116.176] (port=50246)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nUn8q-0003zQ-SN; Thu, 17 Mar 2022 10:14:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fa0b009f-a5da-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=O/hgkIqGKEDLH9i5U8hpPFKsVsz71l/VXyYsG2SlykOQlDkofVvpyW3l3CGsVFdpAXlbZv7UmQl9WTYfv6FiOL8olnnr+xVqHaMju2Z8HZ+Hz7yNniHRMxodKFeX5i051YrlYprRwP6Xa9zUNuk66Q7ZnZ4/aMGbslVk2ZuvGCXTFRrsbbPPl1w2i46HrIPAHo7VnAhypCoyEFLmJkwFTbSdyzCg3/aj36q0VLoGx67Mzgv6nu+0eDoJi0vCBHIPHdncPw7HQh9ha2f1PPO40MhPMiugQmdGFOfdRikJCzbT4B+fdlQ1oFmN/v3IBtjmaptD5vUyeQ91JUl+l8+5jQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=aKBTZdQQRPJtHpu9l0SxEbny6Hp2HGcwAWG6Jm43HQs=;
 b=ISQJcFUiO9EFKLcz4Rkd5kGxGAwlhnER4y498LT1vyD1mBUq8lGbZFF3WRRzMdMuehFnbbXA7ZbbhlRyjZhTNS2BbRXSbDA38U/XyU5eF5AONHRmWhmcdG2NvRV9CNuTg2CVK4ZVSHsQM0ygDbUuc1JGvehEnrZXE+huFAFTEinp/6X8J37S7l5r+KeT/Bk8Fny2+kqmaN+viHzA1ltQzzeN8q8qLXOuNTGjvNgpmIonxj6TmfWQqLpLi1edmOSrOlwD6DgXEJlkfRQ6hYS/eqNcdVUHqGVQFFbmsaH3UIyQV5i469G7Wh7OHSPLS/SPflIF7Qj4UZwR1TFRAVmqcg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=xen.org smtp.mailfrom=xilinx.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=xilinx.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=aKBTZdQQRPJtHpu9l0SxEbny6Hp2HGcwAWG6Jm43HQs=;
 b=SxakPK1U8zPUIvZYbvU46BYfC4m6yjJLrAqlPSWDmt4H28Iq/wIP/uTkVPgD/9HoGcym8+K596MKFoDSod9SfFpABX61fi/vTwu3k8p0GV5Wirf3/26TwhPeGWQoiUoPBKyZaqNV2F6gX2Ak/Bb0xoFUk4L1A1In2N4p/KZsDnE=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch02.xlnx.xilinx.com;
Message-ID: <dcf6b9ad-ce47-1862-5499-35fe122f538b@xilinx.com>
Date: Thu, 17 Mar 2022 10:14:00 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [XEN v10 4/4] xen/arm64: io: Handle data abort due to cache
 maintenance instructions
To: Julien Grall <julien@xen.org>, Ayan Kumar Halder
	<ayan.kumar.halder@xilinx.com>, <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <stefanos@xilinx.com>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>
References: <20220310174501.62040-1-ayankuma@xilinx.com>
 <20220310174501.62040-5-ayankuma@xilinx.com>
 <e2e27a6d-3339-d312-455c-0e61fe410462@xen.org>
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
In-Reply-To: <e2e27a6d-3339-d312-455c-0e61fe410462@xen.org>
Content-Type: text/plain; charset="UTF-8"; format=flowed
Content-Transfer-Encoding: 8bit
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 281dd2e1-c4c1-4f89-795c-08da07fedc6e
X-MS-TrafficTypeDiagnostic: SA0PR02MB7465:EE_
X-Microsoft-Antispam-PRVS:
	<SA0PR02MB7465B4B726CF54FA6D8C8BC5B2129@SA0PR02MB7465.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch02.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(110136005)(54906003)(4326008)(316002)(53546011)(70586007)(8676002)(31696002)(70206006)(508600001)(31686004)(47076005)(5660300002)(36860700001)(36756003)(40460700003)(7416002)(336012)(9786002)(8936002)(356005)(426003)(83380400001)(82310400004)(2906002)(26005)(186003)(2616005)(7636003)(50156003)(43740500002);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 10:14:02.5005
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 281dd2e1-c4c1-4f89-795c-08da07fedc6e
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch02.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	SN1NAM02FT0017.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA0PR02MB7465

Hi Julien,

On 11/03/2022 18:34, Julien Grall wrote:
> Hi,
>
> On 10/03/2022 17:45, Ayan Kumar Halder wrote:
>> When the data abort is caused due to cache maintenance for an address,
>> there are three scenarios:-
>>
>> 1. Address belonging to a non emulated region - For this, Xen should
>> set the corresponding bit in the translation table entry to valid and
>> return to the guest to retry the instruction. This can happen sometimes
>> as Xen need to set the translation table entry to invalid. (for eg
>> 'Break-Before-Make' sequence). Xen returns to the guest to retry the
>> instruction.
>>
>> 2. Address belongs to an emulated region - Xen should ignore the
>> instruction (ie increment the PC) and return to the guest.
>>
>> 3. Address is invalid - Xen should forward the data abort to the guest.
>>
>> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
>> ---
>>
>> Changelog:-
>>
>> v1...v8 - NA
>>
>> v9 - Extracted this change from "[XEN v7 2/2] xen/arm64: io: Support
>> instructions (for which ISS is not ..." into a separate patch of its
>> own. The reason being this addresses an existing bug in the codebase.
>>
>> v10 - 1. To check if the address belongs to an emulated region, one
>> needs to check if it has a mmio handler or an ioreq server. In this
>> case, Xen should increment the PC
>> 2. If the address is invalid (niether emulated MMIO nor the translation
>> could be resolved via p2m or mapping the MMIO region), then Xen should
>> forward the abort to the guest.
>>
>>   xen/arch/arm/include/asm/mmio.h |  1 +
>>   xen/arch/arm/io.c               | 20 ++++++++++++++++++++
>>   xen/arch/arm/ioreq.c            | 15 ++++++++++++++-
>>   3 files changed, 35 insertions(+), 1 deletion(-)
>>
>> diff --git a/xen/arch/arm/include/asm/mmio.h 
>> b/xen/arch/arm/include/asm/mmio.h
>> index ca259a79c2..79e64d9af8 100644
>> --- a/xen/arch/arm/include/asm/mmio.h
>> +++ b/xen/arch/arm/include/asm/mmio.h
>> @@ -35,6 +35,7 @@ enum instr_decode_state
>>        * instruction.
>>        */
>>       INSTR_LDR_STR_POSTINDEXING,
>> +    INSTR_CACHE,                    /* Cache Maintenance instr */
>>   };
>>     typedef struct
>> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
>> index e6c77e16bf..c5b2980a5f 100644
>> --- a/xen/arch/arm/io.c
>> +++ b/xen/arch/arm/io.c
>> @@ -139,6 +139,17 @@ void try_decode_instruction(const struct 
>> cpu_user_regs *regs,
>>           return;
>>       }
>>   +    /*
>> +     * When the data abort is caused due to cache maintenance, Xen 
>> should check
>> +     * if the address belongs to an emulated MMIO region or not. The 
>> behavior
>> +     * will differ accordingly.
>> +     */
>> +    if ( info->dabt.cache )
>> +    {
>> +        info->dabt_instr.state = INSTR_CACHE;
>> +        return;
>> +    }
>> +
>>       /*
>>        * Armv8 processor does not provide a valid syndrome for 
>> decoding some
>>        * instructions. So in order to process these instructions, Xen 
>> must
>> @@ -177,6 +188,15 @@ enum io_state try_handle_mmio(struct 
>> cpu_user_regs *regs,
>>           return rc;
>>       }
>>   +    /*
>> +     * When the data abort is caused due to cache maintenance and 
>> the address
>> +     * belongs to an emulated region, Xen should ignore this 
>> instruction.
>> +     */
>> +    if ( info->dabt_instr.state == INSTR_CACHE )
>> +    {
>> +        return IO_HANDLED;
>> +    }
>> +
>>       /*
>>        * At this point, we know that the instruction is either valid 
>> or has been
>>        * decoded successfully. Thus, Xen should be allowed to execute 
>> the
>> diff --git a/xen/arch/arm/ioreq.c b/xen/arch/arm/ioreq.c
>> index cc9bf23213..0dd2d452f7 100644
>> --- a/xen/arch/arm/ioreq.c
>> +++ b/xen/arch/arm/ioreq.c
>> @@ -29,10 +29,14 @@ enum io_state handle_ioserv(struct cpu_user_regs 
>> *regs, struct vcpu *v)
>>       const struct hsr_dabt dabt = hsr.dabt;
>>       /* Code is similar to handle_read */
>>       register_t r = v->io.req.data;
>> +    const struct instr_details instr = v->io.info.dabt_instr;
>>         /* We are done with the IO */
>>       v->io.req.state = STATE_IOREQ_NONE;
>>   +    if ( instr.state == INSTR_CACHE )
>> +        return IO_HANDLED;
>
> The request will not be forwarded to the IOREQ, so why do we need 
> check instr.state here?

I think it is not needed for the following reason.

leave_hypervisor_to_guest() ---> check_for_vcpu_work() --> 
vcpu_ioreq_handle_completion() --> get_pending_vcpu(v, &s) will return 
NULL. Is my understanding correct ?

- Ayan

>
>> +
>>       if ( dabt.write )
>>           return IO_HANDLED;
>>   @@ -47,7 +51,7 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs 
>> *regs,
>>                                struct vcpu *v, mmio_info_t *info)
>>   {
>>       struct vcpu_io *vio = &v->io;
>> -    struct instr_details instr = info->dabt_instr;
>> +    const struct instr_details instr = info->dabt_instr; >       
>> struct hsr_dabt dabt = info->dabt;
>>       ioreq_t p = {
>>           .type = IOREQ_TYPE_COPY,
>> @@ -78,6 +82,15 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs 
>> *regs,
>>       if ( !s )
>>           return IO_UNHANDLED;
>>   +    /*
>> +     * When the data abort is caused due to cache maintenance and 
>> the address
>> +     * belongs to an emulated region, Xen should ignore this 
>> instruction.
>> +     */
>> +    if ( instr.state == INSTR_CACHE )
>> +    {
>> +        return IO_HANDLED;
>> +    }
>> +
>>       ASSERT(dabt.valid);
>>         vio->req = p;
>
> Cheers,
>


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 10:43:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 10:43:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291481.494711 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUnbC-0003eZ-TO; Thu, 17 Mar 2022 10:43:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291481.494711; Thu, 17 Mar 2022 10:43:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUnbC-0003eS-QT; Thu, 17 Mar 2022 10:43:18 +0000
Received: by outflank-mailman (input) for mailman id 291481;
 Thu, 17 Mar 2022 10:43:17 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RBlk=T4=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nUnbB-0003eM-H0
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 10:43:17 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 0d1f2b88-a5df-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 11:43:16 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2113.outbound.protection.outlook.com [104.47.18.113]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-41-fRPGpr8nNdaQ8ouF7MXToQ-1; Thu, 17 Mar 2022 11:43:14 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM6PR04MB4421.eurprd04.prod.outlook.com (2603:10a6:20b:21::20)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Thu, 17 Mar
 2022 10:43:13 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d%9]) with mapi id 15.20.5081.017; Thu, 17 Mar 2022
 10:43:12 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0d1f2b88-a5df-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647513795;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=ouDn1d60YR/2pX0Xed/S8YOUCFZJ0++aPkPnbAMQ8qQ=;
	b=nqM/Uz2Auu6PR0P9eLHLlYtzBnHwpi8Wfyl1N2ClacZDqxYef9OGbjAvxF/VeirBX045sY
	8QDUog3vvIczDcspfnK2P1n+pWC200yn/nRcWBJI5nxgY/akEdVPtqR/zOeqpQ3/zMe4+g
	afO+AEKVAFus+ZhvctHsTUWj30XR2+k=
X-MC-Unique: fRPGpr8nNdaQ8ouF7MXToQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=j/IkgEoWXKM0KF6rs6uPTRRfBldKKd4A4uUneXr1Ye8lzSXzjIGcmzFPX4+XVnzWR98ZaO4Ptb3yP3VQMT8YT3fhCrdKBLbvZ676QYSr223sPhIlKni127EL0m0EIZEAIRp726C120wTs6IvYkiHcc2dx+shz6AUg4Jff0BchPuOHyo6hw2w/2tIg2FgVqKoncNl/mMPDWP7jWSVR0BfB1iinG4aUeE8nb3MZSKNKTC2HIH5iNS3zpCMGeucaPbO9GJkfKTzBgLB1v1gjIlfrW3hbLAuh9ojPTLvXrY2ylyJ3M/K+2l1VAjDK8f4u4lcGA0lYu9qe94wAUiYf2hQuQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ouDn1d60YR/2pX0Xed/S8YOUCFZJ0++aPkPnbAMQ8qQ=;
 b=Mm0Ooa/1iatoLQcz6qwSvXj/9n+r9CFHwArmNS3nworRjE257P5aKfyJCkGVxwv+zDvLUDf/hQ2/pMhzbezkkIuW0ghqY3n8J3ndoy+EekrIqPQAu+swJXXRLpYvEcn49ea+jhYCRHoRshZK65NInyMI7ylAqhA/i9bRNLV9EXGQxePrZOkCXMjzO6Y+gQooYTMJrWHXqBaEGXLxQoCmEduogjXoL6oI17HZGa1hgmkHuCNjBmFENSHNT/pBRUpWNsIYEBcs065jrIlbbS7DivSC8S86ZQ9D0ebx5RDUlyjPerwCfaz4ABnwB9GUXcYfgKaM7f0RAgPPl7u5TOfN3A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <db1e9af9-5441-c035-1998-33be07f6e908@suse.com>
Date: Thu, 17 Mar 2022 11:43:10 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] x86/cet: Use dedicated NOP4 for cf_clobber
Content-Language: en-US
To: Andrew Cooper <andrew.cooper3@citrix.com>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Wei Liu <wl@xen.org>, Bjoern Doebel <doebel@amazon.de>,
 Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <20220317100204.16391-1-andrew.cooper3@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220317100204.16391-1-andrew.cooper3@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR06CA0273.eurprd06.prod.outlook.com
 (2603:10a6:20b:45a::13) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 917a5abd-23ba-466f-e147-08da0802ef8f
X-MS-TrafficTypeDiagnostic: AM6PR04MB4421:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB4421C15171B54B7152DFF8B2B3129@AM6PR04MB4421.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6916009)(2616005)(8936002)(31686004)(8676002)(4326008)(316002)(2906002)(83380400001)(31696002)(5660300002)(54906003)(6506007)(186003)(26005)(6486002)(966005)(53546011)(86362001)(36756003)(66556008)(66476007)(6512007)(66946007)(508600001)(38100700002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?ZkQwbzhGd3FlSE9sS211V0pHeFVnczd4WDZUVUZTZzErL0tXcmFkcnFXMmZV?=
 =?utf-8?B?VS9YQWR2eDBKN1R5d0ZHSGtubThxRE82UVBsYysrNVEvdnYzeVZFZ1UzQWF5?=
 =?utf-8?B?dDczRWhHMmRuR2RmelVHV3VMQXM0OWtuMDhualJxS0t4RmtzcXRhNDZndnVj?=
 =?utf-8?B?YlVuRjNoOGUzSzdraHBvWk0zMkdQWnowWWtoWDZhRjJiTCtuaHdnN3I2Y2hW?=
 =?utf-8?B?VS9qc0RzZkgwV0JWOG5OZWVKU1FMaHBMTnBjN29sTm1icy9Sd3ltcWxnYk1B?=
 =?utf-8?B?TWhvcWFnWkFuUy9oNzZBdnZpd3pzTVBnNEs3NklXaVNvdDhzYnMxL3lwY2hn?=
 =?utf-8?B?eWV2VU16VnRvNm1LNjN2cFJtL1Z2clc0d0N2cFFkTGR5Q2p2NHJLRm9BMHBK?=
 =?utf-8?B?Vk1MdnplaytLSUFZakhiN2o2RThoU3NNVEF6dVFYbTFLanR1TjJZNjd6dnBE?=
 =?utf-8?B?YzR2eWtiSWF1MVVtVHlSUjVSVGZaanZHZzhzbUJqMVVKcHhldjJ5eEs3VU5n?=
 =?utf-8?B?SENxRW5BNmVvRXdkWWhyaUhCKzYySmxOUWZLRE5YRnJkRjhxRWIyRURORGxr?=
 =?utf-8?B?MVFUakZCUVRrOEJPR1MrOUl5YmcxUkJLM2dVaW56dVlZSnN5MGl1cCs1V3Iw?=
 =?utf-8?B?ZHVHMUQ1Ymx3TGx5NnhIQXp2emxWY3R1T2pUMldGbzhOSmR6UlNRcEFxQzdk?=
 =?utf-8?B?TmlWdkduQmh6ZkRaV2pwY0VlZWxWUERWNE9MaUY3SDhkeTBYQkRscU93eSt5?=
 =?utf-8?B?UnBGOXZTZFV0ZDVnUjRZSFRpQTkrNFo5TWdvZWZCam1JTW96b1ZLTVFXaHl1?=
 =?utf-8?B?YWpjdUZSSG81ZWpnMVYyaitQdUNTOUhHSU16T2hSR1QveHNZMUUvdkVCd1Bi?=
 =?utf-8?B?YjFkNTJINmhXcWdMMHJwYUhLQmNMUGQ2azM2cDF3UUM3Zm9ZV1N4V2tDV2RP?=
 =?utf-8?B?YlZRQUpSa0piVVhWcDlibC9nU0lSbDVxK2VPZWk0ejQ4ZWhBeVpNU1BGd21j?=
 =?utf-8?B?S09PTWlsREhBYnBuTjAwU00xbjA5TmdwZ2dOQXFEMFpCNGtzaTFDRmZ4N1ZR?=
 =?utf-8?B?QVY3c0JoY3Y2WTR5bmNhNUlpQVVETVVBUXczNzloWWJROEZZcEpNaDNOdWh0?=
 =?utf-8?B?eXlLdXhjK1dxVER3ZXA0UFJuYkRGZldxZWlYV1VSV01nb3N1OUE1c1lFbHNp?=
 =?utf-8?B?aTVNM1huMTVRQkZra0lYWCsxTUN3SldseUFIdTRvREZUSjdoVU5KN2Z6MlZ6?=
 =?utf-8?B?cHNKTm42TGF1TXo4MXpBbjlCZHRyWlZ0ZWlKKzRDRGhDNHVaV3ExaFkxa0F6?=
 =?utf-8?B?eTFnK0d2NFBzREJhTjFhbm5YR2x4T0wwUlYxVUlVNDRuck54RWJTaXdoNGtx?=
 =?utf-8?B?RWhDdWRsSmhHVzdjQThtMVI0NnZkcVc1T2ZJeWNGZXpnckVJSmU0RC9xTzB2?=
 =?utf-8?B?VlBqTHROQ1VNUVB3bzdNbDFrdThwY3phRXVRWlVpSExJVnQwQlNNRzI2Mkhu?=
 =?utf-8?B?RzFLUm9xcUpBOWFQTDBPcFdlTWJHNldBTS9Wd2k2VDRGbUk4NnUrQk9nM2Rp?=
 =?utf-8?B?YVdWSExmQWxFRGltbHpta2hjRjJpUnJVN2FBaGFsOTRjT2dmTTc4SDdvbTRM?=
 =?utf-8?B?d0x5UEtEdFg5eUNpbEFVM2t1ZDd1K1czUTY5czU4NzB1KzFjY2wxRGJGejZ0?=
 =?utf-8?B?TzJwekplZ3NKelROMGQrdjVCbWZYZDhpQ2c4THVqT0FkektrOWRzV3RIeFly?=
 =?utf-8?B?VTloMGs1dTVOSkJXem9TTEdNdzRnUTNtejlQNkpxOENOMUNpdTJtMG5qQ3g1?=
 =?utf-8?B?dnF3Z213ZXNzZlVaVVhjOTBFZmdqeTNqZkJRdHordFRIWkkrL2pYaU43anYz?=
 =?utf-8?B?NCtoeWRWd3BUclRzVHQybnNadmg2cWhoaERiRW5RdUVrVW5tNEUrQjFEeFlQ?=
 =?utf-8?Q?kKjMpSs2q8F518LBT7vMV2stu+wVG5D9?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 917a5abd-23ba-466f-e147-08da0802ef8f
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 10:43:12.9580
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: C5TdqwDtAxGQ3/dz/IhJFyKVYOLjyL1jPFe+RIaz7r6qtBsBSQ9LVDzRgwKhgqq/HS7e1jiGWvW5ovHQRk7/og==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB4421

On 17.03.2022 11:02, Andrew Cooper wrote:
> For livepatching, we need to look at a potentially clobbered function and
> determine whether it used to have an ENDBR64 instruction.
> 
> Use a non-default 4-byte P6 long nop, not emitted by toolchains, and extend
> check-endbr.sh to look for it.
> 
> The choice of nop has some complicated consequences.  nopw (%rax) has a ModRM
> byte of 0, which the Bourne compatible shells unconditionally strip from
> parameters, meaning that we can't pass it to `grep -aob`.

Urgh. But as per my earlier comments I'm happier with ...

> Therefore, use nopw (%rcx) so the ModRM byte becomes 1.

... a non-zero ModR/M byte anyway.

> This then demonstrates another bug.  Under perl regexes, \1 thru \9 are
> subpattern matches, and not octal escapes.  Switch the `grep -P` runes to use
> hex escapes instead.
> 
> The build time check then requires that the endbr64 poison have the same
> treatment as endbr64 to avoid placing the byte pattern in immediate operands.
> 
> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>

Reviewed-by: Jan Beulich <jbeulich@suse.com>

> Jan: As you had the buggy grep, can you please confirm that hex escapes work.

(Build-)Tested-by: Jan Beulich <jbeulich@suse.com>

When working out the workaround, I actually did test with hex, but
then switched to octal to make easily visible that the two patterns
actually match. I also did wonder about octal and sub-pattern
matching conflicting, but the grep I used definitely didn't have
an issue there. Hence I assume grep behavior changed at some point;
I wonder how they mean to have octal expressed now.
https://perldoc.perl.org/perlre specifically outlines how the
conflict is dealt with - assuming you have observed grep to misbehave,
I wonder whether they've accumulated a bug. (The doc also makes clear
that such references aren't limited to single digit numbers; you may
want to adjust your description in this regard.)

Depending on how exactly your grep behaves, switching to always-three-
digit octal escapes may be an alternative to retain the property of
making obvious the similarity between the two pattern representations.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 10:46:05 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 10:46:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291486.494723 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUnds-0004LO-Ev; Thu, 17 Mar 2022 10:46:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291486.494723; Thu, 17 Mar 2022 10:46:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUnds-0004LH-BE; Thu, 17 Mar 2022 10:46:04 +0000
Received: by outflank-mailman (input) for mailman id 291486;
 Thu, 17 Mar 2022 10:46:03 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=IuyF=T4=gmail.com=raphning@srs-se1.protection.inumbo.net>)
 id 1nUndr-0004LB-KH
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 10:46:03 +0000
Received: from mail-wm1-x335.google.com (mail-wm1-x335.google.com
 [2a00:1450:4864:20::335])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 70735ced-a5df-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 11:46:02 +0100 (CET)
Received: by mail-wm1-x335.google.com with SMTP id
 n31-20020a05600c3b9f00b003898fc06f1eso4708108wms.1
 for <xen-devel@lists.xenproject.org>; Thu, 17 Mar 2022 03:46:02 -0700 (PDT)
Received: from [192.168.12.253] (54-240-197-224.amazon.com. [54.240.197.224])
 by smtp.gmail.com with ESMTPSA id
 185-20020a1c19c2000000b0038a1d06e862sm7445278wmz.14.2022.03.17.03.46.00
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Thu, 17 Mar 2022 03:46:01 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 70735ced-a5df-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=message-id:date:mime-version:user-agent:subject:to:cc:references
         :from:in-reply-to:content-transfer-encoding;
        bh=4/TKFN8OHeQmnPvkT+/Uts6S/jZQtmdF+zJWXSq6Ink=;
        b=I6ghGaEN7ccYWqqyGmxELSwEIfSMU/3FqTyNc5iQAHdUOCTDGEDpk6vGrGAXleBDQ5
         pIj5/GPmtrZ00AU2VHLI16ug76T5tb9tUS6kJ2F7266CSAmyAgczkYbMeozD/4SC1Fts
         Vr2DSCNsn3qdNDBECg2wJbvs0V1wGV++e4Pzay1rYSB+93T8SnofslTiRopJMfaKZFSa
         tqme+h/3vvekuxWhyP0avpGx1S9wEWDh5tbEftvaOkbdLG4/SoCV2eA0bv01CxpuTyHq
         83QzmMAJgiuvTpFLroJAxLOKA8Qio+H1Vhsm5JzTiS4gaBWKZLdMEX+IRk2ljig3Vc6W
         PUug==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:message-id:date:mime-version:user-agent:subject
         :to:cc:references:from:in-reply-to:content-transfer-encoding;
        bh=4/TKFN8OHeQmnPvkT+/Uts6S/jZQtmdF+zJWXSq6Ink=;
        b=Nps/9hlH0oSSthqNOQ8vQM6phQkoqYJS0/yHQWq/MQp5/z2DalvVlTCFh7k8Y/4vmC
         xt0yAgdGkMnAfhkaLW+/0w7aqtrFnqc3StN+XEtrjOiFggWkdp3ufpVCozLwW7DBjil3
         +ndLNogv8337pPHsY5WdHluxkCdcqMS+LZpQO95l0dJKnG3AsMHppyDfR22TYnj1ieed
         JDspPYZZxwR4V37zkm3bKrsu30GrHiWkkL1ueaYrQFcJaHNBUYZGADnkz76DnoHN/eX3
         /T5zbVNStFFNb7R5LXoXMknqQibFKt7RSkkkPducWGYMlv8E0UW+GZvL8SpQ/jBNOfBV
         g3nA==
X-Gm-Message-State: AOAM531eZCPk6SfBWWb3qHo5x6VOAYUh4Ni8vU6livjFX6dwHf47X17W
	EJ6sq3CL1SoJPH18A070t9Q=
X-Google-Smtp-Source: ABdhPJyqq9X4YUFvHeb9AKn/gpnt448faKDmIT0keRUFQXPLdCFBgHyMZIvAOK8Ye8ZRspigmgiKCw==
X-Received: by 2002:a05:600c:1d28:b0:389:f5c5:5bc9 with SMTP id l40-20020a05600c1d2800b00389f5c55bc9mr3344751wms.89.1647513961909;
        Thu, 17 Mar 2022 03:46:01 -0700 (PDT)
Message-ID: <fa671802-4e93-d8d7-c0b6-d09770cdccca@gmail.com>
Date: Thu, 17 Mar 2022 10:45:59 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [XEN PATCH] evtchn/fifo: Don't set PENDING bit if guest
 misbehaves
To: Andrew Cooper <amc96@srcf.net>, xen-devel@lists.xenproject.org
Cc: Raphael Ning <raphning@amazon.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Wei Liu <wl@xen.org>, David Vrabel <dvrabel@amazon.co.uk>
References: <6b84a20b2753130cc62406a0fd14d2708f6f504b.1647455219.git.raphning@amazon.com>
 <e07d0eda-c117-c83e-227e-7a934585f265@srcf.net>
From: Raphael Ning <raphning@gmail.com>
In-Reply-To: <e07d0eda-c117-c83e-227e-7a934585f265@srcf.net>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit


On 16/03/2022 18:58, Andrew Cooper wrote:
> On 16/03/2022 18:38, Raphael Ning wrote:
>> From: Raphael Ning <raphning@amazon.com>
>>
>> Currently, evtchn_fifo_set_pending() will mark the event as PENDING even
>> if it fails to lock the FIFO event queue(s), or if the guest has not
>> initialized the FIFO control block for the target vCPU. A well-behaved
>> guest should never trigger either of these cases.
>>
>> There is no good reason to set the PENDING bit (the guest should not
>> depend on this behaviour anyway) or check for pollers in such corner
>> cases, so skip that. In fact, both the comment above the for loop and
>> the commit message for
>>
>>  41a822c39263 xen/events: rework fifo queue locking
>>
>> suggest that the bit should be set after the FIFO queue(s) are locked.
>>
>> Take the opportunity to rename the was_pending variable (flipping its
>> sense) and switch to the standard bool type.
>>
>> Suggested-by: David Vrabel <dvrabel@amazon.co.uk>
>> Signed-off-by: Raphael Ning <raphning@amazon.com>
>> ---
>>  xen/common/event_fifo.c | 8 ++++----
>>  1 file changed, 4 insertions(+), 4 deletions(-)
>>
>> diff --git a/xen/common/event_fifo.c b/xen/common/event_fifo.c
>> index ed4d3beb10f3..6c74ccebebb7 100644
>> --- a/xen/common/event_fifo.c
>> +++ b/xen/common/event_fifo.c
>> @@ -165,7 +165,7 @@ static void cf_check evtchn_fifo_set_pending(
>>      unsigned int port;
>>      event_word_t *word;
>>      unsigned long flags;
>> -    bool_t was_pending;
>> +    bool_t check_pollers = false;
> Considering your commit message, did you intend to change this to bool?
>
> Can be fixed on commit.  Acked-by: Andrew Cooper <andrew.cooper3@citrix.com>


My mistake, I missed that when rebasing the patch.


>
> ~Andrew
>
> P.S. David - do you want your maintainership back?  None of this code
> has undergone any major changes since you wrote it.


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 11:07:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 11:07:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291494.494742 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUny3-0006qw-4o; Thu, 17 Mar 2022 11:06:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291494.494742; Thu, 17 Mar 2022 11:06:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUny3-0006qp-1s; Thu, 17 Mar 2022 11:06:55 +0000
Received: by outflank-mailman (input) for mailman id 291494;
 Thu, 17 Mar 2022 11:06:54 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Gtxi=T4=gmail.com=tamas.k.lengyel@srs-se1.protection.inumbo.net>)
 id 1nUny1-0006qj-SW
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 11:06:54 +0000
Received: from mail-io1-xd29.google.com (mail-io1-xd29.google.com
 [2607:f8b0:4864:20::d29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 58573864-a5e2-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 12:06:51 +0100 (CET)
Received: by mail-io1-xd29.google.com with SMTP id d62so5401149iog.13
 for <xen-devel@lists.xenproject.org>; Thu, 17 Mar 2022 04:06:51 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 58573864-a5e2-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=FM5PSJrta5YOnjGaWKJnnwtFGFaRfbjBKgIsqQtH0og=;
        b=d1iWrsSaq14iiTN0mclTy7jUmnMlskdcJqHCrxSGSBOkghuMTYsiGVT0gVmiPZ0KTU
         PzyRkCii0Fhg31Ft25wdG20hJNOxY7ilyrPQn1NcyT0eP6Di72C5sfIc5PW+0q0zdX7a
         +0H3TItzUSS6FOTJRq8SuaUZ5pFwd4lBqO4Bc+7HjNYB1tp9qEHWtYzLI/nR3aIju1EE
         FfAJ6fJ3fVp/p9Wvzxj536v14Abk3Z0RgUVcY+Cc9Nm89ncYw60PtV0P0DJOuvJKtZy6
         ECNTfxj+Mq5K9p80A+VkYgze+5+c64HwUR3ldd8Y+TIxCiSJ/J2lmdAaBJp+Q7JjAxzb
         Cg+A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=FM5PSJrta5YOnjGaWKJnnwtFGFaRfbjBKgIsqQtH0og=;
        b=XtRMWFWrvvN0IKFcvKbprQSb2kfJw3A7veHksR+5bj8lfoAgg7ZTrWttZUV6c8p3dk
         RbHiMJQXG3TxF5bkBejlr4Fm8eKxoe+A/oDjmtsavHA+XKUtWvL4x4giiM+l6NKHDKdm
         +PsstT8/wzYAEJuR4viLO/ry3jSHNYz1fbjo9IiN1A0G8nUmF1SEiCbzoxTGx8CwYLhV
         ebRLAIBKL6bGUaz+dRC/NflCiuSrTw56QJS3JTkuWsA0JvUDACqsAxfkwetFO4oE0Ql5
         Fw/HzTGg2LtEHE1/YL+2ei7oznENhplz+QPk3uKNRuWrYHju+bJIUC4snjE/bdTnlpSE
         tENQ==
X-Gm-Message-State: AOAM5312xFWrkadFodvaQPm7hH49UAbhHbhrIRy1dn6vogAdAtNlpF6i
	JVZjqKrqJV4DJaRDNNvPAH+uDVZIvrbnEqsdhXwN3plV
X-Google-Smtp-Source: ABdhPJy0TlZshtgp4vykGST0ZeKUeqJqsOxWVUeAYZM7aRWdEjTGsdTUqmMSxtWmR1+AYR95iZQF1vciHV7dH03u40E=
X-Received: by 2002:a6b:b503:0:b0:641:808b:4046 with SMTP id
 e3-20020a6bb503000000b00641808b4046mr1828882iof.100.1647515209946; Thu, 17
 Mar 2022 04:06:49 -0700 (PDT)
MIME-Version: 1.0
References: <05d0a5b5c18d667a5527e6f834347f54a10309da.1646937728.git.tamas.lengyel@intel.com>
 <BN9PR11MB5276E96E39209EDCCED5E9198C0F9@BN9PR11MB5276.namprd11.prod.outlook.com>
 <CABfawhmZLyZdSbK0sr4t_WoYx6uYOV2bH89bX4ET0kzeQiY0-A@mail.gmail.com> <BN9PR11MB527623CD66F0F606BD0CF5F98C129@BN9PR11MB5276.namprd11.prod.outlook.com>
In-Reply-To: <BN9PR11MB527623CD66F0F606BD0CF5F98C129@BN9PR11MB5276.namprd11.prod.outlook.com>
From: Tamas K Lengyel <tamas.k.lengyel@gmail.com>
Date: Thu, 17 Mar 2022 07:06:37 -0400
Message-ID: <CABfawhnucaqR_RQd_XDKBUP=E_uRG7A6Xbo7dN8qj5wzAjyMZg@mail.gmail.com>
Subject: Re: [PATCH] x86/hvm: Include interruptibility state in hvm_hw_cpu
To: "Tian, Kevin" <kevin.tian@intel.com>
Cc: "Lengyel, Tamas" <tamas.lengyel@intel.com>, Xen-devel <xen-devel@lists.xenproject.org>, 
	"Beulich, Jan" <JBeulich@suse.com>, "Cooper, Andrew" <andrew.cooper3@citrix.com>, 
	=?UTF-8?Q?Pau_Monn=C3=A9=2C_Roger?= <roger.pau@citrix.com>, 
	Wei Liu <wl@xen.org>, "Nakajima, Jun" <jun.nakajima@intel.com>
Content-Type: multipart/alternative; boundary="000000000000d9dc0705da68061f"

--000000000000d9dc0705da68061f
Content-Type: text/plain; charset="UTF-8"

On Thu, Mar 17, 2022, 2:09 AM Tian, Kevin <kevin.tian@intel.com> wrote:

> > From: Tamas K Lengyel <tamas.k.lengyel@gmail.com>
> > Sent: Monday, March 14, 2022 8:14 PM
> >
> > On Mon, Mar 14, 2022 at 3:22 AM Tian, Kevin <kevin.tian@intel.com>
> wrote:
> > >
> > > > From: Lengyel, Tamas <tamas.lengyel@intel.com>
> > > > Sent: Friday, March 11, 2022 2:45 AM
> > > >
> > > > During VM fork resetting a failed vmentry has been observed when the
> > reset
> > > > is performed immediately after a STI instruction executed. This is
> due to
> > > > the guest interruptibility state in the VMCS being modified by STI
> but the
> > > > subsequent reset removes the IF bit from FLAGS, causing the failed
> > vmentry.
> > >
> > > I didn't get the rationale here. Before this patch the
> interruptibility state is
> > > not saved/restored thus I suppose after reset it will be cleared thus
> aligned
> > > with RFLAGS.IF=0. Can you elaborate a bit how exactly above problem is
> > > caused?
> >
> > The problem is that the interruptibility state is not cleared and thus
> > isn't aligned with RFLAGS.IF=0 after RFLAGS is reset. They go out of
> > sync leading to the failed vmentry. The interruptibility state needs
> > to be included in the hvm hw cpu struct for it to get re-aligned
> > during reset to avoid the failed vmentry.
>
> I'm still confused here. The interruptibility state should have bit 0 as 1
> after a STI instruction is executed (RFLAGS.IF=1). Saving/restoring it
> still doesn't match RFLAGS.IF=0 after vm fork reset. So I didn't understand
> how this patch actually fixes the problem.
>

I think I see where the confusion is. We are saving the context of the
parent vm and restoring it in the fork during a reset. That's what a reset
is. So by including the field in the struct means it will be reset to be in
sync with RFLAGS of the parent vm. Right now only the RFLAGS is copied from
the parent and interruptibility state isn't touched at all.


Also if there is a real problem shouldn't we just reset the interruptbility
> state to match RFLAGS.IF=0?
>

Yes, exactly what this patch achieves. Looking at it more I think the rest
of the non-register cpu state should similarly be included so those would
get reset too (activity & pending dbg).


> >
> > >
> > > >
> > > > Include the interruptibility state information in the public
> hvm_hw_cpu
> > struct
> > > > so that the CPU can be safely saved/restored.
> > > >
> > > > Signed-off-by: Tamas K Lengyel <tamas.lengyel@intel.com>
> > > > ---
> > > >  xen/arch/x86/hvm/hvm.c                 |  9 +++++----
> > > >  xen/arch/x86/hvm/vmx/vmx.c             |  4 ++++
> > > >  xen/arch/x86/include/asm/hvm/hvm.h     | 26
> > >
> > > Why is this change only applied to vmx instead of svm?
> >
> > VM forking is implemented only for vmx, thus this change is only
> > relevant where a VM would be immediately reset after a STI
>
> but the ops is generic and SVM already has the related callbacks.
>
> > instruction. Normal VM save/restore/migration doesn't attempt to
> > capture a VM state immediately after STI thus it's not relevant for
> > SVM.
> >
>
> Can you elaborate why save/restore/migration won't happen
> right after STI while it does for vm fork?
>

This is just based on my observation that noone has encountered this issue
in the long life of Xen. If I'm wrong and this cornercase could be
encountered during normal routes I can wire in SVM too. I ran into this
with vm forks because we are resetting the forks very very often (thousands
of times per second) under various execution paths with the fuzzer and one
happened to hit reset just after STI.

Another question I would be interested to hear from the maintainers is in
regards to the hvm context compat macros. Right now they differentiate
between hvm hw cpu struct versions based on size. So since this patch
doesn't change the size how is that supposed to work? Or if there are more
then two versions of the struct? The compat version never changes?

Tamas

>

--000000000000d9dc0705da68061f
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto"><div><br><br><div class=3D"gmail_quote"><div dir=3D"ltr" =
class=3D"gmail_attr">On Thu, Mar 17, 2022, 2:09 AM Tian, Kevin &lt;<a href=
=3D"mailto:kevin.tian@intel.com">kevin.tian@intel.com</a>&gt; wrote:<br></d=
iv><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left=
:1px #ccc solid;padding-left:1ex">&gt; From: Tamas K Lengyel &lt;<a href=3D=
"mailto:tamas.k.lengyel@gmail.com" target=3D"_blank" rel=3D"noreferrer">tam=
as.k.lengyel@gmail.com</a>&gt;<br>
&gt; Sent: Monday, March 14, 2022 8:14 PM<br>
&gt; <br>
&gt; On Mon, Mar 14, 2022 at 3:22 AM Tian, Kevin &lt;<a href=3D"mailto:kevi=
n.tian@intel.com" target=3D"_blank" rel=3D"noreferrer">kevin.tian@intel.com=
</a>&gt; wrote:<br>
&gt; &gt;<br>
&gt; &gt; &gt; From: Lengyel, Tamas &lt;<a href=3D"mailto:tamas.lengyel@int=
el.com" target=3D"_blank" rel=3D"noreferrer">tamas.lengyel@intel.com</a>&gt=
;<br>
&gt; &gt; &gt; Sent: Friday, March 11, 2022 2:45 AM<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; During VM fork resetting a failed vmentry has been observed =
when the<br>
&gt; reset<br>
&gt; &gt; &gt; is performed immediately after a STI instruction executed. T=
his is due to<br>
&gt; &gt; &gt; the guest interruptibility state in the VMCS being modified =
by STI but the<br>
&gt; &gt; &gt; subsequent reset removes the IF bit from FLAGS, causing the =
failed<br>
&gt; vmentry.<br>
&gt; &gt;<br>
&gt; &gt; I didn&#39;t get the rationale here. Before this patch the interr=
uptibility state is<br>
&gt; &gt; not saved/restored thus I suppose after reset it will be cleared =
thus aligned<br>
&gt; &gt; with RFLAGS.IF=3D0. Can you elaborate a bit how exactly above pro=
blem is<br>
&gt; &gt; caused?<br>
&gt; <br>
&gt; The problem is that the interruptibility state is not cleared and thus=
<br>
&gt; isn&#39;t aligned with RFLAGS.IF=3D0 after RFLAGS is reset. They go ou=
t of<br>
&gt; sync leading to the failed vmentry. The interruptibility state needs<b=
r>
&gt; to be included in the hvm hw cpu struct for it to get re-aligned<br>
&gt; during reset to avoid the failed vmentry.<br>
<br>
I&#39;m still confused here. The interruptibility state should have bit 0 a=
s 1<br>
after a STI instruction is executed (RFLAGS.IF=3D1). Saving/restoring it<br=
>
still doesn&#39;t match RFLAGS.IF=3D0 after vm fork reset. So I didn&#39;t =
understand<br>
how this patch actually fixes the problem.<br></blockquote></div></div><div=
 dir=3D"auto"><br></div><div dir=3D"auto">I think I see where the confusion=
 is. We are saving the context of the parent vm and restoring it in the for=
k during a reset. That&#39;s what a reset is. So by including the field in =
the struct means it will be reset to be in sync with RFLAGS of the parent v=
m. Right now only the RFLAGS is copied from the parent and interruptibility=
 state isn&#39;t touched at all.</div><div dir=3D"auto"><br></div><div dir=
=3D"auto"><br></div><div dir=3D"auto"><div class=3D"gmail_quote"><blockquot=
e class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc sol=
id;padding-left:1ex">
Also if there is a real problem shouldn&#39;t we just reset the interruptbi=
lity<br>
state to match RFLAGS.IF=3D0?<br></blockquote></div></div><div dir=3D"auto"=
><br></div><div dir=3D"auto">Yes, exactly what this patch achieves. Looking=
 at it more I think the rest of the non-register cpu state should similarly=
 be included so those would get reset too (activity &amp; pending dbg).</di=
v><div dir=3D"auto"><br></div><div dir=3D"auto"><div class=3D"gmail_quote">=
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<br>
&gt; <br>
&gt; &gt;<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; Include the interruptibility state information in the public=
 hvm_hw_cpu<br>
&gt; struct<br>
&gt; &gt; &gt; so that the CPU can be safely saved/restored.<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; Signed-off-by: Tamas K Lengyel &lt;<a href=3D"mailto:tamas.l=
engyel@intel.com" target=3D"_blank" rel=3D"noreferrer">tamas.lengyel@intel.=
com</a>&gt;<br>
&gt; &gt; &gt; ---<br>
&gt; &gt; &gt;=C2=A0 xen/arch/x86/hvm/hvm.c=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0|=C2=A0 9 +++++----<br>
&gt; &gt; &gt;=C2=A0 xen/arch/x86/hvm/vmx/vmx.c=C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0|=C2=A0 4 ++++<br>
&gt; &gt; &gt;=C2=A0 xen/arch/x86/include/asm/hvm/hvm.h=C2=A0 =C2=A0 =C2=A0=
| 26<br>
&gt; &gt;<br>
&gt; &gt; Why is this change only applied to vmx instead of svm?<br>
&gt; <br>
&gt; VM forking is implemented only for vmx, thus this change is only<br>
&gt; relevant where a VM would be immediately reset after a STI<br>
<br>
but the ops is generic and SVM already has the related callbacks.<br>
<br>
&gt; instruction. Normal VM save/restore/migration doesn&#39;t attempt to<b=
r>
&gt; capture a VM state immediately after STI thus it&#39;s not relevant fo=
r<br>
&gt; SVM.<br>
&gt; <br>
<br>
Can you elaborate why save/restore/migration won&#39;t happen<br>
right after STI while it does for vm fork?<br></blockquote></div></div><div=
 dir=3D"auto"><br></div><div dir=3D"auto">This is just based on my observat=
ion that noone has encountered this issue in the long life of Xen. If I&#39=
;m wrong and this cornercase could be encountered during normal routes I ca=
n wire in SVM too. I ran into this with vm forks because we are resetting t=
he forks very very often (thousands of times per second) under various exec=
ution paths with the fuzzer and one happened to hit reset just after STI.</=
div><div dir=3D"auto"><br></div><div dir=3D"auto">Another question I would =
be interested to hear from the maintainers is in regards to the hvm context=
 compat macros. Right now they differentiate between hvm hw cpu struct vers=
ions based on size. So since this patch doesn&#39;t change the size how is =
that supposed to work? Or if there are more then two versions of the struct=
? The compat version never changes?</div><div dir=3D"auto"><br></div><div d=
ir=3D"auto">Tamas</div><div dir=3D"auto"><div class=3D"gmail_quote"><blockq=
uote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc =
solid;padding-left:1ex">
</blockquote></div></div></div>

--000000000000d9dc0705da68061f--


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 11:07:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 11:07:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291497.494752 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUnyr-0007Mr-DF; Thu, 17 Mar 2022 11:07:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291497.494752; Thu, 17 Mar 2022 11:07:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUnyr-0007Mk-AK; Thu, 17 Mar 2022 11:07:45 +0000
Received: by outflank-mailman (input) for mailman id 291497;
 Thu, 17 Mar 2022 11:07:44 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nUnyp-0007Mc-VH
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 11:07:43 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nUnyp-0000M0-Qr; Thu, 17 Mar 2022 11:07:43 +0000
Received: from 54-240-197-230.amazon.com ([54.240.197.230] helo=[10.7.239.19])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nUnyp-0000XX-KW; Thu, 17 Mar 2022 11:07:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=9jIZQLPoBgQdj1j6jMc+F5u7xZ9vcvpxznzvg/fskbk=; b=xC/wY1BYmIG2KI9vOe6Cj2AqzO
	PoBy1R7kc2amzhN7XHZwUmtO6SJok73TrvedzybiWViNYrUUtQpFlhEfRfUnNGNUzHhGF/z9XEf2S
	PjgNTl1RI3DEJD88Yx6hQxz8AV2Gh0L0NtBaSDOHnJpwI13TQRNnOinvN4R5DHsW7bTs=;
Message-ID: <d44b8e44-4e7e-c395-da9c-916ec641a687@xen.org>
Date: Thu, 17 Mar 2022 11:07:41 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH 1/3] tools/xenstore: add documentation for new
 set/get-feature commands
To: Juergen Gross <jgross@suse.com>, xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
References: <20220316161017.3579-1-jgross@suse.com>
 <20220316161017.3579-2-jgross@suse.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220316161017.3579-2-jgross@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Juergen,

On 16/03/2022 16:10, Juergen Gross wrote:
> Add documentation for two new Xenstore wire commands SET_FEATURE and
> GET_FEATURE used to set or query the Xenstore features visible in the
> ring page of a given domain.
> 
> Signed-off-by: Juergen Gross <jgross@suse.com>
> ---
>   docs/misc/xenstore-ring.txt |  1 +
>   docs/misc/xenstore.txt      | 12 ++++++++++++
>   2 files changed, 13 insertions(+)
> 
> diff --git a/docs/misc/xenstore-ring.txt b/docs/misc/xenstore-ring.txt
> index f91accb5b0..bd000f694e 100644
> --- a/docs/misc/xenstore-ring.txt
> +++ b/docs/misc/xenstore-ring.txt
> @@ -68,6 +68,7 @@ Mask    Description

I find a bit odd we describe the feature in term of mask rather bit. 
This will get more difficult to read as we add more bits.

This is not new, so not change expected in this series.

>   -----------------------------------------------------------------
>   1       Ring reconnection (see the ring reconnection feature below)
>   2       Connection error indicator (see connection error feature below)
> +4       GET_FEATURE and SET_FEATURE Xenstore wire commands are available

Below, you wrote the two commands are dom0 only. Furthermore, I would 
expect such comment return something like ENOSYS if they are not present.

So do we really need to add a feature bit for GET_FEATURE/SET_FEATURE?

>   
>   The "Connection state" field is used to request a ring close and reconnect.
>   The "Connection state" field only contains valid data if the server has
> diff --git a/docs/misc/xenstore.txt b/docs/misc/xenstore.txt
> index ea3d8be177..31e3d53c52 100644
> --- a/docs/misc/xenstore.txt
> +++ b/docs/misc/xenstore.txt
> @@ -332,6 +332,18 @@ SET_TARGET		<domid>|<tdomid>|
>   
>   	xenstored prevents the use of SET_TARGET other than by dom0.
>   
> +GET_FEATURE		<domid>|		<value>|

Did you indented to add many spaces before <value>?

> +SET_FEATURE		<domid>|<value>|
> +	Returns or sets the contents of the "feature" field located at
> +	offset 2064 of the Xenstore ring page of the domain specified by
> +	<domid>. <value> is a decimal number being a logical or of the
> +	feature bits as defined in docs/misc/xenstore-ring.txt. Trying
> +	to set a bit for a feature not being supported by the running
> +	Xenstore will be denied.
How will the caller know which feature is supported? Also, what happen 
if a client decided to overwrite 'feature'? Could the result potentially 
prevent migration/liveupdate or else?

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 11:09:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 11:09:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291500.494764 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUo0G-00081A-Op; Thu, 17 Mar 2022 11:09:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291500.494764; Thu, 17 Mar 2022 11:09:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUo0G-000813-LV; Thu, 17 Mar 2022 11:09:12 +0000
Received: by outflank-mailman (input) for mailman id 291500;
 Thu, 17 Mar 2022 11:09:11 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=JNAg=T4=citrix.com=prvs=0684b021b=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nUo0E-00080x-Va
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 11:09:11 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id aa206b22-a5e2-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 12:09:09 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: aa206b22-a5e2-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647515349;
  h=from:to:cc:subject:date:message-id:
   content-transfer-encoding:mime-version;
  bh=TG5YQMxHE5nykjYo/YBIAEgsJBbW3Usf7syD2PnlbNc=;
  b=K6zx/Ur5rIlm6Q5pomfL60heGyMJgeC6xZOXEXs0QhUfgPVE4BDREi67
   YV0ukmpHShdRilIcVMLQfCseXv1p90uCp4yLHbh1LOjLMuKkC/IKOV/2s
   OXj7C0Zr1OChc9SBSGeWen2bz5SCxTjT9gbx3/Bh79RPc9WXDc9ng0sdp
   U=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65951484
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:vBn8darD/3mzs6ufA3DoXS86abheBmKVZRIvgKrLsJaIsI4StFCzt
 garIBmCMviONmugLt9xYIi18EJTsceGzoBgSQA9qC9jHi5BoJuZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 Iyq+aUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBOouPkeY/SDhhSQJ5YPVGypqceF+wiJnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVI1zbWAOxgWZnea67L+cVZzHE7gcUm8fP2O
 ZdINGMzPEiojxtnHHErBbcimveThlqkemJa+W62gJpsyj2GpOB2+Oe0a4eEEjCQfu1rmUKfq
 nPD7n7OKBgQP9yCyhKI6nupwOTImEvTUo8ICKex8PIshVSJ33ESEzUfT179qv684mahX/pPJ
 kpS/TAhxYAw/kG2Stj2XzWjvWWJ+BUbXrJ4EOo88giBjLXV5wWxAXINRTpMLtchsaceVTEsk
 1OEgd7tLThuq6GOD2KQ8K+OqjG/MjRTKnUNDQcGUA8E7t/LsIw1yBXVQb5LC7Wph9f4HTXxx
 TGiryUkgbgXy8kR2M2GEUvv2mz24MKTF0hsu1uRDjnNAh5FiJCNY6rr4Fr59td5dqWeEwGBj
 l1fwu+R1bVbZX2SrxClTOIIFbCvwv+KNjzAnFJid6UcGySRF22LJt4JvmwnTKt9GoNdIGKyP
 heP0e9EzMULVEZGe5ObdG5Y5y4C6aH7XeroWfnPBjalSsggLVTXlM2CiKP54owMrKTOufxnU
 Xt4WZz1ZZr/NUiB5GDqLwv6+eV3rh3SPUuJGfjGI+2PiNJynkK9R7YfK0epZesk9q6Cqwi92
 48Ba5TWlkoGCrOmPXS/HWsvwbYidyRT6Xfe8ZA/SwJ+ClA+RDFJ5wH5nNvNhLCJb4wKz7yVr
 xlRq2dTyUblhG2vFOl5QisLVV8bZr4m9ShTFXV1ZT6AgiF/Ca7yvPZ3X8ZmJtEPqb08pcOYu
 tFYIq1s9NwUEW+Zk9ncBLGgxLFfmOOD3lvfYXD6PGBhI/aNhWXho7fZQ+cmzwFXZgKfvsoiu
 bywkATdRJsIXQN5C8jKLvmoyjuMUbI1wYqeg2OgzgFvRXjR
IronPort-HdrOrdr: A9a23:XCIF3KnbXlgyW2xKhRs1TOg/VrLpDfPaimdD5ihNYBxZY6Wkfp
 +V88jzhCWZtN9OYhwdcLC7WZVpQRvnhPpICO4qTM2ftWjdyRCVxeRZg7cKrAeQfREWmtQtt5
 uIEJIOd+EYb2IK9PoSiTPQe71LoKjlzEnBv5aj854Hd3AMV0gP1XYdNu7NeXcGOTWuSKBJYq
 a0145inX6NaH4XZsO0Cj0sWPXCncTCkNbDbQQdDxAqxQGShXfwgYSKWySw71M7aXdi0L0i+W
 /Kn0jQ4biiieiyzlv523XI55pbtdP9wp9oBdCKiOISNjLw4zzYLbhJavmnhnQYseuv4FElnJ
 3lpAohBd167zfrcmS8sXLWqnzd+Qdrz0Wn5U6TgHPlr8C8bik9EdB9iYVQdQacw1Y8vflnuZ
 g7kl6xht5yN1ftjS7979/HW1VBjUyvu0cvluYVkjh2TZYeUrlMtoYSlXklWqvoJBiKp7zPLd
 MeQv01vJ1tABKnhjHizyJSKeWXLzgO9kzseDlDhiSXuwIm7kyRgXFoh/D3pU1wha7Ve6M0md
 gsDZ4Y5I2mNvVmFZ6VJN1xNfdfWVa9Ni4lDgqpUCfa/ec8SjDwl6I=
X-IronPort-AV: E=Sophos;i="5.90,188,1643691600"; 
   d="scan'208";a="65951484"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=cyekEL87368FuB8UB90/IQwHo9I2ed9PAnTsKq3SiqeiPZN/Jyc/Lra0sWTVqJTAfcOIfeuh4qy70I3r/CntMuX+mVCorwFpNRRbFrywue/t6i3vO6ANFHXhXwH1+a2ysPSFubdSgmn2JX1Hsn2GoqdGbHxjshRV6JN/xcfNvWYv3sKe2Xqz3phEpjjLeFgFgn5NA21z5XiRfT6EGMyvHm87Rm93vBcvPHhpuneSl5uG9u6ls9G5re5J0vXPUsiYN1psu0rgEgeNGg1NQRMEoJVQemiSXlO/MApOKakeUgJC1WHcZcMB5h/0eHzjYp2cVo0RGNkcuTHzXN+Der9tlQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=4ZvNQ2Jsd1nbrbGwaI4yAv5SLDZE/R4NZJGlJk5r62U=;
 b=PV1wIZ19MRKiAH3ZJdtjVPX8e8HdzQOdrkF1ZWpKG2tA3qOXpMNGS3zKtkV8J4qo5snv5BsfoROM6PvuyUukHzOZfGsudinXXbEMzH8CSpIkFyuYTEOAzb7T4WNgtLPfLySh+eCqzenrBxm7XlF0Y63zI7KtisrUY5p9+2Z1TN8wZ/eagLexNUgZGR/aNymHWKsaiK5a9XyMCP6LbKSjmZnHPqWMxX229YTh0KPLRgSbZGOF+DNqvc8l/HGi3ap+iAwYSHUV5Q+6fBm2beXCLZ+sCLbm9BtS+jFO6FB9OPsOPuTLf8aJMaNQzm7W6q1L6f3xJrM1Eexb/hkhkGRi/g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=4ZvNQ2Jsd1nbrbGwaI4yAv5SLDZE/R4NZJGlJk5r62U=;
 b=Zh9spOnXbWkBQ5WjIEmHaCukLuS2HnD2mZFbDuhsxKRILQobpChvGr3XGrG1iG1ikfhBiWhyISu0EPnyIoaddyKEsxAacXgbTahCvnvNld8Z852VGMPp7f9cOZ3POieol1xglQ+35UB9mAGY4chqalafGpSSeDv3d6gm+DyoDQw=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Konrad Rzeszutek Wilk
	<konrad.wilk@oracle.com>, Ross Lagerwall <ross.lagerwall@citrix.com>, Stefano
 Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>, Bertrand
 Marquis <bertrand.marquis@arm.com>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>, Jan Beulich <jbeulich@suse.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: [PATCH 0/2] livepatch: fix handling of (some) relocations
Date: Thu, 17 Mar 2022 12:08:52 +0100
Message-ID: <20220317110854.39050-1-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO4P123CA0060.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:153::11) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ead39772-0926-46fc-2b49-08da08068c48
X-MS-TrafficTypeDiagnostic: BL1PR03MB6102:EE_
X-Microsoft-Antispam-PRVS: <BL1PR03MB610264F5A9F0E21CC3915D798F129@BL1PR03MB6102.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(83380400001)(2906002)(4326008)(508600001)(8676002)(82960400001)(6512007)(86362001)(6506007)(5660300002)(6666004)(6916009)(8936002)(26005)(66946007)(66476007)(316002)(66556008)(186003)(36756003)(2616005)(6486002)(38100700002)(1076003)(54906003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?MDh3a21EYkY2dVFta25UZmZPVWtSQ2dVRlJXbVU3OFNwNDFTdTZQaUk0Yjlh?=
 =?utf-8?B?Sjhjb0xCVTd1dUM2eXZXNWgrSmtFd0owdVBkTERLSEhSd3FoUVRIK2dYeDQ4?=
 =?utf-8?B?SDJOL1l1Z0pKcnJFdDY3QmlyUnhwcXpXdWQ2eTFZUCtmdFhhQi9tNTRGd0Nn?=
 =?utf-8?B?czNjaFFpUDRVd2owcVRsZ0dobk54bmlqZjd2dGRPek1hdlJSUlNEZmpyWGpD?=
 =?utf-8?B?YjJuUForM1lndmkzeUtJL0MzSHNMckVhcEgzVXNZeWhRdTlGMVpTMlFzYnVi?=
 =?utf-8?B?VDZOZGU1YVZ5M0FoTjdxTEJHK0Z2SXVBUkVsQXVkWFRSZzR3cSsvbUZFSW5m?=
 =?utf-8?B?YXQ3RWhxTVQvenNrRU5kV21Dd280VUZMYXpQT2V1azF2S3B1TGtGcTBUYXhI?=
 =?utf-8?B?QXdwTFlrV0xUMTFRTGJ5S21oZmxBZmtiOUhNVk54QSt5aDhCbVFQZ0VhdGdE?=
 =?utf-8?B?V2cxRTIrZVBjWUJTMnZIaDFxT1prbzZTZG5EZ0VLaGU3UlhTemVOODk1Q1Q3?=
 =?utf-8?B?K1VTS2tSd3QvUVJBdmNxUlFoT2s4OTlDWDVyR01ZWlhaRkVCZTloVzlHRUl6?=
 =?utf-8?B?eHJXZHVicU1mR2lRdkQwazlXSWNXYlEwUVo3alhWZGlrQnhVN216QU9KRmkr?=
 =?utf-8?B?eFJzam5BeHFIdjRwbjB6M2I2Y3h0K0ZhSVUwQXI1dEgvcm9WM2ZWVHhtOG1R?=
 =?utf-8?B?YW9ianZvM2VRQU91ZytuRUl3VzhQS1pJQXVuS3dpYjZJM0o2S0dQSFpqZngv?=
 =?utf-8?B?K1c3S2tieFZxNjRUd2xUL0xibVNmMjhZOWdRRVkyMWJNQm5QNGcwQXNpQVNt?=
 =?utf-8?B?OGRYVk9EejBPR2tVOTNRNkZPSi9McDVWL01CWktvODBoL25BQlBGL2RrTTVP?=
 =?utf-8?B?TzBRMGlObWVvNCtlQ1RGLzdZVDRHQmJjaWVERElYaDBrdzVqelBaSnVaSTVh?=
 =?utf-8?B?VjZKeUt3ckZNa3hyb3ltdUlpb0JST0lCV1pXTlBuSXdoTWliWGpQYStNK0FR?=
 =?utf-8?B?NnlDOGpjd2VHWGlyRldBamtOTjdMa3FNZVErQ3NZdnBRWWV6U1JIYWw3bVJP?=
 =?utf-8?B?RkFNSVZpejk2eXVpdEVYUFF0QmhCSlYrNitQVGFtY1Y5RDliSVh6dytIV1JT?=
 =?utf-8?B?dm52UXFyUjJkK29GSDF2UEhLTnRWRDNnaGRHVnJPTHdHZ3NZN2pIaUxTdFlv?=
 =?utf-8?B?ZnlFQlhmQXg4aXdLRzgrS1BwL2RWR0ZBeXFxdHlndS9vRUwxcWhBWGxwV1VM?=
 =?utf-8?B?Z3VHbThTbGdrTE5qWHJUQVZMbHZvdWd3K1FyNGRZa0h3SXJSSmFvTVh2WUJm?=
 =?utf-8?B?UjdNZmwvOXEzVGNyallRM2tNTWxLTkNBS2g3bnNHK3RRdHo1bWhIR3Q0ODBY?=
 =?utf-8?B?cjgwT0VVUHNtYnlDdDE3QUZHQUdXSTl2bXVNSmkwcm5CVkVMNm1BV0RyRUow?=
 =?utf-8?B?amQzWThMUXpyZGVDVEFtM00vSWpsL3ZaREVKSURoakIydGJ1enFrTHU1MWhJ?=
 =?utf-8?B?WVhUcStxOXc1eXZPZXlubTVKcUJ1bFJUZ01CcmswKzBZaDdZc25wZWd0WEdF?=
 =?utf-8?B?QjFYbFdtcjFQQmxMQ2c2TmVFaGxHSHA5UkZoVTJoZDU2RXdKT2d5VmtPYUZM?=
 =?utf-8?B?ZzF6ZThjV2J1dTE0ejZaTnlTQ004TUZ5aWlLZzNjL1Znakl5Y2VMQW1QTitW?=
 =?utf-8?B?QjlZZEQxdU1rc2t4MTNtYVprZUU1MldwbFE4T01scDFZM0hsZVgyRlRVWm1N?=
 =?utf-8?B?TUNudkJZQlZvOC8rck1XK3l1cEFJOTVBZGJBRkd6VWZPYnBsczFCTzRoLzhR?=
 =?utf-8?B?bGVDVmhYaGY3Nnh1UVZRU3hha29zSFovWFRzSVpvQXJJVGo2dS92SmZNT1Ev?=
 =?utf-8?B?bEZzaGpNNlNqL0ZxNmMrT1RtUG9wVHRrTm1FZW1RWEwwb1Q5TlhMTm1wZk5m?=
 =?utf-8?B?NGZyb0RrZDduZXV1dDdLQ09wNVlGc0gzTkdaa1JWN0tUVGozTjFqWjF1bDVJ?=
 =?utf-8?B?aUtBSE5ISUJBPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: ead39772-0926-46fc-2b49-08da08068c48
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 11:09:04.4273
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: CTim6WTVEimnR/BD48wYUwDvo7UcAohI52jatw+gwtR++L4KNMl8PWlmSLnDl5z8FzRjckAeRpQToqTEYM1okg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL1PR03MB6102
X-OriginatorOrg: citrix.com

Hello,

Relocations that reference symbols that belong to sections with a size
of 0 are not properly resolved, as the address of those symbols won't be
resolved in the first place.

Fix this by not ignoring sections with a size of 0, while still properly
handling the detection of whether a livepatch can be reapplied after
being reverted (patch 1).

Also detect whether any relocations reference unresolved symbols and
error out in that case, as those relocations cannot be resolved (patch
2).

I wonder whether it's possible to have unresolved symbols if we only
ignore non SHF_ALLOC sections, so we could maybe error out earlier if we
found a symbols that belongs to a non SHF_ALLOC section in
livepatch_elf_resolve_symbols.  The current approach is more conservative
as we would only report an error if we have unresolved symbols that are
referenced in relocations.

Thanks, Roger.

Roger Pau Monne (2):
  livepatch: do not ignore sections with 0 size
  livepatch: avoid relocations referencing ignored section symbols

 xen/arch/arm/arm32/livepatch.c  |  7 +++++++
 xen/arch/arm/arm64/livepatch.c  |  7 +++++++
 xen/arch/x86/livepatch.c        |  7 +++++++
 xen/common/livepatch.c          | 16 +++++++++++-----
 xen/common/livepatch_elf.c      |  6 ++++++
 xen/include/xen/livepatch_elf.h |  3 ++-
 6 files changed, 40 insertions(+), 6 deletions(-)

-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 11:09:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 11:09:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291501.494775 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUo0S-0008NP-4z; Thu, 17 Mar 2022 11:09:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291501.494775; Thu, 17 Mar 2022 11:09:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUo0S-0008NI-1Y; Thu, 17 Mar 2022 11:09:24 +0000
Received: by outflank-mailman (input) for mailman id 291501;
 Thu, 17 Mar 2022 11:09:22 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=JNAg=T4=citrix.com=prvs=0684b021b=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nUo0Q-00080x-Jb
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 11:09:22 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id b16bb2bb-a5e2-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 12:09:21 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b16bb2bb-a5e2-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647515361;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:content-transfer-encoding:mime-version;
  bh=fpKWCCUtR+/R9d1fr17rKD/uI5IeMN8VnwhiJs0DQeI=;
  b=Yw7CtvRkwwZk/udo9kE2Sp8uRvIJQS5rt3jLtChBIzLIb0QuhdMGE4W/
   hpXRxMjf0jGE6jm/4WxeXnvHPBOYgounVtKBcf6BV2vhNkrajwLZuSrc2
   J6mpvWPOTOeaGddLOyGCB9mivuPdIu9fSa3ua/SWJI6lPFZ9KqaGjtrDP
   8=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66496270
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:xAxTwK8imfBwi2eYLQAADrUDDX6TJUtcMsCJ2f8bNWPcYEJGY0x3n
 WYeCz3TPKzfZjHwf9x+b4zl8UoPu8fQnNQ3Hgpk+X88E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oHmW1nlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnYaiRTszHojRpNQceRJBFTFPOaFi+JaSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFJkYtXx6iynQEN4tQIzZQrWM7thdtNs1rp4QQaeAP
 ZVBAdZpREybOzlRHAwPM5IVu/uQjGfPfSNpq13A8MLb5ECMlVcsgdABKuH9RNuOQslEm1eCk
 UjP9W/5HxIyOcSWzHyO9XfEruXChz/hUYQeUrix7Od3gUa7z3YWThYRUDOTvv2RmkO4HdVFJ
 CQ8+CAjsKwz/0yDVcTmUluzp3vslh0bXcBZH6sl6QWO4q3O6g2dCy4PSTspQMwrsoo6SCIn0
 neNnsj1Hnp/vbuNU3Wf+7yI6zSoNkA9L3IGZCICZRsI5Z/kuo5bpgnUUt9pHaqxj9v0MTL92
 TaHqG45nbp7sCIQ//zlpxad2Wvq/8WXCF5ujunKYo67xhlraLK/R6m11Wjax/1ZKpaoSlWlv
 FFRzqBy89syJZ2KkSWMRsAEE7eo++uJPVXgvLJ/I3Uy32/zoiD+JOi89Bk7fR40aZhcJVcFd
 WeJ4WtsCIlv0GxGhEOdS6a4EIwUwKfpDrwJvdiEP4MVMvCdmOJqlRyChHJ8PUiwyCDAcollY
 P93lPpA615AVcyLKxLsG48gPUcDnHxW+I8qbcmTI+6b+bSffmWJbrwOLUGDaOs0hIvd/lmKr
 4sAbpHUk0oCOAEbXsUx2dRPRbztBSJnba0aVuQNLrLTSuaYMDxJ5wDtLUMJJNU+wvU9ehbg9
 XChQE5IoGcTdlWcQThmnktLMeu1Nb4m9CpTFXV1YT6AhihyCa7yvfx3X8ZmItEaGBlLkKcco
 w8tIJ7bXJyii13vplwgUHUKhNc7JUrx2l7WYXbNjfpWV8cIejElM+TMJ2PH3CIPEjC2pY05p
 bih3RncWp0NW0JpC8O+VR5l5wrZUaQ18A6qY3b1Hw==
IronPort-HdrOrdr: A9a23:ZMq3MKo0ZwdJ+A+PZTyyPsoaV5vPL9V00zEX/kB9WHVpm5Oj+f
 xGzc516farslossREb+expOMG7MBThHPlOkPYs1NaZLXXbUQ6TTb2KgrGSugEIdxeOk9K1kJ
 0QCZSWa+eAfWSS7/yKmDVQeuxIqLLsndHK9IXjJjVWPHxXgslbnnZE422gYytLrWd9dP4E/M
 323Ls4m9PsQwVdUu2LQl0+G8TTrdzCk5zrJTYAGh4c8QGLyRel8qTzHRS01goXF2on+8ZuzU
 H11yjCoomzufCyzRHRk0fV8pRtgdPkjv9OHtaFhMQ5IijlziyoeINicbufuy1dmpDk1H8a1P
 335zswNcV67H3cOkmzvBvWwgHllA0j7nfzoGXo90fLkIjcfnYXGsBBjYVWfl/y8Ew7puxx16
 pNwiawq4dXJQmoplWy2/H4EzVR0makq3srluAey1ZFV5EFVbNXpYsDuGtIDZY7Gj7g4oxPKp
 ggMCjl3ocXTbqmVQGbgoE2q+bcHEjbXy32DnTqg/blkgS/xxtCvg4lLM92pAZ2yHtycegB2w
 3+CNUbqFh/dL5kUUtDPpZ1fSLOMB23ffvtChPaHb21LtBOB5ryw6SHlIndotvaP6A18A==
X-IronPort-AV: E=Sophos;i="5.90,188,1643691600"; 
   d="scan'208";a="66496270"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Xn2LMnkCgqbd1tMp4K/L4L5ni8CsCeu2FZcrK8C0In4KiBb8ESTsaXunzZYaxWQcUx3xHxrWhdB33aRW/Z/qs6XMGlEkDsFDdsxq5DRt9GgRcb23aQVdJXD6RxXadP/eRHOExbXwabE+eVBS/eXDPl/bkjssSRQmjaNG6/LJSJBIz+2Ju0aRv/DrQdnRH56lBZAnATEKi+4FE89F8i7UIkARL1jgGzgPc5BfsZSOipgg7tXEoL78dDuge76ZgXBK7kZc7E7QWLiEwYWlUwU/M0BeH1EcVd64hldqIz8O5Y3gE4fY31XSb7gX41MF05qatXMC0qRGHCB0w3hpHGRIPQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ThI7FNLNj1qjzQJ85InJ5XwxtR+RxYNzUMMHvZI+Xew=;
 b=c2n1vAhBtjbvFq0pzUDZ4xTqD2eWCadALKWopb73NVqIOuAlgSRVHU91A4/B2AjIx3v4BFxOqf1iulIQ9wR8a5W/HbyOh3OssavggInXUbgZ7j2PRUvONZ1eJL/+7TsUSqBuYIQGnJYBU9mBY0+rlx6dj187KI4lefSN6cK6L2XCg4IfbVEsrs8ntY1/F0KVe8BBJW5hdH8U1zmbSc5rsfpaOuurMd5PyH/1qsiid2eZcgLj7uEn6Kty7XeWXOz65zM5rb0yirkvdLA4cUpnCav0R43dhHH8ybW9lquKZyQgw1DCrFpkT5h+WdK654Pp/jgie4XC31zAPIEPJUPJpQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=ThI7FNLNj1qjzQJ85InJ5XwxtR+RxYNzUMMHvZI+Xew=;
 b=ACm97TaiD+KOsOX0HVQtgqd3U1M9MlT/MXC7KtcuAqe73oTITPm6s+8cccXdrYQlBX1qKgJuYx8kWE450omD9PeTTCqb0BqI0VOgt96V+wBnX8xdl3KWytll4Xtscg9kLD+XEfAyPBBvKNKUpjteEyFLRL6FHmeQXDxyKaHyF2E=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Konrad Rzeszutek Wilk
	<konrad.wilk@oracle.com>, Ross Lagerwall <ross.lagerwall@citrix.com>,
	"Stefano Stabellini" <sstabellini@kernel.org>, Julien Grall <julien@xen.org>,
	"Bertrand Marquis" <bertrand.marquis@arm.com>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>, Jan Beulich <jbeulich@suse.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: [PATCH 2/2] livepatch: avoid relocations referencing ignored section symbols
Date: Thu, 17 Mar 2022 12:08:54 +0100
Message-ID: <20220317110854.39050-3-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220317110854.39050-1-roger.pau@citrix.com>
References: <20220317110854.39050-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO2P265CA0267.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:a1::15) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f79d9085-d628-4113-1a46-08da08069218
X-MS-TrafficTypeDiagnostic: BL1PR03MB6102:EE_
X-Microsoft-Antispam-PRVS: <BL1PR03MB6102D60FD3530E677D3771218F129@BL1PR03MB6102.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(83380400001)(2906002)(4326008)(508600001)(8676002)(82960400001)(6512007)(86362001)(6506007)(5660300002)(6666004)(6916009)(8936002)(26005)(66946007)(66476007)(316002)(66556008)(186003)(36756003)(2616005)(6486002)(38100700002)(1076003)(54906003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?Y3l3a1YwYjJzQ0JQNVRBUk5oM0dEUGNGcm50ZUFmeGNRRi9GU281TEdEdS9O?=
 =?utf-8?B?eldadGRvVzZja1picGVwdTVEWHcya3pOQmZiVVoyN0Y1eCtMZFNVVWs5a1Fa?=
 =?utf-8?B?UW5HRml4b0dCRWlETFN6eEN1QjRzY3I3S09ldDJLRHh3cmF1NDcraDNWZ2RV?=
 =?utf-8?B?Y2JGbUgvajA2Tkt4S01QbksvU3Fwa2RrdkgvdlBZVFgxYk5sQmdZSEVvUGtm?=
 =?utf-8?B?TjNYeGZ2amxaNWpEMnhmYW1aSk1mcm4weDdiaGJSc1Z2NDdnODdaNmZKY2dj?=
 =?utf-8?B?RGQ5bHpIR2FwL2U3RkZBN29aa2VWM2lXYlVxc2R3YTd6cTVuTGxBYWEvZHRZ?=
 =?utf-8?B?ZEpPb0tPZUgvaHJ5d2N1aEdGcERETDEvOUx1bkpwai9wVnJOeUYwRTV6eis4?=
 =?utf-8?B?WUlWcVhRSmdzQ3ZIa2xwNVV0VWNBRnIwRk1xZ2NVWW5sdm1oZjR5dVowbkpJ?=
 =?utf-8?B?dXBDVDdvL2VLRGppUzI3NWxWSnVrVkM4MXdZR3ZSNmZDWlozRkU1TzlZZFVx?=
 =?utf-8?B?QldTUnJaeTFxZmNkL01OZHVDUzhsVFhTY0Fsbmh0UEh0VUx1cFpsakVqMFdn?=
 =?utf-8?B?NmNqOFYxRzdTcWpTM2ZiU1JRS0xPSjVoZHBOcHMveUtnUTZOdzBXY0pnMUZT?=
 =?utf-8?B?djkvRllVUERhNkR5WGNlZWxqOExrS0J2ZnBFcjQraCtxOXhYbThkdWNnU0Zx?=
 =?utf-8?B?aEovNGV6RHVUVGE3T2hjSTZNMG5JUTRHZGcwSVY0dG4rWmFzWGtpV0FYNS84?=
 =?utf-8?B?R0tnUGJXSnc5WmFuaHJsUFFqektsVzgwbGJCd2lOcTNnVmVOZlF2K3lIZHpl?=
 =?utf-8?B?Zk9mWDVsR0ZvaEJjOEwwZWNmVE9KR29QTkhlSFozTmhRR3ZDa2oxUnpHbmRw?=
 =?utf-8?B?NCtwK0xHMU44MjVJZUIxeHdLUmNhTkx6M2Rpa3lsOC9MUUMwSXlqM05CdGlo?=
 =?utf-8?B?RjF5Tkx0VFpoRmE4WkdPaTVvMldyTC9UcUYzRENCcE9CdHhROHRVRjRmWWdp?=
 =?utf-8?B?bjBodTdWaDZURGRsQ0trTzdtUUFVOUs5TGdNcXdqbXdYbmZ0Qjk4c1kyK2Zt?=
 =?utf-8?B?VU5TdVB4cGFESXY1bTc1MHhod0t6VWxyaDBRempqNDVpKzhvQ1paU0lLaUdw?=
 =?utf-8?B?SVQybXBOVzQwZ0pidmdXbHMxREdLTm43aU5zRGJKcXRFaTM2RldLb1JLTWo0?=
 =?utf-8?B?ajdqUVJCSnVhb2J4dzI5c1VzUlU3WDNCM3ppcll4MEVlNktJbEdhSFFhUEJG?=
 =?utf-8?B?aExoU1VHb3psbXN2Z3ZnSnRoYmNNSjVJYkJJcG5MOHpPdUtoWEEyWW1IbUtt?=
 =?utf-8?B?WHZKTHRHWTNaTkJjS2lQMkc5VGVFNndIK3BzMVVCTTRqQXFkbFRJU1dEdFZN?=
 =?utf-8?B?YzJDM2VaZHVKbjFURUpFd29WQW1wUnA1cDlIbUx5UWwzUDVvWGJ3alpwOFhy?=
 =?utf-8?B?RlVxNmI5ek1mQm5qVlBqTGFOMTlmRDNCTXpFemlRcVJJQ0ZwUzF0cWNsdzJx?=
 =?utf-8?B?bGN0THNXYXppZmowbGw5QkFadHloNTErdjEyZThtdXNSQ3h5UFpCb1p4YTM4?=
 =?utf-8?B?bnJ6VjcyVDczQnlGTXp2a04xOUovYVpDZTBJZS9ZRXpJTFpxRE1ZT2N4SDBU?=
 =?utf-8?B?UnE3aEE2THRGa1FwVUtxTjZYSU5VMGQ3WGd0bmx6QWJmOG1uRXFodzJreVdu?=
 =?utf-8?B?UU4zTlBBTzNlTUhPekhvdTR5WjQ5WGEzeDdXL0MrNFlXZHRPZ1lhZGFLbld3?=
 =?utf-8?B?S0dDVWZOakNoWU1yWXFyaWdkN1FTR2NzbTNaN21nSklMYjhjM0FITTF0MzAv?=
 =?utf-8?B?ZGlZa3J1Q2FzejRNZ29rY01xdzdZd2FoTExmeEc1WlAzZFMyMWxkY05FcEtJ?=
 =?utf-8?B?Vi9od1FoSnNDeWlwWW5ZWExRV3NrdjJqeE8yMUR5eWJUdUUyMVM4VG1FZ2pG?=
 =?utf-8?B?cEN2dlo5OXNIamhZdVlYaFRlVno5bEREMitVUWoza3hJb2g2Wm1MNXNiT3hE?=
 =?utf-8?B?NGlPeGFqTEpBPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: f79d9085-d628-4113-1a46-08da08069218
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 11:09:14.1174
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: CCxUG53zduJ8rvKhDmhAHfsZpE8T8s45J9rBwamCnl00wWkY7X2CX5rYgom9oICh55R6OI4hX3gu8c4+En+Bvg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL1PR03MB6102
X-OriginatorOrg: citrix.com

Track whether symbols belong to ignored sections in order to avoid
applying relocations referencing those symbols. The address of such
symbols won't be resolved and thus the relocation will likely fail or
write garbage to the destination.

Return an error in that case, as leaving unresolved relocations would
lead to malfunctioning payload code.

Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
 xen/arch/arm/arm32/livepatch.c  | 7 +++++++
 xen/arch/arm/arm64/livepatch.c  | 7 +++++++
 xen/arch/x86/livepatch.c        | 7 +++++++
 xen/common/livepatch_elf.c      | 6 ++++++
 xen/include/xen/livepatch_elf.h | 1 +
 5 files changed, 28 insertions(+)

diff --git a/xen/arch/arm/arm32/livepatch.c b/xen/arch/arm/arm32/livepatch.c
index 5a06467008..6aed227818 100644
--- a/xen/arch/arm/arm32/livepatch.c
+++ b/xen/arch/arm/arm32/livepatch.c
@@ -272,6 +272,13 @@ int arch_livepatch_perform(struct livepatch_elf *elf,
                    elf->name, symndx);
             return -EINVAL;
         }
+        else if ( elf->sym[symndx].ignored )
+        {
+            printk(XENLOG_ERR LIVEPATCH
+                    "%s: Relocation against ignored symbol %s cannot be resolved\n",
+                    elf->name, elf->sym[symndx].name);
+            return -EINVAL;
+        }
 
         val = elf->sym[symndx].sym->st_value; /* S */
 
diff --git a/xen/arch/arm/arm64/livepatch.c b/xen/arch/arm/arm64/livepatch.c
index 6ec8dc60f0..655ded33d2 100644
--- a/xen/arch/arm/arm64/livepatch.c
+++ b/xen/arch/arm/arm64/livepatch.c
@@ -270,6 +270,13 @@ int arch_livepatch_perform_rela(struct livepatch_elf *elf,
                    elf->name, symndx);
             return -EINVAL;
         }
+        else if ( elf->sym[symndx].ignored )
+        {
+            printk(XENLOG_ERR LIVEPATCH
+                    "%s: Relocation against ignored symbol %s cannot be resolved\n",
+                    elf->name, elf->sym[symndx].name);
+            return -EINVAL;
+        }
 
         val = elf->sym[symndx].sym->st_value +  r->r_addend; /* S+A */
 
diff --git a/xen/arch/x86/livepatch.c b/xen/arch/x86/livepatch.c
index 37c9b8435e..a928e5bfcd 100644
--- a/xen/arch/x86/livepatch.c
+++ b/xen/arch/x86/livepatch.c
@@ -262,6 +262,13 @@ int arch_livepatch_perform_rela(struct livepatch_elf *elf,
                    elf->name, symndx);
             return -EINVAL;
         }
+        else if ( elf->sym[symndx].ignored )
+        {
+            printk(XENLOG_ERR LIVEPATCH
+                    "%s: Relocation against ignored symbol %s cannot be resolved\n",
+                    elf->name, elf->sym[symndx].name);
+            return -EINVAL;
+        }
 
         val = r->r_addend + elf->sym[symndx].sym->st_value;
 
diff --git a/xen/common/livepatch_elf.c b/xen/common/livepatch_elf.c
index b089cacb1c..45d73912a3 100644
--- a/xen/common/livepatch_elf.c
+++ b/xen/common/livepatch_elf.c
@@ -334,7 +334,13 @@ int livepatch_elf_resolve_symbols(struct livepatch_elf *elf)
             }
 
             if ( livepatch_elf_ignore_section(elf->sec[idx].sec) )
+            {
+                dprintk(XENLOG_DEBUG, LIVEPATCH
+                        "%s: Symbol %s from section %s ignored\n",
+                        elf->name, elf->sym[i].name, elf->sec[idx].name);
+                elf->sym[i].ignored = true;
                 break;
+            }
 
             st_value += (unsigned long)elf->sec[idx].load_addr;
             if ( elf->sym[i].name )
diff --git a/xen/include/xen/livepatch_elf.h b/xen/include/xen/livepatch_elf.h
index 5b1ec469da..7116deaddc 100644
--- a/xen/include/xen/livepatch_elf.h
+++ b/xen/include/xen/livepatch_elf.h
@@ -22,6 +22,7 @@ struct livepatch_elf_sec {
 struct livepatch_elf_sym {
     const Elf_Sym *sym;
     const char *name;
+    bool ignored;
 };
 
 struct livepatch_elf {
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 11:09:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 11:09:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291507.494787 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUo0l-0000aX-Gf; Thu, 17 Mar 2022 11:09:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291507.494787; Thu, 17 Mar 2022 11:09:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUo0l-0000aQ-B7; Thu, 17 Mar 2022 11:09:43 +0000
Received: by outflank-mailman (input) for mailman id 291507;
 Thu, 17 Mar 2022 11:09:42 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=JNAg=T4=citrix.com=prvs=0684b021b=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nUo0j-0000K7-QH
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 11:09:42 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id bc8f1d8a-a5e2-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 12:09:40 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: bc8f1d8a-a5e2-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647515380;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:content-transfer-encoding:mime-version;
  bh=lfeyPSkSe0Jsl+f2Ot+4QHS7ZQQP6Mss8udTQ8D37jk=;
  b=YgVBeEdGlo1a4M0nokBaWdiyrpVh+vZEtqsVnnFqLPU53QhdGKwQe8Sz
   mfw4ncTpikywonH02j+nOx6PIscDZ6yBOc3VwpfsFTEN71alR+vozRB/z
   +TcH2bth8Qt8RVjsBMcdE+Fp80qFcjUV3T2R9JotzR7mHnb8zPBiDc+mb
   o=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66412180
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:17lIz6CJMzfqLhVW/yfjw5YqxClBgxIJ4kV8jS/XYbTApDx31D0Ay
 zRNUD+DPq7YZGOnf9tzOt6y9koG6pHQy99lQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vg3dYy6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPgh2
 tJ8i568QD0wP6nJutQHSQFxIzlHaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguw5K8bmJsUHs2xIxjDFF/c2B5vERs0m4PcGgmtp3JkeRZ4yY
 eIbNhlzVhH8UydON28ZVJcdw8Km3UDgJmgwRFW9+vNsvjm7IBZK+LvqNsDcdpqVRMFWtkGCr
 2nC8iLyBRRyHMySz3+J/2yhgsfLnDjnQ8QCGbug7PlojVaPgGsJB3UruUCT+KfjzBTkApQGd
 hJSqnFGQbUOGFKDHsv6biO6rHe+px8YXvhgCfciwTGV8/+Bi+qGPVQsQjlEYd0gkcY5Qz02y
 1OE9+/U6SxTXK69EizEqOrNxd+mEW1MdDJZO3dYJecQy4O7yLzfmC4jWTqK/ESdqtTuUQ/9z
 DmRxMTVr+VC1JVbv0lXEL2uvt5NmnQrZlNtjuk0djj8hu+cWGJDT9b0gbQ8xawcRLt1tnHb4
 BA5dzG2tYji962lmi2XW/kqF7q0/fuDOzC0qQcxQ8Z9qmv0oSD7It04DNRCyKFBaJpsldjBO
 hO7hO+szMULYCvCgVFfPupd9PjGPYC/TI+4B5g4n/JFY4RrdR/vwc2dTRX44owZq2B1yftXE
 c7CKa6EVC9GYYw6nGveb7pMitcDm3FhrV4/sLimlnxLJ5LFPyXLIVrEWXPTBt0EAFSs+1yEr
 YwAa5PUl32ykoTWO0HqzGLaFnhTRVATDpHqsc1HMOmFJwttAmY6DPHNh7gmfuRYc259xo8kI
 lnVtpdk9WfC
IronPort-HdrOrdr: A9a23:jp/JwquZvmKdmnKJd7xxppmn7skClIMji2hC6mlwRA09TyXGra
 +TdaUguSMc1gx9ZJhBo7G90KnpewK5yXcT2/hsAV7CZniahILMFu9fBOTZslvd8kHFh4xgPO
 JbAtND4b7LfClHZKTBkXCF+r8bqbHtmsDY5ts2jU0dNz2CA5sQkTuRYTzrdXGeKjM2YKbQQ/
 Gnl7V6TnebCDwqR/X+IkNAc/nIptXNmp6jSRkaByQ/4A3LqT+z8rb1HzWRwx9bClp0sP0f2F
 mAtza8yrSosvm9xBOZ/2jP765OkN+k7tdYHsSDhuUcNz2poAe1Y4ZKXaGEoVkO0aqSwWdvtO
 OJjwYrPsx15X+UVmapoSH10w2l6zoq42+K8y7uvVLT5ejCAB4qActIgoxUNjHD7VA7gd162K
 VXm0qEqpt+F3r77WvAzumNcysvulu/oHIkn+JWpWdYS5EiZLhYqpFa1F9JEa0HADnx5OkcYa
 VT5fnnlbdrmG6hHjDkVjEF+q3uYp1zJGbKfqE6gL3a79AM90oJjXfxx6Qk7wM9HdwGOtx5Dt
 //Q9dVfYF1P78rhJ1GdZU8qLOMexTwqDL3QRSvyAfcZeg600ykke+D3Fxy3pDvRKA1
X-IronPort-AV: E=Sophos;i="5.90,188,1643691600"; 
   d="scan'208";a="66412180"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=VNFV2uhM0plfg7RVctUL964KvWj+H03331tOTTfNhss8TRLqb+cOSC0+Rzh6gcL8WMRGyEV9nuasNljgD0g+tFgwaxWiO25HW/mfea+ApU06EQOg1ppd0+I4ZNItV56k2hu5aE87DWHCYEcyQ5HTIEXiHDugtl2MWLnHXyyja1TQqCMzLGHTLotRgTf20RFXEqMl9nqSPxcSkuexaYb43mBfKt5xx63hgHiuc9BYiVn0TXmfA3pALiwMu95F5jkVA6wWRBc8nzNkTT6X5U+eF/EoXfqHqKE/uZ0xxkVB1WPod/CbdMFWemGhzGZKmJchN5AZSIFh+Xgo7HNnlmgDZA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=x3+aTgeZKg2AgprDOZi02cilZw8eZZMU3TEy+Ao1rUk=;
 b=Q//jYNhZfHODPLNie+A5fJ/LELLpBoM7Bxw7ei6+WMFvReWjatn/gIbkHPHYMiKLdUzTF49ZMeDgVXEnG1Sa2UDkZXuKNBmJtfjM3vjPLr/3mTJzpKXNFA5BZ00qSsVGJ4BrCfZuVt4TCX4p0IrHrbSHsO8TV1dAn1CTy91tTsnrTHOE1e5HV6UlYaXlLJipAymKW0Ppdg3a7RYbis+J1bLyjUizw0or6FV3BD7RjcuGdIBjs10PqpZvfys0i1ariV5wtDy7V/Z/n7pU7soA8emxrYdDtZtmqtAFL+wrNy0qpdxHUFd/DfgLTHjBzNJ0EctD90TTwfiyXJHj9WHxgw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=x3+aTgeZKg2AgprDOZi02cilZw8eZZMU3TEy+Ao1rUk=;
 b=WNu84WxGi2leEyM+gID+RarSZFVpPsIc7k9SDEY1sfE86+hw3JorWAxM8WwDJ36QW5WRbOQdBB6ZnNtQVN08AHyj+pBLJdJIgpKUfp807Y6wLE3Qqjly448JP/xYGit1qXEJF1d1w53slJhDXHuVek8SnWzrSMS3LLNFn8Ol2UM=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Konrad Rzeszutek Wilk
	<konrad.wilk@oracle.com>, Ross Lagerwall <ross.lagerwall@citrix.com>
Subject: [PATCH 1/2] livepatch: do not ignore sections with 0 size
Date: Thu, 17 Mar 2022 12:08:53 +0100
Message-ID: <20220317110854.39050-2-roger.pau@citrix.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220317110854.39050-1-roger.pau@citrix.com>
References: <20220317110854.39050-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO2P265CA0338.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:d::14) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: cc3440af-383b-4fdd-e79f-08da08068f91
X-MS-TrafficTypeDiagnostic: BL1PR03MB6102:EE_
X-Microsoft-Antispam-PRVS: <BL1PR03MB61024246B0F5ED7B0F6A12F48F129@BL1PR03MB6102.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 3MN4TM0zmkjgQeCjSMfBMt6DAUrBtHRRXo/RCeO6/1aOXelvLnGEfd738hdO9EI6vbaGRe81b9djajenVcbtc3DdmE2L65l+JOxGR/Vist3uhq+eghuiP3aqVIgyfs4i1HwMkSV/H3y7XGykLkdfwrQXlC4mVXwH9UeGzdg1wLZIFg+86MGq6gH0KICybZWtsjByphjBK6lowoN7xQEuPZ5p0n04Q+R9DP83G4JLNtx2vk5QrvBt5BoQlfNlsSOvqkM1I9RboRYFuY0efyZMOUtal88cyaiQByHjD0QpXr8PndP/3AjQltqHKFwMYnNFpe5s+ZXhkXY82Liil0wdCKB2Zd8/puIRtJjuaVf394SCOxK/EFxUE+1Ro/mVnzkBLJ6hM9rVmKwDXrLCq/vEdKkHu1Nw6QXA9ExGahuCRHFoIUplwgc1yuQvmJvHQFUQpuImg5L/5Wmj3MgF//u1UVBdoLc4aRwpagXzu/O2VWKrFbYz4L1CmgsKOqxEujrnkIC8FGipNdR/u0b01rzofknZKs8rPbKM/FvNf2MOXcFhOQhGnQnQWQ+VUmfws3lnaUCDqmQmpl4o2z47iwLxAFTbvHy9ottBzuM0nPqrhw+Fufjt8PsDdIY1drTEfbCcFjN5ylni+xisq+4w8406pA==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(83380400001)(2906002)(4326008)(508600001)(8676002)(82960400001)(6512007)(86362001)(6506007)(5660300002)(6666004)(6916009)(8936002)(107886003)(26005)(66946007)(66476007)(316002)(66556008)(186003)(36756003)(2616005)(6486002)(38100700002)(1076003)(54906003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?MmxhTHhjeEV3UTBjd04wVHZHRE1zYUI4NUtXUmg5a0x0ZlMvWHNyeWpubzBP?=
 =?utf-8?B?c3I1OWRQTW0reWx4V2s3NDQ4R2l3NjZMdDZHekw2Wm5peVgyVU1sb1c1ZEIv?=
 =?utf-8?B?cjBBNzliVjFadnBBMitoaWtGaHJsVnFMYk5USDMxTjBHZVF1R2E0MGhNT09s?=
 =?utf-8?B?aTQ5MTZhMUpJa1oyWkhDZDZFQURtYWlOLzVVV3pFcDdEY3VGdWR0UXExMlpO?=
 =?utf-8?B?WTU5VGRDeDhYYkZoRXB2M2YxcEZwSlByU1FXTEN4ZitVRG9oL0R6Vmh4V1RR?=
 =?utf-8?B?RVJ0QkowMCtoOEk0MVBrK2srMThjVmU0NGdVc1FNMTZVb09xRXNxcjZnSFJ2?=
 =?utf-8?B?a21XVHVlbFJiaHhoTHQ4SDhNTURQWjJxdFlyRktJM0ZWcG00OU4zZnI2ckpM?=
 =?utf-8?B?L2h6N1paMmZXZXYrMGVzUlUxUkt0UFdCc1cvTDdvMXdzOTNWWkNlNGY0UUJs?=
 =?utf-8?B?RkpZWEZlQ3puaHc4Ryt4T2kwcjNGYnVOOUcwemdjS2w0aG5WUGt5TkFsRVll?=
 =?utf-8?B?SlQwN1NtWTFHdVA0ckZkeHFHODgyOS9iaWVDNFpJbVRNRFhYR0tZL0JmVnI4?=
 =?utf-8?B?d1VxQ1cyUlViQ2dZMHdQTkFWMmZKR1pNNTVvejg0RUZhUVozZnJOOHcxQkl2?=
 =?utf-8?B?dTl0U0xmc0Z5WVBoSmtJY3BUM0xScERTam9TZjloanFqdGxHOU9IUTNZUVlV?=
 =?utf-8?B?K1pVSHZpMWJQZ2ZKRzYxN0JQQjM3T0VLaU5IajZZcklxMFRpZnNxVGZuTmdB?=
 =?utf-8?B?WWkxYzJkTzlSM1lPRFp1RXJkd0FpcEVmSWJwelUzRVlyQkpBbUs1K2lzTlg4?=
 =?utf-8?B?Qjd3VWlQZUlzYmZjdjNoMkxYdEJGaFBaYUo0aEsvZjVZUkk1RlNJai9tcXZC?=
 =?utf-8?B?cU5SMTVQZTIvbENyNVhRZ2h1MCtZdzZYUTZUdnNXSld1eW1kZXNZNEY2cXZC?=
 =?utf-8?B?OTQ5WXhpaEZFVWdDd2t6V0RDUm5vbjhlYVYwQmNTdjFJUWZGYUR2aFhRUEVW?=
 =?utf-8?B?L21kSXcyRUwzdlNab2NnVU9oazNFWWdyQ3ZHL3pjSTZOM0dlL2srN3Vnc0lX?=
 =?utf-8?B?Q2J4OWV3L0hzd1JXbW1CbVN2YkV6VlFVeWk3b0h3WGJvYlRDMXp4QWJlYWRw?=
 =?utf-8?B?YjFLOGxuNGIwbVQzYk5qWnQ0dnNNVnZjbURsMkE1U2xTVzlaWlF3Z0J5NUpB?=
 =?utf-8?B?TXdUMXdrRlpTbHFsT2Q5Y3NhVHRadklibGMzTE9Hcy95ZUdhRVhXclVvblUw?=
 =?utf-8?B?TG5sRlBSZlkrMGFrQy9oNWxOWHVzYWJtZnM4cjZMREYrN1BpNG9sZUkyU0hy?=
 =?utf-8?B?VmFtYS90Y20vTTJDMnRad2JwNTdCN0IzSFJPM1lUMVFBbXFPRTBqcU12c2ph?=
 =?utf-8?B?UUsrelpvSXIvajFOb25UQWxndzc5SEpGanZscmZhaEFwNklMTnBvNU9ZUUg2?=
 =?utf-8?B?a09sRjViTUJDTnVNc21EYXhPMldrQXRkSllkSzVSVlBkVW95UTdwUlVMZmt4?=
 =?utf-8?B?K0lkc1pobGcvejBvck1zQjhyaTE0M09aeFRBcE40WkZPbURMVEVQTFBNbVd1?=
 =?utf-8?B?Q0lsQytid1ZTb3Brb2VUR3d3L25DTWVUdEFEbWZKRWk3ZjlmekRjMWxnVDZV?=
 =?utf-8?B?QlRPdEtIbDI5RHlzY0lQM3FOdnR4Zy9tTlFjd0FiYzlVbXhTNzZFaFFyRXFP?=
 =?utf-8?B?QU56Ui9wd0FFN2NXZTZzL296T0tJeElJN3B5cytvMTB6My9mWHZJc2c4K2RY?=
 =?utf-8?B?dERVZ1MvbTA4ZWFsQjdsQ0ZXbEVlNm5RcVNuclNqTzRoUE85VS9aVVVQL3Zi?=
 =?utf-8?B?cFJUQlVHS3lyQndxRjAwU0dYVVZmVDN5ZS83bGU0UTdGd3lIUTFFMGlqSTdF?=
 =?utf-8?B?WkJBWW5ZY3dYek5naE5VbVFXK2lIZkFpTXJaYzliU2J3b0R2WktKcnNiRUJH?=
 =?utf-8?B?MDVLTmovOU1jRFpVZmJWdWpKTzcwbFlUZU5udzhCbzQxQzF5WDJyNW9lbGY5?=
 =?utf-8?B?YUFkQjFkMDlnPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: cc3440af-383b-4fdd-e79f-08da08068f91
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 11:09:09.9437
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: jc+CK+2MSOgVS2bcao+2/hv6wVF46xYU2kfGFsneM7V5BOvrscHhtDqPvCvg42QHMjBkH30F/4dJ88K42EshEg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL1PR03MB6102
X-OriginatorOrg: citrix.com

A side effect of ignoring such sections is that symbols belonging to
them won't be resolved, and that could make relocations belonging to
other sections that reference those symbols fail.

For example it's likely to have an empty .altinstr_replacement with
symbols pointing to it, and marking the section as ignored will
prevent the symbols from being resolved, which in turn will cause any
relocations against them to fail.

In order to solve this do not ignore sections with 0 size, only ignore
sections that don't have the SHF_ALLOC flag set.

Special case such empty sections in move_payload so they are not taken
into account in order to decide whether a livepatch can be safely
re-applied after a revert.

Fixes: 98b728a7b2 ('livepatch: Disallow applying after an revert')
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
 xen/common/livepatch.c          | 16 +++++++++++-----
 xen/include/xen/livepatch_elf.h |  2 +-
 2 files changed, 12 insertions(+), 6 deletions(-)

diff --git a/xen/common/livepatch.c b/xen/common/livepatch.c
index be2cf75c2d..abc1cae136 100644
--- a/xen/common/livepatch.c
+++ b/xen/common/livepatch.c
@@ -300,9 +300,6 @@ static int move_payload(struct payload *payload, struct livepatch_elf *elf)
          * and .shstrtab. For the non-relocate we allocate and copy these
          * via other means - and the .rel we can ignore as we only use it
          * once during loading.
-         *
-         * Also ignore sections with zero size. Those can be for example:
-         * data, or .bss.
          */
         if ( livepatch_elf_ignore_section(elf->sec[i].sec) )
             offset[i] = UINT_MAX;
@@ -361,8 +358,17 @@ static int move_payload(struct payload *payload, struct livepatch_elf *elf)
             else if ( elf->sec[i].sec->sh_flags & SHF_WRITE )
             {
                 buf = rw_buf;
-                rw_buf_sec = i;
-                rw_buf_cnt++;
+                if ( elf->sec[i].sec->sh_size )
+                {
+                    /*
+                     * Special handling of RW empty regions: do not account for
+                     * them in order to decide whether a patch can safely be
+                     * re-applied, but assign them a load address so symbol
+                     * resolution and relocations work.
+                     */
+                    rw_buf_sec = i;
+                    rw_buf_cnt++;
+                }
             }
             else
                 buf = ro_buf;
diff --git a/xen/include/xen/livepatch_elf.h b/xen/include/xen/livepatch_elf.h
index 9ad499ee8b..5b1ec469da 100644
--- a/xen/include/xen/livepatch_elf.h
+++ b/xen/include/xen/livepatch_elf.h
@@ -48,7 +48,7 @@ int livepatch_elf_perform_relocs(struct livepatch_elf *elf);
 
 static inline bool livepatch_elf_ignore_section(const Elf_Shdr *sec)
 {
-    return !(sec->sh_flags & SHF_ALLOC) || sec->sh_size == 0;
+    return !(sec->sh_flags & SHF_ALLOC);
 }
 #endif /* __XEN_LIVEPATCH_ELF_H__ */
 
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 11:09:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 11:09:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291508.494796 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUo0q-0000yc-ME; Thu, 17 Mar 2022 11:09:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291508.494796; Thu, 17 Mar 2022 11:09:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUo0q-0000yT-JB; Thu, 17 Mar 2022 11:09:48 +0000
Received: by outflank-mailman (input) for mailman id 291508;
 Thu, 17 Mar 2022 11:09:47 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nUo0p-0000xF-Bl
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 11:09:47 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nUo0p-0000OX-92; Thu, 17 Mar 2022 11:09:47 +0000
Received: from 54-240-197-230.amazon.com ([54.240.197.230] helo=[10.7.239.19])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nUo0p-0000eP-3H; Thu, 17 Mar 2022 11:09:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:
	References:Cc:To:From:Subject:MIME-Version:Date:Message-ID;
	bh=LyDfxDFQodttBvoC2v7IqRvXuoE2L7P/La0C6fuJhj0=; b=JcZHNqPHC9/jqBtqq0pmkMyUR7
	iM+R7iAgy2RqwppmE98T4hEKKvTg/mfl7chJF87um8MYg8SDh/QUN/oP4pJlVA+k07p048lE6D98A
	85G15kKmRrL00VOsNVq/gOCGNcJhPsLVuHSxVyJSMyI/2fywUbs8D8r79ijEiHHlojiA=;
Message-ID: <deb3dad2-d507-758b-5189-ee235a97c297@xen.org>
Date: Thu, 17 Mar 2022 11:09:45 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH 1/3] tools/xenstore: add documentation for new
 set/get-feature commands
From: Julien Grall <julien@xen.org>
To: Juergen Gross <jgross@suse.com>, xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
References: <20220316161017.3579-1-jgross@suse.com>
 <20220316161017.3579-2-jgross@suse.com>
 <d44b8e44-4e7e-c395-da9c-916ec641a687@xen.org>
In-Reply-To: <d44b8e44-4e7e-c395-da9c-916ec641a687@xen.org>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit



On 17/03/2022 11:07, Julien Grall wrote:
> Hi Juergen,
> 
> On 16/03/2022 16:10, Juergen Gross wrote:
>> Add documentation for two new Xenstore wire commands SET_FEATURE and
>> GET_FEATURE used to set or query the Xenstore features visible in the
>> ring page of a given domain.
>>
>> Signed-off-by: Juergen Gross <jgross@suse.com>
>> ---
>>   docs/misc/xenstore-ring.txt |  1 +
>>   docs/misc/xenstore.txt      | 12 ++++++++++++
>>   2 files changed, 13 insertions(+)
>>
>> diff --git a/docs/misc/xenstore-ring.txt b/docs/misc/xenstore-ring.txt
>> index f91accb5b0..bd000f694e 100644
>> --- a/docs/misc/xenstore-ring.txt
>> +++ b/docs/misc/xenstore-ring.txt
>> @@ -68,6 +68,7 @@ Mask    Description
> 
> I find a bit odd we describe the feature in term of mask rather bit. 
> This will get more difficult to read as we add more bits.
> 
> This is not new, so not change expected in this series.
> 
>>   -----------------------------------------------------------------
>>   1       Ring reconnection (see the ring reconnection feature below)
>>   2       Connection error indicator (see connection error feature below)
>> +4       GET_FEATURE and SET_FEATURE Xenstore wire commands are available
> 
> Below, you wrote the two commands are dom0 only. Furthermore, I would 
> expect such comment return something like ENOSYS if they are not present.
> 
> So do we really need to add a feature bit for GET_FEATURE/SET_FEATURE?
> 
>>   The "Connection state" field is used to request a ring close and 
>> reconnect.
>>   The "Connection state" field only contains valid data if the server has
>> diff --git a/docs/misc/xenstore.txt b/docs/misc/xenstore.txt
>> index ea3d8be177..31e3d53c52 100644
>> --- a/docs/misc/xenstore.txt
>> +++ b/docs/misc/xenstore.txt
>> @@ -332,6 +332,18 @@ SET_TARGET        <domid>|<tdomid>|
>>       xenstored prevents the use of SET_TARGET other than by dom0.
>> +GET_FEATURE        <domid>|        <value>|
> 
> Did you indented to add many spaces before <value>?

Please ignore this question. <value>  is part of the response. Sorry for 
the noise.

Cheers,

> 
>> +SET_FEATURE        <domid>|<value>|
>> +    Returns or sets the contents of the "feature" field located at
>> +    offset 2064 of the Xenstore ring page of the domain specified by
>> +    <domid>. <value> is a decimal number being a logical or of the
>> +    feature bits as defined in docs/misc/xenstore-ring.txt. Trying
>> +    to set a bit for a feature not being supported by the running
>> +    Xenstore will be denied.
> How will the caller know which feature is supported? Also, what happen 
> if a client decided to overwrite 'feature'? Could the result potentially 
> prevent migration/liveupdate or else?
> 
> Cheers,
> 

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 11:19:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 11:19:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291521.494827 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUo9t-00037z-Tx; Thu, 17 Mar 2022 11:19:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291521.494827; Thu, 17 Mar 2022 11:19:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUo9t-00037s-Qu; Thu, 17 Mar 2022 11:19:09 +0000
Received: by outflank-mailman (input) for mailman id 291521;
 Thu, 17 Mar 2022 11:19:09 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=31/0=T4=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nUo9t-00037m-93
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 11:19:09 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 0fa759dd-a5e4-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 12:19:08 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 489F01F37F;
 Thu, 17 Mar 2022 11:19:07 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 116AC13B64;
 Thu, 17 Mar 2022 11:19:07 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id KujoAisZM2IIVAAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 17 Mar 2022 11:19:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0fa759dd-a5e4-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647515947; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=6hf3YvDsM8y4rJIHtjqabUoNn1TDOsD0P6XbiXly5l0=;
	b=HdaXrAmJ3YBjAozdnT9LcaMfZuHDZ/LsSieeJrA0qP9hTh8ih0xLXZPjth/Ce/KtGhXwwI
	ekhOKPgyje/f7O7iCh69ATDKJ3MF4oi1qYaF473rRfqJ6VnRdKdmiUsz9yQTb10WiqnmcR
	qRX2xDpQgoRf0e4y4GmotIvtUacFZww=
Message-ID: <96c31b21-3f96-4f17-07d6-64c7186ce2dd@suse.com>
Date: Thu, 17 Mar 2022 12:19:06 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Content-Language: en-US
To: Julien Grall <julien@xen.org>, xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
References: <20220316161017.3579-1-jgross@suse.com>
 <20220316161017.3579-2-jgross@suse.com>
 <d44b8e44-4e7e-c395-da9c-916ec641a687@xen.org>
From: Juergen Gross <jgross@suse.com>
Subject: Re: [PATCH 1/3] tools/xenstore: add documentation for new
 set/get-feature commands
In-Reply-To: <d44b8e44-4e7e-c395-da9c-916ec641a687@xen.org>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------FBTpDqvqHHZ62Oa0jXHMahzp"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------FBTpDqvqHHZ62Oa0jXHMahzp
Content-Type: multipart/mixed; boundary="------------JTXY1MT0IBpDThzH7LRO8Zur";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Julien Grall <julien@xen.org>, xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
Message-ID: <96c31b21-3f96-4f17-07d6-64c7186ce2dd@suse.com>
Subject: Re: [PATCH 1/3] tools/xenstore: add documentation for new
 set/get-feature commands
References: <20220316161017.3579-1-jgross@suse.com>
 <20220316161017.3579-2-jgross@suse.com>
 <d44b8e44-4e7e-c395-da9c-916ec641a687@xen.org>
In-Reply-To: <d44b8e44-4e7e-c395-da9c-916ec641a687@xen.org>

--------------JTXY1MT0IBpDThzH7LRO8Zur
Content-Type: multipart/mixed; boundary="------------WWXY5iwiwynehFLHOAXBUCCL"

--------------WWXY5iwiwynehFLHOAXBUCCL
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------WWXY5iwiwynehFLHOAXBUCCL
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------WWXY5iwiwynehFLHOAXBUCCL--

--------------JTXY1MT0IBpDThzH7LRO8Zur--

--------------FBTpDqvqHHZ62Oa0jXHMahzp
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIzGSoFAwAAAAAACgkQsN6d1ii/Ey8N
FAgAkI0uK0oGRoXiX9r/IKTjnQDensulfduTmASJHsBg1ivqkEBvo7pD8RUhKjPdfGZlpV2LH5Y2
fD1LwLwWRa0YTPbn7eEvmYfJHh31acYpWyBQPTMuc1EcJAP5dnaGTzHiKYIr7mrSwG+UEY3Vt2zI
GRGTIkr6Ti0Q1EZZUCPafxmQyqk/Nu9quM5Dqc3rD82ufxmKqMeO7htUrzovGs+0iUBYaE45yDku
0qbtD/+sfLJsrMke15Wt/WaoPXDGTEM35PMAOaR79x2ZlvbPw+VZzTSsXJnM9CIuN06zgXaK3hRW
yXPNMVjEPTGGoz/StDfwXBtwdXOZ9pF2o4YDVdZl1w==
=oSoF
-----END PGP SIGNATURE-----

--------------FBTpDqvqHHZ62Oa0jXHMahzp--


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 11:34:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 11:34:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291525.494840 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUoOW-0005QD-6W; Thu, 17 Mar 2022 11:34:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291525.494840; Thu, 17 Mar 2022 11:34:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUoOW-0005Q6-3J; Thu, 17 Mar 2022 11:34:16 +0000
Received: by outflank-mailman (input) for mailman id 291525;
 Thu, 17 Mar 2022 11:34:14 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=u299=T4=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nUoOU-0005Q0-Jw
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 11:34:14 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id 2b0240fe-a5e6-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 12:34:13 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 04E701FB;
 Thu, 17 Mar 2022 04:34:12 -0700 (PDT)
Received: from [10.57.72.159] (unknown [10.57.72.159])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 74C733F766;
 Thu, 17 Mar 2022 04:34:10 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2b0240fe-a5e6-11ec-8eba-a37418f5ba1a
Message-ID: <e56f8a28-83ad-849f-46c6-36b676bb6bc4@arm.com>
Date: Thu, 17 Mar 2022 12:33:56 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Content-Language: en-US
To: xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, christopher.w.clark@gmail.com,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>
From: Michal Orzel <michal.orzel@arm.com>
Subject: v2: XTF on arm
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hello,

Following up a discussion from the v1 of "XTF on arm" patch series(it's been almost a year),
I created a new version with the following major changes:
-fixed comments from v1
-no non-MMU environment for arm64
-no PL011 driver
-no test-naming/xtf-runner modifications to make OSSTEST happy

Please review, comment, ask questions.

Link to the v2:
https://github.com/andyhhp/xtf/pull/6

Cheers,
Michal


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 12:07:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 12:07:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291530.494851 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUouu-0000Og-W2; Thu, 17 Mar 2022 12:07:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291530.494851; Thu, 17 Mar 2022 12:07:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUouu-0000OZ-TD; Thu, 17 Mar 2022 12:07:44 +0000
Received: by outflank-mailman (input) for mailman id 291530;
 Thu, 17 Mar 2022 12:07:43 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=hAZZ=T4=citrix.com=prvs=068f51ced=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nUout-0000OQ-4z
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 12:07:43 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id d6e5c9fc-a5ea-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 13:07:41 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d6e5c9fc-a5ea-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647518860;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=EXv4usRYqcaqAZxKX8YAvDHrpqxWLQOIIfxnj2uQt9k=;
  b=EuUkb/a1afHfXdjM1yDOFBcnJYGWhFS4Ogcqb6D2tUPdjH2ft+m6DQ2P
   H6uDFjzhQrluJkDDMOPVPYaoJSkHT2Wb2r2xci+KhUaEWEPRRbopikSB4
   GTENz44bVjCeLglXnAcWrDjQSYOThE6lRl57Oukim4cclY8UUesQrXJg4
   8=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66489135
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:iA7l5KzcWo/zquqpvcR6t+f+xirEfRIJ4+MujC+fZmUNrF6WrkUHn
 WRLWj3Ta/nbZ2GnfN93Ptji9UxXsZLRyddgSQU4pCAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2IfhWWthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 NplvLC0Sh4YeaHwxOkZDEZfEy5TNr1DweqSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DFYUToHx/ixreCu4rW8vrSKTW/95Imjw3g6iiGN6AO
 ZZJOGM0MXwsZTVgGmU2JrMwgN6xpVbEfx4Jq1+Mj/Y4tj27IAtZj+G2bYu9lsaxbcBWg26Ro
 2vU+GK/DhxyHNmHzjqB+3mvrubKlDH8XsQeGdWQ5vNsxVGe2GEXIBkXTkeg5+m0jFakXNBSI
 FBS/TAhxYAw/kG2Stj2XzWjvWWJ+BUbXrJ4DOkS+AyLjK3O7G6xCm8JRDNFQNUjvd0xQ3om2
 ze0c8jBXGI19ufPEDTEq+nS/Wja1TUpwXEqbAMAThI0pNXf/Iw30U3ITtlOG76wt4igcd3v+
 AyioC87jrQVqMcE0aSn4FzK6w6RSoj1oh0dvVuOAD/8hu9tTMv8PtHztwCHhRpVBNzBJmRtq
 kTojCR3AAomKZiW3BKAT+wWdF1Cz6bUaWaM6bKD8nRIythMx5JBVd0IiN2dDB0wWirhRdMPS
 BWP0e+2zMUPVEZGlYctP+qM5z0ClMAM7+jNWPHOdcZpaZNsbgKB9ywGTRfOgz+xzRd1y/9nZ
 srznSOQ4ZAyU/gPIN2eHbt17FPW7npmmTO7qW7TknxLLoZylFbKEOxYYTNin8gy7b+eoRW9z
 jqsH5Di9vmra8WnOnO/2ddKdTgidCFnbbir+50/XrPSeWJORTB+Y8I9NJt8IuSJaYwOzbyWl
 px8M2cFoGfCaYrvclzbNCo8NOuxAf6SbxsTZEQRALph4FB6Ca6H56YDbZonO74h8e1o1/lvS
 PcZPc6HB5xypv7vpFzxsbGVQFReSSmW
IronPort-HdrOrdr: A9a23:/8qNeq4rPRYwP1rRtQPXwWiBI+orL9Y04lQ7vn2ZFiY6TiXIra
 +TdaoguSMc0AxhJE3Jmbi7Sc29qeu1z+863WBjB8bcYOCAghroEGgC1/qs/9SEIUzDH4FmpN
 9dmsRFeb/N5B1B/LvHCWqDYpYdKbu8gduVbI7lph8HJ2wLGsJdBkVCe3ym+yVNNVN77PECZf
 2hD7981kOdkAMsH6KG7xc+Lo3+juyOsKijTQ8NBhYh5gXLpyiv8qTGHx+R2Qpbey9TwJ85mF
 K10DDR1+GGibWW2xXc32jc49B9g9360OZOA8SKl4w8NijssAC1f45sMofy/gzd4dvfrWrCou
 O85CvIDP4DrU85uVvF+CcF7jOQlArGLUWSkWNwz0GT+vARDwhKdfapzbgpAycxrXBQ4e2UmZ
 g7rF5w/fBsfGP9tTW46N7SWx5wkE2o5XIkjO4IlnRaFZATcblLsOUkjQlo+bo7bWrHAbocYa
 JT5QDnlYFrWELfa2qcsnhkwdSqUHh2FhCaQlIassjQ1zRNhnh2w0YR2cRaxx47hd4AYogB4/
 6BPrVjlblIQMNTZaVhBP0ZSc/yDmDWWxrDPG+bPFyiHqAaPHDGrYLx/dwOlayXUY1NyIF3lI
 XKUVteu2J3c0XyCdeW1JkO6RzJSHXVZ0Wl9iif3ekOhlTRfsufDcTYciFdryKJmYRqPvHm
X-IronPort-AV: E=Sophos;i="5.90,188,1643691600"; 
   d="scan'208";a="66489135"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=V+Ww4V5+22+yXyoeRsmBflqH8u7mrhfu7bIQTAMGzHpFfxgkBY9TJcOXWDtSxCBSfqtrxL5cGpQN+xhLmn2pdTxr8vDzwTm/q0uev92brjW2iIiptuCzhtn0oCwW5aCKFhzKnk8Nb4nrr2SFs6vPVxSFKCqvOkMUmTO4W2c7aaJVkg1rIPctMwPISp2RdWArxi7ucJEhd18no4jc9J97/BgQcHPu/Wa/TPdg/gKCcZUYoSPCM1ahlBepz9qr4N3peZLqE47bxaDmf4S9LF3mLvOcN5RN0jCbb0BPBW882D94JfG/STFUekzNCqkG++PJK8yUniXA+5haKwz234rFJg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=EXv4usRYqcaqAZxKX8YAvDHrpqxWLQOIIfxnj2uQt9k=;
 b=n+UcPUI3X6IQv9PnlHNYdocg9uk2hrsdUGHBl59rH667kNvF3m7bgteNU9CucrpMel8tAa0efCnQyu3xo1nIEzqQaXozemdhKaK8dF9gVW/51mWlOH3ft717eHd2Gj+FQpDnxTUfL5UQdGd8Y9vJ9QhfASllr6s6OhbSDZSO/Fn2yV54tK/URQAZBSepzTl/7IpYTtD1nzZHY3QIGLyPCQ0h/D6NWMMvb02LZ5n8QuUytEU77wvCCvOQFvjIWIqx9YnGr+TwOP28w9dH5gDlHHXIk3Tiui7J5PN1dZxq/148+h9E/mvAIB5Pxd6qUhe+mMxgcGH7Qk8Pc7QTE4Q9dA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=EXv4usRYqcaqAZxKX8YAvDHrpqxWLQOIIfxnj2uQt9k=;
 b=Xo0XxjpV/XWagX9yxuixMknjY/VqPl2hyAQdFiOwPC5Gv2ldjLF9h3iPRkosWycy08drAXIpiTVdv5xxkJL8YzVTq/2P9G3UBc7DSr1SqKU9JPPXGYZcer+vRenLRl6dS/e+r28DG/qnGsRV66uYdSsIZ5MW9poz1dPiWTFiIR8=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>, "Bjoern
 Doebel" <doebel@amazon.de>, Michael Kurth <mku@amazon.de>, Martin Pohlack
	<mpohlack@amazon.de>, Xen-devel <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH] x86/cet: Use dedicated NOP4 for cf_clobber
Thread-Topic: [PATCH] x86/cet: Use dedicated NOP4 for cf_clobber
Thread-Index: AQHYOeYhM19FRsX4fEqZ0g9opW1q5KzDY8oAgAAXkYA=
Date: Thu, 17 Mar 2022 12:07:31 +0000
Message-ID: <9555a8ef-6b44-9a39-78ca-f6bb4fc4528a@citrix.com>
References: <20220317100204.16391-1-andrew.cooper3@citrix.com>
 <db1e9af9-5441-c035-1998-33be07f6e908@suse.com>
In-Reply-To: <db1e9af9-5441-c035-1998-33be07f6e908@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 54591821-401d-4758-5cb1-08da080eb6e7
x-ms-traffictypediagnostic: BN3PR03MB2195:EE_
x-microsoft-antispam-prvs: <BN3PR03MB2195779BC5265337B3F863F8BA129@BN3PR03MB2195.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(86362001)(122000001)(6506007)(82960400001)(53546011)(31696002)(38070700005)(91956017)(4326008)(8676002)(64756008)(76116006)(66446008)(66476007)(66556008)(66946007)(83380400001)(38100700002)(6916009)(54906003)(6512007)(316002)(26005)(186003)(966005)(2906002)(6486002)(508600001)(71200400001)(2616005)(8936002)(36756003)(31686004)(5660300002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?ejZCTTllNzdPaDFlNldTNlBmN05iVXFPVDkzdGpMUHRndm1pakVMSzdnZzNQ?=
 =?utf-8?B?blFwSGs4L3h1cndmc0hTNjNOSDN0dEQ4enFSYW83b2FPVXdlSUN3MERyaURn?=
 =?utf-8?B?aGNiNWZ6bUlBK085Tng1SlNZc0x3REt0Z2JLeHI2ZnJ3c0poRkQ3Z3JweDZD?=
 =?utf-8?B?WndyQlM0RnB4R1FFc25BUitET0JxS09PYWhBVnJZTi93Zm41NGpMTUtzVDdt?=
 =?utf-8?B?VEREZFB4RURvcDRUbEw3RTUzbjdsaFRtaHBWa1VvWStyS2RoYnIvZkZBWmZL?=
 =?utf-8?B?bEZGQW1vQkE4Z0hmWTlndlVtYms1NmFqWHI3SFk3Q2I0aWJNRHJOUjljRWZl?=
 =?utf-8?B?cy9jUW0rWHhOZDJuRjlIMzI2TFpTeEdNcEk1UDJ5ZG5xY3hjbWczaUJIWTBz?=
 =?utf-8?B?UkdTTGQzU1ljSzFPbnA0OVZCeitnaEt0dm9nd3RHNHdBeFViUWFqM2NrUzEz?=
 =?utf-8?B?WGtMMjR2NmxpWHJpL2JQeGR0aDI2aVJLN0dIWnZ6ZTRHRHVkQU1ZMTdxVnRw?=
 =?utf-8?B?OTBJL3ZlMzdQMnpsN1d0TTlPYVlUVnhHSWZxS054MjVRdytmU3d5c0xYd2F5?=
 =?utf-8?B?aGRXK2IxdytVR09IR2JDM0RRVjlNRzV1M1ZGWkFNZU5qWmJqOEdpUjVKSnZw?=
 =?utf-8?B?U09XenRoQ1hhVG1BMTRaVUliYi9OTGtUakxwclZoTFYyQ2ZLcUVveVl1QzN5?=
 =?utf-8?B?Tkt1Z2svRmJNL2s2R1JCNE1tZjRrc0NSb0QybUFQQXZ2TzlBczFWNVkyVWVS?=
 =?utf-8?B?KytJZHZhOWVqSFBZZUF5OG9aRHE4YWFnK0lRZk5mV0tqb2FWZGtIUkZCcDhW?=
 =?utf-8?B?OCtCRzh1ZHM3TVJMb2RHSm16bnNIZjFSdmlBUnRudFBBVlBybEcrakJPMnNZ?=
 =?utf-8?B?VDIzeVRMNUQzTFNNYVdGTGRNNUJ0OXVKRWEza1dJS1AxdjFVNDUxb3JIeVlW?=
 =?utf-8?B?dGtnazVCNW5saGh4R29yS1Z4NEJYQVYxK1BoQmxDUkRYbFJMN1o3Si96dS9Q?=
 =?utf-8?B?eDlqYUpSRnhqemxmVlRuR3d4aWNBQi8zMjA3eXN5eVdrbzdBMHM5eittY2FB?=
 =?utf-8?B?YnZMUHVOTEFTUXFpb215VTUyelJ6Rmp1VmRkOHJta2dVQ241Ulo5M2xQR2dy?=
 =?utf-8?B?T09OdVhkVVN5d2Jsb2Y5THNudzNMSVZBdG14MnRYRVhJZ2FCaUJjVU1TSlht?=
 =?utf-8?B?ekg2STFFQzAybSs3cU1jQWN6R21aQ3hwd0VkQ0EvWUE2ZlFCVHBMZ3NTYUg2?=
 =?utf-8?B?TnhqUmY1b3pTOFFyK2E0M3FEa3FMQXAxMHVLcjlOOHBIZEVaaEt3djlYYlJp?=
 =?utf-8?B?ZHV5b3F5ajhpeVZ6cHBnYUhCZlRORFkrMmZ0WU1HUjBBb2kyb1FDUG9Xckpj?=
 =?utf-8?B?QXhieFkzMTZYSnZpV3dTWmdLYWQwZGFEUk9oWU9XS3Q5NVg4aGNzbEk4UGVs?=
 =?utf-8?B?ZG5WMWlydmx6NlhhTWRRTE9ldWxNQjU0YTFBS0UzMDNBWmFXUyt0YVo2QUdJ?=
 =?utf-8?B?cSt4SDRkU1R4UzUxRUhQZng0MkVPMXN3S1lTSkxMWU9mUjhPSzA5S3l0Zm5Z?=
 =?utf-8?B?M0puUGFSZU1vVFI0cm11NzdIRy9mOGZ6RUZKK2xtcDhtcXZWZFI0V0lEUE9U?=
 =?utf-8?B?YUxIUER0cWFHUW9lWEk5b2lsd0swTm1VMlRKb2VQQnZKQjJOT3k4cTluSVNV?=
 =?utf-8?B?Y0V2anRBUDNDS0hPY01kVitzdzVhb1JFZHNLc1NpclJOeXpPbnMxTFhpbWlQ?=
 =?utf-8?B?RjVlTHVrQ3o1MzVaREJ6NkMwY3UwN0Y5dng1MVZ2bU90bTBxN2VhL0JSbU9o?=
 =?utf-8?B?dUZpcHIxVWtHTUdKWXdDNkN6VEROQjd6MlBTVXZVVVJZNmlxejZicTByaG1z?=
 =?utf-8?B?c3RQcDlqU281emp5NTN3WWw3VkxFUG0yNnRZYk1ZZ3ZubmNMc0pqNHJmZUxv?=
 =?utf-8?Q?qiXjTY5GQb5CFOF6GNd+VijpB/T0oX8s?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <91A7DCA65CC2834383C30F6651EFF540@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 54591821-401d-4758-5cb1-08da080eb6e7
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Mar 2022 12:07:31.6589
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 8Hr1/+Uai0GnTEvsGY5ailJgaJ/sicBA2WQYaVsfpWOjAqNN/b8wk1bMOUjYtwEVtriUDaqtUfqejVCErW1TqR6FvinM0ZbMXmJiQ2mB/c4=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN3PR03MB2195
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Thu Mar 17 12:18:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 12:18:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291533.494863 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUp5b-0001tp-Up; Thu, 17 Mar 2022 12:18:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291533.494863; Thu, 17 Mar 2022 12:18:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUp5b-0001ti-RW; Thu, 17 Mar 2022 12:18:47 +0000
Received: by outflank-mailman (input) for mailman id 291533;
 Thu, 17 Mar 2022 12:18:46 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUp5a-0001tY-N9; Thu, 17 Mar 2022 12:18:46 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUp5a-0001aq-Fr; Thu, 17 Mar 2022 12:18:46 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUp5a-0005eE-5B; Thu, 17 Mar 2022 12:18:46 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUp5a-0001bW-4m; Thu, 17 Mar 2022 12:18:46 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=FfD9c8lvEWqah7qM/dhAhnIqcEusCubXR7Lg56w/Ri8=; b=0UdKYM6WRQsHPurzqNwruhrrzy
	PpE0c2s7dIJpSoODTS/OFKvRH5YB++tllDLIk0CeE/+JHey1ivD3/qhfoTzV0zhgqc5r40CyKMfZh
	k78cnBbMLEy4RJT4Kq2XIa//3TaLZ1BvC6HekFLO6sMLSFnYdb1wXRuWmvBVGx7iAuuU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168653-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168653: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=5b56c52b5c1cc817a1ddac7f03aa6a02aeab4c04
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 17 Mar 2022 12:18:46 +0000

flight 168653 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168653/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 5b56c52b5c1cc817a1ddac7f03aa6a02aeab4c04
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   17 days
Failing since        168258  2022-03-01 01:55:31 Z   16 days  157 attempts
Testing same since   168637  2022-03-16 13:10:25 Z    0 days    7 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 714 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 12:33:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 12:33:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291541.494878 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUpK1-0004Eb-B7; Thu, 17 Mar 2022 12:33:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291541.494878; Thu, 17 Mar 2022 12:33:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUpK1-0004EU-6L; Thu, 17 Mar 2022 12:33:41 +0000
Received: by outflank-mailman (input) for mailman id 291541;
 Thu, 17 Mar 2022 12:33:40 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUpK0-0004EK-HE; Thu, 17 Mar 2022 12:33:40 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUpK0-0001pP-Eq; Thu, 17 Mar 2022 12:33:40 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUpJz-00068R-W2; Thu, 17 Mar 2022 12:33:40 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUpJz-0001nz-VY; Thu, 17 Mar 2022 12:33:39 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Tqm59Te2ArCSY+LQEXT7UzEPEQeG1IddcFQW18Ka1Yw=; b=6xdLZtl3XOe6V5q0lutIpVpCV4
	0DSHnz2jKxlU0RtLV7AK1dzz5Pc65m2MD3dkOZZ1ZM4ocTH1asktvAzZFxaW8LmxZak2U6GPe48Hh
	pXTcnsD6z2tJjixpERdJKeekFiAoVmjDx58AqkxB60Htw8r3AXQsTdo8ptWFE98GXdSQ=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168644-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-5.4 test] 168644: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-5.4:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=70f77a2cb5281ad0b08a0bbdeeba885984c399dd
X-Osstest-Versions-That:
    linux=1346e17653a52c2042a486c7726f92e81481c8ec
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 17 Mar 2022 12:33:39 +0000

flight 168644 linux-5.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168644/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168515
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168515
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168515
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168515
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168515
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168515
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168515
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168515
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168515
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168515
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168515
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168515
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                70f77a2cb5281ad0b08a0bbdeeba885984c399dd
baseline version:
 linux                1346e17653a52c2042a486c7726f92e81481c8ec

Last test of basis   168515  2022-03-11 10:43:35 Z    6 days
Testing same since   168636  2022-03-16 12:41:53 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Alexei Starovoitov <ast@kernel.org>
  Andrew Morton <akpm@linux-foundation.org>
  Aneesh Kumar K.V <aneesh.kumar@linux.ibm.com>
  Arnd Bergmann <arnd@arndb.de>
  Bartosz Golaszewski <brgl@bgdev.pl>
  Borislav Petkov <bp@suse.de>
  Claudiu Beznea <claudiu.beznea@microchip.com>
  Clément Léger <clement.leger@bootlin.com>
  Dan Carpenter <dan.carpenter@oracle.com>
  David S. Miller <davem@davemloft.net>
  Duoming Zhou <duoming@zju.edu.cn>
  Emil Renner Berthing <kernel@esmil.dk>
  Eric Dumazet <edumazet@google.com>
  Florian Fainelli <f.fainelli@gmail.com>
  Greg Kroah-Hartman <gregkh@linuxfoundation.org>
  Gregory CLEMENT <gregory.clement@bootlin.com>
  Guenter Roeck <linux@roeck-us.net>
  Guillaume Nault <gnault@redhat.com>
  Hulk Robot <hulkrobot@huawei.com>
  Jakub Kicinski <kuba@kernel.org>
  Jason Wang <jasowang@redhat.com>
  Jeremy Linton <jeremy.linton@arm.com>
  Jernej Skrabec <jernej.skrabec@gmail.com>
  Jia-Ju Bai <baijiaju1990@gmail.com>
  Jiasheng Jiang <jiasheng@iscas.ac.cn>
  Joel Stanley <joel@jms.id.au>
  Jon Hunter <jonathanh@nvidia.com>
  Josh Triplett <josh@joshtriplett.org>
  Kris Bahnsen <kris@embeddedTS.com>
  Krish Sadhukhan <krish.sadhukhan@oracle.com>
  Kumar Kartikeya Dwivedi <memxor@gmail.com>
  Liam Merwick <liam.merwick@oracle.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Linux Kernel Functional Testing <lkft@linaro.org>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Mark Featherston <mark@embeddedTS.com>
  Maxime Ripard <maxime@cerno.tech>
  Miaoqian Lin <linmq006@gmail.com>
  Michael S. Tsirkin <mst@redhat.com>
  Mike Kravetz <mike.kravetz@oracle.com>
  Miklos Szeredi <mszeredi@redhat.com>
  Mohammad Kabat <mohammadkab@nvidia.com>
  Moshe Shemesh <moshe@nvidia.com>
  Nathan Chancellor <nathan@kernel.org>
  Niels Dossche <dossche.niels@gmail.com>
  Niels Dossche <niels.dossche@ugent.be>
  Pali Rohár <pali@kernel.org>
  Palmer Dabbelt <palmer@rivosinc.com>
  Paolo Bonzini <pbonzini@redhat.com>
  Pavel Skripkin <paskripkin@gmail.com>
  Peter Robinson <pbrobinson@gmail.com>
  Randy Dunlap <rdunlap@infradead.org>
  Robert Hancock <robert.hancock@calian.com>
  Rong Chen <rong.chen@amlogic.com>
  Russell King (Oracle) <rmk+kernel@armlinux.org.uk>
  Saeed Mahameed <saeedm@nvidia.com>
  Sasha Levin <sashal@kernel.org>
  Scott McNutt <scott.mcnutt@siriusxm.com>
  Stephen Boyd <sboyd@kernel.org>
  Steven Rostedt (Google) <rostedt@goodmis.org>
  Sudip Mukherjee <sudip.mukherjee@codethink.co.uk>
  suresh kumar <suresh2514@gmail.com>
  Sven Schnelle <svens@linux.ibm.com>
  Taniya Das <tdas@codeaurora.org>
  Theodore Ts'o <tytso@mit.edu>
  Tom Rix <trix@redhat.com>
  Ulf Hansson <ulf.hansson@linaro.org>
  Xie Yongji <xieyongji@bytedance.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   1346e17653a5..70f77a2cb528  70f77a2cb5281ad0b08a0bbdeeba885984c399dd -> tested/linux-5.4


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 13:01:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 13:01:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291552.494891 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUpkP-0007ZG-N4; Thu, 17 Mar 2022 13:00:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291552.494891; Thu, 17 Mar 2022 13:00:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUpkP-0007Z9-K0; Thu, 17 Mar 2022 13:00:57 +0000
Received: by outflank-mailman (input) for mailman id 291552;
 Thu, 17 Mar 2022 13:00:56 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=lMEa=T4=amazon.de=prvs=068cc946c=doebel@srs-se1.protection.inumbo.net>)
 id 1nUpkN-0007Z3-2o
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 13:00:55 +0000
Received: from smtp-fw-9102.amazon.com (smtp-fw-9102.amazon.com
 [207.171.184.29]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 45e4f5a0-a5f2-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 14:00:53 +0100 (CET)
Received: from pdx4-co-svc-p1-lb2-vlan3.amazon.com (HELO
 email-inbound-relay-pdx-1box-2b-eee1d651.us-west-2.amazon.com)
 ([10.25.36.214])
 by smtp-border-fw-9102.sea19.amazon.com with ESMTP; 17 Mar 2022 13:00:36 +0000
Received: from EX13D03EUC004.ant.amazon.com
 (pdx1-ws-svc-p6-lb9-vlan2.pdx.amazon.com [10.236.137.194])
 by email-inbound-relay-pdx-1box-2b-eee1d651.us-west-2.amazon.com (Postfix)
 with ESMTPS id 1F959A2843; Thu, 17 Mar 2022 13:00:35 +0000 (UTC)
Received: from EX13D03EUC002.ant.amazon.com (10.43.164.60) by
 EX13D03EUC004.ant.amazon.com (10.43.164.33) with Microsoft SMTP Server (TLS)
 id 15.0.1497.32; Thu, 17 Mar 2022 13:00:33 +0000
Received: from EX13D03EUC002.ant.amazon.com ([10.43.164.60]) by
 EX13D03EUC002.ant.amazon.com ([10.43.164.60]) with mapi id 15.00.1497.033;
 Thu, 17 Mar 2022 13:00:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 45e4f5a0-a5f2-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1647522054; x=1679058054;
  h=from:to:cc:subject:date:message-id:content-id:
   mime-version:content-transfer-encoding;
  bh=Oykx6Xr9eN4B2fuq+DK664PJgkxbCJddImWn58sKRGI=;
  b=m0mWWNr3csk31Pd0Tvko51ahVEDUjOk2PltnuSnA/eaJfSoZjn5Ly52e
   shvskT39j3s7sasbmWV9wO8gLbkJuhGw84ca/x+ObffBDKCZWNF7sTOpz
   shpip40KfPx00uvMs7bv9d9tA7ovnR1II07doetfr0TW6Zp3R9gkMZi2u
   I=;
X-IronPort-AV: E=Sophos;i="5.90,188,1643673600"; 
   d="scan'208";a="203074535"
From: "Doebel, Bjoern" <doebel@amazon.de>
To: Roger Pau Monne <roger.pau@citrix.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>, Ross Lagerwall
	<ross.lagerwall@citrix.com>, Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, Jan Beulich
	<jbeulich@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu
	<wl@xen.org>
Subject: Re: [PATCH 0/2] livepatch: fix handling of (some) relocations
Thread-Topic: [PATCH 0/2] livepatch: fix handling of (some) relocations
Thread-Index: AQHYOf78x9OeSa8tZk2PAY3sLThVew==
Date: Thu, 17 Mar 2022 13:00:33 +0000
Message-ID: <B3193B65-7512-4A69-834B-0ADF3DC6B9BF@amazon.com>
Accept-Language: en-US, de-DE
Content-Language: en-GB
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.43.164.95]
Content-Type: text/plain; charset="utf-8"
Content-ID: <B152D95046C9784E9D05EF1A68E61C20@amazon.com>
MIME-Version: 1.0
Precedence: Bulk
Content-Transfer-Encoding: base64
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From xen-devel-bounces@lists.xenproject.org Thu Mar 17 13:11:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 13:11:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291555.494903 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUpu2-0000bW-LS; Thu, 17 Mar 2022 13:10:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291555.494903; Thu, 17 Mar 2022 13:10:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUpu2-0000bP-IC; Thu, 17 Mar 2022 13:10:54 +0000
Received: by outflank-mailman (input) for mailman id 291555;
 Thu, 17 Mar 2022 13:10:52 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=lMEa=T4=amazon.de=prvs=068cc946c=doebel@srs-se1.protection.inumbo.net>)
 id 1nUptz-0000bJ-Vh
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 13:10:52 +0000
Received: from smtp-fw-33001.amazon.com (smtp-fw-33001.amazon.com
 [207.171.190.10]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a9bcbce8-a5f3-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 14:10:50 +0100 (CET)
Received: from iad12-co-svc-p1-lb1-vlan2.amazon.com (HELO
 email-inbound-relay-iad-1a-2d7489a4.us-east-1.amazon.com) ([10.43.8.2])
 by smtp-border-fw-33001.sea14.amazon.com with ESMTP; 17 Mar 2022 13:10:34 +0000
Received: from EX13D03EUC002.ant.amazon.com
 (iad12-ws-svc-p26-lb9-vlan2.iad.amazon.com [10.40.163.34])
 by email-inbound-relay-iad-1a-2d7489a4.us-east-1.amazon.com (Postfix) with
 ESMTPS id 29A419EB27; Thu, 17 Mar 2022 13:10:31 +0000 (UTC)
Received: from [192.168.2.253] (10.43.165.112) by EX13D03EUC002.ant.amazon.com
 (10.43.164.60) with Microsoft SMTP Server (TLS) id 15.0.1497.32;
 Thu, 17 Mar 2022 13:10:29 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a9bcbce8-a5f3-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209;
  t=1647522651; x=1679058651;
  h=message-id:date:mime-version:subject:to:cc:references:
   from:in-reply-to:content-transfer-encoding;
  bh=RTJb4FKq3FYqOb7fotyFs+v/zo2rFES3uupLVpM2dyE=;
  b=NGozqviscZPmg2muf6SMFVfrtMrn03F/BxOnQscFVla9fdB+t0dZYWmc
   jZv8LG5Axp4yLmo5hsfTkPZxYZtTUtxpOYufzNEMfJOZ05Otr4UjNBXxp
   UJEfxvOWNCBfZQ7Om1e2Mfvzj6LchSJ0iibOUqZC425JyyoeSHnNFic2p
   4=;
X-IronPort-AV: E=Sophos;i="5.90,188,1643673600"; 
   d="scan'208";a="182620630"
Message-ID: <226fa6ba-310d-8083-8d5f-5b5aefa4e70f@amazon.de>
Date: Thu, 17 Mar 2022 14:10:27 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Subject: Re: [PATCH v5 2/2] xen/x86: Livepatch: support patching CET-enhanced
 functions
Content-Language: en-US
To: Jiamei Xie <Jiamei.Xie@arm.com>, Ross Lagerwall
	<ross.lagerwall@citrix.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>, Roger
 Pau Monne <roger.pau@citrix.com>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
References: <03798b67ec3a892a302e6be5d87ea676e6376036.1646837462.git.doebel@amazon.de>
 <5cdd27addcec926eb48fdeab08ad3371e7c3fd7c.1646837462.git.doebel@amazon.de>
 <PH0PR03MB6382E2AD10AEF1BC48C55093F00A9@PH0PR03MB6382.namprd03.prod.outlook.com>
 <VI1PR08MB3056A7F7E5DC1DD68212A57692129@VI1PR08MB3056.eurprd08.prod.outlook.com>
 <VI1PR08MB30562C85CEF556F385DF695F92129@VI1PR08MB3056.eurprd08.prod.outlook.com>
From: "Doebel, Bjoern" <doebel@amazon.de>
In-Reply-To: <VI1PR08MB30562C85CEF556F385DF695F92129@VI1PR08MB3056.eurprd08.prod.outlook.com>
X-Originating-IP: [10.43.165.112]
X-ClientProxiedBy: EX13D33EUC002.ant.amazon.com (10.43.164.234) To
 EX13D03EUC002.ant.amazon.com (10.43.164.60)
Precedence: Bulk
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: base64
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From xen-devel-bounces@lists.xenproject.org Thu Mar 17 13:18:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 13:18:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291558.494914 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUq1b-0001Hb-Ds; Thu, 17 Mar 2022 13:18:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291558.494914; Thu, 17 Mar 2022 13:18:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUq1b-0001HU-Ag; Thu, 17 Mar 2022 13:18:43 +0000
Received: by outflank-mailman (input) for mailman id 291558;
 Thu, 17 Mar 2022 13:18:41 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RBlk=T4=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nUq1Z-0001HO-AO
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 13:18:41 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id c24d8afa-a5f4-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 14:18:39 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2112.outbound.protection.outlook.com [104.47.17.112]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-9-1GtdhNg2N5mny6NDDj2l-g-1; Thu, 17 Mar 2022 14:18:38 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by DB7PR04MB4489.eurprd04.prod.outlook.com (2603:10a6:5:35::15) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.29; Thu, 17 Mar
 2022 13:18:36 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d%9]) with mapi id 15.20.5081.017; Thu, 17 Mar 2022
 13:18:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c24d8afa-a5f4-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647523119;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=gM44/RyxAiy8lgRoFEq02yNHIu42B9zSNU+FDv9ga3A=;
	b=N9BntDHPBhquUasllZYvmusb35iHOtuQW1Js9upj/mfxsoatCivZhX74SUT1xSIyQThLQl
	vFuU4bYOrDQGaJV+vbfWHzBhnrXF0E3U9I8egxJv93IAX208bPX9g4qCTwrAMc75P+B7x/
	Ia/DVCut/p/O2asRf28eq+o7oTsOIu4=
X-MC-Unique: 1GtdhNg2N5mny6NDDj2l-g-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=bq39hOAMEjKG9etZKFuYv5BVtbWXJsLodrfRMFyKfSRAtWAMSr/P21YMx9KrohCIJQTQW7Cz5AF94Zi7UDjkicUVy+7X6MgYi69RpKDNahkSJlSA/+jEcNGYrfOmvJMNIHpk5kPfzDUTCV+ynQ9RcNWicqYRvASwJpBH+TiXSRzF9qDCF2OwJuQ2XBsZ6UX1IXQf0GFlzSwMmzxqDH4uvBFzL4e5IRH3INQJmUhHXqvgUyaOhOmv9BwOxAODv/wsqZjm8TJoz8N9mRRnfm12IYMv9CNBLeA9X0El5c751K6paSCGvzwiYtHf3nbRDHhgL/jTaofsT7thdbKvzNeyKA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=gM44/RyxAiy8lgRoFEq02yNHIu42B9zSNU+FDv9ga3A=;
 b=bNCZAp5IUveKQNa3Yiq0nKV3EGnRgs7rXvbDFjLlkvYXqkCWrR9nP3RQoShM+wDdzTrGjuxPyOFQ8LSWAF6r/Lzmy/DZtInTk7AQkxMRF1o194fgnLU4r+s+VLyJy5ln5QwMcwmYb7Xy0W6vynxnUGhZ+pA4El6lkCWga/nfoxasOKthGCOJSH3u3PRcFFeUMiAn1GH6ScxeUxqp6X5tiep5+PYsq7XNlWWn2KYVZ8iqssn61bWI4CH8Ve0g6fBe3ih4sFazhTUHduuFkJjNSgl4iG6wNPqXNMKA6B+km0q7mk1Xkmwkfj5nS85xu6xPygXr20C8PZu4dKpTyI5yTA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <f40eafc9-2539-e47e-e3d9-666aaeb79220@suse.com>
Date: Thu, 17 Mar 2022 14:18:34 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH 0/2] livepatch: fix handling of (some) relocations
Content-Language: en-US
To: Roger Pau Monne <roger.pau@citrix.com>
Cc: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
 Ross Lagerwall <ross.lagerwall@citrix.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220317110854.39050-1-roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220317110854.39050-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR06CA0230.eurprd06.prod.outlook.com
 (2603:10a6:20b:45e::26) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2826dc1f-a75a-4ba8-7d2d-08da0818a4b4
X-MS-TrafficTypeDiagnostic: DB7PR04MB4489:EE_
X-Microsoft-Antispam-PRVS:
	<DB7PR04MB44890A034D14F0ABAAD26606B3129@DB7PR04MB4489.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2906002)(86362001)(31696002)(38100700002)(508600001)(6506007)(36756003)(6512007)(6486002)(2616005)(26005)(53546011)(186003)(7416002)(8936002)(4744005)(5660300002)(316002)(6916009)(54906003)(66476007)(66556008)(66946007)(4326008)(8676002)(31686004)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?N1hteWUxMEYra1hBaDJWRDc5aFg4TjlLdnltVEtxc0JJSG9lR3VyUlhWOW1Z?=
 =?utf-8?B?Y09kVndpSjJabytEbVkrVXFEbUpuMG1qWE1XdktRVFBQYW1OY2JTRWlTSkNH?=
 =?utf-8?B?ejV5WU4zUmVpZ255TytpSHJVNmFiLzF3V1lsWUZqY3A3NzIxMlhoZitrSXdZ?=
 =?utf-8?B?MlAycXluZUI5RkhiQXk0SnBvVHVFTW5XbU9CODNMQzhZcVZaenlvem9LZFox?=
 =?utf-8?B?Q28zSVZxZ0RWZTd6SzU4dGVMZzdmN0k3MVhURDh6eGIvV2RCS09QY21pQUha?=
 =?utf-8?B?UFVGYlkxMXplUmdRQitTVmY4UTZvclFaU2c0K0t2TnEvbHlUVEs0UDJSYzcv?=
 =?utf-8?B?QXBkN2xTeUZ6VGhmUTV2NkpMdDlVM2ZYRzFnNThnWUEraGZ2T3M5U3NFQmlV?=
 =?utf-8?B?Q01KcWRNV1ZFa2R2ejkrSlFROTdiNFBIeHlkYVdVL01wU2QrWExzT0l0WXdH?=
 =?utf-8?B?SGk0MHdqTTVuTUJoWS95TlIwbUVtOHVQTkdpZjVpT1BiWHRHcHBBUWUvK0px?=
 =?utf-8?B?dy80TzNhSDA3aGVxV0ZZc3UvRHFDbzNxcUJJZ1daQVcxVHpHTVNFSUJBME1y?=
 =?utf-8?B?d0JxSFh3elljZHkrSXprQ0xaVG4ycTZMcnN5c2RsUlRlTThLS1RmVC8vNS9m?=
 =?utf-8?B?dkJ5ampJeWpkNWxKdjBIRTFsVWtTUU5yWmZQbFJueG5EaXNIdTB2MDE4OWVF?=
 =?utf-8?B?RGJ3Ri95M2loVzdieDFoKzNnUEhZSkp1YjlYaHowK1BCVVEvWWlBR0wycVl2?=
 =?utf-8?B?Sk4zKzd2c0UxSzJwTFdRNXVRcHFLV2R2Rm5HbUs1RjZYRGdLK3Q3WlY0M1R1?=
 =?utf-8?B?U2FPWDhWeG1qRnVpbE5ZZ2RVQVR0VFp3Y1M1UUV1aVgvVmNJeUlRcXRUaDQ1?=
 =?utf-8?B?aUpnRG1oSm5SOGtBTnl3d1JEVW40NVpJbXdJL250bnZZVmpaUHdTeGZLZllZ?=
 =?utf-8?B?N3N0aC9OYVlCa05VN0xZVklkV0ZKMElKc1YzeWFsR212Z2Eyc3QxcTAzdDVt?=
 =?utf-8?B?NmtDS0tWaWIzbjU4TFo4NTQvcXRCeFdhc2VZRWpNSUhLSjJJQ01rOWx3UXVY?=
 =?utf-8?B?MDM4Z2RNQVpIb0c1MS9ybkRudWhrdG9Da0Y5cjlxdjhlbGFJL3duaCtHY0JB?=
 =?utf-8?B?eHg2YUd2TWlDYU02UlFJZyt0TldKeGhhQWJ2QS8vSjhJRmp1US9zeHlSYVgw?=
 =?utf-8?B?Vk1lckVDNFFaS2QzdGFsM3ZBNGtISGhCemU3WFl6aE5nV3MyeUNFWXNaK3V1?=
 =?utf-8?B?N3RJQi9nUXBHaWNpRnJKT01tNnJNYlBDREt4MHIvV1dUVkgrOE1NU1IyMmI4?=
 =?utf-8?B?bG5vc3JITFl6d2lmQU1zaVQ1Y0J0dW1yQkhUL3VBdnBkdE9ic2xmTGYxbGdl?=
 =?utf-8?B?b216L1NlanNCekt0dVFLTHZlQnZkNlpHZjBCUEtIeGpOK3IrUGJQaFU2aGxX?=
 =?utf-8?B?STlaSyt4cFpJYkZmS1UwbWVLQ0wvWituRzlOWmFWaDVzWi9FcmsrSHlwdml3?=
 =?utf-8?B?NWZ3c3VETVNPYXVqOEF3eUlORzNIV216K0xPMTNmYzRXWGNibjIzalZaZTFB?=
 =?utf-8?B?S2h4MmdPYVFDRGpVdUZvZ21LTDJleHh2ekpTZnh5TVg0N2tQSndId1VQR0VG?=
 =?utf-8?B?QWhlTTJGR3lEL08zZVlWY0c5RG5JRVVMREZUN2NsaFlQdHRtS2N4SEFoNzJD?=
 =?utf-8?B?RUtLOFRIWWNSU0x1Z3J3WncyRHRBY1V4THB4YTltalVxTEYyNnFuaDZTdUFO?=
 =?utf-8?B?MDJjWlFNZ2FqU1lISUp3RWg1cDFMeWhkZjZFQ0FKa1R3akd3SzBReTZyNko0?=
 =?utf-8?B?OTlkdElwWllkMFRja0QvcWtKdExpZVlkb0hVT2xBMGVHbkpKYzk3RjNOM1c0?=
 =?utf-8?B?ZmNhTG1od3l0SDNBc01aclFEZTFaMXVqM2FPNjcvVFBNZS95VGdET29yV0FJ?=
 =?utf-8?Q?oICO5Phna062qUcF9nifqKCDY0yt/hY1?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 2826dc1f-a75a-4ba8-7d2d-08da0818a4b4
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 13:18:36.2969
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: QfUarh6Szz+vRRMXBVvi3GMIbjyg7yaWOZIi0jBujOpwcLPz/L+A7yV8uzIbK66/aFFDqAPOF7phOTFhaLMEDw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR04MB4489

On 17.03.2022 12:08, Roger Pau Monne wrote:
> I wonder whether it's possible to have unresolved symbols if we only
> ignore non SHF_ALLOC sections, so we could maybe error out earlier if we
> found a symbols that belongs to a non SHF_ALLOC section in
> livepatch_elf_resolve_symbols.  The current approach is more conservative
> as we would only report an error if we have unresolved symbols that are
> referenced in relocations.

I think it's better to remain that way. Symbols appearing in non-alloc
sections isn't wrong in any way, as long - as you say - there's no
relocation using them.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 13:21:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 13:21:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291561.494924 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUq3x-0002d0-QA; Thu, 17 Mar 2022 13:21:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291561.494924; Thu, 17 Mar 2022 13:21:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUq3x-0002ct-NJ; Thu, 17 Mar 2022 13:21:09 +0000
Received: by outflank-mailman (input) for mailman id 291561;
 Thu, 17 Mar 2022 13:21:08 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUq3w-0002cj-Fu; Thu, 17 Mar 2022 13:21:08 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUq3w-0002et-EF; Thu, 17 Mar 2022 13:21:08 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUq3v-0000Tz-UX; Thu, 17 Mar 2022 13:21:08 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUq3v-0003ND-U2; Thu, 17 Mar 2022 13:21:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=TD8EBHvTgmO7K5+mBDAglpupqaQRoh69jjIoUQi3BUk=; b=YMcnOWkTpG539DRQZBjb1XgdA2
	T03f3ymZxLTGRho7PoKP+VVu6lpGtAhC3PXy71G5LUtTGGnWczrvSVBz1SK6bYf7gEgPoEyysprN2
	ltGcMvKkyMqhonIFc/fnNtzKmoRy6Xuu63Ojef3soHVhicKCLihqXgkaEyazBky1If/E=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168661-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168661: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=5b56c52b5c1cc817a1ddac7f03aa6a02aeab4c04
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 17 Mar 2022 13:21:07 +0000

flight 168661 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168661/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 5b56c52b5c1cc817a1ddac7f03aa6a02aeab4c04
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   17 days
Failing since        168258  2022-03-01 01:55:31 Z   16 days  158 attempts
Testing same since   168637  2022-03-16 13:10:25 Z    1 days    8 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 714 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 13:27:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 13:27:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291570.494936 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUq9Z-0003Mq-Kt; Thu, 17 Mar 2022 13:26:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291570.494936; Thu, 17 Mar 2022 13:26:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUq9Z-0003Mj-GP; Thu, 17 Mar 2022 13:26:57 +0000
Received: by outflank-mailman (input) for mailman id 291570;
 Thu, 17 Mar 2022 13:26:56 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RBlk=T4=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nUq9Y-0003MY-Py
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 13:26:56 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ea2c8beb-a5f5-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 14:26:55 +0100 (CET)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur01lp2056.outbound.protection.outlook.com [104.47.0.56]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-3-x2Ix7zC8MpWLmNhU1ZN0LQ-1; Thu, 17 Mar 2022 14:26:54 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM7PR04MB6840.eurprd04.prod.outlook.com (2603:10a6:20b:10f::11)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Thu, 17 Mar
 2022 13:26:52 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d%9]) with mapi id 15.20.5081.017; Thu, 17 Mar 2022
 13:26:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ea2c8beb-a5f5-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647523615;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=Qb7B1TJsD7lJlI06Rum0lxy5jSwcCjmBKT+UxCk0Uww=;
	b=csJNbuGrOMGFWpP6phFmNq5AvMps0weXTXrFE4K51foDcbNJGbS30fh2zIjCBllVsIBCrX
	xZ+Pb0QhKhc4RP3dRerxJvnf9+GNDLMG0q89umPCoEIkxfn/92bUjHdPBQV9QSP3celkuY
	eiP4UAgmnPjqF64UrNKWf9BL523VBLs=
X-MC-Unique: x2Ix7zC8MpWLmNhU1ZN0LQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=YA/th0n1gJpjmATH4rtx4J47ELw/AA6demUaWotwDGNg8VvwDgLekKfsurVMFB2pArXGoA0JuqPjHbSsJthxYn9q7nyLnmBxAggTQM2MSed+7j5EXsd6vR6j+kmYA7+Mau0KaNn0h3Fql6j0U53/gdO0at1JMtiT/Wexhk5nX2JKGZUKad5hZ9t3SDRPEhdLj3VkgtHa59/ZdB82kY7BMkZuSLjIaHg0Eoq1jwd4mbqa1S2sbOp5egxSAuY2MXtiAilcOg7Kg91EW8a34sHNpUeXcINafLAUc8RrfXDWC4luILY9TVNzSpqV8MLyUoOBBj8pWoCevnZA0OykseF+1A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=1VHIqP1OG/hn4RTwEROFHx0/Ay2wrsKO4nilEryTyvk=;
 b=NJl0DvgV5dg1wqo8gmv5dek6DNUSXYLGbvonSKCErc2UVoQKex4x4YtbBg+8SDAdI+d6SmBx2jdHY2W112fpb9DSGNW8D3hwBF3BlO+iBsp2C/5TiObVHKNPQ/5QVRNKasYxaYUbR96Ez5qCgea+m3niTvnteCEZ997tsvPZWcvCln7i59fpUNGqykCLq4ARGrTJYt9fk6DXavEhtJd5gUvLc/qxEw3hsU6HsoAGR92QlpR41D06acRPo3SvTxIdocozjAFwD5+Dt8433fw6UiRUxS143a2EM5Zcsc5/M4dz7baIBFv2LkYaUCmmMwHQd2ncrAn2sqUwrcL7QnyW+Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <e6a90957-2b74-58c5-28b0-f926d95a8329@suse.com>
Date: Thu, 17 Mar 2022 14:26:50 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH 2/2] livepatch: avoid relocations referencing ignored
 section symbols
Content-Language: en-US
To: Roger Pau Monne <roger.pau@citrix.com>
CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
 Ross Lagerwall <ross.lagerwall@citrix.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220317110854.39050-1-roger.pau@citrix.com>
 <20220317110854.39050-3-roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220317110854.39050-3-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: FRYP281CA0009.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10::19)
 To DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5619734d-677d-43b5-2b34-08da0819cc5d
X-MS-TrafficTypeDiagnostic: AM7PR04MB6840:EE_
X-Microsoft-Antispam-PRVS:
	<AM7PR04MB684045EB985999D8AE999874B3129@AM7PR04MB6840.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	Y4LDlx+bFB2Cz3eIkvjC+OhygdRH93nAAWWs4pw05yBsE8EIolyiFzVpNgH13kKjajkqjNLjOhGnRzPPwf/j02O7nA0BNzOKJEN//B90UuLen1FccjfQ8p49msTgYj0VldRYlPv8nTA6W4BOoDu19N3dOwS4kz+TSw8FiX0gGd+153L6COodvFIM/SreBFjUMyYdOlswRA0Ersxgz4BNrVDqUnRoN3F45wsPXyA+h84T7kyuBPBc8Qp0dtL5sVHmsVORtFUW5e2zaTvEkyY64NyPPBF2JZL3dT+lurg1gq5HFWNfqtNY4Yd11u3VeegAEHalqy4dgGKKEeuFYWJP+N9ShPwTM8wDoDNUcmBdukW8gY12iZQHRyF7XHDnM22KvGqC4gtZC9WxaXxGKxrKE0qcqeLS83mx3zRLohUdF1DpN8SkcEqdyoISH+6eg7ZlAMcQ7MmZGTRmrCg/15J7WX1un8IZk53WyMUwlX9ltcg+xESXIisp4R4srqCzKCfVzsVL/V//USrZRaaxL2hryxFr4sVe02mDR2tgzGNioFQiN8MxD/w1HxqQmqn91jSaFntPucdUZjs6YYFe+ZWMH3Y7eFUuzGKDXwpRJDd6o5YZ0BVPemap9YSwzf3f8pimiyzgkb9pJdBzW4jkvqvK7/xj7KF4qC0+nZbg8tQR30Pt8jp/FAxsvtuW8MiYtQ1FJA3aHhBESH6U8cgodbB5CvjBydn9CpNJEwMyUCY955JzYXWg1SpAAUWik+wrKEDZ
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66946007)(66556008)(66476007)(8676002)(508600001)(6506007)(53546011)(26005)(36756003)(2616005)(54906003)(316002)(186003)(6916009)(31686004)(7416002)(83380400001)(5660300002)(8936002)(2906002)(6486002)(86362001)(31696002)(4326008)(6512007)(38100700002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?piGjVdteGctb2gIhN6wDziTu+MGFFQQBRTHM1utCdPQRhnItj6IuqiWELQUx?=
 =?us-ascii?Q?thfmEDFdYmC3zf+0STfE9nbuyWiTUEZmBTT9dFxy37OeHKYUT7p31dTgWESu?=
 =?us-ascii?Q?zBXIJT4bHfYIvaHn6ACgI4H9XuIQ7rdxX79hixxTOCjLCu73LLu/SaBUegMH?=
 =?us-ascii?Q?7OuPbWMU5qH2U3sh0Lw4ytSQMG4TVJ6TT2OGnTTqpcQazgkHzJMRLzhWHnZ8?=
 =?us-ascii?Q?yvt7wwjTH3SOVX9u32yZpTpwWqPoJ1YwCdvhYktDAWFaOzus4nYu4pLxgPAu?=
 =?us-ascii?Q?oFhyc7TlPgexa9p8poFsLJh2ZOnWBngCeROjUNj9tycXl+ean2DGxXwC47Up?=
 =?us-ascii?Q?xRRNK6NNdYAp0X4qG5zofz/YwdR3aoHbpy5uhuHTc3MF/ibHN7xU6wsEsrhx?=
 =?us-ascii?Q?QwLPVVN/y4mZoHgO69OEh79O8o0rvX9HQMBDDA7HY9qjqPbNiZGe46cvvc0O?=
 =?us-ascii?Q?E+1Zj1pMMBY7gEewj5xYSerBRf3uya3R7KXlWq8HccqbNOPZFl3R+BN7J+0Z?=
 =?us-ascii?Q?nAqhtV+z9nWavl4ouWdZsG1IpYdoLWcfBzX3M1oBY4vqHRSEak84xYY8ugF5?=
 =?us-ascii?Q?KuO8GNcI/x76w+Xv+6cHDWlO2Pnft4/+ANe1ucHlEiMgx8pMI/1MzvXzz7el?=
 =?us-ascii?Q?wxQFCgYNZ76wrx1j8eZXiYytElX+GT4DUjyqnrPEbPzxUOIA7+8XWV7iTERv?=
 =?us-ascii?Q?eGY7yoUcCuhbIOUzTlGNf6jH/Qqr17/8JopPc3NbhE0V+D0jIbpptCEWfUa4?=
 =?us-ascii?Q?h7iZiMnpy8i+PUyMadsMCUZ3bv3EG7Tfcjq/g1T4gOkxiyeyzvpsMh33el/n?=
 =?us-ascii?Q?JweggxyZgzDQB0kon5mAdZyWiotNBfX8/oMZU8qw7AvymT8FpGwN5SdBmzwE?=
 =?us-ascii?Q?JeJmahT13AkYKJB+2GPMBHCRJPlvlMkqCsHWAGe4RkFNBGkEhEQdgkkvPUx6?=
 =?us-ascii?Q?qBqmHVzxLk++Owrq0/ikCV8Tqhci/H2315tbOR9ejcH4nB+z+ovG1visuNVr?=
 =?us-ascii?Q?5HdFVjhsEFdvIqqU4wlmmeqdB6iFBc1YEQ2iXxjYXWiooMqbMTdt5vFag0hP?=
 =?us-ascii?Q?Q2LDW001RZLpKlFEKJ9CnwqWWqZCY/zt2/ShH9ClXp/azZEeE5CUh5Fa63X1?=
 =?us-ascii?Q?VuBj0AGh4aLWTWeK2qhhQ7jB+ln2W2jaIUpkHGfTmGmU4hDtITlnTTRcbilh?=
 =?us-ascii?Q?y7wDfj2yoK44nLl+qXpvl05cwTtzXCkxNsLJRtGt5X4RIHx0d/+o2AfNSwC5?=
 =?us-ascii?Q?LY9jGW7tjD88hEef0b/dLv19PaC1SAFKULLfOiIuF4o38QE9IK3bkcZdbKi8?=
 =?us-ascii?Q?trmbBoOS7nr6VUSyK0DCo+wOGt7i9p5oKfe19xrPFEe1LtKZQ/fjdt6zJOhY?=
 =?us-ascii?Q?VcCRDzZrNFONycNFglEgH6zagkYoSj7RJ4ktx8ijYlMKV8ibVugDzcquwYWm?=
 =?us-ascii?Q?TTSip6AQ136ZoS3oZqoNygnkdvNFCKfP?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5619734d-677d-43b5-2b34-08da0819cc5d
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 13:26:52.3301
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: mnk3Y6gK72xW2Xg2ThRi76eRT93lD6T1/zkOHe2PglqBgfY5MoFTfEPz376+gw2I1l21r++0CdDJLDQGM2mzaA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM7PR04MB6840

On 17.03.2022 12:08, Roger Pau Monne wrote:
> Track whether symbols belong to ignored sections in order to avoid
> applying relocations referencing those symbols. The address of such
> symbols won't be resolved and thus the relocation will likely fail or
> write garbage to the destination.
>=20
> Return an error in that case, as leaving unresolved relocations would
> lead to malfunctioning payload code.
>=20
> Signed-off-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>

Reviewed-by: Jan Beulich <jbeulich@suse.com>
with one nit (which can likely be addressed while committing):

> --- a/xen/arch/arm/arm32/livepatch.c
> +++ b/xen/arch/arm/arm32/livepatch.c
> @@ -272,6 +272,13 @@ int arch_livepatch_perform(struct livepatch_elf *elf=
,
>                     elf->name, symndx);
>              return -EINVAL;
>          }
> +        else if ( elf->sym[symndx].ignored )
> +        {
> +            printk(XENLOG_ERR LIVEPATCH
> +                    "%s: Relocation against ignored symbol %s cannot be =
resolved\n",
> +                    elf->name, elf->sym[symndx].name);

Indentation here (and in the other two instances mirroring this)
is off by one.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 13:51:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 13:51:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291576.494946 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUqWn-0006Zb-IM; Thu, 17 Mar 2022 13:50:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291576.494946; Thu, 17 Mar 2022 13:50:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUqWn-0006ZU-Et; Thu, 17 Mar 2022 13:50:57 +0000
Received: by outflank-mailman (input) for mailman id 291576;
 Thu, 17 Mar 2022 13:50:55 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=JNAg=T4=citrix.com=prvs=0684b021b=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nUqWl-0006ZO-Lp
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 13:50:55 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 41f91ce2-a5f9-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 14:50:53 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 41f91ce2-a5f9-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647525053;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=T9InDsiSQ9z3IQJlJgji4+IBR3+pTDJ6bgWJBfja+AU=;
  b=PAEX0ZFtu9rYaDTMaLI3CYXg2xgajLQnDqdai6r+mJft+qYQD3+d1+OG
   NVqxLbmq6Bzqmpkvw5I1UHJ1MOnHrdaZ/fpvqfF3DMBVvYDXNCQ4RogTj
   T+JoLfeth27vDW5HtnsgVvpO+Ty5NtGY9obChoUflWdk7C/YiAMZV6oAZ
   s=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66903922
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:gzW/G6hKwKEOvcjhw8NJ2g+RX1617RAKZh0ujC45NGQN5FlHY01je
 htvUG6GaPnbazH8e912aIjl8k8F6sPRz9I2TgY+rHgxQSIb9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFrS4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YS12OaDhhs8DaiF3IRt3L6Bv1JiaJ2fq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bkmtnwjzDS+4vXLjIQrnQ5M8e1zA17ixLNaiAN
 pJCOGA1BPjGSxduBFobC7caprq5pEHHKmxYiWCer4NitgA/yyQuieOwYbI5YOeie8JRmUqJo
 3PcyE7wCBoaKd+3xCKM9zSngeqntSn2Qp4IHbu0sPtjmkSOx3c7AQcTE1C8pJGRmkO4Ht5SN
 UEQ0i4vtrQpslymSMHnWB+1q2LCuQQTM/JPF8Uq5QfLzbDbiy6aAW4eRzIHd90it+cxXzUh0
 lLPlNTsbRRturCITXOW9p+PsCi/fyMSKAcqZzIATAYDy8nupsc0lB2nZs14DKe/g9nxGDfx6
 zOHti4zg/MUl8Fj6kmg1QmZ2XT2/MGPF1NroFWMNo640u9nTKT6YIGF93PF1M5vHryQXFSok
 F9ZndfLuYjiEqqxvCCKRewMGpSg6PCELCDQjDZTInUxy9i+0yX9JN4NuVmSMG8sa59ZImGxP
 Cc/rCsLvPdu0G2Wgbibim5bI+Aj1uDeGNvsTZg4hfIeM8EqJGdrEMyDDHN8PlwBcmBxycnT2
 r/BKK5A6Er274w9kFJaoM9HjdcWKtgWnz+7eHwC503PPUCiTHCUU6wZF1CFc/o06qiJyC2Mr
 YoAa5bVkk8BCLKjCsUyzWL1BQpWRZTcLcqqw/G7i8bZelY2cI3fI6K5LUwdl3xNwP0Oy7agE
 oCVUU5E0lvv7UAr2i3RAk2PnIjHBM4lxVpiZHREFQ/xhxALPNb+hI9CJsBfVeR2q4ReIQtcE
 qBtlzOoWa8UFFwqOl01MPHAkWCVXE/y1FzUYHb9PmRXklwJb1Whx+IItzDHrUEmJiG2qdE/s
 /un0AbaSoAEXANsEIDdb/fH8r97lSV1dD5aN6cQHuRuRQ==
IronPort-HdrOrdr: A9a23:fa9PxqDgNRB/Dr/lHehOsceALOsnbusQ8zAXPh9KJiC9I/b1qy
 nxppkmPH/P6Qr4WBkb6Le90Y27MAnhHPlOkPQs1NaZLXLbUQ6TQr2KgrGSoQEIdxeOk9K1kJ
 0QD5SWa+eAfGSS7/yKmTVQeuxIqLLskNHKuQ6d9QYUcegDUdAf0+4TMHf8LqQZfngjOXJvf6
 Dsmfav6gDQMUg/X4CePD0oTuLDr9rEmNbPZgMHPQcu7E2rgSmz4LD3PhCE1lNGOgk/i4sKwC
 zgqUjU96+ju/a0xlv10HLS1Y1fnJ/ExsFYDMKBp8AJInHHixquZq5mR7qe1QpF692H2RIPqp
 3hsh0gN8N85zf4eXy0mwLk303a3DMn+xbZuCilqEqmhfa8aCMxCsJHi44cWADe8VAcsNZ117
 8O936FtrJMZCmw0xjV1pztbVVHh0C0qX0tnao4lHpES7YTb7dXsMg24F5VKpEdByj3gbpXXN
 WGNPuspcq+TGnqL0ww5gJUsZ+RtzUIb1q7q3E5y4KoO2M8pgE686MarPZv6kvouqhNDqWs3N
 60QZiApIs+PvP+UpgNdtvpYfHHfFAlEii8eV57HzzcZdQ60jT22trK3Ik=
X-IronPort-AV: E=Sophos;i="5.90,188,1643691600"; 
   d="scan'208";a="66903922"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=lIdcF+KyNPdN67JgM0MWB0snIF+JrqAyLaAX4P0W9HvsgcfQ1Ah0/3c6xU6l4HUqEi6JiCt2vuNF+ytEny1y2M8oDzDcTeHcBVLkd6ZrBUKKruLRu+yCQXq8bQI45e0SkljlY+cKa0oPvPx9IZuinRvVnIepV/VjoNa3q4Y7/up/txIxF7GUtg7Hkc2tG+tD5PfocwWoVYF1Yf0U0Nazm0VTWDSeLfMF0IpEK5xMsMZTT96Rig8WC2aEZfuwq7uPmzckiPMJdVMbOJcSEg50BCitL0XPlB6JVIZpOIC8Qa+l/bN2Pn+v2ZLNeob0EoX6rs4shzYaxsTlDo+Y5xj+Ew==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=11N184gdWqI70BzXhll4qv5NlwfSnl6B6Q2N3sIaClw=;
 b=bas0xBmJAkQtN6H7xXvpJaDwwvvZMLSFPCUa9V7KNWqTeCCEdCYCsSUZZaFrzVJOUnm6HGxnm3UMoKKs557IfhULzR7tDBQ/tmDIMbPHZy8qpQOk6E5MC/OEja+obOg3A//jQU1K/sc1dZsCpyZrVVtuNpPTvIJIu83AinDPtgXfFEwBBw7gVhbFO8fSXvcKRuv4JQs9apryRfy/PhGDvFzJePE/ohdAsVG48O4SxWyTGfwh8YsotBai5GWSk7Xbia5qOrpkEqzTzYRY3s4+7ZkG6jSFmy5Hcmvc8ZHHGXRgnac2tV7WyYYEl18zur1RR6X4O7vxvhzMMg9FBMMImg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=11N184gdWqI70BzXhll4qv5NlwfSnl6B6Q2N3sIaClw=;
 b=dUTBlNbXHvtmwLP5iRpZzu/bSaWUkfBNA3I6H31bhUDk7c57TLIfRopa4Mexn18UObjj1vidnzhuW+lWCDXUfryUhRMJ+HtG7r6qccsXxdv8Xa0qLkagj6GZbAClbh0jRYOgFkTptr6NvqdOR+1AdhDbV32RpT0+h6OKw3mm48I=
Date: Thu, 17 Mar 2022 14:50:41 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>, Ross Lagerwall
	<ross.lagerwall@citrix.com>, Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH 2/2] livepatch: avoid relocations referencing ignored
 section symbols
Message-ID: <YjM8sReJHEwEa4h1@Air-de-Roger>
References: <20220317110854.39050-1-roger.pau@citrix.com>
 <20220317110854.39050-3-roger.pau@citrix.com>
 <e6a90957-2b74-58c5-28b0-f926d95a8329@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <e6a90957-2b74-58c5-28b0-f926d95a8329@suse.com>
X-ClientProxiedBy: LO4P265CA0081.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:2bd::9) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5a382f01-07e3-4942-198f-08da081d22f2
X-MS-TrafficTypeDiagnostic: BY5PR03MB4967:EE_
X-Microsoft-Antispam-PRVS: <BY5PR03MB4967D07A8D2E80D44248A0238F129@BY5PR03MB4967.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(2906002)(83380400001)(85182001)(33716001)(9686003)(6512007)(5660300002)(82960400001)(8936002)(6666004)(8676002)(66476007)(66556008)(66946007)(186003)(26005)(38100700002)(53546011)(4326008)(86362001)(6506007)(508600001)(316002)(54906003)(6486002)(6916009);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?QkorVUdmNjNvSGQ1VmZ4a3dScjJOUHBYQU9GcXgxa2N1Z25OQTNBMUJSeEFj?=
 =?utf-8?B?QjQ4aS82bThuTDhHK1FHN01JV3BpOVpxK2svWFJ4UnZsdU45Q0MvT29tWjZX?=
 =?utf-8?B?VG5HYy9HMldzTUx1MlZBT2JMTTlOR3JWU1FNdWFOc0szU3dOOWNCWXpQejV2?=
 =?utf-8?B?ZUVNYTJoenhjeGo4c3RSY3dnTFdnRFZpTmh6OHZ4cUZnUnZVelQxS2FpTzJt?=
 =?utf-8?B?aXVyREhHSytlK253UmR4cUtlTGlNbGVYOE5JR25CbXBTeXZiek4vK3JXZWJm?=
 =?utf-8?B?RGNVNUpoNWxJZXFURjVsR1VBY1dOakUyMXpJNkthb3dldElCcHh3Yk9FTEJZ?=
 =?utf-8?B?RG1SbVNyZWRRSnl6bkZRdEhuc2R1aU5lNS9PRmJKL21MK3JYSVFjSHJPdW5j?=
 =?utf-8?B?R000U0YwN1BnNW9PdzBCeWtaTTZZY3B1WEJONmlHb1Q3L1l6OVpldGcyL05p?=
 =?utf-8?B?KzZlUGY5UFhnR0hicVVhdTEwa3lobUUxVEJmczh6QUtnSklISjY4L3BSdWU2?=
 =?utf-8?B?U0RGMzZvL1JjYUUvQjJmVU84MS9xMzd5R2lLZTZIREg3MDNoVHlGR2l4eHly?=
 =?utf-8?B?UzlnVnM5amR3Z1VubE5nU2NqaE9rZHhPL1o4R2ZkaW81NU9CTjZXYVhaQUpi?=
 =?utf-8?B?b1liUjZnUlp1L0pJdi9GTjZMWHlwNk0rS3Q1LytBWXcvbTV4bWxUajlubEJV?=
 =?utf-8?B?SGNBWndzR1pUbzA5Wm94Z2lHNitIejdJMmI5cUM5MFFqL3hhM3g0aFN5c0R2?=
 =?utf-8?B?MS9iNGZKbC9lai9NR0xjb01xU0doZ0tlVC9LMUttOGVPcjhIajU2QUJrZTRZ?=
 =?utf-8?B?NUl1dU96VUJ0ZDU1YmNkSU5ZSWovZW10blNvVDZVbTc2NkI3NzEydkZPOTFo?=
 =?utf-8?B?UUtCN2dZZWRoMSthaHNrVlNJTHFCR0RXTERmR1dxOFJ1M29pMkRGMVhQTndm?=
 =?utf-8?B?c1luUFRkUWlBWk83SzhTUWhxS091MU9oeU13M1BqcmRoQ082bWFyUmhqRFUx?=
 =?utf-8?B?RlQrUEpzZ1BDbENGUHJNemtwUWlPMmp0em1ZMTZ5UUtYdjVKWGFwVEhxaWJX?=
 =?utf-8?B?Y2tQL0I3UDhJOXRhSzFzL2RpWWZQcFFId1h0ZlJNcS9iRldubVFXdFVNek1O?=
 =?utf-8?B?bGVNdTlENEhwam9Jd1VCb0ltUG9WRzNTbHNsbXpzQTJvNTdQVVJCNWVPckJa?=
 =?utf-8?B?TUw1OVZIZzZGU01ZQmxocURuMUtPRFVaQUFFWG1BbHFUVXM3MXVsK3ZwMlFW?=
 =?utf-8?B?dldsc0N1eGNNZkNlSG9Md0RDa3dYcDhydjUvbmFiRFMvbzBwaDdRTklMT3hC?=
 =?utf-8?B?SFl3VFFIOFFMV0VPcXNBb3I2Y1pMKzNzcUI3MzdtM2V0dW5ub3NNb3VnOWZZ?=
 =?utf-8?B?RWNvNkFGRjFReXNBVlQySGQva0xrYUd5RHJTVmNHdmdXdUw1RDdxUlVLck9l?=
 =?utf-8?B?ZEpMUllFTnNsTlNzOVJBVjV2L2dDTTRsWW56U2Q5eXRUcFNwS1pvc3lKanJR?=
 =?utf-8?B?QXErTG9YZ09mOUQ5SUFTYnZoaXhpcjk1UFBZUGMrQ0FIU0Q2dkVxTXZ6SklY?=
 =?utf-8?B?dCtyWVlyUHh0S2VWaUo4MlV0YmwwWHNJT2NrelIzY2hVbEpYZ1ltaXVvdGJr?=
 =?utf-8?B?RTZFMDVsSG5QcGViOG1vNEZ3YzBtN2t6cFBCQ3J0T3hFYTRmeVZLYXhkTGp5?=
 =?utf-8?B?bkhPLzVwNExUenc2VmcrMElkeWNSWXg2ZTBmWEpDWlR0MHNDTEVYanp1d0Iv?=
 =?utf-8?B?ZjlSNHZXa0Ntd0F6NlovMlNKZEEzRFMxcFNDNmNyTEZvNSt1eVhWajd3SHVt?=
 =?utf-8?B?TVo4NXdVTzQ4bDFUOHgzS25KOFRoNmM3UU00L0hCNFRqOER6MzdzVkJSeWd4?=
 =?utf-8?B?UkRxQTRONUEyVkpkTnZEMHpyemdIY2tXU1JjaTZGQjNKd1JlRzVsanM4ckQx?=
 =?utf-8?B?ek00djFueFhobEE4OGF0K2Z4QW9OVllLMVpGNXpieUNPaVo3M0dVMDloK216?=
 =?utf-8?B?MjdJQTBQaVRnPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 5a382f01-07e3-4942-198f-08da081d22f2
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 13:50:46.1898
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: G6vYb9YPdLYPVWXBWgkPqS/jxf1fTWWyfNyA57bGjvfxdB/0sfe8Nf1ZT8GikV19KgE004gf07c0O4v0BuOUGw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR03MB4967
X-OriginatorOrg: citrix.com

On Thu, Mar 17, 2022 at 02:26:50PM +0100, Jan Beulich wrote:
> On 17.03.2022 12:08, Roger Pau Monne wrote:
> > Track whether symbols belong to ignored sections in order to avoid
> > applying relocations referencing those symbols. The address of such
> > symbols won't be resolved and thus the relocation will likely fail or
> > write garbage to the destination.
> > 
> > Return an error in that case, as leaving unresolved relocations would
> > lead to malfunctioning payload code.
> > 
> > Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
> 
> Reviewed-by: Jan Beulich <jbeulich@suse.com>
> with one nit (which can likely be addressed while committing):
> 
> > --- a/xen/arch/arm/arm32/livepatch.c
> > +++ b/xen/arch/arm/arm32/livepatch.c
> > @@ -272,6 +272,13 @@ int arch_livepatch_perform(struct livepatch_elf *elf,
> >                     elf->name, symndx);
> >              return -EINVAL;
> >          }
> > +        else if ( elf->sym[symndx].ignored )
> > +        {
> > +            printk(XENLOG_ERR LIVEPATCH
> > +                    "%s: Relocation against ignored symbol %s cannot be resolved\n",
> > +                    elf->name, elf->sym[symndx].name);
> 
> Indentation here (and in the other two instances mirroring this)
> is off by one.

Oh, thanks, sorry for not noticing.

Roger.


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 13:56:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 13:56:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291579.494958 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUqbw-0007D4-6E; Thu, 17 Mar 2022 13:56:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291579.494958; Thu, 17 Mar 2022 13:56:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUqbw-0007Cx-2n; Thu, 17 Mar 2022 13:56:16 +0000
Received: by outflank-mailman (input) for mailman id 291579;
 Thu, 17 Mar 2022 13:56:14 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RBlk=T4=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nUqbu-0007Cr-Rk
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 13:56:14 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 01e2679f-a5fa-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 14:56:13 +0100 (CET)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur02lp2053.outbound.protection.outlook.com [104.47.4.53]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-40-kqie5FRcONSdO8aLJ7F-Sg-1; Thu, 17 Mar 2022 14:56:11 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by PAXPR04MB9219.eurprd04.prod.outlook.com (2603:10a6:102:222::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Thu, 17 Mar
 2022 13:56:10 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d%9]) with mapi id 15.20.5081.017; Thu, 17 Mar 2022
 13:56:10 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 01e2679f-a5fa-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647525373;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=H42I1FnvSYPHFjU9zWsT4UaO8HPkcD+fx7AddMMXOGE=;
	b=PiaQinosNSTQcHYaN3lJ2J3avHEXPJbDs450WyxnWnbA7hZR6d1XRm1nXZtxE4/F6tGCLM
	U7akWRwaaUDgNFynnIr2ZFBJqLpKxzEzQFdfwMvHJtlkUMhmpZFivHTSjF8Q19lYwD2Doq
	xIjhBziwlpFrGl0opDaKdvnMvvYHqxU=
X-MC-Unique: kqie5FRcONSdO8aLJ7F-Sg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Nb/0P9jav0SNvp284toqMukkGHdt+ZXXhEHSqVrXdluAkVSQJRELhVVTcDqMlBf9wjns5XM4SDN89+1JpjueoZaTGV+a0nt/62zv/bSq+0P3uszD9FYRnldey06EmlQ179Z35lRDg/lGKN+slt3zmWbDf9JAdGbLgps0s7QOEZilPQGuUJErhoGA+WLtvQoiETkHy/uDFCLtJWU/Hlpvt91vuIC1DXsMozIbVzI7+Sppej+WjhlPa5iLxoMi35rBlg8oPWJ0EkfPzJ7FE7kAtnd/3NczrVYi5sh61R+kAL4HOsh7OskGc34SPXM6o6rtitUsXHZVBece7HHbL+smMQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=H42I1FnvSYPHFjU9zWsT4UaO8HPkcD+fx7AddMMXOGE=;
 b=baMPr43+zMjVEOd4zgJ6z3EIXMEXC4bWP4pmOMHJczby03vGacg9hiWtrWfzAvQ9fZk/L07GhO9btEAPCZTYfsERXJwu5m4m8el8Yz4E4xzrwuQ+u/gcdVLMVS9539HTPwv+2Js/hnpSj4+LN1hzKzQTOdPSCgLs3cOVy9x6Gv4mi9GnUiHQnYPfh7uMpC7CzfE1NmtkfM8Bo54TnvSeakrbgoYxFwae1IsvoUnF8HhuR1XFihMfQnQ6IV4ep/h6qnKvvXTejBXll9cIOpkcdflbjJyZ0nAxmxGTpbxyLwWnZdg3O/WBrYh8nl9jLFH76SDrj7+jTt2038RFfYT4OA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <28f869eb-c6f0-cc67-8d29-9751447d2ad3@suse.com>
Date: Thu, 17 Mar 2022 14:56:07 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] x86/hvm: Include interruptibility state in hvm_hw_cpu
Content-Language: en-US
To: Tamas K Lengyel <tamas.lengyel@intel.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>, Wei Liu
 <wl@xen.org>, Jun Nakajima <jun.nakajima@intel.com>,
 Kevin Tian <kevin.tian@intel.com>, xen-devel@lists.xenproject.org
References: <05d0a5b5c18d667a5527e6f834347f54a10309da.1646937728.git.tamas.lengyel@intel.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <05d0a5b5c18d667a5527e6f834347f54a10309da.1646937728.git.tamas.lengyel@intel.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8P251CA0009.EURP251.PROD.OUTLOOK.COM
 (2603:10a6:20b:2f2::34) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 293e60e3-31b8-4bf4-a4a6-08da081de449
X-MS-TrafficTypeDiagnostic: PAXPR04MB9219:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB9219EFD88EE20E14E0906133B3129@PAXPR04MB9219.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66556008)(66946007)(66476007)(508600001)(4326008)(31696002)(8676002)(6512007)(86362001)(2616005)(38100700002)(6666004)(36756003)(53546011)(6506007)(6486002)(54906003)(6916009)(316002)(26005)(5660300002)(83380400001)(8936002)(186003)(31686004)(2906002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?dlN2dndUNFBLbTBNYzhNdE9jWmFLRDRvZDFqWjJHRTVycm5VNjdEK1YzVFhT?=
 =?utf-8?B?a0kvVVZFRFlYTjVZbWxQSTlnZTZEb2ZGUmpPdHByMGNNMGNZTEVvbEpEdGls?=
 =?utf-8?B?Z1pOa3hwa0QvK2I4WDJtd21VRFFMS1Flc3N4djZuUUEraEVMS2JGOTZCYWRs?=
 =?utf-8?B?OUZwcmR5Q2F3SmhTVDhoNGNMaExOUVZlenpHVXN2Z0VSUjlMSHpEaTZWM3pV?=
 =?utf-8?B?ODU1akdFK0l0c082ZFhTeVNzK2dnVEIvT3hZWTFUSVhxUXFhMWNCZnpjTUxz?=
 =?utf-8?B?MTBtcVlzQVoyWHpvcWNrZkVNd05DMDk4cjErZFYxaVJ1bEovZUtkTktNdmph?=
 =?utf-8?B?SEMyTjJzZ3hNd1FwT3RjV0VGSGNVS3N0ZkFhZHpTK3NyZWhabERxa3d0VStZ?=
 =?utf-8?B?YWZzN2xjbk5sRVlsU0pxaWlNREhtQmszbSs5WllzS0FNQzNnakhLRE1PRXh0?=
 =?utf-8?B?aXM3eUl2T0VHbUZpYzFqR083b1hxR3lOb3FOU0pLMGFnd3dHdmx2TDdjSmVp?=
 =?utf-8?B?UWZsVThVVGxVZmx0dU1Cd2JrOVIrbFVyU0JTdmhWNDBXUE9zaW9aeXdoT3No?=
 =?utf-8?B?THZXa1BtRnJmdURjRzU3d09QZWVXbmE2NXZBUXIrUzNZRlBaSjVzbHZxZVIr?=
 =?utf-8?B?Q1RndGU0ODYwdmNxK0ptbjdXSzhpeC9MQWVWRUpVemEwYVBrUWxHVTNWSEMx?=
 =?utf-8?B?VkpsUWtLM0FHNFE0RUlFNjVmWllDYnVVWEhaelRva01kRytjZnk2M09KWGY2?=
 =?utf-8?B?QmNqUU5SNDlxelJvSjFNTFU4bkUyR3FKaHhXK2VOT0ZmVWtJanFWT251cGhJ?=
 =?utf-8?B?VWY0ckpZVXFCckp4TU9zdkhSR3dBQ2JhbUdBdi9JNjhacExkK2owVkVMdTFz?=
 =?utf-8?B?VzBNeW42L1J5dHFsTnFDNnhuMUhGQmR3UmFVTzZWMzZFNjlTQzBQTlRpK3pp?=
 =?utf-8?B?RlU3N1Y4dlhYWFlDcHEzcHk3azVFZWl0RDQ2d0FRbEpCdjh4YkZTZ3VQMjlE?=
 =?utf-8?B?UW82emMvVm9oM25RdTFuRVcrUE5tRmpDRzAxa0t2VGR6c2VwL1dwRW9rV0Mv?=
 =?utf-8?B?WEtHdUZueXIvNG1mNzBNbUFFRjlaZ29yVk9rRjExRWlQWGNUNnYzUm13K3F4?=
 =?utf-8?B?aDFaT2dFQTZkN3J0dWdUejJpdis0OVQzVDBEWGM4elN2NWpCYXpVMVROVU9o?=
 =?utf-8?B?WnJxcEpscmQvVDZPMDBQbmxuNEZ2OWhCcHR3WWpPSXpvNHhkRWJRNXcwc2ZX?=
 =?utf-8?B?d2Z5L1EycTBnZkNJYzdRRjJiSldCNHpuNTZLOWtWTXNNcGVaaDd3UWUyc013?=
 =?utf-8?B?SkdSd0s4a1J6ckMybWhEQTd2dnlZUVlqQi8xODdDaXFXL3lJTXBSWDBXRkZr?=
 =?utf-8?B?V0xhbEJoVC93cHNkQ2FrVTBiMmRpbTAyRk0vVi9mMWtSa3V0Z1czcVdlc3RV?=
 =?utf-8?B?THljSS96d0hQSVlWOHhOTENZQWtkSitmcW5WODV3aEh5WXNJSWZBSW5zRzF3?=
 =?utf-8?B?eVlGcUlzdWt0aGpKNkI3amdkMGE4Z0pKUW50Y1ovb1RjVmZCN1ZwbHczY1o3?=
 =?utf-8?B?SEpUTkFaSWdhbDdOVHRGNE5TOFlpR2lSdFBRTGtveFZ5RnAwM1VLQkw4TXFU?=
 =?utf-8?B?Yi81Mjc0MmF5K2tiTTlKNllVUkRKVFZhV0NCdUg4R1JaV3c1TUlhdXhiajhk?=
 =?utf-8?B?SmhlL0JPTnQ4b1NYZG51cDFhdGNZc1VMT2lyVzc1QlVKd2Zob3ZBYU55Y0h1?=
 =?utf-8?B?azBhYnV0ZnlHdmlsUXRacis3S2NxREprSUtHaCs1SUFlR1ZVOW9pQmlYNDFT?=
 =?utf-8?B?V0FDWDh4YWxpNzJITHljSnFWYTJKQy9tL25BTHpaSXRVWmNyOWsvMjVkUkFI?=
 =?utf-8?B?cXAvc016ZEYwS3dsT3ZVWGFoYXZNUG5SZ3NMNHRPd1BkT1NGVzQ1aXRtTUNK?=
 =?utf-8?Q?VN+AYrCsvshrzw8+ujNSOB3OrBLxUGbq?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 293e60e3-31b8-4bf4-a4a6-08da081de449
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 13:56:10.4846
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: v8UVVxarPreIcj8WJgRwKI3jp0tM1UFQOJIfK5GRK+rBknxJX08QEr4G9UeB/HvLpX34vd/26+jwyPFGLMiV2g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB9219

On 10.03.2022 19:44, Tamas K Lengyel wrote:
> During VM fork resetting a failed vmentry has been observed when the reset
> is performed immediately after a STI instruction executed. This is due to
> the guest interruptibility state in the VMCS being modified by STI but the
> subsequent reset removes the IF bit from FLAGS, causing the failed vmentry.

I first thought this was backwards, but after re-reading a couple of
times I think the issue is merely with you stating this as if this
was what always happens, while it really depends on the state that
the VM is being reset to. I think it would further be helpful if you
made clear that other interruptibility state could also cause issues
when not properly restored. One way to express this would be to
simply insert "e.g." ahead of "a STI instruction".

> @@ -1155,6 +1154,8 @@ static int cf_check hvm_load_cpu_ctxt(struct domain *d, hvm_domain_context_t *h)
>      v->arch.dr6   = ctxt.dr6;
>      v->arch.dr7   = ctxt.dr7;
>  
> +    hvm_set_interrupt_shadow(v, ctxt.interruptibility_info);

Setting reserved bits as well as certain combinations of bits will
cause VM entry to fail. I think it would be nice to report this as
an error here rather than waiting for the VM entry failure.

> --- a/xen/arch/x86/include/asm/hvm/hvm.h
> +++ b/xen/arch/x86/include/asm/hvm/hvm.h
> @@ -720,6 +720,22 @@ static inline int hvm_vmtrace_reset(struct vcpu *v)
>      return -EOPNOTSUPP;
>  }
>  
> +static inline unsigned long hvm_get_interrupt_shadow(struct vcpu *v)

unsigned long here and ...

> +{
> +    if ( hvm_funcs.get_interrupt_shadow )
> +        return alternative_call(hvm_funcs.get_interrupt_shadow, v);
> +
> +    return -EOPNOTSUPP;
> +}
> +
> +static inline void
> +hvm_set_interrupt_shadow(struct vcpu *v, unsigned long val)

... here are not in line with the hooks' types. Same for the stubs
further down then.

> +{
> +    if ( hvm_funcs.set_interrupt_shadow )
> +        alternative_vcall(hvm_funcs.set_interrupt_shadow, v, val);
> +}
> +
> +
>  /*

Please don't insert multiple successive blank lines.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 14:00:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 14:00:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291584.494969 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUqg9-0000Im-Tl; Thu, 17 Mar 2022 14:00:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291584.494969; Thu, 17 Mar 2022 14:00:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUqg9-0000If-QD; Thu, 17 Mar 2022 14:00:37 +0000
Received: by outflank-mailman (input) for mailman id 291584;
 Thu, 17 Mar 2022 14:00:36 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=hAZZ=T4=citrix.com=prvs=068f51ced=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nUqg8-0000IZ-J2
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 14:00:36 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 9c9ac977-a5fa-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 15:00:35 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9c9ac977-a5fa-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647525635;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=eGgiwjSdFnXMpx1fH9IxZVdLpg2wRThgHIiNSW6D59Y=;
  b=YdUWGmUb7zI/zMznb22OXxYjELjnS41xJ+NecRQ3lPqHwzJmIAge97be
   QZcnC6eYA+/o0XV8GrgJyO/nO+/BMafbI7oOFgfO3vm2kENESLoCvWM8b
   m7JSDFhLvTZkEuTqR/pFJ1cTUS67Nw7i2OZF0OPdKh9E/XKBa20QTh9ty
   w=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 68871149
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:JqYG56AvIpWNkBVW/z3jw5YqxClBgxIJ4kV8jS/XYbTApGxz0TFRz
 WoeCG2BPf6KYWf8e4p2boi+8xxUvpPSydBmQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vg3dYy6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPh99
 +dvjL6eZzwbL/OQwv8ibBdBPiNXaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguwKKsXxMZxZkXZn1TzDVt4tQIzZQrWM7thdtNs1rp4eTamHP
 pZIAdZpRCjOcxx2H3dUNLYVuMu3jyLnNGJ89mvA8MLb5ECMlVcsgdABKuH9eduMX8xZ2FmZo
 mHu+H7wCRUXcteYzFKt4n+qw+PCgy7/cIYTD6GjsO5nhkWJwW4eAwFQUkG0ycRVkWbnBYgZc
 RZNvHNz8+5iryRHU+URQTW0n0ymhzwydeFiArNmshqy9aTNzgSwUz1soiF6VPQqs8o/RDoP3
 1CPns/0CTEHjIB5WU5x5Z/P82rsZHF9wXsqIHZdEFBbu4WLTJQb1Eqnczp1LEKiYjQZ8xnUy
 ivCkiUxjq57YSUjh/TipgCvb95BS/H0ou8JCuf/AzrNAuBRPtfNi2mUBb7zt6oowGGxFAXpg
 ZT8s5LChN3i9LnU/MB3fM0DHauy+9GOOyDGjFhkEvEJrmrxpCL+ItkKvmkheS+F1/ronxezP
 Cc/XisLuPdu0IaCN/crM+pd9ex3pUQfKTgVfq+NNYcfCnSAXASG4DtvdSatM5PFyyARfVUEE
 c7DK66EVC9CYYw+lWbeb7pNgNcDm3FlrUuOFM+T8vhS+efHDJJjYexeawXmgyFQxP7snTg5B
 P4EbprUkUoDCLOiCsQVmKZKRW03wbEALcmeg+Rcd/KZIxogH2ckCvTLxqgmdZAjlKNQ/tokN
 FnnBye0FHKXaaX7FDi3
IronPort-HdrOrdr: A9a23:Oy+TDqPibUerGMBcT2/155DYdb4zR+YMi2TDiHofdfUFSKClfp
 6V8cjzjSWE9Qr4WBkb6LW90DHpewKSyXcH2/hsAV7EZniphILIFvAv0WKG+VPd8kLFh5dgPM
 tbAstD4ZjLfCJHZKXBkUiF+rQbsaG6GcmT7I+0pRYMcegpUdAa0+4QMHfBLqQcfngjOXNNLu
 v72iMxnUvGRZ14VLXYOlA1G8z44/HbnpPvZhALQzQ97hOVsD+u4LnmVzCFwxY3SVp0sPcf2F
 mAtza8yrSosvm9xBOZ/XTU9Y5qlNzozcYGLNCQi/ISNi7nhm+TFcdcsvy5zXIISdOUmRIXee
 r30lAd1gNImjXsl1SO0F7QMs/boW8TAjHZuAelaDDY0LPErXoBerR8bMRiA0HkAgMbzaFBOO
 gg5RPpi7NHSRzHhyjz/N7OSlVjkVe1u2MrlaoJg2VYSpZ2Us4bkWUzxjIdLH47JlOz1GnnKp
 gbMOjMoPJNNV+KZXHQuWdihNSqQ3QoBx+DBkwPoNac3TRalG1wixJw/r1Tol4QsJYmD5VU7e
 XNNapl0LlIU88NdKp4QOMMW9G+BGDBSQ/FdGiSPVPkHqcaPG+lke+83JwloOWxPJAYxpo7n5
 rMFFteqG4pYkrrTdaD2ZVamyq9NllVnQ6dvf22y6IJyIEUHoCbQhFrYGpe5vednw==
X-IronPort-AV: E=Sophos;i="5.90,188,1643691600"; 
   d="scan'208";a="68871149"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=O+6zHQDs/Lmy+vY4jI4QtSrdT3sP7C3S8cPADXyvNCodkBVvE7Q6a6wD+JwVM5BjUtLQzxuwQKT3mPfX7CMPU7TZpXfiBLXQYA80XOOh/exrd4xwsICRNZRITsEwhN7YVlXtyrDV+c6A97xzPa3s+LssOMSx+GnSHzaJYfJRWNalvs5ibRsPM9wqZvI18m4DMWGkwQ2kXPXkfsDO62/wgmmt24e/wR7r5ZM/mM+8Z0w6gmCg37IfSo4gx8gVDXqPm2ZvC4jxsekEnPtvRhuJAkkiMgeJG55TVsBNvQiwtEKFvNfjS5UHhvmivuuSH8VJieH5WmuafLnh1PobAzrwPQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=eGgiwjSdFnXMpx1fH9IxZVdLpg2wRThgHIiNSW6D59Y=;
 b=TIqO84lpLJGGI2DWHKyuXmzDUUfyO+oSrLYHgZpLsRmyjyfDsRjXSG3fvD/9yBnz4E0GKUDBIVq3aXtkBrO7KIojI4ORHoURnbv6B0vyQ74wp1X3c538oxhDhvIgNi4jBllsDFOIdsDnWH8zETKk+Oz5ME/HH/AGttdeeTr//OxqvQv3TsyAwiVEJUaqaWpsIWvHILGAHk7tT08YX/qCyARo1hsiRSmJLROchJOiUuQa9F9gqqccMnhF89f2PjqMpA5uXFTOo28rSfOI+oNwyg0NCy0A2UWzbceV6K/WllQk0PFFg27fLilmIqhRd6e7KT5qn2qz+OuOdgLeBWEfww==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=eGgiwjSdFnXMpx1fH9IxZVdLpg2wRThgHIiNSW6D59Y=;
 b=eQJoFirgqsn2N/ebZhAaKPTq3DRz6Wz93aNTprr8r5ZZWeE9+pw1b0zlfCvN+x1RensbeC8TpDRnH2rRRpL3ka3jxoCXJqp4V9K5G2xZB64mTfciaNkfMK4EiAYvsbtuKVowuWkEjlbRINTblmSr9MPuwraiy6YXQElt6qqfjy4=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Roger Pau Monne <roger.pau@citrix.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>, Ross Lagerwall
	<ross.lagerwall@citrix.com>
Subject: Re: [PATCH 1/2] livepatch: do not ignore sections with 0 size
Thread-Topic: [PATCH 1/2] livepatch: do not ignore sections with 0 size
Thread-Index: AQHYOe+gjdXCu7EMK0+5Er/7E5QfQ6zDmssA
Date: Thu, 17 Mar 2022 14:00:19 +0000
Message-ID: <7443a703-6215-1b8f-a6c7-bab606ad016a@citrix.com>
References: <20220317110854.39050-1-roger.pau@citrix.com>
 <20220317110854.39050-2-roger.pau@citrix.com>
In-Reply-To: <20220317110854.39050-2-roger.pau@citrix.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 959d9bc9-3a9d-45c8-863c-08da081e78b5
x-ms-traffictypediagnostic: SN6PR03MB3773:EE_
x-microsoft-antispam-prvs: <SN6PR03MB37734BFFF253385F61572363BA129@SN6PR03MB3773.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BN7PR03MB3618.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(6512007)(53546011)(2616005)(6506007)(6486002)(508600001)(71200400001)(38100700002)(5660300002)(2906002)(4744005)(82960400001)(122000001)(31686004)(31696002)(316002)(38070700005)(110136005)(86362001)(54906003)(66476007)(8936002)(66446008)(64756008)(66556008)(8676002)(4326008)(66946007)(76116006)(91956017)(36756003)(107886003)(186003)(26005)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?R051OXZRZGRDU2trdEpYalRIcmF4RXgyQmhMZnJLMm9yQzlVRVp1eGFNbFZ1?=
 =?utf-8?B?YWdQY0lBWFd5ZTBHeThnL3JxVXJDQXRjajZZNFFXN0pvc1JZMlpoN0s5RlFN?=
 =?utf-8?B?b1QzZW5LZXFSaUZrT0pBOU93MVFNaE9ZaUgrUjhSRWxtMDB1bnpxT3dHSUph?=
 =?utf-8?B?UkdqU3Budm4wN09zRDBkeDhqcVB4V0xaaHZuMDVsY3o5S3dVRmdmb2Y1dlNT?=
 =?utf-8?B?a2IxQUZpYldPZDNXMkI5UnBVeDFDcDY3aytkdk5KR3l3THlwQVl0MlRGdDZV?=
 =?utf-8?B?UkdZWmZlMmJyVW9YRXZ0ZjZsUkFZRVlMYmtTbEN2NS9rTDVDcHR6WTVOZkVT?=
 =?utf-8?B?NFhNbFo2cFBhL3hKcCtnTzVtRnpyUHA4clNmRFFUSU9JNFgxNnBGTlBCL0lz?=
 =?utf-8?B?Z3VnREJLRmo4RHNOWFdUS2ZzNnF3ZDl0dktWUWV6dUhsSFRTd2xTQ0NYMHVl?=
 =?utf-8?B?NWlqZHlEYmR0UHZiZkdhYjFNRG9zTG1zQlBZdldjdk1idXo3T3ExZ0YxQXhP?=
 =?utf-8?B?K1hUZjJwZFVUU1o0THFJR3VBRHNwYUhkWVNCbVZwSVRtZDdTZ0ZqOFBGMnd5?=
 =?utf-8?B?anZDWVNKNk5scG11aXNJQUxhOVp2dkVtUGJUc2JJa2l3V3M1WUVJa2ZWQzR4?=
 =?utf-8?B?RUJOREFWbzUrVTJOc3NJWUd4SEw2Q2lZdWkyenFZa25sdVRoNzR3N2c0WUdu?=
 =?utf-8?B?SjZGZG1CTWFFSnQ0NDllUzN5ZklFU0xmV2g2WWxRQ2tQVDR4VVZncGZaTTVB?=
 =?utf-8?B?Q3lsTVByVjVyTUFDVzU4eThwSlg4VHcxVUo3aVY2bzBtblJZZGhJVTl4bkE3?=
 =?utf-8?B?NTJLWnFmaUNScHN1YVdlck1PeGZnd3A0L0VJaXFVWlgvcEo0OFBuMENqQi9S?=
 =?utf-8?B?SW9iUmwvcG4rcUJjYnVYMjA3MzBIYWhsRzVDdk5GSjBEVW5NQ1NZeDMyZzR3?=
 =?utf-8?B?K2k0dkJkZG55TmtpTmZEajVyZC9ad2dJUmRGNnBKUGVoZFBMVmg0bmgvRzRh?=
 =?utf-8?B?YTNRWkU3b09oMHdGR2hIU0x0Njlpd0JWVHV3SDdoUXZHMDlnRzNOc2Mvd3dQ?=
 =?utf-8?B?ejY2YU1JOEViSncrUW9oOFdscUdvZFhYRHlXem5TUTFrYnV1UXpQNHJ3a3ZC?=
 =?utf-8?B?QVo2STFLRDY2ak1LMXpWODAwS3djQWgybXg3NDdWNGlpeTlpMjlNWmFaWndr?=
 =?utf-8?B?MUFQckZMRXhQeXNySkgyTXQrVHhqWm1JZkNCeEhLbURyR04wVjFubmU5bWNC?=
 =?utf-8?B?Rmc3Qkppd1F5NEFITitUQWRRZWxicWk4QjZzbzdXNUVHMkRpbFRPcUtKRzMz?=
 =?utf-8?B?dEEycXdqaFNUQUtSQ2JlTStIallvMkRIYmtXYTBlejlXb1VaaFordHAxZEIv?=
 =?utf-8?B?emFIa3p6eFhGdThiaWVSNEdZNldBTURERkVCbEx0RnhXMEJ4TCtnd0hEcjRQ?=
 =?utf-8?B?NFlhVnVpcGg3RE9HTS9qZERYN3NzR25XcFlaSUxsVFAyMnh3WUI5STZrbGVN?=
 =?utf-8?B?S2FKYTdqblJlK2lGU2UwN25oVTl5NEFGMFE5UEVlbEtGN0lFajRlbWI3a1pH?=
 =?utf-8?B?WmpFaTE2d0pub2VWbjRoUjJlTndTSkozUmQ2U2pmNURVZ2tJeGhoU0d5S0pv?=
 =?utf-8?B?c0lrVFRldGtuYW9rSmRxMHpnczNReWZodlM1UHVVYnk5d0Q5azNmSU93Q0hU?=
 =?utf-8?B?cmJjZEJiZk9nVmxnVEp1dkwyd1hGN3FxMVN6V09VdWRvbUwzYVdCOFBFbnVW?=
 =?utf-8?B?NXh5TnhRZXhhRkh5V1l1QmczUzgzSmo2Vis1WDhTNkFhNTAxa3VhYkpzaXpM?=
 =?utf-8?B?UnUvZm9BNGtKNWpmKzZLQm1oRzlic1BuR1J0TWs0WW9DU3dlQ25ZcEx2SEJY?=
 =?utf-8?B?U1RjdlE3MjFSTDNEUmdXMFg1cXZZTXNUUUJHOGZHTTdCQnJlbzFzYlIxeEdM?=
 =?utf-8?Q?fvC874ECVqUINZDfpzfjhFFA8gfZf8fk?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <7E38FB8DD642CF4FBCC7733719D77222@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN7PR03MB3618.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 959d9bc9-3a9d-45c8-863c-08da081e78b5
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Mar 2022 14:00:19.2612
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: eUrwjeWgm7UBaJGyvP2PbYXzC5VWXKeCgezv++DhofZslGKEtH4iPNR1wBgLQPgnbPmlxSIA9oRAXM0KgD/2i2A4L6cGuVcQLtY567rGmYA=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR03MB3773
X-OriginatorOrg: citrix.com

T24gMTcvMDMvMjAyMiAxMTowOCwgUm9nZXIgUGF1IE1vbm5lIHdyb3RlOg0KPiBBIHNpZGUgZWZm
ZWN0IG9mIGlnbm9yaW5nIHN1Y2ggc2VjdGlvbnMgaXMgdGhhdCBzeW1ib2xzIGJlbG9uZ2luZyB0
bw0KPiB0aGVtIHdvbid0IGJlIHJlc29sdmVkLCBhbmQgdGhhdCBjb3VsZCBtYWtlIHJlbG9jYXRp
b25zIGJlbG9uZ2luZyB0bw0KPiBvdGhlciBzZWN0aW9ucyB0aGF0IHJlZmVyZW5jZSB0aG9zZSBz
eW1ib2xzIGZhaWwuDQo+DQo+IEZvciBleGFtcGxlIGl0J3MgbGlrZWx5IHRvIGhhdmUgYW4gZW1w
dHkgLmFsdGluc3RyX3JlcGxhY2VtZW50IHdpdGgNCj4gc3ltYm9scyBwb2ludGluZyB0byBpdCwg
YW5kIG1hcmtpbmcgdGhlIHNlY3Rpb24gYXMgaWdub3JlZCB3aWxsDQo+IHByZXZlbnQgdGhlIHN5
bWJvbHMgZnJvbSBiZWluZyByZXNvbHZlZCwgd2hpY2ggaW4gdHVybiB3aWxsIGNhdXNlIGFueQ0K
PiByZWxvY2F0aW9ucyBhZ2FpbnN0IHRoZW0gdG8gZmFpbC4NCg0KSSBhZ3JlZSB0aGlzIGlzIGEg
YnVnIGluIGxpdmVwYXRjaCBoYW5kbGluZywgYnV0IGl0J3MgYWxzbyBhbiBlcnJvciBpbg0KdGhl
IGdlbmVyYXRlZCBsaXZlcGF0Y2guwqAgV2Ugc2hvdWxkIG5vdCBoYXZlIHJlbG9jYXRpb25zIHRv
IGFuIGVtcHR5DQphbHRpbnN0cl9yZXBsYWNlbWVudCBzZWN0aW9uIGluIHRoZSBmaXJzdCBwbGFj
ZS4NCg0KVGhpcyB3aWxsIHByb2JhYmx5IGJlIGZyb20gdGhlIGxmZW5jZXMsIHdoZXJlIHRoZSBy
ZXBsYWNlbWVudCBpbiBhIG5vcA0KYW5kIHRha2VzIG5vIHNwYWNlLsKgIEkgdGhpbmsgSSBrbm93
IGhvdyB0byBmaXggdGhpcyBjYXNlLg0KDQp+QW5kcmV3DQo=


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 14:01:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 14:01:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291586.494979 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUqgZ-0000ka-4v; Thu, 17 Mar 2022 14:01:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291586.494979; Thu, 17 Mar 2022 14:01:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUqgZ-0000kT-21; Thu, 17 Mar 2022 14:01:03 +0000
Received: by outflank-mailman (input) for mailman id 291586;
 Thu, 17 Mar 2022 14:01:01 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=zfHd=T4=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nUqgX-0000IZ-EJ
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 14:01:01 +0000
Received: from NAM02-BN1-obe.outbound.protection.outlook.com
 (mail-bn1nam07on20624.outbound.protection.outlook.com
 [2a01:111:f400:7eb2::624])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ab980459-a5fa-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 15:00:59 +0100 (CET)
Received: from BN9PR03CA0210.namprd03.prod.outlook.com (2603:10b6:408:f9::35)
 by BL0PR02MB4610.namprd02.prod.outlook.com (2603:10b6:208:4b::30)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26; Thu, 17 Mar
 2022 14:00:52 +0000
Received: from BN1NAM02FT025.eop-nam02.prod.protection.outlook.com
 (2603:10b6:408:f9:cafe::39) by BN9PR03CA0210.outlook.office365.com
 (2603:10b6:408:f9::35) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17 via Frontend
 Transport; Thu, 17 Mar 2022 14:00:52 +0000
Received: from xir-pvapexch02.xlnx.xilinx.com (149.199.80.198) by
 BN1NAM02FT025.mail.protection.outlook.com (10.13.2.139) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5081.14 via Frontend Transport; Thu, 17 Mar 2022 14:00:52 +0000
Received: from xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) by
 xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Thu, 17 Mar 2022 14:00:51 +0000
Received: from smtp.xilinx.com (172.21.105.197) by
 xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Thu, 17 Mar 2022 14:00:51 +0000
Received: from [10.108.8.223] (port=9027 helo=xcbayankuma41x.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nUqgM-0004ME-Mi; Thu, 17 Mar 2022 14:00:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ab980459-a5fa-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=TtaIqCQZZfUnhsqN14FINFE7ENwkgUmrMLZCXGmMnEkGs/2KfHJnr/a7UHggUObSeuLr9hQ/rHj7Iic5K0YYnd4Ze5uaDEzOl3Gpsv8Sr/Xqn4CCI9KKVNB8ajyQE5r62Dlkbq2CgtIgqZv9TzVkICgzPURSdTJOlRRm4etLGaeDJG/LzcIguhntZu3Jkb42miau0bSVB6MNjLu6Dpp3cUBNXoRLiGuLQvshDiI3enh00FOT2V0mxwIMu/J/apZ18cP01IS3dja3JHWI0VViiHOYcBt+eK5sQ/W8WrEt/hkk9jvpGF25PRqoolXTjpX30u6R8+D2fDn/dBD8qMqaVA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=aXrU+SHMFUVKeGdJn+m6fiq82dkwxZek/EvuMvh/LkE=;
 b=VEOPdpa0UA/mqM1riSUiDJc36t3QfyFTNlnviuFrwXYDLGYQKSoSseHUH3OhD8Oo84gC2wlzPT/eTgldLVMoyWzm6KOSTi0uted1sO5WvKdxb6Cq4ne1qB7JUoqsuuMLhpzq5+hO0FpK6KxESVEz06l7D79D/+1OgXwCjhgkrt0jt7jiOtZsFzJ5YFw19wk8YjzDyr4DKXm4xVa4JhVwOXyqvS9F54eojhfRjUbiQfLqgm/AhaYOkkY8zHCSsw2N6rq+fowR+CihxOguJRkxJCKZ+lXw4r0Q4/6Ghel+I80EMkVcDLMS6ZnbPyqzV4CJ+nnB3gVUpxR+f97WrZ/ADA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=aXrU+SHMFUVKeGdJn+m6fiq82dkwxZek/EvuMvh/LkE=;
 b=liI1xv1ZvBnIS+CDlbmfOIniG6bpPib9a6SkRxKMpRvZQYMRqGsdJ9DKiy4aIYgY8SlW9FINCB41YQq1XtLJBuKVRhE+lT1Bwk0tc20iQM7kr3oNjOFUteMME3vBVQkpY9nrX3/Vx3e5RqQOmIYPe37EMpKI6b7Cq9yiLbmHsoc=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch02.xlnx.xilinx.com;
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <stefanos@xilinx.com>, <julien@xen.org>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>, Ayan Kumar Halder
	<ayankuma@xilinx.com>
Subject: [PATCH v11 0/3] xen/arm64: io: Decode ldr/str post-indexing instruction
Date: Thu, 17 Mar 2022 14:00:43 +0000
Message-ID: <20220317140046.64563-1-ayankuma@xilinx.com>
X-Mailer: git-send-email 2.17.1
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 8971e89f-997c-4fc5-7b20-08da081e8c8d
X-MS-TrafficTypeDiagnostic: BL0PR02MB4610:EE_
X-Microsoft-Antispam-PRVS:
	<BL0PR02MB46102B32BE61F0F536ADDD76B2129@BL0PR02MB4610.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch02.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(36756003)(6666004)(508600001)(8936002)(47076005)(83380400001)(7416002)(5660300002)(426003)(336012)(40460700003)(2906002)(82310400004)(186003)(26005)(4326008)(6916009)(9786002)(54906003)(70586007)(70206006)(316002)(2616005)(36860700001)(1076003)(7636003)(356005)(107886003)(7696005)(8676002)(102446001)(473944003);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 14:00:52.4751
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 8971e89f-997c-4fc5-7b20-08da081e8c8d
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch02.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	BN1NAM02FT025.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR02MB4610

Hi All,

The patch series continues with the support to decode instructions by Xen when
ISS is invalid. Currently, when the guest executes post indexing ldr/str instructions
on emulated MMIO, these instructions are trapped into Xen as a data abort.
Xen reads hsr_dabt.isv == 0, so ISS is invalid. Therefore, it reads the faulting
instruction's opcode from guest's PC. It decodes and executes the instruction on
the emulated region.

This is a continuation of the previous patch series "[XEN v10 0/4] xen/arm64: io:
Decode ldr/str post-indexing instruction". In the previous series, patches 2 and
3 had to be reverted as they cause a build break on x86 and boot failure on arm32.
Only patch 1 (ie "[XEN v10 1/4] xen/arm64: Decode ldr/str post increment operations"
was committed)

While doing the patch, we found two bugs in the codebase. I have addressed them
in patches 2 and 3. This was discussed with Julien on the IRC.

Ayan Kumar Halder (3):
  xen/arm64: io: Emulate instructions (with invalid ISS) on MMIO region
  xen/arm64: io: Handle the abort due to access to stage1 translation
    table
  xen/arm64: io: Handle data abort due to cache maintenance instructions

 xen/arch/arm/arm32/traps.c        |  12 +++
 xen/arch/arm/arm64/traps.c        |  52 +++++++++++++
 xen/arch/arm/decode.c             |   2 +
 xen/arch/arm/include/asm/domain.h |   4 +
 xen/arch/arm/include/asm/mmio.h   |  18 ++++-
 xen/arch/arm/include/asm/traps.h  |   2 +
 xen/arch/arm/io.c                 | 117 +++++++++++++++++++++---------
 xen/arch/arm/ioreq.c              |  15 +++-
 xen/arch/arm/traps.c              |  77 ++++++++++++++++----
 xen/arch/x86/include/asm/domain.h |   3 +
 xen/include/xen/sched.h           |   2 +
 11 files changed, 251 insertions(+), 53 deletions(-)

Changelog :-
v2 - 1. Updated the rn register after reading from it. (Pointed by Julien,
        Stefano)
     2. Used a union to represent the instruction opcode (Suggestd by Bertrand)
     3. Fixed coding style issues (Pointed by Julien)
     4. In the previous patch, I was updating dabt->sign based on the signedness
        of imm9. This was incorrect. As mentioned in ARMv8 ARM  DDI 0487G.b,
        Page 3221, SSE indicates the signedness of the data item loaded. In our
        case, the data item loaded is always unsigned.

v3- 1. Handled all the variants of ldr/str (ie 64, 32, 16, 8 bit variants).
       Thus, I have removed the check for "instr->code.opc == 0" (Suggested by
       Andre)
    2. Handled the scenario when rn = SP, rt = XZR (Suggested by Jan, Andre)
    3. Added restriction for "rt != rn" (Suggested by Andre)
    4. Moved union ldr_str_instr_class {} to decode.h. This is the header included
       by io.c and decode.c (where the union is referred). (Suggested by Jan)
    5. Indentation and typo fixes (Suggested by Jan)

v4- 1. Fixed the patch as per Stefano's comments on v3. They are as follows :-
        1.1 Use macros to determine the fixed values in the instruction opcode
        1.2 Checked if instr != NULL
        1.3 Changed some data types and added #define ARM_64 for AArch64 specific
            code
        1.4 Moved post_increment_register() to decode.c so that the decoding
            logic is confined to a single file.
        1.5 Moved some checks from post_increment_register() to
            decode_loadstore_postindexing()
        1.6 Removed a duplicate check
    2. Updated the commit message as per Andre's comments.
    3. Changed the names of a label and some comments. *32bit* was erroneously
       mentioned in a label and comments in decode_loadstore_postindexing()
       although the function handled all variants of ldr/str post indexing.

v5- 1. Renamed decode_loadstore_postindexing() to decode_arm64(). The reason
       being this will be extended in future to support more instructions for
       which hsr_badt.isv = 0
    2. Introduce a function try_decode_instruction_invalid_iss() to determine
       if the instruction needs to be decoded before invoking decode_instruction().

       It checks :-
       2.1  dabt->s1ptw - Returns IO_UNHANDLED
       2.2  dabt->cache - Returns IO_IGNORED. (new enum instroduced to let the
            caller know that the instruction needs to be ignored by Xen. Thus
            the caller needs to increment the PC and return to the guest.

    3. Invoked try_decode_instruction_invalid_iss() from the following 2 places :-
        3.a - try_handle_mmio() - When we have determined that there is a valid
              mmio handler.
        3.b - try_fwd_ioserv()
        When ioserver completes the io request, the acknowledgement is sent via
        handle_ioserv(). Here, we need to increment the register. As there is no
        common data shared between try_fwd_ioserv() and handle_ioserv(), we need
        to decode the instruction again in handle_ioserv() to determine rn, imm9.

        (NOTE to Reviewers) - This does not feel correct. However, I could not
        think of a better approach. Please provide your inputs.

    4. Augumented struct hsr_dabt{} with struct hsr_dabt_instr_details{} to hold
       rn and imm9. This is passed to post_increment_register() to update rn.
    5. Other style changes as suggested in v4.

v6 - 1. Split the patch into three parts.

v7 - 1. Merged patch2 and patch3 into a single patch.

v8 - 1. Changes mentioned in the individual patches.

v9 - 1. Added patches 3 and 4 to address the bugs found in the existing codebase.
     2. Changes mentioned in the individual patches.

v10 - 1. Changes mentioned in the individual patches.

v11 - 1. Patch 1/4 from v10 was committed. Thus, this series contains patches 2..4.
      2. Changes mentioned in the individual patches.

-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 14:01:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 14:01:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291587.494991 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUqga-00010f-EA; Thu, 17 Mar 2022 14:01:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291587.494991; Thu, 17 Mar 2022 14:01:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUqga-00010W-AO; Thu, 17 Mar 2022 14:01:04 +0000
Received: by outflank-mailman (input) for mailman id 291587;
 Thu, 17 Mar 2022 14:01:02 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=zfHd=T4=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nUqgY-0000hx-Dm
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 14:01:02 +0000
Received: from NAM12-BN8-obe.outbound.protection.outlook.com
 (mail-bn8nam12on2062f.outbound.protection.outlook.com
 [2a01:111:f400:fe5b::62f])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ad2eda1d-a5fa-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 15:01:01 +0100 (CET)
Received: from BN9PR03CA0176.namprd03.prod.outlook.com (2603:10b6:408:f4::31)
 by MN2PR02MB5888.namprd02.prod.outlook.com (2603:10b6:208:11b::11)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26; Thu, 17 Mar
 2022 14:00:57 +0000
Received: from BN1NAM02FT055.eop-nam02.prod.protection.outlook.com
 (2603:10b6:408:f4:cafe::be) by BN9PR03CA0176.outlook.office365.com
 (2603:10b6:408:f4::31) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.25 via Frontend
 Transport; Thu, 17 Mar 2022 14:00:57 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (149.199.80.198) by
 BN1NAM02FT055.mail.protection.outlook.com (10.13.2.163) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5081.14 via Frontend Transport; Thu, 17 Mar 2022 14:00:57 +0000
Received: from xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Thu, 17 Mar 2022 14:00:56 +0000
Received: from smtp.xilinx.com (172.21.105.197) by
 xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Thu, 17 Mar 2022 14:00:56 +0000
Received: from [10.108.8.223] (port=9027 helo=xcbayankuma41x.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nUqgS-0004ME-8e; Thu, 17 Mar 2022 14:00:56 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ad2eda1d-a5fa-11ec-853c-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=FGLPawwRjNjjxC9NG5py8snL69qROJLZn/APbDVdc+tzlnWPikvC5MysxYZq0OA2A3wEWnVGZpwRtLCujqiLWP22K5IgxBNnmRyJiQnfLcluIudmxLzwo3GulBuH1kJ9cMtEblohbrxtsHX58t5hHhr9DUmSf0XiEq9M/C9xLNalyJ1H1jXj6fATnVFUqIxaMh1RV+JoyvCBo2lt+GAYqmMun7eMLMJf0eU10cGk7mHhss8LkMioD+i1FsVSUkguf+muZ5/4LSYG2RpoJZ7uJpb/5+62Ak46W2DHMflXuoOi292TAbh67jQ/w5nJJBJUnZ8/mbtNwcli8NCMFREz5w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=8Mg1rcUV+64uiAhbrtzygMvcZnG6+I4jbMdmSaOC8CU=;
 b=mPRB2gF18RJbTz8krNWwka9tX6KLbWNxEHV1ipsXzil60lxcPsIq/g42RsxQhPjMhxTsIGUrCTKojiChT3fq5dbtzNXW2jPA8sKbm0+nj/MF0VtMl247VmmY3C4Ld+gDNgI9J0yzEo7+baFTRaw5usdnBaft2aFDcwzN9eNXjWH85lM7XDY8nYCO7mdA4yojCoi+JXoLrx4FyehPEw1N9O0i0tAUedM4EpVrdd7/dZbbHcsdwbLBiVcYgJlR05KdHDvhQs5domVffcyA0E+hafyzTDbgiL4bOirqZyXt1uu4kvNCn6m6RvfJ46m5rFTjUmwLZ6yk6JMvTJ2LHDKAoQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=8Mg1rcUV+64uiAhbrtzygMvcZnG6+I4jbMdmSaOC8CU=;
 b=A/2UasP48Krh1NB83lMkFGiveX5aov8+CXMqmRRO/71csGhUJZYlImDFc4Ej3IUEFWLp1tHY461noHty524R6JEKdRW3u6Uzwz1l+Nx0y7yfmNHVQbYBFRhMPagJuA38YWftgH2ZDENBFhsOLj54eBEQVZ8VvM2IHked8GCbZv0=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch01.xlnx.xilinx.com;
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <stefanos@xilinx.com>, <julien@xen.org>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>, Ayan Kumar Halder
	<ayankuma@xilinx.com>
Subject: [PATCH v11 2/3] xen/arm64: io: Handle the abort due to access to stage1 translation table
Date: Thu, 17 Mar 2022 14:00:45 +0000
Message-ID: <20220317140046.64563-3-ayankuma@xilinx.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220317140046.64563-1-ayankuma@xilinx.com>
References: <20220317140046.64563-1-ayankuma@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0908830e-a972-4f1a-63fa-08da081e8f7b
X-MS-TrafficTypeDiagnostic: MN2PR02MB5888:EE_
X-Microsoft-Antispam-PRVS:
	<MN2PR02MB588885562FD54B5B7BA8306BB2129@MN2PR02MB5888.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	FNgEwJlboksNuQiq8jkUVcqGBSkZICQ+oBKAPK8z5to3C/16lQPhHuqvcleNkzNDAY7d+SJRIPlvFv+uTYi6hrytICdawDK756DybL7OyPIbGZm9lQEtWb5yiWLX5voy7jxJfDYX+eYWPVX1dI/4pS0R56shZCMYs5tBxylPVdvzsG9HnbDdI2/abHaeYCMReO34LSQAQhCSIRX2UoYmm4oXpu2xoxF6hSq7L/spPDAgsHdFhTr+x9c2C+z6R90TjHU81R+hWolDz9LpgKCxRUIEjWY9pSNzWzxFAAWE8qIXrEn6BEBPJrsUiqIpX6Zm8PDo1Ta2Kh+FyEMHmD56A1EXQmEBX9xq7l7woMnQz+vvm/NR6Zc3WGFiGZJN406QFWm/fPrYoZdKoxl+I0RVhtfTbHzM5TgXIsRbuLta4yvpRuQG35WicNxBOh6CpbzbwIOyKIQ8bAi1I91N50ex+tEpsmDtC9HMLVOl4vCZBCiRXci0zlZeIQPUeLxkYwx8eH48m0qY3W89wylf1PBAc9xd5FkJY5ywBMrvIOoCtt/oSJ5AqQl/nGnVVwuRYrC0OjjHByDsjnsx2Cv3NMPqo+wtzRIcAQTYzcYqbT+4XA35YVgUNPswIckyt29RoO22AapK+SLd617LN3IkJC+aX064NSxnxFBsQo2h/afnQA4bJtbp02uzo6VzFWn8M7hzE2E5usqeOIt8Nn99aDh34w1DKTI4PZW3Sedovnl8pyA=
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch01.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(26005)(6916009)(186003)(316002)(70206006)(70586007)(1076003)(508600001)(336012)(426003)(4326008)(9786002)(8936002)(107886003)(36860700001)(6666004)(2616005)(54906003)(82310400004)(7696005)(2906002)(36756003)(5660300002)(7416002)(356005)(7636003)(8676002)(83380400001)(47076005)(40460700003)(102446001)(473944003);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 14:00:57.3897
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 0908830e-a972-4f1a-63fa-08da081e8f7b
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch01.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	BN1NAM02FT055.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR02MB5888

If the abort was caused due to access to stage1 translation table, Xen
will try to set the p2m entry (assuming that the Stage 1 translation
table is in a non MMIO region).
If there is no such entry found, then Xen will try to map the address as
a MMIO region (assuming that the Stage 1 translation table is in a
direct MMIO region).

If that fails as well, then there are the two following scenarios:-
1. Stage 1 translation table being in an emulated MMIO region - Xen
can read the region, but it has no way to return the value read to the
CPU page table walker (which tries to go through the stage1 tables to
resolve the translation fault).

2. Stage 1 translation table address is invalid.

In both the above scenarios, Xen will forward the abort to the guest.

Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
---

Changelog :-

v1..v8 - NA

v9 - 1. Extracted this change from "[XEN v8 2/2] xen/arm64: io: Support
instructions (for which ISS is not..." into a separate patch of its own.
The reason being this is an existing bug in the codebase.

v10 - 1. Enabled checking for stage1 translation table address in the
MMIO region. The reason being Arm Arm does not have any restrictions.
2. Updated the commit message to explain all the possible scenarios.

v11 - 1. Fixed some wordings in comments and commit message (pointed
by Julien in v10).

 xen/arch/arm/io.c | 11 +++++++++++
 1 file changed, 11 insertions(+)

diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
index fd903b7b03..6f458ee7fd 100644
--- a/xen/arch/arm/io.c
+++ b/xen/arch/arm/io.c
@@ -128,6 +128,17 @@ void try_decode_instruction(const struct cpu_user_regs *regs,
         return;
     }
 
+    /*
+     * At this point, we know that the stage1 translation table is either in an
+     * emulated MMIO region or its address is invalid . This is not expected by
+     * Xen and thus it forwards the abort to the guest.
+     */
+    if ( info->dabt.s1ptw )
+    {
+        info->dabt_instr.state = INSTR_ERROR;
+        return;
+    }
+
     /*
      * Armv8 processor does not provide a valid syndrome for decoding some
      * instructions. So in order to process these instructions, Xen must
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 14:01:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 14:01:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291588.494997 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUqga-00014l-QE; Thu, 17 Mar 2022 14:01:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291588.494997; Thu, 17 Mar 2022 14:01:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUqga-00014E-KM; Thu, 17 Mar 2022 14:01:04 +0000
Received: by outflank-mailman (input) for mailman id 291588;
 Thu, 17 Mar 2022 14:01:02 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=zfHd=T4=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nUqgY-0000IZ-EO
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 14:01:02 +0000
Received: from NAM10-MW2-obe.outbound.protection.outlook.com
 (mail-mw2nam10on2061c.outbound.protection.outlook.com
 [2a01:111:f400:7e89::61c])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ab88c616-a5fa-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 15:00:59 +0100 (CET)
Received: from BN9PR03CA0218.namprd03.prod.outlook.com (2603:10b6:408:f8::13)
 by BYAPR02MB4918.namprd02.prod.outlook.com (2603:10b6:a03:4e::10)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.16; Thu, 17 Mar
 2022 14:00:55 +0000
Received: from BN1NAM02FT036.eop-nam02.prod.protection.outlook.com
 (2603:10b6:408:f8:cafe::92) by BN9PR03CA0218.outlook.office365.com
 (2603:10b6:408:f8::13) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17 via Frontend
 Transport; Thu, 17 Mar 2022 14:00:55 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (149.199.80.198) by
 BN1NAM02FT036.mail.protection.outlook.com (10.13.2.147) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5081.14 via Frontend Transport; Thu, 17 Mar 2022 14:00:54 +0000
Received: from xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Thu, 17 Mar 2022 14:00:53 +0000
Received: from smtp.xilinx.com (172.21.105.197) by
 xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Thu, 17 Mar 2022 14:00:53 +0000
Received: from [10.108.8.223] (port=9027 helo=xcbayankuma41x.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nUqgP-0004ME-B6; Thu, 17 Mar 2022 14:00:53 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ab88c616-a5fa-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=BLwezl73/JiR4cRDxmeN2ioc+bX5IYpzVRfd7Zpjl511k8dwBQyAbwLHrAwl5FAJZQc4defp7zOC2wYArL7uIbx3vJVYLbCnfbI/OqQFitQE2GgNMyKvNCitTNpEI49O5/oZw0Hum4tZHt6OmwKusuGDxQpuTroUgEsK0bjD8gONj0MpuSS8MBk0Pdy0q9VXqkBHNhyJASD7NCqS2Qmgs9jnKF3x8cQEw+Cz1YsN8LZeSe0vVndhztKrFn5ShQJp2SNwq5pp7+Y2VvtjFqrq6U46rfCNOPd7M5WZOMFUxJTWJbMylUrnTpDSXskidkZWuUQY8m0bgEEl4UzKR5ScNw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=WQ4M7Ij0qo7bAAqaOpKsTdOvvZcEWP+6eT9yVLInx6A=;
 b=BRmxiQ0pibGlV6uTKEVpCu/BwMubojohmMFHm4RMc2D5SCrv1hzezZSx2EGc2dIo+j9L5gCfZYfr96pZ9QC8IA7Y/Bsr/LcAz959khO+Khh1Wf3/CMdotVYdk9FFB6Wzr/ZihQ9ckRLJggNen4jn306RG2DiQ6Oe5dv37ZLI4QJPBKdNbsbPrH3kRhLQXbTgcBd51JwCQ/6tgP4uOSzkcH44uz/b46C9w0+rXDc7B3EQk80DOOMdNw7/e7kC0FCcueV/M3IskUqquy7idqUMvCZEOZCjqlP830m3ACeZlLFMZQSWNAvQDN7k1NW1qGypJvGH3z8mfx+9hB+Ra0zY9g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=WQ4M7Ij0qo7bAAqaOpKsTdOvvZcEWP+6eT9yVLInx6A=;
 b=ZqGsgB6RACgaRa+Ee1CvMDJTdGr3ohsl7NcgsnfXb8z/NUTL8DCiTdI6Jgc5u/dJwXLT0XH5OpSd6KbY5Dbks4H51I/BdWxnHpxAsCEvfQiFO5ST1CpCXGhael77JdDByXk6odWQulB8+tCwdXtdXuivLzvRgZCibaD29nLUZrI=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch01.xlnx.xilinx.com;
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <stefanos@xilinx.com>, <julien@xen.org>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>, Ayan Kumar Halder
	<ayankuma@xilinx.com>
Subject: [PATCH v11 1/3] xen/arm64: io: Emulate instructions (with invalid ISS) on MMIO region
Date: Thu, 17 Mar 2022 14:00:44 +0000
Message-ID: <20220317140046.64563-2-ayankuma@xilinx.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220317140046.64563-1-ayankuma@xilinx.com>
References: <20220317140046.64563-1-ayankuma@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 720ec640-452c-46b9-2391-08da081e8dfe
X-MS-TrafficTypeDiagnostic: BYAPR02MB4918:EE_
X-Microsoft-Antispam-PRVS:
	<BYAPR02MB49188A77365E1F565233BC5AB2129@BYAPR02MB4918.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch01.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(2616005)(47076005)(26005)(316002)(2906002)(107886003)(70206006)(8676002)(36860700001)(36756003)(426003)(186003)(6916009)(336012)(54906003)(70586007)(82310400004)(356005)(4326008)(6666004)(83380400001)(30864003)(508600001)(7696005)(8936002)(1076003)(9786002)(40460700003)(7636003)(7416002)(5660300002)(102446001)(473944003);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 14:00:54.8911
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 720ec640-452c-46b9-2391-08da081e8dfe
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch01.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	BN1NAM02FT036.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR02MB4918

When an instruction is trapped in Xen due to translation fault, Xen
checks if the ISS is invalid (for data abort) or it is an instruction
abort. If so, Xen tries to resolve the translation fault using p2m page
tables. In case of data abort, Xen will try to map the mmio region to
the guest (ie tries to emulate the mmio region).

If the ISS is not valid and it is a data abort, then Xen tries to
decode the instruction. In case of ioreq, Xen  saves the decoding state,
rn and imm9 to vcpu_io. Whenever the vcpu handles the ioreq successfully,
it will read the decoding state to determine if the instruction decoded
was a ldr/str post indexing (ie INSTR_LDR_STR_POSTINDEXING). If so, it
uses these details to post increment rn.

In case of mmio handler, if the mmio operation was successful, then Xen
retrives the decoding state, rn and imm9. For state ==
INSTR_LDR_STR_POSTINDEXING, Xen will update rn.

If there is an error encountered while decoding/executing the instruction,
Xen will forward the abort to the guest.

Also, the logic to infer the type of instruction has been moved from
try_handle_mmio() to try_decode_instruction() which is called before.
try_handle_mmio() is solely responsible for handling the mmio operation.

Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
---

Changelog :-

v2..v5 - Mentioned in the cover letter.

v6 - 1. Mantained the decoding state of the instruction. This is used by the
caller to either abort the guest or retry or ignore or perform read/write on
the mmio region.

2. try_decode() invokes decoding for both aarch64 and thumb state. (Previously
it used to invoke decoding only for aarch64 state). Thus, it handles all the
checking of the registers before invoking any decoding of instruction.
try_decode_instruction_invalid_iss() has thus been removed.

3. Introduced a new field('enum instr_decode_state state') inside
'struct instr_details'. This holds the decoding state of the instruction.
This is later read by the post_increment_register() to determine if rn needs to
be incremented. Also, this is read by the callers of try_decode_instruction()
to determine if the instruction was valid or ignored or to be retried or
error or decoded successfully.

4. Also stored 'instr_details' inside 'struct ioreq'. This enables
arch_ioreq_complete_mmio() to invoke post_increment_register() without decoding
the instruction again.

5. Check hsr.dabt.valid in do_trap_stage2_abort_guest(). If it is not valid,
then decode the instruction. This ensures that try_handle_mmio() is invoked only
when the instruction is either valid or decoded successfully.

6. Inside do_trap_stage2_abort_guest(), if hsr.dabt.valid is not set, then
resolve the translation fault before trying to decode the instruction. If
translation fault is resolved, then return to the guest to execute the instruction
again.


v7 - 1. Moved the decoding instruction details ie instr_details from 'struct ioreq'
to 'struct vcpu_io'.

2. The instruction is decoded only when we get a data abort.

3. Replaced ASSERT_UNREACHABLE() with domain_crash(). The reason being asserts
can be disabled in some builds. In this scenario when the guest's cpsr is in an
erroneous state, Xen should crash the guest.

4. Introduced check_p2m() which invokes p2m_resolve_translation_fault() and
try_map_mmio() to resolve translation fault by configuring the page tables. This
gets invoked first if ISS is invalid and it is an instruction abort. If it is
a data abort and hsr.dabt.s1ptw is set or try_handle_mmio() returns IO_UNHANDLED,
then check_p2m() gets invoked again.


v8 - 1. Removed the handling of data abort when info->dabt.cache is set. This will
be implemented in a subsequent patch. (Not as part of this series)

2. When the data abort is due to access to stage 1 translation tables, Xen will
try to fix the mapping of the page table for the corresponding address. If this
returns an error, Xen will abort the guest. Else, it will ask the guest to retry
the instruction.

3. Changed v->io.info.dabt_instr from pointer to variable. The reason being that
arch_ioreq_complete_mmio() is called from leave_hypervisor_to_guest().
That is after do_trap_stage2_abort_guest()  has been invoked. So the original
variable will be no longer valid.

4. Some other style issues pointed out in v7.


v9 - 1. Ensure that "Erratum 766422" is handled only when ISS is valid.

2. Whenever Xen receives and instruction abort or data abort (with invalid ISS),
Xen should first try to resolve the p2m translation fault or see if it it needs
to map a MMIO region. If it succeeds, it should return to the guest to retry the
instruction.

3. Removed handling of "dabt.s1ptw == 1" aborts. This is addressed in patch3 as
it is an existing bug in codebase.

4. Various style issues pointed by Julien in v8.


v10 - 1. Set 'dabt.valid=1' when the instruction is fully decoded. This is
checked in try_handle_mmio() and try_fwd_ioserv().

2. Various other style issues pointed in v9.


v11 - 1. Renamed post_increment_register() to finalize_instr_emulation().

2. Moved "struct arch_vcpu_io { }" from xen/arch/x86/include/asm/ioreq.h to
xen/arch/x86/include/asm/domain.h as this is included in sched.h. This fixes the
build break for x86.

3. For arm32, check "( instr->state == INSTR_LDR_STR_POSTINDEXING )" before
calling domain_crash(). This fixes the boot failure for arm32.

4. Restricted the commit header to 80 chars.

 xen/arch/arm/arm32/traps.c        | 12 +++++
 xen/arch/arm/arm64/traps.c        | 52 ++++++++++++++++++
 xen/arch/arm/decode.c             |  2 +
 xen/arch/arm/include/asm/domain.h |  4 ++
 xen/arch/arm/include/asm/mmio.h   | 17 +++++-
 xen/arch/arm/include/asm/traps.h  |  2 +
 xen/arch/arm/io.c                 | 90 +++++++++++++++++++------------
 xen/arch/arm/ioreq.c              |  8 ++-
 xen/arch/arm/traps.c              | 77 ++++++++++++++++++++------
 xen/arch/x86/include/asm/domain.h |  3 ++
 xen/include/xen/sched.h           |  2 +
 11 files changed, 215 insertions(+), 54 deletions(-)

diff --git a/xen/arch/arm/arm32/traps.c b/xen/arch/arm/arm32/traps.c
index 9c9790a6d1..a4ce2b92d9 100644
--- a/xen/arch/arm/arm32/traps.c
+++ b/xen/arch/arm/arm32/traps.c
@@ -18,9 +18,11 @@
 
 #include <xen/lib.h>
 #include <xen/kernel.h>
+#include <xen/sched.h>
 
 #include <public/xen.h>
 
+#include <asm/mmio.h>
 #include <asm/processor.h>
 #include <asm/traps.h>
 
@@ -82,6 +84,16 @@ void do_trap_data_abort(struct cpu_user_regs *regs)
         do_unexpected_trap("Data Abort", regs);
 }
 
+void finalize_instr_emulation(const struct instr_details *instr)
+{
+    /*
+     * We have not implemented decoding of post indexing instructions for 32 bit.
+     * Thus, this should be unreachable.
+     */
+    if ( instr->state == INSTR_LDR_STR_POSTINDEXING )
+        domain_crash(current->domain);
+}
+
 /*
  * Local variables:
  * mode: C
diff --git a/xen/arch/arm/arm64/traps.c b/xen/arch/arm/arm64/traps.c
index 9113a15c7a..3f8858acec 100644
--- a/xen/arch/arm/arm64/traps.c
+++ b/xen/arch/arm/arm64/traps.c
@@ -17,6 +17,7 @@
  */
 
 #include <xen/lib.h>
+#include <xen/sched.h>
 
 #include <asm/hsr.h>
 #include <asm/system.h>
@@ -44,6 +45,57 @@ void do_bad_mode(struct cpu_user_regs *regs, int reason)
     panic("bad mode\n");
 }
 
+void finalize_instr_emulation(const struct instr_details *instr)
+{
+    struct cpu_user_regs *regs = guest_cpu_user_regs();
+    register_t val = 0;
+    uint8_t psr_mode = (regs->cpsr & PSR_MODE_MASK);
+
+    /* Currently, we handle only ldr/str post indexing instructions */
+    if ( instr->state != INSTR_LDR_STR_POSTINDEXING )
+        return;
+
+    /*
+     * Handle when rn = SP
+     * Refer ArmV8 ARM DDI 0487G.b, Page - D1-2463 "Stack pointer register
+     * selection"
+     * t = SP_EL0
+     * h = SP_ELx
+     * and M[3:0] (Page - C5-474 "When exception taken from AArch64 state:")
+     */
+    if ( instr->rn == 31 )
+    {
+        switch ( psr_mode )
+        {
+        case PSR_MODE_EL1h:
+            val = regs->sp_el1;
+            break;
+        case PSR_MODE_EL1t:
+        case PSR_MODE_EL0t:
+            val = regs->sp_el0;
+            break;
+
+        default:
+            domain_crash(current->domain);
+            return;
+        }
+    }
+    else
+        val = get_user_reg(regs, instr->rn);
+
+    val += instr->imm9;
+
+    if ( instr->rn == 31 )
+    {
+        if ( (regs->cpsr & PSR_MODE_MASK) == PSR_MODE_EL1h )
+            regs->sp_el1 = val;
+        else
+            regs->sp_el0 = val;
+    }
+    else
+        set_user_reg(regs, instr->rn, val);
+}
+
 /*
  * Local variables:
  * mode: C
diff --git a/xen/arch/arm/decode.c b/xen/arch/arm/decode.c
index 3add87e83a..f5f6562600 100644
--- a/xen/arch/arm/decode.c
+++ b/xen/arch/arm/decode.c
@@ -146,8 +146,10 @@ static int decode_arm64(register_t pc, mmio_info_t *info)
 
     update_dabt(dabt, opcode.ldr_str.rt, opcode.ldr_str.size, false);
 
+    dabt_instr->state = INSTR_LDR_STR_POSTINDEXING;
     dabt_instr->rn = opcode.ldr_str.rn;
     dabt_instr->imm9 = opcode.ldr_str.imm9;
+    dabt->valid = 1;
 
     return 0;
 
diff --git a/xen/arch/arm/include/asm/domain.h b/xen/arch/arm/include/asm/domain.h
index c56f6e4398..ed63c2b6f9 100644
--- a/xen/arch/arm/include/asm/domain.h
+++ b/xen/arch/arm/include/asm/domain.h
@@ -281,6 +281,10 @@ static inline void arch_vcpu_block(struct vcpu *v) {}
 /* vPCI is not available on Arm */
 #define has_vpci(d)    ({ (void)(d); false; })
 
+struct arch_vcpu_io {
+    struct instr_details dabt_instr; /* when the instruction is decoded */
+};
+
 #endif /* __ASM_DOMAIN_H__ */
 
 /*
diff --git a/xen/arch/arm/include/asm/mmio.h b/xen/arch/arm/include/asm/mmio.h
index 3354d9c635..ca259a79c2 100644
--- a/xen/arch/arm/include/asm/mmio.h
+++ b/xen/arch/arm/include/asm/mmio.h
@@ -26,12 +26,24 @@
 
 #define MAX_IO_HANDLER  16
 
+enum instr_decode_state
+{
+    INSTR_ERROR,                    /* Error encountered while decoding instr */
+    INSTR_VALID,                    /* ISS is valid, so no need to decode */
+    /*
+     * Instruction is decoded successfully. It is a ldr/str post indexing
+     * instruction.
+     */
+    INSTR_LDR_STR_POSTINDEXING,
+};
+
 typedef struct
 {
     struct hsr_dabt dabt;
     struct instr_details {
         unsigned long rn:5;
         signed int imm9:9;
+        enum instr_decode_state state;
     } dabt_instr;
     paddr_t gpa;
 } mmio_info_t;
@@ -69,14 +81,15 @@ struct vmmio {
 };
 
 enum io_state try_handle_mmio(struct cpu_user_regs *regs,
-                              const union hsr hsr,
-                              paddr_t gpa);
+                              mmio_info_t *info);
 void register_mmio_handler(struct domain *d,
                            const struct mmio_handler_ops *ops,
                            paddr_t addr, paddr_t size, void *priv);
 int domain_io_init(struct domain *d, int max_count);
 void domain_io_free(struct domain *d);
 
+void try_decode_instruction(const struct cpu_user_regs *regs,
+                            mmio_info_t *info);
 
 #endif  /* __ASM_ARM_MMIO_H__ */
 
diff --git a/xen/arch/arm/include/asm/traps.h b/xen/arch/arm/include/asm/traps.h
index 2ed2b85c6f..08bc0b484c 100644
--- a/xen/arch/arm/include/asm/traps.h
+++ b/xen/arch/arm/include/asm/traps.h
@@ -109,6 +109,8 @@ static inline register_t sign_extend(const struct hsr_dabt dabt, register_t r)
     return r;
 }
 
+void finalize_instr_emulation(const struct instr_details *instr);
+
 #endif /* __ASM_ARM_TRAPS__ */
 /*
  * Local variables:
diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
index fad103bdbd..fd903b7b03 100644
--- a/xen/arch/arm/io.c
+++ b/xen/arch/arm/io.c
@@ -102,57 +102,79 @@ static const struct mmio_handler *find_mmio_handler(struct domain *d,
     return handler;
 }
 
+void try_decode_instruction(const struct cpu_user_regs *regs,
+                            mmio_info_t *info)
+{
+    int rc;
+
+    if ( info->dabt.valid )
+    {
+        info->dabt_instr.state = INSTR_VALID;
+
+        /*
+         * Erratum 766422: Thumb store translation fault to Hypervisor may
+         * not have correct HSR Rt value.
+         */
+        if ( check_workaround_766422() && (regs->cpsr & PSR_THUMB) &&
+             info->dabt.write )
+        {
+            rc = decode_instruction(regs, info);
+            if ( rc )
+            {
+                gprintk(XENLOG_DEBUG, "Unable to decode instruction\n");
+                info->dabt_instr.state = INSTR_ERROR;
+            }
+        }
+        return;
+    }
+
+    /*
+     * Armv8 processor does not provide a valid syndrome for decoding some
+     * instructions. So in order to process these instructions, Xen must
+     * decode them.
+     */
+    rc = decode_instruction(regs, info);
+    if ( rc )
+    {
+        gprintk(XENLOG_ERR, "Unable to decode instruction\n");
+        info->dabt_instr.state = INSTR_ERROR;
+    }
+}
+
 enum io_state try_handle_mmio(struct cpu_user_regs *regs,
-                              const union hsr hsr,
-                              paddr_t gpa)
+                              mmio_info_t *info)
 {
     struct vcpu *v = current;
     const struct mmio_handler *handler = NULL;
-    const struct hsr_dabt dabt = hsr.dabt;
-    mmio_info_t info = {
-        .gpa = gpa,
-        .dabt = dabt
-    };
+    int rc;
 
-    ASSERT(hsr.ec == HSR_EC_DATA_ABORT_LOWER_EL);
+    ASSERT(info->dabt.ec == HSR_EC_DATA_ABORT_LOWER_EL);
 
-    handler = find_mmio_handler(v->domain, info.gpa);
-    if ( !handler )
+    if ( !info->dabt.valid )
     {
-        int rc;
+        ASSERT_UNREACHABLE();
+        return IO_ABORT;
+    }
 
-        rc = try_fwd_ioserv(regs, v, &info);
+    handler = find_mmio_handler(v->domain, info->gpa);
+    if ( !handler )
+    {
+        rc = try_fwd_ioserv(regs, v, info);
         if ( rc == IO_HANDLED )
             return handle_ioserv(regs, v);
 
         return rc;
     }
 
-    /* All the instructions used on emulated MMIO region should be valid */
-    if ( !dabt.valid )
-        return IO_ABORT;
-
     /*
-     * Erratum 766422: Thumb store translation fault to Hypervisor may
-     * not have correct HSR Rt value.
+     * At this point, we know that the instruction is either valid or has been
+     * decoded successfully. Thus, Xen should be allowed to execute the
+     * instruction on the emulated MMIO region.
      */
-    if ( check_workaround_766422() && (regs->cpsr & PSR_THUMB) &&
-         dabt.write )
-    {
-        int rc;
-
-        rc = decode_instruction(regs, &info);
-        if ( rc )
-        {
-            gprintk(XENLOG_DEBUG, "Unable to decode instruction\n");
-            return IO_ABORT;
-        }
-    }
-
-    if ( info.dabt.write )
-        return handle_write(handler, v, &info);
+    if ( info->dabt.write )
+        return handle_write(handler, v, info);
     else
-        return handle_read(handler, v, &info);
+        return handle_read(handler, v, info);
 }
 
 void register_mmio_handler(struct domain *d,
diff --git a/xen/arch/arm/ioreq.c b/xen/arch/arm/ioreq.c
index 308650b400..54167aebcb 100644
--- a/xen/arch/arm/ioreq.c
+++ b/xen/arch/arm/ioreq.c
@@ -47,6 +47,8 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
                              struct vcpu *v, mmio_info_t *info)
 {
     struct vcpu_io *vio = &v->io;
+    struct instr_details instr = info->dabt_instr;
+    struct hsr_dabt dabt = info->dabt;
     ioreq_t p = {
         .type = IOREQ_TYPE_COPY,
         .addr = info->gpa,
@@ -76,10 +78,10 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
     if ( !s )
         return IO_UNHANDLED;
 
-    if ( !info->dabt.valid )
-        return IO_ABORT;
+    ASSERT(dabt.valid);
 
     vio->req = p;
+    vio->info.dabt_instr = instr;
 
     rc = ioreq_send(s, &p, 0);
     if ( rc != IO_RETRY || v->domain->is_shutting_down )
@@ -95,6 +97,7 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
 bool arch_ioreq_complete_mmio(void)
 {
     struct vcpu *v = current;
+    struct instr_details dabt_instr = v->io.info.dabt_instr;
     struct cpu_user_regs *regs = guest_cpu_user_regs();
     const union hsr hsr = { .bits = regs->hsr };
 
@@ -106,6 +109,7 @@ bool arch_ioreq_complete_mmio(void)
 
     if ( handle_ioserv(regs, v) == IO_HANDLED )
     {
+        finalize_instr_emulation(&dabt_instr);
         advance_pc(regs, hsr);
         return true;
     }
diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
index 7a1b679b8c..11f970d926 100644
--- a/xen/arch/arm/traps.c
+++ b/xen/arch/arm/traps.c
@@ -1893,6 +1893,21 @@ static bool try_map_mmio(gfn_t gfn)
     return !map_regions_p2mt(d, gfn, 1, mfn, p2m_mmio_direct_c);
 }
 
+static inline bool check_p2m(bool is_data, paddr_t gpa)
+{
+    /*
+     * First check if the translation fault can be resolved by the P2M subsystem.
+     * If that's the case nothing else to do.
+     */
+    if ( p2m_resolve_translation_fault(current->domain , gaddr_to_gfn(gpa)) )
+        return true;
+
+    if ( is_data && try_map_mmio(gaddr_to_gfn(gpa)) )
+        return true;
+
+    return false;
+}
+
 static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
                                        const union hsr hsr)
 {
@@ -1906,6 +1921,8 @@ static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
     paddr_t gpa;
     uint8_t fsc = xabt.fsc & ~FSC_LL_MASK;
     bool is_data = (hsr.ec == HSR_EC_DATA_ABORT_LOWER_EL);
+    mmio_info_t info;
+    enum io_state state;
 
     /*
      * If this bit has been set, it means that this stage-2 abort is caused
@@ -1959,21 +1976,52 @@ static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
         return;
     }
     case FSC_FLT_TRANS:
+    {
+        info.gpa = gpa;
+        info.dabt = hsr.dabt;
+
         /*
-         * Attempt first to emulate the MMIO as the data abort will
-         * likely happen in an emulated region.
-         *
-         * Note that emulated region cannot be executed
+         * Assumption :- Most of the times when we get a data abort and the ISS
+         * is invalid or an instruction abort, the underlying cause is that the
+         * page tables have not been set up correctly.
          */
-        if ( is_data )
+        if ( !is_data || !info.dabt.valid )
         {
-            enum io_state state = try_handle_mmio(regs, hsr, gpa);
+            if ( check_p2m(is_data, gpa) )
+                return;
 
-            switch ( state )
-            {
+            /*
+             * If the instruction abort could not be resolved by setting the
+             * appropriate bits in the translation table, then Xen should
+             * forward the abort to the guest.
+             */
+            if ( !is_data )
+                goto inject_abt;
+        }
+
+        try_decode_instruction(regs, &info);
+
+        /*
+         * If Xen could not decode the instruction or encountered an error
+         * while decoding, then it should forward the abort to the guest.
+         */
+        if ( info.dabt_instr.state == INSTR_ERROR )
+            goto inject_abt;
+
+        state = try_handle_mmio(regs, &info);
+
+        switch ( state )
+        {
             case IO_ABORT:
                 goto inject_abt;
             case IO_HANDLED:
+                /*
+                 * If the instruction was decoded and has executed successfully
+                 * on the MMIO region, then Xen should execute the next part of
+                 * the instruction. (for eg increment the rn if it is a
+                 * post-indexing instruction.
+                 */
+                finalize_instr_emulation(&info.dabt_instr);
                 advance_pc(regs, hsr);
                 return;
             case IO_RETRY:
@@ -1982,21 +2030,18 @@ static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
             case IO_UNHANDLED:
                 /* IO unhandled, try another way to handle it. */
                 break;
-            }
         }
 
         /*
-         * First check if the translation fault can be resolved by the
-         * P2M subsystem. If that's the case nothing else to do.
+         * If the instruction syndrome was invalid, then we already checked if
+         * this was due to a P2M fault. So no point to check again as the result
+         * will be the same.
          */
-        if ( p2m_resolve_translation_fault(current->domain,
-                                           gaddr_to_gfn(gpa)) )
-            return;
-
-        if ( is_data && try_map_mmio(gaddr_to_gfn(gpa)) )
+        if ( (info.dabt_instr.state == INSTR_VALID) && check_p2m(is_data, gpa) )
             return;
 
         break;
+    }
     default:
         gprintk(XENLOG_WARNING,
                 "Unsupported FSC: HSR=%#"PRIregister" DFSC=%#x\n",
diff --git a/xen/arch/x86/include/asm/domain.h b/xen/arch/x86/include/asm/domain.h
index e62e109598..35898d725f 100644
--- a/xen/arch/x86/include/asm/domain.h
+++ b/xen/arch/x86/include/asm/domain.h
@@ -756,6 +756,9 @@ static inline void pv_inject_sw_interrupt(unsigned int vector)
                       : is_pv_32bit_domain(d) ? PV32_VM_ASSIST_MASK \
                                               : PV64_VM_ASSIST_MASK)
 
+struct arch_vcpu_io {
+};
+
 #endif /* __ASM_DOMAIN_H__ */
 
 /*
diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
index 10ea969c7a..406d9bc610 100644
--- a/xen/include/xen/sched.h
+++ b/xen/include/xen/sched.h
@@ -160,6 +160,8 @@ struct vcpu_io {
     /* I/O request in flight to device model. */
     enum vio_completion  completion;
     ioreq_t              req;
+    /* Arch specific info pertaining to the io request */
+    struct arch_vcpu_io  info;
 };
 
 struct vcpu
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 14:01:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 14:01:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291589.495013 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUqgg-0001d6-6U; Thu, 17 Mar 2022 14:01:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291589.495013; Thu, 17 Mar 2022 14:01:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUqgg-0001cw-37; Thu, 17 Mar 2022 14:01:10 +0000
Received: by outflank-mailman (input) for mailman id 291589;
 Thu, 17 Mar 2022 14:01:08 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=zfHd=T4=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nUqge-0000hx-AT
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 14:01:08 +0000
Received: from NAM04-DM6-obe.outbound.protection.outlook.com
 (mail-dm6nam08on20630.outbound.protection.outlook.com
 [2a01:111:f400:7e8b::630])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id b0520852-a5fa-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 15:01:07 +0100 (CET)
Received: from BN9P222CA0021.NAMP222.PROD.OUTLOOK.COM (2603:10b6:408:10c::26)
 by MW2PR02MB3721.namprd02.prod.outlook.com (2603:10b6:907:5::10) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Thu, 17 Mar
 2022 14:01:02 +0000
Received: from BN1NAM02FT023.eop-nam02.prod.protection.outlook.com
 (2603:10b6:408:10c:cafe::b8) by BN9P222CA0021.outlook.office365.com
 (2603:10b6:408:10c::26) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17 via Frontend
 Transport; Thu, 17 Mar 2022 14:01:01 +0000
Received: from xir-pvapexch02.xlnx.xilinx.com (149.199.80.198) by
 BN1NAM02FT023.mail.protection.outlook.com (10.13.2.137) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5081.14 via Frontend Transport; Thu, 17 Mar 2022 14:01:01 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) by
 xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Thu, 17 Mar 2022 14:01:00 +0000
Received: from smtp.xilinx.com (172.21.105.197) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Thu, 17 Mar 2022 14:01:00 +0000
Received: from [10.108.8.223] (port=9027 helo=xcbayankuma41x.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nUqgW-0004ME-Dj; Thu, 17 Mar 2022 14:01:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b0520852-a5fa-11ec-853c-5f4723681683
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=YNr5o6Jp307jTd7YaK84GFaDXVvV+7HiBoXgg32i0mmrvb0DH+PwYvtgI0KDzcOmWKJCM1Tx5d47pCKZ1/qlToKZ+9SIp28Cf2vvQBUQNgtWiJnfUFWlMEcj7/KB0DPhtSPgtOK0026a4TV/D/5+pl/7FKmKj3p5Ht9GeiiMtUeyc7L7bWix83cIVECxMozM8Xa/2MkO4cS9Jdqd9PW6aZdebT26ioeL6E8STcoZdgbfEGrCdaRe8QDKHwcrkO00aTQFNKOR4lzSp0ovdf0KUqPI1mgfgpXmW1Yi425GyiZsqbuW+DHaiwy63k3L6i7VnZsv+AjNYzLHuNyHQ7uZoQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=EuZSr4OnTkPqeU+88TbJg/rqeEcbd/7sbQO3H+wXl3w=;
 b=HPf1ERMLw2ynSQ7ho+LhqRrXmJ1A7I26gx30irVdIrNqjOSEohosG+rbnom79vGsl6rdzJ3z2GUv9Ks6Lr6CZJ+kE1v/mO0i7g+3EUEsnqhgMAlHTxJDGLyxJId5I41JjqMDvFx154Qo/NuujOPPInB5r/AI9BfX48OdFXWHO0q+fBL5o4KaLx1Ie5BXy8Hoo4SDZTVybg+arxzJ9gVRavtwnE9YcrE79dGkR0ANGvTcvCq5lpHzJTeIWQ8hZLw0FGVYxK7uoneG95TOGyJKAYtPPBfSYXSSlbpzPIbkshnkdsay2uaUl99C9WKBoIffgWZv2dFBvEckjkYDjWPX7g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=EuZSr4OnTkPqeU+88TbJg/rqeEcbd/7sbQO3H+wXl3w=;
 b=XBbWxIe7R7HT66LO2mem3MjIFYj2nmRLUDZ+iFQ2yAJL2BS1xjpCOJDB4M7X/N13IY6cFTapBlj03sK9k0KPxIyMa36qmE8oMwlsWodbyo9nCAA1OcUPDW7UhIjChruEfdV3IS9QJsvRjUoIk8QLjhdQzh7HfdTRQD0gZEuADOE=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch02.xlnx.xilinx.com;
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <stefanos@xilinx.com>, <julien@xen.org>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>, Ayan Kumar Halder
	<ayankuma@xilinx.com>
Subject: [PATCH v11 3/3] xen/arm64: io: Handle data abort due to cache maintenance instructions
Date: Thu, 17 Mar 2022 14:00:46 +0000
Message-ID: <20220317140046.64563-4-ayankuma@xilinx.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220317140046.64563-1-ayankuma@xilinx.com>
References: <20220317140046.64563-1-ayankuma@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 1f586b4e-0cfa-4b0b-6290-08da081e91ed
X-MS-TrafficTypeDiagnostic: MW2PR02MB3721:EE_
X-Microsoft-Antispam-PRVS:
	<MW2PR02MB3721EB414FFF2B9E9EC32925B2129@MW2PR02MB3721.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch02.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(36756003)(8676002)(5660300002)(4326008)(70586007)(6916009)(54906003)(47076005)(70206006)(316002)(2906002)(82310400004)(83380400001)(6666004)(508600001)(8936002)(7636003)(9786002)(26005)(186003)(7696005)(7416002)(2616005)(107886003)(40460700003)(356005)(36860700001)(336012)(426003)(1076003)(102446001);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 14:01:01.5078
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 1f586b4e-0cfa-4b0b-6290-08da081e91ed
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch02.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	BN1NAM02FT023.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW2PR02MB3721

When the data abort is caused due to cache maintenance for an address,
there are three scenarios:-

1. Address belonging to a non emulated region - For this, Xen should
set the corresponding bit in the translation table entry to valid and
return to the guest to retry the instruction. This can happen sometimes
as Xen need to set the translation table entry to invalid. (for eg
'Break-Before-Make' sequence). Xen returns to the guest to retry the
instruction.

2. Address belongs to an emulated region - Xen should ignore the
instruction (ie increment the PC) and return to the guest.

3. Address is invalid - Xen should forward the data abort to the guest.

Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
---

Changelog:-

v1...v8 - NA

v9 - Extracted this change from "[XEN v7 2/2] xen/arm64: io: Support
instructions (for which ISS is not ..." into a separate patch of its
own. The reason being this addresses an existing bug in the codebase.

v10 - 1. To check if the address belongs to an emulated region, one
needs to check if it has a mmio handler or an ioreq server. In this
case, Xen should increment the PC
2. If the address is invalid (niether emulated MMIO nor the translation
could be resolved via p2m or mapping the MMIO region), then Xen should
forward the abort to the guest.

v11 - 1. Removed the un-necessary check "( instr.state == INSTR_CACHE )"
in handle_ioserv(). The reason being the ioserv request is not forwarded
by try_fwd_ioserv() when instr.state == INSTR_CACHE.

 xen/arch/arm/include/asm/mmio.h |  1 +
 xen/arch/arm/io.c               | 18 ++++++++++++++++++
 xen/arch/arm/ioreq.c            |  9 ++++++++-
 3 files changed, 27 insertions(+), 1 deletion(-)

diff --git a/xen/arch/arm/include/asm/mmio.h b/xen/arch/arm/include/asm/mmio.h
index ca259a79c2..79e64d9af8 100644
--- a/xen/arch/arm/include/asm/mmio.h
+++ b/xen/arch/arm/include/asm/mmio.h
@@ -35,6 +35,7 @@ enum instr_decode_state
      * instruction.
      */
     INSTR_LDR_STR_POSTINDEXING,
+    INSTR_CACHE,                    /* Cache Maintenance instr */
 };
 
 typedef struct
diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
index 6f458ee7fd..26c716b4a5 100644
--- a/xen/arch/arm/io.c
+++ b/xen/arch/arm/io.c
@@ -139,6 +139,17 @@ void try_decode_instruction(const struct cpu_user_regs *regs,
         return;
     }
 
+    /*
+     * When the data abort is caused due to cache maintenance, Xen should check
+     * if the address belongs to an emulated MMIO region or not. The behavior
+     * will differ accordingly.
+     */
+    if ( info->dabt.cache )
+    {
+        info->dabt_instr.state = INSTR_CACHE;
+        return;
+    }
+
     /*
      * Armv8 processor does not provide a valid syndrome for decoding some
      * instructions. So in order to process these instructions, Xen must
@@ -177,6 +188,13 @@ enum io_state try_handle_mmio(struct cpu_user_regs *regs,
         return rc;
     }
 
+    /*
+     * When the data abort is caused due to cache maintenance and the address
+     * belongs to an emulated region, Xen should ignore this instruction.
+     */
+    if ( info->dabt_instr.state == INSTR_CACHE )
+        return IO_HANDLED;
+
     /*
      * At this point, we know that the instruction is either valid or has been
      * decoded successfully. Thus, Xen should be allowed to execute the
diff --git a/xen/arch/arm/ioreq.c b/xen/arch/arm/ioreq.c
index 54167aebcb..cc66713386 100644
--- a/xen/arch/arm/ioreq.c
+++ b/xen/arch/arm/ioreq.c
@@ -47,7 +47,7 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
                              struct vcpu *v, mmio_info_t *info)
 {
     struct vcpu_io *vio = &v->io;
-    struct instr_details instr = info->dabt_instr;
+    const struct instr_details instr = info->dabt_instr;
     struct hsr_dabt dabt = info->dabt;
     ioreq_t p = {
         .type = IOREQ_TYPE_COPY,
@@ -78,6 +78,13 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
     if ( !s )
         return IO_UNHANDLED;
 
+    /*
+     * When the data abort is caused due to cache maintenance and the address
+     * belongs to an emulated region, Xen should ignore this instruction.
+     */
+    if ( instr.state == INSTR_CACHE )
+        return IO_HANDLED;
+
     ASSERT(dabt.valid);
 
     vio->req = p;
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 14:03:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 14:03:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291603.495023 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUqio-0003Hq-Nr; Thu, 17 Mar 2022 14:03:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291603.495023; Thu, 17 Mar 2022 14:03:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUqio-0003Hj-K7; Thu, 17 Mar 2022 14:03:22 +0000
Received: by outflank-mailman (input) for mailman id 291603;
 Thu, 17 Mar 2022 14:03:21 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RBlk=T4=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nUqin-0003HX-97
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 14:03:21 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 00315bf9-a5fb-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 15:03:20 +0100 (CET)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2054.outbound.protection.outlook.com [104.47.14.54]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-37-75QynDaaPcWR8mt3aDsfSg-1; Thu, 17 Mar 2022 15:03:18 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM6PR04MB4214.eurprd04.prod.outlook.com (2603:10a6:209:41::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Thu, 17 Mar
 2022 14:03:17 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d%9]) with mapi id 15.20.5081.017; Thu, 17 Mar 2022
 14:03:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 00315bf9-a5fb-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647525799;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=IidUIM65uQbzncJG4NWU9/gqsTs3GkMdv089SkFiGS4=;
	b=hchEwpgauMfSZNJI4dTYxWGLwDYAA8uB/dNv4Va57bsO1G1HruERfIrvcubHDwW/uxHvTy
	JpY24tEKeSP/0gfGk+9oSU1U/D866hFNjPAXum2jtIcMWTC7LqYeCpmtHIePvpH/i/FZ64
	Uh6q52Oq/FxiuIiYdlpAeRDuAQvmpHs=
X-MC-Unique: 75QynDaaPcWR8mt3aDsfSg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=jcOQm4+9DGNRectS+0fOg9Ig/wvGqqMsqZCylLuir+uoDi4NqtHP7kBF6LObiIDPyykdGn4Tc0onl3XSa2vVUtt2d26yqPN4LP+eCROpSCghvlZEG0oLWvH4AvH4bQNZy+ReiEql7u0xB0UPGFEjxHoCRyy99M2wo5dHVu7sNTRaKdAN/C7S1XSglk5lNf1UknNjmOKqbto8mCl/9DJ3bt0M9glF1X3+Vwz9UVHDha8XQmbYwJ8Jfmq0eUkUxYQ3vZZ343GKm3KDfsr3U2Bv9PfTMUBEA/Nuuo4D4J7UFprQLGV32dFO122MOqSDwIWvsAM9wZV97PCrD54tNaJNCw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=IidUIM65uQbzncJG4NWU9/gqsTs3GkMdv089SkFiGS4=;
 b=bewmQ2B1zh7W58BtRkZyWpB6V5RqCdxm0CCgXpdjVGPdS+KbNJLMTa4idu7Z18nx18sYudyV3deMHFUFDDZxgU8hhqj/eBAi4GuET3L7oaiOrgyBNto+rLeQGSY3gjOkqdMYPfwUVBGcgTi1OedzR5YJzlNoPWCZ8yHAaZNWlHPZXsd4bh/nOuyFdGbNXrsW5BIKTtedHVd8SXRSMkOZ3egXv7mVpCsk5zSnP3DybfucRglM+ho41Yx2082iLt6X0VrDB8Uk69SzW9sZuBaYDfuiz+lSV1Xy3lrCCQ/kE2huyJli4vBxFtiXR/GoHO3QuybyVem7jyraHu13yVcIzg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <912a5b23-4f9c-b587-ed79-1d577ed6ef6e@suse.com>
Date: Thu, 17 Mar 2022 15:03:14 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] x86/hvm: Include interruptibility state in hvm_hw_cpu
Content-Language: en-US
To: Tamas K Lengyel <tamas.k.lengyel@gmail.com>
Cc: "Lengyel, Tamas" <tamas.lengyel@intel.com>,
 Xen-devel <xen-devel@lists.xenproject.org>,
 "Cooper, Andrew" <andrew.cooper3@citrix.com>,
 =?UTF-8?Q?Pau_Monn=c3=a9=2c_Roger?= <roger.pau@citrix.com>,
 Wei Liu <wl@xen.org>, "Nakajima, Jun" <jun.nakajima@intel.com>,
 "Tian, Kevin" <kevin.tian@intel.com>
References: <05d0a5b5c18d667a5527e6f834347f54a10309da.1646937728.git.tamas.lengyel@intel.com>
 <BN9PR11MB5276E96E39209EDCCED5E9198C0F9@BN9PR11MB5276.namprd11.prod.outlook.com>
 <CABfawhmZLyZdSbK0sr4t_WoYx6uYOV2bH89bX4ET0kzeQiY0-A@mail.gmail.com>
 <BN9PR11MB527623CD66F0F606BD0CF5F98C129@BN9PR11MB5276.namprd11.prod.outlook.com>
 <CABfawhnucaqR_RQd_XDKBUP=E_uRG7A6Xbo7dN8qj5wzAjyMZg@mail.gmail.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <CABfawhnucaqR_RQd_XDKBUP=E_uRG7A6Xbo7dN8qj5wzAjyMZg@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P191CA0017.EURP191.PROD.OUTLOOK.COM
 (2603:10a6:209:8b::30) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 8918c69c-5923-4718-0a13-08da081ee26c
X-MS-TrafficTypeDiagnostic: AM6PR04MB4214:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB4214E974248BBA17A7846D54B3129@AM6PR04MB4214.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(508600001)(54906003)(6486002)(31686004)(316002)(6512007)(6506007)(53546011)(36756003)(2616005)(6916009)(66946007)(8676002)(186003)(4326008)(66556008)(26005)(66476007)(31696002)(86362001)(8936002)(38100700002)(2906002)(4744005)(5660300002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?dU5mOXlwSmFZZW1PSnVSdGpOVlhhNk5rSDlsL0pSZWdZN3RjbWRTSlgvN0ZV?=
 =?utf-8?B?MFN2eUUybUxmT3VBTEtlZjBnN0xudyt2ZXFGL0t1N2w3bmtFUlVZN1RvTVZB?=
 =?utf-8?B?UmxIYmZFK3IwanZDdCttaXVNZGJ1Yzl6ZnI2dGFObjhnTzRjQXQ1STFuVzFY?=
 =?utf-8?B?SDdhRENtT0xtTlNxalhtOXhpVmwrK2xzUTBXeWFaa1lia3JjcG8xOGkwTVJJ?=
 =?utf-8?B?Sk5sRHFUa1NldEo3ek9CMmJhc01GRUcycExDcjNXWDNxV2FBYm5XbGdodHdO?=
 =?utf-8?B?bGRGSHdQMWR0U2s1aUVBNlkyUzdPc2lpQk9NZkc0MW51bFlZRlM5cHlEakx5?=
 =?utf-8?B?NmNIZ3lLUUIyYU5xUDVmdFFwaTJHQ2tIZjJldGZIZzFxOTN4cklzaDA4N2NP?=
 =?utf-8?B?UHVEWlJZckZIVzNKV0JSYU9qTkVyTDRYZlZib3podHEwWXliSzg3alk3WWgz?=
 =?utf-8?B?ZG8zSldPUkRZSUFHNTFXNVFJTzlYSXh2N2dVRGwvWjh3TzU1S1p0UVFxY0FZ?=
 =?utf-8?B?bENLbTJmemF0bXJNTzZBYXBLL1FDN0drV0UxUi93UEw1VW5tbnVZeWU0NS9p?=
 =?utf-8?B?aTNya3ZqZTU0bEV5S1d2Zmp1cHNNVDQ0UVRDYlgyVjZKc1N2TVRYQXdHbGtp?=
 =?utf-8?B?NmkrWERkUUNPOE1qbUtmeE13UHNNZWM5NTFFbVZaWXpvS20vUnUrRU51TW56?=
 =?utf-8?B?S0ZseUpQR0NQMXhBSjhhUzlSeFNLcjRTZ2htbGVtWVNKb0lOeXB4MlRuSVpO?=
 =?utf-8?B?QW9ubXJFUXJORWxCRUp4bDN3ZHVydHZZTFlrZnJQU0VPcHZyMElGMUZXR0pU?=
 =?utf-8?B?angwbzQvdnh2QWNZZHVLOGpGMkZWVGRpOVFUWFFoS0FsUEVuenFpSWVGcDRj?=
 =?utf-8?B?NjdTbXJRUmhjaHU0TEFPZjIrZGxUUGZYWlV1cE4zL3FoNCszVHdRSG1NcmN2?=
 =?utf-8?B?R1VRMmRzeGpBMG1KU2x0U3gwb3JQTUd3eG9UU3hiNXNML3ZVSUxua2NST2Ns?=
 =?utf-8?B?UzNPZk1hdHBJZElqL3czM0Q1SHRJL3RnKzE5Z0orQnF2QTZJR3lTZnRTeU1Q?=
 =?utf-8?B?Y2wrOEluMnkySXFtU3dyd1ppZDgwa211QnE0VjZ0ZSs2ZG9JSjVMWmtGR1hJ?=
 =?utf-8?B?VlVXaHEvQktHOTZnaWJvcWNITTFWKzVkSGxFd2M4Z3psUzVzREFmTnMzZ204?=
 =?utf-8?B?VFhUWXpVc0tOc1E0VnROK1B2VjRMODFUQUt2RDhTZG0wYjdLSHZmemNwMFE2?=
 =?utf-8?B?NDZMTW9VNHA3VU1ndFZEdWNVaGxMSWpac292cUhDZ1dNSHBIZ0RDdW9qZGpP?=
 =?utf-8?B?cWZWa0loM1I3ck14RDhCN1laUEV0ZWpuUVRodjY5MnVTQ1AxT3NZZzNtZGRV?=
 =?utf-8?B?c1hlVHFrSURzR0llczZxSHJOU3RpbEdLSU95TW83eE00UHo5TVpnZWM5Tk1L?=
 =?utf-8?B?ZmJsVHZaN0c3SDNyK0xheXNlNUJ4RXRwZ3RBd0M3bE01N2ZESGhLcnFVa0t5?=
 =?utf-8?B?ME9uK0JzcStpNWhWWmRTVHB3VklPZ2F6Nld2QURVUUY0QkNEZ0FhQlZkNXJy?=
 =?utf-8?B?d3p1NWFkb1BrVmNpVnk1d0J4dUNvL3pHc0RGeWdiMVJiV1RUMWhaZVJQbVpj?=
 =?utf-8?B?aGEzTDVpRm55UHpkNytDbFI5NnBmMFlIS3ZKa0ZHN0J0L3JMd3hoVmtiV3k5?=
 =?utf-8?B?eHVlRFA1Mm9iajBRQTRVaFMwY3pnckZhWHhqRjZ0UkNDWnZJeGJidEJHQ1dz?=
 =?utf-8?B?bzdrbHB5Q0xsQ0ZLdjhMcWZLZmh5Q1RaQ1dXRTNVcGZlNXhCSDBIcWowbFFy?=
 =?utf-8?B?S2pDYnJnRG9vL1YxZEdSTmNDd3lHdmdhK3I1TGxtcTc5aW12RzIzV0dOWUcr?=
 =?utf-8?B?elYvUkoyTXJlSzE0aDFqb0FjRURsaTBqcFB2TTZ3bGZGcDV3TXBRcDJwNnVR?=
 =?utf-8?Q?c9YzjiXxDjMW1LucE5siNfAnkZznnD00?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8918c69c-5923-4718-0a13-08da081ee26c
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 14:03:16.8837
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: LzhwYmYIGIGHbhdwSANVpBMKAtBWoG95c05aUa2AS8G5xp9qhhfPGKTq3Z8YyzHHLnZzq6ukVW4ZLLT8aX6R1Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB4214

On 17.03.2022 12:06, Tamas K Lengyel wrote:
> Another question I would be interested to hear from the maintainers is in
> regards to the hvm context compat macros. Right now they differentiate
> between hvm hw cpu struct versions based on size. So since this patch
> doesn't change the size how is that supposed to work? Or if there are more
> then two versions of the struct? The compat version never changes?

struct hvm_hw_cpu_compat is indeed not meant to ever change. It needed
introducing because the msr_tsc_aux field was added in the middle of
the struct, instead of at the end. Going forward, as was done with the
"flags" field already, additions should only be at the end. Exceptions
are when padding fields are assigned a purpose (like you do), which is
why they need checking that they're zero when they're introduced.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 14:06:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 14:06:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291606.495034 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUqm0-0003yl-5x; Thu, 17 Mar 2022 14:06:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291606.495034; Thu, 17 Mar 2022 14:06:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUqm0-0003ye-2g; Thu, 17 Mar 2022 14:06:40 +0000
Received: by outflank-mailman (input) for mailman id 291606;
 Thu, 17 Mar 2022 14:06:39 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=hAZZ=T4=citrix.com=prvs=068f51ced=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nUqly-0003yY-Vi
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 14:06:38 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 7501439d-a5fb-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 15:06:37 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 7501439d-a5fb-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647525997;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=2oDBgP9ZstjxHtvjS2AzV+OyJzvdnX17JYruJ+eUj50=;
  b=TYsX8RET/OZ7EVKyKI+wqZgKfSBA9wDujCG0LAsOTS6euEHAiCSUx0lI
   uscZeq0AMrZKTcIQ4i8JWRXUa0IOT0mvCEs2WkFDPws3T2dMMjO/3cGVy
   9q8l9gaSa37NSH/tm8LmrDlfAFJYmCaFu0RpzkjGbfKbX8Cjrd+nu3FEl
   8=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 65968955
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:Nx4eHqzJ40v54nnE9Wl6t+cHxirEfRIJ4+MujC+fZmUNrF6WrkVVy
 jMbWm6BOPzYYjH1fd5xb9m+90hU75bSzYRgTQI++yAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2IfhWWthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 NpllKSPWTl0F7PwyM8yXh9GEBBPL7N/9+qSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DFYUToHx/ixreCu4rW8vrSKTW/95Imjw3g6iiGN6AO
 ptHOWsyMXwsZTVgEXoHDcsHhdyHuVDwaTZ960KWoZEetj27IAtZj+G2bYu9lsaxbclSk0yVo
 krP+m3rBRdcONH34T+G71qlg+bdmiW9VI96PLig8f5uiVaQ7mUWAQ8RUx23rJGRmkO4Ht5SN
 UEQ0i4vtrQpslymSMHnWB+1q2LCuQQTM/JyOeAn7ACGyoLP/h2UQGMDS1Zpd9gOpMIwAzsw2
 Te0c8jBXGI19ufPEDTEq+nS/Wja1TUpwXEqRBc7XTVYysff8KocgxTRTedSArCMgYigcd3v+
 AyioC87jrQVqMcE0aSn4FzK6w6RSoj1oh0dvVuOAD/8hu9tTMv8PtHztwCHhRpVBNzBJmRtq
 kTojCR3AAomKZiW3BKAT+wWdF1Cz6bUaWaM6bKD8nRIythMx5JBVd0IiN2dDB0wWirhRdMPS
 BWP0e+2zMUPVEZGlYctP+qM5z0ClMAM7+jNWPHOdcZpaZNsbgKB9ywGTRfOgz+xzRd1y/9nZ
 srznSOQ4ZAyU/gPIN2eHbt17FPW7npmmTO7qW7TknxLLoZylFbKEOxYYTNin8gy7b+eoRW9z
 jqsH5Di9vmra8WnOnO/2ddKdTgidCFnbbir+50/XrPSeWJORTB+Y8I9NJt8IuSJaYwOzbyWl
 px8M2cFoGfCaYrvclzbNCo8NOuxAf6SbxsTZEQRALph4FB7Ca7H0UvVX8FfkWUPnAC78cNJc
 g==
IronPort-HdrOrdr: A9a23:2qsWLaqJWBmAEXWPSNI/LE4aV5oleYIsimQD101hICG9E/bo8/
 xG+c5x6faaslossR0b9uxoW5PhfZq/z/BICOAqVN/JMTUO01HIEKhSqafk3j38C2nf24dmpM
 JdmnFFeb7N5I5B/KTH3DU=
X-IronPort-AV: E=Sophos;i="5.90,188,1643691600"; 
   d="scan'208";a="65968955"
From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Jan Beulich
	<JBeulich@suse.com>, =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?=
	<roger.pau@citrix.com>, Wei Liu <wl@xen.org>, Bjoern Doebel
	<doebel@amazon.de>, Michael Kurth <mku@amazon.de>, Martin Pohlack
	<mpohlack@amazon.de>
Subject: [PATCH v3] x86/cet: Use dedicated NOP4 for cf_clobber
Date: Thu, 17 Mar 2022 14:06:24 +0000
Message-ID: <20220317140624.4258-1-andrew.cooper3@citrix.com>
X-Mailer: git-send-email 2.11.0
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

For livepatching, we need to look at a potentially clobbered function and
determine whether it used to have an ENDBR64 instruction.

Use a non-default 4-byte P6 long nop, not emitted by toolchains, and extend
check-endbr.sh to look for it.  The same logic can check for the absence of
any endbr32 instructions, so include a check for those too.

The choice of nop has some complicated consequences.  nopw (%rax) has a ModRM
byte of 0, which the Bourne compatible shells unconditionally strip from
parameters, meaning that we can't pass it to `grep -aob`.

Therefore, use nopw (%rcx) so the ModRM byte becomes 1.

This then demonstrates another bug.  Under perl regexes, \1 thru \9 are
subpattern matches, and not octal escapes, while the behaviour of \10 and
higher depend on the number of capture groups.  Switch the `grep -P` runes to
use hex escapes instead, which are unambiguous

The build time check then requires that the endbr64 poison have the same
treatment as endbr64 to avoid placing the byte pattern in immediate operands.

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
---
CC: Jan Beulich <JBeulich@suse.com>
CC: Roger Pau Monné <roger.pau@citrix.com>
CC: Wei Liu <wl@xen.org>
CC: Bjoern Doebel <doebel@amazon.de>
CC: Michael Kurth <mku@amazon.de>
CC: Martin Pohlack <mpohlack@amazon.de>

v2:
 * Check for the poison byte pattern in check-endbr.sh
 * Use nopw (%rcx) to work around shell NUL (mis)features
 * Use hex escapes to work around Perl subpattern matches
v3:
 * Tweak wording about perl regex
 * Check for endbr32 as well
---
 xen/arch/x86/alternative.c       |  2 +-
 xen/arch/x86/include/asm/endbr.h | 26 ++++++++++++++++++++++++++
 xen/tools/check-endbr.sh         | 18 +++++++++++++-----
 3 files changed, 40 insertions(+), 6 deletions(-)

diff --git a/xen/arch/x86/alternative.c b/xen/arch/x86/alternative.c
index d41eeef1bcaf..0c6fc7b4fb0c 100644
--- a/xen/arch/x86/alternative.c
+++ b/xen/arch/x86/alternative.c
@@ -362,7 +362,7 @@ static void init_or_livepatch _apply_alternatives(struct alt_instr *start,
             if ( !is_kernel_text(ptr) || !is_endbr64(ptr) )
                 continue;
 
-            add_nops(ptr, ENDBR64_LEN);
+            place_endbr64_poison(ptr);
             clobbered++;
         }
 
diff --git a/xen/arch/x86/include/asm/endbr.h b/xen/arch/x86/include/asm/endbr.h
index 6090afeb0bd8..d946fac13130 100644
--- a/xen/arch/x86/include/asm/endbr.h
+++ b/xen/arch/x86/include/asm/endbr.h
@@ -52,4 +52,30 @@ static inline void place_endbr64(void *ptr)
     *(uint32_t *)ptr = gen_endbr64();
 }
 
+/*
+ * After clobbering ENDBR64, we may need to confirm that the site used to
+ * contain an ENDBR64 instruction.  Use an encoding which isn't the default
+ * P6_NOP4.  Specifically, nopw (%rcx)
+ */
+static inline uint32_t __attribute_const__ gen_endbr64_poison(void)
+{
+    uint32_t res;
+
+    asm ( "mov $~0x011f0f66, %[res]\n\t"
+          "not %[res]\n\t"
+          : [res] "=&r" (res) );
+
+    return res;
+}
+
+static inline bool is_endbr64_poison(const void *ptr)
+{
+    return *(const uint32_t *)ptr == gen_endbr64_poison();
+}
+
+static inline void place_endbr64_poison(void *ptr)
+{
+    *(uint32_t *)ptr = gen_endbr64_poison();
+}
+
 #endif /* XEN_ASM_ENDBR_H */
diff --git a/xen/tools/check-endbr.sh b/xen/tools/check-endbr.sh
index 9799c451a18d..641a2342199e 100755
--- a/xen/tools/check-endbr.sh
+++ b/xen/tools/check-endbr.sh
@@ -27,7 +27,7 @@ echo "X" | grep -aob "X" -q 2>/dev/null ||
 # Check whether grep supports Perl regexps. Older GNU grep doesn't reliably
 # find binary patterns otherwise.
 perl_re=true
-echo "X" | grep -aobP "\130" -q 2>/dev/null || perl_re=false
+echo "X" | grep -aobP "\x58" -q 2>/dev/null || perl_re=false
 
 #
 # First, look for all the valid endbr64 instructions.
@@ -45,13 +45,15 @@ echo "X" | grep -aobP "\130" -q 2>/dev/null || perl_re=false
 ${OBJDUMP} -j .text $1 -d -w | grep '	endbr64 *$' | cut -f 1 -d ':' > $VALID &
 
 #
-# Second, look for any endbr64 byte sequence
+# Second, look for all endbr64, endbr32 and nop poison byte sequences
 # This has a couple of complications:
 #
 # 1) Grep binary search isn't VMA aware.  Copy .text out as binary, causing
 #    the grep offset to be from the start of .text.
 #
 # 2) dash's printf doesn't understand hex escapes, hence the use of octal.
+#    `grep -P` on the other hand can has various ambiguities with octal-like
+#    escapes, so use hex escapes instead which are unambiguous.
 #
 # 3) AWK can't add 64bit integers, because internally all numbers are doubles.
 #    When the upper bits are set, the exponents worth of precision is lost in
@@ -65,11 +67,17 @@ eval $(${OBJDUMP} -j .text $1 -h |
     awk '$2 == ".text" {printf "vma_hi=%s\nvma_lo=%s\n", substr($4, 1, 8), substr($4, 9, 16)}')
 
 ${OBJCOPY} -j .text $1 -O binary $TEXT_BIN
+
+# instruction:    hex:           oct:
+# endbr64         f3 0f 1e fa    363 017 036 372
+# endbr32         f3 0f 1e fb    363 017 036 373
+# nopw (%rcx)     66 0f 1f 01    146 017 037 001
 if $perl_re
 then
-    LC_ALL=C grep -aobP '\363\17\36\372' $TEXT_BIN
+    LC_ALL=C grep -aobP '\xf3\x0f\x1e(\xfa|\xfb)|\x66\x0f\x1f\x01' $TEXT_BIN
 else
-    grep -aob "$(printf '\363\17\36\372')" $TEXT_BIN
+    grep -aob -e "$(printf '\363\17\36\372')" -e "$(printf '\363\17\36\373')" \
+         -e "$(printf '\146\17\37\1')" $TEXT_BIN
 fi | awk -F':' '{printf "%s%x\n", "'$vma_hi'", int(0x'$vma_lo') + $1}' > $ALL
 
 # Wait for $VALID to become complete
@@ -90,6 +98,6 @@ nr_bad=$(wc -l < $BAD)
 [ "$nr_bad" -eq 0 ] && exit 0
 
 # Failure
-echo "$MSG_PFX Fail: Found ${nr_bad} embedded endbr64 instructions" >&2
+echo "$MSG_PFX Fail: Found ${nr_bad} endb32, nop poison, or embedded endbr64 instructions" >&2
 ${ADDR2LINE} -afip -e $1 < $BAD >&2
 exit 1
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 14:09:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 14:09:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291609.495046 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUqob-0004ae-KM; Thu, 17 Mar 2022 14:09:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291609.495046; Thu, 17 Mar 2022 14:09:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUqob-0004aX-Gg; Thu, 17 Mar 2022 14:09:21 +0000
Received: by outflank-mailman (input) for mailman id 291609;
 Thu, 17 Mar 2022 14:09:20 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RBlk=T4=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nUqoa-0004aP-Bj
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 14:09:20 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d633b998-a5fb-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 15:09:19 +0100 (CET)
Received: from EUR03-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur03lp2055.outbound.protection.outlook.com [104.47.10.55]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-31-g1V0TEzKPIaXSyiX7MfO-g-1; Thu, 17 Mar 2022 15:09:18 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by DB3PR0402MB3644.eurprd04.prod.outlook.com (2603:10a6:8:c::17) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.28; Thu, 17 Mar
 2022 14:09:16 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d%9]) with mapi id 15.20.5081.017; Thu, 17 Mar 2022
 14:09:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d633b998-a5fb-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647526159;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=B722Wt3NiRr6LWFowwZW08JNNpZta/n6YosI8oQ4MU8=;
	b=bUBb79kY8gig0MM+9ERiuaU3K0+iUp/BukTLHm6Ty+tp94Z+y5wNIy5x8feghi7ReewIZk
	h7R861D+QcDgwXQyTQ7FNmOYd/rOoRZOXTRszDVm8e6EFsNXrvf3v/bqS+s0Z+rhKMs13A
	waq3OLNbXq3AUkWOyojwUWE6y+3Lxt0=
X-MC-Unique: g1V0TEzKPIaXSyiX7MfO-g-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=IubrONwdD95SJ6RKR3SnqHLWT+jFFi2Nwh1VzZPnqguUBUhdFFweCt6hTTNO8lYL7L88KbI0Puk883MbeR/MeQlNBVIMidi71YuAlxQp9/NWuGJ7L0AY5L8fs9zftxIcxLwfdaW8xXRUN6afOQ3ePPZzgkBz8ErwXE24+8X7dJt/ywTC7mCjktCr17fMktxiGBusJE7dpqmpd03vStFvjvHsC/6gBdfiWkl6CrivLXED6uEfUloSiTVG1617YVx7obLAVO+8J5BRvDB107jUgm+o0rIs4Sbm5k7gadeAIuDjdrtpzxA/s37xLqlnJ6ktZtccgcl5qB5gN7OF0eGCQw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=XC6wo68JnROZLE5tnSqHf0oA8LW1WnCccPpKJLGbbao=;
 b=SmNpd5jLPnI1pTcqMYw5wsMO2Wgjd3vLYcIan1MDA+10u0tUaBup32RDIsMKzoVFpnwBh+WptHsxfH4uN2+bV2b88a6rcXlM4lbdyag5otLDir6dYsaJrWXgZNU2fV5MjNyDEZGykN3kA8L75LQZtm25TErLo6q+JC1CZcA66lAO/jwBrtc4wpNU5zt8qz6KaJkzY5pQdraeR4FAvCHMYE4vJcSaTa9pRBni1K0C6rX0qaPuGrkM32bEpKzrIxhxuAheoLOL+bIU+8JIfnJpEEZ4oJLP8KTrswtZp0RpU4BfqW6nKgRPzxB9yyj4GouWw3K26WCmnYbqdh/bSiInPA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <a911e9b1-d1ea-34d3-df82-cfbfd840a339@suse.com>
Date: Thu, 17 Mar 2022 15:09:14 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH 1/2] livepatch: do not ignore sections with 0 size
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
 Ross Lagerwall <ross.lagerwall@citrix.com>,
 Roger Pau Monne <roger.pau@citrix.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <20220317110854.39050-1-roger.pau@citrix.com>
 <20220317110854.39050-2-roger.pau@citrix.com>
 <7443a703-6215-1b8f-a6c7-bab606ad016a@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <7443a703-6215-1b8f-a6c7-bab606ad016a@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6P194CA0073.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:209:8f::14) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 39ab89c3-f8dc-4bf4-4cfb-08da081fb89f
X-MS-TrafficTypeDiagnostic: DB3PR0402MB3644:EE_
X-Microsoft-Antispam-PRVS:
	<DB3PR0402MB36447FC7F9497209CD0A54BDB3129@DB3PR0402MB3644.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(53546011)(6506007)(6916009)(54906003)(316002)(36756003)(2906002)(6512007)(31686004)(186003)(26005)(2616005)(8676002)(66946007)(86362001)(66476007)(66556008)(31696002)(38100700002)(8936002)(4326008)(5660300002)(508600001)(6486002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?o1yYVwZ8CkLhwHYc4ycQ6xtfpQNcgNysRGI0xKlKareYfHcnMUGTaG98XPGM?=
 =?us-ascii?Q?5fJQB1Oaxyjne/qnvcT4ftidKrSEL1FQG09abRWoj9e5ShX5SfdRQkQKCw7Q?=
 =?us-ascii?Q?hq04rAilwKpTrWx15lLwD7QTtoAu7CdTKbITvyjVSOa5lcIoIutHSOsAYDp4?=
 =?us-ascii?Q?+HXIeQh9oF/dyCufQcKpJ0ma25fYgQFt7zCdc9Zdbc4vFAHqp15lHczmr96K?=
 =?us-ascii?Q?WB2IIpViudtbf2NAljhT4O+tHrcSZ0+NkYL7XNOepS3A4tZ/WxlRkUlAt/jV?=
 =?us-ascii?Q?wPLlZehcF11gX8jJydQS3wZW0vVP+8AYLucbnCmDezsTFfyRmsAC5j7wPp6L?=
 =?us-ascii?Q?fy9nNCeFzAvTn2/9hAFEfNnOs0jUA7JEY7Of6ePQmnQzwA/oW79MwyyyHqwY?=
 =?us-ascii?Q?LdrEjOSrI+0gi/fFoaoriKHprAEDqPE1YwNPSJLj2CsS354yQU3/rclacdY3?=
 =?us-ascii?Q?Kq5uPTWP0W4E70+/CPO9NsyzezrJPtlm0wGD7Ipc27eK8Kqsovxo3Lg/E2HV?=
 =?us-ascii?Q?B2UCr9G6jyzHZ9am8jVHUlkP8T+HEnywQ2IqW7JkAnhfardap4dYl/x0KhJ5?=
 =?us-ascii?Q?Hyy5s2yNMJldzDb5xjJgK+HBuC2kLj30IqCZQ+Kqy32Z4AP7R0+6K8S3q8S+?=
 =?us-ascii?Q?R/4IHRWfqin/vc0mDTrEzivo0jKdiUsSY74TWMq7NUlB5gSyqz1R0STzkeKe?=
 =?us-ascii?Q?ITqfz2oK75Dx/K8CplIeMIhweDBXZBya598V+OQugbXOWkYA0rIuZM9IfYhy?=
 =?us-ascii?Q?NRgRYI6ngj9iiT4CBYnEyihllKuVlsqagXmBaIn56bbLTItj5IV99ZSqavgG?=
 =?us-ascii?Q?/DRR0offmxLRx6qtIj5JzTJESLCy3h8iTweng4aAExAvmFt8gXDsSqoxJAN2?=
 =?us-ascii?Q?SMfPHiYpYBzP3xtirQXBy6X0B951qT74JDW9ZG99tUm2cdp14Nm75xqN7GCJ?=
 =?us-ascii?Q?XRSoGB7XtGLLSJQFBNxVGhAfJdNOvWVsNcxwCKumBbJmXzPg9sH06PNDVXeB?=
 =?us-ascii?Q?0T6Crtvu2IdV3UEbOUoT9Pbbf2WR008Xyb14d6HfdkV6tM6rdbEdAVIPGQv9?=
 =?us-ascii?Q?gciMEyziMx4EL+1Kmz5g2ZYKg9k9yyhiQw0+zCvFxN0IQgWH0ysd7PEUUuLo?=
 =?us-ascii?Q?2ZDtzxhnP598bmsGmIjXH7dif4hTuuHhaQO/p9ZB1c8B7paBO3kmtcVpvUzl?=
 =?us-ascii?Q?3pnSQF2lQCo5DDSAgxCfr5j4YLRnjp9WZdpgW/K/iWqyL9UcEwD0s/Kxc5u6?=
 =?us-ascii?Q?9AGkepWZ+OkiRaJxpBwcDiOBIW/PRqvuKTiGEoOeGa6oXXcRQvcmLWArYu3b?=
 =?us-ascii?Q?O5YZVfZn21PjeXrnqAY/KizMkJiQ28rrcD1ND0kyjDZ7c7Cbitl7Ga8NSRk1?=
 =?us-ascii?Q?FVyMyMOD1pvgysn2GL/IEeeQWZFrUrLhmOjKXWBLeXf4MugastwfxCY/MHyo?=
 =?us-ascii?Q?HbYRzCHTwMTU8OI11PkfrtDz7YSJpegz?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 39ab89c3-f8dc-4bf4-4cfb-08da081fb89f
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 14:09:16.2520
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: hdlQ7avQEjNgpg+33QGpswIfpbdjuvLlYg8TqeZ1g+dcNM/BDUTtAEhXRtJHmn9WRjPbvIinmns7GSPunmnueA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB3PR0402MB3644

On 17.03.2022 15:00, Andrew Cooper wrote:
> On 17/03/2022 11:08, Roger Pau Monne wrote:
>> A side effect of ignoring such sections is that symbols belonging to
>> them won't be resolved, and that could make relocations belonging to
>> other sections that reference those symbols fail.
>>
>> For example it's likely to have an empty .altinstr_replacement with
>> symbols pointing to it, and marking the section as ignored will
>> prevent the symbols from being resolved, which in turn will cause any
>> relocations against them to fail.
>=20
> I agree this is a bug in livepatch handling, but it's also an error in
> the generated livepatch.=C2=A0 We should not have relocations to an empty
> altinstr_replacement section in the first place.

I think having such relocations is quite natural, but ...

> This will probably be from the lfences, where the replacement in a nop
> and takes no space.=C2=A0 I think I know how to fix this case.

... of course it's possible to eliminate them. Whether that's worthwhile
to add logic for I'm not sure.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 14:17:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 14:17:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291614.495057 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUqw0-00065X-HZ; Thu, 17 Mar 2022 14:17:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291614.495057; Thu, 17 Mar 2022 14:17:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUqw0-00065Q-E2; Thu, 17 Mar 2022 14:17:00 +0000
Received: by outflank-mailman (input) for mailman id 291614;
 Thu, 17 Mar 2022 14:16:59 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=JNAg=T4=citrix.com=prvs=0684b021b=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nUqvz-00065K-AD
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 14:16:59 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e5e22cb0-a5fc-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 15:16:56 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e5e22cb0-a5fc-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647526616;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=NXwxNIGQ/DOPJQlETMgJQrTsrZfcTuhr50X8sxj9V+M=;
  b=KN2EQZuk/auHqVqm8ye5SJOAaMioFGUrDTx2tFJlAas/sZSXM4nziiCw
   RWOVTVzroNTKmF1YM2niEifxFkdB4bdbxvX2MrGmvIopFIx40lsYHxfW1
   5TxeyXnaovc6GBv25inWgBw/IckSj94LRR0jgXjVYTwok9QTYwvvTTUNx
   g=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66503869
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:48vQfa4pBC/vduEgeUYA0wxRtDbHchMFZxGqfqrLsTDasY5as4F+v
 mMaX2nSOP2LYDTxKt50PojlpB4EvcDSzNY3SVZq+3g2Hi5G8cbLO4+Ufxz6V8+wwmwvb67FA
 +E2MISowBUcFyeEzvuVGuG96yE6j8lkf5KkYAL+EnkZqTRMFWFw0XqPp8Zj2tQy2YPgXFvX0
 T/Pi5a31GGNimYc3l08s8pvmDs31BglkGpF1rCWTakjUG72zxH5PrpGTU2CByKQrr1vNvy7X
 47+IISRpQs1yfuP5uSNyd4XemVSKlLb0JPnZnB+A8BOiTAazsA+PzpS2FPxpi67hh3Q9+2dx
 umhurStEy4PAY/noN42CUMJTw9VY/F0o7vudC3XXcy7lyUqclPpyvRqSko3IZcZ6qB8BmQmG
 f4wcW5XKErZ3qTvnez9GrIEascLdaEHOKsFvX5t13fBBOsOSpHfWaTao9Rf2V/cg+gQQ6uGP
 JpHOFKDajzKOEZwAXwSNqtv3+iWrye8IhdchQKK8P9fD2/7k1UqjemF3MDuUt+NQ99ckgCHp
 2bF12PjCxoeOZqUzj/t2mKhgKrDkD32XKoWFaak7bh6jVuL3GsRBRYKE1yhrpGEZlWWAowFb
 RZOo2x38PZ0pBfDosTBswOQvSStmCE+cOJqOLdguV2j4fSI0V2dLz1RJtJeU+AOuMgzTD0s8
 1aGmdL1GDBi2IGopWKhGqS89m3rZ3VMRYMWTWpdFFZevYG/yG0mpkiXJuuPBpJZmTEc9dvY5
 zmR5BYziLwI5SLg//XqpAuX695AS3Wgc+LU2uk1dj/9hu+aTNT8D2BN1bQ9xawcRGp+ZgPd1
 EXoY+DEsIgz4WilzURhutklErCz/OqiOzbBm1NpFJRJ323zpyH/IN8Jum8mexoB3iM4ldnBO
 hO7VeR5vsM7AZdXRfUvP9LZ5zoCkMAM6ugJptiLN4ETM/CdhSeM/T10ZF744oweuBNErE3LA
 r/CKZzEJS9DUcxPlWPqL89Age5D7n1vngv7GMGkpylLJJLDPRZ5v59eawDQBg34hYvZyDjoH
 yF3bJLblU8ADLWgPkE6M+c7dDg3EJTyPrivw+R/fe+fOAt2XmYnDv7a27Q6fIJ52a9Sk4/1E
 ruVCye0FHKXaaX7FDi3
IronPort-HdrOrdr: A9a23:XJpn+K3Jmepy0RjUEy4eDAqjBVZyeYIsimQD101hICG9Lfb3qy
 n+ppsmPEHP5Ar5OEtBpTiBUJPwJ0800aQFnLX5Wo3SIDUO2VHYVr2KiLGC/9SOIVyaygcw79
 YFT0E6MqyOMbEYt7eL3ODbKadZ/DDvysnB7o2yvhQdLz2CKZsQlDuRYjzrY3GeLzM2fKbReq
 Dsgfau8FGbCAoqh4mAdzI4dtmGg+eOuIPtYBYACRJiwA6SjQmw4Lq/NxSDxB8RXx5G3L9nqA
 H+4kHEz5Tml8v+5g7X1mfV4ZgTsNz9yuFbDMjJrsQOMD3jhiuheYwkcbyfuzIepv2p9T8R4Z
 PxiiZlG/42x2Laf2mzrxeo8w780Aw243un8lOciWuLm72OeBsKT+56wa5JeBrQ7EQt+Ptm1r
 hQ4m6fv51LSTvdgSXU/bHzJl9Xv3vxhUBnvf8YjnRZX4dbQqRWt5Yj8ERcF4pFND7m6bogDP
 JlAKjnlblrmGuhHjDkV1RUsZ+RtixZJGbFfqFCgL3Y79FupgE586NCr/Zv20vp9/oGOu55Dq
 r/Q+BVfYp1P70rhJJGdZQ8qPSMexnwqDL3QSuvyAfcZek600ykke+C3Fxy3pDsRKA1
X-IronPort-AV: E=Sophos;i="5.90,188,1643691600"; 
   d="scan'208";a="66503869"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=cpWXDAhKDjjV9m8PW2+vI765IwBV/8+P2k4n8IE4YlM802x7nTPynxpa5QF70V//aSTiRLAubpr6UcH9QUBo6nCU12FBqYKBLTDmx/6KgwslCZo98doJWr/H4bl+NdeIlQtjXiJ0jgkfBUAjLf6itE7P7kKQzOve5GZPrm0ieo39BWNxr1rpwYkm0hS6Wan0eQMO+KodL4I3H1P3NIrvsv4rHCl877cFQ6TbhkVqVYATZHe6+2smvWG6vId8r9HNl4hjtPfC7gpDMd6P3r8PfXJhdPwAJrTplX/GntfxgrnsOuxHH10pB2bzQXrlkero0dtgVEohkLzxklz/QwAkOQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=se6V635QQum1GKJl3Gv2BZx4vrwJQegrEK9GB93azUA=;
 b=j6bMmqW3R8aTMy4GvJIqMwkfT7aFG1yyPOgg+Fy3wLtjGS90YEUyPeyiMjWYIqpvBT+wCcxVsYKIzHkMyKjTfIll0/xvVCqrUSgnYDb2SVL1ggfDMzpaBFTXu1Kqs8dJPEuW0mexqUj18NdcAsSssiGn3kz/LbX62u7tzKmRu+IiheqLNe0B2BYLCwAjYYnnydnxJei+G+P47+uyglthZMehQpRp72o18Kw0Tar6j4GXBEuUyTye4gBsJJb5sXQKudEsKEwwz1U1en0NcK693Mg0stts0vHWhX5jO2B8I/pV0Eh8PlApe/vacS8OEvbigfjzAKgsuHENStkfPmyJzg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=se6V635QQum1GKJl3Gv2BZx4vrwJQegrEK9GB93azUA=;
 b=axCMr5/+av6Cjr2Tv4oXk9Hi4zcgarCcNMDEEtMlwVMn0bAQAjReHfXKxCM4eRK2NdzA+5/1oNLUEmP+J+2UxDPk85tHbAVEEW7m3mXdBKHZRF+0kOCSYvxfUoyLq2OKEMn15ZfHxzsQnU4qxJUy49qqZLCjQP84fhSKTmwyde4=
Date: Thu, 17 Mar 2022 15:16:27 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "Konrad
 Rzeszutek Wilk" <konrad.wilk@oracle.com>, Ross Lagerwall
	<ross.lagerwall@citrix.com>
Subject: Re: [PATCH 1/2] livepatch: do not ignore sections with 0 size
Message-ID: <YjNCu9nD30DkLZX9@Air-de-Roger>
References: <20220317110854.39050-1-roger.pau@citrix.com>
 <20220317110854.39050-2-roger.pau@citrix.com>
 <7443a703-6215-1b8f-a6c7-bab606ad016a@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <7443a703-6215-1b8f-a6c7-bab606ad016a@citrix.com>
X-ClientProxiedBy: LO4P123CA0195.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:1a4::20) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 57f64326-fc79-49a1-7939-08da0820bc4e
X-MS-TrafficTypeDiagnostic: MWHPR03MB3294:EE_
X-Microsoft-Antispam-PRVS: <MWHPR03MB32944745C6147CB27A821BF18F129@MWHPR03MB3294.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(82960400001)(6512007)(9686003)(8936002)(107886003)(66476007)(66556008)(86362001)(316002)(66946007)(6636002)(54906003)(8676002)(6666004)(4326008)(38100700002)(6862004)(33716001)(6506007)(53546011)(508600001)(85182001)(186003)(26005)(5660300002)(6486002)(2906002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?eDRJNTNLeC9vVzRnUGdZaXh0TUpYMkJxbld6S1BPNEV5eXFZZk8zZzFJMlhl?=
 =?utf-8?B?NzFEbzZkdmgyeC9QR2lhNmVicnVNNkhxOFRUcjNNQWV1QUdDQUZyZTZtczRl?=
 =?utf-8?B?K0RpcGJUSXVINnJRdytFMzhHNk9kTm1kbzlaSlZrTUxFWjU3a0FlNTZnQ3Y5?=
 =?utf-8?B?UGlXTWo0bklCK2JFVDVZS2xWVFkxOXp2WFozNGkwci90Q0tVWWloL1V5QnI4?=
 =?utf-8?B?MHlLQk9EU0pnQy9HY2NZOHlQWGg0RC9KSVNyU0V0emx5US9panVrNEo5K2lB?=
 =?utf-8?B?cjdOYUVUVTYzcGQ0eWUwYXRXdHdWdERWcFZFT3A1eXBIVnhZTXV4TlIvanNz?=
 =?utf-8?B?QWFiMVRtb2Z5S1FmUDhTelg1RWIxVXU1VXliOWlTK0VYRFR1UjVtK3ErcEtD?=
 =?utf-8?B?cXJ2SUpxWDRvR2ZKOVdwSStNaVgyUFFtQ3d1dzdOTVFDODV1SW9zcEtvV2ZB?=
 =?utf-8?B?YWQ1T3A1aks1Z3MyaWRvOU9pQ24zd1MxcjFaWVV0MGhFT3J0SHJmM0hUS3dw?=
 =?utf-8?B?dnU1REJyaFozaHBYdFJZa2tlVTA0T1RsZVJKSVFNQmM3NHNVeVp4MnBqTzhT?=
 =?utf-8?B?b1V0bjF6N2ZJMEJKb2FMVnVGRExncTNPRjlaeWJGeUUvS3l4ZnF1RGlsMU9Q?=
 =?utf-8?B?RUcyU0p4NnhkU0t2OVBLV0RFSnNRYUcvWG1rOVEzOWJiMmgveUFEZVFGak1z?=
 =?utf-8?B?dWVGVVFBZDg2ZG9tcE5MSzhkMldLeGljVDZKN29LRWxVdDhpbUY4TFVidHhq?=
 =?utf-8?B?MzZUUXpqdWVuWG5WU05yM3ZLRDhKRkFrMEs4VWhXUk1tUlI1UzNVb29FY3Aw?=
 =?utf-8?B?bWQ0UVVvbnQva21OVGpGakl2MFpFTXJocHhZZlVXckRwQ29KZHArMURKenR0?=
 =?utf-8?B?Y2FDMWZHS0llWEk4U3hzL0ZyNkFKMUpFYVk2b2diaVAzMEF2UGlJZWFzbVNC?=
 =?utf-8?B?Q2lPLzk0aFovZzliT05NalM4RlZVYVg4bkExYi9NRDArTUJ0eHd2UjkzalRj?=
 =?utf-8?B?SmxZeTNxcnBTdlYyOFRoVkkyaHRiSVJhd2dyWUxCL3hXZU51WE9uTXkzWVBO?=
 =?utf-8?B?emV0UHA0QU81QnlHL205UWJpN0NxVDJpTFExUmYrdFpIZ2szZ09Ma0dyUUM0?=
 =?utf-8?B?ZlBFMXNEODBIaC9rTUVYa3NxbzY5UEVRZmVHYVhqd1VHelYvK1AyV2x4UHVU?=
 =?utf-8?B?aFdHMzRLRmRySGNQd0Yvc1lCRHRqSkN2SGVOdmlkQkRLZXRzVVBIRGpxWjQw?=
 =?utf-8?B?RWpBZlFndS9PYW14cXJ5N0ozNDcvWkxtT0hzTnVzQVpGSk5lQTRKbjQ4bTZq?=
 =?utf-8?B?Um04NW85djBSQkFlbERYNWk5aGRjcWsvZ2Q1R3VZTDA5b2U1eElyQXlza20z?=
 =?utf-8?B?L1g1Sys4MHphNXpXaHgxVmFLdVE2Q0lranFvdjZyV0ZPVldCUmhQUW54ZEhp?=
 =?utf-8?B?UkNtNkEyTncyWEl6NG9LcW5GKzVEcjA3V1FlNi9Rc0k1SmxsbXoxVk0rdUF4?=
 =?utf-8?B?VDVOSTdzQVJZbHU1ZmN1NEZUTTZjbUNCYjlaajcrRjJsMSszUGRwR3MxM2px?=
 =?utf-8?B?Y244Yk5OUk5qR083MHFoc1UxbkJJT0JKcnJ6M3N1aUdEZzVuZnRIQXZqU0J4?=
 =?utf-8?B?WVBUNktPWUFQV1F4ZnhBaU5ZWENKT1ZqeGVYZXBKeThJS1V3T0Fmckp3R0Z4?=
 =?utf-8?B?eDE2cFQ5cVlJYjhBcC9QVFlBT1lxRkdRaXA1NUhkUkFjMjN2Rzhoa0dPdHBU?=
 =?utf-8?B?THFIcnhUd2tsQkpZeE5HTFdreXBJb1Uva1NMOXU0dlVkUC9NVGZHK0NZNk1u?=
 =?utf-8?B?OEh4Z09iV0VOSEFBZDdROEsrMVlFSk44dWFCTklUc1lGSjRVUlhXd0g0ajRa?=
 =?utf-8?B?NEVSSTNHakZZMUJSNndSR3NiYTJKTHZRcEt1b2llRGhIMjVGWGttcE9uVEVV?=
 =?utf-8?B?OWVuWHE5dmZUMHhpc0xMZzJ5NXNJeVZ5cW1ocHRLOExIam1WRHE0NzF3Z3Ew?=
 =?utf-8?B?dGcxd3dYdFNnPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 57f64326-fc79-49a1-7939-08da0820bc4e
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 14:16:31.9612
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: X5PsnWp63LKboya0zFibwGJNdZA/IOnZLB0/XzmpYk/780Dhe/w83t09zhytrNuXw1fZlKL7hJ5Espnw5YVvUQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR03MB3294
X-OriginatorOrg: citrix.com

On Thu, Mar 17, 2022 at 02:00:19PM +0000, Andrew Cooper wrote:
> On 17/03/2022 11:08, Roger Pau Monne wrote:
> > A side effect of ignoring such sections is that symbols belonging to
> > them won't be resolved, and that could make relocations belonging to
> > other sections that reference those symbols fail.
> >
> > For example it's likely to have an empty .altinstr_replacement with
> > symbols pointing to it, and marking the section as ignored will
> > prevent the symbols from being resolved, which in turn will cause any
> > relocations against them to fail.
> 
> I agree this is a bug in livepatch handling, but it's also an error in
> the generated livepatch.  We should not have relocations to an empty
> altinstr_replacement section in the first place.

Well, the relocation destination is in the .altinstructions section
(which is not empty). It happens however to reference a symbol that
points to the .altinstr_replacement section that's empty.

We could likely avoid generating the altinstr_replacement section in
the first place, but I think it's more robust to handle those properly
in the elf loading code.

> This will probably be from the lfences, where the replacement in a nop
> and takes no space.  I think I know how to fix this case.

Indeed, that's my understanding.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 14:22:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 14:22:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291617.495067 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUr0r-0007Ud-4o; Thu, 17 Mar 2022 14:22:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291617.495067; Thu, 17 Mar 2022 14:22:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUr0r-0007UW-1W; Thu, 17 Mar 2022 14:22:01 +0000
Received: by outflank-mailman (input) for mailman id 291617;
 Thu, 17 Mar 2022 14:21:59 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RBlk=T4=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nUr0p-0007UQ-M1
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 14:21:59 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 9a650faa-a5fd-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 15:21:58 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2108.outbound.protection.outlook.com [104.47.17.108]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-14-MgmPDf2yN1G7wTghHMdPlQ-1; Thu, 17 Mar 2022 15:21:56 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by DB8PR04MB6537.eurprd04.prod.outlook.com (2603:10a6:10:10c::28)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Thu, 17 Mar
 2022 14:21:55 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d%9]) with mapi id 15.20.5081.017; Thu, 17 Mar 2022
 14:21:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9a650faa-a5fd-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647526917;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=ZtsCjFJy3SAf5+62VquVWL7CN9CufFRJlebFQ8TFX1I=;
	b=RfkAhhRNqZFvVCH1MNBDjv5Rnfxs90+VsxEu79IX605Bt51q62mxZu0dPqbO6yGPufgHKF
	t5fZpsIAoYpsSI1Fpz9+Py9rFfIHnQLjW0JYqIA/35Plr0tF3L1t64BOjuZ+34F3eRL5Fb
	GXQf/a6eKXPfBnm5HBJ8x6Q7abyGEgE=
X-MC-Unique: MgmPDf2yN1G7wTghHMdPlQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=drPH2deXTHslqJEWFKk+1UnXZ5JeC2pgMiIoe78M/83run3ae7yhpEA8bibjqKpQLtDMik2k0r1xEoqH/5e4vBAP8cwLsLCHCCU7A0S/z8qAAdIGqCY0rPoaXgNZODWh1KegoUKbVWDpAtrsnmUNngAjc3DgGSlLAHAXHcvDqBPgCpQQJdsApvUUUiMeLI7HOuse0X3WuqZI/6f3EoA+NuO+oodcRbuPvg9Z4q3kR9GePcup3gbIokINR+J8oS92oA2X3kMJKoYC+PkP0tp5f100IRHGTB3R1FC+LxT3R4Iso7+JTcotpeGDeoVXktph6EveNCbQlKCM/dzIyzICiQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ZtsCjFJy3SAf5+62VquVWL7CN9CufFRJlebFQ8TFX1I=;
 b=Wp1MMxsUqWShtqv00QL0wpCIHodBxTlis+frJdDxtJS0bzaoHDp9T3K6Qasyi4Wd5P8UWyIyOvBx7IM9IIij8XMn1DRWhQwZBghyH/U5CaoCSODIfiKtq2onGRNOZLddurrur9yu1tYOOC7MMAA/9Z4i/2X4RqQKd5Z41p1WLZVTtvGHDH216hzBKyImHqzBiUNTEQqk3QDZC1exi3NBHC40d+P7babRSVMG7yjhXb8O4OrQCRr3X8+lHqZ269kBBdBz8gvLY6pH3yRHUj8H8vICenpL/kIJKhrKjpSgqSEWy0WFldD7XUPnThNDQUWO3ZpdSKB/Lv/MTxf5uS/kfA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <3cb4767e-4ea8-8a66-0e12-b5b5fa6bb1dc@suse.com>
Date: Thu, 17 Mar 2022 15:21:53 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v3] x86/cet: Use dedicated NOP4 for cf_clobber
Content-Language: en-US
To: Andrew Cooper <andrew.cooper3@citrix.com>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Wei Liu <wl@xen.org>, Bjoern Doebel <doebel@amazon.de>,
 Michael Kurth <mku@amazon.de>, Martin Pohlack <mpohlack@amazon.de>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <20220317140624.4258-1-andrew.cooper3@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220317140624.4258-1-andrew.cooper3@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P192CA0032.EURP192.PROD.OUTLOOK.COM
 (2603:10a6:209:83::45) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: e2b41dc6-6b41-49a8-d25a-08da08217d1b
X-MS-TrafficTypeDiagnostic: DB8PR04MB6537:EE_
X-Microsoft-Antispam-PRVS:
	<DB8PR04MB6537EC26FF9518F00AC7F8A7B3129@DB8PR04MB6537.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2906002)(86362001)(31696002)(6916009)(8936002)(54906003)(38100700002)(66946007)(316002)(5660300002)(8676002)(4326008)(66476007)(66556008)(53546011)(6512007)(6506007)(2616005)(186003)(26005)(6486002)(508600001)(31686004)(36756003)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?WVJGakVBUkxPcWJUM05RbkhUNnY1eWlmTk9NUzZUZE9CUUdseUprSXJlS3Rz?=
 =?utf-8?B?V0Z5V0V4bzdqMjg0NHYvb3dLSEVkbWFWZDQ2RzVpZElkOVVpWVBtSzVETDBK?=
 =?utf-8?B?bnJKWm9xbG1CRG5SL01UeXIvWGJMZEVSTDJIN0hPa1hITE9BbVVlcGppTXZ6?=
 =?utf-8?B?V1ZIZ21DRVF6eCtsT1Z2YzVOSWlYTjFDdFhsMEhiNS9ZTjY0RWg0M1U0bE5Y?=
 =?utf-8?B?K0FsbjY2clZhMTNod2hFcVhiVDJIaHRNM0JlTmtzbHM4S0NiN2tMQUhNNXAx?=
 =?utf-8?B?d2V2V3ZtMTBxRmxiejVxZFhsOGlkMSsydFVyOHI2S2VqN1RrNHdnbVF5U0g4?=
 =?utf-8?B?ZklpNExlQ3Q1Y29hOXdGTGF5OUpNeCs4cHFlRzJUeGtTR3RLK3hLcjA0T2po?=
 =?utf-8?B?bjNiWUVDSTFpbkdLR0Y0NHVuN2RIeW9oUVVFMko2czA0VDlNU1lSNDNMMHFF?=
 =?utf-8?B?S295MFNzeFIvVjhlbW1vQ0Uvb0NsOTVyc05wd3VCTFYwOE81UWZGWWJ6ZUJp?=
 =?utf-8?B?cVE3RzYyNktFdVo1WitvQlZBa2hMM0VDOVB3RFZ6bFozanUrbHdwOWZEcHhv?=
 =?utf-8?B?aHVCSkxJZDlnM2pTQUtjRnc2QTBIY3NTK1plTkJvZnVBSzZYRytEYlBJd3ZM?=
 =?utf-8?B?bUlKWDRPelJEcGNnYUt6Tk9HSDhmK1VqclZHZFdKS204blpNOTJ3dEFaY1dI?=
 =?utf-8?B?NFFrUFYrVjYyVVFjSGZxdWNZWDlNTDQzcjE3blMrUldscGpqOUpiajkxU1RI?=
 =?utf-8?B?eU1NcjBaMkNDbHBMb3hKU09hcGZaaUZjckcvczJGRWlsNTd2YXBoV2VUZ0d3?=
 =?utf-8?B?S2hRdSthSDQ3eS8zbFdHK3JWQnFoZ3N2ellrelV2RGd3MFFFRTBwUWVnNG55?=
 =?utf-8?B?THAyMy9UWEljb05EaHMyNjIvSzd4eVVsK2szV2F4NHpLK0dyWEs4bUE0em1E?=
 =?utf-8?B?clA5VmVQczdNUnErcGswL3U3aUVpU0lhVkF4SWI4TWhJeCtLUVhKOEh6MkNG?=
 =?utf-8?B?WkhvMURlT0tSUU1POXpWZXYzUlNJSXNFZFNLQkRzaXA1VkppT0s1UFZmWW5V?=
 =?utf-8?B?MGtBblRHbWNQN2ZOZ3cwRGdzWXBCMHpLeE41amZteDZuWDhkSWpmNnVnQk0v?=
 =?utf-8?B?Wm55TmI3blFvWEM1UkdLMEhyS0pBWGlOdDN3eEJGV0FtR0REVmVpdVZSQjk4?=
 =?utf-8?B?WnRqdjQzdVRZNzdrT29GTGIwYUVZTEpLL05MM2dWRFRmZEwwY2dRRUloYUww?=
 =?utf-8?B?MUZ5dEpzemVvVUFkajR4R3diYVg3Tk1kdnNDbEhMZXlJdm9sVjdQMmVvY3h5?=
 =?utf-8?B?dzlXMXhZQ0wwTERVOXBzOGQ0eUpxbnNFc1pTR00xUnFndjlkTE5EenRPM252?=
 =?utf-8?B?cUJQSkJ0UllYaG1uZXppWlZrQldobEpJbGtJTHkvRnhseEI3QWRQUlQrUFZs?=
 =?utf-8?B?QkpLNmhlem5DYnFtTVBtUTdLQ2o5MlR4NGlXai9SRkNEejdUc0xWbkFFSE5o?=
 =?utf-8?B?b2JIVFdoZzlWd01xQ2J2bFp5cGVkK3pPbFhoMXM3OHJLRVg3UlhRNVNDNkJM?=
 =?utf-8?B?WGp1R2RJVVdZT3BVL3lVdlZIanRCcEVtT0xveUgvTzNtM1VhQlgrZzkyRTlu?=
 =?utf-8?B?ZW8wc0tiUSt2SnlvcUd4bXBQSzFtTEcyNnR5K1lDc3J1SWlGNzdHT2R6QUND?=
 =?utf-8?B?UTdRSjlNRXcvQmdGNjVOWWJkZytRWUpxSkVnUFdPN2pwZ0licXBDN2huZXhY?=
 =?utf-8?B?MEwyTDh6V0Q0eElLTXFYQVJTM2g1aTJFbjBCdGpJODVaVGRwdHdwajVSSHI4?=
 =?utf-8?B?RnNuYzFaajhqK2N4b3MzTFZBUEtFR0crSVJjYldZYitwaHZoM1NPckZGWmRr?=
 =?utf-8?B?aE9MY3A4OHA5cGJ0ZEJIRGFhaUFoUmdvOHBWWFhuY1RqZlRIbnZ3TGN1a1dh?=
 =?utf-8?Q?WmCOq1qEzxn5z4UgZ0Jh3F9NdDpvqSuF?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e2b41dc6-6b41-49a8-d25a-08da08217d1b
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 14:21:55.4507
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: gP/eUG4AZW/GmjYlEtpBccGisooua062QTTbctpBMamBtZjCYVQP/JkBTuciJgJ/IyACVgWwOzyRQfQ5jtnEUw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR04MB6537

On 17.03.2022 15:06, Andrew Cooper wrote:
> For livepatching, we need to look at a potentially clobbered function and
> determine whether it used to have an ENDBR64 instruction.
> 
> Use a non-default 4-byte P6 long nop, not emitted by toolchains, and extend
> check-endbr.sh to look for it.  The same logic can check for the absence of
> any endbr32 instructions, so include a check for those too.
> 
> The choice of nop has some complicated consequences.  nopw (%rax) has a ModRM
> byte of 0, which the Bourne compatible shells unconditionally strip from
> parameters, meaning that we can't pass it to `grep -aob`.
> 
> Therefore, use nopw (%rcx) so the ModRM byte becomes 1.
> 
> This then demonstrates another bug.  Under perl regexes, \1 thru \9 are
> subpattern matches, and not octal escapes, while the behaviour of \10 and
> higher depend on the number of capture groups.  Switch the `grep -P` runes to
> use hex escapes instead, which are unambiguous
> 
> The build time check then requires that the endbr64 poison have the same
> treatment as endbr64 to avoid placing the byte pattern in immediate operands.
> 
> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>

Reviewed-by: Jan Beulich <jbeulich@suse.com>
with one nit (which likely I should have spotted before):

> @@ -45,13 +45,15 @@ echo "X" | grep -aobP "\130" -q 2>/dev/null || perl_re=false
>  ${OBJDUMP} -j .text $1 -d -w | grep '	endbr64 *$' | cut -f 1 -d ':' > $VALID &
>  
>  #
> -# Second, look for any endbr64 byte sequence
> +# Second, look for all endbr64, endbr32 and nop poison byte sequences
>  # This has a couple of complications:
>  #
>  # 1) Grep binary search isn't VMA aware.  Copy .text out as binary, causing
>  #    the grep offset to be from the start of .text.
>  #
>  # 2) dash's printf doesn't understand hex escapes, hence the use of octal.
> +#    `grep -P` on the other hand can has various ambiguities with octal-like
> +#    escapes, so use hex escapes instead which are unambiguous.

There looks to be a stray "can" in here.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 14:26:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 14:26:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291620.495079 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUr4i-00086y-L6; Thu, 17 Mar 2022 14:26:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291620.495079; Thu, 17 Mar 2022 14:26:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUr4i-00086r-IC; Thu, 17 Mar 2022 14:26:00 +0000
Received: by outflank-mailman (input) for mailman id 291620;
 Thu, 17 Mar 2022 14:25:59 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=WHX2=T4=srcf.net=amc96@srs-se1.protection.inumbo.net>)
 id 1nUr4h-00086k-GW
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 14:25:59 +0000
Received: from ppsw-41.csi.cam.ac.uk (ppsw-41.csi.cam.ac.uk [131.111.8.141])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2939a01c-a5fe-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 15:25:58 +0100 (CET)
Received: from hades.srcf.societies.cam.ac.uk ([131.111.179.67]:47826)
 by ppsw-41.csi.cam.ac.uk (ppsw.cam.ac.uk [131.111.8.139]:25)
 with esmtps (TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
 id 1nUr4e-000Sq8-SH (Exim 4.95) (return-path <amc96@srcf.net>);
 Thu, 17 Mar 2022 14:25:56 +0000
Received: from [192.168.1.30] (unknown [84.66.49.165])
 (Authenticated sender: amc96)
 by hades.srcf.societies.cam.ac.uk (Postfix) with ESMTPSA id 88EE31FABC;
 Thu, 17 Mar 2022 14:25:56 +0000 (GMT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2939a01c-a5fe-11ec-8eba-a37418f5ba1a
X-Cam-AntiVirus: no malware found
X-Cam-ScannerInfo: https://help.uis.cam.ac.uk/email-scanner-virus
Message-ID: <c028a0e8-4818-f648-5b9c-44539a426362@srcf.net>
Date: Thu, 17 Mar 2022 14:25:55 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH 1/2] livepatch: do not ignore sections with 0 size
Content-Language: en-GB
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Andrew Cooper <Andrew.Cooper3@citrix.com>
Cc: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
 Ross Lagerwall <ross.lagerwall@citrix.com>
References: <20220317110854.39050-1-roger.pau@citrix.com>
 <20220317110854.39050-2-roger.pau@citrix.com>
 <7443a703-6215-1b8f-a6c7-bab606ad016a@citrix.com>
 <YjNCu9nD30DkLZX9@Air-de-Roger>
From: Andrew Cooper <amc96@srcf.net>
In-Reply-To: <YjNCu9nD30DkLZX9@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

On 17/03/2022 14:16, Roger Pau Monné wrote:
> On Thu, Mar 17, 2022 at 02:00:19PM +0000, Andrew Cooper wrote:
>> On 17/03/2022 11:08, Roger Pau Monne wrote:
>>> A side effect of ignoring such sections is that symbols belonging to
>>> them won't be resolved, and that could make relocations belonging to
>>> other sections that reference those symbols fail.
>>>
>>> For example it's likely to have an empty .altinstr_replacement with
>>> symbols pointing to it, and marking the section as ignored will
>>> prevent the symbols from being resolved, which in turn will cause any
>>> relocations against them to fail.
>> I agree this is a bug in livepatch handling, but it's also an error in
>> the generated livepatch.  We should not have relocations to an empty
>> altinstr_replacement section in the first place.
> Well, the relocation destination is in the .altinstructions section
> (which is not empty). It happens however to reference a symbol that
> points to the .altinstr_replacement section that's empty.
>
> We could likely avoid generating the altinstr_replacement section in
> the first place, but I think it's more robust to handle those properly
> in the elf loading code.

Actually, it turns out it's distinctly non-trivial to omit these
references.  We need to put the replacement somewhere, so we can
subtract the start from the end, and figure out if it is 0.

~Andrew


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 14:27:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 14:27:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291623.495090 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUr5k-0000EN-V3; Thu, 17 Mar 2022 14:27:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291623.495090; Thu, 17 Mar 2022 14:27:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUr5k-0000EG-RT; Thu, 17 Mar 2022 14:27:04 +0000
Received: by outflank-mailman (input) for mailman id 291623;
 Thu, 17 Mar 2022 14:27:03 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=YpXL=T4=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nUr5j-0000E4-DC
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 14:27:03 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05on20605.outbound.protection.outlook.com
 [2a01:111:f400:7d00::605])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4f8d0b81-a5fe-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 15:27:02 +0100 (CET)
Received: from AM6P193CA0082.EURP193.PROD.OUTLOOK.COM (2603:10a6:209:88::23)
 by DB9PR08MB6682.eurprd08.prod.outlook.com (2603:10a6:10:2a2::11) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Thu, 17 Mar
 2022 14:26:58 +0000
Received: from VE1EUR03FT061.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:88:cafe::8f) by AM6P193CA0082.outlook.office365.com
 (2603:10a6:209:88::23) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.16 via Frontend
 Transport; Thu, 17 Mar 2022 14:26:58 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT061.mail.protection.outlook.com (10.152.19.220) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Thu, 17 Mar 2022 14:26:58 +0000
Received: ("Tessian outbound 18e50a6f0513:v113");
 Thu, 17 Mar 2022 14:26:57 +0000
Received: from 69ea02f73586.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 87C3E9C2-C568-45B5-B49A-CD2E61E96320.1; 
 Thu, 17 Mar 2022 14:26:51 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 69ea02f73586.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 17 Mar 2022 14:26:51 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by AM5PR0802MB2402.eurprd08.prod.outlook.com (2603:10a6:203:a1::11)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Thu, 17 Mar
 2022 14:26:49 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5061.029; Thu, 17 Mar 2022
 14:26:49 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4f8d0b81-a5fe-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=wTbuv1OG2z8KtCobnG44/z7NMNoBKzoTcwYpriokduw=;
 b=8RWRh5iOVPQdfwdQOvsXkQCRhrVFSY6f1rrR128PWhqiF+cvTrL06f70MUj2y4ffayotXVfnh652jZKr4yM6lBhwsVXb6/npwtBrAInVg7/O8zCcn4Dtt2yaxheJOXiNTv4KWW0/um0MlaWBWsektpYN5PW+o/auy7Uv2VN+IDg=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 1dbc3b5ee19133be
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=LSG2mB5SCbYYTfxDxsijHBUci4Es6GMha00kP4ZHv+zim/TTPBLUBej7afKLl18AmJ67t8wx5/5D79D8LQBSfvYrG8c8DR4pkZVsTRYQgpG2rsm7/HyHUqooidCQiogISwNVcLhKkeJrwPxk7oxEcFG9it8/3ZqFpOYUNPK0xsbJZQhDdb4H2Xe2fu8kwSo0SCLoiwJST4VZL5Ex1Uo0RJ/0vOVDHRuRspWOgkWmKDRa4WwVXzKMdwB1aqDkyrOEVQNdBs7B4w9JqUZj9OZrZ1OpmLDBOUJjaFOJn+eDi7ZvA9ZGxUfs0R1l2NGyloI/Sz2NUgpXRUv6RWQ0xG7sOg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=wTbuv1OG2z8KtCobnG44/z7NMNoBKzoTcwYpriokduw=;
 b=jf/eHhf1eiYQNYG4mFGPmlWMwxnZSXpay64TKpr+sQYADW1LuUEggzt1+wiSF3FHApgzE3ox7D8IoGOgpuyhLIWGQEtUUEUDZ6AsbzeMMLN/u448KSjXb6LjiYcnmpvlJXgfBOyNDJNb7dfgOMbBj2rsh6ynmgMnlSQdmGnA1N9xf+B56oIoEeMpcX4q5TRlu4kD+Bk2NZ+6Hfa+EM/bmZDJo2EKgjPMbq3NQe9hlE5HoWiJ0FI8cINTMiuXuOq4iIZCKfifGTKtOvWw4eN8jMFDjsjw4Lf1YRTg5zPOsdYOc0x7GTUjpsY+1xP34yozMM+/m0Uxv9JZVkA9sFhV8w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=wTbuv1OG2z8KtCobnG44/z7NMNoBKzoTcwYpriokduw=;
 b=8RWRh5iOVPQdfwdQOvsXkQCRhrVFSY6f1rrR128PWhqiF+cvTrL06f70MUj2y4ffayotXVfnh652jZKr4yM6lBhwsVXb6/npwtBrAInVg7/O8zCcn4Dtt2yaxheJOXiNTv4KWW0/um0MlaWBWsektpYN5PW+o/auy7Uv2VN+IDg=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Andrew Cooper <amc96@srcf.net>, Raphael Ning <raphning@gmail.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, George Dunlap
	<george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien Grall
	<julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, Wei Liu
	<wl@xen.org>, David Vrabel <dvrabel@amazon.co.uk>
Subject: Re: [XEN PATCH] evtchn/fifo: Don't set PENDING bit if guest
 misbehaves
Thread-Topic: [XEN PATCH] evtchn/fifo: Don't set PENDING bit if guest
 misbehaves
Thread-Index: AQHYOWUxkkWcdQhaQka74jKAOHn9V6zCXPqAgAFGTQA=
Date: Thu, 17 Mar 2022 14:26:49 +0000
Message-ID: <5B2CF3C1-345B-45C8-8E6E-CC118015F4FA@arm.com>
References:
 <6b84a20b2753130cc62406a0fd14d2708f6f504b.1647455219.git.raphning@amazon.com>
 <e07d0eda-c117-c83e-227e-7a934585f265@srcf.net>
In-Reply-To: <e07d0eda-c117-c83e-227e-7a934585f265@srcf.net>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 0887fdbc-abd7-45bc-d836-08da082231a9
x-ms-traffictypediagnostic:
	AM5PR0802MB2402:EE_|VE1EUR03FT061:EE_|DB9PR08MB6682:EE_
X-Microsoft-Antispam-PRVS:
	<DB9PR08MB66829574A6F28AC80AAC34E0E4129@DB9PR08MB6682.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 qVebonQsZA1xZdVdQiM4P5MwBj8Dy7ZGIypPrtGxWWM8m5yZijIqfB+n2O+JB74Z9IoXyylwh8fLENaTOaK4gbugducUgvBb/4jdvPaIj4dZRPkhs1MwFwYdahCJsFdYHnV3MeDTmKnrKPVeJZ0ZbWBf6Ui4dodP48HN5kdm56sz7zLluJClsG2DcpfmWCN8qZqerwFkmQ9U9l1tXrqfYmbbaVl7dXr3G6JwIDJKbj7CkcOWhAUdM5mQXjfZGqTRw8/5rGhdcluCXek5RrepMEGD2pW+XgIWs5df0aPPXOAuAXosJEwT/CrXgr/n/OUSSBuDqTyhca0A9KTjRvQhcEWfCUdlaqUm+EvfYXkcGH9+m91jWY9zoj/VDGu/3/5ZYzgzmT8td1K8BtIbbjzXct01HnuqtVYNcdVhpHBVUTtaZB+fg0vWKaaM9ynCNLUl/NNkWhI0R6Aw6MzovLxa7Tp21UedsW0CTSwAca7ig/v6JMeppENcGsLuWRKhdH7AdSt9Sa8NxhUqu1/IjxbBcG6Y/nSo5ZSly25vy2k/nbcrEQI6SZbPgc8N4E9LRK6PWu6hxDrCCYVifL/2EnuDHnyLgGYMx+0jahpNMQLJuACfSPgS13q2ETcpekzGR20DNLxZ0FFqIa+89U572r0iRrWaqQBD1BVGc6mTNnyXn7bUGkw7KDpaf6GksT4WMiuIsxePzrExA2KZfsyh0TRNhzgdAcpxjIZ11+b+SRC+fa8=
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(53546011)(6512007)(26005)(38070700005)(2906002)(186003)(2616005)(83380400001)(33656002)(38100700002)(122000001)(6486002)(76116006)(4326008)(64756008)(66476007)(66446008)(66556008)(5660300002)(71200400001)(8936002)(66946007)(91956017)(36756003)(508600001)(110136005)(316002)(54906003)(86362001)(6506007)(8676002)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <0A00B23C3F7EBE479B6FE71A3293A0DB@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0802MB2402
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT061.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	b7d201eb-7c60-4b89-c189-08da08222cb2
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(508600001)(6486002)(2906002)(54906003)(110136005)(316002)(86362001)(8676002)(82310400004)(4326008)(70206006)(33656002)(40460700003)(70586007)(5660300002)(36860700001)(6512007)(83380400001)(8936002)(336012)(186003)(26005)(47076005)(2616005)(6506007)(107886003)(36756003)(81166007)(356005)(53546011);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 14:26:58.0377
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 0887fdbc-abd7-45bc-d836-08da082231a9
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT061.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR08MB6682
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==


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 14:29:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 14:29:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291627.495101 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUr8P-0000xO-EE; Thu, 17 Mar 2022 14:29:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291627.495101; Thu, 17 Mar 2022 14:29:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUr8P-0000xF-Ap; Thu, 17 Mar 2022 14:29:49 +0000
Received: by outflank-mailman (input) for mailman id 291627;
 Thu, 17 Mar 2022 14:29:48 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=hAZZ=T4=citrix.com=prvs=068f51ced=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nUr8O-0000x9-N9
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 14:29:48 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id adf41947-a5fe-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 15:29:41 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: adf41947-a5fe-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647527387;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=/Irteg4vs7a8bVWVjDNFHYCbuAIWQmyd5je9a7ZzyXs=;
  b=hCtmz9ixG0AAc7xxPsctBEWq1zc/bqQQB6G+U77MLffQp8GcnDkmPbM1
   dJCm4vhy6KOK2k57lYxTnRJHQtGV8uYdqpBytIC83jkpAws/gge4znc/g
   H05tx1957zwJ4lfVuG55s9+YI70/ii3wKBorrXu5rhqMknZQbc31EIPmG
   I=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66908837
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:X42eWaut+AcChFGUY9SATbe31OfnVJ9eMUV32f8akzHdYApBsoF/q
 tZmKT+HPqyMZGKhc911OYTl8hxSvJbcmoUxQFRorygwFHxD+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jU5
 ouoyyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi8JD7DXveEAWiMALA9TL4xZ1ebXA16g5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvllJyz3DAOlgapfEW6jQvvdT3Ssqh9AIFvHbD
 yYcQWQxPUyQM0YQUrsRIMMFre2wjHrNSABzp2uooKMY4WbrxwMkhdABN/KKI4fXFK25hH2wo
 2Hb1238CwMdMpqTxFKt92qrhuvGliDTUYcbBrq+sPJn6HWDy2pWBBAIWF+TpfiillX4S99ZM
 1YT+Cclse417kPDZtv3UgC8oXWElgUBQNcWGOo/gCmSzoLE7gDfAXILJhZNb9EsucseTDkjx
 FiP2d/kbQGDq5XMFyjbrO3N62rvZ25FdgfueBPoUyMl0sT4hYQuhyiXcfhOAo+qo4TlOxfvl
 mXiQDcFu50fissC1qOe9F/Bgi6xqpWhcjPZ9jk7TUr+sFonOdfNi5iArAGCsK0edNrxokyp5
 iBspiSI0AwZ4XhhfgSpSf5FIrym7u3t3Nb00Q82RMlJG9hAFheekWFsDNNWeR8B3iUsI2aBj
 KrvVeV5vsM70JyCN/MfXm5JI552pZUM7Py8PhwuUvJAY4JqaCiM9zx0aEib0gjFyRZwzv1iZ
 s7BL57zUB727JiLKhLsG4/xNpdxmkgDKZ77H8inn3xLL5LDDJJqdVv1GATXNb1ohE91iA7U7
 8xeJ6O3J+Z3C4XDjt3s2ddLdzgidCFjbbiv8pA/XrPTc2JORTB6Y9eMkOxJRmCQt/kM/gs+1
 irmAREwJZuWrSCvFDhmnVg4MeKxB8kj9SxnVcHuVH7xs0UejU+UxP53X7M8fKU99fwlyvhxT
 vIffN6HDOgJQTPCkwnxp7GkxGC+XHxHXT6zAhc=
IronPort-HdrOrdr: A9a23:/z69xKvJJhj6ReSLlugKZgnI7skDT9V00zEX/kB9WHVpm5Sj5q
 OTdYcgpH3JYVcqKRcdcL+7WZVoLUm3yXcX2/hpAV7BZmnbUQKTRekI0WKI+VHd8ljFmNK1op
 0OT0ERMrDN5BNB/KPHCUGDYrIdKfe8gceVuds=
X-IronPort-AV: E=Sophos;i="5.90,188,1643691600"; 
   d="scan'208";a="66908837"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=E96+/A7BLp7RLp7UYW49qUDVxqQC+JhspMrWa5U5HBax70h3u+dpw9CgvA8l31bHAn/F/2bOXvV1gbxRt/rKAuS/qyQKNPb12sNJBAGS8bmQwfLbKTKfHWueuqp0uXonYgmP0Ovn28Y9jvB/x8BCZ9vrCfDrUpYOLaW5lSWlNh113ygxLMlJAegZWxvTVg97jhiKHF81/VfwBYaleVD0QlW5lluKodSgLRaqZ/MKA0rL5MtoQLgRhYPR2K1zegUKwe5FZue+lAD5JeLQaKBmFOSARVr3xdrtDH55k9GNMlCvhhSlrmsvHtysYC3PocveoZlYfbh1czf/HmjyIkYVsw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=/Irteg4vs7a8bVWVjDNFHYCbuAIWQmyd5je9a7ZzyXs=;
 b=Af4lXlvVM9HjEv5BNla1RmkZylfj1UZ09BFKgmBZWrF9J8APKpt+X8X7ffxdsMmy+Qhb/hmoACLsgY9S9qgCd9VKM5me6PjLekMZxE9HuUPSecS2XVUZYRLyrfrqTVdBwhywAwswTwyk/u/cw6mGeep7oM3L4R9RKM4Xa+SeWknkPOmouvSV6pO4s79v0n3tnX4Dc6/KjUV6IbKRXr9SGx+2Ghe1qJRdBW1x6jRaMx4urD8Dht2g1Ota3QyJ29y2jlKKA2WghNL/Isia5ZSCDi3MuS6jCxiFva6XpYC2mGZze4VoVo6TDAkKpCSOxZGlmJ2XqNbIrGjU7Mye+1kD1w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=/Irteg4vs7a8bVWVjDNFHYCbuAIWQmyd5je9a7ZzyXs=;
 b=pQ58F/lBJ+7U3GUE5lBESt2hFSof0Y3FGhLbgPe+AdTrQ4En1404KlQuJuJJglqgiCa24kclFB6zrJQPUmuxXyGE5+OhmlnmbeaywCtWo6sK3vrFnodzGxfi5EHiMIXUO4LmnBhUV55iPI6gtrOpY1hUhC6lnsujjRxZj4XVtmc=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>, "Bjoern
 Doebel" <doebel@amazon.de>, Michael Kurth <mku@amazon.de>, Martin Pohlack
	<mpohlack@amazon.de>, Xen-devel <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v3] x86/cet: Use dedicated NOP4 for cf_clobber
Thread-Topic: [PATCH v3] x86/cet: Use dedicated NOP4 for cf_clobber
Thread-Index: AQHYOghShtEsT1aba0eWFJLpGnMDLazDoKGAgAACLoA=
Date: Thu, 17 Mar 2022 14:29:42 +0000
Message-ID: <87c16705-59b9-450a-6664-1aceec0b0cbb@citrix.com>
References: <20220317140624.4258-1-andrew.cooper3@citrix.com>
 <3cb4767e-4ea8-8a66-0e12-b5b5fa6bb1dc@suse.com>
In-Reply-To: <3cb4767e-4ea8-8a66-0e12-b5b5fa6bb1dc@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 9058eeb0-fa16-48bd-c2d7-08da08229384
x-ms-traffictypediagnostic: DM6PR03MB5162:EE_
x-microsoft-antispam-prvs: <DM6PR03MB5162C4749E6E8CABE3034E2ABA129@DM6PR03MB5162.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BN7PR03MB3618.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(36756003)(186003)(26005)(31686004)(2616005)(2906002)(82960400001)(122000001)(6512007)(86362001)(54906003)(31696002)(71200400001)(8936002)(38100700002)(5660300002)(6916009)(316002)(4326008)(91956017)(53546011)(8676002)(76116006)(66476007)(66446008)(66556008)(66946007)(64756008)(508600001)(6506007)(38070700005)(6486002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?bk1qcHE0RUNFR1JtWWNlbUc5VTBjaWY0V1hPSFhDNFZWVTJtMGNYdnkwcGpI?=
 =?utf-8?B?d0lxZnBGNXlFY2VpWTRGejJPOFVRT1pjOHZheGJMZ25RRHhIM3FwVkhkbmVB?=
 =?utf-8?B?cDhFSW5nWGlGVTg0UGVzU2pNdFpKMEFaaEI1dlA0NUh2VzVSS0J1SzZkeVFv?=
 =?utf-8?B?RytUVDFtOTVDekQ0WFMzVzdpZDVudzBkb3p3emVsYkNidFBqSzl2SXJ0cEI1?=
 =?utf-8?B?Q05GRGtLUGlTeFNwVnJQbGEwQ2hnZXdwU2lPUk5XZ000c3Q5ZkVhSlU2aDZv?=
 =?utf-8?B?SW9PeFVjYzVsRStqWFplUTl0d2JkY1plLzFYSmEvWWVHdXh2VFVQd2NlcEtK?=
 =?utf-8?B?SExQVnRTR29DU2djZ2pCNk8zVVRJbTFIbG5OZ3QwdDdkckdFcllUVFBRTXJL?=
 =?utf-8?B?WlJiNmV4T2xPOTBwbEJVYnVMYmtsaEpxMW1PYzBTdVpFeTBsMlE5MVpEZnQ1?=
 =?utf-8?B?NklTdC9zNXczK3dRdW5PUDdWbWFmdlQxaFczZDM2clhLM1JNMVVtK2MxdzhT?=
 =?utf-8?B?bTVjY05Fd2liYndWOUMwUDhBK2tVQlpmTXNMTVN0UHNBSmNhRDJjV0c2K1Qx?=
 =?utf-8?B?RzYzUDdaeFpPYVpNdDZPaUlqVEVxb2Y1Tk52WmtBeHkvRmdLbE91blRjUjJr?=
 =?utf-8?B?RkYwWVZvcHcrZVcxSFYvbmExVzQrcGxjQVdoN1pmZ0FYVXB3WVBYSzFVWCsy?=
 =?utf-8?B?bEVrZUJlVXE1eW9wUHRHYzZxZ3NybHdGYjJFUzgxVnV1L1BibW03Zkw3cFlK?=
 =?utf-8?B?Q0x5aWxEWVZQZTk1clJja1l4ZHF0MkFFYmVFV3BIb1JEUTd5cGdkREpPWjV5?=
 =?utf-8?B?L2VwTERjM2Y0YzNCeGE0dHFQeHJxZGZpNGpOdVNwUmFDZEwxV0RJZzNXQ2NJ?=
 =?utf-8?B?M2I1bjk3dFFSOFZ4VmY0cEJ0UmdjZHJJTllRODFpY0pEZ0VPY0cweTV5ZUJ3?=
 =?utf-8?B?WTNlOEEvZ1RTUi8ydnJyeHNUZUhRaW00Y0NNdDNTdm9pcmVrS2Q3aGI5ZWlP?=
 =?utf-8?B?S2oycW5mY1NrT1RKTm9sbHdIRUIvMFloanNWUTloMGJycWNaKzY3MTRGaVdH?=
 =?utf-8?B?TXA0T2FEVlY0Z0ZPaG4yQi9Mdm1reGgvaE1EbTh1RzNZdTFzbDJRMXptQ0Vr?=
 =?utf-8?B?Y2tJeVpMa2FSUFRuYlY3c1BHS2ZsSnNsaXVSUTYzRVVBTzFaVmpxb2tkemQz?=
 =?utf-8?B?cGlibVpTODNoRGp6OUNTaVFyZSszQTRqUis5a1JhTTNFSVdIL2d4Q1ZheEds?=
 =?utf-8?B?NWNTckpGbElHREhLLzBsb2d4dFFDSUpXNjNDdVJIeisxNDlOeUI2K1N5UFgy?=
 =?utf-8?B?ZlFGMXhOS3dtWk1qblUyVXV4dldEOXFZMkcvVGdTWG9rL1FNcVNHRlR3aVI2?=
 =?utf-8?B?ZnlvVzY1dUhXMUJyRmNleUh5ZnN3U3FrNnhWZk5Sc2w1SEtxSGdya1hEZ1lr?=
 =?utf-8?B?akhPTGwxUGx4dUxSVVV1NnBRR1ZneS9mMitXOUM0Q0FIQzkzcm1QQXM0L1pO?=
 =?utf-8?B?WE5jMno5SzVaS1lPS0g0YjhKZno2NEZzOFVYOG8rK3ZpMlJQZnNSVElLRGFn?=
 =?utf-8?B?UjBEUEp5RE1IVkhSenE5cjJUVzlpOHVRZWJiYmdTWkJFZUJKMXg5UzNaZERS?=
 =?utf-8?B?TjNBMUFNM0dVdWdOcENiVnpaaGh2a1FYYnhrY2p2cGtFeTB3VHQ4VlEvaWRU?=
 =?utf-8?B?K2dGN3VXTldiL3NzN0V6alJHSTJoeFYycVpCdVdGT1c0WTZ5cjFmbVFaUGE3?=
 =?utf-8?B?Tk1IVXluQUhhV1J3dzdIUDBGeExCa1RnMnl3Y2VOZ0ErcWxVL1R3TUJWUGt2?=
 =?utf-8?B?NDFJZ2JEVzF4YklUR1NFUlQ4bWlhU2V3SlpxcFpVQjk5VjJqVktuMGtEcHZm?=
 =?utf-8?B?aVNNWHI5VlM3a3lMRmU2TWk5bVp3RlB2Y284VU40TVRSWmdkeHBCRkxsaThS?=
 =?utf-8?Q?GpE4vnWrhItyNogzaiMf72gHMQwhfP1d?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <4D9D7BD64B45D34C970030DF16AC6167@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN7PR03MB3618.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 9058eeb0-fa16-48bd-c2d7-08da08229384
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Mar 2022 14:29:42.2426
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: q94BYFohs1LMEZ3F+Tr1CRgfpqLUT+TmGzdQ1V5gUHrKI+UH/8shMJNr1Dlcslrtw1775uV8UrHqe+VimPyc1ntlbGI/dBhQw2t91e0aB3c=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR03MB5162
X-OriginatorOrg: citrix.com

T24gMTcvMDMvMjAyMiAxNDoyMSwgSmFuIEJldWxpY2ggd3JvdGU6DQo+IE9uIDE3LjAzLjIwMjIg
MTU6MDYsIEFuZHJldyBDb29wZXIgd3JvdGU6DQo+PiBGb3IgbGl2ZXBhdGNoaW5nLCB3ZSBuZWVk
IHRvIGxvb2sgYXQgYSBwb3RlbnRpYWxseSBjbG9iYmVyZWQgZnVuY3Rpb24gYW5kDQo+PiBkZXRl
cm1pbmUgd2hldGhlciBpdCB1c2VkIHRvIGhhdmUgYW4gRU5EQlI2NCBpbnN0cnVjdGlvbi4NCj4+
DQo+PiBVc2UgYSBub24tZGVmYXVsdCA0LWJ5dGUgUDYgbG9uZyBub3AsIG5vdCBlbWl0dGVkIGJ5
IHRvb2xjaGFpbnMsIGFuZCBleHRlbmQNCj4+IGNoZWNrLWVuZGJyLnNoIHRvIGxvb2sgZm9yIGl0
LiAgVGhlIHNhbWUgbG9naWMgY2FuIGNoZWNrIGZvciB0aGUgYWJzZW5jZSBvZg0KPj4gYW55IGVu
ZGJyMzIgaW5zdHJ1Y3Rpb25zLCBzbyBpbmNsdWRlIGEgY2hlY2sgZm9yIHRob3NlIHRvby4NCj4+
DQo+PiBUaGUgY2hvaWNlIG9mIG5vcCBoYXMgc29tZSBjb21wbGljYXRlZCBjb25zZXF1ZW5jZXMu
ICBub3B3ICglcmF4KSBoYXMgYSBNb2RSTQ0KPj4gYnl0ZSBvZiAwLCB3aGljaCB0aGUgQm91cm5l
IGNvbXBhdGlibGUgc2hlbGxzIHVuY29uZGl0aW9uYWxseSBzdHJpcCBmcm9tDQo+PiBwYXJhbWV0
ZXJzLCBtZWFuaW5nIHRoYXQgd2UgY2FuJ3QgcGFzcyBpdCB0byBgZ3JlcCAtYW9iYC4NCj4+DQo+
PiBUaGVyZWZvcmUsIHVzZSBub3B3ICglcmN4KSBzbyB0aGUgTW9kUk0gYnl0ZSBiZWNvbWVzIDEu
DQo+Pg0KPj4gVGhpcyB0aGVuIGRlbW9uc3RyYXRlcyBhbm90aGVyIGJ1Zy4gIFVuZGVyIHBlcmwg
cmVnZXhlcywgXDEgdGhydSBcOSBhcmUNCj4+IHN1YnBhdHRlcm4gbWF0Y2hlcywgYW5kIG5vdCBv
Y3RhbCBlc2NhcGVzLCB3aGlsZSB0aGUgYmVoYXZpb3VyIG9mIFwxMCBhbmQNCj4+IGhpZ2hlciBk
ZXBlbmQgb24gdGhlIG51bWJlciBvZiBjYXB0dXJlIGdyb3Vwcy4gIFN3aXRjaCB0aGUgYGdyZXAg
LVBgIHJ1bmVzIHRvDQo+PiB1c2UgaGV4IGVzY2FwZXMgaW5zdGVhZCwgd2hpY2ggYXJlIHVuYW1i
aWd1b3VzDQo+Pg0KPj4gVGhlIGJ1aWxkIHRpbWUgY2hlY2sgdGhlbiByZXF1aXJlcyB0aGF0IHRo
ZSBlbmRicjY0IHBvaXNvbiBoYXZlIHRoZSBzYW1lDQo+PiB0cmVhdG1lbnQgYXMgZW5kYnI2NCB0
byBhdm9pZCBwbGFjaW5nIHRoZSBieXRlIHBhdHRlcm4gaW4gaW1tZWRpYXRlIG9wZXJhbmRzLg0K
Pj4NCj4+IFNpZ25lZC1vZmYtYnk6IEFuZHJldyBDb29wZXIgPGFuZHJldy5jb29wZXIzQGNpdHJp
eC5jb20+DQo+IFJldmlld2VkLWJ5OiBKYW4gQmV1bGljaCA8amJldWxpY2hAc3VzZS5jb20+DQoN
ClRoYW5rcy4NCg0KPiB3aXRoIG9uZSBuaXQgKHdoaWNoIGxpa2VseSBJIHNob3VsZCBoYXZlIHNw
b3R0ZWQgYmVmb3JlKToNCg0KVW5saWtlbHksIHNlZWluZyBhcyB0aGF0IHdhcyBwYXJ0IHRoYXQg
SSByZXdyb3RlIGJldHdlZW4gdjIgYW5kIHYzLg0KDQpXaWxsIGZpeC4NCg0KfkFuZHJldw0K


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 14:38:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 14:38:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291631.495111 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUrGG-0002PQ-7V; Thu, 17 Mar 2022 14:37:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291631.495111; Thu, 17 Mar 2022 14:37:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUrGG-0002PJ-4e; Thu, 17 Mar 2022 14:37:56 +0000
Received: by outflank-mailman (input) for mailman id 291631;
 Thu, 17 Mar 2022 14:37:55 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUrGF-0002P9-25; Thu, 17 Mar 2022 14:37:55 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUrGE-00047x-W5; Thu, 17 Mar 2022 14:37:54 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUrGE-0003EY-Kz; Thu, 17 Mar 2022 14:37:54 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUrGE-0005OG-KX; Thu, 17 Mar 2022 14:37:54 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=EXdo4FqPTlyJQkwICsF2axEiJAbFfoul7OFKSEJ388M=; b=lvBvxoOV5l7cdRE1PaDRGBLmNp
	gbuZsPlvPhywzW9ERCGvKVEgBKenEZKAH7CYqRKB5qXlhSQtG++tRuQJIbGo1s1crcAqCZh4SI1UV
	pYXrjA6NBUdjXh044yhmdw0t3eUVsKtTuHXx1kKuS00ieCFUCIdsb+61VQk0TMn5+w8o=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168663-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168663: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=411b3ff6ddb4042374a6e61285dac9f5a227f652
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 17 Mar 2022 14:37:54 +0000

flight 168663 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168663/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 411b3ff6ddb4042374a6e61285dac9f5a227f652
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   17 days
Failing since        168258  2022-03-01 01:55:31 Z   16 days  159 attempts
Testing same since   168663  2022-03-17 13:41:37 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 747 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 14:44:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 14:44:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291639.495123 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUrMG-0003od-V7; Thu, 17 Mar 2022 14:44:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291639.495123; Thu, 17 Mar 2022 14:44:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUrMG-0003oW-Rh; Thu, 17 Mar 2022 14:44:08 +0000
Received: by outflank-mailman (input) for mailman id 291639;
 Thu, 17 Mar 2022 14:44:07 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Gtxi=T4=gmail.com=tamas.k.lengyel@srs-se1.protection.inumbo.net>)
 id 1nUrME-0003oQ-Un
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 14:44:07 +0000
Received: from mail-io1-xd2b.google.com (mail-io1-xd2b.google.com
 [2607:f8b0:4864:20::d2b])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b199f1c9-a600-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 15:44:05 +0100 (CET)
Received: by mail-io1-xd2b.google.com with SMTP id 195so6167536iou.0
 for <xen-devel@lists.xenproject.org>; Thu, 17 Mar 2022 07:44:05 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b199f1c9-a600-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=MwlHGH829bosnBcnyMhyhPATbMiWYFiW5s97i2e07gc=;
        b=PhBnvPrOAQ7BZNOdgCoYpIQYqmPCbYewN8vX4wueURcgd+I9Wwb1mU14BHU+P3wOs7
         h0gjbiW6rvtEi+ChZfb8kVrVMT36EXhxKSz2SpfavUUKUT1uEhBMxNWN7cyw9qjZzMLO
         NDwFG5RJoS+41AUBY8V5JjXUqnXhJi79VDeDpPOJ9Aip0iqHmz+CoMNWbbSjxYm7qdlA
         pTWyRJ7u82GX3zcie5YOgeZ2tRYCAxk2RUcRnGQpZEn5/k1kwUkIqqqp5AYYH/KWbvg7
         Pr90H1WU0O8Ilj7VphYJoVXs75kzOKoEuoRzJYY2/BZVam+KwayKRM+SEvtpcpwVgf+r
         5hUg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=MwlHGH829bosnBcnyMhyhPATbMiWYFiW5s97i2e07gc=;
        b=UOfLeCYnY29SzEFYUDL1UIbE/8HMbiW52kE4zK9zIrAYP1NCVbJFW+f952G83YMJ3U
         UYcXkSeSMm9sT4ut4radgQzRVQGvc79XrY9BtVGKv58L3NViPenj96q22iIgR4WBXQ5r
         w/KGNT9cjudXLcm3EZ3hJLAmZ0GP4D+lXeHXzq6AaFJoXuhia3sJcHCeGJ4ThIN2IoQj
         EW6V++9ERd+tkrwUxOVn5W7V7PZuRVSwLTF4TRGrlrPO1QJys7nYZ7mT5TWqKso32nfa
         SJZIv+GhsSXKp8gZBGREtARHnZAiOjtUo/NAcYknVFYP7cK0FMCqW79Umebry07Pyakm
         st+Q==
X-Gm-Message-State: AOAM533uKN/5mKcWiTTlYmBq6Rxs7veyJXosPkkO37QFDp1p3WndBOJs
	+hh5czelYWQr+R2r6ggAsdPMWw4J9UDRUN19NKw=
X-Google-Smtp-Source: ABdhPJwntdN9Hn8WIpDCIrOzH06JvFigV/JwVVQlMJhjBbkYj8zasMMO0xX9crWJzDNkHIkJLqbpqY3DjtPMv5eVCdU=
X-Received: by 2002:a05:6638:d47:b0:319:e675:dba3 with SMTP id
 d7-20020a0566380d4700b00319e675dba3mr2277893jak.70.1647528244552; Thu, 17 Mar
 2022 07:44:04 -0700 (PDT)
MIME-Version: 1.0
References: <05d0a5b5c18d667a5527e6f834347f54a10309da.1646937728.git.tamas.lengyel@intel.com>
 <28f869eb-c6f0-cc67-8d29-9751447d2ad3@suse.com>
In-Reply-To: <28f869eb-c6f0-cc67-8d29-9751447d2ad3@suse.com>
From: Tamas K Lengyel <tamas.k.lengyel@gmail.com>
Date: Thu, 17 Mar 2022 10:43:28 -0400
Message-ID: <CABfawhnsbqBOuTyB-C4sY23GY-4-AXd38TXqVMemVt_duwSZiQ@mail.gmail.com>
Subject: Re: [PATCH] x86/hvm: Include interruptibility state in hvm_hw_cpu
To: Jan Beulich <JBeulich@suse.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>, Andrew Cooper <andrew.cooper3@citrix.com>, 
	=?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>, Wei Liu <wl@xen.org>, 
	Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian <kevin.tian@intel.com>, 
	xen-devel@lists.xenproject.org
Content-Type: text/plain; charset="UTF-8"

On Thu, Mar 17, 2022 at 9:56 AM Jan Beulich <jbeulich@suse.com> wrote:
>
> On 10.03.2022 19:44, Tamas K Lengyel wrote:
> > During VM fork resetting a failed vmentry has been observed when the reset
> > is performed immediately after a STI instruction executed. This is due to
> > the guest interruptibility state in the VMCS being modified by STI but the
> > subsequent reset removes the IF bit from FLAGS, causing the failed vmentry.
>
> I first thought this was backwards, but after re-reading a couple of
> times I think the issue is merely with you stating this as if this
> was what always happens, while it really depends on the state that
> the VM is being reset to. I think it would further be helpful if you
> made clear that other interruptibility state could also cause issues
> when not properly restored. One way to express this would be to
> simply insert "e.g." ahead of "a STI instruction".

Correct, there could be other instances where the interruptibility
state could go out of sync with RFLAGS, executing STI and then
resetting only the register state to the pre-STI parent is just one I
stumbled into.

>
> > @@ -1155,6 +1154,8 @@ static int cf_check hvm_load_cpu_ctxt(struct domain *d, hvm_domain_context_t *h)
> >      v->arch.dr6   = ctxt.dr6;
> >      v->arch.dr7   = ctxt.dr7;
> >
> > +    hvm_set_interrupt_shadow(v, ctxt.interruptibility_info);
>
> Setting reserved bits as well as certain combinations of bits will
> cause VM entry to fail. I think it would be nice to report this as
> an error here rather than waiting for the VM entry failure.

Not sure if this would be the right spot to do that since that's all
VMX specific and this is the common hvm code.

>
> > --- a/xen/arch/x86/include/asm/hvm/hvm.h
> > +++ b/xen/arch/x86/include/asm/hvm/hvm.h
> > @@ -720,6 +720,22 @@ static inline int hvm_vmtrace_reset(struct vcpu *v)
> >      return -EOPNOTSUPP;
> >  }
> >
> > +static inline unsigned long hvm_get_interrupt_shadow(struct vcpu *v)
>
> unsigned long here and ...
>
> > +{
> > +    if ( hvm_funcs.get_interrupt_shadow )
> > +        return alternative_call(hvm_funcs.get_interrupt_shadow, v);
> > +
> > +    return -EOPNOTSUPP;
> > +}
> > +
> > +static inline void
> > +hvm_set_interrupt_shadow(struct vcpu *v, unsigned long val)
>
> ... here are not in line with the hooks' types. Same for the stubs
> further down then.
>
> > +{
> > +    if ( hvm_funcs.set_interrupt_shadow )
> > +        alternative_vcall(hvm_funcs.set_interrupt_shadow, v, val);
> > +}
> > +
> > +
> >  /*
>
> Please don't insert multiple successive blank lines.

Ack.

Tamas


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 15:06:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 15:06:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291642.495134 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUriB-0006FH-Q4; Thu, 17 Mar 2022 15:06:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291642.495134; Thu, 17 Mar 2022 15:06:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUriB-0006FA-Mw; Thu, 17 Mar 2022 15:06:47 +0000
Received: by outflank-mailman (input) for mailman id 291642;
 Thu, 17 Mar 2022 15:06:46 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RBlk=T4=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nUriA-0006F4-CN
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 15:06:46 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d845368c-a603-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 16:06:39 +0100 (CET)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04lp2051.outbound.protection.outlook.com [104.47.13.51]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-16-huuJQdKNPpC0bTjg0ru_ow-1; Thu, 17 Mar 2022 16:06:43 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM6PR04MB6184.eurprd04.prod.outlook.com (2603:10a6:20b:b4::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Thu, 17 Mar
 2022 15:06:40 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d%9]) with mapi id 15.20.5081.017; Thu, 17 Mar 2022
 15:06:40 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d845368c-a603-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647529604;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=anzT11GYrwgbhbX71TOI2rhQQvlWwAjT9qS2k6DqxY8=;
	b=H0MkAQzfteoCfAYBNvhZvOWVLUcG9ih6PYk81Gc78D9qONMEO0ydUhP0NA5GcyJeNQGO2k
	VKPZLyySnZsseTx/qdQqLYcOhXbL9UqRfkW3mh6h3RB0gljksV29VzNq69W/X38KzbpsaS
	bP2Sl1wfmjUQcGd/+NEeFxoFpP67who=
X-MC-Unique: huuJQdKNPpC0bTjg0ru_ow-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=KTTcyxrGeUTdrRKmh6mqDU8B+Z4A+VZaQZ9EXncoVpg34EXj/9vExAcAMXtObBerw4DyjdNNEs7kntoqlUVREc98tLXejt4S9PoTCKREiiAtNjDbCJSsujQQebchvJcyB5pQqI0MyVxGpOCu/0HeXPXyenARbb4DXCTzkwNmE9lONRS5rgxMg6RmBfYTWVH2DIPKkJP311GpNLIYBllqONEeclyUzsGtaLpJEVmqEZUV5kFTzewuEGcV4gx1gXXoad15Zz4G/ROENAFBB9SkbFbmrFx5j1gRZWuVdu85R//z1g1P4Sa9EYvtAp/LLS+KWh/GqFUsRzPHBjX+19esOg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=anzT11GYrwgbhbX71TOI2rhQQvlWwAjT9qS2k6DqxY8=;
 b=F84e6380vdYyAS0d1JgEona6p6Rib0m6H01IYo0cNF2MQ9wQlLf09xROaqZ6CM5mYSQtjK5AWMWe1boXHfyY0wut9EldLW37iqV9yKk0s+367y9Mpn2LthuW/kunaNAT1Rp9M5t8WEHuj7F3VN7V3li29vuJic+SN1DYm5p+kDgiIQUQCkFE2lFgCSF/PwygxI5s3eI987UWeYJkY3/ygb2p1fzJupWqxc01SnIGrhKuSEC/69LUsvfC4G+zRkJskR/VsG9eYZLUOblWeoBRKUl65ft63PKoOYFJGIvkjIhsJxZDeediF8lGBzJoui0PHqhIULalwzC9n3f5T72Fxw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <3dc898e4-b00b-2e85-eda9-a28da6737ab5@suse.com>
Date: Thu, 17 Mar 2022 16:06:38 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] x86/hvm: Include interruptibility state in hvm_hw_cpu
Content-Language: en-US
To: Tamas K Lengyel <tamas.k.lengyel@gmail.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>, Wei Liu
 <wl@xen.org>, Jun Nakajima <jun.nakajima@intel.com>,
 Kevin Tian <kevin.tian@intel.com>, xen-devel@lists.xenproject.org
References: <05d0a5b5c18d667a5527e6f834347f54a10309da.1646937728.git.tamas.lengyel@intel.com>
 <28f869eb-c6f0-cc67-8d29-9751447d2ad3@suse.com>
 <CABfawhnsbqBOuTyB-C4sY23GY-4-AXd38TXqVMemVt_duwSZiQ@mail.gmail.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <CABfawhnsbqBOuTyB-C4sY23GY-4-AXd38TXqVMemVt_duwSZiQ@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR06CA0178.eurprd06.prod.outlook.com
 (2603:10a6:20b:45c::10) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0d292e74-6d64-4e18-8504-08da0827bdc2
X-MS-TrafficTypeDiagnostic: AM6PR04MB6184:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB6184ED7DB0C43330232D7062B3129@AM6PR04MB6184.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	dTffEFUdYRgEAJX0vMyCUS6NZGThjcaDbNugIvDQIstDbBJTIEiWdho559Okl0VoiIftaQCJ1hRP+M76ooRio+WyNQBQR2sKO4Wy8Hj/eIsIpAciNDa0lWcwFR8tAWyHJKpID1RcDi2BcVB++K3KHR1nofDr8ZroKZCgm5nDDS0z+F+miNM5WCjBDy6ZnDPQz02hGlB3d3cR45yQYbCncYfD7uwZSGeEXxK+v1pMGRBNKuL4jwM4vuI8n7/tV4AC0KKPaqxjHBp/m6vzHE4Kf0X9Q2kQ+5SZmffQQ7mvHySL6W+GWpx0DjWgV6S8VzzHKAUCGyhonm6lCqDond1OSNnf03vTGDmuPp0OT6G17xyeU3R67CE8DY0uxdhf6VWk8unMXQR2dsywuezmdWmu7Dalwao+sAD/6uIDElO/HHsdAbBsL5oxZbVGwJdwpB6kombM3OqQhbXFtqIRnWmAWheiMKoMAMbqvNvJy5Yv5kapuFcCGahPgy8OOThajeHeXCY8aBVNLhKyoHuWeU4OQRhOzq10P2+Nnt644BNpOZShpIPi1s8cs8o9We7PfC57i8IdAYZAk/we6NYdt996IeiW+2VKCNTP4xtr9gEkoJa3KGXthuYMZdsbDqVmwBXV1O49Yk6FRPGpEgY+0feP4hoJrQj2iAkbdVUQ+XX7f7rKNDqMy0ewSWaviiDYDpqAJd/eORqbhhUrKBqA0C0i9siiwjVQbBJRO3QfM4iCbls=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(26005)(186003)(83380400001)(4326008)(38100700002)(8936002)(5660300002)(4744005)(66946007)(66476007)(66556008)(2906002)(508600001)(53546011)(6506007)(2616005)(6512007)(316002)(6486002)(54906003)(6916009)(31696002)(31686004)(86362001)(36756003)(8676002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?UEcvVjl5MldjVUJFcy9ZRnFXNlZDWVhxc3YvY2lBbW8rSHlwNXZhV0xKR1d0?=
 =?utf-8?B?dTBaaCtDNEI2ODVjd2RKUmdoYUI4Z2x1TG14MEVxMWRaQlhjSWxIUkdQMWx3?=
 =?utf-8?B?MUxQTVNLamYrM1J6Vm5BcGVqN0pwRmwwbFBmT2x1RnUwdFBQNnJlVVgzdDZ6?=
 =?utf-8?B?MmFEZ1NoQ1dPZkFGSThpTVB6K3QvVXJTMElqcC9yUXNZTkxtYVR0Vy9ZeEd3?=
 =?utf-8?B?c2gxSmQwTVM0c2dVVlA3OU9YWmxNNUM0QzFkRzdRdDltMU52YlRkRHpjUkkz?=
 =?utf-8?B?OWVYd3VJUktXdzlnL0ZTNW8vT0gyKytKd3pmaTJsWkJFeW9RQnJZSnU4MU8w?=
 =?utf-8?B?Z0lyeEVIL2pTcUNWbXF2T1ZBQ0U0RG0yeVNLUmVSYityMnIydW9tbnF6VUhS?=
 =?utf-8?B?cWV6V2paWW1DV3p3T3lTQXNLa2M5ampQZlJUb3VkU1MyNFprWjFMNzAzcXlC?=
 =?utf-8?B?dnI4STFpREZFTWs1WHZlUE13am9vTTlzKzNCZW42bnJKQXJVSFBERUdKZEtF?=
 =?utf-8?B?aE9lYU9GT0NkZ2hON0M4UjFKYmx2V3RqSTFxODlWYThGVmxud2R3UlJRSmsy?=
 =?utf-8?B?bndhMGVsWVJsQkl5dHNLQnpMQi94YzRtRnVUUGhzN0hvbzVvZ2VHeVd6ZnJJ?=
 =?utf-8?B?STBrNEpxUjl5d0hocDVhczBGdlZXSFc3Q2JkK0g4Tlg2YmEyNXREOVpaMWJI?=
 =?utf-8?B?dkNiRytOZjVxYlM0RTJ4TWNxY0lKYUtWRmVmTnA1YXJQR3ZrVUFHS05kN0d5?=
 =?utf-8?B?VVV4ZkxtT0JuckNldXJxUnRraENhN1dkb0NDZG1HWEFsbFhRRG9qYmUwbGhD?=
 =?utf-8?B?d0RuMlJ4MTk2czJzVUpiK3MzU3EvaGRJZHhWZlY4RVQ5cGVzaHlITG9aai9X?=
 =?utf-8?B?VmgxbEgyY3kzQWtaWkd6YjdaM0kzSW9oVTBGcXRYd1YvaFhPSWZoTktnR091?=
 =?utf-8?B?V09rd05GRlhGektYdFdzZG9QdUxib2N4M2Z6VmhZMDVDYU41NmFxYlg2SHhh?=
 =?utf-8?B?eUpVY0NQcmlQdW4wNUV4d250dmovME1ZSXFQOFNLR3o4Nkc5YVlZaE5YMmtn?=
 =?utf-8?B?VWFxMWE2UDJ5eE5HcU1wNWo4NmpnK0V0dVhoOTc2elR3OFdYQmVCTWRzeTRI?=
 =?utf-8?B?UmZzMWl1SjFtNGxQdmNVNmh5eGFyc1l5QytYWWY2RHpZczZCMXU4VFVFalQx?=
 =?utf-8?B?YlA3anhxbld5WFl5c3pFbHZRTjdrRWdkZnVYeW5OUnZVT3hhYmxKaTVET1U3?=
 =?utf-8?B?RlRJL2pyR2RYNi8xTExKYTd5K25qTTd5NkpMdlBLQkw5aUZNZUIxcm13WDVJ?=
 =?utf-8?B?NmlYUnJCd2ZsSEJzWjBJTTBmTXdSb3VWa3kzZlkwK3R5KzJJZjIydFE0aVlJ?=
 =?utf-8?B?bVhlby9GbVZZMjR2YlA3c29uZzBoMVhlV1V6amJZYitHS1RLTTJHWk9QaHUx?=
 =?utf-8?B?WU9qN2R6emVWa292bzZWT05oa0FKSzZjZHg3MjFyMXZxQy9vYXVOYTNOdCtQ?=
 =?utf-8?B?eis3aGE0OXg5U0hEL2gxMVU1R2RxUkRTMU9ldTRLRU1PY01JRURmQ25IaHJI?=
 =?utf-8?B?OWwxT0ZkZkVmSXhxeHF2MHpNcWFsMVF5VlR6WHM4YVREMHU4KzJmQ3YrRENo?=
 =?utf-8?B?NUl3K2kwQzNVTlZMMTRBQmJKSFkvUTQ4cnVRVFZ5cWVUOVVnVFNtTnhsWFNt?=
 =?utf-8?B?c0lvVkxBZE5oMCs2emkwRWpMZExJdE04Zm5nUkU0SXNoQ0hpeW9paTgxbU1u?=
 =?utf-8?B?a003NVhhb01ScHlYdWxXV05Xa0NUWVF0THB3V2RsVWV3VThGUU5qMGViYmZB?=
 =?utf-8?B?TDFwcGJ3TW5tT00zRit6QVJvWUxaakJmenJQUkdaSS9qV0daazF0Qi9tdW5U?=
 =?utf-8?B?dXZFb1FoUU9jeU1HNWxzenVmUTFwMGZQU2NWU0gvS2VvK3BnNUtQOXJ4OHpS?=
 =?utf-8?Q?M302OWchw/dzKtZ9SOxdPny8RW1kLqh+?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0d292e74-6d64-4e18-8504-08da0827bdc2
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 15:06:40.8297
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: imRck1sS/eRvEAYkoxLAJi3WqM8hL+1Oo/ITp5wkNUr3hPuj+scXPAaYIwMJBF+7azzAIG0/9InqCjS52I5/Dg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB6184

On 17.03.2022 15:43, Tamas K Lengyel wrote:
> On Thu, Mar 17, 2022 at 9:56 AM Jan Beulich <jbeulich@suse.com> wrote:
>> On 10.03.2022 19:44, Tamas K Lengyel wrote:
>>> @@ -1155,6 +1154,8 @@ static int cf_check hvm_load_cpu_ctxt(struct domain *d, hvm_domain_context_t *h)
>>>      v->arch.dr6   = ctxt.dr6;
>>>      v->arch.dr7   = ctxt.dr7;
>>>
>>> +    hvm_set_interrupt_shadow(v, ctxt.interruptibility_info);
>>
>> Setting reserved bits as well as certain combinations of bits will
>> cause VM entry to fail. I think it would be nice to report this as
>> an error here rather than waiting for the VM entry failure.
> 
> Not sure if this would be the right spot to do that since that's all
> VMX specific and this is the common hvm code.

Well, it would be the VMX hook to do the checking, with an error
propagated back here.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 15:24:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 15:24:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291648.495145 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUrz6-0000Bq-Dk; Thu, 17 Mar 2022 15:24:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291648.495145; Thu, 17 Mar 2022 15:24:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUrz6-0000Bj-Ah; Thu, 17 Mar 2022 15:24:16 +0000
Received: by outflank-mailman (input) for mailman id 291648;
 Thu, 17 Mar 2022 15:24:15 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=JyXb=T4=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nUrz5-0000Bd-HY
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 15:24:15 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05on20626.outbound.protection.outlook.com
 [2a01:111:f400:7d00::626])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4d4b18c2-a606-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 16:24:14 +0100 (CET)
Received: from DB3PR08CA0019.eurprd08.prod.outlook.com (2603:10a6:8::32) by
 PAXPR08MB6863.eurprd08.prod.outlook.com (2603:10a6:102:134::9) with Microsoft
 SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.15; Thu, 17 Mar 2022 15:24:05 +0000
Received: from DB5EUR03FT048.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:8:0:cafe::e8) by DB3PR08CA0019.outlook.office365.com
 (2603:10a6:8::32) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26 via Frontend
 Transport; Thu, 17 Mar 2022 15:24:05 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT048.mail.protection.outlook.com (10.152.21.28) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Thu, 17 Mar 2022 15:24:05 +0000
Received: ("Tessian outbound 341d209a0e52:v113");
 Thu, 17 Mar 2022 15:24:05 +0000
Received: from a41a3cc3ed8a.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 B18CB5FA-1F84-47B8-A699-EE29541491B8.1; 
 Thu, 17 Mar 2022 15:23:58 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id a41a3cc3ed8a.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 17 Mar 2022 15:23:58 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com (2603:10a6:20b:85::25)
 by HE1PR08MB2683.eurprd08.prod.outlook.com (2603:10a6:7:2b::26) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26; Thu, 17 Mar
 2022 15:23:55 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62]) by AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62%3]) with mapi id 15.20.5081.015; Thu, 17 Mar 2022
 15:23:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4d4b18c2-a606-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=arA262akJOhR5cpoO8ioizIXVSnC6SxV5IPxJVVwHuY=;
 b=V6Htoes54KMiJNGLH4OcYuC0O9gZr9bzXSENBfMOYrQDLwWa1gszQlp7ONIt/7nkF4eSUD29+hu5ogB789tuLJm3k4Oc5GS8qwiX3F3Ktd8o71HXXrI7rx4zBlaLT3ZfewFVOL/QuWQsLviK3WovJKNAxdWlc4OX9wy9lE7OVRA=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 73a75714ba6a769f
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=R8SLaUzkbyobY3s1j8I4+nSh9xNSi/bexxOgatIULyfmPFIwQimfUNYC6FRBTi+nqDPqfYMTbXm6TpmMC11SjZ0iKdN/3IsscOQ9tGQlibWWGXOVdZoytphBYaYiGXPDbCnSJvcdmL4JbdwtkfsQAkQyh8Rez4htpc5KimC8ZiDFCRf92hqdzlB94MhuWG6tNouJq7QC5B5FM2Baqt5gFH3K19JDkGN4arNcyquBUEyABU0K8viGBE5HV73S0qA58WzS/NOwhxwMNewjHaoAxwlp/U9lAUhgz6P88A/YLOA13EC04uTjlwQsVdpZcx7iV/0O5CMaObcD/Vc25txxMA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=arA262akJOhR5cpoO8ioizIXVSnC6SxV5IPxJVVwHuY=;
 b=ObsB3eYjjn2HaCLBDlNovJcYXYXJlJZsEPBbppR6zyjHy9ksl5tWG6LfFjWJ+WYCoFtdbhGF0+sted9zps5EyuEebHbRqLadoctDnPsSC88JrUH9Sa84BrB+slBvZfB2UxDT0F7AYej24EZE8sxVIYOGmuVKBQ3fvLMYSicx2gyWlgivXUWQ7V9SIh8Oo52fDmH27diFIvcq7zS8ikpjc7vHaDp3LEf/kl4GYncgOnPBqWnfg6qAv2wj3sn1zYh8JqBp3e4wxNGeAuJYduWdd9vfXQo8PY+dIGahVuWkNzB8qrLYaRFhLuVyMr4XlleeSdkck++E4cljJ7JdbETTDQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=arA262akJOhR5cpoO8ioizIXVSnC6SxV5IPxJVVwHuY=;
 b=V6Htoes54KMiJNGLH4OcYuC0O9gZr9bzXSENBfMOYrQDLwWa1gszQlp7ONIt/7nkF4eSUD29+hu5ogB789tuLJm3k4Oc5GS8qwiX3F3Ktd8o71HXXrI7rx4zBlaLT3ZfewFVOL/QuWQsLviK3WovJKNAxdWlc4OX9wy9lE7OVRA=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Julien Grall <julien@xen.org>
CC: Xen-devel <xen-devel@lists.xenproject.org>,
	"marco.solieri@minervasys.tech" <marco.solieri@minervasys.tech>,
	"lucmiccio@gmail.com" <lucmiccio@gmail.com>, Julien Grall
	<jgrall@amazon.com>, Stefano Stabellini <sstabellini@kernel.org>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH early-RFC 1/5] xen/arm: Clean-up the memory layout
Thread-Topic: [PATCH early-RFC 1/5] xen/arm: Clean-up the memory layout
Thread-Index: AQHYM6fgzbIssM9RMEi7y17EBtCCCazDvrYA
Date: Thu, 17 Mar 2022 15:23:55 +0000
Message-ID: <0E4A176E-BE1F-427F-8D4E-1AAEA811964C@arm.com>
References: <20220309112048.17377-1-julien@xen.org>
 <20220309112048.17377-2-julien@xen.org>
In-Reply-To: <20220309112048.17377-2-julien@xen.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 93585a2e-5ae7-4926-18e9-08da082a2c53
x-ms-traffictypediagnostic:
	HE1PR08MB2683:EE_|DB5EUR03FT048:EE_|PAXPR08MB6863:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR08MB6863AAC428FC88AFCC8F068D9D129@PAXPR08MB6863.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR08MB3784.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(186003)(5660300002)(26005)(83380400001)(316002)(38070700005)(6916009)(2906002)(8936002)(54906003)(122000001)(86362001)(38100700002)(53546011)(33656002)(2616005)(4326008)(6512007)(508600001)(6486002)(76116006)(91956017)(8676002)(36756003)(64756008)(66946007)(66556008)(66446008)(66476007)(6506007)(71200400001)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <DAD382801B2F6745A34A4BDB54B031D1@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR08MB2683
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT048.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	2b288dcd-b7a1-4a48-1738-08da082a265b
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(508600001)(40460700003)(6486002)(47076005)(54906003)(36756003)(2616005)(107886003)(8936002)(36860700001)(53546011)(6506007)(8676002)(4326008)(6862004)(70206006)(70586007)(83380400001)(316002)(186003)(86362001)(26005)(82310400004)(2906002)(5660300002)(81166007)(356005)(6512007)(33656002)(336012);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 15:24:05.1568
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 93585a2e-5ae7-4926-18e9-08da082a2c53
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT048.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB6863

Hi Julien,

> On 9 Mar 2022, at 11:20, Julien Grall <julien@xen.org> wrote:
>=20
> From: Julien Grall <jgrall@amazon.com>
>=20
> In a follow-up patch, the base address for the common mappings will
> vary between arm32 and arm64. To avoid any duplication, define
> every mapping in the common region from the previous one.
>=20
> Take the opportunity to add mising *_SIZE for some mappings.
>=20
> Signed-off-by: Julien Grall <jgrall@amazon.com>

Changes looks ok to me so:
Reviewed-by: Bertrand Marquis <bertrand.marquis@arm.com>

Only one question after.

>=20
> ---
>=20
> After the next patch, the term "common" will sound strange because
> the base address is different. Any better suggestion?

MAPPING_VIRT_START ?

Or space maybe..

> ---
> xen/arch/arm/include/asm/config.h | 24 +++++++++++++++++-------
> 1 file changed, 17 insertions(+), 7 deletions(-)
>=20
> diff --git a/xen/arch/arm/include/asm/config.h b/xen/arch/arm/include/asm=
/config.h
> index aedb586c8d27..5db28a8dbd56 100644
> --- a/xen/arch/arm/include/asm/config.h
> +++ b/xen/arch/arm/include/asm/config.h
> @@ -107,16 +107,26 @@
>  *  Unused
>  */
>=20
> -#define XEN_VIRT_START         _AT(vaddr_t,0x00200000)
> -#define FIXMAP_ADDR(n)        (_AT(vaddr_t,0x00400000) + (n) * PAGE_SIZE=
)
> +#define COMMON_VIRT_START       _AT(vaddr_t, 0)
>=20
> -#define BOOT_FDT_VIRT_START    _AT(vaddr_t,0x00600000)
> -#define BOOT_FDT_SLOT_SIZE     MB(4)
> -#define BOOT_FDT_VIRT_END      (BOOT_FDT_VIRT_START + BOOT_FDT_SLOT_SIZE=
)
> +#define XEN_VIRT_START          (COMMON_VIRT_START + MB(2))
> +#define XEN_SLOT_SIZE           MB(2)

I know this is not modified by your patch, but any idea why SLOT is used he=
re ?
XEN_VIRT_SIZE would sound a bit more logic.

Cheers
Bertrand




From xen-devel-bounces@lists.xenproject.org Thu Mar 17 15:29:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 15:29:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291651.495155 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUs3z-0000r7-0q; Thu, 17 Mar 2022 15:29:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291651.495155; Thu, 17 Mar 2022 15:29:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUs3y-0000r0-UF; Thu, 17 Mar 2022 15:29:18 +0000
Received: by outflank-mailman (input) for mailman id 291651;
 Thu, 17 Mar 2022 15:29:18 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=IuyF=T4=gmail.com=raphning@srs-se1.protection.inumbo.net>)
 id 1nUs3y-0000qu-8b
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 15:29:18 +0000
Received: from mail-wr1-x434.google.com (mail-wr1-x434.google.com
 [2a00:1450:4864:20::434])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id fe407bde-a606-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 16:29:11 +0100 (CET)
Received: by mail-wr1-x434.google.com with SMTP id h15so7867960wrc.6
 for <xen-devel@lists.xenproject.org>; Thu, 17 Mar 2022 08:29:17 -0700 (PDT)
Received: from [192.168.12.253] (54-240-197-232.amazon.com. [54.240.197.232])
 by smtp.gmail.com with ESMTPSA id
 v20-20020a7bcb54000000b0037fa63db8aasm8143052wmj.5.2022.03.17.08.29.14
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Thu, 17 Mar 2022 08:29:15 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fe407bde-a606-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=message-id:date:mime-version:user-agent:subject:to:cc:references
         :from:in-reply-to:content-transfer-encoding;
        bh=ABeASIv4UNYtQn+aRapQmIpWwh2knmyHOuvz8vAmwdc=;
        b=lZfs4Ry75nwFRnVbOZiZJOwVN92F4jdbAPRB0rRtO3CEWVhtm1ajCOzJhHH+q6cc5y
         ljbNsPN8iPi1Z01L1P86/Ww41/oBR+WcKU+sxCYJ0icX4TvCIVxXaYBq4JFfuBEVXQy3
         REe+HiN8gViHIKV6hG1o+Ln8Wximebe+zFMJQwuSn++AISvLcx49LNiLo1LwpXPEq7SD
         XeSjMrsmg9xIk5Ok6c5BpV7eI8MYrRKksSGxv2QPvMh7bZtAhBHXnl8mU7wKt2SSov5h
         gMJz8C47KeNQZRSk8z5E4UDPNGAZHmFe2aodODkVOT9ao3XOQ4mngfUuXiz0DP40kFF+
         /gwg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:message-id:date:mime-version:user-agent:subject
         :to:cc:references:from:in-reply-to:content-transfer-encoding;
        bh=ABeASIv4UNYtQn+aRapQmIpWwh2knmyHOuvz8vAmwdc=;
        b=LLIvcxlukMyn+fxQ3BsWXsmoPFVPxpkKJSH/cWg4z+PdbRkRf3f3sbUIITnd6jXyH5
         jgJzB6zToeZ14ZvX7Rsy26UdAiPwoBdb4bG2QBQl9dchd7HP4g5/S21Qq3Dgcmu052od
         Tl+oMGJCOXWbEtwXLK5dSNjaiNIyC4UIJVk0vNXygPS1w/CaiRpyCiOipcx/Lg4hJyIc
         oQnBXo81CnSLyddI/qP7oVa1v9LaVzXAwSae3rPe+ip56gATivlEDYKOqDSCjey3u9O9
         LXsGwDJncdzsRTRBNnsfnJ1ZcHBlXtEtwSNqZxZJOSNChuObjQ73uy3ubcMIUIY/pwm1
         RNvg==
X-Gm-Message-State: AOAM5317KTwYLMC+UPqZCQV5fQaXkE57hgNKQEjCfaBZKgflsR8sdKd8
	BAvUr3bjeJ6ewmZ9m2mHjM4=
X-Google-Smtp-Source: ABdhPJw54QLjnlxeDEWtd6FqaDs9Y2Wd04ubYuUV5o7QXslf9o7AwuzAN1A0LxeXE3kGRGHzET1yug==
X-Received: by 2002:a5d:654e:0:b0:1f0:1a18:166c with SMTP id z14-20020a5d654e000000b001f01a18166cmr4490451wrv.28.1647530956085;
        Thu, 17 Mar 2022 08:29:16 -0700 (PDT)
Message-ID: <700ca049-5765-d880-b16f-8cad5bb2884d@gmail.com>
Date: Thu, 17 Mar 2022 15:29:13 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [XEN PATCH] evtchn/fifo: Don't set PENDING bit if guest
 misbehaves
To: Luca Fancellu <Luca.Fancellu@arm.com>, Andrew Cooper <amc96@srcf.net>
Cc: Xen-devel <xen-devel@lists.xenproject.org>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Wei Liu <wl@xen.org>, David Vrabel <dvrabel@amazon.co.uk>
References: <6b84a20b2753130cc62406a0fd14d2708f6f504b.1647455219.git.raphning@amazon.com>
 <e07d0eda-c117-c83e-227e-7a934585f265@srcf.net>
 <5B2CF3C1-345B-45C8-8E6E-CC118015F4FA@arm.com>
From: Raphael Ning <raphning@gmail.com>
In-Reply-To: <5B2CF3C1-345B-45C8-8E6E-CC118015F4FA@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit


On 17/03/2022 14:26, Luca Fancellu wrote:
> I’ve tested on the ARM side, I’ve started/destroyed few guests from Dom0, connect to the console, run
> some network communications between guest and Dom0, everything works:
>
> Tested-by: Luca Fancellu <luca.fancellu@arm.com>


Thanks!  I tested on x86 (in a QEMU VM) by launching and destroying an HVM guest; both dom0 and the guest use FIFO event channels.


>
> Cheers,
> Luca
>


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 15:47:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 15:47:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291655.495167 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUsLa-0003Bv-G1; Thu, 17 Mar 2022 15:47:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291655.495167; Thu, 17 Mar 2022 15:47:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUsLa-0003Bo-CW; Thu, 17 Mar 2022 15:47:30 +0000
Received: by outflank-mailman (input) for mailman id 291655;
 Thu, 17 Mar 2022 15:47:29 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=H+7p=T4=citrix.com=prvs=06815c04c=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nUsLZ-0003Bi-3y
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 15:47:29 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 8a9ead32-a609-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 16:47:27 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8a9ead32-a609-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647532047;
  h=date:from:to:cc:subject:message-id:references:
   mime-version:in-reply-to;
  bh=YHxqwB0TNJt0ULuF4PH2AsuTX0xKPNKDZtzyIldLM/w=;
  b=SpGyK5EMzhPTlOEBvi5zoaHCxAt76Q+qLqn9ozxBb7viBwzo/5Mzj2Uh
   ysgoPmcHwU6b6tCa01B66aHqCKizZ8879xal5CrIe+/ETORvfHG9foAgs
   KGLeo1xYBou/GgM8HB/uuG9v32LqunmxClJwltSetnUwlUe2+aPXRbJXJ
   s=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 68887181
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:zFdO0KApYoE6zxVW/9/jw5YqxClBgxIJ4kV8jS/XYbTApDtw1GRVz
 DQbXmCEaKmPNzb1L9F/Odvj9BkD7ZLTx941QQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vg3dYy6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPghk
 M99l4TtcDwqM/aLhfQkfTcfOTxxaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguwqKtXrO4UO/Glt1zjDAd4tQIzZQrWM7thdtNs1rp4eTaaBP
 ppAAdZpRBD9bD0SG1BKNLw7kqCNmD7lViZDsHvA8MLb5ECMlVcsgdABKuH9ZNuOQslEm1eCk
 WjP9W/5HxIyOcSWzHyO9XfEruXChz/hUYQeUrix7Od3gUa7z3YWThYRUDOTo/ajjVWlc8lCM
 EFS8S0rxYAt8GS7Q9+7WAe3yFaUsxhZV9dOHukS7ACW1rGS8wufHnIDTDNKdJohrsBebTIsy
 xmXntDzDDlHoLyRSHSNsLyTqFuaOzURLGIETT8JS00C+daLiJookhvFQ9JnEai0pt74Azf9x
 3aNtidWulkIpZdVjePhpwmB2m/y4MiSJuIo2unJdjL99DNbfNOcXI+lsh/G/c9uAsGzU1bU6
 RDohPOixOwJCJiMkgmET+MMAKyl6p65DdHMvbJ8N8J/rmrwohZPaagVuWgjfxkxbq7obBezO
 CfuVRVtCIi/1ZdARYt+eMqPBssj1sAM/vy1B6mPPrKijnWcHTJrHR2Ch2bNhwgBc2B2yMnT3
 Kt3l+72UR727ow9kFKLqx81i+ND+8zH7Tq7qWrH5xqmy6GCQ3WeVK0INlCDBshgsv/b/FiKq
 owBb5TXo/m6bAEYSnOLmWL0BQpWRUXX+Lis85AHHgJ9ClcO9J4d5w/5nup6Jt0Nc1V9nebU5
 HCtMnK0O3Kk7UAr3T6iMyg5AJu2BM4XhStiYUQEYAb5s1B+MN3HxPpOKPMKkUwPqbULIQhcF
 KJeJa1tw51nF1z6xtjqRcKk/dI4K0jz217m0ujMSGFXQqOMjjfhorfMFjYDPgFUZsZrnaPSe
 4Gd6z4=
IronPort-HdrOrdr: A9a23:NVnzqqgJP0ZFap4fr2iyU7mKqXBQXtoji2hC6mlwRA09TySZ//
 rBoB0+726RtN9xYgBEpTnuAsS9qB/nmaKdpLNhWotKPzOW2ldATrsD0WKK+VSJcEfDH6xmpM
 RdmsBFebvN5DNB7PoSjjPWL+od
X-IronPort-AV: E=Sophos;i="5.90,188,1643691600"; 
   d="scan'208";a="68887181"
Date: Thu, 17 Mar 2022 15:47:21 +0000
From: Anthony PERARD <anthony.perard@citrix.com>
To: Vikram Garhwal <fnu.vikram@xilinx.com>
CC: <xen-devel@lists.xenproject.org>, <sstabellini@kernel.org>,
	<julien@xen.org>, <bertrand.marquis@arm.com>, <volodymyr_babchuk@epam.com>,
	Wei Liu <wl@xen.org>, Juergen Gross <jgross@suse.com>
Subject: Re: [XEN][RFC PATCH v3 12/14] tools/libs/ctrl: Implement new xc
 interfaces for dt overlay
Message-ID: <YjNYCeaULixDb8WZ@perard.uk.xensource.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
 <20220308194704.14061-13-fnu.vikram@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <20220308194704.14061-13-fnu.vikram@xilinx.com>

Hi Vikram,

On Tue, Mar 08, 2022 at 11:47:02AM -0800, Vikram Garhwal wrote:
> diff --git a/tools/libs/ctrl/xc_overlay.c b/tools/libs/ctrl/xc_overlay.c
> new file mode 100644
> index 0000000000..8fe780d75a
> --- /dev/null
> +++ b/tools/libs/ctrl/xc_overlay.c

Could rename this new file? I don't think using "overlay" alone is going
to be helpful to figure out what it is about. Renaming it
"xc_dt_overlay.c" would already be better.

> @@ -0,0 +1,51 @@
> +/*
> + *
> + * Overlay control functions.

Maybe "Device Tree overlay functions" would be better. I'm not sure that
"control" is useful in the file description.

> + * Copyright (C) 2021 Xilinx Inc.
> + * Author Vikram Garhwal <fnu.vikram@xilinx.com>
> + *
> + * This library is free software; you can redistribute it and/or
> + * modify it under the terms of the GNU Lesser General Public
> + * License as published by the Free Software Foundation;
> + * version 2.1 of the License.
> + *
> + * This library is distributed in the hope that it will be useful,
> + * but WITHOUT ANY WARRANTY; without even the implied warranty of
> + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
> + * Lesser General Public License for more details.
> + *
> + * You should have received a copy of the GNU Lesser General Public
> + * License along with this library; If not, see <http://www.gnu.org/licenses/>.
> + */
> +
> +#include "xc_bitops.h"
> +#include "xc_private.h"
> +#include <xen/hvm/hvm_op.h>
> +#include <libfdt.h>
> +
> +int xc_dt_overlay(xc_interface *xch, void *overlay_fdt, int overlay_fdt_size,
> +                  uint8_t overlay_op)

Shouldn't the function prototype match the types from the sysctl
structure? There is "int" vs "uint32_t" for "overlay_fdt_size".

> +{
> +    int err;
> +    DECLARE_SYSCTL;
> +
> +    DECLARE_HYPERCALL_BOUNCE(overlay_fdt, overlay_fdt_size,
> +                        XC_HYPERCALL_BUFFER_BOUNCE_IN);
> +
> +    if ( (err = xc_hypercall_bounce_pre(xch, overlay_fdt)) )
> +        goto err;
> +
> +    sysctl.cmd = XEN_SYSCTL_dt_overlay;
> +    sysctl.u.dt_overlay.overlay_op = overlay_op;
> +    sysctl.u.dt_overlay.overlay_fdt_size = overlay_fdt_size;
> +
> +    set_xen_guest_handle(sysctl.u.dt_overlay.overlay_fdt, overlay_fdt);
> +
> +    if ( (err = do_sysctl(xch, &sysctl)) != 0 )
> +        PERROR("%s failed\n", __func__);

The \n should be remove from the message. perror already adds a newline,
and it also adds information about the error after the message so a
newline in the middle will make it harder to read the error.

> +
> +err:
> +    xc_hypercall_bounce_post(xch, overlay_fdt);
> +
> +    return err;
> +}

Thanks,

-- 
Anthony PERARD


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 15:58:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 15:58:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291658.495178 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUsVe-0004hW-Fu; Thu, 17 Mar 2022 15:57:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291658.495178; Thu, 17 Mar 2022 15:57:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUsVe-0004hP-CU; Thu, 17 Mar 2022 15:57:54 +0000
Received: by outflank-mailman (input) for mailman id 291658;
 Thu, 17 Mar 2022 15:57:52 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=nwNI=T4=intel.com=tamas.lengyel@srs-se1.protection.inumbo.net>)
 id 1nUsVc-0004hJ-9B
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 15:57:52 +0000
Received: from mga02.intel.com (mga02.intel.com [134.134.136.20])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id fcc976ac-a60a-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 16:57:48 +0100 (CET)
Received: from fmsmga003.fm.intel.com ([10.253.24.29])
 by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 17 Mar 2022 08:57:45 -0700
Received: from angulozx-mobl1.amr.corp.intel.com (HELO localhost.localdomain)
 ([10.212.40.101])
 by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 17 Mar 2022 08:57:44 -0700
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fcc976ac-a60a-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;
  t=1647532669; x=1679068669;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=OlRri1Jcoeqye6ORFNOitHAtNFXCyyPZ1eDAd21F+78=;
  b=OUeWtMcMHHnwrFrOZQjJ9oLqCRdqZj4MnrrGxw4eB1ESENE+gEMlOXDw
   B9yWG4gBhR37JKtCsBl59FCiZ7/m3iT+CvS1MjoiBtcVhbwnYDdeSESsr
   sQTQ7W/b4kveUIMxaS9+A+5Q4vhHjulqYSh9J64hFq0V8LPP3cPS824ti
   Sgcvkyx1WqnbJqOkB4zXJFZejjfC3ZDRsFuDUcbR6hj8RQ6KQAIx8pFsI
   qwR8jOvZPVgzJiidBYzMzgLfSA1WUIKx+b2EO9y0/anVTbFEkoJ9pksI4
   wQoAMoX8f6G7hJAA1WEmjFAUW4gpGt4xvqxX8LuP2D16XktZk/Wt0UxyQ
   A==;
X-IronPort-AV: E=McAfee;i="6200,9189,10289"; a="244353101"
X-IronPort-AV: E=Sophos;i="5.90,188,1643702400"; 
   d="scan'208";a="244353101"
X-IronPort-AV: E=Sophos;i="5.90,188,1643702400"; 
   d="scan'208";a="635406227"
From: Tamas K Lengyel <tamas.lengyel@intel.com>
To: xen-devel@lists.xenproject.org
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>,
	Jun Nakajima <jun.nakajima@intel.com>,
	Kevin Tian <kevin.tian@intel.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>
Subject: [PATCH v2] x86/vmx: save guest non-register state in hvm_hw_cpu
Date: Thu, 17 Mar 2022 11:57:35 -0400
Message-Id: <e79bd13acfd73c105ee1399295c99cec153258c2.1647532323.git.tamas.lengyel@intel.com>
X-Mailer: git-send-email 2.25.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

During VM forking and resetting a failed vmentry has been observed due
to the guest non-register state going out-of-sync with the guest register
state. For example, a VM fork reset right after a STI instruction can trigger
the failed entry. This is due to the guest non-register state not being saved
from the parent VM, thus the reset operation only copies the register state.

Fix this by including the guest non-register state in hvm_hw_cpu so that when
its copied from the parent VM the vCPU state remains in sync.

SVM is not currently wired-in as VM forking is VMX only and saving non-register
state during normal save/restore/migration operation hasn't been needed.

Signed-off-by: Tamas K Lengyel <tamas.lengyel@intel.com>
---
v2: Include all CPU non-register state and fold the ops into vmx_vmcs_save &
    vmx_vmcs_restore.
Note: no sanity checking is performed on the fields to reduce the cycles during
      fuzzing.
---
 xen/arch/x86/hvm/vmx/vmx.c             | 13 ++++++++++++-
 xen/include/public/arch-x86/hvm/save.h |  6 ++++++
 2 files changed, 18 insertions(+), 1 deletion(-)

diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
index c075370f64..4d4dcc4b70 100644
--- a/xen/arch/x86/hvm/vmx/vmx.c
+++ b/xen/arch/x86/hvm/vmx/vmx.c
@@ -713,7 +713,7 @@ static void vmx_restore_dr(struct vcpu *v)
 
 static void vmx_vmcs_save(struct vcpu *v, struct hvm_hw_cpu *c)
 {
-    unsigned long ev;
+    unsigned long ev, activity_state, intr_state;
 
     vmx_vmcs_enter(v);
 
@@ -721,6 +721,10 @@ static void vmx_vmcs_save(struct vcpu *v, struct hvm_hw_cpu *c)
     __vmread(GUEST_SYSENTER_ESP, &c->sysenter_esp);
     __vmread(GUEST_SYSENTER_EIP, &c->sysenter_eip);
 
+    __vmread(GUEST_ACTIVITY_STATE, &activity_state);
+    __vmread(GUEST_INTERRUPTIBILITY_INFO, &intr_state);
+    __vmread(GUEST_PENDING_DBG_EXCEPTIONS, &c->pending_dbg);
+
     __vmread(VM_ENTRY_INTR_INFO, &ev);
     if ( (ev & INTR_INFO_VALID_MASK) &&
          hvm_event_needs_reinjection(MASK_EXTR(ev, INTR_INFO_INTR_TYPE_MASK),
@@ -732,6 +736,9 @@ static void vmx_vmcs_save(struct vcpu *v, struct hvm_hw_cpu *c)
     }
 
     vmx_vmcs_exit(v);
+
+    c->activity_state = activity_state;
+    c->interruptibility_state = intr_state;
 }
 
 static int vmx_restore_cr0_cr3(
@@ -807,6 +814,10 @@ static int vmx_vmcs_restore(struct vcpu *v, struct hvm_hw_cpu *c)
 
     __vmwrite(GUEST_DR7, c->dr7);
 
+    __vmwrite(GUEST_ACTIVITY_STATE, c->activity_state);
+    __vmwrite(GUEST_INTERRUPTIBILITY_INFO, c->interruptibility_state);
+    __vmwrite(GUEST_PENDING_DBG_EXCEPTIONS, c->pending_dbg);
+
     if ( c->pending_valid &&
          hvm_event_needs_reinjection(c->pending_type, c->pending_vector) )
     {
diff --git a/xen/include/public/arch-x86/hvm/save.h b/xen/include/public/arch-x86/hvm/save.h
index 773a380bc2..eb72e44968 100644
--- a/xen/include/public/arch-x86/hvm/save.h
+++ b/xen/include/public/arch-x86/hvm/save.h
@@ -52,6 +52,7 @@ DECLARE_HVM_SAVE_TYPE(HEADER, 1, struct hvm_save_header);
  * Compat:
  *     - Pre-3.4 didn't have msr_tsc_aux
  *     - Pre-4.7 didn't have fpu_initialised
+ *     - Pre-4.17 didn't have non-register state
  */
 
 struct hvm_hw_cpu {
@@ -166,6 +167,11 @@ struct hvm_hw_cpu {
 #define XEN_X86_FPU_INITIALISED         (1U<<_XEN_X86_FPU_INITIALISED)
     uint32_t flags;
     uint32_t pad0;
+
+    /* non-register state */
+    uint32_t activity_state;
+    uint32_t interruptibility_state;
+    uint64_t pending_dbg;
 };
 
 struct hvm_hw_cpu_compat {
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 16:00:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 16:00:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291663.495188 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUsY9-0006ci-W4; Thu, 17 Mar 2022 16:00:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291663.495188; Thu, 17 Mar 2022 16:00:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUsY9-0006cb-TJ; Thu, 17 Mar 2022 16:00:29 +0000
Received: by outflank-mailman (input) for mailman id 291663;
 Thu, 17 Mar 2022 16:00:28 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Gtxi=T4=gmail.com=tamas.k.lengyel@srs-se1.protection.inumbo.net>)
 id 1nUsY8-0006cV-Ny
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 16:00:28 +0000
Received: from mail-io1-xd29.google.com (mail-io1-xd29.google.com
 [2607:f8b0:4864:20::d29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 5ca3d799-a60b-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 17:00:27 +0100 (CET)
Received: by mail-io1-xd29.google.com with SMTP id e22so6349112ioe.11
 for <xen-devel@lists.xenproject.org>; Thu, 17 Mar 2022 09:00:27 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5ca3d799-a60b-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=//OKJWG2XaERkrAXfntBbbaDnGwUSRW2XahGtEOy4N4=;
        b=O3tZebmCxjyIMClJvQgZQLpM5gT7QoWmf4BfCY+p4geVgKDk6g+OV78MflZwokCiqO
         8qsZTcMkpCb9YjuZ19p7zU4hOzcZcc1eAgpZ9B36yLtQxZDpzR1dmb7PabGgw9Gi3mNs
         hrL5lKbPfFrtkM88/Dpfnsof5s9YlPJ/JyfzkOm0gzcZz5pQP3RXPH23+VbRWRY45ewG
         zX6HH1mGIfIri1h7UTglusH9kJrvqruTNx50OmlhnUs1/kvRSdDYhZYItFefayuwivaG
         YYxKr1RmTxBsT/w+cAZvX+eu3u1XX/VRcw2Fw9na1NdfiHaW7IrasuG/YbiRe1CpXbmH
         c2SQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=//OKJWG2XaERkrAXfntBbbaDnGwUSRW2XahGtEOy4N4=;
        b=Dy2SIZO3T8XZJfCf+OviADa7g2ihbWyF0EG6Hs8axPRhtLsslOXiZcOMw9vROH0IWG
         ++R+NDncNjlVLzkZ7SsPC0GKI1cLP322ioogXfOehr07HgC/y737pswuOWaE75yLJ0NQ
         UP4tJBTzzk58+o4qK4MfgLwgPhDvp1jT+LPtyYyF2U63Wc113er4IjfryS4extWkCral
         DrwViia8hhE14ed8kWFvWVXQd8J/RRvs7x6dLjhD0xSyOJ5ZPzQzbtD+HFPxkjh5KakR
         ACutLdnD1QQByhD0CkdHJ1xER6TAqXMYe4NPY3O4fD1lH4iZHUh12Oi+TUt281To0hW/
         dYAw==
X-Gm-Message-State: AOAM531fP5eYSd81Wxv/5QhcGaaTUEU/17q8we9AcZ5+v+UCX+AOa8H5
	T61mCYPqVmkKPAqJkOie+6xT6MoEyyb8h1Gz6+o=
X-Google-Smtp-Source: ABdhPJwz0jn/5KjBXCuaHrqaEAX4qVnwPtRHmxdYtaXJxyjbD0CWUKnqjDiECwFyeCz6/m9DsVxy9LxFzAVPKK+R1ZQ=
X-Received: by 2002:a05:6638:2402:b0:317:b520:62ba with SMTP id
 z2-20020a056638240200b00317b52062bamr2425687jat.238.1647532826572; Thu, 17
 Mar 2022 09:00:26 -0700 (PDT)
MIME-Version: 1.0
References: <05d0a5b5c18d667a5527e6f834347f54a10309da.1646937728.git.tamas.lengyel@intel.com>
 <28f869eb-c6f0-cc67-8d29-9751447d2ad3@suse.com> <CABfawhnsbqBOuTyB-C4sY23GY-4-AXd38TXqVMemVt_duwSZiQ@mail.gmail.com>
 <3dc898e4-b00b-2e85-eda9-a28da6737ab5@suse.com>
In-Reply-To: <3dc898e4-b00b-2e85-eda9-a28da6737ab5@suse.com>
From: Tamas K Lengyel <tamas.k.lengyel@gmail.com>
Date: Thu, 17 Mar 2022 11:59:50 -0400
Message-ID: <CABfawh=FgBcLYgFr+4R7795bqKfeYyr5MF09__zDEpfk6hcmHg@mail.gmail.com>
Subject: Re: [PATCH] x86/hvm: Include interruptibility state in hvm_hw_cpu
To: Jan Beulich <JBeulich@suse.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>, Andrew Cooper <andrew.cooper3@citrix.com>, 
	=?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>, Wei Liu <wl@xen.org>, 
	Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian <kevin.tian@intel.com>, 
	xen-devel@lists.xenproject.org
Content-Type: text/plain; charset="UTF-8"

On Thu, Mar 17, 2022 at 11:06 AM Jan Beulich <jbeulich@suse.com> wrote:
>
> On 17.03.2022 15:43, Tamas K Lengyel wrote:
> > On Thu, Mar 17, 2022 at 9:56 AM Jan Beulich <jbeulich@suse.com> wrote:
> >> On 10.03.2022 19:44, Tamas K Lengyel wrote:
> >>> @@ -1155,6 +1154,8 @@ static int cf_check hvm_load_cpu_ctxt(struct domain *d, hvm_domain_context_t *h)
> >>>      v->arch.dr6   = ctxt.dr6;
> >>>      v->arch.dr7   = ctxt.dr7;
> >>>
> >>> +    hvm_set_interrupt_shadow(v, ctxt.interruptibility_info);
> >>
> >> Setting reserved bits as well as certain combinations of bits will
> >> cause VM entry to fail. I think it would be nice to report this as
> >> an error here rather than waiting for the VM entry failure.
> >
> > Not sure if this would be the right spot to do that since that's all
> > VMX specific and this is the common hvm code.
>
> Well, it would be the VMX hook to do the checking, with an error
> propagated back here.

I'm actually against it because the overhead of that error-checking
during vm forking would be significant with really no benefit. We are
copying the state from the parent where it was running fine before, so
doing that sanity checking thousands of times per second when we
already know its fine is bad.

Tamas


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 16:07:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 16:07:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291666.495199 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUsf8-0007JL-OB; Thu, 17 Mar 2022 16:07:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291666.495199; Thu, 17 Mar 2022 16:07:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUsf8-0007JE-LM; Thu, 17 Mar 2022 16:07:42 +0000
Received: by outflank-mailman (input) for mailman id 291666;
 Thu, 17 Mar 2022 16:07:41 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RBlk=T4=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nUsf7-0007J8-Jc
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 16:07:41 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 5b4bd117-a60c-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 17:07:34 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2113.outbound.protection.outlook.com [104.47.18.113]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-24-18cT8ZEEOTqpUhgnsHl9vw-1; Thu, 17 Mar 2022 17:07:39 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM5PR04MB2945.eurprd04.prod.outlook.com (2603:10a6:206:a::13) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Thu, 17 Mar
 2022 16:07:37 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d%9]) with mapi id 15.20.5081.017; Thu, 17 Mar 2022
 16:07:37 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5b4bd117-a60c-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647533260;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=c2ix9lrDuwnC2mfvf9nilBBANmOfSzZuGKrKqTEQeeo=;
	b=Gs6B4hAyA/3/O3/vkfAqDbKNoDD/na2p9JCEmPrGgFxjHlqP7SwhqnlTJXiOLtTV6Gk2Fe
	+wwzp25Dk7wxY55B1dcappTJHCJ+1Bh4QF2OGaKPynFDGXg8zOnuUByu/PlpMR5HXcxxoQ
	ak7G+Imhf+UEXIB+t8CGmj+4Zoft6YI=
X-MC-Unique: 18cT8ZEEOTqpUhgnsHl9vw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=W7mevC968OOOLH5EA7LMbg1WkJbTCBuUbpDXNVYJR//iALWTgcQrstZ0eHWyAex3uUPvs+6LYvWPkOW8w1nlQflv0cbZce041Sx0yqd8n6cyeBT7mZCfX5L/b+JYF90qshPWT0um7Gjly2fVVtcBDEJXAzv6IJTEqOfTaaqcIbnP7RoR8yZN6S3vGHr+EyG6B38NRQaFM46cyGdDQGHmCp4Qaqc61g2vtd2tNsB8XePcH3np+IuIKKfQU9GmHRc9pRJSkzbwXRyPf43rtZ+Kj5zKpVy8Kec5GmY91oQcSOvCeOVaoFwgkQHq9HmVdaMZgg/gaPfp7PXssKZYT2KYyw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=c2ix9lrDuwnC2mfvf9nilBBANmOfSzZuGKrKqTEQeeo=;
 b=mqM9PlA/xheJFGVP/BJjq2F3yNEru6f1RTIvIo90UZ5VEr48xv0lRSrXziY87hjlcE0NNo7nBViATakDMut5qKtzKsox/OfZlt+k7yVZOLkm+7IgOQAViqYsASmwQj3pAzUIV4Hiq9jYJD7o4n1jGPmAcl2onxF5ExX+MENsiRob28OXYM7uqfVE2q+CaGwHpmSgn1zJc+xTwhggNFeDHz4kPTJVijXK2YvFBGdbJKwIpW7qZVnT08hcSmmQgprBbmo10eCg9W5xtGxKvSFxx08yxHI0kiRF3lQ+iVODHBDkUssrbzQcRUm9QiPfX+T908OUigoqIid4ICWHJhvOGQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <2f0a88cc-f9f2-2b9b-dd0b-52321ab328c2@suse.com>
Date: Thu, 17 Mar 2022 17:07:34 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] x86/hvm: Include interruptibility state in hvm_hw_cpu
Content-Language: en-US
To: Tamas K Lengyel <tamas.k.lengyel@gmail.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>, Wei Liu
 <wl@xen.org>, Jun Nakajima <jun.nakajima@intel.com>,
 Kevin Tian <kevin.tian@intel.com>, xen-devel@lists.xenproject.org
References: <05d0a5b5c18d667a5527e6f834347f54a10309da.1646937728.git.tamas.lengyel@intel.com>
 <28f869eb-c6f0-cc67-8d29-9751447d2ad3@suse.com>
 <CABfawhnsbqBOuTyB-C4sY23GY-4-AXd38TXqVMemVt_duwSZiQ@mail.gmail.com>
 <3dc898e4-b00b-2e85-eda9-a28da6737ab5@suse.com>
 <CABfawh=FgBcLYgFr+4R7795bqKfeYyr5MF09__zDEpfk6hcmHg@mail.gmail.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <CABfawh=FgBcLYgFr+4R7795bqKfeYyr5MF09__zDEpfk6hcmHg@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR0301CA0050.eurprd03.prod.outlook.com
 (2603:10a6:20b:469::19) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 1b86fd40-95fc-4c20-2ad3-08da08304118
X-MS-TrafficTypeDiagnostic: AM5PR04MB2945:EE_
X-Microsoft-Antispam-PRVS:
	<AM5PR04MB2945A634B6BF77E05873813CB3129@AM5PR04MB2945.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2616005)(26005)(316002)(2906002)(66476007)(66946007)(66556008)(8676002)(36756003)(186003)(54906003)(6916009)(31686004)(86362001)(31696002)(4326008)(83380400001)(508600001)(6666004)(6506007)(53546011)(8936002)(6486002)(6512007)(5660300002)(38100700002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?cnNNRWxRR0FEUEd5Z1hqTlhpUnBEbVh2VWV1Wm8zZmdqbEowUHN1c2wrYm9O?=
 =?utf-8?B?dnY3aGlhbTNjZFZuQUxMcFZzdU5EVndhOHdtQWpIN0hEQVVJa0U3T2hkc0pz?=
 =?utf-8?B?OXJpM1V6R1hEZkdBMWhCTCtiT1dYeDFzQnh6M2FkVTdjRUdRcnhXMHo1NFFF?=
 =?utf-8?B?UXExdkJVV2w1cHBjdlRoVFpPSGZYaEJZQlhiaVBwT25sWnNvSnBMb1J3dHJr?=
 =?utf-8?B?K0JOcUF0N2xEbnl2ZTBUZEpKYThTM3l6aUtzWGxpbmJuTXpreVAweEdOVlpv?=
 =?utf-8?B?ZXcvOWF4SGxsTEd0bmxsUjgyTDJXYS9Hd0Z5WVpLakRaNThPT045RGR2b24v?=
 =?utf-8?B?Q01hL2JEMSt6RS81OHNOMnArTE5xQ3JzdEFFaURpcUFEZm9iMzBsOWpzbVND?=
 =?utf-8?B?QXh4b3BCVWhzM2hGVGZ2QmZFZWRwNElCWk5ydUlKeXdveUJVVExoWDliYzhZ?=
 =?utf-8?B?eE92dzFpL3RoVlcrNHFGTGREbm9HMllWUkRad3l6OEtRNFQ2WURGYVhjeThq?=
 =?utf-8?B?RmVDQlJNRzdnMkFOUEg3aFY3YkdVZVcvelBHYVNBY1JDbkZMdnd2R0l2RkQr?=
 =?utf-8?B?S2lnZU5QdHkrd1dNQmgwMEJOMW1JYlpZNThhT1Q3QS95eHdwUWU3d2IrbGN5?=
 =?utf-8?B?WTV4OGU5WHRtYlR6VWZhdVJqNEZuYnFvWlVyVmtBS3M5d29aVWJRT0hEVVVJ?=
 =?utf-8?B?b0QrMUhyTEdMYkw4ZExBMzBreVNqVjhvc3BuUE1ZaFBpSzQrUkltUmk4SDJC?=
 =?utf-8?B?SDFmdzdtWDduTjV1TlZvbEhYL2ZVbzBGWG5DQlppL2ZSOFRwUi9hOXpZdVhI?=
 =?utf-8?B?TnQxZ3VIQ2JCL1JWUlFQdU9MSDhPbGpmSTlsL3RwQjRXRE0vR0JDU2dmdVNn?=
 =?utf-8?B?OC9yWjFCaDZMeDN0YkFRaXU4WFZUMUd1dWdFSzZwYVdvTGgwL3A1aENlTFpN?=
 =?utf-8?B?UjlTREttK1BiZDFSTDlyMFd3V0tqOGFIVzdpMlAxNVVST2tFUE40VnM4MTYz?=
 =?utf-8?B?SzFyNUN6VmtCalBMSE9JWk9hU3loUXNMRTBXN1d4aXhIU285dmNZVkNXM0VH?=
 =?utf-8?B?dXVHT1h3YjdFL25Qbm80aU5ER1NXWlhjRWZnQ2xYbnhsWUFBTmUzNElSSFdi?=
 =?utf-8?B?cEh2aDVPMXExN1V5L0tMRE9FSyt6aWF0TWo3ZEFjNDl2aXFjWWJMekZ6b3lp?=
 =?utf-8?B?aDZPcllsVmNaWW9GV0hCTDJJSit1U1FzVWNKSUFZbmxWWUE5ak1ZZStScEpX?=
 =?utf-8?B?Q0tFQ0E2NXBLb0tER3pFQTRrVUNzQVNXZG9zY1U3RkViTGFJOXh2V1hsZHUz?=
 =?utf-8?B?bmJyK0txRGRlamlpK3JoNkJsUFlxeFdqdlNkUUFqSXlobUJlbDk2ZE1HTVZs?=
 =?utf-8?B?WFBkK3BhSiszdmkyMnhIbjJZdzZTb1BOTDRWeFFnT1BRWko5dEp2bVBRM21Z?=
 =?utf-8?B?RlRnQ3R4MVZMWCs3amNNY2l6c0MzT0xsNzJkd2VHbUhIUTZDKzVRZm1Lejlw?=
 =?utf-8?B?d3plamtJR09MeU84NW9YeDMzVzVEYUFuek1uL1dhRXZMaXRLc2FjZ1pWT0Jl?=
 =?utf-8?B?OEVaZFdKZWpiWS9PQ3ArMXJxRExsU3JmTk1tUUg3cy9IZUNjYmIvemdGbmNu?=
 =?utf-8?B?WW5TNXNRSFJjYlVZQ0MraVArMHRYTm5kdWhDQklvdVRHaUY3OEpPMDJyNzdE?=
 =?utf-8?B?MnlOWElSTkYrYUdLZGdlOUl3WFZidE9KRlRldTJJTzNhQlRLUkszc21Gb0tG?=
 =?utf-8?B?eU51RUFPY0ZBVUM2aEk0bm52dTVMbXlNTVVzNlBja3VyUXNRdHhUSTNIK2FT?=
 =?utf-8?B?Z0g4aFhDaGxCMzVpQnVwdzl3T05qWjFMTjFaOUVDdnoyZ2xuKzAzTUhOU3Vl?=
 =?utf-8?B?a1pIUi9la1pSQm4yWms0WW9OMWl5bmtlbDBuQy9VOTR0QW5QNnhHNHV0S1hp?=
 =?utf-8?Q?75yIuDsDwATuukJ2z4ALJeuxYmImjxDI?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1b86fd40-95fc-4c20-2ad3-08da08304118
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 16:07:37.1307
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: YpI5Z1OOkAWL4Rkzn64/mvz86Baft00+DslgnkfH3bcTxT42kNbsgGsoX+LDQzQRYmMO/vRDTUsii0pvRhLCZg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR04MB2945

On 17.03.2022 16:59, Tamas K Lengyel wrote:
> On Thu, Mar 17, 2022 at 11:06 AM Jan Beulich <jbeulich@suse.com> wrote:
>>
>> On 17.03.2022 15:43, Tamas K Lengyel wrote:
>>> On Thu, Mar 17, 2022 at 9:56 AM Jan Beulich <jbeulich@suse.com> wrote:
>>>> On 10.03.2022 19:44, Tamas K Lengyel wrote:
>>>>> @@ -1155,6 +1154,8 @@ static int cf_check hvm_load_cpu_ctxt(struct domain *d, hvm_domain_context_t *h)
>>>>>      v->arch.dr6   = ctxt.dr6;
>>>>>      v->arch.dr7   = ctxt.dr7;
>>>>>
>>>>> +    hvm_set_interrupt_shadow(v, ctxt.interruptibility_info);
>>>>
>>>> Setting reserved bits as well as certain combinations of bits will
>>>> cause VM entry to fail. I think it would be nice to report this as
>>>> an error here rather than waiting for the VM entry failure.
>>>
>>> Not sure if this would be the right spot to do that since that's all
>>> VMX specific and this is the common hvm code.
>>
>> Well, it would be the VMX hook to do the checking, with an error
>> propagated back here.
> 
> I'm actually against it because the overhead of that error-checking
> during vm forking would be significant with really no benefit. We are
> copying the state from the parent where it was running fine before, so
> doing that sanity checking thousands of times per second when we
> already know its fine is bad.

I can see your point, but my concern is not forking but normal migration
or restoring of guests, where the incoming data is of effectively
unknown origin.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 16:17:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 16:17:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291669.495211 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUsot-0000NJ-O2; Thu, 17 Mar 2022 16:17:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291669.495211; Thu, 17 Mar 2022 16:17:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUsot-0000NC-Jb; Thu, 17 Mar 2022 16:17:47 +0000
Received: by outflank-mailman (input) for mailman id 291669;
 Thu, 17 Mar 2022 16:17:46 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Gtxi=T4=gmail.com=tamas.k.lengyel@srs-se1.protection.inumbo.net>)
 id 1nUsos-0000Ll-3r
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 16:17:46 +0000
Received: from mail-io1-xd2a.google.com (mail-io1-xd2a.google.com
 [2607:f8b0:4864:20::d2a])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id c6d79850-a60d-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 17:17:45 +0100 (CET)
Received: by mail-io1-xd2a.google.com with SMTP id w7so6453348ioj.5
 for <xen-devel@lists.xenproject.org>; Thu, 17 Mar 2022 09:17:44 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c6d79850-a60d-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=JxLjpWSIHvZG9FKfsgH+mfSUEz4eG17pTg1A3b2zFkA=;
        b=eWFsg4onp/UCfEimNAk3GCR9Bmm3V6y2LgD4hHMuRDnB46GR+93fJtW7sCnLOwXJbq
         ChOjPHKRJZvPWrLyt5SHk0SSvyYYkCnT7XuR/9ObH5ixIZqcuFYpnJV20Hyzbs2i1fGx
         XmjaSc77JdJ1STHN9nDgyYz6nT8UkNitcMR60aykGPXmZBCio0lQkxYUwkH0Igsn9+nX
         IvXpGSQEjnbyaVYbaYOYGcUHefFyWu7uJuGP/Sx6abZ5phaeKzouJeAquNpvEMqLKtax
         7SmCrhuhcSSs0Y1cgRi8K6/H/4eVvmQVD1DQp/sM0XRtYbgnDAHoNvbr91sgLNzKLt0s
         f19w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=JxLjpWSIHvZG9FKfsgH+mfSUEz4eG17pTg1A3b2zFkA=;
        b=FChhUws/oVUTXXiGA5J0LfsdYtnsdY4rHGubWahXQvO05pm3IDHedW8WjOVceSD1Xw
         UKQMfUuhnQ6KF3fvlPQK92DHu/t6Q/4gDu+NaUYqSTpc1b+xAITBhEMeeHBhL3MgLf4h
         f2BDW0wdetXARY+GigGG+JhRid0zxYG1LaFNHrH37REM47H+/kFspJrDehvDout2wijq
         8baUdGqcZisH+u/nMJbuD3dmXNlZGHESgUD5o5A1GLpmbvYnPh5rRwwvT3M6HWTY3oHM
         RTed2G8JClXBeBSA2IlBk+G9d8sPIZbZIsfVg4WPjMC7Fdm3Hhy98g8gCJojHkfm30ka
         fOzg==
X-Gm-Message-State: AOAM533vhv587dgmr6+vF1G9Cw/pxAlzXBWrZSdI+23I7KPcvkN85lye
	E+DBUr2h87GLlL2hHbAq7mLEU17NahwxoCUchSU=
X-Google-Smtp-Source: ABdhPJyC/V8enoH+Adc3D2IRvA6nB3nabgVeLeYRTGcg13stAYvY6UYIb+SFYdcBJHi9oRf84OEW68mtS8j8JeHnlCU=
X-Received: by 2002:a05:6638:4102:b0:319:effe:d355 with SMTP id
 ay2-20020a056638410200b00319effed355mr2520443jab.121.1647533863778; Thu, 17
 Mar 2022 09:17:43 -0700 (PDT)
MIME-Version: 1.0
References: <05d0a5b5c18d667a5527e6f834347f54a10309da.1646937728.git.tamas.lengyel@intel.com>
 <28f869eb-c6f0-cc67-8d29-9751447d2ad3@suse.com> <CABfawhnsbqBOuTyB-C4sY23GY-4-AXd38TXqVMemVt_duwSZiQ@mail.gmail.com>
 <3dc898e4-b00b-2e85-eda9-a28da6737ab5@suse.com> <CABfawh=FgBcLYgFr+4R7795bqKfeYyr5MF09__zDEpfk6hcmHg@mail.gmail.com>
 <2f0a88cc-f9f2-2b9b-dd0b-52321ab328c2@suse.com>
In-Reply-To: <2f0a88cc-f9f2-2b9b-dd0b-52321ab328c2@suse.com>
From: Tamas K Lengyel <tamas.k.lengyel@gmail.com>
Date: Thu, 17 Mar 2022 12:17:07 -0400
Message-ID: <CABfawhmhfqL4V_XwFdnkeTU0EsnWMfcOrk6xU7CLDOn3tCyUeg@mail.gmail.com>
Subject: Re: [PATCH] x86/hvm: Include interruptibility state in hvm_hw_cpu
To: Jan Beulich <JBeulich@suse.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>, Andrew Cooper <andrew.cooper3@citrix.com>, 
	=?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>, Wei Liu <wl@xen.org>, 
	Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian <kevin.tian@intel.com>, 
	xen-devel@lists.xenproject.org
Content-Type: text/plain; charset="UTF-8"

On Thu, Mar 17, 2022 at 12:07 PM Jan Beulich <jbeulich@suse.com> wrote:
>
> On 17.03.2022 16:59, Tamas K Lengyel wrote:
> > On Thu, Mar 17, 2022 at 11:06 AM Jan Beulich <jbeulich@suse.com> wrote:
> >>
> >> On 17.03.2022 15:43, Tamas K Lengyel wrote:
> >>> On Thu, Mar 17, 2022 at 9:56 AM Jan Beulich <jbeulich@suse.com> wrote:
> >>>> On 10.03.2022 19:44, Tamas K Lengyel wrote:
> >>>>> @@ -1155,6 +1154,8 @@ static int cf_check hvm_load_cpu_ctxt(struct domain *d, hvm_domain_context_t *h)
> >>>>>      v->arch.dr6   = ctxt.dr6;
> >>>>>      v->arch.dr7   = ctxt.dr7;
> >>>>>
> >>>>> +    hvm_set_interrupt_shadow(v, ctxt.interruptibility_info);
> >>>>
> >>>> Setting reserved bits as well as certain combinations of bits will
> >>>> cause VM entry to fail. I think it would be nice to report this as
> >>>> an error here rather than waiting for the VM entry failure.
> >>>
> >>> Not sure if this would be the right spot to do that since that's all
> >>> VMX specific and this is the common hvm code.
> >>
> >> Well, it would be the VMX hook to do the checking, with an error
> >> propagated back here.
> >
> > I'm actually against it because the overhead of that error-checking
> > during vm forking would be significant with really no benefit. We are
> > copying the state from the parent where it was running fine before, so
> > doing that sanity checking thousands of times per second when we
> > already know its fine is bad.
>
> I can see your point, but my concern is not forking but normal migration
> or restoring of guests, where the incoming data is of effectively
> unknown origin.

IMHO for that route the error checking is better performed at the
toolstack level that sends the data to Xen.

Tamas


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 16:19:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 16:19:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291672.495222 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUsqT-0000vM-2P; Thu, 17 Mar 2022 16:19:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291672.495222; Thu, 17 Mar 2022 16:19:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUsqS-0000vF-VG; Thu, 17 Mar 2022 16:19:24 +0000
Received: by outflank-mailman (input) for mailman id 291672;
 Thu, 17 Mar 2022 16:19:23 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=hAZZ=T4=citrix.com=prvs=068f51ced=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nUsqR-0000v9-DL
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 16:19:23 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ff828e64-a60d-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 17:19:21 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ff828e64-a60d-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647533961;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=A0rxCl6BuqrJGmVUpAJ5lvZd2V6Vom0RNBwPgn/WC3s=;
  b=IjKtrcDHiRkOS3y1dhIu3zvQE+5X3ZDHRoLr6/7Z5p5T1SCOzO3kBqoG
   KsoZSr2iXhVTOM3XfFV/MviNylOWdaJL2Y680GM0Z7qYuE0dJWMcLeJYw
   iHrR4DdSr88Bw/91xRy6/arPy1W3Baj0EAkr4KsWsUYGZ15Pw1Jr4+scH
   k=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66923984
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:3dd4xqzmtArB3q9Iq716t+cKxirEfRIJ4+MujC+fZmUNrF6WrkUCx
 mdMW2yOOv+OYzejco9yPITi8UgA7MCGyYNhTQY4+SAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2IfhWWthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 Nplu8S8RiIuN5bwnOUHTSN3KyY5bJYf5+qSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DFYUToHx/ixreCu4rW8vrSKTW/95Imjw3g6iiGN6AO
 ZtDMms/MHwsZTVQGw4ONK5gh9ymm1jvWBQA92O5j4A4tj27IAtZj+G2bYu9lsaxbcBchEORv
 G/F12X/HBABNdabxCaF83SjnevGl2XwX4d6PK218LtmjUOewkQXCQYKTh2rrP+hkEm8VtlDb
 UsO9UIGr6I/6UiqRdnVRACjrTiPuRt0c8VUO/037keK0KW83uqCLjFaFHgbMoVg7ZJoA2xxv
 rOUoz/3LTI3vLKwTnumyrOVty2IFhASaj45PDBRGGPp/OLfiI00ixvOSPNqH6i0ksD5FFnM/
 tyakMQtr+5N1JBWjs1X6XiC2mvx/caREmbZ8y2NBgqYAhVFiJlJjmBCwXzS9r5+IYmQVTFtV
 1BUypHFvIji4Xxg/RFhodnh/pn0v55p0xWG2DaD+qXNERz3pxZPmqgKvFlDyL9BaJpsRNMQS
 Ba7VfltzJFSJmC2SqR8fpi8Dc8npYC5S4i6Cq2LN4AQOscsHONiwM2ITRTMt4wKuBJw+ZzTx
 L/BKZr8ZZrkIfkPIMWKqxc1juZwm3FWKZL7TpHn1RW3uYdyl1bOIYrpxGCmN7hjhIvd+V292
 48Ga6OilkUOOMWjM3K/2dNCcjg3wY0TWMmeRzp/LbXYfGKL2QgJVpfs/F/WU9c8zvoPybuQo
 C3Vt40x4AOXuEAr4D6iMxhLQLjuQYx+vTQ8OyktNkyvwH8tfcCk66J3Snf9VeVPGDBLpRKsc
 8Q4Rg==
IronPort-HdrOrdr: A9a23:Kajvma75SawlHsKelQPXwWaBI+orL9Y04lQ7vn2ZFiY7TiXIra
 yTdaoguCMc0AxhJU3Jmbi7Scy9qeu1z+873WBjB8bfYOCAghrnEGgC1/qv/9SEIUPDH4FmpN
 5dmsRFeb7N5B1B/LzHCWqDYpcdKbu8gdiVbI7lph8HJ2ALV0gj1XYDNu/yKDwseOAsP+tcKH
 Po3Lsgm9PWQwVxUi3UPAhmY8Hz4/nw0L72ax8PABAqrCOUiymz1bL8Gx+Emj8DTjJm294ZgC
 j4uj28wp/mn+Cwyxfa2WOWxY9RgsHdxtxKA9HJotQJKw/rlh2jaO1aKv6/VXEO0aOSAWQR4Z
 3xSiQbToNOArTqDyeISC7WqkzdOfAVmibfIBGj8CPeSIfCNU0H4oJ69Pxkm13imhAdVZhHod
 J2NyjyjesnMTrQ2Cv6/NTGTBdsiw69pmcji/caizhFXZIZc6I5l/1VwKp5KuZIIMvB0vFuLA
 CuNrCp2N9GNVeBK3zJtGhmx9KhGnw1AxedW0AH/siYySJfknx1x1YRgJV3pAZMyLstD51fo+
 jUOKVhk79DCscQcKJmHe8EBc+6EHbETx7AOH+bZV7nCKYEMXTQrIOf2sR+2Mi6PJgTiJcikp
 XIV11V8WY0ZkL1EMWLmIZG9xjcKV/NKwgFCvsukKSRloeMNoYDaxfzO2zGu/HQ1skiPg==
X-IronPort-AV: E=Sophos;i="5.90,188,1643691600"; 
   d="scan'208";a="66923984"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=J8/iHo9GsqtAq+dKn+Y2WxKsnCrQlaDT3S4pBPm8kAuFTUYw01s+vkZOksX5DDjjTVcP0WXHkn2WTb39ukGwIsKXsBVn0QZXmCigixOJDxZqegvMlJe1ls4xO9wjik5/SuBjDhvde/b2KFdsodDMAHVHHLwzrpHkAFn8oXy94jY3ldrFq3+y1HjC6S97C39yeqzlF0K5Aib4nlTPn1Y1eUIpjfYP3iVNmoEnNN8Yj/Hv/2S8SsOnH4mTHZs6avCXvdFdn0mv9Az9xxoh86gw6dhm0bZ/5uJX9eDrl70AD3YfPI0tXQTFomToRaWJajgYk/VNCfawc4JuCNMJCVFBeQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=A0rxCl6BuqrJGmVUpAJ5lvZd2V6Vom0RNBwPgn/WC3s=;
 b=npnrySYyew/mCTQw54YYVEJf8B1ODqxbyxxEXwr8PThu7q6jmbmhCngb/gHESAd0Usrfvsl0+1ycwulZ1cbEAuovlc4OZ5Lt7tmBreIKBia4tLMMpoPmQuHh6nuv3ZJAMxN8MVLh55P/Y2ye8T4LU5uT9+BTbmFAyu7Wyhww1EZWSp8E46Je8qi+IEZYRA80CJCKVL5hR9glBWq9Wf2Mjz/1t/sUM01nDGKFURiaev5fJeVdT2pZiVuVti7sLLlCX+UyAhUeR4TTd1qEqepEw/6erhCCBHzNMCrilOTxMqFThHYsfbFAjAlShi0LKlphbAGQrIQJEn8DkJoPH9fSjQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=A0rxCl6BuqrJGmVUpAJ5lvZd2V6Vom0RNBwPgn/WC3s=;
 b=uFXDSdgFiV523KFHn1ElaeG7Gl+i5LPuIxa57Zug8AE7T8Ldm+iH+x1qp5mA9PhA3zvaEcui8yWsUZdwYRaArlU1OllLx0ZjCEm4jGACeuG8cwU5W+qakIy+8n9BKX0YgiMEeScDwZt5vFavbrff7Qi0faW9DB+rHIw9oFUqoys=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
	=?utf-8?B?TWFyZWsgTWFyY3p5a293c2tpLUfDs3JlY2tp?=
	<marmarek@invisiblethingslab.com>, Xen-devel <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH] x86/cet: Remove writeable mapping of the BSPs shadow
 stack
Thread-Topic: [PATCH] x86/cet: Remove writeable mapping of the BSPs shadow
 stack
Thread-Index: AQHYOI1bRL6jiuzp4UWoineooRKJ46zBsAOAgAC1YICAAOkogIAAdcwA
Date: Thu, 17 Mar 2022 16:19:07 +0000
Message-ID: <f6d2ce09-5a02-5e73-7232-5f0f79e8b39f@citrix.com>
References: <20220315165340.32144-1-andrew.cooper3@citrix.com>
 <345b2f17-5fba-5dba-f7f5-c1634fc69a6e@suse.com>
 <101d1e70-51c7-036d-c5e2-fd382a2be7a8@citrix.com>
 <2adbd1dc-38f9-21b2-b38a-06835aa164d0@suse.com>
In-Reply-To: <2adbd1dc-38f9-21b2-b38a-06835aa164d0@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 379fc85b-5710-4f06-4b38-08da0831dc75
x-ms-traffictypediagnostic: CY4PR03MB2773:EE_
x-microsoft-antispam-prvs: <CY4PR03MB27732F6AAD4129CBF573EE88BA129@CY4PR03MB2773.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(36756003)(38100700002)(53546011)(82960400001)(5660300002)(122000001)(508600001)(2906002)(31686004)(6512007)(6506007)(71200400001)(38070700005)(91956017)(4326008)(2616005)(76116006)(6916009)(6486002)(8936002)(83380400001)(26005)(186003)(66556008)(66476007)(66446008)(64756008)(66946007)(31696002)(54906003)(316002)(8676002)(86362001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?d2JrQmNVU0tYTzlaam0xODE5R2lXa21hNXFhbi94WGYyUEJLZFVUWlBINFJI?=
 =?utf-8?B?TTRQVUtkUWEyd0dmQ2cwb2ZYSjJJU29vRmhCMk5FNFh3ZHh3bWlsZ3NzeEta?=
 =?utf-8?B?V0pyR0RHejVXUGFIaTRPcU4rZkpxdjJXeCtzQUlZVW51dlE5MU54M1BLMmF1?=
 =?utf-8?B?UlVDL094YmFGSFNHclFKUjlSVjZEajZXNWRaOXhibjRmOXJyYkM2eGh6Ym1a?=
 =?utf-8?B?c3k1MzI3OHI0ZVZxLzdRNTcvcWNNNUN4RTg2RnZHZ0VqUmhiUEd6VjIvbEZr?=
 =?utf-8?B?OEtCUVFQakhYT0JJVm9tM1hPTW9iYWk5b3ZLejllVDRwYXBOSzQzRE13T2ww?=
 =?utf-8?B?TWxSZnkrOFI5bzhEZS9TTFl2N1I5Z1hrcTFvenY0NlBqbUpTTE5LQ3RsSTZv?=
 =?utf-8?B?SVZPem1uOGpvZ0NPalFNWlhpRS9yWnk1NXF4OG40aUhtT3FhY1czNWZ6cXoy?=
 =?utf-8?B?Z3BEVTBXVEZxYVNnZUp1dkpHaFBySXY3dHlzTHZkT2xuNTRmZEQ4bC84M0gx?=
 =?utf-8?B?Nm9RRXJQNmlPMVEwSnRvUWNRUGQra3cySzZEN3NxWWpLZHladm43elYyZjN2?=
 =?utf-8?B?cVJzNjhGOFNjdkxPdUVCZkhNOVBER0RZbmtoZnFWVERqWmVpeDVjenFGZkkz?=
 =?utf-8?B?VTRwdTl4RG00U1kxa1NCQmt3R2dac3JjYVRZQVlYU0ZHY2RiUTE5L0Q0N3BD?=
 =?utf-8?B?VVBGcWhkTU1LdGVDVWFxd1hRZ3NQa3NNTWlhVTVJcUw0UHRuTkIzdFJ3MWlz?=
 =?utf-8?B?SndUaEdYcXloVlhLQlBpQVBvcGJ2UlFkWjV3T01obUwyeEI1RlF1Uk02TE9u?=
 =?utf-8?B?UWNhWFRQdFAyRnhROU8vMFdPRis0VEtmUFNnb2RSV0xtUkx0MkU2Y3dCa3NO?=
 =?utf-8?B?N25MZHg0cDg5cXdza3czc3hXbDRTYlRKeFNXeE16M1ZCN1MvZUNsSDhPMitK?=
 =?utf-8?B?U21DbUFQVjhkZi9qSk5zM1VIL3JYYkF4NHdQQ3A5eWFnT3V2dDBidzA3aGhS?=
 =?utf-8?B?ZWhsajkyVDJoek9oci9MSlppbWx5VmJsTWpxSHZCQ2oxa0xRdEgrOTFLcy95?=
 =?utf-8?B?Wmk5VEYxQVA4eW93NWczRnNKaTlRTnpDWEJpMlFDb2NENklvZXp2Vm16UkIr?=
 =?utf-8?B?SzFGZTRaZlpLaXEwK0NhTTVNVTZzNEpBSDBQZnRlZ1BxVjdMeFFsQXY4SVZv?=
 =?utf-8?B?Rjlrd2c0YS9vRmNpWVdVU0pJY2p6NTh5K1pVdW1vb0ovM1kwcmJhR0xaem0y?=
 =?utf-8?B?eUhWZDhETzAwcnZhK1Ywc2V3YmVvVWhsdzlXWkZnYWl6K1VGUHQwZk5Rclhw?=
 =?utf-8?B?Q0k0aHA0NGRLMEUyblpLMUV5SEU3cnM5SEN6QnpwVUVuaWdwbGNzdzZBY1lR?=
 =?utf-8?B?bEhQdU90MktLSlIrc3pVdS9HeGIvOFZsdmZTNWM3UW8xeCs0QjFaemI0NWEv?=
 =?utf-8?B?eE9rK0hNOWVITzhvRlZib21yNzJnbUFNQ2Vyc0xaZUNVVitYOU01eXlaUCs3?=
 =?utf-8?B?V1RNL3M3Z1V4Y3doQXIxNTE4aVJ2NEtOZTY1a2d5ZGRZWmQrS0pIVW0wbnc0?=
 =?utf-8?B?QnhLOVJGcXF1QVFSc2VwNU14WlNwSzQxbXF3NWZrYkNUT1p1WDRPYmNZcmdI?=
 =?utf-8?B?cDlnRzVLVUt1Mk1JSUt3dXBmMnN6Z05hSWttRk12dTBrWWFOV2tPbm9YVG4r?=
 =?utf-8?B?QThzd2tqcW8wRlV1WGpUaWprOU1MOEJHdVJzVG1FRkxHK3M5aW1XWW8rQmJh?=
 =?utf-8?B?a09kN3JyaXltNncxMDlGcWR0S21QSWJBeXRINndtTDg5Zk5XRWFQNHl6OW80?=
 =?utf-8?B?YnFWa1lmZUh2bUlkYzl0aTVHZVBCcHQxWmVUZHBVNno1aXI0RlBjeTlXLzRQ?=
 =?utf-8?B?MlhTNG02Y00zQnRyLzJIMUxKeU0xVXhMcmdBYWxCK2g3RS8ycEgreElXYTIx?=
 =?utf-8?Q?zpAiOaZUhJ+zhocODSCdbmvTkORSJWx+?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <F34CE0DA9EB0E044858465F763A7EF4A@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 379fc85b-5710-4f06-4b38-08da0831dc75
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Mar 2022 16:19:07.0503
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: sux/Yd2IG4VUUCzazX4I2nxk852LEzbKpizTFschxYouAy015nnV60BRy0oGJfYIGD7h3DrUrTqvZTUPGAMcD7RE+hwuvVkapo4alwXGhO4=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR03MB2773
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Thu Mar 17 16:29:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 16:29:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291677.495233 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUszU-0002US-2M; Thu, 17 Mar 2022 16:28:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291677.495233; Thu, 17 Mar 2022 16:28:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUszT-0002UI-V4; Thu, 17 Mar 2022 16:28:43 +0000
Received: by outflank-mailman (input) for mailman id 291677;
 Thu, 17 Mar 2022 16:28:42 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RBlk=T4=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nUszR-0002UC-VY
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 16:28:42 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4dd8d569-a60f-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 17:28:40 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2104.outbound.protection.outlook.com [104.47.18.104]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-13-zdCBdMrANUq41GkRspgoAA-1; Thu, 17 Mar 2022 17:28:39 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM6PR04MB4822.eurprd04.prod.outlook.com (2603:10a6:20b:a::17) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.28; Thu, 17 Mar
 2022 16:28:38 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d%9]) with mapi id 15.20.5081.017; Thu, 17 Mar 2022
 16:28:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4dd8d569-a60f-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647534520;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=zeIS3cCj74E5IhqDXde3m7dOi3ToTkToqd1QVNmiVwI=;
	b=XbbbJQP1MP3DZhij6/G/7bgIlAQSQYaOiEAzRbC3IpDmlDoPfwppT6UzYKhvsmjLZt+kuq
	WL7F2lSKs/Jj0ZIOfaTy5gaqf2ulfSb1v10qf+LK4ORJCMD3BZ6GwEpZVsVNLQDXhgGUmg
	XynUKowFQiBcrvJtk56EpzYkMJUp84M=
X-MC-Unique: zdCBdMrANUq41GkRspgoAA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=OO+Dv9W/WUXMynpEu+4ziQUe7yZG+eK9+9sj5rHqzLfAjPMB7fIdNeI5k8ym4IMR+G0h2W0622FYMmO29OmugUcwTmWWWVR4KQlBHoK7BqTFwk/6yt1NB0e+lGBUub33pppedjdpZip8PjhXnXgs9SD4B2Q72AdqIqVwFFcPj/IxjvmEtrgeiDURX+LtTuRlL2FenvI51L3hgHG4nSCsiqi9xjXW7UBn5BgKLEqzWEDQSWT5u4UcSGeXVyxRwKwN5Dyc59x9vIXjmeHpDLeuzD3QkAKric/N6s5QIRgiCL8Fx/OeUPKlPvN3nXMO6hiPY/ZSQ0Igx+LuLgmO/VxlLA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=itbTXqyxuqZ9ejPmWMyfc13oyKszIbVVID102UNFa+s=;
 b=BN1tk7b+f7MxFAhe6D6Sh5DFH0odziPJhXiCCh7NNENIC5NPdto3NFy0G4/aAEDT19FiA8+Vk9bUBnt146NqHrqtrmiYQIDXd5CbeTeJ611qmnGGxHibQXueNxCxpK7qTYlyBR/cy17VeYWEi68UeWpPdQLkH2a91RCSz+nO2V9ZSUz88BydMhSiYRWLVIase7KlL5K6cUHcz05VZabaEkZA/9s/UeQ7s8DVQ3cyVk27tGHLNXCemECfAup7DYmgkmvgWvTSlqfTjGYGz4EGnRTuQUDJC3DB6bj7tlxlQTEcFcLuy/dHzOZQgoR6HdG15zrSRQQ6ZGJFaWGtyasuFQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <34d1acf6-5d37-6be9-cf1d-33b1fcd504bc@suse.com>
Date: Thu, 17 Mar 2022 17:28:35 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] x86/cet: Remove writeable mapping of the BSPs shadow
 stack
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?=
 <marmarek@invisiblethingslab.com>, Xen-devel <xen-devel@lists.xenproject.org>
References: <20220315165340.32144-1-andrew.cooper3@citrix.com>
 <345b2f17-5fba-5dba-f7f5-c1634fc69a6e@suse.com>
 <101d1e70-51c7-036d-c5e2-fd382a2be7a8@citrix.com>
 <2adbd1dc-38f9-21b2-b38a-06835aa164d0@suse.com>
 <f6d2ce09-5a02-5e73-7232-5f0f79e8b39f@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <f6d2ce09-5a02-5e73-7232-5f0f79e8b39f@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6P191CA0065.EURP191.PROD.OUTLOOK.COM
 (2603:10a6:209:7f::42) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ddec2623-b506-43a9-b6b3-08da083330ad
X-MS-TrafficTypeDiagnostic: AM6PR04MB4822:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB4822A48E46B9A2689822FA23B3129@AM6PR04MB4822.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6916009)(54906003)(316002)(2906002)(36756003)(66946007)(508600001)(66476007)(6486002)(5660300002)(8936002)(38100700002)(4326008)(8676002)(31696002)(66556008)(86362001)(31686004)(6512007)(2616005)(6666004)(6506007)(83380400001)(53546011)(26005)(186003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?Tey8qUuqBsc4dgfj1EWzAIcPckF6fV8WK4KhnVPLjf7ZpcBPUMg/B7p9YZbt?=
 =?us-ascii?Q?mRrh7xOA8jMPFfSiDAoKdy7E1WpJpSxo+xhReFAdFbZPy66F5rUA5ijCUzAx?=
 =?us-ascii?Q?+ia5758pe8UnZoyOJn4nHSxPVM4ClhcfTqejkDUaKlTtTltQjB4U2GnOSXsn?=
 =?us-ascii?Q?nLtSGv4SterDcL8NByB++veg2g+GUe3UNsq/QkYYtqQ/q4cOROAw2SzLYoO8?=
 =?us-ascii?Q?o45LoYUYOBKwOoVG6Orsb9RxGS7YUeUy2AqYOqyhRRrMl9C71zPV7g9R4frF?=
 =?us-ascii?Q?iqBcENY7Zw5co4w9YIcbxP4ByyRdaBv7181kwH0RhcAfMqweUB+Znf66VFjR?=
 =?us-ascii?Q?9rUD1fHPvEwoLRv4XnrL+8q3jvj9UoZgDB9HZ3o8OWgH4EVJ3GjisSQj8GeS?=
 =?us-ascii?Q?Oi/c+/ESRQq6PTLTczFzNtta6oqgsqg0g3r09rl6dEJz38o3B4JRQpbGq+B2?=
 =?us-ascii?Q?JjLAncTrGbbY2uyBdkoWJ3hvQFyYKIfL75+pXgBPxMu8BE13NtZSM6jtfXSH?=
 =?us-ascii?Q?5dGpVywDIVNWMHpCAQYx0EIV9UEvW9Gsiz9AFuSQB2nvUUWsgiHs73NdKVuc?=
 =?us-ascii?Q?Hp+vcBuvPKIARZ2WoRLGlbDhmAoCxqIC4YUtTIorx67nPjhNDwQxjMIPGdnY?=
 =?us-ascii?Q?iSHpX150RjQUeag7GRh1fivgO1VcbxyylyMm5ZzI9mUvZLLiBW4vgOJxvr2r?=
 =?us-ascii?Q?5uPzHEJIWzmOHfMC6Z+czlOHrM62hyphNb8tdHv1t3WJZo5s6G0cuaFb7nqt?=
 =?us-ascii?Q?4uz9XeuEjZJb2U/9Jd1P3myFAtUu32tQVFLb3RTbgzJ1i3rsjSCRSrDUicNr?=
 =?us-ascii?Q?t/QdqerPVMYlvWxgK0sujIL+NisMs8ShlcHUYJkyRAbZYc7O4I/j4p7XhLG0?=
 =?us-ascii?Q?XIZYA5nos9Jywhy1XQSv689gJIBxuN0wG7emStDiAgFEj36N3oQw5sMex9yn?=
 =?us-ascii?Q?4UvVB3Wc8o93Zp6/FpkLta/KUZ2jextnNdPab4LJxB6PsceKiqwaXfUlp3m3?=
 =?us-ascii?Q?DgIqLQ9gVwTbqyss6b+tpqKpZBpaWHWQF7+QG4WIQvSm1HROj2auINTtvOqe?=
 =?us-ascii?Q?9+IfqPgxnWTN75UAchvfewjOa7OaOkEeb4r7cEkWCT6+/DZ+HUAwK1zjM87s?=
 =?us-ascii?Q?yYHR9Au5u+hiSyo1AgktW8hYB1bI7vkyBUxXi5nCYCSF0smyZMUc5a21W8pC?=
 =?us-ascii?Q?Lor76YbgfH5XND/jhw8Km4XmwK5M9dRGAlFTq4icPCGrO611XqHFjEIT//C0?=
 =?us-ascii?Q?2jhtnV1/l4F9A7zRVwOt/9TgoaxnmHdbKLF0PTiTElCnxRvrHg5QWMgBMzMi?=
 =?us-ascii?Q?Ds9qA3VoZbUJPz5LF3elwVXz3KJGPJFmJrGKZRp4+gxP4vQPgatcgPGc0DSC?=
 =?us-ascii?Q?6k1cn+L94jHQB63ujC4cK9VCMN3pjstIKeKQMyuo090xargDU0t1iysjV0YJ?=
 =?us-ascii?Q?6l0NQGi06KfjiumkHQg/BKAN+/azEC9p?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ddec2623-b506-43a9-b6b3-08da083330ad
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 16:28:38.0797
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: mISgaAUNQeky0d7qWp/fU1LY60FydBuarHV3co8tnWoTiFIQfOFstFLQnOtOemJcO0RE/7HmXK9Pm75wo1zv1w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB4822

On 17.03.2022 17:19, Andrew Cooper wrote:
> On 17/03/2022 09:17, Jan Beulich wrote:
>> On 16.03.2022 20:23, Andrew Cooper wrote:
>>> On 16/03/2022 08:33, Jan Beulich wrote:
>>>> On 15.03.2022 17:53, Andrew Cooper wrote:
>>>>> --- a/xen/arch/x86/xen.lds.S
>>>>> +++ b/xen/arch/x86/xen.lds.S
>>>>> @@ -215,8 +215,9 @@ SECTIONS
>>>>>    } PHDR(text)
>>>>>    DECL_SECTION(.init.data) {
>>>>>  #endif
>>>>> +       . =3D ALIGN(STACK_SIZE);
>>>>> +       *(.init.bss.stack_aligned)
>>>> No real need for the ALIGN() here - it's the contributions to the
>>>> section which ought to come with proper alignment. Imo ALIGN()
>>>> should only ever be there ahead of a symbol definition, as otherwise
>>>> the symbol might not mark what it is intended to mark due to padding
>>>> which might be inserted. See also 01fe4da6243b ("x86: force suitable
>>>> alignment in sources rather than in linker script").
>>>>
>>>> Really we should consider using
>>>>
>>>>     *(SORT_BY_ALIGNMENT(.init.data .init.data.* .init.bss.*))
>>>>
>>>> While I can see your point against forcing sorting by alignment
>>>> globally, this very argument doesn't apply here (at least until
>>>> there appeared a way for the section attribute and -fdata-sections
>>>> to actually interact, such that .init.* could also become per-
>>>> function/object).
>>>>
>>>> Then again - this block of zeroes doesn't need to occupy space in
>>>> the binary.
>>> It already occupies space, because of mkelf32.
>> Hmm, yes, and not just because of mkelf32: Since we munge everything
>> in a single PT_LOAD segment in the linker script, all of .init.*
>> necessarily has space allocated.
>>
>>>>  It could very well live in a @nobits .init.bss in the
>>>> final ELF binary. But sadly the section isn't @nobits in the object
>>>> file, and with that there would need to be a way to make the linker
>>>> convert it to @nobits (and I'm unaware of such). What would work is
>>>> naming the section .bss.init.stack_aligned (or e.g.
>>>> .bss..init.stack_aligned to make it easier to separate it from
>>>> .bss.* in the linker script) - that'll make gcc mark it @nobits.
>>> Living in .bss would prevent it from being reclaimed.=C2=A0 We've got s=
everal
>>> nasty bugs from shooting holes in the Xen image, and too many special
>>> cases already.
>> I didn't suggest to put it in .bss; the suggested name was merely so
>> that gcc would mark the section @nobits and we could exclude the
>> section from what makes in into .bss in the final image independent
>> of .init.* vs .bss.* ordering in the linker script. But anyway - with
>> the above this aspect is now moot anyway.
>=20
> So can I take this as an ack with the .init typo fixed?

R-b, yes, as long as the ALIGN(STACK_SIZE) is also dropped and the
other ALIGN() is retained (the latter you did already indicate you
would do).

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 16:32:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 16:32:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291680.495243 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUt3G-0003rG-JB; Thu, 17 Mar 2022 16:32:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291680.495243; Thu, 17 Mar 2022 16:32:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUt3G-0003r9-Fd; Thu, 17 Mar 2022 16:32:38 +0000
Received: by outflank-mailman (input) for mailman id 291680;
 Thu, 17 Mar 2022 16:32:37 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=hAZZ=T4=citrix.com=prvs=068f51ced=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nUt3F-0003qz-M2
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 16:32:37 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d5bc89a6-a60f-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 17:32:29 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d5bc89a6-a60f-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647534755;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=SGXdJ1Chgk6Q4jFtlmKlAGEb7fNnZXg7s9I74lR5Li0=;
  b=gwCPc2Rc2XuCvjtUS0Lbh7mpfFCGwFshQq513z0W0/BMrsWpTqkbNkE2
   dO+3evg+FbLFv1AzpVehrSk5ZFcs7y6E+UVN6L0BUPsk+c/lM1JOG7Coj
   mBAwPYmbhswOwCgk0bvpFxUumfdJERMygIaV2IdhYU5a2TfMbOy6iFgm8
   U=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 68892782
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:GJfa2Kq30r7K85KmrkesoI+XBgVeBmIlZRIvgKrLsJaIsI4StFCzt
 garIBmFOfiPNGGjethxPYWz9UoBu5WEyYQwGlBpryhhQn5B+ZuZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 Iyq+aUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBD43PiudeQgtjAQZyGbwX2LT4JXmuvpnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVI5DfVF/s5B7vERL3H/4Rw1zYsnMFeW/3ZY
 qL1bBIxPESROUIfYD/7DroUguu3iCS8UQFXl1SyubQr3kHtx1V+he2F3N39JYXRGJQ9clyjj
 mfP5WHwGBwZHN2Z1zue83ioi/PPnCX0Q4YbHvuz8fsCqE2ewCkfBQMbUXO/oOKlkQiuVtRHM
 UsW9yEy668o+ySDTNPwQhm5q36spQMHVpxbFOhSwB6J4rrZ5UCeHGdsc9JaQIV47olsH2Vsj
 wLX2YOybdByjFGLYUO99aWX7iKgAjoyIUsTNA8Pcg8E8ta29enfkSnzZtpkFae0iPj8Fjfx3
 y2GoUACulkDsSIY//7lpA6a2lpAsrCMF1dovVuPAgpJ+ysjPOaYi5qUBU83BBqqBKKQVRG/s
 XcNgKByB8heXMjWxERhrAjgdYxFBspp0hWB2TaD/LF7rlxBHkJPm6gKvFmSw28zbq45lcfBO
 hO7hO+ozMY70IGWRaF2eZmtLM8h0LLtE9/oPtiNMIYRPsUuLVXZpH4zDaJ144wLuBJw+U3YE
 c3HGftA8F5AUfg3pNZIb7p1PUAXKtAWmjqIGMGTI+WP2ruCfn+FIYrpw3PVBt3VGJis+V2Pm
 /4GbpPi40wGDIXWP3mGmaZOfAtiBSVqWvjLRzl/K7frzvxOQzp6VZc8ANoJJuRYokiivryRr
 y/nBRMAlgaXaL+uAVziV02PoYjHBP5XhXk6ITYtLRCv3X0iapyo96ARa908erxPyQCp5aMco
 yUtEylYPslydw==
IronPort-HdrOrdr: A9a23:TNxw9qtTOWcdPo1ZsDUCMNFj7skDotV00zEX/kB9WHVpm5Sj5q
 eTdPRy73DJYUUqKRcdcLG7SdS9qBznhP1ICOUqUItKGTOW3FdAT7sSkbcKoQeQeREWn9Q1vc
 wLT0E9MqyUMbEQt6jHCXyDc+rIt+PnzEnHv4vjJjxWPHhXgulbnn9EIxfeGBZuXw9NCYAiGJ
 eb/cQvnUvbRZ04VLXBOkU4
X-IronPort-AV: E=Sophos;i="5.90,188,1643691600"; 
   d="scan'208";a="68892782"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=NJK/YTrUEAw9UxBwPK7illeYYwZbj/VavazdNbrxBsPlDs/jEsMm7QMYS5ga7kKpFwB6bhYabDGj5jVkQTx7ptYzsZm9jCXfeUKYJFkUbt8VcqNByFOlYCizB6x/E8gSwW34lXGwTob/SztL9TzQRlOrcfMa4WQlvRG05Cx7ZLoAzO1fJ4zNbsqIQL0iLqVwt816nAsm95FUEspaMFO3wfP2HnXhfIrZDBZYwwaLQJioL+dOV5tc4nZta7MCYvLdLu9L0h+JD/LE4G0Yc/IA4oxfhykGPlZWbA/YJBJJrM1uQ3fPvqkSerPl22YSqn+R+FxqHoaxrKkOvm7IpMoxaw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=SGXdJ1Chgk6Q4jFtlmKlAGEb7fNnZXg7s9I74lR5Li0=;
 b=VdQGYJn5NKHz1cOEwGZK0k4XXkfcQZNrF9DTYhh5jCsDVtHAD6MqDum7q+msUhFn2Yp9kq9ZsUijz1wcmMknEtMAp5MxFfU9ROBF8kAugD6O3BVG5ODDYpBLp7ZRFP6Ki5laXa1wHmuj+dTN1whehq7nMdru/aHZwc65qbATnOE19p5UQ/pDagmH8ZSJ0TiuMu7RJQ/LwlRXwDxmkYpxYfGE+YU9sU87FJApIwaYyFrRRvFa8EVqFg/ixX7tom0+hDOcPbrwnNqEcVjhqcdVvP5p8F9oupjbTUX3qV+39H3O6Gt9oeFovQABQTKiVuRrIiiFhxHW8IQxq+wknC8ikw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=SGXdJ1Chgk6Q4jFtlmKlAGEb7fNnZXg7s9I74lR5Li0=;
 b=Tj7gRpVrk7GGeoUlO1dhAtOrYeKOr8NrDSZqjEQtK6wcsZKT0iUTaNDqBevtHuy7XGcI9k75Y0qfC4oACM1v7rEojDDI4P7XdEZSZ1++LhAD6hVzHhy+rFp4XCN6+iNOELaSbD9g6jPp+thtL4dCykv5JWvKWMY68tpbgiKsaPw=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
	=?utf-8?B?TWFyZWsgTWFyY3p5a293c2tpLUfDs3JlY2tp?=
	<marmarek@invisiblethingslab.com>, Xen-devel <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH] x86/cet: Remove writeable mapping of the BSPs shadow
 stack
Thread-Topic: [PATCH] x86/cet: Remove writeable mapping of the BSPs shadow
 stack
Thread-Index: AQHYOI1bRL6jiuzp4UWoineooRKJ46zBsAOAgAC1YICAAOkogIAAdcwAgAACp4CAAAEXgA==
Date: Thu, 17 Mar 2022 16:32:30 +0000
Message-ID: <fb5930fe-b6c4-f3da-5e97-ca180ed1fa38@citrix.com>
References: <20220315165340.32144-1-andrew.cooper3@citrix.com>
 <345b2f17-5fba-5dba-f7f5-c1634fc69a6e@suse.com>
 <101d1e70-51c7-036d-c5e2-fd382a2be7a8@citrix.com>
 <2adbd1dc-38f9-21b2-b38a-06835aa164d0@suse.com>
 <f6d2ce09-5a02-5e73-7232-5f0f79e8b39f@citrix.com>
 <34d1acf6-5d37-6be9-cf1d-33b1fcd504bc@suse.com>
In-Reply-To: <34d1acf6-5d37-6be9-cf1d-33b1fcd504bc@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 3afe1ecb-2dcb-4a5b-9ebe-08da0833bb3e
x-ms-traffictypediagnostic: DM6PR03MB5241:EE_
x-microsoft-antispam-prvs: <DM6PR03MB5241A55BB621C1E61B9F8F95BA129@DM6PR03MB5241.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(4326008)(83380400001)(508600001)(82960400001)(122000001)(38100700002)(71200400001)(6512007)(5660300002)(6506007)(6486002)(53546011)(8936002)(316002)(2906002)(2616005)(38070700005)(26005)(54906003)(6916009)(186003)(91956017)(31696002)(31686004)(86362001)(76116006)(8676002)(66476007)(64756008)(66946007)(66556008)(66446008)(36756003)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?dVhvcXdJdFhWV0hFYzd0YVpkbW13Y3JuUXNYcjZQOCsxb0Vac0NxQWhtblUz?=
 =?utf-8?B?TTFiNlhMeUVjTEowNU5RWUJRY0xidXRCaU1DU3pGYVhQaFUwazZUT3dTLzVy?=
 =?utf-8?B?NklDTW5xRzNZSyt3ZUsvbUlMc3I5V1ZFKzJSdXFMZjZNNDZVa3pTTHllM0Na?=
 =?utf-8?B?VDhvMUlVcVdHK1E2OXZqSGpuQ2hya1k3NEdRQ1ZiK1E2bUpsYXVTRkZmUHht?=
 =?utf-8?B?SEN1dWpZeDJIa29xQTAzSjR6SnZmQzl3L0wxaTU1VE1JcjF4ZE1iOTFmZEhH?=
 =?utf-8?B?WVVtQmZnZlFicHA2cFF3U2NuRHF0eFc2MjRYL0Z5TXNJSlkrVFcyRlhZOGxu?=
 =?utf-8?B?NmFZZ0hVamJYdkhwUzhqR1k2c3dyOERDd1l0andqWWpDK0NRanNwZC9tMHhO?=
 =?utf-8?B?U1Z6R1ZBTHpvZW51MGt6aGxUb3VqWWRkS2tpcVdZcmVRc3JLWWVWMFNFTVAz?=
 =?utf-8?B?dlZ0WCttc3VuOTBCQkFsTGhSZTZ5MmtobjdkeGxNWnZVRlBrRm03Z1BiZUUz?=
 =?utf-8?B?bmtaRi8xcjg3Q01UYXRlRWI1RFRCaVV4eWlLZkVnZWNDdzdvaGt6VElPeGFQ?=
 =?utf-8?B?aEJBL3ZodjR4azJhRXpEZTFpM0VpUjZaTVZOMzZtTXFodEwxRWk5WWF5M3N1?=
 =?utf-8?B?UGx0eGdpcXl1NjUxWlQ3cTlSd3FMREgwY3pFY0I0UDIybWlvb0Y3dWFKZ3dp?=
 =?utf-8?B?ckljSmpIdGRLK3RMMUNWYUVPSjBrSi9tUjRhZktIT1J6Z25GMTNkVzdpUDcx?=
 =?utf-8?B?U2RMYzUzcENUZGFYKzB4T001NGFzU0F2ay9kMysyMVNyN1d0ckR4bU5CdTJB?=
 =?utf-8?B?Z1pHdU5pRFU2am43T1BpeDF5czlQMlVXcTFvTWdQZGZ6bTByU2pvN1hWakww?=
 =?utf-8?B?K0ttWjNXVytOMlJ2WTJyR09ocHlaV1hZV1NTS25mZm5UMGNVM3pRNzVqWSt2?=
 =?utf-8?B?OE02RVRzYUdVdW5PYVlvQTEwVmlVR3kxckE2Z0w0NkEyMGFvT3lpcDNDM2NY?=
 =?utf-8?B?VXA4R2tJckViRmdjUWVxM3FsU284VnhnTmVqUGFoSXNKSzUyTGh5Q0xZVE1C?=
 =?utf-8?B?U2dQSlE1bVgwSnFmNUx6RTUrOTkxMmsyOG5xRy8yQ0JUY3hIeGR0YkRaN3NJ?=
 =?utf-8?B?S2xJeHlzTytzcFA0TjhyREliMEdDUk40UktqZEhjeFdJMCs1MUxaWmhhNm01?=
 =?utf-8?B?WXZkQXJ5akFnd2VmUWVKQmlxKzBWSFJ6alFVc2ZkazlnanQ3MUVQNXdGa2Zz?=
 =?utf-8?B?UmlST2NSSktreWUvR0p6YW1ZVWRoSVF4aCtidkRaeWZDVXYyTlNTWEVmUHhW?=
 =?utf-8?B?eHdkMTN1a050c1dtbzFlTWRUL2ZvUVZ2dzJSL3RJYmh6MDNyU1pMS0JDR1Bm?=
 =?utf-8?B?S0lMRjdEWmN5dHJLNWFETmIzbjJraVhWdUxwUm93NU9CQjg3SFNZNlZYOEpJ?=
 =?utf-8?B?QlB2VElnMnJXL05MUHFtNkFrODB4MzVqNDNkR3d3dS9ya1NGcDIvZXVWb2tV?=
 =?utf-8?B?eFhSRHExNno0cmNkaUljYWd1YStWVW9uSGI4OEg0QUNRWlF4OTZUc3Y2cE52?=
 =?utf-8?B?ZG5ZYXo3SU9zSnBLd1VKSkd2ajlKbEhsRm85MCtNaEw4ZFlhY284NWtaOEhn?=
 =?utf-8?B?K3lLOTdaajJrWlRiVWs5Rk92Wlk1Q3Bram5ySjFyNm94eE5DZGNlYXlLYnVu?=
 =?utf-8?B?SWE3cVdrSlE0OEZIZGtyK0pjMk9jYnhpdk1sU0xZVmtLdTZWYmVtVHlyQWhl?=
 =?utf-8?B?TXZodnZNTkUrZDVMRGJiQnlsdWMzVkZJWlVHWml6TDRMejR0SXV5SU00cG5L?=
 =?utf-8?B?bDBRTXV4VHEwSmhNV2trOEVSS0RTR2RKLzZzRWs4MDdLeC85MGZtNWFpUE91?=
 =?utf-8?B?djArK0F4d01KWnRsRGhtWnpDSlJST0NFUGpSWUNJcjdYTHlvVU55Ymd4SVR4?=
 =?utf-8?Q?C1E/zw4gtrAC+zNehYKsaB6/9Oxg08TC?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <889E6C3189D5994387E91F841F5E81C0@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3afe1ecb-2dcb-4a5b-9ebe-08da0833bb3e
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Mar 2022 16:32:30.3362
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: h5K5GVj2LNV+Z059ttVfDgLlClV1iHMbJQPzGJTZyNNoirC+0k+Kxw8S7eDCto9ToXfRacPhkDyJOVB/6wRZxVAbA0DP3Lx0/Te3H5EBzuE=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR03MB5241
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Thu Mar 17 16:40:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 16:40:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291683.495255 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUtAS-0004sv-Cr; Thu, 17 Mar 2022 16:40:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291683.495255; Thu, 17 Mar 2022 16:40:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUtAS-0004sF-8Z; Thu, 17 Mar 2022 16:40:04 +0000
Received: by outflank-mailman (input) for mailman id 291683;
 Thu, 17 Mar 2022 16:40:03 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=YpXL=T4=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nUtAR-0004f2-7K
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 16:40:03 +0000
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur02on0620.outbound.protection.outlook.com
 [2a01:111:f400:fe05::620])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e3afc30b-a610-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 17:40:01 +0100 (CET)
Received: from AS8PR07CA0007.eurprd07.prod.outlook.com (2603:10a6:20b:451::6)
 by AM9PR08MB7104.eurprd08.prod.outlook.com (2603:10a6:20b:41e::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Thu, 17 Mar
 2022 16:39:59 +0000
Received: from AM5EUR03FT047.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:451:cafe::a7) by AS8PR07CA0007.outlook.office365.com
 (2603:10a6:20b:451::6) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.7 via Frontend
 Transport; Thu, 17 Mar 2022 16:39:59 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT047.mail.protection.outlook.com (10.152.16.197) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Thu, 17 Mar 2022 16:39:58 +0000
Received: ("Tessian outbound 1f399c739551:v113");
 Thu, 17 Mar 2022 16:39:58 +0000
Received: from e6ed72d37a45.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 6DC15523-D72C-43AC-B22E-14DFFC80E883.1; 
 Thu, 17 Mar 2022 16:39:52 +0000
Received: from EUR02-VE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id e6ed72d37a45.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 17 Mar 2022 16:39:52 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by DB9PR08MB6538.eurprd08.prod.outlook.com (2603:10a6:10:23d::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Thu, 17 Mar
 2022 16:39:49 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5061.029; Thu, 17 Mar 2022
 16:39:48 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e3afc30b-a610-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Eed3G0V7/KFRb0VlF/TFmyVulJzJlI4f2MR6k25ZUf8=;
 b=h9aNM4yUecODgafhCvGuJOFnSrLvj49O2s21J1Gi/0fPlfMk6yhKhOj5Ap9Korzwwdr069oyitzLM0phzOtrBdBktvmweoYeVje4N+2jXrHZgXZXZCZ/f8ST3kOizjJzw19T8ndP5EEXFsf1NCSs6HexNGczDrTKO+lOrcn0kr8=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 8ac808f8964228e1
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=MNNd4mKFHnubz/XVddHpCLLI9TngTI/tjs+JKdXvC5M2/rS5Lr971CQFCHCk3We0171fefSvItCSQzSPZqBT2oxn37iY5G7+dH7NVHF7tWNBQC3LyQ/6KhF4hsBh50mYQgtNfMs3pVlOEwkhdWaL73fU9aJ8qarDI+Y3CbVZd2mWIALig71LoGMopFFcL4W0v1wVDsuCdT217+CuLO8SkcF/kNi++FZYQWkTSTNobGiJPAlqVJtuLpy3Zc3KRfNXJwh2eaw42aG1GBZmIYp33JNXo4a+M4vgnYR48ntDH8ZhUuQZf6w2qsbgBNBzcsVNwpkjsboyoEMPFY1UG5gj2g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Eed3G0V7/KFRb0VlF/TFmyVulJzJlI4f2MR6k25ZUf8=;
 b=kocD3P3ZQdcRZLrq0jJmttObKy813Ae9XnbuLjYR6FC4RIfu+PZ7ROEMcgvuXWzi+Ocz1UJtd4MJKZj0P9N05cypxldnwSf1VKZGi6QmZoO6VuZuPS/czML0vkB3xY3+HyNPGFcMVH8iJLJ23zI+frxwIvXRAd1v1kRJP+HzmD+BSuRAJbb5fQ8ivghvybUCzzJuWVpKI+hMwxBFe9yCGlxBWzO+LcNjcdPv7M05nKjnwFgmSsZvx4bdBZDjFA3xFJzW6XlzTgGK8DJ6aa96PgdmxQ9hf+9vjOlJsLB+CY/wZ/cLn6LnEAh/5HRBfrgyikdhSjLAl4PDzhY/OXqWxQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Eed3G0V7/KFRb0VlF/TFmyVulJzJlI4f2MR6k25ZUf8=;
 b=h9aNM4yUecODgafhCvGuJOFnSrLvj49O2s21J1Gi/0fPlfMk6yhKhOj5Ap9Korzwwdr069oyitzLM0phzOtrBdBktvmweoYeVje4N+2jXrHZgXZXZCZ/f8ST3kOizjJzw19T8ndP5EEXFsf1NCSs6HexNGczDrTKO+lOrcn0kr8=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Bjoern Doebel <doebel@amazon.de>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Konrad
 Rzeszutek Wilk <konrad.wilk@oracle.com>, Ross Lagerwall
	<ross.lagerwall@citrix.com>
Subject: Re: [PATCH] Livepatch: fix typos
Thread-Topic: [PATCH] Livepatch: fix typos
Thread-Index: AQHYNXvxoz4WGhFUpk2S+ASwUJUjCazD0EKA
Date: Thu, 17 Mar 2022 16:39:48 +0000
Message-ID: <92DB3A63-15FA-4967-BA39-BE14F2A3456E@arm.com>
References:
 <032faef0d56d1de17b9dd229b33bd755c402b978.1647025870.git.doebel@amazon.de>
In-Reply-To:
 <032faef0d56d1de17b9dd229b33bd755c402b978.1647025870.git.doebel@amazon.de>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: ab9ecb20-e4c0-4034-c810-08da0834c67b
x-ms-traffictypediagnostic:
	DB9PR08MB6538:EE_|AM5EUR03FT047:EE_|AM9PR08MB7104:EE_
X-Microsoft-Antispam-PRVS:
	<AM9PR08MB7104416FB2AEF216254D20BDE4129@AM9PR08MB7104.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(2906002)(6512007)(53546011)(186003)(6506007)(71200400001)(6486002)(33656002)(508600001)(36756003)(2616005)(26005)(86362001)(38100700002)(38070700005)(6916009)(54906003)(558084003)(316002)(122000001)(8936002)(5660300002)(64756008)(66476007)(66556008)(66446008)(8676002)(4326008)(91956017)(76116006)(66946007)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <B59D9E60603AAB4DBC7314BBF4D706BB@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR08MB6538
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT047.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	daebd3d7-2f20-4495-479e-08da0834c084
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(70586007)(336012)(70206006)(8676002)(36860700001)(26005)(186003)(33656002)(107886003)(47076005)(316002)(6862004)(4326008)(2616005)(4744005)(54906003)(82310400004)(356005)(81166007)(8936002)(40460700003)(6486002)(86362001)(5660300002)(2906002)(508600001)(6512007)(6506007)(36756003)(53546011);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 16:39:58.7045
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: ab9ecb20-e4c0-4034-c810-08da0834c67b
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT047.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR08MB7104



> On 11 Mar 2022, at 19:11, Bjoern Doebel <doebel@amazon.de> wrote:
>=20
> Fix a couple of typos in livepatch code.

NIT: I would say: [...] in livepatch code comments.

>=20
> Signed-off-by: Bjoern Doebel <doebel@amazon.de>

With or without it:

Reviewed-by: Luca Fancellu <luca.fancellu@arm.com>

Cheers,
Luca

> CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
> CC: Ross Lagerwall <ross.lagerwall@citrix.com>




From xen-devel-bounces@lists.xenproject.org Thu Mar 17 16:47:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 16:47:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291691.495278 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUtHX-0006AQ-D7; Thu, 17 Mar 2022 16:47:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291691.495278; Thu, 17 Mar 2022 16:47:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUtHX-0006AJ-8y; Thu, 17 Mar 2022 16:47:23 +0000
Received: by outflank-mailman (input) for mailman id 291691;
 Thu, 17 Mar 2022 16:47:21 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RBlk=T4=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nUtHV-0006AD-RP
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 16:47:21 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e97148d4-a611-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 17:47:20 +0100 (CET)
Received: from EUR02-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur02lp2055.outbound.protection.outlook.com [104.47.6.55]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-24-EvhCu9xKMZ6rvXGY61GqtA-1; Thu, 17 Mar 2022 17:47:18 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM9PR04MB7537.eurprd04.prod.outlook.com (2603:10a6:20b:282::23)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Thu, 17 Mar
 2022 16:47:17 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d%9]) with mapi id 15.20.5081.017; Thu, 17 Mar 2022
 16:47:17 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e97148d4-a611-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647535640;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=rTbexEc3BxnMlencjCQsShFrJNxK+GsxeUDeqmGUzlw=;
	b=kmcJWPgbtL8ywWW4m28KU1TTECb7e3uR/obkHGiWLBsGDa4jw7OtjIa0OFM4PaYm5jzonb
	01LfYdHchiOLnay+hEhx7/bpHE6wBDzKtPBvha8ssQhVQb4dyQBLg+4OtqDojPr3GgdAs5
	jPYTiY4zHIKoS6gOfvyUX4WPJOvGR+g=
X-MC-Unique: EvhCu9xKMZ6rvXGY61GqtA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=QHa4XR+NqjU9+7rvYEwX7pGMc4zc41rBgA3gpZaM4czWbpN9R2Xx587rwokGCawmgWoLmUCDoODHfHpTCN8l6YiRSRsEKVFT9gF8T+8bRDxyI/wQPMm89OtritUqN+VwlpC3XFkW7deGeTGV2uNDzOjp5IaCvni8ZiRBYU3S1YUdjyGqJ19remQq2K281EpJGmpKYTaT5UVIV93QJ/QKqCwKamubZb/z75p9xHVPIXNULwJqdH4/RIypgE8O8ftYDFR7uOQ+QO0W/PSuQSSpPoN9SWcOCeL2XiuMkYFNf/F7NpNpYdzjPg9djgc/U3+GiRddezflT/XXBPXKQdXGfw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=rTbexEc3BxnMlencjCQsShFrJNxK+GsxeUDeqmGUzlw=;
 b=RzH6cHY7JH5iPHxPwQge7NM+5ZQyenT+59m+wiwkFZllLdtb+1bXk7oIBfWuI/FNb1qyN4fsoCKuiEgZIeGodWK3gjYs9LkupJ3Boll4TgxqHUAnQy23AMff2fYU3cJIcZxjm+RSAROR35KRXVUdxU1atfISzcV1qfSjubp60u0vVpbmLdHF8aAbYdUo4ZaKbsQuNIhQS3JurtVFyWJJgPTxIP/azSB3slU9tFZYkDBdugQaygv7BSC6IvlYOt7+iRqOpS7wsbx/28vj+avRZNSGdKSIH8rrjnhfXprnP7xPY8eHOonuQhooWPVmpZxyuvJ7pnwp1GL78SkWzUuFug==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <ac5efb3d-e55b-6717-de7f-78447d29f1b9@suse.com>
Date: Thu, 17 Mar 2022 17:47:14 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v4 11/11] xen/x86: remove cf_check attribute from
 hypercall handlers
Content-Language: en-US
To: Juergen Gross <jgross@suse.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>, Wei Liu
 <wl@xen.org>, George Dunlap <george.dunlap@citrix.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Christopher Clark <christopher.w.clark@gmail.com>,
 Dario Faggioli <dfaggioli@suse.com>, Daniel De Graaf
 <dgdegra@tycho.nsa.gov>, "Daniel P. Smith" <dpsmith@apertussolutions.com>,
 xen-devel@lists.xenproject.org
References: <20220310073420.15622-1-jgross@suse.com>
 <20220310073420.15622-12-jgross@suse.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220310073420.15622-12-jgross@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM5P194CA0013.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:203:8f::23) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: d9de6514-41f5-4fbe-ce88-08da0835cbc8
X-MS-TrafficTypeDiagnostic: AM9PR04MB7537:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<AM9PR04MB7537661C9C562C85C91FFC6EB3129@AM9PR04MB7537.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2906002)(6512007)(53546011)(6506007)(186003)(6486002)(508600001)(36756003)(2616005)(26005)(86362001)(31686004)(38100700002)(31696002)(83380400001)(6636002)(6666004)(316002)(54906003)(37006003)(8936002)(5660300002)(7416002)(66476007)(66556008)(6862004)(8676002)(4326008)(66946007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?RlI4WElkNTFFM1F2YkdITnlScDRqUzQvQlNHQ202YThRcFcrWEtleENqcnE1?=
 =?utf-8?B?UW1TNk90eXluZ2paR3I0RGVRZzhTMENMZ2lxTEZCNXZiRm94OUtpR1dyL0w2?=
 =?utf-8?B?OXpIVk00eDMwdjc1TmwvdmduSVhQbE9NYkgxVWFXajFqek90Zk50WVE5UkV5?=
 =?utf-8?B?UC94RTFFZFNld0gxRldxL3FHdWRkUHA2VTBHQkVrTGxqektsa3ZaZFpXYlQ4?=
 =?utf-8?B?Ymt0cUVURDJqSHQ0RmRmT1VDNlpZTnVkMkJBVFpobCtHekFwNGVPdVdXaGg2?=
 =?utf-8?B?WjE3cmxwQWRuSG83ZmVRWG9Jc1JBVVpmalUxOXBMbGtOV2kzM3AvTzZoT2s1?=
 =?utf-8?B?RGIvNkVrKytSaDF3bDlINi9ERVpQNFhzSExKUkRCazRacS9jWjdFQ0tBSGRG?=
 =?utf-8?B?dGJUdlJWZnhla09OMUVXM2w0NWh2Rjh4WjIzY0ZsZTRlVXVNdk16VjRPTjJR?=
 =?utf-8?B?VkgxdlZPckk2dHFlOWFNTko3NzNPeGxOUlJod0wrdVZmbkJVb3hmWHZxSGYv?=
 =?utf-8?B?c0hodkxOdDRvRS9sL2o3TkpITDV0bWhvZmxvTnl1RWRHbXRLYWJFRG5yMVhx?=
 =?utf-8?B?SEwvNVJPVU5iVzlrOVJFcnBxNDBKM2tuMVJlckU1eDdBRUI5NUh3UGE5VDh4?=
 =?utf-8?B?VWh1Mk0xQmdDM3drWm5zWnNqdFZLamVNZ2c5NnJncnhtM2lwRllSd0dBOUMz?=
 =?utf-8?B?Z092VmJUUytiaVptTjFiMEZXUlppOTNDaXJFTDM4a0FiVzQwMXU2eGRVcWl4?=
 =?utf-8?B?VnE0VjZMLzFQbmR1TEVERjN1d0tNK01CSTZpck5qNlhIMHNmdzlxa3d5RWwr?=
 =?utf-8?B?akw3T1ZlV3d4b1ArMml5d2svWWxXN0dTd3BuMnpPb2l2Sm9uaFJmdzEyVkpM?=
 =?utf-8?B?dmVkUTU2WUhTUVFSZXY3V1JUTmhIeXcwTFM3MGgrZ2FTZWhFL0NMOC9SSWdp?=
 =?utf-8?B?Snc4blllRlJJc0RrUEl4cVFid20zQjNsK3ZRZ2FLMDV6Nkx4U2Z2TlhRZXJi?=
 =?utf-8?B?cXBpY0ErKythenZVTTF3MXFaOW9xRXJuemdkQ0U3NVhRWlBLQ1VNVWV2MVVv?=
 =?utf-8?B?cVlFWC9PcUhiTE1zMXdLLzRVa05GaFlJTjhtMWwyZGpXeG9rbEM4dmhESW05?=
 =?utf-8?B?b0V2UHRCTXNNNlpoclFIZW5xZHF5V2pGMFpRd2JCT2JZYnJMMlZqeE90Uy91?=
 =?utf-8?B?VFU1RlNVZlU4azhxOFBLdjR6dHBQZjlQeFkwTHVFb3hoRStiZWdiSE5lTk92?=
 =?utf-8?B?YnJNeERraHJrbGlJeVE3SlkrT2tHaEtGTjJSMlVneVJ3QnoxcEV0MWlPNTNh?=
 =?utf-8?B?cmRXQjAwRHpuNnlwNm5ybjF6NmlhVitHSUd2YW1SL1BDdXJOVHJsM3ROSlRw?=
 =?utf-8?B?L3hEQ3M2ZEJtNmxBODl4Q3NnOTBMVkl5b1VLZmNiQXVtcldTVWZPa1ZDcG0z?=
 =?utf-8?B?emZ5SWVvNmVBcVBSNG1Jb01uZXVhNi9oN1lyY1hORnF0RFVvYk9jY2dKN21J?=
 =?utf-8?B?dDFRemtCWlVFNmJLWDdvTWt2ano1cE1RUUtvbG0rOFhVWFBoWWM4N2d6Uko0?=
 =?utf-8?B?amdtajczenNXay9JUk9sMkp2QVdHTFREd0F1QVNUbGw2YjY0V25mM1MvM3k1?=
 =?utf-8?B?K0ZoVks4RitxYUJDaWxvSWtXWWpWa0ZNUWlxUzhjVlpOSHFGN2gycEdzNmkz?=
 =?utf-8?B?NElNbXpPTkt1YnhSMFNxcWZiczdvNWFJL2V0NlVQakpPemNvdHU0aU1IZU9O?=
 =?utf-8?B?K1E3cVYzU0NhN3VsdUM0bzhDN0RUTURDaWxHRGUzTFh5eHZ3dVo1ZEFVNnAw?=
 =?utf-8?B?a0tCNmtVQjRzSWZ0RjFYMGpiMU5aYXdnYlNJdGpFcFcxYVk3R0J4RlpXWVhK?=
 =?utf-8?B?eWlmSUZVYTlDMTJqL2dIT2JzeWFhTnExRW5lc1RHTmhxTUxMeVBQa2l1RHRv?=
 =?utf-8?Q?Cpud+BMM4TQ/N1E+n2QgfrodMX2nNVks?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d9de6514-41f5-4fbe-ce88-08da0835cbc8
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 16:47:17.2820
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: dLkCivJ++JNNrfh1pGO84916ny/WExXVFrZG2mRCqe9sC3F8wyfT7DtszpYERR4Ngu/qrBUB9oly7Nr/svfiIw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR04MB7537

On 10.03.2022 08:34, Juergen Gross wrote:
> Now that the hypercall handlers are all being called directly instead
> through a function vector, the "cf_check" attribute can be removed.
> 
> Signed-off-by: Juergen Gross <jgross@suse.com>
> ---
> V4:
> - new patch
> ---
>  xen/arch/x86/compat.c               |  6 +++---
>  xen/arch/x86/cpu/mcheck/mce.c       |  2 +-
>  xen/arch/x86/cpu/vpmu.c             |  2 +-
>  xen/arch/x86/domain.c               |  3 +--
>  xen/arch/x86/hvm/dm.c               |  2 +-
>  xen/arch/x86/hvm/hvm.c              |  2 +-
>  xen/arch/x86/hvm/hypercall.c        |  6 +++---
>  xen/arch/x86/mm.c                   | 12 ++++++------
>  xen/arch/x86/mm/paging.c            |  2 +-
>  xen/arch/x86/physdev.c              |  2 +-
>  xen/arch/x86/platform_hypercall.c   |  2 +-
>  xen/arch/x86/pv/callback.c          | 16 ++++++++--------
>  xen/arch/x86/pv/descriptor-tables.c |  8 ++++----
>  xen/arch/x86/pv/iret.c              |  4 ++--
>  xen/arch/x86/pv/misc-hypercalls.c   | 10 +++++-----
>  xen/arch/x86/pv/shim.c              |  4 ++--
>  xen/arch/x86/x86_64/compat/mm.c     |  2 +-
>  xen/common/argo.c                   |  4 ++--
>  xen/common/compat/grant_table.c     |  2 +-
>  xen/common/compat/kernel.c          |  2 +-
>  xen/common/compat/memory.c          |  3 +--
>  xen/common/dm.c                     |  2 +-
>  xen/common/domain.c                 |  2 +-
>  xen/common/domctl.c                 |  2 +-
>  xen/common/event_channel.c          |  2 +-
>  xen/common/grant_table.c            |  3 +--
>  xen/common/hypfs.c                  |  2 +-
>  xen/common/kernel.c                 |  2 +-
>  xen/common/kexec.c                  |  4 ++--
>  xen/common/memory.c                 |  2 +-
>  xen/common/multicall.c              |  3 +--
>  xen/common/sched/compat.c           |  2 +-
>  xen/common/sched/core.c             |  4 ++--
>  xen/common/sysctl.c                 |  2 +-
>  xen/common/xenoprof.c               |  2 +-
>  xen/drivers/char/console.c          |  2 +-
>  xen/scripts/gen_hypercall.awk       |  2 +-
>  xen/xsm/xsm_core.c                  |  4 ++--
>  38 files changed, 67 insertions(+), 71 deletions(-)

But that's only the definitions; for a reason I forget the annotations
are present also on the declarations (really the "also" applies the
other way around; perhaps it was that a future gcc will want to warn
about declaration and definition having gone out of sync).

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 16:52:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 16:52:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291694.495289 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUtML-0007ZT-Ro; Thu, 17 Mar 2022 16:52:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291694.495289; Thu, 17 Mar 2022 16:52:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUtML-0007ZM-Ol; Thu, 17 Mar 2022 16:52:21 +0000
Received: by outflank-mailman (input) for mailman id 291694;
 Thu, 17 Mar 2022 16:52:20 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=31/0=T4=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nUtMK-0007ZG-3i
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 16:52:20 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 9b5a9ca6-a612-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 17:52:19 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 8073C1F38D;
 Thu, 17 Mar 2022 16:52:18 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 2751213BB5;
 Thu, 17 Mar 2022 16:52:18 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id dWdBCEJnM2JeewAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 17 Mar 2022 16:52:18 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9b5a9ca6-a612-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647535938; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=UKopnU37oDUPCOBGRikD4uUwW2GCdv1gdB6bHNmINMY=;
	b=E5Gu1K5F9Qj9fDeZsg0vP444UA/P2DwLh+krmxHh3LHtOJKyR7QUgsHuIXWdlx6n6zOMxF
	yQKw5BLpDXAN1rquP0dhe+w7r2aNgVa4lh92vm9Y6k5DzQjvZp55R9w1Zo6nX4e8KewS3P
	wp30Bj3vmpoKOFN3GwYgNnBknlm+SVs=
Message-ID: <cf1c241d-22f3-e48d-890a-aae9523bf8da@suse.com>
Date: Thu, 17 Mar 2022 17:52:17 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v4 11/11] xen/x86: remove cf_check attribute from
 hypercall handlers
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>, Wei Liu
 <wl@xen.org>, George Dunlap <george.dunlap@citrix.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Christopher Clark <christopher.w.clark@gmail.com>,
 Dario Faggioli <dfaggioli@suse.com>, Daniel De Graaf
 <dgdegra@tycho.nsa.gov>, "Daniel P. Smith" <dpsmith@apertussolutions.com>,
 xen-devel@lists.xenproject.org
References: <20220310073420.15622-1-jgross@suse.com>
 <20220310073420.15622-12-jgross@suse.com>
 <ac5efb3d-e55b-6717-de7f-78447d29f1b9@suse.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <ac5efb3d-e55b-6717-de7f-78447d29f1b9@suse.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------ubCt117g6SMmlqOz0rxu4iUS"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------ubCt117g6SMmlqOz0rxu4iUS
Content-Type: multipart/mixed; boundary="------------Hnx1EM4gWezudUp5fpSf0Yc0";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Jan Beulich <jbeulich@suse.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>, Wei Liu
 <wl@xen.org>, George Dunlap <george.dunlap@citrix.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Christopher Clark <christopher.w.clark@gmail.com>,
 Dario Faggioli <dfaggioli@suse.com>, Daniel De Graaf
 <dgdegra@tycho.nsa.gov>, "Daniel P. Smith" <dpsmith@apertussolutions.com>,
 xen-devel@lists.xenproject.org
Message-ID: <cf1c241d-22f3-e48d-890a-aae9523bf8da@suse.com>
Subject: Re: [PATCH v4 11/11] xen/x86: remove cf_check attribute from
 hypercall handlers
References: <20220310073420.15622-1-jgross@suse.com>
 <20220310073420.15622-12-jgross@suse.com>
 <ac5efb3d-e55b-6717-de7f-78447d29f1b9@suse.com>
In-Reply-To: <ac5efb3d-e55b-6717-de7f-78447d29f1b9@suse.com>

--------------Hnx1EM4gWezudUp5fpSf0Yc0
Content-Type: multipart/mixed; boundary="------------0eULWayHeadiX7sWTzIC4SyA"

--------------0eULWayHeadiX7sWTzIC4SyA
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------0eULWayHeadiX7sWTzIC4SyA
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----

xsBNBFOMcBYBCACgGjqjoGvbEouQZw/ToiBg9W98AlM2QHV+iNHsEs7kxWhKMjri
oyspZKOBycWxw3ie3j9uvg9EOB3aN4xiTv4qbnGiTr3oJhkB1gsb6ToJQZ8uxGq2
kaV2KL9650I1SJvedYm8Of8Zd621lSmoKOwlNClALZNew72NjJLEzTalU1OdT7/i
1TXkH09XSSI8mEQ/ouNcMvIJNwQpd369y9bfIhWUiVXEK7MlRgUG6MvIj6Y3Am/B
BLUVbDa4+gmzDC9ezlZkTZG2t14zWPvxXP3FAp2pkW0xqG7/377qptDmrk42GlSK
N4z76ELnLxussxc7I2hx18NUcbP8+uty4bMxABEBAAHNHEp1ZXJnZW4gR3Jvc3Mg
PGpnQHBmdXBmLm5ldD7CwHkEEwECACMFAlOMcBYCGwMHCwkIBwMCAQYVCAIJCgsE
FgIDAQIeAQIXgAAKCRCw3p3WKL8TL0KdB/93FcIZ3GCNwFU0u3EjNbNjmXBKDY4F
UGNQH2lvWAUy+dnyThpwdtF/jQ6j9RwE8VP0+NXcYpGJDWlNb9/JmYqLiX2Q3Tye
vpB0CA3dbBQp0OW0fgCetToGIQrg0MbD1C/sEOv8Mr4NAfbauXjZlvTj30H2jO0u
+6WGM6nHwbh2l5O8ZiHkH32iaSTfN7Eu5RnNVUJbvoPHZ8SlM4KWm8rG+lIkGurq
qu5gu8q8ZMKdsdGC4bBxdQKDKHEFExLJK/nRPFmAuGlId1E3fe10v5QL+qHI3EIP
tyfE7i9Hz6rVwi7lWKgh7pe0ZvatAudZ+JNIlBKptb64FaiIOAWDCx1SzR9KdWVy
Z2VuIEdyb3NzIDxqZ3Jvc3NAc3VzZS5jb20+wsB5BBMBAgAjBQJTjHCvAhsDBwsJ
CAcDAgEGFQgCCQoLBBYCAwECHgECF4AACgkQsN6d1ii/Ey/HmQf/RtI7kv5A2PS4
RF7HoZhPVPogNVbC4YA6lW7DrWf0teC0RR3MzXfy6pJ+7KLgkqMlrAbN/8Dvjoz7
8X+5vhH/rDLa9BuZQlhFmvcGtCF8eR0T1v0nC/nuAFVGy+67q2DH8As3KPu0344T
BDpAvr2uYM4tSqxK4DURx5INz4ZZ0WNFHcqsfvlGJALDeE0LhITTd9jLzdDad1pQ
SToCnLl6SBJZjDOX9QQcyUigZFtCXFst4dlsvddrxyqT1f17+2cFSdu7+ynLmXBK
7abQ3rwJY8SbRO2iRulogc5vr/RLMMlscDAiDkaFQWLoqHHOdfO9rURssHNN8WkM
nQfvUewRz80hSnVlcmdlbiBHcm9zcyA8amdyb3NzQG5vdmVsbC5jb20+wsB5BBMB
AgAjBQJTjHDXAhsDBwsJCAcDAgEGFQgCCQoLBBYCAwECHgECF4AACgkQsN6d1ii/
Ey8PUQf/ehmgCI9jB9hlgexLvgOtf7PJnFOXgMLdBQgBlVPO3/D9R8LtF9DBAFPN
hlrsfIG/SqICoRCqUcJ96Pn3P7UUinFG/I0ECGF4EvTE1jnDkfJZr6jrbjgyoZHi
w/4BNwSTL9rWASyLgqlA8u1mf+c2yUwcGhgkRAd1gOwungxcwzwqgljf0N51N5Jf
VRHRtyfwq/ge+YEkDGcTU6Y0sPOuj4Dyfm8fJzdfHNQsWq3PnczLVELStJNdapwP
OoE+lotufe3AM2vAEYJ9rTz3Cki4JFUsgLkHFqGZarrPGi1eyQcXeluldO3m91NK
/1xMI3/+8jbO0tsn1tqSEUGIJi7ox80eSnVlcmdlbiBHcm9zcyA8amdyb3NzQHN1
c2UuZGU+wsB5BBMBAgAjBQJTjHDrAhsDBwsJCAcDAgEGFQgCCQoLBBYCAwECHgEC
F4AACgkQsN6d1ii/Ey+LhQf9GL45eU5vOowA2u5N3g3OZUEBmDHVVbqMtzwlmNC4
k9Kx39r5s2vcFl4tXqW7g9/ViXYuiDXb0RfUpZiIUW89siKrkzmQ5dM7wRqzgJpJ
wK8Bn2MIxAKArekWpiCKvBOB/Cc+3EXE78XdlxLyOi/NrmSGRIov0karw2RzMNOu
5D+jLRZQd1Sv27AR+IP3I8U4aqnhLpwhK7MEy9oCILlgZ1QZe49kpcumcZKORmzB
TNh30FVKK1EvmV2xAKDoaEOgQB4iFQLhJCdP1I5aSgM5IVFdn7v5YgEYuJYx37Io
N1EblHI//x/e2AaIHpzK5h88NEawQsaNRpNSrcfbFmAg987ATQRTjHAWAQgAyzH6
AOODMBjgfWE9VeCgsrwH3exNAU32gLq2xvjpWnHIs98ndPUDpnoxWQugJ6MpMncr
0xSwFmHEgnSEjK/PAjppgmyc57BwKII3sV4on+gDVFJR6Y8ZRwgnBC5mVM6JjQ5x
Dk8WRXljExRfUX9pNhdE5eBOZJrDRoLUmmjDtKzWaDhIg/+1Hzz93X4fCQkNVbVF
LELU9bMaLPBG/x5q4iYZ2k2ex6d47YE1ZFdMm6YBYMOljGkZKwYde5ldM9mo45mm
we0icXKLkpEdIXKTZeKDO+Hdv1aqFuAcccTg9RXDQjmwhC3yEmrmcfl0+rPghO0I
v3OOImwTEe4co3c1mwARAQABwsBfBBgBAgAJBQJTjHAWAhsMAAoJELDendYovxMv
Q/gH/1ha96vm4P/L+bQpJwrZ/dneZcmEwTbe8YFsw2V/Buv6Z4Mysln3nQK5ZadD
534CF7TDVft7fC4tU4PONxF5D+/tvgkPfDAfF77zy2AH1vJzQ1fOU8lYFpZXTXIH
b+559UqvIB8AdgR3SAJGHHt4RKA0F7f5ipYBBrC6cyXJyyoprT10EMvU8VGiwXvT
yJz3fjoYsdFzpWPlJEBRMedCot60g5dmbdrZ5DWClAr0yau47zpWj3enf1tLWaqc
suylWsviuGjKGw7KHQd3bxALOknAp4dN3QwBYCKuZ7AddY9yjynVaD5X7nF9nO5B
jR/i1DG86lem3iBDXzXsZDn8R38=3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------0eULWayHeadiX7sWTzIC4SyA--

--------------Hnx1EM4gWezudUp5fpSf0Yc0--

--------------ubCt117g6SMmlqOz0rxu4iUS
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmIzZ0EFAwAAAAAACgkQsN6d1ii/Ey83
NQf+PcxLe5ENix9ugBGgYuwYAQm2TTSH5lCDCiY3WihS/GkzCK0xaueNnNPwDraz53knmRIGA9uR
LJvKWtVYJO82GwsZ/tX72mhn8JJgotKRHNQ0zRRK9KbosApVhmQ30UKmElI7LixWwi6GhgxsIJrQ
QEn1erYgJkwtD61aWvEn/N9YciveC2xqpokHrPTF/lsiAAw74MgvYN9qnWYHvdduK3UjEqSxyLsQ
t4tkOc3U7xeOofrBUbn5//goxznSPYNDb9c76ROVVj9ax0JCUpcXShfYZmKCDhxS77v+GrEwD/Fl
f4cMdsbFMb1gw4Zc+JwAIVCXQ/fc18FWBudVdJUYCQ==
=m8iM
-----END PGP SIGNATURE-----

--------------ubCt117g6SMmlqOz0rxu4iUS--


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 16:53:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 16:53:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291697.495300 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUtNB-00086q-6A; Thu, 17 Mar 2022 16:53:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291697.495300; Thu, 17 Mar 2022 16:53:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUtNB-00086j-1O; Thu, 17 Mar 2022 16:53:13 +0000
Received: by outflank-mailman (input) for mailman id 291697;
 Thu, 17 Mar 2022 16:53:12 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=RBlk=T4=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nUtNA-000864-6K
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 16:53:12 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ba9cd483-a612-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 17:53:11 +0100 (CET)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur02lp2052.outbound.protection.outlook.com [104.47.4.52]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-25-gFScMaI-OWa2czg9lcKDXA-1; Thu, 17 Mar 2022 17:53:09 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by HE1PR0401MB2362.eurprd04.prod.outlook.com (2603:10a6:3:22::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.29; Thu, 17 Mar
 2022 16:53:06 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d%9]) with mapi id 15.20.5081.017; Thu, 17 Mar 2022
 16:53:06 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ba9cd483-a612-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647535991;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=k6R6j81jF9DUjgfiTwR6joBVvQOeR/OOAhQqaUoMJYo=;
	b=KcQkC9PmaJgMkVf6cSffEpT3yW/+VAtEA1P9hZy7NbeKxhoEYCYPzmBzhXVC57NefEnP5j
	eVOua9HXjPFVRi6P/Gi0mzDDB2cZWdBS88PjkX2JC4J7uoyQYbVDzu52ppm5g3Apv5FgaN
	2Su5WZVNPmdD7onyEryxcal10Xx1+/g=
X-MC-Unique: gFScMaI-OWa2czg9lcKDXA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=I1QKPTa6RT9B9T2KcPb1F/aSo66BaI9H6UwCJ7z47OOnQuACQpEKh5VmPViuagWpmZrXGWVWw2HiB/wyfbPgKdIT4PE7m9fI4JfI1C7oW5X409a2EzvIbeNJr/dcdjQ2Jw2eDy8EQwnXonyGkWRb3jse96inO3N80hZwc9GbOZOjAKSdexlRaWAzhILSn4EwQsPyLwE+LfjVs1zAgYS3pn28ygXcrC9xfYmIKdXUPPt0/iiPKmB+UYtpXtX13FG6kwAFVuGZm4HHWVuGXPHGD7GxxmELdwVck6FhGi2PgQipVnWOhqByLnIJ8wujh7EaKr85YZXpfWaiaG46Tb64mw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=k6R6j81jF9DUjgfiTwR6joBVvQOeR/OOAhQqaUoMJYo=;
 b=TWCcvLqfASc6IasmlShXW0s5EjfNglIdsy9HSdtKgWb+1fWpNguTUrzobt2CVXnHj5JpFrejxhAIvHml79iQV4+alx5kKHk2TOKj6hvKIoO3StaKoJPRitmhy80ZD2NU39lWFmqqJk/18ta9rjSTlOt+/kAoI9IuhsxaHstwqebkXK/H6k6X+bhrK8+pMCrvNoTq/dZ+8uurvetXOWwS79N32v57sS4kS1QHGER9wMtOaiPXsLXS8zLoAu19eSjRITSF9Lhs7sDCKbHXzGB8Qwf1MxTFkL+hkt3UzVP+KNGwHnsf85rECwO14kn2iseMYfiEZXsw4EuCmrt4Ip1GAg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <07f6d45d-b23e-9b2c-4475-dcc5d2ca20c9@suse.com>
Date: Thu, 17 Mar 2022 17:53:03 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v4 11/11] xen/x86: remove cf_check attribute from
 hypercall handlers
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: Juergen Gross <jgross@suse.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>, Wei Liu
 <wl@xen.org>, George Dunlap <george.dunlap@citrix.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Christopher Clark <christopher.w.clark@gmail.com>,
 Dario Faggioli <dfaggioli@suse.com>, Daniel De Graaf
 <dgdegra@tycho.nsa.gov>, "Daniel P. Smith" <dpsmith@apertussolutions.com>,
 xen-devel@lists.xenproject.org
References: <20220310073420.15622-1-jgross@suse.com>
 <20220310073420.15622-12-jgross@suse.com>
 <ac5efb3d-e55b-6717-de7f-78447d29f1b9@suse.com>
In-Reply-To: <ac5efb3d-e55b-6717-de7f-78447d29f1b9@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6PR05CA0005.eurprd05.prod.outlook.com
 (2603:10a6:20b:2e::18) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: af0fa747-55c5-4eec-538c-08da08369b8e
X-MS-TrafficTypeDiagnostic: HE1PR0401MB2362:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<HE1PR0401MB2362B23BFDB1BD61B6BAFBCFB3129@HE1PR0401MB2362.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66476007)(66946007)(66556008)(2616005)(38100700002)(186003)(26005)(8676002)(6862004)(4326008)(6512007)(36756003)(31686004)(31696002)(86362001)(7416002)(83380400001)(8936002)(2906002)(508600001)(6486002)(6666004)(5660300002)(54906003)(316002)(6506007)(37006003)(53546011)(6636002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?T2trTVA5dldzeEZjRDV6U1N3U0MvRkRKUnJTQUlEekxxemtMRUYvSWExb1ky?=
 =?utf-8?B?ZzFuajAyS2pHSGtqcWVVZ1ZpVVB4VGpERU1Pc2IvV1EwVWUyeEkvcWZEcjFG?=
 =?utf-8?B?azl5WGZDbmFod3ZBM1lsemNEY2NZYmFOVGpYalE5UEpxK0VLMTkzT2grZmpE?=
 =?utf-8?B?THB2N0N5M0NjeGFoMHZlaFYzZnpFa1hEbGJycm1Ja0IvNFJJTVFBYVZ3TUFa?=
 =?utf-8?B?YXFQeFpBNUk1eDBXcERZU2JubG1UWVp1ZjBtMytQbWVXVnhMeFhYUWRNV2tw?=
 =?utf-8?B?U3hYMTRBYjQwU1J1andqUkk1UjBydStYNlR3SGt0WnZJb0toMm5IUWlNL05h?=
 =?utf-8?B?alVrR1JRc3QrWkgzKzNKVktRd3dLdXptMTZXWmZNbWJrc3RwYlhjeUZjUXI5?=
 =?utf-8?B?ZUkyRzVldXRGMXc4TmN6Y3d2THMxbmJXRWhOTTlnbWxWZnhORXBwMjBVQXJP?=
 =?utf-8?B?VDY4MXNiMFZNYkxRb2lKUEY3alZMdjIza1R3d2hzZHlpdzg1eDNqL1NFT3di?=
 =?utf-8?B?UmxzN3hQMUMvdTVzUFZZL0tnOG9rUjJiTitjZHpBTnJ3L0ZUTFZUdVV6c2Ny?=
 =?utf-8?B?U0ZPbG84QzMweHFnYXNuNEY2TnMrWWtHWmh5R2FOREtJamY4cS96d3FXd2p4?=
 =?utf-8?B?azhRb3E4eHVTY2NTeTZSRFNmdWhOcFJicEtLdld2SStLd3pMcGkyOGxzY28v?=
 =?utf-8?B?ci9GbXdLUG9LaDRjYWhIV2dkNm5hSEVidnNFZFM5aThKcW1PUHc4R1hpdVQv?=
 =?utf-8?B?ZDVrVG5zSnFjVWZBblphSmM3UzRMaDlGRWF1ZE40TUN6emV4K1diMFV3ZjQz?=
 =?utf-8?B?RFZqclB2L0FKWjNIcXRxd1dQekw4QVlYclNEZWc2S2dQeVpvUDdpWFJ0Mnpu?=
 =?utf-8?B?MHM0Zk9WUDdCb0pUcFg4UEdmTkFjSEE1MmdVWm5kSzY1T0dFMmZ4YmNycFhC?=
 =?utf-8?B?RjFGMDc2MjVIbllSK09RZFRQQ2FmRFJoOE9aY2tHMzhjbnZYMW5udXZ4cE1q?=
 =?utf-8?B?QktneVdrdW5zUEZLRmw5OVlPTTZpMWpVZTQrTFJPS2VDN1oxV2lCMUdLOG1R?=
 =?utf-8?B?NHUydGpJUXRCcXdoVjdJcWhHczJ4aVlBYmdXWExQaEJRS2tYYmVvYXBJNlJt?=
 =?utf-8?B?VHhGdDRjb2VkdzA2R08vZ0pCdG5pQ0hVbFFGd1RNVjcvYTlKMmdJQ2RpNzRo?=
 =?utf-8?B?Qm5zNGo0M3p5TnNYRmJlR05Yai9oclRab3VTK2lHY1VoQ3ZheFY1b3VpakRu?=
 =?utf-8?B?Q1M3Mi95SWN4U0h0eUp6M0FYc3BxaG1xR09YdHpTaElmMzVHVnRqM1R6dW4x?=
 =?utf-8?B?YVV0RFRGaTVybkhCcUQzRGREUXdMV2VXYVZrL2lEQS9tbkgvNlorRktQTmJx?=
 =?utf-8?B?aFBrMWR6WWt4OExkcHFXVXlsc0hFOG01emdzNFdnMjFUVDcyTHBXdlhNU2xJ?=
 =?utf-8?B?akVud3VpbEJLTFRBODhaM3lpaDhkeHdzUTkzVDh4ZmJqZDlYeGgreUJhVUdR?=
 =?utf-8?B?MVZhcVJHNTdCaE5pZUY4bGw2R3JSb2IyYmxCUDVaaDVEcXQyVURDRzNsVnRR?=
 =?utf-8?B?WHQ4cGl5ZndYSzJtWldaMnZDbW56SkF6YjV0VERvaHZhL0xxeDNPRFNQZjZ5?=
 =?utf-8?B?bWtxcExNY3BoSHhJTFJlYi9WbG9DekxacmpGMlVsS1pQUzVoTzg4UWZYdURX?=
 =?utf-8?B?S1hCUm1oM3krYnQ0OHZDZXdselZReDg5WkNON2xmd1htR1JTbkFlZjhhd29J?=
 =?utf-8?B?aWV2bm9qUStkTFhnWmxZWEo3TWFpSHM0SUF1bFdUTnVtRUNudHNLQ1RJd0w4?=
 =?utf-8?B?c3RzMUtzR0VZUUFoNjhYNjFoTDhlRk5wTmFDdXFVSy9iRmhoU3NwYUVyRkgr?=
 =?utf-8?B?TTlFZ08xUnBEVXNwZEtURXpWTzlvNjhSZ0ZNTExuNUFMSTRtaUJTZjdKN1pa?=
 =?utf-8?Q?vbhdu2W0ccAkcciYtoRTKqza5q52EfIW?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: af0fa747-55c5-4eec-538c-08da08369b8e
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 16:53:05.9117
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 45EbAyve3r9u/JeaOEBqY+Lql0V/PwrRAny/9WXg+w0oRJl+BOPGVuv8pF+SAp9ZN3LZJfM+LqqR1QrXZk9lVg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0401MB2362

On 17.03.2022 17:47, Jan Beulich wrote:
> On 10.03.2022 08:34, Juergen Gross wrote:
>> Now that the hypercall handlers are all being called directly instead
>> through a function vector, the "cf_check" attribute can be removed.
>>
>> Signed-off-by: Juergen Gross <jgross@suse.com>
>> ---
>> V4:
>> - new patch
>> ---
>>  xen/arch/x86/compat.c               |  6 +++---
>>  xen/arch/x86/cpu/mcheck/mce.c       |  2 +-
>>  xen/arch/x86/cpu/vpmu.c             |  2 +-
>>  xen/arch/x86/domain.c               |  3 +--
>>  xen/arch/x86/hvm/dm.c               |  2 +-
>>  xen/arch/x86/hvm/hvm.c              |  2 +-
>>  xen/arch/x86/hvm/hypercall.c        |  6 +++---
>>  xen/arch/x86/mm.c                   | 12 ++++++------
>>  xen/arch/x86/mm/paging.c            |  2 +-
>>  xen/arch/x86/physdev.c              |  2 +-
>>  xen/arch/x86/platform_hypercall.c   |  2 +-
>>  xen/arch/x86/pv/callback.c          | 16 ++++++++--------
>>  xen/arch/x86/pv/descriptor-tables.c |  8 ++++----
>>  xen/arch/x86/pv/iret.c              |  4 ++--
>>  xen/arch/x86/pv/misc-hypercalls.c   | 10 +++++-----
>>  xen/arch/x86/pv/shim.c              |  4 ++--
>>  xen/arch/x86/x86_64/compat/mm.c     |  2 +-
>>  xen/common/argo.c                   |  4 ++--
>>  xen/common/compat/grant_table.c     |  2 +-
>>  xen/common/compat/kernel.c          |  2 +-
>>  xen/common/compat/memory.c          |  3 +--
>>  xen/common/dm.c                     |  2 +-
>>  xen/common/domain.c                 |  2 +-
>>  xen/common/domctl.c                 |  2 +-
>>  xen/common/event_channel.c          |  2 +-
>>  xen/common/grant_table.c            |  3 +--
>>  xen/common/hypfs.c                  |  2 +-
>>  xen/common/kernel.c                 |  2 +-
>>  xen/common/kexec.c                  |  4 ++--
>>  xen/common/memory.c                 |  2 +-
>>  xen/common/multicall.c              |  3 +--
>>  xen/common/sched/compat.c           |  2 +-
>>  xen/common/sched/core.c             |  4 ++--
>>  xen/common/sysctl.c                 |  2 +-
>>  xen/common/xenoprof.c               |  2 +-
>>  xen/drivers/char/console.c          |  2 +-
>>  xen/scripts/gen_hypercall.awk       |  2 +-
>>  xen/xsm/xsm_core.c                  |  4 ++--
>>  38 files changed, 67 insertions(+), 71 deletions(-)
> 
> But that's only the definitions; for a reason I forget the annotations
> are present also on the declarations (really the "also" applies the
> other way around; perhaps it was that a future gcc will want to warn
> about declaration and definition having gone out of sync).

Actually wait, this was nonsense - the declarations are gone by this
point, and the awk script adjustment is all that's needed.

Acked-by: Jan Beulich <jbeulich@suse.com>


Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 17:04:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 17:04:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291703.495311 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUtXZ-0001IF-8I; Thu, 17 Mar 2022 17:03:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291703.495311; Thu, 17 Mar 2022 17:03:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUtXZ-0001I8-57; Thu, 17 Mar 2022 17:03:57 +0000
Received: by outflank-mailman (input) for mailman id 291703;
 Thu, 17 Mar 2022 17:03:56 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUtXY-0001Hy-7v; Thu, 17 Mar 2022 17:03:56 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUtXY-0007Vp-30; Thu, 17 Mar 2022 17:03:56 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUtXX-0001zz-Nm; Thu, 17 Mar 2022 17:03:55 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUtXX-00025t-NL; Thu, 17 Mar 2022 17:03:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=5VOBXg2uDXBeR4/FRW0zN3QBjVUSlFG/Tb6wz7ZbGvw=; b=hH7g8tl3gOaVj1TJEshP5T20IE
	5KKv3+ef+XjVoT9BvQPp+Hd557zNIOtgo9WDr44HJ7kJLBXM0aUdffLmHzTvLH1DTv/jCLNwQeqQp
	BBsET5fd4kViukoyxq9fXpgXXWIUwBaLaDbfbLFubrN30K/94VJJifcMfT6G6gfk26TY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168662-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168662: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=a3ba3ed0f45d3226320fd051c2066feaf7160d7a
X-Osstest-Versions-That:
    xen=c7a80bc50ac768b4eecaad85b77ae45790c93c73
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 17 Mar 2022 17:03:55 +0000

flight 168662 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168662/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  a3ba3ed0f45d3226320fd051c2066feaf7160d7a
baseline version:
 xen                  c7a80bc50ac768b4eecaad85b77ae45790c93c73

Last test of basis   168613  2022-03-15 12:01:42 Z    2 days
Testing same since   168662  2022-03-17 13:01:43 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  George Dunlap <george.dunlap@citrix.com>
  Henry Wang <Henry.Wang@arm.com>
  Julien Grall <jgrall@amazon.com>
  Stefano Stabellini <sstabellini@kernel.org>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   c7a80bc50a..a3ba3ed0f4  a3ba3ed0f45d3226320fd051c2066feaf7160d7a -> smoke


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 17:46:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 17:46:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291710.495322 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUuCB-0005Tc-Gi; Thu, 17 Mar 2022 17:45:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291710.495322; Thu, 17 Mar 2022 17:45:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUuCB-0005TV-Cb; Thu, 17 Mar 2022 17:45:55 +0000
Received: by outflank-mailman (input) for mailman id 291710;
 Thu, 17 Mar 2022 17:45:54 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=H+7p=T4=citrix.com=prvs=06815c04c=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nUuC9-0005TP-T4
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 17:45:54 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 15657e67-a61a-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 18:45:51 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 15657e67-a61a-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647539151;
  h=date:from:to:cc:subject:message-id:references:
   mime-version:in-reply-to;
  bh=Qv5intto8o+LEBAiJPvAtnHNzbOi/voXf02/V/EjfXA=;
  b=ICegvA5ObE++/6FQICbZixreeuFIqMzOF5kstfO5lqxL8JUK2umnfp5S
   f7aj03jVCaJEw++m1DkE3LGStSXpUqAiOyin0OPg4oltLcbrFD3QuHZ1s
   8qM4yVkD97IK0pzRfgmNHfyHzj7tSOpLIJDn1TdtNAxs0P7OzyoKhNfZb
   k=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 68900319
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:BeUBXqK7BLn/meLiFE+RIJUlxSXFcZb7ZxGr2PjKsXjdYENShjADz
 mZMW27QbKqOZmT8Kopyadnl800D75bQz9I2QAVlqX01Q3x08seUXt7xwmUcns+xwm8vaGo9s
 q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUYYoAQgsA148IMsdoUg7wbRh2dc32YLR7z6l4
 rseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3fMldG0DQUIhMdtNWc
 s6YpF2PEsE1yD92Yj+tuu6TnkTn2dc+NyDW4pZdc/DKbhSvOkXee0v0XRYRQR4/ttmHozx+4
 PBjqpXzRD0pBO73k743fjx/Ch9UZ7ITrdcrIVDn2SCS50jPcn+qyPRyFkAme4Yf/46bA0kXq
 6ZecmpUKEne2aTmm9pXScE17ignBMDtIIMYvGAm1TzDBOwqaZvCX7/L9ZlT2zJYasVmQ6aPP
 5JCMGsHgBLoTRlCOFU7WJ0FmtjvvGPaSgcBiWLMnP9ii4TU5FMoi+W8WDbPQfSUQsFSkledt
 3jx9W3zCREHN/SS0TOAtHmrg4fnly7hRJgbErH+8/dwmUCS3UQaEhhQXly+ydG7hVS5QMl3M
 FEP92wlqq1a3FOvZsnwWVu/unHslg4RXZ9cHvM37CmJy7HI+ECJC24cVDlDZdc68sgsSlQC2
 FmU2c3oBiZmtZWFSHac8KfSpjS3UQAXMGsDaCksXQYDpd75r+kblQnTR9xuFKq0iNzdGjzqx
 T2O6i8kiN0uYdUjjvvhuwqd2nT1+8aPHlVdChjrsnyNyy1mbc2oXYySqmPQt9xtCaGAcHPbo
 y1R8ySB19wmAZaInS2LZewCGrC1+vqIWAHhbU5T84oJrGr0pSP6FWxEyHQnfRoybJ5YEdP8S
 BWL0T698qO/K5dDgUVfR4uqQ/onwqH7fTgOfqCFN4EeCnSdmeLuwc2PWaJy9z21+KTPuftmU
 Xt+TSpKJSxGYUiA5GDqL9rxKZdxmkgDKZr7HPgXNSiP37uEf2KyQrwYKlaIZe1RxPra/FqJr
 okGbZXSlEg3vAjCjs//q9J7wbcidyRTOHwLg5YPKr7rzvRORQnN9MM9MZt+Itc4zsy5Z8/D/
 22nW18w9bYMrSavFOl+UVg6MOmHdc8m9RoTZHVwVX71iylLSdv+t883KspoFYTLAcQ+lJaYu
 dFeIJ7eahmOIxyakwkggW7V99UzKk702VrQY0JIolEXJvZdeuAAwfe8FiOHycXEJnDn3Sfii
 9VMDj/mfKc=
IronPort-HdrOrdr: A9a23:homRiqrX7PmIiHpGEhyZL6YaV5opeYIsimQD101hICG8cqSj9v
 xGuM5rsiMc6QxhPE3I9urtBEDtexzhHNtOkO8s1NSZLWzbUQmTXeJfBOLZqlWKcUDDH6xmpM
 VdmsBFeaTN5DNB7foSjjPXL+od
X-IronPort-AV: E=Sophos;i="5.90,188,1643691600"; 
   d="scan'208";a="68900319"
Date: Thu, 17 Mar 2022 17:45:34 +0000
From: Anthony PERARD <anthony.perard@citrix.com>
To: Vikram Garhwal <fnu.vikram@xilinx.com>
CC: <xen-devel@lists.xenproject.org>, <sstabellini@kernel.org>,
	<julien@xen.org>, <bertrand.marquis@arm.com>, <volodymyr_babchuk@epam.com>,
	Wei Liu <wl@xen.org>, Juergen Gross <jgross@suse.com>
Subject: Re: [XEN][RFC PATCH v3 13/14] tools/libs/light: Implement new libxl
 functions for device tree overlay ops
Message-ID: <YjNzvrQDX4uu7E3b@perard.uk.xensource.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
 <20220308194704.14061-14-fnu.vikram@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <20220308194704.14061-14-fnu.vikram@xilinx.com>

On Tue, Mar 08, 2022 at 11:47:03AM -0800, Vikram Garhwal wrote:
> Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com>
> ---
>  tools/include/libxl.h            |  3 ++
>  tools/libs/light/Makefile        |  1 +
>  tools/libs/light/libxl_overlay.c | 67 ++++++++++++++++++++++++++++++++
>  3 files changed, 71 insertions(+)
>  create mode 100644 tools/libs/light/libxl_overlay.c
> 
> diff --git a/tools/include/libxl.h b/tools/include/libxl.h
> index 51a9b6cfac..b31e17c2ce 100644
> --- a/tools/include/libxl.h
> +++ b/tools/include/libxl.h
> @@ -2419,6 +2419,9 @@ libxl_device_pci *libxl_device_pci_list(libxl_ctx *ctx, uint32_t domid,
>                                          int *num);
>  void libxl_device_pci_list_free(libxl_device_pci* list, int num);
>  
> +int libxl_dt_overlay(libxl_ctx *ctx, void *overlay,
> +                     int overlay_size, uint8_t overlay_op);
> +

As you are making changes to libxl's API, you are going to need to add a
"#define LIBXL_HAVE_*" in "include/libxl.h" about the availability of
the new function.

>  /*
>   * Turns the current process into a backend device service daemon
>   * for a driver domain.
> diff --git a/tools/libs/light/Makefile b/tools/libs/light/Makefile
> index 453bea0067..405115c13c 100644
> --- a/tools/libs/light/Makefile
> +++ b/tools/libs/light/Makefile
> @@ -116,6 +116,7 @@ SRCS-y += libxl_genid.c
>  SRCS-y += _libxl_types.c
>  SRCS-y += libxl_flask.c
>  SRCS-y += _libxl_types_internal.c
> +SRCS-y += libxl_overlay.o

Building this new file unconditionally is an issue at the moment.
"./configure" doesn't check if libfdt is on the system unless we happen
to build for Arm. And libfdt is mandatory when building for Arm.

Could you build this new source file on Arm only? With a comment why.
    "SRCS-$(CONFIG_ARM) +="

Alternatively, you could try to rework configure to always check for
libfdt, but I doubt that device tree overlay are going to be useful on
x86 at the moment.


Then, libxl_dt_overlay() will need a stub that just return an error when
building on system that don't have libfdt.

>  
>  ifeq ($(CONFIG_LIBNL),y)
>  CFLAGS_LIBXL += $(LIBNL3_CFLAGS)
> diff --git a/tools/libs/light/libxl_overlay.c b/tools/libs/light/libxl_overlay.c
> new file mode 100644
> index 0000000000..e370e8cac8
> --- /dev/null
> +++ b/tools/libs/light/libxl_overlay.c

Could you rename this new file "libxl_dt_overlay.c"? There could be
other kind of "overlay".

> @@ -0,0 +1,67 @@
> +/*
> + * Copyright (C) 2021 Xilinx Inc.
> + * Author Vikram Garhwal <fnu.vikram@xilinx.com>
> + *
> + * This program is free software; you can redistribute it and/or modify
> + * it under the terms of the GNU Lesser General Public License as published
> + * by the Free Software Foundation; version 2.1 only. with the special
> + * exception on linking described in file LICENSE.
> + *
> + * This program is distributed in the hope that it will be useful,
> + * but WITHOUT ANY WARRANTY; without even the implied warranty of
> + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
> + * GNU Lesser General Public License for more details.
> + */
> +
> +#include "libxl_osdeps.h" /* must come before any other headers */
> +#include "libxl_internal.h"
> +#include <libfdt.h>
> +#include <xenguest.h>
> +#include <xenctrl.h>
> +
> +static int check_overlay_fdt(libxl__gc *gc, void *fdt, size_t size)
> +{
> +    int r;
> +
> +    if (fdt_magic(fdt) != FDT_MAGIC) {
> +        LOG(ERROR, "Overlay FDT is not a valid Flat Device Tree");
> +        return ERROR_FAIL;
> +    }
> +
> +    r = fdt_check_header(fdt);
> +    if (r) {
> +        LOG(ERROR, "Failed to check the overlay FDT (%d)", r);
> +        return ERROR_FAIL;
> +    }
> +
> +    if (fdt_totalsize(fdt) > size) {
> +        LOG(ERROR, "Overlay FDT totalsize is too big");
> +        return ERROR_FAIL;
> +    }
> +
> +    return 0;
> +}
> +
> +int libxl_dt_overlay(libxl_ctx *ctx, void *overlay_dt, int overlay_dt_size,

I wonder whether the type of "overlay_dt_size" should be something else.
check_overlay_fdt() takes a "size_t", but the hypercall takes
"uint32_t".

> +                     uint8_t overlay_op)
> +{
> +    int rc = 0;

By CODING_STYLE, "rc" shouldn't be set when declared.

> +    GC_INIT(ctx);
> +
> +    if (check_overlay_fdt(gc, overlay_dt, overlay_dt_size)) {
> +        LOG(ERROR, "Overlay DTB check failed\n");

No need for \n, it's already added by LOG().

> +        GC_FREE;
> +        return ERROR_FAIL;

Instead of writing GC_FREE more than once, could you set "rc" then "goto
out;"?

> +    } else
> +        LOG(DEBUG, "Overlay DTB check passed\n");

This needs to be in a {} block because the true side of the "if" uses
braces.

> +
> +    /* We don't need to do  xc_interface_open here. */

That comment isn't very useful, as it is a fact of using "ctx".

> +    rc = xc_dt_overlay(ctx->xch, overlay_dt, overlay_dt_size, overlay_op);

Instead of "rc", could you store the result of xc_dt_overlay() in "r"?
"rc" is reserved for libxl error code. Also, the return value of
libxl_dt_overlay() can't be the return value of xc_dt_overlay().
There's some better explanation in the CODING_STYLE file, if needed.

> +    if (rc)
> +        LOG(ERROR, "%s: Adding/Removing overlay dtb failed.\n", __func__);
> +
> +    GC_FREE;
> +    return rc;
> +}

Thanks,

-- 
Anthony PERARD


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 17:52:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 17:52:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291713.495333 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUuIK-0006tP-6t; Thu, 17 Mar 2022 17:52:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291713.495333; Thu, 17 Mar 2022 17:52:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUuIK-0006tI-3l; Thu, 17 Mar 2022 17:52:16 +0000
Received: by outflank-mailman (input) for mailman id 291713;
 Thu, 17 Mar 2022 17:52:14 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=aZpy=T4=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nUuII-0006tC-PD
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 17:52:14 +0000
Received: from mail-lf1-x12d.google.com (mail-lf1-x12d.google.com
 [2a00:1450:4864:20::12d])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id fa06bb32-a61a-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 18:52:13 +0100 (CET)
Received: by mail-lf1-x12d.google.com with SMTP id n19so10266807lfh.8
 for <xen-devel@lists.xenproject.org>; Thu, 17 Mar 2022 10:52:13 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fa06bb32-a61a-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:from:date:message-id:subject:to;
        bh=wxvIZdiH9l1S/S1K9AONdxz0gTLAVvorLNNVZWRG6hI=;
        b=olZBngzsI79KQ3TZ8HerpKhY9CSbsCR2xU6yeOjFRHfuGA7kJhgRmNiRsU456oEZlS
         7T1EZcWEdBbvgyNdJsyCw5wCxutktOzjuM0eK+s1gV4Vp19w3IfUDP7LsrhAx91fQFwd
         bkttpZj2h9A3DbmrqrRxACkLs9B+JxiigyN3QDILBUMb5zEBmXYZmDsdkhgdXl8g7hCe
         13lFPX81bbwYMKkvo0sUg5dQgSZbusHlweg20HqA931qIYLmHp8yf2uqnYINQ14YeYeI
         Qx542/LDbzDhRYBNyNcqUiJfTdTGkhIAjMfK62yc15LB6A2DjgbrfsX4ScVyMwOxne5f
         Hnuw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
        bh=wxvIZdiH9l1S/S1K9AONdxz0gTLAVvorLNNVZWRG6hI=;
        b=Jy5hLEdhtmw4kNoWnzm02FP5NYsdYfp8yIKxbUtkIc82Ucq7/fmTC320Nk2lFX5/NA
         YYLS5eIeJXbhBrwkBLCbzTu2q1ZmX0M4HzefMThLR9AG+bsphpis4G7jyv0c3LXCzToy
         C1I7b7Y5RS5zfkDYEFDyIvi9xYU2Y5gB81s6NFXet8ciEB+93KMqrdk5uURJJRJIjvqf
         8BHM/xa8yKGW9PNj7w8F58NITK7CrbrVDjP2EFSPpRLsb3rWl5vadjL9/B11EagojoIQ
         B4YWtBPYeQe6bJTvGoICLDwHKWC3xiqcT4xVs0hnpcnht4dx3BNbIDkWDCeJSttqn3Kl
         OiFg==
X-Gm-Message-State: AOAM5326+l9vBWSc/3PZNP7UsulI6GoTZz698IWTsgnE5vHFAyTsThcG
	olj8CXrnNGdETQHM0/4h027BGWOdp5D8scs2pczXC37lyVs=
X-Google-Smtp-Source: ABdhPJxYFiwR6OtcTamp5llrUidhrQNrqaZ5dMU33zesWLOQeIzfJETdlJ1XxRR2qJq9OCtkghcH/+cH1bo1m2DaW6A=
X-Received: by 2002:a19:6a0e:0:b0:443:3b15:4345 with SMTP id
 u14-20020a196a0e000000b004433b154345mr3650161lfu.388.1647539532858; Thu, 17
 Mar 2022 10:52:12 -0700 (PDT)
MIME-Version: 1.0
From: Jason Andryuk <jandryuk@gmail.com>
Date: Thu, 17 Mar 2022 13:52:01 -0400
Message-ID: <CAKf6xpvk1zX3ZtzSOWBCasZOuS607-W_iqHbC=ZgTBQqo+btjA@mail.gmail.com>
Subject: Nonsensical XSM Flask denial
To: xen-devel <xen-devel@lists.xenproject.org>
Content-Type: text/plain; charset="UTF-8"

I shut down a domU (HVM dom9 w/ Linux stubdom dom10) with a single PCI
device assigned.  Xen logged the following Flask denial for a second
PVH dom5 (uivm) without any PCI devices assigned.  This is Xen 4.14.4.

(XEN) avc:  denied  { remove_irq } for domid=5 irq=17
scontext=system_u:system_r:uivm_t
tcontext=system_u:object_r:shared_irq_t tclass=resource

Domain 5 as uivm_t and irq 17 as shared_irq_t both look correct.  But
it doesn't make sense that uivm would make a hypercall for an irq.

Could this be from RCU calling complete_domain_destroy() when current
is dom5 (uivm)?  What would current be set to when RCU runs its
callbacks?

Thanks,
Jason


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 18:14:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 18:14:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291716.495343 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUueA-0000vq-VL; Thu, 17 Mar 2022 18:14:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291716.495343; Thu, 17 Mar 2022 18:14:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUueA-0000vj-SK; Thu, 17 Mar 2022 18:14:50 +0000
Received: by outflank-mailman (input) for mailman id 291716;
 Thu, 17 Mar 2022 18:14:49 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=hAZZ=T4=citrix.com=prvs=068f51ced=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nUue9-0000vd-6E
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 18:14:49 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 1f51b075-a61e-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 19:14:47 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1f51b075-a61e-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647540887;
  h=from:to:subject:date:message-id:references:in-reply-to:
   content-id:content-transfer-encoding:mime-version;
  bh=dVE8PLr6JI/Nd2ykEKLVHl0Y75xEmROfphuKRhYshvA=;
  b=CevtrmDHecdLC28IwGTtHlsONBWIxoIs2qSaixuMZze9YyIVfpzXYdge
   +C6PXCXIcJu+VM57o+C25sUuyGxmrOSekmPdbt6Kj8sma5pPVnZHAkUKQ
   v5I4WiXPW6nwAEKhOrkR+1iG3yq3f2azSLfBjBNWBi9J5lhNc59WmGsLd
   k=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 65997246
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:xYcWpahCr+Z7fKY3Om3Px9xnX161aRAKZh0ujC45NGQN5FlHY01je
 htvXm3QbvyPZmujedEjbN/n9ElV7JCEzN83QAFvrShmFXwb9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFrS4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YQtzY/PVvM0yagJROgFjAaF4yYXrGEHq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bklhmwSvUErANRpfbTr+RzdRZwC0xloZFGvO2i
 88xN2c+PUuaP0Mn1lE/LqMUvOuQmVrESjhnrGqNhYkezTjo9VkkuFTqGIWMIYHbLSlPpW6Iq
 2SD82nnDxUyMN2E1SHD4n+qnvXIny7wRMQVDrLQ3vxjhlGJ13EQIBITXFq/5/K+jyaDt8l3c
 hJOvHB09O5rqRLtHoKVswCETGCsskRBBcN0OsID8wik6rfo7zioPEQ9d2sUADA5j/MeSTsv3
 16PutrmAz1zrbGYIU6gGqeoQSCaYnZMczJbDcMQZU5cuoS4/tlv5v7aZow7eJNZmOEZDt0ZL
 9qiiCElz4segscQv0lQ1QCW2mn8znQlo+Nc2+k2Yo5Hxl4hDGJGT9bxgbQ+0RqmBNzFJrVml
 CJY8/VyFMhUUfmweNWlGY3h5o2B6fefKyH7ilVyBZQn/DnF0yf9Id8MvW4nfhkxbZtsldrVj
 Kn74185CHh7ZifCUEOKS9jpV5RCIVbISLwJqcw4nvIRO8MsJWdrDQllZFKK3nCFraTfufpXB
 HtvSu71VSxyIf0+lFKeHr5BuZd2lnFW7T6CHvjTkkX4uYdykVbIEN/pxnPVNbtnhE5FyS2Im
 +ti2zyikEwODrehPnGJreb+7zkidBAGOHw/kOQOHsarKQt6AmAxTfjXxLIqYYt+mKpJ0OzP+
 xmAtoVwkjITWVWvxd22V01e
IronPort-HdrOrdr: A9a23:j1wniau96nS7FLw1139RWgrq7skCwYMji2hC6mlwRA09TyXGra
 +TdaUguSMc1gx9ZJh5o6H7BEEZKUmsuaKdkrNhQItKOzOW91dATbsSoLcKpgePJ8SQzJ866U
 4NSdkcNDS0NykAsS+Y2nj3Lz9D+qj/zEnAv463pB0NLT2CKZsQlzuRYjzrSnGeLzM2YKbRYa
 Dsgfav0ADQHUj/AP7LZEUtbqzmnZnmhZjmaRkJC1oM8w+Vlw6l77b8Dlyxwgoeeykn+8ZizU
 H11yjCoomzufCyzRHRk0XJ6Y5NpdfnwtxfQOSRl8kuLCn2gArAXvUgZ1TChkF3nAic0idurD
 D+mWZlAy210QKXQoiBm2qu5+An6kdp15at8y7AvZKpm72EeNtzMbs/uWseSGqD16NohqAM7E
 oAtVjpyaZ/HFfOmj/w6MPPUAwvnk2ooWA6mepWlHBHV5ACAYUh5bD30XklZqvoJhiKobzP0d
 Meef309bJTaxeXfnrZtm5gzJilWWkyBA6PRgwHttaO2zZbkXhlxw9ArfZv1Eso5dY4Ud1J9u
 7EOqNnmPVHSdIXd7t0AKMETdGsAmLATBrQOCaZIEjhFqsAJ3XRwqSHq4kd9aWvYtgF3ZEykJ
 POXBdRsnMzYVvnDYmU0JhC4nn2MRKAtPTWu7VjDrRCy87BreDQQF2+oXgV4rmdn8k=
X-IronPort-AV: E=Sophos;i="5.90,188,1643691600"; 
   d="scan'208";a="65997246"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=gv/Ck6Z+WigWEcGnzn4H17CRlObCqqV2e19mYu59ZI1ESlfoWWvfFxSZovyuaJb8wd2b1cM3G+AAayJ9J1kdD4bGMa8/aep3igQWSXOhzNTtx2XEGDISme5lTOcjEbjUcU6OLTOWVGlUjAHWVfYMJQxbajBwOcXGQRY+ImFAkfbyYuRXohZmrVlWSwjM13HtED6ciI7pljzseUamH+SmAQWNbmCSyrUAosmNW6KVF5efsgslAkeeglR9+dn8RNHwsZBkIFQwaW57VE1m6ytVFJL85U3v4MtgfebxALbK1IB4ESdbNmvcFZaeOe1Lntil9Z7jNii1f0jZTaMhcc9h1g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=dVE8PLr6JI/Nd2ykEKLVHl0Y75xEmROfphuKRhYshvA=;
 b=QdWzTm2EbKZdpYy93GXue4EppGSQqEZsRbboVX6pAFDehLyaHCBdWshLltkf8zn52+8oTdTJy/KKWm3Wr93jW7mb89RS8U1AMl+mnbFUD9qm+1Bhwdo4mxhm6R9REW9zH1lxFO/2Pk2rhqEd8gv+8Q5mslRzlRVWP3Q+ZUOVtfAv/hn1r3aAqvf5yLmoh17Qt+8HERbIp4hHEFDVh4oRk4tNY+gvLuDhXVvuD0iI1Gnf6ZPzefkj1v/6SFHUPXNvX3MEoBtb1IT5EidYpOa4rY/BLkCCYFFD83mgXjqXWn8WLhYqQ6pOPZ96uJs0d9Kw9b9j/M90IC5t+D/AW/ESQQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=dVE8PLr6JI/Nd2ykEKLVHl0Y75xEmROfphuKRhYshvA=;
 b=A9qxayUtR+OLwH9g88Y3+LDIPgZYGawgpv03EOae9iCXtEizTuDxWRQOI4WPOY6xCqd1g5kaE+tCKdjmK0U7nbTEpw/T2WVcZ48HJ2/JLBy5tOmR/5sTZ8M4Mo/8YbcGIwZrfnf693kGokY8jQVZI7LfxYf+SRaoXn/pDXJjzgc=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jason Andryuk <jandryuk@gmail.com>, xen-devel
	<xen-devel@lists.xenproject.org>
Subject: Re: Nonsensical XSM Flask denial
Thread-Topic: Nonsensical XSM Flask denial
Thread-Index: AQHYOifTdUK/S2+tpU+tNQxc6h7KEazD4WoA
Date: Thu, 17 Mar 2022 18:14:39 +0000
Message-ID: <ab5a7aea-cab1-f9d9-e3cc-58636c234a4e@citrix.com>
References: <CAKf6xpvk1zX3ZtzSOWBCasZOuS607-W_iqHbC=ZgTBQqo+btjA@mail.gmail.com>
In-Reply-To: <CAKf6xpvk1zX3ZtzSOWBCasZOuS607-W_iqHbC=ZgTBQqo+btjA@mail.gmail.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 636999c7-5e29-4d50-e3b5-08da08420049
x-ms-traffictypediagnostic: BL1PR03MB5976:EE_
x-microsoft-antispam-prvs: <BL1PR03MB5976E147930C029D5A2368C2BA129@BL1PR03MB5976.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(76116006)(2906002)(508600001)(8676002)(64756008)(66446008)(66476007)(66556008)(6486002)(71200400001)(31696002)(66946007)(31686004)(36756003)(86362001)(110136005)(6512007)(2616005)(53546011)(6506007)(316002)(91956017)(26005)(186003)(122000001)(38100700002)(82960400001)(38070700005)(3480700007)(8936002)(5660300002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?eWdIRHNMNEt2ZndsOVFMQ3lQWmxROXZ6SnQzQmpyZlpZVVROdE0zbU5IYjBv?=
 =?utf-8?B?UEt6UGRKSDBHUVlSam4yVi92VTBpYnp5UUw5b1h5RVlHSytSVWI5TFYxZFph?=
 =?utf-8?B?OUNTQjdPLzZuZUpFcXo0MVJ0QnlrRlI3U1BobmRoT1UzenZWS3N4VURlWUw1?=
 =?utf-8?B?VEc0NGxqYnhJUXRxNnJiTEtpRW5yK2xndXNXMjlLSjB0TW82NlBCTDFjaXN3?=
 =?utf-8?B?cXNvd3FhQkd4OUllZTFIUDZGQmVZbHdINVNLdGE0aytYVDdPRGFVWWkwRFI5?=
 =?utf-8?B?cDRzV0lvdEZRUDhMMXdkeVZWZUV6TE9XNm8rbm44RWdrQyttZzdQeHVBY252?=
 =?utf-8?B?OHZUanpoZnBycGhwQ3pSSWEvZEREUlB0SjlkWlFGODBnMjBkVzJhVGkzUXAr?=
 =?utf-8?B?dHZFRnFKWnVINmk4dlV1aGFIb29MWCtvbTgxaVhiWmhCTlRKZ05RREtYUCti?=
 =?utf-8?B?SnBtU24wcDVjMTlMUktIY1JYSE11bTJlUCtJVnZ2azlKOGJPZEsvWnVNU1FP?=
 =?utf-8?B?K29yeWQ5VytkME5vK0xQd01aakREUDhHQjFpRjc5WU1zc0QrS0dIOGhLOGVp?=
 =?utf-8?B?MjhsOC9BUThyQmREUERRV1RWRUpsOTFmQU1lOS9zSG51TUJIUHdtYk9LQkVn?=
 =?utf-8?B?ZVRDUmdhTVAzdjUzY21ybWozNTNVKzJtbnJIWjVHREhoMEw2Vy9tSWhzRVFU?=
 =?utf-8?B?czFWWkZBekNBdHEzUHM5cEpnTENKTjBLRmVWUTc3aGp2c1RnQUl4SldxejIr?=
 =?utf-8?B?QUFRLzJJeVhHN3NiUExjWVhEbVIwSGJsMlJQaFJaMzQyRkJ1Yy9kRXZVL252?=
 =?utf-8?B?SGpPUUM4OU1xcDFORDdXWGVnRWRVV0NHSTZITkJZcDVpeTZxTkRJK2pIcDNU?=
 =?utf-8?B?Y25LYVpEU3g3bkRqa0ZWNzN1b0xuR0JDQkJRNUdoSFJ1aXRQZEd2RXl2ZVJr?=
 =?utf-8?B?T0JGQ3E5QVg0M0JmaUs1emk0L2l2d0RCR3l4d1RkLzhGenVoR0dKTHpienBn?=
 =?utf-8?B?NjdLWVgreitaNjA1M1p6SXZDL3NJOVpMOWxReDZoYS93OXRBUCtJK09GSzF3?=
 =?utf-8?B?aXFSU2dWYnRzMmVISlNhZkJnN0lxUHNqalJ4YzVtc0lJY3FuTWRDTXcxd2lk?=
 =?utf-8?B?cCtkbTNubENERGswa3pRcHV4eFNMdkZiMkp5dUhsL3JUK25EeXRkdXpjSU1y?=
 =?utf-8?B?b0hTZ2c4d3drSnAvUU41MHdZNEMxd2dOOVczQlUrZHF3SjdvbEVPWEkyTmE1?=
 =?utf-8?B?UGVxMUZiQzFPaDVMcEI5TTU2VG5CYWFodGhjL1lYa3Y0bTVxV05mQW1wZHdy?=
 =?utf-8?B?WE54cXJPTlBrTUY1K2o3di9yVjFSZ1R4SnlTRHFuSmdVM2cvSmF6R3JSNjRV?=
 =?utf-8?B?eW0xbXBaUkQrRVZxdFFmU1NNUE9pSU9SSHJuMDBPRHJ6Sk5xT3daZXdWek5E?=
 =?utf-8?B?UFRaUEc0QklaNzlwVzdUVGhWdENqd0pRak1qbkprQXJud3ZQMU9TbExXNStn?=
 =?utf-8?B?cTgzeWpIMTRyRExYN0plUU5nZC9KMjBFSWFabjR4ZWRwL2Y5WkpmS3A2OWd4?=
 =?utf-8?B?Um5FQnlOa3RjK3I1a3ZhcVJTeXp0UnMxdnZZMzRiSXlRU3BiYWRLNjBwVUZq?=
 =?utf-8?B?L1lDT2F4WnlueGpFRWxCVS9rQlhObjRFUWdRNnlCTm9DZW9tM2xUS2NaNWo1?=
 =?utf-8?B?WjhZckZSak1jbkhhYUx2Mm9MVWxYWHU3N243TDJFaTRYbW9ENFhlZWdkL1pH?=
 =?utf-8?B?ZUhPNVh0aGpPNURBeXYxZ0FJUnVmazRFenBJVUgvaU1QVHZXaDV6WUMwdE5h?=
 =?utf-8?B?NWxMVjR2YjJ3ZUZqNUZqYTVSdGIxQlFMR2pWRjdLWHgrUXJrMUhPbllGL2ZM?=
 =?utf-8?B?K0RjY3ROTzNGbDdMT2tyejFMYjRuYXplcVVBd2FaRjYybnE1aExOS3ZwbkJq?=
 =?utf-8?Q?Sft0WaMhj6Yp6UUEnfibSZoSCVrI1joe?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <7D2F03226EDED24AA4F1B2AE1B620BC3@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 636999c7-5e29-4d50-e3b5-08da08420049
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Mar 2022 18:14:39.1427
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 48O9SHfQwynkSJ1Rn6zjnUWUWaiOngjTjk9a1TIS5NrCnBnb1iAv0HXKTRkQusmrXCE6dIHe0VXcR3E8+qktxdHHjyTOFM0baQMmqOTfAzs=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL1PR03MB5976
X-OriginatorOrg: citrix.com

T24gMTcvMDMvMjAyMiAxNzo1MiwgSmFzb24gQW5kcnl1ayB3cm90ZToNCj4gSSBzaHV0IGRvd24g
YSBkb21VIChIVk0gZG9tOSB3LyBMaW51eCBzdHViZG9tIGRvbTEwKSB3aXRoIGEgc2luZ2xlIFBD
SQ0KPiBkZXZpY2UgYXNzaWduZWQuICBYZW4gbG9nZ2VkIHRoZSBmb2xsb3dpbmcgRmxhc2sgZGVu
aWFsIGZvciBhIHNlY29uZA0KPiBQVkggZG9tNSAodWl2bSkgd2l0aG91dCBhbnkgUENJIGRldmlj
ZXMgYXNzaWduZWQuICBUaGlzIGlzIFhlbiA0LjE0LjQuDQo+DQo+IChYRU4pIGF2YzogIGRlbmll
ZCAgeyByZW1vdmVfaXJxIH0gZm9yIGRvbWlkPTUgaXJxPTE3DQo+IHNjb250ZXh0PXN5c3RlbV91
OnN5c3RlbV9yOnVpdm1fdA0KPiB0Y29udGV4dD1zeXN0ZW1fdTpvYmplY3RfcjpzaGFyZWRfaXJx
X3QgdGNsYXNzPXJlc291cmNlDQo+DQo+IERvbWFpbiA1IGFzIHVpdm1fdCBhbmQgaXJxIDE3IGFz
IHNoYXJlZF9pcnFfdCBib3RoIGxvb2sgY29ycmVjdC4gIEJ1dA0KPiBpdCBkb2Vzbid0IG1ha2Ug
c2Vuc2UgdGhhdCB1aXZtIHdvdWxkIG1ha2UgYSBoeXBlcmNhbGwgZm9yIGFuIGlycS4NCj4NCj4g
Q291bGQgdGhpcyBiZSBmcm9tIFJDVSBjYWxsaW5nIGNvbXBsZXRlX2RvbWFpbl9kZXN0cm95KCkg
d2hlbiBjdXJyZW50DQo+IGlzIGRvbTUgKHVpdm0pPyAgV2hhdCB3b3VsZCBjdXJyZW50IGJlIHNl
dCB0byB3aGVuIFJDVSBydW5zIGl0cw0KPiBjYWxsYmFja3M/DQoNClJDVSBydW5zIGluIHNvZnRp
cnEgY29udGV4dCwgc28geWVzIC0gKGFsbW9zdCkgYW55IHVzZSBvZiBjdXJyZW50IHdvdWxkDQpi
ZSBib2d1cy4NCg0KQnV0IEkgY2FuJ3Qgc3BvdCBhbnkgb3ZlcmxhcCBiZXR3ZWVuIHRoZSBwaHlz
ZGV2b3BfdW5tYXBfcGlycSBYU00gY2hlY2ssDQphbmQgY29tcGxldGVfZG9tYWluX2Rlc3Ryb3ko
KS4NCg0KQW55IGNoYW5jZSB5b3UgY2FuIHJlcHJvZHVjZSB0aGlzIHdpdGggYSBXQVJOKCkgaW4g
dGhlIEFWQyBkZW5pZWQgcGF0aCwNCnNvIHdlIGNhbiBzZWUgd2hhdCdzIGdvaW5nIG9uIGhlcmU/
DQoNCn5BbmRyZXcNCg==


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 18:19:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 18:19:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291721.495354 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUuiC-0001e6-JF; Thu, 17 Mar 2022 18:19:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291721.495354; Thu, 17 Mar 2022 18:19:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUuiC-0001dz-GM; Thu, 17 Mar 2022 18:19:00 +0000
Received: by outflank-mailman (input) for mailman id 291721;
 Thu, 17 Mar 2022 18:18:59 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=H+7p=T4=citrix.com=prvs=06815c04c=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nUuiB-0001dt-O5
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 18:18:59 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id b56eb452-a61e-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 19:18:58 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b56eb452-a61e-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647541138;
  h=date:from:to:cc:subject:message-id:references:
   mime-version:in-reply-to;
  bh=H0krJZQCUjhshiW2Tsye1oKIZEcxBlTVD5mRv3wbdOg=;
  b=X7Ppf3xmSpn4SifseoLEG5Jq4BVF8dsVuMpkyhCK4iGb6VmYXdqWsiIA
   Dx2xZsIFZdyil1GinQFZK0UKW9WrImBnvQMiwgLCVmqS2/Y63CDAXWE+A
   exQqUgEkIoGaS+Be4URin2oaMjQg+VMh9Gg5eVFZsXM1RUDlky1Kek5iP
   U=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 66458419
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:pZqywq0vjjTBn95dUfbD5TRxkn2cJEfYwER7XKvMYLTBsI5bpzdVy
 zMfUWDTOquMYDHwLdh+bd+0oxwE6JXdyodiSQdrpC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUx3oDja++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /13uL+SGCp0GpeTxvxMEDADITkmN7xJreqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHiOp8fvXdxiynUF/88TbjIQrnQ5M8e1zA17ixLNaiAO
 5dJNWM+BPjGSzRmPFQ4C8M5p6C11yHYIwNl83+Vi6VitgA/yyQuieOwYbI5YOeiT8hPglyRo
 G6A+m3jGwwbL/SW0z/D+XWp7sfRmif8VJMXBaeP/Pdgi12OxUQeEBQTE1C8pJGRlUqWS99Zb
 UsO9UIGr7U29UGtZsnwWVu/unHslhAaRpxOEu4g4QSl2qvQ4gCJQGMDS1ZpeNEg8cM7WzEu/
 luIhM/yQyxitqWPTnCQ/avSqim9UQAONnMLbyIASQoD4vHgrZs1gxaJScxseJNZlfWsR2u2m
 WrT6nFj2fND1qbnyplX43j9jhGO97WUajRquB2GHUv+3Bshbp+qMtnABUfg0d5MK4OQT1+kt
 XcCmtSD4O1mMaxhhBBhU81WQuj3uq/t3Cn0xAc2QsJ/r2jFF2uLJ9g43d1oGKt+3i/okxfNa
 VSbhw5e7YQ70JCCPf4uONLZ5yjHIMHd+TXZuhL8M4ImjntZLlbvEMRSiai4hTyFfK8Ey/1XB
 HtjWZzwZUv28Iw+pNZMe88T0KUw2gc1zn7JSJbwwnyPiOTCOyLIFu5fbgPRM4jVCZ9oRi2Pr
 76z0OPQl31ivBDWOHGLoeb/03hXRZTEOXwGg5MOLbPSSuaXMGogF+XQ0dscl39NxMxoehPz1
 ijlACdwkQOn7VWecFniQi0zOdvHAMckxVpmbHNEALpd8yV6CWpZxPxELMVfkHhO3LEL8MOYu
 NFeIpTeWKsTEmqbk9nfBLGkxLFfmN2QrVrmF0KYjPIXJPaMmyShFgfYQzbS
IronPort-HdrOrdr: A9a23:CzVGTakMy14PofXPSf1fu9l5V/3pDfIs3DAbv31ZSRFFG/Fxl6
 iV8sjz8SWE7Ar5OUtQ/OxoV5PsfZqxz/JICMwqTNCftWrdyQmVxeNZjbcKqgeIc0aVygce79
 YCT0EXMqyXMbEQt6fHCWeDfOod/A==
X-IronPort-AV: E=Sophos;i="5.90,188,1643691600"; 
   d="scan'208";a="66458419"
Date: Thu, 17 Mar 2022 18:18:52 +0000
From: Anthony PERARD <anthony.perard@citrix.com>
To: Vikram Garhwal <fnu.vikram@xilinx.com>
CC: <xen-devel@lists.xenproject.org>, <sstabellini@kernel.org>,
	<julien@xen.org>, <bertrand.marquis@arm.com>, <volodymyr_babchuk@epam.com>,
	Wei Liu <wl@xen.org>
Subject: Re: [XEN][RFC PATCH v3 14/14] tools/xl: Add new xl command overlay
 for device tree overlay support
Message-ID: <YjN7jJldNceEU2uq@perard.uk.xensource.com>
References: <20220308194704.14061-1-fnu.vikram@xilinx.com>
 <20220308194704.14061-15-fnu.vikram@xilinx.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <20220308194704.14061-15-fnu.vikram@xilinx.com>

On Tue, Mar 08, 2022 at 11:47:04AM -0800, Vikram Garhwal wrote:
> Signed-off-by: Vikram Garhwal <fnu.vikram@xilinx.com>
> ---
>  tools/xl/xl.h           |  4 ++++
>  tools/xl/xl_cmdtable.c  |  6 ++++++
>  tools/xl/xl_vmcontrol.c | 45 +++++++++++++++++++++++++++++++++++++++++
>  3 files changed, 55 insertions(+)
> 
> diff --git a/tools/xl/xl.h b/tools/xl/xl.h
> index c5c4bedbdd..604fd5bb94 100644
> --- a/tools/xl/xl.h
> +++ b/tools/xl/xl.h
> @@ -97,6 +97,9 @@ struct save_file_header {
>  
>  #define SAVEFILE_BYTEORDER_VALUE ((uint32_t)0x01020304UL)
>  
> +#define XL_DT_OVERLAY_ADD                   1
> +#define XL_DT_OVERLAY_REMOVE                2

These value would need to be part of libxl's API, rather than been
defined here. Could you create a new enum with both operation in
"libxl_types.idl", then have the libxl function convert them to the
hypercall operation? (So to be done in the previous patch.)

>  void save_domain_core_begin(uint32_t domid,
>                              int preserve_domid,
>                              const char *override_config_file,
> @@ -139,6 +142,7 @@ int main_shutdown(int argc, char **argv);
>  int main_reboot(int argc, char **argv);
>  int main_list(int argc, char **argv);
>  int main_vm_list(int argc, char **argv);
> +int main_dt_overlay(int argc, char **argv);
>  int main_create(int argc, char **argv);
>  int main_config_update(int argc, char **argv);
>  int main_button_press(int argc, char **argv);
> diff --git a/tools/xl/xl_cmdtable.c b/tools/xl/xl_cmdtable.c
> index 661323d488..5812d19db8 100644
> --- a/tools/xl/xl_cmdtable.c
> +++ b/tools/xl/xl_cmdtable.c
> @@ -20,6 +20,12 @@
>  #include "xl.h"
>  
>  const struct cmd_spec cmd_table[] = {
> +    { "overlay",
> +      &main_dt_overlay, 1, 1,

I think the first "1" needs to be a "0", because it doesn't seems that
the command can do a "dry-run".

> +      "Add/Remove a device tree overlay",
> +      "add/remove <.dtbo>"
> +      "-h print this help\n"
> +    },

I don't think "overlay" is a good name for the command. Maybe
"dt-overlay" ? But we seem to mostly have "*-add" "*-remove" command (or
attach/detach), so maybe two new commands would be better:
"dt-overlay-add" and "dt-overlay-remove" rather than using a subcommand
for add/remove.


Also, could you add this/those commands later in "cmd_table"? I'd rather
keep "create" first when running `xl help`. So maybe at the end, or
some other place that kind of make sens?

>      { "create",
>        &main_create, 1, 1,
>        "Create a domain from config file <filename>",
> diff --git a/tools/xl/xl_vmcontrol.c b/tools/xl/xl_vmcontrol.c
> index 435155a033..76b969dc33 100644
> --- a/tools/xl/xl_vmcontrol.c
> +++ b/tools/xl/xl_vmcontrol.c
> @@ -1262,6 +1262,51 @@ int main_create(int argc, char **argv)
>      return 0;
>  }
>  
> +int main_dt_overlay(int argc, char **argv)
> +{
> +    const char *overlay_ops = argv[1];
> +    const char *overlay_config_file = argv[2];
> +    void *overlay_dtb = NULL;
> +    int rc;
> +    uint8_t op;
> +    int overlay_dtb_size = 0;
> +
> +    if (overlay_ops == NULL) {
> +        fprintf(stderr, "No overlay operation mode provided\n");
> +        return ERROR_FAIL;
> +    }
> +
> +    if (strcmp(overlay_ops, "add") == 0)
> +        op = XL_DT_OVERLAY_ADD;
> +    else if (strcmp(overlay_ops, "remove") == 0)
> +        op = XL_DT_OVERLAY_REMOVE;
> +    else {
> +        fprintf(stderr, "Invalid dt overlay operation\n");
> +        return ERROR_FAIL;
> +    }
> +
> +    if (overlay_config_file) {
> +        rc = libxl_read_file_contents(ctx, overlay_config_file,
> +                                      &overlay_dtb, &overlay_dtb_size);
> +
> +        if (rc) {
> +            fprintf(stderr, "failed to read the overlay device tree file %s\n",
> +                    overlay_config_file);
> +            free(overlay_dtb);
> +            return ERROR_FAIL;
> +        }
> +    } else {
> +        fprintf(stderr, "overlay dtbo file not provided\n");

Instead of making out of bound access to "argv", you could check that
"argc" have the expected value, and if not, print the help of the
command. If you look at main_save() for example, there is: "if(argc is
wrong value){help("save");} which would print the help for the
command.

> +        return ERROR_FAIL;
> +    }
> +
> +    rc = libxl_dt_overlay(ctx, overlay_dtb, overlay_dtb_size, op);
> +    if (rc)
> +        fprintf(stderr, "Overlay operation failed\n");

I'm not sure that this error message would be useful, as libxl should
already have printed something.

> +
> +    free(overlay_dtb);
> +    return rc;
> +}

Thanks,

-- 
Anthony PERARD


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 19:03:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 19:03:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291724.495366 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUvOX-0006jL-RB; Thu, 17 Mar 2022 19:02:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291724.495366; Thu, 17 Mar 2022 19:02:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUvOX-0006jE-O3; Thu, 17 Mar 2022 19:02:45 +0000
Received: by outflank-mailman (input) for mailman id 291724;
 Thu, 17 Mar 2022 19:02:43 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=aZpy=T4=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nUvOV-0006j5-Kv
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 19:02:43 +0000
Received: from mail-lf1-x12c.google.com (mail-lf1-x12c.google.com
 [2a00:1450:4864:20::12c])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d2029677-a624-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 20:02:41 +0100 (CET)
Received: by mail-lf1-x12c.google.com with SMTP id w7so10587506lfd.6
 for <xen-devel@lists.xenproject.org>; Thu, 17 Mar 2022 12:02:41 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d2029677-a624-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=PAUhVyB8VVVigytkv4cb4GXKo7bmMF1X/nGv3QUnFFo=;
        b=fM+MDAuw4i8VUg1o5ap+qH7DdfuA07F0bkqlXz/8NOXa2GtvoaN9gKmgnuCQA2nVKh
         S1idokh90lcRwkoaIC9tFuxI3hg/idlW7qFq3Yms8FHP8IvdqKWRFY/Wx2UWEvznoqIL
         MYejvPNylWNLXvOQSTDV6LlbSBaF1bVIuWoZ7w8VNVdL+0XJoBPNpcsqmJVxShW+l800
         vR4b68tbF1U45yfbzfMlXnjVnaFwglm/zTTq3CjCyqWVO6cktBFVZSVMs1a5O2I1k6Gf
         Pp/mRIQyIWKShaz+Ad4Ky5kvC5ISK5/Bn/vPuNBSXvSNaxwdv9vpIiB70fJo8JHQZg/L
         KQuA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=PAUhVyB8VVVigytkv4cb4GXKo7bmMF1X/nGv3QUnFFo=;
        b=xFcpndzmCoPxSyH7kgDVr/b67WeeBfAVQO1eS+YkNTYjjrulnvvGnjYMLffYvZefXB
         BCV+vwEZIbwY1PS4af/p/Wlm6PsKmpn16HUN9ZJgbK9uzzU+98LUfaLZCfwPYhaKozCN
         Y7JaT+380pu5nufP7Mjk7wW1eeOgsKAGQNa+6hszrER7bFM/HCQIEb1gdWBM1FvPNEOh
         AMD50RmQEHE1LZ2Ay5LK8igSAclLRI+1mJVc547IAHSM3GxNOS5Ts0CQKQdfLrdOh1YT
         vgfRLCicnU5zf6pjtZVjpniEvXKuRHHi4nHLpN0kS5j2yi37d2isxML0TyYcqeoaJYsJ
         fKpg==
X-Gm-Message-State: AOAM533tAxrP6a7F0ZXj4+FMRpt2rnjtiz8eAzW4jWkSZLjQPMfael0T
	b17HTw45WgZQy6AabUpBD9wUdHGrz46CwYqLSEd9/yc1s90=
X-Google-Smtp-Source: ABdhPJypN1KpXNlKcSOV95yZ/JUQYMQyOS1zBt+/bZQ6OfXXscl9tiC4lpfazQu6Xlab8HpvzObICr0sDEwtMPZBazk=
X-Received: by 2002:a19:6a0e:0:b0:443:3b15:4345 with SMTP id
 u14-20020a196a0e000000b004433b154345mr3815880lfu.388.1647543760223; Thu, 17
 Mar 2022 12:02:40 -0700 (PDT)
MIME-Version: 1.0
References: <CAKf6xpvk1zX3ZtzSOWBCasZOuS607-W_iqHbC=ZgTBQqo+btjA@mail.gmail.com>
 <ab5a7aea-cab1-f9d9-e3cc-58636c234a4e@citrix.com>
In-Reply-To: <ab5a7aea-cab1-f9d9-e3cc-58636c234a4e@citrix.com>
From: Jason Andryuk <jandryuk@gmail.com>
Date: Thu, 17 Mar 2022 15:02:28 -0400
Message-ID: <CAKf6xpuqzJ+YE9crAJCJCCaZRZRYkZ5snsOOLP8Yjc4Nyx=9=A@mail.gmail.com>
Subject: Re: Nonsensical XSM Flask denial
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
Cc: xen-devel <xen-devel@lists.xenproject.org>
Content-Type: text/plain; charset="UTF-8"

On Thu, Mar 17, 2022 at 2:14 PM Andrew Cooper <Andrew.Cooper3@citrix.com> wrote:
>
> On 17/03/2022 17:52, Jason Andryuk wrote:
> > I shut down a domU (HVM dom9 w/ Linux stubdom dom10) with a single PCI
> > device assigned.  Xen logged the following Flask denial for a second
> > PVH dom5 (uivm) without any PCI devices assigned.  This is Xen 4.14.4.
> >
> > (XEN) avc:  denied  { remove_irq } for domid=5 irq=17
> > scontext=system_u:system_r:uivm_t
> > tcontext=system_u:object_r:shared_irq_t tclass=resource
> >
> > Domain 5 as uivm_t and irq 17 as shared_irq_t both look correct.  But
> > it doesn't make sense that uivm would make a hypercall for an irq.
> >
> > Could this be from RCU calling complete_domain_destroy() when current
> > is dom5 (uivm)?  What would current be set to when RCU runs its
> > callbacks?
>
> RCU runs in softirq context, so yes - (almost) any use of current would
> be bogus.
>
> But I can't spot any overlap between the physdevop_unmap_pirq XSM check,
> and complete_domain_destroy().
>
> Any chance you can reproduce this with a WARN() in the AVC denied path,
> so we can see what's going on here?

The path I found reading is:
complete_domain_destroy
  arch_domain_destroy
    free_domain_pirqs
      unmap_domain_pirq
        xsm_unmap_domain_irq

After a few tries it triggered:
(XEN) Xen WARN at irq.c:2348
(XEN) ----[ Xen-4.14.4-xc  x86_64  debug=n   Not tainted ]----
(XEN) CPU:    4
(XEN) RIP:    e008:[<ffff82d0403115d4>] unmap_domain_pirq+0x3c4/0x490
...
(XEN) Xen call trace:
(XEN)    [<ffff82d0403115d4>] R unmap_domain_pirq+0x3c4/0x490
(XEN)    [<ffff82d04022ac52>] S xmem_pool_free+0x22/0x2f0
(XEN)    [<ffff82d0403116f1>] S free_domain_pirqs+0x51/0x70
(XEN)    [<ffff82d040301615>] S arch_domain_destroy+0x45/0xb0
(XEN)    [<ffff82d040208391>] S domain.c#complete_domain_destroy+0x81/0x150
(XEN)    [<ffff82d040221dc4>] S rcupdate.c#rcu_process_callbacks+0x114/0x2b0
(XEN)    [<ffff82d04022244a>] S softirq.c#__do_softirq+0x5a/0xa0
(XEN)    [<ffff82d04029890b>] S vmx_asm_do_vmentry+0x2b/0x30

I found the XSM checks a little confusing.

physdevop_unmap_pirq() calls:
  xsm_unmap_domain_pirq() <- checks generic resource remove
  unmap_domain_pirq()
    xsm_unmap_domain_irq() <- checks remove_irq for the specific irq

access_vectors lists physdevop_unmap_pirq as remove_irq, but the xsm
check in the function is xsm_unmap_domain_pirq, which doesn't use
remove_irq.

In an earlier Xen version, these RCU callbacks may have run as xen_t?
Or maybe it's just racy which context is used?  commit
8ad651705cbd0ad192398c1513d12c02b3197fa1 had:

    2. When a domain is destroyed with a device passthrough active, the
    calls to remove_{irq,ioport,iomem} can be made by the hypervisor itself
    (which results in an XSM check with the source xen_t).  It does not make
    sense to deny these permissions; no domain should be using xen_t, and
    forbidding the hypervisor from performing cleanup is not useful.

+# Domain destruction can result in some access checks for actions performed by
+# the hypervisor.  These should always be allowed.
+allow xen_t resource_type : resource { remove_irq remove_ioport remove_iomem };

Thanks,
Jason


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 20:00:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 20:00:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291728.495380 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUwI7-0004GY-07; Thu, 17 Mar 2022 20:00:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291728.495380; Thu, 17 Mar 2022 20:00:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUwI6-0004GR-TL; Thu, 17 Mar 2022 20:00:10 +0000
Received: by outflank-mailman (input) for mailman id 291728;
 Thu, 17 Mar 2022 20:00:09 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUwI4-0004G9-W9; Thu, 17 Mar 2022 20:00:09 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUwI4-0002Ga-UY; Thu, 17 Mar 2022 20:00:08 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUwI3-0001wk-UE; Thu, 17 Mar 2022 20:00:08 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUwI3-0001cP-Tl; Thu, 17 Mar 2022 20:00:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=L/lCRi9ejB2WtaFbg1nZmaVB0lZOsk39EyeOpPn8xh0=; b=4vi4IkxCRb3nQ+m/p59hLTnwqb
	+bx88NTISscEPNfuL9JYytjbDrw1+Yc45wfgxR6Bk1uvgoxmmyPyoWAG6b/Yo7L6LZTuNGrNP9MQn
	vbDUCuGPdYT5Tr8Cf5xvZYPnE8DKvzprn9SaCYOr2LPFXFPXyF53qVGloQ1NO+vXFGFQ=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168658-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-upstream-4.15-testing test] 168658: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-upstream-4.15-testing:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-upstream-4.15-testing:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-upstream-4.15-testing:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-upstream-4.15-testing:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-upstream-4.15-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-upstream-4.15-testing:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-upstream-4.15-testing:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-upstream-4.15-testing:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=6503bd6a1b5364ffd346a8a475e1eb91b9f756e5
X-Osstest-Versions-That:
    qemuu=e2af2d050338c99e8436e251ad67aafb3ebbd501
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 17 Mar 2022 20:00:07 +0000

flight 168658 qemu-upstream-4.15-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168658/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check fail baseline untested
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 160861
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 160861
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 160861
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 160861
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 160861
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 160861
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 160861
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass

version targeted for testing:
 qemuu                6503bd6a1b5364ffd346a8a475e1eb91b9f756e5
baseline version:
 qemuu                e2af2d050338c99e8436e251ad67aafb3ebbd501

Last test of basis   160861  2021-04-09 10:38:42 Z  342 days
Testing same since   168658  2022-03-17 11:11:39 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Anthony PERARD <anthony.perard@citrix.com>
  Jason Andryuk <jandryuk@gmail.com>
  Ross Lagerwall <ross.lagerwall@citrix.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   e2af2d0503..6503bd6a1b  6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 -> stable-4.15


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 20:11:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 20:11:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291739.495396 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUwSS-0005tf-5M; Thu, 17 Mar 2022 20:10:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291739.495396; Thu, 17 Mar 2022 20:10:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUwSS-0005tY-2H; Thu, 17 Mar 2022 20:10:52 +0000
Received: by outflank-mailman (input) for mailman id 291739;
 Thu, 17 Mar 2022 20:10:51 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUwSR-0005tO-7a; Thu, 17 Mar 2022 20:10:51 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUwSR-0002Ra-4T; Thu, 17 Mar 2022 20:10:51 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUwSQ-0002Of-ML; Thu, 17 Mar 2022 20:10:50 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUwSQ-0005Ku-Lv; Thu, 17 Mar 2022 20:10:50 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=cMi4EhDxp3aJ2ZTmzNg71X8Ylmta2Nfe332HuZyT6U4=; b=b98Mdp9yZb3+71Tn2pFB1E116z
	u7vRR8NI6gKaXFW80xsotvJPyMBFBctBC+enM2DySh4yHE0p1BvEMUEPxaUANqTGxC3EctN2Gy2r3
	sqeGWPU35PxA4nXFdbSOTj4PS0O+8nyEm7DYgNoyWmKq6du00MBAF997Iip8iNjckPHE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168657-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-upstream-4.14-testing test] 168657: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-upstream-4.14-testing:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-upstream-4.14-testing:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-upstream-4.14-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-upstream-4.14-testing:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-upstream-4.14-testing:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-upstream-4.14-testing:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-upstream-4.14-testing:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.14-testing:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=83aebe33dc76760f911162f9e7a4b98a4929776b
X-Osstest-Versions-That:
    qemuu=d7d6a60e73ee21e82f0bac2036153ccccf996e6c
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 17 Mar 2022 20:10:50 +0000

flight 168657 qemu-upstream-4.14-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168657/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check fail baseline untested
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 160798
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 160798
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 160798
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 160798
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 160798
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 160798
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 160798
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 qemuu                83aebe33dc76760f911162f9e7a4b98a4929776b
baseline version:
 qemuu                d7d6a60e73ee21e82f0bac2036153ccccf996e6c

Last test of basis   160798  2021-04-07 15:38:46 Z  344 days
Testing same since   168657  2022-03-17 11:11:39 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Anthony PERARD <anthony.perard@citrix.com>
  Jason Andryuk <jandryuk@gmail.com>
  Ross Lagerwall <ross.lagerwall@citrix.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   d7d6a60e73..83aebe33dc  83aebe33dc76760f911162f9e7a4b98a4929776b -> stable-4.14


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 20:32:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 20:32:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291748.495416 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUwnC-0008NI-5S; Thu, 17 Mar 2022 20:32:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291748.495416; Thu, 17 Mar 2022 20:32:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUwnC-0008NB-0R; Thu, 17 Mar 2022 20:32:18 +0000
Received: by outflank-mailman (input) for mailman id 291748;
 Thu, 17 Mar 2022 20:32:16 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nUwnA-0008N5-SH
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 20:32:16 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nUwnA-0002oR-Cd; Thu, 17 Mar 2022 20:32:16 +0000
Received: from gw1.octic.net ([81.187.162.82] helo=[10.0.1.102])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nUwnA-0003J6-6G; Thu, 17 Mar 2022 20:32:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:Subject:
	From:References:Cc:To:MIME-Version:Date:Message-ID;
	bh=tgOS5ylxJvBwNcddRTleaXLCAw9znbKVmH9nmFiWK0Y=; b=cVeyJO6HuRl1I2WICY2NgjXAyU
	pKVSwqIUdTJoxTWyXBnRGIhn92jbq2WnpC1ZyPadTILysjh+yJflg4hfWt5GpK3lO19cbuImXPMrS
	wZLkDyaV7c6xn2ikzyqj+282DfXwuOYLeIeyd4MSmAVFz0qrsj9ZhbwdU42RXyOTb4Yw=;
Message-ID: <78aaa9be-328b-76e4-42c0-b116ab194bdf@xen.org>
Date: Thu, 17 Mar 2022 20:32:13 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
To: Bertrand Marquis <Bertrand.Marquis@arm.com>
Cc: Xen-devel <xen-devel@lists.xenproject.org>,
 "marco.solieri@minervasys.tech" <marco.solieri@minervasys.tech>,
 "lucmiccio@gmail.com" <lucmiccio@gmail.com>, Julien Grall
 <jgrall@amazon.com>, Stefano Stabellini <sstabellini@kernel.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
References: <20220309112048.17377-1-julien@xen.org>
 <20220309112048.17377-2-julien@xen.org>
 <0E4A176E-BE1F-427F-8D4E-1AAEA811964C@arm.com>
From: Julien Grall <julien@xen.org>
Subject: Re: [PATCH early-RFC 1/5] xen/arm: Clean-up the memory layout
In-Reply-To: <0E4A176E-BE1F-427F-8D4E-1AAEA811964C@arm.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit



On 17/03/2022 15:23, Bertrand Marquis wrote:
> Hi Julien,

Hi Bertrand,

>> On 9 Mar 2022, at 11:20, Julien Grall <julien@xen.org> wrote:
>>
>> From: Julien Grall <jgrall@amazon.com>
>>
>> In a follow-up patch, the base address for the common mappings will
>> vary between arm32 and arm64. To avoid any duplication, define
>> every mapping in the common region from the previous one.
>>
>> Take the opportunity to add mising *_SIZE for some mappings.
>>
>> Signed-off-by: Julien Grall <jgrall@amazon.com>
> 
> Changes looks ok to me so:
> Reviewed-by: Bertrand Marquis <bertrand.marquis@arm.com>
> 
> Only one question after.
> 
>>
>> ---
>>
>> After the next patch, the term "common" will sound strange because
>> the base address is different. Any better suggestion?
> 
> MAPPING_VIRT_START ?

For arm32, I am planning to reshuffle the layout so the runtime address 
is always at the end of the layout.

So I think MAPPING_VIRT_START may be as confusing. How about 
SHARED_ARCH_VIRT_MAPPING?

> 
> Or space maybe..

I am not sure I understand this suggestion. Can you clarify?

> 
>> ---
>> xen/arch/arm/include/asm/config.h | 24 +++++++++++++++++-------
>> 1 file changed, 17 insertions(+), 7 deletions(-)
>>
>> diff --git a/xen/arch/arm/include/asm/config.h b/xen/arch/arm/include/asm/config.h
>> index aedb586c8d27..5db28a8dbd56 100644
>> --- a/xen/arch/arm/include/asm/config.h
>> +++ b/xen/arch/arm/include/asm/config.h
>> @@ -107,16 +107,26 @@
>>   *  Unused
>>   */
>>
>> -#define XEN_VIRT_START         _AT(vaddr_t,0x00200000)
>> -#define FIXMAP_ADDR(n)        (_AT(vaddr_t,0x00400000) + (n) * PAGE_SIZE)
>> +#define COMMON_VIRT_START       _AT(vaddr_t, 0)
>>
>> -#define BOOT_FDT_VIRT_START    _AT(vaddr_t,0x00600000)
>> -#define BOOT_FDT_SLOT_SIZE     MB(4)
>> -#define BOOT_FDT_VIRT_END      (BOOT_FDT_VIRT_START + BOOT_FDT_SLOT_SIZE)
>> +#define XEN_VIRT_START          (COMMON_VIRT_START + MB(2))
>> +#define XEN_SLOT_SIZE           MB(2)
> 
> I know this is not modified by your patch, but any idea why SLOT is used here ?
> XEN_VIRT_SIZE would sound a bit more logic.

No idea. I can add a patch to rename it.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 20:47:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 20:47:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291751.495426 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUx1P-0001T5-Cf; Thu, 17 Mar 2022 20:46:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291751.495426; Thu, 17 Mar 2022 20:46:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUx1P-0001Sy-8r; Thu, 17 Mar 2022 20:46:59 +0000
Received: by outflank-mailman (input) for mailman id 291751;
 Thu, 17 Mar 2022 20:46:58 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nUx1O-0001Ss-Dk
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 20:46:58 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nUx1N-00033J-Pt; Thu, 17 Mar 2022 20:46:57 +0000
Received: from home.octic.net ([81.187.162.82] helo=[10.0.1.102])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nUx1N-0004g5-Jz; Thu, 17 Mar 2022 20:46:57 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=oNfEjzpgMSayxkeCAtVzA/0cBEiIU4WQVf4zeEHNElQ=; b=xT2EGQdw+SnbwnyFqQD3zR7ZDz
	7X1HeS6pHThbLA9EXzbgx/gF1x2ABZoNyQPvpjTOdB9gtHTPGNm4tNzuVFuytcSa9aYvRpcd7mFvf
	YQhhCbrL7BmX8KbETAOm4m6qKK84ADZ/Fkd+nA4sXOe722fbKSlsFMuc8sURCm+jTPXw=;
Message-ID: <857610d4-32e6-6770-a954-f26aca8cf9b3@xen.org>
Date: Thu, 17 Mar 2022 20:46:55 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Subject: Re: [PATCH early-RFC 2/5] xen/arm64: Rework the memory layout
To: xen-devel@lists.xenproject.org
Cc: marco.solieri@minervasys.tech, lucmiccio@gmail.com,
 Julien Grall <jgrall@amazon.com>, Stefano Stabellini
 <sstabellini@kernel.org>, Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
References: <20220309112048.17377-1-julien@xen.org>
 <20220309112048.17377-3-julien@xen.org>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220309112048.17377-3-julien@xen.org>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 09/03/2022 11:20, Julien Grall wrote:
> From: Julien Grall <jgrall@amazon.com>
> 
> Xen is currently not fully compliant with the Arm because it will
> switch the TTBR with the MMU on.
> 
> In order to be compliant, we need to disable the MMU before
> switching the TTBR. The implication is the page-tables should
> contain an identity mapping of the code switching the TTBR.
> 
> If we don't rework the memory layout, we would need to find a
> virtual address that matches a physical address and doesn't clash
> with the static virtual regions. This can be a bit tricky.
> 
> On arm64, the memory layout  has plenty of unused space. In most of
> the case we expect Xen to be loaded in low memory.
> 
> The memory layout is reshuffled to keep the 0th slot free. Xen will now
> be loaded at (512GB + 2MB). This requires a slight tweak of the boot
> code as XEN_VIRT_START cannot be used as an immediate.
> 
> Signed-off-by: Julien Grall <jgrall@amazon.com>
> 
> ---
> 
>      TODO:
>          - I vaguely recall that one of the early platform we supported add
>            the memory starting in high memory (> 1TB). I need to check
>            whether the new layout will be fine.
>          - Update the documentation to reflect the new layout
> ---
>   xen/arch/arm/arm64/head.S         |  3 ++-
>   xen/arch/arm/include/asm/config.h | 20 ++++++++++++++------
>   xen/arch/arm/mm.c                 | 14 +++++++-------
>   3 files changed, 23 insertions(+), 14 deletions(-)
> 
> diff --git a/xen/arch/arm/arm64/head.S b/xen/arch/arm/arm64/head.S
> index 66d862fc8137..878649280d73 100644
> --- a/xen/arch/arm/arm64/head.S
> +++ b/xen/arch/arm/arm64/head.S
> @@ -594,7 +594,8 @@ create_page_tables:
>            * need an additional 1:1 mapping, the virtual mapping will
>            * suffice.
>            */
> -        cmp   x19, #XEN_VIRT_START
> +        ldr   x0, =XEN_VIRT_START
> +        cmp   x19, x0
>           bne   1f
>           ret
>   1:
> diff --git a/xen/arch/arm/include/asm/config.h b/xen/arch/arm/include/asm/config.h
> index 5db28a8dbd56..b2f31a914103 100644
> --- a/xen/arch/arm/include/asm/config.h
> +++ b/xen/arch/arm/include/asm/config.h
> @@ -107,8 +107,20 @@
>    *  Unused
>    */
>   
> +#ifdef CONFIG_ARM_32
> +
>   #define COMMON_VIRT_START       _AT(vaddr_t, 0)
>   
> +#else
> +
> +#define SLOT0_ENTRY_BITS  39
> +#define SLOT0(slot) (_AT(vaddr_t,slot) << SLOT0_ENTRY_BITS)
> +#define SLOT0_ENTRY_SIZE  SLOT0(1)
> +
> +#define COMMON_VIRT_START       SLOT(1)

This should have been SLOT0(). I got it right in my tree but merge the 
change to the wrong patch :(.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 21:56:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 21:56:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291755.495436 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUy64-0008JE-6A; Thu, 17 Mar 2022 21:55:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291755.495436; Thu, 17 Mar 2022 21:55:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUy64-0008J7-3I; Thu, 17 Mar 2022 21:55:52 +0000
Received: by outflank-mailman (input) for mailman id 291755;
 Thu, 17 Mar 2022 21:55:51 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUy63-0008Ix-Hb; Thu, 17 Mar 2022 21:55:51 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUy63-0004C9-Fe; Thu, 17 Mar 2022 21:55:51 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUy63-0006wG-1g; Thu, 17 Mar 2022 21:55:51 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUy63-0006KK-1C; Thu, 17 Mar 2022 21:55:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=F8GVdqKgEO7D8vX4xiccAyNRCY9QaQHbDrvDMArjrRE=; b=NK/+NLzoajIADVlxoLcWfM8U+W
	/oqOX57l7ROFLtB64E9a/q9ASJlOeZOFVKLzhP9XmBTJ2hRoHtDWQ9nB54jRO2RuPAWfJkvrBFpBW
	r7Aczdlkgy6Dis17QZD4mg7QFjPQm5X2CBMyoM68HzvFzU4EBITUSXXJ8oigN+fdZ9Ac=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168666-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168666: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=7b41b91fd2ecbf87b91120b468689e10296b656c
X-Osstest-Versions-That:
    xen=a3ba3ed0f45d3226320fd051c2066feaf7160d7a
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 17 Mar 2022 21:55:51 +0000

flight 168666 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168666/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  7b41b91fd2ecbf87b91120b468689e10296b656c
baseline version:
 xen                  a3ba3ed0f45d3226320fd051c2066feaf7160d7a

Last test of basis   168662  2022-03-17 13:01:43 Z    0 days
Testing same since   168666  2022-03-17 18:00:27 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Jan Beulich <jbeulich@suse.com>
  Juergen Gross <jgross@suse.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   a3ba3ed0f4..7b41b91fd2  7b41b91fd2ecbf87b91120b468689e10296b656c -> smoke


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 22:10:05 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 22:10:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291764.495448 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUyJl-0001Wj-Jx; Thu, 17 Mar 2022 22:10:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291764.495448; Thu, 17 Mar 2022 22:10:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUyJl-0001Vj-G1; Thu, 17 Mar 2022 22:10:01 +0000
Received: by outflank-mailman (input) for mailman id 291764;
 Thu, 17 Mar 2022 22:10:00 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Iy6X=T4=oracle.com=dongli.zhang@srs-se1.protection.inumbo.net>)
 id 1nUyJj-0001Ui-4B
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 22:10:00 +0000
Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com
 [205.220.165.32]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id fa517401-a63e-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 23:09:57 +0100 (CET)
Received: from pps.filterd (m0246617.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 22HLY7Sa022983; 
 Thu, 17 Mar 2022 22:09:44 GMT
Received: from aserp3030.oracle.com ([141.146.126.71])
 by mx0b-00069f02.pphosted.com with ESMTP id 3et5fuat6c-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Thu, 17 Mar 2022 22:09:44 +0000
Received: from pps.filterd (aserp3030.oracle.com [127.0.0.1])
 by aserp3030.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 22HM7crC160142;
 Thu, 17 Mar 2022 22:09:43 GMT
Received: from nam11-co1-obe.outbound.protection.outlook.com
 (mail-co1nam11lp2175.outbound.protection.outlook.com [104.47.56.175])
 by aserp3030.oracle.com with ESMTP id 3et64u33br-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Thu, 17 Mar 2022 22:09:42 +0000
Received: from BYAPR10MB2663.namprd10.prod.outlook.com (2603:10b6:a02:a9::20)
 by DM6PR10MB2892.namprd10.prod.outlook.com (2603:10b6:5:67::13) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26; Thu, 17 Mar
 2022 22:09:40 +0000
Received: from BYAPR10MB2663.namprd10.prod.outlook.com
 ([fe80::a0d5:610d:bcf:9b47]) by BYAPR10MB2663.namprd10.prod.outlook.com
 ([fe80::a0d5:610d:bcf:9b47%4]) with mapi id 15.20.5061.028; Thu, 17 Mar 2022
 22:09:40 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fa517401-a63e-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc :
 subject : date : message-id : content-type : mime-version;
 s=corp-2021-07-09; bh=/kTBvFUOeAsOHDBzP37bM/e4lhHJsjB6uZfOI/ZMR8E=;
 b=q5JIjR0Y522EQ9ZgoPXoiqH1XHf6u4hb8R1eSKKYje1YjC6wBCkR0mbE6IL4w91Qa0Gh
 h6ysKg8zYfpElq82um7j3YugPzGqJEaBNq8+odioUe+H9vWK7oCh8COJdyY/9bygzOTI
 ZMu/qrU6fvmpBBReYJ0lJFcLV6aOnmOPl3628ubMZRMP1jt8C/6ZNyujz3acM20g+9Yw
 adkVSBPCrCEl/kPxEuvb49H4D3EnKhjwtji244XxXqocjk5tHRZVysHqAnNpDL2hutNj
 JwJLBj1ZXbuDosmemstnCKJ9esOjSALrVZxmc8Cqvly3NF4KH89reDE2hcMyD5twDT7S 0g== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=LtTgdZhSuhcFwVr03mssj1YEQh9C5BvT1iSxoV4ko1qPG0AoCPE099N0/uBU9O5ZOzggjI6Iv2l+Q0RiZxrOEMfyePovjn7qj/dgep2xYTuOdPFZBsO0CsxguCD+2lNrYCkHmnnWK3q03gfyColjR0qECM59MpN7HxWRxRK7eI/1FsM9kv/ltUNjONAFcSHsvxkhLgl1dPovKvFn692hv/WACR8WE5ihWIGHxW0IbtECxXjf8ARYc3uHBvul/l3IVJz+ieHhwqZMPSXF6fiXBwirzlaUlwzvlVr4Jt2nkmFV+k5kGFfH2175ugnFkrJcJVq0ps2vfoj5973I6LfG8w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=/kTBvFUOeAsOHDBzP37bM/e4lhHJsjB6uZfOI/ZMR8E=;
 b=UpczpwZh6hcEl9MJ7sSL61J2hHBDXj3LPNwtvYEP8ZLOKl715Ykqz5i15GroFSakIFqLUlOZH2MuArMEQm17i8Qe/PTXwDRuxVLIw8w7CYiZaxCoOGWiBJut/ggrajA/bidDuSbTpuZIdULCf+K9Fsstk3rBxXniF1QaQcZHHXmuDvCuL02pDcF2/3DOJwRemUplX55lBJYnM6FD8YcUzz8Ph1Va8dZ/78oYnbqd4u+aE0LGnOLD5+YgY9UqCNahvDo+QNU/SKqtsvPMPTP9EHbVfGOPUqgNvj1LDuzYgAb2DKwOtbNep2IIgeAdDExP+fcUZsjMLdioipIyPOxgTg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=/kTBvFUOeAsOHDBzP37bM/e4lhHJsjB6uZfOI/ZMR8E=;
 b=KmjSnC/p1VMGeuQzxp23bVDH8WRNVw1I2cXas54DD6yhhUFgEoFiJGzxTiSOXYtzwPpQAd6BD4AHhISaJJGwDOPRuvds6YGoCxEVo0ByrqZOl0p1+A3WEOm9/CTxQZtkik7gPPdxXew+M+j26IZsmZxc7egkbpsnW6V1/ii7bq4=
From: Dongli Zhang <dongli.zhang@oracle.com>
To: linux-block@vger.kernel.org, xen-devel@lists.xenproject.org
Cc: boris.ostrovsky@oracle.com, jgross@suse.com, sstabellini@kernel.org,
        roger.pau@citrix.com, axboe@kernel.dk, linux-kernel@vger.kernel.org
Subject: [PATCH 1/1] xen/blkfront: fix comment for need_copy
Date: Thu, 17 Mar 2022 15:09:30 -0700
Message-Id: <20220317220930.5698-1-dongli.zhang@oracle.com>
X-Mailer: git-send-email 2.17.1
Content-Type: text/plain
X-ClientProxiedBy: DM6PR08CA0025.namprd08.prod.outlook.com
 (2603:10b6:5:80::38) To BYAPR10MB2663.namprd10.prod.outlook.com
 (2603:10b6:a02:a9::20)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 92529182-2eb4-4256-3029-08da0862d56b
X-MS-TrafficTypeDiagnostic: DM6PR10MB2892:EE_
X-Microsoft-Antispam-PRVS: 
	<DM6PR10MB289274B64CF705B3A512695CF0129@DM6PR10MB2892.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR10MB2663.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66476007)(66556008)(8676002)(316002)(4326008)(6666004)(2906002)(86362001)(38350700002)(38100700002)(66946007)(508600001)(52116002)(6486002)(1076003)(26005)(2616005)(5660300002)(186003)(44832011)(36756003)(6512007)(4744005)(6506007)(8936002)(83380400001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?us-ascii?Q?d6Ux0QHB3/e7nLmX9qBEOby3qdGHSHTz1204PbSWA5VvXKoR418MrZ3kx3oi?=
 =?us-ascii?Q?66GttkmKrnc2WLLQTgCCN41eX7/kqrLMdI54sJ5SDyf0rxc/bfuaHcD64Lrl?=
 =?us-ascii?Q?wMXDbyH6lMr/GGA+iZVBZd2y64KK7TNX2B6I8LddhMhnsneeKWwxg+eTvs08?=
 =?us-ascii?Q?LvP6OquimP7vRmXBGKr0dDHRL9HkKrgQuNqZWaiYkVR0zVUtI445gXjedqEY?=
 =?us-ascii?Q?zTCcJxgOAQ2oB5DgLKUuQnVdKNup4UK7AFHOE8T3RH8r0rvt2iA2zU88cS1j?=
 =?us-ascii?Q?xYAAcMzzAmjA7ymg5u7gJ5SgMNGtjvoQr8E1sMaFmtPwUgJULQdWA5HWKLoj?=
 =?us-ascii?Q?drtb2RUDQPSIM680bMl9S4mJMZ8rp+Ps7EGhTvZ65jxPsLLwZi8iQoUU3xUK?=
 =?us-ascii?Q?o2zh5Jj3bA69AA/pGm/ousHZbqpaPTW7BR5K/o3EBGP8oxR8k3c6fuTnpr2c?=
 =?us-ascii?Q?FiDym8XTE0A/1F1QcAd10dFfDttt5B9z68yoeQl87DkPguYCiXrdLtSYaM+d?=
 =?us-ascii?Q?H2dAG3qQErSbRcLLQFno5Lb/dAe8hjXeVEp5zftFSH0EI8PJ05oGOexEPTqc?=
 =?us-ascii?Q?bzQhOmBPM2UvwFKNDz5vi0asV3GZOEd/rGetWf05kXnLicZJfPpwKU86uKGZ?=
 =?us-ascii?Q?o3jzD4KKPfdQGJchwTMqxpbSwxDEqZOYhOsjdCBKc+TX93Dh4IhCUr0gOY/B?=
 =?us-ascii?Q?+5zBTS3hiTmvdKupUEDU4P+G09r4H7zlgZ9TTckd2iK1G97XQ1c1bdHzHsWU?=
 =?us-ascii?Q?roMuQvGv28qt+V10fCXmNW4Hj9AtIaQavZP4+ChgIFgo+R9LrWgE/5PG0yVJ?=
 =?us-ascii?Q?bo6l51YRjGJJKONy/KgeuOpiZML9F7cXycBz/NCspWftB+N3hFR9rbzi3z/K?=
 =?us-ascii?Q?Gm2CULQFWZL3Lro2d9lsO4QaI9f+A6rNlYDVPipcZxi52E32Kks8G/DC77B6?=
 =?us-ascii?Q?qaR0jG/gOaqSnjM7rIe974b/O4fBBLFZJHmUcq0GOJ+Ggqwy41dc25Oea/Bz?=
 =?us-ascii?Q?BoKJ+oadpyWxrR6OxGYX/NzCnhwlAdRJtf6/rniWNLaTvrqnITV49XPja5HE?=
 =?us-ascii?Q?x5vu5ePG2dM8XOFVYB8BZP8iOrDBn5hYtnys7bYo0K05ksb9QJmTafe1H9v5?=
 =?us-ascii?Q?DGFybMIsP5U+1B2aGJLnCL6iVZv3XAewKSFOFbdW56Wf1jeRRSaas1R/4ET6?=
 =?us-ascii?Q?BL0VT0Z2YV4nha9PK00S5SLXCBA0IrCy72USyBu065tNtS+6GQ3wxaC0blpy?=
 =?us-ascii?Q?VK5q75xlPwvs4FDzpwXsPwLgUAISWigV3Vrfd3CMHkGhkKv9Aimn3CHlsAbx?=
 =?us-ascii?Q?XJe1cH5OXeS5uqZSe/1KlCe/5oiOecC+2W/4FeI02A/px4LNCqJRrWOv4Fz8?=
 =?us-ascii?Q?RIsGCDZFgEXE8y2ZkU1z5U5mSLSJ4Ne876/CmbfU8TkP7OBVA2j5/tcIMWOy?=
 =?us-ascii?Q?hHDozeZPirL2Nquhki+BFeOgABiTR36G58mNGmxfBTvDMv8RVvkBFA=3D=3D?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 92529182-2eb4-4256-3029-08da0862d56b
X-MS-Exchange-CrossTenant-AuthSource: BYAPR10MB2663.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2022 22:09:40.8454
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: HrSOxpsQfjQfJNVGjhH1N+UC1P5nmC+DPD9Okf558NmR3UxM/Axz5FCdwFvVcylJq1s3nKibNmX/JOrMunW/Ow==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR10MB2892
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10289 signatures=693715
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 malwarescore=0 bulkscore=0 phishscore=0
 suspectscore=0 mlxscore=0 adultscore=0 spamscore=0 mlxlogscore=999
 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2202240000
 definitions=main-2203170121
X-Proofpoint-GUID: keNzdS04akPg-lEdyBqSVlYd-LMaV_SL
X-Proofpoint-ORIG-GUID: keNzdS04akPg-lEdyBqSVlYd-LMaV_SL

The 'need_copy' is set when rq_data_dir(req) returns WRITE, in order to
copy the written data to persistent page.

".need_copy = rq_data_dir(req) && info->feature_persistent,"

Signed-off-by: Dongli Zhang <dongli.zhang@oracle.com>
---
 drivers/block/xen-blkfront.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/drivers/block/xen-blkfront.c b/drivers/block/xen-blkfront.c
index 03b5fb341e58..dbc32d0a4b1a 100644
--- a/drivers/block/xen-blkfront.c
+++ b/drivers/block/xen-blkfront.c
@@ -576,7 +576,7 @@ struct setup_rw_req {
 	struct blkif_request *ring_req;
 	grant_ref_t gref_head;
 	unsigned int id;
-	/* Only used when persistent grant is used and it's a read request */
+	/* Only used when persistent grant is used and it's a write request */
 	bool need_copy;
 	unsigned int bvec_off;
 	char *bvec_data;
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 17 22:21:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 22:21:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291767.495459 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUyUw-0003kM-Mb; Thu, 17 Mar 2022 22:21:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291767.495459; Thu, 17 Mar 2022 22:21:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUyUw-0003kF-IE; Thu, 17 Mar 2022 22:21:34 +0000
Received: by outflank-mailman (input) for mailman id 291767;
 Thu, 17 Mar 2022 22:21:33 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUyUv-0003jf-IP; Thu, 17 Mar 2022 22:21:33 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUyUv-0004dT-FW; Thu, 17 Mar 2022 22:21:33 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUyUv-0000T5-6N; Thu, 17 Mar 2022 22:21:33 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUyUv-0002ZI-5w; Thu, 17 Mar 2022 22:21:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=pQHuc9lUDajJ3Wssdql7A3zdewDT3GnQ7cKxOvIN2Og=; b=Tsd0JBOzwCpsCFDrSqU381yQwJ
	hmVlsLReBy97oniTipL+1cc76qYJFFrWwwBl91xl5nxb8/mTClt5oqdcjkh3Q1Ts/TG2+klpFgyNQ
	3HbYu2w++ZxExV6DCSnKpG/HIRvcSIO3BpLphDEWalA338wxmX0nfrHM2u4M/TE7anpw=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168664-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168664: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=411b3ff6ddb4042374a6e61285dac9f5a227f652
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 17 Mar 2022 22:21:33 +0000

flight 168664 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168664/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 411b3ff6ddb4042374a6e61285dac9f5a227f652
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   17 days
Failing since        168258  2022-03-01 01:55:31 Z   16 days  160 attempts
Testing same since   168663  2022-03-17 13:41:37 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 747 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 22:25:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 22:25:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291774.495470 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUyYU-0004Mj-69; Thu, 17 Mar 2022 22:25:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291774.495470; Thu, 17 Mar 2022 22:25:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUyYU-0004Mc-2p; Thu, 17 Mar 2022 22:25:14 +0000
Received: by outflank-mailman (input) for mailman id 291774;
 Thu, 17 Mar 2022 22:25:12 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=MbXJ=T4=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nUyYS-0004MR-2n
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 22:25:12 +0000
Received: from sin.source.kernel.org (sin.source.kernel.org
 [2604:1380:40e1:4800::1])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 196a912e-a641-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 23:25:09 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by sin.source.kernel.org (Postfix) with ESMTPS id 0A197CE2520;
 Thu, 17 Mar 2022 22:25:03 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id C2384C340E9;
 Thu, 17 Mar 2022 22:25:00 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 196a912e-a641-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647555901;
	bh=V8mmnanyvccwabdkyypBs5XZbuD5PL+MSlkLDViEuBU=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=rE1/m9SseLGxr9Qev248pl6QLUX/JYyU7YWvRYG7+LtivLMzoukdI/dCqNd0xM+i8
	 qhJPzMzB8H2QVyUIi+x1HRO6yXtrM1p9TNkpEKwuT29GJ7WE2qdV5C/89REFXeQ6y3
	 LRH5LbVmvmBxrzWLpw6HMiNkaIenB6UK4nvycrSMlcB/VSnr6C4DDHIyPEpPmn8ITS
	 KLQnV5GZYr1Jvb1viso+nL4I2ckhR2Z8uth2di9706Zs2KJbJ1vtaCoViSH003MI1x
	 yM4zw22ITO09fCJL1Pplkpm9OiQrudUEooDPJmAHROg9IcqFZmSRiKRf13AkAxKgYZ
	 TeMZH65ht1jxg==
Date: Thu, 17 Mar 2022 15:24:59 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
cc: xen-devel@lists.xenproject.org, sstabellini@kernel.org, 
    stefanos@xilinx.com, julien@xen.org, Volodymyr_Babchuk@epam.com, 
    bertrand.marquis@arm.com, andrew.cooper3@citrix.com, 
    george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org, 
    roger.pau@citrix.com, Ayan Kumar Halder <ayankuma@xilinx.com>
Subject: Re: [PATCH v11 1/3] xen/arm64: io: Emulate instructions (with invalid
 ISS) on MMIO region
In-Reply-To: <20220317140046.64563-2-ayankuma@xilinx.com>
Message-ID: <alpine.DEB.2.22.394.2203171523310.3497@ubuntu-linux-20-04-desktop>
References: <20220317140046.64563-1-ayankuma@xilinx.com> <20220317140046.64563-2-ayankuma@xilinx.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Thu, 17 Mar 2022, Ayan Kumar Halder wrote:
> When an instruction is trapped in Xen due to translation fault, Xen
> checks if the ISS is invalid (for data abort) or it is an instruction
> abort. If so, Xen tries to resolve the translation fault using p2m page
> tables. In case of data abort, Xen will try to map the mmio region to
> the guest (ie tries to emulate the mmio region).
> 
> If the ISS is not valid and it is a data abort, then Xen tries to
> decode the instruction. In case of ioreq, Xen  saves the decoding state,
> rn and imm9 to vcpu_io. Whenever the vcpu handles the ioreq successfully,
> it will read the decoding state to determine if the instruction decoded
> was a ldr/str post indexing (ie INSTR_LDR_STR_POSTINDEXING). If so, it
> uses these details to post increment rn.
> 
> In case of mmio handler, if the mmio operation was successful, then Xen
> retrives the decoding state, rn and imm9. For state ==
> INSTR_LDR_STR_POSTINDEXING, Xen will update rn.
> 
> If there is an error encountered while decoding/executing the instruction,
> Xen will forward the abort to the guest.
> 
> Also, the logic to infer the type of instruction has been moved from
> try_handle_mmio() to try_decode_instruction() which is called before.
> try_handle_mmio() is solely responsible for handling the mmio operation.
> 
> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>

I managed to reproduce (on QEMU emulating a cortex-a15, see recent patch
series for automation) the original crash. And I also tested that this
version of the patch doesn't have the same issue. Now it works, so:

Tested-by: Stefano Stabellini <sstabellini@kernel.org>
Reviewed-by: Stefano Stabellini <sstabellini@kernel.org>


> ---
> 
> Changelog :-
> 
> v2..v5 - Mentioned in the cover letter.
> 
> v6 - 1. Mantained the decoding state of the instruction. This is used by the
> caller to either abort the guest or retry or ignore or perform read/write on
> the mmio region.
> 
> 2. try_decode() invokes decoding for both aarch64 and thumb state. (Previously
> it used to invoke decoding only for aarch64 state). Thus, it handles all the
> checking of the registers before invoking any decoding of instruction.
> try_decode_instruction_invalid_iss() has thus been removed.
> 
> 3. Introduced a new field('enum instr_decode_state state') inside
> 'struct instr_details'. This holds the decoding state of the instruction.
> This is later read by the post_increment_register() to determine if rn needs to
> be incremented. Also, this is read by the callers of try_decode_instruction()
> to determine if the instruction was valid or ignored or to be retried or
> error or decoded successfully.
> 
> 4. Also stored 'instr_details' inside 'struct ioreq'. This enables
> arch_ioreq_complete_mmio() to invoke post_increment_register() without decoding
> the instruction again.
> 
> 5. Check hsr.dabt.valid in do_trap_stage2_abort_guest(). If it is not valid,
> then decode the instruction. This ensures that try_handle_mmio() is invoked only
> when the instruction is either valid or decoded successfully.
> 
> 6. Inside do_trap_stage2_abort_guest(), if hsr.dabt.valid is not set, then
> resolve the translation fault before trying to decode the instruction. If
> translation fault is resolved, then return to the guest to execute the instruction
> again.
> 
> 
> v7 - 1. Moved the decoding instruction details ie instr_details from 'struct ioreq'
> to 'struct vcpu_io'.
> 
> 2. The instruction is decoded only when we get a data abort.
> 
> 3. Replaced ASSERT_UNREACHABLE() with domain_crash(). The reason being asserts
> can be disabled in some builds. In this scenario when the guest's cpsr is in an
> erroneous state, Xen should crash the guest.
> 
> 4. Introduced check_p2m() which invokes p2m_resolve_translation_fault() and
> try_map_mmio() to resolve translation fault by configuring the page tables. This
> gets invoked first if ISS is invalid and it is an instruction abort. If it is
> a data abort and hsr.dabt.s1ptw is set or try_handle_mmio() returns IO_UNHANDLED,
> then check_p2m() gets invoked again.
> 
> 
> v8 - 1. Removed the handling of data abort when info->dabt.cache is set. This will
> be implemented in a subsequent patch. (Not as part of this series)
> 
> 2. When the data abort is due to access to stage 1 translation tables, Xen will
> try to fix the mapping of the page table for the corresponding address. If this
> returns an error, Xen will abort the guest. Else, it will ask the guest to retry
> the instruction.
> 
> 3. Changed v->io.info.dabt_instr from pointer to variable. The reason being that
> arch_ioreq_complete_mmio() is called from leave_hypervisor_to_guest().
> That is after do_trap_stage2_abort_guest()  has been invoked. So the original
> variable will be no longer valid.
> 
> 4. Some other style issues pointed out in v7.
> 
> 
> v9 - 1. Ensure that "Erratum 766422" is handled only when ISS is valid.
> 
> 2. Whenever Xen receives and instruction abort or data abort (with invalid ISS),
> Xen should first try to resolve the p2m translation fault or see if it it needs
> to map a MMIO region. If it succeeds, it should return to the guest to retry the
> instruction.
> 
> 3. Removed handling of "dabt.s1ptw == 1" aborts. This is addressed in patch3 as
> it is an existing bug in codebase.
> 
> 4. Various style issues pointed by Julien in v8.
> 
> 
> v10 - 1. Set 'dabt.valid=1' when the instruction is fully decoded. This is
> checked in try_handle_mmio() and try_fwd_ioserv().
> 
> 2. Various other style issues pointed in v9.
> 
> 
> v11 - 1. Renamed post_increment_register() to finalize_instr_emulation().
> 
> 2. Moved "struct arch_vcpu_io { }" from xen/arch/x86/include/asm/ioreq.h to
> xen/arch/x86/include/asm/domain.h as this is included in sched.h. This fixes the
> build break for x86.
> 
> 3. For arm32, check "( instr->state == INSTR_LDR_STR_POSTINDEXING )" before
> calling domain_crash(). This fixes the boot failure for arm32.
> 
> 4. Restricted the commit header to 80 chars.
> 
>  xen/arch/arm/arm32/traps.c        | 12 +++++
>  xen/arch/arm/arm64/traps.c        | 52 ++++++++++++++++++
>  xen/arch/arm/decode.c             |  2 +
>  xen/arch/arm/include/asm/domain.h |  4 ++
>  xen/arch/arm/include/asm/mmio.h   | 17 +++++-
>  xen/arch/arm/include/asm/traps.h  |  2 +
>  xen/arch/arm/io.c                 | 90 +++++++++++++++++++------------
>  xen/arch/arm/ioreq.c              |  8 ++-
>  xen/arch/arm/traps.c              | 77 ++++++++++++++++++++------
>  xen/arch/x86/include/asm/domain.h |  3 ++
>  xen/include/xen/sched.h           |  2 +
>  11 files changed, 215 insertions(+), 54 deletions(-)
> 
> diff --git a/xen/arch/arm/arm32/traps.c b/xen/arch/arm/arm32/traps.c
> index 9c9790a6d1..a4ce2b92d9 100644
> --- a/xen/arch/arm/arm32/traps.c
> +++ b/xen/arch/arm/arm32/traps.c
> @@ -18,9 +18,11 @@
>  
>  #include <xen/lib.h>
>  #include <xen/kernel.h>
> +#include <xen/sched.h>
>  
>  #include <public/xen.h>
>  
> +#include <asm/mmio.h>
>  #include <asm/processor.h>
>  #include <asm/traps.h>
>  
> @@ -82,6 +84,16 @@ void do_trap_data_abort(struct cpu_user_regs *regs)
>          do_unexpected_trap("Data Abort", regs);
>  }
>  
> +void finalize_instr_emulation(const struct instr_details *instr)
> +{
> +    /*
> +     * We have not implemented decoding of post indexing instructions for 32 bit.
> +     * Thus, this should be unreachable.
> +     */
> +    if ( instr->state == INSTR_LDR_STR_POSTINDEXING )
> +        domain_crash(current->domain);
> +}
> +
>  /*
>   * Local variables:
>   * mode: C
> diff --git a/xen/arch/arm/arm64/traps.c b/xen/arch/arm/arm64/traps.c
> index 9113a15c7a..3f8858acec 100644
> --- a/xen/arch/arm/arm64/traps.c
> +++ b/xen/arch/arm/arm64/traps.c
> @@ -17,6 +17,7 @@
>   */
>  
>  #include <xen/lib.h>
> +#include <xen/sched.h>
>  
>  #include <asm/hsr.h>
>  #include <asm/system.h>
> @@ -44,6 +45,57 @@ void do_bad_mode(struct cpu_user_regs *regs, int reason)
>      panic("bad mode\n");
>  }
>  
> +void finalize_instr_emulation(const struct instr_details *instr)
> +{
> +    struct cpu_user_regs *regs = guest_cpu_user_regs();
> +    register_t val = 0;
> +    uint8_t psr_mode = (regs->cpsr & PSR_MODE_MASK);
> +
> +    /* Currently, we handle only ldr/str post indexing instructions */
> +    if ( instr->state != INSTR_LDR_STR_POSTINDEXING )
> +        return;
> +
> +    /*
> +     * Handle when rn = SP
> +     * Refer ArmV8 ARM DDI 0487G.b, Page - D1-2463 "Stack pointer register
> +     * selection"
> +     * t = SP_EL0
> +     * h = SP_ELx
> +     * and M[3:0] (Page - C5-474 "When exception taken from AArch64 state:")
> +     */
> +    if ( instr->rn == 31 )
> +    {
> +        switch ( psr_mode )
> +        {
> +        case PSR_MODE_EL1h:
> +            val = regs->sp_el1;
> +            break;
> +        case PSR_MODE_EL1t:
> +        case PSR_MODE_EL0t:
> +            val = regs->sp_el0;
> +            break;
> +
> +        default:
> +            domain_crash(current->domain);
> +            return;
> +        }
> +    }
> +    else
> +        val = get_user_reg(regs, instr->rn);
> +
> +    val += instr->imm9;
> +
> +    if ( instr->rn == 31 )
> +    {
> +        if ( (regs->cpsr & PSR_MODE_MASK) == PSR_MODE_EL1h )
> +            regs->sp_el1 = val;
> +        else
> +            regs->sp_el0 = val;
> +    }
> +    else
> +        set_user_reg(regs, instr->rn, val);
> +}
> +
>  /*
>   * Local variables:
>   * mode: C
> diff --git a/xen/arch/arm/decode.c b/xen/arch/arm/decode.c
> index 3add87e83a..f5f6562600 100644
> --- a/xen/arch/arm/decode.c
> +++ b/xen/arch/arm/decode.c
> @@ -146,8 +146,10 @@ static int decode_arm64(register_t pc, mmio_info_t *info)
>  
>      update_dabt(dabt, opcode.ldr_str.rt, opcode.ldr_str.size, false);
>  
> +    dabt_instr->state = INSTR_LDR_STR_POSTINDEXING;
>      dabt_instr->rn = opcode.ldr_str.rn;
>      dabt_instr->imm9 = opcode.ldr_str.imm9;
> +    dabt->valid = 1;
>  
>      return 0;
>  
> diff --git a/xen/arch/arm/include/asm/domain.h b/xen/arch/arm/include/asm/domain.h
> index c56f6e4398..ed63c2b6f9 100644
> --- a/xen/arch/arm/include/asm/domain.h
> +++ b/xen/arch/arm/include/asm/domain.h
> @@ -281,6 +281,10 @@ static inline void arch_vcpu_block(struct vcpu *v) {}
>  /* vPCI is not available on Arm */
>  #define has_vpci(d)    ({ (void)(d); false; })
>  
> +struct arch_vcpu_io {
> +    struct instr_details dabt_instr; /* when the instruction is decoded */
> +};
> +
>  #endif /* __ASM_DOMAIN_H__ */
>  
>  /*
> diff --git a/xen/arch/arm/include/asm/mmio.h b/xen/arch/arm/include/asm/mmio.h
> index 3354d9c635..ca259a79c2 100644
> --- a/xen/arch/arm/include/asm/mmio.h
> +++ b/xen/arch/arm/include/asm/mmio.h
> @@ -26,12 +26,24 @@
>  
>  #define MAX_IO_HANDLER  16
>  
> +enum instr_decode_state
> +{
> +    INSTR_ERROR,                    /* Error encountered while decoding instr */
> +    INSTR_VALID,                    /* ISS is valid, so no need to decode */
> +    /*
> +     * Instruction is decoded successfully. It is a ldr/str post indexing
> +     * instruction.
> +     */
> +    INSTR_LDR_STR_POSTINDEXING,
> +};
> +
>  typedef struct
>  {
>      struct hsr_dabt dabt;
>      struct instr_details {
>          unsigned long rn:5;
>          signed int imm9:9;
> +        enum instr_decode_state state;
>      } dabt_instr;
>      paddr_t gpa;
>  } mmio_info_t;
> @@ -69,14 +81,15 @@ struct vmmio {
>  };
>  
>  enum io_state try_handle_mmio(struct cpu_user_regs *regs,
> -                              const union hsr hsr,
> -                              paddr_t gpa);
> +                              mmio_info_t *info);
>  void register_mmio_handler(struct domain *d,
>                             const struct mmio_handler_ops *ops,
>                             paddr_t addr, paddr_t size, void *priv);
>  int domain_io_init(struct domain *d, int max_count);
>  void domain_io_free(struct domain *d);
>  
> +void try_decode_instruction(const struct cpu_user_regs *regs,
> +                            mmio_info_t *info);
>  
>  #endif  /* __ASM_ARM_MMIO_H__ */
>  
> diff --git a/xen/arch/arm/include/asm/traps.h b/xen/arch/arm/include/asm/traps.h
> index 2ed2b85c6f..08bc0b484c 100644
> --- a/xen/arch/arm/include/asm/traps.h
> +++ b/xen/arch/arm/include/asm/traps.h
> @@ -109,6 +109,8 @@ static inline register_t sign_extend(const struct hsr_dabt dabt, register_t r)
>      return r;
>  }
>  
> +void finalize_instr_emulation(const struct instr_details *instr);
> +
>  #endif /* __ASM_ARM_TRAPS__ */
>  /*
>   * Local variables:
> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
> index fad103bdbd..fd903b7b03 100644
> --- a/xen/arch/arm/io.c
> +++ b/xen/arch/arm/io.c
> @@ -102,57 +102,79 @@ static const struct mmio_handler *find_mmio_handler(struct domain *d,
>      return handler;
>  }
>  
> +void try_decode_instruction(const struct cpu_user_regs *regs,
> +                            mmio_info_t *info)
> +{
> +    int rc;
> +
> +    if ( info->dabt.valid )
> +    {
> +        info->dabt_instr.state = INSTR_VALID;
> +
> +        /*
> +         * Erratum 766422: Thumb store translation fault to Hypervisor may
> +         * not have correct HSR Rt value.
> +         */
> +        if ( check_workaround_766422() && (regs->cpsr & PSR_THUMB) &&
> +             info->dabt.write )
> +        {
> +            rc = decode_instruction(regs, info);
> +            if ( rc )
> +            {
> +                gprintk(XENLOG_DEBUG, "Unable to decode instruction\n");
> +                info->dabt_instr.state = INSTR_ERROR;
> +            }
> +        }
> +        return;
> +    }
> +
> +    /*
> +     * Armv8 processor does not provide a valid syndrome for decoding some
> +     * instructions. So in order to process these instructions, Xen must
> +     * decode them.
> +     */
> +    rc = decode_instruction(regs, info);
> +    if ( rc )
> +    {
> +        gprintk(XENLOG_ERR, "Unable to decode instruction\n");
> +        info->dabt_instr.state = INSTR_ERROR;
> +    }
> +}
> +
>  enum io_state try_handle_mmio(struct cpu_user_regs *regs,
> -                              const union hsr hsr,
> -                              paddr_t gpa)
> +                              mmio_info_t *info)
>  {
>      struct vcpu *v = current;
>      const struct mmio_handler *handler = NULL;
> -    const struct hsr_dabt dabt = hsr.dabt;
> -    mmio_info_t info = {
> -        .gpa = gpa,
> -        .dabt = dabt
> -    };
> +    int rc;
>  
> -    ASSERT(hsr.ec == HSR_EC_DATA_ABORT_LOWER_EL);
> +    ASSERT(info->dabt.ec == HSR_EC_DATA_ABORT_LOWER_EL);
>  
> -    handler = find_mmio_handler(v->domain, info.gpa);
> -    if ( !handler )
> +    if ( !info->dabt.valid )
>      {
> -        int rc;
> +        ASSERT_UNREACHABLE();
> +        return IO_ABORT;
> +    }
>  
> -        rc = try_fwd_ioserv(regs, v, &info);
> +    handler = find_mmio_handler(v->domain, info->gpa);
> +    if ( !handler )
> +    {
> +        rc = try_fwd_ioserv(regs, v, info);
>          if ( rc == IO_HANDLED )
>              return handle_ioserv(regs, v);
>  
>          return rc;
>      }
>  
> -    /* All the instructions used on emulated MMIO region should be valid */
> -    if ( !dabt.valid )
> -        return IO_ABORT;
> -
>      /*
> -     * Erratum 766422: Thumb store translation fault to Hypervisor may
> -     * not have correct HSR Rt value.
> +     * At this point, we know that the instruction is either valid or has been
> +     * decoded successfully. Thus, Xen should be allowed to execute the
> +     * instruction on the emulated MMIO region.
>       */
> -    if ( check_workaround_766422() && (regs->cpsr & PSR_THUMB) &&
> -         dabt.write )
> -    {
> -        int rc;
> -
> -        rc = decode_instruction(regs, &info);
> -        if ( rc )
> -        {
> -            gprintk(XENLOG_DEBUG, "Unable to decode instruction\n");
> -            return IO_ABORT;
> -        }
> -    }
> -
> -    if ( info.dabt.write )
> -        return handle_write(handler, v, &info);
> +    if ( info->dabt.write )
> +        return handle_write(handler, v, info);
>      else
> -        return handle_read(handler, v, &info);
> +        return handle_read(handler, v, info);
>  }
>  
>  void register_mmio_handler(struct domain *d,
> diff --git a/xen/arch/arm/ioreq.c b/xen/arch/arm/ioreq.c
> index 308650b400..54167aebcb 100644
> --- a/xen/arch/arm/ioreq.c
> +++ b/xen/arch/arm/ioreq.c
> @@ -47,6 +47,8 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
>                               struct vcpu *v, mmio_info_t *info)
>  {
>      struct vcpu_io *vio = &v->io;
> +    struct instr_details instr = info->dabt_instr;
> +    struct hsr_dabt dabt = info->dabt;
>      ioreq_t p = {
>          .type = IOREQ_TYPE_COPY,
>          .addr = info->gpa,
> @@ -76,10 +78,10 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
>      if ( !s )
>          return IO_UNHANDLED;
>  
> -    if ( !info->dabt.valid )
> -        return IO_ABORT;
> +    ASSERT(dabt.valid);
>  
>      vio->req = p;
> +    vio->info.dabt_instr = instr;
>  
>      rc = ioreq_send(s, &p, 0);
>      if ( rc != IO_RETRY || v->domain->is_shutting_down )
> @@ -95,6 +97,7 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
>  bool arch_ioreq_complete_mmio(void)
>  {
>      struct vcpu *v = current;
> +    struct instr_details dabt_instr = v->io.info.dabt_instr;
>      struct cpu_user_regs *regs = guest_cpu_user_regs();
>      const union hsr hsr = { .bits = regs->hsr };
>  
> @@ -106,6 +109,7 @@ bool arch_ioreq_complete_mmio(void)
>  
>      if ( handle_ioserv(regs, v) == IO_HANDLED )
>      {
> +        finalize_instr_emulation(&dabt_instr);
>          advance_pc(regs, hsr);
>          return true;
>      }
> diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
> index 7a1b679b8c..11f970d926 100644
> --- a/xen/arch/arm/traps.c
> +++ b/xen/arch/arm/traps.c
> @@ -1893,6 +1893,21 @@ static bool try_map_mmio(gfn_t gfn)
>      return !map_regions_p2mt(d, gfn, 1, mfn, p2m_mmio_direct_c);
>  }
>  
> +static inline bool check_p2m(bool is_data, paddr_t gpa)
> +{
> +    /*
> +     * First check if the translation fault can be resolved by the P2M subsystem.
> +     * If that's the case nothing else to do.
> +     */
> +    if ( p2m_resolve_translation_fault(current->domain , gaddr_to_gfn(gpa)) )
> +        return true;
> +
> +    if ( is_data && try_map_mmio(gaddr_to_gfn(gpa)) )
> +        return true;
> +
> +    return false;
> +}
> +
>  static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
>                                         const union hsr hsr)
>  {
> @@ -1906,6 +1921,8 @@ static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
>      paddr_t gpa;
>      uint8_t fsc = xabt.fsc & ~FSC_LL_MASK;
>      bool is_data = (hsr.ec == HSR_EC_DATA_ABORT_LOWER_EL);
> +    mmio_info_t info;
> +    enum io_state state;
>  
>      /*
>       * If this bit has been set, it means that this stage-2 abort is caused
> @@ -1959,21 +1976,52 @@ static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
>          return;
>      }
>      case FSC_FLT_TRANS:
> +    {
> +        info.gpa = gpa;
> +        info.dabt = hsr.dabt;
> +
>          /*
> -         * Attempt first to emulate the MMIO as the data abort will
> -         * likely happen in an emulated region.
> -         *
> -         * Note that emulated region cannot be executed
> +         * Assumption :- Most of the times when we get a data abort and the ISS
> +         * is invalid or an instruction abort, the underlying cause is that the
> +         * page tables have not been set up correctly.
>           */
> -        if ( is_data )
> +        if ( !is_data || !info.dabt.valid )
>          {
> -            enum io_state state = try_handle_mmio(regs, hsr, gpa);
> +            if ( check_p2m(is_data, gpa) )
> +                return;
>  
> -            switch ( state )
> -            {
> +            /*
> +             * If the instruction abort could not be resolved by setting the
> +             * appropriate bits in the translation table, then Xen should
> +             * forward the abort to the guest.
> +             */
> +            if ( !is_data )
> +                goto inject_abt;
> +        }
> +
> +        try_decode_instruction(regs, &info);
> +
> +        /*
> +         * If Xen could not decode the instruction or encountered an error
> +         * while decoding, then it should forward the abort to the guest.
> +         */
> +        if ( info.dabt_instr.state == INSTR_ERROR )
> +            goto inject_abt;
> +
> +        state = try_handle_mmio(regs, &info);
> +
> +        switch ( state )
> +        {
>              case IO_ABORT:
>                  goto inject_abt;
>              case IO_HANDLED:
> +                /*
> +                 * If the instruction was decoded and has executed successfully
> +                 * on the MMIO region, then Xen should execute the next part of
> +                 * the instruction. (for eg increment the rn if it is a
> +                 * post-indexing instruction.
> +                 */
> +                finalize_instr_emulation(&info.dabt_instr);
>                  advance_pc(regs, hsr);
>                  return;
>              case IO_RETRY:
> @@ -1982,21 +2030,18 @@ static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs,
>              case IO_UNHANDLED:
>                  /* IO unhandled, try another way to handle it. */
>                  break;
> -            }
>          }
>  
>          /*
> -         * First check if the translation fault can be resolved by the
> -         * P2M subsystem. If that's the case nothing else to do.
> +         * If the instruction syndrome was invalid, then we already checked if
> +         * this was due to a P2M fault. So no point to check again as the result
> +         * will be the same.
>           */
> -        if ( p2m_resolve_translation_fault(current->domain,
> -                                           gaddr_to_gfn(gpa)) )
> -            return;
> -
> -        if ( is_data && try_map_mmio(gaddr_to_gfn(gpa)) )
> +        if ( (info.dabt_instr.state == INSTR_VALID) && check_p2m(is_data, gpa) )
>              return;
>  
>          break;
> +    }
>      default:
>          gprintk(XENLOG_WARNING,
>                  "Unsupported FSC: HSR=%#"PRIregister" DFSC=%#x\n",
> diff --git a/xen/arch/x86/include/asm/domain.h b/xen/arch/x86/include/asm/domain.h
> index e62e109598..35898d725f 100644
> --- a/xen/arch/x86/include/asm/domain.h
> +++ b/xen/arch/x86/include/asm/domain.h
> @@ -756,6 +756,9 @@ static inline void pv_inject_sw_interrupt(unsigned int vector)
>                        : is_pv_32bit_domain(d) ? PV32_VM_ASSIST_MASK \
>                                                : PV64_VM_ASSIST_MASK)
>  
> +struct arch_vcpu_io {
> +};
> +
>  #endif /* __ASM_DOMAIN_H__ */
>  
>  /*
> diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
> index 10ea969c7a..406d9bc610 100644
> --- a/xen/include/xen/sched.h
> +++ b/xen/include/xen/sched.h
> @@ -160,6 +160,8 @@ struct vcpu_io {
>      /* I/O request in flight to device model. */
>      enum vio_completion  completion;
>      ioreq_t              req;
> +    /* Arch specific info pertaining to the io request */
> +    struct arch_vcpu_io  info;
>  };
>  
>  struct vcpu
> -- 
> 2.17.1
> 
> 


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 22:28:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 22:28:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291779.495480 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUybC-00054Z-NF; Thu, 17 Mar 2022 22:28:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291779.495480; Thu, 17 Mar 2022 22:28:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUybC-00054S-KJ; Thu, 17 Mar 2022 22:28:02 +0000
Received: by outflank-mailman (input) for mailman id 291779;
 Thu, 17 Mar 2022 22:28:02 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=MbXJ=T4=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nUybC-00054M-8B
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 22:28:02 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 80590ed6-a641-11ec-8eba-a37418f5ba1a;
 Thu, 17 Mar 2022 23:28:00 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 55EEC61926;
 Thu, 17 Mar 2022 22:27:59 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 18305C340E9;
 Thu, 17 Mar 2022 22:27:58 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 80590ed6-a641-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647556078;
	bh=15uDO03PZ3myBwJXcfVNIG8brzvrnbGmMvvemI6oStw=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=ZT/D7qWp4Cutxk+6c1+VQJy8Qdf3S+TDR00DJ+txVD472jyc6upUATdDBpc4KS5fQ
	 iKeG4/bBHDQix4iS+tAR3Kz6Y+LfZ5B4a1piBaibCfNDg5ji48ToT8+sGOEw+6gqgX
	 k9b49CfJQ5KVCMQDEMyY5XckEWceWT2jYTf41abTECH47fuqFUpQaVooN5rQ3opoCD
	 sS03cMjQ71gaT54fO7VUHpxgd9tCUi+89YGLlgKnESWjgsnYXmgr9xPiFLpRMuC1pO
	 E4FF44Ahd7AbvSDsgEGYNfi+ixsecXrr95qDTHVhFdagVyg1r0/kKYovatpEgB4WAk
	 9jww1plFeqfWw==
Date: Thu, 17 Mar 2022 15:27:56 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
cc: xen-devel@lists.xenproject.org, sstabellini@kernel.org, 
    stefanos@xilinx.com, julien@xen.org, Volodymyr_Babchuk@epam.com, 
    bertrand.marquis@arm.com, andrew.cooper3@citrix.com, 
    george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org, 
    roger.pau@citrix.com, Ayan Kumar Halder <ayankuma@xilinx.com>
Subject: Re: [PATCH v11 2/3] xen/arm64: io: Handle the abort due to access
 to stage1 translation table
In-Reply-To: <20220317140046.64563-3-ayankuma@xilinx.com>
Message-ID: <alpine.DEB.2.22.394.2203171527290.3497@ubuntu-linux-20-04-desktop>
References: <20220317140046.64563-1-ayankuma@xilinx.com> <20220317140046.64563-3-ayankuma@xilinx.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Thu, 17 Mar 2022, Ayan Kumar Halder wrote:
> If the abort was caused due to access to stage1 translation table, Xen
> will try to set the p2m entry (assuming that the Stage 1 translation
> table is in a non MMIO region).
> If there is no such entry found, then Xen will try to map the address as
> a MMIO region (assuming that the Stage 1 translation table is in a
> direct MMIO region).
> 
> If that fails as well, then there are the two following scenarios:-
> 1. Stage 1 translation table being in an emulated MMIO region - Xen
> can read the region, but it has no way to return the value read to the
> CPU page table walker (which tries to go through the stage1 tables to
> resolve the translation fault).
> 
> 2. Stage 1 translation table address is invalid.
> 
> In both the above scenarios, Xen will forward the abort to the guest.
> 
> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>

Tested-by: Stefano Stabellini <sstabellini@kernel.org>
Reviewed-by: Stefano Stabellini <sstabellini@kernel.org>


> ---
> 
> Changelog :-
> 
> v1..v8 - NA
> 
> v9 - 1. Extracted this change from "[XEN v8 2/2] xen/arm64: io: Support
> instructions (for which ISS is not..." into a separate patch of its own.
> The reason being this is an existing bug in the codebase.
> 
> v10 - 1. Enabled checking for stage1 translation table address in the
> MMIO region. The reason being Arm Arm does not have any restrictions.
> 2. Updated the commit message to explain all the possible scenarios.
> 
> v11 - 1. Fixed some wordings in comments and commit message (pointed
> by Julien in v10).
> 
>  xen/arch/arm/io.c | 11 +++++++++++
>  1 file changed, 11 insertions(+)
> 
> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
> index fd903b7b03..6f458ee7fd 100644
> --- a/xen/arch/arm/io.c
> +++ b/xen/arch/arm/io.c
> @@ -128,6 +128,17 @@ void try_decode_instruction(const struct cpu_user_regs *regs,
>          return;
>      }
>  
> +    /*
> +     * At this point, we know that the stage1 translation table is either in an
> +     * emulated MMIO region or its address is invalid . This is not expected by
> +     * Xen and thus it forwards the abort to the guest.
> +     */
> +    if ( info->dabt.s1ptw )
> +    {
> +        info->dabt_instr.state = INSTR_ERROR;
> +        return;
> +    }
> +
>      /*
>       * Armv8 processor does not provide a valid syndrome for decoding some
>       * instructions. So in order to process these instructions, Xen must
> -- 
> 2.17.1
> 
> 


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 22:33:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 22:33:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291782.495492 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUyg8-0006SE-9u; Thu, 17 Mar 2022 22:33:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291782.495492; Thu, 17 Mar 2022 22:33:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUyg8-0006S7-6x; Thu, 17 Mar 2022 22:33:08 +0000
Received: by outflank-mailman (input) for mailman id 291782;
 Thu, 17 Mar 2022 22:33:07 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=MbXJ=T4=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nUyg7-0006S1-Im
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 22:33:07 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 36a75ced-a642-11ec-853c-5f4723681683;
 Thu, 17 Mar 2022 23:33:06 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 2C13C60A69;
 Thu, 17 Mar 2022 22:33:05 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id F1AEDC340E9;
 Thu, 17 Mar 2022 22:33:03 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 36a75ced-a642-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647556384;
	bh=iMUKvDmAekaOokQPpgVIlZuMfZgSOS8Wf2NtIclVUJ4=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=ANzo5b43NRbTYze+e2pDucfAnrZz6RPBfdTI3SCIQOVMn9bbKAmpZbv1BtOl+bGIb
	 /bH1l6IQjHWuS3w78DfkPU3HHxU0bqpin1LfR3BtrDCpJmPh1vmQZWQScRkjXMHJSa
	 uDUhRNsMKqaWa5rfUAj9Kq7Ia53By3jilX/e03k7Kc6WDENeey1HoWQcP6oYTLBaSg
	 6BZPaFkKCIVMmknaeAUm2ipK1z4j4sKeHGdoysDCAddh4z1JAbZX5hFCUET8JNowee
	 9NdObATwaR9LVf18FyuJqkoRQuGu9U1Ud8MS2Wf97OmbDlDixz8I/vyoNvwbwVu0W7
	 hLHpT/r8Yi4Lw==
Date: Thu, 17 Mar 2022 15:33:02 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
cc: xen-devel@lists.xenproject.org, sstabellini@kernel.org, 
    stefanos@xilinx.com, julien@xen.org, Volodymyr_Babchuk@epam.com, 
    bertrand.marquis@arm.com, andrew.cooper3@citrix.com, 
    george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org, 
    roger.pau@citrix.com, Ayan Kumar Halder <ayankuma@xilinx.com>
Subject: Re: [PATCH v11 3/3] xen/arm64: io: Handle data abort due to cache
 maintenance instructions
In-Reply-To: <20220317140046.64563-4-ayankuma@xilinx.com>
Message-ID: <alpine.DEB.2.22.394.2203171532440.3497@ubuntu-linux-20-04-desktop>
References: <20220317140046.64563-1-ayankuma@xilinx.com> <20220317140046.64563-4-ayankuma@xilinx.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Thu, 17 Mar 2022, Ayan Kumar Halder wrote:
> When the data abort is caused due to cache maintenance for an address,
> there are three scenarios:-
> 
> 1. Address belonging to a non emulated region - For this, Xen should
> set the corresponding bit in the translation table entry to valid and
> return to the guest to retry the instruction. This can happen sometimes
> as Xen need to set the translation table entry to invalid. (for eg
> 'Break-Before-Make' sequence). Xen returns to the guest to retry the
> instruction.
> 
> 2. Address belongs to an emulated region - Xen should ignore the
> instruction (ie increment the PC) and return to the guest.
> 
> 3. Address is invalid - Xen should forward the data abort to the guest.
> 
> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>

Tested-by: Stefano Stabellini <sstabellini@kernel.org>
Reviewed-by: Stefano Stabellini <sstabellini@kernel.org>


From xen-devel-bounces@lists.xenproject.org Thu Mar 17 22:44:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 17 Mar 2022 22:44:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291787.495507 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUyqo-0007xH-Bo; Thu, 17 Mar 2022 22:44:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291787.495507; Thu, 17 Mar 2022 22:44:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nUyqo-0007xA-8d; Thu, 17 Mar 2022 22:44:10 +0000
Received: by outflank-mailman (input) for mailman id 291787;
 Thu, 17 Mar 2022 22:44:09 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUyqm-0007ww-Vp; Thu, 17 Mar 2022 22:44:08 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUyqm-00050I-UD; Thu, 17 Mar 2022 22:44:08 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nUyqm-0001aD-3D; Thu, 17 Mar 2022 22:44:08 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nUyqm-0006Z1-2n; Thu, 17 Mar 2022 22:44:08 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=ZRVkGC+QXlLCSNAPyQiHZFB4Uj1Jzd65gzioJs5314M=; b=rBPUO0j4GlHxsNods22UJXB3kh
	Z/baC5REY/TW/NwmEtPRpYcxiyZfxbr3IP/VgCAYIOSQA54aRciTpM007fmpQ1rQK6mJM8mbjAwoZ
	9mOuC+0BQA+VtMREAcusDPt3y3lO3wRiwlqtm0SDI7QPYQEZhfomnW6sAqw6DspYrnu4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168659-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-upstream-4.16-testing test] 168659: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-upstream-4.16-testing:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-upstream-4.16-testing:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-upstream-4.16-testing:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-upstream-4.16-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-upstream-4.16-testing:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-upstream-4.16-testing:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-upstream-4.16-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-upstream-4.16-testing:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=107951211a8d17658e1aaa0c23a8cf29f8806ad8
X-Osstest-Versions-That:
    qemuu=29a2f95d36d2a01bcacc0f3136801b2d9197f4d7
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 17 Mar 2022 22:44:08 +0000

flight 168659 qemu-upstream-4.16-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168659/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop       fail blocked in 167686
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 167686
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 167686
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 167686
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 167686
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 167686
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 167686
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 167686
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass

version targeted for testing:
 qemuu                107951211a8d17658e1aaa0c23a8cf29f8806ad8
baseline version:
 qemuu                29a2f95d36d2a01bcacc0f3136801b2d9197f4d7

Last test of basis   167686  2022-01-13 11:40:04 Z   63 days
Testing same since   168659  2022-03-17 11:11:40 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Anthony PERARD <anthony.perard@citrix.com>
  Jason Andryuk <jandryuk@gmail.com>
  Ross Lagerwall <ross.lagerwall@citrix.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   29a2f95d36..107951211a  107951211a8d17658e1aaa0c23a8cf29f8806ad8 -> stable-4.16


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 00:25:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 00:25:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291802.495538 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV0R7-0001VD-57; Fri, 18 Mar 2022 00:25:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291802.495538; Fri, 18 Mar 2022 00:25:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV0R7-0001V6-1P; Fri, 18 Mar 2022 00:25:45 +0000
Received: by outflank-mailman (input) for mailman id 291802;
 Fri, 18 Mar 2022 00:25:43 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=kuR/=T5=nvidia.com=chaitanyak@srs-se1.protection.inumbo.net>)
 id 1nV0R5-0001V0-Gk
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 00:25:43 +0000
Received: from NAM10-DM6-obe.outbound.protection.outlook.com
 (mail-dm6nam10on2062b.outbound.protection.outlook.com
 [2a01:111:f400:7e88::62b])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f073ed1c-a651-11ec-8eba-a37418f5ba1a;
 Fri, 18 Mar 2022 01:25:41 +0100 (CET)
Received: from MW2PR12MB4667.namprd12.prod.outlook.com (2603:10b6:302:12::28)
 by BN8PR12MB3201.namprd12.prod.outlook.com (2603:10b6:408:6c::20)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Fri, 18 Mar
 2022 00:25:38 +0000
Received: from MW2PR12MB4667.namprd12.prod.outlook.com
 ([fe80::204b:bbcb:d388:64a2]) by MW2PR12MB4667.namprd12.prod.outlook.com
 ([fe80::204b:bbcb:d388:64a2%4]) with mapi id 15.20.5081.017; Fri, 18 Mar 2022
 00:25:37 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f073ed1c-a651-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=WCFw2h5snUFor7boPt029wvxAwhGMIvPjU0XVkHy1z2MfdOby+Wu/dFhh1NNxwtUVAGRKC4oYnRIYjiNjongZd1e4FTR9jMpi5ly4qOT1uGqvVYV2y+JryaWH5UKFBDLffr+iLDiWw3+SH3YbvFaZPPGRdFTF3TR4CHGNtAyyPTIevsi/3uQfg1y2c2on0XQeCHtkqF8CXE1aYBYQ5LyGqAzFHJLIjdltHPLd/hKqagdmGn3v2hh3oTm/Xu88PQME4OnKnzxU3zOzTqduzO5eIrLUxfmmuSuCXOb12uGshVelW603MGL7WWEWDrVgeYFowaipiYKQ+oy8S79+yCbPw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=PKGmbYbQmSx4Px24SmQ61FKfkVUbvVzBFa0IqeIXdyc=;
 b=FbkzdYPclkWOjtAqUqqY4Nx9F1Bml7xTWu+lS85T2rxbrPlg7tff9hEw4nxbFBTCOR5FVbTV09aeRv8n5Fu3Gq/5Y2+agBUWpvzz9IGIZz1yfuJB/nQfyK5qKBkCh9hI8P67uJxz8A0T6ZP9I3gs9S4uYniQ2Mgs/37wXAQsUEXdS6bIqWnrGhEwJYrs95wxeR/a6eJf5FELsjpH9jeO+U7ziA0Bqlh34UwGZtLwHC3fpC0FZ/fo8+Rs/hUiD9IqOIe8xn+YxNjm/MDnXh0f5G+WxETD1XYWfTcWHSqJN3PPQ0hfI1CwaM01rqd9GMW+EDZIxjjKrkexwSxMqGV6gw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=nvidia.com; dmarc=pass action=none header.from=nvidia.com;
 dkim=pass header.d=nvidia.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com;
 s=selector2;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=PKGmbYbQmSx4Px24SmQ61FKfkVUbvVzBFa0IqeIXdyc=;
 b=GD1LPI3PWb0oB44TxJKNJPdCMCYU2s7ZNC/6TlsOjtICA9pWYRycRSjRxhc7imYZCRcvdWHmd7cgWbcuCZulPyfiVQZd9Fgmv+rfb2U92UVr4ExPxxkLJsZYLJdim3r68TsxphnfZ4wacfOsi/jgV4c6fZb5xK+t4SbhOv/JTp2TfMNtg/YnklTwI/lU3IjoBecv0GBaTAi5gJ81s1m0+NzCKBvAmOLimv8GvDkHGnEqmWCsRxouy9kISvk0q5gCk0VaODq3gmKEMGK7MgdNneJLYCAEIM8EXeK7wFvYYWOAv35k8+WYqUyQXB0mq6L8X8ieq+HecBdt5dMmcUjU2A==
From: Chaitanya Kulkarni <chaitanyak@nvidia.com>
To: Colin Ian King <colin.i.king@gmail.com>,
	=?utf-8?B?Um9nZXIgUGF1IE1vbm7DqQ==?= <roger.pau@citrix.com>, Jens Axboe
	<axboe@kernel.dk>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>, "linux-block@vger.kernel.org"
	<linux-block@vger.kernel.org>
CC: "kernel-janitors@vger.kernel.org" <kernel-janitors@vger.kernel.org>,
	"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
	"llvm@lists.linux.dev" <llvm@lists.linux.dev>
Subject: Re: [PATCH] xen-blkback: remove redundant assignment to variable i
Thread-Topic: [PATCH] xen-blkback: remove redundant assignment to variable i
Thread-Index: AQHYOllPM4KVnPDwzUOWGkhkOkBQSazESJwA
Date: Fri, 18 Mar 2022 00:25:37 +0000
Message-ID: <4fc88b8e-302d-16aa-2f2d-3e31787edbf1@nvidia.com>
References: <20220317234646.78158-1-colin.i.king@gmail.com>
In-Reply-To: <20220317234646.78158-1-colin.i.king@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
 Thunderbird/78.11.0
authentication-results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=nvidia.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 86798bc4-447f-408f-c31c-08da0875d322
x-ms-traffictypediagnostic: BN8PR12MB3201:EE_
x-microsoft-antispam-prvs:
 <BN8PR12MB3201D946B783E3E4BA9189C8A3139@BN8PR12MB3201.namprd12.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info:
 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
x-forefront-antispam-report:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MW2PR12MB4667.namprd12.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(91956017)(4326008)(64756008)(8676002)(6486002)(53546011)(66446008)(66946007)(76116006)(66556008)(8936002)(66476007)(316002)(38070700005)(2906002)(110136005)(4744005)(5660300002)(31686004)(36756003)(122000001)(54906003)(38100700002)(83380400001)(186003)(2616005)(86362001)(6506007)(31696002)(71200400001)(6512007)(508600001)(129723003)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0:
 =?utf-8?B?ZDBnT3NyQTNOL0grQ2dRYWU1ZUFNV3dnNzRGMlRvQURlRXIrSmtqTTBRSFUz?=
 =?utf-8?B?TGU5WmYyNUZLL2laY1gxUTFqTElQT3NoUE8zYVVId1J0NEJkKzk3bTlsdVRs?=
 =?utf-8?B?eGRxUWtBRXdhdWNsWVR1Q1pDbkhpTjBBZ1hENHBNY2V2Z25PRDIySGdlWVo2?=
 =?utf-8?B?djFTaWRtOXUvWFdqV2xFZ254cjhOcVhaUEkzZnNqREEyV3Z3OUcwRmtYQldp?=
 =?utf-8?B?UW4wNjVMc0t0UW5ScDh3N0QzTGNITDVzSENlZGgzQlRUb1A3TTFnYWlueFFQ?=
 =?utf-8?B?U2xNa1RreFdFRmJYRThCNkN2T2UrUFRJei92ZWpPd01GWkM0MnVZQVFmY2pU?=
 =?utf-8?B?NHdqMFRSYllic2dGNDhtMlphcVhxTXFXb0RacFhnUk12ZnBTemQrQzRucnNH?=
 =?utf-8?B?SUh2Y0FTbE40SW1nUG1vdVBmelBoY29oVm1HZVkreXdiaVpZZGVHYTNUdEJ1?=
 =?utf-8?B?ck92dDVnZHNnT0dkRWxoay9Yam9DemtWdi9JTVdJZkZ5aFhMSlZsUldBbmJ0?=
 =?utf-8?B?eE81TmpzVFBSbHk5R28yek1nRkpNTmZrU1NVancrVS80aWtTbm91eWVEaWhT?=
 =?utf-8?B?R3hBRlNTVkxuTmRSZlRobFdpVk5uUGt2QU5id1BrV3d5a1J5Z3l1OUxjTk1L?=
 =?utf-8?B?aHQ0b1BSM2dqQnp2WWI3TERaekpNY3VsTDFYcVhwUTVGWXlQbjJPU29nRnNn?=
 =?utf-8?B?a3FhVitHbG83UHFsdjF1ME5SK3RtUUJlb3hEQmdxbk9tTG5EK0dOcG1nYVZV?=
 =?utf-8?B?YWJOeE1UcDhaUHorQkRQbUtzMFJNTkFjUVlXendXUzcvVkdsOGpDNXk2RFJN?=
 =?utf-8?B?N0JZc0h6djV5RVZzN01rTTRnL040M3F3ZU01M044eFFFQjkzTjdnbHpwQUtX?=
 =?utf-8?B?VTVXcmxiWjl5MnV4MlJoK0krYi91ZFZhODhrWFlraGVQMzFBc255TmxucmlE?=
 =?utf-8?B?V3RDeXNta3hNeks3M1ZUSFZOL1MrSTB5cEozV2dlN3R0K3J2MkJRZ2J0UDAr?=
 =?utf-8?B?eWxuQ3phVUk1enVKMzFIKzRpYXZNNUhVWWE2dTFhN0RlcUlSTnBJOVhvMzJt?=
 =?utf-8?B?UHoyb0FjS3B6dlVFMEdTNVEzM2xWSzFqQ0RML3V3UXJjY2J2VGFXMzl3dzgy?=
 =?utf-8?B?WHpVSVJhVzlmSllyeGJneW10WDZ0WWFscUhZakNhejl6bE5od0pVM3FaYXV6?=
 =?utf-8?B?VmNVVEVkM05JcFpRNVFHdGFMYmxlQVRPbWJWYVc4ZWh2Nk5iRzZlT3J0VWJW?=
 =?utf-8?B?WmdkSTFhd2lGR3RpeDd4Y0h0SXY1bUxZamZQRy83YkZGM1hTek9MT3VEMElu?=
 =?utf-8?B?TytKMVpEOENiRkZaZzhRVGNOOVJRZlMrczk5azJKOVd2K0cydlJyYVd6VzMv?=
 =?utf-8?B?WDRDUlQ0QytJa1BxTmlZbnJJaEptTHd5ai9JMEFETkh3dE9FSFhuT2dneDhU?=
 =?utf-8?B?Nk1HbU9LakZjMXU3amVaZE5XTzIxSWFUZzNGYnJxbVRrVjc1M0k4NTVtVmh6?=
 =?utf-8?B?dHR1dlppR1FlZnUxdGhiU2VDNVlNN0hoWGZLcXpQOVd1cDR4NVhxU3Nrdkp1?=
 =?utf-8?B?d1ZZUm15SkJJOENlVVpOaUQ0cUl3S0EyZ0lHR1VBY255cG1xWFdRL2NZTmxj?=
 =?utf-8?B?bHdPdk05VlFrZ3dySDZwNERWTFgrTzQ2NFQxK1MxWXRGVnM5YU1hcVNoWE04?=
 =?utf-8?B?eGtzVFVtMlZxSVJteUpvNzJvNHlXbDlMNVhQSjdXS2JUM2xad2dRcjhWOUZw?=
 =?utf-8?B?WXBYeGpqVG5XNkwxTDVoamlUMkN3ZWdGVGd4R0JKbEhJT3BGdWRWQ0l5djFl?=
 =?utf-8?B?TVFWRjEvSkNoL0tPU1lCVlJTaXB1M09pUyt5encwNkJGN2kxUjcrbWhOL3FX?=
 =?utf-8?B?MkhRYlRjNXpseUsrWUttQWV2clNhRFNVMUdlbFBFTjFOVWRaREUyRm1LSTNJ?=
 =?utf-8?B?K3FOTzBDK2pzcjJGQ091bzU0TEpZWjliODhKVGlDV0cxV0FzWUFXVFBkQ0JG?=
 =?utf-8?B?aFlxbWZ4ejZ3PT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <39E414D16177E043AA5A8671299F4A79@namprd12.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: Nvidia.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MW2PR12MB4667.namprd12.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 86798bc4-447f-408f-c31c-08da0875d322
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Mar 2022 00:25:37.2031
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 43083d15-7273-40c1-b7db-39efd9ccc17a
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: WP9UnmogmyOOb512wuLGuh7+8KkiMwOLxkMzQ2VWmFOXbz0lVCKw6gWjJD5ECosgD2vBXX81tJ3MKp/B9LTOBQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN8PR12MB3201
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From xen-devel-bounces@lists.xenproject.org Fri Mar 18 00:27:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 00:27:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291807.495548 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV0Ss-00027j-Jl; Fri, 18 Mar 2022 00:27:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291807.495548; Fri, 18 Mar 2022 00:27:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV0Ss-00027c-Gn; Fri, 18 Mar 2022 00:27:34 +0000
Received: by outflank-mailman (input) for mailman id 291807;
 Fri, 18 Mar 2022 00:27:33 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=kuR/=T5=nvidia.com=chaitanyak@srs-se1.protection.inumbo.net>)
 id 1nV0Sr-00027W-F8
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 00:27:33 +0000
Received: from NAM12-MW2-obe.outbound.protection.outlook.com
 (mail-mw2nam12on20610.outbound.protection.outlook.com
 [2a01:111:f400:fe5a::610])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 3265dc0b-a652-11ec-8eba-a37418f5ba1a;
 Fri, 18 Mar 2022 01:27:32 +0100 (CET)
Received: from MW2PR12MB4667.namprd12.prod.outlook.com (2603:10b6:302:12::28)
 by BN8PR12MB3201.namprd12.prod.outlook.com (2603:10b6:408:6c::20)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Fri, 18 Mar
 2022 00:27:28 +0000
Received: from MW2PR12MB4667.namprd12.prod.outlook.com
 ([fe80::204b:bbcb:d388:64a2]) by MW2PR12MB4667.namprd12.prod.outlook.com
 ([fe80::204b:bbcb:d388:64a2%4]) with mapi id 15.20.5081.017; Fri, 18 Mar 2022
 00:27:28 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3265dc0b-a652-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=dsJSrOypbWp8qEOFgDTRpoCgeUAzg/oRoN4GJyk9mtvLY+qQ8rvqecZJdnLNhd4t8t59wG0B1uoxNRzkwNtTXE8L+SUYqqH5L19RF4y7J5CmVPDErOSFedrR4RzoUESkE0qp4RYeH7g/+19VmBsqYDmhyM5yITCjwKDmj12mzZucdH8FZuxmvc/lKbEyJKs/N5dJWDbmY23Vk5s9Gpn7/5TrKOQW7/A/ShkylDVgBLq8kYNheD85JzlmP8vcgDZa1iIb2VGGm4mpzF9y5MX9L9uQn3gWVqjJeFGnKgcBDFU7d9vQFdQb12I7TiOKSFpkdd0VAc0yfeyfHXjWiAybEA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=n123T5h6GqzHcS9GsbX/BUuszFbiVFcJiRKA9G3Mzew=;
 b=ddUVf68BUFwr3jYRmaDJAHgzf/oeL8AT+HGtFN+OucPluKX0UiI1TMDA88yC9buzSFbcI9/dzGc0dyNIbacflcJB8zErBSYd026dP83n5cRom4jLA45QfGCmpedNkaUrr1dAl+TkJKusNZpHernaFB5h0uyXRXTkNLWN3d3/PnRK+VHwyDysy1jRi22jfNCv7VCUhDYjWkaA1RcdzcmvQto/8pxdoD+DG1WUwcP87hA2fWtkwDx/I8cpWzwkRkpPpTvu1mA1RD7amjBXlNoWqQ0OIx+W3sYhzSmNdNe5R+IYpWtnQs//J0kaHnBq2aBgWVzTizSAMRZ8Q8nyx3ItXg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=nvidia.com; dmarc=pass action=none header.from=nvidia.com;
 dkim=pass header.d=nvidia.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com;
 s=selector2;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=n123T5h6GqzHcS9GsbX/BUuszFbiVFcJiRKA9G3Mzew=;
 b=UHvxBuqLoZo5rWUi2zDRpqBYRDAZDa47ES39GoAOAoid3MtDk9UkIX1Iee15DNnUdFfKxkMl95QtLe1aSvkZwi6x/bre1fWxBQmxuyAsrH/ZAmZGN5v0zqxBlYSKDQmepd91k09SmnRO5P9nq475amPbyF+XsgQ6YYmN96fttGpNwZi/qFBOmxkB86sgUA60KW/32zdKy47+dzbtwGfdcPhrzTMK8UbL8A2BPrKxdAnvCr4OrfshhTQdmDDySj4GD3TRbbuMoTo+fFTQ6vuARJghpqp6OYtpYFAesuEj+LCOgsO995xAJDnDhCMz67mfvQw6tPGDYoXgaM6Ye2pBmg==
From: Chaitanya Kulkarni <chaitanyak@nvidia.com>
To: Dongli Zhang <dongli.zhang@oracle.com>, "linux-block@vger.kernel.org"
	<linux-block@vger.kernel.org>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: "boris.ostrovsky@oracle.com" <boris.ostrovsky@oracle.com>,
	"jgross@suse.com" <jgross@suse.com>, "sstabellini@kernel.org"
	<sstabellini@kernel.org>, "roger.pau@citrix.com" <roger.pau@citrix.com>,
	"axboe@kernel.dk" <axboe@kernel.dk>, "linux-kernel@vger.kernel.org"
	<linux-kernel@vger.kernel.org>
Subject: Re: [PATCH 1/1] xen/blkfront: fix comment for need_copy
Thread-Topic: [PATCH 1/1] xen/blkfront: fix comment for need_copy
Thread-Index: AQHYOkvDA9JzRaegSkiE+wRtHI7puKzESPcA
Date: Fri, 18 Mar 2022 00:27:28 +0000
Message-ID: <4e5a802d-563b-1d53-5563-c9ed2582b826@nvidia.com>
References: <20220317220930.5698-1-dongli.zhang@oracle.com>
In-Reply-To: <20220317220930.5698-1-dongli.zhang@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101
 Thunderbird/78.11.0
authentication-results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=nvidia.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 3ddbb6d4-c360-4496-13ac-08da0876155e
x-ms-traffictypediagnostic: BN8PR12MB3201:EE_
x-microsoft-antispam-prvs:
 <BN8PR12MB3201FCAC916A4192FDB6D2A5A3139@BN8PR12MB3201.namprd12.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info:
 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
x-forefront-antispam-report:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MW2PR12MB4667.namprd12.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(91956017)(4326008)(64756008)(8676002)(6486002)(53546011)(66446008)(66946007)(76116006)(66556008)(8936002)(66476007)(316002)(38070700005)(2906002)(110136005)(4744005)(5660300002)(31686004)(36756003)(122000001)(54906003)(38100700002)(83380400001)(186003)(2616005)(86362001)(6506007)(31696002)(71200400001)(6512007)(508600001)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0:
 =?utf-8?B?SFFqaUluUDdHdDBnS2pGa3RBRDR4aytCOU1id3RJa0pkL0RNUklXaFA0eHhU?=
 =?utf-8?B?Q3hmazBPclZRZGN1RS9DNHVhOGtibEozZFd5Q2hqTDNScFNDY0NzSVpTYkVD?=
 =?utf-8?B?QTJhWkxNbHpITDR3R3JsNVV3Mmx5ZGtpVVhzRllpQng2UGxWVFlYdVorSmJk?=
 =?utf-8?B?MjdRT0YwakpXTDcvNWIyUmM2cnVIOUUvMVN1eEMzZk85OWZFZ0ROcmFkdXlK?=
 =?utf-8?B?bmgwbXhuSm50RDdjRW9kK2xVQWNnWFdvZ3I0TjNvSFQyREpUOVhMYmc2eFBY?=
 =?utf-8?B?dE9zZHpmOEx1WnhQemc2MmVsNkdpVUEzQ25SUFR3cnEwSTE1cXM2VU9HTjVx?=
 =?utf-8?B?UUhpb2d3WW9IVDRiY1lRcGhFaUtDK2lYaXpWY3VtWi84QzE3N2NzRzEwK3Jx?=
 =?utf-8?B?M1UvUVFleU1KVEFBcUl4Z0lGVmJlTnRIQ3g1aGpSS29RS1gxK1BqZ3FzSmdR?=
 =?utf-8?B?VWxnZHY4eG9XTmtPaUJ6VURuMDhhYmYzbHlPSGlLcE5aeXJ6VFRmU09UN01L?=
 =?utf-8?B?QlRtV0lDR2F1WldNV05XQ05yTEh4N2ZyYkZ2MFdXaVNqMlRhcDYrQ3ZqUS9k?=
 =?utf-8?B?NFprOCtoajFSZksvSXA3WXJ5SVVzd3pXQVFJMXFzaDdBU1VUMndkb1BUR1pl?=
 =?utf-8?B?U1dpQmszdTM0SnIySE03TGZxeUZFRzY1akVHbU50bERvdjZaSE15ZlNha3BX?=
 =?utf-8?B?a0wvRHB5MzFNalB3dHR3alhsdFBkNEpZREF4UFhIVkY0b3lDYk8rdElFOFFB?=
 =?utf-8?B?T0JyT1FpS2UzNTRBeVdKMTdlRmpzNFRjb0hCc0d6QUtKQ3IrN2F0TTZVR0ti?=
 =?utf-8?B?KzROR1pnSVNXcW1WR2VndE16Z3BEclcvTjBUZFpTMlpTeEZzSmFWeVpTQkZu?=
 =?utf-8?B?WnlWblptVmNpUkViNCtjc1MrUU9uRzhBZ3RkOHpUTG5nVWVheFNQNW84Q0ty?=
 =?utf-8?B?UWZTVmRJdHlZbDRGbFFYaEkrMDdUSHV0TGh3NHFlOC9MQWxEaE9YVGhPR2J0?=
 =?utf-8?B?MVdCZmltVUZzQllkdFBXWWgrbnYrTkVuNXdqQU84Q0hHbzR1Q3JtTk5CWUJz?=
 =?utf-8?B?QVhQV2NCa3Bybit2NW1vZnd1b1ZqRkJWMXduem15ZXhJZWhXRCt2Z0h0OC84?=
 =?utf-8?B?eDI3SDJQVWVsUWNVbEdRWVZWbXdiTTBzVnU0cmJKckhoQnNyaEhQSFAwUHlN?=
 =?utf-8?B?dy95c1RYLy9sZWdLOG0xRzJld2tJb29XT1NyRU4rQUpYQnRoNm9nT0oycllZ?=
 =?utf-8?B?UWdXcHJOd2lTS2E0RWVZNm1qeHBXQW5SNks4akV6M3Y2bFlQYVZONHpXUTRw?=
 =?utf-8?B?ZWJvVERETUZIZFc4ejBrZ0pkUlR0RjU2elNDSVh1eHMzUHZEZlM2dXlwblM4?=
 =?utf-8?B?UGp5N3ZJREc2RDRZNU1XbG5VbXRhK0NXTzV6WGx4ZUkvbGF3cENnR2RubnRP?=
 =?utf-8?B?WXpqaFJRc1JZbmFFbjA0NWFGeGc1d3FHNytsUWI0dStIY3kvSXdSRWNwbW51?=
 =?utf-8?B?SExrS00wSWd5UnA1QUdaSHRXMlEwOGNERVdhUVFabGlzU2htTE94K1pQR2U2?=
 =?utf-8?B?VTZ2WGtaQ0NRTml1SDYvRSs3YnBRdWpNOHdXd3VZaDQ0NFVSem1XdU81cklW?=
 =?utf-8?B?dWRuUUI2cjhIenBkK3FMQTRVVkV3Lzh4MmtxVzhwTXlEQS94U2tzZ1FoUjY2?=
 =?utf-8?B?SVE3N2ttWVpHd2hBTmVmaFV6VEdKN095dlgrSWFsZFZha21wdUVMREZKdWVG?=
 =?utf-8?B?Z3dsYVp0YmdvVFJzcGtrQUpzaGVOaVREaXJBN3RMVXdqb3Y3WUViWnhnSmdI?=
 =?utf-8?B?Q2N4a2NOeTRlVmtLSUZ4dDdxZmNZNUMyQmM0MlhiRngzd05TMUVuY1A2MXF6?=
 =?utf-8?B?SG9FY1NPQ2RoaG8va0UvK0k1TFFDK0d6YmdDY1diQ1pid1VWVzB5cTZNbGVH?=
 =?utf-8?B?bEZEamsyc3FaTisrOXVMZCtQRXUrb2NaMFNCQUZ2eUw0dlM0dFNlMDJOYWpF?=
 =?utf-8?B?d3hyRGNEQklBPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <99630C566C512A42B0A52BB73A69F7F7@namprd12.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: Nvidia.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MW2PR12MB4667.namprd12.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3ddbb6d4-c360-4496-13ac-08da0876155e
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Mar 2022 00:27:28.3215
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 43083d15-7273-40c1-b7db-39efd9ccc17a
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: z/Qhc+pof+sIEwuGaksugiwvGtoV6rOunfDbRM7ur2r1oRPfBnLsQoyL+hjQgZGOVZwsTWNiNH0s2Kv7W5lKLA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN8PR12MB3201

T24gMy8xNy8yMiAzOjA5IFBNLCBEb25nbGkgWmhhbmcgd3JvdGU6DQo+IFRoZSAnbmVlZF9jb3B5
JyBpcyBzZXQgd2hlbiBycV9kYXRhX2RpcihyZXEpIHJldHVybnMgV1JJVEUsIGluIG9yZGVyIHRv
DQo+IGNvcHkgdGhlIHdyaXR0ZW4gZGF0YSB0byBwZXJzaXN0ZW50IHBhZ2UuDQo+IA0KPiAiLm5l
ZWRfY29weSA9IHJxX2RhdGFfZGlyKHJlcSkgJiYgaW5mby0+ZmVhdHVyZV9wZXJzaXN0ZW50LCIN
Cj4gDQo+IFNpZ25lZC1vZmYtYnk6IERvbmdsaSBaaGFuZyA8ZG9uZ2xpLnpoYW5nQG9yYWNsZS5j
b20+DQo+IC0tLQ0KDQpMb29rcyBnb29kLg0KDQpSZXZpZXdlZC1ieTogQ2hhaXRhbnlhIEt1bGth
cm5pIDxrY2hAbnZpZGlhLmNvbT4NCg0KLWNrDQoNCg0K


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 01:59:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 01:59:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291814.495570 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV1ts-0008SG-FC; Fri, 18 Mar 2022 01:59:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291814.495570; Fri, 18 Mar 2022 01:59:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV1ts-0008S4-C6; Fri, 18 Mar 2022 01:59:32 +0000
Received: by outflank-mailman (input) for mailman id 291814;
 Fri, 18 Mar 2022 01:59:30 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3xU5=T5=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nV1tq-0008RA-N8
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 01:59:30 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org
 [2604:1380:4641:c500::1])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 0a6ba6d8-a65f-11ec-853c-5f4723681683;
 Fri, 18 Mar 2022 02:59:28 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 74B536165B;
 Fri, 18 Mar 2022 01:59:26 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 4CFDDC340E9;
 Fri, 18 Mar 2022 01:59:25 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0a6ba6d8-a65f-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647568765;
	bh=D870f2akXcYYehhYxVv5esgQBHZsiBNnMan/qZLhs0Q=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=EQZmWlJepU5E+gndVRDr4LdmGLv0PeuFUHhSRaTssQKcDdrHHod40IaRq9Q4qqChh
	 2Wnn0GKNiKRQYZSNDRuDFQJXYcFUWONyXz9pBNAJfD/t8g9Ykl780FR+PPKjizxo2Y
	 ldgLl3htSlVyJ60qM5NzFDbxcXSixWG0CemNSNIYJQKWEHp+/0lO3MWKWDYRXiXkeX
	 kArFGLBsOlRjvnMhH1wMH4ZlZYr43keVjHaAIQP9BoLMkARo9XZJfCsOqctDyCVTcs
	 5FAnuZ9EXd2gyhWwFyzyEma3QPpsrI+/NT50yMFDz7el42SZqE7whN+ExQrBX0TiEK
	 vlzeacw1EjUPw==
Date: Thu, 17 Mar 2022 18:59:24 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Penny Zheng <Penny.Zheng@arm.com>
cc: xen-devel@lists.xenproject.org, nd@arm.com, 
    Penny Zheng <penzhe01@a011292.shanghai.arm.com>, 
    Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>, 
    Bertrand Marquis <bertrand.marquis@arm.com>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, 
    Andrew Cooper <andrew.cooper3@citrix.com>, 
    George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, 
    Wei Liu <wl@xen.org>
Subject: Re: [PATCH v1 02/13] xen/arm: introduce a special domain
 DOMID_SHARED
In-Reply-To: <20220311061123.1883189-3-Penny.Zheng@arm.com>
Message-ID: <alpine.DEB.2.22.394.2203171645450.3497@ubuntu-linux-20-04-desktop>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com> <20220311061123.1883189-3-Penny.Zheng@arm.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Fri, 11 Mar 2022, Penny Zheng wrote:
> From: Penny Zheng <penzhe01@a011292.shanghai.arm.com>
> 
> In case to own statically shared pages when owner domain is not
> explicitly defined, this commits propose a special domain DOMID_SHARED,
> and we assign it 0x7FF5, as one of the system domains.
> 
> Statically shared memory reuses the same way of initialization with static
> memory, hence this commits proposes a new Kconfig CONFIG_STATIC_SHM to wrap
> related codes, and this option depends on static memory(CONFIG_STATIC_MEMORY).

Why does it depend on CONFIG_STATIC_MEMORY? This is a genuine question,
I am not trying to scope-creep the series. Is there an actual technical
dependency on CONFIG_STATIC_MEMORY? If not, it would be super useful to
be able to share memory statically even between normal dom0less guests
(of course it would be responsibility of the user to provide the right
addresses and avoid mapping clashes.) I know that some of our users have
requested this feature in the past.


> We intends to do shared domain creation after setup_virt_paging so shared
> domain could successfully do p2m initialization.
> 
> Signed-off-by: Penny Zheng <penny.zheng@arm.com>
> ---
>  xen/arch/arm/Kconfig              |  7 +++++++
>  xen/arch/arm/domain.c             | 12 ++++++++++--
>  xen/arch/arm/include/asm/domain.h |  6 ++++++
>  xen/arch/arm/setup.c              | 22 ++++++++++++++++++++++
>  xen/common/domain.c               | 11 +++++++----
>  xen/common/page_alloc.c           |  5 +++++
>  xen/common/vsprintf.c             |  9 +++++----
>  xen/include/public/xen.h          |  6 ++++++
>  xen/include/xen/sched.h           |  2 ++
>  9 files changed, 70 insertions(+), 10 deletions(-)
> 
> diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig
> index ecfa6822e4..c54accefb1 100644
> --- a/xen/arch/arm/Kconfig
> +++ b/xen/arch/arm/Kconfig
> @@ -106,6 +106,13 @@ config TEE
>  
>  source "arch/arm/tee/Kconfig"
>  
> +config STATIC_SHM
> +       bool "Statically shared memory on a dom0less system" if UNSUPPORTED
> +       depends on STATIC_MEMORY
> +       default n
> +       help
> +         This option enables statically shared memory on a dom0less system.
> +
>  endmenu
>  
>  menu "ARM errata workaround via the alternative framework"
> diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
> index 8110c1df86..1ff1df5d3f 100644
> --- a/xen/arch/arm/domain.c
> +++ b/xen/arch/arm/domain.c
> @@ -44,6 +44,10 @@
>  
>  DEFINE_PER_CPU(struct vcpu *, curr_vcpu);
>  
> +#ifdef CONFIG_STATIC_SHM
> +struct domain *__read_mostly dom_shared;
> +#endif

This one should probably go to xen/common/domain.c to stay close to the
other special domains.


>  static void do_idle(void)
>  {
>      unsigned int cpu = smp_processor_id();
> @@ -703,7 +707,7 @@ int arch_domain_create(struct domain *d,
>      if ( is_idle_domain(d) )
>          return 0;
>  
> -    ASSERT(config != NULL);
> +    ASSERT(is_shared_domain(d) ? config == NULL : config != NULL);
>  
>  #ifdef CONFIG_IOREQ_SERVER
>      ioreq_domain_init(d);
> @@ -712,12 +716,16 @@ int arch_domain_create(struct domain *d,
>      d->arch.directmap = flags & CDF_directmap;
>  
>      /* p2m_init relies on some value initialized by the IOMMU subsystem */
> -    if ( (rc = iommu_domain_init(d, config->iommu_opts)) != 0 )
> +    if ( (rc = iommu_domain_init(d, is_shared_domain(d) ? 0 : config->iommu_opts)) != 0 )
>          goto fail;
>  
>      if ( (rc = p2m_init(d)) != 0 )
>          goto fail;
>  
> +    /* DOMID_shared is sufficiently constructed after p2m initialization. */
> +    if ( is_shared_domain(d) )
> +        return 0;
> +
>      rc = -ENOMEM;
>      if ( (d->shared_info = alloc_xenheap_pages(0, 0)) == NULL )
>          goto fail;
> diff --git a/xen/arch/arm/include/asm/domain.h b/xen/arch/arm/include/asm/domain.h
> index c56f6e4398..ea7a7219a3 100644
> --- a/xen/arch/arm/include/asm/domain.h
> +++ b/xen/arch/arm/include/asm/domain.h
> @@ -31,6 +31,12 @@ enum domain_type {
>  
>  #define is_domain_direct_mapped(d) (d)->arch.directmap
>  
> +#ifdef CONFIG_STATIC_SHM
> +extern struct domain *dom_shared;
> +#else
> +#define dom_shared NULL
> +#endif

I think this should probably go to xen/include/xen/mm.h to stay close to
the others (dom_xen, dom_io and dom_cow).


>  /*
>   * Is the domain using the host memory layout?
>   *
> diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c
> index d5d0792ed4..f6a3b04958 100644
> --- a/xen/arch/arm/setup.c
> +++ b/xen/arch/arm/setup.c
> @@ -855,6 +855,20 @@ static bool __init is_dom0less_mode(void)
>      return ( !dom0found && domUfound );
>  }
>  
> +#ifdef CONFIG_STATIC_SHM
> +static void __init setup_shared_domain(void)
> +{
> +    /*
> +     * Initialise our DOMID_SHARED domain.
> +     * This domain owns statically shared pages when owner domain is not
> +     * explicitly defined.
> +     */
> +    dom_shared = domain_create(DOMID_SHARED, NULL, CDF_directmap);
> +    if ( IS_ERR(dom_shared) )
> +        panic("Failed to create d[SHARED]: %ld\n", PTR_ERR(dom_shared));
> +}
> +#endif
> +
>  size_t __read_mostly dcache_line_bytes;
>  
>  /* C entry point for boot CPU */
> @@ -1022,6 +1036,14 @@ void __init start_xen(unsigned long boot_phys_offset,
>      apply_alternatives_all();
>      enable_errata_workarounds();
>  
> +#ifdef CONFIG_STATIC_SHM
> +    /*
> +     * This needs to be called **after** setup_virt_paging so shared
> +     * domains could successfully do p2m initialization.
          ^ domain

I take you are talking about DOMID_SHARED rather than any domain sharing
memory statically. Maybe it clearer if you say "so DOMID_SHARED could
successfully do p2m initialization".


> +     */
> +    setup_shared_domain();
> +#endif
> +
>      /* Create initial domain 0. */
>      if ( !is_dom0less_mode() )
>          create_dom0();
> diff --git a/xen/common/domain.c b/xen/common/domain.c
> index 3742322d22..5cdd0b9f5b 100644
> --- a/xen/common/domain.c
> +++ b/xen/common/domain.c
> @@ -643,11 +643,14 @@ struct domain *domain_create(domid_t domid,
>  
>      rangeset_domain_initialise(d);
>  
> -    /* DOMID_{XEN,IO,etc} (other than IDLE) are sufficiently constructed. */
> -    if ( is_system_domain(d) && !is_idle_domain(d) )
> +    /*
> +     * DOMID_{XEN,IO,etc} (other than IDLE and DOMID_shared) are
> +     * sufficiently constructed.
> +     */
> +    if ( is_system_domain(d) && !is_idle_domain(d) && !is_shared_domain(d) )
>          return d;
>  
> -    if ( !is_idle_domain(d) )
> +    if ( !is_idle_domain(d) && !is_shared_domain(d) )
>      {
>          if ( !is_hardware_domain(d) )
>              d->nr_pirqs = nr_static_irqs + extra_domU_irqs;
> @@ -663,7 +666,7 @@ struct domain *domain_create(domid_t domid,
>          goto fail;
>      init_status |= INIT_arch;
>  
> -    if ( !is_idle_domain(d) )
> +    if ( !is_idle_domain(d) && !is_shared_domain(d) )
>      {
>          watchdog_domain_init(d);
>          init_status |= INIT_watchdog;
> diff --git a/xen/common/page_alloc.c b/xen/common/page_alloc.c
> index f8749b0787..e5e357969d 100644
> --- a/xen/common/page_alloc.c
> +++ b/xen/common/page_alloc.c
> @@ -2616,6 +2616,11 @@ struct domain *get_pg_owner(domid_t domid)
>  
>      switch ( domid )
>      {
> +#ifdef CONFIG_STATIC_SHM
> +    case DOMID_SHARED:
> +        pg_owner = rcu_lock_domain(dom_shared);
> +        break;
> +#endif
>      case DOMID_IO:
>          pg_owner = rcu_lock_domain(dom_io);
>          break;
> diff --git a/xen/common/vsprintf.c b/xen/common/vsprintf.c
> index b278961cc3..a22854001b 100644
> --- a/xen/common/vsprintf.c
> +++ b/xen/common/vsprintf.c
> @@ -359,10 +359,11 @@ static char *print_domain(char *str, const char *end, const struct domain *d)
>  
>      switch ( d->domain_id )
>      {
> -    case DOMID_IO:   name = "[IO]";   break;
> -    case DOMID_XEN:  name = "[XEN]";  break;
> -    case DOMID_COW:  name = "[COW]";  break;
> -    case DOMID_IDLE: name = "[IDLE]"; break;
> +    case DOMID_IO:     name = "[IO]";     break;
> +    case DOMID_XEN:    name = "[XEN]";    break;
> +    case DOMID_COW:    name = "[COW]";    break;
> +    case DOMID_IDLE:   name = "[IDLE]";   break;
> +    case DOMID_SHARED: name = "[SHARED]"; break;
>          /*
>           * In principle, we could ASSERT_UNREACHABLE() in the default case.
>           * However, this path is used to print out crash information, which
> diff --git a/xen/include/public/xen.h b/xen/include/public/xen.h
> index e373592c33..2e00741f09 100644
> --- a/xen/include/public/xen.h
> +++ b/xen/include/public/xen.h
> @@ -612,6 +612,12 @@ DEFINE_XEN_GUEST_HANDLE(mmuext_op_t);
>  /* DOMID_INVALID is used to identify pages with unknown owner. */
>  #define DOMID_INVALID        xen_mk_uint(0x7FF4)
>  
> +/*
> + * DOMID_SHARED is used as the owner of statically shared pages, when
> + * owner is not explicitly defined.
> + */
> +#define DOMID_SHARED         xen_mk_uint(0x7FF5)
> +
>  /* Idle domain. */
>  #define DOMID_IDLE           xen_mk_uint(0x7FFF)
>  
> diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
> index 24a9a87f83..2fb236f4ea 100644
> --- a/xen/include/xen/sched.h
> +++ b/xen/include/xen/sched.h
> @@ -618,6 +618,8 @@ static inline bool is_system_domain(const struct domain *d)
>      return d->domain_id >= DOMID_FIRST_RESERVED;
>  }
>  
> +#define is_shared_domain(d) ((d)->domain_id == DOMID_SHARED)
> +
>  #define DOMAIN_DESTROYED (1u << 31) /* assumes atomic_t is >= 32 bits */
>  #define put_domain(_d) \
>    if ( atomic_dec_and_test(&(_d)->refcnt) ) domain_destroy(_d)
> -- 
> 2.25.1
> 


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 01:59:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 01:59:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291813.495560 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV1te-00089d-Ap; Fri, 18 Mar 2022 01:59:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291813.495560; Fri, 18 Mar 2022 01:59:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV1te-00089C-4A; Fri, 18 Mar 2022 01:59:18 +0000
Received: by outflank-mailman (input) for mailman id 291813;
 Fri, 18 Mar 2022 01:59:16 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3xU5=T5=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nV1tc-000896-BL
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 01:59:16 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 021a5cdf-a65f-11ec-8eba-a37418f5ba1a;
 Fri, 18 Mar 2022 02:59:13 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 375BC6163F;
 Fri, 18 Mar 2022 01:59:12 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 4453BC340E9;
 Fri, 18 Mar 2022 01:59:11 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 021a5cdf-a65f-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647568751;
	bh=9HVAGB5mth5mnFD0dCzJ+u6sNxIxeQFFZHql4IPwhW4=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=DnvqL/zLoQxGIKP457sZb2HRfaSZYKN5Z+0Xchx3QwGej6d3Zjrst2HOC7/Kc7W2n
	 9t50/7NSMwVKUfu2Y52I6pdTOJlTcCs1R9UWeyWbje5lTrnbVt+3FdrvEVPbRC8fSB
	 X3sXyLraFHKrS2khadB/MXAWVnLlPZ0LHgacRqRQiXQT1iiJnuVcoG9eG/0I2IyA3A
	 cGIhgZGwIe7jj2EjEemMjPYSjSEhrRntadacSYotY7iRr02bZRQUoxDNvL19XCcbSE
	 OhvrfasbUiFl6bQu5zXfeKP7aoaGFIT1ykVfzQV4KL4BI7qC9Cxn6uZUJBApKZ8eQL
	 rDCeCGttyduMA==
Date: Thu, 17 Mar 2022 18:59:10 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Penny Zheng <Penny.Zheng@arm.com>
cc: xen-devel@lists.xenproject.org, nd@arm.com, 
    Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>, 
    Bertrand Marquis <bertrand.marquis@arm.com>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH v1 01/13] xen/arm: introduce static shared memory
In-Reply-To: <20220311061123.1883189-2-Penny.Zheng@arm.com>
Message-ID: <alpine.DEB.2.22.394.2203171619250.3497@ubuntu-linux-20-04-desktop>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com> <20220311061123.1883189-2-Penny.Zheng@arm.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Fri, 11 Mar 2022, Penny Zheng wrote:
> From: Penny Zheng <penny.zheng@arm.com>
> 
> This patch serie introduces a new feature: setting up static
> shared memory on a dom0less system, through device tree configuration.
> 
> This commit parses shared memory node at boot-time, and reserve it in
> bootinfo.reserved_mem to avoid other use.
> 
> Signed-off-by: Penny Zheng <penny.zheng@arm.com>
> ---
>  docs/misc/arm/device-tree/booting.txt | 118 ++++++++++++++++++++++++++
>  xen/arch/arm/bootfdt.c                |  52 ++++++++++++
>  2 files changed, 170 insertions(+)
> 
> diff --git a/docs/misc/arm/device-tree/booting.txt b/docs/misc/arm/device-tree/booting.txt
> index a94125394e..f702ade817 100644
> --- a/docs/misc/arm/device-tree/booting.txt
> +++ b/docs/misc/arm/device-tree/booting.txt
> @@ -355,3 +355,121 @@ device-tree:
>  
>  This will reserve a 512MB region starting at the host physical address
>  0x30000000 to be exclusively used by DomU1.
> +
> +Static Shared Memory
> +=============

We ran out of = :-)


> +The static shared memory device tree nodes allow users to statically set up
> +shared memory on dom0less system, enabling domains to do shm-based
> +communication.
> +
> +- compatible
> +
> +    "xen,domain-shared-memory-v1"
> +
> +- xen,shm-id
> +
> +    An u8 value represents the unique identifier of the shared memory region.
> +    The maximum identifier shall be "xen,shm-id = <0xff>".
> +
> +- xen,shared-mem
> +
> +    An array takes a physical address, which is the base address of the
> +    shared memory region in host physical address space, a size, and a guest
> +    physical address, as the target address of the mapping.

This is good. We also need to say how to know how many cells each of the
three elements take: how many cells is the host physical address, how
many cells is the size, how many cells is the guest physical address.

This node is a subnode of a xen,domain compatible node (or chosen) which
comes with an #address-cells and a #size-cells. This is similarly to
multiboot,kernel nodes, so we could do the same. Here we could say that
the number of cells for the host address (and size) is the same as the
guest pseudo-physical address and they are inherited from the parent
node.


> +- role (Optional)
> +
> +    A string property specifying the ownership of a shared memory region,
> +    the value must be one of the following: "owner", or "borrower"
> +    A shared memory region could be explicitly backed by one domain, which is
> +    called "owner domain", and all the other domains who are also sharing
> +    this region are called "borrower domain".
> +    If not specified, the default value is "borrower" and owner is
> +    "dom_shared", a system domain.
> +
> +As an example:
> +
> +chosen {
> +    #address-cells = <0x1>;
> +    #size-cells = <0x1>;
> +    xen,xen-bootargs = "console=dtuart dtuart=serial0 bootscrub=0";
> +
> +    ......
> +
> +    /* this is for Dom0 */
> +    dom0-shared-mem@10000000 {
> +        compatible = "xen,domain-shared-memory-v1";
> +        role = "owner";
> +        xen,shm-id = <0x0>;
> +        xen,shared-mem = <0x10000000 0x10000000 0x10000000>;
> +    }
> +
> +    domU1 {
> +        compatible = "xen,domain";
> +        #address-cells = <0x1>;
> +        #size-cells = <0x1>;
> +        memory = <0 131072>;
> +        cpus = <2>;
> +        vpl011;
> +
> +        /*
> +         * shared memory region identified as 0x0(xen,shm-id = <0x0>)
> +         * is shared between Dom0 and DomU1.
> +         */
> +        domU1-shared-mem@10000000 {
> +            compatible = "xen,domain-shared-memory-v1";
> +            role = "borrower";
> +            xen,shm-id = <0x0>;
> +            xen,shared-mem = <0x10000000 0x10000000 0x50000000>;
> +        }
> +
> +        /*
> +         * shared memory region identified as 0x1(xen,shm-id = <0x1>)
> +         * is shared between DomU1 and DomU2.
> +         */
> +        domU1-shared-mem@50000000 {
> +            compatible = "xen,domain-shared-memory-v1";
> +            xen,shm-id = <0x1>;
> +            xen,shared-mem = <0x50000000 0x20000000 0x60000000>;
> +        }
> +
> +        ......
> +
> +    };
> +
> +    domU2 {
> +        compatible = "xen,domain";
> +        #address-cells = <0x1>;
> +        #size-cells = <0x1>;
> +        memory = <0 65536>;
> +        cpus = <1>;
> +
> +        /*
> +         * shared memory region identified as 0x1(xen,shm-id = <0x1>)
> +         * is shared between domU1 and domU2.
> +         */
> +        domU2-shared-mem@50000000 {
> +            compatible = "xen,domain-shared-memory-v1";
> +            xen,shm-id = <0x1>;
> +            xen,shared-mem = <0x50000000 0x20000000 0x70000000>;
> +        }
> +
> +        ......
> +    };
> +};
> +
> +This is an example with two static shared memory regions.
> +
> +For the static shared memory region identified as 0x0, host physical
> +address starting at 0x10000000 of 256MB will be reserved to be shared between
> +Dom0 and DomU1.It will get mapped at 0x10000000 in Dom0 guest physical address
                 ^ " "

> +space, and at 0x50000000 in DomU1 guest physical address space. Dom0 is
> +explicitly defined as the owner domain, and DomU1 is the borrower domain.
> +
> +For the static shared memory region identified as 0x1, host physical
> +address starting at 0x50000000 of 512MB will be reserved to be shared between
> +DomU1 and DomU2. It will get mapped at 0x60000000 in DomU1 guest physical
> +address space, and at 0x70000000 in DomU2 guest physical address space. DomU1
> +and DomU2 are both the borrower domain, the owner domain is the default owner
> +domain dom_shared.
> diff --git a/xen/arch/arm/bootfdt.c b/xen/arch/arm/bootfdt.c
> index afaa0e249b..7de0f8cea9 100644
> --- a/xen/arch/arm/bootfdt.c
> +++ b/xen/arch/arm/bootfdt.c
> @@ -363,6 +363,56 @@ static int __init process_domain_node(const void *fdt, int node,
>                                     size_cells, &bootinfo.reserved_mem, true);
>  }
>  
> +static __initdata DECLARE_BITMAP(shm_mask, NR_MEM_BANKS);
> +static int __init process_shm_node(const void *fdt, int node,
> +                                   u32 address_cells, u32 size_cells)
> +{
> +    const struct fdt_property *prop;
> +    const __be32 *cell;
> +    paddr_t paddr, size;
> +    struct meminfo *mem = &bootinfo.reserved_mem;
> +    u32 id;
> +
> +    if ( address_cells < 1 || size_cells < 1 )
> +    {
> +        printk("fdt: invalid #address-cells or #size-cells for static shared memory node.\n");
> +        return -EINVAL;
> +    }
> +
> +    prop = fdt_get_property(fdt, node, "xen,shared-mem", NULL);
> +    if ( !prop )
> +        return -ENOENT;
> +
> +    id = device_tree_get_u32(fdt, node, "xen,shm-id", NR_MEM_BANKS);
> +    if ( id >= NR_MEM_BANKS )
> +        return -EINVAL;
> +
> +    /*
> +     * A shared memory region could be shared between multiple domains. We
> +     * use the shm_mask bitmask to prevent iterating over all reserved memory
> +     * regions each time.
> +     */
> +    if ( !test_bit(id, shm_mask) )
> +    {
> +        /*
> +         * xen,shared-mem = <paddr, size, gaddr>;
> +         * Memory region starting from physical address #paddr of #size shall
> +         * be mapped to guest physical address #gaddr as shared memory region.
> +         */
> +        cell = (const __be32 *)prop->data;
> +        device_tree_get_reg(&cell, address_cells, size_cells, &paddr, &size);
> +
> +        /* shared memory shall be reserved from other use. */
> +        mem->bank[mem->nr_banks].start = paddr;
> +        mem->bank[mem->nr_banks].size = size;
> +        mem->bank[mem->nr_banks].xen_domain = true;
> +        mem->nr_banks++;
> +        set_bit(id, shm_mask);
> +    }
> +    return 0;
> +}
> +
>  static int __init early_scan_node(const void *fdt,
>                                    int node, const char *name, int depth,
>                                    u32 address_cells, u32 size_cells,
> @@ -383,6 +433,8 @@ static int __init early_scan_node(const void *fdt,
>          process_chosen_node(fdt, node, name, address_cells, size_cells);
>      else if ( depth == 2 && device_tree_node_compatible(fdt, node, "xen,domain") )
>          rc = process_domain_node(fdt, node, name, address_cells, size_cells);
> +    else if ( depth <= 3 && device_tree_node_compatible(fdt, node, "xen,domain-shared-memory-v1") )
> +        rc = process_shm_node(fdt, node, address_cells, size_cells);
>  
>      if ( rc < 0 )
>          printk("fdt: node `%s': parsing failed\n", name);
> -- 
> 2.25.1
> 


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 01:59:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 01:59:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291817.495582 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV1uC-0000lJ-Ss; Fri, 18 Mar 2022 01:59:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291817.495582; Fri, 18 Mar 2022 01:59:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV1uC-0000lC-PM; Fri, 18 Mar 2022 01:59:52 +0000
Received: by outflank-mailman (input) for mailman id 291817;
 Fri, 18 Mar 2022 01:59:51 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3xU5=T5=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nV1uB-0008RA-NT
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 01:59:51 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 181dd984-a65f-11ec-853c-5f4723681683;
 Fri, 18 Mar 2022 02:59:50 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 88DB460F8B;
 Fri, 18 Mar 2022 01:59:49 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 96DC3C340E9;
 Fri, 18 Mar 2022 01:59:48 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 181dd984-a65f-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647568789;
	bh=mJZWUil0h/9svaxQ5BOZS1h+f4rD8rgHoqSEbKcIp9w=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=sKsDZ4ku/qVfgR+mCOKQG27HzRSuaxYt1e3nz62J0RW30DUcnwHcOIwZd3XHoii7X
	 jB8DU+A0t8wN1r4Q4KAMtJHgGarU+SjJHfQSZBsCiPxeb0z0hXqVYe2B/6lEZmhzpK
	 tsbB36IxF6YgztAe+Mkvg+DPLSCB8Pv4/8Er/uG7EHtwzjkiKVM4MA2LoWCWFUVNMc
	 x9ic6oX66KDF8ZyczOPQXxpt8DEObf4DKGWjVn+wH/elBJ8Fj59ekHiZMK0CZIjU91
	 jk9CvPMf28CLSbDti/gBQsQXajcdkWtt+EPW1Jfq7gRTac+Jtln2q39Q48WViQ0pY6
	 cXX2scgkH2Myg==
Date: Thu, 17 Mar 2022 18:59:47 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Penny Zheng <Penny.Zheng@arm.com>
cc: xen-devel@lists.xenproject.org, nd@arm.com, 
    Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>, 
    Bertrand Marquis <bertrand.marquis@arm.com>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH v1 03/13] xen/arm: allocate static shared memory to
 dom_shared
In-Reply-To: <20220311061123.1883189-4-Penny.Zheng@arm.com>
Message-ID: <alpine.DEB.2.22.394.2203171707200.3497@ubuntu-linux-20-04-desktop>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com> <20220311061123.1883189-4-Penny.Zheng@arm.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Fri, 11 Mar 2022, Penny Zheng wrote:
> From: Penny Zheng <penny.zheng@arm.com>
> 
> This commit introduces process_shm to cope with static shared memory in
> domain construction.
> 
> This commit only considers allocating static shared memory to dom_shared
> when owner domain is not explicitly defined in device tree, the other
> scenario will be covered in the following patches.
> 
> Static shared memory could reuse acquire_static_memory_bank() to acquire
> and allocate static memory.
> 
> Signed-off-by: Penny Zheng <penny.zheng@arm.com>
> ---
>  xen/arch/arm/domain_build.c | 116 +++++++++++++++++++++++++++++++++++-
>  1 file changed, 115 insertions(+), 1 deletion(-)
> 
> diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
> index 8be01678de..6e6349caac 100644
> --- a/xen/arch/arm/domain_build.c
> +++ b/xen/arch/arm/domain_build.c
> @@ -527,7 +527,8 @@ static mfn_t __init acquire_static_memory_bank(struct domain *d,
>      mfn_t smfn;
>      int res;
>  
> -    device_tree_get_reg(cell, addr_cells, size_cells, pbase, psize);
> +    if ( cell )
> +        device_tree_get_reg(cell, addr_cells, size_cells, pbase, psize);

Why this change?


>      ASSERT(IS_ALIGNED(*pbase, PAGE_SIZE) && IS_ALIGNED(*psize, PAGE_SIZE));
>      if ( PFN_DOWN(*psize) > UINT_MAX )
>      {
> @@ -751,6 +752,113 @@ static void __init assign_static_memory_11(struct domain *d,
>      panic("Failed to assign requested static memory for direct-map domain %pd.",
>            d);
>  }
> +
> +#ifdef CONFIG_STATIC_SHM
> +static __initdata DECLARE_BITMAP(shm_mask, NR_MEM_BANKS);
> +
> +static mfn_t __init acquire_shared_memory_bank(struct domain *d,
> +                                               u32 addr_cells, u32 size_cells,
> +                                               paddr_t *pbase, paddr_t *psize)
> +{
> +    /*
> +     * Pages of statically shared memory shall be included
> +     * in domain_tot_pages().
> +     */
> +    d->max_pages += PFN_DOWN(*psize);
> +
> +    return acquire_static_memory_bank(d, NULL, addr_cells, size_cells,
> +                                      pbase, psize);
> +
> +}
> +
> +static int __init allocate_shared_memory(struct domain *d,
> +                                         u32 addr_cells, u32 size_cells,
> +                                         paddr_t pbase, paddr_t psize,
> +                                         paddr_t gbase)
> +{
> +    mfn_t smfn;
> +    int ret = 0;
> +
> +    printk(XENLOG_INFO "Allocate static shared memory BANK %#"PRIpaddr"-%#"PRIpaddr"\n",
> +           pbase, pbase + psize);
> +
> +    smfn = acquire_shared_memory_bank(d, addr_cells, size_cells, &pbase,
> +                                      &psize);
> +    if ( mfn_eq(smfn, INVALID_MFN) )
> +        return -EINVAL;
> +
> +    ret = guest_physmap_add_pages(d, gaddr_to_gfn(gbase), smfn, PFN_DOWN(psize));
> +    if ( ret )
> +    {
> +        dprintk(XENLOG_ERR, "Failed to map shared memory to %pd.\n", d);
> +        return ret;
> +    }
> +
> +    return ret;
> +}
> +
> +static int __init process_shm(struct domain *d,
> +                              const struct dt_device_node *node)
> +{
> +    struct dt_device_node *shm_node;
> +    int ret = 0;
> +    const struct dt_property *prop;
> +    const __be32 *cells;
> +    u32 shm_id;
> +    u32 addr_cells, size_cells;
> +    paddr_t gbase, pbase, psize;
> +
> +    dt_for_each_child_node(node, shm_node)
> +    {
> +        if ( !dt_device_is_compatible(shm_node, "xen,domain-shared-memory-v1") )
> +            continue;
> +
> +        if ( !dt_property_read_u32(shm_node, "xen,shm-id", &shm_id) )
> +        {
> +            printk("Shared memory node does not provide \"xen,shm-id\" property.\n");
> +            return -ENOENT;
> +        }
> +
> +        addr_cells = dt_n_addr_cells(shm_node);
> +        size_cells = dt_n_size_cells(shm_node);
> +        prop = dt_find_property(shm_node, "xen,shared-mem", NULL);
> +        if ( !prop )
> +        {
> +            printk("Shared memory node does not provide \"xen,shared-mem\" property.\n");
> +            return -ENOENT;
> +        }
> +        cells = (const __be32 *)prop->value;
> +        /* xen,shared-mem = <pbase, psize, gbase>; */
> +        device_tree_get_reg(&cells, addr_cells, size_cells, &pbase, &psize);
> +        ASSERT(IS_ALIGNED(pbase, PAGE_SIZE) && IS_ALIGNED(psize, PAGE_SIZE));
> +        gbase = dt_read_number(cells, addr_cells);
> +
> +        /* TODO: Consider owner domain is not the default dom_shared. */
> +        /*
> +         * Per shared memory region could be shared between multiple domains.
> +         * In case re-allocating the same shared memory region, we use bitmask
> +         * shm_mask to record whether this shared memory region has ever been
> +         * allocated already.
> +         */
> +        if ( !test_bit(shm_id, shm_mask) )
> +        {
> +            /*
> +             * Allocate statically shared pages to the default dom_shared.
> +             * Set up P2M, and dom_shared is a direct-map domain,
> +             * so GFN == PFN.
> +             */
> +            ret = allocate_shared_memory(dom_shared, addr_cells, size_cells,
> +                                         pbase, psize, pbase);
                                                          ^gbase

The last parameter should be gbase instead of pbase?


Reading this patch is not clear that only the "owner" code path is
implemented here. The "borrower" code path is implemented later and
missing in this patch. I think it would be good to clarify that in the
commit message.

Under this light, allocate_shared_memory is supposed to be only called
for the owner. I think we should probably mention that in the in-code
comment too.

I don't think we need to define a second copy of shm_mask. Can we reuse
the one in bootfdt.c?

Or we could get rid of shm_mask entirely here if we check whether the
pages were already allocated in the owner p2m.


> +            if ( ret )
> +                return ret;
> +
> +            set_bit(shm_id, shm_mask);
> +        }
> +    }
> +
> +    return 0;
> +}
> +#endif /* CONFIG_STATIC_SHM */
>  #else
>  static void __init allocate_static_memory(struct domain *d,
>                                            struct kernel_info *kinfo,
> @@ -3150,6 +3258,12 @@ static int __init construct_domU(struct domain *d,
>      else
>          assign_static_memory_11(d, &kinfo, node);
>  
> +#ifdef CONFIG_STATIC_SHM
> +    rc = process_shm(d, node);
> +    if ( rc < 0 )
> +        return rc;
> +#endif
> +
>      /*
>       * Base address and irq number are needed when creating vpl011 device
>       * tree node in prepare_dtb_domU, so initialization on related variables
> -- 
> 2.25.1
> 


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 02:00:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 02:00:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291821.495593 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV1uQ-0002B7-6f; Fri, 18 Mar 2022 02:00:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291821.495593; Fri, 18 Mar 2022 02:00:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV1uQ-0002AV-11; Fri, 18 Mar 2022 02:00:06 +0000
Received: by outflank-mailman (input) for mailman id 291821;
 Fri, 18 Mar 2022 02:00:05 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3xU5=T5=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nV1uO-0000eL-R8
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 02:00:04 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org
 [2604:1380:4641:c500::1])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 1ff284df-a65f-11ec-8eba-a37418f5ba1a;
 Fri, 18 Mar 2022 03:00:03 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id ABB056164E;
 Fri, 18 Mar 2022 02:00:02 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id BFD9AC340ED;
 Fri, 18 Mar 2022 02:00:01 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1ff284df-a65f-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647568802;
	bh=nA25/a6hABX/rOZXsG2/WB5PE0E3mmmUKWVvAw21SK8=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=q+/xppMb3Di/ovB2NYPT5q5GTohOoYG2Ys/3gZNwzIK0gk5RfLt/rjSGMLEJO/Mey
	 ZZhrxROX+vqLFPuGFB1zOWNqBgnWtxigF2eYn9/1UW8UdI++J47H17cAwK1oYgnW4o
	 g4mneUUrJEbqsIrKBJvtgljlaNpYS45tkfi0Hs1KhnC5uQaZ9POQwmM9/9IKvvRiMK
	 Ja2RB8yMSd7R6cm9Aow8E83uuEkQAfwlzebfbc2tdGa20At/mOaMkQWjiLJa1rwxT8
	 9ygPoPopX9NWsztE2ArZdxXqwKRc4Rz7w7dqtSVfkirar7MVlETpBDEz6uv4dFEWW3
	 bVG1g6z7VDwoA==
Date: Thu, 17 Mar 2022 19:00:00 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Penny Zheng <Penny.Zheng@arm.com>
cc: xen-devel@lists.xenproject.org, nd@arm.com, 
    Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>, 
    Bertrand Marquis <bertrand.marquis@arm.com>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH v1 06/13] xen/arm: set up shared memory foreign mapping
 for borrower domain
In-Reply-To: <20220311061123.1883189-7-Penny.Zheng@arm.com>
Message-ID: <alpine.DEB.2.22.394.2203171744190.3497@ubuntu-linux-20-04-desktop>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com> <20220311061123.1883189-7-Penny.Zheng@arm.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Fri, 11 Mar 2022, Penny Zheng wrote:
> From: Penny Zheng <penny.zheng@arm.com>
> 
> This commits introduces a new helper guest_physmap_add_shm to set up shared
> memory foreign mapping for borrower domain.
> 
> Firstly it should get and take reference of statically shared pages from
> owner dom_shared. Then it will setup P2M foreign memory map of these statically
> shared pages for borrower domain.
> 
> This commits only considers owner domain is the default dom_shared, the
> other scenario will be covered in the following patches.
> 
> Signed-off-by: Penny Zheng <penny.zheng@arm.com>
> ---
>  xen/arch/arm/domain_build.c | 52 +++++++++++++++++++++++++++++++++++++
>  1 file changed, 52 insertions(+)
> 
> diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
> index 984e70e5fc..8cee5ffbd1 100644
> --- a/xen/arch/arm/domain_build.c
> +++ b/xen/arch/arm/domain_build.c
> @@ -798,6 +798,48 @@ static int __init allocate_shared_memory(struct domain *d,
>      return ret;
>  }
>  
> +static int __init guest_physmap_add_shm(struct domain *od, struct domain *bd,
> +                                        unsigned long o_gfn,
> +                                        unsigned long b_gfn,
> +                                        unsigned long nr_gfns)

They should probably be gfn_t type


> +{
> +    struct page_info **pages = NULL;
> +    p2m_type_t p2mt, t;
> +    int ret = 0;
> +
> +    pages = xmalloc_array(struct page_info *, nr_gfns);
> +    if ( !pages )
> +        return -ENOMEM;
> +
> +    /*
> +     * Take reference of statically shared pages from owner domain.
> +     * Reference will be released when destroying shared memory region.
> +     */
> +    ret = get_pages_from_gfn(od, o_gfn, nr_gfns, pages, &p2mt, P2M_ALLOC);
> +    if ( ret )
> +    {
> +        ret = -EINVAL;
> +        goto fail_pages;
> +    }
> +
> +    if ( p2m_is_ram(p2mt) )
> +        t = (p2mt == p2m_ram_rw) ? p2m_map_foreign_rw : p2m_map_foreign_ro;
> +    else
> +    {
> +        ret = -EINVAL;
> +        goto fail_pages;
> +    }

One idea is to initialize p2mt = p2m_ram_rw and pass it to
get_pages_from_gfn. Then get_pages_from_gfn can return error immediately
if any of the pages are of different type.

This way there is no need for checking again here.


> +    /* Set up guest foreign map. */
> +    ret = guest_physmap_add_pages(bd, _gfn(b_gfn), page_to_mfn(pages[0]),
> +                                  nr_gfns, t);
> +
> + fail_pages:
> +        xfree(pages);
> +
> +    return ret;
> +}
> +
>  static int __init process_shm(struct domain *d,
>                                const struct dt_device_node *node)
>  {
> @@ -855,6 +897,16 @@ static int __init process_shm(struct domain *d,
>  
>              set_bit(shm_id, shm_mask);
>          }
> +
> +        /*
> +         * All domains are borrower domains when owner domain is the
> +         * default dom_shared, so here we could just set up P2M foreign
> +         * mapping for borrower domain immediately.
> +         */
> +        ret = guest_physmap_add_shm(dom_shared, d, PFN_DOWN(pbase),
> +                                    PFN_DOWN(gbase), PFN_DOWN(psize));
> +        if ( ret )
> +            return ret;
>      }
>  
>      return 0;
> -- 
> 2.25.1
> 


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 02:00:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 02:00:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291825.495603 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV1uc-0002qI-DA; Fri, 18 Mar 2022 02:00:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291825.495603; Fri, 18 Mar 2022 02:00:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV1uc-0002q8-AC; Fri, 18 Mar 2022 02:00:18 +0000
Received: by outflank-mailman (input) for mailman id 291825;
 Fri, 18 Mar 2022 02:00:17 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3xU5=T5=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nV1ub-0008RA-3z
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 02:00:17 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 279cd4aa-a65f-11ec-853c-5f4723681683;
 Fri, 18 Mar 2022 03:00:16 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 5628BB820EE;
 Fri, 18 Mar 2022 02:00:15 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id B1E64C340E9;
 Fri, 18 Mar 2022 02:00:13 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 279cd4aa-a65f-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647568814;
	bh=Lnk7Z5Z75/4vwf7YjhuOVNKBvM+ByHJkRUtEx89jWCY=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=hZGJFL3FKDRKsa5uq9j6Ex9QfwAP2r4AyJYizYrmTacUuh62/lKmoCcGlw+soMhwh
	 Udm0e1Em7I/o4ORLeJveRJx/mDcGF6fnNteD9PuI0yS1Wnq4nBi4zaYBipfKaO95R+
	 0dEZA/M8vqTIiJQ7EvwXa8aBq0kLhOjx6KPsvCZl0Py6XnYoHZ8ITdOH8oXpACCFXI
	 Xs/jLpYX1jxFQW9RWJOEDiCoV2AjhkPFqysej2U8aujSu3Rw9dAD1FAt8gI7oabmbd
	 gGe9/HyFstGwd7T07b0a94K1fyL4pHcOwuAag7DutFiT1dcKPH6Nm6HUJesOBvd2D1
	 a3UWTg9GHNAZQ==
Date: Thu, 17 Mar 2022 19:00:12 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Penny Zheng <Penny.Zheng@arm.com>
cc: xen-devel@lists.xenproject.org, nd@arm.com, 
    Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>, 
    Bertrand Marquis <bertrand.marquis@arm.com>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH v1 07/13] xen/arm: create shared memory nodes in guest
 device tree
In-Reply-To: <20220311061123.1883189-8-Penny.Zheng@arm.com>
Message-ID: <alpine.DEB.2.22.394.2203171807510.3497@ubuntu-linux-20-04-desktop>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com> <20220311061123.1883189-8-Penny.Zheng@arm.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Fri, 11 Mar 2022, Penny Zheng wrote:
> From: Penny Zheng <penny.zheng@arm.com>
> 
> We expose the shared memory to the domU using the "xen,shared-memory-v1"
> reserved-memory binding. See
> Documentation/devicetree/bindings/reserved-memory/xen,shared-memory.txt
> in Linux for the corresponding device tree binding.
> 
> To save the cost of re-parsing shared memory device tree configuration when
> creating shared memory nodes in guest device tree, this commit adds new field
> "shm_mem" to store shm-info per domain.
> 
> For each shared memory region, a range is exposed under
> the /reserved-memory node as a child node. Each range sub-node is
> named xen-shmem@<address> and has the following properties:
> - compatible:
>         compatible = "xen,shared-memory-v1"
> - reg:
>         the base guest physical address and size of the shared memory region
> - xen,id:
>         a string that identifies the shared memory region.
> 
> Signed-off-by: Penny Zheng <penny.zheng@arm.com>
> ---
>  xen/arch/arm/domain_build.c       | 144 ++++++++++++++++++++++++++++++
>  xen/arch/arm/include/asm/domain.h |   1 +
>  xen/arch/arm/include/asm/setup.h  |   3 +
>  3 files changed, 148 insertions(+)
> 
> diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
> index 8cee5ffbd1..997df46ddd 100644
> --- a/xen/arch/arm/domain_build.c
> +++ b/xen/arch/arm/domain_build.c
> @@ -840,6 +840,28 @@ static int __init guest_physmap_add_shm(struct domain *od, struct domain *bd,
>      return ret;
>  }
>  
> +static int __init append_shm_bank_to_domain(struct domain *d,
> +                                            paddr_t start, paddr_t size,
> +                                            u32 shm_id)
> +{
> +    /* Allocate memory at first insertion. */
> +    if ( d->arch.shm_mem == NULL )
> +    {
> +        d->arch.shm_mem = xmalloc_bytes(sizeof(struct meminfo));
> +        if ( d->arch.shm_mem == NULL )
> +            return -ENOMEM;
> +
> +        memset(d->arch.shm_mem, 0, sizeof(struct meminfo));

_xzalloc ?


> +    }
> +
> +    d->arch.shm_mem->bank[d->arch.shm_mem->nr_banks].start = start;
> +    d->arch.shm_mem->bank[d->arch.shm_mem->nr_banks].size = size;
> +    d->arch.shm_mem->bank[d->arch.shm_mem->nr_banks].shm_id = shm_id;
> +    d->arch.shm_mem->nr_banks++;
> +
> +    return 0;
> +}
> +
>  static int __init process_shm(struct domain *d,
>                                const struct dt_device_node *node)
>  {
> @@ -907,6 +929,14 @@ static int __init process_shm(struct domain *d,
>                                      PFN_DOWN(gbase), PFN_DOWN(psize));
>          if ( ret )
>              return ret;
> +
> +        /*
> +         * Record static shared memory region info for later setting
> +         * up shm-node in guest device tree.
> +         */
> +        ret = append_shm_bank_to_domain(d, gbase, psize, shm_id);
> +        if ( ret )
> +            return ret;
>      }
>  
>      return 0;
> @@ -1237,6 +1267,115 @@ static int __init make_memory_node(const struct domain *d,
>      return res;
>  }
>  
> +#ifdef CONFIG_STATIC_SHM
> +static int __init make_shm_memory_node(const struct domain *d,
> +                                       void *fdt,
> +                                       int addrcells, int sizecells,
> +                                       struct meminfo *mem)
> +{
> +    unsigned long i = 0;
> +    int res = 0;
> +    int reg_size = addrcells + sizecells;
> +
> +    if ( mem->nr_banks == 0 )
> +        return -ENOENT;
> +
> +    /*
> +     * For each shared memory region, a range is exposed under
> +     * the /reserved-memory node as a child node. Each range sub-node is
> +     * named xen-shmem@<address>.
> +     */
> +    dt_dprintk("Create xen-shmem node\n");
> +
> +    for ( ; i < mem->nr_banks; i++ )
> +    {
> +        u64 start = mem->bank[i].start;
> +        u64 size = mem->bank[i].size;
> +        u32 shm_id = mem->bank[i].shm_id;

Wasn't shm_id supposed to be u8?


> +        /* Placeholder for xen-shmem@ + a 64-bit number + \0 */
> +        char buf[27];
> +        const char compat[] = "xen,shared-memory-v1";
> +        __be32 *reg, *cells;
> +       unsigned int len;

alignment


> +        snprintf(buf, sizeof(buf), "xen-shmem@%"PRIx64, mem->bank[i].start);
> +        res = fdt_begin_node(fdt, buf);
> +        if ( res )
> +            return res;
> +
> +        res = fdt_property(fdt, "compatible", compat, sizeof(compat));
> +        if ( res )
> +            return res;
> +
> +       len = reg_size * sizeof(__be32);

alignment


> +        reg = xmalloc_bytes(len);

This is the same size for each bank. I think it is better as a local
variable on the stack.


> +        if ( reg == NULL )
> +            return -ENOMEM;
> +        cells = reg;
> +
> +        dt_child_set_range(&cells, addrcells, sizecells, start, size);
> +
> +        res = fdt_property(fdt, "reg", reg, len);
> +        xfree(reg);
> +        if (res)
> +            return res;
> +
> +        dt_dprintk("Shared memory bank %lu: %#"PRIx64"->%#"PRIx64"\n",
> +                   i, start, start + size);
> +
> +        res = fdt_property_cell(fdt, "xen,id", shm_id);
> +        if (res)
> +            return res;
> +
> +        res = fdt_end_node(fdt);
> +        if (res)
> +            return res;
> +    }
> +
> +    return res;
> +}
> +#else
> +static int __init make_shm_memory_node(const struct domain *d,
> +                                       void *fdt,
> +                                       int addrcells, int sizecells,
> +                                       struct meminfo *mem)
> +{
> +    ASSERT_UNREACHABLE();
> +}
> +#endif
> +
> +static int __init make_resv_memory_node(const struct domain *d,
> +                                        void *fdt,
> +                                        int addrcells, int sizecells,
> +                                        struct meminfo *mem)
> +{
> +    int res = 0;
> +    /* Placeholder for reserved-memory\0 */
> +    char resvbuf[16] = "reserved-mem";

The node is called "reserved-memory", why did you initialize it to
"reserved-mem" instead?


> +    if ( mem == NULL )
> +        /* No shared memory provided. */
> +        return 0;
> +
> +    dt_dprintk("Create reserved-memory node\n");
> +
> +    res = fdt_begin_node(fdt, resvbuf);
> +    if ( res )
> +        return res;
> +
> +    res = fdt_property(fdt, "ranges", NULL, 0);
> +    if ( res )
> +        return res;

We should also add #address-cells and #size-cells properties


> +
> +    res = make_shm_memory_node(d, fdt, addrcells, sizecells, mem);
> +    if ( res )
> +        return res;
> +
> +    res = fdt_end_node(fdt);
> +
> +    return res;
> +}
> +
>  static int __init add_ext_regions(unsigned long s, unsigned long e, void *data)
>  {
>      struct meminfo *ext_regions = data;
> @@ -2974,6 +3113,11 @@ static int __init prepare_dtb_domU(struct domain *d, struct kernel_info *kinfo)
>      if ( ret )
>          goto err;
>  
> +    ret = make_resv_memory_node(d, kinfo->fdt, addrcells, sizecells,
> +                                d->arch.shm_mem);
> +    if ( ret )
> +        goto err;
> +
>      /*
>       * domain_handle_dtb_bootmodule has to be called before the rest of
>       * the device tree is generated because it depends on the value of
> diff --git a/xen/arch/arm/include/asm/domain.h b/xen/arch/arm/include/asm/domain.h
> index ea7a7219a3..6df37d2c46 100644
> --- a/xen/arch/arm/include/asm/domain.h
> +++ b/xen/arch/arm/include/asm/domain.h
> @@ -110,6 +110,7 @@ struct arch_domain
>  #endif
>  
>      bool directmap;
> +    struct meminfo *shm_mem;
>  }  __cacheline_aligned;
>  
>  struct arch_vcpu
> diff --git a/xen/arch/arm/include/asm/setup.h b/xen/arch/arm/include/asm/setup.h
> index 7a1e1d6798..b6ff04889c 100644
> --- a/xen/arch/arm/include/asm/setup.h
> +++ b/xen/arch/arm/include/asm/setup.h
> @@ -27,6 +27,9 @@ struct membank {
>      paddr_t start;
>      paddr_t size;
>      bool xen_domain; /* whether the memory bank is bound to a Xen domain. */
> +#ifdef CONFIG_STATIC_SHM
> +    u32 shm_id ;     /* ID identifier of a static shared memory bank. */
> +#endif

No need to be u32 considering that the field is u8. In any case, this is
an internal Xen header so we would use uint8_t.


>  };
>  
>  struct meminfo {
> -- 
> 2.25.1
> 


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 02:00:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 02:00:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291826.495615 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV1ul-0003Gq-Le; Fri, 18 Mar 2022 02:00:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291826.495615; Fri, 18 Mar 2022 02:00:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV1ul-0003Fe-Hn; Fri, 18 Mar 2022 02:00:27 +0000
Received: by outflank-mailman (input) for mailman id 291826;
 Fri, 18 Mar 2022 02:00:25 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3xU5=T5=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nV1uj-0000eL-KJ
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 02:00:25 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2ccaf7b5-a65f-11ec-8eba-a37418f5ba1a;
 Fri, 18 Mar 2022 03:00:24 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 54E9FB820EE;
 Fri, 18 Mar 2022 02:00:24 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id C4A78C340E9;
 Fri, 18 Mar 2022 02:00:22 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2ccaf7b5-a65f-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647568823;
	bh=tOsfkikweiXmGyE2Snc4IOxdlDo1VjsiXYnHIcQeXGM=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=eIktvNJxW0ExuzeJ9Jr32gD+fLhLuTP775141cP4q6XeSSCLaaXe3ohjEBF/ts4eg
	 XDOaEEaez4yKdnlsrNmf64xCheRf1QfYrHji/zzFDhcVIcZTGXSoviN2RHutGWEsek
	 W2knDwEq2XWlPh5pmB5JPihiEg0AOgiNfSM+zseX1HPHxyGdMX/1Y4zou1Qe1G90HO
	 Y3JzKHUaIEEkzAjjS9TaDQ13Uh30+RnPgfheebdGMNk/i9sXsNM8aSmx4DbVA0iWSM
	 1ioKS0X5QZpe7bd2+1pm1aKciQtOxnLe5J6UQnEjWbcnLgwaFWkSDSBTVcQoCEWOyO
	 3UtHHYCm6pLAg==
Date: Thu, 17 Mar 2022 19:00:21 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Penny Zheng <Penny.Zheng@arm.com>
cc: xen-devel@lists.xenproject.org, nd@arm.com, 
    Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>, 
    Bertrand Marquis <bertrand.marquis@arm.com>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH v1 10/13] xen/arm: allocate static shared memory to a
 specific owner domain
In-Reply-To: <20220311061123.1883189-11-Penny.Zheng@arm.com>
Message-ID: <alpine.DEB.2.22.394.2203171824140.3497@ubuntu-linux-20-04-desktop>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com> <20220311061123.1883189-11-Penny.Zheng@arm.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Fri, 11 Mar 2022, Penny Zheng wrote:
> From: Penny Zheng <penny.zheng@arm.com>
> 
> If owner property is defined, then owner domain of a static shared memory
> region is not the default dom_shared anymore, but a specific domain.
> 
> This commit implements allocating static shared memory to a specific domain
> when owner property is defined.
> 
> Signed-off-by: Penny Zheng <penny.zheng@arm.com>
> ---
>  xen/arch/arm/domain_build.c | 63 ++++++++++++++++++++++++++++---------
>  1 file changed, 48 insertions(+), 15 deletions(-)
> 
> diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
> index d35f98ff9c..7ee4d33e0b 100644
> --- a/xen/arch/arm/domain_build.c
> +++ b/xen/arch/arm/domain_build.c
> @@ -872,6 +872,8 @@ static int __init process_shm(struct domain *d,
>      u32 shm_id;
>      u32 addr_cells, size_cells;
>      paddr_t gbase, pbase, psize;
> +    const char *role_str;
> +    bool owner_dom_shared = true;
>  
>      dt_for_each_child_node(node, shm_node)
>      {
> @@ -899,6 +901,13 @@ static int __init process_shm(struct domain *d,
>          gbase = dt_read_number(cells, addr_cells);
>  
>          /* TODO: Consider owner domain is not the default dom_shared. */

We should remove this comment?


> +        /*
> +         * "role" property is optional and if it is defined explicitly,
> +         * so the owner domain is not the default "dom_shared" domain.
> +         */
> +        if ( dt_property_read_string(shm_node, "role", &role_str) == 0 )
> +            owner_dom_shared = false;
> +
>          /*
>           * Per shared memory region could be shared between multiple domains.
>           * In case re-allocating the same shared memory region, we use bitmask
> @@ -907,17 +916,38 @@ static int __init process_shm(struct domain *d,
>           */
>          if ( !test_bit(shm_id, shm_mask) )
>          {
> -            /*
> -             * Allocate statically shared pages to the default dom_shared.
> -             * Set up P2M, and dom_shared is a direct-map domain,
> -             * so GFN == PFN.
> -             */
> -            ret = allocate_shared_memory(dom_shared, addr_cells, size_cells,
> -                                         pbase, psize, pbase);
> -            if ( ret )
> -                return ret;
> -
> -            set_bit(shm_id, shm_mask);
> +            if ( !owner_dom_shared )
> +            {
> +                if ( strcmp(role_str, "owner") == 0 )
> +                {
> +                    /*
> +                     * Allocate statically shared pages to a specific owner
> +                     * domain.
> +                     */
> +                    ret = allocate_shared_memory(d, shm_id, addr_cells,
> +                                                 size_cells, pbase, psize,
> +                                                 gbase);
> +                    if ( ret )
> +                        return ret;
> +
> +                    set_bit(shm_id, shm_mask);
> +                }
> +            }
> +            else
> +            {
> +                /*
> +                 * Allocate statically shared pages to the default dom_shared.
> +                 * Set up P2M, and dom_shared is a direct-map domain,
> +                 * so GFN == PFN.
> +                 */
> +                ret = allocate_shared_memory(dom_shared, shm_id,
> +                                             addr_cells, size_cells, pbase,
> +                                             psize, pbase);
> +                if ( ret )
> +                    return ret;
> +
> +                set_bit(shm_id, shm_mask);
> +            }

These two chunks are identical if not for dom_shared / d. Can we just
do:

if ( owner_dom_shared )
  d = dom_shared;

on top? Then we can implement this only once.

>          }
>  
>          /*
> @@ -925,10 +955,13 @@ static int __init process_shm(struct domain *d,
>           * default dom_shared, so here we could just set up P2M foreign
>           * mapping for borrower domain immediately.
>           */
> -        ret = guest_physmap_add_shm(dom_shared, d, PFN_DOWN(pbase),
> -                                    PFN_DOWN(gbase), PFN_DOWN(psize));
> -        if ( ret )
> -            return ret;
> +        if ( owner_dom_shared )
> +        {
> +            ret = guest_physmap_add_shm(dom_shared, d, PFN_DOWN(pbase),
> +                                        PFN_DOWN(gbase), PFN_DOWN(psize));
> +            if ( ret )
> +                return ret;
> +        }

What happens if the borrower is specified before the owner in device
tree? I see the case is handle by the next patch. Maybe we can have at
least a comment here or in the commit message.


>  
>          /*
>           * Record static shared memory region info for later setting
> -- 
> 2.25.1
> 


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 02:07:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 02:07:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291834.495625 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV21v-0004as-IP; Fri, 18 Mar 2022 02:07:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291834.495625; Fri, 18 Mar 2022 02:07:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV21v-0004al-FZ; Fri, 18 Mar 2022 02:07:51 +0000
Received: by outflank-mailman (input) for mailman id 291834;
 Fri, 18 Mar 2022 02:07:50 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3xU5=T5=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nV1vY-0000eL-Fb
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 02:01:16 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4b26918c-a65f-11ec-8eba-a37418f5ba1a;
 Fri, 18 Mar 2022 03:01:15 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 16A8EB820EE;
 Fri, 18 Mar 2022 02:01:15 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 679B4C340E9;
 Fri, 18 Mar 2022 02:01:13 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4b26918c-a65f-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647568873;
	bh=/IS5hnCt0ALq8NOAd68oImHCikXoD85MbDbLsNeotK0=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=PXjHt1m3wANlDQHwvVHPnt7CEzbumna4Cejxb/sVlTmIsDKOEmi1yoCKyom4c/+2B
	 3gXkiXSsSnfCJcsUDRiZhMHvE87LflJoJIoV8rocAVudbt+m6w8JnYBGZ5ovkRqVD2
	 dCiDIOknZbqzNRNSrzn3nDq0gBtT9egxGhF5JuKznN9E/lZXASuBy29uD4tM5+R7TL
	 tCxK3PlTcYxG5GATYUjmwQvZZ306Eq9/0r3gT5u5WzIc6XBgLRzKT/lPtu4pSQdwkp
	 KBco1R28rEhdC2fx5mFcqv3/VZtkYmetwlOF0r7w7TSvl7p59QwIyw3TY0KvkYvR+h
	 yIj3bMyaxBVSQ==
Date: Thu, 17 Mar 2022 19:01:12 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Penny Zheng <Penny.Zheng@arm.com>
cc: xen-devel@lists.xenproject.org, nd@arm.com, 
    Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>, 
    Bertrand Marquis <bertrand.marquis@arm.com>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH v1 11/13] xen/arm: store shm-info for deferred foreign
 memory map
In-Reply-To: <20220311061123.1883189-12-Penny.Zheng@arm.com>
Message-ID: <alpine.DEB.2.22.394.2203171831410.3497@ubuntu-linux-20-04-desktop>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com> <20220311061123.1883189-12-Penny.Zheng@arm.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Fri, 11 Mar 2022, Penny Zheng wrote:
> From: Penny Zheng <penny.zheng@arm.com>
> 
> In a few scenarios where owner domain, is defined after borrower domain in
> device tree configuration, then statically shared pages haven't been properly
> allocated if borrower domain tries to do foreign memory map during
> domain construction.
> 
> In order to cover such scenario, we defer all borrower domains' foreign
> memory map after all domain construction finished, then only need to store
> shm-info during domain construction.
> 
> Signed-off-by: Penny Zheng <penny.zheng@arm.com>
> ---
>  xen/arch/arm/domain.c             |  3 +++
>  xen/arch/arm/domain_build.c       | 34 ++++++++++++++++++++++++++++++-
>  xen/arch/arm/include/asm/domain.h | 25 +++++++++++++++++++++++
>  3 files changed, 61 insertions(+), 1 deletion(-)
> 
> diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
> index f0bfd67fe5..73ffbfb918 100644
> --- a/xen/arch/arm/domain.c
> +++ b/xen/arch/arm/domain.c
> @@ -47,6 +47,9 @@ DEFINE_PER_CPU(struct vcpu *, curr_vcpu);
>  
>  #ifdef CONFIG_STATIC_SHM
>  struct domain *__read_mostly dom_shared;
> +
> +shm_info_t shm_list[NR_MEM_BANKS];

Instead of adding shm_list, maybe we can we re-use mem->bank
(bootinfo.reserved_mem)?

It is already storing the physical address and size (added in patch #1
with process_shm_node). We should be able to find the other info from
the mfn: mfn_to_page, page_get_owner, mfn_to_gfn. At most, we need to
mark the memory bank as shared and we could do that with another field
in struct membank. 


> +DECLARE_BITMAP(shm_list_mask, NR_MEM_BANKS);

This is the third bitmask we introduce :-)

Can we narrow it down to a single bitmask? Maybe we don't need it at all
if we switch to using bootinfo.mem.bank.


>  #endif
>  
>  static void do_idle(void)
> diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
> index 7ee4d33e0b..4b19160674 100644
> --- a/xen/arch/arm/domain_build.c
> +++ b/xen/arch/arm/domain_build.c
> @@ -771,7 +771,7 @@ static mfn_t __init acquire_shared_memory_bank(struct domain *d,
>  
>  }
>  
> -static int __init allocate_shared_memory(struct domain *d,
> +static int __init allocate_shared_memory(struct domain *d, u32 shm_id,

No need for it to be u32?


>                                           u32 addr_cells, u32 size_cells,
>                                           paddr_t pbase, paddr_t psize,
>                                           paddr_t gbase)
> @@ -795,6 +795,18 @@ static int __init allocate_shared_memory(struct domain *d,
>          return ret;
>      }
>  
> +    /*
> +     * If owner domain is not default dom_shared, shm-info of owner domain
> +     * shall also be recorded for later deferred foreign memory map.
> +     */
> +    if ( d != dom_shared )
> +    {
> +        shm_list[shm_id].owner_dom = d->domain_id;
> +        shm_list[shm_id].owner_gbase = gbase;
> +        shm_list[shm_id].size = psize;
> +        set_bit(shm_id, shm_list_mask);
> +    }
>      return ret;
>  }
>  
> @@ -962,6 +974,26 @@ static int __init process_shm(struct domain *d,
>              if ( ret )
>                  return ret;
>          }
> +        else
> +        {
> +            if ( strcmp(role_str, "borrower") == 0 )
> +            {
> +                /*
> +                 * In a few scenarios where owner domain, is defined after
> +                 * borrower domain in device tree configuration, statically
> +                 * shared pages haven't been properly allocated if borrower
> +                 * domain here tries to do foreign memory map.
> +                 * In order to cover such scenario, we defer all borrower
> +                 * domains'foreign memory map after all domain construction
> +                 * finished, and only store shm-info here for later use.
> +                 */
> +                shm_list[shm_id].borrower_dom[shm_list[shm_id].nr_borrower] =
> +                                                                d->domain_id;
> +                shm_list[shm_id].borrower_gbase[shm_list[shm_id].nr_borrower] =
> +                                                                gbase;
> +                shm_list[shm_id].nr_borrower++;
> +            }
> +        }

Maybe we don't need to defer this at all. guest_physmap_add_shm does
only two things:

1) get a page ref using the owner domain
2) add page to borrower p2m


We can do 2) straight away even if the owner is not yet allocated.

For 1), we need to get the right amount of references when the owner is
allocated (which could be after the borrowers).

Keeping in mind that we have already parsed all the info in
xen/arch/arm/bootfdt.c:process_shm_node, I wonder if we can add a field
to mem->bank[mem->nr_banks] to keep a count of the number of borrowers.

Then when we allocate the page to the owner here, we just get as many
additional reference as the number of borrowers.

This would:
- add a field to bootinfo.reserved_mem
- remove the need for shm_list
- remove the need for shm_list_mask
- remove the need for the deferral

Just trying to make things simpler :-)


>          /*
>           * Record static shared memory region info for later setting
> diff --git a/xen/arch/arm/include/asm/domain.h b/xen/arch/arm/include/asm/domain.h
> index 6df37d2c46..1c0f2e22ca 100644
> --- a/xen/arch/arm/include/asm/domain.h
> +++ b/xen/arch/arm/include/asm/domain.h
> @@ -10,6 +10,7 @@
>  #include <asm/gic.h>
>  #include <asm/vgic.h>
>  #include <asm/vpl011.h>
> +#include <asm/setup.h>
>  #include <public/hvm/params.h>
>  
>  struct hvm_domain
> @@ -33,6 +34,30 @@ enum domain_type {
>  
>  #ifdef CONFIG_STATIC_SHM
>  extern struct domain *dom_shared;
> +
> +/* Maximum number of borrower domains. */
> +#define NR_SHM_DOMAIN 32
> +/*
> + * shm_list is indexed by unique identifier "xen,shm-id", but it only stores
> + * a subset of static shared memory regions, of which owner domain is not the
> + * default dom_shared.
> + * shm_list_mask bitmask is to record the position of these static shared
> + * memory regions.
> + * Per bit represents a entry in shm_list, and setting it 1 means the
> + * static shared memory region here is owned by a specific domain, then bit 0
> + * means the static shared memory region here is either owned by the default
> + * dom_shared or no static shared memory region here at all.
> + */
> +typedef struct {
> +    domid_t owner_dom;
> +    paddr_t owner_gbase;
> +    paddr_t size;
> +    domid_t borrower_dom[NR_SHM_DOMAIN];
> +    paddr_t borrower_gbase[NR_SHM_DOMAIN];
> +    unsigned long nr_borrower;
> +} shm_info_t;
> +extern shm_info_t shm_list[NR_MEM_BANKS];
> +extern unsigned long shm_list_mask[BITS_TO_LONGS(NR_MEM_BANKS)];
>  #else
>  #define dom_shared NULL
>  #endif
> -- 
> 2.25.1
> 


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 02:43:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 02:43:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291837.495637 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV2aR-0000Fp-AO; Fri, 18 Mar 2022 02:43:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291837.495637; Fri, 18 Mar 2022 02:43:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV2aR-0000Fi-71; Fri, 18 Mar 2022 02:43:31 +0000
Received: by outflank-mailman (input) for mailman id 291837;
 Fri, 18 Mar 2022 02:43:29 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV2aP-0000FY-Th; Fri, 18 Mar 2022 02:43:29 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV2aP-0006z8-Pz; Fri, 18 Mar 2022 02:43:29 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV2aP-0005dm-Et; Fri, 18 Mar 2022 02:43:29 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nV2aP-0004P3-ER; Fri, 18 Mar 2022 02:43:29 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=rRHLJAulTacWTcVPxu3hh+2Ak6Su5PEzAWs/rvt+3IU=; b=rIwk15qvsa4q4aKGJ+B1fmeoG6
	H2Wqd90gpcdjcSX8Ng8zh2egtYRUXxRdoOYlcXf+O8bjoUqAO6SeonpCMvPF77vqXVntFWRrJNdB3
	WpCVyegJ0rWKiPVdsWitBsaTg46KF8Root8E44BDI/oSGmThosvDMw1yu5Wa94Iz3wV0=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168669-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168669: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=6974c75180f1aad44e5428eabf2396b2b50fb0e4
X-Osstest-Versions-That:
    xen=7b41b91fd2ecbf87b91120b468689e10296b656c
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 18 Mar 2022 02:43:29 +0000

flight 168669 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168669/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  6974c75180f1aad44e5428eabf2396b2b50fb0e4
baseline version:
 xen                  7b41b91fd2ecbf87b91120b468689e10296b656c

Last test of basis   168666  2022-03-17 18:00:27 Z    0 days
Testing same since   168669  2022-03-17 23:00:29 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bjoern Doebel <doebel@amazon.de>
  Jiamei Xie <jiamei.xie@arm.com>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   7b41b91fd2..6974c75180  6974c75180f1aad44e5428eabf2396b2b50fb0e4 -> smoke


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 03:21:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 03:21:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291845.495648 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV3B5-0004YO-8C; Fri, 18 Mar 2022 03:21:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291845.495648; Fri, 18 Mar 2022 03:21:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV3B5-0004YH-4u; Fri, 18 Mar 2022 03:21:23 +0000
Received: by outflank-mailman (input) for mailman id 291845;
 Fri, 18 Mar 2022 03:21:22 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV3B4-0004Y7-04; Fri, 18 Mar 2022 03:21:22 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV3B3-0007cG-RJ; Fri, 18 Mar 2022 03:21:21 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV3B3-0006sJ-GP; Fri, 18 Mar 2022 03:21:21 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nV3B3-0007iS-Fx; Fri, 18 Mar 2022 03:21:21 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=zaxWIJfGU+mZZJsnQIB64NuffZMNBV77UwcThz+FdK0=; b=bk2FS/paEW8c13cmwNRGmalfGh
	llz3KQV5wLw29RLu0xHGRBz15+BJ8Ps+hI99+2yz5KHCO9xu9EcdWiuxhkI7Vovoa1QwSuf+a0RyC
	vMvYoScMjvqJDlAu2l9+00IM9Ssq/iKZJdjo7jnIHjoDC3mFSLRxSbI7lvSzp2eJ+QEU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168668-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168668: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=79a705fbaf8fb817330b513b4cf6e63d3e2e7f21
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 18 Mar 2022 03:21:21 +0000

flight 168668 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168668/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 79a705fbaf8fb817330b513b4cf6e63d3e2e7f21
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   17 days
Failing since        168258  2022-03-01 01:55:31 Z   17 days  161 attempts
Testing same since   168668  2022-03-17 22:46:49 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 780 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 05:23:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 05:23:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291854.495659 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV55O-00087G-5e; Fri, 18 Mar 2022 05:23:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291854.495659; Fri, 18 Mar 2022 05:23:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV55O-000879-2T; Fri, 18 Mar 2022 05:23:38 +0000
Received: by outflank-mailman (input) for mailman id 291854;
 Fri, 18 Mar 2022 05:23:36 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=ToKV=T5=nxp.com=peng.fan@srs-se1.protection.inumbo.net>)
 id 1nV55L-000873-Rn
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 05:23:36 +0000
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur02on0631.outbound.protection.outlook.com
 [2a01:111:f400:fe07::631])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 8dbd931f-a67b-11ec-8eba-a37418f5ba1a;
 Fri, 18 Mar 2022 06:23:33 +0100 (CET)
Received: from DU0PR04MB9417.eurprd04.prod.outlook.com (2603:10a6:10:358::11)
 by DB8PR04MB6586.eurprd04.prod.outlook.com (2603:10a6:10:101::33)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.18; Fri, 18 Mar
 2022 05:23:31 +0000
Received: from DU0PR04MB9417.eurprd04.prod.outlook.com
 ([fe80::cd28:b224:dbce:5f5e]) by DU0PR04MB9417.eurprd04.prod.outlook.com
 ([fe80::cd28:b224:dbce:5f5e%7]) with mapi id 15.20.5081.018; Fri, 18 Mar 2022
 05:23:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8dbd931f-a67b-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=iDxeBtq/edp3dm0Csjwg+ih4eBPNDtcb4m1ZCdzvz4pB8egSNVtvnJipEYBTeDFiqvPIhoDRC0pwRiMAy0a84wrWZW6FGXn8vSPdrknKSYttx0D8LWwhdw8U1nrcSNHH9XMPlJZIHZowQqiLK2Y+G6mQ4zW+1YmlICKaAY8OZsFBBdggX8tNy4HMUnK4F+e85Q1Ic2h7EFC1tCksfCf6fp1QNeITXgwbIL4TwJbT8mMmXRrUcQMqw/sj0KPwbZ61JdcaDVbWLDSLiQT6YfMKtZR/GK4O83PVtQszICYOSCj7WOfbUxq+sAGgk1NbNrpshVpk/19xGOXWXf8os5oQRA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=SoCPdx8Ql3azFXuMpf26K3Q7I86RraLmU0QP3OZDUBY=;
 b=YJ8eHtJSJL2QCl2VjauowxZ05Dh1Js4V+zyj5k57W9TeKww0riO10pNiBSXKrM87K6Pn9EPGmIInUjLYXRYGIH6SfBxsgLpzGbwBjjag3I0ZQM8kFMmlxkfHymV5j0bU5/GBW8HhX21BdHtxGUZPdo/UPpxikM3vzK+tGbO4QHTJffLLYWyjwFvK062tladp0Ocf/3Mce2wCxZ6J2EE8+8ciNApfPuUiTUu/G8ISMnF6Xtl54NOt56xsw6fr4YBkumclwZselpXJrdeh81VoQgVJ1yZs5GAtWramZQUkPI8jnWw3KQ+7aYM2JrhgdbF4/4yTLvvk9+TTJMQPx6KN9w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass
 header.d=nxp.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=SoCPdx8Ql3azFXuMpf26K3Q7I86RraLmU0QP3OZDUBY=;
 b=eBHffXMSiCba0lLHbvIol9fHXM9C5D257sTN8sDgo9+aGW6qXeQLepkqSRkbUtA4NkWjIUzOmiF8XN4jN6jF8AJmKw4m4jcIesWzB8zMa15wl9VGNgpyOTbu/eXUlP1qPRhIdEpY2gvkS3/xY5eM6t/vq1YHbg6MMKaNzZF+jmI=
From: Peng Fan <peng.fan@nxp.com>
To: Julien Grall <julien@xen.org>, "Peng Fan (OSS)" <peng.fan@oss.nxp.com>,
	"sstabellini@kernel.org" <sstabellini@kernel.org>,
	"Volodymyr_Babchuk@epam.com" <Volodymyr_Babchuk@epam.com>,
	"bertrand.marquis@arm.com" <bertrand.marquis@arm.com>
CC: "andrew.cooper3@citrix.com" <andrew.cooper3@citrix.com>,
	"george.dunlap@citrix.com" <george.dunlap@citrix.com>, "jbeulich@suse.com"
	<jbeulich@suse.com>, "wl@xen.org" <wl@xen.org>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	"van.freenix@gmail.com" <van.freenix@gmail.com>
Subject: RE: [PATCH 1/3] xen/arm: Add i.MX lpuart driver
Thread-Topic: [PATCH 1/3] xen/arm: Add i.MX lpuart driver
Thread-Index: AQHYLDnx328AZbWyq02DiYDlO7tvpKy14uEAgA7RSxA=
Date: Fri, 18 Mar 2022 05:23:31 +0000
Message-ID:
 <DU0PR04MB9417AF562F57364C0051D42088139@DU0PR04MB9417.eurprd04.prod.outlook.com>
References: <20220228010711.11566-1-peng.fan@oss.nxp.com>
 <20220228010711.11566-2-peng.fan@oss.nxp.com>
 <5fc8a6a2-450a-d9c3-b241-e1a950ac2933@xen.org>
In-Reply-To: <5fc8a6a2-450a-d9c3-b241-e1a950ac2933@xen.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=nxp.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 75803b5a-2573-443e-bbe8-08da089f7103
x-ms-traffictypediagnostic: DB8PR04MB6586:EE_
x-microsoft-antispam-prvs:
 <DB8PR04MB6586DE2EA97A517436C7032B88139@DB8PR04MB6586.eurprd04.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info:
 1KzyJE6LU7DdKv0ziAgqUYZrHe92ga8qHvdJd7XT9IuOUvaLRwVuQgYeQKBNJME4NqS7anD7chPF7NJ0cXjxdhaIyPNTmgCWc3+A+hvJSn1mWAAzTMRp7110hD3ZDMdtd6wI3LvQq+Frl9/Ei0r9+rNMbJlkLcdWzldnq/00Ix7EN1QBdKo7Tpvr2oRt0BvAtBEtlND3wvZaGs4swiYa3FtYVRhXFkqt6qr782iOqkD+GMzpA+o80PUmwqJSlY76pJ+vD/+xAqLguGoHgRUR4Ddclpc/p5dDLYkBv+aOJOrQTWBq6J5iWZc3T62pDYdWfz2YnAIYZdfjzMECJNDdWpOUJZZ0/u2aw0RgSFeEhA/JCumarqnqf6cb5LCNeSGVIoJ+1+7mLVMb+bqg+vE79uy+1MjeScXYOteLMITd2nsrYs1dGPe65BhnxHwTqHkE6OcQfanSFf1SwBjx+ZYiFiFkr4ZHDfqXgf+9moYbYfi1TxcjdzwLJ2PO1G5GMBLqZwR+QWN7oxWAAp7BGUeS2JHVtbnjxw0mRPCQOC9arR9t+Ckg50H7TKyadJMTbprKMhkL0T1tQXduueYQuIJ2R0O4Ov2Qjm5oL+DrvvNSfkH23hWV0dEJH6Q4ovLHaCyxgydpP7MSjFTsHRwTvLFT9vu9CplwvCt/c0Zr9DG26qE8E8RfFT4EKMa2x4FjXsgip/PdvFBwDiOUhCnmYoiNE3yvxNycXeZ/zrIBAdnDcZQ=
x-forefront-antispam-report:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU0PR04MB9417.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(8936002)(83380400001)(2906002)(33656002)(52536014)(53546011)(30864003)(6506007)(7696005)(9686003)(7416002)(44832011)(5660300002)(186003)(26005)(508600001)(71200400001)(55016003)(54906003)(110136005)(38100700002)(38070700005)(122000001)(64756008)(66476007)(66556008)(66946007)(76116006)(66446008)(316002)(4326008)(8676002)(86362001)(2004002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0:
 =?utf-8?B?bzhjYUFVTU9EWkNrY2xGR25DQVAvbVAvVzM5eFhxaSs4ZGhYanhhd2VCT0pK?=
 =?utf-8?B?ckJxbndibTAwUnk4cnhvVHFIYXZnSkdlazkvc25vYUlUMTBEdmJiZTZDZGN3?=
 =?utf-8?B?eGJaT3FLMjhkR0ZXT1dMdE1WeGh3YjRPdVVGY3NOZDNrSSs2N0Z1bFc1b3lm?=
 =?utf-8?B?S200dzVYV2JQTE9SdUJNTmFpdlJqQnF1R3RTVncrRzdRV1JtbUlkb2MxM2Mx?=
 =?utf-8?B?QjNlTENwS3BRVUprRk51anJTU08vOGMrekRUQm1LNmlRdjB6MVk5b1NYSmhG?=
 =?utf-8?B?R1VYWmNMeG1JWHZJblh1SnlQYng1MGZvdGFLdEtSbFdycUJPV0VqMFlkWW9o?=
 =?utf-8?B?WnNwUW44bjhENkM1TUtSem1qOW4yc0d4UDNQU1lyR0RqL0VSMEdOa1NNZ1FH?=
 =?utf-8?B?WUlhZFdhdTBxSUxJNmpNWW5TUndHalV4NUwxcHNpUi9XWWhDdEhLNUJHb3M2?=
 =?utf-8?B?cWVvYlRVWGxZYWs5eFIwa20yQXNsWjc1RDFFcjJhUG43ZUxLcHd1UW8vbkJS?=
 =?utf-8?B?Z2JoSXBobWlidVZlYStXN3NDNkFQOWpRbzJqMVJWNHpubmpldHBQQWVpTWFR?=
 =?utf-8?B?dUFkMlZLV2xBc3UwVExmcC9pVzJrSytoNjJqNHdTTndjVUIxTmN4RDdxcXVt?=
 =?utf-8?B?eFVtTFFBS0F5bUc0V09FTGRVcHIxY1Z3ZVpDZUdWNUgveDZHaVN0ZzBiZklL?=
 =?utf-8?B?UjlSQytCU1ZKZzhGdDZxNC9vYy9rRThzSmI4eGFidkZrOU1JSWtMTWFQbitQ?=
 =?utf-8?B?eEFZNDhiZ2ppdUdsOXpwQlcvK0tWZnB5WnZXVkN4Q2E5NjYwOEFoNURKaUZO?=
 =?utf-8?B?Qm1kY1pTVHJkcFltQWJOWGlBT2RJT2dFcHUvczFHUE84bTYzTVJWSGVpWk1p?=
 =?utf-8?B?MjBna0p6K3lXWXhMM3B2SGh3anlKbkh0TkxnektyS01La0V5L01XczJ3bmZB?=
 =?utf-8?B?MjJEUE5tc21veGlCNXpUbXlzK01pTEI0aXdzMllPdEEyWmgrNmoxcGt2MFFs?=
 =?utf-8?B?alVwMUdGOGVlM1N2MkZjM1JwUnlQbEgzN0hyNXNzMGJOSUhkc1d0MWl3MnB1?=
 =?utf-8?B?cExmQ01LeXcvZElVbHFHb2dNQVVMY2NFZ1gySGpMMVZLV0d2andJMjF3ZTdP?=
 =?utf-8?B?L3g4WlAwdFAyMHBkZ24rUkh0UkZPdGRMam9xdDY5QTEvSmRXQ0ZkRk9sR2lR?=
 =?utf-8?B?VkQ1enlmSGtlclNYa0ljc2tQQmRDbFhmVXhUS0lEOVQrQjJBWnBNZzV6aUQv?=
 =?utf-8?B?M0FoSzFsUXJoVWtNeDNvOTd4cXNqenFCV1pETzl3NzU3SDRZZUFpWkhES1Rh?=
 =?utf-8?B?bzIwRGxySTV4R0djTUdUWEU2YkkzbDQvMEo5SXpwYnNoanYwQnJBZC93RDRK?=
 =?utf-8?B?RjlYbEdpaWF1eHRFRUFsMkk3OHIwOFpSUXEvWlh0UTJxQmRaQ2hLY05kQW1h?=
 =?utf-8?B?MjFDSWhUWGMyMlFIWFJaWVA2Mm1UQ2hVdW41UTFScDJXQXdKQUh0QVZhZmND?=
 =?utf-8?B?VGNIaElrR3oxNXdLY1VKa2F4M2JLdGJKeXNnRDFVeUh1L1RGWENvcC8vYWRX?=
 =?utf-8?B?S1MyN3A5azQyeHNPNVZEVS9uR1BLYVhDT1FodUZMOTFTRExrMjVEbmx0M0Fw?=
 =?utf-8?B?RUo5aUhndUdOdEhlRENVY0FQaWxNeDNKVnFFa3cyN0dpVnZ2REtLM3RaU0JJ?=
 =?utf-8?B?Z0FaSWY3N1FUcGJqQUp4MjBDZjZ0UzV3d2pjTXZFdHpDc0Nkb21oR3plM0xz?=
 =?utf-8?B?KzllMUhRVktLZ0JVTVUxMHh5MXBCMEVVZk1kRXRDVzBENFN3TXgvZUxkMWZX?=
 =?utf-8?B?Q2RVaXU4SlBEUExkeGdtbGdEU21URHZsYlc4ZDBBOHphR0RaV2IxZ1hxNTls?=
 =?utf-8?B?cFBDUFpqWVFCVnFscTRydFNFUldtbUVtMndVMlBFVklucDZ6QktPbmZERXNl?=
 =?utf-8?Q?UapYVF769AM=3D?=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: nxp.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DU0PR04MB9417.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 75803b5a-2573-443e-bbe8-08da089f7103
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Mar 2022 05:23:31.3676
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: z6+2mSXHD99X5khYv6f6njiOahtr/TyVOC98CCYuXBiTeUsdlUZH7q0zQsuN8tYt1cvu5gapZoECsW8H7ukVTg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR04MB6586
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From xen-devel-bounces@lists.xenproject.org Fri Mar 18 05:24:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 05:24:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291857.495670 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV56a-0000Gs-Lp; Fri, 18 Mar 2022 05:24:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291857.495670; Fri, 18 Mar 2022 05:24:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV56a-0000Gl-Ht; Fri, 18 Mar 2022 05:24:52 +0000
Received: by outflank-mailman (input) for mailman id 291857;
 Fri, 18 Mar 2022 05:24:51 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=ToKV=T5=nxp.com=peng.fan@srs-se1.protection.inumbo.net>)
 id 1nV56Z-0000Gd-Jl
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 05:24:51 +0000
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur02on060f.outbound.protection.outlook.com
 [2a01:111:f400:fe07::60f])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id bbc09e59-a67b-11ec-8eba-a37418f5ba1a;
 Fri, 18 Mar 2022 06:24:50 +0100 (CET)
Received: from DU0PR04MB9417.eurprd04.prod.outlook.com (2603:10a6:10:358::11)
 by DB8PR04MB6586.eurprd04.prod.outlook.com (2603:10a6:10:101::33)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.18; Fri, 18 Mar
 2022 05:24:48 +0000
Received: from DU0PR04MB9417.eurprd04.prod.outlook.com
 ([fe80::cd28:b224:dbce:5f5e]) by DU0PR04MB9417.eurprd04.prod.outlook.com
 ([fe80::cd28:b224:dbce:5f5e%7]) with mapi id 15.20.5081.018; Fri, 18 Mar 2022
 05:24:48 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: bbc09e59-a67b-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=bfrqBJJgKJxV5hIvlcEhAlVHg9zoVEqqrpGHQF/GRiPlSRG+KEto72EhXYalVoQA2tQCrujETmG7wS8LmfavHcFjjZvbsE8CdD+fdeKpcik1H8IhobhSiA63Xq59XCEK/pr+3wIVFcryTQxgXGTnXfreQZGANK3mfVKOJe1iX3pDCHQi5qAbMHdoodjq3dccQNAznpzqal6ixxXGEi+6OiM60VzBFJjLa6Dm9/onZNXVgyzfSL/cesfUn8xtEho4+XiZ2nb8l5jo4GdjpJjycQvxVijCcF1J3ZDVUpBcCpjChECdAO+WRs07AiG0GZmP1LeN1E5tB9BZF8G55he74w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=5vPEEJMF9dWzpCqP5Gz0crPZ130HqiQ6yLnY4JM2+wI=;
 b=fXT2pS7+EO96KbeBHF4XcNkz04w/o2dsEVCpzXvlJQ8U04oe5M3IhMu+aBmnqNkRs7f4R5uDFO+OQaNCJpjOV66P9wySlY2P/DORi2y+uKhJBFoYUUz3CQ0fsxZ6+HdibHwHdUMqGWDWFuRSx6tT3sxYgMu0HDJcU2P0JttBeZLN3L2fWMfW08MTRtwg81kOVxJOsqLHXRnb4dG66PzS6oN3i8fAqkHTZz3tYySHIAdvEGTIY004jhahp7f98QyBKDZzb9Ro6MTHw38lJDolG2FXkggLDROKo+I3bNFC6jGM4IuI/LeeBNy2sfAsonjXogCrz4DfD9PTXOPAAc/+XA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass
 header.d=nxp.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=5vPEEJMF9dWzpCqP5Gz0crPZ130HqiQ6yLnY4JM2+wI=;
 b=UcQathVIvF3sK9DzXyTvURDnEMteVeLUGRPeNglSp5Y3jfy3f34IHAdZdZqaLNJqgygBEP6B1rPdIbkAECsrHuW2th5DmICjRxhVS+k7lMc4Y+5vM4xaBShuQEg+iOfjiM+uHsqQMxfRrTKfhSV2WRN0E1u4mvRpp999GIXkW/k=
From: Peng Fan <peng.fan@nxp.com>
To: Julien Grall <julien@xen.org>, "Peng Fan (OSS)" <peng.fan@oss.nxp.com>,
	"sstabellini@kernel.org" <sstabellini@kernel.org>,
	"Volodymyr_Babchuk@epam.com" <Volodymyr_Babchuk@epam.com>,
	"bertrand.marquis@arm.com" <bertrand.marquis@arm.com>
CC: "andrew.cooper3@citrix.com" <andrew.cooper3@citrix.com>,
	"george.dunlap@citrix.com" <george.dunlap@citrix.com>, "jbeulich@suse.com"
	<jbeulich@suse.com>, "wl@xen.org" <wl@xen.org>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	"van.freenix@gmail.com" <van.freenix@gmail.com>
Subject: RE: [PATCH 3/3] xen/arm: Add i.MX8QM platform support
Thread-Topic: [PATCH 3/3] xen/arm: Add i.MX8QM platform support
Thread-Index: AQHYLDn1G/1Ac2CNa0S1ihQ7HHH+66yos2GAgBwE3KA=
Date: Fri, 18 Mar 2022 05:24:48 +0000
Message-ID:
 <DU0PR04MB9417B86346491B63442D234D88139@DU0PR04MB9417.eurprd04.prod.outlook.com>
References: <20220228010711.11566-1-peng.fan@oss.nxp.com>
 <20220228010711.11566-4-peng.fan@oss.nxp.com>
 <e55f32f9-4d24-77a9-026b-201536c73708@xen.org>
In-Reply-To: <e55f32f9-4d24-77a9-026b-201536c73708@xen.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=nxp.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 3d9e2c0d-9f65-473b-c7ee-08da089f9f04
x-ms-traffictypediagnostic: DB8PR04MB6586:EE_
x-microsoft-antispam-prvs:
 <DB8PR04MB658644F9E5BF49DF5BAC5B5D88139@DB8PR04MB6586.eurprd04.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info:
 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
x-forefront-antispam-report:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU0PR04MB9417.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(8936002)(2906002)(33656002)(52536014)(53546011)(6506007)(7696005)(9686003)(7416002)(44832011)(5660300002)(186003)(26005)(508600001)(71200400001)(55016003)(54906003)(110136005)(38100700002)(38070700005)(122000001)(64756008)(66476007)(66556008)(66946007)(76116006)(66446008)(316002)(4326008)(8676002)(86362001)(2004002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0:
 =?utf-8?B?SUhFSWxZWGEzWHZUVWlGSU9EMUlHb1R2bWpQbFkreWdXK3puUmFhSlpmdU5u?=
 =?utf-8?B?VlhabzhySEd1MElkUy9JWGRhdVMxZjJ3QVVsOWdXQnc3OCt2OU82dndydkc1?=
 =?utf-8?B?cEdDNUZtK1lpMlF6VXFvUGZFdzRzbDlXVy8wUFJlRW9LeGdFQXRuQWtxWUMr?=
 =?utf-8?B?eEY5RlhuL3UyNjdhYXI2bGRoeWdyT0VBOGlTdU5FR2FHRUg4NjEvRzgrL0hL?=
 =?utf-8?B?MHRXV1BEUnJmbEx3RjFSYXFiSHNvM3drMVFPRXdNMTEzdW9sTURJaGhqWW5u?=
 =?utf-8?B?UnJ4dEp2QXN1UDBEeDJSczBVT2xoU25uaWlTN3ZOV3lwY05sMHFCTGdSQVkr?=
 =?utf-8?B?QUZEemZPdVNyOUw0ZjhpVnM4ZXVQVm1Sckh3elZIcXRmT3JHUVRBZGZnWE95?=
 =?utf-8?B?MFlQUVZZZXZrL2pBbDdOZjZrb3Job3lsYXFjRDBLd002MDlRKzlaZ2hHQ1Vk?=
 =?utf-8?B?eUJMVTJqTE11RXVQUk0zREFCT05meE53UlRVb1B6dDNXNUlKbm0va1NBMkV2?=
 =?utf-8?B?b2YyMkdoL01tMjVtOTNaeW9ha3VKYUhWQWM1dzNwVmpZY0NjUE9raEVNR2dW?=
 =?utf-8?B?cDhwMmRHZDhGTWxoaDRPMVk1VmRBdVFGNjBFaTh3TnM5Y3IyT2kvSTVhaWJu?=
 =?utf-8?B?RFlzeUM2bFVncmp6anJMOFVTSURWU3d6TldLU3BaWkFBaTVvLzhjU1hsd1o0?=
 =?utf-8?B?a3ZEa1g4cVo0N2ZYOUl5YllQNDc3czdHeVNBM1pUck0zckdXZzJBQ1FTWWxB?=
 =?utf-8?B?VGNGUjFzQXhmSUtwTXpsdGE4d3BqU0hMcGlWcjJvUHNaN0w5NWlGRmp0ZzYv?=
 =?utf-8?B?dzNTR3dMTzl0RHBmdTNQT2doY1hFTDRXT2NwTE41cVFQa0JSdmxITmROdnhh?=
 =?utf-8?B?NUpPZEMxck00dkE4dXZhTUhWeUk5SzhLd3NiMU9NWU51ZnNMdnBXMzdUUDhN?=
 =?utf-8?B?VGN2VFJkQi9ULyt0R1ZZMlNranlZWGdIS2RYeUpGMGl2OW8wZEJwWCtja3FB?=
 =?utf-8?B?Rk9ndGgrZTdCTXUvV1R6ekEwaHVubFFDSjYzbnpleDlyOHk4bmdTVExldUhH?=
 =?utf-8?B?SHZtUnptUG5KSkYwdGNlemltYllUQVdxMStWd253TW5tTG1rV1F3Uk1vSHhH?=
 =?utf-8?B?VzZSWmd6azBnQ2dDY1EvVC9YTmhuVmx4WmpEWGNBeVdxQmFkTGRTYnlLY21T?=
 =?utf-8?B?MnBkTDFRZWk5dzRqU1hyZVQxWCtSY3BwQkVqam9QZUJWTHVOMkI0bnVTbTNK?=
 =?utf-8?B?WVFpN0crU2YrVldCWnRTamVqaS9lcUlBQWRRcjZsdndPUWlVdUhVWFJHd0s3?=
 =?utf-8?B?QTg3b1BKZDJ3a1NGVS9JMDh6R0RrdktoeVF6RkFKbGlnSXhzSE9CWWJ2dlNy?=
 =?utf-8?B?NGFnbEgzeGJFOWRiNy8ySWd4SE1ETGp1a2dzYnBMM3JsRE9nU1M1c0JJYmR6?=
 =?utf-8?B?K2tRTzR0QzU3QlBWeWVxV0pRaTNCVFdNUmkxdE41WlV4bVVVMmhuNWgzZGhL?=
 =?utf-8?B?YWRlZFE2YzVlVnlwUHc1eEE1ZVVuL2xVcUEyMzh2S2R3cDAwMXpLOTBnVXRu?=
 =?utf-8?B?VWJQT09rSXNFVDM2dXh2bXkwR1MyQy9SczdOSE8zQTl2VnpRcXhOK1FrdnJv?=
 =?utf-8?B?YVVtU2oyaytzWXM0bVJJTzNYbEp1L1Z2cWxQWFhMMVdoSUNZSzU1QTgra2JE?=
 =?utf-8?B?UDNsUDkvcHhTQjVZQ2NBb1l4REdhakFZanpMUW05UlpSVGdMR0d3cjRid29R?=
 =?utf-8?B?YWJ6NjNTQ0lqNms4MnRqdTNGUEIwbWVOTTBiOVk3UTF5YXZtTWVHWXRoWlZL?=
 =?utf-8?B?REcyZ3kxTyt2RFpHVVZodzdLSzNkVlNrQzdydUFvSzFZN2JxTjlPQTIvaGhY?=
 =?utf-8?B?aURweUtXOStaUXdaNkc5Z1c4WmxNU0t5VUhycjVrOGVDL1cxazZibnJSN3RH?=
 =?utf-8?Q?618XHxft1Ws=3D?=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: nxp.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DU0PR04MB9417.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3d9e2c0d-9f65-473b-c7ee-08da089f9f04
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Mar 2022 05:24:48.5965
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Y6RYhpPH1ottuDQeps4/mDrgn/BxctvGtJhqTsiOdfvh/fN8ggTmCBiTVDwskkes0RE7nUEYPHLQYOsdD7DkHw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR04MB6586
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From xen-devel-bounces@lists.xenproject.org Fri Mar 18 05:26:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 05:26:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291860.495681 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV585-0000uS-W3; Fri, 18 Mar 2022 05:26:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291860.495681; Fri, 18 Mar 2022 05:26:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV585-0000uL-T6; Fri, 18 Mar 2022 05:26:25 +0000
Received: by outflank-mailman (input) for mailman id 291860;
 Fri, 18 Mar 2022 05:26:24 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=ToKV=T5=nxp.com=peng.fan@srs-se1.protection.inumbo.net>)
 id 1nV584-0000uD-Fo
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 05:26:24 +0000
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur02on0629.outbound.protection.outlook.com
 [2a01:111:f400:fe07::629])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f2c546e3-a67b-11ec-8eba-a37418f5ba1a;
 Fri, 18 Mar 2022 06:26:23 +0100 (CET)
Received: from DU0PR04MB9417.eurprd04.prod.outlook.com (2603:10a6:10:358::11)
 by DB8PR04MB6586.eurprd04.prod.outlook.com (2603:10a6:10:101::33)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.18; Fri, 18 Mar
 2022 05:26:21 +0000
Received: from DU0PR04MB9417.eurprd04.prod.outlook.com
 ([fe80::cd28:b224:dbce:5f5e]) by DU0PR04MB9417.eurprd04.prod.outlook.com
 ([fe80::cd28:b224:dbce:5f5e%7]) with mapi id 15.20.5081.018; Fri, 18 Mar 2022
 05:26:21 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f2c546e3-a67b-11ec-8eba-a37418f5ba1a
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Z9QUQJ+3h2xvBrck/kvpg95L7bffnQh6oxIoMD46lAQCXYu+zN1Kxjvh6E6bWs8FK6lrMT3sSgetg3hwBUxWEIeimXSIWGtbYmy8qVdoCfQsTawyPQmhYI+FhSk+403cFzqGADou3g6bhx6iOscb5+OZiECUEWmgqV/myX+tjJPk8vPar3Fs3XkDrRE0MmIPb6iM5ugYUu4QHKmwh7HA4JjCxNa6JkLdU9rKF4T3v5ysKioFoYbNm4WgOJKJo40tut+iWUKfJHRWYkj1GO+JbKiP+dPvA9CEyGz2Z58MYF63cCnKNAD2w32sXVkFuh37lC0CyGXKhjkRHFM7sAIDcA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Kx+KuOYNUIKuRplMmz9kT/yyMjJRjAmjPFeeJFGqcME=;
 b=Dm8578rl0B9M88bSWvJHLlitjowCGKJMzd7fVv1Bx57ONXB0s5hsLWbs/bKFzyo/gPCw3zQvP2I2QMTnUmXMDTeBL4LiQp6Wv3Zmmr5QSjgjlH/T9Ayo0r9oYk++/uKpzV2DOoFK5HiZEfPvizUmsbYuuNcT17pqk/1WFaehhZOHHb7BFpeCOlX561cTPR7BtYGrEURIL5Amz36l9eamrO6y1uasZvDZchnPluFNTzLmLDlFIbrtplMRboKG+IhfhX2GgHmY9djh3ZGAG4zewS6UCchB2uMA9viaHRKg+/UhNz9oVLiUw1BshfIUct0Guz2vpHGutTNDPLpwbhXxAg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass
 header.d=nxp.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Kx+KuOYNUIKuRplMmz9kT/yyMjJRjAmjPFeeJFGqcME=;
 b=CXPXzjwzy93WP+XHKJS32kEGPEZRjQU+Zaks5BrfejtVTyeK2FaKLDCo4FpuFPbB6X4R4mFzGVzdgG10a2ZNnD1LEFWZ97zIqQOtVr4jH6tfrU5yT3xXcWXtSTpc+KAhcyiyYdhzBIAPeqkpc5mYZdctM0otuvUYgDmKkMBjj1o=
From: Peng Fan <peng.fan@nxp.com>
To: Julien Grall <julien@xen.org>, "Peng Fan (OSS)" <peng.fan@oss.nxp.com>,
	"sstabellini@kernel.org" <sstabellini@kernel.org>,
	"Volodymyr_Babchuk@epam.com" <Volodymyr_Babchuk@epam.com>,
	"bertrand.marquis@arm.com" <bertrand.marquis@arm.com>
CC: "andrew.cooper3@citrix.com" <andrew.cooper3@citrix.com>,
	"george.dunlap@citrix.com" <george.dunlap@citrix.com>, "jbeulich@suse.com"
	<jbeulich@suse.com>, "wl@xen.org" <wl@xen.org>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	"van.freenix@gmail.com" <van.freenix@gmail.com>
Subject: RE: [PATCH 2/3] xen/arm: Add i.MX lpuart early printk support
Thread-Topic: [PATCH 2/3] xen/arm: Add i.MX lpuart early printk support
Thread-Index: AQHYLDnzvahR7/4GlkqRjPvyQqaC7KyosZiAgBwG+qA=
Date: Fri, 18 Mar 2022 05:26:21 +0000
Message-ID:
 <DU0PR04MB94175FC230D9D0DB1384105888139@DU0PR04MB9417.eurprd04.prod.outlook.com>
References: <20220228010711.11566-1-peng.fan@oss.nxp.com>
 <20220228010711.11566-3-peng.fan@oss.nxp.com>
 <ba77dc96-d421-b775-d5fd-99dc3ea2dfad@xen.org>
In-Reply-To: <ba77dc96-d421-b775-d5fd-99dc3ea2dfad@xen.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=nxp.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: d8229fb3-c5f2-4dfe-6022-08da089fd655
x-ms-traffictypediagnostic: DB8PR04MB6586:EE_
x-microsoft-antispam-prvs:
 <DB8PR04MB6586D4A5E2728EEDB44F1E6588139@DB8PR04MB6586.eurprd04.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info:
 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
x-forefront-antispam-report:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU0PR04MB9417.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(8936002)(2906002)(33656002)(52536014)(53546011)(6506007)(7696005)(9686003)(7416002)(44832011)(5660300002)(186003)(26005)(508600001)(71200400001)(55016003)(54906003)(110136005)(38100700002)(38070700005)(122000001)(64756008)(66476007)(66556008)(66946007)(76116006)(66446008)(316002)(4326008)(8676002)(86362001)(2004002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0:
 =?utf-8?B?SXJNSi9XSUI4dXR3VytrclVWWVZiUys2K3B4NWViMEo4T3lzWUREcmZVMlBr?=
 =?utf-8?B?Q3MwblJ3VUdkcFhaeVFzVldsZU1IMEZ0aHRIay84d3lsVVBSVGZFa1hIdmpw?=
 =?utf-8?B?cm9NNmw0bitRYlVQQk5BOXU2QjBGdm0yR0JkbU9QcnJaN0ZybHg3ZWlpMVJx?=
 =?utf-8?B?Ym44MXlNT3hkb1QrVXdZZHp5VWxaS0tNVG5xNHJ2WHBqd01WLy9GUVVTcUsy?=
 =?utf-8?B?aVJkdWphcXhFUW51dHRQSnJpTkhUdG85TzBRZlJxWUFubmVKYVNTZm9aQ1R0?=
 =?utf-8?B?aEZObUxHUlpubk9qa1Q3QWZ3SmVwdTkrWi9sbWR3NFRaK2QrOUp3aTBSVGV1?=
 =?utf-8?B?dHR1RFUrdkl2VGtlb1krMmI3eWVoMzNwYjMyVkEvZEs0YURJVHpwRmF2VTdC?=
 =?utf-8?B?SkZraHJOUytCbkNURUtvK1JidXhnU3NxOVhwa09nTzRZYjdqNkJwNkN2ZEcz?=
 =?utf-8?B?QVN6N05MTjI3c0E2R01IQ1dXeWlSUTZ6dkRBQkZtOVA5RkgrcWJ0WG9JeFlK?=
 =?utf-8?B?c0orZ3NqOHJ2aXpzRlVUK05JOHJqbkFVd3VNd0J1dDJzcHY0UG9kOWZJMUlp?=
 =?utf-8?B?SjFxWWk0ZVhiejdDOG5XSStxR01pU3lmaW1BSGI4Sk9MTTVCU1l4ZVd0SXpa?=
 =?utf-8?B?cHRJWFRvcWxlYTZERFdZbVlSUVhhRGV0Q2ZYS1B3T3FiYlM1bEFiZ0tzSDVF?=
 =?utf-8?B?RitVbmR6UWJYUUhlTWgrMWIwSkhJdkVpbC9KRWRZbThlR3BvTlFkdGdFWGEr?=
 =?utf-8?B?ay8zejI1cUYrTDNyTUN6RTgwQjVOQkZ5Kzl6Mm43UzZ0Y3FUYUVpd1B4WHFL?=
 =?utf-8?B?RXBndCt1NUcyUVgxTm5TSEZZWW43eW5maWlMeTRoY2xrUUdWK1ZxRWtVZXVV?=
 =?utf-8?B?RjFtVnh2WTZmdDFrV2poelB4VTBiYW1LT1Nic1NpcUFOcWtxR1ltYkk0ZTNw?=
 =?utf-8?B?SEpWOVR5NGU4SndURDFuTVJ0cjJSRUJUa2txUTBvcWtvZFBLSUJtSFZGOHhh?=
 =?utf-8?B?VUhDZ3pkNkx5TGNadzlEOU5LRWlZVjNwNSsyNUNJeWJpNDcrK2dUc3h1RG0y?=
 =?utf-8?B?SGhoUC83VVpIdWlZd3g1dFdvRGl1blp1a2ZSTjhrQUdFQmc0cWhWcm5lcEsv?=
 =?utf-8?B?Mzhac1k0NXV0bEVvRys4VS9aazJ4VkdZSUNJNzRyQWtWZnc2T0IwTXBjcEg5?=
 =?utf-8?B?czNPSGN4TFFVOHpLOWczQjFZWkZBMEdGY3ZyRUNlTzNmNUMxdzdCWFlGMUNh?=
 =?utf-8?B?VnQ2MkxaVDhSeVY1MVRMR2FieHU1YVEweHVENEJXbDlUUFV6dVEvOCt4ZW9y?=
 =?utf-8?B?TkFteGJ3RkZSK3pCNkJ1Q0ZSaHc3WUtBdXV4U0RsbmVLbEFsNFU1ZEs4NnJZ?=
 =?utf-8?B?Y0daNVJrWWd5MnhLQ2paY1BralJXWVhTOHhpcE9ERlZtK0JXd0JxRGhJZHJX?=
 =?utf-8?B?OHc5L2p2Tmx0L2o0K0w1dW50SWYwNkJOZzBpQjRnZkVWZE96VS9NV1lUV1lE?=
 =?utf-8?B?UEVLanhWUVBmS0I4SEJ1eXdMT0xIeVBqS3VaYTJwTlAyWE9oMGZySk9qakdh?=
 =?utf-8?B?NDk5QjBkaTJDcXNkWGlycFltMDZmbGpTN25PUzAvSFZZZWMzRTArMU5DY25V?=
 =?utf-8?B?RWthYUowZnpvcWhXbEY5VXZraDdxdUU3NVBOZjN0UWhHc0V1N0VGZWg2MDJq?=
 =?utf-8?B?Y1hnMDF6WDVkQkVVRVFXOFAwd0tJenZ3Uy9OTjczdWdBOGhRN3dkTkVjQTJJ?=
 =?utf-8?B?MVduT3dndHRIOGV0TEtJYitWQTZjRWVqaUV0cUgvYVFpU25uQWhWdkx1MDlF?=
 =?utf-8?B?aTh5R2t5bldMdTdCcmxoTDc0Z3I4bUhEdVhnWTVFYThYYmU3U0NTWmJ4bVVP?=
 =?utf-8?B?UjdTWTR6WFVZWWV3ckxqclNGcTd4MW9OOEpTMmFMMVpOenJtelhZb1kwZDln?=
 =?utf-8?Q?8Kbdo8Xqi9M=3D?=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: nxp.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DU0PR04MB9417.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d8229fb3-c5f2-4dfe-6022-08da089fd655
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Mar 2022 05:26:21.3994
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Pvwpv1CORLWyqSL6UX+SUOdkIKxrbTOvieEJ9jXDzOgauwrvklFZYBsmbqjg102jeNfTRf1IR9dzsrCOEaqTHw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR04MB6586
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From xen-devel-bounces@lists.xenproject.org Fri Mar 18 05:26:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 05:26:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291861.495692 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV58D-0001Ep-BA; Fri, 18 Mar 2022 05:26:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291861.495692; Fri, 18 Mar 2022 05:26:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV58D-0001Ef-7w; Fri, 18 Mar 2022 05:26:33 +0000
Received: by outflank-mailman (input) for mailman id 291861;
 Fri, 18 Mar 2022 05:26:31 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV58B-0001DX-H3; Fri, 18 Mar 2022 05:26:31 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV58B-0001kM-G7; Fri, 18 Mar 2022 05:26:31 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV58B-00035L-69; Fri, 18 Mar 2022 05:26:31 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nV58B-0006ot-5f; Fri, 18 Mar 2022 05:26:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=eqo9v7RxYTvXxG3NMsxFYKPkW6/A+WbUM21Mf8+P/WM=; b=Z7AcGus3khL/KYZkha9sWN3Wta
	GZ1mkCL2QTqBw+UB1LbeDgg7x7mAgJu2O6UMYFZeKPzU5PHpXf5EXA/4eXumFmFEKBSvzi44tpaer
	TgCtBi6YuhoHoA7zeUqf45W2+YF0iw66jHnLJv+pniKz6j3f7N8lhwL4foU3zNATW6fY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168670-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168670: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=28eeb08d8664df813637e12cb00c60cb30330be8
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 18 Mar 2022 05:26:31 +0000

flight 168670 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168670/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 28eeb08d8664df813637e12cb00c60cb30330be8
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   17 days
Failing since        168258  2022-03-01 01:55:31 Z   17 days  162 attempts
Testing same since   168670  2022-03-18 03:24:21 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 806 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 05:59:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 05:59:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291872.495703 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV5du-00051J-Mz; Fri, 18 Mar 2022 05:59:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291872.495703; Fri, 18 Mar 2022 05:59:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV5du-00051C-J3; Fri, 18 Mar 2022 05:59:18 +0000
Received: by outflank-mailman (input) for mailman id 291872;
 Fri, 18 Mar 2022 05:59:17 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV5dt-000512-BV; Fri, 18 Mar 2022 05:59:17 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV5dt-0002GX-6E; Fri, 18 Mar 2022 05:59:17 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV5ds-0003zg-QY; Fri, 18 Mar 2022 05:59:16 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nV5ds-0008M7-Q7; Fri, 18 Mar 2022 05:59:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Vs7GVVrUW9n1iijkz5xLvKXqygoddefLNXCiBIjlrEQ=; b=1G/ym4f5lY9oAqdGsc2iARhF1X
	gQyF2Ox6g/IQs1OvKXGhDhjKu8tu3QeTedXD8ycGnGrlWThPc/WYoEmwJR+LwYjjDOB44ispNy0Zw
	GZvJD9Mqma0sS5OJaTW0147tHpaDYLvDCBnJuVgmavipsGSTdx4TMSSxCBtjAt9RublA=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168672-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168672: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=28eeb08d8664df813637e12cb00c60cb30330be8
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 18 Mar 2022 05:59:16 +0000

flight 168672 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168672/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 28eeb08d8664df813637e12cb00c60cb30330be8
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   17 days
Failing since        168258  2022-03-01 01:55:31 Z   17 days  163 attempts
Testing same since   168670  2022-03-18 03:24:21 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 806 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 06:43:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 06:43:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291879.495714 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV6Kc-0001kC-2s; Fri, 18 Mar 2022 06:43:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291879.495714; Fri, 18 Mar 2022 06:43:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV6Kb-0001k5-W0; Fri, 18 Mar 2022 06:43:25 +0000
Received: by outflank-mailman (input) for mailman id 291879;
 Fri, 18 Mar 2022 06:43:25 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=qgOC=T5=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nV6Ka-0001jz-Mx
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 06:43:25 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04on0601.outbound.protection.outlook.com
 [2a01:111:f400:fe0d::601])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id b2f45601-a686-11ec-853c-5f4723681683;
 Fri, 18 Mar 2022 07:43:20 +0100 (CET)
Received: from AM5PR0202CA0006.eurprd02.prod.outlook.com
 (2603:10a6:203:69::16) by AM9PR08MB6642.eurprd08.prod.outlook.com
 (2603:10a6:20b:2ff::9) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Fri, 18 Mar
 2022 06:43:18 +0000
Received: from VE1EUR03FT033.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:203:69:cafe::c8) by AM5PR0202CA0006.outlook.office365.com
 (2603:10a6:203:69::16) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.18 via Frontend
 Transport; Fri, 18 Mar 2022 06:43:18 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT033.mail.protection.outlook.com (10.152.18.147) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Fri, 18 Mar 2022 06:43:17 +0000
Received: ("Tessian outbound 826a6d8e58c3:v113");
 Fri, 18 Mar 2022 06:43:17 +0000
Received: from 83db22eb5d58.3
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 2FB6038B-5531-4BE1-B1B9-2F1F2B254B4B.1; 
 Fri, 18 Mar 2022 06:43:07 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 83db22eb5d58.3
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 18 Mar 2022 06:43:07 +0000
Received: from DU2PR08MB7325.eurprd08.prod.outlook.com (2603:10a6:10:2e4::7)
 by VE1PR08MB5022.eurprd08.prod.outlook.com (2603:10a6:803:114::27) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.15; Fri, 18 Mar
 2022 06:43:04 +0000
Received: from DU2PR08MB7325.eurprd08.prod.outlook.com
 ([fe80::28c0:3e8d:dd75:80be]) by DU2PR08MB7325.eurprd08.prod.outlook.com
 ([fe80::28c0:3e8d:dd75:80be%7]) with mapi id 15.20.5081.018; Fri, 18 Mar 2022
 06:43:04 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b2f45601-a686-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=T8ExwDFMxG9xiBTlUCLmlFgP/hRbM8+NEqQ6Whkrhuw=;
 b=KYScTXH6ShJ6HvvlUV0+uYDml9YKjCfjecAOdlNufYJah8asOAMj9L0a6jMMc15wNj4dUYED+oHAFUlQgie/K3AFDoGaBQx/o8e307A/0YNj+fccBkMgv/Fww/YDloST+rwjE/EBTahevkWU9GEthn8SzJJP4RZGWo8poXOyGfQ=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=JOh8lWewG4ksTJXITuLB/Y98ZYeVwgXPjOaDT9SM2KDodYzw6ZD3cLjWxoOGYufyvva1wpfpS/d/p19y8HNWZKopgOvBfniTgXhY8n0WG3UIHUXsvhhlOVPqdlnKg91JuzNN7Gjs/P6dssX658a3vOPKjiskx9ZILQjpu38+Xgjuth9FnPw//trUlSuqkR4yDBIn96V9w/G9AhAaa4oh6pO5VwzuEh92bTIQdclvvMoJ2JR8hPeZ4MWI06YJJgrqhq44LsWQyOdSYBOub1sYL/oCPjQxTstwMTX04rloKNH53kde0wzmVtvjjyrsVxxpAyDJw5w+rCBbtQkiVI4IxA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=T8ExwDFMxG9xiBTlUCLmlFgP/hRbM8+NEqQ6Whkrhuw=;
 b=LX8Bxl5vh/TMhevdn04eW62R6rJEAj+qOaxyU2GKZzZeT5fPT7RJ0vkSgtvdcEvAMxHGRppu8wi6ODGhjWof9tQ6Jo5zAgbhaNGjUOuGI7LWeZIpUjkFA3bpF20el0icNBufpVWobKiQLfZMWumDukvHNL7qSv/+g41PJ+X10EmJgrar+wCPchu3ZqfNq7pKCytURpGRRd0zM8SHMv5U//ihMFAraRsSVUnKmLmsYFplEkJZy/WK6Lp7d54hWdyf9Qgi6067eiQ48ntBTOGUBtdXKgWZ+6Lb/S8/dJyDHUfbOw549xdbWWLRic9vpn0x/x9AQB1EeV47cEvr8Jtz6g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=T8ExwDFMxG9xiBTlUCLmlFgP/hRbM8+NEqQ6Whkrhuw=;
 b=KYScTXH6ShJ6HvvlUV0+uYDml9YKjCfjecAOdlNufYJah8asOAMj9L0a6jMMc15wNj4dUYED+oHAFUlQgie/K3AFDoGaBQx/o8e307A/0YNj+fccBkMgv/Fww/YDloST+rwjE/EBTahevkWU9GEthn8SzJJP4RZGWo8poXOyGfQ=
From: Penny Zheng <Penny.Zheng@arm.com>
To: Stefano Stabellini <sstabellini@kernel.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, nd
	<nd@arm.com>, Penny Zheng <penzhe01@a011292.shanghai.arm.com>, Julien Grall
	<julien@xen.org>, Bertrand Marquis <Bertrand.Marquis@arm.com>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, Jan
 Beulich <jbeulich@suse.com>, Wei Liu <wl@xen.org>
Subject: RE: [PATCH v1 02/13] xen/arm: introduce a special domain DOMID_SHARED
Thread-Topic: [PATCH v1 02/13] xen/arm: introduce a special domain
 DOMID_SHARED
Thread-Index: AQHYNQ8BtyFeP2p9kkWMo7TCkVRwI6zEbXYAgAA7vYA=
Date: Fri, 18 Mar 2022 06:43:04 +0000
Message-ID:
 <DU2PR08MB7325E5A3B5A9BC5DA76692C4F7139@DU2PR08MB7325.eurprd08.prod.outlook.com>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com>
 <20220311061123.1883189-3-Penny.Zheng@arm.com>
 <alpine.DEB.2.22.394.2203171645450.3497@ubuntu-linux-20-04-desktop>
In-Reply-To:
 <alpine.DEB.2.22.394.2203171645450.3497@ubuntu-linux-20-04-desktop>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: A921EC0126553640AD330E84A4AA8460.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 899b51a5-5902-4e9f-1f13-08da08aa95e4
x-ms-traffictypediagnostic:
	VE1PR08MB5022:EE_|VE1EUR03FT033:EE_|AM9PR08MB6642:EE_
X-Microsoft-Antispam-PRVS:
	<AM9PR08MB6642BBFF39ED78F1FC803B91F7139@AM9PR08MB6642.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR08MB7325.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(66556008)(26005)(186003)(5660300002)(8936002)(66476007)(316002)(53546011)(122000001)(76116006)(66946007)(71200400001)(6916009)(54906003)(55016003)(6506007)(7696005)(4326008)(64756008)(8676002)(83380400001)(2906002)(30864003)(508600001)(9686003)(66446008)(86362001)(38100700002)(52536014)(38070700005)(33656002)(396324004);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR08MB5022
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT033.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	c1854d50-baff-419d-4cb6-08da08aa8dd4
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(5660300002)(316002)(70586007)(54906003)(70206006)(8676002)(4326008)(6862004)(30864003)(26005)(36860700001)(82310400004)(81166007)(55016003)(508600001)(86362001)(336012)(83380400001)(9686003)(47076005)(33656002)(6506007)(53546011)(186003)(2906002)(356005)(7696005)(8936002)(52536014)(40460700003)(396324004);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 18 Mar 2022 06:43:17.7158
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 899b51a5-5902-4e9f-1f13-08da08aa95e4
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT033.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR08MB6642

Hi Stefano

> -----Original Message-----
> From: Stefano Stabellini <sstabellini@kernel.org>
> Sent: Friday, March 18, 2022 9:59 AM
> To: Penny Zheng <Penny.Zheng@arm.com>
> Cc: xen-devel@lists.xenproject.org; nd <nd@arm.com>; Penny Zheng
> <penzhe01@a011292.shanghai.arm.com>; Stefano Stabellini
> <sstabellini@kernel.org>; Julien Grall <julien@xen.org>; Bertrand Marquis
> <Bertrand.Marquis@arm.com>; Volodymyr Babchuk
> <Volodymyr_Babchuk@epam.com>; Andrew Cooper
> <andrew.cooper3@citrix.com>; George Dunlap <george.dunlap@citrix.com>;
> Jan Beulich <jbeulich@suse.com>; Wei Liu <wl@xen.org>
> Subject: Re: [PATCH v1 02/13] xen/arm: introduce a special domain
> DOMID_SHARED
>=20
> On Fri, 11 Mar 2022, Penny Zheng wrote:
> > From: Penny Zheng <penzhe01@a011292.shanghai.arm.com>
> >
> > In case to own statically shared pages when owner domain is not
> > explicitly defined, this commits propose a special domain
> > DOMID_SHARED, and we assign it 0x7FF5, as one of the system domains.
> >
> > Statically shared memory reuses the same way of initialization with
> > static memory, hence this commits proposes a new Kconfig
> > CONFIG_STATIC_SHM to wrap related codes, and this option depends on
> static memory(CONFIG_STATIC_MEMORY).
>=20
> Why does it depend on CONFIG_STATIC_MEMORY? This is a genuine question,
> I am not trying to scope-creep the series. Is there an actual technical
> dependency on CONFIG_STATIC_MEMORY? If not, it would be super useful to
> be able to share memory statically even between normal dom0less guests (o=
f
> course it would be responsibility of the user to provide the right addres=
ses and
> avoid mapping clashes.) I know that some of our users have requested this
> feature in the past.
>=20

I may find a proper way to rephrase here. My poor English writing skill...
When I implemented domain on static allocation, statically configured guest=
 RAM is
treated as static memory in Xen and I introduced a few helpers to initializ=
e/allocate/free
static memory, like acquire_staticmem_pages, etc, and all these helpers are=
 guarded with
CONFIG_STATIC_MEMORY.=20
I want to reuse these helpers on static shared memory, so CONFIG_STATIC_SHM=
 depends
on CONFIG_STATIC_MEMORY.

So I'm not restricting sharing static memory between domain on static alloc=
ation, current
Implementation is also useful to normal dom0less guests.
=20
>=20
> > We intends to do shared domain creation after setup_virt_paging so
> > shared domain could successfully do p2m initialization.
> >
> > Signed-off-by: Penny Zheng <penny.zheng@arm.com>
> > ---
> >  xen/arch/arm/Kconfig              |  7 +++++++
> >  xen/arch/arm/domain.c             | 12 ++++++++++--
> >  xen/arch/arm/include/asm/domain.h |  6 ++++++
> >  xen/arch/arm/setup.c              | 22 ++++++++++++++++++++++
> >  xen/common/domain.c               | 11 +++++++----
> >  xen/common/page_alloc.c           |  5 +++++
> >  xen/common/vsprintf.c             |  9 +++++----
> >  xen/include/public/xen.h          |  6 ++++++
> >  xen/include/xen/sched.h           |  2 ++
> >  9 files changed, 70 insertions(+), 10 deletions(-)
> >
> > diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig index
> > ecfa6822e4..c54accefb1 100644
> > --- a/xen/arch/arm/Kconfig
> > +++ b/xen/arch/arm/Kconfig
> > @@ -106,6 +106,13 @@ config TEE
> >
> >  source "arch/arm/tee/Kconfig"
> >
> > +config STATIC_SHM
> > +       bool "Statically shared memory on a dom0less system" if UNSUPPO=
RTED
> > +       depends on STATIC_MEMORY
> > +       default n
> > +       help
> > +         This option enables statically shared memory on a dom0less sy=
stem.
> > +
> >  endmenu
> >
> >  menu "ARM errata workaround via the alternative framework"
> > diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c index
> > 8110c1df86..1ff1df5d3f 100644
> > --- a/xen/arch/arm/domain.c
> > +++ b/xen/arch/arm/domain.c
> > @@ -44,6 +44,10 @@
> >
> >  DEFINE_PER_CPU(struct vcpu *, curr_vcpu);
> >
> > +#ifdef CONFIG_STATIC_SHM
> > +struct domain *__read_mostly dom_shared; #endif
>=20
> This one should probably go to xen/common/domain.c to stay close to the
> other special domains.
>=20

Ack. Thx

>=20
> >  static void do_idle(void)
> >  {
> >      unsigned int cpu =3D smp_processor_id(); @@ -703,7 +707,7 @@ int
> > arch_domain_create(struct domain *d,
> >      if ( is_idle_domain(d) )
> >          return 0;
> >
> > -    ASSERT(config !=3D NULL);
> > +    ASSERT(is_shared_domain(d) ? config =3D=3D NULL : config !=3D NULL=
);
> >
> >  #ifdef CONFIG_IOREQ_SERVER
> >      ioreq_domain_init(d);
> > @@ -712,12 +716,16 @@ int arch_domain_create(struct domain *d,
> >      d->arch.directmap =3D flags & CDF_directmap;
> >
> >      /* p2m_init relies on some value initialized by the IOMMU subsyste=
m */
> > -    if ( (rc =3D iommu_domain_init(d, config->iommu_opts)) !=3D 0 )
> > +    if ( (rc =3D iommu_domain_init(d, is_shared_domain(d) ? 0 :
> > + config->iommu_opts)) !=3D 0 )
> >          goto fail;
> >
> >      if ( (rc =3D p2m_init(d)) !=3D 0 )
> >          goto fail;
> >
> > +    /* DOMID_shared is sufficiently constructed after p2m initializati=
on. */
> > +    if ( is_shared_domain(d) )
> > +        return 0;
> > +
> >      rc =3D -ENOMEM;
> >      if ( (d->shared_info =3D alloc_xenheap_pages(0, 0)) =3D=3D NULL )
> >          goto fail;
> > diff --git a/xen/arch/arm/include/asm/domain.h
> > b/xen/arch/arm/include/asm/domain.h
> > index c56f6e4398..ea7a7219a3 100644
> > --- a/xen/arch/arm/include/asm/domain.h
> > +++ b/xen/arch/arm/include/asm/domain.h
> > @@ -31,6 +31,12 @@ enum domain_type {
> >
> >  #define is_domain_direct_mapped(d) (d)->arch.directmap
> >
> > +#ifdef CONFIG_STATIC_SHM
> > +extern struct domain *dom_shared;
> > +#else
> > +#define dom_shared NULL
> > +#endif
>=20
> I think this should probably go to xen/include/xen/mm.h to stay close to =
the
> others (dom_xen, dom_io and dom_cow).
>=20

Ack, thx

>=20
> >  /*
> >   * Is the domain using the host memory layout?
> >   *
> > diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c index
> > d5d0792ed4..f6a3b04958 100644
> > --- a/xen/arch/arm/setup.c
> > +++ b/xen/arch/arm/setup.c
> > @@ -855,6 +855,20 @@ static bool __init is_dom0less_mode(void)
> >      return ( !dom0found && domUfound );  }
> >
> > +#ifdef CONFIG_STATIC_SHM
> > +static void __init setup_shared_domain(void) {
> > +    /*
> > +     * Initialise our DOMID_SHARED domain.
> > +     * This domain owns statically shared pages when owner domain is n=
ot
> > +     * explicitly defined.
> > +     */
> > +    dom_shared =3D domain_create(DOMID_SHARED, NULL, CDF_directmap);
> > +    if ( IS_ERR(dom_shared) )
> > +        panic("Failed to create d[SHARED]: %ld\n",
> > +PTR_ERR(dom_shared)); } #endif
> > +
> >  size_t __read_mostly dcache_line_bytes;
> >
> >  /* C entry point for boot CPU */
> > @@ -1022,6 +1036,14 @@ void __init start_xen(unsigned long
> boot_phys_offset,
> >      apply_alternatives_all();
> >      enable_errata_workarounds();
> >
> > +#ifdef CONFIG_STATIC_SHM
> > +    /*
> > +     * This needs to be called **after** setup_virt_paging so shared
> > +     * domains could successfully do p2m initialization.
>           ^ domain
>=20
> I take you are talking about DOMID_SHARED rather than any domain sharing
> memory statically. Maybe it clearer if you say "so DOMID_SHARED could
> successfully do p2m initialization".
>=20

Ack, thx.

>=20
> > +     */
> > +    setup_shared_domain();
> > +#endif
> > +
> >      /* Create initial domain 0. */
> >      if ( !is_dom0less_mode() )
> >          create_dom0();
> > diff --git a/xen/common/domain.c b/xen/common/domain.c index
> > 3742322d22..5cdd0b9f5b 100644
> > --- a/xen/common/domain.c
> > +++ b/xen/common/domain.c
> > @@ -643,11 +643,14 @@ struct domain *domain_create(domid_t domid,
> >
> >      rangeset_domain_initialise(d);
> >
> > -    /* DOMID_{XEN,IO,etc} (other than IDLE) are sufficiently construct=
ed. */
> > -    if ( is_system_domain(d) && !is_idle_domain(d) )
> > +    /*
> > +     * DOMID_{XEN,IO,etc} (other than IDLE and DOMID_shared) are
> > +     * sufficiently constructed.
> > +     */
> > +    if ( is_system_domain(d) && !is_idle_domain(d) &&
> > + !is_shared_domain(d) )
> >          return d;
> >
> > -    if ( !is_idle_domain(d) )
> > +    if ( !is_idle_domain(d) && !is_shared_domain(d) )
> >      {
> >          if ( !is_hardware_domain(d) )
> >              d->nr_pirqs =3D nr_static_irqs + extra_domU_irqs; @@ -663,=
7
> > +666,7 @@ struct domain *domain_create(domid_t domid,
> >          goto fail;
> >      init_status |=3D INIT_arch;
> >
> > -    if ( !is_idle_domain(d) )
> > +    if ( !is_idle_domain(d) && !is_shared_domain(d) )
> >      {
> >          watchdog_domain_init(d);
> >          init_status |=3D INIT_watchdog; diff --git
> > a/xen/common/page_alloc.c b/xen/common/page_alloc.c index
> > f8749b0787..e5e357969d 100644
> > --- a/xen/common/page_alloc.c
> > +++ b/xen/common/page_alloc.c
> > @@ -2616,6 +2616,11 @@ struct domain *get_pg_owner(domid_t domid)
> >
> >      switch ( domid )
> >      {
> > +#ifdef CONFIG_STATIC_SHM
> > +    case DOMID_SHARED:
> > +        pg_owner =3D rcu_lock_domain(dom_shared);
> > +        break;
> > +#endif
> >      case DOMID_IO:
> >          pg_owner =3D rcu_lock_domain(dom_io);
> >          break;
> > diff --git a/xen/common/vsprintf.c b/xen/common/vsprintf.c index
> > b278961cc3..a22854001b 100644
> > --- a/xen/common/vsprintf.c
> > +++ b/xen/common/vsprintf.c
> > @@ -359,10 +359,11 @@ static char *print_domain(char *str, const char
> > *end, const struct domain *d)
> >
> >      switch ( d->domain_id )
> >      {
> > -    case DOMID_IO:   name =3D "[IO]";   break;
> > -    case DOMID_XEN:  name =3D "[XEN]";  break;
> > -    case DOMID_COW:  name =3D "[COW]";  break;
> > -    case DOMID_IDLE: name =3D "[IDLE]"; break;
> > +    case DOMID_IO:     name =3D "[IO]";     break;
> > +    case DOMID_XEN:    name =3D "[XEN]";    break;
> > +    case DOMID_COW:    name =3D "[COW]";    break;
> > +    case DOMID_IDLE:   name =3D "[IDLE]";   break;
> > +    case DOMID_SHARED: name =3D "[SHARED]"; break;
> >          /*
> >           * In principle, we could ASSERT_UNREACHABLE() in the default =
case.
> >           * However, this path is used to print out crash information,
> > which diff --git a/xen/include/public/xen.h b/xen/include/public/xen.h
> > index e373592c33..2e00741f09 100644
> > --- a/xen/include/public/xen.h
> > +++ b/xen/include/public/xen.h
> > @@ -612,6 +612,12 @@ DEFINE_XEN_GUEST_HANDLE(mmuext_op_t);
> >  /* DOMID_INVALID is used to identify pages with unknown owner. */
> >  #define DOMID_INVALID        xen_mk_uint(0x7FF4)
> >
> > +/*
> > + * DOMID_SHARED is used as the owner of statically shared pages, when
> > + * owner is not explicitly defined.
> > + */
> > +#define DOMID_SHARED         xen_mk_uint(0x7FF5)
> > +
> >  /* Idle domain. */
> >  #define DOMID_IDLE           xen_mk_uint(0x7FFF)
> >
> > diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h index
> > 24a9a87f83..2fb236f4ea 100644
> > --- a/xen/include/xen/sched.h
> > +++ b/xen/include/xen/sched.h
> > @@ -618,6 +618,8 @@ static inline bool is_system_domain(const struct
> domain *d)
> >      return d->domain_id >=3D DOMID_FIRST_RESERVED;  }
> >
> > +#define is_shared_domain(d) ((d)->domain_id =3D=3D DOMID_SHARED)
> > +
> >  #define DOMAIN_DESTROYED (1u << 31) /* assumes atomic_t is >=3D 32 bit=
s
> > */  #define put_domain(_d) \
> >    if ( atomic_dec_and_test(&(_d)->refcnt) ) domain_destroy(_d)
> > --
> > 2.25.1
> >

Cheers,
---
Penny Zheng


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 06:46:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 06:46:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291883.495724 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV6Nh-0002Pm-Lj; Fri, 18 Mar 2022 06:46:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291883.495724; Fri, 18 Mar 2022 06:46:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV6Nh-0002Pf-Il; Fri, 18 Mar 2022 06:46:37 +0000
Received: by outflank-mailman (input) for mailman id 291883;
 Fri, 18 Mar 2022 06:46:36 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV6Ng-0002PR-E4; Fri, 18 Mar 2022 06:46:36 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV6Ng-00039p-D5; Fri, 18 Mar 2022 06:46:36 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV6Nf-0005C2-Ue; Fri, 18 Mar 2022 06:46:36 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nV6Nf-0002Bx-UH; Fri, 18 Mar 2022 06:46:35 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=PNjJzg+2LL5+44HnqGsu7zbYzF870bDdKmEOzzKxDRM=; b=H8wzYHgL4jCMADbWdGV82Ag855
	tmuAcNxCmKcaCiYUPI+kLunJiY6jol4nOE37Q5y9lQ5cLyv7BCnImccuIag68/bAYV/vKs8Kt2iSX
	1GsJyc+iiJY2IMzypGJHl42g/rR6Bjk5jHKyLuiC3GOl4fGD8qOzkL+qlh7GlRofuLoU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168673-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168673: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=28eeb08d8664df813637e12cb00c60cb30330be8
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 18 Mar 2022 06:46:35 +0000

flight 168673 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168673/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 28eeb08d8664df813637e12cb00c60cb30330be8
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   17 days
Failing since        168258  2022-03-01 01:55:31 Z   17 days  164 attempts
Testing same since   168670  2022-03-18 03:24:21 Z    0 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 806 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 06:51:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 06:51:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291890.495736 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV6SN-0003ro-9S; Fri, 18 Mar 2022 06:51:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291890.495736; Fri, 18 Mar 2022 06:51:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV6SN-0003rh-6B; Fri, 18 Mar 2022 06:51:27 +0000
Received: by outflank-mailman (input) for mailman id 291890;
 Fri, 18 Mar 2022 06:51:26 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV6SM-0003rX-91; Fri, 18 Mar 2022 06:51:26 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV6SM-0003FB-5l; Fri, 18 Mar 2022 06:51:26 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV6SL-0005If-Qb; Fri, 18 Mar 2022 06:51:25 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nV6SL-0002Xr-Q8; Fri, 18 Mar 2022 06:51:25 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=AbGBsNnqZlW5D7t3T38pVcYDBCW5vlQzBa8i5afwBbU=; b=0Dp07BdQ+Qz/mV3mP+uYS9K6dj
	nyL/aCVXcd96dPNGBpQ41Lmxkn/9ZIiaftOULEEKgWErFfGbLvEYSo46fy9W+FIuLKEGbfrJmHt/i
	9qfF81lTFbxTy6Am1RO6lHlGfSHlu+AUZdd721yjyKZPKhBIEc/1ATUpl9CXIkX3wBIc=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168667-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168667: regressions - FAIL
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl-shadow:guest-start/debian.repeat:fail:regression
    linux-linus:build-arm64:xen-build:fail:regression
    linux-linus:test-arm64-arm64-examine:build-check(1):blocked:nonblocking
    linux-linus:build-arm64-libvirt:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=551acdc3c3d2b6bc97f11e31dcf960bc36343bfc
X-Osstest-Versions-That:
    linux=56e337f2cf1326323844927a04e9dbce9a244835
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 18 Mar 2022 06:51:25 +0000

flight 168667 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168667/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-xl-shadow  22 guest-start/debian.repeat fail REGR. vs. 168620
 build-arm64                   6 xen-build                fail REGR. vs. 168620

Tests which did not succeed, but are not blocking:
 test-arm64-arm64-examine      1 build-check(1)               blocked  n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl           1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168620
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168620
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168620
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168620
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168620
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168620
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168620
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168620
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                551acdc3c3d2b6bc97f11e31dcf960bc36343bfc
baseline version:
 linux                56e337f2cf1326323844927a04e9dbce9a244835

Last test of basis   168620  2022-03-15 18:10:19 Z    2 days
Testing same since   168667  2022-03-17 21:13:01 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Alexander Lobakin <alexandr.lobakin@intel.com>
  Andrew Morton <akpm@linux-foundation.org>
  Ard Biesheuvel <ardb@kernel.org>
  Ariel Elior <aelior@marvell.com>
  Bharathi Sreenivas <bharathi.sreenivas@intel.com>
  Brian Masney <bmasney@redhat.com>
  Claudiu Beznea <claudiu.beznea@microchip.com>
  David S. Miller <davem@davemloft.net>
  Doug Berger <opendmb@gmail.com>
  Eric Dumazet <edumazet@google.com>
  Florian Fainelli <f.fainelli@gmail.com>
  Florian Westphal <fw@strlen.de>
  Guo Ziliang <guo.ziliang@zte.com.cn>
  Gurucharan G <gurucharanx.g@intel.com> (A Contingent worker at Intel)
  Haimin Zhang <tcs_kernel@tencent.com>
  Herbert Xu <herbert@gondor.apana.org.au>
  Hugh Dickins <hughd@google.com>
  Ivan Vecera <ivecera@redhat.com>
  Jakub Kicinski <kuba@kernel.org>
  Jiasheng Jiang <jiasheng@iscas.ac.cn>
  Jiyong Park <jiyong@google.com>
  Joseph Qi <joseph.qi@linux.alibaba.com>
  Juerg Haefliger <juerg.haefliger@canonical.com>
  Juerg Haefliger <juergh@canonical.com>
  Kalle Valo <quic_kvalo@quicinc.com>
  Konrad Jankowski <konrad0.jankowski@intel.com>
  Kurt Cancemi <kurt@x64architecture.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Maciej Fijalkowski <maciej.fijalkowski@intel.com>
  Manish Chopra <manishc@marvell.com>
  Mateusz Palczewski <mateusz.palczewski@intel.com>
  Miaoqian Lin <linmq006@gmail.com>
  Michael S. Tsirkin <mst@redhat.com>
  Michael Walle <michael@walle.cc>
  Nicolas Dichtel <nicolas.dichtel@6wind.com>
  Niels Dossche <dossche.niels@gmail.com>
  Pablo Neira Ayuso <pablo@netfilter.org>
  Paolo Abeni <pabeni@redhat.com>
  Paul Menzel <pmenzel@molgen.mpg.de>
  Przemyslaw Patynowski <przemyslawx.patynowski@intel.com>
  Qian Cai <quic_qiancai@quicinc.com>
  Rafael J. Wysocki <rafael.j.wysocki@intel.com>
  Randy Dunlap <rdunlap@infradead.org>
  Sabrina Dubroca <sd@queasysnail.net>
  Steffen Klassert <steffen.klassert@secunet.com>
  Sudheer Mogilappagari <sudheer.mogilappagari@intel.com>
  Tadeusz Struk <tadeusz.struk@linaro.org>
  Tony Nguyen <anthony.l.nguyen@intel.com>
  Vladimir Oltean <vladimir.oltean@nxp.com>
  Willem de Bruijn <willemb@google.com>
  Yosry Ahmed <yosryahmed@google.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  fail    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          blocked 
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  blocked 
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  blocked 
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     blocked 
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   fail    
 test-arm64-arm64-xl-thunderx                                 blocked 
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      blocked 
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 1149 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 07:37:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 07:37:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291897.495747 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV7Ak-0008CQ-Ni; Fri, 18 Mar 2022 07:37:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291897.495747; Fri, 18 Mar 2022 07:37:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV7Ak-0008CJ-K8; Fri, 18 Mar 2022 07:37:18 +0000
Received: by outflank-mailman (input) for mailman id 291897;
 Fri, 18 Mar 2022 07:37:16 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=eO1Z=T5=arm.com=Hongda.Deng@srs-se1.protection.inumbo.net>)
 id 1nV7Ai-0008CC-Qq
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 07:37:16 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on20600.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::600])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 3a00c56f-a68e-11ec-8eba-a37418f5ba1a;
 Fri, 18 Mar 2022 08:37:15 +0100 (CET)
Received: from DB8PR03CA0005.eurprd03.prod.outlook.com (2603:10a6:10:be::18)
 by VE1PR08MB5664.eurprd08.prod.outlook.com (2603:10a6:800:1ae::5) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Fri, 18 Mar
 2022 07:37:10 +0000
Received: from DB5EUR03FT039.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:be:cafe::34) by DB8PR03CA0005.outlook.office365.com
 (2603:10a6:10:be::18) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.18 via Frontend
 Transport; Fri, 18 Mar 2022 07:37:10 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT039.mail.protection.outlook.com (10.152.21.120) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Fri, 18 Mar 2022 07:37:09 +0000
Received: ("Tessian outbound 2877e54fe176:v113");
 Fri, 18 Mar 2022 07:37:09 +0000
Received: from 4c370bbcb8b4.3
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 C512782A-56B5-43A1-AB53-005E9848DBB2.1; 
 Fri, 18 Mar 2022 07:36:59 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 4c370bbcb8b4.3
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 18 Mar 2022 07:36:59 +0000
Received: from DBAPR08MB5670.eurprd08.prod.outlook.com (2603:10a6:10:1a6::24)
 by VI1PR08MB3870.eurprd08.prod.outlook.com (2603:10a6:803:c2::32)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Fri, 18 Mar
 2022 07:36:57 +0000
Received: from DBAPR08MB5670.eurprd08.prod.outlook.com
 ([fe80::5c2f:44a7:10ba:1605]) by DBAPR08MB5670.eurprd08.prod.outlook.com
 ([fe80::5c2f:44a7:10ba:1605%5]) with mapi id 15.20.5081.015; Fri, 18 Mar 2022
 07:36:57 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3a00c56f-a68e-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=yKjv/GxLLhSsolgCKgzke32ylj/R4zZlh+8mrj1bmCw=;
 b=RoqOgazpgY67zNTnlfnvGmcjpvGYCO8dfBVTV0Vedgj32r7OJWBqoKQZHKR3QULv6fSvdTHtaROxo3zTm0zimgZCQ61YR9vyc4CrQfUhMU9/G9YMWyuW7kH5h81/DsyDsFF7RJpCdELaLFk+kQ1AnshSqTR4V7UOmkLLSVfjKCQ=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=BopGo0yC56WpK4inBxuNSy0POqGHYMKrHjIoZ3KkTpu7AdFLuCcVgR1vauNFSoXW7oxFI+CJu4PTIcDxvvFptHqkb+qsErJXJ9Oiem6WX9XhonfaCmhno9PRLLMC/1OMQ9T8PzUyx0qBLDK5zHA0qmgU7wHS/Sfo30ugn6pXLid2O9Vasx5sXZhgXymVTXg2HumxzKH9NazgkYrppwOzdmWc9ukLzYwgaYgtETUUxgxR7HQRYHsJU7M8nz4XGoLSKxOVG0q0QBjznYi0avr8wUXxEryqYOiMXGf+YSBbfkhUwMNMRm/5xj2ho3+8VZ/G/tPksV+79nAir7DOZdsIlQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=yKjv/GxLLhSsolgCKgzke32ylj/R4zZlh+8mrj1bmCw=;
 b=FuFSdlHN9l9DDMcu7mY6sP7sPfUU6p/Jl1tm8vwkjJUUHh002JWK+/othBVpI76962NzSTCpeNbntk1Ua/NurXFYmTgXPdMnEmYwz7CTKqLssQfpHUmNgizAEM+HkDCygmE+W4pwQRBU2iYGiq6Yk3zEbvvEvY53nCdTUeJ6zTpJ2u9oUizgLT8vGIjxnYWRVnli4M3DCfHK/bOxs/Lx93YsSCDW+IeGagn5BHclnWbqUVkMdP6Dj73mBxwh6xRlIEr2hZ8FuC5qchIMj0zHvBwsprgNMgHNeDZVq1yOtS+1N5cXMxtMJaZyynklYF+bOsRUVZ+QvU6M8r9O+vebDA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=yKjv/GxLLhSsolgCKgzke32ylj/R4zZlh+8mrj1bmCw=;
 b=RoqOgazpgY67zNTnlfnvGmcjpvGYCO8dfBVTV0Vedgj32r7OJWBqoKQZHKR3QULv6fSvdTHtaROxo3zTm0zimgZCQ61YR9vyc4CrQfUhMU9/G9YMWyuW7kH5h81/DsyDsFF7RJpCdELaLFk+kQ1AnshSqTR4V7UOmkLLSVfjKCQ=
From: Hongda Deng <Hongda.Deng@arm.com>
To: Julien Grall <julien@xen.org>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Julien Grall <Julien.Grall@arm.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Bertrand Marquis <Bertrand.Marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, Julien Grall
	<jgrall@amazon.com>
Subject: RE: [PATCH v3 08/19] xen/arm: mm: Re-implement early_fdt_map() using
 map_pages_to_xen()
Thread-Topic: [PATCH v3 08/19] xen/arm: mm: Re-implement early_fdt_map() using
 map_pages_to_xen()
Thread-Index: AQHYJw0FDhq6KOFFUUuWdMYiW3+ryqzE5UfQ
Date: Fri, 18 Mar 2022 07:36:57 +0000
Message-ID:
 <DBAPR08MB5670F9858ED3EE701C7F9C8BE6139@DBAPR08MB5670.eurprd08.prod.outlook.com>
References: <20220221102218.33785-1-julien@xen.org>
 <20220221102218.33785-9-julien@xen.org>
In-Reply-To: <20220221102218.33785-9-julien@xen.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 642BD511C7B79A45AAE4D6E3540B0724.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: a8e65186-8b76-479b-25f5-08da08b21c4f
x-ms-traffictypediagnostic:
	VI1PR08MB3870:EE_|DB5EUR03FT039:EE_|VE1PR08MB5664:EE_
X-Microsoft-Antispam-PRVS:
	<VE1PR08MB5664BC9BAADB1BE1905B60BBE6139@VE1PR08MB5664.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DBAPR08MB5670.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(38100700002)(4326008)(76116006)(8676002)(122000001)(54906003)(316002)(186003)(66476007)(66946007)(66556008)(86362001)(5660300002)(52536014)(110136005)(2906002)(8936002)(64756008)(38070700005)(66446008)(26005)(53546011)(6506007)(7696005)(9686003)(71200400001)(508600001)(83380400001)(55016003)(33656002);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB3870
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT039.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	b29b79dc-c597-446e-0c17-08da08b214ca
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(8936002)(33656002)(52536014)(55016003)(40460700003)(508600001)(2906002)(86362001)(4326008)(5660300002)(8676002)(70206006)(356005)(81166007)(70586007)(186003)(54906003)(26005)(110136005)(36860700001)(316002)(83380400001)(82310400004)(47076005)(6506007)(7696005)(9686003)(53546011)(336012)(107886003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 18 Mar 2022 07:37:09.8338
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: a8e65186-8b76-479b-25f5-08da08b21c4f
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT039.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR08MB5664

Hi Julien,

> -----Original Message-----
> From: Xen-devel <xen-devel-bounces@lists.xenproject.org> On Behalf Of Jul=
ien
> Grall
> Sent: 2022=1B$BG/=1B(B2=1B$B7n=1B(B21=1B$BF|=1B(B 18:22
> To: xen-devel@lists.xenproject.org
> Cc: julien@xen.org; Julien Grall <Julien.Grall@arm.com>; Stefano Stabelli=
ni
> <sstabellini@kernel.org>; Bertrand Marquis <Bertrand.Marquis@arm.com>;
> Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>; Julien Grall
> <jgrall@amazon.com>
> Subject: [PATCH v3 08/19] xen/arm: mm: Re-implement early_fdt_map() using
> map_pages_to_xen()
>=20
> From: Julien Grall <julien.grall@arm.com>
>=20
> Now that map_pages_to_xen() has been extended to support 2MB mappings,
> we can replace the create_mappings() calls by map_pages_to_xen() calls.
>=20
> The mapping can also be marked read-only has Xen as no business to

In my opinion I think it may should be:
	... read-only as Xen has no business ...
instead of:
	... read-only has Xen as no business ...

For this and other patches before this:
Reviewed-by: Hongda Deng <Hongda.Heng@arm.com>

> modify the host Device Tree.
>=20
> Signed-off-by: Julien Grall <julien.grall@arm.com>
> Signed-off-by: Julien Grall <jgrall@amazon.com>
>=20
> ---
>     Changes in v2:
>         - Add my AWS signed-off-by
>         - Fix typo in the commit message
> ---
>  xen/arch/arm/mm.c | 18 +++++++++++++-----
>  1 file changed, 13 insertions(+), 5 deletions(-)
>=20
> diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
> index f088a4b2de96..24de8dcb9042 100644
> --- a/xen/arch/arm/mm.c
> +++ b/xen/arch/arm/mm.c
> @@ -559,6 +559,7 @@ void * __init early_fdt_map(paddr_t fdt_paddr)
>      paddr_t offset;
>      void *fdt_virt;
>      uint32_t size;
> +    int rc;
>=20
>      /*
>       * Check whether the physical FDT address is set and meets the minim=
um
> @@ -574,8 +575,12 @@ void * __init early_fdt_map(paddr_t fdt_paddr)
>      /* The FDT is mapped using 2MB superpage */
>      BUILD_BUG_ON(BOOT_FDT_VIRT_START % SZ_2M);
>=20
> -    create_mappings(xen_second, BOOT_FDT_VIRT_START,
> paddr_to_pfn(base_paddr),
> -                    SZ_2M >> PAGE_SHIFT, SZ_2M);
> +    rc =3D map_pages_to_xen(BOOT_FDT_VIRT_START,
> maddr_to_mfn(base_paddr),
> +                          SZ_2M >> PAGE_SHIFT,
> +                          PAGE_HYPERVISOR_RO | _PAGE_BLOCK);
> +    if ( rc )
> +        panic("Unable to map the device-tree.\n");
> +
>=20
>      offset =3D fdt_paddr % SECOND_SIZE;
>      fdt_virt =3D (void *)BOOT_FDT_VIRT_START + offset;
> @@ -589,9 +594,12 @@ void * __init early_fdt_map(paddr_t fdt_paddr)
>=20
>      if ( (offset + size) > SZ_2M )
>      {
> -        create_mappings(xen_second, BOOT_FDT_VIRT_START + SZ_2M,
> -                        paddr_to_pfn(base_paddr + SZ_2M),
> -                        SZ_2M >> PAGE_SHIFT, SZ_2M);
> +        rc =3D map_pages_to_xen(BOOT_FDT_VIRT_START + SZ_2M,
> +                              maddr_to_mfn(base_paddr + SZ_2M),
> +                              SZ_2M >> PAGE_SHIFT,
> +                              PAGE_HYPERVISOR_RO | _PAGE_BLOCK);
> +        if ( rc )
> +            panic("Unable to map the device-tree\n");
>      }
>=20
>      return fdt_virt;
> --
> 2.32.0
>=20

Cheers,
---
Hongda


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 08:11:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 08:11:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291911.495757 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV7hz-0004g0-Uw; Fri, 18 Mar 2022 08:11:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291911.495757; Fri, 18 Mar 2022 08:11:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV7hz-0004ft-Rp; Fri, 18 Mar 2022 08:11:39 +0000
Received: by outflank-mailman (input) for mailman id 291911;
 Fri, 18 Mar 2022 08:11:39 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV7hz-0004fj-2u; Fri, 18 Mar 2022 08:11:39 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV7hy-00057A-P1; Fri, 18 Mar 2022 08:11:38 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV7hy-0007cy-DX; Fri, 18 Mar 2022 08:11:38 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nV7hy-0006YE-D4; Fri, 18 Mar 2022 08:11:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=ZL2TiJ0AfuDOzBl17AiPkAgGhSln06MWrtokVuxoBgc=; b=Vri08uiTPrx57LSg2HmjOL4syM
	O0TCfiEfhdelkyCbRYwlFQKc8yIXaGyVyXtANmC/6wm25R0qpq+a6zLEJDkIYygILWl4chOYtANdZ
	lyM1zaPFSD7+5/oe06hxYlWu1s6jd6a0/qgqdpyS9PQ7qHw88jc6UYBd30esGrO+Yw0Q=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168675-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168675: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 18 Mar 2022 08:11:38 +0000

flight 168675 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168675/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   17 days
Failing since        168258  2022-03-01 01:55:31 Z   17 days  165 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 08:13:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 08:13:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291918.495769 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV7jv-0005Fn-CV; Fri, 18 Mar 2022 08:13:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291918.495769; Fri, 18 Mar 2022 08:13:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV7jv-0005Fg-8v; Fri, 18 Mar 2022 08:13:39 +0000
Received: by outflank-mailman (input) for mailman id 291918;
 Fri, 18 Mar 2022 08:13:37 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=9SAg=T5=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nV7jt-0005FY-Qp
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 08:13:37 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4f3e5d5b-a693-11ec-853c-5f4723681683;
 Fri, 18 Mar 2022 09:13:36 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2105.outbound.protection.outlook.com [104.47.17.105]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-33-AD75-EAbPdymGFZmRVbFyQ-1; Fri, 18 Mar 2022 09:13:35 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM5PR0402MB2722.eurprd04.prod.outlook.com (2603:10a6:203:9a::8)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.18; Fri, 18 Mar
 2022 08:13:33 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d%9]) with mapi id 15.20.5081.018; Fri, 18 Mar 2022
 08:13:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4f3e5d5b-a693-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647591216;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=+T+I06lP1p2GOmGVZz5jCf7qT52pMXAifXqiU2K7fag=;
	b=iSRNGaq/DFuIhNTohZEnirf3XqnIh7ZxJYN77MEc/oBklZOOvXhWmKMiSTdT1HNdWugZfL
	ZXkSFfFmp8B6ldH8GI9Rf9zz4KKC0FsBMNeVAG2d4/JDNugjnlRell6duASBHhVqyBVHUb
	xCgWuy7ActkqGaYkRBt57+Py0qCCuuo=
X-MC-Unique: AD75-EAbPdymGFZmRVbFyQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Vsqwm00vNF3oHiqmYAqfI0iG0NRJOJBEtVF2JMk3Y6jk6FiK+LIe8TbPtWxolgwyFEg6g+7G1lxb57Oe2qcUeYMpq7lyMlcWUv8Sx/yutP8ZQ5bZuGNu9PY+pfBVSt22SWfALmUpjWzr5w7X/QUYYKkOz6VVYdp8jkCBRrHXZEozJRKe9oFDz30Wzmcot9Q0Jv8qBtOFl2ZwLw0kSfNbwI3zbZtb1T023IfM+kCpjtYogZm7Q/kTChOi/UKdSPdJfLl6QpIQO1+UZGGVOPJT6nnUA/i18bAc9iYvdkO9+Y3vlbbBJ9A5c3S14DG01dfGR9Cv01T6IoJI7ozuhAAAeQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=+T+I06lP1p2GOmGVZz5jCf7qT52pMXAifXqiU2K7fag=;
 b=MqfKx7P+mcXJvuHMCYsNr+hmdBXnbiLkmjBBvkucFxbXwqFUVuNE6TH7peoT/m2Hlb/NbN6tkyfnZJhaCQso8nLoBHLycsQjCleIAKf059tzlW3/iWZluXMyIQSCOeC2t/xEhJgTTjQ6VzWUkfo6VKAWJzr/llZBvSENHW7+1RWEMelCoNZ6Ax4JzVnJVwCxqyIUNOKH7AT6LJXWQzk6mzjamfl/vpiFVPVADjS8+fHyZifSwM5Z+LRrdwaqBIfg0kToAyLsM66jYVUF8WHk8s+iwte5EFspsmTkhcMH7RSHkGYkJkYTlmIzwQOXIf1SmMPtU2QACnXf9NAxG7ARqw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <78ce5809-8df4-c94e-4313-fffb1b86b771@suse.com>
Date: Fri, 18 Mar 2022 09:13:31 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [XEN PATCH] tools/libs/light/libxl_pci.c: explicitly grant access
 to Intel IGD opregion
Content-Language: en-US
To: Chuck Zmudzinski <brchuckz@netscape.net>
Cc: Wei Liu <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>,
 Juergen Gross <jgross@suse.com>, xen-devel@lists.xenproject.org
References: <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz.ref@netscape.net>
 <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz@netscape.net>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz@netscape.net>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM5PR0101CA0027.eurprd01.prod.exchangelabs.com
 (2603:10a6:206:16::40) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 10bc8b84-ba61-412e-aa3c-08da08b731a9
X-MS-TrafficTypeDiagnostic: AM5PR0402MB2722:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<AM5PR0402MB27228635ABBC7286334AF0E8B3139@AM5PR0402MB2722.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(83380400001)(316002)(66946007)(6486002)(86362001)(31696002)(8676002)(186003)(66556008)(66476007)(4326008)(26005)(508600001)(2616005)(6506007)(53546011)(5660300002)(8936002)(2906002)(38100700002)(6512007)(36756003)(54906003)(6916009)(31686004)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?S2RxZW91QlZwSXhkQXlZSm5MT2JIOFp0VkFjMnJCTW5ZdWIxZ1dldlR6S2pX?=
 =?utf-8?B?MDlvS3lvYjFST1Q5cmRTd05KcSthM2c0aGJ2c2VIS2dEYUwrTTdsZUZNclNM?=
 =?utf-8?B?SDF4K0VHNzFXRUlzUFZsaUM2VVhRUklNZjZOaEpXRzFLYmdGK0pVL056L1Zq?=
 =?utf-8?B?RHNhelN5SUNmRXFBMlAyaVFIVWlqN3dOTTljMzdGa2NJNTN3M242ek5jUTdW?=
 =?utf-8?B?VUtDT2MydVVmV2NlR25GdU5wK0pBb1dqQU5rUy9SSUdsWXR1MWFyRlM0ZkVE?=
 =?utf-8?B?R3hHNHlVOFZVaUI1SWFKYmxNZ1hzVlR4d09VcDhiRHk4ZEdvWlhZLzh5YnYx?=
 =?utf-8?B?T3hIcUpkcE5xVmo5WUJWazdnTmdoU3pIZ0RGcGFQUTM4RVhIMUJ3b0UraTBt?=
 =?utf-8?B?TjV4c25kQm14QnNVS2E3VXZiOXFvU3RUUVk1K1lMaUlUdzFVanIzT2JCWkp0?=
 =?utf-8?B?TzlYaHUzdTVnVEFvM1oycEo5SUhNSHJIREU0d0g0RjR3bXpwRXRKbmN4YWJ2?=
 =?utf-8?B?UmV4V3diaStWei85bzZSMlYrZ2lIR09nRFUyVlQrNlVuQS8zQ1NUOVhrOTBO?=
 =?utf-8?B?eFViTWFNY0VKR1VjZDFJUXV2NXBOMkhneHE0YkRMWFBUZW5nUFJ1ekpBTTNq?=
 =?utf-8?B?NmZtN1RjcDdsM1BldmNHREo3OU5xMVg5VHhHSTJ5NVFHWVZyQ2llMHpTN2Va?=
 =?utf-8?B?Q2JoQlhSTHUxSXlvUGpodHBIbXFVVVFkeW9zYkdEUDcwcGNVczgzc3FNNlJY?=
 =?utf-8?B?U2ttTmk0dzZvZWxKc2NyTVhXa0UzV0QwTnJ0OTlNdElMTThnWHhIK3h5NXAx?=
 =?utf-8?B?dzBlN2R4cG5WRGdpNERueG5LL1oxUjgwdkk0MC9NUVErVDVBRkVWSWMxbWsr?=
 =?utf-8?B?Z2lDY1UvSTM2N1dQQndLN0MwYXNlMDdUcFBrUVdiZlhwOFl5ZmxEeU0wT2JQ?=
 =?utf-8?B?UCtvWjk3NlBpL2s1TmdqU2hxazVNTUVDZUo3UFQxRjBkNGU3YktkNW1OSklU?=
 =?utf-8?B?TWhYRGRRRGpWdU90NlB5a1hDck1YSUYxZklqWVVUYVBib1kzQVBnRW13UHFn?=
 =?utf-8?B?a3VEQTBGZWxMZE12UVhLclI0QmRXbmN5RGwybUY4QmIvN2o3RFVUT2R4TUxT?=
 =?utf-8?B?ZU1YOVcrdzUva3Zqc0xFNmo2U01NNWdIU1krS0paUkJFaGJDVUliK2Ywc010?=
 =?utf-8?B?ckRhWFhtOTV5d1FjdTdXSmUwTWk1ZTVaVDU1cE5FYWdWTElxUVRLYURtTmJn?=
 =?utf-8?B?TDhYZG5QSTh1TTU0QUM2cFp6eHJZZ0xuUktDeDZkR2tBYlNkSnNBS2lQdFFB?=
 =?utf-8?B?bXF5UDV6V0x2a005aW0za1VkK3BVOCtnYytOTE9ieEpBY0FBZmpwTWZxYks4?=
 =?utf-8?B?WVRHV3VQNjV1K2tCdU9pamVkODQ1SzVkeDdWNWI4RkVzb1BaamtqVjVZeThq?=
 =?utf-8?B?WEVEMExsUWdyZTg4ZFZsQVpCWGFDRXc2Y3pGQTZNNzdyUFRjM1JxYnovMFRs?=
 =?utf-8?B?VTJtbWxxRVMrZ3V1dHdNRVN4a2VxOXVLYkx4TzNScEZqY3ZzaFB4bUZyWVFH?=
 =?utf-8?B?VFBZQjZURkVaZUF2YTN3dGNGa3hRbHhBSkh3eCtGSTJpd3dwRnY0S04wODBr?=
 =?utf-8?B?dXQvV3Jrb3FwRzdZYUwyOWszQWFBaVJ1YnpQQ3k1WS9Wcy8wNFp2czdMR3B5?=
 =?utf-8?B?WXp3WmF2dXdIRkZHeHBvZ1NDWDhwVXJLa3BaU1ZLTGVHaStpWTdOQjNiT256?=
 =?utf-8?B?ZXQ1SmFqKytCNEswUjdXa24xbmhnTzRLNkJDWlNNd2ZWTGJ0Y1JnZExzSis5?=
 =?utf-8?B?Q1RHREVPbmovWm04OGtSakljNFhFMG9LNEhXekl6RE4raHJCZXROVUJCa2tI?=
 =?utf-8?B?b1R2MmFGZ0syQVI0MDlzdnFUS29UblBPdmR0bkVvV0YrdndHZWJSaGhab0Rj?=
 =?utf-8?Q?YKhnxjMeJ64aFf3k8i3NW9SBvSXgtkJK?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 10bc8b84-ba61-412e-aa3c-08da08b731a9
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 18 Mar 2022 08:13:33.2523
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: F3BssMneDaOiAHwjY+1s3qhWpBJXgKjLj6K/BgkKlFpdDj5F28zeUfisOXK2FDWSzExRd4/g0IxqRj8oOaGgDA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0402MB2722

On 14.03.2022 04:41, Chuck Zmudzinski wrote:
> When gfx_passthru is enabled for the Intel IGD, hvmloader maps the IGD
> opregion to the guest but libxl does not grant the guest permission to
> access the mapped memory region. This results in a crash of the i915.ko
> kernel module in a Linux HVM guest when it needs to access the IGD
> opregion:
> 
> Oct 23 11:36:33 domU kernel: Call Trace:
> Oct 23 11:36:33 domU kernel:  ? idr_alloc+0x39/0x70
> Oct 23 11:36:33 domU kernel:  drm_get_last_vbltimestamp+0xaa/0xc0 [drm]
> Oct 23 11:36:33 domU kernel:  drm_reset_vblank_timestamp+0x5b/0xd0 [drm]
> Oct 23 11:36:33 domU kernel:  drm_crtc_vblank_on+0x7b/0x130 [drm]
> Oct 23 11:36:33 domU kernel:  intel_modeset_setup_hw_state+0xbd4/0x1900 [i915]
> Oct 23 11:36:33 domU kernel:  ? _cond_resched+0x16/0x40
> Oct 23 11:36:33 domU kernel:  ? ww_mutex_lock+0x15/0x80
> Oct 23 11:36:33 domU kernel:  intel_modeset_init_nogem+0x867/0x1d30 [i915]
> Oct 23 11:36:33 domU kernel:  ? gen6_write32+0x4b/0x1c0 [i915]
> Oct 23 11:36:33 domU kernel:  ? intel_irq_postinstall+0xb9/0x670 [i915]
> Oct 23 11:36:33 domU kernel:  i915_driver_probe+0x5c2/0xc90 [i915]
> Oct 23 11:36:33 domU kernel:  ? vga_switcheroo_client_probe_defer+0x1f/0x40
> Oct 23 11:36:33 domU kernel:  ? i915_pci_probe+0x3f/0x150 [i915]
> Oct 23 11:36:33 domU kernel:  local_pci_probe+0x42/0x80
> Oct 23 11:36:33 domU kernel:  ? _cond_resched+0x16/0x40
> Oct 23 11:36:33 domU kernel:  pci_device_probe+0xfd/0x1b0
> Oct 23 11:36:33 domU kernel:  really_probe+0x222/0x480
> Oct 23 11:36:33 domU kernel:  driver_probe_device+0xe1/0x150
> Oct 23 11:36:33 domU kernel:  device_driver_attach+0xa1/0xb0
> Oct 23 11:36:33 domU kernel:  __driver_attach+0x8a/0x150
> Oct 23 11:36:33 domU kernel:  ? device_driver_attach+0xb0/0xb0
> Oct 23 11:36:33 domU kernel:  ? device_driver_attach+0xb0/0xb0
> Oct 23 11:36:33 domU kernel:  bus_for_each_dev+0x78/0xc0
> Oct 23 11:36:33 domU kernel:  bus_add_driver+0x12b/0x1e0
> Oct 23 11:36:33 domU kernel:  driver_register+0x8b/0xe0
> Oct 23 11:36:33 domU kernel:  ? 0xffffffffc06b8000
> Oct 23 11:36:33 domU kernel:  i915_init+0x5d/0x70 [i915]
> Oct 23 11:36:33 domU kernel:  do_one_initcall+0x44/0x1d0
> Oct 23 11:36:33 domU kernel:  ? do_init_module+0x23/0x260
> Oct 23 11:36:33 domU kernel:  ? kmem_cache_alloc_trace+0xf5/0x200
> Oct 23 11:36:33 domU kernel:  do_init_module+0x5c/0x260
> Oct 23 11:36:33 domU kernel:  __do_sys_finit_module+0xb1/0x110
> Oct 23 11:36:33 domU kernel:  do_syscall_64+0x33/0x80
> Oct 23 11:36:33 domU kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9

The call trace alone leaves open where exactly the crash occurred.
Looking at 5.17 I notice that the first thing the driver does
after mapping the range it to check the signature (both in
intel_opregion_setup()). As the signature can't possibly match
with no access granted to the underlying mappings, there shouldn't
be any further attempts to use the region in the driver; if there
are, I'd view this as a driver bug.

Furthermore I've found indications (e.g. in the Core Gen11 doc)
that the register may not hold an address in the first place, but
instead a set of bitfields. I can't help the impression that the
driver would still try to map the range pointed at by the value
(as long as it's non-zero), which would imply unpredictable
behavior.

And then, looking further at intel_opregion_setup(), there's yet
one more memory range which the guest may need access to:
opregion->asle->rvda (or a value derived from it) also is handed
to memremap() under certain conditions.

Jan



From xen-devel-bounces@lists.xenproject.org Fri Mar 18 08:33:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 08:33:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291922.495784 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV830-0007ly-2P; Fri, 18 Mar 2022 08:33:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291922.495784; Fri, 18 Mar 2022 08:33:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV82z-0007lr-Vb; Fri, 18 Mar 2022 08:33:21 +0000
Received: by outflank-mailman (input) for mailman id 291922;
 Fri, 18 Mar 2022 08:33:21 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV82z-0007lf-FI; Fri, 18 Mar 2022 08:33:21 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV82z-0005Sl-Cu; Fri, 18 Mar 2022 08:33:21 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV82y-0000NV-TQ; Fri, 18 Mar 2022 08:33:20 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nV82y-00082k-Sv; Fri, 18 Mar 2022 08:33:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=kY6a84KIE958lcxQE3xp1idKUss/n+YU6C3BpKDRmy4=; b=1dnGkALHt165gBx4BX6sIWlDL0
	ByCNmWsp4R6LuQU2ubk7LRVl+RafWuKzEeiH2bdh5E6p14ru3URz4ZV+wr4EyBVmed6E5tyHebkPA
	aIOxM6iuTxfJm1nWUyGs75rAEOR9YzUDKDZhthq6SPaPsWWhELSaax6l5SsyQat9qbuQ=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168665-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168665: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-unstable:test-arm64-arm64-xl-credit2:xen-boot:fail:heisenbug
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=a3ba3ed0f45d3226320fd051c2066feaf7160d7a
X-Osstest-Versions-That:
    xen=c7a80bc50ac768b4eecaad85b77ae45790c93c73
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 18 Mar 2022 08:33:20 +0000

flight 168665 xen-unstable real [real]
flight 168676 xen-unstable real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168665/
http://logs.test-lab.xenproject.org/osstest/logs/168676/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-arm64-arm64-xl-credit2   8 xen-boot            fail pass in 168676-retest

Tests which did not succeed, but are not blocking:
 test-arm64-arm64-xl-credit2 15 migrate-support-check fail in 168676 never pass
 test-arm64-arm64-xl-credit2 16 saverestore-support-check fail in 168676 never pass
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168633
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168642
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168642
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168642
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168642
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168642
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168642
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168642
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168642
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168642
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168642
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168642
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass

version targeted for testing:
 xen                  a3ba3ed0f45d3226320fd051c2066feaf7160d7a
baseline version:
 xen                  c7a80bc50ac768b4eecaad85b77ae45790c93c73

Last test of basis   168642  2022-03-17 01:54:07 Z    1 days
Testing same since   168665  2022-03-17 17:08:14 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  George Dunlap <george.dunlap@citrix.com>
  Henry Wang <Henry.Wang@arm.com>
  Julien Grall <jgrall@amazon.com>
  Stefano Stabellini <sstabellini@kernel.org>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  fail    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   c7a80bc50a..a3ba3ed0f4  a3ba3ed0f45d3226320fd051c2066feaf7160d7a -> master


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 08:34:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 08:34:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291930.495795 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV849-0008OO-MG; Fri, 18 Mar 2022 08:34:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291930.495795; Fri, 18 Mar 2022 08:34:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV849-0008OH-Hg; Fri, 18 Mar 2022 08:34:33 +0000
Received: by outflank-mailman (input) for mailman id 291930;
 Fri, 18 Mar 2022 08:34:31 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV847-0008O5-TN; Fri, 18 Mar 2022 08:34:31 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV847-0005TU-Ri; Fri, 18 Mar 2022 08:34:31 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV847-0000Sa-HE; Fri, 18 Mar 2022 08:34:31 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nV847-0000yG-Gn; Fri, 18 Mar 2022 08:34:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=GmRloSUX3M5jnReUTohmZBu0dD7N5BCfJlIhVGsl4W4=; b=l6arppLlKejOeFBvjSjk37u27T
	FDMb2FoMIN2C4xDxRWMjS/VZZSCFxtiVqxE4wUvkTNQjItG7LbWpQaRJHHYB/GA+l8B87Px5x9dZ3
	QGf/qkVuf52YR3CWSY4FFn4gb/bOKZJTI2MU/mLxAEcm3dD4eFw6oloiDrurgez/zp5E=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168671-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168671: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=4a46539d0a083becf6f736c9ee43d0bf787f26b5
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 18 Mar 2022 08:34:31 +0000

flight 168671 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168671/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              4a46539d0a083becf6f736c9ee43d0bf787f26b5
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  616 days
Failing since        151818  2020-07-11 04:18:52 Z  615 days  597 attempts
Testing same since   168671  2022-03-18 04:18:53 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Haonan Wang <hnwanga1@gmail.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Martin Pitt <mpitt@debian.org>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 101593 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 08:35:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 08:35:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291937.495806 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV85H-0000Zo-23; Fri, 18 Mar 2022 08:35:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291937.495806; Fri, 18 Mar 2022 08:35:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV85G-0000Zh-TT; Fri, 18 Mar 2022 08:35:42 +0000
Received: by outflank-mailman (input) for mailman id 291937;
 Fri, 18 Mar 2022 08:35:41 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=qgOC=T5=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nV85F-0000ZX-HN
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 08:35:41 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04on060e.outbound.protection.outlook.com
 [2a01:111:f400:fe0e::60e])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 638c4413-a696-11ec-853c-5f4723681683;
 Fri, 18 Mar 2022 09:35:39 +0100 (CET)
Received: from DU2P251CA0016.EURP251.PROD.OUTLOOK.COM (2603:10a6:10:230::18)
 by DB7PR08MB3626.eurprd08.prod.outlook.com (2603:10a6:10:4a::16) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.26; Fri, 18 Mar
 2022 08:35:36 +0000
Received: from DB5EUR03FT034.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:230:cafe::8) by DU2P251CA0016.outlook.office365.com
 (2603:10a6:10:230::18) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.18 via Frontend
 Transport; Fri, 18 Mar 2022 08:35:36 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT034.mail.protection.outlook.com (10.152.20.87) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Fri, 18 Mar 2022 08:35:36 +0000
Received: ("Tessian outbound 341d209a0e52:v113");
 Fri, 18 Mar 2022 08:35:36 +0000
Received: from 269fceba88fb.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 F99551C2-C825-46A5-9918-BF2145C0D1B8.1; 
 Fri, 18 Mar 2022 08:35:31 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 269fceba88fb.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 18 Mar 2022 08:35:31 +0000
Received: from DU2PR08MB7325.eurprd08.prod.outlook.com (2603:10a6:10:2e4::7)
 by DBBPR08MB4647.eurprd08.prod.outlook.com (2603:10a6:10:f1::18) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Fri, 18 Mar
 2022 08:35:29 +0000
Received: from DU2PR08MB7325.eurprd08.prod.outlook.com
 ([fe80::28c0:3e8d:dd75:80be]) by DU2PR08MB7325.eurprd08.prod.outlook.com
 ([fe80::28c0:3e8d:dd75:80be%7]) with mapi id 15.20.5081.018; Fri, 18 Mar 2022
 08:35:28 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 638c4413-a696-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=9dvWUAv4FHCT4HoFI8Fm91KvMGp+4dAdolOYJfFKMVc=;
 b=GX05SwO4bQQ0o9EKAcNe/Kxi1V8NVc8AYnwgbcxCwssxQ3eYD98cnnkB08hcFI1KkZ/5KB3BlUFcTer/jpFJykyW6pPBzQ+70aEcsSY13CW9klWHSBUHLaLB0Tgc0bHSSADDG3OK15efpPzeC8zg5JX930INkS2nVDcQTMk8IOQ=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Yg9j4sQRUKFugGFXDV27AuB66AyGimuFmcAC0if0ISih+ORPm43xinRqaqjEGW28VuEGXtDovW0jXgYnKZcSiSlK28c81JllJiuGvxy9RwUQnqQYuAt9SwyJde9o3OnMgJxh2xvupr6xNIEYXX/NHONaE8DFpvHBUNRA1K6kDU7HbZRxuIEhEY+oWdocZyikQqJBMS/lSj9uShs2b9OndPsY81IntDJHMqLeilUbvsUZR7f3/zNMhRXmhxyxwhrNU4P/hj6tUK3PF9ZDbQUR9ZyB0CGV89L7CnE3nVz85d50ONM/0Q9UMDiOCkiShwaFjvrkQbXlUE532scTxxP2Wg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=9dvWUAv4FHCT4HoFI8Fm91KvMGp+4dAdolOYJfFKMVc=;
 b=N3+ZPVD+YaR+vmYHRCYpTFaTN8xyyeC5csmhWP4PdQlgvoVWbTtZ9sqvtWtLm+TgOXJPtT3bMkNQLx20SnE4E2+7OOInN/LVSEaTtAtnrSFLo4zBUIGOL/TjUetXcoBVd3Sa4bzem/fItwuwHmLWWHJtnDrj0qbjQVn2jSzBJ8NTLqlrvDyCumotyRgma6LTJ2nQWA/5fI3F5EZfAaHrxVDvhUr5XDgC80N/tIpXGHjq8t7UHRYlFUjDBkNeh1v/MOP8q2+MPjylt0e+rVDNp5KFqSX5gil4v1PJlgBn+YVBzWOdZSjB3iTqsS+oNU+Nq6vqSLXe5ROI+P54CT58IA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=9dvWUAv4FHCT4HoFI8Fm91KvMGp+4dAdolOYJfFKMVc=;
 b=GX05SwO4bQQ0o9EKAcNe/Kxi1V8NVc8AYnwgbcxCwssxQ3eYD98cnnkB08hcFI1KkZ/5KB3BlUFcTer/jpFJykyW6pPBzQ+70aEcsSY13CW9klWHSBUHLaLB0Tgc0bHSSADDG3OK15efpPzeC8zg5JX930INkS2nVDcQTMk8IOQ=
From: Penny Zheng <Penny.Zheng@arm.com>
To: Stefano Stabellini <sstabellini@kernel.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, nd
	<nd@arm.com>, Julien Grall <julien@xen.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: RE: [PATCH v1 03/13] xen/arm: allocate static shared memory to
 dom_shared
Thread-Topic: [PATCH v1 03/13] xen/arm: allocate static shared memory to
 dom_shared
Thread-Index: AQHYNQ8A9jAPAWQtaUOgnVl8EcC+TqzEbZKAgABaDWA=
Date: Fri, 18 Mar 2022 08:35:28 +0000
Message-ID:
 <DU2PR08MB732581E1261462D7CA5867BFF7139@DU2PR08MB7325.eurprd08.prod.outlook.com>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com>
 <20220311061123.1883189-4-Penny.Zheng@arm.com>
 <alpine.DEB.2.22.394.2203171707200.3497@ubuntu-linux-20-04-desktop>
In-Reply-To:
 <alpine.DEB.2.22.394.2203171707200.3497@ubuntu-linux-20-04-desktop>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 5345C1B29F078444BDD6AEB98E16B28C.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 8acd9eda-06fb-429d-0383-08da08ba4674
x-ms-traffictypediagnostic:
	DBBPR08MB4647:EE_|DB5EUR03FT034:EE_|DB7PR08MB3626:EE_
X-Microsoft-Antispam-PRVS:
	<DB7PR08MB3626F42E3E43F3F87804E448F7139@DB7PR08MB3626.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR08MB7325.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(122000001)(8936002)(4326008)(52536014)(55016003)(38070700005)(508600001)(66446008)(8676002)(66556008)(64756008)(66476007)(66946007)(76116006)(6506007)(186003)(7696005)(53546011)(33656002)(71200400001)(26005)(54906003)(6916009)(9686003)(316002)(86362001)(5660300002)(38100700002)(2906002)(83380400001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB4647
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT034.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	684897d0-8360-4ba3-26fe-08da08ba41ef
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(33656002)(336012)(36860700001)(83380400001)(55016003)(54906003)(47076005)(86362001)(53546011)(9686003)(82310400004)(6506007)(508600001)(7696005)(26005)(186003)(107886003)(70206006)(70586007)(40460700003)(8936002)(4326008)(6862004)(356005)(2906002)(81166007)(5660300002)(52536014)(316002)(8676002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 18 Mar 2022 08:35:36.5293
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 8acd9eda-06fb-429d-0383-08da08ba4674
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT034.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR08MB3626

Hi Stefano

> -----Original Message-----
> From: Stefano Stabellini <sstabellini@kernel.org>
> Sent: Friday, March 18, 2022 10:00 AM
> To: Penny Zheng <Penny.Zheng@arm.com>
> Cc: xen-devel@lists.xenproject.org; nd <nd@arm.com>; Stefano Stabellini
> <sstabellini@kernel.org>; Julien Grall <julien@xen.org>; Bertrand Marquis
> <Bertrand.Marquis@arm.com>; Volodymyr Babchuk
> <Volodymyr_Babchuk@epam.com>
> Subject: Re: [PATCH v1 03/13] xen/arm: allocate static shared memory to
> dom_shared
>=20
> On Fri, 11 Mar 2022, Penny Zheng wrote:
> > From: Penny Zheng <penny.zheng@arm.com>
> >
> > This commit introduces process_shm to cope with static shared memory
> > in domain construction.
> >
> > This commit only considers allocating static shared memory to
> > dom_shared when owner domain is not explicitly defined in device tree,
> > the other scenario will be covered in the following patches.
> >
> > Static shared memory could reuse acquire_static_memory_bank() to
> > acquire and allocate static memory.
> >
> > Signed-off-by: Penny Zheng <penny.zheng@arm.com>
> > ---
> >  xen/arch/arm/domain_build.c | 116
> > +++++++++++++++++++++++++++++++++++-
> >  1 file changed, 115 insertions(+), 1 deletion(-)
> >
> > diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
> > index 8be01678de..6e6349caac 100644
> > --- a/xen/arch/arm/domain_build.c
> > +++ b/xen/arch/arm/domain_build.c
> > @@ -527,7 +527,8 @@ static mfn_t __init
> acquire_static_memory_bank(struct domain *d,
> >      mfn_t smfn;
> >      int res;
> >
> > -    device_tree_get_reg(cell, addr_cells, size_cells, pbase, psize);
> > +    if ( cell )
> > +        device_tree_get_reg(cell, addr_cells, size_cells, pbase,
> > + psize);
>=20
> Why this change?
>=20

This helper is also used for acquiring static memory as guest RAM for stati=
cally configured
domain.

And since we are reusing it for static shared memory, but try to avoid pars=
ing the property
here, the "xen,static-shm" property getting parsed in different ways in pro=
cess_shm.
So this change is needed here.

And I think I need to add in-code comment to explain. ;)

>=20
> >      ASSERT(IS_ALIGNED(*pbase, PAGE_SIZE) && IS_ALIGNED(*psize,
> PAGE_SIZE));
> >      if ( PFN_DOWN(*psize) > UINT_MAX )
> >      {
> > @@ -751,6 +752,113 @@ static void __init assign_static_memory_11(struct
> domain *d,
> >      panic("Failed to assign requested static memory for direct-map
> domain %pd.",
> >            d);
> >  }
> > +
> > +#ifdef CONFIG_STATIC_SHM
> > +static __initdata DECLARE_BITMAP(shm_mask, NR_MEM_BANKS);
> > +
> > +static mfn_t __init acquire_shared_memory_bank(struct domain *d,
> > +                                               u32 addr_cells, u32 siz=
e_cells,
> > +                                               paddr_t *pbase,
> > +paddr_t *psize) {
> > +    /*
> > +     * Pages of statically shared memory shall be included
> > +     * in domain_tot_pages().
> > +     */
> > +    d->max_pages +=3D PFN_DOWN(*psize);
> > +
> > +    return acquire_static_memory_bank(d, NULL, addr_cells, size_cells,
> > +                                      pbase, psize);
> > +
> > +}
> > +
> > +static int __init allocate_shared_memory(struct domain *d,
> > +                                         u32 addr_cells, u32 size_cell=
s,
> > +                                         paddr_t pbase, paddr_t psize,
> > +                                         paddr_t gbase) {
> > +    mfn_t smfn;
> > +    int ret =3D 0;
> > +
> > +    printk(XENLOG_INFO "Allocate static shared memory
> BANK %#"PRIpaddr"-%#"PRIpaddr"\n",
> > +           pbase, pbase + psize);
> > +
> > +    smfn =3D acquire_shared_memory_bank(d, addr_cells, size_cells, &pb=
ase,
> > +                                      &psize);
> > +    if ( mfn_eq(smfn, INVALID_MFN) )
> > +        return -EINVAL;
> > +
> > +    ret =3D guest_physmap_add_pages(d, gaddr_to_gfn(gbase), smfn,
> PFN_DOWN(psize));
> > +    if ( ret )
> > +    {
> > +        dprintk(XENLOG_ERR, "Failed to map shared memory to %pd.\n", d=
);
> > +        return ret;
> > +    }
> > +
> > +    return ret;
> > +}
> > +
> > +static int __init process_shm(struct domain *d,
> > +                              const struct dt_device_node *node) {
> > +    struct dt_device_node *shm_node;
> > +    int ret =3D 0;
> > +    const struct dt_property *prop;
> > +    const __be32 *cells;
> > +    u32 shm_id;
> > +    u32 addr_cells, size_cells;
> > +    paddr_t gbase, pbase, psize;
> > +
> > +    dt_for_each_child_node(node, shm_node)
> > +    {
> > +        if ( !dt_device_is_compatible(shm_node, "xen,domain-shared-mem=
ory-
> v1") )
> > +            continue;
> > +
> > +        if ( !dt_property_read_u32(shm_node, "xen,shm-id", &shm_id) )
> > +        {
> > +            printk("Shared memory node does not provide \"xen,shm-id\"
> property.\n");
> > +            return -ENOENT;
> > +        }
> > +
> > +        addr_cells =3D dt_n_addr_cells(shm_node);
> > +        size_cells =3D dt_n_size_cells(shm_node);
> > +        prop =3D dt_find_property(shm_node, "xen,shared-mem", NULL);
> > +        if ( !prop )
> > +        {
> > +            printk("Shared memory node does not provide \"xen,shared-m=
em\"
> property.\n");
> > +            return -ENOENT;
> > +        }
> > +        cells =3D (const __be32 *)prop->value;
> > +        /* xen,shared-mem =3D <pbase, psize, gbase>; */
> > +        device_tree_get_reg(&cells, addr_cells, size_cells, &pbase, &p=
size);
> > +        ASSERT(IS_ALIGNED(pbase, PAGE_SIZE) && IS_ALIGNED(psize,
> PAGE_SIZE));
> > +        gbase =3D dt_read_number(cells, addr_cells);
> > +
> > +        /* TODO: Consider owner domain is not the default dom_shared. =
*/
> > +        /*
> > +         * Per shared memory region could be shared between multiple
> domains.
> > +         * In case re-allocating the same shared memory region, we use=
 bitmask
> > +         * shm_mask to record whether this shared memory region has ev=
er
> been
> > +         * allocated already.
> > +         */
> > +        if ( !test_bit(shm_id, shm_mask) )
> > +        {
> > +            /*
> > +             * Allocate statically shared pages to the default dom_sha=
red.
> > +             * Set up P2M, and dom_shared is a direct-map domain,
> > +             * so GFN =3D=3D PFN.
> > +             */
> > +            ret =3D allocate_shared_memory(dom_shared, addr_cells, siz=
e_cells,
> > +                                         pbase, psize, pbase);
>                                                           ^gbase
>=20
> The last parameter should be gbase instead of pbase?
>=20

Yes, and since dom_shared is a direct-map domain, GFN =3D=3D PFN, so pbase =
should be
ok here. I mentioned it on comments.

And Why I make dom_shared direct-map domain is that in this way we don't ne=
ed to decode
owner GFN when doing foreign memory mapping for borrower domain.

>=20
> Reading this patch is not clear that only the "owner" code path is
> implemented here. The "borrower" code path is implemented later and
> missing in this patch. I think it would be good to clarify that in the co=
mmit
> message.
>=20
> Under this light, allocate_shared_memory is supposed to be only called fo=
r the
> owner. I think we should probably mention that in the in-code comment too=
.
>=20

Yes, only owner domain could allocate memory, I'll add it to in-code commen=
t.

> I don't think we need to define a second copy of shm_mask. Can we reuse t=
he
> one in bootfdt.c?
>=20

Yes, maybe I should reuse than reintroduce. And before using the bitmap her=
e,
I need to clear it totally to clean away all the stale info from bootfdt.c.

> Or we could get rid of shm_mask entirely here if we check whether the pag=
es
> were already allocated in the owner p2m.
>=20
>=20

Hmm, that means that we need to do the page walk each time? That's kinds of
time-consuming, or am I missing some convenient way to check?

> > +            if ( ret )
> > +                return ret;
> > +
> > +            set_bit(shm_id, shm_mask);
> > +        }
> > +    }
> > +
> > +    return 0;
> > +}
> > +#endif /* CONFIG_STATIC_SHM */
> >  #else
> >  static void __init allocate_static_memory(struct domain *d,
> >                                            struct kernel_info *kinfo,
> > @@ -3150,6 +3258,12 @@ static int __init construct_domU(struct domain *=
d,
> >      else
> >          assign_static_memory_11(d, &kinfo, node);
> >
> > +#ifdef CONFIG_STATIC_SHM
> > +    rc =3D process_shm(d, node);
> > +    if ( rc < 0 )
> > +        return rc;
> > +#endif
> > +
> >      /*
> >       * Base address and irq number are needed when creating vpl011 dev=
ice
> >       * tree node in prepare_dtb_domU, so initialization on related
> > variables
> > --
> > 2.25.1

Cheers,

---
Penny Zheng
> >


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 08:38:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 08:38:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291799.495816 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV88K-0001Kn-JR; Fri, 18 Mar 2022 08:38:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291799.495816; Fri, 18 Mar 2022 08:38:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV88K-0001Kg-G8; Fri, 18 Mar 2022 08:38:52 +0000
Received: by outflank-mailman (input) for mailman id 291799;
 Thu, 17 Mar 2022 23:46:50 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Os4G=T4=gmail.com=colin.i.king@srs-se1.protection.inumbo.net>)
 id 1nUzpS-0005lX-2V
 for xen-devel@lists.xenproject.org; Thu, 17 Mar 2022 23:46:50 +0000
Received: from mail-wr1-x436.google.com (mail-wr1-x436.google.com
 [2a00:1450:4864:20::436])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 82d5d68b-a64c-11ec-8eba-a37418f5ba1a;
 Fri, 18 Mar 2022 00:46:48 +0100 (CET)
Received: by mail-wr1-x436.google.com with SMTP id d7so9579338wrb.7
 for <xen-devel@lists.xenproject.org>; Thu, 17 Mar 2022 16:46:48 -0700 (PDT)
Received: from localhost (cpc154979-craw9-2-0-cust193.16-3.cable.virginm.net.
 [80.193.200.194]) by smtp.gmail.com with ESMTPSA id
 v5-20020adfe4c5000000b001edc1e5053esm4860565wrm.82.2022.03.17.16.46.47
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Thu, 17 Mar 2022 16:46:47 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 82d5d68b-a64c-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:mime-version
         :content-transfer-encoding;
        bh=44jSVu9ViGX65V2KV4sJoKN91g8S2sbZ550L2N5DUJ4=;
        b=l/0VWzdsq+0tapKmp9GM2+I2R4GUGVKdkGWYWuAwvHzKLPI3p5TshglsScGVDa6NFW
         DaUSL0XENlAwNhjU9nCyUGZAAKbuLTE5fPZkTuqREBsP1ImFELxbCE3lmp3Tj4nI/jZy
         9MwmBjSZpXSmwI4DVJZDYjtVulXynQRqIUs3I7K0QsW9YAidOZSK0Tv9Ac8x3k42NYBa
         rI6tO6VGSjlkuhdZoQ0C6BU3ba7i/97qKi1VIMAusTrJVubzZfr5sUa8Dru53eP9ebuz
         wQGxh7PiQr4lqSAjy9LGqm91YM5rAGN3LoMMnC2WtFXix6zXjBdx0Wr+n4qempHJNmVk
         hZKA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version
         :content-transfer-encoding;
        bh=44jSVu9ViGX65V2KV4sJoKN91g8S2sbZ550L2N5DUJ4=;
        b=lJ9KCiYWSl63t/Ihvu688m9sOwaL+Z9wNLImdeJPORLDLg/o5GWa1cwklkok1qv8NL
         0jxLVwJ1d7msBIriuliY8e5w++ZyML5/vWExpFKzcut3GvAzBUsz4iwUi6yltEX3tiDH
         OGNAjP3gtk/JKkqcr8nBWcrCuvBhe6EmXxAWwsbeUnwU/5KxKVUvyi727eO8V6I0M5DS
         eAyEQvWUBwcE1w35lwoJndyeOWUdfTRT/S8e5MEMRDWSXsRtf4//NRWXS4Q435QVLtCP
         Zdfry5fjHIcNeMZAFv1OLspcrr+umoJJIONG56QjLG1E9cMajPWoaX+Kz5t/cB8RC58p
         cHZQ==
X-Gm-Message-State: AOAM530HW+u53FZnPD018sGKSJiJkvsWAtTMvGSIJbbdlrMqFon1D9oA
	Cfm5vocy6URxy2Ln9nD8A9M=
X-Google-Smtp-Source: ABdhPJxdH/WN2xf224PSCmdD+V5oRw0iLxFKpaeNeTNgCZ9Kx3jYO0+gAPl3kcA/9A7EbQbNAzpyng==
X-Received: by 2002:adf:efd2:0:b0:203:db42:c56c with SMTP id i18-20020adfefd2000000b00203db42c56cmr5842974wrp.698.1647560808002;
        Thu, 17 Mar 2022 16:46:48 -0700 (PDT)
From: Colin Ian King <colin.i.king@gmail.com>
To: =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Jens Axboe <axboe@kernel.dk>,
	xen-devel@lists.xenproject.org,
	linux-block@vger.kernel.org
Cc: kernel-janitors@vger.kernel.org,
	linux-kernel@vger.kernel.org,
	llvm@lists.linux.dev
Subject: [PATCH] xen-blkback: remove redundant assignment to variable i
Date: Thu, 17 Mar 2022 23:46:46 +0000
Message-Id: <20220317234646.78158-1-colin.i.king@gmail.com>
X-Mailer: git-send-email 2.35.1
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit

Variable i is being assigned a value that is never read, it is being
re-assigned later in a for-loop. The assignment is redundant and can
be removed.

Cleans up clang scan build warning:
drivers/block/xen-blkback/blkback.c:934:14: warning: Although the value
stored to 'i' is used in the enclosing expression, the value is never
actually read from 'i' [deadcode.DeadStores]

Signed-off-by: Colin Ian King <colin.i.king@gmail.com>
---
 drivers/block/xen-blkback/blkback.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/drivers/block/xen-blkback/blkback.c b/drivers/block/xen-blkback/blkback.c
index d1e26461a64e..de42458195bc 100644
--- a/drivers/block/xen-blkback/blkback.c
+++ b/drivers/block/xen-blkback/blkback.c
@@ -931,7 +931,7 @@ static int xen_blkbk_parse_indirect(struct blkif_request *req,
 	if (rc)
 		goto unmap;
 
-	for (n = 0, i = 0; n < nseg; n++) {
+	for (n = 0; n < nseg; n++) {
 		uint8_t first_sect, last_sect;
 
 		if ((n % SEGS_PER_INDIRECT_FRAME) == 0) {
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 18 08:46:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 08:46:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291944.495839 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV8FR-00030j-KG; Fri, 18 Mar 2022 08:46:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291944.495839; Fri, 18 Mar 2022 08:46:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV8FR-00030c-Gx; Fri, 18 Mar 2022 08:46:13 +0000
Received: by outflank-mailman (input) for mailman id 291944;
 Fri, 18 Mar 2022 08:46:12 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=XSx1=T5=kernel.org=sj@srs-se1.protection.inumbo.net>)
 id 1nV8FQ-00030A-28
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 08:46:12 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id d897220b-a697-11ec-8eba-a37418f5ba1a;
 Fri, 18 Mar 2022 09:46:04 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 3FA5AB8219B;
 Fri, 18 Mar 2022 08:46:04 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 80E1CC340E8;
 Fri, 18 Mar 2022 08:46:02 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d897220b-a697-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647593163;
	bh=cWhrXvFTgU1ErDA0SpUZ0GqSHdi4e6cPHYhyBk/nnAk=;
	h=From:To:Cc:Subject:Date:In-Reply-To:From;
	b=HkXAvEqfjW4y0Y9d10Fm4nJh6Pv3kZ8onmNVtoAG8zSMpgyvzOt6E7Fgs5YxQJqS3
	 0XtvCnUHrkgMONiKPca6DtFwKeRQakIjCyd1GCsuegsW7PQ+M8SBPEyL+AkoJPuQdH
	 B6YmSxSv7sjvV7DEAuFOYNK/MG6S4OcPZYZd0d+nTonhf+p6R9tdbWJjqXxOkmQ2iq
	 Ygzrb8BI2DpKiEgNQIRbrKdizN5pJdWX5jomUS+McL2C57j5YsMTjJM2x+9611/8cR
	 FyE7OYSlDsizFzz48RExcbrO2SOJvU/3HU2d1C0LWGQFzwqn7px0SCEcYSUJ+L6toI
	 9TaFGP1cKtlGA==
From: sj@kernel.org
To: SeongJae Park <sj@kernel.org>
Cc: roger.pau@citrix.com,
	jgross@suse.com,
	mheyne@amazon.de,
	xen-devel@lists.xenproject.org,
	linux-kernel@vger.kernel.org
Subject: Re: [PATCH] xen-blk{back,front}: Update contact points for buffer_squeeze_duration_ms and feature_persistent
Date: Fri, 18 Mar 2022 08:46:00 +0000
Message-Id: <20220318084600.26243-1-sj@kernel.org>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220301144628.2858-1-sj@kernel.org>

Hi Roger and Juergen,


May I ask your opinions to this patch, please?


Thanks,
SJ

On Tue, 1 Mar 2022 14:46:28 +0000 SeongJae Park <sj@kernel.org> wrote:

> SeongJae is currently listed as a contact point for some blk{back,front}
> features, but he will not work for XEN for a while.  This commit
> therefore updates the contact point to his colleague, Maximilian, who is
> understanding the context and actively working with the features now.
> 
> Signed-off-by: SeongJae Park <sj@kernel.org>
> Signed-off-by: Maximilian Heyne <mheyne@amazon.de>
> ---
>  Documentation/ABI/testing/sysfs-driver-xen-blkback  | 4 ++--
>  Documentation/ABI/testing/sysfs-driver-xen-blkfront | 2 +-
>  2 files changed, 3 insertions(+), 3 deletions(-)
> 
> diff --git a/Documentation/ABI/testing/sysfs-driver-xen-blkback b/Documentation/ABI/testing/sysfs-driver-xen-blkback
> index a74dfe52dd76..7faf719af165 100644
> --- a/Documentation/ABI/testing/sysfs-driver-xen-blkback
> +++ b/Documentation/ABI/testing/sysfs-driver-xen-blkback
> @@ -29,7 +29,7 @@ Description:
>  What:           /sys/module/xen_blkback/parameters/buffer_squeeze_duration_ms
>  Date:           December 2019
>  KernelVersion:  5.6
> -Contact:        SeongJae Park <sj@kernel.org>
> +Contact:        Maximilian Heyne <mheyne@amazon.de>
>  Description:
>                  When memory pressure is reported to blkback this option
>                  controls the duration in milliseconds that blkback will not
> @@ -39,7 +39,7 @@ Description:
>  What:           /sys/module/xen_blkback/parameters/feature_persistent
>  Date:           September 2020
>  KernelVersion:  5.10
> -Contact:        SeongJae Park <sj@kernel.org>
> +Contact:        Maximilian Heyne <mheyne@amazon.de>
>  Description:
>                  Whether to enable the persistent grants feature or not.  Note
>                  that this option only takes effect on newly created backends.
> diff --git a/Documentation/ABI/testing/sysfs-driver-xen-blkfront b/Documentation/ABI/testing/sysfs-driver-xen-blkfront
> index 61fd173fabfe..7f646c58832e 100644
> --- a/Documentation/ABI/testing/sysfs-driver-xen-blkfront
> +++ b/Documentation/ABI/testing/sysfs-driver-xen-blkfront
> @@ -12,7 +12,7 @@ Description:
>  What:           /sys/module/xen_blkfront/parameters/feature_persistent
>  Date:           September 2020
>  KernelVersion:  5.10
> -Contact:        SeongJae Park <sj@kernel.org>
> +Contact:        Maximilian Heyne <mheyne@amazon.de>
>  Description:
>                  Whether to enable the persistent grants feature or not.  Note
>                  that this option only takes effect on newly created frontends.
> -- 
> 2.17.1


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 08:46:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 08:46:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291943.495827 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV8FO-0002ko-C0; Fri, 18 Mar 2022 08:46:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291943.495827; Fri, 18 Mar 2022 08:46:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV8FO-0002kh-90; Fri, 18 Mar 2022 08:46:10 +0000
Received: by outflank-mailman (input) for mailman id 291943;
 Fri, 18 Mar 2022 08:46:09 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=prJz=T5=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nV8FN-0002kb-65
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 08:46:09 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04on0631.outbound.protection.outlook.com
 [2a01:111:f400:fe0e::631])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id da8ce04f-a697-11ec-853c-5f4723681683;
 Fri, 18 Mar 2022 09:46:08 +0100 (CET)
Received: from AM0PR04CA0064.eurprd04.prod.outlook.com (2603:10a6:208:1::41)
 by AM6PR08MB2968.eurprd08.prod.outlook.com (2603:10a6:209:43::17) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Fri, 18 Mar
 2022 08:46:06 +0000
Received: from VE1EUR03FT023.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:208:1:cafe::17) by AM0PR04CA0064.outlook.office365.com
 (2603:10a6:208:1::41) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17 via Frontend
 Transport; Fri, 18 Mar 2022 08:46:06 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT023.mail.protection.outlook.com (10.152.18.133) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Fri, 18 Mar 2022 08:46:05 +0000
Received: ("Tessian outbound 341d209a0e52:v113");
 Fri, 18 Mar 2022 08:46:05 +0000
Received: from 06eb4856fe1e.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 60C635F4-80E9-44DA-B0C6-05A95CDCDCF2.1; 
 Fri, 18 Mar 2022 08:45:58 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 06eb4856fe1e.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 18 Mar 2022 08:45:58 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com (2603:10a6:20b:85::25)
 by GV1PR08MB7364.eurprd08.prod.outlook.com (2603:10a6:150:23::8) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.22; Fri, 18 Mar
 2022 08:45:57 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62]) by AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62%3]) with mapi id 15.20.5081.018; Fri, 18 Mar 2022
 08:45:57 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: da8ce04f-a697-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=0vYsQuEsUZwzCWA1Pb2hcmj/8hztnph8Q+lwBvEea5A=;
 b=yE+bD0JuzAre9mjVXpWqIZLIQjyYDdM7B3Gq21sOzEahKGDmt9THJnXQH9sjjLpkVk9JioW4dmMVZYtGACuFV1xT3kPKYdQUUrkH57Xs1n3a3mkJBASLGERWv8ilNP8QAncc+H/YYzAm2JDWbjwirfKx5Du+EiysyYISF2H2jiA=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 21ec059039ac5651
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=mXtqVx/vCDKbf7nG/AtUBXgfpghPqUut0GuSvepxcGb25tyZ11DNU3q3tJVs1I6E0P0er8WKcGVRmGjCW9orLfo2E4xXs9mxDSDMeB+hWRStyuAofNsSjv+u04I6Z7Qmf2krfFku5ow63P1h0P8E+RFcst5lpJfmX5FzRRIi4ne4sFzQqjHtjvHHUF9kkg5AnIO5TnF2/9Ef5RSPQF/b/gBESwtHzKGek2md3/OO7LVaOBbCxCu50oeG+Q/X32ccFkvGrJID4E2dRMxHs3B4IAk1HP9maE6BHPdj5owDeaAfHO5DtcSM15ljr0ur96/oPUSgmqYGMbMOdiyjNKnIaA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=0vYsQuEsUZwzCWA1Pb2hcmj/8hztnph8Q+lwBvEea5A=;
 b=ZFIfmyeTlL+7VKz9B+42kIJfI1AQM4+tWAsVUWSDWZMKu7dqYiNZ2P3CsaayM2EvRoeAX9eyR27idt/JmyGZiCqi5Oi+DhFvBXsXJHPBvtBKGRW3JQCooSOVnh/BS2Xd3TpUR2iHqAqAOfL1vn7ZCCTkWQ+6saNIri0R+2xqKEpv7Mx2E4rh1t0JeYS2ax+6fc1Nowok5h9uCiJPOdmMU36PwavY3ecbO597KbPLVaqCsHpld0xk1Xh8M4adeRXsOYKZoPtAjnVZmZJNjT6jbAYEjTRdyMkCNSp6AxrfWDCU2OwA7wDlc8qrl+F6AKZ63ojFPiL1Mx70LmuTGokX4g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=0vYsQuEsUZwzCWA1Pb2hcmj/8hztnph8Q+lwBvEea5A=;
 b=yE+bD0JuzAre9mjVXpWqIZLIQjyYDdM7B3Gq21sOzEahKGDmt9THJnXQH9sjjLpkVk9JioW4dmMVZYtGACuFV1xT3kPKYdQUUrkH57Xs1n3a3mkJBASLGERWv8ilNP8QAncc+H/YYzAm2JDWbjwirfKx5Du+EiysyYISF2H2jiA=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Julien Grall <julien@xen.org>
CC: Xen-devel <xen-devel@lists.xenproject.org>,
	"marco.solieri@minervasys.tech" <marco.solieri@minervasys.tech>,
	"lucmiccio@gmail.com" <lucmiccio@gmail.com>, Julien Grall
	<jgrall@amazon.com>, Stefano Stabellini <sstabellini@kernel.org>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH early-RFC 1/5] xen/arm: Clean-up the memory layout
Thread-Topic: [PATCH early-RFC 1/5] xen/arm: Clean-up the memory layout
Thread-Index: AQHYM6fgzbIssM9RMEi7y17EBtCCCazDvrYAgABWJYCAAMz/AA==
Date: Fri, 18 Mar 2022 08:45:57 +0000
Message-ID: <2265666F-8CE4-4018-81E7-AD022F612F3B@arm.com>
References: <20220309112048.17377-1-julien@xen.org>
 <20220309112048.17377-2-julien@xen.org>
 <0E4A176E-BE1F-427F-8D4E-1AAEA811964C@arm.com>
 <78aaa9be-328b-76e4-42c0-b116ab194bdf@xen.org>
In-Reply-To: <78aaa9be-328b-76e4-42c0-b116ab194bdf@xen.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: e8f9df70-d4a4-404c-f073-08da08bbbd58
x-ms-traffictypediagnostic:
	GV1PR08MB7364:EE_|VE1EUR03FT023:EE_|AM6PR08MB2968:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR08MB2968E295FB02A29D36094D889D139@AM6PR08MB2968.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 6DFgHCO1rUge0dzKgzLknyS3eqNHvpC878gJyeXZXCmOtDyHjVp32GagJeE/qaKrt/nSg7c5z0biPO+GLhubsbqdu6OA2VbqDKCoVeFi2wGOWbDK4EkdsetBRrtSEHRf5R0Bva6aNMGaeVsuaZ1Bq5ja97DWgQI4t2gtkB71gdgsLMomRdnxVftHBTqPgJTZmc9F9p5JODbyrGS2nOupjAnGxKImOVITFp3F03Y0Ki086PsaEy9CRZtmQjoLohw392F7v+8jXMmCnfPe+dm86ra2JkaA7L3zZSBheQpUc7bqfJ31aDDu1AJ8VlO8E1ebFhKQqTqRrg2uwsudBP1it+W6nzRhKBtOK2ydFvElq0x7KS+Iy5c65tqTe3KsYjvHgmpt2LEa5ofCt7RMVBjn5VcN22T3s6R1bHzfn8qeaamFQHMT2GVarr/B8pbd2AzydvUsB7Ui4ePk597ZxJSFPNIcK7tAxjWsm3IVcnYQnWdKqpypaCAmKgtjx9JXhCmURwAXcvZYXL7tdWtcJ2vccZwMMwMtI0iZlrlfiPd8ou0nVq41Qpph346X5IE/Cm4g4AlA/J2UCSokwGo5MmlI3IFyLAELpYUD2WfnMH6Pic2SLcjSG/IDJXgh20fx/Ta69FWJa48ZkjVEtBjPUf2vV9wG/krZxvoDhFKwJ4mqbwuOa9kz2AU/ysJi65dv0EPM+g3s28IH3ZJnlBu5EVtQxhpPWI706JkupDP46ZggZXATctmlA1OC4jZizvdwYSie
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR08MB3784.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(8936002)(36756003)(5660300002)(38070700005)(83380400001)(186003)(26005)(2906002)(2616005)(6506007)(53546011)(122000001)(33656002)(38100700002)(54906003)(316002)(4326008)(6512007)(6916009)(86362001)(71200400001)(508600001)(6486002)(66446008)(64756008)(8676002)(76116006)(91956017)(66946007)(66476007)(66556008)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <29D83D5821E2A34E9AAE5C81EC2E5528@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: GV1PR08MB7364
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT023.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	e9beea2f-1171-4387-04aa-08da08bbb85f
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(508600001)(107886003)(4326008)(6862004)(70586007)(70206006)(2616005)(8676002)(26005)(186003)(336012)(81166007)(36860700001)(6486002)(53546011)(47076005)(6512007)(6506007)(5660300002)(2906002)(40460700003)(54906003)(316002)(82310400004)(83380400001)(33656002)(36756003)(86362001)(8936002)(356005);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 18 Mar 2022 08:46:05.3881
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: e8f9df70-d4a4-404c-f073-08da08bbbd58
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT023.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB2968

Hi Julien,

> On 17 Mar 2022, at 20:32, Julien Grall <julien@xen.org> wrote:
>=20
>=20
>=20
> On 17/03/2022 15:23, Bertrand Marquis wrote:
>> Hi Julien,
>=20
> Hi Bertrand,
>=20
>>> On 9 Mar 2022, at 11:20, Julien Grall <julien@xen.org> wrote:
>>>=20
>>> From: Julien Grall <jgrall@amazon.com>
>>>=20
>>> In a follow-up patch, the base address for the common mappings will
>>> vary between arm32 and arm64. To avoid any duplication, define
>>> every mapping in the common region from the previous one.
>>>=20
>>> Take the opportunity to add mising *_SIZE for some mappings.
>>>=20
>>> Signed-off-by: Julien Grall <jgrall@amazon.com>
>> Changes looks ok to me so:
>> Reviewed-by: Bertrand Marquis <bertrand.marquis@arm.com>
>> Only one question after.
>>>=20
>>> ---
>>>=20
>>> After the next patch, the term "common" will sound strange because
>>> the base address is different. Any better suggestion?
>> MAPPING_VIRT_START ?
>=20
> For arm32, I am planning to reshuffle the layout so the runtime address i=
s always at the end of the layout.
>=20
> So I think MAPPING_VIRT_START may be as confusing. How about SHARED_ARCH_=
VIRT_MAPPING?

>=20
>> Or space maybe..
>=20
> I am not sure I understand this suggestion. Can you clarify?

VIRT_SPACE_START was in my mind at that time but that is also not good

How about using BASE instead of start: MAPPING_COMMON_VIRT_BASE ?

Anyway hard to find a nice name, so your solution with SHARED is ok for me =
unless someone has a better suggestion.

>=20
>>> ---
>>> xen/arch/arm/include/asm/config.h | 24 +++++++++++++++++-------
>>> 1 file changed, 17 insertions(+), 7 deletions(-)
>>>=20
>>> diff --git a/xen/arch/arm/include/asm/config.h b/xen/arch/arm/include/a=
sm/config.h
>>> index aedb586c8d27..5db28a8dbd56 100644
>>> --- a/xen/arch/arm/include/asm/config.h
>>> +++ b/xen/arch/arm/include/asm/config.h
>>> @@ -107,16 +107,26 @@
>>>  *  Unused
>>>  */
>>>=20
>>> -#define XEN_VIRT_START         _AT(vaddr_t,0x00200000)
>>> -#define FIXMAP_ADDR(n)        (_AT(vaddr_t,0x00400000) + (n) * PAGE_SI=
ZE)
>>> +#define COMMON_VIRT_START       _AT(vaddr_t, 0)
>>>=20
>>> -#define BOOT_FDT_VIRT_START    _AT(vaddr_t,0x00600000)
>>> -#define BOOT_FDT_SLOT_SIZE     MB(4)
>>> -#define BOOT_FDT_VIRT_END      (BOOT_FDT_VIRT_START + BOOT_FDT_SLOT_SI=
ZE)
>>> +#define XEN_VIRT_START          (COMMON_VIRT_START + MB(2))
>>> +#define XEN_SLOT_SIZE           MB(2)
>> I know this is not modified by your patch, but any idea why SLOT is used=
 here ?
>> XEN_VIRT_SIZE would sound a bit more logic.
>=20
> No idea. I can add a patch to rename it.

I think it would be a good idea, we already have a lot of terms in here and=
 SLOT is just adding to the confusion I find.

Thanks
Bertrand



From xen-devel-bounces@lists.xenproject.org Fri Mar 18 08:50:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 08:50:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291950.495850 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV8J8-0003zm-5Y; Fri, 18 Mar 2022 08:50:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291950.495850; Fri, 18 Mar 2022 08:50:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV8J8-0003ys-1v; Fri, 18 Mar 2022 08:50:02 +0000
Received: by outflank-mailman (input) for mailman id 291950;
 Fri, 18 Mar 2022 08:50:00 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=eTtb=T5=citrix.com=prvs=069af078f=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nV8J6-0003ya-4j
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 08:50:00 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 62f3a9f2-a698-11ec-853c-5f4723681683;
 Fri, 18 Mar 2022 09:49:58 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 62f3a9f2-a698-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647593398;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=y3TVysCnTsChceQa/duCopfCWNMfkj8gGZm1vdYlZRM=;
  b=iiCn74rLgZBpQXY2zFN/2EpoECPupvJfuZJ2LBT9+gvgwO1iILZ8Ry/5
   hm9kfus+b69gIc+nIOv7VnQKw+B+trPKtk859Qz910eRRCFyVFzqQHADb
   B+nIOFKXJwcM970HsT3UC6eWN92W0rRj2XyQ9trt40/nLBhWul98xi1Mg
   o=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66983729
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:QMVsQqp3zLvo9N+eZsVRmCq0ZzleBmLeZRIvgKrLsJaIsI4StFCzt
 garIBmGOPqJY2qnf9t2PI22px4Pv5SEz94wSgFvqC9mFS0Wp5uZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 IOq+qUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBHvyPx8Q8Xz9hMCw5G6Jf/aTfEGGzrpnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVI1zbWAOxgWZnea67L+cVZzHE7gcUm8fP2O
 ZRIOWEwNkWojxtnZ2Y8MM0Mp9WToHzUeSVx9nuX+ZEQ2j2GpOB2+Oe0a4eEEjCQfu1Fk0Ddq
 m/Y8mDRBhABKMfZ2TeD6mirhOLEgWX8Qo16PLm58ON6xV6e3GoeDDUIWlah5/q0kEizX5RYM
 UN80i8uoLk0+WSiS9DvWBv+rHPslgUec9ldCes37EeK0KW8ywSWHG8fVRZadccr8sQxQFQXO
 kShxo2zQ2Y16fvMFCzbpuz8QS6O1TY9DT5BOg8lQS08wNSkho4qiwnXf89vD/vg5jHqIg3Yz
 zePpSk4orwci88Xyqm2lWz6byKQSovhFVBsuFiONo6xxkYgPdP+OdT0gbTOxawYRLt1WGVtq
 5TtdyK2yOkVRa+AmyWWKAnmNOH4vq3VWNEwbLMGInXAy9hP0yP7FWyzyGsnTKuMDiriUWWxC
 KM0kVkNjKK/xFPwMcdKj3uZUqzGN5TIG9X/TezzZdFTeJV3fwLv1HgwORHNgTm0yxBxyfhX1
 XKnnSCEVypy5UNPlmfeegvg+eVzmnBWKZ37GPgXMChLIZLBPSXIGN/pwXOFb/wj7bPsnekm2
 403Cid+8D0GCLeWSnCOqeY7dAlWRVBmVcGeg5EGLYarf1s5cFzN/teMmNvNjaQ+xP8L/goJl
 1ngMnJlJK3X3iSWd1/VNig9NNsCn/9X9BoGAMDlBn7xs1ALaoez9qYPMZwxeLgs7ut4yvBoC
 fICfq297j5nGlwrJxx1gUHBkbFf
IronPort-HdrOrdr: A9a23:Gmu2Oavjxxgkli607VT3NdNM7skCkoMji2hC6mlwRA09TyXGra
 6TdaUguiMc1gx8ZJhBo7C90KnpewK7yXdQ2/htAV7EZnibhILIFvAZ0WKG+Vzd8kLFh4tgPM
 tbAsxD4ZjLfCdHZKXBkXmF+rQbsaG6GcmT7I+0pRodLnAJV0gj1XYDNu/yKDwGeOAsP+tBKH
 Pz3Lshm9L2Ek5nEPhTS0N1FNTrlpnurtbLcBQGDxko5E2nii6p0qfzF1y90g0FWz1C7L8++S
 yd+jaJq5mLgrWe8FvxxmXT55NZlJ/IzcZCPtWFjowwJi/3ggilSYx9U/mpvSwzosuo9FE2+e
 O86SsIDoBW0Tf8b2u1qRzi103J1ysv0WbrzRuijX7qsaXCNUQHIvsEobgcXgrS6kImst05+r
 lMxXilu51eCg6FtDjh5vDTPisa2HackD4Hq6o+nnZfWYwRZPt6tooE5n5YF58GAWbT9J0nKu
 9zF8vRjcwmPm9yV0qp/lWH/ebcHUjaRny9Mwo/U42uonRrdUlCvgolLJd1pAZEyHo/I6M0kN
 gsfJ4Y0I2mdfVmH56VNN1xMvdfNVa9NC4kEFjiaGgPR5t3c04klfbMkcEIDaeRCds18Kc=
X-IronPort-AV: E=Sophos;i="5.90,191,1643691600"; 
   d="scan'208";a="66983729"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=VveOmO/KJE/L3E3Vj+qrzBpv2ZA31dxoMmJZDsTNF5ggYa8J/+mNAm8A5a/icLFhVDNA1RadPwr6dMFuh9YruiqQmQKXtQvgQD7FGuFXKkXvMu8P0loDRSKc20gHFCDA/FhxzvRibjk3C2TT9y3IdZv++fpUViHc+TlRz/w2+W4R43PDW7ELtZalcRH5UrYqvv8ofO/aOTR1lpDiJkCe10IwZqGipv99fHHSNuPiTg9qUhfGOyDweX1U/ufpk2Eh+bRQnQplGu6BjElXN6FGV4bopRYnfoJFz7K6AzFKEa6OzQeh7Qz6WsXzA8WPaOdu0vmvqmPyir0nAAfFakljEA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=rbxjN91XX0D2KTVVL4qj+OaDO2AHs/sSAc4R1mDZ4AA=;
 b=PYFP6gO26afJwLAmsNtz5gV68V3nOa0n6e1m0ZJGF3YMyYUMU+VCUsmYe79zrtFuFNQiAwednNu1YnJLG1JI1EUvbxQ0XqA7DC6Gp1Frmqo+Y/yxJ31i/gxTmTV958c3wZ/N0iraJR2Kp1CgILPMu8ztihgx+LvhResBNUktZzUp/9F7XYSVDO6S2D4sMK3fMBY+1onbbMMiHoTRNkZHzvEjRF6uKwAXQzQ5s36cd9EXgtoJtZyIcI0nPkZMeKSGS/PUc1Pb5Tn742ljTNWlydP3z8O8oeUJBn5E6XHdPxkYQPjCNnMiu39ZYMrWkCWZaQym0znohVpdDPZRjCajew==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=rbxjN91XX0D2KTVVL4qj+OaDO2AHs/sSAc4R1mDZ4AA=;
 b=ejDem0m6v6eOeSarFBuOGfyvLOJ1yMnw7M587HbR0eayUyZo3mpMeZCzbPL6tuTVmzXT1CAcuw/upH+mlV3LDTAJ2u5s9KjNbaiBCuSMyjVLhQxyd3zXGW/Mu1Y/tSUKwWhfSRNFQb9z46rQOrhjR71anicbY3bfgArT77LBB3U=
Date: Fri, 18 Mar 2022 09:49:43 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: <sj@kernel.org>
CC: <jgross@suse.com>, <mheyne@amazon.de>, <xen-devel@lists.xenproject.org>,
	<linux-kernel@vger.kernel.org>
Subject: Re: [PATCH] xen-blk{back,front}: Update contact points for
 buffer_squeeze_duration_ms and feature_persistent
Message-ID: <YjRHp8E6Ehm24QgC@Air-de-Roger>
References: <20220301144628.2858-1-sj@kernel.org>
 <20220318084600.26243-1-sj@kernel.org>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <20220318084600.26243-1-sj@kernel.org>
X-ClientProxiedBy: LO4P123CA0129.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:193::8) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 9649d89c-4118-49a6-896a-08da08bc4297
X-MS-TrafficTypeDiagnostic: DM6PR03MB3593:EE_
X-Microsoft-Antispam-PRVS: <DM6PR03MB35935EB16FA54B8FED5756908F139@DM6PR03MB3593.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(5660300002)(38100700002)(86362001)(8676002)(85182001)(15650500001)(4326008)(66556008)(9686003)(6512007)(6916009)(66946007)(316002)(2906002)(83380400001)(6666004)(508600001)(6506007)(8936002)(66476007)(33716001)(26005)(186003)(82960400001)(6486002)(4744005);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?MU4zZjZHazhwRUowR1dBcFFVS1YzUGNncU9TcGVGaXJYWlRxUlJKTVRsNzdr?=
 =?utf-8?B?cmFoeTk5V2NpeFNSUVJDY2lMOGFJd0czb1o4dzZRd2E0bndIZVdrUGEwQU9W?=
 =?utf-8?B?eWxkY3ZlNTNDSWtqVTIzRlpaYXlzcThkSW9jZCtxMXZKaHVGeDhDdzhPQm1P?=
 =?utf-8?B?ZFVJbWtqYjJmdFluc0Q4elFMWlJ2Ukp3c01WcCtrbGh2QXF3SE8wL3o4cFdF?=
 =?utf-8?B?ZExKaGJyWXROOVdkeE54QzZSOW9PMzVxNU11azhTRm05Z3pmUWpkdGFDZXpR?=
 =?utf-8?B?WC9ITFBMa0g0YllxNk91bG9MZkZqVzY1MFZ1ZVFhUWlsSVNkWDJPdkI2blgz?=
 =?utf-8?B?NHMrTW5zMDd1N3dkQTBzakFpaXhIUW1SOGZFM3lMRk1MY0RPQ3RLNEMvdmlx?=
 =?utf-8?B?VERWekpMQUxBZjMwcUY0NzFxWmJKc0tuSmYwd2pMM0V1S1FIY1NwUVBLR2Y5?=
 =?utf-8?B?eVpUdVB0a1ZsUHhqU0JBUGJwYUR6ZlZCU1p3aklkT2VBd05EVWI3cndEck5M?=
 =?utf-8?B?MHpKOU5WaUJXLytQMVIyUlhZV1dqL3FadW1oZ0JKUGZXaUs4eXZPdnFoTThz?=
 =?utf-8?B?Sm1qbi9vQlJzUjdBUk5tZjEvNTJQb3JLWm1QMWtHK2NSYis3OHZadW56UFla?=
 =?utf-8?B?ajdXWVZ6QktzdEtoY2FWUy80YUlVdVh1bHZ1RlhlSC9aY3k4Nk5zK0x5VXgw?=
 =?utf-8?B?YXdiNm9nOWQxWlpPOElpcGxiVHNoYnQxRHE5QWhTWHN2c3k4dXltNWVtdkhl?=
 =?utf-8?B?bGNnaXFpbHJvMkN0M1JjYUd6M1lnRjZlc3BERjJrQmZldTZ4bmdrSXBURUF0?=
 =?utf-8?B?VGxyQVR2YUcwUkkxeEl2cVVNMmVYQjFDSzhVUURjVGl5ZDJYQlNtNWNmWGlR?=
 =?utf-8?B?WWlRVjNOYXNzaWpSRGFYQmY4ZmFhQkxIVG9FaTJxK2hIT0V2eFlyQmpwck9w?=
 =?utf-8?B?OUpNUWpCakE4bDhqcDlaTG5KSCs2dTFCeURmQzMrWVpzWEtDb1hpQng3dXJG?=
 =?utf-8?B?SmRNL1VpK3lRaUh4OWlyODVZS2VxOXc5Z0twNmJrYmo1N2doWEtQcWFFTjJv?=
 =?utf-8?B?cS9FWVhmKzYyNDM4QXdHcWN1OXRrb1R6eXdidkRNb1FEWTM2SnY2c2Jmakgy?=
 =?utf-8?B?TEd2cWIyTXlnaUxPYXFxWUJ5dFVNRUEwcHU4cytnWjZjMElpRlpjaklYSjdH?=
 =?utf-8?B?UzFRR1JTK3FsNHB0RVFteldQZFhQczdtUzNHR3J6TVNCeFMzUW52LzZMbG15?=
 =?utf-8?B?Y0tuQ0M0Y0JFT29BcEVzc3VTazcvOERCaiswLzc4dUIzamlkRXNNd3RGTzg2?=
 =?utf-8?B?cTB3a3pRN25rYnhIeW1iVEdLVFRYVGdCQ0UwbUtvUnpsWnM2dVNRUUNMRzAw?=
 =?utf-8?B?SzdSVVZBZXY0VjZRTjVRTDF4TlJaYVV3M20yb1gyWlVvMTlaVXc5RGt2c0tn?=
 =?utf-8?B?TVNFZ3VERGpSem9CKzB5eURQNUI5SW9hdnhMY1RXUjM3REREbGtKNS9ZR0Jv?=
 =?utf-8?B?d3l4RzRMQll2ZE9mNmFKNTVVQzJHWDB4aDRkalR6QWFraFFBSEZLN1ErcVJI?=
 =?utf-8?B?V1NsbW40NWxSRy9COEw0RnZ2bXA0N0lTc3VXN2FQZFF6WUVzSHByUE9kWUpS?=
 =?utf-8?B?ME9TNnNCbThKZ0dIakxaa0VIWVJQT2d5OWcrSC9NenplN0ROS3p3aFRYOTFp?=
 =?utf-8?B?ZFVaMmRuZ2d0cnFIZ3RGd2xmZkY5elFZdWRTRVRFbHBOaVZxQi9EenQ0akps?=
 =?utf-8?B?SlNXYzZLV1kvczZQY0ZZZ3hobkphMVN4LzJYaitwSmxpMTdPR3FMSlVyK0pC?=
 =?utf-8?B?ekNMdklENFdQWXBzcEVENzFwL050Mno3WEZSZzJPNTlqK0xVcmRYUy9uSEtx?=
 =?utf-8?B?Tk9IelZGNGFWVUQrWVIxUnEvTmkwRjBORUtOMGNaTkhKUGE2RzlIRjVXblJm?=
 =?utf-8?Q?uUvlhXewm9sUF0S+MWBhriyNldYL6lyy?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 9649d89c-4118-49a6-896a-08da08bc4297
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 18 Mar 2022 08:49:49.1998
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: IwO6da152Wq23fNy/wgmA+DAyBUf35et8ZvQimbHmtf1JKfc6DH74B6C6xlT9FxacKQNzZna1Ku8a1JS7PupFw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR03MB3593
X-OriginatorOrg: citrix.com

On Fri, Mar 18, 2022 at 08:46:00AM +0000, sj@kernel.org wrote:
> Hi Roger and Juergen,
> 
> 
> May I ask your opinions to this patch, please?

Sorry, I was expecting Maximilian to Ack it, but I see he is added as
SoB.

> 
> 
> Thanks,
> SJ
> 
> On Tue, 1 Mar 2022 14:46:28 +0000 SeongJae Park <sj@kernel.org> wrote:
> 
> > SeongJae is currently listed as a contact point for some blk{back,front}
> > features, but he will not work for XEN for a while.  This commit
> > therefore updates the contact point to his colleague, Maximilian, who is
> > understanding the context and actively working with the features now.
> > 
> > Signed-off-by: SeongJae Park <sj@kernel.org>
> > Signed-off-by: Maximilian Heyne <mheyne@amazon.de>

Acked-by: Roger Pau Monné <roger.pau@citrix.com>

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 08:53:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 08:53:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291954.495861 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV8MZ-0005PW-Q1; Fri, 18 Mar 2022 08:53:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291954.495861; Fri, 18 Mar 2022 08:53:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV8MZ-0005PP-Mm; Fri, 18 Mar 2022 08:53:35 +0000
Received: by outflank-mailman (input) for mailman id 291954;
 Fri, 18 Mar 2022 08:53:34 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=9SAg=T5=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nV8MY-0005PJ-9h
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 08:53:34 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e2dca272-a698-11ec-8eba-a37418f5ba1a;
 Fri, 18 Mar 2022 09:53:31 +0100 (CET)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur01lp2054.outbound.protection.outlook.com [104.47.0.54]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-22-cKEKuEC-NN6z9WmMn8v0eg-1; Fri, 18 Mar 2022 09:53:29 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by VI1PR04MB5966.eurprd04.prod.outlook.com (2603:10a6:803:d7::27)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.18; Fri, 18 Mar
 2022 08:53:27 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d%9]) with mapi id 15.20.5081.018; Fri, 18 Mar 2022
 08:53:26 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e2dca272-a698-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647593611;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=TzPr8GVFOOilUUuLAssPglcr0JrrBJPBMDCvT9TuiX4=;
	b=CyHxpDU5ziRPT5hKNM45UWSwUWL9QAU/jPefX/jX1WmgNTUXqsSUdbYC0/LrtG9E/tONnF
	B2PPzMtkexXAeeuIzcE0OBWpdzSDaAnBhQJ8WIdy0EHDXUPmxMvQj36NxtZ8tSPIE3PYAF
	sj2Zv1jKgU5RP5QeHWIIvIuUTxJoi5Y=
X-MC-Unique: cKEKuEC-NN6z9WmMn8v0eg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=IZd/6Lw8caj3K2V6KOn8tVeKPtnArfeiKhYrIppfE1A/mB88X9wrWtX7qEHRKDE073vo53OEw0CKi400PC4f+O+hZWutyNrxPhdXxBI23HWFRSKOxgZ5fLQNEPZvi/8mvWRjfGvp9HlsJW2EXTLVvgsMR3LVVEL/1tm7ZHE+gpK8mJE80/X6pnGRr2+x5iGN3YJb3aImr/NPgarlwrTxBXOH1SMAqYlMP0QfBJjl0V32kI+mntzLGFJFs4afd8DsHclALhq5lMnCj7nglDSalJwkjAoMw0mtM7KRvFb7pAOc61YBRi+HH1WRHBRYiJD5J1j4XPzdNz7O6qvOt5k/1A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=TzPr8GVFOOilUUuLAssPglcr0JrrBJPBMDCvT9TuiX4=;
 b=n+dKsIRQSuClBzKcb0jtsEWAJ1dLIsC3ovKcW3ukP7wNUPfc5kXMoC6YgCxyHSvfWdBxedvS9pzkhPLk5pWaNc1gbgogeI2rYj4AJ6I7TQLipQ/lFn8hPIpeERmlZ7OEhWnHUks5Z5UVZWEAX5m7sWUJ/JeQFcCFZWQxiRM6MwXvN+N3RnFprk/gX24SqYtmNvc65mdHBWy0sUa/TygXWKqQB8GTiwQ3o3KjYFMw+ZMZTTbdAX1rXAQRCA87LBkD50mGMHmHJNQ0hVwqtlmxrlXdXGWGXWwSsCPYqpTdieTCrTq2WgklQd8L8okfAyu3TxYepTuAgZkfALzVVXocHg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <eefa9cf2-a04c-ba8d-74cb-0d2aaa35badb@suse.com>
Date: Fri, 18 Mar 2022 09:53:24 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v1 02/13] xen/arm: introduce a special domain DOMID_SHARED
Content-Language: en-US
To: Penny Zheng <Penny.Zheng@arm.com>
Cc: nd@arm.com, Penny Zheng <penzhe01@a011292.shanghai.arm.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220311061123.1883189-1-Penny.Zheng@arm.com>
 <20220311061123.1883189-3-Penny.Zheng@arm.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220311061123.1883189-3-Penny.Zheng@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR06CA0178.eurprd06.prod.outlook.com
 (2603:10a6:20b:45c::10) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: a709d170-2c98-4f99-f0df-08da08bcc464
X-MS-TrafficTypeDiagnostic: VI1PR04MB5966:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB596614CD541D0AA10C60AF59B3139@VI1PR04MB5966.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(54906003)(6916009)(508600001)(6486002)(86362001)(36756003)(31686004)(2906002)(316002)(38100700002)(83380400001)(8676002)(4326008)(66946007)(66556008)(66476007)(31696002)(53546011)(5660300002)(6512007)(8936002)(7416002)(26005)(186003)(2616005)(6506007)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?OHNkS052czVVd2g3Ti9TcDVIMDJrRlozck1DWSt3ZnF5SVVNNHA3dnpMdEMv?=
 =?utf-8?B?NlhsQzlOVXpNNlhyRjMrUjluemxWMkhzeU9pdk02Kzk4RXBQTFBxZUZZb1l1?=
 =?utf-8?B?ZHVDbkprTGJhekhrbmRweDhMSzg3S05hS3JoU0ViMnVEc21LMGUrWmszVVBo?=
 =?utf-8?B?aEJ6TGwxaGhrMlZRRnU1MXdFMitoNGNTczFsRFF0TXFoUW4yckNVd3RVaU51?=
 =?utf-8?B?UVRRcnRveXJucFZGc1Buc081VGtuWkxzWlRsS2hHamt5cjY2eTBrYVA2eU5N?=
 =?utf-8?B?VTNVb0duclVBNFNWY0xtU3NqVUtldE5JTkI4T2VvRjNkOVQra2VnNmpKa0Nv?=
 =?utf-8?B?TnhubDkxT2ZTYmZzR0VYZVpGQW9ZNnJkNVBsU01vaXIyYlFsbWxsZ3ZTem4z?=
 =?utf-8?B?cHYyd3ZkN0djYUxhdkRsKzQzU1IvL0JDTWNNRkpqM3IzdDZ1N0YwRWVWNjZV?=
 =?utf-8?B?dHRHQUdvdEtWdFJVdGczdk5sWlJuRVpJV2JtRVRiWTE2ZWh4WjZqQ20vVVVE?=
 =?utf-8?B?ZmRJTWcycnU5SVE3Q1RBSkVvZWg4clA0cjZXVmI5MVJ5dlEwYXZsNFVXKzFG?=
 =?utf-8?B?VERzT09mR1VlMkNJdUxSRTVpTTJtN0JHZVlNejdXVTNxTUs2dS9QanM0ek50?=
 =?utf-8?B?RmRqSk5ET090ZTZBcTZaZk9WeWNnRVQrZU1JazdRdlp3TU5aU2NzOVYrM1RI?=
 =?utf-8?B?Zy9xU241eEtpeERJeTR6MjFYSTVhY3Z2VkV1NllGS0xqejdYbFBNUnExTXUw?=
 =?utf-8?B?ZE9YVFVLQWd6NXJ3TXRIRmRpejl0MklPMVRHd2ZneFBtRVUxanJ3bm9MSVRz?=
 =?utf-8?B?L0laNW0yajFxRHptQnRidEN2SitpQmdFMFk3ejhPaHZhNFRxRjl0OXcxMDcx?=
 =?utf-8?B?NkJMUHRYNm9UWmV4OVc0cXhudzBxWnFGWW54S1hHYXFNQWE1MWovbWhnM1dF?=
 =?utf-8?B?SFovakRvakJpQkdWOEFqQ0cvRWIza0ZLZnBDU2FkUE5oa0NQNWxLNmN5S3Iz?=
 =?utf-8?B?ZkVXS1NOWE1sQnZmZVFpVzl3SVBzZzhGNm1BeTNZdjlxajgzYk5lN253Z2pJ?=
 =?utf-8?B?aFdkUFZZcTI3VUlVY3VoMklSb0JnSzhMT1lOQUJLbEVQck4rdWxvQml1ZGRC?=
 =?utf-8?B?VWh3b0hJSW40cUlIWXFSRm9iRTZlUlZJeGZxT1h1Z3FSVmdlVG9TQVF2OXRt?=
 =?utf-8?B?cGlHbnR2bTFEcmNIY24rK0JyWVE3bi96YW5OQ1VFdGY1eXlWSW4yUXgxMGtT?=
 =?utf-8?B?cEQ0ZUNya2o0aCtXZmlOM1JSbXdNYlIxK2kzbVpodVZvRXl1K1RpakUvWm9T?=
 =?utf-8?B?TWFUWVM1cGVURFNzNFhSNEp5K1VPNzdTZm9jc0ZuWU0wdDJJSXI2QjdCU1Uz?=
 =?utf-8?B?aU5rQWxxeEo3a3daNnYyaGVHVkc4enpYNExsQ0R6dkJvdGxpU2NjT2FSZWlZ?=
 =?utf-8?B?MVBqWnpiQ1JuU250Vlo3cG0ranc4amZRYlYvYUFTS0RveVdvVHEzRHdNaEFH?=
 =?utf-8?B?NmU2VVI4MUV2d0xzZmt5aTVvQU5XbGVYZ0ZBd2h3eThXenBCN3BFYTdvZkVr?=
 =?utf-8?B?ZEFGMTlQeUhqYkFFVzZJRW9ad01zZzhmUGxFc0cvcmJuL2hsMjIzOFhlZ21D?=
 =?utf-8?B?RWxIY0haQVI0cDRTTnVYeTY4RkFjZytEdW9UOGdKRU1GbmpqODhNV1c5TlVi?=
 =?utf-8?B?T09VVjlZd25pS05xcHRZb05MUkw3VGcrU0hJZ0JBd0pzOHd5RWFJc08ySUxF?=
 =?utf-8?B?b29RWUE0R29YWExCb1NUN3J3YU03YU5adFd3d2tQUTdGTDRxbE5jYWczOW5Q?=
 =?utf-8?B?YVlIL3phbm1iQTlud1V1N0ExWXVpbDN5TzgvUWVhMUtoazR6U1hHbjZCRGdF?=
 =?utf-8?B?N2taZ0FSTmJmMnU3dVVEazBUUU8zUVRyUTVZOXBocENmeGtNSFVBb3RBdjFj?=
 =?utf-8?Q?N+tCIyRzFTpslEXRHHWE/PqnKk8xYRb/?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a709d170-2c98-4f99-f0df-08da08bcc464
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 18 Mar 2022 08:53:26.9107
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 3Y8ioq9wUNPKPBcuQLBZuuU6pMpvxWpqawC09LyhXbkZUrobUFjO0hQswxxxoz+J3EHVZtqCl29etX8/2Keysw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB5966

On 11.03.2022 07:11, Penny Zheng wrote:
> In case to own statically shared pages when owner domain is not
> explicitly defined, this commits propose a special domain DOMID_SHARED,
> and we assign it 0x7FF5, as one of the system domains.
> 
> Statically shared memory reuses the same way of initialization with static
> memory, hence this commits proposes a new Kconfig CONFIG_STATIC_SHM to wrap
> related codes, and this option depends on static memory(CONFIG_STATIC_MEMORY).
> 
> We intends to do shared domain creation after setup_virt_paging so shared
> domain could successfully do p2m initialization.

There's nothing said here, in the earlier patch, or in the cover letter
about the security aspects of this. There is a reason we haven't been
allowing arbitrary, un-supervised sharing of memory between domains. It
wants clarifying why e.g. grants aren't an option to achieve what you
need, and how you mean to establish which domains are / aren't permitted
to access any individual page owned by this domain.

> --- a/xen/arch/arm/Kconfig
> +++ b/xen/arch/arm/Kconfig
> @@ -106,6 +106,13 @@ config TEE
>  
>  source "arch/arm/tee/Kconfig"
>  
> +config STATIC_SHM
> +       bool "Statically shared memory on a dom0less system" if UNSUPPORTED
> +       depends on STATIC_MEMORY
> +       default n

Nit: "default n" is redundant and hence would imo better be omitted.

> @@ -712,12 +716,16 @@ int arch_domain_create(struct domain *d,
>      d->arch.directmap = flags & CDF_directmap;
>  
>      /* p2m_init relies on some value initialized by the IOMMU subsystem */
> -    if ( (rc = iommu_domain_init(d, config->iommu_opts)) != 0 )
> +    if ( (rc = iommu_domain_init(d, is_shared_domain(d) ? 0 : config->iommu_opts)) != 0 )

Nit: Overlong line.

> --- a/xen/arch/arm/setup.c
> +++ b/xen/arch/arm/setup.c
> @@ -855,6 +855,20 @@ static bool __init is_dom0less_mode(void)
>      return ( !dom0found && domUfound );
>  }
>  
> +#ifdef CONFIG_STATIC_SHM
> +static void __init setup_shared_domain(void)
> +{
> +    /*
> +     * Initialise our DOMID_SHARED domain.
> +     * This domain owns statically shared pages when owner domain is not
> +     * explicitly defined.
> +     */
> +    dom_shared = domain_create(DOMID_SHARED, NULL, CDF_directmap);
> +    if ( IS_ERR(dom_shared) )
> +        panic("Failed to create d[SHARED]: %ld\n", PTR_ERR(dom_shared));

I don't think this should be a panic - the system ought to be able to
come up fine, just without actually using this domain. After all this
is an optional feature which may not actually be used.

Also, along the lines of what Stefano has said, this setting up of
the domain would also better live next to where the other special
domains are set up. And even if it was to remain here, ...

> @@ -1022,6 +1036,14 @@ void __init start_xen(unsigned long boot_phys_offset,
>      apply_alternatives_all();
>      enable_errata_workarounds();
>  
> +#ifdef CONFIG_STATIC_SHM
> +    /*
> +     * This needs to be called **after** setup_virt_paging so shared
> +     * domains could successfully do p2m initialization.
> +     */
> +    setup_shared_domain();
> +#endif

... the #ifdef-ary here should be avoided by moving the other
#ifdef inside the function body.

> --- a/xen/common/domain.c
> +++ b/xen/common/domain.c
> @@ -643,11 +643,14 @@ struct domain *domain_create(domid_t domid,
>  
>      rangeset_domain_initialise(d);
>  
> -    /* DOMID_{XEN,IO,etc} (other than IDLE) are sufficiently constructed. */
> -    if ( is_system_domain(d) && !is_idle_domain(d) )
> +    /*
> +     * DOMID_{XEN,IO,etc} (other than IDLE and DOMID_shared) are
> +     * sufficiently constructed.
> +     */
> +    if ( is_system_domain(d) && !is_idle_domain(d) && !is_shared_domain(d) )
>          return d;
>  
> -    if ( !is_idle_domain(d) )
> +    if ( !is_idle_domain(d) && !is_shared_domain(d) )
>      {
>          if ( !is_hardware_domain(d) )
>              d->nr_pirqs = nr_static_irqs + extra_domU_irqs;
> @@ -663,7 +666,7 @@ struct domain *domain_create(domid_t domid,
>          goto fail;
>      init_status |= INIT_arch;
>  
> -    if ( !is_idle_domain(d) )
> +    if ( !is_idle_domain(d) && !is_shared_domain(d) )
>      {
>          watchdog_domain_init(d);
>          init_status |= INIT_watchdog;

All of these extra is_shared_domain() are quite ugly to see added.
First and foremost going this route doesn't scale very well - consider
how the code will look like when two more special domains with special
needs would be added. I think you want to abstract this some by
introducing one (or a small set of) new is_...() or e.g. needs_...()
predicates.

Further (there's no particularly good place to mention this) I'm
afraid I don't view "shared" as a good name: It's not the domain
which is shared, but it's the domain to hold shared memory. For this
my first consideration would be to see whether an existing special
domain can be re-used; after all the set of reserved domain IDs is
a very limited one, and hence each value taken from there should come
with a very good reason. We did such re-use e.g. when introducing
quarantining for PCI devices, by associating them with DOM_IO rather
than inventing a new DOM_QUARANTINE. If there are good reasons
speaking against such re-use, then I'd like to ask to consider e.g.
DOMID_SHM / DOMID_SHMEM plus associated predicate.

> --- a/xen/common/page_alloc.c
> +++ b/xen/common/page_alloc.c
> @@ -2616,6 +2616,11 @@ struct domain *get_pg_owner(domid_t domid)
>  
>      switch ( domid )
>      {
> +#ifdef CONFIG_STATIC_SHM
> +    case DOMID_SHARED:
> +        pg_owner = rcu_lock_domain(dom_shared);
> +        break;
> +#endif

Please can you avoid #ifdef in cases like this one, by instead using

    case DOMID_SHMEM:
        pg_owner = dom_shared ? rcu_lock_domain(dom_shared) : NULL;
        break;

> --- a/xen/include/xen/sched.h
> +++ b/xen/include/xen/sched.h
> @@ -618,6 +618,8 @@ static inline bool is_system_domain(const struct domain *d)
>      return d->domain_id >= DOMID_FIRST_RESERVED;
>  }
>  
> +#define is_shared_domain(d) ((d)->domain_id == DOMID_SHARED)

Would this better evaluate to "false" when !STATIC_SHM, such that
the compiler can eliminate respective conditionals and/or code?

Jan



From xen-devel-bounces@lists.xenproject.org Fri Mar 18 09:01:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 09:01:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291957.495872 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV8UX-0006vE-Lj; Fri, 18 Mar 2022 09:01:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291957.495872; Fri, 18 Mar 2022 09:01:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV8UX-0006v7-Id; Fri, 18 Mar 2022 09:01:49 +0000
Received: by outflank-mailman (input) for mailman id 291957;
 Fri, 18 Mar 2022 09:01:48 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=9SAg=T5=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nV8UW-0006v1-7z
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 09:01:48 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 0a4c4088-a69a-11ec-8eba-a37418f5ba1a;
 Fri, 18 Mar 2022 10:01:47 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2108.outbound.protection.outlook.com [104.47.17.108]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-5-YSUruNQIPra-hfQCULz-wQ-1; Fri, 18 Mar 2022 10:01:45 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by HE1PR0402MB2906.eurprd04.prod.outlook.com (2603:10a6:3:d8::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.18; Fri, 18 Mar
 2022 09:01:43 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::2d79:4387:3887:ef9d%9]) with mapi id 15.20.5081.018; Fri, 18 Mar 2022
 09:01:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0a4c4088-a69a-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647594106;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=LBvfo5w8LlWNK7POjcgvlgJfeaTqYWkwCSgRq6O1O+8=;
	b=PaJSwmJBstANqlRZZ9gV/5Zj33CIrQXaf7tmLAceKRccGUvzRAw2NWWwFMPaWNtuwhgUX4
	UV2bTtD9aRXg0TwnrO52/BABOqvrJH/in111CXiEjUWCI02qrd9czvz2u7dW/iLBrQRw69
	wARc3zTPdnV4ekAzwwDVogKSTGpisGM=
X-MC-Unique: YSUruNQIPra-hfQCULz-wQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=l+3wEqQvYQHfpVp3q5eCMXeUL36C9RWFjo6GE3fvuK0uhy3iLox39PGtz7uSLE6VOZ0pYKRo/OePBVCR3RpZ9xqFaMY3wFBIv4uR3+tYTRkMVAGY0r4F9d4LVi69z+0KECluiWlA9VEcnTLbJTnlLchVgyqTgQ4pBn0dlZ9HeJGOs7ejpP6abuCbsdgwiP55yhMnqg6pVuyfYXX835sBG5QD1xTtG+VEZB+DdNU9IUw435tYk1t3i3LNgtdODcups6vlwcv9MwzXiuovCPu/Zg079Kusj72L1FpNN6gHPeP/+44K0m4V5x3nDP9sjgvp8Ss5u8Q18WBQGSoD0friYw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=LBvfo5w8LlWNK7POjcgvlgJfeaTqYWkwCSgRq6O1O+8=;
 b=Gkcx8j62jb1spSVyxGiDF3vb6rlpzMm/A9hCiBkAM5BzT2S5jws99uvUMAZO+/itQRt+/PdbFcbEmthfxkymanvGAMrhbgUqXSOAdgoDOFP47Fw1PkjNc832WF7XiJLPiuMkO+NxEl5wNKJV2DfYyqrFH3om6Mlt7nYdI9ttX/GGvOubNNuALeCXagiL4VYJxmHtkCkED6SwtXSSS6wiASRFtMvNzdpr9UFLGAE3dIKVExHdJOUlk3ZkYUcKLgJJ5blIVMHVbsq7G2jaujSpGzvpON2VYkR86ldOGBFWYbR0UjuBP5iZz9d4G4PLH+Zn1/9nDPPVnMm3iF4tXwoh8Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <d295f593-6a4a-7676-a104-aeaffba71f0a@suse.com>
Date: Fri, 18 Mar 2022 10:01:41 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: Nonsensical XSM Flask denial
Content-Language: en-US
To: Jason Andryuk <jandryuk@gmail.com>
Cc: xen-devel <xen-devel@lists.xenproject.org>,
 Andrew Cooper <Andrew.Cooper3@citrix.com>
References: <CAKf6xpvk1zX3ZtzSOWBCasZOuS607-W_iqHbC=ZgTBQqo+btjA@mail.gmail.com>
 <ab5a7aea-cab1-f9d9-e3cc-58636c234a4e@citrix.com>
 <CAKf6xpuqzJ+YE9crAJCJCCaZRZRYkZ5snsOOLP8Yjc4Nyx=9=A@mail.gmail.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <CAKf6xpuqzJ+YE9crAJCJCCaZRZRYkZ5snsOOLP8Yjc4Nyx=9=A@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: FR3P281CA0056.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:4b::6) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: d552df94-de8c-46aa-3807-08da08bdec2c
X-MS-TrafficTypeDiagnostic: HE1PR0402MB2906:EE_
X-Microsoft-Antispam-PRVS:
	<HE1PR0402MB2906516EAEC1EA75E2442955B3139@HE1PR0402MB2906.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(31696002)(38100700002)(6512007)(6506007)(2906002)(53546011)(26005)(6486002)(508600001)(86362001)(186003)(2616005)(4326008)(8676002)(66476007)(5660300002)(3480700007)(8936002)(6916009)(316002)(54906003)(31686004)(66556008)(66946007)(36756003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?VVhvVWZZTFlxUXo3eklrMDl2eW5xakd1NzFVT0h6K1BnL3IzUFRHNFc3TUg1?=
 =?utf-8?B?dmdTdkZldzhFNkxMMjlmd2lUUEVGdGFpVUFVT2NVQTVuaDZqZmRLUXhEZGYv?=
 =?utf-8?B?amI0L1lDMEUyYW9hSWhLa2xGNnRKbW14RUMyRmVzL3VnZGNlM1hTWFpXV0FB?=
 =?utf-8?B?NEdId1g2aW5IdURPSk8zRUVaRmpVQWxLZUp2ZEw1OSsvSEdrZEZMdVpPNU1m?=
 =?utf-8?B?V1IyNW90cnByRWQvbkxNZHNTSDhDNVNTa0RHV0FoYzZFZEZMWURnajZVcENJ?=
 =?utf-8?B?QzVWS1c0T1hEZzZ1bHM5Nk9qUkhiMGFLWWx2K1EvOUFOZjFJQllXcGtMdnMv?=
 =?utf-8?B?ZHNCVWF5UUxWVnBsQjc2K1pxb2xOV2Ewd3QwWFU5ZURIQVdVbjQxSUo5dEZC?=
 =?utf-8?B?bzhzaGRmeWoxVGlHaWQxMlI1cVloNXBqVDdFSGhWL2hPaE01emxyVjhiVE55?=
 =?utf-8?B?YmV0eGdqcE1ZZUdDTHRwMUJYSzU0MGxyVTJ3a3dIbDd3Yk8raVFaUi9GTjhG?=
 =?utf-8?B?WHhjSUthWWZ1U0NVNHlLakZjWHVIbFBqQWE4WWQ4eTZqeDl1a2Zta3plQkc5?=
 =?utf-8?B?azVBZHIzVkRvTnhJNWJNYWZWNmhtdTBVM2tVcms5VmNieGJGSittcHFEYVRX?=
 =?utf-8?B?RnVxSFcyeXhPQzBmQnc5UVlOODRSY3VDUWd0UTV2ZFdkaFA5QXh3OGV5NE9a?=
 =?utf-8?B?RUx5YlFkN21saU5TWndEMUcxTHBaM2Uvb2FTMjlZZUdCMmdOUjBLYVY1RTlw?=
 =?utf-8?B?M0VVTkFSb3pXdHdMdElYemQyRkJweWZFUEN6ajNFb0cwVDdERU1XakpTTTYy?=
 =?utf-8?B?Q3JxajM2SVhDNnB1Y3RlUjdQM1d2UEtoYkJCVHl2TzJDbWlHSEgzOExSbFN0?=
 =?utf-8?B?RFlLZkthK0xDWWc1WVY2OG80a1BtRTdqNUhlQXJKWXB5RUM1dGVXUWZvSG5C?=
 =?utf-8?B?SEpmdDZnUExwcStLNnRCSFgyM1hYOFNTY0Vkb3BWVXJuT0U4RzVVeDFza2xM?=
 =?utf-8?B?VDBxWDE5b0wwc0ZJaXAzMzJXQjJ1UElJaUh1RXNtbklDZ09McXJFT1NocEJv?=
 =?utf-8?B?Y1VCNDRQQkRxMTV2Wk1xakx5RVJHeUlxVm1JODNCdXZhRWROWFBhOVNyY3FH?=
 =?utf-8?B?Q2RGSjZnQ3hsUHVTTU1TUlB6TXorK2Q0R3c3QWo0ZTNkVkM5KzJWdVdmL1Qy?=
 =?utf-8?B?UnQ3WTJWU3laRGFFdFR4YklxZUhXcnlUc1Y3cEpBSW1aaitZdFVqVDU3T2VR?=
 =?utf-8?B?ajY5YUMrdE50MHIrcmg5OGFRcEMxZnA2cXdFb05tVTQ4L0docnlGU2xDbkV3?=
 =?utf-8?B?UTg5MFcwUGJPUGdmdk1yTXBIQVZBT1MyNG5tdXFOSXNNQlU2d2s4enVBRkJu?=
 =?utf-8?B?UVlYUTQ2ZjdpcURSaHBjekVpT01UNFBPNkFyNkx0N3FUY1JoWFpuSzNCc2Iy?=
 =?utf-8?B?TWFWSnVUUkFIRTIrZzVrbHU0VTVYd0hxMy85bGlNVlF1ditHbFFrQm5ibTV6?=
 =?utf-8?B?dmJ3ZE1kbTAzSG9VSXZzTEZEc09mWWFxTUg0bUE2VDh0QWZQNzFYSE1kUUZN?=
 =?utf-8?B?NlovRVNPZlQzcE1nM1UrUTZkemNUWEIzMmJJNy90OGxSREJxajJMbzJYTGhZ?=
 =?utf-8?B?dTBxR2taU1lLUkVhMGhtRVZwWUxGWlMrblVnT3BlUmV1d2JUdlpEQzBRR1F4?=
 =?utf-8?B?a1RjdTVYOGJwUDJ5NllQdjNvbUJybzd5VWlPWitMbGJkNHZEM3JXQTVYeFNU?=
 =?utf-8?B?TkVQVE1KY2Z5KzZtT3BDT0JtZmFnR0ozb1JMT01wZlRqNzdVSHd4NFZIWWdQ?=
 =?utf-8?B?U0F1cGk1M1ZrazJ4UmlObnRDMWtLdnVjVk55ZWFrT0dTT0xyUnZ5ejM3K1VR?=
 =?utf-8?B?UmJnWHR2S0d6R0ljTGtPYUowNjY5dU5jOFd5U3NCVlREZFFON09iL3VwTktN?=
 =?utf-8?Q?i0/IrZFsosrdT4zkREtE65I3nJNvc1XF?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d552df94-de8c-46aa-3807-08da08bdec2c
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 18 Mar 2022 09:01:43.3020
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: aUM8MsSUrFoSOaVAc4P8u7n4WzffYD8+yVxaorOjEuvux81lSXJcEaYfogVjhAduCAuquQmMpC/mVuxkwdxq4Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0402MB2906

On 17.03.2022 20:02, Jason Andryuk wrote:
> On Thu, Mar 17, 2022 at 2:14 PM Andrew Cooper <Andrew.Cooper3@citrix.com> wrote:
>>
>> On 17/03/2022 17:52, Jason Andryuk wrote:
>>> I shut down a domU (HVM dom9 w/ Linux stubdom dom10) with a single PCI
>>> device assigned.  Xen logged the following Flask denial for a second
>>> PVH dom5 (uivm) without any PCI devices assigned.  This is Xen 4.14.4.
>>>
>>> (XEN) avc:  denied  { remove_irq } for domid=5 irq=17
>>> scontext=system_u:system_r:uivm_t
>>> tcontext=system_u:object_r:shared_irq_t tclass=resource
>>>
>>> Domain 5 as uivm_t and irq 17 as shared_irq_t both look correct.  But
>>> it doesn't make sense that uivm would make a hypercall for an irq.
>>>
>>> Could this be from RCU calling complete_domain_destroy() when current
>>> is dom5 (uivm)?  What would current be set to when RCU runs its
>>> callbacks?
>>
>> RCU runs in softirq context, so yes - (almost) any use of current would
>> be bogus.
>>
>> But I can't spot any overlap between the physdevop_unmap_pirq XSM check,
>> and complete_domain_destroy().
>>
>> Any chance you can reproduce this with a WARN() in the AVC denied path,
>> so we can see what's going on here?
> 
> The path I found reading is:
> complete_domain_destroy
>   arch_domain_destroy
>     free_domain_pirqs
>       unmap_domain_pirq
>         xsm_unmap_domain_irq

I wonder whether an XSM check makes sense here at all for a dying
domain.

Jan



From xen-devel-bounces@lists.xenproject.org Fri Mar 18 10:25:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 10:25:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291961.495882 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV9ng-0006WN-0G; Fri, 18 Mar 2022 10:25:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291961.495882; Fri, 18 Mar 2022 10:25:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV9nf-0006WG-TI; Fri, 18 Mar 2022 10:25:39 +0000
Received: by outflank-mailman (input) for mailman id 291961;
 Fri, 18 Mar 2022 10:25:38 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV9nd-0006VL-VM; Fri, 18 Mar 2022 10:25:37 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV9nd-0007U7-TG; Fri, 18 Mar 2022 10:25:37 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nV9nd-0005L9-Ic; Fri, 18 Mar 2022 10:25:37 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nV9nd-0005om-I9; Fri, 18 Mar 2022 10:25:37 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=pptxURNnLu12m4DSK+3Yw1c3cW/MHlqbE+w36ZQYfMA=; b=mp6a8TVa/Z8/cVQFV6zgUXnvzl
	7u3+dtOstEqaL/nDNCkx+lnsKlhA0eKGAiATWz9l3PbgZmsk85yN8SfvNJQSGPiBJvN5p47biVWm9
	O7E7C10vvLO1wmfkaWR064d2327cz1kU5iKV+Rdlyb4yDbEBWrdXYl0z3TlQnDfwQ0dI=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168678-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168678: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 18 Mar 2022 10:25:37 +0000

flight 168678 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168678/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   17 days
Failing since        168258  2022-03-01 01:55:31 Z   17 days  166 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 10:37:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 10:37:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291969.495894 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV9zJ-00087Y-At; Fri, 18 Mar 2022 10:37:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291969.495894; Fri, 18 Mar 2022 10:37:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nV9zJ-00087R-78; Fri, 18 Mar 2022 10:37:41 +0000
Received: by outflank-mailman (input) for mailman id 291969;
 Fri, 18 Mar 2022 10:37:40 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=psOe=T5=inria.fr=Julia.Lawall@srs-se1.protection.inumbo.net>)
 id 1nV9zI-00087L-0v
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 10:37:40 +0000
Received: from mail3-relais-sop.national.inria.fr
 (mail3-relais-sop.national.inria.fr [192.134.164.104])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6d945171-a6a7-11ec-8eba-a37418f5ba1a;
 Fri, 18 Mar 2022 11:37:38 +0100 (CET)
Received: from i80.paris.inria.fr (HELO i80.paris.inria.fr.) ([128.93.90.48])
 by mail3-relais-sop.national.inria.fr with
 ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 Mar 2022 11:37:37 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6d945171-a6a7-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=inria.fr; s=dc;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=nmoN7qrNGdd3GijxnLEUeLBzgeTfrwH2rysgA4ATV18=;
  b=UYBLo2K5nrhJrQKJmy1S161fiIFv6BU68IOxVfLKMZvAaR1IavtjqEbY
   +vUKt6YMzFxIqzH3kG37/f8ZDizFVYe88xzYoj7es9Zn/Jgh483uPpKrc
   LS0Rs1DXOp5miT/jHmV1rYpTC41xwU81LwT1Mnl63WzVSjkx05TnkKOFZ
   c=;
Authentication-Results: mail3-relais-sop.national.inria.fr; dkim=none (message not signed) header.i=none; spf=SoftFail smtp.mailfrom=Julia.Lawall@inria.fr; dmarc=fail (p=none dis=none) d=inria.fr
X-IronPort-AV: E=Sophos;i="5.90,192,1643670000"; 
   d="scan'208";a="8935647"
From: Julia Lawall <Julia.Lawall@inria.fr>
To: Stefano Stabellini <sstabellini@kernel.org>
Cc: kernel-janitors@vger.kernel.org,
	Russell King <linux@armlinux.org.uk>,
	xen-devel@lists.xenproject.org,
	linux-arm-kernel@lists.infradead.org,
	linux-kernel@vger.kernel.org
Subject: [PATCH] xen/arm: fix typos in comments
Date: Fri, 18 Mar 2022 11:37:10 +0100
Message-Id: <20220318103729.157574-15-Julia.Lawall@inria.fr>
X-Mailer: git-send-email 2.20.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Various spelling mistakes in comments.
Detected with the help of Coccinelle.

Signed-off-by: Julia Lawall <Julia.Lawall@inria.fr>

---
 arch/arm/xen/mm.c |    2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/arch/arm/xen/mm.c b/arch/arm/xen/mm.c
index a7e54a087b80..607c1a557ccc 100644
--- a/arch/arm/xen/mm.c
+++ b/arch/arm/xen/mm.c
@@ -105,7 +105,7 @@ bool xen_arch_need_swiotlb(struct device *dev,
 	 *	- The Linux page refers to foreign memory
 	 *	- The device doesn't support coherent DMA request
 	 *
-	 * The Linux page may be spanned acrros multiple Xen page, although
+	 * The Linux page may be spanned across multiple Xen page, although
 	 * it's not possible to have a mix of local and foreign Xen page.
 	 * Furthermore, range_straddles_page_boundary is already checking
 	 * if buffer is physically contiguous in the host RAM.



From xen-devel-bounces@lists.xenproject.org Fri Mar 18 10:44:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 10:44:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291972.495905 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVA6A-00018s-3R; Fri, 18 Mar 2022 10:44:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291972.495905; Fri, 18 Mar 2022 10:44:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVA69-00018l-Um; Fri, 18 Mar 2022 10:44:45 +0000
Received: by outflank-mailman (input) for mailman id 291972;
 Fri, 18 Mar 2022 10:44:44 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=eO1Z=T5=arm.com=Hongda.Deng@srs-se1.protection.inumbo.net>)
 id 1nVA68-00018f-Fz
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 10:44:44 +0000
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur02on0600.outbound.protection.outlook.com
 [2a01:111:f400:fe05::600])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6acae4ab-a6a8-11ec-8eba-a37418f5ba1a;
 Fri, 18 Mar 2022 11:44:42 +0100 (CET)
Received: from DB9PR01CA0005.eurprd01.prod.exchangelabs.com
 (2603:10a6:10:1d8::10) by AM6PR08MB4628.eurprd08.prod.outlook.com
 (2603:10a6:20b:c6::22) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.15; Fri, 18 Mar
 2022 10:44:39 +0000
Received: from DB5EUR03FT042.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:1d8:cafe::6a) by DB9PR01CA0005.outlook.office365.com
 (2603:10a6:10:1d8::10) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17 via Frontend
 Transport; Fri, 18 Mar 2022 10:44:39 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT042.mail.protection.outlook.com (10.152.21.123) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Fri, 18 Mar 2022 10:44:39 +0000
Received: ("Tessian outbound 2877e54fe176:v113");
 Fri, 18 Mar 2022 10:44:39 +0000
Received: from c66dd8f3c567.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 953A755E-EFF4-419E-82D2-5353E788A6D0.1; 
 Fri, 18 Mar 2022 10:44:29 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id c66dd8f3c567.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 18 Mar 2022 10:44:28 +0000
Received: from DBAPR08MB5670.eurprd08.prod.outlook.com (2603:10a6:10:1a6::24)
 by DBBPR08MB4888.eurprd08.prod.outlook.com (2603:10a6:10:db::17) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Fri, 18 Mar
 2022 10:44:27 +0000
Received: from DBAPR08MB5670.eurprd08.prod.outlook.com
 ([fe80::5c2f:44a7:10ba:1605]) by DBAPR08MB5670.eurprd08.prod.outlook.com
 ([fe80::5c2f:44a7:10ba:1605%5]) with mapi id 15.20.5081.015; Fri, 18 Mar 2022
 10:44:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6acae4ab-a6a8-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=aMe/W6yiUE58/gP+OtO63/luhthU9svKfqgfdW/Eg7o=;
 b=NDKStIZfUvntaG9nA2jDSj47QjCAe4SpnDVGPfCmAZSjbKTsroEpiG/GisStr+gAg+Pk7TSmR4rke/ZFdXKuyvvAtyf9ljMNvmd3L8/WxjuPf0O80p+P1NROh1ZqYEoRUhutmU+f1Sgi3dmAk3D2qUjv8j0x7qKNPcdk8zfzyDM=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=FVvp2SpREyaEVGeWFyeNvPFq0uanRIWhKxtNKnHmK5/VRBgXgPMBUf2lylQd9eU8cH+nVtnzSjIbHqfPwInmEn4+eXvyjjMRi/23xPfwx90r6yCIt7vaeWrVzGdefiY+z4Z+7EjxpGt4y8DpV7EJfNbbZzZFBB0W/dnp/AlZOmrL05qlMqNrD7YG2Armn/IZFuMbzn/i3uMFNqqmOgAaOB3KhA7t3+wvVl3KQYWFXLqLNQsVtEZJSBJ8q9XnJNr0F0nju0DN7nxD4zIguSlVD9iA6uUzNYJLxeyvg9Z9ODvmxbJuu0gF8E+m8V6qGWVZKnrpfS6WSvybFvhiQoo4nw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=aMe/W6yiUE58/gP+OtO63/luhthU9svKfqgfdW/Eg7o=;
 b=Lktv72yZSKTKFFF8meExwKDdeONu1qRrTSPfg1Pr0enWemE4HwhtgC4q+9e2tbEbNboGldTkg1eRRt0GRIVlTiU4DjedIKulUp4D0wE6y5XvJ3kh7eQVqcqK0/NaFy2eWbSPD0A4Tnw5+g1/f+wBO2pU58JA20xsDnl3daJcP2EJ3e9qfX0Tkja1D7oKg4tP7BorVaVwfnuMTDkWNng24fwUqo6LF8ftNUBCapRxJp8ICAGiw6JxSOp2LfGNK7sdhKGgJmShowp8lu40vZqxnd0Tjs4G79CQFAWgug3ZvleDavBvZve/DHcsyo34b66bmAwRwRndvAQegsW/KGt2RQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=aMe/W6yiUE58/gP+OtO63/luhthU9svKfqgfdW/Eg7o=;
 b=NDKStIZfUvntaG9nA2jDSj47QjCAe4SpnDVGPfCmAZSjbKTsroEpiG/GisStr+gAg+Pk7TSmR4rke/ZFdXKuyvvAtyf9ljMNvmd3L8/WxjuPf0O80p+P1NROh1ZqYEoRUhutmU+f1Sgi3dmAk3D2qUjv8j0x7qKNPcdk8zfzyDM=
From: Hongda Deng <Hongda.Deng@arm.com>
To: Julien Grall <julien@xen.org>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Julien Grall <jgrall@amazon.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Bertrand Marquis <Bertrand.Marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: RE: [PATCH v3 09/19] xen/arm32: mm: Check if the virtual address is
 shared before updating it
Thread-Topic: [PATCH v3 09/19] xen/arm32: mm: Check if the virtual address is
 shared before updating it
Thread-Index: AQHYJwz7RRsWd4YAY025+kUgGPgDkazE99jw
Date: Fri, 18 Mar 2022 10:44:27 +0000
Message-ID:
 <DBAPR08MB56703D6319722AD86C10A77FE6139@DBAPR08MB5670.eurprd08.prod.outlook.com>
References: <20220221102218.33785-1-julien@xen.org>
 <20220221102218.33785-10-julien@xen.org>
In-Reply-To: <20220221102218.33785-10-julien@xen.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: CC2C79793D1146419EBB18C8CAB05D8E.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 2274842f-e77b-444f-95d9-08da08cc4d90
x-ms-traffictypediagnostic:
	DBBPR08MB4888:EE_|DB5EUR03FT042:EE_|AM6PR08MB4628:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR08MB4628871666C88123A5AA7147E6139@AM6PR08MB4628.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DBAPR08MB5670.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(186003)(66476007)(66446008)(64756008)(26005)(66946007)(52536014)(33656002)(66556008)(55016003)(8676002)(110136005)(76116006)(4326008)(6506007)(316002)(508600001)(7696005)(53546011)(54906003)(55236004)(5660300002)(9686003)(86362001)(38100700002)(83380400001)(71200400001)(8936002)(122000001)(2906002)(38070700005)(21314003);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB4888
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT042.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	8cc51a03-4118-4af3-7554-08da08cc465a
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(53546011)(7696005)(26005)(186003)(6506007)(9686003)(316002)(2906002)(40460700003)(107886003)(54906003)(8676002)(508600001)(36860700001)(336012)(55016003)(52536014)(83380400001)(47076005)(356005)(33656002)(70586007)(86362001)(5660300002)(110136005)(4326008)(70206006)(82310400004)(81166007)(8936002)(21314003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 18 Mar 2022 10:44:39.4018
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 2274842f-e77b-444f-95d9-08da08cc4d90
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT042.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4628

Hi Julien,

> -----Original Message-----
> From: Xen-devel <xen-devel-bounces@lists.xenproject.org> On Behalf Of Jul=
ien
> Grall
> Sent: 2022=1B$BG/=1B(B2=1B$B7n=1B(B21=1B$BF|=1B(B 18:22
> To: xen-devel@lists.xenproject.org
> Cc: julien@xen.org; Julien Grall <jgrall@amazon.com>; Stefano Stabellini
> <sstabellini@kernel.org>; Bertrand Marquis <Bertrand.Marquis@arm.com>;
> Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
> Subject: [PATCH v3 09/19] xen/arm32: mm: Check if the virtual address is =
shared
> before updating it
>=20
> From: Julien Grall <jgrall@amazon.com>
>=20
> Only the first 2GB of the virtual address space is shared between all
> the page-tables on Arm32.
>=20
> There is a long outstanding TODO in xen_pt_update() stating that the
> function can only work with shared mapping. Nobody has ever called
> the function with private mapping, however as we add more callers
> there is a risk to mess things up.
>=20
> Introduce a new define to mark the end of the shared mappings and use
> it in xen_pt_update() to verify if the address is correct.
>=20
> Note that on Arm64, all the mappings are shared. Some compiler may
> complain about an always true check, so the new define is not introduced
> for arm64 and the code is protected with an #ifdef.
>=20
> Signed-off-by: Julien Grall <jgrall@amazon.com>
>=20
> ---
>     Changes in v2:
>         - New patch
> ---
>  xen/arch/arm/include/asm/config.h |  4 ++++
>  xen/arch/arm/mm.c                 | 11 +++++++++--
>  2 files changed, 13 insertions(+), 2 deletions(-)
>=20
> diff --git a/xen/arch/arm/include/asm/config.h
> b/xen/arch/arm/include/asm/config.h
> index c7b77912013e..85d4a510ce8a 100644
> --- a/xen/arch/arm/include/asm/config.h
> +++ b/xen/arch/arm/include/asm/config.h
> @@ -137,6 +137,10 @@
>=20
>  #define XENHEAP_VIRT_START     _AT(vaddr_t,0x40000000)
>  #define XENHEAP_VIRT_END       _AT(vaddr_t,0x7fffffff)
> +
> +/* The first 2GB is always shared between all the page-tables. */
> +#define SHARED_VIRT_END        _AT(vaddr_t, 0x7fffffff)
> +
>  #define DOMHEAP_VIRT_START     _AT(vaddr_t,0x80000000)
>  #define DOMHEAP_VIRT_END       _AT(vaddr_t,0xffffffff)
>=20
> diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
> index 24de8dcb9042..f18f65745595 100644
> --- a/xen/arch/arm/mm.c
> +++ b/xen/arch/arm/mm.c
> @@ -1365,11 +1365,18 @@ static int xen_pt_update(unsigned long virt,
>       * For arm32, page-tables are different on each CPUs. Yet, they shar=
e
>       * some common mappings. It is assumed that only common mappings
>       * will be modified with this function.
> -     *
> -     * XXX: Add a check.
>       */
>      const mfn_t root =3D virt_to_mfn(THIS_CPU_PGTABLE);
>=20
> +#ifdef SHARED_VIRT_END
> +    if ( virt > SHARED_VIRT_END ||
> +         (SHARED_VIRT_END - virt) < nr_mfns )

Why not convert (SHARED_VIRT_END - virt) to page number before comparation?=
=20
I think nr_mfns is something related to page numbers, so maybe something li=
ke PAGE_SHIFT or round_pgdown is needed.

I am just wondering, and forgive me if I am wrong.=20

> +    {
> +        mm_printk("Trying to map outside of the shared area.\n");
> +        return -EINVAL;
> +    }
> +#endif
> +
>      /*
>       * The hardware was configured to forbid mapping both writeable and
>       * executable.
> --
> 2.32.0
>=20

Cheers,
---
Hongda


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 11:18:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 11:18:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291979.495916 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVAcE-0004bB-LU; Fri, 18 Mar 2022 11:17:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291979.495916; Fri, 18 Mar 2022 11:17:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVAcE-0004b4-IR; Fri, 18 Mar 2022 11:17:54 +0000
Received: by outflank-mailman (input) for mailman id 291979;
 Fri, 18 Mar 2022 11:17:53 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=VNnc=T5=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nVAcC-0004ay-VJ
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 11:17:52 +0000
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur03on061b.outbound.protection.outlook.com
 [2a01:111:f400:fe08::61b])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id e0bb5f72-a6ac-11ec-853c-5f4723681683;
 Fri, 18 Mar 2022 12:16:38 +0100 (CET)
Received: from DB6PR0802CA0027.eurprd08.prod.outlook.com (2603:10a6:4:a3::13)
 by AM6PR08MB4245.eurprd08.prod.outlook.com (2603:10a6:20b:b4::20)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Fri, 18 Mar
 2022 11:17:48 +0000
Received: from DB5EUR03FT019.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:4:a3:cafe::ab) by DB6PR0802CA0027.outlook.office365.com
 (2603:10a6:4:a3::13) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4844.14 via Frontend
 Transport; Fri, 18 Mar 2022 11:17:48 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT019.mail.protection.outlook.com (10.152.20.163) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Fri, 18 Mar 2022 11:17:48 +0000
Received: ("Tessian outbound 2877e54fe176:v113");
 Fri, 18 Mar 2022 11:17:48 +0000
Received: from 9e1ed5f023a5.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 DDF217C2-B569-4EBF-96A2-B2715555DB44.1; 
 Fri, 18 Mar 2022 11:17:42 +0000
Received: from EUR03-DB5-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 9e1ed5f023a5.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 18 Mar 2022 11:17:42 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by DB6PR0802MB2615.eurprd08.prod.outlook.com (2603:10a6:4:a2::20)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Fri, 18 Mar
 2022 11:17:39 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5081.018; Fri, 18 Mar 2022
 11:17:39 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e0bb5f72-a6ac-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=rxD8qoc3j142vo8VImibf6wxIOFhRXMvVs6fjUqQ1YY=;
 b=nqeErthNairkPwExD6G14ADkW02EpYX/p2cZUAn/InFk+bvLA6fXsSnuyOH+1HARMuJLs3sKjau1YCQ03yRHgrRgWSYBFIvUw7ZCaFDmNedIIcDfwJCcweL00nAmTZ/65b0LX7NohDpQxZcSI6IFCnx0JteMUlsX0tWVyKbXOeQ=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 8b86f7bb41d69098
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=SWuw8krY0Uux6y55TYEGFLXLRV6o6e++emmd+tgHHCtp50s4Gqj6ruLOeg00JfgeSRjXudHiZ9q0ReX+2Q7DDh9iP3xZdzZfGPZXLsX3t6uqfazlCX+qe42UPySzBAPsCJs9FkjspQmKgauBSXd8YyyDRKuaQ0LsxV4xQSvEcrfBrsID0QKqjSOizSa13eq5w1J3AbTd7p4AFsEiVhct/XsGp7PYc8g1AmCpUZQ7vUyl4js040h0F/7biB+mHqJul7t1ks9IC6pPGvnVx0WRQfJ6SHPTIXOh6549A13yvWWjV2RXeB/L1FM2bQfOS4dgyqGoT2i/nWXG3q7CPsxzWA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=rxD8qoc3j142vo8VImibf6wxIOFhRXMvVs6fjUqQ1YY=;
 b=TGzVNxsEzv2PTEKDgcfeSgkAe0jteFHDF2bRksfAMGWCH9yOxZAXLhBR+S9iEzgREKtaltqMH3Qls8blCp5QeRH2BNnn0k/XyDIJ/sBTAjmVMIiHsidU2V1FXKAq4BHCzO+nuJvx9y/NUZL6iZ47956eQTdmLhdl5EFpFZQjnlS3p/MHnn0fHrWa2yqbn9RuE9939JkBIB9v1u7u+vuxvin7bpolHiAFd5/XTO7u9iCLczXFZF2rdBsAHCCm/pBTLeKd7NfesfYE9mgMdwHatO9IziLQoSP0SiR0EfHmncMPGQJSNAwyZimKS10+Vs8CxsRl9pucs8zcVtxJSEQNIA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=rxD8qoc3j142vo8VImibf6wxIOFhRXMvVs6fjUqQ1YY=;
 b=nqeErthNairkPwExD6G14ADkW02EpYX/p2cZUAn/InFk+bvLA6fXsSnuyOH+1HARMuJLs3sKjau1YCQ03yRHgrRgWSYBFIvUw7ZCaFDmNedIIcDfwJCcweL00nAmTZ/65b0LX7NohDpQxZcSI6IFCnx0JteMUlsX0tWVyKbXOeQ=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Julia Lawall <Julia.Lawall@inria.fr>
CC: Stefano Stabellini <sstabellini@kernel.org>,
	"kernel-janitors@vger.kernel.org" <kernel-janitors@vger.kernel.org>, Russell
 King <linux@armlinux.org.uk>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>, "linux-arm-kernel@lists.infradead.org"
	<linux-arm-kernel@lists.infradead.org>, "linux-kernel@vger.kernel.org"
	<linux-kernel@vger.kernel.org>
Subject: Re: [PATCH] xen/arm: fix typos in comments
Thread-Topic: [PATCH] xen/arm: fix typos in comments
Thread-Index: AQHYOrRFpXZxY2VxTE6A18TUxTYzZqzE/iWA
Date: Fri, 18 Mar 2022 11:17:39 +0000
Message-ID: <50B35A3D-9848-4B89-8935-AD3A1330D7CF@arm.com>
References: <20220318103729.157574-15-Julia.Lawall@inria.fr>
In-Reply-To: <20220318103729.157574-15-Julia.Lawall@inria.fr>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 63d2cf53-573d-4be3-0f3d-08da08d0ef36
x-ms-traffictypediagnostic:
	DB6PR0802MB2615:EE_|DB5EUR03FT019:EE_|AM6PR08MB4245:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR08MB4245C8BD5C149E48A146F4F1E4139@AM6PR08MB4245.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(4326008)(8676002)(76116006)(38100700002)(122000001)(91956017)(54906003)(6916009)(66556008)(316002)(66476007)(66946007)(186003)(86362001)(5660300002)(4744005)(38070700005)(64756008)(8936002)(66446008)(2906002)(26005)(53546011)(2616005)(6506007)(6512007)(6486002)(71200400001)(508600001)(83380400001)(36756003)(33656002)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <CD707C99DDB2274FB68AF74B602F08B4@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0802MB2615
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT019.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	0e77dfda-39dd-4142-2ad9-08da08d0e9b7
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(508600001)(47076005)(336012)(36860700001)(5660300002)(8936002)(40460700003)(6486002)(2906002)(316002)(6862004)(70586007)(70206006)(81166007)(54906003)(82310400004)(4326008)(83380400001)(26005)(107886003)(6512007)(2616005)(186003)(33656002)(86362001)(36756003)(8676002)(53546011)(6506007)(356005);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 18 Mar 2022 11:17:48.5863
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 63d2cf53-573d-4be3-0f3d-08da08d0ef36
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT019.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4245



> On 18 Mar 2022, at 10:37, Julia Lawall <Julia.Lawall@inria.fr> wrote:
>=20
> Various spelling mistakes in comments.
> Detected with the help of Coccinelle.
>=20
> Signed-off-by: Julia Lawall <Julia.Lawall@inria.fr>

Reviewed-by: Luca Fancellu <luca.fancellu@arm.com>

Cheers,
Luca

>=20
> ---
> arch/arm/xen/mm.c |    2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>=20
> diff --git a/arch/arm/xen/mm.c b/arch/arm/xen/mm.c
> index a7e54a087b80..607c1a557ccc 100644
> --- a/arch/arm/xen/mm.c
> +++ b/arch/arm/xen/mm.c
> @@ -105,7 +105,7 @@ bool xen_arch_need_swiotlb(struct device *dev,
> 	 *	- The Linux page refers to foreign memory
> 	 *	- The device doesn't support coherent DMA request
> 	 *
> -	 * The Linux page may be spanned acrros multiple Xen page, although
> +	 * The Linux page may be spanned across multiple Xen page, although
> 	 * it's not possible to have a mix of local and foreign Xen page.
> 	 * Furthermore, range_straddles_page_boundary is already checking
> 	 * if buffer is physically contiguous in the host RAM.
>=20
>=20



From xen-devel-bounces@lists.xenproject.org Fri Mar 18 11:39:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 11:39:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291983.495927 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVAxI-00074b-Ak; Fri, 18 Mar 2022 11:39:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291983.495927; Fri, 18 Mar 2022 11:39:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVAxI-00074U-5w; Fri, 18 Mar 2022 11:39:40 +0000
Received: by outflank-mailman (input) for mailman id 291983;
 Fri, 18 Mar 2022 11:39:38 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVAxG-00074K-9N; Fri, 18 Mar 2022 11:39:38 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVAxG-0000Jj-6z; Fri, 18 Mar 2022 11:39:38 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVAxF-0000Rk-S5; Fri, 18 Mar 2022 11:39:37 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVAxF-000364-Rc; Fri, 18 Mar 2022 11:39:37 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=RBPnq2tZOptSpQ5gPUQse+nvojkxGGWTx5qen3pfzVQ=; b=mxIto7xvHyrxYtaWBuH0loarAn
	6k5wbgeHTFKjB4Qlkt9ovQmXXRCKTjyDNGREfbmwyKnrG5PzdT7/X2XRxz+wNqtWuBqrkllsNHgWy
	MIaf6nuA6M7k78BN/ICg9xt+TAJXzfPXfMoSLisk9+HS1DZ6un+yPrUcTR9SDX4qFcxE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168679-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168679: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 18 Mar 2022 11:39:37 +0000

flight 168679 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168679/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   18 days
Failing since        168258  2022-03-01 01:55:31 Z   17 days  167 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    0 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 13:34:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 13:34:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.291993.495938 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVCkV-0001sd-Ot; Fri, 18 Mar 2022 13:34:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 291993.495938; Fri, 18 Mar 2022 13:34:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVCkV-0001sW-Lv; Fri, 18 Mar 2022 13:34:35 +0000
Received: by outflank-mailman (input) for mailman id 291993;
 Fri, 18 Mar 2022 13:34:34 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVCkU-0001sM-Oi; Fri, 18 Mar 2022 13:34:34 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVCkU-0002Hi-MI; Fri, 18 Mar 2022 13:34:34 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVCkU-0006SO-8Z; Fri, 18 Mar 2022 13:34:34 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVCkU-0001Rq-83; Fri, 18 Mar 2022 13:34:34 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=UyqumVHJA/uGVQPsArWpom/TgSFsME3rNwj0FUyyTUg=; b=E4fwg54UNzgom/eD4EiE+VYnEV
	4CqEhrlGy8v7pUtKs1qHdO4yd297kbUzTtFnHE5Y7kGINBzl/bTr3vteEbLJ9Nil60qOCzme2RWgA
	xuE1zVRSVb0JhssuL/S9HdY6VyEEObHm6FJyf3H4lFbF319/DqLqLYWLV96JHG7Zft7g=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168674-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168674: regressions - FAIL
X-Osstest-Failures:
    linux-linus:build-arm64:xen-build:fail:regression
    linux-linus:test-amd64-amd64-xl-shadow:guest-start/debian.repeat:fail:heisenbug
    linux-linus:test-amd64-amd64-xl-rtds:guest-start/debian.repeat:fail:heisenbug
    linux-linus:build-arm64-libvirt:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-examine:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=551acdc3c3d2b6bc97f11e31dcf960bc36343bfc
X-Osstest-Versions-That:
    linux=56e337f2cf1326323844927a04e9dbce9a244835
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 18 Mar 2022 13:34:34 +0000

flight 168674 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168674/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-arm64                   6 xen-build      fail in 168667 REGR. vs. 168620

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-shadow 22 guest-start/debian.repeat fail in 168667 pass in 168674
 test-amd64-amd64-xl-rtds     22 guest-start/debian.repeat  fail pass in 168667

Tests which did not succeed, but are not blocking:
 build-arm64-libvirt           1 build-check(1)           blocked in 168667 n/a
 test-arm64-arm64-xl           1 build-check(1)           blocked in 168667 n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)           blocked in 168667 n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)           blocked in 168667 n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)           blocked in 168667 n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)           blocked in 168667 n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)           blocked in 168667 n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)           blocked in 168667 n/a
 test-arm64-arm64-examine      1 build-check(1)           blocked in 168667 n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)           blocked in 168667 n/a
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168620
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168620
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168620
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168620
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168620
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168620
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168620
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168620
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                551acdc3c3d2b6bc97f11e31dcf960bc36343bfc
baseline version:
 linux                56e337f2cf1326323844927a04e9dbce9a244835

Last test of basis   168620  2022-03-15 18:10:19 Z    2 days
Testing same since   168667  2022-03-17 21:13:01 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Alexander Lobakin <alexandr.lobakin@intel.com>
  Andrew Morton <akpm@linux-foundation.org>
  Ard Biesheuvel <ardb@kernel.org>
  Ariel Elior <aelior@marvell.com>
  Bharathi Sreenivas <bharathi.sreenivas@intel.com>
  Brian Masney <bmasney@redhat.com>
  Claudiu Beznea <claudiu.beznea@microchip.com>
  David S. Miller <davem@davemloft.net>
  Doug Berger <opendmb@gmail.com>
  Eric Dumazet <edumazet@google.com>
  Florian Fainelli <f.fainelli@gmail.com>
  Florian Westphal <fw@strlen.de>
  Guo Ziliang <guo.ziliang@zte.com.cn>
  Gurucharan G <gurucharanx.g@intel.com> (A Contingent worker at Intel)
  Haimin Zhang <tcs_kernel@tencent.com>
  Herbert Xu <herbert@gondor.apana.org.au>
  Hugh Dickins <hughd@google.com>
  Ivan Vecera <ivecera@redhat.com>
  Jakub Kicinski <kuba@kernel.org>
  Jiasheng Jiang <jiasheng@iscas.ac.cn>
  Jiyong Park <jiyong@google.com>
  Joseph Qi <joseph.qi@linux.alibaba.com>
  Juerg Haefliger <juerg.haefliger@canonical.com>
  Juerg Haefliger <juergh@canonical.com>
  Kalle Valo <quic_kvalo@quicinc.com>
  Konrad Jankowski <konrad0.jankowski@intel.com>
  Kurt Cancemi <kurt@x64architecture.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Maciej Fijalkowski <maciej.fijalkowski@intel.com>
  Manish Chopra <manishc@marvell.com>
  Mateusz Palczewski <mateusz.palczewski@intel.com>
  Miaoqian Lin <linmq006@gmail.com>
  Michael S. Tsirkin <mst@redhat.com>
  Michael Walle <michael@walle.cc>
  Nicolas Dichtel <nicolas.dichtel@6wind.com>
  Niels Dossche <dossche.niels@gmail.com>
  Pablo Neira Ayuso <pablo@netfilter.org>
  Paolo Abeni <pabeni@redhat.com>
  Paul Menzel <pmenzel@molgen.mpg.de>
  Przemyslaw Patynowski <przemyslawx.patynowski@intel.com>
  Qian Cai <quic_qiancai@quicinc.com>
  Rafael J. Wysocki <rafael.j.wysocki@intel.com>
  Randy Dunlap <rdunlap@infradead.org>
  Sabrina Dubroca <sd@queasysnail.net>
  Steffen Klassert <steffen.klassert@secunet.com>
  Sudheer Mogilappagari <sudheer.mogilappagari@intel.com>
  Tadeusz Struk <tadeusz.struk@linaro.org>
  Tony Nguyen <anthony.l.nguyen@intel.com>
  Vladimir Oltean <vladimir.oltean@nxp.com>
  Willem de Bruijn <willemb@google.com>
  Yosry Ahmed <yosryahmed@google.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     fail    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 1149 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 14:52:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 14:52:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292001.495949 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVDxU-0001T5-M5; Fri, 18 Mar 2022 14:52:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292001.495949; Fri, 18 Mar 2022 14:52:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVDxU-0001Sy-Gv; Fri, 18 Mar 2022 14:52:04 +0000
Received: by outflank-mailman (input) for mailman id 292001;
 Fri, 18 Mar 2022 14:52:03 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=p6Ef=T5=citrix.com=prvs=0698cd8b8=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nVDxT-0001Ss-C2
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 14:52:03 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f695fd32-a6ca-11ec-8eba-a37418f5ba1a;
 Fri, 18 Mar 2022 15:52:01 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f695fd32-a6ca-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647615120;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=mIjmQgwIX1rtxD4Wey/AD0tUq87oAGlPYqX+MP6HkDI=;
  b=ECQ3Z1JkHBVTDl7kIFsPEFe7++zJ3jpw3WWjTwMbkN+0aSvDnJmjfbgH
   fzHFuP90e7mpzFpBauEQ2Qr02G9SZjeIRxXTpRnu78uSv3uwIYebS86GL
   b2kq/rARmvqRwfpRAJI0cI1YcbXTORMeWMSwqct1BF9X28qFXCcdLKJph
   I=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67010558
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:FkaQBaqeRCJJBh2+hB/Jbmn+AZFeBmI1ZRIvgKrLsJaIsI4StFCzt
 garIBnSb6zZZDbwftsnbYyx/BwCvMPWndY3QVFqqC02RCoW8JuZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 IOq+aUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBOIPeorReViZjLRokGJxlxI6ZJFi0rpnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVI5DfVF/s5B7vERL3H/4Rw1zYsnMFeW/3ZY
 qL1bBIxM0yZO0ASaj/7Drpvsv26jWHkXAd6l1OHhbFvz3GU/BZuhe2F3N39JYXRGJQ9clyjj
 mDM8nn9AxoaHMeC0jfD+XWp7sfQmQvrVYRUE6e3ntZoj0eU3Xc7EwANWB2wpvzRol6zXZdTJ
 lIZ/gIqrLMu7wq7Q9/lRRq6rXWY+BkGVLJt//YSsV/XjPCOukDAWzZCHmUphMEaWNEeQxI47
 A/KmuzSOwc1lYy2dUPD85efsmbnUcQKFlMqaSgBRAoDxtDspoAvkx7CJupe/L6JYs7dQm+pn
 W3TxMQqr/BK1JNQif3nlbzSq2j0zqUlWDLZ8ek+soiNygpiLLCoaIWzgbQwxaYRdd3JJrVtU
 ZVtpiR/0AzsJczV/MBuaL9UdF1M2xpjGGeE6bKIN8N9nwlBA1b5IehtDMhWfS+FyPosdz7ze
 1P0sghM/pJVN3bCRfYpP93sVZ1zlvC9TY2NuhXogjxmOMQZmOivpnwGWKJt9zq1zBhEfV8XZ
 P93jvpA/V5FUP86nVJats8W0KMxxzBW+I8gbcuT8vhT6pLHPCT9Ye5caDOmN7llhIvZ8FS92
 4sObKOilkQAONASlwGKqOb/23hRdiNlbX03wuQKHtO+zv1OQzhwVaWOnet/J+SIXc19z4/1w
 510YWcBoHLXjnzbMwSaLHdlbbLkR5FkqnwneycrOD6VN7ILOu5DMI93m0MLQIQa
IronPort-HdrOrdr: A9a23:I+LySq/BBXzdyVOXJmNuk+F4db1zdoMgy1knxilNoENuHPBwxv
 rAoB1E73PJYW4qKQ0dcdDpAtjlfZtFnaQFr7X5To3SIzUO31HYbb2KjLGSjAEIfheeygcz79
 YZT0ETMqyTMbE+t7eG3ODaKadh/DDkytHSuQ629R4EJmsGC9AC0+46MHfgLqQffngdOXNTLu
 v62iMznUvYRZ1hVLXcOpBqZZmnm/T70LbdJTIWDR8u7weDyRmy7qThLhSe1hACFxtS3LYL6w
 H+4k/Ez5Tml8v+5g7X1mfV4ZgTssDm0MF/CMuFjdVQAinwizyveJ9qV9S5zXIISaCUmRMXee
 v30lAd1vdImjXsl6aO0ELQMjzboXITArnZuAelaDXY0JfErXkBerR8bMpiA2rkAgwbzYxBOe
 twrhGkX9A8N2KxoA3to9fPTB1kjUyyvD4rlvMSlWVWVc8EZKZWtpF3xjIeLH4sJlOz1GkcKp
 gkMCgc3ocgTXqKK3TC+mV/yt2lWXo+Wh+AX0gZo8SQlzxbhmpwwUcUzNEW2i5ozuNwd7BUo+
 Dfdqh4nrBHScEbKap7GecaWMOyTmjAWwjFPm6eKUnuUKsHJ3XOoZjq56hd3pDmRLUYiJ8p3J
 jRWlJRsmA/P0roFM2VxZVOtgvARW2sNA6dg/22J6IJzIEUaICbRBFrEmpe4fdIi89vdvHmZw
 ==
X-IronPort-AV: E=Sophos;i="5.90,192,1643691600"; 
   d="scan'208";a="67010558"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=RCeEAFDyhc4DHxs3/b/u/AHVJdt82pdaLQCysef4IulmNy0pNFRwEvbP4FyjWdvnhznaNgwpCpcwVRe/tmsN6G0xiKGLMkU90+pkw4e2qfl2vXZ9ruHZ4DfQrUlPz3DH/bAN5jvvih0Vxc2QpJ3TaaZ1r6zZVodViGYtJepVM/RVFFyopo3Fg27hMv+Tueha6XkJwe7DfFGjIlTh1uo2e6efkvpk/C+dmxMubNc+ZlvLIeMpQn5rQ6krL/HLRGVGNlsqqt1TBUi0KGyEoqbviAooniilUggOGlL3V5Q7yDK98M4shgTBuwrM7L/1tXAxTye+ITXjeStDGXy1QFA0Xg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=mIjmQgwIX1rtxD4Wey/AD0tUq87oAGlPYqX+MP6HkDI=;
 b=R3ktmgwyumPeAr7P5i/lECaps/JWc5W1gwBqIZbioNgZUGmNDGWadqTHUh9vMme90FHHn3NtSA4tbEpnjugoJ+GrDIwLxBDtWfjbN2pg9J2klqLjjjZhtZ6DbUYBnQV6nSifvQMxotQE6CRtG5SfqVxLPuMn9uktXaAoJgmexXkP3GHEi6LUdmK6iHwNQwwuKogX1aTVwso2HdwP9hYNOBcip74+m3c9aDhZG3T8fxiY58pcm+yvp/2dKUCflHlZ2ziCjaIlbYgsLJvLP2NippmuHsc2EpDkEXMW8shXGJ2Z1e6xznc2k4zCaGnhFoS+4oYCWueekTjlghtbGUVLOg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=mIjmQgwIX1rtxD4Wey/AD0tUq87oAGlPYqX+MP6HkDI=;
 b=DhPPygCAIwBJYYgypKsP7fxhCvgdk9xQUE0S+jW258EfQ5QbpaXODk9g54Rg9mAauxhmRW1FpqoF8RGEIOL5Wf/XJVP8R3VUXWNGlbwhcKKqbAFyR6ccs8tn2UVp4sl0IPJr4F0abZ0tcn3oq0YiFP6SOo79iCFMt5rUqRkYvpg=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Juergen Gross <jgross@suse.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Jan Beulich <jbeulich@suse.com>, Roger Pau Monne <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>
Subject: Re: [PATCH] xen/x86: drop dependency of XEN_SHSTK on EXPERT
Thread-Topic: [PATCH] xen/x86: drop dependency of XEN_SHSTK on EXPERT
Thread-Index: AQHYM6mz9BpISaLxN0e/wtmKcLCulazFSBQA
Date: Fri, 18 Mar 2022 14:51:52 +0000
Message-ID: <072dce39-4cfc-64c0-a96e-4725728c0f05@citrix.com>
References: <20220309113441.22746-1-jgross@suse.com>
In-Reply-To: <20220309113441.22746-1-jgross@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 63bfabcf-a77b-4af4-f099-08da08eed6d2
x-ms-traffictypediagnostic: CY4PR03MB3349:EE_
x-microsoft-antispam-prvs: <CY4PR03MB334996037BE16F76D8122B49BA139@CY4PR03MB3349.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(508600001)(186003)(6486002)(26005)(91956017)(64756008)(66476007)(8676002)(66946007)(4326008)(66446008)(66556008)(76116006)(38070700005)(6506007)(53546011)(5660300002)(2906002)(71200400001)(31696002)(6512007)(38100700002)(316002)(2616005)(122000001)(8936002)(83380400001)(82960400001)(86362001)(31686004)(36756003)(54906003)(110136005)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?d2ltN2tjWkhrcjVGWDVMN0h2Znl3Y2dIeVhzb3RabDhjYnU1T01aMSt3Um1Z?=
 =?utf-8?B?STlFVmhPWGlicnYzN3pOQUFrNzRCZnFBeXZVelM3Y0F6Z2tDWDNFN0pZaDRP?=
 =?utf-8?B?MHJYY0QyWDkzWk1xbTMvZ2ozYTBhdWE4TEhSV3ZRWmlWZkNnbkNVWGlnOXc4?=
 =?utf-8?B?RlhCRTBlYi9ESVNpOCtRRkRZalZnZEhaOTl1ZFJFWU8zL21TU1JGcThFVmRv?=
 =?utf-8?B?T3NSSjNlVEMyV2prRWVCWFl2Mk5zYjlZY2E2YXRGZWo5cDVWRjFKb015WUtN?=
 =?utf-8?B?STAyMkhTd2wvYmh4T0psWWNGY05HbHVMaEZVY2VPN3EzQjhCdC9rQ0lzaHBL?=
 =?utf-8?B?Smx5VTJ0NXJtSXI2MThXSUJjYmFUZzltekp5RW43V1YrY2h1L0k5U1pYa0VU?=
 =?utf-8?B?N05LQTA3eXVKVVgxUTY0c2VoWkJDQmF3bnFyaVFJR2Yxbk9mczJManRsVTU0?=
 =?utf-8?B?YWhFM0lDR2Q4TDNzRHJxczdKRWRVbFNISjJRN1h2cG5IS2xSeklRWUhYQzMw?=
 =?utf-8?B?TnZydFlyYWJtbWQ2WTNKcE9BSHNiT2RtditraU9ISmlDTW9wSnFVaUxUQ0I1?=
 =?utf-8?B?N1dtWUJDWDN4OUU5YzVYWDNFdEkybEZnSnIzcjlSVHREVWdhQnl3S3huNlBj?=
 =?utf-8?B?alhZUU15SWwrZmdrU3UrUUxIRDZzM3c5RG9PU2FJSmxiK2RSaFptNWZONWlZ?=
 =?utf-8?B?WlN3UWhKOEo3TFdVTVdqUjk5QmRaZkU4R0xKays5VDFrZEhDTXhoWG9GYkhV?=
 =?utf-8?B?QktVL3pjRzQvZDZsa0l4ZVVkekp1cENZRzJpQ3pqNUs1aEVXdkVvN0ZBNldh?=
 =?utf-8?B?WGlqUHlhTXNPTjBGTnpOMkltcC9oM3MxL21Iakx0VTkwUmNKZGZsd2MwamNh?=
 =?utf-8?B?TWdJZDFpN3ZoU3pEN25KVlpUUlcvV1RKdGQrVGYveHIvdlhTanNBRk1KNDNz?=
 =?utf-8?B?RHc2V25OYktpZ2hQNm1aM25BNy84d0cwNFJxT1kwZjBpVTQ2TysrRTNVNlIw?=
 =?utf-8?B?NjdMSnBiOEVJMWFiWGNtL0daUlA4KzJIZnNJOEJ4dXdLaUlhVU8vWEszb1Ix?=
 =?utf-8?B?OFdGeDFFbGVRV2FWSWZ6L2ZmODQ0aXNXenZsL1lGUktQTkxqcXFzK1N5ZFE3?=
 =?utf-8?B?TGRCK1hlTWRKZGxKcU5aditYYkprRzQ2T2tqazFKVXFmK3EyR0UwY0FzbVEy?=
 =?utf-8?B?c1kyVnlNVXJMNVBIN29NQzBuS0UrTXdCODFseE01SEpWZENLVXY5OU12b3Rq?=
 =?utf-8?B?TmRSckIrS3B6ZStiMHZUZ0hMZ3dCaUp6TWg3Q3hqTWZMT1VVMUdTT05sYjJs?=
 =?utf-8?B?USs5WW80VTdLckNzenE2RVVkQ1YvanZkTVgxRW9pQThRRlh2S09OVVJSS0hs?=
 =?utf-8?B?MHIzVXRSZUhuTzBQSk9WVGlQaEFLSHFmZVkwMFcwMVlDUGlXM2Z5Z0l0SVBJ?=
 =?utf-8?B?RGI4QlBSUXRBZWVWQXN5SU9NWi9TVWNpdThLYnhPWUs4UTE5clhiUEUwS0ls?=
 =?utf-8?B?czkvWS9rbW53UWxsSGhwVi9GTW1nZlE3aUphTFltbkF0bmpvOW1Id3czS2wy?=
 =?utf-8?B?LzlmaUUwTjNQODZjOWl4WEQ4L1BsOUZ3cmVHZ1NuTXNPUlA5Wi95dERiZzFM?=
 =?utf-8?B?OW94UHFvUzNpWTVwWFdic2RBZGYxUUFHaHNOOVZJT3N0Z1ZOR2MrQUVpVVl1?=
 =?utf-8?B?K1h2YTczMlhwa3RoU0JWWFJ0VUNHejFUelY5M0trTldyNThNTU9WWkd5RW03?=
 =?utf-8?B?SFNiN1BpZHkzYTFSUHp6engvbWxGeUIzNXlJVXlldkVxakU4R2xKR3FZZHNP?=
 =?utf-8?B?cWg3UWVPcHRUYldEZ01BZlNDZnVXK2hXb1J0MlVJR2pFSWdkcTY5SHhUa0Zo?=
 =?utf-8?B?K2x2MS92T2tTamNTZUp0OWowZUlndWx6WGhpenptYnNURzVaUVAyUU9SZ24x?=
 =?utf-8?B?ZVg3eGJvclg1Rzd1OEpWbTRlMjJkTG5JaDJoWGFYbTdtZlpTOERmUkIzRDlo?=
 =?utf-8?B?QjNmNGFTdll3YnVTcmY3ZE9iVk0yMkNmMXNoNzRPRXJoN0pPcVBPWENWT0d0?=
 =?utf-8?B?RzdFKzlXaFQ2RklGaTZkamVsZ1o0aFRRSklDY2xqdFl5VER0bUxJQmRYdWJj?=
 =?utf-8?B?ek5BYlFBNm5kNWQyamxEQVJId0g3ZzBBd1ZXQ1ZETTgvUm5QMkVYZ2gydzVt?=
 =?utf-8?B?NnBUNERiTkxObUZXbk0zdk1SM002WHlocGRIZGJ1bk9kaVBYQ2lqOEtidnBj?=
 =?utf-8?B?bFhCY0VBbU9IZWtzS3pSZjkxZVpBPT0=?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <90CAAABB222E2D4CAF69C9B3901E1F48@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 63bfabcf-a77b-4af4-f099-08da08eed6d2
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Mar 2022 14:51:52.4952
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: xmgUbUeq/eu00nEI0IQQd4+6fJsuPbLqydDBN7eQe0EzUN9KbiDDFFbBs9NpAaAOpJ5UMt6kLZ0f+e24Zh9H8+OO2N4sJsqUKlLfwPd+To0=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR03MB3349
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Fri Mar 18 15:03:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 15:03:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292005.495959 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVE8d-000346-Rw; Fri, 18 Mar 2022 15:03:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292005.495959; Fri, 18 Mar 2022 15:03:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVE8d-00033z-P4; Fri, 18 Mar 2022 15:03:35 +0000
Received: by outflank-mailman (input) for mailman id 292005;
 Fri, 18 Mar 2022 15:03:34 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Gqp6=T5=citrix.com=prvs=069a58476=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nVE8c-00033t-Ju
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 15:03:34 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 92fe537f-a6cc-11ec-853c-5f4723681683;
 Fri, 18 Mar 2022 16:03:33 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 92fe537f-a6cc-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647615813;
  h=date:from:to:cc:subject:message-id:references:
   mime-version:in-reply-to;
  bh=rv9gedlFnHMe/m4FcFQITmNF86t8mTlYCkEZwqq7ayU=;
  b=EwMgcLcmywNRum/Kn2hlyMBwOHWomUmFAxJBFso07sR9664kEW9GMBR/
   pBh9CZb/HpFbB8ceccgXyhv3oqP/rg9kyRrLxmvxc5HDuNsRNuXMeBm6h
   UQOzbD+eSVpiTmneXVhLfEbaKv1BvDHGIFoao4rswL1OGz0V77wyDx2VI
   s=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 66617835
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:jC6QlKjph7uRXjaSv0/KFK7xX161hBAKZh0ujC45NGQN5FlHY01je
 htvDz2Gb6yJZzOnL4h/bYm38B8OvsKHmoVkTAA5+ChgEnsb9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFrd4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YUQlHIz8oLUiaEhZOnx/P61325nYOWfq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bknhm0THeC+dgWZ3ZSr/GzdRZwC0xloZFGvO2i
 88xN2QxNUuQOEAn1lE/IpVkwrmNumvFYjB2t3eq+a1r503X9VkkuFTqGIWMIYHbLSlPpW6Iq
 2SD82nnDxUyMN2E1SHD4n+qnvXIny7wRMQVDrLQ3uV2jVOawGtVEwEfX1a/pfi/i2auWtZeL
 VxS8S0rxYA4+Va3VND7U1u9qWSdox8Hc9NKFqsx7wTl4rXQyxaUAC4DVDEpQMc9qMY8SDgu1
 1mIt9DkHzpitPuSU3313rWJqTK/PwAFIGlEYjULJSMO6sPvp4wbhRvVQtFuVqWyi7XI9SrYm
 m7Q6nJk3vNK0JBNh/7TEU37byyE5ZTrbz4NtzrsD2OMswJ7ZL+GQZOw9g2OhRpfF7qxQl6Et
 XkCvsGR6uESEJ2A/BCwrPUx8KKBvKjcbmCF6bJ7N9x4rmn2pSb/FWxFyGsmTHqFJProbtMAj
 KX7nQpKrKFeM3KxBUOcS9LgUp96pUQM+DmMaxw1UjasSsUpHONk1Hs3DaJ144wLuBJ0+U3YE
 c3HGftA9V5AVcxaIMOeHo/xK4MDyCEk3n/0Tpvm1Rmh2rf2TCfLFehYbgLXNbhktPrsTODpH
 zB3bZfiJ/J3CrCWX8Uq2dRLcQBiwYYTWPgaVPC7hsbce1E7SQnN+tfawK87epwNokimvrygw
 51JYWcBkACXrSSecW2iMyk/AJuyDccXhS9qZkQEYAf3s0XPlK7ytc/zgbNsJuJ5nAGipNYpJ
 8Q4lzKoWa0eFG6Yp2xDMfEQbuVKLXyWuO5HBAL9CBBXQnKqb1ahFgPMFuc3yBQzMw==
IronPort-HdrOrdr: A9a23:kMNdaqwOLCDOJVIwMfbXKrPwLr1zdoMgy1knxilNoRw8SK2lfu
 SV7ZMmPH7P+VIssR4b9exoVJPufZqYz+8S3WBzB8bGYOCFghrKEGgK1+KLqFeMJ8S9zJ8+6U
 4JSdkGNDSaNzhHZKjBjjWFLw==
X-IronPort-AV: E=Sophos;i="5.90,192,1643691600"; 
   d="scan'208";a="66617835"
Date: Fri, 18 Mar 2022 15:03:26 +0000
From: Anthony PERARD <anthony.perard@citrix.com>
To: Stefano Stabellini <sstabellini@kernel.org>
CC: Julien Grall <julien@xen.org>, <cardoe@cardoe.com>, <wl@xen.org>,
	<andrew.cooper3@citrix.com>, <xen-devel@lists.xenproject.org>, "Stefano
 Stabellini" <stefano.stabellini@xilinx.com>, <bertrand.marquis@arm.com>
Subject: Re: [PATCH RESEND 2/2] gitlab-ci: add an ARM32 qemu-based smoke test
Message-ID: <YjSfPtUwWrqhDsW2@perard.uk.xensource.com>
References: <20210714004854.31135-2-sstabellini@kernel.org>
 <2aaddfc5-0502-fd0a-6393-63a17c7f6778@xen.org>
 <alpine.DEB.2.22.394.2203161508200.3497@ubuntu-linux-20-04-desktop>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <alpine.DEB.2.22.394.2203161508200.3497@ubuntu-linux-20-04-desktop>

On Wed, Mar 16, 2022 at 06:38:53PM -0700, Stefano Stabellini wrote:
> Also considering the recent arm32 xen breakage, which could have been
> caught by gitlab-ci before commit,

I'm not sure that's true. I think the commits you are speaking about
also break the build on x86, which was caught by the gitlab ci.

Anyway, some arm32 smoke tests on gitlab should be useful.

Cheers,

-- 
Anthony PERARD


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 15:07:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 15:07:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292009.495974 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVECo-0003mI-HG; Fri, 18 Mar 2022 15:07:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292009.495974; Fri, 18 Mar 2022 15:07:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVECo-0003mB-CN; Fri, 18 Mar 2022 15:07:54 +0000
Received: by outflank-mailman (input) for mailman id 292009;
 Fri, 18 Mar 2022 15:07:52 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=9vuA=T5=xenbits.xen.org=gdunlap@srs-se1.protection.inumbo.net>)
 id 1nVECm-0003m0-3S
 for xen-devel@lists.xen.org; Fri, 18 Mar 2022 15:07:52 +0000
Received: from mail.xenproject.org (mail.xenproject.org [104.130.215.37])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2a352325-a6cd-11ec-8eba-a37418f5ba1a;
 Fri, 18 Mar 2022 16:07:49 +0100 (CET)
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <gdunlap@xenbits.xen.org>)
 id 1nVECT-0003xx-5r; Fri, 18 Mar 2022 15:07:33 +0000
Received: from gdunlap by xenbits.xenproject.org with local (Exim 4.92)
 (envelope-from <gdunlap@xenbits.xen.org>)
 id 1nVECT-0001Tb-3o; Fri, 18 Mar 2022 15:07:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2a352325-a6cd-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Date:Message-Id:Subject:CC:From:To:MIME-Version:
	Content-Transfer-Encoding:Content-Type;
	bh=4/pUvLMQ+pj/Ed1rWf+/zdtJqoQmnGA2SZYs8yXVdfI=; b=qMP0zkbszX8Vhxab/dnJvUli2q
	QvTlaM+kdLVqan0uAgSAuu9H3oyLS1lsu3x5GLTpu6va+JgMR5jZzEBDIRzt99Frp7IxptQbVXHs/
	Op62ASXLAIPvYoCbT9Sh027IsNQlThmrjHO2SqVDYBNNih6tyfNyrC9ZlnILDjg0RgMs=;
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
 xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
CC: Xen.org security team <security-team-members@xen.org>
Subject: Xen Security Advisory 398 v2 - Multiple speculative security issues
Message-Id: <E1nVECT-0001Tb-3o@xenbits.xenproject.org>
Date: Fri, 18 Mar 2022 15:07:33 +0000

--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

                    Xen Security Advisory XSA-398
                              version 2

                  Multiple speculative security issues

UPDATES IN VERSION 2
====================

 * Provide more specific ARM URL
 * Provide additional link to the Intel technical whitepaper

ISSUE DESCRIPTION
=================

Note: Multiple issues are contained in this XSA due to their interactions.

1) Researchers at VU Amsterdam have discovered Spectre-BHB, pertaining
   to the use of Branch History between privilege levels.

   ARM have assigned CVE-2022-23960.  Intel have assigned CVE-2022-0001
   (Branch History Injection) and CVE-2022-0002 (Intra-mode BTI).  AMD
   have no statement at the time of writing.

   For more details, see:
     https://vusec.net/projects/bhi-spectre-bhb
     https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability/spectre-bhb
     https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
     https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html

2) Researchers at Open Source Security, Inc. have discovered that AMD
   CPUs may speculate beyond direct branches.

   AMD have assigned CVE-2021-26341.

   For more details, see:
     https://grsecurity.net/amd_branch_mispredictor_part_2_where_no_cpu_has_gone_before
     https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1026

3) Researchers at Intel have discovered that previous Spectre-v2
   recommendations of using lfence/jmp is incomplete.

   AMD have assigned CVE-2021-26401.

   For more details, see:
     https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036

IMPACT
======

An attacker might be able to infer the contents of arbitrary host
memory, including memory assigned to other guests.

VULNERABLE SYSTEMS
==================

Systems running all versions of Xen are affected.

Whether a CPU is potentially vulnerable depends on its
microarchitecture.  Consult your hardware vendor.

Xen does not have a managed runtime environment, so is not believed to
be vulnerable to CVE-2022-0002 irrespective of any hardware
susceptibility.

Xen does not have any known gadgets vulnerable to Direct Branch Straight
Line Speculation.  Therefore, no changes for CVE-2021-26341 are being
provided at this time.

The AMD BTI (Spectre v2) protections do not depend on isolating
predictions between different privileges, so the fact that Branch
History is shared (just like the Branch Target Buffer) is not believed
to be relevant to existing mitigations.  Therefore, there is no believed
impact from Spectre-BHB on AMD hardware.

Patches to mitigate CVE-2022-23960 on affected ARM CPUs are provided.

Intel have recommended not making any changes by default for
CVE-2022-0001.  Existing Spectre-v2 mitigations on pre-eIBRS hardware
are believed to be sufficient.  On eIBRS capable hardware, there is
uncertainty over the utility of Branch History Injection to an
adversary.  However, the risk can be removed by using eIBRS in
combination with retpoline.

For CVE-2021-26401, AMD have recommended using retpoline in preference
to lfence/jmp as previously recommended to mitigate Spectre-v2.  This
recommendation also mitigates any risk from Branch History Injection.

For both CVE-2022-0001 on Intel, and CVE-2021-26401 on AMD, the
suggestion to use retpoline is incompatible with CET Shadow Stacks as
implemented in Xen 4.14 and later.  The security team has decided that
disabling CET Shadow Stacks to work around speculation problems is not a
reasonable option for downstreams and end users.

Therefore, patches are also provided to:
 * Use IBRS on capable AMD hardware.  This also mitigates
   CVE-2021-26401.
 * Use CET Indirect Branch Tracking on capable Intel hardware.  CET-IBT
   has architectural guarantees about halting speculation, on top of
   being a hardware mechanism to protect against Call/Jump Oriented
   Programming attacks.

Both provide CET Shadow Stack compatible mitigations to these issues.  A
practical consequence of this decision is that CET Shadow Stacks are now
considered security supported, upgraded from Tech Preview previously.

Note: CET-IBT patches are incomplete and will be backported at a later date.

MITIGATION
==========

On AMD systems, CVE-2021-26401 can be mitigated by specifying:

 With CET-SS,    `spec-ctrl=bti-thunk=jmp,ibrs`
 Without CET-SS, `spec-ctrl=bti-thunk=retpoline`

on Xen's command line, and rebooting.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

Note that patches for released versions are generally prepared to
apply to the stable branches, and may not apply cleanly to the most
recent release tarball.  Downstreams are encouraged to update to the
tip of the stable branch before applying these patches.

xsa398/xsa398-?-*.patch         xen-unstable
xsa398/xsa398-4.16-*.patch      Xen 4.16.x
xsa398/xsa398-4.15-*.patch      Xen 4.15.x
xsa398/xsa398-4.14-*.patch      Xen 4.14.x
xsa398/xsa398-4.13-*.patch      Xen 4.13.x
xsa398/xsa398-4.12-*.patch      Xen 4.12.x

$ sha256sum xsa398* xsa398*/*
9219c48d103a7eeda0fa9cbb5fc5b2265713589e29a9a483d0f3fb6523859903  xsa398.meta
32e7a7627609de2273fe474979e339f6a578cbcf7ce007b6a047954a31aec135  xsa398/xsa398-1-xen-arm-Introduce-new-Arm-processors.patch
ef701fd64cfdd838299391cd736749db70ac3b18251d17768d42f4a610dda1be  xsa398/xsa398-2-xen-arm-move-errata-CSV2-check-earlier.patch
4d574bc40555f068608a595ade23ecdc224f8c0af86f447cba6e765d4ccde3ad  xsa398/xsa398-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch
29a2880ab4fa492deecd2f3dc590609d0df5e9210565ab4121be0d731c4140b0  xsa398/xsa398-4.12-1-xen-arm-Introduce-new-Arm-processors.patch
b81eb6a0f8ecde53318eeff1ec8bf1b3fd5f1b211a499317f6c596e831a90101  xsa398/xsa398-4.12-2-xen-arm-move-errata-CSV2-check-earlier.patch
a9f5adc44eeeaf5a694f94c91a32e714c765bbcf61066a03e3c52d79d28a3366  xsa398/xsa398-4.12-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch
e70d4c06f789c8f5f45c7e27289f8c7aa4c448a6e33f67fb113630ed79382fd9  xsa398/xsa398-4.12-4-xen-arm-Add-Spectre-BHB-handling.patch
6766c0b0d89f3be90046c05358e8b7c43c87b3e1012118af013faa098e783e74  xsa398/xsa398-4.12-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch
fd047878fd53e130cd7d8cfd1d50334a958e7e962606afaacd5aa1da186f6341  xsa398/xsa398-4.12-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch
1ef4fae89d2bc75e33eb6c8e5f55d0b6f5ba45a274f6d3b5ea7e2eef4c08ad63  xsa398/xsa398-4.13-1-xen-arm-Introduce-new-Arm-processors.patch
b0c25a34055dd5401dff1686f4f7ab978c6a449a76aa0e1b369f483fa184851a  xsa398/xsa398-4.13-2-xen-arm-move-errata-CSV2-check-earlier.patch
c6ffa2818480740dc30e232215531ab69c252e564df365c466e759886b207450  xsa398/xsa398-4.13-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch
a272621b1f03b2096a41d675b3ed46ff2c737cd2afcb3e2156a7ec2f8c31748b  xsa398/xsa398-4.13-4-xen-arm-Add-Spectre-BHB-handling.patch
8df9f4d3e7bd154246ebe7cd1bc0908ead1076aa35c0a183cd95359aa2173ad0  xsa398/xsa398-4.13-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch
02c3a3c45bf3c2592bbc809ce4a8eb24d0b9d31856e9641d5566af68ebf2b476  xsa398/xsa398-4.13-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch
59edd0b8303a39451893d425b8e7ab8aeacf3e6d0bf460ba66a3a323dc0e3145  xsa398/xsa398-4.14-1-xen-arm-Introduce-new-Arm-processors.patch
60bd3003759404b60fd8a7dcf0de87a13463bf64c3724f8fe6570e07c515cecb  xsa398/xsa398-4.14-2-xen-arm-move-errata-CSV2-check-earlier.patch
138511c69d00ef1dc0dfe5432af06d744e7b66945bada78024e343943fc001f2  xsa398/xsa398-4.14-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch
9c1b338511422629c98f11c42da27b1cd82435decc0531bca6b8a51218909101  xsa398/xsa398-4.14-4-xen-arm-Add-Spectre-BHB-handling.patch
1a212de641ac1cebfc1aee32c55e9f8bfac6b059f5419ed62589eed99cc0dea5  xsa398/xsa398-4.14-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch
da382a5baee60ecdf8b4cb0da2c1901b23f324b03dbbe33018fb825e70f78446  xsa398/xsa398-4.14-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch
296e5fdd53328e768908a4e790959841264a410548b4f52f7ccdcf793e9aca7a  xsa398/xsa398-4.15-1-xen-arm-Introduce-new-Arm-processors.patch
4498957a1f91c69e2a72cfcfb88804537ee0c05f05fa5d898f452a4dc8205f9e  xsa398/xsa398-4.15-2-xen-arm-move-errata-CSV2-check-earlier.patch
2f2b9ec3945283e48486cfd32d5b4343892040d48adc105a89e15953a128df3d  xsa398/xsa398-4.15-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch
6d0ade4dfb59fc87c7ae22e4faa333fb5ccef5ecc595de58ef9bcf35f4e3eb26  xsa398/xsa398-4.15-4-xen-arm-Add-Spectre-BHB-handling.patch
77a0a93cd9617c8f0ec0bab1b79f6ed60cab20f5b6ea76a9b6158c4d3a1d0d89  xsa398/xsa398-4.15-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch
7df5b320c5887c72c8ed4ffe5b4bcdce9263fde76fe6a67e0876933f8d1ebcff  xsa398/xsa398-4.15-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch
92bdba8102f88a2c9d71b46df4db43176fbf0082f9d438101407dbb7e6d458c6  xsa398/xsa398-4.16-1-xen-arm-Introduce-new-Arm-processors.patch
0c9a6fbebc13a0dee288d67a94562fd76e3c6aec20b543c66ac2c16a812973ee  xsa398/xsa398-4.16-2-xen-arm-move-errata-CSV2-check-earlier.patch
4f084857ed79af49d2814c02ff6e090a14d77bb0f0d29ac6ddce3576fdb98c68  xsa398/xsa398-4.16-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch
8032757effe8dbc5ef8479403461e604b1520f007489620eace3857b467a4fe2  xsa398/xsa398-4.16-4-xen-arm-Add-Spectre-BHB-handling.patch
3763998bb62d9b251b9358edff220fd22847729768c98dbd46362c290041025b  xsa398/xsa398-4.16-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch
114f07da2d79f45e0fa45c826c308b273e8c29b6d458bac10fe1aa231a3c2748  xsa398/xsa398-4.16-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch
1bedca674ecee5437e492e2f71275cd32e799d839d26a8f0d75ddee44db2e4d2  xsa398/xsa398-4-xen-arm-Add-Spectre-BHB-handling.patch
6d63089af3eca863599bbe20e26f1f12d2d9c9b637317e7af44fc59750b09f77  xsa398/xsa398-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch
f79e357079744bbee3e1f7d99d93196e925739297a16fdd8bc1cc86d3b846ce3  xsa398/xsa398-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch
$
-----BEGIN PGP SIGNATURE-----

iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmI0maAMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZ/kMIAKi717qEq8DKT4tIzIUzSdK1TuZacTC1ab9MI6Ch
LNK/+ra8TYB/o773nF7WXAHJLQkl8qoRG2zZMRPaKTSMjRQaj2J96/8Jk/Th2Ocu
jb4n1XjJ72BJNwGgegjsPqJvKnv4HWT/pNnHciYKSHB0tPSoOvySlNZAhvTXIM7a
aOekPV+cYVrBRM3JEIvcdaPJBpJHil1erkIlaDQy4tUHzYgHzvE/SQ/lEMFCzEsD
Bd70bTxmojn11Z6TcNPdMv2TPNQcuQvVrzJh0EhKqfGwO6bGbI5jffWs7NIPQ7PU
2OBSYYKa2kv0u1/5XxykqgXrdE34VV8gYXhDUKMvWFGe6d0=
=xHd2
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa398.meta"
Content-Disposition: attachment; filename="xsa398.meta"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-1-xen-arm-Introduce-new-Arm-processors.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-1-xen-arm-Introduce-new-Arm-processors.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-2-xen-arm-move-errata-CSV2-check-earlier.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-2-xen-arm-move-errata-CSV2-check-earlier.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.12-1-xen-arm-Introduce-new-Arm-processors.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.12-1-xen-arm-Introduce-new-Arm-processors.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.12-2-xen-arm-move-errata-CSV2-check-earlier.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.12-2-xen-arm-move-errata-CSV2-check-earlier.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.12-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.12-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.12-4-xen-arm-Add-Spectre-BHB-handling.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.12-4-xen-arm-Add-Spectre-BHB-handling.patch"
Content-Transfer-Encoding: base64

RnJvbSBkMzQwZmFkOGJlMzI0ZTE3NjBlYTI5ZDdjMjU2NThhOGFlYzgzMzA2
IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBSYWh1bCBTaW5naCA8
cmFodWwuc2luZ2hAYXJtLmNvbT4KRGF0ZTogTW9uLCAxNCBGZWIgMjAyMiAx
ODo0NzozMiArMDAwMApTdWJqZWN0OiB4ZW4vYXJtOiBBZGQgU3BlY3RyZSBC
SEIgaGFuZGxpbmcKClRoaXMgY29tbWl0IGlzIGFkZGluZyBTcGVjdHJlIEJI
QiBoYW5kbGluZyB0byBYZW4gb24gQXJtLgpUaGUgY29tbWl0IGlzIGludHJv
ZHVjaW5nIG5ldyBhbHRlcm5hdGl2ZSBjb2RlIHRvIGJlIGV4ZWN1dGVkIGR1
cmluZwpleGNlcHRpb24gZW50cnk6Ci0gU01DQyB3b3JrYXJvdW5kIDMgY2Fs
bAotIGxvb3Agd29ya2Fyb3VuZCAod2l0aCA4LCAyNCBvciAzMiBpdGVyYXRp
b25zKQotIHVzZSBvZiBuZXcgY2xlYXJiaGIgaW5zdHJ1Y3Rpb24KCkNwdWVy
cmF0YSBpcyBtb2RpZmllZCBieSB0aGlzIHBhdGNoIHRvIGFwcGx5IHRoZSBy
ZXF1aXJlZCB3b3JrYXJvdW5kIGZvcgpDUFUgYWZmZWN0ZWQgYnkgU3BlY3Ry
ZSBCSEIgd2hlbiBDT05GSUdfQVJNNjRfSEFSREVOX0JSQU5DSF9QUkVESUNU
T1IgaXMKZW5hYmxlZC4KClRvIGRvIHRoaXMgdGhlIHN5c3RlbSBwcmV2aW91
c2x5IHVzZWQgdG8gYXBwbHkgc21jYyB3b3JrYXJvdW5kIDEgaXMKcmV1c2Vk
IGFuZCBuZXcgYWx0ZXJuYXRpdmUgY29kZSB0byBiZSBjb3BpZWQgaW4gdGhl
IGV4Y2VwdGlvbiBoYW5kbGVyIGlzCmludHJvZHVjZWQuCgpUbyBkZWZpbmUg
dGhlIHR5cGUgb2Ygd29ya2Fyb3VuZCByZXF1aXJlZCBieSBhIHByb2Nlc3Nv
ciwgNCBuZXcgY3B1CmNhcGFiaWxpdGllcyBhcmUgaW50cm9kdWNlZCAoZm9y
IGVhY2ggbnVtYmVyIG9mIGxvb3AgYW5kIGZvciBzbWNjCndvcmthcm91bmQg
MykuCgpXaGVuIGEgcHJvY2Vzc29yIGlzIGFmZmVjdGVkLCBlbmFibGVfc3Bl
Y3RyZV9iaGJfd29ya2Fyb3VuZCBpcyBjYWxsZWQKYW5kIGlmIHRoZSBwcm9j
ZXNzb3IgZG9lcyBub3QgaGF2ZSBDU1YyIHNldCB0byAzIG9yIEVDQkhCIGZl
YXR1cmUgKHdoaWNoCndvdWxkIG1lYW4gdGhhdCB0aGUgcHJvY2Vzc29yIGlz
IGRvaW5nIHdoYXQgaXMgcmVxdWlyZWQgaW4gaGFyZHdhcmUpLAp0aGUgcHJv
cGVyIGNvZGUgaXMgZW5hYmxlZCBhdCBleGNlcHRpb24gZW50cnkuCgpJbiB0
aGUgY2FzZSB3aGVyZSB3b3JrYXJvdW5kIDMgaXMgbm90IHN1cHBvcnRlZCBi
eSB0aGUgZmlybXdhcmUsIHdlCmVuYWJsZSB3b3JrYXJvdW5kIDEgd2hlbiBw
b3NzaWJsZSBhcyBpdCB3aWxsIGFsc28gbWl0aWdhdGUgU3BlY3RyZSBCSEIK
b24gc3lzdGVtcyB3aXRob3V0IENTVjIuCgpUaGlzIGlzIHBhcnQgb2YgWFNB
LTM5OCAvIENWRS0yMDIyLTIzOTYwLgoKU2lnbmVkLW9mZi1ieTogQmVydHJh
bmQgTWFycXVpcyA8YmVydHJhbmQubWFycXVpc0Bhcm0uY29tPgpTaWduZWQt
b2ZmLWJ5OiBSYWh1bCBTaW5naCA8cmFodWwuc2luZ2hAYXJtLmNvbT4KQWNr
ZWQtYnk6IEp1bGllbiBHcmFsbCA8anVsaWVuQHhlbi5vcmc+CihjaGVycnkg
cGlja2VkIGZyb20gY29tbWl0IDYyYzkxZWI2NmEyOTA0ZWVmYjFkMWQ5NjQy
ZTM2OTdhMWUzYzNhM2MpCgpkaWZmIC0tZ2l0IGEveGVuL2FyY2gvYXJtL2Fy
bTY0L2JwaS5TIGIveGVuL2FyY2gvYXJtL2FybTY0L2JwaS5TCmluZGV4IGQ4
NzQzZDk1NWM0YS4uNGU2MzgyNTIyMDQ4IDEwMDY0NAotLS0gYS94ZW4vYXJj
aC9hcm0vYXJtNjQvYnBpLlMKKysrIGIveGVuL2FyY2gvYXJtL2FybTY0L2Jw
aS5TCkBAIC01OCwxNiArNTgsNDIgQEAgRU5UUlkoX19icF9oYXJkZW5faHlw
X3ZlY3Nfc3RhcnQpCiAgICAgLmVuZHIKIEVOVFJZKF9fYnBfaGFyZGVuX2h5
cF92ZWNzX2VuZCkKIAotRU5UUlkoX19zbWNjY193b3JrYXJvdW5kXzFfc21j
X3N0YXJ0KQorLm1hY3JvIG1pdGlnYXRlX3NwZWN0cmVfYmhiX2xvb3AgY291
bnQKK0VOVFJZKF9fbWl0aWdhdGVfc3BlY3RyZV9iaGJfbG9vcF9zdGFydF9c
Y291bnQpCisgICAgc3RwICAgICB4MCwgeDEsIFtzcCwgIy0xNl0hCisgICAg
bW92ICAgICB4MCwgXGNvdW50CisuTHNwZWN0cmVfYmhiX2xvb3BcQDoKKyAg
ICBiICAgLiArIDQKKyAgICBzdWJzICAgIHgwLCB4MCwgIzEKKyAgICBiLm5l
ICAgIC5Mc3BlY3RyZV9iaGJfbG9vcFxACisgICAgc2IKKyAgICBsZHAgICAg
IHgwLCB4MSwgW3NwXSwgIzE2CitFTlRSWShfX21pdGlnYXRlX3NwZWN0cmVf
YmhiX2xvb3BfZW5kX1xjb3VudCkKKy5lbmRtCisKKy5tYWNybyBzbWNjY193
b3JrYXJvdW5kIG51bSBzbWNjX2lkCitFTlRSWShfX3NtY2NjX3dvcmthcm91
bmRfc21jX3N0YXJ0X1xudW0pCiAgICAgc3ViICAgICBzcCwgc3AsICMoOCAq
IDQpCiAgICAgc3RwICAgICB4MCwgeDEsIFtzcCwgIyg4ICogMildCiAgICAg
c3RwICAgICB4MiwgeDMsIFtzcCwgIyg4ICogMCldCi0gICAgbW92ICAgICB3
MCwgI0FSTV9TTUNDQ19BUkNIX1dPUktBUk9VTkRfMV9GSUQKKyAgICBtb3Yg
ICAgIHcwLCBcc21jY19pZAogICAgIHNtYyAgICAgIzAKICAgICBsZHAgICAg
IHgyLCB4MywgW3NwLCAjKDggKiAwKV0KICAgICBsZHAgICAgIHgwLCB4MSwg
W3NwLCAjKDggKiAyKV0KICAgICBhZGQgICAgIHNwLCBzcCwgIyg4ICogNCkK
LUVOVFJZKF9fc21jY2Nfd29ya2Fyb3VuZF8xX3NtY19lbmQpCitFTlRSWShf
X3NtY2NjX3dvcmthcm91bmRfc21jX2VuZF9cbnVtKQorLmVuZG0KKworRU5U
UlkoX19taXRpZ2F0ZV9zcGVjdHJlX2JoYl9jbGVhcl9pbnNuX3N0YXJ0KQor
ICAgIGNsZWFyYmhiCisgICAgaXNiCitFTlRSWShfX21pdGlnYXRlX3NwZWN0
cmVfYmhiX2NsZWFyX2luc25fZW5kKQorCittaXRpZ2F0ZV9zcGVjdHJlX2Jo
Yl9sb29wIDgKK21pdGlnYXRlX3NwZWN0cmVfYmhiX2xvb3AgMjQKK21pdGln
YXRlX3NwZWN0cmVfYmhiX2xvb3AgMzIKK3NtY2NjX3dvcmthcm91bmQgMSwg
I0FSTV9TTUNDQ19BUkNIX1dPUktBUk9VTkRfMV9GSUQKK3NtY2NjX3dvcmth
cm91bmQgMywgI0FSTV9TTUNDQ19BUkNIX1dPUktBUk9VTkRfM19GSUQKIAog
LyoKICAqIExvY2FsIHZhcmlhYmxlczoKZGlmZiAtLWdpdCBhL3hlbi9hcmNo
L2FybS9jcHVlcnJhdGEuYyBiL3hlbi9hcmNoL2FybS9jcHVlcnJhdGEuYwpp
bmRleCA5ZTFlY2QwNzE0NzAuLmQ3MGQxZTE2ZTk0NiAxMDA2NDQKLS0tIGEv
eGVuL2FyY2gvYXJtL2NwdWVycmF0YS5jCisrKyBiL3hlbi9hcmNoL2FybS9j
cHVlcnJhdGEuYwpAQCAtMTQ0LDcgKzE0NCwxNiBAQCBpbnN0YWxsX2JwX2hh
cmRlbmluZ192ZWMoY29uc3Qgc3RydWN0IGFybV9jcHVfY2FwYWJpbGl0aWVz
ICplbnRyeSwKICAgICByZXR1cm4gcmV0OwogfQogCi1leHRlcm4gY2hhciBf
X3NtY2NjX3dvcmthcm91bmRfMV9zbWNfc3RhcnRbXSwgX19zbWNjY193b3Jr
YXJvdW5kXzFfc21jX2VuZFtdOworZXh0ZXJuIGNoYXIgX19zbWNjY193b3Jr
YXJvdW5kX3NtY19zdGFydF8xW10sIF9fc21jY2Nfd29ya2Fyb3VuZF9zbWNf
ZW5kXzFbXTsKK2V4dGVybiBjaGFyIF9fc21jY2Nfd29ya2Fyb3VuZF9zbWNf
c3RhcnRfM1tdLCBfX3NtY2NjX3dvcmthcm91bmRfc21jX2VuZF8zW107Citl
eHRlcm4gY2hhciBfX21pdGlnYXRlX3NwZWN0cmVfYmhiX2NsZWFyX2luc25f
c3RhcnRbXSwKKyAgICAgICAgICAgIF9fbWl0aWdhdGVfc3BlY3RyZV9iaGJf
Y2xlYXJfaW5zbl9lbmRbXTsKK2V4dGVybiBjaGFyIF9fbWl0aWdhdGVfc3Bl
Y3RyZV9iaGJfbG9vcF9zdGFydF84W10sCisgICAgICAgICAgICBfX21pdGln
YXRlX3NwZWN0cmVfYmhiX2xvb3BfZW5kXzhbXTsKK2V4dGVybiBjaGFyIF9f
bWl0aWdhdGVfc3BlY3RyZV9iaGJfbG9vcF9zdGFydF8yNFtdLAorICAgICAg
ICAgICAgX19taXRpZ2F0ZV9zcGVjdHJlX2JoYl9sb29wX2VuZF8yNFtdOwor
ZXh0ZXJuIGNoYXIgX19taXRpZ2F0ZV9zcGVjdHJlX2JoYl9sb29wX3N0YXJ0
XzMyW10sCisgICAgICAgICAgICBfX21pdGlnYXRlX3NwZWN0cmVfYmhiX2xv
b3BfZW5kXzMyW107CiAKIHN0YXRpYyBpbnQgZW5hYmxlX3NtY2NjX2FyY2hf
d29ya2Fyb3VuZF8xKHZvaWQgKmRhdGEpCiB7CkBAIC0xNzYsOCArMTg1LDgg
QEAgc3RhdGljIGludCBlbmFibGVfc21jY2NfYXJjaF93b3JrYXJvdW5kXzEo
dm9pZCAqZGF0YSkKICAgICBpZiAoIChpbnQpcmVzLmEwIDwgMCApCiAgICAg
ICAgIGdvdG8gd2FybjsKIAotICAgIHJldHVybiAhaW5zdGFsbF9icF9oYXJk
ZW5pbmdfdmVjKGVudHJ5LF9fc21jY2Nfd29ya2Fyb3VuZF8xX3NtY19zdGFy
dCwKLSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBfX3Nt
Y2NjX3dvcmthcm91bmRfMV9zbWNfZW5kLAorICAgIHJldHVybiAhaW5zdGFs
bF9icF9oYXJkZW5pbmdfdmVjKGVudHJ5LF9fc21jY2Nfd29ya2Fyb3VuZF9z
bWNfc3RhcnRfMSwKKyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICBfX3NtY2NjX3dvcmthcm91bmRfc21jX2VuZF8xLAogICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICJjYWxsIEFSTV9TTUNDQ19B
UkNIX1dPUktBUk9VTkRfMSIpOwogCiB3YXJuOgpAQCAtMTkyLDYgKzIwMSw5
MyBAQCBzdGF0aWMgaW50IGVuYWJsZV9zbWNjY19hcmNoX3dvcmthcm91bmRf
MSh2b2lkICpkYXRhKQogICAgIHJldHVybiAwOwogfQogCisvKgorICogU3Bl
Y3RyZSBCSEIgTWl0aWdhdGlvbgorICoKKyAqIENQVSBpcyBlaXRoZXI6Cisg
KiAtIEhhdmluZyBDVlMyLjMgc28gaXQgaXMgbm90IGFmZmVjdGVkLgorICog
LSBIYXZpbmcgRUNCSEIgYW5kIGlzIGNsZWFyaW5nIHRoZSBicmFuY2ggaGlz
dG9yeSBidWZmZXIgd2hlbiBhbiBleGNlcHRpb24KKyAqICAgdG8gYSBkaWZm
ZXJlbnQgZXhjZXB0aW9uIGxldmVsIGlzIGhhcHBlbmluZyBzbyBubyBtaXRp
Z2F0aW9uIGlzIG5lZWRlZC4KKyAqIC0gTWl0aWdhdGluZyB1c2luZyBhIGxv
b3Agb24gZXhjZXB0aW9uIGVudHJ5IChudW1iZXIgb2YgbG9vcCBkZXBlbmRp
bmcgb24KKyAqICAgdGhlIENQVSkuCisgKiAtIE1pdGlnYXRpbmcgdXNpbmcg
dGhlIGZpcm13YXJlLgorICovCitzdGF0aWMgaW50IGVuYWJsZV9zcGVjdHJl
X2JoYl93b3JrYXJvdW5kKHZvaWQgKmRhdGEpCit7CisgICAgY29uc3Qgc3Ry
dWN0IGFybV9jcHVfY2FwYWJpbGl0aWVzICplbnRyeSA9IGRhdGE7CisKKyAg
ICAvKgorICAgICAqIEVuYWJsZSBjYWxsYmFja3MgYXJlIGNhbGxlZCBvbiBl
dmVyeSBDUFUgYmFzZWQgb24gdGhlIGNhcGFiaWxpdGllcywgc28KKyAgICAg
KiBkb3VibGUtY2hlY2sgd2hldGhlciB0aGUgQ1BVIG1hdGNoZXMgdGhlIGVu
dHJ5LgorICAgICAqLworICAgIGlmICggIWVudHJ5LT5tYXRjaGVzKGVudHJ5
KSApCisgICAgICAgIHJldHVybiAwOworCisgICAgaWYgKCBjcHVfZGF0YVtz
bXBfcHJvY2Vzc29yX2lkKCldLnBmcjY0LmNzdjIgPT0gMyApCisgICAgICAg
IHJldHVybiAwOworCisgICAgaWYgKCBjcHVfZGF0YVtzbXBfcHJvY2Vzc29y
X2lkKCldLm1tNjQuZWNiaGIgKQorICAgICAgICByZXR1cm4gMDsKKworICAg
IGlmICggY3B1X2RhdGFbc21wX3Byb2Nlc3Nvcl9pZCgpXS5pc2E2NC5jbGVh
cmJoYiApCisgICAgICAgIHJldHVybiAhaW5zdGFsbF9icF9oYXJkZW5pbmdf
dmVjKGVudHJ5LAorICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgX19taXRpZ2F0ZV9zcGVjdHJlX2JoYl9jbGVhcl9pbnNuX3N0YXJ0LAor
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgX19taXRpZ2F0
ZV9zcGVjdHJlX2JoYl9jbGVhcl9pbnNuX2VuZCwKKyAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAidXNlIGNsZWFyQkhCIGluc3RydWN0
aW9uIik7CisKKyAgICAvKiBBcHBseSBzb2x1dGlvbiBkZXBlbmRpbmcgb24g
aHdjYXBzIHNldCBvbiBhcm1fZXJyYXRhICovCisgICAgaWYgKCBjcHVzX2hh
dmVfY2FwKEFSTV9XT1JLQVJPVU5EX0JIQl9MT09QXzgpICkKKyAgICAgICAg
cmV0dXJuICFpbnN0YWxsX2JwX2hhcmRlbmluZ192ZWMoZW50cnksCisgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIF9fbWl0aWdh
dGVfc3BlY3RyZV9iaGJfbG9vcF9zdGFydF84LAorICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICBfX21pdGlnYXRlX3NwZWN0cmVf
YmhiX2xvb3BfZW5kXzgsCisgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICJ1c2UgOCBsb29wcyB3b3JrYXJvdW5kIik7CisKKyAg
ICBpZiAoIGNwdXNfaGF2ZV9jYXAoQVJNX1dPUktBUk9VTkRfQkhCX0xPT1Bf
MjQpICkKKyAgICAgICAgcmV0dXJuICFpbnN0YWxsX2JwX2hhcmRlbmluZ192
ZWMoZW50cnksCisgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgIF9fbWl0aWdhdGVfc3BlY3RyZV9iaGJfbG9vcF9zdGFydF8yNCwK
KyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgX19t
aXRpZ2F0ZV9zcGVjdHJlX2JoYl9sb29wX2VuZF8yNCwKKyAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgInVzZSAyNCBsb29wcyB3
b3JrYXJvdW5kIik7CisKKyAgICBpZiAoIGNwdXNfaGF2ZV9jYXAoQVJNX1dP
UktBUk9VTkRfQkhCX0xPT1BfMzIpICkKKyAgICAgICAgcmV0dXJuICFpbnN0
YWxsX2JwX2hhcmRlbmluZ192ZWMoZW50cnksCisgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgIF9fbWl0aWdhdGVfc3BlY3RyZV9i
aGJfbG9vcF9zdGFydF8zMiwKKyAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgX19taXRpZ2F0ZV9zcGVjdHJlX2JoYl9sb29wX2Vu
ZF8zMiwKKyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgInVzZSAzMiBsb29wcyB3b3JrYXJvdW5kIik7CisKKyAgICBpZiAoIGNw
dXNfaGF2ZV9jYXAoQVJNX1dPUktBUk9VTkRfQkhCX1NNQ0NfMykgKQorICAg
IHsKKyAgICAgICAgc3RydWN0IGFybV9zbWNjY19yZXMgcmVzOworCisgICAg
ICAgIGlmICggc21jY2NfdmVyIDwgU01DQ0NfVkVSU0lPTigxLCAxKSApCisg
ICAgICAgICAgICBnb3RvIHdhcm47CisKKyAgICAgICAgYXJtX3NtY2NjXzFf
MV9zbWMoQVJNX1NNQ0NDX0FSQ0hfRkVBVFVSRVNfRklELAorICAgICAgICAg
ICAgICAgICAgICAgICAgICBBUk1fU01DQ0NfQVJDSF9XT1JLQVJPVU5EXzNf
RklELCAmcmVzKTsKKyAgICAgICAgLyogVGhlIHJldHVybiB2YWx1ZSBpcyBp
biB0aGUgbG93ZXIgMzItYml0cy4gKi8KKyAgICAgICAgaWYgKCAoaW50KXJl
cy5hMCA8IDAgKQorICAgICAgICB7CisgICAgICAgICAgICAvKgorICAgICAg
ICAgICAgICogT24gcHJvY2Vzc29yIGFmZmVjdGVkIHdpdGggQ1NWMj0wLCB3
b3JrYXJvdW5kIDEgd2lsbCBtaXRpZ2F0ZQorICAgICAgICAgICAgICogYm90
aCBTcGVjdHJlIHYyIGFuZCBCSEIgc28gdXNlIGl0IHdoZW4gYXZhaWxhYmxl
CisgICAgICAgICAgICAgKi8KKyAgICAgICAgICAgIGlmICggZW5hYmxlX3Nt
Y2NjX2FyY2hfd29ya2Fyb3VuZF8xKGRhdGEpICkKKyAgICAgICAgICAgICAg
ICByZXR1cm4gMTsKKworICAgICAgICAgICAgZ290byB3YXJuOworICAgICAg
ICB9CisKKyAgICAgICAgcmV0dXJuICFpbnN0YWxsX2JwX2hhcmRlbmluZ192
ZWMoZW50cnksX19zbWNjY193b3JrYXJvdW5kX3NtY19zdGFydF8zLAorICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBfX3NtY2Nj
X3dvcmthcm91bmRfc21jX2VuZF8zLAorICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAiY2FsbCBBUk1fU01DQ0NfQVJDSF9XT1JL
QVJPVU5EXzMiKTsKKyAgICB9CisKK3dhcm46CisgICAgcHJpbnRrX29uY2Uo
IioqKiogTm8gc3VwcG9ydCBmb3IgYW55IHNwZWN0cmUgQkhCIHdvcmthcm91
bmQuICAqKioqXG4iCisgICAgICAgICAgICAgICAgIioqKiogUGxlYXNlIHVw
ZGF0ZSB5b3VyIGZpcm13YXJlLiAgICAgICAgICAgICAgICAqKioqXG4iKTsK
KworICAgIHJldHVybiAwOworfQorCiAjZW5kaWYgLyogQ09ORklHX0FSTTY0
X0hBUkRFTl9CUkFOQ0hfUFJFRElDVE9SICovCiAKIC8qIEhhcmRlbmluZyBC
cmFuY2ggcHJlZGljdG9yIGNvZGUgZm9yIEFybTMyICovCkBAIC00NTEsMTkg
KzU0Nyw3NyBAQCBzdGF0aWMgY29uc3Qgc3RydWN0IGFybV9jcHVfY2FwYWJp
bGl0aWVzIGFybV9lcnJhdGFbXSA9IHsKICAgICB9LAogICAgIHsKICAgICAg
ICAgLmNhcGFiaWxpdHkgPSBBUk1fSEFSREVOX0JSQU5DSF9QUkVESUNUT1Is
Ci0gICAgICAgIE1JRFJfQUxMX1ZFUlNJT05TKE1JRFJfQ09SVEVYX0E3Miks
CisgICAgICAgIE1JRFJfUkFOR0UoTUlEUl9DT1JURVhfQTcyLCAwLCAxIDw8
IE1JRFJfVkFSSUFOVF9TSElGVCksCiAgICAgICAgIC5lbmFibGUgPSBlbmFi
bGVfc21jY2NfYXJjaF93b3JrYXJvdW5kXzEsCiAgICAgfSwKICAgICB7Ci0g
ICAgICAgIC5jYXBhYmlsaXR5ID0gQVJNX0hBUkRFTl9CUkFOQ0hfUFJFRElD
VE9SLAorICAgICAgICAuY2FwYWJpbGl0eSA9IEFSTV9XT1JLQVJPVU5EX0JI
Ql9TTUNDXzMsCiAgICAgICAgIE1JRFJfQUxMX1ZFUlNJT05TKE1JRFJfQ09S
VEVYX0E3MyksCi0gICAgICAgIC5lbmFibGUgPSBlbmFibGVfc21jY2NfYXJj
aF93b3JrYXJvdW5kXzEsCisgICAgICAgIC5lbmFibGUgPSBlbmFibGVfc3Bl
Y3RyZV9iaGJfd29ya2Fyb3VuZCwKICAgICB9LAogICAgIHsKLSAgICAgICAg
LmNhcGFiaWxpdHkgPSBBUk1fSEFSREVOX0JSQU5DSF9QUkVESUNUT1IsCisg
ICAgICAgIC5jYXBhYmlsaXR5ID0gQVJNX1dPUktBUk9VTkRfQkhCX1NNQ0Nf
MywKICAgICAgICAgTUlEUl9BTExfVkVSU0lPTlMoTUlEUl9DT1JURVhfQTc1
KSwKLSAgICAgICAgLmVuYWJsZSA9IGVuYWJsZV9zbWNjY19hcmNoX3dvcmth
cm91bmRfMSwKKyAgICAgICAgLmVuYWJsZSA9IGVuYWJsZV9zcGVjdHJlX2Jo
Yl93b3JrYXJvdW5kLAorICAgIH0sCisgICAgLyogc3BlY3RyZSBCSEIgKi8K
KyAgICB7CisgICAgICAgIC5jYXBhYmlsaXR5ID0gQVJNX1dPUktBUk9VTkRf
QkhCX0xPT1BfOCwKKyAgICAgICAgTUlEUl9SQU5HRShNSURSX0NPUlRFWF9B
NzIsIDEgPDwgTUlEUl9WQVJJQU5UX1NISUZULAorICAgICAgICAgICAgICAg
ICAgIChNSURSX1ZBUklBTlRfTUFTSyB8IE1JRFJfUkVWSVNJT05fTUFTSykp
LAorICAgICAgICAuZW5hYmxlID0gZW5hYmxlX3NwZWN0cmVfYmhiX3dvcmth
cm91bmQsCisgICAgfSwKKyAgICB7CisgICAgICAgIC5jYXBhYmlsaXR5ID0g
QVJNX1dPUktBUk9VTkRfQkhCX0xPT1BfMjQsCisgICAgICAgIE1JRFJfQUxM
X1ZFUlNJT05TKE1JRFJfQ09SVEVYX0E3NiksCisgICAgICAgIC5lbmFibGUg
PSBlbmFibGVfc3BlY3RyZV9iaGJfd29ya2Fyb3VuZCwKKyAgICB9LAorICAg
IHsKKyAgICAgICAgLmNhcGFiaWxpdHkgPSBBUk1fV09SS0FST1VORF9CSEJf
TE9PUF8yNCwKKyAgICAgICAgTUlEUl9BTExfVkVSU0lPTlMoTUlEUl9DT1JU
RVhfQTc3KSwKKyAgICAgICAgLmVuYWJsZSA9IGVuYWJsZV9zcGVjdHJlX2Jo
Yl93b3JrYXJvdW5kLAorICAgIH0sCisgICAgeworICAgICAgICAuY2FwYWJp
bGl0eSA9IEFSTV9XT1JLQVJPVU5EX0JIQl9MT09QXzMyLAorICAgICAgICBN
SURSX0FMTF9WRVJTSU9OUyhNSURSX0NPUlRFWF9BNzgpLAorICAgICAgICAu
ZW5hYmxlID0gZW5hYmxlX3NwZWN0cmVfYmhiX3dvcmthcm91bmQsCisgICAg
fSwKKyAgICB7CisgICAgICAgIC5jYXBhYmlsaXR5ID0gQVJNX1dPUktBUk9V
TkRfQkhCX0xPT1BfMzIsCisgICAgICAgIE1JRFJfQUxMX1ZFUlNJT05TKE1J
RFJfQ09SVEVYX0E3OEMpLAorICAgICAgICAuZW5hYmxlID0gZW5hYmxlX3Nw
ZWN0cmVfYmhiX3dvcmthcm91bmQsCisgICAgfSwKKyAgICB7CisgICAgICAg
IC5jYXBhYmlsaXR5ID0gQVJNX1dPUktBUk9VTkRfQkhCX0xPT1BfMzIsCisg
ICAgICAgIE1JRFJfQUxMX1ZFUlNJT05TKE1JRFJfQ09SVEVYX1gxKSwKKyAg
ICAgICAgLmVuYWJsZSA9IGVuYWJsZV9zcGVjdHJlX2JoYl93b3JrYXJvdW5k
LAorICAgIH0sCisgICAgeworICAgICAgICAuY2FwYWJpbGl0eSA9IEFSTV9X
T1JLQVJPVU5EX0JIQl9MT09QXzMyLAorICAgICAgICBNSURSX0FMTF9WRVJT
SU9OUyhNSURSX0NPUlRFWF9YMiksCisgICAgICAgIC5lbmFibGUgPSBlbmFi
bGVfc3BlY3RyZV9iaGJfd29ya2Fyb3VuZCwKKyAgICB9LAorICAgIHsKKyAg
ICAgICAgLmNhcGFiaWxpdHkgPSBBUk1fV09SS0FST1VORF9CSEJfTE9PUF8z
MiwKKyAgICAgICAgTUlEUl9BTExfVkVSU0lPTlMoTUlEUl9DT1JURVhfQTcx
MCksCisgICAgICAgIC5lbmFibGUgPSBlbmFibGVfc3BlY3RyZV9iaGJfd29y
a2Fyb3VuZCwKICAgICB9LAorICAgIHsKKyAgICAgICAgLmNhcGFiaWxpdHkg
PSBBUk1fV09SS0FST1VORF9CSEJfTE9PUF8yNCwKKyAgICAgICAgTUlEUl9B
TExfVkVSU0lPTlMoTUlEUl9ORU9WRVJTRV9OMSksCisgICAgICAgIC5lbmFi
bGUgPSBlbmFibGVfc3BlY3RyZV9iaGJfd29ya2Fyb3VuZCwKKyAgICB9LAor
ICAgIHsKKyAgICAgICAgLmNhcGFiaWxpdHkgPSBBUk1fV09SS0FST1VORF9C
SEJfTE9PUF8zMiwKKyAgICAgICAgTUlEUl9BTExfVkVSU0lPTlMoTUlEUl9O
RU9WRVJTRV9OMiksCisgICAgICAgIC5lbmFibGUgPSBlbmFibGVfc3BlY3Ry
ZV9iaGJfd29ya2Fyb3VuZCwKKyAgICB9LAorICAgIHsKKyAgICAgICAgLmNh
cGFiaWxpdHkgPSBBUk1fV09SS0FST1VORF9CSEJfTE9PUF8zMiwKKyAgICAg
ICAgTUlEUl9BTExfVkVSU0lPTlMoTUlEUl9ORU9WRVJTRV9WMSksCisgICAg
ICAgIC5lbmFibGUgPSBlbmFibGVfc3BlY3RyZV9iaGJfd29ya2Fyb3VuZCwK
KyAgICB9LAorCiAjZW5kaWYKICNpZmRlZiBDT05GSUdfQVJNMzJfSEFSREVO
X0JSQU5DSF9QUkVESUNUT1IKICAgICB7CmRpZmYgLS1naXQgYS94ZW4vaW5j
bHVkZS9hc20tYXJtL2FybTY0L21hY3Jvcy5oIGIveGVuL2luY2x1ZGUvYXNt
LWFybS9hcm02NC9tYWNyb3MuaAppbmRleCA5YzVlNjc2YjM3NzMuLmExM2Fk
OGUyYjEzMyAxMDA2NDQKLS0tIGEveGVuL2luY2x1ZGUvYXNtLWFybS9hcm02
NC9tYWNyb3MuaAorKysgYi94ZW4vaW5jbHVkZS9hc20tYXJtL2FybTY0L21h
Y3Jvcy5oCkBAIC0yMSw1ICsyMSwxMCBAQAogICAgIGxkciAgICAgXGRzdCwg
W1xkc3QsIFx0bXBdCiAgICAgLmVuZG0KIAorICAgIC8qIGNsZWFyYmhiIGlu
c3RydWN0aW9uIGNsZWFyaW5nIHRoZSBicmFuY2ggaGlzdG9yeSAqLworICAg
IC5tYWNybyBjbGVhcmJoYgorICAgICAgICBoaW50ICAgICMyMgorICAgIC5l
bmRtCisKICNlbmRpZiAvKiBfX0FTTV9BUk1fQVJNNjRfTUFDUk9TX0ggKi8K
IApkaWZmIC0tZ2l0IGEveGVuL2luY2x1ZGUvYXNtLWFybS9jcHVmZWF0dXJl
LmggYi94ZW4vaW5jbHVkZS9hc20tYXJtL2NwdWZlYXR1cmUuaAppbmRleCBj
NzQ4ZmMxN2ZlNjYuLjg3OTg5ZWFjNmZjMiAxMDA2NDQKLS0tIGEveGVuL2lu
Y2x1ZGUvYXNtLWFybS9jcHVmZWF0dXJlLmgKKysrIGIveGVuL2luY2x1ZGUv
YXNtLWFybS9jcHVmZWF0dXJlLmgKQEAgLTQ1LDggKzQ1LDEyIEBACiAjZGVm
aW5lIEFSTV9TU0JEIDcKICNkZWZpbmUgQVJNX1NNQ0NDXzFfMSA4CiAjZGVm
aW5lIEFSTTY0X1dPUktBUk9VTkRfQVRfU1BFQ1VMQVRFIDkKKyNkZWZpbmUg
QVJNX1dPUktBUk9VTkRfQkhCX0xPT1BfOCAxMAorI2RlZmluZSBBUk1fV09S
S0FST1VORF9CSEJfTE9PUF8yNCAxMQorI2RlZmluZSBBUk1fV09SS0FST1VO
RF9CSEJfTE9PUF8zMiAxMgorI2RlZmluZSBBUk1fV09SS0FST1VORF9CSEJf
U01DQ18zIDEzCiAKLSNkZWZpbmUgQVJNX05DQVBTICAgICAgICAgICAxMAor
I2RlZmluZSBBUk1fTkNBUFMgICAgICAgICAgIDE0CiAKICNpZm5kZWYgX19B
U1NFTUJMWV9fCiAKZGlmZiAtLWdpdCBhL3hlbi9pbmNsdWRlL2FzbS1hcm0v
c21jY2MuaCBiL3hlbi9pbmNsdWRlL2FzbS1hcm0vc21jY2MuaAppbmRleCAx
MjYzOTlkZDcwODguLjJhYmJmZmMzYmQ4YSAxMDA2NDQKLS0tIGEveGVuL2lu
Y2x1ZGUvYXNtLWFybS9zbWNjYy5oCisrKyBiL3hlbi9pbmNsdWRlL2FzbS1h
cm0vc21jY2MuaApAQCAtMzM0LDYgKzMzNCwxMiBAQCB2b2lkIF9fYXJtX3Nt
Y2NjXzFfMF9zbWMocmVnaXN0ZXJfdCBhMCwgcmVnaXN0ZXJfdCBhMSwgcmVn
aXN0ZXJfdCBhMiwKICAgICAgICAgICAgICAgICAgICAgICAgQVJNX1NNQ0ND
X09XTkVSX0FSQ0gsICAgICAgICBcCiAgICAgICAgICAgICAgICAgICAgICAg
IDB4N0ZGRikKIAorI2RlZmluZSBBUk1fU01DQ0NfQVJDSF9XT1JLQVJPVU5E
XzNfRklEICAgICAgICAgICAgIFwKKyAgICBBUk1fU01DQ0NfQ0FMTF9WQUwo
QVJNX1NNQ0NDX0ZBU1RfQ0FMTCwgICAgICAgICBcCisgICAgICAgICAgICAg
ICAgICAgICAgIEFSTV9TTUNDQ19DT05WXzMyLCAgICAgICAgICAgXAorICAg
ICAgICAgICAgICAgICAgICAgICBBUk1fU01DQ0NfT1dORVJfQVJDSCwgICAg
ICAgIFwKKyAgICAgICAgICAgICAgICAgICAgICAgMHgzRkZGKQorCiAvKiBT
TUNDQyBlcnJvciBjb2RlcyAqLwogI2RlZmluZSBBUk1fU01DQ0NfTk9UX1JF
UVVJUkVEICAgICAgICAgICgtMikKICNkZWZpbmUgQVJNX1NNQ0NDX0VSUl9V
TktOT1dOX0ZVTkNUSU9OICAoLTEpCg==

--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.12-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.12-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.12-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.12-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.13-1-xen-arm-Introduce-new-Arm-processors.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.13-1-xen-arm-Introduce-new-Arm-processors.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.13-2-xen-arm-move-errata-CSV2-check-earlier.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.13-2-xen-arm-move-errata-CSV2-check-earlier.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.13-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.13-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.13-4-xen-arm-Add-Spectre-BHB-handling.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.13-4-xen-arm-Add-Spectre-BHB-handling.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.13-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.13-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch"
Content-Transfer-Encoding: base64

RnJvbSBmYmFiYjYyZGQ5ZTU3MTgwNDAwZjE0NWE4NzU2NjI0YzgyZGU4ODhm
IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCZXJ0cmFuZCBNYXJx
dWlzIDxiZXJ0cmFuZC5tYXJxdWlzQGFybS5jb20+CkRhdGU6IFRodSwgMTcg
RmViIDIwMjIgMTQ6NTI6NTQgKzAwMDAKU3ViamVjdDogeGVuL2FybTogQWxs
b3cgdG8gZGlzY292ZXIgYW5kIHVzZSBTTUNDQ19BUkNIX1dPUktBUk9VTkRf
MwoKQWxsb3cgZ3Vlc3QgdG8gZGlzY292ZXIgd2hldGhlciBvciBub3QgU01D
Q0NfQVJDSF9XT1JLQVJPVU5EXzMgaXMKc3VwcG9ydGVkIGFuZCBjcmVhdGUg
YSBmYXN0cGF0aCBpbiB0aGUgY29kZSB0byBoYW5kbGUgZ3Vlc3RzIHJlcXVl
c3QgdG8KZG8gdGhlIHdvcmthcm91bmQuCgpUaGUgZnVuY3Rpb24gU01DQ0Nf
QVJDSF9XT1JLQVJPVU5EXzMgd2lsbCBiZSBjYWxsZWQgYnkgdGhlIGd1ZXN0
IGZvcgpmbHVzaGluZyB0aGUgYnJhbmNoIGhpc3RvcnkuIFNvIHdlIHdhbnQg
dGhlIGhhbmRsaW5nIHRvIGJlIGFzIGZhc3QgYXMKcG9zc2libGUuCgpBcyB0
aGUgbWl0aWdhdGlvbiBpcyBhcHBsaWVkIG9uIGV2ZXJ5IGd1ZXN0IGV4aXQs
IHdlIGNhbiBjaGVjayBmb3IgdGhlCmNhbGwgYmVmb3JlIHNhdmluZyBhbGwg
Y29udGV4dCBhbmQgcmV0dXJuIHZlcnkgZWFybHkuCgpUaGlzIGlzIHBhcnQg
b2YgWFNBLTM5OCAvIENWRS0yMDIyLTIzOTYwLgoKU2lnbmVkLW9mZi1ieTog
QmVydHJhbmQgTWFycXVpcyA8YmVydHJhbmQubWFycXVpc0Bhcm0uY29tPgpS
ZXZpZXdlZC1ieTogSnVsaWVuIEdyYWxsIDxqdWxpZW5AeGVuLm9yZz4KKGNo
ZXJyeSBwaWNrZWQgZnJvbSBjb21taXQgYzBhNTZlYTBmZDkyZWNiNDcxOTM2
YjczNTVkZGJlY2JhZWEzNzA3YykKCmRpZmYgLS1naXQgYS94ZW4vYXJjaC9h
cm0vYXJtNjQvZW50cnkuUyBiL3hlbi9hcmNoL2FybS9hcm02NC9lbnRyeS5T
CmluZGV4IDE3NWVhMjk4MWU3Mi4uYThjMjE0NTA2Nzg2IDEwMDY0NAotLS0g
YS94ZW4vYXJjaC9hcm0vYXJtNjQvZW50cnkuUworKysgYi94ZW4vYXJjaC9h
cm0vYXJtNjQvZW50cnkuUwpAQCAtMzM4LDE2ICszMzgsMjYgQEAgZ3Vlc3Rf
c3luYzoKICAgICAgICAgY2JueiAgICB4MSwgZ3Vlc3Rfc3luY19zbG93cGF0
aCAgICAgICAgIC8qIHNob3VsZCBiZSAwIGZvciBIVkMgIzAgKi8KIAogICAg
ICAgICAvKgotICAgICAgICAgKiBGYXN0ZXN0IHBhdGggcG9zc2libGUgZm9y
IEFSTV9TTUNDQ19BUkNIX1dPUktBUk9VTkRfMS4KLSAgICAgICAgICogVGhl
IHdvcmthcm91bmQgaGFzIGFscmVhZHkgYmVlbiBhcHBsaWVkIG9uIHRoZSBl
eGNlcHRpb24KKyAgICAgICAgICogRmFzdGVzdCBwYXRoIHBvc3NpYmxlIGZv
ciBBUk1fU01DQ0NfQVJDSF9XT1JLQVJPVU5EXzEgYW5kCisgICAgICAgICAq
IEFSTV9TTUNDQ19BUkNIX1dPUktBUk9VTkRfMy4KKyAgICAgICAgICogVGhl
IHdvcmthcm91bmQgbmVlZGVkIGhhcyBhbHJlYWR5IGJlZW4gYXBwbGllZCBv
biB0aGUgZXhjZXB0aW9uCiAgICAgICAgICAqIGVudHJ5IGZyb20gdGhlIGd1
ZXN0LCBzbyBsZXQncyBxdWlja2x5IGdldCBiYWNrIHRvIHRoZSBndWVzdC4K
ICAgICAgICAgICoKICAgICAgICAgICogTm90ZSB0aGF0IGVvciBpcyB1c2Vk
IGJlY2F1c2UgdGhlIGZ1bmN0aW9uIGlkZW50aWZpZXIgY2Fubm90CiAgICAg
ICAgICAqIGJlIGVuY29kZWQgYXMgYW4gaW1tZWRpYXRlIGZvciBjbXAuCiAg
ICAgICAgICAqLwogICAgICAgICBlb3IgICAgIHcwLCB3MCwgI0FSTV9TTUND
Q19BUkNIX1dPUktBUk9VTkRfMV9GSUQKLSAgICAgICAgY2JueiAgICB3MCwg
Y2hlY2tfd2EyCisgICAgICAgIGNieiAgICAgdzAsIGZhc3RwYXRoX291dF93
b3JrYXJvdW5kCiAKKyAgICAgICAgLyogQVJNX1NNQ0NDX0FSQ0hfV09SS0FS
T1VORF8yIGhhbmRsaW5nICovCisgICAgICAgIGVvciAgICAgdzAsIHcwLCAj
KEFSTV9TTUNDQ19BUkNIX1dPUktBUk9VTkRfMV9GSUQgXiBBUk1fU01DQ0Nf
QVJDSF9XT1JLQVJPVU5EXzJfRklEKQorICAgICAgICBjYnogICAgIHcwLCB3
YTJfc3NiZAorCisgICAgICAgIC8qIEZhc3RwYXRoIG91dCBmb3IgQVJNX1NN
Q0NDX0FSQ0hfV09SS0FST1VORF8zICovCisgICAgICAgIGVvciAgICAgdzAs
IHcwLCAjKEFSTV9TTUNDQ19BUkNIX1dPUktBUk9VTkRfMl9GSUQgXiBBUk1f
U01DQ0NfQVJDSF9XT1JLQVJPVU5EXzNfRklEKQorICAgICAgICBjYm56ICAg
IHcwLCBndWVzdF9zeW5jX3Nsb3dwYXRoCisKK2Zhc3RwYXRoX291dF93b3Jr
YXJvdW5kOgogICAgICAgICAvKgogICAgICAgICAgKiBDbG9iYmVyIGJvdGgg
eDAgYW5kIHgxIHRvIHByZXZlbnQgbGVha2FnZS4gTm90ZSB0aGF0IHRoYW5r
cwogICAgICAgICAgKiB0aGUgZW9yLCB4MCA9IDAuCkBAIC0zNTYsMTAgKzM2
Niw3IEBAIGd1ZXN0X3N5bmM6CiAgICAgICAgIGVyZXQKICAgICAgICAgc2IK
IAotY2hlY2tfd2EyOgotICAgICAgICAvKiBBUk1fU01DQ0NfQVJDSF9XT1JL
QVJPVU5EXzIgaGFuZGxpbmcgKi8KLSAgICAgICAgZW9yICAgICB3MCwgdzAs
ICMoQVJNX1NNQ0NDX0FSQ0hfV09SS0FST1VORF8xX0ZJRCBeIEFSTV9TTUND
Q19BUkNIX1dPUktBUk9VTkRfMl9GSUQpCi0gICAgICAgIGNibnogICAgdzAs
IGd1ZXN0X3N5bmNfc2xvd3BhdGgKK3dhMl9zc2JkOgogI2lmZGVmIENPTkZJ
R19BUk1fU1NCRAogYWx0ZXJuYXRpdmVfY2IgYXJtX2VuYWJsZV93YTJfaGFu
ZGxpbmcKICAgICAgICAgYiAgICAgICB3YTJfZW5kCmRpZmYgLS1naXQgYS94
ZW4vYXJjaC9hcm0vdnNtYy5jIGIveGVuL2FyY2gvYXJtL3ZzbWMuYwppbmRl
eCBhMzZkYjE1ZmZmYzAuLmI2MzNmZjJmZTg5NyAxMDA2NDQKLS0tIGEveGVu
L2FyY2gvYXJtL3ZzbWMuYworKysgYi94ZW4vYXJjaC9hcm0vdnNtYy5jCkBA
IC0xMjQsNiArMTI0LDEwIEBAIHN0YXRpYyBib29sIGhhbmRsZV9hcmNoKHN0
cnVjdCBjcHVfdXNlcl9yZWdzICpyZWdzKQogICAgICAgICAgICAgICAgIGJy
ZWFrOwogICAgICAgICAgICAgfQogICAgICAgICAgICAgYnJlYWs7CisgICAg
ICAgIGNhc2UgQVJNX1NNQ0NDX0FSQ0hfV09SS0FST1VORF8zX0ZJRDoKKyAg
ICAgICAgICAgIGlmICggY3B1c19oYXZlX2NhcChBUk1fV09SS0FST1VORF9C
SEJfU01DQ18zKSApCisgICAgICAgICAgICAgICAgcmV0ID0gMDsKKyAgICAg
ICAgICAgIGJyZWFrOwogICAgICAgICB9CiAKICAgICAgICAgc2V0X3VzZXJf
cmVnKHJlZ3MsIDAsIHJldCk7CkBAIC0xMzIsNiArMTM2LDcgQEAgc3RhdGlj
IGJvb2wgaGFuZGxlX2FyY2goc3RydWN0IGNwdV91c2VyX3JlZ3MgKnJlZ3Mp
CiAgICAgfQogCiAgICAgY2FzZSBBUk1fU01DQ0NfQVJDSF9XT1JLQVJPVU5E
XzFfRklEOgorICAgIGNhc2UgQVJNX1NNQ0NDX0FSQ0hfV09SS0FST1VORF8z
X0ZJRDoKICAgICAgICAgLyogTm8gcmV0dXJuIHZhbHVlICovCiAgICAgICAg
IHJldHVybiB0cnVlOwogCg==

--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.13-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.13-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.14-1-xen-arm-Introduce-new-Arm-processors.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.14-1-xen-arm-Introduce-new-Arm-processors.patch"
Content-Transfer-Encoding: base64

RnJvbSAwMjE0NjZhYTczY2FhYTBjNTk4M2YwMjIwMzY3OGU2NDlkZDRkMjJj
IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCZXJ0cmFuZCBNYXJx
dWlzIDxiZXJ0cmFuZC5tYXJxdWlzQGFybS5jb20+CkRhdGU6IFR1ZSwgMTUg
RmViIDIwMjIgMTA6Mzc6NTEgKzAwMDAKU3ViamVjdDogeGVuL2FybTogSW50
cm9kdWNlIG5ldyBBcm0gcHJvY2Vzc29ycwoKQWRkIHNvbWUgbmV3IHByb2Nl
c3NvciBpZGVudGlmaWVycyBpbiBwcm9jZXNzb3IuaCBhbmQgc3luYyBYZW4K
ZGVmaW5pdGlvbnMgd2l0aCBzdGF0dXMgb2YgTGludXggNS4xNyAoZGVjbGFy
ZWQgaW4KYXJjaC9hcm02NC9pbmNsdWRlL2FzbS9jcHV0eXBlLmgpLgoKVGhp
cyBpcyBwYXJ0IG9mIFhTQS0zOTggLyBDVkUtMjAyMi0yMzk2MC4KClNpZ25l
ZC1vZmYtYnk6IEJlcnRyYW5kIE1hcnF1aXMgPGJlcnRyYW5kLm1hcnF1aXNA
YXJtLmNvbT4KQWNrZWQtYnk6IEp1bGllbiBHcmFsbCA8anVsaWVuQHhlbi5v
cmc+CihjaGVycnkgcGlja2VkIGZyb20gY29tbWl0IDM1ZDFiODVhNmI0MzQ4
M2Y2YmQwMDdkNDg3NTc0MzRlNTQ3NDNlOTgpCgpkaWZmIC0tZ2l0IGEveGVu
L2luY2x1ZGUvYXNtLWFybS9wcm9jZXNzb3IuaCBiL3hlbi9pbmNsdWRlL2Fz
bS1hcm0vcHJvY2Vzc29yLmgKaW5kZXggODdjODEzNjAyMmRmLi4xN2NjNWNm
NDg2ZjkgMTAwNjQ0Ci0tLSBhL3hlbi9pbmNsdWRlL2FzbS1hcm0vcHJvY2Vz
c29yLmgKKysrIGIveGVuL2luY2x1ZGUvYXNtLWFybS9wcm9jZXNzb3IuaApA
QCAtNTMsNiArNTMsNyBAQAogI2RlZmluZSBBUk1fQ1BVX1BBUlRfQ09SVEVY
X0ExNyAgICAgMHhDMEUKICNkZWZpbmUgQVJNX0NQVV9QQVJUX0NPUlRFWF9B
MTUgICAgIDB4QzBGCiAjZGVmaW5lIEFSTV9DUFVfUEFSVF9DT1JURVhfQTUz
ICAgICAweEQwMworI2RlZmluZSBBUk1fQ1BVX1BBUlRfQ09SVEVYX0EzNSAg
ICAgMHhEMDQKICNkZWZpbmUgQVJNX0NQVV9QQVJUX0NPUlRFWF9BNTUgICAg
IDB4RDA1CiAjZGVmaW5lIEFSTV9DUFVfUEFSVF9DT1JURVhfQTU3ICAgICAw
eEQwNwogI2RlZmluZSBBUk1fQ1BVX1BBUlRfQ09SVEVYX0E3MiAgICAgMHhE
MDgKQEAgLTYwLDExICs2MSwyMCBAQAogI2RlZmluZSBBUk1fQ1BVX1BBUlRf
Q09SVEVYX0E3NSAgICAgMHhEMEEKICNkZWZpbmUgQVJNX0NQVV9QQVJUX0NP
UlRFWF9BNzYgICAgIDB4RDBCCiAjZGVmaW5lIEFSTV9DUFVfUEFSVF9ORU9W
RVJTRV9OMSAgICAweEQwQworI2RlZmluZSBBUk1fQ1BVX1BBUlRfQ09SVEVY
X0E3NyAgICAgMHhEMEQKKyNkZWZpbmUgQVJNX0NQVV9QQVJUX05FT1ZFUlNF
X1YxICAgIDB4RDQwCisjZGVmaW5lIEFSTV9DUFVfUEFSVF9DT1JURVhfQTc4
ICAgICAweEQ0MQorI2RlZmluZSBBUk1fQ1BVX1BBUlRfQ09SVEVYX1gxICAg
ICAgMHhENDQKKyNkZWZpbmUgQVJNX0NQVV9QQVJUX0NPUlRFWF9BNzEwICAg
IDB4RDQ3CisjZGVmaW5lIEFSTV9DUFVfUEFSVF9DT1JURVhfWDIgICAgICAw
eEQ0OAorI2RlZmluZSBBUk1fQ1BVX1BBUlRfTkVPVkVSU0VfTjIgICAgMHhE
NDkKKyNkZWZpbmUgQVJNX0NQVV9QQVJUX0NPUlRFWF9BNzhDICAgIDB4RDRC
CiAKICNkZWZpbmUgTUlEUl9DT1JURVhfQTEyIE1JRFJfQ1BVX01PREVMKEFS
TV9DUFVfSU1QX0FSTSwgQVJNX0NQVV9QQVJUX0NPUlRFWF9BMTIpCiAjZGVm
aW5lIE1JRFJfQ09SVEVYX0ExNyBNSURSX0NQVV9NT0RFTChBUk1fQ1BVX0lN
UF9BUk0sIEFSTV9DUFVfUEFSVF9DT1JURVhfQTE3KQogI2RlZmluZSBNSURS
X0NPUlRFWF9BMTUgTUlEUl9DUFVfTU9ERUwoQVJNX0NQVV9JTVBfQVJNLCBB
Uk1fQ1BVX1BBUlRfQ09SVEVYX0ExNSkKICNkZWZpbmUgTUlEUl9DT1JURVhf
QTUzIE1JRFJfQ1BVX01PREVMKEFSTV9DUFVfSU1QX0FSTSwgQVJNX0NQVV9Q
QVJUX0NPUlRFWF9BNTMpCisjZGVmaW5lIE1JRFJfQ09SVEVYX0EzNSBNSURS
X0NQVV9NT0RFTChBUk1fQ1BVX0lNUF9BUk0sIEFSTV9DUFVfUEFSVF9DT1JU
RVhfQTM1KQogI2RlZmluZSBNSURSX0NPUlRFWF9BNTUgTUlEUl9DUFVfTU9E
RUwoQVJNX0NQVV9JTVBfQVJNLCBBUk1fQ1BVX1BBUlRfQ09SVEVYX0E1NSkK
ICNkZWZpbmUgTUlEUl9DT1JURVhfQTU3IE1JRFJfQ1BVX01PREVMKEFSTV9D
UFVfSU1QX0FSTSwgQVJNX0NQVV9QQVJUX0NPUlRFWF9BNTcpCiAjZGVmaW5l
IE1JRFJfQ09SVEVYX0E3MiBNSURSX0NQVV9NT0RFTChBUk1fQ1BVX0lNUF9B
Uk0sIEFSTV9DUFVfUEFSVF9DT1JURVhfQTcyKQpAQCAtNzIsNiArODIsMTQg
QEAKICNkZWZpbmUgTUlEUl9DT1JURVhfQTc1IE1JRFJfQ1BVX01PREVMKEFS
TV9DUFVfSU1QX0FSTSwgQVJNX0NQVV9QQVJUX0NPUlRFWF9BNzUpCiAjZGVm
aW5lIE1JRFJfQ09SVEVYX0E3NiBNSURSX0NQVV9NT0RFTChBUk1fQ1BVX0lN
UF9BUk0sIEFSTV9DUFVfUEFSVF9DT1JURVhfQTc2KQogI2RlZmluZSBNSURS
X05FT1ZFUlNFX04xIE1JRFJfQ1BVX01PREVMKEFSTV9DUFVfSU1QX0FSTSwg
QVJNX0NQVV9QQVJUX05FT1ZFUlNFX04xKQorI2RlZmluZSBNSURSX0NPUlRF
WF9BNzcgTUlEUl9DUFVfTU9ERUwoQVJNX0NQVV9JTVBfQVJNLCBBUk1fQ1BV
X1BBUlRfQ09SVEVYX0E3NykKKyNkZWZpbmUgTUlEUl9ORU9WRVJTRV9WMSBN
SURSX0NQVV9NT0RFTChBUk1fQ1BVX0lNUF9BUk0sIEFSTV9DUFVfUEFSVF9O
RU9WRVJTRV9WMSkKKyNkZWZpbmUgTUlEUl9DT1JURVhfQTc4IE1JRFJfQ1BV
X01PREVMKEFSTV9DUFVfSU1QX0FSTSwgQVJNX0NQVV9QQVJUX0NPUlRFWF9B
NzgpCisjZGVmaW5lIE1JRFJfQ09SVEVYX1gxICBNSURSX0NQVV9NT0RFTChB
Uk1fQ1BVX0lNUF9BUk0sIEFSTV9DUFVfUEFSVF9DT1JURVhfWDEpCisjZGVm
aW5lIE1JRFJfQ09SVEVYX0E3MTAgTUlEUl9DUFVfTU9ERUwoQVJNX0NQVV9J
TVBfQVJNLCBBUk1fQ1BVX1BBUlRfQ09SVEVYX0E3MTApCisjZGVmaW5lIE1J
RFJfQ09SVEVYX1gyICBNSURSX0NQVV9NT0RFTChBUk1fQ1BVX0lNUF9BUk0s
IEFSTV9DUFVfUEFSVF9DT1JURVhfWDIpCisjZGVmaW5lIE1JRFJfTkVPVkVS
U0VfTjIgTUlEUl9DUFVfTU9ERUwoQVJNX0NQVV9JTVBfQVJNLCBBUk1fQ1BV
X1BBUlRfTkVPVkVSU0VfTjIpCisjZGVmaW5lIE1JRFJfQ09SVEVYX0E3OEMg
TUlEUl9DUFVfTU9ERUwoQVJNX0NQVV9JTVBfQVJNLCBBUk1fQ1BVX1BBUlRf
Q09SVEVYX0E3OEMpCiAKIC8qIE1QSURSIE11bHRpcHJvY2Vzc29yIEFmZmlu
aXR5IFJlZ2lzdGVyICovCiAjZGVmaW5lIF9NUElEUl9VUCAgICAgICAgICAg
KDMwKQo=

--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.14-2-xen-arm-move-errata-CSV2-check-earlier.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.14-2-xen-arm-move-errata-CSV2-check-earlier.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.14-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.14-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.14-4-xen-arm-Add-Spectre-BHB-handling.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.14-4-xen-arm-Add-Spectre-BHB-handling.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.14-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.14-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.14-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.14-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.15-1-xen-arm-Introduce-new-Arm-processors.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.15-1-xen-arm-Introduce-new-Arm-processors.patch"
Content-Transfer-Encoding: base64

RnJvbSA1ZjA5N2FmOTRlYzc4ZTE3MGQ1OTlhMDVjNmU1MjhjZGEyNTk4OTFm
IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCZXJ0cmFuZCBNYXJx
dWlzIDxiZXJ0cmFuZC5tYXJxdWlzQGFybS5jb20+CkRhdGU6IFR1ZSwgMTUg
RmViIDIwMjIgMTA6Mzc6NTEgKzAwMDAKU3ViamVjdDogeGVuL2FybTogSW50
cm9kdWNlIG5ldyBBcm0gcHJvY2Vzc29ycwoKQWRkIHNvbWUgbmV3IHByb2Nl
c3NvciBpZGVudGlmaWVycyBpbiBwcm9jZXNzb3IuaCBhbmQgc3luYyBYZW4K
ZGVmaW5pdGlvbnMgd2l0aCBzdGF0dXMgb2YgTGludXggNS4xNyAoZGVjbGFy
ZWQgaW4KYXJjaC9hcm02NC9pbmNsdWRlL2FzbS9jcHV0eXBlLmgpLgoKVGhp
cyBpcyBwYXJ0IG9mIFhTQS0zOTggLyBDVkUtMjAyMi0yMzk2MC4KClNpZ25l
ZC1vZmYtYnk6IEJlcnRyYW5kIE1hcnF1aXMgPGJlcnRyYW5kLm1hcnF1aXNA
YXJtLmNvbT4KQWNrZWQtYnk6IEp1bGllbiBHcmFsbCA8anVsaWVuQHhlbi5v
cmc+CihjaGVycnkgcGlja2VkIGZyb20gY29tbWl0IDM1ZDFiODVhNmI0MzQ4
M2Y2YmQwMDdkNDg3NTc0MzRlNTQ3NDNlOTgpCgpkaWZmIC0tZ2l0IGEveGVu
L2luY2x1ZGUvYXNtLWFybS9wcm9jZXNzb3IuaCBiL3hlbi9pbmNsdWRlL2Fz
bS1hcm0vcHJvY2Vzc29yLmgKaW5kZXggNWMxNzY4Y2RlYzI1Li4yZTFmNWRh
Nzg1M2EgMTAwNjQ0Ci0tLSBhL3hlbi9pbmNsdWRlL2FzbS1hcm0vcHJvY2Vz
c29yLmgKKysrIGIveGVuL2luY2x1ZGUvYXNtLWFybS9wcm9jZXNzb3IuaApA
QCAtNTMsNiArNTMsNyBAQAogI2RlZmluZSBBUk1fQ1BVX1BBUlRfQ09SVEVY
X0ExNyAgICAgMHhDMEUKICNkZWZpbmUgQVJNX0NQVV9QQVJUX0NPUlRFWF9B
MTUgICAgIDB4QzBGCiAjZGVmaW5lIEFSTV9DUFVfUEFSVF9DT1JURVhfQTUz
ICAgICAweEQwMworI2RlZmluZSBBUk1fQ1BVX1BBUlRfQ09SVEVYX0EzNSAg
ICAgMHhEMDQKICNkZWZpbmUgQVJNX0NQVV9QQVJUX0NPUlRFWF9BNTUgICAg
IDB4RDA1CiAjZGVmaW5lIEFSTV9DUFVfUEFSVF9DT1JURVhfQTU3ICAgICAw
eEQwNwogI2RlZmluZSBBUk1fQ1BVX1BBUlRfQ09SVEVYX0E3MiAgICAgMHhE
MDgKQEAgLTYwLDExICs2MSwyMCBAQAogI2RlZmluZSBBUk1fQ1BVX1BBUlRf
Q09SVEVYX0E3NSAgICAgMHhEMEEKICNkZWZpbmUgQVJNX0NQVV9QQVJUX0NP
UlRFWF9BNzYgICAgIDB4RDBCCiAjZGVmaW5lIEFSTV9DUFVfUEFSVF9ORU9W
RVJTRV9OMSAgICAweEQwQworI2RlZmluZSBBUk1fQ1BVX1BBUlRfQ09SVEVY
X0E3NyAgICAgMHhEMEQKKyNkZWZpbmUgQVJNX0NQVV9QQVJUX05FT1ZFUlNF
X1YxICAgIDB4RDQwCisjZGVmaW5lIEFSTV9DUFVfUEFSVF9DT1JURVhfQTc4
ICAgICAweEQ0MQorI2RlZmluZSBBUk1fQ1BVX1BBUlRfQ09SVEVYX1gxICAg
ICAgMHhENDQKKyNkZWZpbmUgQVJNX0NQVV9QQVJUX0NPUlRFWF9BNzEwICAg
IDB4RDQ3CisjZGVmaW5lIEFSTV9DUFVfUEFSVF9DT1JURVhfWDIgICAgICAw
eEQ0OAorI2RlZmluZSBBUk1fQ1BVX1BBUlRfTkVPVkVSU0VfTjIgICAgMHhE
NDkKKyNkZWZpbmUgQVJNX0NQVV9QQVJUX0NPUlRFWF9BNzhDICAgIDB4RDRC
CiAKICNkZWZpbmUgTUlEUl9DT1JURVhfQTEyIE1JRFJfQ1BVX01PREVMKEFS
TV9DUFVfSU1QX0FSTSwgQVJNX0NQVV9QQVJUX0NPUlRFWF9BMTIpCiAjZGVm
aW5lIE1JRFJfQ09SVEVYX0ExNyBNSURSX0NQVV9NT0RFTChBUk1fQ1BVX0lN
UF9BUk0sIEFSTV9DUFVfUEFSVF9DT1JURVhfQTE3KQogI2RlZmluZSBNSURS
X0NPUlRFWF9BMTUgTUlEUl9DUFVfTU9ERUwoQVJNX0NQVV9JTVBfQVJNLCBB
Uk1fQ1BVX1BBUlRfQ09SVEVYX0ExNSkKICNkZWZpbmUgTUlEUl9DT1JURVhf
QTUzIE1JRFJfQ1BVX01PREVMKEFSTV9DUFVfSU1QX0FSTSwgQVJNX0NQVV9Q
QVJUX0NPUlRFWF9BNTMpCisjZGVmaW5lIE1JRFJfQ09SVEVYX0EzNSBNSURS
X0NQVV9NT0RFTChBUk1fQ1BVX0lNUF9BUk0sIEFSTV9DUFVfUEFSVF9DT1JU
RVhfQTM1KQogI2RlZmluZSBNSURSX0NPUlRFWF9BNTUgTUlEUl9DUFVfTU9E
RUwoQVJNX0NQVV9JTVBfQVJNLCBBUk1fQ1BVX1BBUlRfQ09SVEVYX0E1NSkK
ICNkZWZpbmUgTUlEUl9DT1JURVhfQTU3IE1JRFJfQ1BVX01PREVMKEFSTV9D
UFVfSU1QX0FSTSwgQVJNX0NQVV9QQVJUX0NPUlRFWF9BNTcpCiAjZGVmaW5l
IE1JRFJfQ09SVEVYX0E3MiBNSURSX0NQVV9NT0RFTChBUk1fQ1BVX0lNUF9B
Uk0sIEFSTV9DUFVfUEFSVF9DT1JURVhfQTcyKQpAQCAtNzIsNiArODIsMTQg
QEAKICNkZWZpbmUgTUlEUl9DT1JURVhfQTc1IE1JRFJfQ1BVX01PREVMKEFS
TV9DUFVfSU1QX0FSTSwgQVJNX0NQVV9QQVJUX0NPUlRFWF9BNzUpCiAjZGVm
aW5lIE1JRFJfQ09SVEVYX0E3NiBNSURSX0NQVV9NT0RFTChBUk1fQ1BVX0lN
UF9BUk0sIEFSTV9DUFVfUEFSVF9DT1JURVhfQTc2KQogI2RlZmluZSBNSURS
X05FT1ZFUlNFX04xIE1JRFJfQ1BVX01PREVMKEFSTV9DUFVfSU1QX0FSTSwg
QVJNX0NQVV9QQVJUX05FT1ZFUlNFX04xKQorI2RlZmluZSBNSURSX0NPUlRF
WF9BNzcgTUlEUl9DUFVfTU9ERUwoQVJNX0NQVV9JTVBfQVJNLCBBUk1fQ1BV
X1BBUlRfQ09SVEVYX0E3NykKKyNkZWZpbmUgTUlEUl9ORU9WRVJTRV9WMSBN
SURSX0NQVV9NT0RFTChBUk1fQ1BVX0lNUF9BUk0sIEFSTV9DUFVfUEFSVF9O
RU9WRVJTRV9WMSkKKyNkZWZpbmUgTUlEUl9DT1JURVhfQTc4IE1JRFJfQ1BV
X01PREVMKEFSTV9DUFVfSU1QX0FSTSwgQVJNX0NQVV9QQVJUX0NPUlRFWF9B
NzgpCisjZGVmaW5lIE1JRFJfQ09SVEVYX1gxICBNSURSX0NQVV9NT0RFTChB
Uk1fQ1BVX0lNUF9BUk0sIEFSTV9DUFVfUEFSVF9DT1JURVhfWDEpCisjZGVm
aW5lIE1JRFJfQ09SVEVYX0E3MTAgTUlEUl9DUFVfTU9ERUwoQVJNX0NQVV9J
TVBfQVJNLCBBUk1fQ1BVX1BBUlRfQ09SVEVYX0E3MTApCisjZGVmaW5lIE1J
RFJfQ09SVEVYX1gyICBNSURSX0NQVV9NT0RFTChBUk1fQ1BVX0lNUF9BUk0s
IEFSTV9DUFVfUEFSVF9DT1JURVhfWDIpCisjZGVmaW5lIE1JRFJfTkVPVkVS
U0VfTjIgTUlEUl9DUFVfTU9ERUwoQVJNX0NQVV9JTVBfQVJNLCBBUk1fQ1BV
X1BBUlRfTkVPVkVSU0VfTjIpCisjZGVmaW5lIE1JRFJfQ09SVEVYX0E3OEMg
TUlEUl9DUFVfTU9ERUwoQVJNX0NQVV9JTVBfQVJNLCBBUk1fQ1BVX1BBUlRf
Q09SVEVYX0E3OEMpCiAKIC8qIE1QSURSIE11bHRpcHJvY2Vzc29yIEFmZmlu
aXR5IFJlZ2lzdGVyICovCiAjZGVmaW5lIF9NUElEUl9VUCAgICAgICAgICAg
KDMwKQo=

--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.15-2-xen-arm-move-errata-CSV2-check-earlier.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.15-2-xen-arm-move-errata-CSV2-check-earlier.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.15-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.15-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.15-4-xen-arm-Add-Spectre-BHB-handling.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.15-4-xen-arm-Add-Spectre-BHB-handling.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.15-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.15-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.15-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.15-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.16-1-xen-arm-Introduce-new-Arm-processors.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.16-1-xen-arm-Introduce-new-Arm-processors.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.16-2-xen-arm-move-errata-CSV2-check-earlier.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.16-2-xen-arm-move-errata-CSV2-check-earlier.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.16-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.16-3-xen-arm-Add-ECBHB-and-CLEARBHB-ID-fields.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.16-4-xen-arm-Add-Spectre-BHB-handling.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.16-4-xen-arm-Add-Spectre-BHB-handling.patch"
Content-Transfer-Encoding: base64

RnJvbSA3ODk1MjNhMmFhYzg4ZTM2NjhmOWM0YWQ4OTJmYTQ3YjVmNmJmMWE3
IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBSYWh1bCBTaW5naCA8
cmFodWwuc2luZ2hAYXJtLmNvbT4KRGF0ZTogTW9uLCAxNCBGZWIgMjAyMiAx
ODo0NzozMiArMDAwMApTdWJqZWN0OiB4ZW4vYXJtOiBBZGQgU3BlY3RyZSBC
SEIgaGFuZGxpbmcKClRoaXMgY29tbWl0IGlzIGFkZGluZyBTcGVjdHJlIEJI
QiBoYW5kbGluZyB0byBYZW4gb24gQXJtLgpUaGUgY29tbWl0IGlzIGludHJv
ZHVjaW5nIG5ldyBhbHRlcm5hdGl2ZSBjb2RlIHRvIGJlIGV4ZWN1dGVkIGR1
cmluZwpleGNlcHRpb24gZW50cnk6Ci0gU01DQyB3b3JrYXJvdW5kIDMgY2Fs
bAotIGxvb3Agd29ya2Fyb3VuZCAod2l0aCA4LCAyNCBvciAzMiBpdGVyYXRp
b25zKQotIHVzZSBvZiBuZXcgY2xlYXJiaGIgaW5zdHJ1Y3Rpb24KCkNwdWVy
cmF0YSBpcyBtb2RpZmllZCBieSB0aGlzIHBhdGNoIHRvIGFwcGx5IHRoZSBy
ZXF1aXJlZCB3b3JrYXJvdW5kIGZvcgpDUFUgYWZmZWN0ZWQgYnkgU3BlY3Ry
ZSBCSEIgd2hlbiBDT05GSUdfQVJNNjRfSEFSREVOX0JSQU5DSF9QUkVESUNU
T1IgaXMKZW5hYmxlZC4KClRvIGRvIHRoaXMgdGhlIHN5c3RlbSBwcmV2aW91
c2x5IHVzZWQgdG8gYXBwbHkgc21jYyB3b3JrYXJvdW5kIDEgaXMKcmV1c2Vk
IGFuZCBuZXcgYWx0ZXJuYXRpdmUgY29kZSB0byBiZSBjb3BpZWQgaW4gdGhl
IGV4Y2VwdGlvbiBoYW5kbGVyIGlzCmludHJvZHVjZWQuCgpUbyBkZWZpbmUg
dGhlIHR5cGUgb2Ygd29ya2Fyb3VuZCByZXF1aXJlZCBieSBhIHByb2Nlc3Nv
ciwgNCBuZXcgY3B1CmNhcGFiaWxpdGllcyBhcmUgaW50cm9kdWNlZCAoZm9y
IGVhY2ggbnVtYmVyIG9mIGxvb3AgYW5kIGZvciBzbWNjCndvcmthcm91bmQg
MykuCgpXaGVuIGEgcHJvY2Vzc29yIGlzIGFmZmVjdGVkLCBlbmFibGVfc3Bl
Y3RyZV9iaGJfd29ya2Fyb3VuZCBpcyBjYWxsZWQKYW5kIGlmIHRoZSBwcm9j
ZXNzb3IgZG9lcyBub3QgaGF2ZSBDU1YyIHNldCB0byAzIG9yIEVDQkhCIGZl
YXR1cmUgKHdoaWNoCndvdWxkIG1lYW4gdGhhdCB0aGUgcHJvY2Vzc29yIGlz
IGRvaW5nIHdoYXQgaXMgcmVxdWlyZWQgaW4gaGFyZHdhcmUpLAp0aGUgcHJv
cGVyIGNvZGUgaXMgZW5hYmxlZCBhdCBleGNlcHRpb24gZW50cnkuCgpJbiB0
aGUgY2FzZSB3aGVyZSB3b3JrYXJvdW5kIDMgaXMgbm90IHN1cHBvcnRlZCBi
eSB0aGUgZmlybXdhcmUsIHdlCmVuYWJsZSB3b3JrYXJvdW5kIDEgd2hlbiBw
b3NzaWJsZSBhcyBpdCB3aWxsIGFsc28gbWl0aWdhdGUgU3BlY3RyZSBCSEIK
b24gc3lzdGVtcyB3aXRob3V0IENTVjIuCgpUaGlzIGlzIHBhcnQgb2YgWFNB
LTM5OCAvIENWRS0yMDIyLTIzOTYwLgoKU2lnbmVkLW9mZi1ieTogQmVydHJh
bmQgTWFycXVpcyA8YmVydHJhbmQubWFycXVpc0Bhcm0uY29tPgpTaWduZWQt
b2ZmLWJ5OiBSYWh1bCBTaW5naCA8cmFodWwuc2luZ2hAYXJtLmNvbT4KQWNr
ZWQtYnk6IEp1bGllbiBHcmFsbCA8anVsaWVuQHhlbi5vcmc+CihjaGVycnkg
cGlja2VkIGZyb20gY29tbWl0IDYyYzkxZWI2NmEyOTA0ZWVmYjFkMWQ5NjQy
ZTM2OTdhMWUzYzNhM2MpCgpkaWZmIC0tZ2l0IGEveGVuL2FyY2gvYXJtL2Fy
bTY0L2JwaS5TIGIveGVuL2FyY2gvYXJtL2FybTY0L2JwaS5TCmluZGV4IGQ4
NzQzZDk1NWM0YS4uNGU2MzgyNTIyMDQ4IDEwMDY0NAotLS0gYS94ZW4vYXJj
aC9hcm0vYXJtNjQvYnBpLlMKKysrIGIveGVuL2FyY2gvYXJtL2FybTY0L2Jw
aS5TCkBAIC01OCwxNiArNTgsNDIgQEAgRU5UUlkoX19icF9oYXJkZW5faHlw
X3ZlY3Nfc3RhcnQpCiAgICAgLmVuZHIKIEVOVFJZKF9fYnBfaGFyZGVuX2h5
cF92ZWNzX2VuZCkKIAotRU5UUlkoX19zbWNjY193b3JrYXJvdW5kXzFfc21j
X3N0YXJ0KQorLm1hY3JvIG1pdGlnYXRlX3NwZWN0cmVfYmhiX2xvb3AgY291
bnQKK0VOVFJZKF9fbWl0aWdhdGVfc3BlY3RyZV9iaGJfbG9vcF9zdGFydF9c
Y291bnQpCisgICAgc3RwICAgICB4MCwgeDEsIFtzcCwgIy0xNl0hCisgICAg
bW92ICAgICB4MCwgXGNvdW50CisuTHNwZWN0cmVfYmhiX2xvb3BcQDoKKyAg
ICBiICAgLiArIDQKKyAgICBzdWJzICAgIHgwLCB4MCwgIzEKKyAgICBiLm5l
ICAgIC5Mc3BlY3RyZV9iaGJfbG9vcFxACisgICAgc2IKKyAgICBsZHAgICAg
IHgwLCB4MSwgW3NwXSwgIzE2CitFTlRSWShfX21pdGlnYXRlX3NwZWN0cmVf
YmhiX2xvb3BfZW5kX1xjb3VudCkKKy5lbmRtCisKKy5tYWNybyBzbWNjY193
b3JrYXJvdW5kIG51bSBzbWNjX2lkCitFTlRSWShfX3NtY2NjX3dvcmthcm91
bmRfc21jX3N0YXJ0X1xudW0pCiAgICAgc3ViICAgICBzcCwgc3AsICMoOCAq
IDQpCiAgICAgc3RwICAgICB4MCwgeDEsIFtzcCwgIyg4ICogMildCiAgICAg
c3RwICAgICB4MiwgeDMsIFtzcCwgIyg4ICogMCldCi0gICAgbW92ICAgICB3
MCwgI0FSTV9TTUNDQ19BUkNIX1dPUktBUk9VTkRfMV9GSUQKKyAgICBtb3Yg
ICAgIHcwLCBcc21jY19pZAogICAgIHNtYyAgICAgIzAKICAgICBsZHAgICAg
IHgyLCB4MywgW3NwLCAjKDggKiAwKV0KICAgICBsZHAgICAgIHgwLCB4MSwg
W3NwLCAjKDggKiAyKV0KICAgICBhZGQgICAgIHNwLCBzcCwgIyg4ICogNCkK
LUVOVFJZKF9fc21jY2Nfd29ya2Fyb3VuZF8xX3NtY19lbmQpCitFTlRSWShf
X3NtY2NjX3dvcmthcm91bmRfc21jX2VuZF9cbnVtKQorLmVuZG0KKworRU5U
UlkoX19taXRpZ2F0ZV9zcGVjdHJlX2JoYl9jbGVhcl9pbnNuX3N0YXJ0KQor
ICAgIGNsZWFyYmhiCisgICAgaXNiCitFTlRSWShfX21pdGlnYXRlX3NwZWN0
cmVfYmhiX2NsZWFyX2luc25fZW5kKQorCittaXRpZ2F0ZV9zcGVjdHJlX2Jo
Yl9sb29wIDgKK21pdGlnYXRlX3NwZWN0cmVfYmhiX2xvb3AgMjQKK21pdGln
YXRlX3NwZWN0cmVfYmhiX2xvb3AgMzIKK3NtY2NjX3dvcmthcm91bmQgMSwg
I0FSTV9TTUNDQ19BUkNIX1dPUktBUk9VTkRfMV9GSUQKK3NtY2NjX3dvcmth
cm91bmQgMywgI0FSTV9TTUNDQ19BUkNIX1dPUktBUk9VTkRfM19GSUQKIAog
LyoKICAqIExvY2FsIHZhcmlhYmxlczoKZGlmZiAtLWdpdCBhL3hlbi9hcmNo
L2FybS9jcHVlcnJhdGEuYyBiL3hlbi9hcmNoL2FybS9jcHVlcnJhdGEuYwpp
bmRleCAwMGY5ZWJlOWNlZTAuLmFlNjQ5ZDE2ZWYwMiAxMDA2NDQKLS0tIGEv
eGVuL2FyY2gvYXJtL2NwdWVycmF0YS5jCisrKyBiL3hlbi9hcmNoL2FybS9j
cHVlcnJhdGEuYwpAQCAtMTQ1LDcgKzE0NSwxNiBAQCBpbnN0YWxsX2JwX2hh
cmRlbmluZ192ZWMoY29uc3Qgc3RydWN0IGFybV9jcHVfY2FwYWJpbGl0aWVz
ICplbnRyeSwKICAgICByZXR1cm4gcmV0OwogfQogCi1leHRlcm4gY2hhciBf
X3NtY2NjX3dvcmthcm91bmRfMV9zbWNfc3RhcnRbXSwgX19zbWNjY193b3Jr
YXJvdW5kXzFfc21jX2VuZFtdOworZXh0ZXJuIGNoYXIgX19zbWNjY193b3Jr
YXJvdW5kX3NtY19zdGFydF8xW10sIF9fc21jY2Nfd29ya2Fyb3VuZF9zbWNf
ZW5kXzFbXTsKK2V4dGVybiBjaGFyIF9fc21jY2Nfd29ya2Fyb3VuZF9zbWNf
c3RhcnRfM1tdLCBfX3NtY2NjX3dvcmthcm91bmRfc21jX2VuZF8zW107Citl
eHRlcm4gY2hhciBfX21pdGlnYXRlX3NwZWN0cmVfYmhiX2NsZWFyX2luc25f
c3RhcnRbXSwKKyAgICAgICAgICAgIF9fbWl0aWdhdGVfc3BlY3RyZV9iaGJf
Y2xlYXJfaW5zbl9lbmRbXTsKK2V4dGVybiBjaGFyIF9fbWl0aWdhdGVfc3Bl
Y3RyZV9iaGJfbG9vcF9zdGFydF84W10sCisgICAgICAgICAgICBfX21pdGln
YXRlX3NwZWN0cmVfYmhiX2xvb3BfZW5kXzhbXTsKK2V4dGVybiBjaGFyIF9f
bWl0aWdhdGVfc3BlY3RyZV9iaGJfbG9vcF9zdGFydF8yNFtdLAorICAgICAg
ICAgICAgX19taXRpZ2F0ZV9zcGVjdHJlX2JoYl9sb29wX2VuZF8yNFtdOwor
ZXh0ZXJuIGNoYXIgX19taXRpZ2F0ZV9zcGVjdHJlX2JoYl9sb29wX3N0YXJ0
XzMyW10sCisgICAgICAgICAgICBfX21pdGlnYXRlX3NwZWN0cmVfYmhiX2xv
b3BfZW5kXzMyW107CiAKIHN0YXRpYyBpbnQgZW5hYmxlX3NtY2NjX2FyY2hf
d29ya2Fyb3VuZF8xKHZvaWQgKmRhdGEpCiB7CkBAIC0xNzYsOCArMTg1LDgg
QEAgc3RhdGljIGludCBlbmFibGVfc21jY2NfYXJjaF93b3JrYXJvdW5kXzEo
dm9pZCAqZGF0YSkKICAgICBpZiAoIChpbnQpcmVzLmEwIDwgMCApCiAgICAg
ICAgIGdvdG8gd2FybjsKIAotICAgIHJldHVybiAhaW5zdGFsbF9icF9oYXJk
ZW5pbmdfdmVjKGVudHJ5LF9fc21jY2Nfd29ya2Fyb3VuZF8xX3NtY19zdGFy
dCwKLSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBfX3Nt
Y2NjX3dvcmthcm91bmRfMV9zbWNfZW5kLAorICAgIHJldHVybiAhaW5zdGFs
bF9icF9oYXJkZW5pbmdfdmVjKGVudHJ5LF9fc21jY2Nfd29ya2Fyb3VuZF9z
bWNfc3RhcnRfMSwKKyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICBfX3NtY2NjX3dvcmthcm91bmRfc21jX2VuZF8xLAogICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICJjYWxsIEFSTV9TTUNDQ19B
UkNIX1dPUktBUk9VTkRfMSIpOwogCiB3YXJuOgpAQCAtMTg3LDYgKzE5Niw5
MyBAQCBzdGF0aWMgaW50IGVuYWJsZV9zbWNjY19hcmNoX3dvcmthcm91bmRf
MSh2b2lkICpkYXRhKQogICAgIHJldHVybiAwOwogfQogCisvKgorICogU3Bl
Y3RyZSBCSEIgTWl0aWdhdGlvbgorICoKKyAqIENQVSBpcyBlaXRoZXI6Cisg
KiAtIEhhdmluZyBDVlMyLjMgc28gaXQgaXMgbm90IGFmZmVjdGVkLgorICog
LSBIYXZpbmcgRUNCSEIgYW5kIGlzIGNsZWFyaW5nIHRoZSBicmFuY2ggaGlz
dG9yeSBidWZmZXIgd2hlbiBhbiBleGNlcHRpb24KKyAqICAgdG8gYSBkaWZm
ZXJlbnQgZXhjZXB0aW9uIGxldmVsIGlzIGhhcHBlbmluZyBzbyBubyBtaXRp
Z2F0aW9uIGlzIG5lZWRlZC4KKyAqIC0gTWl0aWdhdGluZyB1c2luZyBhIGxv
b3Agb24gZXhjZXB0aW9uIGVudHJ5IChudW1iZXIgb2YgbG9vcCBkZXBlbmRp
bmcgb24KKyAqICAgdGhlIENQVSkuCisgKiAtIE1pdGlnYXRpbmcgdXNpbmcg
dGhlIGZpcm13YXJlLgorICovCitzdGF0aWMgaW50IGVuYWJsZV9zcGVjdHJl
X2JoYl93b3JrYXJvdW5kKHZvaWQgKmRhdGEpCit7CisgICAgY29uc3Qgc3Ry
dWN0IGFybV9jcHVfY2FwYWJpbGl0aWVzICplbnRyeSA9IGRhdGE7CisKKyAg
ICAvKgorICAgICAqIEVuYWJsZSBjYWxsYmFja3MgYXJlIGNhbGxlZCBvbiBl
dmVyeSBDUFUgYmFzZWQgb24gdGhlIGNhcGFiaWxpdGllcywgc28KKyAgICAg
KiBkb3VibGUtY2hlY2sgd2hldGhlciB0aGUgQ1BVIG1hdGNoZXMgdGhlIGVu
dHJ5LgorICAgICAqLworICAgIGlmICggIWVudHJ5LT5tYXRjaGVzKGVudHJ5
KSApCisgICAgICAgIHJldHVybiAwOworCisgICAgaWYgKCBjcHVfZGF0YVtz
bXBfcHJvY2Vzc29yX2lkKCldLnBmcjY0LmNzdjIgPT0gMyApCisgICAgICAg
IHJldHVybiAwOworCisgICAgaWYgKCBjcHVfZGF0YVtzbXBfcHJvY2Vzc29y
X2lkKCldLm1tNjQuZWNiaGIgKQorICAgICAgICByZXR1cm4gMDsKKworICAg
IGlmICggY3B1X2RhdGFbc21wX3Byb2Nlc3Nvcl9pZCgpXS5pc2E2NC5jbGVh
cmJoYiApCisgICAgICAgIHJldHVybiAhaW5zdGFsbF9icF9oYXJkZW5pbmdf
dmVjKGVudHJ5LAorICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgX19taXRpZ2F0ZV9zcGVjdHJlX2JoYl9jbGVhcl9pbnNuX3N0YXJ0LAor
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgX19taXRpZ2F0
ZV9zcGVjdHJlX2JoYl9jbGVhcl9pbnNuX2VuZCwKKyAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAidXNlIGNsZWFyQkhCIGluc3RydWN0
aW9uIik7CisKKyAgICAvKiBBcHBseSBzb2x1dGlvbiBkZXBlbmRpbmcgb24g
aHdjYXBzIHNldCBvbiBhcm1fZXJyYXRhICovCisgICAgaWYgKCBjcHVzX2hh
dmVfY2FwKEFSTV9XT1JLQVJPVU5EX0JIQl9MT09QXzgpICkKKyAgICAgICAg
cmV0dXJuICFpbnN0YWxsX2JwX2hhcmRlbmluZ192ZWMoZW50cnksCisgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIF9fbWl0aWdh
dGVfc3BlY3RyZV9iaGJfbG9vcF9zdGFydF84LAorICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICBfX21pdGlnYXRlX3NwZWN0cmVf
YmhiX2xvb3BfZW5kXzgsCisgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICJ1c2UgOCBsb29wcyB3b3JrYXJvdW5kIik7CisKKyAg
ICBpZiAoIGNwdXNfaGF2ZV9jYXAoQVJNX1dPUktBUk9VTkRfQkhCX0xPT1Bf
MjQpICkKKyAgICAgICAgcmV0dXJuICFpbnN0YWxsX2JwX2hhcmRlbmluZ192
ZWMoZW50cnksCisgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgIF9fbWl0aWdhdGVfc3BlY3RyZV9iaGJfbG9vcF9zdGFydF8yNCwK
KyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgX19t
aXRpZ2F0ZV9zcGVjdHJlX2JoYl9sb29wX2VuZF8yNCwKKyAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgInVzZSAyNCBsb29wcyB3
b3JrYXJvdW5kIik7CisKKyAgICBpZiAoIGNwdXNfaGF2ZV9jYXAoQVJNX1dP
UktBUk9VTkRfQkhCX0xPT1BfMzIpICkKKyAgICAgICAgcmV0dXJuICFpbnN0
YWxsX2JwX2hhcmRlbmluZ192ZWMoZW50cnksCisgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgIF9fbWl0aWdhdGVfc3BlY3RyZV9i
aGJfbG9vcF9zdGFydF8zMiwKKyAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgX19taXRpZ2F0ZV9zcGVjdHJlX2JoYl9sb29wX2Vu
ZF8zMiwKKyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgInVzZSAzMiBsb29wcyB3b3JrYXJvdW5kIik7CisKKyAgICBpZiAoIGNw
dXNfaGF2ZV9jYXAoQVJNX1dPUktBUk9VTkRfQkhCX1NNQ0NfMykgKQorICAg
IHsKKyAgICAgICAgc3RydWN0IGFybV9zbWNjY19yZXMgcmVzOworCisgICAg
ICAgIGlmICggc21jY2NfdmVyIDwgU01DQ0NfVkVSU0lPTigxLCAxKSApCisg
ICAgICAgICAgICBnb3RvIHdhcm47CisKKyAgICAgICAgYXJtX3NtY2NjXzFf
MV9zbWMoQVJNX1NNQ0NDX0FSQ0hfRkVBVFVSRVNfRklELAorICAgICAgICAg
ICAgICAgICAgICAgICAgICBBUk1fU01DQ0NfQVJDSF9XT1JLQVJPVU5EXzNf
RklELCAmcmVzKTsKKyAgICAgICAgLyogVGhlIHJldHVybiB2YWx1ZSBpcyBp
biB0aGUgbG93ZXIgMzItYml0cy4gKi8KKyAgICAgICAgaWYgKCAoaW50KXJl
cy5hMCA8IDAgKQorICAgICAgICB7CisgICAgICAgICAgICAvKgorICAgICAg
ICAgICAgICogT24gcHJvY2Vzc29yIGFmZmVjdGVkIHdpdGggQ1NWMj0wLCB3
b3JrYXJvdW5kIDEgd2lsbCBtaXRpZ2F0ZQorICAgICAgICAgICAgICogYm90
aCBTcGVjdHJlIHYyIGFuZCBCSEIgc28gdXNlIGl0IHdoZW4gYXZhaWxhYmxl
CisgICAgICAgICAgICAgKi8KKyAgICAgICAgICAgIGlmICggZW5hYmxlX3Nt
Y2NjX2FyY2hfd29ya2Fyb3VuZF8xKGRhdGEpICkKKyAgICAgICAgICAgICAg
ICByZXR1cm4gMTsKKworICAgICAgICAgICAgZ290byB3YXJuOworICAgICAg
ICB9CisKKyAgICAgICAgcmV0dXJuICFpbnN0YWxsX2JwX2hhcmRlbmluZ192
ZWMoZW50cnksX19zbWNjY193b3JrYXJvdW5kX3NtY19zdGFydF8zLAorICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBfX3NtY2Nj
X3dvcmthcm91bmRfc21jX2VuZF8zLAorICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAiY2FsbCBBUk1fU01DQ0NfQVJDSF9XT1JL
QVJPVU5EXzMiKTsKKyAgICB9CisKK3dhcm46CisgICAgcHJpbnRrX29uY2Uo
IioqKiogTm8gc3VwcG9ydCBmb3IgYW55IHNwZWN0cmUgQkhCIHdvcmthcm91
bmQuICAqKioqXG4iCisgICAgICAgICAgICAgICAgIioqKiogUGxlYXNlIHVw
ZGF0ZSB5b3VyIGZpcm13YXJlLiAgICAgICAgICAgICAgICAqKioqXG4iKTsK
KworICAgIHJldHVybiAwOworfQorCiAjZW5kaWYgLyogQ09ORklHX0FSTTY0
X0hBUkRFTl9CUkFOQ0hfUFJFRElDVE9SICovCiAKIC8qIEhhcmRlbmluZyBC
cmFuY2ggcHJlZGljdG9yIGNvZGUgZm9yIEFybTMyICovCkBAIC00NDYsMTkg
KzU0Miw3NyBAQCBzdGF0aWMgY29uc3Qgc3RydWN0IGFybV9jcHVfY2FwYWJp
bGl0aWVzIGFybV9lcnJhdGFbXSA9IHsKICAgICB9LAogICAgIHsKICAgICAg
ICAgLmNhcGFiaWxpdHkgPSBBUk1fSEFSREVOX0JSQU5DSF9QUkVESUNUT1Is
Ci0gICAgICAgIE1JRFJfQUxMX1ZFUlNJT05TKE1JRFJfQ09SVEVYX0E3Miks
CisgICAgICAgIE1JRFJfUkFOR0UoTUlEUl9DT1JURVhfQTcyLCAwLCAxIDw8
IE1JRFJfVkFSSUFOVF9TSElGVCksCiAgICAgICAgIC5lbmFibGUgPSBlbmFi
bGVfc21jY2NfYXJjaF93b3JrYXJvdW5kXzEsCiAgICAgfSwKICAgICB7Ci0g
ICAgICAgIC5jYXBhYmlsaXR5ID0gQVJNX0hBUkRFTl9CUkFOQ0hfUFJFRElD
VE9SLAorICAgICAgICAuY2FwYWJpbGl0eSA9IEFSTV9XT1JLQVJPVU5EX0JI
Ql9TTUNDXzMsCiAgICAgICAgIE1JRFJfQUxMX1ZFUlNJT05TKE1JRFJfQ09S
VEVYX0E3MyksCi0gICAgICAgIC5lbmFibGUgPSBlbmFibGVfc21jY2NfYXJj
aF93b3JrYXJvdW5kXzEsCisgICAgICAgIC5lbmFibGUgPSBlbmFibGVfc3Bl
Y3RyZV9iaGJfd29ya2Fyb3VuZCwKICAgICB9LAogICAgIHsKLSAgICAgICAg
LmNhcGFiaWxpdHkgPSBBUk1fSEFSREVOX0JSQU5DSF9QUkVESUNUT1IsCisg
ICAgICAgIC5jYXBhYmlsaXR5ID0gQVJNX1dPUktBUk9VTkRfQkhCX1NNQ0Nf
MywKICAgICAgICAgTUlEUl9BTExfVkVSU0lPTlMoTUlEUl9DT1JURVhfQTc1
KSwKLSAgICAgICAgLmVuYWJsZSA9IGVuYWJsZV9zbWNjY19hcmNoX3dvcmth
cm91bmRfMSwKKyAgICAgICAgLmVuYWJsZSA9IGVuYWJsZV9zcGVjdHJlX2Jo
Yl93b3JrYXJvdW5kLAorICAgIH0sCisgICAgLyogc3BlY3RyZSBCSEIgKi8K
KyAgICB7CisgICAgICAgIC5jYXBhYmlsaXR5ID0gQVJNX1dPUktBUk9VTkRf
QkhCX0xPT1BfOCwKKyAgICAgICAgTUlEUl9SQU5HRShNSURSX0NPUlRFWF9B
NzIsIDEgPDwgTUlEUl9WQVJJQU5UX1NISUZULAorICAgICAgICAgICAgICAg
ICAgIChNSURSX1ZBUklBTlRfTUFTSyB8IE1JRFJfUkVWSVNJT05fTUFTSykp
LAorICAgICAgICAuZW5hYmxlID0gZW5hYmxlX3NwZWN0cmVfYmhiX3dvcmth
cm91bmQsCisgICAgfSwKKyAgICB7CisgICAgICAgIC5jYXBhYmlsaXR5ID0g
QVJNX1dPUktBUk9VTkRfQkhCX0xPT1BfMjQsCisgICAgICAgIE1JRFJfQUxM
X1ZFUlNJT05TKE1JRFJfQ09SVEVYX0E3NiksCisgICAgICAgIC5lbmFibGUg
PSBlbmFibGVfc3BlY3RyZV9iaGJfd29ya2Fyb3VuZCwKKyAgICB9LAorICAg
IHsKKyAgICAgICAgLmNhcGFiaWxpdHkgPSBBUk1fV09SS0FST1VORF9CSEJf
TE9PUF8yNCwKKyAgICAgICAgTUlEUl9BTExfVkVSU0lPTlMoTUlEUl9DT1JU
RVhfQTc3KSwKKyAgICAgICAgLmVuYWJsZSA9IGVuYWJsZV9zcGVjdHJlX2Jo
Yl93b3JrYXJvdW5kLAorICAgIH0sCisgICAgeworICAgICAgICAuY2FwYWJp
bGl0eSA9IEFSTV9XT1JLQVJPVU5EX0JIQl9MT09QXzMyLAorICAgICAgICBN
SURSX0FMTF9WRVJTSU9OUyhNSURSX0NPUlRFWF9BNzgpLAorICAgICAgICAu
ZW5hYmxlID0gZW5hYmxlX3NwZWN0cmVfYmhiX3dvcmthcm91bmQsCisgICAg
fSwKKyAgICB7CisgICAgICAgIC5jYXBhYmlsaXR5ID0gQVJNX1dPUktBUk9V
TkRfQkhCX0xPT1BfMzIsCisgICAgICAgIE1JRFJfQUxMX1ZFUlNJT05TKE1J
RFJfQ09SVEVYX0E3OEMpLAorICAgICAgICAuZW5hYmxlID0gZW5hYmxlX3Nw
ZWN0cmVfYmhiX3dvcmthcm91bmQsCisgICAgfSwKKyAgICB7CisgICAgICAg
IC5jYXBhYmlsaXR5ID0gQVJNX1dPUktBUk9VTkRfQkhCX0xPT1BfMzIsCisg
ICAgICAgIE1JRFJfQUxMX1ZFUlNJT05TKE1JRFJfQ09SVEVYX1gxKSwKKyAg
ICAgICAgLmVuYWJsZSA9IGVuYWJsZV9zcGVjdHJlX2JoYl93b3JrYXJvdW5k
LAorICAgIH0sCisgICAgeworICAgICAgICAuY2FwYWJpbGl0eSA9IEFSTV9X
T1JLQVJPVU5EX0JIQl9MT09QXzMyLAorICAgICAgICBNSURSX0FMTF9WRVJT
SU9OUyhNSURSX0NPUlRFWF9YMiksCisgICAgICAgIC5lbmFibGUgPSBlbmFi
bGVfc3BlY3RyZV9iaGJfd29ya2Fyb3VuZCwKKyAgICB9LAorICAgIHsKKyAg
ICAgICAgLmNhcGFiaWxpdHkgPSBBUk1fV09SS0FST1VORF9CSEJfTE9PUF8z
MiwKKyAgICAgICAgTUlEUl9BTExfVkVSU0lPTlMoTUlEUl9DT1JURVhfQTcx
MCksCisgICAgICAgIC5lbmFibGUgPSBlbmFibGVfc3BlY3RyZV9iaGJfd29y
a2Fyb3VuZCwKICAgICB9LAorICAgIHsKKyAgICAgICAgLmNhcGFiaWxpdHkg
PSBBUk1fV09SS0FST1VORF9CSEJfTE9PUF8yNCwKKyAgICAgICAgTUlEUl9B
TExfVkVSU0lPTlMoTUlEUl9ORU9WRVJTRV9OMSksCisgICAgICAgIC5lbmFi
bGUgPSBlbmFibGVfc3BlY3RyZV9iaGJfd29ya2Fyb3VuZCwKKyAgICB9LAor
ICAgIHsKKyAgICAgICAgLmNhcGFiaWxpdHkgPSBBUk1fV09SS0FST1VORF9C
SEJfTE9PUF8zMiwKKyAgICAgICAgTUlEUl9BTExfVkVSU0lPTlMoTUlEUl9O
RU9WRVJTRV9OMiksCisgICAgICAgIC5lbmFibGUgPSBlbmFibGVfc3BlY3Ry
ZV9iaGJfd29ya2Fyb3VuZCwKKyAgICB9LAorICAgIHsKKyAgICAgICAgLmNh
cGFiaWxpdHkgPSBBUk1fV09SS0FST1VORF9CSEJfTE9PUF8zMiwKKyAgICAg
ICAgTUlEUl9BTExfVkVSU0lPTlMoTUlEUl9ORU9WRVJTRV9WMSksCisgICAg
ICAgIC5lbmFibGUgPSBlbmFibGVfc3BlY3RyZV9iaGJfd29ya2Fyb3VuZCwK
KyAgICB9LAorCiAjZW5kaWYKICNpZmRlZiBDT05GSUdfQVJNMzJfSEFSREVO
X0JSQU5DSF9QUkVESUNUT1IKICAgICB7CmRpZmYgLS1naXQgYS94ZW4vaW5j
bHVkZS9hc20tYXJtL2FybTY0L21hY3Jvcy5oIGIveGVuL2luY2x1ZGUvYXNt
LWFybS9hcm02NC9tYWNyb3MuaAppbmRleCA1YWQ2NmVmZDZiYTQuLjE0MGUy
MjNiNGM5OSAxMDA2NDQKLS0tIGEveGVuL2luY2x1ZGUvYXNtLWFybS9hcm02
NC9tYWNyb3MuaAorKysgYi94ZW4vaW5jbHVkZS9hc20tYXJtL2FybTY0L21h
Y3Jvcy5oCkBAIC0yNyw2ICsyNywxMSBAQAogICAgICAgICBzYgogICAgIC5l
bmRtCiAKKyAgICAvKiBjbGVhcmJoYiBpbnN0cnVjdGlvbiBjbGVhcmluZyB0
aGUgYnJhbmNoIGhpc3RvcnkgKi8KKyAgICAubWFjcm8gY2xlYXJiaGIKKyAg
ICAgICAgaGludCAgICAjMjIKKyAgICAuZW5kbQorCiAvKgogICogUmVnaXN0
ZXIgYWxpYXNlcy4KICAqLwpkaWZmIC0tZ2l0IGEveGVuL2luY2x1ZGUvYXNt
LWFybS9jcHVmZWF0dXJlLmggYi94ZW4vaW5jbHVkZS9hc20tYXJtL2NwdWZl
YXR1cmUuaAppbmRleCBkYjEyNjUwOGYxNTkuLmY3MzY4NzY2YzA3YyAxMDA2
NDQKLS0tIGEveGVuL2luY2x1ZGUvYXNtLWFybS9jcHVmZWF0dXJlLmgKKysr
IGIveGVuL2luY2x1ZGUvYXNtLWFybS9jcHVmZWF0dXJlLmgKQEAgLTYzLDgg
KzYzLDEyIEBACiAjZGVmaW5lIEFSTTY0X1dPUktBUk9VTkRfQVRfU1BFQ1VM
QVRFIDkKICNkZWZpbmUgQVJNX1dPUktBUk9VTkRfODU4OTIxIDEwCiAjZGVm
aW5lIEFSTTY0X1dPUktBUk9VTkRfUkVQRUFUX1RMQkkgMTEKKyNkZWZpbmUg
QVJNX1dPUktBUk9VTkRfQkhCX0xPT1BfOCAxMgorI2RlZmluZSBBUk1fV09S
S0FST1VORF9CSEJfTE9PUF8yNCAxMworI2RlZmluZSBBUk1fV09SS0FST1VO
RF9CSEJfTE9PUF8zMiAxNAorI2RlZmluZSBBUk1fV09SS0FST1VORF9CSEJf
U01DQ18zIDE1CiAKLSNkZWZpbmUgQVJNX05DQVBTICAgICAgICAgICAxMgor
I2RlZmluZSBBUk1fTkNBUFMgICAgICAgICAgIDE2CiAKICNpZm5kZWYgX19B
U1NFTUJMWV9fCiAKZGlmZiAtLWdpdCBhL3hlbi9pbmNsdWRlL2FzbS1hcm0v
c21jY2MuaCBiL3hlbi9pbmNsdWRlL2FzbS1hcm0vc21jY2MuaAppbmRleCA5
ZDk0YmViM2RmMmQuLmIzZGJlZWNjOTBhZCAxMDA2NDQKLS0tIGEveGVuL2lu
Y2x1ZGUvYXNtLWFybS9zbWNjYy5oCisrKyBiL3hlbi9pbmNsdWRlL2FzbS1h
cm0vc21jY2MuaApAQCAtMzM0LDYgKzMzNCwxMiBAQCB2b2lkIF9fYXJtX3Nt
Y2NjXzFfMF9zbWMocmVnaXN0ZXJfdCBhMCwgcmVnaXN0ZXJfdCBhMSwgcmVn
aXN0ZXJfdCBhMiwKICAgICAgICAgICAgICAgICAgICAgICAgQVJNX1NNQ0ND
X09XTkVSX0FSQ0gsICAgICAgICBcCiAgICAgICAgICAgICAgICAgICAgICAg
IDB4N0ZGRikKIAorI2RlZmluZSBBUk1fU01DQ0NfQVJDSF9XT1JLQVJPVU5E
XzNfRklEICAgICAgICAgICAgIFwKKyAgICBBUk1fU01DQ0NfQ0FMTF9WQUwo
QVJNX1NNQ0NDX0ZBU1RfQ0FMTCwgICAgICAgICBcCisgICAgICAgICAgICAg
ICAgICAgICAgIEFSTV9TTUNDQ19DT05WXzMyLCAgICAgICAgICAgXAorICAg
ICAgICAgICAgICAgICAgICAgICBBUk1fU01DQ0NfT1dORVJfQVJDSCwgICAg
ICAgIFwKKyAgICAgICAgICAgICAgICAgICAgICAgMHgzRkZGKQorCiAvKiBT
TUNDQyBlcnJvciBjb2RlcyAqLwogI2RlZmluZSBBUk1fU01DQ0NfTk9UX1JF
UVVJUkVEICAgICAgICAgICgtMikKICNkZWZpbmUgQVJNX1NNQ0NDX0VSUl9V
TktOT1dOX0ZVTkNUSU9OICAoLTEpCg==

--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.16-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.16-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4.16-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4.16-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-4-xen-arm-Add-Spectre-BHB-handling.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-4-xen-arm-Add-Spectre-BHB-handling.patch"
Content-Transfer-Encoding: base64

RnJvbSA2MmM5MWViNjZhMjkwNGVlZmIxZDFkOTY0MmUzNjk3YTFlM2MzYTNj
IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBSYWh1bCBTaW5naCA8
cmFodWwuc2luZ2hAYXJtLmNvbT4KRGF0ZTogTW9uLCAxNCBGZWIgMjAyMiAx
ODo0NzozMiArMDAwMApTdWJqZWN0OiB4ZW4vYXJtOiBBZGQgU3BlY3RyZSBC
SEIgaGFuZGxpbmcKClRoaXMgY29tbWl0IGlzIGFkZGluZyBTcGVjdHJlIEJI
QiBoYW5kbGluZyB0byBYZW4gb24gQXJtLgpUaGUgY29tbWl0IGlzIGludHJv
ZHVjaW5nIG5ldyBhbHRlcm5hdGl2ZSBjb2RlIHRvIGJlIGV4ZWN1dGVkIGR1
cmluZwpleGNlcHRpb24gZW50cnk6Ci0gU01DQyB3b3JrYXJvdW5kIDMgY2Fs
bAotIGxvb3Agd29ya2Fyb3VuZCAod2l0aCA4LCAyNCBvciAzMiBpdGVyYXRp
b25zKQotIHVzZSBvZiBuZXcgY2xlYXJiaGIgaW5zdHJ1Y3Rpb24KCkNwdWVy
cmF0YSBpcyBtb2RpZmllZCBieSB0aGlzIHBhdGNoIHRvIGFwcGx5IHRoZSBy
ZXF1aXJlZCB3b3JrYXJvdW5kIGZvcgpDUFUgYWZmZWN0ZWQgYnkgU3BlY3Ry
ZSBCSEIgd2hlbiBDT05GSUdfQVJNNjRfSEFSREVOX0JSQU5DSF9QUkVESUNU
T1IgaXMKZW5hYmxlZC4KClRvIGRvIHRoaXMgdGhlIHN5c3RlbSBwcmV2aW91
c2x5IHVzZWQgdG8gYXBwbHkgc21jYyB3b3JrYXJvdW5kIDEgaXMKcmV1c2Vk
IGFuZCBuZXcgYWx0ZXJuYXRpdmUgY29kZSB0byBiZSBjb3BpZWQgaW4gdGhl
IGV4Y2VwdGlvbiBoYW5kbGVyIGlzCmludHJvZHVjZWQuCgpUbyBkZWZpbmUg
dGhlIHR5cGUgb2Ygd29ya2Fyb3VuZCByZXF1aXJlZCBieSBhIHByb2Nlc3Nv
ciwgNCBuZXcgY3B1CmNhcGFiaWxpdGllcyBhcmUgaW50cm9kdWNlZCAoZm9y
IGVhY2ggbnVtYmVyIG9mIGxvb3AgYW5kIGZvciBzbWNjCndvcmthcm91bmQg
MykuCgpXaGVuIGEgcHJvY2Vzc29yIGlzIGFmZmVjdGVkLCBlbmFibGVfc3Bl
Y3RyZV9iaGJfd29ya2Fyb3VuZCBpcyBjYWxsZWQKYW5kIGlmIHRoZSBwcm9j
ZXNzb3IgZG9lcyBub3QgaGF2ZSBDU1YyIHNldCB0byAzIG9yIEVDQkhCIGZl
YXR1cmUgKHdoaWNoCndvdWxkIG1lYW4gdGhhdCB0aGUgcHJvY2Vzc29yIGlz
IGRvaW5nIHdoYXQgaXMgcmVxdWlyZWQgaW4gaGFyZHdhcmUpLAp0aGUgcHJv
cGVyIGNvZGUgaXMgZW5hYmxlZCBhdCBleGNlcHRpb24gZW50cnkuCgpJbiB0
aGUgY2FzZSB3aGVyZSB3b3JrYXJvdW5kIDMgaXMgbm90IHN1cHBvcnRlZCBi
eSB0aGUgZmlybXdhcmUsIHdlCmVuYWJsZSB3b3JrYXJvdW5kIDEgd2hlbiBw
b3NzaWJsZSBhcyBpdCB3aWxsIGFsc28gbWl0aWdhdGUgU3BlY3RyZSBCSEIK
b24gc3lzdGVtcyB3aXRob3V0IENTVjIuCgpUaGlzIGlzIHBhcnQgb2YgWFNB
LTM5OCAvIENWRS0yMDIyLTIzOTYwLgoKU2lnbmVkLW9mZi1ieTogQmVydHJh
bmQgTWFycXVpcyA8YmVydHJhbmQubWFycXVpc0Bhcm0uY29tPgpTaWduZWQt
b2ZmLWJ5OiBSYWh1bCBTaW5naCA8cmFodWwuc2luZ2hAYXJtLmNvbT4KQWNr
ZWQtYnk6IEp1bGllbiBHcmFsbCA8anVsaWVuQHhlbi5vcmc+CgpkaWZmIC0t
Z2l0IGEveGVuL2FyY2gvYXJtL2FybTY0L2JwaS5TIGIveGVuL2FyY2gvYXJt
L2FybTY0L2JwaS5TCmluZGV4IGQ4NzQzZDk1NWM0YS4uNGU2MzgyNTIyMDQ4
IDEwMDY0NAotLS0gYS94ZW4vYXJjaC9hcm0vYXJtNjQvYnBpLlMKKysrIGIv
eGVuL2FyY2gvYXJtL2FybTY0L2JwaS5TCkBAIC01OCwxNiArNTgsNDIgQEAg
RU5UUlkoX19icF9oYXJkZW5faHlwX3ZlY3Nfc3RhcnQpCiAgICAgLmVuZHIK
IEVOVFJZKF9fYnBfaGFyZGVuX2h5cF92ZWNzX2VuZCkKIAotRU5UUlkoX19z
bWNjY193b3JrYXJvdW5kXzFfc21jX3N0YXJ0KQorLm1hY3JvIG1pdGlnYXRl
X3NwZWN0cmVfYmhiX2xvb3AgY291bnQKK0VOVFJZKF9fbWl0aWdhdGVfc3Bl
Y3RyZV9iaGJfbG9vcF9zdGFydF9cY291bnQpCisgICAgc3RwICAgICB4MCwg
eDEsIFtzcCwgIy0xNl0hCisgICAgbW92ICAgICB4MCwgXGNvdW50CisuTHNw
ZWN0cmVfYmhiX2xvb3BcQDoKKyAgICBiICAgLiArIDQKKyAgICBzdWJzICAg
IHgwLCB4MCwgIzEKKyAgICBiLm5lICAgIC5Mc3BlY3RyZV9iaGJfbG9vcFxA
CisgICAgc2IKKyAgICBsZHAgICAgIHgwLCB4MSwgW3NwXSwgIzE2CitFTlRS
WShfX21pdGlnYXRlX3NwZWN0cmVfYmhiX2xvb3BfZW5kX1xjb3VudCkKKy5l
bmRtCisKKy5tYWNybyBzbWNjY193b3JrYXJvdW5kIG51bSBzbWNjX2lkCitF
TlRSWShfX3NtY2NjX3dvcmthcm91bmRfc21jX3N0YXJ0X1xudW0pCiAgICAg
c3ViICAgICBzcCwgc3AsICMoOCAqIDQpCiAgICAgc3RwICAgICB4MCwgeDEs
IFtzcCwgIyg4ICogMildCiAgICAgc3RwICAgICB4MiwgeDMsIFtzcCwgIyg4
ICogMCldCi0gICAgbW92ICAgICB3MCwgI0FSTV9TTUNDQ19BUkNIX1dPUktB
Uk9VTkRfMV9GSUQKKyAgICBtb3YgICAgIHcwLCBcc21jY19pZAogICAgIHNt
YyAgICAgIzAKICAgICBsZHAgICAgIHgyLCB4MywgW3NwLCAjKDggKiAwKV0K
ICAgICBsZHAgICAgIHgwLCB4MSwgW3NwLCAjKDggKiAyKV0KICAgICBhZGQg
ICAgIHNwLCBzcCwgIyg4ICogNCkKLUVOVFJZKF9fc21jY2Nfd29ya2Fyb3Vu
ZF8xX3NtY19lbmQpCitFTlRSWShfX3NtY2NjX3dvcmthcm91bmRfc21jX2Vu
ZF9cbnVtKQorLmVuZG0KKworRU5UUlkoX19taXRpZ2F0ZV9zcGVjdHJlX2Jo
Yl9jbGVhcl9pbnNuX3N0YXJ0KQorICAgIGNsZWFyYmhiCisgICAgaXNiCitF
TlRSWShfX21pdGlnYXRlX3NwZWN0cmVfYmhiX2NsZWFyX2luc25fZW5kKQor
CittaXRpZ2F0ZV9zcGVjdHJlX2JoYl9sb29wIDgKK21pdGlnYXRlX3NwZWN0
cmVfYmhiX2xvb3AgMjQKK21pdGlnYXRlX3NwZWN0cmVfYmhiX2xvb3AgMzIK
K3NtY2NjX3dvcmthcm91bmQgMSwgI0FSTV9TTUNDQ19BUkNIX1dPUktBUk9V
TkRfMV9GSUQKK3NtY2NjX3dvcmthcm91bmQgMywgI0FSTV9TTUNDQ19BUkNI
X1dPUktBUk9VTkRfM19GSUQKIAogLyoKICAqIExvY2FsIHZhcmlhYmxlczoK
ZGlmZiAtLWdpdCBhL3hlbi9hcmNoL2FybS9jcHVlcnJhdGEuYyBiL3hlbi9h
cmNoL2FybS9jcHVlcnJhdGEuYwppbmRleCAwMGY5ZWJlOWNlZTAuLmFlNjQ5
ZDE2ZWYwMiAxMDA2NDQKLS0tIGEveGVuL2FyY2gvYXJtL2NwdWVycmF0YS5j
CisrKyBiL3hlbi9hcmNoL2FybS9jcHVlcnJhdGEuYwpAQCAtMTQ1LDcgKzE0
NSwxNiBAQCBpbnN0YWxsX2JwX2hhcmRlbmluZ192ZWMoY29uc3Qgc3RydWN0
IGFybV9jcHVfY2FwYWJpbGl0aWVzICplbnRyeSwKICAgICByZXR1cm4gcmV0
OwogfQogCi1leHRlcm4gY2hhciBfX3NtY2NjX3dvcmthcm91bmRfMV9zbWNf
c3RhcnRbXSwgX19zbWNjY193b3JrYXJvdW5kXzFfc21jX2VuZFtdOworZXh0
ZXJuIGNoYXIgX19zbWNjY193b3JrYXJvdW5kX3NtY19zdGFydF8xW10sIF9f
c21jY2Nfd29ya2Fyb3VuZF9zbWNfZW5kXzFbXTsKK2V4dGVybiBjaGFyIF9f
c21jY2Nfd29ya2Fyb3VuZF9zbWNfc3RhcnRfM1tdLCBfX3NtY2NjX3dvcmth
cm91bmRfc21jX2VuZF8zW107CitleHRlcm4gY2hhciBfX21pdGlnYXRlX3Nw
ZWN0cmVfYmhiX2NsZWFyX2luc25fc3RhcnRbXSwKKyAgICAgICAgICAgIF9f
bWl0aWdhdGVfc3BlY3RyZV9iaGJfY2xlYXJfaW5zbl9lbmRbXTsKK2V4dGVy
biBjaGFyIF9fbWl0aWdhdGVfc3BlY3RyZV9iaGJfbG9vcF9zdGFydF84W10s
CisgICAgICAgICAgICBfX21pdGlnYXRlX3NwZWN0cmVfYmhiX2xvb3BfZW5k
XzhbXTsKK2V4dGVybiBjaGFyIF9fbWl0aWdhdGVfc3BlY3RyZV9iaGJfbG9v
cF9zdGFydF8yNFtdLAorICAgICAgICAgICAgX19taXRpZ2F0ZV9zcGVjdHJl
X2JoYl9sb29wX2VuZF8yNFtdOworZXh0ZXJuIGNoYXIgX19taXRpZ2F0ZV9z
cGVjdHJlX2JoYl9sb29wX3N0YXJ0XzMyW10sCisgICAgICAgICAgICBfX21p
dGlnYXRlX3NwZWN0cmVfYmhiX2xvb3BfZW5kXzMyW107CiAKIHN0YXRpYyBp
bnQgZW5hYmxlX3NtY2NjX2FyY2hfd29ya2Fyb3VuZF8xKHZvaWQgKmRhdGEp
CiB7CkBAIC0xNzYsOCArMTg1LDggQEAgc3RhdGljIGludCBlbmFibGVfc21j
Y2NfYXJjaF93b3JrYXJvdW5kXzEodm9pZCAqZGF0YSkKICAgICBpZiAoIChp
bnQpcmVzLmEwIDwgMCApCiAgICAgICAgIGdvdG8gd2FybjsKIAotICAgIHJl
dHVybiAhaW5zdGFsbF9icF9oYXJkZW5pbmdfdmVjKGVudHJ5LF9fc21jY2Nf
d29ya2Fyb3VuZF8xX3NtY19zdGFydCwKLSAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICBfX3NtY2NjX3dvcmthcm91bmRfMV9zbWNfZW5k
LAorICAgIHJldHVybiAhaW5zdGFsbF9icF9oYXJkZW5pbmdfdmVjKGVudHJ5
LF9fc21jY2Nfd29ya2Fyb3VuZF9zbWNfc3RhcnRfMSwKKyAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICBfX3NtY2NjX3dvcmthcm91bmRf
c21jX2VuZF8xLAogICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICJjYWxsIEFSTV9TTUNDQ19BUkNIX1dPUktBUk9VTkRfMSIpOwogCiB3
YXJuOgpAQCAtMTg3LDYgKzE5Niw5MyBAQCBzdGF0aWMgaW50IGVuYWJsZV9z
bWNjY19hcmNoX3dvcmthcm91bmRfMSh2b2lkICpkYXRhKQogICAgIHJldHVy
biAwOwogfQogCisvKgorICogU3BlY3RyZSBCSEIgTWl0aWdhdGlvbgorICoK
KyAqIENQVSBpcyBlaXRoZXI6CisgKiAtIEhhdmluZyBDVlMyLjMgc28gaXQg
aXMgbm90IGFmZmVjdGVkLgorICogLSBIYXZpbmcgRUNCSEIgYW5kIGlzIGNs
ZWFyaW5nIHRoZSBicmFuY2ggaGlzdG9yeSBidWZmZXIgd2hlbiBhbiBleGNl
cHRpb24KKyAqICAgdG8gYSBkaWZmZXJlbnQgZXhjZXB0aW9uIGxldmVsIGlz
IGhhcHBlbmluZyBzbyBubyBtaXRpZ2F0aW9uIGlzIG5lZWRlZC4KKyAqIC0g
TWl0aWdhdGluZyB1c2luZyBhIGxvb3Agb24gZXhjZXB0aW9uIGVudHJ5IChu
dW1iZXIgb2YgbG9vcCBkZXBlbmRpbmcgb24KKyAqICAgdGhlIENQVSkuCisg
KiAtIE1pdGlnYXRpbmcgdXNpbmcgdGhlIGZpcm13YXJlLgorICovCitzdGF0
aWMgaW50IGVuYWJsZV9zcGVjdHJlX2JoYl93b3JrYXJvdW5kKHZvaWQgKmRh
dGEpCit7CisgICAgY29uc3Qgc3RydWN0IGFybV9jcHVfY2FwYWJpbGl0aWVz
ICplbnRyeSA9IGRhdGE7CisKKyAgICAvKgorICAgICAqIEVuYWJsZSBjYWxs
YmFja3MgYXJlIGNhbGxlZCBvbiBldmVyeSBDUFUgYmFzZWQgb24gdGhlIGNh
cGFiaWxpdGllcywgc28KKyAgICAgKiBkb3VibGUtY2hlY2sgd2hldGhlciB0
aGUgQ1BVIG1hdGNoZXMgdGhlIGVudHJ5LgorICAgICAqLworICAgIGlmICgg
IWVudHJ5LT5tYXRjaGVzKGVudHJ5KSApCisgICAgICAgIHJldHVybiAwOwor
CisgICAgaWYgKCBjcHVfZGF0YVtzbXBfcHJvY2Vzc29yX2lkKCldLnBmcjY0
LmNzdjIgPT0gMyApCisgICAgICAgIHJldHVybiAwOworCisgICAgaWYgKCBj
cHVfZGF0YVtzbXBfcHJvY2Vzc29yX2lkKCldLm1tNjQuZWNiaGIgKQorICAg
ICAgICByZXR1cm4gMDsKKworICAgIGlmICggY3B1X2RhdGFbc21wX3Byb2Nl
c3Nvcl9pZCgpXS5pc2E2NC5jbGVhcmJoYiApCisgICAgICAgIHJldHVybiAh
aW5zdGFsbF9icF9oYXJkZW5pbmdfdmVjKGVudHJ5LAorICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgX19taXRpZ2F0ZV9zcGVjdHJlX2Jo
Yl9jbGVhcl9pbnNuX3N0YXJ0LAorICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgX19taXRpZ2F0ZV9zcGVjdHJlX2JoYl9jbGVhcl9pbnNu
X2VuZCwKKyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAi
dXNlIGNsZWFyQkhCIGluc3RydWN0aW9uIik7CisKKyAgICAvKiBBcHBseSBz
b2x1dGlvbiBkZXBlbmRpbmcgb24gaHdjYXBzIHNldCBvbiBhcm1fZXJyYXRh
ICovCisgICAgaWYgKCBjcHVzX2hhdmVfY2FwKEFSTV9XT1JLQVJPVU5EX0JI
Ql9MT09QXzgpICkKKyAgICAgICAgcmV0dXJuICFpbnN0YWxsX2JwX2hhcmRl
bmluZ192ZWMoZW50cnksCisgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgIF9fbWl0aWdhdGVfc3BlY3RyZV9iaGJfbG9vcF9zdGFy
dF84LAorICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICBfX21pdGlnYXRlX3NwZWN0cmVfYmhiX2xvb3BfZW5kXzgsCisgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJ1c2UgOCBsb29w
cyB3b3JrYXJvdW5kIik7CisKKyAgICBpZiAoIGNwdXNfaGF2ZV9jYXAoQVJN
X1dPUktBUk9VTkRfQkhCX0xPT1BfMjQpICkKKyAgICAgICAgcmV0dXJuICFp
bnN0YWxsX2JwX2hhcmRlbmluZ192ZWMoZW50cnksCisgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgIF9fbWl0aWdhdGVfc3BlY3Ry
ZV9iaGJfbG9vcF9zdGFydF8yNCwKKyAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgX19taXRpZ2F0ZV9zcGVjdHJlX2JoYl9sb29w
X2VuZF8yNCwKKyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgInVzZSAyNCBsb29wcyB3b3JrYXJvdW5kIik7CisKKyAgICBpZiAo
IGNwdXNfaGF2ZV9jYXAoQVJNX1dPUktBUk9VTkRfQkhCX0xPT1BfMzIpICkK
KyAgICAgICAgcmV0dXJuICFpbnN0YWxsX2JwX2hhcmRlbmluZ192ZWMoZW50
cnksCisgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
IF9fbWl0aWdhdGVfc3BlY3RyZV9iaGJfbG9vcF9zdGFydF8zMiwKKyAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgX19taXRpZ2F0
ZV9zcGVjdHJlX2JoYl9sb29wX2VuZF8zMiwKKyAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgInVzZSAzMiBsb29wcyB3b3JrYXJv
dW5kIik7CisKKyAgICBpZiAoIGNwdXNfaGF2ZV9jYXAoQVJNX1dPUktBUk9V
TkRfQkhCX1NNQ0NfMykgKQorICAgIHsKKyAgICAgICAgc3RydWN0IGFybV9z
bWNjY19yZXMgcmVzOworCisgICAgICAgIGlmICggc21jY2NfdmVyIDwgU01D
Q0NfVkVSU0lPTigxLCAxKSApCisgICAgICAgICAgICBnb3RvIHdhcm47CisK
KyAgICAgICAgYXJtX3NtY2NjXzFfMV9zbWMoQVJNX1NNQ0NDX0FSQ0hfRkVB
VFVSRVNfRklELAorICAgICAgICAgICAgICAgICAgICAgICAgICBBUk1fU01D
Q0NfQVJDSF9XT1JLQVJPVU5EXzNfRklELCAmcmVzKTsKKyAgICAgICAgLyog
VGhlIHJldHVybiB2YWx1ZSBpcyBpbiB0aGUgbG93ZXIgMzItYml0cy4gKi8K
KyAgICAgICAgaWYgKCAoaW50KXJlcy5hMCA8IDAgKQorICAgICAgICB7Cisg
ICAgICAgICAgICAvKgorICAgICAgICAgICAgICogT24gcHJvY2Vzc29yIGFm
ZmVjdGVkIHdpdGggQ1NWMj0wLCB3b3JrYXJvdW5kIDEgd2lsbCBtaXRpZ2F0
ZQorICAgICAgICAgICAgICogYm90aCBTcGVjdHJlIHYyIGFuZCBCSEIgc28g
dXNlIGl0IHdoZW4gYXZhaWxhYmxlCisgICAgICAgICAgICAgKi8KKyAgICAg
ICAgICAgIGlmICggZW5hYmxlX3NtY2NjX2FyY2hfd29ya2Fyb3VuZF8xKGRh
dGEpICkKKyAgICAgICAgICAgICAgICByZXR1cm4gMTsKKworICAgICAgICAg
ICAgZ290byB3YXJuOworICAgICAgICB9CisKKyAgICAgICAgcmV0dXJuICFp
bnN0YWxsX2JwX2hhcmRlbmluZ192ZWMoZW50cnksX19zbWNjY193b3JrYXJv
dW5kX3NtY19zdGFydF8zLAorICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICBfX3NtY2NjX3dvcmthcm91bmRfc21jX2VuZF8zLAor
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiY2Fs
bCBBUk1fU01DQ0NfQVJDSF9XT1JLQVJPVU5EXzMiKTsKKyAgICB9CisKK3dh
cm46CisgICAgcHJpbnRrX29uY2UoIioqKiogTm8gc3VwcG9ydCBmb3IgYW55
IHNwZWN0cmUgQkhCIHdvcmthcm91bmQuICAqKioqXG4iCisgICAgICAgICAg
ICAgICAgIioqKiogUGxlYXNlIHVwZGF0ZSB5b3VyIGZpcm13YXJlLiAgICAg
ICAgICAgICAgICAqKioqXG4iKTsKKworICAgIHJldHVybiAwOworfQorCiAj
ZW5kaWYgLyogQ09ORklHX0FSTTY0X0hBUkRFTl9CUkFOQ0hfUFJFRElDVE9S
ICovCiAKIC8qIEhhcmRlbmluZyBCcmFuY2ggcHJlZGljdG9yIGNvZGUgZm9y
IEFybTMyICovCkBAIC00NDYsMTkgKzU0Miw3NyBAQCBzdGF0aWMgY29uc3Qg
c3RydWN0IGFybV9jcHVfY2FwYWJpbGl0aWVzIGFybV9lcnJhdGFbXSA9IHsK
ICAgICB9LAogICAgIHsKICAgICAgICAgLmNhcGFiaWxpdHkgPSBBUk1fSEFS
REVOX0JSQU5DSF9QUkVESUNUT1IsCi0gICAgICAgIE1JRFJfQUxMX1ZFUlNJ
T05TKE1JRFJfQ09SVEVYX0E3MiksCisgICAgICAgIE1JRFJfUkFOR0UoTUlE
Ul9DT1JURVhfQTcyLCAwLCAxIDw8IE1JRFJfVkFSSUFOVF9TSElGVCksCiAg
ICAgICAgIC5lbmFibGUgPSBlbmFibGVfc21jY2NfYXJjaF93b3JrYXJvdW5k
XzEsCiAgICAgfSwKICAgICB7Ci0gICAgICAgIC5jYXBhYmlsaXR5ID0gQVJN
X0hBUkRFTl9CUkFOQ0hfUFJFRElDVE9SLAorICAgICAgICAuY2FwYWJpbGl0
eSA9IEFSTV9XT1JLQVJPVU5EX0JIQl9TTUNDXzMsCiAgICAgICAgIE1JRFJf
QUxMX1ZFUlNJT05TKE1JRFJfQ09SVEVYX0E3MyksCi0gICAgICAgIC5lbmFi
bGUgPSBlbmFibGVfc21jY2NfYXJjaF93b3JrYXJvdW5kXzEsCisgICAgICAg
IC5lbmFibGUgPSBlbmFibGVfc3BlY3RyZV9iaGJfd29ya2Fyb3VuZCwKICAg
ICB9LAogICAgIHsKLSAgICAgICAgLmNhcGFiaWxpdHkgPSBBUk1fSEFSREVO
X0JSQU5DSF9QUkVESUNUT1IsCisgICAgICAgIC5jYXBhYmlsaXR5ID0gQVJN
X1dPUktBUk9VTkRfQkhCX1NNQ0NfMywKICAgICAgICAgTUlEUl9BTExfVkVS
U0lPTlMoTUlEUl9DT1JURVhfQTc1KSwKLSAgICAgICAgLmVuYWJsZSA9IGVu
YWJsZV9zbWNjY19hcmNoX3dvcmthcm91bmRfMSwKKyAgICAgICAgLmVuYWJs
ZSA9IGVuYWJsZV9zcGVjdHJlX2JoYl93b3JrYXJvdW5kLAorICAgIH0sCisg
ICAgLyogc3BlY3RyZSBCSEIgKi8KKyAgICB7CisgICAgICAgIC5jYXBhYmls
aXR5ID0gQVJNX1dPUktBUk9VTkRfQkhCX0xPT1BfOCwKKyAgICAgICAgTUlE
Ul9SQU5HRShNSURSX0NPUlRFWF9BNzIsIDEgPDwgTUlEUl9WQVJJQU5UX1NI
SUZULAorICAgICAgICAgICAgICAgICAgIChNSURSX1ZBUklBTlRfTUFTSyB8
IE1JRFJfUkVWSVNJT05fTUFTSykpLAorICAgICAgICAuZW5hYmxlID0gZW5h
YmxlX3NwZWN0cmVfYmhiX3dvcmthcm91bmQsCisgICAgfSwKKyAgICB7Cisg
ICAgICAgIC5jYXBhYmlsaXR5ID0gQVJNX1dPUktBUk9VTkRfQkhCX0xPT1Bf
MjQsCisgICAgICAgIE1JRFJfQUxMX1ZFUlNJT05TKE1JRFJfQ09SVEVYX0E3
NiksCisgICAgICAgIC5lbmFibGUgPSBlbmFibGVfc3BlY3RyZV9iaGJfd29y
a2Fyb3VuZCwKKyAgICB9LAorICAgIHsKKyAgICAgICAgLmNhcGFiaWxpdHkg
PSBBUk1fV09SS0FST1VORF9CSEJfTE9PUF8yNCwKKyAgICAgICAgTUlEUl9B
TExfVkVSU0lPTlMoTUlEUl9DT1JURVhfQTc3KSwKKyAgICAgICAgLmVuYWJs
ZSA9IGVuYWJsZV9zcGVjdHJlX2JoYl93b3JrYXJvdW5kLAorICAgIH0sCisg
ICAgeworICAgICAgICAuY2FwYWJpbGl0eSA9IEFSTV9XT1JLQVJPVU5EX0JI
Ql9MT09QXzMyLAorICAgICAgICBNSURSX0FMTF9WRVJTSU9OUyhNSURSX0NP
UlRFWF9BNzgpLAorICAgICAgICAuZW5hYmxlID0gZW5hYmxlX3NwZWN0cmVf
YmhiX3dvcmthcm91bmQsCisgICAgfSwKKyAgICB7CisgICAgICAgIC5jYXBh
YmlsaXR5ID0gQVJNX1dPUktBUk9VTkRfQkhCX0xPT1BfMzIsCisgICAgICAg
IE1JRFJfQUxMX1ZFUlNJT05TKE1JRFJfQ09SVEVYX0E3OEMpLAorICAgICAg
ICAuZW5hYmxlID0gZW5hYmxlX3NwZWN0cmVfYmhiX3dvcmthcm91bmQsCisg
ICAgfSwKKyAgICB7CisgICAgICAgIC5jYXBhYmlsaXR5ID0gQVJNX1dPUktB
Uk9VTkRfQkhCX0xPT1BfMzIsCisgICAgICAgIE1JRFJfQUxMX1ZFUlNJT05T
KE1JRFJfQ09SVEVYX1gxKSwKKyAgICAgICAgLmVuYWJsZSA9IGVuYWJsZV9z
cGVjdHJlX2JoYl93b3JrYXJvdW5kLAorICAgIH0sCisgICAgeworICAgICAg
ICAuY2FwYWJpbGl0eSA9IEFSTV9XT1JLQVJPVU5EX0JIQl9MT09QXzMyLAor
ICAgICAgICBNSURSX0FMTF9WRVJTSU9OUyhNSURSX0NPUlRFWF9YMiksCisg
ICAgICAgIC5lbmFibGUgPSBlbmFibGVfc3BlY3RyZV9iaGJfd29ya2Fyb3Vu
ZCwKKyAgICB9LAorICAgIHsKKyAgICAgICAgLmNhcGFiaWxpdHkgPSBBUk1f
V09SS0FST1VORF9CSEJfTE9PUF8zMiwKKyAgICAgICAgTUlEUl9BTExfVkVS
U0lPTlMoTUlEUl9DT1JURVhfQTcxMCksCisgICAgICAgIC5lbmFibGUgPSBl
bmFibGVfc3BlY3RyZV9iaGJfd29ya2Fyb3VuZCwKICAgICB9LAorICAgIHsK
KyAgICAgICAgLmNhcGFiaWxpdHkgPSBBUk1fV09SS0FST1VORF9CSEJfTE9P
UF8yNCwKKyAgICAgICAgTUlEUl9BTExfVkVSU0lPTlMoTUlEUl9ORU9WRVJT
RV9OMSksCisgICAgICAgIC5lbmFibGUgPSBlbmFibGVfc3BlY3RyZV9iaGJf
d29ya2Fyb3VuZCwKKyAgICB9LAorICAgIHsKKyAgICAgICAgLmNhcGFiaWxp
dHkgPSBBUk1fV09SS0FST1VORF9CSEJfTE9PUF8zMiwKKyAgICAgICAgTUlE
Ul9BTExfVkVSU0lPTlMoTUlEUl9ORU9WRVJTRV9OMiksCisgICAgICAgIC5l
bmFibGUgPSBlbmFibGVfc3BlY3RyZV9iaGJfd29ya2Fyb3VuZCwKKyAgICB9
LAorICAgIHsKKyAgICAgICAgLmNhcGFiaWxpdHkgPSBBUk1fV09SS0FST1VO
RF9CSEJfTE9PUF8zMiwKKyAgICAgICAgTUlEUl9BTExfVkVSU0lPTlMoTUlE
Ul9ORU9WRVJTRV9WMSksCisgICAgICAgIC5lbmFibGUgPSBlbmFibGVfc3Bl
Y3RyZV9iaGJfd29ya2Fyb3VuZCwKKyAgICB9LAorCiAjZW5kaWYKICNpZmRl
ZiBDT05GSUdfQVJNMzJfSEFSREVOX0JSQU5DSF9QUkVESUNUT1IKICAgICB7
CmRpZmYgLS1naXQgYS94ZW4vYXJjaC9hcm0vaW5jbHVkZS9hc20vYXJtNjQv
bWFjcm9zLmggYi94ZW4vYXJjaC9hcm0vaW5jbHVkZS9hc20vYXJtNjQvbWFj
cm9zLmgKaW5kZXggNWFkNjZlZmQ2YmE0Li4xNDBlMjIzYjRjOTkgMTAwNjQ0
Ci0tLSBhL3hlbi9hcmNoL2FybS9pbmNsdWRlL2FzbS9hcm02NC9tYWNyb3Mu
aAorKysgYi94ZW4vYXJjaC9hcm0vaW5jbHVkZS9hc20vYXJtNjQvbWFjcm9z
LmgKQEAgLTI3LDYgKzI3LDExIEBACiAgICAgICAgIHNiCiAgICAgLmVuZG0K
IAorICAgIC8qIGNsZWFyYmhiIGluc3RydWN0aW9uIGNsZWFyaW5nIHRoZSBi
cmFuY2ggaGlzdG9yeSAqLworICAgIC5tYWNybyBjbGVhcmJoYgorICAgICAg
ICBoaW50ICAgICMyMgorICAgIC5lbmRtCisKIC8qCiAgKiBSZWdpc3RlciBh
bGlhc2VzLgogICovCmRpZmYgLS1naXQgYS94ZW4vYXJjaC9hcm0vaW5jbHVk
ZS9hc20vY3B1ZmVhdHVyZS5oIGIveGVuL2FyY2gvYXJtL2luY2x1ZGUvYXNt
L2NwdWZlYXR1cmUuaAppbmRleCBkYjEyNjUwOGYxNTkuLmY3MzY4NzY2YzA3
YyAxMDA2NDQKLS0tIGEveGVuL2FyY2gvYXJtL2luY2x1ZGUvYXNtL2NwdWZl
YXR1cmUuaAorKysgYi94ZW4vYXJjaC9hcm0vaW5jbHVkZS9hc20vY3B1ZmVh
dHVyZS5oCkBAIC02Myw4ICs2MywxMiBAQAogI2RlZmluZSBBUk02NF9XT1JL
QVJPVU5EX0FUX1NQRUNVTEFURSA5CiAjZGVmaW5lIEFSTV9XT1JLQVJPVU5E
Xzg1ODkyMSAxMAogI2RlZmluZSBBUk02NF9XT1JLQVJPVU5EX1JFUEVBVF9U
TEJJIDExCisjZGVmaW5lIEFSTV9XT1JLQVJPVU5EX0JIQl9MT09QXzggMTIK
KyNkZWZpbmUgQVJNX1dPUktBUk9VTkRfQkhCX0xPT1BfMjQgMTMKKyNkZWZp
bmUgQVJNX1dPUktBUk9VTkRfQkhCX0xPT1BfMzIgMTQKKyNkZWZpbmUgQVJN
X1dPUktBUk9VTkRfQkhCX1NNQ0NfMyAxNQogCi0jZGVmaW5lIEFSTV9OQ0FQ
UyAgICAgICAgICAgMTIKKyNkZWZpbmUgQVJNX05DQVBTICAgICAgICAgICAx
NgogCiAjaWZuZGVmIF9fQVNTRU1CTFlfXwogCmRpZmYgLS1naXQgYS94ZW4v
YXJjaC9hcm0vaW5jbHVkZS9hc20vc21jY2MuaCBiL3hlbi9hcmNoL2FybS9p
bmNsdWRlL2FzbS9zbWNjYy5oCmluZGV4IDlkOTRiZWIzZGYyZC4uYjNkYmVl
Y2M5MGFkIDEwMDY0NAotLS0gYS94ZW4vYXJjaC9hcm0vaW5jbHVkZS9hc20v
c21jY2MuaAorKysgYi94ZW4vYXJjaC9hcm0vaW5jbHVkZS9hc20vc21jY2Mu
aApAQCAtMzM0LDYgKzMzNCwxMiBAQCB2b2lkIF9fYXJtX3NtY2NjXzFfMF9z
bWMocmVnaXN0ZXJfdCBhMCwgcmVnaXN0ZXJfdCBhMSwgcmVnaXN0ZXJfdCBh
MiwKICAgICAgICAgICAgICAgICAgICAgICAgQVJNX1NNQ0NDX09XTkVSX0FS
Q0gsICAgICAgICBcCiAgICAgICAgICAgICAgICAgICAgICAgIDB4N0ZGRikK
IAorI2RlZmluZSBBUk1fU01DQ0NfQVJDSF9XT1JLQVJPVU5EXzNfRklEICAg
ICAgICAgICAgIFwKKyAgICBBUk1fU01DQ0NfQ0FMTF9WQUwoQVJNX1NNQ0ND
X0ZBU1RfQ0FMTCwgICAgICAgICBcCisgICAgICAgICAgICAgICAgICAgICAg
IEFSTV9TTUNDQ19DT05WXzMyLCAgICAgICAgICAgXAorICAgICAgICAgICAg
ICAgICAgICAgICBBUk1fU01DQ0NfT1dORVJfQVJDSCwgICAgICAgIFwKKyAg
ICAgICAgICAgICAgICAgICAgICAgMHgzRkZGKQorCiAvKiBTTUNDQyBlcnJv
ciBjb2RlcyAqLwogI2RlZmluZSBBUk1fU01DQ0NfTk9UX1JFUVVJUkVEICAg
ICAgICAgICgtMikKICNkZWZpbmUgQVJNX1NNQ0NDX0VSUl9VTktOT1dOX0ZV
TkNUSU9OICAoLTEpCg==

--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-5-xen-arm-Allow-to-discover-and-use-SMCCC_ARCH_WORKARO.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream;
 name="xsa398/xsa398-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch"
Content-Disposition: attachment;
 filename="xsa398/xsa398-6-x86-spec-ctrl-Cease-using-thunk-lfence-on-AMD.patch"
Content-Transfer-Encoding: base64
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--=separator--


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 15:18:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 15:18:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292078.496017 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVEMS-0007YF-Ak; Fri, 18 Mar 2022 15:17:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292078.496017; Fri, 18 Mar 2022 15:17:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVEMS-0007Y8-6j; Fri, 18 Mar 2022 15:17:52 +0000
Received: by outflank-mailman (input) for mailman id 292078;
 Fri, 18 Mar 2022 15:17:51 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=krOM=T5=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nVEEk-0003m0-Rk
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 15:09:55 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 76af0077-a6cd-11ec-8eba-a37418f5ba1a;
 Fri, 18 Mar 2022 16:09:53 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id C71D51F390;
 Fri, 18 Mar 2022 15:09:52 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 7F68D13B67;
 Fri, 18 Mar 2022 15:09:52 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id NoXgHcCgNGIHWgAAMHmgww
 (envelope-from <jgross@suse.com>); Fri, 18 Mar 2022 15:09:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 76af0077-a6cd-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647616192; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:  content-transfer-encoding:content-transfer-encoding;
	bh=RxF60QtrY1fK+g68vrfHEjQXsgUXbBosZMnbmksQM/w=;
	b=NH9TcO2niB0Ndeajg0NZtMfFDLtrh3K7bBXW6kn66V1InFoOQ8LrZ0GtCbQ91ZorrjxQ5f
	0Zxj6vFffPG0BjL7fznqUI4/qAjvCCERPrF5kGpUDNFqk4AdFpEFgmEeVeYGZdr2cGozwG
	mT4TQfyrOT/HA8ImsIZR4nULGD5on5M=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org,
	platform-driver-x86@vger.kernel.org,
	linux-kernel@vger.kernel.org,
	Dell.Client.Kernel@dell.com
Cc: Juergen Gross <jgross@suse.com>,
	Stuart Hayes <stuart.w.hayes@gmail.com>,
	Hans de Goede <hdegoede@redhat.com>,
	Mark Gross <markgross@kernel.org>,
	stable@vger.kernel.org
Subject: [PATCH] platform/x86/dell: add buffer allocation/free functions for SMI calls
Date: Fri, 18 Mar 2022 16:09:50 +0100
Message-Id: <20220318150950.16843-1-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

The dcdbas driver is used to call SMI handlers for both, dcdbas and
dell-smbios-smm. Both drivers allocate a buffer for communicating
with the SMI handler. The physical buffer address is then passed to
the called SMI handler via %ebx.

Unfortunately this doesn't work when running in Xen dom0, as the
physical address obtained via virt_to_phys() is only a guest physical
address, and not a machine physical address as needed by SMI.

The problem in dcdbas is easy to correct, as dcdbas is using
dma_alloc_coherent() for allocating the buffer, and the machine
physical address is available via the DMA address returned in the DMA
handle.

In order to avoid duplicating the buffer allocation code in
dell-smbios-smm, add a generic buffer allocation function to dcdbas
and use it for both drivers. This is especially fine regarding driver
dependencies, as dell-smbios-smm is already calling dcdbas to generate
the SMI request.

Cc: stable@vger.kernel.org
Signed-off-by: Juergen Gross <jgross@suse.com>
---
 drivers/platform/x86/dell/dcdbas.c          | 127 +++++++++++---------
 drivers/platform/x86/dell/dcdbas.h          |   9 ++
 drivers/platform/x86/dell/dell-smbios-smm.c |  14 ++-
 3 files changed, 87 insertions(+), 63 deletions(-)

diff --git a/drivers/platform/x86/dell/dcdbas.c b/drivers/platform/x86/dell/dcdbas.c
index 5e63d6225048..02bcac619018 100644
--- a/drivers/platform/x86/dell/dcdbas.c
+++ b/drivers/platform/x86/dell/dcdbas.c
@@ -40,13 +40,10 @@
 
 static struct platform_device *dcdbas_pdev;
 
-static u8 *smi_data_buf;
-static dma_addr_t smi_data_buf_handle;
-static unsigned long smi_data_buf_size;
 static unsigned long max_smi_data_buf_size = MAX_SMI_DATA_BUF_SIZE;
-static u32 smi_data_buf_phys_addr;
 static DEFINE_MUTEX(smi_data_lock);
 static u8 *bios_buffer;
+static struct smi_buffer smi_buf;
 
 static unsigned int host_control_action;
 static unsigned int host_control_smi_type;
@@ -54,23 +51,49 @@ static unsigned int host_control_on_shutdown;
 
 static bool wsmt_enabled;
 
+int dcdbas_smi_alloc(struct smi_buffer *smi_buffer, unsigned long size)
+{
+	smi_buffer->virt = dma_alloc_coherent(&dcdbas_pdev->dev, size,
+					      &smi_buffer->dma, GFP_KERNEL);
+	if (!smi_buffer->virt) {
+		dev_dbg(&dcdbas_pdev->dev,
+			"%s: failed to allocate memory size %lu\n",
+			__func__, size);
+		return -ENOMEM;
+	}
+	smi_buffer->size = size;
+
+	dev_dbg(&dcdbas_pdev->dev, "%s: phys: %x size: %lu\n",
+		__func__, (u32)smi_buffer->dma, smi_buffer->size);
+
+	return 0;
+}
+EXPORT_SYMBOL_GPL(dcdbas_smi_alloc);
+
+void dcdbas_smi_free(struct smi_buffer *smi_buffer)
+{
+	if (!smi_buffer->virt)
+		return;
+
+	dev_dbg(&dcdbas_pdev->dev, "%s: phys: %x size: %lu\n",
+		__func__, (u32)smi_buffer->dma, smi_buffer->size);
+	dma_free_coherent(&dcdbas_pdev->dev, smi_buffer->size,
+			  smi_buffer->virt, smi_buffer->dma);
+	smi_buffer->virt = NULL;
+	smi_buffer->dma = 0;
+	smi_buffer->size = 0;
+}
+EXPORT_SYMBOL_GPL(dcdbas_smi_free);
+
 /**
  * smi_data_buf_free: free SMI data buffer
  */
 static void smi_data_buf_free(void)
 {
-	if (!smi_data_buf || wsmt_enabled)
+	if (!smi_buf.virt || wsmt_enabled)
 		return;
 
-	dev_dbg(&dcdbas_pdev->dev, "%s: phys: %x size: %lu\n",
-		__func__, smi_data_buf_phys_addr, smi_data_buf_size);
-
-	dma_free_coherent(&dcdbas_pdev->dev, smi_data_buf_size, smi_data_buf,
-			  smi_data_buf_handle);
-	smi_data_buf = NULL;
-	smi_data_buf_handle = 0;
-	smi_data_buf_phys_addr = 0;
-	smi_data_buf_size = 0;
+	dcdbas_smi_free(&smi_buf);
 }
 
 /**
@@ -78,39 +101,29 @@ static void smi_data_buf_free(void)
  */
 static int smi_data_buf_realloc(unsigned long size)
 {
-	void *buf;
-	dma_addr_t handle;
+	struct smi_buffer tmp;
+	int ret;
 
-	if (smi_data_buf_size >= size)
+	if (smi_buf.size >= size)
 		return 0;
 
 	if (size > max_smi_data_buf_size)
 		return -EINVAL;
 
 	/* new buffer is needed */
-	buf = dma_alloc_coherent(&dcdbas_pdev->dev, size, &handle, GFP_KERNEL);
-	if (!buf) {
-		dev_dbg(&dcdbas_pdev->dev,
-			"%s: failed to allocate memory size %lu\n",
-			__func__, size);
-		return -ENOMEM;
-	}
-	/* memory zeroed by dma_alloc_coherent */
+	ret = dcdbas_smi_alloc(&tmp, size);
+	if (ret)
+		return ret;
 
-	if (smi_data_buf)
-		memcpy(buf, smi_data_buf, smi_data_buf_size);
+	/* memory zeroed by dma_alloc_coherent */
+	if (smi_buf.virt)
+		memcpy(tmp.virt, smi_buf.virt, smi_buf.size);
 
 	/* free any existing buffer */
 	smi_data_buf_free();
 
 	/* set up new buffer for use */
-	smi_data_buf = buf;
-	smi_data_buf_handle = handle;
-	smi_data_buf_phys_addr = (u32) virt_to_phys(buf);
-	smi_data_buf_size = size;
-
-	dev_dbg(&dcdbas_pdev->dev, "%s: phys: %x size: %lu\n",
-		__func__, smi_data_buf_phys_addr, smi_data_buf_size);
+	smi_buf = tmp;
 
 	return 0;
 }
@@ -119,14 +132,14 @@ static ssize_t smi_data_buf_phys_addr_show(struct device *dev,
 					   struct device_attribute *attr,
 					   char *buf)
 {
-	return sprintf(buf, "%x\n", smi_data_buf_phys_addr);
+	return sprintf(buf, "%x\n", (u32)smi_buf.dma);
 }
 
 static ssize_t smi_data_buf_size_show(struct device *dev,
 				      struct device_attribute *attr,
 				      char *buf)
 {
-	return sprintf(buf, "%lu\n", smi_data_buf_size);
+	return sprintf(buf, "%lu\n", smi_buf.size);
 }
 
 static ssize_t smi_data_buf_size_store(struct device *dev,
@@ -155,8 +168,8 @@ static ssize_t smi_data_read(struct file *filp, struct kobject *kobj,
 	ssize_t ret;
 
 	mutex_lock(&smi_data_lock);
-	ret = memory_read_from_buffer(buf, count, &pos, smi_data_buf,
-					smi_data_buf_size);
+	ret = memory_read_from_buffer(buf, count, &pos, smi_buf.virt,
+					smi_buf.size);
 	mutex_unlock(&smi_data_lock);
 	return ret;
 }
@@ -176,7 +189,7 @@ static ssize_t smi_data_write(struct file *filp, struct kobject *kobj,
 	if (ret)
 		goto out;
 
-	memcpy(smi_data_buf + pos, buf, count);
+	memcpy(smi_buf.virt + pos, buf, count);
 	ret = count;
 out:
 	mutex_unlock(&smi_data_lock);
@@ -306,11 +319,11 @@ static ssize_t smi_request_store(struct device *dev,
 
 	mutex_lock(&smi_data_lock);
 
-	if (smi_data_buf_size < sizeof(struct smi_cmd)) {
+	if (smi_buf.size < sizeof(struct smi_cmd)) {
 		ret = -ENODEV;
 		goto out;
 	}
-	smi_cmd = (struct smi_cmd *)smi_data_buf;
+	smi_cmd = (struct smi_cmd *)smi_buf.virt;
 
 	switch (val) {
 	case 2:
@@ -326,20 +339,20 @@ static ssize_t smi_request_store(struct device *dev,
 		 * Provide physical address of command buffer field within
 		 * the struct smi_cmd to BIOS.
 		 *
-		 * Because the address that smi_cmd (smi_data_buf) points to
+		 * Because the address that smi_cmd (smi_buf.virt) points to
 		 * will be from memremap() of a non-memory address if WSMT
 		 * is present, we can't use virt_to_phys() on smi_cmd, so
 		 * we have to use the physical address that was saved when
 		 * the virtual address for smi_cmd was received.
 		 */
-		smi_cmd->ebx = smi_data_buf_phys_addr +
+		smi_cmd->ebx = (u32)smi_buf.dma +
 				offsetof(struct smi_cmd, command_buffer);
 		ret = dcdbas_smi_request(smi_cmd);
 		if (!ret)
 			ret = count;
 		break;
 	case 0:
-		memset(smi_data_buf, 0, smi_data_buf_size);
+		memset(smi_buf.virt, 0, smi_buf.size);
 		ret = count;
 		break;
 	default:
@@ -356,7 +369,7 @@ EXPORT_SYMBOL(dcdbas_smi_request);
 /**
  * host_control_smi: generate host control SMI
  *
- * Caller must set up the host control command in smi_data_buf.
+ * Caller must set up the host control command in smi_buf.virt.
  */
 static int host_control_smi(void)
 {
@@ -367,14 +380,14 @@ static int host_control_smi(void)
 	s8 cmd_status;
 	u8 index;
 
-	apm_cmd = (struct apm_cmd *)smi_data_buf;
+	apm_cmd = (struct apm_cmd *)smi_buf.virt;
 	apm_cmd->status = ESM_STATUS_CMD_UNSUCCESSFUL;
 
 	switch (host_control_smi_type) {
 	case HC_SMITYPE_TYPE1:
 		spin_lock_irqsave(&rtc_lock, flags);
 		/* write SMI data buffer physical address */
-		data = (u8 *)&smi_data_buf_phys_addr;
+		data = (u8 *)&smi_buf.dma;
 		for (index = PE1300_CMOS_CMD_STRUCT_PTR;
 		     index < (PE1300_CMOS_CMD_STRUCT_PTR + 4);
 		     index++, data++) {
@@ -405,7 +418,7 @@ static int host_control_smi(void)
 	case HC_SMITYPE_TYPE3:
 		spin_lock_irqsave(&rtc_lock, flags);
 		/* write SMI data buffer physical address */
-		data = (u8 *)&smi_data_buf_phys_addr;
+		data = (u8 *)&smi_buf.dma;
 		for (index = PE1400_CMOS_CMD_STRUCT_PTR;
 		     index < (PE1400_CMOS_CMD_STRUCT_PTR + 4);
 		     index++, data++) {
@@ -450,7 +463,7 @@ static int host_control_smi(void)
  * This function is called by the driver after the system has
  * finished shutting down if the user application specified a
  * host control action to perform on shutdown.  It is safe to
- * use smi_data_buf at this point because the system has finished
+ * use smi_buf.virt at this point because the system has finished
  * shutting down and no userspace apps are running.
  */
 static void dcdbas_host_control(void)
@@ -464,18 +477,18 @@ static void dcdbas_host_control(void)
 	action = host_control_action;
 	host_control_action = HC_ACTION_NONE;
 
-	if (!smi_data_buf) {
+	if (!smi_buf.virt) {
 		dev_dbg(&dcdbas_pdev->dev, "%s: no SMI buffer\n", __func__);
 		return;
 	}
 
-	if (smi_data_buf_size < sizeof(struct apm_cmd)) {
+	if (smi_buf.size < sizeof(struct apm_cmd)) {
 		dev_dbg(&dcdbas_pdev->dev, "%s: SMI buffer too small\n",
 			__func__);
 		return;
 	}
 
-	apm_cmd = (struct apm_cmd *)smi_data_buf;
+	apm_cmd = (struct apm_cmd *)smi_buf.virt;
 
 	/* power off takes precedence */
 	if (action & HC_ACTION_HOST_CONTROL_POWEROFF) {
@@ -583,11 +596,11 @@ static int dcdbas_check_wsmt(void)
 		return -ENOMEM;
 	}
 
-	/* First 8 bytes is for a semaphore, not part of the smi_data_buf */
-	smi_data_buf_phys_addr = bios_buf_paddr + 8;
-	smi_data_buf = bios_buffer + 8;
-	smi_data_buf_size = remap_size - 8;
-	max_smi_data_buf_size = smi_data_buf_size;
+	/* First 8 bytes is for a semaphore, not part of the smi_buf.virt */
+	smi_buf.dma = bios_buf_paddr + 8;
+	smi_buf.virt = bios_buffer + 8;
+	smi_buf.size = remap_size - 8;
+	max_smi_data_buf_size = smi_buf.size;
 	wsmt_enabled = true;
 	dev_info(&dcdbas_pdev->dev,
 		 "WSMT found, using firmware-provided SMI buffer.\n");
diff --git a/drivers/platform/x86/dell/dcdbas.h b/drivers/platform/x86/dell/dcdbas.h
index c3cca5433525..942a23ddded0 100644
--- a/drivers/platform/x86/dell/dcdbas.h
+++ b/drivers/platform/x86/dell/dcdbas.h
@@ -105,5 +105,14 @@ struct smm_eps_table {
 	u64 num_of_4k_pages;
 } __packed;
 
+struct smi_buffer {
+	u8 *virt;
+	unsigned long size;
+	dma_addr_t dma;
+};
+
+int dcdbas_smi_alloc(struct smi_buffer *smi_buffer, unsigned long size);
+void dcdbas_smi_free(struct smi_buffer *smi_buffer);
+
 #endif /* _DCDBAS_H_ */
 
diff --git a/drivers/platform/x86/dell/dell-smbios-smm.c b/drivers/platform/x86/dell/dell-smbios-smm.c
index 320c032418ac..4d375985c85f 100644
--- a/drivers/platform/x86/dell/dell-smbios-smm.c
+++ b/drivers/platform/x86/dell/dell-smbios-smm.c
@@ -20,6 +20,7 @@
 
 static int da_command_address;
 static int da_command_code;
+static struct smi_buffer smi_buf;
 static struct calling_interface_buffer *buffer;
 static struct platform_device *platform_device;
 static DEFINE_MUTEX(smm_mutex);
@@ -57,7 +58,7 @@ static int dell_smbios_smm_call(struct calling_interface_buffer *input)
 	command.magic = SMI_CMD_MAGIC;
 	command.command_address = da_command_address;
 	command.command_code = da_command_code;
-	command.ebx = virt_to_phys(buffer);
+	command.ebx = smi_buf.dma;
 	command.ecx = 0x42534931;
 
 	mutex_lock(&smm_mutex);
@@ -101,9 +102,10 @@ int init_dell_smbios_smm(void)
 	 * Allocate buffer below 4GB for SMI data--only 32-bit physical addr
 	 * is passed to SMI handler.
 	 */
-	buffer = (void *)__get_free_page(GFP_KERNEL | GFP_DMA32);
-	if (!buffer)
-		return -ENOMEM;
+	ret = dcdbas_smi_alloc(&smi_buf, PAGE_SIZE);
+	if (ret)
+		return ret;
+	buffer = (void *)smi_buf.virt;
 
 	dmi_walk(find_cmd_address, NULL);
 
@@ -138,7 +140,7 @@ int init_dell_smbios_smm(void)
 
 fail_wsmt:
 fail_platform_device_alloc:
-	free_page((unsigned long)buffer);
+	dcdbas_smi_free(&smi_buf);
 	return ret;
 }
 
@@ -147,6 +149,6 @@ void exit_dell_smbios_smm(void)
 	if (platform_device) {
 		dell_smbios_unregister_device(&platform_device->dev);
 		platform_device_unregister(platform_device);
-		free_page((unsigned long)buffer);
+		dcdbas_smi_free(&smi_buf);
 	}
 }
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 18 15:21:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 15:21:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292095.496027 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVEQG-0000Xa-Pu; Fri, 18 Mar 2022 15:21:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292095.496027; Fri, 18 Mar 2022 15:21:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVEQG-0000XT-N6; Fri, 18 Mar 2022 15:21:48 +0000
Received: by outflank-mailman (input) for mailman id 292095;
 Fri, 18 Mar 2022 15:21:47 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Gqp6=T5=citrix.com=prvs=069a58476=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nVEQF-0000XN-LB
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 15:21:47 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 1e93b109-a6cf-11ec-853c-5f4723681683;
 Fri, 18 Mar 2022 16:21:46 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1e93b109-a6cf-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647616906;
  h=date:from:to:cc:subject:message-id:references:
   mime-version:in-reply-to;
  bh=5bD51oc3fFHUmBMRLA7q9xjq+GlAdyO24wqP8e+Xkck=;
  b=Up1J4+p92kvHLzHdRYcsFWpHXnFPB8QUYtX+dOln7ZsZe9S7qupLV8vu
   XM0h3soG+l/YuoSyQIGDPcqiuOnB7hfL+ghQXsfxFFQ+C0dCtx4RzIaw3
   etXqP7A9J0Z7LJqKz2i3bT01SbzVHXgY+d7m3bUqwMTDOGz5cY5RHejzQ
   M=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 66611436
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:3tr3CKMpj3DW0FjvrR1zl8FynXyQoLVcMsEvi/4bfWQNrUpxhmRTz
 WIcXjyFPv6KZmv3KNpxbY+2p0gD7Z/UzoVmGgto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi294w27BVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Zm
 I9p7p+QdloTb6CPpPksV1pJEDNhBPgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALJc/3PIQZqzd4wCvQF/oOSpHfWaTao9Rf2V/cg+gQQ6iHP
 pZCN1KDajzlO0VdYQc9OakbwvX3mGX9QyYf80mK8P9fD2/7k1UqjemF3MDuUsOObdVYmACfv
 G2u1270GA0APdqTjz+M6Guxh/TnlDn+HokVEdWQ7eJnjlSVwSoIFBQcWF+/oP+4ol6/X9NZO
 wof/S9GhbMp6EWhQ935Xhu5iH2JpBgRX5xXCeJSwBGAzO/Y7hiUAkAATyVdc5o2uckuXzso2
 1SV2dTzClRHu7SPRXWQ3rydtz+1NG4eKmpqWMMfZVJbuZ+5+th110+RCIY4eEKosjHrMWGq5
 2uJjBdjveQezvIW5qH47FPVnAv58/AlUTUJzgnQW2uk6CZwa4ike5Gk5DDn0BpQEGqKZgLf5
 SZZwqBy+MhLVMjQz3LVHI3hCZnzv5643CvgbUmD9nXL3xCk4DadcI9Z+1mSz285Y59fKVcFj
 KI+0D69BaO/3lP3NcebgKrrUqzGKJQM8/y/Dpg4ifIUPvBMmPevpn0GWKJp9zmFfLIQua8+I
 4yHVs2nEGwXD69qpBLvGbtCjOFyn3tmmDuKLXwe8/hB+eDCDJJyYe1YWGZik8hjtP/UyOkr2
 4s32zS2J+V3D7SlP3i/HX87JlEWN3krba0aWOQMHtNv1jFOQTl7Y9eImOtJU9U8w8x9y7eZl
 lngCxQw4Aeu2hX6xfCiNykLhEXHBs0k8xrW/EUEYD6V5pTUSd32vflFKMdvI+VPGS4K5accc
 sTpsv6oWpxnIgkrMRxEM8KVQFBKHPhzuT+zAg==
IronPort-HdrOrdr: A9a23:RVDf1K5srncOmfgo7QPXwMjXdLJyesId70hD6qhwISY6TiW9rb
 HLoB17726QtN9/YhwdcLy7VJVoBEmskqKdgrNhX4tKPjOHhILAFugLhuHfKn/bak7DH4ZmpM
 FdmsNFaeEYY2IUsfrH
X-IronPort-AV: E=Sophos;i="5.90,192,1643691600"; 
   d="scan'208";a="66611436"
Date: Fri, 18 Mar 2022 15:20:59 +0000
From: Anthony PERARD <anthony.perard@citrix.com>
To: Stefano Stabellini <sstabellini@kernel.org>
CC: <xen-devel@lists.xenproject.org>, <cardoe@cardoe.com>, <wl@xen.org>,
	<andrew.cooper3@citrix.com>, <bertrand.marquis@arm.com>, Stefano Stabellini
	<stefano.stabellini@xilinx.com>
Subject: Re: [PATCH v2 1/2] gitlab-ci: add qemu-system-arm to the existing
 tests-artifacts container
Message-ID: <YjSjW/4dnQXqW65V@perard.uk.xensource.com>
References: <alpine.DEB.2.22.394.2203161843230.3497@ubuntu-linux-20-04-desktop>
 <20220317014653.2427386-1-sstabellini@kernel.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <20220317014653.2427386-1-sstabellini@kernel.org>

On Wed, Mar 16, 2022 at 06:46:52PM -0700, Stefano Stabellini wrote:
> +qemu-system-aarch64-6.0.0-arm32-export:
> +  stage: build
> +  image: registry.gitlab.com/xen-project/xen/tests-artifacts/qemu-system-aarch64:6.0.0-arm64v8
> +  script:
> +    - mkdir binaries && cp /qemu-system-arm binaries/qemu-system-arm
> +  artifacts:
> +    paths:
> +      - binaries/qemu-system-arm
> +  tags:
> +    - arm64
>  

I wonder whether there's a better way to make available these kind of
test artifacts than using containers. But I don't have a good answer for
now.

Anyway, the patch looks good enough:
Reviewed-by: Anthony PERARD <anthony.perard@citrix.com>

Thanks,

-- 
Anthony PERARD


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 15:22:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 15:22:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292098.496039 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVEQr-00014e-2H; Fri, 18 Mar 2022 15:22:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292098.496039; Fri, 18 Mar 2022 15:22:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVEQq-00014X-VL; Fri, 18 Mar 2022 15:22:24 +0000
Received: by outflank-mailman (input) for mailman id 292098;
 Fri, 18 Mar 2022 15:22:23 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=QOyl=T5=aculab.com=david.laight@srs-se1.protection.inumbo.net>)
 id 1nVEQp-00014H-QO
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 15:22:23 +0000
Received: from eu-smtp-delivery-151.mimecast.com
 (eu-smtp-delivery-151.mimecast.com [185.58.85.151])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 353bee1c-a6cf-11ec-853c-5f4723681683;
 Fri, 18 Mar 2022 16:22:22 +0100 (CET)
Received: from AcuMS.aculab.com (156.67.243.121 [156.67.243.121]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id
 uk-mta-150-J-EB7TRUPCa955UakG2Ikg-1; Fri, 18 Mar 2022 15:22:20 +0000
Received: from AcuMS.Aculab.com (fd9f:af1c:a25b:0:994c:f5c2:35d6:9b65) by
 AcuMS.aculab.com (fd9f:af1c:a25b:0:994c:f5c2:35d6:9b65) with Microsoft SMTP
 Server (TLS) id 15.0.1497.32; Fri, 18 Mar 2022 15:22:20 +0000
Received: from AcuMS.Aculab.com ([fe80::994c:f5c2:35d6:9b65]) by
 AcuMS.aculab.com ([fe80::994c:f5c2:35d6:9b65%12]) with mapi id
 15.00.1497.033; Fri, 18 Mar 2022 15:22:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 353bee1c-a6cf-11ec-853c-5f4723681683
X-MC-Unique: J-EB7TRUPCa955UakG2Ikg-1
From: David Laight <David.Laight@ACULAB.COM>
To: 'Juergen Gross' <jgross@suse.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>, "platform-driver-x86@vger.kernel.org"
	<platform-driver-x86@vger.kernel.org>, "linux-kernel@vger.kernel.org"
	<linux-kernel@vger.kernel.org>, "Dell.Client.Kernel@dell.com"
	<Dell.Client.Kernel@dell.com>
CC: Stuart Hayes <stuart.w.hayes@gmail.com>, Hans de Goede
	<hdegoede@redhat.com>, Mark Gross <markgross@kernel.org>,
	"stable@vger.kernel.org" <stable@vger.kernel.org>
Subject: RE: [PATCH] platform/x86/dell: add buffer allocation/free functions
 for SMI calls
Thread-Topic: [PATCH] platform/x86/dell: add buffer allocation/free functions
 for SMI calls
Thread-Index: AQHYOto/hyLOp/NEJ0S+JLWvPC30KazFQPKg
Date: Fri, 18 Mar 2022 15:22:19 +0000
Message-ID: <accf95548a8c4374b17c159b9b2d0098@AcuMS.aculab.com>
References: <20220318150950.16843-1-jgross@suse.com>
In-Reply-To: <20220318150950.16843-1-jgross@suse.com>
Accept-Language: en-GB, en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.202.205.107]
MIME-Version: 1.0
Authentication-Results: relay.mimecast.com;
	auth=pass smtp.auth=C51A453 smtp.mailfrom=david.laight@aculab.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: aculab.com
Content-Language: en-US
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

From: Juergen Gross
> Sent: 18 March 2022 15:10
>=20
> The dcdbas driver is used to call SMI handlers for both, dcdbas and
> dell-smbios-smm. Both drivers allocate a buffer for communicating
> with the SMI handler. The physical buffer address is then passed to
> the called SMI handler via %ebx.
>=20
> Unfortunately this doesn't work when running in Xen dom0, as the
> physical address obtained via virt_to_phys() is only a guest physical
> address, and not a machine physical address as needed by SMI.

The physical address from virt_to_phy() is always wrong.
That is the physical address the cpu has for the memory.
What you want is the address the dma master interface needs to use.
That can be different for a physical system - no need for virtualisation.

On x86 they do usually match, but anything with a full iommu
will need completely different addresses.

=09David

-
Registered Address Lakeside, Bramley Road, Mount Farm, Milton Keynes, MK1 1=
PT, UK
Registration No: 1397386 (Wales)



From xen-devel-bounces@lists.xenproject.org Fri Mar 18 15:26:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 15:26:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292102.496057 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVEUH-0001og-VC; Fri, 18 Mar 2022 15:25:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292102.496057; Fri, 18 Mar 2022 15:25:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVEUH-0001nG-Mn; Fri, 18 Mar 2022 15:25:57 +0000
Received: by outflank-mailman (input) for mailman id 292102;
 Fri, 18 Mar 2022 15:25:56 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=VNnc=T5=arm.com=luca.fancellu@srs-se1.protection.inumbo.net>)
 id 1nVEUG-0001ka-HI
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 15:25:56 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTP
 id b2fd6c65-a6cf-11ec-853c-5f4723681683;
 Fri, 18 Mar 2022 16:25:53 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id BEA9E1515;
 Fri, 18 Mar 2022 08:25:52 -0700 (PDT)
Received: from e125770.cambridge.arm.com (e125770.cambridge.arm.com
 [10.1.195.16])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 1E7D93F7D7;
 Fri, 18 Mar 2022 08:25:51 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b2fd6c65-a6cf-11ec-853c-5f4723681683
From: Luca Fancellu <luca.fancellu@arm.com>
To: xen-devel@lists.xenproject.org
Cc: bertrand.marquis@arm.com,
	wei.chen@arm.com,
	Wei Liu <wl@xen.org>,
	Anthony PERARD <anthony.perard@citrix.com>,
	Juergen Gross <jgross@suse.com>,
	Dario Faggioli <dfaggioli@suse.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH v3 0/6] Boot time cpupools
Date: Fri, 18 Mar 2022 15:25:35 +0000
Message-Id: <20220318152541.7460-1-luca.fancellu@arm.com>
X-Mailer: git-send-email 2.17.1

This serie introduces a feature for Xen to create cpu pools at boot time, the
feature is enabled using a configurable that is disabled by default.
The boot time cpupool feature relies on the device tree to describe the cpu
pools.
Another feature is introduced by the serie, the possibility to assign a
dom0less guest to a cpupool at boot time.

Here follows an example, Xen is built with CONFIG_BOOT_TIME_CPUPOOLS=y.

>From the DT:

  [...]

  a72_0: cpu@0 {
    compatible = "arm,cortex-a72";
    reg = <0x0 0x0>;
    device_type = "cpu";
    [...]
  };

  a72_1: cpu@1 {
    compatible = "arm,cortex-a72";
    reg = <0x0 0x1>;
    device_type = "cpu";
    [...]
  };

  a53_0: cpu@100 {
    compatible = "arm,cortex-a53";
    reg = <0x0 0x100>;
    device_type = "cpu";
    [...]
  };

  a53_1: cpu@101 {
    compatible = "arm,cortex-a53";
    reg = <0x0 0x101>;
    device_type = "cpu";
    [...]
  };

  a53_2: cpu@102 {
    compatible = "arm,cortex-a53";
    reg = <0x0 0x102>;
    device_type = "cpu";
    [...]
  };

  a53_3: cpu@103 {
    compatible = "arm,cortex-a53";
    reg = <0x0 0x103>;
    device_type = "cpu";
    [...]
  };

  chosen {
    #size-cells = <0x1>;
    #address-cells = <0x1>;
    xen,dom0-bootargs = "...";
    xen,xen-bootargs = "...";

    cpupool0 {
      compatible = "xen,cpupool";
      cpupool-cpus = <&a72_0 &a72_1>;
      cpupool-sched = "credit2";
    };

    cp1: cpupool1 {
      compatible = "xen,cpupool";
      cpupool-cpus = <&a53_0 &a53_1 &a53_2 &a53_3>;
    };

    module@0 {
      reg = <0x80080000 0x1300000>;
      compatible = "multiboot,module";
    };

    domU1 {
      #size-cells = <0x1>;
      #address-cells = <0x1>;
      compatible = "xen,domain";
      cpus = <1>;
      memory = <0 0xC0000>;
      vpl011;
      domain-cpupool = <&cp1>;

      module@92000000 {
        compatible = "multiboot,kernel", "multiboot,module";
        reg = <0x92000000 0x1ffffff>;
        bootargs = "...";
      };
    };
  };

  [...]

The example DT is instructing Xen to have two cpu pools, the one with id 0
having two phisical cpus and the one with id 1 having 4 phisical cpu, the
second cpu pool uses the null scheduler and from the /chosen node we can see
that a dom0less guest will be started on that cpu pool.

In this particular case Xen must boot with different type of cpus, so the
boot argument hmp_unsafe must be enabled.


Luca Fancellu (6):
  tools/cpupools: Give a name to unnamed cpupools
  xen/sched: create public function for cpupools creation
  xen/sched: retrieve scheduler id by name
  xen/cpupool: Create different cpupools at boot time
  arm/dom0less: assign dom0less guests to cpupools
  xen/cpupool: Allow cpupool0 to use different scheduler

 docs/misc/arm/device-tree/booting.txt  |   5 +
 docs/misc/arm/device-tree/cpupools.txt | 135 ++++++++++++++++
 tools/helpers/xen-init-dom0.c          |  35 ++++-
 tools/libs/light/libxl_utils.c         |   3 +-
 xen/arch/arm/domain_build.c            |  14 +-
 xen/arch/arm/include/asm/smp.h         |   3 +
 xen/common/Kconfig                     |   7 +
 xen/common/Makefile                    |   1 +
 xen/common/boot_cpupools.c             | 205 +++++++++++++++++++++++++
 xen/common/domain.c                    |   2 +-
 xen/common/sched/core.c                |  40 +++--
 xen/common/sched/cpupool.c             |  32 +++-
 xen/include/public/domctl.h            |   4 +-
 xen/include/xen/sched.h                |  58 +++++++
 14 files changed, 516 insertions(+), 28 deletions(-)
 create mode 100644 docs/misc/arm/device-tree/cpupools.txt
 create mode 100644 xen/common/boot_cpupools.c

-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 18 15:26:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 15:26:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292103.496062 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVEUI-0001wH-7y; Fri, 18 Mar 2022 15:25:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292103.496062; Fri, 18 Mar 2022 15:25:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVEUI-0001tF-0x; Fri, 18 Mar 2022 15:25:58 +0000
Received: by outflank-mailman (input) for mailman id 292103;
 Fri, 18 Mar 2022 15:25:57 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=VNnc=T5=arm.com=luca.fancellu@srs-se1.protection.inumbo.net>)
 id 1nVEUH-0001kl-Am
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 15:25:57 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id b49b473d-a6cf-11ec-8eba-a37418f5ba1a;
 Fri, 18 Mar 2022 16:25:56 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 8B0021576;
 Fri, 18 Mar 2022 08:25:55 -0700 (PDT)
Received: from e125770.cambridge.arm.com (e125770.cambridge.arm.com
 [10.1.195.16])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 1A9AF3F7D7;
 Fri, 18 Mar 2022 08:25:53 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b49b473d-a6cf-11ec-8eba-a37418f5ba1a
From: Luca Fancellu <luca.fancellu@arm.com>
To: xen-devel@lists.xenproject.org
Cc: bertrand.marquis@arm.com,
	wei.chen@arm.com,
	Juergen Gross <jgross@suse.com>,
	Dario Faggioli <dfaggioli@suse.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>
Subject: [PATCH v3 2/6] xen/sched: create public function for cpupools creation
Date: Fri, 18 Mar 2022 15:25:37 +0000
Message-Id: <20220318152541.7460-3-luca.fancellu@arm.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220318152541.7460-1-luca.fancellu@arm.com>
References: <20220318152541.7460-1-luca.fancellu@arm.com>

Create new public function to create cpupools, can take as parameter
the scheduler id or a negative value that means the default Xen
scheduler will be used.

Signed-off-by: Luca Fancellu <luca.fancellu@arm.com>
---
Changes in v3:
- Fixed comment (Andrew)
Changes in v2:
- cpupool_create_pool doesn't check anymore for pool id uniqueness
  before calling cpupool_create. Modified commit message accordingly
---
 xen/common/sched/cpupool.c | 15 +++++++++++++++
 xen/include/xen/sched.h    | 16 ++++++++++++++++
 2 files changed, 31 insertions(+)

diff --git a/xen/common/sched/cpupool.c b/xen/common/sched/cpupool.c
index a6da4970506a..89a891af7076 100644
--- a/xen/common/sched/cpupool.c
+++ b/xen/common/sched/cpupool.c
@@ -1219,6 +1219,21 @@ static void cpupool_hypfs_init(void)
 
 #endif /* CONFIG_HYPFS */
 
+struct cpupool *__init cpupool_create_pool(unsigned int pool_id, int sched_id)
+{
+    struct cpupool *pool;
+
+    if ( sched_id < 0 )
+        sched_id = scheduler_get_default()->sched_id;
+
+    pool = cpupool_create(pool_id, sched_id);
+
+    BUG_ON(IS_ERR(pool));
+    cpupool_put(pool);
+
+    return pool;
+}
+
 static int __init cf_check cpupool_init(void)
 {
     unsigned int cpu;
diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
index 10ea969c7af9..415b939ba8ae 100644
--- a/xen/include/xen/sched.h
+++ b/xen/include/xen/sched.h
@@ -1145,6 +1145,22 @@ int cpupool_move_domain(struct domain *d, struct cpupool *c);
 int cpupool_do_sysctl(struct xen_sysctl_cpupool_op *op);
 unsigned int cpupool_get_id(const struct domain *d);
 const cpumask_t *cpupool_valid_cpus(const struct cpupool *pool);
+
+/*
+ * cpupool_create_pool - Creates a cpupool
+ * @pool_id: id of the pool to be created
+ * @sched_id: id of the scheduler to be used for the pool
+ *
+ * Creates a cpupool with pool_id id.
+ * The sched_id parameter identifies the scheduler to be used, if it is
+ * negative, the default scheduler of Xen will be used.
+ *
+ * returns:
+ *     pointer to the struct cpupool just created, or Xen will panic in case of
+ *     error
+ */
+struct cpupool *cpupool_create_pool(unsigned int pool_id, int sched_id);
+
 extern void cf_check dump_runq(unsigned char key);
 
 void arch_do_physinfo(struct xen_sysctl_physinfo *pi);
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 18 15:26:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 15:26:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292101.496050 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVEUH-0001kx-Hy; Fri, 18 Mar 2022 15:25:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292101.496050; Fri, 18 Mar 2022 15:25:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVEUH-0001kq-ET; Fri, 18 Mar 2022 15:25:57 +0000
Received: by outflank-mailman (input) for mailman id 292101;
 Fri, 18 Mar 2022 15:25:55 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=VNnc=T5=arm.com=luca.fancellu@srs-se1.protection.inumbo.net>)
 id 1nVEUF-0001ka-OP
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 15:25:55 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTP
 id b389e5d1-a6cf-11ec-853c-5f4723681683;
 Fri, 18 Mar 2022 16:25:54 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id D70801570;
 Fri, 18 Mar 2022 08:25:53 -0700 (PDT)
Received: from e125770.cambridge.arm.com (e125770.cambridge.arm.com
 [10.1.195.16])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id F21FF3F7D7;
 Fri, 18 Mar 2022 08:25:52 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b389e5d1-a6cf-11ec-853c-5f4723681683
From: Luca Fancellu <luca.fancellu@arm.com>
To: xen-devel@lists.xenproject.org
Cc: bertrand.marquis@arm.com,
	wei.chen@arm.com,
	Wei Liu <wl@xen.org>,
	Anthony PERARD <anthony.perard@citrix.com>,
	Juergen Gross <jgross@suse.com>
Subject: [PATCH v3 1/6] tools/cpupools: Give a name to unnamed cpupools
Date: Fri, 18 Mar 2022 15:25:36 +0000
Message-Id: <20220318152541.7460-2-luca.fancellu@arm.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220318152541.7460-1-luca.fancellu@arm.com>
References: <20220318152541.7460-1-luca.fancellu@arm.com>

With the introduction of boot time cpupools, Xen can create many
different cpupools at boot time other than cpupool with id 0.

Since these newly created cpupools can't have an
entry in Xenstore, create the entry using xen-init-dom0
helper with the usual convention: Pool-<cpupool id>.

Given the change, remove the check for poolid == 0 from
libxl_cpupoolid_to_name(...).

Signed-off-by: Luca Fancellu <luca.fancellu@arm.com>
Reviewed-by: Juergen Gross <jgross@suse.com>
---
Changes in v3:
- no changes, add R-by
Changes in v2:
 - Remove unused variable, moved xc_cpupool_infofree
   ahead to simplify the code, use asprintf (Juergen)
---
 tools/helpers/xen-init-dom0.c  | 35 +++++++++++++++++++++++++++++++++-
 tools/libs/light/libxl_utils.c |  3 +--
 2 files changed, 35 insertions(+), 3 deletions(-)

diff --git a/tools/helpers/xen-init-dom0.c b/tools/helpers/xen-init-dom0.c
index c99224a4b607..84286617790f 100644
--- a/tools/helpers/xen-init-dom0.c
+++ b/tools/helpers/xen-init-dom0.c
@@ -43,7 +43,9 @@ int main(int argc, char **argv)
     int rc;
     struct xs_handle *xsh = NULL;
     xc_interface *xch = NULL;
-    char *domname_string = NULL, *domid_string = NULL;
+    char *domname_string = NULL, *domid_string = NULL, *pool_path, *pool_name;
+    xc_cpupoolinfo_t *xcinfo;
+    unsigned int pool_id = 0;
     libxl_uuid uuid;
 
     /* Accept 0 or 1 argument */
@@ -114,6 +116,37 @@ int main(int argc, char **argv)
         goto out;
     }
 
+    /* Create an entry in xenstore for each cpupool on the system */
+    do {
+        xcinfo = xc_cpupool_getinfo(xch, pool_id);
+        if (xcinfo != NULL) {
+            if (xcinfo->cpupool_id != pool_id)
+                pool_id = xcinfo->cpupool_id;
+            xc_cpupool_infofree(xch, xcinfo);
+            if (asprintf(&pool_path, "/local/pool/%d/name", pool_id) <= 0) {
+                fprintf(stderr, "cannot allocate memory for pool path\n");
+                rc = 1;
+                goto out;
+            }
+            if (asprintf(&pool_name, "Pool-%d", pool_id) <= 0) {
+                fprintf(stderr, "cannot allocate memory for pool name\n");
+                rc = 1;
+                goto out_err;
+            }
+            pool_id++;
+            if (!xs_write(xsh, XBT_NULL, pool_path, pool_name,
+                          strlen(pool_name))) {
+                fprintf(stderr, "cannot set pool name\n");
+                rc = 1;
+            }
+            free(pool_name);
+out_err:
+            free(pool_path);
+            if ( rc )
+                goto out;
+        }
+    } while(xcinfo != NULL);
+
     printf("Done setting up Dom0\n");
 
 out:
diff --git a/tools/libs/light/libxl_utils.c b/tools/libs/light/libxl_utils.c
index b91c2cafa223..81780da3ff40 100644
--- a/tools/libs/light/libxl_utils.c
+++ b/tools/libs/light/libxl_utils.c
@@ -151,8 +151,7 @@ char *libxl_cpupoolid_to_name(libxl_ctx *ctx, uint32_t poolid)
 
     snprintf(path, sizeof(path), "/local/pool/%d/name", poolid);
     s = xs_read(ctx->xsh, XBT_NULL, path, &len);
-    if (!s && (poolid == 0))
-        return strdup("Pool-0");
+
     return s;
 }
 
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 18 15:26:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 15:26:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292104.496082 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVEUK-0002YU-Kt; Fri, 18 Mar 2022 15:26:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292104.496082; Fri, 18 Mar 2022 15:26:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVEUK-0002YC-HT; Fri, 18 Mar 2022 15:26:00 +0000
Received: by outflank-mailman (input) for mailman id 292104;
 Fri, 18 Mar 2022 15:25:59 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=VNnc=T5=arm.com=luca.fancellu@srs-se1.protection.inumbo.net>)
 id 1nVEUI-0001ka-RN
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 15:25:58 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTP
 id b58755b9-a6cf-11ec-853c-5f4723681683;
 Fri, 18 Mar 2022 16:25:57 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 1CBF01515;
 Fri, 18 Mar 2022 08:25:57 -0700 (PDT)
Received: from e125770.cambridge.arm.com (e125770.cambridge.arm.com
 [10.1.195.16])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id C08113F7D7;
 Fri, 18 Mar 2022 08:25:55 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b58755b9-a6cf-11ec-853c-5f4723681683
From: Luca Fancellu <luca.fancellu@arm.com>
To: xen-devel@lists.xenproject.org
Cc: bertrand.marquis@arm.com,
	wei.chen@arm.com,
	George Dunlap <george.dunlap@citrix.com>,
	Dario Faggioli <dfaggioli@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>
Subject: [PATCH v3 3/6] xen/sched: retrieve scheduler id by name
Date: Fri, 18 Mar 2022 15:25:38 +0000
Message-Id: <20220318152541.7460-4-luca.fancellu@arm.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220318152541.7460-1-luca.fancellu@arm.com>
References: <20220318152541.7460-1-luca.fancellu@arm.com>

Add a static function to retrieve the scheduler pointer using the
scheduler name.

Add a public function to retrieve the scheduler id by the scheduler
name that makes use of the new static function.

Take the occasion to replace open coded scheduler search with the
new static function in scheduler_init.

Signed-off-by: Luca Fancellu <luca.fancellu@arm.com>
Reviewed-by: Juergen Gross <jgross@suse.com>
---
Changes in v3:
- add R-by
Changes in v2:
- replace open coded scheduler search in scheduler_init (Juergen)
---
 xen/common/sched/core.c | 40 ++++++++++++++++++++++++++--------------
 xen/include/xen/sched.h | 11 +++++++++++
 2 files changed, 37 insertions(+), 14 deletions(-)

diff --git a/xen/common/sched/core.c b/xen/common/sched/core.c
index 19ab67818106..48ee01420fb8 100644
--- a/xen/common/sched/core.c
+++ b/xen/common/sched/core.c
@@ -2947,10 +2947,30 @@ void scheduler_enable(void)
     scheduler_active = true;
 }
 
+static inline
+const struct scheduler *__init sched_get_by_name(const char *sched_name)
+{
+    unsigned int i;
+
+    for ( i = 0; i < NUM_SCHEDULERS; i++ )
+        if ( schedulers[i] && !strcmp(schedulers[i]->opt_name, sched_name) )
+            return schedulers[i];
+
+    return NULL;
+}
+
+int __init sched_get_id_by_name(const char *sched_name)
+{
+    const struct scheduler *scheduler = sched_get_by_name(sched_name);
+
+    return scheduler ? scheduler->sched_id : -1;
+}
+
 /* Initialise the data structures. */
 void __init scheduler_init(void)
 {
     struct domain *idle_domain;
+    const struct scheduler *scheduler;
     int i;
 
     scheduler_enable();
@@ -2981,25 +3001,17 @@ void __init scheduler_init(void)
                    schedulers[i]->opt_name);
             schedulers[i] = NULL;
         }
-
-        if ( schedulers[i] && !ops.name &&
-             !strcmp(schedulers[i]->opt_name, opt_sched) )
-            ops = *schedulers[i];
     }
 
-    if ( !ops.name )
+    scheduler = sched_get_by_name(opt_sched);
+    if ( !scheduler )
     {
         printk("Could not find scheduler: %s\n", opt_sched);
-        for ( i = 0; i < NUM_SCHEDULERS; i++ )
-            if ( schedulers[i] &&
-                 !strcmp(schedulers[i]->opt_name, CONFIG_SCHED_DEFAULT) )
-            {
-                ops = *schedulers[i];
-                break;
-            }
-        BUG_ON(!ops.name);
-        printk("Using '%s' (%s)\n", ops.name, ops.opt_name);
+        scheduler = sched_get_by_name(CONFIG_SCHED_DEFAULT);
+        BUG_ON(!scheduler);
+        printk("Using '%s' (%s)\n", scheduler->name, scheduler->opt_name);
     }
+    ops = *scheduler;
 
     if ( cpu_schedule_up(0) )
         BUG();
diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
index 415b939ba8ae..4050e22544f9 100644
--- a/xen/include/xen/sched.h
+++ b/xen/include/xen/sched.h
@@ -756,6 +756,17 @@ void sched_destroy_domain(struct domain *d);
 long sched_adjust(struct domain *, struct xen_domctl_scheduler_op *);
 long sched_adjust_global(struct xen_sysctl_scheduler_op *);
 int  sched_id(void);
+
+/*
+ * sched_get_id_by_name - retrieves a scheduler id given a scheduler name
+ * @sched_name: scheduler name as a string
+ *
+ * returns:
+ *     positive value being the scheduler id, on success
+ *     negative value if the scheduler name is not found.
+ */
+int sched_get_id_by_name(const char *sched_name);
+
 void vcpu_wake(struct vcpu *v);
 long vcpu_yield(void);
 void vcpu_sleep_nosync(struct vcpu *v);
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 18 15:26:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 15:26:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292105.496094 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVEUN-0002sC-0Y; Fri, 18 Mar 2022 15:26:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292105.496094; Fri, 18 Mar 2022 15:26:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVEUM-0002s1-Ru; Fri, 18 Mar 2022 15:26:02 +0000
Received: by outflank-mailman (input) for mailman id 292105;
 Fri, 18 Mar 2022 15:26:01 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=VNnc=T5=arm.com=luca.fancellu@srs-se1.protection.inumbo.net>)
 id 1nVEUL-0001kl-8l
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 15:26:01 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id b6a60354-a6cf-11ec-8eba-a37418f5ba1a;
 Fri, 18 Mar 2022 16:25:59 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id F37451570;
 Fri, 18 Mar 2022 08:25:58 -0700 (PDT)
Received: from e125770.cambridge.arm.com (e125770.cambridge.arm.com
 [10.1.195.16])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 535CD3F7D7;
 Fri, 18 Mar 2022 08:25:57 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b6a60354-a6cf-11ec-8eba-a37418f5ba1a
From: Luca Fancellu <luca.fancellu@arm.com>
To: xen-devel@lists.xenproject.org
Cc: bertrand.marquis@arm.com,
	wei.chen@arm.com,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>,
	Juergen Gross <jgross@suse.com>,
	Dario Faggioli <dfaggioli@suse.com>
Subject: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot time
Date: Fri, 18 Mar 2022 15:25:39 +0000
Message-Id: <20220318152541.7460-5-luca.fancellu@arm.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220318152541.7460-1-luca.fancellu@arm.com>
References: <20220318152541.7460-1-luca.fancellu@arm.com>

Introduce a way to create different cpupools at boot time, this is
particularly useful on ARM big.LITTLE system where there might be the
need to have different cpupools for each type of core, but also
systems using NUMA can have different cpu pools for each node.

The feature on arm relies on a specification of the cpupools from the
device tree to build pools and assign cpus to them.

Documentation is created to explain the feature.

Signed-off-by: Luca Fancellu <luca.fancellu@arm.com>
---
Changes in v3:
- Add newline to cpupools.txt and removed "default n" from Kconfig (Jan)
- Fixed comment, moved defines, used global cpu_online_map, use
  HAS_DEVICE_TREE instead of ARM and place arch specific code in header
  (Juergen)
- Fix brakets, x86 code only panic, get rid of scheduler dt node, don't
  save pool pointer and look for it from the pool list (Stefano)
- Changed data structures to allow modification to the code.
Changes in v2:
- Move feature to common code (Juergen)
- Try to decouple dtb parse and cpupool creation to allow
  more way to specify cpupools (for example command line)
- Created standalone dt node for the scheduler so it can
  be used in future work to set scheduler specific
  parameters
- Use only auto generated ids for cpupools
---
 docs/misc/arm/device-tree/cpupools.txt | 135 +++++++++++++++++++
 xen/arch/arm/include/asm/smp.h         |   3 +
 xen/common/Kconfig                     |   7 +
 xen/common/Makefile                    |   1 +
 xen/common/boot_cpupools.c             | 178 +++++++++++++++++++++++++
 xen/common/sched/cpupool.c             |   9 +-
 xen/include/xen/sched.h                |  19 +++
 7 files changed, 351 insertions(+), 1 deletion(-)
 create mode 100644 docs/misc/arm/device-tree/cpupools.txt
 create mode 100644 xen/common/boot_cpupools.c

diff --git a/docs/misc/arm/device-tree/cpupools.txt b/docs/misc/arm/device-tree/cpupools.txt
new file mode 100644
index 000000000000..6d7463736b48
--- /dev/null
+++ b/docs/misc/arm/device-tree/cpupools.txt
@@ -0,0 +1,135 @@
+Boot time cpupools
+==================
+
+When BOOT_TIME_CPUPOOLS is enabled in the Xen configuration, it is possible to
+create cpupools during boot phase by specifying them in the device tree.
+
+Cpupools specification nodes shall be direct childs of /chosen node.
+Each cpupool node contains the following properties:
+
+- compatible (mandatory)
+
+    Must always include the compatiblity string: "xen,cpupool".
+
+- cpupool-cpus (mandatory)
+
+    Must be a list of device tree phandle to nodes describing cpus (e.g. having
+    device_type = "cpu"), it can't be empty.
+
+- cpupool-sched (optional)
+
+    Must be a string having the name of a Xen scheduler, it has no effect when
+    used in conjunction of a cpupool-id equal to zero, in that case the
+    default Xen scheduler is selected (sched=<...> boot argument).
+    Check the sched=<...> boot argument for allowed values.
+
+
+Constraints
+===========
+
+If no cpupools are specified, all cpus will be assigned to one cpupool
+implicitly created (Pool-0).
+
+If cpupools node are specified, but not every cpu brought up by Xen is assigned,
+all the not assigned cpu will be assigned to an additional cpupool.
+
+If a cpu is assigned to a cpupool, but it's not brought up correctly, Xen will
+stop.
+
+
+Examples
+========
+
+A system having two types of core, the following device tree specification will
+instruct Xen to have two cpupools:
+
+- The cpupool with id 0 will have 4 cpus assigned.
+- The cpupool with id 1 will have 2 cpus assigned.
+
+The following example can work only if hmp-unsafe=1 is passed to Xen boot
+arguments, otherwise not all cores will be brought up by Xen and the cpupool
+creation process will stop Xen.
+
+
+a72_1: cpu@0 {
+        compatible = "arm,cortex-a72";
+        reg = <0x0 0x0>;
+        device_type = "cpu";
+        [...]
+};
+
+a72_2: cpu@1 {
+        compatible = "arm,cortex-a72";
+        reg = <0x0 0x1>;
+        device_type = "cpu";
+        [...]
+};
+
+a53_1: cpu@100 {
+        compatible = "arm,cortex-a53";
+        reg = <0x0 0x100>;
+        device_type = "cpu";
+        [...]
+};
+
+a53_2: cpu@101 {
+        compatible = "arm,cortex-a53";
+        reg = <0x0 0x101>;
+        device_type = "cpu";
+        [...]
+};
+
+a53_3: cpu@102 {
+        compatible = "arm,cortex-a53";
+        reg = <0x0 0x102>;
+        device_type = "cpu";
+        [...]
+};
+
+a53_4: cpu@103 {
+        compatible = "arm,cortex-a53";
+        reg = <0x0 0x103>;
+        device_type = "cpu";
+        [...]
+};
+
+chosen {
+
+    cpupool_a {
+        compatible = "xen,cpupool";
+        cpupool-cpus = <&a53_1 &a53_2 &a53_3 &a53_4>;
+    };
+    cpupool_b {
+        compatible = "xen,cpupool";
+        cpupool-cpus = <&a72_1 &a72_2>;
+        cpupool-sched = "credit2";
+    };
+
+    [...]
+
+};
+
+
+A system having the cpupools specification below will instruct Xen to have three
+cpupools:
+
+- The cpupool Pool-0 will have 2 cpus assigned.
+- The cpupool Pool-1 will have 2 cpus assigned.
+- The cpupool Pool-2 will have 2 cpus assigned (created by Xen with all the not
+  assigned cpus a53_3 and a53_4).
+
+chosen {
+
+    cpupool_a {
+        compatible = "xen,cpupool";
+        cpupool-cpus = <&a53_1 &a53_2>;
+    };
+    cpupool_b {
+        compatible = "xen,cpupool";
+        cpupool-cpus = <&a72_1 &a72_2>;
+        cpupool-sched = "null";
+    };
+
+    [...]
+
+};
diff --git a/xen/arch/arm/include/asm/smp.h b/xen/arch/arm/include/asm/smp.h
index af5a2fe65266..83c0cd69767b 100644
--- a/xen/arch/arm/include/asm/smp.h
+++ b/xen/arch/arm/include/asm/smp.h
@@ -34,6 +34,9 @@ extern void init_secondary(void);
 extern void smp_init_cpus(void);
 extern void smp_clear_cpu_maps (void);
 extern int smp_get_max_cpus (void);
+
+#define cpu_physical_id(cpu) cpu_logical_map(cpu)
+
 #endif
 
 /*
diff --git a/xen/common/Kconfig b/xen/common/Kconfig
index d921c74d615e..70aac5220e75 100644
--- a/xen/common/Kconfig
+++ b/xen/common/Kconfig
@@ -22,6 +22,13 @@ config GRANT_TABLE
 
 	  If unsure, say Y.
 
+config BOOT_TIME_CPUPOOLS
+	bool "Create cpupools at boot time"
+	depends on HAS_DEVICE_TREE
+	help
+	  Creates cpupools during boot time and assigns cpus to them. Cpupools
+	  options can be specified in the device tree.
+
 config ALTERNATIVE_CALL
 	bool
 
diff --git a/xen/common/Makefile b/xen/common/Makefile
index dc8d3a13f5b8..c5949785ab28 100644
--- a/xen/common/Makefile
+++ b/xen/common/Makefile
@@ -1,5 +1,6 @@
 obj-$(CONFIG_ARGO) += argo.o
 obj-y += bitmap.o
+obj-$(CONFIG_BOOT_TIME_CPUPOOLS) += boot_cpupools.o
 obj-$(CONFIG_HYPFS_CONFIG) += config_data.o
 obj-$(CONFIG_CORE_PARKING) += core_parking.o
 obj-y += cpu.o
diff --git a/xen/common/boot_cpupools.c b/xen/common/boot_cpupools.c
new file mode 100644
index 000000000000..f6f2fa8f2701
--- /dev/null
+++ b/xen/common/boot_cpupools.c
@@ -0,0 +1,178 @@
+/* SPDX-License-Identifier: GPL-2.0 */
+/*
+ * xen/common/boot_cpupools.c
+ *
+ * Code to create cpupools at boot time.
+ *
+ * Copyright (C) 2022 Arm Ltd.
+ */
+
+#include <xen/sched.h>
+
+/*
+ * pool_cpu_map:   Index is logical cpu number, content is cpupool id, (-1) for
+ *                 unassigned.
+ * pool_sched_map: Index is cpupool id, content is scheduler id, (-1) for
+ *                 unassigned.
+ */
+static int __initdata pool_cpu_map[NR_CPUS]   = { [0 ... NR_CPUS-1] = -1 };
+static int __initdata pool_sched_map[NR_CPUS] = { [0 ... NR_CPUS-1] = -1 };
+static unsigned int __initdata next_pool_id;
+
+#ifdef CONFIG_HAS_DEVICE_TREE
+
+#define BTCPUPOOLS_DT_NODE_NO_REG     (-1)
+#define BTCPUPOOLS_DT_NODE_NO_LOG_CPU (-2)
+
+static int __init get_logical_cpu_from_hw_id(unsigned int hwid)
+{
+    unsigned int i;
+
+    for ( i = 0; i < nr_cpu_ids; i++ )
+        if ( cpu_physical_id(i) == hwid )
+            return i;
+
+    return -1;
+}
+
+static int __init
+get_logical_cpu_from_cpu_node(const struct dt_device_node *cpu_node)
+{
+    int cpu_num;
+    const __be32 *prop;
+    unsigned int cpu_reg;
+
+    prop = dt_get_property(cpu_node, "reg", NULL);
+    if ( !prop )
+        return BTCPUPOOLS_DT_NODE_NO_REG;
+
+    cpu_reg = dt_read_number(prop, dt_n_addr_cells(cpu_node));
+
+    cpu_num = get_logical_cpu_from_hw_id(cpu_reg);
+    if ( cpu_num < 0 )
+        return BTCPUPOOLS_DT_NODE_NO_LOG_CPU;
+
+    return cpu_num;
+}
+
+static int __init check_and_get_sched_id(const char* scheduler_name)
+{
+    int sched_id = sched_get_id_by_name(scheduler_name);
+
+    if ( sched_id < 0 )
+        panic("Scheduler %s does not exists!\n", scheduler_name);
+
+    return sched_id;
+}
+
+void __init btcpupools_dtb_parse(void)
+{
+    const struct dt_device_node *chosen, *node;
+
+    chosen = dt_find_node_by_path("/chosen");
+    if ( !chosen )
+        return;
+
+    dt_for_each_child_node(chosen, node)
+    {
+        const struct dt_device_node *phandle_node;
+        int sched_id = -1;
+        const char* scheduler_name;
+        unsigned int i = 0;
+
+        if ( !dt_device_is_compatible(node, "xen,cpupool") )
+            continue;
+
+        if ( !dt_property_read_string(phandle_node, "cpupool-sched",
+                                      &scheduler_name) )
+            sched_id = check_and_get_sched_id(scheduler_name);
+
+        phandle_node = dt_parse_phandle(node, "cpupool-cpus", i++);
+        if ( !phandle_node )
+            panic("Missing or empty cpupool-cpus property!\n");
+
+        while ( phandle_node )
+        {
+            int cpu_num;
+
+            cpu_num = get_logical_cpu_from_cpu_node(phandle_node);
+
+            if ( cpu_num < 0 )
+                panic("Error retrieving logical cpu from node %s (%d)\n",
+                      dt_node_name(node), cpu_num);
+
+            if ( pool_cpu_map[cpu_num] != -1 )
+                panic("Logical cpu %d already added to a cpupool!\n", cpu_num);
+
+            pool_cpu_map[cpu_num] = next_pool_id;
+            pool_sched_map[next_pool_id] = sched_id;
+
+            phandle_node = dt_parse_phandle(node, "cpupool-cpus", i++);
+        }
+
+        /* Let Xen generate pool ids */
+        next_pool_id++;
+    }
+}
+#endif
+
+void __init btcpupools_allocate_pools(void)
+{
+    unsigned int i;
+    bool add_extra_cpupool = false;
+
+    /*
+     * If there are no cpupools, the value of next_pool_id is zero, so the code
+     * below will assign every cpu to cpupool0 as the default behavior.
+     * When there are cpupools, the code below is assigning all the not
+     * assigned cpu to a new pool (next_pool_id value is the last id + 1).
+     * In the same loop we check if there is any assigned cpu that is not
+     * online.
+     */
+    for ( i = 0; i < nr_cpu_ids; i++ )
+        if ( cpumask_test_cpu(i, &cpu_online_map) )
+        {
+            /* Unassigned cpu gets next_pool_id pool id value */
+            if ( pool_cpu_map[i] < 0 )
+            {
+                pool_cpu_map[i] = next_pool_id;
+                add_extra_cpupool = true;
+            }
+            printk(XENLOG_INFO "Logical CPU %u in Pool-%u.\n", i,
+                   pool_cpu_map[i]);
+        }
+        else
+        {
+            if ( pool_cpu_map[i] >= 0 )
+                panic("Pool-%d contains cpu%u that is not online!\n",
+                      pool_cpu_map[i], i);
+        }
+
+    if ( add_extra_cpupool )
+        next_pool_id++;
+
+    /* Create cpupools with selected schedulers */
+    for ( i = 0; i < next_pool_id; i++ )
+        cpupool_create_pool(i, pool_sched_map[i]);
+
+#ifdef CONFIG_X86
+    /* Cpu0 must be in cpupool0 for x86 */
+    if ( pool_cpu_map[0] != 0 )
+        panic("Cpu0 must be in Pool-0\n");
+#endif
+}
+
+unsigned int __init btcpupools_get_cpupool_id(unsigned int cpu)
+{
+    return pool_cpu_map[cpu];
+}
+
+/*
+ * Local variables:
+ * mode: C
+ * c-file-style: "BSD"
+ * c-basic-offset: 4
+ * tab-width: 4
+ * indent-tabs-mode: nil
+ * End:
+ */
diff --git a/xen/common/sched/cpupool.c b/xen/common/sched/cpupool.c
index 89a891af7076..e5189c53a321 100644
--- a/xen/common/sched/cpupool.c
+++ b/xen/common/sched/cpupool.c
@@ -1247,12 +1247,19 @@ static int __init cf_check cpupool_init(void)
     cpupool_put(cpupool0);
     register_cpu_notifier(&cpu_nfb);
 
+    btcpupools_dtb_parse();
+
+    btcpupools_allocate_pools();
+
     spin_lock(&cpupool_lock);
 
     cpumask_copy(&cpupool_free_cpus, &cpu_online_map);
 
     for_each_cpu ( cpu, &cpupool_free_cpus )
-        cpupool_assign_cpu_locked(cpupool0, cpu);
+    {
+        unsigned int pool_id = btcpupools_get_cpupool_id(cpu);
+        cpupool_assign_cpu_locked(cpupool_find_by_id(pool_id), cpu);
+    }
 
     spin_unlock(&cpupool_lock);
 
diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
index 4050e22544f9..5d83465d3915 100644
--- a/xen/include/xen/sched.h
+++ b/xen/include/xen/sched.h
@@ -1176,6 +1176,25 @@ extern void cf_check dump_runq(unsigned char key);
 
 void arch_do_physinfo(struct xen_sysctl_physinfo *pi);
 
+#ifdef CONFIG_BOOT_TIME_CPUPOOLS
+void btcpupools_allocate_pools(void);
+unsigned int btcpupools_get_cpupool_id(unsigned int cpu);
+
+#ifdef CONFIG_HAS_DEVICE_TREE
+void btcpupools_dtb_parse(void);
+#else
+static inline void btcpupools_dtb_parse(void) {}
+#endif
+
+#else /* !CONFIG_BOOT_TIME_CPUPOOLS */
+static inline void btcpupools_allocate_pools(void) {}
+static inline void btcpupools_dtb_parse(void) {}
+static inline unsigned int btcpupools_get_cpupool_id(unsigned int cpu)
+{
+    return 0;
+}
+#endif
+
 #endif /* __SCHED_H__ */
 
 /*
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 18 15:26:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 15:26:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292106.496105 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVEUO-00039p-EL; Fri, 18 Mar 2022 15:26:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292106.496105; Fri, 18 Mar 2022 15:26:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVEUO-000398-6b; Fri, 18 Mar 2022 15:26:04 +0000
Received: by outflank-mailman (input) for mailman id 292106;
 Fri, 18 Mar 2022 15:26:03 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=VNnc=T5=arm.com=luca.fancellu@srs-se1.protection.inumbo.net>)
 id 1nVEUM-0001ka-DW
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 15:26:02 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTP
 id b78aa61c-a6cf-11ec-853c-5f4723681683;
 Fri, 18 Mar 2022 16:26:01 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 86B891515;
 Fri, 18 Mar 2022 08:26:00 -0700 (PDT)
Received: from e125770.cambridge.arm.com (e125770.cambridge.arm.com
 [10.1.195.16])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 3531D3F7D7;
 Fri, 18 Mar 2022 08:25:59 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b78aa61c-a6cf-11ec-853c-5f4723681683
From: Luca Fancellu <luca.fancellu@arm.com>
To: xen-devel@lists.xenproject.org
Cc: bertrand.marquis@arm.com,
	wei.chen@arm.com,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>
Subject: [PATCH v3 5/6] arm/dom0less: assign dom0less guests to cpupools
Date: Fri, 18 Mar 2022 15:25:40 +0000
Message-Id: <20220318152541.7460-6-luca.fancellu@arm.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220318152541.7460-1-luca.fancellu@arm.com>
References: <20220318152541.7460-1-luca.fancellu@arm.com>

Introduce domain-cpupool property of a xen,domain device tree node,
that specifies the cpupool device tree handle of a xen,cpupool node
that identifies a cpupool created at boot time where the guest will
be assigned on creation.

Add member to the xen_domctl_createdomain public interface so the
XEN_DOMCTL_INTERFACE_VERSION version is bumped.

Add public function to retrieve a pool id from the device tree
cpupool node.

Update documentation about the property.

Signed-off-by: Luca Fancellu <luca.fancellu@arm.com>
---
Changes in v3:
- Use explicitely sized integer for struct xen_domctl_createdomain
  cpupool_id member. (Stefano)
- Changed code due to previous commit code changes
Changes in v2:
- Moved cpupool_id from arch specific to common part (Juergen)
- Implemented functions to retrieve the cpupool id from the
  cpupool dtb node.
---
 docs/misc/arm/device-tree/booting.txt |  5 +++++
 xen/arch/arm/domain_build.c           | 14 +++++++++++++-
 xen/common/boot_cpupools.c            | 24 ++++++++++++++++++++++++
 xen/common/domain.c                   |  2 +-
 xen/include/public/domctl.h           |  4 +++-
 xen/include/xen/sched.h               |  9 +++++++++
 6 files changed, 55 insertions(+), 3 deletions(-)

diff --git a/docs/misc/arm/device-tree/booting.txt b/docs/misc/arm/device-tree/booting.txt
index a94125394e35..7b4a29a2c293 100644
--- a/docs/misc/arm/device-tree/booting.txt
+++ b/docs/misc/arm/device-tree/booting.txt
@@ -188,6 +188,11 @@ with the following properties:
     An empty property to request the memory of the domain to be
     direct-map (guest physical address == physical address).
 
+- domain-cpupool
+
+    Optional. Handle to a xen,cpupool device tree node that identifies the
+    cpupool where the guest will be started at boot.
+
 Under the "xen,domain" compatible node, one or more sub-nodes are present
 for the DomU kernel and ramdisk.
 
diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index 8be01678de05..9c67a483d4a4 100644
--- a/xen/arch/arm/domain_build.c
+++ b/xen/arch/arm/domain_build.c
@@ -3172,7 +3172,8 @@ static int __init construct_domU(struct domain *d,
 void __init create_domUs(void)
 {
     struct dt_device_node *node;
-    const struct dt_device_node *chosen = dt_find_node_by_path("/chosen");
+    const struct dt_device_node *cpupool_node,
+                                *chosen = dt_find_node_by_path("/chosen");
 
     BUG_ON(chosen == NULL);
     dt_for_each_child_node(chosen, node)
@@ -3241,6 +3242,17 @@ void __init create_domUs(void)
                                          vpl011_virq - 32 + 1);
         }
 
+        /* Get the optional property domain-cpupool */
+        cpupool_node = dt_parse_phandle(node, "domain-cpupool", 0);
+        if ( cpupool_node )
+        {
+            int pool_id = btcpupools_get_domain_pool_id(cpupool_node);
+            if ( pool_id < 0 )
+                panic("Error getting cpupool id from domain-cpupool (%d)\n",
+                      pool_id);
+            d_cfg.cpupool_id = pool_id;
+        }
+
         /*
          * The variable max_init_domid is initialized with zero, so here it's
          * very important to use the pre-increment operator to call
diff --git a/xen/common/boot_cpupools.c b/xen/common/boot_cpupools.c
index f6f2fa8f2701..feba93a243fc 100644
--- a/xen/common/boot_cpupools.c
+++ b/xen/common/boot_cpupools.c
@@ -23,6 +23,8 @@ static unsigned int __initdata next_pool_id;
 
 #define BTCPUPOOLS_DT_NODE_NO_REG     (-1)
 #define BTCPUPOOLS_DT_NODE_NO_LOG_CPU (-2)
+#define BTCPUPOOLS_DT_WRONG_NODE      (-3)
+#define BTCPUPOOLS_DT_CORRUPTED_NODE  (-4)
 
 static int __init get_logical_cpu_from_hw_id(unsigned int hwid)
 {
@@ -55,6 +57,28 @@ get_logical_cpu_from_cpu_node(const struct dt_device_node *cpu_node)
     return cpu_num;
 }
 
+int __init btcpupools_get_domain_pool_id(const struct dt_device_node *node)
+{
+    const struct dt_device_node *phandle_node;
+    int cpu_num;
+
+    if ( !dt_device_is_compatible(node, "xen,cpupool") )
+        return BTCPUPOOLS_DT_WRONG_NODE;
+    /*
+     * Get first cpu listed in the cpupool, from its reg it's possible to
+     * retrieve the cpupool id.
+     */
+    phandle_node = dt_parse_phandle(node, "cpupool-cpus", 0);
+    if ( !phandle_node )
+        return BTCPUPOOLS_DT_CORRUPTED_NODE;
+
+    cpu_num = get_logical_cpu_from_cpu_node(phandle_node);
+    if ( cpu_num < 0 )
+        return cpu_num;
+
+    return pool_cpu_map[cpu_num];
+}
+
 static int __init check_and_get_sched_id(const char* scheduler_name)
 {
     int sched_id = sched_get_id_by_name(scheduler_name);
diff --git a/xen/common/domain.c b/xen/common/domain.c
index 351029f8b239..0827400f4f49 100644
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -698,7 +698,7 @@ struct domain *domain_create(domid_t domid,
         if ( !d->pbuf )
             goto fail;
 
-        if ( (err = sched_init_domain(d, 0)) != 0 )
+        if ( (err = sched_init_domain(d, config->cpupool_id)) != 0 )
             goto fail;
 
         if ( (err = late_hwdom_init(d)) != 0 )
diff --git a/xen/include/public/domctl.h b/xen/include/public/domctl.h
index b85e6170b0aa..2f4cf56f438d 100644
--- a/xen/include/public/domctl.h
+++ b/xen/include/public/domctl.h
@@ -38,7 +38,7 @@
 #include "hvm/save.h"
 #include "memory.h"
 
-#define XEN_DOMCTL_INTERFACE_VERSION 0x00000014
+#define XEN_DOMCTL_INTERFACE_VERSION 0x00000015
 
 /*
  * NB. xen_domctl.domain is an IN/OUT parameter for this operation.
@@ -106,6 +106,8 @@ struct xen_domctl_createdomain {
     /* Per-vCPU buffer size in bytes.  0 to disable. */
     uint32_t vmtrace_size;
 
+    uint32_t cpupool_id;
+
     struct xen_arch_domainconfig arch;
 };
 
diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
index 5d83465d3915..4e749a604f25 100644
--- a/xen/include/xen/sched.h
+++ b/xen/include/xen/sched.h
@@ -1182,6 +1182,7 @@ unsigned int btcpupools_get_cpupool_id(unsigned int cpu);
 
 #ifdef CONFIG_HAS_DEVICE_TREE
 void btcpupools_dtb_parse(void);
+int btcpupools_get_domain_pool_id(const struct dt_device_node *node);
 #else
 static inline void btcpupools_dtb_parse(void) {}
 #endif
@@ -1193,6 +1194,14 @@ static inline unsigned int btcpupools_get_cpupool_id(unsigned int cpu)
 {
     return 0;
 }
+#ifdef CONFIG_HAS_DEVICE_TREE
+static inline int
+btcpupools_get_domain_pool_id(const struct dt_device_node *node)
+{
+    return 0;
+}
+#endif
+
 #endif
 
 #endif /* __SCHED_H__ */
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 18 15:26:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 15:26:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292107.496115 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVEUP-0003Tc-T1; Fri, 18 Mar 2022 15:26:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292107.496115; Fri, 18 Mar 2022 15:26:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVEUP-0003T7-NH; Fri, 18 Mar 2022 15:26:05 +0000
Received: by outflank-mailman (input) for mailman id 292107;
 Fri, 18 Mar 2022 15:26:04 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=VNnc=T5=arm.com=luca.fancellu@srs-se1.protection.inumbo.net>)
 id 1nVEUN-0001ka-R9
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 15:26:03 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTP
 id b8847dc5-a6cf-11ec-853c-5f4723681683;
 Fri, 18 Mar 2022 16:26:02 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 34AF51570;
 Fri, 18 Mar 2022 08:26:02 -0700 (PDT)
Received: from e125770.cambridge.arm.com (e125770.cambridge.arm.com
 [10.1.195.16])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id BC5C43F7D7;
 Fri, 18 Mar 2022 08:26:00 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b8847dc5-a6cf-11ec-853c-5f4723681683
From: Luca Fancellu <luca.fancellu@arm.com>
To: xen-devel@lists.xenproject.org
Cc: bertrand.marquis@arm.com,
	wei.chen@arm.com,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Juergen Gross <jgross@suse.com>,
	Dario Faggioli <dfaggioli@suse.com>
Subject: [PATCH v3 6/6] xen/cpupool: Allow cpupool0 to use different scheduler
Date: Fri, 18 Mar 2022 15:25:41 +0000
Message-Id: <20220318152541.7460-7-luca.fancellu@arm.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220318152541.7460-1-luca.fancellu@arm.com>
References: <20220318152541.7460-1-luca.fancellu@arm.com>

Currently cpupool0 can use only the default scheduler, and
cpupool_create has an hardcoded behavior when creating the pool 0
that doesn't allocate new memory for the scheduler, but uses the
default scheduler structure in memory.

With this commit it is possible to allocate a different scheduler for
the cpupool0 when using the boot time cpupool.
To achieve this the hardcoded behavior in cpupool_create is removed
and the cpupool0 creation is moved.

When compiling without boot time cpupools enabled, the current
behavior is maintained (except that cpupool0 scheduler memory will be
allocated).

Signed-off-by: Luca Fancellu <luca.fancellu@arm.com>
---
Changes in v3:
- fix typo in commit message (Juergen)
- rebase changes
Changes in v2:
- new patch
---
 xen/common/boot_cpupools.c | 5 ++++-
 xen/common/sched/cpupool.c | 8 +-------
 xen/include/xen/sched.h    | 5 ++++-
 3 files changed, 9 insertions(+), 9 deletions(-)

diff --git a/xen/common/boot_cpupools.c b/xen/common/boot_cpupools.c
index feba93a243fc..af5bea0c1113 100644
--- a/xen/common/boot_cpupools.c
+++ b/xen/common/boot_cpupools.c
@@ -175,8 +175,11 @@ void __init btcpupools_allocate_pools(void)
     if ( add_extra_cpupool )
         next_pool_id++;
 
+    /* Keep track of cpupool id 0 with the global cpupool0 */
+    cpupool0 = cpupool_create_pool(0, pool_sched_map[0]);
+
     /* Create cpupools with selected schedulers */
-    for ( i = 0; i < next_pool_id; i++ )
+    for ( i = 1; i < next_pool_id; i++ )
         cpupool_create_pool(i, pool_sched_map[i]);
 
 #ifdef CONFIG_X86
diff --git a/xen/common/sched/cpupool.c b/xen/common/sched/cpupool.c
index e5189c53a321..f717ee844e91 100644
--- a/xen/common/sched/cpupool.c
+++ b/xen/common/sched/cpupool.c
@@ -312,10 +312,7 @@ static struct cpupool *cpupool_create(unsigned int poolid,
         c->cpupool_id = q->cpupool_id + 1;
     }
 
-    if ( poolid == 0 )
-        c->sched = scheduler_get_default();
-    else
-        c->sched = scheduler_alloc(sched_id);
+    c->sched = scheduler_alloc(sched_id);
     if ( IS_ERR(c->sched) )
     {
         ret = PTR_ERR(c->sched);
@@ -1242,9 +1239,6 @@ static int __init cf_check cpupool_init(void)
 
     cpupool_hypfs_init();
 
-    cpupool0 = cpupool_create(0, 0);
-    BUG_ON(IS_ERR(cpupool0));
-    cpupool_put(cpupool0);
     register_cpu_notifier(&cpu_nfb);
 
     btcpupools_dtb_parse();
diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
index 4e749a604f25..215b4f45609a 100644
--- a/xen/include/xen/sched.h
+++ b/xen/include/xen/sched.h
@@ -1188,7 +1188,10 @@ static inline void btcpupools_dtb_parse(void) {}
 #endif
 
 #else /* !CONFIG_BOOT_TIME_CPUPOOLS */
-static inline void btcpupools_allocate_pools(void) {}
+static inline void btcpupools_allocate_pools(void)
+{
+    cpupool0 = cpupool_create_pool(0, -1);
+}
 static inline void btcpupools_dtb_parse(void) {}
 static inline unsigned int btcpupools_get_cpupool_id(unsigned int cpu)
 {
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 18 15:57:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 15:57:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292126.496127 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVEyl-0000JH-8E; Fri, 18 Mar 2022 15:57:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292126.496127; Fri, 18 Mar 2022 15:57:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVEyl-0000JA-4f; Fri, 18 Mar 2022 15:57:27 +0000
Received: by outflank-mailman (input) for mailman id 292126;
 Fri, 18 Mar 2022 15:57:26 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVEyk-0000J0-Gg; Fri, 18 Mar 2022 15:57:26 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVEyk-0004t7-F4; Fri, 18 Mar 2022 15:57:26 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVEyk-0004jz-35; Fri, 18 Mar 2022 15:57:26 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVEyk-0004Ld-2c; Fri, 18 Mar 2022 15:57:26 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=dWPHRhkmHTHtpD4QDbuuZBNoRknd2XJkM3PksxpNHps=; b=VKNugvP70+ubgDKbBl+yL1pzsJ
	ZqUfB1IAsD5uhb0Iy9BelXAK4yeOk2tcriWss8s8rZN9OZli6Ey04jBoeW/8e0kQSgKOsN+dQcA8w
	BBRvGdVrIqx9v7UoUeR/O2N44K/u/naWF0yLtR5NifB+VYeX5rLWe5YFCFfNChUQx6LA=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168680-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168680: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 18 Mar 2022 15:57:26 +0000

flight 168680 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168680/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   18 days
Failing since        168258  2022-03-01 01:55:31 Z   17 days  168 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    0 days    4 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 15:58:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 15:58:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292133.496138 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVF05-0000sZ-LH; Fri, 18 Mar 2022 15:58:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292133.496138; Fri, 18 Mar 2022 15:58:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVF05-0000sS-GP; Fri, 18 Mar 2022 15:58:49 +0000
Received: by outflank-mailman (input) for mailman id 292133;
 Fri, 18 Mar 2022 15:58:48 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Gqp6=T5=citrix.com=prvs=069a58476=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nVF04-0000sH-Go
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 15:58:48 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4a18b401-a6d4-11ec-853c-5f4723681683;
 Fri, 18 Mar 2022 16:58:46 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4a18b401-a6d4-11ec-853c-5f4723681683
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647619126;
  h=date:from:to:cc:subject:message-id:references:
   mime-version:in-reply-to;
  bh=vq+7pxKEb2HNAB3hrUWlz1jIOdSDtIYOE8JbSGw9z2o=;
  b=fACZIOC1NihU1+fpkG8dACcFahbVEb5f0Kg8u9YcZyC6MXSCeWpREKOD
   8atpV00briJLdkmUTWluyvj+KRGQ39fTwooLq7bfRtSh6mhyAB9a1DXxF
   T3gOczWuH+dM92sY0HsytmPqwEwVrcs4SCr0UOjlVSzYw/7QYBnHi+26Q
   g=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 67016739
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:5svBl6/W6l6WjbT8c0SaDrUDVH6TJUtcMsCJ2f8bNWPcYEJGY0x3y
 2IaXmmCP/fba2P9KY8jOoSypBtQsJOAmoNgSQpqpCk8E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oHpW1nlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnYCfViAZBIjho8U+Xz1RNCUuG64c6LCSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFIoZpnFnyyCfFfs8SIrPa67L+cVZzHE7gcUm8fP2O
 ZVBMGQwN0WojxtnOmsvBrM7s/+SjCf0bgVa+A+xoIsIyj2GpOB2+Oe0a4eEEjCQfu1Kmm6Iq
 2SA+H72ajkQOcaD0zOD/jSpj/XWgCLgcIsIEfuz8fsCqEaPy2IaDhpQTkeyq/S9jk+4WvpPK
 kgV/Dpopq83nGSwVcX0VRC8pH+CvzYfVsBWHul87xuCooLE7gDcCmUaQzppbN09qNRwVTEsz
 kWOnd7iGXpoqrL9YXmU7LuToBu5MDIZKmJEbigBJTbp+PG6/tt11EiWCI8+Tujl1bUZBA0c3
 RiWgzcZt482oPUq9Kmf9HfD0xSv/IjGG1tdChrsYkqp6QZwZYiAboOu6ETG4fsoELt1XmVtr
 1BfxZHAsblm4YWl0XXUHb5TRO3BC+OtamW0vLJ5I3U2G91BEVaHdJsY3jxxLVwB3i0sKW6wO
 x+7Ve+8CfZu0JqWgU1fPtrZ5ycCl/GI+THZuhb8NIImjn9ZLlPvwc2WTRTMt10BaWB1+U3FB
 b+VcNy3EVERArl9wTy9So81iOF3mX1gnDqIHc2jlnxLNIZyglbPFd/p13PUM4gEAF6s+l2Jo
 76zyePXo/mgbAEOSnaOqtNCRbz7BXM6GYr3u6Rqmh2reWJb9JUaI6aJm9sJItU994wMz7ug1
 iztCydwlQuk7VWaeFriV5yWQO62NXqJhSlgZnJE0JfB8yVLXLtDG49ELsppJ+Z7rLI/pRO2J
 tFcE/i97j10Ymyv01wggVPV9uSOqDzDadqyAheY
IronPort-HdrOrdr: A9a23:zTbuSKBNgTK/MK/lHems55DYdb4zR+YMi2TC1yhKJyC9Vvbo8/
 xG/c5rsCMc5wx9ZJhNo7y90ey7MBThHP1OkOss1NWZPDUO0VHAROoJ0WKh+UyCJ8SXzJ866U
 4KSclD4bPLYmRHsQ==
X-IronPort-AV: E=Sophos;i="5.90,192,1643691600"; 
   d="scan'208";a="67016739"
Date: Fri, 18 Mar 2022 15:58:40 +0000
From: Anthony PERARD <anthony.perard@citrix.com>
To: Stefano Stabellini <sstabellini@kernel.org>
CC: <xen-devel@lists.xenproject.org>, <cardoe@cardoe.com>, <wl@xen.org>,
	<andrew.cooper3@citrix.com>, <bertrand.marquis@arm.com>, Stefano Stabellini
	<stefano.stabellini@xilinx.com>
Subject: Re: [PATCH v2 2/2] gitlab-ci: add an ARM32 qemu-based smoke test
Message-ID: <YjSsMLl5Isn+OAMO@perard.uk.xensource.com>
References: <alpine.DEB.2.22.394.2203161843230.3497@ubuntu-linux-20-04-desktop>
 <20220317014653.2427386-2-sstabellini@kernel.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <20220317014653.2427386-2-sstabellini@kernel.org>

On Wed, Mar 16, 2022 at 06:46:53PM -0700, Stefano Stabellini wrote:
> +curl -fsSLO http://http.us.debian.org/debian/dists/jessie/main/installer-armhf/current/images/netboot/vmlinuz
> +curl -fsSLO http://http.us.debian.org/debian/dists/jessie/main/installer-armhf/current/images/netboot/initrd.gz

    curl --fail --silent --show-error --location --remote-name

I didn't know what all those short options were, I had to write it
down. In script to be shared with others, I think it's better to use the
long options, as it's kind of self-documenting.

Now, there an issue with the command line, "--remote-name" (or -O) needs
to be replaced. We don't care about how the server calls the file, it is
much more important do know where it is going to be stored. Instead, you
should use "--output" to write the file to the location the script is
going to use. It happened to work now, but we don't have to trust
the Internet when not needed.

Also, maybe use "https"?


Also, maybe as an improvement for later, and to avoid having to rely on
the Internet, we could probably store those artifacts in the container
that's going to run the test. But I'm not asking this for now.

> +timeout -k 1 240 \
> +./qemu-system-arm \

There's probably a better way than waiting for the "timeout" like running an
"init" that print something and shutdown the machine. But I guess
that's ok for now.


Thanks,

-- 
Anthony PERARD


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 16:12:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 16:12:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292140.496148 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVFDF-0003ml-SK; Fri, 18 Mar 2022 16:12:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292140.496148; Fri, 18 Mar 2022 16:12:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVFDF-0003me-PP; Fri, 18 Mar 2022 16:12:25 +0000
Received: by outflank-mailman (input) for mailman id 292140;
 Fri, 18 Mar 2022 16:12:24 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nVFDE-0003mY-4Y
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 16:12:24 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nVFDD-0005gH-Nk; Fri, 18 Mar 2022 16:12:23 +0000
Received: from [54.239.6.185] (helo=[192.168.15.239])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nVFDD-0008CP-GK; Fri, 18 Mar 2022 16:12:23 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=5lS8vopfCZtIvwfAldLMKK2sGquPQeGUpGXIFxCQBCA=; b=2umvIuU9wwSy3dQrYFFdWJxc1V
	ECZEU+7Y2NC69b7io718H4pSAAiOxSttud5aMRp20yxvggJ31KiIBcrL81fl5+CX9eDKRwxSo51MS
	syypNtkpWsRgRGF8I/ea1T28BHLXKr+VRw+voCpggmbxWtRdSMMHq9s8c13xY4VjvEpY=;
Message-ID: <274f81b0-c164-4437-3d05-243e147330a9@xen.org>
Date: Fri, 18 Mar 2022 16:12:20 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
To: Luca Fancellu <luca.fancellu@arm.com>, xen-devel@lists.xenproject.org
Cc: bertrand.marquis@arm.com, wei.chen@arm.com,
 Stefano Stabellini <sstabellini@kernel.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Wei Liu <wl@xen.org>, Juergen Gross <jgross@suse.com>,
 Dario Faggioli <dfaggioli@suse.com>
References: <20220318152541.7460-1-luca.fancellu@arm.com>
 <20220318152541.7460-5-luca.fancellu@arm.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220318152541.7460-5-luca.fancellu@arm.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Luca,

I only skimmed through the series. I have one question below:

On 18/03/2022 15:25, Luca Fancellu wrote:
> +void __init btcpupools_allocate_pools(void)
> +{
> +    unsigned int i;
> +    bool add_extra_cpupool = false;
> +
> +    /*
> +     * If there are no cpupools, the value of next_pool_id is zero, so the code
> +     * below will assign every cpu to cpupool0 as the default behavior.
> +     * When there are cpupools, the code below is assigning all the not
> +     * assigned cpu to a new pool (next_pool_id value is the last id + 1).
> +     * In the same loop we check if there is any assigned cpu that is not
> +     * online.
> +     */
> +    for ( i = 0; i < nr_cpu_ids; i++ )
> +        if ( cpumask_test_cpu(i, &cpu_online_map) )
> +        {
> +            /* Unassigned cpu gets next_pool_id pool id value */
> +            if ( pool_cpu_map[i] < 0 )
> +            {
> +                pool_cpu_map[i] = next_pool_id;
> +                add_extra_cpupool = true;
> +            }
> +            printk(XENLOG_INFO "Logical CPU %u in Pool-%u.\n", i,
> +                   pool_cpu_map[i]);
> +        }
> +        else
> +        {
> +            if ( pool_cpu_map[i] >= 0 )
> +                panic("Pool-%d contains cpu%u that is not online!\n",
> +                      pool_cpu_map[i], i);
> +        }
> +
> +    if ( add_extra_cpupool )
> +        next_pool_id++;
> +
> +    /* Create cpupools with selected schedulers */
> +    for ( i = 0; i < next_pool_id; i++ )
> +        cpupool_create_pool(i, pool_sched_map[i]);
> +
> +#ifdef CONFIG_X86
> +    /* Cpu0 must be in cpupool0 for x86 */
> +    if ( pool_cpu_map[0] != 0 )
> +        panic("Cpu0 must be in Pool-0\n");
> +#endif

Can you document why this is necessary on x86 but not on other 
architectures?

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 16:18:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 16:18:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292143.496160 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVFJC-0004S8-ID; Fri, 18 Mar 2022 16:18:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292143.496160; Fri, 18 Mar 2022 16:18:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVFJC-0004S1-F1; Fri, 18 Mar 2022 16:18:34 +0000
Received: by outflank-mailman (input) for mailman id 292143;
 Fri, 18 Mar 2022 16:18:33 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nVFJB-0004Rv-Tk
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 16:18:33 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nVFJB-0005mW-Hi; Fri, 18 Mar 2022 16:18:33 +0000
Received: from [54.239.6.185] (helo=[192.168.15.239])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nVFJB-00006O-BB; Fri, 18 Mar 2022 16:18:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=SGvcYTT9KPucFevs/HFR8gKlRWNjHHgxHfZjDAenkZg=; b=zsJQyE9UyEkceBilVoj2aFGuHf
	Oq4OHw2QXMNDoQX/zqnBs61OEqlLvaM81F6lnhIdpfMLy4j2xbb/jMqa8ruNWZ1mODwKN25GMON1k
	WdHmc2MIAJ8Tj+8F3wCkg452yHNf8T04IXgBGmgJg06ISWdGl0keT6eb0y6oYgBxfEpc=;
Message-ID: <cff3d9a6-fc72-ae05-663c-4f0197525455@xen.org>
Date: Fri, 18 Mar 2022 16:18:31 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v3 5/6] arm/dom0less: assign dom0less guests to cpupools
To: Luca Fancellu <luca.fancellu@arm.com>, xen-devel@lists.xenproject.org
Cc: bertrand.marquis@arm.com, wei.chen@arm.com,
 Stefano Stabellini <sstabellini@kernel.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Wei Liu <wl@xen.org>
References: <20220318152541.7460-1-luca.fancellu@arm.com>
 <20220318152541.7460-6-luca.fancellu@arm.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220318152541.7460-6-luca.fancellu@arm.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 18/03/2022 15:25, Luca Fancellu wrote:
> Introduce domain-cpupool property of a xen,domain device tree node,
> that specifies the cpupool device tree handle of a xen,cpupool node
> that identifies a cpupool created at boot time where the guest will
> be assigned on creation.
> 
> Add member to the xen_domctl_createdomain public interface so the
> XEN_DOMCTL_INTERFACE_VERSION version is bumped.
> 
> Add public function to retrieve a pool id from the device tree
> cpupool node.
> 
> Update documentation about the property.
> 
> Signed-off-by: Luca Fancellu <luca.fancellu@arm.com>
> ---
> Changes in v3:
> - Use explicitely sized integer for struct xen_domctl_createdomain
>    cpupool_id member. (Stefano)
> - Changed code due to previous commit code changes
> Changes in v2:
> - Moved cpupool_id from arch specific to common part (Juergen)
> - Implemented functions to retrieve the cpupool id from the
>    cpupool dtb node.
> ---
>   docs/misc/arm/device-tree/booting.txt |  5 +++++
>   xen/arch/arm/domain_build.c           | 14 +++++++++++++-
>   xen/common/boot_cpupools.c            | 24 ++++++++++++++++++++++++
>   xen/common/domain.c                   |  2 +-
>   xen/include/public/domctl.h           |  4 +++-
>   xen/include/xen/sched.h               |  9 +++++++++

This patch doesn't seem to contain any change in tools. So...

>           if ( (err = late_hwdom_init(d)) != 0 )
> diff --git a/xen/include/public/domctl.h b/xen/include/public/domctl.h
> index b85e6170b0aa..2f4cf56f438d 100644
> --- a/xen/include/public/domctl.h
> +++ b/xen/include/public/domctl.h
> @@ -38,7 +38,7 @@
>   #include "hvm/save.h"
>   #include "memory.h"
>   
> -#define XEN_DOMCTL_INTERFACE_VERSION 0x00000014
> +#define XEN_DOMCTL_INTERFACE_VERSION 0x00000015
>   
>   /*
>    * NB. xen_domctl.domain is an IN/OUT parameter for this operation.
> @@ -106,6 +106,8 @@ struct xen_domctl_createdomain {
>       /* Per-vCPU buffer size in bytes.  0 to disable. */
>       uint32_t vmtrace_size;
>   
> +    uint32_t cpupool_id;

... will the tools (e.g. golang bindings, libxl,..) always zero 
xen_domctl_createdomain?

I also think we may need to regenerate the golang bindings.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 16:56:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 16:56:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292147.496171 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVFtc-00008R-Fc; Fri, 18 Mar 2022 16:56:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292147.496171; Fri, 18 Mar 2022 16:56:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVFtc-00008J-CL; Fri, 18 Mar 2022 16:56:12 +0000
Received: by outflank-mailman (input) for mailman id 292147;
 Fri, 18 Mar 2022 16:56:10 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=krOM=T5=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nVFta-00008D-Sc
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 16:56:10 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4e7e0d6e-a6dc-11ec-8eba-a37418f5ba1a;
 Fri, 18 Mar 2022 17:56:08 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id E66661F392;
 Fri, 18 Mar 2022 16:56:07 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 9FD501351D;
 Fri, 18 Mar 2022 16:56:07 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id Yy9iJae5NGIgCgAAMHmgww
 (envelope-from <jgross@suse.com>); Fri, 18 Mar 2022 16:56:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4e7e0d6e-a6dc-11ec-8eba-a37418f5ba1a
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647622567; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=Mp/9GH7VCVH6yRrvqWVAbBDtVnOlmtIXQvROfo3TzB8=;
	b=d53Ia78bdfyuGJLCOxWXtyZaOvwAqUeXDzSLCF9NmwRRTeyXVsv/yetQY9oesHh69TLTXT
	nYmYcnlYYWph0Tfp4VxXOSxDxc97dLAO2DB8LUsTaE5usZlnNFMnG8sNxtroVxubgDlxzA
	qLuoFT8kgo5FEVMOy0jQ5jR1zOwYhh4=
Message-ID: <2a4573e0-4a8d-52c1-d29b-66b13bfe376f@suse.com>
Date: Fri, 18 Mar 2022 17:56:07 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH] platform/x86/dell: add buffer allocation/free functions
 for SMI calls
Content-Language: en-US
To: David Laight <David.Laight@ACULAB.COM>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 "platform-driver-x86@vger.kernel.org" <platform-driver-x86@vger.kernel.org>,
 "linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
 "Dell.Client.Kernel@dell.com" <Dell.Client.Kernel@dell.com>
Cc: Stuart Hayes <stuart.w.hayes@gmail.com>,
 Hans de Goede <hdegoede@redhat.com>, Mark Gross <markgross@kernel.org>,
 "stable@vger.kernel.org" <stable@vger.kernel.org>
References: <20220318150950.16843-1-jgross@suse.com>
 <accf95548a8c4374b17c159b9b2d0098@AcuMS.aculab.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <accf95548a8c4374b17c159b9b2d0098@AcuMS.aculab.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------TM6SaXL8siRcJxQNQGUqgn4j"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------TM6SaXL8siRcJxQNQGUqgn4j
Content-Type: multipart/mixed; boundary="------------0gPSdPzUPEcNzI04c8WYT5Ll";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: David Laight <David.Laight@ACULAB.COM>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 "platform-driver-x86@vger.kernel.org" <platform-driver-x86@vger.kernel.org>,
 "linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
 "Dell.Client.Kernel@dell.com" <Dell.Client.Kernel@dell.com>
Cc: Stuart Hayes <stuart.w.hayes@gmail.com>,
 Hans de Goede <hdegoede@redhat.com>, Mark Gross <markgross@kernel.org>,
 "stable@vger.kernel.org" <stable@vger.kernel.org>
Message-ID: <2a4573e0-4a8d-52c1-d29b-66b13bfe376f@suse.com>
Subject: Re: [PATCH] platform/x86/dell: add buffer allocation/free functions
 for SMI calls
References: <20220318150950.16843-1-jgross@suse.com>
 <accf95548a8c4374b17c159b9b2d0098@AcuMS.aculab.com>
In-Reply-To: <accf95548a8c4374b17c159b9b2d0098@AcuMS.aculab.com>

--------------0gPSdPzUPEcNzI04c8WYT5Ll
Content-Type: multipart/mixed; boundary="------------DDUITxrpMQFqvmeqif0y83vA"

--------------DDUITxrpMQFqvmeqif0y83vA
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------DDUITxrpMQFqvmeqif0y83vA
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----

xsBNBFOMcBYBCACgGjqjoGvbEouQZw/ToiBg9W98AlM2QHV+iNHsEs7kxWhKMjri
oyspZKOBycWxw3ie3j9uvg9EOB3aN4xiTv4qbnGiTr3oJhkB1gsb6ToJQZ8uxGq2
kaV2KL9650I1SJvedYm8Of8Zd621lSmoKOwlNClALZNew72NjJLEzTalU1OdT7/i
1TXkH09XSSI8mEQ/ouNcMvIJNwQpd369y9bfIhWUiVXEK7MlRgUG6MvIj6Y3Am/B
BLUVbDa4+gmzDC9ezlZkTZG2t14zWPvxXP3FAp2pkW0xqG7/377qptDmrk42GlSK
N4z76ELnLxussxc7I2hx18NUcbP8+uty4bMxABEBAAHNHEp1ZXJnZW4gR3Jvc3Mg
PGpnQHBmdXBmLm5ldD7CwHkEEwECACMFAlOMcBYCGwMHCwkIBwMCAQYVCAIJCgsE
FgIDAQIeAQIXgAAKCRCw3p3WKL8TL0KdB/93FcIZ3GCNwFU0u3EjNbNjmXBKDY4F
UGNQH2lvWAUy+dnyThpwdtF/jQ6j9RwE8VP0+NXcYpGJDWlNb9/JmYqLiX2Q3Tye
vpB0CA3dbBQp0OW0fgCetToGIQrg0MbD1C/sEOv8Mr4NAfbauXjZlvTj30H2jO0u
+6WGM6nHwbh2l5O8ZiHkH32iaSTfN7Eu5RnNVUJbvoPHZ8SlM4KWm8rG+lIkGurq
qu5gu8q8ZMKdsdGC4bBxdQKDKHEFExLJK/nRPFmAuGlId1E3fe10v5QL+qHI3EIP
tyfE7i9Hz6rVwi7lWKgh7pe0ZvatAudZ+JNIlBKptb64FaiIOAWDCx1SzR9KdWVy
Z2VuIEdyb3NzIDxqZ3Jvc3NAc3VzZS5jb20+wsB5BBMBAgAjBQJTjHCvAhsDBwsJ
CAcDAgEGFQgCCQoLBBYCAwECHgECF4AACgkQsN6d1ii/Ey/HmQf/RtI7kv5A2PS4
RF7HoZhPVPogNVbC4YA6lW7DrWf0teC0RR3MzXfy6pJ+7KLgkqMlrAbN/8Dvjoz7
8X+5vhH/rDLa9BuZQlhFmvcGtCF8eR0T1v0nC/nuAFVGy+67q2DH8As3KPu0344T
BDpAvr2uYM4tSqxK4DURx5INz4ZZ0WNFHcqsfvlGJALDeE0LhITTd9jLzdDad1pQ
SToCnLl6SBJZjDOX9QQcyUigZFtCXFst4dlsvddrxyqT1f17+2cFSdu7+ynLmXBK
7abQ3rwJY8SbRO2iRulogc5vr/RLMMlscDAiDkaFQWLoqHHOdfO9rURssHNN8WkM
nQfvUewRz80hSnVlcmdlbiBHcm9zcyA8amdyb3NzQG5vdmVsbC5jb20+wsB5BBMB
AgAjBQJTjHDXAhsDBwsJCAcDAgEGFQgCCQoLBBYCAwECHgECF4AACgkQsN6d1ii/
Ey8PUQf/ehmgCI9jB9hlgexLvgOtf7PJnFOXgMLdBQgBlVPO3/D9R8LtF9DBAFPN
hlrsfIG/SqICoRCqUcJ96Pn3P7UUinFG/I0ECGF4EvTE1jnDkfJZr6jrbjgyoZHi
w/4BNwSTL9rWASyLgqlA8u1mf+c2yUwcGhgkRAd1gOwungxcwzwqgljf0N51N5Jf
VRHRtyfwq/ge+YEkDGcTU6Y0sPOuj4Dyfm8fJzdfHNQsWq3PnczLVELStJNdapwP
OoE+lotufe3AM2vAEYJ9rTz3Cki4JFUsgLkHFqGZarrPGi1eyQcXeluldO3m91NK
/1xMI3/+8jbO0tsn1tqSEUGIJi7ox80eSnVlcmdlbiBHcm9zcyA8amdyb3NzQHN1
c2UuZGU+wsB5BBMBAgAjBQJTjHDrAhsDBwsJCAcDAgEGFQgCCQoLBBYCAwECHgEC
F4AACgkQsN6d1ii/Ey+LhQf9GL45eU5vOowA2u5N3g3OZUEBmDHVVbqMtzwlmNC4
k9Kx39r5s2vcFl4tXqW7g9/ViXYuiDXb0RfUpZiIUW89siKrkzmQ5dM7wRqzgJpJ
wK8Bn2MIxAKArekWpiCKvBOB/Cc+3EXE78XdlxLyOi/NrmSGRIov0karw2RzMNOu
5D+jLRZQd1Sv27AR+IP3I8U4aqnhLpwhK7MEy9oCILlgZ1QZe49kpcumcZKORmzB
TNh30FVKK1EvmV2xAKDoaEOgQB4iFQLhJCdP1I5aSgM5IVFdn7v5YgEYuJYx37Io
N1EblHI//x/e2AaIHpzK5h88NEawQsaNRpNSrcfbFmAg987ATQRTjHAWAQgAyzH6
AOODMBjgfWE9VeCgsrwH3exNAU32gLq2xvjpWnHIs98ndPUDpnoxWQugJ6MpMncr
0xSwFmHEgnSEjK/PAjppgmyc57BwKII3sV4on+gDVFJR6Y8ZRwgnBC5mVM6JjQ5x
Dk8WRXljExRfUX9pNhdE5eBOZJrDRoLUmmjDtKzWaDhIg/+1Hzz93X4fCQkNVbVF
LELU9bMaLPBG/x5q4iYZ2k2ex6d47YE1ZFdMm6YBYMOljGkZKwYde5ldM9mo45mm
we0icXKLkpEdIXKTZeKDO+Hdv1aqFuAcccTg9RXDQjmwhC3yEmrmcfl0+rPghO0I
v3OOImwTEe4co3c1mwARAQABwsBfBBgBAgAJBQJTjHAWAhsMAAoJELDendYovxMv
Q/gH/1ha96vm4P/L+bQpJwrZ/dneZcmEwTbe8YFsw2V/Buv6Z4Mysln3nQK5ZadD
534CF7TDVft7fC4tU4PONxF5D+/tvgkPfDAfF77zy2AH1vJzQ1fOU8lYFpZXTXIH
b+559UqvIB8AdgR3SAJGHHt4RKA0F7f5ipYBBrC6cyXJyyoprT10EMvU8VGiwXvT
yJz3fjoYsdFzpWPlJEBRMedCot60g5dmbdrZ5DWClAr0yau47zpWj3enf1tLWaqc
suylWsviuGjKGw7KHQd3bxALOknAp4dN3QwBYCKuZ7AddY9yjynVaD5X7nF9nO5B
jR/i1DG86lem3iBDXzXsZDn8R38=3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------DDUITxrpMQFqvmeqif0y83vA--

--------------0gPSdPzUPEcNzI04c8WYT5Ll--

--------------TM6SaXL8siRcJxQNQGUqgn4j
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmI0uacFAwAAAAAACgkQsN6d1ii/Ey8Y
2Af9H+sA3gToLVqND0JUAgm34RV3HcBKtmpQrwauUp+n2SxJt7BkiulazKmckqT1f3cwxZCYdmJK
y0z4QGH05zM2M+L8Zkij1zVgL+yT45i0ptVXqAbURrP5GRvPoAcCzdMcQRjFma+QxviH6iY6Tmp/
yRixaeI76WgVtjPGpg50MevpkP1xnYI8a6Rm6g3yXH6D+UA5kooDyRiz8CGTepBffR1jdKBAjLwy
PTbPY/KUMdeqfkOvj/5DAx5UvGFfY4DEkUf2WQ2F50AMQe8ZruD85Pi2SqTDkDin9YEeXOP1MJTj
WFa6WWbs9CwlBtaXRbk9N56f5g2mhfeijLVIrQ7h8g==
=qjJK
-----END PGP SIGNATURE-----

--------------TM6SaXL8siRcJxQNQGUqgn4j--


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 16:57:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 16:57:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292151.496182 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVFv5-0000lX-VX; Fri, 18 Mar 2022 16:57:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292151.496182; Fri, 18 Mar 2022 16:57:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVFv5-0000lQ-RH; Fri, 18 Mar 2022 16:57:43 +0000
Received: by outflank-mailman (input) for mailman id 292151;
 Fri, 18 Mar 2022 16:57:41 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVFv3-0000l5-S7; Fri, 18 Mar 2022 16:57:41 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVFv3-0006RJ-QE; Fri, 18 Mar 2022 16:57:41 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVFv3-0007DC-Be; Fri, 18 Mar 2022 16:57:41 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVFv3-0003DS-BC; Fri, 18 Mar 2022 16:57:41 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=voXqjZU1weidgPhuvnEUcFGzT0vuwDOMKGnDxvX/Bhs=; b=T8MT7winmz9YOu1NxdM2hsvZ9i
	LR+wIS6HgLjTVcr1EP46O0fzoLcZJLeYRNpKyLNo5E0dnV6DMzShDDG5WIgtb+PezNK4K6WZkeCap
	kqhen7ZrjpYlCY5vNK/Ym3oWAqNfN/ftI1gaV2HYQG0XSL0nepmYA7I7jo68HMYMRQJ4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168682-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168682: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 18 Mar 2022 16:57:41 +0000

flight 168682 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168682/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   18 days
Failing since        168258  2022-03-01 01:55:31 Z   17 days  169 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    0 days    5 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 17:48:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 17:48:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292158.496193 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVGi3-0005vS-OR; Fri, 18 Mar 2022 17:48:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292158.496193; Fri, 18 Mar 2022 17:48:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVGi3-0005vL-LT; Fri, 18 Mar 2022 17:48:19 +0000
Received: by outflank-mailman (input) for mailman id 292158;
 Fri, 18 Mar 2022 17:48:18 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVGi1-0005vB-Ui; Fri, 18 Mar 2022 17:48:17 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVGi1-0007Il-TE; Fri, 18 Mar 2022 17:48:17 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVGi1-0000oA-F5; Fri, 18 Mar 2022 17:48:17 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVGi1-0002cR-Eb; Fri, 18 Mar 2022 17:48:17 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=O/1AJ9iqsPX44JOeBXiZJ53jZcfl+brE+PPC2v7E/tA=; b=k7PRrwzX1NCVQPYCqI4JLrJSuM
	H1DMZyB3v/UqCbY5RQ3gOQSgj+5MfFY/E08Q/E7R3kkwXi3+RiWl9G4WvqOaFJazoiY62dzGBIHys
	NP4KfLSOJuvrclTnnR/KF4GjuB4alcn+ULqhTBsbnq0LpOQSKIilnTyR2m8mK40Obz+I=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168683-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168683: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 18 Mar 2022 17:48:17 +0000

flight 168683 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168683/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   18 days
Failing since        168258  2022-03-01 01:55:31 Z   17 days  170 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    0 days    6 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 17:59:05 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 17:59:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292172.496232 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVGsP-0007kG-4B; Fri, 18 Mar 2022 17:59:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292172.496232; Fri, 18 Mar 2022 17:59:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVGsO-0007k9-VZ; Fri, 18 Mar 2022 17:59:00 +0000
Received: by outflank-mailman (input) for mailman id 292172;
 Fri, 18 Mar 2022 17:58:59 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVGsN-0007jz-Pr; Fri, 18 Mar 2022 17:58:59 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVGsN-0007Tz-NO; Fri, 18 Mar 2022 17:58:59 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVGsN-00013G-Bb; Fri, 18 Mar 2022 17:58:59 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVGsN-0007mq-B7; Fri, 18 Mar 2022 17:58:59 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=d5FeCAoLPxViB8GEtUPqscVtz0KywChRMNx6wjoGiRo=; b=cirqMUGR3hn2KyS0DtBV1KVL4Q
	Wb+dXmE9ipmh2Qo082X/VwzY2LRInORR5+GaZM4OgUijM0us3agM1ofsqFRa+TlnoXa2zTJMmCObJ
	zwY4pNoajhSQzFmpEB6DpVzWw9fFw2sWJEpxuzZ+TY95r4s7diTcpRUxL4VIAkPU0fHY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168677-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168677: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-unstable:test-amd64-i386-qemut-rhel6hvm-intel:guest-start.2:fail:heisenbug
    xen-unstable:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:allowable
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=6974c75180f1aad44e5428eabf2396b2b50fb0e4
X-Osstest-Versions-That:
    xen=a3ba3ed0f45d3226320fd051c2066feaf7160d7a
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 18 Mar 2022 17:58:59 +0000

flight 168677 xen-unstable real [real]
flight 168684 xen-unstable real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168677/
http://logs.test-lab.xenproject.org/osstest/logs/168684/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-i386-qemut-rhel6hvm-intel 15 guest-start.2 fail pass in 168684-retest

Regressions which are regarded as allowable (not blocking):
 test-armhf-armhf-xl-rtds    18 guest-start/debian.repeat fail REGR. vs. 168665

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168665
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168665
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168665
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168665
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168665
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168665
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168665
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168665
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168665
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168665
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168665
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168665
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass

version targeted for testing:
 xen                  6974c75180f1aad44e5428eabf2396b2b50fb0e4
baseline version:
 xen                  a3ba3ed0f45d3226320fd051c2066feaf7160d7a

Last test of basis   168665  2022-03-17 17:08:14 Z    1 days
Testing same since   168677  2022-03-18 08:35:55 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bjoern Doebel <doebel@amazon.de>
  Jan Beulich <jbeulich@suse.com>
  Jiamei Xie <jiamei.xie@arm.com>
  Juergen Gross <jgross@suse.com>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         fail    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   a3ba3ed0f4..6974c75180  6974c75180f1aad44e5428eabf2396b2b50fb0e4 -> master


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 18:15:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 18:15:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292180.496243 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVH7p-0001kk-I9; Fri, 18 Mar 2022 18:14:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292180.496243; Fri, 18 Mar 2022 18:14:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVH7p-0001kd-Dt; Fri, 18 Mar 2022 18:14:57 +0000
Received: by outflank-mailman (input) for mailman id 292180;
 Fri, 18 Mar 2022 18:14:55 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nVH7n-0001kX-Td
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 18:14:55 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nVH7n-0007qp-Cn; Fri, 18 Mar 2022 18:14:55 +0000
Received: from [54.239.6.185] (helo=[192.168.15.239])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nVH7n-0006AO-5y; Fri, 18 Mar 2022 18:14:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=XbPLyCjUOg10ZAMRen5wN1VndU41gtFE4jklhfjIEX8=; b=NKxeFhEsGMMjOELPByvO86Ke7N
	3a0PlRM6sAs44jKvs8pjLkXknvZSgzx9NVeQvAYU+GtnIhYGpUMLcRTDkZMBQ3j5hZKicMo0BjGdu
	M4YCm90bLO1niTStncDwUogb/mrm5AyBq9igWREIQ3mhw6TvEhuAtDHYbCDl2A7WFWUQ=;
Message-ID: <bdb328d5-5fc4-e001-9bd6-6542d8f93c71@xen.org>
Date: Fri, 18 Mar 2022 18:14:52 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v11 1/3] xen/arm64: io: Emulate instructions (with invalid
 ISS) on MMIO region
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>,
 xen-devel@lists.xenproject.org
Cc: sstabellini@kernel.org, stefanos@xilinx.com, Volodymyr_Babchuk@epam.com,
 bertrand.marquis@arm.com, andrew.cooper3@citrix.com,
 george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org,
 roger.pau@citrix.com, Ayan Kumar Halder <ayankuma@xilinx.com>
References: <20220317140046.64563-1-ayankuma@xilinx.com>
 <20220317140046.64563-2-ayankuma@xilinx.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220317140046.64563-2-ayankuma@xilinx.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Ayan,

On 17/03/2022 14:00, Ayan Kumar Halder wrote:
> When an instruction is trapped in Xen due to translation fault, Xen
> checks if the ISS is invalid (for data abort) or it is an instruction
> abort. If so, Xen tries to resolve the translation fault using p2m page
> tables. In case of data abort, Xen will try to map the mmio region to
> the guest (ie tries to emulate the mmio region).
> 
> If the ISS is not valid and it is a data abort, then Xen tries to
> decode the instruction. In case of ioreq, Xen  saves the decoding state,
> rn and imm9 to vcpu_io. Whenever the vcpu handles the ioreq successfully,
> it will read the decoding state to determine if the instruction decoded
> was a ldr/str post indexing (ie INSTR_LDR_STR_POSTINDEXING). If so, it
> uses these details to post increment rn.
> 
> In case of mmio handler, if the mmio operation was successful, then Xen
> retrives the decoding state, rn and imm9. For state ==
> INSTR_LDR_STR_POSTINDEXING, Xen will update rn.
> 
> If there is an error encountered while decoding/executing the instruction,
> Xen will forward the abort to the guest.
> 
> Also, the logic to infer the type of instruction has been moved from
> try_handle_mmio() to try_decode_instruction() which is called before.
> try_handle_mmio() is solely responsible for handling the mmio operation.
> 
> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>

Reviewed-by: Julien Grall <jgrall@amazon.com>

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 18:15:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 18:15:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292182.496253 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVH8l-0002Jf-Rb; Fri, 18 Mar 2022 18:15:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292182.496253; Fri, 18 Mar 2022 18:15:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVH8l-0002JY-OY; Fri, 18 Mar 2022 18:15:55 +0000
Received: by outflank-mailman (input) for mailman id 292182;
 Fri, 18 Mar 2022 18:15:54 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nVH8k-0002JL-6M
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 18:15:54 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nVH8j-0007td-ND; Fri, 18 Mar 2022 18:15:53 +0000
Received: from [54.239.6.185] (helo=[192.168.15.239])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nVH8j-0006D9-HW; Fri, 18 Mar 2022 18:15:53 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=yS4zStiCcXlz+FAhjm54uQnUpkk5NghZvttvPUi8khY=; b=0QU22i9B4hKbh0FOKZe2d+nvJr
	qt5QF6KEDm9fpdZ7aWOLra9aOD3Tt//H7j+3rng3L/BpizElJ80JsnORsxtthwr3GpcH9oWhXMo3R
	EnXizpVy3eqBo5b1hVzyoMNrA9MiG2lAl4eAQ7WF7S9Wgw0uaRHu76brOgsrWnd08upk=;
Message-ID: <846a872e-07ce-d744-a07f-8df80cc64721@xen.org>
Date: Fri, 18 Mar 2022 18:15:50 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v11 2/3] xen/arm64: io: Handle the abort due to access to
 stage1 translation table
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>,
 xen-devel@lists.xenproject.org
Cc: sstabellini@kernel.org, stefanos@xilinx.com, Volodymyr_Babchuk@epam.com,
 bertrand.marquis@arm.com, andrew.cooper3@citrix.com,
 george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org,
 roger.pau@citrix.com, Ayan Kumar Halder <ayankuma@xilinx.com>
References: <20220317140046.64563-1-ayankuma@xilinx.com>
 <20220317140046.64563-3-ayankuma@xilinx.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220317140046.64563-3-ayankuma@xilinx.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Ayan,

On 17/03/2022 14:00, Ayan Kumar Halder wrote:
> If the abort was caused due to access to stage1 translation table, Xen
> will try to set the p2m entry (assuming that the Stage 1 translation
> table is in a non MMIO region).
> If there is no such entry found, then Xen will try to map the address as
> a MMIO region (assuming that the Stage 1 translation table is in a
> direct MMIO region).
> 
> If that fails as well, then there are the two following scenarios:-
> 1. Stage 1 translation table being in an emulated MMIO region - Xen
> can read the region, but it has no way to return the value read to the
> CPU page table walker (which tries to go through the stage1 tables to
> resolve the translation fault).
> 
> 2. Stage 1 translation table address is invalid.
> 
> In both the above scenarios, Xen will forward the abort to the guest.
> 
> Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>

Reviewed-by: Julien Grall <jgrall@amazon.com>

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 18:26:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 18:26:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292187.496265 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVHIf-0003pe-Ni; Fri, 18 Mar 2022 18:26:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292187.496265; Fri, 18 Mar 2022 18:26:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVHIf-0003pX-KY; Fri, 18 Mar 2022 18:26:09 +0000
Received: by outflank-mailman (input) for mailman id 292187;
 Fri, 18 Mar 2022 18:26:08 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nVHIe-0003pR-1h
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 18:26:08 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nVHId-000846-Ch; Fri, 18 Mar 2022 18:26:07 +0000
Received: from [54.239.6.185] (helo=[192.168.15.239])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nVHId-0006uJ-62; Fri, 18 Mar 2022 18:26:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=3ZRF7t26NrGP+GW64wh2UokE+/JRdlMaC2UXQAW8bhY=; b=GAcsg59QQO7La24Q6i3l0UTAOp
	5xliFSZrHibl36fJZQnd+HyzIRvgmFgGzSoZ+AXtk6l1dFQJN2btnIK28SCnamV3cUAv32Ef/wxs3
	eyib42oIPtWDc9HlbTToMTdt7v+k4IopH7StKgSQcBvGpXPggiin27NJOuE5qjY4g4wA=;
Message-ID: <3d6a341d-712d-8701-caf2-49301ae1e01b@xen.org>
Date: Fri, 18 Mar 2022 18:26:03 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v11 3/3] xen/arm64: io: Handle data abort due to cache
 maintenance instructions
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>,
 xen-devel@lists.xenproject.org
Cc: sstabellini@kernel.org, stefanos@xilinx.com, Volodymyr_Babchuk@epam.com,
 bertrand.marquis@arm.com, andrew.cooper3@citrix.com,
 george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org,
 roger.pau@citrix.com, Ayan Kumar Halder <ayankuma@xilinx.com>
References: <20220317140046.64563-1-ayankuma@xilinx.com>
 <20220317140046.64563-4-ayankuma@xilinx.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220317140046.64563-4-ayankuma@xilinx.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Ayan,

On 17/03/2022 14:00, Ayan Kumar Halder wrote:
> diff --git a/xen/arch/arm/include/asm/mmio.h b/xen/arch/arm/include/asm/mmio.h
> index ca259a79c2..79e64d9af8 100644
> --- a/xen/arch/arm/include/asm/mmio.h
> +++ b/xen/arch/arm/include/asm/mmio.h
> @@ -35,6 +35,7 @@ enum instr_decode_state
>        * instruction.
>        */
>       INSTR_LDR_STR_POSTINDEXING,
> +    INSTR_CACHE,                    /* Cache Maintenance instr */
>   };
>   
>   typedef struct
> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
> index 6f458ee7fd..26c716b4a5 100644
> --- a/xen/arch/arm/io.c
> +++ b/xen/arch/arm/io.c
> @@ -139,6 +139,17 @@ void try_decode_instruction(const struct cpu_user_regs *regs,
>           return;
>       }
>   
> +    /*
> +     * When the data abort is caused due to cache maintenance, Xen should check
> +     * if the address belongs to an emulated MMIO region or not. The behavior
> +     * will differ accordingly.
> +     */
> +    if ( info->dabt.cache )
> +    {
> +        info->dabt_instr.state = INSTR_CACHE;
> +        return;
> +    }
> +
>       /*
>        * Armv8 processor does not provide a valid syndrome for decoding some
>        * instructions. So in order to process these instructions, Xen must
> @@ -177,6 +188,13 @@ enum io_state try_handle_mmio(struct cpu_user_regs *regs,
>           return rc;
>       }
>   
> +    /*
> +     * When the data abort is caused due to cache maintenance and the address
> +     * belongs to an emulated region, Xen should ignore this instruction.
> +     */
> +    if ( info->dabt_instr.state == INSTR_CACHE )

Reading the Arm Arm, the ISS should be invalid for cache instructions. 
So, I think the check at the beginning of try_handle_mmio() would 
prevent us to reach this check.

Can you check that cache instructions on emulated region will 
effectively be ignored?

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 18:31:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 18:31:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292190.496275 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVHNQ-0005Ex-Az; Fri, 18 Mar 2022 18:31:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292190.496275; Fri, 18 Mar 2022 18:31:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVHNQ-0005Eq-7O; Fri, 18 Mar 2022 18:31:04 +0000
Received: by outflank-mailman (input) for mailman id 292190;
 Fri, 18 Mar 2022 18:31:03 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVHNP-0005Eg-MJ; Fri, 18 Mar 2022 18:31:03 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVHNP-00089c-LT; Fri, 18 Mar 2022 18:31:03 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVHNP-00020A-8V; Fri, 18 Mar 2022 18:31:03 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVHNP-0001Hh-85; Fri, 18 Mar 2022 18:31:03 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=7jVBjwdkkSLgFRqh582z52HJu1/+Nl4uHtBSc6Oxkms=; b=MTQlEgAnk5pLSBxlmfkDCcQVbf
	3CSdmDPnvnacbWoFoncfjIOQe8YbFbMxAD0mk6ZuJZjzhuP74OR5JhZRwQRBAaA/NzCzbvL2u3ouu
	etIyVOIW4m1BYrfJX3OPdzj/hzHIq9emzdTPXfSltib7m+FLtmaf4OU541rDx+NmR1OU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168685-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168685: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 18 Mar 2022 18:31:03 +0000

flight 168685 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168685/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   18 days
Failing since        168258  2022-03-01 01:55:31 Z   17 days  171 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    0 days    7 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 18:40:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 18:40:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292197.496286 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVHWX-0006gH-8P; Fri, 18 Mar 2022 18:40:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292197.496286; Fri, 18 Mar 2022 18:40:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVHWX-0006gA-5K; Fri, 18 Mar 2022 18:40:29 +0000
Received: by outflank-mailman (input) for mailman id 292197;
 Fri, 18 Mar 2022 18:40:28 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nVHWW-0006g4-64
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 18:40:28 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nVHWV-0008Ji-Q4; Fri, 18 Mar 2022 18:40:27 +0000
Received: from [54.239.6.185] (helo=[192.168.15.239])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nVHWV-0007mu-I7; Fri, 18 Mar 2022 18:40:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=RNhdKMhsb6YK60CTOWVrvwGk8lHohu7HpXO5h+Dc+To=; b=GLNXIF2gMFC1wdkYis4PVUHCax
	VcdyajX7dMMjwTf4QkR1ZhfdZoNG3vTfms9em2+J1D4aRMNusfN0tgcncx7sqQ5wVnGBu5YV5XO8M
	ZXZnqTfb+7afRBU3I9WE+7i+mioPbTkE1ZjxWusEylqJtizE43jd5HFxMqrLPhx9h6RQ=;
Message-ID: <110ecc17-4d36-c5d1-675b-a4e072ea0ee0@xen.org>
Date: Fri, 18 Mar 2022 18:40:25 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH 1/3] tools/xenstore: add documentation for new
 set/get-feature commands
To: Juergen Gross <jgross@suse.com>, xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
References: <20220316161017.3579-1-jgross@suse.com>
 <20220316161017.3579-2-jgross@suse.com>
 <d44b8e44-4e7e-c395-da9c-916ec641a687@xen.org>
 <96c31b21-3f96-4f17-07d6-64c7186ce2dd@suse.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <96c31b21-3f96-4f17-07d6-64c7186ce2dd@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi Juergen,

On 17/03/2022 11:19, Juergen Gross wrote:
> On 17.03.22 12:07, Julien Grall wrote:
>> On 16/03/2022 16:10, Juergen Gross wrote:
>>> Add documentation for two new Xenstore wire commands SET_FEATURE and
>>> GET_FEATURE used to set or query the Xenstore features visible in the
>>> ring page of a given domain.
>>>
>>> Signed-off-by: Juergen Gross <jgross@suse.com>
>>> ---
>>>   docs/misc/xenstore-ring.txt |  1 +
>>>   docs/misc/xenstore.txt      | 12 ++++++++++++
>>>   2 files changed, 13 insertions(+)
>>>
>>> diff --git a/docs/misc/xenstore-ring.txt b/docs/misc/xenstore-ring.txt
>>> index f91accb5b0..bd000f694e 100644
>>> --- a/docs/misc/xenstore-ring.txt
>>> +++ b/docs/misc/xenstore-ring.txt
>>> @@ -68,6 +68,7 @@ Mask    Description
>>
>> I find a bit odd we describe the feature in term of mask rather bit. 
>> This will get more difficult to read as we add more bits.
> 
> Maybe this is in order to avoid big/little endian issues (which bit is
> bit 0?)

Both end have to talk the same endianess. Otherwise, one may read the 
wrong value.

So long they are using the same endianess, bit 0 is not going to be matter.

>>>   The "Connection state" field is used to request a ring close and 
>>> reconnect.
>>>   The "Connection state" field only contains valid data if the server 
>>> has
>>> diff --git a/docs/misc/xenstore.txt b/docs/misc/xenstore.txt
>>> index ea3d8be177..31e3d53c52 100644
>>> --- a/docs/misc/xenstore.txt
>>> +++ b/docs/misc/xenstore.txt
>>> @@ -332,6 +332,18 @@ SET_TARGET        <domid>|<tdomid>|
>>>       xenstored prevents the use of SET_TARGET other than by dom0.
>>> +GET_FEATURE        <domid>|        <value>|
>>
>> Did you indented to add many spaces before <value>?
>>
>>> +SET_FEATURE        <domid>|<value>|
>>> +    Returns or sets the contents of the "feature" field located at
>>> +    offset 2064 of the Xenstore ring page of the domain specified by
>>> +    <domid>. <value> is a decimal number being a logical or of the
>>> +    feature bits as defined in docs/misc/xenstore-ring.txt. Trying
>>> +    to set a bit for a feature not being supported by the running
>>> +    Xenstore will be denied.
>> How will the caller know which feature is supported? Also, what happen 
>> if a client decided to overwrite 'feature'? Could the result 
>> potentially prevent migration/liveupdate or else?
> 
> The caller could use "GET_FEATURE 0" to see the available features, 
> assuming
> that nobody would have changed dom0's features.
> 
> I'm not sure whether we should prevent dom0's features to be overwritten.

I think it would be better to have a separate "domid" (maybe "server" or 
"global") to retrieve features supported by the server.

This would give us some flexibility to update dom0 features in the 
future if the needs arise (the first implementation may forbid it).

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 19:27:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 19:27:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292200.496298 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVIG4-0002Yt-OO; Fri, 18 Mar 2022 19:27:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292200.496298; Fri, 18 Mar 2022 19:27:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVIG4-0002Ym-LN; Fri, 18 Mar 2022 19:27:32 +0000
Received: by outflank-mailman (input) for mailman id 292200;
 Fri, 18 Mar 2022 19:27:31 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVIG2-0002Yc-Vj; Fri, 18 Mar 2022 19:27:30 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVIG2-0000er-OR; Fri, 18 Mar 2022 19:27:30 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVIG2-00042k-DY; Fri, 18 Mar 2022 19:27:30 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVIG2-0001qN-D7; Fri, 18 Mar 2022 19:27:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=TTUbMCV5VuzsPG0JfISEjHWv2RoYzwF4BGsDqjx6J00=; b=LrlwRHX3Rz10jeUMKYbHhOLaOC
	sLINwQmjFnMDO1xnQhCtBHQqkhUMyHK4MRNkeU4NwpiF5MNhwXtX4TiiJGuoZRxRjuxmP9mkig2kL
	OVA/Od2ecVt2N39piwQNhyuR9QKAyUHiESjHsu5if/gWuw5rGPUE0s26+R+Wi1DQivb8=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168686-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168686: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 18 Mar 2022 19:27:30 +0000

flight 168686 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168686/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   18 days
Failing since        168258  2022-03-01 01:55:31 Z   17 days  172 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    0 days    8 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 19:44:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 19:44:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292208.496308 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVIWV-0004xh-AO; Fri, 18 Mar 2022 19:44:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292208.496308; Fri, 18 Mar 2022 19:44:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVIWV-0004xa-7Y; Fri, 18 Mar 2022 19:44:31 +0000
Received: by outflank-mailman (input) for mailman id 292208;
 Fri, 18 Mar 2022 19:44:29 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nVIWT-0004xU-SL
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 19:44:29 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nVIWT-0000vJ-9n; Fri, 18 Mar 2022 19:44:29 +0000
Received: from gw1.octic.net ([81.187.162.82] helo=[10.0.1.102])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nVIWT-0003TY-4C; Fri, 18 Mar 2022 19:44:29 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=WGEPkWDckwgCoDnOtCpuyUtQNkb6vX3wTfn0Jwt4+jc=; b=fopjsWLfV7EfdnaVo2n1o14NxE
	5eCC8+2C74YnGZIC3Adpa8zGN/714lohqvaYsAWn3jeYHOozMrTXvRJZaKNR8RQwS+HYiOpaMCGmp
	6z2S94c12c6lNHnlpmuoYWSQD8GGG5cz+1qJvKF7buc2+HnaNGPEGI72+2gyt1+IqN0k=;
Message-ID: <8201257a-74c1-4a47-77d5-0b9b2daec6f9@xen.org>
Date: Fri, 18 Mar 2022 19:44:26 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
Subject: Re: [PATCH v3 08/19] xen/arm: mm: Re-implement early_fdt_map() using
 map_pages_to_xen()
To: Hongda Deng <Hongda.Deng@arm.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Julien Grall <Julien.Grall@arm.com>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <Bertrand.Marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Julien Grall <jgrall@amazon.com>
References: <20220221102218.33785-1-julien@xen.org>
 <20220221102218.33785-9-julien@xen.org>
 <DBAPR08MB5670F9858ED3EE701C7F9C8BE6139@DBAPR08MB5670.eurprd08.prod.outlook.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <DBAPR08MB5670F9858ED3EE701C7F9C8BE6139@DBAPR08MB5670.eurprd08.prod.outlook.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

On 18/03/2022 07:36, Hongda Deng wrote:
> Hi Julien,

Hi Hongda,

>> -----Original Message-----
>> From: Xen-devel <xen-devel-bounces@lists.xenproject.org> On Behalf Of Julien
>> Grall
>> Sent: 2022年2月21日 18:22
>> To: xen-devel@lists.xenproject.org
>> Cc: julien@xen.org; Julien Grall <Julien.Grall@arm.com>; Stefano Stabellini
>> <sstabellini@kernel.org>; Bertrand Marquis <Bertrand.Marquis@arm.com>;
>> Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>; Julien Grall
>> <jgrall@amazon.com>
>> Subject: [PATCH v3 08/19] xen/arm: mm: Re-implement early_fdt_map() using
>> map_pages_to_xen()
>>
>> From: Julien Grall <julien.grall@arm.com>
>>
>> Now that map_pages_to_xen() has been extended to support 2MB mappings,
>> we can replace the create_mappings() calls by map_pages_to_xen() calls.
>>
>> The mapping can also be marked read-only has Xen as no business to
> 
> In my opinion I think it may should be:
> 	... read-only as Xen has no business ...
> instead of:
> 	... read-only has Xen as no business ...

You are right, I have updated the commit message.

> 
> For this and other patches before this:
> Reviewed-by: Hongda Deng <Hongda.Heng@arm.com>

There is one bug in patch #5 (I sent an e-mail with the possible fix). 
Can you confirm you are still happy with me to keep your reviewed-by for 
that patch?

For the other patches, I have already committed patch #1-#3. So I will 
add your tag on patches #4, #6, #7, #8.

Thank you for the review!

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 20:00:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 20:00:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292212.496320 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVImK-0007Ot-N3; Fri, 18 Mar 2022 20:00:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292212.496320; Fri, 18 Mar 2022 20:00:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVImK-0007Om-K5; Fri, 18 Mar 2022 20:00:52 +0000
Received: by outflank-mailman (input) for mailman id 292212;
 Fri, 18 Mar 2022 20:00:51 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVImJ-0007OI-E5; Fri, 18 Mar 2022 20:00:51 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVImJ-0001IO-BV; Fri, 18 Mar 2022 20:00:51 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVImI-0004zw-T4; Fri, 18 Mar 2022 20:00:51 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVImI-000360-Se; Fri, 18 Mar 2022 20:00:50 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=t2Ws2jCOYqmtBzhsQ16R84vf3QnZJcMsdYYCmXnAX94=; b=FSaAkElEaScMgjriWIH1m1FeRT
	jWS52OUuLXGY93j5/bDgvQpEFCrhX9I1YyI8GhAbNCoIUWKV+ca6VOEnbZQhwhrG89V3/dVr/plm/
	0Ce3qmR+/JIb6H2WXo9rts6FeKn25iIt9ZtjgRVBWuC9YpdLytDD8YYBWd+tA7yc9f4o=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168687-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168687: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 18 Mar 2022 20:00:50 +0000

flight 168687 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168687/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   18 days
Failing since        168258  2022-03-01 01:55:31 Z   17 days  173 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    0 days    9 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 20:30:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 20:30:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292219.496330 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVJEl-0002Dc-1e; Fri, 18 Mar 2022 20:30:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292219.496330; Fri, 18 Mar 2022 20:30:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVJEk-0002DV-V0; Fri, 18 Mar 2022 20:30:14 +0000
Received: by outflank-mailman (input) for mailman id 292219;
 Fri, 18 Mar 2022 20:30:13 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVJEj-0002DL-U0; Fri, 18 Mar 2022 20:30:13 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVJEj-0001n8-QR; Fri, 18 Mar 2022 20:30:13 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVJEj-0005fD-7u; Fri, 18 Mar 2022 20:30:13 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVJEj-0002DR-7Q; Fri, 18 Mar 2022 20:30:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=N32ZtX+juS2FyQ774BnmzNUgYBsrfNb6SIpYUUIGGXE=; b=Hijc2IMMyNoB30RJ1KSN8Br1p0
	GHZaSymeCpl/29LxumpQ4tIAdlQLJ/lDlm+8GvUIDS20UjhJ/LvCVGIW+h+ZHo1aUhZLAlghXdnsB
	dCmwe4kL03h3lXKqYdLISOmfL19tYeSHs/2vEWkMgNcEZoOpypnC0PTMgp1Xy7vkuGPM=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168688-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168688: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 18 Mar 2022 20:30:13 +0000

flight 168688 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168688/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   18 days
Failing since        168258  2022-03-01 01:55:31 Z   17 days  174 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    0 days   10 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 21:28:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 21:28:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292227.496341 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVK8k-0007Rl-Eq; Fri, 18 Mar 2022 21:28:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292227.496341; Fri, 18 Mar 2022 21:28:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVK8k-0007Re-By; Fri, 18 Mar 2022 21:28:06 +0000
Received: by outflank-mailman (input) for mailman id 292227;
 Fri, 18 Mar 2022 21:28:05 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVK8j-0007RU-Fe; Fri, 18 Mar 2022 21:28:05 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVK8j-0002jF-Dx; Fri, 18 Mar 2022 21:28:05 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVK8j-0006xB-4W; Fri, 18 Mar 2022 21:28:05 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVK8j-0007V8-41; Fri, 18 Mar 2022 21:28:05 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=gi90E8HQBZRa/OyG/cK6Svv9/1Pw0CK3uBtpFfE7JzU=; b=MOhmIbKMaZ5JEzmyN1Q+HP7bXt
	zVO0GzbUObUO6HCzFCFAswvYTecTYCxv0rlPRE9/LvsVDwQoXwu99RVvD63ALxceDjZcBrQFJ6JGP
	ZTBZnkHprwnW7fXJdbRDtwChLxJr89GQ8UufA5c3mjinEy2PJE0ZNY/5dRptxSLXJrdQ=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168689-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168689: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 18 Mar 2022 21:28:05 +0000

flight 168689 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168689/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   18 days
Failing since        168258  2022-03-01 01:55:31 Z   17 days  175 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    0 days   11 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 21:34:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 21:34:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292234.496352 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVKEm-0000Pr-4J; Fri, 18 Mar 2022 21:34:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292234.496352; Fri, 18 Mar 2022 21:34:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVKEm-0000Pk-1P; Fri, 18 Mar 2022 21:34:20 +0000
Received: by outflank-mailman (input) for mailman id 292234;
 Fri, 18 Mar 2022 21:34:18 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3xU5=T5=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nVKEk-0000Pe-Gu
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 21:34:18 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org
 [2604:1380:4641:c500::1])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 289f64aa-a703-11ec-8fbc-03012f2f19d4;
 Fri, 18 Mar 2022 22:34:17 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 74C1B61423;
 Fri, 18 Mar 2022 21:34:14 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 844B9C340E8;
 Fri, 18 Mar 2022 21:34:13 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 289f64aa-a703-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647639253;
	bh=/Z1/M59ERRvXYmQlgycDFVEYINXXv8fogwEEU16Qt4M=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=ZiR4AmRfKV8EXsbSsSYThjhv5snfOKECbUvrz/85NVtCPg6RpN8wdZgFA7tULHxL8
	 QQVcQyzjIEav97Ihf8ZNXPBARhz5OXmTQLGXZNtYQWds/uS05G+EzB2ryVZJ5s3Zzg
	 v1+/e9faKKmJOOTu1ezLrx6mY6h4XWiDiFzI3j/gFTq/AxtaBcXgmg1zdf4+lbTcOi
	 6lrV3ULA1mNwkID7upto1Gif4VR71Mc6VIt5KgJR4TLKoUdv81uZqS2KkQ0TkBjRER
	 zzpoqiKeFVUXSzaS49Oywk1xAsGpGcVGH5e1cZfpgSuiP9WX1gzt6hSBebkrHFLDKR
	 eCecZIx2ciQFA==
Date: Fri, 18 Mar 2022 14:34:13 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Luca Fancellu <Luca.Fancellu@arm.com>
cc: Julia Lawall <Julia.Lawall@inria.fr>, 
    Stefano Stabellini <sstabellini@kernel.org>, 
    "kernel-janitors@vger.kernel.org" <kernel-janitors@vger.kernel.org>, 
    Russell King <linux@armlinux.org.uk>, 
    "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, 
    "linux-arm-kernel@lists.infradead.org" <linux-arm-kernel@lists.infradead.org>, 
    "linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>
Subject: Re: [PATCH] xen/arm: fix typos in comments
In-Reply-To: <50B35A3D-9848-4B89-8935-AD3A1330D7CF@arm.com>
Message-ID: <alpine.DEB.2.22.394.2203181430300.2910984@ubuntu-linux-20-04-desktop>
References: <20220318103729.157574-15-Julia.Lawall@inria.fr> <50B35A3D-9848-4B89-8935-AD3A1330D7CF@arm.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Fri, 18 Mar 2022, Luca Fancellu wrote:
> > On 18 Mar 2022, at 10:37, Julia Lawall <Julia.Lawall@inria.fr> wrote:
> > 
> > Various spelling mistakes in comments.
> > Detected with the help of Coccinelle.
> > 
> > Signed-off-by: Julia Lawall <Julia.Lawall@inria.fr>
> 
> Reviewed-by: Luca Fancellu <luca.fancellu@arm.com>

Acked-by: Stefano Stabellini <sstabellini@kernel.org>

I assume this patch will go via the trivial tree? If not and you want
this patch to be picked up in the Xen tree let me know.


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 21:47:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 21:47:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292237.496364 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVKRi-0001wJ-8k; Fri, 18 Mar 2022 21:47:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292237.496364; Fri, 18 Mar 2022 21:47:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVKRi-0001wC-5b; Fri, 18 Mar 2022 21:47:42 +0000
Received: by outflank-mailman (input) for mailman id 292237;
 Fri, 18 Mar 2022 21:47:40 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVKRg-0001w2-8h; Fri, 18 Mar 2022 21:47:40 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVKRg-00033Z-4r; Fri, 18 Mar 2022 21:47:40 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVKRf-0007Pc-IL; Fri, 18 Mar 2022 21:47:39 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVKRf-0002D2-Hs; Fri, 18 Mar 2022 21:47:39 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=TbKAmg5hIgbKx86z/l00wgLQu2OeEuyaK6EUc5V8+pA=; b=aWQKQLvgfKROCPJKu7h9Lfnw5W
	DvRmZ/NqMkSnIIGAxsMmX87eqLklvt1EyBEcRfvjj01Ujb/16VPkiCXcmX3DaQm30mk+FL1cgM1hu
	bCQrzoKxMR0v69yO0qQx18q5uI8P8sUrlLGd3oHDndgNv3icrXdbUosfoQxl6eUDm9ig=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168681-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168681: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl-rtds:guest-start/debian.repeat:fail:heisenbug
    linux-linus:test-amd64-amd64-xl-multivcpu:guest-start:fail:heisenbug
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=551acdc3c3d2b6bc97f11e31dcf960bc36343bfc
X-Osstest-Versions-That:
    linux=56e337f2cf1326323844927a04e9dbce9a244835
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 18 Mar 2022 21:47:39 +0000

flight 168681 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168681/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-rtds 22 guest-start/debian.repeat fail in 168674 pass in 168681
 test-amd64-amd64-xl-multivcpu 14 guest-start               fail pass in 168674

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168620
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168620
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168620
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168620
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168620
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168620
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168620
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168620
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                551acdc3c3d2b6bc97f11e31dcf960bc36343bfc
baseline version:
 linux                56e337f2cf1326323844927a04e9dbce9a244835

Last test of basis   168620  2022-03-15 18:10:19 Z    3 days
Testing same since   168667  2022-03-17 21:13:01 Z    1 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Alexander Lobakin <alexandr.lobakin@intel.com>
  Andrew Morton <akpm@linux-foundation.org>
  Ard Biesheuvel <ardb@kernel.org>
  Ariel Elior <aelior@marvell.com>
  Bharathi Sreenivas <bharathi.sreenivas@intel.com>
  Brian Masney <bmasney@redhat.com>
  Claudiu Beznea <claudiu.beznea@microchip.com>
  David S. Miller <davem@davemloft.net>
  Doug Berger <opendmb@gmail.com>
  Eric Dumazet <edumazet@google.com>
  Florian Fainelli <f.fainelli@gmail.com>
  Florian Westphal <fw@strlen.de>
  Guo Ziliang <guo.ziliang@zte.com.cn>
  Gurucharan G <gurucharanx.g@intel.com> (A Contingent worker at Intel)
  Haimin Zhang <tcs_kernel@tencent.com>
  Herbert Xu <herbert@gondor.apana.org.au>
  Hugh Dickins <hughd@google.com>
  Ivan Vecera <ivecera@redhat.com>
  Jakub Kicinski <kuba@kernel.org>
  Jiasheng Jiang <jiasheng@iscas.ac.cn>
  Jiyong Park <jiyong@google.com>
  Joseph Qi <joseph.qi@linux.alibaba.com>
  Juerg Haefliger <juerg.haefliger@canonical.com>
  Juerg Haefliger <juergh@canonical.com>
  Kalle Valo <quic_kvalo@quicinc.com>
  Konrad Jankowski <konrad0.jankowski@intel.com>
  Kurt Cancemi <kurt@x64architecture.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Maciej Fijalkowski <maciej.fijalkowski@intel.com>
  Manish Chopra <manishc@marvell.com>
  Mateusz Palczewski <mateusz.palczewski@intel.com>
  Miaoqian Lin <linmq006@gmail.com>
  Michael S. Tsirkin <mst@redhat.com>
  Michael Walle <michael@walle.cc>
  Nicolas Dichtel <nicolas.dichtel@6wind.com>
  Niels Dossche <dossche.niels@gmail.com>
  Pablo Neira Ayuso <pablo@netfilter.org>
  Paolo Abeni <pabeni@redhat.com>
  Paul Menzel <pmenzel@molgen.mpg.de>
  Przemyslaw Patynowski <przemyslawx.patynowski@intel.com>
  Qian Cai <quic_qiancai@quicinc.com>
  Rafael J. Wysocki <rafael.j.wysocki@intel.com>
  Randy Dunlap <rdunlap@infradead.org>
  Sabrina Dubroca <sd@queasysnail.net>
  Steffen Klassert <steffen.klassert@secunet.com>
  Sudheer Mogilappagari <sudheer.mogilappagari@intel.com>
  Tadeusz Struk <tadeusz.struk@linaro.org>
  Tony Nguyen <anthony.l.nguyen@intel.com>
  Vladimir Oltean <vladimir.oltean@nxp.com>
  Willem de Bruijn <willemb@google.com>
  Yosry Ahmed <yosryahmed@google.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                fail    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   56e337f2cf13..551acdc3c3d2  551acdc3c3d2b6bc97f11e31dcf960bc36343bfc -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 21:50:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 21:50:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292245.496375 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVKUW-0003Nh-Ss; Fri, 18 Mar 2022 21:50:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292245.496375; Fri, 18 Mar 2022 21:50:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVKUW-0003Na-OZ; Fri, 18 Mar 2022 21:50:36 +0000
Received: by outflank-mailman (input) for mailman id 292245;
 Fri, 18 Mar 2022 21:50:36 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3xU5=T5=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nVKUW-0003NU-60
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 21:50:36 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6f20942b-a705-11ec-a405-831a346695d4;
 Fri, 18 Mar 2022 22:50:34 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id DF5996149A;
 Fri, 18 Mar 2022 21:50:31 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id B76B2C340E8;
 Fri, 18 Mar 2022 21:50:30 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6f20942b-a705-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647640231;
	bh=p8ry/hNCFSOT0oYHk0/ml1Pjp/je6u51H6cq1IPkFlY=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=Uux0MzJ3LrV98e5SxuKVVUk+YA8NM7x3Kl2Oku9vtsL3sW2jCLzZXd0kRUCP33BeV
	 l/Ha+IYJ49yYwddegmm88j8eusVbZF/WSw0JCpAg3t+jrInY0MPGpzlzUfpENNWp4F
	 AsDx34Ax5rLslN4fsBi7Xe3Yw3thwBPq3AqrQWZgNrydBeMPfvS6/M4rAlbPns8OOL
	 Dj22kaiCnZdNVaF7MxGiw+DsmKOcgIdVBdXxdP7YxLH3xjS4M0iQjV1T0FeDtDPoDU
	 J0W/reqZisblmir2zNNWhhWw28WNbnB+Fds3U0vCuWlNty4WA+w3veHOW3GlJbiU2P
	 IXj4/Zl7jQanQ==
Date: Fri, 18 Mar 2022 14:50:30 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Jan Beulich <jbeulich@suse.com>
cc: Penny Zheng <Penny.Zheng@arm.com>, nd@arm.com, 
    Penny Zheng <penzhe01@a011292.shanghai.arm.com>, 
    Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>, 
    Bertrand Marquis <bertrand.marquis@arm.com>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, 
    Andrew Cooper <andrew.cooper3@citrix.com>, 
    George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>, 
    xen-devel@lists.xenproject.org
Subject: Re: [PATCH v1 02/13] xen/arm: introduce a special domain
 DOMID_SHARED
In-Reply-To: <eefa9cf2-a04c-ba8d-74cb-0d2aaa35badb@suse.com>
Message-ID: <alpine.DEB.2.22.394.2203181443440.2910984@ubuntu-linux-20-04-desktop>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com> <20220311061123.1883189-3-Penny.Zheng@arm.com> <eefa9cf2-a04c-ba8d-74cb-0d2aaa35badb@suse.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Fri, 18 Mar 2022, Jan Beulich wrote:
> On 11.03.2022 07:11, Penny Zheng wrote:
> > In case to own statically shared pages when owner domain is not
> > explicitly defined, this commits propose a special domain DOMID_SHARED,
> > and we assign it 0x7FF5, as one of the system domains.
> > 
> > Statically shared memory reuses the same way of initialization with static
> > memory, hence this commits proposes a new Kconfig CONFIG_STATIC_SHM to wrap
> > related codes, and this option depends on static memory(CONFIG_STATIC_MEMORY).
> > 
> > We intends to do shared domain creation after setup_virt_paging so shared
> > domain could successfully do p2m initialization.
> 
> There's nothing said here, in the earlier patch, or in the cover letter
> about the security aspects of this. There is a reason we haven't been
> allowing arbitrary, un-supervised sharing of memory between domains. It
> wants clarifying why e.g. grants aren't an option to achieve what you
> need, and how you mean to establish which domains are / aren't permitted
> to access any individual page owned by this domain.


I'll let Penny write a full reply but I'll chime in to try to help with
the explanation.

This is not arbitrary un-supervised sharing of memory between domains,
which indeed is concerning.

This is statically-configured, supervised by the system configurator,
sharing of memory between domains.

And in fact safety (which is just a different aspect of security) is one
of the primary goals for this work.

In safety-critical environments, it is not considered safe to
dynamically change important configurations at runtime. Everything
should be statically defined and statically verified.

In this case, if the system configuration knows a priori that there are
only 2 VM and they need to communication over shared memory, it is safer
to pre-configure the shared memory at build time rather than let the VMs
attempt to share memory at runtime. It is faster too.

The only way to trigger this static shared memory configuration should
be via device tree, which is at the same level as the XSM rules
themselves.

Hopefully I made things clearer and not murkier :-)


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 22:00:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 22:00:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292248.496385 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVKeT-0004uW-P5; Fri, 18 Mar 2022 22:00:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292248.496385; Fri, 18 Mar 2022 22:00:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVKeT-0004uP-M0; Fri, 18 Mar 2022 22:00:53 +0000
Received: by outflank-mailman (input) for mailman id 292248;
 Fri, 18 Mar 2022 22:00:52 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVKeS-0004uF-Pf; Fri, 18 Mar 2022 22:00:52 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVKeS-0003J5-N7; Fri, 18 Mar 2022 22:00:52 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVKeS-0007g1-6c; Fri, 18 Mar 2022 22:00:52 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVKeS-0006if-68; Fri, 18 Mar 2022 22:00:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=hJT9FW/Ao4FkWGIXIgxA50HHHvx2PLsd8WltUtI0jgA=; b=M6AcUfEycS3qBkJNOsWggG6/6t
	eW/CrJrEFc0tGR5KI9TsvXAN8XUPofKN6/YOYor0JN2Y2Hem1o2JBgcY9zYLDoQLTlbrmA8Gt/JKA
	BDQ1btQWUAcVlzDMpTX0B+MoelymaOcJD1owNAwaOCdU0zwy1ZAItl/Fwtxg3+7sWZbI=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168690-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168690: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 18 Mar 2022 22:00:52 +0000

flight 168690 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168690/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   18 days
Failing since        168258  2022-03-01 01:55:31 Z   17 days  176 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    0 days   12 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 22:02:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 22:02:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292255.496397 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVKgA-0005Ub-5S; Fri, 18 Mar 2022 22:02:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292255.496397; Fri, 18 Mar 2022 22:02:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVKgA-0005UU-2J; Fri, 18 Mar 2022 22:02:38 +0000
Received: by outflank-mailman (input) for mailman id 292255;
 Fri, 18 Mar 2022 22:02:36 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3xU5=T5=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nVKg8-0005UM-Ie
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 22:02:36 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 1def7e68-a707-11ec-a405-831a346695d4;
 Fri, 18 Mar 2022 23:02:35 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id AE5E0B825A5;
 Fri, 18 Mar 2022 22:02:34 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id EBDB9C340E8;
 Fri, 18 Mar 2022 22:02:32 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1def7e68-a707-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647640953;
	bh=E79GiSNFsHYs0WWiDeVnepFK1C3PiN98Rw4IyIZIydc=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=ixEBYOlyYWZbsniiIGj9UlhicX8KFaXybcHmky4WuOTqeZIZKbyu7fw2O/LQj4O2M
	 E2FXyKOKZECbxjL7OGLtPR2n/TCjp2XVjv7VMh0TMAWtspphavhkztWChTlZLfGRTN
	 yXjcVV3r1BxpVbV1H857kfobd85X9Ul8Oj/hQofr1XCffyKcc+CLHnoGkHUeNgzmo2
	 7InVld91vb1d2XJ2gWPovA7QXJtFdjYntbt7+BpTgDhfkDhoes5Wa/oTrm1lK1IWk/
	 tA6kx5g/VXhX6a/zqQCFP1FFrnZI2akUX2E+NieQI4bDkjzofpXtrGkjohADDBX9JK
	 en/NSEFy7Lexw==
Date: Fri, 18 Mar 2022 15:02:32 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Penny Zheng <Penny.Zheng@arm.com>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, 
    nd <nd@arm.com>, Penny Zheng <penzhe01@a011292.shanghai.arm.com>, 
    Julien Grall <julien@xen.org>, Bertrand Marquis <Bertrand.Marquis@arm.com>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, 
    Andrew Cooper <andrew.cooper3@citrix.com>, 
    George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, 
    Wei Liu <wl@xen.org>
Subject: RE: [PATCH v1 02/13] xen/arm: introduce a special domain
 DOMID_SHARED
In-Reply-To: <DU2PR08MB7325E5A3B5A9BC5DA76692C4F7139@DU2PR08MB7325.eurprd08.prod.outlook.com>
Message-ID: <alpine.DEB.2.22.394.2203181459480.2910984@ubuntu-linux-20-04-desktop>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com> <20220311061123.1883189-3-Penny.Zheng@arm.com> <alpine.DEB.2.22.394.2203171645450.3497@ubuntu-linux-20-04-desktop> <DU2PR08MB7325E5A3B5A9BC5DA76692C4F7139@DU2PR08MB7325.eurprd08.prod.outlook.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Fri, 18 Mar 2022, Penny Zheng wrote:
> > On Fri, 11 Mar 2022, Penny Zheng wrote:
> > > From: Penny Zheng <penzhe01@a011292.shanghai.arm.com>
> > >
> > > In case to own statically shared pages when owner domain is not
> > > explicitly defined, this commits propose a special domain
> > > DOMID_SHARED, and we assign it 0x7FF5, as one of the system domains.
> > >
> > > Statically shared memory reuses the same way of initialization with
> > > static memory, hence this commits proposes a new Kconfig
> > > CONFIG_STATIC_SHM to wrap related codes, and this option depends on
> > static memory(CONFIG_STATIC_MEMORY).
> > 
> > Why does it depend on CONFIG_STATIC_MEMORY? This is a genuine question,
> > I am not trying to scope-creep the series. Is there an actual technical
> > dependency on CONFIG_STATIC_MEMORY? If not, it would be super useful to
> > be able to share memory statically even between normal dom0less guests (of
> > course it would be responsibility of the user to provide the right addresses and
> > avoid mapping clashes.) I know that some of our users have requested this
> > feature in the past.
> > 
> 
> I may find a proper way to rephrase here. My poor English writing skill...
> When I implemented domain on static allocation, statically configured guest RAM is
> treated as static memory in Xen and I introduced a few helpers to initialize/allocate/free
> static memory, like acquire_staticmem_pages, etc, and all these helpers are guarded with
> CONFIG_STATIC_MEMORY. 
> I want to reuse these helpers on static shared memory, so CONFIG_STATIC_SHM depends
> on CONFIG_STATIC_MEMORY.
> 
> So I'm not restricting sharing static memory between domain on static allocation, current
> Implementation is also useful to normal dom0less guests.

Ah, excellent! That makes sense.


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 22:15:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 22:15:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292258.496407 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVKsb-0006zs-AL; Fri, 18 Mar 2022 22:15:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292258.496407; Fri, 18 Mar 2022 22:15:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVKsb-0006zl-7S; Fri, 18 Mar 2022 22:15:29 +0000
Received: by outflank-mailman (input) for mailman id 292258;
 Fri, 18 Mar 2022 22:15:27 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nVKsZ-0006zf-76
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 22:15:27 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nVKsY-0003YO-Vv; Fri, 18 Mar 2022 22:15:26 +0000
Received: from gw1.octic.net ([81.187.162.82] helo=[10.0.1.102])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nVKsY-0005qO-Q8; Fri, 18 Mar 2022 22:15:26 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:Subject:
	From:References:Cc:To:MIME-Version:Date:Message-ID;
	bh=VG9MeoEG1Za4/+SOyEdFTUnTwKdvqvA00XSAY5YDMX4=; b=oP1qswEvo4bDo1DzFAsFkdsBb9
	bVPW+gEtJ87mpp9PXKJkNsNy87WKtcLPf4lrfy4UjKzVd7rYR127Fy+JBnveeRO7o0gbJS0HGYBn5
	ypUg5eQ1PPg1CpkTDP4fb4ZTwNbjzsxSVFU3oar8q6NmWDVGUfswrO5kkkdPiHTh0Flo=;
Message-ID: <926be9f9-37c7-8255-394f-e38c9396e775@xen.org>
Date: Fri, 18 Mar 2022 22:15:24 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.6.2
To: Hongda Deng <Hongda.Deng@arm.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Julien Grall <jgrall@amazon.com>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <Bertrand.Marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
References: <20220221102218.33785-1-julien@xen.org>
 <20220221102218.33785-10-julien@xen.org>
 <DBAPR08MB56703D6319722AD86C10A77FE6139@DBAPR08MB5670.eurprd08.prod.outlook.com>
From: Julien Grall <julien@xen.org>
Subject: Re: [PATCH v3 09/19] xen/arm32: mm: Check if the virtual address is
 shared before updating it
In-Reply-To: <DBAPR08MB56703D6319722AD86C10A77FE6139@DBAPR08MB5670.eurprd08.prod.outlook.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

On 18/03/2022 10:44, Hongda Deng wrote:
> Hi Julien,

Hi Hongda,

>> -----Original Message-----
>> From: Xen-devel <xen-devel-bounces@lists.xenproject.org> On Behalf Of Julien
>> Grall
>> Sent: 2022年2月21日 18:22
>> To: xen-devel@lists.xenproject.org
>> Cc: julien@xen.org; Julien Grall <jgrall@amazon.com>; Stefano Stabellini
>> <sstabellini@kernel.org>; Bertrand Marquis <Bertrand.Marquis@arm.com>;
>> Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
>> Subject: [PATCH v3 09/19] xen/arm32: mm: Check if the virtual address is shared
>> before updating it
>>
>> From: Julien Grall <jgrall@amazon.com>
>>
>> Only the first 2GB of the virtual address space is shared between all
>> the page-tables on Arm32.
>>
>> There is a long outstanding TODO in xen_pt_update() stating that the
>> function can only work with shared mapping. Nobody has ever called
>> the function with private mapping, however as we add more callers
>> there is a risk to mess things up.
>>
>> Introduce a new define to mark the end of the shared mappings and use
>> it in xen_pt_update() to verify if the address is correct.
>>
>> Note that on Arm64, all the mappings are shared. Some compiler may
>> complain about an always true check, so the new define is not introduced
>> for arm64 and the code is protected with an #ifdef.
>>
>> Signed-off-by: Julien Grall <jgrall@amazon.com>
>>
>> ---
>>      Changes in v2:
>>          - New patch
>> ---
>>   xen/arch/arm/include/asm/config.h |  4 ++++
>>   xen/arch/arm/mm.c                 | 11 +++++++++--
>>   2 files changed, 13 insertions(+), 2 deletions(-)
>>
>> diff --git a/xen/arch/arm/include/asm/config.h
>> b/xen/arch/arm/include/asm/config.h
>> index c7b77912013e..85d4a510ce8a 100644
>> --- a/xen/arch/arm/include/asm/config.h
>> +++ b/xen/arch/arm/include/asm/config.h
>> @@ -137,6 +137,10 @@
>>
>>   #define XENHEAP_VIRT_START     _AT(vaddr_t,0x40000000)
>>   #define XENHEAP_VIRT_END       _AT(vaddr_t,0x7fffffff)
>> +
>> +/* The first 2GB is always shared between all the page-tables. */
>> +#define SHARED_VIRT_END        _AT(vaddr_t, 0x7fffffff)
>> +
>>   #define DOMHEAP_VIRT_START     _AT(vaddr_t,0x80000000)
>>   #define DOMHEAP_VIRT_END       _AT(vaddr_t,0xffffffff)
>>
>> diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
>> index 24de8dcb9042..f18f65745595 100644
>> --- a/xen/arch/arm/mm.c
>> +++ b/xen/arch/arm/mm.c
>> @@ -1365,11 +1365,18 @@ static int xen_pt_update(unsigned long virt,
>>        * For arm32, page-tables are different on each CPUs. Yet, they share
>>        * some common mappings. It is assumed that only common mappings
>>        * will be modified with this function.
>> -     *
>> -     * XXX: Add a check.
>>        */
>>       const mfn_t root = virt_to_mfn(THIS_CPU_PGTABLE);
>>
>> +#ifdef SHARED_VIRT_END
>> +    if ( virt > SHARED_VIRT_END ||
>> +         (SHARED_VIRT_END - virt) < nr_mfns )
> 
> Why not convert (SHARED_VIRT_END - virt) to page number before comparation?
> I think nr_mfns is something related to page numbers, so maybe something like PAGE_SHIFT or round_pgdown is needed.

You are correct. nr_mfns should be shifted by PAGE_SHIFT. I have updated 
check to:

(SHARED_VIRT_END - virt) < pfn_to_paddr(nr_mfns)

Thanks for spotting it!

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 22:20:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 22:20:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292261.496419 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVKxS-0008QD-UP; Fri, 18 Mar 2022 22:20:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292261.496419; Fri, 18 Mar 2022 22:20:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVKxS-0008Q6-Qj; Fri, 18 Mar 2022 22:20:30 +0000
Received: by outflank-mailman (input) for mailman id 292261;
 Fri, 18 Mar 2022 22:20:30 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3xU5=T5=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nVKxR-0008Q0-W7
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 22:20:29 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org
 [2604:1380:4641:c500::1])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 9d4539a7-a709-11ec-8fbc-03012f2f19d4;
 Fri, 18 Mar 2022 23:20:28 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 16DBB61452;
 Fri, 18 Mar 2022 22:20:27 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9D3B7C340E8;
 Fri, 18 Mar 2022 22:20:25 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9d4539a7-a709-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647642026;
	bh=MofUkYPYGPhJeFIKBWb5e6TTNkoPdXXReRJqkgP7j5Y=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=NczvIpMWSdgUUdyTkiNGkpfmsbnaUkKkg+mZjjhvTpwXZXCHet83lHkkVgEI0cs5c
	 A1ojCZ0sEAP/jXuIU9TD6NaUwXtYoTdYzw0QheQsrp4XiyEIinM8XOOhp1f8vJsF40
	 Oin1vXNDXeyOA6hbTm4YmSrU2Wg9qhIURwTK0E2sachnjQpdwuMaDaZRrs7xtA/fnI
	 3vUjdF7p903veb83nySlg7mAOcC4Swt5YJzCmD4P7IrioR8JwcJmHS/T4EcCMr/u7+
	 2PNhArLK8iFlLWpGUSMWr5ADdd+u/AP78SkgL0tXVaPCs5Gl69vOIynT16gx4UhTrm
	 nYOLCBQzxfpfg==
Date: Fri, 18 Mar 2022 15:20:25 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Jan Beulich <jbeulich@suse.com>
cc: Penny Zheng <Penny.Zheng@arm.com>, nd@arm.com, 
    Penny Zheng <penzhe01@a011292.shanghai.arm.com>, 
    Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>, 
    Bertrand Marquis <bertrand.marquis@arm.com>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, 
    Andrew Cooper <andrew.cooper3@citrix.com>, 
    George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>, 
    xen-devel@lists.xenproject.org
Subject: Re: [PATCH v1 02/13] xen/arm: introduce a special domain
 DOMID_SHARED
In-Reply-To: <eefa9cf2-a04c-ba8d-74cb-0d2aaa35badb@suse.com>
Message-ID: <alpine.DEB.2.22.394.2203181504140.2910984@ubuntu-linux-20-04-desktop>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com> <20220311061123.1883189-3-Penny.Zheng@arm.com> <eefa9cf2-a04c-ba8d-74cb-0d2aaa35badb@suse.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Fri, 18 Mar 2022, Jan Beulich wrote:
> Further (there's no particularly good place to mention this) I'm
> afraid I don't view "shared" as a good name: It's not the domain
> which is shared, but it's the domain to hold shared memory.

To be honest I thought the same thing when reading this patch but
couldn't easily come up with a better name.


> For this
> my first consideration would be to see whether an existing special
> domain can be re-used; after all the set of reserved domain IDs is
> a very limited one, and hence each value taken from there should come
> with a very good reason. We did such re-use e.g. when introducing
> quarantining for PCI devices, by associating them with DOM_IO rather
> than inventing a new DOM_QUARANTINE. If there are good reasons
> speaking against such re-use, then I'd like to ask to consider e.g.
> DOMID_SHM / DOMID_SHMEM plus associated predicate.

>From my point of view is totally fine to reuse one of the existing
special domains if we can.

DOMID_IO seems to be the closest match but its current definition
doesn't cover what Penny is trying to achieve. I am happy to change its
definition and make it wider to support this use-case too.

It is not trivial to come up with an appropriate description though. I
took a stab at it but I couldn't come up with anything better:

 * DOMID_IO is used for mapping memory and MMIO regions when no explicit
 * Domain need to be specified.
 *
 * For instance, DOMID_IO is the owner of memory pre-shared among
 * multiple domains at boot time, when no explicit owner is specified.
 *
 * Also, DOMID_IO is used to restrict page-table updates to mapping I/O
 * memory. Although no Foreign Domain need be specified to map I/O
 * pages, DOMID_IO is useful to ensure that no mappings to the OS's own
 * heap are accidentally installed. (e.g., in Linux this could cause
 * havoc as reference counts aren't adjusted on the I/O-mapping code
 * path). This only makes sense as HYPERVISOR_mmu_update()'s and
 * HYPERVISOR_update_va_mapping_otherdomain()'s "foreigndom" argument.
 * For HYPERVISOR_mmu_update() context it can be specified by any
 * calling domain, otherwise it's only permitted if the caller is
 * privileged.


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 22:27:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 22:27:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292264.496430 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVL4G-0000fk-LL; Fri, 18 Mar 2022 22:27:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292264.496430; Fri, 18 Mar 2022 22:27:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVL4G-0000fd-Hk; Fri, 18 Mar 2022 22:27:32 +0000
Received: by outflank-mailman (input) for mailman id 292264;
 Fri, 18 Mar 2022 22:27:31 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3xU5=T5=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nVL4F-0000fX-Ch
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 22:27:31 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org
 [2604:1380:4601:e00::1])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 98b3b87e-a70a-11ec-8fbc-03012f2f19d4;
 Fri, 18 Mar 2022 23:27:30 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 372C5B825D8;
 Fri, 18 Mar 2022 22:27:29 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 7D9ACC340E8;
 Fri, 18 Mar 2022 22:27:27 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 98b3b87e-a70a-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647642447;
	bh=JLxyftbK0qxtMspIkaIYqurVlM8a+Pa+wjSIiinTf74=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=oNRIarTaAQnIR8KeA9hp4j48kHAhQmEO4gftEDYsp6EOJNgsCLtNW37t+IMzbHs6O
	 Jqa6B99h5FYBHgdTFk/cpIdNlevDE3MYqJkm1uxE4SbOVl4dTQy9QrYdoc0FwLuXYR
	 NcTKJKr/BcWg3YPt5u4cbJ8c2l9ajU2HIUhxOKCRByojHTYGMa4wcBz08MfEw0YTPQ
	 kS+6ADF+GgpswgzGafbk+/VVUbgg2S+JTHcp6DzKPvKwW2Q+LQn4VmEwJFt1161tM3
	 RfCWMtOFrovKXGPcU0Jmrz4a0U3oSIrv+VH9QI+mEfIw4xh2lFIms5YKWF4mJmtfoG
	 ijoSJpLekMf2g==
Date: Fri, 18 Mar 2022 15:27:27 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Penny Zheng <Penny.Zheng@arm.com>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, 
    nd <nd@arm.com>, Julien Grall <julien@xen.org>, 
    Bertrand Marquis <Bertrand.Marquis@arm.com>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: RE: [PATCH v1 03/13] xen/arm: allocate static shared memory to
 dom_shared
In-Reply-To: <DU2PR08MB732581E1261462D7CA5867BFF7139@DU2PR08MB7325.eurprd08.prod.outlook.com>
Message-ID: <alpine.DEB.2.22.394.2203181523220.2910984@ubuntu-linux-20-04-desktop>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com> <20220311061123.1883189-4-Penny.Zheng@arm.com> <alpine.DEB.2.22.394.2203171707200.3497@ubuntu-linux-20-04-desktop> <DU2PR08MB732581E1261462D7CA5867BFF7139@DU2PR08MB7325.eurprd08.prod.outlook.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Fri, 18 Mar 2022, Penny Zheng wrote:
> > On Fri, 11 Mar 2022, Penny Zheng wrote:
> > > From: Penny Zheng <penny.zheng@arm.com>
> > >
> > > This commit introduces process_shm to cope with static shared memory
> > > in domain construction.
> > >
> > > This commit only considers allocating static shared memory to
> > > dom_shared when owner domain is not explicitly defined in device tree,
> > > the other scenario will be covered in the following patches.
> > >
> > > Static shared memory could reuse acquire_static_memory_bank() to
> > > acquire and allocate static memory.
> > >
> > > Signed-off-by: Penny Zheng <penny.zheng@arm.com>
> > > ---
> > >  xen/arch/arm/domain_build.c | 116
> > > +++++++++++++++++++++++++++++++++++-
> > >  1 file changed, 115 insertions(+), 1 deletion(-)
> > >
> > > diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
> > > index 8be01678de..6e6349caac 100644
> > > --- a/xen/arch/arm/domain_build.c
> > > +++ b/xen/arch/arm/domain_build.c
> > > @@ -527,7 +527,8 @@ static mfn_t __init
> > acquire_static_memory_bank(struct domain *d,
> > >      mfn_t smfn;
> > >      int res;
> > >
> > > -    device_tree_get_reg(cell, addr_cells, size_cells, pbase, psize);
> > > +    if ( cell )
> > > +        device_tree_get_reg(cell, addr_cells, size_cells, pbase,
> > > + psize);
> > 
> > Why this change?
> > 
> 
> This helper is also used for acquiring static memory as guest RAM for statically configured
> domain.
> 
> And since we are reusing it for static shared memory, but try to avoid parsing the property
> here, the "xen,static-shm" property getting parsed in different ways in process_shm.
> So this change is needed here.
> 
> And I think I need to add in-code comment to explain. ;)
> 
> > 
> > >      ASSERT(IS_ALIGNED(*pbase, PAGE_SIZE) && IS_ALIGNED(*psize,
> > PAGE_SIZE));
> > >      if ( PFN_DOWN(*psize) > UINT_MAX )
> > >      {
> > > @@ -751,6 +752,113 @@ static void __init assign_static_memory_11(struct
> > domain *d,
> > >      panic("Failed to assign requested static memory for direct-map
> > domain %pd.",
> > >            d);
> > >  }
> > > +
> > > +#ifdef CONFIG_STATIC_SHM
> > > +static __initdata DECLARE_BITMAP(shm_mask, NR_MEM_BANKS);
> > > +
> > > +static mfn_t __init acquire_shared_memory_bank(struct domain *d,
> > > +                                               u32 addr_cells, u32 size_cells,
> > > +                                               paddr_t *pbase,
> > > +paddr_t *psize) {
> > > +    /*
> > > +     * Pages of statically shared memory shall be included
> > > +     * in domain_tot_pages().
> > > +     */
> > > +    d->max_pages += PFN_DOWN(*psize);
> > > +
> > > +    return acquire_static_memory_bank(d, NULL, addr_cells, size_cells,
> > > +                                      pbase, psize);
> > > +
> > > +}
> > > +
> > > +static int __init allocate_shared_memory(struct domain *d,
> > > +                                         u32 addr_cells, u32 size_cells,
> > > +                                         paddr_t pbase, paddr_t psize,
> > > +                                         paddr_t gbase) {
> > > +    mfn_t smfn;
> > > +    int ret = 0;
> > > +
> > > +    printk(XENLOG_INFO "Allocate static shared memory
> > BANK %#"PRIpaddr"-%#"PRIpaddr"\n",
> > > +           pbase, pbase + psize);
> > > +
> > > +    smfn = acquire_shared_memory_bank(d, addr_cells, size_cells, &pbase,
> > > +                                      &psize);
> > > +    if ( mfn_eq(smfn, INVALID_MFN) )
> > > +        return -EINVAL;
> > > +
> > > +    ret = guest_physmap_add_pages(d, gaddr_to_gfn(gbase), smfn,
> > PFN_DOWN(psize));
> > > +    if ( ret )
> > > +    {
> > > +        dprintk(XENLOG_ERR, "Failed to map shared memory to %pd.\n", d);
> > > +        return ret;
> > > +    }
> > > +
> > > +    return ret;
> > > +}
> > > +
> > > +static int __init process_shm(struct domain *d,
> > > +                              const struct dt_device_node *node) {
> > > +    struct dt_device_node *shm_node;
> > > +    int ret = 0;
> > > +    const struct dt_property *prop;
> > > +    const __be32 *cells;
> > > +    u32 shm_id;
> > > +    u32 addr_cells, size_cells;
> > > +    paddr_t gbase, pbase, psize;
> > > +
> > > +    dt_for_each_child_node(node, shm_node)
> > > +    {
> > > +        if ( !dt_device_is_compatible(shm_node, "xen,domain-shared-memory-
> > v1") )
> > > +            continue;
> > > +
> > > +        if ( !dt_property_read_u32(shm_node, "xen,shm-id", &shm_id) )
> > > +        {
> > > +            printk("Shared memory node does not provide \"xen,shm-id\"
> > property.\n");
> > > +            return -ENOENT;
> > > +        }
> > > +
> > > +        addr_cells = dt_n_addr_cells(shm_node);
> > > +        size_cells = dt_n_size_cells(shm_node);
> > > +        prop = dt_find_property(shm_node, "xen,shared-mem", NULL);
> > > +        if ( !prop )
> > > +        {
> > > +            printk("Shared memory node does not provide \"xen,shared-mem\"
> > property.\n");
> > > +            return -ENOENT;
> > > +        }
> > > +        cells = (const __be32 *)prop->value;
> > > +        /* xen,shared-mem = <pbase, psize, gbase>; */
> > > +        device_tree_get_reg(&cells, addr_cells, size_cells, &pbase, &psize);
> > > +        ASSERT(IS_ALIGNED(pbase, PAGE_SIZE) && IS_ALIGNED(psize,
> > PAGE_SIZE));
> > > +        gbase = dt_read_number(cells, addr_cells);
> > > +
> > > +        /* TODO: Consider owner domain is not the default dom_shared. */
> > > +        /*
> > > +         * Per shared memory region could be shared between multiple
> > domains.
> > > +         * In case re-allocating the same shared memory region, we use bitmask
> > > +         * shm_mask to record whether this shared memory region has ever
> > been
> > > +         * allocated already.
> > > +         */
> > > +        if ( !test_bit(shm_id, shm_mask) )
> > > +        {
> > > +            /*
> > > +             * Allocate statically shared pages to the default dom_shared.
> > > +             * Set up P2M, and dom_shared is a direct-map domain,
> > > +             * so GFN == PFN.
> > > +             */
> > > +            ret = allocate_shared_memory(dom_shared, addr_cells, size_cells,
> > > +                                         pbase, psize, pbase);
> >                                                           ^gbase
> > 
> > The last parameter should be gbase instead of pbase?
> > 
> 
> Yes, and since dom_shared is a direct-map domain, GFN == PFN, so pbase should be
> ok here. I mentioned it on comments.
> 
> And Why I make dom_shared direct-map domain is that in this way we don't need to decode
> owner GFN when doing foreign memory mapping for borrower domain.
> 
> > 
> > Reading this patch is not clear that only the "owner" code path is
> > implemented here. The "borrower" code path is implemented later and
> > missing in this patch. I think it would be good to clarify that in the commit
> > message.
> > 
> > Under this light, allocate_shared_memory is supposed to be only called for the
> > owner. I think we should probably mention that in the in-code comment too.
> > 
> 
> Yes, only owner domain could allocate memory, I'll add it to in-code comment.
> 
> > I don't think we need to define a second copy of shm_mask. Can we reuse the
> > one in bootfdt.c?
> > 
> 
> Yes, maybe I should reuse than reintroduce. And before using the bitmap here,
> I need to clear it totally to clean away all the stale info from bootfdt.c.
> 
> > Or we could get rid of shm_mask entirely here if we check whether the pages
> > were already allocated in the owner p2m.
> > 
> > 
> 
> Hmm, that means that we need to do the page walk each time? That's kinds of
> time-consuming, or am I missing some convenient way to check?

No page walk. I think it should be possible with:

- mfn_to_page
- page_get_owner

both of them are direct access. Assuming that the page owner is set
correctly.


From xen-devel-bounces@lists.xenproject.org Fri Mar 18 22:28:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 22:28:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292268.496441 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVL5R-0001L2-2z; Fri, 18 Mar 2022 22:28:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292268.496441; Fri, 18 Mar 2022 22:28:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVL5R-0001Kv-02; Fri, 18 Mar 2022 22:28:45 +0000
Received: by outflank-mailman (input) for mailman id 292268;
 Fri, 18 Mar 2022 22:28:44 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=QOyl=T5=aculab.com=david.laight@srs-se1.protection.inumbo.net>)
 id 1nVL5Q-0001Kb-03
 for xen-devel@lists.xenproject.org; Fri, 18 Mar 2022 22:28:44 +0000
Received: from eu-smtp-delivery-151.mimecast.com
 (eu-smtp-delivery-151.mimecast.com [185.58.85.151])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c302d978-a70a-11ec-8fbc-03012f2f19d4;
 Fri, 18 Mar 2022 23:28:41 +0100 (CET)
Received: from AcuMS.aculab.com (156.67.243.121 [156.67.243.121]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id
 uk-mta-308-tJXXIe7QOkm1qFX-LQUFdA-1; Fri, 18 Mar 2022 22:28:38 +0000
Received: from AcuMS.Aculab.com (fd9f:af1c:a25b:0:994c:f5c2:35d6:9b65) by
 AcuMS.aculab.com (fd9f:af1c:a25b:0:994c:f5c2:35d6:9b65) with Microsoft SMTP
 Server (TLS) id 15.0.1497.32; Fri, 18 Mar 2022 22:28:38 +0000
Received: from AcuMS.Aculab.com ([fe80::994c:f5c2:35d6:9b65]) by
 AcuMS.aculab.com ([fe80::994c:f5c2:35d6:9b65%12]) with mapi id
 15.00.1497.033; Fri, 18 Mar 2022 22:28:37 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c302d978-a70a-11ec-8fbc-03012f2f19d4
X-MC-Unique: tJXXIe7QOkm1qFX-LQUFdA-1
From: David Laight <David.Laight@ACULAB.COM>
To: 'Juergen Gross' <jgross@suse.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>, "platform-driver-x86@vger.kernel.org"
	<platform-driver-x86@vger.kernel.org>, "linux-kernel@vger.kernel.org"
	<linux-kernel@vger.kernel.org>, "Dell.Client.Kernel@dell.com"
	<Dell.Client.Kernel@dell.com>
CC: Stuart Hayes <stuart.w.hayes@gmail.com>, Hans de Goede
	<hdegoede@redhat.com>, Mark Gross <markgross@kernel.org>,
	"stable@vger.kernel.org" <stable@vger.kernel.org>
Subject: RE: [PATCH] platform/x86/dell: add buffer allocation/free functions
 for SMI calls
Thread-Topic: [PATCH] platform/x86/dell: add buffer allocation/free functions
 for SMI calls
Thread-Index: AQHYOto/hyLOp/NEJ0S+JLWvPC30KazFQPKggAAbeICAAFvP8A==
Date: Fri, 18 Mar 2022 22:28:37 +0000
Message-ID: <f04348c83155404c8ae4c8e5c3abedf2@AcuMS.aculab.com>
References: <20220318150950.16843-1-jgross@suse.com>
 <accf95548a8c4374b17c159b9b2d0098@AcuMS.aculab.com>
 <2a4573e0-4a8d-52c1-d29b-66b13bfe376f@suse.com>
In-Reply-To: <2a4573e0-4a8d-52c1-d29b-66b13bfe376f@suse.com>
Accept-Language: en-GB, en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.202.205.107]
MIME-Version: 1.0
Authentication-Results: relay.mimecast.com;
	auth=pass smtp.auth=C51A453 smtp.mailfrom=david.laight@aculab.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: aculab.com
Content-Language: en-US
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: base64
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From xen-devel-bounces@lists.xenproject.org Fri Mar 18 23:31:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 18 Mar 2022 23:31:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292272.496451 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVM41-0008Aq-Jt; Fri, 18 Mar 2022 23:31:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292272.496451; Fri, 18 Mar 2022 23:31:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVM41-0008Aj-GW; Fri, 18 Mar 2022 23:31:21 +0000
Received: by outflank-mailman (input) for mailman id 292272;
 Fri, 18 Mar 2022 23:31:20 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVM40-0008AZ-LC; Fri, 18 Mar 2022 23:31:20 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVM40-0004mw-JM; Fri, 18 Mar 2022 23:31:20 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVM40-0002c2-7m; Fri, 18 Mar 2022 23:31:20 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVM40-0004zw-7N; Fri, 18 Mar 2022 23:31:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=iQ8wUN008CoAVQNfxlp8abvJ+vxHT0XqdKxvqFHXobg=; b=qxzkSl00HeJQZdsI1cX1aSY0hl
	T4cw+kvBtmHa6wywbX4fs2rm+Vbskeb3oVEly0ubavAYS03p+EEhwAgCiNMlFUlizQvBuiMZuwhen
	bXuuN/VmXRA8UFMikANK5t54/Adn//pCi0OfLW1HwvXXJVVO0fFEv07wXLsCQTe+8V5M=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168692-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168692: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 18 Mar 2022 23:31:20 +0000

flight 168692 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168692/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   18 days
Failing since        168258  2022-03-01 01:55:31 Z   17 days  177 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    0 days   13 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 19 00:15:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 19 Mar 2022 00:15:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292279.496462 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVMkS-0004Yn-Tq; Sat, 19 Mar 2022 00:15:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292279.496462; Sat, 19 Mar 2022 00:15:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVMkS-0004Yg-Qf; Sat, 19 Mar 2022 00:15:12 +0000
Received: by outflank-mailman (input) for mailman id 292279;
 Sat, 19 Mar 2022 00:15:12 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=T/Ld=T6=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nVMkS-0004Ya-4J
 for xen-devel@lists.xenproject.org; Sat, 19 Mar 2022 00:15:12 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a3427734-a719-11ec-8fbc-03012f2f19d4;
 Sat, 19 Mar 2022 01:15:10 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 2CF4061714;
 Sat, 19 Mar 2022 00:15:09 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0F206C340E8;
 Sat, 19 Mar 2022 00:15:06 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a3427734-a719-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647648908;
	bh=P+KCV/jCdV5b32Ntpf7tb3mbpn62TBuJkCAGYio9kNA=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=HyaAGrpCqBM21611BBi41PGzrAhfX5+w5pO37jvH+uCQ+GR1u8pPjwcxBeR+5Ra4i
	 ixdulQEBTPi7SoDVWpsDX4dBwoTgVZ4uyaJKiaRCHHdpH8r0S0X9M8UfTQ7P8jCFPK
	 U5AnZnFFC8glXbwYO8EGT9rknRhyi33SuXiTW7T5AEp9pRQNlB0KtyrCnrOITuzwOo
	 LdlpOZAKUgU5a9AE2yFVcRoQLcrIssadkn0n0MXITuQ4MOpd7Hl7eVRZq0dRccnJ3G
	 YP7q8HMhbZxSQbsQTvD1WHbw/pQM1ct8tqBAOWlVBE2BLo9shptYU49hgRNnkJQhCo
	 1n8uvU2gwv/YQ==
Date: Fri, 18 Mar 2022 17:15:06 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Anthony PERARD <anthony.perard@citrix.com>
cc: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>, 
    cardoe@cardoe.com, wl@xen.org, andrew.cooper3@citrix.com, 
    xen-devel@lists.xenproject.org, 
    Stefano Stabellini <stefano.stabellini@xilinx.com>, 
    bertrand.marquis@arm.com
Subject: Re: [PATCH RESEND 2/2] gitlab-ci: add an ARM32 qemu-based smoke
 test
In-Reply-To: <YjSfPtUwWrqhDsW2@perard.uk.xensource.com>
Message-ID: <alpine.DEB.2.22.394.2203181713000.2910984@ubuntu-linux-20-04-desktop>
References: <20210714004854.31135-2-sstabellini@kernel.org> <2aaddfc5-0502-fd0a-6393-63a17c7f6778@xen.org> <alpine.DEB.2.22.394.2203161508200.3497@ubuntu-linux-20-04-desktop> <YjSfPtUwWrqhDsW2@perard.uk.xensource.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Fri, 18 Mar 2022, Anthony PERARD wrote:
> On Wed, Mar 16, 2022 at 06:38:53PM -0700, Stefano Stabellini wrote:
> > Also considering the recent arm32 xen breakage, which could have been
> > caught by gitlab-ci before commit,
> 
> I'm not sure that's true. I think the commits you are speaking about
> also break the build on x86, which was caught by the gitlab ci.
> 
> Anyway, some arm32 smoke tests on gitlab should be useful.

I think we are probably talking about different breakages :-)

Ayan recently broke Xen on ARM32 (run-time not build-time) with the
commit 9e5a68a66 and fef5531fd. I verified that the QEMU32 test in this
series actually catches the failure.

Can I get an ack on this? :-)


From xen-devel-bounces@lists.xenproject.org Sat Mar 19 00:15:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 19 Mar 2022 00:15:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292280.496474 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVMkr-0004yn-6H; Sat, 19 Mar 2022 00:15:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292280.496474; Sat, 19 Mar 2022 00:15:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVMkr-0004ye-3L; Sat, 19 Mar 2022 00:15:37 +0000
Received: by outflank-mailman (input) for mailman id 292280;
 Sat, 19 Mar 2022 00:15:36 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=T/Ld=T6=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nVMkq-0004x0-8v
 for xen-devel@lists.xenproject.org; Sat, 19 Mar 2022 00:15:36 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org
 [2604:1380:4601:e00::1])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b2074d33-a719-11ec-a405-831a346695d4;
 Sat, 19 Mar 2022 01:15:34 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id EE377B825D8;
 Sat, 19 Mar 2022 00:15:33 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 46EC5C340E8;
 Sat, 19 Mar 2022 00:15:32 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b2074d33-a719-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647648932;
	bh=YVSpvtYqAQoQEzRSjZyklnkojpf6l1lQdENfjMXWVww=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=SLKhXECPZS7oqcwPIkNaD3Mn1DBcnaIg211maEnq/j6PQjhnTodC/Dy2L6GkGrdlt
	 +hdc8w5fiR/89ZOSGLa8ARFMsrQ8qopjd/9hHduLceSkO2SAOfhLfqJ9PPvnUZUH9O
	 YHExoa35ri73zeBrVVSpNlGaQIAyKIu9S2iAOvPk3vJyKrRiaYaSBAw8wSSUFMyHzq
	 73n66tIDHlG6Jt2Ix/k9CmoPwdGNPRv2Q5/7Mx30Q119hPkPtPubL0+KZFUOx/A9w8
	 Zlyq7DAgl7ryhFyA1IWbbKu8kuiSk60v2PHTz2k6OJaSMSiJpCAfk4zsAqXUY+qW5p
	 ccTfFpbKRH2Ig==
Date: Fri, 18 Mar 2022 17:15:32 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Anthony PERARD <anthony.perard@citrix.com>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    xen-devel@lists.xenproject.org, cardoe@cardoe.com, wl@xen.org, 
    andrew.cooper3@citrix.com, bertrand.marquis@arm.com, 
    Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: Re: [PATCH v2 1/2] gitlab-ci: add qemu-system-arm to the existing
 tests-artifacts container
In-Reply-To: <YjSjW/4dnQXqW65V@perard.uk.xensource.com>
Message-ID: <alpine.DEB.2.22.394.2203181715160.2910984@ubuntu-linux-20-04-desktop>
References: <alpine.DEB.2.22.394.2203161843230.3497@ubuntu-linux-20-04-desktop> <20220317014653.2427386-1-sstabellini@kernel.org> <YjSjW/4dnQXqW65V@perard.uk.xensource.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Fri, 18 Mar 2022, Anthony PERARD wrote:
> On Wed, Mar 16, 2022 at 06:46:52PM -0700, Stefano Stabellini wrote:
> > +qemu-system-aarch64-6.0.0-arm32-export:
> > +  stage: build
> > +  image: registry.gitlab.com/xen-project/xen/tests-artifacts/qemu-system-aarch64:6.0.0-arm64v8
> > +  script:
> > +    - mkdir binaries && cp /qemu-system-arm binaries/qemu-system-arm
> > +  artifacts:
> > +    paths:
> > +      - binaries/qemu-system-arm
> > +  tags:
> > +    - arm64
> >  
> 
> I wonder whether there's a better way to make available these kind of
> test artifacts than using containers. But I don't have a good answer for
> now.

I wonder the same but couldn't find anything better.


> Anyway, the patch looks good enough:
> Reviewed-by: Anthony PERARD <anthony.perard@citrix.com>

Thanks!


From xen-devel-bounces@lists.xenproject.org Sat Mar 19 00:19:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 19 Mar 2022 00:19:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292285.496484 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVMoq-0005nE-O4; Sat, 19 Mar 2022 00:19:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292285.496484; Sat, 19 Mar 2022 00:19:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVMoq-0005n7-KZ; Sat, 19 Mar 2022 00:19:44 +0000
Received: by outflank-mailman (input) for mailman id 292285;
 Sat, 19 Mar 2022 00:19:43 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=T/Ld=T6=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nVMop-0005n1-Cj
 for xen-devel@lists.xenproject.org; Sat, 19 Mar 2022 00:19:43 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org
 [2604:1380:4601:e00::1])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 45bb976f-a71a-11ec-8fbc-03012f2f19d4;
 Sat, 19 Mar 2022 01:19:42 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id BAC2DB825EA;
 Sat, 19 Mar 2022 00:19:41 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id EE2B9C340E8;
 Sat, 19 Mar 2022 00:19:39 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 45bb976f-a71a-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647649180;
	bh=uBdH8M+Zzqfm5YPRGnmg3dqkYXVp1NN+74H1opIC5zY=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=XG3iNCOysagbP6Xhbm5iQcJOoy03SRkHTbHJh+S1S3mkI9sJHqfOKLkDZpRM+Q8Hq
	 v+VvJwRyVM01eliRfV5LCFfRaB4SDIsl2rc8gMcoo/F7x1jQHZZRqSeRMiL8Xz/xZ6
	 0FJ03lR6mW6mFYc/TBL+z0cmQK7qK8CPRg4Zasii5Pcqd7jY7DE9/5udNnGR1VInpX
	 L4DdgFqaZWalrgMs30R3l6VsIIJdPeDXdhBAQIsW6bKsjVRugN0lbM8tjsLcmt6YOZ
	 3wzpe9k7Fm4IXQ75rMFwkkvW2bFZAs6qerRl5Q363jOLEIXvLAcPVDQu9gRK11Hop7
	 vEfid1ow9ZWLw==
Date: Fri, 18 Mar 2022 17:19:39 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Anthony PERARD <anthony.perard@citrix.com>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    xen-devel@lists.xenproject.org, cardoe@cardoe.com, wl@xen.org, 
    andrew.cooper3@citrix.com, bertrand.marquis@arm.com, 
    Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: Re: [PATCH v2 2/2] gitlab-ci: add an ARM32 qemu-based smoke test
In-Reply-To: <YjSsMLl5Isn+OAMO@perard.uk.xensource.com>
Message-ID: <alpine.DEB.2.22.394.2203181715570.2910984@ubuntu-linux-20-04-desktop>
References: <alpine.DEB.2.22.394.2203161843230.3497@ubuntu-linux-20-04-desktop> <20220317014653.2427386-2-sstabellini@kernel.org> <YjSsMLl5Isn+OAMO@perard.uk.xensource.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Fri, 18 Mar 2022, Anthony PERARD wrote:
> On Wed, Mar 16, 2022 at 06:46:53PM -0700, Stefano Stabellini wrote:
> > +curl -fsSLO http://http.us.debian.org/debian/dists/jessie/main/installer-armhf/current/images/netboot/vmlinuz
> > +curl -fsSLO http://http.us.debian.org/debian/dists/jessie/main/installer-armhf/current/images/netboot/initrd.gz
> 
>     curl --fail --silent --show-error --location --remote-name
> 
> I didn't know what all those short options were, I had to write it
> down. In script to be shared with others, I think it's better to use the
> long options, as it's kind of self-documenting.
> 
> Now, there an issue with the command line, "--remote-name" (or -O) needs
> to be replaced. We don't care about how the server calls the file, it is
> much more important do know where it is going to be stored. Instead, you
> should use "--output" to write the file to the location the script is
> going to use. It happened to work now, but we don't have to trust
> the Internet when not needed.
> 

Sure I copy-pasted it from the other scripts. With your suggestion it
becomes:
curl --fail --silent --show-error --location --remote-name http://http.us.debian.org/debian/dists/jessie/main/installer-armhf/current/images/netboot/vmlinuz

I can make the change


> Also, maybe use "https"?

https doesn't work for this:

$ curl --fail --silent --show-error --location --remote-name https://http.us.debian.org/debian/dists/jessie/main/installer-armhf/current/images/netboot/vmlinuz
curl: (60) SSL: no alternative certificate subject name matches target host name 'http.us.debian.org'


> Also, maybe as an improvement for later, and to avoid having to rely on
> the Internet, we could probably store those artifacts in the container
> that's going to run the test. But I'm not asking this for now.

I agree! Even better if we could update the kernel too. I think for now
it is OK but I'll try to improve it in the following weeks.


> > +timeout -k 1 240 \
> > +./qemu-system-arm \
> 
> There's probably a better way than waiting for the "timeout" like running an
> "init" that print something and shutdown the machine. But I guess
> that's ok for now.

Yeah I agree on both points. The other 3 tests are in the same
situation.


From xen-devel-bounces@lists.xenproject.org Sat Mar 19 00:24:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 19 Mar 2022 00:24:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292288.496496 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVMtr-0007Ak-B6; Sat, 19 Mar 2022 00:24:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292288.496496; Sat, 19 Mar 2022 00:24:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVMtr-0007Ad-7r; Sat, 19 Mar 2022 00:24:55 +0000
Received: by outflank-mailman (input) for mailman id 292288;
 Sat, 19 Mar 2022 00:24:53 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=T/Ld=T6=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nVMtp-0007AX-Pg
 for xen-devel@lists.xenproject.org; Sat, 19 Mar 2022 00:24:53 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id feb2fb2e-a71a-11ec-8fbc-03012f2f19d4;
 Sat, 19 Mar 2022 01:24:52 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id D461CB825D5;
 Sat, 19 Mar 2022 00:24:51 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2E5C9C340ED;
 Sat, 19 Mar 2022 00:24:50 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: feb2fb2e-a71a-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647649490;
	bh=w3SWQw+3DwpcDgvjXu1MhxvVnLR1n4VhwKGYRDIaP7Q=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=bOToZbDaljrEDaBFgsT6SslSYVK1FFw/rha9HpMqB1QNHplvJ37ekDp3PgqWaG0Yz
	 VdPVa4WGpbNMjzBc+AjQPlV4XNNyNYTQyquU8beMQUzdHJOjAjP/1cXOrSxi6KOTMM
	 C/eSdLOtsO9SnTXAwyAejW1mNszqd6hL1434axl3Y6CbEPmYv/LM43+t+CpI/kBGBC
	 SXe615eROp8vK7wUmR48nfWgGdt/KgcpLDs8MS7sby0KOHbtz68jgswSGK5bEXhUKa
	 KY4OIWHgrR6fUMZy8Y/On9nPbQODmWNqvX4186+rgpG5IlMnol62CgT8ciHtJUVNhY
	 58KTLPw2RhNZA==
Date: Fri, 18 Mar 2022 17:24:49 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Stefano Stabellini <sstabellini@kernel.org>
cc: Anthony PERARD <anthony.perard@citrix.com>, xen-devel@lists.xenproject.org, 
    cardoe@cardoe.com, wl@xen.org, andrew.cooper3@citrix.com, 
    bertrand.marquis@arm.com, 
    Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: Re: [PATCH v2 2/2] gitlab-ci: add an ARM32 qemu-based smoke test
In-Reply-To: <alpine.DEB.2.22.394.2203181715570.2910984@ubuntu-linux-20-04-desktop>
Message-ID: <alpine.DEB.2.22.394.2203181722330.2910984@ubuntu-linux-20-04-desktop>
References: <alpine.DEB.2.22.394.2203161843230.3497@ubuntu-linux-20-04-desktop> <20220317014653.2427386-2-sstabellini@kernel.org> <YjSsMLl5Isn+OAMO@perard.uk.xensource.com> <alpine.DEB.2.22.394.2203181715570.2910984@ubuntu-linux-20-04-desktop>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Fri, 18 Mar 2022, Stefano Stabellini wrote:
> On Fri, 18 Mar 2022, Anthony PERARD wrote:
> > On Wed, Mar 16, 2022 at 06:46:53PM -0700, Stefano Stabellini wrote:
> > > +curl -fsSLO http://http.us.debian.org/debian/dists/jessie/main/installer-armhf/current/images/netboot/vmlinuz
> > > +curl -fsSLO http://http.us.debian.org/debian/dists/jessie/main/installer-armhf/current/images/netboot/initrd.gz
> > 
> >     curl --fail --silent --show-error --location --remote-name
> > 
> > I didn't know what all those short options were, I had to write it
> > down. In script to be shared with others, I think it's better to use the
> > long options, as it's kind of self-documenting.
> > 
> > Now, there an issue with the command line, "--remote-name" (or -O) needs
> > to be replaced. We don't care about how the server calls the file, it is
> > much more important do know where it is going to be stored. Instead, you
> > should use "--output" to write the file to the location the script is
> > going to use. It happened to work now, but we don't have to trust
> > the Internet when not needed.
> > 
> 
> Sure I copy-pasted it from the other scripts. With your suggestion it
> becomes:
> curl --fail --silent --show-error --location --remote-name http://http.us.debian.org/debian/dists/jessie/main/installer-armhf/current/images/netboot/vmlinuz
> 
> I can make the change

Sorry, I replied too quickly. It should be:

curl --fail --silent --show-error --location --output vmlinuz http://http.us.debian.org/debian/dists/jessie/main/installer-armhf/current/images/netboot/vmlinuz

 
> > Also, maybe use "https"?
> 
> https doesn't work for this:
> 
> $ curl --fail --silent --show-error --location --remote-name https://http.us.debian.org/debian/dists/jessie/main/installer-armhf/current/images/netboot/vmlinuz
> curl: (60) SSL: no alternative certificate subject name matches target host name 'http.us.debian.org'
 
> 
> > Also, maybe as an improvement for later, and to avoid having to rely on
> > the Internet, we could probably store those artifacts in the container
> > that's going to run the test. But I'm not asking this for now.
> 
> I agree! Even better if we could update the kernel too. I think for now
> it is OK but I'll try to improve it in the following weeks.
> 
> 
> > > +timeout -k 1 240 \
> > > +./qemu-system-arm \
> > 
> > There's probably a better way than waiting for the "timeout" like running an
> > "init" that print something and shutdown the machine. But I guess
> > that's ok for now.
> 
> Yeah I agree on both points. The other 3 tests are in the same
> situation.
> 


From xen-devel-bounces@lists.xenproject.org Sat Mar 19 00:32:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 19 Mar 2022 00:32:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292292.496507 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVN0z-0000G2-5x; Sat, 19 Mar 2022 00:32:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292292.496507; Sat, 19 Mar 2022 00:32:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVN0z-0000Fv-26; Sat, 19 Mar 2022 00:32:17 +0000
Received: by outflank-mailman (input) for mailman id 292292;
 Sat, 19 Mar 2022 00:32:15 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=T/Ld=T6=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nVN0x-0000Fo-QX
 for xen-devel@lists.xenproject.org; Sat, 19 Mar 2022 00:32:15 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 04e80783-a71c-11ec-8fbc-03012f2f19d4;
 Sat, 19 Mar 2022 01:32:13 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 035586172C;
 Sat, 19 Mar 2022 00:32:12 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id DD856C340E8;
 Sat, 19 Mar 2022 00:32:10 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 04e80783-a71c-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647649931;
	bh=CxHI6HHmfpMy1PQnGzk7HrUpZ0HnzSW1dfmfHoj7f64=;
	h=Date:From:To:cc:Subject:From;
	b=h9gZxdeEZYLSLOFlwtuo0HXFRBT1U8z02U1AAlT41/F0InMpq2ct/pjvbXXCxII7I
	 pRjJlr4j/f8HNqD2bvtWXtEG/84h8gd79wzc4AG3ATtOqQ8HOPS2ADHL/L9FZmITjR
	 oo/G8FeuOj8vZPGaDu5GuQuPcu3qvtpL0qXrjtJfzDkFQyctRBsBo0fxSN2GdUIVRA
	 EqNtD45O/0EKd1IKWauUTzGgSKw5X6IXxhDZ7gaxZkE/+lS8ugpukf7LlP0y3BY7oR
	 0IwH0DgB/Ixukk1k9xSw30toNZij0X5nB6puQLZ+tXQ9JBwjYT1q9xt64JdWZmr/sl
	 JLowf2XAQmffA==
Date: Fri, 18 Mar 2022 17:32:10 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: xen-devel@lists.xenproject.org
cc: sstabellini@kernel.org, cardoe@cardoe.com, wl@xen.org, 
    andrew.cooper3@citrix.com, anthony.perard@citrix.com, 
    bertrand.marquis@arm.com
Subject: [PATCH v3 0/2] automation: qemu32 smoke test
Message-ID: <alpine.DEB.2.22.394.2203181729490.2910984@ubuntu-linux-20-04-desktop>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

Hi all,

This small series adds a simple Xen + Dom0 boot arm32 test to gitlab-ci
using QEMU, similar to the existing tests for arm64 and x86.

Cheers,

Stefano


Stefano Stabellini (2):
      gitlab-ci: add qemu-system-arm to the existing tests-artifacts container
      gitlab-ci: add an ARM32 qemu-based smoke test

 automation/gitlab-ci/build.yaml                    | 14 ++++-
 automation/gitlab-ci/test.yaml                     | 27 +++++++-
 automation/scripts/qemu-smoke-arm32.sh             | 72 ++++++++++++++++++++++
 ...arm64v8.dockerfile => 6.0.0-arm64v8.dockerfile} |  5 +-
 4 files changed, 112 insertions(+), 6 deletions(-)
 create mode 100755 automation/scripts/qemu-smoke-arm32.sh
 rename automation/tests-artifacts/qemu-system-aarch64/{5.2.0-arm64v8.dockerfile => 6.0.0-arm64v8.dockerfile} (95%)


From xen-devel-bounces@lists.xenproject.org Sat Mar 19 00:33:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 19 Mar 2022 00:33:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292295.496518 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVN2V-0000ox-Hp; Sat, 19 Mar 2022 00:33:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292295.496518; Sat, 19 Mar 2022 00:33:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVN2V-0000oq-Ed; Sat, 19 Mar 2022 00:33:51 +0000
Received: by outflank-mailman (input) for mailman id 292295;
 Sat, 19 Mar 2022 00:33:51 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=T/Ld=T6=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nVN2U-0000oh-Vh
 for xen-devel@lists.xenproject.org; Sat, 19 Mar 2022 00:33:50 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 3e6952fc-a71c-11ec-a405-831a346695d4;
 Sat, 19 Mar 2022 01:33:49 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 965C96172C;
 Sat, 19 Mar 2022 00:33:48 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 72EB3C340E8;
 Sat, 19 Mar 2022 00:33:47 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3e6952fc-a71c-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647650027;
	bh=6fcuGmN0VOLiEsFwZuvE42PfLHtwz8AS00f3BuXsHLc=;
	h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
	b=VJBrcvGzAwk2NJLCL2vgWEwgRqsm7D2NQAs4UedGwFSJxTl1OJlLAS7gPybXIgyWU
	 0IIXrncNTajY95Ybj5a+X9DJahIfJOvThqIfat3MajaaE/gaUXXviIVALvB+U94Ui5
	 kmlm6kT9b/foecyKTD0AC6MCjtLqAjLBODqIaTM5t3jHkWMMXFo3G0pnAgmVkpL/4q
	 XM2xD5uAxomGi9jPLFqew504SNpqu7Wcz57Q1JMyrAOh0JGqkI/xXchwuXHMvUD61X
	 PY4NTlbhJVAY+aaDhjXczlTY6lN9Lo4Fh1Xxva4/8CjKQLm8myn7jwGYJvZyTxb7dn
	 nRxY01Vkm74pw==
From: Stefano Stabellini <sstabellini@kernel.org>
To: xen-devel@lists.xenproject.org
Cc: sstabellini@kernel.org,
	cardoe@cardoe.com,
	wl@xen.org,
	andrew.cooper3@citrix.com,
	anthony.perard@citrix.com,
	bertrand.marquis@arm.com,
	Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: [PATCH v3 1/2] gitlab-ci: add qemu-system-arm to the existing tests-artifacts container
Date: Fri, 18 Mar 2022 17:32:20 -0700
Message-Id: <20220319003221.3012314-1-sstabellini@kernel.org>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <alpine.DEB.2.22.394.2203181729490.2910984@ubuntu-linux-20-04-desktop>
References: <alpine.DEB.2.22.394.2203181729490.2910984@ubuntu-linux-20-04-desktop>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Stefano Stabellini <stefano.stabellini@xilinx.com>

Add qemu-system-arm to the existing test-artifacts qemu container (which
doesn't get build for every iteration but only updated once in a while.)

With qemu-system-arm available, we'll be able to run ARM32 tests.

This patch also bumps the QEMU version to v6.0.0 for both arm32 and
arm64 (the test-artifacts container is one, shared for both).

Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
Reviewed-by: Anthony PERARD <anthony.perard@citrix.com>
---
 automation/gitlab-ci/build.yaml                    | 14 ++++++++++++--
 automation/gitlab-ci/test.yaml                     |  4 ++--
 ...arm64v8.dockerfile => 6.0.0-arm64v8.dockerfile} |  5 +++--
 3 files changed, 17 insertions(+), 6 deletions(-)
 rename automation/tests-artifacts/qemu-system-aarch64/{5.2.0-arm64v8.dockerfile => 6.0.0-arm64v8.dockerfile} (95%)

diff --git a/automation/gitlab-ci/build.yaml b/automation/gitlab-ci/build.yaml
index cc36428cf5..72f2a317ac 100644
--- a/automation/gitlab-ci/build.yaml
+++ b/automation/gitlab-ci/build.yaml
@@ -591,9 +591,9 @@ kernel-5.9.9-arm64-export:
   tags:
     - arm64
 
-qemu-system-aarch64-5.2.0-arm64-export:
+qemu-system-aarch64-6.0.0-arm64-export:
   stage: build
-  image: registry.gitlab.com/xen-project/xen/tests-artifacts/qemu-system-aarch64:5.2.0-arm64v8
+  image: registry.gitlab.com/xen-project/xen/tests-artifacts/qemu-system-aarch64:6.0.0-arm64v8
   script:
     - mkdir binaries && cp /qemu-system-aarch64 binaries/qemu-system-aarch64
   artifacts:
@@ -602,6 +602,16 @@ qemu-system-aarch64-5.2.0-arm64-export:
   tags:
     - arm64
 
+qemu-system-aarch64-6.0.0-arm32-export:
+  stage: build
+  image: registry.gitlab.com/xen-project/xen/tests-artifacts/qemu-system-aarch64:6.0.0-arm64v8
+  script:
+    - mkdir binaries && cp /qemu-system-arm binaries/qemu-system-arm
+  artifacts:
+    paths:
+      - binaries/qemu-system-arm
+  tags:
+    - arm64
 
 # x86_64 test artifacts
 
diff --git a/automation/gitlab-ci/test.yaml b/automation/gitlab-ci/test.yaml
index 47e8704df3..ec2a2e1607 100644
--- a/automation/gitlab-ci/test.yaml
+++ b/automation/gitlab-ci/test.yaml
@@ -33,7 +33,7 @@ qemu-alpine-arm64-gcc:
     - alpine-3.12-gcc-arm64
     - alpine-3.12-arm64-rootfs-export
     - kernel-5.9.9-arm64-export
-    - qemu-system-aarch64-5.2.0-arm64-export
+    - qemu-system-aarch64-6.0.0-arm64-export
   artifacts:
     paths:
       - smoke.serial
@@ -81,7 +81,7 @@ qemu-smoke-arm64-gcc:
   dependencies:
     - debian-unstable-gcc-arm64
     - kernel-5.9.9-arm64-export
-    - qemu-system-aarch64-5.2.0-arm64-export
+    - qemu-system-aarch64-6.0.0-arm64-export
   artifacts:
     paths:
       - smoke.serial
diff --git a/automation/tests-artifacts/qemu-system-aarch64/5.2.0-arm64v8.dockerfile b/automation/tests-artifacts/qemu-system-aarch64/6.0.0-arm64v8.dockerfile
similarity index 95%
rename from automation/tests-artifacts/qemu-system-aarch64/5.2.0-arm64v8.dockerfile
rename to automation/tests-artifacts/qemu-system-aarch64/6.0.0-arm64v8.dockerfile
index e105a1c636..793432d40b 100644
--- a/automation/tests-artifacts/qemu-system-aarch64/5.2.0-arm64v8.dockerfile
+++ b/automation/tests-artifacts/qemu-system-aarch64/6.0.0-arm64v8.dockerfile
@@ -3,7 +3,7 @@ LABEL maintainer.name="The Xen Project" \
       maintainer.email="xen-devel@lists.xenproject.org"
 
 ENV DEBIAN_FRONTEND=noninteractive
-ENV QEMU_VERSION=5.2.0
+ENV QEMU_VERSION=6.0.0
 ENV USER root
 
 RUN mkdir /build
@@ -25,7 +25,7 @@ RUN apt-get update && \
     tar xvJf qemu-"$QEMU_VERSION".tar.xz && \
     cd qemu-"$QEMU_VERSION" && \
     ./configure                \
-        --target-list=aarch64-softmmu \
+        --target-list=arm-softmmu,aarch64-softmmu \
         --enable-system        \
         --disable-blobs        \
         --disable-bsd-user     \
@@ -68,6 +68,7 @@ RUN apt-get update && \
     && \
     make -j$(nproc) && \
     cp ./build/qemu-system-aarch64 / && \
+    cp ./build/qemu-system-arm / && \
     cd /build && \
     rm -rf qemu-"$QEMU_VERSION"* && \
     apt-get autoremove -y && \
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Sat Mar 19 00:33:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 19 Mar 2022 00:33:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292296.496529 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVN2W-00014v-Pk; Sat, 19 Mar 2022 00:33:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292296.496529; Sat, 19 Mar 2022 00:33:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVN2W-00014o-Lr; Sat, 19 Mar 2022 00:33:52 +0000
Received: by outflank-mailman (input) for mailman id 292296;
 Sat, 19 Mar 2022 00:33:51 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=T/Ld=T6=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nVN2V-0000oo-Gd
 for xen-devel@lists.xenproject.org; Sat, 19 Mar 2022 00:33:51 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3eb09780-a71c-11ec-8fbc-03012f2f19d4;
 Sat, 19 Mar 2022 01:33:50 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 1C53061678;
 Sat, 19 Mar 2022 00:33:49 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 09C39C36AE3;
 Sat, 19 Mar 2022 00:33:48 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3eb09780-a71c-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647650028;
	bh=LePh5pv9odEWqM2WQtVDEeyx/R3Q3BxHjixjaGq6vMk=;
	h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
	b=hliFhbz9amOFiTAErL5AkOGEad8uSa3lyrkx9BGpvomg698YruxzkSurphzOgIZhD
	 10aZqbyIrfc43+VG6bztJLNZkjzyRELVkNXskyWoFEdJYKaWvdPgmzZsLNfSpHXElP
	 Q2r23puAITXMV0CQEOxpiDxL07MI1i3KDPjRUshqoJtLQkrw87rSaI5rIBBS3DluYj
	 CZ23DVSqWD9X47wwVdJAVtDcZKml4NlIAqIdFL+vZ9cYUsD8iuNHJtKIAFX/EackgR
	 M9tgHtK1CsjaiXakblv5ryPDyZm6MTHlnKBNUbpIET0BhG566er7/eXavWh5Lg4n0s
	 Z05WFSqQENi9A==
From: Stefano Stabellini <sstabellini@kernel.org>
To: xen-devel@lists.xenproject.org
Cc: sstabellini@kernel.org,
	cardoe@cardoe.com,
	wl@xen.org,
	andrew.cooper3@citrix.com,
	anthony.perard@citrix.com,
	bertrand.marquis@arm.com,
	Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: [PATCH v3 2/2] gitlab-ci: add an ARM32 qemu-based smoke test
Date: Fri, 18 Mar 2022 17:32:21 -0700
Message-Id: <20220319003221.3012314-2-sstabellini@kernel.org>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <alpine.DEB.2.22.394.2203181729490.2910984@ubuntu-linux-20-04-desktop>
References: <alpine.DEB.2.22.394.2203181729490.2910984@ubuntu-linux-20-04-desktop>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Add a minimal ARM32 smoke test based on qemu-system-arm, as provided by
the test-artifacts qemu container. The minimal test simply boots Xen
(built from previous build stages) and Dom0. The test is fetching the
Dom0 kernel and initrd from Debian Jessie: they work just fine and this
way we don't have to maintain a build for them too.

Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>

---
Changes in v3:
- use long options for curl
- use curl --output

Changes in v2:
- improve comments
- don't limit dom0 cpus
- decrease mem to 1024M and dom0_mem=512M
- use Debian Bullseye instead of Jessie
---
 automation/gitlab-ci/test.yaml         | 23 ++++++++
 automation/scripts/qemu-smoke-arm32.sh | 72 ++++++++++++++++++++++++++
 2 files changed, 95 insertions(+)
 create mode 100755 automation/scripts/qemu-smoke-arm32.sh

diff --git a/automation/gitlab-ci/test.yaml b/automation/gitlab-ci/test.yaml
index ec2a2e1607..42cd725a12 100644
--- a/automation/gitlab-ci/test.yaml
+++ b/automation/gitlab-ci/test.yaml
@@ -95,6 +95,29 @@ qemu-smoke-arm64-gcc:
     - /^coverity-tested\/.*/
     - /^stable-.*/
 
+qemu-smoke-arm32-gcc:
+  stage: test
+  image: registry.gitlab.com/xen-project/xen/${CONTAINER}
+  variables:
+    CONTAINER: debian:unstable-arm64v8
+  script:
+    - ./automation/scripts/qemu-smoke-arm32.sh 2>&1 | tee qemu-smoke-arm32.log
+  dependencies:
+    - debian-unstable-gcc-arm32
+    - qemu-system-aarch64-6.0.0-arm32-export
+  artifacts:
+    paths:
+      - smoke.serial
+      - '*.log'
+    when: always
+  tags:
+    - arm64
+  except:
+    - master
+    - smoke
+    - /^coverity-tested\/.*/
+    - /^stable-.*/
+
 qemu-smoke-x86-64-gcc:
   stage: test
   image: registry.gitlab.com/xen-project/xen/${CONTAINER}
diff --git a/automation/scripts/qemu-smoke-arm32.sh b/automation/scripts/qemu-smoke-arm32.sh
new file mode 100755
index 0000000000..162922ace5
--- /dev/null
+++ b/automation/scripts/qemu-smoke-arm32.sh
@@ -0,0 +1,72 @@
+#!/bin/bash
+
+set -ex
+
+export DEBIAN_FRONTENT=noninteractive
+apt-get -qy update
+apt-get -qy install --no-install-recommends device-tree-compiler \
+                                            curl
+
+cd binaries
+curl --fail --silent --show-error --location --output vmlinuz http://http.us.debian.org/debian/dists/jessie/main/installer-armhf/current/images/netboot/vmlinuz
+curl --fail --silent --show-error --location --output initrd.gz http://http.us.debian.org/debian/dists/jessie/main/installer-armhf/current/images/netboot/initrd.gz
+
+kernel=`stat -L --printf="%s" vmlinuz`
+initrd=`stat -L --printf="%s" initrd.gz`
+
+# For Xen, we need a couple of more node. Dump the DT from QEMU and add them
+# XXX QEMU looks for "efi-virtio.rom" even if it is unneeded
+curl -fsSLO https://github.com/qemu/qemu/raw/v5.2.0/pc-bios/efi-virtio.rom
+./qemu-system-arm \
+   -machine virt-6.0 \
+   -machine virtualization=true \
+   -smp 4 \
+   -m 1024 \
+   -serial stdio \
+   -monitor none \
+   -display none \
+   -machine dumpdtb=virt.dtb
+
+dtc -I dtb -O dts virt.dtb > virt.dts
+
+cat >> virt.dts << EOF
+/ {
+	chosen {
+		#address-cells = <0x2>;
+		#size-cells = <0x2>;
+		stdout-path = "/pl011@9000000";
+        xen,xen-bootargs = "console=dtuart dtuart=/pl011@9000000 dom0_mem=512M bootscrub=0";
+		xen,dom0-bootargs = "console=tty0 console=hvc0 earlyprintk clk_ignore_unused root=/dev/ram0 rdinit=/bin/sh init=/bin/sh";
+		dom0 {
+			compatible = "xen,linux-zimage", "xen,multiboot-module";
+			reg = <0x0 0x1000000 0x0 $kernel>;
+		};
+        dom0-ramdisk {
+			compatible = "xen,linux-initrd", "xen,multiboot-module";
+			reg = <0x0 0x3200000 0x0 $initrd>;
+		};
+	};
+};
+EOF
+dtc -I dts -O dtb virt.dts > virt.dtb
+
+rm -f smoke.serial
+set +e
+timeout -k 1 240 \
+./qemu-system-arm \
+   -machine virt-6.0 \
+   -machine virtualization=true \
+   -smp 4 \
+   -m 1024 \
+   -serial stdio \
+   -monitor none \
+   -display none \
+   -dtb virt.dtb \
+   -no-reboot \
+   -kernel ./xen \
+   -device loader,file=./vmlinuz,addr=0x1000000 \
+   -device loader,file=./initrd.gz,addr=0x3200000 |& tee smoke.serial
+
+set -e
+(grep -q "^BusyBox" smoke.serial) || exit 1
+exit 0
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Sat Mar 19 00:36:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 19 Mar 2022 00:36:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292301.496539 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVN5C-00022S-7U; Sat, 19 Mar 2022 00:36:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292301.496539; Sat, 19 Mar 2022 00:36:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVN5C-00022L-4U; Sat, 19 Mar 2022 00:36:38 +0000
Received: by outflank-mailman (input) for mailman id 292301;
 Sat, 19 Mar 2022 00:36:37 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVN5B-00022B-91; Sat, 19 Mar 2022 00:36:37 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVN5B-0006UT-80; Sat, 19 Mar 2022 00:36:37 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVN5A-0005XE-Tz; Sat, 19 Mar 2022 00:36:36 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVN5A-0007PS-TW; Sat, 19 Mar 2022 00:36:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=amj9ZG8K33tCL+pHxqQszjB6cnGh8LeunRqbyUjMEuY=; b=TkW/mIW1v4DsF3G11KSRfzXIII
	K4paQT4Yw4TxF5L7Hx2Gq6XJSrLtuEn3uLUO9vVmijob/BWgQRPj0011uXxmOEhhlPLM7Mop7y7Wn
	d1IbU0F3PlVxluP7uvPNXs5BoG57C8SAQNxRC8CWyuFEyZAOHBCc9KF5D5hh7pusjUIY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168693-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168693: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 19 Mar 2022 00:36:36 +0000

flight 168693 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168693/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   18 days
Failing since        168258  2022-03-01 01:55:31 Z   17 days  178 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    0 days   14 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 19 01:29:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 19 Mar 2022 01:29:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292308.496551 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVNuM-0004Wj-79; Sat, 19 Mar 2022 01:29:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292308.496551; Sat, 19 Mar 2022 01:29:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVNuM-0004Wc-4B; Sat, 19 Mar 2022 01:29:30 +0000
Received: by outflank-mailman (input) for mailman id 292308;
 Sat, 19 Mar 2022 01:29:28 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVNuK-0004WS-S0; Sat, 19 Mar 2022 01:29:28 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVNuK-0004Fp-JG; Sat, 19 Mar 2022 01:29:28 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVNuK-00078n-Cc; Sat, 19 Mar 2022 01:29:28 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVNuK-0000Rn-CA; Sat, 19 Mar 2022 01:29:28 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=N2M7srvkiywlaFV1BOQVpiQFjAcGH4u3kFNzToFyOpU=; b=Q9gCAAODnomEqBfzvfEQCdKDAC
	fp6M8vhcm1JpKwU1PEiP8a0Me3UIUBlHpQWACV0oy3F78yMCMBBp9vFvKKgobjVe/C/947O1SuZUv
	qISqHPyoqSK5XmPMlQD+eC8fOSxqzZzWkDVCfQgWHt3/SL5zvf8Vy+stBG0913dKh6sI=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168694-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168694: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 19 Mar 2022 01:29:28 +0000

flight 168694 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168694/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   18 days
Failing since        168258  2022-03-01 01:55:31 Z   17 days  179 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    0 days   15 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 19 02:31:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 19 Mar 2022 02:31:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292317.496562 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVOru-0003IG-3H; Sat, 19 Mar 2022 02:31:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292317.496562; Sat, 19 Mar 2022 02:31:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVOrt-0003I2-T6; Sat, 19 Mar 2022 02:31:01 +0000
Received: by outflank-mailman (input) for mailman id 292317;
 Sat, 19 Mar 2022 02:31:01 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVOrt-0003Hs-2X; Sat, 19 Mar 2022 02:31:01 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVOrs-0005je-Ho; Sat, 19 Mar 2022 02:31:00 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVOrs-0000UA-2P; Sat, 19 Mar 2022 02:31:00 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVOrs-0003b5-20; Sat, 19 Mar 2022 02:31:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=QenB5welQdmtCGaintIxxBfV+DAl8H8V+uTiTFbP5co=; b=eRbvRzuqI4qyXEu2xAN/CgyFPX
	iyXEchnAJOWk12K9MwqR8iwowl5RqZYcOjDssWMzepVZUpzScThoAyRDqDOn+fGIX13F55eGhq+hQ
	wFk73C8+SbXoJrMeeVYnh3Cj470Fcsw1mdongpaq1XouzdToVnLfdPD+pZFgPTAgNZw0=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168695-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168695: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 19 Mar 2022 02:31:00 +0000

flight 168695 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168695/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   18 days
Failing since        168258  2022-03-01 01:55:31 Z   18 days  180 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    0 days   16 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 19 03:18:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 19 Mar 2022 03:18:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292325.496573 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVPbX-0007au-Ci; Sat, 19 Mar 2022 03:18:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292325.496573; Sat, 19 Mar 2022 03:18:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVPbX-0007an-9S; Sat, 19 Mar 2022 03:18:11 +0000
Received: by outflank-mailman (input) for mailman id 292325;
 Sat, 19 Mar 2022 03:18:10 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVPbW-0007ad-Dv; Sat, 19 Mar 2022 03:18:10 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVPbW-0006XJ-Bz; Sat, 19 Mar 2022 03:18:10 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVPbW-0001ji-1f; Sat, 19 Mar 2022 03:18:10 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVPbV-0006Q6-W0; Sat, 19 Mar 2022 03:18:09 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=cqxIuM1ZjOVziHr1r6DLRdMCEspvUwVZPLVlNEzCXtU=; b=OOOAzZkwWgRr01vt5E0tyoL2bF
	jItXFLuFc27+Z1sClksWI/lK2G17kkm8ENFTIBQbIU8TOh7aO683ndWS6ZFMMSjUZHUH/Nm9+OjrQ
	5z6hl9KsmTsfmy7Wl+cd7N1P/KuxzxKyZD3kP430Z6T3qoTTzxj0MPNfV1FyJ1lKwWW4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168697-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168697: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 19 Mar 2022 03:18:09 +0000

flight 168697 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168697/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   18 days
Failing since        168258  2022-03-01 01:55:31 Z   18 days  181 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    0 days   17 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 19 04:50:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 19 Mar 2022 04:50:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292335.496591 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVR39-0000kv-8U; Sat, 19 Mar 2022 04:50:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292335.496591; Sat, 19 Mar 2022 04:50:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVR39-0000ko-5A; Sat, 19 Mar 2022 04:50:47 +0000
Received: by outflank-mailman (input) for mailman id 292335;
 Sat, 19 Mar 2022 04:50:46 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVR37-0000kd-WC; Sat, 19 Mar 2022 04:50:46 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVR37-00088S-Tl; Sat, 19 Mar 2022 04:50:45 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVR37-0005F7-GR; Sat, 19 Mar 2022 04:50:45 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVR37-000388-Fx; Sat, 19 Mar 2022 04:50:45 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=pqtkfNm10hhMvFTMuHMwrOloVJDlLSTsrLLxgW3xusI=; b=54BajiJxi7BXcP3YlWlwYuXue4
	SUZWZNiRRjMlOF+UDwKVzji3etQoP6DuW/SzOZoaeDY3BI3Ya/5EeD7xCa3pwreY4OymJORyAAXFh
	rLATU3D5ELurAqLR3g8oUylHpU8K/QQB18V7UZnst7dMj+JpZAtucBq7uq3Jon7QEOpc=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168698-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168698: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 19 Mar 2022 04:50:45 +0000

flight 168698 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168698/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   18 days
Failing since        168258  2022-03-01 01:55:31 Z   18 days  182 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    0 days   18 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 19 05:44:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 19 Mar 2022 05:44:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292343.496603 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVRtT-0006B0-4X; Sat, 19 Mar 2022 05:44:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292343.496603; Sat, 19 Mar 2022 05:44:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVRtT-0006At-1V; Sat, 19 Mar 2022 05:44:51 +0000
Received: by outflank-mailman (input) for mailman id 292343;
 Sat, 19 Mar 2022 05:44:49 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVRtR-0006Aj-AJ; Sat, 19 Mar 2022 05:44:49 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVRtR-0001Le-8T; Sat, 19 Mar 2022 05:44:49 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVRtQ-00076y-T4; Sat, 19 Mar 2022 05:44:48 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVRtQ-0006Kp-Sd; Sat, 19 Mar 2022 05:44:48 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=sm5DQH2Tt5OcXYhlWohIx/vuCECG6Lt9WleuK7CLGQk=; b=ezb8n2ArE6p82rc69bEP1q7RF0
	tNEMBZmxN8cu4c0m2Tkr4WiNKEhjgqo0nlItWNSRBGUevN8Jv59OvxcUmMhDXXgy7leEs91Jb7aGy
	so7iuMh4I+rgHcGPaiH5sHDdapPqzy9X9yBzEHejSjOAJrdXqoL1tS6usoGKmjDzaiXo=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168691-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168691: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-freebsd12-amd64:guest-start.2:fail:heisenbug
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=34e047aa16c0123bbae8e2f6df33e5ecc1f56601
X-Osstest-Versions-That:
    linux=551acdc3c3d2b6bc97f11e31dcf960bc36343bfc
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 19 Mar 2022 05:44:48 +0000

flight 168691 linux-linus real [real]
flight 168700 linux-linus real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168691/
http://logs.test-lab.xenproject.org/osstest/logs/168700/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-freebsd12-amd64 22 guest-start.2   fail pass in 168700-retest

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168681
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168681
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168681
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168681
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168681
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168681
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168681
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168681
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                34e047aa16c0123bbae8e2f6df33e5ecc1f56601
baseline version:
 linux                551acdc3c3d2b6bc97f11e31dcf960bc36343bfc

Last test of basis   168681  2022-03-18 13:42:03 Z    0 days
Testing same since   168691  2022-03-18 22:11:00 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Arnd Bergmann <arnd@arndb.de>
  Boris Brezillon <boris.brezillon@collabora.com>
  Brian Masney <bmasney@redhat.com>
  Catalin Marinas <catalin.marinas@arm.com>
  Christoph Hellwig <hch@lst.de>
  Christoph Niedermaier <cniedermaier@dh-electronics.com>
  Dave Airlie <airlied@redhat.com>
  Hannes Reinecke <hare@suse.de>
  James Morse <james.morse@arm.com>
  Jens Axboe <axboe@kernel.dk>
  Jocelyn Falempe <jfalempe@redhat.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Maarten Lankhorst <maarten.lankhorst@linux.intel.com>
  Marek Vasut <marex@denx.de>
  Max Krummenacher <max.krummenacher@toradex.com>
  Ming Lei <ming.lei@redhat.com>
  Ronnie Sahlberg <lsahlber@redhat.com>
  Sam Ravnborg <sam@ravnborg.org>
  Steve French <stfrench@microsoft.com>
  Thomas Zimmermann <tzimmermann@suse.de>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             fail    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   551acdc3c3d2..34e047aa16c0  34e047aa16c0123bbae8e2f6df33e5ecc1f56601 -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Sat Mar 19 08:20:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 19 Mar 2022 08:20:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292362.496614 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVUJV-0004ME-IQ; Sat, 19 Mar 2022 08:19:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292362.496614; Sat, 19 Mar 2022 08:19:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVUJV-0004M7-F1; Sat, 19 Mar 2022 08:19:53 +0000
Received: by outflank-mailman (input) for mailman id 292362;
 Sat, 19 Mar 2022 08:19:52 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVUJT-0004Lx-UE; Sat, 19 Mar 2022 08:19:51 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVUJT-0004Tp-Ru; Sat, 19 Mar 2022 08:19:51 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVUJT-0007IH-Gd; Sat, 19 Mar 2022 08:19:51 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVUJT-00025i-GB; Sat, 19 Mar 2022 08:19:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=vnqshaEK9ymY19jbW/roEx5YzK/t+pM4nB1WO1+US0I=; b=I/czwR8qV2cG9XzF/xh8i+jLNF
	6dCBqS72045aLmtDCqnLis1lvpQEzrRbxpv8DT+Om+LlF4X9s05m2RV5oZ+R6mM2OV3Gt5diONS0e
	h0POKqs65lCi4NLctFYMLoqq9taA79H8Ph2XxvMlCGndATw3G/05lmQfkIK3xaIYgeIA=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168701-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168701: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=fdfb07eb28e42b456e5e1ce999a47cc3ea439f7f
X-Osstest-Versions-That:
    xen=6974c75180f1aad44e5428eabf2396b2b50fb0e4
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 19 Mar 2022 08:19:51 +0000

flight 168701 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168701/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  fdfb07eb28e42b456e5e1ce999a47cc3ea439f7f
baseline version:
 xen                  6974c75180f1aad44e5428eabf2396b2b50fb0e4

Last test of basis   168669  2022-03-17 23:00:29 Z    1 days
Testing same since   168701  2022-03-19 05:00:29 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
  Ayan Kumar Halder <ayankuma@xilinx.com>
  Stefano Stabellini <sstabellini@kernel.org>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   6974c75180..fdfb07eb28  fdfb07eb28e42b456e5e1ce999a47cc3ea439f7f -> smoke


From xen-devel-bounces@lists.xenproject.org Sat Mar 19 10:03:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 19 Mar 2022 10:03:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292371.496625 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVVvY-0006PK-82; Sat, 19 Mar 2022 10:03:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292371.496625; Sat, 19 Mar 2022 10:03:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVVvY-0006PD-52; Sat, 19 Mar 2022 10:03:16 +0000
Received: by outflank-mailman (input) for mailman id 292371;
 Sat, 19 Mar 2022 10:03:14 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVVvW-0006P3-Bp; Sat, 19 Mar 2022 10:03:14 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVVvW-0006I5-9W; Sat, 19 Mar 2022 10:03:14 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVVvV-000271-U4; Sat, 19 Mar 2022 10:03:13 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVVvV-00072E-Td; Sat, 19 Mar 2022 10:03:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=q7OH/jiSZ7Udmd+KGUr6tQtyifjDGW0X1vrbWhC+5m0=; b=FKazMS1Xj5HJOVIg3UTie3r5ro
	UULtJOjhnry1UVKCrqbAB5oX1WC60PH4oDY/Kml9srNpaB0xoEkz8DaFuYzp3ULDh7Jy9wwqWDUX9
	P2Hj7ePOUo+Po4ltIJCd6eL66ZlKQ76NTViKMm1TYDDZgeKHto91T9VAhxbfLU47yyrI=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168702-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168702: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 19 Mar 2022 10:03:13 +0000

flight 168702 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168702/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   18 days
Failing since        168258  2022-03-01 01:55:31 Z   18 days  183 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    1 days   19 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 19 10:10:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 19 Mar 2022 10:10:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292379.496636 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVW2d-0007qp-1W; Sat, 19 Mar 2022 10:10:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292379.496636; Sat, 19 Mar 2022 10:10:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVW2c-0007qi-Uk; Sat, 19 Mar 2022 10:10:34 +0000
Received: by outflank-mailman (input) for mailman id 292379;
 Sat, 19 Mar 2022 10:10:33 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVW2a-0007qY-Ug; Sat, 19 Mar 2022 10:10:32 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVW2a-0006QS-RV; Sat, 19 Mar 2022 10:10:32 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVW2a-0002Gg-D2; Sat, 19 Mar 2022 10:10:32 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVW2a-0008PI-CZ; Sat, 19 Mar 2022 10:10:32 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=dwWh9M3a/TWGABK0RB3aurlTuN7DsOIt0wKuN5qA6+0=; b=kPF4VIr1m/uF0sygw1jZSfQmwa
	6KEnAIffFmkJ0OLxVtrWHwMjry8vadsyolBopJ/6B9UtPeEQwDcS2qUH36cs77oN3jw4iOXSiejy4
	5nnB4kmZ2726g352yfJUm5X9KuIFrGcrhZEHpGfoXNtJ0+gJ010+CXeKGaP8p76QYvlk=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168696-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168696: tolerable FAIL
X-Osstest-Failures:
    xen-unstable:test-amd64-i386-qemut-rhel6hvm-intel:guest-start.2:fail:heisenbug
    xen-unstable:test-amd64-amd64-dom0pvh-xl-amd:guest-localmigrate:fail:heisenbug
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=6974c75180f1aad44e5428eabf2396b2b50fb0e4
X-Osstest-Versions-That:
    xen=6974c75180f1aad44e5428eabf2396b2b50fb0e4
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 19 Mar 2022 10:10:32 +0000

flight 168696 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168696/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-i386-qemut-rhel6hvm-intel 15 guest-start.2 fail in 168677 pass in 168696
 test-amd64-amd64-dom0pvh-xl-amd 18 guest-localmigrate      fail pass in 168677

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168677
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168677
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168677
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168677
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168677
 test-armhf-armhf-xl-rtds     18 guest-start/debian.repeat    fail  like 168677
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168677
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168677
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168677
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168677
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168677
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168677
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168677
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass

version targeted for testing:
 xen                  6974c75180f1aad44e5428eabf2396b2b50fb0e4
baseline version:
 xen                  6974c75180f1aad44e5428eabf2396b2b50fb0e4

Last test of basis   168696  2022-03-19 01:51:58 Z    0 days
Testing same since                          (not found)         0 attempts

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              fail    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Published tested tree is already up to date.



From xen-devel-bounces@lists.xenproject.org Sat Mar 19 10:34:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 19 Mar 2022 10:34:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292387.496646 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVWPj-0001uy-Pc; Sat, 19 Mar 2022 10:34:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292387.496646; Sat, 19 Mar 2022 10:34:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVWPj-0001ur-MW; Sat, 19 Mar 2022 10:34:27 +0000
Received: by outflank-mailman (input) for mailman id 292387;
 Sat, 19 Mar 2022 10:34:25 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVWPh-0001uh-OU; Sat, 19 Mar 2022 10:34:25 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVWPh-0006mP-Lt; Sat, 19 Mar 2022 10:34:25 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVWPh-0002me-9K; Sat, 19 Mar 2022 10:34:25 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVWPh-0006ci-8r; Sat, 19 Mar 2022 10:34:25 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=KvCD/wF4Rxc3H2iM6KsupgSql+o8LnXxiHtiDTJAxJo=; b=DssDVgZ5TtnhnIBAp5I8FpmkKS
	SEgyGN0SAlqPsgUGDU04tTuQ4BuEPzu94JHBomt+JQg/DTto+qEPOg7Kc3eJxdz81Wt+MdRKihD1P
	G2FBLkFgje+hF/r/F30biAGPH/s1Wm30tDHELs5rjOISuVo0lIr09PzFTXX6TtbYvgeU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168699-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168699: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-pvops:kernel-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=af6f6091e02bb46633666ce30d4c6533a52688a5
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 19 Mar 2022 10:34:25 +0000

flight 168699 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168699/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-arm64-pvops             6 kernel-build             fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              af6f6091e02bb46633666ce30d4c6533a52688a5
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  617 days
Failing since        151818  2020-07-11 04:18:52 Z  616 days  598 attempts
Testing same since   168699  2022-03-19 04:19:02 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Haonan Wang <hnwanga1@gmail.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Martin Pitt <mpitt@debian.org>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            fail    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 101708 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 19 10:47:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 19 Mar 2022 10:47:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292395.496661 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVWbw-0003V2-33; Sat, 19 Mar 2022 10:47:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292395.496661; Sat, 19 Mar 2022 10:47:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVWbv-0003Uv-Vq; Sat, 19 Mar 2022 10:47:03 +0000
Received: by outflank-mailman (input) for mailman id 292395;
 Sat, 19 Mar 2022 10:47:02 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVWbu-0003Uj-N6; Sat, 19 Mar 2022 10:47:02 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVWbu-00070F-MD; Sat, 19 Mar 2022 10:47:02 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVWbu-00034V-3i; Sat, 19 Mar 2022 10:47:02 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVWbu-0001ix-3G; Sat, 19 Mar 2022 10:47:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=2h20zdEMVW6M7UlYjqhZtDOrgPzCKA0DNZDHhym6rrg=; b=o5CSrpgd9MffRdk4o9HcFyQAQt
	ViA2MKBqB5yMT5rvHCvBoI+nk2dUW99QaJ8H/thzSAfk5Mu0HMqaKYOq5WTju7b7gcpGWmOskJmhc
	V6OdW2qB3qpBfLB5sckdU1rrt7CFF/fwxy/W+uqTSsEMmTXEYlX2Dm/Hngbc1YNIko0w=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168703-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168703: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 19 Mar 2022 10:47:02 +0000

flight 168703 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168703/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   19 days
Failing since        168258  2022-03-01 01:55:31 Z   18 days  184 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    1 days   20 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 19 12:16:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 19 Mar 2022 12:16:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292404.496672 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVY0g-00042M-Ik; Sat, 19 Mar 2022 12:16:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292404.496672; Sat, 19 Mar 2022 12:16:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVY0g-00042F-FL; Sat, 19 Mar 2022 12:16:42 +0000
Received: by outflank-mailman (input) for mailman id 292404;
 Sat, 19 Mar 2022 12:16:41 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVY0f-000425-JO; Sat, 19 Mar 2022 12:16:41 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVY0f-0008VR-Gp; Sat, 19 Mar 2022 12:16:41 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVY0f-0005Ev-24; Sat, 19 Mar 2022 12:16:41 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVY0f-00040b-1e; Sat, 19 Mar 2022 12:16:41 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=7C2wcvzTriSxdM2LOh2r07KX1kFvjZlUJJi3cHhXwRo=; b=uL+dIeBVKOeo0CWa6HhFYGFie8
	1ON28Mfwte70OjdH0hlp+BRWFp20Qu60eYqf/jvnde7M7wkH1/ZcEe43olEEdaga4F//xpZAJ1r/H
	2rcEE6lgHXU0bDKZEIF/1cKskSOXlUgyadZlYnHCV8THPo5TbTQbuqCcRI4r9K5WEVA8=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168707-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168707: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 19 Mar 2022 12:16:41 +0000

flight 168707 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168707/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   19 days
Failing since        168258  2022-03-01 01:55:31 Z   18 days  185 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    1 days   21 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 19 14:04:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 19 Mar 2022 14:04:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292414.496683 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVZgd-00069p-9r; Sat, 19 Mar 2022 14:04:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292414.496683; Sat, 19 Mar 2022 14:04:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVZgd-00069i-5b; Sat, 19 Mar 2022 14:04:07 +0000
Received: by outflank-mailman (input) for mailman id 292414;
 Sat, 19 Mar 2022 14:04:06 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVZgc-00069Y-GR; Sat, 19 Mar 2022 14:04:06 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVZgc-0001rw-FT; Sat, 19 Mar 2022 14:04:06 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVZgc-00012F-4l; Sat, 19 Mar 2022 14:04:06 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVZgc-0003XY-4I; Sat, 19 Mar 2022 14:04:06 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=EoHZyU0i23aSNzeTAhC1AuOkxVtVAvQd/Pc5Xu3kR6I=; b=0pQTLNd0b8EQF8ZMvMjrsVaPFy
	vH12GVARVwMtDLBEsJnu0IXeCOiPN4rm8FnUGmr7OnP5FqgtyxxheehshL0mIvrCExovqPAjw+GlD
	eEu+8Bd6MuZNCEbQFmLd5HeO4GgIR0IMrPyaQiW9rlcR2CAignfrKoXt7MongApyouX4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168708-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168708: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 19 Mar 2022 14:04:06 +0000

flight 168708 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168708/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   19 days
Failing since        168258  2022-03-01 01:55:31 Z   18 days  186 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    1 days   22 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 19 16:00:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 19 Mar 2022 16:00:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292423.496694 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVbUQ-0008Mj-JU; Sat, 19 Mar 2022 15:59:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292423.496694; Sat, 19 Mar 2022 15:59:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVbUQ-0008Mc-GY; Sat, 19 Mar 2022 15:59:38 +0000
Received: by outflank-mailman (input) for mailman id 292423;
 Sat, 19 Mar 2022 15:59:37 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nVbUP-0008MW-C2
 for xen-devel@lists.xenproject.org; Sat, 19 Mar 2022 15:59:37 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nVbUP-0003gx-3S; Sat, 19 Mar 2022 15:59:37 +0000
Received: from home.octic.net ([81.187.162.82] helo=[10.0.1.102])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nVbUO-0006T8-Rw; Sat, 19 Mar 2022 15:59:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=Z0daPzM+BvS/I4W929gyCo8+vlXUmNoOZUIgyrJTD/U=; b=EdlyTSZC7Jp0wtjr84PYCES8Xr
	lb2cNT3+a36IAsFRpEhnIdgWVRhM+0PN1Wfa6u8o19YkM2zASDN0p5hu82ioVvpMVhYzqDt58qiB2
	64jOmIMPR0wLn0EW8tcjZk1GIBXW/UudlWgyZPPRZVg/jnDvdnonlvDTufHVDooGFMcI=;
Message-ID: <3e97abc3-3a4e-b5b1-a46d-e05d04730d2d@xen.org>
Date: Sat, 19 Mar 2022 15:59:34 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v3 09/19] xen/arm32: mm: Check if the virtual address is
 shared before updating it
To: xen-devel@lists.xenproject.org
Cc: Julien Grall <jgrall@amazon.com>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
References: <20220221102218.33785-1-julien@xen.org>
 <20220221102218.33785-10-julien@xen.org>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220221102218.33785-10-julien@xen.org>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 21/02/2022 10:22, Julien Grall wrote:
> From: Julien Grall <jgrall@amazon.com>
> 
> Only the first 2GB of the virtual address space is shared between all
> the page-tables on Arm32.
> 
> There is a long outstanding TODO in xen_pt_update() stating that the
> function can only work with shared mapping. Nobody has ever called
> the function with private mapping, however as we add more callers
> there is a risk to mess things up.
> 
> Introduce a new define to mark the end of the shared mappings and use
> it in xen_pt_update() to verify if the address is correct.
> 
> Note that on Arm64, all the mappings are shared. Some compiler may
> complain about an always true check, so the new define is not introduced
> for arm64 and the code is protected with an #ifdef.
> 
> Signed-off-by: Julien Grall <jgrall@amazon.com>
> 
> ---
>      Changes in v2:
>          - New patch
> ---
>   xen/arch/arm/include/asm/config.h |  4 ++++
>   xen/arch/arm/mm.c                 | 11 +++++++++--

While I working on removing the identity mapping, I realized this patch 
is actually getting in my way for arm32. I am planning to have multiple 
region that are shared, but still a single unshared region (the domheap 
mapping area).

So I will rework the patch to check is the address is part of the 
unshared region.

I will drop the patch from the series and move it to the next one.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Sat Mar 19 20:18:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 19 Mar 2022 20:18:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292443.496713 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVfWZ-00080S-FN; Sat, 19 Mar 2022 20:18:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292443.496713; Sat, 19 Mar 2022 20:18:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVfWZ-00080L-CM; Sat, 19 Mar 2022 20:18:07 +0000
Received: by outflank-mailman (input) for mailman id 292443;
 Sat, 19 Mar 2022 20:18:06 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVfWY-00080B-8Z; Sat, 19 Mar 2022 20:18:06 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVfWY-00007x-5T; Sat, 19 Mar 2022 20:18:06 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVfWX-0003uD-Jh; Sat, 19 Mar 2022 20:18:05 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVfWX-00073Y-Iz; Sat, 19 Mar 2022 20:18:05 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=OFhEFXjctz2P2/d7wnF/s1tPNMzcZn1spnfFAIHbyzU=; b=EqD/0+ULSE8U4f3vboCWAD8Tmc
	4Cf4W9FiPxH/RDOpwYPJAVUR3M4eNGODsETO8Riq1iwQ2s1Xx4jfp37z0nvrvkQGgE0KwWE7/TY0s
	wRU1ynP9V/UT7cPP2IvuE9ot99FBX5sPjui3q4Pk8hG+Qu0lDCQ8xT1wP4O6QyOWEcps=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168705-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168705: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-armhf-armhf-xl-rtds:guest-stop:fail:allowable
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=a09863610aefe17390612b7d78d3fba20e43b53e
X-Osstest-Versions-That:
    qemuu=1d60bb4b14601e38ed17384277aa4c30c57925d3
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 19 Mar 2022 20:18:05 +0000

flight 168705 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168705/

Failures :-/ but no regressions.

Regressions which are regarded as allowable (not blocking):
 test-armhf-armhf-xl-rtds     17 guest-stop               fail REGR. vs. 168638

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check fail blocked in 168638
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168638
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168638
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168638
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168638
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168638
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168638
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168638
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass

version targeted for testing:
 qemuu                a09863610aefe17390612b7d78d3fba20e43b53e
baseline version:
 qemuu                1d60bb4b14601e38ed17384277aa4c30c57925d3

Last test of basis   168638  2022-03-16 17:09:39 Z    3 days
Testing same since   168705  2022-03-19 10:39:37 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Deason <adeason@sinenomine.net>
  Edgar E. Iglesias <edgar.iglesias@xilinx.com>
  Eric Auger <eric.auger@redhat.com>
  Peter Maydell <peter.maydell@linaro.org>
  Richard Henderson <richard.henderson@linaro.org>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   1d60bb4b14..a09863610a  a09863610aefe17390612b7d78d3fba20e43b53e -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Sat Mar 19 20:30:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 19 Mar 2022 20:30:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292451.496723 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVfi9-0001gO-Ot; Sat, 19 Mar 2022 20:30:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292451.496723; Sat, 19 Mar 2022 20:30:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVfi9-0001fq-Lf; Sat, 19 Mar 2022 20:30:05 +0000
Received: by outflank-mailman (input) for mailman id 292451;
 Sat, 19 Mar 2022 20:30:04 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVfi8-0001XJ-ST; Sat, 19 Mar 2022 20:30:04 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVfi8-0000NH-Lr; Sat, 19 Mar 2022 20:30:04 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVfi8-0004V8-5C; Sat, 19 Mar 2022 20:30:04 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVfi8-0006dT-4n; Sat, 19 Mar 2022 20:30:04 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=cHj8mlXOuqrQLl6InAcyB8NwpVJW9gkk+AmG1x96+x0=; b=jKXDHDy+Hnhj0u9KtKpNE7vnQx
	oOBh1G74h7gvHXqa9/eqWT5WiojsAwkAGgMET17ON9F+J2pZ8qPYwrbZu80PA7m2Xy6Zm+2Wxq+4i
	ZjmjiSE4JDe1+I+N5+uk0YPTyxPueMuSOUyNjuYeNZiDkw5SKy63QqW4CiAYUMuuja8w=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168710-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168710: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 19 Mar 2022 20:30:04 +0000

flight 168710 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168710/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   19 days
Failing since        168258  2022-03-01 01:55:31 Z   18 days  187 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    1 days   23 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 20 00:36:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 00:36:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292461.496735 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVjYZ-00080U-6r; Sun, 20 Mar 2022 00:36:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292461.496735; Sun, 20 Mar 2022 00:36:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVjYZ-00080N-3q; Sun, 20 Mar 2022 00:36:27 +0000
Received: by outflank-mailman (input) for mailman id 292461;
 Sun, 20 Mar 2022 00:36:25 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVjYX-00080D-3k; Sun, 20 Mar 2022 00:36:25 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVjYX-00057k-0T; Sun, 20 Mar 2022 00:36:25 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVjYW-00023m-Ii; Sun, 20 Mar 2022 00:36:24 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVjYW-00035u-IE; Sun, 20 Mar 2022 00:36:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=U+d+gNR+6om+lwXH7k87+/rmMjIM200mDm0EvTPsjCI=; b=y4kmcOsW9y8eqYEGlmLAkXyoMU
	QPlThZ5zPO+CdbGsxZLZsEqtmORVkjXq0+HpVlHpC4IotNDQSB3imxKrZrnnhG/sNpC72iUye+lkx
	THUYhpBwFzHiHHS7PmVW9ca/kXsegoar3xng+hr1pLpQCMlom6XAvxomU2zXb+iHztKo=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168704-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168704: regressions - FAIL
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:debian-hvm-install:fail:regression
    xen-unstable:test-armhf-armhf-libvirt:guest-start/debian.repeat:fail:heisenbug
    xen-unstable:test-armhf-armhf-xl-rtds:guest-start.2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=fdfb07eb28e42b456e5e1ce999a47cc3ea439f7f
X-Osstest-Versions-That:
    xen=6974c75180f1aad44e5428eabf2396b2b50fb0e4
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 20 Mar 2022 00:36:24 +0000

flight 168704 xen-unstable real [real]
flight 168714 xen-unstable real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168704/
http://logs.test-lab.xenproject.org/osstest/logs/168714/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm 12 debian-hvm-install fail REGR. vs. 168696

Tests which are failing intermittently (not blocking):
 test-armhf-armhf-libvirt 18 guest-start/debian.repeat fail pass in 168714-retest

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-xl-rtds     19 guest-start.2           fail blocked in 168696
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168696
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168696
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168696
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168696
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168696
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168696
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168696
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168696
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168696
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168696
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168696
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168696
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass

version targeted for testing:
 xen                  fdfb07eb28e42b456e5e1ce999a47cc3ea439f7f
baseline version:
 xen                  6974c75180f1aad44e5428eabf2396b2b50fb0e4

Last test of basis   168696  2022-03-19 01:51:58 Z    0 days
Testing same since   168704  2022-03-19 10:39:37 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
  Ayan Kumar Halder <ayankuma@xilinx.com>
  Stefano Stabellini <sstabellini@kernel.org>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 fail    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     fail    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit fdfb07eb28e42b456e5e1ce999a47cc3ea439f7f
Author: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
Date:   Thu Mar 17 14:00:45 2022 +0000

    xen/arm64: io: Handle the abort due to access to stage1 translation table
    
    If the abort was caused due to access to stage1 translation table, Xen
    will try to set the p2m entry (assuming that the Stage 1 translation
    table is in a non MMIO region).
    If there is no such entry found, then Xen will try to map the address as
    a MMIO region (assuming that the Stage 1 translation table is in a
    direct MMIO region).
    
    If that fails as well, then there are the two following scenarios:-
    1. Stage 1 translation table being in an emulated MMIO region - Xen
    can read the region, but it has no way to return the value read to the
    CPU page table walker (which tries to go through the stage1 tables to
    resolve the translation fault).
    
    2. Stage 1 translation table address is invalid.
    
    In both the above scenarios, Xen will forward the abort to the guest.
    
    Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
    Tested-by: Stefano Stabellini <sstabellini@kernel.org>
    Reviewed-by: Stefano Stabellini <sstabellini@kernel.org>
    Reviewed-by: Julien Grall <jgrall@amazon.com>

commit 5e9c429ad41f03740817ed370119f9f9f2a3a68f
Author: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
Date:   Thu Mar 17 14:00:44 2022 +0000

    xen/arm64: io: Emulate instructions (with invalid ISS) on MMIO region
    
    When an instruction is trapped in Xen due to translation fault, Xen
    checks if the ISS is invalid (for data abort) or it is an instruction
    abort. If so, Xen tries to resolve the translation fault using p2m page
    tables. In case of data abort, Xen will try to map the mmio region to
    the guest (ie tries to emulate the mmio region).
    
    If the ISS is not valid and it is a data abort, then Xen tries to
    decode the instruction. In case of ioreq, Xen  saves the decoding state,
    rn and imm9 to vcpu_io. Whenever the vcpu handles the ioreq successfully,
    it will read the decoding state to determine if the instruction decoded
    was a ldr/str post indexing (ie INSTR_LDR_STR_POSTINDEXING). If so, it
    uses these details to post increment rn.
    
    In case of mmio handler, if the mmio operation was successful, then Xen
    retrives the decoding state, rn and imm9. For state ==
    INSTR_LDR_STR_POSTINDEXING, Xen will update rn.
    
    If there is an error encountered while decoding/executing the instruction,
    Xen will forward the abort to the guest.
    
    Also, the logic to infer the type of instruction has been moved from
    try_handle_mmio() to try_decode_instruction() which is called before.
    try_handle_mmio() is solely responsible for handling the mmio operation.
    
    Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
    Tested-by: Stefano Stabellini <sstabellini@kernel.org>
    Reviewed-by: Stefano Stabellini <sstabellini@kernel.org>
    Reviewed-by: Julien Grall <jgrall@amazon.com>
(qemu changes not included)


From xen-devel-bounces@lists.xenproject.org Sun Mar 20 01:10:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 01:10:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292470.496748 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVk5G-0001B7-S1; Sun, 20 Mar 2022 01:10:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292470.496748; Sun, 20 Mar 2022 01:10:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVk5G-0001B0-P4; Sun, 20 Mar 2022 01:10:14 +0000
Received: by outflank-mailman (input) for mailman id 292470;
 Sun, 20 Mar 2022 01:10:13 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVk5F-0001Aq-Nj; Sun, 20 Mar 2022 01:10:13 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVk5F-0002am-Kc; Sun, 20 Mar 2022 01:10:13 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVk5F-0003Ok-0d; Sun, 20 Mar 2022 01:10:13 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVk5F-0002J8-09; Sun, 20 Mar 2022 01:10:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=l/1gUZU2DnGCYuUqjkU3PU7Y0VaqUqxluItvcFxeb6g=; b=yv3AoJiZeqREzs2q/3Gbxa1b4f
	YXVBqVLPSnTKtvJ8z+lRsBQyd659jmWUS3CnDAtKW0980eNWOcf55A4YdprCKHVJ3ElWmqYadOlNS
	g/4jHuvWXXnec6mKTK/Zs2If17nS/LS64uy3+kUej6vl7c8LTJdXS1KrQr5Q0xL3M0wo=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168713-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168713: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 20 Mar 2022 01:10:13 +0000

flight 168713 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168713/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   19 days
Failing since        168258  2022-03-01 01:55:31 Z   18 days  188 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    1 days   24 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 20 01:17:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 01:17:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292477.496760 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVkBy-0001s7-Lg; Sun, 20 Mar 2022 01:17:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292477.496760; Sun, 20 Mar 2022 01:17:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVkBy-0001s0-Hg; Sun, 20 Mar 2022 01:17:10 +0000
Received: by outflank-mailman (input) for mailman id 292477;
 Sun, 20 Mar 2022 01:17:09 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVkBx-0001rq-6A; Sun, 20 Mar 2022 01:17:09 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVkBx-0002ir-0a; Sun, 20 Mar 2022 01:17:09 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVkBw-0003f9-Fk; Sun, 20 Mar 2022 01:17:08 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVkBw-0006L4-FI; Sun, 20 Mar 2022 01:17:08 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=wbLzKOXEeFOBjZ9qlKoU2Omo2FHx6b3Y+BFyoU29Fs8=; b=SqRFS/4waf6++0b0nIy94ddUDt
	D0OKuXZdnM+GvpNke48fOWApyGFKmMagEk/5RFKH498s51IHtkt+gUHXiaCA7woQW+IA3tuceKinV
	hvQfcIntJkqll0+4vbczZlcs3rNDrV0PEWk+u0Nw84+s62FzCVoXTtieSNYSX2/CKm9s=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168709-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-5.4 test] 168709: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-5.4:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:allowable
    linux-5.4:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=8e24ff11b5d216dc5de667bebeb7b0ef3946c596
X-Osstest-Versions-That:
    linux=70f77a2cb5281ad0b08a0bbdeeba885984c399dd
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 20 Mar 2022 01:17:08 +0000

flight 168709 linux-5.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168709/

Failures :-/ but no regressions.

Regressions which are regarded as allowable (not blocking):
 test-armhf-armhf-xl-rtds    18 guest-start/debian.repeat fail REGR. vs. 168644

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168644
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168644
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168644
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168644
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168644
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168644
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168644
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168644
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168644
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168644
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168644
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168644
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                8e24ff11b5d216dc5de667bebeb7b0ef3946c596
baseline version:
 linux                70f77a2cb5281ad0b08a0bbdeeba885984c399dd

Last test of basis   168644  2022-03-17 02:06:08 Z    2 days
Testing same since   168709  2022-03-19 13:11:21 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Alexander Lobakin <alobakin@pm.me>
  Andrew Morton <akpm@linux-foundation.org>
  Anshuman Khandual <anshuman.khandual@arm.com>
  Catalin Marinas <catalin.marinas@arm.com>
  Chengming Zhou <zhouchengming@bytedance.com>
  Corentin Labbe <clabbe@baylibre.com>
  Daniel Borkmann <daniel@iogearbox.net>
  David S. Miller <davem@davemloft.net>
  Dinh Nguyen <dinguyen@kernel.org>
  Eric Dumazet <edumazet@google.com>
  Florian Fainelli <f.fainelli@gmail.com>
  Golan Ben Ami <golan.ben.ami@intel.com>
  Greg Kroah-Hartman <gregkh@linuxfoundation.org>
  Guenter Roeck <linux@roeck-us.net>
  Heiko Stuebner <heiko@sntech.de>
  Jakob Unterwurzacher <jakob.unterwurzacher@theobroma-systems.com>
  Jakub Kicinski <kuba@kernel.org>
  Jakub Sitnicki <jakub@cloudflare.com>
  James Morse <james.morse@arm.com>
  Jia-Ju Bai <baijiaju1990@gmail.com>
  Joey Gouly <joey.gouly@arm.com>
  Johannes Berg <johannes.berg@intel.com>
  John Fastabend <john.fastabend@gmail.com>
  Jon Hunter <jonathanh@nvidia.com>
  Julian Braha <julianbraha@gmail.com>
  Kai Lueke <kailueke@linux.microsoft.com>
  Krzysztof Kozlowski <krzysztof.kozlowski@canonical.com>
  Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Linux Kernel Functional Testing <lkft@linaro.org>
  Luca Coelho <luciano.coelho@intel.com>
  Manasi Navare <manasi.d.navare@intel.com>
  Marc Kleine-Budde <mkl@pengutronix.de>
  Marc Zyngier <maz@kernel.org>
  Marcelo Ricardo Leitner <marcelo.leitner@gmail.com>
  Martin Habets <habetsm.xilinx@gmail.com>
  Niels Dossche <dossche.niels@gmail.com>
  Ovidiu Panait <ovidiu.panait@windriver.com>
  Quentin Schulz <quentin.schulz@theobroma-systems.com>
  Rob Herring <robh@kernel.org>
  Russell King (Oracle) <rmk+kernel@armlinux.org.uk>
  Sascha Hauer <s.hauer@pengutronix.de>
  Sasha Levin <sashal@kernel.org>
  Sreeramya Soratkal <quic_ssramya@quicinc.com>
  Steffen Klassert <steffen.klassert@secunet.com>
  Sudip Mukherjee <sudip.mukherjee@codethink.co.uk>
  Suzuki K Poulose <suzuki.poulose@arm.com>
  Thomas Bogendoerfer <tsbogend@alpha.franken.de>
  Will Deacon <will@kernel.org>
  Xin Long <lucien.xin@gmail.com>
  Yan Yan <evitayan@google.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   70f77a2cb528..8e24ff11b5d2  8e24ff11b5d216dc5de667bebeb7b0ef3946c596 -> tested/linux-5.4


From xen-devel-bounces@lists.xenproject.org Sun Mar 20 01:44:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 01:44:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292485.496771 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVkbv-0005Da-0Q; Sun, 20 Mar 2022 01:43:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292485.496771; Sun, 20 Mar 2022 01:43:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVkbu-0005DS-S2; Sun, 20 Mar 2022 01:43:58 +0000
Received: by outflank-mailman (input) for mailman id 292485;
 Sun, 20 Mar 2022 01:43:57 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=u5H8=T7=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nVkbs-0005DM-Vj
 for xen-devel@lists.xenproject.org; Sun, 20 Mar 2022 01:43:57 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 32ad9af8-a7ef-11ec-8fbc-03012f2f19d4;
 Sun, 20 Mar 2022 02:43:55 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id CACCAB80D35;
 Sun, 20 Mar 2022 01:43:52 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 38E14C340EC;
 Sun, 20 Mar 2022 01:43:51 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 32ad9af8-a7ef-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647740631;
	bh=VehCz83+I1nCI5IdlfcVrnrhrWwIaQwIgWrIrR2T/aw=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=fABK82MSf9fyN7xCmdN/piaWsUZdNlmmJ+gLNC+zyYDyqMxeZxAHupLSTu+lS+OsZ
	 c1HpYZG2GNA7RZKHQpCZa6JKJrB0FXsPgwu/C5U1+7e4o5ivyjV5cOqY2EPBkr+Vf/
	 o/6kY1vENs2k1JndIvAY7a61Db5bZ6QfGrFY0h4dLTazc7z1+ohu8MJ5/75B4uQWki
	 Qhnonh1dOlLKYnq8wzuhLVuBDmscKEnlCJH+/BJyKnVe9gYHiXC66EqmT3Gowh522V
	 DRhFJDkrXcORmJPkxsoW1xPfdU5FLeuoCvtVqm5LEjZR+g1wWUwJJsSosoetSpUEwp
	 sOL/eactENVkw==
Date: Sat, 19 Mar 2022 18:43:50 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Stefano Stabellini <sstabellini@kernel.org>
cc: julien@xen.org, bertrand.marquis@arm.com, Volodymyr_Babchuk@epam.com, 
    Stefano Stabellini <stefano.stabellini@xilinx.com>, 
    xen-devel@lists.xenproject.org
Subject: Re: [PATCH] xen/arm: skip first 32 bytes of zimage32
In-Reply-To: <20220320010509.3605525-1-sstabellini@kernel.org>
Message-ID: <alpine.DEB.2.22.394.2203191843360.2910984@ubuntu-linux-20-04-desktop>
References: <20220320010509.3605525-1-sstabellini@kernel.org>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

+xen-devel

On Sat, 19 Mar 2022, Stefano Stabellini wrote:
> From: Stefano Stabellini <stefano.stabellini@xilinx.com>
> 
> The first 32 bytes of zImage32 are NOPs, not useful just there for
> compatibility. The reason is that some bootloaders skip the first 32
> bytes when starting the kernel. See the comment in Linux
> arch/arm/boot/compressed/head.S.
> 
> Since the introduction of CONFIG_EFI in Linux arm32, those NOPs
> operations have changed implementation from:
> 
>     mov r0, r0
> 
> to:
>     .inst   MZ_MAGIC | (0x1310 << 16)   @ tstne r0, #0x4d000
> 
> See arch/arm/boot/compressed/efi-header.S.
> 
> The new implementation doesn't work on Xen (at least on all versions of
> QEMU I tried).
> 
> Since the first 32 bytes are made to be skipped anyway, skip them. This
> enables Xen to load and start successfully (on QEMU) aarch32 kernels
> with CONFIG_EFI.
> 
> Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
> ---
>  xen/arch/arm/kernel.c | 4 ++--
>  1 file changed, 2 insertions(+), 2 deletions(-)
> 
> diff --git a/xen/arch/arm/kernel.c b/xen/arch/arm/kernel.c
> index 8f43caa186..105a010bf4 100644
> --- a/xen/arch/arm/kernel.c
> +++ b/xen/arch/arm/kernel.c
> @@ -411,10 +411,10 @@ static int __init kernel_zimage32_probe(struct kernel_info *info,
>          }
>      }
>  
> -    info->zimage.kernel_addr = addr;
> +    info->zimage.kernel_addr = addr + 32;
>  
>      info->zimage.start = start;
> -    info->zimage.len = end - start;
> +    info->zimage.len = end - start - 32;
>  
>      info->load = kernel_zimage_load;
>  
> -- 
> 2.25.1
> 


From xen-devel-bounces@lists.xenproject.org Sun Mar 20 01:46:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 01:46:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292488.496782 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVkeL-0005oy-Df; Sun, 20 Mar 2022 01:46:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292488.496782; Sun, 20 Mar 2022 01:46:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVkeL-0005or-9w; Sun, 20 Mar 2022 01:46:29 +0000
Received: by outflank-mailman (input) for mailman id 292488;
 Sun, 20 Mar 2022 01:46:28 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=u5H8=T7=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nVkeK-0005ol-Qb
 for xen-devel@lists.xenproject.org; Sun, 20 Mar 2022 01:46:28 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 8eca5b91-a7ef-11ec-8fbc-03012f2f19d4;
 Sun, 20 Mar 2022 02:46:27 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 1FD9DB80D36;
 Sun, 20 Mar 2022 01:46:27 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 7D4BBC340EC;
 Sun, 20 Mar 2022 01:46:25 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8eca5b91-a7ef-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647740785;
	bh=RcWxTxoiMoKk7lqX23Y5u4Cjtf4MnY25Y+HWEvWEHpA=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=W5mVLkx08+3JWW8z6OwKWnLh3ZgR5+SXBhajKrWJunLSqMirymdDpawmT3MVp+qIY
	 +Lwxmv6UTLd7GOS5TaKit6JN6+IgRuzDz+jZCkdq6rKD4nmLgvsUVIhIVuGIUCsOMc
	 ejcUQYQjKBtdvOjchHEScjgXQO8B21+ytUCpllSE3sESGlQNtetaSybtOVJdkZt/tb
	 Ni1yVa/Wb64FsxvBJykbtjG08GwECUzTQsNjpMGkjTPlXV/bqO4mfa2pujxAFX73tL
	 Gmujx9uJIQz5O0OiM+5cIPp824VZJaN/u0FkIWp9xdwDlZsJ7uI0y1A+ok/WnP3QUi
	 bgDX+KPQ5qYMg==
Date: Sat, 19 Mar 2022 18:46:25 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Stefano Stabellini <sstabellini@kernel.org>
cc: xen-devel@lists.xenproject.org, cardoe@cardoe.com, wl@xen.org, 
    andrew.cooper3@citrix.com, anthony.perard@citrix.com, 
    bertrand.marquis@arm.com, 
    Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: Re: [PATCH v3 2/2] gitlab-ci: add an ARM32 qemu-based smoke test
In-Reply-To: <20220319003221.3012314-2-sstabellini@kernel.org>
Message-ID: <alpine.DEB.2.22.394.2203191842280.2910984@ubuntu-linux-20-04-desktop>
References: <alpine.DEB.2.22.394.2203181729490.2910984@ubuntu-linux-20-04-desktop> <20220319003221.3012314-2-sstabellini@kernel.org>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Fri, 18 Mar 2022, Stefano Stabellini wrote:
> Add a minimal ARM32 smoke test based on qemu-system-arm, as provided by
> the test-artifacts qemu container. The minimal test simply boots Xen
> (built from previous build stages) and Dom0. The test is fetching the
> Dom0 kernel and initrd from Debian Jessie: they work just fine and this
> way we don't have to maintain a build for them too.


Thanks to the Xen fix recently submitted
(https://marc.info/?l=xen-devel&m=164774063802402) I'll be able to
update this script to use Debian Bullseye. I am thinking of merging the
below directly with this patch.


---

automation: upgrade Debian to Bullseye for testing Xen aarch32

Also change initrd. As the new netboot initrd from Debian Bullseye is
huge (22MB), use a tiny initrd from Alpine Linux instead (only 2.5MB).

Also note that the huge Debian Bullseye initrd would cause QEMU to
crash due to the -device loader parameter.

Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>

diff --git a/automation/scripts/qemu-smoke-arm32.sh b/automation/scripts/qemu-smoke-arm32.sh
index 162922ace5..d554de7939 100755
--- a/automation/scripts/qemu-smoke-arm32.sh
+++ b/automation/scripts/qemu-smoke-arm32.sh
@@ -5,11 +5,20 @@ set -ex
 export DEBIAN_FRONTENT=noninteractive
 apt-get -qy update
 apt-get -qy install --no-install-recommends device-tree-compiler \
-                                            curl
+                                            curl \
+                                            cpio
 
 cd binaries
-curl --fail --silent --show-error --location --output vmlinuz http://http.us.debian.org/debian/dists/jessie/main/installer-armhf/current/images/netboot/vmlinuz
-curl --fail --silent --show-error --location --output initrd.gz http://http.us.debian.org/debian/dists/jessie/main/installer-armhf/current/images/netboot/initrd.gz
+# Use the kernel from Debian
+curl --fail --silent --show-error --location --output vmlinuz http://http.us.debian.org/debian/dists/bullseye/main/installer-armhf/current/images/netboot/vmlinuz
+# Use a tiny initrd based on busybox from Alpine Linux
+curl --fail --silent --show-error --location --output initrd.tar.gz https://dl-cdn.alpinelinux.org/alpine/v3.15/releases/armhf/alpine-minirootfs-3.15.1-armhf.tar.gz
+
+mkdir rootfs
+cd rootfs
+tar xvzf ../initrd.tar.gz
+find . | cpio -H newc -o | gzip > ../initrd.gz
+cd ..
 
 kernel=`stat -L --printf="%s" vmlinuz`
 initrd=`stat -L --printf="%s" initrd.gz`
@@ -68,5 +77,5 @@ timeout -k 1 240 \
    -device loader,file=./initrd.gz,addr=0x3200000 |& tee smoke.serial
 
 set -e
-(grep -q "^BusyBox" smoke.serial) || exit 1
+(grep -q "^/ #" smoke.serial) || exit 1
 exit 0


From xen-devel-bounces@lists.xenproject.org Sun Mar 20 03:52:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 03:52:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292521.496811 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVmbl-0002hO-T0; Sun, 20 Mar 2022 03:51:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292521.496811; Sun, 20 Mar 2022 03:51:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVmbl-0002hH-PI; Sun, 20 Mar 2022 03:51:57 +0000
Received: by outflank-mailman (input) for mailman id 292521;
 Sun, 20 Mar 2022 03:51:56 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVmbk-0002h2-Ed; Sun, 20 Mar 2022 03:51:56 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVmbk-0005eB-BX; Sun, 20 Mar 2022 03:51:56 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVmbj-0002Wk-Nk; Sun, 20 Mar 2022 03:51:55 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVmbj-0004ML-Ml; Sun, 20 Mar 2022 03:51:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=qSjXsZ3ZV/PIVLyB7gpmmAUbk6ioBXCjZTfIgMM2nB8=; b=sPY02Em5VQRWUxZEv6cHVS0Ek/
	oSrsicxrHOJDu21mesS+MYE+r4/5K4AuJKN3w4rtPvwda5ZnSAaogLCGK9Mifbrw+3URZg9gKhRNS
	OatdDXSW4mDpEgUw+sP7j8on+/Fvjx0jLiIQ6Ls34W1seRufkDTUB45cZG3Y+gOMU/Vo=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168711-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168711: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=97e9c8eb4bb1dc57859acb1338dfddbd967d7484
X-Osstest-Versions-That:
    linux=34e047aa16c0123bbae8e2f6df33e5ecc1f56601
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 20 Mar 2022 03:51:55 +0000

flight 168711 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168711/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168691
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168691
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168691
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168691
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168691
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168691
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168691
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168691
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                97e9c8eb4bb1dc57859acb1338dfddbd967d7484
baseline version:
 linux                34e047aa16c0123bbae8e2f6df33e5ecc1f56601

Last test of basis   168691  2022-03-18 22:11:00 Z    1 days
Testing same since   168711  2022-03-19 19:41:05 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Alan Stern <stern@rowland.harvard.edu>
  Arnaldo Carvalho de Melo <acme@redhat.com>
  Dan Carpenter <dan.carpenter@oracle.com>
  Greg Kroah-Hartman <gregkh@linuxfoundation.org>
  H. Nikolaus Schaller <hns@goldelico.com>
  Ian Rogers <irogers@google.com>
  Jarkko Nikula <jarkko.nikula@linux.intel.com>
  Jiri Olsa <jolsa@kernel.org>
  Linus Torvalds <torvalds@linux-foundation.org>
  Michael Petlan <mpetlan@redhat.com>
  Uwe Kleine-König <u.kleine-koenig@pengutronix.de>
  William Breathitt Gray <vilhelm.gray@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   34e047aa16c0..97e9c8eb4bb1  97e9c8eb4bb1dc57859acb1338dfddbd967d7484 -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Sun Mar 20 06:42:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 06:42:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292533.496831 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVpH0-0002Xh-3H; Sun, 20 Mar 2022 06:42:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292533.496831; Sun, 20 Mar 2022 06:42:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVpH0-0002Xa-0M; Sun, 20 Mar 2022 06:42:42 +0000
Received: by outflank-mailman (input) for mailman id 292533;
 Sun, 20 Mar 2022 06:42:40 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVpGy-0002XQ-Qn; Sun, 20 Mar 2022 06:42:40 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVpGy-0000XW-OT; Sun, 20 Mar 2022 06:42:40 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVpGy-00035q-8G; Sun, 20 Mar 2022 06:42:40 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVpGy-0008Pz-7n; Sun, 20 Mar 2022 06:42:40 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=trQmFZgPBHeWEJIJBuDN0MKlL6xVEaOGK+lma8cDP5Y=; b=Rzxb9FTGoGMDmTg9Bm0wrusCOE
	hi/CobQFi8UeBciwixdDsTl2K+wpHaxjdz2lYUPAVbXAwLG0yNyLQD4GDitjssqEZ7/XRXTtDJUVR
	QiDuu1aHo38MnwWyAhL5TmMT8DcdM93hSyWGnUiZkRAofS658rH1+tsA0t1+PPTnyFmw=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168717-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168717: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 20 Mar 2022 06:42:40 +0000

flight 168717 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168717/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   19 days
Failing since        168258  2022-03-01 01:55:31 Z   19 days  189 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    1 days   25 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 20 07:47:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 07:47:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292543.496842 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVqHQ-0000JA-1c; Sun, 20 Mar 2022 07:47:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292543.496842; Sun, 20 Mar 2022 07:47:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVqHP-0000J3-Uv; Sun, 20 Mar 2022 07:47:11 +0000
Received: by outflank-mailman (input) for mailman id 292543;
 Sun, 20 Mar 2022 07:47:11 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nVqHP-0000Ix-5V
 for xen-devel@lists.xenproject.org; Sun, 20 Mar 2022 07:47:11 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nVqHL-0001aR-0c; Sun, 20 Mar 2022 07:47:07 +0000
Received: from home.octic.net ([81.187.162.82] helo=[10.0.1.102])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nVqHK-0002WT-RB; Sun, 20 Mar 2022 07:47:06 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:Subject:
	From:References:Cc:To:MIME-Version:Date:Message-ID;
	bh=Y4/OOMxBxt9dtO702g8JlLtNX+ikUtslxbEvBEyvBOQ=; b=fj8okCEsXtL2CtainGVfgbytsU
	eUSDba7hmDL8pPSaeqtd/qTjkn80jcyX7Fmk/6y3KFDwce6e0Klo0I8KsgXCa6coYzOAAJWo0fmGN
	k+SJWmrqo5bGL2t4EwxpJ1qOJ5hkBCP2W6McvaTk8M9Wz/OmaLHx2uhv3jGnCa/V0nLU=;
Message-ID: <33f1ea14-4486-be3d-ca9f-a82274078dba@xen.org>
Date: Sun, 20 Mar 2022 07:47:04 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
To: Stefano Stabellini <sstabellini@kernel.org>
Cc: bertrand.marquis@arm.com, Volodymyr_Babchuk@epam.com,
 Stefano Stabellini <stefano.stabellini@xilinx.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <20220320010509.3605525-1-sstabellini@kernel.org>
From: Julien Grall <julien@xen.org>
Subject: Re: [PATCH] xen/arm: skip first 32 bytes of zimage32
In-Reply-To: <20220320010509.3605525-1-sstabellini@kernel.org>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Stefano,

On 20/03/2022 01:05, Stefano Stabellini wrote:
> From: Stefano Stabellini <stefano.stabellini@xilinx.com>
> 
> The first 32 bytes of zImage32 are NOPs, not useful just there for
> compatibility. The reason is that some bootloaders skip the first 32
> bytes when starting the kernel. See the comment in Linux
> arch/arm/boot/compressed/head.S.

Please mention the Linux verson.

> 
> Since the introduction of CONFIG_EFI in Linux arm32, those NOPs
> operations have changed implementation from:
> 
>      mov r0, r0
> 
> to:
>      .inst   MZ_MAGIC | (0x1310 << 16)   @ tstne r0, #0x4d000

I have duplicated the comment and the instructions below:

                 @ This is a two-instruction NOP, which happens to bear the
                 @ PE/COFF signature "MZ" in the first two bytes, so the 
kernel
                 @ is accepted as an EFI binary. Booting via the UEFI stub
                 @ will not execute those instructions, but the ARM/Linux
                 @ boot protocol does, so we need some NOPs here.
                 .inst   MZ_MAGIC | (0xe225 << 16)       @ eor r5, r5, 
0x4d000
                 eor     r5, r5, 0x4d000                 @ undo previous 
insn


I read this as they are NOPs and this change should not break the 
ARM/Linux boot protocol (we are using it in Xen).

BTW, the instruction decoding is different compare to me. Which version 
of Linux are you using?

> 
> See arch/arm/boot/compressed/efi-header.S.
> 
> The new implementation doesn't work on Xen (at least on all versions of
> QEMU I tried).

As I wrote above, they are NOPs. So why is this breaking?

> 
> Since the first 32 bytes are made to be skipped anyway, skip them. This
> enables Xen to load and start successfully (on QEMU) aarch32 kernels
> with CONFIG_EFI.
> 
> Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
> ---
>   xen/arch/arm/kernel.c | 4 ++--
>   1 file changed, 2 insertions(+), 2 deletions(-)
> 
> diff --git a/xen/arch/arm/kernel.c b/xen/arch/arm/kernel.c
> index 8f43caa186..105a010bf4 100644
> --- a/xen/arch/arm/kernel.c
> +++ b/xen/arch/arm/kernel.c
> @@ -411,10 +411,10 @@ static int __init kernel_zimage32_probe(struct kernel_info *info,
>           }
>       }
>   
> -    info->zimage.kernel_addr = addr;
> +    info->zimage.kernel_addr = addr + 32;

This will need some explanation in the code. The code in the tools will 
also need to be updated.

>   
>       info->zimage.start = start;
> -    info->zimage.len = end - start;
> +    info->zimage.len = end - start - 32;
>   
>       info->load = kernel_zimage_load;
>   

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Sun Mar 20 08:13:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 08:13:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292554.496853 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVqhA-00045f-Hq; Sun, 20 Mar 2022 08:13:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292554.496853; Sun, 20 Mar 2022 08:13:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVqhA-00045Y-EZ; Sun, 20 Mar 2022 08:13:48 +0000
Received: by outflank-mailman (input) for mailman id 292554;
 Sun, 20 Mar 2022 08:13:46 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVqh8-00045O-TO; Sun, 20 Mar 2022 08:13:46 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVqh8-0002Xl-Pa; Sun, 20 Mar 2022 08:13:46 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVqh8-0006rM-Cn; Sun, 20 Mar 2022 08:13:46 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVqh8-0005fm-C2; Sun, 20 Mar 2022 08:13:46 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=V802wVpEY0pl9Jk8A6wQNl9aEKAQNbupY1z/1SzPcto=; b=dsttnEeCoMN0TfBFP81QZCa/Ad
	hyzZCMwmDUbfWK8tXklIgcNB0CrpFFFfyZOaxGdWJN27YeZhK3eW5m3Y/gkBtqyiQbc/2VLiyyOPB
	X405hlezJ5GH2clkGMeLNbb53aZpTn7nAI/omsI3WTWPrKCsXQh0n69YuBiCkxUF+p9E=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168712-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168712: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=2058fdbe81e2985c226a026851dd26b146d3395c
X-Osstest-Versions-That:
    qemuu=a09863610aefe17390612b7d78d3fba20e43b53e
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 20 Mar 2022 08:13:46 +0000

flight 168712 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168712/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-xl-rtds   18 guest-start/debian.repeat fail blocked in 168705
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168705
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168705
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168705
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168705
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168705
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168705
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168705
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168705
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass

version targeted for testing:
 qemuu                2058fdbe81e2985c226a026851dd26b146d3395c
baseline version:
 qemuu                a09863610aefe17390612b7d78d3fba20e43b53e

Last test of basis   168705  2022-03-19 10:39:37 Z    0 days
Testing same since   168712  2022-03-19 20:39:34 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Akihiko Odaki <akihiko.odaki@gmail.com>
  Bernhard Beschow <shentey@gmail.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Jianxian Wen <jianxian.wen@verisilicon.com>
  K. Lange <klange@toaruos.org>
  Laurent Vivier <laurent@vivier.eu>
  Lu Gao <lu.gao@verisilicon.com>
  Michael S. Tsirkin <mst@redhat.com>
  Peter Maydell <peter.maydell@linaro.org>
  Rebecca Cran <quic_rcran@quicinc.com>
  Thomas Huth <thuth@redhat.com>
  Wen, Jianxian <Jianxian.Wen@verisilicon.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   a09863610a..2058fdbe81  2058fdbe81e2985c226a026851dd26b146d3395c -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Sun Mar 20 09:32:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 09:32:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292566.496864 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVrus-0003T0-H8; Sun, 20 Mar 2022 09:32:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292566.496864; Sun, 20 Mar 2022 09:32:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVrus-0003St-DJ; Sun, 20 Mar 2022 09:32:02 +0000
Received: by outflank-mailman (input) for mailman id 292566;
 Sun, 20 Mar 2022 09:32:01 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVrur-0003Sg-5p; Sun, 20 Mar 2022 09:32:01 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVrur-0003oe-0c; Sun, 20 Mar 2022 09:32:01 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVruq-0003Pi-K5; Sun, 20 Mar 2022 09:32:00 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVruq-0003fe-Jf; Sun, 20 Mar 2022 09:32:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=PpbVI5tT41xo40un3NXWwM47xMGnWjC07IIb+pt/mOc=; b=ucu5rnpWsWFrNVy9bXP0hSH1kX
	15bZmGXe+PKrdUeaxZR3yTLNUDLvz1GACKVRiyBtOY66XOymbfFFzpaoQNkpMU/RbgFODiNxlpgsl
	asXTbgcNo0INYGh1JGQHMPRIYWh3lgSLlaSxfTE0BzEXNG/UlIHRV2VWB9SJOGbjU8uo=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168719-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168719: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=af6f6091e02bb46633666ce30d4c6533a52688a5
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 20 Mar 2022 09:32:00 +0000

flight 168719 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168719/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              af6f6091e02bb46633666ce30d4c6533a52688a5
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  618 days
Failing since        151818  2020-07-11 04:18:52 Z  617 days  599 attempts
Testing same since   168699  2022-03-19 04:19:02 Z    1 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Haonan Wang <hnwanga1@gmail.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Martin Pitt <mpitt@debian.org>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 101708 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 20 12:22:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 12:22:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292587.496883 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVuZk-0002tD-FA; Sun, 20 Mar 2022 12:22:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292587.496883; Sun, 20 Mar 2022 12:22:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVuZk-0002t6-Bd; Sun, 20 Mar 2022 12:22:24 +0000
Received: by outflank-mailman (input) for mailman id 292587;
 Sun, 20 Mar 2022 12:22:23 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVuZi-0002sk-Va; Sun, 20 Mar 2022 12:22:23 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVuZi-0006fN-TC; Sun, 20 Mar 2022 12:22:22 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVuZi-0002me-FB; Sun, 20 Mar 2022 12:22:22 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVuZi-0007hM-Ek; Sun, 20 Mar 2022 12:22:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=2QPwaxOyKkWEk+9e7yh3Q2UOPSsras50INLk7O8B9rI=; b=nVUfLsQvOK6/5Y1bu4KNH5qj9h
	tTVdDelwnksd+HjTsVXlwurIBk4wRlEQg6DDW3STNC1NykxTdmopVKUGZjcV9MrOqXJCSBnPW0dvz
	KakfaT8wmwqfMoU6jRQ1chmyoXE/ZnjEGfL7P2NTXkH7y9alnphU/sEExRzrHmObKBok=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168716-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168716: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=fdfb07eb28e42b456e5e1ce999a47cc3ea439f7f
X-Osstest-Versions-That:
    xen=6974c75180f1aad44e5428eabf2396b2b50fb0e4
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 20 Mar 2022 12:22:22 +0000

flight 168716 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168716/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168696
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168696
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168696
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168696
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168696
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168696
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168696
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168696
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168696
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168696
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168696
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168696
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass

version targeted for testing:
 xen                  fdfb07eb28e42b456e5e1ce999a47cc3ea439f7f
baseline version:
 xen                  6974c75180f1aad44e5428eabf2396b2b50fb0e4

Last test of basis   168696  2022-03-19 01:51:58 Z    1 days
Testing same since   168704  2022-03-19 10:39:37 Z    1 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
  Ayan Kumar Halder <ayankuma@xilinx.com>
  Stefano Stabellini <sstabellini@kernel.org>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   6974c75180..fdfb07eb28  fdfb07eb28e42b456e5e1ce999a47cc3ea439f7f -> master


From xen-devel-bounces@lists.xenproject.org Sun Mar 20 12:48:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 12:48:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292594.496893 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVuzK-0005P3-Io; Sun, 20 Mar 2022 12:48:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292594.496893; Sun, 20 Mar 2022 12:48:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVuzK-0005Ow-FZ; Sun, 20 Mar 2022 12:48:50 +0000
Received: by outflank-mailman (input) for mailman id 292594;
 Sun, 20 Mar 2022 12:48:48 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVuzI-0005Om-Dg; Sun, 20 Mar 2022 12:48:48 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVuzI-00075H-Cg; Sun, 20 Mar 2022 12:48:48 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVuzI-0003SZ-1w; Sun, 20 Mar 2022 12:48:48 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVuzI-00009u-1W; Sun, 20 Mar 2022 12:48:48 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=hp93QlPHvLseFH7bju9z+pdW5NuTwWXJ5/N7z1Wh9NE=; b=WgmIK5n34F35Pzue4TrzC6gcma
	QLgxPKTtX0k/nLdV9Wrv4V1w2GrmUtVMNTN+4D4s7qooE43iHFPTriCgCDJAI495pdRHiS4zKEJya
	opGRzdnL/3qLgQm5t8BIv9GUH8LHqOKYXEqnKCPBCi0pjzLXJ1f7ki4xC0ckVtPOgKts=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168721-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168721: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 20 Mar 2022 12:48:48 +0000

flight 168721 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168721/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   20 days
Failing since        168258  2022-03-01 01:55:31 Z   19 days  190 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    2 days   26 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 20 14:13:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 14:13:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292602.496904 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVwIg-0005ct-Tu; Sun, 20 Mar 2022 14:12:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292602.496904; Sun, 20 Mar 2022 14:12:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVwIg-0005cm-Px; Sun, 20 Mar 2022 14:12:54 +0000
Received: by outflank-mailman (input) for mailman id 292602;
 Sun, 20 Mar 2022 14:12:53 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVwIf-0005cc-7j; Sun, 20 Mar 2022 14:12:53 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVwIf-000093-6Z; Sun, 20 Mar 2022 14:12:53 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVwIe-0007ZN-Mr; Sun, 20 Mar 2022 14:12:52 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVwIe-00068d-MQ; Sun, 20 Mar 2022 14:12:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=7M8s664WX8+9mMp7TLp7fRVq5v/PPb0SRFYof6hVTxs=; b=vFl0bbBXlBQdmdCi6LsDHDxGi8
	irvxIoV4zcnO9bCFyqi59R7JDw+IcZDvoM/yd5s98Na1V5drCvPbel02/y7NhR7fspUFBsH+bFbBj
	5UbciYYGFu902Ql1DG/dBL01VdFaoJectlJvwqJND1C9dqzMJMtKZZZYd/zyiZr/zYeA=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168723-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168723: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 20 Mar 2022 14:12:52 +0000

flight 168723 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168723/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   20 days
Failing since        168258  2022-03-01 01:55:31 Z   19 days  191 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    2 days   27 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 20 14:43:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 14:43:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292610.496915 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVwmS-0000ag-Ff; Sun, 20 Mar 2022 14:43:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292610.496915; Sun, 20 Mar 2022 14:43:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVwmS-0000aZ-Cg; Sun, 20 Mar 2022 14:43:40 +0000
Received: by outflank-mailman (input) for mailman id 292610;
 Sun, 20 Mar 2022 14:43:38 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVwmQ-0000aP-PB; Sun, 20 Mar 2022 14:43:38 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVwmQ-0000fc-GL; Sun, 20 Mar 2022 14:43:38 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVwmQ-0000B4-14; Sun, 20 Mar 2022 14:43:38 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVwmQ-00064a-0c; Sun, 20 Mar 2022 14:43:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=qRetU9+Ie3xQmFPjQPeblEfoIbtwA1ztEnk0NY+I8R8=; b=6TuQYxm/L9CJCmD49r4h8EkZKr
	l8mYe6qbhqIHUYAae8pj802FORG2efK1rORplQGVHzqwPiabxWV8wt4xZpl6Q6UXgWayNO/Tq7hm5
	CDGeC09Wd58DhM4JjRnsF7K5IdYXMAgqqVuYDa4t1c1MQvNlttMGtl7CJJx8ELf1mJys=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168718-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168718: regressions - FAIL
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl-shadow:guest-start/debian.repeat:fail:regression
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=14702b3b2438e2f2d07ae93b5d695c166e5c83d1
X-Osstest-Versions-That:
    linux=97e9c8eb4bb1dc57859acb1338dfddbd967d7484
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 20 Mar 2022 14:43:38 +0000

flight 168718 linux-linus real [real]
flight 168724 linux-linus real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168718/
http://logs.test-lab.xenproject.org/osstest/logs/168724/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-xl-shadow  22 guest-start/debian.repeat fail REGR. vs. 168711

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168711
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168711
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168711
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168711
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168711
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168711
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168711
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168711
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                14702b3b2438e2f2d07ae93b5d695c166e5c83d1
baseline version:
 linux                97e9c8eb4bb1dc57859acb1338dfddbd967d7484

Last test of basis   168711  2022-03-19 19:41:05 Z    0 days
Testing same since   168718  2022-03-20 03:54:47 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Arnd Bergmann <arnd@arndb.de>
  David Jeffery <djeffery@redhat.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Marc Zyngier <maz@kernel.org>
  Martin K. Petersen <martin.petersen@oracle.com>
  Matt Lupfer <mlupfer@ddn.com>
  Sreekanth Reddy <sreekanth.reddy@broadcom.com>
  Vladimir Oltean <vladimir.oltean@nxp.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   fail    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 14702b3b2438e2f2d07ae93b5d695c166e5c83d1
Merge: f76da4d5ad51 1447c635802f
Author: Linus Torvalds <torvalds@linux-foundation.org>
Date:   Sat Mar 19 16:36:32 2022 -0700

    Merge tag 'soc-fixes-5.17-4' of git://git.kernel.org/pub/scm/linux/kernel/git/soc/soc
    
    Pull ARM SoC fix from Arnd Bergmann:
     "Here is one last regression fix for 5.17, reverting a patch that went
      into 5.16 as a cleanup that ended up breaking external interrupts on
      Layerscape chips.
    
      The revert makes it work again, but also reintroduces a build time
      warning about the nonstandard DT binding that will have to be dealt
      with in the future"
    
    * tag 'soc-fixes-5.17-4' of git://git.kernel.org/pub/scm/linux/kernel/git/soc/soc:
      Revert "arm64: dts: freescale: Fix 'interrupt-map' parent address cells"

commit f76da4d5ad5168de58f0f5be1a12c1052a614663
Merge: 97e9c8eb4bb1 733ab7e1b5d1
Author: Linus Torvalds <torvalds@linux-foundation.org>
Date:   Sat Mar 19 15:56:43 2022 -0700

    Merge tag 'scsi-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/jejb/scsi
    
    Pull SCSI fixes from James Bottomley:
     "Two small(ish) fixes, both in drivers"
    
    * tag 'scsi-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/jejb/scsi:
      scsi: fnic: Finish scsi_cmnd before dropping the spinlock
      scsi: mpt3sas: Page fault in reply q processing

commit 1447c635802fd0f5e213ad5277753108d56a4db3
Author: Vladimir Oltean <vladimir.oltean@nxp.com>
Date:   Tue Dec 14 15:58:52 2021 +0200

    Revert "arm64: dts: freescale: Fix 'interrupt-map' parent address cells"
    
    This reverts commit 869f0ec048dc8fd88c0b2003373bd985795179fb. That
    updated the expected device tree binding format for the ls-extirq
    driver, without also updating the parsing code (ls_extirq_parse_map)
    to the new format.
    
    The context is that the ls-extirq driver uses the standard
    "interrupt-map" OF property in a non-standard way, as suggested by
    Rob Herring during review:
    https://lore.kernel.org/lkml/20190927161118.GA19333@bogus/
    
    This has turned out to be problematic, as Marc Zyngier discovered
    through commit 041284181226 ("of/irq: Allow matching of an interrupt-map
    local to an interrupt controller"), later fixed through commit
    de4adddcbcc2 ("of/irq: Add a quirk for controllers with their own
    definition of interrupt-map"). Marc's position, expressed on multiple
    opportunities, is that:
    
    (a) [ making private use of the reserved "interrupt-map" name in a
        driver ] "is wrong, by the very letter of what an interrupt-map
        means. If the interrupt map points to an interrupt controller,
        that's the target for the interrupt."
    https://lore.kernel.org/lkml/87k0g8jlmg.wl-maz@kernel.org/
    
    (b) [ updating the driver's bindings to accept a non-reserved name for
        this property, as an alternative, is ] "is totally pointless. These
        machines have been in the wild for years, and existing DTs will be
        there *forever*."
    https://lore.kernel.org/lkml/87ilvrk1r0.wl-maz@kernel.org/
    
    Considering the above, the Linux kernel has quirks in place to deal with
    the ls-extirq's non-standard use of the "interrupt-map". These quirks
    may be needed in other operating systems that consume this device tree,
    yet this is seen as the only viable solution.
    
    Therefore, the premise of the patch being reverted here is invalid.
    It doesn't matter whether the driver, in its non-standard use of the
    property, complies to the standard format or not, since this property
    isn't expected to be used for interrupt translation by the core.
    
    This change restores LS1088A, LS2088A/LS2085A and LX2160A to their
    previous bindings, which allows these systems to continue to use
    external interrupt lines with the correct polarity.
    
    Fixes: 869f0ec048dc ("arm64: dts: freescale: Fix 'interrupt-map' parent address cells")
    Signed-off-by: Vladimir Oltean <vladimir.oltean@nxp.com>
    Acked-by: Marc Zyngier <maz@kernel.org>
    Signed-off-by: Arnd Bergmann <arnd@arndb.de>

commit 733ab7e1b5d1041204c4ca7373f6e6f9d08e3283
Author: David Jeffery <djeffery@redhat.com>
Date:   Fri Mar 11 13:43:59 2022 -0500

    scsi: fnic: Finish scsi_cmnd before dropping the spinlock
    
    When aborting a SCSI command through fnic, there is a race with the fnic
    interrupt handler which can result in the SCSI command and its request
    being completed twice. If the interrupt handler claims the command by
    setting CMD_SP to NULL first, the abort handler assumes the interrupt
    handler has completed the command and returns SUCCESS, causing the request
    for the scsi_cmnd to be re-queued.
    
    But the interrupt handler may not have finished the command yet. After it
    drops the spinlock protecting CMD_SP, it does memory cleanup before finally
    calling scsi_done() to complete the scsi_cmnd. If the call to scsi_done
    occurs after the abort handler finishes and re-queues the request, the
    completion of the scsi_cmnd will advance and try to double complete a
    request already queued for retry.
    
    This patch fixes the issue by moving scsi_done() and any other use of
    scsi_cmnd to before the spinlock is released by the interrupt handler.
    
    Link: https://lore.kernel.org/r/20220311184359.2345319-1-djeffery@redhat.com
    Reviewed-by: Laurence Oberman <loberman@redhat.com>
    Reviewed-by: Ming Lei <ming.lei@redhat.com>
    Signed-off-by: David Jeffery <djeffery@redhat.com>
    Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>

commit 69ad4ef868c1fc7609daa235dfa46d28ba7a3ba3
Author: Matt Lupfer <mlupfer@ddn.com>
Date:   Tue Mar 8 15:27:02 2022 +0000

    scsi: mpt3sas: Page fault in reply q processing
    
    A page fault was encountered in mpt3sas on a LUN reset error path:
    
    [  145.763216] mpt3sas_cm1: Task abort tm failed: handle(0x0002),timeout(30) tr_method(0x0) smid(3) msix_index(0)
    [  145.778932] scsi 1:0:0:0: task abort: FAILED scmd(0x0000000024ba29a2)
    [  145.817307] scsi 1:0:0:0: attempting device reset! scmd(0x0000000024ba29a2)
    [  145.827253] scsi 1:0:0:0: [sg1] tag#2 CDB: Receive Diagnostic 1c 01 01 ff fc 00
    [  145.837617] scsi target1:0:0: handle(0x0002), sas_address(0x500605b0000272b9), phy(0)
    [  145.848598] scsi target1:0:0: enclosure logical id(0x500605b0000272b8), slot(0)
    [  149.858378] mpt3sas_cm1: Poll ReplyDescriptor queues for completion of smid(0), task_type(0x05), handle(0x0002)
    [  149.875202] BUG: unable to handle page fault for address: 00000007fffc445d
    [  149.885617] #PF: supervisor read access in kernel mode
    [  149.894346] #PF: error_code(0x0000) - not-present page
    [  149.903123] PGD 0 P4D 0
    [  149.909387] Oops: 0000 [#1] PREEMPT SMP NOPTI
    [  149.917417] CPU: 24 PID: 3512 Comm: scsi_eh_1 Kdump: loaded Tainted: G S         O      5.10.89-altav-1 #1
    [  149.934327] Hardware name: DDN           200NVX2             /200NVX2-MB          , BIOS ATHG2.2.02.01 09/10/2021
    [  149.951871] RIP: 0010:_base_process_reply_queue+0x4b/0x900 [mpt3sas]
    [  149.961889] Code: 0f 84 22 02 00 00 8d 48 01 49 89 fd 48 8d 57 38 f0 0f b1 4f 38 0f 85 d8 01 00 00 49 8b 45 10 45 31 e4 41 8b 55 0c 48 8d 1c d0 <0f> b6 03 83 e0 0f 3c 0f 0f 85 a2 00 00 00 e9 e6 01 00 00 0f b7 ee
    [  149.991952] RSP: 0018:ffffc9000f1ebcb8 EFLAGS: 00010246
    [  150.000937] RAX: 0000000000000055 RBX: 00000007fffc445d RCX: 000000002548f071
    [  150.011841] RDX: 00000000ffff8881 RSI: 0000000000000001 RDI: ffff888125ed50d8
    [  150.022670] RBP: 0000000000000000 R08: 0000000000000000 R09: c0000000ffff7fff
    [  150.033445] R10: ffffc9000f1ebb68 R11: ffffc9000f1ebb60 R12: 0000000000000000
    [  150.044204] R13: ffff888125ed50d8 R14: 0000000000000080 R15: 34cdc00034cdea80
    [  150.054963] FS:  0000000000000000(0000) GS:ffff88dfaf200000(0000) knlGS:0000000000000000
    [  150.066715] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    [  150.076078] CR2: 00000007fffc445d CR3: 000000012448a006 CR4: 0000000000770ee0
    [  150.086887] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
    [  150.097670] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
    [  150.108323] PKRU: 55555554
    [  150.114690] Call Trace:
    [  150.120497]  ? printk+0x48/0x4a
    [  150.127049]  mpt3sas_scsih_issue_tm.cold.114+0x2e/0x2b3 [mpt3sas]
    [  150.136453]  mpt3sas_scsih_issue_locked_tm+0x86/0xb0 [mpt3sas]
    [  150.145759]  scsih_dev_reset+0xea/0x300 [mpt3sas]
    [  150.153891]  scsi_eh_ready_devs+0x541/0x9e0 [scsi_mod]
    [  150.162206]  ? __scsi_host_match+0x20/0x20 [scsi_mod]
    [  150.170406]  ? scsi_try_target_reset+0x90/0x90 [scsi_mod]
    [  150.178925]  ? blk_mq_tagset_busy_iter+0x45/0x60
    [  150.186638]  ? scsi_try_target_reset+0x90/0x90 [scsi_mod]
    [  150.195087]  scsi_error_handler+0x3a5/0x4a0 [scsi_mod]
    [  150.203206]  ? __schedule+0x1e9/0x610
    [  150.209783]  ? scsi_eh_get_sense+0x210/0x210 [scsi_mod]
    [  150.217924]  kthread+0x12e/0x150
    [  150.224041]  ? kthread_worker_fn+0x130/0x130
    [  150.231206]  ret_from_fork+0x1f/0x30
    
    This is caused by mpt3sas_base_sync_reply_irqs() using an invalid reply_q
    pointer outside of the list_for_each_entry() loop. At the end of the full
    list traversal the pointer is invalid.
    
    Move the _base_process_reply_queue() call inside of the loop.
    
    Link: https://lore.kernel.org/r/d625deae-a958-0ace-2ba3-0888dd0a415b@ddn.com
    Fixes: 711a923c14d9 ("scsi: mpt3sas: Postprocessing of target and LUN reset")
    Cc: stable@vger.kernel.org
    Acked-by: Sreekanth Reddy <sreekanth.reddy@broadcom.com>
    Signed-off-by: Matt Lupfer <mlupfer@ddn.com>
    Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>


From xen-devel-bounces@lists.xenproject.org Sun Mar 20 15:55:44 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 15:55:44 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292617.496927 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVxtu-0007YO-ME; Sun, 20 Mar 2022 15:55:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292617.496927; Sun, 20 Mar 2022 15:55:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nVxtu-0007YH-Io; Sun, 20 Mar 2022 15:55:26 +0000
Received: by outflank-mailman (input) for mailman id 292617;
 Sun, 20 Mar 2022 15:55:25 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVxtt-0007Y7-Ah; Sun, 20 Mar 2022 15:55:25 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVxtt-0001rX-9Z; Sun, 20 Mar 2022 15:55:25 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nVxts-0003OK-Qh; Sun, 20 Mar 2022 15:55:24 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nVxts-0005MK-QE; Sun, 20 Mar 2022 15:55:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=ZKw1sqSxQIYfzJVez/ueZf36U4N6PJVLBnpKwo5dalQ=; b=0c+T4tyUnEhQhjoJVTVkUlG2j9
	dBmwbkJG/sZOzR5IgiS9m4AcAD8+et8pPR5ko0xzINUiW/JggAx0uwlrYeWJjoW4hxeshJ/2Yt1jq
	VWfHOxbvm7WC+F+ex0XqADqy2CVGk5ZLg4RXeiMiyObkNJFmisfz6wSlehE4XLfjNYJc=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168725-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168725: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 20 Mar 2022 15:55:24 +0000

flight 168725 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168725/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   20 days
Failing since        168258  2022-03-01 01:55:31 Z   19 days  192 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    2 days   28 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 20 18:52:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 18:52:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292630.496937 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW0fE-0008BY-HW; Sun, 20 Mar 2022 18:52:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292630.496937; Sun, 20 Mar 2022 18:52:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW0fE-0008BR-EX; Sun, 20 Mar 2022 18:52:28 +0000
Received: by outflank-mailman (input) for mailman id 292630;
 Sun, 20 Mar 2022 18:52:26 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW0fC-0008BD-L6; Sun, 20 Mar 2022 18:52:26 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW0fC-00069b-HA; Sun, 20 Mar 2022 18:52:26 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW0fC-00053F-3Z; Sun, 20 Mar 2022 18:52:26 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nW0fC-00043V-38; Sun, 20 Mar 2022 18:52:26 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=7QJ1zN2K5ZBVLoQiox0c8xV4XES11+wgjjlZxPZ2PJg=; b=2SuFpKBqTkI0KbZtSqWfbtk/At
	/8OIieo1mIUj/xTAIdMF99VlCK8eVZI5Pc1FIpwnBmklqiXQ1CyAKoI9Kat9u4EaKdKocMSnJJ0Cg
	zM2uk2R/zYfN6kblh6mjwNPBwAoe5fzSuPZGR43w6K7wEFqVt/mS9ovqrmBZPemQaVj0=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168727-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168727: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 20 Mar 2022 18:52:26 +0000

flight 168727 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168727/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   20 days
Failing since        168258  2022-03-01 01:55:31 Z   19 days  193 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    2 days   29 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 20 19:17:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 19:17:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292637.496949 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW13R-0002De-JJ; Sun, 20 Mar 2022 19:17:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292637.496949; Sun, 20 Mar 2022 19:17:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW13R-0002DX-GB; Sun, 20 Mar 2022 19:17:29 +0000
Received: by outflank-mailman (input) for mailman id 292637;
 Sun, 20 Mar 2022 19:17:28 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nW13Q-0002DR-5T
 for xen-devel@lists.xenproject.org; Sun, 20 Mar 2022 19:17:28 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nW13M-0006aF-9N; Sun, 20 Mar 2022 19:17:24 +0000
Received: from gw1.octic.net ([81.187.162.82] helo=[10.0.1.102])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nW13M-0006tk-2F; Sun, 20 Mar 2022 19:17:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:Subject:
	References:Cc:To:From:MIME-Version:Date:Message-ID;
	bh=3qm6hEPN2LLfSCRBhSGf6fJR+8kHyoyLOti3Bt446Ok=; b=iVsBTanu3WuxRR7tmz7FfTnHKT
	G2xvD6wG1iE0wJEpcWCZWezPJTNl3Xffs8kG6IHpqdGntRKoDBfb92TS52lNiSm9PaqbpoCtAZDSP
	eZP0eZkgDiSU7Kbta5pZA3rjbsdOtK36aLCq7UTmoSQMTWB9Mc4tqu1l2deMxnQjZL24=;
Message-ID: <1a8ed108-7485-1ed5-3819-fd921164662b@xen.org>
Date: Sun, 20 Mar 2022 19:17:21 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
From: Julien Grall <julien@xen.org>
To: Stefano Stabellini <sstabellini@kernel.org>
Cc: bertrand.marquis@arm.com, Volodymyr_Babchuk@epam.com,
 Stefano Stabellini <stefano.stabellini@xilinx.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <20220320010509.3605525-1-sstabellini@kernel.org>
 <33f1ea14-4486-be3d-ca9f-a82274078dba@xen.org>
Subject: Re: [PATCH] xen/arm: skip first 32 bytes of zimage32
In-Reply-To: <33f1ea14-4486-be3d-ca9f-a82274078dba@xen.org>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi,

On 20/03/2022 07:47, Julien Grall wrote:
> On 20/03/2022 01:05, Stefano Stabellini wrote:
>> From: Stefano Stabellini <stefano.stabellini@xilinx.com>
>>
>> The first 32 bytes of zImage32 are NOPs, not useful just there for
>> compatibility. The reason is that some bootloaders skip the first 32
>> bytes when starting the kernel. See the comment in Linux
>> arch/arm/boot/compressed/head.S.
> 
> Please mention the Linux verson.
> 
>>
>> Since the introduction of CONFIG_EFI in Linux arm32, those NOPs
>> operations have changed implementation from:
>>
>>      mov r0, r0
>>
>> to:
>>      .inst   MZ_MAGIC | (0x1310 << 16)   @ tstne r0, #0x4d000
> 
> I have duplicated the comment and the instructions below:
> 
>                  @ This is a two-instruction NOP, which happens to bear the
>                  @ PE/COFF signature "MZ" in the first two bytes, so the 
> kernel
>                  @ is accepted as an EFI binary. Booting via the UEFI stub
>                  @ will not execute those instructions, but the ARM/Linux
>                  @ boot protocol does, so we need some NOPs here.
>                  .inst   MZ_MAGIC | (0xe225 << 16)       @ eor r5, r5, 
> 0x4d000
>                  eor     r5, r5, 0x4d000                 @ undo previous 
> insn
> 
> 
> I read this as they are NOPs and this change should not break the 
> ARM/Linux boot protocol (we are using it in Xen).
> 
> BTW, the instruction decoding is different compare to me. Which version 
> of Linux are you using?
> 
>>
>> See arch/arm/boot/compressed/efi-header.S.
>>
>> The new implementation doesn't work on Xen (at least on all versions of
>> QEMU I tried).
> 
> As I wrote above, they are NOPs. So why is this breaking?

I have tried to boot the latest Linux (commit 14702b3b2438) with 
CONFIG_EFI=y on QEMU (commit fa435db8ce1d). This booted for me.

As I wrote earlier today, the instruction used as NOPs is slightly 
different. So I had a look at the git history and found the following 
commit:

commit a92882a4d270
Author: Andre Przywara <andre.przywara@arm.com>
Date:   Mon Nov 22 16:28:43 2021 +0100

     ARM: 9159/1: decompressor: Avoid UNPREDICTABLE NOP encoding

     In the decompressor's head.S we need to start with an instruction that
     is some kind of NOP, but also mimics as the PE/COFF header, when the
     kernel is linked as an UEFI application. The clever solution here is
     "tstne r0, #0x4d000", which in the worst case just clobbers the
     condition flags, and bears the magic "MZ" signature in the lowest 
16 bits.

     However the encoding used (0x13105a4d) is actually not valid, since 
bits
     [15:12] are supposed to be 0 (written as "(0)" in the ARM ARM).
     Violating this is UNPREDICTABLE, and *can* trigger an UNDEFINED
     exception. Common Cortex cores seem to ignore those bits, but QEMU
     chooses to trap, so the code goes fishing because of a missing 
exception
     handler at this point. We are just saved by the fact that commonly 
(with
     -kernel or when running from U-Boot) the "Z" bit is set, so the
     instruction is never executed. See [0] for more details.

     To make things more robust and avoid UNPREDICTABLE behaviour in the
     kernel code, lets replace this with a "two-instruction NOP":
     The first instruction is an exclusive OR, the effect of which the 
second
     instruction reverts. This does not leave any trace, neither in a
     register nor in the condition flags. Also it's a perfectly valid
     encoding. Kudos to Peter Maydell for coming up with this gem.

     [0] 
https://lore.kernel.org/qemu-devel/YTPIdbUCmwagL5%2FD@os.inf.tu-dresden.de/T/

     Link: 
https://lore.kernel.org/linux-arm-kernel/20210908162617.104962-1-andre.przywara@arm.com/T/

So this is a bug in the kernel that has nothing to do with Xen.

Therefore, I am not in favor to workaround it in Xen. Where did you get 
your kernel from? If this from a distro, then please work with them to 
ingest the above patch.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Sun Mar 20 19:19:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 19:19:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292640.496960 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW15R-0002pF-0d; Sun, 20 Mar 2022 19:19:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292640.496960; Sun, 20 Mar 2022 19:19:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW15Q-0002p8-S2; Sun, 20 Mar 2022 19:19:32 +0000
Received: by outflank-mailman (input) for mailman id 292640;
 Sun, 20 Mar 2022 19:19:31 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW15P-0002oy-Pe; Sun, 20 Mar 2022 19:19:31 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW15P-0006cd-NH; Sun, 20 Mar 2022 19:19:31 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW15P-0006Sc-6k; Sun, 20 Mar 2022 19:19:31 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nW15P-0006tO-6I; Sun, 20 Mar 2022 19:19:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=/1/j0sZOs1+9N957Apcn0wOXwmYMQm3OSyku9vHQoCQ=; b=c47xTgIgl9crmgYwBC3gN8pBE4
	cc1Z6RpDY3lQbHEl2FJmTnVHHqFJ1C6brlSxkrsnPu8N22a/t/egfd1XvAO5xpn1EwoBvC1zxguS+
	OxGwcB7xxdTXsmFItMn0DSXic0LORELiR1IMOQECbsQDHAZ5HKurrNUAcBhlxbFnnomY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168722-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168722: tolerable FAIL
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=fdfb07eb28e42b456e5e1ce999a47cc3ea439f7f
X-Osstest-Versions-That:
    xen=fdfb07eb28e42b456e5e1ce999a47cc3ea439f7f
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 20 Mar 2022 19:19:31 +0000

flight 168722 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168722/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168716
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168716
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168716
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168716
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168716
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168716
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168716
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168716
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168716
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168716
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168716
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168716
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass

version targeted for testing:
 xen                  fdfb07eb28e42b456e5e1ce999a47cc3ea439f7f
baseline version:
 xen                  fdfb07eb28e42b456e5e1ce999a47cc3ea439f7f

Last test of basis   168722  2022-03-20 12:25:46 Z    0 days
Testing same since                          (not found)         0 attempts

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Published tested tree is already up to date.



From xen-devel-bounces@lists.xenproject.org Sun Mar 20 19:26:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 19:26:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292648.496971 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW1CT-0004Kb-T2; Sun, 20 Mar 2022 19:26:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292648.496971; Sun, 20 Mar 2022 19:26:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW1CT-0004KU-Q9; Sun, 20 Mar 2022 19:26:49 +0000
Received: by outflank-mailman (input) for mailman id 292648;
 Sun, 20 Mar 2022 19:26:48 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nW1CS-0004KO-Qp
 for xen-devel@lists.xenproject.org; Sun, 20 Mar 2022 19:26:48 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nW1CR-0006ke-HL; Sun, 20 Mar 2022 19:26:47 +0000
Received: from home.octic.net ([81.187.162.82] helo=[10.0.1.102])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nW1CR-0007W4-B2; Sun, 20 Mar 2022 19:26:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:Subject:
	From:References:Cc:To:MIME-Version:Date:Message-ID;
	bh=I2o92GoVK4YrLOy0mcK6nGmjdjcCTTh/HmqDISF+Tvs=; b=FB+3FjRm6IlggjH0Xx5p748QNu
	ngHdT87Vma6pJwjgfZPy1AtVm1NneA8iBsENwdtEtIjpyhyqI1uuPoZ2NeXb8vFLArTOQG2XbYA4+
	FZAvEOAmKi9t7NE8vBUwsU3mEDvHZhNCBFIe3ahO5lLN0l/MxhFnhdWIbfpNVBHSMZ2g=;
Message-ID: <684d65b8-5de4-779c-d869-bac28e073091@xen.org>
Date: Sun, 20 Mar 2022 19:26:45 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
To: Stefano Stabellini <sstabellini@kernel.org>
Cc: xen-devel@lists.xenproject.org, cardoe@cardoe.com, wl@xen.org,
 andrew.cooper3@citrix.com, anthony.perard@citrix.com,
 bertrand.marquis@arm.com, Stefano Stabellini <stefano.stabellini@xilinx.com>
References: <alpine.DEB.2.22.394.2203181729490.2910984@ubuntu-linux-20-04-desktop>
 <20220319003221.3012314-2-sstabellini@kernel.org>
 <alpine.DEB.2.22.394.2203191842280.2910984@ubuntu-linux-20-04-desktop>
From: Julien Grall <julien@xen.org>
Subject: Re: [PATCH v3 2/2] gitlab-ci: add an ARM32 qemu-based smoke test
In-Reply-To: <alpine.DEB.2.22.394.2203191842280.2910984@ubuntu-linux-20-04-desktop>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 20/03/2022 01:46, Stefano Stabellini wrote:
> On Fri, 18 Mar 2022, Stefano Stabellini wrote:
>> Add a minimal ARM32 smoke test based on qemu-system-arm, as provided by
>> the test-artifacts qemu container. The minimal test simply boots Xen
>> (built from previous build stages) and Dom0. The test is fetching the
>> Dom0 kernel and initrd from Debian Jessie: they work just fine and this
>> way we don't have to maintain a build for them too.
> 
> 
> Thanks to the Xen fix recently submitted
> (https://marc.info/?l=xen-devel&m=164774063802402) I'll be able to
> update this script to use Debian Bullseye. I am thinking of merging the
> below directly with this patch.
> 
> 
> ---
> 
> automation: upgrade Debian to Bullseye for testing Xen aarch32
> 
> Also change initrd. As the new netboot initrd from Debian Bullseye is
> huge (22MB), use a tiny initrd from Alpine Linux instead (only 2.5MB).

This is sounds odd to me. So we are going to use Bullseye but not really 
because we want to use a different initrd.

Why can't you get everything from the same place?

> 
> Also note that the huge Debian Bullseye initrd would cause QEMU to
> crash due to the -device loader parameter.

Can you provide more details? Was this reported to QEMU?

> 
> Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
> 
> diff --git a/automation/scripts/qemu-smoke-arm32.sh b/automation/scripts/qemu-smoke-arm32.sh
> index 162922ace5..d554de7939 100755
> --- a/automation/scripts/qemu-smoke-arm32.sh
> +++ b/automation/scripts/qemu-smoke-arm32.sh
> @@ -5,11 +5,20 @@ set -ex
>   export DEBIAN_FRONTENT=noninteractive
>   apt-get -qy update
>   apt-get -qy install --no-install-recommends device-tree-compiler \
> -                                            curl
> +                                            curl \
> +                                            cpio
>   
>   cd binaries
> -curl --fail --silent --show-error --location --output vmlinuz http://http.us.debian.org/debian/dists/jessie/main/installer-armhf/current/images/netboot/vmlinuz
> -curl --fail --silent --show-error --location --output initrd.gz http://http.us.debian.org/debian/dists/jessie/main/installer-armhf/current/images/netboot/initrd.gz
> +# Use the kernel from Debian
> +curl --fail --silent --show-error --location --output vmlinuz http://http.us.debian.org/debian/dists/bullseye/main/installer-armhf/current/images/netboot/vmlinuz
> +# Use a tiny initrd based on busybox from Alpine Linux
> +curl --fail --silent --show-error --location --output initrd.tar.gz https://dl-cdn.alpinelinux.org/alpine/v3.15/releases/armhf/alpine-minirootfs-3.15.1-armhf.tar.gz
> +
> +mkdir rootfs
> +cd rootfs
> +tar xvzf ../initrd.tar.gz
> +find . | cpio -H newc -o | gzip > ../initrd.gz
> +cd ..
>   
>   kernel=`stat -L --printf="%s" vmlinuz`
>   initrd=`stat -L --printf="%s" initrd.gz`
> @@ -68,5 +77,5 @@ timeout -k 1 240 \
>      -device loader,file=./initrd.gz,addr=0x3200000 |& tee smoke.serial
>   
>   set -e
> -(grep -q "^BusyBox" smoke.serial) || exit 1
> +(grep -q "^/ #" smoke.serial) || exit 1
>   exit 0
> 

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Sun Mar 20 19:59:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 19:59:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292652.496982 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW1hk-0007eN-9s; Sun, 20 Mar 2022 19:59:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292652.496982; Sun, 20 Mar 2022 19:59:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW1hk-0007eG-6E; Sun, 20 Mar 2022 19:59:08 +0000
Received: by outflank-mailman (input) for mailman id 292652;
 Sun, 20 Mar 2022 19:59:07 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW1hj-0007e6-A2; Sun, 20 Mar 2022 19:59:07 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW1hj-0007Fg-6o; Sun, 20 Mar 2022 19:59:07 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW1hi-0007jv-Rs; Sun, 20 Mar 2022 19:59:06 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nW1hi-0006ck-RR; Sun, 20 Mar 2022 19:59:06 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=DCdrYijZfLhBtnVpEYGVjbO09MyVPEleXBasjXgZxeM=; b=q/anFMoOnu/5Y3mMOA0o4aI22x
	IVe/ipN5bb4TrgqttVOsIluIXlnN1PcTntGFn1jBiEldOSmVhuipNRZ61tYfpm7BndTUzxMMOaXjq
	WHRKd7ipvW58EHWGzU8Ox/HvjgAP4tw/3NIs+AfA+NrGn7oBsKBwcoQwYGGwBwOeBj4I=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168728-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168728: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 20 Mar 2022 19:59:06 +0000

flight 168728 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168728/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   20 days
Failing since        168258  2022-03-01 01:55:31 Z   19 days  194 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    2 days   30 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 20 20:31:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 20:31:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292660.496993 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW2CW-0003Lo-R3; Sun, 20 Mar 2022 20:30:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292660.496993; Sun, 20 Mar 2022 20:30:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW2CW-0003Lh-Nn; Sun, 20 Mar 2022 20:30:56 +0000
Received: by outflank-mailman (input) for mailman id 292660;
 Sun, 20 Mar 2022 20:30:55 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW2CV-0003LX-7B; Sun, 20 Mar 2022 20:30:55 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW2CV-0007uU-4f; Sun, 20 Mar 2022 20:30:55 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW2CU-0000IZ-HB; Sun, 20 Mar 2022 20:30:54 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nW2CU-0000Nk-Gk; Sun, 20 Mar 2022 20:30:54 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=oY8VXzqr1vxR34L817lu5F20ENdaQ4gcM0aL3Vm5z8I=; b=dm28bKP0dhrQQsJB9hKFbrLe+o
	p5dAK3b0ShHxRchqHGr2m+KGw0Td/uuXKJgJwcR9wRZhBAPfLRdXl8p0sW7U8FblAvAgb0X5Pn4zV
	NHh2xRH6UwVNwa4VLxz/CNU1q1RWuEQocj1+K2yUVfW5gI2VclWWYTsVFUmqrNa2GJGA=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168729-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168729: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 20 Mar 2022 20:30:54 +0000

flight 168729 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168729/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   20 days
Failing since        168258  2022-03-01 01:55:31 Z   19 days  195 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    2 days   31 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 20 21:28:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 21:28:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292669.497004 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW36I-00006r-4l; Sun, 20 Mar 2022 21:28:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292669.497004; Sun, 20 Mar 2022 21:28:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW36I-00006k-0N; Sun, 20 Mar 2022 21:28:34 +0000
Received: by outflank-mailman (input) for mailman id 292669;
 Sun, 20 Mar 2022 21:28:33 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW36G-00006a-UW; Sun, 20 Mar 2022 21:28:32 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW36G-0000P4-SU; Sun, 20 Mar 2022 21:28:32 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW36G-0001gV-EG; Sun, 20 Mar 2022 21:28:32 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nW36G-00076N-Dq; Sun, 20 Mar 2022 21:28:32 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=9nvRAFw0K62DVjR5t6ZG27hxcQGQg5qKmVA4F68o+9w=; b=JO0lmNMzj4PkwNY4NDaeNXZjbD
	fhw7ukIs/NdDqHGgGdfccnMsF6aXmxDrthSGFXSMsvZHqBxVC7w63loyePQ0PAyN44Gdd271FX9sf
	hele8odgE82beNRdA9D8RwgjsBGWTfsxHh9aA0Ui71L0f+vkEzmJvlXjyBswI0IMB1OY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168730-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168730: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 20 Mar 2022 21:28:32 +0000

flight 168730 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168730/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   20 days
Failing since        168258  2022-03-01 01:55:31 Z   19 days  196 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    2 days   32 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 20 22:00:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 22:00:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292678.497014 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW3bU-0004HZ-Lc; Sun, 20 Mar 2022 22:00:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292678.497014; Sun, 20 Mar 2022 22:00:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW3bU-0004HS-Ik; Sun, 20 Mar 2022 22:00:48 +0000
Received: by outflank-mailman (input) for mailman id 292678;
 Sun, 20 Mar 2022 22:00:47 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW3bS-0004HE-Vy; Sun, 20 Mar 2022 22:00:46 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW3bS-0000wr-TD; Sun, 20 Mar 2022 22:00:46 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW3bS-0002Q6-Hc; Sun, 20 Mar 2022 22:00:46 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nW3bS-0006ET-HC; Sun, 20 Mar 2022 22:00:46 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Lg2UTzx96WBP15BULej+E31xwzZOSv9UmlhvdDQDHGU=; b=IJJuek36YVqoZO30PyfXgPFOlK
	5hQegKLjJCUM/aZb/gnmuoB8YsODqpkCJsY8m0prKIb3qZpaDpz6QiHNYey6uJCuaUephfz+w2iF1
	Whf28wtaf9fM2Zv5+1OEfOX/5mPkHSGzUJU6U++vRXYM05A/CsJ9300jTer6NCnU6Pn0=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168731-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168731: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 20 Mar 2022 22:00:46 +0000

flight 168731 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168731/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   20 days
Failing since        168258  2022-03-01 01:55:31 Z   19 days  197 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    2 days   33 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 20 22:11:05 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 22:11:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292687.497026 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW3lN-0005rQ-Ow; Sun, 20 Mar 2022 22:11:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292687.497026; Sun, 20 Mar 2022 22:11:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW3lN-0005rJ-Ko; Sun, 20 Mar 2022 22:11:01 +0000
Received: by outflank-mailman (input) for mailman id 292687;
 Sun, 20 Mar 2022 22:10:59 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW3lL-0005r9-Px; Sun, 20 Mar 2022 22:10:59 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW3lL-000170-NU; Sun, 20 Mar 2022 22:10:59 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW3lL-0002eF-7w; Sun, 20 Mar 2022 22:10:59 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nW3lL-0007q6-7Y; Sun, 20 Mar 2022 22:10:59 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=vwg74l3YPy/iZMZPvN2ocddOM202YOnfh5H1Lk61zK4=; b=kQWleg9Oq6A4euhd20s3i328hx
	Jek6wxkxqEQfhjCcukmaz2294Ldzff4M4ipIZlBJm815Dg4fEjGbhcTivt10biRNBMBwA450GbiwO
	69ZXN4AdYWYRD0xiN6ltc1VgBSCOhoYn3PGwQsVs/ooW32ZK9jPqw6wqk/QXAxktCMG4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168726-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168726: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl-shadow:guest-start/debian.repeat:fail:heisenbug
    linux-linus:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:debian-hvm-install:fail:heisenbug
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=14702b3b2438e2f2d07ae93b5d695c166e5c83d1
X-Osstest-Versions-That:
    linux=97e9c8eb4bb1dc57859acb1338dfddbd967d7484
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 20 Mar 2022 22:10:59 +0000

flight 168726 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168726/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-shadow 22 guest-start/debian.repeat fail in 168718 pass in 168726
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm 12 debian-hvm-install fail pass in 168718

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168711
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168711
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168711
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168711
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168711
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168711
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168711
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168711
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                14702b3b2438e2f2d07ae93b5d695c166e5c83d1
baseline version:
 linux                97e9c8eb4bb1dc57859acb1338dfddbd967d7484

Last test of basis   168711  2022-03-19 19:41:05 Z    1 days
Testing same since   168718  2022-03-20 03:54:47 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Arnd Bergmann <arnd@arndb.de>
  David Jeffery <djeffery@redhat.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Marc Zyngier <maz@kernel.org>
  Martin K. Petersen <martin.petersen@oracle.com>
  Matt Lupfer <mlupfer@ddn.com>
  Sreekanth Reddy <sreekanth.reddy@broadcom.com>
  Vladimir Oltean <vladimir.oltean@nxp.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 fail    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   97e9c8eb4bb1..14702b3b2438  14702b3b2438e2f2d07ae93b5d695c166e5c83d1 -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Sun Mar 20 22:32:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 22:32:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292694.497037 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW45v-0008I1-Gm; Sun, 20 Mar 2022 22:32:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292694.497037; Sun, 20 Mar 2022 22:32:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW45v-0008Hu-De; Sun, 20 Mar 2022 22:32:15 +0000
Received: by outflank-mailman (input) for mailman id 292694;
 Sun, 20 Mar 2022 22:32:13 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW45t-0008Hk-Ml; Sun, 20 Mar 2022 22:32:13 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW45t-0001RV-Jz; Sun, 20 Mar 2022 22:32:13 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW45t-00037X-9R; Sun, 20 Mar 2022 22:32:13 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nW45t-0005BR-93; Sun, 20 Mar 2022 22:32:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=ACdePY4k+SxLRkxG6dAlaBYa8bZoSMbTtmINYLWZPrg=; b=vT6xD15ELucaM0vuoNogOOnvwU
	CWcq2MluVHzkOd7PuDv56P3kcbnXYfDmeHISkDxebLYB/JreZTgiSR+YO89bP0YL2H2WBsDKpYgqM
	CkTZSN5ayo2wtCKjDf6kPDXwhE3dyCxT8+n3l4RbrqgYmaNTuvyWMD2BY4lwzOmQH3PM=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168732-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168732: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 20 Mar 2022 22:32:13 +0000

flight 168732 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168732/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   20 days
Failing since        168258  2022-03-01 01:55:31 Z   19 days  198 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    2 days   34 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 20 23:50:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 20 Mar 2022 23:50:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292702.497048 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW5Ja-0007d2-Bj; Sun, 20 Mar 2022 23:50:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292702.497048; Sun, 20 Mar 2022 23:50:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW5Ja-0007cv-8P; Sun, 20 Mar 2022 23:50:26 +0000
Received: by outflank-mailman (input) for mailman id 292702;
 Sun, 20 Mar 2022 23:50:25 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW5JZ-0007cl-0N; Sun, 20 Mar 2022 23:50:25 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW5JY-0002h4-Ru; Sun, 20 Mar 2022 23:50:24 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW5JY-0004rY-FY; Sun, 20 Mar 2022 23:50:24 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nW5JY-0000Hr-F5; Sun, 20 Mar 2022 23:50:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=8SKF2FwvnPxPUxt8ndUroTBbI9BAdMwOAzeKHRCErU4=; b=lEPN7+Yr4q5KG+/hCW5naxeolu
	TayVa0bW68cZY/91kpSIH8LXNnwnEzlZU4S0f0LT6gq+yD6IipQiwSdqAMSf1I+G/0XSGKVa/Dp73
	ql4w4/YwfCQXza7lNvqBG7zos5186U/P0tTlpNoovzAleEQXjxKC1u9gjPqZzcFv3ez4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168734-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168734: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 20 Mar 2022 23:50:24 +0000

flight 168734 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168734/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   20 days
Failing since        168258  2022-03-01 01:55:31 Z   19 days  199 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    2 days   35 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 01:01:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 01:01:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292711.497059 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW6QC-0003Tr-28; Mon, 21 Mar 2022 01:01:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292711.497059; Mon, 21 Mar 2022 01:01:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW6QB-0003Sq-T2; Mon, 21 Mar 2022 01:01:19 +0000
Received: by outflank-mailman (input) for mailman id 292711;
 Mon, 21 Mar 2022 01:01:18 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW6QA-0002ht-4e; Mon, 21 Mar 2022 01:01:18 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW6QA-0001UQ-24; Mon, 21 Mar 2022 01:01:18 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW6Q9-0008Nh-OX; Mon, 21 Mar 2022 01:01:17 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nW6Q9-0007fo-O7; Mon, 21 Mar 2022 01:01:17 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=ilX/go79DBXtX3q+hx5/MnOTCk1928/LJK60Y/wfuus=; b=2bQMfs6kgC47stMfEXF8wT74V+
	yHWdLBiSkZfMpeX8a+a0MlXQo+u6N+4s01D1IL/gyc4WGKuhI5bLlvywV9BRBqUoZCOza9GPnDtS3
	a3az/y4/IbFkNXMffgVSDOV/WxrAA1rF+m0pt+HpI4zbMiTxYRh4IO2r0cm59hoDHoe8=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168735-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168735: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 21 Mar 2022 01:01:17 +0000

flight 168735 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168735/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   20 days
Failing since        168258  2022-03-01 01:55:31 Z   19 days  200 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    2 days   36 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 02:35:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 02:35:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292719.497070 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW7tS-0004m4-KV; Mon, 21 Mar 2022 02:35:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292719.497070; Mon, 21 Mar 2022 02:35:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW7tS-0004lw-Fo; Mon, 21 Mar 2022 02:35:38 +0000
Received: by outflank-mailman (input) for mailman id 292719;
 Mon, 21 Mar 2022 02:35:37 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW7tR-0004ll-6H; Mon, 21 Mar 2022 02:35:37 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW7tR-0003KO-4N; Mon, 21 Mar 2022 02:35:37 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW7tQ-0003QF-OA; Mon, 21 Mar 2022 02:35:36 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nW7tQ-0001PX-Nj; Mon, 21 Mar 2022 02:35:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=KIKzD7Oo/3FEybeEGq0VpJ2cRK6lBrEpmqK47IXE5X4=; b=nX+4Cy9783PsXGVL+GnwNKGA+P
	+G6EFrAthAtT0XTgJgtizBPCMfnf1WL98MByjSv2ZbfIUkmedYCmuZIsR4VRMlex66CX/9GzRhmXi
	rfmgDQm6XkxrAAdNSEl5EAMZPbobxTXScZ0QjtlEsgv84Zn5HxQ07znKu5xVjzFeuqyw=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168736-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168736: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=c1e662101addbfd983026f06d119da2d470865a1
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 21 Mar 2022 02:35:36 +0000

flight 168736 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168736/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 c1e662101addbfd983026f06d119da2d470865a1
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   20 days
Failing since        168258  2022-03-01 01:55:31 Z   20 days  201 attempts
Testing same since   168675  2022-03-18 07:10:27 Z    2 days   37 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 830 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 03:21:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 03:21:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292728.497081 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW8cC-0001vr-6Q; Mon, 21 Mar 2022 03:21:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292728.497081; Mon, 21 Mar 2022 03:21:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nW8cC-0001vk-3R; Mon, 21 Mar 2022 03:21:52 +0000
Received: by outflank-mailman (input) for mailman id 292728;
 Mon, 21 Mar 2022 03:21:51 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW8cB-0001va-7I; Mon, 21 Mar 2022 03:21:51 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW8cB-0004YH-3f; Mon, 21 Mar 2022 03:21:51 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nW8cA-0004kL-Dv; Mon, 21 Mar 2022 03:21:50 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nW8cA-0005jW-DU; Mon, 21 Mar 2022 03:21:50 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=pHbmTghAUBBpqS4tPbHy5wwaxs5QcZr1yFdXo7flmgw=; b=4opQZgdZ7tA4gHChSax8uJn8Cl
	cK1ktM7kXKkQ2byeDzDUjCZNM1scNxPxaRLWrHRNu2hp+BzfnJK/75JomzFSgAhqhFLW5YJIxIdDE
	ILiSoX9EtY2uN21cYJZ+L2Hhv1C+9sKY24lHdj7F0EOmtt37eB/v5OuKFlXFSnPAHpLU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168738-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168738: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 21 Mar 2022 03:21:50 +0000

flight 168738 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168738/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   20 days
Failing since        168258  2022-03-01 01:55:31 Z   20 days  202 attempts
Testing same since   168738  2022-03-21 02:39:18 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 859 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 04:57:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 04:57:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292736.497092 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWA67-0002VC-3x; Mon, 21 Mar 2022 04:56:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292736.497092; Mon, 21 Mar 2022 04:56:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWA67-0002V5-0R; Mon, 21 Mar 2022 04:56:51 +0000
Received: by outflank-mailman (input) for mailman id 292736;
 Mon, 21 Mar 2022 04:56:49 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWA65-0002Uv-En; Mon, 21 Mar 2022 04:56:49 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWA65-0006HM-CV; Mon, 21 Mar 2022 04:56:49 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWA64-00089h-VO; Mon, 21 Mar 2022 04:56:49 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWA64-0004oL-Uv; Mon, 21 Mar 2022 04:56:48 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=5T9QI84LqC5JL6NSdyVMxiya2D4Ie/yc9B8P8cP5COg=; b=gVqj09qXp6VCMJAVQDq2kfTbzU
	8kDhpYJSc7F0OWG5VCMoKepr70/vZcSFoknGWlMn34wL4XoCzHj5cHeOGyRybsY2jBnXMq5ByqIqR
	qQHAMgMZ+7bIPUgHlKH0KFaYRJjSLd6ovm9YBrTVVhFNgTxVHbhLusjxqKJJCpinXhOM=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168733-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168733: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=f443e374ae131c168a065ea1748feac6b2e76613
X-Osstest-Versions-That:
    linux=14702b3b2438e2f2d07ae93b5d695c166e5c83d1
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 21 Mar 2022 04:56:48 +0000

flight 168733 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168733/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168726
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168726
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168726
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168726
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168726
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168726
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168726
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168726
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                f443e374ae131c168a065ea1748feac6b2e76613
baseline version:
 linux                14702b3b2438e2f2d07ae93b5d695c166e5c83d1

Last test of basis   168726  2022-03-20 15:11:10 Z    0 days
Testing same since   168733  2022-03-20 22:40:53 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Borislav Petkov <bp@suse.de>
  Dmitry Torokhov <dmitry.torokhov@gmail.com>
  Jamie Heilman <jamie@audible.transient.net>
  Linus Torvalds <torvalds@linux-foundation.org>
  Linus Walleij <linus.walleij@linaro.org>
  Paolo Bonzini <pbonzini@redhat.com>
  Pavel Skripkin <paskripkin@gmail.com>
  Peter Zijlstra (Intel) <peterz@infradead.org>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   14702b3b2438..f443e374ae13  f443e374ae131c168a065ea1748feac6b2e76613 -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 05:41:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 05:41:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292745.497102 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWAmv-0007wv-Hc; Mon, 21 Mar 2022 05:41:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292745.497102; Mon, 21 Mar 2022 05:41:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWAmv-0007wo-EP; Mon, 21 Mar 2022 05:41:05 +0000
Received: by outflank-mailman (input) for mailman id 292745;
 Mon, 21 Mar 2022 05:41:04 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWAmu-0007we-GX; Mon, 21 Mar 2022 05:41:04 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWAmu-0007KH-BE; Mon, 21 Mar 2022 05:41:04 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWAmt-0001Gn-W4; Mon, 21 Mar 2022 05:41:04 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWAmt-00046m-Ve; Mon, 21 Mar 2022 05:41:03 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Ymy0BTtTxjsvdYJWaZrKpeixXLgebb52kCtUum+YMvk=; b=XWXLxpKRPltoYqrBUReXa6A2tm
	ifGs49QkpHWiv/H4KK/Yt46g7PWGuYfoadice12OlxaakP+8EAIgbires17Bqv4SxE+qn045+ftWH
	Z9y5yCqOhLbrtY368E4MpNxuQo06Y8sICZYC5+N0yvoFsod67fGkATQX4lUGabJyyggw=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168739-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168739: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 21 Mar 2022 05:41:03 +0000

flight 168739 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168739/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   20 days
Failing since        168258  2022-03-01 01:55:31 Z   20 days  203 attempts
Testing same since   168738  2022-03-21 02:39:18 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 859 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 05:47:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 05:47:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292752.497113 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWAsb-0000A8-7E; Mon, 21 Mar 2022 05:46:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292752.497113; Mon, 21 Mar 2022 05:46:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWAsb-00009t-4A; Mon, 21 Mar 2022 05:46:57 +0000
Received: by outflank-mailman (input) for mailman id 292752;
 Mon, 21 Mar 2022 05:46:55 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=w7Ei=UA=arm.com=Hongda.Deng@srs-se1.protection.inumbo.net>)
 id 1nWAsZ-00009n-DK
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 05:46:55 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05on20615.outbound.protection.outlook.com
 [2a01:111:f400:7d00::615])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4e526aa3-a8da-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 06:46:53 +0100 (CET)
Received: from AM5PR0201CA0019.eurprd02.prod.outlook.com
 (2603:10a6:203:3d::29) by DB6PR0801MB1991.eurprd08.prod.outlook.com
 (2603:10a6:4:71::23) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Mon, 21 Mar
 2022 05:46:44 +0000
Received: from AM5EUR03FT020.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:203:3d:cafe::e0) by AM5PR0201CA0019.outlook.office365.com
 (2603:10a6:203:3d::29) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.22 via Frontend
 Transport; Mon, 21 Mar 2022 05:46:44 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT020.mail.protection.outlook.com (10.152.16.116) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Mon, 21 Mar 2022 05:46:43 +0000
Received: ("Tessian outbound 741ca6c82739:v113");
 Mon, 21 Mar 2022 05:46:43 +0000
Received: from d13aef9ab63a.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 6038C986-7E7E-4D37-ADAE-7B6505D0F12D.1; 
 Mon, 21 Mar 2022 05:46:34 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id d13aef9ab63a.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Mon, 21 Mar 2022 05:46:34 +0000
Received: from VE1PR08MB5677.eurprd08.prod.outlook.com (2603:10a6:800:1ab::17)
 by DB7PR08MB3915.eurprd08.prod.outlook.com (2603:10a6:10:34::17) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Mon, 21 Mar
 2022 05:46:28 +0000
Received: from VE1PR08MB5677.eurprd08.prod.outlook.com
 ([fe80::e961:6117:1b58:38e7]) by VE1PR08MB5677.eurprd08.prod.outlook.com
 ([fe80::e961:6117:1b58:38e7%3]) with mapi id 15.20.5081.022; Mon, 21 Mar 2022
 05:46:28 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4e526aa3-a8da-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=HSv8N45yjCaI/ZJNr3x2ORl1tzjC7C2Q9iCmCO1Bmto=;
 b=NiXKXj1l4Szl6xlekqeoOxeaWCosUPM8sw2ymdiYfKUovGl3Or43FzVT36U1jd+YcZMm2lPBXwkb8y9TKgkCnaHdpQkq+1prhlPz67G6yzW0ckxu1U1KyggOyAN7acu5uVuypn0Zj0PUPcyMjsogqgdPzcZ+gBoHGBKNK2ygvLM=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=FYcowtAbEsu5Rq3bnqkwDmp24iPt49s2S4+IJoZGNvG8/xHOQ65HNoQkYfrf4kEhUIXijYAmrtkgunk/g68ZJML4CFW3sff2d4yCp6/7se6sy5vrVwpB+Y/bI56v9DmpJQjuN8DN0ymu8Dhtk8lhw1rAYy83hbnT+nLy/ZHX05lBGPlgvzx5OJvkgCKe8W2lqnu7v5VQvQxwqiE13JK0hInoUBQ1yADsCXkqbFZzmJ9dQy6JK/akWsuLCltU/o2QtvfhaQe5Grdl0hD6eByDmDsfCkdiAAMKpuagQC8kskB9HtqFt/niQKy6tTH5Ie8JpVdC+saVQyKtrm61XCZHrQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=HSv8N45yjCaI/ZJNr3x2ORl1tzjC7C2Q9iCmCO1Bmto=;
 b=dfylF3dWl62w/fHT3PpAKrTAc9JkCAvD6onhul7M5hHro1PWytf0W5uRgxXVUxItab8o8LOltonv90204iFsMft8I9gA3bStuikTUr79zQGf9+9OYf58kwJhSyM+I9BL+9ppyHHq73OukCtoRO72541lnIeI51RJTH7E3BTLnQ9BjQdxu//MsK7kCPCcVyBdTLI93F401oN2You6ItUap9MzC4cOgcaWbAm68aXZuy+3RiCuAQoK7QqDSfiOl3ICDxV7QGAGIjXGGmgkvolMGf48KOwJxFpJMPJqyrrnbRGtpaaGE2lY5p0OIgZscGz32Z83h6vyUk/5PuPnh/Y9jg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=HSv8N45yjCaI/ZJNr3x2ORl1tzjC7C2Q9iCmCO1Bmto=;
 b=NiXKXj1l4Szl6xlekqeoOxeaWCosUPM8sw2ymdiYfKUovGl3Or43FzVT36U1jd+YcZMm2lPBXwkb8y9TKgkCnaHdpQkq+1prhlPz67G6yzW0ckxu1U1KyggOyAN7acu5uVuypn0Zj0PUPcyMjsogqgdPzcZ+gBoHGBKNK2ygvLM=
From: Hongda Deng <Hongda.Deng@arm.com>
To: Julien Grall <julien@xen.org>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: Julien Grall <jgrall@amazon.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Bertrand Marquis <Bertrand.Marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: RE: [PATCH v3 05/19] xen/arm: mm: Add support for the contiguous bit
Thread-Topic: [PATCH v3 05/19] xen/arm: mm: Add support for the contiguous bit
Thread-Index: AQHYJwz6gD61KYQGFkmKC0/u3eFrX6ymQHyAgCM9yoA=
Date: Mon, 21 Mar 2022 05:46:27 +0000
Message-ID:
 <VE1PR08MB567728BFC23E74CAC3652FB5E6169@VE1PR08MB5677.eurprd08.prod.outlook.com>
References: <20220221102218.33785-1-julien@xen.org>
 <20220221102218.33785-6-julien@xen.org>
 <e8382df1-eb0c-9571-873f-848e2d6cf8fa@xen.org>
In-Reply-To: <e8382df1-eb0c-9571-873f-848e2d6cf8fa@xen.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 5FD63EAAEFC8384397E4C3B6CFFB6870.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 7ec8e614-5c27-4ac7-0efb-08da0afe2dff
x-ms-traffictypediagnostic:
	DB7PR08MB3915:EE_|AM5EUR03FT020:EE_|DB6PR0801MB1991:EE_
X-Microsoft-Antispam-PRVS:
	<DB6PR0801MB1991DB7A481D670EDB14826EE6169@DB6PR0801MB1991.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:VE1PR08MB5677.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(2906002)(8936002)(508600001)(38070700005)(52536014)(122000001)(86362001)(6506007)(53546011)(5660300002)(9686003)(7696005)(4326008)(71200400001)(8676002)(66946007)(76116006)(55016003)(64756008)(66446008)(66476007)(66556008)(26005)(110136005)(54906003)(316002)(38100700002)(83380400001)(33656002)(186003);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR08MB3915
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT020.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	667cc573-0f92-458a-0c58-08da0afe2519
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(70586007)(4326008)(47076005)(70206006)(508600001)(316002)(83380400001)(33656002)(54906003)(9686003)(110136005)(356005)(82310400004)(81166007)(186003)(8936002)(107886003)(53546011)(55016003)(36860700001)(8676002)(7696005)(2906002)(6506007)(5660300002)(26005)(52536014)(86362001)(336012);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 05:46:43.5382
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 7ec8e614-5c27-4ac7-0efb-08da0afe2dff
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT020.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0801MB1991

SGkgSnVsaWVuLA0KDQo+IC0tLS0tT3JpZ2luYWwgTWVzc2FnZS0tLS0tDQo+IEZyb206IFhlbi1k
ZXZlbCA8eGVuLWRldmVsLWJvdW5jZXNAbGlzdHMueGVucHJvamVjdC5vcmc+IE9uIEJlaGFsZiBP
ZiBKdWxpZW4NCj4gR3JhbGwNCj4gU2VudDogMjAyMuW5tDLmnIgyN+aXpSAzOjMwDQo+IFRvOiB4
ZW4tZGV2ZWxAbGlzdHMueGVucHJvamVjdC5vcmcNCj4gQ2M6IEp1bGllbiBHcmFsbCA8amdyYWxs
QGFtYXpvbi5jb20+OyBTdGVmYW5vIFN0YWJlbGxpbmkNCj4gPHNzdGFiZWxsaW5pQGtlcm5lbC5v
cmc+OyBCZXJ0cmFuZCBNYXJxdWlzIDxCZXJ0cmFuZC5NYXJxdWlzQGFybS5jb20+Ow0KPiBWb2xv
ZHlteXIgQmFiY2h1ayA8Vm9sb2R5bXlyX0JhYmNodWtAZXBhbS5jb20+DQo+IFN1YmplY3Q6IFJl
OiBbUEFUQ0ggdjMgMDUvMTldIHhlbi9hcm06IG1tOiBBZGQgc3VwcG9ydCBmb3IgdGhlIGNvbnRp
Z3VvdXMgYml0DQo+IA0KPiBIaSwNCj4gDQo+IE9uIDIxLzAyLzIwMjIgMTA6MjIsIEp1bGllbiBH
cmFsbCB3cm90ZToNCj4gPiBAQCAtMTMzMywyMSArMTM4NiwzNCBAQCBzdGF0aWMgaW50IHhlbl9w
dF91cGRhdGUodW5zaWduZWQgbG9uZyB2aXJ0LA0KPiA+ICAgICAgIHdoaWxlICggbGVmdCApDQo+
ID4gICAgICAgew0KPiA+ICAgICAgICAgICB1bnNpZ25lZCBpbnQgb3JkZXIsIGxldmVsOw0KPiA+
ICsgICAgICAgIHVuc2lnbmVkIGludCBucl9jb250aWc7DQo+ID4gKyAgICAgICAgdW5zaWduZWQg
aW50IG5ld19mbGFnczsNCj4gPg0KPiA+ICAgICAgICAgICBsZXZlbCA9IHhlbl9wdF9tYXBwaW5n
X2xldmVsKHZmbiwgbWZuLCBsZWZ0LCBmbGFncyk7DQo+ID4gICAgICAgICAgIG9yZGVyID0gWEVO
X1BUX0xFVkVMX09SREVSKGxldmVsKTsNCj4gPg0KPiA+ICAgICAgICAgICBBU1NFUlQobGVmdCA+
PSBCSVQob3JkZXIsIFVMKSk7DQo+ID4NCj4gPiAtICAgICAgICByYyA9IHhlbl9wdF91cGRhdGVf
ZW50cnkocm9vdCwgcGZuX3RvX3BhZGRyKHZmbiksIG1mbiwgbGV2ZWwsIGZsYWdzKTsNCj4gPiAt
ICAgICAgICBpZiAoIHJjICkNCj4gPiAtICAgICAgICAgICAgYnJlYWs7DQo+ID4gKyAgICAgICAg
LyoNCj4gPiArICAgICAgICAgKiBDaGVjayBpZiB3ZSBjYW4gc2V0IHRoZSBjb250aWd1b3VzIG1h
cHBpbmcgYW5kIHVwZGF0ZSB0aGUNCj4gPiArICAgICAgICAgKiBmbGFncyBhY2NvcmRpbmdseS4N
Cj4gPiArICAgICAgICAgKi8NCj4gPiArICAgICAgICBucl9jb250aWcgPSB4ZW5fcHRfY2hlY2tf
Y29udGlnKHZmbiwgbWZuLCBsZXZlbCwgbGVmdCwgZmxhZ3MpOw0KPiA+ICsgICAgICAgIG5ld19m
bGFncyA9IGZsYWdzIHwgKChucl9jb250aWcgPiAxKSA/IF9QQUdFX0NPTlRJRyA6IDApOw0KPiA+
DQo+ID4gLSAgICAgICAgdmZuICs9IDFVIDw8IG9yZGVyOw0KPiA+IC0gICAgICAgIGlmICggIW1m
bl9lcShtZm4sIElOVkFMSURfTUZOKSApDQo+ID4gLSAgICAgICAgICAgIG1mbiA9IG1mbl9hZGQo
bWZuLCAxVSA8PCBvcmRlcik7DQo+ID4gKyAgICAgICAgZm9yICggOyBucl9jb250aWcgPiAwOyBu
cl9jb250aWctLSApDQo+ID4gKyAgICAgICAgew0KPiA+ICsgICAgICAgICAgICByYyA9IHhlbl9w
dF91cGRhdGVfZW50cnkocm9vdCwgcGZuX3RvX3BhZGRyKHZmbiksIG1mbiwgbGV2ZWwsDQo+ID4g
KyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBuZXdfZmxhZ3MpOw0KPiA+ICsg
ICAgICAgICAgICBpZiAoIHJjICkNCj4gPiArICAgICAgICAgICAgICAgIGJyZWFrOw0KPiA+DQo+
ID4gLSAgICAgICAgbGVmdCAtPSAoMVUgPDwgb3JkZXIpOw0KPiA+ICsgICAgICAgICAgICB2Zm4g
Kz0gMVUgPDwgb3JkZXI7DQo+ID4gKyAgICAgICAgICAgIGlmICggIW1mbl9lcShtZm4sIElOVkFM
SURfTUZOKSApDQo+ID4gKyAgICAgICAgICAgICAgICBtZm4gPSBtZm5fYWRkKG1mbiwgMVUgPDwg
b3JkZXIpOw0KPiA+ICsNCj4gPiArICAgICAgICAgICAgbGVmdCAtPSAoMVUgPDwgb3JkZXIpOw0K
PiA+ICsgICAgICAgIH0NCj4gDQo+IEkgZm9yZ290IHRvIGFkZDoNCj4gDQo+IGlmICggcmMgKQ0K
PiAgICBicmVhazsNCj4gDQo+IFdpdGhvdXQgaXQsIHRoZSBvdXRlciBsb29wIHdpbGwgbmV2ZXIg
ZXhpdCBpbiBjYXNlIG9mIGFuIGVycm9yLg0KPiANCj4gQ2hlZXJzLA0KPiANCj4gLS0NCj4gSnVs
aWVuIEdyYWxsDQoNClllcCwgSSBhbSBoYXBweSB3aXRoIHRoYXQuDQoNClJldmlld2VkLWJ5OiBI
b25nZGEgRGVuZyA8SG9uZ2RhLkRlbmdAYXJtLmNvbT4NCg0KQ2hlZXJzLA0KLS0tDQpIb25nZGEN
Cg0K


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 07:15:44 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 07:15:44 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292757.497136 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWCGN-0000uZ-5P; Mon, 21 Mar 2022 07:15:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292757.497136; Mon, 21 Mar 2022 07:15:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWCGN-0000uS-2K; Mon, 21 Mar 2022 07:15:35 +0000
Received: by outflank-mailman (input) for mailman id 292757;
 Mon, 21 Mar 2022 07:15:33 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=8hCO=UA=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nWCGL-0000eJ-BJ
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 07:15:33 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b124b63b-a8e6-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 08:15:31 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id C355A210E4;
 Mon, 21 Mar 2022 07:15:30 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 6B229139FF;
 Mon, 21 Mar 2022 07:15:30 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id sPTxGBImOGKEGgAAMHmgww
 (envelope-from <jgross@suse.com>); Mon, 21 Mar 2022 07:15:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b124b63b-a8e6-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647846930; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=hyHM1LmjK8Su7htsQmIWVR4BMXmMMMJAFNTJDjEoFsI=;
	b=KNdhUSY9ZxZyjkooUcj9w4yjwwrr11zdnERCUwwmtPduRwcEYG/BX8XGtMBZdko7FqpS46
	jdcSebM6g+53g0kyJj01P0/EJm9XaD5x6HOXC+tM0r0Kmp1QowMehvOnvfre+RzHL1R9W7
	17U6zv2u7fXku5gZ+AXK60mJPiFmFVM=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>,
	George Dunlap <george.dunlap@citrix.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Christopher Clark <christopher.w.clark@gmail.com>,
	Dario Faggioli <dfaggioli@suse.com>,
	Daniel De Graaf <dgdegra@tycho.nsa.gov>,
	"Daniel P. Smith" <dpsmith@apertussolutions.com>
Subject: [PATCH v4.1 11/11] xen/x86: remove cf_check attribute from hypercall handlers
Date: Mon, 21 Mar 2022 08:15:27 +0100
Message-Id: <20220321071527.1946-2-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220321071527.1946-1-jgross@suse.com>
References: <20220310073420.15622-1-jgross@suse.com>
 <20220321071527.1946-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Now that the hypercall handlers are all being called directly instead
through a function vector, the "cf_check" attribute can be removed.

Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Daniel P. Smith <dpsmith@apertussolutions.com> # xsm parts
Acked-by: Jan Beulich <jbeulich@suse.com>
---
V4:
- new patch
---
 xen/arch/x86/compat.c               |  6 +++---
 xen/arch/x86/cpu/mcheck/mce.c       |  2 +-
 xen/arch/x86/cpu/vpmu.c             |  2 +-
 xen/arch/x86/domain.c               |  3 +--
 xen/arch/x86/hvm/dm.c               |  2 +-
 xen/arch/x86/hvm/hvm.c              |  2 +-
 xen/arch/x86/hvm/hypercall.c        |  6 +++---
 xen/arch/x86/mm.c                   | 12 ++++++------
 xen/arch/x86/mm/paging.c            |  2 +-
 xen/arch/x86/physdev.c              |  2 +-
 xen/arch/x86/platform_hypercall.c   |  2 +-
 xen/arch/x86/pv/callback.c          | 16 ++++++++--------
 xen/arch/x86/pv/descriptor-tables.c |  8 ++++----
 xen/arch/x86/pv/iret.c              |  4 ++--
 xen/arch/x86/pv/misc-hypercalls.c   | 10 +++++-----
 xen/arch/x86/pv/shim.c              |  4 ++--
 xen/arch/x86/x86_64/compat/mm.c     |  2 +-
 xen/arch/x86/x86_64/domain.c        |  2 +-
 xen/common/argo.c                   |  4 ++--
 xen/common/compat/grant_table.c     |  2 +-
 xen/common/compat/kernel.c          |  2 +-
 xen/common/compat/memory.c          |  3 +--
 xen/common/dm.c                     |  2 +-
 xen/common/domain.c                 |  2 +-
 xen/common/domctl.c                 |  2 +-
 xen/common/event_channel.c          |  2 +-
 xen/common/grant_table.c            |  3 +--
 xen/common/hypfs.c                  |  2 +-
 xen/common/kernel.c                 |  2 +-
 xen/common/kexec.c                  |  4 ++--
 xen/common/memory.c                 |  2 +-
 xen/common/multicall.c              |  3 +--
 xen/common/sched/compat.c           |  2 +-
 xen/common/sched/core.c             |  4 ++--
 xen/common/sysctl.c                 |  2 +-
 xen/common/xenoprof.c               |  2 +-
 xen/drivers/char/console.c          |  2 +-
 xen/scripts/gen_hypercall.awk       |  2 +-
 xen/xsm/xsm_core.c                  |  4 ++--
 39 files changed, 68 insertions(+), 72 deletions(-)

diff --git a/xen/arch/x86/compat.c b/xen/arch/x86/compat.c
index 28281a262a..a031062830 100644
--- a/xen/arch/x86/compat.c
+++ b/xen/arch/x86/compat.c
@@ -15,7 +15,7 @@ typedef long ret_t;
 #endif
 
 /* Legacy hypercall (as of 0x00030202). */
-ret_t cf_check do_physdev_op_compat(XEN_GUEST_HANDLE_PARAM(physdev_op_t) uop)
+ret_t do_physdev_op_compat(XEN_GUEST_HANDLE_PARAM(physdev_op_t) uop)
 {
     struct physdev_op op;
 
@@ -28,7 +28,7 @@ ret_t cf_check do_physdev_op_compat(XEN_GUEST_HANDLE_PARAM(physdev_op_t) uop)
 #ifndef COMPAT
 
 /* Legacy hypercall (as of 0x00030101). */
-long cf_check do_sched_op_compat(int cmd, unsigned long arg)
+long do_sched_op_compat(int cmd, unsigned long arg)
 {
     switch ( cmd )
     {
@@ -50,7 +50,7 @@ long cf_check do_sched_op_compat(int cmd, unsigned long arg)
 }
 
 /* Legacy hypercall (as of 0x00030202). */
-long cf_check do_event_channel_op_compat(
+long do_event_channel_op_compat(
     XEN_GUEST_HANDLE_PARAM(evtchn_op_t) uop)
 {
     struct evtchn_op op;
diff --git a/xen/arch/x86/cpu/mcheck/mce.c b/xen/arch/x86/cpu/mcheck/mce.c
index 275c54be7c..f68e31b643 100644
--- a/xen/arch/x86/cpu/mcheck/mce.c
+++ b/xen/arch/x86/cpu/mcheck/mce.c
@@ -1351,7 +1351,7 @@ CHECK_mcinfo_recovery;
 # endif /* CONFIG_COMPAT */
 
 /* Machine Check Architecture Hypercall */
-long cf_check do_mca(XEN_GUEST_HANDLE_PARAM(xen_mc_t) u_xen_mc)
+long do_mca(XEN_GUEST_HANDLE_PARAM(xen_mc_t) u_xen_mc)
 {
     long ret = 0;
     struct xen_mc curop, *op = &curop;
diff --git a/xen/arch/x86/cpu/vpmu.c b/xen/arch/x86/cpu/vpmu.c
index 51d171615f..d2c03a1104 100644
--- a/xen/arch/x86/cpu/vpmu.c
+++ b/xen/arch/x86/cpu/vpmu.c
@@ -672,7 +672,7 @@ void vpmu_dump(struct vcpu *v)
         alternative_vcall(vpmu_ops.arch_vpmu_dump, v);
 }
 
-long cf_check do_xenpmu_op(
+long do_xenpmu_op(
     unsigned int op, XEN_GUEST_HANDLE_PARAM(xen_pmu_params_t) arg)
 {
     int ret;
diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c
index d566fc82b4..ddf969f76e 100644
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -1489,8 +1489,7 @@ int arch_vcpu_reset(struct vcpu *v)
     return 0;
 }
 
-long cf_check do_vcpu_op(int cmd, unsigned int vcpuid,
-                         XEN_GUEST_HANDLE_PARAM(void) arg)
+long do_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     long rc = 0;
     struct domain *d = current->domain;
diff --git a/xen/arch/x86/hvm/dm.c b/xen/arch/x86/hvm/dm.c
index d80975efcf..f8e6089870 100644
--- a/xen/arch/x86/hvm/dm.c
+++ b/xen/arch/x86/hvm/dm.c
@@ -654,7 +654,7 @@ CHECK_dm_op_relocate_memory;
 CHECK_dm_op_pin_memory_cacheattr;
 CHECK_dm_op_nr_vcpus;
 
-int cf_check compat_dm_op(
+int compat_dm_op(
     domid_t domid, unsigned int nr_bufs, XEN_GUEST_HANDLE_PARAM(void) bufs)
 {
     struct dmop_args args;
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index 709a4191ef..9b3973dad8 100644
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -5022,7 +5022,7 @@ static int hvmop_get_mem_type(
     return rc;
 }
 
-long cf_check do_hvm_op(unsigned long op, XEN_GUEST_HANDLE_PARAM(void) arg)
+long do_hvm_op(unsigned long op, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     long rc = 0;
 
diff --git a/xen/arch/x86/hvm/hypercall.c b/xen/arch/x86/hvm/hypercall.c
index ae601185fc..29d1ca7a13 100644
--- a/xen/arch/x86/hvm/hypercall.c
+++ b/xen/arch/x86/hvm/hypercall.c
@@ -31,7 +31,7 @@
 #include <public/hvm/hvm_op.h>
 #include <public/hvm/params.h>
 
-long cf_check hvm_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long hvm_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     long rc;
 
@@ -51,7 +51,7 @@ long cf_check hvm_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 }
 
 #ifdef CONFIG_GRANT_TABLE
-long cf_check hvm_grant_table_op(
+long hvm_grant_table_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) uop, unsigned int count)
 {
     switch ( cmd )
@@ -77,7 +77,7 @@ long cf_check hvm_grant_table_op(
 }
 #endif
 
-long cf_check hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     const struct vcpu *curr = current;
     const struct domain *currd = curr->domain;
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index 6cc73187ac..a958142d17 100644
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86/mm.c
@@ -3377,7 +3377,7 @@ static int vcpumask_to_pcpumask(
     }
 }
 
-long cf_check do_mmuext_op(
+long do_mmuext_op(
     XEN_GUEST_HANDLE_PARAM(mmuext_op_t) uops,
     unsigned int count,
     XEN_GUEST_HANDLE_PARAM(uint) pdone,
@@ -3916,7 +3916,7 @@ long cf_check do_mmuext_op(
     return rc;
 }
 
-long cf_check do_mmu_update(
+long do_mmu_update(
     XEN_GUEST_HANDLE_PARAM(mmu_update_t) ureqs,
     unsigned int count,
     XEN_GUEST_HANDLE_PARAM(uint) pdone,
@@ -4501,7 +4501,7 @@ static int __do_update_va_mapping(
     return rc;
 }
 
-long cf_check do_update_va_mapping(
+long do_update_va_mapping(
     unsigned long va, u64 val64, unsigned long flags)
 {
     int rc = __do_update_va_mapping(va, val64, flags, current->domain);
@@ -4513,7 +4513,7 @@ long cf_check do_update_va_mapping(
     return rc;
 }
 
-long cf_check do_update_va_mapping_otherdomain(
+long do_update_va_mapping_otherdomain(
     unsigned long va, u64 val64, unsigned long flags, domid_t domid)
 {
     struct domain *pg_owner;
@@ -4536,7 +4536,7 @@ long cf_check do_update_va_mapping_otherdomain(
 #endif /* CONFIG_PV */
 
 #ifdef CONFIG_PV32
-int cf_check compat_update_va_mapping(
+int compat_update_va_mapping(
     unsigned int va, uint32_t lo, uint32_t hi, unsigned int flags)
 {
     int rc = __do_update_va_mapping(va, ((uint64_t)hi << 32) | lo,
@@ -4549,7 +4549,7 @@ int cf_check compat_update_va_mapping(
     return rc;
 }
 
-int cf_check compat_update_va_mapping_otherdomain(
+int compat_update_va_mapping_otherdomain(
     unsigned int va, uint32_t lo, uint32_t hi, unsigned int flags,
     domid_t domid)
 {
diff --git a/xen/arch/x86/mm/paging.c b/xen/arch/x86/mm/paging.c
index a7e2707ecc..cb1bfcbde5 100644
--- a/xen/arch/x86/mm/paging.c
+++ b/xen/arch/x86/mm/paging.c
@@ -760,7 +760,7 @@ int paging_domctl(struct domain *d, struct xen_domctl_shadow_op *sc,
         return shadow_domctl(d, sc, u_domctl);
 }
 
-long cf_check do_paging_domctl_cont(
+long do_paging_domctl_cont(
     XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl)
 {
     struct xen_domctl op;
diff --git a/xen/arch/x86/physdev.c b/xen/arch/x86/physdev.c
index 2ddcf44f33..ea38be8b79 100644
--- a/xen/arch/x86/physdev.c
+++ b/xen/arch/x86/physdev.c
@@ -174,7 +174,7 @@ int physdev_unmap_pirq(domid_t domid, int pirq)
 }
 #endif /* COMPAT */
 
-ret_t cf_check do_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+ret_t do_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     int irq;
     ret_t ret;
diff --git a/xen/arch/x86/platform_hypercall.c b/xen/arch/x86/platform_hypercall.c
index eeb4f7a20e..a7341dc3d7 100644
--- a/xen/arch/x86/platform_hypercall.c
+++ b/xen/arch/x86/platform_hypercall.c
@@ -214,7 +214,7 @@ void cf_check resource_access(void *info)
 }
 #endif
 
-ret_t cf_check do_platform_op(
+ret_t do_platform_op(
     XEN_GUEST_HANDLE_PARAM(xen_platform_op_t) u_xenpf_op)
 {
     ret_t ret;
diff --git a/xen/arch/x86/pv/callback.c b/xen/arch/x86/pv/callback.c
index 1be9d3f731..067ee3b795 100644
--- a/xen/arch/x86/pv/callback.c
+++ b/xen/arch/x86/pv/callback.c
@@ -140,7 +140,7 @@ static long unregister_guest_callback(struct callback_unregister *unreg)
     return ret;
 }
 
-long cf_check do_callback_op(int cmd, XEN_GUEST_HANDLE_PARAM(const_void) arg)
+long do_callback_op(int cmd, XEN_GUEST_HANDLE_PARAM(const_void) arg)
 {
     long ret;
 
@@ -178,7 +178,7 @@ long cf_check do_callback_op(int cmd, XEN_GUEST_HANDLE_PARAM(const_void) arg)
     return ret;
 }
 
-long cf_check do_set_callbacks(
+long do_set_callbacks(
     unsigned long event_address, unsigned long failsafe_address,
     unsigned long syscall_address)
 {
@@ -283,7 +283,7 @@ static int compat_unregister_guest_callback(
     return ret;
 }
 
-int cf_check compat_callback_op(int cmd, XEN_GUEST_HANDLE(const_void) arg)
+int compat_callback_op(int cmd, XEN_GUEST_HANDLE(const_void) arg)
 {
     int ret;
 
@@ -321,7 +321,7 @@ int cf_check compat_callback_op(int cmd, XEN_GUEST_HANDLE(const_void) arg)
     return ret;
 }
 
-int cf_check compat_set_callbacks(
+int compat_set_callbacks(
     unsigned long event_selector, unsigned long event_address,
     unsigned long failsafe_selector, unsigned long failsafe_address)
 {
@@ -348,7 +348,7 @@ int cf_check compat_set_callbacks(
 
 #endif /* CONFIG_PV32 */
 
-long cf_check do_set_trap_table(XEN_GUEST_HANDLE_PARAM(const_trap_info_t) traps)
+long do_set_trap_table(XEN_GUEST_HANDLE_PARAM(const_trap_info_t) traps)
 {
     struct trap_info cur;
     struct vcpu *curr = current;
@@ -394,7 +394,7 @@ long cf_check do_set_trap_table(XEN_GUEST_HANDLE_PARAM(const_trap_info_t) traps)
 }
 
 #ifdef CONFIG_PV32
-int cf_check compat_set_trap_table(XEN_GUEST_HANDLE(trap_info_compat_t) traps)
+int compat_set_trap_table(XEN_GUEST_HANDLE(trap_info_compat_t) traps)
 {
     struct vcpu *curr = current;
     struct compat_trap_info cur;
@@ -437,7 +437,7 @@ int cf_check compat_set_trap_table(XEN_GUEST_HANDLE(trap_info_compat_t) traps)
 }
 #endif
 
-long cf_check do_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long do_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     struct xennmi_callback cb;
     long rc = 0;
@@ -463,7 +463,7 @@ long cf_check do_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 }
 
 #ifdef CONFIG_PV32
-int cf_check compat_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+int compat_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     struct compat_nmi_callback cb;
     int rc = 0;
diff --git a/xen/arch/x86/pv/descriptor-tables.c b/xen/arch/x86/pv/descriptor-tables.c
index 653a61d0b5..b4135b450c 100644
--- a/xen/arch/x86/pv/descriptor-tables.c
+++ b/xen/arch/x86/pv/descriptor-tables.c
@@ -124,7 +124,7 @@ int pv_set_gdt(struct vcpu *v, const unsigned long frames[],
     return -EINVAL;
 }
 
-long cf_check do_set_gdt(
+long do_set_gdt(
     XEN_GUEST_HANDLE_PARAM(xen_ulong_t) frame_list, unsigned int entries)
 {
     unsigned int nr_frames = DIV_ROUND_UP(entries, 512);
@@ -151,7 +151,7 @@ long cf_check do_set_gdt(
 
 #ifdef CONFIG_PV32
 
-int cf_check compat_set_gdt(
+int compat_set_gdt(
     XEN_GUEST_HANDLE_PARAM(uint) frame_list, unsigned int entries)
 {
     struct vcpu *curr = current;
@@ -187,7 +187,7 @@ int cf_check compat_set_gdt(
     return ret;
 }
 
-int cf_check compat_update_descriptor(
+int compat_update_descriptor(
     uint32_t pa_lo, uint32_t pa_hi, uint32_t desc_lo, uint32_t desc_hi)
 {
     seg_desc_t d;
@@ -299,7 +299,7 @@ int validate_segdesc_page(struct page_info *page)
     return i == 512 ? 0 : -EINVAL;
 }
 
-long cf_check do_update_descriptor(uint64_t gaddr, seg_desc_t d)
+long do_update_descriptor(uint64_t gaddr, seg_desc_t d)
 {
     struct domain *currd = current->domain;
     gfn_t gfn = gaddr_to_gfn(gaddr);
diff --git a/xen/arch/x86/pv/iret.c b/xen/arch/x86/pv/iret.c
index 58de9f7922..316a23e77e 100644
--- a/xen/arch/x86/pv/iret.c
+++ b/xen/arch/x86/pv/iret.c
@@ -49,7 +49,7 @@ static void async_exception_cleanup(struct vcpu *curr)
         curr->arch.async_exception_state(trap).old_mask;
 }
 
-long cf_check do_iret(void)
+long do_iret(void)
 {
     struct cpu_user_regs *regs = guest_cpu_user_regs();
     struct iret_context iret_saved;
@@ -106,7 +106,7 @@ long cf_check do_iret(void)
 }
 
 #ifdef CONFIG_PV32
-int cf_check compat_iret(void)
+int compat_iret(void)
 {
     struct cpu_user_regs *regs = guest_cpu_user_regs();
     struct vcpu *v = current;
diff --git a/xen/arch/x86/pv/misc-hypercalls.c b/xen/arch/x86/pv/misc-hypercalls.c
index 635f5a644a..aaaf70eb63 100644
--- a/xen/arch/x86/pv/misc-hypercalls.c
+++ b/xen/arch/x86/pv/misc-hypercalls.c
@@ -23,12 +23,12 @@
 
 #include <asm/debugreg.h>
 
-long cf_check do_set_debugreg(int reg, unsigned long value)
+long do_set_debugreg(int reg, unsigned long value)
 {
     return set_debugreg(current, reg, value);
 }
 
-long cf_check do_get_debugreg(int reg)
+long do_get_debugreg(int reg)
 {
     /* Avoid implementation defined behavior casting unsigned long to long. */
     union {
@@ -40,7 +40,7 @@ long cf_check do_get_debugreg(int reg)
     return res == X86EMUL_OKAY ? u.ret : -ENODEV;
 }
 
-long cf_check do_fpu_taskswitch(int set)
+long do_fpu_taskswitch(int set)
 {
     struct vcpu *v = current;
 
@@ -175,7 +175,7 @@ long set_debugreg(struct vcpu *v, unsigned int reg, unsigned long value)
     return 0;
 }
 
-long cf_check do_stack_switch(unsigned long ss, unsigned long esp)
+long do_stack_switch(unsigned long ss, unsigned long esp)
 {
     fixup_guest_stack_selector(current->domain, ss);
     current->arch.pv.kernel_ss = ss;
@@ -184,7 +184,7 @@ long cf_check do_stack_switch(unsigned long ss, unsigned long esp)
     return 0;
 }
 
-long cf_check do_set_segment_base(unsigned int which, unsigned long base)
+long do_set_segment_base(unsigned int which, unsigned long base)
 {
     struct vcpu *v = current;
     long ret = 0;
diff --git a/xen/arch/x86/pv/shim.c b/xen/arch/x86/pv/shim.c
index 2ee290a392..2b74fea181 100644
--- a/xen/arch/x86/pv/shim.c
+++ b/xen/arch/x86/pv/shim.c
@@ -824,7 +824,7 @@ long pv_shim_grant_table_op(unsigned int cmd,
 
 #ifndef CONFIG_GRANT_TABLE
 /* Thin wrapper(s) needed. */
-long cf_check do_grant_table_op(
+long do_grant_table_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) uop, unsigned int count)
 {
     if ( !pv_shim )
@@ -834,7 +834,7 @@ long cf_check do_grant_table_op(
 }
 
 #ifdef CONFIG_PV32
-int cf_check compat_grant_table_op(
+int compat_grant_table_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) uop, unsigned int count)
 {
     if ( !pv_shim )
diff --git a/xen/arch/x86/x86_64/compat/mm.c b/xen/arch/x86/x86_64/compat/mm.c
index 70b08a832a..d54efaad21 100644
--- a/xen/arch/x86/x86_64/compat/mm.c
+++ b/xen/arch/x86/x86_64/compat/mm.c
@@ -177,7 +177,7 @@ int compat_arch_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 #ifdef CONFIG_PV
 DEFINE_XEN_GUEST_HANDLE(mmuext_op_compat_t);
 
-int cf_check compat_mmuext_op(
+int compat_mmuext_op(
     XEN_GUEST_HANDLE_PARAM(void) arg, unsigned int count,
     XEN_GUEST_HANDLE_PARAM(uint) pdone, unsigned int foreigndom)
 {
diff --git a/xen/arch/x86/x86_64/domain.c b/xen/arch/x86/x86_64/domain.c
index 9c559aa3ea..62fe51ee74 100644
--- a/xen/arch/x86/x86_64/domain.c
+++ b/xen/arch/x86/x86_64/domain.c
@@ -12,7 +12,7 @@
 CHECK_vcpu_get_physid;
 #undef xen_vcpu_get_physid
 
-int cf_check
+int
 compat_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     int rc;
diff --git a/xen/common/argo.c b/xen/common/argo.c
index 26a01c2188..748b8714d6 100644
--- a/xen/common/argo.c
+++ b/xen/common/argo.c
@@ -2069,7 +2069,7 @@ sendv(struct domain *src_d, xen_argo_addr_t *src_addr,
     return ( ret < 0 ) ? ret : len;
 }
 
-long cf_check
+long
 do_argo_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg1,
            XEN_GUEST_HANDLE_PARAM(void) arg2, unsigned long raw_arg3,
            unsigned long raw_arg4)
@@ -2207,7 +2207,7 @@ do_argo_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg1,
 }
 
 #ifdef CONFIG_COMPAT
-int cf_check
+int
 compat_argo_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg1,
                XEN_GUEST_HANDLE_PARAM(void) arg2, unsigned long arg3,
                unsigned long arg4)
diff --git a/xen/common/compat/grant_table.c b/xen/common/compat/grant_table.c
index d5787e3719..4705ee5f76 100644
--- a/xen/common/compat/grant_table.c
+++ b/xen/common/compat/grant_table.c
@@ -56,7 +56,7 @@ CHECK_gnttab_swap_grant_ref;
 CHECK_gnttab_cache_flush;
 #undef xen_gnttab_cache_flush
 
-int cf_check compat_grant_table_op(
+int compat_grant_table_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) cmp_uop, unsigned int count)
 {
     int rc = 0;
diff --git a/xen/common/compat/kernel.c b/xen/common/compat/kernel.c
index 8e8c413bf1..804b919bdc 100644
--- a/xen/common/compat/kernel.c
+++ b/xen/common/compat/kernel.c
@@ -37,7 +37,7 @@ CHECK_TYPE(capabilities_info);
 
 CHECK_TYPE(domain_handle);
 
-#define DO(fn) int cf_check compat_##fn
+#define DO(fn) int compat_##fn
 #define COMPAT
 
 #include "../kernel.c"
diff --git a/xen/common/compat/memory.c b/xen/common/compat/memory.c
index 077ded4a75..ce1de1b307 100644
--- a/xen/common/compat/memory.c
+++ b/xen/common/compat/memory.c
@@ -53,8 +53,7 @@ static int cf_check get_reserved_device_memory(
 }
 #endif
 
-int cf_check compat_memory_op(
-    unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) compat)
+int compat_memory_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) compat)
 {
     struct vcpu *curr = current;
     struct domain *currd = curr->domain;
diff --git a/xen/common/dm.c b/xen/common/dm.c
index fcb3a1aa05..201b652deb 100644
--- a/xen/common/dm.c
+++ b/xen/common/dm.c
@@ -19,7 +19,7 @@
 #include <xen/hypercall.h>
 #include <xen/nospec.h>
 
-long cf_check do_dm_op(
+long do_dm_op(
     domid_t domid, unsigned int nr_bufs,
     XEN_GUEST_HANDLE_PARAM(xen_dm_op_buf_t) bufs)
 {
diff --git a/xen/common/domain.c b/xen/common/domain.c
index f9de1be43c..48a22776a2 100644
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -1754,7 +1754,7 @@ long common_vcpu_op(int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
 }
 
 #ifdef arch_vm_assist_valid_mask
-long cf_check do_vm_assist(unsigned int cmd, unsigned int type)
+long do_vm_assist(unsigned int cmd, unsigned int type)
 {
     struct domain *currd = current->domain;
     const unsigned long valid = arch_vm_assist_valid_mask(currd);
diff --git a/xen/common/domctl.c b/xen/common/domctl.c
index 9606fa4f1a..879a2adcbe 100644
--- a/xen/common/domctl.c
+++ b/xen/common/domctl.c
@@ -274,7 +274,7 @@ static struct vnuma_info *vnuma_init(const struct xen_domctl_vnuma *uinfo,
     return ERR_PTR(ret);
 }
 
-long cf_check do_domctl(XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl)
+long do_domctl(XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl)
 {
     long ret = 0;
     bool_t copyback = 0;
diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c
index 0a82eb3ac2..5e2420fa12 100644
--- a/xen/common/event_channel.c
+++ b/xen/common/event_channel.c
@@ -1191,7 +1191,7 @@ static int evtchn_set_priority(const struct evtchn_set_priority *set_priority)
     return ret;
 }
 
-long cf_check do_event_channel_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long do_event_channel_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     int rc;
 
diff --git a/xen/common/grant_table.c b/xen/common/grant_table.c
index febbe12eab..c71d3ad24b 100644
--- a/xen/common/grant_table.c
+++ b/xen/common/grant_table.c
@@ -3559,8 +3559,7 @@ gnttab_cache_flush(XEN_GUEST_HANDLE_PARAM(gnttab_cache_flush_t) uop,
     return 0;
 }
 
-long cf_check
-do_grant_table_op(
+long do_grant_table_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) uop, unsigned int count)
 {
     long rc;
diff --git a/xen/common/hypfs.c b/xen/common/hypfs.c
index 0d22396f5d..acd258edf2 100644
--- a/xen/common/hypfs.c
+++ b/xen/common/hypfs.c
@@ -670,7 +670,7 @@ static int hypfs_write(struct hypfs_entry *entry,
     return entry->funcs->write(l, uaddr, ulen);
 }
 
-long cf_check do_hypfs_op(
+long do_hypfs_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(const_char) arg1,
     unsigned long arg2, XEN_GUEST_HANDLE_PARAM(void) arg3, unsigned long arg4)
 {
diff --git a/xen/common/kernel.c b/xen/common/kernel.c
index adff2d2c77..08bdae082a 100644
--- a/xen/common/kernel.c
+++ b/xen/common/kernel.c
@@ -451,7 +451,7 @@ static int __init cf_check param_init(void)
 __initcall(param_init);
 #endif
 
-# define DO(fn) long cf_check do_##fn
+# define DO(fn) long do_##fn
 
 #endif
 
diff --git a/xen/common/kexec.c b/xen/common/kexec.c
index 41669964d2..7095651605 100644
--- a/xen/common/kexec.c
+++ b/xen/common/kexec.c
@@ -1265,13 +1265,13 @@ static int do_kexec_op_internal(unsigned int op,
     return ret;
 }
 
-long cf_check do_kexec_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg)
+long do_kexec_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg)
 {
     return do_kexec_op_internal(op, uarg, 0);
 }
 
 #ifdef CONFIG_COMPAT
-int cf_check compat_kexec_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg)
+int compat_kexec_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg)
 {
     return do_kexec_op_internal(op, uarg, 1);
 }
diff --git a/xen/common/memory.c b/xen/common/memory.c
index 69b0cd1e50..963f4df1b6 100644
--- a/xen/common/memory.c
+++ b/xen/common/memory.c
@@ -1367,7 +1367,7 @@ static int acquire_resource(
     return rc;
 }
 
-long cf_check do_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long do_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     struct domain *d, *curr_d = current->domain;
     long rc;
diff --git a/xen/common/multicall.c b/xen/common/multicall.c
index 9db49092b4..1f0cc4cb26 100644
--- a/xen/common/multicall.c
+++ b/xen/common/multicall.c
@@ -33,8 +33,7 @@ static void trace_multicall_call(multicall_entry_t *call)
     __trace_multicall_call(call);
 }
 
-ret_t cf_check
-do_multicall(
+ret_t do_multicall(
     XEN_GUEST_HANDLE_PARAM(multicall_entry_t) call_list, uint32_t nr_calls)
 {
     struct vcpu *curr = current;
diff --git a/xen/common/sched/compat.c b/xen/common/sched/compat.c
index 66ba0fe88f..040b4caca2 100644
--- a/xen/common/sched/compat.c
+++ b/xen/common/sched/compat.c
@@ -39,7 +39,7 @@ static int compat_poll(struct compat_sched_poll *compat)
 
 #include "core.c"
 
-int cf_check compat_set_timer_op(u32 lo, s32 hi)
+int compat_set_timer_op(u32 lo, s32 hi)
 {
     return do_set_timer_op(((s64)hi << 32) | lo);
 }
diff --git a/xen/common/sched/core.c b/xen/common/sched/core.c
index 19ab678181..25885b5640 100644
--- a/xen/common/sched/core.c
+++ b/xen/common/sched/core.c
@@ -1862,7 +1862,7 @@ typedef long ret_t;
 
 #endif /* !COMPAT */
 
-ret_t cf_check do_sched_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+ret_t do_sched_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     ret_t ret = 0;
 
@@ -1999,7 +1999,7 @@ ret_t cf_check do_sched_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 #ifndef COMPAT
 
 /* Per-vcpu oneshot-timer hypercall. */
-long cf_check do_set_timer_op(s_time_t timeout)
+long do_set_timer_op(s_time_t timeout)
 {
     struct vcpu *v = current;
     s_time_t offset = timeout - NOW();
diff --git a/xen/common/sysctl.c b/xen/common/sysctl.c
index fc4a0b31d6..1ad3c29351 100644
--- a/xen/common/sysctl.c
+++ b/xen/common/sysctl.c
@@ -29,7 +29,7 @@
 #include <xen/livepatch.h>
 #include <xen/coverage.h>
 
-long cf_check do_sysctl(XEN_GUEST_HANDLE_PARAM(xen_sysctl_t) u_sysctl)
+long do_sysctl(XEN_GUEST_HANDLE_PARAM(xen_sysctl_t) u_sysctl)
 {
     long ret = 0;
     int copyback = -1;
diff --git a/xen/common/xenoprof.c b/xen/common/xenoprof.c
index af617f1d0b..1926a92fe4 100644
--- a/xen/common/xenoprof.c
+++ b/xen/common/xenoprof.c
@@ -721,7 +721,7 @@ static int xenoprof_op_get_buffer(XEN_GUEST_HANDLE_PARAM(void) arg)
                       || (op == XENOPROF_disable_virq)  \
                       || (op == XENOPROF_get_buffer))
  
-ret_t cf_check do_xenoprof_op(int op, XEN_GUEST_HANDLE_PARAM(void) arg)
+ret_t do_xenoprof_op(int op, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     int ret = 0;
     
diff --git a/xen/drivers/char/console.c b/xen/drivers/char/console.c
index d9d6556c22..c53fe30313 100644
--- a/xen/drivers/char/console.c
+++ b/xen/drivers/char/console.c
@@ -675,7 +675,7 @@ static long guest_console_write(XEN_GUEST_HANDLE_PARAM(char) buffer,
     return 0;
 }
 
-long cf_check do_console_io(
+long do_console_io(
     unsigned int cmd, unsigned int count, XEN_GUEST_HANDLE_PARAM(char) buffer)
 {
     long rc;
diff --git a/xen/scripts/gen_hypercall.awk b/xen/scripts/gen_hypercall.awk
index 403758be21..34840c514f 100644
--- a/xen/scripts/gen_hypercall.awk
+++ b/xen/scripts/gen_hypercall.awk
@@ -226,7 +226,7 @@ END {
     # Generate prototypes
     for (i = 1; i <= n; i++) {
         for (p = 1; p <= n_pre[i]; p++) {
-            printf("%s cf_check %s_%s(", rettype[pre[i, p]], pre[i, p], fn[i]);
+            printf("%s %s_%s(", rettype[pre[i, p]], pre[i, p], fn[i]);
             if (n_args[i] == 0)
                 printf("void");
             else
diff --git a/xen/xsm/xsm_core.c b/xen/xsm/xsm_core.c
index 2286a502e3..eaa028109b 100644
--- a/xen/xsm/xsm_core.c
+++ b/xen/xsm/xsm_core.c
@@ -219,13 +219,13 @@ bool __init has_xsm_magic(paddr_t start)
 
 #endif
 
-long cf_check do_xsm_op(XEN_GUEST_HANDLE_PARAM(void) op)
+long do_xsm_op(XEN_GUEST_HANDLE_PARAM(void) op)
 {
     return xsm_do_xsm_op(op);
 }
 
 #ifdef CONFIG_COMPAT
-int cf_check compat_xsm_op(XEN_GUEST_HANDLE_PARAM(void) op)
+int compat_xsm_op(XEN_GUEST_HANDLE_PARAM(void) op)
 {
     return xsm_do_compat_op(op);
 }
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 07:15:44 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 07:15:44 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292756.497125 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWCGL-0000ep-PD; Mon, 21 Mar 2022 07:15:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292756.497125; Mon, 21 Mar 2022 07:15:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWCGL-0000eh-Ld; Mon, 21 Mar 2022 07:15:33 +0000
Received: by outflank-mailman (input) for mailman id 292756;
 Mon, 21 Mar 2022 07:15:32 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=8hCO=UA=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nWCGK-0000eJ-EJ
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 07:15:32 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b0c63563-a8e6-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 08:15:30 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id C606F1F37F;
 Mon, 21 Mar 2022 07:15:29 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 7BF7C139FF;
 Mon, 21 Mar 2022 07:15:29 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id UYJGHBEmOGKEGgAAMHmgww
 (envelope-from <jgross@suse.com>); Mon, 21 Mar 2022 07:15:29 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b0c63563-a8e6-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647846929; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=h22B5ZgKRwVMXna+wG55MpkmPJwyfUO662E0tM1hy2M=;
	b=rmtuAc4Cd6RwwDp/pYAZg3ZcpqX3HiFZFRvp3YXggpZFg2gZdqDqbMWtyBuPoiwSu6aDb5
	/LUswavauREErmiUyiLu5/ROQvgPCPf6275ClIphVd79f9Vn524HBuj0dtcRKdnVbyxc59
	VI20iFp5qBmeG/Czf2mJLyQIaUEY+EM=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>
Subject: [PATCH v4.1 02/11] xen: move do_vcpu_op() to arch specific code
Date: Mon, 21 Mar 2022 08:15:26 +0100
Message-Id: <20220321071527.1946-1-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220310073420.15622-1-jgross@suse.com>
References: <20220310073420.15622-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

The entry point used for the vcpu_op hypercall on Arm is different
from the one on x86 today, as some of the common sub-ops are not
supported on Arm. The Arm specific handler filters out the not
supported sub-ops and then calls the common handler. This leads to the
weird call hierarchy:

  do_arm_vcpu_op()
    do_vcpu_op()
      arch_do_vcpu_op()

Clean this up by renaming do_vcpu_op() to common_vcpu_op() and
arch_do_vcpu_op() in each architecture to do_vcpu_op(). This way one
of above calls can be avoided without restricting any potential
future use of common sub-ops for Arm.

Signed-off-by: Juergen Gross <jgross@suse.com>
---
V4:
- don't remove HYPERCALL_ARM()
V4.1:
- add missing cf_check (Andrew Cooper)
---
 xen/arch/arm/domain.c                | 15 ++++++++-------
 xen/arch/arm/include/asm/hypercall.h |  2 --
 xen/arch/arm/traps.c                 |  2 +-
 xen/arch/x86/domain.c                | 12 ++++++++----
 xen/arch/x86/include/asm/hypercall.h |  2 +-
 xen/arch/x86/x86_64/domain.c         | 18 +++++++++++++-----
 xen/common/compat/domain.c           | 15 ++++++---------
 xen/common/domain.c                  | 12 ++++--------
 xen/include/xen/hypercall.h          |  2 +-
 9 files changed, 42 insertions(+), 38 deletions(-)

diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
index 8110c1df86..2f8eaab7b5 100644
--- a/xen/arch/arm/domain.c
+++ b/xen/arch/arm/domain.c
@@ -1079,23 +1079,24 @@ void arch_dump_domain_info(struct domain *d)
 }
 
 
-long do_arm_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
+long do_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
+    struct domain *d = current->domain;
+    struct vcpu *v;
+
+    if ( (v = domain_vcpu(d, vcpuid)) == NULL )
+        return -ENOENT;
+
     switch ( cmd )
     {
         case VCPUOP_register_vcpu_info:
         case VCPUOP_register_runstate_memory_area:
-            return do_vcpu_op(cmd, vcpuid, arg);
+            return common_vcpu_op(cmd, v, arg);
         default:
             return -EINVAL;
     }
 }
 
-long arch_do_vcpu_op(int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
-{
-    return -ENOSYS;
-}
-
 void arch_dump_vcpu_info(struct vcpu *v)
 {
     gic_dump_info(v);
diff --git a/xen/arch/arm/include/asm/hypercall.h b/xen/arch/arm/include/asm/hypercall.h
index 39d2e7889d..fac4d60f17 100644
--- a/xen/arch/arm/include/asm/hypercall.h
+++ b/xen/arch/arm/include/asm/hypercall.h
@@ -4,8 +4,6 @@
 #include <public/domctl.h> /* for arch_do_domctl */
 int do_arm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
 
-long do_arm_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg);
-
 long subarch_do_domctl(struct xen_domctl *domctl, struct domain *d,
                        XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl);
 
diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
index f8c3ef0ca2..deb07784d9 100644
--- a/xen/arch/arm/traps.c
+++ b/xen/arch/arm/traps.c
@@ -1380,7 +1380,7 @@ static arm_hypercall_t arm_hypercall_table[] = {
 #endif
     HYPERCALL(multicall, 2),
     HYPERCALL(platform_op, 1),
-    HYPERCALL_ARM(vcpu_op, 3),
+    HYPERCALL(vcpu_op, 3),
     HYPERCALL(vm_assist, 2),
 #ifdef CONFIG_ARGO
     HYPERCALL(argo_op, 5),
diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c
index a5048ed654..d566fc82b4 100644
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -1489,11 +1489,15 @@ int arch_vcpu_reset(struct vcpu *v)
     return 0;
 }
 
-long
-arch_do_vcpu_op(
-    int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
+long cf_check do_vcpu_op(int cmd, unsigned int vcpuid,
+                         XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     long rc = 0;
+    struct domain *d = current->domain;
+    struct vcpu *v;
+
+    if ( (v = domain_vcpu(d, vcpuid)) == NULL )
+        return -ENOENT;
 
     switch ( cmd )
     {
@@ -1545,7 +1549,7 @@ arch_do_vcpu_op(
     }
 
     default:
-        rc = -ENOSYS;
+        rc = common_vcpu_op(cmd, v, arg);
         break;
     }
 
diff --git a/xen/arch/x86/include/asm/hypercall.h b/xen/arch/x86/include/asm/hypercall.h
index 61bf897147..d6daa7e4cb 100644
--- a/xen/arch/x86/include/asm/hypercall.h
+++ b/xen/arch/x86/include/asm/hypercall.h
@@ -145,7 +145,7 @@ compat_physdev_op(
     XEN_GUEST_HANDLE_PARAM(void) arg);
 
 extern int
-arch_compat_vcpu_op(
+compat_common_vcpu_op(
     int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg);
 
 extern int cf_check compat_mmuext_op(
diff --git a/xen/arch/x86/x86_64/domain.c b/xen/arch/x86/x86_64/domain.c
index c46dccc25a..9c559aa3ea 100644
--- a/xen/arch/x86/x86_64/domain.c
+++ b/xen/arch/x86/x86_64/domain.c
@@ -12,11 +12,15 @@
 CHECK_vcpu_get_physid;
 #undef xen_vcpu_get_physid
 
-int
-arch_compat_vcpu_op(
-    int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
+int cf_check
+compat_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
-    int rc = -ENOSYS;
+    int rc;
+    struct domain *d = current->domain;
+    struct vcpu *v;
+
+    if ( (v = domain_vcpu(d, vcpuid)) == NULL )
+        return -ENOENT;
 
     switch ( cmd )
     {
@@ -55,7 +59,11 @@ arch_compat_vcpu_op(
     }
 
     case VCPUOP_get_physid:
-        rc = arch_do_vcpu_op(cmd, v, arg);
+        rc = do_vcpu_op(cmd, vcpuid, arg);
+        break;
+
+    default:
+        rc = compat_common_vcpu_op(cmd, v, arg);
         break;
     }
 
diff --git a/xen/common/compat/domain.c b/xen/common/compat/domain.c
index afae27eeba..1119534679 100644
--- a/xen/common/compat/domain.c
+++ b/xen/common/compat/domain.c
@@ -38,15 +38,12 @@ CHECK_vcpu_hvm_context;
 
 #endif
 
-int cf_check compat_vcpu_op(
-    int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
+int compat_common_vcpu_op(int cmd, struct vcpu *v,
+                          XEN_GUEST_HANDLE_PARAM(void) arg)
 {
-    struct domain *d = current->domain;
-    struct vcpu *v;
     int rc = 0;
-
-    if ( (v = domain_vcpu(d, vcpuid)) == NULL )
-        return -ENOENT;
+    struct domain *d = current->domain;
+    unsigned int vcpuid = v->vcpu_id;
 
     switch ( cmd )
     {
@@ -103,7 +100,7 @@ int cf_check compat_vcpu_op(
     case VCPUOP_stop_singleshot_timer:
     case VCPUOP_register_vcpu_info:
     case VCPUOP_send_nmi:
-        rc = do_vcpu_op(cmd, vcpuid, arg);
+        rc = common_vcpu_op(cmd, v, arg);
         break;
 
     case VCPUOP_get_runstate_info:
@@ -134,7 +131,7 @@ int cf_check compat_vcpu_op(
     }
 
     default:
-        rc = arch_compat_vcpu_op(cmd, v, arg);
+        rc = -ENOSYS;
         break;
     }
 
diff --git a/xen/common/domain.c b/xen/common/domain.c
index 351029f8b2..f9de1be43c 100644
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -1570,15 +1570,11 @@ int default_initialise_vcpu(struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
     return rc;
 }
 
-long cf_check do_vcpu_op(
-    int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
+long common_vcpu_op(int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
-    struct domain *d = current->domain;
-    struct vcpu *v;
     long rc = 0;
-
-    if ( (v = domain_vcpu(d, vcpuid)) == NULL )
-        return -ENOENT;
+    struct domain *d = current->domain;
+    unsigned int vcpuid = v->vcpu_id;
 
     switch ( cmd )
     {
@@ -1750,7 +1746,7 @@ long cf_check do_vcpu_op(
     }
 
     default:
-        rc = arch_do_vcpu_op(cmd, v, arg);
+        rc = -ENOSYS;
         break;
     }
 
diff --git a/xen/include/xen/hypercall.h b/xen/include/xen/hypercall.h
index a1b6575976..81aae7a662 100644
--- a/xen/include/xen/hypercall.h
+++ b/xen/include/xen/hypercall.h
@@ -110,7 +110,7 @@ do_vcpu_op(
 
 struct vcpu;
 extern long
-arch_do_vcpu_op(int cmd,
+common_vcpu_op(int cmd,
     struct vcpu *v,
     XEN_GUEST_HANDLE_PARAM(void) arg);
 
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 07:19:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 07:19:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292764.497147 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWCKM-00020D-SL; Mon, 21 Mar 2022 07:19:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292764.497147; Mon, 21 Mar 2022 07:19:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWCKM-000206-OQ; Mon, 21 Mar 2022 07:19:42 +0000
Received: by outflank-mailman (input) for mailman id 292764;
 Mon, 21 Mar 2022 07:19:41 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=8hCO=UA=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nWCKL-0001zx-M0
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 07:19:41 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 44dd6149-a8e7-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 08:19:40 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id A4AD7210E4;
 Mon, 21 Mar 2022 07:19:38 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 6D380139FF;
 Mon, 21 Mar 2022 07:19:38 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id hsA+GQonOGJCHAAAMHmgww
 (envelope-from <jgross@suse.com>); Mon, 21 Mar 2022 07:19:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 44dd6149-a8e7-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647847178; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=l4PMcKDvfkYHMlFhrt3HIe//FTWKPvfabPmb3lbkqy4=;
	b=aDkKg37a97TIzQnGLswtEw8Z0hqhhp2W2zH9OZNWNhZA4u/xk1fgH/8amrhu+wclc7PGLQ
	dnLcIMPezDd+rG/di3NI/8/oY3NwO3iAvK61X0bzc9G5eHfn7bLE0IoDMX5Sfmgzq8cam0
	pPGVskkFUYblruRiVPXH6k2V0qSmUGw=
Message-ID: <2a2eefb4-8071-107b-ba03-5e70f31a477f@suse.com>
Date: Mon, 21 Mar 2022 08:19:37 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH 1/3] tools/xenstore: add documentation for new
 set/get-feature commands
Content-Language: en-US
To: Julien Grall <julien@xen.org>, xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
References: <20220316161017.3579-1-jgross@suse.com>
 <20220316161017.3579-2-jgross@suse.com>
 <d44b8e44-4e7e-c395-da9c-916ec641a687@xen.org>
 <96c31b21-3f96-4f17-07d6-64c7186ce2dd@suse.com>
 <110ecc17-4d36-c5d1-675b-a4e072ea0ee0@xen.org>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <110ecc17-4d36-c5d1-675b-a4e072ea0ee0@xen.org>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------bgzMAhXfOnxKHGtIOyFEDOHK"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------bgzMAhXfOnxKHGtIOyFEDOHK
Content-Type: multipart/mixed; boundary="------------O8N6Ta4iiQTHJ0J80cVMFHos";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Julien Grall <julien@xen.org>, xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
Message-ID: <2a2eefb4-8071-107b-ba03-5e70f31a477f@suse.com>
Subject: Re: [PATCH 1/3] tools/xenstore: add documentation for new
 set/get-feature commands
References: <20220316161017.3579-1-jgross@suse.com>
 <20220316161017.3579-2-jgross@suse.com>
 <d44b8e44-4e7e-c395-da9c-916ec641a687@xen.org>
 <96c31b21-3f96-4f17-07d6-64c7186ce2dd@suse.com>
 <110ecc17-4d36-c5d1-675b-a4e072ea0ee0@xen.org>
In-Reply-To: <110ecc17-4d36-c5d1-675b-a4e072ea0ee0@xen.org>

--------------O8N6Ta4iiQTHJ0J80cVMFHos
Content-Type: multipart/mixed; boundary="------------osLV1oFDlD00QvkP0H9g09cb"

--------------osLV1oFDlD00QvkP0H9g09cb
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------osLV1oFDlD00QvkP0H9g09cb
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------osLV1oFDlD00QvkP0H9g09cb--

--------------O8N6Ta4iiQTHJ0J80cVMFHos--

--------------bgzMAhXfOnxKHGtIOyFEDOHK
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmI4JwkFAwAAAAAACgkQsN6d1ii/Ey+a
vgf+NsBl66//CZe/yi02T4vw6ZYn/bLdipZRw8VJ2K5v3mzd05Ixe9LIZ/bEy8CD3sS34lp3OF93
DaTp66LAseNcpU9wA1oxLxD5x4od5E1FWK2RaJe4lX8e3V/5sifkelOX4pKmI0sCNuuKjShn26Yk
Sr2YNTfabj1gxWbizXpXL7yYVqfb4HOe6MGJ15PyOxhEKhGYuK0vNBdAyR5X8yvdisA3AoRwtJE2
INwyyuMmnFzUtq6tezEmiABkU41sPehU3vsPDy1z2VgsOyRoagNtXYpG+k8yhRGuycgwO992Jw4z
gCSweO04uyHA+mb2X9z1jh8Y5DS3dqqQvcWHeswcSg==
=hgCZ
-----END PGP SIGNATURE-----

--------------bgzMAhXfOnxKHGtIOyFEDOHK--


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 07:53:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 07:53:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292767.497157 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWCrA-00066z-Cz; Mon, 21 Mar 2022 07:53:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292767.497157; Mon, 21 Mar 2022 07:53:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWCrA-00066s-9y; Mon, 21 Mar 2022 07:53:36 +0000
Received: by outflank-mailman (input) for mailman id 292767;
 Mon, 21 Mar 2022 07:53:34 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=8hCO=UA=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nWCr8-00066m-R8
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 07:53:34 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 019ca7b6-a8ec-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 08:53:33 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 242231F37F;
 Mon, 21 Mar 2022 07:53:33 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id E0BB313AD5;
 Mon, 21 Mar 2022 07:53:32 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id UHiSNfwuOGJOKwAAMHmgww
 (envelope-from <jgross@suse.com>); Mon, 21 Mar 2022 07:53:32 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 019ca7b6-a8ec-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647849213; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:  content-transfer-encoding:content-transfer-encoding;
	bh=hl2QIpxAUBr3xEmFUmxbY4ITkClOIKGVM/RNX9JH/2M=;
	b=eww3f7nAT+IpF08Pw7EWW+HAKGRuwrnGpVLKiNayDD/D3T4dVY8DUz+WzWyYS30nzg4rCg
	M5rDo1MpPAMRc4WT4aPJSPddM/8EtNiDeMIl7qEafw3YwUmffHRKRrKtaqFhi9rxvXpy2q
	yW+HG1dm1dm6k7oIjCK1O1j5Jz45r3o=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>
Subject: [PATCH] xen/x86/hvm: add missing cf_check for hvm_physdev_op()
Date: Mon, 21 Mar 2022 08:53:29 +0100
Message-Id: <20220321075329.3302-1-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

The hypercall handler hvm_physdev_op() is missing a cf_check attribute.

Fixes: cdbe2b0a1aec ("x86: Enable CET Indirect Branch Tracking")
Signed-off-by: Juergen Gross <jgross@suse.com>
---
 xen/arch/x86/hvm/hypercall.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/xen/arch/x86/hvm/hypercall.c b/xen/arch/x86/hvm/hypercall.c
index 030243810e..62b5349e7d 100644
--- a/xen/arch/x86/hvm/hypercall.c
+++ b/xen/arch/x86/hvm/hypercall.c
@@ -78,7 +78,7 @@ static long cf_check hvm_grant_table_op(
 }
 #endif
 
-static long hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+static long cf_check hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     const struct vcpu *curr = current;
     const struct domain *currd = curr->domain;
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 08:06:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 08:06:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292777.497169 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWD3B-0008BM-Pz; Mon, 21 Mar 2022 08:06:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292777.497169; Mon, 21 Mar 2022 08:06:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWD3B-0008BF-Mn; Mon, 21 Mar 2022 08:06:01 +0000
Received: by outflank-mailman (input) for mailman id 292777;
 Mon, 21 Mar 2022 08:06:01 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWD3B-0008B5-6o; Mon, 21 Mar 2022 08:06:01 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWD3B-0001vH-1R; Mon, 21 Mar 2022 08:06:01 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWD3A-0000nw-PI; Mon, 21 Mar 2022 08:06:00 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWD3A-0007HU-Ot; Mon, 21 Mar 2022 08:06:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Oyhj2aTCO3El/Dg+tEGTPrGqWctRfSS0DnfLfX850IU=; b=TihOyenGScv+oN3FMluES53kVW
	J3BO3JPRI7Zn0O/eB8zWyRce/X8NbA/a3vQ0WM7GlE8oPxAo52Ny2HUS4qi9nnPSOLG2rCBagETd7
	oBJ6C3bg3ZlYr+TmHuZgFIOa2JmB4lznI3LZcaUBFFkcYn92fMqGq234LePwX9synujI=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168740-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168740: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=af6f6091e02bb46633666ce30d4c6533a52688a5
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 21 Mar 2022 08:06:00 +0000

flight 168740 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168740/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              af6f6091e02bb46633666ce30d4c6533a52688a5
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  619 days
Failing since        151818  2020-07-11 04:18:52 Z  618 days  600 attempts
Testing same since   168699  2022-03-19 04:19:02 Z    2 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Haonan Wang <hnwanga1@gmail.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Martin Pitt <mpitt@debian.org>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 101708 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 08:21:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 08:21:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292789.497205 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWDIK-0002gF-QL; Mon, 21 Mar 2022 08:21:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292789.497205; Mon, 21 Mar 2022 08:21:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWDIK-0002g8-M7; Mon, 21 Mar 2022 08:21:40 +0000
Received: by outflank-mailman (input) for mailman id 292789;
 Mon, 21 Mar 2022 08:21:39 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=f0xq=UA=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nWDIJ-0002eF-AJ
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 08:21:39 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id ec946ea9-a8ef-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 09:21:36 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 9E917113E;
 Mon, 21 Mar 2022 01:21:35 -0700 (PDT)
Received: from e129167.arm.com (unknown [10.57.72.68])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 36B1C3F73B;
 Mon, 21 Mar 2022 01:21:34 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ec946ea9-a8ef-11ec-a405-831a346695d4
From: Michal Orzel <michal.orzel@arm.com>
To: xen-devel@lists.xenproject.org
Cc: Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>
Subject: [PATCH 2/3] xen/x86: Make use of helpers defined in xen_lds.h
Date: Mon, 21 Mar 2022 09:21:13 +0100
Message-Id: <20220321082114.49953-3-michal.orzel@arm.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <20220321082114.49953-1-michal.orzel@arm.com>
References: <20220321082114.49953-1-michal.orzel@arm.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Header file xen_lds.h defines common macros to be used in arch specific
linker scripts. Include this header and make use of its helpers.

Signed-off-by: Michal Orzel <michal.orzel@arm.com>
---
 xen/arch/x86/xen.lds.S | 86 ++++--------------------------------------
 1 file changed, 8 insertions(+), 78 deletions(-)

diff --git a/xen/arch/x86/xen.lds.S b/xen/arch/x86/xen.lds.S
index d33e295320..e82a148e08 100644
--- a/xen/arch/x86/xen.lds.S
+++ b/xen/arch/x86/xen.lds.S
@@ -2,6 +2,7 @@
 /* Modified for i386/x86-64 Xen by Keir Fraser */
 
 #include <xen/cache.h>
+#include <xen/xen_lds.h>
 #include <asm/page.h>
 #undef ENTRY
 #undef ALIGN
@@ -12,13 +13,6 @@
 #undef __XEN_VIRT_START
 #define __XEN_VIRT_START __image_base__
 #define DECL_SECTION(x) x :
-/*
- * Use the NOLOAD directive, despite currently ignored by (at least) GNU ld
- * for PE output, in order to record that we'd prefer these sections to not
- * be loaded into memory.
- */
-#define DECL_DEBUG(x, a) #x ALIGN(a) (NOLOAD) : { *(x) }
-#define DECL_DEBUG2(x, y, a) #x ALIGN(a) (NOLOAD) : { *(x) *(y) }
 
 ENTRY(efi_start)
 
@@ -26,8 +20,6 @@ ENTRY(efi_start)
 
 #define FORMAT "elf64-x86-64"
 #define DECL_SECTION(x) #x : AT(ADDR(#x) - __XEN_VIRT_START)
-#define DECL_DEBUG(x, a) #x 0 : { *(x) }
-#define DECL_DEBUG2(x, y, a) #x 0 : { *(x) *(y) }
 
 ENTRY(start_pa)
 
@@ -159,10 +151,7 @@ SECTIONS
        __note_gnu_build_id_end = .;
 #endif
 #ifdef CONFIG_HAS_VPCI
-       . = ALIGN(POINTER_ALIGN);
-       __start_vpci_array = .;
-       *(SORT(.data.vpci.*))
-       __end_vpci_array = .;
+       VPCI_SECTION
 #endif
   } PHDR(text)
 
@@ -278,19 +267,10 @@ SECTIONS
         __alt_instructions_end = .;
 
 #ifdef CONFIG_DEBUG_LOCK_PROFILE
-       . = ALIGN(POINTER_ALIGN);
-       __lock_profile_start = .;
-       *(.lockprofile.data)
-       __lock_profile_end = .;
+       LOCK_PROFILE_SECTION
 #endif
 
-       . = ALIGN(8);
-       __ctors_start = .;
-       *(SORT_BY_INIT_PRIORITY(.init_array.*))
-       *(SORT_BY_INIT_PRIORITY(.ctors.*))
-       *(.init_array)
-       *(.ctors)
-       __ctors_end = .;
+       CTORS_SECTION
   } PHDR(text)
 
 #ifndef EFI
@@ -335,10 +315,7 @@ SECTIONS
        __end_schedulers_array = .;
 
 #ifdef CONFIG_HYPFS
-       . = ALIGN(8);
-       __paramhypfs_start = .;
-       *(.data.paramhypfs)
-       __paramhypfs_end = .;
+       HYPFS_SECTION
 #endif
   } PHDR(text)
 
@@ -395,24 +372,7 @@ SECTIONS
    * _end here, so if these sections get loaded they'll be discarded at runtime
    * anyway.
    */
-  DECL_DEBUG(.debug_abbrev, 1)
-  DECL_DEBUG2(.debug_info, .gnu.linkonce.wi.*, 1)
-  DECL_DEBUG(.debug_types, 1)
-  DECL_DEBUG(.debug_str, 1)
-  DECL_DEBUG2(.debug_line, .debug_line.*, 1)
-  DECL_DEBUG(.debug_line_str, 1)
-  DECL_DEBUG(.debug_names, 4)
-  DECL_DEBUG(.debug_frame, 4)
-  DECL_DEBUG(.debug_loc, 1)
-  DECL_DEBUG(.debug_loclists, 4)
-  DECL_DEBUG(.debug_macinfo, 1)
-  DECL_DEBUG(.debug_macro, 1)
-  DECL_DEBUG(.debug_ranges, 8)
-  DECL_DEBUG(.debug_rnglists, 4)
-  DECL_DEBUG(.debug_addr, 8)
-  DECL_DEBUG(.debug_aranges, 1)
-  DECL_DEBUG(.debug_pubnames, 1)
-  DECL_DEBUG(.debug_pubtypes, 1)
+  DWARF_DEBUG_SECTIONS
 
 #ifdef EFI
   /* Trick the linker into setting the image size to no less than 16Mb. */
@@ -427,41 +387,11 @@ SECTIONS
 #endif
 
   /* Sections to be discarded */
-  /DISCARD/ : {
-       *(.text.exit)
-       *(.exit.text)
-       *(.exit.data)
-       *(.exitcall.exit)
-       *(.discard)
-       *(.discard.*)
-       *(.eh_frame)
-       *(.dtors)
-       *(.dtors.*)
-       *(.fini_array)
-       *(.fini_array.*)
-#ifdef EFI
-       *(.comment)
-       *(.comment.*)
-       *(.note.*)
-#endif
-  }
+  DISCARD_SECTIONS
 
 #ifndef EFI
   /* Stabs debugging sections.  */
-  .stab 0 : { *(.stab) }
-  .stabstr 0 : { *(.stabstr) }
-  .stab.excl 0 : { *(.stab.excl) }
-  .stab.exclstr 0 : { *(.stab.exclstr) }
-  .stab.index 0 : { *(.stab.index) }
-  .stab.indexstr 0 : { *(.stab.indexstr) }
-  .comment 0 : { *(.comment) }
-  /*
-   * LLVM ld also wants .symtab, .strtab, and .shstrtab placed. These look to
-   * be benign to GNU ld, so we can have them here unconditionally.
-   */
-  .symtab 0 : { *(.symtab) }
-  .strtab 0 : { *(.strtab) }
-  .shstrtab 0 : { *(.shstrtab) }
+  STABS_DEBUG_SECTIONS
 #endif
 }
 
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 08:21:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 08:21:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292788.497188 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWDIH-0002Cr-Ka; Mon, 21 Mar 2022 08:21:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292788.497188; Mon, 21 Mar 2022 08:21:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWDIH-0002CQ-Ev; Mon, 21 Mar 2022 08:21:37 +0000
Received: by outflank-mailman (input) for mailman id 292788;
 Mon, 21 Mar 2022 08:21:36 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=f0xq=UA=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nWDIG-0002AF-Ja
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 08:21:36 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTP
 id eb7c7ba3-a8ef-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 09:21:34 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id C467C106F;
 Mon, 21 Mar 2022 01:21:33 -0700 (PDT)
Received: from e129167.arm.com (unknown [10.57.72.68])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id ED7A63F73B;
 Mon, 21 Mar 2022 01:21:31 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: eb7c7ba3-a8ef-11ec-8fbc-03012f2f19d4
From: Michal Orzel <michal.orzel@arm.com>
To: xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>
Subject: [PATCH 1/3] xen: Introduce a header to store common linker scripts content
Date: Mon, 21 Mar 2022 09:21:12 +0100
Message-Id: <20220321082114.49953-2-michal.orzel@arm.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <20220321082114.49953-1-michal.orzel@arm.com>
References: <20220321082114.49953-1-michal.orzel@arm.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Both x86 and arm linker scripts share quite a lot of common content.
It is difficult to keep syncing them up, thus introduce a new header
in include/xen called xen_lds.h to store the internals mutual to all
the linker scripts.

Populate xen_lds.h with the first portion of the common sections.
Some of them are not yet added/completed in arm linker script but they
definitely should be. Please note that this patch does not aim to
perform the full sync up between the linker scripts. It creates a base
for further work.

Signed-off-by: Michal Orzel <michal.orzel@arm.com>
---
 xen/include/xen/xen_lds.h | 114 ++++++++++++++++++++++++++++++++++++++
 1 file changed, 114 insertions(+)
 create mode 100644 xen/include/xen/xen_lds.h

diff --git a/xen/include/xen/xen_lds.h b/xen/include/xen/xen_lds.h
new file mode 100644
index 0000000000..f1ca67ecfd
--- /dev/null
+++ b/xen/include/xen/xen_lds.h
@@ -0,0 +1,114 @@
+#ifndef __XEN_LDS_H__
+#define __XEN_LDS_H__
+
+/*
+ * Common macros to be used in architecture specific linker scripts.
+ */
+
+/* Macros to declare debug sections. */
+#ifdef EFI
+/*
+ * Use the NOLOAD directive, despite currently ignored by (at least) GNU ld
+ * for PE output, in order to record that we'd prefer these sections to not
+ * be loaded into memory.
+ */
+#define DECL_DEBUG(x, a) #x ALIGN(a) (NOLOAD) : { *(x) }
+#define DECL_DEBUG2(x, y, a) #x ALIGN(a) (NOLOAD) : { *(x) *(y) }
+#else
+#define DECL_DEBUG(x, a) #x 0 : { *(x) }
+#define DECL_DEBUG2(x, y, a) #x 0 : { *(x) *(y) }
+#endif
+
+/* DWARF debug sections. */
+#define DWARF_DEBUG_SECTIONS                      \
+  DECL_DEBUG(.debug_abbrev, 1)                    \
+  DECL_DEBUG2(.debug_info, .gnu.linkonce.wi.*, 1) \
+  DECL_DEBUG(.debug_types, 1)                     \
+  DECL_DEBUG(.debug_str, 1)                       \
+  DECL_DEBUG2(.debug_line, .debug_line.*, 1)      \
+  DECL_DEBUG(.debug_line_str, 1)                  \
+  DECL_DEBUG(.debug_names, 4)                     \
+  DECL_DEBUG(.debug_frame, 4)                     \
+  DECL_DEBUG(.debug_loc, 1)                       \
+  DECL_DEBUG(.debug_loclists, 4)                  \
+  DECL_DEBUG(.debug_macinfo, 1)                   \
+  DECL_DEBUG(.debug_macro, 1)                     \
+  DECL_DEBUG(.debug_ranges, 8)                    \
+  DECL_DEBUG(.debug_rnglists, 4)                  \
+  DECL_DEBUG(.debug_addr, 8)                      \
+  DECL_DEBUG(.debug_aranges, 1)                   \
+  DECL_DEBUG(.debug_pubnames, 1)                  \
+  DECL_DEBUG(.debug_pubtypes, 1)
+
+/*
+ * Stabs debug sections.
+ *
+ * LLVM ld also wants .symtab, .strtab, and .shstrtab placed. These look to
+ * be benign to GNU ld, so we can have them here unconditionally.
+ */
+#define STABS_DEBUG_SECTIONS                 \
+  .stab 0 : { *(.stab) }                     \
+  .stabstr 0 : { *(.stabstr) }               \
+  .stab.excl 0 : { *(.stab.excl) }           \
+  .stab.exclstr 0 : { *(.stab.exclstr) }     \
+  .stab.index 0 : { *(.stab.index) }         \
+  .stab.indexstr 0 : { *(.stab.indexstr) }   \
+  .comment 0 : { *(.comment) }               \
+  .symtab 0 : { *(.symtab) }                 \
+  .strtab 0 : { *(.strtab) }                 \
+  .shstrtab 0 : { *(.shstrtab) }
+
+#ifdef EFI
+#define DISCARD_EFI_SECTIONS \
+       *(.comment)   \
+       *(.comment.*) \
+       *(.note.*)
+#else
+#define DISCARD_EFI_SECTIONS
+#endif
+
+/* Sections to be discarded. */
+#define DISCARD_SECTIONS     \
+  /DISCARD/ : {              \
+       *(.text.exit)         \
+       *(.exit.text)         \
+       *(.exit.data)         \
+       *(.exitcall.exit)     \
+       *(.discard)           \
+       *(.discard.*)         \
+       *(.eh_frame)          \
+       *(.dtors)             \
+       *(.dtors.*)           \
+       *(.fini_array)        \
+       *(.fini_array.*)      \
+       DISCARD_EFI_SECTIONS  \
+  }
+
+#define CTORS_SECTION                           \
+       . = ALIGN(8);                            \
+       __ctors_start = .;                       \
+       *(SORT_BY_INIT_PRIORITY(.init_array.*))  \
+       *(SORT_BY_INIT_PRIORITY(.ctors.*))       \
+       *(.init_array)                           \
+       *(.ctors)                                \
+       __ctors_end = .;
+
+#define VPCI_SECTION             \
+       . = ALIGN(POINTER_ALIGN); \
+       __start_vpci_array = .;   \
+       *(SORT(.data.vpci.*))     \
+       __end_vpci_array = .;
+
+#define HYPFS_SECTION            \
+       . = ALIGN(8);             \
+       __paramhypfs_start = .;   \
+       *(.data.paramhypfs)       \
+       __paramhypfs_end = .;
+
+#define LOCK_PROFILE_SECTION     \
+       . = ALIGN(POINTER_ALIGN); \
+       __lock_profile_start = .; \
+       *(.lockprofile.data)      \
+       __lock_profile_end = .;
+
+#endif /* __XEN_LDS_H__ */
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 08:21:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 08:21:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292790.497210 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWDIL-0002iM-5g; Mon, 21 Mar 2022 08:21:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292790.497210; Mon, 21 Mar 2022 08:21:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWDIK-0002i7-Uh; Mon, 21 Mar 2022 08:21:40 +0000
Received: by outflank-mailman (input) for mailman id 292790;
 Mon, 21 Mar 2022 08:21:39 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=f0xq=UA=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nWDIJ-0002eF-Rq
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 08:21:39 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id edb003f3-a8ef-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 09:21:38 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id A92391424;
 Mon, 21 Mar 2022 01:21:37 -0700 (PDT)
Received: from e129167.arm.com (unknown [10.57.72.68])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 05BDC3F73B;
 Mon, 21 Mar 2022 01:21:35 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: edb003f3-a8ef-11ec-a405-831a346695d4
From: Michal Orzel <michal.orzel@arm.com>
To: xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH 3/3] xen/arm: Make use of helpers defined in xen_lds.h
Date: Mon, 21 Mar 2022 09:21:14 +0100
Message-Id: <20220321082114.49953-4-michal.orzel@arm.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <20220321082114.49953-1-michal.orzel@arm.com>
References: <20220321082114.49953-1-michal.orzel@arm.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Header file xen_lds.h defines common macros to be used in arch specific
linker scripts. Include this header and make use of its helpers.

Making use of common helpers defined based on x86 linker script
improves arm linker script with:
-explicit list of debug sections that otherwise are seen as "orphans"
by the linker. This will allow to fix issues after enabling linker
option --orphan-handling one day
-re-arrangement of ordering/sorting in constructors section to match the
default linker script
-extended list of discarded section to include: .discard, desctructors
related sections, .fini_array which can reference .text.exit
-extended list of stabs section to include sections placed by ld.lld.
Even though Xen on arm compilation with LLVM support is not ready yet,
these sections do not cause problem to GNU ld

Signed-off-by: Michal Orzel <michal.orzel@arm.com>
---
 xen/arch/arm/xen.lds.S | 37 ++++++++++++-------------------------
 1 file changed, 12 insertions(+), 25 deletions(-)

diff --git a/xen/arch/arm/xen.lds.S b/xen/arch/arm/xen.lds.S
index 7921d8fa28..9e1832e94c 100644
--- a/xen/arch/arm/xen.lds.S
+++ b/xen/arch/arm/xen.lds.S
@@ -3,6 +3,7 @@
 /* Modified for ARM Xen by Ian Campbell */
 
 #include <xen/cache.h>
+#include <xen/xen_lds.h>
 #include <asm/page.h>
 #undef ENTRY
 #undef ALIGN
@@ -68,10 +69,7 @@ SECTIONS
        __proc_info_end = .;
 
 #ifdef CONFIG_HAS_VPCI
-       . = ALIGN(POINTER_ALIGN);
-       __start_vpci_array = .;
-       *(SORT(.data.vpci.*))
-       __end_vpci_array = .;
+       VPCI_SECTION
 #endif
   } :text
 
@@ -109,10 +107,7 @@ SECTIONS
        __end_schedulers_array = .;
 
 #ifdef CONFIG_HYPFS
-       . = ALIGN(8);
-       __paramhypfs_start = .;
-       *(.data.paramhypfs)
-       __paramhypfs_end = .;
+       HYPFS_SECTION
 #endif
 
        *(.data .data.*)
@@ -178,10 +173,7 @@ SECTIONS
        __alt_instructions_end = .;
 
 #ifdef CONFIG_DEBUG_LOCK_PROFILE
-       . = ALIGN(POINTER_ALIGN);
-       __lock_profile_start = .;
-       *(.lockprofile.data)
-       __lock_profile_end = .;
+       LOCK_PROFILE_SECTION
 #endif
 
        *(.init.data)
@@ -221,22 +213,17 @@ SECTIONS
   /* Section for the device tree blob (if any). */
   .dtb : { *(.dtb) } :text
 
+  /*
+   * Explicitly list debug sections, to avoid these sections being viewed as
+   * "orphan" by the linker.
+   */
+  DWARF_DEBUG_SECTIONS
+
   /* Sections to be discarded */
-  /DISCARD/ : {
-       *(.exit.text)
-       *(.exit.data)
-       *(.exitcall.exit)
-       *(.eh_frame)
-  }
+  DISCARD_SECTIONS
 
   /* Stabs debugging sections.  */
-  .stab 0 : { *(.stab) }
-  .stabstr 0 : { *(.stabstr) }
-  .stab.excl 0 : { *(.stab.excl) }
-  .stab.exclstr 0 : { *(.stab.exclstr) }
-  .stab.index 0 : { *(.stab.index) }
-  .stab.indexstr 0 : { *(.stab.indexstr) }
-  .comment 0 : { *(.comment) }
+  STABS_DEBUG_SECTIONS
 }
 
 /*
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 08:21:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 08:21:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292787.497182 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWDIH-0002AX-AO; Mon, 21 Mar 2022 08:21:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292787.497182; Mon, 21 Mar 2022 08:21:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWDIH-0002AQ-7X; Mon, 21 Mar 2022 08:21:37 +0000
Received: by outflank-mailman (input) for mailman id 292787;
 Mon, 21 Mar 2022 08:21:36 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=f0xq=UA=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nWDIG-0002AF-5g
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 08:21:36 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTP
 id ea1ffe70-a8ef-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 09:21:32 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 8803C1042;
 Mon, 21 Mar 2022 01:21:31 -0700 (PDT)
Received: from e129167.arm.com (unknown [10.57.72.68])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 1ACA03F73B;
 Mon, 21 Mar 2022 01:21:28 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ea1ffe70-a8ef-11ec-8fbc-03012f2f19d4
From: Michal Orzel <michal.orzel@arm.com>
To: xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH 0/3] xen: Linker scripts synchronization
Date: Mon, 21 Mar 2022 09:21:11 +0100
Message-Id: <20220321082114.49953-1-michal.orzel@arm.com>
X-Mailer: git-send-email 2.25.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

This patch series aims to do the first step towards linker scripts
synchronization. Linker scripts for arm and x86 share a lot of common
sections and in order to make the process of changing/improving/syncing
them, these sections shall be defined in just one place.

The first patch creates a header file to store the first portion of the
content mutual to both x86 and arm linker scripts. When populating this
file, we are taking an example from x86 script as it is more improved and
up-to-date.

The last two patches make use of the common macros in x86 and arm linker
scripts respectively.

Michal Orzel (3):
  xen: Introduce a header to store common linker scripts content
  x86: Make use of helpers defined in xen_lds.h
  xen/arm: Make use of helpers defined in xen_lds.h

 xen/arch/arm/xen.lds.S    |  37 ++++---------
 xen/arch/x86/xen.lds.S    |  86 +++-------------------------
 xen/include/xen/xen_lds.h | 114 ++++++++++++++++++++++++++++++++++++++
 3 files changed, 134 insertions(+), 103 deletions(-)
 create mode 100644 xen/include/xen/xen_lds.h

-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 08:45:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 08:45:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292803.497232 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWDfM-0006K9-7H; Mon, 21 Mar 2022 08:45:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292803.497232; Mon, 21 Mar 2022 08:45:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWDfM-0006K2-42; Mon, 21 Mar 2022 08:45:28 +0000
Received: by outflank-mailman (input) for mailman id 292803;
 Mon, 21 Mar 2022 08:45:27 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWDfL-0006Js-CU; Mon, 21 Mar 2022 08:45:27 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWDfL-0002cV-BA; Mon, 21 Mar 2022 08:45:27 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWDfL-0002X5-1g; Mon, 21 Mar 2022 08:45:27 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWDfL-0008LD-1H; Mon, 21 Mar 2022 08:45:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=v1x3pMOY+jVt8Zop64AomZAnbO4DAtHcNJiYewcG4x8=; b=bvBfpyVD+1Njq/33eJSrzfAyQ4
	eyp2gj9J40KZhOmMzqcfjLaCi9y7NXs2Zspi2644rOfQ5teRjQ3WI9SmXaARZc40OUh9O1Pe4iJ+2
	AY8vgSL23fwkYi8dMlHUC47m7ukSO6zzd6GeCc1yA//SkFiISBoRaxCJ13TOmKjn7UMM=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168741-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168741: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 21 Mar 2022 08:45:27 +0000

flight 168741 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168741/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   20 days
Failing since        168258  2022-03-01 01:55:31 Z   20 days  204 attempts
Testing same since   168738  2022-03-21 02:39:18 Z    0 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 859 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 08:48:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 08:48:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292810.497243 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWDi0-0006yY-NN; Mon, 21 Mar 2022 08:48:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292810.497243; Mon, 21 Mar 2022 08:48:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWDi0-0006yR-Jy; Mon, 21 Mar 2022 08:48:12 +0000
Received: by outflank-mailman (input) for mailman id 292810;
 Mon, 21 Mar 2022 08:48:11 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=svEr=UA=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nWDhz-0006yK-JV
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 08:48:11 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a2b89d96-a8f3-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 09:48:10 +0100 (CET)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2056.outbound.protection.outlook.com [104.47.14.56]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-27-FXOgr9BvNBmGZphQ7gVVFw-1; Mon, 21 Mar 2022 09:48:08 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM0PR0402MB3362.eurprd04.prod.outlook.com (2603:10a6:208:26::31)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.22; Mon, 21 Mar
 2022 08:48:06 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a%6]) with mapi id 15.20.5081.022; Mon, 21 Mar 2022
 08:48:06 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a2b89d96-a8f3-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647852490;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=NiG1GcGYfMsd7mWxX9j1ZoaOXKnuTxprSE38Z1XhgRk=;
	b=hC1FYDFzbUGTftyVp1SpPHIOFPfKyAHHiT1Ji4gB5R9sTvtbndBVaoo5x/UrftTWrWvwts
	dE4d/w5FV5YvtdmSjBVa7A8VubJ2Cy5+kKvIZNhReI3znrWwonaRZUl4fwbeq81j2UI35X
	TRRHavFnN/89ojpQI37q+5Npzmo6BRk=
X-MC-Unique: FXOgr9BvNBmGZphQ7gVVFw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=MZT47uXf5gdX6VJnn6J7jsCqMBSVZghQvyyYmjnbxQwEIPD4IVHEFqRhIpcIyU3u0AAdv/XCUCaEBY5p6QSan167Qc8iXSgVeUBAf0JrJfwpXYgxfBCkyKMSMNt7DuAoikZQHi9XxWM3cI7o8GwYvblay90EKIai4/YBzo9gMH7pSX1FKaDzQrz5EC+tTev7JFw3s4s9sQETwgwGQq+zCDNIyKOot7+veXg5jlOeUqNbgN3rzBc4PixoSQ7j8Vp4H3ZMifFIp2rubzZlXWaToBZnEH1QAkLlhuRpuxiuIfY/H3pkS+s1HDZ2OMIxk3M6RaHR52YKNuQjzWZjAvRgiw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=NiG1GcGYfMsd7mWxX9j1ZoaOXKnuTxprSE38Z1XhgRk=;
 b=fMn3xhlRh9j40FwrBBGC982W0kUrPeZ4fDMyeTAiC3rX3Bople8e88nMUipUOK0OCYJhGnlx9XFpyB12OCH6fDopqXwSBqMDUjx88q9QZEmzdBaH2hdw1b3w2byJ/VgH4Yfwy82/6Y7uB+flXg+7R63zblaLkzTZQo+BW3CpBT+LZEZydV6AmPK1TvBCWjjr/WfGuirArUGc7y5NBJvWIRDmdh3mVe4tDBFkvB8yISwj5oJJx710lwN9pN0hBMU3yl2+Hu0yKLFozHMfhdJjE4fWrwqv1V1PpYvcgdX520Ekvso0l3dzdzilmJ5wUnhdJ8rW3Eit2htmrV8wzUivJA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <30a6ef6f-d37c-b66c-d5af-be2208766057@suse.com>
Date: Mon, 21 Mar 2022 09:48:04 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v1 02/13] xen/arm: introduce a special domain DOMID_SHARED
Content-Language: en-US
To: Stefano Stabellini <sstabellini@kernel.org>
Cc: Penny Zheng <Penny.Zheng@arm.com>, nd@arm.com,
 Penny Zheng <penzhe01@a011292.shanghai.arm.com>,
 Julien Grall <julien@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220311061123.1883189-1-Penny.Zheng@arm.com>
 <20220311061123.1883189-3-Penny.Zheng@arm.com>
 <eefa9cf2-a04c-ba8d-74cb-0d2aaa35badb@suse.com>
 <alpine.DEB.2.22.394.2203181443440.2910984@ubuntu-linux-20-04-desktop>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <alpine.DEB.2.22.394.2203181443440.2910984@ubuntu-linux-20-04-desktop>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR06CA0325.eurprd06.prod.outlook.com
 (2603:10a6:20b:45b::14) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: b796a58d-7a59-4517-7f12-08da0b1784c8
X-MS-TrafficTypeDiagnostic: AM0PR0402MB3362:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR0402MB336239B7E93EBB73A4283C17B3169@AM0PR0402MB3362.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66476007)(66556008)(8676002)(66946007)(4326008)(2906002)(38100700002)(36756003)(53546011)(31686004)(83380400001)(6512007)(508600001)(6506007)(6486002)(186003)(6916009)(54906003)(5660300002)(7416002)(26005)(316002)(86362001)(31696002)(2616005)(8936002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?eCtxMXd5WC82ZytEa0J2RzB4aTFVOW9xaFozR09EQ2JVVmxLQmZRV0tJSnNx?=
 =?utf-8?B?Qys5cHArakhEREhFb0gzSTd5SHFvYnZLUnc2Vm1XZFlYSGtDQWc0WkJnb2V1?=
 =?utf-8?B?SUxqYmRJZ0xTWjNVa0dZZC93UzNENUFOanRUQ2V5d0JkcGd5Zng3N0J3d1Zx?=
 =?utf-8?B?YkVYRHR2ZDZOQXV2aExUYlNEaENOazJYN09MclpKbGlkVHo5ZW1sZjRHTmgy?=
 =?utf-8?B?VXh1bzRsYjd2b1YxTWZIWkhpZndwRnB3L3FQa091Mi81SGJhZTVXMFFqVG10?=
 =?utf-8?B?alp4OHkzZ1JNZzFoRlo0ZHhOMWZlQ3JwSCtwY2x3L3NJRjB3YUkrNUYzRUdl?=
 =?utf-8?B?ZmloUWM4RmZwcUNIbmVkTkVCMDRmRHpDMEFTbStVY0JnQ1RzenVZejBIdnZm?=
 =?utf-8?B?RjYwdWpvVm5JeE51cXB3SmV5MHhnL0orekF5ajhlVktibGFGakFtZlFpVTZq?=
 =?utf-8?B?UmdwYVZHWFMxUDY0WWgxUFVnOWtRdlVBc2hKYVo1aHpxQTV0VUpjYjFXU3JM?=
 =?utf-8?B?dWd5b0dKZFlrTmpEdVdoejVoSnRsQS9uY2RnZTJLOEtKMVhPOGlMZ2tLS3Z6?=
 =?utf-8?B?TStoMmJ2RjB6bWNDalhkSUpYeGVNNHp1S3pNMUt5aW4vVVZsSldOcFZIaHpl?=
 =?utf-8?B?b3ZkKzUwZXNvbFpDVmNHQVFCTUJVS0RzWWtBZGs2bU1zNG9BUUFmNGhKT0o4?=
 =?utf-8?B?bWk5ZGtMaGhjZDRVUFpKQTdnV243dGR5ZzJCZ0RmU2tvZWMrVE1MYmJWQXl5?=
 =?utf-8?B?aHFvZWtzYXArMnNieE8wY0hCQmEzcXV4MDBKVmNVYU14QlQ1bnh0ODVZaUN3?=
 =?utf-8?B?MTZPZVBQdEtVMzN5UnFpaXlOc1RDSmh3TXdOYXBoUXJwTmZFOWZzV0d1L1NS?=
 =?utf-8?B?eXhoenhOMFlBWFg0Q3JjOS9rb3ltT0FTUzdRaSsxRTdTWTBXZXJVRTNNamtO?=
 =?utf-8?B?dmd0aFRYM1g2OWFEM1FrbUxGbWFseDlLbldCQjBwaUlWNXlJTmVCN043NEIr?=
 =?utf-8?B?NGpHbFFwNi9LWTZjaEx5WHB2Z1h1dm5KU3FBOUJOS3UxSWVVb2NLS3hVc0VB?=
 =?utf-8?B?TWlZQ1FxNnRCSWhiK2ZrNnlMQUZHUHNUSDNYWnlZSnpFNzZvcDRuU2ttUjBx?=
 =?utf-8?B?UmV4WlNicmFtZXdDM0FmbHF3d01Ld0FzVVhnUzBUbXJnVVZ3TmRwV0tSS2Rr?=
 =?utf-8?B?OUgxdXhmbDFMZFZZa21XRUNCQkVkWGJFMDh0NWhFcEVqTTh6bko2SCtNNHJR?=
 =?utf-8?B?VjZObld6VUJxNHBoYUNadU9ybFZjSkNBYWZDUTV6R2o5cWtRbHBVbzB0RXlp?=
 =?utf-8?B?KzZNZWdVVjdVSmFSTVEzM2lJei9ldm9Kcm5HeEZWMUxUeVJFQzdCanoyd05F?=
 =?utf-8?B?NzJ2eHBydSs5QUlRTlNvTnVGYnk1WHlCVmp5UTdUTXBBR3cvYUFiVmdwTVNG?=
 =?utf-8?B?c2ZjYitLSFNQS2oxNTVZelRrd0E0MDV1SW1rWUVQSDM5dHZrS1BLa3l3dTJ1?=
 =?utf-8?B?d0ZhUHg3MWhUbkJJQXVrRnlEeVdiVEV3VmFoU0xqYzBwbEhMZWR3RC9FK1py?=
 =?utf-8?B?ZDdpcG5uVmtHMVUxZ2NMdkJ6MFMrMDlTOGpzalZGbGZPWGZmSnZTUFFGeDFF?=
 =?utf-8?B?NzJaUzA2ZDlpa1R1S1Q5bG93WFlkYTNZU2JVWnI5RW94Yy9OQ3lXUUdjbzNG?=
 =?utf-8?B?NEM5UzhnTGRCUHlLWEppR1U0Um1RNXBXYU4yV2JSNVhhSnlFRFZYMERoTyt6?=
 =?utf-8?B?aEdJRHh6eEtjamxrSUw0ckpPUi9zNXo3QlF4WDFrbHAvekFnK3hYUzArRDNr?=
 =?utf-8?B?TTlPcldzc2h4eWNsQ0pQV25KWGdLQ2ZseGV1djRYNW96aUlrYUdKbzBnZWxV?=
 =?utf-8?B?eVRrN24wVnlBRjYwQnBHVUtXTldueHRvYlYrc2ZEUzgvQjRaMkdWWHZSTlZt?=
 =?utf-8?Q?2p5Fb1Ay4SIKQYfXhvCjKw+rO83Luo1x?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b796a58d-7a59-4517-7f12-08da0b1784c8
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 08:48:06.8246
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: ck8etY0+X+M4aH84G8vMqwruRplU4xtiHtzQ6+wi236kmA6hrbi+fm0gzQ2rkQWJsnh+LLVG4x9sHewqF3hYmQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR0402MB3362

On 18.03.2022 22:50, Stefano Stabellini wrote:
> On Fri, 18 Mar 2022, Jan Beulich wrote:
>> On 11.03.2022 07:11, Penny Zheng wrote:
>>> In case to own statically shared pages when owner domain is not
>>> explicitly defined, this commits propose a special domain DOMID_SHARED,
>>> and we assign it 0x7FF5, as one of the system domains.
>>>
>>> Statically shared memory reuses the same way of initialization with static
>>> memory, hence this commits proposes a new Kconfig CONFIG_STATIC_SHM to wrap
>>> related codes, and this option depends on static memory(CONFIG_STATIC_MEMORY).
>>>
>>> We intends to do shared domain creation after setup_virt_paging so shared
>>> domain could successfully do p2m initialization.
>>
>> There's nothing said here, in the earlier patch, or in the cover letter
>> about the security aspects of this. There is a reason we haven't been
>> allowing arbitrary, un-supervised sharing of memory between domains. It
>> wants clarifying why e.g. grants aren't an option to achieve what you
>> need, and how you mean to establish which domains are / aren't permitted
>> to access any individual page owned by this domain.
> 
> 
> I'll let Penny write a full reply but I'll chime in to try to help with
> the explanation.
> 
> This is not arbitrary un-supervised sharing of memory between domains,
> which indeed is concerning.
> 
> This is statically-configured, supervised by the system configurator,
> sharing of memory between domains.
> 
> And in fact safety (which is just a different aspect of security) is one
> of the primary goals for this work.
> 
> In safety-critical environments, it is not considered safe to
> dynamically change important configurations at runtime. Everything
> should be statically defined and statically verified.
> 
> In this case, if the system configuration knows a priori that there are
> only 2 VM and they need to communication over shared memory, it is safer
> to pre-configure the shared memory at build time rather than let the VMs
> attempt to share memory at runtime. It is faster too.
> 
> The only way to trigger this static shared memory configuration should
> be via device tree, which is at the same level as the XSM rules
> themselves.
> 
> Hopefully I made things clearer and not murkier :-)

It adds some helpful background, yes, but at the same time it doesn't
address the security concern at all: How are access permissions
managed when the owning domain is a special one? I haven't spotted
any recording of the domains which are actually permitted to map /
access the pages in questions. (But of course I also only looked at
non-Arm-specific code. I'd expect such code not to live in arch-
specific files.)

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 08:52:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 08:52:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292814.497255 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWDmT-0008QV-Dr; Mon, 21 Mar 2022 08:52:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292814.497255; Mon, 21 Mar 2022 08:52:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWDmT-0008QO-A2; Mon, 21 Mar 2022 08:52:49 +0000
Received: by outflank-mailman (input) for mailman id 292814;
 Mon, 21 Mar 2022 08:52:48 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=svEr=UA=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nWDmS-0008QI-1c
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 08:52:48 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 47a5a925-a8f4-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 09:52:47 +0100 (CET)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04lp2053.outbound.protection.outlook.com [104.47.13.53]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-23-FqEajKA_OwaGmpaDG1iVnA-1; Mon, 21 Mar 2022 09:52:45 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM7PR04MB7045.eurprd04.prod.outlook.com (2603:10a6:20b:11e::7)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.22; Mon, 21 Mar
 2022 08:52:44 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a%6]) with mapi id 15.20.5081.022; Mon, 21 Mar 2022
 08:52:44 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 47a5a925-a8f4-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647852766;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=a6PS7wTlj5dGdjfnn7tkCu/Kzv4CSM0U2LzCGBehyNc=;
	b=GoChmxPaj30fD/84gekshLOnf/BYIsKYA5cdMvbYORQUfipYeMVV5UefUgo6ImcdBxKiPs
	T6zPmt/J3/b836pVt7i3n1GCBzbXcyp9GDr2vmgRF+x5SaUn0s5CHZmvoTLWGVwXR4ksfs
	6BIGq9LNrCKhwiOwvmfJmhcsAT357Us=
X-MC-Unique: FqEajKA_OwaGmpaDG1iVnA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=WfzXsgDfP152f1576zv8GOwEQtIBJSSPgIpkCmTVY3vxuMl1dE+MtEo35aZJkULB4YdgQLdDRqOgO+zeYZ954gRGtU7zjxqQ1iPXHa/Ufm1MrBsAerdk/CZ1n+noS19FT0wLSUVLmzY4qFQkKrctyvyVvsox8V6HwX4711RkATr6ic4a07MBPP2Qwxz7ZndO8yregfkZbxKKJBudaKe2KxMpRyvNptNyXViQ5ktOiJSHrP4swj00fIKX6TEbXIVkvWqTVoKgBMPv55yu+feE49/F6yxRNbjBv4giEfvvGjXLvsyP/qaS2fjtgnGF/kfabmSHvTrjW9euf9g4dF/t9A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=a6PS7wTlj5dGdjfnn7tkCu/Kzv4CSM0U2LzCGBehyNc=;
 b=DjrgbMp9qQIeSv3TpDQOXDe95/wGkP255w20D/13kslvRPzfvxZOPpKJyz+nptZNIuLPLFrmaRr7VlzL44CM+28Vnm6Ul3acvXgp+Rc59e9QHKplytX1XkrQ8toq2kWk/1/HlBqgb7nF+WwoE7SV9nI+mmzfSAEaNRN6DLXaawE0OSw4rcrYB894fsEkMImPtzUTCxGp7CUayVj/DEYY1VAZ5gkSZW8MwyNUczzzOmJThmLlgEKn6hTdvFtvsYpDBsbaZoD7rX5WSx+abS5T6WzOREDYj7auQMIvaWz8ulbe98ojyoYDgc7M8fAUVHHoNLi68sRRuv99KCYXFK7icw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <b25ba642-8708-22fb-751a-d07d9938ddaf@suse.com>
Date: Mon, 21 Mar 2022 09:52:42 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] xen/x86/hvm: add missing cf_check for hvm_physdev_op()
Content-Language: en-US
To: Juergen Gross <jgross@suse.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>, Wei Liu
 <wl@xen.org>, xen-devel@lists.xenproject.org
References: <20220321075329.3302-1-jgross@suse.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220321075329.3302-1-jgross@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6PR0202CA0071.eurprd02.prod.outlook.com
 (2603:10a6:20b:3a::48) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ac853d6b-b6cf-416a-f661-08da0b182a32
X-MS-TrafficTypeDiagnostic: AM7PR04MB7045:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<AM7PR04MB704500001BC0D32CB235FD73B3169@AM7PR04MB7045.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(36756003)(5660300002)(508600001)(86362001)(8936002)(6636002)(316002)(37006003)(54906003)(6486002)(66476007)(6862004)(4326008)(558084003)(8676002)(66556008)(66946007)(6506007)(38100700002)(2616005)(2906002)(6512007)(26005)(186003)(31686004)(31696002)(53546011)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?dFU2aWtvVlBJQXlRUWRycjdJSVdGdDNWNVN1R3BDZmZObWRVTjI0bHJFcmp4?=
 =?utf-8?B?QjB5NTIwZTU3elVJWU5YS3l1alhKVHVLbHI4SFBIZnZ0TFBibVg3QzBpKzJs?=
 =?utf-8?B?NVRycWFIaFJEcGVjd1gzaXFvOFB1Qlk1WDZJT0V5bUZRZlQ3WUR5U1N6Z0Jp?=
 =?utf-8?B?dlZ1SGZLVzRDZGVhanpXT0VnNG8wb2ZpYnJRY2xweVFDQ0IzcU15V3Y5eHNv?=
 =?utf-8?B?UEZ2N0xMVWZ1SzNIbTZjdFlWSjdRRzhnV1pReHFvdlp4K08wYlJhMHppaGJo?=
 =?utf-8?B?L2E5Nk9VMm5HNnpwWUdONDcwc3RmNkswVWFST25EaEI1aytRZjUyd2lvbkRm?=
 =?utf-8?B?YUYyRlN1ZTFjNXVqZkZ2UE1IUmZJWDBNVkhndEMwNkxOeDFjYXc0b1JrZzRI?=
 =?utf-8?B?SzhhUTRRQm1UazRkenBLc01JVHY0UStQUmJUSW1QOG90ODRQcjBWNEtVTTV1?=
 =?utf-8?B?c2VUVTdISmRncWVEVTd1cUticU1qYWRLOGFYYlBWekVmRzZCbGZQRmtiUGVm?=
 =?utf-8?B?dzg4WUFHWkxGVGdPYi93RlVhbS92S0RWT3lhYTdTcjVneFJ5ajJrdDlVbWZv?=
 =?utf-8?B?dVd6TVR6eWVONHJ4NmE2c29kTE41Y0g5blNkeE9PUGRxeU5qNzNOcUk4VTFM?=
 =?utf-8?B?NjlZM2lHekV3bFJKMVVqNlhBRzF2TVdWdlpvVU8rdExTTXduTDYzcVVHaDBq?=
 =?utf-8?B?Qzcwc1lFM0J0Mk55c1EvbWozRUZRYUY0TXVXU3VBY3FramV5TVJFZnE1ci9Z?=
 =?utf-8?B?VEFKSXNuWDhoM2xPdlJEU25OWlcwd0hIb2tmdExyQm1HOFZNeTQxdXA0S09C?=
 =?utf-8?B?OERvdXVRTkdvODFlVCtXbWF6VTZQZ2puVWljaVRYZk1WNDhXZ0RZWFd1R2lO?=
 =?utf-8?B?N1FDbDNySUMyTUY0dEZRT0ZRMUx6VFJtTkhPcFpxSGZVMDZLL2RGVkkwdmVE?=
 =?utf-8?B?ZDV6UytCVzhPSzR0dXYzb1NIQ0FoODdrM2hEYU96UmVHMnZDb0hLSWh6OFV6?=
 =?utf-8?B?Sy9iZ0tqd3RTZnR2R0ZOLzk0U2VoQURFcnVrM25wYWtPRnhZVURIc0NMZkNT?=
 =?utf-8?B?eEMzQ0IrNEpMUkViVXVjYUVmU1lkU0hnVHhKNHVlVHBZOUxuNHd5Mk0wMFh3?=
 =?utf-8?B?amh2WFpuWU90YTZ4Z3FwYmd3bittSlUrQjFseThwUjFZeU1PUzFZVTN3dHJH?=
 =?utf-8?B?YUlyUms0bnByY0ZNU01CRnB6dUR1NmhMRzFDYmJyV3dZUE0zc3pRZWZlMFZy?=
 =?utf-8?B?ZVM2R2Zmb2RiK3BWSmdKNnIyOFovRXFCS3JNeFFUR0FhYlZiR0ZwSW9ydFBt?=
 =?utf-8?B?QjV4blZTY0JrY3RxY0lPclR2TDhUL3ZWN1hCcTFpY2hUK0ZURXZ2UWdHZHox?=
 =?utf-8?B?aTFtcHc5YUhlSHVLc1ROcEZSRVFOVGJzQ3h3bU5ZS29FRTA0TDA5d3VoTjZo?=
 =?utf-8?B?MEVqYVZYS0VxTXlNUktKajYydW1WREsyRFYxM3dUVWZSc2tiQkFMUjhJVGVt?=
 =?utf-8?B?TkFuWURpL0prUWpXczd0S0w1ekNJcmREWnhEblVLNFhDOTExSDFRSjJVVVdu?=
 =?utf-8?B?eTBlYVR6MThGY1dYTWl5ODNSaW1ocVA2dFVtOUdGczA0RDNKTDV1ZHNjQWZE?=
 =?utf-8?B?UWI1d0M3NE51VXpaQUdPeVh4UUk5L1VRNFZlS0ZvSzZUNjFWL0p2RGRnN2Rn?=
 =?utf-8?B?Uk9pcUlHVHpaL0JaVVBha3VQZ2h4RjBuQUJCUFkyTm1yYnFYbk01M0pDMHRU?=
 =?utf-8?B?czBEb3Q0M2hIamMwZmtyQ1NtQW9FMVJMUmhLMlZidzBvaWdrb0EyQTFUZGtW?=
 =?utf-8?B?Yk41Smc0OHlaVE1VM1FReHB2L0M3cU5YckdsQXVqejdMYmo0ZGtGVi9VRC9G?=
 =?utf-8?B?cTZSeVdrT1dvNTJKbmp0RWhQOEZaTUVkUEpGZDdPMUhGU1h1VUFnUE1UZ1p2?=
 =?utf-8?Q?C8WogvsWreEI2hmdC32X1yNVfbxQVPAj?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ac853d6b-b6cf-416a-f661-08da0b182a32
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 08:52:44.3012
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: loehBoPbl0krlxzMEAWi6TLWu9/PpaA2HQ9m6YTj9LKu58vfXv3zWiaH9I5ek6YDVCypd9R4RjDv+zNto1FqkA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM7PR04MB7045

On 21.03.2022 08:53, Juergen Gross wrote:
> The hypercall handler hvm_physdev_op() is missing a cf_check attribute.
> 
> Fixes: cdbe2b0a1aec ("x86: Enable CET Indirect Branch Tracking")
> Signed-off-by: Juergen Gross <jgross@suse.com>

Reviewed-by: Jan Beulich <jbeulich@suse.com>



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 09:04:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 09:04:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292817.497265 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWDy0-0001Xa-Gu; Mon, 21 Mar 2022 09:04:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292817.497265; Mon, 21 Mar 2022 09:04:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWDy0-0001XT-Di; Mon, 21 Mar 2022 09:04:44 +0000
Received: by outflank-mailman (input) for mailman id 292817;
 Mon, 21 Mar 2022 09:04:43 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=svEr=UA=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nWDxz-0001XN-5n
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 09:04:43 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f1828dc2-a8f5-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 10:04:41 +0100 (CET)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2050.outbound.protection.outlook.com [104.47.14.50]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-24-NxPxJy2DNqq1yObXOMrJeQ-1; Mon, 21 Mar 2022 10:04:39 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by HE1PR0402MB3514.eurprd04.prod.outlook.com (2603:10a6:7:83::19)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.22; Mon, 21 Mar
 2022 09:04:37 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a%6]) with mapi id 15.20.5081.022; Mon, 21 Mar 2022
 09:04:37 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f1828dc2-a8f5-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647853481;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=wzqsUEraQzLbxAKczaPbXHLk1rU4oaB5qv+1d5hDDyU=;
	b=DiRYnfbYf1WpycSX0mTCs+jw4FvRlcvQn5Vo1G7zOqxG7oKfmdlbbLQVifMVPzPmuJr3kz
	M/5FVLs+eVe+CjZBK+mVSNFSPbQ47+7IPZFuosFa8iOQm/QK51id/6bXCJppXDljdNurZN
	hgIOS4+nHqWDZgi/djzURce8B3wzSXo=
X-MC-Unique: NxPxJy2DNqq1yObXOMrJeQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=leZK0PjkaO3rOqsvu5N1xOSXHxD8c+Df/Dgm5xqwDkNwOCdFpR55t14mBS642afCSh/dzGBiIip9qsezKrojz3trANQAFhNgq072/+vUr5S7CH6zI8YAFISCJwKpqUvlE2ANAyHi1cE8pI9aMyA/H9M6UDmP8uHmMsbS8rhSs4ujGFzwosPU/fRveXMzuAWP83ND+urUekmSCMF6dewPAnXLbw0UCTakofFPEMjUPXFGGgcI75kYKtfp2TfEvAhkwW4sQBBpa3d4cFBA8YcMJ03rx4eXZy0IPjrpakALuApyp1qERqjctM52kvu1xpMj+tnKSbl9UJz/ISUJHbiTmg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=wzqsUEraQzLbxAKczaPbXHLk1rU4oaB5qv+1d5hDDyU=;
 b=Ng1JfZb4K/Ppzh8BnK4U/g+LkjZlIS2jSWl1cfTL5i0Etl6kU/qCeqMLnqXor1aGM/U8Upfp71I1nH/peivjVCSUQlae1cvkxIlvyIhBZV+gdo1ZsP325I5mcK5b1tqUwVCZQgr/BNZuTCh7EhA/RceSyArCdQ2F8SgNokBZJeoaiVqkYteZl28iseeV4hJ04FgYivtTEYhtV0ZJOFkwFCSSTYvmYuB04fL2U7LmAm8Q8M++W9NrtoZTTZI/+WKNkpb1Z/qTyymHqijqH5XasAZat5XrU58zsaEpWE8vCPTh+F7HitTKV3zHBPMvqqTlMMuXzk9zDW8dMatLOBA2MQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <14f16003-3ea7-d0e2-e209-3debfd89f34f@suse.com>
Date: Mon, 21 Mar 2022 10:04:35 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v3 5/6] arm/dom0less: assign dom0less guests to cpupools
Content-Language: en-US
To: Luca Fancellu <luca.fancellu@arm.com>
Cc: bertrand.marquis@arm.com, wei.chen@arm.com,
 Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220318152541.7460-1-luca.fancellu@arm.com>
 <20220318152541.7460-6-luca.fancellu@arm.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220318152541.7460-6-luca.fancellu@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8PR04CA0071.eurprd04.prod.outlook.com
 (2603:10a6:20b:313::16) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 1079eb42-985f-42b5-5c32-08da0b19d2e9
X-MS-TrafficTypeDiagnostic: HE1PR0402MB3514:EE_
X-Microsoft-Antispam-PRVS:
	<HE1PR0402MB3514D866BE3F1E1226C8F5F4B3169@HE1PR0402MB3514.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(53546011)(2906002)(6506007)(6512007)(83380400001)(316002)(54906003)(6916009)(31686004)(36756003)(2616005)(38100700002)(26005)(4326008)(4744005)(86362001)(7416002)(31696002)(8676002)(6486002)(66476007)(66946007)(66556008)(5660300002)(186003)(8936002)(508600001)(32563001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?b1ZTUEdRSFZXWnVXbDVvSlhzUjhPakovb2s5aXlkTjE5MDU1UzBZc2JXVXo4?=
 =?utf-8?B?bG54RTF5ZlZ5MmxMcWl4OUc1cElIdmpoMytvSzF2M0NVeElpZlozMjBkME52?=
 =?utf-8?B?YmdNWnpFQUhuRHJuZzNmcmhCRExXemtHUzFuaEVXZjJYQzZtK3Nnc1lVS2Jt?=
 =?utf-8?B?Z0oyVmRhNGxhZ09hWG1IMDQ2OUZjSTR6L3o5dURmVXpmV2x6eVV1ZEd1TVlO?=
 =?utf-8?B?UmEzcWp5eUE3eExnWjk5V2FyOGNnU2p0R3MyU1RyeVFXUTFFb09jeE1WVTBX?=
 =?utf-8?B?UUtzVzF1RDdkL2ovVHpzU0J0TEd1U2lMcWFQMVRPZUM4YitqTll3TVJaVVd2?=
 =?utf-8?B?T1ZhdUQ2clRhSWhzYzdQNmY1SXZJUGkwcUpNQUpNZzg0UzRkMm0xNkREaVYz?=
 =?utf-8?B?cG5uTVRkbTBBNXRCZ09rVjM5U2ZzRnZwSXk3WlAxdDlGaHJBVTJQb1Y5OTlj?=
 =?utf-8?B?emt0aE1MbW5HdDg4bDdJRTVvd2pEVGdjQmEzOTc3elBvTU14MFBFWU94S2Nw?=
 =?utf-8?B?L3BySkM2SVVCSFJ6NVZESVhaRXB4d054eU4xc2swZy9SOW01RmlheEsyRVlp?=
 =?utf-8?B?WllKclAvMjJScEVYaHAzb0wyZ1dkblVsRk15R3NYVzQyNk1JaStqSUZJVnBP?=
 =?utf-8?B?UUJHbUl2YkNZWjVNVEJpOTFlbjBDU1hQYnN3YjlRcmhWRGJaL0NJTmpKOEpN?=
 =?utf-8?B?RUY4UThXL045NUpZYm9pUXlZTVBKZzUzUjFkbHo4bnJjQWlxWUdJOWxzTXZm?=
 =?utf-8?B?Z21XNVJiTjhwSFJqZ2M5MVFsVTVLOTF1NDFQeEdEd3ZZTjhnV1k0L052bW9u?=
 =?utf-8?B?TTl1OHVJQkh2emdveWs0eDc2c285Q0p3Mms3dmQ3Q0VTV3BDM2FDakVPa2Nt?=
 =?utf-8?B?SWZYOWswTU1kY1hKUlFiL3R2Y0M3L1N4MHd6OUtlekVBdDFwMGxuUVFuQXNV?=
 =?utf-8?B?bDRKZGhkNE1XTVZRZWhnaXVBeVh1VFhaSnRxRTQzakFXblFzbzN3L2RCRE5n?=
 =?utf-8?B?SnBrSUVJamdEL2djTEdia05VNDRKZlJrcjFzUUF5cW1UZ010WVRYdW5YQlFQ?=
 =?utf-8?B?Vk1PWGl5NkRoNnM4ZkJLbEYrUTdtdVZLeHZkdUt2bVcvQnlFdVBiWjhoRWpy?=
 =?utf-8?B?dXFPR3dtMUl0MzJGc2FwcUplb0s3WGhEZlBYcDhwQ2h3dnNodnlCd3UvVmhM?=
 =?utf-8?B?L1RvVmFEUVFacEYydDY2NzZ4RktoTUViOE54byt6T0I3Z241bEFWWGU2OWlY?=
 =?utf-8?B?cHZkTndxbmZMTWc3NmtsdExyamVhb0N3VzA1eXVoRWZtTElBSExneVF2emRI?=
 =?utf-8?B?YU5ocFdRY0V4cnRVZFRiSEtjYVJOM2JMbUdtUWN1QnE1cEJ5eHc4Umg5RW40?=
 =?utf-8?B?RlRUeTNBWTVSRkVYcHNnY3BqbVVwb3FnZDh1WnBXWjRPR1Z3aFFTVXZoZW9D?=
 =?utf-8?B?UGFES2gyNlQ1cFgva3c3K2xUZ204cUtpN3hRY01CNGd2WWgzZnI1N21oUDlw?=
 =?utf-8?B?TDhsVWRMS0RCRFdzeXBiTENjZFZubERLU1BiN1YyL29QRSsyeWxlcUxGMlRq?=
 =?utf-8?B?N1R1czZidytTLzIxWldSa29MbXVtejhKTlBSS09ESER2cEU2NG5wbitxQldQ?=
 =?utf-8?B?Y1pURkQwUHdpVFBodkd5Q0YyckkraDBkdjVFUFlqZHJVakRUcTRaZjVSNnph?=
 =?utf-8?B?aTNCUUF4WHMrelBUQm9sVFIxbEhJY3V1RWVOWERiejB0elFhbzZHdGN5WEEw?=
 =?utf-8?B?bmNkSXVXRGM0YVdDZ05FaFNHZEhadzRzUjZJeHRlNmtuNXpRQnRiVWJqcFhu?=
 =?utf-8?B?dnJlTitEdExISlZCRFRRc1hUWkdLa3EwaTV2Yjl4Sy8vdXJMalJyblNSSFA1?=
 =?utf-8?B?Z2g2OUxBUmJ0T01OWnB0QmhSNE5XdFkxY2tTdGxmSDJEOVA3ZXVLVzdmWTQ2?=
 =?utf-8?Q?cF6R1N+EFFjvkVfqWBbUltRJyGJ/03tj?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1079eb42-985f-42b5-5c32-08da0b19d2e9
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 09:04:36.9286
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: /Zyn+Kxc1yJCNNNstdprG5MOTuZQ/Rf9LCvj2fsB1Nmby5D13JlqLETTNGFtx+xFQd19CM2oQ9m32uFELgojHA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0402MB3514

On 18.03.2022 16:25, Luca Fancellu wrote:
> --- a/xen/include/xen/sched.h
> +++ b/xen/include/xen/sched.h
> @@ -1182,6 +1182,7 @@ unsigned int btcpupools_get_cpupool_id(unsigned int cpu);
>  
>  #ifdef CONFIG_HAS_DEVICE_TREE
>  void btcpupools_dtb_parse(void);
> +int btcpupools_get_domain_pool_id(const struct dt_device_node *node);
>  #else
>  static inline void btcpupools_dtb_parse(void) {}
>  #endif
> @@ -1193,6 +1194,14 @@ static inline unsigned int btcpupools_get_cpupool_id(unsigned int cpu)
>  {
>      return 0;
>  }
> +#ifdef CONFIG_HAS_DEVICE_TREE
> +static inline int
> +btcpupools_get_domain_pool_id(const struct dt_device_node *node)
> +{
> +    return 0;
> +}
> +#endif

Was this perhaps meant to go inside the #else visible in the context of
the earlier hunk? It's odd in any event that you have #ifdef twice, not
once #ifdef and once #ifndef.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 09:10:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 09:10:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292820.497277 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWE3u-0002zA-6Y; Mon, 21 Mar 2022 09:10:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292820.497277; Mon, 21 Mar 2022 09:10:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWE3u-0002z3-38; Mon, 21 Mar 2022 09:10:50 +0000
Received: by outflank-mailman (input) for mailman id 292820;
 Mon, 21 Mar 2022 09:10:48 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=svEr=UA=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nWE3s-0002yx-R2
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 09:10:48 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id cb8028e2-a8f6-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 10:10:47 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2113.outbound.protection.outlook.com [104.47.17.113]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-31-cldyWBRqONKZzz9T1_nF7w-1; Mon, 21 Mar 2022 10:10:45 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM6PR04MB6584.eurprd04.prod.outlook.com (2603:10a6:20b:f5::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.22; Mon, 21 Mar
 2022 09:10:43 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a%6]) with mapi id 15.20.5081.022; Mon, 21 Mar 2022
 09:10:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cb8028e2-a8f6-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647853847;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=CMe4OJc7AcknnkGTat9CoAxDfE6TL6bWk5RzmIdSnpk=;
	b=hEQ4sujSv0kCSOebm430pb/MUvq/WbJ1LS8YPWzL3Tnr1VwZApKAsTgRijQG1D26/aVNHq
	b5A+KdejW0UgUGUaaqPhqpcjYIshI2+Rw6o2nOyM6vQOmaX60Ub/4DIK61laPjV/KsYfeT
	UA0nGhIPgeaiiUBZt6hR/m8S3eojX6w=
X-MC-Unique: cldyWBRqONKZzz9T1_nF7w-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=j8a8JqceswM+PFofitB9A04jsS4M+BbDSjncG3GXK4hxynFeQLO+M1WuaQD0S+NGKBaTW4flB4J41ewf4HRNsfUHnMoWU88dYs0loQPvElo1IRYOowCmDQ4TajGcubfuOscmz4YAwuilXDz1K670hPpzyu4rclLV+jimhLsrZluOacd7TxJ9BT0SAFpUhIrBa5FpsQEOnBP0IuAPd/NgSWRpoaH1ZwqcH2nmFROLZrEMII+g4rX//Q3sIRJvA5ImTnhmZk14gMIbd9uvCu2E4H/NWZtYq2SsZq1lCnV2RoDZDx+8aduNGDSzhApCqJGxO/nl1l0ijK52b/y+lp+7nw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=CMe4OJc7AcknnkGTat9CoAxDfE6TL6bWk5RzmIdSnpk=;
 b=Q2Lvu9BMjSfRYOmFc/TKoXOslLcfMJ9U4oeseAPQUP7gBuT8ewH7VLkq8wLlmrcsyOg9T4WWo156AYOMobaMvYNw7oVnpEsLWOnhPWpgbvc6L0QD0ovKK2BHok8WYZynbz/jGheBCIXuhjdJ14wYPo5cXD+Lg99vIBdll1xvdKE3kJWSInuytbyoIJs8G36yz9Ii8/lbEGn0Vw8xzI2DYs3c7RQayE/Yx49VQL2o7jaBoXYtiZ9OJeDpxpsS6mY0CJLhiBUXNsXZcu9WWteQ1ChU7r26UIGovmIgow5F2H/Q4EM0GHqddVyVtRwWByLlq5GFR+RFzAv4QGTtD1dYBw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <d16f98aa-8307-3add-8253-0616cf5ba2b1@suse.com>
Date: Mon, 21 Mar 2022 10:10:40 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
Content-Language: en-US
To: Luca Fancellu <luca.fancellu@arm.com>
Cc: bertrand.marquis@arm.com, wei.chen@arm.com,
 Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 Juergen Gross <jgross@suse.com>, Dario Faggioli <dfaggioli@suse.com>,
 xen-devel@lists.xenproject.org
References: <20220318152541.7460-1-luca.fancellu@arm.com>
 <20220318152541.7460-5-luca.fancellu@arm.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220318152541.7460-5-luca.fancellu@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8PR05CA0008.eurprd05.prod.outlook.com
 (2603:10a6:20b:311::13) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 909142e5-e09e-4084-2f28-08da0b1aad34
X-MS-TrafficTypeDiagnostic: AM6PR04MB6584:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB6584D51DA5F4A5FC701F4DE5B3169@AM6PR04MB6584.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(31696002)(5660300002)(53546011)(7416002)(31686004)(6506007)(86362001)(8936002)(36756003)(316002)(2616005)(6486002)(4326008)(6916009)(8676002)(66556008)(66476007)(54906003)(26005)(186003)(66946007)(6512007)(508600001)(38100700002)(2906002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?ZHRycDFCQUZSZjJLcXU3T1kwNEtwVlVLekh4U0drNUFDSlVQQlhVa1NFTFlv?=
 =?utf-8?B?TjRBeWxlVUptUkZCemhxRjlUVXcyQUU2WEFoNVUxTUtmSWpPemxSWTRKZ2RM?=
 =?utf-8?B?cUwyMnlBbXhFRktXTGdxK2pFTzd3SE5EL0hQZXk2ZmRlY0RYNitJNDhMQmtW?=
 =?utf-8?B?bjJpalI0RVU2RCtmS2NCRGZnU21sR2d4d3V1cUptQzk3RDNtdi9BOTNRMGti?=
 =?utf-8?B?RktoL1YvU2FqTG1ORXlUdWVBOFRYRGVnOGkwQit6N3QyMVRHRTl6WktUWXZF?=
 =?utf-8?B?N24vaFIxTjBFNkZONlQrVnFTVTZiaTI3UGlPeUJqWHVyOEwyNUFwc0NXZjhG?=
 =?utf-8?B?eUdiVDJINzREMEFNNzFlVlR2WXBqVkNSRk1RVjBaVUZ4UERWTDRWVzhsZDJz?=
 =?utf-8?B?WjVzS1RRenV1NS9iTmRVNUI3RFdDWGpwUENoRzNqY3d6eHozVTdpdjVkZVhw?=
 =?utf-8?B?TEFmZlV4RDNFK1EyUXgvckdYcFlYSERGdU1xeXhuemZ5NWl1M2hFZXhzSWgr?=
 =?utf-8?B?WHNYVGhYdzdIdkhaRWVBR0JuaU9CUmxvdlZoQVJtaExqZjBsVG9yK1p1dGhH?=
 =?utf-8?B?M0ltbTlrWFlQZFVIbStBWERXMk05WWtJRzFPbks1YWlnaHFjbEpFcjlsYVVX?=
 =?utf-8?B?cXJsTmdUUndtNGIzOGlVbEJ1ZmQwQTBYL0sxY2RFbkhLNWQrQ2MzTDNjZWFM?=
 =?utf-8?B?Q2MvL2VML2tLWjc2NXRqMEtHdEs1WXhOcFkxVnJvRVpQTlE1R05KR2FyYmpM?=
 =?utf-8?B?M002aCt5eDVjVFV0dVo0QWtRckh1UnY2cWhrZVltdDRwbW5Fa2Z1TnJtdjE2?=
 =?utf-8?B?MW8vOW5tRmhOUTA2cHEydTVySHQxY2d4WEZ3K0lyTWttcWhLZDdXbEJ2Vmhj?=
 =?utf-8?B?UDJRMm5KOXVPWUFIS1NzUjh3aXgxRkRvM1A2cU1oQ2xzL2habHVpcjVVeVBU?=
 =?utf-8?B?V1NYMU5kK0NncUF6NWlxVFdYWmI4alVDRlFISTdvVnZwbndDV3R2L3JudHNS?=
 =?utf-8?B?RFZaUTU1OTNkZllUY3RCNzRWOGhNTzhTRmROZEFxdnUrNkZIdHNGcE1XQjIw?=
 =?utf-8?B?QjgzR1R2YTFQMVRkbWMraDZDNWdkOEpaN0YwZzNHMkk0OWxKNnlWUExUYkNG?=
 =?utf-8?B?OUNLYUtpaU9UY3RrMTF1Nk9nVkJqb0lsVmpFb29QaW5HaDF6b1I1eTlIREhj?=
 =?utf-8?B?V041RUk1c2tGSjJMU3hiTUN3bHprekdZcGFpc0RzTmtBMXQyZENNbFFyZ2xp?=
 =?utf-8?B?ZEFVUll2alpFQVlxUlFCc0NZR1VDeE5sQ1FJeU9JalViSmZmd3BJd1UyK09O?=
 =?utf-8?B?eFJyR3VSd3J0ME1sSDZrMnBoMlkzZmQrdjdTMFlOdHZkcmJRU2E2bDIyU3h0?=
 =?utf-8?B?cmp2SzAyK0h3b1B4NUxKUnBZRjUvWU5qdTNBaHpQZGZFNk1nKytFWXFnUEUw?=
 =?utf-8?B?OXNIdXNNeld0MFJTbmZvUnVRcFpCc3huOGdUcHJtUjdwam5RTFJWRkdOWnQ0?=
 =?utf-8?B?bXVlZThhTDQxZytYNXVNZDlMUUdoRCtFc0JLdHdTdHpWVmt3bVZDdXNadUJJ?=
 =?utf-8?B?aERUbzlZTzdXVHJEWHU1OS84VXFBNXdFbklpYytTOXB5anlqWUtmbzQ0NmI3?=
 =?utf-8?B?UGFVODhsc2hzMXZ4bXM0eGkyR244R044dEt3QkhjZEdZQkV5dWs1eDlNMlI1?=
 =?utf-8?B?QnBkZVk3VVBjaVRoZm9ydHZwTlhqVzNaRlJSVVIyWDR1R2hxcElWMGtOUlky?=
 =?utf-8?B?WnJ3aUMxNWQyUnEwc3lMRitsb0YrYjI0b0s0dmpCcUZJYURQa29taHNWaXJi?=
 =?utf-8?B?VHk4NDBMenhUZ0JYRE1UcnQwZHNIN3FsbHZwVUVDaXorQ1VDRVhPeERySmI0?=
 =?utf-8?B?Rzl1eFcvd2R1TEVyd1pOMENaMjI2OWszdDlXTENMd2JrclVNUW1VSkhpNjA0?=
 =?utf-8?Q?LaJCPE/eqY8V/L9y5C64zCloUU68K3Gl?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 909142e5-e09e-4084-2f28-08da0b1aad34
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 09:10:43.0229
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: jeTjrjXr5UrQbERwDsMRV7t8k+egf8PmPox+JZ7OKFWtQB9S8bPXwRkDFun+5t7p7YdSy3OuIY+W5eqTd6YxBg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB6584

On 18.03.2022 16:25, Luca Fancellu wrote:
> --- a/xen/common/Makefile
> +++ b/xen/common/Makefile
> @@ -1,5 +1,6 @@
>  obj-$(CONFIG_ARGO) += argo.o
>  obj-y += bitmap.o
> +obj-$(CONFIG_BOOT_TIME_CPUPOOLS) += boot_cpupools.o

By the looks of it you appear to want to specify boot_cpupools.init.o
here: All functions there are __init and all data is __initdata. That
was string literals (e.g. as used for printk() invocations) will also
move to .init.*.

> --- a/xen/include/xen/sched.h
> +++ b/xen/include/xen/sched.h
> @@ -1176,6 +1176,25 @@ extern void cf_check dump_runq(unsigned char key);
>  
>  void arch_do_physinfo(struct xen_sysctl_physinfo *pi);
>  
> +#ifdef CONFIG_BOOT_TIME_CPUPOOLS
> +void btcpupools_allocate_pools(void);
> +unsigned int btcpupools_get_cpupool_id(unsigned int cpu);
> +
> +#ifdef CONFIG_HAS_DEVICE_TREE
> +void btcpupools_dtb_parse(void);
> +#else
> +static inline void btcpupools_dtb_parse(void) {}

I think you want to avoid having two stubs for this - one here and ...

> +#endif
> +
> +#else /* !CONFIG_BOOT_TIME_CPUPOOLS */
> +static inline void btcpupools_allocate_pools(void) {}
> +static inline void btcpupools_dtb_parse(void) {}

... another one here.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 09:22:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 09:22:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292830.497287 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWEEt-0004ao-Im; Mon, 21 Mar 2022 09:22:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292830.497287; Mon, 21 Mar 2022 09:22:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWEEt-0004ah-FF; Mon, 21 Mar 2022 09:22:11 +0000
Received: by outflank-mailman (input) for mailman id 292830;
 Mon, 21 Mar 2022 09:22:10 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=svEr=UA=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nWEEs-0004ab-1r
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 09:22:10 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 60cc1432-a8f8-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 10:22:07 +0100 (CET)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04lp2053.outbound.protection.outlook.com [104.47.13.53]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-28-JnFwAIxDNTKoUU8_VDiCyQ-1; Mon, 21 Mar 2022 10:22:05 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by DB7PR04MB5306.eurprd04.prod.outlook.com (2603:10a6:10:1f::29) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.22; Mon, 21 Mar
 2022 09:22:03 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a%6]) with mapi id 15.20.5081.022; Mon, 21 Mar 2022
 09:22:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 60cc1432-a8f8-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647854527;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=yfO0uyOzDUx57rQewKM942yUEIhHG+jMQZNgXKxOGMA=;
	b=al96JwmK0qcR/2UzvAw1HP8boWbdgATYFLxjDTyuiER23d+fFM0Umo945NN6sqQKeCHD97
	O6VshHPriwDBKKSbd9elw7Ap5ZN5AxAUReIW+kaCPh/J9yqqfh2ElbS+acn+6P1GQbLDAm
	2NUzRp5WKsMNhPNFkZ9IDetlJbX+l8E=
X-MC-Unique: JnFwAIxDNTKoUU8_VDiCyQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Le8E05RVIZHJgbj6SbSuc6DubYEYiFux2O6srvDDtwhSZXgksg/2CTiOPraSe7W7OFDzHP4POuh/34t3axTxiv/oAdGj2ClpHK1vSaE9xwmBsg5qMzz9DTzkGHSrHEp5VhJvlHU5FfNeydUD2MozwdXe+IIqAapn3BOh60dHnkfN/vZlh5VWvKTDive2mFbLrcNRfi+YKCT6/ValU13fR1tQNX/wqRsO+EpfU0AExKYSMOc/ynyrv2DXykLuE2wuZe9/IjKFzVgMyqeRARsQBxk3g3Ohs6veV3pUMEsiQMzSXt0GBm+mY+sCzWgz6eEVlNhMONKJ/xjWZSjYOxhR8Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=yfO0uyOzDUx57rQewKM942yUEIhHG+jMQZNgXKxOGMA=;
 b=VBRnQOS8eknBI3OMQiLd11yQ/gtBaH+wDKkiD1LyliglBjEiuuJc23tlIKvT4zUkNuKtFidHcchkxVqhRiG+VANkn7UD6gG7UdQXfCOS0u8HrGpzuH5U5PhfbPlrVVwP6iTaezX8eeCnhkqcEU78MRXNp1rSdnmOCJSuv53tWXK8PHKo4RKJhLDataQzNwsjgNdIQPiNZ+612p719YiJuFZ7TJVDtP6XmninyYe04Zbn+HakuIhwpO90gJhKL9pVLziC8YZFhdqOT04QZJ32r7jW04NVaKAQl0XFqUgIGAFGlgH2Ye5dOswdzx4zCAMzVPTzn2ItbxdHYtFKUqxxLw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <cb61531a-5482-3aab-58bd-84f99f21ec48@suse.com>
Date: Mon, 21 Mar 2022 10:22:01 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH 1/3] xen: Introduce a header to store common linker
 scripts content
Content-Language: en-US
To: Michal Orzel <michal.orzel@arm.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220321082114.49953-1-michal.orzel@arm.com>
 <20220321082114.49953-2-michal.orzel@arm.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220321082114.49953-2-michal.orzel@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6PR0202CA0042.eurprd02.prod.outlook.com
 (2603:10a6:20b:3a::19) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 610ec041-fe6b-4dec-05fe-08da0b1c4255
X-MS-TrafficTypeDiagnostic: DB7PR04MB5306:EE_
X-Microsoft-Antispam-PRVS:
	<DB7PR04MB53066AB53565BCE15CEB5CAFB3169@DB7PR04MB5306.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(36756003)(8936002)(31686004)(6916009)(5660300002)(508600001)(316002)(54906003)(53546011)(38100700002)(31696002)(86362001)(6506007)(4326008)(6486002)(66476007)(66556008)(8676002)(66946007)(2906002)(2616005)(26005)(6512007)(186003)(83380400001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?UjBBYnJoU3J0YnFxWFVHTGJORzFEaWFEdU95RkxwN3c1UWFaZjh5MU81SUVX?=
 =?utf-8?B?TFlZV1VTTnlRQlJiL00yVXJWRENod1hWZkhKNUMzYlVpd3VUdkl2NDBRdEpT?=
 =?utf-8?B?dXBhcjNoY0JBOFYzdlVWbkNkeEVPbUdSYjRoNWMrMjdCQzBudVU2UGdWVzVV?=
 =?utf-8?B?MDc0L3dBVmhKVlR5dWwvaHFJdERGRUllRTBVMnhXZlZWREN3ZVEyNElROEVp?=
 =?utf-8?B?eGdiTEZIOTFSdFlMZG1zZ2h5YUM3S09RN0lkMkhnckdpT2FRWEtoenppd2Yr?=
 =?utf-8?B?RTdkbENuNEovYTQyeFo3MmNUZ05keVprNmJyS08xZVZrZTE4SnNTK3ltNFJY?=
 =?utf-8?B?eERqTmtUQTNDeGxrWWkyN3VMM2NCNThQMVQwVzJGU2JvNFdZdFVzUXhzTXVG?=
 =?utf-8?B?VTl4TWNQQ05BbWxTTFh2ZlF0L1RpWnlEVzNlcDlTZUZIRDB4TDhPZGxkQjM4?=
 =?utf-8?B?TE9LeHdCakQ2cGFjV3VCQnFUdTYyVHN6TVNwOFRUVVJ0OGFLV1IrdnRpZGVj?=
 =?utf-8?B?SlUyZTdDWXVNMkdmdnJ1STFEWDVmNVNwODBTRWJaWTMybmJYejNmZ1k2WGh0?=
 =?utf-8?B?QmpsZEhHWVhvU2cvY0pyYXFFRzBFUGVzZ0o0OUpCKzRFUUtUWHN0cWdTRjlm?=
 =?utf-8?B?YWdjQUN6WE8remU2N2JKdDA3U0ZKZ0E0MmM2endvWGRudUlDUzJwa3d3ei85?=
 =?utf-8?B?UGR5MUk4NkdmbGJMc3BkY0JGTUVUdm9OWk4rSXk3UHZXSzU4bHhYL2xWakJL?=
 =?utf-8?B?SHRpbnB5ZEp0aEJQdkVxSVdxQThxMUFQTFZmZEV6dklnZkljQ05ob0xkQTFX?=
 =?utf-8?B?WVkxRUptNHhVZCtnS0FYYnNHT05nZDltN0ZFYU43WVZUMzBXR1llWWM3eUZD?=
 =?utf-8?B?N3JaWEtpWDB1dXg5N1hLdHg1R1FOOWtXYzVqNGNsQi8wRmlGeEhKeWJrOHRk?=
 =?utf-8?B?OVJUZlRlNWordGN6YUd2MXlhaTVVdXBTUkxQOUdKa0JKVlJOU21xWVg1UzFL?=
 =?utf-8?B?cktLQkVtc1h1TDlsam9pWWpNd1g4YitBTXkveVJXbm52YXNYK0pXU096K1Az?=
 =?utf-8?B?bWxLQ1UzbzVIY3M5SW5LRnFYVHc3c2xOYm5XRDJxVitsa1IwV2Nqb1RjVk00?=
 =?utf-8?B?VGsxNHVyd1UwTEZCbVBxSWtkVlFQdG1jV05TNEV5alJBczJWYWpZK1U4VDZx?=
 =?utf-8?B?RTdJZEdGSXh1ZU5ZUFdLWmJnMjlEbUFlL0IzdmRhMmlDVGRJY0dUckk4aW83?=
 =?utf-8?B?WUFxR2ZWY2tYRnJ3Tjk1cnVuUEFxZlQ1aWhFcXdjd0VkT2UrMHFJVDJoOFlu?=
 =?utf-8?B?bzZJNHdJUlpyRzViQmFIZU41SzJySFFXU0Y3ck9xV2dEYjcwTDZFTjMzME8r?=
 =?utf-8?B?ZFlQaVFDaVVLSkRXMy9LN2JXNGh6OCtibCtmYkNTVDE4MVgvcmFtdC9Hak1W?=
 =?utf-8?B?ZS9zc1F1eGFqSitFcit0NXZtY0ZkdzMyeGYydDZ1Y1MzZkovZTBuSU5IbXB5?=
 =?utf-8?B?QndNZDgwczFXY2IxNVdIQ0FJTzM0VjQ5WU9uL1VwYXFrY3RrSjZkSEFxZVVl?=
 =?utf-8?B?L0JiWFVQQjBGOVNXN09YaTQySUdSOHpEa3FjOTVRTjNFWDRZSTgxZTVzWGEz?=
 =?utf-8?B?eEw0SkQ4RkFlS2pUV0JmRFpVOTlzQTFWcC81MWI5ZWx2cVhUZFVqN2c3UjJr?=
 =?utf-8?B?cDNhQUc2ekthNm9GU3JLSWFnV3V5MlZLa3VKMmx4WkR5NCsxa1VpeEpPMGJj?=
 =?utf-8?B?WllacStuSEhQN1hPcjdpV3gyVW1wZ0JMYmM4MS9oYkRlVnRqQ0lMRTYrb3dh?=
 =?utf-8?B?b0d3MlA3MDhyRnU3VkNvR2hZbnZza0huVDU3ZnFkZnRXYjhvaDZvZi94KzdB?=
 =?utf-8?B?MiszdHRHSWlTQmtsdnRzdnJqWGRnTEFwSWpKS2EwbHNUdEhmNEhqd1d0OUZy?=
 =?utf-8?Q?O1h8nbKUnFwoxNdLr7TrOemJgk7Ac2cU?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 610ec041-fe6b-4dec-05fe-08da0b1c4255
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 09:22:02.7923
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: uPO1yL9kIthoWeF3no4Ez26y2e9SMAPSzoV8l2XJUT69YcBmzYpAjAORlyb0ci8uZKvlbkIdfZy59SMeLugmHg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR04MB5306

On 21.03.2022 09:21, Michal Orzel wrote:
> Both x86 and arm linker scripts share quite a lot of common content.
> It is difficult to keep syncing them up, thus introduce a new header
> in include/xen called xen_lds.h to store the internals mutual to all
> the linker scripts.
> 
> Populate xen_lds.h with the first portion of the common sections.
> Some of them are not yet added/completed in arm linker script but they
> definitely should be. Please note that this patch does not aim to
> perform the full sync up between the linker scripts. It creates a base
> for further work.
> 
> Signed-off-by: Michal Orzel <michal.orzel@arm.com>
> ---
>  xen/include/xen/xen_lds.h | 114 ++++++++++++++++++++++++++++++++++++++
>  1 file changed, 114 insertions(+)
>  create mode 100644 xen/include/xen/xen_lds.h

While perhaps just minor, I'm not happy about new files added with underscores
in their names. Dashes are easier to type. Plus, looking at Linux, it may make
sense to name this xen.lds.h.

> --- /dev/null
> +++ b/xen/include/xen/xen_lds.h
> @@ -0,0 +1,114 @@
> +#ifndef __XEN_LDS_H__
> +#define __XEN_LDS_H__
> +
> +/*
> + * Common macros to be used in architecture specific linker scripts.
> + */
> +
> +/* Macros to declare debug sections. */
> +#ifdef EFI
> +/*
> + * Use the NOLOAD directive, despite currently ignored by (at least) GNU ld
> + * for PE output, in order to record that we'd prefer these sections to not
> + * be loaded into memory.
> + */
> +#define DECL_DEBUG(x, a) #x ALIGN(a) (NOLOAD) : { *(x) }
> +#define DECL_DEBUG2(x, y, a) #x ALIGN(a) (NOLOAD) : { *(x) *(y) }
> +#else
> +#define DECL_DEBUG(x, a) #x 0 : { *(x) }
> +#define DECL_DEBUG2(x, y, a) #x 0 : { *(x) *(y) }
> +#endif
> +
> +/* DWARF debug sections. */
> +#define DWARF_DEBUG_SECTIONS                      \
> +  DECL_DEBUG(.debug_abbrev, 1)                    \
> +  DECL_DEBUG2(.debug_info, .gnu.linkonce.wi.*, 1) \
> +  DECL_DEBUG(.debug_types, 1)                     \
> +  DECL_DEBUG(.debug_str, 1)                       \
> +  DECL_DEBUG2(.debug_line, .debug_line.*, 1)      \
> +  DECL_DEBUG(.debug_line_str, 1)                  \
> +  DECL_DEBUG(.debug_names, 4)                     \
> +  DECL_DEBUG(.debug_frame, 4)                     \
> +  DECL_DEBUG(.debug_loc, 1)                       \
> +  DECL_DEBUG(.debug_loclists, 4)                  \
> +  DECL_DEBUG(.debug_macinfo, 1)                   \
> +  DECL_DEBUG(.debug_macro, 1)                     \
> +  DECL_DEBUG(.debug_ranges, 8)                    \
> +  DECL_DEBUG(.debug_rnglists, 4)                  \
> +  DECL_DEBUG(.debug_addr, 8)                      \
> +  DECL_DEBUG(.debug_aranges, 1)                   \
> +  DECL_DEBUG(.debug_pubnames, 1)                  \
> +  DECL_DEBUG(.debug_pubtypes, 1)
> +
> +/*
> + * Stabs debug sections.
> + *
> + * LLVM ld also wants .symtab, .strtab, and .shstrtab placed. These look to
> + * be benign to GNU ld, so we can have them here unconditionally.
> + */
> +#define STABS_DEBUG_SECTIONS                 \
> +  .stab 0 : { *(.stab) }                     \
> +  .stabstr 0 : { *(.stabstr) }               \
> +  .stab.excl 0 : { *(.stab.excl) }           \
> +  .stab.exclstr 0 : { *(.stab.exclstr) }     \
> +  .stab.index 0 : { *(.stab.index) }         \
> +  .stab.indexstr 0 : { *(.stab.indexstr) }   \
> +  .comment 0 : { *(.comment) }               \
> +  .symtab 0 : { *(.symtab) }                 \
> +  .strtab 0 : { *(.strtab) }                 \
> +  .shstrtab 0 : { *(.shstrtab) }

Please don't add non-Stabs sections to this macro.

> +#ifdef EFI
> +#define DISCARD_EFI_SECTIONS \
> +       *(.comment)   \
> +       *(.comment.*) \
> +       *(.note.*)
> +#else
> +#define DISCARD_EFI_SECTIONS
> +#endif
> +
> +/* Sections to be discarded. */
> +#define DISCARD_SECTIONS     \
> +  /DISCARD/ : {              \
> +       *(.text.exit)         \
> +       *(.exit.text)         \
> +       *(.exit.data)         \
> +       *(.exitcall.exit)     \
> +       *(.discard)           \
> +       *(.discard.*)         \
> +       *(.eh_frame)          \
> +       *(.dtors)             \
> +       *(.dtors.*)           \
> +       *(.fini_array)        \
> +       *(.fini_array.*)      \
> +       DISCARD_EFI_SECTIONS  \
> +  }
> +
> +#define CTORS_SECTION                           \
> +       . = ALIGN(8);                            \
> +       __ctors_start = .;                       \
> +       *(SORT_BY_INIT_PRIORITY(.init_array.*))  \
> +       *(SORT_BY_INIT_PRIORITY(.ctors.*))       \
> +       *(.init_array)                           \
> +       *(.ctors)                                \
> +       __ctors_end = .;
> +
> +#define VPCI_SECTION             \
> +       . = ALIGN(POINTER_ALIGN); \
> +       __start_vpci_array = .;   \
> +       *(SORT(.data.vpci.*))     \
> +       __end_vpci_array = .;
> +
> +#define HYPFS_SECTION            \
> +       . = ALIGN(8);             \
> +       __paramhypfs_start = .;   \
> +       *(.data.paramhypfs)       \
> +       __paramhypfs_end = .;
> +
> +#define LOCK_PROFILE_SECTION     \
> +       . = ALIGN(POINTER_ALIGN); \
> +       __lock_profile_start = .; \
> +       *(.lockprofile.data)      \
> +       __lock_profile_end = .;
> +
> +#endif /* __XEN_LDS_H__ */

I'm not sure _SECTION is a good suffix to use in the four names above:
These aren't individual sections in the output, and for CTORS_SECTION
it's also not even a single input section.

As to CTORS_SECTION - I'm unconvinced of generalizing this without
first getting it right.

Overall I think it would be better to introduce this header along
with actually using the macros. That way one can check within the
patch that what you move / replace actually matches on both sides
without needing to cross patch boundaries. If you wanted to introduce
(and then include right away) an empty header first, that would be an
acceptable intermediate approach afaic.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 09:25:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 09:25:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292833.497299 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWEIO-0005Dg-2I; Mon, 21 Mar 2022 09:25:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292833.497299; Mon, 21 Mar 2022 09:25:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWEIN-0005DX-Uu; Mon, 21 Mar 2022 09:25:47 +0000
Received: by outflank-mailman (input) for mailman id 292833;
 Mon, 21 Mar 2022 09:25:46 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=svEr=UA=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nWEIM-0005DR-Dq
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 09:25:46 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id e2d82872-a8f8-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 10:25:45 +0100 (CET)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2052.outbound.protection.outlook.com [104.47.14.52]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-35-9h4-kNHbMemGymzZuYaeXg-1; Mon, 21 Mar 2022 10:25:44 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM6PR04MB6423.eurprd04.prod.outlook.com (2603:10a6:20b:f4::22)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.22; Mon, 21 Mar
 2022 09:25:42 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a%6]) with mapi id 15.20.5081.022; Mon, 21 Mar 2022
 09:25:42 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e2d82872-a8f8-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647854745;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=nc18XEidoK32VkpXbl1heceAq7oF3Feg2ySjkOYJUrc=;
	b=K7aVzpiwSBlOJTg5DMYy5QjfknUGC8P1wedLONaBTjeq1J71yJV1O4SeFUE8BwYnQLTLYW
	B7/csd3lUWXOGdzhF3Tuo9SO6rtoQljABBhGgpkQ0l8atHxKy+b8UpeROe58HTpnUiLLYR
	D2IqzXYCAFSDuXG+NhbMjeKvCG/pUy0=
X-MC-Unique: 9h4-kNHbMemGymzZuYaeXg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=NZVaqtH8Zd/PK0WrkYqV3mO8ozWHgtcHl0yeRUASoHj9u0oRkRUfydb3lO4N5bUPQwo+84L1YRtKRxIRRcmZBT00rBLdj44ynMI4koPq200ANyjhWDbXyQdEU9xwJwm+kSY3QmjEylCJIU6HAx3XHcoFI6sBHeZAEgTNHuC2SLGQ1SvXxchY+kh86clAbP5fe2gya47P6i0lJVksXZ+KaUCNpxhshiC2LMK1tsk8LgM0qlgKPkpLpyMQzt3LZsPeBK0+GD5nqP971R7/XPubaFevu0LI7Gcnin2PteGcby5HjjzFWc2Ec8AYpRJi3s3oaE0GgIKyQbxc/FKzN16HAA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=nc18XEidoK32VkpXbl1heceAq7oF3Feg2ySjkOYJUrc=;
 b=K/Q/U09zyOwZNtDNXP0b9jpBHYj5lCkLMpII6IlDNpqSYmKzisyCeQqgoSXPt4qEjXOA90vhXfzEgaqVrWfiXhup8VvzJru9bCtBwtxA/A2HiUe1M+x4Cl/xe3QRMednV0AHkKWTIKR3AuxkapqNVK+tQZvL0oEYv37JDfUtJvpOvDA0SoWCneK00UYk0CZS/ALXhamc1ziNLBadUD+ACkxS2lQ5eoLzuskZBruWoMc8yyvzRfWwmV+1aIylSyTZGQQiyhf4UYlW7mLvTKTTO+KPb2GzJrZXprvSQ/rx/LcRfVNjAM/DawmaWT6fO83JwFSSI2qmr2bOVf2FY9C22g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <fca47661-5dc3-4228-a2d8-24344f451be0@suse.com>
Date: Mon, 21 Mar 2022 10:25:40 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH 3/3] xen/arm: Make use of helpers defined in xen_lds.h
Content-Language: en-US
To: Michal Orzel <michal.orzel@arm.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
 <julien@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 xen-devel@lists.xenproject.org
References: <20220321082114.49953-1-michal.orzel@arm.com>
 <20220321082114.49953-4-michal.orzel@arm.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220321082114.49953-4-michal.orzel@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P191CA0062.EURP191.PROD.OUTLOOK.COM
 (2603:10a6:209:7f::39) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5d0a85fb-57be-41d3-253d-08da0b1cc526
X-MS-TrafficTypeDiagnostic: AM6PR04MB6423:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB6423397B141AE1099EEE687BB3169@AM6PR04MB6423.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6486002)(31696002)(86362001)(6916009)(54906003)(2616005)(5660300002)(508600001)(6506007)(53546011)(2906002)(4744005)(38100700002)(6512007)(8936002)(26005)(186003)(36756003)(66556008)(31686004)(66476007)(66946007)(8676002)(4326008)(83380400001)(316002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?V0U0VzFGdzdaRm5EckEwTWVxZ0NmNWM5aGwwZ011WXhyeTU1cFM2MXBlNWFk?=
 =?utf-8?B?TWtieEtMS3cyWU4zN2pFTXRaSDFQTVZscE9JWFpWR04rRjM1d3FkbVUvMm1K?=
 =?utf-8?B?dFlRdnpTSDRtUm1TM3MwSVMrMDRPRWdsT1hLSmdCZVRqYnloZnlJY3NTaXAv?=
 =?utf-8?B?Y2JHaTYzaFAzWEtZemEvNlFhei9ZOFV3eGVlaFczelhYZThjSFhPaEk2bDZu?=
 =?utf-8?B?cVJ4eEZONzlSVk1IUjRQMEJrOGVOUDRhTHZ3dXpJTVNGbDRzU1c0WEtTUmxk?=
 =?utf-8?B?aUUxMDJwbWZwMC9hcko0WUNxUzRnc0NHWFhoTk5WdSt4cE1rNnlFWDU4b1BL?=
 =?utf-8?B?N1FjQVp0eURDbmh1QTNqaDUra1BqL0dJaXpWSy9zcTN6UGxGMWsxUmEyV2RX?=
 =?utf-8?B?UnArN0gxclF6STlWTVUyUk9CSmZ4bzdMMzRuN2N1Q2s0Z3lKZW5Dakt2eHB5?=
 =?utf-8?B?ZnY5UXcvSXdtZEVIUldnVC9wUTZleE94d2szOWE0ZWtJY0k2aWVSdnRBdnIx?=
 =?utf-8?B?Vm1DOU82OVZQd3diWDJXcXM0WFVwa2NzTFJTTzNVSFFsL08yVnpnTWtkWWNR?=
 =?utf-8?B?aXFEbnd1VlFaR25CM1J2RUJETGZMakIwVVdNd0FrQkZzVU1ua3YzL2NmaHlx?=
 =?utf-8?B?K05lSy9NOTd1OHBMdGJDMFcwZFhjL2dMTlV1MXFjNGs4Y0tpRlFyV1krajFv?=
 =?utf-8?B?R0FqMUg0U1BVUjdzLzdaSitLZGxtcm92bytvV0ZWQnE0eFI0bEFoNVJ5bmNQ?=
 =?utf-8?B?WElab0VjazVjbGNJRjBTVXdRTkwzV29iT2xJQUlLbVdOMUFnNndKQ3BidnFC?=
 =?utf-8?B?ZHVRcDdBT1FLa3hQeldLdmZYRER4WXNpR3B5QWhGNmFYZzB3TnBSNm4yamFS?=
 =?utf-8?B?WTMrVEpHcHZnMGR2ZllRVE1LeEZpSjlPd0trSGZqTURGWWpqUGJvVGFqNUZJ?=
 =?utf-8?B?OWtOLzdONzdWR0JtamhwamdkN0krZkpkUHJ1bGplLzVwYWU3cGRIRkk4ZjFQ?=
 =?utf-8?B?cjRrZnM2czFYdkwxNEJ0ZU9hYkxvU1pwaHBjY2J1REV3a1pETDkrWEc4VGRw?=
 =?utf-8?B?WU9YeVFkamIyNXFtVHNNS0FUZU45UkNXVjVSSy9JVmVJSWl5TUtXZzVVS3ZB?=
 =?utf-8?B?QlZFK1ErMjdoVUd6OEp1enVsd1BCMlltT2loMXJMQysybVI5ejBqU2hmVUQ1?=
 =?utf-8?B?aGY0L2hUZ3JMcUlYV1c0Zy9PNDNoczVCMXlJeTNjN0R3d3pvSjFsUWx2VGFH?=
 =?utf-8?B?SW1ud1BuclpvcEZPd2RwczNON2lCSUp3ZmlMdTBkdEhiVHNDOGlwS0tTSUtS?=
 =?utf-8?B?dGIyRXdPV2ExQis5ekN1aHM4NmxUemJyZmR0ejhvaEozdmFNOTFsQjZTVXlK?=
 =?utf-8?B?K3R0ZXMxRGU2amdJeGRiMzJRR2dCZUxQL0R2UkVMaHFJR2FSQ3VYYkx2amx6?=
 =?utf-8?B?UGExa1ZWdVZjbmdhWVNUL1dTelBBdGl4Y3V2Q0N1b3NHK1lkeEFDQUFsVWdU?=
 =?utf-8?B?Wk42RGs1SHJsNGtRam84NmVBeFNaaXgvdlJHaEpMbVhCUnB3YzhFVnkrRUtS?=
 =?utf-8?B?YUxLSWpWV3R1R01ZdGVNVUQ1L1NYcjlyWldGWGh6cWoxaDZmWTBRY3hXem1P?=
 =?utf-8?B?ckxkL2J3K2d0RFlqbGdIR2l4TE1jUUJ5YlZtcjh2aXkwaUp6Mk8zZE9zYXl5?=
 =?utf-8?B?ZC9KdXFEdzArNzNISlU4NmNJNzRhbnNhbVRzckdrbUI5cS9vNE05MGFlc01h?=
 =?utf-8?B?UGFwVzd5Y3NaYS8zQ3ZXdzNRb2c1NFJSQktkdHNUelZZeHlXRS9GQUpZS3or?=
 =?utf-8?B?TVZWRXRmVlhpNVJ2bEkrUE5MVktUOG1PKytEa2hJLzJUQ2RXb1oxc2kwc0pJ?=
 =?utf-8?B?VHJ0cDJtcnkyeEZCZGZHalVTdWZ4NlZYZXFTMG12K2JIdlZYenV0dTNzNWJD?=
 =?utf-8?Q?aMAoPH0vA5CKLbmnZb8Nyz0cAPijzAOE?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5d0a85fb-57be-41d3-253d-08da0b1cc526
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 09:25:42.2041
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: EtnFif9W7DVZJ+k+JRMR8B8Aj5AcVXgczdIWhFNuetF/9b+ZAFRmuPiLuUtECiFkoqwz9/8Z23QzUr3Tm4Ld+Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB6423

On 21.03.2022 09:21, Michal Orzel wrote:
> Header file xen_lds.h defines common macros to be used in arch specific
> linker scripts. Include this header and make use of its helpers.
> 
> Making use of common helpers defined based on x86 linker script
> improves arm linker script with:
> -explicit list of debug sections that otherwise are seen as "orphans"
> by the linker. This will allow to fix issues after enabling linker
> option --orphan-handling one day
> -re-arrangement of ordering/sorting in constructors section to match the
> default linker script

As said in reply to patch 1 - I don't think this is correct on x86 right
now, and hence I don't think you want to propagate the same (at least
latent) issue to Arm.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 09:32:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 09:32:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292836.497309 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWEP6-0006ef-Qd; Mon, 21 Mar 2022 09:32:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292836.497309; Mon, 21 Mar 2022 09:32:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWEP6-0006eY-NS; Mon, 21 Mar 2022 09:32:44 +0000
Received: by outflank-mailman (input) for mailman id 292836;
 Mon, 21 Mar 2022 09:32:43 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWEP5-0006eO-P7; Mon, 21 Mar 2022 09:32:43 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWEP5-0003Sa-KH; Mon, 21 Mar 2022 09:32:43 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWEP5-0003l6-9O; Mon, 21 Mar 2022 09:32:43 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWEP5-0004wD-8y; Mon, 21 Mar 2022 09:32:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=oLwmTgqjR5suZKbwGMde4L23uVUaneV44tRrd9Al7PY=; b=Fkj9AnaNhuypx1w5myNYNPBAfD
	eYT7W4c6NpDcA3pPmLazr4edSsmprOCBvJ5NETZ35w3zL16iQK03lFpSLUsxBIwruhupV9gkCj4iK
	lYiP2iF9djmUy7DjinEX5v/EzrbdrswoOY5ZFHxsr1a8TlcD4i92LMprOAny/7r5bfpE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168745-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168745: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 21 Mar 2022 09:32:43 +0000

flight 168745 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168745/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   20 days
Failing since        168258  2022-03-01 01:55:31 Z   20 days  205 attempts
Testing same since   168738  2022-03-21 02:39:18 Z    0 days    4 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 859 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 09:55:05 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 09:55:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292844.497321 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWEkc-0000lB-Ig; Mon, 21 Mar 2022 09:54:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292844.497321; Mon, 21 Mar 2022 09:54:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWEkc-0000l4-FY; Mon, 21 Mar 2022 09:54:58 +0000
Received: by outflank-mailman (input) for mailman id 292844;
 Mon, 21 Mar 2022 09:54:58 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=dpaY=UA=citrix.com=prvs=07205606a=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nWEkb-0000ky-SA
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 09:54:58 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f50e0e09-a8fc-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 10:54:55 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f50e0e09-a8fc-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647856495;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=o5gvo0WpTiObXSAwcQvUuMS6gGkOEiiLhzfmBLJxljg=;
  b=YXf60LBPnhSYN2qx7mE4WwNsFKKICHTxSY9+uyhJRm1UoyZNZC5JSpxH
   74RxB/21hSr0ebU0sLfVBJSJlN4YKc9Ve8UX6clW5iFV50EwqQxoNpkXb
   Nh+e94SDtyMGAxKWjzfXrl4/rB2fgmDwdQ3UFZ5Lhga59z6d6vT90nXKy
   g=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67147516
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:4ImSfaCbPYFy/RVW/wLjw5YqxClBgxIJ4kV8jS/XYbTApDJ23zUFy
 mAWWTiPPfqMZWqkeo8gYdzn9hgPv8KDmoNhQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vj29Yx6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhT+
 dNftZOvQj4bAZDtlOMxTEgFLyBHaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguw5K8bmJsUHs2xIxjDFF/c2B5vERs0m4PcGg25s2Z0XQ54yY
 eJBRSVLYkueTiZUFUlJKqkvseC0gmDWJmgwRFW9+vNsvjm7IBZK+KP2LNPfd9iORMNUtkWVv
 GTL+yL+GB5yHMOb4SqI9DSrnOCntSHmXIMfEpWo+/gsh0ecrkQDBRtTWValrP2Rjk+lR8kZO
 0ES4jApr6U56AqsVNaVdx+yrWOAvxUcc8FNCOB84waIopc4+C7AWDJCFGQYLoV76olmHlTGy
 2NlgfvLNDp9sLKKQkuvyYq1oTSeJnlIEW47MHpsoRQ+3/Hvp4Q6jxTqR9llEbKogtCdJQwc0
 wxmvwBl2exN0JdjO7GTuAme3mny/sShohsdvF2/Y46z0u9uiGdJjaSM4EOT0/tPJZ3xorKp7
 CldwJj2AAzj4PiweM2xrAclQerBCxWtamS0bbtT834JrWjFxpJbVdoMiAyS3W8wWir+RRfnY
 VXIpSRa74JJMX2hYMdfOtztVJRzlfG5RY2+B5g4i+aihbArKWe6ENxGPxbMjwgBbmBy+U3AB
 XtrWZn1VitLYUiW5DG3W/0cwdcWKtMWngvuqWTA503/i9K2PSfNIZ9caQfmRr1pvcus/VSOm
 /4CZpTi9vmqeLCnCsUh2dVIdg5iwLlSLc2elvG7gcbYe1s4Qj59U6GNqV7jEqQ895loei7z1
 ijVcmdTyUblhG2BLgOPa3t5b6joU4o5pnU+VRHA937xs5T/Se5DNJsiSqY=
IronPort-HdrOrdr: A9a23:Vj/Zk6BEQZnPrz7lHehOsceALOsnbusQ8zAXPh9KJiC9I/b1qy
 nxppkmPH/P6Qr4WBkb6Le90Y27MAnhHPlOkPQs1NaZLXLbUQ6TQr2KgrGSoQEIdxeOk9K1kJ
 0QD5SWa+eAfGSS7/yKmTVQeuxIqLLskNHKuQ6d9QYUcegDUdAf0+4TMHf8LqQZfngjOXJvf6
 Dsmfav6gDQMUg/X4CePD0oTuLDr9rEmNbPZgMHPQcu7E2rgSmz4LD3PhCE1lNGOgk/i4sKwC
 zgqUjU96+ju/a0xlv10HLS1Y1fnJ/ExsFYDMKBp8AJInHHixquZq5mR7qe1QpF692H2RIPqp
 3hsh0gN8N85zf4eXy0mwLk303a3DMn+xbZuCilqEqmhfa8aCMxCsJHi44cWADe8VAcsNZ117
 8O936FtrJMZCmw0xjV1pztbVVHh0C0qX0tnao4lHpES7YTb7dXsMg24F5VKpEdByj3gbpXXN
 WGNPuspcq+TGnqL0ww5gJUsZ+RtzUIb1q7q3E5y4KoO2M8pgE686MarPZv6kvouqhNDqWs3N
 60QZiApIs+PvP+UpgNdtvpYfHHfFAlEii8eV57HzzcZdQ60jT22trK3Ik=
X-IronPort-AV: E=Sophos;i="5.90,198,1643691600"; 
   d="scan'208";a="67147516"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=TmfN7bjtk9km6m1J8ytupsC7yFC0PIZw753RMPHVRjyDW+ChsvBHh22jMqN6sozhjZyw9DzhjETIMZFMEbLB+YhV4XRWjJaw3uwBtw4puduPGqSeKHNHuoBlGC2jtyBDgFZvMvyHoxjm3V+483CxkDyzNpNdMcSNYR/DkHgMkyxqaBASd3/3wwwk2FBUE1iVC6Ii3hTGW9iq5dz1iJetlc5G6AYnB9POVNhKEZZLwhCoVZP0OfmWXCfkNaZVmb1Liqy947XTA2g2A/+gSMielKhzLjeGTwO8M8pBwiwptnKgyEBX/Rn34WZz1V80+5IMmJ2SA+q9bjKuCJXd0Jl0dA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=YGxpGz/5jcyAmpgTvIgBZY79YADEvb/wm6QO7uVsn7M=;
 b=ecQtAYj+aHDpyGbpUvXV9gLFlzdV4qJn5VKoi5A9cVxtuwwftm28TrCKFVb64u0qPgW5PyYuN1bPVMH8wrTOjnCHGoJIt/h6GNHMiAgL45axjkeQsjr2f98cRS3jDVcp9ZaO/qIH0c4LqOgTB6Htw3gKC10fbqgDlEwUFnEjIiUhdkZl0MPk86c8t7BVu44SFSf065L7tPT51x+MZhOtgeaRK9Mu98tmTKy3NIzYopK/2vTq07f8Qu9u3bDCBlEiPkb9hRZ0KoQntw8HQ98/t7xGlxUSb/T/UQl3MXA8TkY5e0kQTageyhdAgNMuDb+dykM4Mxk1La9t0rdZCRJ30w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=YGxpGz/5jcyAmpgTvIgBZY79YADEvb/wm6QO7uVsn7M=;
 b=L9Rp7GbjNx/TvNxiKc+WEDAAtGecRBMgM8saz/KVPk7U3VA3qlTOR2fsDdLH/NKT2nONgYVwfbakUcc66hmLtQvZsWbRpvUzijtF1psw4WjEYqgi5uWnNbgx+2cbjU7U+vQpQHGmvE9AuxZfheA9mugfQp16lTtvCNGUNAmLAhc=
Date: Mon, 21 Mar 2022 10:54:43 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien Grall
	<julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, Wei Liu
	<wl@xen.org>
Subject: Re: [PATCH v2] codeql: add support for analyzing C, Python and Go
Message-ID: <YjhLY1Wb4HF39gIC@Air-de-Roger>
References: <20220307164552.74818-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <20220307164552.74818-1-roger.pau@citrix.com>
X-ClientProxiedBy: LO2P265CA0331.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:a4::31) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5c8ae615-189b-4d99-1e2b-08da0b20d68f
X-MS-TrafficTypeDiagnostic: BY5PR03MB5143:EE_
X-Microsoft-Antispam-PRVS: <BY5PR03MB5143569FC399278F181F509C8F169@BY5PR03MB5143.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(85182001)(83380400001)(2906002)(86362001)(9686003)(5660300002)(6666004)(6506007)(6512007)(82960400001)(8936002)(6916009)(38100700002)(316002)(54906003)(508600001)(66476007)(66556008)(66946007)(186003)(26005)(6486002)(4326008)(8676002)(33716001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?RnlXWkQ1bWloMGNrRlhpSUY0b3FYVUhnUHo3RlBkTlJ6WGk2QWFER28xYjk4?=
 =?utf-8?B?dU9wT2FhOUNwY2d1V2ZFU0wwOWN5bmxreWlNeFhJZWV5ek9hajN6ZVNKZ3hp?=
 =?utf-8?B?UEV1Sk5qenI5NUZ0TUwwMlBQa2dGSmR6NjZRQU1QRko5RURCRXhueGFNMWdI?=
 =?utf-8?B?ejN0emoxN3NNbHFWUVhFbnNzYWFTcE9CNkRlL3BKZ0hKNG9GcDZQWVVMM1VU?=
 =?utf-8?B?My9uWm1Xak1kQzdXSnF4cVIrQjc4Ym1JeWNRV0E3YVR3bmRBZEZFUjA4Y2M1?=
 =?utf-8?B?a0ZjY3VmZWQ1VzRYNnZlVVc2aWM4NEZ5U2JhQkI3eDlCVVBtbSs0a2dNUTho?=
 =?utf-8?B?Vms1bmlOcnQyU3U4dW9FaWdyMTNiS2lWc1RzV0ViQ2hFVk04WHp1K0VYWHNL?=
 =?utf-8?B?S1hLNmIrRzlkems5SFk0RHdEeHFTc09JV2xSRGlHekhHL0RidDgwZ0tYaU5z?=
 =?utf-8?B?TU02L0JPUDlvcXhTd2xTeEkxb1BmMjZUdjU5S09SVXpacXI0WjBTT2wxekFs?=
 =?utf-8?B?SzdydzNBNXFDeHR4N0gvUHp4UzlYWG1FSkszS2ZFT2R4d2UxckxDWHAzemNm?=
 =?utf-8?B?Z3k4Z3RsalJicmJ2dGJnWTFWdFlSeUJVRWFRLy90QURBOEVJTk1pVGFiR1pM?=
 =?utf-8?B?NHNWMmZ0R0VJWGUvbnhHaWtKOERhRFVYSHBnUUlaTGJBbTBUdEFJcTdyZmFL?=
 =?utf-8?B?NzQyMUc5VysrRm0xcy9YT2Vza3U4elZzTENIUGZyckJrWEF1Ry9JWEMrNVRS?=
 =?utf-8?B?UW1zc1VKTkN0cmZ6TUkxOXdyMkcybjM2WXpZYU1HQW5zYkg1Qkt5R3IvcTkz?=
 =?utf-8?B?blorWmpTbTZjbFRjaWNGWnBNY2RPSHlOcncvbWlzMmVIaisra0tZZS9OcGdW?=
 =?utf-8?B?OXAxZmlUNzhaZ1N1eFltTUVBUElmMVVIL0l4QklURW5mU2JuczNna0hYNDJ5?=
 =?utf-8?B?TmswYkJZdWkxVFVGVTdhZ2kwNy9KT1UwN0xRdlgvL2l5ZW9mZk5oanlINW5X?=
 =?utf-8?B?MGF6V2pQR29KUk5jTzE4Ym80eXRHZWYwMzE3dEFmSFhKNERXTTlXcU4yZzBW?=
 =?utf-8?B?V0dpVG9aWVBZZjlrbkZ0VEprTDJLUFgyQnQyRkM1TEUvTmp4Rkl1bXA4TmFh?=
 =?utf-8?B?ZWo5clpBVDdSOVJQeGdXcWpzSEtZUXZKMnB0Vk5UNGk4VHBxYlZwdSt4SFky?=
 =?utf-8?B?em4rOUJkYUdpZ2RVajdiK0F1MGxrMGNIZUhqekw3TjI2MW8wMkF4UUlhVnVO?=
 =?utf-8?B?cnZqeSszc1NCVlpQYmw5TXJjVFFzenlqdmlEYWswYTRPZjgwYWZ4VkRvRjNB?=
 =?utf-8?B?TmgwQi9JQWhoTUp1a2h1RzNtaFd0aXAyT2VQZ2tUK2J2WWZiS3FYdnkwWi9W?=
 =?utf-8?B?bDM5aUpuRDNCYWVZeHY5dmUzUWFnTGtUMWlEd25ndHlZZGJBY0F1Y0F6TTN4?=
 =?utf-8?B?QkViRitBL3VsbHl3RjlrT1RJbkdCMFgzVnNOcVJmVzR5dG05UmhPaTdwbmFG?=
 =?utf-8?B?V0pXUGZoVUg4d1ZhUlVMTHBBM25FUUwvajJLOUhCbU53bFY3NEptNEZidXpp?=
 =?utf-8?B?aGJmUmdKTUFuUVZJa3RmWlBxRVY2aTdkSGJaaGs4UVFoOVgxbEJ0dXIwRHU0?=
 =?utf-8?B?bkpHQUF1dEhTNytXQWV4dFFaemFFU1pkbXEyU2Jic0h6bG5jelJId0ZKUzJT?=
 =?utf-8?B?SjdQdmpUK0tZWStkWXBza1F2alU4Y29hbWNyYUZpV3dXMmxFcCthZkgzSlhn?=
 =?utf-8?B?UHFSVlFkTU50UUQ4Mi9XYUFKNWJwbWJyRkJ1YTd5S0VaSEdPU0xRUjJUT0M0?=
 =?utf-8?B?WkRjVEFSU3lCVDNDQUZ0Qkh0SCtIK01LWWl3TGNSakFmL3RiSEJadk1nVXhi?=
 =?utf-8?B?RmZ1ME1TcjlSNkFkdFBIMHRYdFdCZ2JZR0JqM1FHcTBVRndCK0JKMjVYaEtl?=
 =?utf-8?Q?DibfXdIqWIc8XOg328pu3I4VHnSmbX8/?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 5c8ae615-189b-4d99-1e2b-08da0b20d68f
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 09:54:49.4627
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 8v4FzpgIvsqL1M1x5z4LJzVtJr0U4cN1UoHK7sqZPbBiHbmNDznR909wvxwHqy/BFXbBdR9mfEG7gfjV9Asxng==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR03MB5143
X-OriginatorOrg: citrix.com

Ping?

On Mon, Mar 07, 2022 at 05:45:52PM +0100, Roger Pau Monne wrote:
> Introduce CodeQL support for Xen and analyze the C, Python and Go
> files.
> 
> Note than when analyzing Python or Go we avoid building the hypervisor
> and only build the tools.
> 
> Requested-by: Andrew Cooper <andrew.cooper3@citrix.com>
> Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
> ---
> Changes since v1:
>  - Rename to note it's x86 specific right now.
>  - Merge the ignored path patch.
> ---
> It's my understanding that we need to force the checkout action to
> fetch 'staging' branch, or else for the scheduled runs we would end up
> picking the current default branch (master).
> 
> Maybe we want to remove the scheduled action and just rely on pushes
> and manually triggered workflows?
> ---
>  .github/codeql/codeql-config.yml |  3 ++
>  .github/workflows/codeql-x86.yml | 60 ++++++++++++++++++++++++++++++++
>  2 files changed, 63 insertions(+)
>  create mode 100644 .github/codeql/codeql-config.yml
>  create mode 100644 .github/workflows/codeql-x86.yml
> 
> diff --git a/.github/codeql/codeql-config.yml b/.github/codeql/codeql-config.yml
> new file mode 100644
> index 0000000000..721640c2a5
> --- /dev/null
> +++ b/.github/codeql/codeql-config.yml
> @@ -0,0 +1,3 @@
> +paths-ignore:
> +  - xen/tools/kconfig
> +  - tools/firmware/xen-dir/xen-root/xen/tools/kconfig
> diff --git a/.github/workflows/codeql-x86.yml b/.github/workflows/codeql-x86.yml
> new file mode 100644
> index 0000000000..a3ec6236c4
> --- /dev/null
> +++ b/.github/workflows/codeql-x86.yml
> @@ -0,0 +1,60 @@
> +name: CodeQL x86
> +
> +on:
> +  workflow_dispatch:
> +  push:
> +    branches: [staging]
> +  schedule:
> +    - cron: '18 10 * * WED,SUN' # Bi-weekly at 10:18 UTC
> +
> +jobs:
> +  analyse:
> +
> +    strategy:
> +      matrix:
> +        language: [ 'cpp', 'python', 'go' ]
> +
> +    runs-on: ubuntu-latest
> +
> +    steps:
> +    - name: Install build dependencies
> +      run: |
> +        sudo apt-get install -y wget git \
> +          libbz2-dev build-essential \
> +          zlib1g-dev libncurses5-dev iasl \
> +          libbz2-dev e2fslibs-dev uuid-dev libyajl-dev \
> +          autoconf libtool liblzma-dev \
> +          python3-dev golang python-dev libsystemd-dev
> +
> +    - uses: actions/checkout@v2
> +      with:
> +        ref: staging
> +
> +    - name: Configure Xen
> +      run: |
> +        ./configure --with-system-qemu=/bin/true \
> +                    --with-system-seabios=/bin/true \
> +                    --with-system-ovmf=/bin/true
> +
> +    - name: Pre build stuff
> +      run: |
> +        make -j`nproc` mini-os-dir
> +
> +    - uses: github/codeql-action/init@v1
> +      with:
> +        config-file: ./.github/codeql/codeql-config.yml
> +        languages: ${{matrix.language}}
> +        queries: security-and-quality
> +
> +    - if: matrix.language == 'cpp'
> +      name: Full Build
> +      run: |
> +        make -j`nproc` build-xen build-tools
> +        make -j`nproc` -C extras/mini-os/
> +
> +    - if: matrix.language == 'python' || matrix.language == 'go'
> +      name: Tools Build
> +      run: |
> +        make -j`nproc` build-tools
> +
> +    - uses: github/codeql-action/analyze@v1
> -- 
> 2.34.1
> 


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 09:55:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 09:55:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292847.497332 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWElJ-0001Hl-Rp; Mon, 21 Mar 2022 09:55:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292847.497332; Mon, 21 Mar 2022 09:55:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWElJ-0001He-On; Mon, 21 Mar 2022 09:55:41 +0000
Received: by outflank-mailman (input) for mailman id 292847;
 Mon, 21 Mar 2022 09:55:40 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=PUce=UA=cantab.net=dvrabel@srs-se1.protection.inumbo.net>)
 id 1nWElI-0001Dd-O4
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 09:55:40 +0000
Received: from smarthost01b.ixn.mail.zen.net.uk
 (smarthost01b.ixn.mail.zen.net.uk [212.23.1.21])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 103bbc10-a8fd-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 10:55:39 +0100 (CET)
Received: from [82.70.146.41] (helo=pear.davidvrabel.org.uk)
 by smarthost01b.ixn.mail.zen.net.uk with esmtps
 (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1)
 (envelope-from <dvrabel@cantab.net>)
 id 1nWElH-00040p-1H; Mon, 21 Mar 2022 09:55:39 +0000
Received: from apple.davidvrabel.org.uk ([82.70.146.43])
 by pear.davidvrabel.org.uk with esmtp (Exim 4.92)
 (envelope-from <dvrabel@cantab.net>)
 id 1nWElF-0001mL-Ub; Mon, 21 Mar 2022 09:55:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 103bbc10-a8fd-11ec-8fbc-03012f2f19d4
Message-ID: <faae606d-0cb3-43a7-5acd-64da371cc2fe@cantab.net>
Date: Mon, 21 Mar 2022 09:55:39 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-GB
To: Raphael Ning <raphning@gmail.com>, xen-devel@lists.xenproject.org
Cc: Raphael Ning <raphning@amazon.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Wei Liu <wl@xen.org>, David Vrabel <dvrabel@amazon.co.uk>
References: <6b84a20b2753130cc62406a0fd14d2708f6f504b.1647455219.git.raphning@amazon.com>
From: David Vrabel <dvrabel@cantab.net>
In-Reply-To: <6b84a20b2753130cc62406a0fd14d2708f6f504b.1647455219.git.raphning@amazon.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-SA-Exim-Connect-IP: 82.70.146.43
X-SA-Exim-Mail-From: dvrabel@cantab.net
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on
	pear.davidvrabel.org.uk
X-Spam-Level: 
X-Spam-Status: No, score=-1.2 required=5.0 tests=BAYES_00,SPF_SOFTFAIL
	autolearn=no autolearn_force=no version=3.4.2
Subject: Re: [XEN PATCH] evtchn/fifo: Don't set PENDING bit if guest
 misbehaves
X-SA-Exim-Version: 4.2.1 (built Wed, 08 May 2019 21:11:16 +0000)
X-SA-Exim-Scanned: Yes (on pear.davidvrabel.org.uk)
X-Originating-smarthost01b-IP: [82.70.146.41]
Feedback-ID: 82.70.146.41

On 16/03/2022 18:38, Raphael Ning wrote:
> Currently, evtchn_fifo_set_pending() will mark the event as PENDING even
> if it fails to lock the FIFO event queue(s), or if the guest has not
> initialized the FIFO control block for the target vCPU. A well-behaved
> guest should never trigger either of these cases.

Reviewed-by: David Vrabel <dvrabel@amazon.co.uk>

David


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 10:00:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 10:00:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292850.497343 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWEpx-0002pL-FU; Mon, 21 Mar 2022 10:00:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292850.497343; Mon, 21 Mar 2022 10:00:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWEpx-0002pE-C3; Mon, 21 Mar 2022 10:00:29 +0000
Received: by outflank-mailman (input) for mailman id 292850;
 Mon, 21 Mar 2022 10:00:28 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=dpaY=UA=citrix.com=prvs=07205606a=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nWEpw-0002p8-3e
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 10:00:28 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ba32e7a5-a8fd-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 11:00:26 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ba32e7a5-a8fd-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647856826;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=4RckOyHuQ5kYI0KTpTlxEdTuSeWl8kDZa4B0qCmjOyw=;
  b=ZNnrwGz0N5kVybRa33QUnR+g3V101UZgNVkA+nASIXz+XEhUCb6hFPh+
   OvKdong1Iq4H1tSKrTsF1E9ej+QGlJ0J/LLkmff/iw96tFzjc+pXD5o6y
   GspvpbnmsAEJeWry84ENh3TOfDwiGq2w9MHyXg3gwnErtca6Rj+MUoutU
   Y=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66745199
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:A0pLa6nPgzHnKsQaygorzzro5gwGJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xIaD2nSbv7YN2T8f9snOY2/9EwCvcPRnIBrSFBo/npnRCMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiWVrV4
 LsenuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYGRclNJHtksshTzpTTCdAOLJcpIDKCC3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3oHZvwCufFf87aZvCX7/L9ZlT2zJYasVmQ6iBO
 5dAOGsHgBLoXS8VFFkFCosHjMjzuWTdSC1qolDFqv9ii4TU5FMoi+W8WDbPQfSJSN9Tk0Ldp
 GvA/nj+GAoyKtOS03yG/2iqi+uJmjn0MKoWFbul5rtpjUeVy2g7FhIbTx24rOO/h0r4XMhQQ
 2QQ/jQrhawz71CwCN38WQCo5nKJoHY0X9tWDv1/4gWKwan8/QmUHC4HQyRHZdhgs9U5LRQh0
 VuImZXoQz9utrK9RneU97PSpjS3UQAcPWUFaAcHQBED7t2lrIJbpgLCSJNvHbC4ivXxGCrs2
 HaaoS4mnbIRgMUXkaKh8jj6bymE/8aTCFRvv0OOAzzjvlgRiJOZi5KAuUjX58phJqmlUnqK4
 346nteEsN8DJMTY/MCSe9klELas7veDFTTTh19zApUsnwiQF26fkZN4u28nehowWioQUXqwO
 RKI51sNjHNGFCHyBZKbdb5dHCjDIULIMd3+Hs7ZYdNVCnSaXF/WpXo+DaJ8Mo2EraTNrU3dE
 crAGSpPJSxDYUiC8NZRb71BuYLHPghkmQvuqWnTlnxLK4a2an+PUqsiO1CTdO0/567siFyLr
 4kPbpPTkkUGC7yWjszrHWk7dw1iEJTGLcqu95w/mhCrfGKK513N+9eOmOh8KuSJboxel/vS/
 2HVZ6Or4AGXuJEzEi3TMioLQOq2Bf5X9CtnVQRxbQfA8yVyOu6HsfZAH6bbiJF6rYSPO9YvF
 KJbEyhBa9wSIgn6F8M1NsCs8tY9KEz12Wpj/UONOVACQnKpfCSQkvfMdQrz7igeSC2xsMo1u
 bq70Q3HB5EEQmxf4Az+MppDE3vZUaAhpd9P
IronPort-HdrOrdr: A9a23:vQWcVaPv/ZwJfcBcTyP155DYdb4zR+YMi2TDiHofdfUFSKClfp
 6V8cjztSWUtN4QMEtQ/uxoHJPwO080kqQFnLX5XI3SJzUO3VHHEGgM1/qB/9SNIVyaygcZ79
 YdT0EcMqyAMbEZt7eC3ODQKb9Jq7PmgcOVbKXlvg9QpGlRGt9dBmxCe2Cm+yNNNW177c1TLu
 vi2iMLnUvpRV0nKuCAQlUVVenKoNPG0LrgfB49HhYirC2Dlymh5rLWGwWRmk52aUIE/Z4StU
 z+1yDp7KSqtP+2jjfaym/o9pxT3P/s0MFKCsCggtUcbh/slgGrToJ8XKDqhkF/nMifrHIR1P
 XcqRYpOMp+r1vXY2GOuBPonzLt1T4/gkWSvmOwsD/Gm4jUVTg6A81OicZyaR3C8Xctu9l6ze
 Ziw3+Zn4A/N2KOoA3No/zzEz16nEu9pnQv1cQJiWZEbIcYYLhN6aQC4UJuFosaFi6S0vFqLA
 BXNrCc2B9qSyLbU5iA1VMfg+BEH05DUytue3Jy9PB8iFNt7TJEJ0hx/r1qop5PzuN5d3B+3Z
 W2Dk1ZrsA/ciYoV9MOOA4ge7rANoWfe2OEDIqtSW6XYZ3vfUi976LK3A==
X-IronPort-AV: E=Sophos;i="5.90,198,1643691600"; 
   d="scan'208";a="66745199"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=FH0GUeUe9+XOTHqYtAraBj4C2XnrHeoM96AcgSsK6b1nc7vdtInAi9j/B3XqkqFITd1+oXJFfAlPpWPTEqNAh+06GcJo5wEQB6KCxdAcoCtzcahmTM7lByxJwjcqOmG74ANE9rFI70JW84OZ+Ypp9bVuiBM/oZarVsu1VP1uacPKPEztsFwuEattbPIjEKVdJPgY+XNmBlUwo7ebtKvbOwfzWU1LypnvxDWTT0KUWoY6uu7z5NOY5dX/rd5QBgQBYDJXoOJ2pAmFyP2A7EZHGxpBnRd4L+9I+cvnrcvYzjCvyzOSVJ+CrYCZ1JxoThKBcQJsP9ZOVDaJIHT0u552Bg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=LJxLXOd/g+NcgzFBMKk/6O/8OuPEssPXeeYfnKDPtG0=;
 b=A50FAf01qR7bF9Glx54iJv603uLfyzarwcGG7uNUmVlxIhelTJUzuRsK51wYIH8ZOWuV/CTKH5V4t8Jc/YHEozMFC7D31/2vt2eK7HZxYss+ha4HrIPhibc59Om8xtVhte8bLo8wDptFDzYXrMFjN6vOWbpXU/3R+FvH22TDA61EREtUaat0ZFW87QARNaHHrAyJTN5G8MWyoCeMLczVWEK6b9KQlIyFpdJFwHyoYfgxp4ARUmtV4yZDFZ03UfBgJSTphWCYb5yn1pIeI6gJrqWe1mzitKFfNFQ7aRk+HsTplId7ww+KD+3bql750poKtKHLkY13rgrA2uElElFQmA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=LJxLXOd/g+NcgzFBMKk/6O/8OuPEssPXeeYfnKDPtG0=;
 b=hRlQ2QNydZbs7MZMO1KvtkrBRuRkLZwBUG42Ek518GlXXVSXk9JCG38xpjCQ7vE6jramEwoBU8J3HQusSfaqVqER5N8dAFW1eWsVrb2GU9mMpRDLlENrDtGn2a19wC6NTe2unGeWHN4T1WhIk1rA6k12Qe9IewvCcUyZp3upkl8=
Date: Mon, 21 Mar 2022 11:00:13 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Colin Ian King <colin.i.king@gmail.com>
CC: Jens Axboe <axboe@kernel.dk>, <xen-devel@lists.xenproject.org>,
	<linux-block@vger.kernel.org>, <kernel-janitors@vger.kernel.org>,
	<linux-kernel@vger.kernel.org>, <llvm@lists.linux.dev>
Subject: Re: [PATCH] xen-blkback: remove redundant assignment to variable i
Message-ID: <YjhMre8vckI1HbSS@Air-de-Roger>
References: <20220317234646.78158-1-colin.i.king@gmail.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <20220317234646.78158-1-colin.i.king@gmail.com>
X-ClientProxiedBy: LO2P265CA0241.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:8a::13) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 889f5f94-f5a8-48a9-f05d-08da0b219ab6
X-MS-TrafficTypeDiagnostic: PH7PR03MB6944:EE_
X-Microsoft-Antispam-PRVS: <PH7PR03MB6944166296D4E2C6802A04878F169@PH7PR03MB6944.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(2906002)(9686003)(6512007)(6666004)(33716001)(86362001)(83380400001)(66946007)(66556008)(8936002)(66476007)(85182001)(4326008)(508600001)(8676002)(6506007)(26005)(82960400001)(186003)(6916009)(4744005)(5660300002)(316002)(6486002)(38100700002)(129723003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?OGMvakdRM2dwR1ZGQUk0SVIwclhVdFpwaTRVQ0lhWUMxbDFabEYxOHcxa0tI?=
 =?utf-8?B?OTg4SEpwOC9meDNPcHVFYWVyVFEyZ0Q4eXFSSk9MZnVYMzNNOTRIeWtVMEpF?=
 =?utf-8?B?UERrWnAyZkYyVnRCRWVsMzF6bG9YU0NhdzR4Q3RvSXpDa21LcDZLTzRQVTRC?=
 =?utf-8?B?cFF2cCtqMDlLSXVoR2pDSUErVGo2aDdZRlJyNlhBM1BRS3FoWUlnR1lJMGpG?=
 =?utf-8?B?YjZidFRSV1BlN1pkVitkVldrUGhDaEplMkdHem9Cbk5ZSk41WjNCOXN3MCti?=
 =?utf-8?B?UEF1MDhRK1hBdkJnRWlTdy94ZVZZWjZrMUZkTElyd1QvR085aFhZVFdkdlpL?=
 =?utf-8?B?NFJFdnA3NE5Gazk4M253Sldrb0JlTXBQYTNHd1hRVndlUEF5bllNMmtLZllQ?=
 =?utf-8?B?U1o1YjFLUHNCNEdsQ1BNS2UzRlIwZTBYN3prNGZoM2xmU202d1NhUUxQby8w?=
 =?utf-8?B?ZG1BMVRqK1hlTDVRTjZQSzF1UzI5RGFjWXdFQWJadC9UYzBEalJpdjFGYUNZ?=
 =?utf-8?B?bWVEQ0N1bGxzNloxMVNIbmdCdmp4NmUyUDhQMVlYOFNBUmxkT1hPRjdPcGxk?=
 =?utf-8?B?d3VlY2ppS01GT2RkMEVQYWpTQnZETTRKMmtYemNwMWx3dVpaQXozcHg4aWdO?=
 =?utf-8?B?ekRxTkQxblUzT2kwMG9KbnhNK2h2TXFGWmNLN2Z4NlJDcDhhTVlkbTVGaDU3?=
 =?utf-8?B?UEwvaHlFTEp3d2tHR1hIZklEeTdlUDNIbHVET3gwRXp0YzZxNXNiM0FmL3Rt?=
 =?utf-8?B?VElIMlF3dGw3ZjM4Rzg1K0JsbU4vUzhMWTA3T0RSR25HYzNtYld3YWVYU2gz?=
 =?utf-8?B?QnBNdlo3Nk52RzBNQW10L0ltY3dJL0h2NUR1UTdkT0pUKy9WN1V1SGh3eGlJ?=
 =?utf-8?B?TVorT2o4eDZkdFJ2MGNSS0czVlBZek5sRFVTOEVJUDZVUWY5M0JLam5PSTB6?=
 =?utf-8?B?ZWI5N25IRzBndE5rY2ZJK2pQbm5YWVJTU1Y4S240N0hKanc5RWV0YlJZc296?=
 =?utf-8?B?cGpNcWxyNXJNRTQvSktudlRlVzl0ZlozaE83ZDB1ZlNhZ3dUQXJzamo2UDYz?=
 =?utf-8?B?VHUyY1BIbnQwMzYvbnZpb0FqLzl2UFZaQ0tkN1dQWVFDeXRLcXAzM3NleCt1?=
 =?utf-8?B?aGpXcDZrWG1UUy9WSGNLVUZZNmpsZVFkdUFNU2tGV2s0MUlyY050bThCNVJY?=
 =?utf-8?B?S1lQVC9wcllJdDVKSStKMHZwWWQzaWVNbS84MmRkelFSUEtCdmZrUm1kU2F5?=
 =?utf-8?B?N1FQMHJMQWhRcWV2RThGYXVRRWRpeFdMZXVYNW40bVpOalVTODRmRjBNYU02?=
 =?utf-8?B?am85SGY2ZUFCQU93MkZOZ213NVNBWS93ckpOL2xIUkpOSzdGSTlYVFd3OFI3?=
 =?utf-8?B?cEZVNUlwbVhnRmw1QzI5VGRkbXAwVE1iSjlLVVREOE5EbHJ6cHBkcVhjcEVZ?=
 =?utf-8?B?T1NjbTdKK0JMaGZnOWdkUjRjSDRJQW16MGg0cTNiN2I2RVVkdHZFQ3NqV1RV?=
 =?utf-8?B?QXQ2dGp0WlJWSmZiaFREMFNRWWRFdE8vYll3MUx1NHg1OEZjUm5mZ3lEZFlt?=
 =?utf-8?B?c0FCdE9Yb3NYOFhqR251VXovOFpoeDM2S0ZTTUFjVVFlaHNMU0JVay9LSE8z?=
 =?utf-8?B?d2FJTThtYVM0YlUxVnV4SENZbmk3UWt1YnZGUXpOdzkyWnEyMGZoQ210bmY5?=
 =?utf-8?B?cDQ5Z3JrMmRrOHNObVBUc0hKcVpwdlBrc0JKeUZiVjJ5MXVDaHFRd0dncmtw?=
 =?utf-8?B?ZStJZGFBQURXcHNFZHQyaEhnbTF6WUY0MHdLRnlCYWcyblJXT1lUc1oybW1j?=
 =?utf-8?B?T1VmcXpvTjNRUXV4ajFZTW9PU3ZaOHVHVWhtS1RJallTcFhSelo1aklsVUNO?=
 =?utf-8?B?QmxPOFJWY0xDcnNFNFpITURTamJLbUZvTE5ZTE5wMW43TDE5TXdaMFBQWTla?=
 =?utf-8?B?OVFuRzJQOHBUNVlLSTRVNFJIcGxycXZPK21VOURUTUVNeW9UdnpBMDJra0Nk?=
 =?utf-8?B?aGdHalI4dXdRPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 889f5f94-f5a8-48a9-f05d-08da0b219ab6
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 10:00:18.4946
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: CSxd25QMo8d1nkDYATJGnZ8HAwfUk1uR9jct47LiURPY7APTQhZEWmnH0+gTsdkiPbgzEUQb9E+hBeBygge2Cg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR03MB6944
X-OriginatorOrg: citrix.com

On Thu, Mar 17, 2022 at 11:46:46PM +0000, Colin Ian King wrote:
> Variable i is being assigned a value that is never read, it is being
> re-assigned later in a for-loop. The assignment is redundant and can
> be removed.
> 
> Cleans up clang scan build warning:
> drivers/block/xen-blkback/blkback.c:934:14: warning: Although the value
> stored to 'i' is used in the enclosing expression, the value is never
> actually read from 'i' [deadcode.DeadStores]
> 
> Signed-off-by: Colin Ian King <colin.i.king@gmail.com>

Acked-by: Roger Pau Monné <roger.pau@citrix.com>

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 10:05:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 10:05:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292865.497372 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWEvC-0004JH-H6; Mon, 21 Mar 2022 10:05:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292865.497372; Mon, 21 Mar 2022 10:05:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWEvC-0004JA-Db; Mon, 21 Mar 2022 10:05:54 +0000
Received: by outflank-mailman (input) for mailman id 292865;
 Mon, 21 Mar 2022 10:05:53 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=dpaY=UA=citrix.com=prvs=07205606a=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nWEvB-0003SL-Jn
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 10:05:53 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 7bd58f63-a8fe-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 11:05:52 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 7bd58f63-a8fe-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647857151;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=lIYdkrDN+PoNgoEibvd3dukVof0EVRd2O3ljM3bCXp4=;
  b=ELqAHQxQ6W8KmWgJegwh3s+X6z+/csYLATwes7lVMCjS5Y8hGZ2yTvH+
   E8QqJNoDhXPth83WECfWoIc6iRIHBt8PlMWlO6aeCRlbfMms+59pskqWS
   R5Brbsn72irauezJiH/nRmraS1LPkYg4fGRA3Cg8yOgZl9j3SEH79rgoK
   E=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66664893
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:PaecO62bypCOpHoB6/bD5URxkn2cJEfYwER7XKvMYLTBsI5bpzwHn
 2QXXWmDaPbZazb2Ktt/boi39EwF6JbWytNiHlNspC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUy2IDga++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /1rjLOeb1gTNZfH2/4SDgBeOTggPINJreqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHxO4wSoDd4xCzxBvc6W5HTBa7N4Le02R9u2J4QQaaPP
 KL1bxIoKzT5TkNjO2sFK5J9raSYmn/OMBRh/Qf9Sa0fvDGIkV0ZPKLWGMHOZtWASMFRn0CZj
 mHL5WL0BlcdLtP34TiK6HW3ncfUgDj2HokVEdWQ8v9snU3WxWEJDhASfUW0rOP/iUOkXd9bb
 UsO9UIGpLg480GDTdTnWRC85nKH1jYYWtxNA6gw7AaGyYLK7AuDQGsJVDhMbJohrsBebTAt0
 FCNnpX7BTVpv5WSU3uW8rrSpjS3UQAfKnUDfmkDVhcf5Mf4o5AbiQjGRdJuVqWyi7XdCTz2h
 jyHsiU6r7ESltIQkbW2+0jdhDChrYSPSRQ6jjg7RUr8sFk/PtT8IdX1tx6Ltp6sMbp1UHGnh
 VcqvZek59oFTouCyTWLavxTHZ+msqPt3CLnvXZjGJwo9jKI8nGlfJxN7DwWGHqFIvroaheyP
 haN5Fo5CIt7eSLzMPQpO97Z59ECl/CIKDjzahzDgjOiiLBVfRTPwixhbFX4M4vFwBl1yvFX1
 Xt2nK+R4Zcm5UZPkWHeqwQ1i+ZDKsUCKYT7H8yT8vhf+eDCDEN5sJ9cWLd0Usg37bmfvCLe+
 MtFOs2Bxn13CbOiPXmOqddKfQlRfBDX4KwaTOQNK4a+zvdOQjl9W5c9P5t/E2Cao0ilvriRp
 SzsMqOp4FH+mWfGOW23hoNLM9vSsWJEhStjZ0QEZA/ws1B6ONrHxPpPJvMfIOh8nMQ+nKEcc
 hXwU5jZahi5Ym+coGp1gFiUhNEKSSlHcirVZnv7OmdjJ8A8L+ELk/e9FjbSGOA1JnPfneM1o
 qG61xOdRpwGRg94C93RZu7pxFS01UXxUsorBSMk/vE7lJ3QzbVX
IronPort-HdrOrdr: A9a23:UnSFcqtqOFEbpnnvje9oHsOV7skCkoMji2hC6mlwRA09TyXGra
 6TdaUguiMc1gx8ZJhBo7C90KnpewK7yXdQ2/htAV7EZnibhILIFvAZ0WKG+Vzd8kLFh4tgPM
 tbAsxD4ZjLfCdHZKXBkXmF+rQbsaG6GcmT7I+0pRodLnAJV0gj1XYDNu/yKDwGeOAsP+tBKH
 Pz3Lshm9L2Ek5nEPhTS0N1FNTrlpnurtbLcBQGDxko5E2nii6p0qfzF1y90g0FWz1C7L8++S
 yd+jaJq5mLgrWe8FvxxmXT55NZlJ/IzcZCPtWFjowwJi/3ggilSYx9U/mpvSwzosuo9FE2+e
 O86SsIDoBW0Tf8b2u1qRzi103J1ysv0WbrzRuijX7qsaXCNUQHIvsEobgcXgrS6kImst05+r
 lMxXilu51eCg6FtDjh5vDTPisa2HackD4Hq6o+nnZfWYwRZPt6tooE5n5YF58GAWbT9J0nKu
 9zF8vRjcwmPm9yV0qp/lWH/ebcHUjaRny9Mwo/U42uonRrdUlCvgolLJd1pAZEyHo/I6M0kN
 gsfJ4Y0I2mdfVmH56VNN1xMvdfNVa9NC4kEFjiaGgPR5t3c04klfbMkcEIDaeRCds18Kc=
X-IronPort-AV: E=Sophos;i="5.90,198,1643691600"; 
   d="scan'208";a="66664893"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=V95fT5xbOcX055NK9aVsuACjKcwU1ykfnsJfgtzWz1xh36vRkmD9MMN9Di8imvhwTUSz66/KlrA+7w10COwzLy/WSZyD1H7KkeM7CnMVD1e/KyGfkOsVqSxOvBjzONAuyBqOGs7jMtGCdFIoLenRHyBBdbNv5CCt1suai5w4QH5TPx+PYkQkEockCTgTchPwQh97sKzsSenIVjAZO6PbSWWOJ+41h13C3evJUtdspHQznTGRONapbhh6nybkMW6U5Gw/yVurbY2L8CAcciMxXdVS6Nxog7wCnLZ7Uhxr9sJ+s6RI8PQS+RpUya974iKCplufFpp2UuZDfIa6T9K+Hw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=z1dHHPlb1CLo6A4GiwERElpYODVOZKRQMD0jDBxG774=;
 b=Sz2/YOvdM/op/KpVTr4IAbA1ukEkd3dGm4PGWYSwt6IHXflDnG+vZDC0MhlVE7ev64ibBms1HJBHmyG43Srjv9zGRNUWPfFR9a9DUnZM06nKUh6SVvHepXLvjfswFOmK+7I3fmD6fKCDN2ISOPCd+WwhYAQj4wF+tfjduRVfTEhn60UN/WwlWBJe0dNUvH9Y+V6CvbklyRhkE1HataOWPmmrZviRvyDnbF504rzvjazt7cQzeFA6jhnpfH0Ry/5ritH/6OC/Ucxygv5hmekPa1zjcEWKwqR9Ofl0rPK5+pHghZwVBy+NP5KjiALPAiUNgs5/LuHXINyJyeq4rjdarw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=z1dHHPlb1CLo6A4GiwERElpYODVOZKRQMD0jDBxG774=;
 b=sWxgzsGQ0FQaC+xYF5bisDf0GgrA5jvI4c3v+UBt2iYhqw/jM+IhX1cuLu79ZW/5tM5hs5pMUl9ySMmFPWvhO2+xFOgpAcng1yuQLTc7op2rfVVG866Ver9JHTqzgg6LuHM2i5PuDc1baf64VFH67yvWxP0CK29+RV+6nBlaPAg=
Date: Mon, 21 Mar 2022 11:05:22 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Dongli Zhang <dongli.zhang@oracle.com>
CC: <linux-block@vger.kernel.org>, <xen-devel@lists.xenproject.org>,
	<boris.ostrovsky@oracle.com>, <jgross@suse.com>, <sstabellini@kernel.org>,
	<axboe@kernel.dk>, <linux-kernel@vger.kernel.org>
Subject: Re: [PATCH 1/1] xen/blkfront: fix comment for need_copy
Message-ID: <YjhN4neEJMs04JEN@Air-de-Roger>
References: <20220317220930.5698-1-dongli.zhang@oracle.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <20220317220930.5698-1-dongli.zhang@oracle.com>
X-ClientProxiedBy: LO2P265CA0324.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:a4::24) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 4f66fc39-fdb0-4bf7-b9fa-08da0b225289
X-MS-TrafficTypeDiagnostic: DM5PR03MB3273:EE_
X-Microsoft-Antispam-PRVS: <DM5PR03MB327327426804C03549FF25F28F169@DM5PR03MB3273.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(85182001)(6506007)(8936002)(6512007)(9686003)(5660300002)(86362001)(33716001)(6666004)(83380400001)(4326008)(6486002)(26005)(186003)(66556008)(66946007)(38100700002)(82960400001)(316002)(66476007)(8676002)(6916009)(508600001)(2906002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?MDZ2ek1PMDZ4NlpkVE8wYjZwNkljTGpVK1Zkb0VRLzk5VkZ6Nmc2d2FhWTdt?=
 =?utf-8?B?a3FYZkl1d0pUUlVwQ1l5SjJPS25ISHZUOWQ2L3l3d2NGZXJzUzQvYUs0SWR0?=
 =?utf-8?B?Z3B2NTZZOWgwOURTZEQ1TmpzamFsTnU1Z3hnSkFYTFJhOW1jNk9aVzl2d3Rk?=
 =?utf-8?B?VXpRWXpHSXcyZkJLNzhKaUlyNVFhRjV5bEJGRTExSkhTdWxoMTgrK2E4N3pX?=
 =?utf-8?B?ZDkwdlpDQ1paT2tyZnlKNVJEa2ZpdlBDcUx6TjhRWFpxTFdzMGZBZWxoNkhp?=
 =?utf-8?B?dEpmN0pvaEpvZHFZRHBKbDlhRVdCSUxSeC9JZ2U1UzhWTGFGZXY2dnJ2dU1j?=
 =?utf-8?B?MUNJM2RYRCszTnBiOG5JWWtJRnlxaE1pd0w0bXFXUEZZM282Q2hqdXhzcFhz?=
 =?utf-8?B?dlBpaWVBRkpCSkE5aHU2R1g3MTRXWGZnUTIyajJ4U1VqZTlReXFUVGFHWEtj?=
 =?utf-8?B?WTR2ZVJsWlB4QksvMnBocWgvV0RvNnduWnIvb0g0enRTOERxcWdKVTJNT2dR?=
 =?utf-8?B?OFJES3p5dStxUmtTUGpRTHdPOUVJTUM4RHlLbzlPRUZFT09FUjEzVWJMeThz?=
 =?utf-8?B?akJqYXcxcS8rYkRaNjJya0Z3MHZUcWt2ekxkK0U1VUZSNmM1amlnTmNmU1VM?=
 =?utf-8?B?TEZiNnFUd01TeEtzVWhZa3B2UU4rTm1qR1F6Vm5JNHZYSzJ3Mjg0Z1pZNjhZ?=
 =?utf-8?B?ejRwVXdMRWhYWnpxdDNYVFYxWGNBSHdSTERMMHVSQlBoSnVuNHRvRi8rSnU4?=
 =?utf-8?B?QzNMejB4U1hmaml6VlZKU3lHbWJ6bGhsc0pUaE1Lcmp6RS80aFZRZEE5SEpQ?=
 =?utf-8?B?dVcxN2NrQkhLcTYxYm8zRnVLeFNLc0tDVHdvZzdOMTlOYnRXTkxFbjJiUDA3?=
 =?utf-8?B?NkZxaTZpTjJqdjNUVys4VnBqaEFBTVlHUEVzMXZuQjFBc3dNSjVxSmdBYmRZ?=
 =?utf-8?B?S1VnWE5GZWw2ZVN3ZzRoSFNiMmJFc0gwekorRXpoRnZWOTRFYlVYbXQ3SEla?=
 =?utf-8?B?bUFqWUprZnUxL0ExbWgyWCtSd1JRQVlTZGN1UlZtRnBndEZBVTI1dlVYTWx2?=
 =?utf-8?B?ay9SckNuYmlCVkZ2RWNZMUlMK09GZUIvYk9lRHE1MFZwK3pHNXFGcHVaa3pK?=
 =?utf-8?B?WUhnRXlTSzllVTBrUitmdktwaXlJaUFPcFpuanBaUHRlcC9Wei96dklyTFpE?=
 =?utf-8?B?eWNDQ0VWbXY3ZFRZQTJ0QUJFdEFTTTA2RnFFMzFNWjhwU2hCWTIzcHUwU0gw?=
 =?utf-8?B?aHJZbHFOUW5HZDhJd0NTQmJDUmF4MERWWldvKzErZEdhWTJCYURWQmpEanM4?=
 =?utf-8?B?ZkE1YXN3aytVOVl1bnhJVTJDNWwwck11U09NYXYvOG51TWxEKzd2UWVhNkFY?=
 =?utf-8?B?UjJrZkl0eVlWcWtQWlhEZmdLM0w3OHRnTXNKUWF3UnpOa2ZmaURsMnJOa0xH?=
 =?utf-8?B?OUtZRllVNFNveHdKNERKQm5maDJveVV3enBXVDROVXBISVpDbmRDRWZ1ZXFq?=
 =?utf-8?B?N1ZhbDhlMFhZZ1VWK21aMTlQc2lXYWJ4Z2llcGh1TWxvSEVzMGtWdmdmck9n?=
 =?utf-8?B?VUFoVTFXaG4wK3NoZ1RhYzA1SUl4bUl5V1A5bmxjeEgraGpYSUZyZUp5NGtW?=
 =?utf-8?B?YmZVZEdFOVVLRUxKclZsZDUrRHM0eTJyOGdSZmZVMFB5bmU3QnRiOXJHN1Aw?=
 =?utf-8?B?Rk5iNXlGNTBPZXZZTkQ2OW5kdjc1MUdvVnVZb05yTTEvcko5NCt0aDVvTHQ4?=
 =?utf-8?B?Q0hOYnJpNVR2bkhtWUszWXRGc2VTVm4yZWNxUnB3d3lHR3VMbkZDUHJLYk83?=
 =?utf-8?B?QjF4eXhhVkkrTnlLamp4dFdUZVVUeFd0N1RwM0hSYUY0OU5PU2ZJOFhoYkVm?=
 =?utf-8?B?MSs4bUtsNVYrSUYwZ1dwemExVHpVVmNaSElqZEZKTjNzRDBscXBiblJGRFBE?=
 =?utf-8?B?K0FrUERiSmdRbWJGRVZGV2VrazcwaW4zYTlISUZZV1hCYkxrYlFubjRRMnJq?=
 =?utf-8?B?WFJ5TXlkUDNnPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 4f66fc39-fdb0-4bf7-b9fa-08da0b225289
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 10:05:27.0100
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Dhx0RguqCNTaN3hF1ayFqj6zgLMhF8E1bcVS9eDZU4mV1M2QFK8jPFpF27DL7fQQfOhk1VluclUqUmiNcfe0Ug==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR03MB3273
X-OriginatorOrg: citrix.com

On Thu, Mar 17, 2022 at 03:09:30PM -0700, Dongli Zhang wrote:
> The 'need_copy' is set when rq_data_dir(req) returns WRITE, in order to
> copy the written data to persistent page.
> 
> ".need_copy = rq_data_dir(req) && info->feature_persistent,"

I would also add:

Fixes: c004a6fe0c40 ('block/xen-blkfront: Make it running on 64KB page granularity')

> Signed-off-by: Dongli Zhang <dongli.zhang@oracle.com>

Acked-by: Roger Pau Monné <roger.pau@citrix.com>

Albeit I have one nit since you are already changing the line.

> ---
>  drivers/block/xen-blkfront.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/drivers/block/xen-blkfront.c b/drivers/block/xen-blkfront.c
> index 03b5fb341e58..dbc32d0a4b1a 100644
> --- a/drivers/block/xen-blkfront.c
> +++ b/drivers/block/xen-blkfront.c
> @@ -576,7 +576,7 @@ struct setup_rw_req {
>  	struct blkif_request *ring_req;
>  	grant_ref_t gref_head;
>  	unsigned int id;
> -	/* Only used when persistent grant is used and it's a read request */
> +	/* Only used when persistent grant is used and it's a write request */

While there you might want to adjust the comment to:

"... persistent grants are used ..."

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 10:14:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 10:14:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292883.497382 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWF3K-00063B-HH; Mon, 21 Mar 2022 10:14:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292883.497382; Mon, 21 Mar 2022 10:14:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWF3K-000634-E8; Mon, 21 Mar 2022 10:14:18 +0000
Received: by outflank-mailman (input) for mailman id 292883;
 Mon, 21 Mar 2022 10:14:17 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=f0xq=UA=arm.com=Michal.Orzel@srs-se1.protection.inumbo.net>)
 id 1nWF3I-00062y-QM
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 10:14:17 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05on20629.outbound.protection.outlook.com
 [2a01:111:f400:7e1a::629])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a871be2b-a8ff-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 11:14:14 +0100 (CET)
Received: from AS8PR04CA0004.eurprd04.prod.outlook.com (2603:10a6:20b:310::9)
 by AM6PR08MB4375.eurprd08.prod.outlook.com (2603:10a6:20b:b8::19)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Mon, 21 Mar
 2022 10:14:12 +0000
Received: from AM5EUR03FT058.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:310:cafe::10) by AS8PR04CA0004.outlook.office365.com
 (2603:10a6:20b:310::9) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.22 via Frontend
 Transport; Mon, 21 Mar 2022 10:14:12 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT058.mail.protection.outlook.com (10.152.17.48) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Mon, 21 Mar 2022 10:14:12 +0000
Received: ("Tessian outbound 31aeb3346a45:v113");
 Mon, 21 Mar 2022 10:14:11 +0000
Received: from d0ff7f0fb02e.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 32E76A98-649E-49EF-85B1-C239D0402102.1; 
 Mon, 21 Mar 2022 10:14:05 +0000
Received: from EUR03-DB5-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id d0ff7f0fb02e.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Mon, 21 Mar 2022 10:14:05 +0000
Received: from AM6PR08MB3814.eurprd08.prod.outlook.com (2603:10a6:20b:88::19)
 by DBBPR08MB4233.eurprd08.prod.outlook.com (2603:10a6:10:d2::23) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Mon, 21 Mar
 2022 10:14:03 +0000
Received: from AM6PR08MB3814.eurprd08.prod.outlook.com
 ([fe80::f8f3:189e:994f:737b]) by AM6PR08MB3814.eurprd08.prod.outlook.com
 ([fe80::f8f3:189e:994f:737b%4]) with mapi id 15.20.5081.022; Mon, 21 Mar 2022
 10:14:03 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a871be2b-a8ff-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=/NwvDBMow/rQBTyS63u7otDUuMd4DK/tg7DDjtwvC5U=;
 b=7xPmPXkZ8e5LijuiSJu58xFT+bVupkAWVxdazYxx/d+tA4XEqU2exwOZ2NgP3Q/i7DGrwPZswKDipCmvxGgG76LFNXmsNz0+KottCPs8dh7wD9m1WDPH5k61x4B+x5qkfG0xxTae5+QiizBDKk6wpycjGc/ER/qZJtHfv67f/Es=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: e83a0495008225e5
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=FQ5urLXPBog84dpywlwDt3MsSsKduZkyLt3aWMFyH/G5Ui3YW7GXdFGMmYdf+LLd0I6XKlMECH8yB0doKqHx5wpGrDnTlRI+3L0dQy2NISwks8IE/XJdcu8svrpuTT7TycHu+iS6TXk0Dmz0RKdpv3OUii1cVFzhgMDhfrKHZq5GyJlHVbRP5OsqLBLtb5eFL/LyKBwdOh1O5vm+IhEnei1IFv++3m7xkDm3Fu6/MILsX6QpoC84t4LnR7++s5klT9FbDHaB7p5HIJHMERoE8liGGisRWrOKmD9bXERNsNTXTrjtzJES0RRLQqcoClYLsOGDm7eSTdXvC3hXjnNmRg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=/NwvDBMow/rQBTyS63u7otDUuMd4DK/tg7DDjtwvC5U=;
 b=RaD7OU5xmcHCpvjBu/Cu6Jsj6PK+4e/MaK66Jl263VEZZWQG/4F0/Ort+or+p9fVsMeRNJCUTshoPLLtdFQvDzubxaly6S5TiZJaot/ObbJ/OhOaWb84LdELii8lnHloGhKP9lEeKwGw8jNr0SssU32XW6X43Zi/TM3uijBY3paOptVlhjku2zvpI1FiSrBuCvgaMiaITJ1tYsJ0YpBC2pcqb3kM1Pyojbe7mvJXbwX32ISeY/uXPj4/gLY0Mvy8icoKOlTJ/JVFjYe2F03C+XTWCYFBE3E/S4BJlQXsiHSfHfOoUazfLC3mvJIuZF1SXVTxdspK2Nfo/zEORWB83Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=/NwvDBMow/rQBTyS63u7otDUuMd4DK/tg7DDjtwvC5U=;
 b=7xPmPXkZ8e5LijuiSJu58xFT+bVupkAWVxdazYxx/d+tA4XEqU2exwOZ2NgP3Q/i7DGrwPZswKDipCmvxGgG76LFNXmsNz0+KottCPs8dh7wD9m1WDPH5k61x4B+x5qkfG0xxTae5+QiizBDKk6wpycjGc/ER/qZJtHfv67f/Es=
From: Michal Orzel <Michal.Orzel@arm.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH 1/3] xen: Introduce a header to store common linker
 scripts content
Thread-Topic: [PATCH 1/3] xen: Introduce a header to store common linker
 scripts content
Thread-Index: AQHYPPzaR1XKbiAEBEyYGbG4QOIoRKzJkESAgAAFt8o=
Date: Mon, 21 Mar 2022 10:14:03 +0000
Message-ID:
 <AM6PR08MB38148D3FB84D91DB089C48CC89169@AM6PR08MB3814.eurprd08.prod.outlook.com>
References: <20220321082114.49953-1-michal.orzel@arm.com>
 <20220321082114.49953-2-michal.orzel@arm.com>
 <cb61531a-5482-3aab-58bd-84f99f21ec48@suse.com>
In-Reply-To: <cb61531a-5482-3aab-58bd-84f99f21ec48@suse.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
suggested_attachment_session_id: a358e974-3c30-8767-bb61-f541d8cfdcaf
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: be66f469-5330-445e-c7d6-08da0b238bc6
x-ms-traffictypediagnostic:
	DBBPR08MB4233:EE_|AM5EUR03FT058:EE_|AM6PR08MB4375:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR08MB43758C9FE8DB380D3FA6155D89169@AM6PR08MB4375.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR08MB3814.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(38070700005)(9686003)(55016003)(316002)(7696005)(53546011)(52536014)(6506007)(91956017)(66446008)(64756008)(8676002)(76116006)(4326008)(66556008)(66476007)(66946007)(83380400001)(86362001)(26005)(186003)(2906002)(122000001)(71200400001)(38100700002)(508600001)(54906003)(8936002)(5660300002)(6916009)(33656002);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB4233
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT058.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	87ffaf6d-9bd2-4675-d465-08da0b238696
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(336012)(508600001)(40460700003)(316002)(26005)(82310400004)(186003)(5660300002)(86362001)(54906003)(33656002)(83380400001)(8936002)(2906002)(55016003)(53546011)(70206006)(70586007)(36860700001)(6862004)(4326008)(8676002)(47076005)(7696005)(6506007)(9686003)(356005)(81166007)(52536014);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 10:14:12.2230
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: be66f469-5330-445e-c7d6-08da0b238bc6
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT058.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4375

Hi Jan,=0A=
=A0=0A=
On 21.03.2022 09:21, Michal Orzel wrote:=0A=
> Both x86 and arm linker scripts share quite a lot of common content.=0A=
> It is difficult to keep syncing them up, thus introduce a new header=0A=
> in include/xen called xen_lds.h to store the internals mutual to all=0A=
> the linker scripts.=0A=
> =0A=
> Populate xen_lds.h with the first portion of the common sections.=0A=
> Some of them are not yet added/completed in arm linker script but they=0A=
> definitely should be. Please note that this patch does not aim to=0A=
> perform the full sync up between the linker scripts. It creates a base=0A=
> for further work.=0A=
> =0A=
> Signed-off-by: Michal Orzel <michal.orzel@arm.com>=0A=
> ---=0A=
>=A0 xen/include/xen/xen_lds.h | 114 ++++++++++++++++++++++++++++++++++++++=
=0A=
>=A0 1 file changed, 114 insertions(+)=0A=
>=A0 create mode 100644 xen/include/xen/xen_lds.h=0A=
=0A=
While perhaps just minor, I'm not happy about new files added with undersco=
res=0A=
in their names. Dashes are easier to type. Plus, looking at Linux, it may m=
ake=0A=
sense to name this xen.lds.h.=0A=
=0A=
I'm ok to change the name to xen.lds.h.=0A=
=0A=
> --- /dev/null=0A=
> +++ b/xen/include/xen/xen_lds.h=0A=
> @@ -0,0 +1,114 @@=0A=
> +#ifndef __XEN_LDS_H__=0A=
> +#define __XEN_LDS_H__=0A=
> +=0A=
> +/*=0A=
> + * Common macros to be used in architecture specific linker scripts.=0A=
> + */=0A=
> +=0A=
> +/* Macros to declare debug sections. */=0A=
> +#ifdef EFI=0A=
> +/*=0A=
> + * Use the NOLOAD directive, despite currently ignored by (at least) GNU=
 ld=0A=
> + * for PE output, in order to record that we'd prefer these sections to =
not=0A=
> + * be loaded into memory.=0A=
> + */=0A=
> +#define DECL_DEBUG(x, a) #x ALIGN(a) (NOLOAD) : { *(x) }=0A=
> +#define DECL_DEBUG2(x, y, a) #x ALIGN(a) (NOLOAD) : { *(x) *(y) }=0A=
> +#else=0A=
> +#define DECL_DEBUG(x, a) #x 0 : { *(x) }=0A=
> +#define DECL_DEBUG2(x, y, a) #x 0 : { *(x) *(y) }=0A=
> +#endif=0A=
> +=0A=
> +/* DWARF debug sections. */=0A=
> +#define DWARF_DEBUG_SECTIONS=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0 DECL_DEBUG(.debug_abbrev, 1)=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0 DECL_DEBUG2(.debug_info, .gnu.linkonce.wi.*, 1) \=0A=
> +=A0 DECL_DEBUG(.debug_types, 1)=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0 DECL_DEBUG(.debug_str, 1)=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0 DECL_DEBUG2(.debug_line, .debug_line.*, 1)=A0=A0=A0=A0=A0 \=0A=
> +=A0 DECL_DEBUG(.debug_line_str, 1)=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0 \=0A=
> +=A0 DECL_DEBUG(.debug_names, 4)=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0 DECL_DEBUG(.debug_frame, 4)=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0 DECL_DEBUG(.debug_loc, 1)=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0 DECL_DEBUG(.debug_loclists, 4)=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0 \=0A=
> +=A0 DECL_DEBUG(.debug_macinfo, 1)=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0 \=0A=
> +=A0 DECL_DEBUG(.debug_macro, 1)=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0 DECL_DEBUG(.debug_ranges, 8)=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0 DECL_DEBUG(.debug_rnglists, 4)=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0 \=0A=
> +=A0 DECL_DEBUG(.debug_addr, 8)=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0 DECL_DEBUG(.debug_aranges, 1)=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0 \=0A=
> +=A0 DECL_DEBUG(.debug_pubnames, 1)=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0 \=0A=
> +=A0 DECL_DEBUG(.debug_pubtypes, 1)=0A=
> +=0A=
> +/*=0A=
> + * Stabs debug sections.=0A=
> + *=0A=
> + * LLVM ld also wants .symtab, .strtab, and .shstrtab placed. These look=
 to=0A=
> + * be benign to GNU ld, so we can have them here unconditionally.=0A=
> + */=0A=
> +#define STABS_DEBUG_SECTIONS=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0 \=0A=
> +=A0 .stab 0 : { *(.stab) }=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0 \=0A=
> +=A0 .stabstr 0 : { *(.stabstr) }=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0 \=0A=
> +=A0 .stab.excl 0 : { *(.stab.excl) }=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0 .stab.exclstr 0 : { *(.stab.exclstr) }=A0=A0=A0=A0 \=0A=
> +=A0 .stab.index 0 : { *(.stab.index) }=A0=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0 .stab.indexstr 0 : { *(.stab.indexstr) }=A0=A0 \=0A=
> +=A0 .comment 0 : { *(.comment) }=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0 \=0A=
> +=A0 .symtab 0 : { *(.symtab) }=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0 \=0A=
> +=A0 .strtab 0 : { *(.strtab) }=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0 \=0A=
> +=A0 .shstrtab 0 : { *(.shstrtab) }=0A=
=0A=
Please don't add non-Stabs sections to this macro.=0A=
=0A=
Ok, I will add a new macro storing the last 4 sections called ELF_DETAILS_S=
ECTIONS,=0A=
to be coherent with what Linux does (ELF_DETAILS).=0A=
=0A=
> +#ifdef EFI=0A=
> +#define DISCARD_EFI_SECTIONS \=0A=
> +=A0=A0=A0=A0=A0=A0 *(.comment)=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 *(.comment.*) \=0A=
> +=A0=A0=A0=A0=A0=A0 *(.note.*)=0A=
> +#else=0A=
> +#define DISCARD_EFI_SECTIONS=0A=
> +#endif=0A=
> +=0A=
> +/* Sections to be discarded. */=0A=
> +#define DISCARD_SECTIONS=A0=A0=A0=A0 \=0A=
> +=A0 /DISCARD/ : {=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 *(.text.exit)=A0=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 *(.exit.text)=A0=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 *(.exit.data)=A0=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 *(.exitcall.exit)=A0=A0=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 *(.discard)=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 *(.discard.*)=A0=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 *(.eh_frame)=A0=A0=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 *(.dtors)=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 *(.dtors.*)=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 *(.fini_array)=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 *(.fini_array.*)=A0=A0=A0=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 DISCARD_EFI_SECTIONS=A0 \=0A=
> +=A0 }=0A=
> +=0A=
> +#define CTORS_SECTION=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 . =3D ALIGN(8);=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 __ctors_start =3D .;=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 *(SORT_BY_INIT_PRIORITY(.init_array.*))=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 *(SORT_BY_INIT_PRIORITY(.ctors.*))=A0=A0=A0=A0=A0=A0 =
\=0A=
> +=A0=A0=A0=A0=A0=A0 *(.init_array)=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 *(.ctors)=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 __ctors_end =3D .;=0A=
> +=0A=
> +#define VPCI_SECTION=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 . =3D ALIGN(POINTER_ALIGN); \=0A=
> +=A0=A0=A0=A0=A0=A0 __start_vpci_array =3D .;=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 *(SORT(.data.vpci.*))=A0=A0=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 __end_vpci_array =3D .;=0A=
> +=0A=
> +#define HYPFS_SECTION=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 . =3D ALIGN(8);=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 \=
=0A=
> +=A0=A0=A0=A0=A0=A0 __paramhypfs_start =3D .;=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 *(.data.paramhypfs)=A0=A0=A0=A0=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 __paramhypfs_end =3D .;=0A=
> +=0A=
> +#define LOCK_PROFILE_SECTION=A0=A0=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 . =3D ALIGN(POINTER_ALIGN); \=0A=
> +=A0=A0=A0=A0=A0=A0 __lock_profile_start =3D .; \=0A=
> +=A0=A0=A0=A0=A0=A0 *(.lockprofile.data)=A0=A0=A0=A0=A0 \=0A=
> +=A0=A0=A0=A0=A0=A0 __lock_profile_end =3D .;=0A=
> +=0A=
> +#endif /* __XEN_LDS_H__ */=0A=
=0A=
I'm not sure _SECTION is a good suffix to use in the four names above:=0A=
These aren't individual sections in the output, and for CTORS_SECTION=0A=
it's also not even a single input section.=0A=
=0A=
How about _ENTRY suffix?=0A=
Otherwise we can do different suffixes depending on the content.=0A=
LOCK_PROFILE_DATA, HYPFS_PARAM, VPCI_ARRAY=0A=
=0A=
As to CTORS_SECTION - I'm unconvinced of generalizing this without=0A=
first getting it right.=0A=
=0A=
I will get rid of CTORS_SECTIONS then.=0A=
=0A=
Overall I think it would be better to introduce this header along=0A=
with actually using the macros. That way one can check within the=0A=
patch that what you move / replace actually matches on both sides=0A=
without needing to cross patch boundaries. If you wanted to introduce=0A=
(and then include right away) an empty header first, that would be an=0A=
acceptable intermediate approach afaic.=0A=
=0A=
I just wanted to split this into arch specific patches because maintainers =
are different.=0A=
I do not understand your second solution with empty header.=0A=
Do you mean that the first patch shall create an empty header (with just an=
 intro comment)=0A=
and include it in arch specific linker scripts?=0A=
=0A=
Anyway, I can merge these 3 patches into 1 if you want.=0A=
=0A=
Jan=0A=
=0A=
Cheers,=0A=
Michal=


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 10:23:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 10:23:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292887.497393 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWFC9-0007WB-Ce; Mon, 21 Mar 2022 10:23:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292887.497393; Mon, 21 Mar 2022 10:23:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWFC9-0007W4-9a; Mon, 21 Mar 2022 10:23:25 +0000
Received: by outflank-mailman (input) for mailman id 292887;
 Mon, 21 Mar 2022 10:23:24 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nWFC7-0007Vx-US
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 10:23:23 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWFC6-0004Ok-10; Mon, 21 Mar 2022 10:23:22 +0000
Received: from [54.239.6.185] (helo=[192.168.25.135])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWFC5-0006vi-QJ; Mon, 21 Mar 2022 10:23:21 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=I1pRnKKlcORHb6nTEjd2Xi+hBJv1i0X5+kGKQ7/x3JI=; b=BjLFMd57Bv0PuZrRK3BEw21OG4
	MavyLgT5GsnlUmxZdFOiMZK7H7JtlKOxOfd3axMX0ls/IJmveAUPnr4wCPAA2i2SYGdDtXWszT+Zv
	7uVFKyy83EdJU1+lWKApFyJlqfMCKtvcRZ5jzNnScUnLLR1/BaSNGE7/ZwY3QpeMYliI=;
Message-ID: <78cb45b2-eb1b-91b4-864e-816b4902ee7a@xen.org>
Date: Mon, 21 Mar 2022 10:23:19 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [XEN PATCH] evtchn/fifo: Don't set PENDING bit if guest
 misbehaves
To: Andrew Cooper <amc96@srcf.net>, Raphael Ning <raphning@gmail.com>,
 xen-devel@lists.xenproject.org
Cc: Raphael Ning <raphning@amazon.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 David Vrabel <dvrabel@amazon.co.uk>
References: <6b84a20b2753130cc62406a0fd14d2708f6f504b.1647455219.git.raphning@amazon.com>
 <e07d0eda-c117-c83e-227e-7a934585f265@srcf.net>
From: Julien Grall <julien@xen.org>
In-Reply-To: <e07d0eda-c117-c83e-227e-7a934585f265@srcf.net>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi Andrew,

On 16/03/2022 18:58, Andrew Cooper wrote:
>> diff --git a/xen/common/event_fifo.c b/xen/common/event_fifo.c
>> index ed4d3beb10f3..6c74ccebebb7 100644
>> --- a/xen/common/event_fifo.c
>> +++ b/xen/common/event_fifo.c
>> @@ -165,7 +165,7 @@ static void cf_check evtchn_fifo_set_pending(
>>       unsigned int port;
>>       event_word_t *word;
>>       unsigned long flags;
>> -    bool_t was_pending;
>> +    bool_t check_pollers = false;
> 
> Considering your commit message, did you intend to change this to bool?
> 
> Can be fixed on commit.  Acked-by: Andrew Cooper <andrew.cooper3@citrix.com>

So far, tools like b4 [1] are not able to find your tag on lore.kernel.org:

42sh> b4 am 
6b84a20b2753130cc62406a0fd14d2708f6f504b.1647455219.git.raphning@amazon.com

Looking up 
https://lore.kernel.org/r/6b84a20b2753130cc62406a0fd14d2708f6f504b.1647455219.git.raphning%40amazon.com
Analyzing 8 messages in the thread
Checking attestation on all messages, may take a moment...
---
   ✓ [PATCH] evtchn/fifo: Don't set PENDING bit if guest misbehaves
     + Reviewed-by: David Vrabel <dvrabel@amazon.co.uk>
     + Tested-by: Luca Fancellu <luca.fancellu@arm.com> (✓ 
DKIM/armh.onmicrosoft.com)
   ---
   ✓ Signed: DKIM/gmail.com
---
Total patches: 1
---
  Link: 
https://lore.kernel.org/r/6b84a20b2753130cc62406a0fd14d2708f6f504b.1647455219.git.raphning@amazon.com
  Base: not specified
        git am 
./20220316_raphning_evtchn_fifo_don_t_set_pending_bit_if_guest_misbehaves.mbx

This is because they are not at the start of the line. In the future, 
would you mind write the tag on a separate line?

Cheers,

[1] 
https://people.kernel.org/monsieuricon/introducing-b4-and-patch-attestation

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 10:23:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 10:23:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292889.497405 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWFCX-0007xk-Mr; Mon, 21 Mar 2022 10:23:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292889.497405; Mon, 21 Mar 2022 10:23:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWFCX-0007xd-IC; Mon, 21 Mar 2022 10:23:49 +0000
Received: by outflank-mailman (input) for mailman id 292889;
 Mon, 21 Mar 2022 10:23:48 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=svEr=UA=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nWFCW-0007ui-51
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 10:23:48 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id fcdb1707-a900-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 11:23:45 +0100 (CET)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04lp2050.outbound.protection.outlook.com [104.47.12.50]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-11-L0Gl_n6zN2-ZhwqCgTwmJQ-1; Mon, 21 Mar 2022 11:23:43 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by VI1PR04MB5470.eurprd04.prod.outlook.com (2603:10a6:803:d6::33)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.22; Mon, 21 Mar
 2022 10:23:40 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a%6]) with mapi id 15.20.5081.022; Mon, 21 Mar 2022
 10:23:40 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fcdb1707-a900-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647858224;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=6YBdn6zNEd3dRTr0pr4+mAvFwFl8sX+ftxiOhYclJNE=;
	b=k6+URyu4sgnfoRJkNRhUcpTP9NrCnnfpDRaBxbZbQJbL30CdUOt5vDvhLQ6vWLi/V/Ndky
	N5vqtFjXvdYBZ9MKPE2jsHsZLGIsCWglR7Y/02eLaFCNEw7w4PtSJLsrnp2e/oIQFKw/re
	r7kFRJSVxpsTs1pHPjfP/bU2Ju7qzFo=
X-MC-Unique: L0Gl_n6zN2-ZhwqCgTwmJQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=UeBfiuKevhwRd5gq9OPz406ToCSgrXpLABg4KzBXam3xjMWfKGlrDdRr8OCNRxJTCiA2uzo0T6fQlBILX6Ej3PtTzMmXt5TWGzQu8M2M+htqhAm9v6NaNtEbx4ypV66KdyCP8a6SDvli4g9Jwqz3pvJkk7cWpmPRsG3GRGUhAZbX4iUOEDNjiV5ogSwhDNXSPT+stn9Nrlubm4Mls9zOXr6Qqd5c2W27X7Md8CtoIxXXXDLtGzYwSR19QvKxvONg/OU05SOEgk5tblN63Txy6xRxKVHqkMGAHjR5NEVipHEQmgHCCiETqo5GkzjHIcZcQyxLGhXpF7L7HCks2xuuLQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ySGHTc544f/Qufkee5IH+zC4zeekNrT4XznitEkUels=;
 b=jgl9UVA52s3nALwrUpZ32ECrQFnFiqMmnZNNgcUtOmEdBoxCMOQxp19G6PhNoQsq+vfRJ5RY/X5SHu25R8raA/5/be8/9pHtuABz15zRQ9ZCMSq+/IvZSI/7KGfNUsMkx3I5OJcN/yH+4/MumdFKQjr6DnDVga6KtJ5RF8B8MjSs/Z6W99udawiOk4Evt+oqR21bj1mtTOuMLYFINU2yBfglHRiXfRD92sRUM0jlRWrbUU+Q6lOV8cWRWkLfL7XvD7jD4UR/ztPcxFSndyi7rUbCnhGHk2hE6sh8CTETPyKS6vIku7W7LFkWmcZYd85ZSHQNwuVdLc4IAnRadKmlbA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <2930b69f-9fba-e26c-8ed5-90ca93db92f4@suse.com>
Date: Mon, 21 Mar 2022 11:23:38 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH 1/3] xen: Introduce a header to store common linker
 scripts content
Content-Language: en-US
To: Michal Orzel <Michal.Orzel@arm.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <20220321082114.49953-1-michal.orzel@arm.com>
 <20220321082114.49953-2-michal.orzel@arm.com>
 <cb61531a-5482-3aab-58bd-84f99f21ec48@suse.com>
 <AM6PR08MB38148D3FB84D91DB089C48CC89169@AM6PR08MB3814.eurprd08.prod.outlook.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <AM6PR08MB38148D3FB84D91DB089C48CC89169@AM6PR08MB3814.eurprd08.prod.outlook.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6PR10CA0076.EURPRD10.PROD.OUTLOOK.COM
 (2603:10a6:209:8c::17) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ef40d0ed-e517-488d-0e23-08da0b24de45
X-MS-TrafficTypeDiagnostic: VI1PR04MB5470:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB5470F0FA8A0EE5C1D25917F3B3169@VI1PR04MB5470.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2906002)(6486002)(31686004)(36756003)(83380400001)(186003)(26005)(508600001)(316002)(86362001)(8676002)(53546011)(66946007)(4326008)(66476007)(66556008)(6506007)(38100700002)(31696002)(6512007)(5660300002)(6916009)(54906003)(8936002)(2616005)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?fOd7qMOLn5dJdl0XQEyMRtxUJE/vKKwMGDDLIGy+KBQZoXAOzZfHvkIx3ebS?=
 =?us-ascii?Q?GnNA7WjEPeDXjgGIJJXGK/YamUp++NOCnpWd8canygAlll5kuNsdaTjhM5ge?=
 =?us-ascii?Q?KvNHNi4iBxelx00KewdZZ2ElETjhV3VdYPrXF/JUjubijDmpGH2jgxpLVdpg?=
 =?us-ascii?Q?OqpPTWz4Yfp2/V5DAkFAqqwILr5hEaNz0SyNGEzZJ+RU11nlqyKVfKXb8x6D?=
 =?us-ascii?Q?dt2cxUH9YKKhsX1t+ZiwjFHoWVliJjQ+pXaw8Thv+fO1T/r6rca7yDSoCH6a?=
 =?us-ascii?Q?5zS4pl6jZ+ACJlBg6/i6nkaVUZyZ+/TDUrxku6h8GqjcAIt1/kvpqCr37Aat?=
 =?us-ascii?Q?GWPtXu/Fd7iIU7kLrm6vKDMveM1ENMHNnZS3FfhJHBZHmQS5A4ugp1tWonsW?=
 =?us-ascii?Q?ZUFqevm8gVp6VzBD0whmsRqf7TPAKCegG12uRIPSf4VJUJ3qp+G9NHFYltYn?=
 =?us-ascii?Q?xSQAH1clqG5fCWN2qbNSTlZ7Z9E+TTFVLjzCZTNyLj3dzR8bi8qEDpM1ErNW?=
 =?us-ascii?Q?xhsQgxFzt3sLQhRBmeQ1x2BJFdIsHc+Gd7mcMvF4aA3GWscr5EWZDgTQ/WIy?=
 =?us-ascii?Q?dc90kGF+fMDSrWG38voyoUf4YvRQ9VktyNFRQcuIsxWaPqP4/qToGomK8XUH?=
 =?us-ascii?Q?ik+UI9FSE4ScOJmWjJgDlQhOaDP9dYd2SN9e9W8uYHMlreDld8FsMs771kRW?=
 =?us-ascii?Q?kBjcyrQES5KxeQtWXQk72h1OKtHORrIV2HMTMsn5NQnhVwVsDOBm6+Glpqpr?=
 =?us-ascii?Q?z0HyRT80ELUi4yYmp86rv3FRo8JSHlBkqWxMF9O9W9PtSa3a3QfUwjag7fjo?=
 =?us-ascii?Q?r1QuY0gzQA4GPiykK2R1VCjJANRY0dimQG8YAM1Kyw4uOSoXLLUr0MjxX3RI?=
 =?us-ascii?Q?kCJpnofJR2MQqdgPYZSFWUgFyHSD97W7q2xtPhdnkGZwwQgTGDi2Ca7O6sc1?=
 =?us-ascii?Q?q+7KLFv//3hEUBWoxzn/tfCUOQY8ZZ7Gqgn0ZngbpThOnjCl6P1Yr1A2vMUV?=
 =?us-ascii?Q?MAL99FDVhTqY322zWHCgyyh51wWRz965wWRxReZgGgW6YQvhXA4g1ijUqRq+?=
 =?us-ascii?Q?PrYO9rXSDwAmut6er4P7k/rSasLLy9OIa9I9dyWct6enPj8Viqn9UzH7RG1H?=
 =?us-ascii?Q?CHv4qy0PjomS0mtYhUtK2y4iV/1CA5xwDxkyb5nBHvVajGKPTeNT858S4cIM?=
 =?us-ascii?Q?SgstljstCz5OgqDksZCdIB4jUwr9gjwCrs6l0rKd3WNwt/f/7kzYrRYLN6+3?=
 =?us-ascii?Q?F6TtZ5czBrxvPsSyfaK7Fjl3Jyx9pveHESe2E32I7Qzjvcuw3EQcJ1/Bxrxt?=
 =?us-ascii?Q?SYCgKwhDefDaAmQudDE4+Q+iXdrVNkfBsb3IUWH1Ft6nRFxLuoqB0vCBsQkd?=
 =?us-ascii?Q?9h6aEadK1VaetTJ+EX4Yo24Drf16OHj4xgK9ocjMiABNG+AP/iYFukNXGfsv?=
 =?us-ascii?Q?MF5oEG1rh61/V8psPIYlVMsSXMxwuMUU?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ef40d0ed-e517-488d-0e23-08da0b24de45
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 10:23:40.3704
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: zfcZN1yce0stlZIU2eOI41BhENKFqLK26tfDV8YpWrpanndGRY933NjGiCqgNrCrPmIn0ZssNTN2gcWy3uefmQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB5470

Note: please properly quote your replies. As you'll see what you said
in reply to my remarks is not properly separated from my remarks, and
hence hard to read.

On 21.03.2022 11:14, Michal Orzel wrote:
> On 21.03.2022 09:21, Michal Orzel wrote:
>> --- /dev/null
>> +++ b/xen/include/xen/xen_lds.h
>> @@ -0,0 +1,114 @@
>> +#ifndef __XEN_LDS_H__
>> +#define __XEN_LDS_H__
>> +
>> +/*
>> + * Common macros to be used in architecture specific linker scripts.
>> + */
>> +
>> +/* Macros to declare debug sections. */
>> +#ifdef EFI
>> +/*
>> + * Use the NOLOAD directive, despite currently ignored by (at least) GN=
U ld
>> + * for PE output, in order to record that we'd prefer these sections to=
 not
>> + * be loaded into memory.
>> + */
>> +#define DECL_DEBUG(x, a) #x ALIGN(a) (NOLOAD) : { *(x) }
>> +#define DECL_DEBUG2(x, y, a) #x ALIGN(a) (NOLOAD) : { *(x) *(y) }
>> +#else
>> +#define DECL_DEBUG(x, a) #x 0 : { *(x) }
>> +#define DECL_DEBUG2(x, y, a) #x 0 : { *(x) *(y) }
>> +#endif
>> +
>> +/* DWARF debug sections. */
>> +#define DWARF_DEBUG_SECTIONS=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 \
>> +=C2=A0 DECL_DEBUG(.debug_abbrev, 1)=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0 \
>> +=C2=A0 DECL_DEBUG2(.debug_info, .gnu.linkonce.wi.*, 1) \
>> +=C2=A0 DECL_DEBUG(.debug_types, 1)=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 \
>> +=C2=A0 DECL_DEBUG(.debug_str, 1)=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0 DECL_DEBUG2(.debug_line, .debug_line.*, 1)=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 \
>> +=C2=A0 DECL_DEBUG(.debug_line_str, 1)=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0 DECL_DEBUG(.debug_names, 4)=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 \
>> +=C2=A0 DECL_DEBUG(.debug_frame, 4)=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 \
>> +=C2=A0 DECL_DEBUG(.debug_loc, 1)=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0 DECL_DEBUG(.debug_loclists, 4)=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0 DECL_DEBUG(.debug_macinfo, 1)=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
 \
>> +=C2=A0 DECL_DEBUG(.debug_macro, 1)=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 \
>> +=C2=A0 DECL_DEBUG(.debug_ranges, 8)=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0 \
>> +=C2=A0 DECL_DEBUG(.debug_rnglists, 4)=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0 DECL_DEBUG(.debug_addr, 8)=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0 \
>> +=C2=A0 DECL_DEBUG(.debug_aranges, 1)=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
 \
>> +=C2=A0 DECL_DEBUG(.debug_pubnames, 1)=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0 DECL_DEBUG(.debug_pubtypes, 1)
>> +
>> +/*
>> + * Stabs debug sections.
>> + *
>> + * LLVM ld also wants .symtab, .strtab, and .shstrtab placed. These loo=
k to
>> + * be benign to GNU ld, so we can have them here unconditionally.
>> + */
>> +#define STABS_DEBUG_SECTIONS=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0 .stab 0 : { *(.stab) }=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0 \
>> +=C2=A0 .stabstr 0 : { *(.stabstr) }=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0 .stab.excl 0 : { *(.stab.excl) }=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0 .stab.exclstr 0 : { *(.stab.exclstr) }=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0 .stab.index 0 : { *(.stab.index) }=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0 .stab.indexstr 0 : { *(.stab.indexstr) }=C2=A0=C2=A0 \
>> +=C2=A0 .comment 0 : { *(.comment) }=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0 .symtab 0 : { *(.symtab) }=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0 .strtab 0 : { *(.strtab) }=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0 .shstrtab 0 : { *(.shstrtab) }
>=20
> Please don't add non-Stabs sections to this macro.
>=20
> Ok, I will add a new macro storing the last 4 sections called ELF_DETAILS=
_SECTIONS,
> to be coherent with what Linux does (ELF_DETAILS).
>=20
>> +#ifdef EFI
>> +#define DISCARD_EFI_SECTIONS \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *(.comment)=C2=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *(.comment.*) \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *(.note.*)
>> +#else
>> +#define DISCARD_EFI_SECTIONS
>> +#endif
>> +
>> +/* Sections to be discarded. */
>> +#define DISCARD_SECTIONS=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0 /DISCARD/ : {=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *(.text.exit)=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *(.exit.text)=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *(.exit.data)=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *(.exitcall.exit)=C2=A0=C2=A0=C2=
=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *(.discard)=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *(.discard.*)=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *(.eh_frame)=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *(.dtors)=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *(.dtors.*)=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *(.fini_array)=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *(.fini_array.*)=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 DISCARD_EFI_SECTIONS=C2=A0 \
>> +=C2=A0 }
>> +
>> +#define CTORS_SECTION=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 . =3D ALIGN(8);=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 __ctors_start =3D .;=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *(SORT_BY_INIT_PRIORITY(.init_arra=
y.*))=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *(SORT_BY_INIT_PRIORITY(.ctors.*))=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *(.init_array)=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *(.ctors)=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 __ctors_end =3D .;
>> +
>> +#define VPCI_SECTION=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 . =3D ALIGN(POINTER_ALIGN); \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 __start_vpci_array =3D .;=C2=A0=C2=
=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *(SORT(.data.vpci.*))=C2=A0=C2=A0=
=C2=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 __end_vpci_array =3D .;
>> +
>> +#define HYPFS_SECTION=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 . =3D ALIGN(8);=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 __paramhypfs_start =3D .;=C2=A0=C2=
=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *(.data.paramhypfs)=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 __paramhypfs_end =3D .;
>> +
>> +#define LOCK_PROFILE_SECTION=C2=A0=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 . =3D ALIGN(POINTER_ALIGN); \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 __lock_profile_start =3D .; \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 *(.lockprofile.data)=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0 \
>> +=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 __lock_profile_end =3D .;
>> +
>> +#endif /* __XEN_LDS_H__ */
>=20
> I'm not sure _SECTION is a good suffix to use in the four names above:
> These aren't individual sections in the output, and for CTORS_SECTION
> it's also not even a single input section.
>=20
> How about _ENTRY suffix?
> Otherwise we can do different suffixes depending on the content.
> LOCK_PROFILE_DATA, HYPFS_PARAM, VPCI_ARRAY

I'd prefer the latter.

> As to CTORS_SECTION - I'm unconvinced of generalizing this without
> first getting it right.
>=20
> I will get rid of CTORS_SECTIONS then.
>=20
> Overall I think it would be better to introduce this header along
> with actually using the macros. That way one can check within the
> patch that what you move / replace actually matches on both sides
> without needing to cross patch boundaries. If you wanted to introduce
> (and then include right away) an empty header first, that would be an
> acceptable intermediate approach afaic.
>=20
> I just wanted to split this into arch specific patches because maintainer=
s are different.
> I do not understand your second solution with empty header.
> Do you mean that the first patch shall create an empty header (with just =
an intro comment)
> and include it in arch specific linker scripts?

Yes, I view this as one possible option.

> Anyway, I can merge these 3 patches into 1 if you want.

Well, at least part of the Arm changes can likely remain separate.
But where you abstract things by introducing a macro in the header,
it would be better if the original (supposedly functionally identical)
construct(s) was (were) also replaced at the same time.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 10:25:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 10:25:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292895.497416 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWFEZ-0000KD-6I; Mon, 21 Mar 2022 10:25:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292895.497416; Mon, 21 Mar 2022 10:25:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWFEZ-0000K6-30; Mon, 21 Mar 2022 10:25:55 +0000
Received: by outflank-mailman (input) for mailman id 292895;
 Mon, 21 Mar 2022 10:25:53 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=dpaY=UA=citrix.com=prvs=07205606a=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nWFEX-0000Jy-J8
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 10:25:53 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4755ad67-a901-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 11:25:51 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4755ad67-a901-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647858352;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=EwPw5nBE1V2lD4KRSbb+iLziMRw8K2DL3YWJngVuz48=;
  b=MbKxoVufeLwJpiyhRqc0+3d672PP4A+q9Q+kzS/JCBFO7oHalqobrqge
   1rrfZKp87MzH1niqLcH8N8R4m4n9cdGfyc0Zf9qMJf+dplc7a0acqLekg
   GWcRRSshM57ZtItdlfanMfwO7+OTTYNHuFyBKw299+4uGJSvYo00cw1KJ
   s=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 69116457
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:tnmweqBy6qHJbxVW/w3jw5YqxClBgxIJ4kV8jS/XYbTApGgmhT0Gz
 DBJXjiAPv3eYGKnKYsiPd61oUkHvZTQx9BlQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vj29Yx6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhD5
 tB25LLhUj0sHYyLhrQBbgVYFnBhaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguw5K8bmJsUHs2xIxjDFF/c2B5vERs0m4PcGjW5p2JwTQp4yY
 eJGThw1MizLeiFLM09OCtU4rP6MwVbWJmgwRFW9+vNsvjm7IBZK+LTqPdDYfvSDQMxHmUDeq
 m+u12bkBhAXMvSPxDzD9Wij7sfMmiXhUY5UC7y89dZtmlSYwmFVAxoTPXOrrP/8hkOgVtZ3L
 00P5jFovaU07FasTNT2Q1u/unHsg/IHc4MOSatgsljLk/eKpVbCboQZctJfQO4IsfRna20x7
 FqqvpT3VSBSrL2QGG3Io994sgiOESQSKGYDYwoNQg0E/8TvrekPs/7fcjpwOPXr14OoQFkc1
 xjP9XFj3OtL0abnwo3hpTj6bySQSo8lp+LfziHeRSqb4wxwf+ZJjKT4uAGAvZ6swGt0J2RtX
 UToeeDDt4ji7rnXzURhpdnh+5nzu5643MX02wIHInXY323FF4SfVY5R+ipiA0xiL9wJfzTkC
 GeK518OtMYLZSL6NPQmC25UNyjN5fK9fekJq9iONoYeCnSPXFHvEN5Sib64gDm2zRlEfVAXM
 paHa8e8ZUv2+ow8pAdas9w1iOdxrghnnDu7bcmik3yPjOrPDFbIGOxtGAbfMYgEAFas/Vy9H
 yB3bJDRlX2ykYTWP0HqzGLkBQtTfCZhWsyu9ZA/myzqClMOJVzNwsT5mNsJU4dkg75UhqHP+
 HS8UVVf013xmTvMLgDiV5ypQOmHsUpXxZ7jARERAA==
IronPort-HdrOrdr: A9a23:fMxh667jVlrE4Z2PzAPXwSyBI+orL9Y04lQ7vn2ZFiY6TiXIra
 +TdaoguSMc6AxwZJkh8erwXpVoZUmsiKKdhrNhQYtKPTOWwldASbsC0WKM+UyEJ8STzJ846U
 4kSdkANDSSNykLsS+Z2njBLz9I+rDum8rE9ISurUuFDzsaEJ2Ihz0JezpzeXcGPTWua6BJc6
 Z1saF81kSdkDksH4+GL0hAe9KGi8zAlZrgbxJDLxk76DOWhTftzLLhCRCX0joXTjsKmN4ZgC
 X4uj28wp/mn+Cwyxfa2WOWx5NKmOH5wt8GIMCXkMAaJhjllw7tToV8XL+puiwzvYiUmRwXue
 iJhy1lE9V46nvXcG3wiRzx2zP42DJr0HPmwU/wuwqUneXJABYBT+ZRj4NQdRXUr2A6ustn7a
 5N12WF87JKEBLphk3Glpb1fiAvsnDxjWspkOYVgXAae5AZcqVtoYsW+14QOIscHRj99JssHI
 BVfY7hDc5tABOnhk3izypSKITGZAVwIv7GeDlPhiWt6UkWoJgjpHFogfD2nR87heUAotd/lq
 D5259T5cNzp/8tHNFA7dg6ML6K40z2MFvx2TGpUBza/J9uAQO4l3ew2sRz2N2X
X-IronPort-AV: E=Sophos;i="5.90,198,1643691600"; 
   d="scan'208";a="69116457"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=bsBTq0i/rawIP5dkLvvAtHAxEhITYN/8itMdCGwbaWToe8mI1noncL7V0QXBkkrWzEPHC5wQN6zkKIDdCgqOwdKoW7kc/TazEP1aZcDGJL8MBjH0IGS2BRD3CKI9LAhMdhoAOs9S/gSueje/91iS7XmAm2jqxHO3e//DENXhKOaJ5OOaNCFxTfCzdw/8i1Fv6zDSMiO/4S63nYZ3jkQbItA5HeWZfHcNljcLGY8ZXyH+MMwW7BPrICmpXzlZualcz3fKClkh7Iluu35CD4sE+TOpJ6DOd/iM/n0RoSuAup4e4/zJWC/iHFOtngKZ19cfXpCXryc7Js9aoRLz/URcBQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=I/OEFbRNgjxpheFo5Iez2tzgxUucqboVBeNXDiGalCg=;
 b=TIuTxyVg8HFnPamjWWo11fhV911xPu5aIwG+yvPfRkR8TXn4HpTI2I69eBN3O6LWxDBoZe1VeKiPfpUlV+mYdiQ6EPZbMfGl3meAxD72AWo0KUxPBLzP7mxkbZJGAeYOYnbgBwHgkhGVBrhGhOdIBHM9YAxUDcaZewQ62E8X0mNLvWkC7nWEFB5V5NLpuInVebj79CBv4dYFvJ+cl9CfT2oI+gnjgqXzSUAHww0NAseA/vzcYU/gcQBDbqbXycVULpU0K6tlROj9nTIwc81A7hEzpiIHXx5evRKhnb6b29NWIG/DP7Erwtq6C1DpUgqDJq+rki0EPj/KkvQWMWKM9Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=I/OEFbRNgjxpheFo5Iez2tzgxUucqboVBeNXDiGalCg=;
 b=T8A9gLujePMHFBEK9sz5knbJJtgcGp8qhSqrICzYPXHJf0mRNdu8CTHWCl5L65Q7YE61DpnZLgNBctT0n6y5V7R+6xJIdY5jIIbNeLgC5cBlJ0FLMzqdVSFA72R60JUQAv5icZc0fqF8wrX+lVvdRdJP4PNYYnXG3rjGfNFsNmg=
Date: Mon, 21 Mar 2022 11:25:40 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Andrew Cooper <Andrew.Cooper3@citrix.com>, Ross Lagerwall
	<ross.lagerwall@citrix.com>, "konrad.wilk@oracle.com"
	<konrad.wilk@oracle.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	"doebel@amazon.de" <doebel@amazon.de>, "julien@xen.org" <julien@xen.org>
Subject: Re: [PATCH 4/4] livepatch: differentiate between old and new build
 systems
Message-ID: <YjhSpA8CkkxJga6r@Air-de-Roger>
References: <20220302142711.38953-1-roger.pau@citrix.com>
 <20220302142711.38953-5-roger.pau@citrix.com>
 <32b098c1-963f-2e03-84bb-c8db410c8554@citrix.com>
 <Yidtuq8YUq+SbY7C@Air-de-Roger>
 <3e285745-9cc3-4f9a-ec27-fe917faa4547@citrix.com>
 <YisJS9ITWTpM7bYj@Air-de-Roger>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <YisJS9ITWTpM7bYj@Air-de-Roger>
X-ClientProxiedBy: LO4P123CA0373.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:18e::18) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 55d8d9b2-0cac-4f89-4789-08da0b252824
X-MS-TrafficTypeDiagnostic: SA0PR03MB5578:EE_
X-Microsoft-Antispam-PRVS: <SA0PR03MB5578B51CB8CC2D413112D2968F169@SA0PR03MB5578.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: /VEph4wOnyMTy58qcCFw6RlJSHqZhLAtgAyY7N6e+q5TGA6mdY8sIEZT1FCX2BIfcC0yw3D/VVzlsANOJdoMgd+dfyZnnkLI7ASF8kOEJItiHSZAOVFErLpeNOUEiGcY1cmwgBN0JBa8yZb8qGOFnv7fGxbPdcnyicsQxYPWZ0+lEhjnuKX9MbVemiHhWAXhFqSkEr7vOEy8fSDfaBPVvTqyDnZXfNJEZJzsE2cr9nPFn2w18MKVoku8yOssYQy6OOUtIIZJEFZoNEtPlwLgpLCmwTsb76lx5BEWU+Kf1JmTymlTaHjbuCowIBl3jFF0Ult8TYaW+VBiaYqsQ7TBSV9lyI9ytBPA4A6XSz4xT1QdwZhsjNlsHwX61RBBVScEDpf6PSRM3T75AVkdFfMe/KB2uE2bJ0FUOvxUOzZ3yB83kaPyqcP51aC74HpPqgcha2Z9Sxj/vRXmYPcI5beKqNNgixnfewtbz5ryDv1lc9pH9eudU5e37qBlhrQJtP+c37yBFYSff6k+rcHocJIfCR4Km+jyEfZ1R6yjyqBN26y0nsF+8XMBKYNtas3U+NfnQgyq8wZRjVn57L4qzAZY2kLO8WzBmwCrvQ4CCAj81imQx4jkxRb90vEan57uOAgEWXf47/c+K52NNPFSQruyDA==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(6506007)(316002)(86362001)(82960400001)(186003)(26005)(9686003)(33716001)(6666004)(83380400001)(85182001)(53546011)(6512007)(8936002)(66556008)(66476007)(38100700002)(508600001)(110136005)(54906003)(6486002)(5660300002)(66946007)(8676002)(4326008)(2906002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?bk5jSkk2cnZWRXNtUDYrd0pjdTZ2Qml4S1R4cHpJYVNHaDEraVFodHYzZk50?=
 =?utf-8?B?ZWY3SmdRa254K1VacUt5RG5UYzBMZzlOWTQ2OWd4ZEtWYVlJVE12b3psc1pG?=
 =?utf-8?B?ZmNINmdWb3NmeFNuWTkxcGZ6UHd0SFNPRGFvSHJFeUVoKzJYR3NiRDJhSUhB?=
 =?utf-8?B?WjJVYWJFWXpSOUQ1eVpaR3JSNTVaK2NqN0VvUjFQT3BSbkZER0pRYTE4ME9n?=
 =?utf-8?B?VHQxbUVqRW5sUUhQaHdvcEdhSEFqLzl1UTFEVndxejNWYzdsMk5KU2FMMDNF?=
 =?utf-8?B?YXJqWUhnekRzazcwUnh4Tjczdml5UURHWUdJN0dwOWlEU2dvTFg3N1ZaRUNx?=
 =?utf-8?B?NDA0TG1CQXBZWHlHVWVUaFl0TzNEMTQxRmFjVWtHNnVpWmJnTkFQVFpXencz?=
 =?utf-8?B?TE4xMmFCTXBHUnpXeDJDQnE0SCs3NFFlNTh3Uk1TaGpQdUxCODNiSytkWFlo?=
 =?utf-8?B?b2Z4RFFjYThtcGszVUZOTGdBWTFJdHUyK2N5bDcvRnBzbjc4ZHhxUEM0QjZn?=
 =?utf-8?B?MTBpQnBOWXhWOUFseVc0QXVwYkNGTGlqOVJ4ODRCK3JYYkZOQXExMlFMSEZ4?=
 =?utf-8?B?c2lreDc5c3RMZDUvYWVNMEhBeWgwbUJrZllPTFd6QWh2bllGQkpGTlV4SmFW?=
 =?utf-8?B?SjdITDlDVUFOTnNkcDBmUCtkRzhyeHlaWFBnSnVYem5vMlRzNXJ1Q2U3QnpY?=
 =?utf-8?B?MHBUWW80VkFIRi9jbGRLbU95ck1HVlhpYUk3VDRMWlEyYzdIUjJsbW1pWWRK?=
 =?utf-8?B?UEl5UitySVVEb0VoazhEYlJqSG9YRkUyMXFIOGROclJwcHk1TGR6ZUNCdCtw?=
 =?utf-8?B?eThKZ0R0bDlUZ0c2VnJSaUVyK3NHOWtRUExnamJIRHduWUdUeXl5TXZYeXIy?=
 =?utf-8?B?REdXOVhDTEVBYTV6cmxDaE1UZ01JMUVCSDR3NURXYlBENU4rSURYSEhHMHlv?=
 =?utf-8?B?dUJIcEcvVnh6ZE5hcm4yaEt0M0NDMDE0NW5GZ2VrZm5qNVZIU3g0KzVKK2VW?=
 =?utf-8?B?UlA4aG0ySFRnSnppMlIxN2I0aG9HaTJyOU9iemdvQmhjR1MwTldaem9pUzg0?=
 =?utf-8?B?dGwyNm5TZkdKS01rcVRDUlVHOFFNOW80RVZiWWdoTHBCUnhzN1gybDlzQlBZ?=
 =?utf-8?B?WU5ac3VBcVM5cDMwYXUzUmFENExiZEo3ODNZSGFnaTBWMHJOOWQveXVMcmZa?=
 =?utf-8?B?VjJsQ3JEL1hGU1BiRzZaaHZGMTZNZmEwU29ueVYrckllN0FQRnRDSGVKdVRs?=
 =?utf-8?B?R0w3SzU2L2FqRWhDK2NBZ01MVVBRSnE1aXUyL3krNk5Gb2gxWW1jQURxckVX?=
 =?utf-8?B?OUdmVDN6bHNWZWFOSTRsVjBSN1o2WS9zMTRRSkRUY0pIVWQvaitleURtcGp5?=
 =?utf-8?B?Szc5emN5dTUzUUZUK2NmUWgxQkZKb09Dbk9ieWdFNGc2NURkWlZuTmphZ2FU?=
 =?utf-8?B?elExdU8vRHdGd0VKUFY4cGkvdjB6aXM1WTRzd2lFUTdzbzZqVzdSenJhNUZB?=
 =?utf-8?B?SklEL05aemx5WmJmUFdVOFNHWU1tNFg0dHlsZmtXWDRFcTJtZkxZeFdId09U?=
 =?utf-8?B?aDRRbHUvT1lRYUsrYXVIVStiU1ByN0huOG8wMEptcXVlN2IrUVVmRVljREl1?=
 =?utf-8?B?SUtOY3pnaHdhaW5uV25xdHVyWmQ5WkgvKzhpRFJpa2FMK1BWZGdQV0FyQlZI?=
 =?utf-8?B?NDFyTXBwbjR4MlBnWDU4dnhwZ09Rd00rOHdib2w1YWpKSWtJU0xuTDMwUXha?=
 =?utf-8?B?eUN0cVRHZXJRb3pWSkozYTZiL1FTbnp2a1BqREtjUWlsWVJsMlpROHk4R1Bv?=
 =?utf-8?B?V2UrMjVtZG51U3RNRSt1a0tZU2doVzEvb1Jmbzk3SWZsUXo0RnhzSzBRbVh4?=
 =?utf-8?B?a2FHWTZHK0dob29wSTZLeHVaWEQxazg5T3hQVnRETXN6K1FDNHgxclRkVE05?=
 =?utf-8?Q?FQvd/8dLvPoy4mC/V2+H9S3/b6tth7uB?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 55d8d9b2-0cac-4f89-4789-08da0b252824
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 10:25:44.3239
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: xElzoen6pCELw8IARJYia9hDcJ0O57zhOOIetruEXhHZAKL6kO2FW/8I1WPef+/RjtZuWAGNJlKUAjWB12szNg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA0PR03MB5578
X-OriginatorOrg: citrix.com

On Fri, Mar 11, 2022 at 09:33:15AM +0100, Roger Pau Monné wrote:
> On Thu, Mar 10, 2022 at 06:01:48PM +0000, Andrew Cooper wrote:
> > On 08/03/2022 14:52, Roger Pau Monne wrote:
> > > On Tue, Mar 08, 2022 at 02:38:47PM +0000, Andrew Cooper wrote:
> > >> On 02/03/2022 14:27, Roger Pau Monne wrote:
> > >>> diff --git a/livepatch-build b/livepatch-build
> > >>> index 38a92be..656cdac 100755
> > >>> --- a/livepatch-build
> > >>> +++ b/livepatch-build
> > >>> @@ -98,14 +98,20 @@ function build_special()
> > >>>  
> > >>>      # Build with special GCC flags
> > >>>      cd "${SRCDIR}/xen" || die
> > >>> -    sed -i 's/CFLAGS += -nostdinc/CFLAGS += -nostdinc -ffunction-sections -fdata-sections/' Rules.mk
> > >>> -    cp -p arch/x86/Makefile arch/x86/Makefile.bak
> > >>> -    sed -i 's/--section-alignment=0x200000/--section-alignment=0x1000/' arch/x86/Makefile
> > >>> -    # Restore timestamps to prevent spurious rebuilding
> > >>> -    touch --reference=arch/x86/Makefile.bak arch/x86/Makefile
> > >>> -    make "-j$CPUS" $XEN_DEBUG &> "${OUTPUT}/build_${name}_compile.log" || die
> > >>> -    sed -i 's/CFLAGS += -nostdinc -ffunction-sections -fdata-sections/CFLAGS += -nostdinc/' Rules.mk
> > >>> -    mv -f arch/x86/Makefile.bak arch/x86/Makefile
> > >>> +    if grep -q 'nostdinc' Rules.mk; then
> > >>> +         # Support for old build system, attempt to set -f{function,data}-sections and rebuild
> > >>> +        sed -i 's/CFLAGS += -nostdinc/CFLAGS += -nostdinc -ffunction-sections -fdata-sections/' Rules.mk
> > >>> +        cp -p arch/x86/Makefile arch/x86/Makefile.bak
> > >>> +        sed -i 's/--section-alignment=0x200000/--section-alignment=0x1000/' arch/x86/Makefile
> > >>> +        # Restore timestamps to prevent spurious rebuilding
> > >>> +        touch --reference=arch/x86/Makefile.bak arch/x86/Makefile
> > >>> +        make "-j$CPUS" $XEN_DEBUG &> "${OUTPUT}/build_${name}_compile.log" || die
> > >>> +        sed -i 's/CFLAGS += -nostdinc -ffunction-sections -fdata-sections/CFLAGS += -nostdinc/' Rules.mk
> > >>> +        mv -f arch/x86/Makefile.bak arch/x86/Makefile
> > >>> +    else
> > >>> +        # -f{function,data}-sections set by CONFIG_LIVEPATCH
> > >>> +        make "-j$CPUS" $XEN_DEBUG &> "${OUTPUT}/build_${name}_compile.log" || die
> > >>> +    fi
> > >> This really ought to be the other way around, by spotting the thing we
> > >> know is good, and then falling back to the heuristics.  In light of the
> > >> updates to the Xen side, something like:
> > > I'm not sure I agree. I do prefer to spot the 'bad' one, and just
> > > fallback to expecting Xen to correctly set -f{function,data}-sections
> > > otherwise.
> > >
> > >> if grep -q CC_SPLIT_SECTIONS Kconfig; then
> > > Because this logic ties us to not moving CC_SPLIT_SECTIONS from being
> > > defined in xen/Kconfig (or even changing it's name), and gain ties the
> > > livepatch tools to internal details about the Xen build system.
> > 
> > It doesn't particularly matter which way around the if/else is.  It does
> > matter that we're choosing based on something relevant.
> > 
> > nostdinc in Rules.mk has exactly the same amount of "magic string in
> > magic file" as CC_SPLIT_SECTIONS in Kconfig, but has absolutely nothing
> > to do with the property we actually care about.
> > 
> > Really what you actually want is
> > 
> > if grep -q CC_SPLIT_SECTIONS Kconfig; then
> >     # Xen behaves sensibly
> > elif grep -q 'nostdinc' Rules.mk; then
> >     # Legacy mess with Rules.mk
> > else
> >     die "Help with build system divination"
> > fi
> > 
> > The "behaves sensibly" case is unlikely to change name and unlikely to
> > move locations, but each are easy to cope with via `grep -e FOO -e BAR
> > file1 file2`, and this approach avoids the problem of blindly (and
> > falsely) assuming that anything which is 4.14 and later splits sections
> > correctly, and that this will remain true even when someone adds "# use
> > to have -nostdinc here" to Rules.mk.
> 
> TBH, I don't find the proposed solution is much better to what's in
> this patch, and as said I really dislike tying the behavior of the
> livepatch build tools to heuristics against Xen internal build files -
> be it a Kconfig or a Makefile. Specially because your proposed
> approach adds heuristics to detect the 'good' case which should be the
> default one going forward.
> 
> A better option might be to just make the 'build adjustments' a
> command line option that the user can pass to the tools, ie:
> --build-adjust and let the user decide whether it needs the
> adjustments or not. If I was a livepatch user myself I would seriously
> consider picking the linker script changes and backport that to my
> production version.

Ping?

Is the proposed command line option an acceptable way to move this
forward?

Can I have an opinion from the maintainers?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 10:27:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 10:27:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292898.497427 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWFFe-0000uB-IS; Mon, 21 Mar 2022 10:27:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292898.497427; Mon, 21 Mar 2022 10:27:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWFFe-0000u4-F7; Mon, 21 Mar 2022 10:27:02 +0000
Received: by outflank-mailman (input) for mailman id 292898;
 Mon, 21 Mar 2022 10:27:00 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=8hCO=UA=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nWFFc-0000tn-SW
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 10:27:00 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 70fb4aeb-a901-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 11:26:59 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 80D6A1F385;
 Mon, 21 Mar 2022 10:26:59 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 3080013AD5;
 Mon, 21 Mar 2022 10:26:59 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id T8HoCfNSOGIuegAAMHmgww
 (envelope-from <jgross@suse.com>); Mon, 21 Mar 2022 10:26:59 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 70fb4aeb-a901-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647858419; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=p2mtkALxVHViPF31UbfaqQerGr40TgNnHKOVHFVrOOw=;
	b=AOwffkojH/O2e3D8l4Ml/Y+GkM9ZRfwEmLWzJnupq3KTm7wMIoWlUifzCsIGiLozLRXg9i
	n0jQpN8lSwtcc2lL7IlDhSqGcV86n+ipQum6fMpTXj5IFXl4om5LwQoTSDCarq8LnB5Y9g
	vx6n0EmFHajqGAeBTtUdvOyAZVDC59I=
Message-ID: <9143f2f8-9f96-66f4-0020-64918481606c@suse.com>
Date: Mon, 21 Mar 2022 11:26:58 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH 1/1] xen/blkfront: fix comment for need_copy
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Dongli Zhang <dongli.zhang@oracle.com>
Cc: linux-block@vger.kernel.org, xen-devel@lists.xenproject.org,
 boris.ostrovsky@oracle.com, sstabellini@kernel.org, axboe@kernel.dk,
 linux-kernel@vger.kernel.org
References: <20220317220930.5698-1-dongli.zhang@oracle.com>
 <YjhN4neEJMs04JEN@Air-de-Roger>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <YjhN4neEJMs04JEN@Air-de-Roger>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------HDqalv0XKUt4dz6fA0XKZSyr"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------HDqalv0XKUt4dz6fA0XKZSyr
Content-Type: multipart/mixed; boundary="------------3da2YXrQFw7IfIqTv3HvrD0W";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Dongli Zhang <dongli.zhang@oracle.com>
Cc: linux-block@vger.kernel.org, xen-devel@lists.xenproject.org,
 boris.ostrovsky@oracle.com, sstabellini@kernel.org, axboe@kernel.dk,
 linux-kernel@vger.kernel.org
Message-ID: <9143f2f8-9f96-66f4-0020-64918481606c@suse.com>
Subject: Re: [PATCH 1/1] xen/blkfront: fix comment for need_copy
References: <20220317220930.5698-1-dongli.zhang@oracle.com>
 <YjhN4neEJMs04JEN@Air-de-Roger>
In-Reply-To: <YjhN4neEJMs04JEN@Air-de-Roger>

--------------3da2YXrQFw7IfIqTv3HvrD0W
Content-Type: multipart/mixed; boundary="------------k1urJJizQ7n30a6sz3vlkF5u"

--------------k1urJJizQ7n30a6sz3vlkF5u
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

T24gMjEuMDMuMjIgMTE6MDUsIFJvZ2VyIFBhdSBNb25uw6kgd3JvdGU6DQo+IE9uIFRodSwg
TWFyIDE3LCAyMDIyIGF0IDAzOjA5OjMwUE0gLTA3MDAsIERvbmdsaSBaaGFuZyB3cm90ZToN
Cj4+IFRoZSAnbmVlZF9jb3B5JyBpcyBzZXQgd2hlbiBycV9kYXRhX2RpcihyZXEpIHJldHVy
bnMgV1JJVEUsIGluIG9yZGVyIHRvDQo+PiBjb3B5IHRoZSB3cml0dGVuIGRhdGEgdG8gcGVy
c2lzdGVudCBwYWdlLg0KPj4NCj4+ICIubmVlZF9jb3B5ID0gcnFfZGF0YV9kaXIocmVxKSAm
JiBpbmZvLT5mZWF0dXJlX3BlcnNpc3RlbnQsIg0KPiANCj4gSSB3b3VsZCBhbHNvIGFkZDoN
Cj4gDQo+IEZpeGVzOiBjMDA0YTZmZTBjNDAgKCdibG9jay94ZW4tYmxrZnJvbnQ6IE1ha2Ug
aXQgcnVubmluZyBvbiA2NEtCIHBhZ2UgZ3JhbnVsYXJpdHknKQ0KDQpIbW0sIGEgIkZpeGVz
OiIgdGFnIGZvciBhIGNoYW5nZSBpbiBhIGNvbW1lbnQ/DQoNClRoaXMgbWlnaHQgZ2VuZXJh
dGUgYWRkaXRpb25hbCB3b3JrIGUuZy4gZm9yIGRvd25zdHJlYW1zICh3ZSBhdCBTVVNFIGhh
dmUNCnNjcmlwdHMgY2hlY2tpbmcgIkZpeGVzOiIgdGFncyBhbmQgcmVxdWlyZSBzdWNoIGNo
YW5nZXMgdG8gYmUgYXBwbGllZCB0bw0Ka2VybmVscyBoYXZpbmcgdGhlIGZpeGVkIHBhdGNo
IGFwcGxpZWQpLg0KDQpUaGF0IHNhaWQgSSdkIHByZWZlciBub3QgaGF2aW5nIGEgIkZpeGVz
OiIgdGFnIGZvciBzdWNoIGNoYW5nZXMsIGJ1dCBtYXliZQ0KdGhpcyBpcyBqdXN0IGR1ZSB0
byB0aGUgZmFjdCB0aGF0IGl0IHdvdWxkIGJlIG1lIGhhdmluZyB0byBhcHBseSB0aGlzDQpw
YXRjaCB0byB0aGUgU1VTRSBrZXJuZWxzLi4uDQoNCg0KSnVlcmdlbg0K
--------------k1urJJizQ7n30a6sz3vlkF5u
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------k1urJJizQ7n30a6sz3vlkF5u--

--------------3da2YXrQFw7IfIqTv3HvrD0W--

--------------HDqalv0XKUt4dz6fA0XKZSyr
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmI4UvIFAwAAAAAACgkQsN6d1ii/Ey91
AwgAk7qUzQY7ppbSKnwccCfalJb2WWdN/Zo7e7wkqLz0ShjGLzCdOaDvq5JXOIx40ns0Z1Pm//pC
5pDpXvaVHkuFEZBOHoD3EhFp6dJUhAwFJLnpH81RvRQRP7m9jt5NBpgznQtaGl20sSxuvu6d1B6z
GlAI3egjKVvJaShMVpsykIpI8CJTZ8daQFxSBi+2A2oqQ5zHbmm6587wI1uu+Vi0thqD3gOIakPB
cENVrLpeIK9Adj1vIMSZXbSM+L/ND02G//BrSA9UTKUmdfMabVudUX6s9nbyVUt/kw6ZDzDHt5mY
q6dDewl9nnA1SuoxN3BDXb/LGhsKB86nFRdkqIFclQ==
=142m
-----END PGP SIGNATURE-----

--------------HDqalv0XKUt4dz6fA0XKZSyr--


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 10:28:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 10:28:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292901.497438 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWFHN-0001Y9-Vg; Mon, 21 Mar 2022 10:28:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292901.497438; Mon, 21 Mar 2022 10:28:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWFHN-0001Y2-SC; Mon, 21 Mar 2022 10:28:49 +0000
Received: by outflank-mailman (input) for mailman id 292901;
 Mon, 21 Mar 2022 10:28:48 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWFHM-0001Xr-71; Mon, 21 Mar 2022 10:28:48 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWFHM-0004VA-5E; Mon, 21 Mar 2022 10:28:48 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWFHL-0005aH-Jk; Mon, 21 Mar 2022 10:28:47 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWFHL-0002c9-JH; Mon, 21 Mar 2022 10:28:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=+URE4flev35p3c0G12AYx8C0bLQr99OwiZ4W5TFuE60=; b=e0tjkkRN098GOjFP/J7eiklROh
	IDDWGz34ZgvlWPENOOW+IJ4046kcAdpdKKPocIb7K6N8swFqi46d0y4zsJn7jbJBSO7caQ+CgPoKK
	O/vmr48Ey/VHbgYwWFSIn3geSo7W+gKTKFdwqH202cuRYi+JC8gUiwWeL8gQvjpO/Zt4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168746-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168746: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 21 Mar 2022 10:28:47 +0000

flight 168746 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168746/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   20 days
Failing since        168258  2022-03-01 01:55:31 Z   20 days  206 attempts
Testing same since   168738  2022-03-21 02:39:18 Z    0 days    5 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 859 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 10:50:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 10:50:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292911.497449 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWFc6-0004m6-TO; Mon, 21 Mar 2022 10:50:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292911.497449; Mon, 21 Mar 2022 10:50:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWFc6-0004lz-OY; Mon, 21 Mar 2022 10:50:14 +0000
Received: by outflank-mailman (input) for mailman id 292911;
 Mon, 21 Mar 2022 10:50:14 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=TqSg=UA=citrix.com=prvs=072a23104=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nWFc6-0004lq-26
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 10:50:14 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id adae3458-a904-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 11:50:12 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: adae3458-a904-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647859812;
  h=date:from:to:cc:subject:message-id:references:
   mime-version:in-reply-to;
  bh=ml2KVQclTyJOEspxM/gK6Fugf2lMoSzVLKsfuOZIYbs=;
  b=W4QL94Sh9lqIlnILRHfVCcmVdVaP1GTbppqFzUI3rE2xEhqPXAXb/Xcj
   HoqOzM9lTjmKbZXxnpy83yKsaOVm88HoxX+vmGx4F80S6dDMZ2MYBZTj3
   u8sYhyQ7IifC27Z3mKoleN6GWmPAblR1gMPrmsYaFvPnElF+CU8XqTYf3
   o=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 66754730
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:k2/HbqPhGw4pYZnvrR11l8FynXyQoLVcMsEvi/4bfWQNrUog1zIAz
 jNLWzrVM/zYNmL9ftEgaYSy8ElV6JWGm4IwSAto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi2Ncw2LBVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Z4
 tAVlMe8WFwQL47dqfw0XiNHHn8nBPgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALJc/3PIQZqzd4wCvQF/oOSpHfWaTao9Rf2V/cg+gQQ6mDO
 5VCMVKDajyYYRt3GFpMN64Alc6wiUjvVDEGmRGs8P9fD2/7k1UqjemF3MDuUsyHQ4BZk1iVo
 krC/n/lGVcKOdqH0z2H/3mwwOjVkkvTQ54fGrS+8bhxnFSZy2gXCRsXfUu6pfi/mgi1XNc3A
 0YZ4DY0pK4+skmiVMDgXgaQqWSB+BUbXrJ4DOkS+AyLjK3O7G6xHXMYRzRMbNgnss4eRjEw0
 FKN2dTzClRHsqCRSH+b3qeZq3W1Iyd9BWQLfyMDQCMO6sPvp4x1hRXKJuuPC4bs0IezQ2uph
 WnX8m5u3N3/kPLnyY2R+Ajm2D69/aHYbR8E/izaZH2osFpAMdvNi5OT1XDX6vNJLYC8R1aHv
 WQZl8X20N3iHa1hhwTWHrxTQejBC+KtdWSF3AUxR8VJGyGFoSbLQGxG3N1pyK6F2O4gcCShX
 kLcsBg5CHR7bCrzNv8fj25c5q0XIUnc+TbNC6u8gjlmOMEZmOq7EMZGPxL44owVuBJw+ZzTw
 L/CGSpWMV4UCL580B29TPoH3Lkgy0gWnD2PGsCil03+gePFNRZ5rIvp13PUM4gEAF6s+l2Jo
 76zyePUo/mgbAEOSnaOqtNCRbz7BXM6GYr3u6Rqmh2reWJb9JUaI6aJm9sJItU994wMz7ug1
 iztCydwlQuk7VWaeFriV5yWQO62NXqJhSlgZnJE0JfB8yVLXLtDG49ELsppJ+Z7rLI/pRO2J
 tFcE/i97j10Ymyv01wggVPV9uSOqDzDadqyAheY
IronPort-HdrOrdr: A9a23:M0dG4qoKRotj5HRakBeiaqUaV5oreYIsimQD101hICG8cqSj+f
 xGuM5rsSMc6QxhPU3I9ursBEDtex/hHNtOkO4s1NSZLWvbUQmTTL2KhLGKq1aLJ8S9zJ8/6U
 4JSdkZNDSaNzlHZKjBjzWFLw==
X-IronPort-AV: E=Sophos;i="5.90,198,1643691600"; 
   d="scan'208";a="66754730"
Date: Mon, 21 Mar 2022 10:50:05 +0000
From: Anthony PERARD <anthony.perard@citrix.com>
To: Stefano Stabellini <sstabellini@kernel.org>
CC: Julien Grall <julien@xen.org>, <cardoe@cardoe.com>, <wl@xen.org>,
	<andrew.cooper3@citrix.com>, <xen-devel@lists.xenproject.org>, "Stefano
 Stabellini" <stefano.stabellini@xilinx.com>, <bertrand.marquis@arm.com>
Subject: Re: [PATCH RESEND 2/2] gitlab-ci: add an ARM32 qemu-based smoke test
Message-ID: <YjhYXYCMLHfXlVwB@perard.uk.xensource.com>
References: <20210714004854.31135-2-sstabellini@kernel.org>
 <2aaddfc5-0502-fd0a-6393-63a17c7f6778@xen.org>
 <alpine.DEB.2.22.394.2203161508200.3497@ubuntu-linux-20-04-desktop>
 <YjSfPtUwWrqhDsW2@perard.uk.xensource.com>
 <alpine.DEB.2.22.394.2203181713000.2910984@ubuntu-linux-20-04-desktop>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <alpine.DEB.2.22.394.2203181713000.2910984@ubuntu-linux-20-04-desktop>

On Fri, Mar 18, 2022 at 05:15:06PM -0700, Stefano Stabellini wrote:
> On Fri, 18 Mar 2022, Anthony PERARD wrote:
> > On Wed, Mar 16, 2022 at 06:38:53PM -0700, Stefano Stabellini wrote:
> > > Also considering the recent arm32 xen breakage, which could have been
> > > caught by gitlab-ci before commit,
> > 
> > I'm not sure that's true. I think the commits you are speaking about
> > also break the build on x86, which was caught by the gitlab ci.
> > 
> > Anyway, some arm32 smoke tests on gitlab should be useful.
> 
> I think we are probably talking about different breakages :-)
> 
> Ayan recently broke Xen on ARM32 (run-time not build-time) with the
> commit 9e5a68a66 and fef5531fd. I verified that the QEMU32 test in this
> series actually catches the failure.

See the pipeline on this commit:
https://gitlab.com/xen-project/xen/-/commit/fef5531fd
https://gitlab.com/xen-project/xen/-/pipelines/491963118

;-)

-- 
Anthony PERARD


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 10:59:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 10:59:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292914.497460 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWFl8-0005Ut-OK; Mon, 21 Mar 2022 10:59:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292914.497460; Mon, 21 Mar 2022 10:59:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWFl8-0005Um-LC; Mon, 21 Mar 2022 10:59:34 +0000
Received: by outflank-mailman (input) for mailman id 292914;
 Mon, 21 Mar 2022 10:59:33 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWFl7-0005UJ-ER; Mon, 21 Mar 2022 10:59:33 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWFl7-0004z7-BW; Mon, 21 Mar 2022 10:59:33 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWFl6-0006Gx-Ux; Mon, 21 Mar 2022 10:59:33 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWFl6-0001w5-UX; Mon, 21 Mar 2022 10:59:32 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=+t/UvaLBXficdJQepGz6NsWPSCq03BCxappbXtjWVg4=; b=tI2hFB2LSETsDXqv0EOU5gA7Ti
	CUHt8fERKQttyrrx15hqfvVlR7rlt3lUPcjdq2BGrIzyu4NFnptFOI6PuXigUt1iRdypDiLY7jMzy
	bmJyf6ne+//+IHcCm2CB6kZhf2cdFiG/VUREFUPBtewf1/UZYl8kmpc+7lzHbv4Y6UpY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168747-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168747: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 21 Mar 2022 10:59:32 +0000

flight 168747 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168747/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   21 days
Failing since        168258  2022-03-01 01:55:31 Z   20 days  207 attempts
Testing same since   168738  2022-03-21 02:39:18 Z    0 days    6 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 859 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 11:09:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 11:09:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292921.497471 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWFun-000701-Pn; Mon, 21 Mar 2022 11:09:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292921.497471; Mon, 21 Mar 2022 11:09:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWFun-0006zu-Ks; Mon, 21 Mar 2022 11:09:33 +0000
Received: by outflank-mailman (input) for mailman id 292921;
 Mon, 21 Mar 2022 11:09:32 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=f0xq=UA=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nWFum-0006zo-I0
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 11:09:32 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTP
 id 6115d391-a907-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 12:09:30 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 89B911042;
 Mon, 21 Mar 2022 04:09:29 -0700 (PDT)
Received: from [10.57.5.187] (unknown [10.57.5.187])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id E45593F766;
 Mon, 21 Mar 2022 04:09:27 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6115d391-a907-11ec-8fbc-03012f2f19d4
Message-ID: <7ef73ee8-31df-149d-c4c6-4f13ddd19ec5@arm.com>
Date: Mon, 21 Mar 2022 12:09:13 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [PATCH 1/3] xen: Introduce a header to store common linker
 scripts content
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <20220321082114.49953-1-michal.orzel@arm.com>
 <20220321082114.49953-2-michal.orzel@arm.com>
 <cb61531a-5482-3aab-58bd-84f99f21ec48@suse.com>
 <AM6PR08MB38148D3FB84D91DB089C48CC89169@AM6PR08MB3814.eurprd08.prod.outlook.com>
 <2930b69f-9fba-e26c-8ed5-90ca93db92f4@suse.com>
From: Michal Orzel <michal.orzel@arm.com>
In-Reply-To: <2930b69f-9fba-e26c-8ed5-90ca93db92f4@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

Hi Jan,

On 21.03.2022 11:23, Jan Beulich wrote:
> Note: please properly quote your replies. As you'll see what you said
> in reply to my remarks is not properly separated from my remarks, and
> hence hard to read.
> 
Sorry about that. I had some issues with my e-mail client and had to use the non-default one.

> On 21.03.2022 11:14, Michal Orzel wrote:
>> On 21.03.2022 09:21, Michal Orzel wrote:
>>> --- /dev/null
>>> +++ b/xen/include/xen/xen_lds.h
>>> @@ -0,0 +1,114 @@
>>> +#ifndef __XEN_LDS_H__
>>> +#define __XEN_LDS_H__
>>> +
>>> +/*
>>> + * Common macros to be used in architecture specific linker scripts.
>>> + */
>>> +
>>> +/* Macros to declare debug sections. */
>>> +#ifdef EFI
>>> +/*
>>> + * Use the NOLOAD directive, despite currently ignored by (at least) GNU ld
>>> + * for PE output, in order to record that we'd prefer these sections to not
>>> + * be loaded into memory.
>>> + */
>>> +#define DECL_DEBUG(x, a) #x ALIGN(a) (NOLOAD) : { *(x) }
>>> +#define DECL_DEBUG2(x, y, a) #x ALIGN(a) (NOLOAD) : { *(x) *(y) }
>>> +#else
>>> +#define DECL_DEBUG(x, a) #x 0 : { *(x) }
>>> +#define DECL_DEBUG2(x, y, a) #x 0 : { *(x) *(y) }
>>> +#endif
>>> +
>>> +/* DWARF debug sections. */
>>> +#define DWARF_DEBUG_SECTIONS                      \
>>> +  DECL_DEBUG(.debug_abbrev, 1)                    \
>>> +  DECL_DEBUG2(.debug_info, .gnu.linkonce.wi.*, 1) \
>>> +  DECL_DEBUG(.debug_types, 1)                     \
>>> +  DECL_DEBUG(.debug_str, 1)                       \
>>> +  DECL_DEBUG2(.debug_line, .debug_line.*, 1)      \
>>> +  DECL_DEBUG(.debug_line_str, 1)                  \
>>> +  DECL_DEBUG(.debug_names, 4)                     \
>>> +  DECL_DEBUG(.debug_frame, 4)                     \
>>> +  DECL_DEBUG(.debug_loc, 1)                       \
>>> +  DECL_DEBUG(.debug_loclists, 4)                  \
>>> +  DECL_DEBUG(.debug_macinfo, 1)                   \
>>> +  DECL_DEBUG(.debug_macro, 1)                     \
>>> +  DECL_DEBUG(.debug_ranges, 8)                    \
>>> +  DECL_DEBUG(.debug_rnglists, 4)                  \
>>> +  DECL_DEBUG(.debug_addr, 8)                      \
>>> +  DECL_DEBUG(.debug_aranges, 1)                   \
>>> +  DECL_DEBUG(.debug_pubnames, 1)                  \
>>> +  DECL_DEBUG(.debug_pubtypes, 1)
>>> +
>>> +/*
>>> + * Stabs debug sections.
>>> + *
>>> + * LLVM ld also wants .symtab, .strtab, and .shstrtab placed. These look to
>>> + * be benign to GNU ld, so we can have them here unconditionally.
>>> + */
>>> +#define STABS_DEBUG_SECTIONS                 \
>>> +  .stab 0 : { *(.stab) }                     \
>>> +  .stabstr 0 : { *(.stabstr) }               \
>>> +  .stab.excl 0 : { *(.stab.excl) }           \
>>> +  .stab.exclstr 0 : { *(.stab.exclstr) }     \
>>> +  .stab.index 0 : { *(.stab.index) }         \
>>> +  .stab.indexstr 0 : { *(.stab.indexstr) }   \
>>> +  .comment 0 : { *(.comment) }               \
>>> +  .symtab 0 : { *(.symtab) }                 \
>>> +  .strtab 0 : { *(.strtab) }                 \
>>> +  .shstrtab 0 : { *(.shstrtab) }
>>
>> Please don't add non-Stabs sections to this macro.
>>
>> Ok, I will add a new macro storing the last 4 sections called ELF_DETAILS_SECTIONS,
>> to be coherent with what Linux does (ELF_DETAILS).
>>
>>> +#ifdef EFI
>>> +#define DISCARD_EFI_SECTIONS \
>>> +       *(.comment)   \
>>> +       *(.comment.*) \
>>> +       *(.note.*)
>>> +#else
>>> +#define DISCARD_EFI_SECTIONS
>>> +#endif
>>> +
>>> +/* Sections to be discarded. */
>>> +#define DISCARD_SECTIONS     \
>>> +  /DISCARD/ : {              \
>>> +       *(.text.exit)         \
>>> +       *(.exit.text)         \
>>> +       *(.exit.data)         \
>>> +       *(.exitcall.exit)     \
>>> +       *(.discard)           \
>>> +       *(.discard.*)         \
>>> +       *(.eh_frame)          \
>>> +       *(.dtors)             \
>>> +       *(.dtors.*)           \
>>> +       *(.fini_array)        \
>>> +       *(.fini_array.*)      \
>>> +       DISCARD_EFI_SECTIONS  \
>>> +  }
>>> +
>>> +#define CTORS_SECTION                           \
>>> +       . = ALIGN(8);                            \
>>> +       __ctors_start = .;                       \
>>> +       *(SORT_BY_INIT_PRIORITY(.init_array.*))  \
>>> +       *(SORT_BY_INIT_PRIORITY(.ctors.*))       \
>>> +       *(.init_array)                           \
>>> +       *(.ctors)                                \
>>> +       __ctors_end = .;
>>> +
>>> +#define VPCI_SECTION             \
>>> +       . = ALIGN(POINTER_ALIGN); \
>>> +       __start_vpci_array = .;   \
>>> +       *(SORT(.data.vpci.*))     \
>>> +       __end_vpci_array = .;
>>> +
>>> +#define HYPFS_SECTION            \
>>> +       . = ALIGN(8);             \
>>> +       __paramhypfs_start = .;   \
>>> +       *(.data.paramhypfs)       \
>>> +       __paramhypfs_end = .;
>>> +
>>> +#define LOCK_PROFILE_SECTION     \
>>> +       . = ALIGN(POINTER_ALIGN); \
>>> +       __lock_profile_start = .; \
>>> +       *(.lockprofile.data)      \
>>> +       __lock_profile_end = .;
>>> +
>>> +#endif /* __XEN_LDS_H__ */
>>
>> I'm not sure _SECTION is a good suffix to use in the four names above:
>> These aren't individual sections in the output, and for CTORS_SECTION
>> it's also not even a single input section.
>>
>> How about _ENTRY suffix?
>> Otherwise we can do different suffixes depending on the content.
>> LOCK_PROFILE_DATA, HYPFS_PARAM, VPCI_ARRAY
> 
> I'd prefer the latter.
> 
Ok.

>> As to CTORS_SECTION - I'm unconvinced of generalizing this without
>> first getting it right.
>>
>> I will get rid of CTORS_SECTIONS then.
>>
>> Overall I think it would be better to introduce this header along
>> with actually using the macros. That way one can check within the
>> patch that what you move / replace actually matches on both sides
>> without needing to cross patch boundaries. If you wanted to introduce
>> (and then include right away) an empty header first, that would be an
>> acceptable intermediate approach afaic.
>>
>> I just wanted to split this into arch specific patches because maintainers are different.
>> I do not understand your second solution with empty header.
>> Do you mean that the first patch shall create an empty header (with just an intro comment)
>> and include it in arch specific linker scripts?
> 
> Yes, I view this as one possible option.
> 
>> Anyway, I can merge these 3 patches into 1 if you want.
> 
> Well, at least part of the Arm changes can likely remain separate.
> But where you abstract things by introducing a macro in the header,
> it would be better if the original (supposedly functionally identical)
> construct(s) was (were) also replaced at the same time.
> 
Hmm, I think I would go with the empty header solution.
So in v2 I would do the following:
-first patch introducing empty header and including it in linker scripts
-second patch making use of common macros in x86 and arm linker scripts

> Jan
> 

Cheers,
Michal


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 11:17:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 11:17:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292924.497482 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWG2b-0008Qy-If; Mon, 21 Mar 2022 11:17:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292924.497482; Mon, 21 Mar 2022 11:17:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWG2b-0008Qr-FJ; Mon, 21 Mar 2022 11:17:37 +0000
Received: by outflank-mailman (input) for mailman id 292924;
 Mon, 21 Mar 2022 11:17:35 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWG2Z-0008Qh-GO; Mon, 21 Mar 2022 11:17:35 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWG2Z-0005Jx-B4; Mon, 21 Mar 2022 11:17:35 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWG2Y-0006fx-Vu; Mon, 21 Mar 2022 11:17:35 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWG2Y-0005Jw-VQ; Mon, 21 Mar 2022 11:17:34 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Y5rCDjFWaJSuBEFQZ0+c3RBD3cukH0lqr4dH3+FyjRs=; b=JBxV/LhfYdtzEMVCZBv84k7Xx8
	cp7DOPqw+4E35A0brXfyrrLUdFQ2yAM6rPA3t/cSR/S0TTHhgPuN5WAfmqqoh9tsVSroA1LRqyYax
	RwRpg+Vu8hPr70aPNZ5GbwGWCTONbwlKY3nfgNP7ccyofdEHuC7yOFq6+55P6Qj2wNf4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168737-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168737: tolerable FAIL
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-rtds:guest-localmigrate/x10:fail:heisenbug
    xen-unstable:test-amd64-i386-xl-qemut-debianhvm-i386-xsm:debian-hvm-install:fail:heisenbug
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=fdfb07eb28e42b456e5e1ce999a47cc3ea439f7f
X-Osstest-Versions-That:
    xen=fdfb07eb28e42b456e5e1ce999a47cc3ea439f7f
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 21 Mar 2022 11:17:34 +0000

flight 168737 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168737/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-rtds     20 guest-localmigrate/x10     fail pass in 168722
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm 12 debian-hvm-install fail pass in 168722

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168722
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168722
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168722
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168722
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168722
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168722
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168722
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168722
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168722
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168722
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168722
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168722
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass

version targeted for testing:
 xen                  fdfb07eb28e42b456e5e1ce999a47cc3ea439f7f
baseline version:
 xen                  fdfb07eb28e42b456e5e1ce999a47cc3ea439f7f

Last test of basis   168737  2022-03-21 01:51:59 Z    0 days
Testing same since                          (not found)         0 attempts

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  fail    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     fail    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Published tested tree is already up to date.



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 11:29:44 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 11:29:44 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292932.497492 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWGE5-0001bN-QB; Mon, 21 Mar 2022 11:29:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292932.497492; Mon, 21 Mar 2022 11:29:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWGE5-0001bG-Mw; Mon, 21 Mar 2022 11:29:29 +0000
Received: by outflank-mailman (input) for mailman id 292932;
 Mon, 21 Mar 2022 11:29:28 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWGE4-0001b6-MS; Mon, 21 Mar 2022 11:29:28 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWGE4-0005Uv-IS; Mon, 21 Mar 2022 11:29:28 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWGE4-0006vv-3D; Mon, 21 Mar 2022 11:29:28 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWGE4-00019f-2m; Mon, 21 Mar 2022 11:29:28 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=sYXimDy6SWSciplKOAyevWJ6V/OG/8Tc1fwAKFy5kEk=; b=aUdnNV2KWESa+hHANyvXj6rfrl
	oFsHXY32+SfUGEWel/Vyo6+qHa8si48EQEs7CtG5o7r0d5Ev90SNqKWX0rVO1kGWqAFYQ2oaKN7pN
	Zxs6VI9HWJSo9B6hUgcbLr/UT5DAkxslDoszEEdkOWMAvGPphgxlbs/C5HmbVaMb2pcE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168748-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168748: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 21 Mar 2022 11:29:28 +0000

flight 168748 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168748/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   21 days
Failing since        168258  2022-03-01 01:55:31 Z   20 days  208 attempts
Testing same since   168738  2022-03-21 02:39:18 Z    0 days    7 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 859 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 11:47:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 11:47:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292940.497507 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWGV3-0003zK-A9; Mon, 21 Mar 2022 11:47:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292940.497507; Mon, 21 Mar 2022 11:47:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWGV3-0003zD-7B; Mon, 21 Mar 2022 11:47:01 +0000
Received: by outflank-mailman (input) for mailman id 292940;
 Mon, 21 Mar 2022 11:47:00 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=svEr=UA=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nWGV2-0003z7-Eu
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 11:47:00 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 9d45195f-a90c-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 12:46:58 +0100 (CET)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04lp2050.outbound.protection.outlook.com [104.47.12.50]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-20-RazywuRPO8K_vm4v-l1iHw-1; Mon, 21 Mar 2022 12:46:57 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM0PR04MB6273.eurprd04.prod.outlook.com (2603:10a6:208:137::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.22; Mon, 21 Mar
 2022 11:46:56 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a%6]) with mapi id 15.20.5081.022; Mon, 21 Mar 2022
 11:46:56 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9d45195f-a90c-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647863218;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=2X6yEMK+OHgNoVyLNONBqCrM4DUfGQtj1DZaz8XZ8Xc=;
	b=Ia8zchv8bpEJDNtK8mlfedn9H/D9+ni5dbTRDzLo5wfLhog64B7yqhHuld8auOPEzHV+hJ
	wpmQ5oVmEn5hKimH4IwAyCCjjmc0d0Y3v2zQ8J6UgXAO121noiW6bvhQ8hx0H4UjwW8w87
	58RQiHC4j/vzqwbllrZrGqAOWIB3gjM=
X-MC-Unique: RazywuRPO8K_vm4v-l1iHw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=h7+JA3EFncm/WTWh/XTkx/SX8ZvuK13gmv+TauKcXHStVtwt8v9wEMUGOn/FN9LlyzGp4dvsdY6hh5yMs2rhTlqWSOJc1XXZb+vdVxgkn37oWXV3ePLwJu+y6FGXPxsQRQrRkuYa3xG0ngNp6XdsBK2JFMeDBsxasvY/IBbxINK7excmSb3N2PU8k3zPKMVZAbEJkQ4riKeef7dPWLHZtKyLepcZEtRWHPMLvxWoPrbK0ZRKzYFLsFC4z3cvIBaZgmY222SFWbEB5su87kPTGeHpxt0YB7oZrxeM+VsTgVy8FERa0D9SvdEooRHqx4pueZrBC8dKfxXk6YoWaqutgQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=2X6yEMK+OHgNoVyLNONBqCrM4DUfGQtj1DZaz8XZ8Xc=;
 b=TskZJrxJTJza7uS7pbZpfO5/44UU25R3pJd+9WeszWbItaig5Kqce78r7VNY/Adag8DjlBsQByLux0wnV7JJBUVvM1WqRkHzbtEYFj798XSoKdlo91HMnZcP7MdchbnwPhvxn3zh0w6a2knD7KS5Lf1Pkbk+PrfTprLFOfb1nll92VnEslcVLr1e8Dgo/162yr/4YdPKKmhHkc2ThwQiFuILUcPz8EkkQ0yqkkoLmCaXKwtsyE7yC2Fx+gEPmLKV3/EhSYK0MAZHJBgXWTx7RyPJF0DLcaCea4QZ27lLUjE808GapZrpURrVpc8kyEOhSvMox6PF1nD0o/jQ5z+gyA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <057172d5-437a-347b-b5bb-d102b6b37f0a@suse.com>
Date: Mon, 21 Mar 2022 12:46:54 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Julien Grall <julien@xen.org>
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH] x86/build: work around older GNU ld not leaving .got.plt
 empty
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR06CA0068.eurprd06.prod.outlook.com
 (2603:10a6:20b:464::32) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 35606d6f-533e-4944-9746-08da0b307fe2
X-MS-TrafficTypeDiagnostic: AM0PR04MB6273:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB6273F5CC286B7B8CB342B738B3169@AM0PR04MB6273.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	PKEjjx+N+ybA0P0AjR55IF3HZETGke8WwdOrcJ29fE1jgkAhNyoUZhjEnKRuonHW2ciVhfwQ/dS3Hp77HeAZerL7zdDD3SLd/oELrlZH4qpDOL1Qc3upJM3ilZQw1TnOKu3GybDvMCTal7CtKGTOQ26xNOf4eLFlyueqF1e4IWSk2EIZwMy4TqcQKtRGcpELcvppfMtc1UaYPP6j5dDlgVTl+xVdD5xJLIBqj+JfwmRWxaIZJbJwMvIvQ3qrOjvR/3Mzdm3vSdo8Xwqyfkks/JkxLKPIPzN+HdaJp0kcGKK17XML7P6xPX4R76Vfggehb+xl45Eo0nbBdWE/PEbmh7A1fCpegh5BX0Rb/AvuTCbUFZJ/kaFfJDrFVs0VWjMRHvzfrnndksBkoNwSLBtuMjePYTvji0eq+fW/p9KlNMB0CbcSPI9fB/Kt5dr4C9yGM5J8VzPhYu5Jbtnqeab7SQu3FcVnc2cA1iS+r6cBhrPt9exRB0tpVzvOz1GwYdPUuI547oNrU7OmwffLTswUZhOzAdkwbqIBy7pemUCb6XMHbf7IuL1R9wEPwR7GnpXnqUQxCHwZnw8GrONL56pAnT4BFOsLTfalErvXh7NQtwnVfpTreHAXFHg6qsAP7Og0nUKG8v8e7J2epQltVov6Vtrs3qwDoYGgB5DOri1fq2qiZoVpH47GU2Y7fIF3uPqpDeChgfyWLmMTXueijo1d9+5b5qgANkuZLquNVQHDzEyGRfwiTMJGiElojUCsWf5fndESMdDMBu8trrugWJZdKg==
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(8676002)(31686004)(66476007)(38100700002)(66556008)(66946007)(4326008)(316002)(508600001)(86362001)(5660300002)(31696002)(6486002)(6916009)(186003)(8936002)(26005)(6506007)(2616005)(6512007)(2906002)(36756003)(54906003)(142923001)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?TTQ0OWkzWUJkS2EwcnhNQ1NObTE4Si9UYmhPY3JSc0ViNzhUUG1aVFFucnVD?=
 =?utf-8?B?NmcvSnVaai9TclFtNkladlNtbFRzYjNiSFJLd2g4QnZaTDdZRGxiVUIzamsr?=
 =?utf-8?B?dk9oSDFSakVyVmk5ZUxEcjdSZDA4SzRFS1ZEQTdMaE15VFZLdVkrQWlzT1V1?=
 =?utf-8?B?Q29Ea0N6Sy9aNldteG03Q2dQTlhiM3lYZ01UZkNSLzZDTmg1YTdPMlcyTFFq?=
 =?utf-8?B?M0lwQ1F4T2tVV3A3b2wwazZ2K2NTbjhJVkRma3dyOTE3dk41MHl2WU82SWtF?=
 =?utf-8?B?UFBVdGZnYVdkTEdCTWtBUmlvTEpKM2toSXVFcVBoL0RyV1gvME45SEVnd3dQ?=
 =?utf-8?B?cXJMWGRnQ1ZTeXRqM3lnZTdXRFRuU1M0eVkzcmc3MVFUMjhlTDNJaWN1MGJR?=
 =?utf-8?B?Z0FTaXdHd1l5cU12T3lMRHg0VzFSZWZRLzUyUXdocXlZMXJka3ZnVUZ0eEZC?=
 =?utf-8?B?RHlFeVhZaDQ0NlhSbHorNkx1eTRxRGtXdGtGSlF2SG91UEc3NDNRSldyMEI5?=
 =?utf-8?B?Y0xEd2FEVFlRdFhnTS91OU1rQ0phTmFkTW5Xczl6ajdmVUNxWVMwNWVjUXl0?=
 =?utf-8?B?NjRYVlNwWERZajVFanc0NExPdkd1T0c5UDFVWHc3bVZGRC8zcU1iMDhjMlBu?=
 =?utf-8?B?MXhtREZ6bVhSTzh3Wmp4ekxqM0pvZEtDY1hhTFZ0RG5IRzNwWGJvdTdzS0VF?=
 =?utf-8?B?cSt6OVVQQ2E2cWZGMkMzKzY5Z3VLNEFGZVdRRHg0cWk2WlIvYUZUenRTaFpL?=
 =?utf-8?B?ZStTNFhFYUY5OUNNTG43NWJzU0JEUVlYaWdjZ2EzakVIelI4ZmVIb253MCtR?=
 =?utf-8?B?SkVFTmhxaitGMktTK2MyUXFGbWxmaTdVWWhXK1N5Nis3SVRqTjBrWlpEWEdo?=
 =?utf-8?B?NW5xZDV1Um0ybTlMcXQ5NzVrajhjR000MGlOMjNrMGtEQ2g4R09ZWmJBamRD?=
 =?utf-8?B?TGxVcmVpOFNkQVhxdUpraysvQVlEVm4rRDVNT1VtMlFzVDU4cmRjcWpnUzFn?=
 =?utf-8?B?RWRuMlN3Mmp4dVRKRFNvOFJ5aGZWT3dCbVVBVkxVdDNDcHB4cUtLUUVFcE1L?=
 =?utf-8?B?UklVcGpmaGQxNWsrTFFvVjJLL1k3MzQxTDNVVGdaUXlZRy9hc1dScUNPdTZ4?=
 =?utf-8?B?dVdFcWladHlrN0Q1dEtlSzBUcTFzMkUrUWhoVlYxQ0hBOThzaDJCNlUwS3NW?=
 =?utf-8?B?OXVSQWt1dWsxOXpVRDdTdUxuKy9XRXZUdURhNW42bGw2QWN6WHg1b0VXcVJm?=
 =?utf-8?B?MHlJVXIyd2NrNmZoYnVTNSszRFhEcXF2dkFMRThxU1NLY0RlcXhlZFZIdTlS?=
 =?utf-8?B?bWRNOHpuUjF1bExmNE5xbjRhcWV5eGtyZUFneVBTa05xdWFSMmZBOEJKbFpz?=
 =?utf-8?B?clFuM3pQTG5IWUQrTHEweUZ6ZytJdHVNTTFsczVNM1ZTMFR5T3E2R1pBazE3?=
 =?utf-8?B?TTJoc1pzbmZtQ3gyaVJXdTBrZndKQUxTVE5yNHlVVTQySTNrakNmRExqU0tu?=
 =?utf-8?B?aU9LZG44UWhKNVRNNi9lQVEwcFE2anlSYW82d1ROVkprWGZqNEFXSkh1cFpi?=
 =?utf-8?B?TkdFUnprTGFDVWIrMUpmL1BiRXZSaVZXM2pLeUwwZzUzcXVpWWcrenNjZGZn?=
 =?utf-8?B?QWp6UFdLQzZsZk1EOHlYTUdDZWpoZFhQNm1CRzM4SzJjVnlsQW1PVFNYS0Q5?=
 =?utf-8?B?a3MzY0xnZ01zN202Z2g1cVRaQmhlRzB4RHFlTWh1b2lSeXV6Y0xhTllJR3p3?=
 =?utf-8?B?WVl4c2dndk9uaTB0UEFkcGsvb2krZzdUeWdmOEpQZWZsaVFYbGsvQ215a2d5?=
 =?utf-8?B?SHo0cFNaa0puRVpVOEh6RXM3M1VaOWtRQTVIc1BUWDB3VVJjZWpSRlAyK2sw?=
 =?utf-8?B?ekFpUXE2UUFrSFE0L3U5Mmltc3hPblVrUlJ3dWwwMTkxMU8vRkcxU1BweVJV?=
 =?utf-8?Q?CwhbGHXcH8LGMRCQopxkjvbyalKT80ka?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 35606d6f-533e-4944-9746-08da0b307fe2
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 11:46:55.9175
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: wkVoCbTRn8apzNlwZ02yu3mvX6z/v6UsW6FH9AAbPIG/nA6wvxmLNYS/CxrEnlN5fZEJ7GMlzcvoG+9JDUY6Xg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB6273

The initial three entries in .got.plt are "static", i.e. present
independent of actual entries allocation of which is triggered by
respective relocations. When no real entries are needed, halfway recent
ld discards the "static" portion of the table as well, but older GNU ld
fails to do so.

Fixes: dedb0aa42c6d ("x86/build: use --orphan-handling linker option if available")
Reported-by: Julien Grall <jgrall@amazon.com>
Signed-off-by: Jan Beulich <jbeulich@suse.com>

--- a/xen/arch/x86/xen.lds.S
+++ b/xen/arch/x86/xen.lds.S
@@ -497,7 +497,13 @@ ASSERT(IS_ALIGNED(__bss_end,        8),
 
 #ifndef EFI
 ASSERT(!SIZEOF(.got),      ".got non-empty")
-ASSERT(!SIZEOF(.got.plt),  ".got.plt non-empty")
+/*
+ * At least GNU ld 2.30 and earlier fail to discard the generic part of
+ * .got.plt when no actual entries were allocated. Permit this case alongside
+ * the section being empty.
+ */
+ASSERT(!SIZEOF(.got.plt) || SIZEOF(.got.plt) == 3 * 8,
+       "unexpected .got.plt size")
 ASSERT(!SIZEOF(.igot.plt), ".igot.plt non-empty")
 ASSERT(!SIZEOF(.iplt),     ".iplt non-empty")
 ASSERT(!SIZEOF(.plt),      ".plt non-empty")



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 11:47:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 11:47:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292943.497519 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWGVa-0004VF-KY; Mon, 21 Mar 2022 11:47:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292943.497519; Mon, 21 Mar 2022 11:47:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWGVa-0004V8-G8; Mon, 21 Mar 2022 11:47:34 +0000
Received: by outflank-mailman (input) for mailman id 292943;
 Mon, 21 Mar 2022 11:47:33 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=svEr=UA=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nWGVZ-0004Ul-Fs
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 11:47:33 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b16aadce-a90c-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 12:47:32 +0100 (CET)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur03lp2053.outbound.protection.outlook.com [104.47.9.53]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-23-PheLPJhUPCOcfr8i1XwSoQ-1; Mon, 21 Mar 2022 12:47:31 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by HE1PR0402MB3468.eurprd04.prod.outlook.com (2603:10a6:7:82::33)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.22; Mon, 21 Mar
 2022 11:47:28 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a%6]) with mapi id 15.20.5081.022; Mon, 21 Mar 2022
 11:47:28 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b16aadce-a90c-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647863252;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=/C9gNQQ/WXeRHWoD/77+2fPAAXlkvuCCam48qLYjwoc=;
	b=LarrRN+Gg4f/gQ2dOCB6sGnbTs4dL7qEhz7M/gR61jQyCMeQ3n6ZCGj5EPLQWKsTtljZsK
	+0cjoZZiQAHaw2vMNa7MGI+o3EKnAoPNBfftY488QPbgn3vzS3dW1uelQK8HABBXRx2o9z
	Pyyn7NTfbOwNtduTRU/zuu89o71lBBc=
X-MC-Unique: PheLPJhUPCOcfr8i1XwSoQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Z2GVPNzvrG64AvvIZ/uMB5rTb6yHk/YCkRftcE7tzKZLsbEOFkznbpuYPaeDTSZKxt0jckixIbTwKPJ61/nTEEqfFFj56xW3Yt/XUG/cp6JCSFoUXZdQLnwrxXMsggfLJ+cjHc65RPyj/mLNxRZwNrxf4kRhAcM78LFmFwuEtj0lz8eNAhqGxMMNr7xzADNcCn6P8MXpb88KkxcxEPUvm5L7Kz2Yhh+9lI1dRB3U4Zc5ZgBgPHTywZ+RmvfYMgeUtpX0ljySH8dSBc6o/oWvZK868YecnOxC6qVamgsXNgMxqZu8Cf4jQcjk9wyVL5pYSEWG4YUtf5Aw75VTkJIdog==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=/C9gNQQ/WXeRHWoD/77+2fPAAXlkvuCCam48qLYjwoc=;
 b=NP6sn1jaRoCY6kOufIeXs3bWoZ32xCLBHDO3otMJwhHO9wEDOU8rPZbfJWHS5IRVINdLIOFGwDDjBV9r3vk3dmFoClLWHhsKk4OOGFctXWWVpJ8tY1KGmbZUp5bXdYwyv2zAAyrxC/XoHyUpyJ8CUZ+CPK0YV/Gbq5DTeZMQOPyyInzXF2L3PSky4hv5bI71rBEveuFjgrA4C0Cl71ovmbOMMg9nWVHNdkEwiDQ7XnQRTR8mrQnURUG8vIQ1UloJgOoqH6Atnfb3jwPjbDRJT+uf3tsZNQcdAcSVFtCioBxXoIDS3fZ5AwUyqmTO9nIrGemjisN0+EZZRmcPjHobkA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <1eaec57f-7a6a-bfd2-82f1-df25f86b69d6@suse.com>
Date: Mon, 21 Mar 2022 12:47:27 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH] x86/build: also handle .comment.* in linker script
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR06CA0070.eurprd06.prod.outlook.com
 (2603:10a6:20b:464::21) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: a972abe4-607f-418d-9a18-08da0b309379
X-MS-TrafficTypeDiagnostic: HE1PR0402MB3468:EE_
X-Microsoft-Antispam-PRVS:
	<HE1PR0402MB34687848BCA0B7D12CD65ED6B3169@HE1PR0402MB3468.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6486002)(508600001)(6512007)(86362001)(31696002)(2906002)(6506007)(8936002)(4744005)(5660300002)(38100700002)(186003)(26005)(2616005)(31686004)(4326008)(8676002)(6916009)(54906003)(66946007)(66556008)(36756003)(316002)(66476007)(142923001)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?ZzczT1ltMnEwQW8vWkQvUjBVNWRhTW9DalU4OElIMlRhV0lNRXRUWTFQbHkx?=
 =?utf-8?B?SnBicU5KSC83RnA1QlRDOE5nMUpkSmRCWnpIaTFJQTY2ZmU5K3dMQXhYMWJl?=
 =?utf-8?B?cEFDV2JWclQyZ3FlejhpSEpoZ1FDbjYySVVtZHE3M2ZGY3JqTVhVb2FtWEFl?=
 =?utf-8?B?R09wcDNrendzcDVVRCswd1hWMkFzaHp4dXQyT0Iya3VibmNHVG1LOUtPbzVO?=
 =?utf-8?B?TXFZL0xDSU4yVkFtMFVvUExTZWt1WU8wcFZJUGZjaFI0cXkzWUdoRUN3UW1n?=
 =?utf-8?B?ZGxUcCtLR3M2VkltTFNQb2NscGdMNG1KUERsbVdDM2xML05mQlVxcVJKejlq?=
 =?utf-8?B?MWJzVVd6YVRWcUJMTER3MjJRY3RUcXBnUkRDb1VDK29NdElyeWJMWDFINXF2?=
 =?utf-8?B?NnBiRUFtajZWT3ZFcXFGWWF5SjliTVBxSGpIbVZ1ZXN6YTRNclFQdGpFMDd2?=
 =?utf-8?B?WGtlc2N1QzM5Zi9LcGlIRHNaSEwvQzV1aERLVEpjNlc4UUJMSkc0R1MyT0pZ?=
 =?utf-8?B?ZzlaMHc0S1IwLzdienp0T3dLMXVveTFvc28reVFjR3RVaWltTHVyRCs5Nk1Y?=
 =?utf-8?B?b0VlVlVXdEx5TUMveWUzTzM0bjFxQVQ0aU1MODlLSHVaWEUxdm1qdnN1Mklm?=
 =?utf-8?B?V3M0YkQzT0ZDUGk5TzlIYWd1RE5CaWNkNHUwVWNjalhQNWRLZGRTM2gvY0Nq?=
 =?utf-8?B?UTZSVjVUbGtUcW5wOTIvK3FSRjBJNGRWWS9jNk9jbEZiOWpxYjllSUpoTzh6?=
 =?utf-8?B?TWo3NUV6NWlMSUJSZFVPd1V2dXBiTXZXMi9TQmlZM2UrS3JjUjJxZEhQejB6?=
 =?utf-8?B?MFRpTXYwelBYMWkyUUVkWEo3dklESitLUWpCaExWWUFieGh0K2NkbmF1SHpu?=
 =?utf-8?B?RlVVQXkwaEN2RWdqVzFCbHQvK0pWOW0rRXNpU2xxR3RQandRVWNMWldzdUFs?=
 =?utf-8?B?Y1crdzhLZmIxVmszdGhleXEwRWJrTi9BNVdrTEV3NGE2VHZGYWVNWUJ5MGlt?=
 =?utf-8?B?SnA2REZaTjBNOXQzZE5ISTlZRk9EOERwcWF6RXc1eTNRYVFHd3VMdjJrRmJU?=
 =?utf-8?B?c2g2dlVvVkVOODNPMi9BVUJ6eGxVYmZ5RHBmK1ZtQkNsb0hEZHNXMUIzUlZw?=
 =?utf-8?B?NVMwd1N2ZU9iRWhYazFrdXlMSWpMakxHbjlIQmhjZXlPWDB6QVFIYWxOcDRY?=
 =?utf-8?B?RTFWV2RvMGFHdGg3a1gyNW9RbGx1NHdCeERteDRnSFNYRjZGemYySWtMZlJy?=
 =?utf-8?B?NVdxNHMxOWVTa3VabDY3czJINVNORzRaMGdVdEw4RmJiaUtoVjZmeUw0bzZD?=
 =?utf-8?B?cnFUWU13aWZ1SFVVTGVmK1BjTnVzYzU5aTBJbjdER0pTbmEvSVlPczBuejdx?=
 =?utf-8?B?UVJ4dllXR2xFd0MrbFMwT1N3L1A4aGF0UDd2cDBSMTZXeC9PaFgwcFE5MDhz?=
 =?utf-8?B?bE9uVi81K0Uvd09QcEtNVmJhaTVFcjJBMStWMVVKSGtYKzNldmQvbXVrbEM1?=
 =?utf-8?B?VWNNb1R4aFdGN2dsZW5kblJnVHBRMW5aYVduZ2ZOTlRkU0pQbXlSS3BSMkhT?=
 =?utf-8?B?V1o5NisrclJRMG1jRWZuM3ZyUlpVNUR5Z1oya0ZFUHdJSEJ1bTlaZzNOcWJv?=
 =?utf-8?B?aXNNakpXRVZYZlNPU3lEM3RXbVJqTXl4TlY2OHVzQU9XVXpZM2xRdmJOK1c4?=
 =?utf-8?B?QVI4SHJDMlZGVzBURjdONkNKbnBTNTdDSWdOVVFvUjYvYnYrMzk4R0x0bm5M?=
 =?utf-8?B?ZlVKU0J6S3dVdTBPRWw5bEZZeE1HQzV5NTdRQlRIRGxMY05xc21zWC9JRita?=
 =?utf-8?B?UFBQWFM5SUtPNDR4YUUwY0FYcVVZaVFiek1IRGxlYlFvaHVOcnVPR3JONVpu?=
 =?utf-8?B?ZUd6RDZPN1JiNWVYVXlTaDRuQk5tVFBYUmYwcnBqRXNIYzZWY2EyWVhCZDRY?=
 =?utf-8?Q?L3qqs4u/egELO5Q02YUku7pSHeopKWqo?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a972abe4-607f-418d-9a18-08da0b309379
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 11:47:28.7995
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 9U1uCZaRiNqsnlVEPLBhD7y7ymtQRDLMkt1ohZWGDLRlNRDk8e46S5DfSVRUxu9/NPGb6X+7zXCUOLrOebqLaA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0402MB3468

Oldish SUSE compilers generate .comment.SUSE.OPTS sections. Just like we
already discard such for xen.efi, fold them into .comment for xen-syms.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
Just like for .comment itself I also wouldn't mind discarding these also
for the non-EFI case.

--- a/xen/arch/x86/xen.lds.S
+++ b/xen/arch/x86/xen.lds.S
@@ -454,7 +454,7 @@ SECTIONS
   .stab.exclstr 0 : { *(.stab.exclstr) }
   .stab.index 0 : { *(.stab.index) }
   .stab.indexstr 0 : { *(.stab.indexstr) }
-  .comment 0 : { *(.comment) }
+  .comment 0 : { *(.comment) *(.comment.*) }
   /*
    * LLVM ld also wants .symtab, .strtab, and .shstrtab placed. These look to
    * be benign to GNU ld, so we can have them here unconditionally.



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 11:58:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 11:58:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292946.497530 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWGfj-000658-JU; Mon, 21 Mar 2022 11:58:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292946.497530; Mon, 21 Mar 2022 11:58:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWGfj-000651-Fv; Mon, 21 Mar 2022 11:58:03 +0000
Received: by outflank-mailman (input) for mailman id 292946;
 Mon, 21 Mar 2022 11:58:01 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=dpaY=UA=citrix.com=prvs=07205606a=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nWGfh-00064v-Nm
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 11:58:01 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 26714c34-a90e-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 12:57:59 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 26714c34-a90e-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647863879;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=wDzTYWOCALf3WjWq1TqgTDcJrcQI4hDGGiQnxtTySGg=;
  b=Gu8V6HgtmZ7iXLgxczRRwAIbngC5tcXw85PkSKXXtLM80a5T1Eu8/9qW
   t3QElQ3R9iyWVtbqw5GxYpbcPI37b+jhLU/Y7sdXAmlwx7vUgtDqaGr8Y
   Q0CMN8JQFFjIJEGCqEllL5gCigbPOUNWgDv8YNI+hfaHFotoLCDI6yonn
   Y=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 69121876
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:vNb0T6/FDSUrxPDyB466DrUDk36TJUtcMsCJ2f8bNWPcYEJGY0x3n
 GcbWT3Vaf7YMzGjc4gkao638h4DucPSyIJmSQE5+CE8E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oLgW1rlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnZ6zdDs4BIPVo6NeED1pQn9FLKR8qKCSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFJkYtXx6iynQEN4tQIzZQrWM7thdtNs1rp4fRKyHN
 5VHAdZpREvCUjoMBFIoNJJgl76FgVnnUGZ5iHvA8MLb5ECMlVcsgdABKuH9ZdiiVchT2EGCq
 Qru/Xn9AxwcHMySz3yC6H3Eru3FkD7/WYkSPKal7fMsi1qWrkQDBRtTWValrP2Rjk+lR8kZO
 0ES4jApr6U56AqsVNaVYvGjiCfa5FhGAYMWSrBkrlHWokbJ3+qHLmoHcwJQUvI/j4h1Bhgbh
 wGyjtrTVSM65dV5Vkmh3ruTqDqzPw0cImkDeTIIQGM53jXznG0gpkmRF4g+ScZZmvWwQGitm
 G7S8EDSkp1J1aY2O7OHEUcrat5GjrzAVUYL6wreRQpJBSspNdf+N+REBbU2hMuszbp1rHHc5
 xDoeODEtYji6K1hcwTXHI0w8EmBvartDdElqQcH82Md3zqs4WW/Wotb/StzIkxkWu5dJ2O2M
 BaL4FoBvcQCVJdPUUOQS9jsY/nGMIC6TYi1PhwqRoQmjmdNmP+vo3g1OB/4M5HFm0kwi6AvU
 ap3gu73ZUv2/Z9PlWLsL89EiOdD7nlnmQv7GMCqpzz6gOH2TCPEFt843K6mM7lRAFWs+16Or
 b6y9qKiln1ibQEJSnKOoNBJcgxScyRT6FKfg5U/S9Nv6zFOQQkJI/TQ3akga8pimaFUnf3P5
 XazRglTz1+XuJENAVzihqxLAF83YatCkA==
IronPort-HdrOrdr: A9a23:zJ5wmKmJQoeIKfLj0JoD793lTuLpDfIi3DAbv31ZSRFFG/Fw9v
 rDoB1/73TJYVkqN03I9ervBEDjexPhHO9OgLX5VI3KNGOKhILCFvAA0WKN+UyEJwTOssJbyK
 d8Y+xfJbTLfDxHZB/BkWuFL+o=
X-IronPort-AV: E=Sophos;i="5.90,198,1643691600"; 
   d="scan'208";a="69121876"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=IhwIcVFpSVQ7UACUM/4/Kt/NESyTr/L5xFQsdI+xh70I5O7pJPrxbqiqZyOklWSV8YncdPaGlMbzAS6niqHR3LLFIZATWaalvjoGhNM7IsRn4RYkDqrkQmY9Snr5Deg/YdQmpH1vXAXkc+CJQqf3YsIQpu6AEcyTskMPlw2IhsvSFIBYynnwfo1ATykz/QMcdxqPVH6YMv7hAumvEyVYFhQAc+sad2BiGD/4H+oUx2uOI+HtOrt2bJ+8DFNXW5oLDxnh9dU5WeM3GkYOjzK5z6I7FcjEHWscQIIKvqp12wB30G4Xm7BjhXGH5pWjzaTiNI1DxEt1ZSU0DIJVwBxysA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=wDzTYWOCALf3WjWq1TqgTDcJrcQI4hDGGiQnxtTySGg=;
 b=dxJU6ARfcqEOosl4wJ/9/9tpDa3cxDqSnte6BSWCokKXZRCIpURmlsVgu7XI0sa2nDr/SCluRISQyB23MQceV3nMl9s8EIEkKcB3tF8nvY95Mk9loRwu+UHG5SydIkOUBFu4tjPyyJ43SFqDRWIGrSyFNmuiM2NUmLmb2R+Hy9iLpCyvkWL6XkUIETf4E+1kw/rzuH7hXMxIDLL2z9gpIt5L+OERLEmI+KCQvoeRKYOqYvCfs83uAD8iRSOwKiflMWsoi9DVqqzHAO3rn5oPMVHkWzSdwSsREagt1pUKjF2r0YIWXyRK0/mYUkgrskiTAAla53Q8e+j2+JjKwNdbkw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=wDzTYWOCALf3WjWq1TqgTDcJrcQI4hDGGiQnxtTySGg=;
 b=YKW+IKPcwl4imvnAQNPjiArOx7atl1TQC/vS+lKJwfhsS+Aa1P5N7TK3LdQ+XCR3rrDD9Qwjy9xjomsdgbC8O/ag0Y72wkRyIEMqbAKSDgrHpr+TA6651n4YEJO6tR/hV8Ia1OH7C3Lfi05ZVV748Ej7W2fjII65iu86xzPnvfA=
Date: Mon, 21 Mar 2022 12:57:49 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Andrew
 Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>, Julien Grall
	<julien@xen.org>
Subject: Re: [PATCH] x86/build: work around older GNU ld not leaving .got.plt
 empty
Message-ID: <YjhoPeWWj2B0Kcts@Air-de-Roger>
References: <057172d5-437a-347b-b5bb-d102b6b37f0a@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <057172d5-437a-347b-b5bb-d102b6b37f0a@suse.com>
X-ClientProxiedBy: LNXP265CA0065.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:5d::29) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 6c0d81fc-77cf-4d3a-e40b-08da0b32088a
X-MS-TrafficTypeDiagnostic: MN2PR03MB4687:EE_
X-Microsoft-Antispam-PRVS: <MN2PR03MB4687D7488F4FBFA8F04886388F169@MN2PR03MB4687.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: lJr1V2kxaPC6LwjcvVPFACIGcdXnnC4pD2Zfo8ysbIAKO3uiBXfE3RF6rCsHxET+U9TWLl5L+fliOU532MLHtEGgAIJWLy2AX131tfa4QsQ07N/3cJInmGFDtGmqGmCgjVff7rSa4WBO1iC5R7doQVO/tBsm/S1Q4LvsfWvl4Un+e9gaeuXxchP//mUTFDF0m+zBhyOPlkz5p3M2HlWTxZ6k74aagHwrecmOkbejneZDcAiFfB4nYHtt/Mu5D6Xlej17U4DINNyRCavj09YHIXLHTFCvHC19XMimmPdMzuPN/fn2eo0LGWMJhkuaK7bkmvj36nghnqerymV84t3QxKY7xIKH4AsBBRxmUBIrPdk+DJqs297l5Om4dRtUVpmlZNxdm/UoCtY4YcWhRmLrcps/8AmrL9tvkLb9bTA48ZHHaGQJQ/vJpDz6E60ALYCh+5aKDJlUttjmMYi0w02+EyEltfxFwCRu4UO5ZcwWaN4yopMGaq33h1WRl+TcBNK/SZxt2Tb1UmyFZS5eniSjK6om2IyscEY7NK2SgxaLTcuJ4hA6jtSctvwOpbV7kbfC/6f3WuuF8RIjhaB+wZDIoiyL7cfWrc26cCBEpR5MO+oiq67Otty7hgevfbv1r/MRSaDJnZ/C4PAv/KanVnhnpHYTVVnuO6B2jvZ38TW8F/rO1aF8DPvcBhVNjWMpFuIQD1u9H6BbqVLXbN4UKe3KHw==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(5660300002)(8936002)(54906003)(4744005)(6486002)(6916009)(86362001)(2906002)(66946007)(66476007)(66556008)(8676002)(38100700002)(316002)(4326008)(82960400001)(9686003)(6512007)(26005)(33716001)(85182001)(6666004)(186003)(6506007)(508600001)(142923001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?ektMVHY2d2RGYVZlbnUyZG4zaCs0VTJab0ltZ3BLVVR5dCtjYXRqQ1NSSFZX?=
 =?utf-8?B?dDdadGs3M1hNbzgySTgrR1RIM2VrTnBMSVBqemxoOUYrd1k5MUZrMXpERUJN?=
 =?utf-8?B?QUhqTzlzQmxLRGsyeit3aUVrZGNmcVJpc0JMWGd2VlRsT2FSUjFBamVjWGRW?=
 =?utf-8?B?a3FySitCQTdabDdtRVRNMjlIRnpGYXZnQ0huTGRyZ1JPMkhHYldKVFdYd3ZN?=
 =?utf-8?B?bVMzaldtaWtHK1ZFYXNUek54OS91UjdXMW8wcDBQY0s4dWZoRWNrdTBSck1m?=
 =?utf-8?B?RW9QTUNxT2N3eXJqQjU4aStwOUttRExiRGZ5dWd5NVVMbzlycmNEZmpFdks5?=
 =?utf-8?B?WDFFd1M4QVlzaXJZY3dLU1hoQm9CNGdSbG9aVG9nMTA5OTR1OHpUKzF2bS9Q?=
 =?utf-8?B?MHNRR2hxSzR2eU1nY081cHNwVHNlTkFPamtIdVV4UjFTL1ZqempTNzJZWFlq?=
 =?utf-8?B?K1J1UjlHdnM1OWV3WlpabWR1b3UyQVNZRXdleUYvZWcwME1mdWlMazZEczlC?=
 =?utf-8?B?V3JvYVhiY1gyY0kvME5TVnRRNU5WMkVzaVI0YVZ4R01VRENaODlBTjA1RVBk?=
 =?utf-8?B?YUN5SWhYZ3ptZENBdHVITzJnSUVTMTZhRWNIYzJSWlV3UHY1c1c5Ykd2aHUr?=
 =?utf-8?B?OHdyeEh5V3J3MlltNGx5NkQ3aHRjYVZubXN3L3N4clYwblVwM1RONjJTRDZM?=
 =?utf-8?B?QzByN2tpa3VFRlRGbVl3UVJCMzYzaXl3aE1EYkwzMlU5Y2t5bERwcUc2Mkxj?=
 =?utf-8?B?OCtoM3JKTTEzVlN5U04yN0JUUEtjK1A1bjhmcVN5YUFpRjV0emVIQ1A4YjhM?=
 =?utf-8?B?WGlCUk15WnloN3dScjg2TVlERS9OdWo3ZktydWJ2SG5YM3puQ3AvZ25uSGVv?=
 =?utf-8?B?OTJNSldubTh2SEk4NFhPb1hlcVovUWtEbU4zY0MvM0FMSElJTE9LZDhOMFpQ?=
 =?utf-8?B?NnpMM3g2N0dZYjNsOS9KR0tIYno4L1I3MTd6a0x3dW02Yi9RaU1ULzJmaWRh?=
 =?utf-8?B?a0J2QjJOeHE2YlZSUTlLWGt0RXBCZlRrMFoxazgzY1JqTTBURDNBUkJNRUVH?=
 =?utf-8?B?VVA4VHRRNk5GRFA3ZGpjdWNhSkdWd0RUQVlnOUs4aHVUTFdvQ053OHVEV0Fq?=
 =?utf-8?B?cHBBUTk4VHFITFNlRGdSM2lBT1hoYkR5S25GS1lyL3dkWHZ2amtJbWdEQVE5?=
 =?utf-8?B?eU1PRndPbHdjejNQUzJ1V1ptbUM5RzQ3MmxwSHo3V2NaYTEyNmVoWWMwNTR5?=
 =?utf-8?B?RGtWL09wMzcrMlBYMmNmRFdCak9GNmFRUG8zdlI2eFRoZThzU3NTdU51djlR?=
 =?utf-8?B?R3Q0WFB1OVJJR3l2MW5XRTBLWWkweTdYUUpNRzJhejhKTGwwZmlNa0M0emxG?=
 =?utf-8?B?MHp2eHlldGcrNlRxQmlUVGNUbXNHMWk1Z2lTcUd4ZnRVSlBnWlJnUmFxM0ov?=
 =?utf-8?B?Uk0rM2IxaGdXWURzRmxvNlF4VjV3ZkFYY0RaRmhJYi96cXlsWW15L3lzVEVv?=
 =?utf-8?B?bi9aNHBmNVFwV0pVbVZaYVorODJ6d3dlZ2E3L0tHRGZkRVZCQUZlVitjWDBD?=
 =?utf-8?B?R1h4RFBmN1BiclQ1bkI1RGZHczc1eU9NajdsUXYzWmJ6TzJZMkRWenE3KytQ?=
 =?utf-8?B?QlhkczFlcUVnc0pUTzkxR0NOVTEyejlHZkkrTjVHWHZNRmJMeUh5d1UrQ2U0?=
 =?utf-8?B?UWxrQ2RWMEFScmdhY1J2blJlYS9rR0F5NmxPQytRdEM1TDVlMFlXY05qVWJD?=
 =?utf-8?B?UXVSazRQRWphSGl1YkdhYWpYcVdBRHQ2TXhoak5DYmJDbytzOTFpdzUrOFVL?=
 =?utf-8?B?TnNKVGx5Mmp3ZFlHejJDZDdSN0lLNzNnQ3FkT2dJY0Y5bmt3RE44SGw2SUcw?=
 =?utf-8?B?cXdTWFl0cEFYTEt3Rlk3SXlZcFBjYTFYOFZpUXVrcmQ1eTZ4T1RYQyt1LytV?=
 =?utf-8?B?Zm1XUXhTZjVSVkFzU3JqbWs4cnFhYWYxWDVEY1JBN00zdHdtcE92MW52WGxs?=
 =?utf-8?B?RFZQWUE3TkpnPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 6c0d81fc-77cf-4d3a-e40b-08da0b32088a
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 11:57:54.7187
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: EnIBSI7k+WZN2YIn1MB+B2+CCI8kQdBsRHg1lGTJwtxA7JpvDWHRtM1OGW/pdd/3JLrglsv7rzc/twVO2E898A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR03MB4687
X-OriginatorOrg: citrix.com

On Mon, Mar 21, 2022 at 12:46:54PM +0100, Jan Beulich wrote:
> The initial three entries in .got.plt are "static", i.e. present
> independent of actual entries allocation of which is triggered by
> respective relocations. When no real entries are needed, halfway recent
> ld discards the "static" portion of the table as well, but older GNU ld
> fails to do so.

Do you know what this 'static' entries refer to?

> Fixes: dedb0aa42c6d ("x86/build: use --orphan-handling linker option if available")
> Reported-by: Julien Grall <jgrall@amazon.com>
> Signed-off-by: Jan Beulich <jbeulich@suse.com>

Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 12:00:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 12:00:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292951.497540 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWGiK-0007Zk-DH; Mon, 21 Mar 2022 12:00:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292951.497540; Mon, 21 Mar 2022 12:00:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWGiK-0007Zd-AG; Mon, 21 Mar 2022 12:00:44 +0000
Received: by outflank-mailman (input) for mailman id 292951;
 Mon, 21 Mar 2022 12:00:43 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=dpaY=UA=citrix.com=prvs=07205606a=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nWGiJ-0007WW-Ju
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 12:00:43 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 86d9de26-a90e-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 13:00:42 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 86d9de26-a90e-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647864042;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=fT9+Nqo66qXjVdXdT5LYsr9J1bFWUoYfg1A6b9iNCO4=;
  b=DPIdCR9bz08e4Jde9JAybzM+0RfQctLQ7CF/+eXJvRP2z6P0Ro/6bPy3
   ao0W/ivLE6rot8TteO7ZwknWkU2IlbFLaVL/ebDS7hWTF/yqtK0Sab9Ws
   S9kwdtl4PE4/1Ni/veUYfnBjIexrk0S2aeklhp46gM3KENvRuLREXZyW6
   E=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66672290
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:Jr2Dgao9WvUcnv0o3qPYfRWPQO9eBmIVZRIvgKrLsJaIsI4StFCzt
 garIBmOaK7cNmDyKo1wPo7np0MCvpTRx9AxTgBsrC81QntBo5uZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 4qq+qUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBZqfrlOISTlpkQjBMN4x8+uXHOii1rpnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVI1zbWAOxgWZnea67L+cVZzHE7gcUm8fP2O
 ZRHNmA1PUyojxtnJ1AcJLwGzdyRnnD/WBcG8U7FiqQY/D2GpOB2+Oe0a4eEEjCQfu1Kmm6Iq
 2SA+H72ajkKOdraxTeb/3aEgu7UgTi9SI8UDKe/9PNhnBuU3GN7IB8cWEa/oPK5olWjQN8ZI
 EsRkhfCtoBrqhbtFIOkGUTl/jjU5XbwRua8DcVi4iaBzKXJoDrIF1oObwRDMtw95MUpEGlCO
 kCyo/vlAjlmsbuwQH2b96uJoT7aBRX5PVPudgdfE1JbvoCLTJUby0uWE409SPLdYsjdQ2mY/
 tyckMQpa1z/Z+Yv3r7zw13IiinESnPhHl9svVW/so5IA2pEiG+Zi26AtAOzARVodt/xory9U
 J8swZT20Qz2JcvR/BFhuc1UdF1T296LMSfHnXlkFIQ7+jKm9haLJN4Mv2EnfB4wYp9fKFcFh
 XM/XisLufdu0IaCN/crM+pd9ex0pUQfKTgVfq+NNYcfCnSAXASG4DtvdSatM5PFyyARfVUEE
 c7DK66EVC9CYYw+lWbeb7pNgNcDm3FlrUuOFM+T8vhS+efHDJJjYexeawXmgyFQxP7snTg5B
 P4EbprUkUoDCLOiCsQVmKZKRW03wbEALcmeg+Rcd/KZIxogH2ckCvTLxqgmdZAjlKNQ/tokN
 FnkAxcwJIbX7ZEfFTi3Vw==
IronPort-HdrOrdr: A9a23:QxFpRKNLgMpLeMBcTs+jsMiBIKoaSvp037BL7SxMoHluGfBw+P
 rAoB1273HJYVQqOE3I6OrgBEDoexq1n/NICOIqTNSftWfdyQ6VBbAnwYz+wyDxXw3Sn9QtsZ
 uIqpIOauHNMQ==
X-IronPort-AV: E=Sophos;i="5.90,198,1643691600"; 
   d="scan'208";a="66672290"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ZyIANzUYdg+1LTOVwGKWhwng3XSolz0JJidMiVbAeG4EoP7JbLfzmFiHE9koiQfqPTUDgo+mvtMMTWqooS3KK91wKtodnG0lfzqK7NIX3hOoTXSvIYG5W1re3fZi3l4JNpwfC8AdtsFZHpJblPCpGjAg7Vr8C5AaF0seM+bRw8htaERVgLK5ccpUmZxnxBJjisREXEkQBasSLK8bJJNSkRr3uwcs5S0lnIxbBgxSxfGudrTp+7BzpCNim6quGM1yUwGrI3X15idsNoBwifGAzWTpd8TARvMeSZF95WuF3RvO8qFdPDkZ1PUiLpbpZMbLPWdJ3VJZtLCIv1wnZ0EPQA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=hGARRHqBPhvtCWlzwH1mD9uf1ykPfHdbky0OxeN80vc=;
 b=bRwl0IPZoIMw58Vdoc4M91HiNBUaC60owmI2KUa6DokoAJm/dWlEXYw3AR+9uIJsQXA11WXaWtbgdrfl5WouN6lXKBvd5SPTGAaX9fupmnQJANL6adPZzdkRkb0fhx4x/bVn8hNQ6sfUij3p4iaAVFssyTK1zjFmNG2GZnpafuRDgFBpG6Wnu17632gkWitjig+t5snWW4i0EEJX+q4bO7mP4MnTc2z6BgG5Tk+c/hAn0Nv+uuNgaGngwsmADVSfvIM3C8eFpKBbGyUw8MtwwF1bHoFBk0bPW9xxpLDnfu57zgRlgXs12PQ49cqactSptrlVo8UsJ0jPhngHZNxzVA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=hGARRHqBPhvtCWlzwH1mD9uf1ykPfHdbky0OxeN80vc=;
 b=PQUGZdMq3fecsO25uS6g5X62eNuzzm90KEKTU3NgEPwXQGOagjVm0V0FTSRo8a8u+QK4QlDu3yRFHaa1EiorTNxquHM0ePGI21MNP589uGf+o8f0Eksr4Gb8mF6ErLDdJKyFoV5Dy4kZbcqxWJZCbAzxlMzi+ssN4W2Wr9hOMMQ=
Date: Mon, 21 Mar 2022 13:00:03 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH] x86/build: also handle .comment.* in linker script
Message-ID: <Yjhow3Y4o7M/u/Ko@Air-de-Roger>
References: <1eaec57f-7a6a-bfd2-82f1-df25f86b69d6@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <1eaec57f-7a6a-bfd2-82f1-df25f86b69d6@suse.com>
X-ClientProxiedBy: LO2P265CA0246.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:8a::18) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: b1a68bc4-78d4-41cb-72fa-08da0b3257ff
X-MS-TrafficTypeDiagnostic: SJ0PR03MB6240:EE_
X-Microsoft-Antispam-PRVS: <SJ0PR03MB624000A8220A8A6C732FEBD68F169@SJ0PR03MB6240.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(6512007)(186003)(9686003)(26005)(2906002)(33716001)(54906003)(4744005)(38100700002)(508600001)(8936002)(85182001)(316002)(5660300002)(6916009)(6486002)(66556008)(66476007)(66946007)(8676002)(4326008)(6666004)(86362001)(6506007)(82960400001)(142923001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?ZzFmSTZnMnh6enlrZzRodENoczNUVUhTMHJEcWdtSUNlblBSekR1S3cvZEdN?=
 =?utf-8?B?N2EzOUFra25qMHJhY1Buc1NaL0N1cStoTkdWbFduMUNoQW1idndzN2UzbVk4?=
 =?utf-8?B?ckhRWkZwT0R4b2oxZFhmSi9TVHdIajUyZmpxYjkzVXI4NXYrcWdoZDNNSlZv?=
 =?utf-8?B?T3BtU2syV3JvelJrZTJLNldTdGp0R2tSVHpHenlKNEpVU05PaFp6alFpZG5O?=
 =?utf-8?B?cVRyRWVxRUc4VDlqTURkYW9Na1dMTWIyR0M3Q2xocnZCNjZRTjF3T1Zlb2tN?=
 =?utf-8?B?NzM4OStTWmNVZFdOdk1ud3ZWNnhWR2tZSVFkUnRrYzBJWGRzaktHWExvaVJ2?=
 =?utf-8?B?TFd4azFLc2NCbkhsTFpJOVlYVXpWaVpHSzhrSjRGOHZCWE90aEhMc28vNWp0?=
 =?utf-8?B?TnJ1a2crbTBDUXdTQzJ1bU9MbGZCUXI5eEthVUQ4UkprUGJvUU1QQ0xRY1I2?=
 =?utf-8?B?SHMydmpwYXMyNC92a2wrOFZtMjVpaUczNlVsZ2tzUjUwcFVHc1hlVGNrTHZN?=
 =?utf-8?B?eFlRTFA0UXRLeVhFZXZKVDZuMVQ0UVZ5Vkg4Sms4R0IzMVdIdncrWlJtbUVk?=
 =?utf-8?B?SGRvc1RYbjhhMmhtRkZ0bFZLaGxYWHR0Ni9CSGpjYUR1M3R4ODRCSFdHaVFX?=
 =?utf-8?B?QXZnbFIvKy9NTzZjMHlISzIxOFo3emxtSkRvcW9Sa0MvcXFrM2loODBpNEtr?=
 =?utf-8?B?a2w2N21qLzV0eEJySkxyKzB2aThmeU5sajluUlZyZzUxOGVCNEtWaXBuSlFG?=
 =?utf-8?B?dXFlbHN6dEpmY1F0bjdwT2c1SjVVdm54bHZJNVluZ1pJOTRVWGpqSGhvT29z?=
 =?utf-8?B?OEtmcmhONWxrMjlGUy9EdnlTaVVXdThuTE1pODlOY2NKemtBOXp3M1p3dm04?=
 =?utf-8?B?bi9sTFVrL1pwWHd4YTJaWFpEb0N4eHFqeEx3aWwyeG5Sdi9BdU5DWmZqckNK?=
 =?utf-8?B?MVZiSVBJc3BlSWZFNUtiSEJHQ0hIT1U4dnRWdWJKWUh0Smg2NUZvU3JsQUpQ?=
 =?utf-8?B?elBjWDRzbElzc204ckxWTTU3K2tDQ3l2RSt4WE1SQlVqT2J3TTFyRDBUOHVm?=
 =?utf-8?B?SUV6VGlBdWpsa080TlV6MzBtdVB2VzBGK0RUcUEvNUZzaWVIRjc5MlhxMUlx?=
 =?utf-8?B?YnhPbFFrSUdFVmx0ZGFJanVNUUNGTlNZZVU4aExxNFhJU3JadXcxWDRPY3lq?=
 =?utf-8?B?NnV5SG01VlMyczRHMWV5YXAvdllDcGtzdnRzaWVLTzYxSkZhMzJxNzB6aVhY?=
 =?utf-8?B?a0hpbHRmVzcyQXJoQi93QlVuQ21XVjh2Q2pWT1pIVHNPYTV3dmJqNmIxellm?=
 =?utf-8?B?THhqcnpkcUJxR0lkOHZCN3RxdW41QUNWUlduZDVNTmNBOURJRnhkMzcvQnlP?=
 =?utf-8?B?bTk0eCtqK2NvWXc2TzY3ajRPYmI5ZGJEdnExQXo1UTkzWEdMeFM0MXF2RExv?=
 =?utf-8?B?WS9qZGxTZ0M3U2hLdlN1WmF0d3NONmVUWVJ6dEJlNTladGwvNm04N2ZWeUhR?=
 =?utf-8?B?TlJNbW9HL0RWbVpLWHNUNHU4RXY0UmxXcmhQZGs0NFFOQUdENHB4UHR4RVJs?=
 =?utf-8?B?aFkyYzVlb1l1Y1ZYRmhzL0xTSUNqSWtyL215LzJtbTg3a3pIUVF1MXdvdHJZ?=
 =?utf-8?B?WkpyV1U5ektyRFE4Wi9KNnFZc2tRaWFzQ3hGenY4Z0xuUml6ZTl0c1VNaUZ6?=
 =?utf-8?B?SmJvM0U5OW5GcVFOckdURGtCY3FSSjdKOERhcEtVaDZxeVZtMmduSFlTei9m?=
 =?utf-8?B?UWZMZktqMmNQMWZZRDA2RXlGMmYwem9WMFNMQ0VzbVVRQVR3dVMvOVB1MmU3?=
 =?utf-8?B?clI0UzdZS2s2NlhKenQvclZLSkVCM204UGxOWW9VQjVWcGh1WlJSNzZxYnNz?=
 =?utf-8?B?cld3T0Vwa3YvNUJEM05UYVZOdS9xT3JQVG4waGlaUDZOK1U4bXRuUjVJRjRn?=
 =?utf-8?B?RkhGM1RVWk1TSGNtQU1tR1FkZGdOUEE4Ri93VXNLSGJlYkd6NnVmZlo2OC9T?=
 =?utf-8?B?WGhYSnNGdWRBPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: b1a68bc4-78d4-41cb-72fa-08da0b3257ff
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 12:00:07.9913
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: KabUn8x9a4gZ0omDk45x0uulOUd6qZyivRoZu699lzsC4wb4RJsGjosdh7W7FvoEiIQh8w+7L3AmVqrk4G/A6A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR03MB6240
X-OriginatorOrg: citrix.com

On Mon, Mar 21, 2022 at 12:47:27PM +0100, Jan Beulich wrote:
> Oldish SUSE compilers generate .comment.SUSE.OPTS sections. Just like we
> already discard such for xen.efi, fold them into .comment for xen-syms.
> 
> Signed-off-by: Jan Beulich <jbeulich@suse.com>

Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>

> ---
> Just like for .comment itself I also wouldn't mind discarding these also
> for the non-EFI case.

I guess there's a reason for compilers to add additional comments, and
we shouldn't discard those randomly?

In any case they won't be loaded, so I don't see much issue with
having them on the binary image.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 12:16:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 12:16:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292959.497552 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWGx5-0000pY-NP; Mon, 21 Mar 2022 12:15:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292959.497552; Mon, 21 Mar 2022 12:15:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWGx5-0000pR-JU; Mon, 21 Mar 2022 12:15:59 +0000
Received: by outflank-mailman (input) for mailman id 292959;
 Mon, 21 Mar 2022 12:15:58 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWGx3-0000pH-WB; Mon, 21 Mar 2022 12:15:58 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWGx3-0006Je-UJ; Mon, 21 Mar 2022 12:15:57 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWGx3-0007vW-HF; Mon, 21 Mar 2022 12:15:57 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWGx3-0003AF-Gp; Mon, 21 Mar 2022 12:15:57 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=vqveNxM4hhzY+jnu1YK22R5B3q2KAAm+N2rJiEMveRA=; b=n6nuBq0tY8bdtYrGMvqFnGXM37
	Ws3xkPq6fvWq2hu8vKUO61cWRTZnzxLkgp8lvLSYKcJV+VjmwUjDqZu50rk9L/fPEmT4IG0gJQICo
	CiLtl1jYU9DCvO0m/4TTo+KVacT5F8v6kf6NnCfrRBcKDh6IgBYYJQsk8FFHirfwev04=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168749-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168749: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 21 Mar 2022 12:15:57 +0000

flight 168749 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168749/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   21 days
Failing since        168258  2022-03-01 01:55:31 Z   20 days  209 attempts
Testing same since   168738  2022-03-21 02:39:18 Z    0 days    8 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 859 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 12:16:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 12:16:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292965.497562 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWGxj-0001MZ-10; Mon, 21 Mar 2022 12:16:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292965.497562; Mon, 21 Mar 2022 12:16:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWGxi-0001MS-UA; Mon, 21 Mar 2022 12:16:38 +0000
Received: by outflank-mailman (input) for mailman id 292965;
 Mon, 21 Mar 2022 12:16:37 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=svEr=UA=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nWGxh-00018L-Kc
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 12:16:37 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id c0fcafea-a910-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 13:16:36 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2111.outbound.protection.outlook.com [104.47.17.111]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-19-0pt6AOa3P6i1egGZJF2flQ-1; Mon, 21 Mar 2022 13:16:35 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM0PR04MB4482.eurprd04.prod.outlook.com (2603:10a6:208:73::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.22; Mon, 21 Mar
 2022 12:16:33 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a%6]) with mapi id 15.20.5081.022; Mon, 21 Mar 2022
 12:16:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c0fcafea-a910-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647864996;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=xQkfecoMdgagqN1OtqFPPYZXVTztR/dVounJZiIfhJs=;
	b=m+ZJrjHREkBhcC2bniBApU9XTU9cs7yZw93wTXgB561oyxB+Bp5BOqXJshHg0I3/74/aLy
	7dqCdrrngtGuFhQjxm+jERIk7lrJ4uf0bCCCraEw4bOORs7qXmE2PiZRjscJp4vjRt1Jkb
	aWCzX4n3Fw5RCTVVBZOQR68j4z9Z+dk=
X-MC-Unique: 0pt6AOa3P6i1egGZJF2flQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=NVeBX9zMGn5PXHYVMUJDW56g/l3qvxTZi1F19M0vHI8iYwujXQU0yjMXuFK7TPYh1PEx5aqu4g5OLbT4tmVksIWIC4sKyTPJ07Hv95ks8k3gofoXTwY6srlN6/9h0V1JBowKQdiKAFQW6P9i4Go+r+1KLenld4acrjE46eeAsDCLw8004p0wW62Zue7nK7jjQrtMFJ/nG/nMBD3sbKkwKeHBSOkbRtxaiXH07msShMN8V/vx1ZiJC4y4gaCUNe8PeuZMDtcBn3pFlDWWkqdRhOetvL4YFY2xBSzTs8f2hfAOpgNZ4QMMmBWuUePq5lnTpib+sED2RzHLgeMXgAT1Mw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=xQkfecoMdgagqN1OtqFPPYZXVTztR/dVounJZiIfhJs=;
 b=Ou6RKdHnUzoaBbQONnAjQR+HaFstQCLnCh10U+aNGJ9qiywHYpXHzwbFGQjcFRfcOTYEIpwoTJd+yHUZhKIuPoFMkvHi4aDPTdESy3VVTlCLZ9XQFj9Uz8YsPK4tYHFAGvpudwEk6WZBLeARFdRsAkkKfvN3cp/auSxAJQJCrAXT0uRl8ei+MG0djlldsM6MxzUzmR4gcZVW6DX9xh06WMJDSKSNteehadrFWAP78XkkiTsS1lGjE2/hFjitHyAdhhbFmvRixOhu4prOr5kViC6UXRKX38XTSgFtN5eOwX1wavRINiL5TTzuvWWWU+FN6y2Gl6jXyxhBtXenI3bb8w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <ca8f13e5-5e3e-e64f-2711-4730883a24fc@suse.com>
Date: Mon, 21 Mar 2022 13:16:31 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2] x86/vmx: save guest non-register state in hvm_hw_cpu
Content-Language: en-US
To: Tamas K Lengyel <tamas.lengyel@intel.com>
Cc: Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian <kevin.tian@intel.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>, Wei Liu
 <wl@xen.org>, xen-devel@lists.xenproject.org
References: <e79bd13acfd73c105ee1399295c99cec153258c2.1647532323.git.tamas.lengyel@intel.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <e79bd13acfd73c105ee1399295c99cec153258c2.1647532323.git.tamas.lengyel@intel.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR05CA0034.eurprd05.prod.outlook.com
 (2603:10a6:20b:489::7) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c7c41177-1bf5-4ffa-4e24-08da0b34a36d
X-MS-TrafficTypeDiagnostic: AM0PR04MB4482:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB44824A5D149CE59AFFC79937B3169@AM0PR04MB4482.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	V8LNQgsVNqV3SKatgQneiWfO3/mlWAa7okU+Kq3bwJxH30T0zpHRxNvjY9F6+yQS8fkwtkGeYLHAH1PuYqfNrBUsvply/COBfE+7o2+P4IMkTiwiqNpNK3EhlvhWk9dqbzNDoiDfxZshMVHX/1NryPqXupd5LpGLADgmOXryfQ43gzuCGfn52NgRN7T2ci81XgcwuKsBp9SCludgrIOkezxMLFZVIyn7d5Ic/leRBUSzo15f7R6CgOvEKU4zuQ7z3yW4xhot6qFlYXtUtDpxHGs9EDcRXGzKssi9Uux+CCHscTMFtIfE51ZtkD3hrvkGhWvyYXqnMTeI9O+t63w/2AW3C4sfkFQ4wJY+yc4Om4YMRa/V9Z8oSUfW0HpwCweOzFLpdwQy9R33lyhvaZ5WQwKnSXIKBdZwvy11D8ZS6zhQZlbD/4FAHUrHOSuUw/pIR6xQmjCFIZb6VByyRDh/TUOgbuvR/76+QXTIDnmWBXgMTggyngj08CK3c4kn+f2ycCxBBQS1M6O4D5ggZ2xESGnMt31laJPiCb3OE9OwjR3y6qYAG1vfl/UzS/2jBsul2C5QeuiptvBdaBLgAuamNKwHkapPyR7tVovypJtbn6jsnTyaPF6UFddwDpdrrbeh+hw9e1FgfolKqNtnX2QDvt6mF/J4KrxoekKbeVPHJ4wF7flqE5eMyVoRUCFEEISB3wzXyUl8Fwt5lpp7Zzqr/NTEbU7lmSxfSRoD3nbJ2U4=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(31696002)(8676002)(5660300002)(2616005)(86362001)(6916009)(316002)(83380400001)(54906003)(31686004)(36756003)(2906002)(53546011)(6506007)(6512007)(66946007)(66476007)(66556008)(6486002)(4326008)(26005)(186003)(8936002)(508600001)(38100700002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?QWdxOGVlYkNLMUtrdFh6YXkzRlN4S1lXU1Q3RUZUd0x3QmJSZkI0QjhUZTIx?=
 =?utf-8?B?dTFlY2JadXJoYzRHUjJrWXJXdDhxV2NjSDY4QmM0Z2lQTjFSQWhXSFd1UndT?=
 =?utf-8?B?eWtEZldRNmxjZHlhaFFkUDZwbFNGOVg4d250a2FlZkwyc1VuU3NnYWtMRm91?=
 =?utf-8?B?N1B2Q0dTL01tSUZBQ0o3VmRlWkk1ZEhFUXlxVWF5THBWL1IvcWRWV3QrTkRB?=
 =?utf-8?B?MlQzdVBxSzdXc1ZMQmFONk4zajhOWHpnTWhubnBIV2hGamMrcjRVWWtpbTZO?=
 =?utf-8?B?UEtERTlubXVORDU2Nkp0UGFnL0JrbVRUZEtOVWJuV0xjZlU1TEJnSXRaMXNC?=
 =?utf-8?B?RldCVDFqQ2h6ZnQ0NXlJQmNRekFMTkxsVXBkcXM5b21JeTI3YmpnZlozZGVT?=
 =?utf-8?B?bDhGUkdSN2kwZ2V4WFpBV21rVHR1K2JNZTFZNU1GNEhSbUF3aWFwTUh6YVQ1?=
 =?utf-8?B?SDQ0YnNWWkRtOXRkNFNHdW14a0JkRTBhSE9LbjluUk1YSHZjcXoxbUhRNVRu?=
 =?utf-8?B?VHl6Ny9PSTc4T3dxNmNXRkFHUWxmbXB2L1NQSnJHLy9xSDR6WFhhekFjV05m?=
 =?utf-8?B?dFdwTkxWbElUVFVNOTR4cllCTGlKZUk3UDRIREgrSXVCUlpKUHg4NVJUczMw?=
 =?utf-8?B?aVNMLzRNN1lKMTJxZzBhQWNJK0kxODRiVTRML1NyNXE4aUVNWXBZT0hhSTd4?=
 =?utf-8?B?WEdyNGpqaE1HSTFiZjhMMzk4b2pLL3NUL3NmQ2FqNzdLZ0dKTlhIUkVCR1JP?=
 =?utf-8?B?N0lPa25zRFFaMEFzckwyVDlpVFhNd1F1WU1jem9NRXNGeFpLWFJYSWJmWlF5?=
 =?utf-8?B?WmtlM1ZQSkdmQlV3dDNqUDBkaEN1aEo5OXJuRzNUREs2c0pjWWxvUXNEQ2JN?=
 =?utf-8?B?RnFCNGFONDJPL2UxUXZTQnVNUDJxU1FkSUtBWW8xYkVrZEJxNWtqWithSW9j?=
 =?utf-8?B?d1lwVFIyTXFqVUZSN25xS3NqbGR2bnYrRDhsNDA3OHJpTmhycjB1K2hWaFdB?=
 =?utf-8?B?LzArOW51WnJYdFRNNGRhdzFaUTZ0VWNBLys2ZyszWU1nTkNNVGdvcy9qdDh0?=
 =?utf-8?B?Wlo1TCtWOUtlNXZublFQa1lCVGFQM2lOOHY3TFZROUcvNUhxK21yTlI4QkFK?=
 =?utf-8?B?Ym9vdzlmVGg0U3J0V0Z0WmVETU1aYzZRUzBRRjdkbElPdWZJT2hJTHo3Wm5R?=
 =?utf-8?B?TTlSamFoNHZqSmFkMWxMU2FJdkg1ck1rSXoxellMazlEbkR4c2EyL09RTGhO?=
 =?utf-8?B?QlAyU3RIQ0FHYS90Tmg0N1B1ZUpmdmxUa3JhSUdpOTNkR3Bac1gxeEpkbWs4?=
 =?utf-8?B?VSt6WXVjZ0hQVElKTjlVd2ZWOWlKT3MwaERDdWdiY2VtdTdGcWpuZGl1QmJo?=
 =?utf-8?B?Q2Jua2VIVCs4OW8zRXEzaXJPcFFmVUxQNDh0UDM0aW12alBZNzA4aW5tTXhH?=
 =?utf-8?B?VkJuanVvbGxMOHlwWFJ4ekpqcDFMOUxOR2l4cHFjWmJzYkRPTDZPWHJueVAx?=
 =?utf-8?B?b29mUWlpeWt5aHRvc1hpL3NIRjJRYXpJbEtkdG9hVXFKdmZIaXUvNkRSeDU4?=
 =?utf-8?B?bU9hbFhVQ09DemVIWklUUWRXTHpHZVhUM1NSNnZseHRnUVpmeExiSVRPcVlH?=
 =?utf-8?B?YUpzZnlpVklkUmlrNHpmMFNqTytpL09TRTBRWndyekZiRGYwYU80bmVUcnRa?=
 =?utf-8?B?a3AvR3BONnArNFViSnRGOUtrM3VLbDhaYisrU08yQmZ2aWtpVnphZGloRHBr?=
 =?utf-8?B?ZHJFdUNwbytROExsWjBqaGFwZkoyNXVqTUZmQ2J6QWpVc0d0bDZaYU9RN3k5?=
 =?utf-8?B?U3JGMVRGbEg4UU9nQmRlL1hkYTByZ0ZNc0lVb3llOFpIR3B5ZGM4QW92aEtP?=
 =?utf-8?B?YzdHU25XcVNnT0Y3SnVUYjBlMGthd1piaWY1a3dLTzJnT2ZkaVE0aDM0Rlk1?=
 =?utf-8?Q?G4laHeWU+yLT9ZMlsIa0iNF7ZWJO/du7?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c7c41177-1bf5-4ffa-4e24-08da0b34a36d
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 12:16:33.5494
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: kU5lIsSTHL3XFNdCTM7gvm1F0LSowQtfR09/EGuxyBgrxUrgs7faupST0hGmbfQPBeRANWnNM78ISspPur72nw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB4482

On 17.03.2022 16:57, Tamas K Lengyel wrote:
> During VM forking and resetting a failed vmentry has been observed due
> to the guest non-register state going out-of-sync with the guest register
> state. For example, a VM fork reset right after a STI instruction can trigger
> the failed entry. This is due to the guest non-register state not being saved
> from the parent VM, thus the reset operation only copies the register state.
> 
> Fix this by including the guest non-register state in hvm_hw_cpu so that when
> its copied from the parent VM the vCPU state remains in sync.
> 
> SVM is not currently wired-in as VM forking is VMX only and saving non-register
> state during normal save/restore/migration operation hasn't been needed.

Given that it was pointed out that e.g. STI- and MOV-SS-shadow aren't
VMX specific and also aren't impossible to hit with ordinary save /
restore / migrate, I'm not convinced of this argumentation. But of
course fixing VMX alone is better than nothing. However, ...

> @@ -166,6 +167,11 @@ struct hvm_hw_cpu {
>  #define XEN_X86_FPU_INITIALISED         (1U<<_XEN_X86_FPU_INITIALISED)
>      uint32_t flags;
>      uint32_t pad0;
> +
> +    /* non-register state */
> +    uint32_t activity_state;
> +    uint32_t interruptibility_state;
> +    uint64_t pending_dbg;
>  };

... these fields now represent vendor state in a supposedly vendor
independent structure. Besides my wish to see this represented in
field naming (thus at least making provisions for SVM to gain
similar support; perhaps easiest would be to include these in a
sub-structure with a field name of "vmx"), I wonder in how far cross-
vendor migration was taken into consideration. As long as the fields
are zero / ignored, things wouldn't be worse than before your
change, but I think it wants spelling out that the SVM counterpart(s)
may not be added by way of making a VMX/SVM union.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 12:18:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 12:18:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292971.497574 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWGzA-00021F-Bu; Mon, 21 Mar 2022 12:18:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292971.497574; Mon, 21 Mar 2022 12:18:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWGzA-000218-8g; Mon, 21 Mar 2022 12:18:08 +0000
Received: by outflank-mailman (input) for mailman id 292971;
 Mon, 21 Mar 2022 12:18:06 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=svEr=UA=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nWGz8-00020y-Pi
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 12:18:06 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f61a7ccf-a910-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 13:18:05 +0100 (CET)
Received: from EUR02-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur02lp2055.outbound.protection.outlook.com [104.47.6.55]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-16-oweyiMXSNiCOh5d1DcXNxA-1; Mon, 21 Mar 2022 13:18:04 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM0PR04MB7172.eurprd04.prod.outlook.com (2603:10a6:208:192::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.22; Mon, 21 Mar
 2022 12:18:02 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a%6]) with mapi id 15.20.5081.022; Mon, 21 Mar 2022
 12:18:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f61a7ccf-a910-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647865085;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=WXUmL9mZ76koIaO6/3JB26WR/49aL7U2RGhqqkaJdks=;
	b=StWFAOC8Ll9Kzv+9VN7vt/TNFkkNXWY6/0j52Xl1Ny5uRYlxVxMH4VrtY1HRjwf8/plPiv
	96FMkZ8bCUcHpnEosHUIXLjDmEHYZiojxqBYHtmoxMsUcNOZXQ+s4U79NdDITwvgMHXV8+
	TAT+lkRLm5t0I2N4Bg6hFsdSiZMH4Q0=
X-MC-Unique: oweyiMXSNiCOh5d1DcXNxA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ZNDVnbB2l/oiJA/jdpV/xPxhQ22f2lkCaq/JNDwWM8Au5ljQvkz+8WctXw46pR/JndCP+9vxmZHIjJnGfylvYwbwIPvtS6XpR9gPlCdLvKkhpIL8X/iBLvMstfIMC2LD4rmRVOGgiLohL6axvd9ODjEgDY7TTBWdM/Wy6V+o/rCDzUzjY3iEj62MKD6B1YziVgIw8G/Ro16sDaHWbXRkSA5iYZh7sXht0iDty9rHZ9vK6xYtRluOBYoIwIa1xG8m0rzAjK9kPxZ0/6yBWQdr6k5PVcJVrAEWecUNb/Yx/akYCP6nLJmcllQOGvORAgT+mZG0CcADPJr0romfpeobBA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=j6tQhpL9z0HU8nuGi98oFA3JXsdCwVQ+YrYf3WhVLK4=;
 b=BbfRN3ocPoKGK3gYBy1r0Rvp1q3OIRtcsN27cJhOQL3TuYyXtozXDc5Yc2gDwf/CH9migSOg7pR+FwojyWm6+//R378/kFuJaOaFXbcnvw07Jzp0J7KVivbfw2nD7HzraaeojAb4aYSZb432gv8HVeYbAqlAuHmAfQ+LdIUQ5UkHgO02gc+LAK4UBRf6bxmnx6FBoEVD2/yWEXIQaqeNeXx3E8Qnc0eq3UMs6yLXKuOqskPoMTfcL0fEtE42dtEsvbDl5F+x9JPw5cweACKDeFgdcfsZyjFoaoyF+oKDHn2l9UZkqRbDfTY9KcsuxPtM95hsAAD6rxeItDLvLQkvqw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <9060ac46-3985-086e-79cc-17aaf1141774@suse.com>
Date: Mon, 21 Mar 2022 13:18:00 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] x86/build: work around older GNU ld not leaving .got.plt
 empty
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 Julien Grall <julien@xen.org>
References: <057172d5-437a-347b-b5bb-d102b6b37f0a@suse.com>
 <YjhoPeWWj2B0Kcts@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YjhoPeWWj2B0Kcts@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR06CA0245.eurprd06.prod.outlook.com
 (2603:10a6:20b:45f::13) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 000b9cd3-1124-45d6-210c-08da0b34d862
X-MS-TrafficTypeDiagnostic: AM0PR04MB7172:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB7172F8C7A648D2C14C1BBB07B3169@AM0PR04MB7172.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(26005)(86362001)(186003)(31696002)(31686004)(508600001)(2616005)(6506007)(66946007)(66476007)(316002)(6916009)(54906003)(38100700002)(6486002)(5660300002)(4326008)(8936002)(2906002)(4744005)(8676002)(53546011)(66556008)(36756003)(6512007)(142923001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?zY68dXRA5bvj+ulc7/CLTBlz4ma/LsLpbLYylVmjzjHBlCTHf07Y54pWGHw8?=
 =?us-ascii?Q?ypdm2HjN6ZO09HNQwQ3eXCOQT/LP0+putP1FBQWthi0tLSRPz4ppYYe5Z7Kc?=
 =?us-ascii?Q?i2eenr+PwXc7oziffXXV4fURqI32ODZU5uRkTh+tM3nhX8HIKK58rk3fv8H2?=
 =?us-ascii?Q?LSP65AfCClF9hGeG+JD+kpgUuLCx4JGlVSTbJH63pp6E82a6gli6a1Sq1R7l?=
 =?us-ascii?Q?cxBTEIoQoSwytJrpn/FMW5N/KIvjCGJXeENn2eB7e/qB4dam82jERMDL0WL2?=
 =?us-ascii?Q?0Io8bNq5OxyOxmeY1sDo/W3s15CUCxoDxUPeVpH+aSJl96FltrUQoed0pum7?=
 =?us-ascii?Q?HtL1/qcKS8n9eD6VPekjN6jlSQZlAalXE5eYaA6IcmrovWHYG0FpRzDcCuEK?=
 =?us-ascii?Q?GMJvRSh7HXABLcJ9IeqZ1NjvwslC8yIfiDuFsJrE7V/lsEca8lAccoDpDOTo?=
 =?us-ascii?Q?+aJCTYojOH06beE2cnXpcYaxPaTBtS5VAFNAvFrNWGx0dA4cuyLzt+txT0J/?=
 =?us-ascii?Q?/RDJsQ76tW3CvwMmnncwvKlplX//x+JRWFtIRz5f4/RCg/ji6OT76gBEPxHi?=
 =?us-ascii?Q?m5AywjKjWpWP2vIOAgX55TroZjxA9j7T2z5NaiDXb27UaA97NkRe557vc3H8?=
 =?us-ascii?Q?D1y4uBKUg4l098TrNQ4/Z1ZPcPbB0GidzG9Tn2yjZlqnQFVNPazG15XkxSW/?=
 =?us-ascii?Q?PYpjcouhAi3MMIkEmxmplG3grXv8Cqg4V77vfpRQ8JrEvHD4qiyc6mOF5MZA?=
 =?us-ascii?Q?7M+jrz5M3s4qQeLLyA6mESbzU4xGGDsP5RHGf+BIVwnJKpkJLC0BefagM5Rc?=
 =?us-ascii?Q?xpq9VjdlbPMp/Ol32Sz32BO3DJeI3p6KSmf4iok95pbz1/Kp4HUKQdvktM0m?=
 =?us-ascii?Q?iyZTUO/IsRRny4goG7iPFnoEGMXX8V5smRW6ebnJVzN0T3odo9dSuuup7S8L?=
 =?us-ascii?Q?LEZYrzvKWpzT9n805epkK2SLglCddDt2QbQClmApVnH4iuMl00AP2lgRLc3R?=
 =?us-ascii?Q?OB7QhK3/e+WT0b4vUEtiP2KDblWJYAqPVImQr47/bvtJVwJl6k0N/LdTyNUD?=
 =?us-ascii?Q?u70uXZz94whrda/6iMNolGBrxviXH/cnFnnqUcjm14iQ70d0RjORTgHmTu+4?=
 =?us-ascii?Q?uHHkCHwDX2LYKe+GAOT+kVXy85SZYxkypvWRQs8i3coLBNZLuTJQeontLP38?=
 =?us-ascii?Q?GYFMz4GgHO8gbarFROhUju1iQXAbvvk/VxbwFrDmlEmR5Rd8cnxrx/v+mBPy?=
 =?us-ascii?Q?2GhZCOoFFaWIKASKW5uaLadMV/WcANkzLvGtSiEvu8XYlHoNodgLZ4yEnfMD?=
 =?us-ascii?Q?qV/fhuSbdUbheQUv1ASlfEaNqqLVe8PlgARuLa6Whp7Bq0xExTKm9j3N9WRh?=
 =?us-ascii?Q?+E44HCcMawjSJ38ZZ7jHF37Dq3dYRhkB5VINq2Lp1eouutWWSJI5I6PcJm7i?=
 =?us-ascii?Q?BDRhpZZztXY/cJSEm1np6iopRwxadQmK?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 000b9cd3-1124-45d6-210c-08da0b34d862
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 12:18:02.4267
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: xBWBkH3xAzsA5OFboY14UC1/50vc4c4uGpWs3VhzRHhdLptnR08GLlHkMa9oija8LI9JYJeUHyPKfcnAOKerWA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB7172

On 21.03.2022 12:57, Roger Pau Monn=C3=A9 wrote:
> On Mon, Mar 21, 2022 at 12:46:54PM +0100, Jan Beulich wrote:
>> The initial three entries in .got.plt are "static", i.e. present
>> independent of actual entries allocation of which is triggered by
>> respective relocations. When no real entries are needed, halfway recent
>> ld discards the "static" portion of the table as well, but older GNU ld
>> fails to do so.
>=20
> Do you know what this 'static' entries refer to?

I didn't take the time to look this up, and I don't know off the top of
my head.

>> Fixes: dedb0aa42c6d ("x86/build: use --orphan-handling linker option if =
available")
>> Reported-by: Julien Grall <jgrall@amazon.com>
>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>=20
> Reviewed-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>

Thanks.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 12:32:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 12:32:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292976.497585 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWHCa-0004PV-Gm; Mon, 21 Mar 2022 12:32:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292976.497585; Mon, 21 Mar 2022 12:32:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWHCa-0004PO-D9; Mon, 21 Mar 2022 12:32:00 +0000
Received: by outflank-mailman (input) for mailman id 292976;
 Mon, 21 Mar 2022 12:31:58 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=IBI2=UA=kernel.dk=axboe@srs-se1.protection.inumbo.net>)
 id 1nWHCY-0004PD-Du
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 12:31:58 +0000
Received: from mail-pj1-x1031.google.com (mail-pj1-x1031.google.com
 [2607:f8b0:4864:20::1031])
 by se1-gles-sth1.inumbo.com (Halon) with UTF8SMTPS
 id e4e238bc-a912-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 13:31:56 +0100 (CET)
Received: by mail-pj1-x1031.google.com with SMTP id v4so12902615pjh.2
 for <xen-devel@lists.xenproject.org>; Mon, 21 Mar 2022 05:31:56 -0700 (PDT)
Received: from [127.0.1.1] ([198.8.77.157]) by smtp.gmail.com with ESMTPSA id
 mu1-20020a17090b388100b001bf861ef154sm21485472pjb.55.2022.03.21.05.31.53
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Mon, 21 Mar 2022 05:31:54 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e4e238bc-a912-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=kernel-dk.20210112.gappssmtp.com; s=20210112;
        h=from:to:cc:in-reply-to:references:subject:message-id:date
         :mime-version:content-transfer-encoding;
        bh=puzh/4zgw5qsrOsU7JEwzpl2qiVxo2BGWuYm1B1pvJc=;
        b=FOkQE8b15ofFRmlKdr6pjDgjDhJz4PC38Py9SSNAu0nnkM47LTPU8wiIAj/jZ4OKM7
         qh7E0Sn2BbEx2zoZw1/Ji/fpAJnOrxQqKX5aIm6XHCLFBWzF/Ld2G7WhPE6AV2au0Hpz
         GwCCUqr1xUsUnyWm/q2STFAefL61fCIptPeQNbVYXE3Z/7dAzjxe04cqvgDuAQzMSp1S
         opIRB4V2nroDDj+fogAtRn52dnJM56gyezVmeghr8U8l4eTFZdnL5UyQBeT1cXufm+FY
         oW0/NpLBpkEUpVc3ZKScnspxuMz+twZ9ZV/HvGJZmJ837fe7JhZm63EJEDtcIFNL1oql
         Hoxw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:in-reply-to:references:subject
         :message-id:date:mime-version:content-transfer-encoding;
        bh=puzh/4zgw5qsrOsU7JEwzpl2qiVxo2BGWuYm1B1pvJc=;
        b=g7HHlcjgTAitY4we5Kj0w1oPeK9SetOp8ZDRT3VAgutSYLc57jsjTm6pqHPUhVIzqr
         oHSNaBVrR1N/EU3tVkFSWYOCng261BxVF3Ef6J29iWb8mMHJvAfBMiZQ4h3QYcysSSuo
         1fj4D4UhyA0XB+uj94YBBQEK7k4ILibtGaI3y1fEuB8SCHCNKe5vFNhxC5LaPe5HGnum
         AaLLJzkGb9ib3V5LxW7c0YGReU4mcXID5TU+s36fVAJvmjPLhoWmluozSAqOA05XEtR1
         BBNFbosIHnYnFoqg3kK9kOvfsSmJljxPYxLbh6tuXhoZNAUwcXy4Zjx4b9HKtPvUzISI
         MKQg==
X-Gm-Message-State: AOAM530rE9E4ySBtUMLW9eSx0sZ868rLUum75SPA4V46OewnT3nlhUWT
	JN3gyZtu+cov3/zZ16aQ9zeJgQ==
X-Google-Smtp-Source: ABdhPJwf6l5qKXE4WAgPzo68qMtDZFuJ6rGv+5jCaoBU8zk9mNef60xf59zruIe/sIvbJXO9IoxxSg==
X-Received: by 2002:a17:902:f209:b0:154:3b94:e2f6 with SMTP id m9-20020a170902f20900b001543b94e2f6mr9225257plc.93.1647865914885;
        Mon, 21 Mar 2022 05:31:54 -0700 (PDT)
From: Jens Axboe <axboe@kernel.dk>
To: xen-devel@lists.xenproject.org, linux-block@vger.kernel.org, Roger Pau Monné <roger.pau@citrix.com>, Colin Ian King <colin.i.king@gmail.com>
Cc: kernel-janitors@vger.kernel.org, linux-kernel@vger.kernel.org, llvm@lists.linux.dev
In-Reply-To: <20220317234646.78158-1-colin.i.king@gmail.com>
References: <20220317234646.78158-1-colin.i.king@gmail.com>
Subject: Re: [PATCH] xen-blkback: remove redundant assignment to variable i
Message-Id: <164786591377.5770.820740111597207436.b4-ty@kernel.dk>
Date: Mon, 21 Mar 2022 06:31:53 -0600
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit

On Thu, 17 Mar 2022 23:46:46 +0000, Colin Ian King wrote:
> Variable i is being assigned a value that is never read, it is being
> re-assigned later in a for-loop. The assignment is redundant and can
> be removed.
> 
> Cleans up clang scan build warning:
> drivers/block/xen-blkback/blkback.c:934:14: warning: Although the value
> stored to 'i' is used in the enclosing expression, the value is never
> actually read from 'i' [deadcode.DeadStores]
> 
> [...]

Applied, thanks!

[1/1] xen-blkback: remove redundant assignment to variable i
      commit: 93b4e74789dbdefcffc7baac107069e74d98513c

Best regards,
-- 
Jens Axboe




From xen-devel-bounces@lists.xenproject.org Mon Mar 21 12:32:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 12:32:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292977.497590 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWHCa-0004T2-Po; Mon, 21 Mar 2022 12:32:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292977.497590; Mon, 21 Mar 2022 12:32:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWHCa-0004S9-Ka; Mon, 21 Mar 2022 12:32:00 +0000
Received: by outflank-mailman (input) for mailman id 292977;
 Mon, 21 Mar 2022 12:31:59 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=IBI2=UA=kernel.dk=axboe@srs-se1.protection.inumbo.net>)
 id 1nWHCZ-0004PD-GJ
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 12:31:59 +0000
Received: from mail-pf1-x433.google.com (mail-pf1-x433.google.com
 [2607:f8b0:4864:20::433])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e63b9d2f-a912-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 13:31:58 +0100 (CET)
Received: by mail-pf1-x433.google.com with SMTP id p5so9175446pfo.5
 for <xen-devel@lists.xenproject.org>; Mon, 21 Mar 2022 05:31:58 -0700 (PDT)
Received: from [127.0.1.1] ([198.8.77.157]) by smtp.gmail.com with ESMTPSA id
 y30-20020a056a001c9e00b004fa9246adcbsm5277920pfw.144.2022.03.21.05.31.56
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Mon, 21 Mar 2022 05:31:56 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e63b9d2f-a912-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=kernel-dk.20210112.gappssmtp.com; s=20210112;
        h=from:to:cc:in-reply-to:references:subject:message-id:date
         :mime-version:content-transfer-encoding;
        bh=Lux+Oce5954ZCR4SaazZ6s8iSwpkGBWeDb8gTfwBZqM=;
        b=VrY4yTDBoUuWUPRu7aAjBfZBak2f/Vf5gOla5mUSXo8iqCal7uXrULn3rX5d+D2eqK
         MFMAh1iO1clvFctmNChOz7kBBggbO0xgsjYcS59nhB7OG210nPjHe+FZ9BYkN8lfwvuQ
         q4T162hV9jUxUzkjRdxKZ9orkKEC+J/BinC4wuDSjMApJarYj96Vg9omJdBG/2ptTgMk
         mX5YH2Fa3yF5ePKcqiS9uD2wFF+OhdfbXWGoTp04bTy8GUHOqq1QFtfFPYVJOgRDsELa
         utUXMG1apjvDJU7Z9Vlhkp0fsM4L83eAiC3r2/Hg88DU7cXjuRZbOJVhMvCN+8vRONfn
         9qAA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:in-reply-to:references:subject
         :message-id:date:mime-version:content-transfer-encoding;
        bh=Lux+Oce5954ZCR4SaazZ6s8iSwpkGBWeDb8gTfwBZqM=;
        b=l929rtpo7XPtVL5uBpTEBNYH5KhgACPFWPkW8JSwAzLr0xsmHAVe72SXx1+jqJrCut
         bNcmgHQVjNGDqh1NicABE9aoBVGybLIUNl1vCbkI76zQ9Ux1ZubEC+7+W+pL9hwls586
         OqqAyXIc9321vs7WN/wm/Oe7o7YU6TnhPkuYeS5TjLtUlgGlr0yh9BDrs7dD0Nkp2BdG
         XDAIKhLvxhsTgkWZf/WhQKwqWg5e0EdRzCTH5KxM1ydyOV/NY7f9IWXeaqf+AY8Pp3in
         mSFYOAne9LzE6cw3LqO+e05NFkpZhDf0+zDcIieDwLa47ViKSn5rliu8C7XWqk0shKnn
         S8Yw==
X-Gm-Message-State: AOAM532qWd0TC/UZi8hTPTwzKSiAhGmJKZbJvpgHivSxp3tmabrLYwUq
	jfifTFOWmVGGGm8+YnhfivTueA==
X-Google-Smtp-Source: ABdhPJyHp8/6kKFBxi4tI0DjZuF7CfbyQs3okZ47Jb114AtRRldFRxb2PaEGX7OOzdRY5sldVEnNuA==
X-Received: by 2002:aa7:8896:0:b0:4f7:b8f7:772e with SMTP id z22-20020aa78896000000b004f7b8f7772emr23053440pfe.62.1647865917359;
        Mon, 21 Mar 2022 05:31:57 -0700 (PDT)
From: Jens Axboe <axboe@kernel.dk>
To: linux-block@vger.kernel.org, Dongli Zhang <dongli.zhang@oracle.com>, xen-devel@lists.xenproject.org
Cc: boris.ostrovsky@oracle.com, roger.pau@citrix.com, linux-kernel@vger.kernel.org, jgross@suse.com, sstabellini@kernel.org
In-Reply-To: <20220317220930.5698-1-dongli.zhang@oracle.com>
References: <20220317220930.5698-1-dongli.zhang@oracle.com>
Subject: Re: [PATCH 1/1] xen/blkfront: fix comment for need_copy
Message-Id: <164786591631.5804.10829961862244970151.b4-ty@kernel.dk>
Date: Mon, 21 Mar 2022 06:31:56 -0600
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit

On Thu, 17 Mar 2022 15:09:30 -0700, Dongli Zhang wrote:
> The 'need_copy' is set when rq_data_dir(req) returns WRITE, in order to
> copy the written data to persistent page.
> 
> ".need_copy = rq_data_dir(req) && info->feature_persistent,"
> 
> 

Applied, thanks!

[1/1] xen/blkfront: fix comment for need_copy
      commit: 08719dd9176b4c55f547bd11812fd6cc35907d37

Best regards,
-- 
Jens Axboe




From xen-devel-bounces@lists.xenproject.org Mon Mar 21 13:02:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 13:02:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292985.497606 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWHgM-0008Lm-5f; Mon, 21 Mar 2022 13:02:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292985.497606; Mon, 21 Mar 2022 13:02:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWHgM-0008Lf-2a; Mon, 21 Mar 2022 13:02:46 +0000
Received: by outflank-mailman (input) for mailman id 292985;
 Mon, 21 Mar 2022 13:02:44 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Ob4L=UA=citrix.com=prvs=0720edaad=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nWHgK-0008LZ-LU
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 13:02:44 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 304ad89b-a917-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 14:02:41 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 304ad89b-a917-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647867761;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:mime-version;
  bh=+arapnF+7LDEVvbYniWryjnZfp9Fq3Zj4jbB/ONgScg=;
  b=MO1F1qFM5uFBLRf30AG1ch7Y87njrH59DJtxHqc7irdWUYFXciPrv7Up
   onZsM4GgnfyMVnWsz6KnVVleC7XCEdgHpVsr7KRBvrIou5FCdewoK5X6E
   qL8X9bn+V9sGwXnAyBIjG5U4ORk5uKVo1DzeB52a34OXKgQCCULBu00at
   o=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66678719
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:yNtPVKmD9Z7sOIDPF6dDd/fo5gywJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xJMWz3QOv+MZDamfNwnaY+0pBwAvJ6HzNRkTlY+qy48QSMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiWVrV4
 LsenuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYSAECM7PepcIndT5HNyw5Ib9g3r7XLi3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3k3ds1zzGS90hRojOWf7i7t5ExjYgwMtJGJ4yY
 uJHN2QwPEuZMnWjPH89Uc4Qwe2Ih0LHSAJHrn6Q++05zTf6mVkZPL/Fb4OOJ43iqd9utl2Du
 mvM8mD9AxcbHN+S0zyI9jSrnOCntTz/cJIfEvu/7PECqF+Owm0eDjUGWF39puO24mauVtQaJ
 0EK9y4Gqakp6FftXtT7Rwe/onOPolgbQdU4O+8w5RyJy6HUyx2EHWVCRTlEAOHKr+dvG2Zsj
 AXQ2Yq0W3o/69V5VE5x6J+Vqxi/JzooC1UkQjAgQEwZ8f/FoZE820enoslYLIa5idj8GDfVy
 j+MrTQji7h7sfPnx5lX7nic3Wvy+8Ghohodo1yOAzn7tl8RiJuNPdTA1LTN0RpXwG91pHGlt
 WNMpcWR5ftm4XqlxH3UG7Vl8F1ECp+43NzgbbxHQsJJG9eFoSfLkWVsDNZWfhsBDyr8UWW1C
 HI/QCsIjHOpAFOkbLVsf6W6ANkwwK7rGLzND66IMYoXOsEoJFbcrUmCgHJ8OEi3zSARfVwXY
 8/HIa5A815EYUiY8NZGb7hEiuJ6rszP7WjSWYr633yaPUm2PxaopUM+GALWNIgRtfrcyC2Mq
 oo3H5bamn13DbylCgGKoNF7ELz/BSVibXwAg5cMLbDrz8sPMDxJNsI9Npt6It07xfsJzrmUl
 px/M2cBoGfCabT8AVziQlhoaa/1XIY5qnQ+PCc2Ok2v1WRlaoGqhJrzvbNtJ9HLKMQLISZIc
 sQ4
IronPort-HdrOrdr: A9a23:MnHXaaqBflMce1c3WfSkLL8aV5oXeYIsimQD101hICG9Ffbo8/
 xG/c5rsCMc5wxhO03I9ergBEDiex3hHPxOkO4s1N6ZNWGN1VdARLsSi7cKqAeQeREWmNQ86U
 5ISdkGNDWuZmIQsS+B2maF+nwbsaG6GduT6dvj8w==
X-IronPort-AV: E=Sophos;i="5.90,198,1643691600"; 
   d="scan'208,217";a="66678719"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=eVehk+AJpf/aZa5rBbfBuEeATifsds1d8tXvMSDleNlzVo2mnOIQB7hJCVdqx56xMwW4eHOl8zxaDOMHIz4lTWJPp7TrPpttI8MOL7ioYNx80oOhtA8cPJ6grMUeuIKdtQJNqAMS0D+Fxcylg9iD/FkwrfGcp7BciTJNYOHAixupFOB9yqnsTFDvC+1RsB960EuaA0xMwOCsVFsaz1vv1ENtohjdfFpKzFW5t7aOLBafhyNmtiQZyvZg2y+UPsVJXo7A8WoB7o+QiR+Z52cFPBXXxPdsJeLf5Gf/lGpXGuRogAZL9Jls6plbY3Kwm0b0O90Nc0OCObOCZQSPVdLW/Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=+arapnF+7LDEVvbYniWryjnZfp9Fq3Zj4jbB/ONgScg=;
 b=iMYlWpSW5+n6E0amcLXjYAWOcuZVkgZ/dbiQeI/6AkXWW7lmeJ/40AZWFR9zEfWAlEsfr1v0ERZ+n1tnlhMHJYYOqtia8qInUQCBH2GAw+6v1JbCxRDu/pwdwP74XoO0zCYbQhQ3iy/GYyPC196aMJTHV7LOExj/BCbz4HqRtIifcsiXdtlwXJTD7a/rnenUg0LiuTQykcZqStKzQkOSgFNgApJefKI3Jade6/z8k0htz8QXPamdCZJbjjgM5HnnF/3Kxi/f9N9XFDMW0DmOKUxqGXTYibm38vcc4qZQHdNk6l4mlCbqWY/r4/G/LIPSVnh8pDqySozQUWgGCLUomQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=+arapnF+7LDEVvbYniWryjnZfp9Fq3Zj4jbB/ONgScg=;
 b=XQZe5Vs171mDriqGbv/FAYjrF4hNp+cpfmkjSocob+9O4OWq17ZRFLHH3BANtmgGilYTrgaQRE16y8TzSfspqJ0PsPx8322V5R7W/Om49JiSWiFSh+6r/CTzRIwyuyPUqMLqHD2zlrW09tyHlH2KJ+mLPH2cngHMH8Mp8+ZiaR4=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Roger Pau Monne <roger.pau@citrix.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
CC: George Dunlap <George.Dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>
Subject: Re: [PATCH v2] codeql: add support for analyzing C, Python and Go
Thread-Topic: [PATCH v2] codeql: add support for analyzing C, Python and Go
Thread-Index: AQHYMkLTly8uCA3NVU+Jb09OwTv6vazJrtuAgAA0doA=
Date: Mon, 21 Mar 2022 13:02:30 +0000
Message-ID: <abc6f071-694f-9b4c-1764-7b74d9d55185@citrix.com>
References: <20220307164552.74818-1-roger.pau@citrix.com>
 <YjhLY1Wb4HF39gIC@Air-de-Roger>
In-Reply-To: <YjhLY1Wb4HF39gIC@Air-de-Roger>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 13bfa964-00c4-45b4-a2a1-08da0b3b0ee1
x-ms-traffictypediagnostic: MN2PR03MB4832:EE_
x-microsoft-antispam-prvs: <MN2PR03MB4832D883A1D3D963C9E11077BA169@MN2PR03MB4832.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: U/9ZAeuXBONRTWMhiFs8jf2OYSFviVJdX5NLoF7OTTgo2KbAPtXBEt6j4pgTtnMJ0wyuw+ROWy7Orn9Yo8YcDICV3p6Ldg9e2/9EboHlf2nx4l1USEY1L6nmvfQhlM+Bijq5TUQ7U5CFGjC79ghyt70hKBaRX6jYvwTrnq21LstSxQqvVXoNDkaut+GbMlJFKluPQB0TAMkoVEGAJu36qGY8lUlhwLzqM3WJAAL2VKpfAT8UplYZj6Mkds4cBhKcoa1mAYUf3fyQHgbnbFMh/gywWQaaNapyb5aJpBvjROGVed09v59eENg0Lo6aXZdOXyrT0Kj7+VVXTfkcsppahV2RBYhkZvj1PCPPFjDO5Jp2yz7Wf09Fx94Sh0OHWJQgc/8znxwoCbooYVBhmK89aQYGVaV9EPtC2q2EbLEIL3Albup7TdTFqrqod77wDc+q5zcPC544k3GPnGbEqrPk5L70ppeU3Vnico9UENM6Xtc2DWEWbZRQiFVJx6DYI4OrKbE0PPOAG5KEbxg6xH6kyCE3rFNrQOGboz2Qdp31Qwz+wS6YCkDe8Rs49JQQePDFv1ozBY8nO/t4zJwNeuqhUswzJNsnvmCVSiUGRVr8aWUdf+FojyMbt0S5CqxCekX0+pjBh8vtCqYrCeDj2e96hXMQTt/58Nk1TyKI0JEXgF4wtoE+W9XVJOq5Mf4VEsTLPj1Wr43loDOcwBf+0YCUgrzw/U1x45IW1hCLpD1nFYvziwnXk3Bv++ORZUIdlQeoRVrcDHjeWMDettJAxyc5DA==
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(316002)(110136005)(86362001)(54906003)(31696002)(2616005)(186003)(26005)(8676002)(508600001)(71200400001)(6486002)(53546011)(55236004)(6512007)(6506007)(122000001)(38100700002)(82960400001)(83380400001)(38070700005)(36756003)(66946007)(5660300002)(76116006)(91956017)(66476007)(66556008)(66446008)(2906002)(64756008)(31686004)(8936002)(4326008)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?VU5ZU1U4cW8wV2RRMmlPMy9OdlBxVDFWaFlwZEdVbVhldjdSNmVsaHhzNWow?=
 =?utf-8?B?N3FKaEpkVU9Uc1E4NlpjZDdZRWdJaHZIdy9MSk15cFprWVp0WnNKSm0zZ0t6?=
 =?utf-8?B?TU5yTEc3anZESlloMkhaSFBaTm12RE5KT0JZbWJEMEpCbktDR09obmN0WW9o?=
 =?utf-8?B?OUJGanZJZmJONHV4VWxWZ0xXZjB5a2JmRDVvKzRLVUlBRlpLTG13aGU3ejkw?=
 =?utf-8?B?NEpmVFRRQlBIT0hmd2JQM2QrWk1jMlJBQlhzZUJKOU9DemJwMTV6ZktWS0Np?=
 =?utf-8?B?SnBhNVZGUTJ6SzhKM1gwQjZNM0xzTGpsSTkxUitUUXArMTJBa3pydkV4aGVp?=
 =?utf-8?B?SFJpekk2dHk5dVJ0RnVxM3VVWkZyNCtkeTBPaHJINnlFZFJONk5mK0RTdnBX?=
 =?utf-8?B?Rkt3bDMzNEtxb2g0WnBydUJGQUowTDlZRGNMVkg1R0pDNERGUTJONys4Q0d3?=
 =?utf-8?B?UGhacURQeFNQUjdXa25ZZTY3UUp0M0dEbk5RRkpaYm5EcXR0V210YlFncHJq?=
 =?utf-8?B?dENpalZIN0Fxd3ZLdVZuVURTeTZxZnFHeTRoK0ZwNGpuVVA5eFFSQUMwZU1K?=
 =?utf-8?B?eExzZWlwTXpCNkRxaitlaVc2OFFNS2YxVUg1dmpOZHYwUDNaZ0VGTG5yNEFa?=
 =?utf-8?B?dzE4TzA5ZnhBUVMxWmdkbksxZEswcmp4MEtiTER1aDEvd0J1c2hlOWJ4Qk1v?=
 =?utf-8?B?RGhFQ05uTVdtWnpPN0ZPZmw3Vm9obENpbFRHT2k4YWVGdERXLzNlM0lvL25t?=
 =?utf-8?B?Smw4V2dPMzJmOFVzdndmNWpET0NxQkQ4R2VaZk9ud2dwU3FrNGw0cGZqUUVS?=
 =?utf-8?B?REp1dHkzcEcyTzgzY09aWE1XdVBYY3pTZ0lSdG55ZnR3Qnd2UDZ1cmxQbG05?=
 =?utf-8?B?WmZKbW1VSFRkQnE3UHM2TjIyWisxZHRQWi9yMWlZTytXSFFSUkcrZTZuKzY2?=
 =?utf-8?B?TnIrOUQ5YXROVTFnd1JSS2RnbmY0djI5TVZzWWZrWUZiNkh2cDNlblFTOC80?=
 =?utf-8?B?VE0yS2tOUklFc3NGc0VKOW81akxrWTlqQ1dCZThhM2NXM1ZYUEFXRVpJV3Ro?=
 =?utf-8?B?UjBRYmgwT2hTWUpHYzZLUS8vWG1Yamlrd3NFTExXajJNQnFDbU1wZ2FuNjU0?=
 =?utf-8?B?TzRtZVdpS3A3c3VmWnR4Y2FOaVhsUmkxYmVQQ1VIYTFqemp6UFlJcTFGQ003?=
 =?utf-8?B?RGZFY2k2SlFMemg0WWNQcnA4dHF4K09tQk9XMDJKcUdkT21VR1g1MFR0b1Ax?=
 =?utf-8?B?bVRzTmIyQTlLbTFDZVo4anFtUllMcG9vMlpzNHpTWEZnU3J1R3YxcTZJQXZm?=
 =?utf-8?B?dVZIczRTdGVYbHNRbG85RVBOSlVPK2V4N2NJL0xOZnh6V2diYTRPNmYvK0RG?=
 =?utf-8?B?NC9nR2xyWkxjcVEwV0ZJR0VQWnRydnVIYkFCWHFMUkU3SXlSL2VKMnVUdE96?=
 =?utf-8?B?bE5DUVhuN2ZlRTU2Q0F1aks1V2luSWcwTmRYcGFNVjliQVlJZnBiUG03RTIx?=
 =?utf-8?B?WGtvcDNGdXRIbXVMaXJKNDJ2REZ3bjVxVDFMYVlSRVFHNTI5dzVwMXdDNVRy?=
 =?utf-8?B?cUZCWEhnbFplQVZuUDNOdFRlbDZ0UEFIRHpZdU9vWXVQM0NFR3JYOE8zMkh4?=
 =?utf-8?B?WXVuWEJRajREckg4RFRrMlUyU1lpeDVQRnNjWWtUa3NSVFk4OENLT2hzNXdQ?=
 =?utf-8?B?czBwS1U2Y2MybVo2alFKRlFXOUtFU2pJL3NnYW8rYzhMSE1vc2d6ZWFVTjhW?=
 =?utf-8?B?OUVYeUVBaFpxNU54aWZmbXE2SmdKV25XZGJ0TnVpZjBaMVZrVXRNMUtzeDU5?=
 =?utf-8?B?cjBaTGtFZTVLcWFmamNtSnBsWWxvVzRHWS81ZnZBTGdwc2JWTm03Z3dCRXF5?=
 =?utf-8?B?UGpMTWowcGRqOHVHL2t6eFNvRVNyTDRsN3lqelJySzluVkZhTFlOZ1drMGJH?=
 =?utf-8?Q?TgM5ieUc46ysteCvq0GGAzB72zh2sxSN?=
Content-Type: multipart/alternative;
	boundary="_000_abc6f071694f9b4c17647b74d9d55185citrixcom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 13bfa964-00c4-45b4-a2a1-08da0b3b0ee1
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Mar 2022 13:02:30.5115
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: rxZxTIGr9Hit1hSTt90NSWiTzYxL2o1BwXZnqXRpYwQdzgJWbK3P+Pr8HH35jXfVcPMm8WU/uEhM7zG9S6JEyh+3CQZToMKUvLYZ/M9mTGM=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR03MB4832
X-OriginatorOrg: citrix.com

--_000_abc6f071694f9b4c17647b74d9d55185citrixcom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_abc6f071694f9b4c17647b74d9d55185citrixcom_
Content-Type: text/html; charset="utf-8"
Content-ID: <711C71D38C018144B458A3B4945585F8@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
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--_000_abc6f071694f9b4c17647b74d9d55185citrixcom_--


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 13:12:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 13:12:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292989.497617 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWHq7-0001Sl-8p; Mon, 21 Mar 2022 13:12:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292989.497617; Mon, 21 Mar 2022 13:12:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWHq7-0001Se-5u; Mon, 21 Mar 2022 13:12:51 +0000
Received: by outflank-mailman (input) for mailman id 292989;
 Mon, 21 Mar 2022 13:12:49 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nWHq5-0001SY-Qn
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 13:12:49 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWHq4-0007Hf-Ox; Mon, 21 Mar 2022 13:12:48 +0000
Received: from [54.239.6.185] (helo=[192.168.25.135])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWHq4-00022R-J3; Mon, 21 Mar 2022 13:12:48 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=G52NjuOokmzxQanTNHKDpwNGo/eqNJPL/jz/AqVX/N4=; b=xUpIY03iss7DqFrx5i2iYpMJcW
	ngPy2InQfR3Q5k4ow+LvCRQmGg21O6+Pejdw1dvf1EPA5ijI/7RihBdlkIUOkC88hPcEbjIl3KL6L
	BE54uA7pwO3xromNKiD6GUCfgASbLlOSTuDx6rHdmlkCIy+8X57rh1GHaj3p8y2JwdUo=;
Message-ID: <86794137-4409-cd1d-b1c9-a01b37b0c02f@xen.org>
Date: Mon, 21 Mar 2022 13:12:46 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH] x86/build: work around older GNU ld not leaving .got.plt
 empty
To: Jan Beulich <jbeulich@suse.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
References: <057172d5-437a-347b-b5bb-d102b6b37f0a@suse.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <057172d5-437a-347b-b5bb-d102b6b37f0a@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Jan,

On 21/03/2022 11:46, Jan Beulich wrote:
> The initial three entries in .got.plt are "static", i.e. present
> independent of actual entries allocation of which is triggered by
> respective relocations. When no real entries are needed, halfway recent
> ld discards the "static" portion of the table as well, but older GNU ld
> fails to do so.
> 
> Fixes: dedb0aa42c6d ("x86/build: use --orphan-handling linker option if available")
> Reported-by: Julien Grall <jgrall@amazon.com>
> Signed-off-by: Jan Beulich <jbeulich@suse.com>

Thanks for the patch. I applied the patch and can confirm the build 
issue is gone.

Tested-by: Julien Grall <jgrall@amazon.com>

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 13:17:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 13:17:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292992.497628 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWHuJ-000260-Pv; Mon, 21 Mar 2022 13:17:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292992.497628; Mon, 21 Mar 2022 13:17:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWHuJ-00025t-Ml; Mon, 21 Mar 2022 13:17:11 +0000
Received: by outflank-mailman (input) for mailman id 292992;
 Mon, 21 Mar 2022 13:17:09 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWHuH-00025i-MB; Mon, 21 Mar 2022 13:17:09 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWHuH-0007Mh-LJ; Mon, 21 Mar 2022 13:17:09 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWHuH-0000wq-CJ; Mon, 21 Mar 2022 13:17:09 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWHuH-0001cq-Bu; Mon, 21 Mar 2022 13:17:09 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Oe8y9GgY2+e+KD8USujfYvjf4gqQSyRnAotqLSYI9vQ=; b=R+Ytm5NZQiKrkBqweGkfI2u8xM
	S2In8vQjoteV2G8PrADrQil7t2TPnosDNL18xuOrTBPoTItlEypTq7sz7+2+33S7oksHN9DLdqY2N
	TihCw7ZMjXQX6RdUiR7Wi+Okrjz7c1hKTry8HRchyP5PF6Efs9uN/oS5+MPk4wf+oKFc=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168751-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168751: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 21 Mar 2022 13:17:09 +0000

flight 168751 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168751/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   21 days
Failing since        168258  2022-03-01 01:55:31 Z   20 days  210 attempts
Testing same since   168738  2022-03-21 02:39:18 Z    0 days    9 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 859 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 13:50:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 13:50:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.292999.497640 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWIPt-0005Ry-BB; Mon, 21 Mar 2022 13:49:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 292999.497640; Mon, 21 Mar 2022 13:49:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWIPt-0005Rq-80; Mon, 21 Mar 2022 13:49:49 +0000
Received: by outflank-mailman (input) for mailman id 292999;
 Mon, 21 Mar 2022 13:49:47 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=dpaY=UA=citrix.com=prvs=07205606a=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nWIPr-0005Rj-EB
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 13:49:47 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c2f13f83-a91d-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 14:49:44 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c2f13f83-a91d-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647870584;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=7QK8byW02Wtfu9bdkdjis1zeyUXdiJhL2fR6gBRWUoQ=;
  b=Sj2wRimr0igImfye0bveqzXvUC1VRSO7prJCxVFg6bYm1S9lAScY8aHy
   i1rnVhrMLuWl7kSuog5c0edIXQwilq9YLZHC7sh2c54YOLT+Xp9DGoEFP
   ensvttOj1weR1QmsSIAjO4+iQ6CiZ4MewgSZtFZ3kXDVrOl3WGgUVDB9G
   8=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66683744
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:qOKiGq8p4CZ+XAFse+SbDrUDq36TJUtcMsCJ2f8bNWPcYEJGY0x3n
 WMbUD2BPfqJZTb2fo1ybYyzp0JTvJbSnN9qGgJkpCw8E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oLgW1rlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnZb3QCokb6GTpKMyDxl8SgNvGrZUv6CSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFJkYtXx6iynQEN4tQIzZQrWM7thdtNs1rp4QQ6aFO
 JZFAdZpRBvLYTMfY3UXM58vw7n5hCLyUWN39mvA8MLb5ECMlVcsgdABKuH9YceWTM9YmkKZo
 GPu/GnjBBwectuFxlKt7XaEluLJ2yThV+o6FqC89/NsqE2ewCoUEhJ+fUu2p7y1h1CzX/pbK
 lcI4Ww+oK4q7kupQ9LhGRqirxasvBQRRt5RGO0S8xyWx+zf5APxO4QfZmcfMpp87pZwHGF0k
 A/S9z/0OdBxmLfSQF+Qp7vLkXSdZSgxdE0TQjQWChRQtrEPv7oPph7IS99iFou8gdv0BSz8z
 li2kcQuu1kApZVVjvvmpDgrlxrp/8GUFVBtum07S0r/tmtEiJiZi5tEALQxxdJJN86nQ1aIp
 xDocODOvblVXflheMFgKdjh/Y1FBd7Ya1UwYnY1RvHNEghBHFb5IehtDMlWfhsBDyr9UWaBj
 LXvkQ1Q/oRPG3ChcLV6ZYm8Y+xzk/S/RY29D6mEN4EfCnSUSONg1HszDXN8Iki3yBR8+U3BE
 cnznTmQ4YYyVv08kWveqxY12r433CEurV4/trigpylLJYG2PSbPIZ9caQPmRrlgsMus/VWEm
 /4CZpDi40gOD4XDjtz/rNd7waYidiNgW/gbaqV/K4a+H+aRMDp4WqGLnu95JdANcmY8vr6gw
 0xRk3RwkTLXrXbGNR+LejZkbrbuVox4tnU1IWonOlPA5pTpSdzHAHs3H3fvQYQayQ==
IronPort-HdrOrdr: A9a23:uNKxz6Eb9je8vb4tpLqEEseALOsnbusQ8zAXPiBKJCC9vPb5qy
 nOpoV+6faQslwssR4b9uxoVJPvfZq+z+8R3WByB8bAYOCOggLBQL2KhbGI/9SKIVydygcy78
 Zdm6gVMqyMMbB55/yKnDVRxbwbsaa6GKPDv5ah8590JzsaDJ2Jd21Ce32m+ksdfnghObMJUK
 Cyy+BgvDSadXEefq2AdwM4t7iqnayzqHr+CyR2fyIa1A==
X-IronPort-AV: E=Sophos;i="5.90,198,1643691600"; 
   d="scan'208";a="66683744"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=LMpT6+Z+0gGcuXaaX+8+F6qD7Ci8K89+LMhFuADWNsNwZqd3Kf1v2vPi8EgvZtrm6C2FiUvmecl0CVeaij9NznxwO5AaBDeTL4CcxPAl/Pt8jlSnZJu3TJlY7Wkw+G0Ncr9Br0kHw5CPUsjdm8/AlAujRNyfWW7FLjqOQwrHwyyfxLFayLZImdZ9Fuo/3jW94yAZWeWqhSRrH1aummnUliPnPWCC/6iPYcsDG4IPxIT8N4HQOFO4H6hc74lAPKkWm4aZ4lCFX7RjGloQt89CB4oLgbpEHfSJGQnCGIvmWJqolMiABF0xsIzMhjnwY2S0/qmFh3DnOaJFT9jJPW7tfA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=lr2mzsHIC2QfZ1LDBPA4YxmJvMuHMcmE/zp3ADhDDY0=;
 b=dIrG4JvGpFa8hjRt7NKB/PAlb68BRNYDCnHdMcBc4gzAI40xsBHOWVlBceu/Pevbry0C8wPWuVZUtWueYuh6tm6/5nCOrC9vOoEkJG7QDQhabJy5TLEBL5WABxhIlw04cr10nxTVzJmOXAxwh+4RHFGbeme/Mdgvp8ZgF3j6AEPkgrTrg2uLdG1jrsZuOS6skUDLdfyj3Pzh4ilULlVItLxr1M+0klcmyCX6c5ifvA5HGGKJIZICmszBQhpCG1tV2WiIAtdAvVzh8fE/d9rRiKZlH6mecdQ+BdYDhYttimgx8UlonY3ED9hWB+f1VPZuiOdbsAD2JfmV6ZGLyUWHmw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=lr2mzsHIC2QfZ1LDBPA4YxmJvMuHMcmE/zp3ADhDDY0=;
 b=PMMlg0YRb2YhrnxeFBVAjekWiFGDBYuHGNABiWV4oEDGiex06OLRmN/n71PVKHDWO3bKAGT4fzTkYkbqy3AtAI3k2OzqqKHZtgl7CVhb7bzh9MQXLw15tey62BlLwWq2BVt3jOT3TmpQalu6KMMmNdl76pFWbKHs9pZ7EHBZKEw=
Date: Mon, 21 Mar 2022 14:49:32 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "George
 Dunlap" <George.Dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, "Julien
 Grall" <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, Wei Liu
	<wl@xen.org>
Subject: Re: [PATCH v2] codeql: add support for analyzing C, Python and Go
Message-ID: <YjiCbCYmbS8kBtTA@Air-de-Roger>
References: <20220307164552.74818-1-roger.pau@citrix.com>
 <YjhLY1Wb4HF39gIC@Air-de-Roger>
 <abc6f071-694f-9b4c-1764-7b74d9d55185@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <abc6f071-694f-9b4c-1764-7b74d9d55185@citrix.com>
X-ClientProxiedBy: LO4P265CA0039.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:2ac::18) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 8ae9edc4-6575-4b56-3194-08da0b41a429
X-MS-TrafficTypeDiagnostic: MWHPR03MB2704:EE_
X-Microsoft-Antispam-PRVS: <MWHPR03MB2704D53B492AC0366843BB7B8F169@MWHPR03MB2704.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(8676002)(5660300002)(86362001)(6636002)(316002)(54906003)(83380400001)(85182001)(33716001)(6666004)(6506007)(53546011)(4326008)(66476007)(6862004)(66946007)(82960400001)(66556008)(6486002)(26005)(186003)(8936002)(508600001)(38100700002)(6512007)(2906002)(9686003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?eUZ0YUlnL3g4TWhTWHRBTDlkZDd6eGlqRVVFR0laTjBpR2F1WWU5VFFOZitT?=
 =?utf-8?B?aC9rRmgxd2JiQUFWWFoxY3orUUkvL3BZdXRKSFh0V05LTmJONVlvWktVM3B1?=
 =?utf-8?B?VzlScXkrU1JNYjBsMDZFb1cvQUZ4dWVBTjNqcmlRR2NjSzJFT081ZUZuTzFL?=
 =?utf-8?B?aFhxL1FEbmtvSTNVYUI5S0xyNkJUMk5TU0xuZFhFZ0VJZGp3eGdqYVRWTG83?=
 =?utf-8?B?Wkpzb2RJRk91cUFvR0Y4YUxuWE1wZWxIVi9jQU0yd2hCclhVRXI5M0RWNXN3?=
 =?utf-8?B?MGpKYWprbXpzOXRFTk5QMVVBRktRMHNYU1B6U0Zxc08rbXlvc1M2dmtFRkQx?=
 =?utf-8?B?djluOWQ5ODBHTjQvL0hXSWdGemhkM3RUWDBML1I5RjA4WHRrQS9EeFFkWVVO?=
 =?utf-8?B?SjU1eVZpSjlWS0FqWWNzdEdQSEVlU1FmSWNYdkwrQkRFdjdzazNDc1hmOHZt?=
 =?utf-8?B?ZzNXUGJFSVZ6ZTFRSlFpQzBRbFZYTmN0blY0K1pXeERHM1J5UXNhZG5YZDdJ?=
 =?utf-8?B?Y2YxSmtLSGgxTk9iVEZ0TXJVSkc2RUUzSkxhaDE2VlZ2c3lyd3FJU3JmczBZ?=
 =?utf-8?B?VGxkUHpsc1ZTK1o4aWQyYnNhSmVkQ1JCN0dzbGk5TjlLT0R6RkZqZTBPTEI5?=
 =?utf-8?B?S2ZheS9LM3NqZ1RER1VPTm5RY3lpOGZreDZuckgvcHFjelRCSVdWc1ViTHZa?=
 =?utf-8?B?NmFMNm5FaEhYRHhra3MzZzJNRjU2MVloTXlFK3pMRW13ODVyOUNFQTdwbWNE?=
 =?utf-8?B?Y2ltOGhkRkgySmwwUVg2aVd1dGpWTjNMOE9BR3dYeVNZbGZWcDNkRFY1eEs2?=
 =?utf-8?B?cWFRSmkrQktHY2Fqa0pVZVlzaFJIODNhdktBdWRCWWh4Nk5RNytxTnhUamRO?=
 =?utf-8?B?RHE5dEFIT3hwa1VqRmtVbGFieFNFTzdHVUo1QTBKZGdQY1JOYkhQeE51VDNG?=
 =?utf-8?B?M1E2elRLYzFYb2lzM0hrQWVBVEZjYStENXZJSktadTRRekk4MVR3RTUxRkJk?=
 =?utf-8?B?b0RERCtudGtZR1JoWVNNU1FXM294MmtKemVueGxUbmQ4Nk11OGF3bXhIMDc5?=
 =?utf-8?B?WU12SnNXMG9iRENLS0ZUSkVvTkNHcVFtdkcwMG9vTGVYUEk4T2J5cTIrZWNt?=
 =?utf-8?B?akh1cjZOVHR2OVltV2ZucUwzNThRbm9PbUJhUjF6dXpybkJsUFVUcU10ai9K?=
 =?utf-8?B?RFY3cGI5eXNvdUV1RW1yWWxPRWJyUkZ3UTNuWVdrUXRNWGhyNXoxU3hRUTAz?=
 =?utf-8?B?dHJtVWRpSXoya1dMejdIVTZYcUtScnRCUCs0OEhKakFiWmVzbUN2eStMdHo0?=
 =?utf-8?B?UnhSYWE5c1RtbHhpeEFOcnJ6OGdJcXBHWnFrVzVuNXphcXlETHNIWnk4TXE0?=
 =?utf-8?B?S1F5Tm51RXBadU1hMldDY1Y2b0hCL2NDV2dleWRBMUZLUlNKVVUzVVJPdE1O?=
 =?utf-8?B?YWVTQWZkMythMmMvMVErYlZDTk5YWXRrMnNqL3FBU0xaS3YxSWFSd0U2djU1?=
 =?utf-8?B?SDJSakQrTW95SmxoeHFjaUE1blNtOHo1TUVZV3h6UjVvaGtJcDRNQ2VxN1Qz?=
 =?utf-8?B?bnRxOXB1d3dOWlZMRi9kMnlLWmE3RWNCMS81YkhvbEFTRlNQdG5JMlUwcEVa?=
 =?utf-8?B?U3JYc2RJYS9uR0JqWTR0TXA2ZTJ3T3Zkd2lkY0ZQMExTVjZQNVNZTlFkLy92?=
 =?utf-8?B?VnJhUkN2M2tEVnpHajdhWm5hL2gydEgrS0dvWnppVk1IbjZwZUhQd0VoekJm?=
 =?utf-8?B?bnQrRkhmSit3ZG96SWwycURBNHduRmNJSXFtbG1UWld2K3JwODJDTktCZE9H?=
 =?utf-8?B?eVBlenNLTHR0eDhpU1plc1lMVXFkcTl3SitQOEJ1Zm4vZWRMQXdGY0NsQ1o1?=
 =?utf-8?B?Sk1Ld1FTSGJwdmpJOVVSUTZoZlVZMVI1K01MNUY3U1N2L0VNL3R6Zi9lZGNj?=
 =?utf-8?Q?N+YOPQPDwEDizb5vL5HccXwkDbyqaU33?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 8ae9edc4-6575-4b56-3194-08da0b41a429
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 13:49:38.3633
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: MRQ6ybMu97zTa91EZ6E8mV6eBBeEClKiPZF1HuyzvaNYI1VYlcCATNrrBjNxbqV9X4q1XZc7XGbalNTRUJ6Kww==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR03MB2704
X-OriginatorOrg: citrix.com

On Mon, Mar 21, 2022 at 01:02:30PM +0000, Andrew Cooper wrote:
> On 21/03/2022 09:54, Roger Pau Monné wrote:
> 
> Ping?
> 
> On Mon, Mar 07, 2022 at 05:45:52PM +0100, Roger Pau Monne wrote:
> 
> 
> Introduce CodeQL support for Xen and analyze the C, Python and Go
> files.
> 
> Note than when analyzing Python or Go we avoid building the hypervisor
> and only build the tools.
> 
> Requested-by: Andrew Cooper <andrew.cooper3@citrix.com><mailto:andrew.cooper3@citrix.com>
> Signed-off-by: Roger Pau Monné <roger.pau@citrix.com><mailto:roger.pau@citrix.com>
> ---
> Changes since v1:
>  - Rename to note it's x86 specific right now.
>  - Merge the ignored path patch.
> ---
> It's my understanding that we need to force the checkout action to
> fetch 'staging' branch, or else for the scheduled runs we would end up
> picking the current default branch (master).
> 
> Forcing to staging necessary due to a limitation in Coverity.
> 
> CodeQL explicitly can cope with multiple branches, so when a user asks for a specific branch, they'd better get a run on the branch they asked for, not have it forced to staging.
> 
> It also breaks any fork which has a different default branch.
> 
> 
> 
> 
> Maybe we want to remove the scheduled action and just rely on pushes
> and manually triggered workflows?
> ---
>  .github/codeql/codeql-config.yml |  3 ++
>  .github/workflows/codeql-x86.yml | 60 ++++++++++++++++++++++++++++++++
>  2 files changed, 63 insertions(+)
>  create mode 100644 .github/codeql/codeql-config.yml
>  create mode 100644 .github/workflows/codeql-x86.yml
> 
> diff --git a/.github/codeql/codeql-config.yml b/.github/codeql/codeql-config.yml
> new file mode 100644
> index 0000000000..721640c2a5
> --- /dev/null
> +++ b/.github/codeql/codeql-config.yml
> @@ -0,0 +1,3 @@
> +paths-ignore:
> +  - xen/tools/kconfig
> +  - tools/firmware/xen-dir/xen-root/xen/tools/kconfig
> 
> From actually running this:
> 
> Annotations
> 2 warnings
> analyse (go)
> The "paths"/"paths-ignore" fields of the config only have effect for JavaScript, Python, and Ruby
> analyse (cpp)
> The "paths"/"paths-ignore" fields of the config only have effect for JavaScript, Python, and Ruby
> 
> So this obviously can't be used like this.  You'll have to add them to the prebuild step.

Right, paths-ignore can only be used for interpreted languages, so
not really useful in order to ignore the content in Kconfig.

Pre-building the Kconfig in tools/firmware/ will be complicated. I
will leave ignoring those paths to a further patch, we can always
filter from the queries.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 13:58:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 13:58:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293002.497650 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWIYa-0006wK-4w; Mon, 21 Mar 2022 13:58:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293002.497650; Mon, 21 Mar 2022 13:58:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWIYa-0006wD-23; Mon, 21 Mar 2022 13:58:48 +0000
Received: by outflank-mailman (input) for mailman id 293002;
 Mon, 21 Mar 2022 13:58:46 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Ob4L=UA=citrix.com=prvs=0720edaad=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nWIYY-0006w7-TQ
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 13:58:46 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 050df988-a91f-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 14:58:45 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 050df988-a91f-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647871125;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=jmkQNDWcosXOqSXQLn083PGEuc8UXeujebveMtZy6dg=;
  b=I95l9ZlXqsQkpSShgFuehjhU5iIn9VPCPisgF3DZ6XhTJIPjEHRsjYPM
   f/pGw8N1aGUpXZy31eW1+odqFd8sry4x/Ud3X0XNQUiwL16y1PvLSqCQz
   eUZOK4LD1gLHee8tMTPUo1xYRKO5Lyp/svRJghn+0bOpBccLetX41ySDw
   8=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 66764538
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:hfdPwa9od0PSx5qFfKAsDrUDmX6TJUtcMsCJ2f8bNWPcYEJGY0x3y
 mccXG+Gaf+IajbxLd5yOo7ipkIHscTdnYNmTwFo+SA8E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oLgW1rlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnaXgTxs5FYzKosAySTtYTnBvGolGv7CSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFKoZtmtt0nfyCvE+TIqYa67L+cVZzHE7gcUm8fP2O
 ZRGN2YyN0SojxtnZ2ouUbcVlr2Si0buSx99lGzWhKgn2j2GpOB2+Oe0a4eEEjCQfu1Kmm6Iq
 2SA+H72ajkYKdiexDyt4n+qwOjVkkvTQ5kOHbe18vprhly7xWEJDhASE1yhrpGRmkO4Ht5SN
 UEQ0i4vtrQpslymSMHnWB+1q2LCuQQTM/JyOeAn7ACGyoLP/h2UQGMDS1Z8hMcO7ZFsA2Zwj
 xnQwo2vVWcHXKCppWy1z+eSsSOZGC4vCUAYRy9ZHBoix9mkr9Rm5v7QdepLHKmwh9zzPDj/x
 TGWsSQz74kuYd43O7aTpg6e3W/1znTdZktsv1iMADr5hu9sTNT9D7FE/2Q3+hqpwGyxalCa9
 EYJlMGFhAzlJcHczXfdKAnh8VzA2hpkDNE+qQM0d3XC3270k5JGQWy3yGsiTHqFyu5eJVfUj
 Lb74Gu9HqN7MnqwdrNQaImsEcksxqWIPY27Cq+EN4IXO8goL17vEMRSiam4hT2FraTRuftnZ
 cfznTiEUx729piLPBLpHrxAgNfHNwg1xH/JRICT8vhU+eH2WZJhcp9caAHmRrlgtMus+VyJm
 /4CZ5ri40gOC4XWP3iImbP/2HhXdBDX87it8JcJHgNCSyI7cFwc5wj5mupwJdY6w/wLyo8lP
 BiVAydl9bY2vlWfQS3iV5ypQOqHsUpXxZ7jARERAA==
IronPort-HdrOrdr: A9a23:p9mreq1KB2aHdfhS+GM1awqjBL4kLtp133Aq2lEZdPRUGvb3qy
 nIpoV96faUskd0ZJhOo7C90cW7LU80lqQFhLX5X43SPzUO0VHAROoJgLcKqweQfREWndQ96U
 4PScdD4aXLfDpHsfo=
X-IronPort-AV: E=Sophos;i="5.90,198,1643691600"; 
   d="scan'208";a="66764538"
From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>, George Dunlap
	<George.Dunlap@eu.citrix.com>, Jan Beulich <JBeulich@suse.com>, "Stefano
 Stabellini" <sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Julien Grall
	<julien@xen.org>
Subject: [PATCH] CI: Don't run Coverity on forks
Date: Mon, 21 Mar 2022 13:58:28 +0000
Message-ID: <20220321135828.3158-1-andrew.cooper3@citrix.com>
X-Mailer: git-send-email 2.11.0
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

By default, workflows run in all forks, but the Coverity token is specific to
us, causing all other runs to fail.

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
---
CC: Roger Pau Monné <roger.pau@citrix.com>
CC: George Dunlap <George.Dunlap@eu.citrix.com>
CC: Jan Beulich <JBeulich@suse.com>
CC: Stefano Stabellini <sstabellini@kernel.org>
CC: Wei Liu <wl@xen.org>
CC: Julien Grall <julien@xen.org>
---
 .github/workflows/coverity.yml | 1 +
 1 file changed, 1 insertion(+)

diff --git a/.github/workflows/coverity.yml b/.github/workflows/coverity.yml
index 427fb86f947f..f613f9ed3652 100644
--- a/.github/workflows/coverity.yml
+++ b/.github/workflows/coverity.yml
@@ -8,6 +8,7 @@ on:
 
 jobs:
   coverity:
+    if: github.repository_owner == 'xen-project'
     runs-on: ubuntu-latest
     steps:
     - name: Install build dependencies
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 14:01:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 14:01:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293005.497662 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWIam-0008NG-HV; Mon, 21 Mar 2022 14:01:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293005.497662; Mon, 21 Mar 2022 14:01:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWIam-0008N9-EQ; Mon, 21 Mar 2022 14:01:04 +0000
Received: by outflank-mailman (input) for mailman id 293005;
 Mon, 21 Mar 2022 14:01:03 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWIal-0008Mz-Nv; Mon, 21 Mar 2022 14:01:03 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWIal-0008Ax-M9; Mon, 21 Mar 2022 14:01:03 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWIal-0001tT-AL; Mon, 21 Mar 2022 14:01:03 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWIal-0004cV-9v; Mon, 21 Mar 2022 14:01:03 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=VD+NVhTxPgAvEF0Kgw/OD2ra+rKKJtJpGlz08pwpM4E=; b=2xth6yJuXeJmfzrLFujIOWVTq7
	uNG9eEhJydTXIldzFBfiWEbU+WgDoSuCrK5zluk1BTg2aNZwR6EI50VHRCFgXjPm772YSDp75NZrB
	MKyEWAl4Mco4iJhq8/uPoCmv/vRzEBNr6yoWWL6lCXWU4tozcUa3cNE6YdqiF62+J1EU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168752-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168752: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 21 Mar 2022 14:01:03 +0000

flight 168752 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168752/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   21 days
Failing since        168258  2022-03-01 01:55:31 Z   20 days  211 attempts
Testing same since   168738  2022-03-21 02:39:18 Z    0 days   10 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 859 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 14:12:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 14:12:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293014.497673 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWIlp-0001WG-QG; Mon, 21 Mar 2022 14:12:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293014.497673; Mon, 21 Mar 2022 14:12:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWIlp-0001W8-LY; Mon, 21 Mar 2022 14:12:29 +0000
Received: by outflank-mailman (input) for mailman id 293014;
 Mon, 21 Mar 2022 14:12:27 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Ob4L=UA=citrix.com=prvs=0720edaad=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nWIln-0001Vx-SI
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 14:12:27 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ede5e6a4-a920-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 15:12:26 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ede5e6a4-a920-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647871946;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=mafovDzuI/9KH39XYeumNUYSslRqvNPaZnhQOUghNbY=;
  b=VpF7fLPUpb48r9Z/OtWluI5oaZH+l6/Seu46RNBhlfR8zPA50c0x317M
   Ls4ojv9YFs+rM3J5Gld01rdkSXVE59nE+GJx1f0mTnL1X1rMzSuc3AlD3
   voKMnhBYqIgE8yfhcA5e5/erT0jhrtJVYjoNY4te5N1oK3N99K1Y3Ww5U
   s=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 66686804
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:TaZeO6DkemiE/hVW/1njw5YqxClBgxIJ4kV8jS/XYbTApD8lhjVWy
 zNMUDyObK2CNGb9c9p/YIW1oRwAvZTVxoU3QQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vj29Yx6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPgtk
 vlQro2wWTwpEbfNuNknVxxfKhBxaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguwKKsXxMZxZkXZn1TzDVt4tQIzZQrWM7thdtNs1rp4QQ6aAN
 5JFAdZpRAXwY0B+EVQZM6N9hur0hnb/UTJGpGvA8MLb5ECMlVcsgdABKuH9ZdiiVchT2EGCq
 Qru3U70HxUbP9y30iee/zSngeqntTP2XsceGaO18tZugUaP3SoDBRsOT1y5rPKlzEmkVLpix
 1c8o3R06/JorQryE4e7D0bQTGO4UgA0B4B8DvYr6BG2yoXO4iakPGwBSQdwZ4lz3CMpfgAC2
 liMltLvIDVgtryJVH6QnoupQSOO1Ts9djFbO3JdJecRy5y6+dxo0EqTJjp2OPTt5uAZDw0c1
 NxjQMIWo7wIxfAG2Kyglbwsq2L9/8OZJuLZC+i+Y45E0u+bTNP+D2BLwQKChRqlEGp+ZgPd1
 EXoY+DEsIgz4WilzURhutklErCz/OqiOzbBm1NpFJRJ323zpyHzJNgJuWEnfxYB3iM4ldjBO
 hK7hO+szMULYCvCgVFfPepd9PjGPYC/TI+4B5g4n/JFY4RrdR/vwc2dTRX44owZq2B1yftXE
 c7CKa6EVC9GYYw6nGveb7pMitcDm3FhrV4/sLimlnxLJ5LFPyXLIVrEWXPTBt0EAFSs+1yEr
 YwAa5PUl32ykoTWO0HqzGLaFnhSRVBTOHw8g5UGHgJfCmKKwF0cNsI=
IronPort-HdrOrdr: A9a23:HsqDy6w6cSU5PzsZK5byKrPwIL1zdoMgy1knxilNoRw8SKKlfq
 eV7ZMmPH7P+VIssR4b+exoVJPtfZq+z+8R3WByB8bAYOCOggLBR+sO0WKL+UyHJ8SUzI9gPM
 lbHJSWcOeAb2RHsQ==
X-IronPort-AV: E=Sophos;i="5.90,198,1643691600"; 
   d="scan'208";a="66686804"
From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Jan Beulich
	<JBeulich@suse.com>, =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?=
	<roger.pau@citrix.com>, Wei Liu <wl@xen.org>
Subject: [PATCH] x86/apic: Fix function typechecking in TSC Deadline errata check
Date: Mon, 21 Mar 2022 14:12:07 +0000
Message-ID: <20220321141207.18422-1-andrew.cooper3@citrix.com>
X-Mailer: git-send-email 2.11.0
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit

Sadly, cf_check typechecking doesn't work through casts.  Introduce an ad-hoc
typecheck and fix *_readline_rev() checks to be cf_check.

This is a latent bug.  The affected models don't have CET-IBT, so won't
actually explode from lacking endbr64 instructions.

Reported-by: Jan Beulich <JBeulich@suse.com>
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
---
CC: Jan Beulich <JBeulich@suse.com>
CC: Roger Pau Monné <roger.pau@citrix.com>
CC: Wei Liu <wl@xen.org>
---
 xen/arch/x86/apic.c | 17 +++++++++++------
 1 file changed, 11 insertions(+), 6 deletions(-)

diff --git a/xen/arch/x86/apic.c b/xen/arch/x86/apic.c
index 96d73a744964..794bbc21ae2c 100644
--- a/xen/arch/x86/apic.c
+++ b/xen/arch/x86/apic.c
@@ -1092,12 +1092,17 @@ static void setup_APIC_timer(void)
     local_irq_restore(flags);
 }
 
+#define DEADLINE_MODEL_FUNCT(m, fn) \
+    { .vendor = X86_VENDOR_INTEL, .family = 6, .model = (m), \
+      .feature = X86_FEATURE_TSC_DEADLINE, \
+      .driver_data = fn + (0 * sizeof(fn == ((unsigned int (*)(void))NULL))) }
+
 #define DEADLINE_MODEL_MATCH(m, fr) \
     { .vendor = X86_VENDOR_INTEL, .family = 6, .model = (m), \
       .feature = X86_FEATURE_TSC_DEADLINE, \
       .driver_data = (void *)(unsigned long)(fr) }
 
-static unsigned int __init hsx_deadline_rev(void)
+static unsigned int __init cf_check hsx_deadline_rev(void)
 {
     switch ( boot_cpu_data.x86_mask )
     {
@@ -1108,7 +1113,7 @@ static unsigned int __init hsx_deadline_rev(void)
     return ~0U;
 }
 
-static unsigned int __init bdx_deadline_rev(void)
+static unsigned int __init cf_check bdx_deadline_rev(void)
 {
     switch ( boot_cpu_data.x86_mask )
     {
@@ -1121,7 +1126,7 @@ static unsigned int __init bdx_deadline_rev(void)
     return ~0U;
 }
 
-static unsigned int __init skx_deadline_rev(void)
+static unsigned int __init cf_check skx_deadline_rev(void)
 {
     switch ( boot_cpu_data.x86_mask )
     {
@@ -1135,17 +1140,17 @@ static unsigned int __init skx_deadline_rev(void)
 
 static const struct x86_cpu_id __initconstrel deadline_match[] = {
     DEADLINE_MODEL_MATCH(0x3c, 0x22),             /* Haswell */
-    DEADLINE_MODEL_MATCH(0x3f, hsx_deadline_rev), /* Haswell EP/EX */
+    DEADLINE_MODEL_FUNCT(0x3f, hsx_deadline_rev), /* Haswell EP/EX */
     DEADLINE_MODEL_MATCH(0x45, 0x20),             /* Haswell D */
     DEADLINE_MODEL_MATCH(0x46, 0x17),             /* Haswell H */
 
     DEADLINE_MODEL_MATCH(0x3d, 0x25),             /* Broadwell */
     DEADLINE_MODEL_MATCH(0x47, 0x17),             /* Broadwell H */
     DEADLINE_MODEL_MATCH(0x4f, 0x0b000020),       /* Broadwell EP/EX */
-    DEADLINE_MODEL_MATCH(0x56, bdx_deadline_rev), /* Broadwell D */
+    DEADLINE_MODEL_FUNCT(0x56, bdx_deadline_rev), /* Broadwell D */
 
     DEADLINE_MODEL_MATCH(0x4e, 0xb2),             /* Skylake M */
-    DEADLINE_MODEL_MATCH(0x55, skx_deadline_rev), /* Skylake X */
+    DEADLINE_MODEL_FUNCT(0x55, skx_deadline_rev), /* Skylake X */
     DEADLINE_MODEL_MATCH(0x5e, 0xb2),             /* Skylake D */
 
     DEADLINE_MODEL_MATCH(0x8e, 0x52),             /* Kabylake M */
-- 
2.11.0



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 14:15:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 14:15:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293017.497684 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWIof-00026z-6i; Mon, 21 Mar 2022 14:15:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293017.497684; Mon, 21 Mar 2022 14:15:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWIof-00026s-3p; Mon, 21 Mar 2022 14:15:25 +0000
Received: by outflank-mailman (input) for mailman id 293017;
 Mon, 21 Mar 2022 14:15:24 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=uTAE=UA=srcf.net=amc96@srs-se1.protection.inumbo.net>)
 id 1nWIod-00026m-VK
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 14:15:23 +0000
Received: from ppsw-40.csi.cam.ac.uk (ppsw-40.csi.cam.ac.uk [131.111.8.140])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 57bc8667-a921-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 15:15:22 +0100 (CET)
Received: from hades.srcf.societies.cam.ac.uk ([131.111.179.67]:44008)
 by ppsw-40.csi.cam.ac.uk (ppsw.cam.ac.uk [131.111.8.138]:25)
 with esmtps (TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
 id 1nWIoa-0003Sf-m2 (Exim 4.95) (return-path <amc96@srcf.net>);
 Mon, 21 Mar 2022 14:15:20 +0000
Received: from [192.168.1.10] (host-78-149-3-47.as13285.net [78.149.3.47])
 (Authenticated sender: amc96)
 by hades.srcf.societies.cam.ac.uk (Postfix) with ESMTPSA id A2FAC1FAA3;
 Mon, 21 Mar 2022 14:15:20 +0000 (GMT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 57bc8667-a921-11ec-a405-831a346695d4
X-Cam-AntiVirus: no malware found
X-Cam-ScannerInfo: https://help.uis.cam.ac.uk/email-scanner-virus
Message-ID: <9cd9b333-d38e-cb36-38b2-ffac027fc53c@srcf.net>
Date: Mon, 21 Mar 2022 14:15:20 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] xen/x86/hvm: add missing cf_check for hvm_physdev_op()
Content-Language: en-GB
To: Juergen Gross <jgross@suse.com>, xen-devel@lists.xenproject.org
Cc: Jan Beulich <jbeulich@suse.com>, Andrew Cooper
 <andrew.cooper3@citrix.com>, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?=
 <roger.pau@citrix.com>, Wei Liu <wl@xen.org>
References: <20220321075329.3302-1-jgross@suse.com>
From: Andrew Cooper <amc96@srcf.net>
In-Reply-To: <20220321075329.3302-1-jgross@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

On 21/03/2022 07:53, Juergen Gross wrote:
> The hypercall handler hvm_physdev_op() is missing a cf_check attribute.
>
> Fixes: cdbe2b0a1aec ("x86: Enable CET Indirect Branch Tracking")
> Signed-off-by: Juergen Gross <jgross@suse.com>

https://lore.kernel.org/xen-devel/20220309152009.10449-1-andrew.cooper3@citrix.com/

The only reason I haven't committed it is because I was chasing
someone's bug report against compat_vcpu_op()...

~Andrew

> ---
>  xen/arch/x86/hvm/hypercall.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/xen/arch/x86/hvm/hypercall.c b/xen/arch/x86/hvm/hypercall.c
> index 030243810e..62b5349e7d 100644
> --- a/xen/arch/x86/hvm/hypercall.c
> +++ b/xen/arch/x86/hvm/hypercall.c
> @@ -78,7 +78,7 @@ static long cf_check hvm_grant_table_op(
>  }
>  #endif
>  
> -static long hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
> +static long cf_check hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
>  {
>      const struct vcpu *curr = current;
>      const struct domain *currd = curr->domain;



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 14:27:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 14:27:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293027.497699 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWJ01-0003iJ-8J; Mon, 21 Mar 2022 14:27:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293027.497699; Mon, 21 Mar 2022 14:27:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWJ01-0003iC-4n; Mon, 21 Mar 2022 14:27:09 +0000
Received: by outflank-mailman (input) for mailman id 293027;
 Mon, 21 Mar 2022 14:27:07 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=svEr=UA=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nWIzz-0003i6-7Z
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 14:27:07 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id fb88023d-a922-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 15:27:05 +0100 (CET)
Received: from EUR02-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur02lp2057.outbound.protection.outlook.com [104.47.6.57]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-20-qRpLYQ9YNbqpIOEk5MjgLg-1; Mon, 21 Mar 2022 15:27:02 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM6PR04MB4614.eurprd04.prod.outlook.com (2603:10a6:20b:18::23)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.22; Mon, 21 Mar
 2022 14:27:00 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a%6]) with mapi id 15.20.5081.022; Mon, 21 Mar 2022
 14:27:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fb88023d-a922-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647872825;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=0nwF8ZkQijh8KmoexSo2KCHR0pN9MhvySp0PIvPM7TY=;
	b=UBnXNeDVx6EsSSUGx36JQ2lz2JcYvqJ9aOdoeU9EqYNTEgLRRL7TlsMlacYIaz63R22VWB
	MFAaHDavUIRT0hsy4pBlrs5p/ENRBExS4jIyAMCkrnO7WspNbpBLMYp4g6+JOzPgJbmcuA
	fq00tHv5JXFbIMxLNN57kgdjOPIKEcE=
X-MC-Unique: qRpLYQ9YNbqpIOEk5MjgLg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=VD11Gb3hoeNHBANIT2jyprQdIEe9WwSaDZQ8W08ymsHv5fvc/c/IthQvY/UqDxryKYjQwd5uvT2PIJ3Z4Oi6uUfjgQCZMt3MBgtiLTWGw+YGMaJ5y0Ds3qcktss/O+zhpUI1hKem2sV6252IZ2xLMaRPlFcytTkYUjjxP57gjwteeIi+y+Cw8Mt+FlQCZ8tVHoSjwZfwo2ZcrtxdNYGAADGaQko2InwR9Xt6DphBdbQNZRtKDczjm5gkCNlIMjcl9q7d1DMjJXrUg1jI2XJRzezwK/28DWNcekCCdylP5sWBMlKuG8Rm9yf7iLnHfkbcU7ORKKsBsS2QofpT1aIu3Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=0nwF8ZkQijh8KmoexSo2KCHR0pN9MhvySp0PIvPM7TY=;
 b=h5HKZcICpDi2qk3P7cIX7f+bHDxy4SBolnDMY5GCO5JIOw705Bkh20OmvgQ2epqpqODnS6rclBx9feMKP9ua7Ml6sQPuys1PKeCz782vbBOuatdVALhRPEh3aaDimgc627ZpRlxKoe8V3snJwK7WgVhHzvHoM8p9bwtUvY9gUUNekyv2goHh4FR+iS4cLfrMpp7/HDVIHsNnT75addc1GlfCenP5AaqQVDnn3NFibWQa/MnefTtECTcskNBm3yqPSVIwfdnsAHdS7iuvT2CG0dwZgkFHpVgeASqfxUPI2piuqzqOiJOBtSq9fplanEyPlNL2LUhXfh/nOBAlbatFbQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <f3a49994-db28-5976-579f-b94c1c6d9339@suse.com>
Date: Mon, 21 Mar 2022 15:26:58 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] x86/apic: Fix function typechecking in TSC Deadline
 errata check
Content-Language: en-US
To: Andrew Cooper <andrew.cooper3@citrix.com>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Wei Liu <wl@xen.org>, Xen-devel <xen-devel@lists.xenproject.org>
References: <20220321141207.18422-1-andrew.cooper3@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220321141207.18422-1-andrew.cooper3@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6PR10CA0027.EURPRD10.PROD.OUTLOOK.COM
 (2603:10a6:209:89::40) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 3c782b81-f4b4-4ba7-b3a7-08da0b46dc59
X-MS-TrafficTypeDiagnostic: AM6PR04MB4614:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB46146FD5668AA6DEBD0429F6B3169@AM6PR04MB4614.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	o13IaYLx8vwgr6fxktF/xcT4j+AZ3nW/QU87dsQSwhFYscPxtvYe8WfeqyYgIy5T+9S6d3KvltNs49IYcbedVUVr//QvvdKAZTsZO11q+aWsozt7J3/7Z6hmy7bdwdfPoggbzdHyY0RoZc+jHbAxw/pqVyrzZTmQKWbGlISRiNC8URPTZ+h/1SY/kWTGb8KeB+rbYXJ5KPPGaROM4jqyKtw2UYV1hjrNr7f8MMiMN0KRrD4lt5dKh3YBJX1rMGtVT3c7psBxGkiI6mFr8lO2YxAaABfNNN1GplGcd7GCKsHl8EXyzFDAGyJ5X9nPqtTIpeioHfV1vRHzKm3igRGqULdvSInDE2DEu4HmGXYXavIgCAVJ6XetC6XLiXRtV2maGKDYfgU7l+ojON56jLkf621KG4p0Ye0nrZB0w7ZSjk4kU6E7ClkHjwv00VBBJvv0px2QwrJSvUxzFeyg3iyRVsjeR5s5bg/TcKH7/mxIjIGB+omnupG1VAYWR8ct3uZg2Q+u6WTcoBWWIYhKsFQWwnVof4PdxEuQGh5bm9ZiRHnBK3xOvw9CXrrUvlgN00JFZAi2HhJzO/At47hhq4FvgHOiHynl+jlmBpCxMBtfiGWQphIpb3PiPY6yPlzp2H8ZswazO+4AMiMPGyXr77N9Ba6Afor7ituYzOJWS7wAMP2p9UnWZngUuTwjiYyKl6YfyJN607IKKNFtSiTYbnU2Kr8PxMtCn5ybeyrFvn79T3tf8yJ/2NisyXZe8tC/FOBs
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(84040400005)(53546011)(8936002)(186003)(6506007)(2906002)(2616005)(26005)(6512007)(36756003)(83380400001)(54906003)(66476007)(66946007)(6916009)(4326008)(66556008)(31686004)(38100700002)(8676002)(5660300002)(31696002)(6486002)(316002)(508600001)(86362001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?OGFzRGxPMzJyME5pVlBLdW5XRnozSStjYUdjOVZUUDU1cHozUTlVdTBwL2M5?=
 =?utf-8?B?dS9SeHpkOS96NGViNEgxeGszd29FWXhMNFFsS0txNmloWkJlRkRZVmhkblB5?=
 =?utf-8?B?ZFYvSm5UbnRDRTFaeS9ibEdqVGFyaVRpc3NmWXhnQXFITm5iaGxOVmp3TFpU?=
 =?utf-8?B?NGo2eXNHbkJST3ZONW1jWWMzZlFtRjZJOEZCM2d5aG1SRE1McHdnRnpLVnBH?=
 =?utf-8?B?UksrZGgza1lieWtIQnBzakFPbkhEVGZBVXYrWXdFRkdHb253UkNZNjJqTFg1?=
 =?utf-8?B?R0Y4S0FMckJmc0RJWU50U29pYmIwM3BZL05qNEQ5NGRYZHk5VURwWWt5U0lZ?=
 =?utf-8?B?aHcrRHZBT0drek9Ea2JVeVlYWEZqZDNEZisyVGVtaU96OWU1S2J3Q0F4L015?=
 =?utf-8?B?azB4WVJDS25ZK1g3U05WWDZySTNNVmZadWs4WXJtd3RPaDRFRnVzazY1L2Na?=
 =?utf-8?B?ZjZ0aDlvTXgwR3Y0SlBKbUUyUmVQdWRPWEFENFp0ZjdhWW5xcDVDYU1NdmZs?=
 =?utf-8?B?V1J6d3lMc1ljWU5jVWZXeHlwcmVtMEVoZFJzVlV3MVl3RUZvR0RRalpJM0R2?=
 =?utf-8?B?OE9FSEMyemxlbEFpbUdPRUJjdDFXVE1vZExRaE5Ic1RTdkUybkRaVEtZRUtk?=
 =?utf-8?B?aWNtcHRWaXNoZ2FQbjFrOHVDT1JhaFhPdGVZNE5kYWRFZDhoWm9RTTB5UGRX?=
 =?utf-8?B?Q1hoNk8wZUVlNGxSYThOdVVtcTVBelFEWnBNSjh2eEZLZm5yWGduTFd0MEda?=
 =?utf-8?B?Nm0xUmNDenJ0bmNlbEdkdTZYcFBXVmhoUTlPUDcrcGdpSjgwb0xZTFdNeHU1?=
 =?utf-8?B?QVZYaksrV1AyVWZjdEhleGsrZjYvNUp4RVk5MG5wcWRWbk5YOGg2ZzJ2ZGFI?=
 =?utf-8?B?UjlTNk13RlhlVXlaNGJsSzJCUEFPeW5EM0NZSmZPM3NDRXBqMEFLcUhqc1Ez?=
 =?utf-8?B?azJ3NEsvUTIxQnBxdXJOWXFVc2Z0QUg1YnNuOGFuS2pNVHlFUDM2ZUxmS3Bz?=
 =?utf-8?B?NWtFVW5WdGo4U2g0dU9TZXRqTGxEU2xYdk91Q1g3UjlRSWtGREJGRTdiZGtv?=
 =?utf-8?B?Y3B0M2pLSFFtK0dyd2RHTk9TSEFPbk9CVVdEMlhRMGN3L0s1bWsvbkpWT2M4?=
 =?utf-8?B?QjJGbFBjQlNjdWgwVEdYek52eTR2TXdjUkNJeHk3MDNmMEw5Y1R0YXBIT3hO?=
 =?utf-8?B?bW5kZy9EODF4My8zOVZmZ24rMnFvOUMzTHZZcEJzVGZ6WERCbUNjTFR2cjBv?=
 =?utf-8?B?MzBnSTVXWEtoUHlVSDdua1NjL1RiYTJjbnhGSFZqVkFicGNiWTJ0cXUwSHNV?=
 =?utf-8?B?OGJZcFRUd1FXTU5CKzFncjNjUlhITWpYeDNZOXE1NnEzT2JrRDd6SDVrWVhn?=
 =?utf-8?B?T1ZzWEJtaFFHZEpxRms3V0JjM1Z4UUtYQmRYSndoNzg4MXROTGtpVnFzRkE1?=
 =?utf-8?B?Yk9lM25qNjE3VitHYitGSW9zWFdmTFBHTmhERHhoRVZndGpPbzFjN1N6c2Fh?=
 =?utf-8?B?NUNNSmZSME9DQ3prMCswTmRGQ1NIUGR6c3VJVmVKS2V5QkJpMUR4aTBOQ3hu?=
 =?utf-8?B?akpEaXFEVFBJb3pJU2RsVXh4clRDQ3UyQlZlbVNoUHZ5cEtMU3dzYlAzSmYx?=
 =?utf-8?B?cjdoTzNEdnZFNkcvdkdqWVFjQUlNMFN6UDR1SW5VTVFsMDNFVGtqczBFbFps?=
 =?utf-8?B?MUF3Q3BLK2J4bVdsb2tSZDgwdjVDaVJoY205NlRSb2FDVWI5VE00Y0VvL0JF?=
 =?utf-8?B?WlhHb2tIdVFJYVhpdEZBbWF4cFYrNGZaMzlGTTFYN2tpaEE2WDNvVWh3STFY?=
 =?utf-8?B?eWdaNWY0M21yK0l0bEV5OUIyOTZSZHhmUnZxVVpBQUNXQlE5N0w4aFFNZG15?=
 =?utf-8?B?RVBqQkJKT0xhS1BIOVZpeGtqYlRuZ2tid2ZFaXNhVEhGcDBGdWt1MFBQSjQy?=
 =?utf-8?Q?6X2k+T9QKRjqzMYho2Gg/ncJ15JXeZpQ?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3c782b81-f4b4-4ba7-b3a7-08da0b46dc59
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 14:27:00.2734
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: EA5fv8qCPdnZaNSv5+kMgWZF26cwQBCeg8Bhi5J+0x8MPvtmWlH2dpCTiAirGCq6p9CPgGXjtxfXZYGbkTymHA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB4614

On 21.03.2022 15:12, Andrew Cooper wrote:
> --- a/xen/arch/x86/apic.c
> +++ b/xen/arch/x86/apic.c
> @@ -1092,12 +1092,17 @@ static void setup_APIC_timer(void)
>      local_irq_restore(flags);
>  }
>  
> +#define DEADLINE_MODEL_FUNCT(m, fn) \
> +    { .vendor = X86_VENDOR_INTEL, .family = 6, .model = (m), \
> +      .feature = X86_FEATURE_TSC_DEADLINE, \
> +      .driver_data = fn + (0 * sizeof(fn == ((unsigned int (*)(void))NULL))) }

Are you sure all compiler versions we support are happy about +
of a function pointer and a constant? Even if that constant is zero,
this is not legal as per the plain C spec.

Also strictly speaking you would want to parenthesize both uses of
fn.

>  #define DEADLINE_MODEL_MATCH(m, fr) \
>      { .vendor = X86_VENDOR_INTEL, .family = 6, .model = (m), \
>        .feature = X86_FEATURE_TSC_DEADLINE, \
>        .driver_data = (void *)(unsigned long)(fr) }

As long as we leave this in place, there's a (small) risk of the
wrong macro being used again if another hook would need adding here.
We might be safer if driver_data became "unsigned long" and the
void * cast was dropped from here (with an "unsigned long" cast
added in the new macro, which at the same time would address my
other concern above).

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 14:30:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 14:30:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293030.497709 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWJ3X-00057M-Nw; Mon, 21 Mar 2022 14:30:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293030.497709; Mon, 21 Mar 2022 14:30:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWJ3X-00057F-L2; Mon, 21 Mar 2022 14:30:47 +0000
Received: by outflank-mailman (input) for mailman id 293030;
 Mon, 21 Mar 2022 14:30:46 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWJ3W-000575-Of; Mon, 21 Mar 2022 14:30:46 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWJ3W-0000FT-MF; Mon, 21 Mar 2022 14:30:46 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWJ3W-0002XO-6n; Mon, 21 Mar 2022 14:30:46 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWJ3W-0003cg-6L; Mon, 21 Mar 2022 14:30:46 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=4W1yoZSNIT1UHc6Dl3kYBNURubZSW473bhS8txzR3kI=; b=jM+uvkAW5hmVFtmzxW4cZLIh/r
	BCiLPZAAr4ipcXZ9Q2hBwIFytGr52KC+6fdeIb1+u/rtynd3iCnS6K+Q8CVZGfKA/6ndM4FQgPZOF
	xY0rduojNuaq0CRwqeklm+aVUKHV/yi9WZpm59bpMttIPjrF8VC88i2O4nzv79fMkX7U=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168753-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168753: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 21 Mar 2022 14:30:46 +0000

flight 168753 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168753/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   21 days
Failing since        168258  2022-03-01 01:55:31 Z   20 days  212 attempts
Testing same since   168738  2022-03-21 02:39:18 Z    0 days   11 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 859 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 14:40:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 14:40:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293037.497720 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWJCO-0005p8-Mf; Mon, 21 Mar 2022 14:39:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293037.497720; Mon, 21 Mar 2022 14:39:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWJCO-0005p1-Jq; Mon, 21 Mar 2022 14:39:56 +0000
Received: by outflank-mailman (input) for mailman id 293037;
 Mon, 21 Mar 2022 14:39:54 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=XmvP=UA=gmail.com=tamas.k.lengyel@srs-se1.protection.inumbo.net>)
 id 1nWJCM-0005ov-Ra
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 14:39:54 +0000
Received: from mail-ot1-x32f.google.com (mail-ot1-x32f.google.com
 [2607:f8b0:4864:20::32f])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c4e89029-a924-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 15:39:53 +0100 (CET)
Received: by mail-ot1-x32f.google.com with SMTP id
 o20-20020a9d7194000000b005cb20cf4f1bso10633137otj.7
 for <xen-devel@lists.xenproject.org>; Mon, 21 Mar 2022 07:39:53 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c4e89029-a924-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=n9vdLkepYhH8pJ4ZLskSMq6h6bfSGE5tB2JbORvIeZI=;
        b=IIfr1lA4BFZ2voxQitQzCzOXm9ZxjG+A98Y/3fYuIr+wGad5I39zhEV2ujfAvw3sGe
         nZ7ZZMYxIhVUqCIfbFQ4OvnSWLs75RNbPGdymAkNAerpJjou9n21aKid2RDdfOZt76lj
         NQKodl2g4lnepcLesisz18gj6yv5fivUOjuZAR7kpykCbRwg8LQ6bOFOPGAYBNASo/Ls
         jRrI/tu5zBkw9GZP+9dmsqw08vOhgPOiGIQok3TNt48l5khH7gz+c5rOlNZMDY6vEdcj
         0LRpFeVf7Dq9F82zUPdygzw0hKC1J/YsrvnqmllwWOJoVfX07c0gbaEC1TYrZcDj2OGn
         JNsw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=n9vdLkepYhH8pJ4ZLskSMq6h6bfSGE5tB2JbORvIeZI=;
        b=40iCl3JVB0rxjojQ6QrQ/CoZ8JnyyT0qVA9wibVaLDoElm3is8UMPNcJ756WE/h804
         qIfUYz5lZCGCrIAHG2puCVam8XgYPlLQp4tqWxGNAXaI+CM9pLCoV4cK5koFEOK/4gwL
         wJgvn5iZ5ab1LoegkINQ9IaBqQaDI7UTFWRzN1nC1sZBbPWEnxZGk9aMXn5CNH8ej4Ct
         iP3FwI2keUxnbwT/hXTHEf3l5LNYaI4VOhBtGYnekkhsSmvsxdWzIm+EP5WnXqDlCt9b
         FoLW2T+SdjkCKY4wvnrLJWaahFnOy/tXSwu3kTdpdOHmKy7VP10pDOWTCG0h6Q54/Pyl
         PQ3g==
X-Gm-Message-State: AOAM530HCvZTLOnyngCASCIIT0H04qeer6smg39bcIMtSOg2diVt8nqD
	dhkn4IRBOss/G7f6atPFgDNwwnjOXP90aMyp0ZI=
X-Google-Smtp-Source: ABdhPJxCjV1I/pZOGEEiYxDZot2NNOxp78ANiXTPr7WP94QLZm7B3RM0KMgnh+s5OvKreQFb9VoX2jbN3mZqgGCiVhk=
X-Received: by 2002:a05:6830:2b29:b0:5af:ea52:f5ca with SMTP id
 l41-20020a0568302b2900b005afea52f5camr7836556otv.157.1647873592309; Mon, 21
 Mar 2022 07:39:52 -0700 (PDT)
MIME-Version: 1.0
References: <e79bd13acfd73c105ee1399295c99cec153258c2.1647532323.git.tamas.lengyel@intel.com>
 <ca8f13e5-5e3e-e64f-2711-4730883a24fc@suse.com>
In-Reply-To: <ca8f13e5-5e3e-e64f-2711-4730883a24fc@suse.com>
From: Tamas K Lengyel <tamas.k.lengyel@gmail.com>
Date: Mon, 21 Mar 2022 10:39:16 -0400
Message-ID: <CABfawhn3-zRJ+m9nJsOGBL=8gkVmzOyE_ttuWJcSLd4UseLzXQ@mail.gmail.com>
Subject: Re: [PATCH v2] x86/vmx: save guest non-register state in hvm_hw_cpu
To: Jan Beulich <JBeulich@suse.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>, Jun Nakajima <jun.nakajima@intel.com>, 
	Kevin Tian <kevin.tian@intel.com>, Andrew Cooper <andrew.cooper3@citrix.com>, 
	=?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>, Wei Liu <wl@xen.org>, 
	xen-devel@lists.xenproject.org
Content-Type: text/plain; charset="UTF-8"

On Mon, Mar 21, 2022 at 8:16 AM Jan Beulich <jbeulich@suse.com> wrote:
>
> On 17.03.2022 16:57, Tamas K Lengyel wrote:
> > During VM forking and resetting a failed vmentry has been observed due
> > to the guest non-register state going out-of-sync with the guest register
> > state. For example, a VM fork reset right after a STI instruction can trigger
> > the failed entry. This is due to the guest non-register state not being saved
> > from the parent VM, thus the reset operation only copies the register state.
> >
> > Fix this by including the guest non-register state in hvm_hw_cpu so that when
> > its copied from the parent VM the vCPU state remains in sync.
> >
> > SVM is not currently wired-in as VM forking is VMX only and saving non-register
> > state during normal save/restore/migration operation hasn't been needed.
>
> Given that it was pointed out that e.g. STI- and MOV-SS-shadow aren't
> VMX specific and also aren't impossible to hit with ordinary save /
> restore / migrate, I'm not convinced of this argumentation. But of
> course fixing VMX alone is better than nothing. However, ...
>
> > @@ -166,6 +167,11 @@ struct hvm_hw_cpu {
> >  #define XEN_X86_FPU_INITIALISED         (1U<<_XEN_X86_FPU_INITIALISED)
> >      uint32_t flags;
> >      uint32_t pad0;
> > +
> > +    /* non-register state */
> > +    uint32_t activity_state;
> > +    uint32_t interruptibility_state;
> > +    uint64_t pending_dbg;
> >  };
>
> ... these fields now represent vendor state in a supposedly vendor
> independent structure. Besides my wish to see this represented in
> field naming (thus at least making provisions for SVM to gain
> similar support; perhaps easiest would be to include these in a
> sub-structure with a field name of "vmx"), I wonder in how far cross-
> vendor migration was taken into consideration. As long as the fields
> are zero / ignored, things wouldn't be worse than before your
> change, but I think it wants spelling out that the SVM counterpart(s)
> may not be added by way of making a VMX/SVM union.

I wasn't aware cross-vendor migration is even a thing. But adding a
vmx sub-structure seems to me a workable route, we would perhaps just
need an extra field that specifies where the fields were taken
(vmx/svm) and ignore them if the place where the restore is taking
place doesn't match where the save happened. That would be equivalent
to how migration works today. Thoughts?

Tamas


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 14:58:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 14:58:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293041.497731 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWJUY-0008Fe-B7; Mon, 21 Mar 2022 14:58:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293041.497731; Mon, 21 Mar 2022 14:58:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWJUY-0008FX-84; Mon, 21 Mar 2022 14:58:42 +0000
Received: by outflank-mailman (input) for mailman id 293041;
 Mon, 21 Mar 2022 14:58:40 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=svEr=UA=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nWJUW-0008FR-Dk
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 14:58:40 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 62aa1dd4-a927-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 15:58:37 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2110.outbound.protection.outlook.com [104.47.17.110]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-31-578Lj---OZGoLRsBGWQU3Q-1; Mon, 21 Mar 2022 15:58:35 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by HE1PR0401MB2604.eurprd04.prod.outlook.com (2603:10a6:3:83::10)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.22; Mon, 21 Mar
 2022 14:58:33 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a%6]) with mapi id 15.20.5081.022; Mon, 21 Mar 2022
 14:58:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 62aa1dd4-a927-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647874716;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=9r+U0XApU4WbDqM9gwZ0V+Z3ubX3aUJQu9n9vtYWtgs=;
	b=JZQOvAG4ivjHtPmzxp78QXHMpqppk2d1QzJ1SlG+DYlmGDA3KWz/J2h5CVFAUCC3zHfjsg
	zCe/WZowmXSmlbISkifQTCFux/goQ0DF7wtUOzUtH48TyEAMPCXdJUpbaO3EgiAM87w0cp
	V8FNV5jx9XqtZ6y4o8BWwefzkfbnLlc=
X-MC-Unique: 578Lj---OZGoLRsBGWQU3Q-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=TkaAdAIo+DXfu4rNtmG2/assHgJu5w4LLY3BBU97t5PZH/98H39+GHV0eVcCfFNGOM2Gl8qZwmZQfESim+be5bjx6yKcX/QfPZZ4gCfHJxQkAq/AWrp5jyNKI5PasHcAGSqZ3HIj4Zebi+F/blf8UJmrVo5gwuuA6ZZczzMYfI7e9PlGSwAWuHCu41e2TnCH0ZAAdUMxKnblsich2IsHWktTKbbWCn335KltrKTSvtK0DJAqftsvVk6/yPIXGVSOFoJmu8sbC7TpyBHGLbPQl/cw1zzZnkjxMDyjNn/9tm8wOm2qV1innwXJdT3SsbAg3jgYhN36Fs2f5I1deqyfxQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=9r+U0XApU4WbDqM9gwZ0V+Z3ubX3aUJQu9n9vtYWtgs=;
 b=Udm4EkcyD78o5ZPqrVsXLESJVOq0fqHyjq6rX7/im8s9IcBIdTqZ3kRoBMDhc/oVMxDkSMOP9PVeUwd4cZKbrr/dDhvbzy7a8LR3wVzpHFGOh4ImlTWl6J8BnTQr7TYDnR1ILNZbcZDljR7DCiaE3AlcYEQG66oCnc+HFq/LOWhHzBk2Ys/b47TGiXO3GOZWsEaQ/L5rBfGjqq4UfycYbN5xxey7rn4B6/EwtR5gMTWblnloA8G6xYN9fkn06vgJR1OrLqhdpjIAPZ/EKVtdb6u7hhJDpmSTrPvDpDu3KAczMhdVfJM8uNp8DWrcIC2Y3+WeoE0uv6/6lNYmfIxZbg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <dc3cc4f9-e1ba-b73e-9527-7a3a85043505@suse.com>
Date: Mon, 21 Mar 2022 15:58:31 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2] x86/vmx: save guest non-register state in hvm_hw_cpu
Content-Language: en-US
To: Tamas K Lengyel <tamas.k.lengyel@gmail.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>,
 Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian <kevin.tian@intel.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>, Wei Liu
 <wl@xen.org>, xen-devel@lists.xenproject.org
References: <e79bd13acfd73c105ee1399295c99cec153258c2.1647532323.git.tamas.lengyel@intel.com>
 <ca8f13e5-5e3e-e64f-2711-4730883a24fc@suse.com>
 <CABfawhn3-zRJ+m9nJsOGBL=8gkVmzOyE_ttuWJcSLd4UseLzXQ@mail.gmail.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <CABfawhn3-zRJ+m9nJsOGBL=8gkVmzOyE_ttuWJcSLd4UseLzXQ@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6PR10CA0074.EURPRD10.PROD.OUTLOOK.COM
 (2603:10a6:209:8c::15) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 1a214663-d902-4445-db67-08da0b4b44cc
X-MS-TrafficTypeDiagnostic: HE1PR0401MB2604:EE_
X-Microsoft-Antispam-PRVS:
	<HE1PR0401MB2604688B38C3F460C87C2D53B3169@HE1PR0401MB2604.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66946007)(66476007)(2616005)(66556008)(4326008)(38100700002)(508600001)(8676002)(83380400001)(186003)(36756003)(26005)(31686004)(2906002)(316002)(8936002)(6512007)(5660300002)(53546011)(31696002)(86362001)(6506007)(6916009)(54906003)(6486002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?eXA1SUpaVUVnV215VEJJWElaS3EweDg4MkEwcG5pVHQycmV4czlXLy9VbVVV?=
 =?utf-8?B?QUhZaHpNREU0TmhMcmo5RFRXTXRodEJ3YWd2K28xRjg1bFA1NWRjWGRHY3p5?=
 =?utf-8?B?VkVhaVU5R2FRREpUTlNKYWVuN1pMbGNSYy9mNW10UlY5dmdvMHRldWtFeGFJ?=
 =?utf-8?B?eVhlV090dzNOSVFkdXNLQ3NFWmRRZE1TY1ZVbEJVa2tPYU5nOXRIajJsM2h4?=
 =?utf-8?B?VHZMaWhwZlV2eFVWZXBBWjREc1V3T0ROai9vMHNGaDJyK2hUOEc5cm53Y2xo?=
 =?utf-8?B?dzFJUTVYMjJ1TVdVdFRzamVzU2hocHE4TFZGOGt2TVJrM1FKL29XUDV0dFJl?=
 =?utf-8?B?bG9DTzF2Ky9uQUx6SDNsZkZLOXJwU0JqTDRLcWZWTTlDZkFnelFTd3hsYWlD?=
 =?utf-8?B?RlJyeGhPT2lmdkxGTW9CNDFiSldJUGx6RUN3dHRYQlg2UHIvTkZZZTZ4WlRK?=
 =?utf-8?B?d1FFbW1wOUV1bjJUWWVLVG9Ha0tsa09ZdFhVRktOS0VndXoxVWFXdUEzQmNL?=
 =?utf-8?B?alBJMUU4Vk95Q0EvUk5RR1JsajArdis1NjNaY2htbGdRMWdQenFzM3R1bEJo?=
 =?utf-8?B?TkpLOWRBZXo4NEpvUTdHY3o3bFZlcDV3K1NMSFhMSGZGL3lGSmdXeGxlZ0to?=
 =?utf-8?B?em9YZDVTeTlRM2dSUzI4WjFDbVFQTWRxbW5XYTV1SkcyZlZIb0VTQndSV3dv?=
 =?utf-8?B?dlhWMlFYTU4yd1lTSjZxSlVBSnl1KytlWVFqRDFBdzFGWk01bS9CSWpWSnpo?=
 =?utf-8?B?YUxaSHZBUUVObWI1eXlqN1hISHNnNnNlOUp1KzlEWW5vczNyd0xMSTlSREhM?=
 =?utf-8?B?SkJLQW4wbzJPN3hCamdjNzdvQ2lSVFJQSE1ESmFsajlhUTNsZXlGQjVDOU5y?=
 =?utf-8?B?d3FnUHdCcUtBSldGbWkyS1FFSmlKQ0dncTdBZnZVME5DdGszblp3RFNjQnI0?=
 =?utf-8?B?algwNVNmdWJSc0Y0czdKaUF0VTB6Y3MvbU5odXJqbk9FNWtQbDZtd2pVTUta?=
 =?utf-8?B?dFE2SUFZdmR6Nm4vV09jcnVId1RQTzhLZkhMZXpQVjBlcjEvYUs0aTN0dEpz?=
 =?utf-8?B?L01oTDhJYTJpZDgwQ2dMdjlRekw2ZXY5ZmN2T3BzQ2pNcDFOUk5TRHlVR2tY?=
 =?utf-8?B?T0kxTllpa1FRN3p4ZDNkRkNuWTFXNW1WU2d1YVpITERSdUZYb2NlbE9KQkNU?=
 =?utf-8?B?bEk3ZzJBK2NibmFKaVhZdW9aR3FwM2RmZW5WcjczVDBOTnJXNHpGZkVmOUxa?=
 =?utf-8?B?YzRKZzdBUGdoRTh1cEphZDdxVmRxTUFGYW95ZXo0YzFBUnJNRnkySUl2YmdH?=
 =?utf-8?B?WU9UdEpzcDl0akJ4Zm9ZTDZIWGFVZ3gwWlVOSUtEdmxZUkc1V1RFNHVabE5Z?=
 =?utf-8?B?RWdKejdzektHRFZSZENYUWhhZlB6MTB0eW1uK2ZiMUkxaDdtVVFEOGY4VG1Q?=
 =?utf-8?B?WVZBS1JWMkJlVkNTUk1odndjL1hLckZZZC9WYU1LWk9rUHNpTjNXbzdObEJp?=
 =?utf-8?B?cGFjclk1S3JsRmZ0RmtKQVUrWXEvZmRNR3RtTHZpYmZYZmtGYm52ZVNiTUow?=
 =?utf-8?B?c0tRNFUrN2lvanMweXNHWVdpMkRkN3RsL2wzY3MwV2VSbEtiUDhXZVRkMmZz?=
 =?utf-8?B?WjQzWW1ia2dwN2JpNkdKVDdHWHB5RUF3TG12Y0NIUzAxZUhhM29KcC9KdWpy?=
 =?utf-8?B?RU5neGt1REhkWDJDbGMyakVKYzh5MHlmaVZnRHUxUE5HQWF2eEsrTFJVZTV1?=
 =?utf-8?B?elZWWElpYjJJcGFDNFVwWjFhbGtZWkV3VWNCa3pXdkZOdDJXVHpQUkJCNWcv?=
 =?utf-8?B?OUNWQVlNaFFkZnNXNUx4WU81dDZoYXB4emNLQUhkdXUvVlMwK1RzYUVtNGZx?=
 =?utf-8?B?ci9YMFNnS2JWNW5ydTZESTV1Tm96OWRaeGFud0JDejB2V2VLUHUvUWVlS3Nt?=
 =?utf-8?Q?8ziXfIjn28eyMRoDXxu1PyWYVk1ok1js?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1a214663-d902-4445-db67-08da0b4b44cc
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 14:58:33.2481
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Fq0ke0BTZYFJy2XJPMbm9zVqgGPyJgAPZ19jlSCz03Z9E8pyTy1NBadkWHy6KPz/B9A6PDFYCD3ky6Rveu/F8w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0401MB2604

On 21.03.2022 15:39, Tamas K Lengyel wrote:
> On Mon, Mar 21, 2022 at 8:16 AM Jan Beulich <jbeulich@suse.com> wrote:
>> On 17.03.2022 16:57, Tamas K Lengyel wrote:
>>> @@ -166,6 +167,11 @@ struct hvm_hw_cpu {
>>>  #define XEN_X86_FPU_INITIALISED         (1U<<_XEN_X86_FPU_INITIALISED)
>>>      uint32_t flags;
>>>      uint32_t pad0;
>>> +
>>> +    /* non-register state */
>>> +    uint32_t activity_state;
>>> +    uint32_t interruptibility_state;
>>> +    uint64_t pending_dbg;
>>>  };
>>
>> ... these fields now represent vendor state in a supposedly vendor
>> independent structure. Besides my wish to see this represented in
>> field naming (thus at least making provisions for SVM to gain
>> similar support; perhaps easiest would be to include these in a
>> sub-structure with a field name of "vmx"), I wonder in how far cross-
>> vendor migration was taken into consideration. As long as the fields
>> are zero / ignored, things wouldn't be worse than before your
>> change, but I think it wants spelling out that the SVM counterpart(s)
>> may not be added by way of making a VMX/SVM union.
> 
> I wasn't aware cross-vendor migration is even a thing.

It used to be a thing long ago; it may not work right now for no-one
testing it.

> But adding a
> vmx sub-structure seems to me a workable route, we would perhaps just
> need an extra field that specifies where the fields were taken
> (vmx/svm) and ignore them if the place where the restore is taking
> place doesn't match where the save happened. That would be equivalent
> to how migration works today. Thoughts?

I don't think such a field is needed, at least not right away, as
long as the respectively other vendor's fields are left zero when
storing the data. These fields being zero matches current behavior
of not communicating the values at all. A separate flag might be
needed if the receiving side would want to "emulate" settings from
incoming values from the respectively other vendor. Yet even then
only one of the two sets of fields could potentially be non-zero
(both being non-zero is an error imo); both fields being zero
would be compatible both ways. Hence it would be possible to
determine the source vendor without an extra field even then, I
would think.

A separate flag would of course be needed if we meant to overlay
the vendors' data in a union. But as per my earlier reply I think
we're better off not using a union in this case.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 15:02:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 15:02:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293044.497743 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWJYP-0001Eb-SS; Mon, 21 Mar 2022 15:02:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293044.497743; Mon, 21 Mar 2022 15:02:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWJYP-0001EU-PA; Mon, 21 Mar 2022 15:02:41 +0000
Received: by outflank-mailman (input) for mailman id 293044;
 Mon, 21 Mar 2022 15:02:40 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWJYO-0001EK-LJ; Mon, 21 Mar 2022 15:02:40 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWJYO-0000oA-It; Mon, 21 Mar 2022 15:02:40 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWJYO-0003Hm-AK; Mon, 21 Mar 2022 15:02:40 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWJYO-0002kQ-9t; Mon, 21 Mar 2022 15:02:40 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=e+9pMh7743WYD0DG0wfyfKzQOpacw/etn3bQWMrL4Xk=; b=imp6tg/XVCEe9QMNxZWiaYGaud
	p40bCgTETm2olqj085gOtW+dJ1kpMY7UEYdiDdmnI+tgXNb4hty4RUa10jTHEkTOYpSnBH7lxql4e
	SG7uKdp3m4cKmoOGLZwJhc4q1AkNrG+6uO/VjsGHkSWrJQ7F0NQGAdpvDpQarYv2Xz+k=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168750-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168750: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=8aa0e9d2d1a4815516607eabe9b2e850f284a2f8
X-Osstest-Versions-That:
    xen=fdfb07eb28e42b456e5e1ce999a47cc3ea439f7f
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 21 Mar 2022 15:02:40 +0000

flight 168750 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168750/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  8aa0e9d2d1a4815516607eabe9b2e850f284a2f8
baseline version:
 xen                  fdfb07eb28e42b456e5e1ce999a47cc3ea439f7f

Last test of basis   168701  2022-03-19 05:00:29 Z    2 days
Testing same since   168750  2022-03-21 12:00:27 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Luca Fancellu <luca.fancellu@arm.com>
  Raphael Ning <raphning@amazon.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   fdfb07eb28..8aa0e9d2d1  8aa0e9d2d1a4815516607eabe9b2e850f284a2f8 -> smoke


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 15:05:05 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 15:05:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293051.497754 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWJaf-0001pV-B1; Mon, 21 Mar 2022 15:05:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293051.497754; Mon, 21 Mar 2022 15:05:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWJaf-0001pO-7M; Mon, 21 Mar 2022 15:05:01 +0000
Received: by outflank-mailman (input) for mailman id 293051;
 Mon, 21 Mar 2022 15:05:00 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=dpaY=UA=citrix.com=prvs=07205606a=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nWJae-0001pG-Ck
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 15:05:00 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4554b711-a928-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 16:04:58 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4554b711-a928-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647875098;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=Vj+8Dqa/RsnRjeg1eJ2ZVDSCU7cQIs8N18qcMWjLslw=;
  b=ctfhNJeiXVoYbcU9kKz7rNx7iIzJuKvb/1jlZIZEIh9DzgLx3vaE5Sre
   gZvESDqGt0/mUK57H+rEqxBFJpR3vbVfimV0Oze3PaTOnx/xTwmJyC0F1
   gE+tTlpI3h+2t1+fYXn4Fn11rsECqB3tgCmUfaeUgussXjdm/0WNllseh
   I=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66779606
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:IlpOPquEphNhWJe6wAtFFCJSQufnVH1eMUV32f8akzHdYApBsoF/q
 tZmKWzTbvrYM2fyetl2PYTkpEkCuJSBndZnHQdk/ys1EiIX+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jX4
 IuryyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi8qZ5aWksZMWCN2DhhMYrFj9+eeM0Cw5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AO
 ZVGOGQ3MnwsZTUeJmsTEZkSndyzxVf/SBFCiw2b/bEotj27IAtZj+G2bYu9lsaxbdpRtlaVo
 CTB5WuRKhMHMN2SzxKV/3TqgfXA9QvgQ54bHrC88v9sgXWQy3YVBRlQUkG0ydGph0j7V99BJ
 kg8/is1sbN05EGtVsP6XRCzvDiDpBF0c/h6HvA+6QqN4rHJ+AvfDW8BJgOtc/R/6pVwH2Zzk
 AbUwZW5XlSDrYF5V1qer4zOpxHjMhI7MFYwOjMhQlNc8eHs9dRbYg30cv5vF6u8j9vQED72w
 iyXoCVWu4j/nfLnxI3gowmZ3mvESozhC1dsu16JBj7NAhZRPtbNWmC+1bTMAR+sxq69R0LJg
 nULktP2AAsmXcDUz3zlrAng8diUCxe53N/03AUH83oJrW3FF5ufkWd4um0WGauRGpxYEQIFm
 WeK0e+r2LddPWGxcYh8aJ+rBsIhwMDITIq5CaCNNoMXMsEqJWdrGR2CgmbKggjQfLUEy/lja
 f93j+7yZZrlNUiX5GXvHLpMuVPa7is/2XnSVfjGI+ePitKjiIquYe5dajOmN7lhhIvd+Vm92
 4sPZqOilkQEOMWjM3a/zGLmBQ1TRZTNLcut8JI/my/qClcOJVzN/NeKmOJ/IdM5x/oJ/goKl
 1nkMnJlJJPErSSvAS2Ba2x5aaOpWpB6rHkhOjcrM0ru0H8mCbtDJo9GH3frVdHLLNBe8MM=
IronPort-HdrOrdr: A9a23:yfLtbKqZxsmqJZEn32KMtE8aV5vJL9V00zEX/kB9WHVpm5Oj+P
 xGzc526farslsssREb+OxpOMG7MBThHLpOkPMs1NCZLXTbUQqTXfpfBO7ZrQEIdBeOlNK1uZ
 0QFpSWTeeAcWSS7vyKkTVQcexQueVvmZrA7Yy1rwYPcegpUdAZ0+4QMHfkLqQcfnghOXNWLu
 v52iIRzADQBkj/I/7LTkUtbqzmnZnmhZjmaRkJC1oO7xSPtyqh7PrfHwKD1hkTfjtTyfN6mF
 K12TDR1+GGibWW2xXc32jc49B/n8bg8MJKAIiphtIOIjvhpw60bMBKWqGEvhoyvOazgWxa2+
 XkklMFBYBe+nnRdma6rV/E3BTh6i8n7zvYxVqRkRLY0LvEbQN/L/AEqZNScxPf5UZllsp7yr
 h302WQsIcSJQ/cnQzmjuK4GC1Cpw6Rmz4PgOQTh3tQXc81c7lKt7ES+0tTDdMpAD/60oY6C+
 NjZfusqMq+SWnqLkwxg1MfgOBFBh8Ib1S7qwk5y4GoOgFt7T5EJxBy/r1cop8CnKhNP6Wsqd
 60d5iAr4s+PfP+XZgNdNvpfvHHeFAlYSi8Rl56cm6XXZ3uBRr22uvKCfMOlaWXRKA=
X-IronPort-AV: E=Sophos;i="5.90,198,1643691600"; 
   d="scan'208";a="66779606"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=WhkQxfNBtH3yKhVDFrxp+H0z98Lbw4VGswbakn9ocBkpQHUpdwueehckbcJ4rOenE1OecKQiOTz/KzF1vrqVJqlbqYZUlTb1DPznS4DYwacFg0bl/IobR0/aGLCggKhMCKPa+PQ56C6QEQadrwybvonqZ6u/9HAoBGu8GQZIZHes9lO6lVDiiC7VW2DSssgjDwnhu0b4mm2sj1QEPlRTvYqjO+8eRqohk+j8tKKE0YC94WM5TafWmA6nMWoOE6Sk5NJFhOnPTA85QO5gb+FKoSygfU01MVgJEzB65/1cPKvKPEc6tzPSEljvJT74o2qNLeNEaLPSb20C2S7oBPQkwA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=pyooVaNQncRIsW/50+tBknBTWUcjROFecYOeIpUgxG0=;
 b=bD27jpWB86Io/VYAUJgr9BdL1xDfKrQtZ85PU9aiI/GqJKJnZuaI/HK1+bzwKak4s6s8JWizh6jd216wLbsR314To5tc6tqBjJKwlinuFJE5VrTQpLwzEOoGYs1Q4zlGp4JK943v5MdKuIw8SrNxHh5QWfi4iOIuzWl57s0nVAphI6t3pZ5MGXgdlc12c5bdC9YpC72pz+yccWKLxNp4zzQOdpWR8euj3s0fhVYr2YAyOUoIyy03fjz6iuFlymn0vLM6/9rj9mwFMMXmocXyCXlv4KmROeHNSnhMV41d+71Y62mwtXn8GeWQxM7GbQTt9hsESRNgw+Cs0Y8InrJ2Ww==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=pyooVaNQncRIsW/50+tBknBTWUcjROFecYOeIpUgxG0=;
 b=l8cNkJ/AQ4KonECAsd/orgzA0SdYQZLSOzzj7Md3qoSNpwYjpi1rixOhg0GrpgXQPS+VTS0gYIJWccFRUKfji0SMODMlb0fqmg6Tzq0d0aDPqqjx+6TkWBS3mkfMH0MQYpOo6MCw4KisNLR6HgLLezO1zqIJRWQa2fMbqlJD/2k=
Date: Mon, 21 Mar 2022 16:04:47 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Andrew Cooper <andrew.cooper3@citrix.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, George Dunlap
	<George.Dunlap@eu.citrix.com>, Jan Beulich <JBeulich@suse.com>, Stefano
 Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Julien Grall
	<julien@xen.org>
Subject: Re: [PATCH] CI: Don't run Coverity on forks
Message-ID: <YjiUDyTDuq5KQT3W@Air-de-Roger>
References: <20220321135828.3158-1-andrew.cooper3@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <20220321135828.3158-1-andrew.cooper3@citrix.com>
X-ClientProxiedBy: LO2P265CA0251.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:8a::23) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0dd46d03-93c5-488a-5b77-08da0b4c2778
X-MS-TrafficTypeDiagnostic: DS7PR03MB5495:EE_
X-Microsoft-Antispam-PRVS: <DS7PR03MB549556C3E89073820E8E9D908F169@DS7PR03MB5495.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(2906002)(66946007)(508600001)(6512007)(9686003)(8676002)(4326008)(6862004)(82960400001)(66476007)(66556008)(86362001)(26005)(186003)(8936002)(33716001)(6506007)(5660300002)(6666004)(6636002)(85182001)(316002)(6486002)(38100700002)(54906003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?MjI0ZzRhQVdtUUdvV2VtbTlESXovTE54K09WaFBIbEtPeVY2OGhlR1dkdmxk?=
 =?utf-8?B?RFUwajNMUUF1czQzOWEza2p4ZzFZSVQrT1pObStxN1k3czF1YkN6SmxoVFln?=
 =?utf-8?B?cDAwUVdlUUtJbWVjRm1IS0k1d1l5SlcreTdDUGJMMHk3ZHppemRsOHhicGxp?=
 =?utf-8?B?KzErQ1dFWVhSV2FlbjlaOFoxdWVvUzZPcnh6V0Mzdzc3akNhUDFMbkI2SFh4?=
 =?utf-8?B?QzBIdDRFOXNtb1d2emhkVzRNOWtxUThnL2xSd0Y5eng2aDcrUS82djl6bGhJ?=
 =?utf-8?B?aDFIRGdSa3VHK2NGVHZvT0h6b3JzcSt4TkJaMzN4LzJ6cDhZV1ZIWjc1bmV5?=
 =?utf-8?B?bllkRVJob1ZPMGJQZ01KYVFjZHNFSkNIUE9YQnhPQUh1aC9WTFJ5REJudEhB?=
 =?utf-8?B?cHJlZHpkMm1WRjUwQ2x0SWxxN1ZTQlNVbG96dEZHOHMvUEFRMnZsalhLN3p5?=
 =?utf-8?B?Sm00QjhHNVhWWWNBcmhHcno5azF3R09EQTZ6T0gyS2R1cWhiZlJqanBwUlFY?=
 =?utf-8?B?VS9vTGltejcweXFHZHcrU2x6MXNnMCtWUDhkR2w0NTljQWdjWHMxMUNOTjZS?=
 =?utf-8?B?WlRMN2NhZE9tWEpzajkyS3RGR3RjL3UrZUhLL1hSWGFZSU5rNHd1RXFjQmZT?=
 =?utf-8?B?SzY3cFNmWWZlRWJHQVJyM3FFVG80U0s4RXhmTm9XdTVwNXVYNVZtcXI1NkIv?=
 =?utf-8?B?QkpaenpQQ1hRM2VDYWRsbmJ0MFhNV0JEOGdxTGR5cjQwbjYwOGFjYXIyQVdG?=
 =?utf-8?B?U2ZvU0ZqZnNudlJ0Q3BIci9PKzE5TVR6bm9jRWNGUGZxMHh3MVRRL0dVaUNZ?=
 =?utf-8?B?dXJJMUFwWE5TaXMwVEFSL1VEMjMyNzk0YXVqbDcxdG91OGJGNmMycXpucldW?=
 =?utf-8?B?V3NDSHRqeFA5WHlzY29xenMrRlppQWtIaU5QaStxNzVDNjN6T091YThPa21l?=
 =?utf-8?B?dTczYWF3KzlwZ25hODAva3pldHAxWmxKRUVmVFllRkVpY20rbzlDRitWOWdW?=
 =?utf-8?B?VHpoSjhNeTRTL29ES0wybFV3RHNxTmxwVmZYODI3NlJDN1FmQWFzOTRWZEIy?=
 =?utf-8?B?U213STJmcGVSSHkzc1NJK055MTVTMUVsUVQ4SDE1SnYyV3dxamFYSzlPSUsy?=
 =?utf-8?B?NTFsR1VRUlFKS1dBV2JqQTJKWnlSb2dYOEF4TnJoU1ZqeDVBRStXSE5oUE5y?=
 =?utf-8?B?ZkNhaGRBRE5tTkpwN1NOQ2hIZUFTYXBYV2w0aEd1M2ZwNFFDQy9EY2dBbHls?=
 =?utf-8?B?STl6bFZPVzBLR3ZJeXJtNDhSWTNMejJ6VmhUSWJ0RGVwVnV3R1hpMDYwclNG?=
 =?utf-8?B?SWN4Yy8rbmsreGZCK3Noekw3Nk9Kem1UZldqdVFQVW9oalU2NHF6Um1lcEhZ?=
 =?utf-8?B?akZYZHFIdlByOHgvekJyc0ZLYlhlcVhnemVTVG1WTDRrclZWWVJBV2syTjRj?=
 =?utf-8?B?ZDlPVjdzRFF4SGhXZzJjTGRsRnFPcEpoTjJRclVEVVNLZk50aHJ2eXY2dC9h?=
 =?utf-8?B?N3pzbUFDY2lpNE9aWVdlbHZia3ZZM2ZaVGh6MGJhSnU1NDFFb3Z3dFpwbEI0?=
 =?utf-8?B?OU5Ya2dFbXdJejhFWnBBaFJJcVZNU3lyQ1o0V0JtbGJ5Q0FSdEE2WEJBNGdQ?=
 =?utf-8?B?VXZObkR3dG91MTU0eXJBLzUyeE9qeUdEMGpXUGpEVm8wWUVad1R5Um5KUm9K?=
 =?utf-8?B?dUw2aUlEYjBudG5XY1NuVmxZMlhCUDRFbmRLc2FZYmNEbXg1M2daYUtYY1A5?=
 =?utf-8?B?UjkyWStmdHk4QXIvSWd0bXNCL0F4OUgwb2VtbkQvcXkwaTBvUXZGaEdyaWFD?=
 =?utf-8?B?K3BLVys3TnlEMVNnQkVidWxoaGlKR2lLUmYrNGFFWU9PR21ZN0pZK1NFOUYw?=
 =?utf-8?B?NTRZSEFacElmNTZoYllMeUNEaTd3ZHQxNDBOeEFwVzB5aTNDV1VBZk5DWkls?=
 =?utf-8?Q?y/y+qHKGzXyixtHBLnFdPi6y0B/JolTM?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 0dd46d03-93c5-488a-5b77-08da0b4c2778
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 15:04:53.6308
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: yk6NJ1lUVetLAk1lDRJKa9WJNJ9wB3CPHTnC2QikcN2+aW+ugBHvQqi2ULVpTopdkYirtZz+KZR08euGK3uFTw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS7PR03MB5495
X-OriginatorOrg: citrix.com

On Mon, Mar 21, 2022 at 01:58:28PM +0000, Andrew Cooper wrote:
> By default, workflows run in all forks, but the Coverity token is specific to
> us, causing all other runs to fail.
> 
> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>

Acked-by: Roger Pau Monné <roger.pau@citrix.com>

Albeit I have a suggestion to make this more useful I think

> ---
> CC: Roger Pau Monné <roger.pau@citrix.com>
> CC: George Dunlap <George.Dunlap@eu.citrix.com>
> CC: Jan Beulich <JBeulich@suse.com>
> CC: Stefano Stabellini <sstabellini@kernel.org>
> CC: Wei Liu <wl@xen.org>
> CC: Julien Grall <julien@xen.org>
> ---
>  .github/workflows/coverity.yml | 1 +
>  1 file changed, 1 insertion(+)
> 
> diff --git a/.github/workflows/coverity.yml b/.github/workflows/coverity.yml
> index 427fb86f947f..f613f9ed3652 100644
> --- a/.github/workflows/coverity.yml
> +++ b/.github/workflows/coverity.yml
> @@ -8,6 +8,7 @@ on:
>  
>  jobs:
>    coverity:
> +    if: github.repository_owner == 'xen-project'

Since I don't know anything else similar, why not make this a secret,
ie: ${{ secrets.RUN_COVERITY_SCAN }}? So that people could decide to
enable coverity on their own repos if desired.

We would also need to introduce a ${{ secrets.COVERITY_SCAN_PROJECT }}

To allow setting a different project name.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 15:29:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 15:29:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293054.497765 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWJxt-0004Iy-9Z; Mon, 21 Mar 2022 15:29:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293054.497765; Mon, 21 Mar 2022 15:29:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWJxt-0004Ir-6N; Mon, 21 Mar 2022 15:29:01 +0000
Received: by outflank-mailman (input) for mailman id 293054;
 Mon, 21 Mar 2022 15:29:00 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWJxs-0004Ih-EY; Mon, 21 Mar 2022 15:29:00 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWJxs-0001Di-BA; Mon, 21 Mar 2022 15:29:00 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWJxr-0003qS-UM; Mon, 21 Mar 2022 15:28:59 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWJxr-00026q-Tu; Mon, 21 Mar 2022 15:28:59 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=7MaXsRSmDQHVb2opdpaY222uwX63UWjF4N3leEgxX+E=; b=TmwiyQMw8WZhlovd1MQZpmI9Gb
	WflatKN2XGDSZTOEO7UC2uf+a3ok8WFz3cpjyLZYfDhy5b6+rhvLzCdBeG579rr/U4p1GEBq6oDwG
	UTF3OavCHLDkNnva4A8CnkX8Ek0BYEOHlFXPk8iwU5w3/Fu0IdjUdjgrkhqHjJcbDLBY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168754-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168754: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 21 Mar 2022 15:28:59 +0000

flight 168754 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168754/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   21 days
Failing since        168258  2022-03-01 01:55:31 Z   20 days  213 attempts
Testing same since   168738  2022-03-21 02:39:18 Z    0 days   12 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 859 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 15:29:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 15:29:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293057.497776 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWJy2-0004cM-P6; Mon, 21 Mar 2022 15:29:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293057.497776; Mon, 21 Mar 2022 15:29:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWJy2-0004cB-LP; Mon, 21 Mar 2022 15:29:10 +0000
Received: by outflank-mailman (input) for mailman id 293057;
 Mon, 21 Mar 2022 15:29:09 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=XmvP=UA=gmail.com=tamas.k.lengyel@srs-se1.protection.inumbo.net>)
 id 1nWJy1-0004bB-IC
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 15:29:09 +0000
Received: from mail-oi1-x22e.google.com (mail-oi1-x22e.google.com
 [2607:f8b0:4864:20::22e])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a619810a-a92b-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 16:29:08 +0100 (CET)
Received: by mail-oi1-x22e.google.com with SMTP id ay7so16558177oib.8
 for <xen-devel@lists.xenproject.org>; Mon, 21 Mar 2022 08:29:08 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a619810a-a92b-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=5lBj1J0avmJHMDFFacrl//nl+Gdx/FJHfmxHmrANteA=;
        b=F+Lf4lnNXrMeZDgRsgvxwK9NtXVKkns8Q30LhOZsPMc78mSwE4icVbpOq1lf9r5OlV
         K78IzdLQEEWX3j8a6rzNJ2GhADxejTrSpKd6ML5/DLhwQEFZb2XmPbfPxgrmbShAZNbs
         juaCT2MGZDGRL2FhPQz1ZQrMpphEFHqtTDrRoahcizyysfQHvOEu5hT1GI3BJj9KSapa
         NIv/2WAVKLe9CgFI/13mKSovnCVireVLQ6Vg9BsS0a4ojJT8aOlnT9cMfiEz5+TqtKSP
         SlwER6gBALFmMTc+2r8wjy/0IJAY9FX9yIh5UO42JBt2yARQYIbyE5rQvJTL6L/pP98z
         ovmA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=5lBj1J0avmJHMDFFacrl//nl+Gdx/FJHfmxHmrANteA=;
        b=7UQGrgnL/jIh79ao1VddCSGzXUv9lKWF6GwMqFgZYid5gQtwVtNTjGdx52WZ3j8ClY
         YLWI22y8a39WWoD5ZxOSkXOHR+H6PQQ8eT0aKYVN41/FB2VLhNNgnFslJoDngXotP8aW
         OltQoZ7PiERTm4wxy9zAKgPe1YHbvwyQkaix8X4iCnSNuhm0w2bKIeiWrcNhjiwWSfPx
         Bp+3Y+BhOfmJrtxw+lg1V+RKdra/4twv8h8RCw54n04DKm7UG79e0bQ9+vDf7y4Upp9Q
         KUDHQFGv3t/xtM0vvKzcJgNEhqmjTyUYoTPVf8Er3kGCrkOmIwoitei0XX39wfYyRPWQ
         tfBA==
X-Gm-Message-State: AOAM531IaMRXPlY4FtYF2ysb5ZQ5sC9uP5Zyjf6dGXqbFt2nf8dnJVhw
	AeJ9zr7ZynYUa+4jOcHxJ9sbb4RpOAMbQq2IBrc=
X-Google-Smtp-Source: ABdhPJw43zpp+exGaPdDwzMn5duc/AlKJ/MtGxBh++GoRmHToJWc3sc+63cYxfK2BPvE9QT7go5P1lBMSXqns429OHs=
X-Received: by 2002:aca:d12:0:b0:2ee:f684:bd4b with SMTP id
 18-20020aca0d12000000b002eef684bd4bmr11920713oin.128.1647876547223; Mon, 21
 Mar 2022 08:29:07 -0700 (PDT)
MIME-Version: 1.0
References: <e79bd13acfd73c105ee1399295c99cec153258c2.1647532323.git.tamas.lengyel@intel.com>
 <ca8f13e5-5e3e-e64f-2711-4730883a24fc@suse.com> <CABfawhn3-zRJ+m9nJsOGBL=8gkVmzOyE_ttuWJcSLd4UseLzXQ@mail.gmail.com>
 <dc3cc4f9-e1ba-b73e-9527-7a3a85043505@suse.com>
In-Reply-To: <dc3cc4f9-e1ba-b73e-9527-7a3a85043505@suse.com>
From: Tamas K Lengyel <tamas.k.lengyel@gmail.com>
Date: Mon, 21 Mar 2022 11:28:31 -0400
Message-ID: <CABfawhmqZS5_gjpUxye2LvzcpS93Oj2U0-gsNfMBXjt3dLxrKQ@mail.gmail.com>
Subject: Re: [PATCH v2] x86/vmx: save guest non-register state in hvm_hw_cpu
To: Jan Beulich <JBeulich@suse.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>, Jun Nakajima <jun.nakajima@intel.com>, 
	Kevin Tian <kevin.tian@intel.com>, Andrew Cooper <andrew.cooper3@citrix.com>, 
	=?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>, Wei Liu <wl@xen.org>, 
	xen-devel@lists.xenproject.org
Content-Type: text/plain; charset="UTF-8"

On Mon, Mar 21, 2022 at 10:58 AM Jan Beulich <jbeulich@suse.com> wrote:
>
> On 21.03.2022 15:39, Tamas K Lengyel wrote:
> > On Mon, Mar 21, 2022 at 8:16 AM Jan Beulich <jbeulich@suse.com> wrote:
> >> On 17.03.2022 16:57, Tamas K Lengyel wrote:
> >>> @@ -166,6 +167,11 @@ struct hvm_hw_cpu {
> >>>  #define XEN_X86_FPU_INITIALISED         (1U<<_XEN_X86_FPU_INITIALISED)
> >>>      uint32_t flags;
> >>>      uint32_t pad0;
> >>> +
> >>> +    /* non-register state */
> >>> +    uint32_t activity_state;
> >>> +    uint32_t interruptibility_state;
> >>> +    uint64_t pending_dbg;
> >>>  };
> >>
> >> ... these fields now represent vendor state in a supposedly vendor
> >> independent structure. Besides my wish to see this represented in
> >> field naming (thus at least making provisions for SVM to gain
> >> similar support; perhaps easiest would be to include these in a
> >> sub-structure with a field name of "vmx"), I wonder in how far cross-
> >> vendor migration was taken into consideration. As long as the fields
> >> are zero / ignored, things wouldn't be worse than before your
> >> change, but I think it wants spelling out that the SVM counterpart(s)
> >> may not be added by way of making a VMX/SVM union.
> >
> > I wasn't aware cross-vendor migration is even a thing.
>
> It used to be a thing long ago; it may not work right now for no-one
> testing it.
>
> > But adding a
> > vmx sub-structure seems to me a workable route, we would perhaps just
> > need an extra field that specifies where the fields were taken
> > (vmx/svm) and ignore them if the place where the restore is taking
> > place doesn't match where the save happened. That would be equivalent
> > to how migration works today. Thoughts?
>
> I don't think such a field is needed, at least not right away, as
> long as the respectively other vendor's fields are left zero when
> storing the data. These fields being zero matches current behavior
> of not communicating the values at all. A separate flag might be
> needed if the receiving side would want to "emulate" settings from
> incoming values from the respectively other vendor. Yet even then
> only one of the two sets of fields could potentially be non-zero
> (both being non-zero is an error imo); both fields being zero
> would be compatible both ways. Hence it would be possible to
> determine the source vendor without an extra field even then, I
> would think.
>
> A separate flag would of course be needed if we meant to overlay
> the vendors' data in a union. But as per my earlier reply I think
> we're better off not using a union in this case.

Right, both structs being non-zero at the same time wouldn't make
sense and would indicate corruption of the hvm save file. But I think
the same would easily be achieved by defining a bit on the flags and
then a union. If two vendor bits are set that would indicate an error
without taking up the same with two separate structs. This is what I
have right now and IMHO it looks good
(https://xenbits.xen.org/gitweb/?p=people/tklengyel/xen.git;a=commitdiff;h=84f15b2e1bef6c901bbdf29a07c7904cb365c0b2):

--- a/xen/include/public/arch-x86/hvm/save.h
+++ b/xen/include/public/arch-x86/hvm/save.h
@@ -52,6 +52,7 @@ DECLARE_HVM_SAVE_TYPE(HEADER, 1, struct hvm_save_header);
  * Compat:
  *     - Pre-3.4 didn't have msr_tsc_aux
  *     - Pre-4.7 didn't have fpu_initialised
+ *     - Pre-4.17 didn't have non-register state
  */

 struct hvm_hw_cpu {
@@ -163,9 +164,21 @@ struct hvm_hw_cpu {
     uint32_t error_code;

 #define _XEN_X86_FPU_INITIALISED        0
+#define _XEN_X86_VMX                    1
 #define XEN_X86_FPU_INITIALISED         (1U<<_XEN_X86_FPU_INITIALISED)
+#define XEN_X86_VMX                     (1U<<_XEN_X86_VMX)
     uint32_t flags;
     uint32_t pad0;
+
+    /* non-register state */
+    union {
+        /* if flags & XEN_X86_VMX */
+        struct {
+            uint32_t activity_state;
+            uint32_t interruptibility_info;
+            uint64_t pending_dbg;
+        } vmx;
+    };
 };

Tamas


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 15:51:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 15:51:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293065.497787 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWKK1-00089D-FF; Mon, 21 Mar 2022 15:51:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293065.497787; Mon, 21 Mar 2022 15:51:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWKK1-000896-Bk; Mon, 21 Mar 2022 15:51:53 +0000
Received: by outflank-mailman (input) for mailman id 293065;
 Mon, 21 Mar 2022 15:51:52 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=D7HK=UA=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nWKJz-000890-SR
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 15:51:52 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on2062f.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::62f])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id d1537a2c-a92e-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 16:51:49 +0100 (CET)
Received: from DB8P191CA0004.EURP191.PROD.OUTLOOK.COM (2603:10a6:10:130::14)
 by AM6PR08MB4673.eurprd08.prod.outlook.com (2603:10a6:20b:c4::14) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.22; Mon, 21 Mar
 2022 15:51:47 +0000
Received: from DB5EUR03FT059.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:130:cafe::6) by DB8P191CA0004.outlook.office365.com
 (2603:10a6:10:130::14) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.19 via Frontend
 Transport; Mon, 21 Mar 2022 15:51:47 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT059.mail.protection.outlook.com (10.152.21.175) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Mon, 21 Mar 2022 15:51:46 +0000
Received: ("Tessian outbound 741ca6c82739:v113");
 Mon, 21 Mar 2022 15:51:46 +0000
Received: from f6638d7615c0.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 37C44294-E424-4D27-93EC-F5228F04E8B7.1; 
 Mon, 21 Mar 2022 15:51:35 +0000
Received: from EUR01-VE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id f6638d7615c0.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Mon, 21 Mar 2022 15:51:35 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by HE1PR0802MB2522.eurprd08.prod.outlook.com (2603:10a6:3:dc::20)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Mon, 21 Mar
 2022 15:51:33 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5081.023; Mon, 21 Mar 2022
 15:51:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d1537a2c-a92e-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=HO9UQ3ob3jLfGND+gxvmNC+GzyGbY3efxpwulWkAt8Y=;
 b=+CtZY2z3mj0nhqgjg4ACH1jlXgzbcFKXK2NsloUFkYi7b3gHe742MSvfXM1uP86aNhicGzUMkEObb+sJzPRIDt1kcYnQ7grAMdqEq2CibZDeeEvU+FfuTiRBE6/HqzQb4x4vhHw4hWxZ5kuQqTn6i5lI5d6lGYzKS1qJdCaIC9Y=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 3a531fa364348c54
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=LYwIbFtut9CGV8wj3uXn4907gbttPuWOYQPUtSUi7JXozW19/WtETS5YhxNTJSqsXbnkBldPM7gkQrrRJ20l4PGnotX1UR9WdHHO7iCuWYqbopKubsOrRzF2M7Qvgf8rnVxlJ/DDOQRXwszIJzKbuUCtgNVG66TQUvOogsOI4/3blnF/eyNhM2+nsvQFFy4iHWsT5rAv7E404Gl4PHbeK7U7Eqv38yomRhsyTGQtSQ3c8uMchRKPMjUj5PY/TypYMgxkRmqJV+AoSi6wbwhb4c4bx3mDVys5T2zwHbZ+VnIjh6FkPgs4u1XRXCTfLI+Moxw1Tn+ozu7a2PDex5iEmw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=HO9UQ3ob3jLfGND+gxvmNC+GzyGbY3efxpwulWkAt8Y=;
 b=ghpMW2Fj27VLYBbS1xGZjbdtWijkNVDVlEGknDVqNZKaCYuKvXcEROmdKUI0riCVBfCwe5gN8UvnlI5ZYzEv45tiKRy7DbMtYz94SLavnrgc0rL/mYdeew/ZjNbP9FobpzTDU7KNF21AqH9be+u8CjzN2dj8JyiJval73HOUAG9i5mgqb8/1sB+xVvSoDGbUyMyKwpfQ9sH/XSykI3NweFeyArHqTd+KuR6rl03DhRZc6S1XIUE7quASenDl/HrXS9RkPSkuBbfdSO9uUTrTbGPjKUQesDV6hDDBZnJI26pkLVnhWik7vzfKM5BDdv7A0t2g2zfadW7Bt+r1UdyZ5w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=HO9UQ3ob3jLfGND+gxvmNC+GzyGbY3efxpwulWkAt8Y=;
 b=+CtZY2z3mj0nhqgjg4ACH1jlXgzbcFKXK2NsloUFkYi7b3gHe742MSvfXM1uP86aNhicGzUMkEObb+sJzPRIDt1kcYnQ7grAMdqEq2CibZDeeEvU+FfuTiRBE6/HqzQb4x4vhHw4hWxZ5kuQqTn6i5lI5d6lGYzKS1qJdCaIC9Y=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Bertrand Marquis <Bertrand.Marquis@arm.com>, Wei Chen <Wei.Chen@arm.com>,
	Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, Wei
 Liu <wl@xen.org>, Juergen Gross <jgross@suse.com>, Dario Faggioli
	<dfaggioli@suse.com>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Topic: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Index: AQHYOtySiWfuTiIQkkqv44WbBvDftKzJkVgAgABwAQA=
Date: Mon, 21 Mar 2022 15:51:32 +0000
Message-ID: <9F79D423-E65A-484C-BDC7-4C701239920E@arm.com>
References: <20220318152541.7460-1-luca.fancellu@arm.com>
 <20220318152541.7460-5-luca.fancellu@arm.com>
 <d16f98aa-8307-3add-8253-0616cf5ba2b1@suse.com>
In-Reply-To: <d16f98aa-8307-3add-8253-0616cf5ba2b1@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 705d2db1-e3bb-4345-5613-08da0b52b464
x-ms-traffictypediagnostic:
	HE1PR0802MB2522:EE_|DB5EUR03FT059:EE_|AM6PR08MB4673:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR08MB4673B4BA1E5A69C3B07DEC97E4169@AM6PR08MB4673.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(186003)(26005)(8936002)(54906003)(5660300002)(33656002)(6916009)(316002)(36756003)(7416002)(86362001)(38070700005)(2616005)(38100700002)(76116006)(53546011)(6486002)(122000001)(71200400001)(6512007)(66446008)(66946007)(64756008)(66556008)(66476007)(8676002)(4326008)(2906002)(508600001)(6506007)(91956017)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <B2DB7D2496275C448F464FBD91C07CFC@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0802MB2522
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT059.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	89deaa24-a8c6-42a6-f572-08da0b52ac31
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	zY0iLQoCNML5/Gf/4r60s36phXuKewVREWLf/Pl7xBcBNc6yeFjaIG42ab8nki1114PXuZeJhw+lasQSbO+IWSl/6kvnd04ro40Qe6Qn4MwWK+f+hUlzgKwV0WDboq/OZZKBb57NEL/9Bl9RSOI/QtIzppfR9qI8wNvixB8MWs5/S7bN0sgzWSB8NjsBa5bicRQCAv4D6G4NbodfDyzPV0Fmrz74gu6JA5icsXsLVOTGGHlsJ2in902SI7BF1VQAZDr9w0CT1E4C0qI3Q1twAi+3xYzisIK7cP5Wi4ELjpVHAH6uE76nKocg4VQ52FDLJrbbQEmJMp4xO+sPKE/LPbWUrFXk98PBI+K2r6sC1Wb49FUbbQK/p+vkCjQia61M+TJ3HEaFw9WZAzn6YQwFv8Vc2hfE9VKYfrFqRnupAt51CG5yXhC4KC3O6J39XjjhbzDb0oiiAOXhuR5PVba+OpN0aVyc9L2996LcSymcXf3O4YVh9v2DKSZsagfXv2Qxk1H2l/KM9Tf9fvHlK4p1is81iZ6XhpopSumPopeVzUBnMk5PO7ZtYB+SCQYQ78o7JSJljPHRoVB5QdiOaPOHIPnT0vhK6Pr2FFrpD5YidMMvbqdLgLTJ3tdKuOs5SlLB2NcT4doc8Gdup0FfRf6Y+CptJBkVLB2oaN9MbkuClIml8OpHDYbGbshupkeDe8PW
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(81166007)(53546011)(356005)(54906003)(2906002)(6506007)(6512007)(36756003)(33656002)(508600001)(36860700001)(40460700003)(6486002)(6862004)(316002)(47076005)(186003)(336012)(26005)(4326008)(70586007)(70206006)(2616005)(8676002)(5660300002)(86362001)(82310400004)(8936002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 15:51:46.8044
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 705d2db1-e3bb-4345-5613-08da0b52b464
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT059.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4673



> On 21 Mar 2022, at 09:10, Jan Beulich <jbeulich@suse.com> wrote:
>=20
> On 18.03.2022 16:25, Luca Fancellu wrote:
>> --- a/xen/common/Makefile
>> +++ b/xen/common/Makefile
>> @@ -1,5 +1,6 @@
>> obj-$(CONFIG_ARGO) +=3D argo.o
>> obj-y +=3D bitmap.o
>> +obj-$(CONFIG_BOOT_TIME_CPUPOOLS) +=3D boot_cpupools.o
>=20
> By the looks of it you appear to want to specify boot_cpupools.init.o
> here: All functions there are __init and all data is __initdata. That
> was string literals (e.g. as used for printk() invocations) will also
> move to .init.*.
>=20
>> --- a/xen/include/xen/sched.h
>> +++ b/xen/include/xen/sched.h
>> @@ -1176,6 +1176,25 @@ extern void cf_check dump_runq(unsigned char key)=
;
>>=20
>> void arch_do_physinfo(struct xen_sysctl_physinfo *pi);
>>=20
>> +#ifdef CONFIG_BOOT_TIME_CPUPOOLS
>> +void btcpupools_allocate_pools(void);
>> +unsigned int btcpupools_get_cpupool_id(unsigned int cpu);
>> +
>> +#ifdef CONFIG_HAS_DEVICE_TREE
>> +void btcpupools_dtb_parse(void);
>> +#else
>> +static inline void btcpupools_dtb_parse(void) {}
>=20
> I think you want to avoid having two stubs for this - one here and ...
>=20
>> +#endif
>> +
>> +#else /* !CONFIG_BOOT_TIME_CPUPOOLS */
>> +static inline void btcpupools_allocate_pools(void) {}
>> +static inline void btcpupools_dtb_parse(void) {}
>=20
> ... another one here.
>=20

Hi Jan,

Thank you for your review, yes I will fix your findings in the next serie.

Cheers,
Luca

> Jan
>=20
>=20



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 15:59:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 15:59:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293068.497798 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWKR1-0000Oz-7v; Mon, 21 Mar 2022 15:59:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293068.497798; Mon, 21 Mar 2022 15:59:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWKR1-0000Os-4n; Mon, 21 Mar 2022 15:59:07 +0000
Received: by outflank-mailman (input) for mailman id 293068;
 Mon, 21 Mar 2022 15:59:06 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=D7HK=UA=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nWKQz-0000Om-T7
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 15:59:06 +0000
Received: from EUR03-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur03on062d.outbound.protection.outlook.com
 [2a01:111:f400:fe09::62d])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d425dc41-a92f-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 16:59:03 +0100 (CET)
Received: from AS9PR06CA0341.eurprd06.prod.outlook.com (2603:10a6:20b:466::14)
 by VI1PR08MB4415.eurprd08.prod.outlook.com (2603:10a6:803:fa::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.18; Mon, 21 Mar
 2022 15:59:00 +0000
Received: from VE1EUR03FT034.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:466:cafe::2) by AS9PR06CA0341.outlook.office365.com
 (2603:10a6:20b:466::14) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.22 via Frontend
 Transport; Mon, 21 Mar 2022 15:58:59 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT034.mail.protection.outlook.com (10.152.18.85) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Mon, 21 Mar 2022 15:58:59 +0000
Received: ("Tessian outbound 1f399c739551:v113");
 Mon, 21 Mar 2022 15:58:58 +0000
Received: from 9aefd9f9a34a.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 DE590025-02B6-46FB-8A71-A5D2D1B87C5E.1; 
 Mon, 21 Mar 2022 15:58:48 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 9aefd9f9a34a.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Mon, 21 Mar 2022 15:58:48 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by AM0PR08MB3506.eurprd08.prod.outlook.com (2603:10a6:208:db::13)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.15; Mon, 21 Mar
 2022 15:58:42 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5081.023; Mon, 21 Mar 2022
 15:58:42 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d425dc41-a92f-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=J/xnS8kNoPMOayS0aIq//hLNtA7sNNktxCNdejPkBpM=;
 b=r4xA4/xqf+kg3EwJIEfNUQ/YyT7wSnd9ctGA+5Xph1Vr9zazgK/Yd6O81PbnKKkyfSfgSS/ArWIRySSN8AKO6zomW5H8PYl+YWiYvjY8ccDE66VwkuHduLq3ZgVpVQ2nQ7fAGklGfMk2f7eol21ih8rVDu2leU6Pve2TJBZzFTE=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 2d007cce75cb9669
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=MFVfCXrJ3dNdPH8U9Sxmd8QJVoPpW/HLmU95vnxPqgOlN1yP0r01Qr7hL+N1dGQpHUPdNjdRaJZ82R/yQStCNkGUFojD6gnRdu/oEkTwMv/nEZm8DQFWISP4Qkj0sA/R26NC2qBc6J4ELofaMoA5Yi9oWexctvog9AnVfKr1QgERy6Kyzk15wWTXjBcdDbxORAb72gRe6cmkiqL0+VU39P3WoQ9AsnqWiKu54/ALSU++uT2EghbIWTF2GmD0OjGxs5uSv4ZX1cLjcjo+bYGZpL2TlAnMr0jvLf2aKsMoRgqkxUNCMTK4dwDvUb+cMULi2qizxZ10EO2Wz4hMveNADA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=J/xnS8kNoPMOayS0aIq//hLNtA7sNNktxCNdejPkBpM=;
 b=ntv5Bvsvxnh6rI26i8dOIK1p8S8i3bV+IXN6ZFqpGMY3V8snbnox0buufwPxvuB+8CGnOaZsOcteGP8dNOuvDaYj1xRUtBzdAwHkVKtCIQGyygJQWfuSulowg/pxgX/2mZ1QE4zDjHqnTvK4S5sPXTmdcyKggANXuABrL9X08VPrR6q7CQE3+8TG8Ii5++r3IFyb4AooknM7/rwlbN3lRuVH+xbo+a+uvthlVjDh9gPnFfab1IrONZsyK129qUtEiZmMD7RXlTiHqrNpb5EII2XsDVrmkeP/vCGWDRTH/yO3b9FKhzJ4B+hlGlh5WiJaugi72J5xTLfe1Ss0ELo0OA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=J/xnS8kNoPMOayS0aIq//hLNtA7sNNktxCNdejPkBpM=;
 b=r4xA4/xqf+kg3EwJIEfNUQ/YyT7wSnd9ctGA+5Xph1Vr9zazgK/Yd6O81PbnKKkyfSfgSS/ArWIRySSN8AKO6zomW5H8PYl+YWiYvjY8ccDE66VwkuHduLq3ZgVpVQ2nQ7fAGklGfMk2f7eol21ih8rVDu2leU6Pve2TJBZzFTE=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Julien Grall <julien@xen.org>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, Wei Chen <Wei.Chen@arm.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Wei Liu
	<wl@xen.org>, Juergen Gross <jgross@suse.com>, Dario Faggioli
	<dfaggioli@suse.com>
Subject: Re: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Topic: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Index: AQHYOtySiWfuTiIQkkqv44WbBvDftKzFUCoAgASzLoA=
Date: Mon, 21 Mar 2022 15:58:42 +0000
Message-ID: <0FA7F6D7-0B40-4B75-9752-7FE48D0FCA5C@arm.com>
References: <20220318152541.7460-1-luca.fancellu@arm.com>
 <20220318152541.7460-5-luca.fancellu@arm.com>
 <274f81b0-c164-4437-3d05-243e147330a9@xen.org>
In-Reply-To: <274f81b0-c164-4437-3d05-243e147330a9@xen.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: f4fd7039-83ff-4477-b3da-08da0b53b640
x-ms-traffictypediagnostic:
	AM0PR08MB3506:EE_|VE1EUR03FT034:EE_|VI1PR08MB4415:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR08MB4415B343ABB864105873934BE4169@VI1PR08MB4415.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(91956017)(66946007)(66556008)(26005)(64756008)(36756003)(76116006)(2906002)(508600001)(122000001)(66476007)(966005)(6486002)(66446008)(2616005)(186003)(7416002)(53546011)(5660300002)(71200400001)(6512007)(8936002)(54906003)(33656002)(6916009)(316002)(38100700002)(83380400001)(86362001)(38070700005)(4326008)(6506007)(8676002)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <7870A952BB73B742A99FECEE87B99B79@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB3506
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT034.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	072f1a04-267f-4fd2-2b2a-08da0b53ac0f
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(83380400001)(2906002)(107886003)(2616005)(36756003)(6862004)(8676002)(4326008)(70586007)(70206006)(26005)(53546011)(336012)(186003)(508600001)(6506007)(8936002)(36860700001)(47076005)(6512007)(33656002)(316002)(40460700003)(81166007)(86362001)(356005)(966005)(6486002)(54906003)(5660300002)(82310400004);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 15:58:59.3137
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: f4fd7039-83ff-4477-b3da-08da0b53b640
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT034.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB4415
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From xen-devel-bounces@lists.xenproject.org Mon Mar 21 16:19:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 16:19:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293083.497817 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWKkW-0003WO-3X; Mon, 21 Mar 2022 16:19:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293083.497817; Mon, 21 Mar 2022 16:19:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWKkV-0003WH-WF; Mon, 21 Mar 2022 16:19:16 +0000
Received: by outflank-mailman (input) for mailman id 293083;
 Mon, 21 Mar 2022 16:19:15 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=svEr=UA=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nWKkV-0003WB-0A
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 16:19:15 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a5465fd1-a932-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 17:19:13 +0100 (CET)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04lp2050.outbound.protection.outlook.com [104.47.12.50]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-29-cPj2GulUMBq1FF9povVZBw-1; Mon, 21 Mar 2022 17:19:11 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM5PR0401MB2657.eurprd04.prod.outlook.com (2603:10a6:203:38::20)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.22; Mon, 21 Mar
 2022 16:19:10 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a%6]) with mapi id 15.20.5081.022; Mon, 21 Mar 2022
 16:19:09 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a5465fd1-a932-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647879552;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=vF7+RCWQUPMXYp8VIDvk20+YCKQ76QYZ1wcXRGnK1uc=;
	b=SRQyCS1ziDno/74TbPE4XFM/d3t78NPbCBdnmZGvEjzzkZ2yWCTTT6VrzFOsga45cwjgch
	530GQvQqCGJ5huRsMgiR4e75NUsENIZpAJHt4UVs8fe+Z52W8ip0RVKxnBKXaY2ewK4RFx
	DHyPWXmak8h2/r/nXYXas+IW5MvoAEk=
X-MC-Unique: cPj2GulUMBq1FF9povVZBw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=hRg6OgfztXekEV1rUyP4vFU97XdZuLID/dBCi14Go5XTu5WaMVbCuuvguU21TpboDht9hn+nCS+e2rP7ccx+m6qhzHm6e/qqJmUD6O17AYkjEQIpWkZynbEHwI9iWk+iZ1mgf31sVBYMv/ns01Pyv2YCnmAFXBg/mzuTRldRodHWTPNGVi5ffJNMYxhDOvviiD5PmxU8ZVfP0/Jz5VRiGhT2mkF6QYXii0l+i1F7/ZKN/3iNQlKqXG6yJPEaPw5fcMgRp8lzEKDz00m4WzpJNFl52aQKOPjbz4kqeIgblvnjjlc2bxFRZZEFhYPIIvlEsuyl9NgkltWEQXHtubJOCg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=vF7+RCWQUPMXYp8VIDvk20+YCKQ76QYZ1wcXRGnK1uc=;
 b=C94FGcGPQQTzu5KDX0PR5ZlUdiy4UiH78LBEo3ixAYLheQQ+xHEp7Qk0EYWMs/ZR/sKs8BkvJwC2CXRCm4zA0/KQ/bAeAdXsn7ert3RTOlh8xeiqtqWpslK4OG2EnPkRpjxLE8HmYF+/QFy1ePvgyPXU1AQRqRwglg8XpkOB7t6mU76MJ2yoRtVHyp6WChRJ2REYszSZZmpp7Koc+ZY0yBH8h0twWOI2QHNuaBCw8rEt1lIZB76ZOr0b9efcdjT8sxWT4ErlYEkwniQJCr3qL47xl3pMwPP9GJ4xkJIMF9KY3amdlwAxsHCZMf6Bq6V23cRHo/j/yPt2PZ5YqqUz/w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <2ef7dd73-ea16-67a1-2710-14cbfcae0d0f@suse.com>
Date: Mon, 21 Mar 2022 17:19:07 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2] x86/vmx: save guest non-register state in hvm_hw_cpu
Content-Language: en-US
To: Tamas K Lengyel <tamas.k.lengyel@gmail.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>,
 Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian <kevin.tian@intel.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>, Wei Liu
 <wl@xen.org>, xen-devel@lists.xenproject.org
References: <e79bd13acfd73c105ee1399295c99cec153258c2.1647532323.git.tamas.lengyel@intel.com>
 <ca8f13e5-5e3e-e64f-2711-4730883a24fc@suse.com>
 <CABfawhn3-zRJ+m9nJsOGBL=8gkVmzOyE_ttuWJcSLd4UseLzXQ@mail.gmail.com>
 <dc3cc4f9-e1ba-b73e-9527-7a3a85043505@suse.com>
 <CABfawhmqZS5_gjpUxye2LvzcpS93Oj2U0-gsNfMBXjt3dLxrKQ@mail.gmail.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <CABfawhmqZS5_gjpUxye2LvzcpS93Oj2U0-gsNfMBXjt3dLxrKQ@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6PR05CA0023.eurprd05.prod.outlook.com
 (2603:10a6:20b:2e::36) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 509367e8-9271-4774-d9c4-08da0b56877e
X-MS-TrafficTypeDiagnostic: AM5PR0401MB2657:EE_
X-Microsoft-Antispam-PRVS:
	<AM5PR0401MB265783E56F23E82DA1268DF6B3169@AM5PR0401MB2657.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2906002)(6512007)(36756003)(6506007)(8676002)(54906003)(6916009)(316002)(31686004)(53546011)(6486002)(31696002)(5660300002)(66556008)(2616005)(508600001)(8936002)(186003)(83380400001)(26005)(86362001)(66946007)(4326008)(66476007)(38100700002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?dUgzaUtiQWV2cGdLMU1QbFA0SktqRUJmL0dCUjNBMXM3MEdiMXFrTkVjQ3ZV?=
 =?utf-8?B?VjQ2ZHVrMkhNQkpNVUtDWDRQSGhFQXNYNWtxSUhoU3JhbEFxMTBod2pwbEdh?=
 =?utf-8?B?SWNqRlVlY2FSYkgrUUxRbXlFdWxkMmxNRVBVemwvWkhFdE9EZ3Eyd01CNlY5?=
 =?utf-8?B?dnZhd0VVKzBUc3o1cVlacFU3T0UyVUZsWnE3VnFNZzVPYUY4djBBZlVjNXVs?=
 =?utf-8?B?ZUF6Y1pXQmlZcktCMzMyWnc1N2pqNHlBRzZOakxHOGF4NUNXM05PVHA3Yk1z?=
 =?utf-8?B?RnBZQVhpWS93eXVYdWo2K1hES0N3aFljdmdNb1dtY3laV3V2ZGRwdHFEZTdr?=
 =?utf-8?B?S3NHUlkvWStjK0xRSWRNVXBEdmtxSjVRaGJYVk1aSkNOekFleEdOTVkyMk9k?=
 =?utf-8?B?UEUvMG5XaGNyRzZ4dVhYSFU5ZEdqakNrR2VLUVQ1RXNGSSthdUp5K0Z1Q25Z?=
 =?utf-8?B?OTlOYkJVL2RJYXVMWjJFQmU3UFZqLy9kNEVVVlAybXlnbWZGei9OMnlhalJN?=
 =?utf-8?B?OGdZVXBRUi80MDdIWk5oY01uUHdmeHlPWmYxTGZVc3lZdms5bzc5eWF0K0RD?=
 =?utf-8?B?M1FOREFPdWVSbFA0dmFtODA1NVpmNjdiazJKS0UyaERQVUtpNEpwcEM5VUlx?=
 =?utf-8?B?S3ZRNEdZV205WGJNd1dwL0NwNkxLaFE0Wmp1SUpYMFlvb2Z5Q2JVZzFKeTNJ?=
 =?utf-8?B?dk9jUTdMQVRhRHY4MnA4c0h2ZE5sTkZCNmNnMXN4WkFGQUx2dHJOVU1NY2xR?=
 =?utf-8?B?K0d4N3J1T2Q5dWhZSTA0cVlUQVowQVhoa1lMZWx3NUFWNFpoWDd3YXF4WHp2?=
 =?utf-8?B?YSsvRWpFYkViRkk2YUJ0UFBhYTRZWnpIQnE1Znh4V3k1WDNpeFJsWFRVTS85?=
 =?utf-8?B?d0VIdUF0UFIreGhpWG1yVnhDN251ZVE5OWtuNFZpQ3loaGlTVmhLcVpodkYx?=
 =?utf-8?B?TlkvVzllbko2N1dFc0swbjVUSVBzMlIwaHdUMVhCNTN0U2Z6NE5qNE42bXcy?=
 =?utf-8?B?QmtnSmJoTm9vNmJ3ZG82TDFNTFJOQld4WWZqZ1RqMkx3Z1llK3YxQ1RJRzhs?=
 =?utf-8?B?TldBbkg1dlR1SU5NSll4SlNjRHkwSU0xWGdDZ2RmZEh5ajlpRHByMVEvTzds?=
 =?utf-8?B?ZVgzZkQ4Z1dSdkxLT3NHTVdtLzhGWFRvdlhIQWxydXNzdEVWTVBhSlVOWmE2?=
 =?utf-8?B?QzdjNkU5SW9ERkcwQnFnUXorelpSaDBNUUdha2tOUkw2WS9uVmVoSjAzbU1C?=
 =?utf-8?B?TmM0RWdtMDhsbDZ5VjJTcmVZYlhGanZTUThWL0xYTXR5U0pXUldKUWhOS3Np?=
 =?utf-8?B?cFlOK2h6ajhEOXl6M0MvaS9ublRjUWNPVXVzMWc0c1ZYc05FNUsrd0MramtW?=
 =?utf-8?B?OTZUL0pMRjgyR2t4SG9JOVVBOWpzYW9NUERJVlRkTDRYa0dVb1NTdTMyRGlE?=
 =?utf-8?B?Rlp1N2ZnR080dHlaRmZSRWlHYWdCQXJFVzNYNGF1Wi9oVis4LzI0dzlKVURI?=
 =?utf-8?B?QnNSYldkVmNtT2swSXlEejFFU01MVDNHMVFXVzVTcEhsSFB2NnZRaHM3c2xt?=
 =?utf-8?B?Snh4ZXRBekMrRlF3dHVMQlhXOVhvVUlFOFlHTG40ZWFZNWl6SFRpd2wxeGRq?=
 =?utf-8?B?KzA0UlY2R0xnbHUyWDZiN1JJWEZWMVcwRUJWNmJ0cHduTEZkY3lOYmN2WXRI?=
 =?utf-8?B?UGJnNitPUDQxOGg3TUZzVlA3M1h3WWRoWHh0Rm1Hbk1uS1ZORnloSm5paTMr?=
 =?utf-8?B?NTB2aDQzK1o4ODQ0WEl2S3hkb25jdGpxQjQ5MEdkMkNNWjBFeThKdWFiSjhE?=
 =?utf-8?B?WTFadVBTcTBGd3Y1Q3lsbUhkZnl5azg4T0VtV1V2M2VjZE1HWXc5M25GRFMy?=
 =?utf-8?B?RXk4Mjd6RDBJNUFFR2FqVG1Fa3I0RzFPSUdHcUp6K0FuL2QwTjhsWXpyRHlF?=
 =?utf-8?Q?45q76igN1wwj4JZ7rB8TpVFZw8W+klT0?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 509367e8-9271-4774-d9c4-08da0b56877e
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 16:19:09.8259
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 0h62B6kRgkue8ExLYETTKR0lTSo6gW2wD+6fdpgkTqshWQhU+tZXDH/wx+I9JPGMrTaHG/CDaxl+M4kHkfGJ3w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0401MB2657

On 21.03.2022 16:28, Tamas K Lengyel wrote:
> On Mon, Mar 21, 2022 at 10:58 AM Jan Beulich <jbeulich@suse.com> wrote:
>> On 21.03.2022 15:39, Tamas K Lengyel wrote:
>>> On Mon, Mar 21, 2022 at 8:16 AM Jan Beulich <jbeulich@suse.com> wrote:
>>>> On 17.03.2022 16:57, Tamas K Lengyel wrote:
>>>>> @@ -166,6 +167,11 @@ struct hvm_hw_cpu {
>>>>>  #define XEN_X86_FPU_INITIALISED         (1U<<_XEN_X86_FPU_INITIALISED)
>>>>>      uint32_t flags;
>>>>>      uint32_t pad0;
>>>>> +
>>>>> +    /* non-register state */
>>>>> +    uint32_t activity_state;
>>>>> +    uint32_t interruptibility_state;
>>>>> +    uint64_t pending_dbg;
>>>>>  };
>>>>
>>>> ... these fields now represent vendor state in a supposedly vendor
>>>> independent structure. Besides my wish to see this represented in
>>>> field naming (thus at least making provisions for SVM to gain
>>>> similar support; perhaps easiest would be to include these in a
>>>> sub-structure with a field name of "vmx"), I wonder in how far cross-
>>>> vendor migration was taken into consideration. As long as the fields
>>>> are zero / ignored, things wouldn't be worse than before your
>>>> change, but I think it wants spelling out that the SVM counterpart(s)
>>>> may not be added by way of making a VMX/SVM union.
>>>
>>> I wasn't aware cross-vendor migration is even a thing.
>>
>> It used to be a thing long ago; it may not work right now for no-one
>> testing it.
>>
>>> But adding a
>>> vmx sub-structure seems to me a workable route, we would perhaps just
>>> need an extra field that specifies where the fields were taken
>>> (vmx/svm) and ignore them if the place where the restore is taking
>>> place doesn't match where the save happened. That would be equivalent
>>> to how migration works today. Thoughts?
>>
>> I don't think such a field is needed, at least not right away, as
>> long as the respectively other vendor's fields are left zero when
>> storing the data. These fields being zero matches current behavior
>> of not communicating the values at all. A separate flag might be
>> needed if the receiving side would want to "emulate" settings from
>> incoming values from the respectively other vendor. Yet even then
>> only one of the two sets of fields could potentially be non-zero
>> (both being non-zero is an error imo); both fields being zero
>> would be compatible both ways. Hence it would be possible to
>> determine the source vendor without an extra field even then, I
>> would think.
>>
>> A separate flag would of course be needed if we meant to overlay
>> the vendors' data in a union. But as per my earlier reply I think
>> we're better off not using a union in this case.
> 
> Right, both structs being non-zero at the same time wouldn't make
> sense and would indicate corruption of the hvm save file. But I think
> the same would easily be achieved by defining a bit on the flags and
> then a union. If two vendor bits are set that would indicate an error
> without taking up the same with two separate structs. This is what I
> have right now and IMHO it looks good
> (https://xenbits.xen.org/gitweb/?p=people/tklengyel/xen.git;a=commitdiff;h=84f15b2e1bef6c901bbdf29a07c7904cb365c0b2):

Yeah, why not. With the separate flag all should be fine.

Jan

> --- a/xen/include/public/arch-x86/hvm/save.h
> +++ b/xen/include/public/arch-x86/hvm/save.h
> @@ -52,6 +52,7 @@ DECLARE_HVM_SAVE_TYPE(HEADER, 1, struct hvm_save_header);
>   * Compat:
>   *     - Pre-3.4 didn't have msr_tsc_aux
>   *     - Pre-4.7 didn't have fpu_initialised
> + *     - Pre-4.17 didn't have non-register state
>   */
> 
>  struct hvm_hw_cpu {
> @@ -163,9 +164,21 @@ struct hvm_hw_cpu {
>      uint32_t error_code;
> 
>  #define _XEN_X86_FPU_INITIALISED        0
> +#define _XEN_X86_VMX                    1
>  #define XEN_X86_FPU_INITIALISED         (1U<<_XEN_X86_FPU_INITIALISED)
> +#define XEN_X86_VMX                     (1U<<_XEN_X86_VMX)
>      uint32_t flags;
>      uint32_t pad0;
> +
> +    /* non-register state */
> +    union {
> +        /* if flags & XEN_X86_VMX */
> +        struct {
> +            uint32_t activity_state;
> +            uint32_t interruptibility_info;
> +            uint64_t pending_dbg;
> +        } vmx;
> +    };
>  };
> 
> Tamas
> 



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 16:26:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 16:26:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293091.497827 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWKro-0004ye-S6; Mon, 21 Mar 2022 16:26:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293091.497827; Mon, 21 Mar 2022 16:26:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWKro-0004yX-Oq; Mon, 21 Mar 2022 16:26:48 +0000
Received: by outflank-mailman (input) for mailman id 293091;
 Mon, 21 Mar 2022 16:26:47 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=hXdE=UA=intel.com=tamas.lengyel@srs-se1.protection.inumbo.net>)
 id 1nWKrn-0004yR-7I
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 16:26:47 +0000
Received: from mga12.intel.com (mga12.intel.com [192.55.52.136])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id b172581c-a933-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 17:26:44 +0100 (CET)
Received: from orsmga006.jf.intel.com ([10.7.209.51])
 by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 21 Mar 2022 09:26:41 -0700
Received: from gyin-mobl3.amr.corp.intel.com (HELO localhost.localdomain)
 ([10.209.151.149])
 by orsmga006-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 21 Mar 2022 09:26:40 -0700
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b172581c-a933-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;
  t=1647880004; x=1679416004;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=7iVL3k+HhOifsuFYCm7uluk2LbgfOS+rQVTGazYv1do=;
  b=aQtvT9+A0TmvHRu+YVkP/v/t6qk4BfK6yAT4WyqR5B0EUy3Zh7ciJaxc
   RFPaSAY+yr80AiZPA6elKiJnMYMknxVotwLAO8ycq8Jd0LZn5IW0W39iw
   qMqAC0ZQAi1et8Zy39G+7QcqU0TaWmy2SZWi5/qj9Cu5ENnFH0yFI6IQ9
   qdjGCCw83Sd8/8IdMsoX1CZ9obm+3tfIpq8PZFLldNrcYLbDxVCoqTsyE
   wk9Osf9OjRU40wZKplpxsNOJSfEDD4UTeHgQATA14LkD9+2evtih2vne+
   FxrtRtLO63lja0LJgTSo1v6i8Cq2Wjd6XN8HUAtJx+VF6iSIB652ew8X2
   g==;
X-IronPort-AV: E=McAfee;i="6200,9189,10293"; a="237534057"
X-IronPort-AV: E=Sophos;i="5.90,199,1643702400"; 
   d="scan'208";a="237534057"
X-IronPort-AV: E=Sophos;i="5.90,199,1643702400"; 
   d="scan'208";a="518497708"
From: Tamas K Lengyel <tamas.lengyel@intel.com>
To: xen-devel@lists.xenproject.org
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>,
	Jun Nakajima <jun.nakajima@intel.com>,
	Kevin Tian <kevin.tian@intel.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>
Subject: [PATCH v3] x86/vmx: save guest non-register state in hvm_hw_cpu
Date: Mon, 21 Mar 2022 12:26:17 -0400
Message-Id: <84f15b2e1bef6c901bbdf29a07c7904cb365c0b2.1647879687.git.tamas.lengyel@intel.com>
X-Mailer: git-send-email 2.25.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

During VM forking and resetting a failed vmentry has been observed due
to the guest non-register state going out-of-sync with the guest register
state. For example, a VM fork reset right after a STI instruction can trigger
the failed entry. This is due to the guest non-register state not being saved
from the parent VM, thus the reset operation only copies the register state.

Fix this by including the guest non-register state in hvm_hw_cpu so that when
its copied from the parent VM the vCPU state remains in sync.

SVM is not currently wired-in as VM forking is VMX only and saving non-register
state during normal save/restore/migration operation hasn't been needed. If
deemed necessary in the future it can be wired in by adding a svm-substructure
to hvm_hw_cpu.

Signed-off-by: Tamas K Lengyel <tamas.lengyel@intel.com>
---
v3: Add XEN_X86_VMX flag and vmx-substructure in hvm_hw_cpu
v2: Include all CPU non-register state and fold the ops into vmx_vmcs_save &
    vmx_vmcs_restore.
Note: no sanity checking is performed on the fields to reduce the cycles during
      fuzzing.
---
 xen/arch/x86/hvm/vmx/vmx.c             | 17 ++++++++++++++++-
 xen/include/public/arch-x86/hvm/save.h | 13 +++++++++++++
 2 files changed, 29 insertions(+), 1 deletion(-)

diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
index c075370f64..6da3842d6e 100644
--- a/xen/arch/x86/hvm/vmx/vmx.c
+++ b/xen/arch/x86/hvm/vmx/vmx.c
@@ -713,7 +713,7 @@ static void vmx_restore_dr(struct vcpu *v)
 
 static void vmx_vmcs_save(struct vcpu *v, struct hvm_hw_cpu *c)
 {
-    unsigned long ev;
+    unsigned long ev, activity_state, intr_info;
 
     vmx_vmcs_enter(v);
 
@@ -721,6 +721,10 @@ static void vmx_vmcs_save(struct vcpu *v, struct hvm_hw_cpu *c)
     __vmread(GUEST_SYSENTER_ESP, &c->sysenter_esp);
     __vmread(GUEST_SYSENTER_EIP, &c->sysenter_eip);
 
+    __vmread(GUEST_ACTIVITY_STATE, &activity_state);
+    __vmread(GUEST_INTERRUPTIBILITY_INFO, &intr_info);
+    __vmread(GUEST_PENDING_DBG_EXCEPTIONS, &c->vmx.pending_dbg);
+
     __vmread(VM_ENTRY_INTR_INFO, &ev);
     if ( (ev & INTR_INFO_VALID_MASK) &&
          hvm_event_needs_reinjection(MASK_EXTR(ev, INTR_INFO_INTR_TYPE_MASK),
@@ -732,6 +736,10 @@ static void vmx_vmcs_save(struct vcpu *v, struct hvm_hw_cpu *c)
     }
 
     vmx_vmcs_exit(v);
+
+    c->vmx.activity_state = activity_state;
+    c->vmx.interruptibility_info = intr_info;
+    c->flags |= XEN_X86_VMX;
 }
 
 static int vmx_restore_cr0_cr3(
@@ -807,6 +815,13 @@ static int vmx_vmcs_restore(struct vcpu *v, struct hvm_hw_cpu *c)
 
     __vmwrite(GUEST_DR7, c->dr7);
 
+    if ( c->flags & XEN_X86_VMX )
+    {
+        __vmwrite(GUEST_ACTIVITY_STATE, c->vmx.activity_state);
+        __vmwrite(GUEST_INTERRUPTIBILITY_INFO, c->vmx.interruptibility_info);
+        __vmwrite(GUEST_PENDING_DBG_EXCEPTIONS, c->vmx.pending_dbg);
+    }
+
     if ( c->pending_valid &&
          hvm_event_needs_reinjection(c->pending_type, c->pending_vector) )
     {
diff --git a/xen/include/public/arch-x86/hvm/save.h b/xen/include/public/arch-x86/hvm/save.h
index 773a380bc2..0f728aa5d9 100644
--- a/xen/include/public/arch-x86/hvm/save.h
+++ b/xen/include/public/arch-x86/hvm/save.h
@@ -52,6 +52,7 @@ DECLARE_HVM_SAVE_TYPE(HEADER, 1, struct hvm_save_header);
  * Compat:
  *     - Pre-3.4 didn't have msr_tsc_aux
  *     - Pre-4.7 didn't have fpu_initialised
+ *     - Pre-4.17 didn't have non-register state
  */
 
 struct hvm_hw_cpu {
@@ -163,9 +164,21 @@ struct hvm_hw_cpu {
     uint32_t error_code;
 
 #define _XEN_X86_FPU_INITIALISED        0
+#define _XEN_X86_VMX                    1
 #define XEN_X86_FPU_INITIALISED         (1U<<_XEN_X86_FPU_INITIALISED)
+#define XEN_X86_VMX                     (1U<<_XEN_X86_VMX)
     uint32_t flags;
     uint32_t pad0;
+
+    /* non-register state */
+    union {
+        /* if flags & XEN_X86_VMX */
+        struct {
+            uint32_t activity_state;
+            uint32_t interruptibility_info;
+            uint64_t pending_dbg;
+        } vmx;
+    };
 };
 
 struct hvm_hw_cpu_compat {
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 16:36:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 16:36:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293094.497838 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWL13-0006Ro-NB; Mon, 21 Mar 2022 16:36:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293094.497838; Mon, 21 Mar 2022 16:36:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWL13-0006Rh-K9; Mon, 21 Mar 2022 16:36:21 +0000
Received: by outflank-mailman (input) for mailman id 293094;
 Mon, 21 Mar 2022 16:36:19 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nWL11-0006Rb-M7
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 16:36:19 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWL11-0002te-3Z; Mon, 21 Mar 2022 16:36:19 +0000
Received: from [54.239.6.185] (helo=[192.168.25.135])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWL10-00077g-Sv; Mon, 21 Mar 2022 16:36:19 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=poN5Rh58EY4NwUmRQmcfmZQsHhvFLXwan8txZV/Bfdw=; b=IQY+fNtF+aUTUIeksnespoW/1P
	JDOJQXjFhnBmaARcOHKL0HDcIcumMF0ymD66FkAn0IaRgLhpvtFNw+uJ5bQBH6lbpGB+iJhD6FvUf
	oNHlHClHu61uZZsTGUxcpIOfuOIpHnyuenDlZqvLjpXJExsXUazhmagCaMVerlrFbgK0=;
Message-ID: <9f3d7713-4e4b-58f8-d7a1-b42ef152a7ab@xen.org>
Date: Mon, 21 Mar 2022 16:36:16 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
To: Luca Fancellu <Luca.Fancellu@arm.com>
Cc: Xen-devel <xen-devel@lists.xenproject.org>,
 Bertrand Marquis <Bertrand.Marquis@arm.com>, Wei Chen <Wei.Chen@arm.com>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Wei Liu <wl@xen.org>, Juergen Gross <jgross@suse.com>,
 Dario Faggioli <dfaggioli@suse.com>
References: <20220318152541.7460-1-luca.fancellu@arm.com>
 <20220318152541.7460-5-luca.fancellu@arm.com>
 <274f81b0-c164-4437-3d05-243e147330a9@xen.org>
 <0FA7F6D7-0B40-4B75-9752-7FE48D0FCA5C@arm.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <0FA7F6D7-0B40-4B75-9752-7FE48D0FCA5C@arm.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi,

On 21/03/2022 15:58, Luca Fancellu wrote:
> 
> 
>> On 18 Mar 2022, at 16:12, Julien Grall <julien@xen.org> wrote:
>>
>> Hi Luca,
>>
>> I only skimmed through the series. I have one question below:
>>
>> On 18/03/2022 15:25, Luca Fancellu wrote:
>>> +void __init btcpupools_allocate_pools(void)
>>> +{
>>> +    unsigned int i;
>>> +    bool add_extra_cpupool = false;
>>> +
>>> +    /*
>>> +     * If there are no cpupools, the value of next_pool_id is zero, so the code
>>> +     * below will assign every cpu to cpupool0 as the default behavior.
>>> +     * When there are cpupools, the code below is assigning all the not
>>> +     * assigned cpu to a new pool (next_pool_id value is the last id + 1).
>>> +     * In the same loop we check if there is any assigned cpu that is not
>>> +     * online.
>>> +     */
>>> +    for ( i = 0; i < nr_cpu_ids; i++ )
>>> +        if ( cpumask_test_cpu(i, &cpu_online_map) )
>>> +        {
>>> +            /* Unassigned cpu gets next_pool_id pool id value */
>>> +            if ( pool_cpu_map[i] < 0 )
>>> +            {
>>> +                pool_cpu_map[i] = next_pool_id;
>>> +                add_extra_cpupool = true;
>>> +            }
>>> +            printk(XENLOG_INFO "Logical CPU %u in Pool-%u.\n", i,
>>> +                   pool_cpu_map[i]);
>>> +        }
>>> +        else
>>> +        {
>>> +            if ( pool_cpu_map[i] >= 0 )
>>> +                panic("Pool-%d contains cpu%u that is not online!\n",
>>> +                      pool_cpu_map[i], i);
>>> +        }
>>> +
>>> +    if ( add_extra_cpupool )
>>> +        next_pool_id++;
>>> +
>>> +    /* Create cpupools with selected schedulers */
>>> +    for ( i = 0; i < next_pool_id; i++ )
>>> +        cpupool_create_pool(i, pool_sched_map[i]);
>>> +
>>> +#ifdef CONFIG_X86
>>> +    /* Cpu0 must be in cpupool0 for x86 */
>>> +    if ( pool_cpu_map[0] != 0 )
>>> +        panic("Cpu0 must be in Pool-0\n");
>>> +#endif
>>
>> Can you document why this is necessary on x86 but not on other architectures?
> 
> Hi Julien,
> 
> I received the warning by Juergen here: https://patchwork.kernel.org/comment/24740762/ that at least on x86 there could be
> some problems if cpu0 is not in cpupool0, I tested it on arm and it was working fine and I didn’t find any restriction.

What exactly did you test on Arm?

> 
> So I don’t know why on x86 we must have cpu0 in cpupool0, maybe x86 maintainer have more knowledge about that and
> I can put a comment here.

On Arm, we are not yet supporting all the CPU features that x86 supports 
(e.g. CPU hotplug, suspend/resume...). So I a am bit concerned that the 
restriction is just not there yet (or possibly hidden).

Therefore, before lifting the restriction on Arm (and other arch), I 
would like us to understand why it is necessary on x86.

We may not have the answer quickly, so is it going to be a problem to 
keep the restriction on Arm?

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 16:40:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 16:40:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293097.497850 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWL5V-0007rz-9J; Mon, 21 Mar 2022 16:40:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293097.497850; Mon, 21 Mar 2022 16:40:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWL5V-0007rs-5K; Mon, 21 Mar 2022 16:40:57 +0000
Received: by outflank-mailman (input) for mailman id 293097;
 Mon, 21 Mar 2022 16:40:56 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=svEr=UA=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nWL5U-0007rm-4N
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 16:40:56 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ad52addd-a935-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 17:40:55 +0100 (CET)
Received: from EUR02-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur02lp2050.outbound.protection.outlook.com [104.47.6.50]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-26-_K_zkShZOEeQQiRKMQMDlA-1; Mon, 21 Mar 2022 17:40:53 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by VI1PR04MB6863.eurprd04.prod.outlook.com (2603:10a6:803:12f::9)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.22; Mon, 21 Mar
 2022 16:40:51 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a%6]) with mapi id 15.20.5081.022; Mon, 21 Mar 2022
 16:40:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ad52addd-a935-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647880854;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=JfZqOObITnHks2qi+5ymyLUquPTDq6tZg3/gvToYs6s=;
	b=B9/+LIyn8mml56EEmRlNoX9s0JjNoZKuZLd197UJ/lV74+Bq8CvXXD2vxpNtf48vyi2wgD
	pM2g+a5GWoak41IOoJiGOBwZjSyFM6vjAgRhyGM7s77EqR2zRQ6e0+jf8LnI+vaUj9RHj4
	f9FweZENWa6U7wGdTatxe2MauwvNvps=
X-MC-Unique: _K_zkShZOEeQQiRKMQMDlA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=CmW+omQ16DAlTqQhmBrxq5YGBbhVUYwnWRpLPzEHszHVgvtb4jzI5iXH9KGUjs6TsxCxbftjOSF9ogLIZstyd16mM7xQEi8f5lSq1Le6lt/0rjXurA+13nIUfL5ZEqbgocKzHh5YT131fc79rOxZXeyfSPIOqnroicv7JuWP8U8Fq4WFp3oz9w8EKSN/EPOfPG0WFuhFadf/4iuPd3QG/LA/iTaJkIyS9AAs28jZQwkhWVi99kZ0FnnJHthCW0GlKC4MsMslkYv6b4Ad+iEn31rQcyCujmjFFe18DAMNrADGocvOVtuwZOtSC18pxz1hEoQ8ZEytzsI/9X4yZ3iKsg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=JfZqOObITnHks2qi+5ymyLUquPTDq6tZg3/gvToYs6s=;
 b=lIX/AwzYvPaGyQ8Fer6rEQd8R+qQhq227d1QJHtVm9aFrFBPZuGJSMXChjoVREhm8hiH+J1NxriTbBji6qHZgS72npmIecLzFmIetL+upPylYzE4FAcpZRN85+/WfEnsnZuT5sTHtJ513sEpECuihl9BZrI64Vqo+tF7aIF10/3E8SFVUx0TMpgZZBrgqtbdKMtku3BeLA7St677nta7zx+X5wzbhGqwnD8unPXuPJ5cWyo93s/HMiZi0FgoUEoPL55XlyF/GHL3V5TLHeoV9d2jQwUeQMGofi+loh8BPf8KAU3Ve0JDbuSj+dVrkKRKtuIM1SXC/1qsW+J8SRBc9A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <90cf10b5-b0de-4589-f1a6-f8c392c924f1@suse.com>
Date: Mon, 21 Mar 2022 17:40:49 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v3] x86/vmx: save guest non-register state in hvm_hw_cpu
Content-Language: en-US
To: Tamas K Lengyel <tamas.lengyel@intel.com>
Cc: Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian <kevin.tian@intel.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>, Wei Liu
 <wl@xen.org>, xen-devel@lists.xenproject.org
References: <84f15b2e1bef6c901bbdf29a07c7904cb365c0b2.1647879687.git.tamas.lengyel@intel.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <84f15b2e1bef6c901bbdf29a07c7904cb365c0b2.1647879687.git.tamas.lengyel@intel.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P193CA0091.EURP193.PROD.OUTLOOK.COM
 (2603:10a6:209:88::32) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 96bcfcc9-5a08-47d4-f62e-08da0b598f8a
X-MS-TrafficTypeDiagnostic: VI1PR04MB6863:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB68633E4F882C30162465E061B3169@VI1PR04MB6863.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2906002)(186003)(26005)(38100700002)(53546011)(66946007)(6506007)(6512007)(66556008)(4326008)(8676002)(2616005)(5660300002)(66476007)(83380400001)(54906003)(6916009)(36756003)(508600001)(31696002)(8936002)(4744005)(316002)(31686004)(86362001)(6486002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?VlIzQlZZREZ2ZjJvYStLd21mb0hPYTlhREtLN1I0Y3ByajNDRzR0OUZLdWhC?=
 =?utf-8?B?RTl5bHg1REZVRDVjWjFOaHlJV0w1SzBFM0VoTFlNU25tMmZpOVZURGQ4WElR?=
 =?utf-8?B?TGN2czRHTnhXYmFsUTR3Z1htZlRlZFoveXIveWc3dm1uRWhkZVZyRHpQNFB6?=
 =?utf-8?B?VG0rbmkzL2c1ZS95aWUyQmVlL2hhTU4vbXhDVU1BYlVRTE5Kc0grWStJYXJE?=
 =?utf-8?B?UTQ2ZWdYRnFlbDNPcllLNFQ0MFhNNytnS1YyeG1GS25kR3VvYWZUZ0trZDNL?=
 =?utf-8?B?NGtDa2ZLN1FJNjFLWk9vRDJOOGNXOUVpdmcraDdQVVF5UEMyZVFNOWJWVkNm?=
 =?utf-8?B?elZpVnZWd2laQndZM3VmRVp0ZFkrbXFkakpEWitxcHlnM0tENDVFVGVsQkV6?=
 =?utf-8?B?V3E1UCt6QU03dElOdklmQWFZNEJCK0NWZ3NCRkFzUzdTbWQ1c2hSdFkxQmFm?=
 =?utf-8?B?MzF6M0xIQkt2Tk8rWHhjcUVPRVhzNzVVcXBTT01XMXJxYTQxaVBrVmRwZGZD?=
 =?utf-8?B?eURKQkFuaVJkZFYwQWxtM0ovdEc1UVRWOU8wamRCbE5WdXZQZlQxUjFPYWJi?=
 =?utf-8?B?cFF0eU9acy85U3ZoNU13Ti9keXFjRUUwMVVReVBGU3BRb0FvMDJCSkFZcmV5?=
 =?utf-8?B?QnkrMWJ3MCtRWDc3ZlpaVHhHZlVyb05QQlM3RTlZZnd5allNL1ZvMm1ydmNQ?=
 =?utf-8?B?ZXRFQU1DQ1ZDVXJDTkxNYVY3SDJXUEhIY0FFeFRiZEhxeUFUbjk2OG9yRFJm?=
 =?utf-8?B?YTUzVUh1MW5vSVVKejU3UWNpWmExN3ZOL05CSitQWGtMZ3ZCMlBkMXVheVAy?=
 =?utf-8?B?dEdXSFJNZFY0TFBIZkM1alBCRGFpL1FvTVQ0STdQejJVNytFZXFNVWU5aDd0?=
 =?utf-8?B?NktRMGIxUjJEQ1dLOFFwWGMyVVFOcytrS3FRc1dwTllsTnFpZ25WVGlsZzNJ?=
 =?utf-8?B?WWtNRk90MHYxdGNGWm04dDYxTFcraHRkc3l1a0VYb1lvcnVvaW1XSmNIUnlZ?=
 =?utf-8?B?bU9tclpOak9DVGNVQUhzS1R1dWF6YXJiWm9DRFRPWUxHOEJzOHBaY091dWRW?=
 =?utf-8?B?RUtxd3N2b3FJRktPY2dncmxLdkFTekZ5Q2Y0VExIUXhHRHcvVGZQeGlpdFhV?=
 =?utf-8?B?ZU1OZVpRTXptOVl6SWhva25aL1lRaUhYVGxGUkNlY3RUcHlYZFJ0b2xXTy9Z?=
 =?utf-8?B?K003M3U1ZHllcmpNRXhEbTVRdzd3UVRZUnYyZUoyYk5XNkpsalFZZkZhaVB6?=
 =?utf-8?B?UGoySVJ2cHViclBacEVmeWlzeGZmZW53dmRNRVZNRVVtY1BQZ3ArSFdnQWhz?=
 =?utf-8?B?SjE0dnRKcGMrNldYWGgwblJjYWczVE5XWFpTbFhSa3RuZEFiSmJYd2pTdGEw?=
 =?utf-8?B?Y3FERms1RnVTa2IwMGFGVGdFTWVwbkVtZEhtekZXNjVZaU0xL2F0LzBZaEY5?=
 =?utf-8?B?SVR2dDBjSndhSW9sVkJFTFFYUndsVFMwb1VhbHJsNVNFK045cDhsbWVTc1Jo?=
 =?utf-8?B?VEpSeTRQcHZ6S2JuVW52anQ0NytrVWlxaDk1TllRQjJNZHpaOXFSSExvaGow?=
 =?utf-8?B?L0k3TVNxVUVvVjFkRjVMMnRHaGZVSUR6dWlWWXZ1SXh2eVNJcjVPY2dhK2xP?=
 =?utf-8?B?Ky9OTXRXY3lSQUl6bE5WQlVpTm11WEFzQzhtZTVORGRvY1NZekpsRGJRcXJG?=
 =?utf-8?B?Ly96ZmxQMmVTY1ZYQ2xDUjg2c0RtK0F4SkI1OERRQTFxVy9kRitIYnN1T0ly?=
 =?utf-8?B?SU13RXZpdGN4K0lZOUFzWW5xNGI5YjhMdWFqYmV6aHBEZjk0N0NnelpJZEVI?=
 =?utf-8?B?clREbnFVNUUzOENTZ1RUZ1pmSWpDbE1zRXNuVkJWYi81eDJ4SGI0c2JLeC9z?=
 =?utf-8?B?L2lSbzBsN3JnWnBjOExKYUUyWFZqQ1N0WGwrNGg4MGV1NFAwRWhOUk5jVTM4?=
 =?utf-8?Q?ERiTEUrPQ1ebJ5mm3WGB+dJw1YLU3nRW?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 96bcfcc9-5a08-47d4-f62e-08da0b598f8a
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 16:40:51.5527
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: GEen9btvI1gSvUzNwASCBTN79MQPDL5nBEOS+fWWTMmzGa7QM+3ejrzY4MPq1lpLVMCzzYWILSwfwJ9A4MWHfQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB6863

On 21.03.2022 17:26, Tamas K Lengyel wrote:
> During VM forking and resetting a failed vmentry has been observed due
> to the guest non-register state going out-of-sync with the guest register
> state. For example, a VM fork reset right after a STI instruction can trigger
> the failed entry. This is due to the guest non-register state not being saved
> from the parent VM, thus the reset operation only copies the register state.
> 
> Fix this by including the guest non-register state in hvm_hw_cpu so that when
> its copied from the parent VM the vCPU state remains in sync.
> 
> SVM is not currently wired-in as VM forking is VMX only and saving non-register
> state during normal save/restore/migration operation hasn't been needed. If
> deemed necessary in the future it can be wired in by adding a svm-substructure
> to hvm_hw_cpu.
> 
> Signed-off-by: Tamas K Lengyel <tamas.lengyel@intel.com>

Reviewed-by: Jan Beulich <jbeulich@suse.com>



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 16:55:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 16:55:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293110.497865 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWLJb-00016H-M7; Mon, 21 Mar 2022 16:55:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293110.497865; Mon, 21 Mar 2022 16:55:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWLJb-00016A-JD; Mon, 21 Mar 2022 16:55:31 +0000
Received: by outflank-mailman (input) for mailman id 293110;
 Mon, 21 Mar 2022 16:55:30 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWLJa-000160-SE; Mon, 21 Mar 2022 16:55:30 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWLJa-0003F4-PG; Mon, 21 Mar 2022 16:55:30 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWLJa-0006Vr-FF; Mon, 21 Mar 2022 16:55:30 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWLJa-0004ZJ-Em; Mon, 21 Mar 2022 16:55:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=fALh4n7WP6rqm5SFi15/MwG3T0LKwhEjadttHMqIYqw=; b=krG8kTalyD0IBmTf8AR40TqpX6
	sf3y3Ny6u7/ZgRDna8hG6wVa7w3cswzS4pDGEKZAO7MsX/ZPcXPHtuNYmBty+pERVgm6dRW6A1yQ+
	yyNTC7eLvwmZRqlEAwtWgxHVPz95WtT2NjPD8K2OiypLMXNy4HZR2zfz17Z3q5cAJ+5c=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168757-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168757: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 21 Mar 2022 16:55:30 +0000

flight 168757 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168757/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   21 days
Failing since        168258  2022-03-01 01:55:31 Z   20 days  214 attempts
Testing same since   168738  2022-03-21 02:39:18 Z    0 days   13 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 859 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 17:20:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 17:20:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293153.497898 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWLhI-0004ri-VW; Mon, 21 Mar 2022 17:20:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293153.497898; Mon, 21 Mar 2022 17:20:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWLhI-0004rb-SA; Mon, 21 Mar 2022 17:20:00 +0000
Received: by outflank-mailman (input) for mailman id 293153;
 Mon, 21 Mar 2022 17:19:59 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=HByp=UA=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nWLhH-0004rV-Fw
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 17:19:59 +0000
Received: from EUR02-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur02on0614.outbound.protection.outlook.com
 [2a01:111:f400:fe06::614])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 21e42719-a93b-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 18:19:58 +0100 (CET)
Received: from FR3P281CA0010.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:1d::9) by
 VI1PR08MB3600.eurprd08.prod.outlook.com (2603:10a6:803:85::11) with
 Microsoft
 SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14; Mon, 21 Mar 2022 17:19:54 +0000
Received: from VE1EUR03FT032.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:d10:1d:cafe::ae) by FR3P281CA0010.outlook.office365.com
 (2603:10a6:d10:1d::9) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.15 via Frontend
 Transport; Mon, 21 Mar 2022 17:19:54 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT032.mail.protection.outlook.com (10.152.18.121) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Mon, 21 Mar 2022 17:19:54 +0000
Received: ("Tessian outbound 826a6d8e58c3:v113");
 Mon, 21 Mar 2022 17:19:53 +0000
Received: from 66b25b662af0.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 49B8C7F8-8CE9-4BD6-9E7B-F28439C3DDCB.1; 
 Mon, 21 Mar 2022 17:19:43 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 66b25b662af0.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Mon, 21 Mar 2022 17:19:42 +0000
Received: from AM0PR08MB3778.eurprd08.prod.outlook.com (2603:10a6:208:104::24)
 by PAXPR08MB6463.eurprd08.prod.outlook.com (2603:10a6:102:157::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.19; Mon, 21 Mar
 2022 17:19:40 +0000
Received: from AM0PR08MB3778.eurprd08.prod.outlook.com
 ([fe80::a857:4da:bb40:96dc]) by AM0PR08MB3778.eurprd08.prod.outlook.com
 ([fe80::a857:4da:bb40:96dc%6]) with mapi id 15.20.5081.022; Mon, 21 Mar 2022
 17:19:40 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 21e42719-a93b-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=YnE7Q1HVCAfMp+GsTmO8+lyaDeda8GLWEWGTk+z4Wek=;
 b=p8Yq6VgLctc2LFo29AndjPTAqsJkZOujgT4PPiHTh/cXaQT8ix2smdrFpl1QbMObk9zguoy+F8uZMECWUz49W/lukQysftau0LlbvgQ305feCPXJaZiG+JtZc+KsLZ59WB3goTUwYE9oezianrGBpU3DZfXI6frmX67PzYqJOxU=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: e8d669e14ec3c208
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=YcTvyNsQUwz9fjHwjGXPpQojKQtUS0oNGJnvLGaoU2xSni6RtsutlFqoEz5gzDjOSoD0KSsQ1XAkj5YXp+B8JiUo5QeguTiCmLukWyAEE3WmMC2yYvEp5ckmmH4hanvQTdAKbV8644UrWRp+wuOjppLMPLT5H5qtnOFOLrQui0fpakmuM8PJDbVbAlHZ4LZgg9Fh/95Y+41otmqLDObiV8oy0W8iQ45MzFX79TuFFZsbiWvPeXzGeGJ4YmnRM73JJSRDX8mgm9RcdE4tqo8uSp8DQq8QL7t9cGvTISduIC+UVlmT/ybduKegA/INIRNNescZwD8Pmp/IXiqpt3e6Rw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=YnE7Q1HVCAfMp+GsTmO8+lyaDeda8GLWEWGTk+z4Wek=;
 b=aaWwCCycQg9xpkY8TFqbr4G0RWaqQdKWyROKCHWJRn9lJPXeTSqIiI3jI0kI0QSP3RPEzQtx2Fcp0DS08JPyNZtUKFOxQrsQYYJQdcSkeCsPpNsx6n2d20DOmeoZYnaahB1X5wIvKRKeFu2cTJtwmVP4OXJsOrMqTR82c9Kf26ifTp6sFNb9RxTUQIiYyvegUbDaBaz6kJ520nNADyNyKHN+bHXWTiSK8R0FprdIBU+BPTHLGAAhbj2o6FvinkJuAGpcGIY7jUtp/dVuHe7/7EHFhnOnWAdV+T2JD795bUvat/ScPOTuAQgJvgvCgDDXq8If7IOt1q+tp3DPNA63Ug==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=YnE7Q1HVCAfMp+GsTmO8+lyaDeda8GLWEWGTk+z4Wek=;
 b=p8Yq6VgLctc2LFo29AndjPTAqsJkZOujgT4PPiHTh/cXaQT8ix2smdrFpl1QbMObk9zguoy+F8uZMECWUz49W/lukQysftau0LlbvgQ305feCPXJaZiG+JtZc+KsLZ59WB3goTUwYE9oezianrGBpU3DZfXI6frmX67PzYqJOxU=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Julien Grall <julien@xen.org>
CC: Luca Fancellu <Luca.Fancellu@arm.com>, Xen-devel
	<xen-devel@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>, Stefano
 Stabellini <sstabellini@kernel.org>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>, Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>, Juergen Gross <jgross@suse.com>, Dario Faggioli
	<dfaggioli@suse.com>
Subject: Re: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Topic: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Index: AQHYOtyBwlLK7ts4vEKxgpEPsRlgQ6zFUCoAgASzLwCAAAp/AIAADB+A
Date: Mon, 21 Mar 2022 17:19:40 +0000
Message-ID: <05E14D52-831A-438F-9F90-99F590A5A15F@arm.com>
References: <20220318152541.7460-1-luca.fancellu@arm.com>
 <20220318152541.7460-5-luca.fancellu@arm.com>
 <274f81b0-c164-4437-3d05-243e147330a9@xen.org>
 <0FA7F6D7-0B40-4B75-9752-7FE48D0FCA5C@arm.com>
 <9f3d7713-4e4b-58f8-d7a1-b42ef152a7ab@xen.org>
In-Reply-To: <9f3d7713-4e4b-58f8-d7a1-b42ef152a7ab@xen.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 21b51560-e134-45bf-7167-08da0b5f03f4
x-ms-traffictypediagnostic:
	PAXPR08MB6463:EE_|VE1EUR03FT032:EE_|VI1PR08MB3600:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR08MB3600C3DB3A0DB0346008789A9D169@VI1PR08MB3600.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3778.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(83380400001)(38100700002)(86362001)(6512007)(33656002)(6506007)(6486002)(508600001)(966005)(71200400001)(2906002)(122000001)(91956017)(38070700005)(64756008)(4326008)(8676002)(66946007)(76116006)(66446008)(66476007)(66556008)(53546011)(2616005)(36756003)(5660300002)(186003)(54906003)(6916009)(7416002)(316002)(8936002)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <05E7C44D6B717E40A190A09D4CB14EAF@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB6463
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT032.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	520e7621-d8d7-4555-dee5-08da0b5efbc6
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(86362001)(26005)(186003)(5660300002)(53546011)(316002)(83380400001)(33656002)(6506007)(6512007)(336012)(82310400004)(2906002)(36756003)(356005)(2616005)(40460700003)(70586007)(6862004)(4326008)(8676002)(70206006)(47076005)(36860700001)(81166007)(8936002)(508600001)(107886003)(54906003)(6486002)(966005);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Mar 2022 17:19:54.0295
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 21b51560-e134-45bf-7167-08da0b5f03f4
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT032.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB3600
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=


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 17:36:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 17:36:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293164.497913 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWLxc-0007HK-I5; Mon, 21 Mar 2022 17:36:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293164.497913; Mon, 21 Mar 2022 17:36:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWLxc-0007HD-EJ; Mon, 21 Mar 2022 17:36:52 +0000
Received: by outflank-mailman (input) for mailman id 293164;
 Mon, 21 Mar 2022 17:36:51 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=/75o=UA=yahoo.com=akm2tosher@srs-se1.protection.inumbo.net>)
 id 1nWLxa-0007H7-TB
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 17:36:51 +0000
Received: from sonic301-32.consmr.mail.ne1.yahoo.com
 (sonic301-32.consmr.mail.ne1.yahoo.com [66.163.184.201])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 7c4e8147-a93d-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 18:36:49 +0100 (CET)
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic301.consmr.mail.ne1.yahoo.com with HTTP; Mon, 21 Mar 2022 17:36:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 7c4e8147-a93d-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1647884207; bh=73uONmc275LnbOxDWXF2nCK5O5LnqwfdnFK4OpdeDMs=; h=Date:From:To:Subject:References:From:Subject:Reply-To; b=AlEKvvY2L5hXssxAeSZfmAits6hGy5Ie9c+/sZSdYnU4unHRxUWpJr5/6hMN4GeokRQ96JctpkiXFQOTurFScLpvUg08eWXqoyXdI7ar10n/SpMSYsbvzgTYLGP4/hmhViWx/VaHnAygLaSO2/H4jTJ3rNo+yXyVRCrjNrgWlPmBFaN4y72RGdoW6Y8kmMdCTPtZXB9CwDDkNlEBlT3HsXH243j++PEQHwGh0K8H3C6aq6gISMAjPL0jXjBgGRXWOIxhvTdiAE/nVYtdYsbDfFOKB7YV8VScZhxyyy1ggznZ+F5xNofr9EkGhpj/kb/GKmoiMRDm580H4JViShWW7g==
X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1647884207; bh=EVO8nECGOFHv+r6tNZxiFwDmyWBX+Ac0KYgjosvOHJH=; h=X-Sonic-MF:Date:From:To:Subject:From:Subject; b=tyP2Y76xqbKzesOoyQV/7La/TZ7lCrhpcIAeQugjwHjiD01CM9XnWbBpWbvPq+QfCuD5c6DFKGZ67BMz1AvEueG+r7l6djEGc1alkcxFgZB0uAxj1NZ3pMma9TpNDCR1FrKdr11GNvWQxzjJGo/FngqMsqwLOYpp3p95WqfUZ+OQ5TxXCsbmPzmALl02rjhKhZfIPalG3Exdz4JWbwFWGzRWe+y/+60O5r8YlbojmPALyrN3v1g+ZV7rK3+CLQbpdgzpH1JdaD8Uh83f3+/rA3l0qkVjXn45wiLJ9Q3am2rUNf+nuDq75NrIa8fntdzoJUmbAtnnwYnetd1H8zsrcA==
X-YMail-OSG: 6cYRSgwVM1kISSiTrmvM9vmWXtrjwk4kc1H7DHwI9drI6feGO8D623jpq3OgZVO
 6lh6sZfwd7q0kamJQ7k_LrF7VW_NkKW9VUXk7HdUmaCvDFQxXSOtuYbJoB25JbDunL9dAUJTv74A
 OdHjgRbrWBQ.ifKkhSnUq0O9Pbu_yiHZr6bwkdycm_80web3vY_ev1Oi4VJm1OFssNDT015xekCz
 Qyhx_x1GgQi2hFcAg7YCCAsjOmZLllYM.QiyyeMxU8zzQ5XC59GjDO.HmvDa4r52aVGMbebHXZTL
 0mXU9CF.aLXtZtITrxokPSKzUz9zwovm4rFTebsMsUu_pY_I5C__dPmGt7iNBpMd3zLCqgB_nf3l
 53SuhAL064pnxUdXabXv1BzOelVq1FdjX63HdgR7CVw9DrXYnsZhL28RFCpXtchpUYnbaW_EjBT2
 fYdT2HXO1b1zEZh.2t6Q4TH0Us.lXxRzfLKD_Ii.QflnsGhoYeUrPtLlTcDM3WIrkBv5XKxmTRdA
 H60KKW1VGDi6PRW0wWpc6rZeE7w1N5E2FFxXWwvJ9JTxI.bzPb_PrGS1Qq3JIqQA.sGyAagMaAhA
 oQuSr84cTsnYvf8Sz3YECV2cgNDQ.PcH6gfrr25MvpdvuNBjxZbMuyE_hTpH8qydYNpzpmSoRtIB
 xZxPbtaynMYIVndC1H6IosjArwIfBptx2kZMknVf0du00clSJ67Yld2KOMHKf5qRHWU2Yza4HTUO
 EhOx1gvITivCf3sI.hCiEK5Lk4knw1fRo16m1qTYMQsxybbw6wXYzox9_KAWNvvOHIxMefE3on.C
 ws9F6mRa_ba1PeNMVvF7O3v73p2Bhac8OIJX2aMh7L.JBLshjvQ.7MfVGwfi81NXoPpdLcww8NuO
 V_yRrbgYwvIYKBe5zXzldSWJQd4F4DN1kdigJ0QS62ebglC4YkslqoapBpp7MknOnwb6igUPPYmR
 K1tPfBwLgGlIXEq7Qf3qUNoTRIiDxglTz68iEEsHpw4PvKXDSJDAiCt8R4ismpgrEDXYAqtwsx_d
 aHcqWNpbVXgZpqJDMUrcPk7f9BjBQBhxIw1xhfww6rdmGAXLpQT6We2htMnpFq6qyK_BQJl88wcB
 zaaoL7gw787bwpnKUJTYGmU5HvtyBmwx26jV0py34s5P6Wn15qSK0PCulPK_UQDsFf8AhLzkYg8w
 Y1us94mpPCkPSqEvM4ZsuGKvBCiAULpVltXNgZdirVYN_M4atvLyP0wz1oRzQe4FQaB97e_mbqcP
 Gck.RWcaIkioZz6MqXLarE5Le2GQNeVwBqF0fOYSfLFI42MFPRO8EKWbYCkcBn0Pj.1Ar2IH7BXf
 1_XLSIRon4q.SIf8gZ64Z8qA7M8.fzR_iC7PAays8msQTeQtBtkukgQEn4zEMDOHwQv7vnZkCP5s
 BPEmchKd_0Npi2LG3G5mxyjbXBzqxWe.3HmvuhBrVGuRU6lIkynUhR1M.Zd_.otbSyebIvX6btf6
 ZqlL.lBLLIoYYSypYZ680sKlLED2jO1qPnx.Bd2rDs5PJ8_Hv5oZNTLgC2FrCU39rCmDEEivIeJl
 T8gX.xNnJjZcKRVs9pkNX8.PC6fnslOBScv5m1SUued7pMExPLI6wjzU5f_LDzNrM9kpxPHJkCQK
 ZY_5lLbebjTSh5hy0orzLrs8EhvfnWAu5ht0FzcOyBfEFVPIDyuE6C6tJYd_NMvrY0TgF4EEtrnp
 YbP3FaXuZQIgYi8ODHt6i1UGWQ_gwC7TY2zAa.NCn43pKxU0p5lStqc90pnRgYy_jAqBC5p2igRC
 rIMpkJjwZ1QBgb_kSSYhDU20f6jbmsZWYgjHreTrYEjFvb81dore6QhEOH6gdBHmcmrAjs_v7Exg
 ehzubWl7o48I24ZVLAGKB6hBBAADZkelogU4qY.jxqSPEKEkpTCo8e_HOvjeiy.L74XP.9Wqd50P
 O2sh6w90J9b6ZNoYCyOUUSamYHp4jCYF8ZPytrUXTsunIyM8ZIDq3KlsiGtKSW40AsrPshfW47M6
 l.zgFr9XPAL_8fv1YnWyTAzZLwU6CRzR9SLLONq.8Qdotanm8ILlHBrK9FspgCogdWLK1V7rTMpA
 8xyQrtv5oZUcSTxOq1PtQPBw9m8vVDBOqx_jfI0VoiBx9kTqAPzpo_H33rlxvUwK2SiKwXkRegN4
 6NOxJkWjtd0TtWruB4lPhdf8Ua1ugmmRydfhOWfY77YNa1FLC249225NlWPnT5lHCBqdTXRhERzq
 d9fjUd8z1iquRsVxMicpk6Yb_3dR0U2VpUPHTkJSKSZ8bkN2BPDtrQLM20r3Q8zyhSC3_
X-Sonic-MF: <akm2tosher@yahoo.com>
Date: Mon, 21 Mar 2022 17:36:43 +0000 (UTC)
From: tosher 1 <akm2tosher@yahoo.com>
To: Xen-devel <xen-devel@lists.xenproject.org>
Message-ID: <791301742.1443931.1647884203750@mail.yahoo.com>
Subject: Requesting Xen community's feedback on unikernelized driver domains
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
References: <791301742.1443931.1647884203750.ref@mail.yahoo.com>
X-Mailer: WebService/1.1.19894 YMailNorrin
Content-Length: 964

Hello,

This email is to request Xen community's feedback on our work on implementi=
ng Xen=E2=80=99s driver domains using the unikernel virtual machine model (=
as opposed to using general-purpose OSs like Linux) to reduce the attack su=
rface, among other benefits. The effort, called Kite, has implemented drive=
r domains for network and storage PV drivers using NetBSD=E2=80=99s rumprun=
 unikernel.

Details of the work are available in a paper that will soon appear at the 2=
022 ACM European Conference on Computer Systems (EuroSys=E2=80=9922), avail=
able here:=C2=A0https://www.ssrg.ece.vt.edu/papers/eurosys22.pdf.

Kite=E2=80=99s source code is available at:=C2=A0https://github.com/ssrg-vt=
/kite/.

We would love to hear the community=E2=80=99s thoughts and feedback.

Thank you, and looking forward,

Mehrab


P.S. This email is cross-posted in xen-users mailing list (https://lists.xe=
nproject.org/archives/html/xen-users/2022-03/msg00013.html).


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 17:45:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 17:45:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293167.497924 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWM5Y-0000Hy-Az; Mon, 21 Mar 2022 17:45:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293167.497924; Mon, 21 Mar 2022 17:45:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWM5Y-0000Hp-7x; Mon, 21 Mar 2022 17:45:04 +0000
Received: by outflank-mailman (input) for mailman id 293167;
 Mon, 21 Mar 2022 17:45:03 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nWM5X-0000Hi-7B
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 17:45:03 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWM5W-00044H-9c; Mon, 21 Mar 2022 17:45:02 +0000
Received: from [54.239.6.185] (helo=[192.168.25.135])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWM5W-0007po-2V; Mon, 21 Mar 2022 17:45:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=lijRk9/U9soX0YbANxtCVtCbbVpgEjftleHspy9y3Hc=; b=a5hYeSgmg/3jnCHKXfE1+MiCco
	X+kHHPmY7rISLyy1jvYWunOd5IaYT0mHkAqfoHg9Zv+UTQbcjLeBNNoVnvkWiM95bjsZJlS2iAHBl
	QTAhIy6BESnG5Z3nE9SJf36Re2bmdSeOhXpuSeNGd09y3sqIpQfi+/haaN1ejsIpQXbQ=;
Message-ID: <108443e0-c7d7-af6d-2183-b1bd48b0f288@xen.org>
Date: Mon, 21 Mar 2022 17:44:59 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
To: Bertrand Marquis <Bertrand.Marquis@arm.com>
Cc: Luca Fancellu <Luca.Fancellu@arm.com>,
 Xen-devel <xen-devel@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Wei Liu <wl@xen.org>, Juergen Gross <jgross@suse.com>,
 Dario Faggioli <dfaggioli@suse.com>
References: <20220318152541.7460-1-luca.fancellu@arm.com>
 <20220318152541.7460-5-luca.fancellu@arm.com>
 <274f81b0-c164-4437-3d05-243e147330a9@xen.org>
 <0FA7F6D7-0B40-4B75-9752-7FE48D0FCA5C@arm.com>
 <9f3d7713-4e4b-58f8-d7a1-b42ef152a7ab@xen.org>
 <05E14D52-831A-438F-9F90-99F590A5A15F@arm.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <05E14D52-831A-438F-9F90-99F590A5A15F@arm.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi Bertrand,

On 21/03/2022 17:19, Bertrand Marquis wrote:
>> On 21 Mar 2022, at 17:36, Julien Grall <julien@xen.org> wrote:
>>> So I don’t know why on x86 we must have cpu0 in cpupool0, maybe x86 maintainer have more knowledge about that and
>>> I can put a comment here.
>>
>> On Arm, we are not yet supporting all the CPU features that x86 supports (e.g. CPU hotplug, suspend/resume...). So I a am bit concerned that the restriction is just not there yet (or possibly hidden).
>>
>> Therefore, before lifting the restriction on Arm (and other arch), I would like us to understand why it is necessary on x86.
>>
>> We may not have the answer quickly, so is it going to be a problem to keep the restriction on Arm?
> 
> I am ok to keep the limitation to have dom0 always running on cpu0.
> Only limitation I can see is that on a big little system, dom0 needs to stay on the type of core of the first booted core.

Where does this limitation come from?

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 18:19:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 18:19:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293171.497935 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWMcc-0003pY-45; Mon, 21 Mar 2022 18:19:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293171.497935; Mon, 21 Mar 2022 18:19:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWMcc-0003pR-0s; Mon, 21 Mar 2022 18:19:14 +0000
Received: by outflank-mailman (input) for mailman id 293171;
 Mon, 21 Mar 2022 18:19:12 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWMca-0003pH-Ge; Mon, 21 Mar 2022 18:19:12 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWMca-0004iM-7H; Mon, 21 Mar 2022 18:19:12 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWMcZ-0002is-SQ; Mon, 21 Mar 2022 18:19:11 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWMcZ-0004WC-Rw; Mon, 21 Mar 2022 18:19:11 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Lm7Nau8Jw3//mgMqyFxfkMgpkorrWvfQ163oo4Vh408=; b=GGPNMVn0pGKsxN/+XEAbu1tCUc
	FTR0Wxp6VCqP7LWuU5P+1KJdec3urGd/e8zoUIB3FEmIUNIRBqcE1NAp3fIOWI9AlOuUSMITwsub9
	yHnwe7/fwDczkfAgNir/378OdVcMFh7SuuwU+EdGucAWP40W0d+0DBzg6almFFjgOko0=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168758-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168758: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 21 Mar 2022 18:19:11 +0000

flight 168758 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168758/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   21 days
Failing since        168258  2022-03-01 01:55:31 Z   20 days  215 attempts
Testing same since   168738  2022-03-21 02:39:18 Z    0 days   14 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 859 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 19:29:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 19:29:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293178.497947 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWNiS-0002OV-CE; Mon, 21 Mar 2022 19:29:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293178.497947; Mon, 21 Mar 2022 19:29:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWNiS-0002OO-6y; Mon, 21 Mar 2022 19:29:20 +0000
Received: by outflank-mailman (input) for mailman id 293178;
 Mon, 21 Mar 2022 19:29:19 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=/V3S=UA=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nWNiR-0002OI-0p
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 19:29:19 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org
 [2604:1380:4641:c500::1])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 32241420-a94d-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 20:29:17 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 662C56090B;
 Mon, 21 Mar 2022 19:29:15 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 7BC8FC340E8;
 Mon, 21 Mar 2022 19:29:14 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 32241420-a94d-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647890954;
	bh=YmRk3pcKDcwiiwsrZMi5xSQuySKVN0dhJnDyoyA4Qqs=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=e/0chRDKdEHDM6N2rHX0oezLXx0WU9k1UiBWmAbSTCPuF8nqIu/XBPYy3cImsNMLL
	 X9pzEKOi/T2/9KYx21OA2o2nqBBUyilqiNBAXO/gJBh1h5kWvioXJdJC88imTro2QV
	 /uNLIeRuuTli+M5ocao13fEqMLohkwGY/cZ0S6MfYYneEs7VcW6bWOhWyqp5+lzzsv
	 avTJRKvoL+qMGEq+pbSrRskmFpi3Np0sOP85jXJCRliEoz2t0ZxXU6BmsRiP59C8Gu
	 vdIEI7PTCEPABfp+Z+Cw7G2McHSNmGJKYAqrGvKglCPIFQshFVd9Tu9YJyFEuq0fSm
	 IuNiDnbLhMm+g==
Date: Mon, 21 Mar 2022 12:29:14 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Julien Grall <julien@xen.org>
cc: Stefano Stabellini <sstabellini@kernel.org>, bertrand.marquis@arm.com, 
    Volodymyr_Babchuk@epam.com, 
    Stefano Stabellini <stefano.stabellini@xilinx.com>, 
    "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH] xen/arm: skip first 32 bytes of zimage32
In-Reply-To: <1a8ed108-7485-1ed5-3819-fd921164662b@xen.org>
Message-ID: <alpine.DEB.2.22.394.2203211214030.2910984@ubuntu-linux-20-04-desktop>
References: <20220320010509.3605525-1-sstabellini@kernel.org> <33f1ea14-4486-be3d-ca9f-a82274078dba@xen.org> <1a8ed108-7485-1ed5-3819-fd921164662b@xen.org>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="8323329-1810709212-1647890955=:2910984"

  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--8323329-1810709212-1647890955=:2910984
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8BIT

On Sun, 20 Mar 2022, Julien Grall wrote:
> On 20/03/2022 07:47, Julien Grall wrote:
> > On 20/03/2022 01:05, Stefano Stabellini wrote:
> > > From: Stefano Stabellini <stefano.stabellini@xilinx.com>
> > > 
> > > The first 32 bytes of zImage32 are NOPs, not useful just there for
> > > compatibility. The reason is that some bootloaders skip the first 32
> > > bytes when starting the kernel. See the comment in Linux
> > > arch/arm/boot/compressed/head.S.
> > 
> > Please mention the Linux verson.
> >
> > > Since the introduction of CONFIG_EFI in Linux arm32, those NOPs
> > > operations have changed implementation from:
> > > 
> > >      mov r0, r0
> > > 
> > > to:
> > >      .inst   MZ_MAGIC | (0x1310 << 16)   @ tstne r0, #0x4d000
> > 
> > I have duplicated the comment and the instructions below:
> > 
> >                  @ This is a two-instruction NOP, which happens to bear the
> >                  @ PE/COFF signature "MZ" in the first two bytes, so the
> > kernel
> >                  @ is accepted as an EFI binary. Booting via the UEFI stub
> >                  @ will not execute those instructions, but the ARM/Linux
> >                  @ boot protocol does, so we need some NOPs here.
> >                  .inst   MZ_MAGIC | (0xe225 << 16)       @ eor r5, r5,
> > 0x4d000
> >                  eor     r5, r5, 0x4d000                 @ undo previous
> > insn
> > 
> > 
> > I read this as they are NOPs and this change should not break the ARM/Linux
> > boot protocol (we are using it in Xen).
> > 
> > BTW, the instruction decoding is different compare to me. Which version of
> > Linux are you using?
> > 
> > > 
> > > See arch/arm/boot/compressed/efi-header.S.
> > > 
> > > The new implementation doesn't work on Xen (at least on all versions of
> > > QEMU I tried).
> > 
> > As I wrote above, they are NOPs. So why is this breaking?
> 
> I have tried to boot the latest Linux (commit 14702b3b2438) with CONFIG_EFI=y
> on QEMU (commit fa435db8ce1d). This booted for me.
>
> As I wrote earlier today, the instruction used as NOPs is slightly different.
> So I had a look at the git history and found the following commit:
> 
> commit a92882a4d270
> Author: Andre Przywara <andre.przywara@arm.com>
> Date:   Mon Nov 22 16:28:43 2021 +0100
> 
>     ARM: 9159/1: decompressor: Avoid UNPREDICTABLE NOP encoding
> 
>     In the decompressor's head.S we need to start with an instruction that
>     is some kind of NOP, but also mimics as the PE/COFF header, when the
>     kernel is linked as an UEFI application. The clever solution here is
>     "tstne r0, #0x4d000", which in the worst case just clobbers the
>     condition flags, and bears the magic "MZ" signature in the lowest 16 bits.
> 
>     However the encoding used (0x13105a4d) is actually not valid, since bits
>     [15:12] are supposed to be 0 (written as "(0)" in the ARM ARM).
>     Violating this is UNPREDICTABLE, and *can* trigger an UNDEFINED
>     exception. Common Cortex cores seem to ignore those bits, but QEMU
>     chooses to trap, so the code goes fishing because of a missing exception
>     handler at this point. We are just saved by the fact that commonly (with
>     -kernel or when running from U-Boot) the "Z" bit is set, so the
>     instruction is never executed. See [0] for more details.
> 
>     To make things more robust and avoid UNPREDICTABLE behaviour in the
>     kernel code, lets replace this with a "two-instruction NOP":
>     The first instruction is an exclusive OR, the effect of which the second
>     instruction reverts. This does not leave any trace, neither in a
>     register nor in the condition flags. Also it's a perfectly valid
>     encoding. Kudos to Peter Maydell for coming up with this gem.
> 
>     [0]
> https://lore.kernel.org/qemu-devel/YTPIdbUCmwagL5%2FD@os.inf.tu-dresden.de/T/
> 
>     Link:
> https://lore.kernel.org/linux-arm-kernel/20210908162617.104962-1-andre.przywara@arm.com/T/
> 
> So this is a bug in the kernel that has nothing to do with Xen.
> 
> Therefore, I am not in favor to workaround it in Xen. Where did you get your
> kernel from? If this from a distro, then please work with them to ingest the
> above patch.

Unfortunately all the kernels I tried failed without the Xen fix.

This is the list of kernels that I tried and failed:

- Debian Buster
- Debian Bullseye
- vanilla 4.9
- vanilla 4.10

The latest Alpine Linux kernel also doesn't boot, but that one doesn't
boot even with the fix for other reason. (More in the other email.)


>From a Xen gitlab-ci perspective, we just need a kernel that works.
Ideally, we wouldn't rebuild our own but reuse an existing kernel
because that is one less things to maintain in the gitlab-ci build.

We have a couple of options to make progress on the QEMU32 gitlab-ci
test:

1) use Debian Jessie in gitlab-ci and do not commit the Xen-side fix,
   file a Debian bug and revisit the situation in a couple of months
   (Debian might get the fix in the meantime)

2) commit the Xen fix and use Debian Bullseye right now

3) do not commit the Xen fix and build our own kernel now


All of these options work. My preference is 1) or 2).

Between 1) and 2) I have a slight preference for 2) for this reason: I
know that in Open Source we try to fix bugs wherever they are (kernel
project, QEMU project, Debian project) rather than working around them,
but in this case it looks like there is a significant amount of binaries
out there that require an update before they can boot on Xen. I think it
is one of those times where it is worth considering the Xen fix, or
should I say workaround, if it is considered harmless.
--8323329-1810709212-1647890955=:2910984--


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 19:39:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 19:39:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293182.497957 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWNs7-0003uB-8r; Mon, 21 Mar 2022 19:39:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293182.497957; Mon, 21 Mar 2022 19:39:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWNs7-0003u4-4u; Mon, 21 Mar 2022 19:39:19 +0000
Received: by outflank-mailman (input) for mailman id 293182;
 Mon, 21 Mar 2022 19:39:18 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nWNs6-0003ty-9h
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 19:39:18 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWNry-000610-IB; Mon, 21 Mar 2022 19:39:10 +0000
Received: from [54.239.6.185] (helo=[192.168.25.135])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWNry-0006g9-BG; Mon, 21 Mar 2022 19:39:10 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=JLKIfciC9iPoqeblrLuo5Sef61/6SOcqi35akwVPCy4=; b=04Kbusa0ty8lH0ncvvys+wPxTR
	XlsqJIgOQeVmyXzPD5zdt07Z6vr/E4J+PCfHe/ws8xa3G3cPStu/Ee795nyxioHLx4oFL77ieX+2S
	X/+kWfqAlNX8ePl0QgB0koVJtomaIjKZauAhqO85kvH+DVfDYeEsEk5J267Ylyjx1f/c=;
Message-ID: <6fd422b6-db1f-094e-2529-341974cf537a@xen.org>
Date: Mon, 21 Mar 2022 19:39:07 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH 1/3] xen/arm: Add i.MX lpuart driver
To: Peng Fan <peng.fan@nxp.com>, "Peng Fan (OSS)" <peng.fan@oss.nxp.com>,
 "sstabellini@kernel.org" <sstabellini@kernel.org>,
 "Volodymyr_Babchuk@epam.com" <Volodymyr_Babchuk@epam.com>,
 "bertrand.marquis@arm.com" <bertrand.marquis@arm.com>
Cc: "andrew.cooper3@citrix.com" <andrew.cooper3@citrix.com>,
 "george.dunlap@citrix.com" <george.dunlap@citrix.com>,
 "jbeulich@suse.com" <jbeulich@suse.com>, "wl@xen.org" <wl@xen.org>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 "van.freenix@gmail.com" <van.freenix@gmail.com>
References: <20220228010711.11566-1-peng.fan@oss.nxp.com>
 <20220228010711.11566-2-peng.fan@oss.nxp.com>
 <5fc8a6a2-450a-d9c3-b241-e1a950ac2933@xen.org>
 <DU0PR04MB9417AF562F57364C0051D42088139@DU0PR04MB9417.eurprd04.prod.outlook.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <DU0PR04MB9417AF562F57364C0051D42088139@DU0PR04MB9417.eurprd04.prod.outlook.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Peng,

On 18/03/2022 05:23, Peng Fan wrote:
>> Subject: Re: [PATCH 1/3] xen/arm: Add i.MX lpuart driver
>> On 28/02/2022 01:07, Peng Fan (OSS) wrote:
>>> From: Peng Fan <peng.fan@nxp.com>
>>> +
>>> +    imx_lpuart_write(uart, UARTDATA, c); }
>>> +
>>> +static int imx_lpuart_getc(struct serial_port *port, char *pc) {
>>> +    struct imx_lpuart *uart = port->uart;
>>> +    int ch;
>>> +
>>> +    while ( !(imx_lpuart_read(uart, UARTSTAT) & UARTSTAT_RDRF))
>>> +        barrier();
>>
>> Same remark about the barrier.
>>
>> However, rather than waiting, shouldn't we check the watermark instead and
>> return 0 if there are no character to read?
> 
> We normally check status bit to check whether there are data to read.

I guess by "we", you mean the caller. In which case, there is at least 
one (i.e. serial_getc()) that will not check the status before calling 
getc(). Instead, it will wait if the helper returns 0.

Looking at the other UART driver, none of them seem to busy loop. So, at 
least for consistency, we should avoid the busy loop here.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 19:41:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 19:41:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293185.497968 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWNtv-0005Jn-KD; Mon, 21 Mar 2022 19:41:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293185.497968; Mon, 21 Mar 2022 19:41:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWNtv-0005Jg-GU; Mon, 21 Mar 2022 19:41:11 +0000
Received: by outflank-mailman (input) for mailman id 293185;
 Mon, 21 Mar 2022 19:41:10 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nWNtu-0005JW-P2
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 19:41:10 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWNtm-00064U-U9; Mon, 21 Mar 2022 19:41:02 +0000
Received: from [54.239.6.185] (helo=[192.168.25.135])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWNtm-0006j3-Nj; Mon, 21 Mar 2022 19:41:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=Lwb+Ud3rxoFVzhlAe7JZt98Dev9ugj1ZkrtGoWn9cMQ=; b=B5mEm0pWKYIJOFDtRjuINKOqaR
	GTsAkqNYp3liMtJma56GpwcLO7YlUNPeMm5eIJelflhXuDfdjSlsjDuOFDZDHfmNg8mCpZdpC3v1c
	jTU+HYlNneGdOVurWt5aHN85DPIunqe5ITt55Ouysuiye3+HPM667iO7sILcCyCLpjjI=;
Message-ID: <e32d757b-e14d-51e2-d621-8c67990e19f6@xen.org>
Date: Mon, 21 Mar 2022 19:41:00 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH 3/3] xen/arm: Add i.MX8QM platform support
To: Peng Fan <peng.fan@nxp.com>, "Peng Fan (OSS)" <peng.fan@oss.nxp.com>,
 "sstabellini@kernel.org" <sstabellini@kernel.org>,
 "Volodymyr_Babchuk@epam.com" <Volodymyr_Babchuk@epam.com>,
 "bertrand.marquis@arm.com" <bertrand.marquis@arm.com>
Cc: "andrew.cooper3@citrix.com" <andrew.cooper3@citrix.com>,
 "george.dunlap@citrix.com" <george.dunlap@citrix.com>,
 "jbeulich@suse.com" <jbeulich@suse.com>, "wl@xen.org" <wl@xen.org>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 "van.freenix@gmail.com" <van.freenix@gmail.com>
References: <20220228010711.11566-1-peng.fan@oss.nxp.com>
 <20220228010711.11566-4-peng.fan@oss.nxp.com>
 <e55f32f9-4d24-77a9-026b-201536c73708@xen.org>
 <DU0PR04MB9417B86346491B63442D234D88139@DU0PR04MB9417.eurprd04.prod.outlook.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <DU0PR04MB9417B86346491B63442D234D88139@DU0PR04MB9417.eurprd04.prod.outlook.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Peng,

On 18/03/2022 05:24, Peng Fan wrote:
>> Subject: Re: [PATCH 3/3] xen/arm: Add i.MX8QM platform support
>> On 28/02/2022 01:07, Peng Fan (OSS) wrote:
>>> +static const char * const imx8qm_dt_compat[] __initconst = {
>>> +    "fsl,imx8qm",
>>> +    NULL
>>> +};
>>> +
>>> +PLATFORM_START(imx8qm, "i.MX 8")
>>> +    .compatible = imx8qm_dt_compat,
>>> +PLATFORM_END
>>
>> We are only adding new platform definition when quirks are necessary. Do
>> you need specific quirks for the i.MX8QM?
>>
>> A somewhat related question, is this series enough to boot Xen upstream on
>> the board?
> 
> Boot xen upstream, no need specific quirk.

That's great to hear! Then this file should not be necessary at all. 
Please drop it.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 19:48:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 19:48:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293189.497979 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWO0Q-00061d-B6; Mon, 21 Mar 2022 19:47:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293189.497979; Mon, 21 Mar 2022 19:47:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWO0Q-00061W-7z; Mon, 21 Mar 2022 19:47:54 +0000
Received: by outflank-mailman (input) for mailman id 293189;
 Mon, 21 Mar 2022 19:47:52 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=/V3S=UA=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nWO0O-00061Q-Gx
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 19:47:52 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ca24a57b-a94f-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 20:47:51 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 7B67960EC7;
 Mon, 21 Mar 2022 19:47:49 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 77DD0C340E8;
 Mon, 21 Mar 2022 19:47:48 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ca24a57b-a94f-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647892068;
	bh=bvbwWkdCzHlz8Pg22uJFUMHYRmW1OXELfyL5dOl96Ok=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=TX4J3hxAVWirvkaHtExKV9gNjMkzPbKVb7sY4UQDPlcny7NtOjMuQ46wumcZ8BE0m
	 n+UXoRfU5Kx0sM13ppXwOyrvUUT7nI73wzz8FE8TXSoa303VI5wysdXw/k/iWKh9eI
	 LofD/vN2/N/grhTyif91GrhKCT5f7P64No0FBpt5aPwZKENSMyT9E5sh6SkxYpSmOr
	 RFziI9Gi86iNxN1ppRmlbuCczM2/zNP9GqeAiWKAwQ+eBjmNpJy5v8RXrEopEeo8os
	 92FXbsYvxnYU4Um0/k4tP1u6coTOoPLMVf13iccy1ynjmEa6sqmXffWsn+/T+o3hRC
	 N2ga7LCQUuu+g==
Date: Mon, 21 Mar 2022 12:47:48 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Julien Grall <julien@xen.org>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    xen-devel@lists.xenproject.org, cardoe@cardoe.com, wl@xen.org, 
    andrew.cooper3@citrix.com, anthony.perard@citrix.com, 
    bertrand.marquis@arm.com, 
    Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: Re: [PATCH v3 2/2] gitlab-ci: add an ARM32 qemu-based smoke test
In-Reply-To: <684d65b8-5de4-779c-d869-bac28e073091@xen.org>
Message-ID: <alpine.DEB.2.22.394.2203211229430.2910984@ubuntu-linux-20-04-desktop>
References: <alpine.DEB.2.22.394.2203181729490.2910984@ubuntu-linux-20-04-desktop> <20220319003221.3012314-2-sstabellini@kernel.org> <alpine.DEB.2.22.394.2203191842280.2910984@ubuntu-linux-20-04-desktop> <684d65b8-5de4-779c-d869-bac28e073091@xen.org>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Sun, 20 Mar 2022, Julien Grall wrote:
> On 20/03/2022 01:46, Stefano Stabellini wrote:
> > On Fri, 18 Mar 2022, Stefano Stabellini wrote:
> > > Add a minimal ARM32 smoke test based on qemu-system-arm, as provided by
> > > the test-artifacts qemu container. The minimal test simply boots Xen
> > > (built from previous build stages) and Dom0. The test is fetching the
> > > Dom0 kernel and initrd from Debian Jessie: they work just fine and this
> > > way we don't have to maintain a build for them too.
> > 
> > 
> > Thanks to the Xen fix recently submitted
> > (https://marc.info/?l=xen-devel&m=164774063802402) I'll be able to
> > update this script to use Debian Bullseye. I am thinking of merging the
> > below directly with this patch.
> > 
> > 
> > ---
> > 
> > automation: upgrade Debian to Bullseye for testing Xen aarch32
> > 
> > Also change initrd. As the new netboot initrd from Debian Bullseye is
> > huge (22MB), use a tiny initrd from Alpine Linux instead (only 2.5MB).
> 
> This is sounds odd to me. So we are going to use Bullseye but not really
> because we want to use a different initrd.
> 
> Why can't you get everything from the same place?

Because it doesn't work :-(


> > Also note that the huge Debian Bullseye initrd would cause QEMU to
> > crash due to the -device loader parameter.
> 
> Can you provide more details? Was this reported to QEMU?

QEMU core dumps when provided with the Debian Bullseye initrd binary to
load. I guessed it was due to the size and tried with a smaller size.
Everything worked with a smaller initrd. I also think that it is not a
good idea to use a 22MB initrd anyway so decided against the Debian
Bullseye initrd. (For reference 22MB is basically the size of a fully
featured Yocto-build rootfs.) I did not file a bug to qemu-devel yet and
didn't investigate further on the QEMU side as I ran out of time.

Alpine Linux provides a very nice 2.5MB initrd. I tried to use both
kernel and initrd from Alpine Linux but unfortunately the Alpine Linux
kernel doesn't boot. I don't know why but I think it is because it might
be missing the console driver. I am not sure. There are a lot of
combinations that don't work and it is time consuming to investigate
them all. I have been trying to investigate only the most critical
things -- they are too many! 

I should add that the Debian initrd is not the ideal initrd because it
is made to start the Debian installer. Here we just want a tiny busybox
initrd.

In general, I think it would be better if we could use the kernel and
initrd from the same source but I couldn't find one that works. I could
build one myself but it would be one more thing to maintain in
gitlab-ci. Also using u-boot might solve the problem of loading the
binary but again we would have to maintain a u-boot arm32 build in
gitlab-ci.

So in order of preference best to worst in my opinion:

1) kernel and initrd from the same source
2) kernel and initrd from different sources
3) build your own kernel/initrd/u-boot

So I ended up doing 2). I tested it and it is sufficient to get the test
up and running.

 
> > Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
> > 
> > diff --git a/automation/scripts/qemu-smoke-arm32.sh
> > b/automation/scripts/qemu-smoke-arm32.sh
> > index 162922ace5..d554de7939 100755
> > --- a/automation/scripts/qemu-smoke-arm32.sh
> > +++ b/automation/scripts/qemu-smoke-arm32.sh
> > @@ -5,11 +5,20 @@ set -ex
> >   export DEBIAN_FRONTENT=noninteractive
> >   apt-get -qy update
> >   apt-get -qy install --no-install-recommends device-tree-compiler \
> > -                                            curl
> > +                                            curl \
> > +                                            cpio
> >     cd binaries
> > -curl --fail --silent --show-error --location --output vmlinuz
> > http://http.us.debian.org/debian/dists/jessie/main/installer-armhf/current/images/netboot/vmlinuz
> > -curl --fail --silent --show-error --location --output initrd.gz
> > http://http.us.debian.org/debian/dists/jessie/main/installer-armhf/current/images/netboot/initrd.gz
> > +# Use the kernel from Debian
> > +curl --fail --silent --show-error --location --output vmlinuz
> > http://http.us.debian.org/debian/dists/bullseye/main/installer-armhf/current/images/netboot/vmlinuz
> > +# Use a tiny initrd based on busybox from Alpine Linux
> > +curl --fail --silent --show-error --location --output initrd.tar.gz
> > https://dl-cdn.alpinelinux.org/alpine/v3.15/releases/armhf/alpine-minirootfs-3.15.1-armhf.tar.gz
> > +
> > +mkdir rootfs
> > +cd rootfs
> > +tar xvzf ../initrd.tar.gz
> > +find . | cpio -H newc -o | gzip > ../initrd.gz
> > +cd ..
> >     kernel=`stat -L --printf="%s" vmlinuz`
> >   initrd=`stat -L --printf="%s" initrd.gz`
> > @@ -68,5 +77,5 @@ timeout -k 1 240 \
> >      -device loader,file=./initrd.gz,addr=0x3200000 |& tee smoke.serial
> >     set -e
> > -(grep -q "^BusyBox" smoke.serial) || exit 1
> > +(grep -q "^/ #" smoke.serial) || exit 1
> >   exit 0



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 19:50:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 19:50:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293195.497989 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWO3M-0007SJ-Sq; Mon, 21 Mar 2022 19:50:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293195.497989; Mon, 21 Mar 2022 19:50:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWO3M-0007SC-Ps; Mon, 21 Mar 2022 19:50:56 +0000
Received: by outflank-mailman (input) for mailman id 293195;
 Mon, 21 Mar 2022 19:50:55 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=/V3S=UA=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nWO3L-0007S6-BV
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 19:50:55 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 37e71f3e-a950-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 20:50:54 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 6831AB819BC;
 Mon, 21 Mar 2022 19:50:53 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 33472C340E8;
 Mon, 21 Mar 2022 19:50:50 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 37e71f3e-a950-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647892252;
	bh=rARhwDKFMvCeGH0DD4AcwVvIu04CJdfkm7XHFPMl/e0=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=OM3zAJizujla3w9T83tvgIyaHgDkzbfjN1/zNBUe2+lpezCUuWi0l0aObVG/mwZDj
	 /JkV7y6tygKIcDTPwP5ZP7ruNa3pC5yKxrgbj+8s/QHBfANmbtlFEZWfnwP1qitiqF
	 IMW6LNogBrh+ms3a5mPeh5yY6PxT012Fwa1nZi32jkIsDQktW9q1MkmsL6z/XZkvjb
	 SfQYodYDjR66hrQWt2uDr8wbwIg5HwBqb2bOK+DH5vH3ecg1BZC893ZVkb32GfZXNN
	 2ea1xTtrmz/XWkOygt+HnMw+ozr/pybsW7Yr/YC0YXQyvXgChd6tisMuJf1nYEoIcm
	 W3xs6SqmhSw6w==
Date: Mon, 21 Mar 2022 12:50:50 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Anthony PERARD <anthony.perard@citrix.com>
cc: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>, 
    cardoe@cardoe.com, wl@xen.org, andrew.cooper3@citrix.com, 
    xen-devel@lists.xenproject.org, 
    Stefano Stabellini <stefano.stabellini@xilinx.com>, 
    bertrand.marquis@arm.com
Subject: Re: [PATCH RESEND 2/2] gitlab-ci: add an ARM32 qemu-based smoke
 test
In-Reply-To: <YjhYXYCMLHfXlVwB@perard.uk.xensource.com>
Message-ID: <alpine.DEB.2.22.394.2203211250360.2910984@ubuntu-linux-20-04-desktop>
References: <20210714004854.31135-2-sstabellini@kernel.org> <2aaddfc5-0502-fd0a-6393-63a17c7f6778@xen.org> <alpine.DEB.2.22.394.2203161508200.3497@ubuntu-linux-20-04-desktop> <YjSfPtUwWrqhDsW2@perard.uk.xensource.com> <alpine.DEB.2.22.394.2203181713000.2910984@ubuntu-linux-20-04-desktop>
 <YjhYXYCMLHfXlVwB@perard.uk.xensource.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Mon, 21 Mar 2022, Anthony PERARD wrote:
> On Fri, Mar 18, 2022 at 05:15:06PM -0700, Stefano Stabellini wrote:
> > On Fri, 18 Mar 2022, Anthony PERARD wrote:
> > > On Wed, Mar 16, 2022 at 06:38:53PM -0700, Stefano Stabellini wrote:
> > > > Also considering the recent arm32 xen breakage, which could have been
> > > > caught by gitlab-ci before commit,
> > > 
> > > I'm not sure that's true. I think the commits you are speaking about
> > > also break the build on x86, which was caught by the gitlab ci.
> > > 
> > > Anyway, some arm32 smoke tests on gitlab should be useful.
> > 
> > I think we are probably talking about different breakages :-)
> > 
> > Ayan recently broke Xen on ARM32 (run-time not build-time) with the
> > commit 9e5a68a66 and fef5531fd. I verified that the QEMU32 test in this
> > series actually catches the failure.
> 
> See the pipeline on this commit:
> https://gitlab.com/xen-project/xen/-/commit/fef5531fd
> https://gitlab.com/xen-project/xen/-/pipelines/491963118
> 
> ;-)

Ah! Now I understand, thank you!


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 20:03:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 20:03:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293199.498001 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWOFo-0000dc-0v; Mon, 21 Mar 2022 20:03:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293199.498001; Mon, 21 Mar 2022 20:03:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWOFn-0000dV-Ts; Mon, 21 Mar 2022 20:03:47 +0000
Received: by outflank-mailman (input) for mailman id 293199;
 Mon, 21 Mar 2022 20:03:47 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=/V3S=UA=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nWOFn-0000dP-8A
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 20:03:47 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org
 [2604:1380:4641:c500::1])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 03029981-a952-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 21:03:45 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id E6E1160F34;
 Mon, 21 Mar 2022 20:03:43 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id BD9B3C340E8;
 Mon, 21 Mar 2022 20:03:42 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 03029981-a952-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647893023;
	bh=VV4s9zGZMV3u2QOUroxoA0t5T7A3al+pvwF+nIzBB70=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=q6z/H74f7y1iYZFscp5nNRQ8Opt6jsYPVQSeYehPGplRKCqb72g5pt3CkGn1BPajS
	 w5Imd/LzJHXy3PGcGqlp/nlONEXs1KNHHEGwuo+wdlhu4xIV4w+BEvnmZFVX5mJJT6
	 3eg46udJseYOI7Ad0T1jw6+rO7V1CWyyXRsgBN+WeOyYFzh6ZfedSCZ4olY6EoRogi
	 5bdmkoAA1YlT2VIjaZ/YRXovqllwwt05YTCCTZaY/HyYxs2xuRhZhyrl2g8HzicxHn
	 7ikHnVqHB0h7DP16SmAt8VVwHEztH6wTggA98sIa/GDa1JTFHD3hxf/5eqF1rd9Tsh
	 Rxs1gQ7yAOuEw==
Date: Mon, 21 Mar 2022 13:03:42 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Jan Beulich <jbeulich@suse.com>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    Penny Zheng <Penny.Zheng@arm.com>, nd@arm.com, 
    Penny Zheng <penzhe01@a011292.shanghai.arm.com>, 
    Julien Grall <julien@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, 
    Andrew Cooper <andrew.cooper3@citrix.com>, 
    George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>, 
    xen-devel@lists.xenproject.org
Subject: Re: [PATCH v1 02/13] xen/arm: introduce a special domain
 DOMID_SHARED
In-Reply-To: <30a6ef6f-d37c-b66c-d5af-be2208766057@suse.com>
Message-ID: <alpine.DEB.2.22.394.2203211256370.2910984@ubuntu-linux-20-04-desktop>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com> <20220311061123.1883189-3-Penny.Zheng@arm.com> <eefa9cf2-a04c-ba8d-74cb-0d2aaa35badb@suse.com> <alpine.DEB.2.22.394.2203181443440.2910984@ubuntu-linux-20-04-desktop>
 <30a6ef6f-d37c-b66c-d5af-be2208766057@suse.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Mon, 21 Mar 2022, Jan Beulich wrote:
> On 18.03.2022 22:50, Stefano Stabellini wrote:
> > On Fri, 18 Mar 2022, Jan Beulich wrote:
> >> On 11.03.2022 07:11, Penny Zheng wrote:
> >>> In case to own statically shared pages when owner domain is not
> >>> explicitly defined, this commits propose a special domain DOMID_SHARED,
> >>> and we assign it 0x7FF5, as one of the system domains.
> >>>
> >>> Statically shared memory reuses the same way of initialization with static
> >>> memory, hence this commits proposes a new Kconfig CONFIG_STATIC_SHM to wrap
> >>> related codes, and this option depends on static memory(CONFIG_STATIC_MEMORY).
> >>>
> >>> We intends to do shared domain creation after setup_virt_paging so shared
> >>> domain could successfully do p2m initialization.
> >>
> >> There's nothing said here, in the earlier patch, or in the cover letter
> >> about the security aspects of this. There is a reason we haven't been
> >> allowing arbitrary, un-supervised sharing of memory between domains. It
> >> wants clarifying why e.g. grants aren't an option to achieve what you
> >> need, and how you mean to establish which domains are / aren't permitted
> >> to access any individual page owned by this domain.
> > 
> > 
> > I'll let Penny write a full reply but I'll chime in to try to help with
> > the explanation.
> > 
> > This is not arbitrary un-supervised sharing of memory between domains,
> > which indeed is concerning.
> > 
> > This is statically-configured, supervised by the system configurator,
> > sharing of memory between domains.
> > 
> > And in fact safety (which is just a different aspect of security) is one
> > of the primary goals for this work.
> > 
> > In safety-critical environments, it is not considered safe to
> > dynamically change important configurations at runtime. Everything
> > should be statically defined and statically verified.
> > 
> > In this case, if the system configuration knows a priori that there are
> > only 2 VM and they need to communication over shared memory, it is safer
> > to pre-configure the shared memory at build time rather than let the VMs
> > attempt to share memory at runtime. It is faster too.
> > 
> > The only way to trigger this static shared memory configuration should
> > be via device tree, which is at the same level as the XSM rules
> > themselves.
> > 
> > Hopefully I made things clearer and not murkier :-)
> 
> It adds some helpful background, yes, but at the same time it doesn't
> address the security concern at all: How are access permissions
> managed when the owning domain is a special one? I haven't spotted
> any recording of the domains which are actually permitted to map /
> access the pages in questions. (But of course I also only looked at
> non-Arm-specific code. I'd expect such code not to live in arch-
> specific files.)

All this static memory sharing is statically done at __init time only.
It should not be possible to trigger any further memory sharing at
runtime (if there is, that would be a bug).  In the Arm patches, all the
related functions are marked as __init and only called at boot time.
They map the memory owned by DOMID_SHARED at given guest
pseudo-physical addresses, also specified in device tree.

There are no new interfaces for the guest to map this memory because it
is already "pre-mapped".


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 20:27:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 20:27:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293203.498012 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWOcc-00034p-Sg; Mon, 21 Mar 2022 20:27:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293203.498012; Mon, 21 Mar 2022 20:27:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWOcc-00034i-Pg; Mon, 21 Mar 2022 20:27:22 +0000
Received: by outflank-mailman (input) for mailman id 293203;
 Mon, 21 Mar 2022 20:27:21 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nWOcb-00034c-Oe
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 20:27:21 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWOcY-0006xL-Hs; Mon, 21 Mar 2022 20:27:18 +0000
Received: from [54.239.6.185] (helo=[192.168.25.135])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWOcY-0000lC-BP; Mon, 21 Mar 2022 20:27:18 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=8X3s5YKvHfAAuNh3cyTBQ1khdOsGQ1F1LU3U/TNbMtM=; b=3H5HeUxbbv8O7mBWNVqyfVM4vm
	5wyOiIx2mTqFDi8a8Zf9IVYCgu3/VfyBBVE4IQx8VqTXtSco+MoKb5PdTc0AP2iAkh3jZz4S9mIzY
	EaA0e8lik+mrIqElLpymmryMr9/HesuuYFiM0SzYShF8U41XTADy9nh8sNsgebqF1JAU=;
Message-ID: <3d4194b2-b5e8-2fde-6000-9fd4674297ac@xen.org>
Date: Mon, 21 Mar 2022 20:27:16 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH] xen/arm: skip first 32 bytes of zimage32
To: Stefano Stabellini <sstabellini@kernel.org>
Cc: bertrand.marquis@arm.com, Volodymyr_Babchuk@epam.com,
 Stefano Stabellini <stefano.stabellini@xilinx.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <20220320010509.3605525-1-sstabellini@kernel.org>
 <33f1ea14-4486-be3d-ca9f-a82274078dba@xen.org>
 <1a8ed108-7485-1ed5-3819-fd921164662b@xen.org>
 <alpine.DEB.2.22.394.2203211214030.2910984@ubuntu-linux-20-04-desktop>
From: Julien Grall <julien@xen.org>
In-Reply-To: <alpine.DEB.2.22.394.2203211214030.2910984@ubuntu-linux-20-04-desktop>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi,

On 21/03/2022 19:29, Stefano Stabellini wrote:
> On Sun, 20 Mar 2022, Julien Grall wrote:
>> On 20/03/2022 07:47, Julien Grall wrote:
>>> On 20/03/2022 01:05, Stefano Stabellini wrote:
>>>> From: Stefano Stabellini <stefano.stabellini@xilinx.com>
>>>>
>>>> The first 32 bytes of zImage32 are NOPs, not useful just there for
>>>> compatibility. The reason is that some bootloaders skip the first 32
>>>> bytes when starting the kernel. See the comment in Linux
>>>> arch/arm/boot/compressed/head.S.
>>>
>>> Please mention the Linux verson.
>>>
>>>> Since the introduction of CONFIG_EFI in Linux arm32, those NOPs
>>>> operations have changed implementation from:
>>>>
>>>>       mov r0, r0
>>>>
>>>> to:
>>>>       .inst   MZ_MAGIC | (0x1310 << 16)   @ tstne r0, #0x4d000
>>>
>>> I have duplicated the comment and the instructions below:
>>>
>>>                   @ This is a two-instruction NOP, which happens to bear the
>>>                   @ PE/COFF signature "MZ" in the first two bytes, so the
>>> kernel
>>>                   @ is accepted as an EFI binary. Booting via the UEFI stub
>>>                   @ will not execute those instructions, but the ARM/Linux
>>>                   @ boot protocol does, so we need some NOPs here.
>>>                   .inst   MZ_MAGIC | (0xe225 << 16)       @ eor r5, r5,
>>> 0x4d000
>>>                   eor     r5, r5, 0x4d000                 @ undo previous
>>> insn
>>>
>>>
>>> I read this as they are NOPs and this change should not break the ARM/Linux
>>> boot protocol (we are using it in Xen).
>>>
>>> BTW, the instruction decoding is different compare to me. Which version of
>>> Linux are you using?
>>>
>>>>
>>>> See arch/arm/boot/compressed/efi-header.S.
>>>>
>>>> The new implementation doesn't work on Xen (at least on all versions of
>>>> QEMU I tried).
>>>
>>> As I wrote above, they are NOPs. So why is this breaking?
>>
>> I have tried to boot the latest Linux (commit 14702b3b2438) with CONFIG_EFI=y
>> on QEMU (commit fa435db8ce1d). This booted for me.
>>
>> As I wrote earlier today, the instruction used as NOPs is slightly different.
>> So I had a look at the git history and found the following commit:
>>
>> commit a92882a4d270
>> Author: Andre Przywara <andre.przywara@arm.com>
>> Date:   Mon Nov 22 16:28:43 2021 +0100
>>
>>      ARM: 9159/1: decompressor: Avoid UNPREDICTABLE NOP encoding
>>
>>      In the decompressor's head.S we need to start with an instruction that
>>      is some kind of NOP, but also mimics as the PE/COFF header, when the
>>      kernel is linked as an UEFI application. The clever solution here is
>>      "tstne r0, #0x4d000", which in the worst case just clobbers the
>>      condition flags, and bears the magic "MZ" signature in the lowest 16 bits.
>>
>>      However the encoding used (0x13105a4d) is actually not valid, since bits
>>      [15:12] are supposed to be 0 (written as "(0)" in the ARM ARM).
>>      Violating this is UNPREDICTABLE, and *can* trigger an UNDEFINED
>>      exception. Common Cortex cores seem to ignore those bits, but QEMU
>>      chooses to trap, so the code goes fishing because of a missing exception
>>      handler at this point. We are just saved by the fact that commonly (with
>>      -kernel or when running from U-Boot) the "Z" bit is set, so the
>>      instruction is never executed. See [0] for more details.
>>
>>      To make things more robust and avoid UNPREDICTABLE behaviour in the
>>      kernel code, lets replace this with a "two-instruction NOP":
>>      The first instruction is an exclusive OR, the effect of which the second
>>      instruction reverts. This does not leave any trace, neither in a
>>      register nor in the condition flags. Also it's a perfectly valid
>>      encoding. Kudos to Peter Maydell for coming up with this gem.
>>
>>      [0]
>> https://lore.kernel.org/qemu-devel/YTPIdbUCmwagL5%2FD@os.inf.tu-dresden.de/T/
>>
>>      Link:
>> https://lore.kernel.org/linux-arm-kernel/20210908162617.104962-1-andre.przywara@arm.com/T/
>>
>> So this is a bug in the kernel that has nothing to do with Xen.
>>
>> Therefore, I am not in favor to workaround it in Xen. Where did you get your
>> kernel from? If this from a distro, then please work with them to ingest the
>> above patch.
> 
> Unfortunately all the kernels I tried failed without the Xen fix.
> 
> This is the list of kernels that I tried and failed:
> 
> - Debian Buster
> - Debian Bullseye
> - vanilla 4.9
> - vanilla 4.10

Does this mean you where using v4.{9,10}.0 rather than the stable branch?

Note that AFAICT, 4.10 is not even supported by the kernel communinty 
(see [1]).

> 
> The latest Alpine Linux kernel also doesn't boot, but that one doesn't
> boot even with the fix for other reason. (More in the other email.)
> 
> 
>  From a Xen gitlab-ci perspective, we just need a kernel that works.
> Ideally, we wouldn't rebuild our own but reuse an existing kernel
> because that is one less things to maintain in the gitlab-ci build.
> 
> We have a couple of options to make progress on the QEMU32 gitlab-ci
> test:
> 
> 1) use Debian Jessie in gitlab-ci and do not commit the Xen-side fix,
>     file a Debian bug and revisit the situation in a couple of months
>     (Debian might get the fix in the meantime)

Why do we need to use Debian here? Couldn't we use Ubuntu (or any 
distros that have a newer kernel)?

> 
> 2) commit the Xen fix and use Debian Bullseye right now
> 
> 3) do not commit the Xen fix and build our own kernel now
> 
> 
> All of these options work. My preference is 1) or 2).
> 
> Between 1) and 2) I have a slight preference for 2) for this reason: I
> know that in Open Source we try to fix bugs wherever they are (kernel
> project, QEMU project, Debian project) rather than working around them,
> but in this case it looks like there is a significant amount of binaries
> out there that require an update before they can boot on Xen. 

My problem here is the bug is not Xen specific. You would exactly have 
the same problem if you were booting on baremetal. But as Andre wrote in 
his commit message, this is only working by luck.

So we are setting another bad precendence by preserving the luck.

I appreciate we recently agreed to merge the code to emulate ldr/str. 
But this was based on the fact the Arm Arm doesn't clearly forbid such 
access. This is quite different here as the instructions are UNDEFINED.

So I am not willing to accept a lot of code in Xen just to workaround a 
software bug (see more below).

> I think it
> is one of those times where it is worth considering the Xen fix, or
> should I say workaround, if it is considered harmless.

The problem with your workaround is now the zImage will be loaded in a 
different aligned. For instance, if the symbol <foo> was 2MB aligned, 
now, it will be aligned to 2MB - 32. See kernel_zimage_load().

The booting protocol (see Documentation/arm/booting.rst). Doesn't look 
to impose an alignment. But I wouldn't be surprised if there is an 
assumption here.

Furthermore, there are some problem if the kernel is expected to be 
loaded a specific address.

I do expect the code to become more convoluted. This would also have to 
be duplicated in the tools side. Overall, this will likely be more than 
I am willing to accept for this issue.

Therefore I would like to suggest a more simple workaround. Per the 
commit message of the Linux bug fix, U-boot and direct loading are not 
affected because the bit "Z" is set.

So how about updating PSR_GUEST32_INIT to set Z?

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 20:32:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 20:32:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293208.498022 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWOhc-0004WK-E1; Mon, 21 Mar 2022 20:32:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293208.498022; Mon, 21 Mar 2022 20:32:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWOhc-0004WD-An; Mon, 21 Mar 2022 20:32:32 +0000
Received: by outflank-mailman (input) for mailman id 293208;
 Mon, 21 Mar 2022 20:32:31 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nWOha-0004W5-UL
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 20:32:30 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWOha-00072u-0Q; Mon, 21 Mar 2022 20:32:30 +0000
Received: from [54.239.6.185] (helo=[192.168.25.135])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWOhZ-0000tt-Q3; Mon, 21 Mar 2022 20:32:29 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=IqHyl49P5dm9QxJaLPxl6Uu+0SLqnE2YOMoXo25d9WQ=; b=UBvjsYikQ6kbDachlaaSRJL8tK
	1aiMcLTFAeSp8TlZ9HS1xxXORiRT98nYRu98Wccpfdfxh3hKK/0ujgyf6zBedFfqSPdDMKP6QgsTW
	NuiO6zd+edDFBn9gqrVt/rUJvTmnKEnMVPvJMRnXULpJ6bBl/v0G+no+qWheRALOfdUc=;
Message-ID: <aa148f5a-4ff2-bebc-2be9-f8b647b95386@xen.org>
Date: Mon, 21 Mar 2022 20:32:27 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v3 2/2] gitlab-ci: add an ARM32 qemu-based smoke test
To: Stefano Stabellini <sstabellini@kernel.org>
Cc: xen-devel@lists.xenproject.org, cardoe@cardoe.com, wl@xen.org,
 andrew.cooper3@citrix.com, anthony.perard@citrix.com,
 bertrand.marquis@arm.com, Stefano Stabellini <stefano.stabellini@xilinx.com>
References: <alpine.DEB.2.22.394.2203181729490.2910984@ubuntu-linux-20-04-desktop>
 <20220319003221.3012314-2-sstabellini@kernel.org>
 <alpine.DEB.2.22.394.2203191842280.2910984@ubuntu-linux-20-04-desktop>
 <684d65b8-5de4-779c-d869-bac28e073091@xen.org>
 <alpine.DEB.2.22.394.2203211229430.2910984@ubuntu-linux-20-04-desktop>
From: Julien Grall <julien@xen.org>
In-Reply-To: <alpine.DEB.2.22.394.2203211229430.2910984@ubuntu-linux-20-04-desktop>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Stefano,

On 21/03/2022 19:47, Stefano Stabellini wrote:
> On Sun, 20 Mar 2022, Julien Grall wrote:
>> On 20/03/2022 01:46, Stefano Stabellini wrote:
>>> On Fri, 18 Mar 2022, Stefano Stabellini wrote:
>>>> Add a minimal ARM32 smoke test based on qemu-system-arm, as provided by
>>>> the test-artifacts qemu container. The minimal test simply boots Xen
>>>> (built from previous build stages) and Dom0. The test is fetching the
>>>> Dom0 kernel and initrd from Debian Jessie: they work just fine and this
>>>> way we don't have to maintain a build for them too.
>>>
>>>
>>> Thanks to the Xen fix recently submitted
>>> (https://marc.info/?l=xen-devel&m=164774063802402) I'll be able to
>>> update this script to use Debian Bullseye. I am thinking of merging the
>>> below directly with this patch.
>>>
>>>
>>> ---
>>>
>>> automation: upgrade Debian to Bullseye for testing Xen aarch32
>>>
>>> Also change initrd. As the new netboot initrd from Debian Bullseye is
>>> huge (22MB), use a tiny initrd from Alpine Linux instead (only 2.5MB).
>>
>> This is sounds odd to me. So we are going to use Bullseye but not really
>> because we want to use a different initrd.
>>
>> Why can't you get everything from the same place?
> 
> Because it doesn't work :-(
> 
> 
>>> Also note that the huge Debian Bullseye initrd would cause QEMU to
>>> crash due to the -device loader parameter.
>>
>> Can you provide more details? Was this reported to QEMU?
> 
> QEMU core dumps when provided with the Debian Bullseye initrd binary to
> load. I guessed it was due to the size and tried with a smaller size.
> Everything worked with a smaller initrd. I also think that it is not a
> good idea to use a 22MB initrd anyway so decided against the Debian
> Bullseye initrd. 

Why is it a bad idea? In general, bigger file allows us to test corner 
cases.

> (For reference 22MB is basically the size of a fully
> featured Yocto-build rootfs.) I did not file a bug to qemu-devel yet and
> didn't investigate further on the QEMU side as I ran out of time.
> 
> Alpine Linux provides a very nice 2.5MB initrd. I tried to use both
> kernel and initrd from Alpine Linux but unfortunately the Alpine Linux
> kernel doesn't boot. I don't know why but I think it is because it might
> be missing the console driver. I am not sure. There are a lot of
> combinations that don't work and it is time consuming to investigate
> them all. I have been trying to investigate only the most critical
> things -- they are too many!
> 
> I should add that the Debian initrd is not the ideal initrd because it
> is made to start the Debian installer. Here we just want a tiny busybox
> initrd.
> 
> In general, I think it would be better if we could use the kernel and
> initrd from the same source but I couldn't find one that works. I could
> build one myself but it would be one more thing to maintain in
> gitlab-ci. Also using u-boot might solve the problem of loading the
> binary but again we would have to maintain a u-boot arm32 build in
> gitlab-ci.
> 
> So in order of preference best to worst in my opinion:
> 
> 1) kernel and initrd from the same source
> 2) kernel and initrd from different sources
> 3) build your own kernel/initrd/u-boot
> 
> So I ended up doing 2). I tested it and it is sufficient to get the test
> up and running.

Thanks for the explanation. So I think we should not call that an 
"Upgrade to Bullseye" because you are not using Debian. Instead, you 
borrowed a working kernel that happens to have everything you need built-in.

Also, can you update the commit message and provide a summary of this 
discussion?

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 20:37:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 20:37:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293212.498034 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWOmf-0005C8-1h; Mon, 21 Mar 2022 20:37:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293212.498034; Mon, 21 Mar 2022 20:37:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWOme-0005C1-Uf; Mon, 21 Mar 2022 20:37:44 +0000
Received: by outflank-mailman (input) for mailman id 293212;
 Mon, 21 Mar 2022 20:37:43 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=XmvP=UA=gmail.com=tamas.k.lengyel@srs-se1.protection.inumbo.net>)
 id 1nWOmd-0005Bs-5L
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 20:37:43 +0000
Received: from mail-oo1-xc36.google.com (mail-oo1-xc36.google.com
 [2607:f8b0:4864:20::c36])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c10fa1fe-a956-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 21:37:42 +0100 (CET)
Received: by mail-oo1-xc36.google.com with SMTP id
 s203-20020a4a3bd4000000b003191c2dcbe8so20523732oos.9
 for <xen-devel@lists.xenproject.org>; Mon, 21 Mar 2022 13:37:42 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c10fa1fe-a956-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=ZVa7+ukVQ3gxnLwaLzGzoruMYL9hEreMELRJFbxTyco=;
        b=DU1XZiaRhgnJLNlFYCT5kqs27JaVCLGsQVjXAnr0+8b/fZdZnUsS5jgLORiMiJNQb0
         XBBAqC6VmzfUuIbNTVkTn/oMPQpb6mEx/a7LS0Vsi7x0Z30IwxhVJ7CWL1U1MgeBK9cb
         kM3stPKlE0nKdEacnFnM1lci8cH8d6+r01sHeArVuBVQFfM6p+MgDu0OD/P3zRmAa1mP
         9ypS0537sCP2BcjifYF08OrS5YINpStSAUf4tlD2Y3OWjygP6bkjJldrEMS8QhNc4xHz
         3GZnF2m1Eez/c0h1TO00oaU4MqFwWabJQ6MWGQcih2iDvNzpMXjJVW1IynqTF3ZptAe7
         aRzA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=ZVa7+ukVQ3gxnLwaLzGzoruMYL9hEreMELRJFbxTyco=;
        b=JB4v7b5T63mSD+x9y2butVzZmxIyYemifT4wyaqlPhB+1XDvU5dQ/0klJmr4CnmEOV
         13w0G7Z6SgJnb53ZS8tjrxHbLqB0LYpGMlzxnP8MJVh3vSiuTi4Js+0LC+yJlMYr4T9R
         zbP/wAPSZgo7XTldp+y1zdQEa6XvjX+LfqnZXGX5JMJs6b+DoapYIWYpbUxfNKkiBJL+
         4HWfre3bbf8crWoRQoloum1eXXEoVmVV8Vi2rYxLVQGKBGto2pGtlB9JaTnpa4W5SqgY
         RvHZSgQEZ+RW5Hv69FY6keyzWiZlKSKI/OBwocmhAW8TFGckYjomv+osd+P3It6jI6hP
         H9cw==
X-Gm-Message-State: AOAM5331zNbdIe37Jk2AxAr1lQNPbbhAtgPcW4+LzoM/tVvQ5yRd6tFX
	h18AHljLx/lyYA4HoRADS+EQIP7Iwt7IS/NYVYA=
X-Google-Smtp-Source: ABdhPJywKQMWwVgGwKlzy8HFA/o+mcfb0KDxn14VEf15/Uyn7chsDs3chgCmhffooMRwG1OZQ6NlnStE0PgDzPjwJ8c=
X-Received: by 2002:a05:6870:ea81:b0:db:3e68:7ae0 with SMTP id
 s1-20020a056870ea8100b000db3e687ae0mr382261oap.9.1647895060787; Mon, 21 Mar
 2022 13:37:40 -0700 (PDT)
MIME-Version: 1.0
References: <84f15b2e1bef6c901bbdf29a07c7904cb365c0b2.1647879687.git.tamas.lengyel@intel.com>
 <90cf10b5-b0de-4589-f1a6-f8c392c924f1@suse.com>
In-Reply-To: <90cf10b5-b0de-4589-f1a6-f8c392c924f1@suse.com>
From: Tamas K Lengyel <tamas.k.lengyel@gmail.com>
Date: Mon, 21 Mar 2022 16:37:29 -0400
Message-ID: <CABfawhncAqNFz+aCogYpshHWNR+-_nw8yLJrBjThii2LK1FaOQ@mail.gmail.com>
Subject: Re: [PATCH v3] x86/vmx: save guest non-register state in hvm_hw_cpu
To: Jan Beulich <jbeulich@suse.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>, Jun Nakajima <jun.nakajima@intel.com>, 
	Kevin Tian <kevin.tian@intel.com>, Andrew Cooper <andrew.cooper3@citrix.com>, 
	=?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>, Wei Liu <wl@xen.org>, 
	Xen-devel <xen-devel@lists.xenproject.org>
Content-Type: multipart/alternative; boundary="000000000000b9be2b05dac077df"

--000000000000b9be2b05dac077df
Content-Type: text/plain; charset="UTF-8"

On Mon, Mar 21, 2022, 12:41 PM Jan Beulich <jbeulich@suse.com> wrote:

> On 21.03.2022 17:26, Tamas K Lengyel wrote:
> > During VM forking and resetting a failed vmentry has been observed due
> > to the guest non-register state going out-of-sync with the guest register
> > state. For example, a VM fork reset right after a STI instruction can
> trigger
> > the failed entry. This is due to the guest non-register state not being
> saved
> > from the parent VM, thus the reset operation only copies the register
> state.
> >
> > Fix this by including the guest non-register state in hvm_hw_cpu so that
> when
> > its copied from the parent VM the vCPU state remains in sync.
> >
> > SVM is not currently wired-in as VM forking is VMX only and saving
> non-register
> > state during normal save/restore/migration operation hasn't been needed.
> If
> > deemed necessary in the future it can be wired in by adding a
> svm-substructure
> > to hvm_hw_cpu.
> >
> > Signed-off-by: Tamas K Lengyel <tamas.lengyel@intel.com>
>
> Reviewed-by: Jan Beulich <jbeulich@suse.com>
>

Thanks, will send v4 shortly, will need a couple fixes still.

Tamas

>

--000000000000b9be2b05dac077df
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto"><div><br><br><div class=3D"gmail_quote"><div dir=3D"ltr" =
class=3D"gmail_attr">On Mon, Mar 21, 2022, 12:41 PM Jan Beulich &lt;<a href=
=3D"mailto:jbeulich@suse.com">jbeulich@suse.com</a>&gt; wrote:<br></div><bl=
ockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #=
ccc solid;padding-left:1ex">On 21.03.2022 17:26, Tamas K Lengyel wrote:<br>
&gt; During VM forking and resetting a failed vmentry has been observed due=
<br>
&gt; to the guest non-register state going out-of-sync with the guest regis=
ter<br>
&gt; state. For example, a VM fork reset right after a STI instruction can =
trigger<br>
&gt; the failed entry. This is due to the guest non-register state not bein=
g saved<br>
&gt; from the parent VM, thus the reset operation only copies the register =
state.<br>
&gt; <br>
&gt; Fix this by including the guest non-register state in hvm_hw_cpu so th=
at when<br>
&gt; its copied from the parent VM the vCPU state remains in sync.<br>
&gt; <br>
&gt; SVM is not currently wired-in as VM forking is VMX only and saving non=
-register<br>
&gt; state during normal save/restore/migration operation hasn&#39;t been n=
eeded. If<br>
&gt; deemed necessary in the future it can be wired in by adding a svm-subs=
tructure<br>
&gt; to hvm_hw_cpu.<br>
&gt; <br>
&gt; Signed-off-by: Tamas K Lengyel &lt;<a href=3D"mailto:tamas.lengyel@int=
el.com" target=3D"_blank" rel=3D"noreferrer">tamas.lengyel@intel.com</a>&gt=
;<br>
<br>
Reviewed-by: Jan Beulich &lt;<a href=3D"mailto:jbeulich@suse.com" target=3D=
"_blank" rel=3D"noreferrer">jbeulich@suse.com</a>&gt;<br></blockquote></div=
></div><div dir=3D"auto"><br></div><div dir=3D"auto">Thanks, will send v4 s=
hortly, will need a couple fixes still.</div><div dir=3D"auto"><br></div><d=
iv dir=3D"auto">Tamas</div><div dir=3D"auto"><div class=3D"gmail_quote"><bl=
ockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #=
ccc solid;padding-left:1ex"></blockquote></div></div></div>

--000000000000b9be2b05dac077df--


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 21:12:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 21:12:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293218.498044 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWPKI-00015O-Q5; Mon, 21 Mar 2022 21:12:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293218.498044; Mon, 21 Mar 2022 21:12:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWPKI-00015H-N1; Mon, 21 Mar 2022 21:12:30 +0000
Received: by outflank-mailman (input) for mailman id 293218;
 Mon, 21 Mar 2022 21:12:29 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=hXdE=UA=intel.com=tamas.lengyel@srs-se1.protection.inumbo.net>)
 id 1nWPKH-00015B-9Y
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 21:12:29 +0000
Received: from mga09.intel.com (mga09.intel.com [134.134.136.24])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 99c9d7aa-a95b-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 22:12:25 +0100 (CET)
Received: from orsmga007.jf.intel.com ([10.7.209.58])
 by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 21 Mar 2022 14:12:22 -0700
Received: from swong4-mobl.amr.corp.intel.com (HELO localhost.localdomain)
 ([10.212.31.247])
 by orsmga007-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 21 Mar 2022 14:12:20 -0700
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 99c9d7aa-a95b-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;
  t=1647897145; x=1679433145;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=aNy1XCLJr0pY6mxolVFEQFVc9a0ydfMB+W6/TQxXfV0=;
  b=Zg+VpM1NegOTrpNmxzE2ZjNAsH0q1d/pmcekY47jnYj6MShHxLlrec3A
   dl7od7wLYFATkYS/cpDBe8fkkxncGpq4q/VMeohRhc+RyC8J3gTSzBTpr
   J8haGNBlrYqxTexCzPuDv/TBLicTu9VejCylNrUlqsYKFPeEw8Rr4GNPV
   Ycm9HUXXmSN3tlP8lGKLYSjJE++rYE8UPKfSd/GGrGIMfntpQpp29uYZD
   ZZFbk14EWAqLEga+EIy93/En21Aa3KoZhjhijB4NGSyVmI1DuZEBEvKbn
   rNmV6kYBZSACMHilpGiyIUZXkhGox133qSGPe7fsNK3cXwRWJi6sNXsbx
   w==;
X-IronPort-AV: E=McAfee;i="6200,9189,10293"; a="257368950"
X-IronPort-AV: E=Sophos;i="5.90,199,1643702400"; 
   d="scan'208";a="257368950"
X-IronPort-AV: E=Sophos;i="5.90,199,1643702400"; 
   d="scan'208";a="543386288"
From: Tamas K Lengyel <tamas.lengyel@intel.com>
To: xen-devel@lists.xenproject.org
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>,
	Jun Nakajima <jun.nakajima@intel.com>,
	Kevin Tian <kevin.tian@intel.com>
Subject: [PATCH v4] x86/vmx: save guest non-register state in hvm_hw_cpu
Date: Mon, 21 Mar 2022 17:12:09 -0400
Message-Id: <a8828d68c308fa7ecbfe4387ca753ee0f80a2a7d.1647897016.git.tamas.lengyel@intel.com>
X-Mailer: git-send-email 2.25.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

During VM forking and resetting a failed vmentry has been observed due
to the guest non-register state going out-of-sync with the guest register
state. For example, a VM fork reset right after a STI instruction can trigger
the failed entry. This is due to the guest non-register state not being saved
from the parent VM, thus the reset operation only copies the register state.

Fix this by including the guest non-register state in hvm_hw_cpu so that when
its copied from the parent VM the vCPU state remains in sync.

SVM is not currently wired-in as VM forking is VMX only and saving non-register
state during normal save/restore/migration operation hasn't been needed. If
deemed necessary in the future it can be wired in by adding a svm-substructure
to hvm_hw_cpu.

Signed-off-by: Tamas K Lengyel <tamas.lengyel@intel.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
---
v4: Correct setting and checking new flag value in hvm.c
v3: Add XEN_X86_VMX flag and vmx-substructure in hvm_hw_cpu
v2: Include all CPU non-register state and fold the ops into vmx_vmcs_save &
    vmx_vmcs_restore.
Note: no sanity checking is performed on the fields to reduce the cycles during
      fuzzing.
---
 xen/arch/x86/hvm/hvm.c                 |  4 ++--
 xen/arch/x86/hvm/vmx/vmx.c             | 17 ++++++++++++++++-
 xen/include/public/arch-x86/hvm/save.h | 13 +++++++++++++
 3 files changed, 31 insertions(+), 3 deletions(-)

diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index 709a4191ef..c502d0851e 100644
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -894,7 +894,7 @@ static int cf_check hvm_save_cpu_ctxt(struct vcpu *v, hvm_domain_context_t *h)
     if ( v->fpu_initialised )
     {
         memcpy(ctxt.fpu_regs, v->arch.fpu_ctxt, sizeof(ctxt.fpu_regs));
-        ctxt.flags = XEN_X86_FPU_INITIALISED;
+        ctxt.flags |= XEN_X86_FPU_INITIALISED;
     }
 
     return hvm_save_entry(CPU, v->vcpu_id, h, &ctxt);
@@ -1025,7 +1025,7 @@ static int cf_check hvm_load_cpu_ctxt(struct domain *d, hvm_domain_context_t *h)
         return -EINVAL;
     }
 
-    if ( (ctxt.flags & ~XEN_X86_FPU_INITIALISED) != 0 )
+    if ( (ctxt.flags & ~(XEN_X86_FPU_INITIALISED | XEN_X86_VMX)) != 0 )
     {
         gprintk(XENLOG_ERR, "bad flags value in CPU context: %#x\n",
                 ctxt.flags);
diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
index c075370f64..6da3842d6e 100644
--- a/xen/arch/x86/hvm/vmx/vmx.c
+++ b/xen/arch/x86/hvm/vmx/vmx.c
@@ -713,7 +713,7 @@ static void vmx_restore_dr(struct vcpu *v)
 
 static void vmx_vmcs_save(struct vcpu *v, struct hvm_hw_cpu *c)
 {
-    unsigned long ev;
+    unsigned long ev, activity_state, intr_info;
 
     vmx_vmcs_enter(v);
 
@@ -721,6 +721,10 @@ static void vmx_vmcs_save(struct vcpu *v, struct hvm_hw_cpu *c)
     __vmread(GUEST_SYSENTER_ESP, &c->sysenter_esp);
     __vmread(GUEST_SYSENTER_EIP, &c->sysenter_eip);
 
+    __vmread(GUEST_ACTIVITY_STATE, &activity_state);
+    __vmread(GUEST_INTERRUPTIBILITY_INFO, &intr_info);
+    __vmread(GUEST_PENDING_DBG_EXCEPTIONS, &c->vmx.pending_dbg);
+
     __vmread(VM_ENTRY_INTR_INFO, &ev);
     if ( (ev & INTR_INFO_VALID_MASK) &&
          hvm_event_needs_reinjection(MASK_EXTR(ev, INTR_INFO_INTR_TYPE_MASK),
@@ -732,6 +736,10 @@ static void vmx_vmcs_save(struct vcpu *v, struct hvm_hw_cpu *c)
     }
 
     vmx_vmcs_exit(v);
+
+    c->vmx.activity_state = activity_state;
+    c->vmx.interruptibility_info = intr_info;
+    c->flags |= XEN_X86_VMX;
 }
 
 static int vmx_restore_cr0_cr3(
@@ -807,6 +815,13 @@ static int vmx_vmcs_restore(struct vcpu *v, struct hvm_hw_cpu *c)
 
     __vmwrite(GUEST_DR7, c->dr7);
 
+    if ( c->flags & XEN_X86_VMX )
+    {
+        __vmwrite(GUEST_ACTIVITY_STATE, c->vmx.activity_state);
+        __vmwrite(GUEST_INTERRUPTIBILITY_INFO, c->vmx.interruptibility_info);
+        __vmwrite(GUEST_PENDING_DBG_EXCEPTIONS, c->vmx.pending_dbg);
+    }
+
     if ( c->pending_valid &&
          hvm_event_needs_reinjection(c->pending_type, c->pending_vector) )
     {
diff --git a/xen/include/public/arch-x86/hvm/save.h b/xen/include/public/arch-x86/hvm/save.h
index 773a380bc2..0f728aa5d9 100644
--- a/xen/include/public/arch-x86/hvm/save.h
+++ b/xen/include/public/arch-x86/hvm/save.h
@@ -52,6 +52,7 @@ DECLARE_HVM_SAVE_TYPE(HEADER, 1, struct hvm_save_header);
  * Compat:
  *     - Pre-3.4 didn't have msr_tsc_aux
  *     - Pre-4.7 didn't have fpu_initialised
+ *     - Pre-4.17 didn't have non-register state
  */
 
 struct hvm_hw_cpu {
@@ -163,9 +164,21 @@ struct hvm_hw_cpu {
     uint32_t error_code;
 
 #define _XEN_X86_FPU_INITIALISED        0
+#define _XEN_X86_VMX                    1
 #define XEN_X86_FPU_INITIALISED         (1U<<_XEN_X86_FPU_INITIALISED)
+#define XEN_X86_VMX                     (1U<<_XEN_X86_VMX)
     uint32_t flags;
     uint32_t pad0;
+
+    /* non-register state */
+    union {
+        /* if flags & XEN_X86_VMX */
+        struct {
+            uint32_t activity_state;
+            uint32_t interruptibility_info;
+            uint64_t pending_dbg;
+        } vmx;
+    };
 };
 
 struct hvm_hw_cpu_compat {
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Mon Mar 21 22:07:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 22:07:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293221.498055 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWQBR-0006Kk-VC; Mon, 21 Mar 2022 22:07:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293221.498055; Mon, 21 Mar 2022 22:07:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWQBR-0006Kd-SE; Mon, 21 Mar 2022 22:07:25 +0000
Received: by outflank-mailman (input) for mailman id 293221;
 Mon, 21 Mar 2022 22:07:24 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=/V3S=UA=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nWQBQ-0006KX-At
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 22:07:24 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 47fe1199-a963-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 23:07:22 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 0F24AB819FA;
 Mon, 21 Mar 2022 22:07:21 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 806C9C340E8;
 Mon, 21 Mar 2022 22:07:19 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 47fe1199-a963-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647900439;
	bh=pHWdQX0Ql3oIVswk/SyCIITMZBJ6rNGnv9UImcD6sB8=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=hm/Zbo9tJlhlon2BXskSejnkiOAktG1lupf8RwHkVt1L91JBHXRLxWGar7ZGnAVll
	 qAlpZo7A3+ls4NCVM1xMlVWXK6XD0LZIFT6XCPxRtGAsy5vdpqrp9aiNyoh4ZcumMb
	 R/KnyAKS7+wacQAsa2zT93cZ9GiuKndUVnPGT3p9lvrMYRv4aMS8cuEaMhRfGxmxtD
	 deWDeohqSXOYbkgv+TE9+eDPLQru95RC/g0KAAIxZLhz66LRND3dVYlA6vpASdUFh5
	 6Y5cyxtWHDoHzbJwwXdijC2GilSkcGZ/qSXGePGFdniMeSR0mSGxznqzeWNewYZ2DL
	 4XjoGEma+GrWg==
Date: Mon, 21 Mar 2022 15:07:18 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Julien Grall <julien@xen.org>
cc: Stefano Stabellini <sstabellini@kernel.org>, bertrand.marquis@arm.com, 
    Volodymyr_Babchuk@epam.com, 
    Stefano Stabellini <stefano.stabellini@xilinx.com>, 
    "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH] xen/arm: skip first 32 bytes of zimage32
In-Reply-To: <3d4194b2-b5e8-2fde-6000-9fd4674297ac@xen.org>
Message-ID: <alpine.DEB.2.22.394.2203211442540.2910984@ubuntu-linux-20-04-desktop>
References: <20220320010509.3605525-1-sstabellini@kernel.org> <33f1ea14-4486-be3d-ca9f-a82274078dba@xen.org> <1a8ed108-7485-1ed5-3819-fd921164662b@xen.org> <alpine.DEB.2.22.394.2203211214030.2910984@ubuntu-linux-20-04-desktop>
 <3d4194b2-b5e8-2fde-6000-9fd4674297ac@xen.org>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; CHARSET=US-ASCII
Content-ID: <alpine.DEB.2.22.394.2203211446241.2910984@ubuntu-linux-20-04-desktop>

On Mon, 21 Mar 2022, Julien Grall wrote:
> > This is the list of kernels that I tried and failed:
> > 
> > - Debian Buster
> > - Debian Bullseye
> > - vanilla 4.9
> > - vanilla 4.10
> 
> Does this mean you where using v4.{9,10}.0 rather than the stable branch?
> 
> Note that AFAICT, 4.10 is not even supported by the kernel communinty (see
> [1]).

Yeah... I was trying to bisect the Debian kernel failure. That is how I
discovered that CONFIG_EFI was causing it. So yes, I only tried the
vanilla, now unsupported, releases.


> > The latest Alpine Linux kernel also doesn't boot, but that one doesn't
> > boot even with the fix for other reason. (More in the other email.)
> > 
> > 
> >  From a Xen gitlab-ci perspective, we just need a kernel that works.
> > Ideally, we wouldn't rebuild our own but reuse an existing kernel
> > because that is one less things to maintain in the gitlab-ci build.
> > 
> > We have a couple of options to make progress on the QEMU32 gitlab-ci
> > test:
> > 
> > 1) use Debian Jessie in gitlab-ci and do not commit the Xen-side fix,
> >     file a Debian bug and revisit the situation in a couple of months
> >     (Debian might get the fix in the meantime)
> 
> Why do we need to use Debian here? Couldn't we use Ubuntu (or any distros that
> have a newer kernel)?

We could use something else but see below.


> > 2) commit the Xen fix and use Debian Bullseye right now
> > 
> > 3) do not commit the Xen fix and build our own kernel now
> > 
> > 
> > All of these options work. My preference is 1) or 2).
> > 
> > Between 1) and 2) I have a slight preference for 2) for this reason: I
> > know that in Open Source we try to fix bugs wherever they are (kernel
> > project, QEMU project, Debian project) rather than working around them,
> > but in this case it looks like there is a significant amount of binaries
> > out there that require an update before they can boot on Xen. 
> 
> My problem here is the bug is not Xen specific. You would exactly have the
> same problem if you were booting on baremetal. But as Andre wrote in his
> commit message, this is only working by luck.
> 
> So we are setting another bad precendence by preserving the luck.
> 
> I appreciate we recently agreed to merge the code to emulate ldr/str. But this
> was based on the fact the Arm Arm doesn't clearly forbid such access. This is
> quite different here as the instructions are UNDEFINED.

Yeah, I understand your point and I also kind of agree.


> So I am not willing to accept a lot of code in Xen just to workaround a
> software bug (see more below).
> 
> > I think it
> > is one of those times where it is worth considering the Xen fix, or
> > should I say workaround, if it is considered harmless.
> 
> The problem with your workaround is now the zImage will be loaded in a
> different aligned. For instance, if the symbol <foo> was 2MB aligned, now, it
> will be aligned to 2MB - 32. See kernel_zimage_load().
> 
> The booting protocol (see Documentation/arm/booting.rst). Doesn't look to
> impose an alignment. But I wouldn't be surprised if there is an assumption
> here.
> 
> Furthermore, there are some problem if the kernel is expected to be loaded a
> specific address.
> 
> I do expect the code to become more convoluted. This would also have to be
> duplicated in the tools side. Overall, this will likely be more than I am
> willing to accept for this issue.
> 
> Therefore I would like to suggest a more simple workaround. Per the commit
> message of the Linux bug fix, U-boot and direct loading are not affected
> because the bit "Z" is set.
> 
> So how about updating PSR_GUEST32_INIT to set Z?

That worked! Excellent suggestion and much safer than the 32 byte
workaround. I tested with the Debian Bullseye kernel.

I think you might have a better suggestion for the commit message.

---
xen/arm: set CPSR Z bit when creating aarch32 guests

The first 32 bytes of zImage32 are NOPs. When CONFIG_EFI is enabled in
the kernel, certain versions of Linux have a bug in the way the initial
NOP instructions gets encoded (invalid encoding), resulting in an
unbootable kernel. See commit a92882a4d270 in the Linux kernel for all
the details.

All kernel releases starting from Linux 4.9 without commit a92882a4d270
are affected.

Fortunately there is a simple workaround: setting the "Z" bit in CPSR
make it so those invalid  NOP instructions are never executed. Setting
the "Z" bit makes those kernel versions bootable again and it is
harmless in the other cases.

Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>

diff --git a/xen/include/public/arch-arm.h b/xen/include/public/arch-arm.h
index 94b31511dd..309684e946 100644
--- a/xen/include/public/arch-arm.h
+++ b/xen/include/public/arch-arm.h
@@ -361,6 +361,7 @@ typedef uint64_t xen_callback_t;
 #define PSR_DBG_MASK    (1<<9)        /* arm64: Debug Exception mask */
 #define PSR_IT_MASK     (0x0600fc00)  /* Thumb If-Then Mask */
 #define PSR_JAZELLE     (1<<24)       /* Jazelle Mode */
+#define PSR_Z           (1<<30)       /* Zero condition flag */
 
 /* 32 bit modes */
 #define PSR_MODE_USR 0x10
@@ -383,7 +384,7 @@ typedef uint64_t xen_callback_t;
 #define PSR_MODE_EL1t 0x04
 #define PSR_MODE_EL0t 0x00
 
-#define PSR_GUEST32_INIT  (PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MODE_SVC)
+#define PSR_GUEST32_INIT  (PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MODE_SVC|PSR_Z)
 #define PSR_GUEST64_INIT (PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MODE_EL1h)
 
 #define SCTLR_GUEST_INIT    xen_mk_ullong(0x00c50078)


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 22:19:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 22:19:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293224.498067 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWQN4-0007sF-1V; Mon, 21 Mar 2022 22:19:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293224.498067; Mon, 21 Mar 2022 22:19:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWQN3-0007s8-Uu; Mon, 21 Mar 2022 22:19:25 +0000
Received: by outflank-mailman (input) for mailman id 293224;
 Mon, 21 Mar 2022 22:19:24 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=/V3S=UA=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nWQN2-0007s2-FN
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 22:19:24 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f5512168-a964-11ec-a405-831a346695d4;
 Mon, 21 Mar 2022 23:19:22 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 6C2EF6123A;
 Mon, 21 Mar 2022 22:19:21 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5D44BC340E8;
 Mon, 21 Mar 2022 22:19:20 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f5512168-a964-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647901160;
	bh=vdT+FC7hDTnJhjUHbx1BSLoLTz3NXsF/5y/lA8sNP8k=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=iG7yqi1xIaqPMUWOfICK/m1rOZaDSViOuVKmLIclv9+c9qev7TjUS4veHRkgTdVdI
	 ogWdgOH5BH+MDsDTEhpREbICjupomZdBfbUZ4jZY2UoOqNFXd7otmEQVmZ/J8gahCJ
	 7PU8q9hJg1WgjvepyixBJYCMWfepz+vHoa57obJHezvmHU+zsV1fh4cTiC0P/qZfdy
	 R/TM+4bFgR9ApCnpjT97o9urVxOLSbNfGM9UI95uixEumZgt/8E4KGAzhU6Guf9Wkm
	 65YDGkV7KPBUSYU0zeZqIRljVoyKiX1/Dxa/CTZq8NUbEOb/FUs1NBFBk2qPMY8cZK
	 svUHdg0Ppc4UA==
Date: Mon, 21 Mar 2022 15:19:19 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Julien Grall <julien@xen.org>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    xen-devel@lists.xenproject.org, cardoe@cardoe.com, wl@xen.org, 
    andrew.cooper3@citrix.com, anthony.perard@citrix.com, 
    bertrand.marquis@arm.com, 
    Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: Re: [PATCH v3 2/2] gitlab-ci: add an ARM32 qemu-based smoke test
In-Reply-To: <aa148f5a-4ff2-bebc-2be9-f8b647b95386@xen.org>
Message-ID: <alpine.DEB.2.22.394.2203211507290.2910984@ubuntu-linux-20-04-desktop>
References: <alpine.DEB.2.22.394.2203181729490.2910984@ubuntu-linux-20-04-desktop> <20220319003221.3012314-2-sstabellini@kernel.org> <alpine.DEB.2.22.394.2203191842280.2910984@ubuntu-linux-20-04-desktop> <684d65b8-5de4-779c-d869-bac28e073091@xen.org>
 <alpine.DEB.2.22.394.2203211229430.2910984@ubuntu-linux-20-04-desktop> <aa148f5a-4ff2-bebc-2be9-f8b647b95386@xen.org>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Mon, 21 Mar 2022, Julien Grall wrote:
> On 21/03/2022 19:47, Stefano Stabellini wrote:
> > On Sun, 20 Mar 2022, Julien Grall wrote:
> > > On 20/03/2022 01:46, Stefano Stabellini wrote:
> > > > On Fri, 18 Mar 2022, Stefano Stabellini wrote:
> > > > > Add a minimal ARM32 smoke test based on qemu-system-arm, as provided
> > > > > by
> > > > > the test-artifacts qemu container. The minimal test simply boots Xen
> > > > > (built from previous build stages) and Dom0. The test is fetching the
> > > > > Dom0 kernel and initrd from Debian Jessie: they work just fine and
> > > > > this
> > > > > way we don't have to maintain a build for them too.
> > > > 
> > > > 
> > > > Thanks to the Xen fix recently submitted
> > > > (https://marc.info/?l=xen-devel&m=164774063802402) I'll be able to
> > > > update this script to use Debian Bullseye. I am thinking of merging the
> > > > below directly with this patch.
> > > > 
> > > > 
> > > > ---
> > > > 
> > > > automation: upgrade Debian to Bullseye for testing Xen aarch32
> > > > 
> > > > Also change initrd. As the new netboot initrd from Debian Bullseye is
> > > > huge (22MB), use a tiny initrd from Alpine Linux instead (only 2.5MB).
> > > 
> > > This is sounds odd to me. So we are going to use Bullseye but not really
> > > because we want to use a different initrd.
> > > 
> > > Why can't you get everything from the same place?
> > 
> > Because it doesn't work :-(
> > 
> > 
> > > > Also note that the huge Debian Bullseye initrd would cause QEMU to
> > > > crash due to the -device loader parameter.
> > > 
> > > Can you provide more details? Was this reported to QEMU?
> > 
> > QEMU core dumps when provided with the Debian Bullseye initrd binary to
> > load. I guessed it was due to the size and tried with a smaller size.
> > Everything worked with a smaller initrd. I also think that it is not a
> > good idea to use a 22MB initrd anyway so decided against the Debian
> > Bullseye initrd. 
> 
> Why is it a bad idea? In general, bigger file allows us to test corner cases.

That is also true.

This test is minimal, there is only dom0 booting, no domUs. To me, it
makes sense that also the initrd is small. In general 20-25MB is the
regular full size of a Linux arm64 rootfs. I think it makes sense to
stay below 10-15MB for arm32 if we can.

We could go up in size if we added the Xen tools and a domU to the
initrd and tested xl create. There is a test like that for arm64.

We can add more tests like that.


> > (For reference 22MB is basically the size of a fully
> > featured Yocto-build rootfs.) I did not file a bug to qemu-devel yet and
> > didn't investigate further on the QEMU side as I ran out of time.
> > 
> > Alpine Linux provides a very nice 2.5MB initrd. I tried to use both
> > kernel and initrd from Alpine Linux but unfortunately the Alpine Linux
> > kernel doesn't boot. I don't know why but I think it is because it might
> > be missing the console driver. I am not sure. There are a lot of
> > combinations that don't work and it is time consuming to investigate
> > them all. I have been trying to investigate only the most critical
> > things -- they are too many!
> > 
> > I should add that the Debian initrd is not the ideal initrd because it
> > is made to start the Debian installer. Here we just want a tiny busybox
> > initrd.
> > 
> > In general, I think it would be better if we could use the kernel and
> > initrd from the same source but I couldn't find one that works. I could
> > build one myself but it would be one more thing to maintain in
> > gitlab-ci. Also using u-boot might solve the problem of loading the
> > binary but again we would have to maintain a u-boot arm32 build in
> > gitlab-ci.
> > 
> > So in order of preference best to worst in my opinion:
> > 
> > 1) kernel and initrd from the same source
> > 2) kernel and initrd from different sources
> > 3) build your own kernel/initrd/u-boot
> > 
> > So I ended up doing 2). I tested it and it is sufficient to get the test
> > up and running.
> 
> Thanks for the explanation. So I think we should not call that an "Upgrade to
> Bullseye" because you are not using Debian. Instead, you borrowed a working
> kernel that happens to have everything you need built-in.
> 
> Also, can you update the commit message and provide a summary of this
> discussion?

Yes I can do that, thanks for the review!


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 22:26:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 22:26:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293227.498078 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWQU3-0000sQ-OV; Mon, 21 Mar 2022 22:26:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293227.498078; Mon, 21 Mar 2022 22:26:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWQU3-0000sJ-LW; Mon, 21 Mar 2022 22:26:39 +0000
Received: by outflank-mailman (input) for mailman id 293227;
 Mon, 21 Mar 2022 22:26:38 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=N4tx=UA=invisiblethingslab.com=marmarek@srs-se1.protection.inumbo.net>)
 id 1nWQU2-0000sD-HM
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 22:26:38 +0000
Received: from wout4-smtp.messagingengine.com (wout4-smtp.messagingengine.com
 [64.147.123.20]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f7819e94-a965-11ec-8fbc-03012f2f19d4;
 Mon, 21 Mar 2022 23:26:36 +0100 (CET)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41])
 by mailout.west.internal (Postfix) with ESMTP id 040E23200A16;
 Mon, 21 Mar 2022 18:26:33 -0400 (EDT)
Received: from mailfrontend1 ([10.202.2.162])
 by compute1.internal (MEProxy); Mon, 21 Mar 2022 18:26:34 -0400
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Mon,
 21 Mar 2022 18:26:32 -0400 (EDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f7819e94-a965-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:cc:content-type:date:date:from:from
	:in-reply-to:message-id:mime-version:reply-to:sender:subject
	:subject:to:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender
	:x-sasl-enc; s=fm3; bh=KcMTqV0C4yKLXV4AELoaumdX8O4rpz8M8oTd2bQmY
	4k=; b=JQHDNU/dW13ncNNN7ZqZJw4WbjClESgU/FxxusGR3vjB4tCIvx5EGdKtd
	AF7ZUeL4+jVLuzpNPU1z+IEqTpHx8ZVQnbx1HkDLBWQzfAt6i8VWUEgaj9PSnVPu
	DunFPKwdm8K8UuVBZtAo24LE/f7OL4zZyKjz+gdlBI27WiMQct5zucqRFEn4QusR
	87McEk52duHugueBk8gXZuEz3uTooCBBgfomWjkmigh4dpj+N7SFeD3za7L+MQor
	G57yNdIxKrtPSupHTVrOe1dL7fuGset1XHLdjBB2HDY27YY+Nzxu6sC0r88eHAST
	zYj+4Jo+nd2ERNgQrB0BkC3UHClnw==
X-ME-Sender: <xms:mfs4YsHVvhsbVYaiL_RUf_dtcTSqh2u2MlA28z_JFlST7dcg2sCoUQ>
    <xme:mfs4YlWFLviS-dvEAKj2OvzyCrecQ8Mv5HMF25-xyYAGoZ-3LkMfQE_XWhbS3UZLd
    KBoiELz_P27QQ>
X-ME-Received: <xmr:mfs4YmJ7VQ97sPpKBE4iKB-KbBDQafQ2DJMbSajibB8CMV_I6ROhEDXGky6j2waKD_THotYB3fxWk1aACVcUPl1Sppqg5ZBeHA>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddrudegfedgudeiudcutefuodetggdotefrod
    ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh
    necuuegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmd
    enucfjughrpeffhffvuffkgggtugesghdtreertddtjeenucfhrhhomhepofgrrhgvkhcu
    ofgrrhgtiiihkhhofihskhhiqdfikphrvggtkhhiuceomhgrrhhmrghrvghksehinhhvih
    hsihgslhgvthhhihhnghhslhgrsgdrtghomheqnecuggftrfgrthhtvghrnheptddugfet
    udevudeiveevgfetueejlefggffghffhhfehtdfffeefgfduueegfefhnecuvehluhhsth
    gvrhfuihiivgeptdenucfrrghrrghmpehmrghilhhfrhhomhepmhgrrhhmrghrvghksehi
    nhhvihhsihgslhgvthhhihhnghhslhgrsgdrtghomh
X-ME-Proxy: <xmx:mfs4YuEAe1MvOAGgwzoZluA-Slr7qlHN2frKJo18WTpq3sMeuzA7dw>
    <xmx:mfs4YiVK2TeSJdgBM6zYMwhId8nxFjt_76USd3q1Brvih8XUL_JkOQ>
    <xmx:mfs4YhNsJPE8DKbKUKr_zQH_D3I0IsbL-vqs1BL630Ey_6683C5fCQ>
    <xmx:mfs4YtAt3GIi_zjN42I225OPCN_fVE906LQrM0i7Dcb0DYauQx5j_Q>
Date: Mon, 21 Mar 2022 23:26:30 +0100
From: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: xen-devel <xen-devel@lists.xenproject.org>
Cc: Jan Beulich <jbeulich@suse.com>
Subject: "BUG: using smp_processor_id() in preemptible" on resume from S3
Message-ID: <Yjj7liZrbRUXXrvi@mail-itl>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="C94NijKclWDAxEp4"
Content-Disposition: inline


--C94NijKclWDAxEp4
Content-Type: text/plain; protected-headers=v1; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Date: Mon, 21 Mar 2022 23:26:30 +0100
From: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: xen-devel <xen-devel@lists.xenproject.org>
Cc: Jan Beulich <jbeulich@suse.com>
Subject: "BUG: using smp_processor_id() in preemptible" on resume from S3

Hi,

After updating from 5.14.15 dom0 kernel to 5.16.13 I started getting
this on resume from S3:

[   88.082751] ACPI: PM: Low-level resume complete
[   88.087933] ACPI: EC: EC started
[   88.091464] ACPI: PM: Restoring platform NVS memory
[   88.097166] xen_acpi_processor: Uploading Xen processor PM info
[   88.103850] Enabling non-boot CPUs ...
[   88.108128] installing Xen timer for CPU 1
[   88.112763] BUG: using smp_processor_id() in preemptible [00000000] code=
: systemd-sleep/7138
[   88.122256] caller is is_xen_pmu+0x12/0x30
[   88.126937] CPU: 0 PID: 7138 Comm: systemd-sleep Tainted: G        W    =
     5.16.13-2.fc32.qubes.x86_64 #1
[   88.137939] Hardware name: Star Labs StarBook/StarBook, BIOS 7.97 03/21/=
2022
[   88.145930] Call Trace:
[   88.148757]  <TASK>
[   88.151193]  dump_stack_lvl+0x48/0x5e
[   88.155381]  check_preemption_disabled+0xde/0xe0
[   88.160641]  is_xen_pmu+0x12/0x30
[   88.164441]  xen_smp_intr_init_pv+0x75/0x100
[   88.169311]  ? xen_read_cr0+0x20/0x20
[   88.173502]  xen_cpu_up_prepare_pv+0x3e/0x90
[   88.178374]  cpuhp_invoke_callback+0x2b8/0x460
[   88.183440]  ? _raw_spin_unlock_irqrestore+0x25/0x40
[   88.189093]  cpuhp_up_callbacks+0x4b/0x170
[   88.193769]  _cpu_up+0xba/0x140
[   88.197374]  thaw_secondary_cpus.cold+0x50/0xaa
[   88.202538]  suspend_enter+0x11e/0x3b0
[   88.206825]  suspend_devices_and_enter+0x165/0x270
[   88.212281]  enter_state+0x125/0x176
[   88.216372]  pm_suspend.cold+0x20/0x6b
[   88.220658]  state_store+0x27/0x50
[   88.224557]  kernfs_fop_write_iter+0x121/0x1b0
[   88.229621]  new_sync_write+0x159/0x1f0
[   88.234006]  vfs_write+0x20d/0x2a0
[   88.237904]  ksys_write+0x67/0xe0
[   88.241703]  do_syscall_64+0x38/0x90
[   88.245797]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[   88.251544] RIP: 0033:0x7eae453da2f7
[   88.255637] Code: 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f =
00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 01 00 00 00 0f 05 <48=
> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 48 89 54 24 18 48 89 74 24
[   88.276779] RSP: 002b:00007ffcbc7d05e8 EFLAGS: 00000246 ORIG_RAX: 000000=
0000000001
[   88.285353] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007eae453=
da2f7
[   88.293438] RDX: 0000000000000004 RSI: 00007ffcbc7d06d0 RDI: 00000000000=
00004
[   88.301525] RBP: 00007ffcbc7d06d0 R08: 00005be912db7c00 R09: 00000000000=
0000d
[   88.309613] R10: 00005be912db3e10 R11: 0000000000000246 R12: 00000000000=
00004
[   88.317699] R13: 00005be912db32d0 R14: 0000000000000004 R15: 00007eae454=
ac700
[   88.325787]  </TASK>
[   88.328711] cpu 1 spinlock event irq 131
[   88.333188] ACPI: \_SB_.CP01: Found 3 idle states
[   88.338833] CPU1 is up

and so on for all CPUs.=20

In recent changes I see e25a8d959992 "x86/Xen: streamline (and fix) PV
CPU enumeration", which was backported to 5.16.11, although that's just
a hunch.

Any ideas? If necessary, I can run bisect to find specific commit, but I
hope the above message gives enough hints.

--=20
Best Regards,
Marek Marczykowski-G=C3=B3recki
Invisible Things Lab

--C94NijKclWDAxEp4
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAmI4+5YACgkQ24/THMrX
1yzvGwf/XRCB9CvAfT2kp/jm2xz5uQ37xawq10M1o+16Wvt1i5CEdeWaB0hC5Fgi
tXbBqu+JMThDUp9Xv/wmb0/Dwu43bvzXOjqyaP4iRF6zZklebXsv369EuSPkpIME
lJuV070chBRIo5k4AEHmuFCHI1oQ2FSx2MyIEqMuQxHY/mkt/hb2awO+J3Tjm3ZL
ihgmhSWRGr6+kAML4Ih0SZIi8C5ka+lTcV9dKgoFE+txpOdsT63ojpTFjMEGJoRC
ZFKiCbr8PAtQOFrl7g1vgI5+bA5lJsJc3ZgXogAKntxCQoeDq5pLZF/Ua2ZX4kw0
EYFOWKkjZKh815lRxxVapEde1VwjXw==
=eezW
-----END PGP SIGNATURE-----

--C94NijKclWDAxEp4--


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 23:45:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 23:45:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293231.498089 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWRiH-0000OH-Lq; Mon, 21 Mar 2022 23:45:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293231.498089; Mon, 21 Mar 2022 23:45:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWRiH-0000OA-HN; Mon, 21 Mar 2022 23:45:25 +0000
Received: by outflank-mailman (input) for mailman id 293231;
 Mon, 21 Mar 2022 23:45:24 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=/V3S=UA=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nWRiG-0000O4-Jj
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 23:45:24 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org
 [2604:1380:4641:c500::1])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f891a1dd-a970-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 00:45:22 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id DFFB461527;
 Mon, 21 Mar 2022 23:45:18 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 1D35AC340E8;
 Mon, 21 Mar 2022 23:45:18 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f891a1dd-a970-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647906318;
	bh=C5yAsdfo9Lbao6+ZygFxKZk8HNt7HzNXpN6FsPsm1KI=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=BJFxZdaLqMa8LGYGBOOj0jOFgurtphjljInay7uuhIdwB//ndzUZfm/V5wU2ZyoA2
	 /3ygzGZdf0ygbK+/eS39vtwhCxWneGzeWzTpPjJSWgHn3EywzT7CbX0FVToJwJvGER
	 qwVMJwFcoA0i7nIgakKMwZhij9PMErt0yoap911dpf9VUwpPJ/e3tj2y9PuOStwq60
	 SIaXah9vs2bHTepLo2+rWT+v5jTPIgL03XcOmN9RlAjd0HnIdX4h5ch44woUz9eqwV
	 k3riDCPRAUIwVlxeMjTl7Cca0+GQJF1I+JDb8OjpFiOEFdU6sERLdJkAQFq8572Tsr
	 fQaINUQGaOWDw==
Date: Mon, 21 Mar 2022 16:45:17 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Luca Fancellu <luca.fancellu@arm.com>
cc: xen-devel@lists.xenproject.org, bertrand.marquis@arm.com, wei.chen@arm.com, 
    Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, 
    Andrew Cooper <andrew.cooper3@citrix.com>, 
    George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, 
    Wei Liu <wl@xen.org>, Juergen Gross <jgross@suse.com>, 
    Dario Faggioli <dfaggioli@suse.com>
Subject: Re: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
In-Reply-To: <20220318152541.7460-5-luca.fancellu@arm.com>
Message-ID: <alpine.DEB.2.22.394.2203211541030.2910984@ubuntu-linux-20-04-desktop>
References: <20220318152541.7460-1-luca.fancellu@arm.com> <20220318152541.7460-5-luca.fancellu@arm.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Fri, 18 Mar 2022, Luca Fancellu wrote:
> Introduce a way to create different cpupools at boot time, this is
> particularly useful on ARM big.LITTLE system where there might be the
> need to have different cpupools for each type of core, but also
> systems using NUMA can have different cpu pools for each node.
> 
> The feature on arm relies on a specification of the cpupools from the
> device tree to build pools and assign cpus to them.
> 
> Documentation is created to explain the feature.
> 
> Signed-off-by: Luca Fancellu <luca.fancellu@arm.com>
> ---
> Changes in v3:
> - Add newline to cpupools.txt and removed "default n" from Kconfig (Jan)
> - Fixed comment, moved defines, used global cpu_online_map, use
>   HAS_DEVICE_TREE instead of ARM and place arch specific code in header
>   (Juergen)
> - Fix brakets, x86 code only panic, get rid of scheduler dt node, don't
>   save pool pointer and look for it from the pool list (Stefano)
> - Changed data structures to allow modification to the code.
> Changes in v2:
> - Move feature to common code (Juergen)
> - Try to decouple dtb parse and cpupool creation to allow
>   more way to specify cpupools (for example command line)
> - Created standalone dt node for the scheduler so it can
>   be used in future work to set scheduler specific
>   parameters
> - Use only auto generated ids for cpupools
> ---
>  docs/misc/arm/device-tree/cpupools.txt | 135 +++++++++++++++++++
>  xen/arch/arm/include/asm/smp.h         |   3 +
>  xen/common/Kconfig                     |   7 +
>  xen/common/Makefile                    |   1 +
>  xen/common/boot_cpupools.c             | 178 +++++++++++++++++++++++++
>  xen/common/sched/cpupool.c             |   9 +-
>  xen/include/xen/sched.h                |  19 +++
>  7 files changed, 351 insertions(+), 1 deletion(-)
>  create mode 100644 docs/misc/arm/device-tree/cpupools.txt
>  create mode 100644 xen/common/boot_cpupools.c
> 
> diff --git a/docs/misc/arm/device-tree/cpupools.txt b/docs/misc/arm/device-tree/cpupools.txt
> new file mode 100644
> index 000000000000..6d7463736b48
> --- /dev/null
> +++ b/docs/misc/arm/device-tree/cpupools.txt
> @@ -0,0 +1,135 @@
> +Boot time cpupools
> +==================
> +
> +When BOOT_TIME_CPUPOOLS is enabled in the Xen configuration, it is possible to
> +create cpupools during boot phase by specifying them in the device tree.
> +
> +Cpupools specification nodes shall be direct childs of /chosen node.
> +Each cpupool node contains the following properties:
> +
> +- compatible (mandatory)
> +
> +    Must always include the compatiblity string: "xen,cpupool".
> +
> +- cpupool-cpus (mandatory)
> +
> +    Must be a list of device tree phandle to nodes describing cpus (e.g. having
> +    device_type = "cpu"), it can't be empty.
> +
> +- cpupool-sched (optional)
> +
> +    Must be a string having the name of a Xen scheduler, it has no effect when
> +    used in conjunction of a cpupool-id equal to zero, in that case the
> +    default Xen scheduler is selected (sched=<...> boot argument).
> +    Check the sched=<...> boot argument for allowed values.

I am happy with this version of the device tree bindings, thanks for
your efforts to update them. Only one comment left: please update the
description not to include "cpupool-id" given that there is no
cpupool-id property anymore :-)


> +Constraints
> +===========
> +
> +If no cpupools are specified, all cpus will be assigned to one cpupool
> +implicitly created (Pool-0).
> +
> +If cpupools node are specified, but not every cpu brought up by Xen is assigned,
> +all the not assigned cpu will be assigned to an additional cpupool.
> +
> +If a cpu is assigned to a cpupool, but it's not brought up correctly, Xen will
> +stop.
> +
> +
> +Examples
> +========
> +
> +A system having two types of core, the following device tree specification will
> +instruct Xen to have two cpupools:
> +
> +- The cpupool with id 0 will have 4 cpus assigned.
> +- The cpupool with id 1 will have 2 cpus assigned.
> +
> +The following example can work only if hmp-unsafe=1 is passed to Xen boot
> +arguments, otherwise not all cores will be brought up by Xen and the cpupool
> +creation process will stop Xen.
> +
> +
> +a72_1: cpu@0 {
> +        compatible = "arm,cortex-a72";
> +        reg = <0x0 0x0>;
> +        device_type = "cpu";
> +        [...]
> +};
> +
> +a72_2: cpu@1 {
> +        compatible = "arm,cortex-a72";
> +        reg = <0x0 0x1>;
> +        device_type = "cpu";
> +        [...]
> +};
> +
> +a53_1: cpu@100 {
> +        compatible = "arm,cortex-a53";
> +        reg = <0x0 0x100>;
> +        device_type = "cpu";
> +        [...]
> +};
> +
> +a53_2: cpu@101 {
> +        compatible = "arm,cortex-a53";
> +        reg = <0x0 0x101>;
> +        device_type = "cpu";
> +        [...]
> +};
> +
> +a53_3: cpu@102 {
> +        compatible = "arm,cortex-a53";
> +        reg = <0x0 0x102>;
> +        device_type = "cpu";
> +        [...]
> +};
> +
> +a53_4: cpu@103 {
> +        compatible = "arm,cortex-a53";
> +        reg = <0x0 0x103>;
> +        device_type = "cpu";
> +        [...]
> +};
> +
> +chosen {
> +
> +    cpupool_a {
> +        compatible = "xen,cpupool";
> +        cpupool-cpus = <&a53_1 &a53_2 &a53_3 &a53_4>;
> +    };
> +    cpupool_b {
> +        compatible = "xen,cpupool";
> +        cpupool-cpus = <&a72_1 &a72_2>;
> +        cpupool-sched = "credit2";
> +    };
> +
> +    [...]
> +
> +};
> +
> +
> +A system having the cpupools specification below will instruct Xen to have three
> +cpupools:
> +
> +- The cpupool Pool-0 will have 2 cpus assigned.
> +- The cpupool Pool-1 will have 2 cpus assigned.
> +- The cpupool Pool-2 will have 2 cpus assigned (created by Xen with all the not
> +  assigned cpus a53_3 and a53_4).
> +
> +chosen {
> +
> +    cpupool_a {
> +        compatible = "xen,cpupool";
> +        cpupool-cpus = <&a53_1 &a53_2>;
> +    };
> +    cpupool_b {
> +        compatible = "xen,cpupool";
> +        cpupool-cpus = <&a72_1 &a72_2>;
> +        cpupool-sched = "null";
> +    };
> +
> +    [...]
> +
> +};

I think it looks great, thanks!


> diff --git a/xen/arch/arm/include/asm/smp.h b/xen/arch/arm/include/asm/smp.h
> index af5a2fe65266..83c0cd69767b 100644
> --- a/xen/arch/arm/include/asm/smp.h
> +++ b/xen/arch/arm/include/asm/smp.h
> @@ -34,6 +34,9 @@ extern void init_secondary(void);
>  extern void smp_init_cpus(void);
>  extern void smp_clear_cpu_maps (void);
>  extern int smp_get_max_cpus (void);
> +
> +#define cpu_physical_id(cpu) cpu_logical_map(cpu)
> +
>  #endif
>  
>  /*
> diff --git a/xen/common/Kconfig b/xen/common/Kconfig
> index d921c74d615e..70aac5220e75 100644
> --- a/xen/common/Kconfig
> +++ b/xen/common/Kconfig
> @@ -22,6 +22,13 @@ config GRANT_TABLE
>  
>  	  If unsure, say Y.
>  
> +config BOOT_TIME_CPUPOOLS
> +	bool "Create cpupools at boot time"
> +	depends on HAS_DEVICE_TREE
> +	help
> +	  Creates cpupools during boot time and assigns cpus to them. Cpupools
> +	  options can be specified in the device tree.
> +
>  config ALTERNATIVE_CALL
>  	bool
>  
> diff --git a/xen/common/Makefile b/xen/common/Makefile
> index dc8d3a13f5b8..c5949785ab28 100644
> --- a/xen/common/Makefile
> +++ b/xen/common/Makefile
> @@ -1,5 +1,6 @@
>  obj-$(CONFIG_ARGO) += argo.o
>  obj-y += bitmap.o
> +obj-$(CONFIG_BOOT_TIME_CPUPOOLS) += boot_cpupools.o
>  obj-$(CONFIG_HYPFS_CONFIG) += config_data.o
>  obj-$(CONFIG_CORE_PARKING) += core_parking.o
>  obj-y += cpu.o
> diff --git a/xen/common/boot_cpupools.c b/xen/common/boot_cpupools.c
> new file mode 100644
> index 000000000000..f6f2fa8f2701
> --- /dev/null
> +++ b/xen/common/boot_cpupools.c
> @@ -0,0 +1,178 @@
> +/* SPDX-License-Identifier: GPL-2.0 */
> +/*
> + * xen/common/boot_cpupools.c
> + *
> + * Code to create cpupools at boot time.
> + *
> + * Copyright (C) 2022 Arm Ltd.
> + */
> +
> +#include <xen/sched.h>
> +
> +/*
> + * pool_cpu_map:   Index is logical cpu number, content is cpupool id, (-1) for
> + *                 unassigned.
> + * pool_sched_map: Index is cpupool id, content is scheduler id, (-1) for
> + *                 unassigned.
> + */
> +static int __initdata pool_cpu_map[NR_CPUS]   = { [0 ... NR_CPUS-1] = -1 };
> +static int __initdata pool_sched_map[NR_CPUS] = { [0 ... NR_CPUS-1] = -1 };
> +static unsigned int __initdata next_pool_id;
> +
> +#ifdef CONFIG_HAS_DEVICE_TREE

BOOT_TIME_CPUPOOLS depends on HAS_DEVICE_TREE, so it is not possible to
have BOOT_TIME_CPUPOOLS but not HAS_DEVICE_TREE ?


> +#define BTCPUPOOLS_DT_NODE_NO_REG     (-1)
> +#define BTCPUPOOLS_DT_NODE_NO_LOG_CPU (-2)
> +
> +static int __init get_logical_cpu_from_hw_id(unsigned int hwid)
> +{
> +    unsigned int i;
> +
> +    for ( i = 0; i < nr_cpu_ids; i++ )
> +        if ( cpu_physical_id(i) == hwid )
> +            return i;
> +
> +    return -1;
> +}

I wonder if there is a better way to implement this function but I am
not sure. Also, it might be better to avoid premature optimizations.

That said, we could check first the simple case where hwid==i. Looking
at various existing device tree, it seems to be the most common case.

This is not a requirement, just a hand-wavy suggestion. I think the
patch is also OK as is.


> +static int __init
> +get_logical_cpu_from_cpu_node(const struct dt_device_node *cpu_node)
> +{
> +    int cpu_num;
> +    const __be32 *prop;
> +    unsigned int cpu_reg;
> +
> +    prop = dt_get_property(cpu_node, "reg", NULL);
> +    if ( !prop )
> +        return BTCPUPOOLS_DT_NODE_NO_REG;
> +
> +    cpu_reg = dt_read_number(prop, dt_n_addr_cells(cpu_node));
> +
> +    cpu_num = get_logical_cpu_from_hw_id(cpu_reg);
> +    if ( cpu_num < 0 )
> +        return BTCPUPOOLS_DT_NODE_NO_LOG_CPU;
> +
> +    return cpu_num;
> +}
> +
> +static int __init check_and_get_sched_id(const char* scheduler_name)
> +{
> +    int sched_id = sched_get_id_by_name(scheduler_name);
> +
> +    if ( sched_id < 0 )
> +        panic("Scheduler %s does not exists!\n", scheduler_name);
> +
> +    return sched_id;
> +}
> +
> +void __init btcpupools_dtb_parse(void)
> +{
> +    const struct dt_device_node *chosen, *node;
> +
> +    chosen = dt_find_node_by_path("/chosen");
> +    if ( !chosen )
> +        return;
> +
> +    dt_for_each_child_node(chosen, node)
> +    {
> +        const struct dt_device_node *phandle_node;
> +        int sched_id = -1;
> +        const char* scheduler_name;
> +        unsigned int i = 0;
> +
> +        if ( !dt_device_is_compatible(node, "xen,cpupool") )
> +            continue;
> +
> +        if ( !dt_property_read_string(phandle_node, "cpupool-sched",
> +                                      &scheduler_name) )
> +            sched_id = check_and_get_sched_id(scheduler_name);
> +
> +        phandle_node = dt_parse_phandle(node, "cpupool-cpus", i++);
> +        if ( !phandle_node )
> +            panic("Missing or empty cpupool-cpus property!\n");
> +
> +        while ( phandle_node )
> +        {
> +            int cpu_num;
> +
> +            cpu_num = get_logical_cpu_from_cpu_node(phandle_node);
> +
> +            if ( cpu_num < 0 )
> +                panic("Error retrieving logical cpu from node %s (%d)\n",
> +                      dt_node_name(node), cpu_num);
> +
> +            if ( pool_cpu_map[cpu_num] != -1 )
> +                panic("Logical cpu %d already added to a cpupool!\n", cpu_num);
> +
> +            pool_cpu_map[cpu_num] = next_pool_id;
> +            pool_sched_map[next_pool_id] = sched_id;
> +
> +            phandle_node = dt_parse_phandle(node, "cpupool-cpus", i++);
> +        }
> +
> +        /* Let Xen generate pool ids */
> +        next_pool_id++;
> +    }
> +}
> +#endif
> +
> +void __init btcpupools_allocate_pools(void)
> +{
> +    unsigned int i;
> +    bool add_extra_cpupool = false;
> +
> +    /*
> +     * If there are no cpupools, the value of next_pool_id is zero, so the code
> +     * below will assign every cpu to cpupool0 as the default behavior.
> +     * When there are cpupools, the code below is assigning all the not
> +     * assigned cpu to a new pool (next_pool_id value is the last id + 1).
> +     * In the same loop we check if there is any assigned cpu that is not
> +     * online.
> +     */
> +    for ( i = 0; i < nr_cpu_ids; i++ )
> +        if ( cpumask_test_cpu(i, &cpu_online_map) )

Let me take this opportunity to explain the unfortunately unwritten
coding style the way I understand it. I know this is tribal knowledge at
the moment and I apologize for that.

If it is a single line statement, we skip the { }, we keep them in all
other cases.

So:
 
  /* correct */
  if ( xxx ) {
      something;
      something else;
  }

  /* correct */
  if ( xxx ) {
      for ( yyy ) {
      }
  }

  /* correct */
  if ( xxx )
      something single line or 2 lines like a printk that go beyond 80
      chars, never in case of nested ifs

  /* not correct */
  if ( xxx )
      something
      multi
      line;

  /* not correct */
  if ( xxx )
      if ( yyy )
          something;

So basically we would keep the { } here but we would skip them ...


> +        {
> +            /* Unassigned cpu gets next_pool_id pool id value */
> +            if ( pool_cpu_map[i] < 0 )
> +            {
> +                pool_cpu_map[i] = next_pool_id;
> +                add_extra_cpupool = true;
> +            }
> +            printk(XENLOG_INFO "Logical CPU %u in Pool-%u.\n", i,
> +                   pool_cpu_map[i]);
> +        }
> +        else
> +        {
> +            if ( pool_cpu_map[i] >= 0 )
> +                panic("Pool-%d contains cpu%u that is not online!\n",
> +                      pool_cpu_map[i], i);

...skip them here


> +        }
> +
> +    if ( add_extra_cpupool )
> +        next_pool_id++;

...and skip them here


> +    /* Create cpupools with selected schedulers */
> +    for ( i = 0; i < next_pool_id; i++ )
> +        cpupool_create_pool(i, pool_sched_map[i]);
> +
> +#ifdef CONFIG_X86
> +    /* Cpu0 must be in cpupool0 for x86 */
> +    if ( pool_cpu_map[0] != 0 )
> +        panic("Cpu0 must be in Pool-0\n");
> +#endif
> +}
> +
> +unsigned int __init btcpupools_get_cpupool_id(unsigned int cpu)
> +{
> +    return pool_cpu_map[cpu];
> +}
> +
> +/*
> + * Local variables:
> + * mode: C
> + * c-file-style: "BSD"
> + * c-basic-offset: 4
> + * tab-width: 4
> + * indent-tabs-mode: nil
> + * End:
> + */
> diff --git a/xen/common/sched/cpupool.c b/xen/common/sched/cpupool.c
> index 89a891af7076..e5189c53a321 100644
> --- a/xen/common/sched/cpupool.c
> +++ b/xen/common/sched/cpupool.c
> @@ -1247,12 +1247,19 @@ static int __init cf_check cpupool_init(void)
>      cpupool_put(cpupool0);
>      register_cpu_notifier(&cpu_nfb);
>  
> +    btcpupools_dtb_parse();
> +
> +    btcpupools_allocate_pools();
> +
>      spin_lock(&cpupool_lock);
>  
>      cpumask_copy(&cpupool_free_cpus, &cpu_online_map);
>  
>      for_each_cpu ( cpu, &cpupool_free_cpus )
> -        cpupool_assign_cpu_locked(cpupool0, cpu);
> +    {
> +        unsigned int pool_id = btcpupools_get_cpupool_id(cpu);
> +        cpupool_assign_cpu_locked(cpupool_find_by_id(pool_id), cpu);
> +    }
>  
>      spin_unlock(&cpupool_lock);
>  
> diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
> index 4050e22544f9..5d83465d3915 100644
> --- a/xen/include/xen/sched.h
> +++ b/xen/include/xen/sched.h
> @@ -1176,6 +1176,25 @@ extern void cf_check dump_runq(unsigned char key);
>  
>  void arch_do_physinfo(struct xen_sysctl_physinfo *pi);
>  
> +#ifdef CONFIG_BOOT_TIME_CPUPOOLS
> +void btcpupools_allocate_pools(void);
> +unsigned int btcpupools_get_cpupool_id(unsigned int cpu);
> +
> +#ifdef CONFIG_HAS_DEVICE_TREE
> +void btcpupools_dtb_parse(void);
> +#else
> +static inline void btcpupools_dtb_parse(void) {}
> +#endif

same comment about !CONFIG_HAS_DEVICE_TREE


> +#else /* !CONFIG_BOOT_TIME_CPUPOOLS */
> +static inline void btcpupools_allocate_pools(void) {}
> +static inline void btcpupools_dtb_parse(void) {}
> +static inline unsigned int btcpupools_get_cpupool_id(unsigned int cpu)
> +{
> +    return 0;
> +}
> +#endif
> +
>  #endif /* __SCHED_H__ */
>  
>  /*


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 23:45:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 23:45:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293232.498100 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWRiS-0000hH-Sc; Mon, 21 Mar 2022 23:45:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293232.498100; Mon, 21 Mar 2022 23:45:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWRiS-0000hA-PG; Mon, 21 Mar 2022 23:45:36 +0000
Received: by outflank-mailman (input) for mailman id 293232;
 Mon, 21 Mar 2022 23:45:35 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=/V3S=UA=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nWRiR-0000O4-B3
 for xen-devel@lists.xenproject.org; Mon, 21 Mar 2022 23:45:35 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ff92b173-a970-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 00:45:34 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id C26A36152A;
 Mon, 21 Mar 2022 23:45:32 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5D954C340EE;
 Mon, 21 Mar 2022 23:45:31 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ff92b173-a970-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647906331;
	bh=BoZSmsvLEJIwE/N9QzsbcelDVnm/tLjMFH9H5Q8lf34=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=QgBl5kjgLJQO5kQSZIxoDBCsC44D5mzlGGzL4dL0Js2o1ffQQ2Kbh8Gao9H1WmXnD
	 0JcCt5Vyds0LMGobhax22vahzQrx7YszDY93JSO9jbK9deXfrw49N9OgSLTDZR03mw
	 7COolE+U5KIOuX1iZXsoTfURmyqavtCftz25DoMXcLmPKCZ+EYriyTzTT7obBLrQRc
	 9Ugb30OjRsNQ1wmVmVUBclIg2X2OYV87oo5SbcuPQqaoANGT3XQHoBB2IgxtgnUf4U
	 Cti/jVWFHH2jatuXggC43R3qfCLg58VlR5rpf6ZsodYpr1ZYFLRYwT2qTNK5ywAw0a
	 dMa5+4LVB9ppA==
Date: Mon, 21 Mar 2022 16:45:30 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Luca Fancellu <luca.fancellu@arm.com>
cc: xen-devel@lists.xenproject.org, bertrand.marquis@arm.com, wei.chen@arm.com, 
    Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, 
    Andrew Cooper <andrew.cooper3@citrix.com>, 
    George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, 
    Wei Liu <wl@xen.org>
Subject: Re: [PATCH v3 5/6] arm/dom0less: assign dom0less guests to
 cpupools
In-Reply-To: <20220318152541.7460-6-luca.fancellu@arm.com>
Message-ID: <alpine.DEB.2.22.394.2203211637370.2910984@ubuntu-linux-20-04-desktop>
References: <20220318152541.7460-1-luca.fancellu@arm.com> <20220318152541.7460-6-luca.fancellu@arm.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Fri, 18 Mar 2022, Luca Fancellu wrote:
> Introduce domain-cpupool property of a xen,domain device tree node,
> that specifies the cpupool device tree handle of a xen,cpupool node
> that identifies a cpupool created at boot time where the guest will
> be assigned on creation.
> 
> Add member to the xen_domctl_createdomain public interface so the
> XEN_DOMCTL_INTERFACE_VERSION version is bumped.
> 
> Add public function to retrieve a pool id from the device tree
> cpupool node.
> 
> Update documentation about the property.
> 
> Signed-off-by: Luca Fancellu <luca.fancellu@arm.com>
> ---
> Changes in v3:
> - Use explicitely sized integer for struct xen_domctl_createdomain
>   cpupool_id member. (Stefano)
> - Changed code due to previous commit code changes
> Changes in v2:
> - Moved cpupool_id from arch specific to common part (Juergen)
> - Implemented functions to retrieve the cpupool id from the
>   cpupool dtb node.
> ---
>  docs/misc/arm/device-tree/booting.txt |  5 +++++
>  xen/arch/arm/domain_build.c           | 14 +++++++++++++-
>  xen/common/boot_cpupools.c            | 24 ++++++++++++++++++++++++
>  xen/common/domain.c                   |  2 +-
>  xen/include/public/domctl.h           |  4 +++-
>  xen/include/xen/sched.h               |  9 +++++++++
>  6 files changed, 55 insertions(+), 3 deletions(-)
> 
> diff --git a/docs/misc/arm/device-tree/booting.txt b/docs/misc/arm/device-tree/booting.txt
> index a94125394e35..7b4a29a2c293 100644
> --- a/docs/misc/arm/device-tree/booting.txt
> +++ b/docs/misc/arm/device-tree/booting.txt
> @@ -188,6 +188,11 @@ with the following properties:
>      An empty property to request the memory of the domain to be
>      direct-map (guest physical address == physical address).
>  
> +- domain-cpupool
> +
> +    Optional. Handle to a xen,cpupool device tree node that identifies the
> +    cpupool where the guest will be started at boot.
> +
>  Under the "xen,domain" compatible node, one or more sub-nodes are present
>  for the DomU kernel and ramdisk.
>  
> diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
> index 8be01678de05..9c67a483d4a4 100644
> --- a/xen/arch/arm/domain_build.c
> +++ b/xen/arch/arm/domain_build.c
> @@ -3172,7 +3172,8 @@ static int __init construct_domU(struct domain *d,
>  void __init create_domUs(void)
>  {
>      struct dt_device_node *node;
> -    const struct dt_device_node *chosen = dt_find_node_by_path("/chosen");
> +    const struct dt_device_node *cpupool_node,
> +                                *chosen = dt_find_node_by_path("/chosen");
>  
>      BUG_ON(chosen == NULL);
>      dt_for_each_child_node(chosen, node)
> @@ -3241,6 +3242,17 @@ void __init create_domUs(void)
>                                           vpl011_virq - 32 + 1);
>          }
>  
> +        /* Get the optional property domain-cpupool */
> +        cpupool_node = dt_parse_phandle(node, "domain-cpupool", 0);
> +        if ( cpupool_node )
> +        {
> +            int pool_id = btcpupools_get_domain_pool_id(cpupool_node);
> +            if ( pool_id < 0 )
> +                panic("Error getting cpupool id from domain-cpupool (%d)\n",
> +                      pool_id);
> +            d_cfg.cpupool_id = pool_id;
> +        }
> +
>          /*
>           * The variable max_init_domid is initialized with zero, so here it's
>           * very important to use the pre-increment operator to call
> diff --git a/xen/common/boot_cpupools.c b/xen/common/boot_cpupools.c
> index f6f2fa8f2701..feba93a243fc 100644
> --- a/xen/common/boot_cpupools.c
> +++ b/xen/common/boot_cpupools.c
> @@ -23,6 +23,8 @@ static unsigned int __initdata next_pool_id;
>  
>  #define BTCPUPOOLS_DT_NODE_NO_REG     (-1)
>  #define BTCPUPOOLS_DT_NODE_NO_LOG_CPU (-2)
> +#define BTCPUPOOLS_DT_WRONG_NODE      (-3)
> +#define BTCPUPOOLS_DT_CORRUPTED_NODE  (-4)
>  
>  static int __init get_logical_cpu_from_hw_id(unsigned int hwid)
>  {
> @@ -55,6 +57,28 @@ get_logical_cpu_from_cpu_node(const struct dt_device_node *cpu_node)
>      return cpu_num;
>  }
>  
> +int __init btcpupools_get_domain_pool_id(const struct dt_device_node *node)
> +{
> +    const struct dt_device_node *phandle_node;
> +    int cpu_num;
> +
> +    if ( !dt_device_is_compatible(node, "xen,cpupool") )
> +        return BTCPUPOOLS_DT_WRONG_NODE;
> +    /*
> +     * Get first cpu listed in the cpupool, from its reg it's possible to
> +     * retrieve the cpupool id.
> +     */
> +    phandle_node = dt_parse_phandle(node, "cpupool-cpus", 0);
> +    if ( !phandle_node )
> +        return BTCPUPOOLS_DT_CORRUPTED_NODE;
> +
> +    cpu_num = get_logical_cpu_from_cpu_node(phandle_node);
> +    if ( cpu_num < 0 )
> +        return cpu_num;
> +
> +    return pool_cpu_map[cpu_num];
> +}
> +
>  static int __init check_and_get_sched_id(const char* scheduler_name)
>  {
>      int sched_id = sched_get_id_by_name(scheduler_name);
> diff --git a/xen/common/domain.c b/xen/common/domain.c
> index 351029f8b239..0827400f4f49 100644
> --- a/xen/common/domain.c
> +++ b/xen/common/domain.c
> @@ -698,7 +698,7 @@ struct domain *domain_create(domid_t domid,
>          if ( !d->pbuf )
>              goto fail;
>  
> -        if ( (err = sched_init_domain(d, 0)) != 0 )
> +        if ( (err = sched_init_domain(d, config->cpupool_id)) != 0 )
>              goto fail;
>  
>          if ( (err = late_hwdom_init(d)) != 0 )
> diff --git a/xen/include/public/domctl.h b/xen/include/public/domctl.h
> index b85e6170b0aa..2f4cf56f438d 100644
> --- a/xen/include/public/domctl.h
> +++ b/xen/include/public/domctl.h
> @@ -38,7 +38,7 @@
>  #include "hvm/save.h"
>  #include "memory.h"
>  
> -#define XEN_DOMCTL_INTERFACE_VERSION 0x00000014
> +#define XEN_DOMCTL_INTERFACE_VERSION 0x00000015
>  
>  /*
>   * NB. xen_domctl.domain is an IN/OUT parameter for this operation.
> @@ -106,6 +106,8 @@ struct xen_domctl_createdomain {
>      /* Per-vCPU buffer size in bytes.  0 to disable. */
>      uint32_t vmtrace_size;
>  
> +    uint32_t cpupool_id;
> +
>      struct xen_arch_domainconfig arch;
>  };
>  
> diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
> index 5d83465d3915..4e749a604f25 100644
> --- a/xen/include/xen/sched.h
> +++ b/xen/include/xen/sched.h
> @@ -1182,6 +1182,7 @@ unsigned int btcpupools_get_cpupool_id(unsigned int cpu);
>  
>  #ifdef CONFIG_HAS_DEVICE_TREE
>  void btcpupools_dtb_parse(void);
> +int btcpupools_get_domain_pool_id(const struct dt_device_node *node);
>  #else
>  static inline void btcpupools_dtb_parse(void) {}
>  #endif
> @@ -1193,6 +1194,14 @@ static inline unsigned int btcpupools_get_cpupool_id(unsigned int cpu)
>  {
>      return 0;
>  }
> +#ifdef CONFIG_HAS_DEVICE_TREE
> +static inline int
> +btcpupools_get_domain_pool_id(const struct dt_device_node *node)
> +{
> +    return 0;
> +}
> +#endif

This is OK because in case !CONFIG_BOOT_TIME_CPUPOOLS, we have to handle
both the CONFIG_HAS_DEVICE_TREE and the !CONFIG_HAS_DEVICE_TREE.

It is the other case (CONFIG_BOOT_TIME_CPUPOOLS &&
!CONFIG_HAS_DEVICE_TREE) that is not possible.

This patch looks good to me.

Reviewed-by: Stefano Stabellini <sstabellini@kernel.org>


From xen-devel-bounces@lists.xenproject.org Mon Mar 21 23:52:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 21 Mar 2022 23:52:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293237.498111 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWRpA-0002R5-KN; Mon, 21 Mar 2022 23:52:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293237.498111; Mon, 21 Mar 2022 23:52:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWRpA-0002Qy-Gi; Mon, 21 Mar 2022 23:52:32 +0000
Received: by outflank-mailman (input) for mailman id 293237;
 Mon, 21 Mar 2022 23:52:31 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWRp9-0002Qo-7k; Mon, 21 Mar 2022 23:52:31 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWRp9-0001x0-20; Mon, 21 Mar 2022 23:52:31 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWRp8-0003tm-Jj; Mon, 21 Mar 2022 23:52:30 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWRp8-0000pc-JE; Mon, 21 Mar 2022 23:52:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=qeN7uMpIDGJyAsFPH9woT30h2vWEHjw/BO3Afbk7CV8=; b=J/cG18yTbyDXhR8Irmhj75NUx6
	7JUviCqZ6iWCazvLji6rSZaFJeGlrqXiOMHayOVGBA3q7+TTwPSg4V6p6KQGdrHvwCSakXrgx6kA/
	b3ZVo31woZsduErsWC9/gIihfgoq2JCzxRI4kDFfAt+6tfT+V3h90vmKwiF4L8eef8Uc=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168755-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168755: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-dom0pvh-xl-amd:guest-start/debian.repeat:fail:heisenbug
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=8aa0e9d2d1a4815516607eabe9b2e850f284a2f8
X-Osstest-Versions-That:
    xen=fdfb07eb28e42b456e5e1ce999a47cc3ea439f7f
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 21 Mar 2022 23:52:30 +0000

flight 168755 xen-unstable real [real]
flight 168761 xen-unstable real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168755/
http://logs.test-lab.xenproject.org/osstest/logs/168761/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-dom0pvh-xl-amd 22 guest-start/debian.repeat fail pass in 168761-retest

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168737
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168737
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168737
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168737
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168737
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168737
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168737
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168737
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168737
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168737
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168737
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168737
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass

version targeted for testing:
 xen                  8aa0e9d2d1a4815516607eabe9b2e850f284a2f8
baseline version:
 xen                  fdfb07eb28e42b456e5e1ce999a47cc3ea439f7f

Last test of basis   168737  2022-03-21 01:51:59 Z    0 days
Testing same since   168755  2022-03-21 15:06:53 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Luca Fancellu <luca.fancellu@arm.com>
  Raphael Ning <raphning@amazon.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              fail    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   fdfb07eb28..8aa0e9d2d1  8aa0e9d2d1a4815516607eabe9b2e850f284a2f8 -> master


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 00:14:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 00:14:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293246.498126 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWSAL-0005YJ-N6; Tue, 22 Mar 2022 00:14:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293246.498126; Tue, 22 Mar 2022 00:14:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWSAL-0005YC-IE; Tue, 22 Mar 2022 00:14:25 +0000
Received: by outflank-mailman (input) for mailman id 293246;
 Tue, 22 Mar 2022 00:14:24 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWSAK-0005Y2-Lp; Tue, 22 Mar 2022 00:14:24 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWSAK-00032Z-Jy; Tue, 22 Mar 2022 00:14:24 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWSAK-0004gP-4S; Tue, 22 Mar 2022 00:14:24 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWSAK-0002tM-3x; Tue, 22 Mar 2022 00:14:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=NVqJqVVWMLE+BV/veqQilR6Yv5G3IlJm/y80cecDqvc=; b=CYJ1AhCWRXzbkyghqf71J57fI0
	RuLapJAEsyUbXfIc7VPnlPlS9h5ZkLFkWpMLUG8i80xUBLSoN4FIC0XVrdJ5kQq8L0AiqheCg9QAo
	iaXs9ps2f1FgpjsPpiCW2/HZ6tytcPn0Qm4l4eZu07nEUGG4s0sqUOYeTK/ijqgHBe38=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168759-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168759: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 22 Mar 2022 00:14:24 +0000

flight 168759 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168759/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   21 days
Failing since        168258  2022-03-01 01:55:31 Z   20 days  216 attempts
Testing same since   168738  2022-03-21 02:39:18 Z    0 days   15 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 859 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 02:27:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 02:27:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293256.498137 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWUF0-0007Cf-08; Tue, 22 Mar 2022 02:27:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293256.498137; Tue, 22 Mar 2022 02:27:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWUEz-0007CY-RY; Tue, 22 Mar 2022 02:27:21 +0000
Received: by outflank-mailman (input) for mailman id 293256;
 Tue, 22 Mar 2022 02:27:21 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWUEy-0007CO-V9; Tue, 22 Mar 2022 02:27:20 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWUEy-0002XF-Qd; Tue, 22 Mar 2022 02:27:20 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWUEy-0001Ks-9T; Tue, 22 Mar 2022 02:27:20 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWUEy-0006Xj-8k; Tue, 22 Mar 2022 02:27:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=y5jIxr9K+th9kdjo3RpK0EcCIwZefdhSUzpryKmkpYU=; b=5PEe9jIE6dNqGRsGdtiPwoTvuo
	aF/6+8UDcJfkIlyPol/0nSp2+C6TmG7BJaQP/+9nl7507Sd9zLw8a2cKif8JXZZqzhETnUNAlqotl
	2r7eZ6gWAjfDey4memByLUlPcjKlzTSw1Yv/+HinsFeGQOOtv2e9fRbnZJwxafyKTmDE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168756-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168756: regressions - FAIL
X-Osstest-Failures:
    qemu-mainline:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:debian-hvm-install:fail:regression
    qemu-mainline:test-amd64-amd64-qemuu-freebsd12-amd64:guest-start/freebsd.repeat:fail:regression
    qemu-mainline:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:debian-hvm-install:fail:regression
    qemu-mainline:build-armhf:xen-build:fail:regression
    qemu-mainline:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:build-check(1):blocked:nonblocking
    qemu-mainline:build-armhf-libvirt:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=ecf1bbe3227cc1c54d7374aa737e7e0e60ee0c29
X-Osstest-Versions-That:
    qemuu=2058fdbe81e2985c226a026851dd26b146d3395c
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 22 Mar 2022 02:27:20 +0000

flight 168756 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168756/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow 12 debian-hvm-install fail REGR. vs. 168712
 test-amd64-amd64-qemuu-freebsd12-amd64 21 guest-start/freebsd.repeat fail REGR. vs. 168712
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm 12 debian-hvm-install fail REGR. vs. 168712
 build-armhf                   6 xen-build                fail REGR. vs. 168712

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-cubietruck  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-rtds      1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-vhd       1 build-check(1)               blocked  n/a
 build-armhf-libvirt           1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-arndale   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit1   1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168712
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168712
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168712
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168712
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168712
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass

version targeted for testing:
 qemuu                ecf1bbe3227cc1c54d7374aa737e7e0e60ee0c29
baseline version:
 qemuu                2058fdbe81e2985c226a026851dd26b146d3395c

Last test of basis   168712  2022-03-19 20:39:34 Z    2 days
Testing same since   168756  2022-03-21 15:38:09 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Cédric Le Goater <clg@kaod.org>
  Khem Raj <raj.khem@gmail.com>
  Lucas Coutinho <lucas.coutinho@eldorado.org.br>
  Peter Maydell <peter.maydell@linaro.org>
  Richard Henderson <richard.henderson@linaro.org>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  fail    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          blocked 
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 fail    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       fail    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  blocked 
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  blocked 
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  blocked 
 test-armhf-armhf-xl-cubietruck                               blocked 
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                blocked 
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     blocked 
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             fail    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      blocked 
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit ecf1bbe3227cc1c54d7374aa737e7e0e60ee0c29
Merge: 2058fdbe81 3515553bf6
Author: Peter Maydell <peter.maydell@linaro.org>
Date:   Mon Mar 21 11:16:56 2022 +0000

    Merge tag 'pull-ppc-20220321' of https://github.com/legoater/qemu into staging
    
    ppc-7.0 queue :
    
    * ISA v3.1 vector instruction fixes
    * Compilation fix regarding 'struct pt_regs' definition
    
    # gpg: Signature made Mon 21 Mar 2022 06:43:22 GMT
    # gpg:                using RSA key A0F66548F04895EBFE6B0B6051A343C7CFFBECA1
    # gpg: Good signature from "Cédric Le Goater <clg@kaod.org>" [undefined]
    # gpg: WARNING: This key is not certified with a trusted signature!
    # gpg:          There is no indication that the signature belongs to the owner.
    # Primary key fingerprint: A0F6 6548 F048 95EB FE6B  0B60 51A3 43C7 CFFB ECA1
    
    * tag 'pull-ppc-20220321' of https://github.com/legoater/qemu:
      target/ppc: Replicate Double->Single-Precision result
      target/ppc: Replicate double->int32 result for some vector insns
      ppc64: Avoid pt_regs struct definition
    
    Signed-off-by: Peter Maydell <peter.maydell@linaro.org>

commit 3515553bf625ad48aa90210379c4f387c2596093
Author: Lucas Coutinho <lucas.coutinho@eldorado.org.br>
Date:   Sun Mar 20 23:35:27 2022 +0100

    target/ppc: Replicate Double->Single-Precision result
    
    Power ISA v3.1 formalizes the previously undefined result in
    words 1 and 3 to be a copy of the result in words 0 and 2.
    
    This affects: xvcvsxdsp, xvcvuxdsp, xvcvdpsp.
    
    And the previously undefined result in word 1 to be a copy of
    the result in word 0.
    
    This affects: xscvdpsp.
    
    Signed-off-by: Lucas Coutinho <lucas.coutinho@eldorado.org.br>
    Message-Id: <20220316200427.3410437-1-lucas.coutinho@eldorado.org.br>
    Signed-off-by: Cédric Le Goater <clg@kaod.org>

commit 217979d33e78ee64978295962c33d8525973c760
Author: Richard Henderson <richard.henderson@linaro.org>
Date:   Sun Mar 20 23:35:27 2022 +0100

    target/ppc: Replicate double->int32 result for some vector insns
    
    Power ISA v3.1 formalizes the previously undefined result in
    words 1 and 3 to be a copy of the result in words 0 and 2.
    
    This affects: xscvdpsxws, xscvdpuxws, xvcvdpsxws, xvcvdpuxws.
    
    Resolves: https://gitlab.com/qemu-project/qemu/-/issues/852
    Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
    [ clg: checkpatch fixes ]
    Message-Id: <20220315053934.377519-1-richard.henderson@linaro.org>
    Signed-off-by: Cédric Le Goater <clg@kaod.org>

commit 9d1401b79463e74adbfac69d836789d4e103fb61
Author: Khem Raj <raj.khem@gmail.com>
Date:   Sun Mar 20 23:35:27 2022 +0100

    ppc64: Avoid pt_regs struct definition
    
    Remove pt_regs indirection and instead reference gp_regs directly, this
    makes it portable across musl/glibc
    
    Use PT_* constants defined in asm/ptrace.h
    
    Move the file to ppc64 subdir and leave ppc empty
    
    Fixes
    ../qemu-6.2.0/linux-user/host/ppc64/../ppc/host-signal.h:16:32: error: incomplete definition of type 'struct pt_regs'
        return uc->uc_mcontext.regs->nip;
               ~~~~~~~~~~~~~~~~~~~~^
    
    Signed-off-by: Khem Raj <raj.khem@gmail.com>
    Cc: Peter Maydell <peter.maydell@linaro.org>
    Cc: Philippe Mathieu-Daudé <f4bug@amsat.org>
    Cc: Richard Henderson <richard.henderson@linaro.org>
    Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
    Message-Id: <20220315015740.847370-1-raj.khem@gmail.com>
    Signed-off-by: Cédric Le Goater <clg@kaod.org>


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 03:42:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 03:42:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293264.498150 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWVPG-0006bs-IB; Tue, 22 Mar 2022 03:42:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293264.498150; Tue, 22 Mar 2022 03:42:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWVPG-0006bl-E9; Tue, 22 Mar 2022 03:42:02 +0000
Received: by outflank-mailman (input) for mailman id 293264;
 Tue, 22 Mar 2022 03:42:01 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWVPF-0006bb-DR; Tue, 22 Mar 2022 03:42:01 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWVPF-0003jM-Be; Tue, 22 Mar 2022 03:42:01 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWVPE-0004ft-Su; Tue, 22 Mar 2022 03:42:00 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWVPE-0000Tx-SD; Tue, 22 Mar 2022 03:42:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=+35PYvkbTtHWxWRVmeNuoV5oxuF37hQBD9nmDYVbzig=; b=buIpQIsl1lvvMEJfVZsBAnKEuB
	bW1eZKcw7NscNRJXzUAFSVDfS3rPDj5uM1OTUOLkq6FJ/qrze+csQQ3+hQq6BoR63h8a2SHpVRZSD
	VTkn/dVp8v+6v0IO9AB33li6qnPtjAZ5h9FrhAWngUhmZQhoGpnMLfykWW5aXD4WtmdY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168762-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168762: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 22 Mar 2022 03:42:00 +0000

flight 168762 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168762/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   21 days
Failing since        168258  2022-03-01 01:55:31 Z   21 days  217 attempts
Testing same since   168738  2022-03-21 02:39:18 Z    1 days   16 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 859 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 04:12:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 04:12:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293275.498168 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWVsm-0001gw-3r; Tue, 22 Mar 2022 04:12:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293275.498168; Tue, 22 Mar 2022 04:12:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWVsm-0001gp-0i; Tue, 22 Mar 2022 04:12:32 +0000
Received: by outflank-mailman (input) for mailman id 293275;
 Tue, 22 Mar 2022 04:12:30 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWVsk-0001ge-EM; Tue, 22 Mar 2022 04:12:30 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWVsk-0004Ld-9b; Tue, 22 Mar 2022 04:12:30 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWVsk-0006Y9-10; Tue, 22 Mar 2022 04:12:30 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWVsk-0002cA-0X; Tue, 22 Mar 2022 04:12:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=S4WGzT1uyFxU+D2ZYdwUn6TFsRvmJZX/zLGdFw2Ppnc=; b=AansQ65njZ6DcSw5qlT1o78pAL
	gqyS+Xgb5A2Moc4uYdzTd6KPkrdGoyGVNPNSt8wLfXpqauNuliC9+C7AmUxDBG6SlftzsBi+ohXxK
	V/gfZ1T3hpZ4zQgSwXi+C/X2Nq+zQS4HUuqu9KYP/+bNax2atV86GJks0Qv9+SkDRqxk=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168760-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168760: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl-rtds:guest-localmigrate/x10:fail:allowable
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=eaa54b1458ca84092e513d554dd6d234245e6bef
X-Osstest-Versions-That:
    linux=f443e374ae131c168a065ea1748feac6b2e76613
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 22 Mar 2022 04:12:30 +0000

flight 168760 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168760/

Failures :-/ but no regressions.

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-rtds     20 guest-localmigrate/x10   fail REGR. vs. 168733

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168733
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168733
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168733
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168733
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168733
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168733
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168733
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168733
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                eaa54b1458ca84092e513d554dd6d234245e6bef
baseline version:
 linux                f443e374ae131c168a065ea1748feac6b2e76613

Last test of basis   168733  2022-03-20 22:40:53 Z    1 days
Testing same since   168760  2022-03-21 19:41:16 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Adrian Hunter <adrian.hunter@intel.com>
  Ahmad Fatoum <a.fatoum@pengutronix.de>
  Alexey Makhalov <amakhalov@vmware.com>
  Andre Przywara <andre.przywara@arm.com>
  Andreas Rammhold <andreas@rammhold.de>
  Andrey Konovalov <andreyknvl@gmail.com>
  Anshuman Khandual <anshuman.khandual@arm.com>
  Ard Biesheuvel <ardb@kernel.org>
  Arnaldo Carvalho de Melo <acme@redhat.com>
  Bharat Bhushan <bbhushan2@marvell.com>
  Borislav Petkov <bp@suse.de>
  Branislav Rankov <branislav.rankov@arm.com>
  Brijesh Singh <brijesh.singh@amd.com>
  Catalin Marinas <catalin.marinas@arm.com>
  Christoph Hellwig <hch@lst.de>
  Dave Hansen <dave.hansen@linux.intel.com>
  Dave Kleikamp <dave.kleikamp@oracle.com>
  David Engraf <david.engraf@sysgo.com>
  David Hildenbrand <david@redhat.com>
  Deep Shah <sdeep@vmware.com>
  Dinh Nguyen <dinguyen@kernel.org>
  Eliav Farber <farbere@amazon.com>
  Eric Biggers <ebiggers@google.com>
  Eric Snowberg <eric.snowberg@oracle.com>
  Evgenii Stepanov <eugenis@google.com>
  Fangrui Song <maskray@google.com>
  Geert Uytterhoeven <geert+renesas@glider.be>
  Geert Uytterhoeven <geert@linux-m68k.org>
  Greg Kroah-Hartman <gregkh@linuxfoundation.org>
  Gustavo A. R. Silva <gustavoars@kernel.org>
  He Ying <heying24@huawei.com>
  Hou Tao <houtao1@huawei.com>
  Huang Shijie <shijie@os.amperecomputing.com>
  James Bottomley <James.Bottomley@HansenPartnership.com>
  James Morse <james.morse@arm.com>
  Jan Beulich <jbeulich@suse.com>
  Jarkko Sakkinen <jarkko@kernel.org>
  Jarkko Sakkinen<jarkko@kernel.org>
  Jason A. Donenfeld <Jason@zx2c4.com>
  Jason Gunthorpe <jgg@ziepe.ca>
  Jianyong Wu <jianyong.wu@arm.com>
  Jim Mattson <jmattson@google.com>
  Jiri Kosina <jkosina@suse.cz>
  Joe Perches <joe@perches.com>
  Joey Gouly <joey.gouly@arm.com>
  Josh Poimboeuf <jpoimboe@redhat.com>
  Juergen Gross <jgross@suse.com>
  Kefeng Wang <wangkefeng.wang@huawei.com>
  Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
  Lad Prabhakar <prabhakar.mahadev-lad.rj@bp.renesas.com>
  Laurent Vivier <laurent@vivier.eu>
  Liam Howlett <liam.howlett@oracle.com>
  Liam R. Howlett <Liam.Howlett@oracle.com>
  Lino Sanfilippo <LinoSanfilippo@gmx.de>
  Linu Cherian <lcherian@marvell.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Luis Machado <luis.machado@linaro.org>
  Marc Zyngier <maz@kernel.org>
  Marco Bonelli <marco@mebeim.net>
  Mario Limonciello <mario.limonciello@amd.com>
  Mark Brown <broonie@kernel.org>
  Mark Rutland <mark.rutland@arm.com>
  Masahiro Yamada <masahiroy@kernel.org>
  Masami Hiramatsu <mhiramat@kernel.org>
  Michael Schmitz <schmitzmic@gmail.com>
  Mimi Zohar <zohar@linux.ibm.com>
  Muchun Song <songmuchun@bytedance.com>
  Muhammad Usama Anjum <usama.anjum@collabora.com>
  Nathan Chancellor <nathan@kernel.org>
  Peter Collingbourne <pcc@google.com>
  Peter Zijlstra (Intel) <peterz@infradead.org>
  Rabara Niravkumar L <niravkumar.l.rabara@intel.com>
  Rafael J. Wysocki <rafael.j.wysocki@intel.com>
  Reinette Chatre <reinette.chatre@intel.com>
  Rob Herring <robh@kernel.org>
  Robin Murphy <robin.murphy@arm.com>
  Russell King (Oracle) <rmk+kernel@armlinux.org.uk>
  Sagar Patel <sagarmp@cs.unc.edu>
  Shaokun Zhang <zhangshaokun@hisilicon.com>
  Shuah Khan <skhan@linuxfoundation.org>
  Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu>
  Stefan Berger <stefanb@linux.ibm.com>
  Tadeusz Struk <tstruk@gmail.com>
  Tianjia Zhang <tianjia.zhang@linux.alibaba.com>
  Tom Lendacky <thomas.lendacky@amd.com>
  Tony Luck <tony.luck@intel.com>
  Vijay Balakrishna <vijayb@linux.microsoft.com>
  Vinod Koul <vkoul@kernel.org>
  Vladimir Murzin <vladimir.murzin@arm.com>
  Wang Kefeng <wangkefeng.wang@huawei.com>
  Will Deacon <will@kernel.org>
  Yazen Ghannam <yazen.ghannam@amd.com>
  Yury Norov <yury.norov@gmail.com>
  Zack Rusin <zackr@vmware.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     fail    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   f443e374ae13..eaa54b1458ca  eaa54b1458ca84092e513d554dd6d234245e6bef -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 04:14:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 04:14:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293282.498178 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWVui-0002H3-HO; Tue, 22 Mar 2022 04:14:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293282.498178; Tue, 22 Mar 2022 04:14:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWVui-0002Gw-EP; Tue, 22 Mar 2022 04:14:32 +0000
Received: by outflank-mailman (input) for mailman id 293282;
 Tue, 22 Mar 2022 04:14:31 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWVuh-0002Gm-3f; Tue, 22 Mar 2022 04:14:31 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWVuh-0004NE-2n; Tue, 22 Mar 2022 04:14:31 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWVug-0006eK-Nz; Tue, 22 Mar 2022 04:14:30 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWVug-00046G-NW; Tue, 22 Mar 2022 04:14:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=WVnYMJsp53SVtozy7pMGb4SFgE7R2OL+tPBYY/IZPO4=; b=KYufT33iYHK1/6jVgw1XcoqtZ8
	/4cuYDEi9CBi9rrgQA9ySANq/QbxTv314+yZu4F0aZ2PqKFqrYEUnc61ebzzPOiGUbXZ+A27FW6NP
	QRiPr/rY1yD5v0KWapsICRW/4EvxS7sb5FLyEz0Nc+Ho+yKUz94mbOyG0UCy3Edh5ST0=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168766-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168766: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 22 Mar 2022 04:14:30 +0000

flight 168766 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168766/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   21 days
Failing since        168258  2022-03-01 01:55:31 Z   21 days  218 attempts
Testing same since   168738  2022-03-21 02:39:18 Z    1 days   17 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 859 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 07:13:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 07:13:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293292.498196 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWYhQ-00038z-IF; Tue, 22 Mar 2022 07:13:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293292.498196; Tue, 22 Mar 2022 07:13:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWYhQ-00038s-Er; Tue, 22 Mar 2022 07:13:00 +0000
Received: by outflank-mailman (input) for mailman id 293292;
 Tue, 22 Mar 2022 07:12:59 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=vJOs=UB=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nWYhO-00038m-ST
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 07:12:59 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 7e6883c8-a9af-11ec-a405-831a346695d4;
 Tue, 22 Mar 2022 08:12:56 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 5974D210F2;
 Tue, 22 Mar 2022 07:12:54 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 3227312FC5;
 Tue, 22 Mar 2022 07:12:54 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id KvMrCvZ2OWLBSwAAMHmgww
 (envelope-from <jgross@suse.com>); Tue, 22 Mar 2022 07:12:54 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 7e6883c8-a9af-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647933174; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=mC6VaiwFT+UTeT/HG2xJE+CT5IWTHTfM/H8bZOB/NI0=;
	b=IbXxSfMTL26UfHUTcZ7SzYrEdyV9JDlX33ti/Pn6YVksUKpZ+/HgdWkp8nORGA23T+xbUQ
	6WGPVhI4CO4fWPGjYeIrMUgoLapZgQxFqTIhhm6DvByGVpvso2pk4Bj2ZHtgMqGCMm7Xyj
	bjv2UY4KYKGYVzqfQmi1/iZqYqjYgVU=
Message-ID: <be9f7249-4449-c46f-fad3-b1adbc8d7ea5@suse.com>
Date: Tue, 22 Mar 2022 08:12:53 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: "BUG: using smp_processor_id() in preemptible" on resume from S3
Content-Language: en-US
To: =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?=
 <marmarek@invisiblethingslab.com>, xen-devel <xen-devel@lists.xenproject.org>
Cc: Jan Beulich <jbeulich@suse.com>
References: <Yjj7liZrbRUXXrvi@mail-itl>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <Yjj7liZrbRUXXrvi@mail-itl>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------L1qHoPDKWRIW688gODWwayLb"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------L1qHoPDKWRIW688gODWwayLb
Content-Type: multipart/mixed; boundary="------------p9h7rqE2TK2QpyugWO60fghT";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?=
 <marmarek@invisiblethingslab.com>, xen-devel <xen-devel@lists.xenproject.org>
Cc: Jan Beulich <jbeulich@suse.com>
Message-ID: <be9f7249-4449-c46f-fad3-b1adbc8d7ea5@suse.com>
Subject: Re: "BUG: using smp_processor_id() in preemptible" on resume from S3
References: <Yjj7liZrbRUXXrvi@mail-itl>
In-Reply-To: <Yjj7liZrbRUXXrvi@mail-itl>

--------------p9h7rqE2TK2QpyugWO60fghT
Content-Type: multipart/mixed; boundary="------------iz1Q2WehoQitEPC07b5Z2HGh"

--------------iz1Q2WehoQitEPC07b5Z2HGh
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------iz1Q2WehoQitEPC07b5Z2HGh
Content-Type: text/x-patch; charset=UTF-8;
 name="0001-xen-fix-is_xen_pmu.patch"
Content-Disposition: attachment; filename="0001-xen-fix-is_xen_pmu.patch"
Content-Transfer-Encoding: base64
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--------------iz1Q2WehoQitEPC07b5Z2HGh
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------iz1Q2WehoQitEPC07b5Z2HGh--

--------------p9h7rqE2TK2QpyugWO60fghT--

--------------L1qHoPDKWRIW688gODWwayLb
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmI5dvUFAwAAAAAACgkQsN6d1ii/Ey+I
KAf5ASPTqhdN+eQcjXajD5PqTsntqGN0s6+AkItTxw6WskrsjFPQ2vwd2u2aSdeYGHdgAboKEzbr
vVoVtvTNKEOt5qRlOLOJc6s7pJPOLZpZ1xkbqjDoL/3bRryCpJB3j8eLYBwOAs8d6HaJailAIH8i
M1lhZObQKx6ZmT3VsYgF1xUnb+SELpJV9xWaDA4z1lTbQIIaCn0Vvf5KKlMWI5EKAgzKJr1784gb
3LSrZzkq1yJ+5As1t9A36QVfBenq96FI0OfKrGK8ScUVbmG7uhUlRPWXbR47uI+Vz+JlPJuBmMJZ
cfLmPk8E3p9oiFFULD0Q4ur89t5n6QcH2tmEQ2fj4Q==
=VDOy
-----END PGP SIGNATURE-----

--------------L1qHoPDKWRIW688gODWwayLb--


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 08:03:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 08:03:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293308.498235 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWZTn-000143-1M; Tue, 22 Mar 2022 08:02:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293308.498235; Tue, 22 Mar 2022 08:02:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWZTm-00013w-U4; Tue, 22 Mar 2022 08:02:58 +0000
Received: by outflank-mailman (input) for mailman id 293308;
 Tue, 22 Mar 2022 08:02:57 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=GKWw=UB=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nWZTl-0000XI-E3
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 08:02:57 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTP
 id 7b245567-a9b6-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 09:02:55 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 32248106F;
 Tue, 22 Mar 2022 01:02:55 -0700 (PDT)
Received: from e129167.arm.com (unknown [10.57.5.122])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id A00E03F73D;
 Tue, 22 Mar 2022 01:02:52 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 7b245567-a9b6-11ec-8fbc-03012f2f19d4
From: Michal Orzel <michal.orzel@arm.com>
To: xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>
Subject: [PATCH v2 2/2] xen: Populate xen.lds.h and make use of its macros
Date: Tue, 22 Mar 2022 09:02:33 +0100
Message-Id: <20220322080233.53134-3-michal.orzel@arm.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <20220322080233.53134-1-michal.orzel@arm.com>
References: <20220322080233.53134-1-michal.orzel@arm.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Populate header file xen.lds.h with the first portion of macros storing
constructs common to x86 and arm linker scripts. Replace the original
constructs with these helpers.

No functional improvements to x86 linker script.

Making use of common macros improves arm linker script with:
-explicit list of debug sections that otherwise are seen as "orphans"
by the linker. This will allow to fix issues after enabling linker
option --orphan-handling one day
-extended list of discarded section to include: .discard, desctructors
related sections, .fini_array which can reference .text.exit
-sections not related to debugging that are placed by ld.lld.
Even though Xen on arm compilation with LLVM support is not ready yet,
these sections do not cause problem to GNU ld.

Please note that this patch does not aim to perform the full sync up
between the linker scripts. It creates a base for further work.

Signed-off-by: Michal Orzel <michal.orzel@arm.com>
---
Changes since v1:
-merge x86 and arm changes into single patch
-do not propagate issues by generalizing CTORS
-extract sections not related to debugging into separate macro
-get rid of _SECTION suffix in favor of using more meaningful suffixes
---
 xen/arch/arm/xen.lds.S    |  37 +++++---------
 xen/arch/x86/xen.lds.S    |  78 +++--------------------------
 xen/include/xen/xen.lds.h | 100 ++++++++++++++++++++++++++++++++++++++
 3 files changed, 119 insertions(+), 96 deletions(-)

diff --git a/xen/arch/arm/xen.lds.S b/xen/arch/arm/xen.lds.S
index c666fc3e69..e8ce7ad5f1 100644
--- a/xen/arch/arm/xen.lds.S
+++ b/xen/arch/arm/xen.lds.S
@@ -69,10 +69,7 @@ SECTIONS
        __proc_info_end = .;
 
 #ifdef CONFIG_HAS_VPCI
-       . = ALIGN(POINTER_ALIGN);
-       __start_vpci_array = .;
-       *(SORT(.data.vpci.*))
-       __end_vpci_array = .;
+       VPCI_ARRAY
 #endif
   } :text
 
@@ -110,10 +107,7 @@ SECTIONS
        __end_schedulers_array = .;
 
 #ifdef CONFIG_HYPFS
-       . = ALIGN(8);
-       __paramhypfs_start = .;
-       *(.data.paramhypfs)
-       __paramhypfs_end = .;
+       HYPFS_PARAM
 #endif
 
        *(.data .data.*)
@@ -179,10 +173,7 @@ SECTIONS
        __alt_instructions_end = .;
 
 #ifdef CONFIG_DEBUG_LOCK_PROFILE
-       . = ALIGN(POINTER_ALIGN);
-       __lock_profile_start = .;
-       *(.lockprofile.data)
-       __lock_profile_end = .;
+       LOCK_PROFILE_DATA
 #endif
 
        *(.init.data)
@@ -222,22 +213,18 @@ SECTIONS
   /* Section for the device tree blob (if any). */
   .dtb : { *(.dtb) } :text
 
+  /*
+   * Explicitly list debug sections, to avoid these sections being viewed as
+   * "orphan" by the linker.
+   */
+  DWARF_DEBUG_SECTIONS
+
   /* Sections to be discarded */
-  /DISCARD/ : {
-       *(.exit.text)
-       *(.exit.data)
-       *(.exitcall.exit)
-       *(.eh_frame)
-  }
+  DISCARD_SECTIONS
 
   /* Stabs debugging sections.  */
-  .stab 0 : { *(.stab) }
-  .stabstr 0 : { *(.stabstr) }
-  .stab.excl 0 : { *(.stab.excl) }
-  .stab.exclstr 0 : { *(.stab.exclstr) }
-  .stab.index 0 : { *(.stab.index) }
-  .stab.indexstr 0 : { *(.stab.indexstr) }
-  .comment 0 : { *(.comment) }
+  STABS_DEBUG_SECTIONS
+  ELF_DETAILS_SECTIONS
 }
 
 /*
diff --git a/xen/arch/x86/xen.lds.S b/xen/arch/x86/xen.lds.S
index 4e3a9a2789..65efbf9d0c 100644
--- a/xen/arch/x86/xen.lds.S
+++ b/xen/arch/x86/xen.lds.S
@@ -13,13 +13,6 @@
 #undef __XEN_VIRT_START
 #define __XEN_VIRT_START __image_base__
 #define DECL_SECTION(x) x :
-/*
- * Use the NOLOAD directive, despite currently ignored by (at least) GNU ld
- * for PE output, in order to record that we'd prefer these sections to not
- * be loaded into memory.
- */
-#define DECL_DEBUG(x, a) #x ALIGN(a) (NOLOAD) : { *(x) }
-#define DECL_DEBUG2(x, y, a) #x ALIGN(a) (NOLOAD) : { *(x) *(y) }
 
 ENTRY(efi_start)
 
@@ -27,8 +20,6 @@ ENTRY(efi_start)
 
 #define FORMAT "elf64-x86-64"
 #define DECL_SECTION(x) #x : AT(ADDR(#x) - __XEN_VIRT_START)
-#define DECL_DEBUG(x, a) #x 0 : { *(x) }
-#define DECL_DEBUG2(x, y, a) #x 0 : { *(x) *(y) }
 
 ENTRY(start_pa)
 
@@ -160,10 +151,7 @@ SECTIONS
        __note_gnu_build_id_end = .;
 #endif
 #ifdef CONFIG_HAS_VPCI
-       . = ALIGN(POINTER_ALIGN);
-       __start_vpci_array = .;
-       *(SORT(.data.vpci.*))
-       __end_vpci_array = .;
+       VPCI_ARRAY
 #endif
   } PHDR(text)
 
@@ -279,10 +267,7 @@ SECTIONS
         __alt_instructions_end = .;
 
 #ifdef CONFIG_DEBUG_LOCK_PROFILE
-       . = ALIGN(POINTER_ALIGN);
-       __lock_profile_start = .;
-       *(.lockprofile.data)
-       __lock_profile_end = .;
+       LOCK_PROFILE_DATA
 #endif
 
        . = ALIGN(8);
@@ -336,10 +321,7 @@ SECTIONS
        __end_schedulers_array = .;
 
 #ifdef CONFIG_HYPFS
-       . = ALIGN(8);
-       __paramhypfs_start = .;
-       *(.data.paramhypfs)
-       __paramhypfs_end = .;
+       HYPFS_PARAM
 #endif
   } PHDR(text)
 
@@ -396,24 +378,7 @@ SECTIONS
    * _end here, so if these sections get loaded they'll be discarded at runtime
    * anyway.
    */
-  DECL_DEBUG(.debug_abbrev, 1)
-  DECL_DEBUG2(.debug_info, .gnu.linkonce.wi.*, 1)
-  DECL_DEBUG(.debug_types, 1)
-  DECL_DEBUG(.debug_str, 1)
-  DECL_DEBUG2(.debug_line, .debug_line.*, 1)
-  DECL_DEBUG(.debug_line_str, 1)
-  DECL_DEBUG(.debug_names, 4)
-  DECL_DEBUG(.debug_frame, 4)
-  DECL_DEBUG(.debug_loc, 1)
-  DECL_DEBUG(.debug_loclists, 4)
-  DECL_DEBUG(.debug_macinfo, 1)
-  DECL_DEBUG(.debug_macro, 1)
-  DECL_DEBUG(.debug_ranges, 8)
-  DECL_DEBUG(.debug_rnglists, 4)
-  DECL_DEBUG(.debug_addr, 8)
-  DECL_DEBUG(.debug_aranges, 1)
-  DECL_DEBUG(.debug_pubnames, 1)
-  DECL_DEBUG(.debug_pubtypes, 1)
+  DWARF_DEBUG_SECTIONS
 
 #ifdef EFI
   /* Trick the linker into setting the image size to no less than 16Mb. */
@@ -428,41 +393,12 @@ SECTIONS
 #endif
 
   /* Sections to be discarded */
-  /DISCARD/ : {
-       *(.text.exit)
-       *(.exit.text)
-       *(.exit.data)
-       *(.exitcall.exit)
-       *(.discard)
-       *(.discard.*)
-       *(.eh_frame)
-       *(.dtors)
-       *(.dtors.*)
-       *(.fini_array)
-       *(.fini_array.*)
-#ifdef EFI
-       *(.comment)
-       *(.comment.*)
-       *(.note.*)
-#endif
-  }
+  DISCARD_SECTIONS
 
 #ifndef EFI
   /* Stabs debugging sections.  */
-  .stab 0 : { *(.stab) }
-  .stabstr 0 : { *(.stabstr) }
-  .stab.excl 0 : { *(.stab.excl) }
-  .stab.exclstr 0 : { *(.stab.exclstr) }
-  .stab.index 0 : { *(.stab.index) }
-  .stab.indexstr 0 : { *(.stab.indexstr) }
-  .comment 0 : { *(.comment) }
-  /*
-   * LLVM ld also wants .symtab, .strtab, and .shstrtab placed. These look to
-   * be benign to GNU ld, so we can have them here unconditionally.
-   */
-  .symtab 0 : { *(.symtab) }
-  .strtab 0 : { *(.strtab) }
-  .shstrtab 0 : { *(.shstrtab) }
+  STABS_DEBUG_SECTIONS
+  ELF_DETAILS_SECTIONS
 #endif
 }
 
diff --git a/xen/include/xen/xen.lds.h b/xen/include/xen/xen.lds.h
index dd292fa7dc..ad1d199021 100644
--- a/xen/include/xen/xen.lds.h
+++ b/xen/include/xen/xen.lds.h
@@ -5,4 +5,104 @@
  * Common macros to be used in architecture specific linker scripts.
  */
 
+/* Macros to declare debug sections. */
+#ifdef EFI
+/*
+ * Use the NOLOAD directive, despite currently ignored by (at least) GNU ld
+ * for PE output, in order to record that we'd prefer these sections to not
+ * be loaded into memory.
+ */
+#define DECL_DEBUG(x, a) #x ALIGN(a) (NOLOAD) : { *(x) }
+#define DECL_DEBUG2(x, y, a) #x ALIGN(a) (NOLOAD) : { *(x) *(y) }
+#else
+#define DECL_DEBUG(x, a) #x 0 : { *(x) }
+#define DECL_DEBUG2(x, y, a) #x 0 : { *(x) *(y) }
+#endif
+
+/* DWARF debug sections. */
+#define DWARF_DEBUG_SECTIONS                      \
+  DECL_DEBUG(.debug_abbrev, 1)                    \
+  DECL_DEBUG2(.debug_info, .gnu.linkonce.wi.*, 1) \
+  DECL_DEBUG(.debug_types, 1)                     \
+  DECL_DEBUG(.debug_str, 1)                       \
+  DECL_DEBUG2(.debug_line, .debug_line.*, 1)      \
+  DECL_DEBUG(.debug_line_str, 1)                  \
+  DECL_DEBUG(.debug_names, 4)                     \
+  DECL_DEBUG(.debug_frame, 4)                     \
+  DECL_DEBUG(.debug_loc, 1)                       \
+  DECL_DEBUG(.debug_loclists, 4)                  \
+  DECL_DEBUG(.debug_macinfo, 1)                   \
+  DECL_DEBUG(.debug_macro, 1)                     \
+  DECL_DEBUG(.debug_ranges, 8)                    \
+  DECL_DEBUG(.debug_rnglists, 4)                  \
+  DECL_DEBUG(.debug_addr, 8)                      \
+  DECL_DEBUG(.debug_aranges, 1)                   \
+  DECL_DEBUG(.debug_pubnames, 1)                  \
+  DECL_DEBUG(.debug_pubtypes, 1)
+
+/* Stabs debug sections. */
+#define STABS_DEBUG_SECTIONS                 \
+  .stab 0 : { *(.stab) }                     \
+  .stabstr 0 : { *(.stabstr) }               \
+  .stab.excl 0 : { *(.stab.excl) }           \
+  .stab.exclstr 0 : { *(.stab.exclstr) }     \
+  .stab.index 0 : { *(.stab.index) }         \
+  .stab.indexstr 0 : { *(.stab.indexstr) }
+
+/*
+ * Required sections not related to debugging.
+ *
+ * LLVM ld also wants .symtab, .strtab, and .shstrtab placed. These look to
+ * be benign to GNU ld, so we can have them here unconditionally.
+ */
+#define ELF_DETAILS_SECTIONS     \
+  .comment 0 : { *(.comment) }   \
+  .symtab 0 : { *(.symtab) }     \
+  .strtab 0 : { *(.strtab) }     \
+  .shstrtab 0 : { *(.shstrtab) }
+
+#ifdef EFI
+#define DISCARD_EFI_SECTIONS \
+       *(.comment)   \
+       *(.comment.*) \
+       *(.note.*)
+#else
+#define DISCARD_EFI_SECTIONS
+#endif
+
+/* Sections to be discarded. */
+#define DISCARD_SECTIONS     \
+  /DISCARD/ : {              \
+       *(.text.exit)         \
+       *(.exit.text)         \
+       *(.exit.data)         \
+       *(.exitcall.exit)     \
+       *(.discard)           \
+       *(.discard.*)         \
+       *(.eh_frame)          \
+       *(.dtors)             \
+       *(.dtors.*)           \
+       *(.fini_array)        \
+       *(.fini_array.*)      \
+       DISCARD_EFI_SECTIONS  \
+  }
+
+#define VPCI_ARRAY               \
+       . = ALIGN(POINTER_ALIGN); \
+       __start_vpci_array = .;   \
+       *(SORT(.data.vpci.*))     \
+       __end_vpci_array = .;
+
+#define HYPFS_PARAM              \
+       . = ALIGN(8);             \
+       __paramhypfs_start = .;   \
+       *(.data.paramhypfs)       \
+       __paramhypfs_end = .;
+
+#define LOCK_PROFILE_DATA        \
+       . = ALIGN(POINTER_ALIGN); \
+       __lock_profile_start = .; \
+       *(.lockprofile.data)      \
+       __lock_profile_end = .;
+
 #endif /* __XEN_LDS_H__ */
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 22 08:03:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 08:03:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293307.498223 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWZTj-0000n3-Ot; Tue, 22 Mar 2022 08:02:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293307.498223; Tue, 22 Mar 2022 08:02:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWZTj-0000mw-LV; Tue, 22 Mar 2022 08:02:55 +0000
Received: by outflank-mailman (input) for mailman id 293307;
 Tue, 22 Mar 2022 08:02:53 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=GKWw=UB=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nWZTh-0000XO-UN
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 08:02:53 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id 795cc9fd-a9b6-11ec-a405-831a346695d4;
 Tue, 22 Mar 2022 09:02:52 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 39E4E153B;
 Tue, 22 Mar 2022 01:02:52 -0700 (PDT)
Received: from e129167.arm.com (unknown [10.57.5.122])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id BD50D3F73D;
 Tue, 22 Mar 2022 01:02:49 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 795cc9fd-a9b6-11ec-a405-831a346695d4
From: Michal Orzel <michal.orzel@arm.com>
To: xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>
Subject: [PATCH v2 1/2] xen: Introduce a header to store common linker scripts content
Date: Tue, 22 Mar 2022 09:02:32 +0100
Message-Id: <20220322080233.53134-2-michal.orzel@arm.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <20220322080233.53134-1-michal.orzel@arm.com>
References: <20220322080233.53134-1-michal.orzel@arm.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Both x86 and arm linker scripts share quite a lot of common content.
It is difficult to keep syncing them up, thus introduce a new header
in include/xen called xen.lds.h to store the internals mutual to all
the linker scripts.

Include this header in linker scripts for x86 and arm.
This patch serves as an intermediate step before populating xen.lds.h
and making use of its content in the linker scripts later on.

Signed-off-by: Michal Orzel <michal.orzel@arm.com>
---
Changes since v1:
-rename header to xen.lds.h to be coherent with Linux kernel
-include empty header in linker scripts
---
 xen/arch/arm/xen.lds.S    | 1 +
 xen/arch/x86/xen.lds.S    | 1 +
 xen/include/xen/xen.lds.h | 8 ++++++++
 3 files changed, 10 insertions(+)
 create mode 100644 xen/include/xen/xen.lds.h

diff --git a/xen/arch/arm/xen.lds.S b/xen/arch/arm/xen.lds.S
index 7921d8fa28..c666fc3e69 100644
--- a/xen/arch/arm/xen.lds.S
+++ b/xen/arch/arm/xen.lds.S
@@ -3,6 +3,7 @@
 /* Modified for ARM Xen by Ian Campbell */
 
 #include <xen/cache.h>
+#include <xen/xen.lds.h>
 #include <asm/page.h>
 #undef ENTRY
 #undef ALIGN
diff --git a/xen/arch/x86/xen.lds.S b/xen/arch/x86/xen.lds.S
index d33e295320..4e3a9a2789 100644
--- a/xen/arch/x86/xen.lds.S
+++ b/xen/arch/x86/xen.lds.S
@@ -2,6 +2,7 @@
 /* Modified for i386/x86-64 Xen by Keir Fraser */
 
 #include <xen/cache.h>
+#include <xen/xen.lds.h>
 #include <asm/page.h>
 #undef ENTRY
 #undef ALIGN
diff --git a/xen/include/xen/xen.lds.h b/xen/include/xen/xen.lds.h
new file mode 100644
index 0000000000..dd292fa7dc
--- /dev/null
+++ b/xen/include/xen/xen.lds.h
@@ -0,0 +1,8 @@
+#ifndef __XEN_LDS_H__
+#define __XEN_LDS_H__
+
+/*
+ * Common macros to be used in architecture specific linker scripts.
+ */
+
+#endif /* __XEN_LDS_H__ */
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 22 08:03:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 08:03:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293306.498213 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWZTi-0000Xb-HG; Tue, 22 Mar 2022 08:02:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293306.498213; Tue, 22 Mar 2022 08:02:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWZTi-0000XU-E1; Tue, 22 Mar 2022 08:02:54 +0000
Received: by outflank-mailman (input) for mailman id 293306;
 Tue, 22 Mar 2022 08:02:52 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=GKWw=UB=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nWZTg-0000XI-Sj
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 08:02:52 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTP
 id 77b7bf35-a9b6-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 09:02:51 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 6D0AE106F;
 Tue, 22 Mar 2022 01:02:49 -0700 (PDT)
Received: from e129167.arm.com (unknown [10.57.5.122])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 157C53F73D;
 Tue, 22 Mar 2022 01:02:46 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 77b7bf35-a9b6-11ec-8fbc-03012f2f19d4
From: Michal Orzel <michal.orzel@arm.com>
To: xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>
Subject: [PATCH v2 0/2] xen: Linker scripts synchronization
Date: Tue, 22 Mar 2022 09:02:31 +0100
Message-Id: <20220322080233.53134-1-michal.orzel@arm.com>
X-Mailer: git-send-email 2.25.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

This patch series aims to do the first step towards linker scripts
synchronization. Linker scripts for arm and x86 share a lot of common
sections and in order to make the process of changing/improving/syncing
them, these sections shall be defined in just one place.

The first patch creates an empty header file xen.lds.h to store the
constructs mutual to both x86 and arm linker scripts. It also includes
this header in the scripts.

The second patch populates xen.lds.h with the first portion of common
macros and replaces the original contructs with these helpers.

Michal Orzel (2):
  xen: Introduce a header to store common linker scripts content
  xen: Populate xen.lds.h and make use of its macros

 xen/arch/arm/xen.lds.S    |  38 +++++---------
 xen/arch/x86/xen.lds.S    |  79 +++-------------------------
 xen/include/xen/xen.lds.h | 108 ++++++++++++++++++++++++++++++++++++++
 3 files changed, 129 insertions(+), 96 deletions(-)
 create mode 100644 xen/include/xen/xen.lds.h

-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 22 08:34:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 08:34:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293317.498246 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWZxy-0004zp-Gk; Tue, 22 Mar 2022 08:34:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293317.498246; Tue, 22 Mar 2022 08:34:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWZxy-0004zi-D9; Tue, 22 Mar 2022 08:34:10 +0000
Received: by outflank-mailman (input) for mailman id 293317;
 Tue, 22 Mar 2022 08:34:09 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWZxx-0004zY-GV; Tue, 22 Mar 2022 08:34:09 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWZxx-0001OO-Ey; Tue, 22 Mar 2022 08:34:09 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWZxx-0002GP-48; Tue, 22 Mar 2022 08:34:09 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWZxx-0002Ft-3e; Tue, 22 Mar 2022 08:34:09 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Luzj2Z4MBiv3Xl22UzfIa0SMgGARFYPLtRE/TO/v0Ws=; b=uq+9euOxOJsriZ92f8D2UI1Apn
	PpFaLyvWsL6Luc6i9RUdd6FoKP8PR22/30LdsNfRIlIKQsJMi4c9NKf3/iPA1puyPrjWqmDrgC+F+
	veatjeRlPorcm1ZqZ73bjbQ6jYBm0Rb0f9bdZFB7HrNzPG+DmcD6512RHs81DBSBS8Do=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168770-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168770: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 22 Mar 2022 08:34:09 +0000

flight 168770 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168770/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 267a92fef3b705e6a3ecbeaa4d4b58f7bfac9734
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   21 days
Failing since        168258  2022-03-01 01:55:31 Z   21 days  219 attempts
Testing same since   168738  2022-03-21 02:39:18 Z    1 days   18 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 859 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 08:35:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 08:35:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293324.498257 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWZzD-0005XD-U8; Tue, 22 Mar 2022 08:35:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293324.498257; Tue, 22 Mar 2022 08:35:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWZzD-0005X6-QA; Tue, 22 Mar 2022 08:35:27 +0000
Received: by outflank-mailman (input) for mailman id 293324;
 Tue, 22 Mar 2022 08:35:26 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=U+x7=UB=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nWZzC-0005Wy-D6
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 08:35:26 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05on2060f.outbound.protection.outlook.com
 [2a01:111:f400:7e1a::60f])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 04ffbd21-a9bb-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 09:35:25 +0100 (CET)
Received: from AS9PR06CA0186.eurprd06.prod.outlook.com (2603:10a6:20b:45d::33)
 by AM4PR08MB2804.eurprd08.prod.outlook.com (2603:10a6:205:d::22) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.18; Tue, 22 Mar
 2022 08:35:21 +0000
Received: from AM5EUR03FT052.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:45d:cafe::d1) by AS9PR06CA0186.outlook.office365.com
 (2603:10a6:20b:45d::33) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17 via Frontend
 Transport; Tue, 22 Mar 2022 08:35:21 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT052.mail.protection.outlook.com (10.152.17.161) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Tue, 22 Mar 2022 08:35:21 +0000
Received: ("Tessian outbound 1f399c739551:v113");
 Tue, 22 Mar 2022 08:35:21 +0000
Received: from b0a97d7e1b10.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 0171301E-F3B4-4DDA-9B96-F77D8E2DF056.1; 
 Tue, 22 Mar 2022 08:35:12 +0000
Received: from EUR01-VE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id b0a97d7e1b10.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 22 Mar 2022 08:35:12 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com (2603:10a6:20b:85::25)
 by AM0PR08MB5362.eurprd08.prod.outlook.com (2603:10a6:208:180::10)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.16; Tue, 22 Mar
 2022 08:35:08 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62]) by AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62%3]) with mapi id 15.20.5081.023; Tue, 22 Mar 2022
 08:35:08 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 04ffbd21-a9bb-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=6ceL6lMBl7nXAqR7gjXPoo6OJ6pxgPRimxEs7KYgeZQ=;
 b=Ny7jbhxSB3eDQHbfhAOrjMH+S5mwylWKbwkfX4GWOROvJzNEPIc3xrrOd134JVvtth17+mRU6J5FQzBUDLgnpZ990m5UdSj8ruaDiyuA6Bd/+VcIomijmX7EtdeYonihXJwDHkI/oeVubarzzM+i6AfxAhVglIT29h2uOJEdn9s=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 22a2fb80180b2298
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=A+I6Xet8Zn3W9tJ2tQ71mBVcrPv2pvwyg+z6YX+ZdO8z5bzJhBfY4woLhdS1FrV+BOYMFiG6pTdyGDX5Xu6/DFb1AiPdDJOoRt25OkaHiZFCq+WfA6qPNiyUUNEN3iuFmCxQ9bZHDg8Y5xs4wRLi4NLwS7OoJgYxJUXMD/pxB5egY8uIMTfEoc4keWTaSSvLm/a9OnXzEX0KcFYQZJIP3Ecn50nU+xkjvUA2z5R4LOUyA6WKoeuy9/K2Oj3n2ZrwgLh7WCULKVbLN5XLLVBgChFTxVP+26EUnK9Vw7C/IPEMe/kSPtbPjkHffEO2gsGWk0xjquF/+o0taoEkx1BBcg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=6ceL6lMBl7nXAqR7gjXPoo6OJ6pxgPRimxEs7KYgeZQ=;
 b=HqCqVBRvFxn176ea7yIouAX1zUgohQDv3Hg2NOzx8lSt5+7MXBBiU4CIGph25eCNgkwRMv29n4L3ZlEzxoxm84JBleqzvUWCPnHaqI2EQfD+q2Y2E/2PZkuq47Mprt0Xc6hU4uHU1+KbNyGRMdBbmFGsunzzjGuIGReHgij/xuuqks7EafVLmnlickVPDi+0B0colcGiOdY74N837i2jHO0tJURbRxNofF+YjyLRLECOX3cnT4NDluHYY3VUAJxCbsWvDuAT8i0815JmAUan/ivsiO0xfei0Hkc8rV2M//48eNUKNT5reng/FPyS7qLic3+9cwSkDfXbTlBZGZIeSQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=6ceL6lMBl7nXAqR7gjXPoo6OJ6pxgPRimxEs7KYgeZQ=;
 b=Ny7jbhxSB3eDQHbfhAOrjMH+S5mwylWKbwkfX4GWOROvJzNEPIc3xrrOd134JVvtth17+mRU6J5FQzBUDLgnpZ990m5UdSj8ruaDiyuA6Bd/+VcIomijmX7EtdeYonihXJwDHkI/oeVubarzzM+i6AfxAhVglIT29h2uOJEdn9s=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Julien Grall <julien@xen.org>
CC: Luca Fancellu <Luca.Fancellu@arm.com>, Xen-devel
	<xen-devel@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>, Stefano
 Stabellini <sstabellini@kernel.org>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>, Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>, Juergen Gross <jgross@suse.com>, Dario Faggioli
	<dfaggioli@suse.com>
Subject: Re: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Topic: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Index:
 AQHYOtyBwlLK7ts4vEKxgpEPsRlgQ6zFUCoAgASzLwCAAAp/AIAADB+AgAAHFICAAPi1AA==
Date: Tue, 22 Mar 2022 08:35:08 +0000
Message-ID: <9ABBD292-A77F-4CDC-B096-546516114D42@arm.com>
References: <20220318152541.7460-1-luca.fancellu@arm.com>
 <20220318152541.7460-5-luca.fancellu@arm.com>
 <274f81b0-c164-4437-3d05-243e147330a9@xen.org>
 <0FA7F6D7-0B40-4B75-9752-7FE48D0FCA5C@arm.com>
 <9f3d7713-4e4b-58f8-d7a1-b42ef152a7ab@xen.org>
 <05E14D52-831A-438F-9F90-99F590A5A15F@arm.com>
 <108443e0-c7d7-af6d-2183-b1bd48b0f288@xen.org>
In-Reply-To: <108443e0-c7d7-af6d-2183-b1bd48b0f288@xen.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: dcf62528-27a3-4368-aa66-08da0bdee747
x-ms-traffictypediagnostic:
	AM0PR08MB5362:EE_|AM5EUR03FT052:EE_|AM4PR08MB2804:EE_
X-Microsoft-Antispam-PRVS:
	<AM4PR08MB28041749D20A719080016B309D179@AM4PR08MB2804.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 DgcDD1zZbiHonAbi8FEHNaVzJviOb6rDHf4xOKuDbMXvEXZM2sz2rPMblGi5m+ltHhRWpVPW7axMUWgmDnzevrMnYapl+yGzGPgKnDZ4zkcDS0NVrLW1fZ0ELYfFmzKFa8lY8oDoCdEL6NldAhM9Tacmbla6rGHjo58Bu+HOxlNcE5vLEUdxVrqp2JqxPGnGSW++gK3wnAJYh7W/SwcBP0IMiMWFRbmAuCkNchF9SunEOOTLDwdu/EmtC3OQh5hZMvG5J9JLOiUO/CdFEHB4HxN/4x3Qgl18T+p3ANxyempScykE86tSOM/m16upZui1lncDC/Lq82CO2WL0SAJTmqWDFaJwHvhlztY2Hpwf7h8/9ZOwUMpsZeObpXiUuV3S4Oms7q4uAw36n4PEImbz2BAnKL/FaqggIxoQeMHZLYmUY3imnC4fD47vXKUB/4XoRVQOq/1oAaylzwYa5qH0HzthwiAhNGlBR1Q1FQrXZtkBhkETqMp4X/yaoBxK8aG2Jn5Hmm6941sfWmk16JJKTJpmedxxOgD4qzKip3oEc7OOofWocnns3Qc6NECEmcQ14qRSQCFJJ0c+XGMCmExpS1wN4OlCxb3ljYyThN0GFDoZvo6+Ja/+9ZrIKydXLQmH9W2rOw9uQ4Rxf9yYM0nwwjBR9huJn3KWc4hYJhKTsgeCyLfwaVFn6Rh41puaE4nEJaLm1X3kYz21x+aUpbvlWcELz+yChvemZKX3eN58YSmXtzBmU5VUvahjSFAHgpkk
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR08MB3784.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(36756003)(2906002)(122000001)(508600001)(71200400001)(6486002)(54906003)(6916009)(316002)(66946007)(66446008)(64756008)(66556008)(66476007)(8676002)(4326008)(91956017)(76116006)(8936002)(7416002)(83380400001)(5660300002)(6512007)(6506007)(53546011)(186003)(26005)(2616005)(38100700002)(33656002)(86362001)(38070700005)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <7342232D9DAB4A4B96574D9B400A8A72@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB5362
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT052.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	2f3d3afb-76c0-4071-ef3c-08da0bdedf8e
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(107886003)(83380400001)(26005)(186003)(2616005)(336012)(356005)(81166007)(47076005)(40460700003)(86362001)(82310400004)(53546011)(70586007)(70206006)(6486002)(6506007)(36860700001)(6862004)(8676002)(508600001)(4326008)(5660300002)(2906002)(33656002)(54906003)(36756003)(316002)(6512007)(8936002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Mar 2022 08:35:21.6600
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: dcf62528-27a3-4368-aa66-08da0bdee747
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT052.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR08MB2804
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From xen-devel-bounces@lists.xenproject.org Tue Mar 22 08:47:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 08:47:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293330.498274 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWaAy-0007Cp-6U; Tue, 22 Mar 2022 08:47:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293330.498274; Tue, 22 Mar 2022 08:47:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWaAy-0007Ci-3J; Tue, 22 Mar 2022 08:47:36 +0000
Received: by outflank-mailman (input) for mailman id 293330;
 Tue, 22 Mar 2022 08:47:34 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=U+x7=UB=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nWaAw-0007Cc-HP
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 08:47:34 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on2061a.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::61a])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b6a4f5bf-a9bc-11ec-a405-831a346695d4;
 Tue, 22 Mar 2022 09:47:33 +0100 (CET)
Received: from AM6P194CA0044.EURP194.PROD.OUTLOOK.COM (2603:10a6:209:84::21)
 by DB8PR08MB4044.eurprd08.prod.outlook.com (2603:10a6:10:a9::16) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.15; Tue, 22 Mar
 2022 08:47:29 +0000
Received: from AM5EUR03FT027.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:84:cafe::fd) by AM6P194CA0044.outlook.office365.com
 (2603:10a6:209:84::21) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.22 via Frontend
 Transport; Tue, 22 Mar 2022 08:47:28 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT027.mail.protection.outlook.com (10.152.16.138) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Tue, 22 Mar 2022 08:47:27 +0000
Received: ("Tessian outbound 2877e54fe176:v113");
 Tue, 22 Mar 2022 08:47:27 +0000
Received: from e5c498a212ff.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 799B4C8D-74F0-407E-9DD7-B7C32013009C.1; 
 Tue, 22 Mar 2022 08:47:26 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id e5c498a212ff.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 22 Mar 2022 08:47:26 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com (2603:10a6:20b:85::25)
 by AM0PR08MB5362.eurprd08.prod.outlook.com (2603:10a6:208:180::10)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.16; Tue, 22 Mar
 2022 08:47:16 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62]) by AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62%3]) with mapi id 15.20.5081.023; Tue, 22 Mar 2022
 08:47:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b6a4f5bf-a9bc-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=p60v/VkvLCsfeYXQT6nMBBnC1vwmjgLLZJu/KBsKGOc=;
 b=NCDxi8CdRm1ufbBAAF14r6r5bSe9n7bG8M4w82mSwTRToWuJaC8Djq5vjvc56HwgqIvmOcoehZuUXIUf0qbcRs/jiDMZrZYqYSK/kuE8E/gs1bVimEsQBQp5x3CTrA/DDpLd880706/ypY42wrJsfn573fXZUyBGpLIK3hG/kOg=
X-MS-Exchange-Authentication-Results: spf=temperror (sender IP is
 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=temperror action=none
 header.from=arm.com;
Received-SPF: TempError (protection.outlook.com: error in processing during
 lookup of arm.com: DNS Timeout)
X-CheckRecipientChecked: true
X-CR-MTA-CID: 0f85ed14ade700e5
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=GeOgSj04jaCuAgegly3iftuCe4zh+VVodX7SxHP8M4/ROa+eHslFkjjx2+zT0MchsZziFDi0EosjWN+Fmuuq+wBQ+hSq6Sy+M96PLJGI/UeylCiw6NxSWZ40YBimQAfRmikkyTqu6QLMsYjkDHv2bwtpg+yfyhso8qRePjv9eC3uS9AO169nE13T8imC/8AfF2UsxLS3Xm36BzViipTrSSfowgNTqYj63UGRA47fq/lBKAy4v/deAHNmkjgVwIV4ieSfUXec7wGPfcLHNPZIdifeI5CiPCfNvrjdiYrc8keQZgmkpfBJBFh3dL8MD9Wu4kvXFu9yNIBjEJ79e18xjw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=p60v/VkvLCsfeYXQT6nMBBnC1vwmjgLLZJu/KBsKGOc=;
 b=LtY6tqbHBXygXqzwK6l1m/4lAsgnlpcYGiKNLkOWo3fem9XfzEvreg3MHHlMpTsahLr5eHfzJukMgQfakN4Vnl+4Yj2jJ2K0R0cXfOXhO4dR2ctilELCJw4Teflq7vCFGBeN7sZjhMhe21Mr/kRZiaD+FAjK4/7L6JhK+JfocSVfrADjJmK9RBnRChTQJ0DlWFLUotyY21tRKlVrx6xwm8bXqizYQNWlCIcAebujNYauXRDm6m+7yt2dpbqZnNeGiJC6734fllr8iurMc+gkE9okp/SYvEEPA4TggwwxH3cK3t9DSv8Z8tO9pkegQKcKH8Z2o2YVEGAmcM99Gg2PIw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=p60v/VkvLCsfeYXQT6nMBBnC1vwmjgLLZJu/KBsKGOc=;
 b=NCDxi8CdRm1ufbBAAF14r6r5bSe9n7bG8M4w82mSwTRToWuJaC8Djq5vjvc56HwgqIvmOcoehZuUXIUf0qbcRs/jiDMZrZYqYSK/kuE8E/gs1bVimEsQBQp5x3CTrA/DDpLd880706/ypY42wrJsfn573fXZUyBGpLIK3hG/kOg=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Julien Grall <julien@xen.org>
CC: Luca Fancellu <Luca.Fancellu@arm.com>, Xen-devel
	<xen-devel@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>, Stefano
 Stabellini <sstabellini@kernel.org>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>, Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>, Juergen Gross <jgross@suse.com>, Dario Faggioli
	<dfaggioli@suse.com>
Subject: Re: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Topic: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Index:
 AQHYOtyBwlLK7ts4vEKxgpEPsRlgQ6zFUCoAgASzLwCAAAp/AIAADB+AgAAHFICAAPi1AIAAA2QA
Date: Tue, 22 Mar 2022 08:47:16 +0000
Message-ID: <1EAD6570-B893-4759-BA71-A1F9535E374F@arm.com>
References: <20220318152541.7460-1-luca.fancellu@arm.com>
 <20220318152541.7460-5-luca.fancellu@arm.com>
 <274f81b0-c164-4437-3d05-243e147330a9@xen.org>
 <0FA7F6D7-0B40-4B75-9752-7FE48D0FCA5C@arm.com>
 <9f3d7713-4e4b-58f8-d7a1-b42ef152a7ab@xen.org>
 <05E14D52-831A-438F-9F90-99F590A5A15F@arm.com>
 <108443e0-c7d7-af6d-2183-b1bd48b0f288@xen.org>
 <9ABBD292-A77F-4CDC-B096-546516114D42@arm.com>
In-Reply-To: <9ABBD292-A77F-4CDC-B096-546516114D42@arm.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 7947d07d-9d14-40ec-cf8d-08da0be09802
x-ms-traffictypediagnostic:
	AM0PR08MB5362:EE_|AM5EUR03FT027:EE_|DB8PR08MB4044:EE_
X-Microsoft-Antispam-PRVS:
	<DB8PR08MB4044ADB18A4C69D25A6D45209D179@DB8PR08MB4044.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 Ih8Q13tLD40NidiPIAixyD46RVclnBfZCUjEmGrasEGv10GKJI380cGo1Iezvm3ngNgRfxCd+5oRRJz1qA5kpgd2JcJ6MG6M2ED1lfig0a61nyfthmLDIMumnh8K1wIx9Rh/nocbEh+wahBrE47biOVf8PMLFms3Pj+Mm2FintSoBOxfvKFJgsUwbaP+4CWqqPuY6kyOvG/pVYIsHlk/vMkktZt6AzQYIJtrc6TqwidmxuZSZX5Rvdcdn+iNgHWt8IrSGY9166CV5YKNIpzYsZLjlRNF4rdTF26FXY0jB4HV8YHpIblCd38ajD5XkQGEyxUJT0Bv5AbgNsn3u7fHJJaUyNTegchiy5huqAvm5qtJAwV0mjtlADzxlbMnazRm2rE0Ep14DOWTS6ajjOp6xZyR46LL0U6gf53BZjnxkUH8WUt79DuXVYUk4Uov9Tp2NsbGwyc55oWDY3GlO/obNdM90BandiZ4dNegvKFFX2p2v0b51BUXaleYSCDWOTjwO8Rr5HRDVEVxzGuKPlXGperdCodVZ3Ac7LO3+Of37MonuUtSiWm6kGga0p3+QgbW1h0lilIeU1cy2fcWuiSkZasnq62p63guKoy6vVs82jXrx3d0EQ7xDpT2fOppFD0zt86uC9cEc+haQYduwYpx0bDsNtNw8ydX8kyzu36nXy2RMnOc/PHrIPgMtkuoDS05G3JDGv/G9PpIn6+apCwrvaTBXYZWvZtWGT4eJSTw6FWRwmbiA2B8iEVFd+Z5Qu09
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR08MB3784.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(36756003)(2906002)(122000001)(508600001)(71200400001)(6486002)(54906003)(6916009)(316002)(66946007)(66446008)(64756008)(66556008)(66476007)(8676002)(4326008)(91956017)(76116006)(8936002)(7416002)(83380400001)(5660300002)(6512007)(6506007)(53546011)(186003)(26005)(2616005)(38100700002)(33656002)(86362001)(38070700005)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <D1CBDD68BC6D0345A0CF9DFFE390AF2B@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB5362
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT027.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	82c13e5a-ffc8-4b42-30f3-08da0be09165
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	LS6elfUWSGlnc8klBpRYrtPel1da3/ufb9WnUJtD6ezqJmCWtd1O/Oiy+/l0d2jWHjHj+Yvs3+By800Gs6wEmqNMjJeLJzd9Scn2AqmQa+MWcQS6GBQ4NeDe3MjTr4MDc1Wf6qk4E2akEEImxIuIUNXtSD3cKO7UyHq6X7ZKB66FS+XXYhwmgAzbpGS3zmORGD9eKuWKioF+I4grArQkye4T8XxDfQCs/cVUIKQAAI2utkcldtTnfb2owK4jiZnwJaeDZYtzqF7zS4SdRGd0uetDSDaQfyg2jUuGWxAQ2i/VUxX/NXYrR+CYe2aWbI9U/86k+mZ0FqdG0KYLg28zstkfDK+rf6n7xvodcWES5Tn72iwEWojdrWPQ9oGI8sBNmFv192baIfq03FdJPr67HFp0QIhgFFyjbUv2IpxAKeePz7ETczyfnHHTztK6c7GDJ6pi6C0CaKrDrgOughDqCPNjqQVWy1IhFNmp+QEHvDDDh6mVXzUCszTDt4fctxD7YPABlBuansJwvu8Jjsq8GWzAjekr+B9jhmAj2M8Rq7P2FOAnm/gKmuY5aqvbDt2F1DMn9TBeLxZcyTxlIOrZmPT07j0i9Ft1htWvbHGFirUZa9mNPq2QGC8qsagszI3kBaMzfXxIUqdyeCRj9yj1cAhoyuWTogpNrG9EHl/TV5/LU829EtjWX9VtNXWyeGwrAZJfgX6DEjr9gB5XMrkAWw==
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(83380400001)(6486002)(63350400001)(63370400001)(4326008)(6862004)(5660300002)(2906002)(70206006)(70586007)(6506007)(33656002)(53546011)(6512007)(82310400004)(107886003)(186003)(26005)(336012)(508600001)(86362001)(8936002)(2616005)(40460700003)(47076005)(356005)(54906003)(316002)(8676002)(36860700001)(36756003)(81166007)(45980500001);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Mar 2022 08:47:27.6622
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 7947d07d-9d14-40ec-cf8d-08da0be09802
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT027.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR08MB4044

SGkgSnVsaWVuLA0KDQo+IE9uIDIyIE1hciAyMDIyLCBhdCAwOTozNSwgQmVydHJhbmQgTWFycXVp
cyA8YmVydHJhbmQubWFycXVpc0Bhcm0uY29tPiB3cm90ZToNCj4gDQo+IEhpIEp1bGllbiwNCj4g
DQo+PiBPbiAyMSBNYXIgMjAyMiwgYXQgMTg6NDQsIEp1bGllbiBHcmFsbCA8anVsaWVuQHhlbi5v
cmc+IHdyb3RlOg0KPj4gDQo+PiBIaSBCZXJ0cmFuZCwNCj4+IA0KPj4gT24gMjEvMDMvMjAyMiAx
NzoxOSwgQmVydHJhbmQgTWFycXVpcyB3cm90ZToNCj4+Pj4gT24gMjEgTWFyIDIwMjIsIGF0IDE3
OjM2LCBKdWxpZW4gR3JhbGwgPGp1bGllbkB4ZW4ub3JnPiB3cm90ZToNCj4+Pj4+IFNvIEkgZG9u
4oCZdCBrbm93IHdoeSBvbiB4ODYgd2UgbXVzdCBoYXZlIGNwdTAgaW4gY3B1cG9vbDAsIG1heWJl
IHg4NiBtYWludGFpbmVyIGhhdmUgbW9yZSBrbm93bGVkZ2UgYWJvdXQgdGhhdCBhbmQNCj4+Pj4+
IEkgY2FuIHB1dCBhIGNvbW1lbnQgaGVyZS4NCj4+Pj4gDQo+Pj4+IE9uIEFybSwgd2UgYXJlIG5v
dCB5ZXQgc3VwcG9ydGluZyBhbGwgdGhlIENQVSBmZWF0dXJlcyB0aGF0IHg4NiBzdXBwb3J0cyAo
ZS5nLiBDUFUgaG90cGx1Zywgc3VzcGVuZC9yZXN1bWUuLi4pLiBTbyBJIGEgYW0gYml0IGNvbmNl
cm5lZCB0aGF0IHRoZSByZXN0cmljdGlvbiBpcyBqdXN0IG5vdCB0aGVyZSB5ZXQgKG9yIHBvc3Np
Ymx5IGhpZGRlbikuDQo+Pj4+IA0KPj4+PiBUaGVyZWZvcmUsIGJlZm9yZSBsaWZ0aW5nIHRoZSBy
ZXN0cmljdGlvbiBvbiBBcm0gKGFuZCBvdGhlciBhcmNoKSwgSSB3b3VsZCBsaWtlIHVzIHRvIHVu
ZGVyc3RhbmQgd2h5IGl0IGlzIG5lY2Vzc2FyeSBvbiB4ODYuDQo+Pj4+IA0KPj4+PiBXZSBtYXkg
bm90IGhhdmUgdGhlIGFuc3dlciBxdWlja2x5LCBzbyBpcyBpdCBnb2luZyB0byBiZSBhIHByb2Js
ZW0gdG8ga2VlcCB0aGUgcmVzdHJpY3Rpb24gb24gQXJtPw0KPj4+IEkgYW0gb2sgdG8ga2VlcCB0
aGUgbGltaXRhdGlvbiB0byBoYXZlIGRvbTAgYWx3YXlzIHJ1bm5pbmcgb24gY3B1MC4NCj4+PiBP
bmx5IGxpbWl0YXRpb24gSSBjYW4gc2VlIGlzIHRoYXQgb24gYSBiaWcgbGl0dGxlIHN5c3RlbSwg
ZG9tMCBuZWVkcyB0byBzdGF5IG9uIHRoZSB0eXBlIG9mIGNvcmUgb2YgdGhlIGZpcnN0IGJvb3Rl
ZCBjb3JlLg0KPj4gDQo+PiBXaGVyZSBkb2VzIHRoaXMgbGltaXRhdGlvbiBjb21lIGZyb20/DQo+
IA0KPiBJZiBkb20wIG11c3QgcnVuIG9uIGNvcmUwIGFuZCBjb3JlMCBpcyBMaXR0bGUgdGhlbiB5
b3UgY2Fubm90IGJ1aWxkIGEgc3lzdGVtIHdoZXJlIGRvbTAgaXMgcnVubmluZyBvbiBiaWcgY29y
ZXMuDQo+IElmIHRoZSBsaW1pdGF0aW9uIGlzIG5vdCB0aGVyZSwgeW91IGNhbiBidWlsZCBzdWNo
IGEgY29uZmlndXJhdGlvbiB3aXRob3V0IGFueSBkZXBlbmRlbmN5IHRvIHRoZSBib290IGNvcmUg
dHlwZS4NCg0KVGhpcyBtaWdodCBub3QgYmUgY29tcGxldGVseSBjbGVhciBzbyBsZXQgbWUgcmVw
aHJhc2U6DQpJbiB0aGUgY3VycmVudCBzeXN0ZW06DQotIGRvbTAgbXVzdCBydW4gb24gY3B1cG9v
bC0wDQotIGNwdXBvb2wtMCBtdXN0IGNvbnRhaW4gdGhlIGJvb3QgY29yZQ0KLSBjb25zZXF1ZW5j
ZTogZG9tMCBtdXN0IHJ1biBvbiB0aGUgYm9vdCBjb3JlDQoNCklmIGJvb3QgY29yZSBpcyBsaXR0
bGUsIHlvdSBjYW5ub3QgYnVpbGQgYXMgc3lzdGVtIHdoZXJlIGRvbTAgcnVucyBvbmx5IG9uIHRo
ZSBiaWcgY29yZXMuDQpSZW1vdmluZyB0aGUgc2Vjb25kIGxpbWl0YXRpb24gKHdoaWNoIGlzIG5v
dCByZXF1aXJlZCBvbiBhcm0pIGlzIG1ha2luZyBpdCBwb3NzaWJsZS4NCg0KUmVnYXJkcw0KQmVy
dHJhbmQNCg0K


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 08:49:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 08:49:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293333.498285 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWaD9-0007pc-J3; Tue, 22 Mar 2022 08:49:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293333.498285; Tue, 22 Mar 2022 08:49:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWaD9-0007pV-Fj; Tue, 22 Mar 2022 08:49:51 +0000
Received: by outflank-mailman (input) for mailman id 293333;
 Tue, 22 Mar 2022 08:49:49 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=FDwX=UB=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nWaD7-0007pP-D2
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 08:49:49 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04on0629.outbound.protection.outlook.com
 [2a01:111:f400:fe0c::629])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 06f00202-a9bd-11ec-a405-831a346695d4;
 Tue, 22 Mar 2022 09:49:47 +0100 (CET)
Received: from AM6P194CA0070.EURP194.PROD.OUTLOOK.COM (2603:10a6:209:84::47)
 by DB8PR08MB3947.eurprd08.prod.outlook.com (2603:10a6:10:ae::20) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.16; Tue, 22 Mar
 2022 08:49:45 +0000
Received: from AM5EUR03FT056.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:84:cafe::28) by AM6P194CA0070.outlook.office365.com
 (2603:10a6:209:84::47) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17 via Frontend
 Transport; Tue, 22 Mar 2022 08:49:45 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT056.mail.protection.outlook.com (10.152.17.224) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Tue, 22 Mar 2022 08:49:45 +0000
Received: ("Tessian outbound 341d209a0e52:v113");
 Tue, 22 Mar 2022 08:49:45 +0000
Received: from 98253c74e61c.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 0804D01B-6E20-473E-90DA-1AB4E63FC221.1; 
 Tue, 22 Mar 2022 08:49:33 +0000
Received: from EUR01-DB5-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 98253c74e61c.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 22 Mar 2022 08:49:33 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by VI1PR0802MB2368.eurprd08.prod.outlook.com (2603:10a6:800:9d::10)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Tue, 22 Mar
 2022 08:49:31 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5081.023; Tue, 22 Mar 2022
 08:49:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 06f00202-a9bd-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=opT9MFBfZkguLI1U5J1pZKy+328zuV6jlSYWplEZWkI=;
 b=J9xxu6b4oRF4ZrO+d2S+Hnrg8EuTmYJiIlnvT4b2nhqgMDroXBqz5r1GFRkChyAoyb0WZyKdp7N0+CcXeLf5StkznsZSzHibn+BwgZEHRp4iXUN8HVrXl7X5pbqLnBfUJ4Tih25yi5acKtIq7MS1mgU9z52pyL9gzn65x/dmrGA=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: fa2ee0d00989104d
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=LR+XR4wFpyjg2DtYM96z2+Y1o+e/qwxgEHPtp1oJZJmsEUQqNq0nHLP0fD03yQZ/NrvXmEaox90Pu8ewATS+Nns11+tQctRHVQaKOSl86zR1FP6OEHC8bxKMW8SuIp0rN0DbNknkmIWYELjffQv+TytxPWjeLrJKex087eDn7RwjGlCYQaeVMBv1iTOWsF4jrI9zXL514aGi4657Ya9eOT10TUd4KKGX493RYpnV3SvY64v5FahuCX8sXKySyD/zIxrAoCnTZHTjIMc4LElGXFSOp5kmMF3uVk378GLsXIV6jtzGdkkQX5bv1M/7+4HOw8edil/yHO+toU4Bda5GZg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=opT9MFBfZkguLI1U5J1pZKy+328zuV6jlSYWplEZWkI=;
 b=HWP/OSSoOSK08SGICahs8K+Bv1ugCa0S06E0SVM7iEnIMWL3lpzF4oscewO8cqGW0y/GWTbGfNMEoE9vgCl2/bCQZCDRoS/5UeWFFqk4sVB6m6gyfVhjb2VrmX3D1SAS3v0hdSlL7hHlYL68VQZwnKwoZHepwtFMErYR7vFVHrfXKov54Kt/E9EaWbV5PLsJYvDtvJvR51y12+HXCSkcEfpgw35g62LWt9gyXZILpgKhMnmTbXn7NOSGig+wLmIQ6dLaY4dLRUgDg8+wML5qltVYZLZvULX0snyKyG5JoBL12XWxYtg3/kMrNR48/5AHE5QhYs9EELpIaNxocHEwBA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=opT9MFBfZkguLI1U5J1pZKy+328zuV6jlSYWplEZWkI=;
 b=J9xxu6b4oRF4ZrO+d2S+Hnrg8EuTmYJiIlnvT4b2nhqgMDroXBqz5r1GFRkChyAoyb0WZyKdp7N0+CcXeLf5StkznsZSzHibn+BwgZEHRp4iXUN8HVrXl7X5pbqLnBfUJ4Tih25yi5acKtIq7MS1mgU9z52pyL9gzn65x/dmrGA=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Stefano Stabellini <sstabellini@kernel.org>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, Wei Chen <Wei.Chen@arm.com>, Julien Grall
	<julien@xen.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, Andrew
 Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>, Wei Liu <wl@xen.org>, Juergen Gross
	<jgross@suse.com>, Dario Faggioli <dfaggioli@suse.com>
Subject: Re: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Topic: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Index: AQHYOtySiWfuTiIQkkqv44WbBvDftKzKhbaAgACYDQA=
Date: Tue, 22 Mar 2022 08:49:31 +0000
Message-ID: <27898878-F215-4993-805E-BAF04D2D07BC@arm.com>
References: <20220318152541.7460-1-luca.fancellu@arm.com>
 <20220318152541.7460-5-luca.fancellu@arm.com>
 <alpine.DEB.2.22.394.2203211541030.2910984@ubuntu-linux-20-04-desktop>
In-Reply-To:
 <alpine.DEB.2.22.394.2203211541030.2910984@ubuntu-linux-20-04-desktop>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: ec7ac948-1751-413f-11b5-08da0be0ea02
x-ms-traffictypediagnostic:
	VI1PR0802MB2368:EE_|AM5EUR03FT056:EE_|DB8PR08MB3947:EE_
X-Microsoft-Antispam-PRVS:
	<DB8PR08MB3947A56F686BFF4BA2743F0EE4179@DB8PR08MB3947.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 oVM4IonF6fokSxV6DZYM3/IFs1FAHKJjTkC/n3U6gHIRiNErZD9Us2HYanglF20NBXNa7LSztNF5bB8lH+Yp0T1yRltI4qSnPlW1uQJp0EXcJWr/5Nxi5MDZXcNUeWsS1rUqtB6ZX1b+NIBOh9MEB5BFnnf2O8LdH7pp16KD7sqYceHiPo3iuu9LaUkDsKFaDhzgaWPW8JzIMIWz8/KeQjua9WTYeBkUTftkN6l62e7NN9eqe5Wlak0GcUbT+bTLAw8+tMO8vksuk8/32F8ztb67YDC9KV4p4Sna5hI4B459dcWZTcMJTB/TeERw5wX1ucYqolmvb6jaPL35115EGlWxc3Qsuevqwg2BH4omJTragSXCfYAZo/Z/GEchUjM6vgqAXMyJrbw/Y/c+9NokAelmHUoufzQ+ge165kxVg2EnR9OejFGqeSzgVJOYjgXe02rvtcNf57KHaJZUTjDHGItgW1582aH0O2wxRiiJY7h7WSpa1sCunfaKp0qFnjNf5WIxQuq5eenbMWRge8BLWOssyn+fIdGNd2MrwrU1Et0gYTnLyKtgPkWw0tiLHPPdD7paKjcCsFrvwTWDHdIDKDEELRXNcHctA/e/yeigni4r469IqtZS2BlCKw5qrBOFtwEHZzj2qZsG8Cg7PfmL6jXrbJWSAJDOLqg8baD+YNrT10ZevvwgawbdaLlnnh4C9D9wllSI8pXpKQBMaCAjQ+sCkbeuYJkx8jrpWjIhYZps9Cj4NXrTkhYyIkzwUEatMIDop0kMNUouF81rwUHqsQ==
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(8936002)(6486002)(7416002)(508600001)(38070700005)(2906002)(38100700002)(86362001)(122000001)(5660300002)(316002)(33656002)(83380400001)(71200400001)(36756003)(2616005)(186003)(26005)(4326008)(66476007)(8676002)(6916009)(6512007)(54906003)(66946007)(66556008)(64756008)(66446008)(6506007)(76116006)(91956017)(21314003)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <4F4AEA1565528B4FAC11B14D78D639DB@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0802MB2368
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT056.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	7ff8cf6b-72c2-4567-a6a3-08da0be0e1b7
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	8yN1pRh/375ZVgpaNrbzneOCgP6VMHPxV1DcuMlgcR3M8uFL/obze0sB2WFVuW3kvhPRZITk+FxloEMlMxAqVzRaOqoz05BJMH03l7YdbFlDPKwz9rrgguCxnyUwqI2jQ2F/Mgwd9PuAP/1A1LNeNXuXh2kIQ9qI9KTAECaS594zSyfaaLhuI47btVPexlia7bk/vh2g5Deab+5FDQzYcGJE1E47lu8VC0JF8LKA4GG8z9zwIUXO9QEt5FVttjcvi8PjH89z3qsOEdE0rUl/Jj/nsFI/9eF0VgNQS3jivjdW7deHgrp0+kh47rK9y/x8YqJrk4Baf4U3Vudaw4g9fYqEXcd1rvxv19zqQFfmkBEzzFhOyfB/r/tUjZpJr5vXZDbQ5tcfbNtVBm7cZ6ljAGiymlmTwpwIRWaL2Ojai96RWTvGYvE5hLR6k2W7gDYQud54y40YNEFD6ngCTRJ3mxL8QVP1oEdgt+Aps/rLCWYFXM2fXzRFcg3QnyfF1hGH43rorLcNm7RMXYmn7fEnYDrFUP2vPYzcPAMknd6HfK3e2Urlv64AMTUCMK8NlAfRy85tTCOd17Dq8wA0AaW05qhhfBIibNWNGqaWuYPIxGly5Fs9mE5yGRRIJ+aPiWGp4TkjLn5R8JLPoITGzV7rzUWMmblq2vO/sDnTpPTQaf6CrSS6TnekZWo1Ir5O2mN+sff4ytXvPbyIRaqAOxWWkg==
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(107886003)(82310400004)(316002)(36756003)(40460700003)(54906003)(83380400001)(33656002)(81166007)(6506007)(6512007)(2906002)(356005)(8676002)(70206006)(70586007)(86362001)(6862004)(4326008)(47076005)(2616005)(8936002)(26005)(186003)(336012)(5660300002)(36860700001)(508600001)(6486002)(21314003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Mar 2022 08:49:45.1993
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: ec7ac948-1751-413f-11b5-08da0be0ea02
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT056.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR08MB3947
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From xen-devel-bounces@lists.xenproject.org Tue Mar 22 09:16:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 09:16:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293337.498296 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWacb-0002r6-SC; Tue, 22 Mar 2022 09:16:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293337.498296; Tue, 22 Mar 2022 09:16:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWacb-0002qz-Or; Tue, 22 Mar 2022 09:16:09 +0000
Received: by outflank-mailman (input) for mailman id 293337;
 Tue, 22 Mar 2022 09:16:08 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nWaca-0002qt-6e
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 09:16:08 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWacZ-00027X-Lv; Tue, 22 Mar 2022 09:16:07 +0000
Received: from home.octic.net ([81.187.162.82] helo=[10.0.1.193])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWacZ-00085T-GC; Tue, 22 Mar 2022 09:16:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=F58qaKg3RhlY7Un0SG4VictYgjEuSM4jQ0xld4U+W6Y=; b=x4vYNlq2+1717HwnHRgt+5LWfB
	9mwsA/Mh3pzGhXR8uBvocXbnxNFoa1QODU3P35IBBaMCaklqxUoJZyU+T9CBYnUzO4WvK7itfkcWf
	giFZJxpE0hMPVSJSnkLAVw2qs2lmJSCrHRwBDTCoNfQIuU34uTwkud6Exm675BmfsZk4=;
Message-ID: <d26ea92e-6d20-e487-87ea-249f698ca752@xen.org>
Date: Tue, 22 Mar 2022 09:16:04 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
To: Bertrand Marquis <Bertrand.Marquis@arm.com>
Cc: Luca Fancellu <Luca.Fancellu@arm.com>,
 Xen-devel <xen-devel@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Wei Liu <wl@xen.org>, Juergen Gross <jgross@suse.com>,
 Dario Faggioli <dfaggioli@suse.com>
References: <20220318152541.7460-1-luca.fancellu@arm.com>
 <20220318152541.7460-5-luca.fancellu@arm.com>
 <274f81b0-c164-4437-3d05-243e147330a9@xen.org>
 <0FA7F6D7-0B40-4B75-9752-7FE48D0FCA5C@arm.com>
 <9f3d7713-4e4b-58f8-d7a1-b42ef152a7ab@xen.org>
 <05E14D52-831A-438F-9F90-99F590A5A15F@arm.com>
 <108443e0-c7d7-af6d-2183-b1bd48b0f288@xen.org>
 <9ABBD292-A77F-4CDC-B096-546516114D42@arm.com>
 <1EAD6570-B893-4759-BA71-A1F9535E374F@arm.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <1EAD6570-B893-4759-BA71-A1F9535E374F@arm.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi,

On 22/03/2022 08:47, Bertrand Marquis wrote:
> Hi Julien,
> 
>> On 22 Mar 2022, at 09:35, Bertrand Marquis <bertrand.marquis@arm.com> wrote:
>>
>> Hi Julien,
>>
>>> On 21 Mar 2022, at 18:44, Julien Grall <julien@xen.org> wrote:
>>>
>>> Hi Bertrand,
>>>
>>> On 21/03/2022 17:19, Bertrand Marquis wrote:
>>>>> On 21 Mar 2022, at 17:36, Julien Grall <julien@xen.org> wrote:
>>>>>> So I don’t know why on x86 we must have cpu0 in cpupool0, maybe x86 maintainer have more knowledge about that and
>>>>>> I can put a comment here.
>>>>>
>>>>> On Arm, we are not yet supporting all the CPU features that x86 supports (e.g. CPU hotplug, suspend/resume...). So I a am bit concerned that the restriction is just not there yet (or possibly hidden).
>>>>>
>>>>> Therefore, before lifting the restriction on Arm (and other arch), I would like us to understand why it is necessary on x86.
>>>>>
>>>>> We may not have the answer quickly, so is it going to be a problem to keep the restriction on Arm?
>>>> I am ok to keep the limitation to have dom0 always running on cpu0.
>>>> Only limitation I can see is that on a big little system, dom0 needs to stay on the type of core of the first booted core.
>>>
>>> Where does this limitation come from?
>>
>> If dom0 must run on core0 and core0 is Little then you cannot build a system where dom0 is running on big cores.
>> If the limitation is not there, you can build such a configuration without any dependency to the boot core type.
> 
> This might not be completely clear so let me rephrase:
> In the current system:
> - dom0 must run on cpupool-0

I don't think we need this restriction. In fact, with this series it 
will become more a problem because the cpupool ID will based on how we 
parse the Device-Tree.

So for dom0, we need to specify explicitely the cpupool to be used.

> - cpupool-0 must contain the boot core
> - consequence: dom0 must run on the boot core
> 
> If boot core is little, you cannot build as system where dom0 runs only on the big cores.
> Removing the second limitation (which is not required on arm) is making it possible.

IMHO removing the second restriction is a lot more risky than removing 
the first one.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 09:19:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 09:19:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293340.498307 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWag0-0003VK-Cp; Tue, 22 Mar 2022 09:19:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293340.498307; Tue, 22 Mar 2022 09:19:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWag0-0003VD-9b; Tue, 22 Mar 2022 09:19:40 +0000
Received: by outflank-mailman (input) for mailman id 293340;
 Tue, 22 Mar 2022 09:18:03 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=aF7C=UB=gmail.com=lucmiccio@srs-se1.protection.inumbo.net>)
 id 1nWaeQ-0003Sw-Sp
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 09:18:03 +0000
Received: from mail-vk1-xa2b.google.com (mail-vk1-xa2b.google.com
 [2607:f8b0:4864:20::a2b])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f7eb7e6a-a9c0-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 10:18:00 +0100 (CET)
Received: by mail-vk1-xa2b.google.com with SMTP id m84so9252853vke.1
 for <xen-devel@lists.xenproject.org>; Tue, 22 Mar 2022 02:18:00 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f7eb7e6a-a9c0-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=D1u/nul1H1Fae48GSBCFgWoYokj1qnuS0yysjgGZ0dA=;
        b=jYBgPABAUQFKhhqiy/Mn8Haodq3m4NkYUHaLEWitSN+YB3JNwLa3PF50ofCgA6QcfH
         oo75v/yGe4R5MytEpdKH6uoljs1uNhQ3ETrv80k/DHO+/oaCzE5mrJ9peSP0D3nSEYh8
         Ilea7Z7xKpmnBaxM+ADL+Pb9ZxNYQq0F1r+rBvoTQb+V00gbULsDThnAi6CbC8KrD/QD
         ZRRYZ2dnF5+bSCdq/Tl50frkr+UJnOwJ/GQ82tddzlRy1G+H3wdMTWaSUWOVOq3/W4qv
         G7yMO5BKT2HOKS5sfKVz9rLYdPkl1JPPehqLviPV5EZKpigT4ckJ1ynBPQgkeOKoOz+P
         5XMA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=D1u/nul1H1Fae48GSBCFgWoYokj1qnuS0yysjgGZ0dA=;
        b=NyQ0x4BkhtG1WCC4RN9AoOEO0ONJMLE7++t6BbEFDclFl6SeNgClbkvMfD4v9ZX0JS
         QJwfJR3HbUJ4DLiawCsfBmcZ3hDoOBs+r7tWklIYuc9/8ILgtRUff1JFLFhwg3PQaCg/
         aa8GDNTxCphME6ZcLhyp3Llso2jkbqrS19OHrSHq/S6ked9cdL2b4Pzuot1n7k/H4Qer
         kGiu727PTZTnzjWhaIVPeMjfEQnzx81uerbvEUy8RYgXC+e/axqqE15/f1gCJvV8ZE+J
         14i0EBV91aLXu8NwmsfyIWIQV8T1YY86W96zatgcoFwJZb7pPQvaBX2/razltoqlaMRe
         dkYQ==
X-Gm-Message-State: AOAM533E9d4PQcUIo0nxC1BCb0WR3qlCf5DX+iWeikGhjobs4HGuKpaW
	RT31MYAXKkHrZVYapJ2Axut45NOg1NymQ+olXT8=
X-Google-Smtp-Source: ABdhPJyG7319Pi+ie/uOcD32r85uo3DT51Ev+9cQvP6CZFNEmRnSjRCaTx78LbAwrH8xNu8URtIotHGUUXXPEyWyyYc=
X-Received: by 2002:a1f:3847:0:b0:33f:247e:3ada with SMTP id
 f68-20020a1f3847000000b0033f247e3adamr2761467vka.26.1647940679448; Tue, 22
 Mar 2022 02:17:59 -0700 (PDT)
MIME-Version: 1.0
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-5-marco.solieri@minervasys.tech> <2f357e1a-df8e-6326-267e-4d12e82e1a5f@xen.org>
In-Reply-To: <2f357e1a-df8e-6326-267e-4d12e82e1a5f@xen.org>
From: Luca Miccio <lucmiccio@gmail.com>
Date: Tue, 22 Mar 2022 10:17:43 +0100
Message-ID: <CANdhDbCZrtcju-=1qgAOt1v=dFFDQwZ4eqfQWj41Pvhcofz=FQ@mail.gmail.com>
Subject: Re: [PATCH 04/36] xen/arm: add parsing function for cache coloring configuration
To: Julien Grall <julien@xen.org>
Cc: Marco Solieri <marco.solieri@minervasys.tech>, xen-devel@lists.xenproject.org, 
	Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, 
	Jan Beulich <jbeulich@suse.com>, Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>, 
	Marco Solieri <marco.solieri@unimore.it>, Andrea Bastoni <andrea.bastoni@minervasys.tech>, 
	Stefano Stabellini <stefano.stabellini@xilinx.com>
Content-Type: multipart/alternative; boundary="000000000000cf3ef005dacb16b8"

--000000000000cf3ef005dacb16b8
Content-Type: text/plain; charset="UTF-8"

Hi Julien,


Il giorno mer 9 mar 2022 alle ore 20:09 Julien Grall <julien@xen.org> ha
scritto:

> Hi,
>
> On 04/03/2022 17:46, Marco Solieri wrote:
> > From: Luca Miccio <lucmiccio@gmail.com>
> >
> > Add three new bootargs allowing configuration of cache coloring support
> > for Xen:
>
> I would prefer if documentation of each command line is part of the
> patch introducing them. This would help understanding some of the
> parameters.
>
>
Ok.


> > - way_size: The size of a LLC way in bytes. This value is mainly used
> >    to calculate the maximum available colors on the platform.
>
> We should only add command line option when they are a strong use case.
> In documentation, you wrote that someone may want to overwrite the way
> size for "specific needs".
>
> Can you explain what would be those needs?

> - dom0_colors: The coloring configuration for Dom0, which also acts as
> >    default configuration for any DomU without an explicit configuration.
> > - xen_colors: The coloring configuration for the Xen hypervisor itself.
> >
> > A cache coloring configuration consists of a selection of colors to be
> > assigned to a VM or to the hypervisor. It is represented by a set of
> > ranges. Add a common function that parses a string with a
> > comma-separated set of hyphen-separated ranges like "0-7,15-16" and
> > returns both: the number of chosen colors, and an array containing their
> > ids.
> > Currently we support platforms with up to 128 colors.
>
> Is there any reason this value is hardcoded in Xen rather than part of
> the Kconfig?
>
>
Not really at the time when this patch was created. But as we notify in
patch 32,
there is an assert that fails if we use a certain amount of colors. Maybe
we should
find a better way to store the color information.

Luca.

> >
> > Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> > Signed-off-by: Marco Solieri <marco.solieri@minervasys.tech>
> > Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
> > ---
> >   xen/arch/arm/Kconfig                |   5 ++
> >   xen/arch/arm/Makefile               |   2 +-
> >   xen/arch/arm/coloring.c             | 131 ++++++++++++++++++++++++++++
> >   xen/arch/arm/include/asm/coloring.h |  28 ++++++
> >   4 files changed, 165 insertions(+), 1 deletion(-)
> >   create mode 100644 xen/arch/arm/coloring.c
> >   create mode 100644 xen/arch/arm/include/asm/coloring.h
> >
> > diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig
> > index ecfa6822e4..f0f999d172 100644
> > --- a/xen/arch/arm/Kconfig
> > +++ b/xen/arch/arm/Kconfig
> > @@ -97,6 +97,11 @@ config HARDEN_BRANCH_PREDICTOR
> >
> >         If unsure, say Y.
> >
> > +config COLORING
> > +     bool "L2 cache coloring"
> > +     default n
>
> This wants to be gated with EXPERT for time-being. SUPPORT.MD woudl
> Furthermore, I think this wants to be gated with EXPERT for the time-being.
>
> > +     depends on ARM_64
>
> Why is this limited to arm64?
>
> > +
> >   config TEE
> >       bool "Enable TEE mediators support (UNSUPPORTED)" if UNSUPPORTED
> >       default n
> > diff --git a/xen/arch/arm/Makefile b/xen/arch/arm/Makefile
> > index c993ce72a3..581896a528 100644
> > --- a/xen/arch/arm/Makefile
> > +++ b/xen/arch/arm/Makefile
> > @@ -66,7 +66,7 @@ obj-$(CONFIG_SBSA_VUART_CONSOLE) += vpl011.o
> >   obj-y += vsmc.o
> >   obj-y += vpsci.o
> >   obj-y += vuart.o
> > -
> > +obj-$(CONFIG_COLORING) += coloring.o
>
> Please keep the newline before extra-y. The file are meant to be ordered
> alphabetically. So this should be inserted in the correct position.
>
> >   extra-y += xen.lds
> >
> >   #obj-bin-y += ....o
> > diff --git a/xen/arch/arm/coloring.c b/xen/arch/arm/coloring.c
> > new file mode 100644
> > index 0000000000..8f1cff6efb
> > --- /dev/null
> > +++ b/xen/arch/arm/coloring.c
> > @@ -0,0 +1,131 @@
> > +/*
> > + * xen/arch/arm/coloring.c
> > + *
> > + * Coloring support for ARM
> > + *
> > + * Copyright (C) 2019 Xilinx Inc.
> > + *
> > + * Authors:
> > + *    Luca Miccio <lucmiccio@gmail.com>
> > + *
> > + * This program is free software; you can redistribute it and/or modify
> > + * it under the terms of the GNU General Public License version 2 as
> > + * published by the Free Software Foundation.
> > + *
> > + * This program is distributed in the hope that it will be useful,
> > + * but WITHOUT ANY WARRANTY; without even the implied warranty of
> > + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
> > + * GNU General Public License for more details.
> > + *
> > + * You should have received a copy of the GNU General Public License
> > + * along with this program.  If not, see <http://www.gnu.org/licenses/
> >.
> > + */
> > +#include <xen/init.h>
> > +#include <xen/types.h>
> > +#include <xen/lib.h>
> > +#include <xen/errno.h>
> > +#include <xen/param.h>
> > +#include <asm/coloring.h>
>
> The includes should be ordered so <xen/...> are first, then <asm/...>.
> They are also ordered alphabetically within their own category.
>
> > +
> > +/* Number of color(s) assigned to Xen */
> > +static uint32_t xen_col_num;
> > +/* Coloring configuration of Xen as bitmask */
> > +static uint32_t xen_col_mask[MAX_COLORS_CELLS];
> Xen provides helpers to create and use bitmaps (see
> include/xen/bitmap.h). Can you use?
>
> > +
> > +/* Number of color(s) assigned to Dom0 */
> > +static uint32_t dom0_col_num;
> > +/* Coloring configuration of Dom0 as bitmask */
> > +static uint32_t dom0_col_mask[MAX_COLORS_CELLS];
> > +
> > +static uint64_t way_size;
> > +
> > +/*************************
> > + * PARSING COLORING BOOTARGS
> > + */
> > +
> > +/*
> > + * Parse the coloring configuration given in the buf string, following
> the
> > + * syntax below, and store the number of colors and a corresponding
> mask in
> > + * the last two given pointers.
> > + *
> > + * COLOR_CONFIGURATION ::= RANGE,...,RANGE
> > + * RANGE               ::= COLOR-COLOR
> > + *
> > + * Example: "2-6,15-16" represents the set of colors: 2,3,4,5,6,15,16.
> > + */
> > +static int parse_color_config(
> > +    const char *buf, uint32_t *col_mask, uint32_t *col_num)
>
>
> Coding style. We usually declarate paremeters on the same line as the
> function name. If they can't fit on the same line, then we split in two
> with the parameter aligned to the first paremeter.
>
> > +{
> > +    int start, end, i;
>
> AFAICT, none of the 3 variables will store negative values. So can they
> be unsigned?
>
> > +    const char* s = buf;
> > +    unsigned int offset;
> > +
> > +    if ( !col_mask || !col_num )
> > +        return -EINVAL;
> > +
> > +    *col_num = 0;
> > +    for ( i = 0; i < MAX_COLORS_CELLS; i++ )
> > +        col_mask[i] = 0;
> dom0_col_mask and xen_col_mask are already zeroed. I would also expect
> the same for dynamically allocated bitmask. So can this be dropped?
>
> > +
> > +    while ( *s != '\0' )
> > +    {
> > +        if ( *s != ',' )
> > +        {
> > +            start = simple_strtoul(s, &s, 0);
> > +
> > +            /* Ranges are hyphen-separated */
> > +            if ( *s != '-' )
> > +                goto fail;
> > +            s++;
> > +
> > +            end = simple_strtoul(s, &s, 0);
> > +
> > +            for ( i = start; i <= end; i++ )
> > +            {
> > +                offset = i / 32;
> > +                if ( offset > MAX_COLORS_CELLS )
> > +                    goto fail;
> > +
> > +                if ( !(col_mask[offset] & (1 << i % 32)) )
> > +                    *col_num += 1;
> > +                col_mask[offset] |= (1 << i % 32);
> > +            }
> > +        }
> > +        else
> > +            s++;
> > +    }
> > +
> > +    return *s ? -EINVAL : 0;
> > +fail:
> > +    return -EINVAL;
> > +}
> > +
> > +static int __init parse_way_size(const char *s)
> > +{
> > +    way_size = simple_strtoull(s, &s, 0);
> > +
> > +    return *s ? -EINVAL : 0;
> > +}
> > +custom_param("way_size", parse_way_size);
> > +
> > +static int __init parse_dom0_colors(const char *s)
> > +{
> > +    return parse_color_config(s, dom0_col_mask, &dom0_col_num);
> > +}
> > +custom_param("dom0_colors", parse_dom0_colors);
> > +
> > +static int __init parse_xen_colors(const char *s)
> > +{
> > +    return parse_color_config(s, xen_col_mask, &xen_col_num);
> > +}
> > +custom_param("xen_colors", parse_xen_colors);
> > +
> > +/*
> > + * Local variables:
> > + * mode: C
> > + * c-file-style: "BSD"
> > + * c-basic-offset: 4
> > + * tab-width: 4
> > + * indent-tabs-mode: nil
> > + * End:
> > + */
> > diff --git a/xen/arch/arm/include/asm/coloring.h
> b/xen/arch/arm/include/asm/coloring.h
> > new file mode 100644
> > index 0000000000..60958d1244
> > --- /dev/null
> > +++ b/xen/arch/arm/include/asm/coloring.h
> > @@ -0,0 +1,28 @@
> > +/*
> > + * xen/arm/include/asm/coloring.h
> > + *
> > + * Coloring support for ARM
> > + *
> > + * Copyright (C) 2019 Xilinx Inc.
> > + *
> > + * Authors:
> > + *    Luca Miccio <lucmiccio@gmail.com>
> > + *
> > + * This program is free software; you can redistribute it and/or modify
> > + * it under the terms of the GNU General Public License version 2 as
> > + * published by the Free Software Foundation.
> > + *
> > + * This program is distributed in the hope that it will be useful,
> > + * but WITHOUT ANY WARRANTY; without even the implied warranty of
> > + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
> > + * GNU General Public License for more details.
> > + *
> > + * You should have received a copy of the GNU General Public License
> > + * along with this program.  If not, see <http://www.gnu.org/licenses/
> >.
> > + */
> > +#ifndef __ASM_ARM_COLORING_H__
> > +#define __ASM_ARM_COLORING_H__
> > +
> > +#define MAX_COLORS_CELLS 4
> > +
> > +#endif /* !__ASM_ARM_COLORING_H__ */
>
> Cheers,
>
> --
> Julien Grall
>

--000000000000cf3ef005dacb16b8
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr">Hi=C2=A0Julien,<div><br></div></div><br><=
div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">Il giorno m=
er 9 mar 2022 alle ore 20:09 Julien Grall &lt;<a href=3D"mailto:julien@xen.=
org">julien@xen.org</a>&gt; ha scritto:<br></div><blockquote class=3D"gmail=
_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204=
,204);padding-left:1ex">Hi,<br>
<br>
On 04/03/2022 17:46, Marco Solieri wrote:<br>
&gt; From: Luca Miccio &lt;<a href=3D"mailto:lucmiccio@gmail.com" target=3D=
"_blank">lucmiccio@gmail.com</a>&gt;<br>
&gt; <br>
&gt; Add three new bootargs allowing configuration of cache coloring suppor=
t<br>
&gt; for Xen:<br>
<br>
I would prefer if documentation of each command line is part of the <br>
patch introducing them. This would help understanding some of the <br>
parameters.<br>
<br></blockquote><div><br>Ok.</div><div>=C2=A0</div><blockquote class=3D"gm=
ail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,=
204,204);padding-left:1ex">
&gt; - way_size: The size of a LLC way in bytes. This value is mainly used<=
br>
&gt;=C2=A0 =C2=A0 to calculate the maximum available colors on the platform=
.<br>
<br>
We should only add command line option when they are a strong use case. <br=
>
In documentation, you wrote that someone may want to overwrite the way <br>
size for &quot;specific needs&quot;.<br>
<br>
Can you explain what would be those needs?</blockquote><blockquote class=3D=
"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(2=
04,204,204);padding-left:1ex">
&gt; - dom0_colors: The coloring configuration for Dom0, which also acts as=
<br>
&gt;=C2=A0 =C2=A0 default configuration for any DomU without an explicit co=
nfiguration.<br>
&gt; - xen_colors: The coloring configuration for the Xen hypervisor itself=
.<br>
&gt; <br>
&gt; A cache coloring configuration consists of a selection of colors to be=
<br>
&gt; assigned to a VM or to the hypervisor. It is represented by a set of<b=
r>
&gt; ranges. Add a common function that parses a string with a<br>
&gt; comma-separated set of hyphen-separated ranges like &quot;0-7,15-16&qu=
ot; and<br>
&gt; returns both: the number of chosen colors, and an array containing the=
ir<br>
&gt; ids.<br>
&gt; Currently we support platforms with up to 128 colors.<br>
<br>
Is there any reason this value is hardcoded in Xen rather than part of <br>
the Kconfig?<br>
<br></blockquote><div><br>Not really at the time when this patch was create=
d. But as we notify in patch 32,</div><div>there is an assert that fails if=
 we use a certain amount of colors. Maybe we should</div><div>find a better=
 way to store the color information.</div><div>=C2=A0<br>Luca.</div><blockq=
uote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1p=
x solid rgb(204,204,204);padding-left:1ex">
&gt; <br>
&gt; Signed-off-by: Luca Miccio &lt;<a href=3D"mailto:lucmiccio@gmail.com" =
target=3D"_blank">lucmiccio@gmail.com</a>&gt;<br>
&gt; Signed-off-by: Marco Solieri &lt;marco.solieri@minervasys.tech&gt;<br>
&gt; Signed-off-by: Stefano Stabellini &lt;<a href=3D"mailto:stefano.stabel=
lini@xilinx.com" target=3D"_blank">stefano.stabellini@xilinx.com</a>&gt;<br=
>
&gt; ---<br>
&gt;=C2=A0 =C2=A0xen/arch/arm/Kconfig=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 |=C2=A0 =C2=A05 ++<br>
&gt;=C2=A0 =C2=A0xen/arch/arm/Makefile=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0|=C2=A0 =C2=A02 +-<br>
&gt;=C2=A0 =C2=A0xen/arch/arm/coloring.c=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0| 131 ++++++++++++++++++++++++++++<br>
&gt;=C2=A0 =C2=A0xen/arch/arm/include/asm/coloring.h |=C2=A0 28 ++++++<br>
&gt;=C2=A0 =C2=A04 files changed, 165 insertions(+), 1 deletion(-)<br>
&gt;=C2=A0 =C2=A0create mode 100644 xen/arch/arm/coloring.c<br>
&gt;=C2=A0 =C2=A0create mode 100644 xen/arch/arm/include/asm/coloring.h<br>
&gt; <br>
&gt; diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig<br>
&gt; index ecfa6822e4..f0f999d172 100644<br>
&gt; --- a/xen/arch/arm/Kconfig<br>
&gt; +++ b/xen/arch/arm/Kconfig<br>
&gt; @@ -97,6 +97,11 @@ config HARDEN_BRANCH_PREDICTOR<br>
&gt;=C2=A0 =C2=A0<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0If unsure, say Y.<br>
&gt;=C2=A0 =C2=A0<br>
&gt; +config COLORING<br>
&gt; +=C2=A0 =C2=A0 =C2=A0bool &quot;L2 cache coloring&quot;<br>
&gt; +=C2=A0 =C2=A0 =C2=A0default n<br>
<br>
This wants to be gated with EXPERT for time-being. SUPPORT.MD woudl<br>
Furthermore, I think this wants to be gated with EXPERT for the time-being.=
<br>
<br>
&gt; +=C2=A0 =C2=A0 =C2=A0depends on ARM_64<br>
<br>
Why is this limited to arm64?<br>
<br>
&gt; +<br>
&gt;=C2=A0 =C2=A0config TEE<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0bool &quot;Enable TEE mediators support (UNS=
UPPORTED)&quot; if UNSUPPORTED<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0default n<br>
&gt; diff --git a/xen/arch/arm/Makefile b/xen/arch/arm/Makefile<br>
&gt; index c993ce72a3..581896a528 100644<br>
&gt; --- a/xen/arch/arm/Makefile<br>
&gt; +++ b/xen/arch/arm/Makefile<br>
&gt; @@ -66,7 +66,7 @@ obj-$(CONFIG_SBSA_VUART_CONSOLE) +=3D vpl011.o<br>
&gt;=C2=A0 =C2=A0obj-y +=3D vsmc.o<br>
&gt;=C2=A0 =C2=A0obj-y +=3D vpsci.o<br>
&gt;=C2=A0 =C2=A0obj-y +=3D vuart.o<br>
&gt; -<br>
&gt; +obj-$(CONFIG_COLORING) +=3D coloring.o<br>
<br>
Please keep the newline before extra-y. The file are meant to be ordered <b=
r>
alphabetically. So this should be inserted in the correct position.<br>
<br>
&gt;=C2=A0 =C2=A0extra-y +=3D xen.lds<br>
&gt;=C2=A0 =C2=A0<br>
&gt;=C2=A0 =C2=A0#obj-bin-y +=3D ....o<br>
&gt; diff --git a/xen/arch/arm/coloring.c b/xen/arch/arm/coloring.c<br>
&gt; new file mode 100644<br>
&gt; index 0000000000..8f1cff6efb<br>
&gt; --- /dev/null<br>
&gt; +++ b/xen/arch/arm/coloring.c<br>
&gt; @@ -0,0 +1,131 @@<br>
&gt; +/*<br>
&gt; + * xen/arch/arm/coloring.c<br>
&gt; + *<br>
&gt; + * Coloring support for ARM<br>
&gt; + *<br>
&gt; + * Copyright (C) 2019 Xilinx Inc.<br>
&gt; + *<br>
&gt; + * Authors:<br>
&gt; + *=C2=A0 =C2=A0 Luca Miccio &lt;<a href=3D"mailto:lucmiccio@gmail.com=
" target=3D"_blank">lucmiccio@gmail.com</a>&gt;<br>
&gt; + *<br>
&gt; + * This program is free software; you can redistribute it and/or modi=
fy<br>
&gt; + * it under the terms of the GNU General Public License version 2 as<=
br>
&gt; + * published by the Free Software Foundation.<br>
&gt; + *<br>
&gt; + * This program is distributed in the hope that it will be useful,<br=
>
&gt; + * but WITHOUT ANY WARRANTY; without even the implied warranty of<br>
&gt; + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.=C2=A0 See the=
<br>
&gt; + * GNU General Public License for more details.<br>
&gt; + *<br>
&gt; + * You should have received a copy of the GNU General Public License<=
br>
&gt; + * along with this program.=C2=A0 If not, see &lt;<a href=3D"http://w=
ww.gnu.org/licenses/" rel=3D"noreferrer" target=3D"_blank">http://www.gnu.o=
rg/licenses/</a>&gt;.<br>
&gt; + */<br>
&gt; +#include &lt;xen/init.h&gt;<br>
&gt; +#include &lt;xen/types.h&gt;<br>
&gt; +#include &lt;xen/lib.h&gt;<br>
&gt; +#include &lt;xen/errno.h&gt;<br>
&gt; +#include &lt;xen/param.h&gt;<br>
&gt; +#include &lt;asm/coloring.h&gt;<br>
<br>
The includes should be ordered so &lt;xen/...&gt; are first, then &lt;asm/.=
..&gt;.<br>
They are also ordered alphabetically within their own category.<br>
<br>
&gt; +<br>
&gt; +/* Number of color(s) assigned to Xen */<br>
&gt; +static uint32_t xen_col_num;<br>
&gt; +/* Coloring configuration of Xen as bitmask */<br>
&gt; +static uint32_t xen_col_mask[MAX_COLORS_CELLS];<br>
Xen provides helpers to create and use bitmaps (see <br>
include/xen/bitmap.h). Can you use?<br>
<br>
&gt; +<br>
&gt; +/* Number of color(s) assigned to Dom0 */<br>
&gt; +static uint32_t dom0_col_num;<br>
&gt; +/* Coloring configuration of Dom0 as bitmask */<br>
&gt; +static uint32_t dom0_col_mask[MAX_COLORS_CELLS];<br>
&gt; +<br>
&gt; +static uint64_t way_size;<br>
&gt; +<br>
&gt; +/*************************<br>
&gt; + * PARSING COLORING BOOTARGS<br>
&gt; + */<br>
&gt; +<br>
&gt; +/*<br>
&gt; + * Parse the coloring configuration given in the buf string, followin=
g the<br>
&gt; + * syntax below, and store the number of colors and a corresponding m=
ask in<br>
&gt; + * the last two given pointers.<br>
&gt; + *<br>
&gt; + * COLOR_CONFIGURATION ::=3D RANGE,...,RANGE<br>
&gt; + * RANGE=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0::=3D =
COLOR-COLOR<br>
&gt; + *<br>
&gt; + * Example: &quot;2-6,15-16&quot; represents the set of colors: 2,3,4=
,5,6,15,16.<br>
&gt; + */<br>
&gt; +static int parse_color_config(<br>
&gt; +=C2=A0 =C2=A0 const char *buf, uint32_t *col_mask, uint32_t *col_num)=
<br>
<br>
<br>
Coding style. We usually declarate paremeters on the same line as the <br>
function name. If they can&#39;t fit on the same line, then we split in two=
 <br>
with the parameter aligned to the first paremeter.<br>
<br>
&gt; +{<br>
&gt; +=C2=A0 =C2=A0 int start, end, i;<br>
<br>
AFAICT, none of the 3 variables will store negative values. So can they <br=
>
be unsigned?<br>
<br>
&gt; +=C2=A0 =C2=A0 const char* s =3D buf;<br>
&gt; +=C2=A0 =C2=A0 unsigned int offset;<br>
&gt; +<br>
&gt; +=C2=A0 =C2=A0 if ( !col_mask || !col_num )<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 return -EINVAL;<br>
&gt; +<br>
&gt; +=C2=A0 =C2=A0 *col_num =3D 0;<br>
&gt; +=C2=A0 =C2=A0 for ( i =3D 0; i &lt; MAX_COLORS_CELLS; i++ )<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 col_mask[i] =3D 0;<br>
dom0_col_mask and xen_col_mask are already zeroed. I would also expect <br>
the same for dynamically allocated bitmask. So can this be dropped?<br>
<br>
&gt; +<br>
&gt; +=C2=A0 =C2=A0 while ( *s !=3D &#39;\0&#39; )<br>
&gt; +=C2=A0 =C2=A0 {<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 if ( *s !=3D &#39;,&#39; )<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 {<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 start =3D simple_strtoul(s,=
 &amp;s, 0);<br>
&gt; +<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 /* Ranges are hyphen-separa=
ted */<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 if ( *s !=3D &#39;-&#39; )<=
br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 goto fail;<br=
>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 s++;<br>
&gt; +<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 end =3D simple_strtoul(s, &=
amp;s, 0);<br>
&gt; +<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 for ( i =3D start; i &lt;=
=3D end; i++ )<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 {<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 offset =3D i =
/ 32;<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 if ( offset &=
gt; MAX_COLORS_CELLS )<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 goto fail;<br>
&gt; +<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 if ( !(col_ma=
sk[offset] &amp; (1 &lt;&lt; i % 32)) )<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 *col_num +=3D 1;<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 col_mask[offs=
et] |=3D (1 &lt;&lt; i % 32);<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 }<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 }<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 else<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 s++;<br>
&gt; +=C2=A0 =C2=A0 }<br>
&gt; +<br>
&gt; +=C2=A0 =C2=A0 return *s ? -EINVAL : 0;<br>
&gt; +fail:<br>
&gt; +=C2=A0 =C2=A0 return -EINVAL;<br>
&gt; +}<br>
&gt; +<br>
&gt; +static int __init parse_way_size(const char *s)<br>
&gt; +{<br>
&gt; +=C2=A0 =C2=A0 way_size =3D simple_strtoull(s, &amp;s, 0);<br>
&gt; +<br>
&gt; +=C2=A0 =C2=A0 return *s ? -EINVAL : 0;<br>
&gt; +}<br>
&gt; +custom_param(&quot;way_size&quot;, parse_way_size);<br>
&gt; +<br>
&gt; +static int __init parse_dom0_colors(const char *s)<br>
&gt; +{<br>
&gt; +=C2=A0 =C2=A0 return parse_color_config(s, dom0_col_mask, &amp;dom0_c=
ol_num);<br>
&gt; +}<br>
&gt; +custom_param(&quot;dom0_colors&quot;, parse_dom0_colors);<br>
&gt; +<br>
&gt; +static int __init parse_xen_colors(const char *s)<br>
&gt; +{<br>
&gt; +=C2=A0 =C2=A0 return parse_color_config(s, xen_col_mask, &amp;xen_col=
_num);<br>
&gt; +}<br>
&gt; +custom_param(&quot;xen_colors&quot;, parse_xen_colors);<br>
&gt; +<br>
&gt; +/*<br>
&gt; + * Local variables:<br>
&gt; + * mode: C<br>
&gt; + * c-file-style: &quot;BSD&quot;<br>
&gt; + * c-basic-offset: 4<br>
&gt; + * tab-width: 4<br>
&gt; + * indent-tabs-mode: nil<br>
&gt; + * End:<br>
&gt; + */<br>
&gt; diff --git a/xen/arch/arm/include/asm/coloring.h b/xen/arch/arm/includ=
e/asm/coloring.h<br>
&gt; new file mode 100644<br>
&gt; index 0000000000..60958d1244<br>
&gt; --- /dev/null<br>
&gt; +++ b/xen/arch/arm/include/asm/coloring.h<br>
&gt; @@ -0,0 +1,28 @@<br>
&gt; +/*<br>
&gt; + * xen/arm/include/asm/coloring.h<br>
&gt; + *<br>
&gt; + * Coloring support for ARM<br>
&gt; + *<br>
&gt; + * Copyright (C) 2019 Xilinx Inc.<br>
&gt; + *<br>
&gt; + * Authors:<br>
&gt; + *=C2=A0 =C2=A0 Luca Miccio &lt;<a href=3D"mailto:lucmiccio@gmail.com=
" target=3D"_blank">lucmiccio@gmail.com</a>&gt;<br>
&gt; + *<br>
&gt; + * This program is free software; you can redistribute it and/or modi=
fy<br>
&gt; + * it under the terms of the GNU General Public License version 2 as<=
br>
&gt; + * published by the Free Software Foundation.<br>
&gt; + *<br>
&gt; + * This program is distributed in the hope that it will be useful,<br=
>
&gt; + * but WITHOUT ANY WARRANTY; without even the implied warranty of<br>
&gt; + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.=C2=A0 See the=
<br>
&gt; + * GNU General Public License for more details.<br>
&gt; + *<br>
&gt; + * You should have received a copy of the GNU General Public License<=
br>
&gt; + * along with this program.=C2=A0 If not, see &lt;<a href=3D"http://w=
ww.gnu.org/licenses/" rel=3D"noreferrer" target=3D"_blank">http://www.gnu.o=
rg/licenses/</a>&gt;.<br>
&gt; + */<br>
&gt; +#ifndef __ASM_ARM_COLORING_H__<br>
&gt; +#define __ASM_ARM_COLORING_H__<br>
&gt; +<br>
&gt; +#define MAX_COLORS_CELLS 4<br>
&gt; +<br>
&gt; +#endif /* !__ASM_ARM_COLORING_H__ */<br>
<br>
Cheers,<br>
<br>
-- <br>
Julien Grall<br>
</blockquote></div></div>

--000000000000cf3ef005dacb16b8--


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 09:28:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 09:28:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293346.498318 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWaoS-00053q-CZ; Tue, 22 Mar 2022 09:28:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293346.498318; Tue, 22 Mar 2022 09:28:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWaoS-00053j-95; Tue, 22 Mar 2022 09:28:24 +0000
Received: by outflank-mailman (input) for mailman id 293346;
 Tue, 22 Mar 2022 09:28:22 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=U+x7=UB=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nWaoQ-00053b-KL
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 09:28:22 +0000
Received: from EUR03-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur03on0611.outbound.protection.outlook.com
 [2a01:111:f400:fe09::611])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6a148d06-a9c2-11ec-a405-831a346695d4;
 Tue, 22 Mar 2022 10:28:21 +0100 (CET)
Received: from AM6PR10CA0093.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:209:8c::34)
 by AM0PR08MB4212.eurprd08.prod.outlook.com (2603:10a6:208:ff::28)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Tue, 22 Mar
 2022 09:28:18 +0000
Received: from AM5EUR03FT063.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:8c:cafe::5) by AM6PR10CA0093.outlook.office365.com
 (2603:10a6:209:8c::34) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.22 via Frontend
 Transport; Tue, 22 Mar 2022 09:28:17 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT063.mail.protection.outlook.com (10.152.16.226) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.18 via Frontend Transport; Tue, 22 Mar 2022 09:28:17 +0000
Received: ("Tessian outbound 18e50a6f0513:v113");
 Tue, 22 Mar 2022 09:28:17 +0000
Received: from 6f83aef3e7cb.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 57025C2C-CF7D-45E8-9197-5E22BF343C89.1; 
 Tue, 22 Mar 2022 09:28:11 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 6f83aef3e7cb.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 22 Mar 2022 09:28:11 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com (2603:10a6:20b:85::25)
 by AM9PR08MB6241.eurprd08.prod.outlook.com (2603:10a6:20b:281::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.16; Tue, 22 Mar
 2022 09:28:09 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62]) by AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62%3]) with mapi id 15.20.5081.023; Tue, 22 Mar 2022
 09:28:09 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6a148d06-a9c2-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=K4Ed22QyPFVFW9dzBUoCNppqa0LRw0wPhkWhS2Th3NY=;
 b=2jE1M6FlS69q3LLqLNWlKMINJ6w/6OpzlMe66kXuIeZPL2e88K+od+WWHBOgah2kqko+/hrMGSRjxzOWN7qiBxwIq8U8HKYOvosGbE2C4rZUJSXVWaZ00ShigJOmVgZAmFiwHaWaU19hduMoGwaJVh8bF4D6I8J8AZqm/He/em8=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 00a96d2ed1b20036
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=bhhEOIYaMDuekYV/yinU/KwQsfZwIStNK+0rWgcRLnMEurkTouRtKBevAJHjz5QzQOGVVz40ewxT3bvndsuf3D9m3R0rIaituNmZZo5RGtG7YFyue6oG/ezPhL+D9QG2GVES8c/vHd84s2XO5upNCs4S/DPBWWUUwzij5AdfVlnGD1f6wAXDpnVglbqM+63YRBMD0g0C0mBG1IEvyISIw/dc8EoZvRlBGrKOzSvsSQD0fSVEO9wTUwyPebNbVTSc5o0p0M1qBTS+aEHHbLhTaSnG/H/LUO26OEBXoXC1voLjZcTNGOUHSWPck7Wac2lRnv2YHG/uIEgeE+qEEnKwiQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=K4Ed22QyPFVFW9dzBUoCNppqa0LRw0wPhkWhS2Th3NY=;
 b=aPnOtHTqUezGN5nz+r8zCdHnX4ZA0XGxnwqUW4myO2eBJILInuejWJ13TPoWakqx5PPvOr3q/DF93F8tJ9BTslmsBQnmWY4bMphbZQ/RcYqxSw2pcAhpgk0JHkqBAEeWHVa3TkO5EMlhxDlmAm8fK9lAwJl4Gn4sa02rMkajEf+PoGLZypkxbfMN80SZC2cE497NX8C2mdWoeMQKGelSVuwnFXCzNJaR8MTJaKk1tbbP2K0p+oU0Axe66HMEsBFC4sAM8Bc4dyOzvLhJIjT4itJQXajj3tf/cM6ggrT6f29o2zKgbbMstMictYEvuJVnURThBn/LM4ok7JE29xFocA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=K4Ed22QyPFVFW9dzBUoCNppqa0LRw0wPhkWhS2Th3NY=;
 b=2jE1M6FlS69q3LLqLNWlKMINJ6w/6OpzlMe66kXuIeZPL2e88K+od+WWHBOgah2kqko+/hrMGSRjxzOWN7qiBxwIq8U8HKYOvosGbE2C4rZUJSXVWaZ00ShigJOmVgZAmFiwHaWaU19hduMoGwaJVh8bF4D6I8J8AZqm/He/em8=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Julien Grall <julien@xen.org>
CC: Luca Fancellu <Luca.Fancellu@arm.com>, Xen-devel
	<xen-devel@lists.xenproject.org>, Wei Chen <Wei.Chen@arm.com>, Stefano
 Stabellini <sstabellini@kernel.org>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>, Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>, Juergen Gross <jgross@suse.com>, Dario Faggioli
	<dfaggioli@suse.com>
Subject: Re: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Topic: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Index:
 AQHYOtyBwlLK7ts4vEKxgpEPsRlgQ6zFUCoAgASzLwCAAAp/AIAADB+AgAAHFICAAPi1AIAAA2QAgAAIDACAAANfAA==
Date: Tue, 22 Mar 2022 09:28:09 +0000
Message-ID: <30030024-B7E7-47C2-BB14-F87238D56CD2@arm.com>
References: <20220318152541.7460-1-luca.fancellu@arm.com>
 <20220318152541.7460-5-luca.fancellu@arm.com>
 <274f81b0-c164-4437-3d05-243e147330a9@xen.org>
 <0FA7F6D7-0B40-4B75-9752-7FE48D0FCA5C@arm.com>
 <9f3d7713-4e4b-58f8-d7a1-b42ef152a7ab@xen.org>
 <05E14D52-831A-438F-9F90-99F590A5A15F@arm.com>
 <108443e0-c7d7-af6d-2183-b1bd48b0f288@xen.org>
 <9ABBD292-A77F-4CDC-B096-546516114D42@arm.com>
 <1EAD6570-B893-4759-BA71-A1F9535E374F@arm.com>
 <d26ea92e-6d20-e487-87ea-249f698ca752@xen.org>
In-Reply-To: <d26ea92e-6d20-e487-87ea-249f698ca752@xen.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 1e9c1e90-cd5a-44db-465e-08da0be64c44
x-ms-traffictypediagnostic:
	AM9PR08MB6241:EE_|AM5EUR03FT063:EE_|AM0PR08MB4212:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR08MB42126121C7660B0B321DC8D29D179@AM0PR08MB4212.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR08MB3784.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(36756003)(6512007)(2906002)(7416002)(5660300002)(316002)(38070700005)(38100700002)(54906003)(71200400001)(6916009)(8676002)(4326008)(33656002)(91956017)(66946007)(76116006)(66476007)(66556008)(2616005)(66446008)(86362001)(64756008)(83380400001)(26005)(508600001)(122000001)(8936002)(53546011)(6506007)(6486002)(186003)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <455531134D3B5C45A0EA41E05F7A9D1C@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR08MB6241
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT063.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	778a2a56-ba33-4332-c61c-08da0be64770
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(107886003)(356005)(81166007)(2616005)(26005)(186003)(8936002)(6512007)(82310400004)(53546011)(36860700001)(83380400001)(336012)(47076005)(5660300002)(36756003)(40460700003)(86362001)(33656002)(508600001)(2906002)(6486002)(6506007)(70586007)(4326008)(6862004)(8676002)(70206006)(316002)(54906003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Mar 2022 09:28:17.5698
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 1e9c1e90-cd5a-44db-465e-08da0be64c44
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT063.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB4212
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From xen-devel-bounces@lists.xenproject.org Tue Mar 22 09:52:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 09:52:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293350.498329 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWbBd-0008S4-A9; Tue, 22 Mar 2022 09:52:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293350.498329; Tue, 22 Mar 2022 09:52:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWbBd-0008Rx-6M; Tue, 22 Mar 2022 09:52:21 +0000
Received: by outflank-mailman (input) for mailman id 293350;
 Tue, 22 Mar 2022 09:52:20 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=FDwX=UB=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nWbBc-0008Rr-Dl
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 09:52:20 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04on062b.outbound.protection.outlook.com
 [2a01:111:f400:fe0d::62b])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c23a0125-a9c5-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 10:52:17 +0100 (CET)
Received: from DB7PR05CA0051.eurprd05.prod.outlook.com (2603:10a6:10:2e::28)
 by DB9PR08MB6425.eurprd08.prod.outlook.com (2603:10a6:10:261::17) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Tue, 22 Mar
 2022 09:52:15 +0000
Received: from DB5EUR03FT041.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:2e:cafe::88) by DB7PR05CA0051.outlook.office365.com
 (2603:10a6:10:2e::28) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.23 via Frontend
 Transport; Tue, 22 Mar 2022 09:52:15 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT041.mail.protection.outlook.com (10.152.21.4) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Tue, 22 Mar 2022 09:52:15 +0000
Received: ("Tessian outbound 2877e54fe176:v113");
 Tue, 22 Mar 2022 09:52:15 +0000
Received: from 9f3a72d45ea7.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 FC1BC426-EAE8-45D4-B800-B919A303416F.1; 
 Tue, 22 Mar 2022 09:52:04 +0000
Received: from EUR03-VE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 9f3a72d45ea7.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 22 Mar 2022 09:52:04 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by DBBPR08MB4347.eurprd08.prod.outlook.com (2603:10a6:10:c8::11) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.22; Tue, 22 Mar
 2022 09:52:01 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5081.023; Tue, 22 Mar 2022
 09:52:01 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c23a0125-a9c5-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=PyWIPJUwwu0XabSFph4lDMkqweAQuNqdV4dcG/Oq0Nk=;
 b=m6DV7+FuSeiWos7F26a4QUrTuo18EReVhj7smLFMT/ZwOWjLFHHWyc6oY3AKkFizmK0Fi4P3+QB5b0xSBu8X/WegmiWhfELTw0ASt4bLOreppSKCyR7F0W9YevDlTlySa6OhNGeofpRRuEOIXbhmIDQb7hvyziy4kCsCzfm6Syg=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 34cde4fd0bd10b86
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=KOqFaRfFC2CcZOXArxiuMG3V2T3StYa5nLNKpeyBw9UH2439H8MqqRyfpuHJFlVdHmQ+NLdIgIZunFxwSKp6LKoS6HtRieSDI1U3TEreh4oEDh5NbfahLn2xZgx5EY71bb8RQIfrrwi17KEUun91iQkj+rNci8Pg5A3VJiqG5QT3W4M7AIFm9/FnAWVArh6Y9FWiDlP1XMHF3V7KnpMa6IuHxtajkLc2HoL06llVTk4PFp7ng2fdOwnuPzPjON9Hy466YAH0tUiDoU2qQwRU5N+qS/RVsY/Dzqra6X2wbKHQK8ZcrfFyea+z6btDV/hJoJ+Fl/eKVmIMxLv65u2nQg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=PyWIPJUwwu0XabSFph4lDMkqweAQuNqdV4dcG/Oq0Nk=;
 b=EyMWbdKbxbVzHK27qsynf14AMioTwVrEzsH7Mna1aJdSf7AlBx4P1kl0ec4NbXITGiXBeC4onkiyNGYGfJkKIQGvTeCBESFrSXmng9A2FgpiD4VmvkX1Wa1LWxHKUxgykC2jEP67iLCYE7mseD8RJKNDjP4fJJqLH0ifpGcvtrUe9WuXQjRP60b0puMJnWWV5b5yi3dOYx7HqfjgJ0ZVsO/jA4mBCVSbE+HGB/twY6ZRQhgSZxD/2gqy/oQ9kOejPB1GoPG4IDOgJeQqi1+hg03iEP3TCyIda0i1u9qIUP1I22YDrlvbUQ7wOYX9QScoUZYYDbSfJDHncuuGqJRtog==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=PyWIPJUwwu0XabSFph4lDMkqweAQuNqdV4dcG/Oq0Nk=;
 b=m6DV7+FuSeiWos7F26a4QUrTuo18EReVhj7smLFMT/ZwOWjLFHHWyc6oY3AKkFizmK0Fi4P3+QB5b0xSBu8X/WegmiWhfELTw0ASt4bLOreppSKCyR7F0W9YevDlTlySa6OhNGeofpRRuEOIXbhmIDQb7hvyziy4kCsCzfm6Syg=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Julien Grall <julien@xen.org>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, Wei Chen <Wei.Chen@arm.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Wei Liu
	<wl@xen.org>, Juergen Gross <jgross@suse.com>, Dario Faggioli
	<dfaggioli@suse.com>
Subject: Re: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Topic: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Index: AQHYOtySiWfuTiIQkkqv44WbBvDftKzFUCoAgASzLoCAAAqAAIABIWCA
Date: Tue, 22 Mar 2022 09:52:01 +0000
Message-ID: <AE272A2A-EA5B-4217-AECE-80AE04207B55@arm.com>
References: <20220318152541.7460-1-luca.fancellu@arm.com>
 <20220318152541.7460-5-luca.fancellu@arm.com>
 <274f81b0-c164-4437-3d05-243e147330a9@xen.org>
 <0FA7F6D7-0B40-4B75-9752-7FE48D0FCA5C@arm.com>
 <9f3d7713-4e4b-58f8-d7a1-b42ef152a7ab@xen.org>
In-Reply-To: <9f3d7713-4e4b-58f8-d7a1-b42ef152a7ab@xen.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 06a0e1e4-43fd-4a73-c7bb-08da0be9a51e
x-ms-traffictypediagnostic:
	DBBPR08MB4347:EE_|DB5EUR03FT041:EE_|DB9PR08MB6425:EE_
X-Microsoft-Antispam-PRVS:
	<DB9PR08MB642544891994A7DDC5FCE72DE4179@DB9PR08MB6425.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(2616005)(86362001)(83380400001)(8676002)(66476007)(26005)(186003)(4326008)(91956017)(54906003)(66556008)(36756003)(966005)(6486002)(76116006)(316002)(66446008)(6916009)(71200400001)(66946007)(64756008)(5660300002)(8936002)(38100700002)(508600001)(122000001)(6512007)(7416002)(6506007)(33656002)(2906002)(38070700005)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <1CA90853724D1E4CBB0DDF4158E25B9C@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB4347
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT041.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	165c8859-ed90-41a9-9f6f-08da0be99d11
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	QTfp70gTwq0Fc5woVAFktkgtB/cn6mdq6WUDMllxuBMOzlj2FaNC+zU+A72LZpMjIn2Zn5yrxU9XggcoJjc+aHHS+f3B+9uuuanbicMQVQHHiStW4N4/FNNVvt0gktCEU9yqXpLIF4JO/ZmS6lFb92E3+Uw3oNBGTEfbqks4zepeJ/rq3BLFVs48Buo+piYnxAxkJuasecZU1KCuYO0dP4MHqMlW6KDAJZGIbjfGG36mfO8sO64/GbYLYshkMM81ti7xAwuYffoMUtIf32SR83x1tZneEhsZUfIPOzksyOmq3n0R1S8RUKkHsOJCHqgXhd2rSMR6EPb2q6HTezXpeTFGW/znvbz5H6ofWmdZ2e27bFwz3anbQPN0qrtTfBxUZvBebJHnioXavuYnaXcvsQMf+7/uY+bKmkRgnZ7cpvwepHmr2yv7eWha33Zyir5gjrMLkLR5XQgwOh6QfUPoNzfkDuvB1Smdruepxsb2aYnDqkCCOCfRo6TtZDqwO2P87lJd59nHo2nG7RDAzO2DnZPTXhnj9xbgVcVv3DnkVtURedcwjALZDJFsujGMfO2lMAChCfKU4DvCjV0eFVrEk3wZ7QJk8Nrxo56Cb26bSnOvWSSPQkKQrYrPBDgms1x4dBLWQMpbsRxkXIX1pBCbH1z4k+5kJSqAEt/JRuzIX07fsdQYftn+tnMJt3fZeAoKLPQQ/1OgCiOa20Qu4nkSaZiMDnJiOe1b7x1+ANMae+rpBqKDsiYwIzxxVE1Qv96IJIOGo8MSi75IWdFHSZFkWg==
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(36860700001)(47076005)(36756003)(336012)(107886003)(83380400001)(26005)(33656002)(2906002)(81166007)(356005)(186003)(2616005)(40460700003)(86362001)(54906003)(6506007)(6512007)(8936002)(5660300002)(316002)(6486002)(966005)(70586007)(70206006)(6862004)(82310400004)(4326008)(508600001)(8676002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Mar 2022 09:52:15.1819
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 06a0e1e4-43fd-4a73-c7bb-08da0be9a51e
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT041.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR08MB6425

Pj4+IA0KPj4+IENhbiB5b3UgZG9jdW1lbnQgd2h5IHRoaXMgaXMgbmVjZXNzYXJ5IG9uIHg4NiBi
dXQgbm90IG9uIG90aGVyIGFyY2hpdGVjdHVyZXM/DQo+PiBIaSBKdWxpZW4sDQo+PiBJIHJlY2Vp
dmVkIHRoZSB3YXJuaW5nIGJ5IEp1ZXJnZW4gaGVyZTogaHR0cHM6Ly9wYXRjaHdvcmsua2VybmVs
Lm9yZy9jb21tZW50LzI0NzQwNzYyLyB0aGF0IGF0IGxlYXN0IG9uIHg4NiB0aGVyZSBjb3VsZCBi
ZQ0KPj4gc29tZSBwcm9ibGVtcyBpZiBjcHUwIGlzIG5vdCBpbiBjcHVwb29sMCwgSSB0ZXN0ZWQg
aXQgb24gYXJtIGFuZCBpdCB3YXMgd29ya2luZyBmaW5lIGFuZCBJIGRpZG7igJl0IGZpbmQgYW55
IHJlc3RyaWN0aW9uLg0KPiANCj4gV2hhdCBleGFjdGx5IGRpZCB5b3UgdGVzdCBvbiBBcm0/DQo+
IA0KDQpJIGhhdmUgdGVzdGVkIHN0YXJ0L3N0b3Agb2Ygc29tZSBndWVzdCwgbW92aW5nIGNwdXMg
YmV0d2VlbiBjcHVwb29scywgY3JlYXRlL2Rlc3Ryb3kgY3B1cG9vbHMsIHNodXRkb3duIG9mIERv
bTANCg0KDQpbIGZyb20geW91ciBsYXN0IG1haWwgXQ0KPj4+IA0KPj4+IElmIGRvbTAgbXVzdCBy
dW4gb24gY29yZTAgYW5kIGNvcmUwIGlzIExpdHRsZSB0aGVuIHlvdSBjYW5ub3QgYnVpbGQgYSBz
eXN0ZW0gd2hlcmUgZG9tMCBpcyBydW5uaW5nIG9uIGJpZyBjb3Jlcy4NCj4+PiBJZiB0aGUgbGlt
aXRhdGlvbiBpcyBub3QgdGhlcmUsIHlvdSBjYW4gYnVpbGQgc3VjaCBhIGNvbmZpZ3VyYXRpb24g
d2l0aG91dCBhbnkgZGVwZW5kZW5jeSB0byB0aGUgYm9vdCBjb3JlIHR5cGUuDQo+PiBUaGlzIG1p
Z2h0IG5vdCBiZSBjb21wbGV0ZWx5IGNsZWFyIHNvIGxldCBtZSByZXBocmFzZToNCj4+IEluIHRo
ZSBjdXJyZW50IHN5c3RlbToNCj4+IC0gZG9tMCBtdXN0IHJ1biBvbiBjcHVwb29sLTANCj4gDQo+
IEkgZG9uJ3QgdGhpbmsgd2UgbmVlZCB0aGlzIHJlc3RyaWN0aW9uLiBJbiBmYWN0LCB3aXRoIHRo
aXMgc2VyaWVzIGl0IHdpbGwgYmVjb21lIG1vcmUgYSBwcm9ibGVtIGJlY2F1c2UgdGhlIGNwdXBv
b2wgSUQgd2lsbCBiYXNlZCBvbiBob3cgd2UgcGFyc2UgdGhlIERldmljZS1UcmVlLg0KPiANCj4g
U28gZm9yIGRvbTAsIHdlIG5lZWQgdG8gc3BlY2lmeSBleHBsaWNpdGVseSB0aGUgY3B1cG9vbCB0
byBiZSB1c2VkLg0KPiANCj4+IC0gY3B1cG9vbC0wIG11c3QgY29udGFpbiB0aGUgYm9vdCBjb3Jl
DQo+PiAtIGNvbnNlcXVlbmNlOiBkb20wIG11c3QgcnVuIG9uIHRoZSBib290IGNvcmUNCj4+IElm
IGJvb3QgY29yZSBpcyBsaXR0bGUsIHlvdSBjYW5ub3QgYnVpbGQgYXMgc3lzdGVtIHdoZXJlIGRv
bTAgcnVucyBvbmx5IG9uIHRoZSBiaWcgY29yZXMuDQo+PiBSZW1vdmluZyB0aGUgc2Vjb25kIGxp
bWl0YXRpb24gKHdoaWNoIGlzIG5vdCByZXF1aXJlZCBvbiBhcm0pIGlzIG1ha2luZyBpdCBwb3Nz
aWJsZS4NCj4gDQo+IElNSE8gcmVtb3ZpbmcgdGhlIHNlY29uZCByZXN0cmljdGlvbiBpcyBhIGxv
dCBtb3JlIHJpc2t5IHRoYW4gcmVtb3ZpbmcgdGhlIGZpcnN0IG9uZS4NCg0KSSBzZWUgeW91ciBw
b2ludCwgbXkgY29uY2VybiBhYm91dCBtb3ZpbmcgRG9tMCBvbiBhbm90aGVyIGNwdXBvb2wsIGRp
ZmZlcmVudCBmcm9tIGNwdXBvb2wwLCBpcyB0aGF0IHdlIGdpdmUgdGhlDQpvcHBvcnR1bml0eSB0
byBkZXN0cm95IHRoZSBjcHVwb29sMCAod2UgY2Fu4oCZdCBsZXQgdGhhdCBoYXBwZW4pLCBvciBy
ZW1vdmUgZXZlcnkgY3B1IGZyb20gY3B1cG9vbDAuDQoNCkNoZWVycywNCkx1Y2ENCg0KDQo=


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 10:34:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 10:34:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293356.498349 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWbqU-0004Mi-MD; Tue, 22 Mar 2022 10:34:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293356.498349; Tue, 22 Mar 2022 10:34:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWbqU-0004Mb-If; Tue, 22 Mar 2022 10:34:34 +0000
Received: by outflank-mailman (input) for mailman id 293356;
 Tue, 22 Mar 2022 10:34:32 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWbqS-0004MR-Tf; Tue, 22 Mar 2022 10:34:32 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWbqS-0003XV-Pa; Tue, 22 Mar 2022 10:34:32 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWbqS-000892-Bp; Tue, 22 Mar 2022 10:34:32 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWbqS-00052R-B7; Tue, 22 Mar 2022 10:34:32 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=hLZ6V9aNm4MAT/u6nADlfDYMdUzloqa5gi4nNszgpbk=; b=RJ+pzfdw4wUR8u/h0ILC8CZhHg
	0tXfhGaPoTb8Rwx1qEm2ZailImLmvi8Dm0HegA0VqE6b8wThExNsnbXZD3cfTGc74Zu9vPi3mRa5z
	OrqWWqyVPSi1kXraWFLvoN0l2ZPwjOGzelmFToq2P7iEt0louohbf/mwpxDeuqmlmrNw=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168763-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168763: tolerable FAIL
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=8aa0e9d2d1a4815516607eabe9b2e850f284a2f8
X-Osstest-Versions-That:
    xen=8aa0e9d2d1a4815516607eabe9b2e850f284a2f8
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 22 Mar 2022 10:34:32 +0000

flight 168763 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168763/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168755
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168755
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168755
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168755
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168755
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168755
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168755
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168755
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168755
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168755
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168755
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168755
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass

version targeted for testing:
 xen                  8aa0e9d2d1a4815516607eabe9b2e850f284a2f8
baseline version:
 xen                  8aa0e9d2d1a4815516607eabe9b2e850f284a2f8

Last test of basis   168763  2022-03-22 01:51:51 Z    0 days
Testing same since                          (not found)         0 attempts

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Published tested tree is already up to date.



From xen-devel-bounces@lists.xenproject.org Tue Mar 22 11:21:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 11:21:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293372.498364 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWcZz-0001IX-CR; Tue, 22 Mar 2022 11:21:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293372.498364; Tue, 22 Mar 2022 11:21:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWcZz-0001IQ-9S; Tue, 22 Mar 2022 11:21:35 +0000
Received: by outflank-mailman (input) for mailman id 293372;
 Tue, 22 Mar 2022 11:21:33 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=qWAj=UB=redhat.com=imammedo@srs-se1.protection.inumbo.net>)
 id 1nWcZx-0001IG-9C
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 11:21:33 +0000
Received: from us-smtp-delivery-124.mimecast.com
 (us-smtp-delivery-124.mimecast.com [170.10.129.124])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 38c0e4a3-a9d2-11ec-a405-831a346695d4;
 Tue, 22 Mar 2022 12:21:31 +0100 (CET)
Received: from mail-ed1-f72.google.com (mail-ed1-f72.google.com
 [209.85.208.72]) by relay.mimecast.com with ESMTP with STARTTLS
 (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 us-mta-505-7yesWshRPCOYuV9-T0buNg-1; Tue, 22 Mar 2022 07:21:28 -0400
Received: by mail-ed1-f72.google.com with SMTP id
 v15-20020a50f08f000000b0041902200ab4so7551689edl.22
 for <xen-devel@lists.xenproject.org>; Tue, 22 Mar 2022 04:21:28 -0700 (PDT)
Received: from localhost (nat-pool-brq-t.redhat.com. [213.175.37.10])
 by smtp.gmail.com with ESMTPSA id
 hs12-20020a1709073e8c00b006dfd7dee980sm4080173ejc.30.2022.03.22.04.21.25
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Tue, 22 Mar 2022 04:21:26 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 38c0e4a3-a9d2-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
	s=mimecast20190719; t=1647948089;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=sI/gJK8PHjVhsB9l+0a1Cbfqayf1bW3iE9HELjmMQqg=;
	b=Wg7np52ZXYBwDiIXbHtAA3ixJ6zTtwLnuAXJBZO2wD9FyehpYHE6oFSkYicNdaKrxU4b2f
	xiHcF0n/MjUj5r6HLxmij1XMOWR4xaeunvM0w0CPUUAaP4M4SzZ74wZWqXzZv80AhAw54F
	8Ax8P0EqR9I/qaiPe4mygtqaLwyuGwo=
X-MC-Unique: 7yesWshRPCOYuV9-T0buNg-1
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:date:from:to:cc:subject:message-id:in-reply-to
         :references:mime-version:content-transfer-encoding;
        bh=Bx3w8/lhlewJ7oUWvr/1eh6laDl4Abf2g0d4r2c9J7s=;
        b=IGECR9+Hl5ValVnvOZmVDrBECq6CwqPXglgekppPg+5Pv9rjD5k4kZ2RSyqu0lqJul
         vsM45qfON4sH72gSXuhY7VYzbiAYxlQXHnlkJdQ9RfIt6fZdR8OFGYDBMYEgIPL0pdVS
         /zgZSw4ZATMIk5dDiNlTE9H93yNRg9mqLm6gSrzEO2LlzW71FxW51QLMJ/9SUNOvIVoO
         10eYMKgRIX0+mLwD6Ssdi2hs0TJtcibjS3Vr9jWEPZ0QJH6SsKsOzepoR5xZY+ldzMUD
         7MjHD+7AMbz45kJVxilSI0IMb8xs2PzIm6v8D+eS0/+hLiVbR/N6R6OZlbIs61li+rHz
         ImgQ==
X-Gm-Message-State: AOAM531VXOXXl8BLsbvf7m0RTrY60Pp7aFS/VOJFVnNpsz+fv0RgQegr
	ORpveRPUGPs6ush2TtxJeieinE8BawTMWG7ZhxFgH8t8qJMLbXOVHrdoRdoPmwUCg+Umv0s601f
	NvN5tSrZf0YqCcUvuGNvMfGm0CLU=
X-Received: by 2002:a05:6402:5243:b0:419:4ce2:cb5c with SMTP id t3-20020a056402524300b004194ce2cb5cmr6931854edd.151.1647948087465;
        Tue, 22 Mar 2022 04:21:27 -0700 (PDT)
X-Google-Smtp-Source: ABdhPJyiCZtBiS5tBYkHXW9CYVzlZ6xWEpBQiuxdMrs5J8/gCaIPyAwbOSsr9vx7UIAZ7GGLmjEZiA==
X-Received: by 2002:a05:6402:5243:b0:419:4ce2:cb5c with SMTP id t3-20020a056402524300b004194ce2cb5cmr6931812edd.151.1647948087187;
        Tue, 22 Mar 2022 04:21:27 -0700 (PDT)
Date: Tue, 22 Mar 2022 12:21:24 +0100
From: Igor Mammedov <imammedo@redhat.com>
To: Markus Armbruster <armbru@redhat.com>
Cc: qemu-devel@nongnu.org, Paolo Bonzini <pbonzini@redhat.com>, Richard
 Henderson <richard.henderson@linaro.org>, Gerd Hoffmann
 <kraxel@redhat.com>, Christian Schoenebeck <qemu_oss@crudebyte.com>,
 "Gonglei (Arei)" <arei.gonglei@huawei.com>, =?UTF-8?B?TWFyYy1BbmRyw6k=?=
 Lureau <marcandre.lureau@redhat.com>, "Michael S. Tsirkin"
 <mst@redhat.com>, Ani Sinha <ani@anisinha.ca>, Laurent Vivier
 <lvivier@redhat.com>, Amit Shah <amit@kernel.org>, Peter Maydell
 <peter.maydell@linaro.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Anthony Perard <anthony.perard@citrix.com>, Paul Durrant <paul@xen.org>,
 =?UTF-8?B?SGVydsOp?= Poussineau <hpoussin@reactos.org>, Aleksandar Rikalo
 <aleksandar.rikalo@syrmia.com>, Corey Minyard <cminyard@mvista.com>,
 Patrick Venture <venture@google.com>, Eduardo Habkost
 <eduardo@habkost.net>, Marcel Apfelbaum <marcel.apfelbaum@gmail.com>, Peter
 Xu <peterx@redhat.com>, Jason Wang <jasowang@redhat.com>, =?UTF-8?B?Q8Op?=
 =?UTF-8?B?ZHJpYw==?= Le Goater <clg@kaod.org>, Daniel Henrique Barboza
 <danielhb413@gmail.com>, David Gibson <david@gibson.dropbear.id.au>, Greg
 Kurz <groug@kaod.org>, Philippe =?UTF-8?B?TWF0aGlldS1EYXVkw6k=?=
 <f4bug@amsat.org>, Jean-Christophe Dubois <jcd@tribudubois.net>, Keith
 Busch <kbusch@kernel.org>, Klaus Jensen <its@irrelevant.dk>, Yuval Shaia
 <yuval.shaia.ml@gmail.com>, Yoshinori Sato <ysato@users.sourceforge.jp>,
 Magnus Damm <magnus.damm@gmail.com>, Fabien Chouteau
 <chouteau@adacore.com>, KONRAD Frederic <frederic.konrad@adacore.com>, Mark
 Cave-Ayland <mark.cave-ayland@ilande.co.uk>, Artyom Tarasenko
 <atar4qemu@gmail.com>, Alex Williamson <alex.williamson@redhat.com>, Eric
 Auger <eric.auger@redhat.com>, Max Filippov <jcmvbkbc@gmail.com>, Juan
 Quintela <quintela@redhat.com>, "Dr. David Alan Gilbert"
 <dgilbert@redhat.com>, Konstantin Kostiuk <kkostiuk@redhat.com>, Michael
 Roth <michael.roth@amd.com>, "Daniel P. =?UTF-8?B?QmVycmFuZ8Op?="
 <berrange@redhat.com>, Pavel Dovgalyuk <pavel.dovgaluk@ispras.ru>, Alex
 =?UTF-8?B?QmVubsOpZQ==?= <alex.bennee@linaro.org>, David Hildenbrand
 <david@redhat.com>, Wenchao Wang <wenchao.wang@intel.com>, Kamil Rytarowski
 <kamil@netbsd.org>, Reinoud Zandijk <reinoud@netbsd.org>, Sunil Muthuswamy
 <sunilmut@microsoft.com>, Cornelia Huck <cohuck@redhat.com>, Thomas Huth
 <thuth@redhat.com>, Eric Blake <eblake@redhat.com>, Vladimir
 Sementsov-Ogievskiy <vsementsov@virtuozzo.com>, John Snow
 <jsnow@redhat.com>, kvm@vger.kernel.org, qemu-arm@nongnu.org,
 xen-devel@lists.xenproject.org, qemu-ppc@nongnu.org, qemu-block@nongnu.org,
 haxm-team@intel.com, qemu-s390x@nongnu.org
Subject: Re: [PATCH v2 3/3] Use g_new() & friends where that makes obvious
 sense
Message-ID: <20220322122124.4f1d76e9@redhat.com>
In-Reply-To: <20220315144156.1595462-4-armbru@redhat.com>
References: <20220315144156.1595462-1-armbru@redhat.com>
	<20220315144156.1595462-4-armbru@redhat.com>
X-Mailer: Claws Mail 4.0.0 (GTK+ 3.24.31; x86_64-redhat-linux-gnu)
MIME-Version: 1.0
Authentication-Results: relay.mimecast.com;
	auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=imammedo@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On Tue, 15 Mar 2022 15:41:56 +0100
Markus Armbruster <armbru@redhat.com> wrote:

> g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
> for two reasons.  One, it catches multiplication overflowing size_t.
> Two, it returns T * rather than void *, which lets the compiler catch
> more type errors.
>=20
> This commit only touches allocations with size arguments of the form
> sizeof(T).
>=20
> Patch created mechanically with:
>=20
>     $ spatch --in-place --sp-file scripts/coccinelle/use-g_new-etc.cocci =
\
> =09     --macro-file scripts/cocci-macro-file.h FILES...
>=20
> Signed-off-by: Markus Armbruster <armbru@redhat.com>
> Reviewed-by: Philippe Mathieu-Daud=C3=A9 <f4bug@amsat.org>
> Reviewed-by: C=C3=A9dric Le Goater <clg@kaod.org>
> Reviewed-by: Alex Benn=C3=A9e <alex.bennee@linaro.org>
> Acked-by: Dr. David Alan Gilbert <dgilbert@redhat.com>


for */i386/*
Reviewed-by: Igor Mammedov <imammedo@redhat.com>


nit:
possible miss, see below=20

[...]
> diff --git a/hw/i386/xen/xen-hvm.c b/hw/i386/xen/xen-hvm.c
> index cf8e500514..0731f70410 100644
> --- a/hw/i386/xen/xen-hvm.c
> +++ b/hw/i386/xen/xen-hvm.c

missed:

 pfn_list =3D g_malloc(sizeof (*pfn_list) * nr_pfn);


> @@ -396,7 +396,7 @@ go_physmap:
> =20
>      mr_name =3D memory_region_name(mr);
> =20
> -    physmap =3D g_malloc(sizeof(XenPhysmap));
> +    physmap =3D g_new(XenPhysmap, 1);
> =20
>      physmap->start_addr =3D start_addr;
>      physmap->size =3D size;
> @@ -1281,7 +1281,7 @@ static void xen_read_physmap(XenIOState *state)
>          return;
> =20
>      for (i =3D 0; i < num; i++) {
> -        physmap =3D g_malloc(sizeof (XenPhysmap));
> +        physmap =3D g_new(XenPhysmap, 1);
>          physmap->phys_offset =3D strtoull(entries[i], NULL, 16);
>          snprintf(path, sizeof(path),
>                  "/local/domain/0/device-model/%d/physmap/%s/start_addr",
> @@ -1410,7 +1410,7 @@ void xen_hvm_init_pc(PCMachineState *pcms, MemoryRe=
gion **ram_memory)
>      xen_pfn_t ioreq_pfn;
>      XenIOState *state;
> =20
> -    state =3D g_malloc0(sizeof (XenIOState));
> +    state =3D g_new0(XenIOState, 1);
> =20
>      state->xce_handle =3D xenevtchn_open(NULL, 0);
>      if (state->xce_handle =3D=3D NULL) {
> @@ -1463,7 +1463,7 @@ void xen_hvm_init_pc(PCMachineState *pcms, MemoryRe=
gion **ram_memory)
>      }
> =20
>      /* Note: cpus is empty at this point in init */
> -    state->cpu_by_vcpu_id =3D g_malloc0(max_cpus * sizeof(CPUState *));
> +    state->cpu_by_vcpu_id =3D g_new0(CPUState *, max_cpus);
> =20
>      rc =3D xen_set_ioreq_server_state(xen_domid, state->ioservid, true);
>      if (rc < 0) {
> @@ -1472,7 +1472,7 @@ void xen_hvm_init_pc(PCMachineState *pcms, MemoryRe=
gion **ram_memory)
>          goto err;
>      }
> =20
> -    state->ioreq_local_port =3D g_malloc0(max_cpus * sizeof (evtchn_port=
_t));
> +    state->ioreq_local_port =3D g_new0(evtchn_port_t, max_cpus);

[...]



From xen-devel-bounces@lists.xenproject.org Tue Mar 22 11:22:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 11:22:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293375.498375 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWcbA-0001pz-NW; Tue, 22 Mar 2022 11:22:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293375.498375; Tue, 22 Mar 2022 11:22:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWcbA-0001ps-K9; Tue, 22 Mar 2022 11:22:48 +0000
Received: by outflank-mailman (input) for mailman id 293375;
 Tue, 22 Mar 2022 11:22:47 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wGTH=UB=citrix.com=prvs=07349bdb1=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nWcb9-0001pm-QM
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 11:22:47 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 647803d3-a9d2-11ec-a405-831a346695d4;
 Tue, 22 Mar 2022 12:22:46 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 647803d3-a9d2-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647948166;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=z9yuLYFxbZ33UQOUtPSdRzXNFDuUG6+5XTHn/aSrd5I=;
  b=Xz1OoEA4DQwXYdy55l7M8QXLJ4RcAx/vj2/g+l8rCBYsk1+/bzCKpasI
   UKGUMfUCKmCfw6qY87U1y/5W5dONzHx1xw/1x68+rm7y4xBCA2Em5zxDL
   fmPoPS7sM39DrhAURpyBTlPtpZnU/kKMMSCfgdeTvPk7iGiQo+U5fOv2H
   w=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 66847194
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:I7+lgqlvV8itz/iq+KiQOOjo5gwvJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xJLXm7UafrcZzf2fNx/a9mwoEMHu8eDxtRrSQU5pCgyQiMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiWVnV4
 7senuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYEywLJKjInrwkehQFAxFgG6pKp+XEGC3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3s3d8zTbfHLA+TIrKWani7t5ExjYgwMtJGJ4yY
 uJHN2ozM02RP3WjPH8WGoAuxvr2iUXncjpqmk6sh/cYvmv6mVkZPL/Fb4OOJ43iqd9utlmcj
 nLL+SL+GB5yHNaS0yaf+3SgwOrGhzrmWZk6Hae9sPVthTW7ymMfBRIMXHOnsPK5jQi4QNsZJ
 EsKkgItqq4o/UDtUdj5XDW/unePuhNaUN1Ve8U44gyQzqvf4y6CG3MJCDVGbbQOttIyRDEs/
 k+EmZXuHzMHmK2YTzeR+6mZqRu2ODMJNikSaCkcVwwH7tL/5oYpgXrnQs54Fa+pjvX8ATzq3
 y2Rty86mqkSisgQka68+DjvvTWooZTYSx8v0S/eVGml8wBRaZasYsqj7l2zxe1bMI+TQ12Fv
 X4Fs8uT9uYDCdeKjiPlfQkWNOj3vbDfamSa2AMxWcl6n9iwx5K9Vdp7wit7IEExC+8JJC/Zf
 mnUtVwL56YGaRNGcpRLS462Ds0ry43pGtLkSu3YY7JyX3RhSOOU1HowPBDNhggBhGBpyPhiY
 snDLa5AGF5AUcxaICyKq/DxOFPB7gQ33ivtSJ/y1HxLOpLONSfOGd/p3LZjB93VDZ9oQi2Iq
 r6z1OPQkn2ztdEShAGNqub/ynhQcRAG6Wje8ZA/SwJ6ClMO9JsdI/HQ26g9XIdugr5YkOzFl
 lnkBBMHmAqg2CKWc1vXApyGVF8JdcwjxZ7cFXZxVWtEJlB5Odr/hEvhX8VfkUYbGBxLkqcvE
 qhtlzSoCfVTUDXXkwnxnrGmxLGOgC+D3FrUVwL8OWBXV8c5G2Thp4+1FiOypXJmJnfm6qMDT
 0iIi1qzrWwrHF85Uq47qZuHkjuMgJTqsLkrDhWSfYULJhmEHUoDA3WZs8Lb6vokcX3rrgZ2H
 S7PafvEjYEhe7MIzeQ=
IronPort-HdrOrdr: A9a23:rzmd361uXQcHlK4WDOMgogqjBLgkLtp133Aq2lEZdPRUGvb2qy
 nIpoV/6faUskd3ZJhOo7G90cW7LE80lqQFg7X5X43DYOCOggLBR+tfBOPZslnd8kbFmNK1u5
 0NT0EHMqySMWRH
X-IronPort-AV: E=Sophos;i="5.90,201,1643691600"; 
   d="scan'208";a="66847194"
From: Anthony PERARD <anthony.perard@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Anthony PERARD <anthony.perard@citrix.com>, Julien Grall <julien@xen.org>,
	"Daniel P. Smith" <dpsmith@apertussolutions.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, Ross Lagerwall <ross.lagerwall@citrix.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>, "Volodymyr
 Babchuk" <Volodymyr_Babchuk@epam.com>, Bertrand Marquis
	<bertrand.marquis@arm.com>, George Dunlap <george.dunlap@citrix.com>, Wei Liu
	<wl@xen.org>, Daniel De Graaf <dgdegra@tycho.nsa.gov>, Jan Beulich
	<jbeulich@suse.com>, Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Subject: [XEN PATCH v10 0/7] xen: Build system improvements, now with out-of-tree build!
Date: Tue, 22 Mar 2022 11:22:31 +0000
Message-ID: <20220322112238.1117737-1-anthony.perard@citrix.com>
X-Mailer: git-send-email 2.35.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain

Patch series available in this git branch:
https://xenbits.xen.org/git-http/people/aperard/xen-unstable.git br.build-system-xen-v10

v10:
    Mainly a rebase (changes needed in patches 1 and 3).
    One comment change in patch 1.

v9:
    One new patch (patch 3).
    Otherwise, detailed change logs in patches.

    Removed the rfc part about doing out-of-tree build without setting VPATH
    (which would have allowed mixed in-tree / out-of-tree builds).

v8:
    Mostly rework of v7. With many patch already applied.
    Some detail changes that are spread through many patches:
    - `make cloc` recipe should now work throughout the series, update of it is
      done in 3 patches.
    - new patch "build: fix enforce unique symbols for recent clang version"
      to fix an issue with clang.
    - introducing $(srctree) and $(objtree) earlier
    - introducing $(srcdir) as shortcut for $(srctree)/$(src)
    - introduce usage of -iquote instead of -I in some cases
    More detail change log can be found in patches notes.

    Also this v8 present a work-in-progress of the ability to do out-of-tree
    build without setting VPATH. This is presented as an alternative to force
    use of out-of-tree build. As the last patch show, it allows to build the
    xen-shim without the linkfarm and we don't need to make any other changes
    to any thing that build xen (osstest, distribution packages, xen.git, ...,
    and developers finger macros). The patches are only there as WIP / RFC as
    they were some concern about the usefulness and extra changes needed.
    We can decide whether those changes are good or if this is too much and we
    should force out-of-tree build for the hypervisor.

v7:
    Out-of-tree build!

    This mean many more patches. Everything after patch 27 is new.

    There's a few new patch before that, but otherwise are rework of v6.

Hi,

I have work toward building Xen (the hypervisor) with Linux's build system,
Kbuild.

The main reason for that is to be able to have out-of-tree build. It's annoying
when a build fail because of the pvshim. Other benefit is a much faster
rebuild, and `make clean` doesn't take ages, and better dependencies to figure
out what needs to be rebuild.

Cheers,

Anthony PERARD (7):
  build: grab common EFI source files in arch specific dir
  build: replace $(BASEDIR) by $(objtree)
  build: replace $(BASEDIR) and use $(srctree)
  build: rework "headers*.chk" prerequisite in include/
  build: specify source tree in include/ for prerequisite
  build: shuffle main Makefile
  build: adding out-of-tree support to the xen build

 .gitignore                   |   1 +
 xen/Kconfig                  |   4 +-
 xen/Makefile                 | 187 +++++++++++++++++++++++++++--------
 xen/Rules.mk                 |  22 ++++-
 xen/arch/arm/Makefile        |  10 +-
 xen/arch/arm/efi/Makefile    |   4 +-
 xen/arch/x86/Makefile        |  32 +++---
 xen/arch/x86/arch.mk         |   7 +-
 xen/arch/x86/boot/Makefile   |   6 ++
 xen/arch/x86/efi/Makefile    |   5 +-
 xen/build.mk                 |   4 +-
 xen/common/Makefile          |   4 +-
 xen/common/efi/efi-common.mk |  16 +++
 xen/common/libfdt/Makefile   |   2 +-
 xen/include/Makefile         |  60 ++++++-----
 xen/scripts/Kconfig.include  |   2 +-
 xen/scripts/Makefile.clean   |   5 +-
 xen/test/livepatch/Makefile  |  14 +--
 xen/xsm/flask/Makefile       |  13 +--
 xen/xsm/flask/ss/Makefile    |   1 +
 20 files changed, 283 insertions(+), 116 deletions(-)
 create mode 100644 xen/common/efi/efi-common.mk

-- 
Anthony PERARD



From xen-devel-bounces@lists.xenproject.org Tue Mar 22 11:22:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 11:22:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293376.498386 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWcbC-00026i-Vp; Tue, 22 Mar 2022 11:22:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293376.498386; Tue, 22 Mar 2022 11:22:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWcbC-00026Z-SM; Tue, 22 Mar 2022 11:22:50 +0000
Received: by outflank-mailman (input) for mailman id 293376;
 Tue, 22 Mar 2022 11:22:49 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wGTH=UB=citrix.com=prvs=07349bdb1=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nWcbB-0001wJ-EA
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 11:22:49 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 66106b03-a9d2-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 12:22:47 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 66106b03-a9d2-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647948167;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=CTFDMVJ9UQNI3tpTHwdI+DnHPvju2Tgd9bnCsFPvWRo=;
  b=WrnEp+u/M+gs3w/mV+a/0LMx20rQ7P9s1kgG8roCpY/RKM/iO5n4Od5M
   0UM9kjL/RPOaRLRuc2LQsYSpdkGLoBQl0S04ZjnI3tkdLxzAFEypvDxz5
   kJ5q+Sq+X0Bn/6YOgrI2rnyABipWB+3Ai1i+EwIeRtwwqzwgFbviVQshv
   U=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 69219496
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:SCGlsK4/KuIB993FtBwsNAxRtOPHchMFZxGqfqrLsTDasY5as4F+v
 jFOWG2GafeKYGfyft5waYrn/EIC7MfRy9UyTQc6ryo9Hi5G8cbLO4+Ufxz6V8+wwmwvb67FA
 +E2MISowBUcFyeEzvuVGuG96yE6j8lkf5KkYAL+EnkZqTRMFWFw0XqPp8Zj2tQy2YPjWVvX0
 T/Pi5a31GGNimYc3l08s8pvmDs31BglkGpF1rCWTakjUG72zxH5PrpGTU2CByKQrr1vNvy7X
 47+IISRpQs1yfuP5uSNyd4XemVSKlLb0JPnZnB+A8BOiTAazsA+PzpS2FPxpi67hh3Q9+2dx
 umhurTrWToSEYTAhtgcXgt6GBNUBYRt0r3YdC3XXcy7lyUqclPpyvRqSko3IZcZ6qB8BmQmG
 f4wcW5XKErZ3qTvnez9GrIEascLdaEHOKsWvG1gyjfIS+4rW5nZT43B5MNC3Sd2jcdLdRrbT
 5RIM2M+MEWeC/FJElg5C7Qdrc75vFviWjhKknisrvEl4UGGmWSd15CyaYGIK7RmX/59gUKwt
 m/AuWPjDXkyPtGF1SCM9H7qg+bVhD76Q6obDrj+/flv6HWtwWgUBAwTREGMi/CzgU6jWPpSM
 0URvCEpqMAa71e3R9PwWxm5pn+svRMGXddUVeog52ml2qfSpgqUGGUAZjpAc8A98t87QyQw0
 V2ElM+vAiZg2JWXQ3+A8rafrRupJDMYa2QFYEcsTxYB4tTliJE+iFTIVNkLLUKupoSrQ3eqm
 WnM9XVgweVI5SIW60ml1QvXvgmDj5TXcg849CfcbEidxyhTZpHwMuRE9mPnxfpHKY+YSHyIs
 34Fh9WS4YgyMH2dqMCeaL5TRe/0vp5pJBWZ2AcyRMd5q1xB7lb5JehtDCdCyFCF2yruURvge
 wfttAxY//e/11P6PPYsM+pd5ynHpJUM9OgJtNiJN7KigbArLWdrGR2Cg2bKhAgBd2B2zckC1
 W+zK5rEMJrjIf0PIMCKb+kcy6Q34Ss12HneQ5v2pzz+j+bBNC7KFOhUagXTBgzc0E9iiF+Jm
 zq4H5HXoyizrcWkOnWHmWLtBQ5iwYcH6WDe9JUMK7/rzvtOE2A9Ef7BqY7NiKQ+95m5Ytzgp
 ynnMmcBkQKXrSSedW2iNyAyAJuyDM0XhS9qYkQR0aOAhiFLjXCHt/xEKfPavNAPqYRe8BKDZ
 6JcKpvaXagXFGivFvZ0RcCVkbGOvS+D3WqmVxdJqhBmF3K8b2QlIuPZQzY=
IronPort-HdrOrdr: A9a23:553kS6zma+xs4wBx6yPBKrPwFL1zdoMgy1knxilNoRw8SKKlfq
 eV7ZImPH7P+U4ssR4b+exoVJPtfZqYz+8R3WBzB8bEYOCFghrKEGgK1+KLqFeMJ8S9zJ846U
 4JSdkGNDSaNzlHZKjBjzVQa+xQouW6zA==
X-IronPort-AV: E=Sophos;i="5.90,201,1643691600"; 
   d="scan'208";a="69219496"
From: Anthony PERARD <anthony.perard@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Anthony PERARD <anthony.perard@citrix.com>, Jan Beulich
	<jbeulich@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>
Subject: [XEN PATCH v10 1/7] build: grab common EFI source files in arch specific dir
Date: Tue, 22 Mar 2022 11:22:32 +0000
Message-ID: <20220322112238.1117737-2-anthony.perard@citrix.com>
X-Mailer: git-send-email 2.35.1
In-Reply-To: <20220322112238.1117737-1-anthony.perard@citrix.com>
References: <20220322112238.1117737-1-anthony.perard@citrix.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain

Rather than preparing the efi source file, we will make the symbolic
link as needed from the build location.

The `ln` command is run every time to allow to update the link in case
the source tree change location.

This patch also introduce "efi-common.mk" which allow to reuse the
common make instructions without having to duplicate them into each
arch.

And now that we have a list of common source file, we can start to
remove the links to the source files on clean.

Signed-off-by: Anthony PERARD <anthony.perard@citrix.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
---

Notes:
    v10:
    - acked
    - small change to comment in efi_common.mk
    - rebased, removed change "subdir- += efi" in xen/arch/x86/Makefile as
      it isn't needed anymore.
    
    v9:
    - rename efi_common.mk to efi-common.mk
    - generalize comment about cleaning "efi" and "boot" subdir in x86.
    - add a space after the other comma of $(patsubst )
    - create a relative symlink instead of an absolute one
    - with the above, we don't need to use $(abs_srctree) anymore in the
      prerequisite of the link to the efi source file, use $(srctree).
    
    v8:
    - use symbolic link instead of making a copy of the source
    - introduce efi_common.mk
    - remove links to source file on clean
    - use -iquote for "efi.h" headers in common/efi

 xen/Makefile                 |  5 -----
 xen/arch/arm/efi/Makefile    |  4 ++--
 xen/arch/x86/efi/Makefile    |  5 +----
 xen/common/efi/efi-common.mk | 15 +++++++++++++++
 4 files changed, 18 insertions(+), 11 deletions(-)
 create mode 100644 xen/common/efi/efi-common.mk

diff --git a/xen/Makefile b/xen/Makefile
index 18a4f7e1015a..dec489f2a909 100644
--- a/xen/Makefile
+++ b/xen/Makefile
@@ -441,11 +441,6 @@ $(TARGET).gz: $(TARGET)
 $(TARGET): FORCE
 	$(Q)$(MAKE) $(build)=tools
 	$(Q)$(MAKE) $(build)=. include/xen/compile.h
-	[ -e arch/$(TARGET_ARCH)/efi ] && for f in $$(cd common/efi; echo *.[ch]); \
-		do test -r arch/$(TARGET_ARCH)/efi/$$f || \
-		   ln -nsf ../../../common/efi/$$f arch/$(TARGET_ARCH)/efi/; \
-		done; \
-		true
 	$(Q)$(MAKE) $(build)=include all
 	$(Q)$(MAKE) $(build)=arch/$(TARGET_ARCH) include
 	$(Q)$(MAKE) $(build)=. arch/$(TARGET_ARCH)/include/asm/asm-offsets.h
diff --git a/xen/arch/arm/efi/Makefile b/xen/arch/arm/efi/Makefile
index 1b1ed06feddc..4313c390665f 100644
--- a/xen/arch/arm/efi/Makefile
+++ b/xen/arch/arm/efi/Makefile
@@ -1,4 +1,4 @@
-CFLAGS-y += -fshort-wchar
+include $(srctree)/common/efi/efi-common.mk
 
-obj-y += boot.init.o pe.init.o ebmalloc.o runtime.o
+obj-y += $(EFIOBJ-y)
 obj-$(CONFIG_ACPI) +=  efi-dom0.init.o
diff --git a/xen/arch/x86/efi/Makefile b/xen/arch/x86/efi/Makefile
index e08b4d8e4808..034ec87895df 100644
--- a/xen/arch/x86/efi/Makefile
+++ b/xen/arch/x86/efi/Makefile
@@ -1,4 +1,4 @@
-CFLAGS-y += -fshort-wchar
+include $(srctree)/common/efi/efi-common.mk
 
 quiet_cmd_objcopy_o_ihex = OBJCOPY $@
 cmd_objcopy_o_ihex = $(OBJCOPY) -I ihex -O binary $< $@
@@ -8,9 +8,6 @@ $(obj)/%.o: $(src)/%.ihex FORCE
 
 $(obj)/boot.init.o: $(obj)/buildid.o
 
-EFIOBJ-y := boot.init.o pe.init.o ebmalloc.o runtime.o
-EFIOBJ-$(CONFIG_COMPAT) += compat.o
-
 $(call cc-option-add,cflags-stack-boundary,CC,-mpreferred-stack-boundary=4)
 $(addprefix $(obj)/,$(EFIOBJ-y)): CFLAGS_stack_boundary := $(cflags-stack-boundary)
 
diff --git a/xen/common/efi/efi-common.mk b/xen/common/efi/efi-common.mk
new file mode 100644
index 000000000000..960d44a6d55b
--- /dev/null
+++ b/xen/common/efi/efi-common.mk
@@ -0,0 +1,15 @@
+EFIOBJ-y := boot.init.o pe.init.o ebmalloc.o runtime.o
+EFIOBJ-$(CONFIG_COMPAT) += compat.o
+
+CFLAGS-y += -fshort-wchar
+CFLAGS-y += -iquote $(srctree)/common/efi
+
+# Part of the command line transforms $(obj)
+# e.g.: It transforms "dir/foo/bar" into successively
+#       "dir foo bar", ".. .. ..", "../../.."
+$(obj)/%.c: $(srctree)/common/efi/%.c FORCE
+	$(Q)ln -nfs $(subst $(space),/,$(patsubst %,..,$(subst /, ,$(obj))))/common/efi/$(<F) $@
+
+clean-files += $(patsubst %.o, %.c, $(EFIOBJ-y:.init.o=.o) $(EFIOBJ-))
+
+.PRECIOUS: $(obj)/%.c
-- 
Anthony PERARD



From xen-devel-bounces@lists.xenproject.org Tue Mar 22 11:22:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 11:22:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293377.498397 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWcbE-0002Nd-7v; Tue, 22 Mar 2022 11:22:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293377.498397; Tue, 22 Mar 2022 11:22:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWcbE-0002NQ-3t; Tue, 22 Mar 2022 11:22:52 +0000
Received: by outflank-mailman (input) for mailman id 293377;
 Tue, 22 Mar 2022 11:22:51 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wGTH=UB=citrix.com=prvs=07349bdb1=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nWcbC-0001pm-RB
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 11:22:51 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 67a30a1c-a9d2-11ec-a405-831a346695d4;
 Tue, 22 Mar 2022 12:22:49 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 67a30a1c-a9d2-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647948169;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=me6cYbyjxTaz58GzY4A+RYvN1kF6kozo10n0R4eb5yI=;
  b=JOp0xW9GIavx2jrWE6OKq7JOqjegrN0DztPHigeFk+876ungG0LDdT2e
   FQgqzvY+qb0P6Sg3k1BELgnzHGJxC6ITRWm5MVKWlNb8KSDV2yNSwZh02
   wdv41jueiS1H79esM3V4mDaZMz/A/ASVbvY3pUWUuyw7zHNGS/Q45/Wv3
   M=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 66847200
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:ZNz+v6tfiBodvmGImFpRualVUufnVKVeMUV32f8akzHdYApBsoF/q
 tZmKWCAaauNNjOgfYskaoq39EoEuJPVyIdhSgto/iw0HilD+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jX4
 4uoyyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi8RGKP9xeYBayUAUAhiF59Ppb2aC2mW5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvllpyy3ZCvA3B4jOWazQ6fdT3Ssqh9AIFvHbD
 yYcQWQxPEifOUUXUrsRIL8s3+v5j0fbTx4b9m6Z/Idr5VbezQMkhdABN/KKI4fXFK25hH2wr
 G/c437wBB1cMdWF0CeE6VqlnOqJliT+MKoNEJWo+/gsh0ecrkQQDxsMXFf9vvi9iWa5QdtUL
 0FS8S0rxYAM80isQsj4TgePineOtR4BWPJdC+Q/rgqKz8L84QyUG2wFRT5pc8E9uYk9QjlC/
 k+EmZblCCJitJWRSGmB7fGEoDWqIy8XIGQeIygeQmMt+ML/qYs+ihbOSNdLE6OviNDxXzbqz
 FiirjU6hrgVpd4G0eO851+vvt63jsGXFEhvvFyRBz/7qFMiDGK4W2C2wWD948cdLpqhcgHCl
 WQuqcHD7r0kHLjYwURhX94xNL2u4v+ENhjVjlhuA4Qt+lyRxpKzQWxDyGogfRk0a67obResO
 RaO4l0JuPe/KVPwNcdKj5SN59PGJEQKPfDsTbjqY9VHefCdnyfXrXg1NSZ8M40A+XXAcJ3T2
 7/GKK5A7l5AUMyLKQZaoc9HitfHIQhkmQvuqWjTlUjP7FZnTCf9pU05GFWPdPsly6iPvR/Y9
 d1SX+PTlUkAAL2hP3aGq9BORbzvEZTdLcqqwyCwXrTeSjeK5Ul7U6OBqV/fU9INc1tpehfgo
 SjmBx4wJKvXjnzbMwSaAk2Pm5u0NauTWUkTZHR2VX7xgiBLSd/2sM83KstmFZF6pbcL5aMlE
 JE4lzCoX60npsLvoG9GM/EQbeVKKXyWuO55F3H8MWZlIMI4GVChFx2NVlKHyRTixxGf7aMWy
 4BMHCuAKXbfb2yO1PrrVc8=
IronPort-HdrOrdr: A9a23:R9tuA6BV382/h9DlHemq55DYdb4zR+YMi2TC1yhKJiC9Ffbo8P
 xG/c5rrCMc5wxxZJhNo7290ey7MBHhHP1OkO0s1NWZPDUO0VHAROoJ0WKh+UyEJ8SXzJ866U
 4KScZD4bPLYWSS9fyKgzWFLw==
X-IronPort-AV: E=Sophos;i="5.90,201,1643691600"; 
   d="scan'208";a="66847200"
From: Anthony PERARD <anthony.perard@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Anthony PERARD <anthony.perard@citrix.com>, Jan Beulich
	<jbeulich@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>, "Konrad
 Rzeszutek Wilk" <konrad.wilk@oracle.com>, Ross Lagerwall
	<ross.lagerwall@citrix.com>
Subject: [XEN PATCH v10 2/7] build: replace $(BASEDIR) by $(objtree)
Date: Tue, 22 Mar 2022 11:22:33 +0000
Message-ID: <20220322112238.1117737-3-anthony.perard@citrix.com>
X-Mailer: git-send-email 2.35.1
In-Reply-To: <20220322112238.1117737-1-anthony.perard@citrix.com>
References: <20220322112238.1117737-1-anthony.perard@citrix.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain

We need to differentiate between source files and generated/built
files. We will be replacing $(BASEDIR) by $(objtree) for files that
are generated.

Signed-off-by: Anthony PERARD <anthony.perard@citrix.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
---

Notes:
    v9:
    - acked
    
    v8:
    - rebased

 xen/Rules.mk                |  2 +-
 xen/arch/arm/Makefile       | 10 +++++-----
 xen/arch/x86/Makefile       | 28 ++++++++++++++--------------
 xen/common/Makefile         |  2 +-
 xen/test/livepatch/Makefile | 12 ++++++------
 5 files changed, 27 insertions(+), 27 deletions(-)

diff --git a/xen/Rules.mk b/xen/Rules.mk
index abeba1ab7494..7712bfa063e0 100644
--- a/xen/Rules.mk
+++ b/xen/Rules.mk
@@ -12,7 +12,7 @@ src := $(obj)
 PHONY := __build
 __build:
 
--include $(BASEDIR)/include/config/auto.conf
+-include $(objtree)/include/config/auto.conf
 
 include $(XEN_ROOT)/Config.mk
 include $(BASEDIR)/scripts/Kbuild.include
diff --git a/xen/arch/arm/Makefile b/xen/arch/arm/Makefile
index 51ec2ba928e3..1d862351d111 100644
--- a/xen/arch/arm/Makefile
+++ b/xen/arch/arm/Makefile
@@ -90,21 +90,21 @@ ifeq ($(CONFIG_ARM_64),y)
 	ln -sf $(@F) $@.efi
 endif
 
-$(TARGET)-syms: $(BASEDIR)/prelink.o $(obj)/xen.lds
+$(TARGET)-syms: $(objtree)/prelink.o $(obj)/xen.lds
 	$(LD) $(XEN_LDFLAGS) -T $(obj)/xen.lds -N $< \
-	    $(BASEDIR)/common/symbols-dummy.o -o $(@D)/.$(@F).0
+	    $(objtree)/common/symbols-dummy.o -o $(@D)/.$(@F).0
 	$(NM) -pa --format=sysv $(@D)/.$(@F).0 \
-		| $(BASEDIR)/tools/symbols $(all_symbols) --sysv --sort >$(@D)/.$(@F).0.S
+		| $(objtree)/tools/symbols $(all_symbols) --sysv --sort >$(@D)/.$(@F).0.S
 	$(MAKE) $(build)=$(@D) $(@D)/.$(@F).0.o
 	$(LD) $(XEN_LDFLAGS) -T $(obj)/xen.lds -N $< \
 	    $(@D)/.$(@F).0.o -o $(@D)/.$(@F).1
 	$(NM) -pa --format=sysv $(@D)/.$(@F).1 \
-		| $(BASEDIR)/tools/symbols $(all_symbols) --sysv --sort >$(@D)/.$(@F).1.S
+		| $(objtree)/tools/symbols $(all_symbols) --sysv --sort >$(@D)/.$(@F).1.S
 	$(MAKE) $(build)=$(@D) $(@D)/.$(@F).1.o
 	$(LD) $(XEN_LDFLAGS) -T $(obj)/xen.lds -N $< $(build_id_linker) \
 	    $(@D)/.$(@F).1.o -o $@
 	$(NM) -pa --format=sysv $(@D)/$(@F) \
-		| $(BASEDIR)/tools/symbols --all-symbols --xensyms --sysv --sort \
+		| $(objtree)/tools/symbols --all-symbols --xensyms --sysv --sort \
 		>$(@D)/$(@F).map
 	rm -f $(@D)/.$(@F).[0-9]*
 
diff --git a/xen/arch/x86/Makefile b/xen/arch/x86/Makefile
index b6b082ee1d14..7cea79ed2f8a 100644
--- a/xen/arch/x86/Makefile
+++ b/xen/arch/x86/Makefile
@@ -92,8 +92,8 @@ ifneq ($(CONFIG_HVM),y)
 $(obj)/x86_emulate.o: CFLAGS-y += -Wno-unused-label
 endif
 
-efi-y := $(shell if [ ! -r $(BASEDIR)/include/xen/compile.h -o \
-                      -O $(BASEDIR)/include/xen/compile.h ]; then \
+efi-y := $(shell if [ ! -r $(objtree)/include/xen/compile.h -o \
+                      -O $(objtree)/include/xen/compile.h ]; then \
                          echo '$(TARGET).efi'; fi) \
          $(space)
 efi-$(CONFIG_PV_SHIM_EXCLUSIVE) :=
@@ -133,23 +133,23 @@ $(TARGET): $(TARGET)-syms $(efi-y) $(obj)/boot/mkelf32
 
 CFLAGS-$(XEN_BUILD_EFI) += -DXEN_BUILD_EFI
 
-$(TARGET)-syms: $(BASEDIR)/prelink.o $(obj)/xen.lds
+$(TARGET)-syms: $(objtree)/prelink.o $(obj)/xen.lds
 	$(LD) $(XEN_LDFLAGS) -T $(obj)/xen.lds -N $< $(build_id_linker) \
-	    $(BASEDIR)/common/symbols-dummy.o -o $(@D)/.$(@F).0
+	    $(objtree)/common/symbols-dummy.o -o $(@D)/.$(@F).0
 	$(NM) -pa --format=sysv $(@D)/.$(@F).0 \
-		| $(BASEDIR)/tools/symbols $(all_symbols) --sysv --sort \
+		| $(objtree)/tools/symbols $(all_symbols) --sysv --sort \
 		>$(@D)/.$(@F).0.S
 	$(MAKE) $(build)=$(@D) $(@D)/.$(@F).0.o
 	$(LD) $(XEN_LDFLAGS) -T $(obj)/xen.lds -N $< $(build_id_linker) \
 	    $(@D)/.$(@F).0.o -o $(@D)/.$(@F).1
 	$(NM) -pa --format=sysv $(@D)/.$(@F).1 \
-		| $(BASEDIR)/tools/symbols $(all_symbols) --sysv --sort $(syms-warn-dup-y) \
+		| $(objtree)/tools/symbols $(all_symbols) --sysv --sort $(syms-warn-dup-y) \
 		>$(@D)/.$(@F).1.S
 	$(MAKE) $(build)=$(@D) $(@D)/.$(@F).1.o
 	$(LD) $(XEN_LDFLAGS) -T $(obj)/xen.lds -N $< $(build_id_linker) \
 	    $(orphan-handling-y) $(@D)/.$(@F).1.o -o $@
 	$(NM) -pa --format=sysv $(@D)/$(@F) \
-		| $(BASEDIR)/tools/symbols --all-symbols --xensyms --sysv --sort \
+		| $(objtree)/tools/symbols --all-symbols --xensyms --sysv --sort \
 		>$(@D)/$(@F).map
 	rm -f $(@D)/.$(@F).[0-9]* $(@D)/..$(@F).[0-9]*
 ifeq ($(CONFIG_XEN_IBT),y)
@@ -202,28 +202,28 @@ note_file_option ?= $(note_file)
 
 extra-$(XEN_BUILD_PE) += efi.lds
 ifeq ($(XEN_BUILD_PE),y)
-$(TARGET).efi: $(BASEDIR)/prelink.o $(note_file) $(obj)/efi.lds $(obj)/efi/relocs-dummy.o $(obj)/efi/mkreloc
+$(TARGET).efi: $(objtree)/prelink.o $(note_file) $(obj)/efi.lds $(obj)/efi/relocs-dummy.o $(obj)/efi/mkreloc
 ifeq ($(CONFIG_DEBUG_INFO),y)
 	$(if $(filter --strip-debug,$(EFI_LDFLAGS)),echo,:) "Will strip debug info from $(@F)"
 endif
 	$(foreach base, $(VIRT_BASE) $(ALT_BASE), \
 	          $(LD) $(call EFI_LDFLAGS,$(base)) -T $(obj)/efi.lds -N $< $(relocs-dummy) \
-	                $(BASEDIR)/common/symbols-dummy.o $(note_file_option) -o $(@D)/.$(@F).$(base).0 &&) :
+	                $(objtree)/common/symbols-dummy.o $(note_file_option) -o $(@D)/.$(@F).$(base).0 &&) :
 	$(MKRELOC) $(foreach base,$(VIRT_BASE) $(ALT_BASE),$(@D)/.$(@F).$(base).0) >$(@D)/.$(@F).0r.S
 	$(NM) -pa --format=sysv $(@D)/.$(@F).$(VIRT_BASE).0 \
-		| $(BASEDIR)/tools/symbols $(all_symbols) --sysv --sort >$(@D)/.$(@F).0s.S
+		| $(objtree)/tools/symbols $(all_symbols) --sysv --sort >$(@D)/.$(@F).0s.S
 	$(MAKE) $(build)=$(@D) .$(@F).0r.o .$(@F).0s.o
 	$(foreach base, $(VIRT_BASE) $(ALT_BASE), \
 	          $(LD) $(call EFI_LDFLAGS,$(base)) -T $(obj)/efi.lds -N $< \
 	                $(@D)/.$(@F).0r.o $(@D)/.$(@F).0s.o $(note_file_option) -o $(@D)/.$(@F).$(base).1 &&) :
 	$(MKRELOC) $(foreach base,$(VIRT_BASE) $(ALT_BASE),$(@D)/.$(@F).$(base).1) >$(@D)/.$(@F).1r.S
 	$(NM) -pa --format=sysv $(@D)/.$(@F).$(VIRT_BASE).1 \
-		| $(BASEDIR)/tools/symbols $(all_symbols) --sysv --sort >$(@D)/.$(@F).1s.S
+		| $(objtree)/tools/symbols $(all_symbols) --sysv --sort >$(@D)/.$(@F).1s.S
 	$(MAKE) $(build)=$(@D) .$(@F).1r.o .$(@F).1s.o
 	$(LD) $(call EFI_LDFLAGS,$(VIRT_BASE)) -T $(obj)/efi.lds -N $< \
 	      $(@D)/.$(@F).1r.o $(@D)/.$(@F).1s.o $(orphan-handling-y) $(note_file_option) -o $@
 	$(NM) -pa --format=sysv $(@D)/$(@F) \
-		| $(BASEDIR)/tools/symbols --all-symbols --xensyms --sysv --sort >$(@D)/$(@F).map
+		| $(objtree)/tools/symbols --all-symbols --xensyms --sysv --sort >$(@D)/$(@F).map
 	rm -f $(@D)/.$(@F).[0-9]* $(@D)/..$(@F).[0-9]*
 ifeq ($(CONFIG_XEN_IBT),y)
 	$(SHELL) $(BASEDIR)/tools/check-endbr.sh $@
@@ -238,11 +238,11 @@ endif
 $(obj)/efi/buildid.o $(obj)/efi/relocs-dummy.o: ;
 
 .PHONY: include
-include: $(BASEDIR)/arch/x86/include/asm/asm-macros.h
+include: $(objtree)/arch/x86/include/asm/asm-macros.h
 
 $(obj)/asm-macros.i: CFLAGS-y += -D__ASSEMBLY__ -P
 
-$(BASEDIR)/arch/x86/include/asm/asm-macros.h: $(obj)/asm-macros.i $(src)/Makefile
+$(objtree)/arch/x86/include/asm/asm-macros.h: $(obj)/asm-macros.i $(src)/Makefile
 	$(call filechk,asm-macros.h)
 
 define filechk_asm-macros.h
diff --git a/xen/common/Makefile b/xen/common/Makefile
index dc8d3a13f5b8..30641a737231 100644
--- a/xen/common/Makefile
+++ b/xen/common/Makefile
@@ -74,7 +74,7 @@ obj-$(CONFIG_UBSAN) += ubsan/
 obj-$(CONFIG_NEEDS_LIBELF) += libelf/
 obj-$(CONFIG_HAS_DEVICE_TREE) += libfdt/
 
-CONF_FILE := $(if $(patsubst /%,,$(KCONFIG_CONFIG)),$(BASEDIR)/)$(KCONFIG_CONFIG)
+CONF_FILE := $(if $(patsubst /%,,$(KCONFIG_CONFIG)),$(objtree)/)$(KCONFIG_CONFIG)
 $(obj)/config.gz: $(CONF_FILE)
 	gzip -n -c $< >$@
 
diff --git a/xen/test/livepatch/Makefile b/xen/test/livepatch/Makefile
index e6fee84b69da..ddb07371315e 100644
--- a/xen/test/livepatch/Makefile
+++ b/xen/test/livepatch/Makefile
@@ -22,9 +22,9 @@ $(obj)/xen_hello_world.o: $(obj)/config.h
 $(obj)/config.h: $(obj)/xen_hello_world_func.o
 	(set -e; \
 	 echo "#define NEW_CODE_SZ $(call CODE_SZ,$<,xen_hello_world)"; \
-	 echo "#define MINOR_VERSION_SZ $(call CODE_SZ,$(BASEDIR)/xen-syms,xen_minor_version)"; \
-	 echo "#define MINOR_VERSION_ADDR $(call CODE_ADDR,$(BASEDIR)/xen-syms,xen_minor_version)"; \
-	 echo "#define OLD_CODE_SZ $(call CODE_SZ,$(BASEDIR)/xen-syms,xen_extra_version)") > $@
+	 echo "#define MINOR_VERSION_SZ $(call CODE_SZ,$(objtree)/xen-syms,xen_minor_version)"; \
+	 echo "#define MINOR_VERSION_ADDR $(call CODE_ADDR,$(objtree)/xen-syms,xen_minor_version)"; \
+	 echo "#define OLD_CODE_SZ $(call CODE_SZ,$(objtree)/xen-syms,xen_extra_version)") > $@
 
 $(obj)/modinfo.o:
 	(set -e; \
@@ -42,7 +42,7 @@ $(obj)/modinfo.o:
 # not be built (it is for EFI builds), and that we do not have
 # the note.o.bin to muck with (as it gets deleted)
 #
-$(obj)/note.o: $(BASEDIR)/xen-syms
+$(obj)/note.o: $(objtree)/xen-syms
 	$(OBJCOPY) -O binary --only-section=.note.gnu.build-id $< $@.bin
 	$(OBJCOPY) $(OBJCOPY_MAGIC) \
 		   --rename-section=.data=.livepatch.depends,alloc,load,readonly,data,contents -S $@.bin $@
@@ -52,7 +52,7 @@ $(obj)/note.o: $(BASEDIR)/xen-syms
 # Append .livepatch.xen_depends section
 # with Xen build-id derived from xen-syms.
 #
-$(obj)/xen_note.o: $(BASEDIR)/xen-syms
+$(obj)/xen_note.o: $(objtree)/xen-syms
 	$(OBJCOPY) -O binary --only-section=.note.gnu.build-id $< $@.bin
 	$(OBJCOPY) $(OBJCOPY_MAGIC) \
 		   --rename-section=.data=.livepatch.xen_depends,alloc,load,readonly,data,contents -S $@.bin $@
@@ -125,7 +125,7 @@ xen_action_hooks_norevert-objs := xen_action_hooks_marker.o xen_hello_world_func
 
 EXPECT_BYTES_COUNT := 8
 CODE_GET_EXPECT=$(shell $(OBJDUMP) -d --insn-width=1 $(1) | sed -n -e '/<'$(2)'>:$$/,/^$$/ p' | tail -n +2 | head -n $(EXPECT_BYTES_COUNT) | awk '{$$0=$$2; printf "%s", substr($$0,length-1)}' | sed 's/.\{2\}/0x&,/g' | sed 's/^/{/;s/,$$/}/g')
-$(obj)/expect_config.h: $(BASEDIR)/xen-syms
+$(obj)/expect_config.h: $(objtree)/xen-syms
 	(set -e; \
 	 echo "#define EXPECT_BYTES $(call CODE_GET_EXPECT,$<,xen_extra_version)"; \
          echo "#define EXPECT_BYTES_COUNT $(EXPECT_BYTES_COUNT)") > $@
-- 
Anthony PERARD



From xen-devel-bounces@lists.xenproject.org Tue Mar 22 11:22:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 11:22:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293378.498408 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWcbI-0002l4-ND; Tue, 22 Mar 2022 11:22:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293378.498408; Tue, 22 Mar 2022 11:22:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWcbI-0002kr-HT; Tue, 22 Mar 2022 11:22:56 +0000
Received: by outflank-mailman (input) for mailman id 293378;
 Tue, 22 Mar 2022 11:22:55 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wGTH=UB=citrix.com=prvs=07349bdb1=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nWcbG-0001pm-OC
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 11:22:54 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 69ec4df0-a9d2-11ec-a405-831a346695d4;
 Tue, 22 Mar 2022 12:22:53 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 69ec4df0-a9d2-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647948173;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=b8QJw/R+95kdQ8nhsS0sB38nPXZyrRBhXuNV+PLsfNw=;
  b=SSWeHwBAekoRIp9lmx79YfTsZW8bn8elVO4OJ4sluc0YhF5DbnNUKOm3
   RS3efiylicmjRNNwUudrg8y+Oup66Xr+iAjNej4ryYSWz9WCckTnzjKIw
   fPObDq8R2LrNkAowJgETk2D5dByxgrrFRbXHSWVEml5AhBK7d2TReXl2I
   g=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 66847210
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:lYgdha2+shXEJwawxPbD5Qtxkn2cJEfYwER7XKvMYLTBsI5bp2YFy
 jYfXGqDOqmOZDChfth+aYyy9BtXv5fdmIA3HAVrpC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUy24Dja++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /1B7LmJYDkSMZTPwuQBahoHFSZ5JoFvreqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHiOp8fvXdxiynUF/88TbjIQrnQ5M8e1zA17ixLNaiAN
 5ZGM2M3BPjGSwVAIXMnVdEspcC5pCnbVxR7ggufn4NitgA/yyQuieOwYbI5YOeiXt5Jl0yVo
 mbH+WXRARwAMtGbjz2f/RqEmevnjS79HoUIG9WQ+vFmjVKJz0QPGRYWUh29uvD/hUmgM/pdN
 kgV9ywGvaU0skuxQbHVTxC+5XKJoBMYc95RCPEhrhGAzLLO5ASUDXRCSSROAPQkvsIrQT0h1
 neSgsjkQzdotdW9RWqG87aIrRu7ISUPMXIZfigAUBcE5N/45oo0i3ryos1LSfDvyIevQHepn
 m7M/HNWa6gvYdAj2/yexHn5uD2VpcLJUjc2uQPQWXmJx1YsDGK6XLCA5V/e5PdGCY+WSFido
 XQJ8/SjAPAy4YKlz3LUHrhUdF29z7PcaWCH3wYzd3U03271k0NPa7y8992XyK1BFs8fMQHkb
 0bI0e+6zM8CZSD6BUObjm/YNijL8UQCPYm8Phw3RoAXCnSUSONh1Hs1DaJ39zqx+HXAaYllZ
 f+mnT+EVB7285hPwjusXPs62rQ23C04zm67bcmlk0v3geXDOy/PF+pt3L6yggYRtv/sTOL9q
 Ys3Cid3408HDL2Wjtf/r+b/0mzm3VBkXMur+qS7h8aIIxZ8GXFJNhMi6ehJRmCRpIwMzr2g1
 ijkAidwkQOj7VWaeVTiQi0yM9vHAMcgxU/XyARxZD5ELVB4Ot3xhEreHrNqFYQaGBtLlqclE
 aNaJ53eXpyiiF3volwgUHU0l6Q6HDzDuO5EF3fNjOQXF3K4ezH0xw==
IronPort-HdrOrdr: A9a23:C3cf0K1HhrTSpAsxtZPqXwqjBIokLtp133Aq2lEZdPRUGvb3qy
 nIpoV86faUskdoZJhOo7C90cW7LU80sKQFhLX5Xo3SOzUO2lHYT72KhLGKq1aLdhEWtNQtsZ
 uIG5IOceEYZmIasS+V2maF+q4bsbu6zJw=
X-IronPort-AV: E=Sophos;i="5.90,201,1643691600"; 
   d="scan'208";a="66847210"
From: Anthony PERARD <anthony.perard@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Anthony PERARD <anthony.perard@citrix.com>, Jan Beulich
	<jbeulich@suse.com>, "Daniel P . Smith" <dpsmith@apertussolutions.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>, Daniel De Graaf
	<dgdegra@tycho.nsa.gov>
Subject: [XEN PATCH v10 3/7] build: replace $(BASEDIR) and use $(srctree)
Date: Tue, 22 Mar 2022 11:22:34 +0000
Message-ID: <20220322112238.1117737-4-anthony.perard@citrix.com>
X-Mailer: git-send-email 2.35.1
In-Reply-To: <20220322112238.1117737-1-anthony.perard@citrix.com>
References: <20220322112238.1117737-1-anthony.perard@citrix.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain

$(srctree) is a better description for the source directory than
$(BASEDIR) that has been used for both source and build directory
(which where the same).

This adds $(srctree) to a few path where make's VPATH=$(srctree) won't
apply. And replace $(BASEDIR) by $(srctree).

Introduce "$(srcdir)" as a shortcut for "$(srctree)/$(src)" as the
later is used often enough.

Signed-off-by: Anthony PERARD <anthony.perard@citrix.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Daniel P. Smith <dpsmith@apertussolutions.com> # XSM
---

Notes:
    v10:
    - rebased: use $(srctree) for ./tools/check-endbr.sh
    
    v9:
    - acked
    - reword "# shortcut for $(srctree)/$(src)" into "# shortcuts" in both
      places.
    
    v8:
    - merge of two patchs from v7:
        build: add $(srctree) in few key places
        build: replace $(BASEDIR) by $(srctree)
      both patch were acked
    - introduce $(srcdir) as a shortcut for $(srctree)/$(src)

 xen/Kconfig                 |  4 ++--
 xen/Makefile                |  7 +++----
 xen/Rules.mk                |  9 ++++++---
 xen/arch/x86/Makefile       |  4 ++--
 xen/arch/x86/arch.mk        |  2 +-
 xen/build.mk                |  4 ++--
 xen/common/Makefile         |  2 +-
 xen/common/libfdt/Makefile  |  2 +-
 xen/include/Makefile        | 14 +++++++-------
 xen/scripts/Kconfig.include |  2 +-
 xen/scripts/Makefile.clean  |  5 ++++-
 xen/xsm/flask/Makefile      | 10 +++++-----
 12 files changed, 35 insertions(+), 30 deletions(-)

diff --git a/xen/Kconfig b/xen/Kconfig
index d134397a0ba6..ec2bd9fbcfaa 100644
--- a/xen/Kconfig
+++ b/xen/Kconfig
@@ -14,14 +14,14 @@ config CC_IS_GCC
 
 config GCC_VERSION
 	int
-	default $(shell,$(BASEDIR)/scripts/gcc-version.sh $(CC))
+	default $(shell,$(srctree)/scripts/gcc-version.sh $(CC))
 
 config CC_IS_CLANG
 	def_bool $(success,$(CC) --version | head -n 1 | grep -q clang)
 
 config CLANG_VERSION
 	int
-	default $(shell,$(BASEDIR)/scripts/clang-version.sh $(CC))
+	default $(shell,$(srctree)/scripts/clang-version.sh $(CC))
 
 # -fvisibility=hidden reduces -fpic cost, if it's available
 config CC_HAS_VISIBILITY_ATTRIBUTE
diff --git a/xen/Makefile b/xen/Makefile
index dec489f2a909..b89db5e8ab37 100644
--- a/xen/Makefile
+++ b/xen/Makefile
@@ -19,8 +19,7 @@ export PYTHON		?= $(PYTHON_INTERPRETER)
 
 export CHECKPOLICY	?= checkpolicy
 
-export BASEDIR := $(CURDIR)
-export XEN_ROOT := $(BASEDIR)/..
+export XEN_ROOT := $(CURDIR)/..
 
 abs_objtree := $(CURDIR)
 abs_srctree := $(CURDIR)
@@ -189,7 +188,7 @@ ifeq ($(TARGET_ARCH),x86)
 t1 = $(call as-insn,$(CC),".L0: .L1: .skip (.L1 - .L0)",,-no-integrated-as)
 
 # Check whether clang asm()-s support .include.
-t2 = $(call as-insn,$(CC) -I$(BASEDIR)/arch/x86/include,".include \"asm/asm-defns.h\"",,-no-integrated-as)
+t2 = $(call as-insn,$(CC) -I$(srctree)/arch/x86/include,".include \"asm/asm-defns.h\"",,-no-integrated-as)
 
 # Check whether clang keeps .macro-s between asm()-s:
 # https://bugs.llvm.org/show_bug.cgi?id=36110
@@ -326,7 +325,7 @@ ALL_OBJS-$(CONFIG_CRYPTO) += crypto/built_in.o
 
 ALL_LIBS-y                := lib/lib.a
 
-include $(BASEDIR)/arch/$(TARGET_ARCH)/arch.mk
+include $(srctree)/arch/$(TARGET_ARCH)/arch.mk
 
 # define new variables to avoid the ones defined in Config.mk
 export XEN_CFLAGS := $(CFLAGS)
diff --git a/xen/Rules.mk b/xen/Rules.mk
index 7712bfa063e0..57a029455586 100644
--- a/xen/Rules.mk
+++ b/xen/Rules.mk
@@ -9,13 +9,16 @@ endif
 
 src := $(obj)
 
+# shortcuts
+srcdir := $(srctree)/$(src)
+
 PHONY := __build
 __build:
 
 -include $(objtree)/include/config/auto.conf
 
 include $(XEN_ROOT)/Config.mk
-include $(BASEDIR)/scripts/Kbuild.include
+include $(srctree)/scripts/Kbuild.include
 
 # Initialise some variables
 obj-y :=
@@ -58,7 +61,7 @@ cmd_objcopy = $(OBJCOPY) $(OBJCOPYFLAGS) $< $@
 # binfile
 # use e.g. $(call if_changed,binfile,binary-file varname)
 quiet_cmd_binfile = BINFILE $@
-cmd_binfile = $(SHELL) $(BASEDIR)/tools/binfile $(BINFILE_FLAGS) $@ $(2)
+cmd_binfile = $(SHELL) $(srctree)/tools/binfile $(BINFILE_FLAGS) $@ $(2)
 
 # Figure out what we need to build from the various variables
 # ===========================================================================
@@ -177,7 +180,7 @@ cpp_flags = $(filter-out -Wa$(comma)% -flto,$(1))
 c_flags = -MMD -MP -MF $(depfile) $(XEN_CFLAGS)
 a_flags = -MMD -MP -MF $(depfile) $(XEN_AFLAGS)
 
-include $(BASEDIR)/arch/$(TARGET_ARCH)/Rules.mk
+include $(srctree)/arch/$(TARGET_ARCH)/Rules.mk
 
 c_flags += $(_c_flags)
 a_flags += $(_c_flags)
diff --git a/xen/arch/x86/Makefile b/xen/arch/x86/Makefile
index 7cea79ed2f8a..717bcbcac7a0 100644
--- a/xen/arch/x86/Makefile
+++ b/xen/arch/x86/Makefile
@@ -153,7 +153,7 @@ $(TARGET)-syms: $(objtree)/prelink.o $(obj)/xen.lds
 		>$(@D)/$(@F).map
 	rm -f $(@D)/.$(@F).[0-9]* $(@D)/..$(@F).[0-9]*
 ifeq ($(CONFIG_XEN_IBT),y)
-	$(SHELL) $(BASEDIR)/tools/check-endbr.sh $@
+	$(SHELL) $(srctree)/tools/check-endbr.sh $@
 endif
 
 $(obj)/note.o: $(TARGET)-syms
@@ -226,7 +226,7 @@ endif
 		| $(objtree)/tools/symbols --all-symbols --xensyms --sysv --sort >$(@D)/$(@F).map
 	rm -f $(@D)/.$(@F).[0-9]* $(@D)/..$(@F).[0-9]*
 ifeq ($(CONFIG_XEN_IBT),y)
-	$(SHELL) $(BASEDIR)/tools/check-endbr.sh $@
+	$(SHELL) $(srctree)/tools/check-endbr.sh $@
 endif
 else
 $(TARGET).efi: FORCE
diff --git a/xen/arch/x86/arch.mk b/xen/arch/x86/arch.mk
index c90e56aeab87..cfde143053fc 100644
--- a/xen/arch/x86/arch.mk
+++ b/xen/arch/x86/arch.mk
@@ -78,7 +78,7 @@ ifneq ($(CONFIG_PV_SHIM_EXCLUSIVE),y)
 efi-check := arch/x86/efi/check
 
 # Check if the compiler supports the MS ABI.
-XEN_BUILD_EFI := $(call if-success,$(CC) $(CFLAGS) -c $(efi-check).c -o $(efi-check).o,y)
+XEN_BUILD_EFI := $(call if-success,$(CC) $(CFLAGS) -c $(srctree)/$(efi-check).c -o $(efi-check).o,y)
 
 # Check if the linker supports PE.
 EFI_LDFLAGS := $(patsubst -m%,-mi386pep,$(LDFLAGS)) --subsystem=10
diff --git a/xen/build.mk b/xen/build.mk
index e718743ef772..758590c68eab 100644
--- a/xen/build.mk
+++ b/xen/build.mk
@@ -27,9 +27,9 @@ define cmd_compile.h
 	    -e 's/@@version@@/$(XEN_VERSION)/g' \
 	    -e 's/@@subversion@@/$(XEN_SUBVERSION)/g' \
 	    -e 's/@@extraversion@@/$(XEN_EXTRAVERSION)/g' \
-	    -e 's!@@changeset@@!$(shell tools/scmversion $(XEN_ROOT) || echo "unavailable")!g' \
+	    -e 's!@@changeset@@!$(shell $(srctree)/tools/scmversion $(XEN_ROOT) || echo "unavailable")!g' \
 	    < $< > $(dot-target).tmp; \
-	sed -rf tools/process-banner.sed < .banner >> $(dot-target).tmp; \
+	sed -rf $(srctree)/tools/process-banner.sed < .banner >> $(dot-target).tmp; \
 	mv -f $(dot-target).tmp $@; \
     fi
 endef
diff --git a/xen/common/Makefile b/xen/common/Makefile
index 30641a737231..b1e076c30b81 100644
--- a/xen/common/Makefile
+++ b/xen/common/Makefile
@@ -80,7 +80,7 @@ $(obj)/config.gz: $(CONF_FILE)
 
 $(obj)/config_data.o: $(obj)/config.gz
 
-$(obj)/config_data.S: $(BASEDIR)/tools/binfile FORCE
+$(obj)/config_data.S: $(srctree)/tools/binfile FORCE
 	$(call if_changed,binfile,$(obj)/config.gz xen_config_data)
 targets += config_data.S
 
diff --git a/xen/common/libfdt/Makefile b/xen/common/libfdt/Makefile
index 6708af12e583..75aaefa2e37f 100644
--- a/xen/common/libfdt/Makefile
+++ b/xen/common/libfdt/Makefile
@@ -6,7 +6,7 @@ OBJCOPYFLAGS := $(foreach s,$(SECTIONS),--rename-section .$(s)=.init.$(s))
 obj-y += libfdt.o
 nocov-y += libfdt.o
 
-CFLAGS-y += -I$(BASEDIR)/include/xen/libfdt/
+CFLAGS-y += -I$(srctree)/include/xen/libfdt/
 
 $(obj)/libfdt.o: $(obj)/libfdt-temp.o FORCE
 	$(call if_changed,objcopy)
diff --git a/xen/include/Makefile b/xen/include/Makefile
index a3c2511f5f60..5a2b4c9f65fa 100644
--- a/xen/include/Makefile
+++ b/xen/include/Makefile
@@ -45,22 +45,22 @@ public-$(CONFIG_ARM) := $(wildcard $(src)/public/arch-arm/*.h $(src)/public/arch
 .PHONY: all
 all: $(addprefix $(obj)/,$(headers-y))
 
-$(obj)/compat/%.h: $(obj)/compat/%.i $(src)/Makefile $(BASEDIR)/tools/compat-build-header.py
-	$(PYTHON) $(BASEDIR)/tools/compat-build-header.py <$< $(patsubst $(obj)/%,%,$@) >>$@.new; \
+$(obj)/compat/%.h: $(obj)/compat/%.i $(src)/Makefile $(srctree)/tools/compat-build-header.py
+	$(PYTHON) $(srctree)/tools/compat-build-header.py <$< $(patsubst $(obj)/%,%,$@) >>$@.new; \
 	mv -f $@.new $@
 
 $(obj)/compat/%.i: $(obj)/compat/%.c $(src)/Makefile
 	$(CPP) $(filter-out -Wa$(comma)% -include %/include/xen/config.h,$(XEN_CFLAGS)) $(cppflags-y) -o $@ $<
 
-$(obj)/compat/%.c: $(src)/public/%.h $(src)/xlat.lst $(src)/Makefile $(BASEDIR)/tools/compat-build-source.py
+$(obj)/compat/%.c: $(src)/public/%.h $(src)/xlat.lst $(src)/Makefile $(srctree)/tools/compat-build-source.py
 	mkdir -p $(@D)
-	$(PYTHON) $(BASEDIR)/tools/compat-build-source.py $(src)/xlat.lst <$< >$@.new
+	$(PYTHON) $(srctree)/tools/compat-build-source.py $(srcdir)/xlat.lst <$< >$@.new
 	mv -f $@.new $@
 
-$(obj)/compat/.xlat/%.h: $(obj)/compat/%.h $(obj)/compat/.xlat/%.lst $(BASEDIR)/tools/get-fields.sh $(src)/Makefile
+$(obj)/compat/.xlat/%.h: $(obj)/compat/%.h $(obj)/compat/.xlat/%.lst $(srctree)/tools/get-fields.sh $(src)/Makefile
 	export PYTHON=$(PYTHON); \
 	while read what name; do \
-		$(SHELL) $(BASEDIR)/tools/get-fields.sh "$$what" compat_$$name $< || exit $$?; \
+		$(SHELL) $(srctree)/tools/get-fields.sh "$$what" compat_$$name $< || exit $$?; \
 	done <$(patsubst $(obj)/compat/%,$(obj)/compat/.xlat/%,$(basename $<)).lst >$@.new
 	mv -f $@.new $@
 
@@ -70,7 +70,7 @@ $(obj)/compat/.xlat/%.lst: $(src)/xlat.lst $(src)/Makefile
 	grep -v '^[[:blank:]]*#' $< | sed -ne 's,@arch@,$(compat-arch-y),g' -re 's,[[:blank:]]+$*\.h[[:blank:]]*$$,,p' >$@.new
 	$(call move-if-changed,$@.new,$@)
 
-xlat-y := $(shell sed -ne 's,@arch@,$(compat-arch-y),g' -re 's,^[?!][[:blank:]]+[^[:blank:]]+[[:blank:]]+,,p' $(src)/xlat.lst | uniq)
+xlat-y := $(shell sed -ne 's,@arch@,$(compat-arch-y),g' -re 's,^[?!][[:blank:]]+[^[:blank:]]+[[:blank:]]+,,p' $(srcdir)/xlat.lst | uniq)
 xlat-y := $(filter $(patsubst compat/%,%,$(headers-y)),$(xlat-y))
 
 $(obj)/compat/xlat.h: $(addprefix $(obj)/compat/.xlat/,$(xlat-y)) $(obj)/config/auto.conf $(src)/Makefile
diff --git a/xen/scripts/Kconfig.include b/xen/scripts/Kconfig.include
index e1f13e17207e..389a690a127a 100644
--- a/xen/scripts/Kconfig.include
+++ b/xen/scripts/Kconfig.include
@@ -40,4 +40,4 @@ $(error-if,$(failure,command -v $(CC)),compiler '$(CC)' not found)
 $(error-if,$(failure,command -v $(LD)),linker '$(LD)' not found)
 
 # gcc version including patch level
-gcc-version := $(shell,$(BASEDIR)/scripts/gcc-version.sh $(CC))
+gcc-version := $(shell,$(srctree)/scripts/gcc-version.sh $(CC))
diff --git a/xen/scripts/Makefile.clean b/xen/scripts/Makefile.clean
index 4eed31974509..f97ecd3b8eee 100644
--- a/xen/scripts/Makefile.clean
+++ b/xen/scripts/Makefile.clean
@@ -5,9 +5,12 @@
 
 src := $(obj)
 
+# shortcuts
+srcdir := $(srctree)/$(src)
+
 clean::
 
-include $(BASEDIR)/scripts/Kbuild.include
+include $(srctree)/scripts/Kbuild.include
 
 include $(src)/Makefile
 
diff --git a/xen/xsm/flask/Makefile b/xen/xsm/flask/Makefile
index 4ac6fb8778ae..a99038cb5722 100644
--- a/xen/xsm/flask/Makefile
+++ b/xen/xsm/flask/Makefile
@@ -8,8 +8,8 @@ CFLAGS-y += -I$(obj)/include
 
 AWK = awk
 
-FLASK_H_DEPEND := $(addprefix $(src)/policy/,security_classes initial_sids)
-AV_H_DEPEND = $(src)/policy/access_vectors
+FLASK_H_DEPEND := $(addprefix $(srcdir)/policy/,security_classes initial_sids)
+AV_H_DEPEND := $(srcdir)/policy/access_vectors
 
 FLASK_H_FILES := flask.h class_to_string.h initial_sid_to_string.h
 AV_H_FILES := av_perm_to_string.h av_permissions.h
@@ -18,14 +18,14 @@ ALL_H_FILES := $(addprefix include/,$(FLASK_H_FILES) $(AV_H_FILES))
 $(addprefix $(obj)/,$(obj-y)) $(obj)/ss/built_in.o: $(addprefix $(obj)/,$(ALL_H_FILES))
 extra-y += $(ALL_H_FILES)
 
-mkflask := $(src)/policy/mkflask.sh
+mkflask := $(srcdir)/policy/mkflask.sh
 quiet_cmd_mkflask = MKFLASK $@
 cmd_mkflask = $(SHELL) $(mkflask) $(AWK) $(obj)/include $(FLASK_H_DEPEND)
 
 $(addprefix $(obj)/%/,$(FLASK_H_FILES)): $(FLASK_H_DEPEND) $(mkflask) FORCE
 	$(call if_changed,mkflask)
 
-mkaccess := $(src)/policy/mkaccess_vector.sh
+mkaccess := $(srcdir)/policy/mkaccess_vector.sh
 quiet_cmd_mkaccess = MKACCESS VECTOR $@
 cmd_mkaccess = $(SHELL) $(mkaccess) $(AWK) $(obj)/include $(AV_H_DEPEND)
 
@@ -36,7 +36,7 @@ obj-bin-$(CONFIG_XSM_FLASK_POLICY) += flask-policy.o
 $(obj)/flask-policy.o: $(obj)/policy.bin
 
 $(obj)/flask-policy.S: BINFILE_FLAGS := -i
-$(obj)/flask-policy.S: $(BASEDIR)/tools/binfile FORCE
+$(obj)/flask-policy.S: $(srctree)/tools/binfile FORCE
 	$(call if_changed,binfile,$(obj)/policy.bin xsm_flask_init_policy)
 targets += flask-policy.S
 
-- 
Anthony PERARD



From xen-devel-bounces@lists.xenproject.org Tue Mar 22 11:22:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 11:22:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293379.498414 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWcbJ-0002pN-52; Tue, 22 Mar 2022 11:22:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293379.498414; Tue, 22 Mar 2022 11:22:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWcbI-0002oJ-Sw; Tue, 22 Mar 2022 11:22:56 +0000
Received: by outflank-mailman (input) for mailman id 293379;
 Tue, 22 Mar 2022 11:22:56 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wGTH=UB=citrix.com=prvs=07349bdb1=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nWcbI-0001pm-0C
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 11:22:56 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6b0fe40c-a9d2-11ec-a405-831a346695d4;
 Tue, 22 Mar 2022 12:22:54 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6b0fe40c-a9d2-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647948174;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=iCkD9kQGHEIpSeuGuWXlR9E5wrrWdyUrQlYnyc/6iyA=;
  b=gbgq4FBt48dLd45ULw6fWFMwuv7HLeSCrP1rc4TA9po4ztReBBAIz4qA
   I0DGmqvUzgv2UtT107r5BxW5vdtr4plWmBw20hbxQ3GcAWrH6xcoauH3s
   KHlV4J6B7p5D+wl3UHBzslQ5mQp+ww+1YIbzvgJuH1Uk9R4OfvINE46dp
   w=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 66847218
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:OBUPp6DgjqcyERVW/wTjw5YqxClBgxIJ4kV8jS/XYbTApDNwhmEBn
 TQeXTiPOvreMWCgKd93bojkoBxSvJLQy9BnQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vj2NYy6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhWx
 41xtMTqdzwzN4iUsqcWXx1YOgpHaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguwqKtXrO4UO/Glt1zjDAd4tQIzZQrWM7thdtNs1rp4QTaqBP
 ZNJAdZpRFfdfR5QE3UaM7l9kMCvgUPWdCJHqV3A8MLb5ECMlVcsgdABKuH9YceWTM9YmkKZo
 GPu/GnjBBwectuFxlKt7XaEluLJ2yThV+o6FqC89/NsqE2ewCoUEhJ+fUu2p7y1h1CzX/pbK
 lcI4Ww+oK4q7kupQ9LhGRqirxasvBQRRt5RGO0S8xyWx+zf5APxO4QfZmcfMpp87pZwHGF0k
 A/S9z/0OdBxmJqaEU6cru2qlim7HHA/bmQOYS8tZjJQtrEPv7oPph7IS99iFou8gdv0BSz8z
 li2kcQuu1kApZVVjvvmpDgrlxrp/8GUFVBtum07S0r/tmtEiJiZi5tEALQxxdJJN86nQ1aIp
 xDocODOvblVXflheMFgKdjh/Y1FBd7YaVUwYnY1RvHNEghBHVb5Jui8BxkkeC9U3j4sI2OBX
 aMqkVo5CGVvFHWrd7RrRIm6Ft4ny6Ptffy8CKyLPooRP8cgLlHalM2LWaJ29zqx+KTLuftiU
 ap3jO72VSpKYUiZ5GTeqxghPU8DmXllmDK7qWHTxBW7y7uODEN5up9eWGZimtsRtfveyC2Mq
 o43H5LTl313Db2vCgGKoNV7BQ1bchAG6WXe9pU/mhireVE9RgnMypb5nNscRmCSt/8Mx7mSo
 S3lBBMwJZiWrSSvFDhmo0tLMNvHNauTZ1pgVcDwFT5EA0QeXLs=
IronPort-HdrOrdr: A9a23:WTwJz60mjJAYb4hxSXAOjQqjBIokLtp133Aq2lEZdPRUGvb3qy
 nIpoV86faUskdoZJhOo7C90cW7LU80sKQFhLX5Xo3SOzUO2lHYT72KhLGKq1aLdhEWtNQtsZ
 uIG5IOceEYZmIasS+V2maF+q4bsbu6zJw=
X-IronPort-AV: E=Sophos;i="5.90,201,1643691600"; 
   d="scan'208";a="66847218"
From: Anthony PERARD <anthony.perard@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Anthony PERARD <anthony.perard@citrix.com>, Jan Beulich
	<jbeulich@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Wei Liu <wl@xen.org>
Subject: [XEN PATCH v10 4/7] build: rework "headers*.chk" prerequisite in include/
Date: Tue, 22 Mar 2022 11:22:35 +0000
Message-ID: <20220322112238.1117737-5-anthony.perard@citrix.com>
X-Mailer: git-send-email 2.35.1
In-Reply-To: <20220322112238.1117737-1-anthony.perard@citrix.com>
References: <20220322112238.1117737-1-anthony.perard@citrix.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain

Listing public headers when out-of-tree build are involved becomes
more annoying where every path to every headers needs to start with
"$(srctree)/$(src)", or $(wildcard ) will not work. This means more
repetition. ( "$(srcdir)" is a shortcut for "$(srctree)/$(src)" )

This patch attempt to reduce the amount of duplication and make better
use of make's meta programming capability. The filters are now listed
in a variable and don't have to repeat the path to the headers files
as this is added later as needed.

Signed-off-by: Anthony PERARD <anthony.perard@citrix.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
---

Notes:
    v10:
    - acked
    
    v9:
    - reorder *-headers variables
    - call public-filter-headers on $(public-c99-headers) as well, for this I
      needed to rework $(public-c99-headers) and $(public-ansi-headers-filter)
    
    v8:
    - add prefix "public-" to newly introduced macros.
    - make use of the new "$(srcdir)" shortcut.

 xen/include/Makefile | 23 ++++++++++++++++++-----
 1 file changed, 18 insertions(+), 5 deletions(-)

diff --git a/xen/include/Makefile b/xen/include/Makefile
index 5a2b4c9f65fa..fddf5a575bf6 100644
--- a/xen/include/Makefile
+++ b/xen/include/Makefile
@@ -39,8 +39,8 @@ cppflags-$(CONFIG_X86)    += -m32
 
 endif
 
-public-$(CONFIG_X86) := $(wildcard $(src)/public/arch-x86/*.h $(src)/public/arch-x86/*/*.h)
-public-$(CONFIG_ARM) := $(wildcard $(src)/public/arch-arm/*.h $(src)/public/arch-arm/*/*.h)
+public-$(CONFIG_X86) := $(wildcard $(srcdir)/public/arch-x86/*.h $(srcdir)/public/arch-x86/*/*.h)
+public-$(CONFIG_ARM) := $(wildcard $(srcdir)/public/arch-arm/*.h $(srcdir)/public/arch-arm/*/*.h)
 
 .PHONY: all
 all: $(addprefix $(obj)/,$(headers-y))
@@ -81,10 +81,23 @@ ifeq ($(XEN_TARGET_ARCH),$(XEN_COMPILE_ARCH))
 
 all: $(obj)/headers.chk $(obj)/headers99.chk $(obj)/headers++.chk
 
-PUBLIC_HEADERS := $(filter-out $(src)/public/arch-% $(src)/public/dom0_ops.h, $(wildcard $(src)/public/*.h $(src)/public/*/*.h) $(public-y))
+public-hdrs-path := $(srcdir)/public
 
-PUBLIC_C99_HEADERS := $(src)/public/io/9pfs.h $(src)/public/io/pvcalls.h
-PUBLIC_ANSI_HEADERS := $(filter-out $(src)/public/%ctl.h $(src)/public/xsm/% $(src)/public/%hvm/save.h $(PUBLIC_C99_HEADERS), $(PUBLIC_HEADERS))
+public-list-headers = $(wildcard $1/*.h $1/*/*.h)
+public-filter-headers = $(filter-out $(addprefix $(public-hdrs-path)/, $($1-filter)), $($1))
+
+public-headers := $(call public-list-headers, $(public-hdrs-path)) $(public-y)
+public-ansi-headers := $(public-headers)
+public-c99-headers := $(addprefix $(public-hdrs-path)/, io/9pfs.h io/pvcalls.h)
+
+public-headers-filter := dom0_ops.h arch-%
+public-ansi-headers-filter := %ctl.h xsm/% %hvm/save.h $(public-headers-filter) \
+    $(patsubst $(public-hdrs-path)/%,%,$(public-c99-headers))
+public-c99-headers-filter :=
+
+PUBLIC_HEADERS := $(call public-filter-headers,public-headers)
+PUBLIC_ANSI_HEADERS := $(call public-filter-headers,public-ansi-headers)
+PUBLIC_C99_HEADERS := $(call public-filter-headers,public-c99-headers)
 
 $(src)/public/io/9pfs.h-prereq := string
 $(src)/public/io/pvcalls.h-prereq := string
-- 
Anthony PERARD



From xen-devel-bounces@lists.xenproject.org Tue Mar 22 11:23:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 11:23:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293380.498430 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWcbM-0003O7-Dw; Tue, 22 Mar 2022 11:23:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293380.498430; Tue, 22 Mar 2022 11:23:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWcbM-0003NY-8r; Tue, 22 Mar 2022 11:23:00 +0000
Received: by outflank-mailman (input) for mailman id 293380;
 Tue, 22 Mar 2022 11:22:58 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wGTH=UB=citrix.com=prvs=07349bdb1=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nWcbK-0001wJ-Fa
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 11:22:58 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 6bd3e32a-a9d2-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 12:22:57 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6bd3e32a-a9d2-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647948177;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=R0zm3Y05bQJeOGXKAYJjvGWdLoPynE+nukJHSpmCtbU=;
  b=V1qMucPUrWLjwSFhJhVLV9YIB67BIRugfgLMkHTa5ilXTv3897QzFjpY
   ApgNbUwXoZ0SOOP7+6H8eRD945ByvOnDguhysq50REFg1ji1H/rUQhiNg
   i1Nk8Ju2mXdc64LAwWIHnbI0/ubtBP+YHwC3jbHjzlUlCUKblNiXgsga5
   8=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 69219510
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:RtEwra59ti4SouPIcWGPvgxRtBXHchMFZxGqfqrLsTDasY5as4F+v
 mofXm3SM/vZN2X0Koh2YN/l/U4AuZPcxodhGQJp/ygzHi5G8cbLO4+Ufxz6V8+wwmwvb67FA
 +E2MISowBUcFyeEzvuVGuG96yE6j8lkf5KkYAL+EnkZqTRMFWFw0XqPp8Zj2tQy2YPjWVvX0
 T/Pi5a31GGNimYc3l08s8pvmDs31BglkGpF1rCWTakjUG72zxH5PrpGTU2CByKQrr1vNvy7X
 47+IISRpQs1yfuP5uSNyd4XemVSKlLb0JPnZnB+A8BOiTAazsA+PzpS2FPxpi67hh3Q9+2dx
 umhurT3FyQ2EbzPqt85XkADEHtsH4Z85ZnYdC3XXcy7lyUqclPpyvRqSko3IZcZ6qB8BmQmG
 f4wcW5XKErZ3qTvnez9GrIEascLdaEHOKsWvG1gyjfIS+4rW5nZT43B5MNC3Sd2jcdLdRrbT
 5RIM2M+MU2YC/FJEklIC8kxhviXukilWTx7t1jW+Jg5slGGmWSd15CyaYGIK7RmX/59hV2Er
 2jL+2D4BBAyN9GFzzeBtHW2iYfngifTSI8UUrqi+ZZCgkCXx2EVIA0bUx28u/bRol6zXZdTJ
 lIZ/gIqrLMu7wq7Q9/lRRq6rXWY+BkGVLJ4Eec39QWMwar8+BuCCy4PSTspVTA9nJZoH3pwj
 AbPxo63Q2w02FGIdZ6D3vDKjiydKCsnFksPPHQHFxknyOP+hp5m23ojUe1fOKKyi9T0HxT5z
 DaLsDUyit0vsCIb60mo1QuZ2mzx//AlWiZwv1yKBTz9smuVcab/P+SVBU7nAeGsxWpzZn2Ip
 zA6lseX94ji5rndxXXWEI3h8FxEjstp0QEwY3YyRvHNFBz3ohZPmLy8Bhkkfy+F1e5eJVfUj
 Lf741852XOqFCLCgVVLS4ywEd826qPrCM7oUPvZBvIXPMQuJF/YoX4/PxDNt4wIrKTKuftjU
 Xt8WZzxZUv29Iw9lGbmLwvj+eFDKt8CKZP7GsmgkkXPPUu2b3+JU7YVWGZinchihJ5oVD79q
 o4FX+PTkk03eLSnPkH/rN5CRXhXfCNTLc2n9KRqmhurf1MO9JcJUKSKn9vMuuVNwsxoqws/1
 irkCxEClwan2yGvxMfjQikLVY4DlK1X9RoTVRHA937ys5T/Se5DNJsiSqY=
IronPort-HdrOrdr: A9a23:DnSDdqnEl1esVc5er5N7tKYaip3pDfIm3DAbv31ZSRFFG/Fxl6
 iV88jzsiWE7Qr5OUtQ/uxoV5PgfZqxz/NICOoqTNWftWvd2FdARbsKheCJ/9SJIVybygc378
 ldmsZFZOEYdWIK7vrH3A==
X-IronPort-AV: E=Sophos;i="5.90,201,1643691600"; 
   d="scan'208";a="69219510"
From: Anthony PERARD <anthony.perard@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Anthony PERARD <anthony.perard@citrix.com>, Jan Beulich
	<jbeulich@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Wei Liu <wl@xen.org>
Subject: [XEN PATCH v10 5/7] build: specify source tree in include/ for prerequisite
Date: Tue, 22 Mar 2022 11:22:36 +0000
Message-ID: <20220322112238.1117737-6-anthony.perard@citrix.com>
X-Mailer: git-send-email 2.35.1
In-Reply-To: <20220322112238.1117737-1-anthony.perard@citrix.com>
References: <20220322112238.1117737-1-anthony.perard@citrix.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain

When doing an out-of-tree build, and thus setting VPATH,
GNU Make 3.81 on Ubuntu Trusty complains about Circular dependency of
include/Makefile and include/xlat.lst and drop them. The build fails
later due to headers malformed.

This might be due to bug #13529
    "Incorrect circular dependancy"
    https://savannah.gnu.org/bugs/?13529
which was fixed in 3.82.

Signed-off-by: Anthony PERARD <anthony.perard@citrix.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
---

Notes:
    v10:
    - acked
    
    v9:
    - add potential bug report link in commit message
    
    v8:
    - make use of the new "$(srcdir)" shortcut
    - move the patch ahead of the problematic patch:
        build: adding out-of-tree support to the xen build

 xen/include/Makefile | 18 +++++++++---------
 1 file changed, 9 insertions(+), 9 deletions(-)

diff --git a/xen/include/Makefile b/xen/include/Makefile
index fddf5a575bf6..c8c4bcd93bd3 100644
--- a/xen/include/Makefile
+++ b/xen/include/Makefile
@@ -45,19 +45,19 @@ public-$(CONFIG_ARM) := $(wildcard $(srcdir)/public/arch-arm/*.h $(srcdir)/publi
 .PHONY: all
 all: $(addprefix $(obj)/,$(headers-y))
 
-$(obj)/compat/%.h: $(obj)/compat/%.i $(src)/Makefile $(srctree)/tools/compat-build-header.py
+$(obj)/compat/%.h: $(obj)/compat/%.i $(srcdir)/Makefile $(srctree)/tools/compat-build-header.py
 	$(PYTHON) $(srctree)/tools/compat-build-header.py <$< $(patsubst $(obj)/%,%,$@) >>$@.new; \
 	mv -f $@.new $@
 
-$(obj)/compat/%.i: $(obj)/compat/%.c $(src)/Makefile
+$(obj)/compat/%.i: $(obj)/compat/%.c $(srcdir)/Makefile
 	$(CPP) $(filter-out -Wa$(comma)% -include %/include/xen/config.h,$(XEN_CFLAGS)) $(cppflags-y) -o $@ $<
 
-$(obj)/compat/%.c: $(src)/public/%.h $(src)/xlat.lst $(src)/Makefile $(srctree)/tools/compat-build-source.py
+$(obj)/compat/%.c: $(src)/public/%.h $(srcdir)/xlat.lst $(srcdir)/Makefile $(srctree)/tools/compat-build-source.py
 	mkdir -p $(@D)
 	$(PYTHON) $(srctree)/tools/compat-build-source.py $(srcdir)/xlat.lst <$< >$@.new
 	mv -f $@.new $@
 
-$(obj)/compat/.xlat/%.h: $(obj)/compat/%.h $(obj)/compat/.xlat/%.lst $(srctree)/tools/get-fields.sh $(src)/Makefile
+$(obj)/compat/.xlat/%.h: $(obj)/compat/%.h $(obj)/compat/.xlat/%.lst $(srctree)/tools/get-fields.sh $(srcdir)/Makefile
 	export PYTHON=$(PYTHON); \
 	while read what name; do \
 		$(SHELL) $(srctree)/tools/get-fields.sh "$$what" compat_$$name $< || exit $$?; \
@@ -65,7 +65,7 @@ $(obj)/compat/.xlat/%.h: $(obj)/compat/%.h $(obj)/compat/.xlat/%.lst $(srctree)/
 	mv -f $@.new $@
 
 .PRECIOUS: $(obj)/compat/.xlat/%.lst
-$(obj)/compat/.xlat/%.lst: $(src)/xlat.lst $(src)/Makefile
+$(obj)/compat/.xlat/%.lst: $(srcdir)/xlat.lst $(srcdir)/Makefile
 	mkdir -p $(@D)
 	grep -v '^[[:blank:]]*#' $< | sed -ne 's,@arch@,$(compat-arch-y),g' -re 's,[[:blank:]]+$*\.h[[:blank:]]*$$,,p' >$@.new
 	$(call move-if-changed,$@.new,$@)
@@ -73,7 +73,7 @@ $(obj)/compat/.xlat/%.lst: $(src)/xlat.lst $(src)/Makefile
 xlat-y := $(shell sed -ne 's,@arch@,$(compat-arch-y),g' -re 's,^[?!][[:blank:]]+[^[:blank:]]+[[:blank:]]+,,p' $(srcdir)/xlat.lst | uniq)
 xlat-y := $(filter $(patsubst compat/%,%,$(headers-y)),$(xlat-y))
 
-$(obj)/compat/xlat.h: $(addprefix $(obj)/compat/.xlat/,$(xlat-y)) $(obj)/config/auto.conf $(src)/Makefile
+$(obj)/compat/xlat.h: $(addprefix $(obj)/compat/.xlat/,$(xlat-y)) $(obj)/config/auto.conf $(srcdir)/Makefile
 	cat $(filter %.h,$^) >$@.new
 	mv -f $@.new $@
 
@@ -102,7 +102,7 @@ PUBLIC_C99_HEADERS := $(call public-filter-headers,public-c99-headers)
 $(src)/public/io/9pfs.h-prereq := string
 $(src)/public/io/pvcalls.h-prereq := string
 
-$(obj)/headers.chk: $(PUBLIC_ANSI_HEADERS) $(src)/Makefile
+$(obj)/headers.chk: $(PUBLIC_ANSI_HEADERS) $(srcdir)/Makefile
 	for i in $(filter %.h,$^); do \
 	    $(CC) -x c -ansi -Wall -Werror -include stdint.h \
 	          -S -o /dev/null $$i || exit 1; \
@@ -110,7 +110,7 @@ $(obj)/headers.chk: $(PUBLIC_ANSI_HEADERS) $(src)/Makefile
 	done >$@.new
 	mv $@.new $@
 
-$(obj)/headers99.chk: $(PUBLIC_C99_HEADERS) $(src)/Makefile
+$(obj)/headers99.chk: $(PUBLIC_C99_HEADERS) $(srcdir)/Makefile
 	rm -f $@.new
 	$(foreach i, $(filter %.h,$^),                                        \
 	    echo "#include "\"$(i)\"                                          \
@@ -120,7 +120,7 @@ $(obj)/headers99.chk: $(PUBLIC_C99_HEADERS) $(src)/Makefile
 	    || exit $$?; echo $(i) >> $@.new;)
 	mv $@.new $@
 
-$(obj)/headers++.chk: $(PUBLIC_HEADERS) $(src)/Makefile
+$(obj)/headers++.chk: $(PUBLIC_HEADERS) $(srcdir)/Makefile
 	rm -f $@.new
 	if ! $(CXX) -v >/dev/null 2>&1; then                                  \
 	    touch $@.new;                                                     \
-- 
Anthony PERARD



From xen-devel-bounces@lists.xenproject.org Tue Mar 22 11:23:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 11:23:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293381.498441 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWcbO-0003oW-Tt; Tue, 22 Mar 2022 11:23:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293381.498441; Tue, 22 Mar 2022 11:23:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWcbO-0003oC-Om; Tue, 22 Mar 2022 11:23:02 +0000
Received: by outflank-mailman (input) for mailman id 293381;
 Tue, 22 Mar 2022 11:23:00 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wGTH=UB=citrix.com=prvs=07349bdb1=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nWcbM-0001pm-FX
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 11:23:00 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6cd33d40-a9d2-11ec-a405-831a346695d4;
 Tue, 22 Mar 2022 12:22:59 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6cd33d40-a9d2-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647948179;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=PmhrQkgIv1T+ZSzGTSleStlqC/GW0kKEBuZmpFtrCLE=;
  b=ej+KmAEynk6+nDQdeTEDJcDGq1Qw71mRAq6ORUCYmqKupx8G3YnwIDI9
   Ph6/QGRZKsvPAebkk4YrV5f0DT5MSgYLKweNdah6ykqdOLZ4DjQ+wbiPs
   WoQqgjwy9PKcw4w2aA891QFj1+uKr5+kgnOy2dWm+h+TFbr29+pUQTDXC
   I=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 66766639
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:PWe3MqkCYIVnJ1guWqpXd43o5gysJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xIWXmvVaPeMYmb8LYxyPt6x9EsDuJTXmoVmTgdk/H0xFSMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiWVnV4
 7senuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYey0WAZTCsu4mYgh7LDFhO/0Z/vjWPi3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3s3d8zTbfHLA+TIrKWani7t5ExjYgwMtJGJ4yY
 uJHN2UxMkqbMnWjPH8UGpMEvaD4mEWlfjobuAyyp64ssmzMmVkZPL/Fb4OOJ43iqd9utl2Du
 mvM8mD9AxcbHN+S0zyI9jSrnOCntTz/cJIfEvu/7PECqF+Owm0eDjUGWF39puO24mauVtQaJ
 0EK9y4Gqakp6FftXtT7Rwe/onOPolgbQdU4O+8w5RyJy6HUyx2EHWVCRTlEAOHKr+dvG2Zsj
 AXQ2Yq0W3o/69V5VE5x6J+mhwyNACY/J1QzdAw7XRQDs4bl55As20enoslYLIa5idj8GDfVy
 j+MrTQji7h7sfPnx5lX7nic3Wvy+8Ghohodo1yOAzn7tl8RiJuNPdTA1LTN0RpXwG91pHGlt
 WNMpcWR5ftm4XqlxH3UG7Vl8F1ECp+43NzgbbxHQsBJG9eFoSfLkWVsDNdWfhwB3iEsI2OBX
 aMrkVkNjKK/xVPzBUONX6q/Ct4x0Y/rHsn/W/bfY7JmO8YtK1/Xo3wxNBTOgggBdXTAd4llZ
 f93lu72UB4n5VlPlmLqF4/xL5d1rszB+Y8jbc+ilEn2uVZvTHWUVa0EIDOzghMRt8u5TPHu2
 48HbaOikkwHOMWnO3W/2dNDfDgicClgbbir+pM/SwJ2Clc/cI3XI6SKmu1Jlk0Mt/k9q9okC
 VnmAx4GkgWj3SObQehIA1g6AI7SsV9EhSpTFUQR0ZyAghDPva7HAH8jSqYK
IronPort-HdrOrdr: A9a23:MtDF9qk6WroXsGCSFTKQVgiSHd3pDfIU3DAbv31ZSRFFG/Fxl6
 iV8sjzsiWE7gr5OUtQ4exoV5PhfZqxz/JICMwqTNKftWrdyQyVxeNZnOjfKlTbckWUnINgPO
 VbAsxD4bXLfCFHZK3BgTVQfexO/DD+ytHLudvj
X-IronPort-AV: E=Sophos;i="5.90,201,1643691600"; 
   d="scan'208";a="66766639"
From: Anthony PERARD <anthony.perard@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Anthony PERARD <anthony.perard@citrix.com>, Jan Beulich
	<jbeulich@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Wei Liu <wl@xen.org>
Subject: [XEN PATCH v10 6/7] build: shuffle main Makefile
Date: Tue, 22 Mar 2022 11:22:37 +0000
Message-ID: <20220322112238.1117737-7-anthony.perard@citrix.com>
X-Mailer: git-send-email 2.35.1
In-Reply-To: <20220322112238.1117737-1-anthony.perard@citrix.com>
References: <20220322112238.1117737-1-anthony.perard@citrix.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain

Reorganize a bit the Makefile ahead of patch
"build: adding out-of-tree support to the xen build"

We are going to want to calculate all the $(*srctree) and $(*objtree)
once, when we can calculate them. This can happen within the
"$(root-make-done)" guard, in an out-of-tree build scenario, so move
those variable there.

$(XEN_ROOT) is going to depends on the value of $(abs_srctree) so
needs to move as well. "Kbuild.include" also depends on $(srctree).

Next, "Config.mk" depends on $(XEN_ROOT) and $(TARGET_*ARCH) depends
on "Config.mk" so those needs to move as well.

This should only be code movement without functional changes.

Signed-off-by: Anthony PERARD <anthony.perard@citrix.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
---

Notes:
    v10:
    - acked
    
    v9:
    - add some explanation in the commit message about why the code movement
      is needed.
    
    v8:
    - new patch

 xen/Makefile | 46 +++++++++++++++++++++++-----------------------
 1 file changed, 23 insertions(+), 23 deletions(-)

diff --git a/xen/Makefile b/xen/Makefile
index b89db5e8ab37..889d91c68a42 100644
--- a/xen/Makefile
+++ b/xen/Makefile
@@ -19,17 +19,6 @@ export PYTHON		?= $(PYTHON_INTERPRETER)
 
 export CHECKPOLICY	?= checkpolicy
 
-export XEN_ROOT := $(CURDIR)/..
-
-abs_objtree := $(CURDIR)
-abs_srctree := $(CURDIR)
-
-export abs_srctree abs_objtree
-
-srctree := .
-objtree := .
-export srctree objtree
-
 # Do not use make's built-in rules and variables
 MAKEFLAGS += -rR
 
@@ -41,16 +30,6 @@ SRCARCH=$(shell echo $(ARCH) | \
               -e s'/riscv.*/riscv/g')
 export ARCH SRCARCH
 
-# Don't break if the build process wasn't called from the top level
-# we need XEN_TARGET_ARCH to generate the proper config
-include $(XEN_ROOT)/Config.mk
-
-# Set ARCH/SUBARCH appropriately.
-export TARGET_SUBARCH  := $(XEN_TARGET_ARCH)
-export TARGET_ARCH     := $(shell echo $(XEN_TARGET_ARCH) | \
-                            sed -e 's/x86.*/x86/' -e s'/arm\(32\|64\)/arm/g' \
-                                -e s'/riscv.*/riscv/g')
-
 # Allow someone to change their config file
 export KCONFIG_CONFIG ?= .config
 
@@ -64,8 +43,6 @@ default: build
 .PHONY: dist
 dist: install
 
-include scripts/Kbuild.include
-
 ifneq ($(root-make-done),y)
 # section to run before calling Rules.mk, but only once.
 
@@ -141,6 +118,17 @@ endif
 
 export quiet Q KBUILD_VERBOSE
 
+abs_objtree := $(CURDIR)
+abs_srctree := $(CURDIR)
+
+export abs_srctree abs_objtree
+
+srctree := .
+objtree := .
+export srctree objtree
+
+export XEN_ROOT := $(CURDIR)/..
+
 # To make sure we do not include .config for any of the *config targets
 # catch them early, and hand them over to tools/kconfig/Makefile
 
@@ -163,6 +151,18 @@ ifneq ($(filter %config,$(MAKECMDGOALS)),)
     config-build := y
 endif
 
+include scripts/Kbuild.include
+
+# Don't break if the build process wasn't called from the top level
+# we need XEN_TARGET_ARCH to generate the proper config
+include $(XEN_ROOT)/Config.mk
+
+# Set ARCH/SUBARCH appropriately.
+export TARGET_SUBARCH  := $(XEN_TARGET_ARCH)
+export TARGET_ARCH     := $(shell echo $(XEN_TARGET_ARCH) | \
+                            sed -e 's/x86.*/x86/' -e s'/arm\(32\|64\)/arm/g' \
+                                -e s'/riscv.*/riscv/g')
+
 export CONFIG_SHELL := $(SHELL)
 export YACC = $(if $(BISON),$(BISON),bison)
 export LEX = $(if $(FLEX),$(FLEX),flex)
-- 
Anthony PERARD



From xen-devel-bounces@lists.xenproject.org Tue Mar 22 11:23:05 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 11:23:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293383.498452 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWcbR-0004HA-CS; Tue, 22 Mar 2022 11:23:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293383.498452; Tue, 22 Mar 2022 11:23:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWcbR-0004Gu-7O; Tue, 22 Mar 2022 11:23:05 +0000
Received: by outflank-mailman (input) for mailman id 293383;
 Tue, 22 Mar 2022 11:23:03 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wGTH=UB=citrix.com=prvs=07349bdb1=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nWcbP-0001pm-F7
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 11:23:03 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6ee55da6-a9d2-11ec-a405-831a346695d4;
 Tue, 22 Mar 2022 12:23:01 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6ee55da6-a9d2-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647948181;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=7EuDIVgX0pirkg3sBr2XMOrnL0KxHz4Ebez1+VopRO4=;
  b=bhavVLt6O0+wx2PmQLT730Q8A8TJeXiRJ7nE9XZeLaTL3yIWkswa2Sep
   rqENQr69GW3q065y6Agkw4X71lT4ptLDgfvCRlxhF8TfmSQ2nDHZKKzkP
   w3HV6GVhcSEZ9Ioo0j8HFugeHfXQKSdy9zEC6RUJydL33FWpS5GSOioKV
   0=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 66766645
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:3l8ZSqIl0IsAcH3kFE+RXJUlxSXFcZb7ZxGr2PjKsXjdYENS0jAHz
 WYdW2vVafvZYWT0Ld1yOdu/phlU7JKEzd81SAtlqX01Q3x08seUXt7xwmUcns+xwm8vaGo9s
 q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUYYoAQgsA148IMsdoUg7wbRh2dQy2YLR7z6l4
 rseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3fMldG0DQUIhMdtNWc
 s6YpF2PEsE1yD92Yj+tuu6TnkTn2dc+NyDW4pZdc/DKbhSvOkXee0v0XRYRQR4/ttmHozx+4
 PVO5cOWUUArB5TryeYScRRDED90bYQTrdcrIVDn2SCS50jPcn+qyPRyFkAme4Yf/46bA0kXq
 6ZecmpUKEne2aTmm9pXScE17ignBMDtIIMYvGAm1TzDBOwqaZvCX7/L9ZlT2zJYasVmQ6iBO
 ZRHNWcHgBLoZDFzeXBNNrAElb2YhlaubHp7pQy+uv9ii4TU5FMoi+W8WDbPQfSVQe1Fk0Deo
 XjJl0ziGQ0TPtGbzTuD81qvi/XJkCe9X5gdfJW0+fJnj0ea7nACAx0RE12gqL+2jVDWc9FYL
 VYd9mwxrKwx3EuxR9L5Uluzp3vslhwBX9tdFcUq5QfLzbDbiy6bDGUZSj9KaPQ9qdQ7Azct0
 zehj97vQDBirrCRYXac7auP6yO/PzAPKm0PbjNCShEKi/Hhr5s6ihbnR9NqAqmzyNbyHFnYz
 yiRqSkih50alcMRy7ig5lfDni6toZ7SCAUy423qsnmNt10jItT/PsrxtAadva0owJulokepn
 HtUxO6Gq+I3NLbcliOvTf4OArv5zqPQWNHDumJHE54k/jWr3nese4FM/T1zTHtU3tY4lSzBO
 xGK514IjHNHFD7zNPIsPdrtYyg/5fK4fekJQMw4eTanjnJZUAactB9jakeLt4wGuBh9yPpvU
 Xt3nCvFMJr7NUiF5GfvLwv++eVyrszb+Y81bcqgp/hA+eDCDEN5sZ9fbDOzghkRtctoWjn9/
 ddFLNetwB5CSuD4aSS/2ddNcQ9afSdmWsGs9ZE/mgu/zuxOQj1J5xj5m+5JRmCYt/4NyregE
 o+VBCe0N2YTdVWYcF7XOxiPmZvkXIplrGJTAMDfFQ3A5pTXWq72tP13X8JuJdEPrbU/pdYpH
 6htU5jRWZxnF2WYkwnxmLGg9eSOgjzw3lnQV8dkCRBiF6Ndq/vhoYa1IFGwqHFQUkJad6IW+
 tWd6+8SerJbLywKMSocQKvHI4+Z1ZTFpN9PYg==
IronPort-HdrOrdr: A9a23:P/73pq7X6mYPEW0RXgPXwM7XdLJyesId70hD6qhwISY7TiX+rb
 HIoB17726MtN9/YhAdcLy7VZVoBEmsl6KdgrNhWYtKPjOHhILAFugLhuHfKn/bakjDH4ZmpM
 FdmsNFZuEYY2IXsS+D2njaL+od
X-IronPort-AV: E=Sophos;i="5.90,201,1643691600"; 
   d="scan'208";a="66766645"
From: Anthony PERARD <anthony.perard@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Anthony PERARD <anthony.perard@citrix.com>, Jan Beulich
	<jbeulich@suse.com>, "Daniel P . Smith" <dpsmith@apertussolutions.com>,
	Julien Grall <jgrall@amazon.com>, Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>, "Konrad
 Rzeszutek Wilk" <konrad.wilk@oracle.com>, Ross Lagerwall
	<ross.lagerwall@citrix.com>, Daniel De Graaf <dgdegra@tycho.nsa.gov>
Subject: [XEN PATCH v10 7/7] build: adding out-of-tree support to the xen build
Date: Tue, 22 Mar 2022 11:22:38 +0000
Message-ID: <20220322112238.1117737-8-anthony.perard@citrix.com>
X-Mailer: git-send-email 2.35.1
In-Reply-To: <20220322112238.1117737-1-anthony.perard@citrix.com>
References: <20220322112238.1117737-1-anthony.perard@citrix.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain

This implement out-of-tree support, there's two ways to create an
out-of-tree build tree (after that, `make` in that new directory
works):
    make O=build
    mkdir build; cd build; make -f ../Makefile
also works with an absolute path for both.

This implementation only works if the source tree is clean, as we use
VPATH.

This patch copies most new code with handling out-of-tree build from
Linux v5.12.

Signed-off-by: Anthony PERARD <anthony.perard@citrix.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Daniel P. Smith <dpsmith@apertussolutions.com>
Acked-by: Julien Grall <jgrall@amazon.com>
Tested-by: Julien Grall <jgrall@amazon.com>
---

Notes:
    v10:
    - rebased
    
    v9:
    - acked
    - add "source -> ." symlink in the in-tree build as well. This allow to
      make relative symlink to the "common/efi/*.c" sources.
    - also now, the "source" symlink is removed on `distclean`, add added to
      .gitignore.
    
    v8:
    - replace script/mkmakefile by cmd_makefile like it's been done in Linux
      5.13.
    - fix GNU Make version, replace few 0.81 by 3.81.
    - reorder include header path in CFLAGS ( -I ), to have the $(objtree)
      paths listed before the $(srctree) paths. This will be usefull later
      if we allow to build out-of-tree from a dirty source tree.
    - make use of -iquote
    - sometime, add -iquote path even when not necessary when building in-tree.
    - extract code movement into a separate patch
    - make use of the new "$(srcdir)" shortcut
    - split command line in headers*.chk target into more lines

 .gitignore                   |   1 +
 xen/Makefile                 | 143 +++++++++++++++++++++++++++++++----
 xen/Rules.mk                 |  11 ++-
 xen/arch/x86/arch.mk         |   5 +-
 xen/arch/x86/boot/Makefile   |   6 ++
 xen/common/efi/efi-common.mk |   3 +-
 xen/include/Makefile         |  11 ++-
 xen/test/livepatch/Makefile  |   2 +
 xen/xsm/flask/Makefile       |   3 +-
 xen/xsm/flask/ss/Makefile    |   1 +
 10 files changed, 164 insertions(+), 22 deletions(-)

diff --git a/.gitignore b/.gitignore
index d425be4bd9d7..c6d2c4b4f1e9 100644
--- a/.gitignore
+++ b/.gitignore
@@ -325,6 +325,7 @@ xen/include/xen/*.new
 xen/include/xen/acm_policy.h
 xen/include/xen/compile.h
 xen/include/xen/lib/x86/cpuid-autogen.h
+xen/source
 xen/test/livepatch/config.h
 xen/test/livepatch/expect_config.h
 xen/test/livepatch/*.livepatch
diff --git a/xen/Makefile b/xen/Makefile
index 889d91c68a42..11057318e875 100644
--- a/xen/Makefile
+++ b/xen/Makefile
@@ -1,3 +1,7 @@
+# $(lastword,) for GNU Make older than 3.81
+lastword = $(word $(words $(1)),$(1))
+this-makefile := $(call lastword,$(MAKEFILE_LIST))
+
 # This is the correct place to edit the build version.
 # All other places this is stored (eg. compile.h) should be autogenerated.
 export XEN_VERSION       = 4
@@ -19,6 +23,13 @@ export PYTHON		?= $(PYTHON_INTERPRETER)
 
 export CHECKPOLICY	?= checkpolicy
 
+$(if $(filter __%, $(MAKECMDGOALS)), \
+    $(error targets prefixed with '__' are only for internal use))
+
+# That's our default target when none is given on the command line
+PHONY := __all
+__all:
+
 # Do not use make's built-in rules and variables
 MAKEFLAGS += -rR
 
@@ -37,9 +48,6 @@ export CC CXX LD NM OBJCOPY OBJDUMP
 
 export TARGET := xen
 
-.PHONY: default
-default: build
-
 .PHONY: dist
 dist: install
 
@@ -118,16 +126,88 @@ endif
 
 export quiet Q KBUILD_VERBOSE
 
+# $(realpath,) for GNU Make older than 3.81
+realpath = $(wildcard $(foreach file,$(1),$(shell cd -P $(dir $(file)) && echo "$$PWD/$(notdir $(file))")))
+
+ifeq ("$(origin O)", "command line")
+    KBUILD_OUTPUT := $(O)
+endif
+
+ifneq ($(KBUILD_OUTPUT),)
+# Make's built-in functions such as $(abspath ...), $(realpath ...) cannot
+# expand a shell special character '~'. We use a somewhat tedious way here.
+abs_objtree := $(shell mkdir -p $(KBUILD_OUTPUT) && cd $(KBUILD_OUTPUT) && pwd)
+$(if $(abs_objtree),, \
+     $(error failed to create output directory "$(KBUILD_OUTPUT)"))
+
+# $(realpath ...) resolves symlinks
+abs_objtree := $(call realpath,$(abs_objtree))
+else
 abs_objtree := $(CURDIR)
-abs_srctree := $(CURDIR)
+endif
+
+ifeq ($(abs_objtree),$(CURDIR))
+# Suppress "Entering directory ..." unless we are changing the work directory.
+MAKEFLAGS += --no-print-directory
+else
+need-sub-make := 1
+endif
+
+abs_srctree := $(call realpath,$(dir $(this-makefile)))
+
+ifneq ($(words $(subst :, ,$(abs_srctree))), 1)
+$(error source directory cannot contain spaces or colons)
+endif
+
+ifneq ($(abs_srctree),$(abs_objtree))
+# Look for make include files relative to root of kernel src
+#
+# This does not become effective immediately because MAKEFLAGS is re-parsed
+# once after the Makefile is read. We need to invoke sub-make.
+MAKEFLAGS += --include-dir=$(abs_srctree)
+need-sub-make := 1
+endif
 
 export abs_srctree abs_objtree
+export root-make-done := y
+
+ifeq ($(need-sub-make),1)
+
+PHONY += $(MAKECMDGOALS) __sub-make
+
+$(filter-out $(this-makefile), $(MAKECMDGOALS)) __all: __sub-make
+	@:
+
+# Invoke a second make in the output directory, passing relevant variables
+__sub-make:
+	$(Q)$(MAKE) -C $(abs_objtree) -f $(abs_srctree)/Makefile $(MAKECMDGOALS)
+
+endif # need-sub-make
+endif # root-make-done
+
+# We process the rest of the Makefile if this is the final invocation of make
+ifeq ($(need-sub-make),)
+
+ifeq ($(abs_srctree),$(abs_objtree))
+    # building in the source tree
+    srctree := .
+    building_out_of_srctree :=
+else
+    ifeq ($(abs_srctree)/,$(dir $(abs_objtree)))
+        # building in a subdirectory of the source tree
+        srctree := ..
+    else
+        srctree := $(abs_srctree)
+    endif
+    building_out_of_srctree := 1
+endif
 
-srctree := .
 objtree := .
-export srctree objtree
+VPATH := $(srctree)
+
+export building_out_of_srctree srctree objtree VPATH
 
-export XEN_ROOT := $(CURDIR)/..
+export XEN_ROOT := $(abs_srctree)/..
 
 # To make sure we do not include .config for any of the *config targets
 # catch them early, and hand them over to tools/kconfig/Makefile
@@ -204,9 +284,6 @@ endif
 
 export XEN_HAS_CHECKPOLICY := $(call success,$(CHECKPOLICY) -h 2>&1 | grep -q xen)
 
-export root-make-done := y
-endif # root-make-done
-
 # ===========================================================================
 # Rules shared between *config targets and build targets
 
@@ -214,6 +291,37 @@ PHONY += tools_fixdep
 tools_fixdep:
 	$(Q)$(MAKE) $(build)=tools tools/fixdep
 
+PHONY += outputmakefile
+# Before starting out-of-tree build, make sure the source tree is clean.
+# outputmakefile generates a Makefile in the output directory, if using a
+# separate output directory. This allows convenient use of make in the
+# output directory.
+# At the same time when output Makefile generated, generate .gitignore to
+# ignore whole output directory
+
+quiet_cmd_makefile = GEN     Makefile
+cmd_makefile = { \
+    echo "\# Automatically generated by $(srctree)/Makefile: don't edit"; \
+    echo "include $(srctree)/Makefile"; \
+    } > Makefile
+
+outputmakefile:
+	$(Q)ln -fsn $(srctree) source
+ifdef building_out_of_srctree
+	$(Q)if [ -f $(srctree)/.config -o \
+		 -d $(srctree)/include/config -o \
+		 -d $(srctree)/include/generated ]; then \
+		echo >&2 "***"; \
+		echo >&2 "*** The source tree is not clean, please run 'make$(if $(findstring command line, $(origin XEN_TARGET_ARCH)), XEN_TARGET_ARCH=$(XEN_TARGET_ARCH)) distclean'"; \
+		echo >&2 "*** in $(abs_srctree)";\
+		echo >&2 "***"; \
+		false; \
+	fi
+	$(call cmd,makefile)
+	$(Q)test -e .gitignore || \
+	{ echo "# this is build directory, ignore it"; echo "*"; } > .gitignore
+endif
+
 ifeq ($(config-build),y)
 # ===========================================================================
 # *config targets only - make sure prerequisites are updated, and descend
@@ -229,13 +337,13 @@ filechk_kconfig_allconfig = \
 .allconfig.tmp: FORCE
 	set -e; { $(call filechk_kconfig_allconfig); } > $@
 
-config: tools_fixdep FORCE
+config: tools_fixdep outputmakefile FORCE
 	$(Q)$(MAKE) $(build)=tools/kconfig $@
 
 # Config.mk tries to include .config file, don't try to remake it
 %/.config: ;
 
-%config: .allconfig.tmp tools_fixdep FORCE
+%config: .allconfig.tmp tools_fixdep outputmakefile FORCE
 	$(Q)$(MAKE) $(build)=tools/kconfig KCONFIG_ALLCONFIG=$< $@
 
 else # !config-build
@@ -312,6 +420,10 @@ CFLAGS += -flto
 LDFLAGS-$(CONFIG_CC_IS_CLANG) += -plugin LLVMgold.so
 endif
 
+ifdef building_out_of_srctree
+    CFLAGS += -I$(objtree)/include
+    CFLAGS += -I$(objtree)/arch/$(TARGET_ARCH)/include
+endif
 CFLAGS += -I$(srctree)/include
 CFLAGS += -I$(srctree)/arch/$(TARGET_ARCH)/include
 
@@ -335,6 +447,8 @@ export CFLAGS_UBSAN
 
 endif # need-config
 
+__all: build
+
 main-targets := build install uninstall clean distclean MAP
 .PHONY: $(main-targets)
 ifneq ($(XEN_TARGET_ARCH),x86_32)
@@ -431,13 +545,13 @@ _clean:
 
 .PHONY: _distclean
 _distclean: clean
-	rm -f tags TAGS cscope.files cscope.in.out cscope.out cscope.po.out GTAGS GPATH GRTAGS GSYMS .config
+	rm -f tags TAGS cscope.files cscope.in.out cscope.out cscope.po.out GTAGS GPATH GRTAGS GSYMS .config source
 
 $(TARGET).gz: $(TARGET)
 	gzip -n -f -9 < $< > $@.new
 	mv $@.new $@
 
-$(TARGET): FORCE
+$(TARGET): outputmakefile FORCE
 	$(Q)$(MAKE) $(build)=tools
 	$(Q)$(MAKE) $(build)=. include/xen/compile.h
 	$(Q)$(MAKE) $(build)=include all
@@ -506,6 +620,7 @@ cloc:
 	done | cloc --list-file=-
 
 endif #config-build
+endif # need-sub-make
 
 PHONY += FORCE
 FORCE:
diff --git a/xen/Rules.mk b/xen/Rules.mk
index 57a029455586..70b7489ea89b 100644
--- a/xen/Rules.mk
+++ b/xen/Rules.mk
@@ -37,7 +37,7 @@ SPECIAL_DATA_SECTIONS := rodata $(foreach a,1 2 4 8 16, \
                          $(foreach r,rel rel.ro,data.$(r).local)
 
 # The filename build.mk has precedence over Makefile
-include $(firstword $(wildcard $(src)/build.mk) $(src)/Makefile)
+include $(firstword $(wildcard $(srcdir)/build.mk) $(srcdir)/Makefile)
 
 # Linking
 # ---------------------------------------------------------------------------
@@ -328,6 +328,15 @@ existing-targets := $(wildcard $(sort $(targets)))
 
 -include $(foreach f,$(existing-targets),$(dir $(f)).$(notdir $(f)).cmd)
 
+# Create directories for object files if they do not exist
+obj-dirs := $(sort $(patsubst %/,%, $(dir $(targets))))
+# If targets exist, their directories apparently exist. Skip mkdir.
+existing-dirs := $(sort $(patsubst %/,%, $(dir $(existing-targets))))
+obj-dirs := $(strip $(filter-out $(existing-dirs), $(obj-dirs)))
+ifneq ($(obj-dirs),)
+$(shell mkdir -p $(obj-dirs))
+endif
+
 # Declare the contents of the PHONY variable as phony.  We keep that
 # information in a variable so we can use it in if_changed and friends.
 .PHONY: $(PHONY)
diff --git a/xen/arch/x86/arch.mk b/xen/arch/x86/arch.mk
index cfde143053fc..fce2ef5b6732 100644
--- a/xen/arch/x86/arch.mk
+++ b/xen/arch/x86/arch.mk
@@ -77,6 +77,9 @@ ifneq ($(CONFIG_PV_SHIM_EXCLUSIVE),y)
 
 efi-check := arch/x86/efi/check
 
+# Create the directory for out-of-tree build
+$(shell mkdir -p $(dir $(efi-check)))
+
 # Check if the compiler supports the MS ABI.
 XEN_BUILD_EFI := $(call if-success,$(CC) $(CFLAGS) -c $(srctree)/$(efi-check).c -o $(efi-check).o,y)
 
@@ -116,4 +119,4 @@ export EFI_LDFLAGS
 endif
 
 # Set up the assembler include path properly for older toolchains.
-CFLAGS += -Wa,-I$(srctree)/include
+CFLAGS += -Wa,-I$(objtree)/include -Wa,-I$(srctree)/include
diff --git a/xen/arch/x86/boot/Makefile b/xen/arch/x86/boot/Makefile
index ca8001c72b23..784655f5e2bd 100644
--- a/xen/arch/x86/boot/Makefile
+++ b/xen/arch/x86/boot/Makefile
@@ -7,11 +7,17 @@ targets += $(head-srcs:.S=.o)
 
 head-srcs := $(addprefix $(obj)/, $(head-srcs))
 
+ifdef building_out_of_srctree
+$(obj)/head.o: CFLAGS-y += -iquote $(obj)
+endif
 $(obj)/head.o: $(head-srcs)
 
 CFLAGS_x86_32 := $(subst -m64,-m32 -march=i686,$(XEN_TREEWIDE_CFLAGS))
 $(call cc-options-add,CFLAGS_x86_32,CC,$(EMBEDDED_EXTRA_CFLAGS))
 CFLAGS_x86_32 += -Werror -fno-builtin -g0 -msoft-float
+ifdef building_out_of_srctree
+CFLAGS_x86_32 += -I$(objtree)/include
+endif
 CFLAGS_x86_32 += -I$(srctree)/include
 
 # override for 32bit binaries
diff --git a/xen/common/efi/efi-common.mk b/xen/common/efi/efi-common.mk
index 960d44a6d55b..4298ceaee71d 100644
--- a/xen/common/efi/efi-common.mk
+++ b/xen/common/efi/efi-common.mk
@@ -3,12 +3,13 @@ EFIOBJ-$(CONFIG_COMPAT) += compat.o
 
 CFLAGS-y += -fshort-wchar
 CFLAGS-y += -iquote $(srctree)/common/efi
+CFLAGS-y += -iquote $(srcdir)
 
 # Part of the command line transforms $(obj)
 # e.g.: It transforms "dir/foo/bar" into successively
 #       "dir foo bar", ".. .. ..", "../../.."
 $(obj)/%.c: $(srctree)/common/efi/%.c FORCE
-	$(Q)ln -nfs $(subst $(space),/,$(patsubst %,..,$(subst /, ,$(obj))))/common/efi/$(<F) $@
+	$(Q)ln -nfs $(subst $(space),/,$(patsubst %,..,$(subst /, ,$(obj))))/source/common/efi/$(<F) $@
 
 clean-files += $(patsubst %.o, %.c, $(EFIOBJ-y:.init.o=.o) $(EFIOBJ-))
 
diff --git a/xen/include/Makefile b/xen/include/Makefile
index c8c4bcd93bd3..03baf10efb77 100644
--- a/xen/include/Makefile
+++ b/xen/include/Makefile
@@ -115,7 +115,8 @@ $(obj)/headers99.chk: $(PUBLIC_C99_HEADERS) $(srcdir)/Makefile
 	$(foreach i, $(filter %.h,$^),                                        \
 	    echo "#include "\"$(i)\"                                          \
 	    | $(CC) -x c -std=c99 -Wall -Werror                               \
-	      -include stdint.h $(foreach j, $($(i)-prereq), -include $(j).h) \
+	      -include stdint.h                                               \
+	      $(foreach j, $($(patsubst $(srctree)/%,%,$i)-prereq), -include $(j).h) \
 	      -S -o /dev/null -                                               \
 	    || exit $$?; echo $(i) >> $@.new;)
 	mv $@.new $@
@@ -129,8 +130,9 @@ $(obj)/headers++.chk: $(PUBLIC_HEADERS) $(srcdir)/Makefile
 	$(foreach i, $(filter %.h,$^),                                        \
 	    echo "#include "\"$(i)\"                                          \
 	    | $(CXX) -x c++ -std=gnu++98 -Wall -Werror -D__XEN_TOOLS__        \
-	      -include stdint.h -include $(src)/public/xen.h                  \
-	      $(foreach j, $($(i)-prereq), -include c$(j)) -S -o /dev/null -  \
+	      -include stdint.h -include $(srcdir)/public/xen.h               \
+	      $(foreach j, $($(patsubst $(srctree)/%,%,$i)-prereq), -include c$(j)) \
+	      -S -o /dev/null -                                               \
 	    || exit $$?; echo $(i) >> $@.new;)
 	mv $@.new $@
 
@@ -139,7 +141,8 @@ endif
 ifeq ($(XEN_TARGET_ARCH),x86_64)
 .PHONY: lib-x86-all
 lib-x86-all:
-	$(MAKE) -C $(obj)/xen/lib/x86 all
+	@mkdir -p $(obj)/xen/lib/x86
+	$(MAKE) -C $(obj)/xen/lib/x86 -f $(abs_srctree)/$(src)/xen/lib/x86/Makefile all
 
 all: lib-x86-all
 endif
diff --git a/xen/test/livepatch/Makefile b/xen/test/livepatch/Makefile
index ddb07371315e..c258ab0b5940 100644
--- a/xen/test/livepatch/Makefile
+++ b/xen/test/livepatch/Makefile
@@ -11,6 +11,8 @@ endif
 CODE_ADDR=$(shell nm --defined $(1) | grep $(2) | awk '{print "0x"$$1}')
 CODE_SZ=$(shell nm --defined -S $(1) | grep $(2) | awk '{ print "0x"$$2}')
 
+CFLAGS-y += -iquote $(obj)
+
 extra-y += xen_hello_world.livepatch
 xen_hello_world-objs := xen_hello_world_func.o xen_hello_world.o note.o xen_note.o modinfo.o
 $(obj)/xen_hello_world.o: $(obj)/config.h
diff --git a/xen/xsm/flask/Makefile b/xen/xsm/flask/Makefile
index a99038cb5722..d25312f4fa1c 100644
--- a/xen/xsm/flask/Makefile
+++ b/xen/xsm/flask/Makefile
@@ -4,7 +4,8 @@ obj-y += flask_op.o
 
 obj-y += ss/
 
-CFLAGS-y += -I$(obj)/include
+CFLAGS-y += -iquote $(obj)/include
+CFLAGS-y += -I$(srcdir)/include
 
 AWK = awk
 
diff --git a/xen/xsm/flask/ss/Makefile b/xen/xsm/flask/ss/Makefile
index aba1339f3808..ffe92ec19ed6 100644
--- a/xen/xsm/flask/ss/Makefile
+++ b/xen/xsm/flask/ss/Makefile
@@ -8,4 +8,5 @@ obj-y += services.o
 obj-y += conditional.o
 obj-y += mls.o
 
+CFLAGS-y += -iquote $(objtree)/xsm/flask/include
 CFLAGS-y += -I$(srctree)/xsm/flask/include
-- 
Anthony PERARD



From xen-devel-bounces@lists.xenproject.org Tue Mar 22 12:07:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 12:07:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293418.498473 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWdI2-0002pg-4Q; Tue, 22 Mar 2022 12:07:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293418.498473; Tue, 22 Mar 2022 12:07:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWdI2-0002pZ-1E; Tue, 22 Mar 2022 12:07:06 +0000
Received: by outflank-mailman (input) for mailman id 293418;
 Tue, 22 Mar 2022 12:07:05 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Ed4I=UB=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nWdI1-0002pT-Ct
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 12:07:05 +0000
Received: from NAM04-DM6-obe.outbound.protection.outlook.com
 (mail-dm6nam08on20618.outbound.protection.outlook.com
 [2a01:111:f400:7e8b::618])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 95574477-a9d8-11ec-a405-831a346695d4;
 Tue, 22 Mar 2022 13:07:03 +0100 (CET)
Received: from BN8PR04CA0003.namprd04.prod.outlook.com (2603:10b6:408:70::16)
 by DM6PR02MB5180.namprd02.prod.outlook.com (2603:10b6:5:4e::17) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.19; Tue, 22 Mar
 2022 12:07:00 +0000
Received: from BN1NAM02FT029.eop-nam02.prod.protection.outlook.com
 (2603:10b6:408:70:cafe::38) by BN8PR04CA0003.outlook.office365.com
 (2603:10b6:408:70::16) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.21 via Frontend
 Transport; Tue, 22 Mar 2022 12:07:00 +0000
Received: from xir-pvapexch02.xlnx.xilinx.com (149.199.80.198) by
 BN1NAM02FT029.mail.protection.outlook.com (10.13.2.143) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5081.14 via Frontend Transport; Tue, 22 Mar 2022 12:07:00 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) by
 xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 22 Mar 2022 12:06:59 +0000
Received: from smtp.xilinx.com (172.21.105.198) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 22 Mar 2022 12:06:59 +0000
Received: from [10.71.116.34] (port=58291)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nWdHu-0003Ck-Su; Tue, 22 Mar 2022 12:06:58 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 95574477-a9d8-11ec-a405-831a346695d4
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=N/obHxIqCpteJ7J9dkCIfGKj5fqHFLRTSDR3llYGSsi3Olf5g1adV3PS8OlBIJlyTB0i3tXH50rt9O4tuQ7s+tLHkIJeBDsFaJ3HE3mlw/n93w8Ap2FCNXQqg3nEbX+DAwXErsN6EIADD2QLJKBB43Z04MMjVmOv0tSRE10hNotG0n8/Csy2Rz794Gb8Xx5mSy3eK7N+pLaIYEomfbM9Ekdzc+zFAFMrD7C2Esl8biljPuvBVOzlhegwIKj46Rqciw+kyKkVX+5KFN1+PNDfudr95wzeQ/jYVHi72PtDFA7PuDSghq8SU9FsWn8JrpAtaHzkWx1oZYouVvXKZSHT4w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=9reWh0nBqe487DWaQDuoaXi6yMWC3UHF40vALmPnpRo=;
 b=K4EUBSAmn01VatkzLe+QPZnZMuHqsyo3SKh7cGb3DgZ2K4j+QSIXeXuL+kHDc5PATajEsXjnV+Y1BJ26debOmqEDuWM79YQ521ddggPurQkco8uFSmQBEX5bE4dbp9XUJ7WyPOTlmpB1+bPpMbkOArffvtvERX+HpP0R/sL3CTs1oeQIMQvtnqver0h4fXuJ7T1ugxQDEE+dvk4ZyMrbtiH52YrorrO1VnnkrCqIL6pZlNwBGrVdaEyvX02xafyBuq4BKiCIRQs28YkQCDKxREB5g8/j7Wjcx96FXlemLnn9jPCpc0qldvxzcJxJ23UYy57bWBL9DutcOBSDW+7Y8w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=xen.org smtp.mailfrom=xilinx.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=xilinx.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=9reWh0nBqe487DWaQDuoaXi6yMWC3UHF40vALmPnpRo=;
 b=lG6r/t2NbGASXJAZk7cA7VFR59AtseErfVP82Or4Ec679cPJytOl8k8KPnlV4t5ST6xy97/Rzicir3VGjw8sT4fQpRM0YLgMiKfXQmYOAKAzzDpUCBrE1iKzsGC9AEjobD2Sypx8Ohu6fV5r9epkXtfabaIfm/em5x9MeIIYqfg=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch02.xlnx.xilinx.com;
Message-ID: <a6d6aa6f-7dcf-fbed-6400-bb5d028e045e@xilinx.com>
Date: Tue, 22 Mar 2022 12:06:58 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v11 3/3] xen/arm64: io: Handle data abort due to cache
 maintenance instructions
To: Julien Grall <julien@xen.org>, Ayan Kumar Halder
	<ayan.kumar.halder@xilinx.com>, <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <stefanos@xilinx.com>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>
References: <20220317140046.64563-1-ayankuma@xilinx.com>
 <20220317140046.64563-4-ayankuma@xilinx.com>
 <3d6a341d-712d-8701-caf2-49301ae1e01b@xen.org>
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
In-Reply-To: <3d6a341d-712d-8701-caf2-49301ae1e01b@xen.org>
Content-Type: text/plain; charset="UTF-8"; format=flowed
Content-Transfer-Encoding: 8bit
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2a78ccd6-71b6-4335-bcba-08da0bfc782b
X-MS-TrafficTypeDiagnostic: DM6PR02MB5180:EE_
X-Microsoft-Antispam-PRVS:
	<DM6PR02MB51801849C26A62589DDFAA1CB2179@DM6PR02MB5180.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch02.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(356005)(7636003)(5660300002)(70206006)(9786002)(8936002)(54906003)(2906002)(508600001)(31696002)(82310400004)(7416002)(53546011)(47076005)(70586007)(186003)(336012)(426003)(26005)(316002)(36756003)(83380400001)(40460700003)(110136005)(36860700001)(31686004)(4326008)(2616005)(8676002)(50156003)(43740500002);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Mar 2022 12:07:00.0424
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 2a78ccd6-71b6-4335-bcba-08da0bfc782b
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch02.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	BN1NAM02FT029.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR02MB5180


On 18/03/2022 18:26, Julien Grall wrote:
> Hi Ayan,
Hi Julien,
>
> On 17/03/2022 14:00, Ayan Kumar Halder wrote:
>> diff --git a/xen/arch/arm/include/asm/mmio.h 
>> b/xen/arch/arm/include/asm/mmio.h
>> index ca259a79c2..79e64d9af8 100644
>> --- a/xen/arch/arm/include/asm/mmio.h
>> +++ b/xen/arch/arm/include/asm/mmio.h
>> @@ -35,6 +35,7 @@ enum instr_decode_state
>>        * instruction.
>>        */
>>       INSTR_LDR_STR_POSTINDEXING,
>> +    INSTR_CACHE,                    /* Cache Maintenance instr */
>>   };
>>     typedef struct
>> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
>> index 6f458ee7fd..26c716b4a5 100644
>> --- a/xen/arch/arm/io.c
>> +++ b/xen/arch/arm/io.c
>> @@ -139,6 +139,17 @@ void try_decode_instruction(const struct 
>> cpu_user_regs *regs,
>>           return;
>>       }
>>   +    /*
>> +     * When the data abort is caused due to cache maintenance, Xen 
>> should check
>> +     * if the address belongs to an emulated MMIO region or not. The 
>> behavior
>> +     * will differ accordingly.
>> +     */
>> +    if ( info->dabt.cache )
>> +    {
>> +        info->dabt_instr.state = INSTR_CACHE;
>> +        return;
>> +    }
>> +
>>       /*
>>        * Armv8 processor does not provide a valid syndrome for 
>> decoding some
>>        * instructions. So in order to process these instructions, Xen 
>> must
>> @@ -177,6 +188,13 @@ enum io_state try_handle_mmio(struct 
>> cpu_user_regs *regs,
>>           return rc;
>>       }
>>   +    /*
>> +     * When the data abort is caused due to cache maintenance and 
>> the address
>> +     * belongs to an emulated region, Xen should ignore this 
>> instruction.
>> +     */
>> +    if ( info->dabt_instr.state == INSTR_CACHE )
>
> Reading the Arm Arm, the ISS should be invalid for cache instructions. 
> So, I think the check at the beginning of try_handle_mmio() would 
> prevent us to reach this check.
>
> Can you check that cache instructions on emulated region will 
> effectively be ignored?

Yes, you are correct.

I tested with the following (dis)assembly snippet :-

0x3001000 is the base address of GIC Distributor base.

     __asm__ __volatile__("ldr x1, =0x3001000");
     40000ca8:   58000301    ldr x1, 40000d08 <main+0x70>
     __asm __volatile__("DC CVAU, x1");
     40000cac:   d50b7b21    dc  cvau, x1

This resulting in hitting the assertion :-

(XEN) Assertion 'unreachable' failed at arch/arm/io.c:178

I dumped the registers as follows, to determine that the fault is caused 
by the instruction at 40000cac.

HSR=0x00000092000147  regs->pc = 0x40000cac info.gpa = 0x3001000


So, my patch needs to be modified as follows:-

@@ -172,7 +173,7 @@ enum io_state try_handle_mmio(struct cpu_user_regs 
*regs,

      ASSERT(info->dabt.ec == HSR_EC_DATA_ABORT_LOWER_EL);

-    if ( !info->dabt.valid )
+    if ( !(info->dabt.valid || (info->dabt_instr.state == INSTR_CACHE)) )
      {
          ASSERT_UNREACHABLE();
          return IO_ABORT;

I will send a v12 patch with this change.

- Ayan

>
> Cheers,
>


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 12:08:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 12:08:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293421.498483 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWdJ6-0003Pl-EJ; Tue, 22 Mar 2022 12:08:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293421.498483; Tue, 22 Mar 2022 12:08:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWdJ6-0003Pe-BB; Tue, 22 Mar 2022 12:08:12 +0000
Received: by outflank-mailman (input) for mailman id 293421;
 Tue, 22 Mar 2022 12:08:11 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWdJ5-0003PU-9g; Tue, 22 Mar 2022 12:08:11 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWdJ5-00059X-7Z; Tue, 22 Mar 2022 12:08:11 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWdJ4-0005lr-PD; Tue, 22 Mar 2022 12:08:10 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWdJ4-0000Ju-Oi; Tue, 22 Mar 2022 12:08:10 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=RvWiVBWAJtINHm4ytMJ8G1w22RcrSN8nb3yG3gGLMlo=; b=x1QjLwK6KNoydN9TmA4r0e05MG
	Vha73pqlTWYI93Kn4azsk8S3fZvRO/5xe4lDsusIQkA9bSVhRJgIPZWUJnwWSXtvhamdWweXiCyQm
	xXNYmpXkfXshMVECNb6zp5xdezXUv4lVDXAmeJCPTo0piT+6hM9xKfDdJUz61w4OlRXM=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168774-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168774: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 22 Mar 2022 12:08:10 +0000

flight 168774 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168774/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   22 days
Failing since        168258  2022-03-01 01:55:31 Z   21 days  220 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 12:39:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 12:39:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293434.498507 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWdmi-0006ux-1r; Tue, 22 Mar 2022 12:38:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293434.498507; Tue, 22 Mar 2022 12:38:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWdmh-0006uq-UL; Tue, 22 Mar 2022 12:38:47 +0000
Received: by outflank-mailman (input) for mailman id 293434;
 Tue, 22 Mar 2022 12:38:46 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Ed4I=UB=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nWdmf-0006uk-SC
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 12:38:46 +0000
Received: from NAM11-BN8-obe.outbound.protection.outlook.com
 (mail-bn8nam11on2061b.outbound.protection.outlook.com
 [2a01:111:f400:7eae::61b])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 01b9c8d7-a9dd-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 13:38:43 +0100 (CET)
Received: from SA9PR13CA0114.namprd13.prod.outlook.com (2603:10b6:806:24::29)
 by BL0PR02MB4946.namprd02.prod.outlook.com (2603:10b6:208:28::20)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.18; Tue, 22 Mar
 2022 12:38:39 +0000
Received: from SN1NAM02FT0048.eop-nam02.prod.protection.outlook.com
 (2603:10b6:806:24:cafe::58) by SA9PR13CA0114.outlook.office365.com
 (2603:10b6:806:24::29) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.8 via Frontend
 Transport; Tue, 22 Mar 2022 12:38:39 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (149.199.80.198) by
 SN1NAM02FT0048.mail.protection.outlook.com (10.97.4.223) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5081.14 via Frontend Transport; Tue, 22 Mar 2022 12:38:38 +0000
Received: from xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 22 Mar 2022 12:38:37 +0000
Received: from smtp.xilinx.com (172.21.105.197) by
 xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 22 Mar 2022 12:38:37 +0000
Received: from [10.71.116.34] (port=59603)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nWdmW-0002VS-BG; Tue, 22 Mar 2022 12:38:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 01b9c8d7-a9dd-11ec-8fbc-03012f2f19d4
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=O+rZDg3MzcqjAdgiBRNuxS37K75U+erLa9thaRImzAbWmULenquW6rH/mIY4PnmEBqxAHWF//tzVP7iswm6E1RspPWvgHfmF03leRhuFZn84t8AZ0gRXLBKgbzbKLu/4/sddarK0ONc1vNocCWFh9vFhvHyQ5cJiBqKfCwe9WidV7Wl5ZJS74bMCebgXs4hZHT6qmsTTEH7WOt8mPgC0JfUYZBxrDe4gBcHJsrOIWmvvGP50+QSe0uMxob8Eq5hVYdS2Rl0fmjk23nIGawo2wx1NBFUQPL3ccl5gCEwxZQfv+Ytet2q1zvaG1dlQs6Dyu5B4WpeTB9mj8g7bYVugPw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=P8wG/Vl/qyGUk8DmqyojureUN+2ILdmPNHrKtT4MShc=;
 b=AxjDAJM9lt1twLsfiPgT5Gpocc/aaoG+OvRNKjpCncQ5xJZmLsYk9m9EPpZcDXDkqmrniHTNDoy92qIlzDLDfGoBiXl4fo2GoQzJ1lgb+N+6d6B9YQj4YtotwLBxIsJ+UbDDUUrU9+Ri050pFubc0lZ2+4c+l/gZV4fd0ufMO6hFjp0Yr/XdYDU+s0JoSK0/MFN8Rj6NAiAQLM2gJKnRJu0EcYv1yaLnlLNWWkTGbNjkpmkm6iuNKmeFBL66/cNbDetk4iVmp1eeUxhnKP6hjdRqUUU92RH5TpjT6NLaxBXrcofiMaQ00zr+pQ8N/z32Fay7g5D9SVmol7O+w96IzQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=xen.org smtp.mailfrom=xilinx.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=xilinx.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=P8wG/Vl/qyGUk8DmqyojureUN+2ILdmPNHrKtT4MShc=;
 b=Z2a4Kp77/RnVIUTchphZcr4AUE83LDHmUqSXyqYF9otWoiHASmNO59KOyNabkvvyLxxaIzDwtLylDDt7BW5tahNMEbtyu6TiHfnHINF9Jnh49a1yoVV4LItO0t67YMjQ3mEI2/i0Og+klLApNb8RmY0aPNDhtSp6mlmYTzI7XxM=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch01.xlnx.xilinx.com;
Message-ID: <9bcab961-8ae1-9e9a-c6da-682aecf2a138@xilinx.com>
Date: Tue, 22 Mar 2022 12:38:35 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v11 3/3] xen/arm64: io: Handle data abort due to cache
 maintenance instructions
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>, Julien Grall
	<julien@xen.org>, <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <stefanos@xilinx.com>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>
References: <20220317140046.64563-1-ayankuma@xilinx.com>
 <20220317140046.64563-4-ayankuma@xilinx.com>
 <3d6a341d-712d-8701-caf2-49301ae1e01b@xen.org>
 <a6d6aa6f-7dcf-fbed-6400-bb5d028e045e@xilinx.com>
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
In-Reply-To: <a6d6aa6f-7dcf-fbed-6400-bb5d028e045e@xilinx.com>
Content-Type: text/plain; charset="UTF-8"; format=flowed
Content-Transfer-Encoding: 8bit
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: d84c02da-a850-4129-6d8e-08da0c00e3e7
X-MS-TrafficTypeDiagnostic: BL0PR02MB4946:EE_
X-Microsoft-Antispam-PRVS:
	<BL0PR02MB494663D5ACBCC671A4805BBBB2179@BL0PR02MB4946.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch01.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(26005)(2616005)(186003)(426003)(2906002)(8936002)(83380400001)(9786002)(40460700003)(31696002)(5660300002)(7416002)(82310400004)(47076005)(336012)(53546011)(508600001)(316002)(31686004)(36756003)(356005)(7636003)(54906003)(4326008)(110136005)(70206006)(36860700001)(8676002)(70586007)(50156003)(43740500002);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Mar 2022 12:38:38.6662
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: d84c02da-a850-4129-6d8e-08da0c00e3e7
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch01.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	SN1NAM02FT0048.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR02MB4946


On 22/03/2022 12:06, Ayan Kumar Halder wrote:
>
> On 18/03/2022 18:26, Julien Grall wrote:
>> Hi Ayan,
> Hi Julien,
>>
>> On 17/03/2022 14:00, Ayan Kumar Halder wrote:
>>> diff --git a/xen/arch/arm/include/asm/mmio.h 
>>> b/xen/arch/arm/include/asm/mmio.h
>>> index ca259a79c2..79e64d9af8 100644
>>> --- a/xen/arch/arm/include/asm/mmio.h
>>> +++ b/xen/arch/arm/include/asm/mmio.h
>>> @@ -35,6 +35,7 @@ enum instr_decode_state
>>>        * instruction.
>>>        */
>>>       INSTR_LDR_STR_POSTINDEXING,
>>> +    INSTR_CACHE,                    /* Cache Maintenance instr */
>>>   };
>>>     typedef struct
>>> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
>>> index 6f458ee7fd..26c716b4a5 100644
>>> --- a/xen/arch/arm/io.c
>>> +++ b/xen/arch/arm/io.c
>>> @@ -139,6 +139,17 @@ void try_decode_instruction(const struct 
>>> cpu_user_regs *regs,
>>>           return;
>>>       }
>>>   +    /*
>>> +     * When the data abort is caused due to cache maintenance, Xen 
>>> should check
>>> +     * if the address belongs to an emulated MMIO region or not. 
>>> The behavior
>>> +     * will differ accordingly.
>>> +     */
>>> +    if ( info->dabt.cache )
>>> +    {
>>> +        info->dabt_instr.state = INSTR_CACHE;
>>> +        return;
>>> +    }
>>> +
>>>       /*
>>>        * Armv8 processor does not provide a valid syndrome for 
>>> decoding some
>>>        * instructions. So in order to process these instructions, 
>>> Xen must
>>> @@ -177,6 +188,13 @@ enum io_state try_handle_mmio(struct 
>>> cpu_user_regs *regs,
>>>           return rc;
>>>       }
>>>   +    /*
>>> +     * When the data abort is caused due to cache maintenance and 
>>> the address
>>> +     * belongs to an emulated region, Xen should ignore this 
>>> instruction.
>>> +     */
>>> +    if ( info->dabt_instr.state == INSTR_CACHE )
>>
>> Reading the Arm Arm, the ISS should be invalid for cache 
>> instructions. So, I think the check at the beginning of 
>> try_handle_mmio() would prevent us to reach this check.
>>
>> Can you check that cache instructions on emulated region will 
>> effectively be ignored?
>
> Yes, you are correct.
>
> I tested with the following (dis)assembly snippet :-
>
> 0x3001000 is the base address of GIC Distributor base.
>
>     __asm__ __volatile__("ldr x1, =0x3001000");
>     40000ca8:   58000301    ldr x1, 40000d08 <main+0x70>
>     __asm __volatile__("DC CVAU, x1");
>     40000cac:   d50b7b21    dc  cvau, x1
>
> This resulting in hitting the assertion :-
>
> (XEN) Assertion 'unreachable' failed at arch/arm/io.c:178
>
> I dumped the registers as follows, to determine that the fault is 
> caused by the instruction at 40000cac.
>
> HSR=0x00000092000147  regs->pc = 0x40000cac info.gpa = 0x3001000
>
>
> So, my patch needs to be modified as follows:-
>
> @@ -172,7 +173,7 @@ enum io_state try_handle_mmio(struct cpu_user_regs 
> *regs,
>
>      ASSERT(info->dabt.ec == HSR_EC_DATA_ABORT_LOWER_EL);
>
> -    if ( !info->dabt.valid )
> +    if ( !(info->dabt.valid || (info->dabt_instr.state == 
> INSTR_CACHE)) )

Actually this is not needed.

The following change is sufficient :-

@@ -146,7 +146,9 @@ void try_decode_instruction(const struct 
cpu_user_regs *regs,
       */
      if ( info->dabt.cache )
      {
          info->dabt_instr.state = INSTR_CACHE;
+        info->dabt.valid = 1;
          return;
      }

"info->dabt.valid == 1" means the instruction is valid or decoded 
successfully (this holds true for INSTR_CACHE as well).



From xen-devel-bounces@lists.xenproject.org Tue Mar 22 12:40:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 12:40:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293438.498518 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWdo8-0008Gr-Eb; Tue, 22 Mar 2022 12:40:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293438.498518; Tue, 22 Mar 2022 12:40:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWdo8-0008Gk-BV; Tue, 22 Mar 2022 12:40:16 +0000
Received: by outflank-mailman (input) for mailman id 293438;
 Tue, 22 Mar 2022 12:40:14 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWdo6-0008GU-Ic; Tue, 22 Mar 2022 12:40:14 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWdo6-0005hy-Ee; Tue, 22 Mar 2022 12:40:14 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWdo6-0006uz-35; Tue, 22 Mar 2022 12:40:14 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWdo6-0006jz-2g; Tue, 22 Mar 2022 12:40:14 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=MCUEGR4un3dPdxh9b7cuRRIGNg+FeBBN1OLQ9nu6sic=; b=rvCFdn6hvBpHsSiM9cItRGhLYr
	fLkb36mRyL6YMyLVbdTTej43TK+AVH4uuDXLZm+yHORKFO+yCew0eiBDuvy35Nbp35ZLn+CZJRUNJ
	Jds8Zy0RbhwGtOf6+Ozo0QvrCEXKYtYsl+gVmkoICOlphqCrTAMMA9pra/eYEyf0xBpA=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168769-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168769: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=d31c39a83c1d911c478561aaf40729a529e3283e
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 22 Mar 2022 12:40:14 +0000

flight 168769 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168769/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              d31c39a83c1d911c478561aaf40729a529e3283e
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  620 days
Failing since        151818  2020-07-11 04:18:52 Z  619 days  601 attempts
Testing same since   168769  2022-03-22 04:18:58 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Haonan Wang <hnwanga1@gmail.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Martin Pitt <mpitt@debian.org>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 101724 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 12:45:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 12:45:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293445.498529 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWdtB-0000Xu-51; Tue, 22 Mar 2022 12:45:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293445.498529; Tue, 22 Mar 2022 12:45:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWdtB-0000Xn-1E; Tue, 22 Mar 2022 12:45:29 +0000
Received: by outflank-mailman (input) for mailman id 293445;
 Tue, 22 Mar 2022 12:45:27 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWdt9-0000Xd-SO; Tue, 22 Mar 2022 12:45:27 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWdt9-0005np-Q1; Tue, 22 Mar 2022 12:45:27 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWdt9-00073n-Il; Tue, 22 Mar 2022 12:45:27 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWdt9-0000WU-IK; Tue, 22 Mar 2022 12:45:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=ooehqFqcpGylhtoes7rB1Pe7nHQsRkv2bGyS18KeeNs=; b=T1eJFzbEHd/TFL7ews83/0oaTW
	OBjYcBmy4vvRUzvb7ynt/RbMj3bDXzuVQY1Yw4pGSjJtD1xKyXwxYDiSyOl+/CF/qjS+LJuOWLOvn
	315Eu705hKkbpsIjjHTqxGgtT1V9U97iv8ZmQMsbUyJ34VH+zbqc6PqywdlKBQ/kWBiA=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168777-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168777: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 22 Mar 2022 12:45:27 +0000

flight 168777 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168777/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   22 days
Failing since        168258  2022-03-01 01:55:31 Z   21 days  221 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 13:22:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 13:22:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293461.498543 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWeSd-0004t4-5P; Tue, 22 Mar 2022 13:22:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293461.498543; Tue, 22 Mar 2022 13:22:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWeSd-0004sx-1f; Tue, 22 Mar 2022 13:22:07 +0000
Received: by outflank-mailman (input) for mailman id 293461;
 Tue, 22 Mar 2022 13:22:05 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nWeSb-0004sr-LJ
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 13:22:05 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWeSb-0006Or-2e; Tue, 22 Mar 2022 13:22:05 +0000
Received: from 54-240-197-233.amazon.com ([54.240.197.233]
 helo=[192.168.19.186]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWeSa-0006iY-Rw; Tue, 22 Mar 2022 13:22:04 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=F9D4ruYVnonPUnBSyHtOpG+kC+VvocBaqPqt0btQ94s=; b=MKCT+EqM5GAEa9QW3UFD9TbLF3
	xOromOJ2GaiaqLuanjKZMMqlV3dWKXvqWBIOkqF1mBnodqGC72O2pkwBUxTVeTU71ypD8MaFWPuGH
	WlCsMnDLVPjt6Tw3NEY1+yvblRXl/YIZZswwlLEQmVVYaj0oi7E3E9lEaulhnbuNT8/g=;
Message-ID: <c7296ea0-5236-1a10-8ef1-74ec83456ce5@xen.org>
Date: Tue, 22 Mar 2022 13:22:02 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v11 3/3] xen/arm64: io: Handle data abort due to cache
 maintenance instructions
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>,
 xen-devel@lists.xenproject.org
Cc: sstabellini@kernel.org, stefanos@xilinx.com, Volodymyr_Babchuk@epam.com,
 bertrand.marquis@arm.com, andrew.cooper3@citrix.com,
 george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org,
 roger.pau@citrix.com
References: <20220317140046.64563-1-ayankuma@xilinx.com>
 <20220317140046.64563-4-ayankuma@xilinx.com>
 <3d6a341d-712d-8701-caf2-49301ae1e01b@xen.org>
 <a6d6aa6f-7dcf-fbed-6400-bb5d028e045e@xilinx.com>
 <9bcab961-8ae1-9e9a-c6da-682aecf2a138@xilinx.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <9bcab961-8ae1-9e9a-c6da-682aecf2a138@xilinx.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi Ayan,

On 22/03/2022 12:38, Ayan Kumar Halder wrote:
> 
> On 22/03/2022 12:06, Ayan Kumar Halder wrote:
>>
>> On 18/03/2022 18:26, Julien Grall wrote:
>>> Hi Ayan,
>> Hi Julien,
>>>
>>> On 17/03/2022 14:00, Ayan Kumar Halder wrote:
>>>> diff --git a/xen/arch/arm/include/asm/mmio.h 
>>>> b/xen/arch/arm/include/asm/mmio.h
>>>> index ca259a79c2..79e64d9af8 100644
>>>> --- a/xen/arch/arm/include/asm/mmio.h
>>>> +++ b/xen/arch/arm/include/asm/mmio.h
>>>> @@ -35,6 +35,7 @@ enum instr_decode_state
>>>>        * instruction.
>>>>        */
>>>>       INSTR_LDR_STR_POSTINDEXING,
>>>> +    INSTR_CACHE,                    /* Cache Maintenance instr */
>>>>   };
>>>>     typedef struct
>>>> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
>>>> index 6f458ee7fd..26c716b4a5 100644
>>>> --- a/xen/arch/arm/io.c
>>>> +++ b/xen/arch/arm/io.c
>>>> @@ -139,6 +139,17 @@ void try_decode_instruction(const struct 
>>>> cpu_user_regs *regs,
>>>>           return;
>>>>       }
>>>>   +    /*
>>>> +     * When the data abort is caused due to cache maintenance, Xen 
>>>> should check
>>>> +     * if the address belongs to an emulated MMIO region or not. 
>>>> The behavior
>>>> +     * will differ accordingly.
>>>> +     */
>>>> +    if ( info->dabt.cache )
>>>> +    {
>>>> +        info->dabt_instr.state = INSTR_CACHE;
>>>> +        return;
>>>> +    }
>>>> +
>>>>       /*
>>>>        * Armv8 processor does not provide a valid syndrome for 
>>>> decoding some
>>>>        * instructions. So in order to process these instructions, 
>>>> Xen must
>>>> @@ -177,6 +188,13 @@ enum io_state try_handle_mmio(struct 
>>>> cpu_user_regs *regs,
>>>>           return rc;
>>>>       }
>>>>   +    /*
>>>> +     * When the data abort is caused due to cache maintenance and 
>>>> the address
>>>> +     * belongs to an emulated region, Xen should ignore this 
>>>> instruction.
>>>> +     */
>>>> +    if ( info->dabt_instr.state == INSTR_CACHE )
>>>
>>> Reading the Arm Arm, the ISS should be invalid for cache 
>>> instructions. So, I think the check at the beginning of 
>>> try_handle_mmio() would prevent us to reach this check.
>>>
>>> Can you check that cache instructions on emulated region will 
>>> effectively be ignored?
>>
>> Yes, you are correct.
>>
>> I tested with the following (dis)assembly snippet :-
>>
>> 0x3001000 is the base address of GIC Distributor base.
>>
>>     __asm__ __volatile__("ldr x1, =0x3001000");
>>     40000ca8:   58000301    ldr x1, 40000d08 <main+0x70>
>>     __asm __volatile__("DC CVAU, x1");
>>     40000cac:   d50b7b21    dc  cvau, x1
>>
>> This resulting in hitting the assertion :-
>>
>> (XEN) Assertion 'unreachable' failed at arch/arm/io.c:178
>>
>> I dumped the registers as follows, to determine that the fault is 
>> caused by the instruction at 40000cac.
>>
>> HSR=0x00000092000147  regs->pc = 0x40000cac info.gpa = 0x3001000
>>
>>
>> So, my patch needs to be modified as follows:-
>>
>> @@ -172,7 +173,7 @@ enum io_state try_handle_mmio(struct cpu_user_regs 
>> *regs,
>>
>>      ASSERT(info->dabt.ec == HSR_EC_DATA_ABORT_LOWER_EL);
>>
>> -    if ( !info->dabt.valid )
>> +    if ( !(info->dabt.valid || (info->dabt_instr.state == 
>> INSTR_CACHE)) )
> 
> Actually this is not needed.
> 
> The following change is sufficient :-
> 
> @@ -146,7 +146,9 @@ void try_decode_instruction(const struct 
> cpu_user_regs *regs,
>        */
>       if ( info->dabt.cache )
>       {
>           info->dabt_instr.state = INSTR_CACHE;
> +        info->dabt.valid = 1;

To me, 'info->dabt.valid' indicates whether the syndrome is valid. We 
set to 1 for emulated instruction because the syndrome will be updated.

But this is not the case for the cache instructions. So I would prefer 
if it is kept as 0 and use your previous suggestion.

Furthermore, I think try_fwd_ioserv() need to be adapted because the 
function will use the fields SAS and SRT. From the Arm Arm they are 
RES0, so while they are 0 today, we should not rely on this.

Therefore, to be fully compliant with the Arm, we want to reorder a bit 
the code:

  * The field data could be set past ioreq_select_server().
  * The field size should be set to the cache line size.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 13:26:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 13:26:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293465.498554 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWeWc-0005aE-Py; Tue, 22 Mar 2022 13:26:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293465.498554; Tue, 22 Mar 2022 13:26:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWeWc-0005a7-Lz; Tue, 22 Mar 2022 13:26:14 +0000
Received: by outflank-mailman (input) for mailman id 293465;
 Tue, 22 Mar 2022 13:26:13 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=0O/j=UB=redhat.com=mst@srs-se1.protection.inumbo.net>)
 id 1nWeWb-0005a1-5H
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 13:26:13 +0000
Received: from us-smtp-delivery-124.mimecast.com
 (us-smtp-delivery-124.mimecast.com [170.10.129.124])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a0ee733e-a9e3-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 14:26:07 +0100 (CET)
Received: from mail-wm1-f69.google.com (mail-wm1-f69.google.com
 [209.85.128.69]) by relay.mimecast.com with ESMTP with STARTTLS
 (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 us-mta-607-DMQYUTx5O2KUJn6WZfDcvA-1; Tue, 22 Mar 2022 09:26:07 -0400
Received: by mail-wm1-f69.google.com with SMTP id
 h127-20020a1c2185000000b0038c6f7e22a4so1258417wmh.9
 for <xen-devel@lists.xenproject.org>; Tue, 22 Mar 2022 06:26:06 -0700 (PDT)
Received: from redhat.com ([2.55.132.0]) by smtp.gmail.com with ESMTPSA id
 b15-20020adfc74f000000b001e888b871a0sm15919477wrh.87.2022.03.22.06.25.56
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Tue, 22 Mar 2022 06:26:04 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a0ee733e-a9e3-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;
	s=mimecast20190719; t=1647955568;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=Mk3hl79SOvvRPnNyVsHVQnRiriDoUuiJYwsyISW4b0k=;
	b=HnxH/dWiG5qdYcUOX8x0sbDblWxYk3DpJvwysjs5rTensNtmzJCvEKEPxTChTm5D3zAsia
	fH+P579ZrOmSu66O9OeKvezz9910JmLIUAeqLsvTeo+GnjUU6QqHSzH0dQmt28iXzSSnyj
	08q2Foo0YtbSEESzWzNhZSNnzaiNA6Q=
X-MC-Unique: DMQYUTx5O2KUJn6WZfDcvA-1
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:date:from:to:cc:subject:message-id:references
         :mime-version:content-disposition:in-reply-to;
        bh=Mk3hl79SOvvRPnNyVsHVQnRiriDoUuiJYwsyISW4b0k=;
        b=4tyDBnhytEMKnEY6RskxUqZu0MxxxwjaBUw+pVvVleCE6OG4w6TqojYgzRu75fu2GH
         NTz4aqqVhfn/V7Uxu1Jfvaxu9lJM/k76ehtnSx8QOMlHO5GqRdbzYhvL099ruSsTPUHd
         MnJnD4w0Fw2YIA8qpb7HhfYmN0RMrBWKt6E9SObRq9Al7EKB+mk9WTbSPQa3SgVtuwWg
         tYLD65e6d+Akfxc7drHj3FW6zJdoRgoS2tAVrsC/qusPilnpWpeqrJ6nvYtt4jyawxGV
         5SQ0O+FziDTpHW7tvMXxb+xuKBZuXa7zE6NbmlaJICcOJayxFx62JeNQgnAEkKDY9YtU
         I+8A==
X-Gm-Message-State: AOAM532brNDeigimea6G0XqLvBXuZQbpWsQVF4mFPMntcZFMHVjLq905
	7kbk1dMgO+jkIc0BPQ711jRyfI/3WEe3zvay7osazwrSJy2tULKaqmusEG8Z/+tovZUFlsxNLlx
	IGsf9dJ9/QlGg4aa3cD1F+WsQPP4=
X-Received: by 2002:a05:600c:1e0d:b0:38c:bb0c:e01 with SMTP id ay13-20020a05600c1e0d00b0038cbb0c0e01mr2299291wmb.115.1647955565894;
        Tue, 22 Mar 2022 06:26:05 -0700 (PDT)
X-Google-Smtp-Source: ABdhPJy9R6xweHbYOlT41nX8VS8jupEnB/cxHKbwK3VEwN1bfzNeZZNTKEUKx2jEvOzPtm6sO39XFQ==
X-Received: by 2002:a05:600c:1e0d:b0:38c:bb0c:e01 with SMTP id ay13-20020a05600c1e0d00b0038cbb0c0e01mr2299266wmb.115.1647955565576;
        Tue, 22 Mar 2022 06:26:05 -0700 (PDT)
Date: Tue, 22 Mar 2022 09:25:54 -0400
From: "Michael S. Tsirkin" <mst@redhat.com>
To: Markus Armbruster <armbru@redhat.com>
Cc: qemu-devel@nongnu.org, Paolo Bonzini <pbonzini@redhat.com>,
	Richard Henderson <richard.henderson@linaro.org>,
	Gerd Hoffmann <kraxel@redhat.com>,
	Christian Schoenebeck <qemu_oss@crudebyte.com>,
	"Gonglei (Arei)" <arei.gonglei@huawei.com>,
	=?iso-8859-1?Q?Marc-Andr=E9?= Lureau <marcandre.lureau@redhat.com>,
	Igor Mammedov <imammedo@redhat.com>, Ani Sinha <ani@anisinha.ca>,
	Laurent Vivier <lvivier@redhat.com>, Amit Shah <amit@kernel.org>,
	Peter Maydell <peter.maydell@linaro.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Anthony Perard <anthony.perard@citrix.com>,
	Paul Durrant <paul@xen.org>,
	=?iso-8859-1?Q?Herv=E9?= Poussineau <hpoussin@reactos.org>,
	Aleksandar Rikalo <aleksandar.rikalo@syrmia.com>,
	Corey Minyard <cminyard@mvista.com>,
	Patrick Venture <venture@google.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Peter Xu <peterx@redhat.com>, Jason Wang <jasowang@redhat.com>,
	=?iso-8859-1?Q?C=E9dric?= Le Goater <clg@kaod.org>,
	Daniel Henrique Barboza <danielhb413@gmail.com>,
	David Gibson <david@gibson.dropbear.id.au>,
	Greg Kurz <groug@kaod.org>,
	Philippe =?iso-8859-1?Q?Mathieu-Daud=E9?= <f4bug@amsat.org>,
	Jean-Christophe Dubois <jcd@tribudubois.net>,
	Keith Busch <kbusch@kernel.org>, Klaus Jensen <its@irrelevant.dk>,
	Yuval Shaia <yuval.shaia.ml@gmail.com>,
	Yoshinori Sato <ysato@users.sourceforge.jp>,
	Magnus Damm <magnus.damm@gmail.com>,
	Fabien Chouteau <chouteau@adacore.com>,
	KONRAD Frederic <frederic.konrad@adacore.com>,
	Mark Cave-Ayland <mark.cave-ayland@ilande.co.uk>,
	Artyom Tarasenko <atar4qemu@gmail.com>,
	Alex Williamson <alex.williamson@redhat.com>,
	Eric Auger <eric.auger@redhat.com>,
	Max Filippov <jcmvbkbc@gmail.com>,
	Juan Quintela <quintela@redhat.com>,
	"Dr. David Alan Gilbert" <dgilbert@redhat.com>,
	Konstantin Kostiuk <kkostiuk@redhat.com>,
	Michael Roth <michael.roth@amd.com>,
	Daniel =?iso-8859-1?Q?P=2E_Berrang=E9?= <berrange@redhat.com>,
	Pavel Dovgalyuk <pavel.dovgaluk@ispras.ru>,
	Alex =?iso-8859-1?Q?Benn=E9e?= <alex.bennee@linaro.org>,
	David Hildenbrand <david@redhat.com>,
	Wenchao Wang <wenchao.wang@intel.com>,
	Kamil Rytarowski <kamil@netbsd.org>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Cornelia Huck <cohuck@redhat.com>, Thomas Huth <thuth@redhat.com>,
	Eric Blake <eblake@redhat.com>,
	Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>,
	John Snow <jsnow@redhat.com>, kvm@vger.kernel.org,
	qemu-arm@nongnu.org, xen-devel@lists.xenproject.org,
	qemu-ppc@nongnu.org, qemu-block@nongnu.org, haxm-team@intel.com,
	qemu-s390x@nongnu.org
Subject: Re: [PATCH v2 0/3] Use g_new() & friends where that makes obvious
 sense
Message-ID: <20220322092520-mutt-send-email-mst@kernel.org>
References: <20220315144156.1595462-1-armbru@redhat.com>
MIME-Version: 1.0
In-Reply-To: <20220315144156.1595462-1-armbru@redhat.com>
Authentication-Results: relay.mimecast.com;
	auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=mst@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

On Tue, Mar 15, 2022 at 03:41:53PM +0100, Markus Armbruster wrote:
> g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
> for two reasons.  One, it catches multiplication overflowing size_t.
> Two, it returns T * rather than void *, which lets the compiler catch
> more type errors.
> 
> This series only touches allocations with size arguments of the form
> sizeof(T).  It's mechanical, except for a tiny fix in PATCH 2.
> 
> PATCH 1 adds the Coccinelle script.
> 
> PATCH 2 cleans up the virtio-9p subsystem, and fixes a harmless typing
> error uncovered by the cleanup.
> 
> PATCH 3 cleans up everything else.  I started to split it up, but
> splitting is a lot of decisions, and I just can't see the value.

series:

Acked-by: Michael S. Tsirkin <mst@redhat.com>


> For instance, MAINTAINERS tells me to split for subsystem "virtio",
> patching
> 
>     hw/char/virtio-serial-bus.c
>     hw/display/virtio-gpu.c
>     hw/net/virtio-net.c
>     hw/virtio/virtio-crypto.c
>     hw/virtio/virtio-iommu.c
>     hw/virtio/virtio.c
> 
> But it also tells me to split for subsystem "Character devices",
> patching
> 
>     hw/char/parallel.c                       |  2 +-
>     hw/char/riscv_htif.c                     |  2 +-
>     hw/char/virtio-serial-bus.c              |  6 +-
> 
> and for subsystem "Network devices", patching
> 
>     hw/net/virtio-net.c
> 
> and for subsystem "virtio-gpu", patching
> 
>     hw/display/virtio-gpu.c
> 
> I guess I'd go with "virtio".  Six files down, 103 to go.  Thanks, but
> no thanks.
> 
> Since the transformation is local to a function call, dropping is
> completely safe.  We can deal with conflicts by dropping conflicting
> hunks, with "git-pull -s recursive -X ours".  Or drop entire files
> with conflicts.
> 
> If you want me to split off certain parts, please tell me exactly what
> you want split off, and I'll gladly do the splitting.  I don't mind
> the splitting part, I do mind the *thinking* part.
> 
> I backed out two changes made by the Coccinelle script:
> scripts/coverity-scan/model.c, because that's special, and
> semihosting/config.c, because it has a typing error similar to the one
> fixed in PATCH 2, and Alex already posted a patch for it.
> 
> v2:
> * PATCH 3: Change to scripts/coverity-scan/model.c dropped [Eric]
> * PATCH 3: Change to semihosting/config.c dropped [Alex]
> * Commit messages tweaked
> 
> Markus Armbruster (3):
>   scripts/coccinelle: New use-g_new-etc.cocci
>   9pfs: Use g_new() & friends where that makes obvious sense
>   Use g_new() & friends where that makes obvious sense
> 
>  scripts/coccinelle/use-g_new-etc.cocci   | 75 ++++++++++++++++++++++++
>  include/qemu/timer.h                     |  2 +-
>  accel/kvm/kvm-all.c                      |  6 +-
>  accel/tcg/tcg-accel-ops-mttcg.c          |  2 +-
>  accel/tcg/tcg-accel-ops-rr.c             |  4 +-
>  audio/audio.c                            |  4 +-
>  audio/audio_legacy.c                     |  6 +-
>  audio/dsoundaudio.c                      |  2 +-
>  audio/jackaudio.c                        |  6 +-
>  audio/paaudio.c                          |  4 +-
>  backends/cryptodev.c                     |  2 +-
>  contrib/vhost-user-gpu/vhost-user-gpu.c  |  2 +-
>  cpus-common.c                            |  4 +-
>  dump/dump.c                              |  2 +-
>  hw/9pfs/9p-proxy.c                       |  2 +-
>  hw/9pfs/9p-synth.c                       |  4 +-
>  hw/9pfs/9p.c                             |  8 +--
>  hw/9pfs/codir.c                          |  6 +-
>  hw/acpi/hmat.c                           |  2 +-
>  hw/audio/intel-hda.c                     |  2 +-
>  hw/char/parallel.c                       |  2 +-
>  hw/char/riscv_htif.c                     |  2 +-
>  hw/char/virtio-serial-bus.c              |  6 +-
>  hw/core/irq.c                            |  2 +-
>  hw/core/reset.c                          |  2 +-
>  hw/display/pxa2xx_lcd.c                  |  2 +-
>  hw/display/tc6393xb.c                    |  2 +-
>  hw/display/virtio-gpu.c                  |  4 +-
>  hw/display/xenfb.c                       |  4 +-
>  hw/dma/rc4030.c                          |  4 +-
>  hw/i2c/core.c                            |  4 +-
>  hw/i2c/i2c_mux_pca954x.c                 |  2 +-
>  hw/i386/amd_iommu.c                      |  4 +-
>  hw/i386/intel_iommu.c                    |  2 +-
>  hw/i386/xen/xen-hvm.c                    | 10 ++--
>  hw/i386/xen/xen-mapcache.c               | 14 ++---
>  hw/input/lasips2.c                       |  2 +-
>  hw/input/pckbd.c                         |  2 +-
>  hw/input/ps2.c                           |  4 +-
>  hw/input/pxa2xx_keypad.c                 |  2 +-
>  hw/input/tsc2005.c                       |  3 +-
>  hw/intc/riscv_aclint.c                   |  6 +-
>  hw/intc/xics.c                           |  2 +-
>  hw/m68k/virt.c                           |  2 +-
>  hw/mips/mipssim.c                        |  2 +-
>  hw/misc/applesmc.c                       |  2 +-
>  hw/misc/imx6_src.c                       |  2 +-
>  hw/misc/ivshmem.c                        |  4 +-
>  hw/net/virtio-net.c                      |  4 +-
>  hw/nvme/ns.c                             |  2 +-
>  hw/pci-host/pnv_phb3.c                   |  2 +-
>  hw/pci-host/pnv_phb4.c                   |  2 +-
>  hw/pci/pcie_sriov.c                      |  2 +-
>  hw/ppc/e500.c                            |  2 +-
>  hw/ppc/ppc.c                             |  8 +--
>  hw/ppc/ppc405_boards.c                   |  4 +-
>  hw/ppc/ppc405_uc.c                       | 18 +++---
>  hw/ppc/ppc4xx_devs.c                     |  2 +-
>  hw/ppc/ppc_booke.c                       |  4 +-
>  hw/ppc/spapr.c                           |  2 +-
>  hw/ppc/spapr_events.c                    |  2 +-
>  hw/ppc/spapr_hcall.c                     |  2 +-
>  hw/ppc/spapr_numa.c                      |  3 +-
>  hw/rdma/vmw/pvrdma_dev_ring.c            |  2 +-
>  hw/rdma/vmw/pvrdma_qp_ops.c              |  6 +-
>  hw/sh4/r2d.c                             |  4 +-
>  hw/sh4/sh7750.c                          |  2 +-
>  hw/sparc/leon3.c                         |  2 +-
>  hw/sparc64/sparc64.c                     |  4 +-
>  hw/timer/arm_timer.c                     |  2 +-
>  hw/timer/slavio_timer.c                  |  2 +-
>  hw/vfio/pci.c                            |  4 +-
>  hw/vfio/platform.c                       |  4 +-
>  hw/virtio/virtio-crypto.c                |  2 +-
>  hw/virtio/virtio-iommu.c                 |  2 +-
>  hw/virtio/virtio.c                       |  5 +-
>  hw/xtensa/xtfpga.c                       |  2 +-
>  linux-user/syscall.c                     |  2 +-
>  migration/dirtyrate.c                    |  4 +-
>  migration/multifd-zlib.c                 |  4 +-
>  migration/ram.c                          |  2 +-
>  monitor/misc.c                           |  2 +-
>  monitor/qmp-cmds.c                       |  2 +-
>  qga/commands-win32.c                     |  8 +--
>  qga/commands.c                           |  2 +-
>  qom/qom-qmp-cmds.c                       |  2 +-
>  replay/replay-char.c                     |  4 +-
>  replay/replay-events.c                   | 10 ++--
>  softmmu/bootdevice.c                     |  4 +-
>  softmmu/dma-helpers.c                    |  4 +-
>  softmmu/memory_mapping.c                 |  2 +-
>  target/i386/cpu-sysemu.c                 |  2 +-
>  target/i386/hax/hax-accel-ops.c          |  4 +-
>  target/i386/nvmm/nvmm-accel-ops.c        |  4 +-
>  target/i386/whpx/whpx-accel-ops.c        |  4 +-
>  target/i386/whpx/whpx-all.c              |  2 +-
>  target/s390x/cpu-sysemu.c                |  2 +-
>  tests/qtest/virtio-9p-test.c             |  4 +-
>  tests/unit/test-hbitmap.c                |  2 +-
>  tests/unit/test-qmp-cmds.c               | 14 ++---
>  tests/unit/test-qobject-output-visitor.c |  2 +-
>  tests/unit/test-vmstate.c                | 42 ++++++-------
>  ui/vnc-enc-tight.c                       |  2 +-
>  util/envlist.c                           |  2 +-
>  util/hbitmap.c                           |  2 +-
>  util/main-loop.c                         |  2 +-
>  util/qemu-timer.c                        |  2 +-
>  util/vfio-helpers.c                      |  4 +-
>  108 files changed, 282 insertions(+), 212 deletions(-)
>  create mode 100644 scripts/coccinelle/use-g_new-etc.cocci
> 
> -- 
> 2.35.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 22 13:36:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 13:36:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293468.498566 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWegf-00074y-O5; Tue, 22 Mar 2022 13:36:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293468.498566; Tue, 22 Mar 2022 13:36:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWegf-00074r-Kg; Tue, 22 Mar 2022 13:36:37 +0000
Received: by outflank-mailman (input) for mailman id 293468;
 Tue, 22 Mar 2022 13:36:36 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWege-00074h-FU; Tue, 22 Mar 2022 13:36:36 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWege-0006fc-Dh; Tue, 22 Mar 2022 13:36:36 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWege-0000EI-1M; Tue, 22 Mar 2022 13:36:36 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWege-0004OZ-0w; Tue, 22 Mar 2022 13:36:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=G8Kw9Fqd4RrbFqyjdS688we1N4at+rPlX2Jw9OGgYUA=; b=sHsCz4U/t8ZzE/Mtn4eW5B2IJ5
	H7W9QzaVHCgjCKpeghF4uDsD/S4ZtrgMp/GbNsS88zMfh5aT53QxsokokY8eWw+M1dISnnXJ2O0kw
	Enf0I9wiCbVc0K61oVhW8qSj5fN1bmDamQQI9KSGmOyQuAsnEbIaHeyMKs6JLnFbREWE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168779-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168779: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 22 Mar 2022 13:36:36 +0000

flight 168779 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168779/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   22 days
Failing since        168258  2022-03-01 01:55:31 Z   21 days  222 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    0 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 13:53:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 13:53:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293484.498581 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWewc-00015P-9A; Tue, 22 Mar 2022 13:53:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293484.498581; Tue, 22 Mar 2022 13:53:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWewc-00015I-5n; Tue, 22 Mar 2022 13:53:06 +0000
Received: by outflank-mailman (input) for mailman id 293484;
 Tue, 22 Mar 2022 13:53:05 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nWewb-00015C-7g
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 13:53:05 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWewX-0006wV-Sw; Tue, 22 Mar 2022 13:53:01 +0000
Received: from 54-240-197-225.amazon.com ([54.240.197.225]
 helo=[192.168.19.186]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWewX-0000EA-MB; Tue, 22 Mar 2022 13:53:01 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=y3rgVvHHtQdcNR08rOJgwbYdpB9j31IhmtAa9mFolMA=; b=V8UjSjmo1191K1/aMbQ+ufEtmS
	LQpMbgY+7wyj7b7BwQWY0h/RPl6KZeJnMGf9A70a1H6Czxk2/n9N4xnhO3suFoB3Ye79yBVuQOjzJ
	mpJadeuFcYPwC0SU1qNsL6GjFQEzyrr+izZHWnbcy8tvp6Fppu8EinF/RODe7JsT3jyI=;
Message-ID: <083b288c-77c8-5746-fe49-267bf120a139@xen.org>
Date: Tue, 22 Mar 2022 13:52:59 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH] xen/arm: skip first 32 bytes of zimage32
To: Stefano Stabellini <sstabellini@kernel.org>
Cc: bertrand.marquis@arm.com, Volodymyr_Babchuk@epam.com,
 Stefano Stabellini <stefano.stabellini@xilinx.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <20220320010509.3605525-1-sstabellini@kernel.org>
 <33f1ea14-4486-be3d-ca9f-a82274078dba@xen.org>
 <1a8ed108-7485-1ed5-3819-fd921164662b@xen.org>
 <alpine.DEB.2.22.394.2203211214030.2910984@ubuntu-linux-20-04-desktop>
 <3d4194b2-b5e8-2fde-6000-9fd4674297ac@xen.org>
 <alpine.DEB.2.22.394.2203211442540.2910984@ubuntu-linux-20-04-desktop>
From: Julien Grall <julien@xen.org>
In-Reply-To: <alpine.DEB.2.22.394.2203211442540.2910984@ubuntu-linux-20-04-desktop>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 21/03/2022 22:07, Stefano Stabellini wrote:
> On Mon, 21 Mar 2022, Julien Grall wrote:
>>> This is the list of kernels that I tried and failed:
>>>
>>> - Debian Buster
>>> - Debian Bullseye
>>> - vanilla 4.9
>>> - vanilla 4.10
>>
>> Does this mean you where using v4.{9,10}.0 rather than the stable branch?
>>
>> Note that AFAICT, 4.10 is not even supported by the kernel communinty (see
>> [1]).
> 
> Yeah... I was trying to bisect the Debian kernel failure. That is how I
> discovered that CONFIG_EFI was causing it. So yes, I only tried the
> vanilla, now unsupported, releases.
> 
> 
>>> The latest Alpine Linux kernel also doesn't boot, but that one doesn't
>>> boot even with the fix for other reason. (More in the other email.)
>>>
>>>
>>>   From a Xen gitlab-ci perspective, we just need a kernel that works.
>>> Ideally, we wouldn't rebuild our own but reuse an existing kernel
>>> because that is one less things to maintain in the gitlab-ci build.
>>>
>>> We have a couple of options to make progress on the QEMU32 gitlab-ci
>>> test:
>>>
>>> 1) use Debian Jessie in gitlab-ci and do not commit the Xen-side fix,
>>>      file a Debian bug and revisit the situation in a couple of months
>>>      (Debian might get the fix in the meantime)
>>
>> Why do we need to use Debian here? Couldn't we use Ubuntu (or any distros that
>> have a newer kernel)?
> 
> We could use something else but see below.
> 
> 
>>> 2) commit the Xen fix and use Debian Bullseye right now
>>>
>>> 3) do not commit the Xen fix and build our own kernel now
>>>
>>>
>>> All of these options work. My preference is 1) or 2).
>>>
>>> Between 1) and 2) I have a slight preference for 2) for this reason: I
>>> know that in Open Source we try to fix bugs wherever they are (kernel
>>> project, QEMU project, Debian project) rather than working around them,
>>> but in this case it looks like there is a significant amount of binaries
>>> out there that require an update before they can boot on Xen.
>>
>> My problem here is the bug is not Xen specific. You would exactly have the
>> same problem if you were booting on baremetal. But as Andre wrote in his
>> commit message, this is only working by luck.
>>
>> So we are setting another bad precendence by preserving the luck.
>>
>> I appreciate we recently agreed to merge the code to emulate ldr/str. But this
>> was based on the fact the Arm Arm doesn't clearly forbid such access. This is
>> quite different here as the instructions are UNDEFINED.
> 
> Yeah, I understand your point and I also kind of agree.
> 
> 
>> So I am not willing to accept a lot of code in Xen just to workaround a
>> software bug (see more below).
>>
>>> I think it
>>> is one of those times where it is worth considering the Xen fix, or
>>> should I say workaround, if it is considered harmless.
>>
>> The problem with your workaround is now the zImage will be loaded in a
>> different aligned. For instance, if the symbol <foo> was 2MB aligned, now, it
>> will be aligned to 2MB - 32. See kernel_zimage_load().
>>
>> The booting protocol (see Documentation/arm/booting.rst). Doesn't look to
>> impose an alignment. But I wouldn't be surprised if there is an assumption
>> here.
>>
>> Furthermore, there are some problem if the kernel is expected to be loaded a
>> specific address.
>>
>> I do expect the code to become more convoluted. This would also have to be
>> duplicated in the tools side. Overall, this will likely be more than I am
>> willing to accept for this issue.
>>
>> Therefore I would like to suggest a more simple workaround. Per the commit
>> message of the Linux bug fix, U-boot and direct loading are not affected
>> because the bit "Z" is set.
>>
>> So how about updating PSR_GUEST32_INIT to set Z?
> 
> That worked! Excellent suggestion and much safer than the 32 byte
> workaround. I tested with the Debian Bullseye kernel.

I would not say it is safer because we will be relying on the processor 
(here QEMU) to check the condition and ignore the UNPREDICTABLE 
behavior. So, in theory, the issue could reappear on a new processor. 
Note that I haven't checked what the Arm Arm says here.

But the workaround is less intrusive. Hence, why I prefer this approach.

> 
> I think you might have a better suggestion for the commit message.
> 
> ---
> xen/arm: set CPSR Z bit when creating aarch32 guests
> 
> The first 32 bytes of zImage32 are NOPs. When CONFIG_EFI is enabled in

The format is zImage not zImage32.

> the kernel, certain versions of Linux have a bug in the way the initial
> NOP instructions gets encoded (invalid encoding), resulting in an
> unbootable kernel.

This paragraph is a bit difficult to understand. I would say "certain 
version of Linux will use a UNPREDICATABLE NOP encoding".

Also, I would suggest make clear that the issue depends on the processor.

  See commit a92882a4d270 in the Linux kernel for all
> the details.
> 
> All kernel releases starting from Linux 4.9 without commit a92882a4d270
> are affected.
> 
> Fortunately there is a simple workaround: setting the "Z" bit in CPSR
> make it so those invalid  NOP instructions are never executed.

I would say that the instruction is conditional (not equal). So, on QEMU 
at least, the instruction will end up to be ignored and not generate an 
UNDEFINED (XXX this needs to be checked).

> Setting
> the "Z" bit makes those kernel versions bootable again and it is
> harmless in the other cases.
> 
> Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
> 
> diff --git a/xen/include/public/arch-arm.h b/xen/include/public/arch-arm.h
> index 94b31511dd..309684e946 100644
> --- a/xen/include/public/arch-arm.h
> +++ b/xen/include/public/arch-arm.h
> @@ -361,6 +361,7 @@ typedef uint64_t xen_callback_t;
>   #define PSR_DBG_MASK    (1<<9)        /* arm64: Debug Exception mask */
>   #define PSR_IT_MASK     (0x0600fc00)  /* Thumb If-Then Mask */
>   #define PSR_JAZELLE     (1<<24)       /* Jazelle Mode */
> +#define PSR_Z           (1<<30)       /* Zero condition flag */
>   
>   /* 32 bit modes */
>   #define PSR_MODE_USR 0x10
> @@ -383,7 +384,7 @@ typedef uint64_t xen_callback_t;
>   #define PSR_MODE_EL1t 0x04
>   #define PSR_MODE_EL0t 0x00
>   
> -#define PSR_GUEST32_INIT  (PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MODE_SVC)
> +#define PSR_GUEST32_INIT  (PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MODE_SVC|PSR_Z)

The flags are set from the highest to the lowest bit. I would like to 
keep it like that as it helps to match with the Arm Arm. So can you move 
PSR_Z to the beginning?

Also, please add a comment in on top of PSR_GUEST32_INIT explaining why 
we set Z.

>   #define PSR_GUEST64_INIT (PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MODE_EL1h)
>   
>   #define SCTLR_GUEST_INIT    xen_mk_ullong(0x00c50078)

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 14:01:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 14:01:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293490.498598 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWf4T-0002ht-6q; Tue, 22 Mar 2022 14:01:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293490.498598; Tue, 22 Mar 2022 14:01:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWf4T-0002hm-3M; Tue, 22 Mar 2022 14:01:13 +0000
Received: by outflank-mailman (input) for mailman id 293490;
 Tue, 22 Mar 2022 14:01:11 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nWf4R-0002hg-GF
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 14:01:11 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWf4Q-0007BY-UO; Tue, 22 Mar 2022 14:01:10 +0000
Received: from 54-240-197-225.amazon.com ([54.240.197.225]
 helo=[192.168.19.186]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWf4Q-0000vI-Nr; Tue, 22 Mar 2022 14:01:10 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=R42JzBp5nKxJFY88ssGfz+Nt0nuC0avwKE1Ch+sSVYk=; b=cp8HKUIOUkmdwGTdbHtQ4LwBur
	WkApsaaUcYEuc7xeCJ/mKFPuZV+JuWnia4MMkYnIA+A9UwGk/Zb/5HqAnii2FLvd3zfxXVDack200
	pmDD/tdW8lApo7ootxs8nFIDV+il2Vz4vhogps8J72kT3DC3YlHHo9uIvPK48IHgN29M=;
Message-ID: <acbf28a2-31b9-2a9c-6b42-6d386b47bfbf@xen.org>
Date: Tue, 22 Mar 2022 14:01:07 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
To: Luca Fancellu <Luca.Fancellu@arm.com>
Cc: Xen-devel <xen-devel@lists.xenproject.org>,
 Bertrand Marquis <Bertrand.Marquis@arm.com>, Wei Chen <Wei.Chen@arm.com>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Wei Liu <wl@xen.org>, Juergen Gross <jgross@suse.com>,
 Dario Faggioli <dfaggioli@suse.com>
References: <20220318152541.7460-1-luca.fancellu@arm.com>
 <20220318152541.7460-5-luca.fancellu@arm.com>
 <274f81b0-c164-4437-3d05-243e147330a9@xen.org>
 <0FA7F6D7-0B40-4B75-9752-7FE48D0FCA5C@arm.com>
 <9f3d7713-4e4b-58f8-d7a1-b42ef152a7ab@xen.org>
 <AE272A2A-EA5B-4217-AECE-80AE04207B55@arm.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <AE272A2A-EA5B-4217-AECE-80AE04207B55@arm.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi,

On 22/03/2022 09:52, Luca Fancellu wrote:
>>>>
>>>> Can you document why this is necessary on x86 but not on other architectures?
>>> Hi Julien,
>>> I received the warning by Juergen here: https://patchwork.kernel.org/comment/24740762/ that at least on x86 there could be
>>> some problems if cpu0 is not in cpupool0, I tested it on arm and it was working fine and I didn’t find any restriction.
>>
>> What exactly did you test on Arm?
>>
> 
> I have tested start/stop of some guest, moving cpus between cpupools, create/destroy cpupools, shutdown of Dom0
> 
> 
> [ from your last mail ]
>>>>
>>>> If dom0 must run on core0 and core0 is Little then you cannot build a system where dom0 is running on big cores.
>>>> If the limitation is not there, you can build such a configuration without any dependency to the boot core type.
>>> This might not be completely clear so let me rephrase:
>>> In the current system:
>>> - dom0 must run on cpupool-0
>>
>> I don't think we need this restriction. In fact, with this series it will become more a problem because the cpupool ID will based on how we parse the Device-Tree.
>>
>> So for dom0, we need to specify explicitely the cpupool to be used.
>>
>>> - cpupool-0 must contain the boot core
>>> - consequence: dom0 must run on the boot core
>>> If boot core is little, you cannot build as system where dom0 runs only on the big cores.
>>> Removing the second limitation (which is not required on arm) is making it possible.
>>
>> IMHO removing the second restriction is a lot more risky than removing the first one.
> 
> I see your point, my concern about moving Dom0 on another cpupool, different from cpupool0, is that we give the
> opportunity to destroy the cpupool0 (we can’t let that happen), or remove every cpu from cpupool0.

 From my understanding a cpupool can only be destroyed when there are no 
more CPUs in the pool. Given that cpu0 has to be in pool0 then this 
should prevent the pool to be destroyed.

Now, it is quite possible that we don't have a check to prevent CPU0 to 
be removed from cpupool0. If so, then I would argue we should add the 
check otherwise it is pointless to prevent cpu0 to be initially added in 
another pool than pool0 but can be moved afterwards.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 14:41:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 14:41:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293501.498613 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWfh1-00071D-Bo; Tue, 22 Mar 2022 14:41:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293501.498613; Tue, 22 Mar 2022 14:41:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWfh1-000716-7h; Tue, 22 Mar 2022 14:41:03 +0000
Received: by outflank-mailman (input) for mailman id 293501;
 Tue, 22 Mar 2022 14:41:01 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWfgz-00070w-JA; Tue, 22 Mar 2022 14:41:01 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWfgz-0007rp-HL; Tue, 22 Mar 2022 14:41:01 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWfgz-00026y-9Y; Tue, 22 Mar 2022 14:41:01 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWfgz-0003om-98; Tue, 22 Mar 2022 14:41:01 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=+Y+J6bCh+7tMUGIymjSZ/PGdEOS8RPCqnqBDEMVp8sw=; b=6okFZz+jHJmGUE0jEhetlCuV3X
	N1KJyB203ksnhzyAKOgoXGn+MWfnatCRy0WKZ5N1q4qzxKPiYk9VYGAHXdxG0/4VUV1Ck8kXXHBhs
	qARso1TY+dTLt0hNe0dXDsVkkTKF0P9VjoRH//xlmqTrxW99wKWopE0IZ1YLDibcQjEU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168780-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168780: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 22 Mar 2022 14:41:01 +0000

flight 168780 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168780/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   22 days
Failing since        168258  2022-03-01 01:55:31 Z   21 days  223 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    0 days    4 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 15:01:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 15:01:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293526.498632 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWg0h-0001AX-4B; Tue, 22 Mar 2022 15:01:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293526.498632; Tue, 22 Mar 2022 15:01:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWg0h-0001AQ-1D; Tue, 22 Mar 2022 15:01:23 +0000
Received: by outflank-mailman (input) for mailman id 293526;
 Tue, 22 Mar 2022 15:01:22 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=eYg4=UB=invisiblethingslab.com=marmarek@srs-se1.protection.inumbo.net>)
 id 1nWg0g-0001AK-7a
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 15:01:22 +0000
Received: from out5-smtp.messagingengine.com (out5-smtp.messagingengine.com
 [66.111.4.29]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ee301269-a9f0-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 16:01:20 +0100 (CET)
Received: from compute4.internal (compute4.nyi.internal [10.202.2.44])
 by mailout.nyi.internal (Postfix) with ESMTP id 175645C01AC;
 Tue, 22 Mar 2022 11:01:19 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163])
 by compute4.internal (MEProxy); Tue, 22 Mar 2022 11:01:19 -0400
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Tue,
 22 Mar 2022 11:01:12 -0400 (EDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ee301269-a9f0-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:cc:content-type:date:date:from:from
	:in-reply-to:in-reply-to:message-id:mime-version:references
	:reply-to:sender:subject:subject:to:to:x-me-proxy:x-me-proxy
	:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=GxtxbYlkQTbFTYtUr
	iPtKmGLveyF5aFZoWRUrcmK4M0=; b=izl52bQ34EikLTdZczh3GO0AA2b5AEPZW
	mH+m0qymVjppkvPWjZjrxcLfYkxZy1/Vt1+Q/LA3+G6FqEcHYdSIQTclSNYyEHw9
	pZDzMSVF+AunWw6s9k37IgFJJaAgQBNSh1jN4q+3D7JSnwXWIJDQb8R3o4CSKkdb
	Qv7ZEC0OEoSvr5FH43sUci7xgL+TLzwkf2hqJTuvn+BKRvooYUOoai/a36oVBszB
	zyS/3HTf/fi0ldwpSX54MVhWrQ9d5l599nFVIT20+16g8xbJV+OB6oRzYR552Soq
	F2Cp0mt8UGWJ7056hpU1MciVoeiRMduBB5EnLBTRAZtkzr4/gyfdA==
X-ME-Sender: <xms:uOQ5YjPZ6nVOXyb10yztOtQ-A3pmYAudZoCBistpDSRXH7X0Tc_JtA>
    <xme:uOQ5Yt9oHPEu7CkwD99vlsBOadONIGu68EKdqLqzrU-SGqiiNJj92Yg68HHu30BwP
    Y66TLSbBC9nOA>
X-ME-Received: <xmr:uOQ5YiRZRTbXhvNsbCsuZSGzgtP_m2WjDYApaMdTRsNk8hbUqmFJq38gCp6IPbGeesSm7PR4m8CSO7ySDYhpwHLWepgaKxsx9g>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddrudeghedgieelucetufdoteggodetrfdotf
    fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen
    uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne
    cujfgurhepfffhvffukfhfgggtuggjsehgtderredttdejnecuhfhrohhmpeforghrvghk
    ucforghrtgiihihkohifshhkihdqifpkrhgvtghkihcuoehmrghrmhgrrhgvkhesihhnvh
    hishhisghlvghthhhinhhgshhlrggsrdgtohhmqeenucggtffrrghtthgvrhhnpeetveff
    iefghfekhffggeeffffhgeevieektedthfehveeiheeiiedtudegfeetffenucevlhhush
    htvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpehmrghrmhgrrhgvkhes
    ihhnvhhishhisghlvghthhhinhhgshhlrggsrdgtohhm
X-ME-Proxy: <xmx:ueQ5Ynu4sBMPGhuOKPzkZ4a-Ox9gL-MnUL5Xg_DK83gkt6QRwFzEvQ>
    <xmx:ueQ5YrfSpB-3LZX20rY9TWG_lxIB3NTEIgvppSUOOEsBdGj0lRs9hA>
    <xmx:ueQ5Yj2-GAJjphaNwXG-wUDhYIIW126t9eLVqMud849zrW8O93_Lsg>
    <xmx:v-Q5Yrn2znepdKRzTKlGldeqo8vqO38Yk_JGZQxPjcwaM2qU1c7IcA>
Date: Tue, 22 Mar 2022 16:01:09 +0100
From: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: Juergen Gross <jgross@suse.com>
Cc: xen-devel <xen-devel@lists.xenproject.org>,
	Jan Beulich <jbeulich@suse.com>
Subject: Re: "BUG: using smp_processor_id() in preemptible" on resume from S3
Message-ID: <YjnktbWvwGLC7ltk@mail-itl>
References: <Yjj7liZrbRUXXrvi@mail-itl>
 <be9f7249-4449-c46f-fad3-b1adbc8d7ea5@suse.com>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="XcaPvB+fuLrp42Of"
Content-Disposition: inline
In-Reply-To: <be9f7249-4449-c46f-fad3-b1adbc8d7ea5@suse.com>


--XcaPvB+fuLrp42Of
Content-Type: text/plain; protected-headers=v1; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Date: Tue, 22 Mar 2022 16:01:09 +0100
From: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: Juergen Gross <jgross@suse.com>
Cc: xen-devel <xen-devel@lists.xenproject.org>,
	Jan Beulich <jbeulich@suse.com>
Subject: Re: "BUG: using smp_processor_id() in preemptible" on resume from S3

On Tue, Mar 22, 2022 at 08:12:53AM +0100, Juergen Gross wrote:
> Hi Marek,
>=20
> On 21.03.22 23:26, Marek Marczykowski-G=C3=B3recki wrote:
> > Hi,
> >=20
> > After updating from 5.14.15 dom0 kernel to 5.16.13 I started getting
> > this on resume from S3:
> >=20
> > [   88.082751] ACPI: PM: Low-level resume complete
> > [   88.087933] ACPI: EC: EC started
> > [   88.091464] ACPI: PM: Restoring platform NVS memory
> > [   88.097166] xen_acpi_processor: Uploading Xen processor PM info
> > [   88.103850] Enabling non-boot CPUs ...
> > [   88.108128] installing Xen timer for CPU 1
> > [   88.112763] BUG: using smp_processor_id() in preemptible [00000000] =
code: systemd-sleep/7138
> > [   88.122256] caller is is_xen_pmu+0x12/0x30
> > [   88.126937] CPU: 0 PID: 7138 Comm: systemd-sleep Tainted: G        W=
         5.16.13-2.fc32.qubes.x86_64 #1
> > [   88.137939] Hardware name: Star Labs StarBook/StarBook, BIOS 7.97 03=
/21/2022
> > [   88.145930] Call Trace:
> > [   88.148757]  <TASK>
> > [   88.151193]  dump_stack_lvl+0x48/0x5e
> > [   88.155381]  check_preemption_disabled+0xde/0xe0
> > [   88.160641]  is_xen_pmu+0x12/0x30
> > [   88.164441]  xen_smp_intr_init_pv+0x75/0x100
> > [   88.169311]  ? xen_read_cr0+0x20/0x20
> > [   88.173502]  xen_cpu_up_prepare_pv+0x3e/0x90
>=20
> Thanks for the report.
>=20
> Could you please test whether the attached patch is helping?

Yes, that helps, thanks!

--=20
Best Regards,
Marek Marczykowski-G=C3=B3recki
Invisible Things Lab

--XcaPvB+fuLrp42Of
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAmI55LUACgkQ24/THMrX
1ywH/wf/fz7xF8GffGsD5ae2XQIDIG1d2fUPPKasp/0sICeB/mUkm+6r1xZY6T4F
pXWX1NEfJs0OHxluE6A61sm7cTY4pzeLvwg/i+2oc+fdKq0Ozr7dEYc8xfd6z81b
iDGjFCDbWWMdCcRu17FKKUGztlVMU+bdYA2IM/DJ3ZvU4vWomZxnHD/cmUTAOb5X
RC7YX/KKnjsVC3IBrgNb+HcPv5n7uhECk9eipWFeBcjPMmSMsDbhnJ20dAgSi1i6
DYCBOD7+mdoP2XXArmIrvx7Ia9U0hhNwDgPcGd5CmlbEQykRjTfsRybG4RdW1c3F
TL8tHROtE0GGs491mYGxrwWMz8Zkqg==
=PnIr
-----END PGP SIGNATURE-----

--XcaPvB+fuLrp42Of--


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 15:06:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 15:06:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293529.498643 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWg5q-0001nq-Q9; Tue, 22 Mar 2022 15:06:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293529.498643; Tue, 22 Mar 2022 15:06:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWg5q-0001nj-L4; Tue, 22 Mar 2022 15:06:42 +0000
Received: by outflank-mailman (input) for mailman id 293529;
 Tue, 22 Mar 2022 15:06:42 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=RlTh=UB=arm.com=Teo.CouprieDiaz@srs-se1.protection.inumbo.net>)
 id 1nWg5p-0001nd-SM
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 15:06:41 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on20603.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::603])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ad6eba91-a9f1-11ec-a405-831a346695d4;
 Tue, 22 Mar 2022 16:06:40 +0100 (CET)
Received: from AM6P192CA0089.EURP192.PROD.OUTLOOK.COM (2603:10a6:209:8d::30)
 by PA4PR08MB6125.eurprd08.prod.outlook.com (2603:10a6:102:e1::11) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Tue, 22 Mar
 2022 15:06:33 +0000
Received: from VE1EUR03FT059.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:8d:cafe::2a) by AM6P192CA0089.outlook.office365.com
 (2603:10a6:209:8d::30) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17 via Frontend
 Transport; Tue, 22 Mar 2022 15:06:32 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT059.mail.protection.outlook.com (10.152.19.60) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Tue, 22 Mar 2022 15:06:31 +0000
Received: ("Tessian outbound 741ca6c82739:v113");
 Tue, 22 Mar 2022 15:06:31 +0000
Received: from ff921e109d43.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 2A5EF8FA-5081-4A38-90B3-B9524AE3FA9D.1; 
 Tue, 22 Mar 2022 15:06:24 +0000
Received: from EUR02-VE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id ff921e109d43.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 22 Mar 2022 15:06:24 +0000
Received: from AS8PR08MB6134.eurprd08.prod.outlook.com (2603:10a6:20b:291::22)
 by PR2PR08MB4796.eurprd08.prod.outlook.com (2603:10a6:101:21::10)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Tue, 22 Mar
 2022 15:06:21 +0000
Received: from AS8PR08MB6134.eurprd08.prod.outlook.com
 ([fe80::2d2d:b7f2:90ae:f9d2]) by AS8PR08MB6134.eurprd08.prod.outlook.com
 ([fe80::2d2d:b7f2:90ae:f9d2%7]) with mapi id 15.20.5081.023; Tue, 22 Mar 2022
 15:06:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ad6eba91-a9f1-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=CrGbsiuzqX10hQiVT+FeX24FrHwvPIT5gGTXeauTccA=;
 b=VUTsV+PXVnmktmx1TD13L/NKjUj4+hOT8uhMm7Dyxdb5DAqxTJgMmeK4LUImlYCHn+0v9TpM5BjKIwiJIZVJSlOUuhl2smQ6f9l2C1BJM8ivm75L3bLqstVK+hiowow6PBbebAYFM8CQjjorZhVmoZPcU7Qe2f81XIRaa3EU55Q=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: d6bfdfe40e9970aa
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Ve8tVnxN3YB+c7LthSAuSt8K/K+XGn2y9c8Qvtjx++5IKASnAmGkEHsorEb6dcX+kLPeDhDZwlHdbp31we5N6T7ad5uUKrYF+bzZkOwm8v9e6Wl1MxBZc+0MEh4dO19OUJyXHL6erb7fxuYpwwV+SQfLddh0tUEnqSygE93ZCnJAFqHlA/gMmRezn/D5GCAx2IXpjw4exZg2LeM6BqbN7Z9GidBqCEJhZnJ8Y3rkV/f4riGWJ63a3VKaAfs3X9++oDot2jlHCiRCuyzHjczsOxu9YKiflQjtJ0GaClM88Cy2G7wCI5PD3praA53JIZx2gUxD8HP6+2+dIuoAmy3TYw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=CrGbsiuzqX10hQiVT+FeX24FrHwvPIT5gGTXeauTccA=;
 b=Z+TFBxtsCvBje03xgpCQNLNh2vXY8JhGJwSolGlOeoN6G+vmLEfIpX0dMCO4BwUTlDtSlzDvW7K0Nu5/ZluS8QwNMb4oE1S0TSSsCvc7DOqmE0TgnLeXRZ4luMSvYSq9EFBey9lXmyGBurewspHN9idf4evJoHufjfd9YzIjhZmfO6eMLwqXfy1+GALbqTrooNqE5TAj0QBWAwTnRZKfXOEs4wKwXIt8J7wS8NiYXfhpLcGXy7v0kuoQyzFpnMmN1vl9pTbxtt/brWWea5sWUuNEIvsbDGAIxFQweEBjxlhXMmVSecdGkLifwwIU/8KuFBYKW35nBmj0L1hDMvMxMg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=CrGbsiuzqX10hQiVT+FeX24FrHwvPIT5gGTXeauTccA=;
 b=VUTsV+PXVnmktmx1TD13L/NKjUj4+hOT8uhMm7Dyxdb5DAqxTJgMmeK4LUImlYCHn+0v9TpM5BjKIwiJIZVJSlOUuhl2smQ6f9l2C1BJM8ivm75L3bLqstVK+hiowow6PBbebAYFM8CQjjorZhVmoZPcU7Qe2f81XIRaa3EU55Q=
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
Message-ID: <81b87e05-215a-2d75-6fe7-641d5be11686@arm.com>
Date: Tue, 22 Mar 2022 15:06:17 +0000
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
To: jgross@suse.com
Cc: andrew.cooper3@citrix.com, christopher.w.clark@gmail.com,
 dfaggioli@suse.com, dgdegra@tycho.nsa.gov, dpsmith@apertussolutions.com,
 george.dunlap@citrix.com, jbeulich@suse.com, julien@xen.org,
 roger.pau@citrix.com, sstabellini@kernel.org, wl@xen.org,
 xen-devel@lists.xenproject.org
References: <20220310073420.15622-12-jgross@suse.com>
Subject: Re: [PATCH v4 11/11] xen/x86: remove cf_check attribute from
 hypercall handlers
Content-Language: en-US
From: Teo Couprie Diaz <teo.coupriediaz@arm.com>
In-Reply-To: <20220310073420.15622-12-jgross@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO2P265CA0304.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:a5::28) To AS8PR08MB6134.eurprd08.prod.outlook.com
 (2603:10a6:20b:291::22)
MIME-Version: 1.0
X-MS-Office365-Filtering-Correlation-Id: 7e839cdc-0a70-441b-73d6-08da0c158cb3
X-MS-TrafficTypeDiagnostic:
	PR2PR08MB4796:EE_|VE1EUR03FT059:EE_|PA4PR08MB6125:EE_
X-Microsoft-Antispam-PRVS:
	<PA4PR08MB61259A2D02A2B1E7F6937212FA179@PA4PR08MB6125.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
NoDisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AS8PR08MB6134.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(2906002)(86362001)(66946007)(7416002)(8936002)(4326008)(5660300002)(36756003)(4744005)(31686004)(186003)(2616005)(26005)(508600001)(31696002)(316002)(6916009)(66556008)(66476007)(53546011)(6666004)(6506007)(38100700002)(6486002)(6512007)(8676002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PR2PR08MB4796
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT059.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	a94fc516-fdaa-4052-c921-08da0c15855f
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	NW5XJdHLP6D4zCmRtyRXHva2/8BFpoU6yARORkhDRMsKjKHcLCigENGv3QNU2JiNvowggf8wImS565X2ns20bx8j5Gn2x0BohMnk+2U2MWbP8OSZRB29TdjUBcs/shr2WACpHMQV1BkKP2ektcZ6sgjuxsGW1glatmamTQRhGphMjq7Wto5OdYE8c8v3xq7NE7Twz1f9RZ7iWXBMHJoDYqHsxoNL6Swu1rp1qzji5DTqKMUm+gHM0Bf8/4vkyLhwAZZ9s70vI5hQBOO2SAbSMe9+4E6cLxMkDsxLtT3d+k+rg/CQugqIjjqeZcAVJud9tX6ViCKWCUwNOgGFlvY71PxlW//pSWdc2Nkd8KC86z9atFaEZu8bFrlV1RMgpEhJbeiiBHVWBLpKKaXl+z8pvOlRKdf8J2N30oQ3CVod5Akrp6PjsL8tOQYKyvkTt2HSpTpQa0M8odzJC8ttKgUetNvf6HywQy5kGK6zY+ymjyE5gPJkOakLh6pwelnc1Z0cgPgRQyNU4AR9C0mrNKmTl4pbgtBcGch5gcP+FVNdhGq48+VYwd4TbB6aLcqD+z3OSFNIcH4hIuC5vBmmRBYnRMkz6bGQoH24zGR3kEAEjEKc2renwixw/cc4+dcR7LiUaV55sapG/f9zRMzBt+HRy4PB1tnydyhBT8icFy2Q6VhwT8v4skzJhFx5e0KiBkI+WRLDtND9JSQr5N5+TmTFqg==
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(336012)(26005)(5660300002)(508600001)(6486002)(186003)(31686004)(2906002)(356005)(81166007)(4744005)(8936002)(36756003)(40460700003)(6666004)(34206002)(70206006)(70586007)(4326008)(8676002)(2616005)(6506007)(316002)(36860700001)(47076005)(86362001)(31696002)(82310400004)(6512007)(53546011)(43740500002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Mar 2022 15:06:31.9705
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 7e839cdc-0a70-441b-73d6-08da0c158cb3
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT059.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR08MB6125

Hello,

On 3/10/22 02:34, Juergen Gross wrote:
> Now that the hypercall handlers are all being called directly instead
> through a function vector, the "cf_check" attribute can be removed.
> 
> Signed-off-by: Juergen Gross <jgross@suse.com>

Tested-by: Téo Couprie Diaz <teo.coupriediaz@arm.com>

I tested the latest patch series on Armv8 on the FVP and N1SDP platforms. Dom0 and guests are booting, no issues with networking between guests and dom0: everything looks good.
Regards,
Téo



From xen-devel-bounces@lists.xenproject.org Tue Mar 22 15:10:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 15:10:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293536.498654 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWg9v-0003Hr-Dp; Tue, 22 Mar 2022 15:10:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293536.498654; Tue, 22 Mar 2022 15:10:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWg9v-0003Hk-9w; Tue, 22 Mar 2022 15:10:55 +0000
Received: by outflank-mailman (input) for mailman id 293536;
 Tue, 22 Mar 2022 15:10:54 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=lDz8=UB=citrix.com=prvs=07344700e=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nWg9u-0003He-5h
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 15:10:54 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 425d3835-a9f2-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 16:10:52 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 425d3835-a9f2-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647961852;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=rJ1Xk2Smqnac0gsdG/9UAo8/R8+S4fhGVD96K3UI1Ig=;
  b=FMImZy2x9bdAn7w80XWyxz3EXsoPzkarUXCrjVxDOeCcF9UHiLkRO/+z
   ONnKSjs+C9vHejKGb8yGN9LmNMsSZ5RayqqDBTgWs0kzTnMwVDO835jpw
   Te8qGG6kzLqoEud/S4WWRvzH+f0eH9oy4ygQw1gJTWqFS/sATUz0Mvsyw
   c=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 69244296
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:esOCOaDJAGSajxVW/97jw5YqxClBgxIJ4kV8jS/XYbTApGgn1jwGm
 2AaUGrXOKuDZDGge9x0bt/i8RwDu5LQzdVqQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vj2NYy6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhx1
 PAdm6OKEjwJL43Dx90UQxRlTgZxaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguwKKsXxMZxZkXZn1TzDVt4tQIzZQrWM7thdtNs1rp4fR6qCP
 ZtHAdZpRCvMURlOFnccMYNkteaHnnbzVxYJkE3A8MLb5ECMlVcsgdABKuH9eMGMA8NcnU+ap
 2fP12X/HhwecteYzFKt8X+yh+mJgSLyXqoTEqG18rhhh1j77mANEhQcWF+TqvC/lke0HdRSN
 yQ85S4GvaU0skuxQbHVQxS9qWXCuhMaVMtdF8U77h2Azuzf5APxLngJSHtNZcIrsOcyRCc2z
 RmZktXxHzttvbaJD3WH+d+8rzm/JCwUJm8qfjIfQE0O5NyLnW0opkuRFJA5Svfz14CrX2Grq
 9yXkMQgr7UPqJ4l6J/gxnDWoz3zn5HZQzNowQqCCwpJ8ThFTIKiYoWp733S4vBBMJuVQzG9g
 ZQUpySNxLtQVM/QzURhVM1IRej0vKjdbFUwlHY1R/EcGyKRF2lPlGy6yBV3Pw9XP8kNYlcFi
 2eD6FoKtPe/0JZHBJKbgr5d6ex3lMAM9vy/D5g4i+aihLArL2drGwk0OSatM5jFyhRErE3GE
 c7znTyQJXgbE7976zG9Wv0Q17Qmrghnmz+MFcCkkkv2i+TDDJJwdVvjGAHSBgzexPnZyDg5D
 v4Fb5fao/mheLOWjtbrHX47cglRcClT6WHeoM1LbO+TSjeK60l6Y8I9NYgJItQ/94wMz7+g1
 ijkBidwlQqu7VWaeF7iQi0yN9vSsWNX8CtT0doEZg3zhRDOoO+Hsc8iSnfAVeJ+pbI5kqIsE
 aVtlgfpKq0ndwkrMg81NPHVhIdjaA6qlUSJOS+kayI4ZJluW0rC/dqMQ+cl3HBm4vaf3Sfmn
 4Cd6w==
IronPort-HdrOrdr: A9a23:o7DTTqAsop+J8Q7lHegIsceALOsnbusQ8zAXPh9KJiC9I/b1qy
 nxppkmPEfP+UsssHFJo6HkBEEZKUmsu6KdkrNhQYtKOzOW+VdATbsSorcKpgePJ8SQzJ8l6U
 4NSdkcNDS0NykBsS+Y2nj5Lz9D+qj+zEnAv463pB0NLT2CKZsQlDuRYjzrSHGeLzM2YabRYa
 DsgPav0ADQHkj/AP7LZEUtbqzmnZnmhZjmaRkJC1oM8w+Vlw6l77b8Dlyxwgoeeykn+8ZgzU
 H11yjCoomzufCyzRHRk0XJ6Y5NpdfnwtxfQOSRl8kuLCn2gArAXvUiZ1TChkFxnAic0idsrD
 D+mWZnAy210QKJQoiBm2qo5+An6kd315at8y7CvZKpm72HeNtzMbs+uWseSGqF16NohqAN7E
 oAtVjpxqZ/HFfOmj/w6MPPUAwvnk2ooWA6mepWlHBHV5ACAYUh57D3U3klZKvoMRiKoLzPKt
 MeR/00JcwmBm+yfjTcpC1i0dasVnM8ElOPRVUDoNWc13xTkGpix0UVycQDljNYnahNB6Vs9q
 DBKOBlhbtORsgZYeZ0A/oAW9K+DijITQjXOGyfLFz7HOUMOm7LqZTw/LIpjdvaNaAg3d83gt
 DMQVlYvWk9dwbnDtCPxoRC9lTXTGC0TV3Wu4hjDlhCy8vBrZbQQF++oQoV4ridSt0kc7jmZ8
 o=
X-IronPort-AV: E=Sophos;i="5.90,201,1643691600"; 
   d="scan'208";a="69244296"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=BdGEGu6tk6FB1jHKd0nejgHG+jQZqM1u7nzPJ+Ar9QLKI0dbcerJhlZe09+hToKFqMnnfbpjGZ0RL86cjv8X9qpHZFc40LDr+SOejAkmo48tQ8CjDNfkCceB4+9eLY784u7+oGpMJgL6Vy3u0J4GFyVs9Dg8/+sBApgEu1Wa3pHV9rj/28oi6yZnKmXXOszRaCfiRRJeD+/jMkFu/XV0RUrhEtJZy0KD/LofeAoKlhx9kSE7w1MVMfwOFvZUdbt/QCQmZyBW2+Szsr+B9fE/MZE+V90UdjP+0ovnjiFJj2OxX5A6nLcVxVy/EatHf+jLuywDWd3Cgse2DAg9BRJICA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=rJ1Xk2Smqnac0gsdG/9UAo8/R8+S4fhGVD96K3UI1Ig=;
 b=TKJXOnSZXRvNO3tyI9Icr4qm9fRK6qpcoNPO73i6hU3sOGrZa/6hi+sW5r/tu0V8YhkworHGXMuMQ6u4zaB/znL4wH6eiuYMNZRFIkwJvYX2RcR5dIWF8SosJ1UUBkmKveE+8RehI60WQH+U/IdgO4H/z68IDdhriItHwz6ZhcgR/2twd2ZO0qXT41YJRDbxCCWnUZ5rETZBbhtE84AXyyGBP89QacsurBVTpVAIhMG/3XcxxOrXkm7enfPaSkQcegkfj9KYv7+cNBr//3tT+kfW7V6PlRq17IV8TmyElR6FA69YW8joxPFeHguxDzX53B+9C10yxdMw+kafrbYWeA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=rJ1Xk2Smqnac0gsdG/9UAo8/R8+S4fhGVD96K3UI1Ig=;
 b=fZRuz+q4tvDFIHH3TxdBmfkq1/wSUHbd4c5r1aamGjoUZ1bjwl+Ho4UGzBzkPlHNFSQaOavuGtW35CVSQMnOQ6nWk0iy9cQzLIQ7MGMbGq2o/jYYb/xJE6eZQ/YbrnUQwgZOKn6maw5gYAW39NHd/TGnypd22Sg63Vxj6t3CAtI=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Tamas K Lengyel <tamas.lengyel@intel.com>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
CC: Jan Beulich <jbeulich@suse.com>, Roger Pau Monne <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>, Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian
	<kevin.tian@intel.com>, David Vrabel <dvrabel@cantab.net>
Subject: Re: [PATCH v4] x86/vmx: save guest non-register state in hvm_hw_cpu
Thread-Topic: [PATCH v4] x86/vmx: save guest non-register state in hvm_hw_cpu
Thread-Index: AQHYPWhtORpQ2jUrTESMnz8fIDv8cqzLgyyA
Date: Tue, 22 Mar 2022 15:10:42 +0000
Message-ID: <72c90101-55ee-b749-625f-004e40bd2745@citrix.com>
References: <a8828d68c308fa7ecbfe4387ca753ee0f80a2a7d.1647897016.git.tamas.lengyel@intel.com>
In-Reply-To: <a8828d68c308fa7ecbfe4387ca753ee0f80a2a7d.1647897016.git.tamas.lengyel@intel.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 32d0796e-d6f5-4804-8eec-08da0c1621df
x-ms-traffictypediagnostic: DM6PR03MB3866:EE_
x-ld-processed: 335836de-42ef-43a2-b145-348c2ee9ca5b,ExtAddr
x-microsoft-antispam-prvs: <DM6PR03MB38660F801B9CE9159314FB61BA179@DM6PR03MB3866.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(110136005)(54906003)(8676002)(4326008)(91956017)(76116006)(66556008)(66446008)(64756008)(66946007)(38100700002)(66476007)(122000001)(316002)(82960400001)(2906002)(508600001)(6512007)(38070700005)(26005)(6486002)(186003)(83380400001)(5660300002)(31696002)(86362001)(8936002)(53546011)(55236004)(36756003)(31686004)(6506007)(2616005)(71200400001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?YnhsZExEZ0JhaGJzSkNnZWRKMjFTYlgzQ1didWtoclBjUU9sWFY5QUswMUdO?=
 =?utf-8?B?dldSanlTd1hYckxWTEpoc09Pay9sZ0gzZm0zdWZyZ0dwMEE1bnlnYklINHQy?=
 =?utf-8?B?OEFrQzltWHdDWHVFUG1MSEdHbUZhMmNNUWNQVE1zQVBSc2c0bmJrTElZKzdD?=
 =?utf-8?B?Q2VZQUFKTkkzNENpR2MvVUZVMzQ5QklNb25oVDBWdFFmbllvRS85MmdvOVhO?=
 =?utf-8?B?WlU5alFNL2lMNm1PWDVad0czNDdWTGorMUdjc282c3BIWks1R2ozQ01malA0?=
 =?utf-8?B?QzVsVGkyTXRrblErNnVOcUtYUUt2TVhoZ2xtZXVIRFU2ZllFd2szWlplTDFi?=
 =?utf-8?B?cjNpd2V2RWMwelkwZHZhb3hSeVgvTzFLZll1eGZzT1p6aFBtMzVnT1p5dFJF?=
 =?utf-8?B?S0Q1TkVETnV6OVFBQUVwL0cyd2thM3BWaG8xL0t6aE5XZFdEb1FFWURBcjB2?=
 =?utf-8?B?RFFRZWNCWDF6TStLOEVTUUtoUS9GQ0N0aDY0cnBFZG5nNCtWay9XU1dBd01E?=
 =?utf-8?B?S2pFZ2swSDNXaXBlNDhRamtONWxqclNRL3pwU1MvRlVxb3U0cWtvN3Y3Y1JY?=
 =?utf-8?B?MENWalFpWmtQUVZ6Z1c2OHZ0VHdsWk9iNlVMVXhqeUgwYzA2N1lwKzVOWi8x?=
 =?utf-8?B?V3RzTE4ySEt6L01sb0xmZjZHeXRUWVRoUXhHa3lDaldVUWtBOHl6Q1lzSGJ4?=
 =?utf-8?B?cjVUVWRMRmVtSXFVYkN3UStFUnhua0JrUk1kRnlucUFnMnY2NUF4Uzg3VDZh?=
 =?utf-8?B?YTBPbkFrbTRnNjVpamx1M1p0NVN0ajRKd3FGamRyTXpLNHQvbGdWWlFuSzhv?=
 =?utf-8?B?Z05EenA1QVpXWlZERGRyci91Tzg1TEhra1RtTWZhN0xrTVk4Q1NsS0wwWDVx?=
 =?utf-8?B?aW0zNjg2dExveURUSTEwNHMyakNFU1IwSWZQbng2YjB0NWhoSWpTODlTZlY2?=
 =?utf-8?B?OUlDcUJiTmJ1R2ZHRHN6MU1GTHd1V2tqd3k3QXFDVXIwaWEwbjd4aGZIWWZt?=
 =?utf-8?B?Q2VNZ0NaTEQ5WG5Wd3FhVGM2SnY4QnhlczlSbmMyeXU5YUU2VkFnWjBtMDI3?=
 =?utf-8?B?Sy9KTy9ubVJDSDNKRnRkN1l0Ny9lSU04bXFpTmZiWmtLMWdKTzA2V3Z4anEw?=
 =?utf-8?B?bHZJYlhtdkkzbCtMR1IrV3FybmJVQVBRYTN1ak9RcC9GcEFITHJCVlB0LzJr?=
 =?utf-8?B?OWhMTnZlbjdoaUc1ZHdFMk5SQkRLVkVWbmc1VjhOM0p3aWt2K2ZCazl0QjA1?=
 =?utf-8?B?STlWbk55WUIzcUptVFJHVFNPc2cybFh1bkhFV3psc0c0VU14V0xzZ2s3bjhG?=
 =?utf-8?B?Zy9tWGRNdFpmVHlsVEFVK2hodXJXVjZ3Qzg3Z2YrU1ovdzk0MGtkK3JFZzNm?=
 =?utf-8?B?Yjcra0xFamRKbVFrK084TWNUN3ZQVEJCY1ZnVFdxQVBYMHgwSzNCN2pyRkE2?=
 =?utf-8?B?ZmVZWjFiQ3NaQ2RodHZvQ1hZd093K2FydWhlUWs5ODBoOEtLRzUrRFQwYUsr?=
 =?utf-8?B?OHJ6TCtMOUpKUWpHNUdtY0h4a2h3ZmlEL0NuMlBvNnVUcWRGMUVYRzlxbjlM?=
 =?utf-8?B?Rm8zRFBBUVZ3SyswTmpNeTVab3l1ZWNnWFM1SVpPd29ZWHhLZ1l3dEFFNlpr?=
 =?utf-8?B?UXF0NHBQVkViOUFZRzk5anFIenMrZDhlalo5SkNxV1ZNRGFjK21iamp5OWlj?=
 =?utf-8?B?WnIreURFcW82dGpUT3ZUYm8raCtDTUtOMC9ueURiV3BuRXA2eVlhQ0hJU1Fm?=
 =?utf-8?B?MWZZenFnbFo2blNaSFhQblBpR1N0a2NzTEp4amJqQjV2TG94bklxT05HdWcv?=
 =?utf-8?B?L1lvUFdCcHR6T1QvVVVhcG1OU09vak04djRtQi9LcGpTazU1UUx0RjVUbFg5?=
 =?utf-8?B?eVRZRE53ZlkwcUNnOEUyRzZhaDYyVXlFQ3BuTG5kS3FoOGpFNFFpOFNDVlgx?=
 =?utf-8?Q?GyyIvM5wePY9Poq5szHOJu0PY5BEdHAg?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <0CFBFC24D79E7E40A9105FF8B02EBE06@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 32d0796e-d6f5-4804-8eec-08da0c1621df
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Mar 2022 15:10:42.2522
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: nF+Tixh2xEbX8BcVtzqZhSBp/Tft3utdzNg5u6Nl1ezujWwLFSf4VpxzmLO3+pmveEsxFO6u4JmuzqQo+2spAph/geKC31wgcCjY5SbgG00=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR03MB3866
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Tue Mar 22 15:14:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 15:14:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293539.498664 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWgDA-0003tr-Sd; Tue, 22 Mar 2022 15:14:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293539.498664; Tue, 22 Mar 2022 15:14:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWgDA-0003tk-Pk; Tue, 22 Mar 2022 15:14:16 +0000
Received: by outflank-mailman (input) for mailman id 293539;
 Tue, 22 Mar 2022 15:14:15 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWgD9-0003ta-GT; Tue, 22 Mar 2022 15:14:15 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWgD9-0008WK-Dx; Tue, 22 Mar 2022 15:14:15 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWgD8-0002vT-Sd; Tue, 22 Mar 2022 15:14:14 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWgD8-0003x2-SC; Tue, 22 Mar 2022 15:14:14 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=GwVZaeGWHnC/ePavlkkocgsJhw8Eomc58+CaQwUL1Oo=; b=7PN2ixB7ZduOt1eiuTSRrxTSFv
	16RFYmSzdbaxV2euDTs7cMXVg9tQvFyWKeRVQEqvu6xC29r+DcrdNEJBqXSR5QWCmBIy/KBiDm+4r
	YFvULalLnYCqTamqO8MDpLhGcyxixlaerAXQ+6Gip9uEWDis3sR79XI9l84kYSstJB0A=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168765-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168765: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-armhf-armhf-xl-rtds:xen-boot:fail:allowable
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=330724977b10f5b92610817e8b7d1dfed122df87
X-Osstest-Versions-That:
    qemuu=2058fdbe81e2985c226a026851dd26b146d3395c
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 22 Mar 2022 15:14:14 +0000

flight 168765 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168765/

Failures :-/ but no regressions.

Regressions which are regarded as allowable (not blocking):
 test-armhf-armhf-xl-rtds      8 xen-boot                 fail REGR. vs. 168712

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168712
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168712
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168712
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168712
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168712
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168712
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168712
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168712
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass

version targeted for testing:
 qemuu                330724977b10f5b92610817e8b7d1dfed122df87
baseline version:
 qemuu                2058fdbe81e2985c226a026851dd26b146d3395c

Last test of basis   168712  2022-03-19 20:39:34 Z    2 days
Failing since        168756  2022-03-21 15:38:09 Z    0 days    2 attempts
Testing same since   168765  2022-03-22 02:38:15 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Cédric Le Goater <clg@kaod.org>
  Dr. David Alan Gilbert <dgilbert@redhat.com>
  Haiyue Wang <haiyue.wang@intel.com>
  Jason Wang <jasowang@redhat.com>
  Khem Raj <raj.khem@gmail.com>
  Lucas Coutinho <lucas.coutinho@eldorado.org.br>
  Markus Armbruster <armbru@redhat.com>
  Murilo Opsfelder Araujo <muriloo@linux.ibm.com>
  Peter Maydell <peter.maydell@linaro.org>
  Philippe Mathieu-Daudé <f4bug@amsat.org>
  Richard Henderson <richard.henderson@linaro.org>
  Stefan Hajnoczi <stefanha@redhat.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   2058fdbe81..330724977b  330724977b10f5b92610817e8b7d1dfed122df87 -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 15:23:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 15:23:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293549.498679 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWgLy-0005SH-VS; Tue, 22 Mar 2022 15:23:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293549.498679; Tue, 22 Mar 2022 15:23:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWgLy-0005SA-RY; Tue, 22 Mar 2022 15:23:22 +0000
Received: by outflank-mailman (input) for mailman id 293549;
 Tue, 22 Mar 2022 15:23:21 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=pS5t=UB=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nWgLx-0005S4-Gv
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 15:23:21 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 012bdb67-a9f4-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 16:23:20 +0100 (CET)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur02lp2055.outbound.protection.outlook.com [104.47.5.55]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-36-jrknOuvXO0WqQn9SvNt9BA-1; Tue, 22 Mar 2022 16:23:18 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM6PR04MB4536.eurprd04.prod.outlook.com (2603:10a6:20b:16::29)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.23; Tue, 22 Mar
 2022 15:23:16 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a%6]) with mapi id 15.20.5081.023; Tue, 22 Mar 2022
 15:23:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 012bdb67-a9f4-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1647962599;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=eElMPhyRs2St73kch0bjghxVKpqyLW6mx/DuTjqHLPk=;
	b=XhTJl9CLHcFV0MAcPZ4TS9L0t/pbO0vTC80E2wNxFp756p6dyiau/UQuJRpI6e3oCziDAl
	XWvQ1t2BfRuU053/x7NlfFClb3oFmdWmwBGbGEgKcyQcvzSFe68b2OKdltArKYq2eDIqmN
	1f6pKxbo+C6o6JLOjyFB+InvjkfJbaU=
X-MC-Unique: jrknOuvXO0WqQn9SvNt9BA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=glE+5VmNArW7mUsNB58soeFY9cmMKtMSrjP5QZFZKe8uoApDqyfxU5U3ROPF4e6v1psDvUBSXpgdi+HLuc6f/hYVomFhSqZ5wMBJuQUVr54a+1HuW9JYtvMAvnifoue/s3yBk7NnORk9Ll9jjiuG225ON/ki9Pxga9M4dpuwC294hOxqm2PLYKA0bBU9YEJPivlQ4VURnH//05XlOzEwz6GG5qaMKI0bTpgaTIUQYMFD1q1kJb4SVEMuDaqUABVHZSOm7ji9nlz5o9arFDSSt2eRB+O7zn1h/6NswEeZ5jjc9zh//ENBm2XmWA0LX+3UZtnOW8r0w/3POOlfwkGS6g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=eElMPhyRs2St73kch0bjghxVKpqyLW6mx/DuTjqHLPk=;
 b=joKVMFNzfl5yNQXKlKD65LigJ3373O58TpCKTkzE95z6h5Sy1QrrB9ZJ7FAoWJP/59cHkn0sBRDhGiAstwWnUhrQeJnhX1wuFLrt9I3+G1Aj3TTJi6X8rjOHfirVg/0k+QJ/DdhFtNbaulq2Hfy9J/nw/JjUCw+wPdC2swwDkGs1uvkU9Iv1O4UC0CRNmrEzdCRA3TrV23fgMpAXFNv+fqfQgWqLmUUhc37dslU1buG35b80nyXdBy4ih0SmumT+zsZYmUUuf1GW7dkU3NDrL/fszpwcCVc8rshzuagb20ByK0qAsVUpIlAJaSz3wXsJWuGBp+VfhzxzQZR22VLA4w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <45de6ac3-7701-0b37-8ada-b46f4237448a@suse.com>
Date: Tue, 22 Mar 2022 16:23:14 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH] build: provide and export ADDR2LINE
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR06CA0324.eurprd06.prod.outlook.com
 (2603:10a6:20b:45b::13) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 87e5129e-f71e-4063-123c-08da0c17e345
X-MS-TrafficTypeDiagnostic: AM6PR04MB4536:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB45367C5FB431B8934D760612B3179@AM6PR04MB4536.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(36756003)(6916009)(316002)(6512007)(31696002)(38100700002)(8676002)(6506007)(66556008)(66476007)(66946007)(4326008)(6486002)(508600001)(26005)(54906003)(186003)(2616005)(5660300002)(8936002)(31686004)(2906002)(4744005)(86362001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?VHcwQzhTZ3Rvdko2Z3N3UmtVZWtudHE3SWNlcVNjSTVxallqdTBna3FQT2RU?=
 =?utf-8?B?bmp3OWF6VmErb08vc2xMS1o0QzNuYkF3d1U1cWpjTXM0R1F0YkRQRGVnK3pV?=
 =?utf-8?B?WTBvR3ZPSWZ1bFpGRStWRi93Q2ZuNkRBTDQ0dy9HSkNmbTZVVGxuc1dBSTgz?=
 =?utf-8?B?cjhGNGN2djc1b1FwOHUvVW00ci80V0dPaW03NUJiUGEyUlZBeTdCOXdJQVlu?=
 =?utf-8?B?ZFRPL0thME1KZzBlTFYyREJaR2hOZ2hhdzUvUW1IQWN2Q2pLSGdtNmNKaURV?=
 =?utf-8?B?Kzd3NnJHODh2Sit6RHlRWERwVlB3MFFnWnQwaENQUXlIUjNWOXF1dy9GWGdC?=
 =?utf-8?B?YS9MMWpPMXJrKzU0QUdmdnV5SjZQL2dyL1Z4R2IreU92cGlJYXhaN1dzRmY0?=
 =?utf-8?B?cW9vNnJzMlZ4aWh1Mk9adC9pdjhCd2lpY3N5RjlId0RmSnNuUTcvQkthMkJz?=
 =?utf-8?B?VVpwdVE1YmdEVlJTSWNDWHovRnVaaWRlUEYzVmgwdTVlQy9QaVlCT2laS2R6?=
 =?utf-8?B?c0JuWjZHZFRNdVV6N3c4cVdaMWJ1aFNZaHVOWlEyamlKVjczYittYXVSenVm?=
 =?utf-8?B?cTJGckx6b3Y3Q09FYUk0ZjIvczJjdjQxMmE4cWlweEFBQS9jU3lZTHNhUXdt?=
 =?utf-8?B?RlhzM0xzVmNFaXJlWStpMndicVFQVEJpQTFQOU5FZXF1SlNVeUIvVGRTcHNx?=
 =?utf-8?B?MjBGZE5uRmVTUXJST3gramxMUkdmRCtwWGZkWlpoWDhzNFl0UXhUMXQvb3NC?=
 =?utf-8?B?NVdtSE54RVlBRXR1R0txd1ZlZDJrWmVWd2Z6WEtNaW9nYTNxbHFSTmNBbHha?=
 =?utf-8?B?VG5tMWp2SDJTYjRDK2M3dkFOZ3ZZK1Rld25qRUxKM3RsMnhaZzJ2S2lJVUtD?=
 =?utf-8?B?NmNTZGlkaUk4aFM3NXZKU3lsV3BVYzMyTVdkNnpLUlc0Ty94bnQ5aHZBYUxL?=
 =?utf-8?B?V0VLaDYrYW1PTFg3MzJkUHZ1cEQxcVduT1M4VEFkam5PUzZEdG1EZDYzQkJZ?=
 =?utf-8?B?WUhmeE5xb05FcEFsMjF4Q1Fibk14bDd4TTRjbGFnUGhBMTZzTjVLZlBvSFRP?=
 =?utf-8?B?eWxOL0h5eW1HendoODRlTXVBQitORC9vVldXRC9URnJ3akVYYmVpOVBpd2Jy?=
 =?utf-8?B?VG9WVmw4UlRoWllSZzExVGZCSE9KUTduQ1NDcHgrdFFlTjcxSWI5TGFGa2F5?=
 =?utf-8?B?UXd0aG56bGsvcjQvR2JFdGZuRlVHMUpxWEhNQWxJVFJwWVNNSm9ROVY1ckg1?=
 =?utf-8?B?Um1TWlpkeFlyTFNUUDRCZTllNTRlK2F1WE1nMW01R0w0czkzRVR4TlA3RjZz?=
 =?utf-8?B?U09lUm93L2s3U1p0N0ZHYXhVQ2NSU3RGWkVVYVJnd2w5aFN4WXdkcldWL3cx?=
 =?utf-8?B?TTBDYVM2MTBoa3JjcHJQekFPSE1LL0lwOFJUSXl4MEhTbThibzBZU0JwTy9Y?=
 =?utf-8?B?YjJVRUpXWWZtTWZDeVpZRml0V3l4OE9sYjgzV1FIK1lvQTRYK1MwU0dvTmxw?=
 =?utf-8?B?eVJqT1BWZUVQSysyckVKb3JLcmZJMUZtY012WEtJTUt3S2RvYnFkTW53M2Er?=
 =?utf-8?B?ZUdwNnh2em9hMVgvU2djbGtZVXpFbjAxSTBJZ3dlVk9XbVh0cDdvM2NnOVJm?=
 =?utf-8?B?V0RFRkQ3aGJhR3NYZ3NWWExOaVYyMHU4U0RNTTBtaGZoa2RkUElaMHl2OXFk?=
 =?utf-8?B?cUN1Ym54K0w3dDVwcm0rVDRUNGdLWU5DaUpXdUxMOWJhTHZVNC9GYjVPZ1hX?=
 =?utf-8?B?YVJ2VFhPaWtzc2pXWXJXOXRoeHE2Y2o2ckNFTnA0djFCRjNTSXQxWmlpcFB2?=
 =?utf-8?B?d3pHNVdqb3IwTnFFU3ZwdVVrUU1POVZ6WlpqbjJPT0FOQ0E3MzduTHJPTFlh?=
 =?utf-8?B?Z1hIeXBzeU1sTFBwL0lWL1pmTVhnc1NnMnFHYW5nei82OExKNzNNM1RMa2tJ?=
 =?utf-8?Q?qGkbl6O7ZjEfJ1clZEQRY9KmIG+X5ihu?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 87e5129e-f71e-4063-123c-08da0c17e345
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Mar 2022 15:23:16.4488
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 0EGecXHL54IxWvglUCjgkcmsfhL946+YLFju1FEsB2CQFevY/mxIhsUN59MvpxMuBuRj0ywgLHIqF+iMCjoftg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB4536

Now that x86'es check-endbr.sh script uses it, also make it available
consistently with other tool chain components.

Signed-off-by: Jan Beulich <jbeulich@suse.com>

--- a/config/StdGNU.mk
+++ b/config/StdGNU.mk
@@ -10,6 +10,7 @@ endif
 LD_LTO     = $(CROSS_COMPILE)ld
 endif
 CPP        = $(CC) -E
+ADDR2LINE  = $(CROSS_COMPILE)addr2line
 AR         = $(CROSS_COMPILE)ar
 RANLIB     = $(CROSS_COMPILE)ranlib
 NM         = $(CROSS_COMPILE)nm
--- a/config/SunOS.mk
+++ b/config/SunOS.mk
@@ -3,6 +3,7 @@ LD         = $(CROSS_COMPILE)gld
 CC         = $(CROSS_COMPILE)gcc
 CPP        = $(CROSS_COMPILE)gcc -E
 CXX        = $(CROSS_COMPILE)g++
+ADDR2LINE  = $(CROSS_COMPILE)gaddr2line
 AR         = $(CROSS_COMPILE)gar
 RANLIB     = $(CROSS_COMPILE)granlib
 NM         = $(CROSS_COMPILE)gnm
--- a/xen/Makefile
+++ b/xen/Makefile
@@ -55,7 +55,7 @@ export TARGET_ARCH     := $(shell echo $
 # Allow someone to change their config file
 export KCONFIG_CONFIG ?= .config
 
-export CC CXX LD NM OBJCOPY OBJDUMP
+export CC CXX LD NM OBJCOPY OBJDUMP ADDR2LINE
 
 export TARGET := xen
 



From xen-devel-bounces@lists.xenproject.org Tue Mar 22 15:25:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 15:25:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293552.498690 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWgNi-00061k-9K; Tue, 22 Mar 2022 15:25:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293552.498690; Tue, 22 Mar 2022 15:25:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWgNi-00061d-6H; Tue, 22 Mar 2022 15:25:10 +0000
Received: by outflank-mailman (input) for mailman id 293552;
 Tue, 22 Mar 2022 15:25:09 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=iXg/=UB=gmail.com=tamas.k.lengyel@srs-se1.protection.inumbo.net>)
 id 1nWgNh-00061X-8o
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 15:25:09 +0000
Received: from mail-oa1-x2d.google.com (mail-oa1-x2d.google.com
 [2001:4860:4864:20::2d])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 410c05c7-a9f4-11ec-a405-831a346695d4;
 Tue, 22 Mar 2022 16:25:08 +0100 (CET)
Received: by mail-oa1-x2d.google.com with SMTP id
 586e51a60fabf-de3eda6b5dso2013106fac.0
 for <xen-devel@lists.xenproject.org>; Tue, 22 Mar 2022 08:25:08 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 410c05c7-a9f4-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=eaz97wT2y3WUU7O1vQdJZt9IF7QNbOt91eXLF6u0nBo=;
        b=TTtXl/zbXizei6ZuOV0iMBSGwYLZjlEh9skNdvR80URJapstUHmsyC1jMz+xQx/Wkq
         DpJKEIrei9gUa0gKb+54I/66V4o2Sy6casziOCmaasWVXkIITO5tex2q4jluLMcq7ZbB
         eNIyPoKyiXDgevE1apClMuY8gP5gB98scavFNElcYo5oALV5IWvIcbTTDBhHr66POY/v
         bY8XE8EfDoS/vsOFwl2xHbRxhtIzCWmKMihix2BeN6blXgP7PHa7dlqTeYLXO4QcHiJM
         dC6qGlVErjosfjvdjQZQUXBFwR5obMi373SGwJwIPQOH247hlb0NYd+28nnMF4VXDaKS
         LbeA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=eaz97wT2y3WUU7O1vQdJZt9IF7QNbOt91eXLF6u0nBo=;
        b=f7IDymYyYDzF/c0xYlxYIA1WT/wWvq3oqJLf/sSunqNvLRp7QwLW7eFp85VhbkqCKv
         AAH6OPbQqlw0ZtlQCYSnmi9WQoNWS46qJgb6jCNiIw9UIkpfjYSTOOjZ0RTGQ0RxFOHI
         YCTih4mMtPkztbPkc/0l4XmpFspZco83oPnmFnzrhglltdEdrV75Wi7JjRUW4NLnaK7D
         9X7JlPI5ztgQcpLxPEYHd0XeKgznuSZHIZOJbqvrJTxSYvs93DCZP2FqX+fPC2rbNNAK
         18E2rM57WIO4D+lltn66zdtXP+6fK9ygUjRtNJy3BCM80V6wKvO04R2IkY1/1z5CUevp
         XHXw==
X-Gm-Message-State: AOAM533wfDTpjvYboFE7BHuQrOm20p7pLuMwe+i3U81T64HlQbKIHO87
	iO4EekTv0vP126DusS86gAPk6f9Rlk0MRJ6oAJs5USTc
X-Google-Smtp-Source: ABdhPJx/sUrd7WNRq45ljustNtfQmaWjoiXBGe2Jea8CqA/h52BWEBUY82ttBNvy0H+/16mR74yZitl5taZ4l1m+jwo=
X-Received: by 2002:a05:6870:510:b0:d6:f5d1:d1ff with SMTP id
 j16-20020a056870051000b000d6f5d1d1ffmr1935387oao.128.1647962706431; Tue, 22
 Mar 2022 08:25:06 -0700 (PDT)
MIME-Version: 1.0
References: <a8828d68c308fa7ecbfe4387ca753ee0f80a2a7d.1647897016.git.tamas.lengyel@intel.com>
 <72c90101-55ee-b749-625f-004e40bd2745@citrix.com>
In-Reply-To: <72c90101-55ee-b749-625f-004e40bd2745@citrix.com>
From: Tamas K Lengyel <tamas.k.lengyel@gmail.com>
Date: Tue, 22 Mar 2022 11:24:30 -0400
Message-ID: <CABfawhnRW=qcVNxSA7ee+9yc6D9Ae=HCnKn_oZ1JfXKm172KRQ@mail.gmail.com>
Subject: Re: [PATCH v4] x86/vmx: save guest non-register state in hvm_hw_cpu
To: Andrew Cooper <andrew.cooper3@citrix.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>, 
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Jan Beulich <JBeulich@suse.com>, 
	Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>, Jun Nakajima <jun.nakajima@intel.com>, 
	Kevin Tian <kevin.tian@intel.com>, David Vrabel <dvrabel@cantab.net>
Content-Type: text/plain; charset="UTF-8"

On Tue, Mar 22, 2022 at 11:11 AM Andrew Cooper
<Andrew.Cooper3@citrix.com> wrote:
>
> On 21/03/2022 21:12, Tamas K Lengyel wrote:
> > During VM forking and resetting a failed vmentry has been observed due
> > to the guest non-register state going out-of-sync with the guest register
> > state. For example, a VM fork reset right after a STI instruction can trigger
> > the failed entry. This is due to the guest non-register state not being saved
> > from the parent VM, thus the reset operation only copies the register state.
> >
> > Fix this by including the guest non-register state in hvm_hw_cpu so that when
> > its copied from the parent VM the vCPU state remains in sync.
> >
> > SVM is not currently wired-in as VM forking is VMX only and saving non-register
> > state during normal save/restore/migration operation hasn't been needed. If
> > deemed necessary in the future it can be wired in by adding a svm-substructure
> > to hvm_hw_cpu.
>
> I disagree here.  This bug isn't really to do with fuzzing; it's to do
> with our APIs being able to get/set vCPU state correctly, and fuzzing is
> the example which demonstrated the breakage.
>
> This will also cause very subtle bugs for the guest-transparent
> migration work, and the live update work, both of which want to shift
> vcpu state behind a VM which hasn't actively entered Xen via hypercall.
>
> (Quick tangent.  Seriously, can the SDM be fixed so it actually
> enumerates the Activity States.)
>
> Xen doesn't currently support any situation where Intel's idea of
> Activity State is anything other than 0.  This in turn is buggy, because
> we don't encode VPF_blocked anywhere.  An activity state of hlt might
> not be best place to encode this, because notably absent from Intel's
> activity state is mwait.  We'll also terminate things like schedop_poll
> early.
>
> Next, AMD does have various fields from interruptibility.  If you want
> me to write the patch then fine, but they should not be excluded from a
> patch like this.  AMD do not have separate bits for STI and MovSS, due
> to microarchitectural differences, but the single INTERRUPT_SHADOW bit
> does need managing, as does the blocked-by-NMI bit which is emulated on
> SVM and older Intel CPUs.
>
> Minor tangent, blocked-by-SMI needs cross-linking with vm-entry
> controls, so I'm not sure it is something we ought to expose.
>
> Next, it turns out that MSR_DEBUGCTL isn't included anywhere (not even
> the MSR list).  It is important, because it forms part of the VMEntry
> cross-check with PENDING_DBG and TF.
>
> Next, we also don't preserve PDPTRs.  This is another area where Intel
> and AMD CPUs behave differently, but under Intel's architecture, the
> guest kernel can clobber the 32bit PAE block of pointers and everything
> will function correctly until the next mov into cr3.  There are
> definitely bugs in Xen's emulated pagewalk in this area.
>
> So there are a lot of errors with hvm_hw_cpu and I bet I haven't found
> them all.
>
> As discussed at multiple previous XenSummits, the current load/save mess
> needs moving out of Xen, and that would be the correct time to fix the
> other errors, but it probably is too much for this case.
>
>
> At a minimum, there shouldn't be a VMX specific union, because we are
> talking about architecture-agnostic properties of the vCPU.  It's fine
> for the format to follow Intel's bit layout for the subset of bits we
> tolerate saving/restoring, but this needs discussing in the header, and
> needs rejecting on set.  An extra check/reject is 0% overhead for
> forking, so I don't find that a credible argument against doing it.

Sure, during the fork itself it's negligible. It's during fork_reset,
which we do thousands of times per second where that sanity checking
is both unneeded (we know the setting is getting copied from the
parent) and will quickly add up if we need to do a bunch of bitshifts
to ensure only the valid bits are restored (plus converted in case the
format will be the non-vmx version).

> I'm not sure if we want to include the activity state at the moment
> without a better idea of how to encode VPF_blocked, but I think DEBUGCTL
> does need including.  This in turn involves transmitting the LBR MSRs too.

I don't really have much to add here. If there are concerns in regards
to the side-effect of this on the pre-existing save/restore/migration
route then what I can do is add only a Xen-internal function that will
allow the fork_reset to copy the non-register state from the parent
and not expose it via the public header. That works for me just as
well, my use-case doesn't have a requirement for these bits to be
exposed externally.

Tamas


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 15:31:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 15:31:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293555.498700 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWgU9-0007UP-02; Tue, 22 Mar 2022 15:31:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293555.498700; Tue, 22 Mar 2022 15:31:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWgU8-0007UI-TH; Tue, 22 Mar 2022 15:31:48 +0000
Received: by outflank-mailman (input) for mailman id 293555;
 Tue, 22 Mar 2022 15:31:47 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wGTH=UB=citrix.com=prvs=07349bdb1=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nWgU7-0007UC-D8
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 15:31:47 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2df975b3-a9f5-11ec-a405-831a346695d4;
 Tue, 22 Mar 2022 16:31:45 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2df975b3-a9f5-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1647963105;
  h=date:from:to:cc:subject:message-id:references:
   mime-version:in-reply-to;
  bh=nXsgyZZfIz1dVhXoOi+6Cysy7mCTSJEfPIhEfyl19Io=;
  b=E6euFc1UhpORRFa/LMMDeBwh7rJpyS84l2FNFCB7MZh1pyyA/QbM4OUw
   7Tr3wjOBLtQRyxQByL2uBkF6ca9DScZzV5kXbPnguXUPKTeN6U3o9i1mI
   KGrdU6tiSzp6Z14qiLuhCL8aDHGezY49XQOlqK8j7urWyZKbg9aF9Wgf9
   I=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 69247299
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:nWrvMqo+2MhtmrLdUopVwAJO7NdeBmIkZRIvgKrLsJaIsI4StFCzt
 garIBnSbPuPZWvxfNl/bYnioxkFuZWByYBhTgE5rSgyECoao5uZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 4mq+aUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBMqyLv8ggcSliIzxkYJAf6rDmcFOnmJnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVIxDfFDfEgUNbbTr/D/9Nw1zYsnMFeW/3ZY
 qL1bBIxPU6cPEceaz/7Drobx+iqj1zhTwFkrVy7uLUM0TePkjxYhe2F3N39JYXRGJQ9clyjj
 mDb+2X0BDkKOdrZziCKmlq3nfPGly7/XIMUFZW7++RsjVnVwXYcYDUJUXOrrP//jVSxM/pdJ
 FYT4TEGtrUp+QqgSdyVdw21pjuIswARX/JUEvYm80edx6zM+QGbC2MYCDlbZ7QOtsU7WDgr3
 V+hhM7yCHpkt7j9dJ6G3u7K93XoY3FTdDJcI39fJecY3zX9iI0yyTXjc/RTKp6olIDIQCP/4
 mGhtAFr0t3/kvU3/6m8+FnGhRelqZ7IUhM5623rY4610u9qTNX7PtL1sDA3+d4Fdd/EFQfZ4
 BDojuDEtIgz4YexeDthqQnnNJWg/L67PTLVmjaD9LFxpm32qxZPkW29iQySxXuF0O5ZIFcFg
 2eJ4Gu9AaO/2lPwNsebhKrrV6wXIVDIT4iNaxwtRoMmjmJNXAGG5jpyQkWbwnrglkMh+YlmZ
 8vEIZbzUClLU/o6pNZTewv7+eV3rszZ7TmOLa0XMjz9iebODJJrYelt3KSyghARs/rf/VS9H
 yd3PMqW0RRPONASkQGMmbP/2WsidCBhbbiv8pQ/XrfafmJORTFwY9eMkOhJU9E0wMxoehLgo
 yjVtrlwkwGk2xUq6GyiNxheVV8Ydc0m/CxhYnB0YwrANrpKSd/H0ZrzvqAfJdEPnNGPB9YvJ
 xXZU61s2shydwk=
IronPort-HdrOrdr: A9a23:aKtspaPlb/GSN8BcTvKjsMiBIKoaSvp037B87TEJdfU1SL38qy
 jN9M5w6faQslsssR4b9exoVJPufZq+z+8W3WByB9eftVLdyQ2VxehZhOOI/9SHIUPDH4VmpM
 RdmsZFaeEZojJB/L7HCKXTKadF/DEnmprY4tvj8w==
X-IronPort-AV: E=Sophos;i="5.90,201,1643691600"; 
   d="scan'208";a="69247299"
Date: Tue, 22 Mar 2022 15:31:40 +0000
From: Anthony PERARD <anthony.perard@citrix.com>
To: Juergen Gross <jgross@suse.com>
CC: <xen-devel@lists.xenproject.org>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, "Jan
 Beulich" <jbeulich@suse.com>, Julien Grall <julien@xen.org>, "Stefano
 Stabellini" <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH v4 07/11] xen: generate hypercall interface related code
Message-ID: <Yjnr3FAS3G94Yf6+@perard.uk.xensource.com>
References: <20220310073420.15622-1-jgross@suse.com>
 <20220310073420.15622-8-jgross@suse.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <20220310073420.15622-8-jgross@suse.com>

On Thu, Mar 10, 2022 at 08:34:16AM +0100, Juergen Gross wrote:
> diff --git a/xen/include/Makefile b/xen/include/Makefile
> index a3c2511f5f..b52a2da40c 100644
> --- a/xen/include/Makefile
> +++ b/xen/include/Makefile
> @@ -77,6 +77,18 @@ $(obj)/compat/xlat.h: $(addprefix $(obj)/compat/.xlat/,$(xlat-y)) $(obj)/config/
>  	cat $(filter %.h,$^) >$@.new
>  	mv -f $@.new $@
>  
> +quiet_cmd_genhyp = GEN     $@
> +define cmd_genhyp
> +    awk -f $(src)/../scripts/gen_hypercall.awk <$< >$@

You should use "$(srctree)" instead of "$(src)/..".

$(srctree) always point to the source tree of the hypervisor. ( $(src)
doesn't necessarily point to "include/" in the source tree. )

> +endef
> +
> +all: $(obj)/xen/hypercall-defs.h
> +
> +$(obj)/xen/hypercall-defs.h: $(obj)/hypercall-defs.i $(src)/../scripts/gen_hypercall.awk FORCE

Here as well, it would be better to use $(srctree) instead of $(src)/.. .


> +	$(call if_changed,genhyp)
> +
> +targets += xen/hypercall-defs.h
> +
>  ifeq ($(XEN_TARGET_ARCH),$(XEN_COMPILE_ARCH))
>  
>  all: $(obj)/headers.chk $(obj)/headers99.chk $(obj)/headers++.chk

Cheers,

-- 
Anthony PERARD


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 15:36:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 15:36:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293558.498712 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWgYI-000885-IH; Tue, 22 Mar 2022 15:36:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293558.498712; Tue, 22 Mar 2022 15:36:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWgYI-00087v-F7; Tue, 22 Mar 2022 15:36:06 +0000
Received: by outflank-mailman (input) for mailman id 293558;
 Tue, 22 Mar 2022 15:36:05 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWgYH-00087l-EZ; Tue, 22 Mar 2022 15:36:05 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWgYH-0000TW-9O; Tue, 22 Mar 2022 15:36:05 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWgYG-0003PW-S7; Tue, 22 Mar 2022 15:36:04 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWgYG-000793-Ra; Tue, 22 Mar 2022 15:36:04 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=g5Ne00KLlY+FPoQSw8RiWJcpORSEGMaiwoiV0CXzFdM=; b=wBcUI7h4PBDcOkGLqXoduiEwZh
	YEKp3CxzXXiMBka0xlOEsRAlTE7vJ2qHeXEM0MlwnQrdf1BEoZNMgNTuZnWpfyT3vVI5U/zQVXfw9
	x7DVUYmKU4dM2ZtMUO8YKNFxoDxrvwSIK2CYXJxpfWTAH7al0a4L6mkk/FYHpYo+dV54=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168783-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168783: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 22 Mar 2022 15:36:04 +0000

flight 168783 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168783/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   22 days
Failing since        168258  2022-03-01 01:55:31 Z   21 days  224 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    0 days    5 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 15:50:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 15:50:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293566.498723 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWglp-000201-WA; Tue, 22 Mar 2022 15:50:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293566.498723; Tue, 22 Mar 2022 15:50:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWglp-0001zY-Si; Tue, 22 Mar 2022 15:50:05 +0000
Received: by outflank-mailman (input) for mailman id 293566;
 Tue, 22 Mar 2022 15:50:05 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=vJOs=UB=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nWglp-0001nQ-7B
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 15:50:05 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id bced118f-a9f7-11ec-a405-831a346695d4;
 Tue, 22 Mar 2022 16:50:03 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 1B85F1F38F;
 Tue, 22 Mar 2022 15:50:03 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id C0871133B6;
 Tue, 22 Mar 2022 15:50:02 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id oAPJLSrwOWJYVwAAMHmgww
 (envelope-from <jgross@suse.com>); Tue, 22 Mar 2022 15:50:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: bced118f-a9f7-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647964203; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=0gBQScvwdVxKjyAG3NnuySYmJTXr2MBLbV0LSshhlNE=;
	b=afvnMB1oJlsl/b3emSQC6H8gKTFIKJg5Sc/SuVd6iP/V++emD24ObjlNEq4Xv6JNmb8o5z
	64M9iZG9MF92a5pRco8xDcqCCDNo5ST9NtI58QuqtL1DVMM/3ryb8mNpSMl5SESRX14yZh
	uNYkz1RkrTpIp3hOpN6/M/q8eInbatM=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org,
	x86@kernel.org,
	linux-kernel@vger.kernel.org
Cc: Juergen Gross <jgross@suse.com>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Thomas Gleixner <tglx@linutronix.de>,
	Ingo Molnar <mingo@redhat.com>,
	Borislav Petkov <bp@alien8.de>,
	Dave Hansen <dave.hansen@linux.intel.com>,
	"H. Peter Anvin" <hpa@zytor.com>,
	=?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
Subject: [PATCH] xen: fix is_xen_pmu()
Date: Tue, 22 Mar 2022 16:50:01 +0100
Message-Id: <20220322155001.21979-1-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

is_xen_pmu() is taking the cpu number as parameter, but it is not using
it. Instead it just tests whether the Xen PMU initialization on the
current cpu did succeed. As this test is done by checking a percpu
pointer, preemption needs to be disabled in order to avoid switching
the cpu while doing the test. While resuming from suspend() this seems
not to be the case:

[   88.082751] ACPI: PM: Low-level resume complete
[   88.087933] ACPI: EC: EC started
[   88.091464] ACPI: PM: Restoring platform NVS memory
[   88.097166] xen_acpi_processor: Uploading Xen processor PM info
[   88.103850] Enabling non-boot CPUs ...
[   88.108128] installing Xen timer for CPU 1
[   88.112763] BUG: using smp_processor_id() in preemptible [00000000] code: systemd-sleep/7138
[   88.122256] caller is is_xen_pmu+0x12/0x30
[   88.126937] CPU: 0 PID: 7138 Comm: systemd-sleep Tainted: G        W         5.16.13-2.fc32.qubes.x86_64 #1
[   88.137939] Hardware name: Star Labs StarBook/StarBook, BIOS 7.97 03/21/2022
[   88.145930] Call Trace:
[   88.148757]  <TASK>
[   88.151193]  dump_stack_lvl+0x48/0x5e
[   88.155381]  check_preemption_disabled+0xde/0xe0
[   88.160641]  is_xen_pmu+0x12/0x30
[   88.164441]  xen_smp_intr_init_pv+0x75/0x100

Fix that by replacing is_xen_pmu() by a simple boolean variable which
reflects the Xen PMU initialization state on cpu 0.

Modify xen_pmu_init() to return early in case it is being called for a
cpu other than cpu 0 and the boolean variable not being set.

Fixes: bf6dfb154d93 ("xen/PMU: PMU emulation code")
Reported-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
Signed-off-by: Juergen Gross <jgross@suse.com>
---
 arch/x86/xen/pmu.c    | 11 ++++++-----
 arch/x86/xen/pmu.h    |  3 ++-
 arch/x86/xen/smp_pv.c |  2 +-
 3 files changed, 9 insertions(+), 7 deletions(-)

diff --git a/arch/x86/xen/pmu.c b/arch/x86/xen/pmu.c
index 89dd6b1708b0..0efe452eb13e 100644
--- a/arch/x86/xen/pmu.c
+++ b/arch/x86/xen/pmu.c
@@ -506,10 +506,7 @@ irqreturn_t xen_pmu_irq_handler(int irq, void *dev_id)
 	return ret;
 }
 
-bool is_xen_pmu(int cpu)
-{
-	return (get_xenpmu_data() != NULL);
-}
+bool is_xen_pmu;
 
 void xen_pmu_init(int cpu)
 {
@@ -520,7 +517,7 @@ void xen_pmu_init(int cpu)
 
 	BUILD_BUG_ON(sizeof(struct xen_pmu_data) > PAGE_SIZE);
 
-	if (xen_hvm_domain())
+	if (xen_hvm_domain() || (cpu != 0 && !is_xen_pmu))
 		return;
 
 	xenpmu_data = (struct xen_pmu_data *)get_zeroed_page(GFP_KERNEL);
@@ -542,6 +539,7 @@ void xen_pmu_init(int cpu)
 	per_cpu(xenpmu_shared, cpu).flags = 0;
 
 	if (cpu == 0) {
+		is_xen_pmu = true;
 		perf_register_guest_info_callbacks(&xen_guest_cbs);
 		xen_pmu_arch_init();
 	}
@@ -572,4 +570,7 @@ void xen_pmu_finish(int cpu)
 
 	free_pages((unsigned long)per_cpu(xenpmu_shared, cpu).xenpmu_data, 0);
 	per_cpu(xenpmu_shared, cpu).xenpmu_data = NULL;
+
+	if (cpu == 0)
+		is_xen_pmu = false;
 }
diff --git a/arch/x86/xen/pmu.h b/arch/x86/xen/pmu.h
index 0e83a160589b..65c58894fc79 100644
--- a/arch/x86/xen/pmu.h
+++ b/arch/x86/xen/pmu.h
@@ -4,6 +4,8 @@
 
 #include <xen/interface/xenpmu.h>
 
+extern bool is_xen_pmu;
+
 irqreturn_t xen_pmu_irq_handler(int irq, void *dev_id);
 #ifdef CONFIG_XEN_HAVE_VPMU
 void xen_pmu_init(int cpu);
@@ -12,7 +14,6 @@ void xen_pmu_finish(int cpu);
 static inline void xen_pmu_init(int cpu) {}
 static inline void xen_pmu_finish(int cpu) {}
 #endif
-bool is_xen_pmu(int cpu);
 bool pmu_msr_read(unsigned int msr, uint64_t *val, int *err);
 bool pmu_msr_write(unsigned int msr, uint32_t low, uint32_t high, int *err);
 int pmu_apic_update(uint32_t reg);
diff --git a/arch/x86/xen/smp_pv.c b/arch/x86/xen/smp_pv.c
index 4a6019238ee7..688aa8b6ae29 100644
--- a/arch/x86/xen/smp_pv.c
+++ b/arch/x86/xen/smp_pv.c
@@ -129,7 +129,7 @@ int xen_smp_intr_init_pv(unsigned int cpu)
 	per_cpu(xen_irq_work, cpu).irq = rc;
 	per_cpu(xen_irq_work, cpu).name = callfunc_name;
 
-	if (is_xen_pmu(cpu)) {
+	if (is_xen_pmu) {
 		pmu_name = kasprintf(GFP_KERNEL, "pmu%d", cpu);
 		rc = bind_virq_to_irqhandler(VIRQ_XENPMU, cpu,
 					     xen_pmu_irq_handler,
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 22 15:51:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 15:51:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293569.498733 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWgnR-0002iu-AS; Tue, 22 Mar 2022 15:51:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293569.498733; Tue, 22 Mar 2022 15:51:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWgnR-0002il-7Z; Tue, 22 Mar 2022 15:51:45 +0000
Received: by outflank-mailman (input) for mailman id 293569;
 Tue, 22 Mar 2022 15:51:44 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=vJOs=UB=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nWgnQ-0002ib-0W
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 15:51:44 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f833a28f-a9f7-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 16:51:43 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id AEC0D210E5;
 Tue, 22 Mar 2022 15:51:42 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 74022133B6;
 Tue, 22 Mar 2022 15:51:42 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id ECUFG47wOWIlWAAAMHmgww
 (envelope-from <jgross@suse.com>); Tue, 22 Mar 2022 15:51:42 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f833a28f-a9f7-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1647964302; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=pFktat+7ApyjoGXFa1yZioTq/sp+PSrn1regvTl8ofE=;
	b=n80Vr1W8JJqaq7yS+uNo3EE/GEbtL2a1jH10Hy0HwwLoAkOeoh6aXIkerNNGBrc/05peuz
	HOOxFeribZ0BDVQfMm2V/JKLRRAInRTzrzudyfG6sRs94O6NyiSQmlQ0kmeSSGjXWE0HCA
	dc14Qioyq5jaVV3jUVlgWXR+BT+eodQ=
Message-ID: <65436e8b-b5fb-6c53-1dc4-d8a89e4a9315@suse.com>
Date: Tue, 22 Mar 2022 16:51:41 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.2
Subject: Re: [PATCH v4 07/11] xen: generate hypercall interface related code
Content-Language: en-US
To: Anthony PERARD <anthony.perard@citrix.com>
Cc: xen-devel@lists.xenproject.org, Andrew Cooper
 <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
 Jan Beulich <jbeulich@suse.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
References: <20220310073420.15622-1-jgross@suse.com>
 <20220310073420.15622-8-jgross@suse.com>
 <Yjnr3FAS3G94Yf6+@perard.uk.xensource.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <Yjnr3FAS3G94Yf6+@perard.uk.xensource.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------9KqAWBwLMAiBYEy0DMcbOf2N"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------9KqAWBwLMAiBYEy0DMcbOf2N
Content-Type: multipart/mixed; boundary="------------rphbHH9Q8X3zE3m0LD8q9XYa";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Anthony PERARD <anthony.perard@citrix.com>
Cc: xen-devel@lists.xenproject.org, Andrew Cooper
 <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
 Jan Beulich <jbeulich@suse.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
Message-ID: <65436e8b-b5fb-6c53-1dc4-d8a89e4a9315@suse.com>
Subject: Re: [PATCH v4 07/11] xen: generate hypercall interface related code
References: <20220310073420.15622-1-jgross@suse.com>
 <20220310073420.15622-8-jgross@suse.com>
 <Yjnr3FAS3G94Yf6+@perard.uk.xensource.com>
In-Reply-To: <Yjnr3FAS3G94Yf6+@perard.uk.xensource.com>

--------------rphbHH9Q8X3zE3m0LD8q9XYa
Content-Type: multipart/mixed; boundary="------------2YXHEz6Agg4tG4bNOKgOLjGk"

--------------2YXHEz6Agg4tG4bNOKgOLjGk
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------2YXHEz6Agg4tG4bNOKgOLjGk
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------2YXHEz6Agg4tG4bNOKgOLjGk--

--------------rphbHH9Q8X3zE3m0LD8q9XYa--

--------------9KqAWBwLMAiBYEy0DMcbOf2N
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmI58I0FAwAAAAAACgkQsN6d1ii/Ey+B
tgf/bjh7nQA5SNazOw2AUUjoYfDC21lLjhi1nxx7c1YM2J+cXMqXN1wOPzHb4QncfQNmnpoTOV2u
/9pKGKf3eoz1NIHPyFglH1630V8l2SzA356n500/MCYpgLd7fmjfvpjGEQO2PQ2NJOGvqBbavSHq
LjV9lYlm8RnL7xUDS+q6yzZuYI4uUIa6HcI5G2IfNZ9VXJOwMQ70Xwt7DRkHpRvn+472IuY29rKd
VOvkoDU6Sq+/sHoIhomk3ZGSQJL9HXXafHxakv4LWs4jDgQvcMJBRs8Ijx3urN96FFPYwDcrKT6f
cfvg+m+OvTr+KPcjHYf929/WMR0JCQGnRGbfWcNf6w==
=9Vxq
-----END PGP SIGNATURE-----

--------------9KqAWBwLMAiBYEy0DMcbOf2N--


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 16:05:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 16:05:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293573.498745 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWh06-0004oO-FY; Tue, 22 Mar 2022 16:04:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293573.498745; Tue, 22 Mar 2022 16:04:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWh06-0004oH-Cc; Tue, 22 Mar 2022 16:04:50 +0000
Received: by outflank-mailman (input) for mailman id 293573;
 Tue, 22 Mar 2022 16:04:49 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWh05-0004o7-2k; Tue, 22 Mar 2022 16:04:49 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWh04-0001Sf-Um; Tue, 22 Mar 2022 16:04:48 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWh04-00046Y-Fv; Tue, 22 Mar 2022 16:04:48 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWh04-0005Ze-FV; Tue, 22 Mar 2022 16:04:48 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=8rVmOoziD9r/xUWoySMnl55mbD9xRTaKi08UQjsLExE=; b=6bvfQlTqIb7LOOnxHlcglvUb9W
	3DsfhDHfKMNsjrplqUqYPXm3j6KWY/xp5nWucMDdT3yJedeDGYBZBGSxUQ4XNPWVrlAi9O/L2dK4T
	ByYoqH79ceUII5MAXmw34b+ywWFnqJB7GHSWBWrw+e8Xro8NcwTwWJwQGnCp3fIs+Nd0=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168778-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168778: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=69e46280937526db9cf78259cd8a0a9ec62dc847
X-Osstest-Versions-That:
    xen=8aa0e9d2d1a4815516607eabe9b2e850f284a2f8
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 22 Mar 2022 16:04:48 +0000

flight 168778 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168778/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  69e46280937526db9cf78259cd8a0a9ec62dc847
baseline version:
 xen                  8aa0e9d2d1a4815516607eabe9b2e850f284a2f8

Last test of basis   168750  2022-03-21 12:00:27 Z    1 days
Testing same since   168778  2022-03-22 13:03:05 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Jan Beulich <jbeulich@suse.com>
  Julien Grall <jgrall@amazon.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   8aa0e9d2d1..69e4628093  69e46280937526db9cf78259cd8a0a9ec62dc847 -> smoke


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 16:16:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 16:16:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293580.498755 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWhBh-0006NM-J1; Tue, 22 Mar 2022 16:16:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293580.498755; Tue, 22 Mar 2022 16:16:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWhBh-0006NF-Fz; Tue, 22 Mar 2022 16:16:49 +0000
Received: by outflank-mailman (input) for mailman id 293580;
 Tue, 22 Mar 2022 16:16:48 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Ed4I=UB=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nWhBg-0006N7-7X
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 16:16:48 +0000
Received: from NAM10-BN7-obe.outbound.protection.outlook.com
 (mail-bn7nam10on20604.outbound.protection.outlook.com
 [2a01:111:f400:7e8a::604])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 77bc8d9f-a9fb-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 17:16:46 +0100 (CET)
Received: from BN9PR03CA0802.namprd03.prod.outlook.com (2603:10b6:408:13f::27)
 by MN2PR02MB6079.namprd02.prod.outlook.com (2603:10b6:208:185::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.16; Tue, 22 Mar
 2022 16:16:43 +0000
Received: from BN1NAM02FT029.eop-nam02.prod.protection.outlook.com
 (2603:10b6:408:13f:cafe::94) by BN9PR03CA0802.outlook.office365.com
 (2603:10b6:408:13f::27) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17 via Frontend
 Transport; Tue, 22 Mar 2022 16:16:43 +0000
Received: from xir-pvapexch01.xlnx.xilinx.com (149.199.80.198) by
 BN1NAM02FT029.mail.protection.outlook.com (10.13.2.143) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5081.14 via Frontend Transport; Tue, 22 Mar 2022 16:16:42 +0000
Received: from xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) by
 xir-pvapexch01.xlnx.xilinx.com (172.21.17.15) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Tue, 22 Mar 2022 16:16:41 +0000
Received: from smtp.xilinx.com (172.21.105.198) by
 xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Tue, 22 Mar 2022 16:16:41 +0000
Received: from [10.71.116.49] (port=60610)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nWhBY-0007tG-Ve; Tue, 22 Mar 2022 16:16:41 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 77bc8d9f-a9fb-11ec-8fbc-03012f2f19d4
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Jk18KJ1ezbzN6e4EEeU/XL1dzKhSdU+leFCgCRtWIl70oUhefnOhKf24U9g7NhM4AbuUf0wWbUdcFQXpHqP8SM/UevIwGluvFj4IR0abBKO2YRgs48NeE44tVO0XwOOeURcZSZuniM63wWhBgtAva4nMmwGHWMkILjDYyKr91Hdl/C2AXNEinqm5OfO2BJY/1nG+YXV9eXAg7XmuK/lrzJLIbAzwBZA51VU+DUjlKwf+XsUKPVT9NG6J0ZuA/tTD6ZUEZqU4gkPd7We0T/89M2v1oWnXrqaAWMhWxz2HixARVj9VPfjGKWCwJllPuTX5LDl33mmtQsw3wpeF1zhRgQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=I8csOx1lAskIARzGghth/FfaFB8R/uwOmnUfVqZdjng=;
 b=MleMXjAMPqPqOjzKvLmbVXJ+vTg2BT2qSZoDtZan9V9Svy0/Foz0hNNSLBFyFoWwqypfxUyFZ4MMSty3WDWBE4MXq0mfSIovTCXAn025FMiqJhx+6F4b+7qioBHAW+GZg4gAx7ICmwC5ZeMv8Qgurg6tdMnHvWTIv56THcvQA4WY9aaQZvhXgNmRPw9jR2G9apff0L7OLJEMeNZBM2jNUlzoiB7fYUTpjpZhUvMl3HBsbucoq6yRBX8TVcl9Jo11FRfQny037bp8smbBTk2A0UHmKO6bZ6Kxq0nC+vHRpJs6CfN4RAcpPJzTqevkRjKjSbKcNXUNQCPVPuar7/w0Pg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=xen.org smtp.mailfrom=xilinx.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=xilinx.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=I8csOx1lAskIARzGghth/FfaFB8R/uwOmnUfVqZdjng=;
 b=NvAQ6f19gxIjsX1hhmNrvcc2vCkTH4Cq0tUhezH0TB1X0CdwcQJp63RqVqG9+p38e/zzgvsbk1SI5YzhZV033reMopQYn4vC5wEGrKQrrXZET3ve5jGkRuZ3xc5R5tWBsXCAbh1D2AZC3wZ3X7Qir2fJQ18gvvOIrTStP2ZlsPw=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch01.xlnx.xilinx.com;
Message-ID: <981cb69d-5bec-875f-a921-bc0fa0c11782@xilinx.com>
Date: Tue, 22 Mar 2022 16:16:40 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v11 3/3] xen/arm64: io: Handle data abort due to cache
 maintenance instructions
To: Julien Grall <julien@xen.org>, Ayan Kumar Halder
	<ayan.kumar.halder@xilinx.com>, <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <stefanos@xilinx.com>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>,
	<andrew.cooper3@citrix.com>, <george.dunlap@citrix.com>, <jbeulich@suse.com>,
	<wl@xen.org>, <paul@xen.org>, <roger.pau@citrix.com>
References: <20220317140046.64563-1-ayankuma@xilinx.com>
 <20220317140046.64563-4-ayankuma@xilinx.com>
 <3d6a341d-712d-8701-caf2-49301ae1e01b@xen.org>
 <a6d6aa6f-7dcf-fbed-6400-bb5d028e045e@xilinx.com>
 <9bcab961-8ae1-9e9a-c6da-682aecf2a138@xilinx.com>
 <c7296ea0-5236-1a10-8ef1-74ec83456ce5@xen.org>
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
In-Reply-To: <c7296ea0-5236-1a10-8ef1-74ec83456ce5@xen.org>
Content-Type: text/plain; charset="UTF-8"; format=flowed
Content-Transfer-Encoding: 8bit
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f37bd239-bf61-4afd-7628-08da0c1f5aad
X-MS-TrafficTypeDiagnostic: MN2PR02MB6079:EE_
X-Microsoft-Antispam-PRVS:
	<MN2PR02MB607951CA336E352D827EC979B2179@MN2PR02MB6079.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	IQBckeJF3y5CuWmn5Onk3pFgcFGkzGIZOvLJdTbaCKYIUUJpNhWJwT7mi7WY9NbMGQi85/m09Lxqv4TNwo+dCgCjoJCm82yq9WnBkweYHZw3ryT7YQwu6wx6keH3oG90NF/1u611owUSv/e30lX55PT0KKavQtjg97bILvJMLgwZJyPypltM3A6O1pojlvPh4iTB4fKXHnjLIXWSgaP76sNvGMRtaiCcH7oFtSVx2AHY95yjx8TDW1o1To/XWKzeauvaZycJprfCg3fjhfHKH8jjGel3dhC+nU1ZTWqEF1/lk8lffebpfR9sqPx4Vux2c4M7/9DltkfCH0ZhJGGtKxBFsbNT97CpzbrHXXwsAJdKBzU93wUtsLQ9GNyA33e7/Nuo1u3fopGco1lxetq3iW9UVOAX5i/BTg6PEnDuwqpLmpDUcSeiYWGZNjH2SrWXju7U2JbeIqu1pX7tBZyfrh57+zU+zNysiNMDvCOARKBB73ZfnzcAG+d0Owil+SNMUA2LfKN3XoOeJKHGvYVrcK7sukG0aN3SzreE1katOihGAVw0zCflHDivU+iABrHqMY9/AIUniStxjnVi24taDf37JVZilvRgo2pOPvwd+JYy4p9cHWAfYcs0EeRQpyb3g74BTej1/vqyYk1higOcQghTXiBjQOBTU4Sjj3Td2jocO1D3ctHwJd/Vb9IIJ53SgbnYl7QKgzpmuzBSlJCbXNpXKHdfw9UcaLn6iooaRkA=
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch01.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(9786002)(8936002)(36860700001)(4326008)(7416002)(31686004)(40460700003)(5660300002)(2906002)(8676002)(70586007)(70206006)(508600001)(7636003)(53546011)(2616005)(356005)(110136005)(54906003)(31696002)(36756003)(336012)(316002)(47076005)(426003)(186003)(26005)(82310400004)(83380400001)(50156003)(43740500002);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Mar 2022 16:16:42.9464
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: f37bd239-bf61-4afd-7628-08da0c1f5aad
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch01.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	BN1NAM02FT029.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR02MB6079

Hi Julien,

On 22/03/2022 13:22, Julien Grall wrote:
> Hi Ayan,
>
> On 22/03/2022 12:38, Ayan Kumar Halder wrote:
>>
>> On 22/03/2022 12:06, Ayan Kumar Halder wrote:
>>>
>>> On 18/03/2022 18:26, Julien Grall wrote:
>>>> Hi Ayan,
>>> Hi Julien,
>>>>
>>>> On 17/03/2022 14:00, Ayan Kumar Halder wrote:
>>>>> diff --git a/xen/arch/arm/include/asm/mmio.h 
>>>>> b/xen/arch/arm/include/asm/mmio.h
>>>>> index ca259a79c2..79e64d9af8 100644
>>>>> --- a/xen/arch/arm/include/asm/mmio.h
>>>>> +++ b/xen/arch/arm/include/asm/mmio.h
>>>>> @@ -35,6 +35,7 @@ enum instr_decode_state
>>>>>        * instruction.
>>>>>        */
>>>>>       INSTR_LDR_STR_POSTINDEXING,
>>>>> +    INSTR_CACHE,                    /* Cache Maintenance instr */
>>>>>   };
>>>>>     typedef struct
>>>>> diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
>>>>> index 6f458ee7fd..26c716b4a5 100644
>>>>> --- a/xen/arch/arm/io.c
>>>>> +++ b/xen/arch/arm/io.c
>>>>> @@ -139,6 +139,17 @@ void try_decode_instruction(const struct 
>>>>> cpu_user_regs *regs,
>>>>>           return;
>>>>>       }
>>>>>   +    /*
>>>>> +     * When the data abort is caused due to cache maintenance, 
>>>>> Xen should check
>>>>> +     * if the address belongs to an emulated MMIO region or not. 
>>>>> The behavior
>>>>> +     * will differ accordingly.
>>>>> +     */
>>>>> +    if ( info->dabt.cache )
>>>>> +    {
>>>>> +        info->dabt_instr.state = INSTR_CACHE;
>>>>> +        return;
>>>>> +    }
>>>>> +
>>>>>       /*
>>>>>        * Armv8 processor does not provide a valid syndrome for 
>>>>> decoding some
>>>>>        * instructions. So in order to process these instructions, 
>>>>> Xen must
>>>>> @@ -177,6 +188,13 @@ enum io_state try_handle_mmio(struct 
>>>>> cpu_user_regs *regs,
>>>>>           return rc;
>>>>>       }
>>>>>   +    /*
>>>>> +     * When the data abort is caused due to cache maintenance and 
>>>>> the address
>>>>> +     * belongs to an emulated region, Xen should ignore this 
>>>>> instruction.
>>>>> +     */
>>>>> +    if ( info->dabt_instr.state == INSTR_CACHE )
>>>>
>>>> Reading the Arm Arm, the ISS should be invalid for cache 
>>>> instructions. So, I think the check at the beginning of 
>>>> try_handle_mmio() would prevent us to reach this check.
>>>>
>>>> Can you check that cache instructions on emulated region will 
>>>> effectively be ignored?
>>>
>>> Yes, you are correct.
>>>
>>> I tested with the following (dis)assembly snippet :-
>>>
>>> 0x3001000 is the base address of GIC Distributor base.
>>>
>>>     __asm__ __volatile__("ldr x1, =0x3001000");
>>>     40000ca8:   58000301    ldr x1, 40000d08 <main+0x70>
>>>     __asm __volatile__("DC CVAU, x1");
>>>     40000cac:   d50b7b21    dc  cvau, x1
>>>
>>> This resulting in hitting the assertion :-
>>>
>>> (XEN) Assertion 'unreachable' failed at arch/arm/io.c:178
>>>
>>> I dumped the registers as follows, to determine that the fault is 
>>> caused by the instruction at 40000cac.
>>>
>>> HSR=0x00000092000147  regs->pc = 0x40000cac info.gpa = 0x3001000
>>>
>>>
>>> So, my patch needs to be modified as follows:-
>>>
>>> @@ -172,7 +173,7 @@ enum io_state try_handle_mmio(struct 
>>> cpu_user_regs *regs,
>>>
>>>      ASSERT(info->dabt.ec == HSR_EC_DATA_ABORT_LOWER_EL);
>>>
>>> -    if ( !info->dabt.valid )
>>> +    if ( !(info->dabt.valid || (info->dabt_instr.state == 
>>> INSTR_CACHE)) )
>>
>> Actually this is not needed.
>>
>> The following change is sufficient :-
>>
>> @@ -146,7 +146,9 @@ void try_decode_instruction(const struct 
>> cpu_user_regs *regs,
>>        */
>>       if ( info->dabt.cache )
>>       {
>>           info->dabt_instr.state = INSTR_CACHE;
>> +        info->dabt.valid = 1;
>
> To me, 'info->dabt.valid' indicates whether the syndrome is valid. We 
> set to 1 for emulated instruction because the syndrome will be updated.
>
> But this is not the case for the cache instructions. So I would prefer 
> if it is kept as 0 and use your previous suggestion.
>
> Furthermore, I think try_fwd_ioserv() need to be adapted because the 
> function will use the fields SAS and SRT. From the Arm Arm they are 
> RES0, so while they are 0 today, we should not rely on this.
>
> Therefore, to be fully compliant with the Arm, we want to reorder a 
> bit the code:
>
>  * The field data could be set past ioreq_select_server().
>  * The field size should be set to the cache line size.

I am assuming that we need to invoke  dcache_line_size() (from 
xen/arch/arm/arm64/cache.S ) to get the cache line size.

I think the cache line may be 32 or 64 bytes. In which case, this cannot 
be represented by SAS (as it can represent 1, 2, 4 and 8 bytes).

Also, we are invoking ioreq_select_server() to determine if the address 
is emulated or not. So, can we use an assumed size (= 1 byte) ?

If it is emulated, Xen will ignore the instruction. If it is not 
emulated, Xen will forward the abort to the guest.

Thus, Xen will never execute the instruction. So the correctness of the 
size should not matter here.

- Ayan

>
> Cheers,
>


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 16:23:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 16:23:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293584.498766 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWhIR-0007tI-Fe; Tue, 22 Mar 2022 16:23:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293584.498766; Tue, 22 Mar 2022 16:23:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWhIR-0007tB-CJ; Tue, 22 Mar 2022 16:23:47 +0000
Received: by outflank-mailman (input) for mailman id 293584;
 Tue, 22 Mar 2022 16:23:46 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWhIQ-0007t1-Tu; Tue, 22 Mar 2022 16:23:46 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWhIQ-0001mj-S5; Tue, 22 Mar 2022 16:23:46 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWhIQ-0004Y3-HA; Tue, 22 Mar 2022 16:23:46 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWhIQ-0004UR-Gg; Tue, 22 Mar 2022 16:23:46 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=if8aK8zGfKNS3aTgXowgVlw3+M8GociSNpHW75gokpE=; b=yuclvbipe+Q3EWI1SspyPNJhDf
	Oyjc1tbelx7/8Yyhu8uCCJFkzhJSw8gcmaqyN1dTB/lq2az7PKAak4N7PCnHQS9/XQzvK3t2hHr7g
	7jkDsYt5rwQZDEudSNvpS/1Bg5Qj/dT3PtZ7dsvVWwmuC8MkvLXtO8dGfNqJLpqJn1mI=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168768-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168768: regressions - FAIL
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl:guest-start/debian.repeat:fail:regression
    linux-linus:test-armhf-armhf-xl-vhd:debian-di-install:fail:heisenbug
    linux-linus:test-amd64-amd64-xl-rtds:guest-localmigrate:fail:allowable
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=b47d5a4f6b8d42f8a8fbe891b36215e4fddc53be
X-Osstest-Versions-That:
    linux=eaa54b1458ca84092e513d554dd6d234245e6bef
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 22 Mar 2022 16:23:46 +0000

flight 168768 linux-linus real [real]
flight 168782 linux-linus real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168768/
http://logs.test-lab.xenproject.org/osstest/logs/168782/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-xl         22 guest-start/debian.repeat fail REGR. vs. 168760

Tests which are failing intermittently (not blocking):
 test-armhf-armhf-xl-vhd      12 debian-di-install   fail pass in 168782-retest

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-rtds     18 guest-localmigrate       fail REGR. vs. 168760

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-xl-vhd     14 migrate-support-check fail in 168782 never pass
 test-armhf-armhf-xl-vhd 15 saverestore-support-check fail in 168782 never pass
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168760
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168760
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168760
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168760
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168760
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168760
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168760
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168760
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                b47d5a4f6b8d42f8a8fbe891b36215e4fddc53be
baseline version:
 linux                eaa54b1458ca84092e513d554dd6d234245e6bef

Last test of basis   168760  2022-03-21 19:41:16 Z    0 days
Testing same since   168768  2022-03-22 04:17:09 Z    0 days    1 attempts

------------------------------------------------------------
361 people touched revisions under test,
not listing them all

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          fail    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     fail    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      fail    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 25394 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 16:24:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 16:24:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293591.498778 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWhJQ-0008RX-Rl; Tue, 22 Mar 2022 16:24:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293591.498778; Tue, 22 Mar 2022 16:24:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWhJQ-0008RQ-NK; Tue, 22 Mar 2022 16:24:48 +0000
Received: by outflank-mailman (input) for mailman id 293591;
 Tue, 22 Mar 2022 16:24:47 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nWhJP-0008RG-Ce
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 16:24:47 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWhJO-0001nR-Ry; Tue, 22 Mar 2022 16:24:46 +0000
Received: from 54-240-197-225.amazon.com ([54.240.197.225]
 helo=[192.168.19.186]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWhJO-0000tx-KJ; Tue, 22 Mar 2022 16:24:46 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=kjxz+iPbDMZueqwno7ME6ZF/nc5sSw6SG6ZDu+WUptc=; b=hNrOJH0zuYLp6Gm67FTlVDJyWl
	yGzI77bluCWgy5PT/QJ2bR9N2wus46FHQF+i7WZpV0aHOwmO4EMxDc505OVwmr3CdTxI/SdFYZoWE
	Awnqua92MZnznJZtwilB4TU/FTGa3Pnl8qjaDjr8T8yLo14niuSiwUudE424FxM1RNLA=;
Message-ID: <c51db4b3-9654-d8dc-a5b3-a9226f6d8e33@xen.org>
Date: Tue, 22 Mar 2022 16:24:43 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v11 3/3] xen/arm64: io: Handle data abort due to cache
 maintenance instructions
To: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>,
 xen-devel@lists.xenproject.org
Cc: sstabellini@kernel.org, stefanos@xilinx.com, Volodymyr_Babchuk@epam.com,
 bertrand.marquis@arm.com, andrew.cooper3@citrix.com,
 george.dunlap@citrix.com, jbeulich@suse.com, wl@xen.org, paul@xen.org,
 roger.pau@citrix.com
References: <20220317140046.64563-1-ayankuma@xilinx.com>
 <20220317140046.64563-4-ayankuma@xilinx.com>
 <3d6a341d-712d-8701-caf2-49301ae1e01b@xen.org>
 <a6d6aa6f-7dcf-fbed-6400-bb5d028e045e@xilinx.com>
 <9bcab961-8ae1-9e9a-c6da-682aecf2a138@xilinx.com>
 <c7296ea0-5236-1a10-8ef1-74ec83456ce5@xen.org>
 <981cb69d-5bec-875f-a921-bc0fa0c11782@xilinx.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <981cb69d-5bec-875f-a921-bc0fa0c11782@xilinx.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi,

On 22/03/2022 16:16, Ayan Kumar Halder wrote:
> On 22/03/2022 13:22, Julien Grall wrote:
>> Furthermore, I think try_fwd_ioserv() need to be adapted because the 
>> function will use the fields SAS and SRT. From the Arm Arm they are 
>> RES0, so while they are 0 today, we should not rely on this.
>>
>> Therefore, to be fully compliant with the Arm, we want to reorder a 
>> bit the code:
>>
>>  * The field data could be set past ioreq_select_server().
>>  * The field size should be set to the cache line size.
> 
> I am assuming that we need to invoke  dcache_line_size() (from 
> xen/arch/arm/arm64/cache.S ) to get the cache line size.

You would want to use dcache_line_bytes.

> 
> I think the cache line may be 32 or 64 bytes. In which case, this cannot 
> be represented by SAS (as it can represent 1, 2, 4 and 8 bytes).

You are correct that this cannot be represented by SAS. However, I was 
referring to the field 'size' in the ioreq structure. It is a 32-bit 
integer and could therefore represent the size of the cache line.

> 
> Also, we are invoking ioreq_select_server() to determine if the address 
> is emulated or not. So, can we use an assumed size (= 1 byte) ?

I thought about this. This is technically incorrect but would be OK if 
we cannot find the correct size.

Per above, I think the correct size could be found.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 16:59:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 16:59:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293596.498788 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWhqo-0003Y4-HM; Tue, 22 Mar 2022 16:59:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293596.498788; Tue, 22 Mar 2022 16:59:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWhqo-0003Xx-Dd; Tue, 22 Mar 2022 16:59:18 +0000
Received: by outflank-mailman (input) for mailman id 293596;
 Tue, 22 Mar 2022 16:59:16 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWhqm-0003Xn-T3; Tue, 22 Mar 2022 16:59:16 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWhqm-0002Mw-RC; Tue, 22 Mar 2022 16:59:16 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWhqm-0005fE-FU; Tue, 22 Mar 2022 16:59:16 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWhqm-0006WK-Ey; Tue, 22 Mar 2022 16:59:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=chnUrvegJf1ub1qPEhmytd1Sh0NpB+iPaQbZvyl8htI=; b=1/3m4w/b9BpUWOqYA+f7DKZYz9
	otyy6eqPLs5lznFki2K0VvjAj47XYEGGCT/j6osb08veD2VuibSWwzBGQTmxT+C0a3ElOOECNmQNk
	/ZbjM4MKOs0353x7Ron3rMK7lo4SJUPaiZhQQzKiIfFIHUwYJ5g9XzLye3VwmozJoDlc=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168785-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168785: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 22 Mar 2022 16:59:16 +0000

flight 168785 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168785/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   22 days
Failing since        168258  2022-03-01 01:55:31 Z   21 days  225 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    0 days    6 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 17:21:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 17:21:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293609.498809 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWiBw-00072y-Lb; Tue, 22 Mar 2022 17:21:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293609.498809; Tue, 22 Mar 2022 17:21:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWiBw-00072r-IZ; Tue, 22 Mar 2022 17:21:08 +0000
Received: by outflank-mailman (input) for mailman id 293609;
 Tue, 22 Mar 2022 17:21:07 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=FDwX=UB=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nWiBv-00072l-3P
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 17:21:07 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04on060f.outbound.protection.outlook.com
 [2a01:111:f400:fe0c::60f])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 71e6011b-aa04-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 18:21:01 +0100 (CET)
Received: from DB6PR0601CA0011.eurprd06.prod.outlook.com (2603:10a6:4:7b::21)
 by AM9PR08MB7216.eurprd08.prod.outlook.com (2603:10a6:20b:3df::9)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.19; Tue, 22 Mar
 2022 17:20:59 +0000
Received: from DB5EUR03FT027.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:4:7b:cafe::83) by DB6PR0601CA0011.outlook.office365.com
 (2603:10a6:4:7b::21) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.22 via Frontend
 Transport; Tue, 22 Mar 2022 17:20:59 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT027.mail.protection.outlook.com (10.152.20.121) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Tue, 22 Mar 2022 17:20:59 +0000
Received: ("Tessian outbound 18e50a6f0513:v113");
 Tue, 22 Mar 2022 17:20:59 +0000
Received: from d0547223b42a.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 D4A06B4F-176C-4AA9-8F72-E29937C8257C.1; 
 Tue, 22 Mar 2022 17:19:27 +0000
Received: from EUR02-VE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id d0547223b42a.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 22 Mar 2022 17:19:27 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by AM0PR08MB4610.eurprd08.prod.outlook.com (2603:10a6:208:104::28)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Tue, 22 Mar
 2022 17:19:24 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5081.023; Tue, 22 Mar 2022
 17:19:23 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 71e6011b-aa04-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=dAJkZwTjj9YY4vcqO0WasdWajY3sxqk6ZpbYBwQutb8=;
 b=DExC5VheYSIpC8yNIgriirj6RIvOVQRiNHiWwn/q/t8Vadknn3XYj0MAh55Kx7gUoFoaIGh7spWSF5Axt+w48PrJKenyRmsU+cHt4amHIih7b7oxxXmoTqb2NWrVNU1HRbvqWRhbM5rTK8oKQ9Didd9Ez3z9t+Pe3buOnqxr1q8=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 81b3aa542b6bac5c
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=nnSCuSaFccvcBeTYO/GotWyDvx755OkiokaN0qWCXKEub4f76sZBYqv5P85EL9HXEMX0h5s5vz3KBV6Ox8vP5AWbjbDl2Q20yFpUZWGMqrwR5pScW6hTSi3e55etfWkqSBgpja4+Ls5lxLb86gE0leFh7Ds8h2/S2FQKRQuGExNk3S1An3s3K1OMglwnoRJKGLl9gUHg0toqpA1ayfoZK4Rvj4Zns4xlATpuXaLkLhlGO6g1IY7MYupYudSWqIaAxgzSbkzLxrWH41JBFQn6itFmLxReUCJbJQ7gs9bkwByDONHpJi1x+0VMmcgxI+odybR6IKlwz9rCMZLWoGRQPw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=dAJkZwTjj9YY4vcqO0WasdWajY3sxqk6ZpbYBwQutb8=;
 b=kJim9hzJQV3jOohglcFE98UtjsS4bcDrhnsdnl4JsSakvpw940o4GU42J7IKmYz798OT275Ataj4DQdEJn0XflUIFUC2GxJorbk9keLheL8rkQs9Uq8ULjT5rc+0No1CqtCawLyWp5wVrhjHbTHm8jDZIXd0fW5gthUx4Bt+CmlGyWV0sFPFSqshhXwdL/eI2mZLjM9AQMjxnApkngAtXBU4c9JmPMgbJOikPZSIqDu5vqaBPltOYIo7UVmXzT+EoQNJunoeuP8p1UijTfa2CutwcD7sz7b+IYhGe2VjbAUzWVDqacGnv0bBfz54uaxpEopg5OhiuAR7Bei1HsKblQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=dAJkZwTjj9YY4vcqO0WasdWajY3sxqk6ZpbYBwQutb8=;
 b=DExC5VheYSIpC8yNIgriirj6RIvOVQRiNHiWwn/q/t8Vadknn3XYj0MAh55Kx7gUoFoaIGh7spWSF5Axt+w48PrJKenyRmsU+cHt4amHIih7b7oxxXmoTqb2NWrVNU1HRbvqWRhbM5rTK8oKQ9Didd9Ez3z9t+Pe3buOnqxr1q8=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Julien Grall <julien@xen.org>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, Wei Chen <Wei.Chen@arm.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Wei Liu
	<wl@xen.org>, "rosbrookn@gmail.com" <rosbrookn@gmail.com>, Anthony PERARD
	<anthony.perard@citrix.com>, "christian.lindig@citrix.com"
	<christian.lindig@citrix.com>,
	=?utf-8?B?TWFyZWsgTWFyY3p5a293c2tpLUfDs3JlY2tp?=
	<marmarek@invisiblethingslab.com>
Subject: Re: [PATCH v3 5/6] arm/dom0less: assign dom0less guests to cpupools
Thread-Topic: [PATCH v3 5/6] arm/dom0less: assign dom0less guests to cpupools
Thread-Index: AQHYOtyJQj5Quyvq80eQ8wyveo4cTKzFUeSAgAZaVAA=
Date: Tue, 22 Mar 2022 17:19:23 +0000
Message-ID: <79F0E21A-BD8D-4C31-9398-46893FED4733@arm.com>
References: <20220318152541.7460-1-luca.fancellu@arm.com>
 <20220318152541.7460-6-luca.fancellu@arm.com>
 <cff3d9a6-fc72-ae05-663c-4f0197525455@xen.org>
In-Reply-To: <cff3d9a6-fc72-ae05-663c-4f0197525455@xen.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 4824cf68-d84e-4db4-852f-08da0c285535
x-ms-traffictypediagnostic:
	AM0PR08MB4610:EE_|DB5EUR03FT027:EE_|AM9PR08MB7216:EE_
X-Microsoft-Antispam-PRVS:
	<AM9PR08MB7216D76F0139BBB6166F519EE4179@AM9PR08MB7216.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(66446008)(66556008)(91956017)(76116006)(66946007)(66476007)(64756008)(86362001)(6486002)(316002)(83380400001)(36756003)(186003)(2906002)(8676002)(6916009)(54906003)(2616005)(26005)(38100700002)(33656002)(4326008)(53546011)(6506007)(71200400001)(508600001)(7416002)(38070700005)(8936002)(6512007)(122000001)(5660300002)(32563001)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <D2C07E394C4E96459DBF249744C008E9@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB4610
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT027.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	31da92dc-584f-433f-bde5-08da0c281c54
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	ETs1NzlS0dfvep/MdlvaCoGXsjgV1SMRlK2AIFHYXQxVCNgB2jmAX0i6GG6iHs9qIPd108wgjCGXepH8I4ZQaqtZMxtszaVlwORaQh3dFZI0CjTU7eF7I41kExbMzyI/dkbcJpbJjT615sYPIjFjW8tWfCDz2+gxILW4m25jl076zZ4WeTXLoH5TFOopmArtuxsTrL/LJY/e+g3S3bMZcN2qbO7rgvuORikja03ynXUrUVu1S9zwVQ9m6gLNnp9L6FXdTlbA2LxtsW+gSN6Us8kmRYS+3pXiPQ7VtjCBZlwzxIgUXuucra13jk6R1Zeh/5JRajmw9VtF/JIo3SRC+/P+0QzvORT9DCxBu3S0NxRsTIMorx6jILooOmgZoBlGFFHKA5bQ2MLUjRDNsKuk6YbQBbK6WwFXZWG6TzBzwCtScaJWDiYG14TJMF5YYWzPj1N0ZdjFBYFe+BE+Z1Q85mGYVAtxFwTyftOMyWxiSP6aWmJVd3sAdl+13kiq09VoYCqloWtq76JKmbOpJ1GLpY0JkQa9Gx5lee8mdRcZ9SrpujwtUmcqxG3ywA2cz7lp4eoqYvE5YOj7Js6+jWkxOudwVtCf25BO/aNULWgEZjjK23eJP8UCvUPhI7SS4E9AdtNKiLrhqxprnYk9TOEbhRk/SbRP4PQYGKrGZc703aXugyYU5krAMTTMAv7MWa5w4vNVrw9lKDar7sy8f3CfCw==
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(86362001)(6512007)(54906003)(2906002)(6506007)(336012)(53546011)(47076005)(70586007)(70206006)(36756003)(316002)(6862004)(4326008)(8676002)(508600001)(6486002)(33656002)(81166007)(356005)(82310400004)(8936002)(5660300002)(40460700003)(2616005)(186003)(83380400001)(107886003)(36860700001)(26005)(32563001);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Mar 2022 17:20:59.4142
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 4824cf68-d84e-4db4-852f-08da0c285535
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT027.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR08MB7216
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From xen-devel-bounces@lists.xenproject.org Tue Mar 22 17:40:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 17:40:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293615.498820 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWiUd-00012b-Fl; Tue, 22 Mar 2022 17:40:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293615.498820; Tue, 22 Mar 2022 17:40:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWiUd-00012U-CH; Tue, 22 Mar 2022 17:40:27 +0000
Received: by outflank-mailman (input) for mailman id 293615;
 Tue, 22 Mar 2022 17:40:27 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=T+E5=UB=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nWiUc-00012O-R8
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 17:40:26 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 27e53a24-aa07-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 18:40:25 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 9B1D5B81D2E;
 Tue, 22 Mar 2022 17:40:24 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id B3324C340EC;
 Tue, 22 Mar 2022 17:40:22 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 27e53a24-aa07-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647970823;
	bh=nOY8lzCdaCZbH420j/ZDsLev1CHwxxeUemG4nquF+Mc=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=XzX2URVY1q475BIfJhYgB9GCJBWpA4+jujuMzVs/cqZF6t+a1rI2+05WwWiD33l+/
	 S9mnDQK54JRcr+muNH/ImamP4m7SlW51pzFKx1oqbE/7VzbaNZwD/VviGMwz4fCnOR
	 AKLm/eGxbTR7P9Z1yt5ZidJzI2D5yXhjL6o1TbubQ+EVFV6m3D5nU5AEKHXbk2oB/0
	 J8RAatRrAxrMVuzW7j1lnx1vdBWNz8uMwhYqBNSKUhQ3IpfM6i25T2SF9rgO58shjX
	 ixMOYlb2oAL/o5GDNlBcKM75efQ+yLf9Rsh+xayObFDUzhWic+IcOX7g4vJLrI8yXz
	 lIxJkOYU+OuMQ==
Date: Tue, 22 Mar 2022 10:40:22 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Luca Fancellu <Luca.Fancellu@arm.com>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    Xen-devel <xen-devel@lists.xenproject.org>, 
    Bertrand Marquis <Bertrand.Marquis@arm.com>, Wei Chen <Wei.Chen@arm.com>, 
    Julien Grall <julien@xen.org>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, 
    Andrew Cooper <andrew.cooper3@citrix.com>, 
    George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, 
    Wei Liu <wl@xen.org>, Juergen Gross <jgross@suse.com>, 
    Dario Faggioli <dfaggioli@suse.com>
Subject: Re: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
In-Reply-To: <27898878-F215-4993-805E-BAF04D2D07BC@arm.com>
Message-ID: <alpine.DEB.2.22.394.2203221035490.2910984@ubuntu-linux-20-04-desktop>
References: <20220318152541.7460-1-luca.fancellu@arm.com> <20220318152541.7460-5-luca.fancellu@arm.com> <alpine.DEB.2.22.394.2203211541030.2910984@ubuntu-linux-20-04-desktop> <27898878-F215-4993-805E-BAF04D2D07BC@arm.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: multipart/mixed; BOUNDARY="8323329-793075401-1647970699=:2910984"
Content-ID: <alpine.DEB.2.22.394.2203221038240.2910984@ubuntu-linux-20-04-desktop>

  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--8323329-793075401-1647970699=:2910984
Content-Type: text/plain; CHARSET=UTF-8
Content-Transfer-Encoding: 8BIT
Content-ID: <alpine.DEB.2.22.394.2203221038241.2910984@ubuntu-linux-20-04-desktop>

On Tue, 22 Mar 2022, Luca Fancellu wrote:
> >> +- cpupool-sched (optional)
> >> +
> >> +    Must be a string having the name of a Xen scheduler, it has no effect when
> >> +    used in conjunction of a cpupool-id equal to zero, in that case the
> >> +    default Xen scheduler is selected (sched=<...> boot argument).
> >> +    Check the sched=<...> boot argument for allowed values.
> > 
> > I am happy with this version of the device tree bindings, thanks for
> > your efforts to update them. Only one comment left: please update the
> > description not to include "cpupool-id" given that there is no
> > cpupool-id property anymore :-)
> > 
> 
> Hi Stefano,
> 
> Thank you for your review,
> 
> Yes I missed that! I will fix in the next serie.
> 
> >> 
> >> +/*
> >> + * pool_cpu_map:   Index is logical cpu number, content is cpupool id, (-1) for
> >> + *                 unassigned.
> >> + * pool_sched_map: Index is cpupool id, content is scheduler id, (-1) for
> >> + *                 unassigned.
> >> + */
> >> +static int __initdata pool_cpu_map[NR_CPUS]   = { [0 ... NR_CPUS-1] = -1 };
> >> +static int __initdata pool_sched_map[NR_CPUS] = { [0 ... NR_CPUS-1] = -1 };
> >> +static unsigned int __initdata next_pool_id;
> >> +
> >> +#ifdef CONFIG_HAS_DEVICE_TREE
> > 
> > BOOT_TIME_CPUPOOLS depends on HAS_DEVICE_TREE, so it is not possible to
> > have BOOT_TIME_CPUPOOLS but not HAS_DEVICE_TREE ?
> 
> Yes you are right, the ifdef is not needed at this stage since only arch with device tree are
> using it, if x86 would like to implement a command line version then the code will be ifdef-ined
> later.
> 
> > 
> > 
> >> +#define BTCPUPOOLS_DT_NODE_NO_REG     (-1)
> >> +#define BTCPUPOOLS_DT_NODE_NO_LOG_CPU (-2)
> >> +
> >> +static int __init get_logical_cpu_from_hw_id(unsigned int hwid)
> >> +{
> >> +    unsigned int i;
> >> +
> >> +    for ( i = 0; i < nr_cpu_ids; i++ )
> >> +        if ( cpu_physical_id(i) == hwid )
> >> +            return i;
> >> +
> >> +    return -1;
> >> +}
> > 
> > I wonder if there is a better way to implement this function but I am
> > not sure. Also, it might be better to avoid premature optimizations.
> > 
> > That said, we could check first the simple case where hwid==i. Looking
> > at various existing device tree, it seems to be the most common case.
> > 
> > This is not a requirement, just a hand-wavy suggestion. I think the
> > patch is also OK as is.
> > 
> 
> Not sure to understand here, at least on FVP (the first DT I have around), hwid != i,
> Or maybe I didn’t understand what you mean

I am not surprised. In many boards hwid == i, but it is not a guarantee
at all.

To be honest mine was not really a concrete suggestion, more like the
beginning of a discussion on the subject. The goal would be to avoid
having to scan the __cpu_logical_map array every time without adding a
second data structure. I don't feel strongly about it but I thought I
would mention it anyway just in case you (or someone else) gets a better
idea on how to do this.
--8323329-793075401-1647970699=:2910984--


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 17:44:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 17:44:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293618.498830 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWiYv-0001fk-0R; Tue, 22 Mar 2022 17:44:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293618.498830; Tue, 22 Mar 2022 17:44:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWiYu-0001fd-Tl; Tue, 22 Mar 2022 17:44:52 +0000
Received: by outflank-mailman (input) for mailman id 293618;
 Tue, 22 Mar 2022 17:44:51 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=dCW+=UB=intel.com=tamas.lengyel@srs-se1.protection.inumbo.net>)
 id 1nWiYt-0001fS-Ew
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 17:44:51 +0000
Received: from mga07.intel.com (mga07.intel.com [134.134.136.100])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c3536900-aa07-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 18:44:48 +0100 (CET)
Received: from orsmga005.jf.intel.com ([10.7.209.41])
 by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 22 Mar 2022 10:41:58 -0700
Received: from pinedahx-mobl.amr.corp.intel.com (HELO localhost.localdomain)
 ([10.212.28.2])
 by orsmga005-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 22 Mar 2022 10:41:56 -0700
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c3536900-aa07-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;
  t=1647971088; x=1679507088;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=Xhk57vQMBQZ8sZcCs2TYjPxJVd9VK6VDSHI+BKv+lWo=;
  b=XAgMH1FL9Bognn3WStYE6NdcKXgl6bDiUDuB6rWZ7vEYxCVg0o34d6yW
   kPJP4oSbJ5AShEBescGh05GGo0vcFOOIpfWXaNHXyNsLz+q6Z9+zBu4vd
   yWt649EB1/agZGzabDQoi0+jonrTB8mlOoMStBalnKY3MrWMtrKpv4G3O
   84NbkQgL8nWXKMKlJEctpzEU280me9UJOLh9ma9Jzn3qnzW7OVYbgFz1J
   iqIZGRvGrhSiS9quHjlnLHNTR67Y2OaTuPUEHUOp7fGr+F9EMh+Om+cr4
   uX4srKbBXdaNFzuQbsYnVidlMxBwQVsAEfaVzwZGT4UPS1k9yLrwGLcPJ
   A==;
X-IronPort-AV: E=McAfee;i="6200,9189,10294"; a="321097366"
X-IronPort-AV: E=Sophos;i="5.90,202,1643702400"; 
   d="scan'208";a="321097366"
X-IronPort-AV: E=Sophos;i="5.90,202,1643702400"; 
   d="scan'208";a="717039014"
From: Tamas K Lengyel <tamas.lengyel@intel.com>
To: xen-devel@lists.xenproject.org
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>,
	George Dunlap <george.dunlap@citrix.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Tamas K Lengyel <tamas@tklengyel.com>
Subject: [PATCH 1/3] x86/mem_sharing: option to skip populating special pages during fork
Date: Tue, 22 Mar 2022 13:41:37 -0400
Message-Id: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
X-Mailer: git-send-email 2.25.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Add option to the fork memop to skip populating the fork with special pages.
These special pages are only necessary when setting up forks to be fully
functional with a toolstack. For short-lived forks where no toolstack is active
these pages are uneccesary.

Signed-off-by: Tamas K Lengyel <tamas.lengyel@intel.com>
---
 xen/arch/x86/include/asm/hvm/domain.h |  4 +++-
 xen/arch/x86/mm/mem_sharing.c         | 33 +++++++++++++++++----------
 xen/include/public/memory.h           |  4 ++--
 3 files changed, 26 insertions(+), 15 deletions(-)

diff --git a/xen/arch/x86/include/asm/hvm/domain.h b/xen/arch/x86/include/asm/hvm/domain.h
index 698455444e..446cd06411 100644
--- a/xen/arch/x86/include/asm/hvm/domain.h
+++ b/xen/arch/x86/include/asm/hvm/domain.h
@@ -31,7 +31,9 @@
 #ifdef CONFIG_MEM_SHARING
 struct mem_sharing_domain
 {
-    bool enabled, block_interrupts;
+    bool enabled;
+    bool block_interrupts;
+    bool skip_special_pages;
 
     /*
      * When releasing shared gfn's in a preemptible manner, recall where
diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86/mm/mem_sharing.c
index 15e6a7ed81..84c04ddfa3 100644
--- a/xen/arch/x86/mm/mem_sharing.c
+++ b/xen/arch/x86/mm/mem_sharing.c
@@ -1643,7 +1643,8 @@ static int bring_up_vcpus(struct domain *cd, struct domain *d)
     return 0;
 }
 
-static int copy_vcpu_settings(struct domain *cd, const struct domain *d)
+static int copy_vcpu_settings(struct domain *cd, const struct domain *d,
+                              bool skip_special_pages)
 {
     unsigned int i;
     struct p2m_domain *p2m = p2m_get_hostp2m(cd);
@@ -1660,7 +1661,7 @@ static int copy_vcpu_settings(struct domain *cd, const struct domain *d)
 
         /* Copy & map in the vcpu_info page if the guest uses one */
         vcpu_info_mfn = d_vcpu->vcpu_info_mfn;
-        if ( !mfn_eq(vcpu_info_mfn, INVALID_MFN) )
+        if ( !skip_special_pages && !mfn_eq(vcpu_info_mfn, INVALID_MFN) )
         {
             mfn_t new_vcpu_info_mfn = cd_vcpu->vcpu_info_mfn;
 
@@ -1807,17 +1808,18 @@ static int copy_special_pages(struct domain *cd, struct domain *d)
     return 0;
 }
 
-static int copy_settings(struct domain *cd, struct domain *d)
+static int copy_settings(struct domain *cd, struct domain *d,
+                         bool skip_special_pages)
 {
     int rc;
 
-    if ( (rc = copy_vcpu_settings(cd, d)) )
+    if ( (rc = copy_vcpu_settings(cd, d, skip_special_pages)) )
         return rc;
 
     if ( (rc = hvm_copy_context_and_params(cd, d)) )
         return rc;
 
-    if ( (rc = copy_special_pages(cd, d)) )
+    if ( !skip_special_pages && (rc = copy_special_pages(cd, d)) )
         return rc;
 
     copy_tsc(cd, d);
@@ -1826,9 +1828,11 @@ static int copy_settings(struct domain *cd, struct domain *d)
     return rc;
 }
 
-static int fork(struct domain *cd, struct domain *d)
+static int fork(struct domain *cd, struct domain *d, uint16_t flags)
 {
     int rc = -EBUSY;
+    bool block_interrupts = flags & XENMEM_FORK_BLOCK_INTERRUPTS;
+    bool skip_special_pages = flags & XENMEM_FORK_SKIP_SPECIAL_PAGES;
 
     if ( !cd->controller_pause_count )
         return rc;
@@ -1856,7 +1860,13 @@ static int fork(struct domain *cd, struct domain *d)
     if ( (rc = bring_up_vcpus(cd, d)) )
         goto done;
 
-    rc = copy_settings(cd, d);
+    if ( !(rc = copy_settings(cd, d, skip_special_pages)) )
+    {
+        cd->arch.hvm.mem_sharing.block_interrupts = block_interrupts;
+        cd->arch.hvm.mem_sharing.skip_special_pages = skip_special_pages;
+        /* skip mapping the vAPIC page on unpause if skipping special pages */
+        cd->creation_finished = skip_special_pages;
+    }
 
  done:
     if ( rc && rc != -ERESTART )
@@ -1920,7 +1930,7 @@ static int mem_sharing_fork_reset(struct domain *d)
     }
     spin_unlock_recursive(&d->page_alloc_lock);
 
-    rc = copy_settings(d, pd);
+    rc = copy_settings(d, pd, d->arch.hvm.mem_sharing.skip_special_pages);
 
     domain_unpause(d);
 
@@ -2190,7 +2200,8 @@ int mem_sharing_memop(XEN_GUEST_HANDLE_PARAM(xen_mem_sharing_op_t) arg)
         if ( mso.u.fork.pad )
             goto out;
         if ( mso.u.fork.flags &
-             ~(XENMEM_FORK_WITH_IOMMU_ALLOWED | XENMEM_FORK_BLOCK_INTERRUPTS) )
+             ~(XENMEM_FORK_WITH_IOMMU_ALLOWED | XENMEM_FORK_BLOCK_INTERRUPTS |
+               XENMEM_FORK_SKIP_SPECIAL_PAGES) )
             goto out;
 
         rc = rcu_lock_live_remote_domain_by_id(mso.u.fork.parent_domain,
@@ -2212,14 +2223,12 @@ int mem_sharing_memop(XEN_GUEST_HANDLE_PARAM(xen_mem_sharing_op_t) arg)
             goto out;
         }
 
-        rc = fork(d, pd);
+        rc = fork(d, pd, mso.u.fork.flags);
 
         if ( rc == -ERESTART )
             rc = hypercall_create_continuation(__HYPERVISOR_memory_op,
                                                "lh", XENMEM_sharing_op,
                                                arg);
-        else if ( !rc && (mso.u.fork.flags & XENMEM_FORK_BLOCK_INTERRUPTS) )
-            d->arch.hvm.mem_sharing.block_interrupts = true;
 
         rcu_unlock_domain(pd);
         break;
diff --git a/xen/include/public/memory.h b/xen/include/public/memory.h
index a1a0f0233a..208d8dcbd9 100644
--- a/xen/include/public/memory.h
+++ b/xen/include/public/memory.h
@@ -543,10 +543,10 @@ struct xen_mem_sharing_op {
         } debug;
         struct mem_sharing_op_fork {      /* OP_FORK */
             domid_t parent_domain;        /* IN: parent's domain id */
-/* Only makes sense for short-lived forks */
+/* These flags only makes sense for short-lived forks */
 #define XENMEM_FORK_WITH_IOMMU_ALLOWED (1u << 0)
-/* Only makes sense for short-lived forks */
 #define XENMEM_FORK_BLOCK_INTERRUPTS   (1u << 1)
+#define XENMEM_FORK_SKIP_SPECIAL_PAGES (1u << 2)
             uint16_t flags;               /* IN: optional settings */
             uint32_t pad;                 /* Must be set to 0 */
         } fork;
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 22 17:44:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 17:44:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293619.498842 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWiYw-0001vY-8x; Tue, 22 Mar 2022 17:44:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293619.498842; Tue, 22 Mar 2022 17:44:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWiYw-0001vR-5S; Tue, 22 Mar 2022 17:44:54 +0000
Received: by outflank-mailman (input) for mailman id 293619;
 Tue, 22 Mar 2022 17:44:52 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=dCW+=UB=intel.com=tamas.lengyel@srs-se1.protection.inumbo.net>)
 id 1nWiYu-0001fS-Ie
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 17:44:52 +0000
Received: from mga07.intel.com (mga07.intel.com [134.134.136.100])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c66ac872-aa07-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 18:44:51 +0100 (CET)
Received: from orsmga005.jf.intel.com ([10.7.209.41])
 by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 22 Mar 2022 10:42:00 -0700
Received: from pinedahx-mobl.amr.corp.intel.com (HELO localhost.localdomain)
 ([10.212.28.2])
 by orsmga005-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 22 Mar 2022 10:41:59 -0700
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c66ac872-aa07-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;
  t=1647971091; x=1679507091;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=n5WPsYc98Ed00HkBSm/If63JlbzCdv9YyCjfjyKJigg=;
  b=AcahRsS8PgFTliYvRG6BE30LPS0kGg62NXz3i8xvrkGdZVVlNWbeK+T2
   bOCByGf93ODm1vEWxg5QIkoyCx+xzdSW46IWj3vwX8YKzfmYvzTudFy/l
   Eamr/kmh2XKyC/vGuQ6np5B6eCMYbvVqbdkCjyTqGE6jjVVfCPZDUezB4
   Wjcc06fT70rsD1sB9WY2mZp7wBs6pxmzKfmsOzE4nPjRCOTMa2dB3aXB+
   qeWOXSTfTHKiBlAO2s8h3jHbaSVaCm1xEnvsPQ4LzrBfgoYWkZKr+9jNm
   7roFpA3C6YoKniIGLL01uCBpnnEKm4rkq+tkWUDz/dWRq7k1R9ckq1QZd
   w==;
X-IronPort-AV: E=McAfee;i="6200,9189,10294"; a="321097373"
X-IronPort-AV: E=Sophos;i="5.90,202,1643702400"; 
   d="scan'208";a="321097373"
X-IronPort-AV: E=Sophos;i="5.90,202,1643702400"; 
   d="scan'208";a="717039034"
From: Tamas K Lengyel <tamas.lengyel@intel.com>
To: xen-devel@lists.xenproject.org
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>,
	Tamas K Lengyel <tamas@tklengyel.com>,
	George Dunlap <george.dunlap@citrix.com>
Subject: [PATCH 2/3] x86/mem_sharing: use dom_cow as placeholder parent until fork is complete
Date: Tue, 22 Mar 2022 13:41:38 -0400
Message-Id: <d5d8c7bad025a4ef11bf09ad3a4b23c8b4673ff6.1647970630.git.tamas.lengyel@intel.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
References: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

For the duration of the fork memop set dom_cow as a placeholder parent. This
gets updated to the real parent when the fork operation completes, or to NULL
in case the fork failed. Doing this allows us to skip populating the physmap
with any entries until the fork operation successfully completes. Currently
bringing up vCPUs may inadvertantly map in some pages that can turn out to be
unecessary, like the CR3 gfn when paging is disabled.

Signed-off-by: Tamas K Lengyel <tamas.lengyel@intel.com>
---
 xen/arch/x86/include/asm/mem_sharing.h | 2 +-
 xen/arch/x86/mm/mem_sharing.c          | 5 ++++-
 2 files changed, 5 insertions(+), 2 deletions(-)

diff --git a/xen/arch/x86/include/asm/mem_sharing.h b/xen/arch/x86/include/asm/mem_sharing.h
index cf7a12f4d2..b4a8e8795a 100644
--- a/xen/arch/x86/include/asm/mem_sharing.h
+++ b/xen/arch/x86/include/asm/mem_sharing.h
@@ -79,7 +79,7 @@ static inline int mem_sharing_unshare_page(struct domain *d,
 
 static inline bool mem_sharing_is_fork(const struct domain *d)
 {
-    return d->parent;
+    return d->parent && d->parent != dom_cow;
 }
 
 int mem_sharing_fork_page(struct domain *d, gfn_t gfn,
diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86/mm/mem_sharing.c
index 84c04ddfa3..a21c781452 100644
--- a/xen/arch/x86/mm/mem_sharing.c
+++ b/xen/arch/x86/mm/mem_sharing.c
@@ -1850,7 +1850,9 @@ static int fork(struct domain *cd, struct domain *d, uint16_t flags)
         *cd->arch.cpuid = *d->arch.cpuid;
         *cd->arch.msr = *d->arch.msr;
         cd->vmtrace_size = d->vmtrace_size;
-        cd->parent = d;
+
+        /* use dom_cow as a placeholder until we are all done */
+        cd->parent = dom_cow;
     }
 
     /* This is preemptible so it's the first to get done */
@@ -1862,6 +1864,7 @@ static int fork(struct domain *cd, struct domain *d, uint16_t flags)
 
     if ( !(rc = copy_settings(cd, d, skip_special_pages)) )
     {
+        cd->parent = d;
         cd->arch.hvm.mem_sharing.block_interrupts = block_interrupts;
         cd->arch.hvm.mem_sharing.skip_special_pages = skip_special_pages;
         /* skip mapping the vAPIC page on unpause if skipping special pages */
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 22 17:44:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 17:44:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293620.498853 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWiYx-0002CV-GF; Tue, 22 Mar 2022 17:44:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293620.498853; Tue, 22 Mar 2022 17:44:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWiYx-0002CK-Cs; Tue, 22 Mar 2022 17:44:55 +0000
Received: by outflank-mailman (input) for mailman id 293620;
 Tue, 22 Mar 2022 17:44:54 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=dCW+=UB=intel.com=tamas.lengyel@srs-se1.protection.inumbo.net>)
 id 1nWiYw-0001fS-36
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 17:44:54 +0000
Received: from mga07.intel.com (mga07.intel.com [134.134.136.100])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c73c7006-aa07-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 18:44:52 +0100 (CET)
Received: from orsmga005.jf.intel.com ([10.7.209.41])
 by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 22 Mar 2022 10:42:03 -0700
Received: from pinedahx-mobl.amr.corp.intel.com (HELO localhost.localdomain)
 ([10.212.28.2])
 by orsmga005-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 22 Mar 2022 10:42:00 -0700
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c73c7006-aa07-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;
  t=1647971093; x=1679507093;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=WYMtQsZIvk+g/Avuydv0A87q4HG+CfRZV6LbqZGdHLQ=;
  b=gYzHegvA3pBUw9D8/JY8YLjmNcM1x7EB0xQrWoG8QUMHQbvRZxNCvOps
   4boSd3JPRZLVgpvtzcXOIK9peepig5x6Xtk3TvFqa8dK1OO7WWpVgu9HJ
   +pVLT1vTqDB95GwAtBQm5jxpfw8SMiVXE7tydUg0pKmNxAjPzonVdiY1Y
   3G3/BmFJhcFgTKyBAfU2joQE67Z/bO2lkG6m+HaDYOU9chP3oC742dW1L
   58JwcANQtTtcGqzowOHjkXJposUiu9OEPCZOdIqvZBkD3m7IEHIBBDfTe
   LmiHY3FADX1DgN9M3dafA1TpHQfyYBVq7X4NY+jr1amA2+HKQfLkUvyeu
   w==;
X-IronPort-AV: E=McAfee;i="6200,9189,10294"; a="321097384"
X-IronPort-AV: E=Sophos;i="5.90,202,1643702400"; 
   d="scan'208";a="321097384"
X-IronPort-AV: E=Sophos;i="5.90,202,1643702400"; 
   d="scan'208";a="717039072"
From: Tamas K Lengyel <tamas.lengyel@intel.com>
To: xen-devel@lists.xenproject.org
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>,
	Wei Liu <wl@xen.org>,
	Anthony PERARD <anthony.perard@citrix.com>,
	Juergen Gross <jgross@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Tamas K Lengyel <tamas@tklengyel.com>,
	Alexandru Isaila <aisaila@bitdefender.com>,
	Petre Pircalabu <ppircalabu@bitdefender.com>
Subject: [PATCH 3/3] x86/mem_sharing: make fork_reset more configurable
Date: Tue, 22 Mar 2022 13:41:39 -0400
Message-Id: <fb437a16517d343ba3432aa64b9e14b34630a750.1647970630.git.tamas.lengyel@intel.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
References: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Allow specify distinct parts of the fork VM to be reset. This is useful when a
fuzzing operation involves mapping in only a handful of pages that are known
ahead of time. Throwing these pages away just to be re-copied immediately is
expensive, thus allowing to specify partial resets can speed things up.

Also allow resetting to be initiated from vm_event responses as an
optiomization.

Signed-off-by: Tamas K Lengyel <tamas.lengyel@intel.com>
---
 tools/include/xenctrl.h                |  3 ++-
 tools/libs/ctrl/xc_memshr.c            |  7 ++++++-
 xen/arch/x86/include/asm/mem_sharing.h |  9 +++++++++
 xen/arch/x86/mm/mem_sharing.c          | 22 +++++++++++++++++-----
 xen/common/vm_event.c                  | 14 ++++++++++++++
 xen/include/public/memory.h            |  4 +++-
 xen/include/public/vm_event.h          |  8 ++++++++
 7 files changed, 59 insertions(+), 8 deletions(-)

diff --git a/tools/include/xenctrl.h b/tools/include/xenctrl.h
index 95bd5eca67..1b089a2c02 100644
--- a/tools/include/xenctrl.h
+++ b/tools/include/xenctrl.h
@@ -2290,7 +2290,8 @@ int xc_memshr_fork(xc_interface *xch,
  *
  * With VMs that have a lot of memory this call may block for a long time.
  */
-int xc_memshr_fork_reset(xc_interface *xch, uint32_t forked_domain);
+int xc_memshr_fork_reset(xc_interface *xch, uint32_t forked_domain,
+                         bool reset_state, bool reset_memory);
 
 /* Debug calls: return the number of pages referencing the shared frame backing
  * the input argument. Should be one or greater.
diff --git a/tools/libs/ctrl/xc_memshr.c b/tools/libs/ctrl/xc_memshr.c
index a6cfd7dccf..a0d0b894e2 100644
--- a/tools/libs/ctrl/xc_memshr.c
+++ b/tools/libs/ctrl/xc_memshr.c
@@ -257,12 +257,17 @@ int xc_memshr_fork(xc_interface *xch, uint32_t pdomid, uint32_t domid,
     return xc_memshr_memop(xch, domid, &mso);
 }
 
-int xc_memshr_fork_reset(xc_interface *xch, uint32_t domid)
+int xc_memshr_fork_reset(xc_interface *xch, uint32_t domid, bool reset_state,
+                         bool reset_memory)
 {
     xen_mem_sharing_op_t mso;
 
     memset(&mso, 0, sizeof(mso));
     mso.op = XENMEM_sharing_op_fork_reset;
+    if ( reset_state )
+        mso.u.fork.flags |= XENMEM_FORK_RESET_STATE;
+    if ( reset_memory )
+        mso.u.fork.flags |= XENMEM_FORK_RESET_MEMORY;
 
     return xc_memshr_memop(xch, domid, &mso);
 }
diff --git a/xen/arch/x86/include/asm/mem_sharing.h b/xen/arch/x86/include/asm/mem_sharing.h
index b4a8e8795a..fca5ec8aeb 100644
--- a/xen/arch/x86/include/asm/mem_sharing.h
+++ b/xen/arch/x86/include/asm/mem_sharing.h
@@ -85,6 +85,9 @@ static inline bool mem_sharing_is_fork(const struct domain *d)
 int mem_sharing_fork_page(struct domain *d, gfn_t gfn,
                           bool unsharing);
 
+int mem_sharing_fork_reset(struct domain *d, bool reset_state,
+                           bool reset_memory);
+
 /*
  * If called by a foreign domain, possible errors are
  *   -EBUSY -> ring full
@@ -148,6 +151,12 @@ static inline int mem_sharing_fork_page(struct domain *d, gfn_t gfn, bool lock)
     return -EOPNOTSUPP;
 }
 
+static inline int mem_sharing_fork_reset(struct domain *d, bool reset_state,
+                                         bool reset_memory)
+{
+    return -EOPNOTSUPP;
+}
+
 #endif
 
 #endif /* __MEM_SHARING_H__ */
diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86/mm/mem_sharing.c
index a21c781452..bfa6082f13 100644
--- a/xen/arch/x86/mm/mem_sharing.c
+++ b/xen/arch/x86/mm/mem_sharing.c
@@ -1892,15 +1892,19 @@ static int fork(struct domain *cd, struct domain *d, uint16_t flags)
  * footprints the hypercall continuation should be implemented (or if this
  * feature needs to be become "stable").
  */
-static int mem_sharing_fork_reset(struct domain *d)
+int mem_sharing_fork_reset(struct domain *d, bool reset_state,
+                           bool reset_memory)
 {
-    int rc;
+    int rc = 0;
     struct domain *pd = d->parent;
     struct p2m_domain *p2m = p2m_get_hostp2m(d);
     struct page_info *page, *tmp;
 
     domain_pause(d);
 
+    if ( !reset_memory )
+        goto state;
+
     /* need recursive lock because we will free pages */
     spin_lock_recursive(&d->page_alloc_lock);
     page_list_for_each_safe(page, tmp, &d->page_list)
@@ -1933,7 +1937,9 @@ static int mem_sharing_fork_reset(struct domain *d)
     }
     spin_unlock_recursive(&d->page_alloc_lock);
 
-    rc = copy_settings(d, pd, d->arch.hvm.mem_sharing.skip_special_pages);
+ state:
+    if ( reset_state )
+        rc = copy_settings(d, pd, d->arch.hvm.mem_sharing.skip_special_pages);
 
     domain_unpause(d);
 
@@ -2239,15 +2245,21 @@ int mem_sharing_memop(XEN_GUEST_HANDLE_PARAM(xen_mem_sharing_op_t) arg)
 
     case XENMEM_sharing_op_fork_reset:
     {
+        bool reset_state = mso.u.fork.flags & XENMEM_FORK_RESET_STATE;
+        bool reset_memory = mso.u.fork.flags & XENMEM_FORK_RESET_MEMORY;
+
         rc = -EINVAL;
-        if ( mso.u.fork.pad || mso.u.fork.flags )
+        if ( mso.u.fork.pad || (!reset_state && !reset_memory) )
+            goto out;
+        if ( mso.u.fork.flags &
+             ~(XENMEM_FORK_RESET_STATE | XENMEM_FORK_RESET_MEMORY) )
             goto out;
 
         rc = -ENOSYS;
         if ( !d->parent )
             goto out;
 
-        rc = mem_sharing_fork_reset(d);
+        rc = mem_sharing_fork_reset(d, reset_state, reset_memory);
         break;
     }
 
diff --git a/xen/common/vm_event.c b/xen/common/vm_event.c
index 84cf52636b..a7b192be0d 100644
--- a/xen/common/vm_event.c
+++ b/xen/common/vm_event.c
@@ -28,6 +28,11 @@
 #include <asm/p2m.h>
 #include <asm/monitor.h>
 #include <asm/vm_event.h>
+
+#ifdef CONFIG_MEM_SHARING
+#include <asm/mem_sharing.h>
+#endif
+
 #include <xsm/xsm.h>
 #include <public/hvm/params.h>
 
@@ -394,6 +399,15 @@ static int vm_event_resume(struct domain *d, struct vm_event_domain *ved)
             if ( rsp.reason == VM_EVENT_REASON_MEM_PAGING )
                 p2m_mem_paging_resume(d, &rsp);
 #endif
+#ifdef CONFIG_MEM_SHARING
+            do {
+                bool reset_state = rsp.flags & VM_EVENT_FLAG_RESET_FORK_STATE;
+                bool reset_mem = rsp.flags & VM_EVENT_FLAG_RESET_FORK_MEMORY;
+
+                if ( reset_state || reset_mem )
+                    mem_sharing_fork_reset(d, reset_state, reset_mem);
+            } while(0);
+#endif
 
             /*
              * Check emulation flags in the arch-specific handler only, as it
diff --git a/xen/include/public/memory.h b/xen/include/public/memory.h
index 208d8dcbd9..30ce23c5a7 100644
--- a/xen/include/public/memory.h
+++ b/xen/include/public/memory.h
@@ -541,12 +541,14 @@ struct xen_mem_sharing_op {
                 uint32_t gref;     /* IN: gref to debug         */
             } u;
         } debug;
-        struct mem_sharing_op_fork {      /* OP_FORK */
+        struct mem_sharing_op_fork {      /* OP_FORK/_RESET */
             domid_t parent_domain;        /* IN: parent's domain id */
 /* These flags only makes sense for short-lived forks */
 #define XENMEM_FORK_WITH_IOMMU_ALLOWED (1u << 0)
 #define XENMEM_FORK_BLOCK_INTERRUPTS   (1u << 1)
 #define XENMEM_FORK_SKIP_SPECIAL_PAGES (1u << 2)
+#define XENMEM_FORK_RESET_STATE        (1u << 3)
+#define XENMEM_FORK_RESET_MEMORY       (1u << 4)
             uint16_t flags;               /* IN: optional settings */
             uint32_t pad;                 /* Must be set to 0 */
         } fork;
diff --git a/xen/include/public/vm_event.h b/xen/include/public/vm_event.h
index bb003d21d0..81c2ee28cc 100644
--- a/xen/include/public/vm_event.h
+++ b/xen/include/public/vm_event.h
@@ -127,6 +127,14 @@
  * Reset the vmtrace buffer (if vmtrace is enabled)
  */
 #define VM_EVENT_FLAG_RESET_VMTRACE      (1 << 13)
+/*
+ * Reset the VM state (if VM is fork)
+ */
+#define VM_EVENT_FLAG_RESET_FORK_STATE   (1 << 14)
+/*
+ * Remove unshared entried from physmap (if VM is fork)
+ */
+#define VM_EVENT_FLAG_RESET_FORK_MEMORY  (1 << 15)
 
 /*
  * Reasons for the vm event request
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 22 18:39:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 18:39:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293628.498864 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWjPM-0008Ar-LV; Tue, 22 Mar 2022 18:39:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293628.498864; Tue, 22 Mar 2022 18:39:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWjPM-0008Ak-Hs; Tue, 22 Mar 2022 18:39:04 +0000
Received: by outflank-mailman (input) for mailman id 293628;
 Tue, 22 Mar 2022 18:39:03 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWjPL-0008Aa-44; Tue, 22 Mar 2022 18:39:03 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWjPL-0004Bn-1m; Tue, 22 Mar 2022 18:39:03 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWjPK-0001o1-Ln; Tue, 22 Mar 2022 18:39:02 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWjPK-0003nS-L6; Tue, 22 Mar 2022 18:39:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=7P4whN7RQ9C2guF5aZO1KGsD/rp8JOxf3Vem9D37gyo=; b=zY/adWEi9KwlzjD9bdjx22QXAW
	at/CTGRbJq6D93HT6g+XgajV/U1wq5LzVyN1ggh4IACm4ceibEv5ZRMxbrATy73TnV01SxAR6edDh
	HzQp1+xOHuHYRa4MQKhrxQlGzHCyd+o0tpnUjkK/Qk/YVdJGIBDM0wnTktqK03xTliiU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168788-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168788: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 22 Mar 2022 18:39:02 +0000

flight 168788 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168788/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   22 days
Failing since        168258  2022-03-01 01:55:31 Z   21 days  226 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    0 days    7 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 20:02:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 20:02:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293637.498875 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWki3-0008S9-Ud; Tue, 22 Mar 2022 20:02:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293637.498875; Tue, 22 Mar 2022 20:02:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWki3-0008S2-RS; Tue, 22 Mar 2022 20:02:27 +0000
Received: by outflank-mailman (input) for mailman id 293637;
 Tue, 22 Mar 2022 20:02:27 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=YLS5=UB=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nWki2-0008Rs-Q5
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 20:02:27 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id fcff81e7-aa1a-11ec-a405-831a346695d4;
 Tue, 22 Mar 2022 21:02:24 +0100 (CET)
Received: from pps.filterd (m0246631.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 22MJ3r1q020972; 
 Tue, 22 Mar 2022 20:00:54 GMT
Received: from userp3020.oracle.com (userp3020.oracle.com [156.151.31.79])
 by mx0b-00069f02.pphosted.com with ESMTP id 3ew5y1ymd9-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Tue, 22 Mar 2022 20:00:54 +0000
Received: from pps.filterd (userp3020.oracle.com [127.0.0.1])
 by userp3020.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 22MJuDrP062192;
 Tue, 22 Mar 2022 20:00:52 GMT
Received: from nam02-sn1-obe.outbound.protection.outlook.com
 (mail-sn1anam02lp2042.outbound.protection.outlook.com [104.47.57.42])
 by userp3020.oracle.com with ESMTP id 3exawht6qh-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Tue, 22 Mar 2022 20:00:52 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
 by DM6PR10MB2730.namprd10.prod.outlook.com (2603:10b6:5:b3::15) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.16; Tue, 22 Mar
 2022 20:00:51 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755]) by BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755%9]) with mapi id 15.20.5102.016; Tue, 22 Mar 2022
 20:00:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fcff81e7-aa1a-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=o3sT2wAYugVVZLMZFoWqzPzj2wgcJkVbnTckjo+xtLY=;
 b=KiryJ8Cxca3Lgbx1VCnUZIxRRbVoNutb3v4FPOgDODUSu065ZlaS1jFvxaf2pB9GNTp3
 yW27jCU0oMhndp0GmzT1mEMLx0QCsCjRiG3oLo5avTf3zJQahPUOZVkxVit6H4gwCX6i
 sPsCZ+p69JTBMrPKBUHps10rrduir0GlMTmXE8sR7Zx7INnjT2+63NTQHtNP1SAcCHpT
 PF+88oup5x2FsXAGVEiPLfrnHcZuV+O3trS1DQijTq/InDXfkNJm5vL5IH/A8iFqwq4z
 Lhuii5ooQ1S6/r2iyzTVMIc0ecupb52OCaUaq2e572kdzGm3YlE/NVd6DjwL/Lw6eP/E zw== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=mYMwVmMUyjgEK77qp938tKeAg2uo25sdVLAWdfwgFHr9f41MaM77KdogR2jlXcJegy8vtD/JIeXOeFMVIHaWonAH/n+YpLfXGayVz3e2I1/YOuuore+GAh77IuRHiqh17dhYHzbsoFs6ZurlHhd6sI94vcizxYUHSLBeUXGE5wMrGYszTD9pu3Hfp422e4vWewdZ5gnaKrjRQpanHP0VEqMsoS5aMoypeCxyddC3AIKnycM9UPiob+g+BrRiHQCxmkUYxW+S6DCSulS/jz6Wfj+p9m+fQT6HdinW3rpTAl+u/VZGzMxemZAbRbsYFtmRleiGI0M7mSEJpmdbF52Mvg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=o3sT2wAYugVVZLMZFoWqzPzj2wgcJkVbnTckjo+xtLY=;
 b=Ziw3DkcKMdnrNzy+Y0W9mdTLx1mClAiYZQRxmwTabubs2W+XU8ByBwR4Jk8vIrpDR3llarpW948arMA8vxatTOfUqI6ahqlyNr7KG57oT9O4sGZySsqyAQq56DgnmM5xUzneHlH2IYncTk4fApGYPYdH7bj1eWdJ1y6xSAKEibivW0TTPcnv93X2N2nflgaLP4YdG9SuuzOv2XF6P7LpMk2NFuHnmRNk9DS/FuX/qMMQCaLHD1JWDYpf0ft/KAjxLbayrD+eEGdkmuzd5gXNRnBnP2/Twft9yrwIiXU1XCNNx4uepCwJFSeqyq8sSVt2uszLFeNBBzSpCyNEIyV3fw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=o3sT2wAYugVVZLMZFoWqzPzj2wgcJkVbnTckjo+xtLY=;
 b=f4u96vpJmxVZ8PeyUuFEjmKn4P+26WXL3bgVa6ZrTdc9Nzfs9G4kJdX9ih3R9Dff4zibvanAYMxlVQPMaJL8Y6EA7fUGYdDw8L2yLNt+gJojzyKNr0uh5cwfK9osW7JIbkQmTzu+zE0vAZhyc5nDJ8IyQUMBjnlkgqNN+5DK2Yo=
Message-ID: <bf8a41ed-3d93-9f60-5e2d-780abc177325@oracle.com>
Date: Tue, 22 Mar 2022 16:00:43 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH] xen: fix is_xen_pmu()
Content-Language: en-US
To: Juergen Gross <jgross@suse.com>, xen-devel@lists.xenproject.org,
        x86@kernel.org, linux-kernel@vger.kernel.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
        Thomas Gleixner <tglx@linutronix.de>, Ingo Molnar <mingo@redhat.com>,
        Borislav Petkov <bp@alien8.de>,
        Dave Hansen <dave.hansen@linux.intel.com>,
        "H. Peter Anvin" <hpa@zytor.com>,
        =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?= <marmarek@invisiblethingslab.com>
References: <20220322155001.21979-1-jgross@suse.com>
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
In-Reply-To: <20220322155001.21979-1-jgross@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: SJ0PR05CA0112.namprd05.prod.outlook.com
 (2603:10b6:a03:334::27) To BLAPR10MB5009.namprd10.prod.outlook.com
 (2603:10b6:208:321::10)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 24e44fd6-698c-4d94-be61-08da0c3eaa2b
X-MS-TrafficTypeDiagnostic: DM6PR10MB2730:EE_
X-Microsoft-Antispam-PRVS: 
	<DM6PR10MB2730F9D7674E3E24750FC7388A179@DM6PR10MB2730.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BLAPR10MB5009.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(8676002)(4326008)(2906002)(66476007)(66946007)(186003)(26005)(2616005)(5660300002)(8936002)(66556008)(7416002)(44832011)(38100700002)(83380400001)(86362001)(31696002)(316002)(31686004)(6486002)(54906003)(6666004)(36756003)(45080400002)(6512007)(6506007)(53546011)(508600001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?UlovNXRYUlYvMWtoVWg1dktqam5tZHY4ZkprbWNtQnJTUEVlSTY0RndyRFVn?=
 =?utf-8?B?SUtVckZLYXFHdDhQeGkrMFdJWE5UZS9IeXUweTdrSkNQUU93a21qN0tZU3hS?=
 =?utf-8?B?M2xvOWtsQ2tVc2I3WXVjekJVa0JwbkZWdVpOaFp2SWJXMVo5RktaczhVaVg4?=
 =?utf-8?B?T3NNVTNjZHJYR2w2MTFGbXdWMU5DZUl6cFBTRzA2VGhicmtnTXZZeGtqZ3F6?=
 =?utf-8?B?d2FNaFdLa3poVjlCVEFDZUFRWjduOTlRZlFzUnVPWUtRVHNlQ05UVnNnOUc1?=
 =?utf-8?B?ZUlnRnVxVys2blUxZnlMeEYrZ1lTdm1MWlVyTlprYlpzcTNKVVBnd3RoWHJN?=
 =?utf-8?B?d1FVTDM1c3ZJZVlEK0h1d3VaK2JwUE1WcENpbG9JMVRyQS9yUXpSSk0yMXVX?=
 =?utf-8?B?bkdIN1FLNE5uR0VMdDlqWVVuWGxWbzZhQnR0SEREQ1l5M0dWYklOUmZjSmhx?=
 =?utf-8?B?bUs2cnZ0cXB0SEJqb2dFbWZuUUhsUTZORDZMTGxKdllFTWZ3dW9WTTUvS0J1?=
 =?utf-8?B?YkcyV3ZSSVE2L1RBYkF0RTlLRVhOVURvNisxM2ljOERkK1VmZ2c0cVo3UlFi?=
 =?utf-8?B?Qy9temlFMndxaCtxLzVkUWNtWDNkeVNEdGY5SlFmNk5wK2RqaTBpdDIxbjl6?=
 =?utf-8?B?eVlTVTBlVVV4cExyVW96Ty8wVXZjTktMbUpmc3BiaWM3c0tINjBEcndkVVg3?=
 =?utf-8?B?dzMzUEpJV3VFOXhTbk11SlNZR3Fsbk5CWE5vQkZTbXQ5aHNMT2crSFFLeU5J?=
 =?utf-8?B?OUlQZjltRmVQVkk1ZnRhaEVvZ0JHQXBuSDFFZUxNaVlQV2dGN3RmSHJ4K0JB?=
 =?utf-8?B?SzRyOG9ZTm5ibXFtV1NtbEZtVk5YcUNHRXNkaDlLM0orMDU2YlorUDBJemxH?=
 =?utf-8?B?YlFCUUhpcWpndkdOcHlaRENSVThRaEZBKy8xZEEzaDY5RHlWTHJWSU8zVUJs?=
 =?utf-8?B?Z3JhTjNJVDkrRUNuZ0R2c0NFbkk2em1YV243eXcwbHJZemxaUXpOelJZNW01?=
 =?utf-8?B?ZGtlZzFPTXN1Yk01a0VqNnZ0aHUxQ1dBYk02YnRnTFVUMFRGSDM5UkV6Z01n?=
 =?utf-8?B?cFJkbWh1eFBPaXpscWx2dDdSdVNzOFNqWEYxZzN0UEhRQjZlS1g5eW1pNnJz?=
 =?utf-8?B?RXNzUitBQ3ZldDRBdVQvS2REeHpBRVZqSVpvUkZSUy9vdGQ2OGJzM1o0aGpj?=
 =?utf-8?B?Rksza0REb3FUZlpscW8wVW9abEZZdWtJMG5ld1VvQ242aVN5U09lY2szTWpC?=
 =?utf-8?B?WksvRW8vY0UvdTJDazdtWk9EKzhTRU5SdDFJZGFnWXNjWFNtZll0dVFuM1I3?=
 =?utf-8?B?SDlENFNsZ2JHY3dWUzYxb0hyVGt2UW1YRzJwNDM2MVUycmZzL2ZvWXhCOTUr?=
 =?utf-8?B?dGN3ZTBiRVdET012UjJ3bWkzTkFOMmEvZUovTzVGUzZVRmVWRXNJM2ZKMmt3?=
 =?utf-8?B?ZVJYaXB1SXZ5OG5wSFc0dGV4L2k2K2lzc0o1dENiODFjZlJLVU5pUElWQllv?=
 =?utf-8?B?bGFlMjJ1djMzQTRURU1XZzBrZXNnVTQ3YXptYitQMTBiTEYxaXlrcGNtSGQ2?=
 =?utf-8?B?RlRZdFBEMERjQnRqdEJ4UXZnc1gyQkRwQ1JmTWhQUzRoK01vVVdVWSt6a0d0?=
 =?utf-8?B?M3A5WlIvalVSRk8wb3kySHM1L0NYamNMdisrajcxeURnOWlkbjJzNHJERkNN?=
 =?utf-8?B?dk5tMU5abnI3RWVJS09iWTl5cDg2dGY4ODU0dWdMUnUzTGNzUExsRU1pYlF6?=
 =?utf-8?B?VFV3RnlxV1JmRGhVUXUwVG9HUDFFUURVdWpRU29BV1p5R0JVZURWT0x1UWJ2?=
 =?utf-8?B?MWtHcm5mMEdNdUFxdVk0SHpxU0JVUDNlbkxrMmc5RUZMZmxjZDhTcmszVG1M?=
 =?utf-8?B?eXZuUjNGeEdSRHM5NXloVFF3UUx3SldLWmZmMSs5Skk5cTRsL0I4VksxcUxV?=
 =?utf-8?B?d0dpS0VNMmZOdnJqUXBYWUlNcWFXQmxPQ08wQU04MmFuQmFTQU1MWHpsRGFU?=
 =?utf-8?B?Y1NIUndLWDdRPT0=?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 24e44fd6-698c-4d94-be61-08da0c3eaa2b
X-MS-Exchange-CrossTenant-AuthSource: BLAPR10MB5009.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Mar 2022 20:00:50.9939
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 59BcXluEotDzo3o4rssxOAdbHSJelYaIbypuy3wMRlELB6s6bUziJ2Q5akZVP+iW8Voe3+Q8Y+RFFF3eRpBBT08jZtWZ9KMCSyXaTJMQFYs=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR10MB2730
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10294 signatures=694350
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 bulkscore=0 phishscore=0
 mlxlogscore=999 adultscore=0 suspectscore=0 malwarescore=0 spamscore=0
 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1
 engine=8.12.0-2202240000 definitions=main-2203220104
X-Proofpoint-GUID: iaul_O4QrRAbRmSyqt_mwBeOGpf-C1BU
X-Proofpoint-ORIG-GUID: iaul_O4QrRAbRmSyqt_mwBeOGpf-C1BU


On 3/22/22 11:50 AM, Juergen Gross wrote:
> is_xen_pmu() is taking the cpu number as parameter, but it is not using
> it. Instead it just tests whether the Xen PMU initialization on the
> current cpu did succeed. As this test is done by checking a percpu
> pointer, preemption needs to be disabled in order to avoid switching
> the cpu while doing the test. While resuming from suspend() this seems
> not to be the case:
>
> [   88.082751] ACPI: PM: Low-level resume complete
> [   88.087933] ACPI: EC: EC started
> [   88.091464] ACPI: PM: Restoring platform NVS memory
> [   88.097166] xen_acpi_processor: Uploading Xen processor PM info
> [   88.103850] Enabling non-boot CPUs ...
> [   88.108128] installing Xen timer for CPU 1
> [   88.112763] BUG: using smp_processor_id() in preemptible [00000000] code: systemd-sleep/7138
> [   88.122256] caller is is_xen_pmu+0x12/0x30
> [   88.126937] CPU: 0 PID: 7138 Comm: systemd-sleep Tainted: G        W         5.16.13-2.fc32.qubes.x86_64 #1
> [   88.137939] Hardware name: Star Labs StarBook/StarBook, BIOS 7.97 03/21/2022
> [   88.145930] Call Trace:
> [   88.148757]  <TASK>
> [   88.151193]  dump_stack_lvl+0x48/0x5e
> [   88.155381]  check_preemption_disabled+0xde/0xe0
> [   88.160641]  is_xen_pmu+0x12/0x30
> [   88.164441]  xen_smp_intr_init_pv+0x75/0x100


There is actually another PMU-related problem on restore which was caused (or, rather, highlighted) by ff083a2d972f56bebfd82409ca62e5dfce950961:


[  116.861637] ------------[ cut here ]------------
[  116.861651] WARNING: CPU: 1 PID: 31 at kernel/events/core.c:6614 perf_register_guest_info_callbacks+0x68/0x70
[  116.861673] Modules linked in:
[  116.861682] CPU: 1 PID: 31 Comm: xenwatch Not tainted 5.17.0-rc7ostr #103
[  116.861695] RIP: e030:perf_register_guest_info_callbacks+0x68/0x70
[  116.861706] Code: c7 c7 40 e1 86 82 e8 d7 e7 ff ff 48 8b 53 10 48 85 d2 74 14 48 c7 c6 f0 0a c0 81 48 c7 c7 30 e1 86 82 5b e9 ba e7 ff ff 5b c3 <0f> 0b c3 0f 1f 44 00 00 0f 1f 44 00 00 48 8b 05 54 fd 0b 02 48 39
[  116.861747] RSP: e02b:ffffc9004016fe18 EFLAGS: 00010286
[  116.861758] RAX: ffffffff82432850 RBX: 0000000000000003 RCX: ffff888079c00000
[  116.861768] RDX: ffff888079c00000 RSI: ffffc9004016fe30 RDI: ffffffff82432850
[  116.861778] RBP: 0000000000000000 R08: 0000160000000000 R09: ffffea00000ed340
[  116.861788] R10: 0000000000000758 R11: 0000000000000000 R12: ffff888003b4d000
[  116.861797] R13: 0000000000000003 R14: ffffffff8162cf10 R15: 0000000000000000
[  116.861819] FS:  0000000000000000(0000) GS:ffff888079c80000(0000) knlGS:0000000000000000
[  116.861830] CS:  e030 DS: 0000 ES: 0000 CR0: 0000000080050033
[  116.861839] CR2: 0000000000000000 CR3: 00000000062b6000 CR4: 0000000000040660
[  116.861853] Call Trace:
[  116.861861]  <TASK>
[  116.861866]  xen_pmu_init+0x187/0x280
[  116.861879]  xen_arch_resume+0x30/0x50
[  116.861888]  do_suspend.cold+0x132/0x147
[  116.861899]  shutdown_handler+0x12e/0x140
[  116.861910]  xenwatch_thread+0x94/0x180
[  116.861919]  ? finish_wait+0x80/0x80
[  116.861928]  kthread+0xe7/0x110
[  116.861938]  ? kthread_complete_and_exit+0x20/0x20
[  116.861948]  ret_from_fork+0x22/0x30
[  116.861959]  </TASK>
[  116.861964] ---[ end trace 0000000000000000 ]---


I was going to send a patch but I think yours can be slightly modified to take care of this problem as well.



> @@ -542,6 +539,7 @@ void xen_pmu_init(int cpu)
>   	per_cpu(xenpmu_shared, cpu).flags = 0;
>   
>   	if (cpu == 0) {


               if (!is_xen_pmu)


> +		is_xen_pmu = true;
>   		perf_register_guest_info_callbacks(&xen_guest_cbs);
>   		xen_pmu_arch_init();
>   	}
> @@ -572,4 +570,7 @@ void xen_pmu_finish(int cpu)
>   
>   	free_pages((unsigned long)per_cpu(xenpmu_shared, cpu).xenpmu_data, 0);
>   	per_cpu(xenpmu_shared, cpu).xenpmu_data = NULL;
> +
> +	if (cpu == 0)
> +		is_xen_pmu = false;


And drop this hunk.


-boris




From xen-devel-bounces@lists.xenproject.org Tue Mar 22 20:09:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 20:09:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293641.498885 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWkoz-0000hu-NY; Tue, 22 Mar 2022 20:09:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293641.498885; Tue, 22 Mar 2022 20:09:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWkoz-0000hm-KZ; Tue, 22 Mar 2022 20:09:37 +0000
Received: by outflank-mailman (input) for mailman id 293641;
 Tue, 22 Mar 2022 20:09:36 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nWkoy-0000hg-Is
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 20:09:36 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWkoy-0005kP-4A; Tue, 22 Mar 2022 20:09:36 +0000
Received: from 54-240-197-233.amazon.com ([54.240.197.233]
 helo=[192.168.19.186]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWkox-0006bs-RE; Tue, 22 Mar 2022 20:09:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=7FgbIZxIfOQ/KiI5+5FUyiS/XJeP/DItj/o3NxXk4DQ=; b=w7OyVG/faTZHnxUBMle5IhXWFk
	gD7+GjSSThCN3Lb+hinJJpEC9CSJ1xb8TUR/xFBuLWny4zCxhwFL767XHp7jcuKwL+QDqgrrCSuvT
	vCMOJ3PWVpyvVqLWFM4KfVMSy6GmUysLoTo9F9Fv90qEAujSxsUtNi0LIZxIDe1riQX0=;
Message-ID: <c44fce8a-753a-3f90-5b1e-f839f0a7cc1f@xen.org>
Date: Tue, 22 Mar 2022 20:09:33 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v4 01/11] xen/arm: rename do_phydev_op() to
 do_arm_physdev_op()
To: Juergen Gross <jgross@suse.com>, xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
References: <20220310073420.15622-1-jgross@suse.com>
 <20220310073420.15622-2-jgross@suse.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220310073420.15622-2-jgross@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Juergen,

On 10/03/2022 07:34, Juergen Gross wrote:
> do_physdev_op() prototypes on Arm and x86 differ in their return type,
> so rename the Arm one in order to prepare using a common generated
> header file.
> 
> Signed-off-by: Juergen Gross <jgross@suse.com>

Acked-by: Julien Grall <jgrall@amazon.com>

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 20:13:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 20:13:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293644.498896 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWksX-00025b-7C; Tue, 22 Mar 2022 20:13:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293644.498896; Tue, 22 Mar 2022 20:13:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWksX-00025U-46; Tue, 22 Mar 2022 20:13:17 +0000
Received: by outflank-mailman (input) for mailman id 293644;
 Tue, 22 Mar 2022 20:13:16 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nWksW-00025O-7i
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 20:13:16 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWksV-0005oq-Rr; Tue, 22 Mar 2022 20:13:15 +0000
Received: from 54-240-197-225.amazon.com ([54.240.197.225]
 helo=[192.168.19.186]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWksV-0006vX-Ly; Tue, 22 Mar 2022 20:13:15 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=oCDmvKRMe1Wbh3i+IWFgLE5JYtQlhIoytOBy7uVlgxA=; b=FAnCg5pntC0XKbNUdf6WGyV6bi
	+7Pnd+SW1eMV3s1xKSn/GLUbZslFT7kinWz+dWeo+tgcY58qJxDOkiO9nTzrFgPkJ0pmZid5sYwY/
	I5pcnx9iOxbk+Tb4aN3anz3YYTeUnXzMEtc4zziEz8Z/mvsoWOGx9YRdHL1mpaO2fqeo=;
Message-ID: <dd6678ca-887c-f2ac-fd76-3ef07626b544@xen.org>
Date: Tue, 22 Mar 2022 20:13:13 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v4 02/11] xen: move do_vcpu_op() to arch specific code
To: Juergen Gross <jgross@suse.com>, xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Wei Liu <wl@xen.org>, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
References: <20220310073420.15622-1-jgross@suse.com>
 <20220310073420.15622-3-jgross@suse.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220310073420.15622-3-jgross@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Juergen,

On 10/03/2022 07:34, Juergen Gross wrote:
> diff --git a/xen/common/domain.c b/xen/common/domain.c
> index 351029f8b2..f9de1be43c 100644
> --- a/xen/common/domain.c
> +++ b/xen/common/domain.c
> @@ -1570,15 +1570,11 @@ int default_initialise_vcpu(struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
>       return rc;
>   }
>   
> -long cf_check do_vcpu_op(
> -    int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
> +long common_vcpu_op(int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
>   {
> -    struct domain *d = current->domain;
> -    struct vcpu *v;
>       long rc = 0;
> -
> -    if ( (v = domain_vcpu(d, vcpuid)) == NULL )
> -        return -ENOENT;
> +    struct domain *d = current->domain;

It feels a bit strange to use current when you already have the vcpu in 
hand. So how about using v->domain?

The rest of the patch looks good to me.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 20:15:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 20:15:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293647.498907 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWkul-0002fi-KK; Tue, 22 Mar 2022 20:15:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293647.498907; Tue, 22 Mar 2022 20:15:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWkul-0002fW-HE; Tue, 22 Mar 2022 20:15:35 +0000
Received: by outflank-mailman (input) for mailman id 293647;
 Tue, 22 Mar 2022 20:15:34 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nWkuk-0002fQ-Cp
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 20:15:34 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWkuj-0005sh-V1; Tue, 22 Mar 2022 20:15:33 +0000
Received: from 54-240-197-233.amazon.com ([54.240.197.233]
 helo=[192.168.19.186]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWkuj-0006zI-OQ; Tue, 22 Mar 2022 20:15:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=uBBXBzdtxyws5zZztStvRlCF2ew1rYhGFuuLNRkP/mw=; b=ho/V5sp8v5KcaQOn/RB8Z8YOhV
	WbJyTiXp+3aY1ULLjBGqX7dllZ9lF62uCYV2BQC1x9tw0Reu2AhzcuNmSqaPdqbxitxI/Ea64l/ov
	TLoRg91Qt2kPpqKe4y4GbW4cIP0PGm/WG2AvwDoUnRD6S6z1X3m1nCCRSrVV/b+/sj78=;
Message-ID: <f70d3303-6277-bff7-8b87-af9860102523@xen.org>
Date: Tue, 22 Mar 2022 20:15:31 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v4 05/11] xen: don't include asm/hypercall.h from C
 sources
To: Juergen Gross <jgross@suse.com>, xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Wei Liu <wl@xen.org>, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
References: <20220310073420.15622-1-jgross@suse.com>
 <20220310073420.15622-6-jgross@suse.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220310073420.15622-6-jgross@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Juergen,

On 10/03/2022 07:34, Juergen Gross wrote:
> Instead of including asm/hypercall.h always use xen/hypercall.h.
> Additionally include xen/hypercall.h from all sources containing a
> hypercall handler.
> 
> This prepares for generating the handlers' prototypes at build time.
> 
> Add a guard in asm/hypercall.h to catch direct inclusion.
> 
> Signed-off-by: Juergen Gross <jgross@suse.com>
> Reviewed-by: Jan Beulich <jbeulich@suse.com>

For Arm:

Acked-by: Julien Grall <jgrall@amazon.com> # arm

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 20:25:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 20:25:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293651.498919 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWl4H-0004EL-LU; Tue, 22 Mar 2022 20:25:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293651.498919; Tue, 22 Mar 2022 20:25:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWl4H-0004EE-IU; Tue, 22 Mar 2022 20:25:25 +0000
Received: by outflank-mailman (input) for mailman id 293651;
 Tue, 22 Mar 2022 20:25:24 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nWl4G-0004E8-L0
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 20:25:24 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWl4G-00064D-Ba; Tue, 22 Mar 2022 20:25:24 +0000
Received: from 54-240-197-225.amazon.com ([54.240.197.225]
 helo=[192.168.19.186]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWl4G-0007TA-4o; Tue, 22 Mar 2022 20:25:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=o6eUexAPgm0QthpRgN4d1XU717SkiJFlC+Cg4JkWoyk=; b=s/qcjNL9Wk9K0HPICpf+sk0r4l
	PREoZKsuoCUwo6zWIQ8mjCJSLEfN4d9Bgk+Lexwo3GQDJL9MvrTD1avHxtQ9VJJcQxaOpSDpojj0i
	mhln1aJl+4PSkSRnRVR3347IvxwOaWPxf0QZbRn/TkIdzE4nIk8C7VjtGPpf7dVCVDng=;
Message-ID: <965e651d-92b1-4d2d-3c05-98b905a772e3@xen.org>
Date: Tue, 22 Mar 2022 20:25:21 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v4 07/11] xen: generate hypercall interface related code
To: Juergen Gross <jgross@suse.com>, xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
References: <20220310073420.15622-1-jgross@suse.com>
 <20220310073420.15622-8-jgross@suse.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220310073420.15622-8-jgross@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Juergen,

On 10/03/2022 07:34, Juergen Gross wrote:
> +table:                             pv32     pv64     hvm32    hvm64    arm
> +set_trap_table                     compat   do       -        -        -
> +mmu_update                         do:1     do:1     -        -        -
> +set_gdt                            compat   do       -        -        -
> +stack_switch                       do:2     do:2     -        -        -
> +set_callbacks                      compat   do       -        -        -
> +fpu_taskswitch                     do       do       -        -        -
> +sched_op_compat                    do       do       -        -        dep
> +#ifndef CONFIG_PV_SHIM_EXCLUSIVE
> +platform_op                        compat   do       compat   do       do
> +#endif
> +set_debugreg                       do       do       -        -        -
> +get_debugreg                       do       do       -        -        -
> +update_descriptor                  compat   do       -        -        -
> +memory_op                          compat   do       hvm      hvm      do
> +multicall                          compat:2 do:2     compat   do       do
> +update_va_mapping                  compat   do       -        -        -
> +set_timer_op                       compat   do       compat   do       -
> +event_channel_op_compat            do       do       -        -        dep
> +xen_version                        compat   do       compat   do       do
> +console_io                         do       do       do       do       do
> +physdev_op_compat                  compat   do       -        -        dep
> +#if defined(CONFIG_GRANT_TABLE) || defined(CONFIG_PV_SHIM)
> +grant_table_op                     compat   do       hvm      hvm      do
> +#endif
> +vm_assist                          do       do       do       do       do
> +update_va_mapping_otherdomain      compat   do       -        -        -
> +iret                               compat:1 do:1     -        -        -
> +vcpu_op                            compat   do       compat:1 do:1     do
> +set_segment_base                   do:2     do:2     -        -        -
> +#ifdef CONFIG_PV
> +mmuext_op                          compat:2 do:2     compat   do       -
> +#endif
> +xsm_op                             compat   do       compat   do       do
> +nmi_op                             compat   do       -        -        -
> +sched_op                           compat   do       compat   do       do
> +callback_op                        compat   do       -        -        -
> +#ifdef CONFIG_XENOPROF
> +xenoprof_op                        compat   do       -        -        -
> +#endif
> +event_channel_op                   do       do       do:1     do:1     do

On Arm, I expect this hypercall to be the most used one. So I would 
suggest to add ':1'.

Other than that the column for Arm looks good to me:

Acked-by: Julien Grall <jgrall@amazon.com>

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 20:26:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 20:26:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293654.498929 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWl5P-0004oO-Vt; Tue, 22 Mar 2022 20:26:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293654.498929; Tue, 22 Mar 2022 20:26:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWl5P-0004oH-SI; Tue, 22 Mar 2022 20:26:35 +0000
Received: by outflank-mailman (input) for mailman id 293654;
 Tue, 22 Mar 2022 20:26:35 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nWl5O-0004o7-Uf
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 20:26:34 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWl5O-00065O-AV; Tue, 22 Mar 2022 20:26:34 +0000
Received: from 54-240-197-233.amazon.com ([54.240.197.233]
 helo=[192.168.19.186]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWl5O-0007Y1-4N; Tue, 22 Mar 2022 20:26:34 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=u0+XW/eAC0VZiMwML3/HlieFk362aOkW3LKCwS8oJI8=; b=cppVaLEZPw0DpIPef3pRts4WPe
	yR9vBNvNw34w3ZswtNzZs7EZ9+GQB3uxzufNeCDfkpbtzA7TQdd774M+DQnLiLi/WiOZo60Oq/syC
	7UKbiiVt/a7ahTgy79Mt2msAgCeop9MjwSQ2cxFXk2aZJMLlHG2Xs3neM6nj+QwTvAqM=;
Message-ID: <4a4504a0-abc1-86a8-a382-d6237e5d31a1@xen.org>
Date: Tue, 22 Mar 2022 20:26:31 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v4 08/11] xen: use generated prototypes for hypercall
 handlers
To: Juergen Gross <jgross@suse.com>, xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Wei Liu <wl@xen.org>, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
References: <20220310073420.15622-1-jgross@suse.com>
 <20220310073420.15622-9-jgross@suse.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220310073420.15622-9-jgross@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Juergen,

On 10/03/2022 07:34, Juergen Gross wrote:
> Remove the hypercall handler's prototypes in the related header files
> and use the generated ones instead.
> 
> Some handlers having been static before need to be made globally
> visible.
> 
> Signed-off-by: Juergen Gross <jgross@suse.com>
> Acked-by: Jan Beulich <jbeulich@suse.com>
> ---
>   xen/arch/arm/include/asm/hypercall.h |   1 -

Acked-by: Julien Grall <jgrall@amazon.com>

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 20:28:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 20:28:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293657.498940 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWl7H-0005TN-Ak; Tue, 22 Mar 2022 20:28:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293657.498940; Tue, 22 Mar 2022 20:28:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWl7H-0005TG-7q; Tue, 22 Mar 2022 20:28:31 +0000
Received: by outflank-mailman (input) for mailman id 293657;
 Tue, 22 Mar 2022 20:28:30 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=T+E5=UB=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nWl7F-0005TA-V0
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 20:28:29 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a166f8a7-aa1e-11ec-a405-831a346695d4;
 Tue, 22 Mar 2022 21:28:28 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 270A1616CC;
 Tue, 22 Mar 2022 20:28:27 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 30967C340F0;
 Tue, 22 Mar 2022 20:28:26 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a166f8a7-aa1e-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647980906;
	bh=43wCae7E5R9jd7/Raddt6nkAvz+XPtRSrLPJXw348Mk=;
	h=From:To:Cc:Subject:Date:From;
	b=W3LQGYsUOHOfVjuILdtFxegalzBk3xQSptsJ5a8GaItZ9AXxs0sKq6f6PiRxAEFwT
	 sLX9zpHEg/0vXH1xC/5GCT3Knx5fZ0rX6P08KhYW1OPkjBGmHZD6dNulIG+uVrUE+f
	 Vrvc+mgDDeCNN2NT2scDayHgBwuHUZSTFz/b/M5umisSau5cyWCCXjIrfgl02rnTf7
	 1+2ez68CYg9uDmI3vcQkI6PPkZO0HSCnL9Hoz4nQAT4CuUfInYxtqfQZgSzxL03Fth
	 rZWcXkJHSn5obU3YHOaFc5gnoJQ85K8hhe8HuhLlwUaoJoLGLlclVddc8YFHryoiOb
	 lz6JWacOAlJrA==
From: Stefano Stabellini <sstabellini@kernel.org>
To: xen-devel@lists.xenproject.org
Cc: julien@xen.org,
	sstabellini@kernel.org,
	bertrand.marquis@arm.com,
	Volodymyr_Babchuk@epam.com,
	Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: [PATCH v2] xen/arm: set CPSR Z bit when creating aarch32 guests
Date: Tue, 22 Mar 2022 13:28:25 -0700
Message-Id: <20220322202825.418232-1-sstabellini@kernel.org>
X-Mailer: git-send-email 2.25.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Stefano Stabellini <stefano.stabellini@xilinx.com>

The first 32 bytes of zImage are NOPs. When CONFIG_EFI is enabled in the
kernel, certain versions of Linux will use an UNPREDICATABLE NOP
encoding, sometimes resulting in an unbootable kernel. Whether the
resulting kernel is bootable or not depends on the processor. See commit
a92882a4d270 in the Linux kernel for all the details.

All kernel releases starting from Linux 4.9 without commit a92882a4d270
are affected.

Fortunately there is a simple workaround: setting the "Z" bit in CPSR
make it so those invalid NOP instructions are never executed. That is
because the instruction is conditional (not equal). So, on QEMU at
least, the instruction will end up to be ignored and not generate an
exception. Setting the "Z" bit makes those kernel versions bootable
again and it is harmless in the other cases.

Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
---
Changes in v2:
- improve commit message
- add in-code comment
- move PSR_Z to the beginning
---
 xen/include/public/arch-arm.h | 8 +++++++-
 1 file changed, 7 insertions(+), 1 deletion(-)

diff --git a/xen/include/public/arch-arm.h b/xen/include/public/arch-arm.h
index 94b31511dd..81cee95f14 100644
--- a/xen/include/public/arch-arm.h
+++ b/xen/include/public/arch-arm.h
@@ -361,6 +361,7 @@ typedef uint64_t xen_callback_t;
 #define PSR_DBG_MASK    (1<<9)        /* arm64: Debug Exception mask */
 #define PSR_IT_MASK     (0x0600fc00)  /* Thumb If-Then Mask */
 #define PSR_JAZELLE     (1<<24)       /* Jazelle Mode */
+#define PSR_Z           (1<<30)       /* Zero condition flag */
 
 /* 32 bit modes */
 #define PSR_MODE_USR 0x10
@@ -383,7 +384,12 @@ typedef uint64_t xen_callback_t;
 #define PSR_MODE_EL1t 0x04
 #define PSR_MODE_EL0t 0x00
 
-#define PSR_GUEST32_INIT  (PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MODE_SVC)
+/*
+ * We set PSR_Z to be able to boot Linux kernel versions with an invalid
+ * encoding of the first 8 NOP instructions. See commit a92882a4d270 in
+ * Linux.
+ */
+#define PSR_GUEST32_INIT  (PSR_Z|PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MODE_SVC)
 #define PSR_GUEST64_INIT (PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MODE_EL1h)
 
 #define SCTLR_GUEST_INIT    xen_mk_ullong(0x00c50078)
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 22 20:38:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 20:38:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293661.498952 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWlHJ-0006yT-Bg; Tue, 22 Mar 2022 20:38:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293661.498952; Tue, 22 Mar 2022 20:38:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWlHJ-0006yM-7N; Tue, 22 Mar 2022 20:38:53 +0000
Received: by outflank-mailman (input) for mailman id 293661;
 Tue, 22 Mar 2022 20:38:52 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=T+E5=UB=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nWlHH-0006yG-Vb
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 20:38:51 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org
 [2604:1380:4601:e00::1])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 147c73b9-aa20-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 21:38:50 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 72E1BB81D70;
 Tue, 22 Mar 2022 20:38:49 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id CD184C340EC;
 Tue, 22 Mar 2022 20:38:47 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 147c73b9-aa20-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647981528;
	bh=ptYmmK7oSeN6t7zkKcFYae82czllhfj65kZFPx7eje4=;
	h=Date:From:To:cc:Subject:From;
	b=HX0HINJVWqmJgEXuArleH48dQ277zSRmiIQWFHgW8wQ9nH2OSPvLZhfETGa1OOCEU
	 MoaAiyi9cOcTqPI7ndEt7da0b6uP5Uq8CAQFU9cqgZpwKpmistz6U+ZkiZHdKpVqwT
	 x2IK8Q7JG1WtuUdG8znhSM6UTLFN8E9OgEy57nLDCiCm3OsQAFPqiUCVQDOuesUdFv
	 FyBuNODsd0jYra2TX4nWon/KRi+HQutRLSzp4ZduJJFxd0MA7vaNiSJpfzeQqaJ/5V
	 gVIinEYHnmXULeKo1PjVvzke0BiW+f4OKIfsR0+5ly30HUZ5JVSsoZ3cd4YgvTDW18
	 Q7D9GhilgRdrw==
Date: Tue, 22 Mar 2022 13:38:47 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: xen-devel@lists.xenproject.org
cc: sstabellini@kernel.org, cardoe@cardoe.com, wl@xen.org, 
    andrew.cooper3@citrix.com, anthony.perard@citrix.com, 
    bertrand.marquis@arm.com
Subject: [PATCH v4 0/2] automation: qemu32 smoke test
Message-ID: <alpine.DEB.2.22.394.2203221337230.2910984@ubuntu-linux-20-04-desktop>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

Hi all,

This small series adds a simple Xen + Dom0 boot arm32 test to gitlab-ci
using QEMU, similar to the existing tests for arm64 and x86.

Cheers,

Stefano

Stefano Stabellini (2):
      gitlab-ci: add qemu-system-arm to the existing tests-artifacts container
      gitlab-ci: add an ARM32 qemu-based smoke test

 automation/gitlab-ci/build.yaml                    | 14 +++-
 automation/gitlab-ci/test.yaml                     | 27 +++++++-
 automation/scripts/qemu-smoke-arm32.sh             | 81 ++++++++++++++++++++++
 ...arm64v8.dockerfile => 6.0.0-arm64v8.dockerfile} |  5 +-
 4 files changed, 121 insertions(+), 6 deletions(-)
 create mode 100755 automation/scripts/qemu-smoke-arm32.sh
 rename automation/tests-artifacts/qemu-system-aarch64/{5.2.0-arm64v8.dockerfile => 6.0.0-arm64v8.dockerfile} (95%)


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 20:39:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 20:39:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293662.498962 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWlHR-0007HL-I0; Tue, 22 Mar 2022 20:39:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293662.498962; Tue, 22 Mar 2022 20:39:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWlHR-0007HC-Ec; Tue, 22 Mar 2022 20:39:01 +0000
Received: by outflank-mailman (input) for mailman id 293662;
 Tue, 22 Mar 2022 20:38:59 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=T+E5=UB=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nWlHP-0006yG-AL
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 20:38:59 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 18dc1e7d-aa20-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 21:38:58 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 12354616F6;
 Tue, 22 Mar 2022 20:38:57 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 238A8C340EC;
 Tue, 22 Mar 2022 20:38:56 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 18dc1e7d-aa20-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647981536;
	bh=6fcuGmN0VOLiEsFwZuvE42PfLHtwz8AS00f3BuXsHLc=;
	h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
	b=K9TQ4LGBhNJR0BBC5r6dx7PIlZVHYtbwkrQO3XeFGEwMMwHufAibte88HpfMMfCh7
	 QdVugTuYYaVt2773NHkayT7ReLpxlGdeQA/ikj7JO6kxADjB2ehlYoXQLt1lxdusN/
	 P63wdWdh07wSRJfFTXNl/nsgLLrF7WZzkHm0S140KaO/1JBWPwGg6dvh61mUO6m6hu
	 sS/sLV3KHrFtf92WZcvdjxz0INFlqwuuO4hkGlQCK59odIuqsJN35hJE1jRhe93J/5
	 1BEIvf1fly/LR2xAimJNcrSsClXnHWYHqIJc+rJeR4HEKahFz6tIYGtY/rhRbMMtZj
	 gMktqxaQoTVsQ==
From: Stefano Stabellini <sstabellini@kernel.org>
To: xen-devel@lists.xenproject.org
Cc: sstabellini@kernel.org,
	cardoe@cardoe.com,
	wl@xen.org,
	andrew.cooper3@citrix.com,
	anthony.perard@citrix.com,
	bertrand.marquis@arm.com,
	Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: [PATCH v4 1/2] gitlab-ci: add qemu-system-arm to the existing tests-artifacts container
Date: Tue, 22 Mar 2022 13:38:53 -0700
Message-Id: <20220322203854.420940-1-sstabellini@kernel.org>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <alpine.DEB.2.22.394.2203221337230.2910984@ubuntu-linux-20-04-desktop>
References: <alpine.DEB.2.22.394.2203221337230.2910984@ubuntu-linux-20-04-desktop>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Stefano Stabellini <stefano.stabellini@xilinx.com>

Add qemu-system-arm to the existing test-artifacts qemu container (which
doesn't get build for every iteration but only updated once in a while.)

With qemu-system-arm available, we'll be able to run ARM32 tests.

This patch also bumps the QEMU version to v6.0.0 for both arm32 and
arm64 (the test-artifacts container is one, shared for both).

Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
Reviewed-by: Anthony PERARD <anthony.perard@citrix.com>
---
 automation/gitlab-ci/build.yaml                    | 14 ++++++++++++--
 automation/gitlab-ci/test.yaml                     |  4 ++--
 ...arm64v8.dockerfile => 6.0.0-arm64v8.dockerfile} |  5 +++--
 3 files changed, 17 insertions(+), 6 deletions(-)
 rename automation/tests-artifacts/qemu-system-aarch64/{5.2.0-arm64v8.dockerfile => 6.0.0-arm64v8.dockerfile} (95%)

diff --git a/automation/gitlab-ci/build.yaml b/automation/gitlab-ci/build.yaml
index cc36428cf5..72f2a317ac 100644
--- a/automation/gitlab-ci/build.yaml
+++ b/automation/gitlab-ci/build.yaml
@@ -591,9 +591,9 @@ kernel-5.9.9-arm64-export:
   tags:
     - arm64
 
-qemu-system-aarch64-5.2.0-arm64-export:
+qemu-system-aarch64-6.0.0-arm64-export:
   stage: build
-  image: registry.gitlab.com/xen-project/xen/tests-artifacts/qemu-system-aarch64:5.2.0-arm64v8
+  image: registry.gitlab.com/xen-project/xen/tests-artifacts/qemu-system-aarch64:6.0.0-arm64v8
   script:
     - mkdir binaries && cp /qemu-system-aarch64 binaries/qemu-system-aarch64
   artifacts:
@@ -602,6 +602,16 @@ qemu-system-aarch64-5.2.0-arm64-export:
   tags:
     - arm64
 
+qemu-system-aarch64-6.0.0-arm32-export:
+  stage: build
+  image: registry.gitlab.com/xen-project/xen/tests-artifacts/qemu-system-aarch64:6.0.0-arm64v8
+  script:
+    - mkdir binaries && cp /qemu-system-arm binaries/qemu-system-arm
+  artifacts:
+    paths:
+      - binaries/qemu-system-arm
+  tags:
+    - arm64
 
 # x86_64 test artifacts
 
diff --git a/automation/gitlab-ci/test.yaml b/automation/gitlab-ci/test.yaml
index 47e8704df3..ec2a2e1607 100644
--- a/automation/gitlab-ci/test.yaml
+++ b/automation/gitlab-ci/test.yaml
@@ -33,7 +33,7 @@ qemu-alpine-arm64-gcc:
     - alpine-3.12-gcc-arm64
     - alpine-3.12-arm64-rootfs-export
     - kernel-5.9.9-arm64-export
-    - qemu-system-aarch64-5.2.0-arm64-export
+    - qemu-system-aarch64-6.0.0-arm64-export
   artifacts:
     paths:
       - smoke.serial
@@ -81,7 +81,7 @@ qemu-smoke-arm64-gcc:
   dependencies:
     - debian-unstable-gcc-arm64
     - kernel-5.9.9-arm64-export
-    - qemu-system-aarch64-5.2.0-arm64-export
+    - qemu-system-aarch64-6.0.0-arm64-export
   artifacts:
     paths:
       - smoke.serial
diff --git a/automation/tests-artifacts/qemu-system-aarch64/5.2.0-arm64v8.dockerfile b/automation/tests-artifacts/qemu-system-aarch64/6.0.0-arm64v8.dockerfile
similarity index 95%
rename from automation/tests-artifacts/qemu-system-aarch64/5.2.0-arm64v8.dockerfile
rename to automation/tests-artifacts/qemu-system-aarch64/6.0.0-arm64v8.dockerfile
index e105a1c636..793432d40b 100644
--- a/automation/tests-artifacts/qemu-system-aarch64/5.2.0-arm64v8.dockerfile
+++ b/automation/tests-artifacts/qemu-system-aarch64/6.0.0-arm64v8.dockerfile
@@ -3,7 +3,7 @@ LABEL maintainer.name="The Xen Project" \
       maintainer.email="xen-devel@lists.xenproject.org"
 
 ENV DEBIAN_FRONTEND=noninteractive
-ENV QEMU_VERSION=5.2.0
+ENV QEMU_VERSION=6.0.0
 ENV USER root
 
 RUN mkdir /build
@@ -25,7 +25,7 @@ RUN apt-get update && \
     tar xvJf qemu-"$QEMU_VERSION".tar.xz && \
     cd qemu-"$QEMU_VERSION" && \
     ./configure                \
-        --target-list=aarch64-softmmu \
+        --target-list=arm-softmmu,aarch64-softmmu \
         --enable-system        \
         --disable-blobs        \
         --disable-bsd-user     \
@@ -68,6 +68,7 @@ RUN apt-get update && \
     && \
     make -j$(nproc) && \
     cp ./build/qemu-system-aarch64 / && \
+    cp ./build/qemu-system-arm / && \
     cd /build && \
     rm -rf qemu-"$QEMU_VERSION"* && \
     apt-get autoremove -y && \
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 22 20:39:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 20:39:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293663.498967 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWlHR-0007K6-S3; Tue, 22 Mar 2022 20:39:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293663.498967; Tue, 22 Mar 2022 20:39:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWlHR-0007JK-Mx; Tue, 22 Mar 2022 20:39:01 +0000
Received: by outflank-mailman (input) for mailman id 293663;
 Tue, 22 Mar 2022 20:39:00 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=T+E5=UB=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nWlHQ-0006yG-Af
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 20:39:00 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 194f32f1-aa20-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 21:38:58 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 9BE18616F9;
 Tue, 22 Mar 2022 20:38:57 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id A4D52C340EE;
 Tue, 22 Mar 2022 20:38:56 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 194f32f1-aa20-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647981537;
	bh=6BFOwCcDZyb2QPiN6A24R5iB6eqbhMTsMQW5c95Q1mU=;
	h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
	b=MuWBAHp1H0ee0RCU6GJOKBlsV9CkMV/YP/7xuebuCO+JXAlSiQUqMlo0JjWnu1E6R
	 IFk0db4yfpu1Djtdqp+sOQ1DlGN4ESp26WerEJWxOvK316G7PKcP2E8DkPHtmAuQr0
	 hdX5zC7N9D4vDPgcjfH51xL4k/YzskpgfCU3Bj4+LofO9rRu6YeFAbnqHewfAOg8ML
	 oVxXccqUhJzWYo426AN3ezAwcnO8iT5A7F5OyUEMeITDQDfhhAMepLcppwZkA0bJXP
	 PhBwp8cVTBz4NXfnfpmDEGICKh1G1cbYwlUt7Q3LUFmcaV/BIksh39Enq6uDSoQxMT
	 eWw8R6u3e+RGg==
From: Stefano Stabellini <sstabellini@kernel.org>
To: xen-devel@lists.xenproject.org
Cc: sstabellini@kernel.org,
	cardoe@cardoe.com,
	wl@xen.org,
	andrew.cooper3@citrix.com,
	anthony.perard@citrix.com,
	bertrand.marquis@arm.com,
	Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: [PATCH v4 2/2] gitlab-ci: add an ARM32 qemu-based smoke test
Date: Tue, 22 Mar 2022 13:38:54 -0700
Message-Id: <20220322203854.420940-2-sstabellini@kernel.org>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <alpine.DEB.2.22.394.2203221337230.2910984@ubuntu-linux-20-04-desktop>
References: <alpine.DEB.2.22.394.2203221337230.2910984@ubuntu-linux-20-04-desktop>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Add a minimal ARM32 smoke test based on qemu-system-arm, as provided by
the test-artifacts qemu container. The minimal test simply boots Xen
(built from previous build stages) and Dom0.

The test needs a working kernel and minimal initrd for dom0. Instead of
building our own kernel and initrd, which would mean maintaining one or
two more builting scripts under automation/, we borrow a kernel and
initrd from distros.

For the kernel we pick the Debian Bullseye kernel, which has everything
we need already built-in. However, we cannot use the Debian Bullseye
initrd because it is 22MB and the large size causes QEMU to core dump.

Instead, use the tiny busybox-based rootfs provided by Alpine Linux,
which is really minimal: just 2.5MB. Note that we cannot use the Alpine
Linux kernel because that doesn't boot on Xen.

Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
---
Changes in v4:
- improve commit message
- use Debian Bullseye kernel
- use Alpine Linux initrd
---
 automation/gitlab-ci/test.yaml         | 23 ++++++++
 automation/scripts/qemu-smoke-arm32.sh | 81 ++++++++++++++++++++++++++
 2 files changed, 104 insertions(+)
 create mode 100755 automation/scripts/qemu-smoke-arm32.sh

diff --git a/automation/gitlab-ci/test.yaml b/automation/gitlab-ci/test.yaml
index ec2a2e1607..42cd725a12 100644
--- a/automation/gitlab-ci/test.yaml
+++ b/automation/gitlab-ci/test.yaml
@@ -95,6 +95,29 @@ qemu-smoke-arm64-gcc:
     - /^coverity-tested\/.*/
     - /^stable-.*/
 
+qemu-smoke-arm32-gcc:
+  stage: test
+  image: registry.gitlab.com/xen-project/xen/${CONTAINER}
+  variables:
+    CONTAINER: debian:unstable-arm64v8
+  script:
+    - ./automation/scripts/qemu-smoke-arm32.sh 2>&1 | tee qemu-smoke-arm32.log
+  dependencies:
+    - debian-unstable-gcc-arm32
+    - qemu-system-aarch64-6.0.0-arm32-export
+  artifacts:
+    paths:
+      - smoke.serial
+      - '*.log'
+    when: always
+  tags:
+    - arm64
+  except:
+    - master
+    - smoke
+    - /^coverity-tested\/.*/
+    - /^stable-.*/
+
 qemu-smoke-x86-64-gcc:
   stage: test
   image: registry.gitlab.com/xen-project/xen/${CONTAINER}
diff --git a/automation/scripts/qemu-smoke-arm32.sh b/automation/scripts/qemu-smoke-arm32.sh
new file mode 100755
index 0000000000..d554de7939
--- /dev/null
+++ b/automation/scripts/qemu-smoke-arm32.sh
@@ -0,0 +1,81 @@
+#!/bin/bash
+
+set -ex
+
+export DEBIAN_FRONTENT=noninteractive
+apt-get -qy update
+apt-get -qy install --no-install-recommends device-tree-compiler \
+                                            curl \
+                                            cpio
+
+cd binaries
+# Use the kernel from Debian
+curl --fail --silent --show-error --location --output vmlinuz http://http.us.debian.org/debian/dists/bullseye/main/installer-armhf/current/images/netboot/vmlinuz
+# Use a tiny initrd based on busybox from Alpine Linux
+curl --fail --silent --show-error --location --output initrd.tar.gz https://dl-cdn.alpinelinux.org/alpine/v3.15/releases/armhf/alpine-minirootfs-3.15.1-armhf.tar.gz
+
+mkdir rootfs
+cd rootfs
+tar xvzf ../initrd.tar.gz
+find . | cpio -H newc -o | gzip > ../initrd.gz
+cd ..
+
+kernel=`stat -L --printf="%s" vmlinuz`
+initrd=`stat -L --printf="%s" initrd.gz`
+
+# For Xen, we need a couple of more node. Dump the DT from QEMU and add them
+# XXX QEMU looks for "efi-virtio.rom" even if it is unneeded
+curl -fsSLO https://github.com/qemu/qemu/raw/v5.2.0/pc-bios/efi-virtio.rom
+./qemu-system-arm \
+   -machine virt-6.0 \
+   -machine virtualization=true \
+   -smp 4 \
+   -m 1024 \
+   -serial stdio \
+   -monitor none \
+   -display none \
+   -machine dumpdtb=virt.dtb
+
+dtc -I dtb -O dts virt.dtb > virt.dts
+
+cat >> virt.dts << EOF
+/ {
+	chosen {
+		#address-cells = <0x2>;
+		#size-cells = <0x2>;
+		stdout-path = "/pl011@9000000";
+        xen,xen-bootargs = "console=dtuart dtuart=/pl011@9000000 dom0_mem=512M bootscrub=0";
+		xen,dom0-bootargs = "console=tty0 console=hvc0 earlyprintk clk_ignore_unused root=/dev/ram0 rdinit=/bin/sh init=/bin/sh";
+		dom0 {
+			compatible = "xen,linux-zimage", "xen,multiboot-module";
+			reg = <0x0 0x1000000 0x0 $kernel>;
+		};
+        dom0-ramdisk {
+			compatible = "xen,linux-initrd", "xen,multiboot-module";
+			reg = <0x0 0x3200000 0x0 $initrd>;
+		};
+	};
+};
+EOF
+dtc -I dts -O dtb virt.dts > virt.dtb
+
+rm -f smoke.serial
+set +e
+timeout -k 1 240 \
+./qemu-system-arm \
+   -machine virt-6.0 \
+   -machine virtualization=true \
+   -smp 4 \
+   -m 1024 \
+   -serial stdio \
+   -monitor none \
+   -display none \
+   -dtb virt.dtb \
+   -no-reboot \
+   -kernel ./xen \
+   -device loader,file=./vmlinuz,addr=0x1000000 \
+   -device loader,file=./initrd.gz,addr=0x3200000 |& tee smoke.serial
+
+set -e
+(grep -q "^/ #" smoke.serial) || exit 1
+exit 0
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 22 21:19:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 21:19:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293671.498985 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWluX-00041g-5f; Tue, 22 Mar 2022 21:19:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293671.498985; Tue, 22 Mar 2022 21:19:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWluX-00041Z-2e; Tue, 22 Mar 2022 21:19:25 +0000
Received: by outflank-mailman (input) for mailman id 293671;
 Tue, 22 Mar 2022 21:19:24 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=XyU5=UB=roeck-us.net=linux@srs-se1.protection.inumbo.net>)
 id 1nWluV-00041N-NR
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 21:19:24 +0000
Received: from gateway24.websitewelcome.com (gateway24.websitewelcome.com
 [192.185.51.251]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id bbf95197-aa25-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 22:19:19 +0100 (CET)
Received: from cm11.websitewelcome.com (cm11.websitewelcome.com [100.42.49.5])
 by gateway24.websitewelcome.com (Postfix) with ESMTP id 1A9222FB84
 for <xen-devel@lists.xenproject.org>; Tue, 22 Mar 2022 16:19:18 -0500 (CDT)
Received: from 162-215-252-75.unifiedlayer.com ([208.91.199.152])
 by cmsmtp with SMTP
 id WluPn9fOldx86WluPnuXJD; Tue, 22 Mar 2022 16:19:18 -0500
Received: from 108-223-40-66.lightspeed.sntcca.sbcglobal.net
 ([108.223.40.66]:57612 helo=localhost)
 by bh-25.webhostbox.net with esmtpsa (TLS1.2) tls
 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2)
 (envelope-from <linux@roeck-us.net>)
 id 1nWluO-000g4u-OE; Tue, 22 Mar 2022 21:19:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: bbf95197-aa25-11ec-8fbc-03012f2f19d4
X-Authority-Reason: nr=8
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=roeck-us.net; s=default; h=In-Reply-To:Content-Type:MIME-Version:References
	:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To:Content-Transfer-Encoding
	:Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender:
	Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:
	List-Subscribe:List-Post:List-Owner:List-Archive;
	bh=Al7pVKSedpXzR2mUJv99Hxat4XtGmTagJN/XJ1s2Hmo=; b=sLKrSHw+KVgnGkbzOB/VEO9Fg0
	KeOJMxYu0Bnmzx+A12YhIb/k/Tk3UK2ZVTx0zQcuzkHsdLKhFvMGi8TmZHzt23hyDOYlMO/8cY/PQ
	Yunn41qFPTaRF+ofo07duityfQ5AVD1okUG5CggtfPtzAAvJALxs7O9IRjat/EIXIbzstKLf16y54
	RfQAb/09FG7Hm/HVBSs2kn974LsMYF0m6yN1DlVBpdIJr7IDlc8QTKAG3WsJoVWrO1Tn4O6a7/p8Z
	Gz9TP+2eFoS0gMfpY7o1mvfTMdBvZOp+5drONWxhiqFH/1A6QnPVE8wlQBppd4+BysFkDdGt5WtRp
	L30Scr2A==;
Date: Tue, 22 Mar 2022 14:19:15 -0700
From: Guenter Roeck <linux@roeck-us.net>
To: Christoph Hellwig <hch@lst.de>
Cc: Jens Axboe <axboe@kernel.dk>, linux-block@vger.kernel.org,
	linux-nfs@vger.kernel.org, linux-nilfs@vger.kernel.org,
	Mike Snitzer <snitzer@redhat.com>,
	Philipp Reisner <philipp.reisner@linbit.com>,
	Ryusuke Konishi <konishi.ryusuke@gmail.com>,
	Konstantin Komarov <almaz.alexandrovich@paragon-software.com>,
	Roger Pau =?iso-8859-1?Q?Monn=E9?= <roger.pau@citrix.co>,
	dm-devel@redhat.com, "Md . Haris Iqbal " <haris.iqbal@ionos.com>,
	Lars Ellenberg <lars.ellenberg@linbit.com>,
	linux-fsdevel@vger.kernel.org, xen-devel@lists.xenproject.org,
	Andrew Morton <akpm@linux-foundation.org>, ntfs3@lists.linux.dev,
	Jack Wang <jinpu.wang@ionos.com>,
	Pavel Begunkov <asml.silence@gmail.com>, drbd-dev@lists.linbit.com
Subject: Re: [dm-devel] [PATCH 01/19] fs: remove mpage_alloc
Message-ID: <20220322211915.GA2413063@roeck-us.net>
References: <20220124091107.642561-1-hch@lst.de>
 <20220124091107.642561-2-hch@lst.de>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20220124091107.642561-2-hch@lst.de>
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - bh-25.webhostbox.net
X-AntiAbuse: Original Domain - lists.xenproject.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - roeck-us.net
X-BWhitelist: no
X-Source-IP: 108.223.40.66
X-Source-L: No
X-Exim-ID: 1nWluO-000g4u-OE
X-Source: 
X-Source-Args: 
X-Source-Dir: 
X-Source-Sender: 108-223-40-66.lightspeed.sntcca.sbcglobal.net (localhost) [108.223.40.66]:57612
X-Source-Auth: guenter@roeck-us.net
X-Email-Count: 6
X-Source-Cap: cm9lY2s7YWN0aXZzdG07YmgtMjUud2ViaG9zdGJveC5uZXQ=
X-Local-Domain: yes

On Mon, Jan 24, 2022 at 10:10:49AM +0100, Christoph Hellwig wrote:
> open code mpage_alloc in it's two callers and simplify the results
> because of the context:
> 
>  - __mpage_writepage always passes GFP_NOFS and can thus always sleep and
>     will never get a NULL return from bio_alloc at all.
>  - do_mpage_readpage can only get a non-sleeping context for readahead
>    which never sets PF_MEMALLOC and thus doesn't need the retry loop
>    either.
> 
> Both cases will never have __GFP_HIGH set.
> 

With this patch in the tree, I get:

[    1.198134] Unexpected gfp: 0x2 (__GFP_HIGHMEM). Fixing up to gfp: 0x1192888 (GFP_NOWAIT|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_NOMEMALLOC|__GFP_HARDWALL|__GFP_MOVABLE|__GFP_SKIP_KASAN_POISON). Fix your code!
[    1.198783] CPU: 0 PID: 1 Comm: init Not tainted 5.17.0-01402-g8565d64430f8 #1
[    1.199165] Stack : 0000000000000042 0000000000000000 0000000000000008 dae882cc7dea7ec4
[    1.199563]         a8000000014f0c00 0000000000000000 a80000000146b2c8 ffffffff80d3a920
[    1.199750]         a80000000146b0e0 0000000000000001 0000000000000000 0000000000000000
[    1.199936]         000000000003087f 0000000000000000 ffffffff806d9f54 0000000000000000
[    1.200121]         a80000000146b16f ffffffff80da0000 0000000000000001 000000000119288a
[    1.200306]         ffffffff80da0000 ffffffffffffffff 000000000119288a 000000000119288a
[    1.200491]         a800000001416f00 0000000000000000 ffffffff80774d30 ffffffffa0042718
[    1.200676]         ffffffff80ec2158 a800000001468000 a80000000146b2c0 0000000000000000
[    1.200861]         ffffffff80b55730 0000000000000000 a80000000146b3f8 ffffffff80d3a920
[    1.201046]         0000000000000001 000000000119288a ffffffff80108fa0 dae882cc7dea7ec4
[    1.201236]         ...
[    1.201548] Call Trace:
[    1.201622] [<ffffffff80108fa0>] show_stack+0x38/0x118
[    1.201960] [<ffffffff80b55730>] dump_stack_lvl+0x50/0x6c
[    1.202105] [<ffffffff80b4d8a4>] kmalloc_fix_flags+0x60/0x88
[    1.202249] [<ffffffff802b40f8>] new_slab+0x2d8/0x320
[    1.202375] [<ffffffff802b6844>] ___slab_alloc.constprop.0+0x33c/0x5e8
[    1.202528] [<ffffffff802b6b24>] __slab_alloc.constprop.0+0x34/0x50
[    1.202675] [<ffffffff802b72b8>] kmem_cache_alloc+0x320/0x368
[    1.202811] [<ffffffff805e2a68>] bvec_alloc+0x78/0x128
[    1.202936] [<ffffffff805e2fac>] bio_alloc_bioset+0x194/0x340
[    1.203073] [<ffffffff80325bd8>] do_mpage_readpage+0x540/0x6e0
[    1.203213] [<ffffffff80325e38>] mpage_readahead+0xc0/0x198
[    1.203346] [<ffffffff802583a8>] read_pages+0xc0/0x2e0
[    1.203472] [<ffffffff802589a4>] page_cache_ra_unbounded+0x1cc/0x290
[    1.203622] [<ffffffff8024e2fc>] filemap_fault+0x4f4/0x7e8
[    1.203753] [<ffffffff80282b2c>] __do_fault+0x44/0x190
[    1.203878] [<ffffffff80288e0c>] __handle_mm_fault+0x7e4/0xcd0
[    1.204015] [<ffffffff80289408>] handle_mm_fault+0x110/0x258
[    1.204149] [<ffffffff801220e0>] do_page_fault+0x110/0x4f0
[    1.204278] [<ffffffff801288d8>] tlb_do_page_fault_1+0x108/0x110
[    1.204421] [<ffffffff8035eddc>] padzero+0x64/0x98
[    1.204538] [<ffffffff80360618>] load_elf_binary+0x1808/0x18d0
[    1.204677] [<ffffffff802d9f40>] bprm_execve+0x240/0x5a8
[    1.204806] [<ffffffff802db49c>] kernel_execve+0x144/0x200
[    1.204937] [<ffffffff80b4a658>] try_to_run_init_process+0x18/0x58
[    1.205085] [<ffffffff80b5ecc0>] kernel_init+0xb4/0x10c
[    1.205220] [<ffffffff80102558>] ret_from_kernel_thread+0x14/0x1c

with some qemu emulations. Bisect log is attached.

I can not easily revert the patch since an attempt to do so causes
conflicts, so I can not test upstream without this patch.

Guenter

---
# bad: [8565d64430f8278bea38dab0a3ab60b4e11c71e4] Merge tag 'bounds-fixes-v5.18-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux
# good: [f443e374ae131c168a065ea1748feac6b2e76613] Linux 5.17
git bisect start 'HEAD' 'v5.17'
# good: [5628b8de1228436d47491c662dc521bc138a3d43] Merge tag 'random-5.18-rc1-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/crng/random
git bisect good 5628b8de1228436d47491c662dc521bc138a3d43
# bad: [69d1dea852b54eecd8ad2ec92a7fd371e9aec4bd] Merge tag 'for-5.18/drivers-2022-03-18' of git://git.kernel.dk/linux-block
git bisect bad 69d1dea852b54eecd8ad2ec92a7fd371e9aec4bd
# good: [b080cee72ef355669cbc52ff55dc513d37433600] Merge tag 'for-5.18/io_uring-statx-2022-03-18' of git://git.kernel.dk/linux-block
git bisect good b080cee72ef355669cbc52ff55dc513d37433600
# bad: [22027a9811349de28f81e13e20e83299099acd3a] nvmet: replace ida_simple[get|remove] with the simler ida_[alloc|free]
git bisect bad 22027a9811349de28f81e13e20e83299099acd3a
# bad: [672fdcf0e7de3b1e39416ac85abf178f023271f1] block: partition include/linux/blk-cgroup.h
git bisect bad 672fdcf0e7de3b1e39416ac85abf178f023271f1
# bad: [b42c1fc3d55e077d36718ad9800d89100b2aff81] block: fix the kerneldoc for bio_end_io_acct
git bisect bad b42c1fc3d55e077d36718ad9800d89100b2aff81
# bad: [4b1dc86d1857f1007865cab759f2285280692eee] drbd: bio_alloc can't fail if it is allow to sleep
git bisect bad 4b1dc86d1857f1007865cab759f2285280692eee
# bad: [f0d911927b3c7cf5f9edb5941d0287144a602d0d] nilfs2: remove nilfs_alloc_seg_bio
git bisect bad f0d911927b3c7cf5f9edb5941d0287144a602d0d
# good: [e7243285c0fc87054990fcde630583586ff8ed5f] block: move blk_drop_partitions to blk.h
git bisect good e7243285c0fc87054990fcde630583586ff8ed5f
# bad: [d5f68a42da7a4516e7503c281a54a58727f07dc3] fs: remove mpage_alloc
git bisect bad d5f68a42da7a4516e7503c281a54a58727f07dc3
# good: [322cbb50de711814c42fb088f6d31901502c711a] block: remove genhd.h
git bisect good 322cbb50de711814c42fb088f6d31901502c711a
# first bad commit: [d5f68a42da7a4516e7503c281a54a58727f07dc3] fs: remove mpage_alloc


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 21:38:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 21:38:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293679.498996 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWmD7-0006RX-Pg; Tue, 22 Mar 2022 21:38:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293679.498996; Tue, 22 Mar 2022 21:38:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWmD7-0006RQ-Lp; Tue, 22 Mar 2022 21:38:37 +0000
Received: by outflank-mailman (input) for mailman id 293679;
 Tue, 22 Mar 2022 21:38:36 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=FOC1=UB=gmail.com=konishi.ryusuke@srs-se1.protection.inumbo.net>)
 id 1nWmD6-0006RK-KH
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 21:38:36 +0000
Received: from mail-yw1-x1135.google.com (mail-yw1-x1135.google.com
 [2607:f8b0:4864:20::1135])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 6d0ca56b-aa28-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 22:38:35 +0100 (CET)
Received: by mail-yw1-x1135.google.com with SMTP id
 00721157ae682-2e5969bdf31so206044067b3.8
 for <xen-devel@lists.xenproject.org>; Tue, 22 Mar 2022 14:38:35 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6d0ca56b-aa28-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=IhLarTeeHq9Nw1QHwQ6lX7PivjIpiPg5RT82IKgrTQg=;
        b=QWPcc9K6kzpiWSg9bHLC5Ux6pTX071FsZCtYcVlnRLs8JJwtJ/ac0IRalJyb1gFY56
         hViyubD+HNdafzHy5Qz3FFcJpGRXNix1sXy2MRg1th11yXiDzC1q/YhcakyMmedpM/MX
         QLlSQZIk9Wmc7M51DdE4pN8MFJitd6EJOqN75Ygi/YGCa+D5yg/V6G2V04YueUTt9snG
         Rqbwz9gEOsw6btamKuqw+UBaG4ttR1SzG8LdH1jU0rRf09UomDnAx+xzdQDjMcFzcmY2
         c+QMYpXmDvodY1c19bSYMQ2Ux8egAVrEefZLoPNjtPi8yHTUeSgb7BUgyq76+9YNObBn
         OZwA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=IhLarTeeHq9Nw1QHwQ6lX7PivjIpiPg5RT82IKgrTQg=;
        b=DcDDhMqIUzVM+l2YE7YNVmO7+IJbgRfvtRFtLKazc8YXqz1SGPpGfBr5A4NeQzqtIA
         fwApeO9WgA5feGOQ3xX85PL04nxj4IL313QSEwjNDY+XV7WY5dBv1cnWpwYcC2u6ss3T
         GhnYyTl7IgESezcnayDwRU+8r+FvvmBfd+3qkChmIlnKU2EmtjdH0fg5gkJBhjPS+UpH
         rT0mieW2Y8OFAvhpld9BqDR+VkgJ1Iqb1+Vkr3BrDbSMyrh/xhKXs0eJFoNiEHlDqvkB
         t2Zcfz7A9cGYoCo+HN4TkfuL5ZOmsel6Zlg0mgm1gmcUa2le8xR/V1/eHRc5lZmpgQZ5
         DwQg==
X-Gm-Message-State: AOAM530xB7Bfn/nad2nMMrNObFPvbqWCaGkM9AoOlJY7ZRoiUvj8dTCF
	IpwOHCUFaJFx9H1QNb9tTLEag5qw82xzovXlZ6k=
X-Google-Smtp-Source: ABdhPJw0CYtdti1wVV2bzL0irqt0sBusP9ofAFMscIeoyKl0lzXWGgn2B6cpzjxnKIOUPgO6Hm94TeUp8pnZ5ssFqRM=
X-Received: by 2002:a81:148f:0:b0:2e5:d8d9:5116 with SMTP id
 137-20020a81148f000000b002e5d8d95116mr25793876ywu.111.1647985114087; Tue, 22
 Mar 2022 14:38:34 -0700 (PDT)
MIME-Version: 1.0
References: <20220124091107.642561-1-hch@lst.de> <20220124091107.642561-2-hch@lst.de>
 <20220322211915.GA2413063@roeck-us.net>
In-Reply-To: <20220322211915.GA2413063@roeck-us.net>
From: Ryusuke Konishi <konishi.ryusuke@gmail.com>
Date: Wed, 23 Mar 2022 06:38:22 +0900
Message-ID: <CAKFNMonRd5QQMzLoH3T=M=C=2Q_j9d86EYzZeY4DU2HQAE3E8w@mail.gmail.com>
Subject: Re: [dm-devel] [PATCH 01/19] fs: remove mpage_alloc
To: Christoph Hellwig <hch@lst.de>, Guenter Roeck <linux@roeck-us.net>
Cc: Jens Axboe <axboe@kernel.dk>, linux-block@vger.kernel.org, linux-nfs@vger.kernel.org, 
	linux-nilfs <linux-nilfs@vger.kernel.org>, Mike Snitzer <snitzer@redhat.com>, 
	Philipp Reisner <philipp.reisner@linbit.com>, 
	Konstantin Komarov <almaz.alexandrovich@paragon-software.com>, 
	=?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.co>, 
	device-mapper development <dm-devel@redhat.com>, "Md . Haris Iqbal" <haris.iqbal@ionos.com>, 
	Lars Ellenberg <lars.ellenberg@linbit.com>, linux-fsdevel@vger.kernel.org, 
	xen-devel@lists.xenproject.org, Andrew Morton <akpm@linux-foundation.org>, 
	ntfs3@lists.linux.dev, Jack Wang <jinpu.wang@ionos.com>, 
	Pavel Begunkov <asml.silence@gmail.com>, drbd-dev@lists.linbit.com
Content-Type: text/plain; charset="UTF-8"

On Wed, Mar 23, 2022 at 6:19 AM Guenter Roeck <linux@roeck-us.net> wrote:
>
> On Mon, Jan 24, 2022 at 10:10:49AM +0100, Christoph Hellwig wrote:
> > open code mpage_alloc in it's two callers and simplify the results
> > because of the context:
> >
> >  - __mpage_writepage always passes GFP_NOFS and can thus always sleep and
> >     will never get a NULL return from bio_alloc at all.
> >  - do_mpage_readpage can only get a non-sleeping context for readahead
> >    which never sets PF_MEMALLOC and thus doesn't need the retry loop
> >    either.
> >
> > Both cases will never have __GFP_HIGH set.
> >
>
> With this patch in the tree, I get:
>
> [    1.198134] Unexpected gfp: 0x2 (__GFP_HIGHMEM). Fixing up to gfp: 0x1192888 (GFP_NOWAIT|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_NOMEMALLOC|__GFP_HARDWALL|__GFP_MOVABLE|__GFP_SKIP_KASAN_POISON). Fix your code!
> [    1.198783] CPU: 0 PID: 1 Comm: init Not tainted 5.17.0-01402-g8565d64430f8 #1
> [    1.199165] Stack : 0000000000000042 0000000000000000 0000000000000008 dae882cc7dea7ec4
> [    1.199563]         a8000000014f0c00 0000000000000000 a80000000146b2c8 ffffffff80d3a920
> [    1.199750]         a80000000146b0e0 0000000000000001 0000000000000000 0000000000000000
> [    1.199936]         000000000003087f 0000000000000000 ffffffff806d9f54 0000000000000000
> [    1.200121]         a80000000146b16f ffffffff80da0000 0000000000000001 000000000119288a
> [    1.200306]         ffffffff80da0000 ffffffffffffffff 000000000119288a 000000000119288a
> [    1.200491]         a800000001416f00 0000000000000000 ffffffff80774d30 ffffffffa0042718
> [    1.200676]         ffffffff80ec2158 a800000001468000 a80000000146b2c0 0000000000000000
> [    1.200861]         ffffffff80b55730 0000000000000000 a80000000146b3f8 ffffffff80d3a920
> [    1.201046]         0000000000000001 000000000119288a ffffffff80108fa0 dae882cc7dea7ec4
> [    1.201236]         ...
> [    1.201548] Call Trace:
> [    1.201622] [<ffffffff80108fa0>] show_stack+0x38/0x118
> [    1.201960] [<ffffffff80b55730>] dump_stack_lvl+0x50/0x6c
> [    1.202105] [<ffffffff80b4d8a4>] kmalloc_fix_flags+0x60/0x88
> [    1.202249] [<ffffffff802b40f8>] new_slab+0x2d8/0x320
> [    1.202375] [<ffffffff802b6844>] ___slab_alloc.constprop.0+0x33c/0x5e8
> [    1.202528] [<ffffffff802b6b24>] __slab_alloc.constprop.0+0x34/0x50
> [    1.202675] [<ffffffff802b72b8>] kmem_cache_alloc+0x320/0x368
> [    1.202811] [<ffffffff805e2a68>] bvec_alloc+0x78/0x128
> [    1.202936] [<ffffffff805e2fac>] bio_alloc_bioset+0x194/0x340
> [    1.203073] [<ffffffff80325bd8>] do_mpage_readpage+0x540/0x6e0
> [    1.203213] [<ffffffff80325e38>] mpage_readahead+0xc0/0x198
> [    1.203346] [<ffffffff802583a8>] read_pages+0xc0/0x2e0
> [    1.203472] [<ffffffff802589a4>] page_cache_ra_unbounded+0x1cc/0x290
> [    1.203622] [<ffffffff8024e2fc>] filemap_fault+0x4f4/0x7e8
> [    1.203753] [<ffffffff80282b2c>] __do_fault+0x44/0x190
> [    1.203878] [<ffffffff80288e0c>] __handle_mm_fault+0x7e4/0xcd0
> [    1.204015] [<ffffffff80289408>] handle_mm_fault+0x110/0x258
> [    1.204149] [<ffffffff801220e0>] do_page_fault+0x110/0x4f0
> [    1.204278] [<ffffffff801288d8>] tlb_do_page_fault_1+0x108/0x110
> [    1.204421] [<ffffffff8035eddc>] padzero+0x64/0x98
> [    1.204538] [<ffffffff80360618>] load_elf_binary+0x1808/0x18d0
> [    1.204677] [<ffffffff802d9f40>] bprm_execve+0x240/0x5a8
> [    1.204806] [<ffffffff802db49c>] kernel_execve+0x144/0x200
> [    1.204937] [<ffffffff80b4a658>] try_to_run_init_process+0x18/0x58
> [    1.205085] [<ffffffff80b5ecc0>] kernel_init+0xb4/0x10c
> [    1.205220] [<ffffffff80102558>] ret_from_kernel_thread+0x14/0x1c
>
> with some qemu emulations. Bisect log is attached.
>
> I can not easily revert the patch since an attempt to do so causes
> conflicts, so I can not test upstream without this patch.
>
> Guenter

This looks because the mask of GFP_KERNEL is removed along with
the removal of mpage_alloc().

-static struct bio *
-mpage_alloc(struct block_device *bdev,
-               sector_t first_sector, int nr_vecs,
-               gfp_t gfp_flags)
-{
-       struct bio *bio;
-
-       /* Restrict the given (page cache) mask for slab allocations */
-       gfp_flags &= GFP_KERNEL;
-       bio = bio_alloc(gfp_flags, nr_vecs);

In read ahead mode, do_mpage_readpage() uses the gfp flag of page->mapping.

        if (args->is_readahead) {
                op |= REQ_RAHEAD;
                gfp = readahead_gfp_mask(page->mapping);
        } else {
                gfp = mapping_gfp_constraint(page->mapping, GFP_KERNEL);
        }

The default value of the gfp flag is set to GFP_HIGHUSER_MOVABLE by
inode_init_always().
So, __GFP_HIGHMEM hits the gfp warning at bio_alloc() that
do_mpage_readpage() calls.


Ryusuke Konishi


>
> ---
> # bad: [8565d64430f8278bea38dab0a3ab60b4e11c71e4] Merge tag 'bounds-fixes-v5.18-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux
> # good: [f443e374ae131c168a065ea1748feac6b2e76613] Linux 5.17
> git bisect start 'HEAD' 'v5.17'
> # good: [5628b8de1228436d47491c662dc521bc138a3d43] Merge tag 'random-5.18-rc1-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/crng/random
> git bisect good 5628b8de1228436d47491c662dc521bc138a3d43
> # bad: [69d1dea852b54eecd8ad2ec92a7fd371e9aec4bd] Merge tag 'for-5.18/drivers-2022-03-18' of git://git.kernel.dk/linux-block
> git bisect bad 69d1dea852b54eecd8ad2ec92a7fd371e9aec4bd
> # good: [b080cee72ef355669cbc52ff55dc513d37433600] Merge tag 'for-5.18/io_uring-statx-2022-03-18' of git://git.kernel.dk/linux-block
> git bisect good b080cee72ef355669cbc52ff55dc513d37433600
> # bad: [22027a9811349de28f81e13e20e83299099acd3a] nvmet: replace ida_simple[get|remove] with the simler ida_[alloc|free]
> git bisect bad 22027a9811349de28f81e13e20e83299099acd3a
> # bad: [672fdcf0e7de3b1e39416ac85abf178f023271f1] block: partition include/linux/blk-cgroup.h
> git bisect bad 672fdcf0e7de3b1e39416ac85abf178f023271f1
> # bad: [b42c1fc3d55e077d36718ad9800d89100b2aff81] block: fix the kerneldoc for bio_end_io_acct
> git bisect bad b42c1fc3d55e077d36718ad9800d89100b2aff81
> # bad: [4b1dc86d1857f1007865cab759f2285280692eee] drbd: bio_alloc can't fail if it is allow to sleep
> git bisect bad 4b1dc86d1857f1007865cab759f2285280692eee
> # bad: [f0d911927b3c7cf5f9edb5941d0287144a602d0d] nilfs2: remove nilfs_alloc_seg_bio
> git bisect bad f0d911927b3c7cf5f9edb5941d0287144a602d0d
> # good: [e7243285c0fc87054990fcde630583586ff8ed5f] block: move blk_drop_partitions to blk.h
> git bisect good e7243285c0fc87054990fcde630583586ff8ed5f
> # bad: [d5f68a42da7a4516e7503c281a54a58727f07dc3] fs: remove mpage_alloc
> git bisect bad d5f68a42da7a4516e7503c281a54a58727f07dc3
> # good: [322cbb50de711814c42fb088f6d31901502c711a] block: remove genhd.h
> git bisect good 322cbb50de711814c42fb088f6d31901502c711a
> # first bad commit: [d5f68a42da7a4516e7503c281a54a58727f07dc3] fs: remove mpage_alloc


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 21:52:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 21:52:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293682.499006 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWmQJ-0000Hh-VU; Tue, 22 Mar 2022 21:52:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293682.499006; Tue, 22 Mar 2022 21:52:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWmQJ-0000HR-Sb; Tue, 22 Mar 2022 21:52:15 +0000
Received: by outflank-mailman (input) for mailman id 293682;
 Tue, 22 Mar 2022 21:52:15 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWmQJ-0000HG-7n; Tue, 22 Mar 2022 21:52:15 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWmQJ-0007Wu-4n; Tue, 22 Mar 2022 21:52:15 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWmQI-00038t-QT; Tue, 22 Mar 2022 21:52:14 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWmQI-0005SP-Q0; Tue, 22 Mar 2022 21:52:14 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=WN0/f3sHEwVtsjVn9zxW8GlXfWuguyklruaFDI1NNQ4=; b=GueWMwHnQo43FWBCQnrm/8BoVY
	aOBmDZx7P4scrGRLwqgoUq1nkD+IRq4WH7KO8pqwndnu4WGDnMk2yUxQqUl17G0Nf/u+P4APw52X+
	L4SFOHEqsX8RXtS9yll3e4OZYs65VInvTPSMeCdPGVGdDDpOxLvr6l/v9tn/V+Ewu8ds=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168789-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168789: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 22 Mar 2022 21:52:14 +0000

flight 168789 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168789/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   22 days
Failing since        168258  2022-03-01 01:55:31 Z   21 days  227 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    0 days    8 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 22 22:53:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 22 Mar 2022 22:53:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293692.499018 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWnNV-0006K1-5Z; Tue, 22 Mar 2022 22:53:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293692.499018; Tue, 22 Mar 2022 22:53:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWnNV-0006Ju-2J; Tue, 22 Mar 2022 22:53:25 +0000
Received: by outflank-mailman (input) for mailman id 293692;
 Tue, 22 Mar 2022 22:53:24 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWnNU-0006Jk-C3; Tue, 22 Mar 2022 22:53:24 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWnNU-0008VY-8G; Tue, 22 Mar 2022 22:53:24 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWnNT-00079S-OI; Tue, 22 Mar 2022 22:53:23 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWnNT-00061y-No; Tue, 22 Mar 2022 22:53:23 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=mvm2DIxc+39WFmg7xVsJET7XhD+6O02JxDZCHKypCyA=; b=MMWQUaI5l/RiXuy26yG7jsLzPe
	QzJHVB9tQkHQ3QPnVol2sEYHmaIa2FZuMcURMd5QiKXlXDYeHxXvzjrJbJCemlfxgo5+wKyV3GZMo
	aUMP/lxeHTtm4GgluJauPikTfE4jqeHGly2UgROh2Tl7glYQB+asDR4Yy3DrREWWO+H0=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168784-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168784: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-amd64-amd64-xl-rtds:guest-saverestore.2:fail:allowable
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=5791de9d48743c7fde0c0d9b065f260056968e99
X-Osstest-Versions-That:
    qemuu=330724977b10f5b92610817e8b7d1dfed122df87
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 22 Mar 2022 22:53:23 +0000

flight 168784 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168784/

Failures :-/ but no regressions.

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-rtds     19 guest-saverestore.2      fail REGR. vs. 168765

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168765
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168765
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168765
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168765
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168765
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168765
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168765
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168765
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass

version targeted for testing:
 qemuu                5791de9d48743c7fde0c0d9b065f260056968e99
baseline version:
 qemuu                330724977b10f5b92610817e8b7d1dfed122df87

Last test of basis   168765  2022-03-22 02:38:15 Z    0 days
Testing same since   168784  2022-03-22 15:38:21 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Eric Blake <eblake@redhat.com>
  Lei Rao <lei.rao@intel.com>
  Paolo Bonzini <pbonzini@redhat.com>
  Peter Maydell <peter.maydell@linaro.org>
  Rao Lei <lei.rao@intel.com>
  Vladimir Sementsov-Ogievskiy <v.sementsov-og@mail.ru>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     fail    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   330724977b..5791de9d48  5791de9d48743c7fde0c0d9b065f260056968e99 -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 00:08:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 00:08:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293701.499028 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWoXr-0005Zo-WC; Wed, 23 Mar 2022 00:08:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293701.499028; Wed, 23 Mar 2022 00:08:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWoXr-0005Zh-TE; Wed, 23 Mar 2022 00:08:11 +0000
Received: by outflank-mailman (input) for mailman id 293701;
 Wed, 23 Mar 2022 00:08:10 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=RTL5=UC=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nWoXq-0005Zb-IM
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 00:08:10 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 5131aa02-aa3d-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 01:08:08 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id C85E5612D2;
 Wed, 23 Mar 2022 00:08:06 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id CEE3BC340EC;
 Wed, 23 Mar 2022 00:08:05 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5131aa02-aa3d-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647994086;
	bh=N7iDlJF01CUUgAbqniay20AhN/tFtDX3Q8xXXUt3DBo=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=LJ/vAp+BywJx7zWQEss24xrfrmJl04OiVyjxK/sWX8eVwQmPAkm2KXGN4LRqLEUsY
	 +PQfQyocQMWTbs2kvXxikkkv8sjhoNq9oTcTII+EHdCHRRGojsXSgUR+uzrg+d0t7F
	 AqT44+g64oc38pzs4hB9yGobxzQmnBdBJF15GkmaaLGPpgHl47GkChomJErhAyFIO2
	 Pb0YRO4gLHYrT5mEMZGYdvScnE+7y+fy+YhsMgdM5biU32hX9We9B3Y3BsWgrfC85W
	 9x22k/Jb+Fhu3EKU9jz5DR1lJQO7T9s2RZr8+fwroPcNo1sVFW/24QVJHlEC8/8mj6
	 qMfvKudLtZ6zg==
Date: Tue, 22 Mar 2022 17:08:05 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Julien Grall <julien@xen.org>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    xen-devel@lists.xenproject.org, jgross@suse.com, Bertrand.Marquis@arm.com, 
    Volodymyr_Babchuk@epam.com, 
    Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: Re: [PATCH v3 1/5] xen: introduce xen,enhanced dom0less property
In-Reply-To: <3a00dff8-c213-616e-48b0-6e2b6f30dbce@xen.org>
Message-ID: <alpine.DEB.2.22.394.2203221653230.2910984@ubuntu-linux-20-04-desktop>
References: <alpine.DEB.2.22.394.2201281330520.27308@ubuntu-linux-20-04-desktop> <20220128213307.2822078-1-sstabellini@kernel.org> <3a00dff8-c213-616e-48b0-6e2b6f30dbce@xen.org>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Sat, 29 Jan 2022, Julien Grall wrote:
> > diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
> > index 6931c022a2..9144d6c0b6 100644
> > --- a/xen/arch/arm/domain_build.c
> > +++ b/xen/arch/arm/domain_build.c
> > @@ -2963,6 +2963,7 @@ static int __init construct_domU(struct domain *d,
> >                                    const struct dt_device_node *node)
> >   {
> >       struct kernel_info kinfo = {};
> > +    const char *dom0less_enhanced;
> >       int rc;
> >       u64 mem;
> >   @@ -2978,6 +2979,12 @@ static int __init construct_domU(struct domain *d,
> >         kinfo.vpl011 = dt_property_read_bool(node, "vpl011");
> >   +    rc = dt_property_read_string(node, "xen,enhanced",
> > &dom0less_enhanced);
> > +    if ( rc == -EILSEQ ||
> 
> I think the use an -EILSEQ wants an explanation. In a previous version, you
> wrote that the value would be returned when:
> 
> fdt set /chosen/domU0 xen,enhanced
> 
> But it is not clear why. Can you print pp->value, pp->length, strnlen(..) when
> this happens?

I added in dt_property_read_string:

printk("DEBUG %s %d value=%s value[0]=%d length=%u len=%lu\n",__func__,__LINE__,(char*)pp->value, *((char*)pp->value),pp->length, strlen(pp->value));

This is the output:
(XEN) DEBUG dt_property_read_string 205 value= value[0]=0 length=0 len=0



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 00:22:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 00:22:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293704.499040 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWolT-0007qe-8C; Wed, 23 Mar 2022 00:22:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293704.499040; Wed, 23 Mar 2022 00:22:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWolT-0007qX-4L; Wed, 23 Mar 2022 00:22:15 +0000
Received: by outflank-mailman (input) for mailman id 293704;
 Wed, 23 Mar 2022 00:22:13 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=RTL5=UC=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nWolR-0007qR-OX
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 00:22:13 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 48560d39-aa3f-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 01:22:12 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 0A4E061241;
 Wed, 23 Mar 2022 00:22:11 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id C5C41C340EC;
 Wed, 23 Mar 2022 00:22:09 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 48560d39-aa3f-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647994930;
	bh=vEmttIlR7Y89tTfj0Rz5EHjzjN/FACrOLSKV0h7xYfQ=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=diua1idBbZxoN3khLNMi/t4RLJiFTk58zLcVXYAWkgXXHseEfGd+Is3yQE4o9JPKq
	 auRK+KtHvNtIHH46k9SyN7aUybQ1VwIdNT7yM07XSVKtOKMdh7dsdZUAAPZKdtjr5i
	 TGvP7SSB1FCZKwGxwlXIhqxJIGLpLf0hbMYQlYbGz4/m6Bk6I5tcMVROhn+zw0vFwk
	 3b5jVnDIfSuEVxwygxHHvL1Jcvby5EK+b0203A3NcBrHhNsyAlbwJQnul3tpKkRRSw
	 gjsCulxDD4pM7eLnZHdevFKpQxCeR3f7qPizPhASHnKcQ/sktpqB3PV4vQEDHHd0OH
	 vkGrFDg4Yg/aA==
Date: Tue, 22 Mar 2022 17:22:09 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: "Daniel P. Smith" <dpsmith.dev@gmail.com>, jbeulich@suse.com
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    xen-devel@lists.xenproject.org, jgross@suse.com, Bertrand.Marquis@arm.com, 
    julien@xen.org, Volodymyr_Babchuk@epam.com, 
    Luca Miccio <lucmiccio@gmail.com>, 
    Stefano Stabellini <stefano.stabellini@xilinx.com>, 
    Andrew Cooper <andrew.cooper3@citrix.com>, 
    George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH v3 2/5] xen: make evtchn_alloc_unbound public
In-Reply-To: <2f05e63a-96c3-e78f-f7e4-36fd17fcd58c@gmail.com>
Message-ID: <alpine.DEB.2.22.394.2203221711110.2910984@ubuntu-linux-20-04-desktop>
References: <alpine.DEB.2.22.394.2201281330520.27308@ubuntu-linux-20-04-desktop> <20220128213307.2822078-2-sstabellini@kernel.org> <2f05e63a-96c3-e78f-f7e4-36fd17fcd58c@gmail.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Tue, 15 Mar 2022, Daniel P. Smith wrote:
> On 1/28/22 16:33, Stefano Stabellini wrote:
> > From: Luca Miccio <lucmiccio@gmail.com>
> > 
> > The xenstore event channel will be allocated for dom0less domains. It is
> > necessary to have access to the evtchn_alloc_unbound function to do
> > that, so make evtchn_alloc_unbound public.
> > 
> > Add a skip_xsm parameter to allow disabling the XSM check in
> > evtchn_alloc_unbound (xsm_evtchn_unbound wouldn't work for a call
> > originated from Xen before running any domains.)
> > 
> > Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> > Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
> > CC: Julien Grall <julien@xen.org>
> > CC: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
> > CC: Bertrand Marquis <bertrand.marquis@arm.com>
> > CC: Andrew Cooper <andrew.cooper3@citrix.com>
> > CC: George Dunlap <george.dunlap@citrix.com>
> > CC: Jan Beulich <jbeulich@suse.com>
> > CC: Wei Liu <wl@xen.org>
> > ---
> > Changes v3:
> > - expose evtchn_alloc_unbound, assing a skip_xsm parameter
> > ---
> >  xen/common/event_channel.c | 13 ++++++++-----
> >  xen/include/xen/event.h    |  3 +++
> >  2 files changed, 11 insertions(+), 5 deletions(-)
> > 
> > diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c
> > index da88ad141a..be57d00a15 100644
> > --- a/xen/common/event_channel.c
> > +++ b/xen/common/event_channel.c
> > @@ -284,7 +284,7 @@ void evtchn_free(struct domain *d, struct evtchn *chn)
> >      xsm_evtchn_close_post(chn);
> >  }
> >  
> > -static int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
> > +int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc, bool skip_xsm)
> >  {
> >      struct evtchn *chn;
> >      struct domain *d;
> > @@ -301,9 +301,12 @@ static int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
> >          ERROR_EXIT_DOM(port, d);
> >      chn = evtchn_from_port(d, port);
> >  
> > -    rc = xsm_evtchn_unbound(XSM_TARGET, d, chn, alloc->remote_dom);
> > -    if ( rc )
> > -        goto out;
> > +    if ( !skip_xsm )
> > +    {
> > +        rc = xsm_evtchn_unbound(XSM_TARGET, d, chn, alloc->remote_dom);
> > +        if ( rc )
> > +            goto out;
> > +    }
> 
> Please do not subvert the security framework because it causes an
> inconvenience. As Jan recommended, work within the XSM check to allow
> your access so that we may ensure it is done safely. If you need any
> help making modifications to XSM, please do not hesitate to reach out as
> I will gladly help.

Thank you!

First let me reply to Jan: this series is only introducing 1 more call
to evtchn_alloc_unbound, which is to allocate the special xenstore event
channel, the one configured via
d->arch.hvm.params[HVM_PARAM_STORE_EVTCHN].

It is not meant to be a generic function, and it is not meant to be
called more than once. It could (should?) be __init.

The existing XSM check in evtchn_alloc_unbound cannot work and should
not work: it is based on the current domain having enough privileges to
create the event channel. In this case, we have no current domain at
all. The current domain is Xen itself.

For these reasons, given [1], also not to subvert the security
framework as Daniel pointed out, I think I should go back to my own
implementation [2][3] based on get_free_port. That is my preference
because:

- the Xen codebase doesn't gain much by reusing evtchn_alloc_unbound
- adding skip_xsm introduces a component of risk (unless we make it
  __init maybe?)
- using get_free_port is trivial and doesn't pose the same issues


Let's find all an agreement on how to move forward on this.


[1] https://marc.info/?l=xen-devel&m=164194128922838
[2] https://marc.info/?l=xen-devel&m=164203543615114
[3] https://marc.info/?l=xen-devel&m=164203544615129 


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 01:19:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 01:19:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293708.499051 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWpeH-00021i-54; Wed, 23 Mar 2022 01:18:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293708.499051; Wed, 23 Mar 2022 01:18:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWpeH-00021b-1b; Wed, 23 Mar 2022 01:18:53 +0000
Received: by outflank-mailman (input) for mailman id 293708;
 Wed, 23 Mar 2022 01:18:51 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=RTL5=UC=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nWpeF-00021V-Hl
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 01:18:51 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 30d46e77-aa47-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 02:18:49 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 9BAAE61350;
 Wed, 23 Mar 2022 01:18:47 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 95877C340EC;
 Wed, 23 Mar 2022 01:18:46 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 30d46e77-aa47-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1647998327;
	bh=npkLsUY5uh9Ov0ic4uXzYMNGltANFcSwbIlTdxfP0+E=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=b32KYLqu2ywWX95Y5jzTLTUM3JxHcFdw6OyU0+Eh8ymUr8f8TAqjhEJcoiTmbFTo8
	 2mya+yoDqC2PZT2Ph62buPaoR5v91R8jka43g+0d+90jJ/b2FefFQ2UCnQjpKyZbQT
	 7an8U3UV+lfCVhf9Zyy+sSDTP06JgWTe2hnvulVXBw1v/z4cy4zODl248QdcN8Ze5X
	 QHO6Z8xpWfcrwiMvqa/SSXXODFT+uSHFqosrHuDUftSzTwhY0sPR0N6FuPUuLhSk7h
	 4bIuBFmdNgQ2mra7eRvzd7pURRaVtyH9B0zZBH6E/zlKKaIJYh0ujnAfREgQSmbbZ4
	 OKxhuf3ZYLbUg==
Date: Tue, 22 Mar 2022 18:18:46 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Julien Grall <julien@xen.org>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    xen-devel@lists.xenproject.org, jgross@suse.com, Bertrand.Marquis@arm.com, 
    Volodymyr_Babchuk@epam.com, Luca Miccio <lucmiccio@gmail.com>, 
    Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: Re: [PATCH v3 3/5] xen/arm: configure dom0less domain for enabling
 xenstore after boot
In-Reply-To: <e55c03f6-5b20-ce9c-ce88-11dc85623dce@xen.org>
Message-ID: <alpine.DEB.2.22.394.2203221722430.2910984@ubuntu-linux-20-04-desktop>
References: <alpine.DEB.2.22.394.2201281330520.27308@ubuntu-linux-20-04-desktop> <20220128213307.2822078-3-sstabellini@kernel.org> <e55c03f6-5b20-ce9c-ce88-11dc85623dce@xen.org>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Sat, 29 Jan 2022, Julien Grall wrote:
> On 28/01/2022 21:33, Stefano Stabellini wrote:
> > From: Luca Miccio <lucmiccio@gmail.com>
> > 
> > If "xen,enhanced" is enabled, then add to dom0less domains:
> > 
> > - the hypervisor node in device tree
> > - the xenstore event channel
> > 
> > The xenstore event channel is also used for the first notification to
> > let the guest know that xenstore has become available.
> > 
> > Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> > Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
> > Reviewed-by: Bertrand Marquis <bertrand.marquis@arm.com>
> > CC: Julien Grall <julien@xen.org>
> > CC: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
> > CC: Bertrand Marquis <bertrand.marquis@arm.com>
> > 
> > ---
> > Changes in v3:
> > - use evtchn_alloc_unbound
> > 
> > Changes in v2:
> > - set HVM_PARAM_STORE_PFN to ~0ULL at domain creation
> > - in alloc_xenstore_evtchn do not call _evtchn_alloc_unbound
> > ---
> >   xen/arch/arm/domain_build.c | 41 +++++++++++++++++++++++++++++++++++++
> >   1 file changed, 41 insertions(+)
> > 
> > diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
> > index 9144d6c0b6..8e030a7f05 100644
> > --- a/xen/arch/arm/domain_build.c
> > +++ b/xen/arch/arm/domain_build.c
> > @@ -27,6 +27,7 @@
> >   #include <asm/setup.h>
> >   #include <asm/cpufeature.h>
> >   #include <asm/domain_build.h>
> > +#include <xen/event.h>
> >     #include <xen/irq.h>
> >   #include <xen/grant_table.h>
> > @@ -2619,6 +2620,8 @@ static int __init prepare_dtb_domU(struct domain *d,
> > struct kernel_info *kinfo)
> >       int ret;
> >         kinfo->phandle_gic = GUEST_PHANDLE_GIC;
> > +    kinfo->gnttab_start = GUEST_GNTTAB_BASE;
> > +    kinfo->gnttab_size = GUEST_GNTTAB_SIZE;
> >         addrcells = GUEST_ROOT_ADDRESS_CELLS;
> >       sizecells = GUEST_ROOT_SIZE_CELLS;
> > @@ -2693,6 +2696,13 @@ static int __init prepare_dtb_domU(struct domain *d,
> > struct kernel_info *kinfo)
> >               goto err;
> >       }
> >   +    if ( kinfo->dom0less_enhanced )
> > +    {
> > +        ret = make_hypervisor_node(d, kinfo, addrcells, sizecells);
> 
> Looking at the code, I think the extended regions will not work properly
> because we are looking at the host memory layout. In the case of domU, we want
> to use the guest layout. Please have a look how it was done in libxl.

Yeah you are right, I'll do that.


> > +        if ( ret )
> > +            goto err;
> > +    }
> > +
> >       ret = fdt_end_node(kinfo->fdt);
> >       if ( ret < 0 )
> >           goto err;
> > @@ -2959,6 +2969,25 @@ static int __init construct_domain(struct domain *d,
> > struct kernel_info *kinfo)
> >       return 0;
> >   }
> >   +static int __init alloc_xenstore_evtchn(struct domain *d)
> > +{
> > +    evtchn_alloc_unbound_t alloc;
> > +    int rc;
> > +
> > +    alloc.dom = d->domain_id;
> > +    alloc.remote_dom = hardware_domain->domain_id;
> 
> The first thing evtchn_alloc_unbound() will do is looking up the domain. This
> seems a bit pointless given that we have the domain in hand. Shouldn't we
> extend evtchn_alloc_unbound() to pass the domain?

That's a good point, but I actually think it is better to go back to
[2]. The evtchn_alloc_unbound discussion is still ongoing but I'll keep
this suggestion in mind.

[2] https://marc.info/?l=xen-devel&m=164203543615114


> > +    rc = evtchn_alloc_unbound(&alloc, true);
> > +    if ( rc )
> > +    {
> > +        printk("Failed allocating event channel for domain\n");
> > +        return rc;
> > +    }
> > +
> > +    d->arch.hvm.params[HVM_PARAM_STORE_EVTCHN] = alloc.port;
> > +
> > +    return 0;
> > +}
> > +
> >   static int __init construct_domU(struct domain *d,
> >                                    const struct dt_device_node *node)
> >   {
> > @@ -3014,7 +3043,19 @@ static int __init construct_domU(struct domain *d,
> >           return rc;
> >         if ( kinfo.vpl011 )
> > +    {
> >           rc = domain_vpl011_init(d, NULL);
> > +        if ( rc < 0 )
> > +            return rc;
> > +    }
> > +
> > +    if ( kinfo.dom0less_enhanced )
> > +    {
> > +        rc = alloc_xenstore_evtchn(d);
> > +        if ( rc < 0 )
> > +            return rc;
> > +        d->arch.hvm.params[HVM_PARAM_STORE_PFN] = ~0ULL;
> 
> I think it would be easy to allocate the page right now. So what prevent us to
> do it right now?

Because (as you noted as a comment to the following patch) as soon as
d->arch.hvm.params[HVM_PARAM_STORE_PFN] is set the guest can continue
with the initialization and will expect the right data to be set on the
page. In other words: it is not enough to have the pfn allocated, we
also need xenstore to initialize it. At that point, it is better to do
both later from init-dom0less.c.


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 02:51:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 02:51:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293714.499061 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWr4j-0003Or-P0; Wed, 23 Mar 2022 02:50:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293714.499061; Wed, 23 Mar 2022 02:50:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWr4j-0003Ok-LL; Wed, 23 Mar 2022 02:50:17 +0000
Received: by outflank-mailman (input) for mailman id 293714;
 Wed, 23 Mar 2022 02:50:16 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=RTL5=UC=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nWr4i-0003Oe-1e
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 02:50:16 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f67c6918-aa53-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 03:50:13 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 19635B81BB5;
 Wed, 23 Mar 2022 02:50:13 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3849FC340EC;
 Wed, 23 Mar 2022 02:50:11 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f67c6918-aa53-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1648003811;
	bh=Ti42hzH3Z8YWHt+ZTl9nXeaKYzKKerymv0Ouu7CNlIk=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=U0sJxyVgTrR9ZVOiEgNnEoiZsrRpzd/mFGkn7s/rnCnKHATtcWyM1eBlSc9O+D2Ns
	 moMgbdzhOxB/ZKUNJF31mdiLXXfjYBd8cDRGTY68cHO+VoMYZQPCHAG10g09HCSYrR
	 sPn6kbxdlf6NankSN7CmREmMR+vyKYC1uV3FDtHPz6iNMBaqZr4GgcC6heuwrnHQzc
	 O8GMysVV/boxv6v7A2/y9S2nbv+m23iSLyqqleW/QWBY+E7VXNy2L7ouiHAT3Damxq
	 fB4DR9uAmoSiHKReh4sKz/g8v5/MSxC4tBc+DsW5Sxdjh380cAGwbfyQQXX44gZjNd
	 ZZcPEaKm43ssg==
Date: Tue, 22 Mar 2022 19:50:10 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Julien Grall <julien@xen.org>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    xen-devel@lists.xenproject.org, jgross@suse.com, Bertrand.Marquis@arm.com, 
    Volodymyr_Babchuk@epam.com, Luca Miccio <lucmiccio@gmail.com>, 
    Stefano Stabellini <stefano.stabellini@xilinx.com>, Wei Liu <wl@xen.org>, 
    Anthony PERARD <anthony.perard@citrix.com>
Subject: Re: [PATCH v3 5/5] tools: add example application to initialize
 dom0less PV drivers
In-Reply-To: <395710eb-ba51-eb67-1519-2a949326f699@xen.org>
Message-ID: <alpine.DEB.2.22.394.2203221821520.2910984@ubuntu-linux-20-04-desktop>
References: <alpine.DEB.2.22.394.2201281330520.27308@ubuntu-linux-20-04-desktop> <20220128213307.2822078-5-sstabellini@kernel.org> <395710eb-ba51-eb67-1519-2a949326f699@xen.org>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Sat, 29 Jan 2022, Julien Grall wrote:
> On 28/01/2022 21:33, Stefano Stabellini wrote:
> > From: Luca Miccio <lucmiccio@gmail.com>
> > 
> > Add an example application that can be run in dom0 to complete the
> > dom0less domains initialization so that they can get access to xenstore
> > and use PV drivers.
> > 
> > Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> > Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
> > CC: Wei Liu <wl@xen.org>
> > CC: Anthony PERARD <anthony.perard@citrix.com>
> > CC: Juergen Gross <jgross@suse.com>
> > ---
> > Changes in v3:
> > - handle xenstore errors
> > - add an in-code comment about xenstore entries
> > - less verbose output
> > - clean-up error path in main
> > 
> > Changes in v2:
> > - do not set HVM_PARAM_STORE_EVTCHN twice
> > - rename restore_xenstore to create_xenstore
> > - increase maxmem
> > ---
> >   tools/helpers/Makefile        |  13 ++
> >   tools/helpers/init-dom0less.c | 269 ++++++++++++++++++++++++++++++++++
> 
> Should we document how this is meant to be used?

Good idea, I'll add it to docs/features/dom0less.pandoc


> >   2 files changed, 282 insertions(+)
> >   create mode 100644 tools/helpers/init-dom0less.c
> > 
> > diff --git a/tools/helpers/Makefile b/tools/helpers/Makefile
> > index 7f6c422440..8e42997052 100644
> > --- a/tools/helpers/Makefile
> > +++ b/tools/helpers/Makefile
> > @@ -10,6 +10,9 @@ ifeq ($(CONFIG_Linux),y)
> >   ifeq ($(CONFIG_X86),y)
> >   PROGS += init-xenstore-domain
> >   endif
> > +ifeq ($(CONFIG_ARM),y)
> > +PROGS += init-dom0less
> > +endif >   endif
> >     XEN_INIT_DOM0_OBJS = xen-init-dom0.o init-dom-json.o
> > @@ -26,6 +29,13 @@ $(INIT_XENSTORE_DOMAIN_OBJS): CFLAGS +=
> > $(CFLAGS_libxenstore)
> >   $(INIT_XENSTORE_DOMAIN_OBJS): CFLAGS += $(CFLAGS_libxenlight)
> >   $(INIT_XENSTORE_DOMAIN_OBJS): CFLAGS += -include
> > $(XEN_ROOT)/tools/config.h
> >   +INIT_DOM0LESS_OBJS = init-dom0less.o init-dom-json.o
> > +$(INIT_DOM0LESS_OBJS): CFLAGS += $(CFLAGS_libxentoollog)
> > +$(INIT_DOM0LESS_OBJS): CFLAGS += $(CFLAGS_libxenstore)
> > +$(INIT_DOM0LESS_OBJS): CFLAGS += $(CFLAGS_libxenlight)
> > +$(INIT_DOM0LESS_OBJS): CFLAGS += $(CFLAGS_libxenctrl)
> > +$(INIT_DOM0LESS_OBJS): CFLAGS += $(CFLAGS_libxenevtchn)
> > +
> >   .PHONY: all
> >   all: $(PROGS)
> >   @@ -35,6 +45,9 @@ xen-init-dom0: $(XEN_INIT_DOM0_OBJS)
> >   init-xenstore-domain: $(INIT_XENSTORE_DOMAIN_OBJS)
> >   	$(CC) $(LDFLAGS) -o $@ $(INIT_XENSTORE_DOMAIN_OBJS)
> > $(LDLIBS_libxentoollog) $(LDLIBS_libxenstore) $(LDLIBS_libxenctrl)
> > $(LDLIBS_libxenguest) $(LDLIBS_libxenlight) $(APPEND_LDFLAGS)
> >   +init-dom0less: $(INIT_DOM0LESS_OBJS)
> > +	$(CC) $(LDFLAGS) -o $@ $(INIT_DOM0LESS_OBJS) $(LDLIBS_libxenctrl)
> > $(LDLIBS_libxenevtchn) $(LDLIBS_libxentoollog) $(LDLIBS_libxenstore)
> > $(LDLIBS_libxenlight) $(LDLIBS_libxenguest)  $(APPEND_LDFLAGS)
> > +
> >   .PHONY: install
> >   install: all
> >   	$(INSTALL_DIR) $(DESTDIR)$(LIBEXEC_BIN)
> > diff --git a/tools/helpers/init-dom0less.c b/tools/helpers/init-dom0less.c
> > new file mode 100644
> > index 0000000000..b6a3831cb5
> > --- /dev/null
> > +++ b/tools/helpers/init-dom0less.c
> > @@ -0,0 +1,269 @@
> > +#include <stdbool.h>
> > +#include <syslog.h>
> > +#include <stdio.h>
> > +#include <err.h>
> > +#include <stdlib.h>
> > +#include <xenstore.h>
> > +#include <xenctrl.h>
> > +#include <xenguest.h>
> > +#include <libxl.h>
> > +#include <xenevtchn.h>
> > +
> > +#include "init-dom-json.h"
> > +
> > +#define NR_MAGIC_PAGES 4
> 
> Why are we allocating 4 pages when only 2 (maybe 1) is necessary?

Good point, I think we can only allocate 1


> > +#define CONSOLE_PFN_OFFSET 0
> > +#define XENSTORE_PFN_OFFSET 1
> > +#define STR_MAX_LENGTH 64
> > +
> > +static int alloc_magic_pages(libxl_dominfo *info, struct xc_dom_image *dom)
> > +{
> > +    int rc, i;
> > +    const xen_pfn_t base = GUEST_MAGIC_BASE >> XC_PAGE_SHIFT;
> > +    xen_pfn_t p2m[NR_MAGIC_PAGES];
> > +
> > +    rc = xc_domain_setmaxmem(dom->xch, dom->guest_domid,
> > +                             info->max_memkb + NR_MAGIC_PAGES * 4);
> 
> Please don't rely on the fact the page size will be 4KB in Xen. Instead, use
> XC_PAGE_*.

OK


> > +    if (rc < 0)
> > +        return rc;
> > +
> > +    for (i = 0; i < NR_MAGIC_PAGES; i++)
> > +        p2m[i] = base + i;
> > +
> > +    rc = xc_domain_populate_physmap_exact(dom->xch, dom->guest_domid,
> > +                                          NR_MAGIC_PAGES, 0, 0, p2m);
> > +    if (rc < 0)
> > +        return rc;
> > +
> > +    dom->xenstore_pfn = base + XENSTORE_PFN_OFFSET;
> > +
> > +    xc_clear_domain_page(dom->xch, dom->guest_domid, dom->xenstore_pfn);
> 
> So you allocate 4 pages, use 2, but only clear 1. Can you explain why?

We only need the xenstore page, I'll fix it


> Also, should not you check the error return here and  ...
> 
> > +
> > +    xc_hvm_param_set(dom->xch, dom->guest_domid, HVM_PARAM_STORE_PFN,
> > +                     dom->xenstore_pfn);
> 
> here...?

Yes


> Also, in theory, as soon as you set xc_hvm_param_set(), the guest may be able
> to start using Xenstore. So wouldn't it be better to set it once you know
> everything is in place (i.e. just before calling xs_introduce_domain())?

This is a very good point. I'll do that


> > +    return 0;
> > +}
> > +
> > +static bool do_xs_write_dom(struct xs_handle *xsh, xs_transaction_t t,
> > +                            domid_t domid, char *path, char *val)
> > +{
> > +    char full_path[STR_MAX_LENGTH];
> > +
> > +    snprintf(full_path, STR_MAX_LENGTH,
> > +             "/local/domain/%d/%s", domid, path);
> > +    return xs_write(xsh, t, full_path, val, strlen(val));
> 
> From my understanding, xs_write() will create a node that will only be
> readable/writable by the domain executing this binary (i.e. dom0). IOW, the
> guest will not see the nodes.
> 
> So shouldn't you also set the permissions?

Yes you are right, I'll do that


> > +}
> > +
> > +static bool do_xs_write_libxl(struct xs_handle *xsh, xs_transaction_t t,
> > +                              domid_t domid, char *path, char *val)
> > +{
> > +    char full_path[STR_MAX_LENGTH];
> > +
> > +    snprintf(full_path, STR_MAX_LENGTH,
> > +             "/libxl/%d/%s", domid, path);
> 
> Please use %u when you refer to unsigned value. Also, I think it would be a
> good practice to check the return value of snprintf(). This would avoid any
> future surprise of value truncated by mistake.
> 
> The same is valid for all the other use below.

OK


> > +    return xs_write(xsh, t, full_path, val, strlen(val));
> > +}
> > +
> > +static bool do_xs_write_vm(struct xs_handle *xsh, xs_transaction_t t,
> > +                           libxl_uuid uuid, char *path, char *val)
> > +{
> > +    char full_path[STR_MAX_LENGTH];
> > +
> > +    snprintf(full_path, STR_MAX_LENGTH,
> > +             "/vm/" LIBXL_UUID_FMT "/%s", LIBXL_UUID_BYTES(uuid), path);
> > +    return xs_write(xsh, t, full_path, val, strlen(val));
> > +}
> > +
> > +/*
> > + * The xenstore nodes are the xenstore nodes libxl writes at domain
> > + * creation.
> > + *
> > + * The list was retrieved by running xenstore-ls on a corresponding
> > + * domain started by xl/libxl.
> > + */
> > +static int restore_xenstore(struct xs_handle *xsh,
> 
> As I wrote in v1, I think "restore" is misleading because the domain was never
> in Xenstore. So how about "create"? (Which BTW you agreed on back then).
 
OK, sorry about that


> > +                            libxl_dominfo *info, libxl_uuid uuid,
> > +                            evtchn_port_t xenstore_port)
> > +{
> > +    domid_t domid;
> > +    int i;
> 
> This is used as an iterator for a uint32_t value. So I think it should at
> least be unsigned int.

Yes


> > +    char uuid_str[STR_MAX_LENGTH];
> > +    char dom_name_str[STR_MAX_LENGTH];
> > +    char vm_val_str[STR_MAX_LENGTH];
> > +    char id_str[STR_MAX_LENGTH];
> > +    char max_memkb_str[STR_MAX_LENGTH];
> > +    char cpu_str[STR_MAX_LENGTH];
> > +    char xenstore_port_str[STR_MAX_LENGTH];
> > +    char ring_ref_str[STR_MAX_LENGTH];
> > +    xs_transaction_t t;
> > +
> > +    domid = info->domid;
> > +    snprintf(id_str, STR_MAX_LENGTH, "%d", domid);
> > +    snprintf(dom_name_str, STR_MAX_LENGTH, "dom0less-%d", domid);
> > +    snprintf(uuid_str, STR_MAX_LENGTH, LIBXL_UUID_FMT,
> > LIBXL_UUID_BYTES(uuid));
> > +    snprintf(vm_val_str, STR_MAX_LENGTH,
> > +             "vm/" LIBXL_UUID_FMT, LIBXL_UUID_BYTES(uuid));
> > +    snprintf(max_memkb_str, STR_MAX_LENGTH, "%lu", info->max_memkb);
> > +    snprintf(ring_ref_str, STR_MAX_LENGTH, "%lld",
> > +             (GUEST_MAGIC_BASE >> XC_PAGE_SHIFT) + XENSTORE_PFN_OFFSET);
> > +    snprintf(xenstore_port_str, STR_MAX_LENGTH, "%d", xenstore_port); > +
> > +retry_transaction:
> > +    t = xs_transaction_start(xsh);
> > +    if (t == XBT_NULL)
> > +        return -errno;
> > +
> > +    /* /vm */
> > +    if (!do_xs_write_vm(xsh, t, uuid, "name", dom_name_str)) return -EIO;
> 
> You should terminate the transaction in case of an error.

OK


> > +    if (!do_xs_write_vm(xsh, t, uuid, "uuid", uuid_str)) return -EIO;
> > +    if (!do_xs_write_vm(xsh, t, uuid, "start_time", "0")) return -EIO;
> 
> Wouldn't it be better to create based on the time now?

Yes


> > +
> > +    /* /domain */
> > +    if (!do_xs_write_dom(xsh, t, domid, "vm", vm_val_str)) return -EIO;
> > +    if (!do_xs_write_dom(xsh, t, domid, "name", dom_name_str)) return -EIO;
> > +    if (!do_xs_write_dom(xsh, t, domid, "cpu", "")) return -EIO;
> > +    for (i = 0; i < info->vcpu_max_id; i++) {
> > +        snprintf(cpu_str, STR_MAX_LENGTH, "cpu/%d/availability/", i);
> > +        if (!do_xs_write_dom(xsh, t, domid, cpu_str,
> > +                             (info->cpupool & (1 << i)) ? "online" :
> > "offline"))
> > +            return -EIO;
> > +    }
> > +    if (!do_xs_write_dom(xsh, t, domid, "cpu/0", "")) return -EIO;
> 
> I am a bit confused. You created 0 above, so why do you need to create it here
> again?

I'll fix it


> > +    if (!do_xs_write_dom(xsh, t, domid, "cpu/availability", "online"))
> > return -EIO;
> 
> I can't seem to find this node in xenstore and libxl.

I'll fix it


> > +
> > +    if (!do_xs_write_dom(xsh, t, domid, "memory", "")) return -EIO;
> > +    if (!do_xs_write_dom(xsh, t, domid, "memory/static-max",
> > max_memkb_str)) return -EIO;
> > +    if (!do_xs_write_dom(xsh, t, domid, "memory/videoram", "-1")) return
> > -EIO;
> 
> How about "memory/target"?

I'll add


> > +
> > +    if (!do_xs_write_dom(xsh, t, domid, "device", "")) return -EIO;
> > +    if (!do_xs_write_dom(xsh, t, domid, "device/suspend", "")) return -EIO;
> > +    if (!do_xs_write_dom(xsh, t, domid, "device/suspend/event-channel",
> > "")) return -EIO;
> > +
> > +    if (!do_xs_write_dom(xsh, t, domid, "control", "")) return -EIO;
> > +    if (!do_xs_write_dom(xsh, t, domid, "control/shutdown", "")) return
> > -EIO;
> > +    if (!do_xs_write_dom(xsh, t, domid, "control/feature-poweroff", "1"))
> > return -EIO;
> > +    if (!do_xs_write_dom(xsh, t, domid, "control/feature-reboot", "1"))
> > return -EIO;
> > +    if (!do_xs_write_dom(xsh, t, domid, "control/feature-suspend", ""))
> > return -EIO;
> > +    if (!do_xs_write_dom(xsh, t, domid, "control/sysrq", "")) return -EIO;
> > +    if (!do_xs_write_dom(xsh, t, domid,
> > "control/platform-feature-multiprocessor-suspend", "1")) return -EIO;
> > +    if (!do_xs_write_dom(xsh, t, domid, "control",
> > "platform-feature-xs_reset_watches")) return -EIO;
> 
> It sounds like this wants to be "control/platform-feature...". If this hasn't
> been done, I would diff the libxl version and your version to check if all are
> the same (names, values, permissions).

Yes, I'll fix it


> > +
> > +    if (!do_xs_write_dom(xsh, t, domid, "domid", id_str)) return -EIO;
> > +    if (!do_xs_write_dom(xsh, t, domid, "data", "")) return -EIO;
> > +    if (!do_xs_write_dom(xsh, t, domid, "drivers", "")) return -EIO;
> > +    if (!do_xs_write_dom(xsh, t, domid, "feature", "")) return -EIO;
> > +    if (!do_xs_write_dom(xsh, t, domid, "attr", "")) return -EIO;
> > +
> > +    if (!do_xs_write_dom(xsh, t, domid, "store/port", xenstore_port_str))
> > return -EIO;
> > +    if (!do_xs_write_dom(xsh, t, domid, "store/ring-ref", ring_ref_str))
> > return -EIO;
> > +
> > +    if (!do_xs_write_libxl(xsh, t, domid, "type", "pvh")) return -EIO;
> > +    if (!do_xs_write_libxl(xsh, t, domid, "dm-version", "qemu_xen")) return
> > -EIO;
> > +
> > +    if (!xs_transaction_end(xsh, t, false))
> > +        if (errno == EAGAIN)
> > +            goto retry_transaction;
> > +        else
> > +            return -errno;
> > +
> > +    return 0;
> > +}
> > +
> > +static int init_domain(struct xs_handle *xsh, libxl_dominfo *info)
> > +{
> > +    struct xc_dom_image dom;
> 
> I would initialize dom to 0 to avoid any undef behavior.

OK


> > +    libxl_uuid uuid;
> > +    uint64_t v;
> > +    int rc;
> > +
> > +    printf("Init dom0less domain: %d\n", info->domid);
> > +    dom.guest_domid = info->domid;
> > +    dom.xenstore_domid = 0;
> > +    dom.xch = xc_interface_open(0, 0, 0);
> > +
> > +    rc = xc_hvm_param_get(dom.xch, info->domid, HVM_PARAM_STORE_EVTCHN,
> > &v);
> > +    if (rc != 0) {
> > +        printf("Failed to get HVM_PARAM_STORE_EVTCHN\n");
> > +        return 1;
> > +    }
> > +    dom.xenstore_evtchn = v;
> > +
> > +    /* Console won't be initialized but set its data for completeness */
> > +    dom.console_domid = 0;
> 
> I find a bit odd you set the domid but not the event channel, page. Can you
> explain?
> 
> Actually, can you explain why only half of the structure is initialized?
 
We are only using the struct xc_dom_image parameter for
xc_dom_gnttab_init, and nothing else. We only need very few fields in
it. Basically we could call xc_dom_gnttab_seed directly and then we
wouldn't need struct xc_dom_image at all. Only the needed fields are
currently populated. 


> > +
> > +    /* Alloc magic pages */
> > +    if (alloc_magic_pages(info, &dom) != 0) {
> > +        printf("Error on alloc magic pages\n");
> > +        return 1;
> > +    }
> > +
> > +    xc_dom_gnttab_init(&dom);
> 
> This call as the risk to break the guest if the dom0 Linux doesn't support the
> acquire interface. This is because it will punch a hole in the domain memory
> where the grant-table may have already been mapped.
> 
> Also, this function could fails.

I'll check for return errors. Dom0less is for fully static
configurations so I think it is OK to return error and abort if
something unexpected happens: dom0less' main reason for being is that
there is nothing unexpected :-)


> > +
> > +    libxl_uuid_generate(&uuid);
> > +    xc_domain_sethandle(dom.xch, info->domid, libxl_uuid_bytearray(&uuid));
> > +
> > +    rc = gen_stub_json_config(info->domid, &uuid);
> > +    if (rc)
> > +        err(1, "gen_stub_json_config");
> > +
> > +    rc = restore_xenstore(xsh, info, uuid, dom.xenstore_evtchn);
> > +    if (rc)
> > +        err(1, "writing to xenstore");
> > +
> > +    xs_introduce_domain(xsh, info->domid,
> > +            (GUEST_MAGIC_BASE >> XC_PAGE_SHIFT) + XENSTORE_PFN_OFFSET,
> > +            dom.xenstore_evtchn);
> 
> xs_introduce_domain() can technically fails.

OK


> > +    return 0;
> > +}
> > +
> > +/* Check if domain has been configured in XS */
> > +static bool domain_exists(struct xs_handle *xsh, int domid)
> > +{
> > +    return xs_is_domain_introduced(xsh, domid);
> > +}
> 
> Would not this lead to initialize a domain with PV driver disabled?

I am not sure I understood your question, but I'll try to answer anyway.
This check is purely to distinguish dom0less guests, which needs further
initializations, from regular guests (e.g. xl guests) that don't need
any actions taken here.

Ideally init_dom0less should be called before creating any xl guests, but
this check should make it work regardless.


> In addition to that, I think we should warn the users (maybe in some
> documentation) that this should not be called in parallel of scripts that may
> create new domain. Otherwise they may be picked up here as well...

Good point.


> > +
> > +int main(int argc, char **argv)
> > +{
> > +    libxl_dominfo *info = NULL;
> > +    libxl_ctx *ctx;
> > +    int nb_vm = 0, rc = 0, i;
> > +    struct xs_handle *xsh = NULL;
> > +
> > +    xsh = xs_daemon_open();
> 
> From my understanding xs_daemon_open() is deprecated. Instead, you want to use
> xs_open(0).

OK


> However, libxl_ctx_alloc() is already opening a xenstore connection. So I
> think it would be better to rely on libxl and other the provided helpers
> (introduce new one if necessary) or just completely drop libxl from the
> equations.

Unfortunately today it is not possible to reuse ctx->xsh because it is
private to libxl. But your suggestion is an interesting optimization.
I'll write it down as TODO for now.


> > +    if (xsh == NULL) {
> > +        fprintf(stderr, "Could not contact XenStore");
> > +        rc = -errno;
> > +        goto out;
> > +    }
> > +
> > +    rc = libxl_ctx_alloc(&ctx, LIBXL_VERSION, 0, NULL);
> > +    if (rc) {
> > +        fprintf(stderr, "cannot init xl context\n");
> > +        goto out;
> > +    }
> > +
> > +    info = libxl_list_domain(ctx, &nb_vm);
> > +    if (!info) {
> > +        fprintf(stderr, "libxl_list_vm failed.\n");
> > +        rc = -1;
> > +        goto out;
> > +    }
> > +
> > +    for (i = 0; i < nb_vm; i++) {
> > +        domid_t domid = info[i].domid;
> > +
> > +        /* Don't need to check for Dom0 */
> > +        if (!domid)
> > +            continue;
> > +
> > +        printf("Checking domid: %u\n", domid);
> > +        if (!domain_exists(xsh, domid))
> > +            init_domain(xsh, &info[i]);
> 
> init_domain() could return an error. So shouldn't you check it?
> 
> If yes, then the question is whether you want to continue to handle the other
> domain or abort?
> 
> If the former, then what's the next steps if the domain is half initialized?
> So we try again?

As mentioned I think we should abort and exit. Basically we should just
tell the engineer to fix its configuration.


> > +        else
> > +            printf("Domain %d has already been initialized\n", domid);
> > +    }
> > +out:
> > +    libxl_dominfo_list_free(info, nb_vm);
> > +    xs_close(xsh);
> > +    return rc;
> > +}



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 03:12:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 03:12:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293718.499073 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWrPz-0005vk-Hh; Wed, 23 Mar 2022 03:12:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293718.499073; Wed, 23 Mar 2022 03:12:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWrPz-0005vd-EZ; Wed, 23 Mar 2022 03:12:15 +0000
Received: by outflank-mailman (input) for mailman id 293718;
 Wed, 23 Mar 2022 03:12:13 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWrPx-0005vT-OG; Wed, 23 Mar 2022 03:12:13 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWrPx-0002NE-Ei; Wed, 23 Mar 2022 03:12:13 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWrPx-0003R9-0p; Wed, 23 Mar 2022 03:12:13 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWrPx-0007Sz-0I; Wed, 23 Mar 2022 03:12:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=LtysVd3CJnZQGWpioqhFynCPzex+8nnOv9Ck6Vsmn+Y=; b=BusIIF7bAe/+tB7tl0xVnM7Gd1
	CUEB1ZiqX1SragiF0CyKY75kTPs13MsFErnyfKsTFMtFpBevQ/IIoWbUjex28mNMTpbBTzG/r1caf
	C3cqHuRSIrxrUfemMjRPdQ778KPbEaQLtIxYtzXXzqM10fkE8m1UKCkWsnXzFwRVoZNg=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168790-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168790: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 23 Mar 2022 03:12:13 +0000

flight 168790 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168790/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   22 days
Failing since        168258  2022-03-01 01:55:31 Z   22 days  228 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    0 days    9 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 03:36:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 03:36:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293726.499084 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWrnK-0008Mg-Fu; Wed, 23 Mar 2022 03:36:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293726.499084; Wed, 23 Mar 2022 03:36:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWrnK-0008MZ-Cl; Wed, 23 Mar 2022 03:36:22 +0000
Received: by outflank-mailman (input) for mailman id 293726;
 Wed, 23 Mar 2022 03:36:20 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWrnI-0008MO-G8; Wed, 23 Mar 2022 03:36:20 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWrnI-0002oc-DR; Wed, 23 Mar 2022 03:36:20 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWrnI-0004JZ-28; Wed, 23 Mar 2022 03:36:20 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWrnI-0005UR-1e; Wed, 23 Mar 2022 03:36:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=XWHnadCDyCrSywG+E7l1h6nsjOfWRExI0sYve5Opb8Q=; b=IlzR9bbLP2UXUSZIPx1OLBg+CX
	bHLqMlkipHPgpjiFhU/PgFiLiNsqeBKY/lKHTLl0bqdNHZnXngbftW4neFpIXoLxBrS+kGbtEnT1e
	zDQ6nkbeU0GnpHnabUfP6HHEJUWF5MkdswJb8OcmkdfbDXNtbGV8GvFh6qrpfU4GIdZ4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168786-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168786: regressions - FAIL
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:debian-hvm-install:fail:regression
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=69e46280937526db9cf78259cd8a0a9ec62dc847
X-Osstest-Versions-That:
    xen=8aa0e9d2d1a4815516607eabe9b2e850f284a2f8
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 23 Mar 2022 03:36:20 +0000

flight 168786 xen-unstable real [real]
flight 168792 xen-unstable real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168786/
http://logs.test-lab.xenproject.org/osstest/logs/168792/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm 12 debian-hvm-install fail REGR. vs. 168763

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168763
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168763
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168763
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168763
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168763
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168763
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168763
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168763
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168763
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168763
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168763
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168763
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass

version targeted for testing:
 xen                  69e46280937526db9cf78259cd8a0a9ec62dc847
baseline version:
 xen                  8aa0e9d2d1a4815516607eabe9b2e850f284a2f8

Last test of basis   168763  2022-03-22 01:51:51 Z    1 days
Testing same since   168786  2022-03-22 16:08:07 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Jan Beulich <jbeulich@suse.com>
  Julien Grall <jgrall@amazon.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 fail    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

------------------------------------------------------------
commit 69e46280937526db9cf78259cd8a0a9ec62dc847
Author: Jan Beulich <jbeulich@suse.com>
Date:   Tue Mar 22 13:11:40 2022 +0100

    x86/build: also handle .comment.* in linker script
    
    Oldish SUSE compilers generate .comment.SUSE.OPTS sections. Just like we
    already discard such for xen.efi, fold them into .comment for xen-syms.
    
    Signed-off-by: Jan Beulich <jbeulich@suse.com>
    Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>

commit a2b8da2574586270207c6eb8e7aa8cd19eb74947
Author: Jan Beulich <jbeulich@suse.com>
Date:   Tue Mar 22 13:10:59 2022 +0100

    x86/build: work around older GNU ld not leaving .got.plt empty
    
    The initial three entries in .got.plt are "static", i.e. present
    independent of actual entries allocation of which is triggered by
    respective relocations. When no real entries are needed, halfway recent
    ld discards the "static" portion of the table as well, but older GNU ld
    fails to do so.
    
    Fixes: dedb0aa42c6d ("x86/build: use --orphan-handling linker option if available")
    Reported-by: Julien Grall <jgrall@amazon.com>
    Signed-off-by: Jan Beulich <jbeulich@suse.com>
    Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>
    Tested-by: Julien Grall <jgrall@amazon.com>

commit b68664ab8954fd6aecbc579fc7444aa6e07f5581
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date:   Tue Mar 22 13:07:24 2022 +0100

    x86/hvm: Annotate hvm_physdev_op() with cf_check
    
    This was missed previously, and would yield a fatal #CP for any HVM domain
    which issues a physdevop hypercall.
    
    Fixes: cdbe2b0a1aec ("x86: Enable CET Indirect Branch Tracking")
    Reported-by: Juergen Gross <jgross@suse.com>
    Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
    Reviewed-by: Jan Beulich <jbeulich@suse.com>
(qemu changes not included)


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 04:20:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 04:20:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293738.499098 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWsUH-00059w-5a; Wed, 23 Mar 2022 04:20:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293738.499098; Wed, 23 Mar 2022 04:20:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWsUH-00059p-2W; Wed, 23 Mar 2022 04:20:45 +0000
Received: by outflank-mailman (input) for mailman id 293738;
 Wed, 23 Mar 2022 04:20:44 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWsUG-00059f-G4; Wed, 23 Mar 2022 04:20:44 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWsUG-0003o0-AA; Wed, 23 Mar 2022 04:20:44 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWsUF-0006FO-T6; Wed, 23 Mar 2022 04:20:44 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWsUF-0007hl-SL; Wed, 23 Mar 2022 04:20:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=LjH4NXEX4qG0yiZWm8Nf27HtGC9BlaGepo6FTPixGfQ=; b=TszpvWnRPKtCeMDFTZQHJttn1f
	g5U+5++tRJ0DR3h/iWCiTOYObNU1EEzHjspcZxNXSraV5HpBygRJhk8slFeKQqKMjNoWZG9zlbkhL
	QZ4mhQXOTt9MJblDprhFBaTfrlwFuNVfsR7rqKBc5BzNTa69/ust6QN5R12C88qKvrqs=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168787-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168787: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl:guest-start/debian.repeat:fail:heisenbug
    linux-linus:test-armhf-armhf-xl-vhd:debian-di-install:fail:heisenbug
    linux-linus:test-arm64-arm64-xl-vhd:guest-start/debian.repeat:fail:heisenbug
    linux-linus:test-amd64-amd64-xl-rtds:guest-localmigrate:fail:allowable
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=b47d5a4f6b8d42f8a8fbe891b36215e4fddc53be
X-Osstest-Versions-That:
    linux=eaa54b1458ca84092e513d554dd6d234245e6bef
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 23 Mar 2022 04:20:43 +0000

flight 168787 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168787/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl 22 guest-start/debian.repeat fail in 168768 pass in 168787
 test-armhf-armhf-xl-vhd     12 debian-di-install fail in 168768 pass in 168787
 test-arm64-arm64-xl-vhd      17 guest-start/debian.repeat  fail pass in 168768

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-rtds     18 guest-localmigrate       fail REGR. vs. 168760

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168760
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168760
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168760
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168760
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168760
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168760
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168760
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168760
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                b47d5a4f6b8d42f8a8fbe891b36215e4fddc53be
baseline version:
 linux                eaa54b1458ca84092e513d554dd6d234245e6bef

Last test of basis   168760  2022-03-21 19:41:16 Z    1 days
Testing same since   168768  2022-03-22 04:17:09 Z    0 days    2 attempts

------------------------------------------------------------
361 people touched revisions under test,
not listing them all

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     fail    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      fail    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   eaa54b1458ca..b47d5a4f6b8d  b47d5a4f6b8d42f8a8fbe891b36215e4fddc53be -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 05:13:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 05:13:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293711.499112 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWtJZ-0002N6-Fn; Wed, 23 Mar 2022 05:13:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293711.499112; Wed, 23 Mar 2022 05:13:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWtJZ-0002MI-Bz; Wed, 23 Mar 2022 05:13:45 +0000
Received: by outflank-mailman (input) for mailman id 293711;
 Wed, 23 Mar 2022 01:21:31 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=9xZ1=UC=invisiblethingslab.com=niedzejkob@srs-se1.protection.inumbo.net>)
 id 1nWpgp-0003NE-Fq
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 01:21:31 +0000
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com
 [66.111.4.25]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 905b9ffe-aa47-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 02:21:30 +0100 (CET)
Received: from compute5.internal (compute5.nyi.internal [10.202.2.45])
 by mailout.nyi.internal (Postfix) with ESMTP id F06C45C05A9;
 Tue, 22 Mar 2022 21:21:27 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163])
 by compute5.internal (MEProxy); Tue, 22 Mar 2022 21:21:27 -0400
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Tue,
 22 Mar 2022 21:21:26 -0400 (EDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 905b9ffe-aa47-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:cc:content-transfer-encoding
	:content-type:date:date:from:from:in-reply-to:message-id
	:mime-version:reply-to:sender:subject:subject:to:to:x-me-proxy
	:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=S+iu6Z
	Ib/LKvE8rf+ENQtEacTbCXCd4zjEwhqBC+6c8=; b=fvzdipVfPdgCQpNPy9gEHa
	bVW/zrcBD7/4EZD7BLsfWqD8JKr6V/LP9N1FeTKErpQSP4doGIM+/2pjmgo1BUD4
	neG2bt6s6meWAkCgVFKT/GpZ6EgEKZ6Nom1Cns7rWsNmZMWNErKK+eJQ7+F1Zp/3
	Ary6IRNu/H7fATTh9r/7AQohYoVddLt7bDgLke2tKfncioXE63+f2YN7js2oJofR
	UQ5K4QneYWUaBcdWeFFVaybcKeDr+X4CuYbIMuXgCRKVeyY11WurNerznRd5eFEj
	c9OlY2g2j504H6daMezN+uYIXsbPqTdyweZYikSa6jfOyzLqJkUd8JU59wntII4w
	==
X-ME-Sender: <xms:F3Y6Ys0IoJjShYiCX1z2PkQajDxVjenBKLS-QQJzY3iC9JK9xm3ITeeW>
    <xme:F3Y6YnEJ_u4u5VQZfyq-oDT67VO0S-CWfbFXjaEFWCj-1SxHLBzwuI7f0eaiBMhxH
    BUzBo68gqeQke4>
X-ME-Received: <xmr:F3Y6Yk7jMaiu_Apfy5aweP7wlf2WevVW-vO4p8XMb_o9jarfpBO_fqdL5IOUMqD9EvQFCoN0gg>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddrudegiedgfeduucetufdoteggodetrfdotf
    fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen
    uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne
    cujfgurhephffvufffkffogggtgfesthekredtredtjeenucfhrhhomheplfgrkhhusgcu
    mfmnugiiihholhhkrgcuoehnihgvugiivghjkhhosgesihhnvhhishhisghlvghthhhinh
    hgshhlrggsrdgtohhmqeenucggtffrrghtthgvrhhnpeefgedvleeiteeigfefvdduheef
    geefieehvdekheeuteekheeigeetfffgffetgfenucevlhhushhtvghrufhiiigvpedtne
    curfgrrhgrmhepmhgrihhlfhhrohhmpehnihgvugiivghjkhhosgesihhnvhhishhisghl
    vghthhhinhhgshhlrggsrdgtohhm
X-ME-Proxy: <xmx:F3Y6Yl1IQeTeX6fNe-82kMLvlGO-98dfVkVmg-_ebb4Sqfjr0W3SWA>
    <xmx:F3Y6YvEhz27Frokss767QjvssOkIY9nxXGKiSCDn1sZnxhX1qaq1Sg>
    <xmx:F3Y6Yu-Vwg-oBLmUigK3yRn81FRFlGRQeOYRKeSwRnm9Pe4zHjdsBg>
    <xmx:F3Y6Yu3RMEQuP2jknAZX4yC3Ao2m3LgFTbZpMR1BnuBCgz6g5sxrUw>
From: =?UTF-8?q?Jakub=20K=C4=85dzio=C5=82ka?= <niedzejkob@invisiblethingslab.com>
To: Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Juergen Gross <jgross@suse.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	xen-devel@lists.xenproject.org,
	"Rafael J. Wysocki" <rafael@kernel.org>,
	Len Brown <len.brown@intel.com>,
	Pavel Machek <pavel@ucw.cz>,
	linux-pm@vger.kernel.org
Cc: =?UTF-8?q?Jakub=20K=C4=85dzio=C5=82ka?= <niedzejkob@invisiblethingslab.com>,
	marmarek@invisiblethingslab.com
Subject: [PATCH] xen: don't hang when resuming PCI device
Date: Wed, 23 Mar 2022 02:21:03 +0100
Message-Id: <20220323012103.2537-1-niedzejkob@invisiblethingslab.com>
X-Mailer: git-send-email 2.30.2
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

If a xen domain with at least two VCPUs has a PCI device attached which
enters the D3hot state during suspend, the kernel may hang while
resuming, depending on the core on which an async resume task gets
scheduled.

The bug occurs because xen's do_suspend calls dpm_resume_start while
only the timer of the boot CPU has been resumed (when xen_suspend called
syscore_resume), before calling xen_arch_suspend to resume the timers of
the other CPUs. This breaks pci_dev_d3_sleep.

Thus this patch moves the call to xen_arch_resume before the call to
dpm_resume_start, eliminating the hangs and restoring the stack-like
structure of the suspend/restore procedure.

Signed-off-by: Jakub Kądziołka <niedzejkob@invisiblethingslab.com>
---
 drivers/xen/manage.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/drivers/xen/manage.c b/drivers/xen/manage.c
index 374d36de7f5a..3d5a384d65f7 100644
--- a/drivers/xen/manage.c
+++ b/drivers/xen/manage.c
@@ -141,6 +141,8 @@ static void do_suspend(void)
 
 	raw_notifier_call_chain(&xen_resume_notifier, 0, NULL);
 
+	xen_arch_resume();
+
 	dpm_resume_start(si.cancelled ? PMSG_THAW : PMSG_RESTORE);
 
 	if (err) {
@@ -148,8 +150,6 @@ static void do_suspend(void)
 		si.cancelled = 1;
 	}
 
-	xen_arch_resume();
-
 out_resume:
 	if (!si.cancelled)
 		xs_resume();
-- 
2.30.2



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 05:13:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 05:13:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293613.499108 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWtJZ-0002KB-8R; Wed, 23 Mar 2022 05:13:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293613.499108; Wed, 23 Mar 2022 05:13:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWtJZ-0002K4-53; Wed, 23 Mar 2022 05:13:45 +0000
Received: by outflank-mailman (input) for mailman id 293613;
 Tue, 22 Mar 2022 17:22:15 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=cMSl=UB=irrelevant.dk=its@srs-se1.protection.inumbo.net>)
 id 1nWiD1-0007dX-49
 for xen-devel@lists.xenproject.org; Tue, 22 Mar 2022 17:22:15 +0000
Received: from new1-smtp.messagingengine.com (new1-smtp.messagingengine.com
 [66.111.4.221]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 9bbc9895-aa04-11ec-8fbc-03012f2f19d4;
 Tue, 22 Mar 2022 18:22:13 +0100 (CET)
Received: from compute2.internal (compute2.nyi.internal [10.202.2.46])
 by mailnew.nyi.internal (Postfix) with ESMTP id C20565801B2;
 Tue, 22 Mar 2022 13:22:10 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163])
 by compute2.internal (MEProxy); Tue, 22 Mar 2022 13:22:10 -0400
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Tue,
 22 Mar 2022 13:22:00 -0400 (EDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9bbc9895-aa04-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=irrelevant.dk;
	 h=cc:cc:content-type:date:date:from:from:in-reply-to
	:in-reply-to:message-id:mime-version:references:reply-to:sender
	:subject:subject:to:to; s=fm3; bh=DKA1S+zaOnp0EXg0D/eCjdJnTBqB3w
	lH33M2skJaIIM=; b=kUjswknOc/LNgIBFH7zcVbzZV9YF/Q7z7pKdb1AQC2FC6e
	tzxhuA3aNM7wNZzPtyEtnsPihfCxdYq4JV1l2ve6fTch6rDfr61f7+4xLQBY8GAG
	Z4H/2nh9Mdfc8j4wrXjcwJs9303SEHhbq1+XKBLkJqBVzhpIGLv75bBitbKEjYzn
	7HRrsZ9Cz7abydk5FnBX9cKXa31Cn6tK/pXZvAVhNEEueJV6HI6QUhPH5FtC2M1x
	yPxITWXQs7HQQRtyekZloFU2ESBiMFUewLOq0lEbsPb4d4+jGa2v/CQZHCfLtJQp
	ug3mXazcnjhZTW9Mz0SZN/HmL4N89/cRdYNqYAwg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:cc:content-type:date:date:from:from
	:in-reply-to:in-reply-to:message-id:mime-version:references
	:reply-to:sender:subject:subject:to:to:x-me-proxy:x-me-proxy
	:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=DKA1S+zaOnp0EXg0D
	/eCjdJnTBqB3wlH33M2skJaIIM=; b=dbnSSTgUklpqQhwWFknQDnahg1Ryed2g7
	wZ0PE3zLkLNJpLCKyefyvIzDT1zdqKS0G43qgA4EidVFIWdForoozWc7RWaJ0BW4
	3r3L3gR7+QeaibY37sjTIFuJVwZ3E+FC8iej7yL5lRnra7n8fkxbge4yWFaaaPNr
	gasE8fIyPuP0EtOKfvrde3Va2Zc1Ge9Fhhc2aeU3W+Rg9uX2+9pLEPYBlawvbirN
	vESQFI4Y/HCFWVPYAuOyfE69fJ/jrRMYIBSMKi5u9sppOJQrIJ0irBz5VrR99jGk
	niEfkdZ4sh/2I7LfxNxuTUVKZXmv5ej/Da4vUOHhwCVJ3d3eWhRWw==
X-ME-Sender: <xms:wAU6YuiDVSiO5DXDfSL8EIMJPMlDj54UyI_sfzAOFASsHtGMDphZBg>
    <xme:wAU6YvC1wRJ4Pxg8ngkDfAEPQ0xqzNpje2B93LCNzR3fLKD5slrs57CvkQ6hzA-MA
    MO7QN7gFJpfj1rOVFo>
X-ME-Received: <xmr:wAU6YmFvkNY5p9PlD_Cw_LT0A6zz4RfLSj-c-dcgQdAukt_SOaChW2UNw_k-lh11iO-gqeOtvp9zgH0V7w>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddrudeghedgleejucetufdoteggodetrfdotf
    fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen
    uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne
    cujfgurhepfffhvffukfhfgggtuggjsehgtderredttdejnecuhfhrohhmpefmlhgruhhs
    ucflvghnshgvnhcuoehithhssehirhhrvghlvghvrghnthdrughkqeenucggtffrrghtth
    gvrhhnpeejgeduffeuieetkeeileekvdeuleetveejudeileduffefjeegfffhuddvudff
    keenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpehith
    hssehirhhrvghlvghvrghnthdrughk
X-ME-Proxy: <xmx:wAU6YnT-3y9ba53YTbdzDilaJdXcBx0lP9NRYpcahWvudI3S6ZAyQQ>
    <xmx:wAU6YrxTLwhzw0WFqIxp-d74Cf2UQRYGNgd8JFhrgumPo2LmigxrBQ>
    <xmx:wAU6Yl4rmLv7PAa_H7QhvkfyzDaoXDiwKlGZYaq58M_gYE7Kj1ksNw>
    <xmx:wgU6Ylh8R0wqYvzc50CjDVm3cmAN4T0qVUWveuXkCGEB5-jlmI349w>
Date: Tue, 22 Mar 2022 18:21:58 +0100
From: Klaus Jensen <its@irrelevant.dk>
To: Markus Armbruster <armbru@redhat.com>
Cc: qemu-devel@nongnu.org, Paolo Bonzini <pbonzini@redhat.com>,
	Richard Henderson <richard.henderson@linaro.org>,
	Gerd Hoffmann <kraxel@redhat.com>,
	Christian Schoenebeck <qemu_oss@crudebyte.com>,
	"Gonglei (Arei)" <arei.gonglei@huawei.com>,
	=?utf-8?Q?Marc-Andr=C3=A9?= Lureau <marcandre.lureau@redhat.com>,
	"Michael S. Tsirkin" <mst@redhat.com>,
	Igor Mammedov <imammedo@redhat.com>, Ani Sinha <ani@anisinha.ca>,
	Laurent Vivier <lvivier@redhat.com>, Amit Shah <amit@kernel.org>,
	Peter Maydell <peter.maydell@linaro.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Anthony Perard <anthony.perard@citrix.com>,	Paul Durrant <paul@xen.org>,
	=?utf-8?B?SGVydsOp?= Poussineau <hpoussin@reactos.org>,
	Aleksandar Rikalo <aleksandar.rikalo@syrmia.com>,
	Corey Minyard <cminyard@mvista.com>,
	Patrick Venture <venture@google.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Peter Xu <peterx@redhat.com>, Jason Wang <jasowang@redhat.com>,
	=?utf-8?Q?C=C3=A9dric?= Le Goater <clg@kaod.org>,
	Daniel Henrique Barboza <danielhb413@gmail.com>,
	David Gibson <david@gibson.dropbear.id.au>,	Greg Kurz <groug@kaod.org>,
	Philippe =?utf-8?Q?Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Jean-Christophe Dubois <jcd@tribudubois.net>,
	Keith Busch <kbusch@kernel.org>,	Yuval Shaia <yuval.shaia.ml@gmail.com>,
	Yoshinori Sato <ysato@users.sourceforge.jp>,
	Magnus Damm <magnus.damm@gmail.com>,
	Fabien Chouteau <chouteau@adacore.com>,
	KONRAD Frederic <frederic.konrad@adacore.com>,
	Mark Cave-Ayland <mark.cave-ayland@ilande.co.uk>,
	Artyom Tarasenko <atar4qemu@gmail.com>,
	Alex Williamson <alex.williamson@redhat.com>,
	Eric Auger <eric.auger@redhat.com>,	Max Filippov <jcmvbkbc@gmail.com>,
	Juan Quintela <quintela@redhat.com>,
	"Dr. David Alan Gilbert" <dgilbert@redhat.com>,
	Konstantin Kostiuk <kkostiuk@redhat.com>,
	Michael Roth <michael.roth@amd.com>,
	Daniel =?utf-8?B?UC4gQmVycmFuZ8Op?= <berrange@redhat.com>,
	Pavel Dovgalyuk <pavel.dovgaluk@ispras.ru>,
	Alex =?utf-8?Q?Benn=C3=A9e?= <alex.bennee@linaro.org>,
	David Hildenbrand <david@redhat.com>,
	Wenchao Wang <wenchao.wang@intel.com>,
	Kamil Rytarowski <kamil@netbsd.org>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Cornelia Huck <cohuck@redhat.com>, Thomas Huth <thuth@redhat.com>,
	Eric Blake <eblake@redhat.com>,
	Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>,
	John Snow <jsnow@redhat.com>, kvm@vger.kernel.org,	qemu-arm@nongnu.org,
 xen-devel@lists.xenproject.org,	qemu-ppc@nongnu.org,
 qemu-block@nongnu.org, haxm-team@intel.com,	qemu-s390x@nongnu.org
Subject: Re: [PATCH v2 3/3] Use g_new() & friends where that makes obvious
 sense
Message-ID: <YjoFtvvV/LtGt2X9@apples>
References: <20220315144156.1595462-1-armbru@redhat.com>
 <20220315144156.1595462-4-armbru@redhat.com>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="W/A79Jf9YM97F5Ll"
Content-Disposition: inline
In-Reply-To: <20220315144156.1595462-4-armbru@redhat.com>


--W/A79Jf9YM97F5Ll
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Mar 15 15:41, Markus Armbruster wrote:
> g_new(T, n) is neater than g_malloc(sizeof(T) * n).  It's also safer,
> for two reasons.  One, it catches multiplication overflowing size_t.
> Two, it returns T * rather than void *, which lets the compiler catch
> more type errors.
>=20
> This commit only touches allocations with size arguments of the form
> sizeof(T).
>=20
> Patch created mechanically with:
>=20
>     $ spatch --in-place --sp-file scripts/coccinelle/use-g_new-etc.cocci \
> 	     --macro-file scripts/cocci-macro-file.h FILES...
>=20
> Signed-off-by: Markus Armbruster <armbru@redhat.com>
> Reviewed-by: Philippe Mathieu-Daud=C3=A9 <f4bug@amsat.org>
> Reviewed-by: C=C3=A9dric Le Goater <clg@kaod.org>
> Reviewed-by: Alex Benn=C3=A9e <alex.bennee@linaro.org>
> Acked-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
> ---
>  hw/nvme/ns.c                             |  2 +-

For hw/nvme,

Acked-by: Klaus Jensen <k.jensen@samsung.com>

--W/A79Jf9YM97F5Ll
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEUigzqnXi3OaiR2bATeGvMW1PDekFAmI6BbQACgkQTeGvMW1P
DemVHQf/UvBrob2AKXn7QLs1LPvjspegusuMZAUULXyiS7FJ456DBSy0wWUweIj0
+PKX+HOXbZu7s0mUXhZ0GpiD5V39c/M7/18p620LaokIDnuwuI1Mshnytrk5gao6
EyfSap+WxrF/ys8BQ7X22h6juLgDsY4J/QwuHEk+rcjSO4YQpeJBpp+3AsOFbWbl
7wx6aFzLcoAWIWr5zc9BwboE5w9Ot7/fSBdn1GnbWUfVr0VxCJGv5oU833IsOcbL
3Kufe+QE2ZxyD7v+mHI1/THkr9rFYaWJ8f4HAfQ5XfoOo/ULXo6qkw4fM04tD3ex
oGvzJovacGYnvSvYmde1KMydB+oNXQ==
=KxTS
-----END PGP SIGNATURE-----

--W/A79Jf9YM97F5Ll--


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 06:43:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 06:43:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293754.499137 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWuhr-0003OV-B9; Wed, 23 Mar 2022 06:42:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293754.499137; Wed, 23 Mar 2022 06:42:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWuhr-0003OO-85; Wed, 23 Mar 2022 06:42:55 +0000
Received: by outflank-mailman (input) for mailman id 293754;
 Wed, 23 Mar 2022 06:42:54 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=/AEF=UC=lst.de=hch@srs-se1.protection.inumbo.net>)
 id 1nWuhq-0003OI-Gx
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 06:42:54 +0000
Received: from verein.lst.de (verein.lst.de [213.95.11.211])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 7605b55e-aa74-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 07:42:51 +0100 (CET)
Received: by verein.lst.de (Postfix, from userid 2407)
 id 8DA2C68AFE; Wed, 23 Mar 2022 07:42:48 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 7605b55e-aa74-11ec-8fbc-03012f2f19d4
Date: Wed, 23 Mar 2022 07:42:48 +0100
From: Christoph Hellwig <hch@lst.de>
To: Ryusuke Konishi <konishi.ryusuke@gmail.com>
Cc: Christoph Hellwig <hch@lst.de>, Guenter Roeck <linux@roeck-us.net>,
	Jens Axboe <axboe@kernel.dk>, linux-block@vger.kernel.org,
	linux-nfs@vger.kernel.org,
	linux-nilfs <linux-nilfs@vger.kernel.org>,
	Mike Snitzer <snitzer@redhat.com>,
	Philipp Reisner <philipp.reisner@linbit.com>,
	Konstantin Komarov <almaz.alexandrovich@paragon-software.com>,
	Roger Pau =?iso-8859-1?Q?Monn=E9?= <roger.pau@citrix.co>,
	device-mapper development <dm-devel@redhat.com>,
	"Md . Haris Iqbal" <haris.iqbal@ionos.com>,
	Lars Ellenberg <lars.ellenberg@linbit.com>,
	linux-fsdevel@vger.kernel.org, xen-devel@lists.xenproject.org,
	Andrew Morton <akpm@linux-foundation.org>, ntfs3@lists.linux.dev,
	Jack Wang <jinpu.wang@ionos.com>,
	Pavel Begunkov <asml.silence@gmail.com>, drbd-dev@lists.linbit.com
Subject: Re: [dm-devel] [PATCH 01/19] fs: remove mpage_alloc
Message-ID: <20220323064248.GA24874@lst.de>
References: <20220124091107.642561-1-hch@lst.de> <20220124091107.642561-2-hch@lst.de> <20220322211915.GA2413063@roeck-us.net> <CAKFNMonRd5QQMzLoH3T=M=C=2Q_j9d86EYzZeY4DU2HQAE3E8w@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <CAKFNMonRd5QQMzLoH3T=M=C=2Q_j9d86EYzZeY4DU2HQAE3E8w@mail.gmail.com>
User-Agent: Mutt/1.5.17 (2007-11-01)

On Wed, Mar 23, 2022 at 06:38:22AM +0900, Ryusuke Konishi wrote:
> This looks because the mask of GFP_KERNEL is removed along with
> the removal of mpage_alloc().
> 

> The default value of the gfp flag is set to GFP_HIGHUSER_MOVABLE by
> inode_init_always().
> So, __GFP_HIGHMEM hits the gfp warning at bio_alloc() that
> do_mpage_readpage() calls.

Yeah.  Let's try this to match the iomap code:

diff --git a/fs/mpage.c b/fs/mpage.c
index 9ed1e58e8d70b..d465883edf719 100644
--- a/fs/mpage.c
+++ b/fs/mpage.c
@@ -148,13 +148,11 @@ static struct bio *do_mpage_readpage(struct mpage_readpage_args *args)
 	int op = REQ_OP_READ;
 	unsigned nblocks;
 	unsigned relative_block;
-	gfp_t gfp;
+	gfp_t gfp = mapping_gfp_constraint(page->mapping, GFP_KERNEL);
 
 	if (args->is_readahead) {
 		op |= REQ_RAHEAD;
-		gfp = readahead_gfp_mask(page->mapping);
-	} else {
-		gfp = mapping_gfp_constraint(page->mapping, GFP_KERNEL);
+		gfp |= __GFP_NORETRY | __GFP_NOWARN;
 	}
 
 	if (page_has_buffers(page))


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 06:57:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 06:57:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293758.499151 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWuvj-0004wh-LY; Wed, 23 Mar 2022 06:57:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293758.499151; Wed, 23 Mar 2022 06:57:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWuvj-0004wa-Hb; Wed, 23 Mar 2022 06:57:15 +0000
Received: by outflank-mailman (input) for mailman id 293758;
 Wed, 23 Mar 2022 06:57:14 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=TYzS=UC=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nWuvi-0004wU-1k
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 06:57:14 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 76c83355-aa76-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 07:57:12 +0100 (CET)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04lp2058.outbound.protection.outlook.com [104.47.13.58]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-19-eqZGhxjYNfW1cMqM6jWu1A-1; Wed, 23 Mar 2022 07:57:10 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by VI1PR04MB5982.eurprd04.prod.outlook.com (2603:10a6:803:d5::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17; Wed, 23 Mar
 2022 06:57:06 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a%6]) with mapi id 15.20.5102.017; Wed, 23 Mar 2022
 06:57:06 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 76c83355-aa76-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648018632;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=10QfMBRDJdM7xSzPM0h1SgST36SwVd6fWpFXivIhfrE=;
	b=ZzV4YW2V6jnBR2rmRnl9FtRZqrkeFoYBg5HDPyL2OkLchzC/XkF7u07TeJRZQgSTUs+2wM
	4c9Tr7FWy6mrQOJTl/QELtzsb030RWVFCLrMCYvtGtKkIIl4hP00bHm3Ra+01AXfM+Ov3w
	/KpsvOsydTKrd3f0obhgfFDN5SyUPnk=
X-MC-Unique: eqZGhxjYNfW1cMqM6jWu1A-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Ac8te2lu0ZlNtAKtuuf10BeHSL6+8iyxgMLN7E+riUcanu/3Uhm+kIx01pkornccZXz8apXTACTkw234Lx26KTnFbpWbtklamUmiIn3Q43+X//EFOfJWr4kGOHywH9UfSjfDDYEEQfF0ijMz8qDwvGpggIMKQREdFm2HKV5PA2bR0VciEgEpvPpZ47XmZlyR3gq+zdSRANkyvG9U0hCQYtXLayg6jekQkZp1m0c6Wj6UP9c0HUjdF5u5mEtbINM3E0eHUVTvJ1IfM87Y2CYQQzHv1zT3S5YVXorB+iwoSCPGG28ikzxy0mWPUu2JHKURDJiGHtcgUS4+aJkeup4gHA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=10QfMBRDJdM7xSzPM0h1SgST36SwVd6fWpFXivIhfrE=;
 b=YfA+ZEVFeFpyLOGd+Uq9CpjASQvplzWklJzizBTk2PL4+jq1Cqn4Cru3tuAYsy9CD5P9b/HOt5LCmp9MqfZG9Rrq7NX4KpG86RtDD4aKDwB0Ko0nPK5A7mPjrHMbUPBkw5DUM1JfpSKheGPYWD92ae2G3BnEomoa1TnND18ue4ttHd3i/d+Hf+RGoaPlH2BRPzrbPf45B9sFI2UnINzjbmjWw42Ppei4vL/3pG150lxn2Ip822OoidjQDI9Qel/Pfce+k8Sb5tnXwcwE6qOb+so3xjp7/kXhQ15y744rgNccPMDfVZYwXyQT9HEtSj9W5UF37PUU1npisR8i/nzDyw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <c57dc9a9-e2ca-74c6-4fde-e2a6f1400de5@suse.com>
Date: Wed, 23 Mar 2022 07:57:03 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v3 2/5] xen: make evtchn_alloc_unbound public
Content-Language: en-US
To: Stefano Stabellini <sstabellini@kernel.org>
Cc: xen-devel@lists.xenproject.org, jgross@suse.com,
 Bertrand.Marquis@arm.com, julien@xen.org, Volodymyr_Babchuk@epam.com,
 Luca Miccio <lucmiccio@gmail.com>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 "Daniel P. Smith" <dpsmith.dev@gmail.com>
References: <alpine.DEB.2.22.394.2201281330520.27308@ubuntu-linux-20-04-desktop>
 <20220128213307.2822078-2-sstabellini@kernel.org>
 <2f05e63a-96c3-e78f-f7e4-36fd17fcd58c@gmail.com>
 <alpine.DEB.2.22.394.2203221711110.2910984@ubuntu-linux-20-04-desktop>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <alpine.DEB.2.22.394.2203221711110.2910984@ubuntu-linux-20-04-desktop>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM7PR03CA0026.eurprd03.prod.outlook.com
 (2603:10a6:20b:130::36) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ed1d7cf3-4783-4b4f-6c9c-08da0c9a5764
X-MS-TrafficTypeDiagnostic: VI1PR04MB5982:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB5982088A55476CD4225562DFB3189@VI1PR04MB5982.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(7416002)(31696002)(316002)(508600001)(31686004)(8936002)(36756003)(4326008)(8676002)(5660300002)(38100700002)(66946007)(86362001)(66556008)(66476007)(2906002)(6916009)(54906003)(6486002)(966005)(83380400001)(2616005)(6666004)(6512007)(26005)(186003)(6506007)(53546011)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?eWJtUG10QWtzMFVvbTk1NFJvTTVzcWtBUzZXZUJRMTZxZTJLa1pCRUJybW1k?=
 =?utf-8?B?TThWMjlyUitmaSs5VWx0M2l2YytMNUFQdmdXMW41TW1wSzRycUwwT1RJY1B3?=
 =?utf-8?B?TzcrYjNEcmh3SXBNS1k3TDVab1o4Nnh2TkwyM0VDQmdiZWRuWVFyR2x0dEQ4?=
 =?utf-8?B?SmozalZSQk1nK1FjY3RZRkNUM1dVUUZ3OExQcDN0M3J4eHFsRFZTZGNReXdo?=
 =?utf-8?B?ZSs2QjFobGtmeGJwSVJlNDZvYmdPOW85T3E1VlBHQnBSdjd0a09XYUZxaExV?=
 =?utf-8?B?Y0VUczlUdmxXMW13MjZmMFdrZjBDRTVqazl2M1JRT1JXOTlmMlErMnFma3VO?=
 =?utf-8?B?NWZjVmhuY1BaY01ua0VFSlhZOTBuMFV6ekxFZDVSV3ZMM3ZiKzJmNHBXNndI?=
 =?utf-8?B?WDB2QmRjNER4cFJtWkpiSGlwNC9BM1ArNHF4VXRMdEQ5UVVsa0Ntei8wdVFP?=
 =?utf-8?B?SVdlM2Fhc0cxbVlwcThmSHRxZkxRNnBwSEd0TjdMNXRNdmowbUsrbTVRTTgz?=
 =?utf-8?B?WUt4eWdCTUE3aTFZbWNsalp1Szc4ODdDdnNnRjYrOUU0VWdEdkJJNUFSeTdW?=
 =?utf-8?B?cXJVaXFCQUw1WjlOYlpuZDZ1NTFubHNrMk44by9qeVduK0Vvbmd1OVdTKzQx?=
 =?utf-8?B?bHdIQVhTSGh6Z3hWRWs3cTUveWJ6V0IyTTE0eHdZaGV6aVJGS0wvRENFaGUw?=
 =?utf-8?B?N2w4VnY5ZTkzcEs2TU1uenZzM0FCNU9xWURLSVJ5akM1WkJ3bTlCb1p5elVl?=
 =?utf-8?B?UkFGVFE3OTVRUENpOXR6STdyZFBvTW14ZC9lUWRiZXdZdWc3QlZ1MHdhZ1ln?=
 =?utf-8?B?UHdwUWRsdThSVEozZk85amxwTXpHMVVzRVFKRXdvRWZjbTdxdUNFOFZVVCtj?=
 =?utf-8?B?WkVabTBUY21hMlczeVpRajB1K2ladU53WTJLckhHV3BKOFZMc0Q0aXZlWDRp?=
 =?utf-8?B?SEJXMHAxK3p0M0p6aldEeFJoZG1JVWtWWTVmTjZCY0F1V05odXlsTUlxVWdr?=
 =?utf-8?B?eThoQVpyUXRrUmJRSTh3YUxlYWIzM2JQWWVxc1ZqNy9QeG44KzRQcHF6RzFo?=
 =?utf-8?B?VEZUaEl1TXhNSllHUGV5VC92Y3hWZFlRYlFnUkZCS1gzMmExUHlKQlBNOXVi?=
 =?utf-8?B?aDlPaTRIWndTdjJ1ZjFzSm42dXVJem9jemROOWVsNXF6NGtWQ2pQbXY2ZjI1?=
 =?utf-8?B?c1RraVJiOU9CckExejB2K09iUmFxWGhDYTAvaUo5dHdFaWs5UjZ0eFNGVnhJ?=
 =?utf-8?B?cUVLNVI1aCtYR1pKbFdKb0lsVU04dVdBa2hzcFhCdHpIV0VaZXBzR3lnN2Za?=
 =?utf-8?B?USt4VHgxclRpTXRjRmhaZDlERjNPRVFpNXVGWjBjQ1oxcjZLUWhWRnlpWTlS?=
 =?utf-8?B?dmpmNk4rZWw4Y1MxeDFKbUFNNTg4MmQra1pkZjdtSlhlMkxFU2ZFQkZ1WGtM?=
 =?utf-8?B?Wk9UMi9YZEtCQS84SktXYjNYNUhWSy9EVzFtWTJVUXBNeUhFZ1VCUzQ3MkZ5?=
 =?utf-8?B?cFZ2VzlrQ1BFSmR4M3NreklPcVFtcDZ2SFBTYTJPUjcvRXNiWTFoek0wWmww?=
 =?utf-8?B?ckJ4b2RlQWs3R0ExaUFnU3VaQkZOOUNLUm9WR1BhcTVxSGxEZWZLczlocWha?=
 =?utf-8?B?eWJKOW9xWVMvNFJyS0FPSUNneWUzTlhCWlpqZXRveG9EcVRFTmRhUUtGQmQ1?=
 =?utf-8?B?cGM4Qnk2aTM0OWVEUDZJdi9ZVXRWdlVheU5FeTBoNDB5ZE0zc3FUaDRPem0y?=
 =?utf-8?B?WVlmQUhqZUVXMSs1OFVqcHFmcG1KUjJKVy9aRWViNi83bFFIYnJoTFRhTjdZ?=
 =?utf-8?B?L09uMU1oNjBoczlGMjBNb1RtQzNkSm9DY3lHSExJRXpRUWNyWFRjVkxnMHlI?=
 =?utf-8?B?Q09OQnpiOXRvckpEUWF4S0ZZdFdlblhwekpWc1BhSitTZ0FUTFF0eHBycFVM?=
 =?utf-8?Q?WtLaKPYfeDxYWlqnXZQf0jqJ4NnFKoeC?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ed1d7cf3-4783-4b4f-6c9c-08da0c9a5764
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Mar 2022 06:57:06.0323
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: WR7ivlDlhyU9/L8UY/H3oo6usOrC56I84kYcnMevu6Gn54/sTJhSwZfuXeQQleYcBwl50tLQ93eJohfAJ01WkQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB5982

On 23.03.2022 01:22, Stefano Stabellini wrote:
> On Tue, 15 Mar 2022, Daniel P. Smith wrote:
>> On 1/28/22 16:33, Stefano Stabellini wrote:
>>> From: Luca Miccio <lucmiccio@gmail.com>
>>>
>>> The xenstore event channel will be allocated for dom0less domains. It is
>>> necessary to have access to the evtchn_alloc_unbound function to do
>>> that, so make evtchn_alloc_unbound public.
>>>
>>> Add a skip_xsm parameter to allow disabling the XSM check in
>>> evtchn_alloc_unbound (xsm_evtchn_unbound wouldn't work for a call
>>> originated from Xen before running any domains.)
>>>
>>> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
>>> Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
>>> CC: Julien Grall <julien@xen.org>
>>> CC: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
>>> CC: Bertrand Marquis <bertrand.marquis@arm.com>
>>> CC: Andrew Cooper <andrew.cooper3@citrix.com>
>>> CC: George Dunlap <george.dunlap@citrix.com>
>>> CC: Jan Beulich <jbeulich@suse.com>
>>> CC: Wei Liu <wl@xen.org>
>>> ---
>>> Changes v3:
>>> - expose evtchn_alloc_unbound, assing a skip_xsm parameter
>>> ---
>>>  xen/common/event_channel.c | 13 ++++++++-----
>>>  xen/include/xen/event.h    |  3 +++
>>>  2 files changed, 11 insertions(+), 5 deletions(-)
>>>
>>> diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c
>>> index da88ad141a..be57d00a15 100644
>>> --- a/xen/common/event_channel.c
>>> +++ b/xen/common/event_channel.c
>>> @@ -284,7 +284,7 @@ void evtchn_free(struct domain *d, struct evtchn *chn)
>>>      xsm_evtchn_close_post(chn);
>>>  }
>>>  
>>> -static int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
>>> +int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc, bool skip_xsm)
>>>  {
>>>      struct evtchn *chn;
>>>      struct domain *d;
>>> @@ -301,9 +301,12 @@ static int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
>>>          ERROR_EXIT_DOM(port, d);
>>>      chn = evtchn_from_port(d, port);
>>>  
>>> -    rc = xsm_evtchn_unbound(XSM_TARGET, d, chn, alloc->remote_dom);
>>> -    if ( rc )
>>> -        goto out;
>>> +    if ( !skip_xsm )
>>> +    {
>>> +        rc = xsm_evtchn_unbound(XSM_TARGET, d, chn, alloc->remote_dom);
>>> +        if ( rc )
>>> +            goto out;
>>> +    }
>>
>> Please do not subvert the security framework because it causes an
>> inconvenience. As Jan recommended, work within the XSM check to allow
>> your access so that we may ensure it is done safely. If you need any
>> help making modifications to XSM, please do not hesitate to reach out as
>> I will gladly help.
> 
> Thank you!
> 
> First let me reply to Jan: this series is only introducing 1 more call
> to evtchn_alloc_unbound, which is to allocate the special xenstore event
> channel, the one configured via
> d->arch.hvm.params[HVM_PARAM_STORE_EVTCHN].
> 
> It is not meant to be a generic function, and it is not meant to be
> called more than once. It could (should?) be __init.

How that? Its pre-existing use doesn't disappear, and requires it to be
non-__init.

> The existing XSM check in evtchn_alloc_unbound cannot work and should
> not work: it is based on the current domain having enough privileges to
> create the event channel. In this case, we have no current domain at
> all. The current domain is Xen itself.

And DOM_XEN cannot be given the appropriate permission, perhaps
explicitly when using a real policy and by default in dummy and SILO
modes?

Jan

> For these reasons, given [1], also not to subvert the security
> framework as Daniel pointed out, I think I should go back to my own
> implementation [2][3] based on get_free_port. That is my preference
> because:
> 
> - the Xen codebase doesn't gain much by reusing evtchn_alloc_unbound
> - adding skip_xsm introduces a component of risk (unless we make it
>   __init maybe?)
> - using get_free_port is trivial and doesn't pose the same issues
> 
> 
> Let's find all an agreement on how to move forward on this.
> 
> 
> [1] https://marc.info/?l=xen-devel&m=164194128922838
> [2] https://marc.info/?l=xen-devel&m=164203543615114
> [3] https://marc.info/?l=xen-devel&m=164203544615129 
> 



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 06:59:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 06:59:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293761.499162 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWuxO-0005Yq-Vo; Wed, 23 Mar 2022 06:58:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293761.499162; Wed, 23 Mar 2022 06:58:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWuxO-0005Yj-Sr; Wed, 23 Mar 2022 06:58:58 +0000
Received: by outflank-mailman (input) for mailman id 293761;
 Wed, 23 Mar 2022 06:58:57 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWuxM-0005YX-Vc; Wed, 23 Mar 2022 06:58:56 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWuxM-0006gk-UP; Wed, 23 Mar 2022 06:58:56 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWuxM-0004q9-Er; Wed, 23 Mar 2022 06:58:56 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWuxM-0002MD-EO; Wed, 23 Mar 2022 06:58:56 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=XAImSJWSUrR3i2kXwwH8UhuPMV8MB6SXqC6984AGocE=; b=Eyhkcd+fMKfNxs2NhhMkDKHppg
	3AKz2vTsK0qsvZXcBbTZrup+D/pvPQNO5cGhcictB8t4517qGy7PkLVua+q8D5HLA2RbbfC0EvVw6
	47C2tkTQHiFNK9m0y2KtW2oC5mmG1IpH/4+4HCiRWiQW+alzD+uCIeKFjTooiWHKix4M=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168793-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168793: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 23 Mar 2022 06:58:56 +0000

flight 168793 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168793/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   22 days
Failing since        168258  2022-03-01 01:55:31 Z   22 days  229 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    0 days   10 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 07:17:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 07:17:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293771.499173 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWvFS-000809-O3; Wed, 23 Mar 2022 07:17:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293771.499173; Wed, 23 Mar 2022 07:17:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWvFS-000802-Kr; Wed, 23 Mar 2022 07:17:38 +0000
Received: by outflank-mailman (input) for mailman id 293771;
 Wed, 23 Mar 2022 07:17:38 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=TYzS=UC=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nWvFS-0007zw-9R
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 07:17:38 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 50f9f2fe-aa79-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 08:17:37 +0100 (CET)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2112.outbound.protection.outlook.com [104.47.17.112]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-17-YbVBUQ-HMCeKMV_vaCNsTg-1; Wed, 23 Mar 2022 08:17:35 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM5PR04MB2993.eurprd04.prod.outlook.com (2603:10a6:206:f::12) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.22; Wed, 23 Mar
 2022 07:17:33 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a%6]) with mapi id 15.20.5102.017; Wed, 23 Mar 2022
 07:17:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 50f9f2fe-aa79-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648019856;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=24d05wNlI9gx55noH4ybuK5koG6OXEWX1QXEsQFXk74=;
	b=iLbv+dn9O9QfJyx4hpQHuhsVk/JzbVKxpxvS416RfgSM1DArNP9uIwARB9WyymfzRGexDD
	gkY7hDu9jWdxsbFyLSgLMyDOqJfK7gfTU/1hRmYbmT3rbLLv2jEd8nlgPWzIaubMihe9Cd
	pL8Pn5APgfHNaVloZiXMge0cVDqYFqY=
X-MC-Unique: YbVBUQ-HMCeKMV_vaCNsTg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=n94tITH14Mhb18E6Xu97ErCcgNhGmtvx+wmkr3l1sCyqmBwVhg3CcI29Obpp1Dmx+n3iOydDook8fvwiJU9dJZrpJFXHoHbbAQS+3L5SIVM6KHWb8DYujM/YEH5Y+wY5SrML1AJEjjsNLSfKqPzNce3whYg//sByjLIHF9zEkWcsj3WUsnmZhlCfKgju1zjnMuJ87q5gvWOqwg4au5WlEkof2uSe95+L/vkx+Fwm5Y0DJ8QwAZX9x4lGiBEzWi7Y3npjZbf1bdQuUhfRvJ1jtxAbnsAPyUSA+clz7rziW/cbxpBLrtf05KjbmwWBdDNb6dCavmj+EXp0kzGTmbTfUA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=24d05wNlI9gx55noH4ybuK5koG6OXEWX1QXEsQFXk74=;
 b=eQ4XKiT8fA4YzMfLu8xpBeCHIV9edifrdzG3NcNL0xccuqw85RC9mhiTx4usX4bKNPQpWScZbBN1VNk5CGM9K+6zcLFTawK/wbTB1igP6HN5uzEMQ83Kd81+F3UrwZh5G0mGRPI0llEkEE64kJ+Dd+8zEtV36UGEYABFL+3hOkRi+sqzzi2cpdaTqUHYDEV0PSgTerCx1YcaPNEC16I3hLnXeInw6EYyBObXNnLri9ozRTvdMZxepqQbLnm4O8VaHZONhG2YqpP7nyWhBo0+U+uwkPFVivrVqVOAmT2kBdfp9Gwh1ZRAqIKifZ+CY+qTImnmP2ylY9rNCr5/w70i+Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <a49b15ef-964c-85c5-72ab-d970bdfcdca0@suse.com>
Date: Wed, 23 Mar 2022 08:17:32 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2] xen/arm: set CPSR Z bit when creating aarch32 guests
Content-Language: en-US
To: Stefano Stabellini <sstabellini@kernel.org>
Cc: julien@xen.org, bertrand.marquis@arm.com, Volodymyr_Babchuk@epam.com,
 Stefano Stabellini <stefano.stabellini@xilinx.com>,
 xen-devel@lists.xenproject.org
References: <20220322202825.418232-1-sstabellini@kernel.org>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220322202825.418232-1-sstabellini@kernel.org>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8PR04CA0158.eurprd04.prod.outlook.com
 (2603:10a6:20b:331::13) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c300c786-4542-429d-d870-08da0c9d3345
X-MS-TrafficTypeDiagnostic: AM5PR04MB2993:EE_
X-Microsoft-Antispam-PRVS:
	<AM5PR04MB2993C3AC18B0FB1A5BA2D801B3189@AM5PR04MB2993.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(508600001)(66556008)(31686004)(66476007)(6916009)(66946007)(2616005)(6486002)(2906002)(8936002)(316002)(5660300002)(4326008)(8676002)(26005)(36756003)(31696002)(6512007)(38100700002)(86362001)(6506007)(53546011)(186003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?WG1RRk94Ymx0ZTExSlUvcnVLVDVJV24xejZrK1cxTzhjVWJZeHJmWlpBU1NV?=
 =?utf-8?B?OVNWMmlXRWtCLzRXYzNtZW9QUDJLSVpsLzFwSE1JQVgvQURIWUdSZk02RE5m?=
 =?utf-8?B?T2xjdDB6RFVySkl2SC9vWlhYMHJWaW9jMFMvRi9kSnFOVmQ0WU83L2xkRnhl?=
 =?utf-8?B?SHduMWZ0Nm1hc0c3VnpnWlVRMFNZU1dwdlRoZUxxTjVEODErb0xvY3lUclZ2?=
 =?utf-8?B?VXZIM3JxdmdjSzM3UG1VVXQ2MXk5RGp3OFBKYWRueExRSjhrNGNZOWZUWjhS?=
 =?utf-8?B?Tm1PRFIzMEpRWDVjYXg4N016M2ZHZ2c2Wlk0N00xVDNRejlHblE0T1VVSFBU?=
 =?utf-8?B?cjk4VnZaeno0UVkwdlkxREMraXREdStwd2ZNYUY2QzR0ZlZkNThnbmdtRldw?=
 =?utf-8?B?VThJUzZPaENiZGQwcTJDMC9HcTRnTFBkZnZLYlVzRFNzTm5uZS9LUWZaNnBr?=
 =?utf-8?B?RkJqWmNwbkZwbjV5M2NaNlNBb0tqTDlhWDl3cEcyWlNCelRHdktjellUdEZt?=
 =?utf-8?B?SjA0Q1E1QzNRQTFzZlFkN1B6Z0F4dkFxaXZScWZNdmN4S3Q0N21PeUcrMVRZ?=
 =?utf-8?B?VXg5Yis5UnhQUzNXMXQ2Vy9OL0E1OWRTSWQwdXhOa3ZGeTNtVVBxOWhYKzEx?=
 =?utf-8?B?aEc5bXJDNk55Z3N3WHNtazNTR2hXNVhXY0xDNmlWbVUwaUhmRnY4MVNTQTk4?=
 =?utf-8?B?VElCS3dVL0tubWtrNkRaVUJjekVDOTJKMVhMTk9pV1krU0UyUFY1SHBBT2Vs?=
 =?utf-8?B?c3ZJa3hHSHczVG9JZEtCak93SVNYRkZpSXBWaFBlUjRzVi9TY3FWcHhFOFRR?=
 =?utf-8?B?aHl3QjM4SGhXNy9LS1BEUTFpTjY1OXZkTXNjaGs2MnhDQ215UmQ4ekZ6OHN1?=
 =?utf-8?B?WUVYbSsvTkZvK2ZBVXNZdG5Id2IraHA4VDJ4SEJKdks0Y0F1N3NwU0Q3ZHY0?=
 =?utf-8?B?bmhGZW44V2kvN203MCtQTWc2Q0x5THVtWFZOTjQ2WmFDSzVxR2hnV1VVVTdM?=
 =?utf-8?B?elBSLytTd1dkeDdObS80NG45d1g1Tk1qd2tZdnh3S1lpZXk5a2UxMWRkeW94?=
 =?utf-8?B?YXZkSWhTTFdnaEVKZEZHWmd1TExxejgvaTV6aVhOa0V6ZmRNZkxjWFNEaHMr?=
 =?utf-8?B?WTRNV2dEUVB5K3Q1cE4xbjdxSFFzcDVVZzRpTkcvQUlIZ3VJa1haVHRWSE1Q?=
 =?utf-8?B?RGd4bThxMnhXeFlDbVFWRU9aZCs2VHMyaDgwN3lwR2VtSkZ6N0Y0STBlSkF5?=
 =?utf-8?B?RHlvZWtMbDlwNzhObHBuUVIyWXlSdDhFcFF5TmQ0eDY2OVJJT2d1eHVoNHkx?=
 =?utf-8?B?bFhiNEFJNmU4OFhIYktLMkxZZkZFWjNrWWk2alRyVDRMMjVDMkhZSDZHdFhQ?=
 =?utf-8?B?aWEraHp6cDhJTFdESTg2eXVsMm9oeWJaTGd5b0xqbGpyYXdSd1NNblhFTjU4?=
 =?utf-8?B?aEQ0cWpmSmNqYUphMFQvVm1IS0k1MEd5NW03aXh5TkxlUFJlZmp5cVVreng0?=
 =?utf-8?B?V1JBMnlXSGNZSFdOT0dCUklEeVlWaTF5VTVlb2JQbXNJL29LMmlQWXc5WEt4?=
 =?utf-8?B?YjRmdnN4UmlRTDZ4UUV2M1plMzBFZlJYMHVkdnJEbGlhU2s3cVNNSEhJMnl6?=
 =?utf-8?B?d0FzbHMrYWthQUV3a2RyOEtWcGhaaGlnVWFEbjVveEJBMUlHS1Z0VTNaQ3FM?=
 =?utf-8?B?T3hNRDd4SCtCbXFyT3k3SVorczhOTDg4ZkYvLytEZVRWaXQ1dXJhZlRIaDJp?=
 =?utf-8?B?U2hUUTV2RE9yVXJUZUZ6NTU2NWpKL0pKK1crMEp1SUZMTXVucGtabEo2Tmxz?=
 =?utf-8?B?TzhaaVRyUFJFYWpGUkJJdjFxWjZFd2ROZW4ydHJCTU9xT3ovWFJEWFpTL0x4?=
 =?utf-8?B?KzZ6eGxuM2NDa3V1TjdzU251aHp3QTBIOHlieVRsWE45YStvYkpKL05GUDhF?=
 =?utf-8?Q?hiev3b2lukvl1EX/yBB3RICnEdTR9RjJ?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c300c786-4542-429d-d870-08da0c9d3345
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Mar 2022 07:17:33.7054
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: HMApyE8r+tyOKRhW0QECeEjuCw5fAYceIi1HEbg5lfyj3T27/i0wqnkOgYZQk1B6VKuEaGl5wzh6PPABDIQuCQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR04MB2993

On 22.03.2022 21:28, Stefano Stabellini wrote:
> From: Stefano Stabellini <stefano.stabellini@xilinx.com>
> 
> The first 32 bytes of zImage are NOPs. When CONFIG_EFI is enabled in the
> kernel, certain versions of Linux will use an UNPREDICATABLE NOP
> encoding, sometimes resulting in an unbootable kernel. Whether the
> resulting kernel is bootable or not depends on the processor. See commit
> a92882a4d270 in the Linux kernel for all the details.

Is this a problem only under Xen or also on bare hardware? In the
latter case I'd be even more inclined to require this issue to be
dealt with in the kernels, rather than working around it by an ABI
change in Xen.

> All kernel releases starting from Linux 4.9 without commit a92882a4d270
> are affected.
> 
> Fortunately there is a simple workaround: setting the "Z" bit in CPSR
> make it so those invalid NOP instructions are never executed. That is
> because the instruction is conditional (not equal). So, on QEMU at
> least, the instruction will end up to be ignored and not generate an
> exception. Setting the "Z" bit makes those kernel versions bootable
> again and it is harmless in the other cases.

I'm afraid such an ABI change being harmless needs to be not just
claimed, but proven. There could certainly be reasons this is safe,
e.g. the same path being taken on bare hardware, and the state of
the bit not being specified there. Yet even in presence of such a
specification it cannot be excluded that non-standard (something
XTF-like, for example) uses might have grown a dependency on the
Xen ABI specification.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 08:36:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 08:36:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293787.499184 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWwTD-000814-3d; Wed, 23 Mar 2022 08:35:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293787.499184; Wed, 23 Mar 2022 08:35:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWwTD-00080x-0M; Wed, 23 Mar 2022 08:35:55 +0000
Received: by outflank-mailman (input) for mailman id 293787;
 Wed, 23 Mar 2022 08:35:53 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=x2G8=UC=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nWwTA-00080r-W2
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 08:35:53 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id 3d004df4-aa84-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 09:35:50 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 46D5DED1;
 Wed, 23 Mar 2022 01:35:47 -0700 (PDT)
Received: from [10.57.20.157] (unknown [10.57.20.157])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 6E88D3F73D;
 Wed, 23 Mar 2022 01:35:45 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3d004df4-aa84-11ec-a405-831a346695d4
Message-ID: <49c9d0b5-308c-59ea-cd7a-4d369156ffed@arm.com>
Date: Wed, 23 Mar 2022 09:35:36 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [PATCH v4 2/2] gitlab-ci: add an ARM32 qemu-based smoke test
Content-Language: en-US
To: Stefano Stabellini <sstabellini@kernel.org>,
 xen-devel@lists.xenproject.org
Cc: cardoe@cardoe.com, wl@xen.org, andrew.cooper3@citrix.com,
 anthony.perard@citrix.com, bertrand.marquis@arm.com,
 Stefano Stabellini <stefano.stabellini@xilinx.com>
References: <alpine.DEB.2.22.394.2203221337230.2910984@ubuntu-linux-20-04-desktop>
 <20220322203854.420940-2-sstabellini@kernel.org>
From: Michal Orzel <michal.orzel@arm.com>
In-Reply-To: <20220322203854.420940-2-sstabellini@kernel.org>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hi Stefano,

On 22.03.2022 21:38, Stefano Stabellini wrote:
> Add a minimal ARM32 smoke test based on qemu-system-arm, as provided by
> the test-artifacts qemu container. The minimal test simply boots Xen
> (built from previous build stages) and Dom0.
> 
> The test needs a working kernel and minimal initrd for dom0. Instead of
> building our own kernel and initrd, which would mean maintaining one or
> two more builting scripts under automation/, we borrow a kernel and
> initrd from distros.
> 
> For the kernel we pick the Debian Bullseye kernel, which has everything
> we need already built-in. However, we cannot use the Debian Bullseye
> initrd because it is 22MB and the large size causes QEMU to core dump.
> 
> Instead, use the tiny busybox-based rootfs provided by Alpine Linux,
> which is really minimal: just 2.5MB. Note that we cannot use the Alpine
> Linux kernel because that doesn't boot on Xen.
> 
> Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
> ---
> Changes in v4:
> - improve commit message
> - use Debian Bullseye kernel
> - use Alpine Linux initrd
> ---
>  automation/gitlab-ci/test.yaml         | 23 ++++++++
>  automation/scripts/qemu-smoke-arm32.sh | 81 ++++++++++++++++++++++++++
>  2 files changed, 104 insertions(+)
>  create mode 100755 automation/scripts/qemu-smoke-arm32.sh
> 
> diff --git a/automation/gitlab-ci/test.yaml b/automation/gitlab-ci/test.yaml
> index ec2a2e1607..42cd725a12 100644
> --- a/automation/gitlab-ci/test.yaml
> +++ b/automation/gitlab-ci/test.yaml
> @@ -95,6 +95,29 @@ qemu-smoke-arm64-gcc:
>      - /^coverity-tested\/.*/
>      - /^stable-.*/
>  
> +qemu-smoke-arm32-gcc:
> +  stage: test
> +  image: registry.gitlab.com/xen-project/xen/${CONTAINER}
> +  variables:
> +    CONTAINER: debian:unstable-arm64v8
> +  script:
> +    - ./automation/scripts/qemu-smoke-arm32.sh 2>&1 | tee qemu-smoke-arm32.log
> +  dependencies:
> +    - debian-unstable-gcc-arm32
> +    - qemu-system-aarch64-6.0.0-arm32-export
> +  artifacts:
> +    paths:
> +      - smoke.serial
> +      - '*.log'
> +    when: always
> +  tags:
> +    - arm64
> +  except:
> +    - master
> +    - smoke
> +    - /^coverity-tested\/.*/
> +    - /^stable-.*/
> +
>  qemu-smoke-x86-64-gcc:
>    stage: test
>    image: registry.gitlab.com/xen-project/xen/${CONTAINER}
> diff --git a/automation/scripts/qemu-smoke-arm32.sh b/automation/scripts/qemu-smoke-arm32.sh
> new file mode 100755
> index 0000000000..d554de7939
> --- /dev/null
> +++ b/automation/scripts/qemu-smoke-arm32.sh
> @@ -0,0 +1,81 @@
> +#!/bin/bash
> +
> +set -ex
> +
> +export DEBIAN_FRONTENT=noninteractive
> +apt-get -qy update
> +apt-get -qy install --no-install-recommends device-tree-compiler \
> +                                            curl \
> +                                            cpio
> +
> +cd binaries
> +# Use the kernel from Debian
> +curl --fail --silent --show-error --location --output vmlinuz http://http.us.debian.org/debian/dists/bullseye/main/installer-armhf/current/images/netboot/vmlinuz
> +# Use a tiny initrd based on busybox from Alpine Linux
> +curl --fail --silent --show-error --location --output initrd.tar.gz https://dl-cdn.alpinelinux.org/alpine/v3.15/releases/armhf/alpine-minirootfs-3.15.1-armhf.tar.gz
> +
> +mkdir rootfs
> +cd rootfs
> +tar xvzf ../initrd.tar.gz
> +find . | cpio -H newc -o | gzip > ../initrd.gz
> +cd ..
> +
> +kernel=`stat -L --printf="%s" vmlinuz`
> +initrd=`stat -L --printf="%s" initrd.gz`
> +
> +# For Xen, we need a couple of more node. Dump the DT from QEMU and add them
> +# XXX QEMU looks for "efi-virtio.rom" even if it is unneeded
> +curl -fsSLO https://github.com/qemu/qemu/raw/v5.2.0/pc-bios/efi-virtio.rom
> +./qemu-system-arm \
> +   -machine virt-6.0 \
Can't we just use "virt" as an alias to the latest virt machine available?

> +   -machine virtualization=true \
> +   -smp 4 \
> +   -m 1024 \
> +   -serial stdio \
> +   -monitor none \
> +   -display none \
> +   -machine dumpdtb=virt.dtb
> +
> +dtc -I dtb -O dts virt.dtb > virt.dts
> +
> +cat >> virt.dts << EOF
> +/ {
> +	chosen {
> +		#address-cells = <0x2>;
> +		#size-cells = <0x2>;
> +		stdout-path = "/pl011@9000000";
> +        xen,xen-bootargs = "console=dtuart dtuart=/pl011@9000000 dom0_mem=512M bootscrub=0";
> +		xen,dom0-bootargs = "console=tty0 console=hvc0 earlyprintk clk_ignore_unused root=/dev/ram0 rdinit=/bin/sh init=/bin/sh";
As you are using initrd, rdinit is the correct option.
Specyfing both rdinit and init does not make a lot of sense as the kernel won't reach init= parsing.

> +		dom0 {
> +			compatible = "xen,linux-zimage", "xen,multiboot-module";
> +			reg = <0x0 0x1000000 0x0 $kernel>;
> +		};
> +        dom0-ramdisk {
> +			compatible = "xen,linux-initrd", "xen,multiboot-module";
> +			reg = <0x0 0x3200000 0x0 $initrd>;
> +		};
> +	};
> +};
> +EOF
> +dtc -I dts -O dtb virt.dts > virt.dtb
> +
> +rm -f smoke.serial
> +set +e
> +timeout -k 1 240 \
> +./qemu-system-arm \
> +   -machine virt-6.0 \
> +   -machine virtualization=true \
> +   -smp 4 \
> +   -m 1024 \
> +   -serial stdio \
> +   -monitor none \
> +   -display none \
> +   -dtb virt.dtb \
> +   -no-reboot \
> +   -kernel ./xen \
> +   -device loader,file=./vmlinuz,addr=0x1000000 \
> +   -device loader,file=./initrd.gz,addr=0x3200000 |& tee smoke.serial
> +
> +set -e
> +(grep -q "^/ #" smoke.serial) || exit 1
> +exit 0

Cheers,
Michal


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 08:41:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 08:41:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293790.499195 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWwYT-00011L-OT; Wed, 23 Mar 2022 08:41:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293790.499195; Wed, 23 Mar 2022 08:41:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWwYT-00011E-KY; Wed, 23 Mar 2022 08:41:21 +0000
Received: by outflank-mailman (input) for mailman id 293790;
 Wed, 23 Mar 2022 08:41:20 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWwYS-000114-LQ; Wed, 23 Mar 2022 08:41:20 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWwYS-0000Ty-JY; Wed, 23 Mar 2022 08:41:20 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWwYS-00025T-5J; Wed, 23 Mar 2022 08:41:20 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWwYS-0005fa-4c; Wed, 23 Mar 2022 08:41:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=PPw3F004bzPqdM5Ivjxoy5+o0olypZVZ/FjUJyYCKoU=; b=XAJiEZcP7hxztMlxCnT+YfK0aM
	ur4c3fAVfchp+wSTfRdDkhAptDs4RNWet9X407ho36kjzj4FheSr9S9qKU9ntBH1Wn4K0xgmpFNvc
	W4EQW4bFkU5WjnAn9xjV/1zy7cc2R8u9iJRC25b17ZlUnT0/sRCkPLPiRX0zpGow2i0o=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168791-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168791: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=15ef89d2a1a7b93845a6b09c2ee8e1979f6eb30b
X-Osstest-Versions-That:
    qemuu=5791de9d48743c7fde0c0d9b065f260056968e99
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 23 Mar 2022 08:41:20 +0000

flight 168791 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168791/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168784
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168784
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168784
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168784
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168784
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168784
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168784
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168784
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass

version targeted for testing:
 qemuu                15ef89d2a1a7b93845a6b09c2ee8e1979f6eb30b
baseline version:
 qemuu                5791de9d48743c7fde0c0d9b065f260056968e99

Last test of basis   168784  2022-03-22 15:38:21 Z    0 days
Testing same since   168791  2022-03-22 23:09:00 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Alex Bennée <alex.bennee@linaro.org>
  Cornelia Huck <cohuck@redhat.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Hanna Reitz <hreitz@redhat.com>
  John Snow <jsnow@redhat.com>
  Kai Zhang <laokz@foxmail.com>
  laokz <laokz@foxmail.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Peter Maydell <peter.maydell@linaro.org>
  Philippe Mathieu-Daudé <f4bug@amsat.org>
  Philippe Mathieu-Daudé <philmd@redhat.com>
  Richard Henderson <richard.henderson@linaro.org>
  Stefano Garzarella <sgarzare@redhat.com>
  Thomas Huth <thuth@redhat.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   5791de9d48..15ef89d2a1  15ef89d2a1a7b93845a6b09c2ee8e1979f6eb30b -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 08:41:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 08:41:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293793.499206 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWwYh-0001L6-1z; Wed, 23 Mar 2022 08:41:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293793.499206; Wed, 23 Mar 2022 08:41:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWwYg-0001Kx-UI; Wed, 23 Mar 2022 08:41:34 +0000
Received: by outflank-mailman (input) for mailman id 293793;
 Wed, 23 Mar 2022 08:41:34 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=7r0c=UC=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nWwYf-0001KM-VV
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 08:41:34 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on2062f.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::62f])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 09a12a94-aa85-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 09:41:32 +0100 (CET)
Received: from AM6P191CA0058.EURP191.PROD.OUTLOOK.COM (2603:10a6:209:7f::35)
 by DB6PR0802MB2327.eurprd08.prod.outlook.com (2603:10a6:4:89::13) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.18; Wed, 23 Mar
 2022 08:41:28 +0000
Received: from AM5EUR03FT009.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:7f:cafe::b8) by AM6P191CA0058.outlook.office365.com
 (2603:10a6:209:7f::35) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.18 via Frontend
 Transport; Wed, 23 Mar 2022 08:41:28 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT009.mail.protection.outlook.com (10.152.16.110) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Wed, 23 Mar 2022 08:41:27 +0000
Received: ("Tessian outbound 826a6d8e58c3:v113");
 Wed, 23 Mar 2022 08:41:27 +0000
Received: from 64ed93d38324.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 E7A9CDC5-AAA0-4945-AB05-5AEAF317BD11.1; 
 Wed, 23 Mar 2022 08:41:20 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 64ed93d38324.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Wed, 23 Mar 2022 08:41:20 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by DB7PR08MB3195.eurprd08.prod.outlook.com (2603:10a6:5:1e::29) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Wed, 23 Mar
 2022 08:41:17 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5081.023; Wed, 23 Mar 2022
 08:41:17 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 09a12a94-aa85-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=dhTacJy/EhL/i7CwFmI02Q+n+Zg/gcViBEPvDF7NeqE=;
 b=CSx4x02CU2lNPmM/hzcoEREYVqMQ5an3NziQ/wu0gXNlaahhDKaffuOJ7iJ13InemdafvGQCJcU7MJ23H4UFBQ9VBHE6Iy72/xEHXwFK8cYqyuFG7E1/iipZDG9JqxMjdL/df9/fzyy1sT2cRcx/LMRcAvApUy/lQBQ3aLLSPgw=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 9161aa2d07b4c833
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=J/a0xf/01i8cIrj9vV61AqmHyvIzTyCs0RGmHaMKJ2j9fEequKVUCDVJUH3mIE9TPqrS6t0wAnVkYnG9LknWGbmcd0brV/W8DmPpr054GTVHMxN7LU4WRJ3UFMea5g19y1VJakr9Ehk9taF86/ny06VWFEQ8UQ7tVr0tXDirCjUXzrBIzKOJ7CsHdRHeyUZcmSqy10ZxbS0+49YABJSFTsc3n9tqbE9vG+o1BxRRrtdtl76X6ozH8C1D1jrA0G48B/cluvk32GLy8YQ8XGK5e2JtYGzhJnB/W0DC2hJbsIEJempVXbemII5gU+/dvjCWb2qjHun99Ed9vobzJBMHdw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=dhTacJy/EhL/i7CwFmI02Q+n+Zg/gcViBEPvDF7NeqE=;
 b=XJx1ADnDtdNvE0eLHL7KHCJ1nhtk2wn55RgOO9s3IHwvjuFWYmwsujZocX4kwrYINdshanwyF+x4v8quhUuDpD4qefh48sizhDRhtwvVIbzy5J8Uw1SISa8wy20XZLG7F3LJgircDdT2z8YK8D/CthUD67mU5Q/YNlCawGw7dJRK3d2pOEBkZve+NM/4o/drz1+l3DYEAkPqkcRT8jwQjGkMWbMsf/EPao3Gv6uWM48CneRfcqlIWFOxJTQ/y5kQw222f3/dbCcqDedAk7kUtyHF+TA74J5GzvU5k57Q8xtnJlGhfuuZlyWQHXTGfmhycVWabVIY3QE76AYiBFOB1w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=dhTacJy/EhL/i7CwFmI02Q+n+Zg/gcViBEPvDF7NeqE=;
 b=CSx4x02CU2lNPmM/hzcoEREYVqMQ5an3NziQ/wu0gXNlaahhDKaffuOJ7iJ13InemdafvGQCJcU7MJ23H4UFBQ9VBHE6Iy72/xEHXwFK8cYqyuFG7E1/iipZDG9JqxMjdL/df9/fzyy1sT2cRcx/LMRcAvApUy/lQBQ3aLLSPgw=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Andrew
 Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
	Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>
Subject: Re: [PATCH] build: provide and export ADDR2LINE
Thread-Topic: [PATCH] build: provide and export ADDR2LINE
Thread-Index: AQHYPgDW0ExT1npxb0S4HRybiy8x26zMp4MA
Date: Wed, 23 Mar 2022 08:41:17 +0000
Message-ID: <460B770C-B754-41E2-8126-F59D32263B51@arm.com>
References: <45de6ac3-7701-0b37-8ada-b46f4237448a@suse.com>
In-Reply-To: <45de6ac3-7701-0b37-8ada-b46f4237448a@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 3aeb7222-18ad-46c2-2fc5-08da0ca8ebda
x-ms-traffictypediagnostic:
	DB7PR08MB3195:EE_|AM5EUR03FT009:EE_|DB6PR0802MB2327:EE_
X-Microsoft-Antispam-PRVS:
	<DB6PR0802MB2327D56249D84A87A4E140B9E4189@DB6PR0802MB2327.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(6486002)(2616005)(33656002)(8676002)(66946007)(76116006)(64756008)(66476007)(4326008)(66556008)(5660300002)(66446008)(71200400001)(38070700005)(8936002)(91956017)(6916009)(38100700002)(86362001)(2906002)(316002)(122000001)(53546011)(6506007)(6512007)(508600001)(186003)(26005)(36756003)(54906003)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <538A2E91122877459B6EDDA1BF09938C@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR08MB3195
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT009.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	fe3dcb5d-4ada-4e53-feeb-08da0ca8e5ae
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(54906003)(6862004)(33656002)(4326008)(8676002)(36860700001)(70206006)(70586007)(316002)(81166007)(2906002)(356005)(26005)(186003)(6486002)(82310400004)(6512007)(508600001)(47076005)(86362001)(8936002)(40460700003)(5660300002)(53546011)(36756003)(336012)(2616005)(6506007);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Mar 2022 08:41:27.6705
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 3aeb7222-18ad-46c2-2fc5-08da0ca8ebda
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT009.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0802MB2327



> On 22 Mar 2022, at 15:23, Jan Beulich <jbeulich@suse.com> wrote:
>=20
> Now that x86'es check-endbr.sh script uses it, also make it available
> consistently with other tool chain components.
>=20
> Signed-off-by: Jan Beulich <jbeulich@suse.com>

Reviewed-by: Luca Fancellu <luca.fancellu@arm.com>

Cheers,
Luca

>=20
> --- a/config/StdGNU.mk
> +++ b/config/StdGNU.mk
> @@ -10,6 +10,7 @@ endif
> LD_LTO     =3D $(CROSS_COMPILE)ld
> endif
> CPP        =3D $(CC) -E
> +ADDR2LINE  =3D $(CROSS_COMPILE)addr2line
> AR         =3D $(CROSS_COMPILE)ar
> RANLIB     =3D $(CROSS_COMPILE)ranlib
> NM         =3D $(CROSS_COMPILE)nm
> --- a/config/SunOS.mk
> +++ b/config/SunOS.mk
> @@ -3,6 +3,7 @@ LD         =3D $(CROSS_COMPILE)gld
> CC         =3D $(CROSS_COMPILE)gcc
> CPP        =3D $(CROSS_COMPILE)gcc -E
> CXX        =3D $(CROSS_COMPILE)g++
> +ADDR2LINE  =3D $(CROSS_COMPILE)gaddr2line
> AR         =3D $(CROSS_COMPILE)gar
> RANLIB     =3D $(CROSS_COMPILE)granlib
> NM         =3D $(CROSS_COMPILE)gnm
> --- a/xen/Makefile
> +++ b/xen/Makefile
> @@ -55,7 +55,7 @@ export TARGET_ARCH     :=3D $(shell echo $
> # Allow someone to change their config file
> export KCONFIG_CONFIG ?=3D .config
>=20
> -export CC CXX LD NM OBJCOPY OBJDUMP
> +export CC CXX LD NM OBJCOPY OBJDUMP ADDR2LINE
>=20
> export TARGET :=3D xen
>=20
>=20
>=20



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 08:44:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 08:44:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293801.499217 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWwb5-0002Ff-J9; Wed, 23 Mar 2022 08:44:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293801.499217; Wed, 23 Mar 2022 08:44:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWwb5-0002FY-G1; Wed, 23 Mar 2022 08:44:03 +0000
Received: by outflank-mailman (input) for mailman id 293801;
 Wed, 23 Mar 2022 08:44:01 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=E8iV=UC=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nWwb3-0002FQ-OM
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 08:44:01 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 62b3fb40-aa85-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 09:44:00 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 3202D210F0;
 Wed, 23 Mar 2022 08:44:00 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 062BB13B9C;
 Wed, 23 Mar 2022 08:44:00 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id x1NFANDdOmJMCwAAMHmgww
 (envelope-from <jgross@suse.com>); Wed, 23 Mar 2022 08:44:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 62b3fb40-aa85-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648025040; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type;
	bh=SFX4Zoc29vno8WtrDxS378hqAu13iL7PccJBITKfW+A=;
	b=UbsCt0bAHvdOFce6hCoHi3zSw/ivJ1BlWWwau8FuM6OnC7rrOZpZEIn5gCzxevivv3iZD6
	G+jRWBN108zjfPxBe2B6uWKhKqGBMSNDBocvorygv5ZPj1Vk/nKHeNltZZme/sHlmX92UI
	jHBOMRL1Atm6U9e+/02SXkttuaAibsI=
Message-ID: <8e8ec786-74db-157b-a290-b1537941e91d@suse.com>
Date: Wed, 23 Mar 2022 09:43:59 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: linux-mm@kvack.org, lkml <linux-kernel@vger.kernel.org>,
 Andrew Morton <akpm@linux-foundation.org>
Cc: Michal Hocko <MHocko@suse.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
From: Juergen Gross <jgross@suse.com>
Subject: blocking vs. non-blocking mmu notifiers
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------6gu2rAP0rMGxHnUVHNkFRX0n"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------6gu2rAP0rMGxHnUVHNkFRX0n
Content-Type: multipart/mixed; boundary="------------Kp5yg0KWZJOCf70tncEp4F3j";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: linux-mm@kvack.org, lkml <linux-kernel@vger.kernel.org>,
 Andrew Morton <akpm@linux-foundation.org>
Cc: Michal Hocko <MHocko@suse.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Message-ID: <8e8ec786-74db-157b-a290-b1537941e91d@suse.com>
Subject: blocking vs. non-blocking mmu notifiers

--------------Kp5yg0KWZJOCf70tncEp4F3j
Content-Type: multipart/mixed; boundary="------------iNzNUtyJKMKTuwO3VSZsfBov"

--------------iNzNUtyJKMKTuwO3VSZsfBov
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------iNzNUtyJKMKTuwO3VSZsfBov
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------iNzNUtyJKMKTuwO3VSZsfBov--

--------------Kp5yg0KWZJOCf70tncEp4F3j--

--------------6gu2rAP0rMGxHnUVHNkFRX0n
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmI63c8FAwAAAAAACgkQsN6d1ii/Ey/H
jQgAnIe6RGnGr9CEBIB2sNTuiQfgh/jnskk5fZSxyWI4Jw8SEweK+TWY1nALwAxygPGv3xkOXMy1
En1hVbstiL51+7w+H3Bo3HXowYVEdWCzB94PfQX35RAG3I9HWYhvUoITXN5apNY+dEfyHd/FUDkB
005o55t9LsPb8e2JiQVRbttZNaSaNm6dzthiViwEC5kk/PJPmLwqtJGCWrG8lqHBR0G+QdUJb3+g
8TY6XuUe6p6bw2OP6Z6MPBB+6XAXfnUqc3hTy8zX3yb/p0hGoT6cypS413ZcUxOsBxpaGvLoIx9B
xD3SmCIsmLhlg3jbEtRFLd7T6EpCXeB7LSYm3J4kuQ==
=yUkc
-----END PGP SIGNATURE-----

--------------6gu2rAP0rMGxHnUVHNkFRX0n--


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 08:53:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 08:53:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293805.499228 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWwjn-0003jo-FC; Wed, 23 Mar 2022 08:53:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293805.499228; Wed, 23 Mar 2022 08:53:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWwjn-0003jh-BM; Wed, 23 Mar 2022 08:53:03 +0000
Received: by outflank-mailman (input) for mailman id 293805;
 Wed, 23 Mar 2022 08:53:01 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=AJbR=UC=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nWwjl-0003jb-LH
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 08:53:01 +0000
Received: from EUR01-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur01on0614.outbound.protection.outlook.com
 [2a01:111:f400:fe02::614])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a473e852-aa86-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 09:53:00 +0100 (CET)
Received: from AM6P194CA0081.EURP194.PROD.OUTLOOK.COM (2603:10a6:209:8f::22)
 by DB6PR0802MB2312.eurprd08.prod.outlook.com (2603:10a6:4:84::16) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Wed, 23 Mar
 2022 08:52:56 +0000
Received: from AM5EUR03FT057.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:8f:cafe::74) by AM6P194CA0081.outlook.office365.com
 (2603:10a6:209:8f::22) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.23 via Frontend
 Transport; Wed, 23 Mar 2022 08:52:56 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT057.mail.protection.outlook.com (10.152.17.44) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Wed, 23 Mar 2022 08:52:55 +0000
Received: ("Tessian outbound 341d209a0e52:v113");
 Wed, 23 Mar 2022 08:52:55 +0000
Received: from 6a3e2b95147a.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 BC2B770C-005B-4081-8CC6-7F666EB0538E.1; 
 Wed, 23 Mar 2022 08:52:48 +0000
Received: from EUR02-VE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 6a3e2b95147a.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Wed, 23 Mar 2022 08:52:48 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com (2603:10a6:20b:85::25)
 by AM6PR08MB3480.eurprd08.prod.outlook.com (2603:10a6:20b:44::29)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.16; Wed, 23 Mar
 2022 08:52:46 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62]) by AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62%3]) with mapi id 15.20.5081.023; Wed, 23 Mar 2022
 08:52:46 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a473e852-aa86-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=xXarKYHdSL31NB+F5CBvHag9FBY1nPHolFRLLy8Dysc=;
 b=Rsrxv+yLKR/EjyrVriLm2duLTifbZvBpZLiPtrZ4nmJubFJMcX4yosBWN3Mh/qtk2j0nnnx7IeiCTwnujAOmTSeRaPAi1mB6+iwClXzQqIur5i+coAwItQgP4PpiDuKtqLeWLWgyllrffu7oiQ3QGyNMqQw0JKo/meG5dncyciI=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: e0e7dc2cb73ae8f8
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=WJxdFsOAhnSnErgoRIzdtGAv2bfp2nG/w1oLZx+TkUTUDdhgjhQgYw6DqL1QxCU7Uim392+Erzwu67VPitaxlhhzBqC+ia5PrrfGeJu0hsMWqin3Wq+NbFQgfqpFylOLqK12mKzRNvBT2+3FSz1IqKppziTZUVD/7iLetWQjZ9VPuODDDEeTAYHJ+ast6FPmigBRJTJHebvrxo1mPxsmtsqcRAmnnSTR+XyyXywW+EfrJycqvQrkk7bAdPTgKHh6RA1kwHcljmXlW6w4XkIcPqWIQhRkBCu9wjxUDl7LmlP0gbS01EWaP9r77PdVZlGNM2/TiGybsF8G1qC90BX/Jw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=xXarKYHdSL31NB+F5CBvHag9FBY1nPHolFRLLy8Dysc=;
 b=BesLdlaBPyIKjXlbq4ogZA5i2QfDMk9/YBtkiGuBb/K1amR5zHm4kkY7L1DaM1Vuybwb9Im32ptFVNrncxZ3Z5Wdw9pPaBFIA1Ru5o6nM9I1JsoGEJrPqjd+BOB/lvqi6srXPbQG8rvgFB2MUYnqgk+vpPVVzE7znYK5ZyqJPUBHw6RPHIDHSfLkr8iNBGQq1+aas7NNtKuYE+HW+FtMEMOjgesikoUK5Ca/ahipNHZUNGbQpOlX2cRCZstFnxMzYOlpI0k6EDu3KiYmE2auE/pzPjx4HGZB1s/wO870eh/ftTKc1+RrR+pJeamOEjOV17P7D59mvl1UWyJz1gbi+A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=xXarKYHdSL31NB+F5CBvHag9FBY1nPHolFRLLy8Dysc=;
 b=Rsrxv+yLKR/EjyrVriLm2duLTifbZvBpZLiPtrZ4nmJubFJMcX4yosBWN3Mh/qtk2j0nnnx7IeiCTwnujAOmTSeRaPAi1mB6+iwClXzQqIur5i+coAwItQgP4PpiDuKtqLeWLWgyllrffu7oiQ3QGyNMqQw0JKo/meG5dncyciI=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Stefano Stabellini <sstabellini@kernel.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	"julien@xen.org" <julien@xen.org>, "Volodymyr_Babchuk@epam.com"
	<Volodymyr_Babchuk@epam.com>, Stefano Stabellini
	<stefano.stabellini@xilinx.com>
Subject: Re: [PATCH v2] xen/arm: set CPSR Z bit when creating aarch32 guests
Thread-Topic: [PATCH v2] xen/arm: set CPSR Z bit when creating aarch32 guests
Thread-Index: AQHYPittA0qvCk1VqUeT+Og+1zrr1azMqmOA
Date: Wed, 23 Mar 2022 08:52:46 +0000
Message-ID: <E2220831-D72C-423C-A33F-453C8E851B8D@arm.com>
References: <20220322202825.418232-1-sstabellini@kernel.org>
In-Reply-To: <20220322202825.418232-1-sstabellini@kernel.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 2356547e-45b2-407e-8b12-08da0caa85b2
x-ms-traffictypediagnostic:
	AM6PR08MB3480:EE_|AM5EUR03FT057:EE_|DB6PR0802MB2312:EE_
X-Microsoft-Antispam-PRVS:
	<DB6PR0802MB2312F282CD85006C65F519879D189@DB6PR0802MB2312.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR08MB3784.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(8936002)(38100700002)(64756008)(36756003)(66446008)(91956017)(76116006)(66556008)(66476007)(66946007)(5660300002)(122000001)(4326008)(8676002)(86362001)(6486002)(83380400001)(6512007)(71200400001)(316002)(508600001)(53546011)(2906002)(6506007)(6916009)(2616005)(54906003)(33656002)(186003)(38070700005)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <0B3DFAA05177E948BC113C298F6FEAC1@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB3480
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT057.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	eba7f846-e329-46d7-7ef5-08da0caa8096
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(36756003)(6506007)(5660300002)(53546011)(6512007)(26005)(2906002)(2616005)(186003)(107886003)(336012)(356005)(33656002)(86362001)(81166007)(36860700001)(47076005)(82310400004)(6862004)(54906003)(4326008)(70586007)(316002)(8676002)(70206006)(6486002)(40460700003)(8936002)(508600001)(83380400001);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Mar 2022 08:52:55.2765
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 2356547e-45b2-407e-8b12-08da0caa85b2
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT057.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0802MB2312

Hi Stefano,

> On 22 Mar 2022, at 21:28, Stefano Stabellini <sstabellini@kernel.org> wro=
te:
>=20
> From: Stefano Stabellini <stefano.stabellini@xilinx.com>
>=20
> The first 32 bytes of zImage are NOPs. When CONFIG_EFI is enabled in the
> kernel, certain versions of Linux will use an UNPREDICATABLE NOP
> encoding, sometimes resulting in an unbootable kernel. Whether the
> resulting kernel is bootable or not depends on the processor. See commit
> a92882a4d270 in the Linux kernel for all the details.
>=20
> All kernel releases starting from Linux 4.9 without commit a92882a4d270
> are affected.

Can you confirm if those kernels are also affected when started natively ?

>=20
> Fortunately there is a simple workaround: setting the "Z" bit in CPSR
> make it so those invalid NOP instructions are never executed. That is
> because the instruction is conditional (not equal). So, on QEMU at
> least, the instruction will end up to be ignored and not generate an
> exception. Setting the "Z" bit makes those kernel versions bootable
> again and it is harmless in the other cases.

I agree with Jan here. This will never be set or should not be expected
to be set by anyone when started.
It feels to me that we are introducing an ack for a temporary issue in
Linux which will makes us derive from the behaviour that could be
expected on native hardware.

Could you give more details on how blocking this is ?=20
Is the kernel update with the fix available on any of the affected distribu=
tions ?

Depending on the answers I think we could for example have a config around
this to flag it as workaround for a specific guest issue so that this is on=
ly
activated when needed.

Cheers
Bertrand

>=20
> Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
> ---
> Changes in v2:
> - improve commit message
> - add in-code comment
> - move PSR_Z to the beginning
> ---
> xen/include/public/arch-arm.h | 8 +++++++-
> 1 file changed, 7 insertions(+), 1 deletion(-)
>=20
> diff --git a/xen/include/public/arch-arm.h b/xen/include/public/arch-arm.=
h
> index 94b31511dd..81cee95f14 100644
> --- a/xen/include/public/arch-arm.h
> +++ b/xen/include/public/arch-arm.h
> @@ -361,6 +361,7 @@ typedef uint64_t xen_callback_t;
> #define PSR_DBG_MASK    (1<<9)        /* arm64: Debug Exception mask */
> #define PSR_IT_MASK     (0x0600fc00)  /* Thumb If-Then Mask */
> #define PSR_JAZELLE     (1<<24)       /* Jazelle Mode */
> +#define PSR_Z           (1<<30)       /* Zero condition flag */
>=20
> /* 32 bit modes */
> #define PSR_MODE_USR 0x10
> @@ -383,7 +384,12 @@ typedef uint64_t xen_callback_t;
> #define PSR_MODE_EL1t 0x04
> #define PSR_MODE_EL0t 0x00
>=20
> -#define PSR_GUEST32_INIT  (PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MO=
DE_SVC)
> +/*
> + * We set PSR_Z to be able to boot Linux kernel versions with an invalid
> + * encoding of the first 8 NOP instructions. See commit a92882a4d270 in
> + * Linux.
> + */
> +#define PSR_GUEST32_INIT  (PSR_Z|PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|=
PSR_MODE_SVC)
> #define PSR_GUEST64_INIT (PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MODE=
_EL1h)
>=20
> #define SCTLR_GUEST_INIT    xen_mk_ullong(0x00c50078)
> --=20
> 2.25.1
>=20



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 08:54:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 08:54:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293808.499239 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWwlO-0004JF-Ro; Wed, 23 Mar 2022 08:54:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293808.499239; Wed, 23 Mar 2022 08:54:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWwlO-0004J8-Nb; Wed, 23 Mar 2022 08:54:42 +0000
Received: by outflank-mailman (input) for mailman id 293808;
 Wed, 23 Mar 2022 08:54:41 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=1OhW=UC=citrix.com=prvs=074292745=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nWwlM-0004Iy-U2
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 08:54:41 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id de4f5241-aa86-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 09:54:38 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: de4f5241-aa86-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648025678;
  h=date:from:to:cc:subject:message-id:mime-version;
  bh=uSiIysUHQ/FlnN7e0m+xsuHGfdbYH2H5a+XYXy4RmOI=;
  b=WtMmbpJLFQhoUt2pMNjCBZNOPANjDIeLnaD7otY0UBXwRWacxgt3GUNA
   SlcdHWd+4K3pSambV4VGksKPRR1GjjgzY0CK++rH2pykloKdOkV5Kwto6
   s5jQZtro7ee7/72XeeXOEWAsLRt/WTrV0mpMKuUCDBt6mtxfAqRy8oTsB
   c=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 69315058
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:++1YtqCZ1WO3FhVW/zfjw5YqxClBgxIJ4kV8jS/XYbTApD8j0GECn
 zAXDG2Bb//fNmukLYwnaoy1o0hXvJ/Uz4JqQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vj2NY06TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhy+
 dN3icbtET04M7/+m/lNQkZnFHpxaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguw5K8bmJsUHs2xIxjDFF/c2B5vERs0m4PcGjWxp25gTTZ4yY
 eIeRSN0fi2aTCZ3N0pGFtEFjPeViHnwJmgwRFW9+vNsvjm7IBZK+KfpGMrYfJqNX8o9tmSyq
 3/C/m/5KgoHL9HZwj2Amlq8i+mKkS7lVYY6ELyj6uUskFCV3nYUChAdSR28u/bRt6Klc4sBc
 QpOoHNo9PVsshzwJjXgY/GmiH21uCQgAYcIKfw3+jOO1/rFvDmeXWdRG1atd+canMMxQDUr0
 HqAkNXoGSFjvdWpdJ6NyluHhWjsYHZIdAfucQdBFFJYuIe7/OnfmzqVFr5e/LiJYsoZ8N0a6
 xSDt2AAiroalqbnPI3rrAmc01pASnUkJzPZBzk7vEr4tmuVh6b/PuREDGQ3C94Zfe51qXHb4
 BA5dzC2trxmMH13qASDQf8WAJai7OufPTvXjDZHRsd9qGXyoC/zINwLv1mSwXuF1O5eJFcFh
 2eJ5GtsCGJ7ZiP2PcebnarvYyjV8UQQPYu8Da2FBja/SpNwaBWG7ElTib24hAjQfLwXufhnY
 /+zKJ/0ZV5DUPgP5GfmFo81jO5wrghjlDy7eHwO50n+uZKEemWvQKsIWHPXKLhRAFWs+16Or
 b6y9qKiln1ibQEJSnKOoNBJcgxScyRT6FKfg5U/S9Nv6zFOQQkJI/TQ3akga8pimaFUnf3P5
 XazRglTz1+XuJENAV7ihqxLAF83YatCkA==
IronPort-HdrOrdr: A9a23:EWZj6q0pgw37fbhXs7kjdwqjBUByeYIsimQD101hICG9Lfb3qy
 n+ppsmPEHP5Ar5OEtBpTiBUJPwJ0800aQFm7X5XI3SJzUO3VHIEGgM1/qG/9SNIVybygc/79
 YeT0EdMqyJMbESt6+Ti2PUYrVQouVvmJrY+ds2pE0dND2CBZsQiDuQXW2gYzBLrUR9dOwEPa
 vZwvACiyureHwRYMj+Ln4ZX9Lbr9mOsJ79exYJCzMu9QHL1FqTmfbHOind+i1bfyJEwL8k/2
 SAuwvl5p+7u/X+7hPHzWfc47lfhdOk4NpeA86njNQTN1zX+0+VTbUkf4fHkCE+oemp5lpvuN
 7Qoy04N8A20H/VdnHdm2qZ5yDQlBIVr1Pyw16RhnXu5ebjQighNsZHjYVFNjPE9ksJprhHoe
 929lPck6ASIQLLnSz76dSNfQptjFCIrX0rlvNWp2BDULEZdKRaoeUkjQlo+a87bW3HAb0cYa
 dT5Jm23ocWTbraVQGTgoBX+q3hYpxpdS32AnTruaSuokprdT5CvgglLfck7wY9HaIGOud5Dt
 v/Q9RVfZF1P7srhPFGdZA8qfXeMB2/ffuLChPRHWja
X-IronPort-AV: E=Sophos;i="5.90,203,1643691600"; 
   d="scan'208";a="69315058"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=WT/NBUSwSWYdLRd3t8kDkAMNr+VxCmOgwJHwgIJY3raHfTOown4HMnGg3vvjd3RM+pUDjBVeD60SPg6Cuq8rif7bYI1R+ct3jIPBCBjVSLd/XLtKUUpxAAuLzlVC52SfjHQFbEisnEk6bBrZXVZpDZGt4SyQqf5bItv9srjYlSLNgBheyh7BnmmMafZW+h6gC7eQyclZ/N/QsVFZJWuVP3M4acbGIMOALkkKNfsBhzwO7wspTjzImCFdMICHk2v/sCBZ++vhZDccEoBU086lDJ6t0S9EjFLTcUcvTfDgPyxm6ztXMweaLOOptYdGFEUneAot77mRMeb7kom+FD9bbA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=UC4N03bVeZ/t5KHvR5dUDqN/ifs2FoNNcar7rJss1pI=;
 b=bzgh4nJ21IjyYekCPXWqkSzlTfyq3ffQIC9vrpW3dj5h1shHTmF9EiAe8Vsf9AXOzqaHKVJELE6hjw2A/voIPYEf+zJzUAqPNT1gCYeVXdw+J4lBASjOoe3/ppEo32Ug4uSJyX71W1/Etmon496G55JpSfG8+owBVpWYfnuFG2CaPSsnvqAjzSWCHEydhWt0hQVQk8KCkyhjRULenL10Pll4KTFawmUZ1F0k9EVTg8yJSd02ZMDky1oaiNpyQJzM345b3afw745mihuZqR4GfzvrpWgV8+XbiaDcSJ8ftBNVMqtQVMM93p24EhPvxB8iapBfm4bERgUfmMMTBsUafw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=UC4N03bVeZ/t5KHvR5dUDqN/ifs2FoNNcar7rJss1pI=;
 b=jUYh+gJ/ZaYkavwITqz0ghENJZauMZ4swF30+mVxjES4vEoslZF2DFb3vu6nf6eAeEKu2vj4Dl03t1SkxQhBnTIqJ/AAlTZrpcN0y14XeGiW6WecesDpgfgRJxmw/IVa+GRzq+Uz/HzptW+olh4ZCx6z3lw4MUBORPWguYBn718=
Date: Wed, 23 Mar 2022 09:54:24 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Jan Beulich <JBeulich@suse.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Questions about Cx and Px state uploading from dom0
Message-ID: <YjrgQOYbsaYOV08H@Air-de-Roger>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
X-ClientProxiedBy: MR1P264CA0073.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:501:3f::6) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 08812037-0975-4503-f3c7-08da0caabed9
X-MS-TrafficTypeDiagnostic: SJ0PR03MB6550:EE_
X-Microsoft-Antispam-PRVS: <SJ0PR03MB65506B43EA3F73E2F1F7EAE68F189@SJ0PR03MB6550.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: DnnyEfv8Dt3Gw/TDj7UjOt3WsLi7njDaehjmRoAlEJVVadR6ScxhxCjvmLQQPqXgMnAkJKLjE/6hu4u/HIvg2oURlJShCVaTnrJf5fzlxHH8jHh0rfvjIZiHm3WznrEweoXt6M/fecHoRk1AiJJ14eUyRDqfHYD4iWXBtLlfyt7B/7/oIQxo8S0wu0nofsgejRNdKRC8Zxdlbou9Hx+jBG8XiZKqTJJEOr29DnM6QJRV6CFSS5psy9m5tvHaUlVKgCjC1gH+sBda0olEBeSpZibRfoBcrxCbPRLbd/WQJERqJYa2iZRQC+KkOHKTuXRGefDLCrCWfNuaDrSvi+RVPyXZFnVGvYeXLRH14I8xp3f5UCgeFkQTEgq94ffJd+/5Mve8CNn/1XsUpCujOWJ0nCTAVzYSPmWyiKGJbLc35IknVydmTk3i1dzL1BNjjIJGgjgIupF+F9uVxFAUE1durxFJGD+9LPeeH87al3LWAXU+436LGCUn5wkb/wwaOO5IoM5rM7h/KFqB1MBW8AsSywkzkn3KdVj4YGdrUY4f/Q1h9FL4p98E9Kinuk4NsIe9hfpU5fbOp4BCFYH36rI2rA3Ke9pX5NVt3hcetSXHlUkEdJXr0RvNpMXjI21PlcatBY34gG4+my2CreTa9qe+hQ==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(186003)(26005)(508600001)(6486002)(66556008)(8936002)(5660300002)(6666004)(9686003)(85182001)(6512007)(6506007)(83380400001)(38100700002)(54906003)(6916009)(316002)(82960400001)(4326008)(8676002)(33716001)(2906002)(66946007)(66476007)(86362001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?MU1UVVQ1aDF0Q2djWXAyNWIyUU4vd3EveU9xcGE2ZElsZlZiOGRDVzc1SWs2?=
 =?utf-8?B?TEd0OWpkaTVwRUgzekk5MWdxZGwzSlZ1QTFQbCsyUnNuZmpYUHlzS0R6VytF?=
 =?utf-8?B?U2hVYWtJSWtOUmtkQXNlOVZCRzQ0TUJNTS9JVGppamlCR0psZ1R2eEw4TDV4?=
 =?utf-8?B?K2d3cXJPaXZENlN0L091eG1JT29TRm10cUc0cUMxaXB5akVJRE9LT0J0Q0NR?=
 =?utf-8?B?MVJsUDVjWno1QVdNUkJJUTZhZTA1NWhzL1ZxaldtZW94MlJxMGFaTy81NmRz?=
 =?utf-8?B?bjN6TUdRZjZxK2hYTGpiMFlPZDNiSWs1cFJQVHBldmJtc05JY2JiMkZuVjBa?=
 =?utf-8?B?elVocFIxV0YrNUR2VXZIZlRmMHBsbGtLUG9WOTVpeUVDRjJlZE1NOVZnYUUz?=
 =?utf-8?B?aWEvOGRHeE5WdVlZTFBBZ3VJYzlNb2lZZHRCUzNZelBUYkVwcjdSdDFudkxp?=
 =?utf-8?B?QVc2SlB2VjBVR2xwY284YmFoQktrNFQyWEkzY1VEUmQ0NUZQczV5bEJGazVS?=
 =?utf-8?B?ejQzWldyamo0aG5RVnlESEowckJUNHY4VDF4TEZ1OUpNNjFLdmVtdHJIT3lp?=
 =?utf-8?B?SE9tZ0FFTFFPZllaRGJMRVQ2ejB4eDdSNW85NGlxZkxxUW9nWFpVZTRkVXZZ?=
 =?utf-8?B?QW1TT2tMc1NocThyQ2tQUGgwMzRlY0RoaEh6ZmFGREhOTFdYS1lPVmxuNFVU?=
 =?utf-8?B?YlVyRHB3S0hsMFY5NFVxT1FEQkVQZUIzbzJaTk5vVjhhNzROVmtTejB6Y1Nt?=
 =?utf-8?B?ZWp3YzFPdVc4U1RvUllqUHVTbGNXck90OXZDcWhERDZjQW12S2ZCMkxyVjdp?=
 =?utf-8?B?UU1IWHNybUFJMytsRllDclNxVkQwYTlGY1NsWlFkK2pRa1RPVDRPNWo2S3RL?=
 =?utf-8?B?WTJrbDA5STdMQjdnZ2Y3ZGIvc093VSt4OHdrL2YrUXJhYldXVTRRdzg4c1ky?=
 =?utf-8?B?bGp6Ni9ZVkJCZ1dkaEEzUktpaVpIWTN4bjZheGdhTWNzdGgyL1JXZjM1cWdr?=
 =?utf-8?B?ZEx3c2tobS92endzWjZCd1QwQlJQeEZjbW5CQ1hJY0pCVVdKQWk4RWE3bXFR?=
 =?utf-8?B?WmtDN2xBWHROQmwrN1VjbmRIUERWWWFZbll3U0htaXJYREozMGovN0djS3lC?=
 =?utf-8?B?dnFmaTM1Sjd3TjVycjdrSHp0YUFuSU9Rb2tWMEtUZVZwbENGY0VXRFRjekxh?=
 =?utf-8?B?Z0ZPeUJBYjgxNW9MR3h1UjZlKzV3bTIzOTU5Z3VFUW9VZzJjOHlxVzJTUW5Q?=
 =?utf-8?B?alM4WXIxVThQZlBWT0hLOXlGei9JbXlab2tTcUZMZ2NDK3QxWElqUU54Tjdy?=
 =?utf-8?B?dG82Nmd1OHdxdTYxemIwUTRrMG5aYXNVTmtPeDBnQmRLT0gzTmVLNkN0TStt?=
 =?utf-8?B?Mk9IMGM2RmovQTFkSC9mV2lMT1c1MzIwT2M4KzNiR09mZCszNjd5Mzh1blEr?=
 =?utf-8?B?YUtPOHRSM05VMFhKQlVzV1dJZUlBUEtPR0ttOUt4MXBRbFY1dmpiU2V3MVNN?=
 =?utf-8?B?ZFlVdGRYOXpGQnRSSCtQTGtiYmpSeFY1Qno3S3BLTHBmNmluVWtqT3IycG5k?=
 =?utf-8?B?Y1VtMjBGMytXZEJZSEtXRnMrQXI0ZFY5eVRvNSs3L21XVUNPQWlVMjZzSlds?=
 =?utf-8?B?c3ZMclEzTmpHclk4eS9XNEJBUlE2N1ZBbG45eFJTWngzMVFrQ3VFZ3BJUHBO?=
 =?utf-8?B?K21qWWpvbmh0d0M3ZlRhUCt4MVpkTmYzUHlFYmhZcFhrbUVMTWRVeGk0eVBa?=
 =?utf-8?B?eFRZTUhEbFVFZHpKa05BWmE1NENrSzNRMWNKcFhSeVRMbWJWZGJzTisrOXBR?=
 =?utf-8?B?bVBqbWFYVkN3SXhDV0JlamxoSmpnbS9BTzFkVXA1VGVCYmM5M2NDc2JKK0E2?=
 =?utf-8?B?NVg3ZkxEM1VZMUsxcmVBbmNuN3dpbTdyYVN0M2t3emNmSGlRcEY2UGc5RTJs?=
 =?utf-8?Q?t8eJbzfRSEpsbKjbSDjli/5VxVXnBJLk?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 08812037-0975-4503-f3c7-08da0caabed9
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Mar 2022 08:54:31.3368
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: FtZXyx3AEAzeaGky/1xplwO7EE6uAaBCvmntkUmM7M/hl3yKKkyZyidjBveLC0kcqj+WJ5GDi0BQTVdHzvOXGg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR03MB6550
X-OriginatorOrg: citrix.com

Hello,

I was looking at implementing ACPI Cx and Px state uploading from
FreeBSD dom0, as my main test box is considerably slower without Xen
knowing about the Px states.  That has raised a couple of questions.

1. How to figure out what features to report available by OSPM when
calling the _PDC (or _OSC) ACPI method.  I'm confused by the usage of
this from Linux: it seems to be used to detect mwait support in
xen_check_mwait but not when calling _PDC (ie: in
acpi_processor_set_pdc).  I'm also not sure what the hypercall expects
the caller to provide.  Should buf[2] be set to all the possible
features supported by the OS and Xen will trim those as required?

2. When uploading Px states, what's the meaning of the shared_type
field in xen_processor_performance?  I've looked at the usage of the
field by Xen, and first of all it seems to be a layering violation
because the values set in the field (CPUFREQ_SHARED_TYPE_*) are not
exposed as part of the public interface.  This all works for Linux
because the same values are used by Xen and the Linux kernel.
Secondly, this is not part of the data fetched from ACPI AFAICT, so
I'm unsure how the value should be calculated.  I also wonder whether
this couldn't be done by Xen itself from the uploaded Px data (but
without knowing exactly how the value should be calculated it's hard
to tell).

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 08:58:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 08:58:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293812.499250 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWwp9-000545-FJ; Wed, 23 Mar 2022 08:58:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293812.499250; Wed, 23 Mar 2022 08:58:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWwp9-00053y-C7; Wed, 23 Mar 2022 08:58:35 +0000
Received: by outflank-mailman (input) for mailman id 293812;
 Wed, 23 Mar 2022 08:58:34 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=E8iV=UC=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nWwp8-00053s-Gj
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 08:58:34 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6ad67aac-aa87-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 09:58:33 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id EB68D1F387;
 Wed, 23 Mar 2022 08:58:32 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id D3A1813B9C;
 Wed, 23 Mar 2022 08:58:32 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id bV6AMjjhOmIGFgAAMHmgww
 (envelope-from <jgross@suse.com>); Wed, 23 Mar 2022 08:58:32 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6ad67aac-aa87-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648025912; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:  content-transfer-encoding:content-transfer-encoding;
	bh=j2/DQyPxlFHrTEMlyx5he23M+6rpoQfgdZ40JUEg7ns=;
	b=rg1Z6A0QkLqawW+h1KWIJTDDy8NVcDv2tutAdvMpLs2ZHRdBjFx/xc75mTzmXrWV433D7n
	PwH6Iin2rfmztAC7uAOe+QoN+x4Am3yZnylY+Ru8qHDQsjbYnAOtXotifFYR58jvIQcdv6
	YBvkmQIkLw2BJLTGeWVOxOSe+U+Gaas=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>
Subject: [PATCH v2] include/public: add command result definitions to vscsiif.h
Date: Wed, 23 Mar 2022 09:58:31 +0100
Message-Id: <20220323085831.27057-1-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

The result field of struct vscsiif_response is lacking a detailed
definition. Today the Linux kernel internal scsi definitions are being
used, which is not a sane interface for a PV device driver.

Add macros to change that by using today's values in the XEN namespace.

Signed-off-by: Juergen Gross <jgross@suse.com>
---
V2:
- put macro parameters in parentheses (Jan Beulich)
- correct XEN_VSCSIIF_RSLT_HOST() (Jan Beulich)
- more verbose result defines (Jan Beulich)
- add reset result defines (Jan Beulich)
---
 xen/include/public/io/vscsiif.h | 51 +++++++++++++++++++++++++++++++++
 1 file changed, 51 insertions(+)

diff --git a/xen/include/public/io/vscsiif.h b/xen/include/public/io/vscsiif.h
index c9ceb1884d..8553b17cc6 100644
--- a/xen/include/public/io/vscsiif.h
+++ b/xen/include/public/io/vscsiif.h
@@ -315,6 +315,57 @@ struct vscsiif_response {
 };
 typedef struct vscsiif_response vscsiif_response_t;
 
+/* SCSI I/O status from vscsiif_response->rslt */
+#define XEN_VSCSIIF_RSLT_STATUS(x)  ((x) & 0x00ff)
+
+/* Host I/O status from vscsiif_response->rslt */
+#define XEN_VSCSIIF_RSLT_HOST(x)    (((x) & 0x00ff0000) >> 16)
+#define XEN_VSCSIIF_RSLT_HOST_OK                   0
+/* Couldn't connect before timeout */
+#define XEN_VSCSIIF_RSLT_HOST_NO_CONNECT           1
+/* Bus busy through timeout */
+#define XEN_VSCSIIF_RSLT_HOST_BUS_BUSY             2
+/* Timed out for other reason */
+#define XEN_VSCSIIF_RSLT_HOST_TIME_OUT             3
+/* Bad target */
+#define XEN_VSCSIIF_RSLT_HOST_BAD_TARGET           4
+/* Abort for some other reason */
+#define XEN_VSCSIIF_RSLT_HOST_ABORT                5
+/* Parity error */
+#define XEN_VSCSIIF_RSLT_HOST_PARITY               6
+/* Internal error */
+#define XEN_VSCSIIF_RSLT_HOST_ERROR                7
+/* Reset by somebody */
+#define XEN_VSCSIIF_RSLT_HOST_RESET                8
+/* Unexpected interrupt */
+#define XEN_VSCSIIF_RSLT_HOST_BAD_INTR             9
+/* Force command past mid-layer */
+#define XEN_VSCSIIF_RSLT_HOST_PASSTHROUGH         10
+/* Retry requested */
+#define XEN_VSCSIIF_RSLT_HOST_SOFT_ERROR          11
+/* Hidden retry requested */
+#define XEN_VSCSIIF_RSLT_HOST_IMM_RETRY           12
+/* Requeue command requested */
+#define XEN_VSCSIIF_RSLT_HOST_REQUEUE             13
+/* Transport error disrupted I/O */
+#define XEN_VSCSIIF_RSLT_HOST_TRANSPORT_DISRUPTED 14
+/* Transport class fastfailed */
+#define XEN_VSCSIIF_RSLT_HOST_TRANSPORT_FAILFAST  15
+/* Permanent target failure */
+#define XEN_VSCSIIF_RSLT_HOST_TARGET_FAILURE      16
+/* Permanent nexus failure on path */
+#define XEN_VSCSIIF_RSLT_HOST_NEXUS_FAILURE       17
+/* Space allocation on device failed */
+#define XEN_VSCSIIF_RSLT_HOST_ALLOC_FAILURE       18
+/* Medium error */
+#define XEN_VSCSIIF_RSLT_HOST_MEDIUM_ERROR        19
+/* Transport marginal errors */
+#define XEN_VSCSIIF_RSLT_HOST_TRANSPORT_MARGINAL  20
+
+/* Result values of reset operations */
+#define XEN_VSCSIIF_RSLT_RESET_SUCCESS  0x2002
+#define XEN_VSCSIIF_RSLT_RESET_FAILED   0x2003
+
 DEFINE_RING_TYPES(vscsiif, struct vscsiif_request, struct vscsiif_response);
 
 
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 09:23:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 09:23:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293816.499261 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWxCo-0008Hc-FD; Wed, 23 Mar 2022 09:23:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293816.499261; Wed, 23 Mar 2022 09:23:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWxCo-0008HV-CE; Wed, 23 Mar 2022 09:23:02 +0000
Received: by outflank-mailman (input) for mailman id 293816;
 Wed, 23 Mar 2022 09:23:01 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWxCm-0008HL-UV; Wed, 23 Mar 2022 09:23:00 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWxCm-0001Ct-S7; Wed, 23 Mar 2022 09:23:00 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nWxCm-0004dW-CC; Wed, 23 Mar 2022 09:23:00 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nWxCm-0003JA-Bk; Wed, 23 Mar 2022 09:23:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=LjpP5uwUWpL2ZnyowAqg/u8/XnTDxdkyvWzjSKJ5EJU=; b=2KuUkM112Qwb9oDMAXCPXGz5RZ
	0Km/joc8sEtFFi5hH/N9sW5cYMMpNFLdlEn7gv6FvxkBL6P9J/DRLp+Vop5DlgI6IPucY40jc+BhE
	eY3tZ0PoL8svmMhX23E+e3OYCRYzM3Ei9Ri3SrTpM0eQlFVRUm6N9Pcl7Z2RytB4rTXc=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168796-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168796: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=42d7c3c4dae259ee72d8c834c6477597fccb4775
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 23 Mar 2022 09:23:00 +0000

flight 168796 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168796/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              42d7c3c4dae259ee72d8c834c6477597fccb4775
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  621 days
Failing since        151818  2020-07-11 04:18:52 Z  620 days  602 attempts
Testing same since   168796  2022-03-23 04:22:16 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Claudio Fontana <cfontana@suse.de>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Haonan Wang <hnwanga1@gmail.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Martin Pitt <mpitt@debian.org>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 101944 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 09:29:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 09:29:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293823.499272 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWxJD-0000YS-8Y; Wed, 23 Mar 2022 09:29:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293823.499272; Wed, 23 Mar 2022 09:29:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWxJD-0000YL-3j; Wed, 23 Mar 2022 09:29:39 +0000
Received: by outflank-mailman (input) for mailman id 293823;
 Wed, 23 Mar 2022 09:29:37 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=jiN7=UC=gmail.com=konishi.ryusuke@srs-se1.protection.inumbo.net>)
 id 1nWxJB-0000YF-3F
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 09:29:37 +0000
Received: from mail-yw1-x1132.google.com (mail-yw1-x1132.google.com
 [2607:f8b0:4864:20::1132])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id bf63a3af-aa8b-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 10:29:33 +0100 (CET)
Received: by mail-yw1-x1132.google.com with SMTP id
 00721157ae682-2e612af95e3so9923257b3.9
 for <xen-devel@lists.xenproject.org>; Wed, 23 Mar 2022 02:29:36 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: bf63a3af-aa8b-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=RTdntLwWP7UcoqdxIbtO2gBEwkCYFZ/lgUjrNqmrzxY=;
        b=T61hvAd7cJiSJIGmZk3tv26qPToF8HN5U/lQ/m08EAvWa2SmtE6To2nDTNf374lnhT
         GPKcxTCuuPtJXa5gmEw+gX2f1CnhO+VLeiTWr2XmuaL6dVuTtvBLqYJtSXHPPzFlHs5d
         Ri/6Ne7YUODQm8T3VMLlOYE4KOjFASZnLeZ8IqhaE9iuhu7q9KNKFvXczv/h7Sgwfpuk
         P+Ovst/9RkkokTnzdrENQ2gJQlJX7TsW9sSFizNo9ppyZqVHj+5ghhwpu4GTzkQKNuQt
         kjsxCrJT+nOf4qUF+msiy+R5Tj/zMWQPy3RSPf7HIGYLtyZhwIakdPpQAIpFcLhlFiZB
         DguA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=RTdntLwWP7UcoqdxIbtO2gBEwkCYFZ/lgUjrNqmrzxY=;
        b=fHSl2MMQP/xuZKZa5cywYsVViVgtq24NzIXq9LrCzQbeKWmPYRG1vTartNRbz3f0vO
         dbiA2jM+cgBhK4YXV9FQiLvBG0rLEE7IiaEdPXbVcQe5fb+9wroJaNzeWs2bXOoT3KpJ
         5Ln8E3z34ba1tYRFD4ePCFUn6hyI3VCtW/0cz0JWHLzYmaU7w5GZzMAQOzcpg1D8H1nK
         Z99Knrxt9sxUv/FQbQ9z00+TYTtqz1wKwKp7UzVOStX0Xzn0MjXlqsW6J2LLujiVLGUK
         tdW9ZV/I4BAnd0NLBA18pDQPjy86YnzsI/qoJrA6EaYBSdlx3AXvkGYV9YZOEbP64e7l
         C+PA==
X-Gm-Message-State: AOAM530gr0hyqXXPZH/zYVCxEuurYIm/ACSowtQT0t6T2nvr8REb01HB
	HDnx7NIp63weXFyWXaDW4U/voZjVDrnxsMjetLQ=
X-Google-Smtp-Source: ABdhPJxsStnlEm2/XrSzPGOBMOTw5PlnKDFjWTj/c9kKouVbhUo8itraPrOCZBSFmdgor+QYZSqQ1SYIOcVDz/aGNlE=
X-Received: by 2002:a0d:c284:0:b0:2dc:37ec:f02c with SMTP id
 e126-20020a0dc284000000b002dc37ecf02cmr33701891ywd.503.1648027774854; Wed, 23
 Mar 2022 02:29:34 -0700 (PDT)
MIME-Version: 1.0
References: <20220124091107.642561-1-hch@lst.de> <20220124091107.642561-2-hch@lst.de>
 <20220322211915.GA2413063@roeck-us.net> <CAKFNMonRd5QQMzLoH3T=M=C=2Q_j9d86EYzZeY4DU2HQAE3E8w@mail.gmail.com>
 <20220323064248.GA24874@lst.de>
In-Reply-To: <20220323064248.GA24874@lst.de>
From: Ryusuke Konishi <konishi.ryusuke@gmail.com>
Date: Wed, 23 Mar 2022 18:29:23 +0900
Message-ID: <CAKFNMonANUN7_99oVBOq=iCJpt6jQs3qhu1ez5SwMm2g7sZUyw@mail.gmail.com>
Subject: Re: [dm-devel] [PATCH 01/19] fs: remove mpage_alloc
To: Christoph Hellwig <hch@lst.de>, Guenter Roeck <linux@roeck-us.net>
Cc: Jens Axboe <axboe@kernel.dk>, linux-block@vger.kernel.org, linux-nfs@vger.kernel.org, 
	linux-nilfs <linux-nilfs@vger.kernel.org>, Mike Snitzer <snitzer@redhat.com>, 
	Philipp Reisner <philipp.reisner@linbit.com>, 
	Konstantin Komarov <almaz.alexandrovich@paragon-software.com>, 
	=?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.co>, 
	device-mapper development <dm-devel@redhat.com>, "Md . Haris Iqbal" <haris.iqbal@ionos.com>, 
	Lars Ellenberg <lars.ellenberg@linbit.com>, linux-fsdevel@vger.kernel.org, 
	xen-devel@lists.xenproject.org, Andrew Morton <akpm@linux-foundation.org>, 
	ntfs3@lists.linux.dev, Jack Wang <jinpu.wang@ionos.com>, 
	Pavel Begunkov <asml.silence@gmail.com>, drbd-dev@lists.linbit.com
Content-Type: text/plain; charset="UTF-8"

On Wed, Mar 23, 2022 at 3:42 PM Christoph Hellwig <hch@lst.de> wrote:
>
> On Wed, Mar 23, 2022 at 06:38:22AM +0900, Ryusuke Konishi wrote:
> > This looks because the mask of GFP_KERNEL is removed along with
> > the removal of mpage_alloc().
> >
>
> > The default value of the gfp flag is set to GFP_HIGHUSER_MOVABLE by
> > inode_init_always().
> > So, __GFP_HIGHMEM hits the gfp warning at bio_alloc() that
> > do_mpage_readpage() calls.
>
> Yeah.  Let's try this to match the iomap code:
>
> diff --git a/fs/mpage.c b/fs/mpage.c
> index 9ed1e58e8d70b..d465883edf719 100644
> --- a/fs/mpage.c
> +++ b/fs/mpage.c
> @@ -148,13 +148,11 @@ static struct bio *do_mpage_readpage(struct mpage_readpage_args *args)
>         int op = REQ_OP_READ;
>         unsigned nblocks;
>         unsigned relative_block;
> -       gfp_t gfp;
> +       gfp_t gfp = mapping_gfp_constraint(page->mapping, GFP_KERNEL);
>
>         if (args->is_readahead) {
>                 op |= REQ_RAHEAD;
> -               gfp = readahead_gfp_mask(page->mapping);
> -       } else {
> -               gfp = mapping_gfp_constraint(page->mapping, GFP_KERNEL);
> +               gfp |= __GFP_NORETRY | __GFP_NOWARN;
>         }
>
>         if (page_has_buffers(page))

I did not test for iomap, but this patch has fixed the same regression on the
latest mainline at least for ext2, exfat, vfat and nilfs2.  Thanks!

Ryusuke Konishi


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 09:40:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 09:40:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293827.499283 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWxTW-0002mo-7N; Wed, 23 Mar 2022 09:40:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293827.499283; Wed, 23 Mar 2022 09:40:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWxTW-0002mh-4M; Wed, 23 Mar 2022 09:40:18 +0000
Received: by outflank-mailman (input) for mailman id 293827;
 Wed, 23 Mar 2022 09:40:16 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nWxTU-0002mb-Ec
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 09:40:16 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWxTU-0001VB-1h; Wed, 23 Mar 2022 09:40:16 +0000
Received: from 54-240-197-230.amazon.com ([54.240.197.230]
 helo=[192.168.10.149]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nWxTT-0005Dx-Rn; Wed, 23 Mar 2022 09:40:15 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=hZfzxzfTvi8WbzQT7d+PpAeHT5X/MJOWNDoiVmU2UJ4=; b=TNrVYTAS2vod0IYIiB7WPPiNgx
	g3xRDo1cbxQ7sENwOb3wz1870rFAMZDwHNz1uXVr5niwELcpzvFw2XRhoRAWGzzgwFG8kJ475ZUeC
	edDitRB/8zWEtP0qFvhz3jAG3PGgPC7DRCwu45mNmeWzgSiML9MomW60retZap09IH2I=;
Message-ID: <93bdb9e5-f054-704e-9302-3c2e17d92c60@xen.org>
Date: Wed, 23 Mar 2022 09:40:13 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v4 10/11] xen/arm: call hypercall handlers via generated
 macro
To: Juergen Gross <jgross@suse.com>, xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Michal Orzel <michal.orzel@arm.com>
References: <20220310073420.15622-1-jgross@suse.com>
 <20220310073420.15622-11-jgross@suse.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220310073420.15622-11-jgross@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 10/03/2022 07:34, Juergen Gross wrote:
> @@ -1520,7 +1460,10 @@ static bool check_multicall_32bit_clean(struct multicall_entry *multi)
>   {
>       int i;
>   
> -    for ( i = 0; i < arm_hypercall_table[multi->op].nr_args; i++ )
> +    if ( multi->op >= ARRAY_SIZE(hypercall_args) )
> +        return true;

NIT: This change reads odd to me. So I would prefer...

> +
> +    for ( i = 0; i < hypercall_args[multi->op]; i++ )
>       {
>           if ( unlikely(multi->args[i] & 0xffffffff00000000ULL) )
>           {
> @@ -1537,28 +1480,13 @@ static bool check_multicall_32bit_clean(struct multicall_entry *multi)
>   enum mc_disposition arch_do_multicall_call(struct mc_state *state)
>   {
>       struct multicall_entry *multi = &state->call;
> -    arm_hypercall_fn_t call = NULL;
> -
> -    if ( multi->op >= ARRAY_SIZE(arm_hypercall_table) )

... if we keep this checks. So we don't return true in 
check_multicall_32bit_clean() when the hypercall doesn't exist.

The code still do the right thing, so either way:

Reviewed-by: Julien Grall <jgrall@amazon.com>

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 09:45:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 09:45:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293831.499293 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWxYc-0003Tv-0G; Wed, 23 Mar 2022 09:45:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293831.499293; Wed, 23 Mar 2022 09:45:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWxYb-0003To-TX; Wed, 23 Mar 2022 09:45:33 +0000
Received: by outflank-mailman (input) for mailman id 293831;
 Wed, 23 Mar 2022 09:45:32 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=AzRF=UC=suse.com=mhocko@srs-se1.protection.inumbo.net>)
 id 1nWxYa-0003Ti-C9
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 09:45:32 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f90aaa13-aa8d-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 10:45:28 +0100 (CET)
Received: from relay2.suse.de (relay2.suse.de [149.44.160.134])
 by smtp-out1.suse.de (Postfix) with ESMTP id E7097210E9;
 Wed, 23 Mar 2022 09:45:30 +0000 (UTC)
Received: from suse.cz (unknown [10.100.201.86])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by relay2.suse.de (Postfix) with ESMTPS id B07EEA3B87;
 Wed, 23 Mar 2022 09:45:30 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f90aaa13-aa8d-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648028730; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=ti9JhYfeam/u5xAhSegF8ekFHob7Y2T4kBftHw/UI6E=;
	b=ZutDmkZ9jygSsfyoj9ryiYIFOO5vuws/tB9rZTEzQXN6q6jF//zFiuk5pg29dYNBhpZ05E
	4BFp85b6z4ne3eA0k3ftibKWvgD6k3Z9U8B08m9vDKD9J3Un2oWzIPwGW8RtVgqhd1cey/
	6UjWkFDk/APunOgEG7BzHnIiHXT47Nc=
Date: Wed, 23 Mar 2022 10:45:30 +0100
From: Michal Hocko <mhocko@suse.com>
To: Juergen Gross <jgross@suse.com>
Cc: linux-mm@kvack.org, lkml <linux-kernel@vger.kernel.org>,
	Andrew Morton <akpm@linux-foundation.org>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	Jerome Glisse <jglisse@redhat.com>, Jason Gunthorpe <jgg@ziepe.ca>
Subject: Re: blocking vs. non-blocking mmu notifiers
Message-ID: <YjrsOnxaPYc3rbdj@dhcp22.suse.cz>
References: <8e8ec786-74db-157b-a290-b1537941e91d@suse.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <8e8ec786-74db-157b-a290-b1537941e91d@suse.com>

[Let me add more people to the CC list - I am not really sure who is the
 most familiar with all the tricks that mmu notifiers might do]

On Wed 23-03-22 09:43:59, Juergen Gross wrote:
> Hi,
> 
> during analysis of a customer's problem on a 4.12 based kernel
> (deadlock due to a blocking mmu notifier in a Xen driver) I came
> across upstream patches 93065ac753e4 ("mm, oom: distinguish
> blockable mode for mmu notifiers") et al.
> 
> The backtrace of the blocked tasks was typically something like:
> 
>  #0 [ffffc9004222f228] __schedule at ffffffff817223e2
>  #1 [ffffc9004222f2b8] schedule at ffffffff81722a02
>  #2 [ffffc9004222f2c8] schedule_preempt_disabled at ffffffff81722d0a
>  #3 [ffffc9004222f2d0] __mutex_lock at ffffffff81724104
>  #4 [ffffc9004222f360] mn_invl_range_start at ffffffffc01fd398 [xen_gntdev]
>  #5 [ffffc9004222f398] __mmu_notifier_invalidate_page at ffffffff8123375a
>  #6 [ffffc9004222f3c0] try_to_unmap_one at ffffffff812112cb
>  #7 [ffffc9004222f478] rmap_walk_file at ffffffff812105cd
>  #8 [ffffc9004222f4d0] try_to_unmap at ffffffff81212450
>  #9 [ffffc9004222f508] shrink_page_list at ffffffff811e0755
> #10 [ffffc9004222f5c8] shrink_inactive_list at ffffffff811e13cf
> #11 [ffffc9004222f6a8] shrink_node_memcg at ffffffff811e241f
> #12 [ffffc9004222f790] shrink_node at ffffffff811e29c5
> #13 [ffffc9004222f808] do_try_to_free_pages at ffffffff811e2ee1
> #14 [ffffc9004222f868] try_to_free_pages at ffffffff811e3248
> #15 [ffffc9004222f8e8] __alloc_pages_slowpath at ffffffff81262c37
> #16 [ffffc9004222f9f0] __alloc_pages_nodemask at ffffffff8121afc1
> #17 [ffffc9004222fa48] alloc_pages_current at ffffffff8122f350
> #18 [ffffc9004222fa78] __get_free_pages at ffffffff8121685a
> #19 [ffffc9004222fa80] __pollwait at ffffffff8127e795
> #20 [ffffc9004222faa8] evtchn_poll at ffffffffc00e802b [xen_evtchn]
> #21 [ffffc9004222fab8] do_sys_poll at ffffffff8127f953
> #22 [ffffc9004222fec8] sys_ppoll at ffffffff81280478
> #23 [ffffc9004222ff30] do_syscall_64 at ffffffff81004954
> #24 [ffffc9004222ff50] entry_SYSCALL_64_after_hwframe at ffffffff818000b6
> 
> It was found that the notifier of the Xen gntdev driver was using a
> mutex resulting in the deadlock.
> 
> Michal Hocko suggested that backporting above mentioned patch might
> help, as the mmu notifier call is happening in atomic context.
> 
> Looking into that I was wondering whether try_to_unmap_one() shouldn't
> call mmu_notifier_invalidate_range_start_nonblock() instead of
> mmu_notifier_invalidate_range_start() if this is true. Otherwise I
> can't see how this deadlock could be avoided.

Just to be more explicit. The current upstream code calls
mmu_notifier_invalidate_range while the page table locks are held.
Are there any notifiers which could sleep in those? In other words
should we use the nonblock start/stop in try_to_unmap?

> Any thoughts?
> 
> 
> Juergen






-- 
Michal Hocko
SUSE Labs


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 10:19:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 10:19:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293834.499305 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWy5F-0006xB-KE; Wed, 23 Mar 2022 10:19:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293834.499305; Wed, 23 Mar 2022 10:19:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWy5F-0006x4-H4; Wed, 23 Mar 2022 10:19:17 +0000
Received: by outflank-mailman (input) for mailman id 293834;
 Wed, 23 Mar 2022 10:19:16 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=1OhW=UC=citrix.com=prvs=074292745=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nWy5E-0006wy-3O
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 10:19:16 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 9910c979-aa92-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 11:18:36 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9910c979-aa92-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648030754;
  h=from:to:cc:subject:date:message-id:
   content-transfer-encoding:mime-version;
  bh=J+2qYgWy1cfJZWdZ0y91pZlXZzMukWuCoZHcIDKK7wo=;
  b=Z75dez8PFC8LnVWwy2aCLBjRkwgMqZ8Fzx+9mGc23I+NgoJ4JZV7oUqs
   qiNBQ5w4EVeb8e6pph0jM/bSIdOFYS8qUdhIYH5ivpgw51ddbWf95AnNv
   vw1BP9M9vXTgg/TjMveRLwKXaIgdysJ0MyPL8oxKuNmip4qpq8vakaHww
   8=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66861813
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:Ps3jh6wuaBc5iLgeGUR6t+cIxirEfRIJ4+MujC+fZmUNrF6WrkUCn
 WEXDWuFb6rcYmGkKY1wb9m+pB5UvZGDytRrHlBr/yAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz24LhX2thh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 Npl5ayeexUCMJz2haccA0cAP31kepBL9+qSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DJoQQt2sm1TjEJf0nXYrCU+PB4towMDIY2J4eQ6+OP
 pFxhTxHPQvyWj1GBg0sC7Eewb6TgmfgI35fgQfAzUYwyzeKl1EguFT3C/LOYcCDT8hRmkeep
 0rF8n7/DxVcM8aQoRKa9lq8i+mJmjn0MKoQCbm5+/hCkFCVgGsJB3U+RVa95PW0lEO6c9ZeM
 FAPvDojq7Ao806mRcW7WAe3yFaGtBMBX9tbE8Uh9RqAjKHT5m6k6nMsF2AbLoZ87YlvGGJsh
 gThc87V6SJH4I27e2C2+IausHCzaXZNATMYIhIJQl5QizX8m70bghXKR9dlNae6iNzpBD39q
 wy3QDgCa6Y71pBSifjilbzTq3f1/8WSEFZpjunCdjj9hj6VcrJJcGBBBbLzyf9bZLiUQVCa1
 JTvs5jPtbteZX1hecHkfQnsIF1Lz6vdWNE/qQQ2d3XEy9hL0yfyFWy3yGsiTHqFyu5eJVfUj
 Lb74Gu9HqN7MnqwdrNQaImsEcksxqWIPY27Cq+FMYEfMsUtL1DvEMRSiai4hT2FfK8Ey/xXB
 HtmWZz0USZy5VpPklJauNvxIZd0n3tjlAs/tLjwzgi90Kr2WZJmYextDbd6VchgtPnsiFyMq
 753bpLWoz0CALyWSnSGquY7cAFVRUXX8Lir8qS7gMbYeVE4cIzgYteMqY4cl3tNxP0EyL2Xo
 injBie1CjPX3BX6FOlDUVg6AJvHVpdjt3MreysqOFejwX84ZoizqqwYcvMKkXMProSPEdYco
 yE5Rvi9
IronPort-HdrOrdr: A9a23:BC1mTKHM7YVltOMOpLqFHpHXdLJyesId70hD6qkvc3Nom52j+/
 xGws536faVslcssHFJo6HlBEDmewKnyXcV2/hrAV7GZmfbUQSTXedfBOfZsl/d8k7Fh5FgPM
 VbAtFD4bTLZDAQ56aKgzVQe+xQvOVvm5rY4ts2oU0dKD2DPMpbnnpE40ugYztLbTgDIaB8OI
 uX58JBqTblUXMLbv6jDn1Ae+TYvdXEmL/vfBZDXnccmUGzpALtzIS/PwmT3x8YXT8K6bA+8V
 Ldmwi8wqm4qfm0xjLVymeWxZVLn9nKzMdFGaW3+4EoAwSprjztSJVqWrWEsjxwiOaz6GwymN
 2JmBskN9Qb0QKlQkiF5T/WnyXw2jcn7HHvjXWCh2H4nMD/TDUmT+JcmINwaHLimgcdleA59J
 gO83OStpJRAx+Ftj/6/cL0WxZjkVfxiWY+kNQUk2dUXeIlGfVsRLQkjQxo+ao7bWzHANhNKp
 guMCic3occTbqiVQGUgoE1q+bcHkjaHX+9Mzo/U4KuontrdUtCvjolLfwk7wk9Ha0GOul5Dp
 z/Q9xVfZF1P7srhPFGdZA8qfXeMB2/ffuLChPRHWja
X-IronPort-AV: E=Sophos;i="5.90,203,1643691600"; 
   d="scan'208";a="66861813"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=mvdm1WnPXEQ8h/lrNI0+zpb+eG+++sufdB4WH34SRNcIVExONevA3h9BzIh8fIw4OLVjpUS997agx4cnqEKNEsyeR2vKRagydWTNIFYtFYfFxlKUs+c1nisHkgsiS+p/FgXnWHd8nFOwwFEwqvNVp04b0wy2fzpkHMVEKp22UTyksa7umGhzXyq0bzIiXrv9j34zKrnocm9sQ/vm/qmzzrbUV93xxIxsW33+5kIFK7qIIw4gZpjShxwns+UW3SAT8R7kTtgn5VALywYGPQPSK795n09SudyEPJD/w5q0bzwHEns7qrvWY6o1CoQRxzEEs73X6QkMDdylCCmDs5HD9w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=gitEDanTViT9PRj7GWXdJyjsJSlJnsYelX5GUdssemg=;
 b=fFbe35BQ/XsyAuFUtLRmFC0M19PxtDS5v5FXgCRgLL8qm9vwgqFIpGn9CnZq5Wg1JXwopjUhquiunSQDUO7WaQBo+CwnovQE2NC2o9Agf/jDnxFrsQE9uUYg2aqmPWFPVBYoO4Uxo7qbehVTRbipAX9xSar0ibkYUWHKdh0vrwbARGeOr+ARHGJVicu/HZhtD2tVMWhppWSScUz7cSJJYzJgeDOyCifp3K3EjM5xrn1icZkR9jjman5At3VOurI0lnMr+vk+VMEprlxbwuLZlTXs/6SLS4S4aFyv3+XeHKtH1kS4DjViy/XrpyeWPpgSBS+/+ZhhVy4v5ynkGn82bA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=gitEDanTViT9PRj7GWXdJyjsJSlJnsYelX5GUdssemg=;
 b=t62jMPxzw6wHiecPXrsBWJYnqOuOHqU5JoUzTqzRhAt+04bdCP6FjB4vszhqJZi3bqTz5TxL+tHWP51rIGVPAyluYZulWHpueoirk8AVU55oTmcT0gAT86xL7jZ5WWAPxQDVwuvG+N4bV6GI2f/r3ITYI548WaivewJzGoPkl2A=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, Jan
 Beulich <jbeulich@suse.com>, Julien Grall <julien@xen.org>, Stefano
 Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
Subject: [PATCH v3] codeql: add support for analyzing C, Python and Go
Date: Wed, 23 Mar 2022 11:18:56 +0100
Message-ID: <20220323101856.35992-1-roger.pau@citrix.com>
X-Mailer: git-send-email 2.35.1
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO4P265CA0048.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:2ac::8) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c3b18d8c-dfd1-4cbb-7039-08da0cb68e69
X-MS-TrafficTypeDiagnostic: BN7PR03MB3940:EE_
X-Microsoft-Antispam-PRVS: <BN7PR03MB39403B9AECD731850FB407548F189@BN7PR03MB3940.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(66946007)(8936002)(5660300002)(6512007)(54906003)(6486002)(6916009)(86362001)(66476007)(8676002)(2906002)(66556008)(4326008)(38100700002)(316002)(6666004)(1076003)(82960400001)(83380400001)(2616005)(26005)(36756003)(186003)(508600001)(6506007);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?SGkxZTg3QTdvT3hSQUpFeVUwUGkwdmlreEc4aVc3SjVsbzY4aEZxNU5qMEtT?=
 =?utf-8?B?THJhelFoMXgxT3FMMUdwWm82alRoNzNUbG9xamg1dkhzZFJtTEtpOW1lRjNT?=
 =?utf-8?B?dkVibjRBQUsrYlBpSDRyeGltTk1FanY1M2p2RmFTandNdmZHeFpqdDBtQmJw?=
 =?utf-8?B?c0tLaXYwejRtam4vSUhFZC9neHhIczk0dnYrQlZUSzV2WTNDMWgyOVJMczd1?=
 =?utf-8?B?SnMxdmhMYVl2NVlFNnNYYnJ5YktoVUVnRC91V2paaWV2cGRTYXNkYkpmbFBD?=
 =?utf-8?B?MU9nWWdUc3ZzSW1tMzJvTklNT2FFcXdYNEd5ZCtlb1lZRU4yQ0VINHdHeDBM?=
 =?utf-8?B?aUhKZG1UYUsxV2VuN0kvQm5tLzF2dnE5ZTRRcmRWRE1NVm5UeDdUSUczeDI2?=
 =?utf-8?B?TVY4aUhHNEtoNjJIYlJEejlaRVFqbzNNS09pbnJ6TEZPTzE4dC9NOGtsOHRV?=
 =?utf-8?B?Y01pYXZSdUJ0UzhBZzFOdHpYeTVEeXpOMlJsU0tYVVB3cCt5QWJxdGU1VG1h?=
 =?utf-8?B?ZG90QUxYcXUySHZNYWxITWhVYklJYWVwelYxelBzN1Z0ZklTMmorVlB5QzNM?=
 =?utf-8?B?eEQwMU1IZUZhZS9Tc2RYNmJvV1JKeFN5UElUMG53cmVHeDd5S2UxNHRxTk1m?=
 =?utf-8?B?VXMzU2VISUNrRzRYQ2NLU1VkOUcyU3VaUEl1d2t3V0hZTWw3RW5JaXNCbkpF?=
 =?utf-8?B?SlRvUGVyRDBrMy9uWS9iM1JKdU1nbHBVZTRkWnBGdFRjM0F5RUY4cUN1cStD?=
 =?utf-8?B?OUZzcnlTQ3FlMUhsYmZCdXQ5bEhGMkV2Syt4ZURveGFlTzBIeVJDWTBhOFhI?=
 =?utf-8?B?TEtQeGFhK0pSK2dGb1JHR0xrVC9kd1BNa090Z2dRSXZ4MDArelJ6aTZURUlP?=
 =?utf-8?B?Q1RRdVhXTmU3eHJiVGI1Sy9VMmVtUUN1VlFRQmt1bURRUmEzaFV0bFFMRS9v?=
 =?utf-8?B?Z20zNm1PeUVtQ3pFUElGUUdyOUo5dFVCeDZnT1FESkZZOGF5VGVFVzlJY2Nh?=
 =?utf-8?B?T3VCTmV3VWRrR0dDNjN3MzNRcWpRYmcyb2RkZkJJZXVCNmtRcHdXNUNWdGZz?=
 =?utf-8?B?YW9FQU1HYlJSakNiZ3U5TUZnVnp0TStTb1hSRlZZK04wSEhXMmt6NnFPcm5Z?=
 =?utf-8?B?akhxTWZqdHhkMWFBMmd4RjNneFI5U3J0SmJ4RDh6MlZ1b1FOVGVaQXRKUEcv?=
 =?utf-8?B?TkNOMTdFZ2dTVi9kTDQrYmtZRDVZMWttMXlVay91dUZHZGpEaUxRY0YvMWF0?=
 =?utf-8?B?cWxKZS9HWGxwNFUvZCtmMmZUM3h2eDQyL1JpeVpjWEhBL0UwWmNqQ2xqSGtW?=
 =?utf-8?B?WUpiK1dJOHlhYW1wY2cyWVlpRkduMEFwNERKNkowTDJ2c3Z3K3JZdUZibXZH?=
 =?utf-8?B?WXpFdWZXbVVCa0w1dnNkSU9oUGZwS0NVNGNlQjFsQVZqZTlNVEVjREwxSmFw?=
 =?utf-8?B?NE9YNGZnUDlpbU9xNk91MEp5NDRacWJBQmE4R3dnUmxacXpBSzVnT1RGTldp?=
 =?utf-8?B?MHIwQS94dThKb3VZYkJrSHFzNHhwTXpEa1BZL2JYOWxyZmJ2cC80UTd5N0tZ?=
 =?utf-8?B?Yk9NR1k0eTZlQTVrVUtqMlNhdGIvZU1uRHh5VjYyd01aOGI2RXdmQ1pwNkRu?=
 =?utf-8?B?NXRBb3ZtTlBBRlArc3pkNG9INHJUY3ZxUVkyQm1aM1Q0eEU5d1V5RFlGR0E2?=
 =?utf-8?B?eGJYQkt4eVlSSm1MQmR0eTEwTm85b3hEbFdzeEt6NE9lUWFaRE1BUVVjdmFN?=
 =?utf-8?B?SmdJMGNWcEZabHJWb3NMMWRFZzNvY1BPOVNLM2hNR0k3S2g4MEhucUlxeGZJ?=
 =?utf-8?B?Qk5GS09iWnI2cmh3TUZJM3A0WjJpckdXN1BtTlVDNEo1alQ2OStnRWVRblRy?=
 =?utf-8?B?SEQrdkUzcGlodFk4ekxpRGhKSnVZVnhkNzNsamloUmEzMGxla1UwQmcvbnYx?=
 =?utf-8?Q?XWxrCOv7U/jFJfy36DuX7DNSpyCg+f0o?=
X-MS-Exchange-CrossTenant-Network-Message-Id: c3b18d8c-dfd1-4cbb-7039-08da0cb68e69
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Mar 2022 10:19:04.0609
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: kG8XFJ1FFGekcA3ldiJ6oJCrL+lTTP7vpAyjOMKQP2aC7ypA6FpOeVkasCvEkwlJveQIOkpoJE3tH5xv/fMl7Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN7PR03MB3940
X-OriginatorOrg: citrix.com

Introduce CodeQL support for Xen and analyze the C, Python and Go
files.

Note than when analyzing Python or Go we avoid building the hypervisor
and only build the tools.

Requested-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
Changes since v2:
 - Remove explicit 'staging' branch checkout.
 - Remove explicit query.
 - Remove ignored paths.
 - Remove 'on schedule' trigger, or else it would be run against the
   master branch instead of staging.

Changes since v1:
 - Rename to note it's x86 specific right now.
 - Merge the ignored path patch.
---
 .github/workflows/codeql-x86.yml | 54 ++++++++++++++++++++++++++++++++
 1 file changed, 54 insertions(+)
 create mode 100644 .github/workflows/codeql-x86.yml

diff --git a/.github/workflows/codeql-x86.yml b/.github/workflows/codeql-x86.yml
new file mode 100644
index 0000000000..6ddd445c79
--- /dev/null
+++ b/.github/workflows/codeql-x86.yml
@@ -0,0 +1,54 @@
+name: CodeQL x86
+
+on:
+  workflow_dispatch:
+  push:
+    branches: [staging]
+
+jobs:
+  analyse:
+
+    strategy:
+      matrix:
+        language: [ 'cpp', 'python', 'go' ]
+
+    runs-on: ubuntu-latest
+
+    steps:
+    - name: Install build dependencies
+      run: |
+        sudo apt-get install -y wget git \
+          libbz2-dev build-essential \
+          zlib1g-dev libncurses5-dev iasl \
+          libbz2-dev e2fslibs-dev uuid-dev libyajl-dev \
+          autoconf libtool liblzma-dev \
+          python3-dev golang python-dev libsystemd-dev
+
+    - uses: actions/checkout@v2
+
+    - name: Configure Xen
+      run: |
+        ./configure --with-system-qemu=/bin/true \
+                    --with-system-seabios=/bin/true \
+                    --with-system-ovmf=/bin/true
+
+    - name: Pre build stuff
+      run: |
+        make -j`nproc` mini-os-dir
+
+    - uses: github/codeql-action/init@v1
+      with:
+        languages: ${{matrix.language}}
+
+    - if: matrix.language == 'cpp'
+      name: Full Build
+      run: |
+        make -j`nproc` build-xen build-tools
+        make -j`nproc` -C extras/mini-os/
+
+    - if: matrix.language == 'python' || matrix.language == 'go'
+      name: Tools Build
+      run: |
+        make -j`nproc` build-tools
+
+    - uses: github/codeql-action/analyze@v1
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 11:11:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 11:11:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293847.499320 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWytV-0004Yn-DL; Wed, 23 Mar 2022 11:11:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293847.499320; Wed, 23 Mar 2022 11:11:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWytV-0004Yg-9e; Wed, 23 Mar 2022 11:11:13 +0000
Received: by outflank-mailman (input) for mailman id 293847;
 Wed, 23 Mar 2022 11:11:11 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=7r0c=UC=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nWytT-0004Ya-CK
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 11:11:11 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05on20627.outbound.protection.outlook.com
 [2a01:111:f400:7e1a::627])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ec943185-aa99-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 12:11:02 +0100 (CET)
Received: from DB3PR08CA0022.eurprd08.prod.outlook.com (2603:10a6:8::35) by
 AM6PR08MB5205.eurprd08.prod.outlook.com (2603:10a6:20b:ee::28) with Microsoft
 SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.16; Wed, 23 Mar 2022 11:10:58 +0000
Received: from DB5EUR03FT018.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:8:0:cafe::fd) by DB3PR08CA0022.outlook.office365.com
 (2603:10a6:8::35) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17 via Frontend
 Transport; Wed, 23 Mar 2022 11:10:58 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT018.mail.protection.outlook.com (10.152.20.69) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Wed, 23 Mar 2022 11:10:58 +0000
Received: ("Tessian outbound 31aeb3346a45:v113");
 Wed, 23 Mar 2022 11:10:58 +0000
Received: from 60fa3cf99eae.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 494A2E45-BC4F-4525-B5FF-DC798BEE4C99.1; 
 Wed, 23 Mar 2022 11:10:51 +0000
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 60fa3cf99eae.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Wed, 23 Mar 2022 11:10:51 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by AM5PR0801MB1956.eurprd08.prod.outlook.com (2603:10a6:203:4b::7)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.16; Wed, 23 Mar
 2022 11:10:46 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5081.023; Wed, 23 Mar 2022
 11:10:46 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ec943185-aa99-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=gnfH39a5IFLykrlZuM9gfbuHOTbcItj5VeWY+wzlayg=;
 b=kC2bm/e2koTyRnGnHH0tYkTq6Jjoim41YOLdvKAeIxuMV5VyikA9FQy7968WDp9IZ6aoBF+0IuryMpzbnwIWtwdATffR7QY+bfLkLv/ITUg+gmKtYgh/XRu6GBomRbUxasvkXr6u8J92u+GtExom1u12Zs1gUqVQP9KchwFMfVw=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 22d1cda756ecea24
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=N80MnU+Biy9Z8qZKVWzqbLbbUyLIuMdn86+2gLww6Z+nVZG/7pRPAGH6b1ILG2QJUJYKZfLDRCTahHHKjnrg1MVIylztwW6NP6d4YEa7MNCz2ZYCRiAbNIbFrKfOqBa/Anx7h4eruxabkb3TL5h8ntgwGBQXX+ZfBRV6Y8J0PFGhWai7Hrn2ojfpFFdkU5b8KicLhM1ZyELCtjdyGI2lyBDS6VcdLDRmLEXFS+g679l4sK2uA1VS567gptM8BLpA8WUZY4aQKnC0SBEeWFXaaVLrxsUfc2KwN0cPLsHd6JBpPLj1XAlXeTjcm44lr5dliiF/e3xyB4bF3aMX7ZBLig==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=gnfH39a5IFLykrlZuM9gfbuHOTbcItj5VeWY+wzlayg=;
 b=N4Pa0T+LTlQTfgXH7Xf+l/oXrVSJWQyQsOV4oJTfTAh8a4ieHzqzehnBoRWRLzn6PEND/16qgrYI2QHC0QYgmbK0DBDKDgxabfgmOL7dzuYVif0J5VsbQk4C3/rFMRGRB//Mlodc60VcyYhYiumW4ms2TDr/3DtaAOaSuYM0kIpvfITtmvPcrRvAAoAVowfxGDjTm4HMFsTmEkeDdIn5MkUh+UvHZE3S4Zw3Q+HkNmlX1UWeJleBhINsKsCETSzk009jY5E8odxIToY6Ajrt866hxCwutReEfrCMb3x1tTArWlrb89z0iAhdjg1HYL9WKJ+JLS7O88IBwp3I+UqwhA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=gnfH39a5IFLykrlZuM9gfbuHOTbcItj5VeWY+wzlayg=;
 b=kC2bm/e2koTyRnGnHH0tYkTq6Jjoim41YOLdvKAeIxuMV5VyikA9FQy7968WDp9IZ6aoBF+0IuryMpzbnwIWtwdATffR7QY+bfLkLv/ITUg+gmKtYgh/XRu6GBomRbUxasvkXr6u8J92u+GtExom1u12Zs1gUqVQP9KchwFMfVw=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Juergen Gross <jgross@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v2] include/public: add command result definitions to
 vscsiif.h
Thread-Topic: [PATCH v2] include/public: add command result definitions to
 vscsiif.h
Thread-Index: AQHYPpQ58aXPwYTvBkyN7CpMP587w6zM0CCA
Date: Wed, 23 Mar 2022 11:10:46 +0000
Message-ID: <C69C67B6-4959-4594-A32B-78044CB0EDB2@arm.com>
References: <20220323085831.27057-1-jgross@suse.com>
In-Reply-To: <20220323085831.27057-1-jgross@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 783f4581-3911-4ca8-bf56-08da0cbdcebd
x-ms-traffictypediagnostic:
	AM5PR0801MB1956:EE_|DB5EUR03FT018:EE_|AM6PR08MB5205:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR08MB52059FE495D9E7095B924C03E4189@AM6PR08MB5205.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(76116006)(4326008)(2906002)(66476007)(8676002)(91956017)(66946007)(66446008)(186003)(26005)(5660300002)(2616005)(8936002)(66556008)(64756008)(38070700005)(83380400001)(33656002)(122000001)(71200400001)(6486002)(86362001)(316002)(6916009)(36756003)(6512007)(38100700002)(508600001)(6506007)(53546011)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <587A3F93779E344F9D4F8F1DA85C74DD@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0801MB1956
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT018.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	f8dddecb-d9a6-462a-21fb-08da0cbdc785
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(36756003)(2616005)(36860700001)(40460700003)(2906002)(5660300002)(316002)(83380400001)(81166007)(356005)(186003)(26005)(336012)(4326008)(8936002)(70586007)(70206006)(6862004)(6512007)(6486002)(508600001)(47076005)(33656002)(86362001)(6506007)(82310400004)(8676002)(53546011);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Mar 2022 11:10:58.3240
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 783f4581-3911-4ca8-bf56-08da0cbdcebd
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT018.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB5205



> On 23 Mar 2022, at 08:58, Juergen Gross <jgross@suse.com> wrote:
>=20
> The result field of struct vscsiif_response is lacking a detailed
> definition. Today the Linux kernel internal scsi definitions are being
> used, which is not a sane interface for a PV device driver.
>=20
> Add macros to change that by using today's values in the XEN namespace.
>=20
> Signed-off-by: Juergen Gross <jgross@suse.com>
> ---
> V2:
> - put macro parameters in parentheses (Jan Beulich)
> - correct XEN_VSCSIIF_RSLT_HOST() (Jan Beulich)
> - more verbose result defines (Jan Beulich)
> - add reset result defines (Jan Beulich)
> ---
> xen/include/public/io/vscsiif.h | 51 +++++++++++++++++++++++++++++++++
> 1 file changed, 51 insertions(+)
>=20
> diff --git a/xen/include/public/io/vscsiif.h b/xen/include/public/io/vscs=
iif.h
> index c9ceb1884d..8553b17cc6 100644
> --- a/xen/include/public/io/vscsiif.h
> +++ b/xen/include/public/io/vscsiif.h
> @@ -315,6 +315,57 @@ struct vscsiif_response {
> };
> typedef struct vscsiif_response vscsiif_response_t;
>=20
> +/* SCSI I/O status from vscsiif_response->rslt */
> +#define XEN_VSCSIIF_RSLT_STATUS(x)  ((x) & 0x00ff)
> +
> +/* Host I/O status from vscsiif_response->rslt */
> +#define XEN_VSCSIIF_RSLT_HOST(x)    (((x) & 0x00ff0000) >> 16)
> +#define XEN_VSCSIIF_RSLT_HOST_OK                   0
> +/* Couldn't connect before timeout */
> +#define XEN_VSCSIIF_RSLT_HOST_NO_CONNECT           1
> +/* Bus busy through timeout */
> +#define XEN_VSCSIIF_RSLT_HOST_BUS_BUSY             2
> +/* Timed out for other reason */
> +#define XEN_VSCSIIF_RSLT_HOST_TIME_OUT             3
> +/* Bad target */
> +#define XEN_VSCSIIF_RSLT_HOST_BAD_TARGET           4
> +/* Abort for some other reason */
> +#define XEN_VSCSIIF_RSLT_HOST_ABORT                5
> +/* Parity error */
> +#define XEN_VSCSIIF_RSLT_HOST_PARITY               6
> +/* Internal error */
> +#define XEN_VSCSIIF_RSLT_HOST_ERROR                7
> +/* Reset by somebody */
> +#define XEN_VSCSIIF_RSLT_HOST_RESET                8
> +/* Unexpected interrupt */
> +#define XEN_VSCSIIF_RSLT_HOST_BAD_INTR             9
> +/* Force command past mid-layer */
> +#define XEN_VSCSIIF_RSLT_HOST_PASSTHROUGH         10
> +/* Retry requested */
> +#define XEN_VSCSIIF_RSLT_HOST_SOFT_ERROR          11
> +/* Hidden retry requested */
> +#define XEN_VSCSIIF_RSLT_HOST_IMM_RETRY           12
> +/* Requeue command requested */
> +#define XEN_VSCSIIF_RSLT_HOST_REQUEUE             13
> +/* Transport error disrupted I/O */
> +#define XEN_VSCSIIF_RSLT_HOST_TRANSPORT_DISRUPTED 14
> +/* Transport class fastfailed */
> +#define XEN_VSCSIIF_RSLT_HOST_TRANSPORT_FAILFAST  15
> +/* Permanent target failure */
> +#define XEN_VSCSIIF_RSLT_HOST_TARGET_FAILURE      16
> +/* Permanent nexus failure on path */
> +#define XEN_VSCSIIF_RSLT_HOST_NEXUS_FAILURE       17
> +/* Space allocation on device failed */
> +#define XEN_VSCSIIF_RSLT_HOST_ALLOC_FAILURE       18
> +/* Medium error */
> +#define XEN_VSCSIIF_RSLT_HOST_MEDIUM_ERROR        19
> +/* Transport marginal errors */
> +#define XEN_VSCSIIF_RSLT_HOST_TRANSPORT_MARGINAL  20

Hi Juergen,

Would it makes sense to define the values in hex like in include/scsi/scsi_=
status.h
so that they are more easy to compare?

However this looks good to me,

Reviewed-by: Luca Fancellu <luca.fancellu@arm.com>


> +
> +/* Result values of reset operations */
> +#define XEN_VSCSIIF_RSLT_RESET_SUCCESS  0x2002
> +#define XEN_VSCSIIF_RSLT_RESET_FAILED   0x2003
> +
> DEFINE_RING_TYPES(vscsiif, struct vscsiif_request, struct vscsiif_respons=
e);
>=20
>=20
> --=20
> 2.34.1
>=20
>=20



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 11:20:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 11:20:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293852.499330 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWz25-0005qG-6Q; Wed, 23 Mar 2022 11:20:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293852.499330; Wed, 23 Mar 2022 11:20:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWz25-0005pP-2o; Wed, 23 Mar 2022 11:20:05 +0000
Received: by outflank-mailman (input) for mailman id 293852;
 Wed, 23 Mar 2022 11:20:03 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=hFSt=UC=citrix.com=prvs=074729667=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nWz23-0005Tu-3V
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 11:20:03 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2cf2aa84-aa9b-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 12:20:01 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2cf2aa84-aa9b-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648034401;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=A+pvQvl/u1V7KFqoDn1xIwi6dQmf93EtZuy4aB8o3kE=;
  b=NsKECLYq43XbL8vL4b/vLGMTAWU0zfscPu0vT2KyEHIRRPk2n2eLTPSy
   eu9QDhJ1ucWOycIT6aAAxP1IXjbk5B0miIAJT/PFshki1jIWna0fWSLHT
   /ZJ0z8K+SgS6nrxC52G4QYVfG4arq3DRwEk+zgKZEm1+m9IQu8EC4ZZ7P
   0=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 69325009
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:9idita8jEcEaYHhd0eABDrUDun6TJUtcMsCJ2f8bNWPcYEJGY0x3z
 2VNXDqEOv7ba2qmet8kYNvj/E0P7MfXm9M3SQo/ri08E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oLiW1rlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnYHoahh1P/L1o+UAaTsINBt0BZVbyrCSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFKoZtmtt0nfyCvE+TIqYa67L+cVZzHE7gcUm8fP2O
 ZtCM2c3NEWojxtnHGVNOokjzMWUiWTdTBMH8U2sgrAa2j2GpOB2+Oe0a4eEEjCQfu1Kmm6Iq
 2SA+H72ajkYKdiexDyt4n+qwOjVkkvTQ5kOHbe18vprhly7xWEJDhASE1yhrpGRmkO4Ht5SN
 UEQ0i4vtrQpslymSMHnWB+1q2LCuQQTM/JyOeAn7ACGyoLP/h2UQGMDS1Z8hMcO7ZFsA2Zwj
 xnQwo2vVWcHXKCppWy16++3sm+zZhEuLHI4R38jdwE928TRr9Rm5v7QdepLHKmwh9zzPDj/x
 TGWsSQz74kuYd43O7aTpg6e3W/1znTdZktsv1iMADr5hu9sTNT9D7FE/2Q3+hqpwGyxalCa9
 EYJlMGFhAzlJcHczXfdKAnh8VzA2hpkDNE+qQM3d3XC3270k5JGQWy2yGgvTKuOGpxYEQIFm
 GeJ5WtsCGZ7ZRNGl5NfbYOrENgNxqP9D9njXf28RoMQPscgK1TWrHwyPhH4M4XRfK4Ey/xX1
 XCzK5vEMJrnIf4/kGreqxk1j9fHORzSNUuMHMumnnxLIJKVZWKPSKdtDbd9RrtR0U9wmy2Mq
 4w3H5LTk313CbSiCgGKod97BQ1bdhATWMGpw/G7g8bee2KK7kl6UKSPqV7gEqQ495loehDgp
 SjsBBUHlAKh2RUq62yiMxheVV8mZr4mxVoTNi0wJ1e4nX8lZIek9qAEcJUrO7Ig8YReITRcF
 JHpp+3o7ixzdwn6
IronPort-HdrOrdr: A9a23:pc78RK1FH3/XDVBUmNwMOAqjBLwkLtp133Aq2lEZdPU1SKClfq
 WV98jzuiWatN98Yh8dcLK7WJVoMEm8yXcd2+B4V9qftWLdyQiVxe9ZnO7f6gylNyri9vNMkY
 dMGpIObOEY1GIK7/rH3A==
X-IronPort-AV: E=Sophos;i="5.90,204,1643691600"; 
   d="scan'208";a="69325009"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=FCKYLMBP6NibLX89BIO+mj+rWhMClrHDtmtmQGH+ZjAAxeLiMASoThC/uIbGfos1ZnEJZRIDD7iEKnEyOBmlcykEgzyMiiKQgtNwt3YKjWJr2PsKDCplVWGeAW4xzFNsOnd+y7Wpd0+eKc5Ir3ZvbJOfqABkR871ig+Nob5zufVzrNSJZ8alYeN8HOX9hJcfVbRlrGr0zyOqDnOPW0X1fhpdX1OsvLLEd3YsgaiRRieq7FPAfvX5HaB1rjqAWfRRAz0LWR7ojiQ3ij6UA+Qm1CS+vkrhBt6RoBq/LvBK8EnHSGAqaU1xgKYHrRoSbpjlfowMegcKsBL1LgyR9oCQFg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=A+pvQvl/u1V7KFqoDn1xIwi6dQmf93EtZuy4aB8o3kE=;
 b=dC1/BOuHAZNaU4MYHa/Ps/y3fyP6gfAksbdcAiDRKiBDGXMYzd+QJaKNFGrvILg1z9uwnWxsE1kfkN0Nk1SKMQB7sLY40ujsq9i17KCJe6nF7SDTLeN63DZ45jIx3fgzC7AECPYWaxRw3VrbeXDU39MItR0cDuN47KF1/JnA9AcofQXDDMzu/lGYFQOcLXUtqJAEGryDeAh7gUbnf2UyRzZQteK5t4HY4GE/k67ukHx27cETv0UmvWOO28yvIHpqNZFTwBRfiTyDskQ8huXmxSB0jejQJUEF7C06QLmVdOta12NHc2lXg0wZ8kQFqv7V/OVYOKz9YT83OytHIY6Jhg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=A+pvQvl/u1V7KFqoDn1xIwi6dQmf93EtZuy4aB8o3kE=;
 b=ZNjttdXW28W8CfU8UqdVLTW+jiJJc8dXQvgVMqWxD+tLpYdzUfzxgpC/MI8xxJs6ufwUY5JAY+MGrs5li8V5uHcMRzlYpTXfqav8WftTuPKlWrvNSNRn3eyF8290wZBvmfHpKcqu3d32KSmeKTR5ECrVCdccL/hPzamI/KuQwvI=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Roger Pau Monne <roger.pau@citrix.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, George Dunlap
	<George.Dunlap@citrix.com>, Jan Beulich <JBeulich@suse.com>, "Stefano
 Stabellini" <sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Julien Grall
	<julien@xen.org>
Subject: Re: [PATCH] CI: Don't run Coverity on forks
Thread-Topic: [PATCH] CI: Don't run Coverity on forks
Thread-Index: AQHYPSvcWrGNYMcnAkWJCvNqV4tZeqzJ76qAgALlz4A=
Date: Wed, 23 Mar 2022 11:19:50 +0000
Message-ID: <10b64b72-dd9a-a2af-83f2-c42dad5adc9b@citrix.com>
References: <20220321135828.3158-1-andrew.cooper3@citrix.com>
 <YjiUDyTDuq5KQT3W@Air-de-Roger>
In-Reply-To: <YjiUDyTDuq5KQT3W@Air-de-Roger>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: c73ca8c3-2fcd-4c87-3dd3-08da0cbf0bd3
x-ms-traffictypediagnostic: BN7PR03MB4467:EE_
x-microsoft-antispam-prvs: <BN7PR03MB446771C869C1388355140995BA189@BN7PR03MB4467.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(186003)(4326008)(66476007)(54906003)(26005)(8676002)(5660300002)(6862004)(66446008)(37006003)(64756008)(6486002)(6636002)(71200400001)(508600001)(76116006)(66556008)(316002)(86362001)(91956017)(31696002)(66946007)(53546011)(55236004)(31686004)(38100700002)(6512007)(36756003)(2906002)(8936002)(2616005)(6506007)(122000001)(38070700005)(82960400001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?eG9qejFVVCtaZTdlQmdVUk0xdFBON3daS0pEcUV5NnpVU0orS3FQYTRhVGh3?=
 =?utf-8?B?a0E4aWNQcFU2N2VrZkdpTzBFT2ZNUFkrbTlHdnIvVUtrS2FOL245RkxIU2VT?=
 =?utf-8?B?dzZUbklBNTRaNW4vdTdLakhOeEt2MDl3c3JsdHFGTlU1dXl2Z3Vsc01MZFFF?=
 =?utf-8?B?MnlGZEZPTTVKbjRzVGJ4bDN3b3lVVndzTWJrTVh3MGQvTjA4WkFIZG83L3ls?=
 =?utf-8?B?V2NFSCtiZ05zNDgrNzJLb09OdzY4RGFGRUcrK3ZkZUVlMmNqM1pzM2hkNTNP?=
 =?utf-8?B?TmJpcGFpM0lyNTUwL1lka1Z5ZzNjRnNkU3l1UTl5Y1lHQjJUMVRlR2ZFNTA5?=
 =?utf-8?B?bjA2MWVVOFg5ZmErbGErMGRtNjZDSTNPT1I1MkltZ0FZNndpTUFoTlJWUFdU?=
 =?utf-8?B?VmhpVDducSt4ZVp4a0xkdXN2ZWF3ZlRkNE1qSWVDdVM4TWIxOHhud2JUV3Zt?=
 =?utf-8?B?bWI2aGNicHIxbkQxMGtZUzdOTUs3eHYzdTVZOG5XeCtYeGl3cGJaQ1YxVm1G?=
 =?utf-8?B?RTdsNXlWc2JCRlA0d0xQYjlxZFdiTlVsR0pXbHRaSlhDZXBzZFlYSlliNURN?=
 =?utf-8?B?TlU4UmRkaHdvc1RaQkhRVzlLQ011N3FjWGp4UmJ1Ym5uM21RcTRTcGMyNTZr?=
 =?utf-8?B?RVd3WFY1c2FJUHg0UVlSdUZMZjFHbDhLY1IrejU1a2x6SW1Tb0NERWVjNTFq?=
 =?utf-8?B?Sy85UXhHaCtrYU82NGNud0J5aDM3WEFMMlp2emh5MDlzNW1CbFdhL1VjMG0z?=
 =?utf-8?B?ajBRMU5xUDVkU2oyMllsalN5VEE4c1VnL2UxbjJCY1IzamZlUEFMTTQzRFNw?=
 =?utf-8?B?eW1tSTVCd3R6M3U3T2FFa3l0ckIza1NHTHBVMFZiYnB6U3ptSHNMM2RZcDY0?=
 =?utf-8?B?UlI0WTd1RmFzakZvUkQwOHhBTE5Pd0RDMzNZRllhK0U5ZUFYcGowQUpCQTNX?=
 =?utf-8?B?anF4TStscmhOaFE1T2R2REV6UjFMRXdNM0h3RDlKVHk1NFIvZkhxZWl5SkhC?=
 =?utf-8?B?cXdHOU5xamszWUI4WGM5dy9VZ2VucFMzVCttUlhiZ3BoL0hsVTk4TWtKb2ph?=
 =?utf-8?B?ekFEcWJrbVhtTjFnTU8wazdnbm9WWTZEa21tQWp3eWlrSlBMK05vMjBNRXBE?=
 =?utf-8?B?Vzd4Y3FLVXdDWGVXTi9CMVByVWVZV0lxeG9CbXlGcTlweWw1aXIzSDF4VURR?=
 =?utf-8?B?VWJlcmkyZTBtSHR1LzRMUUlTWjE3UkthRHJuVzVGajlaVEF0MURsc3NNL3di?=
 =?utf-8?B?K1EwNUYwQk1xaGVhck0rQTNuQVZVYnZ0QmNwMEJYR3g5dlJMQk10WGY1dDdz?=
 =?utf-8?B?cWlJQlF2RUhVemdUOHl6NjhmR3RjaTlpSUJ4QTNRQnlUOTV2a1RmVjMwd2My?=
 =?utf-8?B?ZWl5OUJvV1FWb0ovVmJCSjFqaXprbTVCMEMxRi9KZGhqQzlXRWdTeHhpcFRH?=
 =?utf-8?B?aFRQUml5Mllxek14bUVJVS9sNG53SXVDOFhiVjNwazhTOFhmNkhUNzhYMEdn?=
 =?utf-8?B?dld3ZmxnSG44SnVZREhuVE91OERBOE8rL3NTV0VaREljQ3FHODEvTWczNkFt?=
 =?utf-8?B?VUxVRE1rUXBNYlFCY0lkeUovbElDUGdYM1F3QWZpNTBIL1AxM2F1eTVnMXgx?=
 =?utf-8?B?SkZTMDk4TTFnbFBOMVFubUwrVTFucHVTYnRkTWFpWHFpbVJQcjB1YzRRVGFs?=
 =?utf-8?B?WFhMK08rclEwWnZVS2Zrb1VtR3BJd2xpcWU4Qm5rb2grSExoV0w3N3N5Q01N?=
 =?utf-8?B?aUhBZFowT1FsNTUyUUlPNytDeFhMUEJoZWFXU2NORVlIcXlXZXowdENXaHB5?=
 =?utf-8?B?ZVgxbmlGSjN2T0Y1b1d3TW9lbGVvbzJUS1dENERnUGpQTGhHWWg3Q3ZiY291?=
 =?utf-8?B?K1d0bEkzbnRsbnQvZlprS2d0cVJ5Z1FDcVdraGhkNE4xdGdDMXo1QmZJdVda?=
 =?utf-8?Q?6TOmFG4I0JHntK8JVLIlNETmp1xn2amY?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <4A8429817F611B4987413BDB59FA6A63@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c73ca8c3-2fcd-4c87-3dd3-08da0cbf0bd3
X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Mar 2022 11:19:50.1932
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: +GxN/5/mQKGkWmb5CAtstQwoU7d0N7CYMCvCW/IU036Ly1JRLS7Ai31CPzrKjYRG0vWX/02obGyGU8qnxHmGpRr2XJa1BOKH0GmOJZl57kM=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN7PR03MB4467
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Wed Mar 23 11:22:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 11:22:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293855.499342 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWz4b-0006gg-KE; Wed, 23 Mar 2022 11:22:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293855.499342; Wed, 23 Mar 2022 11:22:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWz4b-0006gZ-H9; Wed, 23 Mar 2022 11:22:41 +0000
Received: by outflank-mailman (input) for mailman id 293855;
 Wed, 23 Mar 2022 11:22:40 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=7r0c=UC=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nWz4a-0006gT-9e
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 11:22:40 +0000
Received: from EUR01-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur01on061e.outbound.protection.outlook.com
 [2a01:111:f400:fe1f::61e])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 8baeeeda-aa9b-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 12:22:38 +0100 (CET)
Received: from AM6P191CA0001.EURP191.PROD.OUTLOOK.COM (2603:10a6:209:8b::14)
 by DB8PR08MB4155.eurprd08.prod.outlook.com (2603:10a6:10:a3::20) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.16; Wed, 23 Mar
 2022 11:22:34 +0000
Received: from VE1EUR03FT061.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:8b:cafe::57) by AM6P191CA0001.outlook.office365.com
 (2603:10a6:209:8b::14) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17 via Frontend
 Transport; Wed, 23 Mar 2022 11:22:33 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT061.mail.protection.outlook.com (10.152.19.220) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5081.14 via Frontend Transport; Wed, 23 Mar 2022 11:22:33 +0000
Received: ("Tessian outbound 31aeb3346a45:v113");
 Wed, 23 Mar 2022 11:22:33 +0000
Received: from 77a1b25287dd.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 060DFE96-07AD-439D-8B1C-AA52D7D6767D.1; 
 Wed, 23 Mar 2022 11:22:26 +0000
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 77a1b25287dd.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Wed, 23 Mar 2022 11:22:26 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by HE1PR0801MB1868.eurprd08.prod.outlook.com (2603:10a6:3:49::22)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.19; Wed, 23 Mar
 2022 11:22:24 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5081.023; Wed, 23 Mar 2022
 11:22:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8baeeeda-aa9b-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=sMMnRqUdSLAII8BEb726B5nyV33KdTyQIWi8LvAlR1I=;
 b=6rqhzlvoYBpxKUKEybkljyScSYLIjbk4jM94UqNmCSAVvsGao5zxoO7gY7xw46jcMLr0NBr3/Bu1bAS0hw00Fu0rFBoAMSc5PGuybHIFe7ZIWxlgSjxcOm40m5Wbpocsqf6skBkRcW1vMZOm5KUtDvtNwnJkFu8G216tYI+GmMg=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: ae1d9c063dc6ad1d
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=m4lys+t86Ih0zB0/pz2BFPb0IXPa03Yv2fOMOtsxqt2tVTXF8jbKmwvzuXbvLYEi15zjSKv+uU1Ma5WIIPvLfyAy9PBlysOmZz0fbOUERjkD+4ydCHj5+X+zjEoefG0aZ7OVkDYizfhoVo86UiMd/+rTNL5vyjOYe5wL7OgXSuuA/t50wTotUfMPdUIksyC9Ok3mMLpyQCyePCzybefwPZcTtOxMgBjBwevlkAI6XLkE6nsLoV7uzHBeBKGtPtSiLPL8rf1nwn2wWS2C895nHHg7HOBXLukcDMk9pYNIzI/Xf4y0NsA1xx0AyKxpz2S6V2txaO6bBYW9lJkOuYRzHA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=sMMnRqUdSLAII8BEb726B5nyV33KdTyQIWi8LvAlR1I=;
 b=Y3uzWXQcaF4WzRXCv22VBtB918jNxdIeaLsYUCDxuLZEoy+h/ZFLdHi1u2HPZcJX4NWPv6KHrmRxKvdV7Qi/UqMJ5VdoIT9OXiXM42WCmCta6lNrRjqGfVVMqCSIBh0z1zq2o8Go0LT4+S3BHhFnxxrBohocCGxHiiwKS2BfsWQXnL9XA02ZkY6mfYsqPZWnmdrnqJTxTI4YknIDK4VP4knruwXSGucmOJyU8KHdilCdk7bb1gZboVkv1oN+CqiwbytAuTo9j38d4wVdILpF44z8e3iG7OC0kjalSIrSxTKnE4yiWEiqmGo0cOah9F03D9tkEqyN3cKxxcU6h/MwTw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=sMMnRqUdSLAII8BEb726B5nyV33KdTyQIWi8LvAlR1I=;
 b=6rqhzlvoYBpxKUKEybkljyScSYLIjbk4jM94UqNmCSAVvsGao5zxoO7gY7xw46jcMLr0NBr3/Bu1bAS0hw00Fu0rFBoAMSc5PGuybHIFe7ZIWxlgSjxcOm40m5Wbpocsqf6skBkRcW1vMZOm5KUtDvtNwnJkFu8G216tYI+GmMg=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Juergen Gross <jgross@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v2] include/public: add command result definitions to
 vscsiif.h
Thread-Topic: [PATCH v2] include/public: add command result definitions to
 vscsiif.h
Thread-Index: AQHYPpQ58aXPwYTvBkyN7CpMP587w6zM0CCAgAADQIA=
Date: Wed, 23 Mar 2022 11:22:24 +0000
Message-ID: <E1CB4644-C2B7-428F-A3F5-AD15681A0E01@arm.com>
References: <20220323085831.27057-1-jgross@suse.com>
 <C69C67B6-4959-4594-A32B-78044CB0EDB2@arm.com>
In-Reply-To: <C69C67B6-4959-4594-A32B-78044CB0EDB2@arm.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: e6e8dd7e-3cc4-44e2-a49d-08da0cbf6d24
x-ms-traffictypediagnostic:
	HE1PR0801MB1868:EE_|VE1EUR03FT061:EE_|DB8PR08MB4155:EE_
X-Microsoft-Antispam-PRVS:
	<DB8PR08MB41552A21BC5142A2E75E0139E4189@DB8PR08MB4155.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(83380400001)(71200400001)(76116006)(8676002)(6512007)(8936002)(38070700005)(122000001)(66556008)(66446008)(64756008)(508600001)(66476007)(4326008)(91956017)(2616005)(38100700002)(6486002)(66946007)(316002)(53546011)(2906002)(186003)(6506007)(26005)(36756003)(5660300002)(33656002)(86362001)(6916009)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <094291CC1466D44B88C59C808AD51401@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0801MB1868
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT061.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	b2edea1e-1383-4a2b-d3ca-08da0cbf67fa
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(508600001)(6486002)(6512007)(47076005)(70586007)(70206006)(4326008)(8936002)(6862004)(82310400004)(8676002)(53546011)(6506007)(33656002)(86362001)(36860700001)(40460700003)(36756003)(2616005)(83380400001)(356005)(81166007)(336012)(26005)(186003)(5660300002)(2906002)(316002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Mar 2022 11:22:33.4657
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: e6e8dd7e-3cc4-44e2-a49d-08da0cbf6d24
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT061.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR08MB4155



> On 23 Mar 2022, at 11:10, Luca Fancellu <Luca.Fancellu@arm.com> wrote:
>=20
>=20
>=20
>> On 23 Mar 2022, at 08:58, Juergen Gross <jgross@suse.com> wrote:
>>=20
>> The result field of struct vscsiif_response is lacking a detailed
>> definition. Today the Linux kernel internal scsi definitions are being
>> used, which is not a sane interface for a PV device driver.
>>=20
>> Add macros to change that by using today's values in the XEN namespace.
>>=20
>> Signed-off-by: Juergen Gross <jgross@suse.com>
>> ---
>> V2:
>> - put macro parameters in parentheses (Jan Beulich)
>> - correct XEN_VSCSIIF_RSLT_HOST() (Jan Beulich)
>> - more verbose result defines (Jan Beulich)
>> - add reset result defines (Jan Beulich)
>> ---
>> xen/include/public/io/vscsiif.h | 51 +++++++++++++++++++++++++++++++++
>> 1 file changed, 51 insertions(+)
>>=20
>> diff --git a/xen/include/public/io/vscsiif.h b/xen/include/public/io/vsc=
siif.h
>> index c9ceb1884d..8553b17cc6 100644
>> --- a/xen/include/public/io/vscsiif.h
>> +++ b/xen/include/public/io/vscsiif.h
>> @@ -315,6 +315,57 @@ struct vscsiif_response {
>> };
>> typedef struct vscsiif_response vscsiif_response_t;
>>=20
>> +/* SCSI I/O status from vscsiif_response->rslt */
>> +#define XEN_VSCSIIF_RSLT_STATUS(x)  ((x) & 0x00ff)

Sorry Juergen,

A thing came to me after sending my first message, is XEN_VSCSIIF_RSLT_STAT=
US meant
to be used to compare the result with XEN_VSCSIIF_RSLT_RESET_SUCCESS or=20
XEN_VSCSIIF_RSLT_RESET_FAILED?

Because I think the mask should be 0xFFFF instead of 0xFF since we have the=
 bit 13 set

Cheers,
Luca

>> +
>> +/* Host I/O status from vscsiif_response->rslt */
>> +#define XEN_VSCSIIF_RSLT_HOST(x)    (((x) & 0x00ff0000) >> 16)
>> +#define XEN_VSCSIIF_RSLT_HOST_OK                   0
>> +/* Couldn't connect before timeout */
>> +#define XEN_VSCSIIF_RSLT_HOST_NO_CONNECT           1
>> +/* Bus busy through timeout */
>> +#define XEN_VSCSIIF_RSLT_HOST_BUS_BUSY             2
>> +/* Timed out for other reason */
>> +#define XEN_VSCSIIF_RSLT_HOST_TIME_OUT             3
>> +/* Bad target */
>> +#define XEN_VSCSIIF_RSLT_HOST_BAD_TARGET           4
>> +/* Abort for some other reason */
>> +#define XEN_VSCSIIF_RSLT_HOST_ABORT                5
>> +/* Parity error */
>> +#define XEN_VSCSIIF_RSLT_HOST_PARITY               6
>> +/* Internal error */
>> +#define XEN_VSCSIIF_RSLT_HOST_ERROR                7
>> +/* Reset by somebody */
>> +#define XEN_VSCSIIF_RSLT_HOST_RESET                8
>> +/* Unexpected interrupt */
>> +#define XEN_VSCSIIF_RSLT_HOST_BAD_INTR             9
>> +/* Force command past mid-layer */
>> +#define XEN_VSCSIIF_RSLT_HOST_PASSTHROUGH         10
>> +/* Retry requested */
>> +#define XEN_VSCSIIF_RSLT_HOST_SOFT_ERROR          11
>> +/* Hidden retry requested */
>> +#define XEN_VSCSIIF_RSLT_HOST_IMM_RETRY           12
>> +/* Requeue command requested */
>> +#define XEN_VSCSIIF_RSLT_HOST_REQUEUE             13
>> +/* Transport error disrupted I/O */
>> +#define XEN_VSCSIIF_RSLT_HOST_TRANSPORT_DISRUPTED 14
>> +/* Transport class fastfailed */
>> +#define XEN_VSCSIIF_RSLT_HOST_TRANSPORT_FAILFAST  15
>> +/* Permanent target failure */
>> +#define XEN_VSCSIIF_RSLT_HOST_TARGET_FAILURE      16
>> +/* Permanent nexus failure on path */
>> +#define XEN_VSCSIIF_RSLT_HOST_NEXUS_FAILURE       17
>> +/* Space allocation on device failed */
>> +#define XEN_VSCSIIF_RSLT_HOST_ALLOC_FAILURE       18
>> +/* Medium error */
>> +#define XEN_VSCSIIF_RSLT_HOST_MEDIUM_ERROR        19
>> +/* Transport marginal errors */
>> +#define XEN_VSCSIIF_RSLT_HOST_TRANSPORT_MARGINAL  20
>=20
> Hi Juergen,
>=20
> Would it makes sense to define the values in hex like in include/scsi/scs=
i_status.h
> so that they are more easy to compare?
>=20
> However this looks good to me,
>=20
> Reviewed-by: Luca Fancellu <luca.fancellu@arm.com>
>=20
>=20
>> +
>> +/* Result values of reset operations */
>> +#define XEN_VSCSIIF_RSLT_RESET_SUCCESS  0x2002
>> +#define XEN_VSCSIIF_RSLT_RESET_FAILED   0x2003
>> +
>> DEFINE_RING_TYPES(vscsiif, struct vscsiif_request, struct vscsiif_respon=
se);
>>=20
>>=20
>> --=20
>> 2.34.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 11:27:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 11:27:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293858.499353 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWz9V-0007Kt-7J; Wed, 23 Mar 2022 11:27:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293858.499353; Wed, 23 Mar 2022 11:27:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWz9V-0007Km-4H; Wed, 23 Mar 2022 11:27:45 +0000
Received: by outflank-mailman (input) for mailman id 293858;
 Wed, 23 Mar 2022 11:27:44 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=1OhW=UC=citrix.com=prvs=074292745=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nWz9U-0007Kg-M2
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 11:27:44 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 405f3954-aa9c-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 12:27:43 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 405f3954-aa9c-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648034862;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=PUuKsYI+9lzB9NsbPKIGcMveFcwuOqi1Q29VBFDNSEA=;
  b=YS0hJLwThAr0ExN1LQ33ZV+YO1HSKTCFpHGLl2v5HpBestAKt9AADUM0
   Gl8t6UditsSBY0O8b4LF+pvDnd5G2ic9xrXCIcAX9AdSSzfNc40WFOlId
   11QOU143IeokT0RE1+8dx0Mo7ZmT98rsPeUJvw3xZ3H2KcjGBuLcWiu7s
   s=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66865589
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:G/NNS6Cf409+nhVW/xbjw5YqxClBgxIJ4kV8jS/XYbTApDsg1jwDn
 GBLCGGFPK7ba2amfdF+aNm29hxUuJHUzNFhQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vj2dYx6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhSk
 N5JpL2RWDswFfzAwMMjCjB2DzFxaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguw5K8bmJsUHs2xIxjDFF/c2B5vERs0m4PcGgmdu250eTJ4yY
 eImRwssfSqHYiZgeU0rUJ8usva23H7WJmgwRFW9+vNsvjm7IBZK+KfpGMrYfJqNX8o9tkSFo
 mPL+UzpDxdcM8aQoRKe6W6ljOLLmSL9WaoRGae++/osh0ecrkQDBRtTWValrP2Rjk+lR8kZO
 0ES4jApr6U56AqsVNaVdz+SrWOAvxUcc8FNCOB84waIopc4+C7AWDJCFGQYLoV76olmHlTGy
 2NlgfvKXTdroZy0WE6E3eaY9RSMYAE7MX8NMHpsoRQ+3/Hvp4Q6jxTqR9llEbKogtCdJQwc0
 wxmvwBl2exN0JdjO7GTuAme3mny/sShohsdvF2/Y46z0u9uiGdJjaSM4EOT0/tPJZ3xorKp7
 CldwJj2AAzj4PiweM2xrAclQenBCxWtamS0bbtT838JrmXFF5mLJ9w43d2GDB01WvvogBewC
 KMphStf5YVIIFyhZrJtboS6BqwClPa8SoW6DaGEM4YVPfCdkTNrGgk0OCZ8OEi3zSARfVwXY
 8/HIa5A815EYUiY8NZGb7hEiuJ6rszP7WjSWYr633yaPUm2PxaopUM+GALWNIgRtfrcyC2Mq
 oo3H5bamn13DbylCgGKoNF7ELz/BSVibXwAg5cMLbDrz8sPMDxJNsI9Npt6It07xfsJzrmUl
 px/M2cBoGfCabT8AVziQlhoaa/1XIY5qnQ+PCc2Ok2v1WRlaoGqhJrzvbNuFVX73ISPFcJJc
 sQ=
IronPort-HdrOrdr: A9a23:SkgsU6q00rZPPndk02OwNhgaV5vJL9V00zEX/kB9WHVpm5Oj+P
 xGzc526farslsssREb+OxpOMG7MBThHLpOkPMs1NCZLXTbUQqTXfpfBO7ZrQEIdBeOlNK1uZ
 0QFpSWTeeAcWSS7vyKkTVQcexQueVvmZrA7Yy1rwYPcegpUdAZ0+4QMHfkLqQcfnghOXNWLu
 v52iIRzADQBkj/I/7LTkUtbqzmnZnmhZjmaRkJC1oO7xSPtyqh7PrfHwKD1hkTfjtTyfN6mF
 K12TDR1+GGibWW2xXc32jc49B/n8bg8MJKAIiphtIOIjvhpw60bMBKWqGEvhoyvOazgWxa2+
 XkklMFBYBe+nnRdma6rV/E3BTh6i8n7zvYxVqRkRLY0LvEbQN/L/AEqZNScxPf5UZllsp7yr
 h302WQsIcSJQ/cnQzmjuK4GC1Cpw6Rmz4PgOQTh3tQXc81c7lKt7ES+0tTDdMpAD/60oY6C+
 NjZfusqMq+SWnqLkwxg1MfgOBFBh8Ib1S7qwk5y4GoOgFt7T5EJxBy/r1cop8CnKhNP6Wsqd
 60d5iAr4s+PfP+XZgNdNvpfvHHeFAlYSi8Rl56cm6XXZ3uBRr22uvKCfMOlaWXRKA=
X-IronPort-AV: E=Sophos;i="5.90,204,1643691600"; 
   d="scan'208";a="66865589"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=CEmkRTcOHpF4XY7iYiQyK47oo7eYXsLnsSZ/QfG1CP/22PqTkderPmK1Hp7WkQsbRjxOrnHwkL+fVpO/wFxe2pS5nFeNa18dZmDhuT3ihufjrK342CkTNU/3oypNbix6eGmXzMdt4dpHbneoI27nIvpUhqpoqWtUn/cLovfTRrn8skZ6Q2TqzgnXtOYpUWaTyWNeOMJrn0e69dm7PGamRW3n2ZJgX/Lip0Hj9crWc1be7GdPnfjZHduHh/VFfLRsARa37M/WMgnQl2Uzqht7C+qfmPoxZNS2n0G+PT2IejRTaXFfcvW12dSbu091DbXPISKpSKenXuvl4XMig65Pvg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=eJRdwykLqiv+GY8bF1TVQyPfiATQ129eKW6Yd9R/M1o=;
 b=jD0WyT+Os1iLFpMWZ+xYN4MKQl+QCKbyK1KWbaBzwqPhxbBaoukcOZ7urKrSFo9SsWusISBr86w+PYqUNghCPVBNgma0C1ZzdImF4dSjJZsW3Zefe7z+rVeO+5lOM3QyEmGz7dYALsw05mVNir9lLZRn8W5StuITlse8rdGziw5GaKTkY3nT1pcVJLgKG0c2bWaWYcezcB3ZwYcDz4ckSB79WVwzw4ShFf3FrMiXleFUJ1H2qVK2hJN50VBQzilNqg0csZ6MqPKUDSRl0UAdP2sQWsEZ+OqfqOCTY2QMGpErmzSkDq9leC8TMaJwHytPIbamTfl4M0Nz/x6N/W7I2w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=eJRdwykLqiv+GY8bF1TVQyPfiATQ129eKW6Yd9R/M1o=;
 b=BAeCyxYtI1u7WXTCatYZJCYmMFv2KbfuM8s1KREIfW6Q212zjqXZPFyVRkny2yd6hrmhxn+Ur3UIpzOPLhX+y72y/2HRs9tv2jyQucfoqcNroVMJ9TJ+yQZ3kaJtlxkiJOaUAC4+rd4gqi/PiP24xzS/OdxUJzGJwnJzKDkG4tw=
Date: Wed, 23 Mar 2022 12:27:33 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, George Dunlap
	<George.Dunlap@citrix.com>, Jan Beulich <JBeulich@suse.com>, Stefano
 Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Julien Grall
	<julien@xen.org>
Subject: Re: [PATCH] CI: Don't run Coverity on forks
Message-ID: <YjsEJVbiJxf0bVWx@Air-de-Roger>
References: <20220321135828.3158-1-andrew.cooper3@citrix.com>
 <YjiUDyTDuq5KQT3W@Air-de-Roger>
 <10b64b72-dd9a-a2af-83f2-c42dad5adc9b@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <10b64b72-dd9a-a2af-83f2-c42dad5adc9b@citrix.com>
X-ClientProxiedBy: LO4P123CA0505.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:272::15) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 8611eb7e-8b02-4bd7-0b74-08da0cc0228e
X-MS-TrafficTypeDiagnostic: CY4PR03MB2613:EE_
X-Microsoft-Antispam-PRVS: <CY4PR03MB26134E737888C89D4796218C8F189@CY4PR03MB2613.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(8676002)(4326008)(66946007)(6862004)(508600001)(6512007)(33716001)(9686003)(66476007)(66556008)(85182001)(8936002)(82960400001)(38100700002)(86362001)(2906002)(6486002)(6666004)(316002)(6636002)(54906003)(5660300002)(53546011)(186003)(6506007)(26005);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?eGVqN0NkeHN2YWtiOEU1Wm0vcE9vQmpnK2NXT1JjMUdoWUxkbkVOb1d0WC9s?=
 =?utf-8?B?amtGZmdESFdWUUNxZFJXQWlhZnMzMXF5eFdIcTlDaURvSkcremt6KzNlbnJF?=
 =?utf-8?B?RlVCWXRLak91bDUxT3MwSzcxZVNyOElLdU4wVUhHclBrQkdzSEo0N0U1bHhp?=
 =?utf-8?B?MGwycFNpaHYxUURNeXFOdWVOMEpXMkUybmxiYTIxSithUzl0aysxSFRZZEpt?=
 =?utf-8?B?Sk1ydTk4ZjdMclRMb0tPb1loL0dTQ0YydzE3ZVNOa2lqMmY5eWh6dmRqTXM2?=
 =?utf-8?B?V3JHTGl0TGFvdjRTMUlxQ0ptZlIwUm9kWG5rSEQrTllHTDlPelNtMXQxR2dT?=
 =?utf-8?B?dmFxK3pxeXhjMlYwKy9CTHpIY3NSREtkaXAyUEh5M2tkUkJYKzlNZEJVaGd6?=
 =?utf-8?B?bmxaQmxRT2tlN2ZlYmFwWG5CQmF5QklyTWNVVndXU2REK25XWndKOVFJTzZ3?=
 =?utf-8?B?T2VvZ0hkQm9CZE1RN3JleEhwbUx0amNuWXBCR251Ly9jNzBicytDNzEramYy?=
 =?utf-8?B?L2hLRmRTbXhCUlhzWGF5YWk4SXFzRWlPalRJZWNpN2t2Z2V4SVQ2VG0zY1l6?=
 =?utf-8?B?L3FkTE44OFRGMk53Zm5PdDY5WXRCdE44RFg5Z0ptMXVWVng2eXlqR0JFdWRS?=
 =?utf-8?B?TDNwWHhNdndnRG5JOUc2ZmpzSVNkVG9ZL3BFaEtidHQydG9hZzd2SUdvOGVL?=
 =?utf-8?B?NVJEMDc5cXNmdERxb3dNWlhVV0ExN1lLYXVranFiWFZZZUZMZUR0WjhzR1RE?=
 =?utf-8?B?Z1VlVnBYSHUwZkJvRXBJdXZ3TFo1dlJxRVk1aW9YQURZSjBYeUMxd25paEQ0?=
 =?utf-8?B?ZEp6UXdtRnNyMUtaL2dmSHZSSi81VzVPMGlXdHhacXZDTldaK2xtUWhpamc5?=
 =?utf-8?B?T3hoaWFUWWVuK2R5LzRieGNHNEEwTjZqVVlhc1ExclA0U0NZWWlJd29rWkh5?=
 =?utf-8?B?bEpuWWREbGxHVVRaazQzVDM0SGNsWTlvTHlhSXAzSXkwU1J1TS9NRktneks0?=
 =?utf-8?B?OGQrRWU3RTRBR3FidDh2cGVpTEdQM0dBUy8wYWUwUUhNMzllVFU3TUVHSGox?=
 =?utf-8?B?cFJoOGlQMGgvSmg5YUZlNm1mOXcwdnBsY0M3MVpvTVRqTkxSOFBabkk5bzJV?=
 =?utf-8?B?algwVTZSdURqR2ZyQWRVdU5XRjN3c081MzkwVDl6MVh0am1xUXc0aHUwaTY3?=
 =?utf-8?B?aXA1R1dkSnZIdThocEM1OXI1K0JNZW9UdElsZFBBNlZ3YmloZm9uSUo2cFpF?=
 =?utf-8?B?b2F1cFBtL3VDNFY5N1M1eW9FU0k5MEoxVmxBM0h1dzhwWXA3VjhBRDZ2U0lR?=
 =?utf-8?B?RVMxeW45aklGenFVUmRyY2xmbng4NGNRK1F3QlBEM2RkMlpGWDk5TzVYbm9j?=
 =?utf-8?B?aFNTL0VJKzFvWFRoTE1KbjdoY1BEeUNZUy9MT2RxbTlTUlZvUlp1MHNNdHl2?=
 =?utf-8?B?YVR6WnQ3ckhCYmpjRlJwck9mNkdVUDF2dzNJcytQV015VUFnRnZaMzQ2SUVO?=
 =?utf-8?B?clZqRXdDSHUwTUtQa2k3anZicExJQ3R5d3FTUWQvMFFmK3k2VFJlMHJrd1JY?=
 =?utf-8?B?STRqWDhYLzNsYVc3YUJwenlkRklKa0lWczVRVTNYM3M4TVIxeGx1Vnd2dzh0?=
 =?utf-8?B?dytIQ3YzVy9zdU5mR2ZvUUtnRmxhOStEYkJSRThYeFJRRytmZXpoUUhyWVFq?=
 =?utf-8?B?NGdOOThuZGpzanFXS2NEcDhtYXgyUzBveGYzN1ZJbEpKZTVuRExiTmlEM002?=
 =?utf-8?B?aGJFUkJUeXhsTHQ5SjE5RHdjQ2lqSUpoQVNRai9ENENWd2s0NjFKWUQyanlT?=
 =?utf-8?B?NGtPSnM5a0c1SnpSNGdlcXFJSEc5dmk3MkNzSnNYZkRpRWNRYVBZa0tIVWxJ?=
 =?utf-8?B?MGlHcmNPQmJVbVI4VTBHSzllU2NYVkFadWtNcXljS0RReDdKRTBJZEI5dVdz?=
 =?utf-8?Q?GNlcwksT7b6jaC5WZ98+svVZ1KNRFq70?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 8611eb7e-8b02-4bd7-0b74-08da0cc0228e
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Mar 2022 11:27:38.1365
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: zuHD1/XrFHESIGx9+hL7kI3LwWHzOHQYsRYpShRNywmuXnKWw5PgSMz1ArCew9Qy9tEcnqrCyGtdk7tg3Rib5g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR03MB2613
X-OriginatorOrg: citrix.com

On Wed, Mar 23, 2022 at 11:19:50AM +0000, Andrew Cooper wrote:
> On 21/03/2022 15:04, Roger Pau Monné wrote:
> > On Mon, Mar 21, 2022 at 01:58:28PM +0000, Andrew Cooper wrote:
> >> By default, workflows run in all forks, but the Coverity token is specific to
> >> us, causing all other runs to fail.
> >>
> >> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
> > Acked-by: Roger Pau Monné <roger.pau@citrix.com>
> >
> > Albeit I have a suggestion to make this more useful I think
> >
> >> ---
> >> CC: Roger Pau Monné <roger.pau@citrix.com>
> >> CC: George Dunlap <George.Dunlap@eu.citrix.com>
> >> CC: Jan Beulich <JBeulich@suse.com>
> >> CC: Stefano Stabellini <sstabellini@kernel.org>
> >> CC: Wei Liu <wl@xen.org>
> >> CC: Julien Grall <julien@xen.org>
> >> ---
> >>  .github/workflows/coverity.yml | 1 +
> >>  1 file changed, 1 insertion(+)
> >>
> >> diff --git a/.github/workflows/coverity.yml b/.github/workflows/coverity.yml
> >> index 427fb86f947f..f613f9ed3652 100644
> >> --- a/.github/workflows/coverity.yml
> >> +++ b/.github/workflows/coverity.yml
> >> @@ -8,6 +8,7 @@ on:
> >>  
> >>  jobs:
> >>    coverity:
> >> +    if: github.repository_owner == 'xen-project'
> > Since I don't know anything else similar, why not make this a secret,
> > ie: ${{ secrets.RUN_COVERITY_SCAN }}? So that people could decide to
> > enable coverity on their own repos if desired.
> >
> > We would also need to introduce a ${{ secrets.COVERITY_SCAN_PROJECT }}
> >
> > To allow setting a different project name.
> 
> We wouldn't need a secret here.  We could do it on on the existence of
> the PROJECT field.
> 
> But if we're doing this, then we also need to make the branch selectable
> too via the same mechanism.

Sure, that would be better.

Those don't need to be secrets, but I don't know another way to store
such data in a github project.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 11:30:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 11:30:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293862.499363 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWzBx-0000Ly-P4; Wed, 23 Mar 2022 11:30:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293862.499363; Wed, 23 Mar 2022 11:30:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWzBx-0000Lr-M5; Wed, 23 Mar 2022 11:30:17 +0000
Received: by outflank-mailman (input) for mailman id 293862;
 Wed, 23 Mar 2022 11:30:17 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=1OhW=UC=citrix.com=prvs=074292745=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nWzBw-0000Ll-W5
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 11:30:16 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 9b3046de-aa9c-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 12:30:15 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9b3046de-aa9c-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648035015;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=Xnj9W3T2r1m7wMkRMMAfmCAIFJxY+vLPuYrS4T1sSCY=;
  b=Nc88GO4cUPep6ApEcKWMTbiX/ZonpvNzQB84OD+Z7WjFSd/Q74sRcszm
   wbEOkPrdJfFiLo6Gw9axEEwg/vJN0/5P+p9ONg0b3bsgPa8KL7VR7s14p
   QLCVNb+e0l7tilysiiOguKaARGs6qJVMj4R8tZG/l/luhGn/6ZtV+sus/
   Q=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66957137
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:t/IuwaJcLj4Kc8XQFE+Re5UlxSXFcZb7ZxGr2PjKsXjdYENS1WAFy
 GAYXj+PM6zbZGL9Ltl3Ptm08U8P7ZKBzdc2SABlqX01Q3x08seUXt7xwmUcns+xwm8vaGo9s
 q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUYYoAQgsA148IMsdoUg7wbRh2dQz2YHR7z6l4
 rseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3fMldG0DQUIhMdtNWc
 s6YpF2PEsE1yD92Yj+tuu6TnkTn2dc+NyDW4pZdc/DKbhSvOkXee0v0XRYRQR4/ttmHozx+4
 P5Ih5ruYyItBbHJu8MQECh0PDxQBpQTrdcrIVDn2SCS50jPcn+qyPRyFkAme4Yf/46bA0kXq
 6ZecmpUKEne2aTmm9pXScE17ignBNPsM44F/Glp0BnSDOo8QICFSKLPjTNd9Glu150RRK2BD
 yYfQTh+XS3dcTpiA1BNF5BhkuGqmFLaYRQN/Tp5ooJoujOOnWSdyoPFDt3RfdCbQNRPqWyRr
 GnG4mfRDwkTMZqUzj/t2mm3mubFkCf/WYQTPL617PhnhBuU3GN7IBcbT0ehqP+1zEu3QctCK
 lc88zAr66M18SSDTdTjXhv+vH+NuDYdXcZdF6sx7wTl4qjJ5UCfD2sNTD9EYfQnstM7QXoh0
 Vrht8ztLSxitvuSU3313qeZq3a+NDYYKUcGZDQYVk0V7t/7uoYxgxnTCNF5H8adjNLvHirr6
 yuXtyV4jLIW5eYJyqG68Fbvkz+q4J/TQWYd5A/aQ2ak5QNRf5O+asqj7l2z0BpbBN/HFB/b5
 iFCwpXAqrBVZX2QqMCTaM4ILrf3zdOBCyHZonliXKgN2CmDwEf2KOi8/wpCDEtuN88Ffxrgb
 0nSpR5d6fdvAZe6UUNkS9nvUpp3lMAMAfygD6mJNYQWPvCdYSfdpElTiVisM3cBeaTGuYU2I
 t+lfMmlFh724ow3nWPtF4/xPVLGrx3SJF8/p7iml3xLMpLEPRZ5rIvp1nPXP4jVC4ve/G3oH
 y53bZfi9vmmeLSWjtPr2YASN0sWCnMwGIr7rcdaHsbafFY5ST56Wq+Mneh+E2CAo0izvr2Vl
 p1achUFoGcTeFWdcVnaApydQO2HsWlDQYITYnV3YAfAN4kLaoez9qYPH6bbjpF8nNGPOcVcF
 qFfE+3ZW6wnYm2ep1w1MMmsxKQ/JU/DrV/fYEKYjM0XIscIq/rhoYS/IGMCNUAmU0KKiCfJi
 +b5h12BHsZbGVgK4QS/QKvH8m5ddEM1wYpad0DJPsNSaAPr9o1rIDb2lfg5P4cHLhCr+9dQ/
 1z+7cswzQUVn7IIzQ==
IronPort-HdrOrdr: A9a23:Ptnv26tVz3er9G+bGmDUYbgo7skCk4Mji2hC6mlwRA09TyXGra
 6TdaUguiMc1gx8ZJhBo7C90KnpewK7yXdQ2/htAV7CZnidhILMFuBfBOTZsljd8kHFh4pgPO
 JbAtRD4b7LfClHZKTBkXGF+r8bqbHtms3Y5pa9854ud3AQV0gJ1XYGNu/xKDwOeOApP+tfKH
 LKjfA32AZINE5nJfhSQRI+Lp3+juyOsKijTQ8NBhYh5gXLpTS06ITiGxzd+hsFSTtAzZor7G
 CAymXCl+iemsD+7iWZ+37Y7pxQltek4txfBPaUgsxQDjn3kA6naKloRrXHljEop+OE7kosjb
 D30l0dFvU2z0mUUnC+oBPr1QWl+DEy60X6wVvdunfnqdyRfkNNN+NxwaZiNjfJ4Uspu99xlI
 hR2XiCipZRBRTc2Azg+tnhTXhR5wSJiEtntdRWo21UUIMYZrMUh5cY5llpHJAJGz+/wJw7Ed
 NpENrX6J9tABynhkjizylSKeGXLzcO9k/seDlBhiXV6UkboJlB9TpY+CRF9U1wsa7USPF/lp
 P52+pT5fVzp/QtHNFA7dc6MLuK41P2MGDx2UKpUB3a/fI8SjrwQ6Ce2sRA2AjtQu1O8KcP
X-IronPort-AV: E=Sophos;i="5.90,204,1643691600"; 
   d="scan'208";a="66957137"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=SXTkjpj2wFxkSwSQxkUCvooOxthrGEh/NGqMScccMUxj1cmG8dVPGJ7WJrsYgEzPC+niM7XRD5IxaCYZPR2LrFyr8Uu6ErRj9+ISQnLkUgDT05Aq4byjIr2hLK4D5PS+39ui5QiDGWH6ou1Fr6lRYprFmbcVqUf2VuLjDMDXbeTjKDbPyC3tlzXmIUjh1BMhQkivejNtlmiAUYwh8coylO1tVplpi0GAApfLFnS8OFi+Bwm0jCr4RNKBr+wwe0XAWRBK+d58XTKXVaa48UtROyK2D54/xm8UBoGWBA5nVWDSL8gyxTlpjJO/QGplzrtLq3D9/VchW2vwLy0cUglDLw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=YYb65670eCnKmrXDFHeHWevTmZgqcxIpSxqTpMtnowQ=;
 b=mAdCWMxnJULMf64dPd0licOPNwomG6czbpkI0iVH67W6g9RjRR9V5LGdc1oTBWCXn4jU5Bpei3MpSLyV5Qt6MyfMIOEz4UqZVB2RA1nG0bhzBq4T8d2+5TYvl+yAd8wKic4GX/G3EtHXyhBSx8R5lrkjc5Hs01wSp27qt0Sqlf5Wh0B4bD0DbrkDhMJEIOUb0Ab5wG2iuOLOVbfkBVv0M1O/BsaG++2lw0K7UrlQGpOLTjSYOuir+oa10ovDqeRxQuPnnFYQcZdOt2DDEXKLwOD1Ibh1CMROjnoPhbyZAofHkzcideAOQnhzwVVU3Ykcj3RTkklrPx3QecMpd41K0A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=YYb65670eCnKmrXDFHeHWevTmZgqcxIpSxqTpMtnowQ=;
 b=hr4TRB7QMPeexRM/Qy3/k42qS3UPGr3XfAwcGW32Ch0B/WT4l6PzoazOiU3mL8bEnXPQL9PxAURHERL0QrStHqj7ouqWGE8pf8c46TcVSmSBLeiiJ2zoyDT+odxjcviIKD+rH5twfHpQOIXliSLyVNckEiE4ayYI7NpSK7dllsE=
Date: Wed, 23 Mar 2022 12:30:00 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jane Malalane <jane.malalane@citrix.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, "Anthony
 PERARD" <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien Grall
	<julien@xen.org>, "Stefano Stabellini" <sstabellini@kernel.org>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian
	<kevin.tian@intel.com>
Subject: Re: [PATCH v8 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Message-ID: <YjsEuMBKI4Kp7kDL@Air-de-Roger>
References: <20220316091315.19281-1-jane.malalane@citrix.com>
 <20220316091315.19281-2-jane.malalane@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <20220316091315.19281-2-jane.malalane@citrix.com>
X-ClientProxiedBy: LO4P123CA0090.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:190::23) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 56713707-c13c-4c10-e242-08da0cc07997
X-MS-TrafficTypeDiagnostic: CY4PR03MB2613:EE_
X-LD-Processed: 335836de-42ef-43a2-b145-348c2ee9ca5b,ExtAddr
X-Microsoft-Antispam-PRVS: <CY4PR03MB26130E39488E25E4F04AB9698F189@CY4PR03MB2613.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(8676002)(4326008)(66946007)(6862004)(83380400001)(508600001)(6512007)(33716001)(9686003)(66476007)(66556008)(85182001)(8936002)(82960400001)(38100700002)(86362001)(2906002)(6486002)(6666004)(316002)(6636002)(4744005)(54906003)(7416002)(5660300002)(186003)(6506007)(26005);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?QTdCR2Fyb2Ztc2VYUjFWUlIvLzVJcndTYlpTV2c3SFNTQ3lEYnJPS0s5dzEv?=
 =?utf-8?B?ZlVDRHFmQWZBRXA3M0NJTVFWZmQ2dXRZSXZZejhrYTZoRTlBaEhTSzRwdWZL?=
 =?utf-8?B?aW9TcGZjYXkvaXJnMmNJdWJReExOSUVzMG5MOW56R21kSENKKzc4c0kzSFJH?=
 =?utf-8?B?anNlMzg4KyszakYzaDJ4MmN4UUhQTXRhcUNIaWp3cWpWZVo1UFlGVFZSZ1RJ?=
 =?utf-8?B?RFJadkg0UUdsMmRXdUhYTCs1L0FhYmlhbWVycWUwZ21TUHVCUzRkOHdUZnFO?=
 =?utf-8?B?M24weExLeGZ4VnAvUnRlMWNCdzFlNkhpc0ZtOFU2dEpPNFZUVm53ckJYYjll?=
 =?utf-8?B?MmFjazJIYlhqNi9LVG04SE9yU09BcVYzMDJTZWg0dnpKbkwrZTR4a2kzNmtr?=
 =?utf-8?B?TUV3QlBBRFNEWENtMjMrMU13N3VQclZrQUcwZWVycE9RNVFIN1RQcWMwTzUx?=
 =?utf-8?B?UXZxazZLZ2ZCTUdUWkNqdFhlcGxQdDcxcHlSVXh6S25pNHIyTEtkdjFhei85?=
 =?utf-8?B?YW1VWlVCMm9HaVEydklvQkttTy9DaHZZQ2gwSmZFVUZua0NTVG9aQWR0NXVj?=
 =?utf-8?B?L3haZm5rRjNNYWMxcVE0UEdlTytaTEw2djNpdi9FYjhLMGF3NkQ0NytpZGp3?=
 =?utf-8?B?L2lCUFcvQW5ua0xFUnhUSzVqRHZiWWtqRXpBeGdMTDFZYVdtSkk0K1cvNFZG?=
 =?utf-8?B?K2d5UGdpaFZpdGdxdVg1VXRDSW5wTWF0VU9Db1Z5a2Q3WHNha2JzMTFTS1lC?=
 =?utf-8?B?Nnh4am5LMktOakgrSDhwWlFqRHM3dlcxVzBYQWdicWpiOFdQM01kWFNuNlJV?=
 =?utf-8?B?NXM5Zmc4R05YaVZEMGtiUlBlSnRrVUlYRFVyU0dXdkdoR1dLQXIxSk9ZQm1m?=
 =?utf-8?B?K2ozVkZxL1IwTGx0TEZOTmlxRUhrUXo3RFlkeHJOTjcyOFZhVEVYUU9iVUhZ?=
 =?utf-8?B?STNSTVgzMy9MOUNxUk9laXdNeHh3UFVUWGw3emdDdVY0R2F2UUFwK2pSOEdY?=
 =?utf-8?B?MnhsbGVFZzRTcENWRG1mRGNDZ2lyNllCbVhXeWJEcWJJN0pGblhONkNsdmhu?=
 =?utf-8?B?VFJMOHBIN2dIc3BzTlRnQ1NNR3hwaXJKaXgzVk13OUtCVzdBYytxTlQ2WkxB?=
 =?utf-8?B?eFB0bDRSSGZvRzFpSHp5ODVlOGRZaEdmVWprQnJQemdLWXI2R0lCTkxQMy96?=
 =?utf-8?B?a0xSdEpuZnhVZjh5dWZPVU9oZ21yb0JxSHl6d3cwcUJPZEJOOGorbEd6aUpG?=
 =?utf-8?B?ei9rUHJ4UWQ4QlMzd3dLS2xHQ1R3d0lZdVpkNGVkOXlUWVVFbHhyVGY4Z0ZO?=
 =?utf-8?B?OXRQM0FwYUpTVll0L0gyUkN5Z3ZDTzhtbzlBRzFhWnd5M1NwN2UzQ2RJaXY0?=
 =?utf-8?B?S1FnbGE4R2VJZm0zM2EvbmtJQldkRU1jaklveFNobXZzcm93SGhyZUo5NVpB?=
 =?utf-8?B?bEgybk1kQWpyWUZsaHU1akdKZUhRRGpSRnJjUnBEM1VNb2NYa0tob08yL1Jl?=
 =?utf-8?B?QjlDNnc4cW4yUzF3ZmtDaFFWQzVLSUxOWVJPWTJGU2YyRE5xd25GNkdTUy9X?=
 =?utf-8?B?Vy9SVFpnb3BtNnEzVHdwbHYyV1ltNUczdWV3bU9aalQ2VnVkV1J1cWZ6ZHpw?=
 =?utf-8?B?WGRMeCsxL3lQM1prWkVjcTlGZmpVWmc3VDY1VGxVQnhqMmtvbEdFaUdITzl6?=
 =?utf-8?B?aDJYUUgzcFljUVQyakNNREgza1FjUjZNQlg2UzZiZVdDSzg1eEM2RjY4NExt?=
 =?utf-8?B?YkM5ZFBIK0YxZndFS1BvMkpuVmxPTHE5VXZGVXhxUUZKZURmbzFLTU1Zd3Jj?=
 =?utf-8?B?WGltK3VFakVlT25KdjduUmJDbkduVkFvUUhPOUE5OG9UNjMzdWx3NWJxZ3hE?=
 =?utf-8?B?TWZyVkIxOHlLcy9KTHprck83MDBFaUVyTWdmajgxVnZ1ZVZCYzBqUC9QdHVE?=
 =?utf-8?B?bEQ2ZEFPMUNJUno4WmhQbUIra2JnUGpJWU1mYkRwdWJ2Z3Z5Y2xtQkc5cXl0?=
 =?utf-8?B?eUFBbDM0T2h3PT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 56713707-c13c-4c10-e242-08da0cc07997
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Mar 2022 11:30:04.3047
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: hZx+0HMSLKgp3CZoR+gdTOAwqvUWyPMPS6uSTmuC4M++5yZEppMKU3ynS2pDm11I7aE/XGSfjVjk9EmX1foeOQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR03MB2613
X-OriginatorOrg: citrix.com

On Wed, Mar 16, 2022 at 09:13:14AM +0000, Jane Malalane wrote:
> diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
> index e1e1fa14e6..77ce0b2121 100644
> --- a/xen/arch/x86/hvm/vmx/vmcs.c
> +++ b/xen/arch/x86/hvm/vmx/vmcs.c
> @@ -343,6 +343,15 @@ static int vmx_init_vmcs_config(bool bsp)
>              MSR_IA32_VMX_PROCBASED_CTLS2, &mismatch);
>      }
>  
> +    /* Check whether hardware supports accelerated xapic and x2apic. */
> +    if ( bsp )
> +    {
> +        assisted_xapic_available = cpu_has_vmx_virtualize_apic_accesses;
> +        assisted_x2apic_available = cpu_has_vmx_virtualize_x2apic_mode &&
> +                                    (cpu_has_vmx_apic_reg_virt ||
> +                                     cpu_has_vmx_virtual_intr_delivery);
> +    }

I'm afraid using cpu_has_vmx_* is not correct here. The
vmx_secondary_exec_control variable hasn't been set here, so you will
need to move those checks to the end of the function, after
vmx_secondary_exec_control has been set.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 11:58:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 11:58:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293866.499375 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWzcl-0002so-SL; Wed, 23 Mar 2022 11:57:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293866.499375; Wed, 23 Mar 2022 11:57:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWzcl-0002sh-No; Wed, 23 Mar 2022 11:57:59 +0000
Received: by outflank-mailman (input) for mailman id 293866;
 Wed, 23 Mar 2022 11:57:58 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=1OhW=UC=citrix.com=prvs=074292745=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nWzck-0002sb-By
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 11:57:58 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 78c2ebd7-aaa0-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 12:57:56 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 78c2ebd7-aaa0-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648036676;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=XtJc9h+0ftdD0vMuq9LZdhA76PLLT95v1GXDLXz+d7Y=;
  b=PlV5FuFoSUADWzXG7+oB08/NKf/a0cVDMt6W/AkM2kFQOw/8D4cqAcXp
   i5WEPZush1kxfUYtXj8haTaspp3o44lj/Hd+xZi9P6dopsMbvN8TATJZg
   0zUNhnD2lf4zFihqtXQ2HSMxQK39gMvFhI9WNrHeDnsnKbvwZNf41oKQd
   U=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66867415
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:lx15lKCH5elvmhVW/9Tjw5YqxClBgxIJ4kV8jS/XYbTApDMn0jJWz
 jAcDTiEPvmOMTOjfIwkbIW29k4Ov8PSydA1QQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vj2dYx6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhOz
 /xTsp+6dj4FGYmRgvsdQzobNBtXaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguw5K8bmJsUHs2xIxjDFF/c2B5vERs0m4PcGgmdu2ZwXQJ4yY
 eISez9hYSnPWSRAHU4tOJcykf6Er2TWJmgwRFW9+vNsvjm7IBZK+KP2LNPfd9iORMNUtkWVv
 GTL+yL+GB5yHN6CzTuI9Fq8i+mJmjn0MKosE7m/+u9vkUek7GUZAx0LVnO2ufC8zEW5Xrp3J
 0UK9wI0oKM19UjtScPyNzWnpFaUsxhaXMBfe8Uq5QfIxqfK7gKxAmkfUiUHeNEgrNUxRzEhy
 hmOhdyBLT5lvaCRSHmd3qyJtj70Mi8QRUcAajUDVhAt+MT4rcc4iRenczp4OPfr1JuvQ2i2m
 m3U6nhl71kOsSIV/5q81E7AgDiTn7TualMv+QXHfSGC1CosMeZJeLeUwVTc6P9BKqOQQV+Ao
 GUIlqCi0QweMX2evHfTGbtQRdlF897AaWSB2gA3Q/HN4hz3oxaekZZsDCaSzauDGuINYnfXb
 UDaomu9D7cDbSLxPcebj29cYvnGLJQM9/y4Dpg4jfIUO/CdkTNrGgk3NCZ8OEi3zCARfVkXY
 8vzTCpVJS9y5V5b5DS3XfwB9rQg2zozw2jeLbiikUj4gOXFNS7IFexaWLdrUgzfxPnZyOky2
 4wCX/ZmNj0FCLGuCsUp2dB7wa82wYgTWsmt9p0/mh+rKQt6AmAxY8I9Mpt6E7GJa599z7+Sl
 lnkAxcw4AOm2RXvdFXbAlg+OeiHdcsu8hoG0dkEYA/AN44LOt30ss/ytvIfINEayQCU5aUtH
 qdfJJnYXKgnp/au0211UKQRZbdKLXyDrQmPIzCkcH44eZthTBbO4djqYk3k8yxmM8Z9nZFWT
 2GIvu8Dfac+eg==
IronPort-HdrOrdr: A9a23:/XFyiaDf8QI723vlHehOsceALOsnbusQ8zAXPh9KJiC9I/b1qy
 nxppkmPH/P6Qr4WBkb6Le90Y27MAnhHPlOkPQs1NaZLXLbUQ6TQr2KgrGSoQEIdxeOk9K1kJ
 0QD5SWa+eAfGSS7/yKmTVQeuxIqLLskNHKuQ6d9QYUcegDUdAf0+4TMHf8LqQZfngjOXJvf6
 Dsmfav6gDQMUg/X4CePD0oTuLDr9rEmNbPZgMHPQcu7E2rgSmz4LD3PhCE1lNGOgk/i4sKwC
 zgqUjU96+ju/a0xlv10HLS1Y1fnJ/ExsFYDMKBp8AJInHHixquZq5mR7qe1QpF692H2RIPqp
 3hsh0gN8N85zf4eXy0mwLk303a3DMn+xbZuCilqEqmhfa8aCMxCsJHi44cWADe8VAcsNZ117
 8O936FtrJMZCmw0xjV1pztbVVHh0C0qX0tnao4lHpES7YTb7dXsMg24F5VKpEdByj3gbpXXN
 WGNPuspcq+TGnqL0ww5gJUsZ+RtzUIb1q7q3E5y4KoO2M8pgE686MarPZv6kvouqhNDqWs3N
 60QZiApIs+PvP+UpgNdtvpYfHHfFAlEii8eV57HzzcZdQ60jT22trK3Ik=
X-IronPort-AV: E=Sophos;i="5.90,204,1643691600"; 
   d="scan'208";a="66867415"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=E3nzclvhT2/MzXatSsjXn9eeUhTz8/W+tROdaZvyn+YPupWsTmcunvfZJVMZ3n1HfPL4wgEdDlMc5uWVmmJS0HZEB22atYgqHFK/GkGYbzLL/3zz+a5rMEVeu+dbBj5OlzCoHQh3qj+Ft1U9aOFUNYOeZ9C0/Ao79Lj98Hao56j8xJp6S2/kPoX7u55ra/HygsR1pn0nbX6K3Ki4b74PHhGzCdHnGnxa4MGV9i6VQ7Qoc8CUHFKHQ/vMXcM0sxXwsjrGuhMjy/B2h7hr8i8yUaZlpYJJgrKfJMDH/l/ctPWafSqXRKcMVdby2cB1+B7/ERXLx9PWAZN8XBtYWrMFAQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=wPeZtRLTus5YBLGtYqFQUxPWCUlY+spDebLkuRAY0h0=;
 b=AtTr4TFpw7xZIgjvkoglIyZ623rSbcjb6+g0bgAvdDjly8Ikgy4eRdcV0mEviHXeI9byCgtDuEemvXfeyptgwERkImH05tZDqvT1ir10SuRUGscSq6FBTONuOMAsrJ2/5DNj4lslnVW9PMW05wg/F5zxYQAi3VdNZ4PGJCeTQh2hMc/8oLnmNKJmAZ3/X4q83BJDxyhB2zM689f9aU4wjrmuI1o6qc1nCVbZkLcZXi0qIZrX6YJEDmhqP9GYntDvtO5irt3pcT7XtsEqlJCqsO3Cv08vel7zsAzXdCAeLBAyFMrAWYFvAOwse8Dj6UB1hQVdw9VkzoSeXMsJb9Obrg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=wPeZtRLTus5YBLGtYqFQUxPWCUlY+spDebLkuRAY0h0=;
 b=nYmxjPREt3/2WLimBYp9YLgG8EATJnzHtfZBrqrurTTlPUBFbvxXSw9HxvLHwRxDK+P4NpO/NX2yatDVQhoKPoW4Pfpu6uFWca6L2ggtmvbiDG6hBwhmYZnWKN3EgcVFk1JYcvckpDnHf3NobyYwnaafrc3Ql01X4JB9rLtRJDI=
Date: Wed, 23 Mar 2022 12:57:43 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jane Malalane <jane.malalane@citrix.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, Anthony
 PERARD <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, Andrew
 Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>, Julien Grall <julien@xen.org>, Stefano
 Stabellini <sstabellini@kernel.org>, Christian Lindig
	<christian.lindig@citrix.com>, David Scott <dave@recoil.org>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH v8 2/2] x86/xen: Allow per-domain usage of hardware
 virtualized APIC
Message-ID: <YjsLN5Kre4BdRlI1@Air-de-Roger>
References: <20220316091315.19281-1-jane.malalane@citrix.com>
 <20220316091315.19281-3-jane.malalane@citrix.com>
 <YjL4J9wDGCtc/rRv@Air-de-Roger>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <YjL4J9wDGCtc/rRv@Air-de-Roger>
X-ClientProxiedBy: LO2P265CA0491.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:13a::16) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5bffbaf5-613d-4c46-c870-08da0cc45a73
X-MS-TrafficTypeDiagnostic: BN6PR03MB2961:EE_
X-Microsoft-Antispam-PRVS: <BN6PR03MB2961F7ACA628E036EA6225EA8F189@BN6PR03MB2961.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(86362001)(6486002)(186003)(26005)(316002)(5660300002)(33716001)(54906003)(6636002)(2906002)(83380400001)(66946007)(6506007)(66556008)(508600001)(4326008)(38100700002)(8676002)(6862004)(85182001)(66476007)(6512007)(9686003)(82960400001)(6666004)(8936002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?SDk1T0x6NDkzNDRLRTV5UXFGbUhxcmJpS2R1Z05pazdkMnkrd3pWQ2hVSzVQ?=
 =?utf-8?B?cFVwMUkzakJYcWxFOVcxemNjVWora2gzU0UzNHpQTU9YQTNsSXNhWTd1cnpt?=
 =?utf-8?B?ZUlxU2x5U0doMVhzYnd2STdnbEVTRUdXM1VyN0lPWjdGdWQwYlhyS2JHeGhF?=
 =?utf-8?B?dXNIVXQxeDA2Wm9EY3ZTeENGdGFGMG1Jck9FaVhDTVVEcXRDTklLOWJnT0l1?=
 =?utf-8?B?THBESXJuejRBbTBoNWpocE9uMDZMa0xnTnovaFY3bEpTZ1g2b0Zmems5b0hp?=
 =?utf-8?B?UURjNFN0UXNIcjBPTzRWSEd3T3J0bnBTbmdWTmpHa0hsTkRjS3laV0tuY2RZ?=
 =?utf-8?B?cldobzdBUVI3VWUxSlMzeVE3ZG9ZM1czZnNUZmJuTFF2WStkV2RtUTAybFVG?=
 =?utf-8?B?eWpiYjg4TkE4RDhSNWJZNEd3SkZlMHd1YXlxeDQyZEdHeU1CM2RWNzA0cUR2?=
 =?utf-8?B?dVNKcXNEbnYrV0NDL0xxYXJjZVFOTHVHYU9RbnhtaEpwZmZFNHNsQTh2UmRs?=
 =?utf-8?B?dEZjVm1NOUwwMzZsOCs5Vi9CdzRzVTNobHV0Zjd2d1lQRlpnTG90dGlCSnBH?=
 =?utf-8?B?OHNUNEtTdFlUa0dvWHJRTHJrVkpDcnFjbG5Udy85UWVOVzk5N2tvbHdWUHNX?=
 =?utf-8?B?S2FHNEVRWEd3UkY4bUc2V2tjc3RuelZWYnVTZ1A2UmNWNk9NZEFTWnVvUUYv?=
 =?utf-8?B?RE5GS29oZDRLRTdBN2JhZGpTKzlrOGRjWkRCK2J4QVQ0MGlDVWpsdkRaSkE5?=
 =?utf-8?B?dVpMWGxUM2o3MkZIaFYvcHlQbkhKMTZ4WVZJaVNPQTFYc3ZEdlM5T1hoekQ4?=
 =?utf-8?B?NUkxWjNtYnFFZEVGUEQ1VjZmSHczb0xmQ0o3cVdBMkJOOHM0cVFYTER2SHRV?=
 =?utf-8?B?MU9DSTFieEZBK1o2TDVrZWJ2QngxZGkwQ1J4OTU4WkQ4QmNnUUw0TllvSm05?=
 =?utf-8?B?dGpQb244SGhJWXJnM0tubzNlK3Rwait2emQ4SkhiUTl0QmJLTmwxTVoyMTZZ?=
 =?utf-8?B?anB6R1lERWZlNXdheUJGQ1JDMlJ3eDFKaUVDRFczYTh0NEkvZC9IemJXRGps?=
 =?utf-8?B?NzArMDFwMUw4MVc2WDVPK3dCelVGVGdyVGR6bzlkV3dKQW40VjNBV3d0citl?=
 =?utf-8?B?SFRTTHZVT1YzbDMwbkdHdm1yQ01WS1F4aWlwK21CQTNKMWh6cDVXUFVxNTgr?=
 =?utf-8?B?ZXhhTUMyb0t5RTFZNlVCTENCeDJ4UW9qYXNSK3FvN0x4enJ4K2FWdytmSDRY?=
 =?utf-8?B?T1JSK2NnVXdtNXRiRFFWTmNOMTNiZnZ3T2JPVGJHNWFkUVd5OFQxWHJPT2ov?=
 =?utf-8?B?SEovZDF4aHBzNVFQVzhMN1NPSEtqMWNHWVhxOHhUSmpRT2RpVmE5T0l1Tlly?=
 =?utf-8?B?bmg0aGs4eE45cE1QV2dYQjlGRSsxejI2ZVloMkVpdVhaaS94MDI5WTAvNGhU?=
 =?utf-8?B?ZTNIRC9zV3BGY0k4NmFEMTNRR0pyTnNqWnNyVW1LNWVwVDlBRENrbGlOdklr?=
 =?utf-8?B?ZldncE1CVmJWVW83eW50Y1NrZmdqZEsvcWtzb2E4MEV0RDh6RVhTTWJGRlBE?=
 =?utf-8?B?WkthVDB5QnVia0ZWWnJlOTlZb216WjFCY1NiN0Rja25EQ2ZNTUZTN291eFRN?=
 =?utf-8?B?dVo0SU05M0pXaWhQNHpHZGhWRE14cHF3eUlCS0ZBdzFJZkxPVnlTL1d4R0d3?=
 =?utf-8?B?MjYwU1p4YjlhWU9jdDVPKzUraGxXSnRkRk1FRzdXM0F1NWZVV0ZkcDZTNDM1?=
 =?utf-8?B?SklaLzBTT0ttdTlPN1A0YlQrTlZ0dHVrUHFZTGdWNWdFNmJPK0xJTzltc3V3?=
 =?utf-8?B?bTdhZndWWDlBdks2TFBvNFpmbjhUM09vbyt6Y0ZLbExPRHM5aUI0a1dhQkdE?=
 =?utf-8?B?ajFRRE1JTWRDcnZrSWtMMzM2c1R5eit4SGR6WFFkWWtMcU1vc0NZbjdCVU5T?=
 =?utf-8?B?b1Nhako3RzFDSkphY1plTDlWQTgyR0pibE9lc2paMXJ4V1lUL25vSlpCZEtv?=
 =?utf-8?B?ck1sRlVNYXVBPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 5bffbaf5-613d-4c46-c870-08da0cc45a73
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Mar 2022 11:57:50.1068
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: rgy4l4qvriFl7WG3KtdDDLEl/C9Qwkeh7bJhCIiKwAwHIGEyjqQ7pJvlkYTDNpUM09a20C5kMNLExnaltQ7a8g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR03MB2961
X-OriginatorOrg: citrix.com

On Thu, Mar 17, 2022 at 09:58:15AM +0100, Roger Pau Monné wrote:
> On Wed, Mar 16, 2022 at 09:13:15AM +0000, Jane Malalane wrote:
> > Introduce a new per-domain creation x86 specific flag to
> > select whether hardware assisted virtualization should be used for
> > x{2}APIC.
> > 
> > A per-domain option is added to xl in order to select the usage of
> > x{2}APIC hardware assisted virtualization, as well as a global
> > configuration option.
> > 
> > Having all APIC interaction exit to Xen for emulation is slow and can
> > induce much overhead. Hardware can speed up x{2}APIC by decoding the
> > APIC access and providing a VM exit with a more specific exit reason
> > than a regular EPT fault or by altogether avoiding a VM exit.
> > 
> > On the other hand, being able to disable x{2}APIC hardware assisted
> > virtualization can be useful for testing and debugging purposes.
> > 
> > Note: vmx_install_vlapic_mapping doesn't require modifications
> > regardless of whether the guest has "Virtualize APIC accesses" enabled
> > or not, i.e., setting the APIC_ACCESS_ADDR VMCS field is fine so long
> > as virtualize_apic_accesses is supported by the CPU.
> 
> Have you tested migration of guests with this patch applied?
> 
> We need to be careful so that a guest that doesn't have
> assisted_x{2}apic set in the config file can be migrated between hosts
> that have different support for hardware assisted x{2}APIC
> virtualization.
> 
> Ie: we need to make sure the selection of arch_x86.assisted_x{2}apic
> is only present in the migration stream when explicitly set in the
> configuration file.

I've tested this myself, and the behavior seems to be correct. The
selection is only present on the stream when explicitly set by the
user.

> > diff --git a/tools/xl/xl.h b/tools/xl/xl.h
> > index c5c4bedbdd..528deb3feb 100644
> > --- a/tools/xl/xl.h
> > +++ b/tools/xl/xl.h
> > @@ -286,6 +286,8 @@ extern libxl_bitmap global_vm_affinity_mask;
> >  extern libxl_bitmap global_hvm_affinity_mask;
> >  extern libxl_bitmap global_pv_affinity_mask;
> >  extern libxl_domid domid_policy;
> > +extern int assisted_xapic;
> > +extern int assisted_x2apic;
> >  
> >  enum output_format {
> >      OUTPUT_FORMAT_JSON,
> > diff --git a/tools/xl/xl_parse.c b/tools/xl/xl_parse.c
> > index 117fcdcb2b..f118dc7e97 100644
> > --- a/tools/xl/xl_parse.c
> > +++ b/tools/xl/xl_parse.c
> > @@ -2761,6 +2761,24 @@ skip_usbdev:
> >  
> >      xlu_cfg_get_defbool(config, "vpmu", &b_info->vpmu, 0);
> >  
> > +    if (b_info->type != LIBXL_DOMAIN_TYPE_PV) {
> > +        e = xlu_cfg_get_long(config, "assisted_xapic", &l , 0);
> > +        if ((e == ESRCH && assisted_xapic != -1)) /* use global default if present */
> > +            libxl_defbool_set(&b_info->arch_x86.assisted_xapic, assisted_xapic);
> > +        else if (!e)
> > +            libxl_defbool_set(&b_info->arch_x86.assisted_xapic, l);
> > +        else
> > +            exit(1);
> > +
> > +        e = xlu_cfg_get_long(config, "assisted_x2apic", &l, 0);
> > +        if ((e == ESRCH && assisted_x2apic != -1)) /* use global default if present */
> > +            libxl_defbool_set(&b_info->arch_x86.assisted_x2apic, assisted_x2apic);
> > +        else if (!e)
> > +            libxl_defbool_set(&b_info->arch_x86.assisted_x2apic, l);
> > +        else
> > +        exit(1);
> 
> Indentation seems wrong in the line above.

The chunk above is also logically wrong, because it will exit(1) if
no assisted_x{2}apic option is provided on either the guest or the
global config files.

I think:

        e = xlu_cfg_get_long(config, "assisted_xapic", &l , 0);
        if (!e)
            libxl_defbool_set(&b_info->arch_x86.assisted_xapic, l);
        else if (e != ESRCH)
            exit(1);
        else if (assisted_xapic != -1) /* use global default if present */
            libxl_defbool_set(&b_info->arch_x86.assisted_xapic, assisted_xapic);

        e = xlu_cfg_get_long(config, "assisted_x2apic", &l, 0);
        if (!e)
            libxl_defbool_set(&b_info->arch_x86.assisted_x2apic, l);
        else if (e != ESRCH)
            exit(1);
        else if (assisted_x2apic != -1) /* use global default if present */
            libxl_defbool_set(&b_info->arch_x86.assisted_x2apic,
                              assisted_x2apic);

Is better.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 12:12:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 12:12:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293871.499386 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWzqR-0005Jw-5F; Wed, 23 Mar 2022 12:12:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293871.499386; Wed, 23 Mar 2022 12:12:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWzqR-0005Jp-1o; Wed, 23 Mar 2022 12:12:07 +0000
Received: by outflank-mailman (input) for mailman id 293871;
 Wed, 23 Mar 2022 12:12:05 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=E8iV=UC=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nWzqP-0005JQ-3m
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 12:12:05 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 7330f53f-aaa2-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 13:12:03 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 6011B1F37F;
 Wed, 23 Mar 2022 12:12:03 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 3A2FF132BA;
 Wed, 23 Mar 2022 12:12:03 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id KjvbDJMOO2LxfwAAMHmgww
 (envelope-from <jgross@suse.com>); Wed, 23 Mar 2022 12:12:03 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 7330f53f-aaa2-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648037523; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=zCsGzqigVI6l83Qgei5aX4ROvt2TW2vFKVAVCIYcWq0=;
	b=F8+AaayAOLfDFxECRZCLhVZVcOFOP22IFGDBgOk+YYxaxxVOt72EjqwIIae7UuCxSfya+C
	YWzgvggvadowP3DoD/Zwl/x9YXawM1wQptOnPKBnp28M15pF391sCkiUj6/iVF+eVFTrYs
	f9aB4ZeRhpSjqLHXcBz6sMufVPL7lW4=
Message-ID: <018d1ab1-c661-2e4c-1e70-ee0f8f3f24ce@suse.com>
Date: Wed, 23 Mar 2022 13:12:02 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2] include/public: add command result definitions to
 vscsiif.h
Content-Language: en-US
To: Luca Fancellu <Luca.Fancellu@arm.com>
Cc: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <20220323085831.27057-1-jgross@suse.com>
 <C69C67B6-4959-4594-A32B-78044CB0EDB2@arm.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <C69C67B6-4959-4594-A32B-78044CB0EDB2@arm.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------b2hbZBvbBfQozz0P8B0nzBS8"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------b2hbZBvbBfQozz0P8B0nzBS8
Content-Type: multipart/mixed; boundary="------------50jKW0DJfQ869GppBOFgwMlB";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Luca Fancellu <Luca.Fancellu@arm.com>
Cc: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Message-ID: <018d1ab1-c661-2e4c-1e70-ee0f8f3f24ce@suse.com>
Subject: Re: [PATCH v2] include/public: add command result definitions to
 vscsiif.h
References: <20220323085831.27057-1-jgross@suse.com>
 <C69C67B6-4959-4594-A32B-78044CB0EDB2@arm.com>
In-Reply-To: <C69C67B6-4959-4594-A32B-78044CB0EDB2@arm.com>

--------------50jKW0DJfQ869GppBOFgwMlB
Content-Type: multipart/mixed; boundary="------------tA0YNQWcKizMJ01aTIC9o0lJ"

--------------tA0YNQWcKizMJ01aTIC9o0lJ
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------tA0YNQWcKizMJ01aTIC9o0lJ
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------tA0YNQWcKizMJ01aTIC9o0lJ--

--------------50jKW0DJfQ869GppBOFgwMlB--

--------------b2hbZBvbBfQozz0P8B0nzBS8
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmI7DpIFAwAAAAAACgkQsN6d1ii/Ey8l
mwf/dyKdpSrl8+VCIp+v859rYF/VxMPWdGe7z4l0aDzRoezulShZbKKIrotDMjp8gxX0SjK0noME
k5o3uXEDASINWPYDjVc0xxRYau99w7LzJOwqAH+3JcawCeNlJnRSKCTHP4Chx7PlHjHvAirYAK+H
8SH3n7R9W+RSGknIEZAWPsnpeTZt17N+mZXh+qFpRI8k1TPv60LyDmfPxuZNKBhnQILZl2QL1X5J
qlAf9cA957gOrKZ/YglH6xVbOxb2nerHSnDv/KcIwSKke+JCc2JvLVAwQQNavQQkfu/iTHxhTeMU
QuROCsbIYF6n4jdAEhX39K7xCsC0afLhfC9y8Hu/oA==
=1ADw
-----END PGP SIGNATURE-----

--------------b2hbZBvbBfQozz0P8B0nzBS8--


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 12:13:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 12:13:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293874.499396 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWzs6-0005sy-GY; Wed, 23 Mar 2022 12:13:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293874.499396; Wed, 23 Mar 2022 12:13:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nWzs6-0005sr-DE; Wed, 23 Mar 2022 12:13:50 +0000
Received: by outflank-mailman (input) for mailman id 293874;
 Wed, 23 Mar 2022 12:13:48 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=E8iV=UC=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nWzs4-0005si-UW
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 12:13:48 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id b11f7f74-aaa2-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 13:13:47 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 5E522210F4;
 Wed, 23 Mar 2022 12:13:47 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 48C38132BA;
 Wed, 23 Mar 2022 12:13:47 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id 5D1IEPsOO2L5AQAAMHmgww
 (envelope-from <jgross@suse.com>); Wed, 23 Mar 2022 12:13:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b11f7f74-aaa2-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648037627; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=7/HcKW6ZS3Tq2LqI1/wXTCckKPaDhzm22jBh5Hg3mdM=;
	b=p/R9lXePWwX6Xb3iD++X7tgAM5C+h+y9FZSuqTuyG35vcCjz1vxZGFGCwV2Vc0Cv9PznAO
	Ney069/t+J/0SEKIldWwP06hwexOjJvOyVvW3DwXrL2UmhVDHvqLyWgSVpLY2tXB2Bixj5
	G1o+1D0+oQDAIFbelC76JFLbsLILwxM=
Message-ID: <0c85502e-f654-ff56-acec-d20b0c7bb7e2@suse.com>
Date: Wed, 23 Mar 2022 13:13:46 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2] include/public: add command result definitions to
 vscsiif.h
Content-Language: en-US
To: Luca Fancellu <Luca.Fancellu@arm.com>
Cc: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <20220323085831.27057-1-jgross@suse.com>
 <C69C67B6-4959-4594-A32B-78044CB0EDB2@arm.com>
 <E1CB4644-C2B7-428F-A3F5-AD15681A0E01@arm.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <E1CB4644-C2B7-428F-A3F5-AD15681A0E01@arm.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------ZNS0THHpRNqL01ytEQLb04tT"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------ZNS0THHpRNqL01ytEQLb04tT
Content-Type: multipart/mixed; boundary="------------twi0zjI6fDS9ySqhbJXyjl0A";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Luca Fancellu <Luca.Fancellu@arm.com>
Cc: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Message-ID: <0c85502e-f654-ff56-acec-d20b0c7bb7e2@suse.com>
Subject: Re: [PATCH v2] include/public: add command result definitions to
 vscsiif.h
References: <20220323085831.27057-1-jgross@suse.com>
 <C69C67B6-4959-4594-A32B-78044CB0EDB2@arm.com>
 <E1CB4644-C2B7-428F-A3F5-AD15681A0E01@arm.com>
In-Reply-To: <E1CB4644-C2B7-428F-A3F5-AD15681A0E01@arm.com>

--------------twi0zjI6fDS9ySqhbJXyjl0A
Content-Type: multipart/mixed; boundary="------------o0v9kl9lWl0vFDfWcJQ7aGvm"

--------------o0v9kl9lWl0vFDfWcJQ7aGvm
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------o0v9kl9lWl0vFDfWcJQ7aGvm
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------o0v9kl9lWl0vFDfWcJQ7aGvm--

--------------twi0zjI6fDS9ySqhbJXyjl0A--

--------------ZNS0THHpRNqL01ytEQLb04tT
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmI7DvoFAwAAAAAACgkQsN6d1ii/Ey8C
Ywf+ILuDZGkTexddQ5aRXdlS4KL7MKf/1di8fYK7v0HrtvSV2FMQtUPfHl5VXQ1qVsd3fTiW5gtb
NO77KBP0fR7eIpFEYMohgRiz6brC4EePH/mQDwLioCgtOxD/JEyoKoAxlcseDXo/TJEQ3IcGNHDi
VaiYDznwkMOExROZT/4oFfTbgIKsSC7WdVazzuwt2peO0ox4z2OdLMAmD5wpazFgqG1jeR046Xlc
Vx+tzbDUuPvApXUdXpupU2YNX9wRZFi/aKucOaMkVlbD4YWo8Rz2e0RKZO49IV5pVzlN5VwaavDT
8ftMWQUK0lC6mMT9xdTkblyXsWoGNVAovKQBYXZwRg==
=6H/G
-----END PGP SIGNATURE-----

--------------ZNS0THHpRNqL01ytEQLb04tT--


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 12:36:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 12:36:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293879.499408 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX0Dw-0008Lz-Cg; Wed, 23 Mar 2022 12:36:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293879.499408; Wed, 23 Mar 2022 12:36:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX0Dw-0008Ls-9a; Wed, 23 Mar 2022 12:36:24 +0000
Received: by outflank-mailman (input) for mailman id 293879;
 Wed, 23 Mar 2022 12:36:23 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=hFSt=UC=citrix.com=prvs=074729667=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nX0Du-0008Lm-Nq
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 12:36:23 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id d61136dc-aaa5-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 13:36:19 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d61136dc-aaa5-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648038979;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=zkWRf2qNvZGX3PK4pKDgbGQUFAsVK8mVCexAGI9THbE=;
  b=WViE2ZjQXFCPLG93Zso0SOrq0AL8qMMozHZMiDAgaxpEHA1jE1i+pDAI
   hpjyMVUiR5DZs9Or3Jt0qatSFLYZxywRfoui5a3xpitEIMQF0cMuCqgB4
   3IAJCqkXeGbZvdH3c+D2Ya33zI8BOrWeJWH2/Crf/RHtD6EeN/Jx49IYK
   Y=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66955240
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:lfISJquxQlBb4vOM2BX+a+PXSefnVKZeMUV32f8akzHdYApBsoF/q
 tZmKWGCa67eYGL9LdsiO96ypx8OsJHUzIJjQFQ6+XgzE3sb+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jX4
 ouryyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi8GDqnnx7smSyJdPBBbAqpJxfiAMXGG5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvllJyz3DAOlgapfEW6jQvvdT3Ssqh9AIFvHbD
 yYcQWQxPUmdOUEXUrsRIJUHuNi2hlXjSjZz9EjLt/cQ2XbX6BMkhdABN/KKI4fXFK25hH2wr
 G/c437wBB1cMdWF0CeE6VqlnOqJliT+MKosE7m/+u9vkUek7GUZAx0LVnO2ufC8zEW5Xrp3M
 FAZ9CMoqu4p6EWhQ935Xhu5iG6Fuh8aS5xbFOhSwBqW1qPe7gKdB24FZj1MctorsIkxXzNC/
 k+EmZblCCJitJWRSGmB7fGEoDWqIy8XIGQeIygeQmMt4cTnoYw1pgLCSJBkCqHdszHuMWium
 XbQ9nF43uhNy55Qv0mmwbzZqx2corOWETUt3QD4b0ea6QxEI8m1brX9vDA38s18BIqeS1CAu
 l0NlM6f8P0CAPmxqcCdfAkeNOr3vqjYaVUwlXYqRsB8rGr1pxZPaKgKuFlDyFFV3tHokNMDS
 Gvaoktv6ZBaJxNGhocnMtvqW6zGIUUNfOkJt8w4jPITOvCdlyfdpUmCgHJ8OUi0wSDAdollZ
 f+mnT6EVypyNEie5GPeqx0h+bEq3Dsi4mjYWIr2yR+quZLHOiLKGOheYQvTMrtmhE9hnOkz2
 4wCXydt408CONASnwGNqdJDRbz0BSZT6W/KRzx/KbfYf1sO9JAJAP7N27IxE7GJbIwO/tokC
 kqVAxcCoHKm3CWvAVzTNhhLNeO+Nb4i/ClTFXF9Yj6VN40LPN/HAFE3LMBsI9HKNYVLkJZJc
 hXyU57ZU6oVFWifpWh1gFuUhNUKSSlHTDmmZkKNSDM+Y4RhV0rO/NrldRHo7y4AEmy8ss5Wn
 lFq/lqzrUYrL+i6MPvrVQ==
IronPort-HdrOrdr: A9a23:0XzXIa5X9B9z7SCNKwPXwMzXdLJyesId70hD6qkXc20zTiX4rb
 HLoB1/73TJYVkqNE3I9eruBEDiexPhHPxOj7X5VI3KNGOKhILCFuBfxLqn7zr8GzDvss5xvJ
 0QFpSW0eeAbmSSW/yKgjWFLw==
X-IronPort-AV: E=Sophos;i="5.90,204,1643691600"; 
   d="scan'208";a="66955240"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=bng6SWTF9odq10gMErdQOLCgak/C6SS2s0AKEzxW1G60jsRVXmAVwzxsi1MGPcSKtZdDTBO4KB57AFkgU4KQ3ELCZQ5wACisO+pe5EmBQ8GZ5i6wTvVoDgyYUyjvjtpwDj4kYocs/FX3YHoDVcjEm7OPB/vAksnvdNyrx9+of5y0txxTAyra89DYZU/HH+tDzrD4SDv0dWYXh6hn0XuzAezAf68jhTG0qtHxSKIg0fjZHzb92F9rtB5hj/jJhbGfmUudzZiZdO+hvJEUqHAnjcz9gzS2r725nu7l8PTTorkwMMcrZ9ElS+vhiYPmjyzUtrFfCHU0nSCZp5q3kSowKQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=zkWRf2qNvZGX3PK4pKDgbGQUFAsVK8mVCexAGI9THbE=;
 b=KBQqMgbZ4aFoRiKhGZ3GHER6/K0dtZZvPE8YJEy3U3rteU8uMQVLFozSl5GnyD5hhodl8Hs/7FkA3QLvuXrO6zYS6M2dT4Ums4AjwjBlOk6XG8ab2lnhIlj08f6Aqd8Cm0e9iOYFFk8ugfNod0dpwsLkf+m/1+k7zTjnzmpDO38REvEvF8ZlvPHL4RFyUgujFOEa5l4PbMIagmWF3OuT4+A+FH15yyvN0y7tjKWZVjLTH7Suh/FNfP+TzWMxduIDmBZ5v7PKY/MmyfRyuJsUBZ8PhGXWvaGpvu1A3k+8uI0Eac/pL6MLnJRvVu1EhCKQgQtx7od8Cku+HbILxeEiYw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=zkWRf2qNvZGX3PK4pKDgbGQUFAsVK8mVCexAGI9THbE=;
 b=PLthDGZgbgjHqk8YwpE6qeAGjjflaOhuz+0vlXJma7QKAR8RuJdbios4qPQZE9LgA323ugJJLT4esJeAT42rkKwyXR6xW9gfw0o44uwfz8snRgVbwvkvMWhWumC4kBxLNdR09PUvQl8y3/3Dv+Dn1vkp+O3i95D/0Pny8WduZD0=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Stefano Stabellini <sstabellini@kernel.org>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
CC: "julien@xen.org" <julien@xen.org>, "bertrand.marquis@arm.com"
	<bertrand.marquis@arm.com>, "Volodymyr_Babchuk@epam.com"
	<Volodymyr_Babchuk@epam.com>, Stefano Stabellini
	<stefano.stabellini@xilinx.com>
Subject: Re: [PATCH v2] xen/arm: set CPSR Z bit when creating aarch32 guests
Thread-Topic: [PATCH v2] xen/arm: set CPSR Z bit when creating aarch32 guests
Thread-Index: AQHYPittYWCwptKqXU+Nvu1B7Q61VazM6MoA
Date: Wed, 23 Mar 2022 12:36:06 +0000
Message-ID: <57924f67-2419-bcdc-73ab-96ea9f1d2614@citrix.com>
References: <20220322202825.418232-1-sstabellini@kernel.org>
In-Reply-To: <20220322202825.418232-1-sstabellini@kernel.org>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 279eef0d-87d1-48d0-779d-08da0cc9b3c2
x-ms-traffictypediagnostic: MN2PR03MB4879:EE_
x-microsoft-antispam-prvs: <MN2PR03MB4879282B6DFDBE5A2DB859B0BA189@MN2PR03MB4879.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 9qn+9Bzx6ALkYXR23tWXpl5xSP4Uif6JCVDbHoaB0jUw4BuPp0cJwh1+5ThZF699/A6C/xjfmJp/0BV1Gd6rYfa89ZovMRal79cQ9BBKUws2uF/2wvY1ZOz0SDx4V7GU8VnkMx1YL/9lf8xlhcR0qxaUUY5xwjsGXHZ01Gq1j0SRGJthiR8Me4A8F+J4O0kzLK4gCkE9n9Lfcmi6Q8tQkGLyM4Z7Yf/xbGDUVQwaB2fkJ2eyJOtXfRb7MicsXJXDur69sXkVuO1E40PKRMx2rb3MyKyF9A5XVqpEMrFBmx79OPVvs3s99c5TMsME7c/CzdwDlj+VQDJpowLyzBwlo79P11DY/KL7PdZ1Mac9zLFk8MpYGWg01NhlItiZyeF70UQ7yL7O6nQsCVHOo91UNxg08KRZCpueV+Y6TUg6/6FH0XZV4Pp6ZB1KFjDkVrecoTXPbg7ECym6ob64BbZy3KkEY6wiricZPATpfEAzaPS5XTr2Wf9VD3K4UWDW+3KZtiCT7hhzPPYJ9fVPdWe4rk/c5c72Pfb+ISmeCHmq1Ib6ncUsqhFTqrHpiOYHW2tZfV/ihjGnf7SjysgrMbW+apIch4BX6tGmIPvfX58lOEjO/AUG+eToe3++1MLyG3lmuscI94yomlzpw2fSbI2T7jCcuyTTJcQM43esAnmpyvzU0cyXnp0SxcRONRo5oi/tf+fIRNnuI5tG51dS0yfsLdqLm7XhqWijLauehrmqi+4L3h0GqsknBOdf5Q9gVM7i1Hv9gxlP4Hzf3Rt67Pr2zQ==
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(31686004)(66946007)(31696002)(64756008)(91956017)(86362001)(82960400001)(36756003)(5660300002)(54906003)(8936002)(2906002)(66556008)(55236004)(66476007)(76116006)(66446008)(26005)(8676002)(2616005)(83380400001)(4326008)(122000001)(71200400001)(186003)(38070700005)(6512007)(6506007)(508600001)(110136005)(38100700002)(6486002)(316002)(53546011)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?TXdrQVdRUlBnZ1dpMk1mL0tBMnUrWUFBalNENjJIeXdiOTB3QVZjeWlwZVlp?=
 =?utf-8?B?QjBRVzFGLzZmcDF1UkpVdFlIbFZPTTF3bHZOOTRxdndIRHRmVUkvZ3VtVkE4?=
 =?utf-8?B?Z0ZqWCs4SVBISFU1Tm8yb2NQb2Z5QkF6M1o4SnZBTE82cWVWSUNyTnB0VUcw?=
 =?utf-8?B?VW9ncHFjbnRiWjhVcnk5NTdtNFp1V2YvWi9BOXRBVnZ3Q2pGemt0bEZGUHlK?=
 =?utf-8?B?NGFSOUN3anRxN3BnTERhQVNmQnZmMnVPdG0xcmNZeXp1V3phM1huRUxRUlhh?=
 =?utf-8?B?ZXNuSnl1clhxNTEwcFZXT2V2aVJWSlkzV0d0NUhrK3JuaXA2MFFCdFl5ZXFK?=
 =?utf-8?B?RVFsemJJK1NrbTlseUdocUtHaUZyT08wZCtob3RIa1ZzUlAraEdEQmwrK1hl?=
 =?utf-8?B?MmNidUVRZ2pXcG1IdlFoMExzL054SE54dHkxWkdXUVZlN01xNENwcWhwSnVk?=
 =?utf-8?B?dE5OampsRUlUQUJ6Q09NdzNpZkRCVEdKVFJYdnIyWVM3bnd3RDdMa0d3MkN1?=
 =?utf-8?B?N05zaUFQZzI1Z21VdXA5Z2ZBa01KK2FHNXdYelV5YTVMWDBjdUh5ejFIZmRa?=
 =?utf-8?B?Qzl6STNZNkVoOElBMWQ4ZkxVTmRPQXZqUHprYUEwc04vb29HZHRQdUd6bVBm?=
 =?utf-8?B?NjFCV3NFUlJreEljM2F1MWlwR0tKMXdzbG9jdGQ5Z2txZU1MdGt4eTVOSkFm?=
 =?utf-8?B?R3dLa3lVZEpaTGtDNzdlbXZTM0txTDFBSFNZRWhRQ3M0bEVZOXBWZU80VFVo?=
 =?utf-8?B?NHZ1aVNYU0I4OFBzQ1NMUkVFbTAwbWtER0hWNlA5K2NyakNJUnd5NUcvaVJ2?=
 =?utf-8?B?ZUNrZUJ2WnVpL2pCMExkOFIxaDVXWEJnK2MwSUdGRTdCN0dkRU4xWEJCV0tH?=
 =?utf-8?B?ejlRZmxpQUZDODg5NjJSTnN3OVVCYWdOT2hVRHdTN25ReG1BdlhqcS92MS9W?=
 =?utf-8?B?aDVqQ21iYTdiRDJzSjFpdTR2UGNEWmlRcXRYc25OdlU5ZmJhbmdNZ2EzMGF2?=
 =?utf-8?B?a1N4M0NOOXRyLzhzRmVlUmV5Sll6WkhXWkxZM2FBNHhSbzlpNHBPSjhQRzdU?=
 =?utf-8?B?OXZBeFZJMWFnQXBUWXdYRi9LazYzRXlULytuLzh2Wk5sSnVDNXNtY1VrMW56?=
 =?utf-8?B?V29RZHNKcTVhRG1CbXhXQ2lnSXNNWGdIZHNPdEVvb2g2UEZLK0lseS9rcndD?=
 =?utf-8?B?UFg4WWFlM2tHWE56UGxkN1JIanhPWU5Qb0wyZ0drMDRwamZHRTNxMDVnYjNs?=
 =?utf-8?B?QmdpdmtWelRMdm5kd3RhNmhRcG9Oc2RuWjJkTHZZY0IwM2VCWGZuSit2UGZS?=
 =?utf-8?B?VCt0b0RKTXRrR1kza0dtb0hjL2IyWWJlTkVFcENJakpldEtiOTZJdVZUeVN1?=
 =?utf-8?B?UlNMd2htRldKWWc3V2UxM0g0Wnp1bTZkYVk2bE5icitWenliMUlkLzZ3YU9M?=
 =?utf-8?B?WXBneDBpQjByS1p6aUlJNUt4cHMvbjhkVDhlNWo2QW9IQUJBZHN3RCthMlJY?=
 =?utf-8?B?OTFOQTBSaHcxdXIrMVhZaEV4WjFIQjZPSG1CUHV6Niswa0ZNRnYxS2N1WVhi?=
 =?utf-8?B?ZlgxMXJVOUlXMEN3L1FSaDRwY1Zic2pxTVZ3NGwxS1Y3K09MYzNBZEVUa0N5?=
 =?utf-8?B?Nno5bitTRkY0alhJYVpHSUNsZFVUZlBEZjkyMDNMTTA3VTR4Y2ZYM0Qyd21a?=
 =?utf-8?B?eWF4NUY4RUlYbkpiZ01mMDJhTmw3QUhrS04ySUQyc0V1MURwUDN1bGwvMGR6?=
 =?utf-8?B?aUcvSVJOQzIwdzBwWUlFMVZWUFVxekZ1Zk9ML0RQZTR6SktRRXpKL0VOSHgz?=
 =?utf-8?B?S3duekZRV2oxU2w2aCs4Mm54RWFIZlR4WTE3S1RHU0EzRWxBV3o2QSs2Tzdu?=
 =?utf-8?B?RmpEeVU3dWdJbFlHL3pQazY0U21YQW5xK0NrTzFkbUg3cmRnL3RNRzBKdFc4?=
 =?utf-8?Q?neL7AA33O5hYhE5PHw8o2xUl2Li/PVds?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <F38F832948599E4E854DF109D0D69C12@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 279eef0d-87d1-48d0-779d-08da0cc9b3c2
X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Mar 2022 12:36:06.9235
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Lg6jHSbk5JXlF5r92upiMJhMfYmd8K7pik7fySTCjVH1oYmk1cTbTP0YfEG2doFyEEkE75X1QowLE+402FjGybP+ZQhXpooMoyoUjFHk0ow=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR03MB4879
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Wed Mar 23 13:01:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 13:01:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293883.499419 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX0cQ-0003M2-Ja; Wed, 23 Mar 2022 13:01:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293883.499419; Wed, 23 Mar 2022 13:01:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX0cQ-0003Lv-F1; Wed, 23 Mar 2022 13:01:42 +0000
Received: by outflank-mailman (input) for mailman id 293883;
 Wed, 23 Mar 2022 13:01:41 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nX0cP-0003Lp-3a
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 13:01:41 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nX0cN-0004uI-HJ; Wed, 23 Mar 2022 13:01:39 +0000
Received: from 54-240-197-230.amazon.com ([54.240.197.230]
 helo=[192.168.10.149]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nX0cN-0001Oa-BA; Wed, 23 Mar 2022 13:01:39 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=GddZiesaSpF6OnrwOBsQ0Qh3bjDZStKEu9duXyuCs4U=; b=xudspDDQ4dtboJ2K1cVZQSVKUQ
	16beO69/44wWjA6hJ7uh7m2xZIQFnUUev702FyYJIHpC2SiC7tfRpiXOYxHryBoRJArXhz0OmPrtP
	Uf+AotN78vULPapjM4JkH9MaMWj57HIMtnLUWSPxHvPLKCZvGddl4RAyqWRRoiTiHGZk=;
Message-ID: <cea82447-58c4-be37-153f-d764ea5f4891@xen.org>
Date: Wed, 23 Mar 2022 13:01:37 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v2] xen/arm: set CPSR Z bit when creating aarch32 guests
To: Andrew Cooper <Andrew.Cooper3@citrix.com>,
 Stefano Stabellini <sstabellini@kernel.org>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: "bertrand.marquis@arm.com" <bertrand.marquis@arm.com>,
 "Volodymyr_Babchuk@epam.com" <Volodymyr_Babchuk@epam.com>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>
References: <20220322202825.418232-1-sstabellini@kernel.org>
 <57924f67-2419-bcdc-73ab-96ea9f1d2614@citrix.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <57924f67-2419-bcdc-73ab-96ea9f1d2614@citrix.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi Andrew,

On 23/03/2022 12:36, Andrew Cooper wrote:
> On 22/03/2022 20:28, Stefano Stabellini wrote:
>> From: Stefano Stabellini <stefano.stabellini@xilinx.com>
>>
>> The first 32 bytes of zImage are NOPs. When CONFIG_EFI is enabled in the
>> kernel, certain versions of Linux will use an UNPREDICATABLE NOP
>> encoding, sometimes resulting in an unbootable kernel. Whether the
>> resulting kernel is bootable or not depends on the processor. See commit
>> a92882a4d270 in the Linux kernel for all the details.
>>
>> All kernel releases starting from Linux 4.9 without commit a92882a4d270
>> are affected.
>>
>> Fortunately there is a simple workaround: setting the "Z" bit in CPSR
>> make it so those invalid NOP instructions are never executed. That is
>> because the instruction is conditional (not equal). So, on QEMU at
>> least, the instruction will end up to be ignored and not generate an
>> exception. Setting the "Z" bit makes those kernel versions bootable
>> again and it is harmless in the other cases.
>>
>> Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
> 
> A discussion relevant to this came up with XTF/ARM.
> 
> There is not currently a written ABI for the start state of vCPUs, and
> there needs to be.  I know x86 is in a poor shape too, but we do at
> least have some scraps of docs littered around and a plan to write some
> proper Sphinx docs.
> 
> (A separate conversation was about booting from plain ELF files.  Linux
> ARM Zimage is entirely undocumented for 32bit, and discussions with RMK
> suggest that we've got bugs

Do you mind providing more details on what would be the bugs here?

> , while 64bit has insufficient documentation
> to demonstrate that our logic is correct.)

Did you actually read 
https://github.com/torvalds/linux/blob/master/Documentation/arm64/booting.rst? 


> 
> In particular...
> 
>> ---
>> Changes in v2:
>> - improve commit message
>> - add in-code comment
>> - move PSR_Z to the beginning
>> ---
>>   xen/include/public/arch-arm.h | 8 +++++++-
>>   1 file changed, 7 insertions(+), 1 deletion(-)
>>
>> diff --git a/xen/include/public/arch-arm.h b/xen/include/public/arch-arm.h
>> index 94b31511dd..81cee95f14 100644
>> --- a/xen/include/public/arch-arm.h
>> +++ b/xen/include/public/arch-arm.h
>> @@ -361,6 +361,7 @@ typedef uint64_t xen_callback_t;
>>   #define PSR_DBG_MASK    (1<<9)        /* arm64: Debug Exception mask */
>>   #define PSR_IT_MASK     (0x0600fc00)  /* Thumb If-Then Mask */
>>   #define PSR_JAZELLE     (1<<24)       /* Jazelle Mode */
>> +#define PSR_Z           (1<<30)       /* Zero condition flag */
>>   
>>   /* 32 bit modes */
>>   #define PSR_MODE_USR 0x10
>> @@ -383,7 +384,12 @@ typedef uint64_t xen_callback_t;
>>   #define PSR_MODE_EL1t 0x04
>>   #define PSR_MODE_EL0t 0x00
>>   
>> -#define PSR_GUEST32_INIT  (PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MODE_SVC)
>> +/*
>> + * We set PSR_Z to be able to boot Linux kernel versions with an invalid
>> + * encoding of the first 8 NOP instructions. See commit a92882a4d270 in
>> + * Linux.
>> + */
>> +#define PSR_GUEST32_INIT  (PSR_Z|PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MODE_SVC)
> 
> ... this change is either breaking the ABI, or demonstrates that these
> values must not be in a public header file to begin with.
PSR_GUEST32_INIT is only exposed to the toolstack (see the ifdef above). 
It is defined in the arch-arm.h because it makes easier to keep the 
value in sync.

This is not part of the ABI and therefore we are free to change the 
value in any way we want. Setting Z is a convenient way to handle the 
Linux issue without making it too invasive.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 13:14:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 13:14:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293886.499430 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX0oE-0004sN-Mm; Wed, 23 Mar 2022 13:13:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293886.499430; Wed, 23 Mar 2022 13:13:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX0oE-0004sG-Hx; Wed, 23 Mar 2022 13:13:54 +0000
Received: by outflank-mailman (input) for mailman id 293886;
 Wed, 23 Mar 2022 13:13:53 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX0oD-0004s5-AV; Wed, 23 Mar 2022 13:13:53 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX0oD-0005At-74; Wed, 23 Mar 2022 13:13:53 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX0oC-0000Xz-Sm; Wed, 23 Mar 2022 13:13:52 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nX0oC-0003fx-SL; Wed, 23 Mar 2022 13:13:52 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=B1A7Ra+SsfxRr1Dk10bvD+ya4trJW3SLXFfDO4Mn5vk=; b=hWl8oEXRgVECZOudeK5ySR1CnS
	v/YH4vA0z+NdaNrL6aRzz3b9o+cd9Fuw01jQbZimNfSYaMAkLpZBjwh/R7pYMaOEmjvqISZZiFfKn
	cwpybtVyfWxpwu1Jmg/VgYFG6URLiOK6q0iq6cD5XmetHXWB6GtUSVLLpN0QSpoM7EhU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168799-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168799: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 23 Mar 2022 13:13:52 +0000

flight 168799 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168799/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   23 days
Failing since        168258  2022-03-01 01:55:31 Z   22 days  230 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    1 days   11 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 13:58:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 13:58:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293897.499452 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX1VZ-00012s-3I; Wed, 23 Mar 2022 13:58:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293897.499452; Wed, 23 Mar 2022 13:58:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX1VZ-00012l-0E; Wed, 23 Mar 2022 13:58:41 +0000
Received: by outflank-mailman (input) for mailman id 293897;
 Wed, 23 Mar 2022 13:58:39 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=7r0c=UC=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nX1VX-00012f-Lv
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 13:58:39 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04on060b.outbound.protection.outlook.com
 [2a01:111:f400:fe0c::60b])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 55e51624-aab1-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 14:58:37 +0100 (CET)
Received: from DB6PR0802CA0047.eurprd08.prod.outlook.com (2603:10a6:4:a3::33)
 by DB6PR08MB2759.eurprd08.prod.outlook.com (2603:10a6:6:1d::10) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17; Wed, 23 Mar
 2022 13:58:34 +0000
Received: from DB5EUR03FT046.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:4:a3:cafe::db) by DB6PR0802CA0047.outlook.office365.com
 (2603:10a6:4:a3::33) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.23 via Frontend
 Transport; Wed, 23 Mar 2022 13:58:34 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT046.mail.protection.outlook.com (10.152.21.230) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Wed, 23 Mar 2022 13:58:33 +0000
Received: ("Tessian outbound 1f399c739551:v113");
 Wed, 23 Mar 2022 13:58:33 +0000
Received: from c03431c410d4.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 543FF450-6621-4704-A0FC-686FF1F1F6EA.1; 
 Wed, 23 Mar 2022 13:58:22 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id c03431c410d4.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Wed, 23 Mar 2022 13:58:22 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by AM4PR08MB2657.eurprd08.prod.outlook.com (2603:10a6:205:b::14) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17; Wed, 23 Mar
 2022 13:58:11 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::8113:3b77:e3a2:b008%7]) with mapi id 15.20.5081.023; Wed, 23 Mar 2022
 13:58:11 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 55e51624-aab1-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=F1BtiweWzTnpUxEw8Bn480zDis6VZXEWz48HiPd7NcA=;
 b=Lgi88NX74eywEe0jDomnIkfTmeiEA0/2KPD2fPtxKVRyT19tNAPLuRL7uEgNi+mw6wUfa0Mpsnc57TZbKdMjO70l6bg2Itk9+bBnssu5tF/Ys9x3Bu0ICfNqdC9maS5Al/kxtpK71V/bq0jLNwJQms8K/SHbe7mGI8BoGFDkt5U=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: f49bfaa2d1be586d
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=k5o1dH/EgSohixPXDTutjqOfkCm8KehoqpYeviNSD9p8PNxxhbmCp/g/j9fXjGaCFzBeFTpJWULMVFJ3LNRoTjy1zT3XilsigWpMF8tRF4c5npr0fkXIwWUjFYKQOFgGI2VGu3Vr+Iv4HsdCDzrmRTamV418dnY3eAHCWGCkTfyqBlVxlvdsBMWr+NKnf0iz30tE2k4UpVslhVYTHolNidJfDaEkQ5tPG0qwEVnZShvIxvXtItJCAHvW+cgRAFhJi7JE44JraCwzgLAmrE7mLTwdlGr3tXKFuiAh6GlZvk89bqA8XAjBzbKRsW7gz/qYpEW6lGztAr+LavUApxwTrg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=F1BtiweWzTnpUxEw8Bn480zDis6VZXEWz48HiPd7NcA=;
 b=hUqo7WZhkHdb1UVPjrz+tc8sBFemdy0lQcjkzWHkPi4ODAz++ERp/TQjgT+XbmnLrW60mk4Wn+KK232JGuKGhUoMXTQGPHwepr/uxk8mLlAZ96xIBZfH7VDp3Ws4gwkVPCrLgY7Q+HLEC2U78p2aMiDdRjX4q2D89sG6SPTJ0W6C2U4bTkdr/18ZHsN3GSVz1a6ooL9IXO6es/9yuPiwhnDjMKwGXD8xPcakdJACJN53NpAepyS2iPKRgvkICAjdAvisKFcnj4EL7vbUIev02zeW6so3awKUXofdT63fjqG0tfv76jG1VffCd2+Xkpf+i9ieZR/64w+xA64mydfIcQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=F1BtiweWzTnpUxEw8Bn480zDis6VZXEWz48HiPd7NcA=;
 b=Lgi88NX74eywEe0jDomnIkfTmeiEA0/2KPD2fPtxKVRyT19tNAPLuRL7uEgNi+mw6wUfa0Mpsnc57TZbKdMjO70l6bg2Itk9+bBnssu5tF/Ys9x3Bu0ICfNqdC9maS5Al/kxtpK71V/bq0jLNwJQms8K/SHbe7mGI8BoGFDkt5U=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Julien Grall <julien@xen.org>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, Wei Chen <Wei.Chen@arm.com>, Stefano Stabellini
	<sstabellini@kernel.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Wei Liu
	<wl@xen.org>, Juergen Gross <jgross@suse.com>, Dario Faggioli
	<dfaggioli@suse.com>
Subject: Re: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Topic: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Index:
 AQHYOtySiWfuTiIQkkqv44WbBvDftKzFUCoAgASzLoCAAAqAAIABIWCAgABFnICAAZGCAA==
Date: Wed, 23 Mar 2022 13:58:10 +0000
Message-ID: <6FA48D36-AFF3-4D37-BCF5-27FE68570428@arm.com>
References: <20220318152541.7460-1-luca.fancellu@arm.com>
 <20220318152541.7460-5-luca.fancellu@arm.com>
 <274f81b0-c164-4437-3d05-243e147330a9@xen.org>
 <0FA7F6D7-0B40-4B75-9752-7FE48D0FCA5C@arm.com>
 <9f3d7713-4e4b-58f8-d7a1-b42ef152a7ab@xen.org>
 <AE272A2A-EA5B-4217-AECE-80AE04207B55@arm.com>
 <acbf28a2-31b9-2a9c-6b42-6d386b47bfbf@xen.org>
In-Reply-To: <acbf28a2-31b9-2a9c-6b42-6d386b47bfbf@xen.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 01aeb86e-08f2-4dd5-6e92-08da0cd53824
x-ms-traffictypediagnostic:
	AM4PR08MB2657:EE_|DB5EUR03FT046:EE_|DB6PR08MB2759:EE_
X-Microsoft-Antispam-PRVS:
	<DB6PR08MB27599F5969A3E917419C5477E4189@DB6PR08MB2759.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(966005)(6486002)(38070700005)(508600001)(38100700002)(71200400001)(86362001)(66476007)(8676002)(66446008)(64756008)(66556008)(91956017)(76116006)(54906003)(316002)(6916009)(66946007)(4326008)(83380400001)(122000001)(6512007)(53546011)(6506007)(2616005)(186003)(26005)(8936002)(36756003)(7416002)(5660300002)(33656002)(2906002)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <7E1B98503A1B254A9346764C285AD81D@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR08MB2657
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT046.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	dd98a6e8-0ead-4f59-d602-08da0cd52ac2
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	h8iJq5QZ++sMg6OGlZ2UkQBvXUEKtF5hCqHY8rPQbcYWYpS9nNkXGlrsGHwIn5ru4oR5WjO71LIBaWOmmMjN6DwDppMeXyb2cpShDOdygfVDw4XG7B4LAzXpIhUaNERUURty2DgelV0WEtZ/P0BGXvebtSO3vkvF7BiheRm4FwO655mNz9x0cyVZGXVg83+VNk2qtiCzJ1bUZX64BcXMgA/ca81ceVqvnxsFnxghX6J704IrfoQOjJjPnMvONzXkw/BlyF5LkbbC0u+SorrNSjYjf0ZpTnaXVeZnVPMf2tTxwJ6VYZbYtLqis7EvHb388ukJhdic1PmF56SWXBRhGncZhEGf2O+3d1QQ3YYCbojICV8UBi12irjIW64O7ccFVrwg1ctjSs4kJ/IPfkVi3oMl4jWTe6qfVyM+jFAPH/YMuU+gIFNbzdIMthopQabjRE+2dIyQqcRaEvJz5+3XqvDH463aBG5KoA/hJfozPxs7MMmVrPcW1Pki8d3usRJau2baSEL96ZhL0Bc/g4nlX0u5fs+ABf5LqqADMYBb3p9PsQejCU0omZWi7zeb+SRtivxlHivhirO/3LVhOGOK1764Y2mqyPyJtA7URjWCxps6xhgoYclV8akGLJMXVcMXcJd83rGxRnERHFvjqeRC5Y4q6030L8OBbqkIjHUgVN1x3lgr0AFyiuBx6+U2/jQYgxL5zWQQbcgMRcGXkDxIqkLYd6wnqGlw7Ji5l6RzhUOJMd3GPwAysRZEUKUC0HKg97Mm/AaJbn7GrCZf6OCq/w==
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(316002)(36756003)(54906003)(70586007)(81166007)(356005)(8936002)(508600001)(966005)(40460700003)(6486002)(53546011)(8676002)(4326008)(6862004)(86362001)(70206006)(26005)(36860700001)(336012)(186003)(83380400001)(2616005)(6506007)(107886003)(47076005)(33656002)(2906002)(5660300002)(82310400004)(6512007);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Mar 2022 13:58:33.5825
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 01aeb86e-08f2-4dd5-6e92-08da0cd53824
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT046.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR08MB2759
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From xen-devel-bounces@lists.xenproject.org Wed Mar 23 13:59:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 13:59:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293900.499464 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX1WR-0001YG-Fq; Wed, 23 Mar 2022 13:59:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293900.499464; Wed, 23 Mar 2022 13:59:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX1WR-0001Y9-B0; Wed, 23 Mar 2022 13:59:35 +0000
Received: by outflank-mailman (input) for mailman id 293900;
 Wed, 23 Mar 2022 13:59:34 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX1WQ-0001Xx-DG; Wed, 23 Mar 2022 13:59:34 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX1WQ-00065q-Ak; Wed, 23 Mar 2022 13:59:34 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX1WP-0002Pv-Qd; Wed, 23 Mar 2022 13:59:33 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nX1WP-0000i1-Q7; Wed, 23 Mar 2022 13:59:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=l2oS5FL+nqvw/6zMGadM7OQPZYBeaX5RHZK+PBDZArg=; b=ORsTC5VeKzfTrQ2Ku5mwjWS7BN
	urz94Ivb9LJ2sfsUNAx5ZU7gVEC289BmU0zo3D+dB5lkPylrYwdX08DZXGWkM04DeA/JeLPgDIAmZ
	YYyaxsm8b2zzkFSJMmPZRA3u8noOxz3ZxC0NV5bReV7rGNTw/WWrI5rn95btzTKFNaQg=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168794-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168794: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:debian-hvm-install:fail:heisenbug
    xen-unstable:test-amd64-amd64-xl-rtds:guest-localmigrate/x10:fail:heisenbug
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=69e46280937526db9cf78259cd8a0a9ec62dc847
X-Osstest-Versions-That:
    xen=8aa0e9d2d1a4815516607eabe9b2e850f284a2f8
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 23 Mar 2022 13:59:33 +0000

flight 168794 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168794/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm 12 debian-hvm-install fail in 168786 pass in 168794
 test-amd64-amd64-xl-rtds     20 guest-localmigrate/x10     fail pass in 168786

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168763
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168763
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168763
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168763
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168763
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168763
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168763
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168763
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168763
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168763
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168763
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168763
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass

version targeted for testing:
 xen                  69e46280937526db9cf78259cd8a0a9ec62dc847
baseline version:
 xen                  8aa0e9d2d1a4815516607eabe9b2e850f284a2f8

Last test of basis   168763  2022-03-22 01:51:51 Z    1 days
Testing same since   168786  2022-03-22 16:08:07 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Jan Beulich <jbeulich@suse.com>
  Julien Grall <jgrall@amazon.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     fail    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   8aa0e9d2d1..69e4628093  69e46280937526db9cf78259cd8a0a9ec62dc847 -> master


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 14:08:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 14:08:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293908.499474 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX1fK-0003HE-GO; Wed, 23 Mar 2022 14:08:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293908.499474; Wed, 23 Mar 2022 14:08:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX1fK-0003H7-DF; Wed, 23 Mar 2022 14:08:46 +0000
Received: by outflank-mailman (input) for mailman id 293908;
 Wed, 23 Mar 2022 14:08:44 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=EmH6=UC=verge.net.au=horms@vergenet.net>)
 id 1nX1fI-0003Gy-Hn
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 14:08:44 +0000
Received: from zeeaster.vergenet.net (zeeaster.vergenet.net [206.189.110.174])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id bdc8ec65-aab2-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 15:08:41 +0100 (CET)
Received: from madeliefje.horms.nl (86-88-72-229.fixed.kpn.net [86.88.72.229])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature RSA-PSS (2048 bits))
 (No client certificate requested)
 by zeeaster.vergenet.net (Postfix) with ESMTPSA id 1F39A200C6;
 Wed, 23 Mar 2022 14:08:40 +0000 (UTC)
Received: by madeliefje.horms.nl (Postfix, from userid 7100)
 id C82EF2ECE; Wed, 23 Mar 2022 15:08:39 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: bdc8ec65-aab2-11ec-8fbc-03012f2f19d4
Date: Wed, 23 Mar 2022 15:08:39 +0100
From: Simon Horman <horms@verge.net.au>
To: Raphael Ning <raphning@gmail.com>
Cc: kexec@lists.infradead.org, Julien Grall <julien@xen.org>,
	xen-devel@lists.xenproject.org, Raphael Ning <raphning@amazon.com>
Subject: Re: [PATCH] kexec-xen: Allow xen_kexec_exec() to return in case of
 Live Update
Message-ID: <Yjsp5zsc1lseY2M9@vergenet.net>
References: <20220314092115.48309-1-raphning@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <20220314092115.48309-1-raphning@gmail.com>
Organisation: Horms Solutions BV
X-Virus-Scanned: clamav-milter 0.103.5 at zeeaster
X-Virus-Status: Clean

On Mon, Mar 14, 2022 at 09:21:15AM +0000, Raphael Ning wrote:
> From: Raphael Ning <raphning@amazon.com>
> 
> Currently, my_exec() does not expect the Xen KEXEC_CMD_kexec hypercall
> to return on success, because it assumes that the hypercall always
> triggers an immediate reboot. However, for Live Update, the hypercall
> merely schedules the kexec operation and returns; the actual reboot
> happens asynchronously. [1]
> 
> Therefore, rework the Xen code path of my_exec() such that it does not
> treat a successfully processed Live Update request as an error. Also,
> rephrase the comment above the function to remove ambiguity.
> 
> [1] https://lists.xen.org/archives/html/xen-devel/2021-05/msg00286.html
> 
> Signed-off-by: Raphael Ning <raphning@amazon.com>

Hi Raphael,

thanks for your patch. Overall I think this is good.

Unfortunately I am seeing a build failure with this patch applied.

 ../../kexec/kexec-xen.c:292:6: error: conflicting types for ‘xen_kexec_exec’
  292 | void xen_kexec_exec(uint64_t kexec_flags)
      |      ^~~~~~~~~~~~~~
In file included from ../../kexec/kexec-xen.c:6:
../../kexec/kexec.h:327:5: note: previous declaration of ‘xen_kexec_exec’ was here
  327 | int xen_kexec_exec(uint64_t kexec_flags);
      |     ^~~~~~~~~~~~~~
make[1]: *** [Makefile:124: kexec/kexec-xen.o] Error 1
make[1]: *** Waiting for unfinished jobs....

See: https://github.com/horms/kexec-tools/runs/5661629877?check_suite_focus=true


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 14:21:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 14:21:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293915.499485 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX1r7-0005ZT-K8; Wed, 23 Mar 2022 14:20:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293915.499485; Wed, 23 Mar 2022 14:20:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX1r7-0005ZM-Gk; Wed, 23 Mar 2022 14:20:57 +0000
Received: by outflank-mailman (input) for mailman id 293915;
 Wed, 23 Mar 2022 14:20:56 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=7Uas=UC=gmail.com=raphning@srs-se1.protection.inumbo.net>)
 id 1nX1r5-0005ZG-V1
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 14:20:56 +0000
Received: from mail-wr1-x42b.google.com (mail-wr1-x42b.google.com
 [2a00:1450:4864:20::42b])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 734c4e5e-aab4-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 15:20:54 +0100 (CET)
Received: by mail-wr1-x42b.google.com with SMTP id r13so2345413wrr.9
 for <xen-devel@lists.xenproject.org>; Wed, 23 Mar 2022 07:20:55 -0700 (PDT)
Received: from [192.168.8.99] (54-240-197-232.amazon.com. [54.240.197.232])
 by smtp.gmail.com with ESMTPSA id
 m9-20020a05600c4f4900b00389e8184edcsm4146646wmq.35.2022.03.23.07.20.53
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Wed, 23 Mar 2022 07:20:54 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 734c4e5e-aab4-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=message-id:date:mime-version:user-agent:subject:to:cc:references
         :from:in-reply-to:content-transfer-encoding;
        bh=oDEg5bIYWXgwBpILzlm6D24oSE2mDL1vSCp3Tswk0wc=;
        b=Fut3qjCByb8e6FazRpMF9vVqYuGzPVXpcO+fgeYFlkUzc7a6urH6CwVpviuwDhm1/C
         qdRHRMgK0EaP8UL0F5fuvNNebtDCsFIc284V6TiAP3PQ4pRipJaG7MaImb21r3xQMIO9
         iXBK/2nRGqiZMmAYkc/1W/u6zGAaQ1oA5gamGhsmKb/+8itcZM2Z0+GphcteAz6p8HaM
         fk2sOMg+00dQGUQMMIzfOv8oWNRaYQzgRTVAwdVkGZA1J0DFiqBK9siYBnpHd+67TckS
         HkiC3WOL37j4uLDDDYrQ/SbbgqoAggg0pf9IHXLhFh1/FizHJBhZlG4gEGjtM1CphVs+
         z25w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:message-id:date:mime-version:user-agent:subject
         :to:cc:references:from:in-reply-to:content-transfer-encoding;
        bh=oDEg5bIYWXgwBpILzlm6D24oSE2mDL1vSCp3Tswk0wc=;
        b=miDoVBJKotD3nTTPP4HjQcd+zH6YigBmbYP6wn54aFFE02yS4BKasbncz9C0aqjbWf
         bAMPMeObj941r8wsbIhZI9ZMkBcTD4oTivCNNF6S4RVs2Jv2Ky4ZS3XYPNu0rKk4637g
         Xubf5aDG4zuOFYasjFTTRzuccYFIenvEn8d+o+9vfAUSjPFrKMfCy/o77uyVLsqfH4uX
         r5rN/DEyQ0/0Z15lbVhu4X6W3QrYzJ6U/pLny5aOPdTX1OxvfVpFjQEXawcWk4HxfYdN
         /+AXDA63ZbmBNNjnipW7SkuPEm/Amp97ct2l/Ed8qrn7pkHaPn5zKOqgUkp6Klv0jmlF
         W7Xw==
X-Gm-Message-State: AOAM530ccSQbf+P91xwFll5+6bia9kn68IauQ+qclK3M7m8CgnTJteNH
	+6WM/i52E+fWzMCLa7oqQMo=
X-Google-Smtp-Source: ABdhPJwe5fiapR25zCoqfBY1ngq0IpzPNlujoq4pRws7xuvH7ujjBLCz+l3Ev7QcZ87VHFCX9Wd8IA==
X-Received: by 2002:adf:a482:0:b0:1e3:3e5f:496c with SMTP id g2-20020adfa482000000b001e33e5f496cmr35027wrb.606.1648045254456;
        Wed, 23 Mar 2022 07:20:54 -0700 (PDT)
Message-ID: <b1aea785-1631-2afc-2d8c-c21067903978@gmail.com>
Date: Wed, 23 Mar 2022 14:20:52 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH] kexec-xen: Allow xen_kexec_exec() to return in case of
 Live Update
To: Simon Horman <horms@verge.net.au>
Cc: kexec@lists.infradead.org, Julien Grall <julien@xen.org>,
 xen-devel@lists.xenproject.org, Raphael Ning <raphning@amazon.com>
References: <20220314092115.48309-1-raphning@gmail.com>
 <Yjsp5zsc1lseY2M9@vergenet.net>
From: Raphael Ning <raphning@gmail.com>
In-Reply-To: <Yjsp5zsc1lseY2M9@vergenet.net>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit


On 23/03/2022 14:08, Simon Horman wrote:
> Hi Raphael,
> thanks for your patch. Overall I think this is good.
>
> Unfortunately I am seeing a build failure with this patch applied.
>
>  ../../kexec/kexec-xen.c:292:6: error: conflicting types for ‘xen_kexec_exec’
>   292 | void xen_kexec_exec(uint64_t kexec_flags)
>       |      ^~~~~~~~~~~~~~
> In file included from ../../kexec/kexec-xen.c:6:
> ../../kexec/kexec.h:327:5: note: previous declaration of ‘xen_kexec_exec’ was here
>   327 | int xen_kexec_exec(uint64_t kexec_flags);
>       |     ^~~~~~~~~~~~~~
> make[1]: *** [Makefile:124: kexec/kexec-xen.o] Error 1
> make[1]: *** Waiting for unfinished jobs....
>
> See: https://github.com/horms/kexec-tools/runs/5661629877?check_suite_focus=true


Hi Simon,


Thanks for the review.  The conflicting declaration is for the --without-xen build, which I didn't test.  Let me fix that and post a new revision.


Raphael



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 14:44:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 14:44:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293922.499496 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX2E5-00083j-It; Wed, 23 Mar 2022 14:44:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293922.499496; Wed, 23 Mar 2022 14:44:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX2E5-00083c-Ft; Wed, 23 Mar 2022 14:44:41 +0000
Received: by outflank-mailman (input) for mailman id 293922;
 Wed, 23 Mar 2022 14:44:40 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=7Uas=UC=gmail.com=raphning@srs-se1.protection.inumbo.net>)
 id 1nX2E4-00083W-P4
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 14:44:40 +0000
Received: from mail-wr1-x430.google.com (mail-wr1-x430.google.com
 [2a00:1450:4864:20::430])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id c45efed4-aab7-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 15:44:39 +0100 (CET)
Received: by mail-wr1-x430.google.com with SMTP id m30so2482732wrb.1
 for <xen-devel@lists.xenproject.org>; Wed, 23 Mar 2022 07:44:39 -0700 (PDT)
Received: from dev-dsk-raphning-1b-027ba2d5.eu-west-1.amazon.com
 (54-240-197-233.amazon.com. [54.240.197.233])
 by smtp.gmail.com with ESMTPSA id
 g19-20020a05600c4ed300b0038ccb22cc9fsm428292wmq.37.2022.03.23.07.44.38
 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128);
 Wed, 23 Mar 2022 07:44:38 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c45efed4-aab7-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:mime-version
         :content-transfer-encoding;
        bh=/vBWQlI8QgaP0LHW33MUjoRn8pJZviwij7lihemgwdw=;
        b=n8Rr2kFr5DOv2Y9jrV9OJ6EKTssOeIT+k9tvoWFtzFwyIXy+csLfMLLAvG9qL51F5K
         7qwcnrie6mTjFvU4iEKvPG6ZcX8vJbcgZ1laEupdnGYpy/i3Jnybvk8lp4eV39jUa144
         /AlfmYd4hPTkH9dgLCjazLLh4kk1t+JrLR2ARaWZWAzWqw7GEhSJ3AZocRpxmswvuOQZ
         r+5OOtRTKH6x7v2uIOBbKQeVlgU3w85A8s+nC8ENB5fP4pHhKfE+CR1znBPmI/T5NOZy
         Q4aHh4Ro6yUK/DLujNq1xYxMllXB7TJ5QowV7NXUWKnNU3KdtAjfxfqMRWRAHOTTfvCx
         kzVA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version
         :content-transfer-encoding;
        bh=/vBWQlI8QgaP0LHW33MUjoRn8pJZviwij7lihemgwdw=;
        b=tklGPwc0mNyIRuaRUnVOpgXNuwxOhMstGB+OYLjJ/j/KYlvgwwjC/0Me/tRkn8tv8P
         Na4MLBQEaH8oRgOFvfDaMOrll9CbIv/Jx3uZ/isPRcIuFxnoAqlFkGa2VLbGGUhGskOO
         xWfkGU6nvaORUk1gE5zp9IQjTfvRlRhUudilLVv5GaVFeofUeXP2SG9k9U4eStI3oZyJ
         Dq2HuDga/SvF8e2T3w9ZxZM+TnCTKiyqCmQ1hMP16PdjsQXWe5fBKN0PMiNbX0CZjQdg
         jE5ZTtT7337AjwiiReI2ONDvoQE13GXRTKuF0yOrEgOkZLj2/gUTSy141Mn1gKI7NsYU
         byxw==
X-Gm-Message-State: AOAM532gev75sA08ppVwYwqRyE2BkNrWKgEuEkdV8F21ma8Zace8f8/k
	zHgHqjh4ixcAPw89JvKU4qk=
X-Google-Smtp-Source: ABdhPJy6MuaX/2bHo246FtcM1iWIfHWP2Wx5AKIuP4sZ/mwQzf9m1qPuPKrxXSKV4eMfO0loaycViA==
X-Received: by 2002:adf:e701:0:b0:203:f4c2:a1c with SMTP id c1-20020adfe701000000b00203f4c20a1cmr132024wrm.628.1648046678906;
        Wed, 23 Mar 2022 07:44:38 -0700 (PDT)
From: Raphael Ning <raphning@gmail.com>
To: Simon Horman <horms@verge.net.au>
Cc: kexec@lists.infradead.org,
	Raphael Ning <raphning@gmail.com>,
	Julien Grall <julien@xen.org>,
	xen-devel@lists.xenproject.org,
	Raphael Ning <raphning@amazon.com>
Subject: [PATCH v2] kexec-xen: Allow xen_kexec_exec() to return in case of Live Update
Date: Wed, 23 Mar 2022 14:44:18 +0000
Message-Id: <20220323144418.1658-1-raphning@gmail.com>
X-Mailer: git-send-email 2.32.0
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Raphael Ning <raphning@amazon.com>

Currently, my_exec() does not expect the Xen KEXEC_CMD_kexec hypercall
to return on success, because it assumes that the hypercall always
triggers an immediate reboot. However, for Live Update, the hypercall
merely schedules the kexec operation and returns; the actual reboot
happens asynchronously. [1]

Therefore, rework the Xen code path of my_exec() such that it does not
treat a successfully processed Live Update request as an error. Also,
rephrase the comment above the function to remove ambiguity.

[1] https://lists.xen.org/archives/html/xen-devel/2021-05/msg00286.html

Signed-off-by: Raphael Ning <raphning@amazon.com>
---
Changes in v2:
- Fix --without-xen build.

---
 kexec/kexec-xen.c | 12 ++++++++----
 kexec/kexec.c     | 23 +++++++++++++++++++----
 kexec/kexec.h     |  2 +-
 3 files changed, 28 insertions(+), 9 deletions(-)

diff --git a/kexec/kexec-xen.c b/kexec/kexec-xen.c
index 47da3da466f0..a7c89339c4b7 100644
--- a/kexec/kexec-xen.c
+++ b/kexec/kexec-xen.c
@@ -247,21 +247,24 @@ int xen_kexec_status(uint64_t kexec_flags)
 	return ret;
 }
 
-void xen_kexec_exec(uint64_t kexec_flags)
+int xen_kexec_exec(uint64_t kexec_flags)
 {
 	xc_interface *xch;
 	uint8_t type = KEXEC_TYPE_DEFAULT;
+	int ret;
 
 	xch = xc_interface_open(NULL, NULL, 0);
 	if (!xch)
-		return;
+		return -1;
 
 	if (kexec_flags & KEXEC_LIVE_UPDATE)
 		type = KEXEC_TYPE_LIVE_UPDATE;
 
-	xc_kexec_exec(xch, type);
+	ret = xc_kexec_exec(xch, type);
 
 	xc_interface_close(xch);
+
+	return ret;
 }
 
 #else /* ! HAVE_LIBXENCTRL */
@@ -286,8 +289,9 @@ int xen_kexec_status(uint64_t kexec_flags)
 	return -1;
 }
 
-void xen_kexec_exec(uint64_t kexec_flags)
+int xen_kexec_exec(uint64_t kexec_flags)
 {
+	return -1;
 }
 
 #endif
diff --git a/kexec/kexec.c b/kexec/kexec.c
index 7e4787bc8211..e7861049bbea 100644
--- a/kexec/kexec.c
+++ b/kexec/kexec.c
@@ -902,13 +902,28 @@ static int my_shutdown(void)
 }
 
 /*
- *	Exec the new kernel (reboot)
+ *	Exec the new kernel. If successful, this triggers an immediate reboot
+ *	and does not return, but Xen Live Update is an exception (more on this
+ *	below).
  */
 static int my_exec(void)
 {
-	if (xen_present())
-		xen_kexec_exec(kexec_flags);
-	else
+	if (xen_present()) {
+		int ret;
+
+		/*
+		 * There are two cases in which the Xen hypercall may return:
+		 * 1) An error occurred, e.g. the kexec image was not loaded.
+		 *    The exact error is indicated by errno.
+		 * 2) Live Update was successfully scheduled. Note that unlike
+		 *    a normal kexec, Live Update happens asynchronously, i.e.
+		 *    the hypercall merely schedules the kexec operation and
+		 *    returns immediately.
+		 */
+		ret = xen_kexec_exec(kexec_flags);
+		if ((kexec_flags & KEXEC_LIVE_UPDATE) && !ret)
+			return 0;
+	} else
 		reboot(LINUX_REBOOT_CMD_KEXEC);
 	/* I have failed if I make it here */
 	fprintf(stderr, "kexec failed: %s\n", 
diff --git a/kexec/kexec.h b/kexec/kexec.h
index 595dd681db6d..0f97a974cb8a 100644
--- a/kexec/kexec.h
+++ b/kexec/kexec.h
@@ -324,7 +324,7 @@ void cmdline_add_liveupdate(char **base);
 int xen_present(void);
 int xen_kexec_load(struct kexec_info *info);
 int xen_kexec_unload(uint64_t kexec_flags);
-void xen_kexec_exec(uint64_t kexec_flags);
+int xen_kexec_exec(uint64_t kexec_flags);
 int xen_kexec_status(uint64_t kexec_flags);
 
 extern unsigned long long get_kernel_sym(const char *text);
-- 
2.32.0



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 14:44:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 14:44:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293923.499508 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX2E8-0008JV-SQ; Wed, 23 Mar 2022 14:44:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293923.499508; Wed, 23 Mar 2022 14:44:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX2E8-0008JO-NS; Wed, 23 Mar 2022 14:44:44 +0000
Received: by outflank-mailman (input) for mailman id 293923;
 Wed, 23 Mar 2022 14:44:43 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=EmH6=UC=verge.net.au=horms@vergenet.net>)
 id 1nX2E7-00083W-Kl
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 14:44:43 +0000
Received: from zeeaster.vergenet.net (zeeaster.vergenet.net [206.189.110.174])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id c6688d50-aab7-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 15:44:43 +0100 (CET)
Received: from madeliefje.horms.nl (86-88-72-229.fixed.kpn.net [86.88.72.229])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature RSA-PSS (2048 bits))
 (No client certificate requested)
 by zeeaster.vergenet.net (Postfix) with ESMTPSA id 3002B200C6;
 Wed, 23 Mar 2022 14:43:42 +0000 (UTC)
Received: by madeliefje.horms.nl (Postfix, from userid 7100)
 id D56072ECE; Wed, 23 Mar 2022 15:43:41 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c6688d50-aab7-11ec-a405-831a346695d4
Date: Wed, 23 Mar 2022 15:43:41 +0100
From: Simon Horman <horms@verge.net.au>
To: Raphael Ning <raphning@gmail.com>
Cc: kexec@lists.infradead.org, Julien Grall <julien@xen.org>,
	xen-devel@lists.xenproject.org, Raphael Ning <raphning@amazon.com>
Subject: Re: [PATCH] kexec-xen: Allow xen_kexec_exec() to return in case of
 Live Update
Message-ID: <YjsyHWtQArHXVZYJ@vergenet.net>
References: <20220314092115.48309-1-raphning@gmail.com>
 <Yjsp5zsc1lseY2M9@vergenet.net>
 <b1aea785-1631-2afc-2d8c-c21067903978@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <b1aea785-1631-2afc-2d8c-c21067903978@gmail.com>
Organisation: Horms Solutions BV
X-Virus-Scanned: clamav-milter 0.103.5 at zeeaster
X-Virus-Status: Clean

On Wed, Mar 23, 2022 at 02:20:52PM +0000, Raphael Ning wrote:
> 
> On 23/03/2022 14:08, Simon Horman wrote:
> > Hi Raphael,
> > thanks for your patch. Overall I think this is good.
> >
> > Unfortunately I am seeing a build failure with this patch applied.
> >
> >  ../../kexec/kexec-xen.c:292:6: error: conflicting types for ‘xen_kexec_exec’
> >   292 | void xen_kexec_exec(uint64_t kexec_flags)
> >       |      ^~~~~~~~~~~~~~
> > In file included from ../../kexec/kexec-xen.c:6:
> > ../../kexec/kexec.h:327:5: note: previous declaration of ‘xen_kexec_exec’ was here
> >   327 | int xen_kexec_exec(uint64_t kexec_flags);
> >       |     ^~~~~~~~~~~~~~
> > make[1]: *** [Makefile:124: kexec/kexec-xen.o] Error 1
> > make[1]: *** Waiting for unfinished jobs....
> >
> > See: https://github.com/horms/kexec-tools/runs/5661629877?check_suite_focus=true
> 
> 
> Hi Simon,
> 
> 
> Thanks for the review.  The conflicting declaration is for the --without-xen build, which I didn't test.  Let me fix that and post a new revision.

Thanks Raphael,

much appreciated.


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 14:59:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 14:59:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293928.499519 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX2SP-0001p2-1e; Wed, 23 Mar 2022 14:59:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293928.499519; Wed, 23 Mar 2022 14:59:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX2SO-0001ov-V3; Wed, 23 Mar 2022 14:59:28 +0000
Received: by outflank-mailman (input) for mailman id 293928;
 Wed, 23 Mar 2022 14:59:27 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=EmH6=UC=verge.net.au=horms@vergenet.net>)
 id 1nX2SN-0001op-EJ
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 14:59:27 +0000
Received: from zeeaster.vergenet.net (zeeaster.vergenet.net [206.189.110.174])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d507d751-aab9-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 15:59:26 +0100 (CET)
Received: from madeliefje.horms.nl
 (2a02-a44a-2918-403-201-8eff-fe22-8fea.fixed6.kpn.net
 [IPv6:2a02:a44a:2918:403:201:8eff:fe22:8fea])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature RSA-PSS (2048 bits))
 (No client certificate requested)
 by zeeaster.vergenet.net (Postfix) with ESMTPSA id CEF2B20138;
 Wed, 23 Mar 2022 14:59:25 +0000 (UTC)
Received: by madeliefje.horms.nl (Postfix, from userid 7100)
 id 7914A2ECE; Wed, 23 Mar 2022 15:59:25 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d507d751-aab9-11ec-8fbc-03012f2f19d4
Date: Wed, 23 Mar 2022 15:59:25 +0100
From: Simon Horman <horms@verge.net.au>
To: Raphael Ning <raphning@gmail.com>
Cc: kexec@lists.infradead.org, Julien Grall <julien@xen.org>,
	xen-devel@lists.xenproject.org, Raphael Ning <raphning@amazon.com>
Subject: Re: [PATCH v2] kexec-xen: Allow xen_kexec_exec() to return in case
 of Live Update
Message-ID: <Yjs1zcRAOWD5gwcP@vergenet.net>
References: <20220323144418.1658-1-raphning@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20220323144418.1658-1-raphning@gmail.com>
Organisation: Horms Solutions BV
X-Virus-Scanned: clamav-milter 0.103.5 at zeeaster
X-Virus-Status: Clean

On Wed, Mar 23, 2022 at 02:44:18PM +0000, Raphael Ning wrote:
> From: Raphael Ning <raphning@amazon.com>
> 
> Currently, my_exec() does not expect the Xen KEXEC_CMD_kexec hypercall
> to return on success, because it assumes that the hypercall always
> triggers an immediate reboot. However, for Live Update, the hypercall
> merely schedules the kexec operation and returns; the actual reboot
> happens asynchronously. [1]
> 
> Therefore, rework the Xen code path of my_exec() such that it does not
> treat a successfully processed Live Update request as an error. Also,
> rephrase the comment above the function to remove ambiguity.
> 
> [1] https://lists.xen.org/archives/html/xen-devel/2021-05/msg00286.html
> 
> Signed-off-by: Raphael Ning <raphning@amazon.com>

Thanks, applied.


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 15:43:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 15:43:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293936.499530 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX38n-0006wO-8Z; Wed, 23 Mar 2022 15:43:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293936.499530; Wed, 23 Mar 2022 15:43:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX38n-0006wH-48; Wed, 23 Mar 2022 15:43:17 +0000
Received: by outflank-mailman (input) for mailman id 293936;
 Wed, 23 Mar 2022 15:43:15 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=pbLi=UC=arm.com=rahul.singh@srs-se1.protection.inumbo.net>)
 id 1nX38l-0006wB-Ex
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 15:43:15 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTP
 id f2de4a28-aabf-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 16:43:13 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id BB840D6E;
 Wed, 23 Mar 2022 08:43:12 -0700 (PDT)
Received: from e109506.cambridge.arm.com (e109506.cambridge.arm.com
 [10.1.199.62])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 8B50A3F73D;
 Wed, 23 Mar 2022 08:43:11 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f2de4a28-aabf-11ec-8fbc-03012f2f19d4
From: Rahul Singh <rahul.singh@arm.com>
To: xen-devel@lists.xenproject.org
Cc: bertrand.marquis@arm.com,
	rahul.singh@arm.com,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>
Subject: [PATCH] xen/evtchn: Add design for static event channel signaling for domUs..
Date: Wed, 23 Mar 2022 15:43:03 +0000
Message-Id: <4836304496e6fbbea41348ed8cc9fcf6b0f3e893.1648049827.git.rahul.singh@arm.com>
X-Mailer: git-send-email 2.25.1
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

in dom0less system. This patch introduce the new feature to support the
signaling between two domUs in dom0less system.

Signed-off-by: Rahul Singh <rahul.singh@arm.com>
---
 docs/designs/dom0less-evtchn.md | 96 +++++++++++++++++++++++++++++++++
 1 file changed, 96 insertions(+)
 create mode 100644 docs/designs/dom0less-evtchn.md

diff --git a/docs/designs/dom0less-evtchn.md b/docs/designs/dom0less-evtchn.md
new file mode 100644
index 0000000000..6a1b7e8c22
--- /dev/null
+++ b/docs/designs/dom0less-evtchn.md
@@ -0,0 +1,96 @@
+# Signaling support between two domUs on dom0less system
+
+## Current state: Draft version
+
+## Proposer(s): Rahul Singh, Bertrand Marquis
+
+## Problem Statement:
+
+The goal of this work is to define a simple signaling system between Xen guests
+in dom0less systems.
+
+In dom0less system, we cannot make use of xenbus and xenstore that are used in
+normal systems with dynamic VMs to communicate between domains by providing a
+bus abstraction for paravirtualized drivers.
+
+One possible solution to implement the signaling system between domUs is based
+on event channels.
+
+## Proposal:
+
+Event channels are the basic primitive provided by Xen for event notifications.
+An event channel is a logical connection between 2 domains (more specifically
+between dom1,port1 and dom2,port2). They essentially store one bit of
+information, the event of interest is signalled by transitioning this bit from
+0 to 1. An event is an equivalent of a hardware interrupt.
+
+Notifications are received by a guest via an interrupt from Xen to the guest,
+indicating when an event arrives (setting the bit). Further notifications are
+masked until the bit is cleared again. When a domain wants to wait for data it
+will block until an event arrives, and then send an event to signal that data
+has been consumed. Events are delivered asynchronously to guests and are
+enqueued when the guest is not running.
+
+Event channel communication will be established statically between two domU
+guests before unpausing the domains after domain creation. Event channel
+connection information between domUs will be passed to XEN via device tree
+node.
+
+Under the /chosen node, there needs to be sub nodes with compatible
+"xen,evtchn" that descibes the event channel connection between two domUs.
+
+The event channel sub-node has the following properties:
+
+- compatible
+
+    "xen,evtchn"
+
+- xen,evtchn
+
+    The property is four numbers of tuples of
+    (local-port-domU1,domU1-phandle,local-port-domU2,domU2-phandle) where:
+
+    local-port-domU1 is an integer value that will be used to allocte local
+    port for domU1 to send an event notification to the remote domain.
+
+    domU1-phandle is a single phandle to an domain to which local-port-domU1
+    will be allocated.
+
+    local-port-domU2 is an integer value that will be used to allocte local
+    port for domU2 to send an event notification to the remote domain.
+
+    domU2-phandle is a single phandle to an domain to which local-port-domU2
+    will be allocated.
+
+Example:
+
+    chosen {
+        ....
+
+        domU1: domU1 {
+            ......
+        };
+
+        domU2: domU2 {
+            ......
+        };
+
+        evtchn@1 {
+            compatible = "xen,evtchn";
+            xen,evtchn = <0xa &domU1 0xb &domU2>;
+        };
+
+        evtchn@2 {
+            compatible = "xen,evtchn";
+            xen,evtchn = <0xc &domU1 0xd &domU2>;
+        };
+    };
+
+In above example two event channel comunication will be established between
+domU1 and domU2.
+
+    domU1 (port 0xa) <-----------------> domU2 (port 0xb)
+    domU1 (port 0xc) <-----------------> domU2 (port 0xd)
+
+domU1 and domU2 can send the signal to remote domain via hypercall
+EVTCHNOP_send(.) on local port.
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 15:43:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 15:43:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293937.499541 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX38x-0007EY-F4; Wed, 23 Mar 2022 15:43:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293937.499541; Wed, 23 Mar 2022 15:43:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX38x-0007ER-Bw; Wed, 23 Mar 2022 15:43:27 +0000
Received: by outflank-mailman (input) for mailman id 293937;
 Wed, 23 Mar 2022 15:43:26 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=y+6b=UC=roeck-us.net=linux@srs-se1.protection.inumbo.net>)
 id 1nX38w-0007Dg-9t
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 15:43:26 +0000
Received: from gateway22.websitewelcome.com (gateway22.websitewelcome.com
 [192.185.47.125]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f88f7f6a-aabf-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 16:43:23 +0100 (CET)
Received: from cm16.websitewelcome.com (cm16.websitewelcome.com [100.42.49.19])
 by gateway22.websitewelcome.com (Postfix) with ESMTP id 5658F3776
 for <xen-devel@lists.xenproject.org>; Wed, 23 Mar 2022 10:43:22 -0500 (CDT)
Received: from 162-215-252-75.unifiedlayer.com ([208.91.199.152])
 by cmsmtp with SMTP
 id X38snZIvHXvvJX38snu5R1; Wed, 23 Mar 2022 10:43:22 -0500
Received: from 108-223-40-66.lightspeed.sntcca.sbcglobal.net
 ([108.223.40.66]:57638 helo=localhost)
 by bh-25.webhostbox.net with esmtpsa (TLS1.2) tls
 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2)
 (envelope-from <linux@roeck-us.net>)
 id 1nX38q-0034li-Mc; Wed, 23 Mar 2022 15:43:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f88f7f6a-aabf-11ec-a405-831a346695d4
X-Authority-Reason: nr=8
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=roeck-us.net; s=default; h=Content-Type:MIME-Version:Message-ID:Subject:Cc:
	To:From:Date:Sender:Reply-To:Content-Transfer-Encoding:Content-ID:
	Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc
	:Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:
	List-Subscribe:List-Post:List-Owner:List-Archive;
	bh=lagRXHohghy8kR3woCuBBmkrcJ/jzmeeFU/A5c+1noo=; b=SKVgFgGANbObFf6amjfV24eu+h
	n0xWMkM27kPmvFAgvKcqFv+hfIHThLfoWcRnd1X8xFUcQP3HR13LA4VzmRqW+O6FeAgRVxjx27KSe
	hl2iN+faBt50LA0zMJAn8QRAKthN0v2Vcku3E5ajko0c30LSgmQO+U3vw8gVUULYf32KGgJo+PCIE
	flVfEntmD6Pxj237DGMtNbwdJvCMhuo0fSfOesmqg5BySHh87KeT7TljcegAXg6iNDlRbUWxBpB1P
	33QYer1vvhIIEQ4VhMb6a9eCkP1nCGe/5sBMPEQF8lCzmBRQ54ViRtb5zi3O8POeIPCXsSH7hXR8d
	33EJ51dQ==;
Date: Wed, 23 Mar 2022 08:43:19 -0700
From: Guenter Roeck <linux@roeck-us.net>
To: Christoph Hellwig <hch@lst.de>
Cc: Ryusuke Konishi <konishi.ryusuke@gmail.com>,
	Jens Axboe <axboe@kernel.dk>, linux-block@vger.kernel.org,
	linux-nfs@vger.kernel.org,
	linux-nilfs <linux-nilfs@vger.kernel.org>,
	Mike Snitzer <snitzer@redhat.com>,
	Philipp Reisner <philipp.reisner@linbit.com>,
	Konstantin Komarov <almaz.alexandrovich@paragon-software.com>,
	Roger Pau =?iso-8859-1?Q?Monn=E9?= <roger.pau@citrix.co>,
	device-mapper development <dm-devel@redhat.com>,
	"Md . Haris Iqbal" <haris.iqbal@ionos.com>,
	Lars Ellenberg <lars.ellenberg@linbit.com>,
	linux-fsdevel@vger.kernel.org, xen-devel@lists.xenproject.org,
	Andrew Morton <akpm@linux-foundation.org>, ntfs3@lists.linux.dev,
	Jack Wang <jinpu.wang@ionos.com>,
	Pavel Begunkov <asml.silence@gmail.com>, drbd-dev@lists.linbit.com
Subject: Re: [dm-devel] [PATCH 01/19] fs: remove mpage_alloc
Message-ID: <20220323154319.GA2268247@roeck-us.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - bh-25.webhostbox.net
X-AntiAbuse: Original Domain - lists.xenproject.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - roeck-us.net
X-BWhitelist: no
X-Source-IP: 108.223.40.66
X-Source-L: No
X-Exim-ID: 1nX38q-0034li-Mc
X-Source: 
X-Source-Args: 
X-Source-Dir: 
X-Source-Sender: 108-223-40-66.lightspeed.sntcca.sbcglobal.net (localhost) [108.223.40.66]:57638
X-Source-Auth: guenter@roeck-us.net
X-Email-Count: 18
X-Source-Cap: cm9lY2s7YWN0aXZzdG07YmgtMjUud2ViaG9zdGJveC5uZXQ=
X-Local-Domain: yes

On Wed, Mar 23, 2022 at 07:42:48AM +0100, Christoph Hellwig wrote:
> On Wed, Mar 23, 2022 at 06:38:22AM +0900, Ryusuke Konishi wrote:
> > This looks because the mask of GFP_KERNEL is removed along with
> > the removal of mpage_alloc().
> > 
> 
> > The default value of the gfp flag is set to GFP_HIGHUSER_MOVABLE by
> > inode_init_always().
> > So, __GFP_HIGHMEM hits the gfp warning at bio_alloc() that
> > do_mpage_readpage() calls.
> 
> Yeah.  Let's try this to match the iomap code:
> 
> diff --git a/fs/mpage.c b/fs/mpage.c
> index 9ed1e58e8d70b..d465883edf719 100644
> --- a/fs/mpage.c
> +++ b/fs/mpage.c
> @@ -148,13 +148,11 @@ static struct bio *do_mpage_readpage(struct mpage_readpage_args *args)
>  	int op = REQ_OP_READ;
>  	unsigned nblocks;
>  	unsigned relative_block;
> -	gfp_t gfp;
> +	gfp_t gfp = mapping_gfp_constraint(page->mapping, GFP_KERNEL);
>  
>  	if (args->is_readahead) {
>  		op |= REQ_RAHEAD;
> -		gfp = readahead_gfp_mask(page->mapping);
> -	} else {
> -		gfp = mapping_gfp_constraint(page->mapping, GFP_KERNEL);
> +		gfp |= __GFP_NORETRY | __GFP_NOWARN;
>  	}
>  
>  	if (page_has_buffers(page))

That fixes the problem for me.

Tested-by: Guenter Roeck <linux@roeck-us.net>

Guenter


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 16:08:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 16:08:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293943.499551 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX3Wb-0002AY-Hc; Wed, 23 Mar 2022 16:07:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293943.499551; Wed, 23 Mar 2022 16:07:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX3Wb-0002AR-Ee; Wed, 23 Mar 2022 16:07:53 +0000
Received: by outflank-mailman (input) for mailman id 293943;
 Wed, 23 Mar 2022 16:07:51 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=TYzS=UC=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nX3WZ-0002AL-FN
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 16:07:51 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6252589b-aac3-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 17:07:49 +0100 (CET)
Received: from EUR02-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur02lp2051.outbound.protection.outlook.com [104.47.6.51]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-39-uD28o2S8Ou6uJLJsLlAT4A-1; Wed, 23 Mar 2022 17:07:47 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by HE1PR0401MB2395.eurprd04.prod.outlook.com (2603:10a6:3:22::26)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.16; Wed, 23 Mar
 2022 16:07:45 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a%6]) with mapi id 15.20.5102.017; Wed, 23 Mar 2022
 16:07:45 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6252589b-aac3-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648051668;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=MoLqS1bmjAfXfjyhz7y39+THnQgopNeY391D3Dr5b0M=;
	b=BNoFiitb7VxC3otPmssL64ql9a+9JhfSOwTs1PzeUXzl3IinpnxMWCy6SR6q1ScPhXJRss
	uhlLLZpDEwUYtjFb3WMumHl6ImLb/jZnl2IJyUNnroEQcQsPr0eKfmGv0YjyXjfFKrq6Fy
	g1SwJ847gOJa1SyctTN1XY+q6QyQoOM=
X-MC-Unique: uD28o2S8Ou6uJLJsLlAT4A-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=HgPiyV4eJDV+oJ/iRLO3yTVCUqWvUjlesst7/Q28YXw9nIJsGlWthpX+1PvGR4tskFsqo8PbCNxhUnU5xwOvI+NQaJ8gw4n8xu99hW0ZZwDLhwsh9X/GWkW+/SoWdOeDKenKxre4yeJOFXuCOcAWHEbttLzoaUrbtevyUQ6egu+OJ/pt0KLHz+dyZBN3cSC9PXGLK6AyI/rWKpDzEbkiaGcmDRKpvj6EbTNFsB32d2GijNCJrAPCyY76XQ9VcAqTvljqAFvqpvciBeO1k80mJGNMbKVosuQsdHrtA93Gj+/7IKfLsaP63B4T1OG0EZxGsWPEyjTtITk4zJfZeJPG9g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=T5wJwKMCkw7X/MSjMTfzq73GZSh2/IKUyZdRv/I2xGg=;
 b=nRwOykvMl610CRr/j4+GPV5vHRdq62YGKotjomL1wL82Ukr37Dh5+V4UKo0MCP8OmDaoVZx6lmHUfc0RrNW1W+JS4SNcAhVJQIDbogUF/izNsUEs/YxV3hf4QwMg+hAQ/zGhQ9YJkLrtE6n3IOEYVr05nF/AtT17CgIqjFjkm6B1DMIBJwEEvG9YHHnUZDdEAiXth7patHbZMnYxh15tRyrLIhIiG6Fs/6tRCjFPFIU1p5UT1W8SD9PBcM9E+/NOzXCvrxB8nYbh9Qybyadtb+sKgM6l/jDt2Ycl8iWQWnoT4FUBkIeZ6QwWMgIa6P8Cgs5C40wZWE0AAoOKu2wDkg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <36c2a426-5354-fc38-1917-af7045bdf268@suse.com>
Date: Wed, 23 Mar 2022 17:07:42 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] xen/evtchn: Add design for static event channel signaling
 for domUs..
Content-Language: en-US
To: Rahul Singh <rahul.singh@arm.com>
CC: bertrand.marquis@arm.com, Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <4836304496e6fbbea41348ed8cc9fcf6b0f3e893.1648049827.git.rahul.singh@arm.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <4836304496e6fbbea41348ed8cc9fcf6b0f3e893.1648049827.git.rahul.singh@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6P192CA0088.EURP192.PROD.OUTLOOK.COM
 (2603:10a6:209:8d::29) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 06f72702-7828-4245-e175-08da0ce7445d
X-MS-TrafficTypeDiagnostic: HE1PR0401MB2395:EE_
X-Microsoft-Antispam-PRVS:
	<HE1PR0401MB2395FA48559FA33454DCFA1AB3189@HE1PR0401MB2395.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(38100700002)(83380400001)(31686004)(66476007)(5660300002)(66946007)(2906002)(66556008)(6486002)(4326008)(508600001)(8676002)(8936002)(6916009)(316002)(31696002)(54906003)(26005)(53546011)(86362001)(36756003)(6666004)(6512007)(6506007)(186003)(2616005)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?O/oFWCpndAeBx1kQhRoWZuNJXPZgHNYTALTqhKbHx3uDtbpaoXzNj6JG5ssa?=
 =?us-ascii?Q?lfbmfU0qJwCggfWWpZ3ninNp2y+Rp2V7wqfrkGoFixSd2f00ZpAo1PR/C8A+?=
 =?us-ascii?Q?+k0COp324P9mMQIW9JYNoarTzqKN1/2zONlRxYULgPGsu63m+ifMRp5/371M?=
 =?us-ascii?Q?QJFjcgZFewpEkwOMoPRoKVO1AS7C37WKPFcaXvWp5F3nmjLSUvmDdkj5mgVx?=
 =?us-ascii?Q?tEhMMpiAFlymvVE+0XWPEoRpH0b2CXLfI4LeaDzpGUFWMIo4dabBEAOJcnt3?=
 =?us-ascii?Q?8nRbL+iLJs7LXRGYdSQaZ6V/gY7XoTiJpgmyi1CXr+LsSrRZpS9m+EEnSHiK?=
 =?us-ascii?Q?z89FiwJk9bYoG0w3UevrOaAECFtUJ2uwmOoA/MFWSzNUAmJMyPWCr0fZtgnC?=
 =?us-ascii?Q?B1KlDDLHpWe26odu1kzNSOC1HYEhrVF0bLmYDi4ckN/CpDS7JrSgKLPGcTNf?=
 =?us-ascii?Q?jyfIza5AMrbJc5mX/GOPDZYbkYM57s+wNcijog6kFG77QcMXLHHCI0qFfB2X?=
 =?us-ascii?Q?U7wfqAG3O9Hei0zP22dNAGW9ksGTVAFSHw0clJkr8hU5GcW+1ebpxL72cDKl?=
 =?us-ascii?Q?8oNcq3ZoXm83VYTER3vZGNeYsrbNCHfNACfx7geEaAIL4lwu/ZTU5+IvBBnJ?=
 =?us-ascii?Q?xPMr41OVdYO6jHJ2LYhWB46/Kyl5rWq1BZnJvmI1+mgFxqcoA5/ib67rPN4l?=
 =?us-ascii?Q?JSpWZVByPz7udItKqo6uK+yaxczerwC4z6t6J4sb+wocbL+fE+tSGkeQqaRn?=
 =?us-ascii?Q?prHBU4NAZ5iioDXquTjcY1hxQSeFRxKlIJ8gJa1yUstQ7EGXODFgV4PPZ/bb?=
 =?us-ascii?Q?3dr7Rr9xdfRVXKc6l5oOPQLEuf7a1Nt0vOEpoMNzSMkLemhhSfJVgOlOr3Gj?=
 =?us-ascii?Q?n3P4OUK0zSc1WPNOkfEkvlF42BP6dHy1+nf45EzMQ5tQ2xzcl+w8U1Lm7qu1?=
 =?us-ascii?Q?i9uaixjAZM9ANR16WEtrK3w8h0V3g0CXey4DVL4ceQMf17Ztorq6S91301ZS?=
 =?us-ascii?Q?Ln2EhLi4oq3oCwFQ6eIHm1cQYcWIVS6oDtWZRQn0j64rVyLeTniTU/YDlAv9?=
 =?us-ascii?Q?MoV0C1h8GC+7iSN++24L4/zZlOnKbaAU7+StEOBHaVYb3m3G+gpiV0BWu/y2?=
 =?us-ascii?Q?M9qikiY3WfDl/V0mdBKTv/RunV/Vum7sHV1nfo7GfN2KuufR21nGQXcOrdSz?=
 =?us-ascii?Q?z3GRExS/T+CCg4vl+S3Hx6qObMoBK3D2VkzzqqYRhu5u+IMb7lPNgdj7UPyY?=
 =?us-ascii?Q?WTL0D0c/kn+lkJ2mCRFG1NO6UgKcZ6PvXSn/8k66KMRUI/7NR2Dz8h44m9bJ?=
 =?us-ascii?Q?cG0SwYLjl0mdmohs9C0or0VYia1Tlx03Ii+li2qQLDb3AJAhcg+uWT4bJirb?=
 =?us-ascii?Q?qlAxgjx9OWhQ7RxWERVyd20JpKCEbQ6x4EU5Dt0ywKPf0aufU/+Karrg64OK?=
 =?us-ascii?Q?4qDvHse4CpxxrbJHkiXlnZLDG4JR9qfY?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 06f72702-7828-4245-e175-08da0ce7445d
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Mar 2022 16:07:45.1265
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: DZx1L3Mc451MkowpDk912PY0ZP93hEzxzIFQx3T8RfquAXIbU1H5BIiMybUdNByJ48wPH/ST12qE1yS06UfLdg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0401MB2395

On 23.03.2022 16:43, Rahul Singh wrote:
> in dom0less system. This patch introduce the new feature to support the
> signaling between two domUs in dom0less system.
>=20
> Signed-off-by: Rahul Singh <rahul.singh@arm.com>
> ---
>  docs/designs/dom0less-evtchn.md | 96 +++++++++++++++++++++++++++++++++
>  1 file changed, 96 insertions(+)
>  create mode 100644 docs/designs/dom0less-evtchn.md
>=20
> diff --git a/docs/designs/dom0less-evtchn.md b/docs/designs/dom0less-evtc=
hn.md
> new file mode 100644
> index 0000000000..6a1b7e8c22
> --- /dev/null
> +++ b/docs/designs/dom0less-evtchn.md
> @@ -0,0 +1,96 @@
> +# Signaling support between two domUs on dom0less system
> +
> +## Current state:=E2=80=AFDraft version
> +
> +## Proposer(s): Rahul Singh, Bertrand Marquis
> +
> +## Problem Statement:
> +
> +The goal of this work is to define a simple signaling system between Xen=
 guests
> +in dom0less systems.
> +
> +In dom0less system, we cannot make use of xenbus and xenstore that are u=
sed in
> +normal systems with dynamic VMs to communicate between domains by provid=
ing a
> +bus abstraction for paravirtualized drivers.
> +
> +One possible solution to implement the signaling system between domUs is=
 based
> +on event channels.
> +
> +## Proposal:
> +
> +Event channels are the basic primitive provided by Xen for event notific=
ations.
> +An event channel is a logical connection between 2 domains (more specifi=
cally
> +between dom1,port1 and dom2,port2). They essentially store one bit of
> +information, the event of interest is signalled by transitioning this bi=
t from
> +0 to 1. An event is an equivalent of a hardware interrupt.

Nit: Since you're talking of channels here, not ports, strictly speaking
it's two bits - one on each side. Alternatively instead of "They ..."
you could say "Each port ...".

> +Notifications are received by a guest via an interrupt from Xen to the g=
uest,
> +indicating when an event arrives (setting the bit). Further notification=
s are
> +masked until the bit is cleared again. When a domain wants to wait for d=
ata it
> +will block until an event arrives, and then send an event to signal that=
 data
> +has been consumed. Events are delivered asynchronously to guests and are
> +enqueued when the guest is not running.
> +
> +Event channel communication will be established statically between two d=
omU
> +guests before unpausing the domains after domain creation. Event channel
> +connection information between domUs will be passed to XEN via device tr=
ee
> +node.
> +
> +Under the /chosen node, there needs to be sub nodes with compatible
> +"xen,evtchn" that descibes the event channel connection between two domU=
s.
> +
> +The event channel sub-node has the following properties:
> +
> +- compatible
> +
> +    "xen,evtchn"
> +
> +- xen,evtchn
> +
> +    The property is four numbers of tuples of
> +    (local-port-domU1,domU1-phandle,local-port-domU2,domU2-phandle) wher=
e:

Nit: I think you mean "tuples of four numbers"?

> +    local-port-domU1 is an integer value that will be used to allocte lo=
cal
> +    port for domU1 to send an event notification to the remote domain.
> +
> +    domU1-phandle is a single phandle to an domain to which local-port-d=
omU1
> +    will be allocated.
> +
> +    local-port-domU2 is an integer value that will be used to allocte lo=
cal
> +    port for domU2 to send an event notification to the remote domain.
> +
> +    domU2-phandle is a single phandle to an domain to which local-port-d=
omU2
> +    will be allocated.
> +
> +Example:
> +
> +    chosen {
> +        ....
> +
> +        domU1: domU1 {
> +            ......
> +        };
> +
> +        domU2: domU2 {
> +            ......
> +        };
> +
> +        evtchn@1 {
> +            compatible =3D "xen,evtchn";
> +            xen,evtchn =3D <0xa &domU1 0xb &domU2>;
> +        };
> +
> +        evtchn@2 {
> +            compatible =3D "xen,evtchn";
> +            xen,evtchn =3D <0xc &domU1 0xd &domU2>;
> +        };
> +    };
> +
> +In above example two event channel comunication will be established betw=
een
> +domU1 and domU2.
> +
> +    domU1 (port 0xa) <-----------------> domU2 (port 0xb)
> +    domU1 (port 0xc) <-----------------> domU2 (port 0xd)
> +
> +domU1 and domU2 can send the signal to remote domain via hypercall
> +EVTCHNOP_send(.) on local port.

How do the DomU-s learn of these ports? I guess information is to be
extracted into their individual DT representation, but this could do
with spelling out, including how those nodes (or however the data
items are called in DT) would be named and what data they would
contain.

Further I assume this being encoded in the DT passed to Xen means
implicit consent of the admin security-wise. If so, this could do
with making explicit as well. If not, the security of this would
need discussing in even broader a scope.

Finally I assume such channels are established fully bound, i.e.
there's nothing to do by guests in order to establish communication.
This is another aspect that would imo better be said explicitly.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 16:12:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 16:12:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293946.499563 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX3bK-0003bn-0a; Wed, 23 Mar 2022 16:12:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293946.499563; Wed, 23 Mar 2022 16:12:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX3bJ-0003bg-Te; Wed, 23 Mar 2022 16:12:45 +0000
Received: by outflank-mailman (input) for mailman id 293946;
 Wed, 23 Mar 2022 16:12:45 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX3bJ-0003bW-CB; Wed, 23 Mar 2022 16:12:45 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX3bJ-0000Yz-5R; Wed, 23 Mar 2022 16:12:45 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX3bI-0008VY-Ol; Wed, 23 Mar 2022 16:12:44 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nX3bI-0006UR-OK; Wed, 23 Mar 2022 16:12:44 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=a1w8M8FxF9PRvRXRNKbMmACY08ShsGx7357iCTpGGFw=; b=wGAc0QlnAXS3T7TZlzXsp5OrAv
	TVtGpME32frWH4fPQlT450OrJTw2aucnI7Sa6l1ZiHbTn6P+zQap77TBwFCfXTz9kAwAaM4wzsGKf
	K3ij+LgqZyKdwcV8NslHRgFtsJIqPB8aAw1lALS8FMrfvjq0bl7ZQhUARAjEfl/IFMck=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168797-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168797: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl-pvhv2-intel:guest-start/debian.repeat:fail:heisenbug
    linux-linus:test-arm64-arm64-xl-vhd:guest-start:fail:heisenbug
    linux-linus:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:allowable
    linux-linus:test-amd64-amd64-xl-rtds:guest-localmigrate/x10:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=6b1f86f8e9c7f9de7ca1cb987b2cf25e99b1ae3a
X-Osstest-Versions-That:
    linux=b47d5a4f6b8d42f8a8fbe891b36215e4fddc53be
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 23 Mar 2022 16:12:44 +0000

flight 168797 linux-linus real [real]
flight 168802 linux-linus real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168797/
http://logs.test-lab.xenproject.org/osstest/logs/168802/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-pvhv2-intel 22 guest-start/debian.repeat fail pass in 168802-retest
 test-arm64-arm64-xl-vhd      13 guest-start         fail pass in 168802-retest

Regressions which are regarded as allowable (not blocking):
 test-armhf-armhf-xl-rtds    18 guest-start/debian.repeat fail REGR. vs. 168787

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-rtds     20 guest-localmigrate/x10  fail blocked in 168787
 test-arm64-arm64-xl-vhd     14 migrate-support-check fail in 168802 never pass
 test-arm64-arm64-xl-vhd 15 saverestore-support-check fail in 168802 never pass
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168787
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168787
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168787
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168787
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168787
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168787
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168787
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168787
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                6b1f86f8e9c7f9de7ca1cb987b2cf25e99b1ae3a
baseline version:
 linux                b47d5a4f6b8d42f8a8fbe891b36215e4fddc53be

Last test of basis   168787  2022-03-22 16:42:12 Z    0 days
Testing same since   168797  2022-03-23 04:23:50 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  "Huang, Ying" <ying.huang@intel.com>
  "kernelci.org bot" <bot@kernelci.org>
  "Sierra Guiza, Alejandro (Alex)" <alex.sierra@amd.com>
  Aaron Lu <aaron.lu@intel.com>
  Adrian Hunter <adrian.hunter@intel.com>
  Alex Williamson <alex.williamson@redhat.com>
  Alexander Shishkin <alexander.shishkin@linux.intel.com>
  Alexey Makhalov <amakhalov@vmware.com>
  Alistair Popple <apopple@nvidia.com>
  Amir Goldstein <amir73il@gmail.com>
  Anand Jain <anand.jain@oracle.com>
  Anatoly Pugachev <matorola@gmail.com> (sparc64)
  Andrew Morton <akpm@linux-foundation.org>
  andrew.yang <andrew.yang@mediatek.com>
  Anshuman Khandual <anshuman.khandual@arm.com>
  Anthony Iliopoulos <ailiop@suse.com>
  Anton Altaparmakov <anton@tuxera.com>
  Ard Biesheuvel <ardb@kernel.org>
  Bang Li <libang.linuxer@gmail.com>
  Baolin Wang <baolin.wang@linux.alibaba.com>
  Bart Van Assche <bvanassche@acm.org>
  Bharata B Rao <bharata@amd.com>
  Bill Wendling <morbo@google.com>
  Boqun Feng <boqun.feng@gmail.com>
  Borislav Petkov <bp@suse.de>
  Brendan Higgins <brendanhiggins@google.com>
  Catalin Marinas <catalin.marinas@arm.com>
  CGEL ZTE <cgel.zte@gmail.com>
  Chao Yu <chao.yu@oppo.com>
  Chao Yu <chao@kernel.org>
  Charan Teja Kalla <quic_charante@quicinc.com>
  Chengming Zhou <zhouchengming@bytedance.com>
  Chris Down <chris@chrisdown.name>
  Chris von Recklinghausen <crecklin@redhat.com>
  Christian Brauner <christian.brauner@ubuntu.com>
  Christoph Hellwig <hch@lst.de>
  Christophe Leroy <christophe.leroy@csgroup.eu>
  Chuck Lever <chuck.lever@oracle.com>
  Colin Ian King <colin.i.king@gmail.com>
  Daeho Jeong <daehojeong@google.com>
  Dai Ngo <dai.ngo@oracle.com>
  Damien Le Moal <damien.lemoal@opensource.wdc.com>
  Dan Carpenter <dan.carpenter@oracle.com>
  Darrick J. Wong <djwong@kernel.org>
  David Anderson <dvander@google.com>
  David Hildenbrand <david@redhat.com>
  David Howells <dhowells@redhat.com>
  David Howells <dhowells@redhat.com> # afs
  David Rientjes <rientjes@google.com>
  David Sterba <dsterba@suse.com>
  Dietmar Eggemann <dietmar.eggemann@arm.com>
  Dongliang Mu <mudongliangabcd@gmail.com>
  Dr. David Alan Gilbert <linux@treblig.org>
  Dāvis Mosāns <davispuh@gmail.com>
  Eric Biggers <ebiggers@google.com>
  Eric Dumazet <edumazet@google.com>
  Felix Kuehling <Felix.Kuehling@amd.com>
  Fengnan Chang <changfengnan@vivo.com>
  Filipe Manana <fdmanana@suse.com>
  Frederic Weisbecker <frederic@kernel.org>
  Gabriel Krisman Bertazi <krisman@collabora.com>
  Gao Xiang <hsiangkao@linux.alibaba.com>
  Guillaume Tucker <guillaume.tucker@collabora.com>
  Guo Zhengkui <guozhengkui@vivo.com>
  Hari Bathini <hbathini@linux.ibm.com>
  Honglei Wang <wanghonglei@didichuxing.com>
  hongnanli <hongnan.li@linux.alibaba.com>
  Huang Ying <ying.huang@intel.com>
  Huang, Ying <ying.huang@intel.com>
  Hugh Dickins <hughd@google.com>
  Ingo Molnar <mingo@kernel.org>
  Ira Weiny <ira.weiny@intel.com>
  Jaegeuk Kim <jaegeuk@kernel.org>
  Jakob Koschel <jakobkoschel@gmail.com>
  Jan Kara <jack@suse.cz>
  Jean Delvare <jdelvare@suse.de>
  Jeffle Xu <jefflexu@linux.alibaba.com>
  Jens Axboe <axboe@kernel.dk>
  Jia Yang <jiayang5@huawei.com>
  Jiapeng Chong <jiapeng.chong@linux.alibaba.com>
  Jicheng Shao <shaojicheng@hust.edu.cn>
  Jing Xia <jing.xia@unisoc.com>
  Johannes Thumshirn <johannes.thumshirn@wdc.com>
  Johannes Weiner <hannes@cmpxchg.org>
  John Hubbard <jhubbard@nvidia.com>
  John Keeping <john@metanate.com>
  Josef Bacik <josef@toxicpanda.com>
  Joseph Qi <joseph.qi@linux.alibaba.com>
  Juhyung Park <qkrwngud825@gmail.com>
  Juri Lelli <juri.lelli@redhat.com>
  K Prateek Nayak <kprateek.nayak@amd.com>
  Kan Liang <kan.liang@linux.intel.com>
  Konstantin Vyshetsky <vkon@google.com>
  lianzhi chang <changlianzhi@uniontech.com>
  lihongnan <hongnan.lhn@alibaba-inc.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Lukas Czerner <lczerner@redhat.com>
  luofei <luofei@unicloud.com>
  Maciej S. Szmigiero <maciej.szmigiero@oracle.com>
  Marcelo Tosatti <mtosatti@redhat.com>
  Marco Elver <elver@google.com>
  Marek Szyprowski <m.szyprowski@samsung.com>
  Mark Rutland <mark.rutland@arm.com>
  Masahiro Yamada <masahiroy@kernel.org>
  Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
  Matthew Wilcox (Oracle) <willy@infradead.org>
  Mel Gorman <mgorman@suse.de>
  Mel Gorman <mgorman@techsingularity.net>
  Miaohe Lin <linmiaohe@huawei.com>
  Michael Ellerman <mpe@ellerman.id.au>
  Michal Hocko <mhocko@suse.com>
  Mike Kravetz <mike.kravetz@oracle.com>
  Mike Marshall <hubcap@omnibond.com> # orangefs
  Mike Rapoport <rppt@linux.ibm.com>
  Minchan Kim <minchan@kernel.org>
  Minghao Chi <chi.minghao@zte.com.cn>
  Muchun Song <songmuchun@bytedance.com>
  Nadav Amit <namit@vmware.com>
  Naohiro Aota <naohiro.aota@wdc.com>
  Naoya Horiguchi <naoya.horiguchi@nec.com>
  Nathan Chancellor <nathan@kernel.org>
  NeilBrown <neilb@suse.de>
  Nicolas Saenz Julienne <nsaenzju@redhat.com>
  Niels Dossche <dossche.niels@gmail.com>
  Niels Dossche <niels.dossche@ugent.be>
  Nikolay Borisov <nborisov@suse.com>
  Ojaswin Mujoo <ojaswin@linux.ibm.com>
  Oleg Nesterov <oleg@redhat.com>
  Omar Sandoval <osandov@fb.com>
  Ondrej Valousek <ondrej.valousek.xm@renesas.com>
  Oscar Salvador <osalvador@suse.de>
  Pankaj Raghav <p.raghav@samsung.com>
  Paulo Alcantara (SUSE) <pc@cjr.nz>
  Pavel Machek <pavel@denx.de>
  Peng Liu <liupeng256@huawei.com>
  Peter Collingbourne <pcc@google.com>
  Peter Xu <peterx@redhat.com>
  Peter Zijlstra (Intel) <peterz@infradead.org>
  Qais Yousef <qais.yousef@arm.com>
  Qian Cai <quic_qiancai@quicinc.com>
  Qu Wenruo <wqu@sus,ree.com>
  Qu Wenruo <wqu@suse.com>
  Rafael Aquini <raquini@redhat.com>
  Rafael J. Wysocki <rafael.j.wysocki@intel.com>
  Randy Dunlap <rdunlap@infradead.org>
  Rasmus Villemoes <linux@rasmusvillemoes.dk>
  Rik van Riel <riel@surriel.com>
  Ritesh Harjani <riteshh@linux.ibm.com>
  Rob Herring <robh@kernel.org>
  Rohith Surabattula <rohiths@microsoft.com>
  Roman Gushchin <guro@fb.com>
  Roman Gushchin <roman.gushchin@linux.dev>
  Ronnie Sahlberg <lsahlber@redhat.com>
  Ryusuke Konishi <konishi.ryusuke@gmail.com>   [nilfs]
  Sahil Kang <sahil.kang@asilaycomputing.com>
  Satya Tangirala <satyat@google.com>
  Sebastian Andrzej Siewior <bigeasy@linutronix.de>
  SeongJae Park <sj@kernel.org>
  Shakeel Butt <shakeelb@google.com>
  Shyam Prasad N <sprasad@microsoft.com>
  Sidong Yang <realwakka@gmail.com>
  Souptick Joarder <jrdr.linux@gmail.com>
  Stafford Horne <shorne@gmail.com>
  Steve French <stfrench@microsoft.com>
  Steve Wahl <steve.wahl@hpe.com>
  Steven Rostedt (Google) <rostedt@goodmis.org>
  Suren Baghdasaryan <surenb@google.com>
  Sweet Tea Dorminy <sweettea-kernel@dorminy.me>
  Sylvain Bellone <sylvain.bellone@algolia.com>
  tangmeng <tangmeng@uniontech.com>
  Tejun Heo <tj@kernel.org>
  Theodore Ts'o <tytso@mit.edu>
  Theodore Ts'o <tytso@mit.edu>         [ext4]
  Tianchen Ding <dtcccc@linux.alibaba.com>
  Tim Murray <timmurray@google.com>
  Uladzislau Rezki (Sony) <urezki@gmail.com>
  Uladzislau Rezki <uladzislau.rezki@sony.com>
  Valentin Schneider <valentin.schneider@arm.com>
  Vasily Averin <vvs@virtuozzo.com>
  Vlastimil Babka <vbabka@suse.cz>
  Waiman Long <longman@redhat.com>
  Wang Qing <wangqing@vivo.com>
  Wang Xiaojun <wangxiaojun11@huawei.com>
  Wei Wang <wei.w.wang@intel.com>
  Wei Yang <richard.weiyang@gmail.com>
  Will Deacon <will@kernel.org>
  William Kucharski <william.kucharski@oracle.com>
  Xavier Roche <xavier.roche@algolia.com>
  Xin Hao <xhao@linux.alibaba.com>
  Xiu Jianfeng <xiujianfeng@huawei.com>
  Yang Li <yang.lee@linux.alibaba.com>
  Yang Yang <yang.yang29@zte.com.cn>
  Ye Bin <yebin10@huawei.com>
  Yosry Ahmed <yosryahmed@google.com>
  Yury Norov <yury.norov@gmail.com>
  Zhang Yi <yi.zhang@huawei.com>
  Zhaoyang Huang <zhaoyang.huang@unisoc.com>
  Zhen Ni <nizhen@uniontech.com>
  Zhiguo Niu <zhiguo.niu@unisoc.com>
  Zhouyi Zhou <zhouzhouyi@gmail.com>
  Zi Yan <ziy@nvidia.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              fail    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     fail    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      fail    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   b47d5a4f6b8d4..6b1f86f8e9c7f  6b1f86f8e9c7f9de7ca1cb987b2cf25e99b1ae3a -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 16:31:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 16:31:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293961.499579 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX3to-0006Bk-Sr; Wed, 23 Mar 2022 16:31:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293961.499579; Wed, 23 Mar 2022 16:31:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX3to-0006Bd-Nd; Wed, 23 Mar 2022 16:31:52 +0000
Received: by outflank-mailman (input) for mailman id 293961;
 Wed, 23 Mar 2022 16:31:51 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=6JCQ=UC=ziepe.ca=jgg@srs-se1.protection.inumbo.net>)
 id 1nX3tn-0006BX-8r
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 16:31:51 +0000
Received: from mail-qk1-x72c.google.com (mail-qk1-x72c.google.com
 [2607:f8b0:4864:20::72c])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id bd07757e-aac6-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 17:31:50 +0100 (CET)
Received: by mail-qk1-x72c.google.com with SMTP id v15so1455822qkg.8
 for <xen-devel@lists.xenproject.org>; Wed, 23 Mar 2022 09:31:49 -0700 (PDT)
Received: from ziepe.ca
 (hlfxns017vw-142-162-113-129.dhcp-dynamic.fibreop.ns.bellaliant.net.
 [142.162.113.129]) by smtp.gmail.com with ESMTPSA id
 a6-20020ae9e806000000b0067ba5a8a2a7sm210602qkg.134.2022.03.23.09.31.47
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Wed, 23 Mar 2022 09:31:47 -0700 (PDT)
Received: from jgg by mlx with local (Exim 4.94) (envelope-from <jgg@ziepe.ca>)
 id 1nX3ti-004xOm-Q4; Wed, 23 Mar 2022 13:31:46 -0300
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: bd07757e-aac6-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=ziepe.ca; s=google;
        h=date:from:to:cc:subject:message-id:references:mime-version
         :content-disposition:in-reply-to;
        bh=J3AvCzI63JEnokrUC4Iwv6N5EWlCu1QJfFBDdd/unKY=;
        b=jL8Up4A9KJl86VW8bp2LwyPe3GAoSvY02FH4VZGMRf6L8+fy2IzjDosZj2yZefYHQB
         wzL15TdotJDVuRXcBuocyR5w36bv7gZ8tf4g1MKYFQR6D7UvEyM5LvpeCOBYCYYqtvVO
         QyYconNt0ojQtvQjwvpbahs23JDp7wBTIn6N690sGkiHGnQM8LJ1X418m2IoldJjuiqS
         RfOsRcA7Ab18vaKZ5C7r2Iy6XbYC7agVkkPu12ogJSZffaAcXR5qVLo/l8Cx2lD2Vb53
         EVDKvyQLlG7Zlg+SF2t2YhCjoaTPBYzz/XzH9IByKiPCqA5OV8uON5z0miITLmXSIb3V
         4LoQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:date:from:to:cc:subject:message-id:references
         :mime-version:content-disposition:in-reply-to;
        bh=J3AvCzI63JEnokrUC4Iwv6N5EWlCu1QJfFBDdd/unKY=;
        b=YSXnnXWwG3R2To6N5bfH9WFdkGVQ/DMSDwxx0tPB+gmjC6wzqpWNwSdBK9xDOM4M1Y
         pPOBhmWyGW8thXfNPtMGqL120o0i2u9p5qxA4nFdIpRWalR4TMyIJckYGX6mMZdPyynJ
         HkCVcv7R4qyvTvqnLz00YE34h6pIwwbjQe3f0N8q0AndiXZPynA2g1nrLvFx0khGHwat
         ZWaTGAimWBv72vZt71ckMgvr3kkFVoOD7Y655qrPyRuzXKI79ENLhAz8bC7/BN++F8CZ
         xttorLOqEf8FM5Xp7/JHZWV5nu1gP84/2h09b9cBdhLlDeYNXlldcWSg7tOuolIcaP0m
         t3+A==
X-Gm-Message-State: AOAM533blNr3ZrX/X0dHN7R7inMu5rtFTFnlFIaFC4tTPngXXNKsUkPL
	FTIRxR30i5c72aVsJxNvWQTsYQ==
X-Google-Smtp-Source: ABdhPJw6RSABU5Oon1xMFEywJpe1TUJiBcWQJAx1x5CGutfzgTfUsftf7dysku23cafQK2qtN0k/DQ==
X-Received: by 2002:a05:620a:d8d:b0:67b:e95:2975 with SMTP id q13-20020a05620a0d8d00b0067b0e952975mr475429qkl.115.1648053108858;
        Wed, 23 Mar 2022 09:31:48 -0700 (PDT)
Date: Wed, 23 Mar 2022 13:31:46 -0300
From: Jason Gunthorpe <jgg@ziepe.ca>
To: Michal Hocko <mhocko@suse.com>
Cc: Juergen Gross <jgross@suse.com>, linux-mm@kvack.org,
	lkml <linux-kernel@vger.kernel.org>,
	Andrew Morton <akpm@linux-foundation.org>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	Jerome Glisse <jglisse@redhat.com>
Subject: Re: blocking vs. non-blocking mmu notifiers
Message-ID: <20220323163146.GI64706@ziepe.ca>
References: <8e8ec786-74db-157b-a290-b1537941e91d@suse.com>
 <YjrsOnxaPYc3rbdj@dhcp22.suse.cz>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <YjrsOnxaPYc3rbdj@dhcp22.suse.cz>

On Wed, Mar 23, 2022 at 10:45:30AM +0100, Michal Hocko wrote:
> [Let me add more people to the CC list - I am not really sure who is the
>  most familiar with all the tricks that mmu notifiers might do]
> 
> On Wed 23-03-22 09:43:59, Juergen Gross wrote:
> > Hi,
> > 
> > during analysis of a customer's problem on a 4.12 based kernel
> > (deadlock due to a blocking mmu notifier in a Xen driver) I came
> > across upstream patches 93065ac753e4 ("mm, oom: distinguish
> > blockable mode for mmu notifiers") et al.
> > 
> > The backtrace of the blocked tasks was typically something like:
> > 
> >  #0 [ffffc9004222f228] __schedule at ffffffff817223e2
> >  #1 [ffffc9004222f2b8] schedule at ffffffff81722a02
> >  #2 [ffffc9004222f2c8] schedule_preempt_disabled at ffffffff81722d0a
> >  #3 [ffffc9004222f2d0] __mutex_lock at ffffffff81724104
> >  #4 [ffffc9004222f360] mn_invl_range_start at ffffffffc01fd398 [xen_gntdev]
> >  #5 [ffffc9004222f398] __mmu_notifier_invalidate_page at ffffffff8123375a
> >  #6 [ffffc9004222f3c0] try_to_unmap_one at ffffffff812112cb
> >  #7 [ffffc9004222f478] rmap_walk_file at ffffffff812105cd
> >  #8 [ffffc9004222f4d0] try_to_unmap at ffffffff81212450
> >  #9 [ffffc9004222f508] shrink_page_list at ffffffff811e0755
> > #10 [ffffc9004222f5c8] shrink_inactive_list at ffffffff811e13cf
> > #11 [ffffc9004222f6a8] shrink_node_memcg at ffffffff811e241f
> > #12 [ffffc9004222f790] shrink_node at ffffffff811e29c5
> > #13 [ffffc9004222f808] do_try_to_free_pages at ffffffff811e2ee1
> > #14 [ffffc9004222f868] try_to_free_pages at ffffffff811e3248
> > #15 [ffffc9004222f8e8] __alloc_pages_slowpath at ffffffff81262c37
> > #16 [ffffc9004222f9f0] __alloc_pages_nodemask at ffffffff8121afc1
> > #17 [ffffc9004222fa48] alloc_pages_current at ffffffff8122f350
> > #18 [ffffc9004222fa78] __get_free_pages at ffffffff8121685a
> > #19 [ffffc9004222fa80] __pollwait at ffffffff8127e795
> > #20 [ffffc9004222faa8] evtchn_poll at ffffffffc00e802b [xen_evtchn]
> > #21 [ffffc9004222fab8] do_sys_poll at ffffffff8127f953
> > #22 [ffffc9004222fec8] sys_ppoll at ffffffff81280478
> > #23 [ffffc9004222ff30] do_syscall_64 at ffffffff81004954
> > #24 [ffffc9004222ff50] entry_SYSCALL_64_after_hwframe at ffffffff818000b6
> > 
> > It was found that the notifier of the Xen gntdev driver was using a
> > mutex resulting in the deadlock.

The bug here is that prior to commit a81461b0546c ("xen/gntdev: update
to new mmu_notifier semantic") wired the mn_invl_range_start() which
takes a mutex to invalidate_page, which is defined to run in an atomic
context.

> > Michal Hocko suggested that backporting above mentioned patch might
> > help, as the mmu notifier call is happening in atomic context.

IIRC "blocking" was not supposed to be about atomic context or not, but
more about time to completion/guarenteed completion as it is used from
a memory reclaim path.

> Just to be more explicit. The current upstream code calls
> mmu_notifier_invalidate_range while the page table locks are held.
> Are there any notifiers which could sleep in those? 

There should not be, that would be a bug that lockdep would find.

> In other words should we use the nonblock start/stop in
> try_to_unmap?

AFAICT, no.

Jason


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 16:48:44 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 16:48:44 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293964.499589 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX49s-0007rW-7T; Wed, 23 Mar 2022 16:48:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293964.499589; Wed, 23 Mar 2022 16:48:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX49s-0007rP-4b; Wed, 23 Mar 2022 16:48:28 +0000
Received: by outflank-mailman (input) for mailman id 293964;
 Wed, 23 Mar 2022 16:48:27 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=TXoM=UC=m5p.com=ehem@srs-se1.protection.inumbo.net>)
 id 1nX49r-0007rJ-Af
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 16:48:27 +0000
Received: from mailhost.m5p.com (mailhost.m5p.com [74.104.188.4])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 0d9a2a9f-aac9-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 17:48:24 +0100 (CET)
Received: from m5p.com (mailhost.m5p.com [IPv6:2001:470:1f07:15ff:0:0:0:f7])
 by mailhost.m5p.com (8.16.1/8.15.2) with ESMTPS id 22NGUsfg024825
 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO);
 Wed, 23 Mar 2022 12:31:00 -0400 (EDT) (envelope-from ehem@m5p.com)
Received: (from ehem@localhost)
 by m5p.com (8.16.1/8.15.2/Submit) id 22NGUsfg024824;
 Wed, 23 Mar 2022 09:30:54 -0700 (PDT) (envelope-from ehem)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0d9a2a9f-aac9-11ec-a405-831a346695d4
Date: Wed, 23 Mar 2022 09:30:54 -0700
From: Elliott Mitchell <ehem+xen@m5p.com>
To: Roger Pau Monn?? <roger.pau@citrix.com>
Cc: xen-devel@lists.xenproject.org, Jan Beulich <JBeulich@suse.com>,
        Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: Questions about Cx and Px state uploading from dom0
Message-ID: <YjtLPvd8trF+h8j4@mattapan.m5p.com>
References: <YjrgQOYbsaYOV08H@Air-de-Roger>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <YjrgQOYbsaYOV08H@Air-de-Roger>
X-Spam-Status: No, score=0.4 required=10.0 tests=KHOP_HELO_FCRDNS autolearn=no
	autolearn_force=no version=3.4.5
X-Spam-Checker-Version: SpamAssassin 3.4.5 (2021-03-20) on mattapan.m5p.com

On Wed, Mar 23, 2022 at 09:54:24AM +0100, Roger Pau Monn?? wrote:
> 
> 2. When uploading Px states, what's the meaning of the shared_type
> field in xen_processor_performance?  I've looked at the usage of the
> field by Xen, and first of all it seems to be a layering violation
> because the values set in the field (CPUFREQ_SHARED_TYPE_*) are not
> exposed as part of the public interface.  This all works for Linux
> because the same values are used by Xen and the Linux kernel.
> Secondly, this is not part of the data fetched from ACPI AFAICT, so
> I'm unsure how the value should be calculated.  I also wonder whether
> this couldn't be done by Xen itself from the uploaded Px data (but
> without knowing exactly how the value should be calculated it's hard
> to tell).

This would account for some of the behavior with Xen and Linux.  The
Xen C-state support doesn't seem to be in a stable state.  I've seen the
level of functionality vary by version of Xen and Linux.

In particular C-states appear to be a problem.  Enabling C-states besides
C0 appears to require a corresponding Domain 0 vCPU.  If Domain 0 has
fewer vCPUs than physical cores, C2 will be unavailable on some cores.
Also, C2 is only available with some combinations of Xen and Linux.

This isn't an issue for datacenters where idle processors are wasted
money, but for smaller systems reduced power consumption is a good thing.
Hypervisors are moving onto smaller and smaller systems, so power
consumption is a bigger issue now.


-- 
(\___(\___(\______          --=> 8-) EHM <=--          ______/)___/)___/)
 \BS (    |         ehem+sigmsg@m5p.com  PGP 87145445         |    )   /
  \_CS\   |  _____  -O #include <stddisclaimer.h> O-   _____  |   /  _/
8A19\___\_|_/58D2 7E3D DDF4 7BA6 <-PGP-> 41D1 B375 37D0 8714\_|_/___/5445




From xen-devel-bounces@lists.xenproject.org Wed Mar 23 16:49:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 16:49:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293967.499599 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4BA-0008Oq-HT; Wed, 23 Mar 2022 16:49:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293967.499599; Wed, 23 Mar 2022 16:49:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4BA-0008Oj-Ec; Wed, 23 Mar 2022 16:49:48 +0000
Received: by outflank-mailman (input) for mailman id 293967;
 Wed, 23 Mar 2022 16:49:46 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=AzRF=UC=suse.com=mhocko@srs-se1.protection.inumbo.net>)
 id 1nX4B8-0008OX-MV
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 16:49:46 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 3e1b55e6-aac9-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 17:49:45 +0100 (CET)
Received: from relay2.suse.de (relay2.suse.de [149.44.160.134])
 by smtp-out1.suse.de (Postfix) with ESMTP id D8357210F3;
 Wed, 23 Mar 2022 16:49:44 +0000 (UTC)
Received: from suse.cz (unknown [10.100.201.86])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by relay2.suse.de (Postfix) with ESMTPS id 8B1A4A3B87;
 Wed, 23 Mar 2022 16:49:44 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3e1b55e6-aac9-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648054184; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=22ADZAB+7skaLqBInlr+u4wR7AIA/10MMMrUH4hmyqg=;
	b=oKhk9Cql8RB3t1jmsW+Oo6vEsnO+LnEOjuudGFTJor/ASf/X8Ihk/o+8wwpS8uMQCu7yxZ
	YQw7MdBmjvSrKzYUACYG6MUo+a6Ak5ms/lBErRmswrGe8YofSONokaQRp61jZduv08dp/7
	QffTCYzlW9hgB5JS8ZHwtKkWEGMuVQU=
Date: Wed, 23 Mar 2022 17:49:43 +0100
From: Michal Hocko <mhocko@suse.com>
To: Jason Gunthorpe <jgg@ziepe.ca>
Cc: Juergen Gross <jgross@suse.com>, linux-mm@kvack.org,
	lkml <linux-kernel@vger.kernel.org>,
	Andrew Morton <akpm@linux-foundation.org>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	Jerome Glisse <jglisse@redhat.com>
Subject: Re: blocking vs. non-blocking mmu notifiers
Message-ID: <YjtPpxlE/zWwnJ0W@dhcp22.suse.cz>
References: <8e8ec786-74db-157b-a290-b1537941e91d@suse.com>
 <YjrsOnxaPYc3rbdj@dhcp22.suse.cz>
 <20220323163146.GI64706@ziepe.ca>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20220323163146.GI64706@ziepe.ca>

On Wed 23-03-22 13:31:46, Jason Gunthorpe wrote:
> On Wed, Mar 23, 2022 at 10:45:30AM +0100, Michal Hocko wrote:
> > [Let me add more people to the CC list - I am not really sure who is the
> >  most familiar with all the tricks that mmu notifiers might do]
> > 
> > On Wed 23-03-22 09:43:59, Juergen Gross wrote:
> > > Hi,
> > > 
> > > during analysis of a customer's problem on a 4.12 based kernel
> > > (deadlock due to a blocking mmu notifier in a Xen driver) I came
> > > across upstream patches 93065ac753e4 ("mm, oom: distinguish
> > > blockable mode for mmu notifiers") et al.
> > > 
> > > The backtrace of the blocked tasks was typically something like:
> > > 
> > >  #0 [ffffc9004222f228] __schedule at ffffffff817223e2
> > >  #1 [ffffc9004222f2b8] schedule at ffffffff81722a02
> > >  #2 [ffffc9004222f2c8] schedule_preempt_disabled at ffffffff81722d0a
> > >  #3 [ffffc9004222f2d0] __mutex_lock at ffffffff81724104
> > >  #4 [ffffc9004222f360] mn_invl_range_start at ffffffffc01fd398 [xen_gntdev]
> > >  #5 [ffffc9004222f398] __mmu_notifier_invalidate_page at ffffffff8123375a
> > >  #6 [ffffc9004222f3c0] try_to_unmap_one at ffffffff812112cb
> > >  #7 [ffffc9004222f478] rmap_walk_file at ffffffff812105cd
> > >  #8 [ffffc9004222f4d0] try_to_unmap at ffffffff81212450
> > >  #9 [ffffc9004222f508] shrink_page_list at ffffffff811e0755
> > > #10 [ffffc9004222f5c8] shrink_inactive_list at ffffffff811e13cf
> > > #11 [ffffc9004222f6a8] shrink_node_memcg at ffffffff811e241f
> > > #12 [ffffc9004222f790] shrink_node at ffffffff811e29c5
> > > #13 [ffffc9004222f808] do_try_to_free_pages at ffffffff811e2ee1
> > > #14 [ffffc9004222f868] try_to_free_pages at ffffffff811e3248
> > > #15 [ffffc9004222f8e8] __alloc_pages_slowpath at ffffffff81262c37
> > > #16 [ffffc9004222f9f0] __alloc_pages_nodemask at ffffffff8121afc1
> > > #17 [ffffc9004222fa48] alloc_pages_current at ffffffff8122f350
> > > #18 [ffffc9004222fa78] __get_free_pages at ffffffff8121685a
> > > #19 [ffffc9004222fa80] __pollwait at ffffffff8127e795
> > > #20 [ffffc9004222faa8] evtchn_poll at ffffffffc00e802b [xen_evtchn]
> > > #21 [ffffc9004222fab8] do_sys_poll at ffffffff8127f953
> > > #22 [ffffc9004222fec8] sys_ppoll at ffffffff81280478
> > > #23 [ffffc9004222ff30] do_syscall_64 at ffffffff81004954
> > > #24 [ffffc9004222ff50] entry_SYSCALL_64_after_hwframe at ffffffff818000b6
> > > 
> > > It was found that the notifier of the Xen gntdev driver was using a
> > > mutex resulting in the deadlock.
> 
> The bug here is that prior to commit a81461b0546c ("xen/gntdev: update
> to new mmu_notifier semantic") wired the mn_invl_range_start() which
> takes a mutex to invalidate_page, which is defined to run in an atomic
> context.

Yeah, we have already identified that but quickly realized that the
whole mmu notifier overhaul which this fix depends on would be no no for
backporting to our older code base. So we are trying to find our way
around that.

> > > Michal Hocko suggested that backporting above mentioned patch might
> > > help, as the mmu notifier call is happening in atomic context.
> 
> IIRC "blocking" was not supposed to be about atomic context or not, but
> more about time to completion/guarenteed completion as it is used from
> a memory reclaim path.

Yeah, when I was introducing that I was mostly concerned about oom path.
But it is essentially impossible to tell what are the existing
assumptions different mmu notifiers operate on.

> 
> > Just to be more explicit. The current upstream code calls
> > mmu_notifier_invalidate_range while the page table locks are held.
> > Are there any notifiers which could sleep in those? 
> 
> There should not be, that would be a bug that lockdep would find.

OK, this is reassuring. Thanks!
-- 
Michal Hocko
SUSE Labs


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 17:04:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 17:04:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293979.499614 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4P3-0002QQ-Ri; Wed, 23 Mar 2022 17:04:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293979.499614; Wed, 23 Mar 2022 17:04:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4P3-0002QJ-Or; Wed, 23 Mar 2022 17:04:09 +0000
Received: by outflank-mailman (input) for mailman id 293979;
 Wed, 23 Mar 2022 17:04:08 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=6JCQ=UC=ziepe.ca=jgg@srs-se1.protection.inumbo.net>)
 id 1nX4P2-0002QD-9p
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 17:04:08 +0000
Received: from mail-qt1-x835.google.com (mail-qt1-x835.google.com
 [2607:f8b0:4864:20::835])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3fa1781d-aacb-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 18:04:07 +0100 (CET)
Received: by mail-qt1-x835.google.com with SMTP id b18so1677717qtk.13
 for <xen-devel@lists.xenproject.org>; Wed, 23 Mar 2022 10:04:07 -0700 (PDT)
Received: from ziepe.ca
 (hlfxns017vw-142-162-113-129.dhcp-dynamic.fibreop.ns.bellaliant.net.
 [142.162.113.129]) by smtp.gmail.com with ESMTPSA id
 e7-20020ac85987000000b002e1b7fa2201sm390829qte.56.2022.03.23.10.04.05
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Wed, 23 Mar 2022 10:04:05 -0700 (PDT)
Received: from jgg by mlx with local (Exim 4.94) (envelope-from <jgg@ziepe.ca>)
 id 1nX4Oy-004y0H-9Z; Wed, 23 Mar 2022 14:04:04 -0300
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3fa1781d-aacb-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=ziepe.ca; s=google;
        h=date:from:to:cc:subject:message-id:references:mime-version
         :content-disposition:in-reply-to;
        bh=Xnq4bRc3cz88ytLQgShmjJNQac+AYZh8iK8Px2OMFPU=;
        b=kNJF0xfmaBtRkYelsVEtH2PuynVN0qClkTty/AJqdCdvjWNfq2Xk2V4TNeY1tHRasf
         CTPK60t1bo6F9GX0IylFdyy0xJliGLDWAs7nUST7tNctmZzYcpVjzH/fak4ZXsxXO+S8
         5jeejGeZpe5zVlWxy0jTumjLbwoLSDWAS28Mb2tPR983RMexa9B8B94uGt5Se317TlzA
         fU3WtHm9SV29L423AHw8spl6E8QxF+tMOI9rNhgvsxAgFQqdYolSOo6RHmtyy7VdSVHq
         kc2rJfdw5nu5tN4AsX1zAwXNsLQb3MEqwVrJye4pnhAnMx4BfdV47f/DQXRcjpQRr47j
         0b3Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:date:from:to:cc:subject:message-id:references
         :mime-version:content-disposition:in-reply-to;
        bh=Xnq4bRc3cz88ytLQgShmjJNQac+AYZh8iK8Px2OMFPU=;
        b=tl1YKjAr1X+26GvoAPU+SSQNBF5o7bBJjrSWFVtx7xoIscDbNaKhM53sYC6AP6PUzq
         zj3lwtlJcVbCzvVx7aARv6ejbvfFj9tbdzpziuEx+hCWjON36h768f458tmgEgEEKS8M
         HVil1VmAuJ7Oji7w4wy1GBi5lAbVywQ+Slqu96VW8A5fldUV3lrDsRDBSnVpW1slZcrd
         XK8tV7WPnt9WB62Xd7r0YeXw9DP+l1yFNz3VUC/EgmGz9SlFSdiZVGmzJtKcG9Y+HgoE
         X3KnJMstWe8E+MVx3v5B1y7j6bjLIlGhWB9HSuemJTH570Mpax1Azl/XB9FGcpK95jit
         z79A==
X-Gm-Message-State: AOAM530BZT0a0oaTLu/NN+ttacbhHv1JcX3WjvfiWPuaSbhspyYep3m4
	OF2OknTf3svx2JoqWw/7sNlrqw==
X-Google-Smtp-Source: ABdhPJyYEQE0CYp6+og8QZG/WuYeFw545rz58LgI1p5Yq3Rl0fLB9/5tGE3gp9FdXtFsBCDq8JuXBA==
X-Received: by 2002:a05:622a:28f:b0:2e1:cebc:8c44 with SMTP id z15-20020a05622a028f00b002e1cebc8c44mr679876qtw.648.1648055045822;
        Wed, 23 Mar 2022 10:04:05 -0700 (PDT)
Date: Wed, 23 Mar 2022 14:04:04 -0300
From: Jason Gunthorpe <jgg@ziepe.ca>
To: Michal Hocko <mhocko@suse.com>
Cc: Juergen Gross <jgross@suse.com>, linux-mm@kvack.org,
	lkml <linux-kernel@vger.kernel.org>,
	Andrew Morton <akpm@linux-foundation.org>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	Jerome Glisse <jglisse@redhat.com>
Subject: Re: blocking vs. non-blocking mmu notifiers
Message-ID: <20220323170404.GK64706@ziepe.ca>
References: <8e8ec786-74db-157b-a290-b1537941e91d@suse.com>
 <YjrsOnxaPYc3rbdj@dhcp22.suse.cz>
 <20220323163146.GI64706@ziepe.ca>
 <YjtPpxlE/zWwnJ0W@dhcp22.suse.cz>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <YjtPpxlE/zWwnJ0W@dhcp22.suse.cz>

On Wed, Mar 23, 2022 at 05:49:43PM +0100, Michal Hocko wrote:
> > The bug here is that prior to commit a81461b0546c ("xen/gntdev: update
> > to new mmu_notifier semantic") wired the mn_invl_range_start() which
> > takes a mutex to invalidate_page, which is defined to run in an atomic
> > context.
> 
> Yeah, we have already identified that but quickly realized that the
> whole mmu notifier overhaul which this fix depends on would be no no for
> backporting to our older code base. So we are trying to find our way
> around that.

IMHO you don't need everything, just commit 369ea8242c0f ("mm/rmap:
update to new mmu_notifier semantic v2") which adds the missing
start/end outside the lock for the page callbacks.

Then you can take safely a8146 into gntdev.

Jason


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 17:15:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 17:15:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293983.499625 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4ZS-0003wV-QE; Wed, 23 Mar 2022 17:14:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293983.499625; Wed, 23 Mar 2022 17:14:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4ZS-0003wO-NB; Wed, 23 Mar 2022 17:14:54 +0000
Received: by outflank-mailman (input) for mailman id 293983;
 Wed, 23 Mar 2022 17:14:54 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX4ZS-0003wE-BX; Wed, 23 Mar 2022 17:14:54 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX4ZS-0001a0-9g; Wed, 23 Mar 2022 17:14:54 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX4ZR-0002bs-SW; Wed, 23 Mar 2022 17:14:53 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nX4ZR-0003Ch-S2; Wed, 23 Mar 2022 17:14:53 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=/8zBfwo4pda8kXQ7yggrF0CvI6Yhzti1jqz15NNeGe0=; b=cL9R+Am7Gy/6DDIUmQYcCoIgOM
	pt1j12q9BLeXMcdPQWBs71NgeQU2YvcglPzM+euamjnyy/Hy37e4hjSSKQrZMZ95dx17vEp3iccBB
	CBv8gThRFvnfGnebIaNnfiW2j4pXHox3ePeNAcv40fne7E13YqAQ09cKB2TzF+DB+hno=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168801-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168801: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 23 Mar 2022 17:14:53 +0000

flight 168801 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168801/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   23 days
Failing since        168258  2022-03-01 01:55:31 Z   22 days  231 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    1 days   12 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 17:18:05 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 17:18:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293990.499637 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4cW-0004aB-A0; Wed, 23 Mar 2022 17:18:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293990.499637; Wed, 23 Mar 2022 17:18:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4cW-0004a4-6h; Wed, 23 Mar 2022 17:18:04 +0000
Received: by outflank-mailman (input) for mailman id 293990;
 Wed, 23 Mar 2022 17:18:03 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=s5zF=UC=gmail.com=philippe.mathieu.daude@srs-se1.protection.inumbo.net>)
 id 1nX4cV-0004Zy-Ia
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 17:18:03 +0000
Received: from mail-pj1-x1032.google.com (mail-pj1-x1032.google.com
 [2607:f8b0:4864:20::1032])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 317cb5dc-aacd-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 18:18:02 +0100 (CET)
Received: by mail-pj1-x1032.google.com with SMTP id jx9so2356624pjb.5
 for <xen-devel@lists.xenproject.org>; Wed, 23 Mar 2022 10:18:02 -0700 (PDT)
Received: from localhost.localdomain (198.red-83-50-65.dynamicip.rima-tde.net.
 [83.50.65.198]) by smtp.gmail.com with ESMTPSA id
 p7-20020a17090a2d8700b001c785d6c1ffsm292709pjd.28.2022.03.23.10.17.55
 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256);
 Wed, 23 Mar 2022 10:18:00 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 317cb5dc-aacd-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:mime-version
         :content-transfer-encoding;
        bh=+l8uJm4CIqAcDOfVATSJ4rR/JXp8ZgwRxCX0NecHXmE=;
        b=CnJlMkzsqA1I0/mH2Lot6kLWsBC+yd0FigFPsBdJnkvWTCH7AGqvoK/3WSA/+IxdaM
         xzOZ/VWLKH2P+0+bY20wQCU1lvUg8UzUPGW8HGCn0xzOLSPN2nt/ryv4GGzFYdN1tA+j
         Dfuv6ALbCgaaTrVsNykkAPPQy1hp0ahfhA/Z6FXCTCwuKYjAFQuE/tkfghxuOvsYEJ2j
         WQXj4PxLPnHgTxgC34WolXx3T6YRrD4OrtlvBepJ+nquWnqnl6jJX+Uq017Y0DtIUEwx
         08sjphUWRYRsamVcoWbigH5wwmpaIogIzsNhOLxSWdBl46U0PoZkNmoYI8GpEX2N1xKE
         KDRQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version
         :content-transfer-encoding;
        bh=+l8uJm4CIqAcDOfVATSJ4rR/JXp8ZgwRxCX0NecHXmE=;
        b=5SJYOmDaQKGX7j6rj7m3xereoKqqNwb2TmD0I4Begf+H4OB8rW6eFqD+AdqAVMFXej
         2VXlOluyoWyanoE/CCTRwm2nzwi7xflsA3oFKPERQuzcWxuD+3hRjiTjJNgVBVL+BCXE
         7ZP4EUOabDxlJSS+kwf9aFWe8Vmi3Th4liGHXlZxnEzGKuzbsQ4M9ep1R9sCjRN9Bma+
         n6XekPyiLKxwoRTeY5topuv8RNoLvLqR20HXyvP8U0bKfMssU6MWt9KLu4W+qAj+ZERT
         XaH8/uqKgqka1ye9UnXTpoEIBZowLPEY6DUFfYkBO6zQp1ssBDqnIl8zISLDEdVNtInG
         YIog==
X-Gm-Message-State: AOAM530k9KejGvqplEziJIkuO5qiwmoyIEU/Z3JLJajwyY0d0N9edkDf
	AA9pGvi+6GFSN54tVK7foTE=
X-Google-Smtp-Source: ABdhPJyfNBPOJNSh1Ki6UbOUdxvcE3eiFy8Opq35BV6fw0og6EdkbvGhNha3qWs7W41vFPcTu8uFnQ==
X-Received: by 2002:a17:902:b902:b0:154:bb05:ddb9 with SMTP id bf2-20020a170902b90200b00154bb05ddb9mr1084944plb.14.1648055881126;
        Wed, 23 Mar 2022 10:18:01 -0700 (PDT)
From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <philippe.mathieu.daude@gmail.com>
To: qemu-devel@nongnu.org
Cc: Wenchao Wang <wenchao.wang@intel.com>,
	Laurent Vivier <lvivier@redhat.com>,
	David Hildenbrand <david@redhat.com>,
	Yanan Wang <wangyanan55@huawei.com>,
	Cameron Esfahani <dirty@apple.com>,
	Marcelo Tosatti <mtosatti@redhat.com>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Anthony Perard <anthony.perard@citrix.com>,
	haxm-team@intel.com,
	Paul Durrant <paul@xen.org>,
	Richard Henderson <richard.henderson@linaro.org>,
	xen-devel@lists.xenproject.org,
	=?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Roman Bolshakov <r.bolshakov@yadro.com>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Kamil Rytarowski <kamil@netbsd.org>,
	Paolo Bonzini <pbonzini@redhat.com>,
	Peter Xu <peterx@redhat.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Thomas Huth <thuth@redhat.com>,
	Colin Xu <colin.xu@intel.com>
Subject: [PATCH v4 00/13] accel: Fix vCPU memory leaks
Date: Wed, 23 Mar 2022 18:17:38 +0100
Message-Id: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
X-Mailer: git-send-email 2.35.1
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit

From: Philippe Mathieu-Daudé <f4bug@amsat.org>

Hi,

This is a respin of Mark 'vCPU hotunplug related memory leaks' v3:
https://lore.kernel.org/qemu-devel/20220321141409.3112932-1-mark.kanda@oracle.com/

Instead I refactored to extract the common common_vcpu_thread_create()
from all accelerators (except TCG/RR, which requires a special-casing).

Not well tested...

Mark Kanda (3):
  cpu: Free cpu->cpu_ases in cpu_address_space_destroy()
  softmmu/cpus: Free cpu->thread in generic_destroy_vcpu_thread()
  softmmu/cpus: Free cpu->halt_cond in generic_destroy_vcpu_thread()

Philippe Mathieu-Daudé (10):
  target/i386/kvm: Free xsave_buf when destroying vCPU
  target/i386/hvf: Free resources when vCPU is destroyed
  accel/hvf: Remove pointless assertion
  accel/tcg: Init TCG cflags in vCPU thread handler
  accel/tcg: Reorganize tcg_accel_ops_init()
  accel-ops: Introduce create_vcpu_thread_precheck / postcheck handlers
  accel/tcg: Extract rr_create_vcpu_thread_precheck()
  accel/all: Extract common_vcpu_thread_create()
  accel-ops: Introduce common_vcpu_thread_destroy() and .precheck
    handler
  accel/tcg: Add rr_destroy_vcpu_thread_precheck()

 accel/accel-softmmu.c             |  2 +-
 accel/dummy-cpus.c                | 15 +----------
 accel/hvf/hvf-accel-ops.c         | 24 +++--------------
 accel/kvm/kvm-accel-ops.c         | 17 +++---------
 accel/qtest/qtest.c               |  3 ++-
 accel/tcg/tcg-accel-ops-mttcg.c   | 27 +++----------------
 accel/tcg/tcg-accel-ops-mttcg.h   |  3 +--
 accel/tcg/tcg-accel-ops-rr.c      | 44 +++++++++++++++----------------
 accel/tcg/tcg-accel-ops-rr.h      |  7 +++--
 accel/tcg/tcg-accel-ops.c         | 22 +++++++++-------
 accel/xen/xen-all.c               |  2 +-
 cpu.c                             |  1 +
 include/exec/cpu-common.h         |  7 +++++
 include/sysemu/accel-ops.h        |  9 ++++++-
 include/sysemu/cpus.h             |  4 +--
 softmmu/cpus.c                    | 40 +++++++++++++++++++++++++---
 softmmu/physmem.c                 |  5 ++++
 target/i386/hax/hax-accel-ops.c   | 20 ++------------
 target/i386/hvf/hvf.c             |  2 ++
 target/i386/kvm/kvm.c             |  2 ++
 target/i386/nvmm/nvmm-accel-ops.c | 17 +++---------
 target/i386/whpx/whpx-accel-ops.c | 20 +++-----------
 22 files changed, 127 insertions(+), 166 deletions(-)

-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 17:18:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 17:18:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293991.499647 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4cj-0004z1-Kn; Wed, 23 Mar 2022 17:18:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293991.499647; Wed, 23 Mar 2022 17:18:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4cj-0004yt-Hg; Wed, 23 Mar 2022 17:18:17 +0000
Received: by outflank-mailman (input) for mailman id 293991;
 Wed, 23 Mar 2022 17:18:15 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=s5zF=UC=gmail.com=philippe.mathieu.daude@srs-se1.protection.inumbo.net>)
 id 1nX4ch-0004wT-QS
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 17:18:15 +0000
Received: from mail-pj1-x1036.google.com (mail-pj1-x1036.google.com
 [2607:f8b0:4864:20::1036])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 38bbd616-aacd-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 18:18:14 +0100 (CET)
Received: by mail-pj1-x1036.google.com with SMTP id m22so2398981pja.0
 for <xen-devel@lists.xenproject.org>; Wed, 23 Mar 2022 10:18:14 -0700 (PDT)
Received: from localhost.localdomain (198.red-83-50-65.dynamicip.rima-tde.net.
 [83.50.65.198]) by smtp.gmail.com with ESMTPSA id
 l20-20020a056a00141400b004f65cedfb09sm498798pfu.48.2022.03.23.10.18.07
 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256);
 Wed, 23 Mar 2022 10:18:12 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 38bbd616-aacd-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:in-reply-to:references
         :mime-version:content-transfer-encoding;
        bh=RdGe7OSna0pa6P1DCbP+tWeGpoxvWEJQjOuJ7sjX7ZM=;
        b=LfJoFD5fOViBkuqfE0KI6EMWLe6oYelEsiQii6kQMJ+pxD0zqcY9STqOMnDFSlW73M
         92ZYIUVnSjAEyM+0RN1XniYK9pmWDuGBo+SVmGf4sOHKTxRnTx7RfBfiXxSWznfHXIkq
         0ct06cT/vEr1W7QFb/EO+MjqCSN9t4/1zOTBHtezxjV3AkxnCTB6PF9fzrALv+p62nuR
         RTbDk67z0FYbVHfgSJqkxdDjD0ZVlUCIoQNiEBHCeZ0g3oW9bGRNmiBQyv4PmC07JGLY
         6pTUzjjLplNCGttiMQwTUmcJa0rxUNYiG8FiTe/ZrvXei+d0TJRUFxqUTgIUFjRYdCGL
         ZQAg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to
         :references:mime-version:content-transfer-encoding;
        bh=RdGe7OSna0pa6P1DCbP+tWeGpoxvWEJQjOuJ7sjX7ZM=;
        b=vJ9bBhoiwUWPSm1Ymhqpd7TvsUkbCy+jWMNDlnrxvaT9Q1wqLIq7a3nwoD3q4IUJxg
         9Pwv3cG6tPkcneNc1uPxg03wTW3C0xuUanHoAHScPBVWdglHZk7PEO90iWbljFXK5zbr
         UFPfZxTYN8PO7NIGplaoU78WRf9U8dSdqIygvgJirSiVuKMvPvzZqhHXp56kfqc45gCx
         15IgKi4RjF8Af9zelcDE+/ecMVYKsG9QyCNBtF55AvHqZlJUeU5Nl9HMVhMyTdmf84T6
         8rDnVS4Dh8zZELC3fn7jD2WqOTtKQ3UJn8oheOrKoAo1ooWtO1BkBYcTdFVG694B1UZZ
         8vpw==
X-Gm-Message-State: AOAM531KJBV0Iz3XDwI2qD4WWNfY9qghurxs1WWkPFFgGts9DQKsC7ym
	xTZo+SQPofPM6cfCSbXmzfg=
X-Google-Smtp-Source: ABdhPJw8FuyQ7wLlVvP9x+Z8gtO3cPHdbxET9VHqz4Un8qAadu86lw/vl8rV1uYpDaorpMWUtuAyqg==
X-Received: by 2002:a17:90b:1c07:b0:1c7:5324:c68e with SMTP id oc7-20020a17090b1c0700b001c75324c68emr802630pjb.202.1648055893334;
        Wed, 23 Mar 2022 10:18:13 -0700 (PDT)
From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <philippe.mathieu.daude@gmail.com>
To: qemu-devel@nongnu.org
Cc: Wenchao Wang <wenchao.wang@intel.com>,
	Laurent Vivier <lvivier@redhat.com>,
	David Hildenbrand <david@redhat.com>,
	Yanan Wang <wangyanan55@huawei.com>,
	Cameron Esfahani <dirty@apple.com>,
	Marcelo Tosatti <mtosatti@redhat.com>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Anthony Perard <anthony.perard@citrix.com>,
	haxm-team@intel.com,
	Paul Durrant <paul@xen.org>,
	Richard Henderson <richard.henderson@linaro.org>,
	xen-devel@lists.xenproject.org,
	=?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Roman Bolshakov <r.bolshakov@yadro.com>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Kamil Rytarowski <kamil@netbsd.org>,
	Paolo Bonzini <pbonzini@redhat.com>,
	Peter Xu <peterx@redhat.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Thomas Huth <thuth@redhat.com>,
	Colin Xu <colin.xu@intel.com>,
	Mark Kanda <mark.kanda@oracle.com>
Subject: [PATCH v4 01/13] cpu: Free cpu->cpu_ases in cpu_address_space_destroy()
Date: Wed, 23 Mar 2022 18:17:39 +0100
Message-Id: <20220323171751.78612-2-philippe.mathieu.daude@gmail.com>
X-Mailer: git-send-email 2.35.1
In-Reply-To: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
References: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

From: Mark Kanda <mark.kanda@oracle.com>

Create cpu_address_space_destroy() to free a CPU's cpu_ases list.

vCPU hotunplug related leak reported by Valgrind:

==132362== 216 bytes in 1 blocks are definitely lost in loss record 7,119 of 8,549
==132362==    at 0x4C3ADBB: calloc (vg_replace_malloc.c:1117)
==132362==    by 0x69EE4CD: g_malloc0 (in /usr/lib64/libglib-2.0.so.0.5600.4)
==132362==    by 0x7E34AF: cpu_address_space_init (physmem.c:751)
==132362==    by 0x45053E: qemu_init_vcpu (cpus.c:635)
==132362==    by 0x76B4A7: x86_cpu_realizefn (cpu.c:6520)
==132362==    by 0x9343ED: device_set_realized (qdev.c:531)
==132362==    by 0x93E26F: property_set_bool (object.c:2273)
==132362==    by 0x93C23E: object_property_set (object.c:1408)
==132362==    by 0x9406DC: object_property_set_qobject (qom-qobject.c:28)
==132362==    by 0x93C5A9: object_property_set_bool (object.c:1477)
==132362==    by 0x933C81: qdev_realize (qdev.c:333)
==132362==    by 0x455E9A: qdev_device_add_from_qdict (qdev-monitor.c:713)

Signed-off-by: Mark Kanda <mark.kanda@oracle.com>
Tested-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
Message-Id: <20220321141409.3112932-5-mark.kanda@oracle.com>
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
---
 cpu.c                     | 1 +
 include/exec/cpu-common.h | 7 +++++++
 softmmu/physmem.c         | 5 +++++
 3 files changed, 13 insertions(+)

diff --git a/cpu.c b/cpu.c
index be1f8b074c..59352a1487 100644
--- a/cpu.c
+++ b/cpu.c
@@ -174,6 +174,7 @@ void cpu_exec_unrealizefn(CPUState *cpu)
         tcg_exec_unrealizefn(cpu);
     }
 
+    cpu_address_space_destroy(cpu);
     cpu_list_remove(cpu);
 }
 
diff --git a/include/exec/cpu-common.h b/include/exec/cpu-common.h
index 50a7d2912e..b17ad61ae4 100644
--- a/include/exec/cpu-common.h
+++ b/include/exec/cpu-common.h
@@ -111,6 +111,13 @@ size_t qemu_ram_pagesize_largest(void);
  */
 void cpu_address_space_init(CPUState *cpu, int asidx,
                             const char *prefix, MemoryRegion *mr);
+/**
+ * cpu_address_space_destroy:
+ * @cpu: CPU for this address space
+ *
+ * Cleanup CPU's cpu_ases list.
+ */
+void cpu_address_space_destroy(CPUState *cpu);
 
 void cpu_physical_memory_rw(hwaddr addr, void *buf,
                             hwaddr len, bool is_write);
diff --git a/softmmu/physmem.c b/softmmu/physmem.c
index 43ae70fbe2..aec61ca07a 100644
--- a/softmmu/physmem.c
+++ b/softmmu/physmem.c
@@ -762,6 +762,11 @@ void cpu_address_space_init(CPUState *cpu, int asidx,
     }
 }
 
+void cpu_address_space_destroy(CPUState *cpu)
+{
+    g_free(cpu->cpu_ases);
+}
+
 AddressSpace *cpu_get_address_space(CPUState *cpu, int asidx)
 {
     /* Return the AddressSpace corresponding to the specified index */
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 17:18:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 17:18:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293995.499659 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4cv-0005S9-SU; Wed, 23 Mar 2022 17:18:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293995.499659; Wed, 23 Mar 2022 17:18:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4cv-0005S2-PR; Wed, 23 Mar 2022 17:18:29 +0000
Received: by outflank-mailman (input) for mailman id 293995;
 Wed, 23 Mar 2022 17:18:28 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=s5zF=UC=gmail.com=philippe.mathieu.daude@srs-se1.protection.inumbo.net>)
 id 1nX4ct-0004Zy-Ry
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 17:18:27 +0000
Received: from mail-pj1-x1035.google.com (mail-pj1-x1035.google.com
 [2607:f8b0:4864:20::1035])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4019c6a7-aacd-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 18:18:27 +0100 (CET)
Received: by mail-pj1-x1035.google.com with SMTP id
 o3-20020a17090a3d4300b001c6bc749227so2492351pjf.1
 for <xen-devel@lists.xenproject.org>; Wed, 23 Mar 2022 10:18:27 -0700 (PDT)
Received: from localhost.localdomain (198.red-83-50-65.dynamicip.rima-tde.net.
 [83.50.65.198]) by smtp.gmail.com with ESMTPSA id
 s6-20020a056a0008c600b004f667b8a6b6sm448750pfu.193.2022.03.23.10.18.19
 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256);
 Wed, 23 Mar 2022 10:18:25 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4019c6a7-aacd-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:in-reply-to:references
         :mime-version:content-transfer-encoding;
        bh=Kr2xMtMFIyMaJvHp1QmAibj3cqEfTuMfM82zkP/aCIo=;
        b=GzQ9UQBsumIhsWs2W2K2ffiFYxEFSk/uJQDwHsoJE62lVsznZpDAk+rbusDkg4/pXh
         oYRTWwWf3XXjgqFP4meFBl7xIZslLNSKyF5Y1Nkqv7BIN9qrP/HEZc2GPulKuv+eyy0Q
         CSLUBGrImnHkarTBPYHhqd4Bz5klN6S1366sxNVa10mTmSfYbuDDmi6EMLlX9llM8fg1
         Rm4ZEgKbpo0wmx0loAPNkIBIdsbxwIgizQ0MiPiw3WJfDKD7pBaLfqF/gCCtKxZBp7LS
         gRHq1IcA4FNU/hF6TniJKOWUVqcOHD5j7pUDrlVzfih8abviJtAdwMVwFP6x0OrQ4GyB
         ud3w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to
         :references:mime-version:content-transfer-encoding;
        bh=Kr2xMtMFIyMaJvHp1QmAibj3cqEfTuMfM82zkP/aCIo=;
        b=nHHTaCFZaE6QoD/OuDLxcFvMeu05SRdgOgaO8m89OLe5t9A/k7m9s00Cki4J0Rtfex
         Ig5+FtLmNW795Tjg5/aI45IQEN3mmyaes3qJ/Zkj4ImW7glqpDyvk3BM+zTwaZ+jLaOt
         35l/zwMbfO9S8q83bhJYoeRpAc+D6M2Hh5CjVByzcy26kXCpTwpEpJo80laOQ9vHDHev
         u4CugEET9JJFLZL7H9Cyx3WRtMJVRxUNIizvVIIZwetFDfsU6tR51wMGrxjT/99bHUwl
         TZcxpfNtLm9HVVDOC/BOL+1kSUBrQR/UmPb7DYefhMEJjNUGRoicN6BxRA3iSupEYt0c
         GR+A==
X-Gm-Message-State: AOAM531aEnvK/QuxiidNDp69DFZA0wxPsF/w6vQvmsg7j9LDVC4KNu+q
	+bP67QJIdgMIjgzgaC1TTfc=
X-Google-Smtp-Source: ABdhPJyp9ousXQMjN1mFJdianu0WkJ5NuwBi+VzVmYIuZ9KnREKdbkqv1O8I5j4eIk26Y9GvJf6XJA==
X-Received: by 2002:a17:902:834a:b0:14f:3337:35de with SMTP id z10-20020a170902834a00b0014f333735demr1074863pln.8.1648055905736;
        Wed, 23 Mar 2022 10:18:25 -0700 (PDT)
From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <philippe.mathieu.daude@gmail.com>
To: qemu-devel@nongnu.org
Cc: Wenchao Wang <wenchao.wang@intel.com>,
	Laurent Vivier <lvivier@redhat.com>,
	David Hildenbrand <david@redhat.com>,
	Yanan Wang <wangyanan55@huawei.com>,
	Cameron Esfahani <dirty@apple.com>,
	Marcelo Tosatti <mtosatti@redhat.com>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Anthony Perard <anthony.perard@citrix.com>,
	haxm-team@intel.com,
	Paul Durrant <paul@xen.org>,
	Richard Henderson <richard.henderson@linaro.org>,
	xen-devel@lists.xenproject.org,
	=?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Roman Bolshakov <r.bolshakov@yadro.com>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Kamil Rytarowski <kamil@netbsd.org>,
	Paolo Bonzini <pbonzini@redhat.com>,
	Peter Xu <peterx@redhat.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Thomas Huth <thuth@redhat.com>,
	Colin Xu <colin.xu@intel.com>,
	Mark Kanda <mark.kanda@oracle.com>
Subject: [PATCH v4 02/13] target/i386/kvm: Free xsave_buf when destroying vCPU
Date: Wed, 23 Mar 2022 18:17:40 +0100
Message-Id: <20220323171751.78612-3-philippe.mathieu.daude@gmail.com>
X-Mailer: git-send-email 2.35.1
In-Reply-To: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
References: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

From: Philippe Mathieu-Daudé <f4bug@amsat.org>

Fix vCPU hot-unplug related leak reported by Valgrind:

  ==132362== 4,096 bytes in 1 blocks are definitely lost in loss record 8,440 of 8,549
  ==132362==    at 0x4C3B15F: memalign (vg_replace_malloc.c:1265)
  ==132362==    by 0x4C3B288: posix_memalign (vg_replace_malloc.c:1429)
  ==132362==    by 0xB41195: qemu_try_memalign (memalign.c:53)
  ==132362==    by 0xB41204: qemu_memalign (memalign.c:73)
  ==132362==    by 0x7131CB: kvm_init_xsave (kvm.c:1601)
  ==132362==    by 0x7148ED: kvm_arch_init_vcpu (kvm.c:2031)
  ==132362==    by 0x91D224: kvm_init_vcpu (kvm-all.c:516)
  ==132362==    by 0x9242C9: kvm_vcpu_thread_fn (kvm-accel-ops.c:40)
  ==132362==    by 0xB2EB26: qemu_thread_start (qemu-thread-posix.c:556)
  ==132362==    by 0x7EB2159: start_thread (in /usr/lib64/libpthread-2.28.so)
  ==132362==    by 0x9D45DD2: clone (in /usr/lib64/libc-2.28.so)

Reported-by: Mark Kanda <mark.kanda@oracle.com>
Tested-by: Mark Kanda <mark.kanda@oracle.com>
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
---
 target/i386/kvm/kvm.c | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/target/i386/kvm/kvm.c b/target/i386/kvm/kvm.c
index ef2c68a6f4..e93440e774 100644
--- a/target/i386/kvm/kvm.c
+++ b/target/i386/kvm/kvm.c
@@ -2072,6 +2072,8 @@ int kvm_arch_destroy_vcpu(CPUState *cs)
     X86CPU *cpu = X86_CPU(cs);
     CPUX86State *env = &cpu->env;
 
+    g_free(env->xsave_buf);
+
     if (cpu->kvm_msr_buf) {
         g_free(cpu->kvm_msr_buf);
         cpu->kvm_msr_buf = NULL;
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 17:18:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 17:18:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.293997.499670 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4d8-0005zs-4w; Wed, 23 Mar 2022 17:18:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 293997.499670; Wed, 23 Mar 2022 17:18:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4d8-0005zj-1v; Wed, 23 Mar 2022 17:18:42 +0000
Received: by outflank-mailman (input) for mailman id 293997;
 Wed, 23 Mar 2022 17:18:40 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=s5zF=UC=gmail.com=philippe.mathieu.daude@srs-se1.protection.inumbo.net>)
 id 1nX4d5-0004Zy-Vq
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 17:18:40 +0000
Received: from mail-pl1-x62b.google.com (mail-pl1-x62b.google.com
 [2607:f8b0:4864:20::62b])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 475d90b2-aacd-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 18:18:39 +0100 (CET)
Received: by mail-pl1-x62b.google.com with SMTP id n18so2155934plg.5
 for <xen-devel@lists.xenproject.org>; Wed, 23 Mar 2022 10:18:39 -0700 (PDT)
Received: from localhost.localdomain (198.red-83-50-65.dynamicip.rima-tde.net.
 [83.50.65.198]) by smtp.gmail.com with ESMTPSA id
 f14-20020a63380e000000b0038253c4d5casm342070pga.36.2022.03.23.10.18.31
 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256);
 Wed, 23 Mar 2022 10:18:37 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 475d90b2-aacd-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:in-reply-to:references
         :mime-version:content-transfer-encoding;
        bh=bDnsp64dy23km8dL17HIpLYraoqdROmh6JM8WZ9QnxQ=;
        b=TgUmKBfMFNwRucBsohiY5JY8e9ioh62vGGPA59RsGbh//g7DqYEp6Ab52+czdRAyY8
         NP7JPeqO100BsBFOc/Ay4dhLNWNwRFNW03vJZd3riU8UJJWvYnCfPYB4pocDoGekJKUT
         EzAgZEJWkWoFt7AzL3aW+DcXjjEkdSBB2D7fwnNkzE01zFwCOgVJ7C0f1jNlgcaaL4GN
         MhaEpPpi7sWKWo2nMSg2I6MHW3HNXf4tqK4IqiAVB37OJeIwt+hp+9OnIiguj3TblBIw
         fUkPOD4SvMNhJbqs6CnecPk4971sAW1ktFQ1pBjZQ9c/VJNicw0UzYoWQqC6arJevJXa
         g6rw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to
         :references:mime-version:content-transfer-encoding;
        bh=bDnsp64dy23km8dL17HIpLYraoqdROmh6JM8WZ9QnxQ=;
        b=fbqV6WNR+FPinQ/XW/6doC3D1nuV9wYXRFOTJR+sAeLaFABbxMmhxyCmA3Bi9G04tu
         86NzRjuyMWj1zX5jynj88mkbqyBY5+DkBJB5JbkKL7N8XlLM3jDa/lk7hULidVo/q+8B
         BpGKEwKrlXbQQdR0pxEKS4RnL5EgxebgSX/ph3ZDBOqNZfhUmgu3Eg3BqTXncnoCka6D
         VwCvVxklHIqnsy1DkuQU450Hiz/HkXFQSnlITUePzILRkoYFVmsPuU3SRCyHxkPOYHFB
         q66u9rb0szn9ea+K4jyuayESbtwO6zemzE0Ic2HfiIidUaAGprrzOYSsyGJuM655FGAV
         NGQQ==
X-Gm-Message-State: AOAM532u0oFQqaJGWcRgOqyqYUZ5Bkcv77PRVrKBiQBNqEI+/DEIYRho
	WvU94JxXiyn9eusWJncvHXM=
X-Google-Smtp-Source: ABdhPJySoRv6SjqjiKCV5e8zH/IZey9o/1x0EduXwu4cNLj3RBjr1JlgyWZQVPeGljHAEFYooB4q3Q==
X-Received: by 2002:a17:90a:19d2:b0:1be:d815:477f with SMTP id 18-20020a17090a19d200b001bed815477fmr804349pjj.23.1648055917873;
        Wed, 23 Mar 2022 10:18:37 -0700 (PDT)
From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <philippe.mathieu.daude@gmail.com>
To: qemu-devel@nongnu.org
Cc: Wenchao Wang <wenchao.wang@intel.com>,
	Laurent Vivier <lvivier@redhat.com>,
	David Hildenbrand <david@redhat.com>,
	Yanan Wang <wangyanan55@huawei.com>,
	Cameron Esfahani <dirty@apple.com>,
	Marcelo Tosatti <mtosatti@redhat.com>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Anthony Perard <anthony.perard@citrix.com>,
	haxm-team@intel.com,
	Paul Durrant <paul@xen.org>,
	Richard Henderson <richard.henderson@linaro.org>,
	xen-devel@lists.xenproject.org,
	=?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Roman Bolshakov <r.bolshakov@yadro.com>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Kamil Rytarowski <kamil@netbsd.org>,
	Paolo Bonzini <pbonzini@redhat.com>,
	Peter Xu <peterx@redhat.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Thomas Huth <thuth@redhat.com>,
	Colin Xu <colin.xu@intel.com>,
	Mark Kanda <mark.kanda@oracle.com>,
	Igor Mammedov <imammedo@redhat.com>
Subject: [PATCH v4 03/13] target/i386/hvf: Free resources when vCPU is destroyed
Date: Wed, 23 Mar 2022 18:17:41 +0100
Message-Id: <20220323171751.78612-4-philippe.mathieu.daude@gmail.com>
X-Mailer: git-send-email 2.35.1
In-Reply-To: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
References: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

From: Philippe Mathieu-Daudé <f4bug@amsat.org>

Both xsave_buf and hvf_caps are allocated in hvf_arch_init_vcpu(),
free them in hvf_arch_vcpu_destroy().

Reported-by: Mark Kanda <mark.kanda@oracle.com>
Suggested-by: Igor Mammedov <imammedo@redhat.com>
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
---
 target/i386/hvf/hvf.c | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/target/i386/hvf/hvf.c b/target/i386/hvf/hvf.c
index fc12c02fb2..39fa4641b9 100644
--- a/target/i386/hvf/hvf.c
+++ b/target/i386/hvf/hvf.c
@@ -163,7 +163,9 @@ void hvf_arch_vcpu_destroy(CPUState *cpu)
     X86CPU *x86_cpu = X86_CPU(cpu);
     CPUX86State *env = &x86_cpu->env;
 
+    g_free(env->xsave_buf);
     g_free(env->hvf_mmio_buf);
+    g_free(hvf_state->hvf_caps);
 }
 
 static void init_tsc_freq(CPUX86State *env)
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 17:18:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 17:18:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294001.499681 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4dJ-0006VS-E1; Wed, 23 Mar 2022 17:18:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294001.499681; Wed, 23 Mar 2022 17:18:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4dJ-0006VE-As; Wed, 23 Mar 2022 17:18:53 +0000
Received: by outflank-mailman (input) for mailman id 294001;
 Wed, 23 Mar 2022 17:18:52 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=s5zF=UC=gmail.com=philippe.mathieu.daude@srs-se1.protection.inumbo.net>)
 id 1nX4dH-0004Zy-SL
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 17:18:51 +0000
Received: from mail-pg1-x52b.google.com (mail-pg1-x52b.google.com
 [2607:f8b0:4864:20::52b])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4e44ff65-aacd-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 18:18:51 +0100 (CET)
Received: by mail-pg1-x52b.google.com with SMTP id c11so1654462pgu.11
 for <xen-devel@lists.xenproject.org>; Wed, 23 Mar 2022 10:18:51 -0700 (PDT)
Received: from localhost.localdomain (198.red-83-50-65.dynamicip.rima-tde.net.
 [83.50.65.198]) by smtp.gmail.com with ESMTPSA id
 y9-20020a056a00180900b004faa45a2230sm455168pfa.210.2022.03.23.10.18.43
 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256);
 Wed, 23 Mar 2022 10:18:49 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4e44ff65-aacd-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:in-reply-to:references
         :mime-version:content-transfer-encoding;
        bh=R7g63uMCtTkVNfRXBZkshJ0Wiw4mo6s3K6WysQFVeHQ=;
        b=EMCnSQO4I48BMsxvvg3i3Lpu7MpcHIBM0VPU1LmYCuVl/RlXBQKnI+aX6Rw5+Otp1s
         8IIMhkhQPGFAd7938UkWmV4lBtqZCbG9FdGo8U8RK3KvsKQbLGAa0c0IrtuSOjDJjuSV
         QFauhI8kpDEcO0CLjjNlJcZcwM0mAHerEv/s6+nsiQVem/Cxo3XuGDnC60sV25zy8Fr3
         R6tcgTKLH53w67BvarZnpfob+GRcW9FPC96YnIAXa78jP8pjuvS3DMa/3hObSK9vvZeU
         ObQvhKX5xWReNbdvvifVE7tLNNOUGXQ9hqL23HPdi01BtJXokaAH3+6DQf7r2EYk52H9
         xHiQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to
         :references:mime-version:content-transfer-encoding;
        bh=R7g63uMCtTkVNfRXBZkshJ0Wiw4mo6s3K6WysQFVeHQ=;
        b=t9IAeuKFnloQHtE8HzVp2o8n9iOKyePbYPVpHPfikhxpJBNySLrbMBssI4ol3bUdg+
         GjCeobCus0t42jyjjQMfwFC7pJfJincbSv9ZG+7YX3SmgEade9aNwlr6QrG63uJRiTdn
         P3n+wjscDlTd+5+qvyzEXV41ITWzF23OR5Un6J4TzTqt4eMUUHoQ55TmmwExOFOhyolT
         i4YWvsPSH4ey6aUhBFQQ6BUlvPAjxAG4ItAdDIndB9h5iCwrbLSFp98VFPFy++aMFgfY
         LfhRiyKST7raS0NNYbQqjGJlPxhBbAwr42ibFnM/6zoZbBL5oR2oAFtoA6caUzlE9QlR
         JV2w==
X-Gm-Message-State: AOAM533SgP11lGmpzM0yWRV24dj35U63DJ7QzINihm7hBjEku0yX6Cjt
	papq/YCxXs3usetV5rMe1H0=
X-Google-Smtp-Source: ABdhPJwsqttKPum5jvLljX6MsvisPeyZTYUskQFajfuzSlqwRvUxcgnszNBQqCwAUxI0R7csaGC+rA==
X-Received: by 2002:a05:6a00:1d85:b0:4fa:9dba:f1f2 with SMTP id z5-20020a056a001d8500b004fa9dbaf1f2mr956040pfw.31.1648055929515;
        Wed, 23 Mar 2022 10:18:49 -0700 (PDT)
From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <philippe.mathieu.daude@gmail.com>
To: qemu-devel@nongnu.org
Cc: Wenchao Wang <wenchao.wang@intel.com>,
	Laurent Vivier <lvivier@redhat.com>,
	David Hildenbrand <david@redhat.com>,
	Yanan Wang <wangyanan55@huawei.com>,
	Cameron Esfahani <dirty@apple.com>,
	Marcelo Tosatti <mtosatti@redhat.com>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Anthony Perard <anthony.perard@citrix.com>,
	haxm-team@intel.com,
	Paul Durrant <paul@xen.org>,
	Richard Henderson <richard.henderson@linaro.org>,
	xen-devel@lists.xenproject.org,
	=?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Roman Bolshakov <r.bolshakov@yadro.com>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Kamil Rytarowski <kamil@netbsd.org>,
	Paolo Bonzini <pbonzini@redhat.com>,
	Peter Xu <peterx@redhat.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Thomas Huth <thuth@redhat.com>,
	Colin Xu <colin.xu@intel.com>
Subject: [PATCH v4 04/13] accel/hvf: Remove pointless assertion
Date: Wed, 23 Mar 2022 18:17:42 +0100
Message-Id: <20220323171751.78612-5-philippe.mathieu.daude@gmail.com>
X-Mailer: git-send-email 2.35.1
In-Reply-To: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
References: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

From: Philippe Mathieu-Daudé <f4bug@amsat.org>

Both the comment and the hvf_enabled() check are duplicated
at the beginning of hvf_cpu_thread_fn(), which is the thread
callback created by hvf_start_vcpu_thread(). Remove.

Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
---
 accel/hvf/hvf-accel-ops.c | 6 ------
 1 file changed, 6 deletions(-)

diff --git a/accel/hvf/hvf-accel-ops.c b/accel/hvf/hvf-accel-ops.c
index 54457c76c2..5c33dc602e 100644
--- a/accel/hvf/hvf-accel-ops.c
+++ b/accel/hvf/hvf-accel-ops.c
@@ -446,12 +446,6 @@ static void hvf_start_vcpu_thread(CPUState *cpu)
 {
     char thread_name[VCPU_THREAD_NAME_SIZE];
 
-    /*
-     * HVF currently does not support TCG, and only runs in
-     * unrestricted-guest mode.
-     */
-    assert(hvf_enabled());
-
     cpu->thread = g_malloc0(sizeof(QemuThread));
     cpu->halt_cond = g_malloc0(sizeof(QemuCond));
     qemu_cond_init(cpu->halt_cond);
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 17:19:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 17:19:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294003.499692 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4eH-0007TR-Pp; Wed, 23 Mar 2022 17:19:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294003.499692; Wed, 23 Mar 2022 17:19:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4eH-0007TK-MM; Wed, 23 Mar 2022 17:19:53 +0000
Received: by outflank-mailman (input) for mailman id 294003;
 Wed, 23 Mar 2022 17:19:52 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=s5zF=UC=gmail.com=philippe.mathieu.daude@srs-se1.protection.inumbo.net>)
 id 1nX4eG-0007T4-Bn
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 17:19:52 +0000
Received: from mail-pf1-x434.google.com (mail-pf1-x434.google.com
 [2607:f8b0:4864:20::434])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 71c1a642-aacd-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 18:19:50 +0100 (CET)
Received: by mail-pf1-x434.google.com with SMTP id u22so1978514pfg.6
 for <xen-devel@lists.xenproject.org>; Wed, 23 Mar 2022 10:19:50 -0700 (PDT)
Received: from localhost.localdomain (198.red-83-50-65.dynamicip.rima-tde.net.
 [83.50.65.198]) by smtp.gmail.com with ESMTPSA id
 h10-20020a056a00230a00b004faa0f67c3esm515084pfh.23.2022.03.23.10.19.42
 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256);
 Wed, 23 Mar 2022 10:19:48 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 71c1a642-aacd-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:in-reply-to:references
         :mime-version:content-transfer-encoding;
        bh=pYl7PFx6HJtSTXEwRh0v4jjLcljevjvNsnI/ABIkNpc=;
        b=AVu5Njemv6HLmOsdKQ+VfG9+68Y75QCUvSBWjlFuBjz/HNiGqkYCNDiZx3nYu9plDG
         UF7gb7VVoz34sG1mev5yCvoNrsQ1z8IWtvbq8+aDO+pYuGeK/DFV2qzT8BBc6poAy1Ll
         lOEl1BAafr+0lbjC4zH66PCSBb7+R1xkhdgQxWxYoeJlwK3WLMcfEGBgnF+sjnGbStK4
         a9SLdMMRZo/bJUh14Z6gnY4UjA5DdwaI6pbaa9fmRZtN7HA6P8qF3KsTh8w0VYYU2kuV
         0AUyXjYRd81y11ZlUPISW8rgQ5pc3ziJB920CpKR3PJuR1zGs+XHXjL8xkJmc2RZcs4z
         JHdg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to
         :references:mime-version:content-transfer-encoding;
        bh=pYl7PFx6HJtSTXEwRh0v4jjLcljevjvNsnI/ABIkNpc=;
        b=Z6vpjQOT/GhD6PV5F1enpK2ZvHz6mol000TVSQS20LdBx2kMKuJ09TKd13vhbxw/FK
         1Z5fOn7p6tP38cjt1nibFz0DgqP2li6FKvS/cdb1zYB1fOqOPLfMTjkIDahp7b9cMHSa
         SBWBQUiql7h1mVIXzArBkSwpP82fLtpr/D+jSil1Z69iwyF+ASnVTKUKDKT72opp33/K
         iCcd2kLWJ/a1FUKEgWFx6BtnV4jDAq1kDSsLSSAKwL+ZUQ12Tnj/xdnVzoF+w4Y4VlwF
         EuRz44JhyvLVqEOsr02dMhadlVlAHPA1SwVOaaweEL+z/bTe39i50ioVRZUzHwW9nuJA
         OkAA==
X-Gm-Message-State: AOAM530ONtrQ//u9fzkcHZ82HdbvAMjV9eI4BFbMm3JG1mFT64QpqogR
	X3kE8QooYLq2yDJILDpByCY=
X-Google-Smtp-Source: ABdhPJxwe0fvqNFuFM35WUTu/PR9vPZnoQaBkNABrXApSmPztgel1hVfca2uBIR7EEKKmqRyCL7USA==
X-Received: by 2002:a63:4d56:0:b0:382:9ad9:d28d with SMTP id n22-20020a634d56000000b003829ad9d28dmr691452pgl.45.1648055988955;
        Wed, 23 Mar 2022 10:19:48 -0700 (PDT)
From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <philippe.mathieu.daude@gmail.com>
To: qemu-devel@nongnu.org
Cc: Wenchao Wang <wenchao.wang@intel.com>,
	Laurent Vivier <lvivier@redhat.com>,
	David Hildenbrand <david@redhat.com>,
	Yanan Wang <wangyanan55@huawei.com>,
	Cameron Esfahani <dirty@apple.com>,
	Marcelo Tosatti <mtosatti@redhat.com>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Anthony Perard <anthony.perard@citrix.com>,
	haxm-team@intel.com,
	Paul Durrant <paul@xen.org>,
	Richard Henderson <richard.henderson@linaro.org>,
	xen-devel@lists.xenproject.org,
	=?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Roman Bolshakov <r.bolshakov@yadro.com>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Kamil Rytarowski <kamil@netbsd.org>,
	Paolo Bonzini <pbonzini@redhat.com>,
	Peter Xu <peterx@redhat.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Thomas Huth <thuth@redhat.com>,
	Colin Xu <colin.xu@intel.com>
Subject: [PATCH v4 09/13] accel/all: Extract common_vcpu_thread_create()
Date: Wed, 23 Mar 2022 18:17:47 +0100
Message-Id: <20220323171751.78612-10-philippe.mathieu.daude@gmail.com>
X-Mailer: git-send-email 2.35.1
In-Reply-To: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
References: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

From: Philippe Mathieu-Daudé <f4bug@amsat.org>

All accelerators implement a very similar create_vcpu_thread()
handler. Extract the common part as common_vcpu_thread_create(),
which only requires the AccelOpsClass::vcpu_thread_fn() routine
and the accelerator AccelOpsClass::thread_name for debugging
purpose.

The single exception is TCG/RR which re-use a single vCPU. Have
it use the same logic by using the .precheck/.postcheck handlers.

Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
---
 accel/accel-softmmu.c             |  2 +-
 accel/dummy-cpus.c                | 15 +--------------
 accel/hvf/hvf-accel-ops.c         | 18 +++---------------
 accel/kvm/kvm-accel-ops.c         | 17 +++--------------
 accel/qtest/qtest.c               |  3 ++-
 accel/tcg/tcg-accel-ops-mttcg.c   | 22 +---------------------
 accel/tcg/tcg-accel-ops-mttcg.h   |  3 +--
 accel/tcg/tcg-accel-ops-rr.c      | 21 +++------------------
 accel/tcg/tcg-accel-ops-rr.h      |  6 ++++--
 accel/tcg/tcg-accel-ops.c         |  6 ++++--
 accel/xen/xen-all.c               |  2 +-
 include/sysemu/accel-ops.h        |  3 ++-
 include/sysemu/cpus.h             |  4 ++--
 softmmu/cpus.c                    | 23 ++++++++++++++++++++---
 target/i386/hax/hax-accel-ops.c   | 20 ++------------------
 target/i386/nvmm/nvmm-accel-ops.c | 17 +++--------------
 target/i386/whpx/whpx-accel-ops.c | 20 +++-----------------
 17 files changed, 56 insertions(+), 146 deletions(-)

diff --git a/accel/accel-softmmu.c b/accel/accel-softmmu.c
index 67276e4f52..7800df0234 100644
--- a/accel/accel-softmmu.c
+++ b/accel/accel-softmmu.c
@@ -77,7 +77,7 @@ void accel_init_ops_interfaces(AccelClass *ac)
 
     /*
      * all accelerators need to define ops, providing at least a mandatory
-     * non-NULL create_vcpu_thread operation.
+     * non-NULL vcpu_thread_fn operation.
      */
     g_assert(ops != NULL);
     if (ops->ops_init) {
diff --git a/accel/dummy-cpus.c b/accel/dummy-cpus.c
index 10429fdfb2..9840057969 100644
--- a/accel/dummy-cpus.c
+++ b/accel/dummy-cpus.c
@@ -18,7 +18,7 @@
 #include "qemu/main-loop.h"
 #include "hw/core/cpu.h"
 
-static void *dummy_cpu_thread_fn(void *arg)
+void *dummy_vcpu_thread_fn(void *arg)
 {
     CPUState *cpu = arg;
     sigset_t waitset;
@@ -57,16 +57,3 @@ static void *dummy_cpu_thread_fn(void *arg)
     rcu_unregister_thread();
     return NULL;
 }
-
-void dummy_start_vcpu_thread(CPUState *cpu)
-{
-    char thread_name[VCPU_THREAD_NAME_SIZE];
-
-    cpu->thread = g_malloc0(sizeof(QemuThread));
-    cpu->halt_cond = g_malloc0(sizeof(QemuCond));
-    qemu_cond_init(cpu->halt_cond);
-    snprintf(thread_name, VCPU_THREAD_NAME_SIZE, "CPU %d/DUMMY",
-             cpu->cpu_index);
-    qemu_thread_create(cpu->thread, thread_name, dummy_cpu_thread_fn, cpu,
-                       QEMU_THREAD_JOINABLE);
-}
diff --git a/accel/hvf/hvf-accel-ops.c b/accel/hvf/hvf-accel-ops.c
index 5c33dc602e..91d65036b4 100644
--- a/accel/hvf/hvf-accel-ops.c
+++ b/accel/hvf/hvf-accel-ops.c
@@ -442,25 +442,13 @@ static void *hvf_cpu_thread_fn(void *arg)
     return NULL;
 }
 
-static void hvf_start_vcpu_thread(CPUState *cpu)
-{
-    char thread_name[VCPU_THREAD_NAME_SIZE];
-
-    cpu->thread = g_malloc0(sizeof(QemuThread));
-    cpu->halt_cond = g_malloc0(sizeof(QemuCond));
-    qemu_cond_init(cpu->halt_cond);
-
-    snprintf(thread_name, VCPU_THREAD_NAME_SIZE, "CPU %d/HVF",
-             cpu->cpu_index);
-    qemu_thread_create(cpu->thread, thread_name, hvf_cpu_thread_fn,
-                       cpu, QEMU_THREAD_JOINABLE);
-}
-
 static void hvf_accel_ops_class_init(ObjectClass *oc, void *data)
 {
     AccelOpsClass *ops = ACCEL_OPS_CLASS(oc);
 
-    ops->create_vcpu_thread = hvf_start_vcpu_thread;
+    ops->thread_name = "HVF";
+    ops->vcpu_thread_fn = hvf_cpu_thread_fn;
+
     ops->kick_vcpu_thread = hvf_kick_vcpu_thread;
 
     ops->synchronize_post_reset = hvf_cpu_synchronize_post_reset;
diff --git a/accel/kvm/kvm-accel-ops.c b/accel/kvm/kvm-accel-ops.c
index c4244a23c6..3d13efce0f 100644
--- a/accel/kvm/kvm-accel-ops.c
+++ b/accel/kvm/kvm-accel-ops.c
@@ -61,19 +61,6 @@ static void *kvm_vcpu_thread_fn(void *arg)
     return NULL;
 }
 
-static void kvm_start_vcpu_thread(CPUState *cpu)
-{
-    char thread_name[VCPU_THREAD_NAME_SIZE];
-
-    cpu->thread = g_malloc0(sizeof(QemuThread));
-    cpu->halt_cond = g_malloc0(sizeof(QemuCond));
-    qemu_cond_init(cpu->halt_cond);
-    snprintf(thread_name, VCPU_THREAD_NAME_SIZE, "CPU %d/KVM",
-             cpu->cpu_index);
-    qemu_thread_create(cpu->thread, thread_name, kvm_vcpu_thread_fn,
-                       cpu, QEMU_THREAD_JOINABLE);
-}
-
 static bool kvm_vcpu_thread_is_idle(CPUState *cpu)
 {
     return !kvm_halt_in_kernel();
@@ -88,7 +75,9 @@ static void kvm_accel_ops_class_init(ObjectClass *oc, void *data)
 {
     AccelOpsClass *ops = ACCEL_OPS_CLASS(oc);
 
-    ops->create_vcpu_thread = kvm_start_vcpu_thread;
+    ops->thread_name = "KVM";
+    ops->vcpu_thread_fn = kvm_vcpu_thread_fn;
+
     ops->cpu_thread_is_idle = kvm_vcpu_thread_is_idle;
     ops->cpus_are_resettable = kvm_cpus_are_resettable;
     ops->synchronize_post_reset = kvm_cpu_synchronize_post_reset;
diff --git a/accel/qtest/qtest.c b/accel/qtest/qtest.c
index f6056ac836..1d0b1c855c 100644
--- a/accel/qtest/qtest.c
+++ b/accel/qtest/qtest.c
@@ -50,7 +50,8 @@ static void qtest_accel_ops_class_init(ObjectClass *oc, void *data)
 {
     AccelOpsClass *ops = ACCEL_OPS_CLASS(oc);
 
-    ops->create_vcpu_thread = dummy_start_vcpu_thread;
+    ops->vcpu_thread_fn = dummy_vcpu_thread_fn;
+
     ops->get_virtual_clock = qtest_get_virtual_clock;
 };
 
diff --git a/accel/tcg/tcg-accel-ops-mttcg.c b/accel/tcg/tcg-accel-ops-mttcg.c
index 80609964a6..c7836332d7 100644
--- a/accel/tcg/tcg-accel-ops-mttcg.c
+++ b/accel/tcg/tcg-accel-ops-mttcg.c
@@ -63,7 +63,7 @@ static void mttcg_force_rcu(Notifier *notify, void *data)
  * current CPUState for a given thread.
  */
 
-static void *mttcg_cpu_thread_fn(void *arg)
+void *mttcg_vcpu_thread_fn(void *arg)
 {
     MttcgForceRcuNotifier force_rcu;
     CPUState *cpu = arg;
@@ -137,23 +137,3 @@ void mttcg_kick_vcpu_thread(CPUState *cpu)
 {
     cpu_exit(cpu);
 }
-
-void mttcg_start_vcpu_thread(CPUState *cpu)
-{
-    char thread_name[VCPU_THREAD_NAME_SIZE];
-
-    cpu->thread = g_new0(QemuThread, 1);
-    cpu->halt_cond = g_malloc0(sizeof(QemuCond));
-    qemu_cond_init(cpu->halt_cond);
-
-    /* create a thread per vCPU with TCG (MTTCG) */
-    snprintf(thread_name, VCPU_THREAD_NAME_SIZE, "CPU %d/TCG",
-             cpu->cpu_index);
-
-    qemu_thread_create(cpu->thread, thread_name, mttcg_cpu_thread_fn,
-                       cpu, QEMU_THREAD_JOINABLE);
-
-#ifdef _WIN32
-    cpu->hThread = qemu_thread_get_handle(cpu->thread);
-#endif
-}
diff --git a/accel/tcg/tcg-accel-ops-mttcg.h b/accel/tcg/tcg-accel-ops-mttcg.h
index 9fdc5a2ab5..b61aff5c1d 100644
--- a/accel/tcg/tcg-accel-ops-mttcg.h
+++ b/accel/tcg/tcg-accel-ops-mttcg.h
@@ -13,7 +13,6 @@
 /* kick MTTCG vCPU thread */
 void mttcg_kick_vcpu_thread(CPUState *cpu);
 
-/* start an mttcg vCPU thread */
-void mttcg_start_vcpu_thread(CPUState *cpu);
+void *mttcg_vcpu_thread_fn(void *arg);
 
 #endif /* TCG_CPUS_MTTCG_H */
diff --git a/accel/tcg/tcg-accel-ops-rr.c b/accel/tcg/tcg-accel-ops-rr.c
index 3da684b8e6..006b787289 100644
--- a/accel/tcg/tcg-accel-ops-rr.c
+++ b/accel/tcg/tcg-accel-ops-rr.c
@@ -148,7 +148,7 @@ static void rr_force_rcu(Notifier *notify, void *data)
  * elsewhere.
  */
 
-static void *rr_cpu_thread_fn(void *arg)
+void *rr_vcpu_thread_fn(void *arg)
 {
     Notifier force_rcu;
     CPUState *cpu = arg;
@@ -279,28 +279,13 @@ bool rr_create_vcpu_thread_precheck(CPUState *cpu)
     return !single_tcg_cpu_thread;
 }
 
-void rr_start_vcpu_thread(CPUState *cpu)
+void rr_create_vcpu_thread_postcheck(CPUState *cpu)
 {
-    char thread_name[VCPU_THREAD_NAME_SIZE];
     static QemuCond *single_tcg_halt_cond;
-    static QemuThread *single_tcg_cpu_thread;
-
-    if (!single_tcg_cpu_thread) {
-        cpu->thread = g_new0(QemuThread, 1);
-        cpu->halt_cond = g_new0(QemuCond, 1);
-        qemu_cond_init(cpu->halt_cond);
-
-        /* share a single thread for all cpus with TCG */
-        snprintf(thread_name, VCPU_THREAD_NAME_SIZE, "ALL CPUs/TCG");
-        qemu_thread_create(cpu->thread, thread_name,
-                           rr_cpu_thread_fn,
-                           cpu, QEMU_THREAD_JOINABLE);
 
+    if (! single_tcg_cpu_thread) {
         single_tcg_halt_cond = cpu->halt_cond;
         single_tcg_cpu_thread = cpu->thread;
-#ifdef _WIN32
-        cpu->hThread = qemu_thread_get_handle(cpu->thread);
-#endif
     } else {
         /* we share the thread */
         cpu->thread = single_tcg_cpu_thread;
diff --git a/accel/tcg/tcg-accel-ops-rr.h b/accel/tcg/tcg-accel-ops-rr.h
index e2273b66d4..a1e75e7afb 100644
--- a/accel/tcg/tcg-accel-ops-rr.h
+++ b/accel/tcg/tcg-accel-ops-rr.h
@@ -16,7 +16,9 @@
 void rr_kick_vcpu_thread(CPUState *unused);
 
 bool rr_create_vcpu_thread_precheck(CPUState *cpu);
-/* start the round robin vcpu thread */
-void rr_start_vcpu_thread(CPUState *cpu);
+void rr_create_vcpu_thread_postcheck(CPUState *cpu);
+bool rr_destroy_vcpu_thread_precheck(CPUState *cpu);
+
+void *rr_vcpu_thread_fn(void *arg);
 
 #endif /* TCG_CPUS_RR_H */
diff --git a/accel/tcg/tcg-accel-ops.c b/accel/tcg/tcg-accel-ops.c
index d2181ea1e5..127dd6fee5 100644
--- a/accel/tcg/tcg-accel-ops.c
+++ b/accel/tcg/tcg-accel-ops.c
@@ -95,11 +95,13 @@ void tcg_handle_interrupt(CPUState *cpu, int mask)
 static void tcg_accel_ops_init(AccelOpsClass *ops)
 {
     if (qemu_tcg_mttcg_enabled()) {
-        ops->create_vcpu_thread = mttcg_start_vcpu_thread;
+        ops->vcpu_thread_fn = mttcg_vcpu_thread_fn;
         ops->kick_vcpu_thread = mttcg_kick_vcpu_thread;
         ops->handle_interrupt = tcg_handle_interrupt;
     } else {
-        ops->create_vcpu_thread = rr_start_vcpu_thread;
+        ops->vcpu_thread_fn = rr_vcpu_thread_fn;
+        ops->create_vcpu_thread_precheck = rr_create_vcpu_thread_precheck;
+        ops->create_vcpu_thread_postcheck = rr_create_vcpu_thread_postcheck;
         ops->kick_vcpu_thread = rr_kick_vcpu_thread;
 
         if (icount_enabled()) {
diff --git a/accel/xen/xen-all.c b/accel/xen/xen-all.c
index 69aa7d018b..ef40f626e2 100644
--- a/accel/xen/xen-all.c
+++ b/accel/xen/xen-all.c
@@ -219,7 +219,7 @@ static void xen_accel_ops_class_init(ObjectClass *oc, void *data)
 {
     AccelOpsClass *ops = ACCEL_OPS_CLASS(oc);
 
-    ops->create_vcpu_thread = dummy_start_vcpu_thread;
+    ops->vcpu_thread_fn = dummy_vcpu_thread_fn;
 }
 
 static const TypeInfo xen_accel_ops_type = {
diff --git a/include/sysemu/accel-ops.h b/include/sysemu/accel-ops.h
index 26b542d35c..caf337f61f 100644
--- a/include/sysemu/accel-ops.h
+++ b/include/sysemu/accel-ops.h
@@ -30,7 +30,8 @@ struct AccelOpsClass {
 
     bool (*cpus_are_resettable)(void);
 
-    void (*create_vcpu_thread)(CPUState *cpu); /* MANDATORY NON-NULL */
+    const char *thread_name;
+    void *(*vcpu_thread_fn)(void *arg); /* MANDATORY NON-NULL */
     /* If non-NULL, return whether common vCPU thread must be created */
     bool (*create_vcpu_thread_precheck)(CPUState *cpu);
     void (*create_vcpu_thread_postcheck)(CPUState *cpu);
diff --git a/include/sysemu/cpus.h b/include/sysemu/cpus.h
index b5c87d48b3..bf5629c58f 100644
--- a/include/sysemu/cpus.h
+++ b/include/sysemu/cpus.h
@@ -9,8 +9,8 @@ void cpus_register_accel(const AccelOpsClass *i);
 
 /* accel/dummy-cpus.c */
 
-/* Create a dummy vcpu for AccelOpsClass->create_vcpu_thread */
-void dummy_start_vcpu_thread(CPUState *);
+/* Create a dummy vcpu for AccelOpsClass->vcpu_thread_fn */
+void *dummy_vcpu_thread_fn(void *arg);
 
 /* interface available for cpus accelerator threads */
 
diff --git a/softmmu/cpus.c b/softmmu/cpus.c
index 857e2081ba..cf430ac486 100644
--- a/softmmu/cpus.c
+++ b/softmmu/cpus.c
@@ -601,6 +601,22 @@ void resume_all_vcpus(void)
     }
 }
 
+static void common_vcpu_thread_create(CPUState *cpu)
+{
+    char thread_name[VCPU_THREAD_NAME_SIZE];
+
+    cpu->thread = g_new0(QemuThread, 1);
+    cpu->halt_cond = g_new0(QemuCond, 1);
+    qemu_cond_init(cpu->halt_cond);
+    snprintf(thread_name, VCPU_THREAD_NAME_SIZE, "CPU %d/%s",
+             cpu->cpu_index, cpus_accel->thread_name ?: "DUMMY");
+    qemu_thread_create(cpu->thread, thread_name, cpus_accel->vcpu_thread_fn,
+                       cpu, QEMU_THREAD_JOINABLE);
+#ifdef _WIN32
+    cpu->hThread = qemu_thread_get_handle(cpu->thread);
+#endif
+}
+
 void cpu_remove_sync(CPUState *cpu)
 {
     cpu->stop = true;
@@ -614,7 +630,7 @@ void cpu_remove_sync(CPUState *cpu)
 void cpus_register_accel(const AccelOpsClass *ops)
 {
     assert(ops != NULL);
-    assert(ops->create_vcpu_thread != NULL); /* mandatory */
+    assert(ops->vcpu_thread_fn != NULL); /* mandatory */
     cpus_accel = ops;
 }
 
@@ -636,10 +652,11 @@ void qemu_init_vcpu(CPUState *cpu)
     }
 
     /* accelerators all implement the AccelOpsClass */
-    g_assert(cpus_accel != NULL && cpus_accel->create_vcpu_thread != NULL);
+    g_assert(cpus_accel != NULL && cpus_accel->vcpu_thread_fn != NULL);
+
     if (cpus_accel->create_vcpu_thread_precheck == NULL
             || cpus_accel->create_vcpu_thread_precheck(cpu)) {
-        cpus_accel->create_vcpu_thread(cpu);
+        common_vcpu_thread_create(cpu);
     }
     if (cpus_accel->create_vcpu_thread_postcheck) {
         cpus_accel->create_vcpu_thread_postcheck(cpu);
diff --git a/target/i386/hax/hax-accel-ops.c b/target/i386/hax/hax-accel-ops.c
index 18114fe34d..2fc2a9b8a4 100644
--- a/target/i386/hax/hax-accel-ops.c
+++ b/target/i386/hax/hax-accel-ops.c
@@ -57,28 +57,12 @@ static void *hax_cpu_thread_fn(void *arg)
     return NULL;
 }
 
-static void hax_start_vcpu_thread(CPUState *cpu)
-{
-    char thread_name[VCPU_THREAD_NAME_SIZE];
-
-    cpu->thread = g_new0(QemuThread, 1);
-    cpu->halt_cond = g_new0(QemuCond, 1);
-    qemu_cond_init(cpu->halt_cond);
-
-    snprintf(thread_name, VCPU_THREAD_NAME_SIZE, "CPU %d/HAX",
-             cpu->cpu_index);
-    qemu_thread_create(cpu->thread, thread_name, hax_cpu_thread_fn,
-                       cpu, QEMU_THREAD_JOINABLE);
-#ifdef _WIN32
-    cpu->hThread = qemu_thread_get_handle(cpu->thread);
-#endif
-}
-
 static void hax_accel_ops_class_init(ObjectClass *oc, void *data)
 {
     AccelOpsClass *ops = ACCEL_OPS_CLASS(oc);
 
-    ops->create_vcpu_thread = hax_start_vcpu_thread;
+    ops->thread_name = "HAX";
+    ops->vcpu_thread_fn = hax_cpu_thread_fn;
     ops->kick_vcpu_thread = hax_kick_vcpu_thread;
 
     ops->synchronize_post_reset = hax_cpu_synchronize_post_reset;
diff --git a/target/i386/nvmm/nvmm-accel-ops.c b/target/i386/nvmm/nvmm-accel-ops.c
index 6c46101ac1..a6dc73aa35 100644
--- a/target/i386/nvmm/nvmm-accel-ops.c
+++ b/target/i386/nvmm/nvmm-accel-ops.c
@@ -60,19 +60,6 @@ static void *qemu_nvmm_cpu_thread_fn(void *arg)
     return NULL;
 }
 
-static void nvmm_start_vcpu_thread(CPUState *cpu)
-{
-    char thread_name[VCPU_THREAD_NAME_SIZE];
-
-    cpu->thread = g_new0(QemuThread, 1);
-    cpu->halt_cond = g_new0(QemuCond, 1);
-    qemu_cond_init(cpu->halt_cond);
-    snprintf(thread_name, VCPU_THREAD_NAME_SIZE, "CPU %d/NVMM",
-             cpu->cpu_index);
-    qemu_thread_create(cpu->thread, thread_name, qemu_nvmm_cpu_thread_fn,
-                       cpu, QEMU_THREAD_JOINABLE);
-}
-
 /*
  * Abort the call to run the virtual processor by another thread, and to
  * return the control to that thread.
@@ -87,7 +74,9 @@ static void nvmm_accel_ops_class_init(ObjectClass *oc, void *data)
 {
     AccelOpsClass *ops = ACCEL_OPS_CLASS(oc);
 
-    ops->create_vcpu_thread = nvmm_start_vcpu_thread;
+    ops->thread_name = "NVMM";
+    ops->vcpu_thread_fn = qemu_nvmm_cpu_thread_fn;
+
     ops->kick_vcpu_thread = nvmm_kick_vcpu_thread;
 
     ops->synchronize_post_reset = nvmm_cpu_synchronize_post_reset;
diff --git a/target/i386/whpx/whpx-accel-ops.c b/target/i386/whpx/whpx-accel-ops.c
index dd2a9f7657..6498eb2060 100644
--- a/target/i386/whpx/whpx-accel-ops.c
+++ b/target/i386/whpx/whpx-accel-ops.c
@@ -60,22 +60,6 @@ static void *whpx_cpu_thread_fn(void *arg)
     return NULL;
 }
 
-static void whpx_start_vcpu_thread(CPUState *cpu)
-{
-    char thread_name[VCPU_THREAD_NAME_SIZE];
-
-    cpu->thread = g_new0(QemuThread, 1);
-    cpu->halt_cond = g_new0(QemuCond, 1);
-    qemu_cond_init(cpu->halt_cond);
-    snprintf(thread_name, VCPU_THREAD_NAME_SIZE, "CPU %d/WHPX",
-             cpu->cpu_index);
-    qemu_thread_create(cpu->thread, thread_name, whpx_cpu_thread_fn,
-                       cpu, QEMU_THREAD_JOINABLE);
-#ifdef _WIN32
-    cpu->hThread = qemu_thread_get_handle(cpu->thread);
-#endif
-}
-
 static void whpx_kick_vcpu_thread(CPUState *cpu)
 {
     if (!qemu_cpu_is_self(cpu)) {
@@ -92,7 +76,9 @@ static void whpx_accel_ops_class_init(ObjectClass *oc, void *data)
 {
     AccelOpsClass *ops = ACCEL_OPS_CLASS(oc);
 
-    ops->create_vcpu_thread = whpx_start_vcpu_thread;
+    ops->thread_name = "WHPX";
+    ops->vcpu_thread_fn = whpx_cpu_thread_fn;
+
     ops->kick_vcpu_thread = whpx_kick_vcpu_thread;
     ops->cpu_thread_is_idle = whpx_vcpu_thread_is_idle;
 
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 17:20:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 17:20:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294004.499703 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4ee-0000EV-7V; Wed, 23 Mar 2022 17:20:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294004.499703; Wed, 23 Mar 2022 17:20:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4ee-0000EO-3z; Wed, 23 Mar 2022 17:20:16 +0000
Received: by outflank-mailman (input) for mailman id 294004;
 Wed, 23 Mar 2022 17:20:14 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=s5zF=UC=gmail.com=philippe.mathieu.daude@srs-se1.protection.inumbo.net>)
 id 1nX4ec-0007T4-Hz
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 17:20:14 +0000
Received: from mail-pj1-x1036.google.com (mail-pj1-x1036.google.com
 [2607:f8b0:4864:20::1036])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 7fb285ef-aacd-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 18:20:13 +0100 (CET)
Received: by mail-pj1-x1036.google.com with SMTP id m22so2405557pja.0
 for <xen-devel@lists.xenproject.org>; Wed, 23 Mar 2022 10:20:13 -0700 (PDT)
Received: from localhost.localdomain (198.red-83-50-65.dynamicip.rima-tde.net.
 [83.50.65.198]) by smtp.gmail.com with ESMTPSA id
 d24-20020a637358000000b003823aefde04sm336971pgn.86.2022.03.23.10.20.06
 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256);
 Wed, 23 Mar 2022 10:20:12 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 7fb285ef-aacd-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:in-reply-to:references
         :mime-version:content-transfer-encoding;
        bh=MsX1ZkecFTiI7JDWgHH13CsFxdulVP/faYY6Ho3L9NU=;
        b=WiW4MrCr//Z88g+PXSFrPmTGMoceaVHESi73affp7lvaELZrmIQzuoUOKQHWdxEGR1
         NO8SV9ARJQk3egmkmUIPnlIThomv8Lit2KqxTc39Z2U2FpA9dGoRpDFaiV7jNk13qUza
         7zTfMC78Yc9mIXAGObaiUFBGpvB4UERocSaZSl7rhPntj8Gi1+FoC3nfqPiNjeGgZmPh
         TRMYKUG2CwwJHNw1Jqgv/qe0wIDn26xQq8oJkIoqzDAj6WG0NmljbJFdXSn/JSJOqJKV
         ad67bhyOCOEqsfPGFGJ1vRiL63Vd3PXt65wKeeSdZ40GLF1FXc9OTqtSP/xBz7j9+tjc
         hyJA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to
         :references:mime-version:content-transfer-encoding;
        bh=MsX1ZkecFTiI7JDWgHH13CsFxdulVP/faYY6Ho3L9NU=;
        b=6UdX6dVP5cjODG+BvQRiZCDSG7NudnyjoZc1zvFHYIsNWSZxKzdYBSFaRODybwFrUF
         IglWoVtqdU1I2+N37dEW7wlBluulRalPPMUNTfbPmz2+4xv5uKRtcnFLmN/rGhyUmF15
         3vR8xrGF/xyhfRKTWM8FbXio/E0rGRs3lAhSMllQH3hsb7o0p1l6DXShKHDlPQqPPNH+
         /igIeDdGQz/WytUQU1/rkHHBpZ9oqSu7Vm0TQ+CA7A1uSqI46U78LOmiW2JYcc6ZXccF
         +W+diRUr2Au4ZTDFSL4M5nM9nTcx7pWGlapsbBZnmJ8eoNcXX1FT16XR2mdhOo3n+eDb
         KtnQ==
X-Gm-Message-State: AOAM53233n7n9i/tRrqEuAXs6cV73RPw0zFFEnnEdUo1qdfBLkL4OyXR
	UUdl+Z5DQOSJBk6j8JPVKN0=
X-Google-Smtp-Source: ABdhPJyjcb2sZqeH87rq3zUZWSVN13XuvvacgYKtkqz+CZvHLPq51GDtssoIVmULExUOmBBtc3gkrA==
X-Received: by 2002:a17:90a:5291:b0:1bb:ef4d:947d with SMTP id w17-20020a17090a529100b001bbef4d947dmr12885297pjh.243.1648056012464;
        Wed, 23 Mar 2022 10:20:12 -0700 (PDT)
From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <philippe.mathieu.daude@gmail.com>
To: qemu-devel@nongnu.org
Cc: Wenchao Wang <wenchao.wang@intel.com>,
	Laurent Vivier <lvivier@redhat.com>,
	David Hildenbrand <david@redhat.com>,
	Yanan Wang <wangyanan55@huawei.com>,
	Cameron Esfahani <dirty@apple.com>,
	Marcelo Tosatti <mtosatti@redhat.com>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Anthony Perard <anthony.perard@citrix.com>,
	haxm-team@intel.com,
	Paul Durrant <paul@xen.org>,
	Richard Henderson <richard.henderson@linaro.org>,
	xen-devel@lists.xenproject.org,
	=?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Roman Bolshakov <r.bolshakov@yadro.com>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Kamil Rytarowski <kamil@netbsd.org>,
	Paolo Bonzini <pbonzini@redhat.com>,
	Peter Xu <peterx@redhat.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Thomas Huth <thuth@redhat.com>,
	Colin Xu <colin.xu@intel.com>
Subject: [PATCH v4 11/13] accel/tcg: Add rr_destroy_vcpu_thread_precheck()
Date: Wed, 23 Mar 2022 18:17:49 +0100
Message-Id: <20220323171751.78612-12-philippe.mathieu.daude@gmail.com>
X-Mailer: git-send-email 2.35.1
In-Reply-To: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
References: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

From: Philippe Mathieu-Daudé <f4bug@amsat.org>

TCG/RR is special and creates a single vCPU. It only have
to release its resources once. Implement the .precheck()
for that purpose.

Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
---
 accel/tcg/tcg-accel-ops-rr.c | 9 +++++++++
 accel/tcg/tcg-accel-ops.c    | 1 +
 2 files changed, 10 insertions(+)

diff --git a/accel/tcg/tcg-accel-ops-rr.c b/accel/tcg/tcg-accel-ops-rr.c
index 006b787289..6fe8e20356 100644
--- a/accel/tcg/tcg-accel-ops-rr.c
+++ b/accel/tcg/tcg-accel-ops-rr.c
@@ -295,3 +295,12 @@ void rr_create_vcpu_thread_postcheck(CPUState *cpu)
         cpu->created = true;
     }
 }
+
+bool rr_destroy_vcpu_thread_precheck(CPUState *cpu)
+{
+    if (single_tcg_cpu_thread) {
+        single_tcg_cpu_thread = NULL;
+        return true;
+    }
+    return false;
+}
diff --git a/accel/tcg/tcg-accel-ops.c b/accel/tcg/tcg-accel-ops.c
index 127dd6fee5..0b0dbcc47a 100644
--- a/accel/tcg/tcg-accel-ops.c
+++ b/accel/tcg/tcg-accel-ops.c
@@ -102,6 +102,7 @@ static void tcg_accel_ops_init(AccelOpsClass *ops)
         ops->vcpu_thread_fn = rr_vcpu_thread_fn;
         ops->create_vcpu_thread_precheck = rr_create_vcpu_thread_precheck;
         ops->create_vcpu_thread_postcheck = rr_create_vcpu_thread_postcheck;
+        ops->destroy_vcpu_thread_precheck = rr_destroy_vcpu_thread_precheck;
         ops->kick_vcpu_thread = rr_kick_vcpu_thread;
 
         if (icount_enabled()) {
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 17:27:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 17:27:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294007.499714 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4lv-0001Es-0m; Wed, 23 Mar 2022 17:27:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294007.499714; Wed, 23 Mar 2022 17:27:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4lu-0001El-Si; Wed, 23 Mar 2022 17:27:46 +0000
Received: by outflank-mailman (input) for mailman id 294007;
 Wed, 23 Mar 2022 17:27:46 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=s5zF=UC=gmail.com=philippe.mathieu.daude@srs-se1.protection.inumbo.net>)
 id 1nX4e3-0004Zy-1B
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 17:19:39 +0000
Received: from mail-pl1-x632.google.com (mail-pl1-x632.google.com
 [2607:f8b0:4864:20::632])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6a8ccecb-aacd-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 18:19:38 +0100 (CET)
Received: by mail-pl1-x632.google.com with SMTP id c23so2185288plo.0
 for <xen-devel@lists.xenproject.org>; Wed, 23 Mar 2022 10:19:38 -0700 (PDT)
Received: from localhost.localdomain (198.red-83-50-65.dynamicip.rima-tde.net.
 [83.50.65.198]) by smtp.gmail.com with ESMTPSA id
 d25-20020a639919000000b00364f999aed5sm349409pge.20.2022.03.23.10.19.31
 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256);
 Wed, 23 Mar 2022 10:19:36 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6a8ccecb-aacd-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:in-reply-to:references
         :mime-version:content-transfer-encoding;
        bh=hGzoIEiqotEx27Bg+Z4eL5zpKSfKxDxE5VGRYeUpF1U=;
        b=YN2nPW6qFv/FXMaZbHoge7dvyFY38/0TL7t4FHhvZ3ROq4ndXz7aVe/WYlNC1die01
         TcD+kFy/xidXVPGx7gpqZ75SywkLL2EYPJoDBotF8TIRl44RYN5JTM1qKjZv3d6GIfqU
         jWotsaKHFfCdSkhPSpjxx+SuvENG8Rj/Mv3l0DwhQfohsPpFU6t73UPPj8CSrbQfuBkd
         9Z/VXAQWYd7J2zxrjtJ/gWD5iowxhsrQ7vwQGuFXZNP0fMUeSz4fBHXmC/cKAe6dYlVs
         NCh7inykD23K3nAQkmHK7E/YkkRS5g4L8ZmGYcKNVOwgDWWwZ2QenCCnu2L1vwreGob1
         13sg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to
         :references:mime-version:content-transfer-encoding;
        bh=hGzoIEiqotEx27Bg+Z4eL5zpKSfKxDxE5VGRYeUpF1U=;
        b=rBCS/tiuUZ4/diJtDaF+KZ8G/B7f7HuHnnjl/H+WBQMVSwrRZ0WaQik0FmkAodny5a
         5axPAz7gEVBfOig4Un2xJWLbvR746jpfF+DKRC0gJ8tnGjgWlMg5FbapV6Tw4/aiLMVf
         fWg1J+bvXeG0+gaxEMlg2jXVteSOWUEmVZFZrXrueFlWzE8spKikbe365aUJQxTU5XVy
         xhrshLgVPpnGNt0soQv6mE4MT6oj1Qentj3HPFwupLXxTNyGVTLo4YX5vbP1BZ/4xb3Y
         jrZXTF4fBp7DLZVTu76XBdG+UGz+u4BtS7duew9euWISBRBwDYow05IG9G8r5oxlh55u
         I5QQ==
X-Gm-Message-State: AOAM530snBK1T5Ljo3eIilyrOH8LinSzF8IvT+UClhtlkQ616SHevwYP
	Pr9lSGQarWlbEHUGd2bWVLc=
X-Google-Smtp-Source: ABdhPJypHL2FuS5xBRJ7IZra6e8WHCycd0JJ50I5gNrC37pYhlUHgXYCXbDEv97OJjTv0XckGdi+gQ==
X-Received: by 2002:a17:902:8543:b0:154:9588:52ab with SMTP id d3-20020a170902854300b00154958852abmr1177032plo.50.1648055976951;
        Wed, 23 Mar 2022 10:19:36 -0700 (PDT)
From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <philippe.mathieu.daude@gmail.com>
To: qemu-devel@nongnu.org
Cc: Wenchao Wang <wenchao.wang@intel.com>,
	Laurent Vivier <lvivier@redhat.com>,
	David Hildenbrand <david@redhat.com>,
	Yanan Wang <wangyanan55@huawei.com>,
	Cameron Esfahani <dirty@apple.com>,
	Marcelo Tosatti <mtosatti@redhat.com>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Anthony Perard <anthony.perard@citrix.com>,
	haxm-team@intel.com,
	Paul Durrant <paul@xen.org>,
	Richard Henderson <richard.henderson@linaro.org>,
	xen-devel@lists.xenproject.org,
	=?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Roman Bolshakov <r.bolshakov@yadro.com>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Kamil Rytarowski <kamil@netbsd.org>,
	Paolo Bonzini <pbonzini@redhat.com>,
	Peter Xu <peterx@redhat.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Thomas Huth <thuth@redhat.com>,
	Colin Xu <colin.xu@intel.com>
Subject: [PATCH v4 08/13] accel/tcg: Extract rr_create_vcpu_thread_precheck()
Date: Wed, 23 Mar 2022 18:17:46 +0100
Message-Id: <20220323171751.78612-9-philippe.mathieu.daude@gmail.com>
X-Mailer: git-send-email 2.35.1
In-Reply-To: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
References: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

From: Philippe Mathieu-Daudé <f4bug@amsat.org>

We are going to extract common pattern from rr_start_vcpu_thread().
First extract the rr_create_vcpu_thread_precheck() helper.

Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
---
 accel/tcg/tcg-accel-ops-rr.c | 7 +++++++
 accel/tcg/tcg-accel-ops-rr.h | 1 +
 2 files changed, 8 insertions(+)

diff --git a/accel/tcg/tcg-accel-ops-rr.c b/accel/tcg/tcg-accel-ops-rr.c
index de8af32af7..3da684b8e6 100644
--- a/accel/tcg/tcg-accel-ops-rr.c
+++ b/accel/tcg/tcg-accel-ops-rr.c
@@ -272,6 +272,13 @@ static void *rr_cpu_thread_fn(void *arg)
     return NULL;
 }
 
+static QemuThread *single_tcg_cpu_thread;
+
+bool rr_create_vcpu_thread_precheck(CPUState *cpu)
+{
+    return !single_tcg_cpu_thread;
+}
+
 void rr_start_vcpu_thread(CPUState *cpu)
 {
     char thread_name[VCPU_THREAD_NAME_SIZE];
diff --git a/accel/tcg/tcg-accel-ops-rr.h b/accel/tcg/tcg-accel-ops-rr.h
index 54f6ae6e86..e2273b66d4 100644
--- a/accel/tcg/tcg-accel-ops-rr.h
+++ b/accel/tcg/tcg-accel-ops-rr.h
@@ -15,6 +15,7 @@
 /* Kick all RR vCPUs. */
 void rr_kick_vcpu_thread(CPUState *unused);
 
+bool rr_create_vcpu_thread_precheck(CPUState *cpu);
 /* start the round robin vcpu thread */
 void rr_start_vcpu_thread(CPUState *cpu);
 
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 17:34:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 17:34:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294014.499725 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4rt-0002fn-PQ; Wed, 23 Mar 2022 17:33:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294014.499725; Wed, 23 Mar 2022 17:33:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4rt-0002fg-KF; Wed, 23 Mar 2022 17:33:57 +0000
Received: by outflank-mailman (input) for mailman id 294014;
 Wed, 23 Mar 2022 17:33:57 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=s5zF=UC=gmail.com=philippe.mathieu.daude@srs-se1.protection.inumbo.net>)
 id 1nX4f1-0004Zy-UB
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 17:20:40 +0000
Received: from mail-pg1-x52e.google.com (mail-pg1-x52e.google.com
 [2607:f8b0:4864:20::52e])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 8ed3205c-aacd-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 18:20:39 +0100 (CET)
Received: by mail-pg1-x52e.google.com with SMTP id c2so1663318pga.10
 for <xen-devel@lists.xenproject.org>; Wed, 23 Mar 2022 10:20:39 -0700 (PDT)
Received: from localhost.localdomain (198.red-83-50-65.dynamicip.rima-tde.net.
 [83.50.65.198]) by smtp.gmail.com with ESMTPSA id
 y12-20020a17090a784c00b001c6bdafc995sm5775028pjl.3.2022.03.23.10.20.31
 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256);
 Wed, 23 Mar 2022 10:20:37 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8ed3205c-aacd-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:in-reply-to:references
         :mime-version:content-transfer-encoding;
        bh=32I90XyrSsgFhoTvAz7kFHmgBFJVrEU2lmj8L6zrA7w=;
        b=HziQehOw9rA6WaAjt6GWtN96OEZQKNeqtt8BUYKzQhy7osdWurjWlBG20QGQW/EB+F
         jeu4GS9/mQNcxaXFiYXQHD+Newqzq1veJVbG2jRb7R8WXmdqG/gVdrZDjIlDxW4lRXOq
         I71naYjPm4YaQCCMtZQaseOvo60Lz/IkNWzSHUBWsfnNXC2oOABAKojB2mfg+D9g7D1D
         aCifnKvwu9gBP/efpCWO8b9KL2IWYDxFdNbknFbXsjBT6YGAcCikhEVWZMzFhjo4Dyoi
         m5OUOkfn3o+MT9iQ4opD1tk8fsbzJgw5Qcb9c/JxYjHFhN6Q4eH03QkTyrPcQEV21Vlq
         Vusg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to
         :references:mime-version:content-transfer-encoding;
        bh=32I90XyrSsgFhoTvAz7kFHmgBFJVrEU2lmj8L6zrA7w=;
        b=hoDzNMtLr98gAiXwnT/9dSSVZLcHaMv7grg300hG6EcH2/SCBDDeauoRmhCeSoIPkQ
         hxq1T1k7Bk8at4m+qenGo5nvQZ4wnI+ambWD8LI5m2bwU7AfOJNSR39twij1Y138V6Dz
         eJt75pXFs4JJX9hwmoFDyt4HLJiOgPWCg7DsgEfHXViQXwxBzx707TDib0c7JAWg91k/
         mYwowiTZoy+kMEBHd3c0Pe8gXIfShW3k5xFIRk/AMf8pYkx0j8wagp/tlHZd/4MlOAf/
         tWjnuY179qMERV9V8tLcVCMABuF67ovzX12UwrTjs8IsW9S6/E4VaHl2UKqTxq7D3XBY
         bitw==
X-Gm-Message-State: AOAM533wR8LDc1ymNWwEtJl6sk/h4zpUJMwjD1Rhifbo8Yo3fEAemuWd
	64z8Z2/sBDG34TLy50t8E6o=
X-Google-Smtp-Source: ABdhPJzitqpHPUzN1FOlO6Xy6wxyKTy6324HAUZa9Y29UTDRmfk9C7LuqvIVu5doI3n8WNcv+vf6iw==
X-Received: by 2002:a63:1e52:0:b0:380:ae84:256e with SMTP id p18-20020a631e52000000b00380ae84256emr758991pgm.84.1648056037806;
        Wed, 23 Mar 2022 10:20:37 -0700 (PDT)
From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <philippe.mathieu.daude@gmail.com>
To: qemu-devel@nongnu.org
Cc: Wenchao Wang <wenchao.wang@intel.com>,
	Laurent Vivier <lvivier@redhat.com>,
	David Hildenbrand <david@redhat.com>,
	Yanan Wang <wangyanan55@huawei.com>,
	Cameron Esfahani <dirty@apple.com>,
	Marcelo Tosatti <mtosatti@redhat.com>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Anthony Perard <anthony.perard@citrix.com>,
	haxm-team@intel.com,
	Paul Durrant <paul@xen.org>,
	Richard Henderson <richard.henderson@linaro.org>,
	xen-devel@lists.xenproject.org,
	=?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Roman Bolshakov <r.bolshakov@yadro.com>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Kamil Rytarowski <kamil@netbsd.org>,
	Paolo Bonzini <pbonzini@redhat.com>,
	Peter Xu <peterx@redhat.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Thomas Huth <thuth@redhat.com>,
	Colin Xu <colin.xu@intel.com>,
	Mark Kanda <mark.kanda@oracle.com>
Subject: [PATCH v4 13/13] softmmu/cpus: Free cpu->halt_cond in generic_destroy_vcpu_thread()
Date: Wed, 23 Mar 2022 18:17:51 +0100
Message-Id: <20220323171751.78612-14-philippe.mathieu.daude@gmail.com>
X-Mailer: git-send-email 2.35.1
In-Reply-To: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
References: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

From: Mark Kanda <mark.kanda@oracle.com>

vCPU hotunplug related leak reported by Valgrind:

  ==102631== 56 bytes in 1 blocks are definitely lost in loss record 5,089 of 8,555
  ==102631==    at 0x4C3ADBB: calloc (vg_replace_malloc.c:1117)
  ==102631==    by 0x69EE4CD: g_malloc0 (in /usr/lib64/libglib-2.0.so.0.5600.4)
  ==102631==    by 0x924452: kvm_start_vcpu_thread (kvm-accel-ops.c:69)
  ==102631==    by 0x4505C2: qemu_init_vcpu (cpus.c:643)
  ==102631==    by 0x76B4D1: x86_cpu_realizefn (cpu.c:6520)
  ==102631==    by 0x9344A7: device_set_realized (qdev.c:531)
  ==102631==    by 0x93E329: property_set_bool (object.c:2273)
  ==102631==    by 0x93C2F8: object_property_set (object.c:1408)
  ==102631==    by 0x940796: object_property_set_qobject (qom-qobject.c:28)
  ==102631==    by 0x93C663: object_property_set_bool (object.c:1477)
  ==102631==    by 0x933D3B: qdev_realize (qdev.c:333)
  ==102631==    by 0x455EC4: qdev_device_add_from_qdict (qdev-monitor.c:713)

Signed-off-by: Mark Kanda <mark.kanda@oracle.com>
Message-Id: <20220321141409.3112932-4-mark.kanda@oracle.com>
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
---
 softmmu/cpus.c | 1 +
 1 file changed, 1 insertion(+)

diff --git a/softmmu/cpus.c b/softmmu/cpus.c
index efa8397f04..23bed29545 100644
--- a/softmmu/cpus.c
+++ b/softmmu/cpus.c
@@ -620,6 +620,7 @@ static void common_vcpu_thread_create(CPUState *cpu)
 static void common_vcpu_thread_destroy(CPUState *cpu)
 {
     g_free(cpu->thread);
+    g_free(cpu->halt_cond);
 }
 
 void cpu_remove_sync(CPUState *cpu)
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 17:34:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 17:34:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294015.499736 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4ru-0002wI-W8; Wed, 23 Mar 2022 17:33:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294015.499736; Wed, 23 Mar 2022 17:33:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4ru-0002wB-Rv; Wed, 23 Mar 2022 17:33:58 +0000
Received: by outflank-mailman (input) for mailman id 294015;
 Wed, 23 Mar 2022 17:33:57 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=s5zF=UC=gmail.com=philippe.mathieu.daude@srs-se1.protection.inumbo.net>)
 id 1nX4dr-0004Zy-E8
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 17:19:27 +0000
Received: from mail-pf1-x434.google.com (mail-pf1-x434.google.com
 [2607:f8b0:4864:20::434])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 639b15f3-aacd-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 18:19:26 +0100 (CET)
Received: by mail-pf1-x434.google.com with SMTP id u17so1963987pfk.11
 for <xen-devel@lists.xenproject.org>; Wed, 23 Mar 2022 10:19:26 -0700 (PDT)
Received: from localhost.localdomain (198.red-83-50-65.dynamicip.rima-tde.net.
 [83.50.65.198]) by smtp.gmail.com with ESMTPSA id
 a24-20020a637f18000000b003821e17819csm354438pgd.61.2022.03.23.10.19.19
 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256);
 Wed, 23 Mar 2022 10:19:24 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 639b15f3-aacd-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:in-reply-to:references
         :mime-version:content-transfer-encoding;
        bh=qDaNpZGuS1pck7ljrYFEMbUPV6qyv4FTweWO+b6dthQ=;
        b=T/qLqQeIJbWYsc9iaC9cBJMrxMVXpFG/QUiJyPoZd2LdVpzgu4IXrjsjtgh7JucAvy
         K7XpwsgzEr4aysFsdfXZmw3r4NYiJ3DWcc8JZSOA6Tl3BokPzJQNj2so5OQV1hh6HwEd
         K1QxKLSW49T2dyO8ay7JL+g882pp7zrdo93r7w/Lf9Ytie2vCQEYjBetUSMwG2E36vDl
         O1T8FHb+t6UP2pO29Px3c/CN3Z5Qpup501aDNB/0R3S7yzRNJBBBqU6RsNi2V43JnUir
         +2yzv/A6XJFzT3jeRvNmug8zR6Gv0G3QKmEJL2xM7jyr2axrPlstTpbbBI6cVPxAa6d7
         uTWA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to
         :references:mime-version:content-transfer-encoding;
        bh=qDaNpZGuS1pck7ljrYFEMbUPV6qyv4FTweWO+b6dthQ=;
        b=wp2rxRnMbJRes1RM7Hq5I1eNTJ4aGEiMsNJlYoAiQ7bZbMe3lOZ7vr5vQNyNusJMLQ
         7klhajUDgZHKsPsgeiRxah2Rbc/Oe6JebIJqE6vGiifbPcA5oXeic5W9udJuOW4dkTdy
         MasP9ha1TqXBcRayTGxpXE8b5/7/Tkfm4FeUqZI5fysgt2pM5zg0BhBUUDUO7Yh2iclE
         G67aXQnGMI5J4OSLBJxLHdJh+5sd/YyZF3wZKbjJjy8yeCHgUOp+FM5qHe97fsTAJZrI
         3eL9/0Eyi003bWEOd5dSeIAR874vaGeFeXehg6EV7L36QBSKHZ3bRWvKiLBuoVfUsaBi
         NgBQ==
X-Gm-Message-State: AOAM530QHjQiYOnPXAzYIi5ejLX19J0W43QZjWeqqiFWHYx+bQZy92vi
	iCJOSxuF7UeLqSW1F/A5Ghw=
X-Google-Smtp-Source: ABdhPJysELA1SacEi6NLWr6VDuEztyIdr+gkkW330J+PSAAiBOd3a1EdmuP7lIO3WbruDTaR69cscQ==
X-Received: by 2002:a63:cf09:0:b0:372:d564:8024 with SMTP id j9-20020a63cf09000000b00372d5648024mr705074pgg.251.1648055965298;
        Wed, 23 Mar 2022 10:19:25 -0700 (PDT)
From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <philippe.mathieu.daude@gmail.com>
To: qemu-devel@nongnu.org
Cc: Wenchao Wang <wenchao.wang@intel.com>,
	Laurent Vivier <lvivier@redhat.com>,
	David Hildenbrand <david@redhat.com>,
	Yanan Wang <wangyanan55@huawei.com>,
	Cameron Esfahani <dirty@apple.com>,
	Marcelo Tosatti <mtosatti@redhat.com>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Anthony Perard <anthony.perard@citrix.com>,
	haxm-team@intel.com,
	Paul Durrant <paul@xen.org>,
	Richard Henderson <richard.henderson@linaro.org>,
	xen-devel@lists.xenproject.org,
	=?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Roman Bolshakov <r.bolshakov@yadro.com>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Kamil Rytarowski <kamil@netbsd.org>,
	Paolo Bonzini <pbonzini@redhat.com>,
	Peter Xu <peterx@redhat.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Thomas Huth <thuth@redhat.com>,
	Colin Xu <colin.xu@intel.com>
Subject: [PATCH v4 07/13] accel-ops: Introduce create_vcpu_thread_precheck / postcheck handlers
Date: Wed, 23 Mar 2022 18:17:45 +0100
Message-Id: <20220323171751.78612-8-philippe.mathieu.daude@gmail.com>
X-Mailer: git-send-email 2.35.1
In-Reply-To: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
References: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

From: Philippe Mathieu-Daudé <f4bug@amsat.org>

Introduce precheck/postcheck handlers which will help to
refactor code common to the various create_vcpu_thread()
implementations.

Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
---
 include/sysemu/accel-ops.h | 4 ++++
 softmmu/cpus.c             | 8 +++++++-
 2 files changed, 11 insertions(+), 1 deletion(-)

diff --git a/include/sysemu/accel-ops.h b/include/sysemu/accel-ops.h
index 6013c9444c..26b542d35c 100644
--- a/include/sysemu/accel-ops.h
+++ b/include/sysemu/accel-ops.h
@@ -31,6 +31,10 @@ struct AccelOpsClass {
     bool (*cpus_are_resettable)(void);
 
     void (*create_vcpu_thread)(CPUState *cpu); /* MANDATORY NON-NULL */
+    /* If non-NULL, return whether common vCPU thread must be created */
+    bool (*create_vcpu_thread_precheck)(CPUState *cpu);
+    void (*create_vcpu_thread_postcheck)(CPUState *cpu);
+
     void (*kick_vcpu_thread)(CPUState *cpu);
     bool (*cpu_thread_is_idle)(CPUState *cpu);
 
diff --git a/softmmu/cpus.c b/softmmu/cpus.c
index 7b75bb66d5..857e2081ba 100644
--- a/softmmu/cpus.c
+++ b/softmmu/cpus.c
@@ -637,7 +637,13 @@ void qemu_init_vcpu(CPUState *cpu)
 
     /* accelerators all implement the AccelOpsClass */
     g_assert(cpus_accel != NULL && cpus_accel->create_vcpu_thread != NULL);
-    cpus_accel->create_vcpu_thread(cpu);
+    if (cpus_accel->create_vcpu_thread_precheck == NULL
+            || cpus_accel->create_vcpu_thread_precheck(cpu)) {
+        cpus_accel->create_vcpu_thread(cpu);
+    }
+    if (cpus_accel->create_vcpu_thread_postcheck) {
+        cpus_accel->create_vcpu_thread_postcheck(cpu);
+    }
 
     while (!cpu->created) {
         qemu_cond_wait(&qemu_cpu_cond, &qemu_global_mutex);
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 17:34:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 17:34:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294016.499742 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4rv-0002zy-EB; Wed, 23 Mar 2022 17:33:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294016.499742; Wed, 23 Mar 2022 17:33:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4rv-0002zY-5w; Wed, 23 Mar 2022 17:33:59 +0000
Received: by outflank-mailman (input) for mailman id 294016;
 Wed, 23 Mar 2022 17:33:57 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=s5zF=UC=gmail.com=philippe.mathieu.daude@srs-se1.protection.inumbo.net>)
 id 1nX4eQ-0004Zy-P3
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 17:20:02 +0000
Received: from mail-pj1-x1032.google.com (mail-pj1-x1032.google.com
 [2607:f8b0:4864:20::1032])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 78af94f3-aacd-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 18:20:02 +0100 (CET)
Received: by mail-pj1-x1032.google.com with SMTP id b8so2367589pjb.4
 for <xen-devel@lists.xenproject.org>; Wed, 23 Mar 2022 10:20:01 -0700 (PDT)
Received: from localhost.localdomain (198.red-83-50-65.dynamicip.rima-tde.net.
 [83.50.65.198]) by smtp.gmail.com with ESMTPSA id
 oo17-20020a17090b1c9100b001bf0ccc59c2sm7189967pjb.16.2022.03.23.10.19.54
 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256);
 Wed, 23 Mar 2022 10:20:00 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 78af94f3-aacd-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:in-reply-to:references
         :mime-version:content-transfer-encoding;
        bh=f+HL4Abo/9emIoVYr4nPcZWANTfk8HbxwtFhwWh4T4E=;
        b=R38CVVHJgH8kHmGn0ZOyhoWZ33CV6mzkknIiqbfMkEd3nlYmXum5LYE5EuR9nOh5dV
         4p+1F+9RocXuE6X/etkgzAlBdiSWWmatjKQnx2IG0DXq/5XQUfkek0cJmgKz3CvRAv+Q
         ZEQD4UjM+CuFPFnvkD7N3P9I3mXgm6KY1NLl24qU0ZpnRER1x6XTt68YoiVIlyjwivDY
         O6oJvDcjzbgtgV5VVYi1YxOK5p8sfe9NSUl24zEhnSJ+u/RzIPghmhV5VRqXDLHTZfDz
         1fSHXii1iS47EJJoenarBJh84GnRVtK24aTa2pye2VI1SSKFMWmBWKuqZTE/MxejwKcS
         YLCQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to
         :references:mime-version:content-transfer-encoding;
        bh=f+HL4Abo/9emIoVYr4nPcZWANTfk8HbxwtFhwWh4T4E=;
        b=7Z9fcWjK8IhhaMXbDSHqml5IKiGSzeX13Dr966VmkzFWX2jh6fCg/+jVZbJM/+b093
         TZWTnwqnIreAlBOsi59PJCWvkKQb+/lAmfIKOrat2PBSGZDdghtGZWszjhOfL61Og5hY
         3H1IVGqNI5y0peZDKw4q54FHvFieMODKQx1bRY/DIikhc/fgVJo3lqYzna2KAPyBDyRZ
         9lSjHncs/lOAPnjrsqzmv1fM6lQOqUn0GWJKVmj6clXVfsKkplhDgFrAVvtQp7obfTDr
         baeFxa4fY9VYQHKXpdgxriIyPEptXg9RcnO+JUuKj0i9XArFQjzW4TSzVFFZzgDWhT1l
         2Qew==
X-Gm-Message-State: AOAM531Q5Dw7tZjYISjIvmMOriPJnoV/hdJmFtigziA32hmKVuCxxGoI
	Z/z8GdlyoicnXvSYyfH4SdU=
X-Google-Smtp-Source: ABdhPJwUGIANIvoDBDf1d6wuhMbglFjfjHX2yL7VBu0eJlXm38w4pEE/zj+JRqSDdW4aqPv9Y3LI/A==
X-Received: by 2002:a17:90a:8d85:b0:1b8:a215:e3e4 with SMTP id d5-20020a17090a8d8500b001b8a215e3e4mr12881119pjo.175.1648056000652;
        Wed, 23 Mar 2022 10:20:00 -0700 (PDT)
From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <philippe.mathieu.daude@gmail.com>
To: qemu-devel@nongnu.org
Cc: Wenchao Wang <wenchao.wang@intel.com>,
	Laurent Vivier <lvivier@redhat.com>,
	David Hildenbrand <david@redhat.com>,
	Yanan Wang <wangyanan55@huawei.com>,
	Cameron Esfahani <dirty@apple.com>,
	Marcelo Tosatti <mtosatti@redhat.com>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Anthony Perard <anthony.perard@citrix.com>,
	haxm-team@intel.com,
	Paul Durrant <paul@xen.org>,
	Richard Henderson <richard.henderson@linaro.org>,
	xen-devel@lists.xenproject.org,
	=?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Roman Bolshakov <r.bolshakov@yadro.com>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Kamil Rytarowski <kamil@netbsd.org>,
	Paolo Bonzini <pbonzini@redhat.com>,
	Peter Xu <peterx@redhat.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Thomas Huth <thuth@redhat.com>,
	Colin Xu <colin.xu@intel.com>
Subject: [PATCH v4 10/13] accel-ops: Introduce common_vcpu_thread_destroy() and .precheck handler
Date: Wed, 23 Mar 2022 18:17:48 +0100
Message-Id: <20220323171751.78612-11-philippe.mathieu.daude@gmail.com>
X-Mailer: git-send-email 2.35.1
In-Reply-To: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
References: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

From: Philippe Mathieu-Daudé <f4bug@amsat.org>

Introduce an empty common_vcpu_thread_destroy() function, and
provide a AccelOpsClass::destroy_vcpu_thread_precheck() callback
so accelerators can choose whether to call common_vcpu_thread_destroy.

Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
---
 include/sysemu/accel-ops.h | 2 ++
 softmmu/cpus.c             | 9 +++++++++
 2 files changed, 11 insertions(+)

diff --git a/include/sysemu/accel-ops.h b/include/sysemu/accel-ops.h
index caf337f61f..b47f6de3f9 100644
--- a/include/sysemu/accel-ops.h
+++ b/include/sysemu/accel-ops.h
@@ -35,6 +35,8 @@ struct AccelOpsClass {
     /* If non-NULL, return whether common vCPU thread must be created */
     bool (*create_vcpu_thread_precheck)(CPUState *cpu);
     void (*create_vcpu_thread_postcheck)(CPUState *cpu);
+    /* If non-NULL, return whether common vCPU thread must be destroyed */
+    bool (*destroy_vcpu_thread_precheck)(CPUState *cpu);
 
     void (*kick_vcpu_thread)(CPUState *cpu);
     bool (*cpu_thread_is_idle)(CPUState *cpu);
diff --git a/softmmu/cpus.c b/softmmu/cpus.c
index cf430ac486..37325b3b8d 100644
--- a/softmmu/cpus.c
+++ b/softmmu/cpus.c
@@ -617,6 +617,10 @@ static void common_vcpu_thread_create(CPUState *cpu)
 #endif
 }
 
+static void common_vcpu_thread_destroy(CPUState *cpu)
+{
+}
+
 void cpu_remove_sync(CPUState *cpu)
 {
     cpu->stop = true;
@@ -625,6 +629,11 @@ void cpu_remove_sync(CPUState *cpu)
     qemu_mutex_unlock_iothread();
     qemu_thread_join(cpu->thread);
     qemu_mutex_lock_iothread();
+
+    if (cpus_accel->destroy_vcpu_thread_precheck == NULL
+            || cpus_accel->destroy_vcpu_thread_precheck(cpu)) {
+        common_vcpu_thread_destroy(cpu);
+    }
 }
 
 void cpus_register_accel(const AccelOpsClass *ops)
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 17:35:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 17:35:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294026.499758 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4tA-0004Rw-Ss; Wed, 23 Mar 2022 17:35:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294026.499758; Wed, 23 Mar 2022 17:35:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4tA-0004Rp-PM; Wed, 23 Mar 2022 17:35:16 +0000
Received: by outflank-mailman (input) for mailman id 294026;
 Wed, 23 Mar 2022 17:35:16 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=s5zF=UC=gmail.com=philippe.mathieu.daude@srs-se1.protection.inumbo.net>)
 id 1nX4dT-0004Zy-K0
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 17:19:03 +0000
Received: from mail-pl1-x631.google.com (mail-pl1-x631.google.com
 [2607:f8b0:4864:20::631])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 5561da2e-aacd-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 18:19:02 +0100 (CET)
Received: by mail-pl1-x631.google.com with SMTP id c23so2183651plo.0
 for <xen-devel@lists.xenproject.org>; Wed, 23 Mar 2022 10:19:02 -0700 (PDT)
Received: from localhost.localdomain (198.red-83-50-65.dynamicip.rima-tde.net.
 [83.50.65.198]) by smtp.gmail.com with ESMTPSA id
 u15-20020a056a00098f00b004faa58d44eesm455060pfg.145.2022.03.23.10.18.55
 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256);
 Wed, 23 Mar 2022 10:19:01 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5561da2e-aacd-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:in-reply-to:references
         :mime-version:content-transfer-encoding;
        bh=0hihgfEmLJPNBEh4WW6rYf49XmgK0ovI41W1a0emuNk=;
        b=MrdYb7945anCfYH1VRiFA5pAW7S4hoZOOF1Pdv+2ZTrCvIPQ0tdNE6NgZGHvIaYl6F
         plkh3wIlaqYoXktAcEAtQmOqlHJdMmidt+Oa/wnRaHYaNMUJZ9CkCSrlqjquwFaZdWSC
         HPnXLzJcabcEufzwkRoVTxfpe1EHQA8+scJQyC9OkHIYWUa2UKWUlEhDYRHbD8EXQtLR
         hGXTs3LTe0tNECvEc0QQ3gavKzuFIBW5V+W6pGyNgy0F8X1RKcixk5n93FXcTecHiIep
         G1WrbmTHafbZqiFIsAW0M4VWI5qRob0xYjL9jnDgfVfth7/f271rS43Pm6WxxiTOI/Ta
         havA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to
         :references:mime-version:content-transfer-encoding;
        bh=0hihgfEmLJPNBEh4WW6rYf49XmgK0ovI41W1a0emuNk=;
        b=1OfMaxDMPcPasAsY7fbV2TiWVgXCVPfg6D625qP50cS7Yxzu0413ZYLJSLAkHYKOiN
         +h2Y+haFNJeWqgk2NRZpPtA1Sqo+SCjPECnctUuPi2WgxLL2c4LMHYjRqX1/FNjsavTw
         +4HQr3Wm6JCj3DSid5XlvBbvk9+jE+A005PhVLGtyhtfd10d3eJ2nJ9FrocaoH0U3qvf
         lKzPRkjjk1qS9tdpl9MKGNE35PCOvQmGZizcgZkCT6dzQARAdC3NSwi3LdM6tu4rvkF6
         EFmOmretVXFfJYYQ4NwcDPhkfz9ngw+XbH5LVbmKHKqeNTD8RsYKCy/s99+pzI4JXrx0
         N+yQ==
X-Gm-Message-State: AOAM531itduDtQnQVXu3zavZTAypP/HBBC+IdP2e3emVysmw7Fq/D7SG
	r+0ok+S8J5O8KWvQQkrYhwQ=
X-Google-Smtp-Source: ABdhPJwdV5/nAguIIYnMM8I+otidppMXPEnBBQGuuNIH21Igt/CypcRNRBAVG30eApAdY410n71pzg==
X-Received: by 2002:a17:90a:8581:b0:1b2:7541:af6c with SMTP id m1-20020a17090a858100b001b27541af6cmr842235pjn.48.1648055941418;
        Wed, 23 Mar 2022 10:19:01 -0700 (PDT)
From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <philippe.mathieu.daude@gmail.com>
To: qemu-devel@nongnu.org
Cc: Wenchao Wang <wenchao.wang@intel.com>,
	Laurent Vivier <lvivier@redhat.com>,
	David Hildenbrand <david@redhat.com>,
	Yanan Wang <wangyanan55@huawei.com>,
	Cameron Esfahani <dirty@apple.com>,
	Marcelo Tosatti <mtosatti@redhat.com>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Anthony Perard <anthony.perard@citrix.com>,
	haxm-team@intel.com,
	Paul Durrant <paul@xen.org>,
	Richard Henderson <richard.henderson@linaro.org>,
	xen-devel@lists.xenproject.org,
	=?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Roman Bolshakov <r.bolshakov@yadro.com>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Kamil Rytarowski <kamil@netbsd.org>,
	Paolo Bonzini <pbonzini@redhat.com>,
	Peter Xu <peterx@redhat.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Thomas Huth <thuth@redhat.com>,
	Colin Xu <colin.xu@intel.com>
Subject: [PATCH v4 05/13] accel/tcg: Init TCG cflags in vCPU thread handler
Date: Wed, 23 Mar 2022 18:17:43 +0100
Message-Id: <20220323171751.78612-6-philippe.mathieu.daude@gmail.com>
X-Mailer: git-send-email 2.35.1
In-Reply-To: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
References: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

From: Philippe Mathieu-Daudé <f4bug@amsat.org>

Move TCG cflags initialization to thread handler.
Remove the duplicated assert checks.

Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
---
 accel/tcg/tcg-accel-ops-mttcg.c | 5 ++---
 accel/tcg/tcg-accel-ops-rr.c    | 7 +++----
 2 files changed, 5 insertions(+), 7 deletions(-)

diff --git a/accel/tcg/tcg-accel-ops-mttcg.c b/accel/tcg/tcg-accel-ops-mttcg.c
index ea2b741deb..80609964a6 100644
--- a/accel/tcg/tcg-accel-ops-mttcg.c
+++ b/accel/tcg/tcg-accel-ops-mttcg.c
@@ -71,6 +71,8 @@ static void *mttcg_cpu_thread_fn(void *arg)
     assert(tcg_enabled());
     g_assert(!icount_enabled());
 
+    tcg_cpu_init_cflags(cpu, current_machine->smp.max_cpus > 1);
+
     rcu_register_thread();
     force_rcu.notifier.notify = mttcg_force_rcu;
     force_rcu.cpu = cpu;
@@ -140,9 +142,6 @@ void mttcg_start_vcpu_thread(CPUState *cpu)
 {
     char thread_name[VCPU_THREAD_NAME_SIZE];
 
-    g_assert(tcg_enabled());
-    tcg_cpu_init_cflags(cpu, current_machine->smp.max_cpus > 1);
-
     cpu->thread = g_new0(QemuThread, 1);
     cpu->halt_cond = g_malloc0(sizeof(QemuCond));
     qemu_cond_init(cpu->halt_cond);
diff --git a/accel/tcg/tcg-accel-ops-rr.c b/accel/tcg/tcg-accel-ops-rr.c
index b287110766..de8af32af7 100644
--- a/accel/tcg/tcg-accel-ops-rr.c
+++ b/accel/tcg/tcg-accel-ops-rr.c
@@ -153,7 +153,9 @@ static void *rr_cpu_thread_fn(void *arg)
     Notifier force_rcu;
     CPUState *cpu = arg;
 
-    assert(tcg_enabled());
+    g_assert(tcg_enabled());
+    tcg_cpu_init_cflags(cpu, false);
+
     rcu_register_thread();
     force_rcu.notify = rr_force_rcu;
     rcu_add_force_rcu_notifier(&force_rcu);
@@ -276,9 +278,6 @@ void rr_start_vcpu_thread(CPUState *cpu)
     static QemuCond *single_tcg_halt_cond;
     static QemuThread *single_tcg_cpu_thread;
 
-    g_assert(tcg_enabled());
-    tcg_cpu_init_cflags(cpu, false);
-
     if (!single_tcg_cpu_thread) {
         cpu->thread = g_new0(QemuThread, 1);
         cpu->halt_cond = g_new0(QemuCond, 1);
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 17:35:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 17:35:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294031.499769 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4tq-00051q-5w; Wed, 23 Mar 2022 17:35:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294031.499769; Wed, 23 Mar 2022 17:35:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4tq-00051j-1v; Wed, 23 Mar 2022 17:35:58 +0000
Received: by outflank-mailman (input) for mailman id 294031;
 Wed, 23 Mar 2022 17:35:57 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=s5zF=UC=gmail.com=philippe.mathieu.daude@srs-se1.protection.inumbo.net>)
 id 1nX4df-0004Zy-AL
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 17:19:15 +0000
Received: from mail-pl1-x634.google.com (mail-pl1-x634.google.com
 [2607:f8b0:4864:20::634])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 5c6eb699-aacd-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 18:19:14 +0100 (CET)
Received: by mail-pl1-x634.google.com with SMTP id x2so2149951plm.7
 for <xen-devel@lists.xenproject.org>; Wed, 23 Mar 2022 10:19:14 -0700 (PDT)
Received: from localhost.localdomain (198.red-83-50-65.dynamicip.rima-tde.net.
 [83.50.65.198]) by smtp.gmail.com with ESMTPSA id
 5-20020a17090a1a4500b001c54dc9061esm266865pjl.51.2022.03.23.10.19.07
 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256);
 Wed, 23 Mar 2022 10:19:12 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5c6eb699-aacd-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:in-reply-to:references
         :mime-version:content-transfer-encoding;
        bh=ARhouW8OXYXIRPQjyAafjquDP6FUc0ZjucITbhHVg5E=;
        b=qrmYjLiXax41wynkldUk46+CTEMhEwNtecSEajm0opdutnFDwZFnb5R/0qKYGW240d
         Xfip76+lUKk9ny0xZ6YhE00J4TKeGUMnJ8SoGN13GNg0qwOnowPKMtRWHdotb/gtDf5D
         MtRHQsTElQmEIKX9ZZdHDbTe5WtCrvk7tdOYhyQM3qFOeBHzl9lmse0tjqCeQBy7UGAO
         ybhOz4GI6Y3MO4ukQmThEULFFMRC2oMeKASkkcCP/dzLf46Qozna5NyY8TjPqJE1DQEs
         GnXGhPd1I7iqkj+/YcGjrCQJ3XokcBCDvDTZ5EW8eBPnuLOf/HAk1jK7Hlg+t8pJiPz7
         v+sQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to
         :references:mime-version:content-transfer-encoding;
        bh=ARhouW8OXYXIRPQjyAafjquDP6FUc0ZjucITbhHVg5E=;
        b=lMnf/fuGLay5TZ7Z5DIGDug+/cODlT1IjdyDM59/QXU+QMTqdnIIxy07ralCIyOr5c
         IuDH3RibmXuhH2l4s7XoRzR3Ac5fAvmkQthoB043MT0rQ28F/6Nq4xfiTxIsSuY6ILbG
         1d4LE/rmsI3NYKZgd695trQfQOFSBmzoPovEAwKz0AUz4fPNkoU2JQKGq34xUlDh+nZB
         f24u2ikLKhTWUM623h26ZfFrQGXX4mdjhMlkmPtvmu0e2oevHG65C8KW7qBp0XHo9+SZ
         j6R/fec/yQP+MmWXdsU8HsOPYOZQ83otJJJkSqR66+oe9cn9kGuSfAj/m1mj0L3PtrEE
         iQtQ==
X-Gm-Message-State: AOAM5317H5StRMbcyzH6XpSPNoev3jMad4DdnMfxQoCBIZXiVKGjZvbq
	oCwrGA1LBaCC9/qucDvcwRg=
X-Google-Smtp-Source: ABdhPJzLdZtFm+tMEOoscqkjQAgJQZm9yuu7A4C9NQT5lLkj2BUY8yeJrCTrFbO4ucEGmuTjUPWoUA==
X-Received: by 2002:a17:902:bf07:b0:14f:a3a7:97a0 with SMTP id bi7-20020a170902bf0700b0014fa3a797a0mr1005569plb.105.1648055953255;
        Wed, 23 Mar 2022 10:19:13 -0700 (PDT)
From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <philippe.mathieu.daude@gmail.com>
To: qemu-devel@nongnu.org
Cc: Wenchao Wang <wenchao.wang@intel.com>,
	Laurent Vivier <lvivier@redhat.com>,
	David Hildenbrand <david@redhat.com>,
	Yanan Wang <wangyanan55@huawei.com>,
	Cameron Esfahani <dirty@apple.com>,
	Marcelo Tosatti <mtosatti@redhat.com>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Anthony Perard <anthony.perard@citrix.com>,
	haxm-team@intel.com,
	Paul Durrant <paul@xen.org>,
	Richard Henderson <richard.henderson@linaro.org>,
	xen-devel@lists.xenproject.org,
	=?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Roman Bolshakov <r.bolshakov@yadro.com>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Kamil Rytarowski <kamil@netbsd.org>,
	Paolo Bonzini <pbonzini@redhat.com>,
	Peter Xu <peterx@redhat.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Thomas Huth <thuth@redhat.com>,
	Colin Xu <colin.xu@intel.com>
Subject: [PATCH v4 06/13] accel/tcg: Reorganize tcg_accel_ops_init()
Date: Wed, 23 Mar 2022 18:17:44 +0100
Message-Id: <20220323171751.78612-7-philippe.mathieu.daude@gmail.com>
X-Mailer: git-send-email 2.35.1
In-Reply-To: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
References: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

From: Philippe Mathieu-Daudé <f4bug@amsat.org>

Reorg TCG AccelOpsClass initialization to emphasis icount
mode share more code with single-threaded TCG.

Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
---
 accel/tcg/tcg-accel-ops.c | 15 ++++++++-------
 1 file changed, 8 insertions(+), 7 deletions(-)

diff --git a/accel/tcg/tcg-accel-ops.c b/accel/tcg/tcg-accel-ops.c
index ea7dcad674..d2181ea1e5 100644
--- a/accel/tcg/tcg-accel-ops.c
+++ b/accel/tcg/tcg-accel-ops.c
@@ -98,16 +98,17 @@ static void tcg_accel_ops_init(AccelOpsClass *ops)
         ops->create_vcpu_thread = mttcg_start_vcpu_thread;
         ops->kick_vcpu_thread = mttcg_kick_vcpu_thread;
         ops->handle_interrupt = tcg_handle_interrupt;
-    } else if (icount_enabled()) {
-        ops->create_vcpu_thread = rr_start_vcpu_thread;
-        ops->kick_vcpu_thread = rr_kick_vcpu_thread;
-        ops->handle_interrupt = icount_handle_interrupt;
-        ops->get_virtual_clock = icount_get;
-        ops->get_elapsed_ticks = icount_get;
     } else {
         ops->create_vcpu_thread = rr_start_vcpu_thread;
         ops->kick_vcpu_thread = rr_kick_vcpu_thread;
-        ops->handle_interrupt = tcg_handle_interrupt;
+
+        if (icount_enabled()) {
+            ops->handle_interrupt = icount_handle_interrupt;
+            ops->get_virtual_clock = icount_get;
+            ops->get_elapsed_ticks = icount_get;
+        } else {
+            ops->handle_interrupt = tcg_handle_interrupt;
+        }
     }
 }
 
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 17:36:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 17:36:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294033.499780 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4u6-0005VV-DT; Wed, 23 Mar 2022 17:36:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294033.499780; Wed, 23 Mar 2022 17:36:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX4u6-0005VO-9g; Wed, 23 Mar 2022 17:36:14 +0000
Received: by outflank-mailman (input) for mailman id 294033;
 Wed, 23 Mar 2022 17:36:13 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=s5zF=UC=gmail.com=philippe.mathieu.daude@srs-se1.protection.inumbo.net>)
 id 1nX4ep-0004Zy-1T
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 17:20:27 +0000
Received: from mail-pl1-x62f.google.com (mail-pl1-x62f.google.com
 [2607:f8b0:4864:20::62f])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 872bd760-aacd-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 18:20:26 +0100 (CET)
Received: by mail-pl1-x62f.google.com with SMTP id k6so2138366plg.12
 for <xen-devel@lists.xenproject.org>; Wed, 23 Mar 2022 10:20:26 -0700 (PDT)
Received: from localhost.localdomain (198.red-83-50-65.dynamicip.rima-tde.net.
 [83.50.65.198]) by smtp.gmail.com with ESMTPSA id
 o24-20020a17090a5b1800b001c6aaafa5fbsm282644pji.24.2022.03.23.10.20.18
 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256);
 Wed, 23 Mar 2022 10:20:24 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 872bd760-aacd-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:in-reply-to:references
         :mime-version:content-transfer-encoding;
        bh=ed6iY8pMEzMkAOvdT6TEMCudwvjmYJcGMMpCaTIv/yU=;
        b=RyKgoe5HgJCJpFJvPNUJVGX9nExg70mZzCcSsKHkmRw2HUwXJBO+ViJY8Cg1JFjM2H
         G0OgG2uMd3kfN/cqwIfkckDdV0ro4mD03PEFsBMGgIFVHwNisdMFtViW7UEW0QokyJ18
         /1sVuSemm0/QC9FQEH4gtz9xLl3QWzTjGmS6U6thAkmdoZhRJ3tRO1ZYnvykNZfNtAY7
         hsT8RrSJ2JYd++oXi25BCbjpyRPtyPQS4TfqKZj1OE2g3DX3iSvXB/fb6naDgvDbxoVg
         v/pUtMjxZ1idxkWkbRDhcEj5lEdEAR20mwKPOE/HmsGKZUkhhIAWrUbX6M9OiZDfFKNS
         ulEA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to
         :references:mime-version:content-transfer-encoding;
        bh=ed6iY8pMEzMkAOvdT6TEMCudwvjmYJcGMMpCaTIv/yU=;
        b=i278VbzLftkQZp95rC7K7vxypA5PJEp5DEBFWhwvEw9DgsK+SoUP+CkzaZnKCmH0Uf
         c1PWrnJygLgCiDJwHMbq1H8byi5VfA8ABsy3J4NlbCfdVRCh2QFbd86kgCTYVRpJn0l+
         g0trnk4/9dgou/Z+WVzp4j6W1qVIfbRSAz3A7SO89UpbT1ItnSCETXtUlYH1No2jMvY4
         XRS1zwSRMjfCaSjMbcpJNdUs41h7YebXF8bCO/Fq9/1TlwLbS0RtZnr568b4Gdg/vmaJ
         R43oCxHcGusQSmvQfKpjjTRJpzdt6PTP3l25CDbDvDLxDE36p+xBLH25cASqZDU7XneV
         1RUg==
X-Gm-Message-State: AOAM530kqP6uzTlSr38ts8QZ3oXqRNr2Qc6IRddLeyipkZ8AHdHgl27s
	A/kRx3nIcoJbZk1vtdbVDHs=
X-Google-Smtp-Source: ABdhPJwqx6x4zfaaNXs3hip1MrGQWDzMJ1aziOlNPCMVNNhEzttDkRqQAwuDm1jVkFyWnxpwXzRJYA==
X-Received: by 2002:a17:903:2406:b0:14d:6447:990c with SMTP id e6-20020a170903240600b0014d6447990cmr1048970plo.22.1648056024958;
        Wed, 23 Mar 2022 10:20:24 -0700 (PDT)
From: =?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <philippe.mathieu.daude@gmail.com>
To: qemu-devel@nongnu.org
Cc: Wenchao Wang <wenchao.wang@intel.com>,
	Laurent Vivier <lvivier@redhat.com>,
	David Hildenbrand <david@redhat.com>,
	Yanan Wang <wangyanan55@huawei.com>,
	Cameron Esfahani <dirty@apple.com>,
	Marcelo Tosatti <mtosatti@redhat.com>,
	Sunil Muthuswamy <sunilmut@microsoft.com>,
	Anthony Perard <anthony.perard@citrix.com>,
	haxm-team@intel.com,
	Paul Durrant <paul@xen.org>,
	Richard Henderson <richard.henderson@linaro.org>,
	xen-devel@lists.xenproject.org,
	=?UTF-8?q?Philippe=20Mathieu-Daud=C3=A9?= <f4bug@amsat.org>,
	Roman Bolshakov <r.bolshakov@yadro.com>,
	Reinoud Zandijk <reinoud@netbsd.org>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Kamil Rytarowski <kamil@netbsd.org>,
	Paolo Bonzini <pbonzini@redhat.com>,
	Peter Xu <peterx@redhat.com>,
	Eduardo Habkost <eduardo@habkost.net>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Thomas Huth <thuth@redhat.com>,
	Colin Xu <colin.xu@intel.com>,
	Mark Kanda <mark.kanda@oracle.com>
Subject: [PATCH v4 12/13] softmmu/cpus: Free cpu->thread in generic_destroy_vcpu_thread()
Date: Wed, 23 Mar 2022 18:17:50 +0100
Message-Id: <20220323171751.78612-13-philippe.mathieu.daude@gmail.com>
X-Mailer: git-send-email 2.35.1
In-Reply-To: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
References: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

From: Mark Kanda <mark.kanda@oracle.com>

Free cpu->thread in a new AccelOpsClass::destroy_vcpu_thread() handler
generic_destroy_vcpu_thread().

vCPU hotunplug related leak reported by Valgrind:

  ==102631== 8 bytes in 1 blocks are definitely lost in loss record 1,037 of 8,555
  ==102631==    at 0x4C3ADBB: calloc (vg_replace_malloc.c:1117)
  ==102631==    by 0x69EE4CD: g_malloc0 (in /usr/lib64/libglib-2.0.so.0.5600.4)
  ==102631==    by 0x92443A: kvm_start_vcpu_thread (kvm-accel-ops.c:68)
  ==102631==    by 0x4505C2: qemu_init_vcpu (cpus.c:643)
  ==102631==    by 0x76B4D1: x86_cpu_realizefn (cpu.c:6520)
  ==102631==    by 0x9344A7: device_set_realized (qdev.c:531)
  ==102631==    by 0x93E329: property_set_bool (object.c:2273)
  ==102631==    by 0x93C2F8: object_property_set (object.c:1408)
  ==102631==    by 0x940796: object_property_set_qobject (qom-qobject.c:28)
  ==102631==    by 0x93C663: object_property_set_bool (object.c:1477)
  ==102631==    by 0x933D3B: qdev_realize (qdev.c:333)
  ==102631==    by 0x455EC4: qdev_device_add_from_qdict (qdev-monitor.c:713)

Signed-off-by: Mark Kanda <mark.kanda@oracle.com>
Message-Id: <20220321141409.3112932-3-mark.kanda@oracle.com>
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
---
 softmmu/cpus.c | 1 +
 1 file changed, 1 insertion(+)

diff --git a/softmmu/cpus.c b/softmmu/cpus.c
index 37325b3b8d..efa8397f04 100644
--- a/softmmu/cpus.c
+++ b/softmmu/cpus.c
@@ -619,6 +619,7 @@ static void common_vcpu_thread_create(CPUState *cpu)
 
 static void common_vcpu_thread_destroy(CPUState *cpu)
 {
+    g_free(cpu->thread);
 }
 
 void cpu_remove_sync(CPUState *cpu)
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 18:21:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 18:21:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294037.499790 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX5bb-0002ZY-HF; Wed, 23 Mar 2022 18:21:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294037.499790; Wed, 23 Mar 2022 18:21:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX5bb-0002ZR-EG; Wed, 23 Mar 2022 18:21:11 +0000
Received: by outflank-mailman (input) for mailman id 294037;
 Wed, 23 Mar 2022 18:21:10 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX5ba-0002Z1-Cm; Wed, 23 Mar 2022 18:21:10 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX5ba-0002pz-Av; Wed, 23 Mar 2022 18:21:10 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX5ba-0004UZ-07; Wed, 23 Mar 2022 18:21:10 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nX5bZ-0006og-Vv; Wed, 23 Mar 2022 18:21:09 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=O2THUnjDnMXd8F5F1vYUKtZllc7GGKBdKxNeMxSbP1o=; b=eSp1+/6VAWpoHBBpXSBNhmPl+W
	gVEZruAsMCb0M9/Fkel2J+4Jo3TGWI29Hm7INGgewWDMLXrSC7cUrXKMk17uluLSdE2/97wTi7m0B
	Stam9mErzTah0y1ZH45ECYrN+D6lFOou6Zi1PsHMpBIva8p+NORROSkOuMDO6/r0TrIc=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168804-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168804: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 23 Mar 2022 18:21:09 +0000

flight 168804 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168804/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   23 days
Failing since        168258  2022-03-01 01:55:31 Z   22 days  232 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    1 days   13 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 18:53:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 18:53:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294045.499802 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX673-000601-4W; Wed, 23 Mar 2022 18:53:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294045.499802; Wed, 23 Mar 2022 18:53:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX673-0005zu-1a; Wed, 23 Mar 2022 18:53:41 +0000
Received: by outflank-mailman (input) for mailman id 294045;
 Wed, 23 Mar 2022 18:53:39 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nX671-0005zo-Dp
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 18:53:39 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nX670-0003Kw-Q5; Wed, 23 Mar 2022 18:53:38 +0000
Received: from 54-240-197-230.amazon.com ([54.240.197.230]
 helo=[192.168.10.149]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nX670-0004Xb-J3; Wed, 23 Mar 2022 18:53:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=X97TYqEcRlTf986DnfWpgQM4S7+cGZzffAEtndV9224=; b=NnGqjYq1g1iQtGNZ3giLwoZUl6
	wdtRPKcHjJ6bzkFZI5kvbNN8KzViFc+E+x7FPI7kxZItR12LNo8hJcMpvcUnBJmIbqkGsp6Ke2urW
	fKKb5faeaSWlQg/trGTxZSQ9NZqEKVn7akJZ6laUgb9d/9QoC9DuARdt6x3ZtKTgRTq8=;
Message-ID: <33e2643c-1639-2f3b-bcec-84aac77966af@xen.org>
Date: Wed, 23 Mar 2022 18:53:35 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v3 4/6] xen/cpupool: Create different cpupools at boot
 time
To: Luca Fancellu <Luca.Fancellu@arm.com>
Cc: Xen-devel <xen-devel@lists.xenproject.org>,
 Bertrand Marquis <Bertrand.Marquis@arm.com>, Wei Chen <Wei.Chen@arm.com>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Wei Liu <wl@xen.org>, Juergen Gross <jgross@suse.com>,
 Dario Faggioli <dfaggioli@suse.com>
References: <20220318152541.7460-1-luca.fancellu@arm.com>
 <20220318152541.7460-5-luca.fancellu@arm.com>
 <274f81b0-c164-4437-3d05-243e147330a9@xen.org>
 <0FA7F6D7-0B40-4B75-9752-7FE48D0FCA5C@arm.com>
 <9f3d7713-4e4b-58f8-d7a1-b42ef152a7ab@xen.org>
 <AE272A2A-EA5B-4217-AECE-80AE04207B55@arm.com>
 <acbf28a2-31b9-2a9c-6b42-6d386b47bfbf@xen.org>
 <6FA48D36-AFF3-4D37-BCF5-27FE68570428@arm.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <6FA48D36-AFF3-4D37-BCF5-27FE68570428@arm.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi,

On 23/03/2022 13:58, Luca Fancellu wrote:
>> On 22 Mar 2022, at 14:01, Julien Grall <julien@xen.org> wrote:
>>
>> Hi,
>>
>> On 22/03/2022 09:52, Luca Fancellu wrote:
>>>>>>
>>>>>> Can you document why this is necessary on x86 but not on other architectures?
>>>>> Hi Julien,
>>>>> I received the warning by Juergen here: https://patchwork.kernel.org/comment/24740762/ that at least on x86 there could be
>>>>> some problems if cpu0 is not in cpupool0, I tested it on arm and it was working fine and I didn’t find any restriction.
>>>>
>>>> What exactly did you test on Arm?
>>>>
>>> I have tested start/stop of some guest, moving cpus between cpupools, create/destroy cpupools, shutdown of Dom0
>>> [ from your last mail ]
>>>>>>
>>>>>> If dom0 must run on core0 and core0 is Little then you cannot build a system where dom0 is running on big cores.
>>>>>> If the limitation is not there, you can build such a configuration without any dependency to the boot core type.
>>>>> This might not be completely clear so let me rephrase:
>>>>> In the current system:
>>>>> - dom0 must run on cpupool-0
>>>>
>>>> I don't think we need this restriction. In fact, with this series it will become more a problem because the cpupool ID will based on how we parse the Device-Tree.
>>>>
>>>> So for dom0, we need to specify explicitely the cpupool to be used.
>>>>
>>>>> - cpupool-0 must contain the boot core
>>>>> - consequence: dom0 must run on the boot core
>>>>> If boot core is little, you cannot build as system where dom0 runs only on the big cores.
>>>>> Removing the second limitation (which is not required on arm) is making it possible.
>>>>
>>>> IMHO removing the second restriction is a lot more risky than removing the first one.
>>> I see your point, my concern about moving Dom0 on another cpupool, different from cpupool0, is that we give the
>>> opportunity to destroy the cpupool0 (we can’t let that happen), or remove every cpu from cpupool0.
>>
>>  From my understanding a cpupool can only be destroyed when there are no more CPUs in the pool. Given that cpu0 has to be in pool0 then this should prevent the pool to be destroyed.
>>
>> Now, it is quite possible that we don't have a check to prevent CPU0 to be removed from cpupool0. If so, then I would argue we should add the check otherwise it is pointless to prevent cpu0 to be initially added in another pool than pool0 but can be moved afterwards.
>>
> 
> Hi Julien,
> 
> I’ve done a test on fvp, first finding is that cpu0 can be removed from Pool-0, there is no check.
> Afterwards I’ve created another pool and I’ve assigned a cpu to it, I’ve called xl cpupool-destroy and the tool removes every cpu from the pool before destroying.
> 
> Do you think the check that prevents CPU0 to be removed from Pool-0 should be done in the tools or in Xen?

I think we want a check at least in Xen (so we don't trust the tools to 
do the right thing).

We could also add one in the tools to provide better diagnostics to the 
user (this tends to be a request from Andrew).

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 18:56:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 18:56:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294049.499813 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX6AD-0006gQ-NG; Wed, 23 Mar 2022 18:56:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294049.499813; Wed, 23 Mar 2022 18:56:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX6AD-0006gJ-Jv; Wed, 23 Mar 2022 18:56:57 +0000
Received: by outflank-mailman (input) for mailman id 294049;
 Wed, 23 Mar 2022 18:56:56 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=s5zF=UC=gmail.com=philippe.mathieu.daude@srs-se1.protection.inumbo.net>)
 id 1nX6AC-0006g7-Kd
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 18:56:56 +0000
Received: from mail-qt1-x82b.google.com (mail-qt1-x82b.google.com
 [2607:f8b0:4864:20::82b])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 01f14ea2-aadb-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 19:56:55 +0100 (CET)
Received: by mail-qt1-x82b.google.com with SMTP id c4so2005544qtx.1
 for <xen-devel@lists.xenproject.org>; Wed, 23 Mar 2022 11:56:55 -0700 (PDT)
Received: from [192.168.1.33] (198.red-83-50-65.dynamicip.rima-tde.net.
 [83.50.65.198]) by smtp.gmail.com with ESMTPSA id
 20-20020ac84e94000000b002e1d5505fb6sm693231qtp.63.2022.03.23.11.56.49
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Wed, 23 Mar 2022 11:56:53 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 01f14ea2-aadb-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=message-id:date:mime-version:user-agent:subject:content-language:to
         :cc:references:from:in-reply-to:content-transfer-encoding;
        bh=5eVbw0nx8xg2wrymdgy7rIBO9Z2Z1ybMaOCic40tRX8=;
        b=pINxR8DJ/dnErtsZYHLcjm3xLVqJFIx1fMZNHtFehMtqd8aGXnSl54CT4YCi0RLQF1
         H9kc4Fd7rO9qljLBdTA4RxkI2f7FzHEvejLR/IrVv3ShAVJLFaJwsVQfOkLIRbusOioH
         LfbzI6BuvUyV0CU2sjYFvVtrZg9SOin6Ov/isa+XzSYhHwAHIO99eVmW79gYKjwiD5db
         157eGbN9NADA4/5cI5kFhkeT9C0pk178OKQI8l5wT8ovbXUnRHdyBEZAMvCvZ/4Ra2fE
         IJEPWagNz/x8+yoWrbByo2K5dgojkE1HzMlryp40yl7F8BrPdBpzDOhxibrbqDs8AVLS
         JZng==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:message-id:date:mime-version:user-agent:subject
         :content-language:to:cc:references:from:in-reply-to
         :content-transfer-encoding;
        bh=5eVbw0nx8xg2wrymdgy7rIBO9Z2Z1ybMaOCic40tRX8=;
        b=09IEsEofZJygHfIEMkE8XjUSY6aAXoHf+pnnaKrUvz9TWDR9sjBGRp+60SFlYYGkEu
         vyhKKlBQFZGvt6mMs4D4XEdgN1cbBI/+qVwKZjfAi1tdayT1/4E6dvOYpYgnYSK9PRNN
         Y83FImgSBlutO6PA60yG4e9V8HSd/E5zW6cJp7knHcignbTFoc5vaeeEuGJxEViCROns
         ynSKoilbnyJso4ezdrfO8JgoiBdj+eL2aXpAzStI/pkYxofYeU+QxXOwl6RBWWBuU09G
         nt1nFKZiAfwnFQ6kQ4mPwxuZs6l+loH3PUvgsSxeF/9XMFFBdPTx6ljh8AZPwrE7VVg5
         ZFcw==
X-Gm-Message-State: AOAM532SByrXaNg+mQ92QG1zkVw+/OdXX3qUMxa/SrsTfUOFLc46hsjN
	fTsUXbnBpBUih3R0F4RFzhM=
X-Google-Smtp-Source: ABdhPJwKXR1brQUncQYlgUOu7VO+BDgmnuJ6K6yvnXsMlACxq1xjWW0DRh2aVZuhQlVnRO+8VmthaA==
X-Received: by 2002:ac8:59c8:0:b0:2e0:6ae2:eb6f with SMTP id f8-20020ac859c8000000b002e06ae2eb6fmr1175396qtf.580.1648061814387;
        Wed, 23 Mar 2022 11:56:54 -0700 (PDT)
Message-ID: <06217ec6-bd2a-6fd1-b2ff-1704b073456f@gmail.com>
Date: Wed, 23 Mar 2022 19:56:47 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v4 01/13] cpu: Free cpu->cpu_ases in
 cpu_address_space_destroy()
Content-Language: en-US
To: qemu-devel@nongnu.org
Cc: Wenchao Wang <wenchao.wang@intel.com>, Laurent Vivier
 <lvivier@redhat.com>, David Hildenbrand <david@redhat.com>,
 Yanan Wang <wangyanan55@huawei.com>, Cameron Esfahani <dirty@apple.com>,
 Marcelo Tosatti <mtosatti@redhat.com>,
 Sunil Muthuswamy <sunilmut@microsoft.com>,
 Anthony Perard <anthony.perard@citrix.com>, haxm-team@intel.com,
 Paul Durrant <paul@xen.org>, Richard Henderson
 <richard.henderson@linaro.org>, xen-devel@lists.xenproject.org,
 =?UTF-8?Q?Philippe_Mathieu-Daud=c3=a9?= <f4bug@amsat.org>,
 Roman Bolshakov <r.bolshakov@yadro.com>, Reinoud Zandijk
 <reinoud@netbsd.org>, Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
 Kamil Rytarowski <kamil@netbsd.org>, Paolo Bonzini <pbonzini@redhat.com>,
 Peter Xu <peterx@redhat.com>, Eduardo Habkost <eduardo@habkost.net>,
 Stefano Stabellini <sstabellini@kernel.org>, Thomas Huth <thuth@redhat.com>,
 Colin Xu <colin.xu@intel.com>, Mark Kanda <mark.kanda@oracle.com>
References: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
 <20220323171751.78612-2-philippe.mathieu.daude@gmail.com>
From: =?UTF-8?Q?Philippe_Mathieu-Daud=c3=a9?=
 <philippe.mathieu.daude@gmail.com>
In-Reply-To: <20220323171751.78612-2-philippe.mathieu.daude@gmail.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

On 23/3/22 18:17, Philippe Mathieu-Daudé wrote:
> From: Mark Kanda <mark.kanda@oracle.com>
> 
> Create cpu_address_space_destroy() to free a CPU's cpu_ases list.

This seems incorrect...

> vCPU hotunplug related leak reported by Valgrind:
> 
> ==132362== 216 bytes in 1 blocks are definitely lost in loss record 7,119 of 8,549
> ==132362==    at 0x4C3ADBB: calloc (vg_replace_malloc.c:1117)
> ==132362==    by 0x69EE4CD: g_malloc0 (in /usr/lib64/libglib-2.0.so.0.5600.4)
> ==132362==    by 0x7E34AF: cpu_address_space_init (physmem.c:751)
> ==132362==    by 0x45053E: qemu_init_vcpu (cpus.c:635)
> ==132362==    by 0x76B4A7: x86_cpu_realizefn (cpu.c:6520)
> ==132362==    by 0x9343ED: device_set_realized (qdev.c:531)
> ==132362==    by 0x93E26F: property_set_bool (object.c:2273)
> ==132362==    by 0x93C23E: object_property_set (object.c:1408)
> ==132362==    by 0x9406DC: object_property_set_qobject (qom-qobject.c:28)
> ==132362==    by 0x93C5A9: object_property_set_bool (object.c:1477)
> ==132362==    by 0x933C81: qdev_realize (qdev.c:333)
> ==132362==    by 0x455E9A: qdev_device_add_from_qdict (qdev-monitor.c:713)
> 
> Signed-off-by: Mark Kanda <mark.kanda@oracle.com>
> Tested-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
> Message-Id: <20220321141409.3112932-5-mark.kanda@oracle.com>
> Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
> ---
>   cpu.c                     | 1 +
>   include/exec/cpu-common.h | 7 +++++++
>   softmmu/physmem.c         | 5 +++++
>   3 files changed, 13 insertions(+)
> 
> diff --git a/cpu.c b/cpu.c
> index be1f8b074c..59352a1487 100644
> --- a/cpu.c
> +++ b/cpu.c
> @@ -174,6 +174,7 @@ void cpu_exec_unrealizefn(CPUState *cpu)
>           tcg_exec_unrealizefn(cpu);
>       }
>   
> +    cpu_address_space_destroy(cpu);
>       cpu_list_remove(cpu);
>   }
>   
> diff --git a/include/exec/cpu-common.h b/include/exec/cpu-common.h
> index 50a7d2912e..b17ad61ae4 100644
> --- a/include/exec/cpu-common.h
> +++ b/include/exec/cpu-common.h
> @@ -111,6 +111,13 @@ size_t qemu_ram_pagesize_largest(void);
>    */
>   void cpu_address_space_init(CPUState *cpu, int asidx,
>                               const char *prefix, MemoryRegion *mr);

... cpu_address_space_init() creates a single AS, ...

> +/**
> + * cpu_address_space_destroy:
> + * @cpu: CPU for this address space
> + *
> + * Cleanup CPU's cpu_ases list.
> + */
> +void cpu_address_space_destroy(CPUState *cpu);
>   
>   void cpu_physical_memory_rw(hwaddr addr, void *buf,
>                               hwaddr len, bool is_write);
> diff --git a/softmmu/physmem.c b/softmmu/physmem.c
> index 43ae70fbe2..aec61ca07a 100644
> --- a/softmmu/physmem.c
> +++ b/softmmu/physmem.c
> @@ -762,6 +762,11 @@ void cpu_address_space_init(CPUState *cpu, int asidx,
>       }
>   }
>   
> +void cpu_address_space_destroy(CPUState *cpu)
> +{
> +    g_free(cpu->cpu_ases);

... but here you destroy all the ASes.

> +}
> +
>   AddressSpace *cpu_get_address_space(CPUState *cpu, int asidx)
>   {
>       /* Return the AddressSpace corresponding to the specified index */



From xen-devel-bounces@lists.xenproject.org Wed Mar 23 18:59:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 18:59:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294052.499824 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX6Cc-0007Kv-3H; Wed, 23 Mar 2022 18:59:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294052.499824; Wed, 23 Mar 2022 18:59:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX6Cc-0007Ko-0J; Wed, 23 Mar 2022 18:59:26 +0000
Received: by outflank-mailman (input) for mailman id 294052;
 Wed, 23 Mar 2022 18:59:24 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX6Ca-0007Kc-KV; Wed, 23 Mar 2022 18:59:24 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX6Ca-0003RO-Gp; Wed, 23 Mar 2022 18:59:24 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX6Ca-0005Uw-1Z; Wed, 23 Mar 2022 18:59:24 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nX6Ca-0002tz-0s; Wed, 23 Mar 2022 18:59:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=TgajSFHbPJz7kjR6QbK3P0kkTouON1zPsOFhxl+EXoc=; b=DU6GyqQ058S39kuWbRnYaMI7Xr
	Is+YjOLW5t5YSDShvjetCmoLSL4KjLjfPuUb0eL+cXYN6X9OlQrpmjDbIYKFRpZ037MIvYnrCypex
	PYfLTdH1TIawQlrFEcPmeuDx/s23w+jnHrgg7twpzmo7AC5z07dETdnTZoZeXiHV9+tA=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168805-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168805: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 23 Mar 2022 18:59:24 +0000

flight 168805 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168805/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   23 days
Failing since        168258  2022-03-01 01:55:31 Z   22 days  233 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    1 days   14 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 19:02:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 19:02:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294059.499835 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX6G2-0000KF-MJ; Wed, 23 Mar 2022 19:02:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294059.499835; Wed, 23 Mar 2022 19:02:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX6G2-0000K8-Hv; Wed, 23 Mar 2022 19:02:58 +0000
Received: by outflank-mailman (input) for mailman id 294059;
 Wed, 23 Mar 2022 19:02:57 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nX6G1-0000K2-JR
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 19:02:57 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nX6G0-0003Xk-HB; Wed, 23 Mar 2022 19:02:56 +0000
Received: from 54-240-197-238.amazon.com ([54.240.197.238]
 helo=[192.168.10.149]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nX6G0-0005DS-AI; Wed, 23 Mar 2022 19:02:56 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=c4lUWOXExKcKYFVl+7V0s7r/mL3hh2MczVnPOpq0ePQ=; b=hSUp3/ao/lQmUtxnUFr4jqyGO3
	kvHfEyC3hwTbJQnwgkAic0lc/8k3YDpYKvrPhvZNOOVeBG8kNEXECzX0GLcoeAIaihvw6jSA2TvC7
	0LI5bj/mYQ8hlLa2IAsXFQJVS0Xog34hs83q64Cp2pLx7zS5cDgH5Z8ZhvVGXNmVrElk=;
Message-ID: <5a37216a-666e-fa45-e4eb-332656d4670b@xen.org>
Date: Wed, 23 Mar 2022 19:02:53 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH 04/36] xen/arm: add parsing function for cache coloring
 configuration
To: Luca Miccio <lucmiccio@gmail.com>
Cc: Marco Solieri <marco.solieri@minervasys.tech>,
 xen-devel@lists.xenproject.org, Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Marco Solieri <marco.solieri@unimore.it>,
 Andrea Bastoni <andrea.bastoni@minervasys.tech>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>
References: <20220304174701.1453977-1-marco.solieri@minervasys.tech>
 <20220304174701.1453977-5-marco.solieri@minervasys.tech>
 <2f357e1a-df8e-6326-267e-4d12e82e1a5f@xen.org>
 <CANdhDbCZrtcju-=1qgAOt1v=dFFDQwZ4eqfQWj41Pvhcofz=FQ@mail.gmail.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <CANdhDbCZrtcju-=1qgAOt1v=dFFDQwZ4eqfQWj41Pvhcofz=FQ@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit



On 22/03/2022 09:17, Luca Miccio wrote:
> Hi Julien,

Hi Luca,

>>> - way_size: The size of a LLC way in bytes. This value is mainly used
>>>     to calculate the maximum available colors on the platform.
>>
>> We should only add command line option when they are a strong use case.
>> In documentation, you wrote that someone may want to overwrite the way
>> size for "specific needs".
>>
>> Can you explain what would be those needs?
> 
>> - dom0_colors: The coloring configuration for Dom0, which also acts as
>>>     default configuration for any DomU without an explicit configuration.
>>> - xen_colors: The coloring configuration for the Xen hypervisor itself.
>>>
>>> A cache coloring configuration consists of a selection of colors to be
>>> assigned to a VM or to the hypervisor. It is represented by a set of
>>> ranges. Add a common function that parses a string with a
>>> comma-separated set of hyphen-separated ranges like "0-7,15-16" and
>>> returns both: the number of chosen colors, and an array containing their
>>> ids.
>>> Currently we support platforms with up to 128 colors.
>>
>> Is there any reason this value is hardcoded in Xen rather than part of
>> the Kconfig?
>>
>>
> Not really at the time when this patch was created. But as we notify in
> patch 32,
> there is an assert that fails if we use a certain amount of colors. Maybe
> we should
> find a better way to store the color information.

You could use a bitmap. Xen already provide facilities to use them in 
the public interface (see xenctl_bitmap) and convert the Xen internal 
bitmap (see DECLARE_BITMAP).

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 19:29:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 19:29:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294064.499846 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX6fk-0002u4-Sz; Wed, 23 Mar 2022 19:29:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294064.499846; Wed, 23 Mar 2022 19:29:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX6fk-0002tx-PM; Wed, 23 Mar 2022 19:29:32 +0000
Received: by outflank-mailman (input) for mailman id 294064;
 Wed, 23 Mar 2022 19:29:30 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX6fi-0002tn-PG; Wed, 23 Mar 2022 19:29:30 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX6fi-0003yd-If; Wed, 23 Mar 2022 19:29:30 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX6fi-0006E7-6I; Wed, 23 Mar 2022 19:29:30 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nX6fi-0002k4-5s; Wed, 23 Mar 2022 19:29:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=oyFLXqQSNBah6oSlFnYJ7Rxj8Ri+3hjy9VJGUo0JnWo=; b=zdrE8rBOtvW0Wsc16tDHSh2aBz
	TLUdv9JbqZlJAY6rW+C79IGwXO5fCkNpugjBvV2U9p3OFGYbfrb4vZ/xMlgi84oAPENr+oprJg/HW
	TC4Jea/18D2x30p6HNBDk/xoUpIjZyjLB5mSeD+/ahJczIx+Dq3vRZ3dNCpcEsEwmPGM=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168806-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168806: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 23 Mar 2022 19:29:30 +0000

flight 168806 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168806/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   23 days
Failing since        168258  2022-03-01 01:55:31 Z   22 days  234 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    1 days   15 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 19:55:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 19:55:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294071.499857 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX74t-0006BD-0k; Wed, 23 Mar 2022 19:55:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294071.499857; Wed, 23 Mar 2022 19:55:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX74s-0006B6-Sl; Wed, 23 Mar 2022 19:55:30 +0000
Received: by outflank-mailman (input) for mailman id 294071;
 Wed, 23 Mar 2022 19:55:29 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX74r-0006Aw-FA; Wed, 23 Mar 2022 19:55:29 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX74r-0004T5-BE; Wed, 23 Mar 2022 19:55:29 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX74r-0006oi-25; Wed, 23 Mar 2022 19:55:29 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nX74r-0000ru-1c; Wed, 23 Mar 2022 19:55:29 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=N8TDeX+AgW4fSFziS8YECshcV6ybq9OD/bO5ziwk7Og=; b=ewWJO17RpK9Tmkf/i2q/UlTokL
	NqfQDtf3uNEpkfQ9T+u3/szr89DBXBRYCBhDYpvudWxqOCkB/lUUkuF/WOkrzcuHpIHwQxjAZRJgZ
	tkoykAvimUDbtHt44hkHg47QcSfts9A/U0wtZ6shapQ+0SKnHeNo+69rKIIPJ+xRwebg=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168800-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-5.4 test] 168800: regressions - FAIL
X-Osstest-Failures:
    linux-5.4:build-arm64:xen-build:fail:regression
    linux-5.4:test-arm64-arm64-examine:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    linux-5.4:build-arm64-libvirt:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=055c4cf7e6da13450016942e5286492b4a224868
X-Osstest-Versions-That:
    linux=8e24ff11b5d216dc5de667bebeb7b0ef3946c596
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 23 Mar 2022 19:55:29 +0000

flight 168800 linux-5.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168800/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-arm64                   6 xen-build                fail REGR. vs. 168709

Tests which did not succeed, but are not blocking:
 test-arm64-arm64-examine      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl           1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)               blocked  n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168709
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168709
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168709
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168709
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168709
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168709
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168709
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168709
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168709
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168709
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168709
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168709
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                055c4cf7e6da13450016942e5286492b4a224868
baseline version:
 linux                8e24ff11b5d216dc5de667bebeb7b0ef3946c596

Last test of basis   168709  2022-03-19 13:11:21 Z    4 days
Testing same since   168800  2022-03-23 08:42:49 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Alan Stern <stern@rowland.harvard.edu>
  Andrew Morton <akpm@linux-foundation.org>
  Ard Biesheuvel <ardb@kernel.org>
  Arnaldo Carvalho de Melo <acme@redhat.com>
  Arnd Bergmann <arnd@arndb.de>
  Brian Masney <bmasney@redhat.com>
  Catalin Marinas <catalin.marinas@arm.com>
  Dan Carpenter <dan.carpenter@oracle.com>
  David S. Miller <davem@davemloft.net>
  Dmitry Torokhov <dmitry.torokhov@gmail.com>
  Eric Dumazet <edumazet@google.com>
  Florian Fainelli <f.fainelli@gmail.com>
  Greg Kroah-Hartman <gregkh@linuxfoundation.org>
  Guenter Roeck <linux@roeck-us.net>
  Herbert Xu <herbert@gondor.apana.org.au>
  Jakub Kicinski <kuba@kernel.org>
  James Morse <james.morse@arm.com>
  Jiasheng Jiang <jiasheng@iscas.ac.cn>
  Jon Hunter <jonathanh@nvidia.com>
  Joseph Qi <joseph.qi@linux.alibaba.com>
  Kurt Cancemi <kurt@x64architecture.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Linux Kernel Functional Testing <lkft@linaro.org>
  Maarten Lankhorst <maarten.lankhorst@linux.intel.com>
  Marek Vasut <marex@denx.de>
  Miaoqian Lin <linmq006@gmail.com>
  Michael Petlan <mpetlan@redhat.com>
  Nicolas Dichtel <nicolas.dichtel@6wind.com>
  Paolo Abeni <pabeni@redhat.com>
  Pavel Skripkin <paskripkin@gmail.com>
  Randy Dunlap <rdunlap@infradead.org>
  Sasha Levin <sashal@kernel.org>
  Shuah Khan <skhan@linuxfoundation.org>
  Sudip Mukherjee <sudip.mukherjee@codethink.co.uk>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  fail    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          blocked 
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  blocked 
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  blocked 
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     blocked 
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 blocked 
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      blocked 
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 621 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 20:59:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 20:59:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294082.499877 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX84Y-0004D4-Uv; Wed, 23 Mar 2022 20:59:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294082.499877; Wed, 23 Mar 2022 20:59:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX84Y-0004Cx-Ru; Wed, 23 Mar 2022 20:59:14 +0000
Received: by outflank-mailman (input) for mailman id 294082;
 Wed, 23 Mar 2022 20:59:13 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX84X-0004Cn-BF; Wed, 23 Mar 2022 20:59:13 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX84X-0005aU-7s; Wed, 23 Mar 2022 20:59:13 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX84V-0008Ch-Nj; Wed, 23 Mar 2022 20:59:12 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nX84V-0002Nt-NH; Wed, 23 Mar 2022 20:59:11 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=WxUOMmtdwx/5U5C2Ugq9Y5btN35SMzIPGzqPu+RuBEI=; b=Y+KikZbkakyVGsNI2rGujhjuZt
	2rO1Se3BUfB2QXlGSN1fSsaf2JV50xaU2LCd7qqRI17YI4dHh15IUk84OjsSI5rniLCMkEbHQtE5S
	CKFYS9fy3bR42va1nKpPhRKBuyRfOtymnZDpt4KgdvDCW2B6GOy+9vbEu0A1Uml9sBnU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168808-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168808: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 23 Mar 2022 20:59:11 +0000

flight 168808 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168808/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   23 days
Failing since        168258  2022-03-01 01:55:31 Z   22 days  235 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    1 days   16 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 22:15:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 22:15:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294090.499890 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX9GB-0003ox-BE; Wed, 23 Mar 2022 22:15:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294090.499890; Wed, 23 Mar 2022 22:15:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nX9GB-0003oq-8A; Wed, 23 Mar 2022 22:15:19 +0000
Received: by outflank-mailman (input) for mailman id 294090;
 Wed, 23 Mar 2022 22:15:17 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX9G9-0003og-Aw; Wed, 23 Mar 2022 22:15:17 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX9G9-0006sx-8T; Wed, 23 Mar 2022 22:15:17 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nX9G9-0002gL-1F; Wed, 23 Mar 2022 22:15:17 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nX9G9-0001rD-0n; Wed, 23 Mar 2022 22:15:17 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=K2g4ZyRd9NBGzTDzs5mQ0+VWt3mkhrZGVWOcm3eGf0Q=; b=PuSQ/03P0uP3TOv7fHCkIehmiv
	it7+s0JWcqfENKS1h8gGdYdmIQk15a0Oa0wiQiB1m8y+TCaiOojKjrASqzYRYVHB/Vxk6jhaa3DlI
	ggFzUPVBsIdMw0atV2KFO3wP4uu87zEfxYbJ8SrUJ5T6vx45Fd9WOhM+p9Dn4Z0BqfGM=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168812-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168812: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 23 Mar 2022 22:15:17 +0000

flight 168812 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168812/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   23 days
Failing since        168258  2022-03-01 01:55:31 Z   22 days  236 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    1 days   17 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 23 23:40:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 23 Mar 2022 23:40:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294097.499902 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXAaL-00044T-ER; Wed, 23 Mar 2022 23:40:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294097.499902; Wed, 23 Mar 2022 23:40:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXAaL-00044M-Ai; Wed, 23 Mar 2022 23:40:13 +0000
Received: by outflank-mailman (input) for mailman id 294097;
 Wed, 23 Mar 2022 23:40:11 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXAaJ-00044A-Gl; Wed, 23 Mar 2022 23:40:11 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXAaJ-0008F7-Ee; Wed, 23 Mar 2022 23:40:11 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXAaI-0006yX-VY; Wed, 23 Mar 2022 23:40:11 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXAaI-0005cC-V5; Wed, 23 Mar 2022 23:40:10 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=TBp/zJr+Y+gpfvwpHzEhmgiwMJ+o1ibj3wJxi0s33nA=; b=Eh5WNxJ7W6sf8FFeHEuPrwroMW
	ob++nCOGTDGwT1R1dZ0OEUCLBxlvo6Ru6B0anqRtM4+gSn3K3Qh9Z2yrY9W/E6uEAU8Vf5mc8ie3E
	TOBFmV5mBONEgehbkJoqXfCQLeinglj/IT4g9lT/dBuTqRVqDk7CYIez/XZfrqhfftj0=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168813-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168813: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 23 Mar 2022 23:40:10 +0000

flight 168813 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168813/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   23 days
Failing since        168258  2022-03-01 01:55:31 Z   22 days  237 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    1 days   18 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 01:42:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 01:42:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294106.499913 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXCUb-0005FN-15; Thu, 24 Mar 2022 01:42:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294106.499913; Thu, 24 Mar 2022 01:42:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXCUa-0005Ew-QV; Thu, 24 Mar 2022 01:42:24 +0000
Received: by outflank-mailman (input) for mailman id 294106;
 Thu, 24 Mar 2022 01:42:23 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=cmcs=UD=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nXCUZ-0005Eq-6F
 for xen-devel@lists.xen.org; Thu, 24 Mar 2022 01:42:23 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org
 [2604:1380:4641:c500::1])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a4825c34-ab13-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 02:42:20 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id E2B116194F;
 Thu, 24 Mar 2022 01:42:18 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id E848EC340E8;
 Thu, 24 Mar 2022 01:42:17 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a4825c34-ab13-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1648086138;
	bh=/SZaU4HqBGJJ3osh2aDi5ok4Cwjkcm8i0TKyIL0r0Wg=;
	h=Date:From:To:cc:Subject:From;
	b=Pqw+nuZ7NqieohnTrmgk1hor/3eua+YrMq9Oehikk/SA0YmUH6affzEE8SJg6nplI
	 MLnwT5nxtT0qXh84EVkPQ5eC5r/NM5DcFozeq63GUFuBcFlOETFpZXzI4kED8U/xTX
	 vg0c7yZ3yOHqNz0CnGXGtYVK15ATFy/z8uoAqKRGrWafLeRrYPWux0jV7MUE29z7zS
	 GLbQ/0mcrlQSvOHCX1bUMVwMpiUC9MVeLCAtnfc9ltjw8Hj5qeqC+Q9zkHiXlMKAUv
	 FdQGCM46bYiIQkt3sL5pIBKtnuRThoJVw7NX0Jaj5/cAd7X4znPf/9KboFeFoj8eUt
	 GcbPkXWA8QzSg==
Date: Wed, 23 Mar 2022 18:42:17 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: alex.bennee@linaro.org
cc: xen-devel@lists.xen.org, Stratos-dev@op-lists.linaro.org, 
    viresh.kumar@linaro.org, mathieu.poirier@linaro.com, 
    christopher.w.clark@gmail.com, jgross@suse.com, boris.ostrovsky@oracle.com
Subject: Re: Understanding osdep_xenforeignmemory_map mmap behaviour
Message-ID: <alpine.DEB.2.22.394.2203231838130.2910984@ubuntu-linux-20-04-desktop>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

I am pretty sure the reasons have to do with old x86 PV guests, so I am
CCing Juergen and Boris.


> Hi,
> 
> While we've been working on the rust-vmm virtio backends on Xen we
> obviously have to map guest memory info the userspace of the daemon.
> However following the logic of what is going on is a little confusing.
> For example in the Linux backend we have this:
> 
>   void *osdep_xenforeignmemory_map(xenforeignmemory_handle *fmem,
>                                    uint32_t dom, void *addr,
>                                    int prot, int flags, size_t num,
>                                    const xen_pfn_t arr[/*num*/], int err[/*num*/])
>   {
>       int fd = fmem->fd;
>       privcmd_mmapbatch_v2_t ioctlx;
>       size_t i;
>       int rc;
> 
>       addr = mmap(addr, num << XC_PAGE_SHIFT, prot, flags | MAP_SHARED,
>                   fd, 0);
>       if ( addr == MAP_FAILED )
>           return NULL;
> 
>       ioctlx.num = num;
>       ioctlx.dom = dom;
>       ioctlx.addr = (unsigned long)addr;
>       ioctlx.arr = arr;
>       ioctlx.err = err;
> 
>       rc = ioctl(fd, IOCTL_PRIVCMD_MMAPBATCH_V2, &ioctlx);
> 
> Where the fd passed down is associated with the /dev/xen/privcmd device
> for issuing hypercalls on userspaces behalf. What is confusing is why
> the function does it's own mmap - one would assume the passed addr would
> be associated with a anonymous or file backed mmap region already that
> the calling code has setup. Applying a mmap to a special device seems a
> little odd.
> 
> Looking at the implementation on the kernel side it seems the mmap
> handler only sets a few flags:
> 
>   static int privcmd_mmap(struct file *file, struct vm_area_struct *vma)
>   {
>           /* DONTCOPY is essential for Xen because copy_page_range doesn't know
>            * how to recreate these mappings */
>           vma->vm_flags |= VM_IO | VM_PFNMAP | VM_DONTCOPY |
>                            VM_DONTEXPAND | VM_DONTDUMP;
>           vma->vm_ops = &privcmd_vm_ops;
>           vma->vm_private_data = NULL;
> 
>           return 0;
>   }
> 
> So can I confirm that the mmap of /dev/xen/privcmd is being called for
> side effects? Is it so when the actual ioctl is called the correct flags
> are set of the pages associated with the user space virtual address
> range?
> 
> Can I confirm there shouldn't be any limitation on where and how the
> userspace virtual address space is setup for the mapping in the guest
> memory?
> 
> Is there a reason why this isn't done in the ioctl path itself?
> 
> I'm trying to understand the differences between Xen and KVM in the API
> choices here. I think the equivalent is the KVM_SET_USER_MEMORY_REGION
> ioctl for KVM which brings a section of the guest physical address space
> into the userspaces vaddr range.


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 02:05:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 02:05:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294109.499924 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXCqk-00080j-O0; Thu, 24 Mar 2022 02:05:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294109.499924; Thu, 24 Mar 2022 02:05:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXCqk-00080c-Kn; Thu, 24 Mar 2022 02:05:18 +0000
Received: by outflank-mailman (input) for mailman id 294109;
 Thu, 24 Mar 2022 02:05:17 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=cmcs=UD=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nXCqj-00080W-CT
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 02:05:17 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id d809a6b2-ab16-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 03:05:15 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id D6F3161967;
 Thu, 24 Mar 2022 02:05:13 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 02165C340E8;
 Thu, 24 Mar 2022 02:05:12 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d809a6b2-ab16-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1648087513;
	bh=KVc+ubNjm8f2ZVAZK8tx9w9HV9EOwLrmeP4DuM0rAOo=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=dLZKWNN3f3WSW4SkjmxFC+sCrB+NBKMwoBPY5Rf2aLuzv+c+Z1maY1xyBUGiqdX7Z
	 N0yv2cvUtrfgbJIhLBSH1W4G14yPFlzP8l2Al3ldK2egWshvOH/+NuefGQGB8h+F9p
	 lFjJooUM1s+iuAkrdBWmekJ4TZV8kbsC5FewujNqleOVcnGSU9rNby2UnPgGLKbJNG
	 1xYF+wxPUNx82PD7HV+LF8AjRCS4SvMCdX/Gqw9oVzr95oMZz5uppENj0a+bzl+AVk
	 Jjr639QcutaNbD5S2L5eJ+UZxtjl1OE/av6ng/Ot353QaOjIfBlI2D6kI31/6sS4NA
	 IfNAfaSuLyPnA==
Date: Wed, 23 Mar 2022 19:05:12 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Bertrand Marquis <Bertrand.Marquis@arm.com>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, 
    "julien@xen.org" <julien@xen.org>, 
    "Volodymyr_Babchuk@epam.com" <Volodymyr_Babchuk@epam.com>, 
    Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: Re: [PATCH v2] xen/arm: set CPSR Z bit when creating aarch32
 guests
In-Reply-To: <E2220831-D72C-423C-A33F-453C8E851B8D@arm.com>
Message-ID: <alpine.DEB.2.22.394.2203231844240.2910984@ubuntu-linux-20-04-desktop>
References: <20220322202825.418232-1-sstabellini@kernel.org> <E2220831-D72C-423C-A33F-453C8E851B8D@arm.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Wed, 23 Mar 2022, Bertrand Marquis wrote:
> > On 22 Mar 2022, at 21:28, Stefano Stabellini <sstabellini@kernel.org> wrote:
> > 
> > From: Stefano Stabellini <stefano.stabellini@xilinx.com>
> > 
> > The first 32 bytes of zImage are NOPs. When CONFIG_EFI is enabled in the
> > kernel, certain versions of Linux will use an UNPREDICATABLE NOP
> > encoding, sometimes resulting in an unbootable kernel. Whether the
> > resulting kernel is bootable or not depends on the processor. See commit
> > a92882a4d270 in the Linux kernel for all the details.
> > 
> > All kernel releases starting from Linux 4.9 without commit a92882a4d270
> > are affected.
> 
> Can you confirm if those kernels are also affected when started natively ?

Theoretically yes, but in practice only booting on Xen is affected
because:

- the issue cannot happen when booting from u-boot because u-boot sets
  the "Z" bit
- the issue cannot happen when booting with QEMU -kernel because it also
  sets "Z"
- older bootloaders on native skip the first 32 bytes of the start
  address, which also masks this problem

Thus, in practice, I have no idea how one could reproduce the problem on
native.

This info is in the commit message a92882a4d270 on Linux and in-code
comments in the kernel.

 
> > Fortunately there is a simple workaround: setting the "Z" bit in CPSR
> > make it so those invalid NOP instructions are never executed. That is
> > because the instruction is conditional (not equal). So, on QEMU at
> > least, the instruction will end up to be ignored and not generate an
> > exception. Setting the "Z" bit makes those kernel versions bootable
> > again and it is harmless in the other cases.
> 
> I agree with Jan here. This will never be set or should not be expected
> to be set by anyone when started.
> It feels to me that we are introducing an ack for a temporary issue in
> Linux which will makes us derive from the behaviour that could be
> expected on native hardware.
> 
> Could you give more details on how blocking this is ? 

Without this change, none of the Debian arm32 kernels boot on Xen after
Jessie (on QEMU).


> Is the kernel update with the fix available on any of the affected distributions ?

None that I could find. I tried Debian Buster, Debian Bullseye, Debian
testing and the latest Alpine Linux. Happy to try more if you give me a
download link or two.


> Depending on the answers I think we could for example have a config around
> this to flag it as workaround for a specific guest issue so that this is only
> activated when needed.

Also note that this alternative workaround also solves the problem,
however it has other drawbacks as Julien described:
[1] https://marc.info/?l=xen-devel&m=164774063802402


My take on this is the following. PSR_GUEST32_INIT is not part of the
ABI so this cannot be considered an ABI change.

But in any case, given that without this change (or another change [1])
most of the kernels out there don't work, is there a point in discussing
ABI breakages? Basically nothing works right now :-D

I think it makes sense to think whether this change could cause a kernel
that used to boot, not to boot anymore. However, I don't think is
possible because:

- we only support zImage on arm32 and "Z" works well with it
- both u-boot and qemu -kernel set "Z" so we would already now if
  something broke



> > Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
> > ---
> > Changes in v2:
> > - improve commit message
> > - add in-code comment
> > - move PSR_Z to the beginning
> > ---
> > xen/include/public/arch-arm.h | 8 +++++++-
> > 1 file changed, 7 insertions(+), 1 deletion(-)
> > 
> > diff --git a/xen/include/public/arch-arm.h b/xen/include/public/arch-arm.h
> > index 94b31511dd..81cee95f14 100644
> > --- a/xen/include/public/arch-arm.h
> > +++ b/xen/include/public/arch-arm.h
> > @@ -361,6 +361,7 @@ typedef uint64_t xen_callback_t;
> > #define PSR_DBG_MASK    (1<<9)        /* arm64: Debug Exception mask */
> > #define PSR_IT_MASK     (0x0600fc00)  /* Thumb If-Then Mask */
> > #define PSR_JAZELLE     (1<<24)       /* Jazelle Mode */
> > +#define PSR_Z           (1<<30)       /* Zero condition flag */
> > 
> > /* 32 bit modes */
> > #define PSR_MODE_USR 0x10
> > @@ -383,7 +384,12 @@ typedef uint64_t xen_callback_t;
> > #define PSR_MODE_EL1t 0x04
> > #define PSR_MODE_EL0t 0x00
> > 
> > -#define PSR_GUEST32_INIT  (PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MODE_SVC)
> > +/*
> > + * We set PSR_Z to be able to boot Linux kernel versions with an invalid
> > + * encoding of the first 8 NOP instructions. See commit a92882a4d270 in
> > + * Linux.
> > + */
> > +#define PSR_GUEST32_INIT  (PSR_Z|PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MODE_SVC)
> > #define PSR_GUEST64_INIT (PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MODE_EL1h)
> > 
> > #define SCTLR_GUEST_INIT    xen_mk_ullong(0x00c50078)
> > -- 
> > 2.25.1
> > 
> 


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 03:15:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 03:15:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294116.499935 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXDwR-0006hb-UD; Thu, 24 Mar 2022 03:15:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294116.499935; Thu, 24 Mar 2022 03:15:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXDwR-0006hU-RF; Thu, 24 Mar 2022 03:15:15 +0000
Received: by outflank-mailman (input) for mailman id 294116;
 Thu, 24 Mar 2022 03:15:14 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXDwQ-0006hK-4J; Thu, 24 Mar 2022 03:15:14 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXDwQ-0001Ih-0D; Thu, 24 Mar 2022 03:15:14 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXDwP-0000xC-FO; Thu, 24 Mar 2022 03:15:13 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXDwP-0000tB-Ex; Thu, 24 Mar 2022 03:15:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Nwyyps2pL8ZRo6bQykJNnHyGPiUvsaTq10i0Xdkdzds=; b=s50SvLsq+uO5lI7aLE0cpxLuSa
	qxn822rlY5EsfKbNSxzl8pBkn+wzvAn/JXl452wqTTydsxXQk8Y8NtIEVusT67nmWfUWcZhL+nG1h
	ticL04uwGdWkSQ5NBDTl3vm3SS8R1gHYVE/nbnRH4Fg/D6dRDNpbtn9Nc45A9HJfF4OA=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168807-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168807: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=1bc191051dca28fa6d20fd1dc34a1903e7d4fb62
X-Osstest-Versions-That:
    linux=6b1f86f8e9c7f9de7ca1cb987b2cf25e99b1ae3a
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 24 Mar 2022 03:15:13 +0000

flight 168807 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168807/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168797
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168797
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168797
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168797
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168797
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168797
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168797
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168797
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                1bc191051dca28fa6d20fd1dc34a1903e7d4fb62
baseline version:
 linux                6b1f86f8e9c7f9de7ca1cb987b2cf25e99b1ae3a

Last test of basis   168797  2022-03-23 04:23:50 Z    0 days
Testing same since   168807  2022-03-23 19:39:56 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andre Kalb <andre.kalb@sma.de>
  Andy Shevchenko <andriy.shevchenko@linux.intel.com>
  Beau Belgrave <beaub@linux.microsoft.com>
  Christophe Leroy <christophe.leroy@csgroup.eu>
  Daniel Bristot de Oliveira <bristot@kernel.org>
  Herbert Xu <herbert@gondor.apana.org.au>
  Jiapeng Chong <jiapeng.chong@linux.alibaba.com>
  John Ogness <john.ogness@linutronix.de>
  Linus Torvalds <torvalds@linux-foundation.org>
  Marc Zyngier <maz@kernel.org>
  Masami Hiramatsu <mhiramat@kernel.org>
  Mukesh Ojha <quic_mojha@quicinc.com>
  Petr Mladek <pmladek@suse.com>
  Randy Dunlap <rdunlap@infradead.org>
  Ritesh Harjani <riteshh@linux.ibm.com>
  Sakari Ailus <sakari.ailus@linux.intel.com>
  Stephen Brennan <stephen.s.brennan@oracle.com>
  Steven Rostedt (Google) <rostedt@goodmis.org>
  Sven Schnelle <svens@linux.ibm.com>
  Tom Zanussi <zanussi@kernel.org>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   6b1f86f8e9c7f..1bc191051dca2  1bc191051dca28fa6d20fd1dc34a1903e7d4fb62 -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 03:24:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 03:24:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294123.499946 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXE5B-0008C6-QI; Thu, 24 Mar 2022 03:24:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294123.499946; Thu, 24 Mar 2022 03:24:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXE5B-0008Bz-NK; Thu, 24 Mar 2022 03:24:17 +0000
Received: by outflank-mailman (input) for mailman id 294123;
 Thu, 24 Mar 2022 03:24:16 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXE5A-0008BW-Ss; Thu, 24 Mar 2022 03:24:16 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXE5A-0001QG-OX; Thu, 24 Mar 2022 03:24:16 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXE5A-0001IK-Hl; Thu, 24 Mar 2022 03:24:16 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXE5A-0007pu-HH; Thu, 24 Mar 2022 03:24:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=FoLXbdwk9RsuXc+nP5JBWZ1TzqmZ5b/VPDD/GF/PqIs=; b=GT2sMpFP/2ZT/HNXNbvTUJvjHi
	+661CH7GLtzavFDjUMMEdJ8Q21SwkA3EOp1L07DaJE6f5tudnfVv6FgRmVZfErzYyIKMrUt6nwKgM
	W86Q2R73zRKu5gHdckJTtxeDbbnJ7aSmxJNK9zqIJewc/8zJcaqMzUHNwOSnsrqtkSdU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168814-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168814: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 24 Mar 2022 03:24:16 +0000

flight 168814 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168814/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   23 days
Failing since        168258  2022-03-01 01:55:31 Z   23 days  238 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    1 days   19 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 04:37:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 04:37:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294140.499961 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXFDb-000723-2I; Thu, 24 Mar 2022 04:37:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294140.499961; Thu, 24 Mar 2022 04:37:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXFDa-00071w-VT; Thu, 24 Mar 2022 04:37:02 +0000
Received: by outflank-mailman (input) for mailman id 294140;
 Thu, 24 Mar 2022 04:37:01 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXFDZ-00071m-Nb; Thu, 24 Mar 2022 04:37:01 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXFDZ-0002n4-Lp; Thu, 24 Mar 2022 04:37:01 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXFDZ-0004KM-86; Thu, 24 Mar 2022 04:37:01 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXFDZ-0005Bm-7h; Thu, 24 Mar 2022 04:37:01 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=yHydzGP3IpP1hbb24rqf/XPxs+GiRW6TsGFkULtAZU8=; b=P6sWNsJ21s2IYSJiU4RvRhsrC9
	9KJiJKyaz09JFHQ3UkjdX0DJVV+LwrdMsSGZ5wyJ3+Y4H1YBpOy0VZO0wDh2gae0QqQvJcUz6Dj3w
	vbGeTNlP6tBmbA+RkWoxAXnluaSH0sP4NKOvW0wcVlXRINe/AcKcsWsa7rQ0SOPh1ZPo=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168817-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168817: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 24 Mar 2022 04:37:01 +0000

flight 168817 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168817/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   23 days
Failing since        168258  2022-03-01 01:55:31 Z   23 days  239 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    1 days   20 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 05:12:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 05:12:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294148.499971 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXFlZ-00034o-Ka; Thu, 24 Mar 2022 05:12:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294148.499971; Thu, 24 Mar 2022 05:12:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXFlZ-00034h-HD; Thu, 24 Mar 2022 05:12:09 +0000
Received: by outflank-mailman (input) for mailman id 294148;
 Thu, 24 Mar 2022 05:12:08 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+IHq=UD=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXFlY-00034b-0U
 for xen-devel@lists.xen.org; Thu, 24 Mar 2022 05:12:08 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f2f87bb0-ab30-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 06:12:06 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 21DBC210EB;
 Thu, 24 Mar 2022 05:12:06 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id D0DB513A66;
 Thu, 24 Mar 2022 05:12:05 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id cqjmMKX9O2KSfwAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 24 Mar 2022 05:12:05 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f2f87bb0-ab30-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648098726; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=c8IZXwI1yS4Fh3MiwvEuqX2MGeUL0iRrW8f0q8SlDPw=;
	b=E0anDJgpO9Og7QMI+1rvB3DNWd1PjaIODbiLJVEEUKEMYsn2kfOQoPJyWLYinS8D18spg0
	kcIv23vuuLFvt9HPSKDW/d+4xD9Phfnyda9W6iasimw0NYqAF6m7Jj8PkinNOddoRDIAt+
	DxPyMvCQTqR/rP89MfeawBR91D3Zyzk=
Message-ID: <57549560-879d-f705-8693-9bfdc73e3f7f@suse.com>
Date: Thu, 24 Mar 2022 06:12:05 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: Stefano Stabellini <sstabellini@kernel.org>, alex.bennee@linaro.org
Cc: xen-devel@lists.xen.org, Stratos-dev@op-lists.linaro.org,
 viresh.kumar@linaro.org, mathieu.poirier@linaro.com,
 christopher.w.clark@gmail.com, boris.ostrovsky@oracle.com
References: <alpine.DEB.2.22.394.2203231838130.2910984@ubuntu-linux-20-04-desktop>
From: Juergen Gross <jgross@suse.com>
Subject: Re: Understanding osdep_xenforeignmemory_map mmap behaviour
In-Reply-To: <alpine.DEB.2.22.394.2203231838130.2910984@ubuntu-linux-20-04-desktop>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------0n6VuV0UyryJFCIuDFZIVaJI"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------0n6VuV0UyryJFCIuDFZIVaJI
Content-Type: multipart/mixed; boundary="------------SGwZ0ePbgTKsZgHH1O6IIkBv";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Stefano Stabellini <sstabellini@kernel.org>, alex.bennee@linaro.org
Cc: xen-devel@lists.xen.org, Stratos-dev@op-lists.linaro.org,
 viresh.kumar@linaro.org, mathieu.poirier@linaro.com,
 christopher.w.clark@gmail.com, boris.ostrovsky@oracle.com
Message-ID: <57549560-879d-f705-8693-9bfdc73e3f7f@suse.com>
Subject: Re: Understanding osdep_xenforeignmemory_map mmap behaviour
References: <alpine.DEB.2.22.394.2203231838130.2910984@ubuntu-linux-20-04-desktop>
In-Reply-To: <alpine.DEB.2.22.394.2203231838130.2910984@ubuntu-linux-20-04-desktop>

--------------SGwZ0ePbgTKsZgHH1O6IIkBv
Content-Type: multipart/mixed; boundary="------------CID3Fb0de7Kc0u5yOxhc00g1"

--------------CID3Fb0de7Kc0u5yOxhc00g1
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------CID3Fb0de7Kc0u5yOxhc00g1
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------CID3Fb0de7Kc0u5yOxhc00g1--

--------------SGwZ0ePbgTKsZgHH1O6IIkBv--

--------------0n6VuV0UyryJFCIuDFZIVaJI
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmI7/aUFAwAAAAAACgkQsN6d1ii/Ey/S
Fwf+PP0QKriFGEQ3Wo/t6GQBZcCJVXJVd+ml+uUdZPIQ8ucKpaeiuQ4hqqqYIjBuPIs+g0YwMII4
gYnjjlQeqdAXIuZI8eXgNTMT8eLn7k8vipC5hjHew74MWFyL0hNd1BfZJn5OhaL4hoxJYOQX74ZF
ZXd7dYkmqszN1jZEtCXOeEJ/NFkQCgqSYY1m2Yd5oNPlU15ct664k+qY5G+9zbORJIY8LKMRNhbL
AA2aCtHzVyXQuMbAkgM7L8XQoCbqDwx3eHj30tVanTR+ZhZdpWV/AcfWFJ+7f+n5vNJdFZ3CqhUY
+q0XRv473QIGczIPF/8VbqYAZQxOpXeFKD5mZ52n1A==
=f68j
-----END PGP SIGNATURE-----

--------------0n6VuV0UyryJFCIuDFZIVaJI--


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 05:12:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 05:12:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294011.499983 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXFlv-0003Ul-TH; Thu, 24 Mar 2022 05:12:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294011.499983; Thu, 24 Mar 2022 05:12:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXFlv-0003Uc-Q6; Thu, 24 Mar 2022 05:12:31 +0000
Received: by outflank-mailman (input) for mailman id 294011;
 Wed, 23 Mar 2022 17:30:42 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=cV1o=UC=oracle.com=mark.kanda@srs-se1.protection.inumbo.net>)
 id 1nX4oi-0002ak-WB
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 17:30:42 +0000
Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com
 [205.220.165.32]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f408d309-aace-11ec-a405-831a346695d4;
 Wed, 23 Mar 2022 18:30:38 +0100 (CET)
Received: from pps.filterd (m0246627.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 22NFK6pe016333; 
 Wed, 23 Mar 2022 17:30:14 GMT
Received: from userp3030.oracle.com (userp3030.oracle.com [156.151.31.80] (may
 be forged)) by mx0b-00069f02.pphosted.com with ESMTP id 3ew5s0t989-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Wed, 23 Mar 2022 17:30:13 +0000
Received: from pps.filterd (userp3030.oracle.com [127.0.0.1])
 by userp3030.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 22NHHl2i045406;
 Wed, 23 Mar 2022 17:30:12 GMT
Received: from nam04-dm6-obe.outbound.protection.outlook.com
 (mail-dm6nam08lp2043.outbound.protection.outlook.com [104.47.73.43])
 by userp3030.oracle.com with ESMTP id 3ew49raha1-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Wed, 23 Mar 2022 17:30:12 +0000
Received: from SA1PR10MB5841.namprd10.prod.outlook.com (2603:10b6:806:22b::16)
 by SA2PR10MB4809.namprd10.prod.outlook.com (2603:10b6:806:113::7)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.15; Wed, 23 Mar
 2022 17:30:10 +0000
Received: from SA1PR10MB5841.namprd10.prod.outlook.com
 ([fe80::85a0:903e:852d:6c15]) by SA1PR10MB5841.namprd10.prod.outlook.com
 ([fe80::85a0:903e:852d:6c15%5]) with mapi id 15.20.5081.018; Wed, 23 Mar 2022
 17:30:10 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f408d309-aace-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=wKI/gJwiIO07G6Bm4xdEtvjsCv0j2LG8UMWtAshBcSc=;
 b=ViRabcSImIj1feG4XGLBqtiJ/FGBDdIN630z/0+n+/0jAFSSk93WY6dBQn6ESxkV8hpz
 fXx2hGGH/5jgz8UTudU8Asp5kXIppvP3vzV/LNyj3lvINLnh/zWEs+XzbK/CgOasnONO
 aWWbzyJ3EmqHSflZnHKLn6zRag9dcUbnbAAoO36ZI3j2IFyAiZhXgCJURsdshuYC8ljN
 9PQ6Oopk893pnNNItVjUxi+Diat/DkInH0jNIbzqz7Dxt5l2nN7/e22PoGxeM8CZLBjz
 jtAXJEv2nXdl6q7wPQ1JGrp5Kz6oyFoBrN+elX6jPSny086khuQdxWDn7AgP1BbKLma2 ug== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=iKyC4FFred0W4aOyj/U8CVeDnj4+mD+0gufY1PPlvqfZcaWgmVx9tf7nb+YsKjR7WNIej9k6UtXOSWi4R2fhKi12+lXuJ5iBRMQKeqBFnwvZo1mPu6cfaUGgs+N7IJ1VKi5UQqadNGIvvjco4p6DlABv9NCE4o0F0SeiLWS7Zg9bxqrN+Rj0N7VW9jhSS0gZf1QmiP8h6XArfWf5M0qFvsY0h/zBHXgCFJy+EEMee2hQfsv/ZoqAtFHBQBPHHdQlKCWl9T3h/LbYJ6VtMtpUszVmFd3NEbfDxT9ujfh2q6iycPqG2uG9Ds0ojRsnj7hcCtpDxOMn8o91Q3zVR0NVQA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=wKI/gJwiIO07G6Bm4xdEtvjsCv0j2LG8UMWtAshBcSc=;
 b=e+1abBfcWzmpdVh7si2q8UlNP3ugmiJR51o1d8XyD7D5s8xgKHQUClmpmDXnSnCdtBM+7WFGzldGDcBjG7Ccy7sfMxV7nCB6uaoYGCoxiACaAM2u3F1GCb5bnp8VbykVEnBc4FbAZu/OioNM0rt/Urc1HRzlVnFH32RhIWHCWb7H6nMr/IpzgemnECS69R1ST63XWOWOV6XYpgPVlWgWvMd2Ih3WrRh4IgZeJ3AnTYfhxc/ilSaDQoC6cd9Fp36KPKwuLcuooNYPJnKrh/Y3ofqfoECVparA+q3FlcpM25IX5iPxX313+rsEcmRsDp02Gl8Ip2uB3X+IMq9gumvt8Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=wKI/gJwiIO07G6Bm4xdEtvjsCv0j2LG8UMWtAshBcSc=;
 b=pqDoYFgOu1iGm+0HZU3BbA6MxgTwJJPCR/P08hrTmg+G4TtaOzxgbliu7zr8sznPxm8+yInAbdHMuT/5wBzHZtr2yL/Ca5ryOTO1bSePULiPxoHebE+jsasPj8gHOclq+pKrDLRTc9fcY2xu6MvDIVP1MyEHJMCbm0w803W+qj0=
Message-ID: <9a59a719-7e33-ada7-a8a6-1631df1759ae@oracle.com>
Date: Wed, 23 Mar 2022 12:30:03 -0500
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v4 12/13] softmmu/cpus: Free cpu->thread in
 generic_destroy_vcpu_thread()
Content-Language: en-US
To: =?UTF-8?Q?Philippe_Mathieu-Daud=c3=a9?=
 <philippe.mathieu.daude@gmail.com>,
        qemu-devel@nongnu.org
Cc: Wenchao Wang <wenchao.wang@intel.com>,
        Laurent Vivier
 <lvivier@redhat.com>,
        David Hildenbrand <david@redhat.com>,
        Yanan Wang <wangyanan55@huawei.com>,
        Cameron Esfahani <dirty@apple.com>,
        Marcelo Tosatti <mtosatti@redhat.com>,
        Sunil Muthuswamy <sunilmut@microsoft.com>,
        Anthony Perard <anthony.perard@citrix.com>, haxm-team@intel.com,
        Paul Durrant <paul@xen.org>,
        Richard Henderson
 <richard.henderson@linaro.org>,
        xen-devel@lists.xenproject.org,
        =?UTF-8?Q?Philippe_Mathieu-Daud=c3=a9?= <f4bug@amsat.org>,
        Roman Bolshakov <r.bolshakov@yadro.com>,
        Reinoud Zandijk
 <reinoud@netbsd.org>,
        Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
        Kamil Rytarowski <kamil@netbsd.org>,
        Paolo Bonzini <pbonzini@redhat.com>, Peter Xu <peterx@redhat.com>,
        Eduardo Habkost <eduardo@habkost.net>,
        Stefano Stabellini <sstabellini@kernel.org>,
        Thomas Huth <thuth@redhat.com>, Colin Xu <colin.xu@intel.com>
References: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
 <20220323171751.78612-13-philippe.mathieu.daude@gmail.com>
From: Mark Kanda <mark.kanda@oracle.com>
In-Reply-To: <20220323171751.78612-13-philippe.mathieu.daude@gmail.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: SA9PR11CA0010.namprd11.prod.outlook.com
 (2603:10b6:806:6e::15) To SA1PR10MB5841.namprd10.prod.outlook.com
 (2603:10b6:806:22b::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 61367cd9-6dde-4aa0-1a19-08da0cf2c7fb
X-MS-TrafficTypeDiagnostic: SA2PR10MB4809:EE_
X-Microsoft-Antispam-PRVS: 
	<SA2PR10MB4809F113F3255278300F8E0FF9189@SA2PR10MB4809.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SA1PR10MB5841.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6506007)(6666004)(6512007)(44832011)(6486002)(86362001)(31686004)(31696002)(508600001)(26005)(2616005)(186003)(83380400001)(53546011)(36756003)(54906003)(7416002)(5660300002)(38100700002)(316002)(66476007)(2906002)(66946007)(8676002)(8936002)(66556008)(4326008)(41533002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?MjB3NWJxR0J1ejVycml2ZmZKTXg1NmFDR1RXVHdJNjQ1b2V6UTNXaW9Wb3hQ?=
 =?utf-8?B?VTVUOTlKc0F2SHVtUWR2eXRXRFozRUxlRG1aYVhzK2svWExLNXpMY3ZVazUy?=
 =?utf-8?B?VGhURXBXc21iOWNIWEpPREl4MXEzOFJndmVKRytKaisvRjdYTnluSWZNNGor?=
 =?utf-8?B?YmNkaFJBb0JyRmxlTmtqVkdNQVh0d0ZZdGtteGxnMmNUTU8rbktkSm0yZVZF?=
 =?utf-8?B?cE9tL21YMktIbGkrdHAzbllUcFU3QkJNWU10UjJnV3l5Q0cycU5ITXhjRVdm?=
 =?utf-8?B?RFNJWjQvWTdrRHh2Y2VVTHBvMlBrNjJ4ZG93N0NNeDIrbjErT2tsQ3IzNWVH?=
 =?utf-8?B?TFMzWW9XN3REV1VYYTUxOUMrc0poZi8zbkdVYjhPYXNTVGVUcGhEWS9MT05V?=
 =?utf-8?B?dTZqK1ZOSzhLK1RPWSs4TC85dTVqY2s5UkFIS1M2Q1Jlb3ljaEZwV0lFOVlo?=
 =?utf-8?B?eEh2bGVkZFFNQ3BvV2FyLzNPZWdPM2NZWHl1SzBoNkE5aHBPd3Uzc3Zpb1VZ?=
 =?utf-8?B?QzlabHBVaFAvMzdTUVFNZURaaU5oWThoR1FrQVlBSTVHOEU5LzBlbHE4dHcz?=
 =?utf-8?B?NGZYQy9wa3hMOG02djFWamNWMGlROWtJWHlOYmkwb2RXbnVQS1JKNCs5Z2xJ?=
 =?utf-8?B?OTBkUFRrNFBKZEs3Y3NIaWZmU2JLcUt0ckt6dTQzaHJCUDlrb0hoYjU5dytP?=
 =?utf-8?B?QW9RZlNtRUVFSE9qSXVFQlU5cUk5Q1ZPS3BERklxWS93Rlcxa2NqcUJKNEg1?=
 =?utf-8?B?eFlFN3UyNXlYQTVSclIrWlZ0Nkx6bFF3cUcrL0xjcEc5Uk12eC9sWE1vRUhv?=
 =?utf-8?B?cjNWUTBRbUsxRHcwNFd4SWVKa2FhVEhEMXZPSnhNSU5IalQzek5xVE56NTFt?=
 =?utf-8?B?RitOVDhDdWNGcmpaQm5waGtZRFBRVG53aTJVdjY1cU5tVWtCTm9mZjdORkpC?=
 =?utf-8?B?RmpHa0R3cDdxUjdtYWtWUkpMRGVDUUtiU0FwNncyODdFMzQrTWdtdXdsdWc2?=
 =?utf-8?B?Qm52Qm9tZkVHQkVsWFJPMGxiK3ZvUDZCTElQT2ZNcnhVOHZqMElsSGxmd2Jm?=
 =?utf-8?B?czJmWWlMVUtFdTZMVEhUQ2VxS0k3NnQvNEpyQ2NkV1ZUeFpKeE0zS2NKWE93?=
 =?utf-8?B?K3dmWFludVAzUzdIa3pyS0Fpb2ZQWmVwV2ZvY3F0ZllzT0JVMjl4dkpJMWk2?=
 =?utf-8?B?UXp3S3RNT3diaytYMWVuejIzNk9hanVMcUN4YjBRWFZJL0lIa0d5MHVOUC9p?=
 =?utf-8?B?R2pQVnZJOUJuQmpuM0NFd1hBY0c2K0NQbGtEZDdFZFEzYXJqd0hsMUtTSUcr?=
 =?utf-8?B?UVl3QTM5a0pWclZHd0pjL1FzN3R5V0NZeGpJaW5UcWR3ZUl1U3djaFRFSU50?=
 =?utf-8?B?dWRET1J0TXlnZ0ZUQm5iZG52SFI5UnlkZE9xNkRQQmVIN3QwQ1JPYTBtTVcw?=
 =?utf-8?B?dmZ5c1VRRUhvYVVDUzY5eTlSbmVQUXdpeW41UmZRQkdHdlgvcmJoZ0JsbVdE?=
 =?utf-8?B?KzZkNzNuWEo4dEVYSDFWck9vc2tFWUo0QjRrelpVcG8vRjdnNTkwYnBGRlE1?=
 =?utf-8?B?eEdzR1BiMVhOWmJQNSsvSDREM2VJcGIzVlZYd0dtL3lhRGtNSUt1VDlma3A0?=
 =?utf-8?B?ckNRS1NjZzYxNmkvMm9SUnF5VHk3R1BzUnU5ZUV4bzhvQWNIOE9kK0xYN2FW?=
 =?utf-8?B?aXVxOEttRHlzS1l1SVdlQlVFYXhuZlVtT0haZnNNcUdDMmZWR2JNek5ESlRU?=
 =?utf-8?B?RUYxL2ZPU3VXSmhKKzVMQmgxaWtuenY5aHN4anZZaG1EbDdXOXNZaWlGQzlm?=
 =?utf-8?B?NVZLYzhaVWZ4ZmQ4c09DSnRYbkR6RG9CbW1QV3A1Zm9xUEJBV2dHN2cwb2dy?=
 =?utf-8?B?TkR0OEhZS1A5aGorK1lrYk0xN0FsVkhsRHorQVU1Z1V3RitvL0xLVlZuZTgr?=
 =?utf-8?Q?jXZ3w+1lYOuCsykeotx2YJXZo07d7+P4?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 61367cd9-6dde-4aa0-1a19-08da0cf2c7fb
X-MS-Exchange-CrossTenant-AuthSource: SA1PR10MB5841.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Mar 2022 17:30:10.4962
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 9rxaJ2/9uTY0sXoaV4w9VswOCC4NnYIvm4T4jMryqK4C2NVfLytUXy6bOq17OseY5o4bhxQpGWD2JxbmPTC5FQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA2PR10MB4809
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10295 signatures=694973
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 adultscore=0 malwarescore=0 mlxscore=0
 bulkscore=0 phishscore=0 spamscore=0 mlxlogscore=999 suspectscore=0
 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2202240000
 definitions=main-2203230092
X-Proofpoint-GUID: LWMfiaG2Xb9Y9wIJHXs8TcMMHFKYMJgj
X-Proofpoint-ORIG-GUID: LWMfiaG2Xb9Y9wIJHXs8TcMMHFKYMJgj

Thanks Philippe,

In the patch subject, 'generic_destroy_vcpu_thread()' should be changed to 
'common_vcpu_thread_destroy()'.
Same goes for the next patch (Free cpu->halt_cond).

Thanks/regards,
-Mark

On 3/23/2022 12:17 PM, Philippe Mathieu-Daudé wrote:
> From: Mark Kanda <mark.kanda@oracle.com>
>
> Free cpu->thread in a new AccelOpsClass::destroy_vcpu_thread() handler
> generic_destroy_vcpu_thread().
>
> vCPU hotunplug related leak reported by Valgrind:
>
>    ==102631== 8 bytes in 1 blocks are definitely lost in loss record 1,037 of 8,555
>    ==102631==    at 0x4C3ADBB: calloc (vg_replace_malloc.c:1117)
>    ==102631==    by 0x69EE4CD: g_malloc0 (in /usr/lib64/libglib-2.0.so.0.5600.4)
>    ==102631==    by 0x92443A: kvm_start_vcpu_thread (kvm-accel-ops.c:68)
>    ==102631==    by 0x4505C2: qemu_init_vcpu (cpus.c:643)
>    ==102631==    by 0x76B4D1: x86_cpu_realizefn (cpu.c:6520)
>    ==102631==    by 0x9344A7: device_set_realized (qdev.c:531)
>    ==102631==    by 0x93E329: property_set_bool (object.c:2273)
>    ==102631==    by 0x93C2F8: object_property_set (object.c:1408)
>    ==102631==    by 0x940796: object_property_set_qobject (qom-qobject.c:28)
>    ==102631==    by 0x93C663: object_property_set_bool (object.c:1477)
>    ==102631==    by 0x933D3B: qdev_realize (qdev.c:333)
>    ==102631==    by 0x455EC4: qdev_device_add_from_qdict (qdev-monitor.c:713)
>
> Signed-off-by: Mark Kanda <mark.kanda@oracle.com>
> Message-Id: <20220321141409.3112932-3-mark.kanda@oracle.com>
> Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
> ---
>   softmmu/cpus.c | 1 +
>   1 file changed, 1 insertion(+)
>
> diff --git a/softmmu/cpus.c b/softmmu/cpus.c
> index 37325b3b8d..efa8397f04 100644
> --- a/softmmu/cpus.c
> +++ b/softmmu/cpus.c
> @@ -619,6 +619,7 @@ static void common_vcpu_thread_create(CPUState *cpu)
>   
>   static void common_vcpu_thread_destroy(CPUState *cpu)
>   {
> +    g_free(cpu->thread);
>   }
>   
>   void cpu_remove_sync(CPUState *cpu)



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 05:12:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 05:12:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294062.499988 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXFlw-0003Xl-8d; Thu, 24 Mar 2022 05:12:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294062.499988; Thu, 24 Mar 2022 05:12:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXFlw-0003Wg-1v; Thu, 24 Mar 2022 05:12:32 +0000
Received: by outflank-mailman (input) for mailman id 294062;
 Wed, 23 Mar 2022 19:15:12 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=cV1o=UC=oracle.com=mark.kanda@srs-se1.protection.inumbo.net>)
 id 1nX6Rr-0001qD-JS
 for xen-devel@lists.xenproject.org; Wed, 23 Mar 2022 19:15:12 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 8dafdeef-aadd-11ec-8fbc-03012f2f19d4;
 Wed, 23 Mar 2022 20:15:09 +0100 (CET)
Received: from pps.filterd (m0246631.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 22NHlABA004029; 
 Wed, 23 Mar 2022 19:14:48 GMT
Received: from aserp3020.oracle.com (aserp3020.oracle.com [141.146.126.70])
 by mx0b-00069f02.pphosted.com with ESMTP id 3ew5y22htd-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Wed, 23 Mar 2022 19:14:47 +0000
Received: from pps.filterd (aserp3020.oracle.com [127.0.0.1])
 by aserp3020.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 22NJCqh6022790;
 Wed, 23 Mar 2022 19:14:46 GMT
Received: from nam10-dm6-obe.outbound.protection.outlook.com
 (mail-dm6nam10lp2101.outbound.protection.outlook.com [104.47.58.101])
 by aserp3020.oracle.com with ESMTP id 3ew701pymq-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Wed, 23 Mar 2022 19:14:46 +0000
Received: from SA1PR10MB5841.namprd10.prod.outlook.com (2603:10b6:806:22b::16)
 by DM6PR10MB2844.namprd10.prod.outlook.com (2603:10b6:5:65::18) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Wed, 23 Mar
 2022 19:14:42 +0000
Received: from SA1PR10MB5841.namprd10.prod.outlook.com
 ([fe80::85a0:903e:852d:6c15]) by SA1PR10MB5841.namprd10.prod.outlook.com
 ([fe80::85a0:903e:852d:6c15%5]) with mapi id 15.20.5081.018; Wed, 23 Mar 2022
 19:14:42 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8dafdeef-aadd-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=k4LsBQm/8CG/kqiiX0Cl/adEd8+Ge8cskvfAqhu+hwo=;
 b=DlUHesHrYu25e8DS4v6V9ocjZeEKP5b0o2Dm7uC6QW+Nh5yNYvanTgF+8wPEYjsGAMlz
 GKIRqjkQfpApgtm+qRuJTMjVZoJs8TbI7P/vHHV9G5GrggZH3rz0rVjcaSAWxwqfzUQU
 GkBAZdfOSlZgEk9iC5BHQfjK1iGmKWvTCLINe6iFJxQNdgtSSlp81k5OGDLZjUK+U0hr
 kUzS15/YqwSJMcE/NRrK5OddQCFiB5jbkIG5JFJkEk2qVJofuhfqnkNPIiq0cFF9hsa/
 2vmB/l0QpzK5XsprLMKuteF1glV91uvACZOYP/NME+WD4qCDKkawZanrDHcIHrLLZTR1 Ug== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=NbMh5fSobTPiX1Qt3aYfVvL03iP2D2IhPNAbz44jg8QXJLwYw3idBTRBVET2A9s2chRRgIQoad6oaeQQQDcQhrsfQjUDEnqaQD+oz0HrqXLyTt/9zHpwLhNNaxX/H5Gh+8pNbBksi/A+pmUNh6dDkQvJaShfYbpcFtRu7TH3GcSVMrxNxuCcAp5qb3NBp/KpZotJKVoZOCNTrBYBK73avEC5Rx+7gLvEmwnvTMd8HPHPiWWW9U8Q2RQQ2f01LAfSC3Q/OSVwd/nk+Y16J7NjjP6X0diSZmWCR8hHg7KKcFkQ12HuqE6TseyppNFbCA65UPjbURx6v/bHwXzm+FmeHA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=k4LsBQm/8CG/kqiiX0Cl/adEd8+Ge8cskvfAqhu+hwo=;
 b=h8oDV/muitEuwif571WZcmyBjVMKMHuu60wd1awUQ98NJal7cYSPOEYNIwHTVY/N4I5FUc8HE/Por0ONG8JELp3cXgDosAadSdvkH3gnBfhOj8P9FdSX49cj3DCJgFrUTRdgxaiNtTbnUG/22kbuurkiogMzD5HckiG3WxNW9tAtchHZFNJkpl3vwnCuw/kaVHt+fvjKGx1Eor1SZ0PcI8fV+tLMRL8KwaYwaWah4nez36XDcIwpcdcHMNzHXP+9UCxYL5gVMrRSPzsZvAdMhPiEs9HlgnnOGNoNV2KRQqJCg2TQYlcrL+xmmliA3jmZJ0RuqSQZuUXwA1qwtMzr3Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=k4LsBQm/8CG/kqiiX0Cl/adEd8+Ge8cskvfAqhu+hwo=;
 b=PenXgNb22915caKQju5nKpH20Q1leYbVkTbGM5MVFDrpWC3cFsv3UgkQUcPP87i1VNhW+Ai+sbAukMPktBkdm8L3nCi1O/dX9gzbnAfdRC+Cb1Is/VlzgogsPyxYK9tworGUQZxBmyOjf7RPxAL2lwSgSNe9fA6zF3Pb5AQf4wQ=
Message-ID: <85ea473f-453e-4513-b4cf-4c8c7b7c2bde@oracle.com>
Date: Wed, 23 Mar 2022 14:14:36 -0500
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v4 01/13] cpu: Free cpu->cpu_ases in
 cpu_address_space_destroy()
Content-Language: en-US
To: =?UTF-8?Q?Philippe_Mathieu-Daud=c3=a9?=
 <philippe.mathieu.daude@gmail.com>,
        qemu-devel@nongnu.org
Cc: Wenchao Wang <wenchao.wang@intel.com>,
        Laurent Vivier
 <lvivier@redhat.com>,
        David Hildenbrand <david@redhat.com>,
        Yanan Wang <wangyanan55@huawei.com>,
        Cameron Esfahani <dirty@apple.com>,
        Marcelo Tosatti <mtosatti@redhat.com>,
        Sunil Muthuswamy <sunilmut@microsoft.com>,
        Anthony Perard <anthony.perard@citrix.com>, haxm-team@intel.com,
        Paul Durrant <paul@xen.org>,
        Richard Henderson
 <richard.henderson@linaro.org>,
        xen-devel@lists.xenproject.org,
        =?UTF-8?Q?Philippe_Mathieu-Daud=c3=a9?= <f4bug@amsat.org>,
        Roman Bolshakov <r.bolshakov@yadro.com>,
        Reinoud Zandijk
 <reinoud@netbsd.org>,
        Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
        Kamil Rytarowski <kamil@netbsd.org>,
        Paolo Bonzini <pbonzini@redhat.com>, Peter Xu <peterx@redhat.com>,
        Eduardo Habkost <eduardo@habkost.net>,
        Stefano Stabellini <sstabellini@kernel.org>,
        Thomas Huth <thuth@redhat.com>, Colin Xu <colin.xu@intel.com>
References: <20220323171751.78612-1-philippe.mathieu.daude@gmail.com>
 <20220323171751.78612-2-philippe.mathieu.daude@gmail.com>
 <06217ec6-bd2a-6fd1-b2ff-1704b073456f@gmail.com>
From: Mark Kanda <mark.kanda@oracle.com>
In-Reply-To: <06217ec6-bd2a-6fd1-b2ff-1704b073456f@gmail.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: SN1PR12CA0062.namprd12.prod.outlook.com
 (2603:10b6:802:20::33) To SA1PR10MB5841.namprd10.prod.outlook.com
 (2603:10b6:806:22b::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 8c5d2c83-1471-441a-4a9a-08da0d01620c
X-MS-TrafficTypeDiagnostic: DM6PR10MB2844:EE_
X-Microsoft-Antispam-PRVS: 
	<DM6PR10MB2844BB4AFF112D72DD51944FF9189@DM6PR10MB2844.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	dIb5atGQxvDsFxJYNjn9pvB4JpkQDnN+qN7gXHdGN+9Dhcr58iFlo7GkN7yv5s3D7C2gBB+Lze3hnPNnegzov8VJVRY/Qp9yigOdl2szlgFarudW+Zgi+NQupVgxRJfEvSvrXw8Hqga/wqsULQapNmN5K10t1MptDFmh1Q5HoXdXEkSqFfmxH6D8ru8X1f/wN4wjRa0ok7c3FlfMqlGeTb4gf1RTLJ6ReWeiT0sEzz/xwo+GEUE2vqv9V+wunMnKHvsW80ZaLySmpQsNK7yB4L8V+jZTLN4DKUAtpv9sJTaJk0bfqiOqClS51yGVbrjlxEtwCmwoZIlYqrhjLb91BwDTLyQygxlfQozN1fBejOOEVup1mJ977wBIVf0jQzthBkdY/gm9p8YN8t+ObQ/Oiz5iQvWywymMik3ffnuogwKL85wLT6ZbvmsIIBrs31RTF+xxTSL1f9NbnzjICiKi0/P9AJrA3S+bVn83nP5ssYiR7dBy+RKOgJ+xdijX7TRg8Wbu7oLFwC0vAN8KfVs57uWNX3nADulfFQ3ykVPDFpQtRAKQtgMrZa08pLJurt15eFtF9siAoLgcKIqWxlnLttf/ZVbHP+QExJomb3DhRkn5yReceBWm2FrGY6RNkquoRU9krFLGTnQV3iYHl3Ki7lFjqJcMciV+bObVPrpABKrU2D9tuNp5cyCG8C4KIsPGHQS092LmHPD0RFG6h/5087V7W7+lacKP4HDHakJ93Xo=
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SA1PR10MB5841.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(26005)(2616005)(31696002)(5660300002)(6512007)(54906003)(508600001)(86362001)(2906002)(186003)(44832011)(6666004)(7416002)(8936002)(53546011)(6506007)(38100700002)(83380400001)(8676002)(6486002)(66946007)(316002)(31686004)(4326008)(36756003)(66476007)(66556008)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?ZngwZHBER0gyT1hld1V2SkErcU5DdEtpNVVvNUF6WDFhYzQ3OW1jL3NiNjBa?=
 =?utf-8?B?d3pxRWVNOFdtTTJ6M1ZWQk1YZGk2Yi9sblo4VFVPQmsyTG8vVnNJYWJqNWJ2?=
 =?utf-8?B?OWFITzFWZmZFQXd6eFprcklTWDdiK1ExWk1Db3VSYm5pdkZ6bmltZXh4VzFz?=
 =?utf-8?B?OTJtQTRLemNJMTVCdStYaFUrZ1BZWUJsd3B1WG81YVJ2V1pzTytncm1rQUlj?=
 =?utf-8?B?SUlhRVp2RzdRbk91RjdXQjR2ank3ZnNBdkNzNTA4dCtybFFqeUZsd1o3TE94?=
 =?utf-8?B?amhyU0o4dWJ0QnNITmVmMnRkY3JEREhIUEVZU0hxZW5SckZKbmVpU0dTVXhk?=
 =?utf-8?B?QnN1RFJUbmNPOUt4TlJvcUx0M1RMR3B2ZVp3VTVSTzRzRGo2cktWVDBDNGxj?=
 =?utf-8?B?SS9NMlBIVEtER055OXAzazVsNWEyYW1UN1hOcUw0NXJkZk5JcFUvTUUyTHFY?=
 =?utf-8?B?dXBHNkdhZ2tZdVc4SE8vTjllZGk0VFB1NHBrSXZrYVFKVUtKT2lxOERZVVVY?=
 =?utf-8?B?N01MV1plc0IzRnF1K0RQQ0JtWEE4cTZDOGwwRUxONGp6TnBhWklTTWVPWEUw?=
 =?utf-8?B?aXlUcWRPZ0QvZmpDMTJZYlVId1lzTDFyMFp3NjNha0FDZG1wanIvUGJMUDVw?=
 =?utf-8?B?M1ZPNFcweEd1ZFZNcUZJcWVraVZVY1VBVnB3cFBua2Y3cHFNZm1ZaFFPL1N6?=
 =?utf-8?B?UG5aRGtzVFZZR3EzMnhWdVhjOXlmUnVwOWZlQjUvdVN1OWg1VkJiOXpVemdW?=
 =?utf-8?B?endOU3ltZVZDOTlkRHNsK0RRYk9VWDFFYnJ1bTU5V1crMWxSR1djZzlpRTB4?=
 =?utf-8?B?Q2VmbVpCclFEK2xxTGtkQWhWS0RBZW5XVXI5Nm1VeXFGV0w3MUwwbm0yOGVM?=
 =?utf-8?B?Qy9EVWhjbFJPaXdFRWdKQTdtU21ycElPZzM2M251WHMwdGpIeG1ocG9yWmRR?=
 =?utf-8?B?U09GS2x6NHFPZktSZ2RSbVVyN0VHVWRuTm1VbE9tUUhkN2tZNEE1cCtDY2Yr?=
 =?utf-8?B?K3VweTRMd3doQ0p1aUhxZXpHdGNoNTFRNWFqR0luVXpnYXlhMGhLQ3dDNGli?=
 =?utf-8?B?djVuNFl4VkRyazc2M01ibFluR3JFakgrNnREL2pOTG5xL2QxVzhvVWtkTVlp?=
 =?utf-8?B?SFcwS0NvbUo3R3poRkVwOEt0YkNLdDk4RnpTSWg1N3RIeUNPNTRkOUNycDls?=
 =?utf-8?B?L1hmZVJ5L0kyT2ppUkdHSHlEU1psaTl1ODNlMzFJd3REOTQ2WlNIdHpUSWNr?=
 =?utf-8?B?dXFFV08rLzdSZFJrd0pDRHlhRWFLWHIyQTFsc3FNTVVERFJKRWF3T1JJSzV2?=
 =?utf-8?B?bmp4dmxkQkdPUDhpOHh6L2xTQ0Z3cWdxU0VCR05kNTV2dEdxbTBZV0VQdnRm?=
 =?utf-8?B?L0NrRUVQRFU4U2hWUlZ1KzJ0ZGI5ZThMUzd5ekljTkpGeUVpRkRGendqRS8x?=
 =?utf-8?B?bzBsdEFheWVrUVYvNDNqSGx2Z1dPcUdBSzZrVitpTU5xRXhzRXdzbTM2UGxD?=
 =?utf-8?B?djU0SW1sZHZpTk9mSzBDQ3grNGFnZExIZGc5ODJGTTc4MVFDQ1RPL1Bmemow?=
 =?utf-8?B?QUpJc0txd01ZWDJTQ0ZrbTVsaU1vckkwNHZpWTJ4cmNMWTRZUFhkZlFDa25y?=
 =?utf-8?B?Vy8xbFVtOXZqRkJSdmdyaTVRaitDZFZmSVFMRk1tZnZaREZzMVdFZnVGaGpQ?=
 =?utf-8?B?MnBIMVI2RzNYakhmSWVQNEhpQTI3OGJleFoyMVVHcnFqM3RiTUIxbS9TWUpy?=
 =?utf-8?B?akFtVDVrS2preFpZM0dVNUpTdVM4THZSenJ4UnZNdXRwdlBLdzdnTjFJVHJx?=
 =?utf-8?B?KzIwNlVyNnh6VnZzWlhnSVdxcFlnNi8yNTkxY2dwd1pVcCtldmlkanpRMXB2?=
 =?utf-8?B?Tnpra1NZNVBxc3dZM3FpYmtudFhlcW1Zd3kwNHhxcWIwL3lUQ2VsWnRJY09S?=
 =?utf-8?Q?DKi9cvRp9uSXJmTP2WBL9Bx0R0u1YfW+?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8c5d2c83-1471-441a-4a9a-08da0d01620c
X-MS-Exchange-CrossTenant-AuthSource: SA1PR10MB5841.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Mar 2022 19:14:41.9634
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: DH6t5t+MdJR++yxRNJN5w5Rpbc9wXz1+qvdXddfvbwZRdMa4LTeGJKTiVH0TRgJ/wQk+IVei4bSdh1v6pmxeEg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR10MB2844
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10295 signatures=694973
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 adultscore=0 spamscore=0 malwarescore=0
 suspectscore=0 mlxlogscore=999 bulkscore=0 phishscore=0 mlxscore=0
 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2202240000
 definitions=main-2203230100
X-Proofpoint-GUID: t_UTRWQVraX34GUlamYHoybIFY8zhy0i
X-Proofpoint-ORIG-GUID: t_UTRWQVraX34GUlamYHoybIFY8zhy0i

On 3/23/2022 1:56 PM, Philippe Mathieu-Daudé wrote:
> On 23/3/22 18:17, Philippe Mathieu-Daudé wrote:
>> From: Mark Kanda <mark.kanda@oracle.com>
>>
>> Create cpu_address_space_destroy() to free a CPU's cpu_ases list.
>
> This seems incorrect...
>
>> vCPU hotunplug related leak reported by Valgrind:
>>
>> ==132362== 216 bytes in 1 blocks are definitely lost in loss record 7,119 of 
>> 8,549
>> ==132362==    at 0x4C3ADBB: calloc (vg_replace_malloc.c:1117)
>> ==132362==    by 0x69EE4CD: g_malloc0 (in /usr/lib64/libglib-2.0.so.0.5600.4)
>> ==132362==    by 0x7E34AF: cpu_address_space_init (physmem.c:751)
>> ==132362==    by 0x45053E: qemu_init_vcpu (cpus.c:635)
>> ==132362==    by 0x76B4A7: x86_cpu_realizefn (cpu.c:6520)
>> ==132362==    by 0x9343ED: device_set_realized (qdev.c:531)
>> ==132362==    by 0x93E26F: property_set_bool (object.c:2273)
>> ==132362==    by 0x93C23E: object_property_set (object.c:1408)
>> ==132362==    by 0x9406DC: object_property_set_qobject (qom-qobject.c:28)
>> ==132362==    by 0x93C5A9: object_property_set_bool (object.c:1477)
>> ==132362==    by 0x933C81: qdev_realize (qdev.c:333)
>> ==132362==    by 0x455E9A: qdev_device_add_from_qdict (qdev-monitor.c:713)
>>
>> Signed-off-by: Mark Kanda <mark.kanda@oracle.com>
>> Tested-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
>> Message-Id: <20220321141409.3112932-5-mark.kanda@oracle.com>
>> Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
>> ---
>>   cpu.c                     | 1 +
>>   include/exec/cpu-common.h | 7 +++++++
>>   softmmu/physmem.c         | 5 +++++
>>   3 files changed, 13 insertions(+)
>>
>> diff --git a/cpu.c b/cpu.c
>> index be1f8b074c..59352a1487 100644
>> --- a/cpu.c
>> +++ b/cpu.c
>> @@ -174,6 +174,7 @@ void cpu_exec_unrealizefn(CPUState *cpu)
>>           tcg_exec_unrealizefn(cpu);
>>       }
>>   +    cpu_address_space_destroy(cpu);
>>       cpu_list_remove(cpu);
>>   }
>>   diff --git a/include/exec/cpu-common.h b/include/exec/cpu-common.h
>> index 50a7d2912e..b17ad61ae4 100644
>> --- a/include/exec/cpu-common.h
>> +++ b/include/exec/cpu-common.h
>> @@ -111,6 +111,13 @@ size_t qemu_ram_pagesize_largest(void);
>>    */
>>   void cpu_address_space_init(CPUState *cpu, int asidx,
>>                               const char *prefix, MemoryRegion *mr);
>
> ... cpu_address_space_init() creates a single AS, ...
>
>> +/**
>> + * cpu_address_space_destroy:
>> + * @cpu: CPU for this address space
>> + *
>> + * Cleanup CPU's cpu_ases list.
>> + */
>> +void cpu_address_space_destroy(CPUState *cpu);
>>     void cpu_physical_memory_rw(hwaddr addr, void *buf,
>>                               hwaddr len, bool is_write);
>> diff --git a/softmmu/physmem.c b/softmmu/physmem.c
>> index 43ae70fbe2..aec61ca07a 100644
>> --- a/softmmu/physmem.c
>> +++ b/softmmu/physmem.c
>> @@ -762,6 +762,11 @@ void cpu_address_space_init(CPUState *cpu, int asidx,
>>       }
>>   }
>>   +void cpu_address_space_destroy(CPUState *cpu)
>> +{
>> +    g_free(cpu->cpu_ases);
>
> ... but here you destroy all the ASes.

I was thinking the whole ASes list should be freed because the CPU is going away...

Thanks/regards,
-Mark


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 05:56:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 05:56:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294156.500005 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXGSK-0000AF-Nz; Thu, 24 Mar 2022 05:56:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294156.500005; Thu, 24 Mar 2022 05:56:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXGSK-0000A2-K9; Thu, 24 Mar 2022 05:56:20 +0000
Received: by outflank-mailman (input) for mailman id 294156;
 Thu, 24 Mar 2022 05:56:19 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXGSJ-00009p-1l; Thu, 24 Mar 2022 05:56:19 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXGSI-0004QM-Vi; Thu, 24 Mar 2022 05:56:18 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXGSI-0007NC-GF; Thu, 24 Mar 2022 05:56:18 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXGSI-0007aC-Fl; Thu, 24 Mar 2022 05:56:18 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=PiIxRfhLdd6ip1pKaFlZT2yg4g94J4j9ViFBpHMTUXA=; b=skoLcEqxwa4/cs1BEAj7tJTcc2
	gn8wmil6w/L7aHNudpH6Et6TlOrI+/xSYivDvDaUYGz1b6onN0LgPFVlybfYZL2lg2j6b0SRQlMo5
	g1hDialIperxHZi4RgNxMC1lV5qbep61aHnTmeRwn75DF+lZtDXbwYn4MN+1CZS3XaXc=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168819-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168819: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 24 Mar 2022 05:56:18 +0000

flight 168819 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168819/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   23 days
Failing since        168258  2022-03-01 01:55:31 Z   23 days  240 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    1 days   21 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 06:42:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 06:42:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294163.500016 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXHAX-0005H0-9J; Thu, 24 Mar 2022 06:42:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294163.500016; Thu, 24 Mar 2022 06:42:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXHAX-0005Gt-61; Thu, 24 Mar 2022 06:42:01 +0000
Received: by outflank-mailman (input) for mailman id 294163;
 Thu, 24 Mar 2022 06:41:59 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXHAV-0005Gj-58; Thu, 24 Mar 2022 06:41:59 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXHAV-0005JO-11; Thu, 24 Mar 2022 06:41:59 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXHAU-0002eh-F3; Thu, 24 Mar 2022 06:41:58 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXHAU-0004JH-EX; Thu, 24 Mar 2022 06:41:58 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=T2kwdIlfo7yFga/Xy5zNtIat2232C0OsQSp5a9xA4fA=; b=UlCFrls4+1pnk0ATX0wQbDw+tW
	EERzknXkWy4RSKLzDdvytP/B/H4QZioi3NzVZqgEFsRll7X9FhWXX7zJKig7X319pEIv38R/XG3DW
	jOUtDDjw0K/527jtkgMYb+wJugJmDGB0ILXVjrLcdyVb0ujYlP7GUXLqMFrj5H0TwkNU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168810-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-5.4 test] 168810: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-5.4:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=055c4cf7e6da13450016942e5286492b4a224868
X-Osstest-Versions-That:
    linux=8e24ff11b5d216dc5de667bebeb7b0ef3946c596
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 24 Mar 2022 06:41:58 +0000

flight 168810 linux-5.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168810/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168709
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168709
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168709
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168709
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168709
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168709
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168709
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168709
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168709
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168709
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168709
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168709
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                055c4cf7e6da13450016942e5286492b4a224868
baseline version:
 linux                8e24ff11b5d216dc5de667bebeb7b0ef3946c596

Last test of basis   168709  2022-03-19 13:11:21 Z    4 days
Testing same since   168800  2022-03-23 08:42:49 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Alan Stern <stern@rowland.harvard.edu>
  Andrew Morton <akpm@linux-foundation.org>
  Ard Biesheuvel <ardb@kernel.org>
  Arnaldo Carvalho de Melo <acme@redhat.com>
  Arnd Bergmann <arnd@arndb.de>
  Brian Masney <bmasney@redhat.com>
  Catalin Marinas <catalin.marinas@arm.com>
  Dan Carpenter <dan.carpenter@oracle.com>
  David S. Miller <davem@davemloft.net>
  Dmitry Torokhov <dmitry.torokhov@gmail.com>
  Eric Dumazet <edumazet@google.com>
  Florian Fainelli <f.fainelli@gmail.com>
  Greg Kroah-Hartman <gregkh@linuxfoundation.org>
  Guenter Roeck <linux@roeck-us.net>
  Herbert Xu <herbert@gondor.apana.org.au>
  Jakub Kicinski <kuba@kernel.org>
  James Morse <james.morse@arm.com>
  Jiasheng Jiang <jiasheng@iscas.ac.cn>
  Jon Hunter <jonathanh@nvidia.com>
  Joseph Qi <joseph.qi@linux.alibaba.com>
  Kurt Cancemi <kurt@x64architecture.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Linux Kernel Functional Testing <lkft@linaro.org>
  Maarten Lankhorst <maarten.lankhorst@linux.intel.com>
  Marek Vasut <marex@denx.de>
  Miaoqian Lin <linmq006@gmail.com>
  Michael Petlan <mpetlan@redhat.com>
  Nicolas Dichtel <nicolas.dichtel@6wind.com>
  Paolo Abeni <pabeni@redhat.com>
  Pavel Skripkin <paskripkin@gmail.com>
  Randy Dunlap <rdunlap@infradead.org>
  Sasha Levin <sashal@kernel.org>
  Shuah Khan <skhan@linuxfoundation.org>
  Sudip Mukherjee <sudip.mukherjee@codethink.co.uk>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   8e24ff11b5d21..055c4cf7e6da1  055c4cf7e6da13450016942e5286492b4a224868 -> tested/linux-5.4


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 06:58:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 06:58:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294170.500027 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXHQC-0006rT-Jc; Thu, 24 Mar 2022 06:58:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294170.500027; Thu, 24 Mar 2022 06:58:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXHQC-0006rM-GC; Thu, 24 Mar 2022 06:58:12 +0000
Received: by outflank-mailman (input) for mailman id 294170;
 Thu, 24 Mar 2022 06:58:10 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+IHq=UD=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXHQA-0006rG-D5
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 06:58:10 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c2cae806-ab3f-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 07:58:08 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id B898A1F387;
 Thu, 24 Mar 2022 06:58:07 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 8178513A67;
 Thu, 24 Mar 2022 06:58:07 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id fkdyHX8WPGKPJQAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 24 Mar 2022 06:58:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c2cae806-ab3f-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648105087; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=IOtMP5uh1AQ/43ENvyekAsIkZOBEZWniky/IrI/Qt4U=;
	b=unN19x/9mtEuQkQVR/8sHZ6F6iKFiUTwtYS2ac7OaJQIIXgunt23i3HXzcrX7/I/SAqnCX
	sCmBvBVJvAAJzPrA50yYyn2I5X4ese5mQuu7xxmRnU00rc5FUF5MG/vqNyx8fPVFaeHs82
	trdEfkuuSIh4dEIMg3z2YsTrP4PZrlY=
Message-ID: <2a289375-7dae-c829-dfb9-af39724e1e4c@suse.com>
Date: Thu, 24 Mar 2022 07:58:06 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v4 10/11] xen/arm: call hypercall handlers via generated
 macro
Content-Language: en-US
To: Julien Grall <julien@xen.org>, xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Michal Orzel <michal.orzel@arm.com>
References: <20220310073420.15622-1-jgross@suse.com>
 <20220310073420.15622-11-jgross@suse.com>
 <93bdb9e5-f054-704e-9302-3c2e17d92c60@xen.org>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <93bdb9e5-f054-704e-9302-3c2e17d92c60@xen.org>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------mHtKh4A7paYyKPSS49lwAqZv"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------mHtKh4A7paYyKPSS49lwAqZv
Content-Type: multipart/mixed; boundary="------------fd1klvXh1EAjlDklVSuTwurU";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Julien Grall <julien@xen.org>, xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Michal Orzel <michal.orzel@arm.com>
Message-ID: <2a289375-7dae-c829-dfb9-af39724e1e4c@suse.com>
Subject: Re: [PATCH v4 10/11] xen/arm: call hypercall handlers via generated
 macro
References: <20220310073420.15622-1-jgross@suse.com>
 <20220310073420.15622-11-jgross@suse.com>
 <93bdb9e5-f054-704e-9302-3c2e17d92c60@xen.org>
In-Reply-To: <93bdb9e5-f054-704e-9302-3c2e17d92c60@xen.org>

--------------fd1klvXh1EAjlDklVSuTwurU
Content-Type: multipart/mixed; boundary="------------fGBgndfdTA3IUIxOu0s8vO1x"

--------------fGBgndfdTA3IUIxOu0s8vO1x
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------fGBgndfdTA3IUIxOu0s8vO1x
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----

xsBNBFOMcBYBCACgGjqjoGvbEouQZw/ToiBg9W98AlM2QHV+iNHsEs7kxWhKMjri
oyspZKOBycWxw3ie3j9uvg9EOB3aN4xiTv4qbnGiTr3oJhkB1gsb6ToJQZ8uxGq2
kaV2KL9650I1SJvedYm8Of8Zd621lSmoKOwlNClALZNew72NjJLEzTalU1OdT7/i
1TXkH09XSSI8mEQ/ouNcMvIJNwQpd369y9bfIhWUiVXEK7MlRgUG6MvIj6Y3Am/B
BLUVbDa4+gmzDC9ezlZkTZG2t14zWPvxXP3FAp2pkW0xqG7/377qptDmrk42GlSK
N4z76ELnLxussxc7I2hx18NUcbP8+uty4bMxABEBAAHNHEp1ZXJnZW4gR3Jvc3Mg
PGpnQHBmdXBmLm5ldD7CwHkEEwECACMFAlOMcBYCGwMHCwkIBwMCAQYVCAIJCgsE
FgIDAQIeAQIXgAAKCRCw3p3WKL8TL0KdB/93FcIZ3GCNwFU0u3EjNbNjmXBKDY4F
UGNQH2lvWAUy+dnyThpwdtF/jQ6j9RwE8VP0+NXcYpGJDWlNb9/JmYqLiX2Q3Tye
vpB0CA3dbBQp0OW0fgCetToGIQrg0MbD1C/sEOv8Mr4NAfbauXjZlvTj30H2jO0u
+6WGM6nHwbh2l5O8ZiHkH32iaSTfN7Eu5RnNVUJbvoPHZ8SlM4KWm8rG+lIkGurq
qu5gu8q8ZMKdsdGC4bBxdQKDKHEFExLJK/nRPFmAuGlId1E3fe10v5QL+qHI3EIP
tyfE7i9Hz6rVwi7lWKgh7pe0ZvatAudZ+JNIlBKptb64FaiIOAWDCx1SzR9KdWVy
Z2VuIEdyb3NzIDxqZ3Jvc3NAc3VzZS5jb20+wsB5BBMBAgAjBQJTjHCvAhsDBwsJ
CAcDAgEGFQgCCQoLBBYCAwECHgECF4AACgkQsN6d1ii/Ey/HmQf/RtI7kv5A2PS4
RF7HoZhPVPogNVbC4YA6lW7DrWf0teC0RR3MzXfy6pJ+7KLgkqMlrAbN/8Dvjoz7
8X+5vhH/rDLa9BuZQlhFmvcGtCF8eR0T1v0nC/nuAFVGy+67q2DH8As3KPu0344T
BDpAvr2uYM4tSqxK4DURx5INz4ZZ0WNFHcqsfvlGJALDeE0LhITTd9jLzdDad1pQ
SToCnLl6SBJZjDOX9QQcyUigZFtCXFst4dlsvddrxyqT1f17+2cFSdu7+ynLmXBK
7abQ3rwJY8SbRO2iRulogc5vr/RLMMlscDAiDkaFQWLoqHHOdfO9rURssHNN8WkM
nQfvUewRz80hSnVlcmdlbiBHcm9zcyA8amdyb3NzQG5vdmVsbC5jb20+wsB5BBMB
AgAjBQJTjHDXAhsDBwsJCAcDAgEGFQgCCQoLBBYCAwECHgECF4AACgkQsN6d1ii/
Ey8PUQf/ehmgCI9jB9hlgexLvgOtf7PJnFOXgMLdBQgBlVPO3/D9R8LtF9DBAFPN
hlrsfIG/SqICoRCqUcJ96Pn3P7UUinFG/I0ECGF4EvTE1jnDkfJZr6jrbjgyoZHi
w/4BNwSTL9rWASyLgqlA8u1mf+c2yUwcGhgkRAd1gOwungxcwzwqgljf0N51N5Jf
VRHRtyfwq/ge+YEkDGcTU6Y0sPOuj4Dyfm8fJzdfHNQsWq3PnczLVELStJNdapwP
OoE+lotufe3AM2vAEYJ9rTz3Cki4JFUsgLkHFqGZarrPGi1eyQcXeluldO3m91NK
/1xMI3/+8jbO0tsn1tqSEUGIJi7ox80eSnVlcmdlbiBHcm9zcyA8amdyb3NzQHN1
c2UuZGU+wsB5BBMBAgAjBQJTjHDrAhsDBwsJCAcDAgEGFQgCCQoLBBYCAwECHgEC
F4AACgkQsN6d1ii/Ey+LhQf9GL45eU5vOowA2u5N3g3OZUEBmDHVVbqMtzwlmNC4
k9Kx39r5s2vcFl4tXqW7g9/ViXYuiDXb0RfUpZiIUW89siKrkzmQ5dM7wRqzgJpJ
wK8Bn2MIxAKArekWpiCKvBOB/Cc+3EXE78XdlxLyOi/NrmSGRIov0karw2RzMNOu
5D+jLRZQd1Sv27AR+IP3I8U4aqnhLpwhK7MEy9oCILlgZ1QZe49kpcumcZKORmzB
TNh30FVKK1EvmV2xAKDoaEOgQB4iFQLhJCdP1I5aSgM5IVFdn7v5YgEYuJYx37Io
N1EblHI//x/e2AaIHpzK5h88NEawQsaNRpNSrcfbFmAg987ATQRTjHAWAQgAyzH6
AOODMBjgfWE9VeCgsrwH3exNAU32gLq2xvjpWnHIs98ndPUDpnoxWQugJ6MpMncr
0xSwFmHEgnSEjK/PAjppgmyc57BwKII3sV4on+gDVFJR6Y8ZRwgnBC5mVM6JjQ5x
Dk8WRXljExRfUX9pNhdE5eBOZJrDRoLUmmjDtKzWaDhIg/+1Hzz93X4fCQkNVbVF
LELU9bMaLPBG/x5q4iYZ2k2ex6d47YE1ZFdMm6YBYMOljGkZKwYde5ldM9mo45mm
we0icXKLkpEdIXKTZeKDO+Hdv1aqFuAcccTg9RXDQjmwhC3yEmrmcfl0+rPghO0I
v3OOImwTEe4co3c1mwARAQABwsBfBBgBAgAJBQJTjHAWAhsMAAoJELDendYovxMv
Q/gH/1ha96vm4P/L+bQpJwrZ/dneZcmEwTbe8YFsw2V/Buv6Z4Mysln3nQK5ZadD
534CF7TDVft7fC4tU4PONxF5D+/tvgkPfDAfF77zy2AH1vJzQ1fOU8lYFpZXTXIH
b+559UqvIB8AdgR3SAJGHHt4RKA0F7f5ipYBBrC6cyXJyyoprT10EMvU8VGiwXvT
yJz3fjoYsdFzpWPlJEBRMedCot60g5dmbdrZ5DWClAr0yau47zpWj3enf1tLWaqc
suylWsviuGjKGw7KHQd3bxALOknAp4dN3QwBYCKuZ7AddY9yjynVaD5X7nF9nO5B
jR/i1DG86lem3iBDXzXsZDn8R38=3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------fGBgndfdTA3IUIxOu0s8vO1x--

--------------fd1klvXh1EAjlDklVSuTwurU--

--------------mHtKh4A7paYyKPSS49lwAqZv
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmI8Fn4FAwAAAAAACgkQsN6d1ii/Ey9d
8gf+NkgcnhOeJj32V4a+2LTatLhFE74kFnbfnWespsgurI6aXu3ldvPGiitKbWWZ2cCopmqsJ/+X
u+GLU9fMMAAahJPKg1w5F8+lXmfhOF25CW6DWhhHz5w3jds0kTRJlFkLYJermgpOWKxSYP/Uwgjy
gigABnlcKhnbDT74dGNMWAplm3nCEJrvDGzpxeTOq2hPitZE7Sto6JB5PVfWALR94NxOsEXKGNGC
am/M6gBY5OncG3bAKMd7d3x7vy+7RH+EUNbgqvx91CvpehgFAs16fscUMbNwr96vhqSay2in0NEw
DgetXjoYMwLPX0NWORKZp4iT/07QnIA/iW6SJD/c+g==
=eT8K
-----END PGP SIGNATURE-----

--------------mHtKh4A7paYyKPSS49lwAqZv--


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 08:13:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 08:13:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294186.500054 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXIau-0007DJ-2S; Thu, 24 Mar 2022 08:13:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294186.500054; Thu, 24 Mar 2022 08:13:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXIat-0007Cl-St; Thu, 24 Mar 2022 08:13:19 +0000
Received: by outflank-mailman (input) for mailman id 294186;
 Thu, 24 Mar 2022 08:13:18 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+IHq=UD=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXIas-0006uw-Dp
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 08:13:18 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 41be15f3-ab4a-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 09:13:16 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 00A8B210E9;
 Thu, 24 Mar 2022 08:13:16 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id A980C13B98;
 Thu, 24 Mar 2022 08:13:15 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id CCEnKBsoPGIpEwAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 24 Mar 2022 08:13:15 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 41be15f3-ab4a-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648109596; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=TXN8bjDP2J+VjA3LwPXPd+SorxUAeZxOrVepQkTaF+w=;
	b=HYOA+PMsSmDNJDKv/esduisg2PhfHLaWXAI1ceBtDYIbZLpsOfBJi8jFZzI32pC6wDGQHB
	2b6aSWghPq5k2wreUWUAxNyH9W1H2vQtVTqXeIvK4G4FMOayK3ppVbuIQsJIQu+ql2xmXV
	Ub/6lte0hu6bDAp1L3mQA6bjIpRjUEw=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>
Subject: [PATCH v5 02/10] xen: move do_vcpu_op() to arch specific code
Date: Thu, 24 Mar 2022 09:13:04 +0100
Message-Id: <20220324081312.18222-3-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220324081312.18222-1-jgross@suse.com>
References: <20220324081312.18222-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

The entry point used for the vcpu_op hypercall on Arm is different
from the one on x86 today, as some of the common sub-ops are not
supported on Arm. The Arm specific handler filters out the not
supported sub-ops and then calls the common handler. This leads to the
weird call hierarchy:

  do_arm_vcpu_op()
    do_vcpu_op()
      arch_do_vcpu_op()

Clean this up by renaming do_vcpu_op() to common_vcpu_op() and
arch_do_vcpu_op() in each architecture to do_vcpu_op(). This way one
of above calls can be avoided without restricting any potential
future use of common sub-ops for Arm.

Signed-off-by: Juergen Gross <jgross@suse.com>
---
V4:
- don't remove HYPERCALL_ARM()
V4.1:
- add missing cf_check (Andrew Cooper)
V5:
- use v instead of current (Julien Grall)
---
 xen/arch/arm/domain.c                | 15 ++++++++-------
 xen/arch/arm/include/asm/hypercall.h |  2 --
 xen/arch/arm/traps.c                 |  2 +-
 xen/arch/x86/domain.c                | 12 ++++++++----
 xen/arch/x86/include/asm/hypercall.h |  2 +-
 xen/arch/x86/x86_64/domain.c         | 18 +++++++++++++-----
 xen/common/compat/domain.c           | 15 ++++++---------
 xen/common/domain.c                  | 12 ++++--------
 xen/include/xen/hypercall.h          |  2 +-
 9 files changed, 42 insertions(+), 38 deletions(-)

diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
index 8110c1df86..2f8eaab7b5 100644
--- a/xen/arch/arm/domain.c
+++ b/xen/arch/arm/domain.c
@@ -1079,23 +1079,24 @@ void arch_dump_domain_info(struct domain *d)
 }
 
 
-long do_arm_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
+long do_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
+    struct domain *d = current->domain;
+    struct vcpu *v;
+
+    if ( (v = domain_vcpu(d, vcpuid)) == NULL )
+        return -ENOENT;
+
     switch ( cmd )
     {
         case VCPUOP_register_vcpu_info:
         case VCPUOP_register_runstate_memory_area:
-            return do_vcpu_op(cmd, vcpuid, arg);
+            return common_vcpu_op(cmd, v, arg);
         default:
             return -EINVAL;
     }
 }
 
-long arch_do_vcpu_op(int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
-{
-    return -ENOSYS;
-}
-
 void arch_dump_vcpu_info(struct vcpu *v)
 {
     gic_dump_info(v);
diff --git a/xen/arch/arm/include/asm/hypercall.h b/xen/arch/arm/include/asm/hypercall.h
index 39d2e7889d..fac4d60f17 100644
--- a/xen/arch/arm/include/asm/hypercall.h
+++ b/xen/arch/arm/include/asm/hypercall.h
@@ -4,8 +4,6 @@
 #include <public/domctl.h> /* for arch_do_domctl */
 int do_arm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
 
-long do_arm_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg);
-
 long subarch_do_domctl(struct xen_domctl *domctl, struct domain *d,
                        XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl);
 
diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
index 43f30747cf..e906bb4a89 100644
--- a/xen/arch/arm/traps.c
+++ b/xen/arch/arm/traps.c
@@ -1380,7 +1380,7 @@ static arm_hypercall_t arm_hypercall_table[] = {
 #endif
     HYPERCALL(multicall, 2),
     HYPERCALL(platform_op, 1),
-    HYPERCALL_ARM(vcpu_op, 3),
+    HYPERCALL(vcpu_op, 3),
     HYPERCALL(vm_assist, 2),
 #ifdef CONFIG_ARGO
     HYPERCALL(argo_op, 5),
diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c
index a5048ed654..d566fc82b4 100644
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -1489,11 +1489,15 @@ int arch_vcpu_reset(struct vcpu *v)
     return 0;
 }
 
-long
-arch_do_vcpu_op(
-    int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
+long cf_check do_vcpu_op(int cmd, unsigned int vcpuid,
+                         XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     long rc = 0;
+    struct domain *d = current->domain;
+    struct vcpu *v;
+
+    if ( (v = domain_vcpu(d, vcpuid)) == NULL )
+        return -ENOENT;
 
     switch ( cmd )
     {
@@ -1545,7 +1549,7 @@ arch_do_vcpu_op(
     }
 
     default:
-        rc = -ENOSYS;
+        rc = common_vcpu_op(cmd, v, arg);
         break;
     }
 
diff --git a/xen/arch/x86/include/asm/hypercall.h b/xen/arch/x86/include/asm/hypercall.h
index 61bf897147..d6daa7e4cb 100644
--- a/xen/arch/x86/include/asm/hypercall.h
+++ b/xen/arch/x86/include/asm/hypercall.h
@@ -145,7 +145,7 @@ compat_physdev_op(
     XEN_GUEST_HANDLE_PARAM(void) arg);
 
 extern int
-arch_compat_vcpu_op(
+compat_common_vcpu_op(
     int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg);
 
 extern int cf_check compat_mmuext_op(
diff --git a/xen/arch/x86/x86_64/domain.c b/xen/arch/x86/x86_64/domain.c
index c46dccc25a..9c559aa3ea 100644
--- a/xen/arch/x86/x86_64/domain.c
+++ b/xen/arch/x86/x86_64/domain.c
@@ -12,11 +12,15 @@
 CHECK_vcpu_get_physid;
 #undef xen_vcpu_get_physid
 
-int
-arch_compat_vcpu_op(
-    int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
+int cf_check
+compat_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
-    int rc = -ENOSYS;
+    int rc;
+    struct domain *d = current->domain;
+    struct vcpu *v;
+
+    if ( (v = domain_vcpu(d, vcpuid)) == NULL )
+        return -ENOENT;
 
     switch ( cmd )
     {
@@ -55,7 +59,11 @@ arch_compat_vcpu_op(
     }
 
     case VCPUOP_get_physid:
-        rc = arch_do_vcpu_op(cmd, v, arg);
+        rc = do_vcpu_op(cmd, vcpuid, arg);
+        break;
+
+    default:
+        rc = compat_common_vcpu_op(cmd, v, arg);
         break;
     }
 
diff --git a/xen/common/compat/domain.c b/xen/common/compat/domain.c
index afae27eeba..1119534679 100644
--- a/xen/common/compat/domain.c
+++ b/xen/common/compat/domain.c
@@ -38,15 +38,12 @@ CHECK_vcpu_hvm_context;
 
 #endif
 
-int cf_check compat_vcpu_op(
-    int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
+int compat_common_vcpu_op(int cmd, struct vcpu *v,
+                          XEN_GUEST_HANDLE_PARAM(void) arg)
 {
-    struct domain *d = current->domain;
-    struct vcpu *v;
     int rc = 0;
-
-    if ( (v = domain_vcpu(d, vcpuid)) == NULL )
-        return -ENOENT;
+    struct domain *d = current->domain;
+    unsigned int vcpuid = v->vcpu_id;
 
     switch ( cmd )
     {
@@ -103,7 +100,7 @@ int cf_check compat_vcpu_op(
     case VCPUOP_stop_singleshot_timer:
     case VCPUOP_register_vcpu_info:
     case VCPUOP_send_nmi:
-        rc = do_vcpu_op(cmd, vcpuid, arg);
+        rc = common_vcpu_op(cmd, v, arg);
         break;
 
     case VCPUOP_get_runstate_info:
@@ -134,7 +131,7 @@ int cf_check compat_vcpu_op(
     }
 
     default:
-        rc = arch_compat_vcpu_op(cmd, v, arg);
+        rc = -ENOSYS;
         break;
     }
 
diff --git a/xen/common/domain.c b/xen/common/domain.c
index 351029f8b2..70747c02e6 100644
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -1570,15 +1570,11 @@ int default_initialise_vcpu(struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
     return rc;
 }
 
-long cf_check do_vcpu_op(
-    int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
+long common_vcpu_op(int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
-    struct domain *d = current->domain;
-    struct vcpu *v;
     long rc = 0;
-
-    if ( (v = domain_vcpu(d, vcpuid)) == NULL )
-        return -ENOENT;
+    struct domain *d = v->domain;
+    unsigned int vcpuid = v->vcpu_id;
 
     switch ( cmd )
     {
@@ -1750,7 +1746,7 @@ long cf_check do_vcpu_op(
     }
 
     default:
-        rc = arch_do_vcpu_op(cmd, v, arg);
+        rc = -ENOSYS;
         break;
     }
 
diff --git a/xen/include/xen/hypercall.h b/xen/include/xen/hypercall.h
index a1b6575976..81aae7a662 100644
--- a/xen/include/xen/hypercall.h
+++ b/xen/include/xen/hypercall.h
@@ -110,7 +110,7 @@ do_vcpu_op(
 
 struct vcpu;
 extern long
-arch_do_vcpu_op(int cmd,
+common_vcpu_op(int cmd,
     struct vcpu *v,
     XEN_GUEST_HANDLE_PARAM(void) arg);
 
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 08:13:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 08:13:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294185.500049 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXIat-0007B0-Pd; Thu, 24 Mar 2022 08:13:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294185.500049; Thu, 24 Mar 2022 08:13:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXIat-0007At-Lk; Thu, 24 Mar 2022 08:13:19 +0000
Received: by outflank-mailman (input) for mailman id 294185;
 Thu, 24 Mar 2022 08:13:18 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+IHq=UD=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXIar-0006uw-SX
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 08:13:17 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4189f8e8-ab4a-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 09:13:16 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 6707F210DC;
 Thu, 24 Mar 2022 08:13:15 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 0693613B98;
 Thu, 24 Mar 2022 08:13:15 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id NoM2ABsoPGIpEwAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 24 Mar 2022 08:13:15 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4189f8e8-ab4a-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648109595; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=FWXr/vR+liQ4qXHMpaTH/gdK1Xe9wA/EAfjYKdc5aOY=;
	b=oIjAQdhfHpt0RhOT390ygCxMz4V9HSts9SasoGE19LQI4kbqTywO3gw8jQzc0cuI+6MrAf
	X7v6+NHQzuldQWqGixzazJtYW/rDjk8GutjCBsQTjus2ZDBf3QwOGX7HH3yrWiu8NX3aGt
	9sRm2qF4gYQuQ9YygwdsOOExrdd5GmI=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Christopher Clark <christopher.w.clark@gmail.com>,
	Dario Faggioli <dfaggioli@suse.com>,
	Daniel De Graaf <dgdegra@tycho.nsa.gov>,
	"Daniel P. Smith" <dpsmith@apertussolutions.com>
Subject: [PATCH v5 00/10] xen: drop hypercall function tables
Date: Thu, 24 Mar 2022 09:13:02 +0100
Message-Id: <20220324081312.18222-1-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

In order to avoid indirect function calls on the hypercall path as
much as possible this series is removing the hypercall function tables
and is replacing the hypercall handler calls via the function array
by automatically generated call macros.

Another by-product of generating the call macros is the automatic
generating of the hypercall handler prototypes from the same data base
which is used to generate the macros.

This has the additional advantage of using type safe calls of the
handlers and to ensure related handler (e.g. PV and HVM ones) share
the same prototypes.

A very brief performance test (parallel build of the Xen hypervisor
in a 6 vcpu guest) showed a very slim improvement (less than 1%) of
the performance with the patches applied. The test was performed using
a PV and a PVH guest.

Changes in V2:
- new patches 6, 14, 15
- patch 7: support hypercall priorities for faster code
- comments addressed

Changes in V3:
- patches 1 and 4 removed as already applied
- comments addressed

Changes in V4:
- 5 patches removed al already applied
- new patches 1, 3 and 11
- avoid switching Arm hypercall handlers to return long (no change of
  handlers returning long already)

Changes in V5:
- patch 3 of V4 has been applied already
- comments addressed
- rebase

Juergen Gross (10):
  xen/arm: rename do_phydev_op() to do_arm_physdev_op()
  xen: move do_vcpu_op() to arch specific code
  xen: harmonize return types of hypercall handlers
  xen: don't include asm/hypercall.h from C sources
  xen: include compat/platform.h from hypercall.h
  xen: generate hypercall interface related code
  xen: use generated prototypes for hypercall handlers
  xen/x86: call hypercall handlers via generated macro
  xen/arm: call hypercall handlers via generated macro
  xen/x86: remove cf_check attribute from hypercall handlers

 .gitignore                               |   1 +
 xen/arch/arm/domain.c                    |  15 +-
 xen/arch/arm/hvm.c                       |   3 +-
 xen/arch/arm/include/asm/hypercall.h     |   7 +-
 xen/arch/arm/physdev.c                   |   2 +-
 xen/arch/arm/platform_hypercall.c        |   1 +
 xen/arch/arm/traps.c                     | 117 ++-------
 xen/arch/x86/compat.c                    |   6 +-
 xen/arch/x86/cpu/mcheck/mce.c            |   2 +-
 xen/arch/x86/cpu/vpmu.c                  |   3 +-
 xen/arch/x86/domain.c                    |  11 +-
 xen/arch/x86/domctl.c                    |   4 +-
 xen/arch/x86/hvm/dm.c                    |   2 +-
 xen/arch/x86/hvm/hvm.c                   |   2 +-
 xen/arch/x86/hvm/hypercall.c             | 177 ++-----------
 xen/arch/x86/hypercall.c                 |  59 -----
 xen/arch/x86/include/asm/hypercall.h     | 201 ++++-----------
 xen/arch/x86/include/asm/paging.h        |   3 -
 xen/arch/x86/mm.c                        |  13 +-
 xen/arch/x86/mm/paging.c                 |   3 +-
 xen/arch/x86/physdev.c                   |   2 +-
 xen/arch/x86/platform_hypercall.c        |   3 +-
 xen/arch/x86/pv/callback.c               |  26 +-
 xen/arch/x86/pv/descriptor-tables.c      |   8 +-
 xen/arch/x86/pv/emul-priv-op.c           |   2 +-
 xen/arch/x86/pv/hypercall.c              | 187 ++------------
 xen/arch/x86/pv/iret.c                   |   5 +-
 xen/arch/x86/pv/misc-hypercalls.c        |  22 +-
 xen/arch/x86/pv/shim.c                   |   4 +-
 xen/arch/x86/traps.c                     |   2 +-
 xen/arch/x86/x86_64/compat/mm.c          |   3 +-
 xen/arch/x86/x86_64/domain.c             |  16 +-
 xen/arch/x86/x86_64/mm.c                 |   2 -
 xen/arch/x86/x86_64/platform_hypercall.c |   3 +-
 xen/common/argo.c                        |   8 +-
 xen/common/compat/domain.c               |  15 +-
 xen/common/compat/grant_table.c          |   3 +-
 xen/common/compat/kernel.c               |   2 +-
 xen/common/compat/memory.c               |   3 +-
 xen/common/dm.c                          |   2 +-
 xen/common/domain.c                      |  14 +-
 xen/common/domctl.c                      |   2 +-
 xen/common/event_channel.c               |   3 +-
 xen/common/grant_table.c                 |   4 +-
 xen/common/hypfs.c                       |   2 +-
 xen/common/kernel.c                      |   2 +-
 xen/common/kexec.c                       |   6 +-
 xen/common/memory.c                      |   2 +-
 xen/common/multicall.c                   |   4 +-
 xen/common/sched/compat.c                |   2 +-
 xen/common/sched/core.c                  |   4 +-
 xen/common/sysctl.c                      |   2 +-
 xen/common/xenoprof.c                    |   2 +-
 xen/drivers/char/console.c               |   2 +-
 xen/include/Makefile                     |  13 +
 xen/include/hypercall-defs.c             | 285 ++++++++++++++++++++
 xen/include/xen/hypercall.h              | 185 +------------
 xen/scripts/gen_hypercall.awk            | 314 +++++++++++++++++++++++
 xen/xsm/xsm_core.c                       |   4 +-
 59 files changed, 863 insertions(+), 939 deletions(-)
 create mode 100644 xen/include/hypercall-defs.c
 create mode 100644 xen/scripts/gen_hypercall.awk

-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 08:13:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 08:13:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294191.500097 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXIax-00089C-Hq; Thu, 24 Mar 2022 08:13:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294191.500097; Thu, 24 Mar 2022 08:13:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXIax-00086S-4q; Thu, 24 Mar 2022 08:13:23 +0000
Received: by outflank-mailman (input) for mailman id 294191;
 Thu, 24 Mar 2022 08:13:20 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+IHq=UD=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXIau-0006ux-Cs
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 08:13:20 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 42e5504d-ab4a-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 09:13:18 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id E03FF1F392;
 Thu, 24 Mar 2022 08:13:17 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id ACC1B13B98;
 Thu, 24 Mar 2022 08:13:17 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id MBHrKB0oPGIpEwAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 24 Mar 2022 08:13:17 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 42e5504d-ab4a-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648109597; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=jxFsIOim8YQwQdGouIeDKfpkYqPTH+rehYL0W8dRFU0=;
	b=NQMcsorQaz+VvBwpDn/I1CSEoaguBapvnmC2VxA6FvaCf47Hieq7xdb+mL6aw1o35dmv4+
	7DAx0s6eHbP++HeB05o7RczmcFf4vxqvExADLcrWZhKp9OEJ93UWKvTiRtsRAjFE3hp5Z/
	uH6fMro3FR/NLirwbbzeM1CMb1WEBaI=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>
Subject: [PATCH v5 08/10] xen/x86: call hypercall handlers via generated macro
Date: Thu, 24 Mar 2022 09:13:10 +0100
Message-Id: <20220324081312.18222-9-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220324081312.18222-1-jgross@suse.com>
References: <20220324081312.18222-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Instead of using a function table use the generated macros for calling
the appropriate hypercall handlers.

This is beneficial to performance and avoids speculation issues.

With calling the handlers using the correct number of parameters now
it is possible to do the parameter register clobbering in the NDEBUG
case after returning from the handler. With the additional generated
data the hard coded hypercall_args_table[] can be replaced by tables
using the generated number of parameters.

Note that this change modifies behavior of clobbering registers in a
minor way: in case a hypercall is returning -ENOSYS (or the unsigned
equivalent thereof) for any reason the parameter registers will no
longer be clobbered. This should be of no real concern, as those cases
ought to be extremely rare and reuse of the registers in those cases
seems rather far fetched.

Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
---
V2:
- make hypercall_args_*[] const (Jan Beulich)
- make clobber_regs*() independent from NDEBUG (Jan Beulich)
- drop "L" suffix for 32-bit register clobber value (Jan Beulich)
V3:
- add array_access_nospec() (Jan Beulich)
- remove local variables in hvm_hypercall() (Andrew Cooper)
---
 xen/arch/x86/hvm/hypercall.c         | 166 +++---------------------
 xen/arch/x86/hypercall.c             |  59 ---------
 xen/arch/x86/include/asm/hypercall.h |  55 ++++++--
 xen/arch/x86/pv/hypercall.c          | 184 +++------------------------
 4 files changed, 76 insertions(+), 388 deletions(-)

diff --git a/xen/arch/x86/hvm/hypercall.c b/xen/arch/x86/hvm/hypercall.c
index a9c9ad721f..ae601185fc 100644
--- a/xen/arch/x86/hvm/hypercall.c
+++ b/xen/arch/x86/hvm/hypercall.c
@@ -111,56 +111,10 @@ long cf_check hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
         return compat_physdev_op(cmd, arg);
 }
 
-#define HYPERCALL(x)                                         \
-    [ __HYPERVISOR_ ## x ] = { (hypercall_fn_t *) do_ ## x,  \
-                               (hypercall_fn_t *) do_ ## x }
-
-#define HVM_CALL(x)                                          \
-    [ __HYPERVISOR_ ## x ] = { (hypercall_fn_t *) hvm_ ## x, \
-                               (hypercall_fn_t *) hvm_ ## x }
-
-#define COMPAT_CALL(x)                                       \
-    [ __HYPERVISOR_ ## x ] = { (hypercall_fn_t *) do_ ## x,  \
-                               (hypercall_fn_t *) compat_ ## x }
-
-static const struct {
-    hypercall_fn_t *native, *compat;
-} hvm_hypercall_table[] = {
-    HVM_CALL(memory_op),
-    COMPAT_CALL(multicall),
-#ifdef CONFIG_GRANT_TABLE
-    HVM_CALL(grant_table_op),
-#endif
-    HYPERCALL(vm_assist),
-    COMPAT_CALL(vcpu_op),
-    HVM_CALL(physdev_op),
-    COMPAT_CALL(xen_version),
-    HYPERCALL(console_io),
-    HYPERCALL(event_channel_op),
-    COMPAT_CALL(sched_op),
-    COMPAT_CALL(set_timer_op),
-    COMPAT_CALL(xsm_op),
-    HYPERCALL(hvm_op),
-    HYPERCALL(sysctl),
-    HYPERCALL(domctl),
-#ifdef CONFIG_ARGO
-    COMPAT_CALL(argo_op),
-#endif
-    COMPAT_CALL(platform_op),
-#ifdef CONFIG_PV
-    COMPAT_CALL(mmuext_op),
-#endif
-    HYPERCALL(xenpmu_op),
-    COMPAT_CALL(dm_op),
-#ifdef CONFIG_HYPFS
-    HYPERCALL(hypfs_op),
+#ifndef NDEBUG
+static const unsigned char hypercall_args_64[] = hypercall_args_hvm64;
+static const unsigned char hypercall_args_32[] = hypercall_args_hvm32;
 #endif
-    HYPERCALL(paging_domctl_cont)
-};
-
-#undef HYPERCALL
-#undef HVM_CALL
-#undef COMPAT_CALL
 
 int hvm_hypercall(struct cpu_user_regs *regs)
 {
@@ -206,23 +160,6 @@ int hvm_hypercall(struct cpu_user_regs *regs)
         return ret;
     }
 
-    BUILD_BUG_ON(ARRAY_SIZE(hvm_hypercall_table) >
-                 ARRAY_SIZE(hypercall_args_table));
-
-    if ( eax >= ARRAY_SIZE(hvm_hypercall_table) )
-    {
-        regs->rax = -ENOSYS;
-        return HVM_HCALL_completed;
-    }
-
-    eax = array_index_nospec(eax, ARRAY_SIZE(hvm_hypercall_table));
-
-    if ( !hvm_hypercall_table[eax].native )
-    {
-        regs->rax = -ENOSYS;
-        return HVM_HCALL_completed;
-    }
-
     /*
      * Caching is intended for instruction emulation only. Disable it
      * for any accesses by hypercall argument copy-in / copy-out.
@@ -233,85 +170,27 @@ int hvm_hypercall(struct cpu_user_regs *regs)
 
     if ( mode == 8 )
     {
-        unsigned long rdi = regs->rdi;
-        unsigned long rsi = regs->rsi;
-        unsigned long rdx = regs->rdx;
-        unsigned long r10 = regs->r10;
-        unsigned long r8 = regs->r8;
-
         HVM_DBG_LOG(DBG_LEVEL_HCALL, "hcall%lu(%lx, %lx, %lx, %lx, %lx)",
-                    eax, rdi, rsi, rdx, r10, r8);
-
-#ifndef NDEBUG
-        /* Deliberately corrupt parameter regs not used by this hypercall. */
-        switch ( hypercall_args_table[eax].native )
-        {
-        case 0: rdi = 0xdeadbeefdeadf00dUL; fallthrough;
-        case 1: rsi = 0xdeadbeefdeadf00dUL; fallthrough;
-        case 2: rdx = 0xdeadbeefdeadf00dUL; fallthrough;
-        case 3: r10 = 0xdeadbeefdeadf00dUL; fallthrough;
-        case 4: r8 = 0xdeadbeefdeadf00dUL;
-        }
-#endif
+                    eax, regs->rdi, regs->rsi, regs->rdx, regs->r10, regs->r8);
 
-        regs->rax = hvm_hypercall_table[eax].native(rdi, rsi, rdx, r10, r8);
+        call_handlers_hvm64(eax, regs->rax, regs->rdi, regs->rsi, regs->rdx,
+                            regs->r10, regs->r8);
 
-#ifndef NDEBUG
-        if ( !curr->hcall_preempted )
-        {
-            /* Deliberately corrupt parameter regs used by this hypercall. */
-            switch ( hypercall_args_table[eax].native )
-            {
-            case 5: regs->r8  = 0xdeadbeefdeadf00dUL; fallthrough;
-            case 4: regs->r10 = 0xdeadbeefdeadf00dUL; fallthrough;
-            case 3: regs->rdx = 0xdeadbeefdeadf00dUL; fallthrough;
-            case 2: regs->rsi = 0xdeadbeefdeadf00dUL; fallthrough;
-            case 1: regs->rdi = 0xdeadbeefdeadf00dUL;
-            }
-        }
-#endif
+        if ( !curr->hcall_preempted && regs->rax != -ENOSYS )
+            clobber_regs(regs, get_nargs(hypercall_args_64, eax));
     }
     else
     {
-        unsigned int ebx = regs->ebx;
-        unsigned int ecx = regs->ecx;
-        unsigned int edx = regs->edx;
-        unsigned int esi = regs->esi;
-        unsigned int edi = regs->edi;
-
         HVM_DBG_LOG(DBG_LEVEL_HCALL, "hcall%lu(%x, %x, %x, %x, %x)", eax,
-                    ebx, ecx, edx, esi, edi);
-
-#ifndef NDEBUG
-        /* Deliberately corrupt parameter regs not used by this hypercall. */
-        switch ( hypercall_args_table[eax].compat )
-        {
-        case 0: ebx = 0xdeadf00d; fallthrough;
-        case 1: ecx = 0xdeadf00d; fallthrough;
-        case 2: edx = 0xdeadf00d; fallthrough;
-        case 3: esi = 0xdeadf00d; fallthrough;
-        case 4: edi = 0xdeadf00d;
-        }
-#endif
+                    regs->ebx, regs->ecx, regs->edx, regs->esi, regs->edi);
 
         curr->hcall_compat = true;
-        regs->eax = hvm_hypercall_table[eax].compat(ebx, ecx, edx, esi, edi);
+        call_handlers_hvm32(eax, regs->eax, regs->ebx, regs->ecx, regs->edx,
+                            regs->esi, regs->edi);
         curr->hcall_compat = false;
 
-#ifndef NDEBUG
-        if ( !curr->hcall_preempted )
-        {
-            /* Deliberately corrupt parameter regs used by this hypercall. */
-            switch ( hypercall_args_table[eax].compat )
-            {
-            case 5: regs->rdi = 0xdeadf00d; fallthrough;
-            case 4: regs->rsi = 0xdeadf00d; fallthrough;
-            case 3: regs->rdx = 0xdeadf00d; fallthrough;
-            case 2: regs->rcx = 0xdeadf00d; fallthrough;
-            case 1: regs->rbx = 0xdeadf00d;
-            }
-        }
-#endif
+        if ( !curr->hcall_preempted && regs->eax != -ENOSYS )
+            clobber_regs32(regs, get_nargs(hypercall_args_32, eax));
     }
 
     hvmemul_cache_restore(curr, token);
@@ -332,31 +211,20 @@ int hvm_hypercall(struct cpu_user_regs *regs)
 enum mc_disposition hvm_do_multicall_call(struct mc_state *state)
 {
     struct vcpu *curr = current;
-    hypercall_fn_t *func = NULL;
 
     if ( hvm_guest_x86_mode(curr) == 8 )
     {
         struct multicall_entry *call = &state->call;
 
-        if ( call->op < ARRAY_SIZE(hvm_hypercall_table) )
-            func = array_access_nospec(hvm_hypercall_table, call->op).native;
-        if ( func )
-            call->result = func(call->args[0], call->args[1], call->args[2],
-                                call->args[3], call->args[4]);
-        else
-            call->result = -ENOSYS;
+        call_handlers_hvm64(call->op, call->result, call->args[0], call->args[1],
+                            call->args[2], call->args[3], call->args[4]);
     }
     else
     {
         struct compat_multicall_entry *call = &state->compat_call;
 
-        if ( call->op < ARRAY_SIZE(hvm_hypercall_table) )
-            func = array_access_nospec(hvm_hypercall_table, call->op).compat;
-        if ( func )
-            call->result = func(call->args[0], call->args[1], call->args[2],
-                                call->args[3], call->args[4]);
-        else
-            call->result = -ENOSYS;
+        call_handlers_hvm32(call->op, call->result, call->args[0], call->args[1],
+                            call->args[2], call->args[3], call->args[4]);
     }
 
     return !hvm_get_cpl(curr) ? mc_continue : mc_preempt;
diff --git a/xen/arch/x86/hypercall.c b/xen/arch/x86/hypercall.c
index 07e1a45ef5..6b73cff9b9 100644
--- a/xen/arch/x86/hypercall.c
+++ b/xen/arch/x86/hypercall.c
@@ -22,65 +22,6 @@
 #include <xen/hypercall.h>
 #include <asm/multicall.h>
 
-#ifdef CONFIG_COMPAT
-#define ARGS(x, n)                              \
-    [ __HYPERVISOR_ ## x ] = { n, n }
-#define COMP(x, n, c)                           \
-    [ __HYPERVISOR_ ## x ] = { n, c }
-#else
-#define ARGS(x, n)    [ __HYPERVISOR_ ## x ] = { n }
-#define COMP(x, n, c) ARGS(x, n)
-#endif
-
-const hypercall_args_t hypercall_args_table[NR_hypercalls] =
-{
-    ARGS(set_trap_table, 1),
-    ARGS(mmu_update, 4),
-    ARGS(set_gdt, 2),
-    ARGS(stack_switch, 2),
-    COMP(set_callbacks, 3, 4),
-    ARGS(fpu_taskswitch, 1),
-    ARGS(sched_op_compat, 2),
-    ARGS(platform_op, 1),
-    ARGS(set_debugreg, 2),
-    ARGS(get_debugreg, 1),
-    COMP(update_descriptor, 2, 4),
-    ARGS(memory_op, 2),
-    ARGS(multicall, 2),
-    COMP(update_va_mapping, 3, 4),
-    COMP(set_timer_op, 1, 2),
-    ARGS(event_channel_op_compat, 1),
-    ARGS(xen_version, 2),
-    ARGS(console_io, 3),
-    ARGS(physdev_op_compat, 1),
-    ARGS(grant_table_op, 3),
-    ARGS(vm_assist, 2),
-    COMP(update_va_mapping_otherdomain, 4, 5),
-    ARGS(vcpu_op, 3),
-    COMP(set_segment_base, 2, 0),
-    ARGS(mmuext_op, 4),
-    ARGS(xsm_op, 1),
-    ARGS(nmi_op, 2),
-    ARGS(sched_op, 2),
-    ARGS(callback_op, 2),
-    ARGS(xenoprof_op, 2),
-    ARGS(event_channel_op, 2),
-    ARGS(physdev_op, 2),
-    ARGS(sysctl, 1),
-    ARGS(domctl, 1),
-    ARGS(kexec_op, 2),
-    ARGS(argo_op, 5),
-    ARGS(xenpmu_op, 2),
-    ARGS(hvm_op, 2),
-    ARGS(dm_op, 3),
-    ARGS(hypfs_op, 5),
-    ARGS(mca, 1),
-    ARGS(paging_domctl_cont, 1),
-};
-
-#undef COMP
-#undef ARGS
-
 #define NEXT_ARG(fmt, args)                                                 \
 ({                                                                          \
     unsigned long __arg;                                                    \
diff --git a/xen/arch/x86/include/asm/hypercall.h b/xen/arch/x86/include/asm/hypercall.h
index 2d243b48bc..ab8bd12e60 100644
--- a/xen/arch/x86/include/asm/hypercall.h
+++ b/xen/arch/x86/include/asm/hypercall.h
@@ -17,19 +17,6 @@
 
 #define __HYPERVISOR_paging_domctl_cont __HYPERVISOR_arch_1
 
-typedef unsigned long hypercall_fn_t(
-    unsigned long, unsigned long, unsigned long,
-    unsigned long, unsigned long);
-
-typedef struct {
-    uint8_t native;
-#ifdef CONFIG_COMPAT
-    uint8_t compat;
-#endif
-} hypercall_args_t;
-
-extern const hypercall_args_t hypercall_args_table[NR_hypercalls];
-
 #ifdef CONFIG_PV
 void pv_hypercall(struct cpu_user_regs *regs);
 #endif
@@ -56,4 +43,46 @@ compat_common_vcpu_op(
 
 #endif /* CONFIG_COMPAT */
 
+#ifndef NDEBUG
+static inline unsigned int _get_nargs(const unsigned char *tbl, unsigned int c)
+{
+    return tbl[c];
+}
+#define get_nargs(t, c) _get_nargs(t, array_index_nospec(c, ARRAY_SIZE(t)))
+#else
+#define get_nargs(tbl, c) 0
+#endif
+
+static inline void clobber_regs(struct cpu_user_regs *regs,
+                                unsigned int nargs)
+{
+#ifndef NDEBUG
+    /* Deliberately corrupt used parameter regs. */
+    switch ( nargs )
+    {
+    case 5: regs->r8  = 0xdeadbeefdeadf00dUL; fallthrough;
+    case 4: regs->r10 = 0xdeadbeefdeadf00dUL; fallthrough;
+    case 3: regs->rdx = 0xdeadbeefdeadf00dUL; fallthrough;
+    case 2: regs->rsi = 0xdeadbeefdeadf00dUL; fallthrough;
+    case 1: regs->rdi = 0xdeadbeefdeadf00dUL;
+    }
+#endif
+}
+
+static inline void clobber_regs32(struct cpu_user_regs *regs,
+                                  unsigned int nargs)
+{
+#ifndef NDEBUG
+    /* Deliberately corrupt used parameter regs. */
+    switch ( nargs )
+    {
+    case 5: regs->edi = 0xdeadf00dU; fallthrough;
+    case 4: regs->esi = 0xdeadf00dU; fallthrough;
+    case 3: regs->edx = 0xdeadf00dU; fallthrough;
+    case 2: regs->ecx = 0xdeadf00dU; fallthrough;
+    case 1: regs->ebx = 0xdeadf00dU;
+    }
+#endif
+}
+
 #endif /* __ASM_X86_HYPERCALL_H__ */
diff --git a/xen/arch/x86/pv/hypercall.c b/xen/arch/x86/pv/hypercall.c
index fe8dfe9e8f..bf64bb41bb 100644
--- a/xen/arch/x86/pv/hypercall.c
+++ b/xen/arch/x86/pv/hypercall.c
@@ -27,119 +27,22 @@
 #include <asm/multicall.h>
 #include <irq_vectors.h>
 
-typedef struct {
-    hypercall_fn_t *native;
-#ifdef CONFIG_PV32
-    hypercall_fn_t *compat;
-#endif
-} pv_hypercall_table_t;
-
+#ifndef NDEBUG
+static const unsigned char hypercall_args_64[] = hypercall_args_pv64;
 #ifdef CONFIG_PV32
-#define HYPERCALL(x)                                                \
-    [ __HYPERVISOR_ ## x ] = { (hypercall_fn_t *) do_ ## x,         \
-                               (hypercall_fn_t *) do_ ## x }
-#define COMPAT_CALL(x)                                              \
-    [ __HYPERVISOR_ ## x ] = { (hypercall_fn_t *) do_ ## x,         \
-                               (hypercall_fn_t *) compat_ ## x }
-#else
-#define HYPERCALL(x)                                                \
-    [ __HYPERVISOR_ ## x ] = { (hypercall_fn_t *) do_ ## x }
-#define COMPAT_CALL(x) HYPERCALL(x)
-#endif
-
-static const pv_hypercall_table_t pv_hypercall_table[] = {
-    COMPAT_CALL(set_trap_table),
-    HYPERCALL(mmu_update),
-    COMPAT_CALL(set_gdt),
-    HYPERCALL(stack_switch),
-    COMPAT_CALL(set_callbacks),
-    HYPERCALL(fpu_taskswitch),
-    HYPERCALL(sched_op_compat),
-#ifndef CONFIG_PV_SHIM_EXCLUSIVE
-    COMPAT_CALL(platform_op),
-#endif
-    HYPERCALL(set_debugreg),
-    HYPERCALL(get_debugreg),
-    COMPAT_CALL(update_descriptor),
-    COMPAT_CALL(memory_op),
-    COMPAT_CALL(multicall),
-    COMPAT_CALL(update_va_mapping),
-    COMPAT_CALL(set_timer_op),
-    HYPERCALL(event_channel_op_compat),
-    COMPAT_CALL(xen_version),
-    HYPERCALL(console_io),
-    COMPAT_CALL(physdev_op_compat),
-#if defined(CONFIG_GRANT_TABLE) || defined(CONFIG_PV_SHIM)
-    COMPAT_CALL(grant_table_op),
-#endif
-    HYPERCALL(vm_assist),
-    COMPAT_CALL(update_va_mapping_otherdomain),
-    COMPAT_CALL(iret),
-    COMPAT_CALL(vcpu_op),
-    HYPERCALL(set_segment_base),
-    COMPAT_CALL(mmuext_op),
-    COMPAT_CALL(xsm_op),
-    COMPAT_CALL(nmi_op),
-    COMPAT_CALL(sched_op),
-    COMPAT_CALL(callback_op),
-#ifdef CONFIG_XENOPROF
-    COMPAT_CALL(xenoprof_op),
-#endif
-    HYPERCALL(event_channel_op),
-    COMPAT_CALL(physdev_op),
-#ifndef CONFIG_PV_SHIM_EXCLUSIVE
-    HYPERCALL(sysctl),
-    HYPERCALL(domctl),
-#endif
-#ifdef CONFIG_KEXEC
-    COMPAT_CALL(kexec_op),
+static const unsigned char hypercall_args_32[] = hypercall_args_pv32;
 #endif
-#ifdef CONFIG_ARGO
-    COMPAT_CALL(argo_op),
 #endif
-    HYPERCALL(xenpmu_op),
-#ifdef CONFIG_HVM
-    HYPERCALL(hvm_op),
-    COMPAT_CALL(dm_op),
-#endif
-#ifdef CONFIG_HYPFS
-    HYPERCALL(hypfs_op),
-#endif
-    HYPERCALL(mca),
-#ifndef CONFIG_PV_SHIM_EXCLUSIVE
-    HYPERCALL(paging_domctl_cont),
-#endif
-};
-
-#undef COMPAT_CALL
-#undef HYPERCALL
 
 /* Forced inline to cause 'compat' to be evaluated at compile time. */
 static void always_inline
 _pv_hypercall(struct cpu_user_regs *regs, bool compat)
 {
     struct vcpu *curr = current;
-    unsigned long eax = compat ? regs->eax : regs->rax;
+    unsigned long eax;
 
     ASSERT(guest_kernel_mode(curr, regs));
 
-    BUILD_BUG_ON(ARRAY_SIZE(pv_hypercall_table) >
-                 ARRAY_SIZE(hypercall_args_table));
-
-    if ( eax >= ARRAY_SIZE(pv_hypercall_table) )
-    {
-        regs->rax = -ENOSYS;
-        return;
-    }
-
-    eax = array_index_nospec(eax, ARRAY_SIZE(pv_hypercall_table));
-
-    if ( !pv_hypercall_table[eax].native )
-    {
-        regs->rax = -ENOSYS;
-        return;
-    }
-
     curr->hcall_preempted = false;
 
     if ( !compat )
@@ -150,17 +53,8 @@ _pv_hypercall(struct cpu_user_regs *regs, bool compat)
         unsigned long r10 = regs->r10;
         unsigned long r8 = regs->r8;
 
-#ifndef NDEBUG
-        /* Deliberately corrupt parameter regs not used by this hypercall. */
-        switch ( hypercall_args_table[eax].native )
-        {
-        case 0: rdi = 0xdeadbeefdeadf00dUL; fallthrough;
-        case 1: rsi = 0xdeadbeefdeadf00dUL; fallthrough;
-        case 2: rdx = 0xdeadbeefdeadf00dUL; fallthrough;
-        case 3: r10 = 0xdeadbeefdeadf00dUL; fallthrough;
-        case 4: r8 = 0xdeadbeefdeadf00dUL;
-        }
-#endif
+        eax = regs->rax;
+
         if ( unlikely(tb_init_done) )
         {
             unsigned long args[5] = { rdi, rsi, rdx, r10, r8 };
@@ -168,22 +62,10 @@ _pv_hypercall(struct cpu_user_regs *regs, bool compat)
             __trace_hypercall(TRC_PV_HYPERCALL_V2, eax, args);
         }
 
-        regs->rax = pv_hypercall_table[eax].native(rdi, rsi, rdx, r10, r8);
+        call_handlers_pv64(eax, regs->rax, rdi, rsi, rdx, r10, r8);
 
-#ifndef NDEBUG
-        if ( !curr->hcall_preempted )
-        {
-            /* Deliberately corrupt parameter regs used by this hypercall. */
-            switch ( hypercall_args_table[eax].native )
-            {
-            case 5: regs->r8  = 0xdeadbeefdeadf00dUL; fallthrough;
-            case 4: regs->r10 = 0xdeadbeefdeadf00dUL; fallthrough;
-            case 3: regs->rdx = 0xdeadbeefdeadf00dUL; fallthrough;
-            case 2: regs->rsi = 0xdeadbeefdeadf00dUL; fallthrough;
-            case 1: regs->rdi = 0xdeadbeefdeadf00dUL;
-            }
-        }
-#endif
+        if ( !curr->hcall_preempted && regs->rax != -ENOSYS )
+            clobber_regs(regs, get_nargs(hypercall_args_64, eax));
     }
 #ifdef CONFIG_PV32
     else
@@ -194,17 +76,7 @@ _pv_hypercall(struct cpu_user_regs *regs, bool compat)
         unsigned int esi = regs->esi;
         unsigned int edi = regs->edi;
 
-#ifndef NDEBUG
-        /* Deliberately corrupt parameter regs not used by this hypercall. */
-        switch ( hypercall_args_table[eax].compat )
-        {
-        case 0: ebx = 0xdeadf00d; fallthrough;
-        case 1: ecx = 0xdeadf00d; fallthrough;
-        case 2: edx = 0xdeadf00d; fallthrough;
-        case 3: esi = 0xdeadf00d; fallthrough;
-        case 4: edi = 0xdeadf00d;
-        }
-#endif
+        eax = regs->eax;
 
         if ( unlikely(tb_init_done) )
         {
@@ -214,23 +86,11 @@ _pv_hypercall(struct cpu_user_regs *regs, bool compat)
         }
 
         curr->hcall_compat = true;
-        regs->eax = pv_hypercall_table[eax].compat(ebx, ecx, edx, esi, edi);
+        call_handlers_pv32(eax, regs->eax, ebx, ecx, edx, esi, edi);
         curr->hcall_compat = false;
 
-#ifndef NDEBUG
-        if ( !curr->hcall_preempted )
-        {
-            /* Deliberately corrupt parameter regs used by this hypercall. */
-            switch ( hypercall_args_table[eax].compat )
-            {
-            case 5: regs->edi = 0xdeadf00d; fallthrough;
-            case 4: regs->esi = 0xdeadf00d; fallthrough;
-            case 3: regs->edx = 0xdeadf00d; fallthrough;
-            case 2: regs->ecx = 0xdeadf00d; fallthrough;
-            case 1: regs->ebx = 0xdeadf00d;
-            }
-        }
-#endif
+        if ( !curr->hcall_preempted && regs->eax != -ENOSYS )
+            clobber_regs32(regs, get_nargs(hypercall_args_32, eax));
     }
 #endif /* CONFIG_PV32 */
 
@@ -256,13 +116,8 @@ enum mc_disposition pv_do_multicall_call(struct mc_state *state)
         struct compat_multicall_entry *call = &state->compat_call;
 
         op = call->op;
-        if ( (op < ARRAY_SIZE(pv_hypercall_table)) &&
-             pv_hypercall_table[op].compat )
-            call->result = pv_hypercall_table[op].compat(
-                call->args[0], call->args[1], call->args[2],
-                call->args[3], call->args[4]);
-        else
-            call->result = -ENOSYS;
+        call_handlers_pv32(op, call->result, call->args[0], call->args[1],
+                           call->args[2], call->args[3], call->args[4]);
     }
     else
 #endif
@@ -270,13 +125,8 @@ enum mc_disposition pv_do_multicall_call(struct mc_state *state)
         struct multicall_entry *call = &state->call;
 
         op = call->op;
-        if ( (op < ARRAY_SIZE(pv_hypercall_table)) &&
-             pv_hypercall_table[op].native )
-            call->result = pv_hypercall_table[op].native(
-                call->args[0], call->args[1], call->args[2],
-                call->args[3], call->args[4]);
-        else
-            call->result = -ENOSYS;
+        call_handlers_pv64(op, call->result, call->args[0], call->args[1],
+                           call->args[2], call->args[3], call->args[4]);
     }
 
     return unlikely(op == __HYPERVISOR_iret)
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 08:13:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 08:13:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294190.500088 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXIaw-0007v7-M1; Thu, 24 Mar 2022 08:13:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294190.500088; Thu, 24 Mar 2022 08:13:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXIaw-0007s8-BF; Thu, 24 Mar 2022 08:13:22 +0000
Received: by outflank-mailman (input) for mailman id 294190;
 Thu, 24 Mar 2022 08:13:20 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+IHq=UD=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXIau-0006uw-BG
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 08:13:20 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 425f4208-ab4a-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 09:13:17 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id F16121F38F;
 Thu, 24 Mar 2022 08:13:16 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id B3FB513B98;
 Thu, 24 Mar 2022 08:13:16 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id KJe7KhwoPGIpEwAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 24 Mar 2022 08:13:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 425f4208-ab4a-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648109596; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=IfItSZSW0o2H4xQgtklqjsDZtwba90rKZ+jpu4SrJ+k=;
	b=m+iNTLngLNHJVBJ12ZfZoy1QDHv4jbiJeIGfafd+3MG1a8+8WSzVTNJ31cjscqyCxSCqqj
	DsLtfI9TcqK8YMwgy4cbO1mxnrhujwj3jGvDPzqXvz2Z/DaYLyiQFpqAOgr85GvWQvB1bv
	mJ0RyhL9vmjigG49MHM4klZ64cNEyTk=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>,
	George Dunlap <george.dunlap@citrix.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>
Subject: [PATCH v5 05/10] xen: include compat/platform.h from hypercall.h
Date: Thu, 24 Mar 2022 09:13:07 +0100
Message-Id: <20220324081312.18222-6-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220324081312.18222-1-jgross@suse.com>
References: <20220324081312.18222-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

The definition of compat_platform_op_t is in compat/platform.h
already, so include that file from hypercall.h instead of repeating
the typedef.

This allows to remove the related include statement from
arch/x86/x86_64/platform_hypercall.c.

Signed-off-by: Juergen Gross <jgross@suse.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
---
V3:
- new patch
---
 xen/arch/x86/x86_64/platform_hypercall.c | 1 -
 xen/include/xen/hypercall.h              | 4 +++-
 2 files changed, 3 insertions(+), 2 deletions(-)

diff --git a/xen/arch/x86/x86_64/platform_hypercall.c b/xen/arch/x86/x86_64/platform_hypercall.c
index f84252bac6..7631058cce 100644
--- a/xen/arch/x86/x86_64/platform_hypercall.c
+++ b/xen/arch/x86/x86_64/platform_hypercall.c
@@ -6,7 +6,6 @@ EMIT_FILE;
 
 #include <xen/hypercall.h>
 #include <xen/lib.h>
-#include <compat/platform.h>
 
 #define xen_platform_op     compat_platform_op
 #define xen_platform_op_t   compat_platform_op_t
diff --git a/xen/include/xen/hypercall.h b/xen/include/xen/hypercall.h
index a032ba2b4a..ca8ee22717 100644
--- a/xen/include/xen/hypercall.h
+++ b/xen/include/xen/hypercall.h
@@ -15,6 +15,9 @@
 #include <public/version.h>
 #include <public/pmu.h>
 #include <public/hvm/dm_op.h>
+#ifdef CONFIG_COMPAT
+#include <compat/platform.h>
+#endif
 #include <asm/hypercall.h>
 #include <xsm/xsm.h>
 
@@ -206,7 +209,6 @@ extern int cf_check compat_multicall(
 
 int compat_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
 
-typedef struct compat_platform_op compat_platform_op_t;
 DEFINE_XEN_GUEST_HANDLE(compat_platform_op_t);
 int compat_platform_op(XEN_GUEST_HANDLE_PARAM(compat_platform_op_t) u_xenpf_op);
 
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 08:13:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 08:13:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294192.500107 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXIay-0008O6-JX; Thu, 24 Mar 2022 08:13:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294192.500107; Thu, 24 Mar 2022 08:13:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXIax-0008Lc-Vv; Thu, 24 Mar 2022 08:13:23 +0000
Received: by outflank-mailman (input) for mailman id 294192;
 Thu, 24 Mar 2022 08:13:21 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+IHq=UD=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXIav-0006uw-BO
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 08:13:21 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 42bec927-ab4a-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 09:13:17 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id A4DFB210F6;
 Thu, 24 Mar 2022 08:13:17 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 53C8213C4F;
 Thu, 24 Mar 2022 08:13:17 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id SIxFEx0oPGIpEwAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 24 Mar 2022 08:13:17 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 42bec927-ab4a-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648109597; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=DrpgpTGkFEv/IeXFwA2PDbf2FH7rXe4534vSynZIag4=;
	b=TPa5UHTty/DRSlBVlfbf30W24/2bUPLDbiByRhkqCJVX8loCH1sph6tN2bVfh9S31M8j8y
	BTR6Jal0Dge3nZQqcm6zCz5V/82rxSxbunqjOJltBgFjNZwQcHB6k/RMZnox0WLuWdeYy1
	ZeyBYJv0C4uNCAe6aCuGAgS2A4XvyvA=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Julien Grall <jgrall@amazon.com>
Subject: [PATCH v5 07/10] xen: use generated prototypes for hypercall handlers
Date: Thu, 24 Mar 2022 09:13:09 +0100
Message-Id: <20220324081312.18222-8-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220324081312.18222-1-jgross@suse.com>
References: <20220324081312.18222-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Remove the hypercall handler's prototypes in the related header files
and use the generated ones instead.

Some handlers having been static before need to be made globally
visible.

Signed-off-by: Juergen Gross <jgross@suse.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Julien Grall <jgrall@amazon.com>
---
 xen/arch/arm/include/asm/hypercall.h |   1 -
 xen/arch/x86/hvm/hypercall.c         |   7 +-
 xen/arch/x86/include/asm/hypercall.h | 141 ---------------------
 xen/include/xen/hypercall.h          | 177 +--------------------------
 4 files changed, 5 insertions(+), 321 deletions(-)

diff --git a/xen/arch/arm/include/asm/hypercall.h b/xen/arch/arm/include/asm/hypercall.h
index 8182895358..ccd26c5184 100644
--- a/xen/arch/arm/include/asm/hypercall.h
+++ b/xen/arch/arm/include/asm/hypercall.h
@@ -6,7 +6,6 @@
 #define __ASM_ARM_HYPERCALL_H__
 
 #include <public/domctl.h> /* for arch_do_domctl */
-int do_arm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
 
 long subarch_do_domctl(struct xen_domctl *domctl, struct domain *d,
                        XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl);
diff --git a/xen/arch/x86/hvm/hypercall.c b/xen/arch/x86/hvm/hypercall.c
index 3a35543997..a9c9ad721f 100644
--- a/xen/arch/x86/hvm/hypercall.c
+++ b/xen/arch/x86/hvm/hypercall.c
@@ -31,8 +31,7 @@
 #include <public/hvm/hvm_op.h>
 #include <public/hvm/params.h>
 
-static long cf_check hvm_memory_op(
-    unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long cf_check hvm_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     long rc;
 
@@ -52,7 +51,7 @@ static long cf_check hvm_memory_op(
 }
 
 #ifdef CONFIG_GRANT_TABLE
-static long cf_check hvm_grant_table_op(
+long cf_check hvm_grant_table_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) uop, unsigned int count)
 {
     switch ( cmd )
@@ -78,7 +77,7 @@ static long cf_check hvm_grant_table_op(
 }
 #endif
 
-static long cf_check hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long cf_check hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     const struct vcpu *curr = current;
     const struct domain *currd = curr->domain;
diff --git a/xen/arch/x86/include/asm/hypercall.h b/xen/arch/x86/include/asm/hypercall.h
index 81ca25f7b3..2d243b48bc 100644
--- a/xen/arch/x86/include/asm/hypercall.h
+++ b/xen/arch/x86/include/asm/hypercall.h
@@ -44,109 +44,6 @@ void pv_ring3_init_hypercall_page(void *ptr);
  */
 #define MMU_UPDATE_PREEMPTED          (~(~0U>>1))
 
-extern long cf_check
-do_event_channel_op_compat(
-    XEN_GUEST_HANDLE_PARAM(evtchn_op_t) uop);
-
-/* Legacy hypercall (as of 0x00030202). */
-extern long cf_check do_physdev_op_compat(
-    XEN_GUEST_HANDLE(physdev_op_t) uop);
-
-/* Legacy hypercall (as of 0x00030101). */
-extern long cf_check do_sched_op_compat(
-    int cmd, unsigned long arg);
-
-extern long cf_check
-do_set_trap_table(
-    XEN_GUEST_HANDLE_PARAM(const_trap_info_t) traps);
-
-extern long cf_check
-do_mmu_update(
-    XEN_GUEST_HANDLE_PARAM(mmu_update_t) ureqs,
-    unsigned int count,
-    XEN_GUEST_HANDLE_PARAM(uint) pdone,
-    unsigned int foreigndom);
-
-extern long cf_check
-do_set_gdt(
-    XEN_GUEST_HANDLE_PARAM(xen_ulong_t) frame_list,
-    unsigned int entries);
-
-extern long cf_check
-do_stack_switch(
-    unsigned long ss,
-    unsigned long esp);
-
-extern long cf_check
-do_fpu_taskswitch(
-    int set);
-
-extern long cf_check
-do_set_debugreg(
-    int reg,
-    unsigned long value);
-
-extern long cf_check
-do_get_debugreg(
-    int reg);
-
-extern long cf_check
-do_update_descriptor(
-    uint64_t gaddr, seg_desc_t desc);
-
-extern long cf_check
-do_mca(XEN_GUEST_HANDLE_PARAM(xen_mc_t) u_xen_mc);
-
-extern long cf_check
-do_update_va_mapping(
-    unsigned long va,
-    uint64_t val64,
-    unsigned long flags);
-
-extern long cf_check
-do_physdev_op(
-    int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern long cf_check
-do_update_va_mapping_otherdomain(
-    unsigned long va,
-    uint64_t val64,
-    unsigned long flags,
-    domid_t domid);
-
-extern long cf_check
-do_mmuext_op(
-    XEN_GUEST_HANDLE_PARAM(mmuext_op_t) uops,
-    unsigned int count,
-    XEN_GUEST_HANDLE_PARAM(uint) pdone,
-    unsigned int foreigndom);
-
-extern long cf_check do_callback_op(
-    int cmd, XEN_GUEST_HANDLE_PARAM(const_void) arg);
-
-extern long cf_check
-do_iret(
-    void);
-
-extern long cf_check
-do_set_callbacks(
-    unsigned long event_address,
-    unsigned long failsafe_address,
-    unsigned long syscall_address);
-
-extern long cf_check
-do_set_segment_base(
-    unsigned int which,
-    unsigned long base);
-
-long cf_check do_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
-
-long cf_check do_xenpmu_op(unsigned int op,
-                           XEN_GUEST_HANDLE_PARAM(xen_pmu_params_t) arg);
-
-long cf_check do_paging_domctl_cont(
-    XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl);
-
 #ifdef CONFIG_COMPAT
 
 #include <compat/arch-x86/xen.h>
@@ -157,44 +54,6 @@ extern int
 compat_common_vcpu_op(
     int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg);
 
-extern int cf_check compat_mmuext_op(
-    XEN_GUEST_HANDLE_PARAM(void) arg,
-    unsigned int count,
-    XEN_GUEST_HANDLE_PARAM(uint) pdone,
-    unsigned int foreigndom);
-
-extern int cf_check compat_callback_op(
-    int cmd, XEN_GUEST_HANDLE(const_void) arg);
-
-extern int cf_check compat_update_va_mapping(
-    unsigned int va, uint32_t lo, uint32_t hi, unsigned int flags);
-
-extern int cf_check compat_update_va_mapping_otherdomain(
-    unsigned int va, uint32_t lo, uint32_t hi, unsigned int flags, domid_t domid);
-
-DEFINE_XEN_GUEST_HANDLE(trap_info_compat_t);
-extern int cf_check compat_set_trap_table(
-    XEN_GUEST_HANDLE(trap_info_compat_t) traps);
-
-extern int cf_check compat_set_gdt(
-    XEN_GUEST_HANDLE_PARAM(uint) frame_list, unsigned int entries);
-
-extern int cf_check compat_update_descriptor(
-    uint32_t pa_lo, uint32_t pa_hi, uint32_t desc_lo, uint32_t desc_hi);
-
-extern int cf_check compat_iret(void);
-
-extern int cf_check compat_nmi_op(
-    unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern int cf_check compat_set_callbacks(
-    unsigned long event_selector, unsigned long event_address,
-    unsigned long failsafe_selector, unsigned long failsafe_address);
-
-DEFINE_XEN_GUEST_HANDLE(physdev_op_compat_t);
-extern int cf_check compat_physdev_op_compat(
-    XEN_GUEST_HANDLE(physdev_op_compat_t) uop);
-
 #endif /* CONFIG_COMPAT */
 
 #endif /* __ASM_X86_HYPERCALL_H__ */
diff --git a/xen/include/xen/hypercall.h b/xen/include/xen/hypercall.h
index ca8ee22717..f307dfb597 100644
--- a/xen/include/xen/hypercall.h
+++ b/xen/include/xen/hypercall.h
@@ -21,33 +21,19 @@
 #include <asm/hypercall.h>
 #include <xsm/xsm.h>
 
-extern long cf_check
-do_sched_op(
-    int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern long cf_check
-do_domctl(
-    XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl);
+/* Needs to be after asm/hypercall.h. */
+#include <xen/hypercall-defs.h>
 
 extern long
 arch_do_domctl(
     struct xen_domctl *domctl, struct domain *d,
     XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl);
 
-extern long cf_check
-do_sysctl(
-    XEN_GUEST_HANDLE_PARAM(xen_sysctl_t) u_sysctl);
-
 extern long
 arch_do_sysctl(
     struct xen_sysctl *sysctl,
     XEN_GUEST_HANDLE_PARAM(xen_sysctl_t) u_sysctl);
 
-extern long cf_check
-do_platform_op(
-    XEN_GUEST_HANDLE_PARAM(xen_platform_op_t) u_xenpf_op);
-
 extern long
 pci_physdev_op(
     int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
@@ -65,170 +51,11 @@ pci_physdev_op(
 #define MEMOP_EXTENT_SHIFT 6 /* cmd[:6] == start_extent */
 #define MEMOP_CMD_MASK     ((1 << MEMOP_EXTENT_SHIFT) - 1)
 
-extern long cf_check
-do_memory_op(
-    unsigned long cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern long cf_check
-do_multicall(
-    XEN_GUEST_HANDLE_PARAM(multicall_entry_t) call_list,
-    unsigned int nr_calls);
-
-extern long cf_check
-do_set_timer_op(
-    s_time_t timeout);
-
-extern long cf_check
-do_event_channel_op(
-    int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern long cf_check
-do_xen_version(
-    int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern long cf_check
-do_console_io(
-    unsigned int cmd,
-    unsigned int count,
-    XEN_GUEST_HANDLE_PARAM(char) buffer);
-
-extern long cf_check
-do_grant_table_op(
-    unsigned int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) uop,
-    unsigned int count);
-
-extern long cf_check
-do_vm_assist(
-    unsigned int cmd,
-    unsigned int type);
-
-extern long cf_check
-do_vcpu_op(
-    int cmd,
-    unsigned int vcpuid,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-struct vcpu;
 extern long
 common_vcpu_op(int cmd,
     struct vcpu *v,
     XEN_GUEST_HANDLE_PARAM(void) arg);
 
-extern long cf_check
-do_hvm_op(
-    unsigned long op,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern long cf_check
-do_kexec_op(
-    unsigned int op,
-    XEN_GUEST_HANDLE_PARAM(void) uarg);
-
-extern long cf_check
-do_xsm_op(
-    XEN_GUEST_HANDLE_PARAM(void) u_xsm_op);
-
-#ifdef CONFIG_ARGO
-extern long cf_check do_argo_op(
-    unsigned int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg1,
-    XEN_GUEST_HANDLE_PARAM(void) arg2,
-    unsigned long arg3,
-    unsigned long arg4);
-#endif
-
-extern long cf_check
-do_xenoprof_op(int op, XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern long cf_check
-do_dm_op(
-    domid_t domid,
-    unsigned int nr_bufs,
-    XEN_GUEST_HANDLE_PARAM(xen_dm_op_buf_t) bufs);
-
-#ifdef CONFIG_HYPFS
-extern long cf_check
-do_hypfs_op(
-    unsigned int cmd,
-    XEN_GUEST_HANDLE_PARAM(const_char) arg1,
-    unsigned long arg2,
-    XEN_GUEST_HANDLE_PARAM(void) arg3,
-    unsigned long arg4);
-#endif
-
-#ifdef CONFIG_COMPAT
-
-extern int cf_check
-compat_memory_op(
-    unsigned int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern int cf_check
-compat_grant_table_op(
-    unsigned int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) uop,
-    unsigned int count);
-
-extern int cf_check
-compat_vcpu_op(
-    int cmd,
-    unsigned int vcpuid,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern int cf_check
-compat_xenoprof_op(int op, XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern int cf_check
-compat_xen_version(
-    int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern int cf_check
-compat_sched_op(
-    int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern int cf_check
-compat_set_timer_op(
-    uint32_t lo,
-    int32_t hi);
-
-extern int cf_check compat_xsm_op(
-    XEN_GUEST_HANDLE_PARAM(void) op);
-
-extern int cf_check compat_kexec_op(
-    unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg);
-
-DEFINE_XEN_GUEST_HANDLE(multicall_entry_compat_t);
-extern int cf_check compat_multicall(
-    XEN_GUEST_HANDLE_PARAM(multicall_entry_compat_t) call_list,
-    uint32_t nr_calls);
-
-int compat_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
-
-DEFINE_XEN_GUEST_HANDLE(compat_platform_op_t);
-int compat_platform_op(XEN_GUEST_HANDLE_PARAM(compat_platform_op_t) u_xenpf_op);
-
-#ifdef CONFIG_ARGO
-extern int cf_check compat_argo_op(
-    unsigned int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg1,
-    XEN_GUEST_HANDLE_PARAM(void) arg2,
-    unsigned long arg3,
-    unsigned long arg4);
-#endif
-
-extern int cf_check
-compat_dm_op(
-    domid_t domid,
-    unsigned int nr_bufs,
-    XEN_GUEST_HANDLE_PARAM(void) bufs);
-
-#endif
-
 void arch_get_xen_caps(xen_capabilities_info_t *info);
 
 #endif /* __XEN_HYPERCALL_H__ */
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 08:13:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 08:13:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294184.500038 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXIas-0006vJ-Hm; Thu, 24 Mar 2022 08:13:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294184.500038; Thu, 24 Mar 2022 08:13:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXIas-0006v8-Du; Thu, 24 Mar 2022 08:13:18 +0000
Received: by outflank-mailman (input) for mailman id 294184;
 Thu, 24 Mar 2022 08:13:17 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+IHq=UD=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXIar-0006ux-Jj
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 08:13:17 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4193b57c-ab4a-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 09:13:16 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id A1F23210E4;
 Thu, 24 Mar 2022 08:13:15 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 6E16613B98;
 Thu, 24 Mar 2022 08:13:15 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id WNGZGRsoPGIpEwAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 24 Mar 2022 08:13:15 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4193b57c-ab4a-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648109595; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=XRQkQM3nkX048Co0Ei4MgctIFOzk/2kWV1vK88mLPKE=;
	b=ncIXpUgOyhiseKvoEXjWOT0jwyemrN8QMJ8gtYurzvzUcqlZNE5X185rc2LH262IeZPhAH
	nIJEI0QJ8mrmnBd3DpF5KE+udbPfehWKhEIjrUeqJ9SepvIsRzuhDrM+XAntq2EaWeJZx3
	Jznq39XSKVAMEIwLXD2vhbkwL7quw/I=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Julien Grall <jgrall@amazon.com>
Subject: [PATCH v5 01/10] xen/arm: rename do_phydev_op() to do_arm_physdev_op()
Date: Thu, 24 Mar 2022 09:13:03 +0100
Message-Id: <20220324081312.18222-2-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220324081312.18222-1-jgross@suse.com>
References: <20220324081312.18222-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

do_physdev_op() prototypes on Arm and x86 differ in their return type,
so rename the Arm one in order to prepare using a common generated
header file.

Signed-off-by: Juergen Gross <jgross@suse.com>
Acked-by: Julien Grall <jgrall@amazon.com>
---
V4:
- new patch
---
 xen/arch/arm/include/asm/hypercall.h | 2 +-
 xen/arch/arm/physdev.c               | 2 +-
 xen/arch/arm/traps.c                 | 2 +-
 3 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/xen/arch/arm/include/asm/hypercall.h b/xen/arch/arm/include/asm/hypercall.h
index a0c5a31a2f..39d2e7889d 100644
--- a/xen/arch/arm/include/asm/hypercall.h
+++ b/xen/arch/arm/include/asm/hypercall.h
@@ -2,7 +2,7 @@
 #define __ASM_ARM_HYPERCALL_H__
 
 #include <public/domctl.h> /* for arch_do_domctl */
-int do_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
+int do_arm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
 
 long do_arm_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg);
 
diff --git a/xen/arch/arm/physdev.c b/xen/arch/arm/physdev.c
index f9aa274dda..95a8cdc0ee 100644
--- a/xen/arch/arm/physdev.c
+++ b/xen/arch/arm/physdev.c
@@ -11,7 +11,7 @@
 #include <xen/hypercall.h>
 
 
-int do_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+int do_arm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
 #ifdef CONFIG_HAS_PCI
     return pci_physdev_op(cmd, arg);
diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
index 11f970d926..43f30747cf 100644
--- a/xen/arch/arm/traps.c
+++ b/xen/arch/arm/traps.c
@@ -1371,7 +1371,7 @@ static arm_hypercall_t arm_hypercall_table[] = {
     HYPERCALL(xsm_op, 1),
     HYPERCALL(event_channel_op, 2),
     HYPERCALL_DEPRECATED(event_channel_op_compat, 1),
-    HYPERCALL(physdev_op, 2),
+    HYPERCALL_ARM(physdev_op, 2),
     HYPERCALL_DEPRECATED(physdev_op_compat, 1),
     HYPERCALL(sysctl, 2),
     HYPERCALL(hvm_op, 2),
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 08:13:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 08:13:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294189.500077 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXIav-0007fY-O6; Thu, 24 Mar 2022 08:13:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294189.500077; Thu, 24 Mar 2022 08:13:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXIav-0007cG-CZ; Thu, 24 Mar 2022 08:13:21 +0000
Received: by outflank-mailman (input) for mailman id 294189;
 Thu, 24 Mar 2022 08:13:19 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+IHq=UD=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXIat-0006ux-DF
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 08:13:19 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 42940c64-ab4a-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 09:13:17 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 4E0911F391;
 Thu, 24 Mar 2022 08:13:17 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 0734E13B98;
 Thu, 24 Mar 2022 08:13:17 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id 2JqHAB0oPGIpEwAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 24 Mar 2022 08:13:17 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 42940c64-ab4a-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648109597; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=g0HNr+GNjkvWOdjc6NuCMGxPR9ugdYNAjE7zoYxjkw8=;
	b=eEiJk0niev5kGEbZclXH+3v8+ks1obh4WeYRaVvtVY0g6upeqr3PG2Ls3o6LyZeLhZO6Hr
	uUVNG6avh+9RQdKYS9I1sz5vwMwJIKhoSf1hkw59YpDdmuL7xMaG6Lb0ldpLCU63IK3H2l
	S8m9kCE34T8CbHDjd8ilX3knlJgCebI=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Julien Grall <jgrall@amazon.com>
Subject: [PATCH v5 06/10] xen: generate hypercall interface related code
Date: Thu, 24 Mar 2022 09:13:08 +0100
Message-Id: <20220324081312.18222-7-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220324081312.18222-1-jgross@suse.com>
References: <20220324081312.18222-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Instead of repeating similar data multiple times use a single source
file and a generator script for producing prototypes and call sequences
of the hypercalls.

As the script already knows the number of parameters used add generating
a macro for populating an array with the number of parameters per
hypercall.

The priorities for the specific hypercalls are based on two benchamrks
performed in guests (PV and PVH):

- make -j 4 of the Xen hypervisor (resulting in cpu load with lots of
  processes created)
- scp of a large file to the guest (network load)

With a small additional debug patch applied the number of the
different hypercalls in the guest and in dom0 (for looking at backend
activity related hypercalls) were counted while the benchmark in domU
was running:

PV-hypercall    PV-guest build   PV-guest scp    dom0 build     dom0 scp
mmu_update           186175729           2865         20936        33725
stack_switch           1273311          62381        108589       270764
multicall              2182803             50           302          524
update_va_mapping       571868             10            60           80
xen_version              73061            850           859         5432
grant_table_op               0              0         35557       139110
iret                  75673006         484132        268157       757958
vcpu_op                 453037          71199        138224       334988
set_segment_base       1650249          62387        108645       270823
mmuext_op             11225681            188          7239         3426
sched_op                280153         134645         70729       137943
event_channel_op        192327          66204         71409       214191
physdev_op                   0              0          7721         4315
(the dom0 values are for the guest running the build or scp test, so
dom0 acting as backend)

HVM-hypercall   PVH-guest build    PVH-guest scp
vcpu_op                  277684             2324
event_channel_op         350233            57383
(the related dom0 counter values are in the same range as with the test
running in the PV guest)

Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Julien Grall <jgrall@amazon.com>
---
V2:
- split platform_op for doe and compat prefixes (Jan Beulich)
- add "addline:" directive
- add priorities to handlers (Jan Beulich)
V2.1:
- add missing "delete" statement in awk script
- optimize case of 2 hypercalls with same priority
V2.2:
- avoid asort() function (Michal Orzel)
V3:
- drop "addline:" support, as no longer needed
- enclose call sequence macros in "({ ... })" (Jan Beulich)
- small style adjustment (Jan Beulich)
- move generating to xen/include/Makefile (Anthony PERARD)
V4:
- generate cf_check attribute for prototype (will be removed in later patch)
- add Arm-specific variant of physdev_op()
V5:
- user $(srctree) (Anthony Perard)
- specify priority 1 for arm evtchn_op (Julien Grall)
---
 .gitignore                    |   1 +
 xen/include/Makefile          |  13 ++
 xen/include/hypercall-defs.c  | 285 ++++++++++++++++++++++++++++++
 xen/scripts/gen_hypercall.awk | 314 ++++++++++++++++++++++++++++++++++
 4 files changed, 613 insertions(+)
 create mode 100644 xen/include/hypercall-defs.c
 create mode 100644 xen/scripts/gen_hypercall.awk

diff --git a/.gitignore b/.gitignore
index d425be4bd9..c6e5b31b98 100644
--- a/.gitignore
+++ b/.gitignore
@@ -324,6 +324,7 @@ xen/include/public/public
 xen/include/xen/*.new
 xen/include/xen/acm_policy.h
 xen/include/xen/compile.h
+xen/include/xen/hypercall-defs.h
 xen/include/xen/lib/x86/cpuid-autogen.h
 xen/test/livepatch/config.h
 xen/test/livepatch/expect_config.h
diff --git a/xen/include/Makefile b/xen/include/Makefile
index a3c2511f5f..dfc43f9fba 100644
--- a/xen/include/Makefile
+++ b/xen/include/Makefile
@@ -77,6 +77,18 @@ $(obj)/compat/xlat.h: $(addprefix $(obj)/compat/.xlat/,$(xlat-y)) $(obj)/config/
 	cat $(filter %.h,$^) >$@.new
 	mv -f $@.new $@
 
+quiet_cmd_genhyp = GEN     $@
+define cmd_genhyp
+    awk -f $(srctree)/scripts/gen_hypercall.awk <$< >$@
+endef
+
+all: $(obj)/xen/hypercall-defs.h
+
+$(obj)/xen/hypercall-defs.h: $(obj)/hypercall-defs.i $(srctree)/scripts/gen_hypercall.awk FORCE
+	$(call if_changed,genhyp)
+
+targets += xen/hypercall-defs.h
+
 ifeq ($(XEN_TARGET_ARCH),$(XEN_COMPILE_ARCH))
 
 all: $(obj)/headers.chk $(obj)/headers99.chk $(obj)/headers++.chk
@@ -132,3 +144,4 @@ all: lib-x86-all
 endif
 
 clean-files := compat config generated headers*.chk xen/lib/x86/cpuid-autogen.h
+clean-files += xen/hypercall-defs.h hypercall-defs.i
diff --git a/xen/include/hypercall-defs.c b/xen/include/hypercall-defs.c
new file mode 100644
index 0000000000..60cbeb18e4
--- /dev/null
+++ b/xen/include/hypercall-defs.c
@@ -0,0 +1,285 @@
+/*
+ * Hypercall interface description:
+ * Used by scripts/gen_hypercall.awk to generate hypercall prototypes and call
+ * sequences.
+ *
+ * Syntax is like a prototype, but without return type and without the ";" at
+ * the end. Pointer types will be automatically converted to use the
+ * XEN_GUEST_HANDLE_PARAM() macro. Handlers with no parameters just use a
+ * definition like "fn()".
+ * Hypercall/function names are without the leading "__HYPERVISOR_"/"do_"
+ * strings.
+ *
+ * The return type of a class of prototypes using the same prefix is set via:
+ * rettype: <prefix> <type>
+ * Default return type is "long". A return type for a prefix can be set only
+ * once and it needs to be set before that prefix is being used via the
+ * "prefix:" directive.
+ *
+ * The prefix of the prototypes is set via a line:
+ * prefix: <prefix> ...
+ * Multiple prefixes are possible (restriction see below). Prefixes are without
+ * a trailing "_". The current prefix settings are active until a new "prefix:"
+ * line.
+ *
+ * Caller macros are suffixed with a selectable name via lines like:
+ * caller: <suffix>
+ * When a caller suffix is active, there is only one active prefix allowed.
+ *
+ * With a "defhandle:" line it is possible to add a DEFINE_XEN_GUEST_HANDLE()
+ * to the generated header:
+ * defhandle: <handle-type> [<type>]
+ * Without specifying <type> only a DEFINE_XEN_GUEST_HANDLE(<handle-type>)
+ * will be generated, otherwise it will be a
+ * __DEFINE_XEN_GUEST_HANDLE(<handle-type>, <type>) being generated. Note that
+ * the latter will include the related "const" handle "const_<handle-type>".
+ *
+ * In order to support using coding style compliant pointers in the
+ * prototypes it is possible to add translation entries to generate the correct
+ * handle types:
+ * handle: <handle-type> <type>
+ * This will result in the prototype translation from "<type> *" to
+ * "XEN_GUEST_HANDLE_PARAM(<handle-type>)".
+ *
+ * The hypercall handler calling code will be generated from a final table in
+ * the source file, which is started via the line:
+ * table: <caller> <caller> ...
+ * with the <caller>s specifying the designated caller macro of each column of
+ * the table. Any column of a <caller> not having been set via a "caller:"
+ * line will be ignored.
+ * The first column of the table contains the hypercall/prototype, each
+ * <caller> column contains the prefix for the function to use for that caller.
+ * A function prefix can be annotated with a priority by adding ":<prio>" to it
+ * ("1" being the highest priority, higher numbers mean lower priority, no
+ * priority specified is the lowest priority). The generated code will try to
+ * achieve better performance for calling high priority handlers.
+ * A column not being supported by a <caller> is marked with "-". Lines with all
+ * entries being "-" after removal of inactive <caller> columns are ignored.
+ *
+ * This file is being preprocessed using $(CPP), so #ifdef CONFIG_* conditionals
+ * are possible.
+ */
+
+#ifdef CONFIG_HVM
+#define PREFIX_hvm hvm
+#else
+#define PREFIX_hvm
+#endif
+
+#ifdef CONFIG_COMPAT
+#define PREFIX_compat compat
+rettype: compat int
+#else
+#define PREFIX_compat
+#endif
+
+#ifdef CONFIG_ARM
+#define PREFIX_dep dep
+#define PREFIX_do_arm do_arm
+rettype: do_arm int
+#else
+#define PREFIX_dep
+#define PREFIX_do_arm
+#endif
+
+handle: uint unsigned int
+handle: const_void const void
+handle: const_char const char
+
+#ifdef CONFIG_COMPAT
+defhandle: multicall_entry_compat_t
+#ifndef CONFIG_PV_SHIM_EXCLUSIVE
+defhandle: compat_platform_op_t
+#endif
+#endif
+#ifdef CONFIG_PV32
+defhandle: trap_info_compat_t
+defhandle: physdev_op_compat_t
+#endif
+
+prefix: do PREFIX_hvm PREFIX_compat PREFIX_do_arm
+physdev_op(int cmd, void *arg)
+
+prefix: do PREFIX_hvm PREFIX_compat
+#if defined(CONFIG_GRANT_TABLE) || defined(CONFIG_PV_SHIM)
+grant_table_op(unsigned int cmd, void *uop, unsigned int count)
+#endif
+
+prefix: do PREFIX_hvm
+memory_op(unsigned long cmd, void *arg)
+
+prefix: do PREFIX_compat
+xen_version(int cmd, void *arg)
+vcpu_op(int cmd, unsigned int vcpuid, void *arg)
+sched_op(int cmd, void *arg)
+xsm_op(void *op)
+callback_op(int cmd, const void *arg)
+#ifdef CONFIG_ARGO
+argo_op(unsigned int cmd, void *arg1, void *arg2, unsigned long arg3, unsigned long arg4)
+#endif
+#ifdef CONFIG_KEXEC
+kexec_op(unsigned int op, void *uarg)
+#endif
+#ifdef CONFIG_PV
+iret()
+nmi_op(unsigned int cmd, void *arg)
+#ifdef CONFIG_XENOPROF
+xenoprof_op(int op, void *arg)
+#endif
+#endif /* CONFIG_PV */
+
+#ifdef CONFIG_COMPAT
+prefix: compat
+set_timer_op(uint32_t lo, int32_t hi)
+multicall(multicall_entry_compat_t *call_list, uint32_t nr_calls)
+memory_op(unsigned int cmd, void *arg)
+#ifdef CONFIG_IOREQ_SERVER
+dm_op(domid_t domid, unsigned int nr_bufs, void *bufs)
+#endif
+mmuext_op(void *arg, unsigned int count, uint *pdone, unsigned int foreigndom)
+#ifdef CONFIG_PV32
+set_trap_table(trap_info_compat_t *traps)
+set_gdt(unsigned int *frame_list, unsigned int entries)
+set_callbacks(unsigned long event_selector, unsigned long event_address, unsigned long failsafe_selector, unsigned long failsafe_address)
+update_descriptor(uint32_t pa_lo, uint32_t pa_hi, uint32_t desc_lo, uint32_t desc_hi)
+update_va_mapping(unsigned int va, uint32_t lo, uint32_t hi, unsigned int flags)
+physdev_op_compat(physdev_op_compat_t *uop)
+update_va_mapping_otherdomain(unsigned int va, uint32_t lo, uint32_t hi, unsigned int flags, domid_t domid)
+#endif
+#ifndef CONFIG_PV_SHIM_EXCLUSIVE
+platform_op(compat_platform_op_t *u_xenpf_op)
+#endif
+#endif /* CONFIG_COMPAT */
+
+#if defined(CONFIG_PV) || defined(CONFIG_ARM)
+prefix: do PREFIX_dep
+event_channel_op_compat(evtchn_op_t *uop)
+physdev_op_compat(physdev_op_t *uop)
+/* Legacy hypercall (as of 0x00030101). */
+sched_op_compat(int cmd, unsigned long arg)
+#endif
+
+prefix: do
+set_timer_op(s_time_t timeout)
+console_io(unsigned int cmd, unsigned int count, char *buffer)
+vm_assist(unsigned int cmd, unsigned int type)
+event_channel_op(int cmd, void *arg)
+mmuext_op(mmuext_op_t *uops, unsigned int count, unsigned int *pdone, unsigned int foreigndom)
+multicall(multicall_entry_t *call_list, unsigned int nr_calls)
+#ifdef CONFIG_PV
+mmu_update(mmu_update_t *ureqs, unsigned int count, unsigned int *pdone, unsigned int foreigndom)
+stack_switch(unsigned long ss, unsigned long esp)
+fpu_taskswitch(int set)
+set_debugreg(int reg, unsigned long value)
+get_debugreg(int reg)
+set_segment_base(unsigned int which, unsigned long base)
+mca(xen_mc_t *u_xen_mc)
+set_trap_table(const_trap_info_t *traps)
+set_gdt(xen_ulong_t *frame_list, unsigned int entries)
+set_callbacks(unsigned long event_address, unsigned long failsafe_address, unsigned long syscall_address)
+update_descriptor(uint64_t gaddr, seg_desc_t desc)
+update_va_mapping(unsigned long va, uint64_t val64, unsigned long flags)
+update_va_mapping_otherdomain(unsigned long va, uint64_t val64, unsigned long flags, domid_t domid)
+#endif
+#ifdef CONFIG_IOREQ_SERVER
+dm_op(domid_t domid, unsigned int nr_bufs, xen_dm_op_buf_t *bufs)
+#endif
+#ifndef CONFIG_PV_SHIM_EXCLUSIVE
+sysctl(xen_sysctl_t *u_sysctl)
+domctl(xen_domctl_t *u_domctl)
+paging_domctl_cont(xen_domctl_t *u_domctl)
+platform_op(xen_platform_op_t *u_xenpf_op)
+#endif
+#ifdef CONFIG_HVM
+hvm_op(unsigned long op, void *arg)
+#endif
+#ifdef CONFIG_HYPFS
+hypfs_op(unsigned int cmd, const char *arg1, unsigned long arg2, void *arg3, unsigned long arg4)
+#endif
+#ifdef CONFIG_X86
+xenpmu_op(unsigned int op, xen_pmu_params_t *arg)
+#endif
+
+#ifdef CONFIG_PV
+caller: pv64
+#ifdef CONFIG_PV32
+caller: pv32
+#endif
+#endif
+#if defined(CONFIG_HVM) && defined(CONFIG_X86)
+caller: hvm64
+#ifdef CONFIG_COMPAT
+caller: hvm32
+#endif
+#endif
+#ifdef CONFIG_ARM
+caller: arm
+#endif
+
+table:                             pv32     pv64     hvm32    hvm64    arm
+set_trap_table                     compat   do       -        -        -
+mmu_update                         do:1     do:1     -        -        -
+set_gdt                            compat   do       -        -        -
+stack_switch                       do:2     do:2     -        -        -
+set_callbacks                      compat   do       -        -        -
+fpu_taskswitch                     do       do       -        -        -
+sched_op_compat                    do       do       -        -        dep
+#ifndef CONFIG_PV_SHIM_EXCLUSIVE
+platform_op                        compat   do       compat   do       do
+#endif
+set_debugreg                       do       do       -        -        -
+get_debugreg                       do       do       -        -        -
+update_descriptor                  compat   do       -        -        -
+memory_op                          compat   do       hvm      hvm      do
+multicall                          compat:2 do:2     compat   do       do
+update_va_mapping                  compat   do       -        -        -
+set_timer_op                       compat   do       compat   do       -
+event_channel_op_compat            do       do       -        -        dep
+xen_version                        compat   do       compat   do       do
+console_io                         do       do       do       do       do
+physdev_op_compat                  compat   do       -        -        dep
+#if defined(CONFIG_GRANT_TABLE) || defined(CONFIG_PV_SHIM)
+grant_table_op                     compat   do       hvm      hvm      do
+#endif
+vm_assist                          do       do       do       do       do
+update_va_mapping_otherdomain      compat   do       -        -        -
+iret                               compat:1 do:1     -        -        -
+vcpu_op                            compat   do       compat:1 do:1     do
+set_segment_base                   do:2     do:2     -        -        -
+#ifdef CONFIG_PV
+mmuext_op                          compat:2 do:2     compat   do       -
+#endif
+xsm_op                             compat   do       compat   do       do
+nmi_op                             compat   do       -        -        -
+sched_op                           compat   do       compat   do       do
+callback_op                        compat   do       -        -        -
+#ifdef CONFIG_XENOPROF
+xenoprof_op                        compat   do       -        -        -
+#endif
+event_channel_op                   do       do       do:1     do:1     do:1
+physdev_op                         compat   do       hvm      hvm      do_arm
+#ifdef CONFIG_HVM
+hvm_op                             do       do       do       do       do
+#endif
+#ifndef CONFIG_PV_SHIM_EXCLUSIVE
+sysctl                             do       do       do       do       do
+domctl                             do       do       do       do       do
+#endif
+#ifdef CONFIG_KEXEC
+kexec_op                           compat   do       -        -        -
+#endif
+tmem_op                            -        -        -        -        -
+#ifdef CONFIG_ARGO
+argo_op                            compat   do       compat   do       do
+#endif
+xenpmu_op                          do       do       do       do       -
+#ifdef CONFIG_IOREQ_SERVER
+dm_op                              compat   do       compat   do       do
+#endif
+#ifdef CONFIG_HYPFS
+hypfs_op                           do       do       do       do       do
+#endif
+mca                                do       do       -        -        -
+#ifndef CONFIG_PV_SHIM_EXCLUSIVE
+paging_domctl_cont                 do       do       do       do       -
+#endif
diff --git a/xen/scripts/gen_hypercall.awk b/xen/scripts/gen_hypercall.awk
new file mode 100644
index 0000000000..403758be21
--- /dev/null
+++ b/xen/scripts/gen_hypercall.awk
@@ -0,0 +1,314 @@
+# awk script to generate hypercall handler prototypes and a macro for doing
+# the calls of the handlers inside a switch() statement.
+
+BEGIN {
+    printf("/* Generated file, do not edit! */\n\n");
+    e = 0;
+    n = 0;
+    p = 0;
+    nc = 0;
+}
+
+# Issue error to stderr
+function do_err(msg) {
+    print "Error: "msg": "$0 >"/dev/stderr";
+    exit 1;
+}
+
+# Generate handler call
+function do_call(f, p,    i) {
+    printf("            ret = %s_%s(", pre[f, p], fn[f]);
+    for (i = 1; i <= n_args[f]; i++) {
+        if (i > 1)
+            printf(", ");
+        if (ptr[f, i])
+            printf("(XEN_GUEST_HANDLE_PARAM(%s)){ _p(a%d) }", typ[f, i], i);
+        else
+            printf("(%s)(a%d)", typ[f, i], i);
+    }
+    printf("); \\\n");
+}
+
+# Generate case statement for call
+function do_case(f, p) {
+    printf("        case __HYPERVISOR_%s: \\\n", fn[f]);
+    do_call(f, p);
+    printf("            break; \\\n");
+}
+
+# Generate switch statement for calling handlers
+function do_switch(ca, p,    i) {
+    printf("        switch ( num ) \\\n");
+    printf("        { \\\n");
+    for (i = 1; i <= nc; i++)
+        if (call[i] == ca && call_prio[i] == p)
+            do_case(call_fn[i], call_p[i]);
+    printf("        default: \\\n");
+    printf("            ret = -ENOSYS; \\\n");
+    printf("            break; \\\n");
+    printf("        } \\\n");
+}
+
+function rest_of_line(par,    i, val) {
+    val = $(par);
+    for (i = par + 1; i <= NF; i++)
+        val = val " " $(i);
+    return val;
+}
+
+# Handle comments (multi- and single line)
+$1 == "/*" {
+    comment = 1;
+}
+comment == 1 {
+    if ($(NF) == "*/") comment = 0;
+    next;
+}
+
+# Skip preprocessing artefacts
+$1 == "extern" {
+    next;
+}
+/^#/ {
+    next;
+}
+
+# Drop empty lines
+NF == 0 {
+    next;
+}
+
+# Handle "handle:" line
+$1 == "handle:" {
+    if (NF < 3)
+        do_err("\"handle:\" requires at least two parameters");
+    val = rest_of_line(3);
+    xlate[val] = $2;
+    next;
+}
+
+# Handle "defhandle:" line
+$1 == "defhandle:" {
+    if (NF < 2)
+        do_err("\"defhandle:\" requires at least one parameter");
+    e++;
+    if (NF == 2) {
+        emit[e] = sprintf("DEFINE_XEN_GUEST_HANDLE(%s);", $2);
+    } else {
+        val = rest_of_line(3);
+        emit[e] = sprintf("__DEFINE_XEN_GUEST_HANDLE(%s, %s);", $2, val);
+        xlate[val] = $2;
+    }
+    next;
+}
+
+# Handle "rettype:" line
+$1 == "rettype:" {
+    if (NF < 3)
+        do_err("\"rettype:\" requires at least two parameters");
+    if ($2 in rettype)
+        do_err("rettype can be set only once for each prefix");
+    rettype[$2] = rest_of_line(3);
+    next;
+}
+
+# Handle "caller:" line
+$1 == "caller:" {
+    caller[$2] = 1;
+    next;
+}
+
+# Handle "prefix:" line
+$1 == "prefix:" {
+    p = NF - 1;
+    for (i = 2; i <= NF; i++) {
+        prefix[i - 1] = $(i);
+        if (!(prefix[i - 1] in rettype))
+            rettype[prefix[i - 1]] = "long";
+    }
+    next;
+}
+
+# Handle "table:" line
+$1 == "table:" {
+    table = 1;
+    for (i = 2; i <= NF; i++)
+        col[i - 1] = $(i);
+    n_cols = NF - 1;
+    next;
+}
+
+# Handle table definition line
+table == 1 {
+    if (NF != n_cols + 1)
+        do_err("Table definition line has wrong number of fields");
+    for (c = 1; c <= n_cols; c++) {
+        if (caller[col[c]] != 1)
+            continue;
+        if ($(c + 1) == "-")
+            continue;
+        pref = $(c + 1);
+        idx = index(pref, ":");
+        if (idx == 0)
+            prio = 100;
+        else {
+            prio = substr(pref, idx + 1) + 0;
+            pref = substr(pref, 1, idx - 1);
+            if (prio >= 100 || prio < 1)
+                do_err("Priority must be in the range 1..99");
+        }
+        fnd = 0;
+        for (i = 1; i <= n; i++) {
+            if (fn[i] != $1)
+                continue;
+            for (j = 1; j <= n_pre[i]; j++) {
+                if (pre[i, j] == pref) {
+                    prios[col[c], prio]++;
+                    if (prios[col[c], prio] == 1) {
+                        n_prios[col[c]]++;
+                        prio_list[col[c], n_prios[col[c]]] = prio;
+                        prio_mask[col[c], prio] = "(1ULL << __HYPERVISOR_"$1")";
+                    } else
+                        prio_mask[col[c], prio] = prio_mask[col[c], prio] " | (1ULL << __HYPERVISOR_"$1")";
+                    nc++;
+                    call[nc] = col[c];
+                    call_fn[nc] = i;
+                    call_p[nc] = j;
+                    call_prio[nc] = prio;
+                    fnd = 1;
+                }
+            }
+        }
+        if (fnd == 0)
+            do_err("No prototype for prefix/hypercall combination");
+    }
+    next;
+}
+
+# Prototype line
+{
+    bro = index($0, "(");
+    brc = index($0, ")");
+    if (bro < 2 || brc < bro)
+        do_err("No valid prototype line");
+    n++;
+    fn[n] = substr($0, 1, bro - 1);
+    n_pre[n] = p;
+    for (i = 1; i <= p; i++)
+        pre[n, i] = prefix[i];
+    args = substr($0, bro + 1, brc - bro - 1);
+    n_args[n] = split(args, a, ",");
+    if (n_args[n] > 5)
+        do_err("Too many parameters");
+    for (i = 1; i <= n_args[n]; i++) {
+        sub("^ *", "", a[i]);         # Remove leading white space
+        sub(" +", " ", a[i]);         # Replace multiple spaces with single ones
+        sub(" *$", "", a[i]);         # Remove trailing white space
+        ptr[n, i] = index(a[i], "*"); # Is it a pointer type?
+        sub("[*]", "", a[i]);         # Remove "*"
+        if (index(a[i], " ") == 0)
+            do_err("Parameter with no type or no name");
+        typ[n, i] = a[i];
+        sub(" [^ ]+$", "", typ[n, i]);    # Remove parameter name
+        if (ptr[n, i] && (typ[n, i] in xlate))
+            typ[n, i] = xlate[typ[n, i]];
+        arg[n, i] = a[i];
+        sub("^([^ ]+ )+", "", arg[n, i]); # Remove parameter type
+    }
+}
+
+# Generate the output
+END {
+    # Verbatim generated lines
+    for (i = 1; i <= e; i++)
+        printf("%s\n", emit[i]);
+    printf("\n");
+    # Generate prototypes
+    for (i = 1; i <= n; i++) {
+        for (p = 1; p <= n_pre[i]; p++) {
+            printf("%s cf_check %s_%s(", rettype[pre[i, p]], pre[i, p], fn[i]);
+            if (n_args[i] == 0)
+                printf("void");
+            else
+                for (j = 1; j <= n_args[i]; j++) {
+                    if (j > 1)
+                        printf(", ");
+                    if (ptr[i, j])
+                        printf("XEN_GUEST_HANDLE_PARAM(%s)", typ[i, j]);
+                    else
+                        printf("%s", typ[i, j]);
+                    printf(" %s", arg[i, j]);
+                }
+            printf(");\n");
+        }
+    }
+    # Generate call sequences and args array contents
+    for (ca in caller) {
+        if (caller[ca] != 1)
+            continue;
+        need_mask = 0;
+        for (pl = 1; pl <= n_prios[ca]; pl++) {
+            for (pll = pl; pll > 1; pll--) {
+                if (prio_list[ca, pl] > p_list[pll - 1])
+                    break;
+                else
+                    p_list[pll] = p_list[pll - 1];
+            }
+            p_list[pll] = prio_list[ca, pl];
+            # If any prio but the default one has more than 1 entry we need "mask"
+            if (p_list[pll] != 100 && prios[ca, p_list[pll]] > 1)
+                need_mask = 1;
+        }
+        printf("\n");
+        printf("#define call_handlers_%s(num, ret, a1, a2, a3, a4, a5) \\\n", ca);
+        printf("({ \\\n");
+        if (need_mask)
+            printf("    uint64_t mask = 1ULL << num; \\\n");
+        printf("    ");
+        for (pl = 1; pl <= n_prios[ca]; pl++) {
+            if (prios[ca, p_list[pl]] > 1) {
+                if (pl < n_prios[ca]) {
+                    printf("    if ( likely(mask & (%s)) ) \\\n", prio_mask[ca, p_list[pl]]);
+                    printf("    { \\\n");
+                }
+                if (prios[ca, p_list[pl]] == 2) {
+                    fnd = 0;
+                    for (i = 1; i <= nc; i++)
+                        if (call[i] == ca && call_prio[i] == p_list[pl]) {
+                            fnd++;
+                            if (fnd == 1)
+                                printf("        if ( num == __HYPERVISOR_%s ) \\\n", fn[call_fn[i]]);
+                            else
+                                printf("        else \\\n");
+                            do_call(call_fn[i], call_p[i]);
+                        }
+                } else {
+                    do_switch(ca, p_list[pl]);
+                }
+                if (pl < n_prios[ca])
+                    printf("    } \\\n");
+            } else {
+                for (i = 1; i <= nc; i++)
+                    if (call[i] == ca && call_prio[i] == p_list[pl]) {
+                        printf("if ( likely(num == __HYPERVISOR_%s) ) \\\n", fn[call_fn[i]]);
+                        do_call(call_fn[i], call_p[i]);
+                    }
+            }
+            if (pl < n_prios[ca] || prios[ca, p_list[pl]] <= 2)
+                printf("    else \\\n");
+        }
+        if (prios[ca, p_list[n_prios[ca]]] <= 2) {
+            printf("\\\n");
+            printf("        ret = -ENOSYS; \\\n");
+        }
+        printf("})\n");
+        delete p_list;
+        printf("\n");
+        printf("#define hypercall_args_%s \\\n", ca);
+        printf("{ \\\n");
+        for (i = 1; i <= nc; i++)
+            if (call[i] == ca)
+                printf("[__HYPERVISOR_%s] = %d, \\\n", fn[call_fn[i]], n_args[call_fn[i]]);
+        printf("}\n");
+    }
+}
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 08:13:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 08:13:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294188.500069 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXIav-0007X5-2S; Thu, 24 Mar 2022 08:13:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294188.500069; Thu, 24 Mar 2022 08:13:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXIau-0007Uw-RC; Thu, 24 Mar 2022 08:13:20 +0000
Received: by outflank-mailman (input) for mailman id 294188;
 Thu, 24 Mar 2022 08:13:19 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+IHq=UD=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXIat-0006uw-BA
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 08:13:19 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 422e5bd5-ab4a-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 09:13:16 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id ADAEE1F38E;
 Thu, 24 Mar 2022 08:13:16 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 5CF5813B98;
 Thu, 24 Mar 2022 08:13:16 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id qChHFRwoPGIpEwAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 24 Mar 2022 08:13:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 422e5bd5-ab4a-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648109596; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=E/WlWegUufrI46j8kJnnrGZXbEfr6xile5c+QZv8+qk=;
	b=FDmxFu5MVglSyo+PAT8s5IFAz0X2isdH5GtmS9vZbknkoaglb+1ldO4Xm5auEOPFZPNsCU
	Wadv9GllyMIavI85mj3tXbs1/+yEoReBErlrXXPs8t5ABx8QRqJ5pVXp8vJH4Vl7YU/kV1
	Dvk8qaoNFHQD/GFhhZuPIfHa8lnb73k=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Julien Grall <jgrall@amazon.com>
Subject: [PATCH v5 04/10] xen: don't include asm/hypercall.h from C sources
Date: Thu, 24 Mar 2022 09:13:06 +0100
Message-Id: <20220324081312.18222-5-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220324081312.18222-1-jgross@suse.com>
References: <20220324081312.18222-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Instead of including asm/hypercall.h always use xen/hypercall.h.
Additionally include xen/hypercall.h from all sources containing a
hypercall handler.

This prepares for generating the handlers' prototypes at build time.

Add a guard in asm/hypercall.h to catch direct inclusion.

Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Julien Grall <jgrall@amazon.com> # arm
---
V2:
- remove platform_op hunk (Jan Beulich)
- remove including of xen/hypervisor.h from arch/x86/x86_64/mm.c
  (Jan Beulich)
- fix include order in common/compat/grant_table.c (Jan Beulich)
---
 xen/arch/arm/hvm.c                       | 3 +--
 xen/arch/arm/include/asm/hypercall.h     | 4 ++++
 xen/arch/arm/platform_hypercall.c        | 1 +
 xen/arch/x86/cpu/vpmu.c                  | 1 +
 xen/arch/x86/include/asm/hypercall.h     | 4 ++++
 xen/arch/x86/mm.c                        | 1 -
 xen/arch/x86/platform_hypercall.c        | 1 +
 xen/arch/x86/pv/iret.c                   | 1 +
 xen/arch/x86/traps.c                     | 2 +-
 xen/arch/x86/x86_64/compat/mm.c          | 1 +
 xen/arch/x86/x86_64/mm.c                 | 2 --
 xen/arch/x86/x86_64/platform_hypercall.c | 1 -
 xen/common/compat/grant_table.c          | 1 +
 xen/common/event_channel.c               | 1 +
 xen/common/grant_table.c                 | 1 +
 xen/common/multicall.c                   | 1 +
 16 files changed, 19 insertions(+), 7 deletions(-)

diff --git a/xen/arch/arm/hvm.c b/xen/arch/arm/hvm.c
index 8951b34086..fc1a52767d 100644
--- a/xen/arch/arm/hvm.c
+++ b/xen/arch/arm/hvm.c
@@ -20,6 +20,7 @@
 #include <xen/lib.h>
 #include <xen/errno.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/sched.h>
 #include <xen/monitor.h>
 
@@ -29,8 +30,6 @@
 #include <public/hvm/params.h>
 #include <public/hvm/hvm_op.h>
 
-#include <asm/hypercall.h>
-
 static int hvm_allow_set_param(const struct domain *d, unsigned int param)
 {
     switch ( param )
diff --git a/xen/arch/arm/include/asm/hypercall.h b/xen/arch/arm/include/asm/hypercall.h
index fac4d60f17..8182895358 100644
--- a/xen/arch/arm/include/asm/hypercall.h
+++ b/xen/arch/arm/include/asm/hypercall.h
@@ -1,3 +1,7 @@
+#ifndef __XEN_HYPERCALL_H__
+#error "asm/hypercall.h should not be included directly - include xen/hypercall.h instead"
+#endif
+
 #ifndef __ASM_ARM_HYPERCALL_H__
 #define __ASM_ARM_HYPERCALL_H__
 
diff --git a/xen/arch/arm/platform_hypercall.c b/xen/arch/arm/platform_hypercall.c
index 8efac7ee60..403cc84324 100644
--- a/xen/arch/arm/platform_hypercall.c
+++ b/xen/arch/arm/platform_hypercall.c
@@ -9,6 +9,7 @@
 #include <xen/types.h>
 #include <xen/sched.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/spinlock.h>
 #include <public/platform.h>
 #include <xsm/xsm.h>
diff --git a/xen/arch/x86/cpu/vpmu.c b/xen/arch/x86/cpu/vpmu.c
index 4fedc7c570..51d171615f 100644
--- a/xen/arch/x86/cpu/vpmu.c
+++ b/xen/arch/x86/cpu/vpmu.c
@@ -22,6 +22,7 @@
 #include <xen/param.h>
 #include <xen/event.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/sched.h>
 #include <asm/regs.h>
 #include <asm/types.h>
diff --git a/xen/arch/x86/include/asm/hypercall.h b/xen/arch/x86/include/asm/hypercall.h
index 49973820af..81ca25f7b3 100644
--- a/xen/arch/x86/include/asm/hypercall.h
+++ b/xen/arch/x86/include/asm/hypercall.h
@@ -2,6 +2,10 @@
  * asm-x86/hypercall.h
  */
 
+#ifndef __XEN_HYPERCALL_H__
+#error "asm/hypercall.h should not be included directly - include xen/hypercall.h instead"
+#endif
+
 #ifndef __ASM_X86_HYPERCALL_H__
 #define __ASM_X86_HYPERCALL_H__
 
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index 2befd0c191..6cc73187ac 100644
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86/mm.c
@@ -129,7 +129,6 @@
 #include <asm/ldt.h>
 #include <asm/x86_emulate.h>
 #include <asm/e820.h>
-#include <asm/hypercall.h>
 #include <asm/shared.h>
 #include <asm/mem_sharing.h>
 #include <public/memory.h>
diff --git a/xen/arch/x86/platform_hypercall.c b/xen/arch/x86/platform_hypercall.c
index b91ccff589..eeb4f7a20e 100644
--- a/xen/arch/x86/platform_hypercall.c
+++ b/xen/arch/x86/platform_hypercall.c
@@ -17,6 +17,7 @@
 #include <xen/console.h>
 #include <xen/iocap.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/acpi.h>
 #include <xen/efi.h>
 #include <xen/cpu.h>
diff --git a/xen/arch/x86/pv/iret.c b/xen/arch/x86/pv/iret.c
index 55eb6a63bd..58de9f7922 100644
--- a/xen/arch/x86/pv/iret.c
+++ b/xen/arch/x86/pv/iret.c
@@ -18,6 +18,7 @@
  */
 
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/lib.h>
 #include <xen/sched.h>
 
diff --git a/xen/arch/x86/traps.c b/xen/arch/x86/traps.c
index 8659547970..4c38f6c015 100644
--- a/xen/arch/x86/traps.c
+++ b/xen/arch/x86/traps.c
@@ -29,6 +29,7 @@
 #include <xen/lib.h>
 #include <xen/err.h>
 #include <xen/errno.h>
+#include <xen/hypercall.h>
 #include <xen/mm.h>
 #include <xen/param.h>
 #include <xen/console.h>
@@ -70,7 +71,6 @@
 #include <asm/x86_emulate.h>
 #include <asm/traps.h>
 #include <asm/hvm/vpt.h>
-#include <asm/hypercall.h>
 #include <asm/mce.h>
 #include <asm/apic.h>
 #include <asm/mc146818rtc.h>
diff --git a/xen/arch/x86/x86_64/compat/mm.c b/xen/arch/x86/x86_64/compat/mm.c
index b3da8fafbb..70b08a832a 100644
--- a/xen/arch/x86/x86_64/compat/mm.c
+++ b/xen/arch/x86/x86_64/compat/mm.c
@@ -1,4 +1,5 @@
 #include <xen/event.h>
+#include <xen/hypercall.h>
 #include <xen/mem_access.h>
 #include <xen/multicall.h>
 #include <compat/memory.h>
diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c
index 4f225da81e..3510a5affe 100644
--- a/xen/arch/x86/x86_64/mm.c
+++ b/xen/arch/x86/x86_64/mm.c
@@ -25,14 +25,12 @@ EMIT_FILE;
 #include <xen/numa.h>
 #include <xen/nodemask.h>
 #include <xen/guest_access.h>
-#include <xen/hypercall.h>
 #include <xen/mem_access.h>
 #include <asm/current.h>
 #include <asm/asm_defns.h>
 #include <asm/page.h>
 #include <asm/flushtlb.h>
 #include <asm/fixmap.h>
-#include <asm/hypercall.h>
 #include <asm/msr.h>
 #include <asm/pv/domain.h>
 #include <asm/setup.h>
diff --git a/xen/arch/x86/x86_64/platform_hypercall.c b/xen/arch/x86/x86_64/platform_hypercall.c
index 2c21a3fd05..f84252bac6 100644
--- a/xen/arch/x86/x86_64/platform_hypercall.c
+++ b/xen/arch/x86/x86_64/platform_hypercall.c
@@ -7,7 +7,6 @@ EMIT_FILE;
 #include <xen/hypercall.h>
 #include <xen/lib.h>
 #include <compat/platform.h>
-#include <xen/hypercall.h>
 
 #define xen_platform_op     compat_platform_op
 #define xen_platform_op_t   compat_platform_op_t
diff --git a/xen/common/compat/grant_table.c b/xen/common/compat/grant_table.c
index c6199e8918..d5787e3719 100644
--- a/xen/common/compat/grant_table.c
+++ b/xen/common/compat/grant_table.c
@@ -3,6 +3,7 @@
  *
  */
 
+#include <xen/hypercall.h>
 #include <compat/grant_table.h>
 
 #define xen_grant_entry_v1 grant_entry_v1
diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c
index ffb042a241..0a82eb3ac2 100644
--- a/xen/common/event_channel.c
+++ b/xen/common/event_channel.c
@@ -24,6 +24,7 @@
 #include <xen/iocap.h>
 #include <xen/compat.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/keyhandler.h>
 #include <asm/current.h>
 
diff --git a/xen/common/grant_table.c b/xen/common/grant_table.c
index 1e0762b064..febbe12eab 100644
--- a/xen/common/grant_table.c
+++ b/xen/common/grant_table.c
@@ -33,6 +33,7 @@
 #include <xen/trace.h>
 #include <xen/grant_table.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/domain_page.h>
 #include <xen/iommu.h>
 #include <xen/paging.h>
diff --git a/xen/common/multicall.c b/xen/common/multicall.c
index e48f46dbe0..9db49092b4 100644
--- a/xen/common/multicall.c
+++ b/xen/common/multicall.c
@@ -9,6 +9,7 @@
 #include <xen/event.h>
 #include <xen/multicall.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/perfc.h>
 #include <xen/trace.h>
 #include <asm/current.h>
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 08:13:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 08:13:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294193.500119 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXIb0-0000HA-1q; Thu, 24 Mar 2022 08:13:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294193.500119; Thu, 24 Mar 2022 08:13:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXIaz-0000Bi-Dg; Thu, 24 Mar 2022 08:13:25 +0000
Received: by outflank-mailman (input) for mailman id 294193;
 Thu, 24 Mar 2022 08:13:22 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+IHq=UD=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXIaw-0006uw-Bb
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 08:13:22 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 430cb32b-ab4a-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 09:13:18 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 2EC1E210F7;
 Thu, 24 Mar 2022 08:13:18 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id E840713B98;
 Thu, 24 Mar 2022 08:13:17 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id QP5wNx0oPGIpEwAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 24 Mar 2022 08:13:17 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 430cb32b-ab4a-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648109598; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=vOwyucqhO02iXYzENDU2+6ofz8QyJyQuet+mXWldfyU=;
	b=ELflYwTUBJATXLZiuK49Lu/cL9djrqtKSUiJ0oF8UzrIvG90wJTaN431oe0DXPSQwDO6IO
	jC3dfpd5wQG+g849bTQAKRp9rcqaYczwU+DHZwIw6++2W1cpJFyhRSqbDdpc+wGaGgSL76
	fXGJJVQHcfIgw0vkOJiDUIhGDRUyCYw=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Julien Grall <jgrall@amazon.com>,
	Michal Orzel <michal.orzel@arm.com>
Subject: [PATCH v5 09/10] xen/arm: call hypercall handlers via generated macro
Date: Thu, 24 Mar 2022 09:13:11 +0100
Message-Id: <20220324081312.18222-10-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220324081312.18222-1-jgross@suse.com>
References: <20220324081312.18222-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Instead of using a function table use the generated macros for calling
the appropriate hypercall handlers.

This makes the calls of the handlers type safe.

For deprecated hypercalls define stub functions.

Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Julien Grall <jgrall@amazon.com>
Tested-by: Michal Orzel <michal.orzel@arm.com>
---
V2:
- make hypercall_args[] const (Jan Beulich)
V5:
- move out-of-bounds check (Julien Grall)
---
 xen/arch/arm/traps.c | 117 +++++++++----------------------------------
 1 file changed, 24 insertions(+), 93 deletions(-)

diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
index e906bb4a89..e0fca3b4d8 100644
--- a/xen/arch/arm/traps.c
+++ b/xen/arch/arm/traps.c
@@ -1331,67 +1331,20 @@ static register_t do_deprecated_hypercall(void)
     return -ENOSYS;
 }
 
-typedef register_t (*arm_hypercall_fn_t)(
-    register_t, register_t, register_t, register_t, register_t);
-
-typedef struct {
-    arm_hypercall_fn_t fn;
-    int nr_args;
-} arm_hypercall_t;
-
-#define HYPERCALL(_name, _nr_args)                                   \
-    [ __HYPERVISOR_ ## _name ] =  {                                  \
-        .fn = (arm_hypercall_fn_t) &do_ ## _name,                    \
-        .nr_args = _nr_args,                                         \
-    }
+long dep_sched_op_compat(int cmd, unsigned long arg)
+{
+    return do_deprecated_hypercall();
+}
 
-#define HYPERCALL_ARM(_name, _nr_args)                        \
-    [ __HYPERVISOR_ ## _name ] =  {                                  \
-        .fn = (arm_hypercall_fn_t) &do_arm_ ## _name,                \
-        .nr_args = _nr_args,                                         \
-    }
-/*
- * Only use this for hypercalls which were deprecated (i.e. replaced
- * by something else) before Xen on ARM was created, i.e. *not* for
- * hypercalls which are simply not yet used on ARM.
- */
-#define HYPERCALL_DEPRECATED(_name, _nr_args)                   \
-    [ __HYPERVISOR_##_name ] = {                                \
-        .fn = (arm_hypercall_fn_t) &do_deprecated_hypercall,    \
-        .nr_args = _nr_args,                                    \
-    }
+long dep_event_channel_op_compat(XEN_GUEST_HANDLE_PARAM(evtchn_op_t) uop)
+{
+    return do_deprecated_hypercall();
+}
 
-static arm_hypercall_t arm_hypercall_table[] = {
-    HYPERCALL(memory_op, 2),
-    HYPERCALL(domctl, 1),
-    HYPERCALL(sched_op, 2),
-    HYPERCALL_DEPRECATED(sched_op_compat, 2),
-    HYPERCALL(console_io, 3),
-    HYPERCALL(xen_version, 2),
-    HYPERCALL(xsm_op, 1),
-    HYPERCALL(event_channel_op, 2),
-    HYPERCALL_DEPRECATED(event_channel_op_compat, 1),
-    HYPERCALL_ARM(physdev_op, 2),
-    HYPERCALL_DEPRECATED(physdev_op_compat, 1),
-    HYPERCALL(sysctl, 2),
-    HYPERCALL(hvm_op, 2),
-#ifdef CONFIG_GRANT_TABLE
-    HYPERCALL(grant_table_op, 3),
-#endif
-    HYPERCALL(multicall, 2),
-    HYPERCALL(platform_op, 1),
-    HYPERCALL(vcpu_op, 3),
-    HYPERCALL(vm_assist, 2),
-#ifdef CONFIG_ARGO
-    HYPERCALL(argo_op, 5),
-#endif
-#ifdef CONFIG_HYPFS
-    HYPERCALL(hypfs_op, 5),
-#endif
-#ifdef CONFIG_IOREQ_SERVER
-    HYPERCALL(dm_op, 3),
-#endif
-};
+long dep_physdev_op_compat(XEN_GUEST_HANDLE_PARAM(physdev_op_t) uop)
+{
+    return do_deprecated_hypercall();
+}
 
 #ifndef NDEBUG
 static void do_debug_trap(struct cpu_user_regs *regs, unsigned int code)
@@ -1430,7 +1383,6 @@ static void do_debug_trap(struct cpu_user_regs *regs, unsigned int code)
 #define HYPERCALL_ARG3(r) (r)->x2
 #define HYPERCALL_ARG4(r) (r)->x3
 #define HYPERCALL_ARG5(r) (r)->x4
-#define HYPERCALL_ARGS(r) (r)->x0, (r)->x1, (r)->x2, (r)->x3, (r)->x4
 #else
 #define HYPERCALL_RESULT_REG(r) (r)->r0
 #define HYPERCALL_ARG1(r) (r)->r0
@@ -1438,52 +1390,40 @@ static void do_debug_trap(struct cpu_user_regs *regs, unsigned int code)
 #define HYPERCALL_ARG3(r) (r)->r2
 #define HYPERCALL_ARG4(r) (r)->r3
 #define HYPERCALL_ARG5(r) (r)->r4
-#define HYPERCALL_ARGS(r) (r)->r0, (r)->r1, (r)->r2, (r)->r3, (r)->r4
 #endif
 
+static const unsigned char hypercall_args[] = hypercall_args_arm;
+
 static void do_trap_hypercall(struct cpu_user_regs *regs, register_t *nr,
                               const union hsr hsr)
 {
-    arm_hypercall_fn_t call = NULL;
     struct vcpu *curr = current;
 
-    BUILD_BUG_ON(NR_hypercalls < ARRAY_SIZE(arm_hypercall_table) );
-
     if ( hsr.iss != XEN_HYPERCALL_TAG )
     {
         gprintk(XENLOG_WARNING, "Invalid HVC imm 0x%x\n", hsr.iss);
         return inject_undef_exception(regs, hsr);
     }
 
-    if ( *nr >= ARRAY_SIZE(arm_hypercall_table) )
-    {
-        perfc_incr(invalid_hypercalls);
-        HYPERCALL_RESULT_REG(regs) = -ENOSYS;
-        return;
-    }
-
     curr->hcall_preempted = false;
 
     perfc_incra(hypercalls, *nr);
-    call = arm_hypercall_table[*nr].fn;
-    if ( call == NULL )
-    {
-        HYPERCALL_RESULT_REG(regs) = -ENOSYS;
-        return;
-    }
 
-    HYPERCALL_RESULT_REG(regs) = call(HYPERCALL_ARGS(regs));
+    call_handlers_arm(*nr, HYPERCALL_RESULT_REG(regs), HYPERCALL_ARG1(regs),
+                      HYPERCALL_ARG2(regs), HYPERCALL_ARG3(regs),
+                      HYPERCALL_ARG4(regs), HYPERCALL_ARG5(regs));
 
 #ifndef NDEBUG
-    if ( !curr->hcall_preempted )
+    if ( !curr->hcall_preempted && HYPERCALL_RESULT_REG(regs) != -ENOSYS )
     {
         /* Deliberately corrupt parameter regs used by this hypercall. */
-        switch ( arm_hypercall_table[*nr].nr_args ) {
+        switch ( hypercall_args[*nr] ) {
         case 5: HYPERCALL_ARG5(regs) = 0xDEADBEEF;
         case 4: HYPERCALL_ARG4(regs) = 0xDEADBEEF;
         case 3: HYPERCALL_ARG3(regs) = 0xDEADBEEF;
         case 2: HYPERCALL_ARG2(regs) = 0xDEADBEEF;
         case 1: /* Don't clobber x0/r0 -- it's the return value */
+        case 0: /* -ENOSYS case */
             break;
         default: BUG();
         }
@@ -1520,7 +1460,7 @@ static bool check_multicall_32bit_clean(struct multicall_entry *multi)
 {
     int i;
 
-    for ( i = 0; i < arm_hypercall_table[multi->op].nr_args; i++ )
+    for ( i = 0; i < hypercall_args[multi->op]; i++ )
     {
         if ( unlikely(multi->args[i] & 0xffffffff00000000ULL) )
         {
@@ -1537,16 +1477,8 @@ static bool check_multicall_32bit_clean(struct multicall_entry *multi)
 enum mc_disposition arch_do_multicall_call(struct mc_state *state)
 {
     struct multicall_entry *multi = &state->call;
-    arm_hypercall_fn_t call = NULL;
-
-    if ( multi->op >= ARRAY_SIZE(arm_hypercall_table) )
-    {
-        multi->result = -ENOSYS;
-        return mc_continue;
-    }
 
-    call = arm_hypercall_table[multi->op].fn;
-    if ( call == NULL )
+    if ( multi->op >= ARRAY_SIZE(hypercall_args) )
     {
         multi->result = -ENOSYS;
         return mc_continue;
@@ -1556,9 +1488,8 @@ enum mc_disposition arch_do_multicall_call(struct mc_state *state)
          !check_multicall_32bit_clean(multi) )
         return mc_continue;
 
-    multi->result = call(multi->args[0], multi->args[1],
-                         multi->args[2], multi->args[3],
-                         multi->args[4]);
+    call_handlers_arm(multi->op, multi->result, multi->args[0], multi->args[1],
+                      multi->args[2], multi->args[3], multi->args[4]);
 
     return likely(!regs_mode_is_user(guest_cpu_user_regs()))
            ? mc_continue : mc_preempt;
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 08:13:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 08:13:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294194.500132 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXIb1-0000oX-TD; Thu, 24 Mar 2022 08:13:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294194.500132; Thu, 24 Mar 2022 08:13:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXIb1-0000mF-Fq; Thu, 24 Mar 2022 08:13:27 +0000
Received: by outflank-mailman (input) for mailman id 294194;
 Thu, 24 Mar 2022 08:13:24 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+IHq=UD=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXIax-0006uw-Bm
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 08:13:23 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 43524873-ab4a-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 09:13:18 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 9C8E71F393;
 Thu, 24 Mar 2022 08:13:18 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 3A18713B98;
 Thu, 24 Mar 2022 08:13:18 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id IG/rDB4oPGIpEwAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 24 Mar 2022 08:13:18 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 43524873-ab4a-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648109598; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=Nw9rhElp9VOD8Z0hPj4rPIzgh7m6v0BZ4AIazBFgjhU=;
	b=vP0xUtA7ZHPXIX7BKhPbjv0F0wlvFxTSvsauXJ4b8ubHSc2W7Sf3xngxqDFaFsA5U5nHBh
	igXQbDwUZAAf7SbL/D5ZE2eu1Oiz4Ryzjtgov/sH1GGs/pU8e2qxQzAvwy2sL9QPZnlRXd
	AYZ6gSS/Vy+F4EsBrI0mSEcAejj+muU=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>,
	George Dunlap <george.dunlap@citrix.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Christopher Clark <christopher.w.clark@gmail.com>,
	Dario Faggioli <dfaggioli@suse.com>,
	Daniel De Graaf <dgdegra@tycho.nsa.gov>,
	"Daniel P. Smith" <dpsmith@apertussolutions.com>,
	=?UTF-8?q?T=C3=A9o=20Couprie=20Diaz?= <teo.coupriediaz@arm.com>
Subject: [PATCH v5 10/10] xen/x86: remove cf_check attribute from hypercall handlers
Date: Thu, 24 Mar 2022 09:13:12 +0100
Message-Id: <20220324081312.18222-11-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220324081312.18222-1-jgross@suse.com>
References: <20220324081312.18222-1-jgross@suse.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

Now that the hypercall handlers are all being called directly instead
through a function vector, the "cf_check" attribute can be removed.

Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Daniel P. Smith <dpsmith@apertussolutions.com> # xsm parts
Acked-by: Jan Beulich <jbeulich@suse.com>
Tested-by: Téo Couprie Diaz <teo.coupriediaz@arm.com>
---
V4:
- new patch
---
 xen/arch/x86/compat.c               |  6 +++---
 xen/arch/x86/cpu/mcheck/mce.c       |  2 +-
 xen/arch/x86/cpu/vpmu.c             |  2 +-
 xen/arch/x86/domain.c               |  3 +--
 xen/arch/x86/hvm/dm.c               |  2 +-
 xen/arch/x86/hvm/hvm.c              |  2 +-
 xen/arch/x86/hvm/hypercall.c        |  6 +++---
 xen/arch/x86/mm.c                   | 12 ++++++------
 xen/arch/x86/mm/paging.c            |  2 +-
 xen/arch/x86/physdev.c              |  2 +-
 xen/arch/x86/platform_hypercall.c   |  2 +-
 xen/arch/x86/pv/callback.c          | 16 ++++++++--------
 xen/arch/x86/pv/descriptor-tables.c |  8 ++++----
 xen/arch/x86/pv/iret.c              |  4 ++--
 xen/arch/x86/pv/misc-hypercalls.c   | 10 +++++-----
 xen/arch/x86/pv/shim.c              |  4 ++--
 xen/arch/x86/x86_64/compat/mm.c     |  2 +-
 xen/arch/x86/x86_64/domain.c        |  2 +-
 xen/common/argo.c                   |  4 ++--
 xen/common/compat/grant_table.c     |  2 +-
 xen/common/compat/kernel.c          |  2 +-
 xen/common/compat/memory.c          |  3 +--
 xen/common/dm.c                     |  2 +-
 xen/common/domain.c                 |  2 +-
 xen/common/domctl.c                 |  2 +-
 xen/common/event_channel.c          |  2 +-
 xen/common/grant_table.c            |  3 +--
 xen/common/hypfs.c                  |  2 +-
 xen/common/kernel.c                 |  2 +-
 xen/common/kexec.c                  |  4 ++--
 xen/common/memory.c                 |  2 +-
 xen/common/multicall.c              |  3 +--
 xen/common/sched/compat.c           |  2 +-
 xen/common/sched/core.c             |  4 ++--
 xen/common/sysctl.c                 |  2 +-
 xen/common/xenoprof.c               |  2 +-
 xen/drivers/char/console.c          |  2 +-
 xen/scripts/gen_hypercall.awk       |  2 +-
 xen/xsm/xsm_core.c                  |  4 ++--
 39 files changed, 68 insertions(+), 72 deletions(-)

diff --git a/xen/arch/x86/compat.c b/xen/arch/x86/compat.c
index 28281a262a..a031062830 100644
--- a/xen/arch/x86/compat.c
+++ b/xen/arch/x86/compat.c
@@ -15,7 +15,7 @@ typedef long ret_t;
 #endif
 
 /* Legacy hypercall (as of 0x00030202). */
-ret_t cf_check do_physdev_op_compat(XEN_GUEST_HANDLE_PARAM(physdev_op_t) uop)
+ret_t do_physdev_op_compat(XEN_GUEST_HANDLE_PARAM(physdev_op_t) uop)
 {
     struct physdev_op op;
 
@@ -28,7 +28,7 @@ ret_t cf_check do_physdev_op_compat(XEN_GUEST_HANDLE_PARAM(physdev_op_t) uop)
 #ifndef COMPAT
 
 /* Legacy hypercall (as of 0x00030101). */
-long cf_check do_sched_op_compat(int cmd, unsigned long arg)
+long do_sched_op_compat(int cmd, unsigned long arg)
 {
     switch ( cmd )
     {
@@ -50,7 +50,7 @@ long cf_check do_sched_op_compat(int cmd, unsigned long arg)
 }
 
 /* Legacy hypercall (as of 0x00030202). */
-long cf_check do_event_channel_op_compat(
+long do_event_channel_op_compat(
     XEN_GUEST_HANDLE_PARAM(evtchn_op_t) uop)
 {
     struct evtchn_op op;
diff --git a/xen/arch/x86/cpu/mcheck/mce.c b/xen/arch/x86/cpu/mcheck/mce.c
index 275c54be7c..f68e31b643 100644
--- a/xen/arch/x86/cpu/mcheck/mce.c
+++ b/xen/arch/x86/cpu/mcheck/mce.c
@@ -1351,7 +1351,7 @@ CHECK_mcinfo_recovery;
 # endif /* CONFIG_COMPAT */
 
 /* Machine Check Architecture Hypercall */
-long cf_check do_mca(XEN_GUEST_HANDLE_PARAM(xen_mc_t) u_xen_mc)
+long do_mca(XEN_GUEST_HANDLE_PARAM(xen_mc_t) u_xen_mc)
 {
     long ret = 0;
     struct xen_mc curop, *op = &curop;
diff --git a/xen/arch/x86/cpu/vpmu.c b/xen/arch/x86/cpu/vpmu.c
index 51d171615f..d2c03a1104 100644
--- a/xen/arch/x86/cpu/vpmu.c
+++ b/xen/arch/x86/cpu/vpmu.c
@@ -672,7 +672,7 @@ void vpmu_dump(struct vcpu *v)
         alternative_vcall(vpmu_ops.arch_vpmu_dump, v);
 }
 
-long cf_check do_xenpmu_op(
+long do_xenpmu_op(
     unsigned int op, XEN_GUEST_HANDLE_PARAM(xen_pmu_params_t) arg)
 {
     int ret;
diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c
index d566fc82b4..ddf969f76e 100644
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -1489,8 +1489,7 @@ int arch_vcpu_reset(struct vcpu *v)
     return 0;
 }
 
-long cf_check do_vcpu_op(int cmd, unsigned int vcpuid,
-                         XEN_GUEST_HANDLE_PARAM(void) arg)
+long do_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     long rc = 0;
     struct domain *d = current->domain;
diff --git a/xen/arch/x86/hvm/dm.c b/xen/arch/x86/hvm/dm.c
index d80975efcf..f8e6089870 100644
--- a/xen/arch/x86/hvm/dm.c
+++ b/xen/arch/x86/hvm/dm.c
@@ -654,7 +654,7 @@ CHECK_dm_op_relocate_memory;
 CHECK_dm_op_pin_memory_cacheattr;
 CHECK_dm_op_nr_vcpus;
 
-int cf_check compat_dm_op(
+int compat_dm_op(
     domid_t domid, unsigned int nr_bufs, XEN_GUEST_HANDLE_PARAM(void) bufs)
 {
     struct dmop_args args;
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index 709a4191ef..9b3973dad8 100644
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -5022,7 +5022,7 @@ static int hvmop_get_mem_type(
     return rc;
 }
 
-long cf_check do_hvm_op(unsigned long op, XEN_GUEST_HANDLE_PARAM(void) arg)
+long do_hvm_op(unsigned long op, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     long rc = 0;
 
diff --git a/xen/arch/x86/hvm/hypercall.c b/xen/arch/x86/hvm/hypercall.c
index ae601185fc..29d1ca7a13 100644
--- a/xen/arch/x86/hvm/hypercall.c
+++ b/xen/arch/x86/hvm/hypercall.c
@@ -31,7 +31,7 @@
 #include <public/hvm/hvm_op.h>
 #include <public/hvm/params.h>
 
-long cf_check hvm_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long hvm_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     long rc;
 
@@ -51,7 +51,7 @@ long cf_check hvm_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 }
 
 #ifdef CONFIG_GRANT_TABLE
-long cf_check hvm_grant_table_op(
+long hvm_grant_table_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) uop, unsigned int count)
 {
     switch ( cmd )
@@ -77,7 +77,7 @@ long cf_check hvm_grant_table_op(
 }
 #endif
 
-long cf_check hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     const struct vcpu *curr = current;
     const struct domain *currd = curr->domain;
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index 6cc73187ac..a958142d17 100644
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86/mm.c
@@ -3377,7 +3377,7 @@ static int vcpumask_to_pcpumask(
     }
 }
 
-long cf_check do_mmuext_op(
+long do_mmuext_op(
     XEN_GUEST_HANDLE_PARAM(mmuext_op_t) uops,
     unsigned int count,
     XEN_GUEST_HANDLE_PARAM(uint) pdone,
@@ -3916,7 +3916,7 @@ long cf_check do_mmuext_op(
     return rc;
 }
 
-long cf_check do_mmu_update(
+long do_mmu_update(
     XEN_GUEST_HANDLE_PARAM(mmu_update_t) ureqs,
     unsigned int count,
     XEN_GUEST_HANDLE_PARAM(uint) pdone,
@@ -4501,7 +4501,7 @@ static int __do_update_va_mapping(
     return rc;
 }
 
-long cf_check do_update_va_mapping(
+long do_update_va_mapping(
     unsigned long va, u64 val64, unsigned long flags)
 {
     int rc = __do_update_va_mapping(va, val64, flags, current->domain);
@@ -4513,7 +4513,7 @@ long cf_check do_update_va_mapping(
     return rc;
 }
 
-long cf_check do_update_va_mapping_otherdomain(
+long do_update_va_mapping_otherdomain(
     unsigned long va, u64 val64, unsigned long flags, domid_t domid)
 {
     struct domain *pg_owner;
@@ -4536,7 +4536,7 @@ long cf_check do_update_va_mapping_otherdomain(
 #endif /* CONFIG_PV */
 
 #ifdef CONFIG_PV32
-int cf_check compat_update_va_mapping(
+int compat_update_va_mapping(
     unsigned int va, uint32_t lo, uint32_t hi, unsigned int flags)
 {
     int rc = __do_update_va_mapping(va, ((uint64_t)hi << 32) | lo,
@@ -4549,7 +4549,7 @@ int cf_check compat_update_va_mapping(
     return rc;
 }
 
-int cf_check compat_update_va_mapping_otherdomain(
+int compat_update_va_mapping_otherdomain(
     unsigned int va, uint32_t lo, uint32_t hi, unsigned int flags,
     domid_t domid)
 {
diff --git a/xen/arch/x86/mm/paging.c b/xen/arch/x86/mm/paging.c
index a7e2707ecc..cb1bfcbde5 100644
--- a/xen/arch/x86/mm/paging.c
+++ b/xen/arch/x86/mm/paging.c
@@ -760,7 +760,7 @@ int paging_domctl(struct domain *d, struct xen_domctl_shadow_op *sc,
         return shadow_domctl(d, sc, u_domctl);
 }
 
-long cf_check do_paging_domctl_cont(
+long do_paging_domctl_cont(
     XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl)
 {
     struct xen_domctl op;
diff --git a/xen/arch/x86/physdev.c b/xen/arch/x86/physdev.c
index 2ddcf44f33..ea38be8b79 100644
--- a/xen/arch/x86/physdev.c
+++ b/xen/arch/x86/physdev.c
@@ -174,7 +174,7 @@ int physdev_unmap_pirq(domid_t domid, int pirq)
 }
 #endif /* COMPAT */
 
-ret_t cf_check do_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+ret_t do_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     int irq;
     ret_t ret;
diff --git a/xen/arch/x86/platform_hypercall.c b/xen/arch/x86/platform_hypercall.c
index eeb4f7a20e..a7341dc3d7 100644
--- a/xen/arch/x86/platform_hypercall.c
+++ b/xen/arch/x86/platform_hypercall.c
@@ -214,7 +214,7 @@ void cf_check resource_access(void *info)
 }
 #endif
 
-ret_t cf_check do_platform_op(
+ret_t do_platform_op(
     XEN_GUEST_HANDLE_PARAM(xen_platform_op_t) u_xenpf_op)
 {
     ret_t ret;
diff --git a/xen/arch/x86/pv/callback.c b/xen/arch/x86/pv/callback.c
index 1be9d3f731..067ee3b795 100644
--- a/xen/arch/x86/pv/callback.c
+++ b/xen/arch/x86/pv/callback.c
@@ -140,7 +140,7 @@ static long unregister_guest_callback(struct callback_unregister *unreg)
     return ret;
 }
 
-long cf_check do_callback_op(int cmd, XEN_GUEST_HANDLE_PARAM(const_void) arg)
+long do_callback_op(int cmd, XEN_GUEST_HANDLE_PARAM(const_void) arg)
 {
     long ret;
 
@@ -178,7 +178,7 @@ long cf_check do_callback_op(int cmd, XEN_GUEST_HANDLE_PARAM(const_void) arg)
     return ret;
 }
 
-long cf_check do_set_callbacks(
+long do_set_callbacks(
     unsigned long event_address, unsigned long failsafe_address,
     unsigned long syscall_address)
 {
@@ -283,7 +283,7 @@ static int compat_unregister_guest_callback(
     return ret;
 }
 
-int cf_check compat_callback_op(int cmd, XEN_GUEST_HANDLE(const_void) arg)
+int compat_callback_op(int cmd, XEN_GUEST_HANDLE(const_void) arg)
 {
     int ret;
 
@@ -321,7 +321,7 @@ int cf_check compat_callback_op(int cmd, XEN_GUEST_HANDLE(const_void) arg)
     return ret;
 }
 
-int cf_check compat_set_callbacks(
+int compat_set_callbacks(
     unsigned long event_selector, unsigned long event_address,
     unsigned long failsafe_selector, unsigned long failsafe_address)
 {
@@ -348,7 +348,7 @@ int cf_check compat_set_callbacks(
 
 #endif /* CONFIG_PV32 */
 
-long cf_check do_set_trap_table(XEN_GUEST_HANDLE_PARAM(const_trap_info_t) traps)
+long do_set_trap_table(XEN_GUEST_HANDLE_PARAM(const_trap_info_t) traps)
 {
     struct trap_info cur;
     struct vcpu *curr = current;
@@ -394,7 +394,7 @@ long cf_check do_set_trap_table(XEN_GUEST_HANDLE_PARAM(const_trap_info_t) traps)
 }
 
 #ifdef CONFIG_PV32
-int cf_check compat_set_trap_table(XEN_GUEST_HANDLE(trap_info_compat_t) traps)
+int compat_set_trap_table(XEN_GUEST_HANDLE(trap_info_compat_t) traps)
 {
     struct vcpu *curr = current;
     struct compat_trap_info cur;
@@ -437,7 +437,7 @@ int cf_check compat_set_trap_table(XEN_GUEST_HANDLE(trap_info_compat_t) traps)
 }
 #endif
 
-long cf_check do_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long do_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     struct xennmi_callback cb;
     long rc = 0;
@@ -463,7 +463,7 @@ long cf_check do_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 }
 
 #ifdef CONFIG_PV32
-int cf_check compat_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+int compat_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     struct compat_nmi_callback cb;
     int rc = 0;
diff --git a/xen/arch/x86/pv/descriptor-tables.c b/xen/arch/x86/pv/descriptor-tables.c
index 653a61d0b5..b4135b450c 100644
--- a/xen/arch/x86/pv/descriptor-tables.c
+++ b/xen/arch/x86/pv/descriptor-tables.c
@@ -124,7 +124,7 @@ int pv_set_gdt(struct vcpu *v, const unsigned long frames[],
     return -EINVAL;
 }
 
-long cf_check do_set_gdt(
+long do_set_gdt(
     XEN_GUEST_HANDLE_PARAM(xen_ulong_t) frame_list, unsigned int entries)
 {
     unsigned int nr_frames = DIV_ROUND_UP(entries, 512);
@@ -151,7 +151,7 @@ long cf_check do_set_gdt(
 
 #ifdef CONFIG_PV32
 
-int cf_check compat_set_gdt(
+int compat_set_gdt(
     XEN_GUEST_HANDLE_PARAM(uint) frame_list, unsigned int entries)
 {
     struct vcpu *curr = current;
@@ -187,7 +187,7 @@ int cf_check compat_set_gdt(
     return ret;
 }
 
-int cf_check compat_update_descriptor(
+int compat_update_descriptor(
     uint32_t pa_lo, uint32_t pa_hi, uint32_t desc_lo, uint32_t desc_hi)
 {
     seg_desc_t d;
@@ -299,7 +299,7 @@ int validate_segdesc_page(struct page_info *page)
     return i == 512 ? 0 : -EINVAL;
 }
 
-long cf_check do_update_descriptor(uint64_t gaddr, seg_desc_t d)
+long do_update_descriptor(uint64_t gaddr, seg_desc_t d)
 {
     struct domain *currd = current->domain;
     gfn_t gfn = gaddr_to_gfn(gaddr);
diff --git a/xen/arch/x86/pv/iret.c b/xen/arch/x86/pv/iret.c
index 58de9f7922..316a23e77e 100644
--- a/xen/arch/x86/pv/iret.c
+++ b/xen/arch/x86/pv/iret.c
@@ -49,7 +49,7 @@ static void async_exception_cleanup(struct vcpu *curr)
         curr->arch.async_exception_state(trap).old_mask;
 }
 
-long cf_check do_iret(void)
+long do_iret(void)
 {
     struct cpu_user_regs *regs = guest_cpu_user_regs();
     struct iret_context iret_saved;
@@ -106,7 +106,7 @@ long cf_check do_iret(void)
 }
 
 #ifdef CONFIG_PV32
-int cf_check compat_iret(void)
+int compat_iret(void)
 {
     struct cpu_user_regs *regs = guest_cpu_user_regs();
     struct vcpu *v = current;
diff --git a/xen/arch/x86/pv/misc-hypercalls.c b/xen/arch/x86/pv/misc-hypercalls.c
index 635f5a644a..aaaf70eb63 100644
--- a/xen/arch/x86/pv/misc-hypercalls.c
+++ b/xen/arch/x86/pv/misc-hypercalls.c
@@ -23,12 +23,12 @@
 
 #include <asm/debugreg.h>
 
-long cf_check do_set_debugreg(int reg, unsigned long value)
+long do_set_debugreg(int reg, unsigned long value)
 {
     return set_debugreg(current, reg, value);
 }
 
-long cf_check do_get_debugreg(int reg)
+long do_get_debugreg(int reg)
 {
     /* Avoid implementation defined behavior casting unsigned long to long. */
     union {
@@ -40,7 +40,7 @@ long cf_check do_get_debugreg(int reg)
     return res == X86EMUL_OKAY ? u.ret : -ENODEV;
 }
 
-long cf_check do_fpu_taskswitch(int set)
+long do_fpu_taskswitch(int set)
 {
     struct vcpu *v = current;
 
@@ -175,7 +175,7 @@ long set_debugreg(struct vcpu *v, unsigned int reg, unsigned long value)
     return 0;
 }
 
-long cf_check do_stack_switch(unsigned long ss, unsigned long esp)
+long do_stack_switch(unsigned long ss, unsigned long esp)
 {
     fixup_guest_stack_selector(current->domain, ss);
     current->arch.pv.kernel_ss = ss;
@@ -184,7 +184,7 @@ long cf_check do_stack_switch(unsigned long ss, unsigned long esp)
     return 0;
 }
 
-long cf_check do_set_segment_base(unsigned int which, unsigned long base)
+long do_set_segment_base(unsigned int which, unsigned long base)
 {
     struct vcpu *v = current;
     long ret = 0;
diff --git a/xen/arch/x86/pv/shim.c b/xen/arch/x86/pv/shim.c
index 2ee290a392..2b74fea181 100644
--- a/xen/arch/x86/pv/shim.c
+++ b/xen/arch/x86/pv/shim.c
@@ -824,7 +824,7 @@ long pv_shim_grant_table_op(unsigned int cmd,
 
 #ifndef CONFIG_GRANT_TABLE
 /* Thin wrapper(s) needed. */
-long cf_check do_grant_table_op(
+long do_grant_table_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) uop, unsigned int count)
 {
     if ( !pv_shim )
@@ -834,7 +834,7 @@ long cf_check do_grant_table_op(
 }
 
 #ifdef CONFIG_PV32
-int cf_check compat_grant_table_op(
+int compat_grant_table_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) uop, unsigned int count)
 {
     if ( !pv_shim )
diff --git a/xen/arch/x86/x86_64/compat/mm.c b/xen/arch/x86/x86_64/compat/mm.c
index 70b08a832a..d54efaad21 100644
--- a/xen/arch/x86/x86_64/compat/mm.c
+++ b/xen/arch/x86/x86_64/compat/mm.c
@@ -177,7 +177,7 @@ int compat_arch_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 #ifdef CONFIG_PV
 DEFINE_XEN_GUEST_HANDLE(mmuext_op_compat_t);
 
-int cf_check compat_mmuext_op(
+int compat_mmuext_op(
     XEN_GUEST_HANDLE_PARAM(void) arg, unsigned int count,
     XEN_GUEST_HANDLE_PARAM(uint) pdone, unsigned int foreigndom)
 {
diff --git a/xen/arch/x86/x86_64/domain.c b/xen/arch/x86/x86_64/domain.c
index 9c559aa3ea..62fe51ee74 100644
--- a/xen/arch/x86/x86_64/domain.c
+++ b/xen/arch/x86/x86_64/domain.c
@@ -12,7 +12,7 @@
 CHECK_vcpu_get_physid;
 #undef xen_vcpu_get_physid
 
-int cf_check
+int
 compat_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     int rc;
diff --git a/xen/common/argo.c b/xen/common/argo.c
index 26a01c2188..748b8714d6 100644
--- a/xen/common/argo.c
+++ b/xen/common/argo.c
@@ -2069,7 +2069,7 @@ sendv(struct domain *src_d, xen_argo_addr_t *src_addr,
     return ( ret < 0 ) ? ret : len;
 }
 
-long cf_check
+long
 do_argo_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg1,
            XEN_GUEST_HANDLE_PARAM(void) arg2, unsigned long raw_arg3,
            unsigned long raw_arg4)
@@ -2207,7 +2207,7 @@ do_argo_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg1,
 }
 
 #ifdef CONFIG_COMPAT
-int cf_check
+int
 compat_argo_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg1,
                XEN_GUEST_HANDLE_PARAM(void) arg2, unsigned long arg3,
                unsigned long arg4)
diff --git a/xen/common/compat/grant_table.c b/xen/common/compat/grant_table.c
index d5787e3719..4705ee5f76 100644
--- a/xen/common/compat/grant_table.c
+++ b/xen/common/compat/grant_table.c
@@ -56,7 +56,7 @@ CHECK_gnttab_swap_grant_ref;
 CHECK_gnttab_cache_flush;
 #undef xen_gnttab_cache_flush
 
-int cf_check compat_grant_table_op(
+int compat_grant_table_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) cmp_uop, unsigned int count)
 {
     int rc = 0;
diff --git a/xen/common/compat/kernel.c b/xen/common/compat/kernel.c
index 8e8c413bf1..804b919bdc 100644
--- a/xen/common/compat/kernel.c
+++ b/xen/common/compat/kernel.c
@@ -37,7 +37,7 @@ CHECK_TYPE(capabilities_info);
 
 CHECK_TYPE(domain_handle);
 
-#define DO(fn) int cf_check compat_##fn
+#define DO(fn) int compat_##fn
 #define COMPAT
 
 #include "../kernel.c"
diff --git a/xen/common/compat/memory.c b/xen/common/compat/memory.c
index 077ded4a75..ce1de1b307 100644
--- a/xen/common/compat/memory.c
+++ b/xen/common/compat/memory.c
@@ -53,8 +53,7 @@ static int cf_check get_reserved_device_memory(
 }
 #endif
 
-int cf_check compat_memory_op(
-    unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) compat)
+int compat_memory_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) compat)
 {
     struct vcpu *curr = current;
     struct domain *currd = curr->domain;
diff --git a/xen/common/dm.c b/xen/common/dm.c
index fcb3a1aa05..201b652deb 100644
--- a/xen/common/dm.c
+++ b/xen/common/dm.c
@@ -19,7 +19,7 @@
 #include <xen/hypercall.h>
 #include <xen/nospec.h>
 
-long cf_check do_dm_op(
+long do_dm_op(
     domid_t domid, unsigned int nr_bufs,
     XEN_GUEST_HANDLE_PARAM(xen_dm_op_buf_t) bufs)
 {
diff --git a/xen/common/domain.c b/xen/common/domain.c
index 70747c02e6..2f8efbb6d8 100644
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -1754,7 +1754,7 @@ long common_vcpu_op(int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
 }
 
 #ifdef arch_vm_assist_valid_mask
-long cf_check do_vm_assist(unsigned int cmd, unsigned int type)
+long do_vm_assist(unsigned int cmd, unsigned int type)
 {
     struct domain *currd = current->domain;
     const unsigned long valid = arch_vm_assist_valid_mask(currd);
diff --git a/xen/common/domctl.c b/xen/common/domctl.c
index 9606fa4f1a..879a2adcbe 100644
--- a/xen/common/domctl.c
+++ b/xen/common/domctl.c
@@ -274,7 +274,7 @@ static struct vnuma_info *vnuma_init(const struct xen_domctl_vnuma *uinfo,
     return ERR_PTR(ret);
 }
 
-long cf_check do_domctl(XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl)
+long do_domctl(XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl)
 {
     long ret = 0;
     bool_t copyback = 0;
diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c
index 0a82eb3ac2..5e2420fa12 100644
--- a/xen/common/event_channel.c
+++ b/xen/common/event_channel.c
@@ -1191,7 +1191,7 @@ static int evtchn_set_priority(const struct evtchn_set_priority *set_priority)
     return ret;
 }
 
-long cf_check do_event_channel_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long do_event_channel_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     int rc;
 
diff --git a/xen/common/grant_table.c b/xen/common/grant_table.c
index febbe12eab..c71d3ad24b 100644
--- a/xen/common/grant_table.c
+++ b/xen/common/grant_table.c
@@ -3559,8 +3559,7 @@ gnttab_cache_flush(XEN_GUEST_HANDLE_PARAM(gnttab_cache_flush_t) uop,
     return 0;
 }
 
-long cf_check
-do_grant_table_op(
+long do_grant_table_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) uop, unsigned int count)
 {
     long rc;
diff --git a/xen/common/hypfs.c b/xen/common/hypfs.c
index 0d22396f5d..acd258edf2 100644
--- a/xen/common/hypfs.c
+++ b/xen/common/hypfs.c
@@ -670,7 +670,7 @@ static int hypfs_write(struct hypfs_entry *entry,
     return entry->funcs->write(l, uaddr, ulen);
 }
 
-long cf_check do_hypfs_op(
+long do_hypfs_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(const_char) arg1,
     unsigned long arg2, XEN_GUEST_HANDLE_PARAM(void) arg3, unsigned long arg4)
 {
diff --git a/xen/common/kernel.c b/xen/common/kernel.c
index adff2d2c77..08bdae082a 100644
--- a/xen/common/kernel.c
+++ b/xen/common/kernel.c
@@ -451,7 +451,7 @@ static int __init cf_check param_init(void)
 __initcall(param_init);
 #endif
 
-# define DO(fn) long cf_check do_##fn
+# define DO(fn) long do_##fn
 
 #endif
 
diff --git a/xen/common/kexec.c b/xen/common/kexec.c
index 41669964d2..7095651605 100644
--- a/xen/common/kexec.c
+++ b/xen/common/kexec.c
@@ -1265,13 +1265,13 @@ static int do_kexec_op_internal(unsigned int op,
     return ret;
 }
 
-long cf_check do_kexec_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg)
+long do_kexec_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg)
 {
     return do_kexec_op_internal(op, uarg, 0);
 }
 
 #ifdef CONFIG_COMPAT
-int cf_check compat_kexec_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg)
+int compat_kexec_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg)
 {
     return do_kexec_op_internal(op, uarg, 1);
 }
diff --git a/xen/common/memory.c b/xen/common/memory.c
index 69b0cd1e50..963f4df1b6 100644
--- a/xen/common/memory.c
+++ b/xen/common/memory.c
@@ -1367,7 +1367,7 @@ static int acquire_resource(
     return rc;
 }
 
-long cf_check do_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long do_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     struct domain *d, *curr_d = current->domain;
     long rc;
diff --git a/xen/common/multicall.c b/xen/common/multicall.c
index 9db49092b4..1f0cc4cb26 100644
--- a/xen/common/multicall.c
+++ b/xen/common/multicall.c
@@ -33,8 +33,7 @@ static void trace_multicall_call(multicall_entry_t *call)
     __trace_multicall_call(call);
 }
 
-ret_t cf_check
-do_multicall(
+ret_t do_multicall(
     XEN_GUEST_HANDLE_PARAM(multicall_entry_t) call_list, uint32_t nr_calls)
 {
     struct vcpu *curr = current;
diff --git a/xen/common/sched/compat.c b/xen/common/sched/compat.c
index 66ba0fe88f..040b4caca2 100644
--- a/xen/common/sched/compat.c
+++ b/xen/common/sched/compat.c
@@ -39,7 +39,7 @@ static int compat_poll(struct compat_sched_poll *compat)
 
 #include "core.c"
 
-int cf_check compat_set_timer_op(u32 lo, s32 hi)
+int compat_set_timer_op(u32 lo, s32 hi)
 {
     return do_set_timer_op(((s64)hi << 32) | lo);
 }
diff --git a/xen/common/sched/core.c b/xen/common/sched/core.c
index 19ab678181..25885b5640 100644
--- a/xen/common/sched/core.c
+++ b/xen/common/sched/core.c
@@ -1862,7 +1862,7 @@ typedef long ret_t;
 
 #endif /* !COMPAT */
 
-ret_t cf_check do_sched_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+ret_t do_sched_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     ret_t ret = 0;
 
@@ -1999,7 +1999,7 @@ ret_t cf_check do_sched_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 #ifndef COMPAT
 
 /* Per-vcpu oneshot-timer hypercall. */
-long cf_check do_set_timer_op(s_time_t timeout)
+long do_set_timer_op(s_time_t timeout)
 {
     struct vcpu *v = current;
     s_time_t offset = timeout - NOW();
diff --git a/xen/common/sysctl.c b/xen/common/sysctl.c
index fc4a0b31d6..1ad3c29351 100644
--- a/xen/common/sysctl.c
+++ b/xen/common/sysctl.c
@@ -29,7 +29,7 @@
 #include <xen/livepatch.h>
 #include <xen/coverage.h>
 
-long cf_check do_sysctl(XEN_GUEST_HANDLE_PARAM(xen_sysctl_t) u_sysctl)
+long do_sysctl(XEN_GUEST_HANDLE_PARAM(xen_sysctl_t) u_sysctl)
 {
     long ret = 0;
     int copyback = -1;
diff --git a/xen/common/xenoprof.c b/xen/common/xenoprof.c
index af617f1d0b..1926a92fe4 100644
--- a/xen/common/xenoprof.c
+++ b/xen/common/xenoprof.c
@@ -721,7 +721,7 @@ static int xenoprof_op_get_buffer(XEN_GUEST_HANDLE_PARAM(void) arg)
                       || (op == XENOPROF_disable_virq)  \
                       || (op == XENOPROF_get_buffer))
  
-ret_t cf_check do_xenoprof_op(int op, XEN_GUEST_HANDLE_PARAM(void) arg)
+ret_t do_xenoprof_op(int op, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     int ret = 0;
     
diff --git a/xen/drivers/char/console.c b/xen/drivers/char/console.c
index d9d6556c22..c53fe30313 100644
--- a/xen/drivers/char/console.c
+++ b/xen/drivers/char/console.c
@@ -675,7 +675,7 @@ static long guest_console_write(XEN_GUEST_HANDLE_PARAM(char) buffer,
     return 0;
 }
 
-long cf_check do_console_io(
+long do_console_io(
     unsigned int cmd, unsigned int count, XEN_GUEST_HANDLE_PARAM(char) buffer)
 {
     long rc;
diff --git a/xen/scripts/gen_hypercall.awk b/xen/scripts/gen_hypercall.awk
index 403758be21..34840c514f 100644
--- a/xen/scripts/gen_hypercall.awk
+++ b/xen/scripts/gen_hypercall.awk
@@ -226,7 +226,7 @@ END {
     # Generate prototypes
     for (i = 1; i <= n; i++) {
         for (p = 1; p <= n_pre[i]; p++) {
-            printf("%s cf_check %s_%s(", rettype[pre[i, p]], pre[i, p], fn[i]);
+            printf("%s %s_%s(", rettype[pre[i, p]], pre[i, p], fn[i]);
             if (n_args[i] == 0)
                 printf("void");
             else
diff --git a/xen/xsm/xsm_core.c b/xen/xsm/xsm_core.c
index 2286a502e3..eaa028109b 100644
--- a/xen/xsm/xsm_core.c
+++ b/xen/xsm/xsm_core.c
@@ -219,13 +219,13 @@ bool __init has_xsm_magic(paddr_t start)
 
 #endif
 
-long cf_check do_xsm_op(XEN_GUEST_HANDLE_PARAM(void) op)
+long do_xsm_op(XEN_GUEST_HANDLE_PARAM(void) op)
 {
     return xsm_do_xsm_op(op);
 }
 
 #ifdef CONFIG_COMPAT
-int cf_check compat_xsm_op(XEN_GUEST_HANDLE_PARAM(void) op)
+int compat_xsm_op(XEN_GUEST_HANDLE_PARAM(void) op)
 {
     return xsm_do_compat_op(op);
 }
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 08:13:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 08:13:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294187.500059 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXIau-0007Hg-Ce; Thu, 24 Mar 2022 08:13:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294187.500059; Thu, 24 Mar 2022 08:13:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXIau-0007FS-4Q; Thu, 24 Mar 2022 08:13:20 +0000
Received: by outflank-mailman (input) for mailman id 294187;
 Thu, 24 Mar 2022 08:13:18 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+IHq=UD=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXIas-0006ux-Cy
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 08:13:18 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 41f70fef-ab4a-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 09:13:16 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 55B381F38D;
 Thu, 24 Mar 2022 08:13:16 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 0A99F13B98;
 Thu, 24 Mar 2022 08:13:16 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id ALtDARwoPGIpEwAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 24 Mar 2022 08:13:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 41f70fef-ab4a-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648109596; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=n67VQEX4iV2oh85GVFNqUsgkQtdMC9V8ZkWuqipq+Ss=;
	b=N6FETvHeh/aUxOWcU73VQPtDQhinY5zFUcL4RE56OudPwkZcwdm9nAUx8UY5dAJ3e+N+8L
	G0OeU0hRt9UukYqGzd1nhNEJdpXTSos2seSnpLDLo+/f9zeU2fOpgJq94venj81Yqe/Wbq
	Rtm4mesGj/rC7AjLIlUkuU2kJqPaUMM=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>,
	George Dunlap <george.dunlap@citrix.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Christopher Clark <christopher.w.clark@gmail.com>
Subject: [PATCH v5 03/10] xen: harmonize return types of hypercall handlers
Date: Thu, 24 Mar 2022 09:13:05 +0100
Message-Id: <20220324081312.18222-4-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220324081312.18222-1-jgross@suse.com>
References: <20220324081312.18222-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Today most hypercall handlers have a return type of long, while the
compat ones return an int. There are a few exceptions from that rule,
however.

Get rid of the exceptions by letting compat handlers always return int
and others always return long, with the exception of the Arm specific
physdev_op handler.

For the compat hvm case use eax instead of rax for the stored result as
it should have been from the beginning.

Additionally move some prototypes to include/asm-x86/hypercall.h
as they are x86 specific. Move the compat_platform_op() prototype to
the common header.

Rename paging_domctl_continuation() to do_paging_domctl_cont() and add
a matching define for the associated hypercall.

Make do_callback_op() and compat_callback_op() more similar by adding
the const attribute to compat_callback_op()'s 2nd parameter.

Change the type of the cmd parameter for [do|compat]_kexec_op() to
unsigned int, as this is more appropriate for the compat case.

Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
---
V2:
- rework platform_op compat handling (Jan Beulich)
V3:
- remove include of types.h (Jan Beulich)
V4:
- don't move do_physdev_op() (Julien Grall)
- carve out non style compliant parameter replacements (Julien Grall)
---
 xen/arch/x86/domctl.c                    |  4 +--
 xen/arch/x86/hvm/hypercall.c             |  8 ++----
 xen/arch/x86/hypercall.c                 |  2 +-
 xen/arch/x86/include/asm/hypercall.h     | 31 ++++++++++++------------
 xen/arch/x86/include/asm/paging.h        |  3 ---
 xen/arch/x86/mm/paging.c                 |  3 ++-
 xen/arch/x86/pv/callback.c               | 14 +++++------
 xen/arch/x86/pv/emul-priv-op.c           |  2 +-
 xen/arch/x86/pv/hypercall.c              |  5 +---
 xen/arch/x86/pv/iret.c                   |  4 +--
 xen/arch/x86/pv/misc-hypercalls.c        | 14 +++++++----
 xen/arch/x86/x86_64/platform_hypercall.c |  1 +
 xen/common/argo.c                        |  6 ++---
 xen/common/kexec.c                       |  6 ++---
 xen/include/xen/hypercall.h              | 20 +++++++--------
 15 files changed, 59 insertions(+), 64 deletions(-)

diff --git a/xen/arch/x86/domctl.c b/xen/arch/x86/domctl.c
index e49f9e91b9..ea7d60ffb6 100644
--- a/xen/arch/x86/domctl.c
+++ b/xen/arch/x86/domctl.c
@@ -221,8 +221,8 @@ long arch_do_domctl(
     case XEN_DOMCTL_shadow_op:
         ret = paging_domctl(d, &domctl->u.shadow_op, u_domctl, 0);
         if ( ret == -ERESTART )
-            return hypercall_create_continuation(__HYPERVISOR_arch_1,
-                                                 "h", u_domctl);
+            return hypercall_create_continuation(
+                       __HYPERVISOR_paging_domctl_cont, "h", u_domctl);
         copyback = true;
         break;
 
diff --git a/xen/arch/x86/hvm/hypercall.c b/xen/arch/x86/hvm/hypercall.c
index 62b5349e7d..3a35543997 100644
--- a/xen/arch/x86/hvm/hypercall.c
+++ b/xen/arch/x86/hvm/hypercall.c
@@ -124,8 +124,6 @@ static long cf_check hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
     [ __HYPERVISOR_ ## x ] = { (hypercall_fn_t *) do_ ## x,  \
                                (hypercall_fn_t *) compat_ ## x }
 
-#define do_arch_1             paging_domctl_continuation
-
 static const struct {
     hypercall_fn_t *native, *compat;
 } hvm_hypercall_table[] = {
@@ -158,11 +156,9 @@ static const struct {
 #ifdef CONFIG_HYPFS
     HYPERCALL(hypfs_op),
 #endif
-    HYPERCALL(arch_1)
+    HYPERCALL(paging_domctl_cont)
 };
 
-#undef do_arch_1
-
 #undef HYPERCALL
 #undef HVM_CALL
 #undef COMPAT_CALL
@@ -300,7 +296,7 @@ int hvm_hypercall(struct cpu_user_regs *regs)
 #endif
 
         curr->hcall_compat = true;
-        regs->rax = hvm_hypercall_table[eax].compat(ebx, ecx, edx, esi, edi);
+        regs->eax = hvm_hypercall_table[eax].compat(ebx, ecx, edx, esi, edi);
         curr->hcall_compat = false;
 
 #ifndef NDEBUG
diff --git a/xen/arch/x86/hypercall.c b/xen/arch/x86/hypercall.c
index 2370d31d3f..07e1a45ef5 100644
--- a/xen/arch/x86/hypercall.c
+++ b/xen/arch/x86/hypercall.c
@@ -75,7 +75,7 @@ const hypercall_args_t hypercall_args_table[NR_hypercalls] =
     ARGS(dm_op, 3),
     ARGS(hypfs_op, 5),
     ARGS(mca, 1),
-    ARGS(arch_1, 1),
+    ARGS(paging_domctl_cont, 1),
 };
 
 #undef COMP
diff --git a/xen/arch/x86/include/asm/hypercall.h b/xen/arch/x86/include/asm/hypercall.h
index d6daa7e4cb..49973820af 100644
--- a/xen/arch/x86/include/asm/hypercall.h
+++ b/xen/arch/x86/include/asm/hypercall.h
@@ -11,6 +11,8 @@
 #include <public/arch-x86/xen-mca.h> /* for do_mca */
 #include <asm/paging.h>
 
+#define __HYPERVISOR_paging_domctl_cont __HYPERVISOR_arch_1
+
 typedef unsigned long hypercall_fn_t(
     unsigned long, unsigned long, unsigned long,
     unsigned long, unsigned long);
@@ -80,7 +82,7 @@ do_set_debugreg(
     int reg,
     unsigned long value);
 
-extern unsigned long cf_check
+extern long cf_check
 do_get_debugreg(
     int reg);
 
@@ -118,7 +120,7 @@ do_mmuext_op(
 extern long cf_check do_callback_op(
     int cmd, XEN_GUEST_HANDLE_PARAM(const_void) arg);
 
-extern unsigned long cf_check
+extern long cf_check
 do_iret(
     void);
 
@@ -133,17 +135,20 @@ do_set_segment_base(
     unsigned int which,
     unsigned long base);
 
+long cf_check do_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
+
+long cf_check do_xenpmu_op(unsigned int op,
+                           XEN_GUEST_HANDLE_PARAM(xen_pmu_params_t) arg);
+
+long cf_check do_paging_domctl_cont(
+    XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl);
+
 #ifdef CONFIG_COMPAT
 
 #include <compat/arch-x86/xen.h>
 #include <compat/physdev.h>
 #include <compat/platform.h>
 
-extern int cf_check
-compat_physdev_op(
-    int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
 extern int
 compat_common_vcpu_op(
     int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg);
@@ -154,12 +159,8 @@ extern int cf_check compat_mmuext_op(
     XEN_GUEST_HANDLE_PARAM(uint) pdone,
     unsigned int foreigndom);
 
-DEFINE_XEN_GUEST_HANDLE(compat_platform_op_t);
-extern int cf_check compat_platform_op(
-    XEN_GUEST_HANDLE_PARAM(compat_platform_op_t) u_xenpf_op);
-
-extern long cf_check compat_callback_op(
-    int cmd, XEN_GUEST_HANDLE(void) arg);
+extern int cf_check compat_callback_op(
+    int cmd, XEN_GUEST_HANDLE(const_void) arg);
 
 extern int cf_check compat_update_va_mapping(
     unsigned int va, uint32_t lo, uint32_t hi, unsigned int flags);
@@ -177,12 +178,12 @@ extern int cf_check compat_set_gdt(
 extern int cf_check compat_update_descriptor(
     uint32_t pa_lo, uint32_t pa_hi, uint32_t desc_lo, uint32_t desc_hi);
 
-extern unsigned int cf_check compat_iret(void);
+extern int cf_check compat_iret(void);
 
 extern int cf_check compat_nmi_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
 
-extern long cf_check compat_set_callbacks(
+extern int cf_check compat_set_callbacks(
     unsigned long event_selector, unsigned long event_address,
     unsigned long failsafe_selector, unsigned long failsafe_address);
 
diff --git a/xen/arch/x86/include/asm/paging.h b/xen/arch/x86/include/asm/paging.h
index f0b4efc66e..54c440be65 100644
--- a/xen/arch/x86/include/asm/paging.h
+++ b/xen/arch/x86/include/asm/paging.h
@@ -234,9 +234,6 @@ int paging_domctl(struct domain *d, struct xen_domctl_shadow_op *sc,
                   XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl,
                   bool_t resuming);
 
-/* Helper hypercall for dealing with continuations. */
-long cf_check paging_domctl_continuation(XEN_GUEST_HANDLE_PARAM(xen_domctl_t));
-
 /* Call when destroying a vcpu/domain */
 void paging_vcpu_teardown(struct vcpu *v);
 int paging_teardown(struct domain *d);
diff --git a/xen/arch/x86/mm/paging.c b/xen/arch/x86/mm/paging.c
index 1f0b94ad21..a7e2707ecc 100644
--- a/xen/arch/x86/mm/paging.c
+++ b/xen/arch/x86/mm/paging.c
@@ -21,6 +21,7 @@
 
 #include <xen/init.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <asm/paging.h>
 #include <asm/shadow.h>
 #include <asm/p2m.h>
@@ -759,7 +760,7 @@ int paging_domctl(struct domain *d, struct xen_domctl_shadow_op *sc,
         return shadow_domctl(d, sc, u_domctl);
 }
 
-long cf_check paging_domctl_continuation(
+long cf_check do_paging_domctl_cont(
     XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl)
 {
     struct xen_domctl op;
diff --git a/xen/arch/x86/pv/callback.c b/xen/arch/x86/pv/callback.c
index 55148c7f9e..1be9d3f731 100644
--- a/xen/arch/x86/pv/callback.c
+++ b/xen/arch/x86/pv/callback.c
@@ -207,9 +207,9 @@ long cf_check do_set_callbacks(
 #include <compat/callback.h>
 #include <compat/nmi.h>
 
-static long compat_register_guest_callback(struct compat_callback_register *reg)
+static int compat_register_guest_callback(struct compat_callback_register *reg)
 {
-    long ret = 0;
+    int ret = 0;
     struct vcpu *curr = current;
 
     fixup_guest_code_selector(curr->domain, reg->address.cs);
@@ -256,10 +256,10 @@ static long compat_register_guest_callback(struct compat_callback_register *reg)
     return ret;
 }
 
-static long compat_unregister_guest_callback(
+static int compat_unregister_guest_callback(
     struct compat_callback_unregister *unreg)
 {
-    long ret;
+    int ret;
 
     switch ( unreg->type )
     {
@@ -283,9 +283,9 @@ static long compat_unregister_guest_callback(
     return ret;
 }
 
-long cf_check compat_callback_op(int cmd, XEN_GUEST_HANDLE(void) arg)
+int cf_check compat_callback_op(int cmd, XEN_GUEST_HANDLE(const_void) arg)
 {
-    long ret;
+    int ret;
 
     switch ( cmd )
     {
@@ -321,7 +321,7 @@ long cf_check compat_callback_op(int cmd, XEN_GUEST_HANDLE(void) arg)
     return ret;
 }
 
-long cf_check compat_set_callbacks(
+int cf_check compat_set_callbacks(
     unsigned long event_selector, unsigned long event_address,
     unsigned long failsafe_selector, unsigned long failsafe_address)
 {
diff --git a/xen/arch/x86/pv/emul-priv-op.c b/xen/arch/x86/pv/emul-priv-op.c
index 22b10dec2a..5da00e24e4 100644
--- a/xen/arch/x86/pv/emul-priv-op.c
+++ b/xen/arch/x86/pv/emul-priv-op.c
@@ -22,13 +22,13 @@
 #include <xen/domain_page.h>
 #include <xen/event.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/iocap.h>
 
 #include <asm/amd.h>
 #include <asm/debugreg.h>
 #include <asm/endbr.h>
 #include <asm/hpet.h>
-#include <asm/hypercall.h>
 #include <asm/mc146818rtc.h>
 #include <asm/pv/domain.h>
 #include <asm/pv/trace.h>
diff --git a/xen/arch/x86/pv/hypercall.c b/xen/arch/x86/pv/hypercall.c
index e8fbee7bbb..fe8dfe9e8f 100644
--- a/xen/arch/x86/pv/hypercall.c
+++ b/xen/arch/x86/pv/hypercall.c
@@ -47,8 +47,6 @@ typedef struct {
 #define COMPAT_CALL(x) HYPERCALL(x)
 #endif
 
-#define do_arch_1             paging_domctl_continuation
-
 static const pv_hypercall_table_t pv_hypercall_table[] = {
     COMPAT_CALL(set_trap_table),
     HYPERCALL(mmu_update),
@@ -109,11 +107,10 @@ static const pv_hypercall_table_t pv_hypercall_table[] = {
 #endif
     HYPERCALL(mca),
 #ifndef CONFIG_PV_SHIM_EXCLUSIVE
-    HYPERCALL(arch_1),
+    HYPERCALL(paging_domctl_cont),
 #endif
 };
 
-#undef do_arch_1
 #undef COMPAT_CALL
 #undef HYPERCALL
 
diff --git a/xen/arch/x86/pv/iret.c b/xen/arch/x86/pv/iret.c
index dd2965d8f0..55eb6a63bd 100644
--- a/xen/arch/x86/pv/iret.c
+++ b/xen/arch/x86/pv/iret.c
@@ -48,7 +48,7 @@ static void async_exception_cleanup(struct vcpu *curr)
         curr->arch.async_exception_state(trap).old_mask;
 }
 
-unsigned long cf_check do_iret(void)
+long cf_check do_iret(void)
 {
     struct cpu_user_regs *regs = guest_cpu_user_regs();
     struct iret_context iret_saved;
@@ -105,7 +105,7 @@ unsigned long cf_check do_iret(void)
 }
 
 #ifdef CONFIG_PV32
-unsigned int cf_check compat_iret(void)
+int cf_check compat_iret(void)
 {
     struct cpu_user_regs *regs = guest_cpu_user_regs();
     struct vcpu *v = current;
diff --git a/xen/arch/x86/pv/misc-hypercalls.c b/xen/arch/x86/pv/misc-hypercalls.c
index 5649aaab44..635f5a644a 100644
--- a/xen/arch/x86/pv/misc-hypercalls.c
+++ b/xen/arch/x86/pv/misc-hypercalls.c
@@ -28,12 +28,16 @@ long cf_check do_set_debugreg(int reg, unsigned long value)
     return set_debugreg(current, reg, value);
 }
 
-unsigned long cf_check do_get_debugreg(int reg)
+long cf_check do_get_debugreg(int reg)
 {
-    unsigned long val;
-    int res = x86emul_read_dr(reg, &val, NULL);
-
-    return res == X86EMUL_OKAY ? val : -ENODEV;
+    /* Avoid implementation defined behavior casting unsigned long to long. */
+    union {
+        unsigned long val;
+        long ret;
+    } u;
+    int res = x86emul_read_dr(reg, &u.val, NULL);
+
+    return res == X86EMUL_OKAY ? u.ret : -ENODEV;
 }
 
 long cf_check do_fpu_taskswitch(int set)
diff --git a/xen/arch/x86/x86_64/platform_hypercall.c b/xen/arch/x86/x86_64/platform_hypercall.c
index 966fd27b5f..2c21a3fd05 100644
--- a/xen/arch/x86/x86_64/platform_hypercall.c
+++ b/xen/arch/x86/x86_64/platform_hypercall.c
@@ -4,6 +4,7 @@
 
 EMIT_FILE;
 
+#include <xen/hypercall.h>
 #include <xen/lib.h>
 #include <compat/platform.h>
 #include <xen/hypercall.h>
diff --git a/xen/common/argo.c b/xen/common/argo.c
index 297f6d11f0..26a01c2188 100644
--- a/xen/common/argo.c
+++ b/xen/common/argo.c
@@ -2207,13 +2207,13 @@ do_argo_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg1,
 }
 
 #ifdef CONFIG_COMPAT
-long cf_check
+int cf_check
 compat_argo_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg1,
                XEN_GUEST_HANDLE_PARAM(void) arg2, unsigned long arg3,
                unsigned long arg4)
 {
     struct domain *currd = current->domain;
-    long rc;
+    int rc;
     xen_argo_send_addr_t send_addr;
     xen_argo_iov_t iovs[XEN_ARGO_MAXIOV];
     compat_argo_iov_t compat_iovs[XEN_ARGO_MAXIOV];
@@ -2267,7 +2267,7 @@ compat_argo_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg1,
 
     rc = sendv(currd, &send_addr.src, &send_addr.dst, iovs, niov, arg4);
  out:
-    argo_dprintk("<-compat_argo_op(%u)=%ld\n", cmd, rc);
+    argo_dprintk("<-compat_argo_op(%u)=%d\n", cmd, rc);
 
     return rc;
 }
diff --git a/xen/common/kexec.c b/xen/common/kexec.c
index a2ffb6530c..41669964d2 100644
--- a/xen/common/kexec.c
+++ b/xen/common/kexec.c
@@ -1213,7 +1213,7 @@ static int kexec_status(XEN_GUEST_HANDLE_PARAM(void) uarg)
     return !!test_bit(bit, &kexec_flags);
 }
 
-static int do_kexec_op_internal(unsigned long op,
+static int do_kexec_op_internal(unsigned int op,
                                 XEN_GUEST_HANDLE_PARAM(void) uarg,
                                 bool_t compat)
 {
@@ -1265,13 +1265,13 @@ static int do_kexec_op_internal(unsigned long op,
     return ret;
 }
 
-long cf_check do_kexec_op(unsigned long op, XEN_GUEST_HANDLE_PARAM(void) uarg)
+long cf_check do_kexec_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg)
 {
     return do_kexec_op_internal(op, uarg, 0);
 }
 
 #ifdef CONFIG_COMPAT
-int cf_check compat_kexec_op(unsigned long op, XEN_GUEST_HANDLE_PARAM(void) uarg)
+int cf_check compat_kexec_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg)
 {
     return do_kexec_op_internal(op, uarg, 1);
 }
diff --git a/xen/include/xen/hypercall.h b/xen/include/xen/hypercall.h
index 81aae7a662..a032ba2b4a 100644
--- a/xen/include/xen/hypercall.h
+++ b/xen/include/xen/hypercall.h
@@ -114,11 +114,6 @@ common_vcpu_op(int cmd,
     struct vcpu *v,
     XEN_GUEST_HANDLE_PARAM(void) arg);
 
-extern long cf_check
-do_nmi_op(
-    unsigned int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
 extern long cf_check
 do_hvm_op(
     unsigned long op,
@@ -126,7 +121,7 @@ do_hvm_op(
 
 extern long cf_check
 do_kexec_op(
-    unsigned long op,
+    unsigned int op,
     XEN_GUEST_HANDLE_PARAM(void) uarg);
 
 extern long cf_check
@@ -145,9 +140,6 @@ extern long cf_check do_argo_op(
 extern long cf_check
 do_xenoprof_op(int op, XEN_GUEST_HANDLE_PARAM(void) arg);
 
-extern long cf_check
-do_xenpmu_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(xen_pmu_params_t) arg);
-
 extern long cf_check
 do_dm_op(
     domid_t domid,
@@ -205,15 +197,21 @@ extern int cf_check compat_xsm_op(
     XEN_GUEST_HANDLE_PARAM(void) op);
 
 extern int cf_check compat_kexec_op(
-    unsigned long op, XEN_GUEST_HANDLE_PARAM(void) uarg);
+    unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg);
 
 DEFINE_XEN_GUEST_HANDLE(multicall_entry_compat_t);
 extern int cf_check compat_multicall(
     XEN_GUEST_HANDLE_PARAM(multicall_entry_compat_t) call_list,
     uint32_t nr_calls);
 
+int compat_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
+
+typedef struct compat_platform_op compat_platform_op_t;
+DEFINE_XEN_GUEST_HANDLE(compat_platform_op_t);
+int compat_platform_op(XEN_GUEST_HANDLE_PARAM(compat_platform_op_t) u_xenpf_op);
+
 #ifdef CONFIG_ARGO
-extern long cf_check compat_argo_op(
+extern int cf_check compat_argo_op(
     unsigned int cmd,
     XEN_GUEST_HANDLE_PARAM(void) arg1,
     XEN_GUEST_HANDLE_PARAM(void) arg2,
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 08:31:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 08:31:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294221.500159 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXIsV-0006ya-Ta; Thu, 24 Mar 2022 08:31:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294221.500159; Thu, 24 Mar 2022 08:31:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXIsV-0006yT-Pc; Thu, 24 Mar 2022 08:31:31 +0000
Received: by outflank-mailman (input) for mailman id 294221;
 Thu, 24 Mar 2022 08:31:30 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=eW/x=UD=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nXIsU-0006yN-Cy
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 08:31:30 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04on0620.outbound.protection.outlook.com
 [2a01:111:f400:fe0d::620])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id cce49a76-ab4c-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 09:31:29 +0100 (CET)
Received: from DB6PR0601CA0045.eurprd06.prod.outlook.com (2603:10a6:4:17::31)
 by VI1PR08MB4032.eurprd08.prod.outlook.com (2603:10a6:803:e2::25)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.16; Thu, 24 Mar
 2022 08:31:25 +0000
Received: from DB5EUR03FT003.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:4:17:cafe::54) by DB6PR0601CA0045.outlook.office365.com
 (2603:10a6:4:17::31) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17 via Frontend
 Transport; Thu, 24 Mar 2022 08:31:25 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT003.mail.protection.outlook.com (10.152.20.157) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Thu, 24 Mar 2022 08:31:24 +0000
Received: ("Tessian outbound 741ca6c82739:v113");
 Thu, 24 Mar 2022 08:31:24 +0000
Received: from b52bb298c80b.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 9667C638-A092-46D2-BD56-8D883BF18CF4.1; 
 Thu, 24 Mar 2022 08:31:18 +0000
Received: from EUR01-DB5-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id b52bb298c80b.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 24 Mar 2022 08:31:18 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com (2603:10a6:20b:85::25)
 by DB6PR0801MB1797.eurprd08.prod.outlook.com (2603:10a6:4:32::11)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.19; Thu, 24 Mar
 2022 08:31:16 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62]) by AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62%3]) with mapi id 15.20.5102.018; Thu, 24 Mar 2022
 08:31:15 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cce49a76-ab4c-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=GL8+C0DxIO2X9JEoO0P5jNQzjHBJ9Ntm6OSL0/ylPX4=;
 b=m1UlI5lnE7069DG4MmD0dXl5vtvhQcDUz4V7sPbNM9B51XxB2MfhlRMM3xzviirj3zkYNj2j/1JmPq58NQBoI/O3jKH/3qEn0Kr9XQos47KaXRocSFmEPobGp86AhXlLR8ZoM3E+3cMxq6IalfFMOEtILRp+HFOcT3OilkZU/5M=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 4280ec46f4a042a5
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=hD+KkdG1gtXvwNlEYOR2Fng02VYkGCU1FUUaLh/SypMyvPK35vIfXJK/0thhnKYYqprEzKFBVcrV17nSiq6oocKBAagc3jxWwWDFzYVqccvhmIlOGDj9a6QVgIPeNLvnhPkrWWCZ0Ry+80wiJHM59pUGuhrdbegTqpYVVBwzc+ROmRmf6whJWdrkrCD5DmxodK8z3iSXbQGzrP+9xwZyfZwSe7jVAhoV1UWk0tFHLG/HsQRVITbJDD1kc33ihPQNXT5mLapZNQaA3HSb9A7fU2Pz5ma2P1KIH1TgrJBakZ6Fgt6YzL5PWmUXSAoFh9ZNfQj/PWcm5FdPi2nPpeeqAg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=GL8+C0DxIO2X9JEoO0P5jNQzjHBJ9Ntm6OSL0/ylPX4=;
 b=BC9kU7VtdoshVftVG4fpV7eDSDJNrR7sr6L6uzQnhWG5m1NK8HOd/UVJKegKaTjsM8DTdpKlKDIUPEmqCkcFVe7WX/qZtO+T2yfNIG2EtSkwhm6Bfu2HKyXh6/vjdMI15CSF2K6DFD6COBr1D8LOjxdd2EWdNgbchwQu3gso1EX19gNoZPC8utDypOUa1lwGm5Oa33WDI8CzpqmQF0G6zr/xCAJDSufGP//M8TSO4tcREtqfZOy9fPOl3BqOiFgdhntfMlDeenSVkbklzGkskbzWW/wNyVt8jyU3HYMOeFp8eO11McFBH31kZMuvta0892hVWuP0Wn/aStSyuPp1hQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=GL8+C0DxIO2X9JEoO0P5jNQzjHBJ9Ntm6OSL0/ylPX4=;
 b=m1UlI5lnE7069DG4MmD0dXl5vtvhQcDUz4V7sPbNM9B51XxB2MfhlRMM3xzviirj3zkYNj2j/1JmPq58NQBoI/O3jKH/3qEn0Kr9XQos47KaXRocSFmEPobGp86AhXlLR8ZoM3E+3cMxq6IalfFMOEtILRp+HFOcT3OilkZU/5M=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Stefano Stabellini <sstabellini@kernel.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	"julien@xen.org" <julien@xen.org>, "Volodymyr_Babchuk@epam.com"
	<Volodymyr_Babchuk@epam.com>, Stefano Stabellini
	<stefano.stabellini@xilinx.com>
Subject: Re: [PATCH v2] xen/arm: set CPSR Z bit when creating aarch32 guests
Thread-Topic: [PATCH v2] xen/arm: set CPSR Z bit when creating aarch32 guests
Thread-Index: AQHYPittA0qvCk1VqUeT+Og+1zrr1azMqmOAgAEgdgCAAGvcAA==
Date: Thu, 24 Mar 2022 08:31:14 +0000
Message-ID: <484F678F-0918-407E-B8FE-55022CF22D7D@arm.com>
References: <20220322202825.418232-1-sstabellini@kernel.org>
 <E2220831-D72C-423C-A33F-453C8E851B8D@arm.com>
 <alpine.DEB.2.22.394.2203231844240.2910984@ubuntu-linux-20-04-desktop>
In-Reply-To:
 <alpine.DEB.2.22.394.2203231844240.2910984@ubuntu-linux-20-04-desktop>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 47f02e93-0441-491c-71c3-08da0d70aeda
x-ms-traffictypediagnostic:
	DB6PR0801MB1797:EE_|DB5EUR03FT003:EE_|VI1PR08MB4032:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR08MB4032E1A11F50FACADDD9AB239D199@VI1PR08MB4032.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR08MB3784.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(36756003)(508600001)(6512007)(316002)(2616005)(83380400001)(6916009)(54906003)(71200400001)(966005)(53546011)(6506007)(26005)(186003)(6486002)(91956017)(4326008)(2906002)(8936002)(5660300002)(38070700005)(66476007)(66556008)(33656002)(86362001)(76116006)(38100700002)(66446008)(64756008)(8676002)(66946007)(122000001)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <ECD3B46ECA1FD845AFAD316E4ADE0CE9@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0801MB1797
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT003.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	644d8d23-3afd-44c1-c3d1-08da0d70a959
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	tNv5cd6Kzf6UqFRYAcNwNFHBzyACPBB/vlrKLE0s+/jCtxSI+ldDMl0eXZ3g5sbELwu+m3b+5GArcAUI4TzSWhiYb3O8s/aBBnB67QSf2BEZDhKDLnMdRgk9iGubkgm40DLSVdRNXjYFYY0wUQBKXFYEvSkVeaOmA5sABUyZShcLkrCvNTYnvqZKPrU2LWhwq7rJ0WC51YWr5KIofE8eWSPGxFZjpb2V2oOOBDt5cIpy73tMToOQPVACwE8qivrzR/M9Xwa79QTDU8mERoMX/mm2PIeHmpQV69NmQT5Of+v3CsjmqV+wQj89AfHnumdrABEg6TCTuIogyZkAvBvKV/M9v/R9BuPqjrt3nQOZnR3BzZVlELyWuamxehUdjcWErAB+PJVIWr5KQO5x5QyFwIu19219pPoiBEItcf8vcHp8IRssan6Ad5F2b1jnGJoFTtHgrCZPyoE4YawJlxsj2PB6CJPKt9qmieWd10ogSu2vXpv+tzp/FRtPK81j6H73m7+CflyQlxwK3w7yJLA8ZenbeJpnQVJnpMGFtXGJ6/2K3o0Yb8GwyvvCzV11XE5IWpNod29ilxYbzCcMZ2FyfmpK6K1FV+ip6iVcKHYRCXdv2qfg+ka9SKPNUoJCTz1d0mI8/SHOZaGTX42gNILHxrb1aaaINRNtm+Vb/9RY5FZ8Yk29aOjf4RvozArWuOG3/kj+1CtVBD78qFS0oS0zn8+NN1WHmUXMUkNYgDW0cQsFeqCDmTBjqZ3bZoLpSx9ELTdNdo5RdIdpP/SWtIb+Gw==
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(81166007)(36756003)(36860700001)(2906002)(47076005)(82310400004)(356005)(508600001)(6486002)(966005)(54906003)(4326008)(316002)(70206006)(8676002)(70586007)(336012)(83380400001)(8936002)(6862004)(107886003)(6512007)(26005)(40460700003)(5660300002)(186003)(6506007)(53546011)(2616005)(33656002)(86362001);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Mar 2022 08:31:24.7396
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 47f02e93-0441-491c-71c3-08da0d70aeda
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT003.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB4032

Hi Stefano,

Thanks a lot for the detailed answers.

> On 24 Mar 2022, at 03:05, Stefano Stabellini <sstabellini@kernel.org> wro=
te:
>=20
> On Wed, 23 Mar 2022, Bertrand Marquis wrote:
>>> On 22 Mar 2022, at 21:28, Stefano Stabellini <sstabellini@kernel.org> w=
rote:
>>>=20
>>> From: Stefano Stabellini <stefano.stabellini@xilinx.com>
>>>=20
>>> The first 32 bytes of zImage are NOPs. When CONFIG_EFI is enabled in th=
e
>>> kernel, certain versions of Linux will use an UNPREDICATABLE NOP
>>> encoding, sometimes resulting in an unbootable kernel. Whether the
>>> resulting kernel is bootable or not depends on the processor. See commi=
t
>>> a92882a4d270 in the Linux kernel for all the details.
>>>=20
>>> All kernel releases starting from Linux 4.9 without commit a92882a4d270
>>> are affected.
>>=20
>> Can you confirm if those kernels are also affected when started natively=
 ?
>=20
> Theoretically yes, but in practice only booting on Xen is affected
> because:
>=20
> - the issue cannot happen when booting from u-boot because u-boot sets
>  the "Z" bit
> - the issue cannot happen when booting with QEMU -kernel because it also
>  sets "Z"
> - older bootloaders on native skip the first 32 bytes of the start
>  address, which also masks this problem
>=20
> Thus, in practice, I have no idea how one could reproduce the problem on
> native.
>=20
> This info is in the commit message a92882a4d270 on Linux and in-code
> comments in the kernel.

If uboot is setting we can consider that we have a behaviour equivalent to
a native boot.
Could you add something in the comment in your patch to state that the Z
flag is also set by uboot ?
This will help in the future to remember why it is ok to have that as the
current comment could make one think that this is something only done by
Xen.

>=20
>=20
>>> Fortunately there is a simple workaround: setting the "Z" bit in CPSR
>>> make it so those invalid NOP instructions are never executed. That is
>>> because the instruction is conditional (not equal). So, on QEMU at
>>> least, the instruction will end up to be ignored and not generate an
>>> exception. Setting the "Z" bit makes those kernel versions bootable
>>> again and it is harmless in the other cases.
>>=20
>> I agree with Jan here. This will never be set or should not be expected
>> to be set by anyone when started.
>> It feels to me that we are introducing an ack for a temporary issue in
>> Linux which will makes us derive from the behaviour that could be
>> expected on native hardware.
>>=20
>> Could you give more details on how blocking this is ?=20
>=20
> Without this change, none of the Debian arm32 kernels boot on Xen after
> Jessie (on QEMU).

Ok

>=20
>=20
>> Is the kernel update with the fix available on any of the affected distr=
ibutions ?
>=20
> None that I could find. I tried Debian Buster, Debian Bullseye, Debian
> testing and the latest Alpine Linux. Happy to try more if you give me a
> download link or two.

I think the list is long enough to justify the change.

>=20
>=20
>> Depending on the answers I think we could for example have a config arou=
nd
>> this to flag it as workaround for a specific guest issue so that this is=
 only
>> activated when needed.
>=20
> Also note that this alternative workaround also solves the problem,
> however it has other drawbacks as Julien described:
> [1] https://marc.info/?l=3Dxen-devel&m=3D164774063802402

Definitely setting the Z bit is better I think.

>=20
>=20
> My take on this is the following. PSR_GUEST32_INIT is not part of the
> ABI so this cannot be considered an ABI change.
>=20
> But in any case, given that without this change (or another change [1])
> most of the kernels out there don't work, is there a point in discussing
> ABI breakages? Basically nothing works right now :-D
>=20
> I think it makes sense to think whether this change could cause a kernel
> that used to boot, not to boot anymore. However, I don't think is
> possible because:
>=20
> - we only support zImage on arm32 and "Z" works well with it
> - both u-boot and qemu -kernel set "Z" so we would already now if
>  something broke
>=20

Agree so please add that both in the comment and in the commit message.

Cheers
Bertrand

>=20
>=20
>>> Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
>>> ---
>>> Changes in v2:
>>> - improve commit message
>>> - add in-code comment
>>> - move PSR_Z to the beginning
>>> ---
>>> xen/include/public/arch-arm.h | 8 +++++++-
>>> 1 file changed, 7 insertions(+), 1 deletion(-)
>>>=20
>>> diff --git a/xen/include/public/arch-arm.h b/xen/include/public/arch-ar=
m.h
>>> index 94b31511dd..81cee95f14 100644
>>> --- a/xen/include/public/arch-arm.h
>>> +++ b/xen/include/public/arch-arm.h
>>> @@ -361,6 +361,7 @@ typedef uint64_t xen_callback_t;
>>> #define PSR_DBG_MASK    (1<<9)        /* arm64: Debug Exception mask */
>>> #define PSR_IT_MASK     (0x0600fc00)  /* Thumb If-Then Mask */
>>> #define PSR_JAZELLE     (1<<24)       /* Jazelle Mode */
>>> +#define PSR_Z           (1<<30)       /* Zero condition flag */
>>>=20
>>> /* 32 bit modes */
>>> #define PSR_MODE_USR 0x10
>>> @@ -383,7 +384,12 @@ typedef uint64_t xen_callback_t;
>>> #define PSR_MODE_EL1t 0x04
>>> #define PSR_MODE_EL0t 0x00
>>>=20
>>> -#define PSR_GUEST32_INIT  (PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_=
MODE_SVC)
>>> +/*
>>> + * We set PSR_Z to be able to boot Linux kernel versions with an inval=
id
>>> + * encoding of the first 8 NOP instructions. See commit a92882a4d270 i=
n
>>> + * Linux.
>>> + */
>>> +#define PSR_GUEST32_INIT  (PSR_Z|PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MAS=
K|PSR_MODE_SVC)
>>> #define PSR_GUEST64_INIT (PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MO=
DE_EL1h)
>>>=20
>>> #define SCTLR_GUEST_INIT    xen_mk_ullong(0x00c50078)
>>> --=20
>>> 2.25.1
>>>=20
>>=20



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 09:09:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 09:09:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294227.500169 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXJTR-0001zY-T9; Thu, 24 Mar 2022 09:09:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294227.500169; Thu, 24 Mar 2022 09:09:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXJTR-0001zR-Pt; Thu, 24 Mar 2022 09:09:41 +0000
Received: by outflank-mailman (input) for mailman id 294227;
 Thu, 24 Mar 2022 09:09:40 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nXJTQ-0001zL-FT
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 09:09:40 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXJTP-0008MV-UN; Thu, 24 Mar 2022 09:09:39 +0000
Received: from 54-240-197-233.amazon.com ([54.240.197.233] helo=[10.95.139.99])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXJTP-0002sp-Nk; Thu, 24 Mar 2022 09:09:39 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=XO0fxGIpZS0fMoc6Izajk8ggSVMpHvyqcqzPNLhr7gA=; b=SX6UwoUvOQqOS1Igej7JQERdMI
	ntAY5FWrSXYQXIksl77CjFNQnL9RWHCwqGRU8RjbTAW/K5ll6NqIF7pd8RvCbKv1hFjECyjXSgi+1
	t/jB0X3P1ctA+rn7GVwPXkSZgnvXDyczzE+X4+grUfWljq6wFl4T5qiHP0PSIx/YkOiQ=;
Message-ID: <3a32618d-2a34-bcac-1dfd-d41bbc54a550@xen.org>
Date: Thu, 24 Mar 2022 09:09:37 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v5 02/10] xen: move do_vcpu_op() to arch specific code
To: Juergen Gross <jgross@suse.com>, xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Wei Liu <wl@xen.org>, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
References: <20220324081312.18222-1-jgross@suse.com>
 <20220324081312.18222-3-jgross@suse.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220324081312.18222-3-jgross@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Juergen,

On 24/03/2022 08:13, Juergen Gross wrote:
> The entry point used for the vcpu_op hypercall on Arm is different
> from the one on x86 today, as some of the common sub-ops are not
> supported on Arm. The Arm specific handler filters out the not
> supported sub-ops and then calls the common handler. This leads to the
> weird call hierarchy:
> 
>    do_arm_vcpu_op()
>      do_vcpu_op()
>        arch_do_vcpu_op()
> 
> Clean this up by renaming do_vcpu_op() to common_vcpu_op() and
> arch_do_vcpu_op() in each architecture to do_vcpu_op(). This way one
> of above calls can be avoided without restricting any potential
> future use of common sub-ops for Arm.
> 
> Signed-off-by: Juergen Gross <jgross@suse.com>

Reviewed-by: Julien Grall <jgrall@amazon.com>

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 10:57:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 10:57:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294238.500201 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXL9r-0004NQ-QE; Thu, 24 Mar 2022 10:57:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294238.500201; Thu, 24 Mar 2022 10:57:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXL9r-0004NJ-N5; Thu, 24 Mar 2022 10:57:35 +0000
Received: by outflank-mailman (input) for mailman id 294238;
 Thu, 24 Mar 2022 10:57:35 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=8ILU=UD=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nXL9r-0004ND-18
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 10:57:35 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 34e35955-ab61-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 11:57:33 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2172.outbound.protection.outlook.com [104.47.17.172]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-2-IlhYfJWaO2C7WhTokMpuVg-1; Thu, 24 Mar 2022 11:57:30 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by DU2PR04MB8903.eurprd04.prod.outlook.com (2603:10a6:10:2e2::9) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17; Thu, 24 Mar
 2022 10:57:28 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a%6]) with mapi id 15.20.5102.018; Thu, 24 Mar 2022
 10:57:28 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 34e35955-ab61-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648119452;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=1cOJGGdFUrOU8OTTETiNKtBvsn2MASsZFruwBAOawCM=;
	b=bNiapmX33bq2vrFEy8BNMjTIGQX/WL1DRZDfSQ8YCT0pQ76mIo/4mPeAA+HCFjb6pbGz45
	oQZIpdan6QyDDWPRzHZxsGi5Q5mQ87wEXGhSNQRLSHpgsaBnrLsa0X2nAqbfaim+pZiUaM
	V+UPEQqIeNItUjW8iBiPJJOyMnRAbFM=
X-MC-Unique: IlhYfJWaO2C7WhTokMpuVg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=UGANbBnAwEtj0/u47N/NEWPmwRsbWIZaQl9oKRZLkj1Mi9cJBZrsNiF/Vv7AHxixmRhTUa6PC8UpXMbUIxXTWKb2Ny9Ch4KBIJ2mNk4DvPkCpUrBAvMB7zn6X8BY2XdSxAUGkjN+gQ5NDQEQZZgvKAmf2M5Yl+v3uwYxIYPe5DuNtGL+2GOYkuMhaBn6IEGq157JG3Y+guGI7zXS4rKSEK5m7IeCvhaZFdlBKmh79jvqLTGAO6dbKXYWBsNKNDylkaLtXTBfAQYJuOHPdcDnPQTw/Lb96+GY0xERWjeJS9AOXxF3sxRfra6YrhOCIAA4dyw9hurVW83xZB5UOkR8eg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=1cOJGGdFUrOU8OTTETiNKtBvsn2MASsZFruwBAOawCM=;
 b=YIUgtwryw43qXKOBZBvtMDDWT0m/WyP47sPpuNqgvLwgmITxqlDTP8zrsLpLoapAoveU01+u+3dNZ8akaeoBsJoymNGz69EynkkDxlakCFuBx7Ty3sJ8VBVehf9I7neYWw7Gas5NoVQbU9rrB2YQJBEd5/HSqSM0Td08tslK38LlFOplBTXxFtyBvSDNjw6Cp7DV8o1hyGlPCTkn8JXFI40fjeAuAr+F/hI7wcj8uYQBZz07DldjG/O58uAxpJOEgKWk3oo4eTJNJTrTJGIGmN/8ducof4qbsiMgwVFy/a8EJS/uRqrsfhcp1Sg0Zh+djqub9+7Kz/VCo/usBEP92w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <c53e65d5-82fa-2cbd-c49e-94a3935c2b7e@suse.com>
Date: Thu, 24 Mar 2022 11:57:25 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v5 03/10] xen: harmonize return types of hypercall
 handlers
Content-Language: en-US
To: Juergen Gross <jgross@suse.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>, Wei Liu
 <wl@xen.org>, George Dunlap <george.dunlap@citrix.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Christopher Clark <christopher.w.clark@gmail.com>,
 xen-devel@lists.xenproject.org
References: <20220324081312.18222-1-jgross@suse.com>
 <20220324081312.18222-4-jgross@suse.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220324081312.18222-4-jgross@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9P194CA0028.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:20b:46d::18) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: fd594663-2401-40c6-aa7d-08da0d85160a
X-MS-TrafficTypeDiagnostic: DU2PR04MB8903:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<DU2PR04MB89031B95C0701CB622706015B3199@DU2PR04MB8903.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	As6mPf6VrSBD33rLyP69yRub39QfmtoXcduQjokaxVSbWnAC85Px+1vi/q3liz+Wa3CXN+FQDMsENR5cKtTAeooY8PnTiwT6jIk32C5xlSzdbkjnBKKc1aepuh9828deZIg7lX0xn8t7VMbhjMyD+YGoi5FOYjJGyf9TZkufQufWUj24J8Scfpq5vnJqTPJlijquPBX70m8ggD8iFkH59RloLCO4S7bEKc9Vh54BNohYnfg8ZvX7DSOHbT20RAb6cjvW0QbRcQG4VXUxU146gRJD8V1BGSJnEe+jM1GAJIR8g0HBFdAmr5kAJ4Jg7QUN0jc6KxpkEPLCnK5JiK3zhRyGD3ccgH4kq3AXxSEMBmgGxV/NPxpdWpduuExhOcs79NBjUNkF95lpUr/pmu+NTOVWjvK/6o1r53tYP3SH9kI+4ygmDLWIZa461hJ2DGjhw7i8Y/tvsVZhgW8mJIUJipliT0XucUYNVpXKRoo7dZYT7AbqOdK3QvPaTLTHrGUqjf2dD2+kO81azZD5KO3j1yjtwIYBKjxxCy/wxv92Iwmt/useQttCxO/vx9qMUjiTHXcBdGBK3FDr9X1GtQbaBKzaMaw/JY5MgF3HXh+fB6pk8gcZ23DZxmPCJZQ4Myybi7v2TvHag97nHL8uPvsg/varAs84pNi9cl2w7XLuo231ckBs8Lql3+06njkP2ZKxjPjJPsiU7tr17i5xcdmyX/+IXka0S0ntXYY7BfvCb58=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(26005)(36756003)(6636002)(186003)(316002)(2906002)(66946007)(6862004)(8676002)(83380400001)(4326008)(66476007)(66556008)(31686004)(6486002)(5660300002)(508600001)(37006003)(6666004)(8936002)(6506007)(31696002)(4744005)(54906003)(2616005)(53546011)(6512007)(86362001)(38100700002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?SWs2YTZFa2ZzMEtaZHoySXkrR1F4aFhqUzRxYmh2MGErUUZZQ05sQzlMdkp4?=
 =?utf-8?B?WHB3U2txN0hVOE4xZlI5NWNtS2YwK0JEay9YRUc0WDRaWUJITGhETUdSNmpZ?=
 =?utf-8?B?UjFJZ2praFZrWmJTb1hXSkp4aUg0ait1SUFBbEovV2c1MDdEeExod1dZT1FV?=
 =?utf-8?B?SGlOa2dZbU5TSWJxREdoYUdwYW0wV05qSUVmRUd5VDFLbjFWalh3ZEhoc3hN?=
 =?utf-8?B?NjRHaEcvc1grNUhhbmtPTDVjaGFTUlF2VFBmSHRJRnhWa2l6ZjdjOTNQSHJM?=
 =?utf-8?B?QllreWYyR3FsZ21FRlRoNFNqZ2x5UzFwY1dWUithZ1F2a1ZVYVg1RHJuamFE?=
 =?utf-8?B?Y2t2SDQ3Y0JsU0lwZWJIS0N5QjdQTUU4b3B5N0k2cmY1akRwL0RsaDNrRFJk?=
 =?utf-8?B?WWdHem9PU0VOekxoUERtSnMwWHdLOXhhZG41UzNrVGRaYnMvWGhZRmF3Rm8z?=
 =?utf-8?B?VHd5Vk1hQkFtVStMRk5XVEoxRWd6RmFDUHNVNkl0cXJ0bExEd04wTmo1WlU2?=
 =?utf-8?B?WWU2eDhkWmYwa2FQNU9GbEJmQTVDK3dYQmY3UFkxTDI0OE8zMlJxeHhtUmNk?=
 =?utf-8?B?M0Rxdjl4RThQS25TamQ1ZDFYNWlyZnM3aS8zNDhaK3RFVzh5eVpoeGxncTVY?=
 =?utf-8?B?NkxUdUtVTmZNQUhyVzIvUnlmVzI3SGY4NnhCVzJrSGtBODBZWEJqbjRudGl1?=
 =?utf-8?B?K21XME5VUE9iSllPb3NKN2JmSDhUR2haM2pWY0loU0R2ZHVpT281TmRlS2pN?=
 =?utf-8?B?dzFvSGprMlk3UHJwc2hGVEx4RWM3UmRVcldVSTV4bitCQU9seFdnTVRkU1pI?=
 =?utf-8?B?cmZPaHo2RXc2MlpZb2c3Y2E5b0JOMEMxWFdjd0NzS01PbVlKOUEvVERlUFk1?=
 =?utf-8?B?WUpmazFVRWZuM0syUThJNzExWjh3ZXhBbjdSZEE0aWNEdG9oRlViYzl2dmNF?=
 =?utf-8?B?TVlpM2hoejVkMUhxTTZJaDdWZ21vWENaYWxIM2ZUaGFUYmJJL0hJdWM5VUxt?=
 =?utf-8?B?ZTA3aUVHOEdDaW5uWlBkQy81aG5hZUYzSWlXeU9iV3NmM3RKUWN5ZzYydFV2?=
 =?utf-8?B?djdMK0tpRU5qZEtmNE1uL2E3blYzbWlQU3d0WmpRZ3puNzk0WVk2ZnNob2RG?=
 =?utf-8?B?emN6Q1VBYkpjaWRKc0RRalY4SWlLN2xVelRkN1VCM3R6Sm9hRHdGSmY4THZs?=
 =?utf-8?B?NkQvcGxRQmlSWVN1Z21rVXgrNnlrbkJXN0svVC81UzRETzhDSEwwZ29SOHZ1?=
 =?utf-8?B?U0pxaGc3ZWhCQkdZRWNZckVLS0pGV1U4Y0pkTXdmZENyU1Q1UjFHV3JQYmNS?=
 =?utf-8?B?TjR5REJxVDhGdnlhd3dXQkVHUHpKZkxsNHBUdHlBa1FaOVNwYmRsaXJkak1v?=
 =?utf-8?B?MVN2VXRRUUFCU2REUlJyREdiTnI5a0pycHNJRnpPQmhYZkFaSmNNc1o1SXEr?=
 =?utf-8?B?d2xQbitMQURmVHQ4dThJd3UrRjcva2tOZ0dOOVdXSytNNXVHblFUekw4Tkc1?=
 =?utf-8?B?NlRPT0loWURLNjR6YVppU2hSRldsVEdnQVA0REprYW11akJuK3h0QkxRNlRP?=
 =?utf-8?B?V1pYQ3VwUkdFTTJlb1p0OFFIUjBtTnp3RjNrWVM5UnpXekV3THNtcWsyMlhM?=
 =?utf-8?B?SkplSWU5K2VIazZnN3lWSXo0TTNuTGRyc09RUUhOdWg1VzNwakRsMExhZ1Qy?=
 =?utf-8?B?WHJ1dXQ0WTRJM0cxVW1pdmd2UU5HWGo3YU9yQUpRSndzL1NDNWN3L205Q3Yv?=
 =?utf-8?B?cUwwUEwvdFRzUG9hMVhmZTNmMXgydjlkcTBZMHdlUW5MNWM0endqSmc0VVBB?=
 =?utf-8?B?b0xSTkV2N2g4MFhJRmprVjFYVzErMjJDMnNGazdTVUdWS24rODFRR3h6Qkkv?=
 =?utf-8?B?bEVmc2wyYXFTTEI4eVZXWFJxN3loRmVRWllkR3oxTWsvbUwxelozcmRWYWI0?=
 =?utf-8?Q?fOlUz0cdQQPaEiB3OzBVdhR0gNT/IJSv?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: fd594663-2401-40c6-aa7d-08da0d85160a
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Mar 2022 10:57:27.9361
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: gLuTQXNUAa7hnbyLvZZR93GOBOe2WdxSVjOsTdL0h6yCxkdu5EEk78O3UmVkLW1AU4t2jJAtG4hJ0Xb9okxiYg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DU2PR04MB8903

On 24.03.2022 09:13, Juergen Gross wrote:
> Today most hypercall handlers have a return type of long, while the
> --- a/xen/arch/x86/x86_64/platform_hypercall.c
> +++ b/xen/arch/x86/x86_64/platform_hypercall.c
> @@ -4,6 +4,7 @@
>  
>  EMIT_FILE;
>  
> +#include <xen/hypercall.h>
>  #include <xen/lib.h>
>  #include <compat/platform.h>
>  #include <xen/hypercall.h>

So I thought I could apply patches 4 and 5 alongside patch 1, but patch 4
contextually conflicts with the change above. Looking more closely I was
not able to understand (anymore) what the hunk above is good for: It adds
a redundant #include, just for patch 4 to remove the original instance.
In turn patch 5 then also conflicts, no matter what the correct resolution
would be in patch 4 when pulled ahead of patch 3.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 11:04:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 11:04:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294242.500212 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXLGV-0005tw-K4; Thu, 24 Mar 2022 11:04:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294242.500212; Thu, 24 Mar 2022 11:04:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXLGV-0005tp-Gh; Thu, 24 Mar 2022 11:04:27 +0000
Received: by outflank-mailman (input) for mailman id 294242;
 Thu, 24 Mar 2022 11:04:26 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=eW/x=UD=arm.com=bertrand.marquis@srs-se1.protection.inumbo.net>)
 id 1nXLGU-0005tj-2Z
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 11:04:26 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTP
 id 2a1bef4c-ab62-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 12:04:24 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id D07FF1515;
 Thu, 24 Mar 2022 04:04:23 -0700 (PDT)
Received: from e109506.cambridge.arm.com (e109506.cambridge.arm.com
 [10.1.199.62])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 859B23F73D;
 Thu, 24 Mar 2022 04:04:22 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2a1bef4c-ab62-11ec-8fbc-03012f2f19d4
From: Bertrand Marquis <bertrand.marquis@arm.com>
To: xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Michal Orzel <michal.orzel@arm.com>
Subject: [RFC PATCH] xen/build: Add cppcheck and cppcheck-html make rules
Date: Thu, 24 Mar 2022 11:04:08 +0000
Message-Id: <77c79e86050eef2b706ee11e64183d57a0f5bcee.1648119732.git.bertrand.marquis@arm.com>
X-Mailer: git-send-email 2.25.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

cppcheck can be used to check Xen code quality.

To create a report do "make cppcheck" on a built tree adding any options
you added during the process you used to build xen (like CROSS_COMPILE
or XEN_TARGET_ARCH). This will generate an xml report xen-cppcheck.xml.

To create a html report do "make cppcheck-html" in the same way and a
full report to be seen in a browser will be generated in
cppcheck-htmlreport/index.html.

For better results it is recommended to build your own cppcheck from the
latest sources that you can find at [1].
Development and result analysis has been done with cppcheck 2.7.

The Makefile rule is searching for all C files which have been compiled
(ie which have a generated .o file) and is running cppcheck on all of
them using the current configuration of xen so only the code actually
compiled is checked.

A new tool is introduced to merge all cppcheck reports into one global
report including all findings and removing duplicates.

Some extra variables can be used to customize the report:
- CPPCHECK can be used to give the full path to the cppcheck binary to
use (default is to use the one from the standard path).
- CPPCHECK_HTMLREPORT can be used to give the full path to
cppcheck-htmlreport (default is to use the one from the standard path).

This has been tested on several arm configurations (x86 should work but
has not been tested).

[1] https://cppcheck.sourceforge.io/

Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com>
Signed-off-by: Michal Orzel <michal.orzel@arm.com>
---
 .gitignore                           |  3 ++
 xen/Makefile                         | 75 +++++++++++++++++++++++++++-
 xen/arch/arm/include/asm/processor.h |  4 +-
 xen/include/xen/config.h             |  4 ++
 xen/include/xen/kconfig.h            |  5 ++
 xen/tools/merge_cppcheck_reports.py  | 73 +++++++++++++++++++++++++++
 6 files changed, 161 insertions(+), 3 deletions(-)
 create mode 100755 xen/tools/merge_cppcheck_reports.py

diff --git a/.gitignore b/.gitignore
index d425be4bd9..0d2d60b8f1 100644
--- a/.gitignore
+++ b/.gitignore
@@ -7,6 +7,7 @@
 *.o
 *.d
 *.d2
+*.c.cppcheck
 *.opic
 *.a
 *.so
@@ -296,6 +297,7 @@ xen/.banner
 xen/.config
 xen/.config.old
 xen/.xen.elf32
+xen/xen-cppcheck.xml
 xen/System.map
 xen/arch/x86/boot/mkelf32
 xen/arch/x86/boot/cmdline.S
@@ -316,6 +318,7 @@ xen/arch/*/efi/runtime.c
 xen/arch/*/include/asm/asm-offsets.h
 xen/common/config_data.S
 xen/common/config.gz
+xen/cppcheck-htmlreport
 xen/include/headers*.chk
 xen/include/compat/*
 xen/include/config/
diff --git a/xen/Makefile b/xen/Makefile
index 18a4f7e101..0280d65051 100644
--- a/xen/Makefile
+++ b/xen/Makefile
@@ -336,7 +336,7 @@ export CFLAGS_UBSAN
 
 endif # need-config
 
-main-targets := build install uninstall clean distclean MAP
+main-targets := build install uninstall clean distclean MAP cppcheck cppcheck-html
 .PHONY: $(main-targets)
 ifneq ($(XEN_TARGET_ARCH),x86_32)
 $(main-targets): %: _% ;
@@ -424,15 +424,17 @@ _clean:
 	$(Q)$(MAKE) $(clean)=tools/kconfig
 	find . \( -name "*.o" -o -name ".*.d" -o -name ".*.d2" \
 		-o -name ".*.o.tmp" -o -name "*~" -o -name "core" \
-		-o -name '*.lex.c' -o -name '*.tab.[ch]' \
+		-o -name '*.lex.c' -o -name '*.tab.[ch]' -o -name '*.c.cppcheck' \
 		-o -name "*.gcno" -o -name ".*.cmd" -o -name "lib.a" \) -exec rm -f {} \;
 	rm -f include/asm $(TARGET) $(TARGET).gz $(TARGET).efi $(TARGET).efi.map $(TARGET)-syms $(TARGET)-syms.map
 	rm -f asm-offsets.s arch/*/include/asm/asm-offsets.h
 	rm -f .banner .allconfig.tmp include/xen/compile.h
+	rm -f xen-cppcheck.xml
 
 .PHONY: _distclean
 _distclean: clean
 	rm -f tags TAGS cscope.files cscope.in.out cscope.out cscope.po.out GTAGS GPATH GRTAGS GSYMS .config
+	rm -rf $(CPPCHECK_HTMLREPORT_OUTDIR)
 
 $(TARGET).gz: $(TARGET)
 	gzip -n -f -9 < $< > $@.new
@@ -511,6 +513,75 @@ cloc:
 	    done; \
 	done | cloc --list-file=-
 
+# What cppcheck command to use.
+# To get proper results, it is recommended to build cppcheck manually from the
+# latest source and use CPPCHECK to give the full path to the built version.
+CPPCHECK ?= cppcheck
+
+# What cppcheck-htmlreport to use.
+# If you give the full path to a self compiled cppcheck, this should be set
+# to the full path to cppcheck-html in the htmlreport directory of cppcheck.
+# On recent distribution, this is available in the standard path.
+CPPCHECK_HTMLREPORT ?= cppcheck-htmlreport
+
+# By default we generate the report in cppcheck-htmlreport directory in the
+# build directory. This can be changed by giving a directory in this variable.
+CPPCHECK_HTMLREPORT_OUTDIR ?= cppcheck-htmlreport
+
+# Compile flags to pass to cppcheck:
+# - include directories and defines Xen Makefile is passing (from CFLAGS)
+# - include config.h as this is passed directly to the compiler.
+# - define CPPCHECK as we use to disable or enable some specific part of the
+#   code to solve some cppcheck issues.
+# - explicitely enable some cppcheck checks as we do not want to use "all"
+#   which includes unusedFunction which gives wrong positives as we check file
+#   per file.
+#
+# Compiler defines are in compiler-def.h which is included in config.h
+#
+CPPCHECKFLAGS := -DCPPCHECK --max-ctu-depth=10 \
+				 --enable=style,information,missingInclude \
+				 --include=$(BASEDIR)/include/xen/config.h \
+				 -I $(BASEDIR)/xsm/flask/include \
+				 -I $(BASEDIR)/include/xen/libfdt \
+				 $(filter -D% -I%,$(CFLAGS))
+
+# We need to find all C files (as we are not checking assembly files) so
+# we find all generated .o files which have a .c corresponding file.
+CPPCHECKFILES := $(wildcard $(patsubst %.o,%.c, $(filter-out $(BASEDIR)/tools/%,$(shell find $(BASEDIR) -name "*.o"))))
+
+quiet_cmd_cppcheck_xml = CPPCHECK $(patsubst $(BASEDIR)/%,%,$<)
+cmd_cppcheck_xml = $(CPPCHECK) -v -q --xml $(CPPCHECKFLAGS) \
+				               --output-file=$@ $<
+
+quiet_cmd_merge_cppcheck_reports = CPPCHECK-MERGE $@
+cmd_merge_cppcheck_reports = $(BASEDIR)/tools/merge_cppcheck_reports.py $^ $@
+
+quiet_cmd_cppcheck_html = CPPCHECK-HTML $<
+cmd_cppcheck_html = $(CPPCHECK_HTMLREPORT) --file=$< --source-dir=$(BASEDIR) \
+										   --report-dir=$(CPPCHECK_HTMLREPORT_OUTDIR) \
+										   --title=Xen
+
+PHONY += _cppcheck _cppcheck-html
+
+_cppcheck-html: xen-cppcheck.xml
+	$(call if_changed,cppcheck_html)
+
+_cppcheck: xen-cppcheck.xml
+
+xen-cppcheck.xml: $(patsubst %.c,%.c.cppcheck,$(CPPCHECKFILES))
+ifeq ($(CPPCHECKFILES),)
+	$(error Please build Xen before running cppcheck)
+endif
+	$(call if_changed,merge_cppcheck_reports)
+
+%.c.cppcheck: %.c $(BASEDIR)/include/generated/autoconf.h $(BASEDIR)/include/generated/compiler-def.h
+	$(call if_changed,cppcheck_xml)
+
+# Put this in generated headers this way it is cleaned by include/Makefile
+$(BASEDIR)/include/generated/compiler-def.h:
+	$(Q)$(CC) -dM -E -o $@ - < /dev/null
+
 endif #config-build
 
 PHONY += FORCE
diff --git a/xen/arch/arm/include/asm/processor.h b/xen/arch/arm/include/asm/processor.h
index 852b5f3c24..0b4ba73760 100644
--- a/xen/arch/arm/include/asm/processor.h
+++ b/xen/arch/arm/include/asm/processor.h
@@ -219,9 +219,11 @@
                          SCTLR_Axx_ELx_A    | SCTLR_Axx_ELx_C   |\
                          SCTLR_Axx_ELx_WXN  | SCTLR_Axx_ELx_EE)
 
-#if (SCTLR_EL2_SET ^ SCTLR_EL2_CLEAR) != 0xffffffffffffffffUL
+#ifndef CPPCHECK
+#if (SCTLR_EL2_SET ^ SCTLR_EL2_CLEAR) != 0xffffffffffffffffULL
 #error "Inconsistent SCTLR_EL2 set/clear bits"
 #endif
+#endif
 
 #endif
 
diff --git a/xen/include/xen/config.h b/xen/include/xen/config.h
index b76222ecf6..36e11e7133 100644
--- a/xen/include/xen/config.h
+++ b/xen/include/xen/config.h
@@ -7,6 +7,10 @@
 #ifndef __XEN_CONFIG_H__
 #define __XEN_CONFIG_H__
 
+#ifdef CPPCHECK
+#include <generated/compiler-def.h>
+#endif
+
 #include <xen/kconfig.h>
 
 #ifndef __ASSEMBLY__
diff --git a/xen/include/xen/kconfig.h b/xen/include/xen/kconfig.h
index 4d58c5bb3c..a717b0819c 100644
--- a/xen/include/xen/kconfig.h
+++ b/xen/include/xen/kconfig.h
@@ -8,6 +8,10 @@
  * these only work with boolean option.
  */
 
+/* cppcheck is failing to parse the macro so use a dummy one */
+#ifdef CPPCHECK
+#define IS_ENABLED(option) option
+#else
 /*
  * Getting something that works in C and CPP for an arg that may or may
  * not be defined is tricky.  Here, if we have "#define CONFIG_BOOGER 1"
@@ -27,5 +31,6 @@
  * otherwise.
  */
 #define IS_ENABLED(option) config_enabled(option)
+#endif
 
 #endif /* __XEN_KCONFIG_H */
diff --git a/xen/tools/merge_cppcheck_reports.py b/xen/tools/merge_cppcheck_reports.py
new file mode 100755
index 0000000000..ef055f6925
--- /dev/null
+++ b/xen/tools/merge_cppcheck_reports.py
@@ -0,0 +1,73 @@
+#!/usr/bin/env python
+
+"""
+This script acts as a tool to merge XML files created by cppcheck.
+Usage:
+    merge_cppcheck_reports.py [FILES] [OUTPUT]
+
+    FILES  - list of XML files with extension .cppcheck
+    OUTPUT - file to store results (with .xml extension).
+             If not specified, the script will print results to stdout.
+"""
+
+import sys
+from xml.etree import ElementTree
+
+def elements_equal(el1, el2):
+    if type(el1) != type(el2): return False
+
+    el1_location = str(el1.find('location').attrib)
+    el2_location = str(el2.find('location').attrib)
+
+    if el1_location != el2_location: return False
+
+    return True
+
+def remove_duplicates(xml_root_element):
+    elems_to_remove = []
+    index = 0
+    elems_list = list(xml_root_element.findall("errors")[0])
+    for elem1 in elems_list:
+        index += 1
+        for elem2 in elems_list[index:]:
+            if elements_equal(elem1, elem2) and elem2 not in elems_to_remove:
+                elems_to_remove.append(elem2)
+                continue
+
+    for elem in elems_to_remove:
+        xml_root_element.findall("errors")[0].remove(elem)
+
+def merge(files):
+    result_xml_root = None
+    for xml_file in files:
+        xml_root = ElementTree.parse(xml_file).getroot()
+        for xml_error_elem in xml_root.iter('errors'):
+            if result_xml_root is None:
+                result_xml_root = xml_root
+                insert_point = result_xml_root.findall("errors")[0]
+            else:
+                insert_point.extend(xml_error_elem)
+
+    return result_xml_root
+
+def run():
+    files = []
+    output = None
+    for i in sys.argv[1:]:
+        output = i if '.xml' in i else None
+        files.append(i) if '.cppcheck' in i else None
+
+    result = merge(files)
+
+    if result is None:
+        return
+
+    remove_duplicates(result)
+
+    if output is not None:
+        ElementTree.ElementTree(result).write(output)
+    else:
+        print(ElementTree.tostring(result).decode('utf-8'))
+
+if __name__ == '__main__':
+    run()
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 11:19:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 11:19:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294245.500223 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXLVM-0007TR-Ox; Thu, 24 Mar 2022 11:19:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294245.500223; Thu, 24 Mar 2022 11:19:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXLVM-0007TK-Ly; Thu, 24 Mar 2022 11:19:48 +0000
Received: by outflank-mailman (input) for mailman id 294245;
 Thu, 24 Mar 2022 11:19:47 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+IHq=UD=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXLVL-0007TE-8A
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 11:19:47 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4f60b987-ab64-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 12:19:46 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id A1C491F38D;
 Thu, 24 Mar 2022 11:19:45 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 62D1012FF7;
 Thu, 24 Mar 2022 11:19:45 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id PIqbFtFTPGIzMgAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 24 Mar 2022 11:19:45 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4f60b987-ab64-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648120785; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=OyeL1W/oDX7IwtYkxlM5s6yxrIAm3hiMKl80lJzfsjo=;
	b=D439oqcHkMYS7aMQ+R0EQH7Mq1FSlqYt57ZRjIhDOIiPEUgDTkpg/oJULUd+HBpCV/9xt0
	U9eXVvBWRt28TfatDS8jrxzav+hCe5iA+Rd7nF36Pr5eXBqjJT33BeebtA9vCrD5qLz5Pk
	v+YFAlreZN7AFgWnbhpItxUjz2yWFzk=
Message-ID: <84010992-34ed-3e40-f70d-da91cbb0d210@suse.com>
Date: Thu, 24 Mar 2022 12:19:44 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v5 03/10] xen: harmonize return types of hypercall
 handlers
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>, Wei Liu
 <wl@xen.org>, George Dunlap <george.dunlap@citrix.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Christopher Clark <christopher.w.clark@gmail.com>,
 xen-devel@lists.xenproject.org
References: <20220324081312.18222-1-jgross@suse.com>
 <20220324081312.18222-4-jgross@suse.com>
 <c53e65d5-82fa-2cbd-c49e-94a3935c2b7e@suse.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <c53e65d5-82fa-2cbd-c49e-94a3935c2b7e@suse.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------mqeXIAXwUek10H4KIooUufBb"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------mqeXIAXwUek10H4KIooUufBb
Content-Type: multipart/mixed; boundary="------------9VQ7kNr89GeI65FQwx5qnjtv";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: Jan Beulich <jbeulich@suse.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>, Wei Liu
 <wl@xen.org>, George Dunlap <george.dunlap@citrix.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Christopher Clark <christopher.w.clark@gmail.com>,
 xen-devel@lists.xenproject.org
Message-ID: <84010992-34ed-3e40-f70d-da91cbb0d210@suse.com>
Subject: Re: [PATCH v5 03/10] xen: harmonize return types of hypercall
 handlers
References: <20220324081312.18222-1-jgross@suse.com>
 <20220324081312.18222-4-jgross@suse.com>
 <c53e65d5-82fa-2cbd-c49e-94a3935c2b7e@suse.com>
In-Reply-To: <c53e65d5-82fa-2cbd-c49e-94a3935c2b7e@suse.com>

--------------9VQ7kNr89GeI65FQwx5qnjtv
Content-Type: multipart/mixed; boundary="------------MBy3FpnTgMXZGFT1ICiB72aM"

--------------MBy3FpnTgMXZGFT1ICiB72aM
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------MBy3FpnTgMXZGFT1ICiB72aM
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------MBy3FpnTgMXZGFT1ICiB72aM--

--------------9VQ7kNr89GeI65FQwx5qnjtv--

--------------mqeXIAXwUek10H4KIooUufBb
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmI8U9AFAwAAAAAACgkQsN6d1ii/Ey9g
Jwf/VANbhbM2IfP9Iv25g4ZMCjcRIBBRbFB/QO7lnKbzoQVcZUFKCdLrQYWeoy+364cj1apEX52k
WgDq8U5ZTQ0bDKXrgbc9e999JZPPttb4BPnGbm+c1EkYbwCDc84TAMJg3dNBpDJDGb8Eib1rQgnS
BhPs4uwQyQh0LRKOyuyMiIEDQYSwE7yB5wENscPxLnVqMp01NjBt8WG/4y8gOKLuJRZibYLvFIoD
dsVjUPsBDIfSSF5SmZFMQG3Sua4TEduSYLy3PdXJEDpRZkr7AdzLGIzBe5S2aBWEFWJbvYzVZDS1
/hejhmlC3Dzmq6oDTvdyBsk6vDuQ+xfSpmtJyWLV6A==
=HABl
-----END PGP SIGNATURE-----

--------------mqeXIAXwUek10H4KIooUufBb--


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 11:24:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 11:24:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294248.500234 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXLa3-0000Qb-Aj; Thu, 24 Mar 2022 11:24:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294248.500234; Thu, 24 Mar 2022 11:24:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXLa3-0000QU-7Y; Thu, 24 Mar 2022 11:24:39 +0000
Received: by outflank-mailman (input) for mailman id 294248;
 Thu, 24 Mar 2022 11:24:37 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXLa1-0000QK-Jh; Thu, 24 Mar 2022 11:24:37 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXLa1-0002C1-En; Thu, 24 Mar 2022 11:24:37 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXLa0-00082R-Sj; Thu, 24 Mar 2022 11:24:37 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXLa0-0006JI-SK; Thu, 24 Mar 2022 11:24:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Bs6PZTcCDzi/xUWPhcjttQr5/4rlUyF6KoOuzHhAOFk=; b=nML4FqnO3q68NhJBvbBKNVZerm
	UHWfFpLzK0gVjC5zcA8oxwQwdtbNS1NjAs/UxXTgJMS13UdykKOOPSXhUad9Cc0ForSYaLxHmXkul
	zQO+rfXy/nBcZ6M3p2xZCWHrqvLPtqPSKhH/eVXv5sxKGWBcDZUuvHDd8P3+4m4WrhXs=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168815-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168815: tolerable FAIL
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=69e46280937526db9cf78259cd8a0a9ec62dc847
X-Osstest-Versions-That:
    xen=69e46280937526db9cf78259cd8a0a9ec62dc847
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 24 Mar 2022 11:24:36 +0000

flight 168815 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168815/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168794
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168794
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168794
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168794
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168794
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168794
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168794
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168794
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168794
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168794
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168794
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168794
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  69e46280937526db9cf78259cd8a0a9ec62dc847
baseline version:
 xen                  69e46280937526db9cf78259cd8a0a9ec62dc847

Last test of basis   168815  2022-03-24 01:52:09 Z    0 days
Testing same since                          (not found)         0 attempts

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Published tested tree is already up to date.



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 11:27:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 11:27:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294256.500246 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXLd6-00018G-0K; Thu, 24 Mar 2022 11:27:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294256.500246; Thu, 24 Mar 2022 11:27:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXLd5-000189-R9; Thu, 24 Mar 2022 11:27:47 +0000
Received: by outflank-mailman (input) for mailman id 294256;
 Thu, 24 Mar 2022 11:27:47 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXLd5-00017z-3m; Thu, 24 Mar 2022 11:27:47 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXLd5-0002Ft-2z; Thu, 24 Mar 2022 11:27:47 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXLd4-00087L-N1; Thu, 24 Mar 2022 11:27:46 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXLd4-0008H3-Ma; Thu, 24 Mar 2022 11:27:46 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=yTK5mhrqNntplw7OYjl2AZ2qsysIpvh3zvxZf1LXg1E=; b=DJvOkgZSq2jG/xdDt6DTVupZga
	0S9DeAdIqUskCNARzgwVI7tD5ZMRLnnen/tbziFWTj+2Dc1gtC2/Z/Wmrn62anZjodMAxQ9ssAxik
	LG4YiAR2bAIvVPykCS1eJmot4qy+TEFzvu+IareVCQcL2rL9+f4iEWnEHOWWqrb6rLKY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168820-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168820: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 24 Mar 2022 11:27:46 +0000

flight 168820 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168820/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   24 days
Failing since        168258  2022-03-01 01:55:31 Z   23 days  241 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    2 days   22 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 11:33:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 11:33:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294262.500256 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXLiQ-0002Xm-KB; Thu, 24 Mar 2022 11:33:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294262.500256; Thu, 24 Mar 2022 11:33:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXLiQ-0002Xf-Gs; Thu, 24 Mar 2022 11:33:18 +0000
Received: by outflank-mailman (input) for mailman id 294262;
 Thu, 24 Mar 2022 11:33:17 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=EJ9a=UD=arm.com=Rahul.Singh@srs-se1.protection.inumbo.net>)
 id 1nXLiP-0002XZ-4I
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 11:33:17 +0000
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur02on0608.outbound.protection.outlook.com
 [2a01:111:f400:fe05::608])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 31612c71-ab66-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 12:33:15 +0100 (CET)
Received: from DB6PR0202CA0028.eurprd02.prod.outlook.com (2603:10a6:4:a5::14)
 by DB6PR0801MB2024.eurprd08.prod.outlook.com (2603:10a6:4:74::9) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.16; Thu, 24 Mar
 2022 11:33:05 +0000
Received: from DB5EUR03FT030.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:4:a5:cafe::99) by DB6PR0202CA0028.outlook.office365.com
 (2603:10a6:4:a5::14) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17 via Frontend
 Transport; Thu, 24 Mar 2022 11:33:05 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT030.mail.protection.outlook.com (10.152.20.144) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Thu, 24 Mar 2022 11:33:04 +0000
Received: ("Tessian outbound 1f399c739551:v113");
 Thu, 24 Mar 2022 11:33:04 +0000
Received: from cc00089bd1ec.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 10CD6074-D573-413C-8CEC-8D98C74CF1F0.1; 
 Thu, 24 Mar 2022 11:32:54 +0000
Received: from EUR03-DB5-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id cc00089bd1ec.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 24 Mar 2022 11:32:54 +0000
Received: from AM5PR0801MB2020.eurprd08.prod.outlook.com
 (2603:10a6:203:4c::14) by PAXPR08MB6781.eurprd08.prod.outlook.com
 (2603:10a6:102:136::8) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17; Thu, 24 Mar
 2022 11:32:51 +0000
Received: from AM5PR0801MB2020.eurprd08.prod.outlook.com
 ([fe80::253a:4d6c:61c9:af60]) by AM5PR0801MB2020.eurprd08.prod.outlook.com
 ([fe80::253a:4d6c:61c9:af60%10]) with mapi id 15.20.5102.018; Thu, 24 Mar
 2022 11:32:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 31612c71-ab66-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=2qVVI+e45OeAtR/wisvphh6cSQR0Vx7wWW3N5O+uwso=;
 b=A4PwLgWCvGlaTG7HvBP0DPhigV/MPrqeFtwD57JXm4H/68Ztk0Vf/KiG++fVkQrXfRktr8Yo3pz1ORZ8I0h9sPSgDqi/Vi/BjcyxaRorkoFbWeG/tkcNfnNibhzURsE0yW31NDEA6DUdSIc9j59SeQVxews6NxmO/6gsolGcTAI=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: fdb416d9e95da524
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=JgB3ebEWtmnp/ai+2ZVbDX3qf8Aaphe2ALBhe6Vlw9NmdGe9BqKdP92Q+VHZ6TP5t2/OZGdXvhkgm6OBWdDSIiMeUENL37GAtwNImws/34haxN2uGm0ybJfEwLz7himjRGqJDcl0GgYv2wCvCC+kpStgHgzsx+UXf5exZ/WfG14M0aV8Uy3uOo/fYI8px9+sDhH8RtmSXEUSeKCdQahOcq+NN1WANFk1ckdc+05PC8QwycbygLB7ho5sbYVKkBmHC/JrkNAR2CdRWZJTDLH4aXjz/XTPIAXjaYWNwv0c1xC3OJhG917JW8RuUAqLxSRvAPiU4h9340mPWP7ryHygEw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=2qVVI+e45OeAtR/wisvphh6cSQR0Vx7wWW3N5O+uwso=;
 b=SznSQoCMFIX0yp3o+W2c0B9Auprozb+rBYxwJvkVZGogte8kzYIQQpc+7B37EDLGRNHASMhK0DUEX6/ul1u9cbL7ZV5xX4TANBnmQXDgVoP8XIRh1qNKTEDRtApTfLd6pT10ySdL2eB9+UkIgNxOj1IYdLgPtMVYSxceOJjM8a7yGlMCmk1vUPk5vUjDf4ZfTX9NdmSr1iGpnevOL5jkL1IE2fQWYch8rnsGooa0SyxXcmGPdFV+5Sy9El7sryJPfwnkBG9PRuXOCK0G6mgvQE9fkSvEKDT5Qi9i/Eybs23GKGurUWz/csK2ZEgE38znfT9D39fHHhRDc2whdgeClQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=2qVVI+e45OeAtR/wisvphh6cSQR0Vx7wWW3N5O+uwso=;
 b=A4PwLgWCvGlaTG7HvBP0DPhigV/MPrqeFtwD57JXm4H/68Ztk0Vf/KiG++fVkQrXfRktr8Yo3pz1ORZ8I0h9sPSgDqi/Vi/BjcyxaRorkoFbWeG/tkcNfnNibhzURsE0yW31NDEA6DUdSIc9j59SeQVxews6NxmO/6gsolGcTAI=
From: Rahul Singh <Rahul.Singh@arm.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Bertrand Marquis <Bertrand.Marquis@arm.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, Julien
 Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, Wei Liu
	<wl@xen.org>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH] xen/evtchn: Add design for static event channel signaling
 for domUs..
Thread-Topic: [PATCH] xen/evtchn: Add design for static event channel
 signaling for domUs..
Thread-Index: AQHYPsy9MfyfmFhecEGJuSNYyusIgKzNIqYAgAFFiQA=
Date: Thu, 24 Mar 2022 11:32:51 +0000
Message-ID: <0782E68E-8736-4EB7-B8A3-4FC103F22E14@arm.com>
References:
 <4836304496e6fbbea41348ed8cc9fcf6b0f3e893.1648049827.git.rahul.singh@arm.com>
 <36c2a426-5354-fc38-1917-af7045bdf268@suse.com>
In-Reply-To: <36c2a426-5354-fc38-1917-af7045bdf268@suse.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: b1948514-1abe-45af-14d6-08da0d8a0fa8
x-ms-traffictypediagnostic:
	PAXPR08MB6781:EE_|DB5EUR03FT030:EE_|DB6PR0801MB2024:EE_
X-Microsoft-Antispam-PRVS:
	<DB6PR0801MB20246F710925F369990B84E6FC199@DB6PR0801MB2024.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM5PR0801MB2020.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(66476007)(64756008)(186003)(76116006)(8676002)(6506007)(66946007)(66446008)(66556008)(4326008)(316002)(508600001)(2616005)(71200400001)(6486002)(91956017)(83380400001)(36756003)(86362001)(33656002)(8936002)(38100700002)(5660300002)(26005)(6916009)(53546011)(6512007)(2906002)(54906003)(38070700005)(122000001)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <E1F50BA56CB325438FE7E15B0DBA910E@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB6781
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT030.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	a6fbcde7-6851-4006-1e13-08da0d8a0802
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(6862004)(6506007)(36860700001)(6512007)(186003)(36756003)(54906003)(26005)(40460700003)(53546011)(8676002)(4326008)(81166007)(83380400001)(86362001)(356005)(33656002)(6486002)(82310400004)(8936002)(316002)(5660300002)(2906002)(70586007)(70206006)(508600001)(47076005)(2616005)(336012);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Mar 2022 11:33:04.5573
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: b1948514-1abe-45af-14d6-08da0d8a0fa8
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT030.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0801MB2024
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==


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 12:00:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 12:00:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294267.500267 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXM8p-0006RW-0N; Thu, 24 Mar 2022 12:00:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294267.500267; Thu, 24 Mar 2022 12:00:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXM8o-0006RP-T3; Thu, 24 Mar 2022 12:00:34 +0000
Received: by outflank-mailman (input) for mailman id 294267;
 Thu, 24 Mar 2022 12:00:33 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nXM8m-0006RH-W4
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 12:00:33 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXM8m-0002oz-El; Thu, 24 Mar 2022 12:00:32 +0000
Received: from 54-240-197-231.amazon.com ([54.240.197.231] helo=[10.7.236.18])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXM8m-00073e-7x; Thu, 24 Mar 2022 12:00:32 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=fBev3nM3lIJoBhXSh0cdhTtmHP15TCYjwjPJeqEeoQQ=; b=YdY38iZR/aTauRi2rSLSKhjQL4
	PFGWNNrVNsIWwxISBSoXuJaJ67xzwOI+hhsLstKDFFZpBXEjO/6cWN9QpyPqTYrCTGyqp0KsbiJKb
	wG0PywBJIC0catD16QwV9UkjVRZTOoAXOqG+GIxVufpdTaLav1XymBEbofCrtFBt4wNg=;
Message-ID: <60d17fb0-1a1a-0793-5989-506f03f143b7@xen.org>
Date: Thu, 24 Mar 2022 12:00:29 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [RFC PATCH] xen/build: Add cppcheck and cppcheck-html make rules
To: Bertrand Marquis <bertrand.marquis@arm.com>,
 xen-devel@lists.xenproject.org
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Michal Orzel <michal.orzel@arm.com>
References: <77c79e86050eef2b706ee11e64183d57a0f5bcee.1648119732.git.bertrand.marquis@arm.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <77c79e86050eef2b706ee11e64183d57a0f5bcee.1648119732.git.bertrand.marquis@arm.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Bertrand,

On 24/03/2022 11:04, Bertrand Marquis wrote:
> cppcheck can be used to check Xen code quality.

Is there anything we should be concerned of in the initial report?

> 
> To create a report do "make cppcheck" on a built tree adding any options
> you added during the process you used to build xen (like CROSS_COMPILE
> or XEN_TARGET_ARCH). This will generate an xml report xen-cppcheck.xml.
> 
> To create a html report do "make cppcheck-html" in the same way and a
> full report to be seen in a browser will be generated in
> cppcheck-htmlreport/index.html.
> 
> For better results it is recommended to build your own cppcheck from the
> latest sources that you can find at [1].
> Development and result analysis has been done with cppcheck 2.7.

We want to write down the minimum version of cppcheck we are going to 
support. My suggestion would be to use the version you picked for your 
development.

> 
> The Makefile rule is searching for all C files which have been compiled
> (ie which have a generated .o file) and is running cppcheck on all of
> them using the current configuration of xen so only the code actually
> compiled is checked.
> 
> A new tool is introduced to merge all cppcheck reports into one global
> report including all findings and removing duplicates.
> 
> Some extra variables can be used to customize the report:
> - CPPCHECK can be used to give the full path to the cppcheck binary to
> use (default is to use the one from the standard path).
> - CPPCHECK_HTMLREPORT can be used to give the full path to
> cppcheck-htmlreport (default is to use the one from the standard path).
> 
> This has been tested on several arm configurations (x86 should work but
> has not been tested).
> 
> [1] https://cppcheck.sourceforge.io/
> 
> Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com>
> Signed-off-by: Michal Orzel <michal.orzel@arm.com>
> ---
>   .gitignore                           |  3 ++
>   xen/Makefile                         | 75 +++++++++++++++++++++++++++-
>   xen/arch/arm/include/asm/processor.h |  4 +-
>   xen/include/xen/config.h             |  4 ++
>   xen/include/xen/kconfig.h            |  5 ++
>   xen/tools/merge_cppcheck_reports.py  | 73 +++++++++++++++++++++++++++

In the long term, I think it would be useful if we generate the report 
regularly. We might be able to hook the script that generate 
https://xenbits.xen.org/docs/.

> diff --git a/xen/arch/arm/include/asm/processor.h b/xen/arch/arm/include/asm/processor.h
> index 852b5f3c24..0b4ba73760 100644
> --- a/xen/arch/arm/include/asm/processor.h
> +++ b/xen/arch/arm/include/asm/processor.h
> @@ -219,9 +219,11 @@
>                            SCTLR_Axx_ELx_A    | SCTLR_Axx_ELx_C   |\
>                            SCTLR_Axx_ELx_WXN  | SCTLR_Axx_ELx_EE)
>   
> -#if (SCTLR_EL2_SET ^ SCTLR_EL2_CLEAR) != 0xffffffffffffffffUL
> +#ifndef CPPCHECK
> +#if (SCTLR_EL2_SET ^ SCTLR_EL2_CLEAR) != 0xffffffffffffffffULL
>   #error "Inconsistent SCTLR_EL2 set/clear bits"
>   #endif
> +#endif

Why is it necessary?

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 12:14:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 12:14:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294272.500278 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXMLu-00080L-5V; Thu, 24 Mar 2022 12:14:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294272.500278; Thu, 24 Mar 2022 12:14:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXMLu-00080E-2P; Thu, 24 Mar 2022 12:14:06 +0000
Received: by outflank-mailman (input) for mailman id 294272;
 Thu, 24 Mar 2022 12:14:05 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXMLs-000804-Uo; Thu, 24 Mar 2022 12:14:04 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXMLs-00031b-SK; Thu, 24 Mar 2022 12:14:04 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXMLs-0000pz-Dz; Thu, 24 Mar 2022 12:14:04 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXMLs-00030P-DU; Thu, 24 Mar 2022 12:14:04 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=KczQkwO7+yCwC5lLNWDwFFL+YlyIQxlSZsbgJjDmjas=; b=RTd2fEFSO289rXh3s6d4Ue/KFM
	AzqQP68zDAyKGwleZFDoajfShLW/APNr2/gZt2JHf2vg5GqH6K3qX6DmO9V2WOF7qQzEtB6OIHPPU
	aIgl8fpW6q+8zFPzz+sIC1TXyyDhB/+gBUmmXyXL8nhBcUvWNPkp2GURQPxT8sI+Z6fY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168822-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168822: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 24 Mar 2022 12:14:04 +0000

flight 168822 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168822/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   24 days
Failing since        168258  2022-03-01 01:55:31 Z   23 days  242 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    2 days   23 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 12:24:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 12:24:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294280.500288 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXMWJ-000145-1W; Thu, 24 Mar 2022 12:24:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294280.500288; Thu, 24 Mar 2022 12:24:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXMWI-00013y-Us; Thu, 24 Mar 2022 12:24:50 +0000
Received: by outflank-mailman (input) for mailman id 294280;
 Thu, 24 Mar 2022 12:24:50 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=PXCt=UD=cantab.net=dvrabel@srs-se1.protection.inumbo.net>)
 id 1nXMWI-00013s-8v
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 12:24:50 +0000
Received: from smarthost01a.sbp.mail.zen.net.uk
 (smarthost01a.sbp.mail.zen.net.uk [212.23.1.1])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 619fc5a0-ab6d-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 13:24:42 +0100 (CET)
Received: from [82.70.146.41] (helo=pear.davidvrabel.org.uk)
 by smarthost01a.sbp.mail.zen.net.uk with esmtps
 (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1)
 (envelope-from <dvrabel@cantab.net>)
 id 1nXMWF-00016E-U7; Thu, 24 Mar 2022 12:24:47 +0000
Received: from apple.davidvrabel.org.uk ([82.70.146.43])
 by pear.davidvrabel.org.uk with esmtp (Exim 4.92)
 (envelope-from <dvrabel@cantab.net>)
 id 1nXMW6-0002uH-UQ; Thu, 24 Mar 2022 12:24:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 619fc5a0-ab6d-11ec-8fbc-03012f2f19d4
Message-ID: <35700440-4614-cbd3-361c-3a82cb3d37a9@cantab.net>
Date: Thu, 24 Mar 2022 12:24:40 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-GB
To: Rahul Singh <rahul.singh@arm.com>, xen-devel@lists.xenproject.org
Cc: bertrand.marquis@arm.com, Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Wei Liu <wl@xen.org>
References: <4836304496e6fbbea41348ed8cc9fcf6b0f3e893.1648049827.git.rahul.singh@arm.com>
From: David Vrabel <dvrabel@cantab.net>
In-Reply-To: <4836304496e6fbbea41348ed8cc9fcf6b0f3e893.1648049827.git.rahul.singh@arm.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-SA-Exim-Connect-IP: 82.70.146.43
X-SA-Exim-Mail-From: dvrabel@cantab.net
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on
	pear.davidvrabel.org.uk
X-Spam-Level: 
X-Spam-Status: No, score=-1.2 required=5.0 tests=BAYES_00,SPF_SOFTFAIL,
	URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.2
Subject: Re: [PATCH] xen/evtchn: Add design for static event channel signaling
 for domUs..
X-SA-Exim-Version: 4.2.1 (built Wed, 08 May 2019 21:11:16 +0000)
X-SA-Exim-Scanned: Yes (on pear.davidvrabel.org.uk)
X-Originating-smarthost01a-IP: [82.70.146.41]
Feedback-ID: 82.70.146.41



On 23/03/2022 15:43, Rahul Singh wrote:
> in dom0less system. This patch introduce the new feature to support the
> signaling between two domUs in dom0less system.
> 
> Signed-off-by: Rahul Singh <rahul.singh@arm.com>
> ---
>   docs/designs/dom0less-evtchn.md | 96 +++++++++++++++++++++++++++++++++
>   1 file changed, 96 insertions(+)
>   create mode 100644 docs/designs/dom0less-evtchn.md
> 
> diff --git a/docs/designs/dom0less-evtchn.md b/docs/designs/dom0less-evtchn.md
> new file mode 100644
> index 0000000000..6a1b7e8c22
> --- /dev/null
> +++ b/docs/designs/dom0less-evtchn.md
> @@ -0,0 +1,96 @@
> +# Signaling support between two domUs on dom0less system
> +
> +## Current state: Draft version
> +
> +## Proposer(s): Rahul Singh, Bertrand Marquis
> +
> +## Problem Statement:
> +
> +The goal of this work is to define a simple signaling system between Xen guests
> +in dom0less systems.
> +
> +In dom0less system, we cannot make use of xenbus and xenstore that are used in
> +normal systems with dynamic VMs to communicate between domains by providing a
> +bus abstraction for paravirtualized drivers.
> +
> +One possible solution to implement the signaling system between domUs is based
> +on event channels.

This problem statement could do with some example use cases that are 
usefully solved by this proposed solution.

"We don't have xenstore so can't set up shared rings, but here's a 
replacement comms mechanism that can do a single bit." Doesn't seem very 
compelling to me.

> +    chosen {
> +        ....
> +
> +        domU1: domU1 {
> +            ......
> +        };
> +
> +        domU2: domU2 {
> +            ......
> +        };
> +
> +        evtchn@1 {
> +            compatible = "xen,evtchn";
> +            xen,evtchn = <0xa &domU1 0xb &domU2>;
> +        };
> +
> +        evtchn@2 {
> +            compatible = "xen,evtchn";
> +            xen,evtchn = <0xc &domU1 0xd &domU2>;
> +        };

How is the domain supposed to know what these event channels are for?

I'm not that familiar with device tree. Is it possible to give these 
entries name?

David


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 12:43:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 12:43:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294283.500299 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXMnw-0003Ps-EH; Thu, 24 Mar 2022 12:43:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294283.500299; Thu, 24 Mar 2022 12:43:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXMnw-0003Pl-BS; Thu, 24 Mar 2022 12:43:04 +0000
Received: by outflank-mailman (input) for mailman id 294283;
 Thu, 24 Mar 2022 12:43:03 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=6vFe=UD=suse.com=mhocko@srs-se1.protection.inumbo.net>)
 id 1nXMnv-0003Pf-Ps
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 12:43:03 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f1863a51-ab6f-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 13:43:02 +0100 (CET)
Received: from relay2.suse.de (relay2.suse.de [149.44.160.134])
 by smtp-out2.suse.de (Postfix) with ESMTP id 0970F1F745;
 Thu, 24 Mar 2022 12:43:02 +0000 (UTC)
Received: from suse.cz (unknown [10.100.201.86])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by relay2.suse.de (Postfix) with ESMTPS id C8E96A3B93;
 Thu, 24 Mar 2022 12:43:01 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f1863a51-ab6f-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648125782; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=KtkJHll3BGHTPIchNMgaGNfzKDZMQ29t02N6cPbRei8=;
	b=WmEIeEQumjQlWOh3pJEUKzE7T8O+U2xNXKX+KlcLt/ijrxWI05XaNwqkjRNdnoOmkICLWn
	gM6tYrTi4FDvr2gWUm341gRjdASUkBoB313ZN0eUGPnUlRRQsbSDHtwaZc/U1aYzt/Ltcd
	Hiezll6ttvEyIPTX+1v0xaYTZnI4iq0=
Date: Thu, 24 Mar 2022 13:42:56 +0100
From: Michal Hocko <mhocko@suse.com>
To: Jason Gunthorpe <jgg@ziepe.ca>
Cc: Juergen Gross <jgross@suse.com>, linux-mm@kvack.org,
	lkml <linux-kernel@vger.kernel.org>,
	Andrew Morton <akpm@linux-foundation.org>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	Jerome Glisse <jglisse@redhat.com>
Subject: Re: blocking vs. non-blocking mmu notifiers
Message-ID: <YjxnULAWb3PLvrky@dhcp22.suse.cz>
References: <8e8ec786-74db-157b-a290-b1537941e91d@suse.com>
 <YjrsOnxaPYc3rbdj@dhcp22.suse.cz>
 <20220323163146.GI64706@ziepe.ca>
 <YjtPpxlE/zWwnJ0W@dhcp22.suse.cz>
 <20220323170404.GK64706@ziepe.ca>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20220323170404.GK64706@ziepe.ca>

On Wed 23-03-22 14:04:04, Jason Gunthorpe wrote:
> On Wed, Mar 23, 2022 at 05:49:43PM +0100, Michal Hocko wrote:
> > > The bug here is that prior to commit a81461b0546c ("xen/gntdev: update
> > > to new mmu_notifier semantic") wired the mn_invl_range_start() which
> > > takes a mutex to invalidate_page, which is defined to run in an atomic
> > > context.
> > 
> > Yeah, we have already identified that but quickly realized that the
> > whole mmu notifier overhaul which this fix depends on would be no no for
> > backporting to our older code base. So we are trying to find our way
> > around that.
> 
> IMHO you don't need everything, just commit 369ea8242c0f ("mm/rmap:
> update to new mmu_notifier semantic v2") which adds the missing
> start/end outside the lock for the page callbacks.
> 
> Then you can take safely a8146 into gntdev.

Thanks Jason!

-- 
Michal Hocko
SUSE Labs


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 12:46:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 12:46:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294286.500311 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXMqx-00042a-V4; Thu, 24 Mar 2022 12:46:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294286.500311; Thu, 24 Mar 2022 12:46:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXMqx-00042T-Ru; Thu, 24 Mar 2022 12:46:11 +0000
Received: by outflank-mailman (input) for mailman id 294286;
 Thu, 24 Mar 2022 12:46:10 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXMqw-00042J-Av; Thu, 24 Mar 2022 12:46:10 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXMqw-0003ZN-8n; Thu, 24 Mar 2022 12:46:10 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXMqv-0001d0-QH; Thu, 24 Mar 2022 12:46:09 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXMqv-0002KG-Pn; Thu, 24 Mar 2022 12:46:09 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=0X/ESQtNIKhqZdfHs+wkWM+QinJl6gKcZn0FAc46l8M=; b=Z8StiD+pT9nO+DHKRy6hxGwAhn
	wZxqe6dUZGyfyYRQ3njT1XrfTRuKqqlPX0um9ArpbBsRuWjypoVWV3Wa9OMl/g9ws9vZQGBmZi4rL
	u3Yx1Z7uz45OlZgFV8n7KCRYtjrOMya0EO5OKyU4BMLDkWiwCvx/mIWJHef1dq1ic6Ik=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168816-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168816: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=ed4643521e6af8ab8ed1e467630a85884d2696cf
X-Osstest-Versions-That:
    linux=1bc191051dca28fa6d20fd1dc34a1903e7d4fb62
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 24 Mar 2022 12:46:09 +0000

flight 168816 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168816/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168807
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168807
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168807
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168807
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168807
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168807
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168807
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168807
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                ed4643521e6af8ab8ed1e467630a85884d2696cf
baseline version:
 linux                1bc191051dca28fa6d20fd1dc34a1903e7d4fb62

Last test of basis   168807  2022-03-23 19:39:56 Z    0 days
Testing same since   168816  2022-03-24 03:18:14 Z    0 days    1 attempts

------------------------------------------------------------
550 people touched revisions under test,
not listing them all

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   1bc191051dca2..ed4643521e6af  ed4643521e6af8ab8ed1e467630a85884d2696cf -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 12:54:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 12:54:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294296.500321 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXMyu-0005Ye-Sd; Thu, 24 Mar 2022 12:54:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294296.500321; Thu, 24 Mar 2022 12:54:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXMyu-0005YX-Pc; Thu, 24 Mar 2022 12:54:24 +0000
Received: by outflank-mailman (input) for mailman id 294296;
 Thu, 24 Mar 2022 12:54:22 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=eW/x=UD=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nXMys-0005Y6-Q6
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 12:54:22 +0000
Received: from EUR01-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur01on0617.outbound.protection.outlook.com
 [2a01:111:f400:fe1e::617])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 85f5af85-ab71-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 13:54:21 +0100 (CET)
Received: from AM6P195CA0058.EURP195.PROD.OUTLOOK.COM (2603:10a6:209:87::35)
 by AM9PR08MB7257.eurprd08.prod.outlook.com (2603:10a6:20b:430::16) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.19; Thu, 24 Mar
 2022 12:52:08 +0000
Received: from VE1EUR03FT025.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:87:cafe::d8) by AM6P195CA0058.outlook.office365.com
 (2603:10a6:209:87::35) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17 via Frontend
 Transport; Thu, 24 Mar 2022 12:52:07 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT025.mail.protection.outlook.com (10.152.18.74) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Thu, 24 Mar 2022 12:52:07 +0000
Received: ("Tessian outbound 341d209a0e52:v113");
 Thu, 24 Mar 2022 12:52:06 +0000
Received: from 6639cf076f09.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 E39BBC88-F02F-488C-800A-542AFFEB233D.1; 
 Thu, 24 Mar 2022 12:52:00 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 6639cf076f09.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 24 Mar 2022 12:52:00 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com (2603:10a6:20b:85::25)
 by DBAPR08MB5736.eurprd08.prod.outlook.com (2603:10a6:10:1a9::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17; Thu, 24 Mar
 2022 12:51:53 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62]) by AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62%3]) with mapi id 15.20.5102.018; Thu, 24 Mar 2022
 12:51:53 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 85f5af85-ab71-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=3XJwMMejm9GXSvgCe1exxwxvD/4wDjN8iPVcdEoB9SM=;
 b=p3YHuIeuH/vNAQ8deY/NsjM2xGcddoG6VtUoJU3c8RArBmLDHSaIAESzEQZGqo6dAyzQV6PtWGUh6Jktr1gSLSciH0D3uDVQe+O9sB3izGUH4POU5KAUG3RI8gRKyFJtA5v4AknNc5hnE39/1L9riVCFSk9yhVrUYrQGfLp4+f0=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: dc2af07565a36faf
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=kWNKrMWl7M6N5MuZzaLjXJwlGAHJq2t/kqk6Qec7zwIg6Hr3U204EvGMJiNFzP/Yx+u3m2ZyyGzoMzWJQBQrkJoD7MYppf32KCAQKTVUcJJdvyeXNY29AFRYnqmTl1AoMtVpHYc5A361OQ5sSnpMfAcM3IIfjNS5+5QrJmMll0riKiftdJpYKYcmHHFsBmbvZLeD+ZL/zTmswTKEVLXNNuVezvCFy9pu+tTWgAITD/Z56vmjlgf5M0ljcQw86jAyv9bFvAeeO8JKE9m5ddfTPY3TSbf7Mlv59iG0ve9klwU5QiDck83v6svUwO2xChDt6alTHx+gT44AVhZTP6o3RQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=3XJwMMejm9GXSvgCe1exxwxvD/4wDjN8iPVcdEoB9SM=;
 b=CEgdWIbYfAWFCzHm/kzD1diXMVKE8ZOuHkunwf6bVRfBcSoITkZEnZfaZnLxt1Zk8v9bmRAIFPPYvI9FEpsOapHIfZEsG4tdPmcacgaTpDJNVZRAiWI/jHGXPUqmsYNxsUydEcXZ3aF2j3zwVdg5t//pJgvxXSXEscFldCWG2mjQpjvukpHRL9tW7/3eZhmaR0vJzroipxI3KnrwDchFYbFyOOiFZEvD4o4rSn/vti1jlzPuz2xzPcKqmHnQqPEUBQYaXu5mMcl4FnhSsWYj9M0Wm0V4hopmq8FOekaegPqXOqrbmiIGDcSqt7xILUHCJ+Kevhf1/wLyqJN7REC1Fg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=3XJwMMejm9GXSvgCe1exxwxvD/4wDjN8iPVcdEoB9SM=;
 b=p3YHuIeuH/vNAQ8deY/NsjM2xGcddoG6VtUoJU3c8RArBmLDHSaIAESzEQZGqo6dAyzQV6PtWGUh6Jktr1gSLSciH0D3uDVQe+O9sB3izGUH4POU5KAUG3RI8gRKyFJtA5v4AknNc5hnE39/1L9riVCFSk9yhVrUYrQGfLp4+f0=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Julien Grall <julien@xen.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Andrew
 Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>, Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, Michal
 Orzel <Michal.Orzel@arm.com>
Subject: Re: [RFC PATCH] xen/build: Add cppcheck and cppcheck-html make rules
Thread-Topic: [RFC PATCH] xen/build: Add cppcheck and cppcheck-html make rules
Thread-Index: AQHYP279DnP7J8Edsk+NG7Po4Qnn9azObqSAgAAOWoA=
Date: Thu, 24 Mar 2022 12:51:52 +0000
Message-ID: <B72F2112-CDA2-488E-9F61-EF59767F51FA@arm.com>
References:
 <77c79e86050eef2b706ee11e64183d57a0f5bcee.1648119732.git.bertrand.marquis@arm.com>
 <60d17fb0-1a1a-0793-5989-506f03f143b7@xen.org>
In-Reply-To: <60d17fb0-1a1a-0793-5989-506f03f143b7@xen.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 53353a85-5855-43a9-0850-08da0d951a95
x-ms-traffictypediagnostic:
	DBAPR08MB5736:EE_|VE1EUR03FT025:EE_|AM9PR08MB7257:EE_
X-Microsoft-Antispam-PRVS:
	<AM9PR08MB7257EF621E4DEF9BF5CD3C7B9D199@AM9PR08MB7257.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR08MB3784.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(6506007)(6512007)(53546011)(66574015)(86362001)(26005)(2616005)(186003)(122000001)(38100700002)(38070700005)(66476007)(64756008)(66446008)(5660300002)(33656002)(8936002)(66946007)(91956017)(76116006)(36756003)(66556008)(4326008)(8676002)(2906002)(316002)(6486002)(966005)(6916009)(54906003)(71200400001)(508600001)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <812903B651F94F4DB213907CDA9EB8B3@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBAPR08MB5736
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT025.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	7cf4c37e-c0b9-48ac-8b66-08da0d951206
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	UOpW8p7qSrfM51AW89pcB5b0NvW7JIZCDuIQWhyibQu1e+yV5oGxVVNj+bHCuAtotLq7E6ZMC926NYin5ZrSbMSVjeknmSS5Ub2f+ZNSJQqpnqSRxhXh0Hnx4pc3CU6kRc97zeqGD3HmSODo8HpLSlIaC8jJgkw2TWG0MUDc0/VNAzb1OFwG8uZXYThmqJae6qipMA6trersfPIqb/67IBA3e8xb/knURv74FXTbgLfimSeShlBA86nt2Zq/X2nTD680aTI7sa3xWF51qvIqW8OKLfauwLLaWKw6jixc3b8V6YpVwQucseDt6zDZE50yss25YXDCydVHWMcy9shVl7DGuDh1yE+8AiD4a0dFP96fHDzpVYi6KkGhvdw4YSpsFURH41g5iEDmAaW1o+2AraVqM/KcUtFA/SLr8uPwQOdrXZXKuv1k2eHDhX9rRPZC6mfZV5Vt1kN+6cri9saGze1mg96FdZh8x4JWOdqwVDvNuOWUxGqHTVcZK/i4Q/AcuU68LkUKjj2t53lNZooHKGBqR1MXBatNPMzOjBG6eWBiHHiQ1RWJ/dprvVmdIMDA25LRYuEl6siq7r7btG7Ua5mvBLCIDrJ/29cOn4gnrApW3hbPAo4yY8MF+SzTIWrDN3XdmUKlxw5u8T7pEYp7WvYWDD2AihMR1312m8LEahMJ9ESKUqfGQ96JR5pMxmxQPsf+myOsM06HeJjBG0zFuRDEqrXliw89AqeKH6DtXe1oDNRAwU7rdD9AQ5OZvDLlb6mHCwOY4r4k1KJvHjqFYA==
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(82310400004)(36860700001)(86362001)(6512007)(356005)(81166007)(966005)(6506007)(33656002)(2906002)(6486002)(498600001)(4326008)(8676002)(70586007)(6862004)(40460700003)(70206006)(66574015)(47076005)(336012)(2616005)(26005)(53546011)(36756003)(186003)(5660300002)(54906003)(8936002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Mar 2022 12:52:07.2671
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 53353a85-5855-43a9-0850-08da0d951a95
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT025.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR08MB7257

Hi Julien,

> On 24 Mar 2022, at 13:00, Julien Grall <julien@xen.org> wrote:
>=20
> Hi Bertrand,
>=20
> On 24/03/2022 11:04, Bertrand Marquis wrote:
>> cppcheck can be used to check Xen code quality.
>=20
> Is there anything we should be concerned of in the initial report?

Nothing major no.
Michal will soon push a serie with a first set of fixes, mostly related to =
unused variables.

>=20
>> To create a report do "make cppcheck" on a built tree adding any options
>> you added during the process you used to build xen (like CROSS_COMPILE
>> or XEN_TARGET_ARCH). This will generate an xml report xen-cppcheck.xml.
>> To create a html report do "make cppcheck-html" in the same way and a
>> full report to be seen in a browser will be generated in
>> cppcheck-htmlreport/index.html.
>> For better results it is recommended to build your own cppcheck from the
>> latest sources that you can find at [1].
>> Development and result analysis has been done with cppcheck 2.7.
>=20
> We want to write down the minimum version of cppcheck we are going to sup=
port. My suggestion would be to use the version you picked for your develop=
ment.

Agree, 2.7 (current stable) should be the one as we had some unstable behav=
iours with other versions.
Should I put that in the main readme ?

>=20
>> The Makefile rule is searching for all C files which have been compiled
>> (ie which have a generated .o file) and is running cppcheck on all of
>> them using the current configuration of xen so only the code actually
>> compiled is checked.
>> A new tool is introduced to merge all cppcheck reports into one global
>> report including all findings and removing duplicates.
>> Some extra variables can be used to customize the report:
>> - CPPCHECK can be used to give the full path to the cppcheck binary to
>> use (default is to use the one from the standard path).
>> - CPPCHECK_HTMLREPORT can be used to give the full path to
>> cppcheck-htmlreport (default is to use the one from the standard path).
>> This has been tested on several arm configurations (x86 should work but
>> has not been tested).
>> [1] https://cppcheck.sourceforge.io/
>> Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com>
>> Signed-off-by: Michal Orzel <michal.orzel@arm.com>
>> ---
>>  .gitignore                           |  3 ++
>>  xen/Makefile                         | 75 +++++++++++++++++++++++++++-
>>  xen/arch/arm/include/asm/processor.h |  4 +-
>>  xen/include/xen/config.h             |  4 ++
>>  xen/include/xen/kconfig.h            |  5 ++
>>  xen/tools/merge_cppcheck_reports.py  | 73 +++++++++++++++++++++++++++
>=20
> In the long term, I think it would be useful if we generate the report re=
gularly. We might be able to hook the script that generate https://xenbits.=
xen.org/docs/.

Agree

>=20
>> diff --git a/xen/arch/arm/include/asm/processor.h b/xen/arch/arm/include=
/asm/processor.h
>> index 852b5f3c24..0b4ba73760 100644
>> --- a/xen/arch/arm/include/asm/processor.h
>> +++ b/xen/arch/arm/include/asm/processor.h
>> @@ -219,9 +219,11 @@
>>                           SCTLR_Axx_ELx_A    | SCTLR_Axx_ELx_C   |\
>>                           SCTLR_Axx_ELx_WXN  | SCTLR_Axx_ELx_EE)
>>  -#if (SCTLR_EL2_SET ^ SCTLR_EL2_CLEAR) !=3D 0xffffffffffffffffUL
>> +#ifndef CPPCHECK
>> +#if (SCTLR_EL2_SET ^ SCTLR_EL2_CLEAR) !=3D 0xffffffffffffffffULL
>>  #error "Inconsistent SCTLR_EL2 set/clear bits"
>>  #endif
>> +#endif
>=20
> Why is it necessary?

The ULL was an attempt to fix but did not work. I will remove that in the n=
ext version.
Here cppcheck preprocessor is wrongly generating the error for a reason tha=
t I could not understand, hence the ifdef.

Cheers
Bertrand

>=20
> Cheers,
>=20
> --=20
> Julien Grall



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 13:07:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 13:07:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294299.500333 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXNB8-00078x-3U; Thu, 24 Mar 2022 13:07:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294299.500333; Thu, 24 Mar 2022 13:07:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXNB7-00078q-V9; Thu, 24 Mar 2022 13:07:01 +0000
Received: by outflank-mailman (input) for mailman id 294299;
 Thu, 24 Mar 2022 13:07:01 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=BOyw=UD=citrix.com=prvs=07591399b=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nXNB7-00078h-1p
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 13:07:01 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 47b42c4b-ab73-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 14:06:57 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 47b42c4b-ab73-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648127218;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=YNUWIJkr9+cm0ciI1s2TusuUU/Pg8cJ/NaTj0XNs/8s=;
  b=Tx/IL2LfjAISjZgtzTo2M7GYJIT4FnoD/iRtNBH84yUBi3zOOVtqHgdR
   nHNHTynX7/Ttfizb7IKr+QDqrsdhKaB4DCZIyYOGEdOMfk4bhexHNeXNA
   sf4KaRUFKCORZSr3t70qwmrEs37bGaC2hJAARs0gBcM9FWDFJmllmUJaP
   Q=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67071278
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:2Lr/ZKwnAyJjKgkZJPl6t+e5xirEfRIJ4+MujC+fZmUNrF6WrkUHm
 mIWXmDUaP7fYzf8fYolYI628U8PusXQmtY3SgJpryAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz24ThWWthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 NpltLa3bkAXLo7wnt8tej9DEDhbfoJK0eqSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DFYUToHx/ixreCu4rW8vrSKTW/95Imjw3g6iiGN6AO
 JJGMGAwPHwsZTVjIWkRJcIVoN2xvVLzVC929A+Vr4Metj27IAtZj+G2bYu9lsaxbdpRtlaVo
 CTB5WuRKgoBKNWVxD6B83StruzChyX2XMQVDrLQ3vtri12awioUEg8bUXOyu/z/gUm7M/phL
 EgT9jsrvLIF3kWhRdngXDW1uHeB+BUbXrJ4A+A8rQ2A1KfQywKYHXQfCC5MbsQ8s807TiBs0
 UWG9/vjCCZzqrSTRTSY/62NsDKpESEPKCkJYipsZQkY59jupqkjgxSJScxseIa3hNDoHTD7w
 xiRsTMzwb4UiKY2O76TpA6dxWj2/96QE1Bztl6/sn+ZAh1RZaSiQMuW+Xvn681wBaCCTUCk/
 1cIsp3LhAwRNq2lmCuISeQLObim4feZLTHR6WJS84kdGyeFoCD6I90JiN1qDAIwa5tfJ2e1C
 KPGkVkJjKK/KkdGekOej2iZL80xhZbtGt3+Phw/RoofO8MhHONrEcwHWKJx44wPuBV0+U3cE
 c3CGSpJMZr8If44pNZRb71BuYLHPghkmQvuqWnTlnxLK4a2an+PUqsiO1CTdO0/567siFyLr
 4YHaZPakEsHDb2WjszrHWg7dwBiwZ8TX82eliCqXrTbfloO9J8JVZc9Po/Ni6Q6xv8Ix48kD
 1m2W1NCyUqXuJE0AV7iV5yXU5u2BcwXhStiZUQEZA/0s1B+MdfHxPpOLPMfIOh4nNGPONYpF
 pHpje3bWa8RItkGkhxABaTAQHtKKEv6317fbnD5CNX9FrY5LzH0FhbfVlKH3AEFDzattNt4p
 Lul1wjBRoEESRgkB8HTAM9DBXvs4xDxRMoas5P0H+Ru
IronPort-HdrOrdr: A9a23:rmrgbqFzixPtdosvpLqFRpHXdLJyesId70hD6qkvc3Nom52j+/
 xGws536fatskdtZJkh8erwXZVp2RvnhNFICPoqTMuftW7dySWVxeBZnMffKljbdREWmdQtrJ
 uIH5IOa+EYSGIK9/oSgzPIUurIouP3iJxA7N22pxwGLGFXguNbnnxE426gYxZLrWJ9dP4E/e
 +nl6x6Tk2bCBMqh6qAdxs4dtmGg+eOuIPtYBYACRJiwhKJlymU5LnzFAXd9gsCUhtUqI1SsV
 Ttokjc3OGOovu7whjT2yv49JJNgubszdNFGYilltUVEDPxkQylDb4RGIFq/QpF4t1H2mxa1O
 UkkC1QePibLEmhOF1dlCGdnjUIFgxeskMKh2Xo2UcL6vaJOw7SQ/Ax+76xNCGpsXbI9esMoJ
 6ilQiixutqJAKFkyLn69fSURZ20kKyvHo5iOYWy2dSSI0EddZq3MciFW5uYd499RjBmcga+S
 hVfbXhzecTdUnfY2HSv2FpztDpVnMvHg2eSkxHvsCOyTBZkH1w0kNdnaUk7zo93YN4T4MB6/
 XPM6xumr0LRsgKbbhlDONERcesEGTCTR/FLWrXK1X6E6MMPW7LtvfMkf8IzfDvfIZNwIo5mZ
 zHXl8dvWkue1j2AcnLx5FP+gClehTKYd0s8LAo23FUgMyPeFOwC1zxdLkHqbrUn8ki
X-IronPort-AV: E=Sophos;i="5.90,207,1643691600"; 
   d="scan'208";a="67071278"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=n0V+PGVMW0nYv2AjYpPaeN3+nawqX+iVo+zoTusjp1sdznOxyBdSGfFPIOVe2fdP9P8a45k/n9YA3JXCfCnGrUeC3ICR314mHCOgLGmHvNlvBjWEv2PgLTgr6umG6Wi+ISZKyJdgrL3ay5X2ql3U4tt/5KaDGWb871JPk86Kyks3JcSEQGwBcWkFAbaNQ+3SN7kKJ9XFCv/BNcSEg8vY/Fn46KKlfPnwfW1ig8KxWAaUw0bTWgi4UUt8viSA1NdKFKwuU5OGKxlGfzMVqNplQpfF65BXu2iJ68tIkZ8NyHkgpaJvl2weIhOQfPY3sMHJFe31SEM4hCkLY9NBU7swXg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=YNUWIJkr9+cm0ciI1s2TusuUU/Pg8cJ/NaTj0XNs/8s=;
 b=Mu4MqGyT6vhEBwFOMgd9EjTNxAWiHodfNaI6JbpEQ6Ty+HDxCdsSO83PSzhpmLiuCQuD9WE6PkwInlq/MZd8k6d0ye23vUupUxs34loI58EbmySejk9ezuUCVLSfJTX8AW2WlQhjf2ESKrp6XWk6/8ceFFMj5s/PPDdeqE46WLutGz25v+KtzLbRwLu5FnMAP9CtKf4pGIZomSu/kBVsDGBdVXK15Nod/egeXGswy1nYVbioT7CFCcqLnZHvNSCelu5ou4EoDa0MIdA7QKn1+6GRqJfyWtTk3ZiD04K0xI0XNcnqn4aw3PXNEsr3inYAwtCrUez3PckbBdjcgc84Ig==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=YNUWIJkr9+cm0ciI1s2TusuUU/Pg8cJ/NaTj0XNs/8s=;
 b=rvd6RhruIf0ev/r8tDveZsB1+Dp45XS1gAqxaPnrY81Jo38EIdxJrOkOgw5pgdQigCi0mXQKFRqlB6t9Q8zBV4wkWch9hQAeqSHBV03OeveWdUrKwls0BoKkyF7NBU3Pw0wroAnnzJRp59d4rmLxaGBM65kaZ9brqHnpm/vGJpE=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Bertrand Marquis <bertrand.marquis@arm.com>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
CC: George Dunlap <George.Dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, "Michal
 Orzel" <michal.orzel@arm.com>, Anthony Perard <anthony.perard@citrix.com>
Subject: Re: [RFC PATCH] xen/build: Add cppcheck and cppcheck-html make rules
Thread-Topic: [RFC PATCH] xen/build: Add cppcheck and cppcheck-html make rules
Thread-Index: AQHYP2703qMuP9Phv0+tczF2jTmG1qzOgP4A
Date: Thu, 24 Mar 2022 13:06:11 +0000
Message-ID: <aff044ff-2a46-527d-9237-802487351bbc@citrix.com>
References: <77c79e86050eef2b706ee11e64183d57a0f5bcee.1648119732.git.bertrand.marquis@arm.com>
In-Reply-To: <77c79e86050eef2b706ee11e64183d57a0f5bcee.1648119732.git.bertrand.marquis@arm.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 93ecc986-0d7e-4cb1-0bb1-08da0d9711be
x-ms-traffictypediagnostic: MN2PR03MB4990:EE_
x-microsoft-antispam-prvs: <MN2PR03MB4990CD0013401DC6339BDE4BBA199@MN2PR03MB4990.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(2906002)(6506007)(53546011)(55236004)(2616005)(83380400001)(107886003)(26005)(186003)(66574015)(6512007)(31686004)(38070700005)(4326008)(8676002)(64756008)(66446008)(36756003)(6486002)(966005)(508600001)(66476007)(66556008)(110136005)(54906003)(86362001)(31696002)(91956017)(66946007)(76116006)(316002)(71200400001)(122000001)(82960400001)(8936002)(30864003)(5660300002)(38100700002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?RmtiVlNOT0M2N0NxcFhpTkNmUjJKOStqM1k2M2dOOGhwMGpjcFBsNXd5L2ty?=
 =?utf-8?B?V2llbThiSWs2TzJIcWNNVXZQaUJGMVVHYkZWL09rai91UmJpUlBWaXQwUEtN?=
 =?utf-8?B?bm1MeTNrM2tUZmtKai9KbmJwVDg2TWJHbGhTczJ4WHEwanc2YkYwbHhiZ1ZV?=
 =?utf-8?B?VTkyYzlQT21wTmU3cWI2c3pLS09leDNBWG1VMUlheFUzQU9qZWV6QnN4MGcz?=
 =?utf-8?B?MjVQaTRMQWxKQk9zbURVZW5OYnNRTmZuU1djVGl5N3orSFh1bjV5bjNydFVo?=
 =?utf-8?B?ZTdrR0Y0bTJFQ3NkSjhDNlpkZkNhSHNObHVHa1RucUFKNjhqT2RmOXNwNm1U?=
 =?utf-8?B?NG9RVGlNUWZhR0pVTjF0aUhHeFdtUnJtQ1lKOWV6ckhHeVEwNkhpWFVac2FT?=
 =?utf-8?B?TzlIaEJ0TDY4NmhuZ3RFNUgxbVdQVEozYkV2ck1hZ2lac0J5L3B6b2pTclcz?=
 =?utf-8?B?N1Q5VFdHcXpEQ3FmUUJDVjJPamh5UkNFQW5tWFlJdzh0ZVQ3OFFzajhwY01s?=
 =?utf-8?B?Rno5OVZZcWxuTzVsaTVFR2gzTUFKaGRsbzUvbGZlN0g5WktDK0JXWXAwQjRi?=
 =?utf-8?B?UkxIb0Z2U0Z6cGZoa1cwLzNyM2pHenpaOWd6STh1VCtsTTJXVkV3eVNlWVBZ?=
 =?utf-8?B?OEVDbi9RRndDWk5ZV3E1UUJuc2tUYnJrK3JDdXNWMW96aU9NQ1h5Tk1PZXpy?=
 =?utf-8?B?UjdZTzdrZkRRUUVVcTRsTzlqamNpeStqSXVTZ29ZOWJwbjkvenBZUVV0WnBF?=
 =?utf-8?B?Y1pjejdvNDJiWXRXQzdZemRBVGdEZ1ZIVGczZFFCRFZtRmtiUXpTMFdHOHp6?=
 =?utf-8?B?QW9PTjA1UWdQdEtyNStJZHBsUkJVZ3k4K05KVTdlV3h4T28rU0dWa0U2dSt5?=
 =?utf-8?B?QmNzaXBjNGF5ak1mNmdlT1NSZkpaU3pBU3BDd0RzWFBBeHVuWDdpeHpvWk02?=
 =?utf-8?B?OEJyL2Q0UVNkSWp2aStGYlN4Tk9vZDBNSFZiSzNReG54U1BNY0lyS054SE4r?=
 =?utf-8?B?MHRFL3BGa3BSemhDQ0dPQnU0U1dDV1Y0UEg3OHhhL2R6T2ZxdmtsbVcxbi9V?=
 =?utf-8?B?Z1ZNM2ZJSU4zZWd0Ti8zaTFqZ1hJRUJYK1h5WWdaY2VtZmErUThEZUlZeGNo?=
 =?utf-8?B?NDZqeXVzbU9XT21vYjBDR2ZHQmtnb1o3SjhhZ1dncDNubUd6SVlpQzgwSXNT?=
 =?utf-8?B?b1h0R2dmMGdNWnphUUtPQzRNZ2xjL2Fuenp0OEVLK090WHBMZVBmS29PUzdv?=
 =?utf-8?B?UGxkSU1SWlVWZ0FCYkF2dzRGS0NHdGw1WGIyRUJ6cS9NS2xBd1g0dUVLQStk?=
 =?utf-8?B?c1ZxdGc1UE54cTJjbHkwZFZaRGhBcG5jODR3azlDdytqaUlES0FVU1lmZGhN?=
 =?utf-8?B?bWx3VVdRVVh3MWJJUXpDdlpKNzhRWVdBcGxnMlE3TmpnZkNSSFE4Zjh3bUFl?=
 =?utf-8?B?NmJPclNoQ3dTTXpPMlIxSXJXbkNUVUZnU0VnbUY5ZnAzR2FrWU5zWWc4SmZN?=
 =?utf-8?B?MGRWbGFnSGp6SmRyYW9aV3VrQW1XNEZodlNsWE5mY0h6UzVIUkkzeWJXSEE0?=
 =?utf-8?B?ZDZjL3dxOTNJaHFpUmVDWTdKTlE2M0liUng3OVNDeWNsc3hNYm5ndTdxWDJT?=
 =?utf-8?B?OUUvL0QzZnRCdjlMclFDSFFRMVc5eW4vY3R1Q2FEZWtPZnczOEZteUZFU3VW?=
 =?utf-8?B?d0E0dmdZaHBaRnRpMFBidGhlc1dQRm9ZK0pDdHhqUk01WHIvSEZCUm1ldlNC?=
 =?utf-8?B?N2h3dEt6amJlVXg0V2JDOC81ekJsaHgzVi9sMVNhZ3dyVHdncm90TWJIaUUy?=
 =?utf-8?B?T2FlVEhHeG44L1l6WGxwUFVQemNiRndPYmNpSWpySEFxVS94RUdNR2t1ZFl2?=
 =?utf-8?B?aWtsMnMrUzJ1b3g1M1BCRTBMdlN3UzlvcUJHRnJSQnBadDdrbUs4UFZFbmRS?=
 =?utf-8?B?NEJ6RkU4MGc1VDhOeTNzby83cmp4Umh4dFFrYzAwaTE1R1NENm1DbjFleDVL?=
 =?utf-8?B?RzZxdmNmSzVVMlpYbjExYXdWSVcycUFXckRNVmdjbVBqaTd5SE1KYUxiRU1O?=
 =?utf-8?B?MWhxMWUrSkQ3d21qRlI1dDRBU0NXUU01ME1XNW5Cb0tYaDZvQkJHQkhMdWJn?=
 =?utf-8?B?dXh2QVlOVjFJZnRBcE55MHo1S09FN1NhcG9NeFFlLzI0NkFGMDZNeWhRTEpF?=
 =?utf-8?B?QmxiZGdnRW1CU0VvS0QrRmZvcm1jOUsvdnZKd2ZDZU1tTm8yVjJzaHgvUm55?=
 =?utf-8?B?UzhDUC83Rk9GL1VrUVFkTTlUVGRQZEh6bnhtUGFKdGNiUFZ0c0FEK29XcStU?=
 =?utf-8?B?RzZ0cmNybGtWUHpETFl1ckdBODlJUXAveTdJVnJZR1l5aFluSVZJQT09?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <535A48D7686D9B4DAE377C0AC8AB065C@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 93ecc986-0d7e-4cb1-0bb1-08da0d9711be
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Mar 2022 13:06:11.3361
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Mt6PfZ7kLL5NE7qGxgWeqmny9WmG5yQmvgpwr42ivkwouD1KRn2wdSSyf4HL6RRzQAIO5ZuMMmrQbC9bgXHsBLTSTQHbk6BLoMo4uo3fE+M=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR03MB4990
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Thu Mar 24 13:14:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 13:14:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294303.500344 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXNIL-0000CP-Vv; Thu, 24 Mar 2022 13:14:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294303.500344; Thu, 24 Mar 2022 13:14:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXNIL-0000CI-SD; Thu, 24 Mar 2022 13:14:29 +0000
Received: by outflank-mailman (input) for mailman id 294303;
 Thu, 24 Mar 2022 13:14:28 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=eW/x=UD=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nXNIK-0000CC-FY
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 13:14:28 +0000
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur02on0631.outbound.protection.outlook.com
 [2a01:111:f400:fe05::631])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 54a6f688-ab74-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 14:14:27 +0100 (CET)
Received: from AM6PR10CA0052.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:209:80::29)
 by DBBPR08MB5979.eurprd08.prod.outlook.com (2603:10a6:10:205::24)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.19; Thu, 24 Mar
 2022 13:14:24 +0000
Received: from VE1EUR03FT025.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:80:cafe::67) by AM6PR10CA0052.outlook.office365.com
 (2603:10a6:209:80::29) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17 via Frontend
 Transport; Thu, 24 Mar 2022 13:14:24 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT025.mail.protection.outlook.com (10.152.18.74) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Thu, 24 Mar 2022 13:14:23 +0000
Received: ("Tessian outbound 741ca6c82739:v113");
 Thu, 24 Mar 2022 13:14:23 +0000
Received: from 89412f60e5b5.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 16CBAAEA-A12A-4D5E-97AD-3025D1F8CF99.1; 
 Thu, 24 Mar 2022 13:14:11 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 89412f60e5b5.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 24 Mar 2022 13:14:11 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com (2603:10a6:20b:85::25)
 by AM9PR08MB6196.eurprd08.prod.outlook.com (2603:10a6:20b:283::23)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17; Thu, 24 Mar
 2022 13:14:11 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62]) by AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62%3]) with mapi id 15.20.5102.018; Thu, 24 Mar 2022
 13:14:10 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 54a6f688-ab74-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=u+ZNNO57lwXp6OS5Qzumv2jLyCPJzdejkFnuBLLYtG4=;
 b=IqTE1DDMIGEKtwFeSFriQqMMplvNyGZwOGzle3Rym7j5LPUqh3eRRByXTgnWOR+54HY9LziC3XBP5M6xjxRJUOh7R2QFtvSUKN6TgA85PuCqWy8cOyhTmYjFCZxVWKLzJey5d93ndn4SUSOfKiLgGkYLzZNo3mSKQFEKLPcq4M4=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: d8e79a538ecbcc37
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=DdcIvQ2Scut+KXrz2kEwz6xG1S3mqgcf+NFfh4LV6vh/iT1EX1yuGSnUp1qNB2zHeNtBJC2i+7HuXakTreh/uDM3ouOwfm5psNRqx9asLlmRqFCZWvq5iCrZFGCrAeDXZ6mDXyLBcnppKB2NlLfL4CvU3Ln8wxWVoJOZYErcklrSYX0iTK+04UEikIjfLuYP8vPgIQPNcvvrbGjP5e327GrkSPlWuLG9mMiP1GicgJVWGb6kg1uLqeDlsK086M//ZUQ1YvmaPFXILprbNuHlaiq99XXlmkoVCCtuqsfElSe/A3S++ZvD2zEbfgxLyMCv9eOdTQ6s3eH0cgC3gkG+XQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=u+ZNNO57lwXp6OS5Qzumv2jLyCPJzdejkFnuBLLYtG4=;
 b=IMtVGTUzJUPbpJPDtg857f8LZqGpc2rKkOd4AcpX3i8MD0S7Mm3Hm/0nf9WJ8HTaJNmgNlPJGfnAzEH2mup4gFEaNEnylT/RolYSVIboJ0QFcGA4fnAyqyZq9iqiui5gByt6MMF6Z/CQNg3wxqVnf9IOL9eJtCYcvj+PPTJP4p+IDqVr2VHWrHQcVgwyvNqMHidGTsmH6IlRDfQc2m1fW+yNE5HxGJBn4QARgKom5HsWKBCRrVlV0YY88IgfKxgq4M3x3E0r2VYEt1Q4/FStvuCZV6p6STcaATW6TdLimyKaxAXrAZOREMTirSEUl58BThwNyIaC4cGuJ3JfIuwoKA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=u+ZNNO57lwXp6OS5Qzumv2jLyCPJzdejkFnuBLLYtG4=;
 b=IqTE1DDMIGEKtwFeSFriQqMMplvNyGZwOGzle3Rym7j5LPUqh3eRRByXTgnWOR+54HY9LziC3XBP5M6xjxRJUOh7R2QFtvSUKN6TgA85PuCqWy8cOyhTmYjFCZxVWKLzJey5d93ndn4SUSOfKiLgGkYLzZNo3mSKQFEKLPcq4M4=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Andrew Cooper <andrew.cooper3@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, George
 Dunlap <George.Dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien
 Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, Wei Liu
	<wl@xen.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, Michal Orzel
	<Michal.Orzel@arm.com>, Anthony Perard <anthony.perard@citrix.com>
Subject: Re: [RFC PATCH] xen/build: Add cppcheck and cppcheck-html make rules
Thread-Topic: [RFC PATCH] xen/build: Add cppcheck and cppcheck-html make rules
Thread-Index: AQHYP279DnP7J8Edsk+NG7Po4Qnn9azOgP+AgAACOoA=
Date: Thu, 24 Mar 2022 13:14:10 +0000
Message-ID: <22347566-F8A0-44B1-AD01-44D237B893C5@arm.com>
References:
 <77c79e86050eef2b706ee11e64183d57a0f5bcee.1648119732.git.bertrand.marquis@arm.com>
 <aff044ff-2a46-527d-9237-802487351bbc@citrix.com>
In-Reply-To: <aff044ff-2a46-527d-9237-802487351bbc@citrix.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: f8d7185c-ad66-4c2a-27f1-08da0d98372a
x-ms-traffictypediagnostic:
	AM9PR08MB6196:EE_|VE1EUR03FT025:EE_|DBBPR08MB5979:EE_
X-Microsoft-Antispam-PRVS:
	<DBBPR08MB59794B0A52AE10B293F822149D199@DBBPR08MB5979.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR08MB3784.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(66556008)(66946007)(64756008)(66446008)(76116006)(66476007)(53546011)(4326008)(6512007)(5660300002)(33656002)(91956017)(6506007)(2906002)(8936002)(316002)(54906003)(6916009)(36756003)(66574015)(186003)(508600001)(83380400001)(86362001)(8676002)(38070700005)(6486002)(26005)(38100700002)(122000001)(2616005)(71200400001)(966005)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <762CA97ED318724386077F8E3A7F2187@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR08MB6196
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT025.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	72214e6f-b51b-4f25-dc93-08da0d982f5b
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	BJ8BbTUO0+0QlvTpP+Nm4qXM/0GbLstYXJ8dM0dGL/ylAbqvHzndngv8ZRLLDz404+ekDei+/lN5uPKkZntS42XCfneLMWjHtaUpX0d6QCdx+mNXzNUyEgJbl/yltl0wmM9a2y6DX65u0qW+L/528EVmVjoLI2/Ygi/M0u4qsu+3cKOFvAPlCRid91c65qfXrtz4hjNMs8pc8sRYwtpT3hWgva4zf6IUahJxaE/FBRrXVk4iuil+0cq01/oxsZVFmaUp2xVM2Yd+/EQQhS+iqM+GayzQyqKRV+5xMBcqJQIzD3Z2sKS7rlNS58Aa0jm9EADwPiXHH/scgymmI+VAuLJoMlKJQRDhUIBkNr5u8/lzdPz4aaSwKdUT8UkxMJ+zarwNYBEuvpVVwejwkV8WOUa/PyvBSimuS3tXcaWyaRrMCuocbRTIS06lqu4njy5UQJlMSkk31FsOcLpNTat1FRusR9lKNJXaAdljgznUkAagrKUYH6IWuSfc5nP0sdX9bLukoHJ+1ykV6lMC5fJVF3F1eDnHsYSViTpzA6IIG7fD03Do6efX5Noto4io03YypFN1YqVDpVtjJVA700gDFrQyd3QR+UK6CUv/jl5w6ARLQvFXF7kcuIjNh3cF7r5RSNBPtY1Bxj7DasiU+AhlI4jURTRuy8uPFuQhwnEkJLhVsCJawfaGUa8TH5sU9NyL2kxgm+Y5TWNHibWpTPpPWsjBVupKM4sp3uGPexOAR/Cva+Jz45OOl8z+8jkxaqhGnRCAXKMynZsur+DvLdcyYQ==
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(83380400001)(8676002)(36756003)(66574015)(54906003)(316002)(107886003)(26005)(336012)(2616005)(40460700003)(186003)(70206006)(47076005)(86362001)(70586007)(82310400004)(8936002)(6862004)(4326008)(6512007)(81166007)(356005)(33656002)(508600001)(53546011)(6506007)(6486002)(5660300002)(966005)(36860700001)(2906002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Mar 2022 13:14:23.7108
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: f8d7185c-ad66-4c2a-27f1-08da0d98372a
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT025.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB5979

Hi Andrew,

> On 24 Mar 2022, at 14:06, Andrew Cooper <andrew.cooper3@citrix.com> wrote=
:
>=20
> On 24/03/2022 11:04, Bertrand Marquis wrote:
>> cppcheck can be used to check Xen code quality.
>>=20
>> To create a report do "make cppcheck" on a built tree adding any options
>> you added during the process you used to build xen (like CROSS_COMPILE
>> or XEN_TARGET_ARCH). This will generate an xml report xen-cppcheck.xml.
>>=20
>> To create a html report do "make cppcheck-html" in the same way and a
>> full report to be seen in a browser will be generated in
>> cppcheck-htmlreport/index.html.
>>=20
>> For better results it is recommended to build your own cppcheck from the
>> latest sources that you can find at [1].
>> Development and result analysis has been done with cppcheck 2.7.
>>=20
>> The Makefile rule is searching for all C files which have been compiled
>> (ie which have a generated .o file) and is running cppcheck on all of
>> them using the current configuration of xen so only the code actually
>> compiled is checked.
>>=20
>> A new tool is introduced to merge all cppcheck reports into one global
>> report including all findings and removing duplicates.
>>=20
>> Some extra variables can be used to customize the report:
>> - CPPCHECK can be used to give the full path to the cppcheck binary to
>> use (default is to use the one from the standard path).
>> - CPPCHECK_HTMLREPORT can be used to give the full path to
>> cppcheck-htmlreport (default is to use the one from the standard path).
>>=20
>> This has been tested on several arm configurations (x86 should work but
>> has not been tested).
>>=20
>> [1] https://cppcheck.sourceforge.io/
>>=20
>> Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com>
>> Signed-off-by: Michal Orzel <michal.orzel@arm.com>
>=20
> Does CPPCheck have configurable errors vs warnings?  Should we wire this
> into CI so we can fail builds which introduce errors that we've already
> managed to purge from the codebase?

No we cannot configure which findings are errors or warnings.
What we can (and probably will) do is create a list of cppcheck rules that =
we
want to check and pass that to cppcheck (can be done using a text file). On=
ce
this is done and all findings are solved we should definitely add cppcheck =
to the
CI and fail builds when errors are introduced.

>=20
> Also, please include Anthony on future patches, given the extent of
> makefile changes.

I will for sure.

Cheers
Bertrand



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 13:23:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 13:23:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294306.500355 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXNQk-0001fY-S1; Thu, 24 Mar 2022 13:23:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294306.500355; Thu, 24 Mar 2022 13:23:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXNQk-0001fR-Nu; Thu, 24 Mar 2022 13:23:10 +0000
Received: by outflank-mailman (input) for mailman id 294306;
 Thu, 24 Mar 2022 13:23:09 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=jPEa=UD=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nXNQj-0001fL-Km
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 13:23:09 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id 8b2f0184-ab75-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 14:23:08 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 1FC2CD6E;
 Thu, 24 Mar 2022 06:23:07 -0700 (PDT)
Received: from [10.57.21.152] (unknown [10.57.21.152])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 5C7CC3F73D;
 Thu, 24 Mar 2022 06:23:04 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8b2f0184-ab75-11ec-a405-831a346695d4
Message-ID: <2f403670-bbe9-f2ef-bb1c-2c38b53d138b@arm.com>
Date: Thu, 24 Mar 2022 14:22:54 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [RFC PATCH] xen/build: Add cppcheck and cppcheck-html make rules
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: George Dunlap <George.Dunlap@citrix.com>, Jan Beulich
 <jbeulich@suse.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Anthony Perard <anthony.perard@citrix.com>
References: <77c79e86050eef2b706ee11e64183d57a0f5bcee.1648119732.git.bertrand.marquis@arm.com>
 <aff044ff-2a46-527d-9237-802487351bbc@citrix.com>
From: Michal Orzel <michal.orzel@arm.com>
In-Reply-To: <aff044ff-2a46-527d-9237-802487351bbc@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit



On 24.03.2022 14:06, Andrew Cooper wrote:
> On 24/03/2022 11:04, Bertrand Marquis wrote:
>> cppcheck can be used to check Xen code quality.
>>
>> To create a report do "make cppcheck" on a built tree adding any options
>> you added during the process you used to build xen (like CROSS_COMPILE
>> or XEN_TARGET_ARCH). This will generate an xml report xen-cppcheck.xml.
>>
>> To create a html report do "make cppcheck-html" in the same way and a
>> full report to be seen in a browser will be generated in
>> cppcheck-htmlreport/index.html.
>>
>> For better results it is recommended to build your own cppcheck from the
>> latest sources that you can find at [1].
>> Development and result analysis has been done with cppcheck 2.7.
>>
>> The Makefile rule is searching for all C files which have been compiled
>> (ie which have a generated .o file) and is running cppcheck on all of
>> them using the current configuration of xen so only the code actually
>> compiled is checked.
>>
>> A new tool is introduced to merge all cppcheck reports into one global
>> report including all findings and removing duplicates.
>>
>> Some extra variables can be used to customize the report:
>> - CPPCHECK can be used to give the full path to the cppcheck binary to
>> use (default is to use the one from the standard path).
>> - CPPCHECK_HTMLREPORT can be used to give the full path to
>> cppcheck-htmlreport (default is to use the one from the standard path).
>>
>> This has been tested on several arm configurations (x86 should work but
>> has not been tested).
>>
>> [1] https://cppcheck.sourceforge.io/
>>
>> Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com>
>> Signed-off-by: Michal Orzel <michal.orzel@arm.com>
> 
> Does CPPCheck have configurable errors vs warnings?  Should we wire this
> into CI so we can fail builds which introduce errors that we've already
> managed to purge from the codebase?
> 
For cppcheck, every finding is an error as it is placed within <errors> section in XML.
cppcheck differentiates different types of findings by using "severity" element which can be e.g. error, style, warning, etc.
cppcheck-html uses this field to group findings into categories and present it in a nice format to be seen on a web browser.
However there is currently no way to tell cppcheck to find only errors.

Cheers,
Michal


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 13:29:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 13:29:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294309.500365 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXNWW-0002Kv-GK; Thu, 24 Mar 2022 13:29:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294309.500365; Thu, 24 Mar 2022 13:29:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXNWW-0002Ko-DM; Thu, 24 Mar 2022 13:29:08 +0000
Received: by outflank-mailman (input) for mailman id 294309;
 Thu, 24 Mar 2022 13:29:06 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXNWU-0002Ke-Gs; Thu, 24 Mar 2022 13:29:06 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXNWU-0004Gx-Dd; Thu, 24 Mar 2022 13:29:06 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXNWU-0002ZD-0c; Thu, 24 Mar 2022 13:29:06 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXNWU-0004bt-08; Thu, 24 Mar 2022 13:29:06 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=XCuKH6A3yAf2Y1vH2ZyFlEskahABTTjsvgrF+MZjnY8=; b=3d7lJNpXt1i73Slqs7bFvlsMxC
	JlTSygr3LZ4vnnELd+a3ATRu6AL9Z0+qzEo0Zr2L+k2vz3F+gflh0q8ppcZlZUuxarb/Nr/0dlEcA
	Vn7NFLhNP2SAQ4XLOl3jfm8JuPvH0wmEiWLUd+a5VmUrmTd2GEA8KdJBsg8C6mrGdEW8=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168823-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168823: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 24 Mar 2022 13:29:06 +0000

flight 168823 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168823/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   24 days
Failing since        168258  2022-03-01 01:55:31 Z   23 days  243 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    2 days   24 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 13:37:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 13:37:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294316.500376 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXNeQ-0003mK-CG; Thu, 24 Mar 2022 13:37:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294316.500376; Thu, 24 Mar 2022 13:37:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXNeQ-0003mD-9L; Thu, 24 Mar 2022 13:37:18 +0000
Received: by outflank-mailman (input) for mailman id 294316;
 Thu, 24 Mar 2022 13:37:17 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=PRqf=UD=xilinx.com=ayankuma@srs-se1.protection.inumbo.net>)
 id 1nXNeP-0003m6-9x
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 13:37:17 +0000
Received: from NAM12-BN8-obe.outbound.protection.outlook.com
 (mail-bn8nam12on20606.outbound.protection.outlook.com
 [2a01:111:f400:fe5b::606])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 8362bdda-ab77-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 14:37:15 +0100 (CET)
Received: from BN0PR04CA0161.namprd04.prod.outlook.com (2603:10b6:408:eb::16)
 by SJ0PR02MB8735.namprd02.prod.outlook.com (2603:10b6:a03:3e2::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.16; Thu, 24 Mar
 2022 13:37:09 +0000
Received: from BN1NAM02FT011.eop-nam02.prod.protection.outlook.com
 (2603:10b6:408:eb:cafe::e1) by BN0PR04CA0161.outlook.office365.com
 (2603:10b6:408:eb::16) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17 via Frontend
 Transport; Thu, 24 Mar 2022 13:37:09 +0000
Received: from xir-pvapexch02.xlnx.xilinx.com (149.199.80.198) by
 BN1NAM02FT011.mail.protection.outlook.com (10.13.2.129) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5102.17 via Frontend Transport; Thu, 24 Mar 2022 13:37:08 +0000
Received: from xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) by
 xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) with Microsoft SMTP Server
 (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.1.2176.14; Thu, 24 Mar 2022 13:37:07 +0000
Received: from smtp.xilinx.com (172.21.105.197) by
 xir-pvapexch02.xlnx.xilinx.com (172.21.17.17) with Microsoft SMTP Server id
 15.1.2176.14 via Frontend Transport; Thu, 24 Mar 2022 13:37:07 +0000
Received: from [10.108.8.223] (port=27868 helo=xcbayankuma41x.xilinx.com)
 by smtp.xilinx.com with esmtp (Exim 4.90)
 (envelope-from <ayan.kumar.halder@xilinx.com>)
 id 1nXNeF-00022c-ML; Thu, 24 Mar 2022 13:37:07 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8362bdda-ab77-11ec-a405-831a346695d4
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=bd2SWqO61ABUiwR7djLKMmBA9OtUVs/TWhD34CKF7As2+B+7Xy6Y+Hj9Foake8P0q0xQWFoUZ502Ss7cHBIy3/ghw7/euL3zW/3Wc4LcZBlL+o4XB6XsizM++2vtNyatYhhN47pO6X9v2LoBt3oPJhHzXnfPeFTPht470B/+D47NTpXu/HgQBWOAaWUPSqMJpd2vCjJgL7nxkgTSbFPJh5MyJdovS9ZBmihRR0G03BLZIuy7zJZOXqnGPLKZfTVIU3iZw1hnsHlUFlQ2GZiSn/4bkew2MTaNuqbEIuExip25GK6poLk7r71/yliXZPZX07y/vISzU0IjlMEXswiTIQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=WZjiGYz/x6TAgG5Zc27eATIQID4txiI8Meb8Bc6LqgU=;
 b=bG6SFMtrfKiWh0y/H75OuRITtK/fW6LrrkguTrChsLPqBgvNfccL44ep9sDjFedKvIX2APKo2pJ4TL7/S6K/Gj04kfOwN3DTWpjFYvuvePG8FEBwDrUxE4xmbs0WPIYllLWTlMQa1UKjLAmz3gKZ2TxnReMBuS3H49QSj8lImiDgyKSoXSw3bxIqp7dme1682ENp3u9iY+UkYwMSIvLTz+5QeTIUkjM/JL6K4DxSinkfvEIbqgsfw7J+wXHBHXLM5Vd0EKQDKNaLSCsQ3ZynupmK2nRbroE4vEaw2gnXArDv++NlvX9baJESGpzZ+5HpHkhLL89DqFzKPzo5y16zcg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 149.199.80.198) smtp.rcpttodomain=lists.xenproject.org
 smtp.mailfrom=xilinx.com; dmarc=pass (p=none sp=none pct=100) action=none
 header.from=xilinx.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=xilinx.onmicrosoft.com; s=selector2-xilinx-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=WZjiGYz/x6TAgG5Zc27eATIQID4txiI8Meb8Bc6LqgU=;
 b=ieM9yVmynpIij2k5RtgHoVeqhmULOul4Guu28sn0w+ysF6sMSMezuXOfYA3FAeVh2vF3Qft0eHymhxsE9oM0Xd2J/jwMu/3wbuC8oWcNEyrEHnCzf5rYPguKgFi9lHCwWyWqF+kDQmTvX2DIwLqUvF0MAekM04CPHF/zJSVpSM0=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 149.199.80.198)
 smtp.mailfrom=xilinx.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=xilinx.com;
Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates
 149.199.80.198 as permitted sender) receiver=protection.outlook.com;
 client-ip=149.199.80.198; helo=xir-pvapexch02.xlnx.xilinx.com;
From: Ayan Kumar Halder <ayan.kumar.halder@xilinx.com>
To: <xen-devel@lists.xenproject.org>
CC: <sstabellini@kernel.org>, <stefanos@xilinx.com>, <julien@xen.org>,
	<Volodymyr_Babchuk@epam.com>, <bertrand.marquis@arm.com>, Ayan Kumar Halder
	<ayankuma@xilinx.com>
Subject: [PATCH v12] xen/arm64: io: Handle data abort due to cache maintenance instructions
Date: Thu, 24 Mar 2022 13:37:05 +0000
Message-ID: <20220324133705.37882-1-ayankuma@xilinx.com>
X-Mailer: git-send-email 2.17.1
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2ec71d98-5a6e-4b7d-4edd-08da0d9b64d8
X-MS-TrafficTypeDiagnostic: SJ0PR02MB8735:EE_
X-Microsoft-Antispam-PRVS:
	<SJ0PR02MB873525AD73BED75AB30106DDB2199@SJ0PR02MB8735.namprd02.prod.outlook.com>
X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:149.199.80.198;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:xir-pvapexch02.xlnx.xilinx.com;PTR:unknown-80-198.xilinx.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(336012)(1076003)(2616005)(316002)(83380400001)(107886003)(40460700003)(426003)(82310400004)(36756003)(5660300002)(26005)(508600001)(186003)(6916009)(54906003)(8936002)(9786002)(7636003)(356005)(47076005)(7696005)(2906002)(36860700001)(70586007)(70206006)(4326008)(8676002)(102446001);DIR:OUT;SFP:1101;
X-OriginatorOrg: xilinx.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Mar 2022 13:37:08.7617
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 2ec71d98-5a6e-4b7d-4edd-08da0d9b64d8
X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c;Ip=[149.199.80.198];Helo=[xir-pvapexch02.xlnx.xilinx.com]
X-MS-Exchange-CrossTenant-AuthSource:
	BN1NAM02FT011.eop-nam02.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR02MB8735

When the data abort is caused due to cache maintenance for an address,
there are three scenarios:-

1. Address belonging to a non emulated region - For this, Xen should
set the corresponding bit in the translation table entry to valid and
return to the guest to retry the instruction. This can happen sometimes
as Xen need to set the translation table entry to invalid. (for eg
'Break-Before-Make' sequence). Xen returns to the guest to retry the
instruction.

2. Address belongs to an emulated region - Xen should ignore the
instruction (ie increment the PC) and return to the guest.

3. Address is invalid - Xen should forward the data abort to the guest.

Signed-off-by: Ayan Kumar Halder <ayankuma@xilinx.com>
---

Changelog:-

v1...v8 - NA

v9 - Extracted this change from "[XEN v7 2/2] xen/arm64: io: Support
instructions (for which ISS is not ..." into a separate patch of its
own. The reason being this addresses an existing bug in the codebase.

v10 - 1. To check if the address belongs to an emulated region, one
needs to check if it has a mmio handler or an ioreq server. In this
case, Xen should increment the PC
2. If the address is invalid (niether emulated MMIO nor the translation
could be resolved via p2m or mapping the MMIO region), then Xen should
forward the abort to the guest.

v11 - 1. Removed the un-necessary check "( instr.state == INSTR_CACHE )"
in handle_ioserv(). The reason being the ioserv request is not forwarded
by try_fwd_ioserv() when instr.state == INSTR_CACHE.

v12 - 1. try_handle_mmio() should assert for "(info->dabt.valid || 
(info->dabt_instr.state == INSTR_CACHE))"
2. In try_fwd_ioserv(), ioreq size should be set to the cache line size
for INSTR_CACHE. Also ioreq data should be set only when ISS is valid.

 xen/arch/arm/include/asm/mmio.h |  1 +
 xen/arch/arm/io.c               | 20 +++++++++++++++++++-
 xen/arch/arm/ioreq.c            | 14 ++++++++++++--
 3 files changed, 32 insertions(+), 3 deletions(-)

diff --git a/xen/arch/arm/include/asm/mmio.h b/xen/arch/arm/include/asm/mmio.h
index ca259a79c2..79e64d9af8 100644
--- a/xen/arch/arm/include/asm/mmio.h
+++ b/xen/arch/arm/include/asm/mmio.h
@@ -35,6 +35,7 @@ enum instr_decode_state
      * instruction.
      */
     INSTR_LDR_STR_POSTINDEXING,
+    INSTR_CACHE,                    /* Cache Maintenance instr */
 };
 
 typedef struct
diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c
index 6f458ee7fd..4ce94243aa 100644
--- a/xen/arch/arm/io.c
+++ b/xen/arch/arm/io.c
@@ -139,6 +139,17 @@ void try_decode_instruction(const struct cpu_user_regs *regs,
         return;
     }
 
+    /*
+     * When the data abort is caused due to cache maintenance, Xen should check
+     * if the address belongs to an emulated MMIO region or not. The behavior
+     * will differ accordingly.
+     */
+    if ( info->dabt.cache )
+    {
+        info->dabt_instr.state = INSTR_CACHE;
+        return;
+    }
+
     /*
      * Armv8 processor does not provide a valid syndrome for decoding some
      * instructions. So in order to process these instructions, Xen must
@@ -161,7 +172,7 @@ enum io_state try_handle_mmio(struct cpu_user_regs *regs,
 
     ASSERT(info->dabt.ec == HSR_EC_DATA_ABORT_LOWER_EL);
 
-    if ( !info->dabt.valid )
+    if ( !(info->dabt.valid || (info->dabt_instr.state == INSTR_CACHE)) )
     {
         ASSERT_UNREACHABLE();
         return IO_ABORT;
@@ -177,6 +188,13 @@ enum io_state try_handle_mmio(struct cpu_user_regs *regs,
         return rc;
     }
 
+    /*
+     * When the data abort is caused due to cache maintenance and the address
+     * belongs to an emulated region, Xen should ignore this instruction.
+     */
+    if ( info->dabt_instr.state == INSTR_CACHE )
+        return IO_HANDLED;
+
     /*
      * At this point, we know that the instruction is either valid or has been
      * decoded successfully. Thus, Xen should be allowed to execute the
diff --git a/xen/arch/arm/ioreq.c b/xen/arch/arm/ioreq.c
index 54167aebcb..87a6240f2a 100644
--- a/xen/arch/arm/ioreq.c
+++ b/xen/arch/arm/ioreq.c
@@ -47,7 +47,7 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
                              struct vcpu *v, mmio_info_t *info)
 {
     struct vcpu_io *vio = &v->io;
-    struct instr_details instr = info->dabt_instr;
+    const struct instr_details instr = info->dabt_instr;
     struct hsr_dabt dabt = info->dabt;
     ioreq_t p = {
         .type = IOREQ_TYPE_COPY,
@@ -62,7 +62,6 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
          * memory access. So for now, we can safely always set to 0.
          */
         .df = 0,
-        .data = get_user_reg(regs, info->dabt.reg),
         .state = STATE_IOREQ_READY,
     };
     struct ioreq_server *s = NULL;
@@ -74,12 +73,23 @@ enum io_state try_fwd_ioserv(struct cpu_user_regs *regs,
         return IO_ABORT;
     }
 
+    if ( instr.state == INSTR_CACHE )
+        p.size = dcache_line_bytes;
+
     s = ioreq_server_select(v->domain, &p);
     if ( !s )
         return IO_UNHANDLED;
 
+    /*
+     * When the data abort is caused due to cache maintenance and the address
+     * belongs to an emulated region, Xen should ignore this instruction.
+     */
+    if ( instr.state == INSTR_CACHE )
+        return IO_HANDLED;
+
     ASSERT(dabt.valid);
 
+    p.data = get_user_reg(regs, info->dabt.reg);
     vio->req = p;
     vio->info.dabt_instr = instr;
 
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 13:56:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 13:56:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294321.500388 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXNx9-0006Cg-0R; Thu, 24 Mar 2022 13:56:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294321.500388; Thu, 24 Mar 2022 13:56:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXNx8-0006CY-Tf; Thu, 24 Mar 2022 13:56:38 +0000
Received: by outflank-mailman (input) for mailman id 294321;
 Thu, 24 Mar 2022 13:56:38 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=oofn=UD=invisiblethingslab.com=demi@srs-se1.protection.inumbo.net>)
 id 1nXNx7-0006CR-Or
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 13:56:37 +0000
Received: from out5-smtp.messagingengine.com (out5-smtp.messagingengine.com
 [66.111.4.29]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 37a209b3-ab7a-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 14:56:35 +0100 (CET)
Received: from compute2.internal (compute2.nyi.internal [10.202.2.46])
 by mailout.nyi.internal (Postfix) with ESMTP id 8A5BE5C0140
 for <xen-devel@lists.xenproject.org>; Thu, 24 Mar 2022 09:56:34 -0400 (EDT)
Received: from mailfrontend1 ([10.202.2.162])
 by compute2.internal (MEProxy); Thu, 24 Mar 2022 09:56:34 -0400
Received: by mail.messagingengine.com (Postfix) with ESMTPA for
 <xen-devel@lists.xenproject.org>; Thu, 24 Mar 2022 09:56:34 -0400 (EDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 37a209b3-ab7a-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:content-type:date:date:from:from
	:in-reply-to:message-id:mime-version:reply-to:sender:subject
	:subject:to:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender
	:x-sasl-enc; s=fm3; bh=UMa1nviksUHshzxx13Mfy06/AQsSP41Jyx9w96vbw
	dY=; b=AejbEkavn3b2sGHf5Q0sUS/ln0qr04NRZok++WiX5N6hNlEkEptQY0HkC
	3JnRMoIl7R5KoteLNnN8Hg9491OPhWsjGAvCSrdYbSKpW4+navGljYSqmQa2joKg
	eiLiPX7lEqmsfW8yL9s0QVylxCd2kpo300swOhp+2NzWTz2idVUev3k5GjAb2o0z
	5q6DVpPv7cH6ot6nQ50yA9G6BdLmA9xJlGsXjtzDqZB1a2+6bSoZnDTYJ0tuyZCH
	fmBlEAXcAmv9OJR20T5XdPs460eOFxPh3gSwxFor6NgTAxxOVSzwx5hhKuTc7Em0
	nLrrslwJiTDcHDfGsTa0/2zjwWCJQ==
X-ME-Sender: <xms:kng8Yh3c96IEMXhgG5WqschiqU6uA6W3B99dXqRwi0aeXNIJmT8DpA>
    <xme:kng8YoHi_GvcQB6kPPjoCIN089ZFSPSj_M_u_q2D18bjHrFyfYlc0rR2sNjkKk_t-
    -hI5juX9VbVoLA>
X-ME-Received: <xmr:kng8Yh6veNJi13aFh88LANiyAEihjNahiE9QKW19_Q4nSMvUSFxZV4UVFM90>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddrudegledgheegucetufdoteggodetrfdotf
    fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen
    uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne
    cujfgurhepfffhvffukfggtggusehgtderredttddvnecuhfhrohhmpeffvghmihcuofgr
    rhhivgcuqfgsvghnohhurhcuoeguvghmihesihhnvhhishhisghlvghthhhinhhgshhlrg
    gsrdgtohhmqeenucggtffrrghtthgvrhhnpedujefgjeeggeelhfevkeeltdekvdeuhfet
    iefffefhkeehhfevhefhkefgudegkeenucevlhhushhtvghrufhiiigvpedtnecurfgrrh
    grmhepmhgrihhlfhhrohhmpeguvghmihesihhnvhhishhisghlvghthhhinhhgshhlrggs
    rdgtohhm
X-ME-Proxy: <xmx:kng8Yu3vQsOg_kHmKQKjJ_yPF9DNxJB9pwRRmNG0_4zmPd0qcdX_pw>
    <xmx:kng8YkHazjf9sxiCFc9QkfQlZdx_FJM8I-g526TS22bdEO1h5CbLJg>
    <xmx:kng8Yv_v-60J4wr0_swomx4YIocIR35e5rhTLO5FYrQHMutu1il7dg>
    <xmx:kng8YoTNKlNvgbrS1Qzwg7fllV6tkBdBRJfJuiKKlBRok7wvS5Hy9Q>
Date: Thu, 24 Mar 2022 09:56:29 -0400
From: Demi Marie Obenour <demi@invisiblethingslab.com>
To: Xen developer discussion <xen-devel@lists.xenproject.org>
Subject: Support status of OpenBSD frontend drivers
Message-ID: <Yjx4kNv7hG4FGGot@itl-email>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="OvSRlnlvMHP5qRcf"
Content-Disposition: inline


--OvSRlnlvMHP5qRcf
Content-Type: text/plain; protected-headers=v1; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Date: Thu, 24 Mar 2022 09:56:29 -0400
From: Demi Marie Obenour <demi@invisiblethingslab.com>
To: Xen developer discussion <xen-devel@lists.xenproject.org>
Subject: Support status of OpenBSD frontend drivers

As per private discussion with Theo de Raadt, OpenBSD does not consider
bugs in its xnf(4) that allow a backend to cause mischief to be security
issues.  I believe the same applies to its xbf(4).  Should the support
document be updated?
--=20
Sincerely,
Demi Marie Obenour (she/her/hers)
Invisible Things Lab

--OvSRlnlvMHP5qRcf
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=nBDZ
-----END PGP SIGNATURE-----

--OvSRlnlvMHP5qRcf--


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 13:57:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 13:57:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294324.500399 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXNxq-0006iH-9O; Thu, 24 Mar 2022 13:57:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294324.500399; Thu, 24 Mar 2022 13:57:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXNxq-0006iA-5t; Thu, 24 Mar 2022 13:57:22 +0000
Received: by outflank-mailman (input) for mailman id 294324;
 Thu, 24 Mar 2022 13:57:21 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=8ILU=UD=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nXNxp-0006CR-8h
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 13:57:21 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 52896160-ab7a-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 14:57:20 +0100 (CET)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur03lp2059.outbound.protection.outlook.com [104.47.8.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-11-xvVa1J_BNB2-xfRb9hlc5Q-1; Thu, 24 Mar 2022 14:57:18 +0100
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by VI1PR04MB6080.eurprd04.prod.outlook.com (2603:10a6:803:f6::10)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.18; Thu, 24 Mar
 2022 13:57:14 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::fc39:fd17:1086:307a%6]) with mapi id 15.20.5102.018; Thu, 24 Mar 2022
 13:57:14 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 52896160-ab7a-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648130240;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=iZQweW+I+pgt+FcfWnbZaBe6HbyN6BVC7Jlb0Seu79k=;
	b=D891Zczcb787wFpDZmhyeMmoRfLWTLVVrc3Ova1AkhlLW8nT2B3toV6GffwT00YGElU0XC
	Fx1X/inBI+ktr38qFMIzEBtvb5VbidfAwq61GQG0HzuE+Ds0MfoPyOvMuyBnMVY8uu9P5M
	tDfS2WuaOJUFeF8fSsdCA2bStpcVn+Q=
X-MC-Unique: xvVa1J_BNB2-xfRb9hlc5Q-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=I9aRfU5ijh59Rxjuv7w/Evt06sxCV1GLSp6cKHQXJ9PmMW3lsRTJXH7kGsHqRSz1vlW/7Bw1lFOMitTgl7khHOpnT+hUBjARQMxVGZ6UpDT0ISgxFdqec9Ys6A/IW4MSN2eHUqjB4xJ3CaCt1WOdstT4/wo8N+SvWWQczDcWwDfwdZ9UdrF0EgFyEA0alPQVGjMHL7r8JdVqpNiqO6nflt4ozJJFsJnyMcmc6ZgfW0QbeMyw61+k0eoMh8fqKZVo11vHMSLXwaqFpUVcy9xOFuL8L+27/SwNWhqJgFRzpkwPQ5jft/+7iZ6QAVFa3Zz2trMbSh/5kX2XRkvU8oucqw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=iZQweW+I+pgt+FcfWnbZaBe6HbyN6BVC7Jlb0Seu79k=;
 b=Uodsl6vFC39b39q4WZSCVg9GUEwBNFD83hhkHHxZGm2xrHNX55ArBC5nobisnRquGd6cXJIhU3F3tOFyQ1lY2puXGtP7Mo814XcaaSNnrOIaK0j/g7jDIzW55gpQQlR+Ta2LwSq3nHJ0I7T2mbWuipxa+PtHONtJneBsSKcEQTj0ARdkfllHK7MuZAONERSlP2oD6XQhxSjz5p7woELxjqLVQXr2zWxpypfK8MW5Nfkj6n4SXXOSOnpTKXdxdnUVAxFq+fHpjNJf81Xb/vl/PcISezWpgLVbX7+tyhoIF47/C+Egf/SyoEATNsvjOFN0GpwBilhkLd7FOGYlAPXBKQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <49de1f24-e72a-69ea-f9d6-3c17cd0fc162@suse.com>
Date: Thu, 24 Mar 2022 14:57:11 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v5 03/10] xen: harmonize return types of hypercall
 handlers
Content-Language: en-US
To: Juergen Gross <jgross@suse.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>, Wei Liu
 <wl@xen.org>, George Dunlap <george.dunlap@citrix.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Christopher Clark <christopher.w.clark@gmail.com>,
 xen-devel@lists.xenproject.org
References: <20220324081312.18222-1-jgross@suse.com>
 <20220324081312.18222-4-jgross@suse.com>
 <c53e65d5-82fa-2cbd-c49e-94a3935c2b7e@suse.com>
 <84010992-34ed-3e40-f70d-da91cbb0d210@suse.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <84010992-34ed-3e40-f70d-da91cbb0d210@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P193CA0114.EURP193.PROD.OUTLOOK.COM
 (2603:10a6:209:85::19) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 7a660bf2-e1d0-49a5-3ae1-08da0d9e3367
X-MS-TrafficTypeDiagnostic: VI1PR04MB6080:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB60800965CC2FB1E95B4F643EB3199@VI1PR04MB6080.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	fFGcoNHsfsH8mO3JgdNM0v/k5TKwa5UE84asQWE/NflNr6ggvyKCfmmeK54e0l4zrjBaOD5hX9e36CGh0kTWx9jtk+50FxufVcfvRqM0EL5OFj6J9AYuGGXGPN1X+5urSKQW+5bRiitB5yVYQkPOIWm1EnMpU3XUR8FhLMPmhxsNbVpTlg1jZGbUvux1Zwb116aYP/0K9lHXw4xAHIMV51FgYYF+QZYnk1ceKgQ2qXmCG0L57IJlMdF/YQZnvhmfTCQgL9maiw01SgpSKU0nu57ak0J9GM8gwX21c2sZrJO9us85SUlP6xZD6wTcmP6JO+jf+DAen5TMTx2waoty0DHtyAcKR4x+UUbt99C4QXxKfqeqlQE3yUgFT6EEa8KDUbhzlGsNZ/mBHWG0EdJjuwzsCj9VCkRihXvEl8oebRB74mgQFky9QwjkUfzwRCTdO6mn7JBurjE3qGh8eqCY6aHkH0VGfeoE2sXCJIxDxLvNb8CjFS0HY4qV3mhkKWex2xeonVQwjdr4Bf7D4xoRPuwaCeS8c96rOgdzpzlGIJiatE118TUaaGeYyTDamNR7XYY/qdH8puEqCpU+NSvuXXizwkM7ed8xmEUc0xn04CpdhNX09yqQ3RFi64kBmcLL1MQYj4x2U1ZpH0FhY1NUeOipDjzJqxL+9vQtY3f3MCkYmebvipCpyRUcWWy2PcBZCH4KJiJB1JfPwU1e57IKPZBeOyU5sEEx9zNCTqUJXm4=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(31696002)(6486002)(4744005)(508600001)(316002)(6636002)(86362001)(37006003)(54906003)(2616005)(38100700002)(26005)(186003)(53546011)(6512007)(6506007)(6666004)(66476007)(66946007)(66556008)(31686004)(2906002)(8676002)(6862004)(4326008)(8936002)(5660300002)(36756003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?bmNOQmxoMmYrcG9yMzBOa1VOMEo1enB0MndSSEdNYW8ySDhzWlRuQUQ1c2Uw?=
 =?utf-8?B?THZ6QWx3NFc4YVk2bmk5Z3lnNWgwME1icGc1MVBCdnQvQ2t5cjhock1MdVFH?=
 =?utf-8?B?d2Y4c2NxZVdpRVBsUlVEUUxBd2FrL0NnalZGUDJ1VkFXazM1V1pSNlU4NStS?=
 =?utf-8?B?OFpyWm9RUUh2TWlVQjF4VFJZNWtCalF2bTRKQzB5ZnMwWnp6ZCtaS3VXaTY4?=
 =?utf-8?B?OW9LbUU2QUdXc29qb0tXaGMyTEhuQmRuRlMxc1B3QmhYSyt1b3Y4clI0d09t?=
 =?utf-8?B?RFV4NHNGUi9hbSthOFQraG1pTEIxQnExeFVHMDU1Z0FoVEN0R2JXSDBZakZx?=
 =?utf-8?B?TDF5V0xvV01MNHVIOEViN2dybG1lWEQyWWJqSWc1Vi9rbzByeTZtR2ttWUEw?=
 =?utf-8?B?MEsvWEhQMEROVmRJNHByN2x1c2lmU0x3cDNTZnk3RjJSaHNTYklRMTZpYW44?=
 =?utf-8?B?c3N3bkw4UVRRQWorYnJvV2R1WDR6Rmt4QlBXcFhWTGJhVEtabGdkV24xbll1?=
 =?utf-8?B?NUlONXF5RE5nL0tDUDVNUXN5T2JSelJPRG5RdEJiMmk4cW9zZ1dhRDg5c0hz?=
 =?utf-8?B?Ulo3WXBuTW9taDNRc251cExSbGhSbVUvUkk0Qkh4OXJody9Zb1V2RDlxVUVZ?=
 =?utf-8?B?ZWZDaGVjdjlrekxrUDJYNXVuem9RUUpHd0F0aEVwL2lsRDhBa0hxYk9ZYmR0?=
 =?utf-8?B?SmY4dmFLTUhUT0o2dFlBUHpWOWwrc20xYzFTS3lleEZyUE84aEpJbFNWVFhE?=
 =?utf-8?B?L3RhODNCK3B2WkxLRS9PZURqNkdnU2Y0bjNVWWpNaGxaRm1rbE9SYWQyMjNL?=
 =?utf-8?B?UGdiQjl0alhBa1c1d1Z2eEVxR1U2MUdsUENZZEpDTFA3Uk0rQk5RVktUVE1v?=
 =?utf-8?B?OHU0akZSNGwzaVhFcXo2MlJJaXVQOHhEVG8rYkJnblIwWTVBVjNrUDJwcm05?=
 =?utf-8?B?R3pkWFF3bU8vTEkrRGc5WDZFZkJ0akZlS3hIUDJpKzUva2o4TTBONERyb2d2?=
 =?utf-8?B?UHlnbmFtQnVSaFNVS21FSUxmclgvUnpTb2NEOUc4Nm5BRFg2M1dCWHdDblF0?=
 =?utf-8?B?VzNxZ0d5UElYNzRvQmJkNWpIcS91ZHBpdnB2RmFHTDc2T1ZUaGFKcEo4UkhD?=
 =?utf-8?B?WWk0VzFsb0wxR3ppUWx3NUtVdkJoZ0loVG14QS9zOHhKU3hOSThZNTNTM0t6?=
 =?utf-8?B?ZlQ0cVNEdGxubm1hblpCZGZvV2tjS013cFlHQkxOSTVmZ1ZRV2FpdlVqRldV?=
 =?utf-8?B?MVNoMVVHTk9CQmEyQ1IySkFYMnFxSWJ6TVdIY1VQV1ZCYWZOanB0bWM2Y2Rs?=
 =?utf-8?B?YzQwRGJkWklNVko2cllSaytaa090bHJqYU1vNFlZYk5qK0wvT1oxYzVqRGp6?=
 =?utf-8?B?ZGlGdUFFYy9mWWUrZ1hLcXVtMTVJdUFuMlZwL3ZSMzN6Y0pJMDN3QkFEdnVm?=
 =?utf-8?B?SktVbXlRd2JSUVRlbExuekJGZWdOam11ajhDVEdyZFhWb2ZiZTc2VThrWlFn?=
 =?utf-8?B?QVo4a2JOc050dFZJUHFpck9mUVVoeFhPekJtSFNwM2E1aHpyOEtUWUVwZWIz?=
 =?utf-8?B?bGV3UkhOYW9wYlJ3bzRJYk4rdllkMU1aOWZvVnFteHM0Z1NMV3pXay9iQ0x5?=
 =?utf-8?B?R1p2K1lrL2FZWEVMVm9sc0tHRjFEYS9sMnQvR09ra1JoajJaaElQZ1gySE5r?=
 =?utf-8?B?bUYxdmZXY2NObU9yNE01YkJuOWVScTM5TkFwSkdsVzRDMDRzRWx0akUrKzVw?=
 =?utf-8?B?SVRZamdtaXpiUDJVTmE3OHFKbzBadUs2emNwUW1DcGVUbUFWaGRrQ0RnR3J3?=
 =?utf-8?B?YmhjdHZ6K0hxcGlNRU5nekJnYVZRczZBVWNSa3BjYkZhOW9DYVpCejBRRWkw?=
 =?utf-8?B?NmxidVBqTU5EUmM4M2FFNkRqN05XTXR1SE95ak0vZVlqdXJweFAxQ1JBMG9t?=
 =?utf-8?B?R0JFVUNucm9QRHppOFpXVCsvUGlldUl0aGVrS2laK2V6UWNuZm5EcnI5VnJ6?=
 =?utf-8?B?ZE80TlRhQ2JRUTBldXlTbGdpbi9nWDBqWUM2RW5pTUJDY2dIRUdFd3dEVUVj?=
 =?utf-8?B?N0NESmJWa1BjQzFwOEZXNjRUTjV4cnNDUlQ1RVBYeVViUmMvZzRUbmpob0pl?=
 =?utf-8?B?ZjI4YzN6YWRnV0xvL0dCOFAxQVUwbzA1RnlBa0w2b2JlakgvZnlveThNWlZw?=
 =?utf-8?B?bEQ2QnFRemx5MWliMU9lV2VWOHJPQnZlb2kyZjNuYVRhMXB1TVRwTGw2VWVt?=
 =?utf-8?B?OFE1STMxaWNXem1vMFB0TW8yNHlhNlFJSzljVnhMUU03NktSQVNmZzlNaTFQ?=
 =?utf-8?B?T09wdStCWEFpd3BXU0NHZVVIaFpVeHFDMUlOVDVmV0NFZTQ5WEUvZz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7a660bf2-e1d0-49a5-3ae1-08da0d9e3367
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Mar 2022 13:57:14.6305
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: HfOPb3bJmk8tsQWt0zaAB/chFStEXMaaTHFS16gDSC12nfMs9rHy8/E/QOq4YhgQWw2dxiMoZ8hygoYC1U2BQg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB6080

On 24.03.2022 12:19, Juergen Gross wrote:
> On 24.03.22 11:57, Jan Beulich wrote:
>> On 24.03.2022 09:13, Juergen Gross wrote:
>>> Today most hypercall handlers have a return type of long, while the
>>> --- a/xen/arch/x86/x86_64/platform_hypercall.c
>>> +++ b/xen/arch/x86/x86_64/platform_hypercall.c
>>> @@ -4,6 +4,7 @@
>>>   
>>>   EMIT_FILE;
>>>   
>>> +#include <xen/hypercall.h>
>>>   #include <xen/lib.h>
>>>   #include <compat/platform.h>
>>>   #include <xen/hypercall.h>
> 
> This seems to be an artifact of the rebase done in V4 of the series, which
> was necessary as Andrew's large series used two patches of my V3 series.
> 
> Do you want me to resend without this hunk?

Well, I'd also be fine if you tell me the proper resolution of the
issue in the next patch. I guess the hunk there than also needs
dropping? And patch 5 adjusting accordingly for context? Overall
it may indeed be better if you resent ...

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 14:01:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 14:01:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294327.500409 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO26-0008IO-SJ; Thu, 24 Mar 2022 14:01:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294327.500409; Thu, 24 Mar 2022 14:01:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO26-0008IH-Ou; Thu, 24 Mar 2022 14:01:46 +0000
Received: by outflank-mailman (input) for mailman id 294327;
 Thu, 24 Mar 2022 14:01:44 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+IHq=UD=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXO24-0008Hr-Pq
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 14:01:44 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ef74ed2b-ab7a-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 15:01:43 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 0844F210DD;
 Thu, 24 Mar 2022 14:01:43 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 9A80912FF7;
 Thu, 24 Mar 2022 14:01:42 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id KkF/JMZ5PGKeegAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 24 Mar 2022 14:01:42 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ef74ed2b-ab7a-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648130503; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=eM4dyQhe9WvzPlwymOvxwvqkXllRvlqS9zeEmc6DRmM=;
	b=GzCYuKw+K3CMDWtdCcsAgp0BXr9SpHMhaiV1ShcLbd0AQOHJmT1aQXvfQ5PsXZw/gIUVTK
	d0Zbx7jX0cXsKF98atNlcdGTNiYRnb7uq31eRgBDd6Ed12tmthbNOANsj2qQkf2YH6edaL
	EaYMuDZmhzfA+b/bwAobv2hLhFN/VT0=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Christopher Clark <christopher.w.clark@gmail.com>,
	Dario Faggioli <dfaggioli@suse.com>,
	Daniel De Graaf <dgdegra@tycho.nsa.gov>,
	"Daniel P. Smith" <dpsmith@apertussolutions.com>
Subject: [PATCH v6 0/9] xen: drop hypercall function tables
Date: Thu, 24 Mar 2022 15:01:30 +0100
Message-Id: <20220324140139.5899-1-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

In order to avoid indirect function calls on the hypercall path as
much as possible this series is removing the hypercall function tables
and is replacing the hypercall handler calls via the function array
by automatically generated call macros.

Another by-product of generating the call macros is the automatic
generating of the hypercall handler prototypes from the same data base
which is used to generate the macros.

This has the additional advantage of using type safe calls of the
handlers and to ensure related handler (e.g. PV and HVM ones) share
the same prototypes.

A very brief performance test (parallel build of the Xen hypervisor
in a 6 vcpu guest) showed a very slim improvement (less than 1%) of
the performance with the patches applied. The test was performed using
a PV and a PVH guest.

Changes in V2:
- new patches 6, 14, 15
- patch 7: support hypercall priorities for faster code
- comments addressed

Changes in V3:
- patches 1 and 4 removed as already applied
- comments addressed

Changes in V4:
- 5 patches removed al already applied
- new patches 1, 3 and 11
- avoid switching Arm hypercall handlers to return long (no change of
  handlers returning long already)

Changes in V5:
- patch 3 of V4 has been applied already
- comments addressed
- rebase

Changes in V6:
- patch 1 of V5 has been applied already
- fix of a rebase artifact

Juergen Gross (9):
  xen: move do_vcpu_op() to arch specific code
  xen: harmonize return types of hypercall handlers
  xen: don't include asm/hypercall.h from C sources
  xen: include compat/platform.h from hypercall.h
  xen: generate hypercall interface related code
  xen: use generated prototypes for hypercall handlers
  xen/x86: call hypercall handlers via generated macro
  xen/arm: call hypercall handlers via generated macro
  xen/x86: remove cf_check attribute from hypercall handlers

 .gitignore                               |   1 +
 xen/arch/arm/domain.c                    |  15 +-
 xen/arch/arm/hvm.c                       |   3 +-
 xen/arch/arm/include/asm/hypercall.h     |   7 +-
 xen/arch/arm/platform_hypercall.c        |   1 +
 xen/arch/arm/traps.c                     | 117 ++-------
 xen/arch/x86/compat.c                    |   6 +-
 xen/arch/x86/cpu/mcheck/mce.c            |   2 +-
 xen/arch/x86/cpu/vpmu.c                  |   3 +-
 xen/arch/x86/domain.c                    |  11 +-
 xen/arch/x86/domctl.c                    |   4 +-
 xen/arch/x86/hvm/dm.c                    |   2 +-
 xen/arch/x86/hvm/hvm.c                   |   2 +-
 xen/arch/x86/hvm/hypercall.c             | 177 ++-----------
 xen/arch/x86/hypercall.c                 |  59 -----
 xen/arch/x86/include/asm/hypercall.h     | 201 ++++-----------
 xen/arch/x86/include/asm/paging.h        |   3 -
 xen/arch/x86/mm.c                        |  13 +-
 xen/arch/x86/mm/paging.c                 |   3 +-
 xen/arch/x86/physdev.c                   |   2 +-
 xen/arch/x86/platform_hypercall.c        |   3 +-
 xen/arch/x86/pv/callback.c               |  26 +-
 xen/arch/x86/pv/descriptor-tables.c      |   8 +-
 xen/arch/x86/pv/emul-priv-op.c           |   2 +-
 xen/arch/x86/pv/hypercall.c              | 187 ++------------
 xen/arch/x86/pv/iret.c                   |   5 +-
 xen/arch/x86/pv/misc-hypercalls.c        |  22 +-
 xen/arch/x86/pv/shim.c                   |   4 +-
 xen/arch/x86/traps.c                     |   2 +-
 xen/arch/x86/x86_64/compat/mm.c          |   3 +-
 xen/arch/x86/x86_64/domain.c             |  16 +-
 xen/arch/x86/x86_64/mm.c                 |   2 -
 xen/arch/x86/x86_64/platform_hypercall.c |   1 -
 xen/common/argo.c                        |   8 +-
 xen/common/compat/domain.c               |  15 +-
 xen/common/compat/grant_table.c          |   3 +-
 xen/common/compat/kernel.c               |   2 +-
 xen/common/compat/memory.c               |   3 +-
 xen/common/dm.c                          |   2 +-
 xen/common/domain.c                      |  14 +-
 xen/common/domctl.c                      |   2 +-
 xen/common/event_channel.c               |   3 +-
 xen/common/grant_table.c                 |   4 +-
 xen/common/hypfs.c                       |   2 +-
 xen/common/kernel.c                      |   2 +-
 xen/common/kexec.c                       |   6 +-
 xen/common/memory.c                      |   2 +-
 xen/common/multicall.c                   |   4 +-
 xen/common/sched/compat.c                |   2 +-
 xen/common/sched/core.c                  |   4 +-
 xen/common/sysctl.c                      |   2 +-
 xen/common/xenoprof.c                    |   2 +-
 xen/drivers/char/console.c               |   2 +-
 xen/include/Makefile                     |  13 +
 xen/include/hypercall-defs.c             | 285 ++++++++++++++++++++
 xen/include/xen/hypercall.h              | 185 +------------
 xen/scripts/gen_hypercall.awk            | 314 +++++++++++++++++++++++
 xen/xsm/xsm_core.c                       |   4 +-
 58 files changed, 861 insertions(+), 937 deletions(-)
 create mode 100644 xen/include/hypercall-defs.c
 create mode 100644 xen/scripts/gen_hypercall.awk

-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 14:01:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 14:01:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294332.500446 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO29-0000Yv-Ka; Thu, 24 Mar 2022 14:01:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294332.500446; Thu, 24 Mar 2022 14:01:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO29-0000TH-56; Thu, 24 Mar 2022 14:01:49 +0000
Received: by outflank-mailman (input) for mailman id 294332;
 Thu, 24 Mar 2022 14:01:47 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+IHq=UD=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXO27-0008Hw-5Q
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 14:01:47 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f07a12d9-ab7a-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 15:01:45 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id DC650215FE;
 Thu, 24 Mar 2022 14:01:44 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 8FA4813B2F;
 Thu, 24 Mar 2022 14:01:44 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id GFPhIch5PGKeegAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 24 Mar 2022 14:01:44 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f07a12d9-ab7a-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648130504; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=DrpgpTGkFEv/IeXFwA2PDbf2FH7rXe4534vSynZIag4=;
	b=ZTqoXlzQ12dWOK2DiSHvJXtYu8SH7dU4/NIZARIzGInoJNPT52yEyzAKCxemSu4lyDwVhh
	X+Q+E2GXY7rAUrmz2e33iSR6EflThN18jyIj7XmcdWxXrSJUThKdyzTURQEQkTdYhi268V
	sr6V61emSUFo/7M3gWiuiqUgRrRG7uc=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Julien Grall <jgrall@amazon.com>
Subject: [PATCH v6 6/9] xen: use generated prototypes for hypercall handlers
Date: Thu, 24 Mar 2022 15:01:36 +0100
Message-Id: <20220324140139.5899-7-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220324140139.5899-1-jgross@suse.com>
References: <20220324140139.5899-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Remove the hypercall handler's prototypes in the related header files
and use the generated ones instead.

Some handlers having been static before need to be made globally
visible.

Signed-off-by: Juergen Gross <jgross@suse.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Julien Grall <jgrall@amazon.com>
---
 xen/arch/arm/include/asm/hypercall.h |   1 -
 xen/arch/x86/hvm/hypercall.c         |   7 +-
 xen/arch/x86/include/asm/hypercall.h | 141 ---------------------
 xen/include/xen/hypercall.h          | 177 +--------------------------
 4 files changed, 5 insertions(+), 321 deletions(-)

diff --git a/xen/arch/arm/include/asm/hypercall.h b/xen/arch/arm/include/asm/hypercall.h
index 8182895358..ccd26c5184 100644
--- a/xen/arch/arm/include/asm/hypercall.h
+++ b/xen/arch/arm/include/asm/hypercall.h
@@ -6,7 +6,6 @@
 #define __ASM_ARM_HYPERCALL_H__
 
 #include <public/domctl.h> /* for arch_do_domctl */
-int do_arm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
 
 long subarch_do_domctl(struct xen_domctl *domctl, struct domain *d,
                        XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl);
diff --git a/xen/arch/x86/hvm/hypercall.c b/xen/arch/x86/hvm/hypercall.c
index 3a35543997..a9c9ad721f 100644
--- a/xen/arch/x86/hvm/hypercall.c
+++ b/xen/arch/x86/hvm/hypercall.c
@@ -31,8 +31,7 @@
 #include <public/hvm/hvm_op.h>
 #include <public/hvm/params.h>
 
-static long cf_check hvm_memory_op(
-    unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long cf_check hvm_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     long rc;
 
@@ -52,7 +51,7 @@ static long cf_check hvm_memory_op(
 }
 
 #ifdef CONFIG_GRANT_TABLE
-static long cf_check hvm_grant_table_op(
+long cf_check hvm_grant_table_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) uop, unsigned int count)
 {
     switch ( cmd )
@@ -78,7 +77,7 @@ static long cf_check hvm_grant_table_op(
 }
 #endif
 
-static long cf_check hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long cf_check hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     const struct vcpu *curr = current;
     const struct domain *currd = curr->domain;
diff --git a/xen/arch/x86/include/asm/hypercall.h b/xen/arch/x86/include/asm/hypercall.h
index 81ca25f7b3..2d243b48bc 100644
--- a/xen/arch/x86/include/asm/hypercall.h
+++ b/xen/arch/x86/include/asm/hypercall.h
@@ -44,109 +44,6 @@ void pv_ring3_init_hypercall_page(void *ptr);
  */
 #define MMU_UPDATE_PREEMPTED          (~(~0U>>1))
 
-extern long cf_check
-do_event_channel_op_compat(
-    XEN_GUEST_HANDLE_PARAM(evtchn_op_t) uop);
-
-/* Legacy hypercall (as of 0x00030202). */
-extern long cf_check do_physdev_op_compat(
-    XEN_GUEST_HANDLE(physdev_op_t) uop);
-
-/* Legacy hypercall (as of 0x00030101). */
-extern long cf_check do_sched_op_compat(
-    int cmd, unsigned long arg);
-
-extern long cf_check
-do_set_trap_table(
-    XEN_GUEST_HANDLE_PARAM(const_trap_info_t) traps);
-
-extern long cf_check
-do_mmu_update(
-    XEN_GUEST_HANDLE_PARAM(mmu_update_t) ureqs,
-    unsigned int count,
-    XEN_GUEST_HANDLE_PARAM(uint) pdone,
-    unsigned int foreigndom);
-
-extern long cf_check
-do_set_gdt(
-    XEN_GUEST_HANDLE_PARAM(xen_ulong_t) frame_list,
-    unsigned int entries);
-
-extern long cf_check
-do_stack_switch(
-    unsigned long ss,
-    unsigned long esp);
-
-extern long cf_check
-do_fpu_taskswitch(
-    int set);
-
-extern long cf_check
-do_set_debugreg(
-    int reg,
-    unsigned long value);
-
-extern long cf_check
-do_get_debugreg(
-    int reg);
-
-extern long cf_check
-do_update_descriptor(
-    uint64_t gaddr, seg_desc_t desc);
-
-extern long cf_check
-do_mca(XEN_GUEST_HANDLE_PARAM(xen_mc_t) u_xen_mc);
-
-extern long cf_check
-do_update_va_mapping(
-    unsigned long va,
-    uint64_t val64,
-    unsigned long flags);
-
-extern long cf_check
-do_physdev_op(
-    int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern long cf_check
-do_update_va_mapping_otherdomain(
-    unsigned long va,
-    uint64_t val64,
-    unsigned long flags,
-    domid_t domid);
-
-extern long cf_check
-do_mmuext_op(
-    XEN_GUEST_HANDLE_PARAM(mmuext_op_t) uops,
-    unsigned int count,
-    XEN_GUEST_HANDLE_PARAM(uint) pdone,
-    unsigned int foreigndom);
-
-extern long cf_check do_callback_op(
-    int cmd, XEN_GUEST_HANDLE_PARAM(const_void) arg);
-
-extern long cf_check
-do_iret(
-    void);
-
-extern long cf_check
-do_set_callbacks(
-    unsigned long event_address,
-    unsigned long failsafe_address,
-    unsigned long syscall_address);
-
-extern long cf_check
-do_set_segment_base(
-    unsigned int which,
-    unsigned long base);
-
-long cf_check do_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
-
-long cf_check do_xenpmu_op(unsigned int op,
-                           XEN_GUEST_HANDLE_PARAM(xen_pmu_params_t) arg);
-
-long cf_check do_paging_domctl_cont(
-    XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl);
-
 #ifdef CONFIG_COMPAT
 
 #include <compat/arch-x86/xen.h>
@@ -157,44 +54,6 @@ extern int
 compat_common_vcpu_op(
     int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg);
 
-extern int cf_check compat_mmuext_op(
-    XEN_GUEST_HANDLE_PARAM(void) arg,
-    unsigned int count,
-    XEN_GUEST_HANDLE_PARAM(uint) pdone,
-    unsigned int foreigndom);
-
-extern int cf_check compat_callback_op(
-    int cmd, XEN_GUEST_HANDLE(const_void) arg);
-
-extern int cf_check compat_update_va_mapping(
-    unsigned int va, uint32_t lo, uint32_t hi, unsigned int flags);
-
-extern int cf_check compat_update_va_mapping_otherdomain(
-    unsigned int va, uint32_t lo, uint32_t hi, unsigned int flags, domid_t domid);
-
-DEFINE_XEN_GUEST_HANDLE(trap_info_compat_t);
-extern int cf_check compat_set_trap_table(
-    XEN_GUEST_HANDLE(trap_info_compat_t) traps);
-
-extern int cf_check compat_set_gdt(
-    XEN_GUEST_HANDLE_PARAM(uint) frame_list, unsigned int entries);
-
-extern int cf_check compat_update_descriptor(
-    uint32_t pa_lo, uint32_t pa_hi, uint32_t desc_lo, uint32_t desc_hi);
-
-extern int cf_check compat_iret(void);
-
-extern int cf_check compat_nmi_op(
-    unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern int cf_check compat_set_callbacks(
-    unsigned long event_selector, unsigned long event_address,
-    unsigned long failsafe_selector, unsigned long failsafe_address);
-
-DEFINE_XEN_GUEST_HANDLE(physdev_op_compat_t);
-extern int cf_check compat_physdev_op_compat(
-    XEN_GUEST_HANDLE(physdev_op_compat_t) uop);
-
 #endif /* CONFIG_COMPAT */
 
 #endif /* __ASM_X86_HYPERCALL_H__ */
diff --git a/xen/include/xen/hypercall.h b/xen/include/xen/hypercall.h
index ca8ee22717..f307dfb597 100644
--- a/xen/include/xen/hypercall.h
+++ b/xen/include/xen/hypercall.h
@@ -21,33 +21,19 @@
 #include <asm/hypercall.h>
 #include <xsm/xsm.h>
 
-extern long cf_check
-do_sched_op(
-    int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern long cf_check
-do_domctl(
-    XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl);
+/* Needs to be after asm/hypercall.h. */
+#include <xen/hypercall-defs.h>
 
 extern long
 arch_do_domctl(
     struct xen_domctl *domctl, struct domain *d,
     XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl);
 
-extern long cf_check
-do_sysctl(
-    XEN_GUEST_HANDLE_PARAM(xen_sysctl_t) u_sysctl);
-
 extern long
 arch_do_sysctl(
     struct xen_sysctl *sysctl,
     XEN_GUEST_HANDLE_PARAM(xen_sysctl_t) u_sysctl);
 
-extern long cf_check
-do_platform_op(
-    XEN_GUEST_HANDLE_PARAM(xen_platform_op_t) u_xenpf_op);
-
 extern long
 pci_physdev_op(
     int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
@@ -65,170 +51,11 @@ pci_physdev_op(
 #define MEMOP_EXTENT_SHIFT 6 /* cmd[:6] == start_extent */
 #define MEMOP_CMD_MASK     ((1 << MEMOP_EXTENT_SHIFT) - 1)
 
-extern long cf_check
-do_memory_op(
-    unsigned long cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern long cf_check
-do_multicall(
-    XEN_GUEST_HANDLE_PARAM(multicall_entry_t) call_list,
-    unsigned int nr_calls);
-
-extern long cf_check
-do_set_timer_op(
-    s_time_t timeout);
-
-extern long cf_check
-do_event_channel_op(
-    int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern long cf_check
-do_xen_version(
-    int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern long cf_check
-do_console_io(
-    unsigned int cmd,
-    unsigned int count,
-    XEN_GUEST_HANDLE_PARAM(char) buffer);
-
-extern long cf_check
-do_grant_table_op(
-    unsigned int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) uop,
-    unsigned int count);
-
-extern long cf_check
-do_vm_assist(
-    unsigned int cmd,
-    unsigned int type);
-
-extern long cf_check
-do_vcpu_op(
-    int cmd,
-    unsigned int vcpuid,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-struct vcpu;
 extern long
 common_vcpu_op(int cmd,
     struct vcpu *v,
     XEN_GUEST_HANDLE_PARAM(void) arg);
 
-extern long cf_check
-do_hvm_op(
-    unsigned long op,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern long cf_check
-do_kexec_op(
-    unsigned int op,
-    XEN_GUEST_HANDLE_PARAM(void) uarg);
-
-extern long cf_check
-do_xsm_op(
-    XEN_GUEST_HANDLE_PARAM(void) u_xsm_op);
-
-#ifdef CONFIG_ARGO
-extern long cf_check do_argo_op(
-    unsigned int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg1,
-    XEN_GUEST_HANDLE_PARAM(void) arg2,
-    unsigned long arg3,
-    unsigned long arg4);
-#endif
-
-extern long cf_check
-do_xenoprof_op(int op, XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern long cf_check
-do_dm_op(
-    domid_t domid,
-    unsigned int nr_bufs,
-    XEN_GUEST_HANDLE_PARAM(xen_dm_op_buf_t) bufs);
-
-#ifdef CONFIG_HYPFS
-extern long cf_check
-do_hypfs_op(
-    unsigned int cmd,
-    XEN_GUEST_HANDLE_PARAM(const_char) arg1,
-    unsigned long arg2,
-    XEN_GUEST_HANDLE_PARAM(void) arg3,
-    unsigned long arg4);
-#endif
-
-#ifdef CONFIG_COMPAT
-
-extern int cf_check
-compat_memory_op(
-    unsigned int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern int cf_check
-compat_grant_table_op(
-    unsigned int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) uop,
-    unsigned int count);
-
-extern int cf_check
-compat_vcpu_op(
-    int cmd,
-    unsigned int vcpuid,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern int cf_check
-compat_xenoprof_op(int op, XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern int cf_check
-compat_xen_version(
-    int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern int cf_check
-compat_sched_op(
-    int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
-extern int cf_check
-compat_set_timer_op(
-    uint32_t lo,
-    int32_t hi);
-
-extern int cf_check compat_xsm_op(
-    XEN_GUEST_HANDLE_PARAM(void) op);
-
-extern int cf_check compat_kexec_op(
-    unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg);
-
-DEFINE_XEN_GUEST_HANDLE(multicall_entry_compat_t);
-extern int cf_check compat_multicall(
-    XEN_GUEST_HANDLE_PARAM(multicall_entry_compat_t) call_list,
-    uint32_t nr_calls);
-
-int compat_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
-
-DEFINE_XEN_GUEST_HANDLE(compat_platform_op_t);
-int compat_platform_op(XEN_GUEST_HANDLE_PARAM(compat_platform_op_t) u_xenpf_op);
-
-#ifdef CONFIG_ARGO
-extern int cf_check compat_argo_op(
-    unsigned int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg1,
-    XEN_GUEST_HANDLE_PARAM(void) arg2,
-    unsigned long arg3,
-    unsigned long arg4);
-#endif
-
-extern int cf_check
-compat_dm_op(
-    domid_t domid,
-    unsigned int nr_bufs,
-    XEN_GUEST_HANDLE_PARAM(void) bufs);
-
-#endif
-
 void arch_get_xen_caps(xen_capabilities_info_t *info);
 
 #endif /* __XEN_HYPERCALL_H__ */
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 14:01:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 14:01:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294328.500414 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO27-0008KZ-5B; Thu, 24 Mar 2022 14:01:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294328.500414; Thu, 24 Mar 2022 14:01:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO27-0008KA-0D; Thu, 24 Mar 2022 14:01:47 +0000
Received: by outflank-mailman (input) for mailman id 294328;
 Thu, 24 Mar 2022 14:01:45 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+IHq=UD=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXO25-0008Hw-C4
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 14:01:45 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f00d5a31-ab7a-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 15:01:44 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 3DA3A1F7AD;
 Thu, 24 Mar 2022 14:01:44 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 04EF312FF7;
 Thu, 24 Mar 2022 14:01:44 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id MDMLAMh5PGKeegAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 24 Mar 2022 14:01:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f00d5a31-ab7a-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648130504; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=zTWmJvIc9NdObJScbaBplyHq/3+HJV+H3AEMYItF4vU=;
	b=RPd183JS0oeA5xxCF7RTwGoKeWQlKOBlwNPZc3vtnL/fixduzfmW1n2SOFrkxY3Zx2560/
	CwJ+9F44zz7yVjqHEYEJXiIpJqlOyf6krwYlRM0aOcH/dwMU9tylLBRMoR2iVQIR0zRDFs
	fDKIax5+Yu3wBYlNRT0sr+rdqReKapU=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>,
	George Dunlap <george.dunlap@citrix.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>
Subject: [PATCH v6 4/9] xen: include compat/platform.h from hypercall.h
Date: Thu, 24 Mar 2022 15:01:34 +0100
Message-Id: <20220324140139.5899-5-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220324140139.5899-1-jgross@suse.com>
References: <20220324140139.5899-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

The definition of compat_platform_op_t is in compat/platform.h
already, so include that file from hypercall.h instead of repeating
the typedef.

This allows to remove the related include statement from
arch/x86/x86_64/platform_hypercall.c.

Signed-off-by: Juergen Gross <jgross@suse.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
---
V3:
- new patch
---
 xen/arch/x86/x86_64/platform_hypercall.c | 1 -
 xen/include/xen/hypercall.h              | 4 +++-
 2 files changed, 3 insertions(+), 2 deletions(-)

diff --git a/xen/arch/x86/x86_64/platform_hypercall.c b/xen/arch/x86/x86_64/platform_hypercall.c
index 966fd27b5f..5bf6b958d2 100644
--- a/xen/arch/x86/x86_64/platform_hypercall.c
+++ b/xen/arch/x86/x86_64/platform_hypercall.c
@@ -5,7 +5,6 @@
 EMIT_FILE;
 
 #include <xen/lib.h>
-#include <compat/platform.h>
 #include <xen/hypercall.h>
 
 #define xen_platform_op     compat_platform_op
diff --git a/xen/include/xen/hypercall.h b/xen/include/xen/hypercall.h
index a032ba2b4a..ca8ee22717 100644
--- a/xen/include/xen/hypercall.h
+++ b/xen/include/xen/hypercall.h
@@ -15,6 +15,9 @@
 #include <public/version.h>
 #include <public/pmu.h>
 #include <public/hvm/dm_op.h>
+#ifdef CONFIG_COMPAT
+#include <compat/platform.h>
+#endif
 #include <asm/hypercall.h>
 #include <xsm/xsm.h>
 
@@ -206,7 +209,6 @@ extern int cf_check compat_multicall(
 
 int compat_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
 
-typedef struct compat_platform_op compat_platform_op_t;
 DEFINE_XEN_GUEST_HANDLE(compat_platform_op_t);
 int compat_platform_op(XEN_GUEST_HANDLE_PARAM(compat_platform_op_t) u_xenpf_op);
 
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 14:01:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 14:01:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294330.500430 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO28-0000Dd-Be; Thu, 24 Mar 2022 14:01:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294330.500430; Thu, 24 Mar 2022 14:01:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO27-00008l-T0; Thu, 24 Mar 2022 14:01:47 +0000
Received: by outflank-mailman (input) for mailman id 294330;
 Thu, 24 Mar 2022 14:01:46 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+IHq=UD=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXO26-0008Hw-5J
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 14:01:46 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id efb09f1b-ab7a-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 15:01:43 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id A41EC1F745;
 Thu, 24 Mar 2022 14:01:43 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 6086F12FF7;
 Thu, 24 Mar 2022 14:01:43 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id UL13Fsd5PGKeegAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 24 Mar 2022 14:01:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: efb09f1b-ab7a-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648130503; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=xvpK/0+2tYtgrOAN6QHgFKN9+U7F5/xNPDiOytJHinA=;
	b=VqU0ptBnG0JQOuH/xCzd56gGYTHppduorQ2aSNLN9qkex2dDpVXp/naRRvFtM7AzUUVzfC
	b1eqX4oPcRZc1KPurUmJVH0w4EbHt9dcruxT3SqS+M91tawtkdsugM+bsQ6mu0bezNj9D2
	glgLAflgHIXwZaxt6NtF9yU2l3jqqlk=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>,
	George Dunlap <george.dunlap@citrix.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Christopher Clark <christopher.w.clark@gmail.com>
Subject: [PATCH v6 2/9] xen: harmonize return types of hypercall handlers
Date: Thu, 24 Mar 2022 15:01:32 +0100
Message-Id: <20220324140139.5899-3-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220324140139.5899-1-jgross@suse.com>
References: <20220324140139.5899-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Today most hypercall handlers have a return type of long, while the
compat ones return an int. There are a few exceptions from that rule,
however.

Get rid of the exceptions by letting compat handlers always return int
and others always return long, with the exception of the Arm specific
physdev_op handler.

For the compat hvm case use eax instead of rax for the stored result as
it should have been from the beginning.

Additionally move some prototypes to include/asm-x86/hypercall.h
as they are x86 specific. Move the compat_platform_op() prototype to
the common header.

Rename paging_domctl_continuation() to do_paging_domctl_cont() and add
a matching define for the associated hypercall.

Make do_callback_op() and compat_callback_op() more similar by adding
the const attribute to compat_callback_op()'s 2nd parameter.

Change the type of the cmd parameter for [do|compat]_kexec_op() to
unsigned int, as this is more appropriate for the compat case.

Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
---
V2:
- rework platform_op compat handling (Jan Beulich)
V3:
- remove include of types.h (Jan Beulich)
V4:
- don't move do_physdev_op() (Julien Grall)
- carve out non style compliant parameter replacements (Julien Grall)
V6:
- remove rebase artifact (Jan Beulich)
---
 xen/arch/x86/domctl.c                |  4 ++--
 xen/arch/x86/hvm/hypercall.c         |  8 ++-----
 xen/arch/x86/hypercall.c             |  2 +-
 xen/arch/x86/include/asm/hypercall.h | 31 ++++++++++++++--------------
 xen/arch/x86/include/asm/paging.h    |  3 ---
 xen/arch/x86/mm/paging.c             |  3 ++-
 xen/arch/x86/pv/callback.c           | 14 ++++++-------
 xen/arch/x86/pv/emul-priv-op.c       |  2 +-
 xen/arch/x86/pv/hypercall.c          |  5 +----
 xen/arch/x86/pv/iret.c               |  4 ++--
 xen/arch/x86/pv/misc-hypercalls.c    | 14 ++++++++-----
 xen/common/argo.c                    |  6 +++---
 xen/common/kexec.c                   |  6 +++---
 xen/include/xen/hypercall.h          | 20 ++++++++----------
 14 files changed, 58 insertions(+), 64 deletions(-)

diff --git a/xen/arch/x86/domctl.c b/xen/arch/x86/domctl.c
index e49f9e91b9..ea7d60ffb6 100644
--- a/xen/arch/x86/domctl.c
+++ b/xen/arch/x86/domctl.c
@@ -221,8 +221,8 @@ long arch_do_domctl(
     case XEN_DOMCTL_shadow_op:
         ret = paging_domctl(d, &domctl->u.shadow_op, u_domctl, 0);
         if ( ret == -ERESTART )
-            return hypercall_create_continuation(__HYPERVISOR_arch_1,
-                                                 "h", u_domctl);
+            return hypercall_create_continuation(
+                       __HYPERVISOR_paging_domctl_cont, "h", u_domctl);
         copyback = true;
         break;
 
diff --git a/xen/arch/x86/hvm/hypercall.c b/xen/arch/x86/hvm/hypercall.c
index 62b5349e7d..3a35543997 100644
--- a/xen/arch/x86/hvm/hypercall.c
+++ b/xen/arch/x86/hvm/hypercall.c
@@ -124,8 +124,6 @@ static long cf_check hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
     [ __HYPERVISOR_ ## x ] = { (hypercall_fn_t *) do_ ## x,  \
                                (hypercall_fn_t *) compat_ ## x }
 
-#define do_arch_1             paging_domctl_continuation
-
 static const struct {
     hypercall_fn_t *native, *compat;
 } hvm_hypercall_table[] = {
@@ -158,11 +156,9 @@ static const struct {
 #ifdef CONFIG_HYPFS
     HYPERCALL(hypfs_op),
 #endif
-    HYPERCALL(arch_1)
+    HYPERCALL(paging_domctl_cont)
 };
 
-#undef do_arch_1
-
 #undef HYPERCALL
 #undef HVM_CALL
 #undef COMPAT_CALL
@@ -300,7 +296,7 @@ int hvm_hypercall(struct cpu_user_regs *regs)
 #endif
 
         curr->hcall_compat = true;
-        regs->rax = hvm_hypercall_table[eax].compat(ebx, ecx, edx, esi, edi);
+        regs->eax = hvm_hypercall_table[eax].compat(ebx, ecx, edx, esi, edi);
         curr->hcall_compat = false;
 
 #ifndef NDEBUG
diff --git a/xen/arch/x86/hypercall.c b/xen/arch/x86/hypercall.c
index 2370d31d3f..07e1a45ef5 100644
--- a/xen/arch/x86/hypercall.c
+++ b/xen/arch/x86/hypercall.c
@@ -75,7 +75,7 @@ const hypercall_args_t hypercall_args_table[NR_hypercalls] =
     ARGS(dm_op, 3),
     ARGS(hypfs_op, 5),
     ARGS(mca, 1),
-    ARGS(arch_1, 1),
+    ARGS(paging_domctl_cont, 1),
 };
 
 #undef COMP
diff --git a/xen/arch/x86/include/asm/hypercall.h b/xen/arch/x86/include/asm/hypercall.h
index d6daa7e4cb..49973820af 100644
--- a/xen/arch/x86/include/asm/hypercall.h
+++ b/xen/arch/x86/include/asm/hypercall.h
@@ -11,6 +11,8 @@
 #include <public/arch-x86/xen-mca.h> /* for do_mca */
 #include <asm/paging.h>
 
+#define __HYPERVISOR_paging_domctl_cont __HYPERVISOR_arch_1
+
 typedef unsigned long hypercall_fn_t(
     unsigned long, unsigned long, unsigned long,
     unsigned long, unsigned long);
@@ -80,7 +82,7 @@ do_set_debugreg(
     int reg,
     unsigned long value);
 
-extern unsigned long cf_check
+extern long cf_check
 do_get_debugreg(
     int reg);
 
@@ -118,7 +120,7 @@ do_mmuext_op(
 extern long cf_check do_callback_op(
     int cmd, XEN_GUEST_HANDLE_PARAM(const_void) arg);
 
-extern unsigned long cf_check
+extern long cf_check
 do_iret(
     void);
 
@@ -133,17 +135,20 @@ do_set_segment_base(
     unsigned int which,
     unsigned long base);
 
+long cf_check do_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
+
+long cf_check do_xenpmu_op(unsigned int op,
+                           XEN_GUEST_HANDLE_PARAM(xen_pmu_params_t) arg);
+
+long cf_check do_paging_domctl_cont(
+    XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl);
+
 #ifdef CONFIG_COMPAT
 
 #include <compat/arch-x86/xen.h>
 #include <compat/physdev.h>
 #include <compat/platform.h>
 
-extern int cf_check
-compat_physdev_op(
-    int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
 extern int
 compat_common_vcpu_op(
     int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg);
@@ -154,12 +159,8 @@ extern int cf_check compat_mmuext_op(
     XEN_GUEST_HANDLE_PARAM(uint) pdone,
     unsigned int foreigndom);
 
-DEFINE_XEN_GUEST_HANDLE(compat_platform_op_t);
-extern int cf_check compat_platform_op(
-    XEN_GUEST_HANDLE_PARAM(compat_platform_op_t) u_xenpf_op);
-
-extern long cf_check compat_callback_op(
-    int cmd, XEN_GUEST_HANDLE(void) arg);
+extern int cf_check compat_callback_op(
+    int cmd, XEN_GUEST_HANDLE(const_void) arg);
 
 extern int cf_check compat_update_va_mapping(
     unsigned int va, uint32_t lo, uint32_t hi, unsigned int flags);
@@ -177,12 +178,12 @@ extern int cf_check compat_set_gdt(
 extern int cf_check compat_update_descriptor(
     uint32_t pa_lo, uint32_t pa_hi, uint32_t desc_lo, uint32_t desc_hi);
 
-extern unsigned int cf_check compat_iret(void);
+extern int cf_check compat_iret(void);
 
 extern int cf_check compat_nmi_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
 
-extern long cf_check compat_set_callbacks(
+extern int cf_check compat_set_callbacks(
     unsigned long event_selector, unsigned long event_address,
     unsigned long failsafe_selector, unsigned long failsafe_address);
 
diff --git a/xen/arch/x86/include/asm/paging.h b/xen/arch/x86/include/asm/paging.h
index f0b4efc66e..54c440be65 100644
--- a/xen/arch/x86/include/asm/paging.h
+++ b/xen/arch/x86/include/asm/paging.h
@@ -234,9 +234,6 @@ int paging_domctl(struct domain *d, struct xen_domctl_shadow_op *sc,
                   XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl,
                   bool_t resuming);
 
-/* Helper hypercall for dealing with continuations. */
-long cf_check paging_domctl_continuation(XEN_GUEST_HANDLE_PARAM(xen_domctl_t));
-
 /* Call when destroying a vcpu/domain */
 void paging_vcpu_teardown(struct vcpu *v);
 int paging_teardown(struct domain *d);
diff --git a/xen/arch/x86/mm/paging.c b/xen/arch/x86/mm/paging.c
index 1f0b94ad21..a7e2707ecc 100644
--- a/xen/arch/x86/mm/paging.c
+++ b/xen/arch/x86/mm/paging.c
@@ -21,6 +21,7 @@
 
 #include <xen/init.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <asm/paging.h>
 #include <asm/shadow.h>
 #include <asm/p2m.h>
@@ -759,7 +760,7 @@ int paging_domctl(struct domain *d, struct xen_domctl_shadow_op *sc,
         return shadow_domctl(d, sc, u_domctl);
 }
 
-long cf_check paging_domctl_continuation(
+long cf_check do_paging_domctl_cont(
     XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl)
 {
     struct xen_domctl op;
diff --git a/xen/arch/x86/pv/callback.c b/xen/arch/x86/pv/callback.c
index 55148c7f9e..1be9d3f731 100644
--- a/xen/arch/x86/pv/callback.c
+++ b/xen/arch/x86/pv/callback.c
@@ -207,9 +207,9 @@ long cf_check do_set_callbacks(
 #include <compat/callback.h>
 #include <compat/nmi.h>
 
-static long compat_register_guest_callback(struct compat_callback_register *reg)
+static int compat_register_guest_callback(struct compat_callback_register *reg)
 {
-    long ret = 0;
+    int ret = 0;
     struct vcpu *curr = current;
 
     fixup_guest_code_selector(curr->domain, reg->address.cs);
@@ -256,10 +256,10 @@ static long compat_register_guest_callback(struct compat_callback_register *reg)
     return ret;
 }
 
-static long compat_unregister_guest_callback(
+static int compat_unregister_guest_callback(
     struct compat_callback_unregister *unreg)
 {
-    long ret;
+    int ret;
 
     switch ( unreg->type )
     {
@@ -283,9 +283,9 @@ static long compat_unregister_guest_callback(
     return ret;
 }
 
-long cf_check compat_callback_op(int cmd, XEN_GUEST_HANDLE(void) arg)
+int cf_check compat_callback_op(int cmd, XEN_GUEST_HANDLE(const_void) arg)
 {
-    long ret;
+    int ret;
 
     switch ( cmd )
     {
@@ -321,7 +321,7 @@ long cf_check compat_callback_op(int cmd, XEN_GUEST_HANDLE(void) arg)
     return ret;
 }
 
-long cf_check compat_set_callbacks(
+int cf_check compat_set_callbacks(
     unsigned long event_selector, unsigned long event_address,
     unsigned long failsafe_selector, unsigned long failsafe_address)
 {
diff --git a/xen/arch/x86/pv/emul-priv-op.c b/xen/arch/x86/pv/emul-priv-op.c
index 22b10dec2a..5da00e24e4 100644
--- a/xen/arch/x86/pv/emul-priv-op.c
+++ b/xen/arch/x86/pv/emul-priv-op.c
@@ -22,13 +22,13 @@
 #include <xen/domain_page.h>
 #include <xen/event.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/iocap.h>
 
 #include <asm/amd.h>
 #include <asm/debugreg.h>
 #include <asm/endbr.h>
 #include <asm/hpet.h>
-#include <asm/hypercall.h>
 #include <asm/mc146818rtc.h>
 #include <asm/pv/domain.h>
 #include <asm/pv/trace.h>
diff --git a/xen/arch/x86/pv/hypercall.c b/xen/arch/x86/pv/hypercall.c
index e8fbee7bbb..fe8dfe9e8f 100644
--- a/xen/arch/x86/pv/hypercall.c
+++ b/xen/arch/x86/pv/hypercall.c
@@ -47,8 +47,6 @@ typedef struct {
 #define COMPAT_CALL(x) HYPERCALL(x)
 #endif
 
-#define do_arch_1             paging_domctl_continuation
-
 static const pv_hypercall_table_t pv_hypercall_table[] = {
     COMPAT_CALL(set_trap_table),
     HYPERCALL(mmu_update),
@@ -109,11 +107,10 @@ static const pv_hypercall_table_t pv_hypercall_table[] = {
 #endif
     HYPERCALL(mca),
 #ifndef CONFIG_PV_SHIM_EXCLUSIVE
-    HYPERCALL(arch_1),
+    HYPERCALL(paging_domctl_cont),
 #endif
 };
 
-#undef do_arch_1
 #undef COMPAT_CALL
 #undef HYPERCALL
 
diff --git a/xen/arch/x86/pv/iret.c b/xen/arch/x86/pv/iret.c
index dd2965d8f0..55eb6a63bd 100644
--- a/xen/arch/x86/pv/iret.c
+++ b/xen/arch/x86/pv/iret.c
@@ -48,7 +48,7 @@ static void async_exception_cleanup(struct vcpu *curr)
         curr->arch.async_exception_state(trap).old_mask;
 }
 
-unsigned long cf_check do_iret(void)
+long cf_check do_iret(void)
 {
     struct cpu_user_regs *regs = guest_cpu_user_regs();
     struct iret_context iret_saved;
@@ -105,7 +105,7 @@ unsigned long cf_check do_iret(void)
 }
 
 #ifdef CONFIG_PV32
-unsigned int cf_check compat_iret(void)
+int cf_check compat_iret(void)
 {
     struct cpu_user_regs *regs = guest_cpu_user_regs();
     struct vcpu *v = current;
diff --git a/xen/arch/x86/pv/misc-hypercalls.c b/xen/arch/x86/pv/misc-hypercalls.c
index 5649aaab44..635f5a644a 100644
--- a/xen/arch/x86/pv/misc-hypercalls.c
+++ b/xen/arch/x86/pv/misc-hypercalls.c
@@ -28,12 +28,16 @@ long cf_check do_set_debugreg(int reg, unsigned long value)
     return set_debugreg(current, reg, value);
 }
 
-unsigned long cf_check do_get_debugreg(int reg)
+long cf_check do_get_debugreg(int reg)
 {
-    unsigned long val;
-    int res = x86emul_read_dr(reg, &val, NULL);
-
-    return res == X86EMUL_OKAY ? val : -ENODEV;
+    /* Avoid implementation defined behavior casting unsigned long to long. */
+    union {
+        unsigned long val;
+        long ret;
+    } u;
+    int res = x86emul_read_dr(reg, &u.val, NULL);
+
+    return res == X86EMUL_OKAY ? u.ret : -ENODEV;
 }
 
 long cf_check do_fpu_taskswitch(int set)
diff --git a/xen/common/argo.c b/xen/common/argo.c
index 297f6d11f0..26a01c2188 100644
--- a/xen/common/argo.c
+++ b/xen/common/argo.c
@@ -2207,13 +2207,13 @@ do_argo_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg1,
 }
 
 #ifdef CONFIG_COMPAT
-long cf_check
+int cf_check
 compat_argo_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg1,
                XEN_GUEST_HANDLE_PARAM(void) arg2, unsigned long arg3,
                unsigned long arg4)
 {
     struct domain *currd = current->domain;
-    long rc;
+    int rc;
     xen_argo_send_addr_t send_addr;
     xen_argo_iov_t iovs[XEN_ARGO_MAXIOV];
     compat_argo_iov_t compat_iovs[XEN_ARGO_MAXIOV];
@@ -2267,7 +2267,7 @@ compat_argo_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg1,
 
     rc = sendv(currd, &send_addr.src, &send_addr.dst, iovs, niov, arg4);
  out:
-    argo_dprintk("<-compat_argo_op(%u)=%ld\n", cmd, rc);
+    argo_dprintk("<-compat_argo_op(%u)=%d\n", cmd, rc);
 
     return rc;
 }
diff --git a/xen/common/kexec.c b/xen/common/kexec.c
index a2ffb6530c..41669964d2 100644
--- a/xen/common/kexec.c
+++ b/xen/common/kexec.c
@@ -1213,7 +1213,7 @@ static int kexec_status(XEN_GUEST_HANDLE_PARAM(void) uarg)
     return !!test_bit(bit, &kexec_flags);
 }
 
-static int do_kexec_op_internal(unsigned long op,
+static int do_kexec_op_internal(unsigned int op,
                                 XEN_GUEST_HANDLE_PARAM(void) uarg,
                                 bool_t compat)
 {
@@ -1265,13 +1265,13 @@ static int do_kexec_op_internal(unsigned long op,
     return ret;
 }
 
-long cf_check do_kexec_op(unsigned long op, XEN_GUEST_HANDLE_PARAM(void) uarg)
+long cf_check do_kexec_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg)
 {
     return do_kexec_op_internal(op, uarg, 0);
 }
 
 #ifdef CONFIG_COMPAT
-int cf_check compat_kexec_op(unsigned long op, XEN_GUEST_HANDLE_PARAM(void) uarg)
+int cf_check compat_kexec_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg)
 {
     return do_kexec_op_internal(op, uarg, 1);
 }
diff --git a/xen/include/xen/hypercall.h b/xen/include/xen/hypercall.h
index 81aae7a662..a032ba2b4a 100644
--- a/xen/include/xen/hypercall.h
+++ b/xen/include/xen/hypercall.h
@@ -114,11 +114,6 @@ common_vcpu_op(int cmd,
     struct vcpu *v,
     XEN_GUEST_HANDLE_PARAM(void) arg);
 
-extern long cf_check
-do_nmi_op(
-    unsigned int cmd,
-    XEN_GUEST_HANDLE_PARAM(void) arg);
-
 extern long cf_check
 do_hvm_op(
     unsigned long op,
@@ -126,7 +121,7 @@ do_hvm_op(
 
 extern long cf_check
 do_kexec_op(
-    unsigned long op,
+    unsigned int op,
     XEN_GUEST_HANDLE_PARAM(void) uarg);
 
 extern long cf_check
@@ -145,9 +140,6 @@ extern long cf_check do_argo_op(
 extern long cf_check
 do_xenoprof_op(int op, XEN_GUEST_HANDLE_PARAM(void) arg);
 
-extern long cf_check
-do_xenpmu_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(xen_pmu_params_t) arg);
-
 extern long cf_check
 do_dm_op(
     domid_t domid,
@@ -205,15 +197,21 @@ extern int cf_check compat_xsm_op(
     XEN_GUEST_HANDLE_PARAM(void) op);
 
 extern int cf_check compat_kexec_op(
-    unsigned long op, XEN_GUEST_HANDLE_PARAM(void) uarg);
+    unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg);
 
 DEFINE_XEN_GUEST_HANDLE(multicall_entry_compat_t);
 extern int cf_check compat_multicall(
     XEN_GUEST_HANDLE_PARAM(multicall_entry_compat_t) call_list,
     uint32_t nr_calls);
 
+int compat_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
+
+typedef struct compat_platform_op compat_platform_op_t;
+DEFINE_XEN_GUEST_HANDLE(compat_platform_op_t);
+int compat_platform_op(XEN_GUEST_HANDLE_PARAM(compat_platform_op_t) u_xenpf_op);
+
 #ifdef CONFIG_ARGO
-extern long cf_check compat_argo_op(
+extern int cf_check compat_argo_op(
     unsigned int cmd,
     XEN_GUEST_HANDLE_PARAM(void) arg1,
     XEN_GUEST_HANDLE_PARAM(void) arg2,
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 14:01:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 14:01:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294331.500437 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO28-0000JQ-L7; Thu, 24 Mar 2022 14:01:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294331.500437; Thu, 24 Mar 2022 14:01:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO28-0000HP-9N; Thu, 24 Mar 2022 14:01:48 +0000
Received: by outflank-mailman (input) for mailman id 294331;
 Thu, 24 Mar 2022 14:01:46 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+IHq=UD=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXO26-0008Hr-Iq
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 14:01:46 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id eff0a275-ab7a-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 15:01:44 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id F2EBA1F7AB;
 Thu, 24 Mar 2022 14:01:43 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id AA1F112FF7;
 Thu, 24 Mar 2022 14:01:43 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id aHNqKMd5PGKeegAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 24 Mar 2022 14:01:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: eff0a275-ab7a-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648130504; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=5mtqAMNr8OnZCIluhdmu2mn+mdvj3eFi+QDrjZGUlAY=;
	b=QeDU4PhiWD2H7srar5oXoO7DtBi9L9zig5uICtfJwR2FNy92gUb5q/mZzWgE829p8yfI5W
	9auEXWBwdApk7B8fN/qBe7VwzJM8w31HSvx16Rz/2DX9eT8sSZgraIxOKAaAYhHl/FsX2a
	Te/HXth6biT7S9eQCqrpcqVWmd5t1gQ=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Julien Grall <jgrall@amazon.com>
Subject: [PATCH v6 3/9] xen: don't include asm/hypercall.h from C sources
Date: Thu, 24 Mar 2022 15:01:33 +0100
Message-Id: <20220324140139.5899-4-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220324140139.5899-1-jgross@suse.com>
References: <20220324140139.5899-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Instead of including asm/hypercall.h always use xen/hypercall.h.
Additionally include xen/hypercall.h from all sources containing a
hypercall handler.

This prepares for generating the handlers' prototypes at build time.

Add a guard in asm/hypercall.h to catch direct inclusion.

Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Julien Grall <jgrall@amazon.com> # arm
---
V2:
- remove platform_op hunk (Jan Beulich)
- remove including of xen/hypervisor.h from arch/x86/x86_64/mm.c
  (Jan Beulich)
- fix include order in common/compat/grant_table.c (Jan Beulich)
---
 xen/arch/arm/hvm.c                   | 3 +--
 xen/arch/arm/include/asm/hypercall.h | 4 ++++
 xen/arch/arm/platform_hypercall.c    | 1 +
 xen/arch/x86/cpu/vpmu.c              | 1 +
 xen/arch/x86/include/asm/hypercall.h | 4 ++++
 xen/arch/x86/mm.c                    | 1 -
 xen/arch/x86/platform_hypercall.c    | 1 +
 xen/arch/x86/pv/iret.c               | 1 +
 xen/arch/x86/traps.c                 | 2 +-
 xen/arch/x86/x86_64/compat/mm.c      | 1 +
 xen/arch/x86/x86_64/mm.c             | 2 --
 xen/common/compat/grant_table.c      | 1 +
 xen/common/event_channel.c           | 1 +
 xen/common/grant_table.c             | 1 +
 xen/common/multicall.c               | 1 +
 15 files changed, 19 insertions(+), 6 deletions(-)

diff --git a/xen/arch/arm/hvm.c b/xen/arch/arm/hvm.c
index 8951b34086..fc1a52767d 100644
--- a/xen/arch/arm/hvm.c
+++ b/xen/arch/arm/hvm.c
@@ -20,6 +20,7 @@
 #include <xen/lib.h>
 #include <xen/errno.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/sched.h>
 #include <xen/monitor.h>
 
@@ -29,8 +30,6 @@
 #include <public/hvm/params.h>
 #include <public/hvm/hvm_op.h>
 
-#include <asm/hypercall.h>
-
 static int hvm_allow_set_param(const struct domain *d, unsigned int param)
 {
     switch ( param )
diff --git a/xen/arch/arm/include/asm/hypercall.h b/xen/arch/arm/include/asm/hypercall.h
index fac4d60f17..8182895358 100644
--- a/xen/arch/arm/include/asm/hypercall.h
+++ b/xen/arch/arm/include/asm/hypercall.h
@@ -1,3 +1,7 @@
+#ifndef __XEN_HYPERCALL_H__
+#error "asm/hypercall.h should not be included directly - include xen/hypercall.h instead"
+#endif
+
 #ifndef __ASM_ARM_HYPERCALL_H__
 #define __ASM_ARM_HYPERCALL_H__
 
diff --git a/xen/arch/arm/platform_hypercall.c b/xen/arch/arm/platform_hypercall.c
index 8efac7ee60..403cc84324 100644
--- a/xen/arch/arm/platform_hypercall.c
+++ b/xen/arch/arm/platform_hypercall.c
@@ -9,6 +9,7 @@
 #include <xen/types.h>
 #include <xen/sched.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/spinlock.h>
 #include <public/platform.h>
 #include <xsm/xsm.h>
diff --git a/xen/arch/x86/cpu/vpmu.c b/xen/arch/x86/cpu/vpmu.c
index 4fedc7c570..51d171615f 100644
--- a/xen/arch/x86/cpu/vpmu.c
+++ b/xen/arch/x86/cpu/vpmu.c
@@ -22,6 +22,7 @@
 #include <xen/param.h>
 #include <xen/event.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/sched.h>
 #include <asm/regs.h>
 #include <asm/types.h>
diff --git a/xen/arch/x86/include/asm/hypercall.h b/xen/arch/x86/include/asm/hypercall.h
index 49973820af..81ca25f7b3 100644
--- a/xen/arch/x86/include/asm/hypercall.h
+++ b/xen/arch/x86/include/asm/hypercall.h
@@ -2,6 +2,10 @@
  * asm-x86/hypercall.h
  */
 
+#ifndef __XEN_HYPERCALL_H__
+#error "asm/hypercall.h should not be included directly - include xen/hypercall.h instead"
+#endif
+
 #ifndef __ASM_X86_HYPERCALL_H__
 #define __ASM_X86_HYPERCALL_H__
 
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index 2befd0c191..6cc73187ac 100644
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86/mm.c
@@ -129,7 +129,6 @@
 #include <asm/ldt.h>
 #include <asm/x86_emulate.h>
 #include <asm/e820.h>
-#include <asm/hypercall.h>
 #include <asm/shared.h>
 #include <asm/mem_sharing.h>
 #include <public/memory.h>
diff --git a/xen/arch/x86/platform_hypercall.c b/xen/arch/x86/platform_hypercall.c
index b91ccff589..eeb4f7a20e 100644
--- a/xen/arch/x86/platform_hypercall.c
+++ b/xen/arch/x86/platform_hypercall.c
@@ -17,6 +17,7 @@
 #include <xen/console.h>
 #include <xen/iocap.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/acpi.h>
 #include <xen/efi.h>
 #include <xen/cpu.h>
diff --git a/xen/arch/x86/pv/iret.c b/xen/arch/x86/pv/iret.c
index 55eb6a63bd..58de9f7922 100644
--- a/xen/arch/x86/pv/iret.c
+++ b/xen/arch/x86/pv/iret.c
@@ -18,6 +18,7 @@
  */
 
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/lib.h>
 #include <xen/sched.h>
 
diff --git a/xen/arch/x86/traps.c b/xen/arch/x86/traps.c
index 8659547970..4c38f6c015 100644
--- a/xen/arch/x86/traps.c
+++ b/xen/arch/x86/traps.c
@@ -29,6 +29,7 @@
 #include <xen/lib.h>
 #include <xen/err.h>
 #include <xen/errno.h>
+#include <xen/hypercall.h>
 #include <xen/mm.h>
 #include <xen/param.h>
 #include <xen/console.h>
@@ -70,7 +71,6 @@
 #include <asm/x86_emulate.h>
 #include <asm/traps.h>
 #include <asm/hvm/vpt.h>
-#include <asm/hypercall.h>
 #include <asm/mce.h>
 #include <asm/apic.h>
 #include <asm/mc146818rtc.h>
diff --git a/xen/arch/x86/x86_64/compat/mm.c b/xen/arch/x86/x86_64/compat/mm.c
index b3da8fafbb..70b08a832a 100644
--- a/xen/arch/x86/x86_64/compat/mm.c
+++ b/xen/arch/x86/x86_64/compat/mm.c
@@ -1,4 +1,5 @@
 #include <xen/event.h>
+#include <xen/hypercall.h>
 #include <xen/mem_access.h>
 #include <xen/multicall.h>
 #include <compat/memory.h>
diff --git a/xen/arch/x86/x86_64/mm.c b/xen/arch/x86/x86_64/mm.c
index 4f225da81e..3510a5affe 100644
--- a/xen/arch/x86/x86_64/mm.c
+++ b/xen/arch/x86/x86_64/mm.c
@@ -25,14 +25,12 @@ EMIT_FILE;
 #include <xen/numa.h>
 #include <xen/nodemask.h>
 #include <xen/guest_access.h>
-#include <xen/hypercall.h>
 #include <xen/mem_access.h>
 #include <asm/current.h>
 #include <asm/asm_defns.h>
 #include <asm/page.h>
 #include <asm/flushtlb.h>
 #include <asm/fixmap.h>
-#include <asm/hypercall.h>
 #include <asm/msr.h>
 #include <asm/pv/domain.h>
 #include <asm/setup.h>
diff --git a/xen/common/compat/grant_table.c b/xen/common/compat/grant_table.c
index c6199e8918..d5787e3719 100644
--- a/xen/common/compat/grant_table.c
+++ b/xen/common/compat/grant_table.c
@@ -3,6 +3,7 @@
  *
  */
 
+#include <xen/hypercall.h>
 #include <compat/grant_table.h>
 
 #define xen_grant_entry_v1 grant_entry_v1
diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c
index ffb042a241..0a82eb3ac2 100644
--- a/xen/common/event_channel.c
+++ b/xen/common/event_channel.c
@@ -24,6 +24,7 @@
 #include <xen/iocap.h>
 #include <xen/compat.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/keyhandler.h>
 #include <asm/current.h>
 
diff --git a/xen/common/grant_table.c b/xen/common/grant_table.c
index 1e0762b064..febbe12eab 100644
--- a/xen/common/grant_table.c
+++ b/xen/common/grant_table.c
@@ -33,6 +33,7 @@
 #include <xen/trace.h>
 #include <xen/grant_table.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/domain_page.h>
 #include <xen/iommu.h>
 #include <xen/paging.h>
diff --git a/xen/common/multicall.c b/xen/common/multicall.c
index e48f46dbe0..9db49092b4 100644
--- a/xen/common/multicall.c
+++ b/xen/common/multicall.c
@@ -9,6 +9,7 @@
 #include <xen/event.h>
 #include <xen/multicall.h>
 #include <xen/guest_access.h>
+#include <xen/hypercall.h>
 #include <xen/perfc.h>
 #include <xen/trace.h>
 #include <asm/current.h>
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 14:01:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 14:01:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294329.500422 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO27-0008PI-Kq; Thu, 24 Mar 2022 14:01:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294329.500422; Thu, 24 Mar 2022 14:01:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO27-0008Ns-8T; Thu, 24 Mar 2022 14:01:47 +0000
Received: by outflank-mailman (input) for mailman id 294329;
 Thu, 24 Mar 2022 14:01:45 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+IHq=UD=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXO25-0008Hr-IX
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 14:01:45 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ef975ca7-ab7a-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 15:01:43 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 58A422129B;
 Thu, 24 Mar 2022 14:01:43 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 0DEAF13B2F;
 Thu, 24 Mar 2022 14:01:43 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id 0IxGAsd5PGKeegAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 24 Mar 2022 14:01:43 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ef975ca7-ab7a-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648130503; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=spmhNqd3EISKD0rxYFhHwLe2HksoGzLziDkQw9Igros=;
	b=jqd+1y/SRwWDM1FoBzK70m1D9fPomdFVgimmuDjLk9DdsM/cMrGVc3u62O95S6Rxwpj4kF
	u/T99nO+lj20S1gSNYYKxzlEHGlxbNGPZfnOQHNMq9tpaJ2wIS8/+Txx3TSSgF7gwMCKVI
	fOEr+bY5iUdIfsLHFaGR3S7zqUMqnic=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Julien Grall <jgrall@amazon.com>
Subject: [PATCH v6 1/9] xen: move do_vcpu_op() to arch specific code
Date: Thu, 24 Mar 2022 15:01:31 +0100
Message-Id: <20220324140139.5899-2-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220324140139.5899-1-jgross@suse.com>
References: <20220324140139.5899-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

The entry point used for the vcpu_op hypercall on Arm is different
from the one on x86 today, as some of the common sub-ops are not
supported on Arm. The Arm specific handler filters out the not
supported sub-ops and then calls the common handler. This leads to the
weird call hierarchy:

  do_arm_vcpu_op()
    do_vcpu_op()
      arch_do_vcpu_op()

Clean this up by renaming do_vcpu_op() to common_vcpu_op() and
arch_do_vcpu_op() in each architecture to do_vcpu_op(). This way one
of above calls can be avoided without restricting any potential
future use of common sub-ops for Arm.

Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Julien Grall <jgrall@amazon.com>
---
V4:
- don't remove HYPERCALL_ARM()
V4.1:
- add missing cf_check (Andrew Cooper)
V5:
- use v instead of current (Julien Grall)
---
 xen/arch/arm/domain.c                | 15 ++++++++-------
 xen/arch/arm/include/asm/hypercall.h |  2 --
 xen/arch/arm/traps.c                 |  2 +-
 xen/arch/x86/domain.c                | 12 ++++++++----
 xen/arch/x86/include/asm/hypercall.h |  2 +-
 xen/arch/x86/x86_64/domain.c         | 18 +++++++++++++-----
 xen/common/compat/domain.c           | 15 ++++++---------
 xen/common/domain.c                  | 12 ++++--------
 xen/include/xen/hypercall.h          |  2 +-
 9 files changed, 42 insertions(+), 38 deletions(-)

diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
index 8110c1df86..2f8eaab7b5 100644
--- a/xen/arch/arm/domain.c
+++ b/xen/arch/arm/domain.c
@@ -1079,23 +1079,24 @@ void arch_dump_domain_info(struct domain *d)
 }
 
 
-long do_arm_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
+long do_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
+    struct domain *d = current->domain;
+    struct vcpu *v;
+
+    if ( (v = domain_vcpu(d, vcpuid)) == NULL )
+        return -ENOENT;
+
     switch ( cmd )
     {
         case VCPUOP_register_vcpu_info:
         case VCPUOP_register_runstate_memory_area:
-            return do_vcpu_op(cmd, vcpuid, arg);
+            return common_vcpu_op(cmd, v, arg);
         default:
             return -EINVAL;
     }
 }
 
-long arch_do_vcpu_op(int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
-{
-    return -ENOSYS;
-}
-
 void arch_dump_vcpu_info(struct vcpu *v)
 {
     gic_dump_info(v);
diff --git a/xen/arch/arm/include/asm/hypercall.h b/xen/arch/arm/include/asm/hypercall.h
index 39d2e7889d..fac4d60f17 100644
--- a/xen/arch/arm/include/asm/hypercall.h
+++ b/xen/arch/arm/include/asm/hypercall.h
@@ -4,8 +4,6 @@
 #include <public/domctl.h> /* for arch_do_domctl */
 int do_arm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg);
 
-long do_arm_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg);
-
 long subarch_do_domctl(struct xen_domctl *domctl, struct domain *d,
                        XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl);
 
diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
index 43f30747cf..e906bb4a89 100644
--- a/xen/arch/arm/traps.c
+++ b/xen/arch/arm/traps.c
@@ -1380,7 +1380,7 @@ static arm_hypercall_t arm_hypercall_table[] = {
 #endif
     HYPERCALL(multicall, 2),
     HYPERCALL(platform_op, 1),
-    HYPERCALL_ARM(vcpu_op, 3),
+    HYPERCALL(vcpu_op, 3),
     HYPERCALL(vm_assist, 2),
 #ifdef CONFIG_ARGO
     HYPERCALL(argo_op, 5),
diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c
index a5048ed654..d566fc82b4 100644
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -1489,11 +1489,15 @@ int arch_vcpu_reset(struct vcpu *v)
     return 0;
 }
 
-long
-arch_do_vcpu_op(
-    int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
+long cf_check do_vcpu_op(int cmd, unsigned int vcpuid,
+                         XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     long rc = 0;
+    struct domain *d = current->domain;
+    struct vcpu *v;
+
+    if ( (v = domain_vcpu(d, vcpuid)) == NULL )
+        return -ENOENT;
 
     switch ( cmd )
     {
@@ -1545,7 +1549,7 @@ arch_do_vcpu_op(
     }
 
     default:
-        rc = -ENOSYS;
+        rc = common_vcpu_op(cmd, v, arg);
         break;
     }
 
diff --git a/xen/arch/x86/include/asm/hypercall.h b/xen/arch/x86/include/asm/hypercall.h
index 61bf897147..d6daa7e4cb 100644
--- a/xen/arch/x86/include/asm/hypercall.h
+++ b/xen/arch/x86/include/asm/hypercall.h
@@ -145,7 +145,7 @@ compat_physdev_op(
     XEN_GUEST_HANDLE_PARAM(void) arg);
 
 extern int
-arch_compat_vcpu_op(
+compat_common_vcpu_op(
     int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg);
 
 extern int cf_check compat_mmuext_op(
diff --git a/xen/arch/x86/x86_64/domain.c b/xen/arch/x86/x86_64/domain.c
index c46dccc25a..9c559aa3ea 100644
--- a/xen/arch/x86/x86_64/domain.c
+++ b/xen/arch/x86/x86_64/domain.c
@@ -12,11 +12,15 @@
 CHECK_vcpu_get_physid;
 #undef xen_vcpu_get_physid
 
-int
-arch_compat_vcpu_op(
-    int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
+int cf_check
+compat_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
-    int rc = -ENOSYS;
+    int rc;
+    struct domain *d = current->domain;
+    struct vcpu *v;
+
+    if ( (v = domain_vcpu(d, vcpuid)) == NULL )
+        return -ENOENT;
 
     switch ( cmd )
     {
@@ -55,7 +59,11 @@ arch_compat_vcpu_op(
     }
 
     case VCPUOP_get_physid:
-        rc = arch_do_vcpu_op(cmd, v, arg);
+        rc = do_vcpu_op(cmd, vcpuid, arg);
+        break;
+
+    default:
+        rc = compat_common_vcpu_op(cmd, v, arg);
         break;
     }
 
diff --git a/xen/common/compat/domain.c b/xen/common/compat/domain.c
index afae27eeba..1119534679 100644
--- a/xen/common/compat/domain.c
+++ b/xen/common/compat/domain.c
@@ -38,15 +38,12 @@ CHECK_vcpu_hvm_context;
 
 #endif
 
-int cf_check compat_vcpu_op(
-    int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
+int compat_common_vcpu_op(int cmd, struct vcpu *v,
+                          XEN_GUEST_HANDLE_PARAM(void) arg)
 {
-    struct domain *d = current->domain;
-    struct vcpu *v;
     int rc = 0;
-
-    if ( (v = domain_vcpu(d, vcpuid)) == NULL )
-        return -ENOENT;
+    struct domain *d = current->domain;
+    unsigned int vcpuid = v->vcpu_id;
 
     switch ( cmd )
     {
@@ -103,7 +100,7 @@ int cf_check compat_vcpu_op(
     case VCPUOP_stop_singleshot_timer:
     case VCPUOP_register_vcpu_info:
     case VCPUOP_send_nmi:
-        rc = do_vcpu_op(cmd, vcpuid, arg);
+        rc = common_vcpu_op(cmd, v, arg);
         break;
 
     case VCPUOP_get_runstate_info:
@@ -134,7 +131,7 @@ int cf_check compat_vcpu_op(
     }
 
     default:
-        rc = arch_compat_vcpu_op(cmd, v, arg);
+        rc = -ENOSYS;
         break;
     }
 
diff --git a/xen/common/domain.c b/xen/common/domain.c
index 351029f8b2..70747c02e6 100644
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -1570,15 +1570,11 @@ int default_initialise_vcpu(struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
     return rc;
 }
 
-long cf_check do_vcpu_op(
-    int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
+long common_vcpu_op(int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
-    struct domain *d = current->domain;
-    struct vcpu *v;
     long rc = 0;
-
-    if ( (v = domain_vcpu(d, vcpuid)) == NULL )
-        return -ENOENT;
+    struct domain *d = v->domain;
+    unsigned int vcpuid = v->vcpu_id;
 
     switch ( cmd )
     {
@@ -1750,7 +1746,7 @@ long cf_check do_vcpu_op(
     }
 
     default:
-        rc = arch_do_vcpu_op(cmd, v, arg);
+        rc = -ENOSYS;
         break;
     }
 
diff --git a/xen/include/xen/hypercall.h b/xen/include/xen/hypercall.h
index a1b6575976..81aae7a662 100644
--- a/xen/include/xen/hypercall.h
+++ b/xen/include/xen/hypercall.h
@@ -110,7 +110,7 @@ do_vcpu_op(
 
 struct vcpu;
 extern long
-arch_do_vcpu_op(int cmd,
+common_vcpu_op(int cmd,
     struct vcpu *v,
     XEN_GUEST_HANDLE_PARAM(void) arg);
 
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 14:01:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 14:01:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294333.500454 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO2A-0000hA-79; Thu, 24 Mar 2022 14:01:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294333.500454; Thu, 24 Mar 2022 14:01:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO29-0000eU-OW; Thu, 24 Mar 2022 14:01:49 +0000
Received: by outflank-mailman (input) for mailman id 294333;
 Thu, 24 Mar 2022 14:01:47 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+IHq=UD=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXO27-0008Hr-Iy
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 14:01:47 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f0b9dc12-ab7a-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 15:01:45 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 61B921F7AE;
 Thu, 24 Mar 2022 14:01:45 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 2A1D013B2F;
 Thu, 24 Mar 2022 14:01:45 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id QDoECcl5PGKeegAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 24 Mar 2022 14:01:45 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f0b9dc12-ab7a-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648130505; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=vOwyucqhO02iXYzENDU2+6ofz8QyJyQuet+mXWldfyU=;
	b=WhsYoUg9FoIZCd50MFSFBQBS70vpU5llDfFENWsNA1Ps+aJKs5x6vE4VL368hvzXeMT5HD
	LQROdFF9fymajXEselI48opR04mGqUvx7hLyVdhKs21p+9JeW1yqF9shG6C+hSDZgyKlVG
	mImulPL8ozmeUusoteUfZ5Lo/ckb0jM=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Julien Grall <jgrall@amazon.com>,
	Michal Orzel <michal.orzel@arm.com>
Subject: [PATCH v6 8/9] xen/arm: call hypercall handlers via generated macro
Date: Thu, 24 Mar 2022 15:01:38 +0100
Message-Id: <20220324140139.5899-9-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220324140139.5899-1-jgross@suse.com>
References: <20220324140139.5899-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Instead of using a function table use the generated macros for calling
the appropriate hypercall handlers.

This makes the calls of the handlers type safe.

For deprecated hypercalls define stub functions.

Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Julien Grall <jgrall@amazon.com>
Tested-by: Michal Orzel <michal.orzel@arm.com>
---
V2:
- make hypercall_args[] const (Jan Beulich)
V5:
- move out-of-bounds check (Julien Grall)
---
 xen/arch/arm/traps.c | 117 +++++++++----------------------------------
 1 file changed, 24 insertions(+), 93 deletions(-)

diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c
index e906bb4a89..e0fca3b4d8 100644
--- a/xen/arch/arm/traps.c
+++ b/xen/arch/arm/traps.c
@@ -1331,67 +1331,20 @@ static register_t do_deprecated_hypercall(void)
     return -ENOSYS;
 }
 
-typedef register_t (*arm_hypercall_fn_t)(
-    register_t, register_t, register_t, register_t, register_t);
-
-typedef struct {
-    arm_hypercall_fn_t fn;
-    int nr_args;
-} arm_hypercall_t;
-
-#define HYPERCALL(_name, _nr_args)                                   \
-    [ __HYPERVISOR_ ## _name ] =  {                                  \
-        .fn = (arm_hypercall_fn_t) &do_ ## _name,                    \
-        .nr_args = _nr_args,                                         \
-    }
+long dep_sched_op_compat(int cmd, unsigned long arg)
+{
+    return do_deprecated_hypercall();
+}
 
-#define HYPERCALL_ARM(_name, _nr_args)                        \
-    [ __HYPERVISOR_ ## _name ] =  {                                  \
-        .fn = (arm_hypercall_fn_t) &do_arm_ ## _name,                \
-        .nr_args = _nr_args,                                         \
-    }
-/*
- * Only use this for hypercalls which were deprecated (i.e. replaced
- * by something else) before Xen on ARM was created, i.e. *not* for
- * hypercalls which are simply not yet used on ARM.
- */
-#define HYPERCALL_DEPRECATED(_name, _nr_args)                   \
-    [ __HYPERVISOR_##_name ] = {                                \
-        .fn = (arm_hypercall_fn_t) &do_deprecated_hypercall,    \
-        .nr_args = _nr_args,                                    \
-    }
+long dep_event_channel_op_compat(XEN_GUEST_HANDLE_PARAM(evtchn_op_t) uop)
+{
+    return do_deprecated_hypercall();
+}
 
-static arm_hypercall_t arm_hypercall_table[] = {
-    HYPERCALL(memory_op, 2),
-    HYPERCALL(domctl, 1),
-    HYPERCALL(sched_op, 2),
-    HYPERCALL_DEPRECATED(sched_op_compat, 2),
-    HYPERCALL(console_io, 3),
-    HYPERCALL(xen_version, 2),
-    HYPERCALL(xsm_op, 1),
-    HYPERCALL(event_channel_op, 2),
-    HYPERCALL_DEPRECATED(event_channel_op_compat, 1),
-    HYPERCALL_ARM(physdev_op, 2),
-    HYPERCALL_DEPRECATED(physdev_op_compat, 1),
-    HYPERCALL(sysctl, 2),
-    HYPERCALL(hvm_op, 2),
-#ifdef CONFIG_GRANT_TABLE
-    HYPERCALL(grant_table_op, 3),
-#endif
-    HYPERCALL(multicall, 2),
-    HYPERCALL(platform_op, 1),
-    HYPERCALL(vcpu_op, 3),
-    HYPERCALL(vm_assist, 2),
-#ifdef CONFIG_ARGO
-    HYPERCALL(argo_op, 5),
-#endif
-#ifdef CONFIG_HYPFS
-    HYPERCALL(hypfs_op, 5),
-#endif
-#ifdef CONFIG_IOREQ_SERVER
-    HYPERCALL(dm_op, 3),
-#endif
-};
+long dep_physdev_op_compat(XEN_GUEST_HANDLE_PARAM(physdev_op_t) uop)
+{
+    return do_deprecated_hypercall();
+}
 
 #ifndef NDEBUG
 static void do_debug_trap(struct cpu_user_regs *regs, unsigned int code)
@@ -1430,7 +1383,6 @@ static void do_debug_trap(struct cpu_user_regs *regs, unsigned int code)
 #define HYPERCALL_ARG3(r) (r)->x2
 #define HYPERCALL_ARG4(r) (r)->x3
 #define HYPERCALL_ARG5(r) (r)->x4
-#define HYPERCALL_ARGS(r) (r)->x0, (r)->x1, (r)->x2, (r)->x3, (r)->x4
 #else
 #define HYPERCALL_RESULT_REG(r) (r)->r0
 #define HYPERCALL_ARG1(r) (r)->r0
@@ -1438,52 +1390,40 @@ static void do_debug_trap(struct cpu_user_regs *regs, unsigned int code)
 #define HYPERCALL_ARG3(r) (r)->r2
 #define HYPERCALL_ARG4(r) (r)->r3
 #define HYPERCALL_ARG5(r) (r)->r4
-#define HYPERCALL_ARGS(r) (r)->r0, (r)->r1, (r)->r2, (r)->r3, (r)->r4
 #endif
 
+static const unsigned char hypercall_args[] = hypercall_args_arm;
+
 static void do_trap_hypercall(struct cpu_user_regs *regs, register_t *nr,
                               const union hsr hsr)
 {
-    arm_hypercall_fn_t call = NULL;
     struct vcpu *curr = current;
 
-    BUILD_BUG_ON(NR_hypercalls < ARRAY_SIZE(arm_hypercall_table) );
-
     if ( hsr.iss != XEN_HYPERCALL_TAG )
     {
         gprintk(XENLOG_WARNING, "Invalid HVC imm 0x%x\n", hsr.iss);
         return inject_undef_exception(regs, hsr);
     }
 
-    if ( *nr >= ARRAY_SIZE(arm_hypercall_table) )
-    {
-        perfc_incr(invalid_hypercalls);
-        HYPERCALL_RESULT_REG(regs) = -ENOSYS;
-        return;
-    }
-
     curr->hcall_preempted = false;
 
     perfc_incra(hypercalls, *nr);
-    call = arm_hypercall_table[*nr].fn;
-    if ( call == NULL )
-    {
-        HYPERCALL_RESULT_REG(regs) = -ENOSYS;
-        return;
-    }
 
-    HYPERCALL_RESULT_REG(regs) = call(HYPERCALL_ARGS(regs));
+    call_handlers_arm(*nr, HYPERCALL_RESULT_REG(regs), HYPERCALL_ARG1(regs),
+                      HYPERCALL_ARG2(regs), HYPERCALL_ARG3(regs),
+                      HYPERCALL_ARG4(regs), HYPERCALL_ARG5(regs));
 
 #ifndef NDEBUG
-    if ( !curr->hcall_preempted )
+    if ( !curr->hcall_preempted && HYPERCALL_RESULT_REG(regs) != -ENOSYS )
     {
         /* Deliberately corrupt parameter regs used by this hypercall. */
-        switch ( arm_hypercall_table[*nr].nr_args ) {
+        switch ( hypercall_args[*nr] ) {
         case 5: HYPERCALL_ARG5(regs) = 0xDEADBEEF;
         case 4: HYPERCALL_ARG4(regs) = 0xDEADBEEF;
         case 3: HYPERCALL_ARG3(regs) = 0xDEADBEEF;
         case 2: HYPERCALL_ARG2(regs) = 0xDEADBEEF;
         case 1: /* Don't clobber x0/r0 -- it's the return value */
+        case 0: /* -ENOSYS case */
             break;
         default: BUG();
         }
@@ -1520,7 +1460,7 @@ static bool check_multicall_32bit_clean(struct multicall_entry *multi)
 {
     int i;
 
-    for ( i = 0; i < arm_hypercall_table[multi->op].nr_args; i++ )
+    for ( i = 0; i < hypercall_args[multi->op]; i++ )
     {
         if ( unlikely(multi->args[i] & 0xffffffff00000000ULL) )
         {
@@ -1537,16 +1477,8 @@ static bool check_multicall_32bit_clean(struct multicall_entry *multi)
 enum mc_disposition arch_do_multicall_call(struct mc_state *state)
 {
     struct multicall_entry *multi = &state->call;
-    arm_hypercall_fn_t call = NULL;
-
-    if ( multi->op >= ARRAY_SIZE(arm_hypercall_table) )
-    {
-        multi->result = -ENOSYS;
-        return mc_continue;
-    }
 
-    call = arm_hypercall_table[multi->op].fn;
-    if ( call == NULL )
+    if ( multi->op >= ARRAY_SIZE(hypercall_args) )
     {
         multi->result = -ENOSYS;
         return mc_continue;
@@ -1556,9 +1488,8 @@ enum mc_disposition arch_do_multicall_call(struct mc_state *state)
          !check_multicall_32bit_clean(multi) )
         return mc_continue;
 
-    multi->result = call(multi->args[0], multi->args[1],
-                         multi->args[2], multi->args[3],
-                         multi->args[4]);
+    call_handlers_arm(multi->op, multi->result, multi->args[0], multi->args[1],
+                      multi->args[2], multi->args[3], multi->args[4]);
 
     return likely(!regs_mode_is_user(guest_cpu_user_regs()))
            ? mc_continue : mc_preempt;
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 14:01:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 14:01:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294334.500463 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO2B-00012t-An; Thu, 24 Mar 2022 14:01:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294334.500463; Thu, 24 Mar 2022 14:01:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO2B-00011g-1d; Thu, 24 Mar 2022 14:01:51 +0000
Received: by outflank-mailman (input) for mailman id 294334;
 Thu, 24 Mar 2022 14:01:48 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+IHq=UD=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXO28-0008Hw-5W
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 14:01:48 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f0387281-ab7a-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 15:01:44 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 89169215FD;
 Thu, 24 Mar 2022 14:01:44 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 467E812FF7;
 Thu, 24 Mar 2022 14:01:44 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id +CodEMh5PGKeegAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 24 Mar 2022 14:01:44 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f0387281-ab7a-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648130504; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=g0HNr+GNjkvWOdjc6NuCMGxPR9ugdYNAjE7zoYxjkw8=;
	b=GFnRB8O0fuFidmnBXJv9kb3uC/+TM1wCLhO4Xf32f94hsM8JTtTIyN1MXcDoaOme26JqX3
	0MKEUpZ/+a5xk6zqeoTjKKbV2nN0quKsa5ROGdOJU7P/vc+hsjW0heDuo3V4FS7rAIpp5j
	S0YcfTdl/5lxFv9QrdUchZpGXVNXgd4=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Julien Grall <jgrall@amazon.com>
Subject: [PATCH v6 5/9] xen: generate hypercall interface related code
Date: Thu, 24 Mar 2022 15:01:35 +0100
Message-Id: <20220324140139.5899-6-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220324140139.5899-1-jgross@suse.com>
References: <20220324140139.5899-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Instead of repeating similar data multiple times use a single source
file and a generator script for producing prototypes and call sequences
of the hypercalls.

As the script already knows the number of parameters used add generating
a macro for populating an array with the number of parameters per
hypercall.

The priorities for the specific hypercalls are based on two benchamrks
performed in guests (PV and PVH):

- make -j 4 of the Xen hypervisor (resulting in cpu load with lots of
  processes created)
- scp of a large file to the guest (network load)

With a small additional debug patch applied the number of the
different hypercalls in the guest and in dom0 (for looking at backend
activity related hypercalls) were counted while the benchmark in domU
was running:

PV-hypercall    PV-guest build   PV-guest scp    dom0 build     dom0 scp
mmu_update           186175729           2865         20936        33725
stack_switch           1273311          62381        108589       270764
multicall              2182803             50           302          524
update_va_mapping       571868             10            60           80
xen_version              73061            850           859         5432
grant_table_op               0              0         35557       139110
iret                  75673006         484132        268157       757958
vcpu_op                 453037          71199        138224       334988
set_segment_base       1650249          62387        108645       270823
mmuext_op             11225681            188          7239         3426
sched_op                280153         134645         70729       137943
event_channel_op        192327          66204         71409       214191
physdev_op                   0              0          7721         4315
(the dom0 values are for the guest running the build or scp test, so
dom0 acting as backend)

HVM-hypercall   PVH-guest build    PVH-guest scp
vcpu_op                  277684             2324
event_channel_op         350233            57383
(the related dom0 counter values are in the same range as with the test
running in the PV guest)

Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Julien Grall <jgrall@amazon.com>
---
V2:
- split platform_op for doe and compat prefixes (Jan Beulich)
- add "addline:" directive
- add priorities to handlers (Jan Beulich)
V2.1:
- add missing "delete" statement in awk script
- optimize case of 2 hypercalls with same priority
V2.2:
- avoid asort() function (Michal Orzel)
V3:
- drop "addline:" support, as no longer needed
- enclose call sequence macros in "({ ... })" (Jan Beulich)
- small style adjustment (Jan Beulich)
- move generating to xen/include/Makefile (Anthony PERARD)
V4:
- generate cf_check attribute for prototype (will be removed in later patch)
- add Arm-specific variant of physdev_op()
V5:
- user $(srctree) (Anthony Perard)
- specify priority 1 for arm evtchn_op (Julien Grall)
---
 .gitignore                    |   1 +
 xen/include/Makefile          |  13 ++
 xen/include/hypercall-defs.c  | 285 ++++++++++++++++++++++++++++++
 xen/scripts/gen_hypercall.awk | 314 ++++++++++++++++++++++++++++++++++
 4 files changed, 613 insertions(+)
 create mode 100644 xen/include/hypercall-defs.c
 create mode 100644 xen/scripts/gen_hypercall.awk

diff --git a/.gitignore b/.gitignore
index d425be4bd9..c6e5b31b98 100644
--- a/.gitignore
+++ b/.gitignore
@@ -324,6 +324,7 @@ xen/include/public/public
 xen/include/xen/*.new
 xen/include/xen/acm_policy.h
 xen/include/xen/compile.h
+xen/include/xen/hypercall-defs.h
 xen/include/xen/lib/x86/cpuid-autogen.h
 xen/test/livepatch/config.h
 xen/test/livepatch/expect_config.h
diff --git a/xen/include/Makefile b/xen/include/Makefile
index a3c2511f5f..dfc43f9fba 100644
--- a/xen/include/Makefile
+++ b/xen/include/Makefile
@@ -77,6 +77,18 @@ $(obj)/compat/xlat.h: $(addprefix $(obj)/compat/.xlat/,$(xlat-y)) $(obj)/config/
 	cat $(filter %.h,$^) >$@.new
 	mv -f $@.new $@
 
+quiet_cmd_genhyp = GEN     $@
+define cmd_genhyp
+    awk -f $(srctree)/scripts/gen_hypercall.awk <$< >$@
+endef
+
+all: $(obj)/xen/hypercall-defs.h
+
+$(obj)/xen/hypercall-defs.h: $(obj)/hypercall-defs.i $(srctree)/scripts/gen_hypercall.awk FORCE
+	$(call if_changed,genhyp)
+
+targets += xen/hypercall-defs.h
+
 ifeq ($(XEN_TARGET_ARCH),$(XEN_COMPILE_ARCH))
 
 all: $(obj)/headers.chk $(obj)/headers99.chk $(obj)/headers++.chk
@@ -132,3 +144,4 @@ all: lib-x86-all
 endif
 
 clean-files := compat config generated headers*.chk xen/lib/x86/cpuid-autogen.h
+clean-files += xen/hypercall-defs.h hypercall-defs.i
diff --git a/xen/include/hypercall-defs.c b/xen/include/hypercall-defs.c
new file mode 100644
index 0000000000..60cbeb18e4
--- /dev/null
+++ b/xen/include/hypercall-defs.c
@@ -0,0 +1,285 @@
+/*
+ * Hypercall interface description:
+ * Used by scripts/gen_hypercall.awk to generate hypercall prototypes and call
+ * sequences.
+ *
+ * Syntax is like a prototype, but without return type and without the ";" at
+ * the end. Pointer types will be automatically converted to use the
+ * XEN_GUEST_HANDLE_PARAM() macro. Handlers with no parameters just use a
+ * definition like "fn()".
+ * Hypercall/function names are without the leading "__HYPERVISOR_"/"do_"
+ * strings.
+ *
+ * The return type of a class of prototypes using the same prefix is set via:
+ * rettype: <prefix> <type>
+ * Default return type is "long". A return type for a prefix can be set only
+ * once and it needs to be set before that prefix is being used via the
+ * "prefix:" directive.
+ *
+ * The prefix of the prototypes is set via a line:
+ * prefix: <prefix> ...
+ * Multiple prefixes are possible (restriction see below). Prefixes are without
+ * a trailing "_". The current prefix settings are active until a new "prefix:"
+ * line.
+ *
+ * Caller macros are suffixed with a selectable name via lines like:
+ * caller: <suffix>
+ * When a caller suffix is active, there is only one active prefix allowed.
+ *
+ * With a "defhandle:" line it is possible to add a DEFINE_XEN_GUEST_HANDLE()
+ * to the generated header:
+ * defhandle: <handle-type> [<type>]
+ * Without specifying <type> only a DEFINE_XEN_GUEST_HANDLE(<handle-type>)
+ * will be generated, otherwise it will be a
+ * __DEFINE_XEN_GUEST_HANDLE(<handle-type>, <type>) being generated. Note that
+ * the latter will include the related "const" handle "const_<handle-type>".
+ *
+ * In order to support using coding style compliant pointers in the
+ * prototypes it is possible to add translation entries to generate the correct
+ * handle types:
+ * handle: <handle-type> <type>
+ * This will result in the prototype translation from "<type> *" to
+ * "XEN_GUEST_HANDLE_PARAM(<handle-type>)".
+ *
+ * The hypercall handler calling code will be generated from a final table in
+ * the source file, which is started via the line:
+ * table: <caller> <caller> ...
+ * with the <caller>s specifying the designated caller macro of each column of
+ * the table. Any column of a <caller> not having been set via a "caller:"
+ * line will be ignored.
+ * The first column of the table contains the hypercall/prototype, each
+ * <caller> column contains the prefix for the function to use for that caller.
+ * A function prefix can be annotated with a priority by adding ":<prio>" to it
+ * ("1" being the highest priority, higher numbers mean lower priority, no
+ * priority specified is the lowest priority). The generated code will try to
+ * achieve better performance for calling high priority handlers.
+ * A column not being supported by a <caller> is marked with "-". Lines with all
+ * entries being "-" after removal of inactive <caller> columns are ignored.
+ *
+ * This file is being preprocessed using $(CPP), so #ifdef CONFIG_* conditionals
+ * are possible.
+ */
+
+#ifdef CONFIG_HVM
+#define PREFIX_hvm hvm
+#else
+#define PREFIX_hvm
+#endif
+
+#ifdef CONFIG_COMPAT
+#define PREFIX_compat compat
+rettype: compat int
+#else
+#define PREFIX_compat
+#endif
+
+#ifdef CONFIG_ARM
+#define PREFIX_dep dep
+#define PREFIX_do_arm do_arm
+rettype: do_arm int
+#else
+#define PREFIX_dep
+#define PREFIX_do_arm
+#endif
+
+handle: uint unsigned int
+handle: const_void const void
+handle: const_char const char
+
+#ifdef CONFIG_COMPAT
+defhandle: multicall_entry_compat_t
+#ifndef CONFIG_PV_SHIM_EXCLUSIVE
+defhandle: compat_platform_op_t
+#endif
+#endif
+#ifdef CONFIG_PV32
+defhandle: trap_info_compat_t
+defhandle: physdev_op_compat_t
+#endif
+
+prefix: do PREFIX_hvm PREFIX_compat PREFIX_do_arm
+physdev_op(int cmd, void *arg)
+
+prefix: do PREFIX_hvm PREFIX_compat
+#if defined(CONFIG_GRANT_TABLE) || defined(CONFIG_PV_SHIM)
+grant_table_op(unsigned int cmd, void *uop, unsigned int count)
+#endif
+
+prefix: do PREFIX_hvm
+memory_op(unsigned long cmd, void *arg)
+
+prefix: do PREFIX_compat
+xen_version(int cmd, void *arg)
+vcpu_op(int cmd, unsigned int vcpuid, void *arg)
+sched_op(int cmd, void *arg)
+xsm_op(void *op)
+callback_op(int cmd, const void *arg)
+#ifdef CONFIG_ARGO
+argo_op(unsigned int cmd, void *arg1, void *arg2, unsigned long arg3, unsigned long arg4)
+#endif
+#ifdef CONFIG_KEXEC
+kexec_op(unsigned int op, void *uarg)
+#endif
+#ifdef CONFIG_PV
+iret()
+nmi_op(unsigned int cmd, void *arg)
+#ifdef CONFIG_XENOPROF
+xenoprof_op(int op, void *arg)
+#endif
+#endif /* CONFIG_PV */
+
+#ifdef CONFIG_COMPAT
+prefix: compat
+set_timer_op(uint32_t lo, int32_t hi)
+multicall(multicall_entry_compat_t *call_list, uint32_t nr_calls)
+memory_op(unsigned int cmd, void *arg)
+#ifdef CONFIG_IOREQ_SERVER
+dm_op(domid_t domid, unsigned int nr_bufs, void *bufs)
+#endif
+mmuext_op(void *arg, unsigned int count, uint *pdone, unsigned int foreigndom)
+#ifdef CONFIG_PV32
+set_trap_table(trap_info_compat_t *traps)
+set_gdt(unsigned int *frame_list, unsigned int entries)
+set_callbacks(unsigned long event_selector, unsigned long event_address, unsigned long failsafe_selector, unsigned long failsafe_address)
+update_descriptor(uint32_t pa_lo, uint32_t pa_hi, uint32_t desc_lo, uint32_t desc_hi)
+update_va_mapping(unsigned int va, uint32_t lo, uint32_t hi, unsigned int flags)
+physdev_op_compat(physdev_op_compat_t *uop)
+update_va_mapping_otherdomain(unsigned int va, uint32_t lo, uint32_t hi, unsigned int flags, domid_t domid)
+#endif
+#ifndef CONFIG_PV_SHIM_EXCLUSIVE
+platform_op(compat_platform_op_t *u_xenpf_op)
+#endif
+#endif /* CONFIG_COMPAT */
+
+#if defined(CONFIG_PV) || defined(CONFIG_ARM)
+prefix: do PREFIX_dep
+event_channel_op_compat(evtchn_op_t *uop)
+physdev_op_compat(physdev_op_t *uop)
+/* Legacy hypercall (as of 0x00030101). */
+sched_op_compat(int cmd, unsigned long arg)
+#endif
+
+prefix: do
+set_timer_op(s_time_t timeout)
+console_io(unsigned int cmd, unsigned int count, char *buffer)
+vm_assist(unsigned int cmd, unsigned int type)
+event_channel_op(int cmd, void *arg)
+mmuext_op(mmuext_op_t *uops, unsigned int count, unsigned int *pdone, unsigned int foreigndom)
+multicall(multicall_entry_t *call_list, unsigned int nr_calls)
+#ifdef CONFIG_PV
+mmu_update(mmu_update_t *ureqs, unsigned int count, unsigned int *pdone, unsigned int foreigndom)
+stack_switch(unsigned long ss, unsigned long esp)
+fpu_taskswitch(int set)
+set_debugreg(int reg, unsigned long value)
+get_debugreg(int reg)
+set_segment_base(unsigned int which, unsigned long base)
+mca(xen_mc_t *u_xen_mc)
+set_trap_table(const_trap_info_t *traps)
+set_gdt(xen_ulong_t *frame_list, unsigned int entries)
+set_callbacks(unsigned long event_address, unsigned long failsafe_address, unsigned long syscall_address)
+update_descriptor(uint64_t gaddr, seg_desc_t desc)
+update_va_mapping(unsigned long va, uint64_t val64, unsigned long flags)
+update_va_mapping_otherdomain(unsigned long va, uint64_t val64, unsigned long flags, domid_t domid)
+#endif
+#ifdef CONFIG_IOREQ_SERVER
+dm_op(domid_t domid, unsigned int nr_bufs, xen_dm_op_buf_t *bufs)
+#endif
+#ifndef CONFIG_PV_SHIM_EXCLUSIVE
+sysctl(xen_sysctl_t *u_sysctl)
+domctl(xen_domctl_t *u_domctl)
+paging_domctl_cont(xen_domctl_t *u_domctl)
+platform_op(xen_platform_op_t *u_xenpf_op)
+#endif
+#ifdef CONFIG_HVM
+hvm_op(unsigned long op, void *arg)
+#endif
+#ifdef CONFIG_HYPFS
+hypfs_op(unsigned int cmd, const char *arg1, unsigned long arg2, void *arg3, unsigned long arg4)
+#endif
+#ifdef CONFIG_X86
+xenpmu_op(unsigned int op, xen_pmu_params_t *arg)
+#endif
+
+#ifdef CONFIG_PV
+caller: pv64
+#ifdef CONFIG_PV32
+caller: pv32
+#endif
+#endif
+#if defined(CONFIG_HVM) && defined(CONFIG_X86)
+caller: hvm64
+#ifdef CONFIG_COMPAT
+caller: hvm32
+#endif
+#endif
+#ifdef CONFIG_ARM
+caller: arm
+#endif
+
+table:                             pv32     pv64     hvm32    hvm64    arm
+set_trap_table                     compat   do       -        -        -
+mmu_update                         do:1     do:1     -        -        -
+set_gdt                            compat   do       -        -        -
+stack_switch                       do:2     do:2     -        -        -
+set_callbacks                      compat   do       -        -        -
+fpu_taskswitch                     do       do       -        -        -
+sched_op_compat                    do       do       -        -        dep
+#ifndef CONFIG_PV_SHIM_EXCLUSIVE
+platform_op                        compat   do       compat   do       do
+#endif
+set_debugreg                       do       do       -        -        -
+get_debugreg                       do       do       -        -        -
+update_descriptor                  compat   do       -        -        -
+memory_op                          compat   do       hvm      hvm      do
+multicall                          compat:2 do:2     compat   do       do
+update_va_mapping                  compat   do       -        -        -
+set_timer_op                       compat   do       compat   do       -
+event_channel_op_compat            do       do       -        -        dep
+xen_version                        compat   do       compat   do       do
+console_io                         do       do       do       do       do
+physdev_op_compat                  compat   do       -        -        dep
+#if defined(CONFIG_GRANT_TABLE) || defined(CONFIG_PV_SHIM)
+grant_table_op                     compat   do       hvm      hvm      do
+#endif
+vm_assist                          do       do       do       do       do
+update_va_mapping_otherdomain      compat   do       -        -        -
+iret                               compat:1 do:1     -        -        -
+vcpu_op                            compat   do       compat:1 do:1     do
+set_segment_base                   do:2     do:2     -        -        -
+#ifdef CONFIG_PV
+mmuext_op                          compat:2 do:2     compat   do       -
+#endif
+xsm_op                             compat   do       compat   do       do
+nmi_op                             compat   do       -        -        -
+sched_op                           compat   do       compat   do       do
+callback_op                        compat   do       -        -        -
+#ifdef CONFIG_XENOPROF
+xenoprof_op                        compat   do       -        -        -
+#endif
+event_channel_op                   do       do       do:1     do:1     do:1
+physdev_op                         compat   do       hvm      hvm      do_arm
+#ifdef CONFIG_HVM
+hvm_op                             do       do       do       do       do
+#endif
+#ifndef CONFIG_PV_SHIM_EXCLUSIVE
+sysctl                             do       do       do       do       do
+domctl                             do       do       do       do       do
+#endif
+#ifdef CONFIG_KEXEC
+kexec_op                           compat   do       -        -        -
+#endif
+tmem_op                            -        -        -        -        -
+#ifdef CONFIG_ARGO
+argo_op                            compat   do       compat   do       do
+#endif
+xenpmu_op                          do       do       do       do       -
+#ifdef CONFIG_IOREQ_SERVER
+dm_op                              compat   do       compat   do       do
+#endif
+#ifdef CONFIG_HYPFS
+hypfs_op                           do       do       do       do       do
+#endif
+mca                                do       do       -        -        -
+#ifndef CONFIG_PV_SHIM_EXCLUSIVE
+paging_domctl_cont                 do       do       do       do       -
+#endif
diff --git a/xen/scripts/gen_hypercall.awk b/xen/scripts/gen_hypercall.awk
new file mode 100644
index 0000000000..403758be21
--- /dev/null
+++ b/xen/scripts/gen_hypercall.awk
@@ -0,0 +1,314 @@
+# awk script to generate hypercall handler prototypes and a macro for doing
+# the calls of the handlers inside a switch() statement.
+
+BEGIN {
+    printf("/* Generated file, do not edit! */\n\n");
+    e = 0;
+    n = 0;
+    p = 0;
+    nc = 0;
+}
+
+# Issue error to stderr
+function do_err(msg) {
+    print "Error: "msg": "$0 >"/dev/stderr";
+    exit 1;
+}
+
+# Generate handler call
+function do_call(f, p,    i) {
+    printf("            ret = %s_%s(", pre[f, p], fn[f]);
+    for (i = 1; i <= n_args[f]; i++) {
+        if (i > 1)
+            printf(", ");
+        if (ptr[f, i])
+            printf("(XEN_GUEST_HANDLE_PARAM(%s)){ _p(a%d) }", typ[f, i], i);
+        else
+            printf("(%s)(a%d)", typ[f, i], i);
+    }
+    printf("); \\\n");
+}
+
+# Generate case statement for call
+function do_case(f, p) {
+    printf("        case __HYPERVISOR_%s: \\\n", fn[f]);
+    do_call(f, p);
+    printf("            break; \\\n");
+}
+
+# Generate switch statement for calling handlers
+function do_switch(ca, p,    i) {
+    printf("        switch ( num ) \\\n");
+    printf("        { \\\n");
+    for (i = 1; i <= nc; i++)
+        if (call[i] == ca && call_prio[i] == p)
+            do_case(call_fn[i], call_p[i]);
+    printf("        default: \\\n");
+    printf("            ret = -ENOSYS; \\\n");
+    printf("            break; \\\n");
+    printf("        } \\\n");
+}
+
+function rest_of_line(par,    i, val) {
+    val = $(par);
+    for (i = par + 1; i <= NF; i++)
+        val = val " " $(i);
+    return val;
+}
+
+# Handle comments (multi- and single line)
+$1 == "/*" {
+    comment = 1;
+}
+comment == 1 {
+    if ($(NF) == "*/") comment = 0;
+    next;
+}
+
+# Skip preprocessing artefacts
+$1 == "extern" {
+    next;
+}
+/^#/ {
+    next;
+}
+
+# Drop empty lines
+NF == 0 {
+    next;
+}
+
+# Handle "handle:" line
+$1 == "handle:" {
+    if (NF < 3)
+        do_err("\"handle:\" requires at least two parameters");
+    val = rest_of_line(3);
+    xlate[val] = $2;
+    next;
+}
+
+# Handle "defhandle:" line
+$1 == "defhandle:" {
+    if (NF < 2)
+        do_err("\"defhandle:\" requires at least one parameter");
+    e++;
+    if (NF == 2) {
+        emit[e] = sprintf("DEFINE_XEN_GUEST_HANDLE(%s);", $2);
+    } else {
+        val = rest_of_line(3);
+        emit[e] = sprintf("__DEFINE_XEN_GUEST_HANDLE(%s, %s);", $2, val);
+        xlate[val] = $2;
+    }
+    next;
+}
+
+# Handle "rettype:" line
+$1 == "rettype:" {
+    if (NF < 3)
+        do_err("\"rettype:\" requires at least two parameters");
+    if ($2 in rettype)
+        do_err("rettype can be set only once for each prefix");
+    rettype[$2] = rest_of_line(3);
+    next;
+}
+
+# Handle "caller:" line
+$1 == "caller:" {
+    caller[$2] = 1;
+    next;
+}
+
+# Handle "prefix:" line
+$1 == "prefix:" {
+    p = NF - 1;
+    for (i = 2; i <= NF; i++) {
+        prefix[i - 1] = $(i);
+        if (!(prefix[i - 1] in rettype))
+            rettype[prefix[i - 1]] = "long";
+    }
+    next;
+}
+
+# Handle "table:" line
+$1 == "table:" {
+    table = 1;
+    for (i = 2; i <= NF; i++)
+        col[i - 1] = $(i);
+    n_cols = NF - 1;
+    next;
+}
+
+# Handle table definition line
+table == 1 {
+    if (NF != n_cols + 1)
+        do_err("Table definition line has wrong number of fields");
+    for (c = 1; c <= n_cols; c++) {
+        if (caller[col[c]] != 1)
+            continue;
+        if ($(c + 1) == "-")
+            continue;
+        pref = $(c + 1);
+        idx = index(pref, ":");
+        if (idx == 0)
+            prio = 100;
+        else {
+            prio = substr(pref, idx + 1) + 0;
+            pref = substr(pref, 1, idx - 1);
+            if (prio >= 100 || prio < 1)
+                do_err("Priority must be in the range 1..99");
+        }
+        fnd = 0;
+        for (i = 1; i <= n; i++) {
+            if (fn[i] != $1)
+                continue;
+            for (j = 1; j <= n_pre[i]; j++) {
+                if (pre[i, j] == pref) {
+                    prios[col[c], prio]++;
+                    if (prios[col[c], prio] == 1) {
+                        n_prios[col[c]]++;
+                        prio_list[col[c], n_prios[col[c]]] = prio;
+                        prio_mask[col[c], prio] = "(1ULL << __HYPERVISOR_"$1")";
+                    } else
+                        prio_mask[col[c], prio] = prio_mask[col[c], prio] " | (1ULL << __HYPERVISOR_"$1")";
+                    nc++;
+                    call[nc] = col[c];
+                    call_fn[nc] = i;
+                    call_p[nc] = j;
+                    call_prio[nc] = prio;
+                    fnd = 1;
+                }
+            }
+        }
+        if (fnd == 0)
+            do_err("No prototype for prefix/hypercall combination");
+    }
+    next;
+}
+
+# Prototype line
+{
+    bro = index($0, "(");
+    brc = index($0, ")");
+    if (bro < 2 || brc < bro)
+        do_err("No valid prototype line");
+    n++;
+    fn[n] = substr($0, 1, bro - 1);
+    n_pre[n] = p;
+    for (i = 1; i <= p; i++)
+        pre[n, i] = prefix[i];
+    args = substr($0, bro + 1, brc - bro - 1);
+    n_args[n] = split(args, a, ",");
+    if (n_args[n] > 5)
+        do_err("Too many parameters");
+    for (i = 1; i <= n_args[n]; i++) {
+        sub("^ *", "", a[i]);         # Remove leading white space
+        sub(" +", " ", a[i]);         # Replace multiple spaces with single ones
+        sub(" *$", "", a[i]);         # Remove trailing white space
+        ptr[n, i] = index(a[i], "*"); # Is it a pointer type?
+        sub("[*]", "", a[i]);         # Remove "*"
+        if (index(a[i], " ") == 0)
+            do_err("Parameter with no type or no name");
+        typ[n, i] = a[i];
+        sub(" [^ ]+$", "", typ[n, i]);    # Remove parameter name
+        if (ptr[n, i] && (typ[n, i] in xlate))
+            typ[n, i] = xlate[typ[n, i]];
+        arg[n, i] = a[i];
+        sub("^([^ ]+ )+", "", arg[n, i]); # Remove parameter type
+    }
+}
+
+# Generate the output
+END {
+    # Verbatim generated lines
+    for (i = 1; i <= e; i++)
+        printf("%s\n", emit[i]);
+    printf("\n");
+    # Generate prototypes
+    for (i = 1; i <= n; i++) {
+        for (p = 1; p <= n_pre[i]; p++) {
+            printf("%s cf_check %s_%s(", rettype[pre[i, p]], pre[i, p], fn[i]);
+            if (n_args[i] == 0)
+                printf("void");
+            else
+                for (j = 1; j <= n_args[i]; j++) {
+                    if (j > 1)
+                        printf(", ");
+                    if (ptr[i, j])
+                        printf("XEN_GUEST_HANDLE_PARAM(%s)", typ[i, j]);
+                    else
+                        printf("%s", typ[i, j]);
+                    printf(" %s", arg[i, j]);
+                }
+            printf(");\n");
+        }
+    }
+    # Generate call sequences and args array contents
+    for (ca in caller) {
+        if (caller[ca] != 1)
+            continue;
+        need_mask = 0;
+        for (pl = 1; pl <= n_prios[ca]; pl++) {
+            for (pll = pl; pll > 1; pll--) {
+                if (prio_list[ca, pl] > p_list[pll - 1])
+                    break;
+                else
+                    p_list[pll] = p_list[pll - 1];
+            }
+            p_list[pll] = prio_list[ca, pl];
+            # If any prio but the default one has more than 1 entry we need "mask"
+            if (p_list[pll] != 100 && prios[ca, p_list[pll]] > 1)
+                need_mask = 1;
+        }
+        printf("\n");
+        printf("#define call_handlers_%s(num, ret, a1, a2, a3, a4, a5) \\\n", ca);
+        printf("({ \\\n");
+        if (need_mask)
+            printf("    uint64_t mask = 1ULL << num; \\\n");
+        printf("    ");
+        for (pl = 1; pl <= n_prios[ca]; pl++) {
+            if (prios[ca, p_list[pl]] > 1) {
+                if (pl < n_prios[ca]) {
+                    printf("    if ( likely(mask & (%s)) ) \\\n", prio_mask[ca, p_list[pl]]);
+                    printf("    { \\\n");
+                }
+                if (prios[ca, p_list[pl]] == 2) {
+                    fnd = 0;
+                    for (i = 1; i <= nc; i++)
+                        if (call[i] == ca && call_prio[i] == p_list[pl]) {
+                            fnd++;
+                            if (fnd == 1)
+                                printf("        if ( num == __HYPERVISOR_%s ) \\\n", fn[call_fn[i]]);
+                            else
+                                printf("        else \\\n");
+                            do_call(call_fn[i], call_p[i]);
+                        }
+                } else {
+                    do_switch(ca, p_list[pl]);
+                }
+                if (pl < n_prios[ca])
+                    printf("    } \\\n");
+            } else {
+                for (i = 1; i <= nc; i++)
+                    if (call[i] == ca && call_prio[i] == p_list[pl]) {
+                        printf("if ( likely(num == __HYPERVISOR_%s) ) \\\n", fn[call_fn[i]]);
+                        do_call(call_fn[i], call_p[i]);
+                    }
+            }
+            if (pl < n_prios[ca] || prios[ca, p_list[pl]] <= 2)
+                printf("    else \\\n");
+        }
+        if (prios[ca, p_list[n_prios[ca]]] <= 2) {
+            printf("\\\n");
+            printf("        ret = -ENOSYS; \\\n");
+        }
+        printf("})\n");
+        delete p_list;
+        printf("\n");
+        printf("#define hypercall_args_%s \\\n", ca);
+        printf("{ \\\n");
+        for (i = 1; i <= nc; i++)
+            if (call[i] == ca)
+                printf("[__HYPERVISOR_%s] = %d, \\\n", fn[call_fn[i]], n_args[call_fn[i]]);
+        printf("}\n");
+    }
+}
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 14:01:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 14:01:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294335.500477 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO2C-0001JO-H0; Thu, 24 Mar 2022 14:01:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294335.500477; Thu, 24 Mar 2022 14:01:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO2C-0001F1-1r; Thu, 24 Mar 2022 14:01:52 +0000
Received: by outflank-mailman (input) for mailman id 294335;
 Thu, 24 Mar 2022 14:01:49 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+IHq=UD=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXO28-0008Hr-JE
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 14:01:48 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f1035dd0-ab7a-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 15:01:46 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id C4ED41F856;
 Thu, 24 Mar 2022 14:01:45 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 6B34012FF7;
 Thu, 24 Mar 2022 14:01:45 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id MMwXGcl5PGKeegAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 24 Mar 2022 14:01:45 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f1035dd0-ab7a-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648130505; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=Nw9rhElp9VOD8Z0hPj4rPIzgh7m6v0BZ4AIazBFgjhU=;
	b=f4/g5Xfgktc3TsxDItdJ1NVCjqjuvjuSm+EtibGQ2q285t0DK4+SonX8L52JGgJ681UHzq
	1Wgc+rCHI+Rv/MIL4Nrg26FXFjd023RA8yNQQOgPR69Fs6ERNqQ/efEwMCdBap5mBqhKCb
	74agpg4LBCoGoY+/13HsJ5NgAtb2HuM=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>,
	George Dunlap <george.dunlap@citrix.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Christopher Clark <christopher.w.clark@gmail.com>,
	Dario Faggioli <dfaggioli@suse.com>,
	Daniel De Graaf <dgdegra@tycho.nsa.gov>,
	"Daniel P. Smith" <dpsmith@apertussolutions.com>,
	=?UTF-8?q?T=C3=A9o=20Couprie=20Diaz?= <teo.coupriediaz@arm.com>
Subject: [PATCH v6 9/9] xen/x86: remove cf_check attribute from hypercall handlers
Date: Thu, 24 Mar 2022 15:01:39 +0100
Message-Id: <20220324140139.5899-10-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220324140139.5899-1-jgross@suse.com>
References: <20220324140139.5899-1-jgross@suse.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

Now that the hypercall handlers are all being called directly instead
through a function vector, the "cf_check" attribute can be removed.

Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Daniel P. Smith <dpsmith@apertussolutions.com> # xsm parts
Acked-by: Jan Beulich <jbeulich@suse.com>
Tested-by: Téo Couprie Diaz <teo.coupriediaz@arm.com>
---
V4:
- new patch
---
 xen/arch/x86/compat.c               |  6 +++---
 xen/arch/x86/cpu/mcheck/mce.c       |  2 +-
 xen/arch/x86/cpu/vpmu.c             |  2 +-
 xen/arch/x86/domain.c               |  3 +--
 xen/arch/x86/hvm/dm.c               |  2 +-
 xen/arch/x86/hvm/hvm.c              |  2 +-
 xen/arch/x86/hvm/hypercall.c        |  6 +++---
 xen/arch/x86/mm.c                   | 12 ++++++------
 xen/arch/x86/mm/paging.c            |  2 +-
 xen/arch/x86/physdev.c              |  2 +-
 xen/arch/x86/platform_hypercall.c   |  2 +-
 xen/arch/x86/pv/callback.c          | 16 ++++++++--------
 xen/arch/x86/pv/descriptor-tables.c |  8 ++++----
 xen/arch/x86/pv/iret.c              |  4 ++--
 xen/arch/x86/pv/misc-hypercalls.c   | 10 +++++-----
 xen/arch/x86/pv/shim.c              |  4 ++--
 xen/arch/x86/x86_64/compat/mm.c     |  2 +-
 xen/arch/x86/x86_64/domain.c        |  2 +-
 xen/common/argo.c                   |  4 ++--
 xen/common/compat/grant_table.c     |  2 +-
 xen/common/compat/kernel.c          |  2 +-
 xen/common/compat/memory.c          |  3 +--
 xen/common/dm.c                     |  2 +-
 xen/common/domain.c                 |  2 +-
 xen/common/domctl.c                 |  2 +-
 xen/common/event_channel.c          |  2 +-
 xen/common/grant_table.c            |  3 +--
 xen/common/hypfs.c                  |  2 +-
 xen/common/kernel.c                 |  2 +-
 xen/common/kexec.c                  |  4 ++--
 xen/common/memory.c                 |  2 +-
 xen/common/multicall.c              |  3 +--
 xen/common/sched/compat.c           |  2 +-
 xen/common/sched/core.c             |  4 ++--
 xen/common/sysctl.c                 |  2 +-
 xen/common/xenoprof.c               |  2 +-
 xen/drivers/char/console.c          |  2 +-
 xen/scripts/gen_hypercall.awk       |  2 +-
 xen/xsm/xsm_core.c                  |  4 ++--
 39 files changed, 68 insertions(+), 72 deletions(-)

diff --git a/xen/arch/x86/compat.c b/xen/arch/x86/compat.c
index 28281a262a..a031062830 100644
--- a/xen/arch/x86/compat.c
+++ b/xen/arch/x86/compat.c
@@ -15,7 +15,7 @@ typedef long ret_t;
 #endif
 
 /* Legacy hypercall (as of 0x00030202). */
-ret_t cf_check do_physdev_op_compat(XEN_GUEST_HANDLE_PARAM(physdev_op_t) uop)
+ret_t do_physdev_op_compat(XEN_GUEST_HANDLE_PARAM(physdev_op_t) uop)
 {
     struct physdev_op op;
 
@@ -28,7 +28,7 @@ ret_t cf_check do_physdev_op_compat(XEN_GUEST_HANDLE_PARAM(physdev_op_t) uop)
 #ifndef COMPAT
 
 /* Legacy hypercall (as of 0x00030101). */
-long cf_check do_sched_op_compat(int cmd, unsigned long arg)
+long do_sched_op_compat(int cmd, unsigned long arg)
 {
     switch ( cmd )
     {
@@ -50,7 +50,7 @@ long cf_check do_sched_op_compat(int cmd, unsigned long arg)
 }
 
 /* Legacy hypercall (as of 0x00030202). */
-long cf_check do_event_channel_op_compat(
+long do_event_channel_op_compat(
     XEN_GUEST_HANDLE_PARAM(evtchn_op_t) uop)
 {
     struct evtchn_op op;
diff --git a/xen/arch/x86/cpu/mcheck/mce.c b/xen/arch/x86/cpu/mcheck/mce.c
index 275c54be7c..f68e31b643 100644
--- a/xen/arch/x86/cpu/mcheck/mce.c
+++ b/xen/arch/x86/cpu/mcheck/mce.c
@@ -1351,7 +1351,7 @@ CHECK_mcinfo_recovery;
 # endif /* CONFIG_COMPAT */
 
 /* Machine Check Architecture Hypercall */
-long cf_check do_mca(XEN_GUEST_HANDLE_PARAM(xen_mc_t) u_xen_mc)
+long do_mca(XEN_GUEST_HANDLE_PARAM(xen_mc_t) u_xen_mc)
 {
     long ret = 0;
     struct xen_mc curop, *op = &curop;
diff --git a/xen/arch/x86/cpu/vpmu.c b/xen/arch/x86/cpu/vpmu.c
index 51d171615f..d2c03a1104 100644
--- a/xen/arch/x86/cpu/vpmu.c
+++ b/xen/arch/x86/cpu/vpmu.c
@@ -672,7 +672,7 @@ void vpmu_dump(struct vcpu *v)
         alternative_vcall(vpmu_ops.arch_vpmu_dump, v);
 }
 
-long cf_check do_xenpmu_op(
+long do_xenpmu_op(
     unsigned int op, XEN_GUEST_HANDLE_PARAM(xen_pmu_params_t) arg)
 {
     int ret;
diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c
index d566fc82b4..ddf969f76e 100644
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -1489,8 +1489,7 @@ int arch_vcpu_reset(struct vcpu *v)
     return 0;
 }
 
-long cf_check do_vcpu_op(int cmd, unsigned int vcpuid,
-                         XEN_GUEST_HANDLE_PARAM(void) arg)
+long do_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     long rc = 0;
     struct domain *d = current->domain;
diff --git a/xen/arch/x86/hvm/dm.c b/xen/arch/x86/hvm/dm.c
index d80975efcf..f8e6089870 100644
--- a/xen/arch/x86/hvm/dm.c
+++ b/xen/arch/x86/hvm/dm.c
@@ -654,7 +654,7 @@ CHECK_dm_op_relocate_memory;
 CHECK_dm_op_pin_memory_cacheattr;
 CHECK_dm_op_nr_vcpus;
 
-int cf_check compat_dm_op(
+int compat_dm_op(
     domid_t domid, unsigned int nr_bufs, XEN_GUEST_HANDLE_PARAM(void) bufs)
 {
     struct dmop_args args;
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index 709a4191ef..9b3973dad8 100644
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -5022,7 +5022,7 @@ static int hvmop_get_mem_type(
     return rc;
 }
 
-long cf_check do_hvm_op(unsigned long op, XEN_GUEST_HANDLE_PARAM(void) arg)
+long do_hvm_op(unsigned long op, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     long rc = 0;
 
diff --git a/xen/arch/x86/hvm/hypercall.c b/xen/arch/x86/hvm/hypercall.c
index ae601185fc..29d1ca7a13 100644
--- a/xen/arch/x86/hvm/hypercall.c
+++ b/xen/arch/x86/hvm/hypercall.c
@@ -31,7 +31,7 @@
 #include <public/hvm/hvm_op.h>
 #include <public/hvm/params.h>
 
-long cf_check hvm_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long hvm_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     long rc;
 
@@ -51,7 +51,7 @@ long cf_check hvm_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 }
 
 #ifdef CONFIG_GRANT_TABLE
-long cf_check hvm_grant_table_op(
+long hvm_grant_table_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) uop, unsigned int count)
 {
     switch ( cmd )
@@ -77,7 +77,7 @@ long cf_check hvm_grant_table_op(
 }
 #endif
 
-long cf_check hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     const struct vcpu *curr = current;
     const struct domain *currd = curr->domain;
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index 6cc73187ac..a958142d17 100644
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86/mm.c
@@ -3377,7 +3377,7 @@ static int vcpumask_to_pcpumask(
     }
 }
 
-long cf_check do_mmuext_op(
+long do_mmuext_op(
     XEN_GUEST_HANDLE_PARAM(mmuext_op_t) uops,
     unsigned int count,
     XEN_GUEST_HANDLE_PARAM(uint) pdone,
@@ -3916,7 +3916,7 @@ long cf_check do_mmuext_op(
     return rc;
 }
 
-long cf_check do_mmu_update(
+long do_mmu_update(
     XEN_GUEST_HANDLE_PARAM(mmu_update_t) ureqs,
     unsigned int count,
     XEN_GUEST_HANDLE_PARAM(uint) pdone,
@@ -4501,7 +4501,7 @@ static int __do_update_va_mapping(
     return rc;
 }
 
-long cf_check do_update_va_mapping(
+long do_update_va_mapping(
     unsigned long va, u64 val64, unsigned long flags)
 {
     int rc = __do_update_va_mapping(va, val64, flags, current->domain);
@@ -4513,7 +4513,7 @@ long cf_check do_update_va_mapping(
     return rc;
 }
 
-long cf_check do_update_va_mapping_otherdomain(
+long do_update_va_mapping_otherdomain(
     unsigned long va, u64 val64, unsigned long flags, domid_t domid)
 {
     struct domain *pg_owner;
@@ -4536,7 +4536,7 @@ long cf_check do_update_va_mapping_otherdomain(
 #endif /* CONFIG_PV */
 
 #ifdef CONFIG_PV32
-int cf_check compat_update_va_mapping(
+int compat_update_va_mapping(
     unsigned int va, uint32_t lo, uint32_t hi, unsigned int flags)
 {
     int rc = __do_update_va_mapping(va, ((uint64_t)hi << 32) | lo,
@@ -4549,7 +4549,7 @@ int cf_check compat_update_va_mapping(
     return rc;
 }
 
-int cf_check compat_update_va_mapping_otherdomain(
+int compat_update_va_mapping_otherdomain(
     unsigned int va, uint32_t lo, uint32_t hi, unsigned int flags,
     domid_t domid)
 {
diff --git a/xen/arch/x86/mm/paging.c b/xen/arch/x86/mm/paging.c
index a7e2707ecc..cb1bfcbde5 100644
--- a/xen/arch/x86/mm/paging.c
+++ b/xen/arch/x86/mm/paging.c
@@ -760,7 +760,7 @@ int paging_domctl(struct domain *d, struct xen_domctl_shadow_op *sc,
         return shadow_domctl(d, sc, u_domctl);
 }
 
-long cf_check do_paging_domctl_cont(
+long do_paging_domctl_cont(
     XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl)
 {
     struct xen_domctl op;
diff --git a/xen/arch/x86/physdev.c b/xen/arch/x86/physdev.c
index 2ddcf44f33..ea38be8b79 100644
--- a/xen/arch/x86/physdev.c
+++ b/xen/arch/x86/physdev.c
@@ -174,7 +174,7 @@ int physdev_unmap_pirq(domid_t domid, int pirq)
 }
 #endif /* COMPAT */
 
-ret_t cf_check do_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+ret_t do_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     int irq;
     ret_t ret;
diff --git a/xen/arch/x86/platform_hypercall.c b/xen/arch/x86/platform_hypercall.c
index eeb4f7a20e..a7341dc3d7 100644
--- a/xen/arch/x86/platform_hypercall.c
+++ b/xen/arch/x86/platform_hypercall.c
@@ -214,7 +214,7 @@ void cf_check resource_access(void *info)
 }
 #endif
 
-ret_t cf_check do_platform_op(
+ret_t do_platform_op(
     XEN_GUEST_HANDLE_PARAM(xen_platform_op_t) u_xenpf_op)
 {
     ret_t ret;
diff --git a/xen/arch/x86/pv/callback.c b/xen/arch/x86/pv/callback.c
index 1be9d3f731..067ee3b795 100644
--- a/xen/arch/x86/pv/callback.c
+++ b/xen/arch/x86/pv/callback.c
@@ -140,7 +140,7 @@ static long unregister_guest_callback(struct callback_unregister *unreg)
     return ret;
 }
 
-long cf_check do_callback_op(int cmd, XEN_GUEST_HANDLE_PARAM(const_void) arg)
+long do_callback_op(int cmd, XEN_GUEST_HANDLE_PARAM(const_void) arg)
 {
     long ret;
 
@@ -178,7 +178,7 @@ long cf_check do_callback_op(int cmd, XEN_GUEST_HANDLE_PARAM(const_void) arg)
     return ret;
 }
 
-long cf_check do_set_callbacks(
+long do_set_callbacks(
     unsigned long event_address, unsigned long failsafe_address,
     unsigned long syscall_address)
 {
@@ -283,7 +283,7 @@ static int compat_unregister_guest_callback(
     return ret;
 }
 
-int cf_check compat_callback_op(int cmd, XEN_GUEST_HANDLE(const_void) arg)
+int compat_callback_op(int cmd, XEN_GUEST_HANDLE(const_void) arg)
 {
     int ret;
 
@@ -321,7 +321,7 @@ int cf_check compat_callback_op(int cmd, XEN_GUEST_HANDLE(const_void) arg)
     return ret;
 }
 
-int cf_check compat_set_callbacks(
+int compat_set_callbacks(
     unsigned long event_selector, unsigned long event_address,
     unsigned long failsafe_selector, unsigned long failsafe_address)
 {
@@ -348,7 +348,7 @@ int cf_check compat_set_callbacks(
 
 #endif /* CONFIG_PV32 */
 
-long cf_check do_set_trap_table(XEN_GUEST_HANDLE_PARAM(const_trap_info_t) traps)
+long do_set_trap_table(XEN_GUEST_HANDLE_PARAM(const_trap_info_t) traps)
 {
     struct trap_info cur;
     struct vcpu *curr = current;
@@ -394,7 +394,7 @@ long cf_check do_set_trap_table(XEN_GUEST_HANDLE_PARAM(const_trap_info_t) traps)
 }
 
 #ifdef CONFIG_PV32
-int cf_check compat_set_trap_table(XEN_GUEST_HANDLE(trap_info_compat_t) traps)
+int compat_set_trap_table(XEN_GUEST_HANDLE(trap_info_compat_t) traps)
 {
     struct vcpu *curr = current;
     struct compat_trap_info cur;
@@ -437,7 +437,7 @@ int cf_check compat_set_trap_table(XEN_GUEST_HANDLE(trap_info_compat_t) traps)
 }
 #endif
 
-long cf_check do_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long do_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     struct xennmi_callback cb;
     long rc = 0;
@@ -463,7 +463,7 @@ long cf_check do_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 }
 
 #ifdef CONFIG_PV32
-int cf_check compat_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+int compat_nmi_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     struct compat_nmi_callback cb;
     int rc = 0;
diff --git a/xen/arch/x86/pv/descriptor-tables.c b/xen/arch/x86/pv/descriptor-tables.c
index 653a61d0b5..b4135b450c 100644
--- a/xen/arch/x86/pv/descriptor-tables.c
+++ b/xen/arch/x86/pv/descriptor-tables.c
@@ -124,7 +124,7 @@ int pv_set_gdt(struct vcpu *v, const unsigned long frames[],
     return -EINVAL;
 }
 
-long cf_check do_set_gdt(
+long do_set_gdt(
     XEN_GUEST_HANDLE_PARAM(xen_ulong_t) frame_list, unsigned int entries)
 {
     unsigned int nr_frames = DIV_ROUND_UP(entries, 512);
@@ -151,7 +151,7 @@ long cf_check do_set_gdt(
 
 #ifdef CONFIG_PV32
 
-int cf_check compat_set_gdt(
+int compat_set_gdt(
     XEN_GUEST_HANDLE_PARAM(uint) frame_list, unsigned int entries)
 {
     struct vcpu *curr = current;
@@ -187,7 +187,7 @@ int cf_check compat_set_gdt(
     return ret;
 }
 
-int cf_check compat_update_descriptor(
+int compat_update_descriptor(
     uint32_t pa_lo, uint32_t pa_hi, uint32_t desc_lo, uint32_t desc_hi)
 {
     seg_desc_t d;
@@ -299,7 +299,7 @@ int validate_segdesc_page(struct page_info *page)
     return i == 512 ? 0 : -EINVAL;
 }
 
-long cf_check do_update_descriptor(uint64_t gaddr, seg_desc_t d)
+long do_update_descriptor(uint64_t gaddr, seg_desc_t d)
 {
     struct domain *currd = current->domain;
     gfn_t gfn = gaddr_to_gfn(gaddr);
diff --git a/xen/arch/x86/pv/iret.c b/xen/arch/x86/pv/iret.c
index 58de9f7922..316a23e77e 100644
--- a/xen/arch/x86/pv/iret.c
+++ b/xen/arch/x86/pv/iret.c
@@ -49,7 +49,7 @@ static void async_exception_cleanup(struct vcpu *curr)
         curr->arch.async_exception_state(trap).old_mask;
 }
 
-long cf_check do_iret(void)
+long do_iret(void)
 {
     struct cpu_user_regs *regs = guest_cpu_user_regs();
     struct iret_context iret_saved;
@@ -106,7 +106,7 @@ long cf_check do_iret(void)
 }
 
 #ifdef CONFIG_PV32
-int cf_check compat_iret(void)
+int compat_iret(void)
 {
     struct cpu_user_regs *regs = guest_cpu_user_regs();
     struct vcpu *v = current;
diff --git a/xen/arch/x86/pv/misc-hypercalls.c b/xen/arch/x86/pv/misc-hypercalls.c
index 635f5a644a..aaaf70eb63 100644
--- a/xen/arch/x86/pv/misc-hypercalls.c
+++ b/xen/arch/x86/pv/misc-hypercalls.c
@@ -23,12 +23,12 @@
 
 #include <asm/debugreg.h>
 
-long cf_check do_set_debugreg(int reg, unsigned long value)
+long do_set_debugreg(int reg, unsigned long value)
 {
     return set_debugreg(current, reg, value);
 }
 
-long cf_check do_get_debugreg(int reg)
+long do_get_debugreg(int reg)
 {
     /* Avoid implementation defined behavior casting unsigned long to long. */
     union {
@@ -40,7 +40,7 @@ long cf_check do_get_debugreg(int reg)
     return res == X86EMUL_OKAY ? u.ret : -ENODEV;
 }
 
-long cf_check do_fpu_taskswitch(int set)
+long do_fpu_taskswitch(int set)
 {
     struct vcpu *v = current;
 
@@ -175,7 +175,7 @@ long set_debugreg(struct vcpu *v, unsigned int reg, unsigned long value)
     return 0;
 }
 
-long cf_check do_stack_switch(unsigned long ss, unsigned long esp)
+long do_stack_switch(unsigned long ss, unsigned long esp)
 {
     fixup_guest_stack_selector(current->domain, ss);
     current->arch.pv.kernel_ss = ss;
@@ -184,7 +184,7 @@ long cf_check do_stack_switch(unsigned long ss, unsigned long esp)
     return 0;
 }
 
-long cf_check do_set_segment_base(unsigned int which, unsigned long base)
+long do_set_segment_base(unsigned int which, unsigned long base)
 {
     struct vcpu *v = current;
     long ret = 0;
diff --git a/xen/arch/x86/pv/shim.c b/xen/arch/x86/pv/shim.c
index 2ee290a392..2b74fea181 100644
--- a/xen/arch/x86/pv/shim.c
+++ b/xen/arch/x86/pv/shim.c
@@ -824,7 +824,7 @@ long pv_shim_grant_table_op(unsigned int cmd,
 
 #ifndef CONFIG_GRANT_TABLE
 /* Thin wrapper(s) needed. */
-long cf_check do_grant_table_op(
+long do_grant_table_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) uop, unsigned int count)
 {
     if ( !pv_shim )
@@ -834,7 +834,7 @@ long cf_check do_grant_table_op(
 }
 
 #ifdef CONFIG_PV32
-int cf_check compat_grant_table_op(
+int compat_grant_table_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) uop, unsigned int count)
 {
     if ( !pv_shim )
diff --git a/xen/arch/x86/x86_64/compat/mm.c b/xen/arch/x86/x86_64/compat/mm.c
index 70b08a832a..d54efaad21 100644
--- a/xen/arch/x86/x86_64/compat/mm.c
+++ b/xen/arch/x86/x86_64/compat/mm.c
@@ -177,7 +177,7 @@ int compat_arch_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 #ifdef CONFIG_PV
 DEFINE_XEN_GUEST_HANDLE(mmuext_op_compat_t);
 
-int cf_check compat_mmuext_op(
+int compat_mmuext_op(
     XEN_GUEST_HANDLE_PARAM(void) arg, unsigned int count,
     XEN_GUEST_HANDLE_PARAM(uint) pdone, unsigned int foreigndom)
 {
diff --git a/xen/arch/x86/x86_64/domain.c b/xen/arch/x86/x86_64/domain.c
index 9c559aa3ea..62fe51ee74 100644
--- a/xen/arch/x86/x86_64/domain.c
+++ b/xen/arch/x86/x86_64/domain.c
@@ -12,7 +12,7 @@
 CHECK_vcpu_get_physid;
 #undef xen_vcpu_get_physid
 
-int cf_check
+int
 compat_vcpu_op(int cmd, unsigned int vcpuid, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     int rc;
diff --git a/xen/common/argo.c b/xen/common/argo.c
index 26a01c2188..748b8714d6 100644
--- a/xen/common/argo.c
+++ b/xen/common/argo.c
@@ -2069,7 +2069,7 @@ sendv(struct domain *src_d, xen_argo_addr_t *src_addr,
     return ( ret < 0 ) ? ret : len;
 }
 
-long cf_check
+long
 do_argo_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg1,
            XEN_GUEST_HANDLE_PARAM(void) arg2, unsigned long raw_arg3,
            unsigned long raw_arg4)
@@ -2207,7 +2207,7 @@ do_argo_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg1,
 }
 
 #ifdef CONFIG_COMPAT
-int cf_check
+int
 compat_argo_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) arg1,
                XEN_GUEST_HANDLE_PARAM(void) arg2, unsigned long arg3,
                unsigned long arg4)
diff --git a/xen/common/compat/grant_table.c b/xen/common/compat/grant_table.c
index d5787e3719..4705ee5f76 100644
--- a/xen/common/compat/grant_table.c
+++ b/xen/common/compat/grant_table.c
@@ -56,7 +56,7 @@ CHECK_gnttab_swap_grant_ref;
 CHECK_gnttab_cache_flush;
 #undef xen_gnttab_cache_flush
 
-int cf_check compat_grant_table_op(
+int compat_grant_table_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) cmp_uop, unsigned int count)
 {
     int rc = 0;
diff --git a/xen/common/compat/kernel.c b/xen/common/compat/kernel.c
index 8e8c413bf1..804b919bdc 100644
--- a/xen/common/compat/kernel.c
+++ b/xen/common/compat/kernel.c
@@ -37,7 +37,7 @@ CHECK_TYPE(capabilities_info);
 
 CHECK_TYPE(domain_handle);
 
-#define DO(fn) int cf_check compat_##fn
+#define DO(fn) int compat_##fn
 #define COMPAT
 
 #include "../kernel.c"
diff --git a/xen/common/compat/memory.c b/xen/common/compat/memory.c
index 077ded4a75..ce1de1b307 100644
--- a/xen/common/compat/memory.c
+++ b/xen/common/compat/memory.c
@@ -53,8 +53,7 @@ static int cf_check get_reserved_device_memory(
 }
 #endif
 
-int cf_check compat_memory_op(
-    unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) compat)
+int compat_memory_op(unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) compat)
 {
     struct vcpu *curr = current;
     struct domain *currd = curr->domain;
diff --git a/xen/common/dm.c b/xen/common/dm.c
index fcb3a1aa05..201b652deb 100644
--- a/xen/common/dm.c
+++ b/xen/common/dm.c
@@ -19,7 +19,7 @@
 #include <xen/hypercall.h>
 #include <xen/nospec.h>
 
-long cf_check do_dm_op(
+long do_dm_op(
     domid_t domid, unsigned int nr_bufs,
     XEN_GUEST_HANDLE_PARAM(xen_dm_op_buf_t) bufs)
 {
diff --git a/xen/common/domain.c b/xen/common/domain.c
index 70747c02e6..2f8efbb6d8 100644
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -1754,7 +1754,7 @@ long common_vcpu_op(int cmd, struct vcpu *v, XEN_GUEST_HANDLE_PARAM(void) arg)
 }
 
 #ifdef arch_vm_assist_valid_mask
-long cf_check do_vm_assist(unsigned int cmd, unsigned int type)
+long do_vm_assist(unsigned int cmd, unsigned int type)
 {
     struct domain *currd = current->domain;
     const unsigned long valid = arch_vm_assist_valid_mask(currd);
diff --git a/xen/common/domctl.c b/xen/common/domctl.c
index 9606fa4f1a..879a2adcbe 100644
--- a/xen/common/domctl.c
+++ b/xen/common/domctl.c
@@ -274,7 +274,7 @@ static struct vnuma_info *vnuma_init(const struct xen_domctl_vnuma *uinfo,
     return ERR_PTR(ret);
 }
 
-long cf_check do_domctl(XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl)
+long do_domctl(XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl)
 {
     long ret = 0;
     bool_t copyback = 0;
diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c
index 0a82eb3ac2..5e2420fa12 100644
--- a/xen/common/event_channel.c
+++ b/xen/common/event_channel.c
@@ -1191,7 +1191,7 @@ static int evtchn_set_priority(const struct evtchn_set_priority *set_priority)
     return ret;
 }
 
-long cf_check do_event_channel_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long do_event_channel_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     int rc;
 
diff --git a/xen/common/grant_table.c b/xen/common/grant_table.c
index febbe12eab..c71d3ad24b 100644
--- a/xen/common/grant_table.c
+++ b/xen/common/grant_table.c
@@ -3559,8 +3559,7 @@ gnttab_cache_flush(XEN_GUEST_HANDLE_PARAM(gnttab_cache_flush_t) uop,
     return 0;
 }
 
-long cf_check
-do_grant_table_op(
+long do_grant_table_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(void) uop, unsigned int count)
 {
     long rc;
diff --git a/xen/common/hypfs.c b/xen/common/hypfs.c
index 0d22396f5d..acd258edf2 100644
--- a/xen/common/hypfs.c
+++ b/xen/common/hypfs.c
@@ -670,7 +670,7 @@ static int hypfs_write(struct hypfs_entry *entry,
     return entry->funcs->write(l, uaddr, ulen);
 }
 
-long cf_check do_hypfs_op(
+long do_hypfs_op(
     unsigned int cmd, XEN_GUEST_HANDLE_PARAM(const_char) arg1,
     unsigned long arg2, XEN_GUEST_HANDLE_PARAM(void) arg3, unsigned long arg4)
 {
diff --git a/xen/common/kernel.c b/xen/common/kernel.c
index adff2d2c77..08bdae082a 100644
--- a/xen/common/kernel.c
+++ b/xen/common/kernel.c
@@ -451,7 +451,7 @@ static int __init cf_check param_init(void)
 __initcall(param_init);
 #endif
 
-# define DO(fn) long cf_check do_##fn
+# define DO(fn) long do_##fn
 
 #endif
 
diff --git a/xen/common/kexec.c b/xen/common/kexec.c
index 41669964d2..7095651605 100644
--- a/xen/common/kexec.c
+++ b/xen/common/kexec.c
@@ -1265,13 +1265,13 @@ static int do_kexec_op_internal(unsigned int op,
     return ret;
 }
 
-long cf_check do_kexec_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg)
+long do_kexec_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg)
 {
     return do_kexec_op_internal(op, uarg, 0);
 }
 
 #ifdef CONFIG_COMPAT
-int cf_check compat_kexec_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg)
+int compat_kexec_op(unsigned int op, XEN_GUEST_HANDLE_PARAM(void) uarg)
 {
     return do_kexec_op_internal(op, uarg, 1);
 }
diff --git a/xen/common/memory.c b/xen/common/memory.c
index 69b0cd1e50..963f4df1b6 100644
--- a/xen/common/memory.c
+++ b/xen/common/memory.c
@@ -1367,7 +1367,7 @@ static int acquire_resource(
     return rc;
 }
 
-long cf_check do_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+long do_memory_op(unsigned long cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     struct domain *d, *curr_d = current->domain;
     long rc;
diff --git a/xen/common/multicall.c b/xen/common/multicall.c
index 9db49092b4..1f0cc4cb26 100644
--- a/xen/common/multicall.c
+++ b/xen/common/multicall.c
@@ -33,8 +33,7 @@ static void trace_multicall_call(multicall_entry_t *call)
     __trace_multicall_call(call);
 }
 
-ret_t cf_check
-do_multicall(
+ret_t do_multicall(
     XEN_GUEST_HANDLE_PARAM(multicall_entry_t) call_list, uint32_t nr_calls)
 {
     struct vcpu *curr = current;
diff --git a/xen/common/sched/compat.c b/xen/common/sched/compat.c
index 66ba0fe88f..040b4caca2 100644
--- a/xen/common/sched/compat.c
+++ b/xen/common/sched/compat.c
@@ -39,7 +39,7 @@ static int compat_poll(struct compat_sched_poll *compat)
 
 #include "core.c"
 
-int cf_check compat_set_timer_op(u32 lo, s32 hi)
+int compat_set_timer_op(u32 lo, s32 hi)
 {
     return do_set_timer_op(((s64)hi << 32) | lo);
 }
diff --git a/xen/common/sched/core.c b/xen/common/sched/core.c
index 19ab678181..25885b5640 100644
--- a/xen/common/sched/core.c
+++ b/xen/common/sched/core.c
@@ -1862,7 +1862,7 @@ typedef long ret_t;
 
 #endif /* !COMPAT */
 
-ret_t cf_check do_sched_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
+ret_t do_sched_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     ret_t ret = 0;
 
@@ -1999,7 +1999,7 @@ ret_t cf_check do_sched_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
 #ifndef COMPAT
 
 /* Per-vcpu oneshot-timer hypercall. */
-long cf_check do_set_timer_op(s_time_t timeout)
+long do_set_timer_op(s_time_t timeout)
 {
     struct vcpu *v = current;
     s_time_t offset = timeout - NOW();
diff --git a/xen/common/sysctl.c b/xen/common/sysctl.c
index fc4a0b31d6..1ad3c29351 100644
--- a/xen/common/sysctl.c
+++ b/xen/common/sysctl.c
@@ -29,7 +29,7 @@
 #include <xen/livepatch.h>
 #include <xen/coverage.h>
 
-long cf_check do_sysctl(XEN_GUEST_HANDLE_PARAM(xen_sysctl_t) u_sysctl)
+long do_sysctl(XEN_GUEST_HANDLE_PARAM(xen_sysctl_t) u_sysctl)
 {
     long ret = 0;
     int copyback = -1;
diff --git a/xen/common/xenoprof.c b/xen/common/xenoprof.c
index af617f1d0b..1926a92fe4 100644
--- a/xen/common/xenoprof.c
+++ b/xen/common/xenoprof.c
@@ -721,7 +721,7 @@ static int xenoprof_op_get_buffer(XEN_GUEST_HANDLE_PARAM(void) arg)
                       || (op == XENOPROF_disable_virq)  \
                       || (op == XENOPROF_get_buffer))
  
-ret_t cf_check do_xenoprof_op(int op, XEN_GUEST_HANDLE_PARAM(void) arg)
+ret_t do_xenoprof_op(int op, XEN_GUEST_HANDLE_PARAM(void) arg)
 {
     int ret = 0;
     
diff --git a/xen/drivers/char/console.c b/xen/drivers/char/console.c
index d9d6556c22..c53fe30313 100644
--- a/xen/drivers/char/console.c
+++ b/xen/drivers/char/console.c
@@ -675,7 +675,7 @@ static long guest_console_write(XEN_GUEST_HANDLE_PARAM(char) buffer,
     return 0;
 }
 
-long cf_check do_console_io(
+long do_console_io(
     unsigned int cmd, unsigned int count, XEN_GUEST_HANDLE_PARAM(char) buffer)
 {
     long rc;
diff --git a/xen/scripts/gen_hypercall.awk b/xen/scripts/gen_hypercall.awk
index 403758be21..34840c514f 100644
--- a/xen/scripts/gen_hypercall.awk
+++ b/xen/scripts/gen_hypercall.awk
@@ -226,7 +226,7 @@ END {
     # Generate prototypes
     for (i = 1; i <= n; i++) {
         for (p = 1; p <= n_pre[i]; p++) {
-            printf("%s cf_check %s_%s(", rettype[pre[i, p]], pre[i, p], fn[i]);
+            printf("%s %s_%s(", rettype[pre[i, p]], pre[i, p], fn[i]);
             if (n_args[i] == 0)
                 printf("void");
             else
diff --git a/xen/xsm/xsm_core.c b/xen/xsm/xsm_core.c
index 2286a502e3..eaa028109b 100644
--- a/xen/xsm/xsm_core.c
+++ b/xen/xsm/xsm_core.c
@@ -219,13 +219,13 @@ bool __init has_xsm_magic(paddr_t start)
 
 #endif
 
-long cf_check do_xsm_op(XEN_GUEST_HANDLE_PARAM(void) op)
+long do_xsm_op(XEN_GUEST_HANDLE_PARAM(void) op)
 {
     return xsm_do_xsm_op(op);
 }
 
 #ifdef CONFIG_COMPAT
-int cf_check compat_xsm_op(XEN_GUEST_HANDLE_PARAM(void) op)
+int compat_xsm_op(XEN_GUEST_HANDLE_PARAM(void) op)
 {
     return xsm_do_compat_op(op);
 }
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 14:01:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 14:01:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294336.500492 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO2E-0001mh-BT; Thu, 24 Mar 2022 14:01:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294336.500492; Thu, 24 Mar 2022 14:01:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO2D-0001iZ-Py; Thu, 24 Mar 2022 14:01:53 +0000
Received: by outflank-mailman (input) for mailman id 294336;
 Thu, 24 Mar 2022 14:01:49 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=+IHq=UD=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXO29-0008Hw-5l
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 14:01:49 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f0947272-ab7a-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 15:01:45 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 234FB215FF;
 Thu, 24 Mar 2022 14:01:45 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id E333212FF7;
 Thu, 24 Mar 2022 14:01:44 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id 0CRDNsh5PGKeegAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 24 Mar 2022 14:01:44 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f0947272-ab7a-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648130505; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=jxFsIOim8YQwQdGouIeDKfpkYqPTH+rehYL0W8dRFU0=;
	b=XwA2NDF81PPaykKIOa4D2PZe3tgejT1O13qnSl5Wfw8yFU9DOn/uP4wlglLsxf2qHbDwl8
	v5bVB5qvzl7GKkKpz3EEOFf+9HsqUWDCwkljzaDkLdjUgtG3MEs8eH+2JW+UvbtbcHLZ73
	/1GL2hMNC8DEW12rgDpKtWBb0/buR7k=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>
Subject: [PATCH v6 7/9] xen/x86: call hypercall handlers via generated macro
Date: Thu, 24 Mar 2022 15:01:37 +0100
Message-Id: <20220324140139.5899-8-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
In-Reply-To: <20220324140139.5899-1-jgross@suse.com>
References: <20220324140139.5899-1-jgross@suse.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Instead of using a function table use the generated macros for calling
the appropriate hypercall handlers.

This is beneficial to performance and avoids speculation issues.

With calling the handlers using the correct number of parameters now
it is possible to do the parameter register clobbering in the NDEBUG
case after returning from the handler. With the additional generated
data the hard coded hypercall_args_table[] can be replaced by tables
using the generated number of parameters.

Note that this change modifies behavior of clobbering registers in a
minor way: in case a hypercall is returning -ENOSYS (or the unsigned
equivalent thereof) for any reason the parameter registers will no
longer be clobbered. This should be of no real concern, as those cases
ought to be extremely rare and reuse of the registers in those cases
seems rather far fetched.

Signed-off-by: Juergen Gross <jgross@suse.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
---
V2:
- make hypercall_args_*[] const (Jan Beulich)
- make clobber_regs*() independent from NDEBUG (Jan Beulich)
- drop "L" suffix for 32-bit register clobber value (Jan Beulich)
V3:
- add array_access_nospec() (Jan Beulich)
- remove local variables in hvm_hypercall() (Andrew Cooper)
---
 xen/arch/x86/hvm/hypercall.c         | 166 +++---------------------
 xen/arch/x86/hypercall.c             |  59 ---------
 xen/arch/x86/include/asm/hypercall.h |  55 ++++++--
 xen/arch/x86/pv/hypercall.c          | 184 +++------------------------
 4 files changed, 76 insertions(+), 388 deletions(-)

diff --git a/xen/arch/x86/hvm/hypercall.c b/xen/arch/x86/hvm/hypercall.c
index a9c9ad721f..ae601185fc 100644
--- a/xen/arch/x86/hvm/hypercall.c
+++ b/xen/arch/x86/hvm/hypercall.c
@@ -111,56 +111,10 @@ long cf_check hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg)
         return compat_physdev_op(cmd, arg);
 }
 
-#define HYPERCALL(x)                                         \
-    [ __HYPERVISOR_ ## x ] = { (hypercall_fn_t *) do_ ## x,  \
-                               (hypercall_fn_t *) do_ ## x }
-
-#define HVM_CALL(x)                                          \
-    [ __HYPERVISOR_ ## x ] = { (hypercall_fn_t *) hvm_ ## x, \
-                               (hypercall_fn_t *) hvm_ ## x }
-
-#define COMPAT_CALL(x)                                       \
-    [ __HYPERVISOR_ ## x ] = { (hypercall_fn_t *) do_ ## x,  \
-                               (hypercall_fn_t *) compat_ ## x }
-
-static const struct {
-    hypercall_fn_t *native, *compat;
-} hvm_hypercall_table[] = {
-    HVM_CALL(memory_op),
-    COMPAT_CALL(multicall),
-#ifdef CONFIG_GRANT_TABLE
-    HVM_CALL(grant_table_op),
-#endif
-    HYPERCALL(vm_assist),
-    COMPAT_CALL(vcpu_op),
-    HVM_CALL(physdev_op),
-    COMPAT_CALL(xen_version),
-    HYPERCALL(console_io),
-    HYPERCALL(event_channel_op),
-    COMPAT_CALL(sched_op),
-    COMPAT_CALL(set_timer_op),
-    COMPAT_CALL(xsm_op),
-    HYPERCALL(hvm_op),
-    HYPERCALL(sysctl),
-    HYPERCALL(domctl),
-#ifdef CONFIG_ARGO
-    COMPAT_CALL(argo_op),
-#endif
-    COMPAT_CALL(platform_op),
-#ifdef CONFIG_PV
-    COMPAT_CALL(mmuext_op),
-#endif
-    HYPERCALL(xenpmu_op),
-    COMPAT_CALL(dm_op),
-#ifdef CONFIG_HYPFS
-    HYPERCALL(hypfs_op),
+#ifndef NDEBUG
+static const unsigned char hypercall_args_64[] = hypercall_args_hvm64;
+static const unsigned char hypercall_args_32[] = hypercall_args_hvm32;
 #endif
-    HYPERCALL(paging_domctl_cont)
-};
-
-#undef HYPERCALL
-#undef HVM_CALL
-#undef COMPAT_CALL
 
 int hvm_hypercall(struct cpu_user_regs *regs)
 {
@@ -206,23 +160,6 @@ int hvm_hypercall(struct cpu_user_regs *regs)
         return ret;
     }
 
-    BUILD_BUG_ON(ARRAY_SIZE(hvm_hypercall_table) >
-                 ARRAY_SIZE(hypercall_args_table));
-
-    if ( eax >= ARRAY_SIZE(hvm_hypercall_table) )
-    {
-        regs->rax = -ENOSYS;
-        return HVM_HCALL_completed;
-    }
-
-    eax = array_index_nospec(eax, ARRAY_SIZE(hvm_hypercall_table));
-
-    if ( !hvm_hypercall_table[eax].native )
-    {
-        regs->rax = -ENOSYS;
-        return HVM_HCALL_completed;
-    }
-
     /*
      * Caching is intended for instruction emulation only. Disable it
      * for any accesses by hypercall argument copy-in / copy-out.
@@ -233,85 +170,27 @@ int hvm_hypercall(struct cpu_user_regs *regs)
 
     if ( mode == 8 )
     {
-        unsigned long rdi = regs->rdi;
-        unsigned long rsi = regs->rsi;
-        unsigned long rdx = regs->rdx;
-        unsigned long r10 = regs->r10;
-        unsigned long r8 = regs->r8;
-
         HVM_DBG_LOG(DBG_LEVEL_HCALL, "hcall%lu(%lx, %lx, %lx, %lx, %lx)",
-                    eax, rdi, rsi, rdx, r10, r8);
-
-#ifndef NDEBUG
-        /* Deliberately corrupt parameter regs not used by this hypercall. */
-        switch ( hypercall_args_table[eax].native )
-        {
-        case 0: rdi = 0xdeadbeefdeadf00dUL; fallthrough;
-        case 1: rsi = 0xdeadbeefdeadf00dUL; fallthrough;
-        case 2: rdx = 0xdeadbeefdeadf00dUL; fallthrough;
-        case 3: r10 = 0xdeadbeefdeadf00dUL; fallthrough;
-        case 4: r8 = 0xdeadbeefdeadf00dUL;
-        }
-#endif
+                    eax, regs->rdi, regs->rsi, regs->rdx, regs->r10, regs->r8);
 
-        regs->rax = hvm_hypercall_table[eax].native(rdi, rsi, rdx, r10, r8);
+        call_handlers_hvm64(eax, regs->rax, regs->rdi, regs->rsi, regs->rdx,
+                            regs->r10, regs->r8);
 
-#ifndef NDEBUG
-        if ( !curr->hcall_preempted )
-        {
-            /* Deliberately corrupt parameter regs used by this hypercall. */
-            switch ( hypercall_args_table[eax].native )
-            {
-            case 5: regs->r8  = 0xdeadbeefdeadf00dUL; fallthrough;
-            case 4: regs->r10 = 0xdeadbeefdeadf00dUL; fallthrough;
-            case 3: regs->rdx = 0xdeadbeefdeadf00dUL; fallthrough;
-            case 2: regs->rsi = 0xdeadbeefdeadf00dUL; fallthrough;
-            case 1: regs->rdi = 0xdeadbeefdeadf00dUL;
-            }
-        }
-#endif
+        if ( !curr->hcall_preempted && regs->rax != -ENOSYS )
+            clobber_regs(regs, get_nargs(hypercall_args_64, eax));
     }
     else
     {
-        unsigned int ebx = regs->ebx;
-        unsigned int ecx = regs->ecx;
-        unsigned int edx = regs->edx;
-        unsigned int esi = regs->esi;
-        unsigned int edi = regs->edi;
-
         HVM_DBG_LOG(DBG_LEVEL_HCALL, "hcall%lu(%x, %x, %x, %x, %x)", eax,
-                    ebx, ecx, edx, esi, edi);
-
-#ifndef NDEBUG
-        /* Deliberately corrupt parameter regs not used by this hypercall. */
-        switch ( hypercall_args_table[eax].compat )
-        {
-        case 0: ebx = 0xdeadf00d; fallthrough;
-        case 1: ecx = 0xdeadf00d; fallthrough;
-        case 2: edx = 0xdeadf00d; fallthrough;
-        case 3: esi = 0xdeadf00d; fallthrough;
-        case 4: edi = 0xdeadf00d;
-        }
-#endif
+                    regs->ebx, regs->ecx, regs->edx, regs->esi, regs->edi);
 
         curr->hcall_compat = true;
-        regs->eax = hvm_hypercall_table[eax].compat(ebx, ecx, edx, esi, edi);
+        call_handlers_hvm32(eax, regs->eax, regs->ebx, regs->ecx, regs->edx,
+                            regs->esi, regs->edi);
         curr->hcall_compat = false;
 
-#ifndef NDEBUG
-        if ( !curr->hcall_preempted )
-        {
-            /* Deliberately corrupt parameter regs used by this hypercall. */
-            switch ( hypercall_args_table[eax].compat )
-            {
-            case 5: regs->rdi = 0xdeadf00d; fallthrough;
-            case 4: regs->rsi = 0xdeadf00d; fallthrough;
-            case 3: regs->rdx = 0xdeadf00d; fallthrough;
-            case 2: regs->rcx = 0xdeadf00d; fallthrough;
-            case 1: regs->rbx = 0xdeadf00d;
-            }
-        }
-#endif
+        if ( !curr->hcall_preempted && regs->eax != -ENOSYS )
+            clobber_regs32(regs, get_nargs(hypercall_args_32, eax));
     }
 
     hvmemul_cache_restore(curr, token);
@@ -332,31 +211,20 @@ int hvm_hypercall(struct cpu_user_regs *regs)
 enum mc_disposition hvm_do_multicall_call(struct mc_state *state)
 {
     struct vcpu *curr = current;
-    hypercall_fn_t *func = NULL;
 
     if ( hvm_guest_x86_mode(curr) == 8 )
     {
         struct multicall_entry *call = &state->call;
 
-        if ( call->op < ARRAY_SIZE(hvm_hypercall_table) )
-            func = array_access_nospec(hvm_hypercall_table, call->op).native;
-        if ( func )
-            call->result = func(call->args[0], call->args[1], call->args[2],
-                                call->args[3], call->args[4]);
-        else
-            call->result = -ENOSYS;
+        call_handlers_hvm64(call->op, call->result, call->args[0], call->args[1],
+                            call->args[2], call->args[3], call->args[4]);
     }
     else
     {
         struct compat_multicall_entry *call = &state->compat_call;
 
-        if ( call->op < ARRAY_SIZE(hvm_hypercall_table) )
-            func = array_access_nospec(hvm_hypercall_table, call->op).compat;
-        if ( func )
-            call->result = func(call->args[0], call->args[1], call->args[2],
-                                call->args[3], call->args[4]);
-        else
-            call->result = -ENOSYS;
+        call_handlers_hvm32(call->op, call->result, call->args[0], call->args[1],
+                            call->args[2], call->args[3], call->args[4]);
     }
 
     return !hvm_get_cpl(curr) ? mc_continue : mc_preempt;
diff --git a/xen/arch/x86/hypercall.c b/xen/arch/x86/hypercall.c
index 07e1a45ef5..6b73cff9b9 100644
--- a/xen/arch/x86/hypercall.c
+++ b/xen/arch/x86/hypercall.c
@@ -22,65 +22,6 @@
 #include <xen/hypercall.h>
 #include <asm/multicall.h>
 
-#ifdef CONFIG_COMPAT
-#define ARGS(x, n)                              \
-    [ __HYPERVISOR_ ## x ] = { n, n }
-#define COMP(x, n, c)                           \
-    [ __HYPERVISOR_ ## x ] = { n, c }
-#else
-#define ARGS(x, n)    [ __HYPERVISOR_ ## x ] = { n }
-#define COMP(x, n, c) ARGS(x, n)
-#endif
-
-const hypercall_args_t hypercall_args_table[NR_hypercalls] =
-{
-    ARGS(set_trap_table, 1),
-    ARGS(mmu_update, 4),
-    ARGS(set_gdt, 2),
-    ARGS(stack_switch, 2),
-    COMP(set_callbacks, 3, 4),
-    ARGS(fpu_taskswitch, 1),
-    ARGS(sched_op_compat, 2),
-    ARGS(platform_op, 1),
-    ARGS(set_debugreg, 2),
-    ARGS(get_debugreg, 1),
-    COMP(update_descriptor, 2, 4),
-    ARGS(memory_op, 2),
-    ARGS(multicall, 2),
-    COMP(update_va_mapping, 3, 4),
-    COMP(set_timer_op, 1, 2),
-    ARGS(event_channel_op_compat, 1),
-    ARGS(xen_version, 2),
-    ARGS(console_io, 3),
-    ARGS(physdev_op_compat, 1),
-    ARGS(grant_table_op, 3),
-    ARGS(vm_assist, 2),
-    COMP(update_va_mapping_otherdomain, 4, 5),
-    ARGS(vcpu_op, 3),
-    COMP(set_segment_base, 2, 0),
-    ARGS(mmuext_op, 4),
-    ARGS(xsm_op, 1),
-    ARGS(nmi_op, 2),
-    ARGS(sched_op, 2),
-    ARGS(callback_op, 2),
-    ARGS(xenoprof_op, 2),
-    ARGS(event_channel_op, 2),
-    ARGS(physdev_op, 2),
-    ARGS(sysctl, 1),
-    ARGS(domctl, 1),
-    ARGS(kexec_op, 2),
-    ARGS(argo_op, 5),
-    ARGS(xenpmu_op, 2),
-    ARGS(hvm_op, 2),
-    ARGS(dm_op, 3),
-    ARGS(hypfs_op, 5),
-    ARGS(mca, 1),
-    ARGS(paging_domctl_cont, 1),
-};
-
-#undef COMP
-#undef ARGS
-
 #define NEXT_ARG(fmt, args)                                                 \
 ({                                                                          \
     unsigned long __arg;                                                    \
diff --git a/xen/arch/x86/include/asm/hypercall.h b/xen/arch/x86/include/asm/hypercall.h
index 2d243b48bc..ab8bd12e60 100644
--- a/xen/arch/x86/include/asm/hypercall.h
+++ b/xen/arch/x86/include/asm/hypercall.h
@@ -17,19 +17,6 @@
 
 #define __HYPERVISOR_paging_domctl_cont __HYPERVISOR_arch_1
 
-typedef unsigned long hypercall_fn_t(
-    unsigned long, unsigned long, unsigned long,
-    unsigned long, unsigned long);
-
-typedef struct {
-    uint8_t native;
-#ifdef CONFIG_COMPAT
-    uint8_t compat;
-#endif
-} hypercall_args_t;
-
-extern const hypercall_args_t hypercall_args_table[NR_hypercalls];
-
 #ifdef CONFIG_PV
 void pv_hypercall(struct cpu_user_regs *regs);
 #endif
@@ -56,4 +43,46 @@ compat_common_vcpu_op(
 
 #endif /* CONFIG_COMPAT */
 
+#ifndef NDEBUG
+static inline unsigned int _get_nargs(const unsigned char *tbl, unsigned int c)
+{
+    return tbl[c];
+}
+#define get_nargs(t, c) _get_nargs(t, array_index_nospec(c, ARRAY_SIZE(t)))
+#else
+#define get_nargs(tbl, c) 0
+#endif
+
+static inline void clobber_regs(struct cpu_user_regs *regs,
+                                unsigned int nargs)
+{
+#ifndef NDEBUG
+    /* Deliberately corrupt used parameter regs. */
+    switch ( nargs )
+    {
+    case 5: regs->r8  = 0xdeadbeefdeadf00dUL; fallthrough;
+    case 4: regs->r10 = 0xdeadbeefdeadf00dUL; fallthrough;
+    case 3: regs->rdx = 0xdeadbeefdeadf00dUL; fallthrough;
+    case 2: regs->rsi = 0xdeadbeefdeadf00dUL; fallthrough;
+    case 1: regs->rdi = 0xdeadbeefdeadf00dUL;
+    }
+#endif
+}
+
+static inline void clobber_regs32(struct cpu_user_regs *regs,
+                                  unsigned int nargs)
+{
+#ifndef NDEBUG
+    /* Deliberately corrupt used parameter regs. */
+    switch ( nargs )
+    {
+    case 5: regs->edi = 0xdeadf00dU; fallthrough;
+    case 4: regs->esi = 0xdeadf00dU; fallthrough;
+    case 3: regs->edx = 0xdeadf00dU; fallthrough;
+    case 2: regs->ecx = 0xdeadf00dU; fallthrough;
+    case 1: regs->ebx = 0xdeadf00dU;
+    }
+#endif
+}
+
 #endif /* __ASM_X86_HYPERCALL_H__ */
diff --git a/xen/arch/x86/pv/hypercall.c b/xen/arch/x86/pv/hypercall.c
index fe8dfe9e8f..bf64bb41bb 100644
--- a/xen/arch/x86/pv/hypercall.c
+++ b/xen/arch/x86/pv/hypercall.c
@@ -27,119 +27,22 @@
 #include <asm/multicall.h>
 #include <irq_vectors.h>
 
-typedef struct {
-    hypercall_fn_t *native;
-#ifdef CONFIG_PV32
-    hypercall_fn_t *compat;
-#endif
-} pv_hypercall_table_t;
-
+#ifndef NDEBUG
+static const unsigned char hypercall_args_64[] = hypercall_args_pv64;
 #ifdef CONFIG_PV32
-#define HYPERCALL(x)                                                \
-    [ __HYPERVISOR_ ## x ] = { (hypercall_fn_t *) do_ ## x,         \
-                               (hypercall_fn_t *) do_ ## x }
-#define COMPAT_CALL(x)                                              \
-    [ __HYPERVISOR_ ## x ] = { (hypercall_fn_t *) do_ ## x,         \
-                               (hypercall_fn_t *) compat_ ## x }
-#else
-#define HYPERCALL(x)                                                \
-    [ __HYPERVISOR_ ## x ] = { (hypercall_fn_t *) do_ ## x }
-#define COMPAT_CALL(x) HYPERCALL(x)
-#endif
-
-static const pv_hypercall_table_t pv_hypercall_table[] = {
-    COMPAT_CALL(set_trap_table),
-    HYPERCALL(mmu_update),
-    COMPAT_CALL(set_gdt),
-    HYPERCALL(stack_switch),
-    COMPAT_CALL(set_callbacks),
-    HYPERCALL(fpu_taskswitch),
-    HYPERCALL(sched_op_compat),
-#ifndef CONFIG_PV_SHIM_EXCLUSIVE
-    COMPAT_CALL(platform_op),
-#endif
-    HYPERCALL(set_debugreg),
-    HYPERCALL(get_debugreg),
-    COMPAT_CALL(update_descriptor),
-    COMPAT_CALL(memory_op),
-    COMPAT_CALL(multicall),
-    COMPAT_CALL(update_va_mapping),
-    COMPAT_CALL(set_timer_op),
-    HYPERCALL(event_channel_op_compat),
-    COMPAT_CALL(xen_version),
-    HYPERCALL(console_io),
-    COMPAT_CALL(physdev_op_compat),
-#if defined(CONFIG_GRANT_TABLE) || defined(CONFIG_PV_SHIM)
-    COMPAT_CALL(grant_table_op),
-#endif
-    HYPERCALL(vm_assist),
-    COMPAT_CALL(update_va_mapping_otherdomain),
-    COMPAT_CALL(iret),
-    COMPAT_CALL(vcpu_op),
-    HYPERCALL(set_segment_base),
-    COMPAT_CALL(mmuext_op),
-    COMPAT_CALL(xsm_op),
-    COMPAT_CALL(nmi_op),
-    COMPAT_CALL(sched_op),
-    COMPAT_CALL(callback_op),
-#ifdef CONFIG_XENOPROF
-    COMPAT_CALL(xenoprof_op),
-#endif
-    HYPERCALL(event_channel_op),
-    COMPAT_CALL(physdev_op),
-#ifndef CONFIG_PV_SHIM_EXCLUSIVE
-    HYPERCALL(sysctl),
-    HYPERCALL(domctl),
-#endif
-#ifdef CONFIG_KEXEC
-    COMPAT_CALL(kexec_op),
+static const unsigned char hypercall_args_32[] = hypercall_args_pv32;
 #endif
-#ifdef CONFIG_ARGO
-    COMPAT_CALL(argo_op),
 #endif
-    HYPERCALL(xenpmu_op),
-#ifdef CONFIG_HVM
-    HYPERCALL(hvm_op),
-    COMPAT_CALL(dm_op),
-#endif
-#ifdef CONFIG_HYPFS
-    HYPERCALL(hypfs_op),
-#endif
-    HYPERCALL(mca),
-#ifndef CONFIG_PV_SHIM_EXCLUSIVE
-    HYPERCALL(paging_domctl_cont),
-#endif
-};
-
-#undef COMPAT_CALL
-#undef HYPERCALL
 
 /* Forced inline to cause 'compat' to be evaluated at compile time. */
 static void always_inline
 _pv_hypercall(struct cpu_user_regs *regs, bool compat)
 {
     struct vcpu *curr = current;
-    unsigned long eax = compat ? regs->eax : regs->rax;
+    unsigned long eax;
 
     ASSERT(guest_kernel_mode(curr, regs));
 
-    BUILD_BUG_ON(ARRAY_SIZE(pv_hypercall_table) >
-                 ARRAY_SIZE(hypercall_args_table));
-
-    if ( eax >= ARRAY_SIZE(pv_hypercall_table) )
-    {
-        regs->rax = -ENOSYS;
-        return;
-    }
-
-    eax = array_index_nospec(eax, ARRAY_SIZE(pv_hypercall_table));
-
-    if ( !pv_hypercall_table[eax].native )
-    {
-        regs->rax = -ENOSYS;
-        return;
-    }
-
     curr->hcall_preempted = false;
 
     if ( !compat )
@@ -150,17 +53,8 @@ _pv_hypercall(struct cpu_user_regs *regs, bool compat)
         unsigned long r10 = regs->r10;
         unsigned long r8 = regs->r8;
 
-#ifndef NDEBUG
-        /* Deliberately corrupt parameter regs not used by this hypercall. */
-        switch ( hypercall_args_table[eax].native )
-        {
-        case 0: rdi = 0xdeadbeefdeadf00dUL; fallthrough;
-        case 1: rsi = 0xdeadbeefdeadf00dUL; fallthrough;
-        case 2: rdx = 0xdeadbeefdeadf00dUL; fallthrough;
-        case 3: r10 = 0xdeadbeefdeadf00dUL; fallthrough;
-        case 4: r8 = 0xdeadbeefdeadf00dUL;
-        }
-#endif
+        eax = regs->rax;
+
         if ( unlikely(tb_init_done) )
         {
             unsigned long args[5] = { rdi, rsi, rdx, r10, r8 };
@@ -168,22 +62,10 @@ _pv_hypercall(struct cpu_user_regs *regs, bool compat)
             __trace_hypercall(TRC_PV_HYPERCALL_V2, eax, args);
         }
 
-        regs->rax = pv_hypercall_table[eax].native(rdi, rsi, rdx, r10, r8);
+        call_handlers_pv64(eax, regs->rax, rdi, rsi, rdx, r10, r8);
 
-#ifndef NDEBUG
-        if ( !curr->hcall_preempted )
-        {
-            /* Deliberately corrupt parameter regs used by this hypercall. */
-            switch ( hypercall_args_table[eax].native )
-            {
-            case 5: regs->r8  = 0xdeadbeefdeadf00dUL; fallthrough;
-            case 4: regs->r10 = 0xdeadbeefdeadf00dUL; fallthrough;
-            case 3: regs->rdx = 0xdeadbeefdeadf00dUL; fallthrough;
-            case 2: regs->rsi = 0xdeadbeefdeadf00dUL; fallthrough;
-            case 1: regs->rdi = 0xdeadbeefdeadf00dUL;
-            }
-        }
-#endif
+        if ( !curr->hcall_preempted && regs->rax != -ENOSYS )
+            clobber_regs(regs, get_nargs(hypercall_args_64, eax));
     }
 #ifdef CONFIG_PV32
     else
@@ -194,17 +76,7 @@ _pv_hypercall(struct cpu_user_regs *regs, bool compat)
         unsigned int esi = regs->esi;
         unsigned int edi = regs->edi;
 
-#ifndef NDEBUG
-        /* Deliberately corrupt parameter regs not used by this hypercall. */
-        switch ( hypercall_args_table[eax].compat )
-        {
-        case 0: ebx = 0xdeadf00d; fallthrough;
-        case 1: ecx = 0xdeadf00d; fallthrough;
-        case 2: edx = 0xdeadf00d; fallthrough;
-        case 3: esi = 0xdeadf00d; fallthrough;
-        case 4: edi = 0xdeadf00d;
-        }
-#endif
+        eax = regs->eax;
 
         if ( unlikely(tb_init_done) )
         {
@@ -214,23 +86,11 @@ _pv_hypercall(struct cpu_user_regs *regs, bool compat)
         }
 
         curr->hcall_compat = true;
-        regs->eax = pv_hypercall_table[eax].compat(ebx, ecx, edx, esi, edi);
+        call_handlers_pv32(eax, regs->eax, ebx, ecx, edx, esi, edi);
         curr->hcall_compat = false;
 
-#ifndef NDEBUG
-        if ( !curr->hcall_preempted )
-        {
-            /* Deliberately corrupt parameter regs used by this hypercall. */
-            switch ( hypercall_args_table[eax].compat )
-            {
-            case 5: regs->edi = 0xdeadf00d; fallthrough;
-            case 4: regs->esi = 0xdeadf00d; fallthrough;
-            case 3: regs->edx = 0xdeadf00d; fallthrough;
-            case 2: regs->ecx = 0xdeadf00d; fallthrough;
-            case 1: regs->ebx = 0xdeadf00d;
-            }
-        }
-#endif
+        if ( !curr->hcall_preempted && regs->eax != -ENOSYS )
+            clobber_regs32(regs, get_nargs(hypercall_args_32, eax));
     }
 #endif /* CONFIG_PV32 */
 
@@ -256,13 +116,8 @@ enum mc_disposition pv_do_multicall_call(struct mc_state *state)
         struct compat_multicall_entry *call = &state->compat_call;
 
         op = call->op;
-        if ( (op < ARRAY_SIZE(pv_hypercall_table)) &&
-             pv_hypercall_table[op].compat )
-            call->result = pv_hypercall_table[op].compat(
-                call->args[0], call->args[1], call->args[2],
-                call->args[3], call->args[4]);
-        else
-            call->result = -ENOSYS;
+        call_handlers_pv32(op, call->result, call->args[0], call->args[1],
+                           call->args[2], call->args[3], call->args[4]);
     }
     else
 #endif
@@ -270,13 +125,8 @@ enum mc_disposition pv_do_multicall_call(struct mc_state *state)
         struct multicall_entry *call = &state->call;
 
         op = call->op;
-        if ( (op < ARRAY_SIZE(pv_hypercall_table)) &&
-             pv_hypercall_table[op].native )
-            call->result = pv_hypercall_table[op].native(
-                call->args[0], call->args[1], call->args[2],
-                call->args[3], call->args[4]);
-        else
-            call->result = -ENOSYS;
+        call_handlers_pv64(op, call->result, call->args[0], call->args[1],
+                           call->args[2], call->args[3], call->args[4]);
     }
 
     return unlikely(op == __HYPERVISOR_iret)
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 14:03:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 14:03:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294347.500520 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO45-0005mB-1S; Thu, 24 Mar 2022 14:03:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294347.500520; Thu, 24 Mar 2022 14:03:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO44-0005m4-UG; Thu, 24 Mar 2022 14:03:48 +0000
Received: by outflank-mailman (input) for mailman id 294347;
 Thu, 24 Mar 2022 14:03:47 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXO43-0005lf-7j; Thu, 24 Mar 2022 14:03:47 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXO43-0004xz-3Z; Thu, 24 Mar 2022 14:03:47 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXO42-0003Jl-Rp; Thu, 24 Mar 2022 14:03:46 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXO42-0003Yb-RM; Thu, 24 Mar 2022 14:03:46 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=cKM914OaS6w5FqccdHwm09REox8FTfbUKrGcvv8S2jg=; b=xLI6zTKPGQQh1P8gRsPjnFJGUJ
	FC6rWpYaaucPo0jNjHOdL0O3mSuJ5dNbK1RbgTx2W/PBUamabcg3H02af9j0hFiwQJKCW8+zraCWO
	lMPwjfcEk02cO1ouC7Mk06kdqzZEBX/Wa1nHGIijolc6Wh+yn6Wjr0EU5vI92lXiE5QE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168818-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168818: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=42d7c3c4dae259ee72d8c834c6477597fccb4775
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 24 Mar 2022 14:03:46 +0000

flight 168818 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168818/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              42d7c3c4dae259ee72d8c834c6477597fccb4775
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  622 days
Failing since        151818  2020-07-11 04:18:52 Z  621 days  603 attempts
Testing same since   168796  2022-03-23 04:22:16 Z    1 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Claudio Fontana <cfontana@suse.de>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Haonan Wang <hnwanga1@gmail.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Martin Pitt <mpitt@debian.org>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 101944 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 14:06:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 14:06:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294357.500541 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO6y-0006hD-6S; Thu, 24 Mar 2022 14:06:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294357.500541; Thu, 24 Mar 2022 14:06:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO6x-0006fq-WF; Thu, 24 Mar 2022 14:06:48 +0000
Received: by outflank-mailman (input) for mailman id 294357;
 Thu, 24 Mar 2022 14:06:47 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5u14=UD=arm.com=luca.fancellu@srs-se1.protection.inumbo.net>)
 id 1nXO6x-0006Z2-Db
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 14:06:47 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id a3d2a7fe-ab7b-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 15:06:46 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 7E7901515;
 Thu, 24 Mar 2022 07:06:45 -0700 (PDT)
Received: from e125770.cambridge.arm.com (e125770.cambridge.arm.com
 [10.1.195.16])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 1C5983F73D;
 Thu, 24 Mar 2022 07:06:44 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a3d2a7fe-ab7b-11ec-a405-831a346695d4
From: Luca Fancellu <luca.fancellu@arm.com>
To: xen-devel@lists.xenproject.org
Cc: bertrand.marquis@arm.com,
	wei.chen@arm.com,
	Juergen Gross <jgross@suse.com>,
	Dario Faggioli <dfaggioli@suse.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>
Subject: [PATCH v4 2/6] xen/sched: create public function for cpupools creation
Date: Thu, 24 Mar 2022 14:06:29 +0000
Message-Id: <20220324140633.39674-3-luca.fancellu@arm.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220324140633.39674-1-luca.fancellu@arm.com>
References: <20220324140633.39674-1-luca.fancellu@arm.com>

Create new public function to create cpupools, can take as parameter
the scheduler id or a negative value that means the default Xen
scheduler will be used.

Signed-off-by: Luca Fancellu <luca.fancellu@arm.com>
---
Changes in v4:
- no changes
Changes in v3:
- Fixed comment (Andrew)
Changes in v2:
- cpupool_create_pool doesn't check anymore for pool id uniqueness
  before calling cpupool_create. Modified commit message accordingly
---
 xen/common/sched/cpupool.c | 15 +++++++++++++++
 xen/include/xen/sched.h    | 16 ++++++++++++++++
 2 files changed, 31 insertions(+)

diff --git a/xen/common/sched/cpupool.c b/xen/common/sched/cpupool.c
index a6da4970506a..89a891af7076 100644
--- a/xen/common/sched/cpupool.c
+++ b/xen/common/sched/cpupool.c
@@ -1219,6 +1219,21 @@ static void cpupool_hypfs_init(void)
 
 #endif /* CONFIG_HYPFS */
 
+struct cpupool *__init cpupool_create_pool(unsigned int pool_id, int sched_id)
+{
+    struct cpupool *pool;
+
+    if ( sched_id < 0 )
+        sched_id = scheduler_get_default()->sched_id;
+
+    pool = cpupool_create(pool_id, sched_id);
+
+    BUG_ON(IS_ERR(pool));
+    cpupool_put(pool);
+
+    return pool;
+}
+
 static int __init cf_check cpupool_init(void)
 {
     unsigned int cpu;
diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
index 406d9bc610a4..b07717987434 100644
--- a/xen/include/xen/sched.h
+++ b/xen/include/xen/sched.h
@@ -1147,6 +1147,22 @@ int cpupool_move_domain(struct domain *d, struct cpupool *c);
 int cpupool_do_sysctl(struct xen_sysctl_cpupool_op *op);
 unsigned int cpupool_get_id(const struct domain *d);
 const cpumask_t *cpupool_valid_cpus(const struct cpupool *pool);
+
+/*
+ * cpupool_create_pool - Creates a cpupool
+ * @pool_id: id of the pool to be created
+ * @sched_id: id of the scheduler to be used for the pool
+ *
+ * Creates a cpupool with pool_id id.
+ * The sched_id parameter identifies the scheduler to be used, if it is
+ * negative, the default scheduler of Xen will be used.
+ *
+ * returns:
+ *     pointer to the struct cpupool just created, or Xen will panic in case of
+ *     error
+ */
+struct cpupool *cpupool_create_pool(unsigned int pool_id, int sched_id);
+
 extern void cf_check dump_runq(unsigned char key);
 
 void arch_do_physinfo(struct xen_sysctl_physinfo *pi);
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 14:06:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 14:06:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294356.500536 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO6x-0006cD-Sh; Thu, 24 Mar 2022 14:06:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294356.500536; Thu, 24 Mar 2022 14:06:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO6x-0006bo-OY; Thu, 24 Mar 2022 14:06:47 +0000
Received: by outflank-mailman (input) for mailman id 294356;
 Thu, 24 Mar 2022 14:06:46 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5u14=UD=arm.com=luca.fancellu@srs-se1.protection.inumbo.net>)
 id 1nXO6w-0006Z2-DZ
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 14:06:46 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id a2db43a1-ab7b-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 15:06:44 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id D44981570;
 Thu, 24 Mar 2022 07:06:43 -0700 (PDT)
Received: from e125770.cambridge.arm.com (e125770.cambridge.arm.com
 [10.1.195.16])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 02D123F73D;
 Thu, 24 Mar 2022 07:06:42 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a2db43a1-ab7b-11ec-a405-831a346695d4
From: Luca Fancellu <luca.fancellu@arm.com>
To: xen-devel@lists.xenproject.org
Cc: bertrand.marquis@arm.com,
	wei.chen@arm.com,
	Wei Liu <wl@xen.org>,
	Anthony PERARD <anthony.perard@citrix.com>,
	Juergen Gross <jgross@suse.com>
Subject: [PATCH v4 1/6] tools/cpupools: Give a name to unnamed cpupools
Date: Thu, 24 Mar 2022 14:06:28 +0000
Message-Id: <20220324140633.39674-2-luca.fancellu@arm.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220324140633.39674-1-luca.fancellu@arm.com>
References: <20220324140633.39674-1-luca.fancellu@arm.com>

With the introduction of boot time cpupools, Xen can create many
different cpupools at boot time other than cpupool with id 0.

Since these newly created cpupools can't have an
entry in Xenstore, create the entry using xen-init-dom0
helper with the usual convention: Pool-<cpupool id>.

Given the change, remove the check for poolid == 0 from
libxl_cpupoolid_to_name(...).

Signed-off-by: Luca Fancellu <luca.fancellu@arm.com>
Reviewed-by: Juergen Gross <jgross@suse.com>
---
Changes in v4:
- no changes
Changes in v3:
- no changes, add R-by
Changes in v2:
 - Remove unused variable, moved xc_cpupool_infofree
   ahead to simplify the code, use asprintf (Juergen)
---
 tools/helpers/xen-init-dom0.c  | 35 +++++++++++++++++++++++++++++++++-
 tools/libs/light/libxl_utils.c |  3 +--
 2 files changed, 35 insertions(+), 3 deletions(-)

diff --git a/tools/helpers/xen-init-dom0.c b/tools/helpers/xen-init-dom0.c
index c99224a4b607..84286617790f 100644
--- a/tools/helpers/xen-init-dom0.c
+++ b/tools/helpers/xen-init-dom0.c
@@ -43,7 +43,9 @@ int main(int argc, char **argv)
     int rc;
     struct xs_handle *xsh = NULL;
     xc_interface *xch = NULL;
-    char *domname_string = NULL, *domid_string = NULL;
+    char *domname_string = NULL, *domid_string = NULL, *pool_path, *pool_name;
+    xc_cpupoolinfo_t *xcinfo;
+    unsigned int pool_id = 0;
     libxl_uuid uuid;
 
     /* Accept 0 or 1 argument */
@@ -114,6 +116,37 @@ int main(int argc, char **argv)
         goto out;
     }
 
+    /* Create an entry in xenstore for each cpupool on the system */
+    do {
+        xcinfo = xc_cpupool_getinfo(xch, pool_id);
+        if (xcinfo != NULL) {
+            if (xcinfo->cpupool_id != pool_id)
+                pool_id = xcinfo->cpupool_id;
+            xc_cpupool_infofree(xch, xcinfo);
+            if (asprintf(&pool_path, "/local/pool/%d/name", pool_id) <= 0) {
+                fprintf(stderr, "cannot allocate memory for pool path\n");
+                rc = 1;
+                goto out;
+            }
+            if (asprintf(&pool_name, "Pool-%d", pool_id) <= 0) {
+                fprintf(stderr, "cannot allocate memory for pool name\n");
+                rc = 1;
+                goto out_err;
+            }
+            pool_id++;
+            if (!xs_write(xsh, XBT_NULL, pool_path, pool_name,
+                          strlen(pool_name))) {
+                fprintf(stderr, "cannot set pool name\n");
+                rc = 1;
+            }
+            free(pool_name);
+out_err:
+            free(pool_path);
+            if ( rc )
+                goto out;
+        }
+    } while(xcinfo != NULL);
+
     printf("Done setting up Dom0\n");
 
 out:
diff --git a/tools/libs/light/libxl_utils.c b/tools/libs/light/libxl_utils.c
index b91c2cafa223..81780da3ff40 100644
--- a/tools/libs/light/libxl_utils.c
+++ b/tools/libs/light/libxl_utils.c
@@ -151,8 +151,7 @@ char *libxl_cpupoolid_to_name(libxl_ctx *ctx, uint32_t poolid)
 
     snprintf(path, sizeof(path), "/local/pool/%d/name", poolid);
     s = xs_read(ctx->xsh, XBT_NULL, path, &len);
-    if (!s && (poolid == 0))
-        return strdup("Pool-0");
+
     return s;
 }
 
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 14:06:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 14:06:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294355.500531 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO6x-0006ZO-LT; Thu, 24 Mar 2022 14:06:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294355.500531; Thu, 24 Mar 2022 14:06:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO6x-0006ZH-GL; Thu, 24 Mar 2022 14:06:47 +0000
Received: by outflank-mailman (input) for mailman id 294355;
 Thu, 24 Mar 2022 14:06:45 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5u14=UD=arm.com=luca.fancellu@srs-se1.protection.inumbo.net>)
 id 1nXO6v-0006Z2-M5
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 14:06:45 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id a232c329-ab7b-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 15:06:43 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id BCB821515;
 Thu, 24 Mar 2022 07:06:42 -0700 (PDT)
Received: from e125770.cambridge.arm.com (e125770.cambridge.arm.com
 [10.1.195.16])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 228DD3F73D;
 Thu, 24 Mar 2022 07:06:41 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a232c329-ab7b-11ec-a405-831a346695d4
From: Luca Fancellu <luca.fancellu@arm.com>
To: xen-devel@lists.xenproject.org
Cc: bertrand.marquis@arm.com,
	wei.chen@arm.com,
	Wei Liu <wl@xen.org>,
	Anthony PERARD <anthony.perard@citrix.com>,
	Juergen Gross <jgross@suse.com>,
	Dario Faggioli <dfaggioli@suse.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: [PATCH v4 0/6] Boot time cpupools
Date: Thu, 24 Mar 2022 14:06:27 +0000
Message-Id: <20220324140633.39674-1-luca.fancellu@arm.com>
X-Mailer: git-send-email 2.17.1

This serie introduces a feature for Xen to create cpu pools at boot time, the
feature is enabled using a configurable that is disabled by default.
The boot time cpupool feature relies on the device tree to describe the cpu
pools.
Another feature is introduced by the serie, the possibility to assign a
dom0less guest to a cpupool at boot time.

Here follows an example, Xen is built with CONFIG_BOOT_TIME_CPUPOOLS=y.

>From the DT:

  [...]

  a72_0: cpu@0 {
    compatible = "arm,cortex-a72";
    reg = <0x0 0x0>;
    device_type = "cpu";
    [...]
  };

  a72_1: cpu@1 {
    compatible = "arm,cortex-a72";
    reg = <0x0 0x1>;
    device_type = "cpu";
    [...]
  };

  a53_0: cpu@100 {
    compatible = "arm,cortex-a53";
    reg = <0x0 0x100>;
    device_type = "cpu";
    [...]
  };

  a53_1: cpu@101 {
    compatible = "arm,cortex-a53";
    reg = <0x0 0x101>;
    device_type = "cpu";
    [...]
  };

  a53_2: cpu@102 {
    compatible = "arm,cortex-a53";
    reg = <0x0 0x102>;
    device_type = "cpu";
    [...]
  };

  a53_3: cpu@103 {
    compatible = "arm,cortex-a53";
    reg = <0x0 0x103>;
    device_type = "cpu";
    [...]
  };

  chosen {
    #size-cells = <0x1>;
    #address-cells = <0x1>;
    xen,dom0-bootargs = "...";
    xen,xen-bootargs = "...";

    cpupool0 {
      compatible = "xen,cpupool";
      cpupool-cpus = <&a72_0 &a72_1>;
      cpupool-sched = "credit2";
    };

    cp1: cpupool1 {
      compatible = "xen,cpupool";
      cpupool-cpus = <&a53_0 &a53_1 &a53_2 &a53_3>;
    };

    module@0 {
      reg = <0x80080000 0x1300000>;
      compatible = "multiboot,module";
    };

    domU1 {
      #size-cells = <0x1>;
      #address-cells = <0x1>;
      compatible = "xen,domain";
      cpus = <1>;
      memory = <0 0xC0000>;
      vpl011;
      domain-cpupool = <&cp1>;

      module@92000000 {
        compatible = "multiboot,kernel", "multiboot,module";
        reg = <0x92000000 0x1ffffff>;
        bootargs = "...";
      };
    };
  };

  [...]

The example DT is instructing Xen to have two cpu pools, the one with id 0
having two phisical cpus and the one with id 1 having 4 phisical cpu, the
second cpu pool uses the null scheduler and from the /chosen node we can see
that a dom0less guest will be started on that cpu pool.

In this particular case Xen must boot with different type of cpus, so the
boot argument hmp_unsafe must be enabled.


Luca Fancellu (6):
  tools/cpupools: Give a name to unnamed cpupools
  xen/sched: create public function for cpupools creation
  xen/sched: retrieve scheduler id by name
  xen/cpupool: Create different cpupools at boot time
  arm/dom0less: assign dom0less guests to cpupools
  xen/cpupool: Allow cpupool0 to use different scheduler

 docs/misc/arm/device-tree/booting.txt  |   5 +
 docs/misc/arm/device-tree/cpupools.txt | 136 ++++++++++++++++
 tools/helpers/xen-init-dom0.c          |  35 +++-
 tools/libs/light/libxl_utils.c         |   3 +-
 xen/arch/arm/domain_build.c            |  14 +-
 xen/arch/arm/include/asm/smp.h         |   3 +
 xen/common/Kconfig                     |   7 +
 xen/common/Makefile                    |   1 +
 xen/common/boot_cpupools.c             | 217 +++++++++++++++++++++++++
 xen/common/domain.c                    |   2 +-
 xen/common/sched/core.c                |  40 +++--
 xen/common/sched/cpupool.c             |  32 +++-
 xen/include/public/domctl.h            |   4 +-
 xen/include/xen/sched.h                |  53 ++++++
 14 files changed, 524 insertions(+), 28 deletions(-)
 create mode 100644 docs/misc/arm/device-tree/cpupools.txt
 create mode 100644 xen/common/boot_cpupools.c

-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 14:06:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 14:06:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294358.500564 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO70-0007Lv-Et; Thu, 24 Mar 2022 14:06:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294358.500564; Thu, 24 Mar 2022 14:06:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO70-0007Lm-9m; Thu, 24 Mar 2022 14:06:50 +0000
Received: by outflank-mailman (input) for mailman id 294358;
 Thu, 24 Mar 2022 14:06:49 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5u14=UD=arm.com=luca.fancellu@srs-se1.protection.inumbo.net>)
 id 1nXO6z-0006Z2-47
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 14:06:49 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id a4c6d50f-ab7b-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 15:06:47 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 0DF1A1570;
 Thu, 24 Mar 2022 07:06:47 -0700 (PDT)
Received: from e125770.cambridge.arm.com (e125770.cambridge.arm.com
 [10.1.195.16])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id BA98E3F73D;
 Thu, 24 Mar 2022 07:06:45 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a4c6d50f-ab7b-11ec-a405-831a346695d4
From: Luca Fancellu <luca.fancellu@arm.com>
To: xen-devel@lists.xenproject.org
Cc: bertrand.marquis@arm.com,
	wei.chen@arm.com,
	George Dunlap <george.dunlap@citrix.com>,
	Dario Faggioli <dfaggioli@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>
Subject: [PATCH v4 3/6] xen/sched: retrieve scheduler id by name
Date: Thu, 24 Mar 2022 14:06:30 +0000
Message-Id: <20220324140633.39674-4-luca.fancellu@arm.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220324140633.39674-1-luca.fancellu@arm.com>
References: <20220324140633.39674-1-luca.fancellu@arm.com>

Add a static function to retrieve the scheduler pointer using the
scheduler name.

Add a public function to retrieve the scheduler id by the scheduler
name that makes use of the new static function.

Take the occasion to replace open coded scheduler search with the
new static function in scheduler_init.

Signed-off-by: Luca Fancellu <luca.fancellu@arm.com>
Reviewed-by: Juergen Gross <jgross@suse.com>
---
Changes in v4:
- no changes
Changes in v3:
- add R-by
Changes in v2:
- replace open coded scheduler search in scheduler_init (Juergen)
---
 xen/common/sched/core.c | 40 ++++++++++++++++++++++++++--------------
 xen/include/xen/sched.h | 11 +++++++++++
 2 files changed, 37 insertions(+), 14 deletions(-)

diff --git a/xen/common/sched/core.c b/xen/common/sched/core.c
index 19ab67818106..48ee01420fb8 100644
--- a/xen/common/sched/core.c
+++ b/xen/common/sched/core.c
@@ -2947,10 +2947,30 @@ void scheduler_enable(void)
     scheduler_active = true;
 }
 
+static inline
+const struct scheduler *__init sched_get_by_name(const char *sched_name)
+{
+    unsigned int i;
+
+    for ( i = 0; i < NUM_SCHEDULERS; i++ )
+        if ( schedulers[i] && !strcmp(schedulers[i]->opt_name, sched_name) )
+            return schedulers[i];
+
+    return NULL;
+}
+
+int __init sched_get_id_by_name(const char *sched_name)
+{
+    const struct scheduler *scheduler = sched_get_by_name(sched_name);
+
+    return scheduler ? scheduler->sched_id : -1;
+}
+
 /* Initialise the data structures. */
 void __init scheduler_init(void)
 {
     struct domain *idle_domain;
+    const struct scheduler *scheduler;
     int i;
 
     scheduler_enable();
@@ -2981,25 +3001,17 @@ void __init scheduler_init(void)
                    schedulers[i]->opt_name);
             schedulers[i] = NULL;
         }
-
-        if ( schedulers[i] && !ops.name &&
-             !strcmp(schedulers[i]->opt_name, opt_sched) )
-            ops = *schedulers[i];
     }
 
-    if ( !ops.name )
+    scheduler = sched_get_by_name(opt_sched);
+    if ( !scheduler )
     {
         printk("Could not find scheduler: %s\n", opt_sched);
-        for ( i = 0; i < NUM_SCHEDULERS; i++ )
-            if ( schedulers[i] &&
-                 !strcmp(schedulers[i]->opt_name, CONFIG_SCHED_DEFAULT) )
-            {
-                ops = *schedulers[i];
-                break;
-            }
-        BUG_ON(!ops.name);
-        printk("Using '%s' (%s)\n", ops.name, ops.opt_name);
+        scheduler = sched_get_by_name(CONFIG_SCHED_DEFAULT);
+        BUG_ON(!scheduler);
+        printk("Using '%s' (%s)\n", scheduler->name, scheduler->opt_name);
     }
+    ops = *scheduler;
 
     if ( cpu_schedule_up(0) )
         BUG();
diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
index b07717987434..b527f141a1d3 100644
--- a/xen/include/xen/sched.h
+++ b/xen/include/xen/sched.h
@@ -758,6 +758,17 @@ void sched_destroy_domain(struct domain *d);
 long sched_adjust(struct domain *, struct xen_domctl_scheduler_op *);
 long sched_adjust_global(struct xen_sysctl_scheduler_op *);
 int  sched_id(void);
+
+/*
+ * sched_get_id_by_name - retrieves a scheduler id given a scheduler name
+ * @sched_name: scheduler name as a string
+ *
+ * returns:
+ *     positive value being the scheduler id, on success
+ *     negative value if the scheduler name is not found.
+ */
+int sched_get_id_by_name(const char *sched_name);
+
 void vcpu_wake(struct vcpu *v);
 long vcpu_yield(void);
 void vcpu_sleep_nosync(struct vcpu *v);
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 14:06:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 14:06:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294359.500575 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO73-0007hr-OS; Thu, 24 Mar 2022 14:06:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294359.500575; Thu, 24 Mar 2022 14:06:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO73-0007hc-Jq; Thu, 24 Mar 2022 14:06:53 +0000
Received: by outflank-mailman (input) for mailman id 294359;
 Thu, 24 Mar 2022 14:06:51 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5u14=UD=arm.com=luca.fancellu@srs-se1.protection.inumbo.net>)
 id 1nXO71-0006Z2-Ch
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 14:06:51 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id a5e6c0e0-ab7b-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 15:06:49 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 0DE211515;
 Thu, 24 Mar 2022 07:06:49 -0700 (PDT)
Received: from e125770.cambridge.arm.com (e125770.cambridge.arm.com
 [10.1.195.16])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 4E7013F73D;
 Thu, 24 Mar 2022 07:06:47 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a5e6c0e0-ab7b-11ec-a405-831a346695d4
From: Luca Fancellu <luca.fancellu@arm.com>
To: xen-devel@lists.xenproject.org
Cc: bertrand.marquis@arm.com,
	wei.chen@arm.com,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>,
	Juergen Gross <jgross@suse.com>,
	Dario Faggioli <dfaggioli@suse.com>
Subject: [PATCH v4 4/6] xen/cpupool: Create different cpupools at boot time
Date: Thu, 24 Mar 2022 14:06:31 +0000
Message-Id: <20220324140633.39674-5-luca.fancellu@arm.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220324140633.39674-1-luca.fancellu@arm.com>
References: <20220324140633.39674-1-luca.fancellu@arm.com>

Introduce a way to create different cpupools at boot time, this is
particularly useful on ARM big.LITTLE system where there might be the
need to have different cpupools for each type of core, but also
systems using NUMA can have different cpu pools for each node.

The feature on arm relies on a specification of the cpupools from the
device tree to build pools and assign cpus to them.

Documentation is created to explain the feature.

Signed-off-by: Luca Fancellu <luca.fancellu@arm.com>
---
Changes in v4:
- modify Makefile to put in *.init.o, fixed stubs and macro (Jan)
- fixed docs, fix brakets (Stefano)
- keep cpu0 in Pool-0 (Julien)
- moved printk from btcpupools_allocate_pools to
  btcpupools_get_cpupool_id
- Add to docs constraint about cpu0 and Pool-0
Changes in v3:
- Add newline to cpupools.txt and removed "default n" from Kconfig (Jan)
- Fixed comment, moved defines, used global cpu_online_map, use
  HAS_DEVICE_TREE instead of ARM and place arch specific code in header
  (Juergen)
- Fix brakets, x86 code only panic, get rid of scheduler dt node, don't
  save pool pointer and look for it from the pool list (Stefano)
- Changed data structures to allow modification to the code.
Changes in v2:
- Move feature to common code (Juergen)
- Try to decouple dtb parse and cpupool creation to allow
  more way to specify cpupools (for example command line)
- Created standalone dt node for the scheduler so it can
  be used in future work to set scheduler specific
  parameters
- Use only auto generated ids for cpupools
---
 docs/misc/arm/device-tree/cpupools.txt | 136 ++++++++++++++++++
 xen/arch/arm/include/asm/smp.h         |   3 +
 xen/common/Kconfig                     |   7 +
 xen/common/Makefile                    |   1 +
 xen/common/boot_cpupools.c             | 190 +++++++++++++++++++++++++
 xen/common/sched/cpupool.c             |   9 +-
 xen/include/xen/sched.h                |  14 ++
 7 files changed, 359 insertions(+), 1 deletion(-)
 create mode 100644 docs/misc/arm/device-tree/cpupools.txt
 create mode 100644 xen/common/boot_cpupools.c

diff --git a/docs/misc/arm/device-tree/cpupools.txt b/docs/misc/arm/device-tree/cpupools.txt
new file mode 100644
index 000000000000..5dac2b1384e0
--- /dev/null
+++ b/docs/misc/arm/device-tree/cpupools.txt
@@ -0,0 +1,136 @@
+Boot time cpupools
+==================
+
+When BOOT_TIME_CPUPOOLS is enabled in the Xen configuration, it is possible to
+create cpupools during boot phase by specifying them in the device tree.
+
+Cpupools specification nodes shall be direct childs of /chosen node.
+Each cpupool node contains the following properties:
+
+- compatible (mandatory)
+
+    Must always include the compatiblity string: "xen,cpupool".
+
+- cpupool-cpus (mandatory)
+
+    Must be a list of device tree phandle to nodes describing cpus (e.g. having
+    device_type = "cpu"), it can't be empty.
+
+- cpupool-sched (optional)
+
+    Must be a string having the name of a Xen scheduler. Check the sched=<...>
+    boot argument for allowed values.
+
+
+Constraints
+===========
+
+If no cpupools are specified, all cpus will be assigned to one cpupool
+implicitly created (Pool-0).
+
+If cpupools node are specified, but not every cpu brought up by Xen is assigned,
+all the not assigned cpu will be assigned to an additional cpupool.
+
+If a cpu is assigned to a cpupool, but it's not brought up correctly, Xen will
+stop.
+
+The boot cpu must be assigned to Pool-0, so the cpupool containing that core
+will become Pool-0 automatically.
+
+
+Examples
+========
+
+A system having two types of core, the following device tree specification will
+instruct Xen to have two cpupools:
+
+- The cpupool with id 0 will have 4 cpus assigned.
+- The cpupool with id 1 will have 2 cpus assigned.
+
+The following example can work only if hmp-unsafe=1 is passed to Xen boot
+arguments, otherwise not all cores will be brought up by Xen and the cpupool
+creation process will stop Xen.
+
+
+a72_1: cpu@0 {
+        compatible = "arm,cortex-a72";
+        reg = <0x0 0x0>;
+        device_type = "cpu";
+        [...]
+};
+
+a72_2: cpu@1 {
+        compatible = "arm,cortex-a72";
+        reg = <0x0 0x1>;
+        device_type = "cpu";
+        [...]
+};
+
+a53_1: cpu@100 {
+        compatible = "arm,cortex-a53";
+        reg = <0x0 0x100>;
+        device_type = "cpu";
+        [...]
+};
+
+a53_2: cpu@101 {
+        compatible = "arm,cortex-a53";
+        reg = <0x0 0x101>;
+        device_type = "cpu";
+        [...]
+};
+
+a53_3: cpu@102 {
+        compatible = "arm,cortex-a53";
+        reg = <0x0 0x102>;
+        device_type = "cpu";
+        [...]
+};
+
+a53_4: cpu@103 {
+        compatible = "arm,cortex-a53";
+        reg = <0x0 0x103>;
+        device_type = "cpu";
+        [...]
+};
+
+chosen {
+
+    cpupool_a {
+        compatible = "xen,cpupool";
+        cpupool-cpus = <&a53_1 &a53_2 &a53_3 &a53_4>;
+    };
+    cpupool_b {
+        compatible = "xen,cpupool";
+        cpupool-cpus = <&a72_1 &a72_2>;
+        cpupool-sched = "credit2";
+    };
+
+    [...]
+
+};
+
+
+A system having the cpupools specification below will instruct Xen to have three
+cpupools:
+
+- The cpupool Pool-0 will have 2 cpus assigned.
+- The cpupool Pool-1 will have 2 cpus assigned.
+- The cpupool Pool-2 will have 2 cpus assigned (created by Xen with all the not
+  assigned cpus a53_3 and a53_4).
+
+chosen {
+
+    cpupool_a {
+        compatible = "xen,cpupool";
+        cpupool-cpus = <&a53_1 &a53_2>;
+    };
+    cpupool_b {
+        compatible = "xen,cpupool";
+        cpupool-cpus = <&a72_1 &a72_2>;
+        cpupool-sched = "null";
+    };
+
+    [...]
+
+};
diff --git a/xen/arch/arm/include/asm/smp.h b/xen/arch/arm/include/asm/smp.h
index af5a2fe65266..83c0cd69767b 100644
--- a/xen/arch/arm/include/asm/smp.h
+++ b/xen/arch/arm/include/asm/smp.h
@@ -34,6 +34,9 @@ extern void init_secondary(void);
 extern void smp_init_cpus(void);
 extern void smp_clear_cpu_maps (void);
 extern int smp_get_max_cpus (void);
+
+#define cpu_physical_id(cpu) cpu_logical_map(cpu)
+
 #endif
 
 /*
diff --git a/xen/common/Kconfig b/xen/common/Kconfig
index d921c74d615e..70aac5220e75 100644
--- a/xen/common/Kconfig
+++ b/xen/common/Kconfig
@@ -22,6 +22,13 @@ config GRANT_TABLE
 
 	  If unsure, say Y.
 
+config BOOT_TIME_CPUPOOLS
+	bool "Create cpupools at boot time"
+	depends on HAS_DEVICE_TREE
+	help
+	  Creates cpupools during boot time and assigns cpus to them. Cpupools
+	  options can be specified in the device tree.
+
 config ALTERNATIVE_CALL
 	bool
 
diff --git a/xen/common/Makefile b/xen/common/Makefile
index dc8d3a13f5b8..e30cd26eef70 100644
--- a/xen/common/Makefile
+++ b/xen/common/Makefile
@@ -1,5 +1,6 @@
 obj-$(CONFIG_ARGO) += argo.o
 obj-y += bitmap.o
+obj-$(CONFIG_BOOT_TIME_CPUPOOLS) += boot_cpupools.init.o
 obj-$(CONFIG_HYPFS_CONFIG) += config_data.o
 obj-$(CONFIG_CORE_PARKING) += core_parking.o
 obj-y += cpu.o
diff --git a/xen/common/boot_cpupools.c b/xen/common/boot_cpupools.c
new file mode 100644
index 000000000000..ea7840299199
--- /dev/null
+++ b/xen/common/boot_cpupools.c
@@ -0,0 +1,190 @@
+/* SPDX-License-Identifier: GPL-2.0 */
+/*
+ * xen/common/boot_cpupools.c
+ *
+ * Code to create cpupools at boot time.
+ *
+ * Copyright (C) 2022 Arm Ltd.
+ */
+
+#include <xen/sched.h>
+
+/*
+ * pool_cpu_map:   Index is logical cpu number, content is cpupool id, (-1) for
+ *                 unassigned.
+ * pool_sched_map: Index is cpupool id, content is scheduler id, (-1) for
+ *                 unassigned.
+ */
+static int __initdata pool_cpu_map[NR_CPUS]   = { [0 ... NR_CPUS-1] = -1 };
+static int __initdata pool_sched_map[NR_CPUS] = { [0 ... NR_CPUS-1] = -1 };
+static unsigned int __initdata next_pool_id;
+
+#define BTCPUPOOLS_DT_NODE_NO_REG     (-1)
+#define BTCPUPOOLS_DT_NODE_NO_LOG_CPU (-2)
+
+static int __init get_logical_cpu_from_hw_id(unsigned int hwid)
+{
+    unsigned int i;
+
+    for ( i = 0; i < nr_cpu_ids; i++ )
+    {
+        if ( cpu_physical_id(i) == hwid )
+            return i;
+    }
+
+    return -1;
+}
+
+static int __init
+get_logical_cpu_from_cpu_node(const struct dt_device_node *cpu_node)
+{
+    int cpu_num;
+    const __be32 *prop;
+    unsigned int cpu_reg;
+
+    prop = dt_get_property(cpu_node, "reg", NULL);
+    if ( !prop )
+        return BTCPUPOOLS_DT_NODE_NO_REG;
+
+    cpu_reg = dt_read_number(prop, dt_n_addr_cells(cpu_node));
+
+    cpu_num = get_logical_cpu_from_hw_id(cpu_reg);
+    if ( cpu_num < 0 )
+        return BTCPUPOOLS_DT_NODE_NO_LOG_CPU;
+
+    return cpu_num;
+}
+
+static int __init check_and_get_sched_id(const char* scheduler_name)
+{
+    int sched_id = sched_get_id_by_name(scheduler_name);
+
+    if ( sched_id < 0 )
+        panic("Scheduler %s does not exists!\n", scheduler_name);
+
+    return sched_id;
+}
+
+void __init btcpupools_dtb_parse(void)
+{
+    const struct dt_device_node *chosen, *node;
+
+    chosen = dt_find_node_by_path("/chosen");
+    if ( !chosen )
+        return;
+
+    dt_for_each_child_node(chosen, node)
+    {
+        const struct dt_device_node *phandle_node;
+        int sched_id = -1;
+        const char* scheduler_name;
+        unsigned int i = 0;
+
+        if ( !dt_device_is_compatible(node, "xen,cpupool") )
+            continue;
+
+        if ( !dt_property_read_string(phandle_node, "cpupool-sched",
+                                      &scheduler_name) )
+            sched_id = check_and_get_sched_id(scheduler_name);
+
+        phandle_node = dt_parse_phandle(node, "cpupool-cpus", i++);
+        if ( !phandle_node )
+            panic("Missing or empty cpupool-cpus property!\n");
+
+        while ( phandle_node )
+        {
+            int cpu_num;
+
+            cpu_num = get_logical_cpu_from_cpu_node(phandle_node);
+
+            if ( cpu_num < 0 )
+                panic("Error retrieving logical cpu from node %s (%d)\n",
+                      dt_node_name(node), cpu_num);
+
+            if ( pool_cpu_map[cpu_num] != -1 )
+                panic("Logical cpu %d already added to a cpupool!\n", cpu_num);
+
+            pool_cpu_map[cpu_num] = next_pool_id;
+            pool_sched_map[next_pool_id] = sched_id;
+
+            phandle_node = dt_parse_phandle(node, "cpupool-cpus", i++);
+        }
+
+        /* Let Xen generate pool ids */
+        next_pool_id++;
+    }
+}
+
+void __init btcpupools_allocate_pools(void)
+{
+    unsigned int i;
+    bool add_extra_cpupool = false;
+
+    /*
+     * If there are no cpupools, the value of next_pool_id is zero, so the code
+     * below will assign every cpu to cpupool0 as the default behavior.
+     * When there are cpupools, the code below is assigning all the not
+     * assigned cpu to a new pool (next_pool_id value is the last id + 1).
+     * In the same loop we check if there is any assigned cpu that is not
+     * online.
+     */
+    for ( i = 0; i < nr_cpu_ids; i++ )
+    {
+        if ( cpumask_test_cpu(i, &cpu_online_map) )
+        {
+            /* Unassigned cpu gets next_pool_id pool id value */
+            if ( pool_cpu_map[i] < 0 )
+            {
+                pool_cpu_map[i] = next_pool_id;
+                add_extra_cpupool = true;
+            }
+        }
+        else
+        {
+            if ( pool_cpu_map[i] >= 0 )
+                panic("Pool-%d contains cpu%u that is not online!\n",
+                      pool_cpu_map[i], i);
+        }
+    }
+
+    /*
+     * Cpu0 must be in cpupool0, otherwise some operations like moving cpus
+     * between cpupools, cpu hotplug, destroying cpupools, shutdown of the host,
+     * might not work in a same way.
+     */
+    if ( pool_cpu_map[0] != 0 )
+    {
+        /* The cpupool containing cpu0 will become cpupool0 */
+        unsigned int swap_id = pool_cpu_map[0];
+        for_each_cpu ( i, &cpu_online_map )
+        {
+            if ( pool_cpu_map[i] == swap_id )
+                pool_cpu_map[i] = 0;
+            else if ( pool_cpu_map[i] == 0 )
+                pool_cpu_map[i] = swap_id;
+        }
+    }
+
+    if ( add_extra_cpupool )
+        next_pool_id++;
+
+    /* Create cpupools with selected schedulers */
+    for ( i = 0; i < next_pool_id; i++ )
+        cpupool_create_pool(i, pool_sched_map[i]);
+}
+
+unsigned int __init btcpupools_get_cpupool_id(unsigned int cpu)
+{
+    printk(XENLOG_INFO "Logical CPU %u in Pool-%u.\n", cpu, pool_cpu_map[cpu]);
+    return pool_cpu_map[cpu];
+}
+
+/*
+ * Local variables:
+ * mode: C
+ * c-file-style: "BSD"
+ * c-basic-offset: 4
+ * tab-width: 4
+ * indent-tabs-mode: nil
+ * End:
+ */
diff --git a/xen/common/sched/cpupool.c b/xen/common/sched/cpupool.c
index 89a891af7076..e5189c53a321 100644
--- a/xen/common/sched/cpupool.c
+++ b/xen/common/sched/cpupool.c
@@ -1247,12 +1247,19 @@ static int __init cf_check cpupool_init(void)
     cpupool_put(cpupool0);
     register_cpu_notifier(&cpu_nfb);
 
+    btcpupools_dtb_parse();
+
+    btcpupools_allocate_pools();
+
     spin_lock(&cpupool_lock);
 
     cpumask_copy(&cpupool_free_cpus, &cpu_online_map);
 
     for_each_cpu ( cpu, &cpupool_free_cpus )
-        cpupool_assign_cpu_locked(cpupool0, cpu);
+    {
+        unsigned int pool_id = btcpupools_get_cpupool_id(cpu);
+        cpupool_assign_cpu_locked(cpupool_find_by_id(pool_id), cpu);
+    }
 
     spin_unlock(&cpupool_lock);
 
diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
index b527f141a1d3..453e98f1cba8 100644
--- a/xen/include/xen/sched.h
+++ b/xen/include/xen/sched.h
@@ -1178,6 +1178,20 @@ extern void cf_check dump_runq(unsigned char key);
 
 void arch_do_physinfo(struct xen_sysctl_physinfo *pi);
 
+#ifdef CONFIG_BOOT_TIME_CPUPOOLS
+void btcpupools_allocate_pools(void);
+unsigned int btcpupools_get_cpupool_id(unsigned int cpu);
+void btcpupools_dtb_parse(void);
+
+#else /* !CONFIG_BOOT_TIME_CPUPOOLS */
+static inline void btcpupools_allocate_pools(void) {}
+static inline void btcpupools_dtb_parse(void) {}
+static inline unsigned int btcpupools_get_cpupool_id(unsigned int cpu)
+{
+    return 0;
+}
+#endif
+
 #endif /* __SCHED_H__ */
 
 /*
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 14:06:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 14:06:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294360.500580 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO74-0007q8-Ep; Thu, 24 Mar 2022 14:06:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294360.500580; Thu, 24 Mar 2022 14:06:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO74-0007on-88; Thu, 24 Mar 2022 14:06:54 +0000
Received: by outflank-mailman (input) for mailman id 294360;
 Thu, 24 Mar 2022 14:06:52 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5u14=UD=arm.com=luca.fancellu@srs-se1.protection.inumbo.net>)
 id 1nXO72-0007ec-JD
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 14:06:52 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTP
 id a6c68369-ab7b-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 15:06:51 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 96D171570;
 Thu, 24 Mar 2022 07:06:50 -0700 (PDT)
Received: from e125770.cambridge.arm.com (e125770.cambridge.arm.com
 [10.1.195.16])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 4A1CF3F73D;
 Thu, 24 Mar 2022 07:06:49 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a6c68369-ab7b-11ec-8fbc-03012f2f19d4
From: Luca Fancellu <luca.fancellu@arm.com>
To: xen-devel@lists.xenproject.org
Cc: bertrand.marquis@arm.com,
	wei.chen@arm.com,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>
Subject: [PATCH v4 5/6] arm/dom0less: assign dom0less guests to cpupools
Date: Thu, 24 Mar 2022 14:06:32 +0000
Message-Id: <20220324140633.39674-6-luca.fancellu@arm.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220324140633.39674-1-luca.fancellu@arm.com>
References: <20220324140633.39674-1-luca.fancellu@arm.com>

Introduce domain-cpupool property of a xen,domain device tree node,
that specifies the cpupool device tree handle of a xen,cpupool node
that identifies a cpupool created at boot time where the guest will
be assigned on creation.

Add member to the xen_domctl_createdomain public interface so the
XEN_DOMCTL_INTERFACE_VERSION version is bumped.

Add public function to retrieve a pool id from the device tree
cpupool node.

Update documentation about the property.

Signed-off-by: Luca Fancellu <luca.fancellu@arm.com>
Reviewed-by: Stefano Stabellini <sstabellini@kernel.org>
---
Changes in v4:
- no changes
- add R-by
Changes in v3:
- Use explicitely sized integer for struct xen_domctl_createdomain
  cpupool_id member. (Stefano)
- Changed code due to previous commit code changes
Changes in v2:
- Moved cpupool_id from arch specific to common part (Juergen)
- Implemented functions to retrieve the cpupool id from the
  cpupool dtb node.
---
 docs/misc/arm/device-tree/booting.txt |  5 +++++
 xen/arch/arm/domain_build.c           | 14 +++++++++++++-
 xen/common/boot_cpupools.c            | 24 ++++++++++++++++++++++++
 xen/common/domain.c                   |  2 +-
 xen/include/public/domctl.h           |  4 +++-
 xen/include/xen/sched.h               |  9 +++++++++
 6 files changed, 55 insertions(+), 3 deletions(-)

diff --git a/docs/misc/arm/device-tree/booting.txt b/docs/misc/arm/device-tree/booting.txt
index a94125394e35..7b4a29a2c293 100644
--- a/docs/misc/arm/device-tree/booting.txt
+++ b/docs/misc/arm/device-tree/booting.txt
@@ -188,6 +188,11 @@ with the following properties:
     An empty property to request the memory of the domain to be
     direct-map (guest physical address == physical address).
 
+- domain-cpupool
+
+    Optional. Handle to a xen,cpupool device tree node that identifies the
+    cpupool where the guest will be started at boot.
+
 Under the "xen,domain" compatible node, one or more sub-nodes are present
 for the DomU kernel and ramdisk.
 
diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index 8be01678de05..9c67a483d4a4 100644
--- a/xen/arch/arm/domain_build.c
+++ b/xen/arch/arm/domain_build.c
@@ -3172,7 +3172,8 @@ static int __init construct_domU(struct domain *d,
 void __init create_domUs(void)
 {
     struct dt_device_node *node;
-    const struct dt_device_node *chosen = dt_find_node_by_path("/chosen");
+    const struct dt_device_node *cpupool_node,
+                                *chosen = dt_find_node_by_path("/chosen");
 
     BUG_ON(chosen == NULL);
     dt_for_each_child_node(chosen, node)
@@ -3241,6 +3242,17 @@ void __init create_domUs(void)
                                          vpl011_virq - 32 + 1);
         }
 
+        /* Get the optional property domain-cpupool */
+        cpupool_node = dt_parse_phandle(node, "domain-cpupool", 0);
+        if ( cpupool_node )
+        {
+            int pool_id = btcpupools_get_domain_pool_id(cpupool_node);
+            if ( pool_id < 0 )
+                panic("Error getting cpupool id from domain-cpupool (%d)\n",
+                      pool_id);
+            d_cfg.cpupool_id = pool_id;
+        }
+
         /*
          * The variable max_init_domid is initialized with zero, so here it's
          * very important to use the pre-increment operator to call
diff --git a/xen/common/boot_cpupools.c b/xen/common/boot_cpupools.c
index ea7840299199..70003eaf08a4 100644
--- a/xen/common/boot_cpupools.c
+++ b/xen/common/boot_cpupools.c
@@ -21,6 +21,8 @@ static unsigned int __initdata next_pool_id;
 
 #define BTCPUPOOLS_DT_NODE_NO_REG     (-1)
 #define BTCPUPOOLS_DT_NODE_NO_LOG_CPU (-2)
+#define BTCPUPOOLS_DT_WRONG_NODE      (-3)
+#define BTCPUPOOLS_DT_CORRUPTED_NODE  (-4)
 
 static int __init get_logical_cpu_from_hw_id(unsigned int hwid)
 {
@@ -55,6 +57,28 @@ get_logical_cpu_from_cpu_node(const struct dt_device_node *cpu_node)
     return cpu_num;
 }
 
+int __init btcpupools_get_domain_pool_id(const struct dt_device_node *node)
+{
+    const struct dt_device_node *phandle_node;
+    int cpu_num;
+
+    if ( !dt_device_is_compatible(node, "xen,cpupool") )
+        return BTCPUPOOLS_DT_WRONG_NODE;
+    /*
+     * Get first cpu listed in the cpupool, from its reg it's possible to
+     * retrieve the cpupool id.
+     */
+    phandle_node = dt_parse_phandle(node, "cpupool-cpus", 0);
+    if ( !phandle_node )
+        return BTCPUPOOLS_DT_CORRUPTED_NODE;
+
+    cpu_num = get_logical_cpu_from_cpu_node(phandle_node);
+    if ( cpu_num < 0 )
+        return cpu_num;
+
+    return pool_cpu_map[cpu_num];
+}
+
 static int __init check_and_get_sched_id(const char* scheduler_name)
 {
     int sched_id = sched_get_id_by_name(scheduler_name);
diff --git a/xen/common/domain.c b/xen/common/domain.c
index 351029f8b239..0827400f4f49 100644
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -698,7 +698,7 @@ struct domain *domain_create(domid_t domid,
         if ( !d->pbuf )
             goto fail;
 
-        if ( (err = sched_init_domain(d, 0)) != 0 )
+        if ( (err = sched_init_domain(d, config->cpupool_id)) != 0 )
             goto fail;
 
         if ( (err = late_hwdom_init(d)) != 0 )
diff --git a/xen/include/public/domctl.h b/xen/include/public/domctl.h
index b85e6170b0aa..2f4cf56f438d 100644
--- a/xen/include/public/domctl.h
+++ b/xen/include/public/domctl.h
@@ -38,7 +38,7 @@
 #include "hvm/save.h"
 #include "memory.h"
 
-#define XEN_DOMCTL_INTERFACE_VERSION 0x00000014
+#define XEN_DOMCTL_INTERFACE_VERSION 0x00000015
 
 /*
  * NB. xen_domctl.domain is an IN/OUT parameter for this operation.
@@ -106,6 +106,8 @@ struct xen_domctl_createdomain {
     /* Per-vCPU buffer size in bytes.  0 to disable. */
     uint32_t vmtrace_size;
 
+    uint32_t cpupool_id;
+
     struct xen_arch_domainconfig arch;
 };
 
diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
index 453e98f1cba8..b62315ad5e5d 100644
--- a/xen/include/xen/sched.h
+++ b/xen/include/xen/sched.h
@@ -1182,6 +1182,7 @@ void arch_do_physinfo(struct xen_sysctl_physinfo *pi);
 void btcpupools_allocate_pools(void);
 unsigned int btcpupools_get_cpupool_id(unsigned int cpu);
 void btcpupools_dtb_parse(void);
+int btcpupools_get_domain_pool_id(const struct dt_device_node *node);
 
 #else /* !CONFIG_BOOT_TIME_CPUPOOLS */
 static inline void btcpupools_allocate_pools(void) {}
@@ -1190,6 +1191,14 @@ static inline unsigned int btcpupools_get_cpupool_id(unsigned int cpu)
 {
     return 0;
 }
+#ifdef CONFIG_HAS_DEVICE_TREE
+static inline int
+btcpupools_get_domain_pool_id(const struct dt_device_node *node)
+{
+    return 0;
+}
+#endif
+
 #endif
 
 #endif /* __SCHED_H__ */
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 14:06:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 14:06:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294361.500596 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO75-0008E3-Tp; Thu, 24 Mar 2022 14:06:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294361.500596; Thu, 24 Mar 2022 14:06:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXO75-0008DN-MY; Thu, 24 Mar 2022 14:06:55 +0000
Received: by outflank-mailman (input) for mailman id 294361;
 Thu, 24 Mar 2022 14:06:54 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5u14=UD=arm.com=luca.fancellu@srs-se1.protection.inumbo.net>)
 id 1nXO74-0007ec-1k
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 14:06:54 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTP
 id a7e767a4-ab7b-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 15:06:53 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 578ED1515;
 Thu, 24 Mar 2022 07:06:52 -0700 (PDT)
Received: from e125770.cambridge.arm.com (e125770.cambridge.arm.com
 [10.1.195.16])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id CE4743F73D;
 Thu, 24 Mar 2022 07:06:50 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a7e767a4-ab7b-11ec-8fbc-03012f2f19d4
From: Luca Fancellu <luca.fancellu@arm.com>
To: xen-devel@lists.xenproject.org
Cc: bertrand.marquis@arm.com,
	wei.chen@arm.com,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Juergen Gross <jgross@suse.com>,
	Dario Faggioli <dfaggioli@suse.com>
Subject: [PATCH v4 6/6] xen/cpupool: Allow cpupool0 to use different scheduler
Date: Thu, 24 Mar 2022 14:06:33 +0000
Message-Id: <20220324140633.39674-7-luca.fancellu@arm.com>
X-Mailer: git-send-email 2.17.1
In-Reply-To: <20220324140633.39674-1-luca.fancellu@arm.com>
References: <20220324140633.39674-1-luca.fancellu@arm.com>

Currently cpupool0 can use only the default scheduler, and
cpupool_create has an hardcoded behavior when creating the pool 0
that doesn't allocate new memory for the scheduler, but uses the
default scheduler structure in memory.

With this commit it is possible to allocate a different scheduler for
the cpupool0 when using the boot time cpupool.
To achieve this the hardcoded behavior in cpupool_create is removed
and the cpupool0 creation is moved.

When compiling without boot time cpupools enabled, the current
behavior is maintained (except that cpupool0 scheduler memory will be
allocated).

Signed-off-by: Luca Fancellu <luca.fancellu@arm.com>
---
Changes in v4:
- no changes
Changes in v3:
- fix typo in commit message (Juergen)
- rebase changes
Changes in v2:
- new patch
---
 xen/common/boot_cpupools.c | 5 ++++-
 xen/common/sched/cpupool.c | 8 +-------
 xen/include/xen/sched.h    | 5 ++++-
 3 files changed, 9 insertions(+), 9 deletions(-)

diff --git a/xen/common/boot_cpupools.c b/xen/common/boot_cpupools.c
index 70003eaf08a4..60ebc6235658 100644
--- a/xen/common/boot_cpupools.c
+++ b/xen/common/boot_cpupools.c
@@ -192,8 +192,11 @@ void __init btcpupools_allocate_pools(void)
     if ( add_extra_cpupool )
         next_pool_id++;
 
+    /* Keep track of cpupool id 0 with the global cpupool0 */
+    cpupool0 = cpupool_create_pool(0, pool_sched_map[0]);
+
     /* Create cpupools with selected schedulers */
-    for ( i = 0; i < next_pool_id; i++ )
+    for ( i = 1; i < next_pool_id; i++ )
         cpupool_create_pool(i, pool_sched_map[i]);
 }
 
diff --git a/xen/common/sched/cpupool.c b/xen/common/sched/cpupool.c
index e5189c53a321..f717ee844e91 100644
--- a/xen/common/sched/cpupool.c
+++ b/xen/common/sched/cpupool.c
@@ -312,10 +312,7 @@ static struct cpupool *cpupool_create(unsigned int poolid,
         c->cpupool_id = q->cpupool_id + 1;
     }
 
-    if ( poolid == 0 )
-        c->sched = scheduler_get_default();
-    else
-        c->sched = scheduler_alloc(sched_id);
+    c->sched = scheduler_alloc(sched_id);
     if ( IS_ERR(c->sched) )
     {
         ret = PTR_ERR(c->sched);
@@ -1242,9 +1239,6 @@ static int __init cf_check cpupool_init(void)
 
     cpupool_hypfs_init();
 
-    cpupool0 = cpupool_create(0, 0);
-    BUG_ON(IS_ERR(cpupool0));
-    cpupool_put(cpupool0);
     register_cpu_notifier(&cpu_nfb);
 
     btcpupools_dtb_parse();
diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
index b62315ad5e5d..e8f31758c058 100644
--- a/xen/include/xen/sched.h
+++ b/xen/include/xen/sched.h
@@ -1185,7 +1185,10 @@ void btcpupools_dtb_parse(void);
 int btcpupools_get_domain_pool_id(const struct dt_device_node *node);
 
 #else /* !CONFIG_BOOT_TIME_CPUPOOLS */
-static inline void btcpupools_allocate_pools(void) {}
+static inline void btcpupools_allocate_pools(void)
+{
+    cpupool0 = cpupool_create_pool(0, -1);
+}
 static inline void btcpupools_dtb_parse(void) {}
 static inline unsigned int btcpupools_get_cpupool_id(unsigned int cpu)
 {
-- 
2.17.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 24 14:12:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 14:12:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294391.500608 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXOBu-00037N-LC; Thu, 24 Mar 2022 14:11:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294391.500608; Thu, 24 Mar 2022 14:11:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXOBu-00037G-Gz; Thu, 24 Mar 2022 14:11:54 +0000
Received: by outflank-mailman (input) for mailman id 294391;
 Thu, 24 Mar 2022 14:11:53 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=z7/3=UD=citrix.com=prvs=07544547a=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nXOBt-00037A-Eb
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 14:11:53 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 583f7096-ab7c-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 15:11:50 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 583f7096-ab7c-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648131110;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=hum6UWGr/2bCXVY/Rf0EtTra81zHhb2t6/vnNVDl6wk=;
  b=MX6CBbmKlNoKgMab33/Kaycuo7u8z9zXRBmljDtSHEd2c6R2Z8PIXbta
   h/DhMcqdIPGHpHlC2xy34mftMhZ5PFtTCGUswwQ3zn18nQ9QALemRvr0t
   DJZFrbh99tTNuMRjUwz3ohVl2u9h8M7q/uHBxEX+2AKy6UNzk0DQMF7Nl
   c=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66521678
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:Uu2q8KMTKER0JZ3vrR2vl8FynXyQoLVcMsEvi/4bfWQNrUom0TACy
 TYZX2/XMvyINGWhfI8kaY/noxxTupTVmtdkTQto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi2NIw27BVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Z9
 PZziY6vTRoTPoLKusEefjZFTi9VBPgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALNs7kMZlZonh95TrYEewnUdbIRKCiCdpwgmlt3JkQQqa2i
 8wxZiNxRRfGaB5zHmwMV7cPg/6tlmTOfGgNwL6SjfVuuDWCpOBr65D9PdyQdtGUSMF9mkeDu
 nmA72n/GgsdNtGU1XyC6H3EruPCmCLTWYQMFaa5/PpnnF2SwGMIDBQcE1C8pJGEZlWWAowFb
 RZOo2x38PZ0pBfDosTBswOQnF26ggwDX8dqE8I8yiSO54XJvgiyPz1RJtJeU+AOuMgzTD0s8
 1aGmdL1GDBi2IGopWKhGqS89m3rZ3VMRYMWTWpdFFZevYG/yG0mpkiXJuuPBpJZmTEc9dvY5
 zmR5BYziLwI5SLg//XqpAuX695AS3Wgc+LU2uk1dj/9hu+aTNT8D2BN1bQ9xawfRGp+ZgPd1
 EXoY+DEsIgz4WilzURhutklErCz/OqiOzbBm1NpFJRJ323zpy77I9gAu28meRcB3iM4ldnBO
 h+7VeR5vsI7AZdXRfUvP9LZ5zoCk8AM6ugJptiLN4ETM/CdhSeM/T10ZF744oweuBNErE3LA
 r/CKZzEJS9DUcxPlWPqL89Age5D7n1vngv7GMGkpylLJJLDPRZ5v59eawDQBg34hYvZyDjoH
 yF3a5TbkUkOAbeiCsQVmKZKRW03wbEALcmeg+Rcd/KZIxogH2ckCvTLxqgmdZAjlKNQ/tokN
 FngMqOE4DITXUH6FDg=
IronPort-HdrOrdr: A9a23:WehKmKEl8+734JrOpLqFBpHXdLJyesId70hD6qkvc3Jom52j+P
 xGws526faVslYssHFJo6HnBEClewKgyXcV2/hqAV7GZmjbUQSTXeRfBOfZslnd8mjFh5JgPM
 RbAtlD4b/LfCBHZK/BiWHSebtQo6jkzEnrv5ak854Ed3AVV0gK1XYBNu/0KDwQeOEQbqBJa6
 Z0q/A37waISDAyVICWF3MFV+/Mq5nik4/nWwcPA1oC5BOVhT2lxbbmG1zAty1uGQ9n8PMHyy
 zoggb57qKsv7WSzQLd7Xba69BzlMH6wtVOKcSQgow+KynqiCyveIN9Mofy9wwdkaWK0hIHgd
 PMqxAvM4Ba7G7QRHi8pV/X1wzpwF8Vmgjf4G7dpUGmjd3yRTo8BcYEr5leaAHl500pu8w5+L
 5X3kqC3qAnQi/orWDY3ZzlRhtqnk27rT4JiugIlUFSVoMYdft4sZEfxkVIC50NdRiKpLzPKN
 MeTf002cwmMW9zNxvizypSKZ2XLzkO9y69MwY/Upf/6UkVoJh7p3FosPD30E1wsa7VcKM0lN
 gsAp4Y5I2mcfVmH56VJN1xN/dfWVa9CC4lDgqpUCHa/ec8Sjbwl6I=
X-IronPort-AV: E=Sophos;i="5.90,207,1643691600"; 
   d="scan'208";a="66521678"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=MfUa+G0FPBTcmPxcFgZUfbo/XJvn5nO5AgODXUja4ug/6228nyRAnaqbzLga5JclYc4NCcoGUS4A6fma4LSXkb4MONxA+W/b8POi7tS+Mq9TmQayojado01RglctSSWVfGwsd+jTeMYIFnb8Ya7uoDrn+NplTF14AV1UGZhHj3dAgTcw546Uwwp+1JWpX412boUQd8/zrTEWEGP+dXRhSeZZLF1tkvxdE2AJrOfpjw30IyrxkAm7UyzScD+ieRgU0FkDv/w3xKPLFunkXu9kjSmjLWQaQH2tuJVwhD/OGi4qXyo9Zcv8MD48zhXBv0eMmxe5epMjMDe7GO+smDkQlg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=HQ3TbiWijUITJ4G2k4Wite5laUI4aZ4/ZPZxreiWpuU=;
 b=j18CMYtg0/oqOhz47gGuUNA7xkNX5m8yDxLkX3nSJAlE16DoRY6qdm/WQO7EMZtm/d307Oex7q0R94BaSPuKaioJ/i+0jXMjDGSx3/CGup5c8p93J7e+PuEq295uIArtOcbjOIdj+6urSzz3CUDQL57tZIejTQKDk+k6HcXIO64rpu+dEeGqaXxRNpPZ7nMaEEgCD33Njflb8E/EN518BbUL2S3PwVPk9oL9XEjgkJuW2mI7uUjfbluycwrKWryYyzfrGKswJYen3E7wPK0WgQCr5sz25pQwkrxsyLix+cQbCbdwB8E5K/+lQlsdfVJX7TvftMZdrsfSNcRF+pZQmA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=HQ3TbiWijUITJ4G2k4Wite5laUI4aZ4/ZPZxreiWpuU=;
 b=hEzUAEANNKg6XoirVwTebPcghA5IwWTEMhz9VG2QebPnJ1owXtSz2bEuL3W1PSSBEGVvib31sLxr6MMUu6f1h7yxGJ7UIbr8Io1MCWAh52/zklCXS4lhGcqDoA6SRWOEcGZ2gXRiSNkcjhmWOCAmvxqfWQ0CBIfdVbNfvrQMtXU=
Date: Thu, 24 Mar 2022 15:11:39 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Demi Marie Obenour <demi@invisiblethingslab.com>
CC: Xen developer discussion <xen-devel@lists.xenproject.org>
Subject: Re: Support status of OpenBSD frontend drivers
Message-ID: <Yjx8G5tH4Xf8+oVx@Air-de-Roger>
References: <Yjx4kNv7hG4FGGot@itl-email>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <Yjx4kNv7hG4FGGot@itl-email>
X-ClientProxiedBy: LO2P265CA0134.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:9f::26) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 9a4bf29d-8da1-45a0-9c90-08da0da039cf
X-MS-TrafficTypeDiagnostic: BN6PR03MB3140:EE_
X-Microsoft-Antispam-PRVS: <BN6PR03MB314057A6C0FF6BC07D7F291F8F199@BN6PR03MB3140.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(6486002)(8936002)(82960400001)(8676002)(4326008)(508600001)(33716001)(66476007)(66556008)(6666004)(86362001)(9686003)(6512007)(6916009)(66946007)(2906002)(6506007)(83380400001)(5660300002)(26005)(38100700002)(186003)(316002)(85182001)(67856001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?Y1RNT3pIbjZYTmZGaVFINWUyUHI3aUdQSVF2b2RwRGVEUXhUdDg5SW1OaCs5?=
 =?utf-8?B?Qm55YTNzTFN2NUU0K2ZmR1JQMnd0aFFQSnE5UTE4OXVudXEzYjVXK2pVWDl0?=
 =?utf-8?B?d0ZLMWxwUDRNR1NUQk13aHdyOFBvZFBOZ053VUlKYTFWTHBkM2hEL1FaZ1Yv?=
 =?utf-8?B?cXczTit3RGpIdC8yRGJlQnN4Wm1Id3dLK085VG5la3NDN2M5b09FdHQ1OTA4?=
 =?utf-8?B?YmhyczZobEFaNFd3dzZheTRGRnlCRjhJZXBiNEJSYStPVm03UmlXU1BQN3Ru?=
 =?utf-8?B?cm1lckd0SXowWXZYOTM4S1pYc1JLN1JpR044V3hCK3hsRHlucnNlMlI0SDZF?=
 =?utf-8?B?NU1Pd001dVNYSTZTN0d5Y0prRWI3V09XcGRjYmd4NGNMUDY4U3lJcU1DanU0?=
 =?utf-8?B?UVJDNElsTm9PdUpJei9Oc09Ec21FRkNKbnJIcXhWQ0hwbXBLVTRRSHpWUFpP?=
 =?utf-8?B?US8yalBkWWJPS1JqNzRjTGpZRXovVlhWQzBHdkZWcldFOXJMSGkrY2R5R0N3?=
 =?utf-8?B?dU1JNU1IcEI2QXBYcUtCLzBrUVp3Umo4SGNoT3krVnJyc2x4c2lEc09FQ25x?=
 =?utf-8?B?dGZGYVFLYVpIR3BGZjZuUkNvR09vSEdaRGxYMTlTMjM0RWFhZHUySTdLeXRP?=
 =?utf-8?B?ZzZxM1B6b3VyRFhnbGZsMlQ1SStsOG96L2hYM3VtWVROekw3QnQzbjc5TzZs?=
 =?utf-8?B?enZ3UVh3THQvUzVyTE9Ea0o3ZEJ2QnhZZmlkbUwyRnNRTVllVVh0WXlJSnly?=
 =?utf-8?B?Qlg1M1lsMlNUenppV0dySEdLdGwvSk5sT2ozOW1jTG9WbGg0UjYwSmZySjV6?=
 =?utf-8?B?eUxwV3hBbXNPeW4ybXdYRFc3dEpmU2tWakNQekJsUjMxb2JOMmE0TFdmNkpD?=
 =?utf-8?B?ajNXbUVHVGJrN3JNS1lCYjVjR2drTmFxNlpaa01sRG02a2t5RDhhZG9rUDBO?=
 =?utf-8?B?aEdHSXB3RXFVVXRUZ2dqVmI5UkwrdUlJTyt3akVsSmJOQVQxbGhMdmRBTXdN?=
 =?utf-8?B?bXY4dkgzMTVodnZTZnZEazVJc0s5cFNSZitySjNWWDZWNkNvZEpYY3BZa0Yv?=
 =?utf-8?B?d0IvMWt2S1RGcmJSdlhDZUxiUVBlK25jVDZxUGlMUG9iTFZINnhPcU5rT0dK?=
 =?utf-8?B?Q1R5TmtSRTUwL0J3Wnk2aXF0Mk5jNnRvVDJ6MW9JWmt2YXdQWkRWZ0syL0pT?=
 =?utf-8?B?VGNkVjMzNzBUbkxuS1A5d3J1V21pRzY5cUxkajEwNnNYZUZPbUhhd1hNMmdh?=
 =?utf-8?B?QWQvY0tOMVlZTXpsT1RFbDNYdmtHUUd2R3piUW8zd3VXWFYreXUxZW9MWStB?=
 =?utf-8?B?L3dJZzR2Y3NBOFVEZUc4eVlDYlBEdThidE1aUEdFMmoxTlVTaUFEWWtGOHRB?=
 =?utf-8?B?OXJ5Vm03ZkhtTjNvK1pjSDQ5TmhLMDhsNVh0c0VETDBWdi93SCtHYzBQNDA1?=
 =?utf-8?B?ME1rclljY3pVUDV1amtSdDZaT0hmNHpWU2xySzJSeGNMNHJodnJJZS9tMG0z?=
 =?utf-8?B?OCtwRW12eVZoQ3FiVFRyM3NRM1pEQVFwL1VuUnpkWk9STnpZbWpYOFkwa1lN?=
 =?utf-8?B?YkJobWFXOUMvd3V3ekY5WjArTHlrREd3Y0ZIZFZEQ0pYUi9KWmRRR01DT3J0?=
 =?utf-8?B?TFpXYnNIQ0VBeGh4YWJBMTNYWldSSjB2ZHB5d0QvTXdaT0dJajlFcVQvQmZ1?=
 =?utf-8?B?TE5iR1VCTFRIcWREMDRrYXlneWJHcG1PdHhiSTRMeGRYL29la2VacDM5SGl2?=
 =?utf-8?B?YldKM0UrTVNEV3NocE5KY2JPcGJOMlM5QmVjZ3lVbUZNMzI3bjZLRVNHTUFk?=
 =?utf-8?B?Z05GUGF5Q3NHWEwyQW50c3QrbjlVSnBEMEJ5SVNDTnl5cjZFT0lyZms2Yktw?=
 =?utf-8?B?VCt1SFR0YWpDZFc5bVlYRGhOVnB5YU1qZFd2MWZVVUhWbm82UUhhM1VlQ05I?=
 =?utf-8?B?VjZwSDdIMWVJNWp1c3B5YUlmRk1BM3JTTE9SeTlveUVSckhlMWY2MCtEaUp4?=
 =?utf-8?B?bkxvMk9tckw5NHpVZWxmOThjZ0ZCald1dWxsRk5NNnE0dXJaWkpKS21Jamsx?=
 =?utf-8?B?NmFlOTdMY3A5UnJrMGJCSDFBTDlhUDltMmVtaWd3L3BsYkt2amx4YUhrS0ZS?=
 =?utf-8?B?VHYzcExYVzlGb2FsMHd1TnQxQzR4ME9pUVZOV3Vnb0l0cmlKTlA2SS9Ueksz?=
 =?utf-8?B?OTNHK2xrWDBpd2REazIzbWVtOWJmWTJYMXFWSVhqUDk2eVdOOFVxVkZseEp2?=
 =?utf-8?B?NmtTdHhrazF5L3NkZWxyaGxXOEtSVTViQTd3TU9mWmZaN294TFpQQ2ZmZ0ow?=
 =?utf-8?B?aU1sb2tzblRlVkx5UU5Td0VKNWc0amxxMmh3TGpNWWdyQy9IUnFXc0tIcWRI?=
 =?utf-8?Q?qnQ/4y+Xr5hdUWDo=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 9a4bf29d-8da1-45a0-9c90-08da0da039cf
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Mar 2022 14:11:44.3432
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 7lqnHu3CH4x+Uu08p4KxIqPJzR0mXBAF8Tw4bauBB7MGn+EUa/c0OAP5ZmkxpIiXp+0LzbSzpjJlywjK/heTBg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR03MB3140
X-OriginatorOrg: citrix.com

On Thu, Mar 24, 2022 at 09:56:29AM -0400, Demi Marie Obenour wrote:
> As per private discussion with Theo de Raadt, OpenBSD does not consider
> bugs in its xnf(4) that allow a backend to cause mischief to be security
> issues.  I believe the same applies to its xbf(4).  Should the support
> document be updated?

I think that's already reflected in the support document:

'Status, OpenBSD: Supported, Security support external'

Since the security support is external it's my understanding OpenBSD
security team gets to decide what's a security issue and what is not.

That however creates differences in the level of support offered by
the different OSes, but I think that's unavoidable. It's also hard to
track the status here because those are external components in
separate code bases.

Could be added as a mention together with the Windows note about
frontends trusting backends, but then I would fear this is likely to
get out of sync if OpenBSD ever changes their frontends to support
untrusted backends (even if not considered as a security issue).

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 14:45:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 14:45:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294420.500636 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXOhs-0007UA-IE; Thu, 24 Mar 2022 14:44:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294420.500636; Thu, 24 Mar 2022 14:44:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXOhs-0007U3-FI; Thu, 24 Mar 2022 14:44:56 +0000
Received: by outflank-mailman (input) for mailman id 294420;
 Thu, 24 Mar 2022 14:44:55 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXOhr-0007Tt-2K; Thu, 24 Mar 2022 14:44:55 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXOhr-0005gq-0m; Thu, 24 Mar 2022 14:44:55 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXOhq-0004En-L1; Thu, 24 Mar 2022 14:44:54 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXOhq-0004Fv-KX; Thu, 24 Mar 2022 14:44:54 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=WdjTYXLAgPG6FwnrQd6DgUH8qe7xs03SJ4awHVe1J6c=; b=I+cmGinRpIV350DlX36+jZTCtr
	9uRpvTe0ypT/nIIREQtHIYKdDu+GZdL6Mlt6kU9Bu2inbHw2g3NsJr23CoMTi5y+0Y57+I5GNxYgU
	nFvzPMN8rvua8joSizHGoDkfK7C+08Vux3kwYcjxw+nGHLTPG4OSJmimq3/Ew704AKkU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168824-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168824: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 24 Mar 2022 14:44:54 +0000

flight 168824 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168824/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   24 days
Failing since        168258  2022-03-01 01:55:31 Z   23 days  244 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    2 days   25 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 14:50:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 14:50:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294428.500648 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXOnX-0000Zh-AZ; Thu, 24 Mar 2022 14:50:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294428.500648; Thu, 24 Mar 2022 14:50:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXOnX-0000Za-7V; Thu, 24 Mar 2022 14:50:47 +0000
Received: by outflank-mailman (input) for mailman id 294428;
 Thu, 24 Mar 2022 14:50:45 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=z7/3=UD=citrix.com=prvs=07544547a=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nXOnV-0000ZU-9b
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 14:50:45 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id c700d531-ab81-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 15:50:43 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c700d531-ab81-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648133443;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=vV7ysaSoj13so5mRnwxQmwAteMsysTFyUQ7QlMtKr0k=;
  b=ElEN9CWrrOYapCKrqcTFbeDKbnppru2Dt9oCQw1/zNY42q6iixFiZPwd
   mwEG2L6qsrDZVu/v10EmUPNuslhB1geTsUXKaJHghDIHBxFuzP36bjggO
   lBb1NAcRuvJvl7JkRSoP0jAxABIu287DpXZh3ZDlRXpqTQJALp3BfGWm2
   s=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67081931
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:smqeaa5OqscnTsH7pEDvrAxRtNrHchMFZxGqfqrLsTDasY5as4F+v
 jAZDWDTPv2OZmTwf9AiPovlo0NT6pbWzYBiHAJk/HhkHi5G8cbLO4+Ufxz6V8+wwmwvb67FA
 +E2MISowBUcFyeEzvuVGuG96yE6j8lkf5KkYAL+EnkZqTRMFWFw0XqPp8Zj2tQy2YPjX1vX0
 T/Pi5a31GGNimYc3l08s8pvmDs31BglkGpF1rCWTakjUG72zxH5PrpGTU2CByKQrr1vNvy7X
 47+IISRpQs1yfuP5uSNyd4XemVSKlLb0JPnZnB+A8BOiTAazsA+PzpS2FPxpi67hh3Q9+2dx
 umhurS5FygVY/DCk98QeABeDT9QeodIu7LudC3XXcy7lyUqclPpyvRqSko3IZcZ6qB8BmQmG
 f4wcW5XKErZ3qTvnez9GrIEascLdaEHOKsFvX5t13fBBOsOSpHfWaTao9Rf2V/cg+gQQq6OP
 ptCMFKDajzvREcIFA0TLKgSs9Wwm0feaCNUthGa8P9fD2/7k1UqjemF3MDuUt6XQcRYmG6Iq
 2SA+H72ajkBL8CWwzeB9nOqh8fMkDn9VYZUE6e3ntZ2iVia3UQPCxkbU1SqrP3/gUm7M/pAL
 2QE9yxoqrI9nGS3R9z0RFu8rXiLrxMYc9tWD+A+rgqKz8L88wufQ2QJUDNFQNgnr9MtAywn0
 EeTmNHkDiApt6eaIVqf/LqJqTK5OQAOMHQPIyQDSGM4D8LL+d9pyEiVF5A6TfDz3oad9SzML
 y6ipXYRu+hOg8Uw2o6i+07ZrXWGqNvEZ1tgjunIZV6N4gR8bY+jQoWn71nH8PpNRLqkokm9U
 GsswJbHsr1XZX2ZvGnUGbhWQun1jxqQGGeE6WODCaXN4NhEF5SLWYlLqA9zK05yWirvUW+4O
 RSD0e+9CXI6AZdLUUOVS9/pYyjJ5fK5fTgAahwyRoARCnSWXFXblByCnWbKgwjQfLEEyMnTw
 6uzf8e2Fmo9Aq961jewTOp1+eZ1mnBmmzuDHs6jkkTPPV+iiJi9E+dt3LymNL1R0U95iF+Nr
 4Y32zWilX2zr9ESkgGIqNVOfDjm3FAwBIzsqtw/SwJwClEOJY3VMNeImelJU9U8x8x9z76Ul
 lngCh4w4Aeu3hXvdFTVAk2PnZuyBP6TW1pgZndyVbtpslB+CbuSAFA3K8RmJ+V2pbY/pRO2J
 tFcE/i97j10Ym2v0xwWbIXnrZwkcxKuhAmUODGibiR5dJllLzElMPe9Fucz3EHi1haKiPY=
IronPort-HdrOrdr: A9a23:AA4zDK0TNJ39AcdYN8gNyAqjBV5yeYIsimQD101hICG9Lfb2qy
 n+ppgmPEHP5Qr5OEtApTiBUJPwJk800aQFm7X5XI3SJzUO3VHHEGgM1/qB/9SNIVyaygcZ79
 YcT0EcMqyPMbEZt7eC3ODQKb9Jq7PmgcOVbKXlvg9QpGlRGt5dBmxCe2Cm+yNNNW177c1TLu
 vh2iMLnUvoRV0nKuCAQlUVVenKoNPG0LrgfB49HhYirC2Dlymh5rLWGwWRmk52aUIF/Z4StU
 z+1yDp7KSqtP+2jjfaym/o9pxT3P/s0MFKCsCggtUcbh/slgGrToJ8XKDqhkF8nMifrHIR1P
 XcqRYpOMp+r1vXY2GOuBPonzLt1T4/gkWSvWOwsD/Gm4jUVTg6A81OicZyaR3C8Xctu9l6ze
 Ziw3+Zn4A/N2KNoA3No/zzEz16nEu9pnQv1cQJiWZEbIcYYLhN6aQC4UJuFosaFi6S0vFrLA
 BXNrCT2B9qSyLaU5iA1VMfgOBEH05DVCtue3Jy9fB8iFNt7TNEJ0hx/r1rop5PzuN+d3B+3Z
 W1Dk1ZrsA+ciYoV9MPOA4ge7rBNoWfe2O7DIqtSW6XZp3vfUi97qLK3A==
X-IronPort-AV: E=Sophos;i="5.90,207,1643691600"; 
   d="scan'208";a="67081931"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=PfFM4NMrhSWNAv9I/bGO7CIDLk5Q5AWwO9VRvj0zwnJwALvAI6dakggM+XkMHFECiyDzts+0+phAdFYIIz7eHvrQmxYwXCY1oDzoWf8tTe7/9ZV8QbfrPOzyeHSVkukrOr7d6J7k2MXeTGKaOgxlDrIDbIs7Tq5Bqqn8EU08XoasFP8Dow9qKEr1zw9Z9kgRDSDP1l3HY0s0w2/s+M21R9AE1HsH/6yQFQrTQ3YIWxHCkVJttF/RIFxL/Sue2oU0a2/Zn/Ay1ymEfoPfFSrf7DHNRhiAhe3VDwJHGdSrviMBGPcL3zCWl5MqyxWFo13mdcAjRC1WyiYPSQf6kSIJHw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=2U8iZLqCEtxFsMpBC75M2ipq4mgeareS1zCb6P8IDGE=;
 b=VzOrcW3KCWQMq2ZCtREz4tQTYzQEaKjv/YJ7sDzAmF8iK/wffpSPvM0p7EQLGEqUAJkTGng1nrD0VdmSKrWOBbnaGaIcwoUUEtHNTetc6I06YfCv040UajyRy46EnjwNvDByV8ZYZhqXKKqXvpnn8xn7Fhh658s6lOH9oYBKTTVJvAYOB96ijCxVKd8Y/h+aoApnGF4d33VbzCC3WjHuRyNRXGMwUvy9nrxd1LiNbyYNQuY7QHEvSgn7T0kzXwIqrmFuqKrMiTN69dOyvvHBRqBGfwBp+Wqhh/FKfh5DVdRmvdV5Ppdk2gpPX826hiEwYXS+N2zxGE7hMiaEGY/QZw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=2U8iZLqCEtxFsMpBC75M2ipq4mgeareS1zCb6P8IDGE=;
 b=YEC16cO1Dw1QG906gzFKLxX+ghU426GGUa8uxmoQYHyka1YSG7mFyEzWwmya9aZ8vzZwJtfk4+XnYhKM6G/chMtaZinTjF4xPnnBh6TX042+1zVQcpjDXgp69X68+kgVhUseGWv9B5hqmqA2HdQ4diIINmwcv4aZJAN/spf7tsQ=
Date: Thu, 24 Mar 2022 15:50:32 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Tamas K Lengyel <tamas.lengyel@intel.com>
CC: <xen-devel@lists.xenproject.org>, Jan Beulich <jbeulich@suse.com>, Andrew
 Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Tamas K Lengyel <tamas@tklengyel.com>
Subject: Re: [PATCH 1/3] x86/mem_sharing: option to skip populating special
 pages during fork
Message-ID: <YjyFODl7VFJLaj0c@Air-de-Roger>
References: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
X-ClientProxiedBy: LO2P265CA0158.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:9::26) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 8f2c1fc8-61f8-4644-4a63-08da0da5a87b
X-MS-TrafficTypeDiagnostic: PH0PR03MB5845:EE_
X-Microsoft-Antispam-PRVS: <PH0PR03MB5845343C803AF140B4D5A6DD8F199@PH0PR03MB5845.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(2906002)(33716001)(6666004)(6506007)(83380400001)(186003)(26005)(6512007)(9686003)(316002)(4326008)(8676002)(85182001)(6486002)(508600001)(66476007)(66556008)(54906003)(6916009)(86362001)(66946007)(82960400001)(8936002)(5660300002)(38100700002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?MlVtMXFyVmFYYWhxbXpOdnFDd2VOdFZmUDFnZWRUdlBkbWoxeStEcFlRek8v?=
 =?utf-8?B?SlQ3VnVPQ1NpSVo3YVZFb0VzZElUOHFHT0xNUGtxOUowTldmY0wwMStnc2l4?=
 =?utf-8?B?dUZmMHhXbzk0cC9XMndwZjZ5UVQyM2tGRkltQzBQakJSRk0yRzlBbzlicUgv?=
 =?utf-8?B?SUd1UU8yaFJleEpWZ0VrOEhQbDhkMW9xU1VvWSt3TFhJVjhPeXZhekdUZlpz?=
 =?utf-8?B?dkNvTjBWU2RiSzk0QXY5L3RjSUlqcDVJbEMwS1hZN1pMTm5hVnJ2QVZZbWNk?=
 =?utf-8?B?dDZKbG1vekl2bHFlZ0ZDYTMwblkzVnJGMDNhUDgyWkRMeUdjQ0pDemlMOW0y?=
 =?utf-8?B?WEQ1ZGdvNmRNSjAvYncvUTY0cWR1eXo0dVk5UGV3U1IrUVplQTV6bjFCekNY?=
 =?utf-8?B?REtCR3VoNkxSRFp0WXVURG1HNWN0MGIyekx4azNMcHVFRnlWSm84dkVOQllH?=
 =?utf-8?B?ZGdYYVNGY1MrejU4RTB2NGd3SUt6V2Q3d2h0d1RXWXAwMXE3TG04b3ovUFR3?=
 =?utf-8?B?RDVHVW9XMXBQL2JaSnJTeERZTHJ0MEttYXYyMWpSN2FlOHAyVVIwcTF1ZDJP?=
 =?utf-8?B?OHIraDJ1SUQvTGViT3FRL3NEVHJVYm50VnJoN3I0RkZFNUp5N2xRbm1ZZ2lx?=
 =?utf-8?B?SjhmM2dmZ25qN2h0cUlwdzNseU9LMVkvM3A4WGVzUjJtK0RsaXBtZmVpUW0v?=
 =?utf-8?B?WVFHSWNORlpqTGozdlFzUUUvRDNqM0FsZTdRZWpzdzJnODl0NHg3SE9ORFNI?=
 =?utf-8?B?Y1ptb3UyY2lwc2ZNdEo2MUNRald2aEVGL3dtY3Z0NHp3K0xhb1JXbHpBWStG?=
 =?utf-8?B?enBuSUljcWl2WXp5VVI5eStmNEYxMTNZSW43K3AvZzZ6QXpXNXRDQThBUnF2?=
 =?utf-8?B?Ni9RaGxMQXFtUjJpVG9wcFR1TzYrRk1ZNWFVTkJ1VnljdyszTXEyYlJYQnhh?=
 =?utf-8?B?SFd4eWJ2Wm1jWUVOSHFtRlZFb2wrNDF0ZFFkM0M5UERxRWtHU25mMWFZUmtR?=
 =?utf-8?B?b253eS90dml4ZDZYVjRTb3cyZDhzd1JYeWtIcG1yZC9qMXcwVVRNbW5DaGcy?=
 =?utf-8?B?S1BsZFYxTmloNEdiWTNKV1dHZlAwMGlCeThMc29Ea0VVek1RcThmblJTSVlz?=
 =?utf-8?B?UXRGYVZnVzJFWXlhd0hwRHFEVldmaEI4RXJIRFVPNGgxc0NRTFVWdTdtWkxB?=
 =?utf-8?B?VnNJUHBFek9sbVh4ZWdUbXJkRS9HQUI3U2NHN090VTdPQWhRUEVDb3BNZDVN?=
 =?utf-8?B?Yk42SWgraWlrcDErcGlKamFWSWttVGhaVXBwcFltWEhML2FEZjd3Wm5iSGhp?=
 =?utf-8?B?MkF1b3RXd3dBNTdNRkVocmhyYlhFTXlaTDJicWUrWk50U25wZHZ6bFUxbUw4?=
 =?utf-8?B?VXEvYVg4akdIZ3I4QVhMMHI0bDBvRXR5SGdVeUd4c2ZlTjNXK281eWZqQWxW?=
 =?utf-8?B?aGV0MEN3K1UvaVdBTWFnYWZSbkRaZ1pmUUltenV3R2d6R3lseFdJS3MrZ0hl?=
 =?utf-8?B?ckFVZ01kbWNZSkZyVFdqL2wyV0krb1h1cCt4MHFzU0lCOUdRSERTT0t0dFRp?=
 =?utf-8?B?bzl4NFA2K1JaV2VRM3E5QTh3Ujl1emZMZlpzVjBXWTBLSFZFcndvTjZuSzJ1?=
 =?utf-8?B?L2YxZkpTZHNlcFZpNGtrbzFVdDBTMTMrT1hDQmpoQ2JPdmllcHp1dlRRZTg0?=
 =?utf-8?B?Z25NVmRRYTNKREpLNUEzMjRPV3dPbEFkclVKUGt0VStPSlNLaU9ubGpiOGJR?=
 =?utf-8?B?MThsRmgxY2V5bGJGZk5WdWRjM2dhUXlOUVFaVlVWMGkvcXFSRVVvMXk4YVN2?=
 =?utf-8?B?TGZ0T2MzdzhjaVdOMlFYVmxsSnFsTUd5eWMyYTZ4d3UxUFdKWVlpZGwrR2JF?=
 =?utf-8?B?TGJ2RjFvdFh2RzhJVDBORW1GOTdvUkpobFZqeUtYTVdNNXg3N0hxVE5nQU84?=
 =?utf-8?B?clJoTHFiK09NZGpGNzFNWVlCNlBMOUFsamlzNm5sbE1JaDREcjNKQ3BQTlZ2?=
 =?utf-8?B?a1JCclZuYnFBVk55RWNQdlB1Vmdhb1U0TjIwR2JoTGVCblBlclgzRWtGb21v?=
 =?utf-8?B?MFFLdTlhM1ZFTXYyRkEyai8rbm5ZM1RjYWhxeWZrWjdPbWJDYUdUeGNSQTN0?=
 =?utf-8?B?VzZJU0ZTSHVWdXRvL2kvZW11cEhvUW5maStXTmhvTXo0UzhxcDJSMUVHMzY2?=
 =?utf-8?B?b1B5cXo5cXgrNWNINTlZZ3ptWEV1UUtZdWFvbklRSXI3Q0phNDEwaGRSQ3hn?=
 =?utf-8?B?aExzekwvNjFqNHpvS0tHT2hxRTVxWE1hZ3ZxVWlIZnlsMU9hS25LVE9IWGRP?=
 =?utf-8?B?TnZRMG9Va3FMb1JLUzB1MnplM3puWU5DTlVsZHE4dEh4d2RoN0UzTmUzRm9r?=
 =?utf-8?Q?OY1UlmY0p0SflzgI=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 8f2c1fc8-61f8-4644-4a63-08da0da5a87b
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Mar 2022 14:50:37.5325
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: n/F8hGWzC2bnPdzM5wwAkOAHIx+HzeZ6fA8PW1Ns4gvmyqkKt5pjPb2KU/2S3ce9mZsSgNRaZ/FDw6NewMdDXg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR03MB5845
X-OriginatorOrg: citrix.com

On Tue, Mar 22, 2022 at 01:41:37PM -0400, Tamas K Lengyel wrote:
> Add option to the fork memop to skip populating the fork with special pages.
> These special pages are only necessary when setting up forks to be fully
> functional with a toolstack. For short-lived forks where no toolstack is active
> these pages are uneccesary.

I'm not sure those are strictly related to having a toolstack. For
example the vcpu_info has nothing to do with having a toolstack, and
is only used by the guest in order to receive events or fetch time
related data. So while a short-lived fork might not make use of those,
that has nothing to do with having a toolstack or not.

> 
> Signed-off-by: Tamas K Lengyel <tamas.lengyel@intel.com>
> ---
>  xen/arch/x86/include/asm/hvm/domain.h |  4 +++-
>  xen/arch/x86/mm/mem_sharing.c         | 33 +++++++++++++++++----------
>  xen/include/public/memory.h           |  4 ++--
>  3 files changed, 26 insertions(+), 15 deletions(-)
> 
> diff --git a/xen/arch/x86/include/asm/hvm/domain.h b/xen/arch/x86/include/asm/hvm/domain.h
> index 698455444e..446cd06411 100644
> --- a/xen/arch/x86/include/asm/hvm/domain.h
> +++ b/xen/arch/x86/include/asm/hvm/domain.h
> @@ -31,7 +31,9 @@
>  #ifdef CONFIG_MEM_SHARING
>  struct mem_sharing_domain
>  {
> -    bool enabled, block_interrupts;
> +    bool enabled;
> +    bool block_interrupts;
> +    bool skip_special_pages;
>  
>      /*
>       * When releasing shared gfn's in a preemptible manner, recall where
> diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86/mm/mem_sharing.c
> index 15e6a7ed81..84c04ddfa3 100644
> --- a/xen/arch/x86/mm/mem_sharing.c
> +++ b/xen/arch/x86/mm/mem_sharing.c
> @@ -1643,7 +1643,8 @@ static int bring_up_vcpus(struct domain *cd, struct domain *d)
>      return 0;
>  }
>  
> -static int copy_vcpu_settings(struct domain *cd, const struct domain *d)
> +static int copy_vcpu_settings(struct domain *cd, const struct domain *d,
> +                              bool skip_special_pages)
>  {
>      unsigned int i;
>      struct p2m_domain *p2m = p2m_get_hostp2m(cd);
> @@ -1660,7 +1661,7 @@ static int copy_vcpu_settings(struct domain *cd, const struct domain *d)
>  
>          /* Copy & map in the vcpu_info page if the guest uses one */
>          vcpu_info_mfn = d_vcpu->vcpu_info_mfn;
> -        if ( !mfn_eq(vcpu_info_mfn, INVALID_MFN) )
> +        if ( !skip_special_pages && !mfn_eq(vcpu_info_mfn, INVALID_MFN) )
>          {
>              mfn_t new_vcpu_info_mfn = cd_vcpu->vcpu_info_mfn;
>  
> @@ -1807,17 +1808,18 @@ static int copy_special_pages(struct domain *cd, struct domain *d)
>      return 0;
>  }
>  
> -static int copy_settings(struct domain *cd, struct domain *d)
> +static int copy_settings(struct domain *cd, struct domain *d,
> +                         bool skip_special_pages)
>  {
>      int rc;
>  
> -    if ( (rc = copy_vcpu_settings(cd, d)) )
> +    if ( (rc = copy_vcpu_settings(cd, d, skip_special_pages)) )
>          return rc;
>  
>      if ( (rc = hvm_copy_context_and_params(cd, d)) )
>          return rc;
>  
> -    if ( (rc = copy_special_pages(cd, d)) )
> +    if ( !skip_special_pages && (rc = copy_special_pages(cd, d)) )
>          return rc;
>  
>      copy_tsc(cd, d);
> @@ -1826,9 +1828,11 @@ static int copy_settings(struct domain *cd, struct domain *d)
>      return rc;
>  }
>  
> -static int fork(struct domain *cd, struct domain *d)
> +static int fork(struct domain *cd, struct domain *d, uint16_t flags)
>  {
>      int rc = -EBUSY;
> +    bool block_interrupts = flags & XENMEM_FORK_BLOCK_INTERRUPTS;
> +    bool skip_special_pages = flags & XENMEM_FORK_SKIP_SPECIAL_PAGES;
>  
>      if ( !cd->controller_pause_count )
>          return rc;
> @@ -1856,7 +1860,13 @@ static int fork(struct domain *cd, struct domain *d)
>      if ( (rc = bring_up_vcpus(cd, d)) )
>          goto done;
>  
> -    rc = copy_settings(cd, d);
> +    if ( !(rc = copy_settings(cd, d, skip_special_pages)) )

Can you set
cd->arch.hvm.mem_sharing.{block_interrupts,skip_special_pages} earlier
so that you don't need to pass the options around to copy_settings and
copy_vcpu_settings?

> +    {
> +        cd->arch.hvm.mem_sharing.block_interrupts = block_interrupts;
> +        cd->arch.hvm.mem_sharing.skip_special_pages = skip_special_pages;
> +        /* skip mapping the vAPIC page on unpause if skipping special pages */
> +        cd->creation_finished = skip_special_pages;

I think this is dangerous. While it might be true at the moment that
the arch_domain_creation_finished only maps the vAPIC page, there's no
guarantee it couldn't do other stuff in the future that could be
required for the VM to be started.

Does it add much overhead to map the vAPIC page?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 14:54:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 14:54:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294431.500659 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXOqr-0001Aw-Rw; Thu, 24 Mar 2022 14:54:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294431.500659; Thu, 24 Mar 2022 14:54:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXOqr-0001Ap-OO; Thu, 24 Mar 2022 14:54:13 +0000
Received: by outflank-mailman (input) for mailman id 294431;
 Thu, 24 Mar 2022 14:54:13 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXOqr-0001Af-CI; Thu, 24 Mar 2022 14:54:13 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXOqr-0005r5-9U; Thu, 24 Mar 2022 14:54:13 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXOqr-0004SL-2I; Thu, 24 Mar 2022 14:54:13 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXOqr-0006KR-1m; Thu, 24 Mar 2022 14:54:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=3Arv8l6lpF4/PQlGQcBot62MtQ6mqjvk/ld4mslQL+Q=; b=DDB9vhtil+ai0oagdbtir3dpqQ
	VVFoqeCuvossv1fNiKdpKPXWgJtQSozj56huhl6wmqU2OexoHX3S3yytqwOYzlnfmgPEB2SNyLZPp
	GmZoUIDmxx2tvFRTHthTVUQ78TXbDHBpeh40gap5IQ6FWczBywVShM8mUpphywShwRgs=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168821-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168821: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=1c80f13a6efdc832878d7a431e2c216039d063bc
X-Osstest-Versions-That:
    xen=69e46280937526db9cf78259cd8a0a9ec62dc847
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 24 Mar 2022 14:54:13 +0000

flight 168821 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168821/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  1c80f13a6efdc832878d7a431e2c216039d063bc
baseline version:
 xen                  69e46280937526db9cf78259cd8a0a9ec62dc847

Last test of basis   168778  2022-03-22 13:03:05 Z    2 days
Testing same since   168821  2022-03-24 11:03:05 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Jan Beulich <jbeulich@suse.com>
  Juergen Gross <jgross@suse.com>
  Julien Grall <jgrall@amazon.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   69e4628093..1c80f13a6e  1c80f13a6efdc832878d7a431e2c216039d063bc -> smoke


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 15:16:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 15:16:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294438.500670 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXPBn-00048t-Jq; Thu, 24 Mar 2022 15:15:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294438.500670; Thu, 24 Mar 2022 15:15:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXPBn-00048m-Gn; Thu, 24 Mar 2022 15:15:51 +0000
Received: by outflank-mailman (input) for mailman id 294438;
 Thu, 24 Mar 2022 15:15:50 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ZOSR=UD=tklengyel.com=tamas@srs-se1.protection.inumbo.net>)
 id 1nXPBl-00048g-S9
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 15:15:50 +0000
Received: from MTA-09-3.privateemail.com (mta-09-3.privateemail.com
 [68.65.122.19]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4778b2a3-ab85-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 16:15:47 +0100 (CET)
Received: from mta-09.privateemail.com (localhost [127.0.0.1])
 by mta-09.privateemail.com (Postfix) with ESMTP id 4B3B118000AE
 for <xen-devel@lists.xenproject.org>; Thu, 24 Mar 2022 11:15:45 -0400 (EDT)
Received: from mail-ot1-f54.google.com (unknown [10.20.151.145])
 by mta-09.privateemail.com (Postfix) with ESMTPA id 28ADA18000AA
 for <xen-devel@lists.xenproject.org>; Thu, 24 Mar 2022 11:15:45 -0400 (EDT)
Received: by mail-ot1-f54.google.com with SMTP id
 a7-20020a9d5c87000000b005ad1467cb59so3495009oti.5
 for <xen-devel@lists.xenproject.org>; Thu, 24 Mar 2022 08:15:45 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4778b2a3-ab85-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648134945;
	bh=b/gOg7X3ZvtJ6+TC9Y6eYzuA/EWT8wPFREbprwYESh0=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=LjqRXUZ46YJ4xs1Q9P5QOCgYuWmrCTpTZlzbNfAJYM78UYKybyRzahoMZm9AoYJKc
	 daaEe6XyYNJQzU9DXG/otQj68AknfT4bURCpkJpcRoxnLQtvN+zHn2NvC1buetUgyT
	 m6zG+u8yrEzfFk2o3SQs/rqmAiNb8Ndhufp3CMmL7aev/hB9e/8J/ovkDlY49HoRrh
	 d9dWBqFsYusCEOIQrdjpVWjOACxiLkF6MT+/S9jWiLaLVvAc/dMrYiRejd2ZUklLG0
	 hTXc5OZueLtORqvz0N86YEtSYLtUD2Md1+qLLrhqDzUXMubGSW73MrLPhtyUtyHQZJ
	 MpB930lIpzX8w==
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648134945;
	bh=b/gOg7X3ZvtJ6+TC9Y6eYzuA/EWT8wPFREbprwYESh0=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=LjqRXUZ46YJ4xs1Q9P5QOCgYuWmrCTpTZlzbNfAJYM78UYKybyRzahoMZm9AoYJKc
	 daaEe6XyYNJQzU9DXG/otQj68AknfT4bURCpkJpcRoxnLQtvN+zHn2NvC1buetUgyT
	 m6zG+u8yrEzfFk2o3SQs/rqmAiNb8Ndhufp3CMmL7aev/hB9e/8J/ovkDlY49HoRrh
	 d9dWBqFsYusCEOIQrdjpVWjOACxiLkF6MT+/S9jWiLaLVvAc/dMrYiRejd2ZUklLG0
	 hTXc5OZueLtORqvz0N86YEtSYLtUD2Md1+qLLrhqDzUXMubGSW73MrLPhtyUtyHQZJ
	 MpB930lIpzX8w==
X-Gm-Message-State: AOAM5327XF0p0eUfV14/4GAHpSYkXJoWXzHO3KGScpbvw/g9gsUFFvrE
	WZdrMTVpunZi7N2dcyMTg79w19VV7jUDqBxbozI=
X-Google-Smtp-Source: ABdhPJyn42So2l+Megiwq5URQjW0+hfJtjaRKR/n+kF9a/Iyx+9P++a1GzCd7b3satFGdXMxusmKGJOcL14cDN73RIU=
X-Received: by 2002:a9d:638a:0:b0:5cd:a7fc:aa89 with SMTP id
 w10-20020a9d638a000000b005cda7fcaa89mr2350300otk.204.1648134944393; Thu, 24
 Mar 2022 08:15:44 -0700 (PDT)
MIME-Version: 1.0
References: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
 <YjyFODl7VFJLaj0c@Air-de-Roger>
In-Reply-To: <YjyFODl7VFJLaj0c@Air-de-Roger>
From: Tamas K Lengyel <tamas@tklengyel.com>
Date: Thu, 24 Mar 2022 11:15:08 -0400
X-Gmail-Original-Message-ID: <CABfawhk9n08bmXWO1iM7Sz-5uhzuT5W6BZzj+yNDW1+FFDA5GA@mail.gmail.com>
Message-ID: <CABfawhk9n08bmXWO1iM7Sz-5uhzuT5W6BZzj+yNDW1+FFDA5GA@mail.gmail.com>
Subject: Re: [PATCH 1/3] x86/mem_sharing: option to skip populating special
 pages during fork
To: =?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>, xen-devel@lists.xenproject.org, 
	Jan Beulich <JBeulich@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>, 
	George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, 
	Stefano Stabellini <sstabellini@kernel.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Virus-Scanned: ClamAV using ClamSMTP

On Thu, Mar 24, 2022 at 10:50 AM Roger Pau Monn=C3=A9 <roger.pau@citrix.com=
> wrote:
>
> On Tue, Mar 22, 2022 at 01:41:37PM -0400, Tamas K Lengyel wrote:
> > Add option to the fork memop to skip populating the fork with special p=
ages.
> > These special pages are only necessary when setting up forks to be full=
y
> > functional with a toolstack. For short-lived forks where no toolstack i=
s active
> > these pages are uneccesary.
>
> I'm not sure those are strictly related to having a toolstack. For
> example the vcpu_info has nothing to do with having a toolstack, and
> is only used by the guest in order to receive events or fetch time
> related data. So while a short-lived fork might not make use of those,
> that has nothing to do with having a toolstack or not.

Fair enough, the point is that the short live fork doesn't use these pages.

> >
> > Signed-off-by: Tamas K Lengyel <tamas.lengyel@intel.com>
> > ---
> >  xen/arch/x86/include/asm/hvm/domain.h |  4 +++-
> >  xen/arch/x86/mm/mem_sharing.c         | 33 +++++++++++++++++----------
> >  xen/include/public/memory.h           |  4 ++--
> >  3 files changed, 26 insertions(+), 15 deletions(-)
> >
> > diff --git a/xen/arch/x86/include/asm/hvm/domain.h b/xen/arch/x86/inclu=
de/asm/hvm/domain.h
> > index 698455444e..446cd06411 100644
> > --- a/xen/arch/x86/include/asm/hvm/domain.h
> > +++ b/xen/arch/x86/include/asm/hvm/domain.h
> > @@ -31,7 +31,9 @@
> >  #ifdef CONFIG_MEM_SHARING
> >  struct mem_sharing_domain
> >  {
> > -    bool enabled, block_interrupts;
> > +    bool enabled;
> > +    bool block_interrupts;
> > +    bool skip_special_pages;
> >
> >      /*
> >       * When releasing shared gfn's in a preemptible manner, recall whe=
re
> > diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86/mm/mem_sharin=
g.c
> > index 15e6a7ed81..84c04ddfa3 100644
> > --- a/xen/arch/x86/mm/mem_sharing.c
> > +++ b/xen/arch/x86/mm/mem_sharing.c
> > @@ -1643,7 +1643,8 @@ static int bring_up_vcpus(struct domain *cd, stru=
ct domain *d)
> >      return 0;
> >  }
> >
> > -static int copy_vcpu_settings(struct domain *cd, const struct domain *=
d)
> > +static int copy_vcpu_settings(struct domain *cd, const struct domain *=
d,
> > +                              bool skip_special_pages)
> >  {
> >      unsigned int i;
> >      struct p2m_domain *p2m =3D p2m_get_hostp2m(cd);
> > @@ -1660,7 +1661,7 @@ static int copy_vcpu_settings(struct domain *cd, =
const struct domain *d)
> >
> >          /* Copy & map in the vcpu_info page if the guest uses one */
> >          vcpu_info_mfn =3D d_vcpu->vcpu_info_mfn;
> > -        if ( !mfn_eq(vcpu_info_mfn, INVALID_MFN) )
> > +        if ( !skip_special_pages && !mfn_eq(vcpu_info_mfn, INVALID_MFN=
) )
> >          {
> >              mfn_t new_vcpu_info_mfn =3D cd_vcpu->vcpu_info_mfn;
> >
> > @@ -1807,17 +1808,18 @@ static int copy_special_pages(struct domain *cd=
, struct domain *d)
> >      return 0;
> >  }
> >
> > -static int copy_settings(struct domain *cd, struct domain *d)
> > +static int copy_settings(struct domain *cd, struct domain *d,
> > +                         bool skip_special_pages)
> >  {
> >      int rc;
> >
> > -    if ( (rc =3D copy_vcpu_settings(cd, d)) )
> > +    if ( (rc =3D copy_vcpu_settings(cd, d, skip_special_pages)) )
> >          return rc;
> >
> >      if ( (rc =3D hvm_copy_context_and_params(cd, d)) )
> >          return rc;
> >
> > -    if ( (rc =3D copy_special_pages(cd, d)) )
> > +    if ( !skip_special_pages && (rc =3D copy_special_pages(cd, d)) )
> >          return rc;
> >
> >      copy_tsc(cd, d);
> > @@ -1826,9 +1828,11 @@ static int copy_settings(struct domain *cd, stru=
ct domain *d)
> >      return rc;
> >  }
> >
> > -static int fork(struct domain *cd, struct domain *d)
> > +static int fork(struct domain *cd, struct domain *d, uint16_t flags)
> >  {
> >      int rc =3D -EBUSY;
> > +    bool block_interrupts =3D flags & XENMEM_FORK_BLOCK_INTERRUPTS;
> > +    bool skip_special_pages =3D flags & XENMEM_FORK_SKIP_SPECIAL_PAGES=
;
> >
> >      if ( !cd->controller_pause_count )
> >          return rc;
> > @@ -1856,7 +1860,13 @@ static int fork(struct domain *cd, struct domain=
 *d)
> >      if ( (rc =3D bring_up_vcpus(cd, d)) )
> >          goto done;
> >
> > -    rc =3D copy_settings(cd, d);
> > +    if ( !(rc =3D copy_settings(cd, d, skip_special_pages)) )
>
> Can you set
> cd->arch.hvm.mem_sharing.{block_interrupts,skip_special_pages} earlier
> so that you don't need to pass the options around to copy_settings and
> copy_vcpu_settings?

Would be possible yes, but then we would have to clear them in case
the forking failed at any point. Setting them only at the end when the
fork finished ensures that those fields are only ever valid if the VM
is a fork. Both are valid approaches and I prefer this over the other.

>
> > +    {
> > +        cd->arch.hvm.mem_sharing.block_interrupts =3D block_interrupts=
;
> > +        cd->arch.hvm.mem_sharing.skip_special_pages =3D skip_special_p=
ages;
> > +        /* skip mapping the vAPIC page on unpause if skipping special =
pages */
> > +        cd->creation_finished =3D skip_special_pages;
>
> I think this is dangerous. While it might be true at the moment that
> the arch_domain_creation_finished only maps the vAPIC page, there's no
> guarantee it couldn't do other stuff in the future that could be
> required for the VM to be started.

I understand this domain_creation_finished route could be expanded in
the future to include other stuff, but IMHO we can evaluate what to do
about that when and if it becomes necessary. This is all experimental
to begin with.

> Does it add much overhead to map the vAPIC page?

I don't have numbers but it does add overhead. When we do a fork reset
we loop through all pages in the physmap to determine what needs to be
removed. So having an extra page means that loop is always larger than
it actually needs to be. Considering we do the reset thousands of
times per second per core, you can imagine it adding up over time.

Tamas


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 15:36:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 15:36:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294443.500681 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXPVp-0006hC-Fz; Thu, 24 Mar 2022 15:36:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294443.500681; Thu, 24 Mar 2022 15:36:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXPVp-0006h5-CF; Thu, 24 Mar 2022 15:36:33 +0000
Received: by outflank-mailman (input) for mailman id 294443;
 Thu, 24 Mar 2022 15:36:31 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ioZu=UD=gmail.com=dpsmith.dev@srs-se1.protection.inumbo.net>)
 id 1nXPVn-0006gz-Gg
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 15:36:31 +0000
Received: from mail-qt1-x82d.google.com (mail-qt1-x82d.google.com
 [2607:f8b0:4864:20::82d])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2c65a3ca-ab88-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 16:36:29 +0100 (CET)
Received: by mail-qt1-x82d.google.com with SMTP id j21so4163964qta.0
 for <xen-devel@lists.xenproject.org>; Thu, 24 Mar 2022 08:36:29 -0700 (PDT)
Received: from [10.10.1.138] (static-72-81-132-2.bltmmd.fios.verizon.net.
 [72.81.132.2]) by smtp.gmail.com with ESMTPSA id
 e14-20020ac85dce000000b002e1ee68d2d9sm2555800qtx.95.2022.03.24.08.36.25
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Thu, 24 Mar 2022 08:36:26 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2c65a3ca-ab88-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=message-id:date:mime-version:user-agent:from:subject:to:cc
         :references:content-language:in-reply-to:content-transfer-encoding;
        bh=oUWndWtNiJUbjMp/5sX7I4A6rhM6PsCR3+Pgcn0pd3Q=;
        b=AfkdPTPJFIbVbxYR5r7X5Qyv4Vaq0SUHbm2+L95mgnh0+oQAa19YB0u4QwTMpSbzHJ
         rzSMxtkHY5+co2CXJOnQJa8pG95y/VTpcpuT01yGb940UTrVvZXrOXSU4dwEvtaiw2PZ
         XMMZ7cM9IVsEdzMMZokHcKfq82lrHKCxPqlwAeQLmbbazf8cZH2WF+8joh2sfSBksWyB
         nSpi9XuSeManflg8jOrRFvQXg+/ompetnlbw/lE1Oh9n08EQOQYhG4FJ92dcupQ6b01t
         abY+FZJ/Nm8hlwpfC3ycq8iB04K/yxtucqAe/oE90SXDncWGoBxKuu5GYaIZBc+KEeHA
         VA+A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:message-id:date:mime-version:user-agent:from
         :subject:to:cc:references:content-language:in-reply-to
         :content-transfer-encoding;
        bh=oUWndWtNiJUbjMp/5sX7I4A6rhM6PsCR3+Pgcn0pd3Q=;
        b=HJHYzhACmYpus05n094w1X3C7P3Gg40AvJ3AqxMzMeph7FDsKw82YCI9We3KjaGFBy
         ucCj9cqsGfeP4Azkxf7stscKhFz8N7U38KX56q+lMX0na5DjoSbkgUgOOzWa0vhRzlzv
         cTmSVl0WdDa4AVuzxbMdgJhw+NdpY6KX8IGDR6gFOLGKzbuI0BGPvIov9NZDOATVFBDC
         3pcm5yr7iCeRmdqujNldh6ITJqkqgc2YhC8D+el1NPBKiz69k7yoI/R5vmdJUeqOUMea
         Ed99MP4dMSaI0uKEqmqdMOQOAAdM2JI8rdk/gX57eb2lgDhxkOjK9vq/18uPSWq39PuJ
         JcUQ==
X-Gm-Message-State: AOAM533udtBhSTTADuoYgm4OhuwsNEo1tC7vUmOb8lZGIbIIoarTMFIo
	o7kjJN0o5/3Ebyw/g8k25dk=
X-Google-Smtp-Source: ABdhPJylEcyGOv/9lR7TRDLYNBVJY/Pr96VFyYHjHGD7FZCYPWH/3IMVcqryIUky8lwsRseOgVYhVA==
X-Received: by 2002:a05:622a:5d1:b0:2e0:70c7:1678 with SMTP id d17-20020a05622a05d100b002e070c71678mr5016146qtb.43.1648136188492;
        Thu, 24 Mar 2022 08:36:28 -0700 (PDT)
Message-ID: <ab2b2165-c819-5c47-da1d-35bcb524df79@gmail.com>
Date: Thu, 24 Mar 2022 11:36:14 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
From: "Daniel P. Smith" <dpsmith.dev@gmail.com>
Subject: Re: [PATCH v3 2/5] xen: make evtchn_alloc_unbound public
To: Stefano Stabellini <sstabellini@kernel.org>, jbeulich@suse.com
Cc: xen-devel@lists.xenproject.org, jgross@suse.com,
 Bertrand.Marquis@arm.com, julien@xen.org, Volodymyr_Babchuk@epam.com,
 Luca Miccio <lucmiccio@gmail.com>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>
References: <alpine.DEB.2.22.394.2201281330520.27308@ubuntu-linux-20-04-desktop>
 <20220128213307.2822078-2-sstabellini@kernel.org>
 <2f05e63a-96c3-e78f-f7e4-36fd17fcd58c@gmail.com>
 <alpine.DEB.2.22.394.2203221711110.2910984@ubuntu-linux-20-04-desktop>
Content-Language: en-US
In-Reply-To: <alpine.DEB.2.22.394.2203221711110.2910984@ubuntu-linux-20-04-desktop>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

On 3/22/22 20:22, Stefano Stabellini wrote:
> On Tue, 15 Mar 2022, Daniel P. Smith wrote:
>> On 1/28/22 16:33, Stefano Stabellini wrote:
>>> From: Luca Miccio <lucmiccio@gmail.com>
>>>
>>> The xenstore event channel will be allocated for dom0less domains. It is
>>> necessary to have access to the evtchn_alloc_unbound function to do
>>> that, so make evtchn_alloc_unbound public.
>>>
>>> Add a skip_xsm parameter to allow disabling the XSM check in
>>> evtchn_alloc_unbound (xsm_evtchn_unbound wouldn't work for a call
>>> originated from Xen before running any domains.)
>>>
>>> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
>>> Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
>>> CC: Julien Grall <julien@xen.org>
>>> CC: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
>>> CC: Bertrand Marquis <bertrand.marquis@arm.com>
>>> CC: Andrew Cooper <andrew.cooper3@citrix.com>
>>> CC: George Dunlap <george.dunlap@citrix.com>
>>> CC: Jan Beulich <jbeulich@suse.com>
>>> CC: Wei Liu <wl@xen.org>
>>> ---
>>> Changes v3:
>>> - expose evtchn_alloc_unbound, assing a skip_xsm parameter
>>> ---
>>>  xen/common/event_channel.c | 13 ++++++++-----
>>>  xen/include/xen/event.h    |  3 +++
>>>  2 files changed, 11 insertions(+), 5 deletions(-)
>>>
>>> diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c
>>> index da88ad141a..be57d00a15 100644
>>> --- a/xen/common/event_channel.c
>>> +++ b/xen/common/event_channel.c
>>> @@ -284,7 +284,7 @@ void evtchn_free(struct domain *d, struct evtchn *chn)
>>>      xsm_evtchn_close_post(chn);
>>>  }
>>>  
>>> -static int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
>>> +int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc, bool skip_xsm)
>>>  {
>>>      struct evtchn *chn;
>>>      struct domain *d;
>>> @@ -301,9 +301,12 @@ static int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
>>>          ERROR_EXIT_DOM(port, d);
>>>      chn = evtchn_from_port(d, port);
>>>  
>>> -    rc = xsm_evtchn_unbound(XSM_TARGET, d, chn, alloc->remote_dom);
>>> -    if ( rc )
>>> -        goto out;
>>> +    if ( !skip_xsm )
>>> +    {
>>> +        rc = xsm_evtchn_unbound(XSM_TARGET, d, chn, alloc->remote_dom);
>>> +        if ( rc )
>>> +            goto out;
>>> +    }
>>
>> Please do not subvert the security framework because it causes an
>> inconvenience. As Jan recommended, work within the XSM check to allow
>> your access so that we may ensure it is done safely. If you need any
>> help making modifications to XSM, please do not hesitate to reach out as
>> I will gladly help.
> 
> Thank you!
> 
> First let me reply to Jan: this series is only introducing 1 more call
> to evtchn_alloc_unbound, which is to allocate the special xenstore event
> channel, the one configured via
> d->arch.hvm.params[HVM_PARAM_STORE_EVTCHN].
> 
> It is not meant to be a generic function, and it is not meant to be
> called more than once. It could (should?) be __init.
> 
> The existing XSM check in evtchn_alloc_unbound cannot work and should
> not work: it is based on the current domain having enough privileges to
> create the event channel. In this case, we have no current domain at
> all. The current domain is Xen itself.

I have already replicated this in hyperlaunch for PV construction where
I have constructed the event channel for both xenstore and the console.
For hyperlaunch the construction is under a single, fairly-tight
function where I have promoted the Idle Domain to is_privileged before
the creation/construction loop starts and then demote the Idle Domain on
the other side of the loop. Honestly this is not my preferred approach
but for the initial implementation I do have a moderate amount of
confidence regarding the risk that results. My current thinking is that
the more appropriate approach would be to introduce a new system domain,
Construct Domain??, to provide a separate context under which all the
hyperlaunch creation and construction logic would be done and then
destroyed as part of init finalization.

> For these reasons, given [1], also not to subvert the security
> framework as Daniel pointed out, I think I should go back to my own
> implementation [2][3] based on get_free_port. That is my preference
> because:
> 
> - the Xen codebase doesn't gain much by reusing evtchn_alloc_unbound
> - adding skip_xsm introduces a component of risk (unless we make it
>   __init maybe?)
> - using get_free_port is trivial and doesn't pose the same issues
> 
> 
> Let's find all an agreement on how to move forward on this.
> 
> 
> [1] https://marc.info/?l=xen-devel&m=164194128922838
> [2] https://marc.info/?l=xen-devel&m=164203543615114
> [3] https://marc.info/?l=xen-devel&m=164203544615129 


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 15:46:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 15:46:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294447.500692 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXPfB-0008Ac-Cq; Thu, 24 Mar 2022 15:46:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294447.500692; Thu, 24 Mar 2022 15:46:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXPfB-0008AV-9I; Thu, 24 Mar 2022 15:46:13 +0000
Received: by outflank-mailman (input) for mailman id 294447;
 Thu, 24 Mar 2022 15:46:12 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=z7/3=UD=citrix.com=prvs=07544547a=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nXPfA-0008AP-6a
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 15:46:12 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 82fb3bfc-ab89-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 16:46:05 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 82fb3bfc-ab89-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648136765;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=H+l7RPMUpLiRE6PodWN8JSkqB+vPEnqxwvWwQAf8I6U=;
  b=TohDD6TUeotuFQVY2EFXsz9cyZyLsqnTQaz7BDbWtjNHsraagx4boYJE
   VTA2vZWXTVHGaUe3WwQRK8Tv0aNvcrIV+gTuhgk7Kdj3cO7ti25dP7rpi
   rlCr14OHYDb8/z9xleTZE14iCanWUActEP+te39/4M8pi98y+yRAmepU6
   4=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66532033
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:kHAj6Ks5gZ2Temlq1HsNr0VeYefnVP5eMUV32f8akzHdYApBsoF/q
 tZmKWmOPveDNjOjL411Yd/ioEkOsZ+HzdFjSgBkpChmQS1H+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jX5
 YuoyyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi9qPu7IoOgZXCIILH1iballwbPFAiag5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AO
 ZdCM2I0N3wsZTUTOldPE8MGjtuZpXfENCx0l3WkofMOtj27IAtZj+G2bYu9lsaxbd5Ogk+Sq
 2bC/mL4KhIXLtqSzXyC6H3Eru3SmSL2XqoCGbv+8eRl6HWPz2kaEzUKVl+2p/aoh0r4UNVaQ
 2QM4is0pqE2/Ua2ZtP8QxG1rnOCshMGHdFXFoUS4QCWw6vQ6i6TB3QIQzBMbtArrok9QjlC/
 k+EmZblCCJitJWRSGmB7fGEoDWqIy8XIGQeIygeQmMt/9DmqZp1ih/JQcduFIa0iMH4HXf7x
 DXihDc6r6Uei4gMzarT1VLNji+op5PJZhUo/QiRVWWghit7a5SifJeA8kXA4LBLK4Pxc7Wal
 CFawY7EtrlIVMzT0nzWKAkQIF23z7WFcznkjVpgJMkeqyj9/12acYJzvi4rcS+FLf04UTPuZ
 UbSvyZY65lSIGamYMdLXm6hNyg55fO+TIq4D5g4evILO8EsL1HfoEmCcGbKhwjQfF4QfbbT0
 HtxWeKlFj4kBKtu11JarM9NgOZwlkjSKY4+LK0XLihLM5LDPBZ5qp9faTNii9zVCove/205F
 P4Fa6O3J+13CrGWX8Uu2dd7wao2BXY6H4vqjMdca/SOJAFrcEl4VaOBme15K9c7x/kF/gstw
 p1bchUIoLYYrSeaQThml1g5MO+/NXqBhSxT0dMQ0aaAhCF4PNfHAFY3fJorZ7g3nNGPPtYvJ
 8Tpj/6oW6wVIhyeomx1RcCk8ORKKUT67SrTbnHNSGVuIPZdq/nhp4aMkv3Hr3JVUEJadKIW/
 tWd6+8sacZcFl4+XZeMNJpCDTqZ5BAgpQ67ZGORSvF7c0Tw6ol6bSv3i/48OcYXLhvfgDCd0
 m6r7d0w+YEhf6ddHAH1uJ25
IronPort-HdrOrdr: A9a23:EEjMQqt5cSVS1cVg1ZKiY/6A7skCmIMji2hC6mlwRA09TyXGra
 6TdaUguiMc1gx8ZJhBo7C90KnpewK7yXdQ2/htAV7CZnidhILMFuBfBOTZsljd8kHFh4pgPO
 JbAtRD4b7LfClHZKTBkXGF+r8bqbHtms3Y5pa9854ud3AQV0gJ1XYGNu/xKDwOeOApP+tfKH
 LKjfA32AZINE5nJviTNz0gZazuttfLnJXpbVovAAMm0hCHiXeN5KThGxaV8x8CW3cXqI1Su1
 Ttokjc3OGOovu7whjT2yv66IlXosLozp9mCNaXgsYYBz3wgkKDZZhnWZeFoDcpydvfo2oCoZ
 3pmVMNLs5z43TeciWcpgbs4RDp1HIU53rr2Taj8AzeiP28YAh/J9tKhIpffBecwVEnpstA3K
 VC2H/cn4ZLDDvb9R6NqOTgZlVPrA6ZsHAimekcgzh0So0FcoJcqoQZ4Qd8DIoAJiTn84oqed
 MeQP003MwmMG9yUkqp/lWGmLeXLzcO91a9MwU/U/WuonZrdCsT9Tpb+CQd9k1wgK7VBaM0ot
 gsCZ4Y542mfvVmHZ6VO91xM/dfKla9Ny4kY1jiaGgOKsk8SgfwQtjMkfEI2N0=
X-IronPort-AV: E=Sophos;i="5.90,207,1643691600"; 
   d="scan'208";a="66532033"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=cqWzvOvpTO5//FPYUiEn8/EAjpDdDJ3p/c4m+YodVEkL4xGrGNeIEyjME0Qplxz9AXxc92tYNgIKOh+eklOFgZILP7+giazgb1r/1pQR89mTXkFCPOUG3Ln+foqwqy0JK7npyORmrtmSCUegSa12dUds1Bqz0agQ7boYkKR26hmPOgAmcymEY2ObUEJYryeUp908G6icsFnMJQLDk1GMS+rcdjxVnGd/uzm0nRvkK2cc4IKjbxU9mupaTKg+LRS54Mst+ChliGeIimn9dwTTaEDr1QURJ4YVgLOOHftAKP987wgpkgJS3Z8kvjXSUYr/ldfx+SV39x8kckcvp8F8pg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=YgaAqxvU1cViA0guGwXU/j3AdjKEtIfn9g5W1kvmekM=;
 b=KyDwA+PbE+JyaXOySf33BM4siGXzQ+SkFdWbImuLPMNda2jVM4Hv/CSOYh+qve8flu3lGebb5hEUtWYKvv+DbgfSXmmZ4DGPPnk215Vo6gAnGqxW/Vz2gQRqf847PaZMTzNGENcMP5edNBOeSmOPusu14nCiplucEVF2XZDD/NanbKSMyHh15xss/5A+4oUzorhtMlDzxzgyqMR+KFYjrBdnZdCc6/7yAUFXWQP7hoOTdpUfpMGjP61Hv3N79S+hb/klF42jJ9ydFOIEtIIE+jIWxt3o9ry25f6opHBeB07qrCXDUiBLqVwCCfwE3rzmD7eIDkIkXJyq6/yns0tkqw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=YgaAqxvU1cViA0guGwXU/j3AdjKEtIfn9g5W1kvmekM=;
 b=KEXxzUw+kltLfyuhX2NBqNIIBYCr7kP3uuhbqQsmyaAwDqOHd9LH1mGuo9Lxpyy2LxMNIOX0q8HfQiq2u7UpFc/AOm0y0QDJkfjuI4XNP/bq9JlG8A6HRfBS2rBEPQ6l/v9zEonDvvfjyp7a/Rc60ZuQ8a7ao7aBFQs3P7OWnsY=
Date: Thu, 24 Mar 2022 16:45:54 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Tamas K Lengyel <tamas.lengyel@intel.com>
CC: <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, Anthony PERARD
	<anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, "Jan
 Beulich" <jbeulich@suse.com>, Julien Grall <julien@xen.org>, "Stefano
 Stabellini" <sstabellini@kernel.org>, Tamas K Lengyel <tamas@tklengyel.com>,
	Alexandru Isaila <aisaila@bitdefender.com>, Petre Pircalabu
	<ppircalabu@bitdefender.com>
Subject: Re: [PATCH 3/3] x86/mem_sharing: make fork_reset more configurable
Message-ID: <YjySMjegTNFBE5RK@Air-de-Roger>
References: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
 <fb437a16517d343ba3432aa64b9e14b34630a750.1647970630.git.tamas.lengyel@intel.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <fb437a16517d343ba3432aa64b9e14b34630a750.1647970630.git.tamas.lengyel@intel.com>
X-ClientProxiedBy: LO4P123CA0014.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:150::19) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 8439b7bb-fe19-42d5-f057-08da0dad648c
X-MS-TrafficTypeDiagnostic: BN9PR03MB6075:EE_
X-Microsoft-Antispam-PRVS: <BN9PR03MB6075F7E4157BC8BAAEEE26628F199@BN9PR03MB6075.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: v48eJG69UmjiZ16wRw49LsFLrZ3fO03VSabZY/ye2vKwOtCB7WETQ5tQLcqZojP+S64WAUAikusirBhJbgwoaZw+4GQlULh0C0O5yu+uLCLMNagQbxUw9hVQSD7Oaqma2HbJ/iC/g6IOKYBR4tKKSzL95luMPfIhtS+E6KGV8MnCbhMDyVrAKgyyqfRyDEY3yWfaM0jOVeGhW6aRJAVHXdR0Esn5BO+4ITRCkdL1vGa2MgtKiIqDOvLhRlg3N7xkHvyzKUsjJYK8H0BmuRc7wQSz7ag/UqeILTcYZaLJrRrt2I9v62SSd2TSTtbg2pc9SvioqI255ijshuZuM6/0Q7kb2HSTJq06+NRWptzL9HP64CVDwm3rVHF7gxmNQcSZwYEWku1ad1H6WtBfAhUBlrFZkwSTx1RtvD1WA318fdWu+szhDmOF/c+90LOFTR+qWlQhY9OaJKFv4tTmSgk+FI6U+pWj2pdx8Y2zHC509LdTx/UVYF/KwL8WnXsjA7CodkWBpskcYts7iW4E1/zlzcfLQVzvUyxR/Tje6uDGhB0l/u1oR6MA6QYeLsxAziw75gJU5pORvtHzp2SXhvoQyueg4zBRC0SKYbG2JJsVngReBaBS4mcYUUwonpKen3xaJGVqcfXyC968YiZgpDGJaQ==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(508600001)(66556008)(66946007)(6506007)(66476007)(82960400001)(85182001)(9686003)(8676002)(4326008)(86362001)(38100700002)(33716001)(186003)(26005)(5660300002)(83380400001)(6512007)(6916009)(7416002)(8936002)(316002)(6666004)(2906002)(6486002)(54906003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?WG1hVmVHMGZ0Z0R2UnVnbFY0UWhxbC9lb1ZvbG95dWpQTGNyeTlpWFNTN1hU?=
 =?utf-8?B?ajFUSGJ4dGxMZXpuUldFdC9EakhTT0srQzRGN3dtSnN2VXZDVTk3c1M1KzNR?=
 =?utf-8?B?WEpXNmFueUpzVVlVMmZVZnhCblp5OEVZTlMyeC91QVpZbzM1eTcrU1B5Sy91?=
 =?utf-8?B?Wi9xTmVvU3pQYnpPNXAzMHQ3cFpiRVBUSWE1ajQ2UUs4Rzd6VlNCblorTWVW?=
 =?utf-8?B?Z0xZbVk1WE5WUjJxdG5CTzJSVjVrU0RUVE56b3A3ckpBNFJnWXQ4amszTnpO?=
 =?utf-8?B?Q256cUxBeFNhUVhFaG0yRVhZZnUrUjlEaUZhby9sRXNNMGoxRmVnTjRtdTN2?=
 =?utf-8?B?WGUvS3NOaG4yeUR3TEVDQzRwYlRWR2tWak01ZUltd1EwOFFNeUNjYU9McjBY?=
 =?utf-8?B?aExyQU9jbExIT3ZJekp1ZFl2ak0ybGVZQmJjWHFGT09TNG1QQlpJWkwzSkZF?=
 =?utf-8?B?K3I1dk56bjRKcndKc3VzbUw5Y2NMdW1saUFGR1gzd3ZFald4VzIwNjhmRndo?=
 =?utf-8?B?eTFpTnFrY05PNmxOeGhYeW9jQXVVbCtHOFF6cERVUzVTVG84aVBJaEN6b1Ir?=
 =?utf-8?B?ekRjUHRaRHpJcXhyVHFyeG5hTXZrN2ZhMjV2Zy9VZEo1SDJ0b09CY3VXUE5l?=
 =?utf-8?B?S0xtZUF0VlFaNUFzWlFuVUtGZlk3SVd5Z0lOSlJXdUQzYS9lK2xEMFdsdkR2?=
 =?utf-8?B?alFWaEFvdGNURDUrejRvWGYvVW5PYlhKQThNWFFidUNHNDVEWXpXSnFvcW1G?=
 =?utf-8?B?TThPM09hamE4bXlBckxEdmx4RWE0KzU4ZlRHRnc2bjJDMlg3ZVNlUnFWaTMy?=
 =?utf-8?B?ZVNSUUxQQU40ZkN3YlpGaDM2eXBmUkV0MXRJc2F1OEQxRHVPejQvUUx5RlpN?=
 =?utf-8?B?ZG5Bb3BLL2lCZEtPQW1WNmxrT1BxMm5XT1dxdjlzWm1taE9rcnlKOTBveTNj?=
 =?utf-8?B?OTdXN1FWOFNGZkZHNkVXa25YMTZmNnQvVXhxV2dkUFUyNjdTYWllWWpoVWRK?=
 =?utf-8?B?dCtsOUxXVWlOdWE4NVB3a3ZPdUZ0Z0pGQ2xlWE9vZjZkWldjaVBzSnN4K1dZ?=
 =?utf-8?B?bU1WVnRhcEZpY05nbUdKZDQ1anBQQUNjU1I2bXBKV3BHUnJ1eXc2dE52NjEr?=
 =?utf-8?B?TXpUUXkyZnZqZ2p1ZDMrM3czVXU3dEdUallHUndXYTg5MTd3c0FtWk94OCsw?=
 =?utf-8?B?Ni93MG5GMjFVcnF0OUZYRGZPa0FTMkJwYmhwWDFVVlpURm9aTTF1a2dhQjhG?=
 =?utf-8?B?Zk5mM1RqV2tKdEdXR2Z3ZzhlK0dKWGhWS25yY0R3ZU9KSG5XbWowTkJLM0NQ?=
 =?utf-8?B?a1FQUUF2WHVZM0lqOEgrS0tITi9UbmxHMGtZcXR3TkZuaTk3cEpoZ0F1T2VN?=
 =?utf-8?B?bTRlQ3JlN0tkTDlzazBmQnF6ZGV6MUtoZlc2aG5PZDl5UFY0cDdtZlFFTU5V?=
 =?utf-8?B?aldDZ1VZRGlSczVvQllJRmdLN1duZVRseG9NMTQ1RjN2Nnd4S3c0aE0wSFB0?=
 =?utf-8?B?WW02bElqbzZ5OHJPTnYxRUwxR1plMFExbVVlbGdjdldpYXpFZGszR1ZvRUNN?=
 =?utf-8?B?UHQ1aG9yMyt1dkpGOEpLcWJXYjRzK2pZUkozU1V2c25rRDBTOVltMjFBeWgr?=
 =?utf-8?B?cm1WdjZKK3Nsa0RqMmo2ZU1ZUGdsRGwxZU1ZdjN0bGhWSVJ1cENzNHRhZExB?=
 =?utf-8?B?VkVUOGJHZDlRZXcrVEVkUDhsY2dPMVJ6OExpa09Qa3d5MHhBSi9yRzY5b0g1?=
 =?utf-8?B?b2JmdnJ5MDZkRmVCd0I3VEpHaU1hNmZmcnhCMnc0eXhkRENYWU1INTBBMDhp?=
 =?utf-8?B?b0FtYlFMN2RxSytqYllsVU1oQndnVlZERHFHblg4VGdoYVlMY2ZsL1ZWUzlV?=
 =?utf-8?B?UHJXcXBqempUOWM0dXlQdzBPU2lnSWYyWGNFQ3laZHQ1TmhDMDBrMTliMTgx?=
 =?utf-8?B?K09tR3ZrQm1GZXZRN2lTUUpaczdBSnk3bHpuVGVvdmZrYTNRUDR6ZzBnWVdq?=
 =?utf-8?B?U05zZ1hSOHVBPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 8439b7bb-fe19-42d5-f057-08da0dad648c
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Mar 2022 15:45:59.6464
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: rOj2MueGbvm4rsAxpqL3sGvq5lEIiPODK/Jjzndj4Ogu40Bg8kVe4cGkyg7WReZDnqk/sSIi7TNshKzbK0jK5g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN9PR03MB6075
X-OriginatorOrg: citrix.com

On Tue, Mar 22, 2022 at 01:41:39PM -0400, Tamas K Lengyel wrote:
> diff --git a/xen/include/public/memory.h b/xen/include/public/memory.h
> index 208d8dcbd9..30ce23c5a7 100644
> --- a/xen/include/public/memory.h
> +++ b/xen/include/public/memory.h
> @@ -541,12 +541,14 @@ struct xen_mem_sharing_op {
>                  uint32_t gref;     /* IN: gref to debug         */
>              } u;
>          } debug;
> -        struct mem_sharing_op_fork {      /* OP_FORK */
> +        struct mem_sharing_op_fork {      /* OP_FORK/_RESET */
>              domid_t parent_domain;        /* IN: parent's domain id */
>  /* These flags only makes sense for short-lived forks */
>  #define XENMEM_FORK_WITH_IOMMU_ALLOWED (1u << 0)
>  #define XENMEM_FORK_BLOCK_INTERRUPTS   (1u << 1)
>  #define XENMEM_FORK_SKIP_SPECIAL_PAGES (1u << 2)
> +#define XENMEM_FORK_RESET_STATE        (1u << 3)
> +#define XENMEM_FORK_RESET_MEMORY       (1u << 4)
>              uint16_t flags;               /* IN: optional settings */
>              uint32_t pad;                 /* Must be set to 0 */
>          } fork;
> diff --git a/xen/include/public/vm_event.h b/xen/include/public/vm_event.h
> index bb003d21d0..81c2ee28cc 100644
> --- a/xen/include/public/vm_event.h
> +++ b/xen/include/public/vm_event.h
> @@ -127,6 +127,14 @@
>   * Reset the vmtrace buffer (if vmtrace is enabled)
>   */
>  #define VM_EVENT_FLAG_RESET_VMTRACE      (1 << 13)
> +/*
> + * Reset the VM state (if VM is fork)
> + */
> +#define VM_EVENT_FLAG_RESET_FORK_STATE   (1 << 14)
> +/*
> + * Remove unshared entried from physmap (if VM is fork)
> + */
> +#define VM_EVENT_FLAG_RESET_FORK_MEMORY  (1 << 15)

I'm confused about why two different interfaces are added to do this
kind of selective resets, one to vm_event and one to xenmem_fork?

I thin k the natural place for the option to live would be
XENMEM_FORK?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 15:49:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 15:49:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294450.500703 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXPiH-0000MK-RV; Thu, 24 Mar 2022 15:49:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294450.500703; Thu, 24 Mar 2022 15:49:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXPiH-0000MD-OV; Thu, 24 Mar 2022 15:49:25 +0000
Received: by outflank-mailman (input) for mailman id 294450;
 Thu, 24 Mar 2022 15:49:24 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=oofn=UD=invisiblethingslab.com=demi@srs-se1.protection.inumbo.net>)
 id 1nXPiG-0000Lr-Bp
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 15:49:24 +0000
Received: from out5-smtp.messagingengine.com (out5-smtp.messagingengine.com
 [66.111.4.29]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f88381c7-ab89-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 16:49:22 +0100 (CET)
Received: from compute4.internal (compute4.nyi.internal [10.202.2.44])
 by mailout.nyi.internal (Postfix) with ESMTP id 9D30A5C0150;
 Thu, 24 Mar 2022 11:49:20 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163])
 by compute4.internal (MEProxy); Thu, 24 Mar 2022 11:49:20 -0400
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Thu,
 24 Mar 2022 11:49:20 -0400 (EDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f88381c7-ab89-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:cc:content-type:date:date:from:from
	:in-reply-to:in-reply-to:message-id:mime-version:references
	:reply-to:sender:subject:subject:to:to:x-me-proxy:x-me-proxy
	:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=k6pocNC7Mal5rgiN3
	mkeBhz3SFpTXA2RjUK8dB1FjHg=; b=hgPaDCUjUGTTlsoK8fq8tJOts6qHjOPSo
	TZF1K2vVsXhROYG5iOlf4vwc7b4dHaSAF/VeezvIAzqZ+6yvWT7ebJJPXS3eaODm
	pFfJqdkWvkVEGFIgVT1wmDAlWieknPdXpgiDe4bvyFgvxcedJGE57h8STwFhQOI2
	oZcZijyQpDKOvC5dxPN3ZzFAS5dtdDhA3Zcsj7UvxpOTRxtFvRzmG7A4Sb+TPjIP
	qXZoomOVG8ljUAstZJpGFGyFcbuPIKc3HHf/l2/AGAIK9sgUtv/lUVOa34F18joc
	eAtT2FL+pKTfX+vAvL+gZgzsqo5e5V/dksJYlo9+N38l4pohg292g==
X-ME-Sender: <xms:AJM8Yncp62RCeV1Sz5mD1qAsSUhZTld7Y1wQ-fwEIMGw5mMCBC4Gbg>
    <xme:AJM8YtOtC_M3_9DFEYlke8RSW1QY8jS00KyNFghR0S0kqLkHIb8c6dZxI4cXEUjlh
    APSqwJ91nzNBK8>
X-ME-Received: <xmr:AJM8YgjtCCoCDK-ickrjxxeA3zdvvHuqYxSHYVLqCIu09rqOexaiRtglUcEuBVfzGZhW5Q>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddrudegledgjeeiucetufdoteggodetrfdotf
    fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen
    uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne
    cujfgurhepkfffgggfvfhfhffujggtsehgtderredtfeejnecuhfhrohhmpeffvghmihcu
    ofgrrhhivgcuqfgsvghnohhurhcuoeguvghmihesihhnvhhishhisghlvghthhhinhhgsh
    hlrggsrdgtohhmqeenucggtffrrghtthgvrhhnpeeuudegudfgteefjeefhedtgfegteff
    ledvgedvjeethffhkeefleduteevudfhueenucevlhhushhtvghrufhiiigvpedtnecurf
    grrhgrmhepmhgrihhlfhhrohhmpeguvghmihesihhnvhhishhisghlvghthhhinhhgshhl
    rggsrdgtohhm
X-ME-Proxy: <xmx:AJM8Yo-IBaNyNSK8T5kH3-vDqN-AxaT6gtU2STSY0c-5zAdiwXYJAQ>
    <xmx:AJM8YjtjI4Ro_fuYhdZ70Mdf5oKWcTCr-UTm2VmpXvkZXU7XAjL0eQ>
    <xmx:AJM8YnHegjPwSddQDplrZ7Z2spcWv1l0PZSUq1erpfAJbZzKDhxOmw>
    <xmx:AJM8Yg6oujG2qt5Q5x6m1hIcLh3COQA07IFzVBhVINmMaljvU0yjzQ>
Message-ID: <f101f6f6-d6d3-4877-20a4-ebae0130c756@invisiblethingslab.com>
Date: Thu, 24 Mar 2022 11:49:14 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
Cc: Xen developer discussion <xen-devel@lists.xenproject.org>
References: <Yjx4kNv7hG4FGGot@itl-email> <Yjx8G5tH4Xf8+oVx@Air-de-Roger>
From: Demi Marie Obenour <demi@invisiblethingslab.com>
Subject: Re: Support status of OpenBSD frontend drivers
In-Reply-To: <Yjx8G5tH4Xf8+oVx@Air-de-Roger>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------clYcnKVzagODISGKeblKL0nR"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------clYcnKVzagODISGKeblKL0nR
Content-Type: multipart/mixed; boundary="------------2fS6pBJQ57e1pG6T0FqzsgWk";
 protected-headers="v1"
From: Demi Marie Obenour <demi@invisiblethingslab.com>
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
Cc: Xen developer discussion <xen-devel@lists.xenproject.org>
Message-ID: <f101f6f6-d6d3-4877-20a4-ebae0130c756@invisiblethingslab.com>
Subject: Re: Support status of OpenBSD frontend drivers
References: <Yjx4kNv7hG4FGGot@itl-email> <Yjx8G5tH4Xf8+oVx@Air-de-Roger>
In-Reply-To: <Yjx8G5tH4Xf8+oVx@Air-de-Roger>

--------------2fS6pBJQ57e1pG6T0FqzsgWk
Content-Type: multipart/mixed; boundary="------------iWRQhEtmGGIXGAk0tgqu8wsB"

--------------iWRQhEtmGGIXGAk0tgqu8wsB
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 3/24/22 10:11, Roger Pau Monn=C3=A9 wrote:
> On Thu, Mar 24, 2022 at 09:56:29AM -0400, Demi Marie Obenour wrote:
>> As per private discussion with Theo de Raadt, OpenBSD does not conside=
r
>> bugs in its xnf(4) that allow a backend to cause mischief to be securi=
ty
>> issues.  I believe the same applies to its xbf(4).  Should the support=

>> document be updated?
>=20
> I think that's already reflected in the support document:
>=20
> 'Status, OpenBSD: Supported, Security support external'
>=20
> Since the security support is external it's my understanding OpenBSD
> security team gets to decide what's a security issue and what is not.
>=20
> That however creates differences in the level of support offered by
> the different OSes, but I think that's unavoidable. It's also hard to
> track the status here because those are external components in
> separate code bases.
>=20
> Could be added as a mention together with the Windows note about
> frontends trusting backends, but then I would fear this is likely to
> get out of sync if OpenBSD ever changes their frontends to support
> untrusted backends (even if not considered as a security issue).

As a Qubes OS developer, I still think this is useful information and
should be documented.  For instance, if I choose to add proper OpenBSD
guest support to Qubes OS (as opposed to the current =E2=80=9Cyou can run=

anything in an HVM=E2=80=9D situation), I might decide to have OpenBSD
guests use devices emulated by a Linux-based stubdomain, since the
stubdomain=E2=80=99s netfront and blkfront drivers *are* security-support=
ed
against malicious backends.  I might also choose to have a warning in
the GUI when switching the NetVM of an OpenBSD guest to something other
than the empty string (meaning no network access) or the (normally
fairly trusted) sys-firewall or sys-whonix qubes.

--=20
Sincerely,
Demi Marie Obenour (she/her/hers)
Invisible Things Lab
--------------iWRQhEtmGGIXGAk0tgqu8wsB
Content-Type: application/pgp-keys; name="OpenPGP_0xB288B55FFF9C22C1.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB288B55FFF9C22C1.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=3Dx+Ro
-----END PGP PUBLIC KEY BLOCK-----

--------------iWRQhEtmGGIXGAk0tgqu8wsB--

--------------2fS6pBJQ57e1pG6T0FqzsgWk--

--------------clYcnKVzagODISGKeblKL0nR
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----
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=p+1K
-----END PGP SIGNATURE-----

--------------clYcnKVzagODISGKeblKL0nR--


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 15:51:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 15:51:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294454.500713 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXPkT-0001ms-Ch; Thu, 24 Mar 2022 15:51:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294454.500713; Thu, 24 Mar 2022 15:51:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXPkT-0001ml-9h; Thu, 24 Mar 2022 15:51:41 +0000
Received: by outflank-mailman (input) for mailman id 294454;
 Thu, 24 Mar 2022 15:51:40 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=z7/3=UD=citrix.com=prvs=07544547a=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nXPkS-0001mb-1e
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 15:51:40 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 48d2740a-ab8a-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 16:51:37 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 48d2740a-ab8a-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648137097;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=pi21aJRAb7wxZanzayYUu0HIVJppafDLjG6x+vxK/mo=;
  b=PW4E9RHTEMe39bCZZ0bE6kTXlSgal6TWkFSiL6fGsgURIXriHapZY2u2
   y7bZfwpxA6J8q/RXHiUdk02yrRFIbGYltd0V2j3UZ9b1cr7YUNvWi2crR
   CXznTSfP82cK+wCHuEc28gI4SQN+5MO78RoIA+3m/1yvcflaqjpgyfuqp
   s=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66993656
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:OA0Al61JLJ8kFDfzpvbD5TFxkn2cJEfYwER7XKvMYLTBsI5bpzwDm
 zEYCDyPOqmIZ2rxL49wao238BsFvJ+GzNMxSwo9pC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUy3YDja++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /1kh56hcAMVMpbQkd42QTgBLyogMIBvreqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHxO4wSoDd4xCzxBvc6W5HTBa7N4Le02R9u2JEfRqiDO
 aL1bxJBYS6bP0xmMW4tUsIRweT4rSGnWjRX/Qf9Sa0fvDGIkV0ZPKLWGMXRUsyHQ4NShEnwj
 mDb+2X0BDkKOdrZziCKmlq3nfPGly7/XIMUFZW7++RsjVnVwXYcYDU0f1ampfiyimalRslSb
 UcT/0IGsaE3/VeDUtr5Uhu3sXOA+BUbXrJ4D+Q/4RrLzqfS7BeUAkAFSCJMbJots8pebSwn0
 BqFks3kARRrsaaJUjSN+7GMtzSwNCMJa2gYakc5oRAtuoe55ttp11SWE4glQPXdYsDJ9S/Y6
 gKIvRE6u7kokccx/LeapGzM3T+Bj82cJuIq3Tn/UmWg5wJ/QYeqYY209FTWhcp9wJalokqp5
 yZdxZXHhAwaJdTUzXHWHr1RdF28z6zdWAAwl2KDCHXIG96F33e4Nb5d7zhlTKuCGpZVIGS5C
 KM/VO442XOyAJdIRfIvC25SI55zpUQFKTgDfqqLBjapSsItHDJrBAk0OSatM5nFySDAa50XN
 5aBatqLBn0HE6lhxzfeb75Dje9zmHhunj2LGMCTI/GbPVy2Pi79pVAtagbmUwzExPnc/FW9H
 yh3aaNmNCmzoMWhO3KKoOb/3HgBLGQhBICeliCkXrXrH+aSI0l4U6W56ep4I+RNxv0J/s+Vr
 iDVchIJkzLX2CyYQThmn1g+MdsDq74k9illVcHtVH71s0UejXGHsPhOLcdmLON7nAGhpNYtJ
 8Q4lwy7Kq0nYhzM+igHbIm7q4pndR+xghmJMTbjaz86F6OMjSSTkjM4VmMDLBUzMxc=
IronPort-HdrOrdr: A9a23:dOI65KgFU2ZxC4hA+jbtPV0jqnBQXzh13DAbv31ZSRFFG/FwyP
 rAoB1L73PJYWgqNU3I+ergBEGBKUmskqKdxbNhR4tKOzOWxVdATbsSlrcKpgePJ8SQzJ8+6U
 4NSdkaNDS0NykHsS+Y2njILz9D+qj/zEnAv463pB0MPGJXguNbnn9E426gYzNLrWJ9dPwE/f
 Snl656T23KQwVpUi33PAhMY8Hz4/nw0L72ax8PABAqrCGIkDOT8bb/VzyVxA0XXT9jyaortT
 GtqX2y2oyT99WAjjPM3W7a6Jpb3PPn19t4HcSJzuwYMC/lhAqEbJloH5eCoDc2iuey70tCqq
 iGnz4Qe+BIr1/BdGC8phXgnyHmzTYV8nfnjWSVhHPyyPaJMw4SOo5kv8Z0YxHZ400vsJVXy6
 RQxV+UsJJREFfpgDn9z8KgbWAkqmOE5V4Z1cIDhX1WVoUTLJVLq5YEwU9TGJAcWArn9YEcFv
 V0Bs203ocbTbqjVQGZgoBT+q3tYpxqdS32AXTq+/blngS+pUoJgXfxn6ck7zU9HJFUcegx2w
 2LCNUsqFh0dL5kUUtMPpZwfSKJMB2+ffvtChPlHb21LtBPB5ryw6SHlYndotvaPKA18A==
X-IronPort-AV: E=Sophos;i="5.90,207,1643691600"; 
   d="scan'208";a="66993656"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=MBELQIayx50GolIqjR6tfSmvk5qLSvMZrvvceRirIEVb4GBtErPss0FXVAwHgXBOtQ3uJVHfNqT+Lzz1d4NgCI+YpnhSlK0MpvcLVqz3qdMNjQb+Zb4zru1T4wz82gCwuwdG16iqBqWcYIMrxOE9kHh7L/VD/3mB/JF+DBJb/bKH9ulRWagOk+RM3b8uHLH/TG7+exAGiF1BCOo0jWx7mgzVra4Z/KPvMzmt+rRDKh4TSj/am/VFzJIToy3Ix4KNAS2Iq3cBCIIAHgIm+3rQTkqB6T8Qf/S5SM55CF77AOcgSpxQE/dbTSQ9bQR60rbbYtMLvafKCpg0IU3YxIJbgw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=z3QB8PzOaTZX7b59ejLSk8DxnSxfLPNG/Ot33D3x6uE=;
 b=Kve7tZNj22aIC8B/Sn5sAn1o+y/YLvTpS/LSaOYkhb8T65VZ1JwPd6JAq2wpnoEe1vltZsIUpXSEKS89Icqut8LnGquqwybb9EDejEUBkwrSZWJGst8kqttYT4o4qqHLnT/Q6oG3RY3CfZU3YaaBouSfcxx0YLwb5BQwIRM+ZBUQ6R3Vwv8kmwgGJj296ZFk5RXwmje7noFHXcRAMEY7kuf1+y/0qfUx+cPG/h1PeutDZ1oDBHBLGvFFmINwKVdcIpEauUQDA5PUMbeTfR3k1D+UKtwpn/6JAzqSXGCahtK28MxYLS2dCZIA11NPLZAey7WTTu3UvUGTyWqG/XgVOw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=z3QB8PzOaTZX7b59ejLSk8DxnSxfLPNG/Ot33D3x6uE=;
 b=EDz5E4b4YgP2WnsE7euH6kpxxZOJV24l0eRClg5sSMz2WT1fGPrdciZZnOD0T7vwVdu/voJCEbtnJIUX63q8YAAmiMIzR77tW2vHrmb4Y9+BTQNY6V2oBp8NtzigR/hVCJatlTD/x6V2M3ByLmgwf8Rdytb0/EaT382inKGHgqY=
Date: Thu, 24 Mar 2022 16:51:27 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Tamas K Lengyel <tamas@tklengyel.com>
CC: Tamas K Lengyel <tamas.lengyel@intel.com>,
	<xen-devel@lists.xenproject.org>, Jan Beulich <JBeulich@suse.com>, Andrew
 Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>
Subject: Re: [PATCH 1/3] x86/mem_sharing: option to skip populating special
 pages during fork
Message-ID: <YjyTf4INCjKWD09n@Air-de-Roger>
References: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
 <YjyFODl7VFJLaj0c@Air-de-Roger>
 <CABfawhk9n08bmXWO1iM7Sz-5uhzuT5W6BZzj+yNDW1+FFDA5GA@mail.gmail.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <CABfawhk9n08bmXWO1iM7Sz-5uhzuT5W6BZzj+yNDW1+FFDA5GA@mail.gmail.com>
X-ClientProxiedBy: LO2P123CA0073.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:138::6) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: eb80b4e5-edba-4217-4415-08da0dae2ab3
X-MS-TrafficTypeDiagnostic: SJ0PR03MB5775:EE_
X-Microsoft-Antispam-PRVS: <SJ0PR03MB5775BC94B462F76A00E7BA7B8F199@SJ0PR03MB5775.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(38100700002)(186003)(26005)(85182001)(6512007)(9686003)(86362001)(54906003)(2906002)(6916009)(33716001)(316002)(53546011)(4326008)(508600001)(6506007)(5660300002)(8676002)(6486002)(6666004)(83380400001)(66476007)(66556008)(82960400001)(66946007)(8936002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?WlNCV1BMcmZFRmdubFZQV2Fqd0JMc2ROWk9ISTF4d0lHTjN5Y0JacFlJUzh1?=
 =?utf-8?B?NVJFWUNZRmN3VnIwQTcrc0U0dzNmWnZubjYxbUttcXdlWlJ0THNyMVIxMmtM?=
 =?utf-8?B?aE1aNDU5b1YzeW8rMWRZd1RiRmVMcE8vWXp6MjJ1UjRKaCttc0c2WlM2L2c5?=
 =?utf-8?B?OG1EQkJ4dmM2dm9ZdkNpV3A3NHZUOE1WeFV4Z1R0amxSVTNKeDB2ZGRLdnBW?=
 =?utf-8?B?TWpxWEdvSTRkRDdOYTJUQkZ0TmlENWxzVmhBeG1YQXJlVUxjUENtbVpNY2pT?=
 =?utf-8?B?RlpkUkliSFhxNVdlVnlib0dqbEJqcUFpcVptcmNxOXhWNEFKS0dGYW9NMGsw?=
 =?utf-8?B?VU1nWWxiQkh1Mm5ncTJ2REp0UXZpVTJGZml1bEZnMmY4L1JLUXNuTmNDM1Mw?=
 =?utf-8?B?R2FPeUpKdEJDYmdhMWhqdlJ3MFl3YUwrV2ozRmptd1BUZVdGY0xiOHBZWEty?=
 =?utf-8?B?cjhGMHZRMmkvS280cEZ5aC9HVHNJWHVNSjhwT1Zqb0wwMWVRakY5azNhNFVC?=
 =?utf-8?B?d2MrKzhXaUxsMmFnV1JvN1ExT1pQUmJ2UHRXTERaUjZIUVdVeUduaUFZZ1BG?=
 =?utf-8?B?Y1pnM1lmR3h5Y3VweHYwQmRSL0hJZ3RuSWpuTVcwQTY4RUVNN2hmc0lrcmla?=
 =?utf-8?B?NkpYbzh2MVc1VTZ0dlVRMVFCQmhGMlByU29jOHNHVlFXcXVlZGcreHVJWjZj?=
 =?utf-8?B?d1pNMTNxeFMvTVZzSmFZdlJMNDJ3d2dFdmZOenZXa2tlRTZkcmxXUDIwVFlX?=
 =?utf-8?B?bHl0YTJCR1oxVndnd2FBeTVzaHdLTFZFaXVmUFc5Qk9iOU4wYzhDZzhhc09Q?=
 =?utf-8?B?eElFYkFYRytCTXJUSEg2c2g3WTI2RVc4N3plS2FnS0NjYzlKc1laMnZQay9Q?=
 =?utf-8?B?ZFpkUExlRnZySGlnakRpekhtNCtTN1pVelZ1KzlSMDFMenk5UnppSURRTE52?=
 =?utf-8?B?MHBGc0JIRlRKWlJiWjZzZW1LMmpWSUNtbC9WTmV1WEt4dERXRmNHU1h5S2ZS?=
 =?utf-8?B?N2ZmeWJiQ1d4WXQ4VHJQYjA5Wk9OOTAwMnNKdVA1dG5YcEZhNjhtSHY3NXht?=
 =?utf-8?B?djdSd0c0WThhcDlvVWVuKzlUTjM3YnlpZWhYZWN5MFRvTHQwWnpJUmJhUzha?=
 =?utf-8?B?aVFBc2NTSUlwZGdHMmJ1TDcyMjFLRVhUUUlTSU9pektHWTg1Z2NnT3JDRXBl?=
 =?utf-8?B?QkZmWGFPa2orbDE4dkdYd0x5UFd1N3k3WEVwM0xWL1hKYlJwajN6ck45MkRN?=
 =?utf-8?B?SjBSUkNtc3dYQk40M3R5ZEsxaXorbGNxYlR5RTFLZ1pJVlZkekRLZElRZzdn?=
 =?utf-8?B?S2g4aDlEQlc3bEpGeEkyMXJjREluS1JQS2dxV3ZJV1RSSnMxc1FBam9WSXVQ?=
 =?utf-8?B?cjVYTW9TOWh6ZDlNbW9IVmd1SDNoeHQwZFBUOFhCZTA3WG8xZlUyS1o3aGpP?=
 =?utf-8?B?V2RxQXFHTjZsdVd2emdWdCs1UzJWSjdWc1dtTXowRHVwVUViOUR2RHIrcGww?=
 =?utf-8?B?Smo2Umx0YzZmTkJpM3hnOWNnZmpNL2hjR0IrSkQ2WHR1b1luZ1B3YkwzMGxV?=
 =?utf-8?B?dXA5aXdyYVhFanY3bFkrUGNydGw0TnBPZ1UxK0V6Ry9vdmNUOTQ4NFZDb1ht?=
 =?utf-8?B?YTF3bGRtRGtrRUdoMXBOK2lHczI3NUhvZWZxaWJMUEI0aWdjdGVremg3czY3?=
 =?utf-8?B?a2YzS0NXdG0rNkp2aCtCRlN6OTdQcmtvNFE2djdZTjRZOGsyMFAzSlIvaVQ0?=
 =?utf-8?B?cWpHeVRudTJGS2EzUTFQbDExSWlYTUZvSy9Cenc1K1Bqb2NNRTBXQWhyMm9z?=
 =?utf-8?B?RU9KRHNvVG9YR1VuOGxZRjUza2VwZDBSVm5oQzJjd2M4bitEOUl0RFhOSzVW?=
 =?utf-8?B?NzVZajRWYk02cW5FWm9aQzh1eWdOck5oN1RvbVBCcURadzhkVlEvUmRWTnJ4?=
 =?utf-8?B?MW5YSGwzWHo5UnhRRFhqMTJYdkhsSUVYbjJaSFpQUDMrWG5HVWExczlIaG12?=
 =?utf-8?B?NlhnRmZRbnlyQnJQR0dDd2dqOXNlS29NanhIZXA4aUhtM3dobHU0ZWZtUXVZ?=
 =?utf-8?B?V2lYUGhub1ZGS0w5eWdVem5zdGFtY1R6bVg5YlRod09jbmw1MkdLcmhYZlpR?=
 =?utf-8?B?UTViRFdrTDAyTmNuOG53UWduSUpXaWFUeDhsbXZxT0FCQUlycmREUHVtZkpU?=
 =?utf-8?B?LzNNTDZhMjR0VnoyamZ2THlrMXVqUzA4NHFacGVOMlpvaFBFb2lNWTVpeHJK?=
 =?utf-8?B?TnJNVk9ZZEpudjdsa2N4QUpReXRjUzJQa0hVdndxOHF3enpmQ0ZwWUFKYll5?=
 =?utf-8?B?TmswTk03d2V0S0xHR3A1ZmJlenozU3JVNFg0ZTR2bzA0dGlGWDZ6L2FNOWlC?=
 =?utf-8?Q?swJslYdFWSg2GDQE=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: eb80b4e5-edba-4217-4415-08da0dae2ab3
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Mar 2022 15:51:31.9926
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: fW5rUlbyLZOQXqrIHfwlbqxXi8Z+f1vrpnB993PnfvQ5IXGFTVHjOtfW/aWGzbDY9K3b9wWD6q3s+om5lj6hgA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR03MB5775
X-OriginatorOrg: citrix.com

On Thu, Mar 24, 2022 at 11:15:08AM -0400, Tamas K Lengyel wrote:
> On Thu, Mar 24, 2022 at 10:50 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
> >
> > On Tue, Mar 22, 2022 at 01:41:37PM -0400, Tamas K Lengyel wrote:
> > > Add option to the fork memop to skip populating the fork with special pages.
> > > These special pages are only necessary when setting up forks to be fully
> > > functional with a toolstack. For short-lived forks where no toolstack is active
> > > these pages are uneccesary.
> >
> > I'm not sure those are strictly related to having a toolstack. For
> > example the vcpu_info has nothing to do with having a toolstack, and
> > is only used by the guest in order to receive events or fetch time
> > related data. So while a short-lived fork might not make use of those,
> > that has nothing to do with having a toolstack or not.
> 
> Fair enough, the point is that the short live fork doesn't use these pages.
> 
> > >
> > > Signed-off-by: Tamas K Lengyel <tamas.lengyel@intel.com>
> > > ---
> > >  xen/arch/x86/include/asm/hvm/domain.h |  4 +++-
> > >  xen/arch/x86/mm/mem_sharing.c         | 33 +++++++++++++++++----------
> > >  xen/include/public/memory.h           |  4 ++--
> > >  3 files changed, 26 insertions(+), 15 deletions(-)
> > >
> > > diff --git a/xen/arch/x86/include/asm/hvm/domain.h b/xen/arch/x86/include/asm/hvm/domain.h
> > > index 698455444e..446cd06411 100644
> > > --- a/xen/arch/x86/include/asm/hvm/domain.h
> > > +++ b/xen/arch/x86/include/asm/hvm/domain.h
> > > @@ -31,7 +31,9 @@
> > >  #ifdef CONFIG_MEM_SHARING
> > >  struct mem_sharing_domain
> > >  {
> > > -    bool enabled, block_interrupts;
> > > +    bool enabled;
> > > +    bool block_interrupts;
> > > +    bool skip_special_pages;
> > >
> > >      /*
> > >       * When releasing shared gfn's in a preemptible manner, recall where
> > > diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86/mm/mem_sharing.c
> > > index 15e6a7ed81..84c04ddfa3 100644
> > > --- a/xen/arch/x86/mm/mem_sharing.c
> > > +++ b/xen/arch/x86/mm/mem_sharing.c
> > > @@ -1643,7 +1643,8 @@ static int bring_up_vcpus(struct domain *cd, struct domain *d)
> > >      return 0;
> > >  }
> > >
> > > -static int copy_vcpu_settings(struct domain *cd, const struct domain *d)
> > > +static int copy_vcpu_settings(struct domain *cd, const struct domain *d,
> > > +                              bool skip_special_pages)
> > >  {
> > >      unsigned int i;
> > >      struct p2m_domain *p2m = p2m_get_hostp2m(cd);
> > > @@ -1660,7 +1661,7 @@ static int copy_vcpu_settings(struct domain *cd, const struct domain *d)
> > >
> > >          /* Copy & map in the vcpu_info page if the guest uses one */
> > >          vcpu_info_mfn = d_vcpu->vcpu_info_mfn;
> > > -        if ( !mfn_eq(vcpu_info_mfn, INVALID_MFN) )
> > > +        if ( !skip_special_pages && !mfn_eq(vcpu_info_mfn, INVALID_MFN) )
> > >          {
> > >              mfn_t new_vcpu_info_mfn = cd_vcpu->vcpu_info_mfn;
> > >
> > > @@ -1807,17 +1808,18 @@ static int copy_special_pages(struct domain *cd, struct domain *d)
> > >      return 0;
> > >  }
> > >
> > > -static int copy_settings(struct domain *cd, struct domain *d)
> > > +static int copy_settings(struct domain *cd, struct domain *d,
> > > +                         bool skip_special_pages)
> > >  {
> > >      int rc;
> > >
> > > -    if ( (rc = copy_vcpu_settings(cd, d)) )
> > > +    if ( (rc = copy_vcpu_settings(cd, d, skip_special_pages)) )
> > >          return rc;
> > >
> > >      if ( (rc = hvm_copy_context_and_params(cd, d)) )
> > >          return rc;
> > >
> > > -    if ( (rc = copy_special_pages(cd, d)) )
> > > +    if ( !skip_special_pages && (rc = copy_special_pages(cd, d)) )
> > >          return rc;
> > >
> > >      copy_tsc(cd, d);
> > > @@ -1826,9 +1828,11 @@ static int copy_settings(struct domain *cd, struct domain *d)
> > >      return rc;
> > >  }
> > >
> > > -static int fork(struct domain *cd, struct domain *d)
> > > +static int fork(struct domain *cd, struct domain *d, uint16_t flags)
> > >  {
> > >      int rc = -EBUSY;
> > > +    bool block_interrupts = flags & XENMEM_FORK_BLOCK_INTERRUPTS;
> > > +    bool skip_special_pages = flags & XENMEM_FORK_SKIP_SPECIAL_PAGES;
> > >
> > >      if ( !cd->controller_pause_count )
> > >          return rc;
> > > @@ -1856,7 +1860,13 @@ static int fork(struct domain *cd, struct domain *d)
> > >      if ( (rc = bring_up_vcpus(cd, d)) )
> > >          goto done;
> > >
> > > -    rc = copy_settings(cd, d);
> > > +    if ( !(rc = copy_settings(cd, d, skip_special_pages)) )
> >
> > Can you set
> > cd->arch.hvm.mem_sharing.{block_interrupts,skip_special_pages} earlier
> > so that you don't need to pass the options around to copy_settings and
> > copy_vcpu_settings?
> 
> Would be possible yes, but then we would have to clear them in case
> the forking failed at any point. Setting them only at the end when the
> fork finished ensures that those fields are only ever valid if the VM
> is a fork. Both are valid approaches and I prefer this over the other.

I think I'm confused, doesn't the fork get destroyed if there's a
failure? In which case the values
cd->arch.hvm.mem_sharing.{block_interrupts,skip_special_pages}
shouldn't really matter?

> >
> > > +    {
> > > +        cd->arch.hvm.mem_sharing.block_interrupts = block_interrupts;
> > > +        cd->arch.hvm.mem_sharing.skip_special_pages = skip_special_pages;
> > > +        /* skip mapping the vAPIC page on unpause if skipping special pages */
> > > +        cd->creation_finished = skip_special_pages;
> >
> > I think this is dangerous. While it might be true at the moment that
> > the arch_domain_creation_finished only maps the vAPIC page, there's no
> > guarantee it couldn't do other stuff in the future that could be
> > required for the VM to be started.
> 
> I understand this domain_creation_finished route could be expanded in
> the future to include other stuff, but IMHO we can evaluate what to do
> about that when and if it becomes necessary. This is all experimental
> to begin with.

Maybe you could check the skip_special_pages field from
domain_creation_finished in order to decide whether the vAPIC page
needs to be mapped?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 15:53:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 15:53:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294457.500724 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXPm4-0002Mq-OE; Thu, 24 Mar 2022 15:53:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294457.500724; Thu, 24 Mar 2022 15:53:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXPm4-0002Mj-LF; Thu, 24 Mar 2022 15:53:20 +0000
Received: by outflank-mailman (input) for mailman id 294457;
 Thu, 24 Mar 2022 15:53:19 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ZOSR=UD=tklengyel.com=tamas@srs-se1.protection.inumbo.net>)
 id 1nXPm3-0002Mb-Ax
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 15:53:19 +0000
Received: from MTA-07-4.privateemail.com (mta-07-4.privateemail.com
 [68.65.122.27]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 849c61e2-ab8a-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 16:53:17 +0100 (CET)
Received: from mta-07.privateemail.com (localhost [127.0.0.1])
 by mta-07.privateemail.com (Postfix) with ESMTP id 61D4518000A6
 for <xen-devel@lists.xenproject.org>; Thu, 24 Mar 2022 11:53:15 -0400 (EDT)
Received: from mail-oi1-f169.google.com (unknown [10.20.151.197])
 by mta-07.privateemail.com (Postfix) with ESMTPA id 3CD791800084
 for <xen-devel@lists.xenproject.org>; Thu, 24 Mar 2022 11:53:15 -0400 (EDT)
Received: by mail-oi1-f169.google.com with SMTP id q189so5273380oia.9
 for <xen-devel@lists.xenproject.org>; Thu, 24 Mar 2022 08:53:15 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 849c61e2-ab8a-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648137195;
	bh=gNTA1jV+eU1/mAw2+yVTELnOVXsCoqVjwkr8jpJVBaY=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=xuLggTBXYh2ctzy+v4w50YdRkO9uQbOAXCqndj8EAtQMiEy9BSpyy1VhUNvQYQRTV
	 9D61J3Dsx6aDSwUtGMlboi0v6QK8P+ufNOavR3aQIMYnP4540h1T3pTbpungtULZil
	 04E11K+P0MUkn80p9owKe+PoUTUqvLCxX23Lvv7XXFrY+oweryAeM4F3NvUTn5QqpA
	 uSRKnwzVQu1DY88S8SFmgf4KZgpkBldB24XEJ1mc/eCV7BY3ODmhZd95P685TciJI7
	 CLuPegGP9vYNzBvkicwKZsoDrvaiEHSupK7AsOVdrhN+MOwpd/9zeEqefQeuzEBcqr
	 EjRLigroF8NsA==
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648137195;
	bh=gNTA1jV+eU1/mAw2+yVTELnOVXsCoqVjwkr8jpJVBaY=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=xuLggTBXYh2ctzy+v4w50YdRkO9uQbOAXCqndj8EAtQMiEy9BSpyy1VhUNvQYQRTV
	 9D61J3Dsx6aDSwUtGMlboi0v6QK8P+ufNOavR3aQIMYnP4540h1T3pTbpungtULZil
	 04E11K+P0MUkn80p9owKe+PoUTUqvLCxX23Lvv7XXFrY+oweryAeM4F3NvUTn5QqpA
	 uSRKnwzVQu1DY88S8SFmgf4KZgpkBldB24XEJ1mc/eCV7BY3ODmhZd95P685TciJI7
	 CLuPegGP9vYNzBvkicwKZsoDrvaiEHSupK7AsOVdrhN+MOwpd/9zeEqefQeuzEBcqr
	 EjRLigroF8NsA==
X-Gm-Message-State: AOAM5309z0pzwvx9+EPWPhq6+4d+YLVrQXZZpUEjhBZuYfHUz/5bj7XD
	Qo9b3caT5EtqqUh9QxIHxvSp3IpSyp81qIQxznc=
X-Google-Smtp-Source: ABdhPJytvCop5t61DPe+GZARYbAev/ixTKyaOTYUWo9iZ+04wyQlAeiq92kOb0SuwDIqTqwQ8ikWNJYR2PP/hJ4ViZg=
X-Received: by 2002:aca:d12:0:b0:2ee:f684:bd4b with SMTP id
 18-20020aca0d12000000b002eef684bd4bmr7598875oin.128.1648137194586; Thu, 24
 Mar 2022 08:53:14 -0700 (PDT)
MIME-Version: 1.0
References: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
 <fb437a16517d343ba3432aa64b9e14b34630a750.1647970630.git.tamas.lengyel@intel.com>
 <YjySMjegTNFBE5RK@Air-de-Roger>
In-Reply-To: <YjySMjegTNFBE5RK@Air-de-Roger>
From: Tamas K Lengyel <tamas@tklengyel.com>
Date: Thu, 24 Mar 2022 11:52:38 -0400
X-Gmail-Original-Message-ID: <CABfawhnnAehxaByyncaYAjSSbddJi8yeTnjcXX_a+st8Q+C_+Q@mail.gmail.com>
Message-ID: <CABfawhnnAehxaByyncaYAjSSbddJi8yeTnjcXX_a+st8Q+C_+Q@mail.gmail.com>
Subject: Re: [PATCH 3/3] x86/mem_sharing: make fork_reset more configurable
To: =?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>, xen-devel@lists.xenproject.org, 
	Wei Liu <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>, Juergen Gross <JGross@suse.com>, 
	Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, 
	Jan Beulich <JBeulich@suse.com>, Julien Grall <julien@xen.org>, 
	Stefano Stabellini <sstabellini@kernel.org>, Alexandru Isaila <aisaila@bitdefender.com>, 
	Petre Pircalabu <ppircalabu@bitdefender.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Virus-Scanned: ClamAV using ClamSMTP

On Thu, Mar 24, 2022 at 11:46 AM Roger Pau Monn=C3=A9 <roger.pau@citrix.com=
> wrote:
>
> On Tue, Mar 22, 2022 at 01:41:39PM -0400, Tamas K Lengyel wrote:
> > diff --git a/xen/include/public/memory.h b/xen/include/public/memory.h
> > index 208d8dcbd9..30ce23c5a7 100644
> > --- a/xen/include/public/memory.h
> > +++ b/xen/include/public/memory.h
> > @@ -541,12 +541,14 @@ struct xen_mem_sharing_op {
> >                  uint32_t gref;     /* IN: gref to debug         */
> >              } u;
> >          } debug;
> > -        struct mem_sharing_op_fork {      /* OP_FORK */
> > +        struct mem_sharing_op_fork {      /* OP_FORK/_RESET */
> >              domid_t parent_domain;        /* IN: parent's domain id */
> >  /* These flags only makes sense for short-lived forks */
> >  #define XENMEM_FORK_WITH_IOMMU_ALLOWED (1u << 0)
> >  #define XENMEM_FORK_BLOCK_INTERRUPTS   (1u << 1)
> >  #define XENMEM_FORK_SKIP_SPECIAL_PAGES (1u << 2)
> > +#define XENMEM_FORK_RESET_STATE        (1u << 3)
> > +#define XENMEM_FORK_RESET_MEMORY       (1u << 4)
> >              uint16_t flags;               /* IN: optional settings */
> >              uint32_t pad;                 /* Must be set to 0 */
> >          } fork;
> > diff --git a/xen/include/public/vm_event.h b/xen/include/public/vm_even=
t.h
> > index bb003d21d0..81c2ee28cc 100644
> > --- a/xen/include/public/vm_event.h
> > +++ b/xen/include/public/vm_event.h
> > @@ -127,6 +127,14 @@
> >   * Reset the vmtrace buffer (if vmtrace is enabled)
> >   */
> >  #define VM_EVENT_FLAG_RESET_VMTRACE      (1 << 13)
> > +/*
> > + * Reset the VM state (if VM is fork)
> > + */
> > +#define VM_EVENT_FLAG_RESET_FORK_STATE   (1 << 14)
> > +/*
> > + * Remove unshared entried from physmap (if VM is fork)
> > + */
> > +#define VM_EVENT_FLAG_RESET_FORK_MEMORY  (1 << 15)
>
> I'm confused about why two different interfaces are added to do this
> kind of selective resets, one to vm_event and one to xenmem_fork?
>
> I thin k the natural place for the option to live would be
> XENMEM_FORK?

Yes, that's the natural place for it. But we are adding it to both for
a reason. In our use-case the reset operation will happen after a
vm_event is received to which we already must send a reply. Setting
the flag on the vm_event reply saves us having to issue an extra memop
hypercall afterwards.

Tamas


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 16:03:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 16:03:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294460.500736 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXPwF-0004Or-Nt; Thu, 24 Mar 2022 16:03:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294460.500736; Thu, 24 Mar 2022 16:03:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXPwF-0004Ok-Ks; Thu, 24 Mar 2022 16:03:51 +0000
Received: by outflank-mailman (input) for mailman id 294460;
 Thu, 24 Mar 2022 16:03:51 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=z7/3=UD=citrix.com=prvs=07544547a=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nXPwF-0004Oe-6O
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 16:03:51 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id fd441c5c-ab8b-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 17:03:49 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fd441c5c-ab8b-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648137829;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=McTTNOVvj7D4HBBu+A+M53kALxFUjoKv1zerWt+0Wq8=;
  b=VvXJHEN/GgtxjW9owv+4xhh0eFO4FMiC29PFevcV0y6dbsfjry9Vh+If
   o6prr6pfPF9t0Zb86NFDD41IMVcpN4WtFar+DsheTfaVoBXNG213bE+3i
   QhDRwcrr1X/DXn1TrXnRDDEGP0shQnXJP8aceP43IF+KBRVikcdRwDWXI
   g=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67485035
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:1rpXqqkaikyBr6+ECEoSUq/o5gwpJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xJKWWnQP/bfNmPzcot/YNmwpxgC78Dcx4dhS1RqrCswESMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiWV/V4
 7senuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYdzkTJLLtsvomXRBgKjtDGoJDqKHlLi3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3oHZvwCufFf87aZvCX7/L9ZlT2zJYasVmQ6mCN
 5dBMmcHgBLoICFyZXcZN7gEgOKn1mf/XTd5qUirqv9ii4TU5FMoi+W8WDbPQfSIWMFUk0Cwt
 m/AuWPjDXkyFvaS1D6E+XKEnfLUkGXwX4d6PKaj6vdgjVmXx2oSIB4bT122pb++kEHWc8pHK
 lYf8y4np7Ua/k23QtTzUhu0rWTCtRkZM/JZEvYz6QWE4qDV/wqUCGUCQjNbLtchsaceWTUv3
 0TPm97vCi1itJWUT26Q8vGfqjbaETQcKGYZTTMHSQYD7MjupMc4iRenZsZuFuu5g8P4HRn0w
 iuWt24uirMLl8kJ2q6nu1fdjFqEhLfTSRUuzh7KRW/j5QR8DKa6Y6S45F6d6uxPRLt1VXHY4
 iJCwZLHqrlTU9fdz0RhXdnhApmX2cyfLxz2n2VhFqEY7QmK1HvzY6JftWQWyFhSDu4IfjrgY
 Un2sAxX5YNOMHbCUZKbc75dGOxxk/G+SI2NuuT8K4MXP8MvLFPvEDRGPxb44oz7rKQ7fUjT0
 7+/eN3kM3sVAL8PINGeF7ZEiu9DKszTKAruqXHHI/aPjOL2iJ29E+5t3L6yggYRtvzsTOL9q
 Yo3Cidy408DONASmwGOmWLpEXgELGIgGbf9oNFNe+iIL2JOQT99W6ePmeN6JdQ4z8y5c9skG
 FnnCie0L3Kl2BX6xfiiMCg/ONsDo74hxZ7EAcDcFQnxgCVyCWpexKwea4E2bdEaGB9LlpZJo
 w0+U5zYWJxnE22fkxxENMWVhNEyJXyD2FPVVwL4MWdXQnKVb1GQkjMSVlC0r3dm4+venZZWn
 oBMISuHHstZG1UzVpq+hTDG5wrZgEXxUdlaBiPgCtJSZF/t4M5tLSnwheUwOMYCNVPIwT7y6
 upcKU5wSTXly2PtzOT0uA==
IronPort-HdrOrdr: A9a23:FugS2qoVN5YbA+ARBUpeFAgaV5vJL9V00zEX/kB9WHVpm5Oj+P
 xGzc526farslsssREb+OxpOMG7MBThHLpOkPMs1NCZLXTbUQqTXfpfBO7ZrQEIdBeOlNK1uZ
 0QFpSWTeeAcWSS7vyKkTVQcexQueVvmZrA7Yy1rwYPcegpUdAZ0+4QMHfkLqQcfnghOXNWLu
 v52iIRzADQBkj/I/7LTkUtbqzmnZnmhZjmaRkJC1oO7xSPtyqh7PrfHwKD1hkTfjtTyfN6mF
 K12TDR1+GGibWW2xXc32jc49B/n8bg8MJKAIiphtIOIjvhpw60bMBKWqGEvhoyvOazgWxa2+
 XkklMFBYBe+nnRdma6rV/E3BTh6i8n7zvYxVqRkRLY0LvEbQN/L/AEqZNScxPf5UZllsp7yr
 h302WQsIcSJQ/cnQzmjuK4GC1Cpw6Rmz4PgOQTh3tQXc81c7lKt7ES+0tTDdMpAD/60oY6C+
 NjZfusqMq+SWnqLkwxg1MfgOBFBh8Ib1S7qwk5y4GoOgFt7T5EJxBy/r1cop8CnKhNP6Wsqd
 60d5iAr4s+PfP+XZgNdNvpfvHHeFAlYSi8Rl56cm6XXZ3uBRr22uvKCfMOlaWXRKA=
X-IronPort-AV: E=Sophos;i="5.90,207,1643691600"; 
   d="scan'208";a="67485035"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ZNkJnap8zEGtcKIxOaYdaQKO5tziKh6eHwZlHBjcZWKK4BN70XveIbi+HHXkie5B2/D154h6Q6UBgkrOnosOSj7sScOYN40RVPTzjiqVFG/ce28S2yJJajzRIkyM0lWErBxjlqs31U55TNfICnnU5FzKagqzloKx7gjv9iHRKnc2ClpAM51JNpp9NRtA5H35cZ7a8ZqTe3WXesRfBcnQnjXMa9tDHnIzhyIttjez189dh1yj+wSiqyG6qFjDN7xjKlOs8GJCx+jVgKaaVGTwKukKMWUKNE3b8JkcU3OgqE7MIoVIo1g+mg3qqUWTojuRvY0V62JC9c+w+Eeesjskag==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=w00+vhwkz7fVWxJnF+7uzRkfpfCsrkT3eJtQM+05+5A=;
 b=cGeGA7phN7olsL79Z4q111LNxQ5D9hd0hL/XbKjdkid8kbpHOB2hVy46v5l7nQynzah6Tfpd6o+zkQLxheFie1wEOrz5TubqbpWgILXZhRsd15EPmOA7sxpy8v95lpKkZfOp27FfYVz7J6P4aqp/gTYEoNbt6VZPPMVrnHcYNk/oOAjkOo6JqyuVPwgXNd84DH03Hyzdu67Riea4ttpD2Qo+uS9Wh6BSDabynOByso6cBK6HDOIOrswRRdIuR6I40rYkqtNkRP+HaWKP5bNy8J/5To0xY0Kqt/+TP9cMrx49+dMAeenoL0Al4PBX9upSI6e5Jc+Bs7wRG7LTn2sTVw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=w00+vhwkz7fVWxJnF+7uzRkfpfCsrkT3eJtQM+05+5A=;
 b=IsBrdTr9lSX0T5N0Mf1Af2+4Ly1jPbPyWghg0iu4qMG/Y0CU6WwbNlb3pOgvV+1to8PrnuagcUJ9CdbhTb7ekCIaU0Nl9HZBYYvNDCrViSHW53xhyZJXbPdnhIuF3zu7jpIMIWfvrjg6kUi2L/SxtaucnR5UbM/4vOJb6/D7gRc=
Date: Thu, 24 Mar 2022 17:03:39 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Tamas K Lengyel <tamas@tklengyel.com>
CC: Tamas K Lengyel <tamas.lengyel@intel.com>,
	<xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, Anthony PERARD
	<anthony.perard@citrix.com>, Juergen Gross <JGross@suse.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, Jan
 Beulich <JBeulich@suse.com>, Julien Grall <julien@xen.org>, Stefano
 Stabellini <sstabellini@kernel.org>, Alexandru Isaila
	<aisaila@bitdefender.com>, Petre Pircalabu <ppircalabu@bitdefender.com>
Subject: Re: [PATCH 3/3] x86/mem_sharing: make fork_reset more configurable
Message-ID: <YjyWW2CkQv1ckvXM@Air-de-Roger>
References: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
 <fb437a16517d343ba3432aa64b9e14b34630a750.1647970630.git.tamas.lengyel@intel.com>
 <YjySMjegTNFBE5RK@Air-de-Roger>
 <CABfawhnnAehxaByyncaYAjSSbddJi8yeTnjcXX_a+st8Q+C_+Q@mail.gmail.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <CABfawhnnAehxaByyncaYAjSSbddJi8yeTnjcXX_a+st8Q+C_+Q@mail.gmail.com>
X-ClientProxiedBy: LO4P123CA0412.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:189::21) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 26f681af-819a-4ae2-4b73-08da0dafde3d
X-MS-TrafficTypeDiagnostic: BN6PR03MB2962:EE_
X-Microsoft-Antispam-PRVS: <BN6PR03MB2962CE199F1DC27C72B97CE48F199@BN6PR03MB2962.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(316002)(53546011)(66946007)(66476007)(38100700002)(66556008)(8676002)(4326008)(33716001)(6506007)(6486002)(86362001)(6666004)(186003)(26005)(6512007)(54906003)(6916009)(9686003)(508600001)(83380400001)(82960400001)(5660300002)(85182001)(8936002)(2906002)(7416002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?K2NWaEgvZzNTVFFOcURybzdaa0xtWmdFSHkyTmFDb3BVdU1KeEpxUkZpTW8w?=
 =?utf-8?B?dnJ1YmNGK1hoMi8wOUFjL25WakN5UlhDR0V1Sk5ubmxiS0FqYjEvK2ZiUjV0?=
 =?utf-8?B?TWljdVpZYUlmZFBla1RrYnlaM05mdnkrUXlUWVJuYmNZdWtZV3gxVWdDQnR6?=
 =?utf-8?B?S1pWbXN0K1J0NjEzbWxRK1FXRzhvSlVKTzkvclZSZ2NvRnpYOXBtUWlzbGZP?=
 =?utf-8?B?NjVtNDIrZFFSR3hIenQ3MVRvTU96am1KaFc5Z0N4a0tUREpsZTJmU2RyWER5?=
 =?utf-8?B?M3NodnUrUEtHVjZsSk1sRkJlWXhzR21nMjdQc0FLMGxPV1ZIMHZOOW1YdVdX?=
 =?utf-8?B?b1c0NGd4RGpsZG9BdjJzNDNUVzNBWE92S0g2K2RWUS9maUFNQTRqSkV6OWxp?=
 =?utf-8?B?U3lycitGb0lTRm9OOEc5ZVliODB2UFRNVnZ5U2gxRlYxSDVsaWZXczhiR05F?=
 =?utf-8?B?N3JZNHZxMGt4VHJ0RDk2aDVJQUY2KzdkNjJLbzIzVGRSMDZjYkc0S3RndWx2?=
 =?utf-8?B?aXJVQWZQZG5RSWZoV21Fa0J3OTJqY0ROYXBNYVZUVUpXbGFwZzQ1VnRVOUlU?=
 =?utf-8?B?UnZzeWJQYVBTaUpidzlRcGY1SncvU1pQTGl0MkpLODhweDZlZ2JmWEhPME5D?=
 =?utf-8?B?NU1FRWdXRXZqajlYNUpZRGNRT3pEekhidXd0NjlEQ243bVhrdTJYT3ZLRWFY?=
 =?utf-8?B?NzBJSGtKSkxMWWE5Z1ZaM2E5MDk2ZEZFTS9xVWdkRE5qTzV6WjlOUEtmWk8w?=
 =?utf-8?B?NzhnOFYzMmVkSzJvQkVJUlJFMTBLS3IvcXJSUkc0OXV4cnJGVGpJZVJWK3RH?=
 =?utf-8?B?REdnNnc0dEN6V2l0WlNueDlRL05obm5KUlAvS2tjRmRGNldaWG0veWxkTmJp?=
 =?utf-8?B?RkJaeTdVVTNwUC9PQ0dnZjJ6ZE9EM2xOb0JUKzBOZ1NSQkdZMHZqWE15UUh5?=
 =?utf-8?B?Z0dkUjVQZEZydlZmYXhEanJMRG9oTWNBdzFaTEl1dXdZaWVsNnpWeUN2V3B0?=
 =?utf-8?B?bGpIWk9OZUQwdHAwWVBDYzRnZUJIQ1p0ekJPczdCT2pDQWJUbndBTm52dFNE?=
 =?utf-8?B?b0gvWDM5dW13SUovNnkxcWxHR0l0d0tkQjVNeDNSa2VjODgyRy9PSGJMK1Jv?=
 =?utf-8?B?THNzeG1CRkc1dC90SVVnYzV4V1RqV2FOUzBndit1d3ZjU3F6ZWNma014cjlE?=
 =?utf-8?B?ajdtVWJHN0p4eUUwdy9CM0RBZ1BOWndtL1h1bDQ0T1RUeVZKQldLMFAyTUY1?=
 =?utf-8?B?VnVKTXM1SnBGSWhONmhuWlN0M1NoTy9jWlZQZUszK3hFd0l1MTZORDVxOVFL?=
 =?utf-8?B?Y3pTU3VJOXV1dVIzUWNZbE90V284aEx4MWFPdExCWUF3WllxT0Z4bTlCRTky?=
 =?utf-8?B?NzdPWXdvN2lMLy9rYjU5MXhlMS9odmU4bUFXUDdqa3Ayd1h4cjk5eFdGbFRy?=
 =?utf-8?B?RUlpMytNZVVUQTUyOGh4U0sra2tHUGFqYVNyME42aXBZWWZHWGxWbzUwZTdv?=
 =?utf-8?B?YUNiSzFoTFU2V29sQ2V0azRyWTZvZmZnTVpwZW5MbjVRY280ekpZTXpUSWVU?=
 =?utf-8?B?TTBFNEphL3pYNUFLK0Z0dWplTmJCaW4vYXpDWHdhcHE5aWNtTU9ERjdhMFZY?=
 =?utf-8?B?RXp4V0NvL3dBbk1PZnQxdURpVlc4UjV4bElvR01LOURtNlNKRnVzVUd0eUh0?=
 =?utf-8?B?YnI2RlAyZDNKaEdVSnlCMGEwMmp5T2Mzc0FORzNkeXdHYTY1Mmx2Rk9oUU13?=
 =?utf-8?B?N0VOSTRwbkJwUTViZ1ViTnQ3cmx2OTk4RW1LSTRVWXJpb1FVTzhmck1OZkFa?=
 =?utf-8?B?M3Z6R0NDbmNpWkxNa3lMZllGaHNkdGwxZHliZWE3TkZIekdKV3pCdGdLWG02?=
 =?utf-8?B?RVhYME5HL29lYlhTaUx3ZHVRWkw5QUVHK01zZmJ5M0FtcHZIekUrT0I0OWlp?=
 =?utf-8?B?YlZhNURnbWF1QXJKajUzdXpHa3BqaHBCd3k2cDg2Z2JEbGJiZmFVOXAvcmhi?=
 =?utf-8?B?TThBZ2MwWUhSQmE2dlp1TUo1aXRaYTZDYkQ5cFJEakR1N2FycWJ1djkrSjJY?=
 =?utf-8?B?b2JuN1pyMjhVdWt4OXduVDgxZTZyTElnaGF0enJYV3dTVzFkaHdySDczVnM0?=
 =?utf-8?B?UUNXTkxEL1R0c2ljUytSTnNEeVNETTdVc084M1hpMXJwVVFMUnNxVG1TZ3ov?=
 =?utf-8?B?c0lEQ3MxQXNuSEk3anc3Um9HMHZFR29hMG54ZUl3S1BKSEpXU1MzMnlEbUNw?=
 =?utf-8?B?VVg4TThWaVRwdGlOOHpPaENiNzBNcmxDc3AzOUNsalNJdXdSeHpKdUdhQzk2?=
 =?utf-8?B?V3RFMWdQcnR0NlR2Z2loa3JtVmlyVncyVWxvRDRYMWdGTkZYRytLbnVPeXd2?=
 =?utf-8?Q?YcIcwdkudyUlgCCI=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 26f681af-819a-4ae2-4b73-08da0dafde3d
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Mar 2022 16:03:42.7061
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: pzedQLVMjym8pkKtNUdJuT9YbOQqBwNamTBHvPykQYeHmAHw7IKb154+fYY4sr0bzCeD1iIuJeokQnEPeJhpHg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR03MB2962
X-OriginatorOrg: citrix.com

On Thu, Mar 24, 2022 at 11:52:38AM -0400, Tamas K Lengyel wrote:
> On Thu, Mar 24, 2022 at 11:46 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
> >
> > On Tue, Mar 22, 2022 at 01:41:39PM -0400, Tamas K Lengyel wrote:
> > > diff --git a/xen/include/public/memory.h b/xen/include/public/memory.h
> > > index 208d8dcbd9..30ce23c5a7 100644
> > > --- a/xen/include/public/memory.h
> > > +++ b/xen/include/public/memory.h
> > > @@ -541,12 +541,14 @@ struct xen_mem_sharing_op {
> > >                  uint32_t gref;     /* IN: gref to debug         */
> > >              } u;
> > >          } debug;
> > > -        struct mem_sharing_op_fork {      /* OP_FORK */
> > > +        struct mem_sharing_op_fork {      /* OP_FORK/_RESET */
> > >              domid_t parent_domain;        /* IN: parent's domain id */
> > >  /* These flags only makes sense for short-lived forks */
> > >  #define XENMEM_FORK_WITH_IOMMU_ALLOWED (1u << 0)
> > >  #define XENMEM_FORK_BLOCK_INTERRUPTS   (1u << 1)
> > >  #define XENMEM_FORK_SKIP_SPECIAL_PAGES (1u << 2)
> > > +#define XENMEM_FORK_RESET_STATE        (1u << 3)
> > > +#define XENMEM_FORK_RESET_MEMORY       (1u << 4)
> > >              uint16_t flags;               /* IN: optional settings */
> > >              uint32_t pad;                 /* Must be set to 0 */
> > >          } fork;
> > > diff --git a/xen/include/public/vm_event.h b/xen/include/public/vm_event.h
> > > index bb003d21d0..81c2ee28cc 100644
> > > --- a/xen/include/public/vm_event.h
> > > +++ b/xen/include/public/vm_event.h
> > > @@ -127,6 +127,14 @@
> > >   * Reset the vmtrace buffer (if vmtrace is enabled)
> > >   */
> > >  #define VM_EVENT_FLAG_RESET_VMTRACE      (1 << 13)
> > > +/*
> > > + * Reset the VM state (if VM is fork)
> > > + */
> > > +#define VM_EVENT_FLAG_RESET_FORK_STATE   (1 << 14)
> > > +/*
> > > + * Remove unshared entried from physmap (if VM is fork)
> > > + */
> > > +#define VM_EVENT_FLAG_RESET_FORK_MEMORY  (1 << 15)
> >
> > I'm confused about why two different interfaces are added to do this
> > kind of selective resets, one to vm_event and one to xenmem_fork?
> >
> > I thin k the natural place for the option to live would be
> > XENMEM_FORK?
> 
> Yes, that's the natural place for it. But we are adding it to both for
> a reason. In our use-case the reset operation will happen after a
> vm_event is received to which we already must send a reply. Setting
> the flag on the vm_event reply saves us having to issue an extra memop
> hypercall afterwards.

Can you do a multicall and batch both operations in a single
hypercall?

That would seem more natural than adding duplicated interfaces.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 16:25:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 16:25:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294465.500747 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXQGP-0006rN-GO; Thu, 24 Mar 2022 16:24:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294465.500747; Thu, 24 Mar 2022 16:24:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXQGP-0006rG-DE; Thu, 24 Mar 2022 16:24:41 +0000
Received: by outflank-mailman (input) for mailman id 294465;
 Thu, 24 Mar 2022 16:24:40 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ZOSR=UD=tklengyel.com=tamas@srs-se1.protection.inumbo.net>)
 id 1nXQGO-0006rA-8v
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 16:24:40 +0000
Received: from MTA-11-3.privateemail.com (mta-11-3.privateemail.com
 [198.54.122.105]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e5e71466-ab8e-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 17:24:38 +0100 (CET)
Received: from mta-11.privateemail.com (localhost [127.0.0.1])
 by mta-11.privateemail.com (Postfix) with ESMTP id B2F5718000A3
 for <xen-devel@lists.xenproject.org>; Thu, 24 Mar 2022 12:24:36 -0400 (EDT)
Received: from mail-oa1-f53.google.com (unknown [10.20.151.186])
 by mta-11.privateemail.com (Postfix) with ESMTPA id 8E37818000A0
 for <xen-devel@lists.xenproject.org>; Thu, 24 Mar 2022 12:24:36 -0400 (EDT)
Received: by mail-oa1-f53.google.com with SMTP id
 586e51a60fabf-d6ca46da48so5387654fac.12
 for <xen-devel@lists.xenproject.org>; Thu, 24 Mar 2022 09:24:36 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e5e71466-ab8e-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648139076;
	bh=mgJEOCHHrF1vsDJhzxJnGZwqYk/0eRCHON17CMu3yu0=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=Yfk5BHiJMTrERIDPE1Y55Yut2NkG89j41Y2eLfssQyiGTUH/9Fkl5/vNjGwioR9qi
	 yH6ltEkx5X3gLqPtQv12s+RTLLwZfTF1Q0mykMdbT9xhBUsIMTkpdpmFG3UnYY9mGa
	 geNQWDWiBS2g+wQR4MJ4WT5FBS7R3yJidYt59Cy3Rr8duNepqWpawhhz0oKN284Yr8
	 L3DIzMAYv2t12EaNswbsj9oQW41x+c2ZFD9X89+SU/QUWBm7/FrsGRSq8Y/eWrANB0
	 Q16AajZrNhheZSiFmB5BPm7DzlG80cwlae5ATfgpTlt18pZxT2OuaGIedAKMUhchhj
	 s4pHgo60d8Yxw==
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648139076;
	bh=mgJEOCHHrF1vsDJhzxJnGZwqYk/0eRCHON17CMu3yu0=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=Yfk5BHiJMTrERIDPE1Y55Yut2NkG89j41Y2eLfssQyiGTUH/9Fkl5/vNjGwioR9qi
	 yH6ltEkx5X3gLqPtQv12s+RTLLwZfTF1Q0mykMdbT9xhBUsIMTkpdpmFG3UnYY9mGa
	 geNQWDWiBS2g+wQR4MJ4WT5FBS7R3yJidYt59Cy3Rr8duNepqWpawhhz0oKN284Yr8
	 L3DIzMAYv2t12EaNswbsj9oQW41x+c2ZFD9X89+SU/QUWBm7/FrsGRSq8Y/eWrANB0
	 Q16AajZrNhheZSiFmB5BPm7DzlG80cwlae5ATfgpTlt18pZxT2OuaGIedAKMUhchhj
	 s4pHgo60d8Yxw==
X-Gm-Message-State: AOAM5325iRFgnEzH7m8a4wP2o1Fpdgql643IuRXRGg7FoLWEycNp8pM4
	XwU8hKhAugTHaL+YuBiuOhXsRccyueGa7DQOlVg=
X-Google-Smtp-Source: ABdhPJwnLnIc8R1ne1Y8vUaCsxxtEaPHAzycLbAq3jJtw4QPA1U+toFYUsT0R0hYBUH4T0BOzeMbW/On9NFwOjBAtC8=
X-Received: by 2002:a05:6870:ea81:b0:db:3e68:7ae0 with SMTP id
 s1-20020a056870ea8100b000db3e687ae0mr7169331oap.9.1648139075869; Thu, 24 Mar
 2022 09:24:35 -0700 (PDT)
MIME-Version: 1.0
References: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
 <fb437a16517d343ba3432aa64b9e14b34630a750.1647970630.git.tamas.lengyel@intel.com>
 <YjySMjegTNFBE5RK@Air-de-Roger> <CABfawhnnAehxaByyncaYAjSSbddJi8yeTnjcXX_a+st8Q+C_+Q@mail.gmail.com>
 <YjyWW2CkQv1ckvXM@Air-de-Roger>
In-Reply-To: <YjyWW2CkQv1ckvXM@Air-de-Roger>
From: Tamas K Lengyel <tamas@tklengyel.com>
Date: Thu, 24 Mar 2022 12:22:49 -0400
X-Gmail-Original-Message-ID: <CABfawhn-QiUBuq9c4tzr=9nL=J-ntm1hf23mbeRu-qCAKRDj1Q@mail.gmail.com>
Message-ID: <CABfawhn-QiUBuq9c4tzr=9nL=J-ntm1hf23mbeRu-qCAKRDj1Q@mail.gmail.com>
Subject: Re: [PATCH 3/3] x86/mem_sharing: make fork_reset more configurable
To: =?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>, xen-devel@lists.xenproject.org, 
	Wei Liu <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>, Juergen Gross <JGross@suse.com>, 
	Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, 
	Jan Beulich <JBeulich@suse.com>, Julien Grall <julien@xen.org>, 
	Stefano Stabellini <sstabellini@kernel.org>, Alexandru Isaila <aisaila@bitdefender.com>, 
	Petre Pircalabu <ppircalabu@bitdefender.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Virus-Scanned: ClamAV using ClamSMTP

On Thu, Mar 24, 2022 at 12:04 PM Roger Pau Monn=C3=A9 <roger.pau@citrix.com=
> wrote:
>
> On Thu, Mar 24, 2022 at 11:52:38AM -0400, Tamas K Lengyel wrote:
> > On Thu, Mar 24, 2022 at 11:46 AM Roger Pau Monn=C3=A9 <roger.pau@citrix=
.com> wrote:
> > >
> > > On Tue, Mar 22, 2022 at 01:41:39PM -0400, Tamas K Lengyel wrote:
> > > > diff --git a/xen/include/public/memory.h b/xen/include/public/memor=
y.h
> > > > index 208d8dcbd9..30ce23c5a7 100644
> > > > --- a/xen/include/public/memory.h
> > > > +++ b/xen/include/public/memory.h
> > > > @@ -541,12 +541,14 @@ struct xen_mem_sharing_op {
> > > >                  uint32_t gref;     /* IN: gref to debug         */
> > > >              } u;
> > > >          } debug;
> > > > -        struct mem_sharing_op_fork {      /* OP_FORK */
> > > > +        struct mem_sharing_op_fork {      /* OP_FORK/_RESET */
> > > >              domid_t parent_domain;        /* IN: parent's domain i=
d */
> > > >  /* These flags only makes sense for short-lived forks */
> > > >  #define XENMEM_FORK_WITH_IOMMU_ALLOWED (1u << 0)
> > > >  #define XENMEM_FORK_BLOCK_INTERRUPTS   (1u << 1)
> > > >  #define XENMEM_FORK_SKIP_SPECIAL_PAGES (1u << 2)
> > > > +#define XENMEM_FORK_RESET_STATE        (1u << 3)
> > > > +#define XENMEM_FORK_RESET_MEMORY       (1u << 4)
> > > >              uint16_t flags;               /* IN: optional settings=
 */
> > > >              uint32_t pad;                 /* Must be set to 0 */
> > > >          } fork;
> > > > diff --git a/xen/include/public/vm_event.h b/xen/include/public/vm_=
event.h
> > > > index bb003d21d0..81c2ee28cc 100644
> > > > --- a/xen/include/public/vm_event.h
> > > > +++ b/xen/include/public/vm_event.h
> > > > @@ -127,6 +127,14 @@
> > > >   * Reset the vmtrace buffer (if vmtrace is enabled)
> > > >   */
> > > >  #define VM_EVENT_FLAG_RESET_VMTRACE      (1 << 13)
> > > > +/*
> > > > + * Reset the VM state (if VM is fork)
> > > > + */
> > > > +#define VM_EVENT_FLAG_RESET_FORK_STATE   (1 << 14)
> > > > +/*
> > > > + * Remove unshared entried from physmap (if VM is fork)
> > > > + */
> > > > +#define VM_EVENT_FLAG_RESET_FORK_MEMORY  (1 << 15)
> > >
> > > I'm confused about why two different interfaces are added to do this
> > > kind of selective resets, one to vm_event and one to xenmem_fork?
> > >
> > > I thin k the natural place for the option to live would be
> > > XENMEM_FORK?
> >
> > Yes, that's the natural place for it. But we are adding it to both for
> > a reason. In our use-case the reset operation will happen after a
> > vm_event is received to which we already must send a reply. Setting
> > the flag on the vm_event reply saves us having to issue an extra memop
> > hypercall afterwards.
>
> Can you do a multicall and batch both operations in a single
> hypercall?
>
> That would seem more natural than adding duplicated interfaces.

Not in a straight forward way, no. There is no exposed API in libxc to
do a multicall. Even if that was an option it is still easier for me
to just flip a bit in the response field than having to construct a
whole standalone hypercall structure to be sent as part of a
multicall.

Tamas


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 16:27:44 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 16:27:44 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294468.500758 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXQJL-0007TS-UZ; Thu, 24 Mar 2022 16:27:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294468.500758; Thu, 24 Mar 2022 16:27:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXQJL-0007TL-Rd; Thu, 24 Mar 2022 16:27:43 +0000
Received: by outflank-mailman (input) for mailman id 294468;
 Thu, 24 Mar 2022 16:27:42 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ZOSR=UD=tklengyel.com=tamas@srs-se1.protection.inumbo.net>)
 id 1nXQJK-0007TC-GF
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 16:27:42 +0000
Received: from MTA-13-4.privateemail.com (mta-13-4.privateemail.com
 [198.54.127.109]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 5284d205-ab8f-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 17:27:40 +0100 (CET)
Received: from mta-13.privateemail.com (localhost [127.0.0.1])
 by mta-13.privateemail.com (Postfix) with ESMTP id 8263A18000B3
 for <xen-devel@lists.xenproject.org>; Thu, 24 Mar 2022 12:27:39 -0400 (EDT)
Received: from mail-oa1-f49.google.com (unknown [10.20.151.176])
 by mta-13.privateemail.com (Postfix) with ESMTPA id 5D36D18000A2
 for <xen-devel@lists.xenproject.org>; Thu, 24 Mar 2022 12:27:39 -0400 (EDT)
Received: by mail-oa1-f49.google.com with SMTP id
 586e51a60fabf-ddfa38f1c1so5399118fac.11
 for <xen-devel@lists.xenproject.org>; Thu, 24 Mar 2022 09:27:39 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5284d205-ab8f-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648139259;
	bh=sOmGWXvWba3zw0uZkbQlDsoegecuOkDE/8Nct1skgGc=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=ltClpZaFG6RqAiRFQpFQHORhVlYlBumF9IbH7YbaKYl6cZz5GWtRH/xz5DbfYc7Pi
	 /uYnG/754GRCRFDgfsub7xJx2cAF6xHoXOI0HKH88lzUfyd05YvmFTC7EpKCd6sTxM
	 JY5Z97KhwGENg7apjyYXfE/epKav4+96ZMTuTkqQiWHtWHr7Zhbbs4ndyh80t+yEg3
	 Nf129bYVLGVGVacGEkKn5MuF2ZQ2Yddgtm1SEA73hdF43Mj2dvy1Okpkz3TMNl/Mq6
	 viJgkTGDj0Ot42SYlWb+PfoFXpIRjRfcG1IfvG6xcBU2mfXDlFfxs1XSWl776zulhb
	 4x6RFGAY6EFwQ==
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648139259;
	bh=sOmGWXvWba3zw0uZkbQlDsoegecuOkDE/8Nct1skgGc=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=ltClpZaFG6RqAiRFQpFQHORhVlYlBumF9IbH7YbaKYl6cZz5GWtRH/xz5DbfYc7Pi
	 /uYnG/754GRCRFDgfsub7xJx2cAF6xHoXOI0HKH88lzUfyd05YvmFTC7EpKCd6sTxM
	 JY5Z97KhwGENg7apjyYXfE/epKav4+96ZMTuTkqQiWHtWHr7Zhbbs4ndyh80t+yEg3
	 Nf129bYVLGVGVacGEkKn5MuF2ZQ2Yddgtm1SEA73hdF43Mj2dvy1Okpkz3TMNl/Mq6
	 viJgkTGDj0Ot42SYlWb+PfoFXpIRjRfcG1IfvG6xcBU2mfXDlFfxs1XSWl776zulhb
	 4x6RFGAY6EFwQ==
X-Gm-Message-State: AOAM530DjsvhNnCI4u1fKSZVimSDUfMHI6K4h+olFXZtkY6EyfuBgW/6
	mgH5v6RjTXRTM2wJZ4+OcDa92ZuqX+knqIHjJws=
X-Google-Smtp-Source: ABdhPJz7dG4CWV3cPQfwWKUKzos1bhWfrVujLpJ+VmdqnNCGAcV1WsnaAjV5qVM7ntb9Hj9iZMXcfAh+46qA7RoHu0Q=
X-Received: by 2002:a05:6870:ea81:b0:db:3e68:7ae0 with SMTP id
 s1-20020a056870ea8100b000db3e687ae0mr7176271oap.9.1648139258594; Thu, 24 Mar
 2022 09:27:38 -0700 (PDT)
MIME-Version: 1.0
References: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
 <YjyFODl7VFJLaj0c@Air-de-Roger> <CABfawhk9n08bmXWO1iM7Sz-5uhzuT5W6BZzj+yNDW1+FFDA5GA@mail.gmail.com>
 <YjyTf4INCjKWD09n@Air-de-Roger>
In-Reply-To: <YjyTf4INCjKWD09n@Air-de-Roger>
From: Tamas K Lengyel <tamas@tklengyel.com>
Date: Thu, 24 Mar 2022 12:27:02 -0400
X-Gmail-Original-Message-ID: <CABfawhmWtxpb3E_vxRRAV6b=P7_T3Mhd+rZ=_XY+6J3-vv+-+w@mail.gmail.com>
Message-ID: <CABfawhmWtxpb3E_vxRRAV6b=P7_T3Mhd+rZ=_XY+6J3-vv+-+w@mail.gmail.com>
Subject: Re: [PATCH 1/3] x86/mem_sharing: option to skip populating special
 pages during fork
To: =?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>, xen-devel@lists.xenproject.org, 
	Jan Beulich <JBeulich@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>, 
	George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, 
	Stefano Stabellini <sstabellini@kernel.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Virus-Scanned: ClamAV using ClamSMTP

On Thu, Mar 24, 2022 at 11:51 AM Roger Pau Monn=C3=A9 <roger.pau@citrix.com=
> wrote:
>
> On Thu, Mar 24, 2022 at 11:15:08AM -0400, Tamas K Lengyel wrote:
> > On Thu, Mar 24, 2022 at 10:50 AM Roger Pau Monn=C3=A9 <roger.pau@citrix=
.com> wrote:
> > >
> > > On Tue, Mar 22, 2022 at 01:41:37PM -0400, Tamas K Lengyel wrote:
> > > > Add option to the fork memop to skip populating the fork with speci=
al pages.
> > > > These special pages are only necessary when setting up forks to be =
fully
> > > > functional with a toolstack. For short-lived forks where no toolsta=
ck is active
> > > > these pages are uneccesary.
> > >
> > > I'm not sure those are strictly related to having a toolstack. For
> > > example the vcpu_info has nothing to do with having a toolstack, and
> > > is only used by the guest in order to receive events or fetch time
> > > related data. So while a short-lived fork might not make use of those=
,
> > > that has nothing to do with having a toolstack or not.
> >
> > Fair enough, the point is that the short live fork doesn't use these pa=
ges.
> >
> > > >
> > > > Signed-off-by: Tamas K Lengyel <tamas.lengyel@intel.com>
> > > > ---
> > > >  xen/arch/x86/include/asm/hvm/domain.h |  4 +++-
> > > >  xen/arch/x86/mm/mem_sharing.c         | 33 +++++++++++++++++------=
----
> > > >  xen/include/public/memory.h           |  4 ++--
> > > >  3 files changed, 26 insertions(+), 15 deletions(-)
> > > >
> > > > diff --git a/xen/arch/x86/include/asm/hvm/domain.h b/xen/arch/x86/i=
nclude/asm/hvm/domain.h
> > > > index 698455444e..446cd06411 100644
> > > > --- a/xen/arch/x86/include/asm/hvm/domain.h
> > > > +++ b/xen/arch/x86/include/asm/hvm/domain.h
> > > > @@ -31,7 +31,9 @@
> > > >  #ifdef CONFIG_MEM_SHARING
> > > >  struct mem_sharing_domain
> > > >  {
> > > > -    bool enabled, block_interrupts;
> > > > +    bool enabled;
> > > > +    bool block_interrupts;
> > > > +    bool skip_special_pages;
> > > >
> > > >      /*
> > > >       * When releasing shared gfn's in a preemptible manner, recall=
 where
> > > > diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86/mm/mem_sh=
aring.c
> > > > index 15e6a7ed81..84c04ddfa3 100644
> > > > --- a/xen/arch/x86/mm/mem_sharing.c
> > > > +++ b/xen/arch/x86/mm/mem_sharing.c
> > > > @@ -1643,7 +1643,8 @@ static int bring_up_vcpus(struct domain *cd, =
struct domain *d)
> > > >      return 0;
> > > >  }
> > > >
> > > > -static int copy_vcpu_settings(struct domain *cd, const struct doma=
in *d)
> > > > +static int copy_vcpu_settings(struct domain *cd, const struct doma=
in *d,
> > > > +                              bool skip_special_pages)
> > > >  {
> > > >      unsigned int i;
> > > >      struct p2m_domain *p2m =3D p2m_get_hostp2m(cd);
> > > > @@ -1660,7 +1661,7 @@ static int copy_vcpu_settings(struct domain *=
cd, const struct domain *d)
> > > >
> > > >          /* Copy & map in the vcpu_info page if the guest uses one =
*/
> > > >          vcpu_info_mfn =3D d_vcpu->vcpu_info_mfn;
> > > > -        if ( !mfn_eq(vcpu_info_mfn, INVALID_MFN) )
> > > > +        if ( !skip_special_pages && !mfn_eq(vcpu_info_mfn, INVALID=
_MFN) )
> > > >          {
> > > >              mfn_t new_vcpu_info_mfn =3D cd_vcpu->vcpu_info_mfn;
> > > >
> > > > @@ -1807,17 +1808,18 @@ static int copy_special_pages(struct domain=
 *cd, struct domain *d)
> > > >      return 0;
> > > >  }
> > > >
> > > > -static int copy_settings(struct domain *cd, struct domain *d)
> > > > +static int copy_settings(struct domain *cd, struct domain *d,
> > > > +                         bool skip_special_pages)
> > > >  {
> > > >      int rc;
> > > >
> > > > -    if ( (rc =3D copy_vcpu_settings(cd, d)) )
> > > > +    if ( (rc =3D copy_vcpu_settings(cd, d, skip_special_pages)) )
> > > >          return rc;
> > > >
> > > >      if ( (rc =3D hvm_copy_context_and_params(cd, d)) )
> > > >          return rc;
> > > >
> > > > -    if ( (rc =3D copy_special_pages(cd, d)) )
> > > > +    if ( !skip_special_pages && (rc =3D copy_special_pages(cd, d))=
 )
> > > >          return rc;
> > > >
> > > >      copy_tsc(cd, d);
> > > > @@ -1826,9 +1828,11 @@ static int copy_settings(struct domain *cd, =
struct domain *d)
> > > >      return rc;
> > > >  }
> > > >
> > > > -static int fork(struct domain *cd, struct domain *d)
> > > > +static int fork(struct domain *cd, struct domain *d, uint16_t flag=
s)
> > > >  {
> > > >      int rc =3D -EBUSY;
> > > > +    bool block_interrupts =3D flags & XENMEM_FORK_BLOCK_INTERRUPTS=
;
> > > > +    bool skip_special_pages =3D flags & XENMEM_FORK_SKIP_SPECIAL_P=
AGES;
> > > >
> > > >      if ( !cd->controller_pause_count )
> > > >          return rc;
> > > > @@ -1856,7 +1860,13 @@ static int fork(struct domain *cd, struct do=
main *d)
> > > >      if ( (rc =3D bring_up_vcpus(cd, d)) )
> > > >          goto done;
> > > >
> > > > -    rc =3D copy_settings(cd, d);
> > > > +    if ( !(rc =3D copy_settings(cd, d, skip_special_pages)) )
> > >
> > > Can you set
> > > cd->arch.hvm.mem_sharing.{block_interrupts,skip_special_pages} earlie=
r
> > > so that you don't need to pass the options around to copy_settings an=
d
> > > copy_vcpu_settings?
> >
> > Would be possible yes, but then we would have to clear them in case
> > the forking failed at any point. Setting them only at the end when the
> > fork finished ensures that those fields are only ever valid if the VM
> > is a fork. Both are valid approaches and I prefer this over the other.
>
> I think I'm confused, doesn't the fork get destroyed if there's a
> failure? In which case the values
> cd->arch.hvm.mem_sharing.{block_interrupts,skip_special_pages}
> shouldn't really matter?

No, the domain that will be a fork is just a regular domain until the
fork operation completes. If the fork operation fails the domain
remains.

> > >
> > > > +    {
> > > > +        cd->arch.hvm.mem_sharing.block_interrupts =3D block_interr=
upts;
> > > > +        cd->arch.hvm.mem_sharing.skip_special_pages =3D skip_speci=
al_pages;
> > > > +        /* skip mapping the vAPIC page on unpause if skipping spec=
ial pages */
> > > > +        cd->creation_finished =3D skip_special_pages;
> > >
> > > I think this is dangerous. While it might be true at the moment that
> > > the arch_domain_creation_finished only maps the vAPIC page, there's n=
o
> > > guarantee it couldn't do other stuff in the future that could be
> > > required for the VM to be started.
> >
> > I understand this domain_creation_finished route could be expanded in
> > the future to include other stuff, but IMHO we can evaluate what to do
> > about that when and if it becomes necessary. This is all experimental
> > to begin with.
>
> Maybe you could check the skip_special_pages field from
> domain_creation_finished in order to decide whether the vAPIC page
> needs to be mapped?

Could certainly do that but it means adding experimental code in an
#ifdef to the vAPIC mapping logic. Technically nothing wrong with that
but I would prefer keeping all this code in a single-place if
possible.

Tamas


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 16:37:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 16:37:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294472.500769 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXQSP-0000Wi-Qy; Thu, 24 Mar 2022 16:37:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294472.500769; Thu, 24 Mar 2022 16:37:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXQSP-0000Wb-Nn; Thu, 24 Mar 2022 16:37:05 +0000
Received: by outflank-mailman (input) for mailman id 294472;
 Thu, 24 Mar 2022 16:37:03 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXQSN-0000WR-S9; Thu, 24 Mar 2022 16:37:03 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXQSN-0008C7-Oi; Thu, 24 Mar 2022 16:37:03 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXQSN-0006r0-8H; Thu, 24 Mar 2022 16:37:03 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXQSN-0001Rz-7h; Thu, 24 Mar 2022 16:37:03 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=6gT2O3zA6Tx8zSXSfjS527UZSSDuj/E+pE3YeZTbZ/s=; b=WHXNhhkKCZ7zXZixWZ+QvHylRs
	S+EzaLN010ZWQP+nHzg0/w0XlvQsL6C4QiW5r/CIkNYwK1uMdVqC0MVZqmuPSOt0b0pVLiv//hWcM
	kep0Kq3ZAKmK4bVWlU2X3/oCKptrX8WNG0t+xVlkglzXBHct/dwkVMESMwYYpzVrLgxE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168826-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168826: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 24 Mar 2022 16:37:03 +0000

flight 168826 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168826/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   24 days
Failing since        168258  2022-03-01 01:55:31 Z   23 days  245 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    2 days   26 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 16:44:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 16:44:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294479.500780 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXQZH-0001xk-JU; Thu, 24 Mar 2022 16:44:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294479.500780; Thu, 24 Mar 2022 16:44:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXQZH-0001xd-GG; Thu, 24 Mar 2022 16:44:11 +0000
Received: by outflank-mailman (input) for mailman id 294479;
 Thu, 24 Mar 2022 16:44:10 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=z7/3=UD=citrix.com=prvs=07544547a=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nXQZG-0001xX-HD
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 16:44:10 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 9f3e6714-ab91-11ec-a405-831a346695d4;
 Thu, 24 Mar 2022 17:44:08 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9f3e6714-ab91-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648140248;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=6AK0d4ijX6oNHWSbE5A1ZAoW4wmJ7cXzRC/kFM1iJro=;
  b=ckCQQgny8NXq8I5InmGGTw/cl0mnFBxdzEnTh51aZXrP4HOKC904DzkI
   79hERITEfCm8CiOZwF1kh0djttKRubd2kCwHQlhiQ/cXfvFXRMMyITjtf
   kwr6b1XX5ZNyYxvhHQTdT2IGEJiFReaCSaxEJul0TunHO0VdMVm9CSTLh
   E=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66539279
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:1PEOvKuw11Stm9ZpiOibxcei1+fnVOVeMUV32f8akzHdYApBsoF/q
 tZmKWCHOfyIMGOjeNggbIS290oPv8TSx9BnGwdk+ys3FChB+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jX5
 YuoyyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi8KH7edpOU6XCVnKA9RJbVo8ZOae2CW5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AO
 ZdCOGAwPXwsZTV+KlQdEMgUht6Kh2j5awBitwyJrIoOtj27IAtZj+G2bYu9lsaxbcdImkeVo
 ErW8mK/BQsVXPS94zeY9nOnhsfUgDj2HokVEdWQ7eV2iVeewmgSDhw+Vlahp/S9zEmkVLp3M
 1QV4CEnqaE46WShT8XxUhO1pnKJpFgXXN84O+Q78wiMzqP86QeFCmUKQzhNZcZgv8gzLRQ23
 1qAhJXtCDpgobCRYXOb6rqQ6zi1PEA9MWYHbDQsUQgB7t/ssYw3yBnIS75LAKOzy9H4Bzz06
 zSLtzQlwaUei9YR0Ke29kyBhCijzrDrYRQy/R7/RX++40VyY4vNT5OswUjW67BHNonxc7Wal
 CFawY7EtrlIVMzT0nzWKAkQIF23z9WkKmzggHlgI6Ya2Ru141CqUd0K+BgrcS+FLf04UTPuZ
 UbSvyZY65lSIGamYMdLXm6hNyg55fO+TIq4D5g4evILO8EsL1HfoEmCcGbKhwjQfF4QfbbT0
 HtxWeKlFj4kBKtu11JarM9NgOZwlkjSKY4+LK0XLihLM5LDPBZ5qp9faTNii9zVCove/205F
 P4Fa6O3J+13CrGWX8UtzaYdLEoRMV8wDo3spspce4are1Q6SDl/U6+Kn+t8K+SJepi5cM+Sr
 hlRvWcClTLCaYDvc13WOhiPlpuxNXqAkZ7LFXN1Zgv5s5TSSY2u8L0eZ/MKkUoPr4ReIQpPZ
 6BdIa2oW60XIhyeomh1RcSt/eRKKUXw7SrTbnXNXdTKV8M5LyTT5MTedxfinAFXSHLfWT0W+
 Ob7iGs2gPMrGmxfMSohQK7wngnt7ClHxIqfnSLge7FuRakly6AzQwTZhf4rOcAcbxLFwzqRz
 QGNBhkE4+LKpucIHBPh3Mhoc6/B/zNCI3dn
IronPort-HdrOrdr: A9a23:gNDOkqjI2XPZuaCC0j2lWsu4E3BQXzh13DAbv31ZSRFFG/FwyP
 rAoB1L73PJYWgqNU3I+ergBEGBKUmskqKdxbNhR4tKOzOWxVdATbsSlrcKpgePJ8SQzJ8+6U
 4NSdkaNDS0NykHsS+Y2njILz9D+qj/zEnAv463pB0MPGJXguNbnn9E426gYzNLrWJ9dPwE/f
 Snl656T23KQwVpUi33PAhMY8Hz4/nw0L72ax8PABAqrCGIkDOT8bb/VzyVxA0XXT9jyaortT
 GtqX2y2oyT99WAjjPM3W7a6Jpb3PPn19t4HcSJzuwYMC/lhAqEbJloH5eCoDc2iuey70tCqq
 iGnz4Qe+BIr1/BdGC8phXgnyHmzTYV8nfnjWSVhHPyyPaJMw4SOo5kv8Z0YxHZ400vsJVXy6
 RQxV+UsJJREFfpgDn9z8KgbWAkqmOE5V4Z1cIDhX1WVoUTLJVLq5YEwU9TGJAcWArn9YEcFv
 V0Bs203ocbTbqjVQGZgoBT+q3tYpxqdS32AXTq+/blngS+pUoJgXfxn6ck7zU9HJFUcegx2w
 2LCNUsqFh0dL5kUUtMPpZwfSKJMB2+ffvtChPlHb21LtBPB5ryw6SHlYndotvaPKA18A==
X-IronPort-AV: E=Sophos;i="5.90,207,1643691600"; 
   d="scan'208";a="66539279"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=IuHlE8JYRJ2buICLzpxxbUqVAz+AwBklsSnEJ0ZjUkFAeQlj7giMjucQMFF0R9m45ZZc4tgbaS2dVOH6p6ejPeAXOCP1FgoiTTkvJQ9tOVU2gE2B2o+nk07+9Gd4u2ZiqCv/cWRMVV2NE9YRqpbf0mnCtz2rgHzTrruQD24VIXnkq6GKUqcaldIuoSfbkOHWPjd6WhfTHeMoQYk5AkQpjxYSY+gk/PZNPHuDkuSaEe/7TIMij5BArL3YuqRsqD4QqY0djIN/cCWxCZBxwrTHWUzyweJqdgbNnnNDJSbEgPat+ftLq7TKjHRb3gtOClb+GOIeWJXHepI+Mr3FPXeBzg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=gGAGIp7T5z4Kf3FAho1Gjz2xraQhXqBhGckrKyWGAMg=;
 b=aGhTMsUcS+qBiaw+AUBIbMO/BqleiOZGbzb10GfcC3J2vmCWZ+kCrd9UR8dXiudI4W40xKLyGBDq0a0oQc+5deEJZpuCBtIZx2GGDjSBbQ4PeIkzWswGs4iym2VyOPGWt2RWzC927Wk4O4Te57vgc0Qxn8L9fySr9HhN8d8Ahh08w3h/R8kf1fRLpWqgyj4rQA3TX/c5Cu8Bf9bznUCpSCLZpyaP4nooBrCECSNftUf3N58S56KX/fJeKZQKpOIqYSrRE8uR1JoKtX3lSiJBwifmDJ5uuSTuxCHaBCOAYuNL6ctMfNcyEBT6oX5cke8S1aBFxNgP/AzOmP46j9WkxA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=gGAGIp7T5z4Kf3FAho1Gjz2xraQhXqBhGckrKyWGAMg=;
 b=vp9EM+zvyu/UBDIwILLs1Q3bfFR56AQB7OEc6eXpyzU6DwWq8mvY4j4N3Epw8sWXS3NtU22rE5O2aIwwREJHLiLdUtvYwI4O0LNxFSOasZubMjb3TD71AOvL5GBGJIeMoaqeddKNgjide4fBTJnshjWDTJecOurscQMsC4EKMH0=
Date: Thu, 24 Mar 2022 17:43:54 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Tamas K Lengyel <tamas@tklengyel.com>
CC: Tamas K Lengyel <tamas.lengyel@intel.com>,
	<xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, Anthony PERARD
	<anthony.perard@citrix.com>, Juergen Gross <JGross@suse.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, Jan
 Beulich <JBeulich@suse.com>, Julien Grall <julien@xen.org>, Stefano
 Stabellini <sstabellini@kernel.org>, Alexandru Isaila
	<aisaila@bitdefender.com>, Petre Pircalabu <ppircalabu@bitdefender.com>
Subject: Re: [PATCH 3/3] x86/mem_sharing: make fork_reset more configurable
Message-ID: <Yjyfygi6pE+UVhjM@Air-de-Roger>
References: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
 <fb437a16517d343ba3432aa64b9e14b34630a750.1647970630.git.tamas.lengyel@intel.com>
 <YjySMjegTNFBE5RK@Air-de-Roger>
 <CABfawhnnAehxaByyncaYAjSSbddJi8yeTnjcXX_a+st8Q+C_+Q@mail.gmail.com>
 <YjyWW2CkQv1ckvXM@Air-de-Roger>
 <CABfawhn-QiUBuq9c4tzr=9nL=J-ntm1hf23mbeRu-qCAKRDj1Q@mail.gmail.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <CABfawhn-QiUBuq9c4tzr=9nL=J-ntm1hf23mbeRu-qCAKRDj1Q@mail.gmail.com>
X-ClientProxiedBy: LO4P123CA0254.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:194::7) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 246b9248-c9b9-4172-114a-08da0db57e5e
X-MS-TrafficTypeDiagnostic: BN6PR03MB2498:EE_
X-Microsoft-Antispam-PRVS: <BN6PR03MB24989A9D5B6D2945105490688F199@BN6PR03MB2498.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(82960400001)(26005)(38100700002)(86362001)(83380400001)(8936002)(66556008)(186003)(5660300002)(316002)(66476007)(8676002)(4326008)(66946007)(33716001)(85182001)(7416002)(2906002)(9686003)(6666004)(6512007)(508600001)(6506007)(53546011)(6486002)(6916009)(54906003)(67856001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?dDFoOHlVOVc5ZGoybTRqbE5lU2sxNk1xYVBGMHVuNmlWaUQ2Qzd3cUVocE1H?=
 =?utf-8?B?UzFET1dGREFqc0RmVHpiTzJoeTFIdFc2K3Q0ejlMR3lIeVBJR293QzQvbDN5?=
 =?utf-8?B?NHQzd25oSXNOdExRRFRsQ0ZJaFpWTVdIb1BNL2ZWcHhxS3pST3E4VFVEcnlW?=
 =?utf-8?B?WVBkOFB6WGZyNDRvU0lEN0xLQnV2clRrSWlkbUgrNytDR1VJMGFrcVJONkJ5?=
 =?utf-8?B?ZU9OOHRURDVTK0pFZXUweXIwWXVlYzJDbEo0cTJ6ZkI0OEowQ01rSXVHNE0z?=
 =?utf-8?B?REJLLzUxWkJoSmZ4T2VWRkdyUEQ3RHdPQzhIbEwvTUlnM2ZVUlZ0Y3EwV0cw?=
 =?utf-8?B?cHloRkRvSy9LdlJkaXFQd3VVUWF4aCtTWk5uSisrWVUrR09GRDRHWENJdlIw?=
 =?utf-8?B?RFNyTVhJa2hYYW96c3EwQVQ2NzVFQlMvMUlGTCttRnJPZlJtalJWUVhtU3hj?=
 =?utf-8?B?Zk5WTnc1bU84MDJMbElINnhVTDYrOHl5SE1MOXR2UnNqcXBPQnFjWjJTUTBK?=
 =?utf-8?B?TnduZzg5VWUyZUtoUE1DUlVVWkhUMGs0RHdzVHhnM3RnMktoUkJJMDFhQXFR?=
 =?utf-8?B?dlJrQmh0bklsSjBCVXlHOVlRdUZ5a0pURGkvc01XUzhWNUpTTnB6bWxsNjJz?=
 =?utf-8?B?Rk0zVGJKYmhtZWxIK2dURTlmaGkrSTZydkViYStjMEtJbEFxOERxSEFsMHpY?=
 =?utf-8?B?STRmUlh1RzdBZHlRNFB3YjVPTnl3NFhka3U4OHJFazBqQ3c4MHUvV2VXb0RG?=
 =?utf-8?B?TVR3Q2o0dlMxRGlubkFSMEVYcHFHTVl5cGl6S1FzRFV2bDZ6OVBjKzBVMDFz?=
 =?utf-8?B?K3RsT0RQVmtCOW9SVHZpU0crNXRlWldWRmdHRzdDZ2NMSjlWcGthSFRGNU5l?=
 =?utf-8?B?OE9NTGM1M3RuMEZQaThEeG1MdkpoNWxuc2p4WFVkb1pzYW5Ec3oxZkFSTnpP?=
 =?utf-8?B?UzVHNmhEc3hTL3hrZkNBZXhXdmJtUG5XZFdvTjVDRHpYdC8zM1pneVVnbHBs?=
 =?utf-8?B?WFJCMVM4TFloV3VBRFVxTks3LzZsWVh2dHJKWmVZQ0ttdjdzaC9CTnN0Q1FO?=
 =?utf-8?B?dVQrUGZLN0FxTFc2THhBSTlNdXlpaE1qZ0FBK3pkZ0NmcUhlSWtvNHg2SjFP?=
 =?utf-8?B?NG1NU2NBSkpIaEYzY0Y3RjU5S3JMZDQxTFYzcDZBaEV0Q0lrYzZYVHROTG0v?=
 =?utf-8?B?YjU4K2E2Qnc3ZUNyUFVVRU0rL0ZUMi9ybnE2SWdNblFLdmJTSkd3Wml6MmFE?=
 =?utf-8?B?Ym1PSkhrdVdZTEFqVFc0TGFxVjlUQkdlcVU3aVh0eU9OU2liM3h5WWJTcWtu?=
 =?utf-8?B?YjdPcDlFeG8vUVhaQ1RQbys3QWZSMzNvWlJXemU0REFHcDdGTDJRb29SNkZV?=
 =?utf-8?B?RlNyT2d0b2plVG9PTGRWRUlkQ2VnOEFzKytIYW5yK3p1U25GOG0xQjAzVmJ3?=
 =?utf-8?B?YzlyWHpheDJJdStjSUlSd3BBNXdybkFWSzBpVi9rWVRxSEk0aTdKWXpBTitC?=
 =?utf-8?B?aVpzcXJYRkhRaUlCK1QvSzF2bTJySkM5VWZMWFhtck9GZ2lDMzZwU2l3SWFS?=
 =?utf-8?B?cGhSWWg2QXdqcithZEh0MERTNExaaXpJRHVBWHVIR0ZpM1FhQzI4b0NTaFVB?=
 =?utf-8?B?eEtmbFZ3MmM2VjVVb1ozdnh1eCtuN04zUTNSa3lPb1NEdXpHdGt6U01YaDBS?=
 =?utf-8?B?dS9SSmhLdy9Uckc2TVJmN0ZUZFVpSThiMkNuQVl2QVNpbE54TDhuVStycGRM?=
 =?utf-8?B?VDBId3ZZTTB5SFhaMnd1T1pjWDJiejV4cHhLUGJaZ1JWWDZZRDkrYVUvS1Vk?=
 =?utf-8?B?ZnFJYVhRc3ZqZ3dyRzBrVGpEVS9IdkZqZFVKTWhXalpQY3RGSnA1RHV4UlI2?=
 =?utf-8?B?K3ovRXpmTFMrQkMvMWtGVnF0M2VNMWF2cmJoQi9mSVdabXRQSzd5cnpYenly?=
 =?utf-8?B?Z1Z6OHBvS0p2TVhmemVaQVlWYjBlcFRWNk9ockltQW9hMXlyd01MSVoxaUNa?=
 =?utf-8?B?cFN2UEFSNHZLSmQwa0dlaHlES2QyUmhFSWpIRG1RQmxMZ2M2bFFsakkrMDJz?=
 =?utf-8?B?eE9FNTZRWlRwZGllc2RuQVVoZlB0LytiVEw0eVo5OXBkeTBkN3RhZzZpZkMy?=
 =?utf-8?B?anNYL0hBcjB1WUphUW5wbFNBbG4rd1IxTmJHbVFFOE1ocG9NRTB6ZWhYRWdl?=
 =?utf-8?B?c1NBTlRqZ011VkM3UU9GTDhvTndZZWZXQ0NhR3d3QjRkYzBpUFY4WEJNeHVl?=
 =?utf-8?B?SisvSVFIY2lnZlI0dTdPQTJSZzNSYjdmU2paQ0d1N3pTL1d6ZnJyd2FDRFpM?=
 =?utf-8?B?UEZuTWFSZFdodnlxR01hbFQzanZtUko4T09nVDhDaklTdVNXUmJIODMzOGtY?=
 =?utf-8?Q?VWfXXepQ2CEnF5oI=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 246b9248-c9b9-4172-114a-08da0db57e5e
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Mar 2022 16:43:58.8087
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: F1cui56lMrCuGyMXIJyMSs2AzEuL967ty+6qMhcpjv0csUr1t84AKcB4Bp4M+nBu4GCeqwuWFx9fRega40awpw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR03MB2498
X-OriginatorOrg: citrix.com

On Thu, Mar 24, 2022 at 12:22:49PM -0400, Tamas K Lengyel wrote:
> On Thu, Mar 24, 2022 at 12:04 PM Roger Pau Monné <roger.pau@citrix.com> wrote:
> >
> > On Thu, Mar 24, 2022 at 11:52:38AM -0400, Tamas K Lengyel wrote:
> > > On Thu, Mar 24, 2022 at 11:46 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
> > > >
> > > > On Tue, Mar 22, 2022 at 01:41:39PM -0400, Tamas K Lengyel wrote:
> > > > > diff --git a/xen/include/public/memory.h b/xen/include/public/memory.h
> > > > > index 208d8dcbd9..30ce23c5a7 100644
> > > > > --- a/xen/include/public/memory.h
> > > > > +++ b/xen/include/public/memory.h
> > > > > @@ -541,12 +541,14 @@ struct xen_mem_sharing_op {
> > > > >                  uint32_t gref;     /* IN: gref to debug         */
> > > > >              } u;
> > > > >          } debug;
> > > > > -        struct mem_sharing_op_fork {      /* OP_FORK */
> > > > > +        struct mem_sharing_op_fork {      /* OP_FORK/_RESET */
> > > > >              domid_t parent_domain;        /* IN: parent's domain id */
> > > > >  /* These flags only makes sense for short-lived forks */
> > > > >  #define XENMEM_FORK_WITH_IOMMU_ALLOWED (1u << 0)
> > > > >  #define XENMEM_FORK_BLOCK_INTERRUPTS   (1u << 1)
> > > > >  #define XENMEM_FORK_SKIP_SPECIAL_PAGES (1u << 2)
> > > > > +#define XENMEM_FORK_RESET_STATE        (1u << 3)
> > > > > +#define XENMEM_FORK_RESET_MEMORY       (1u << 4)
> > > > >              uint16_t flags;               /* IN: optional settings */
> > > > >              uint32_t pad;                 /* Must be set to 0 */
> > > > >          } fork;
> > > > > diff --git a/xen/include/public/vm_event.h b/xen/include/public/vm_event.h
> > > > > index bb003d21d0..81c2ee28cc 100644
> > > > > --- a/xen/include/public/vm_event.h
> > > > > +++ b/xen/include/public/vm_event.h
> > > > > @@ -127,6 +127,14 @@
> > > > >   * Reset the vmtrace buffer (if vmtrace is enabled)
> > > > >   */
> > > > >  #define VM_EVENT_FLAG_RESET_VMTRACE      (1 << 13)
> > > > > +/*
> > > > > + * Reset the VM state (if VM is fork)
> > > > > + */
> > > > > +#define VM_EVENT_FLAG_RESET_FORK_STATE   (1 << 14)
> > > > > +/*
> > > > > + * Remove unshared entried from physmap (if VM is fork)
> > > > > + */
> > > > > +#define VM_EVENT_FLAG_RESET_FORK_MEMORY  (1 << 15)
> > > >
> > > > I'm confused about why two different interfaces are added to do this
> > > > kind of selective resets, one to vm_event and one to xenmem_fork?
> > > >
> > > > I thin k the natural place for the option to live would be
> > > > XENMEM_FORK?
> > >
> > > Yes, that's the natural place for it. But we are adding it to both for
> > > a reason. In our use-case the reset operation will happen after a
> > > vm_event is received to which we already must send a reply. Setting
> > > the flag on the vm_event reply saves us having to issue an extra memop
> > > hypercall afterwards.
> >
> > Can you do a multicall and batch both operations in a single
> > hypercall?
> >
> > That would seem more natural than adding duplicated interfaces.
> 
> Not in a straight forward way, no. There is no exposed API in libxc to
> do a multicall. Even if that was an option it is still easier for me
> to just flip a bit in the response field than having to construct a
> whole standalone hypercall structure to be sent as part of a
> multicall.

Right, I can see it being easier, but it seems like a bad choice from
an interface PoV. You are the maintainer of both subsystems, but it
would seem to me it's in your best interest to try to keep the
interfaces separated and clean.

Would it be possible for the reset XENMEM_FORK op to have the side
effect of performing what you would instead do with the vm_event
hypercall?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 17:02:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 17:02:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294483.500790 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXQrL-0004Qb-97; Thu, 24 Mar 2022 17:02:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294483.500790; Thu, 24 Mar 2022 17:02:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXQrL-0004QU-64; Thu, 24 Mar 2022 17:02:51 +0000
Received: by outflank-mailman (input) for mailman id 294483;
 Thu, 24 Mar 2022 17:02:50 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ZOSR=UD=tklengyel.com=tamas@srs-se1.protection.inumbo.net>)
 id 1nXQrK-0004QO-6R
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 17:02:50 +0000
Received: from MTA-05-3.privateemail.com (mta-05-3.privateemail.com
 [68.65.122.15]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3af2ba92-ab94-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 18:02:48 +0100 (CET)
Received: from mta-05.privateemail.com (localhost [127.0.0.1])
 by mta-05.privateemail.com (Postfix) with ESMTP id D647D18000AF
 for <xen-devel@lists.xenproject.org>; Thu, 24 Mar 2022 13:02:46 -0400 (EDT)
Received: from mail-oa1-f52.google.com (unknown [10.20.151.176])
 by mta-05.privateemail.com (Postfix) with ESMTPA id AFE7218000AD
 for <xen-devel@lists.xenproject.org>; Thu, 24 Mar 2022 13:02:46 -0400 (EDT)
Received: by mail-oa1-f52.google.com with SMTP id
 586e51a60fabf-d6ca46da48so5496196fac.12
 for <xen-devel@lists.xenproject.org>; Thu, 24 Mar 2022 10:02:46 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3af2ba92-ab94-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648141366;
	bh=tBtzKmnsTAbQafXwpcWVA7TECciq/1TIboXxnVKRrXc=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=nxK4jd0/XuSCYM9LoQefAn8iRyhPGcA7vfhhUgsEwoaIL0LbgCBrCUd6JWiR1NiAf
	 Eac9gjLZfD189DXnQRrYkOJlkOMaYk/T4afWQZ90MdDyb7AYiCoiwPqNv4Vn61bO1C
	 5JyL6L+HaEWZxVA+/b695EwDENj7Pe887AwjvfK3gwU96DfaOrKZeoxHnc7xEy3KBv
	 11nk1O3DpZ/hY3ggI9PzkHsRebxF1+KroBdpQH04+L8LMhCQjrCc92TbYrDaOyLBb6
	 9lafoY3JkIpyLDMfqLXkiOk/NyDTwVR4qqThKufbHLi/4mMzpfNTZ8jKe6tlRjZNlF
	 a7Wq1C7cF9hQA==
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648141366;
	bh=tBtzKmnsTAbQafXwpcWVA7TECciq/1TIboXxnVKRrXc=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=nxK4jd0/XuSCYM9LoQefAn8iRyhPGcA7vfhhUgsEwoaIL0LbgCBrCUd6JWiR1NiAf
	 Eac9gjLZfD189DXnQRrYkOJlkOMaYk/T4afWQZ90MdDyb7AYiCoiwPqNv4Vn61bO1C
	 5JyL6L+HaEWZxVA+/b695EwDENj7Pe887AwjvfK3gwU96DfaOrKZeoxHnc7xEy3KBv
	 11nk1O3DpZ/hY3ggI9PzkHsRebxF1+KroBdpQH04+L8LMhCQjrCc92TbYrDaOyLBb6
	 9lafoY3JkIpyLDMfqLXkiOk/NyDTwVR4qqThKufbHLi/4mMzpfNTZ8jKe6tlRjZNlF
	 a7Wq1C7cF9hQA==
X-Gm-Message-State: AOAM533qgrtqTMqklD5t30XR9d1AEJso2Pi5iAdz8TsCVgaGDCi1TAEe
	OjR8zpcRwoJNGOiA+wFdwLX0ZQA2KIAivL9hDd0=
X-Google-Smtp-Source: ABdhPJw3lBhxQAQZzN4LF1e33Bx2k61MRkWU/MF6o4LYwSz/ENbcqgEBUAHnCDGbP1/mEcHfVYsrCqiyF1Ux1d1chj0=
X-Received: by 2002:a05:6870:ea81:b0:db:3e68:7ae0 with SMTP id
 s1-20020a056870ea8100b000db3e687ae0mr7256317oap.9.1648141365958; Thu, 24 Mar
 2022 10:02:45 -0700 (PDT)
MIME-Version: 1.0
References: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
 <fb437a16517d343ba3432aa64b9e14b34630a750.1647970630.git.tamas.lengyel@intel.com>
 <YjySMjegTNFBE5RK@Air-de-Roger> <CABfawhnnAehxaByyncaYAjSSbddJi8yeTnjcXX_a+st8Q+C_+Q@mail.gmail.com>
 <YjyWW2CkQv1ckvXM@Air-de-Roger> <CABfawhn-QiUBuq9c4tzr=9nL=J-ntm1hf23mbeRu-qCAKRDj1Q@mail.gmail.com>
 <Yjyfygi6pE+UVhjM@Air-de-Roger>
In-Reply-To: <Yjyfygi6pE+UVhjM@Air-de-Roger>
From: Tamas K Lengyel <tamas@tklengyel.com>
Date: Thu, 24 Mar 2022 13:02:10 -0400
X-Gmail-Original-Message-ID: <CABfawhkQoOnKv7OWNus0WBY4CjX+1uU1ZeZgQ-mU-sRtQFE3QQ@mail.gmail.com>
Message-ID: <CABfawhkQoOnKv7OWNus0WBY4CjX+1uU1ZeZgQ-mU-sRtQFE3QQ@mail.gmail.com>
Subject: Re: [PATCH 3/3] x86/mem_sharing: make fork_reset more configurable
To: =?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>, xen-devel@lists.xenproject.org, 
	Wei Liu <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>, Juergen Gross <JGross@suse.com>, 
	Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, 
	Jan Beulich <JBeulich@suse.com>, Julien Grall <julien@xen.org>, 
	Stefano Stabellini <sstabellini@kernel.org>, Alexandru Isaila <aisaila@bitdefender.com>, 
	Petre Pircalabu <ppircalabu@bitdefender.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Virus-Scanned: ClamAV using ClamSMTP

On Thu, Mar 24, 2022 at 12:44 PM Roger Pau Monn=C3=A9 <roger.pau@citrix.com=
> wrote:
>
> On Thu, Mar 24, 2022 at 12:22:49PM -0400, Tamas K Lengyel wrote:
> > On Thu, Mar 24, 2022 at 12:04 PM Roger Pau Monn=C3=A9 <roger.pau@citrix=
.com> wrote:
> > >
> > > On Thu, Mar 24, 2022 at 11:52:38AM -0400, Tamas K Lengyel wrote:
> > > > On Thu, Mar 24, 2022 at 11:46 AM Roger Pau Monn=C3=A9 <roger.pau@ci=
trix.com> wrote:
> > > > >
> > > > > On Tue, Mar 22, 2022 at 01:41:39PM -0400, Tamas K Lengyel wrote:
> > > > > > diff --git a/xen/include/public/memory.h b/xen/include/public/m=
emory.h
> > > > > > index 208d8dcbd9..30ce23c5a7 100644
> > > > > > --- a/xen/include/public/memory.h
> > > > > > +++ b/xen/include/public/memory.h
> > > > > > @@ -541,12 +541,14 @@ struct xen_mem_sharing_op {
> > > > > >                  uint32_t gref;     /* IN: gref to debug       =
  */
> > > > > >              } u;
> > > > > >          } debug;
> > > > > > -        struct mem_sharing_op_fork {      /* OP_FORK */
> > > > > > +        struct mem_sharing_op_fork {      /* OP_FORK/_RESET */
> > > > > >              domid_t parent_domain;        /* IN: parent's doma=
in id */
> > > > > >  /* These flags only makes sense for short-lived forks */
> > > > > >  #define XENMEM_FORK_WITH_IOMMU_ALLOWED (1u << 0)
> > > > > >  #define XENMEM_FORK_BLOCK_INTERRUPTS   (1u << 1)
> > > > > >  #define XENMEM_FORK_SKIP_SPECIAL_PAGES (1u << 2)
> > > > > > +#define XENMEM_FORK_RESET_STATE        (1u << 3)
> > > > > > +#define XENMEM_FORK_RESET_MEMORY       (1u << 4)
> > > > > >              uint16_t flags;               /* IN: optional sett=
ings */
> > > > > >              uint32_t pad;                 /* Must be set to 0 =
*/
> > > > > >          } fork;
> > > > > > diff --git a/xen/include/public/vm_event.h b/xen/include/public=
/vm_event.h
> > > > > > index bb003d21d0..81c2ee28cc 100644
> > > > > > --- a/xen/include/public/vm_event.h
> > > > > > +++ b/xen/include/public/vm_event.h
> > > > > > @@ -127,6 +127,14 @@
> > > > > >   * Reset the vmtrace buffer (if vmtrace is enabled)
> > > > > >   */
> > > > > >  #define VM_EVENT_FLAG_RESET_VMTRACE      (1 << 13)
> > > > > > +/*
> > > > > > + * Reset the VM state (if VM is fork)
> > > > > > + */
> > > > > > +#define VM_EVENT_FLAG_RESET_FORK_STATE   (1 << 14)
> > > > > > +/*
> > > > > > + * Remove unshared entried from physmap (if VM is fork)
> > > > > > + */
> > > > > > +#define VM_EVENT_FLAG_RESET_FORK_MEMORY  (1 << 15)
> > > > >
> > > > > I'm confused about why two different interfaces are added to do t=
his
> > > > > kind of selective resets, one to vm_event and one to xenmem_fork?
> > > > >
> > > > > I thin k the natural place for the option to live would be
> > > > > XENMEM_FORK?
> > > >
> > > > Yes, that's the natural place for it. But we are adding it to both =
for
> > > > a reason. In our use-case the reset operation will happen after a
> > > > vm_event is received to which we already must send a reply. Setting
> > > > the flag on the vm_event reply saves us having to issue an extra me=
mop
> > > > hypercall afterwards.
> > >
> > > Can you do a multicall and batch both operations in a single
> > > hypercall?
> > >
> > > That would seem more natural than adding duplicated interfaces.
> >
> > Not in a straight forward way, no. There is no exposed API in libxc to
> > do a multicall. Even if that was an option it is still easier for me
> > to just flip a bit in the response field than having to construct a
> > whole standalone hypercall structure to be sent as part of a
> > multicall.
>
> Right, I can see it being easier, but it seems like a bad choice from
> an interface PoV. You are the maintainer of both subsystems, but it
> would seem to me it's in your best interest to try to keep the
> interfaces separated and clean.
>
> Would it be possible for the reset XENMEM_FORK op to have the side
> effect of performing what you would instead do with the vm_event
> hypercall?

Yes, the event response is really just an event channel signal to Xen,
so the memop hypercall could similarly encode the "now check the
vm_event response" as an optional field. But why is that any better
than the current event channel route processing the vm_response
encoding the "now do these ops on the fork"?

We already have a bunch of different operations you can encode in the
vm_event response field, so it reduces the complexity on the toolstack
side since I don't have to switch around which hypercall I need to
issue depending on what extra ops I want to put into a single
hypercall.

Tamas


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 17:58:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 17:58:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294488.500802 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXRjD-0001C5-HT; Thu, 24 Mar 2022 17:58:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294488.500802; Thu, 24 Mar 2022 17:58:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXRjD-0001By-Dk; Thu, 24 Mar 2022 17:58:31 +0000
Received: by outflank-mailman (input) for mailman id 294488;
 Thu, 24 Mar 2022 17:58:29 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXRjB-0001Bi-In; Thu, 24 Mar 2022 17:58:29 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXRjB-000158-Fq; Thu, 24 Mar 2022 17:58:29 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXRjA-0001Uf-VT; Thu, 24 Mar 2022 17:58:29 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXRjA-0002C3-V1; Thu, 24 Mar 2022 17:58:28 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=ij1qqNUiUi+qHBPpWFYJm800kz1Ik8xPlTiCl9+mvl4=; b=ycohsPFEtuOK8D3vg+21RXJXpy
	7ty4khWmYoszTOuNNmFU6Ef5keCL5bt5gj2HE0L9LgWSpJm+4BQA0lntEDus9Lc4H+DHwOwCzDP37
	ZPUlV8UnRIxdcoTjUtObxfj/W6fwxtYTINwopPeherBcXvUacaaIFihxo+Hdi6xaQOlY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168827-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168827: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 24 Mar 2022 17:58:28 +0000

flight 168827 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168827/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   24 days
Failing since        168258  2022-03-01 01:55:31 Z   23 days  246 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    2 days   27 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 21:52:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 21:52:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294507.500813 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXVN5-0006mh-7k; Thu, 24 Mar 2022 21:51:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294507.500813; Thu, 24 Mar 2022 21:51:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXVN5-0006ma-3X; Thu, 24 Mar 2022 21:51:55 +0000
Received: by outflank-mailman (input) for mailman id 294507;
 Thu, 24 Mar 2022 21:51:54 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXVN4-0006mQ-M2; Thu, 24 Mar 2022 21:51:54 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXVN4-0005DL-JR; Thu, 24 Mar 2022 21:51:54 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXVN4-0006L2-7Z; Thu, 24 Mar 2022 21:51:54 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXVN4-00037B-6t; Thu, 24 Mar 2022 21:51:54 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=03MrlkaEfp7w6MZ6tcPC6usczl2y84P4P4Qm2iIy9gY=; b=27gGLS6Sf7AF/t4t0uQ6nDKvPE
	ZWmIDaj6XOnscNIjHjg++OI9azafP4uxKpiacGpurU4KFS3Ad1M0QLDcCh3Wr89CoAJJaeEwrAJV3
	Up3nQ8oSjpPfr/Xs76j6FDcu3wjUY8KvqbHTgEsdkA0QY/WUUoKAIZVLTnP35XlkAgIY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168829-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168829: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 24 Mar 2022 21:51:54 +0000

flight 168829 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168829/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   24 days
Failing since        168258  2022-03-01 01:55:31 Z   23 days  247 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    2 days   28 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 22:21:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 22:21:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294515.500823 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXVpT-0001gI-Dm; Thu, 24 Mar 2022 22:21:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294515.500823; Thu, 24 Mar 2022 22:21:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXVpT-0001gB-Ab; Thu, 24 Mar 2022 22:21:15 +0000
Received: by outflank-mailman (input) for mailman id 294515;
 Thu, 24 Mar 2022 22:21:14 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=TFZE=UD=invisiblethingslab.com=marmarek@srs-se1.protection.inumbo.net>)
 id 1nXVpS-0001g5-9l
 for xen-devel@lists.xenproject.org; Thu, 24 Mar 2022 22:21:14 +0000
Received: from wout3-smtp.messagingengine.com (wout3-smtp.messagingengine.com
 [64.147.123.19]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id b582812b-abc0-11ec-8fbc-03012f2f19d4;
 Thu, 24 Mar 2022 23:21:12 +0100 (CET)
Received: from compute3.internal (compute3.nyi.internal [10.202.2.43])
 by mailout.west.internal (Postfix) with ESMTP id A438E3200F81;
 Thu, 24 Mar 2022 18:21:09 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163])
 by compute3.internal (MEProxy); Thu, 24 Mar 2022 18:21:09 -0400
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Thu,
 24 Mar 2022 18:21:08 -0400 (EDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b582812b-abc0-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:cc:content-type:date:date:from:from
	:in-reply-to:in-reply-to:message-id:mime-version:references
	:reply-to:sender:subject:subject:to:to:x-me-proxy:x-me-proxy
	:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=zSmOaTjKgF1zD872f
	y8X4xW3i1h1CKcBxR4DGXJ3Xo0=; b=WzBsatHgfvMxW+mmEWOqtOJGc/3vxC4Fz
	jkUMwCron1NpsOyAM4Jr9e8yYcfxqNUqgGs1VLlP94IrWZB+JlPDVlfoBNjuRWyg
	XgjSCZIPBS5KBudENmKNDxOB9jwt9P3YtSkg4oN8eBys39kO+70sFTeuajt1iLGo
	1JDdYVJ06wKETzxjWPS1sO/F2B1CV1r44PhAIA2D9RziVUX2S95tFZfxZmZ+IEbZ
	Or6tbmxMP7bpSX4KOOttUkwELHEWyragBuBbRGfP2FCt6ZphZhcP1KATsNpuQ9tW
	AbcmclC9srQ1rAtseey8P1OyBca6veaOaAhGbaTxwTtcUcl8IajYQ==
X-ME-Sender: <xms:1e48YpHCbUutlE7j3YZKkWNXXPDsxpGkFI3Bns7BrAS81ROWPRP7Mg>
    <xme:1e48YuU5LB5un-xAaHwW-eCe8NdZuXR2J3ztbT_KVDahhaMYYyfoNw22Zl6HUVoeu
    4fhIrVrvje7qQ>
X-ME-Received: <xmr:1e48YrK8VIFmKp5MGkZXqo-GuUyXQKNSNtLldyVpvdsigK21_EyzffjBa8rLN0VbXKHNxgchjH6OB68Fg1g19iYFJrRd7KmGZQ>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddrudegledgudehjecutefuodetggdotefrod
    ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh
    necuuegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmd
    enucfjughrpeffhffvuffkfhggtggujgesghdtreertddtjeenucfhrhhomhepofgrrhgv
    khcuofgrrhgtiiihkhhofihskhhiqdfikphrvggtkhhiuceomhgrrhhmrghrvghksehinh
    hvihhsihgslhgvthhhihhnghhslhgrsgdrtghomheqnecuggftrfgrthhtvghrnhepteev
    ffeigffhkefhgfegfeffhfegveeikeettdfhheevieehieeitddugeefteffnecuvehluh
    hsthgvrhfuihiivgeptdenucfrrghrrghmpehmrghilhhfrhhomhepmhgrrhhmrghrvghk
    sehinhhvihhsihgslhgvthhhihhnghhslhgrsgdrtghomh
X-ME-Proxy: <xmx:1e48YvGvl8fMAckPQvhJnDWygX93wkm18CuOkLPDlD9Xpm8sXC1huw>
    <xmx:1e48YvUzGLAsrHbr5zu8bgsri7Un824RkU_HJ6YsX15LotJCNwLUXQ>
    <xmx:1e48YqPZvpUZA-Z4rQE07sk-B4IzC2N6hzQFRWppR__QL1Ln86MeNQ>
    <xmx:1e48Ygf-JUkXjhgOpYO3GgsDXuNz-HEGrwxd0e90YtXj9K8IHgIs1A>
Date: Thu, 24 Mar 2022 23:21:05 +0100
From: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: Demi Marie Obenour <demi@invisiblethingslab.com>
Cc: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>,
	Xen developer discussion <xen-devel@lists.xenproject.org>
Subject: Re: Support status of OpenBSD frontend drivers
Message-ID: <Yjzu0Zz8HCu/9mFg@mail-itl>
References: <Yjx4kNv7hG4FGGot@itl-email>
 <Yjx8G5tH4Xf8+oVx@Air-de-Roger>
 <f101f6f6-d6d3-4877-20a4-ebae0130c756@invisiblethingslab.com>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="VvCUMnsIOvIQLhde"
Content-Disposition: inline
In-Reply-To: <f101f6f6-d6d3-4877-20a4-ebae0130c756@invisiblethingslab.com>


--VvCUMnsIOvIQLhde
Content-Type: text/plain; protected-headers=v1; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Date: Thu, 24 Mar 2022 23:21:05 +0100
From: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: Demi Marie Obenour <demi@invisiblethingslab.com>
Cc: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>,
	Xen developer discussion <xen-devel@lists.xenproject.org>
Subject: Re: Support status of OpenBSD frontend drivers

On Thu, Mar 24, 2022 at 11:49:14AM -0400, Demi Marie Obenour wrote:
> On 3/24/22 10:11, Roger Pau Monn=C3=A9 wrote:
> > On Thu, Mar 24, 2022 at 09:56:29AM -0400, Demi Marie Obenour wrote:
> >> As per private discussion with Theo de Raadt, OpenBSD does not consider
> >> bugs in its xnf(4) that allow a backend to cause mischief to be securi=
ty
> >> issues.  I believe the same applies to its xbf(4).  Should the support
> >> document be updated?
> >=20
> > I think that's already reflected in the support document:
> >=20
> > 'Status, OpenBSD: Supported, Security support external'
> >=20
> > Since the security support is external it's my understanding OpenBSD
> > security team gets to decide what's a security issue and what is not.
> >=20
> > That however creates differences in the level of support offered by
> > the different OSes, but I think that's unavoidable. It's also hard to
> > track the status here because those are external components in
> > separate code bases.
> >=20
> > Could be added as a mention together with the Windows note about
> > frontends trusting backends, but then I would fear this is likely to
> > get out of sync if OpenBSD ever changes their frontends to support
> > untrusted backends (even if not considered as a security issue).
>=20
> As a Qubes OS developer, I still think this is useful information and
> should be documented.  For instance, if I choose to add proper OpenBSD
> guest support to Qubes OS (as opposed to the current =E2=80=9Cyou can run
> anything in an HVM=E2=80=9D situation), I might decide to have OpenBSD
> guests use devices emulated by a Linux-based stubdomain, since the
> stubdomain=E2=80=99s netfront and blkfront drivers *are* security-support=
ed
> against malicious backends.  I might also choose to have a warning in
> the GUI when switching the NetVM of an OpenBSD guest to something other
> than the empty string (meaning no network access) or the (normally
> fairly trusted) sys-firewall or sys-whonix qubes.

I'm with Roger on this - when security support is external, such
information in xen.git could easily become stale. If anything, there
could be a link to OpenBSD security status info, maintained by whoever
such support provides.

--=20
Best Regards,
Marek Marczykowski-G=C3=B3recki
Invisible Things Lab

--VvCUMnsIOvIQLhde
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAmI87tEACgkQ24/THMrX
1yzGkAf/ZwdWdiOFGAuhBNltUlvKnPWBn0VQcfLdjmWXmM+PMQ1XZfLIP/P+6Onk
uOr5vcft2faF3Q2DR3BCTrIlHZq65TiiIUzy0ReGm+s0aVt2uIDQEVGDFdz8zhD9
HB1S7fpjdNz9eHQn3up4cvgOJQcOLcNhf8bvC593Hr3KnRjTO1hdhKtx4Z9VQg39
CGh2eTiRpblXCtrkDfrLvKMZPiSmFvi98X6sHWzFVOZ/2Gl2JiCby5UkUToZDlHd
J32CdB7HSFpqU4iLPkWCFypL3smvC5PPA1/sj/vWoHh/rmrpAs/weMSXarPtLYkg
iKFFYxx0HO/7VqNuMu1bwHH5Sx6N9A==
=dC/k
-----END PGP SIGNATURE-----

--VvCUMnsIOvIQLhde--


From xen-devel-bounces@lists.xenproject.org Thu Mar 24 23:34:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 24 Mar 2022 23:34:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294524.500842 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXWyW-0000NE-N6; Thu, 24 Mar 2022 23:34:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294524.500842; Thu, 24 Mar 2022 23:34:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXWyW-0000N7-K8; Thu, 24 Mar 2022 23:34:40 +0000
Received: by outflank-mailman (input) for mailman id 294524;
 Thu, 24 Mar 2022 23:34:39 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXWyV-0000Mx-DT; Thu, 24 Mar 2022 23:34:39 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXWyV-0006s8-At; Thu, 24 Mar 2022 23:34:39 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXWyU-0002bs-Rb; Thu, 24 Mar 2022 23:34:38 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXWyU-0000H6-Qp; Thu, 24 Mar 2022 23:34:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=GNu8MLciLSWcb7/l5rcMg3LSMT1umM6udh31xoen6TE=; b=d1YvBI3aR5uTT7b7VsjAHu6OSQ
	RdeFUcdAyl3CcLD6eSvjTnZBl/jxsSdZ0UT2VZO63ooxAW7XHNgfzmghXpMcrPjoGjNtdLWWIlUtk
	YPt/SUg4IIGmzwVcYG5sarP8p1jrwuKIqaRktykVkRWtWlcp/wDcSZ3fOHa/6GkrVais=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168825-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168825: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=1c80f13a6efdc832878d7a431e2c216039d063bc
X-Osstest-Versions-That:
    xen=69e46280937526db9cf78259cd8a0a9ec62dc847
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 24 Mar 2022 23:34:38 +0000

flight 168825 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168825/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168815
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168815
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168815
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168815
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168815
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168815
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168815
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168815
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168815
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168815
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168815
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168815
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  1c80f13a6efdc832878d7a431e2c216039d063bc
baseline version:
 xen                  69e46280937526db9cf78259cd8a0a9ec62dc847

Last test of basis   168815  2022-03-24 01:52:09 Z    0 days
Testing same since   168825  2022-03-24 15:08:14 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Jan Beulich <jbeulich@suse.com>
  Juergen Gross <jgross@suse.com>
  Julien Grall <jgrall@amazon.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   69e4628093..1c80f13a6e  1c80f13a6efdc832878d7a431e2c216039d063bc -> master


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 00:30:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 00:30:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294531.500854 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXXqZ-0006tZ-GL; Fri, 25 Mar 2022 00:30:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294531.500854; Fri, 25 Mar 2022 00:30:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXXqZ-0006tS-Ci; Fri, 25 Mar 2022 00:30:31 +0000
Received: by outflank-mailman (input) for mailman id 294531;
 Fri, 25 Mar 2022 00:30:29 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LYjy=UE=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nXXqX-0006t3-LR
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 00:30:29 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c44ad2bf-abd2-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 01:30:27 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 60196B826A1;
 Fri, 25 Mar 2022 00:30:26 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 808A0C340EC;
 Fri, 25 Mar 2022 00:30:24 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c44ad2bf-abd2-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1648168225;
	bh=pnFplBmMuU5vSfbBCuDaxtUzyDeh4Bumraknw9VjJkE=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=hd5AJ1/O2xXyNi8zzESUo/2ZxEGJ5dGV/s2DCASnfAtiNtys8LCLymueFb/EnBB3g
	 tE666p1+XGzPv3Y1x65SNrOZ3oDWgzVoUu4bjDa7fGxd7eGwb5hm6+a8f3cXz1Ajiw
	 Lnr/TI9uTwR51ph/hkymG9ldsRkXdx1eHZR7Py/oMqC1V/n8vHEoNSmNILwmu3TlU0
	 VvXZGy1YT8xJG8p4WhPHHYcgsC2/6Tg5SsRYW2v3wHf0i49ysM2wo+fLU+MODGh9L7
	 Y9+42Xo3DlZXcJ/jskLPI9iwxQ+zH+PA0qmx/qpua2EURtnbCV4hddjZn6ux3JALKo
	 GNmyp2UOUqmvQ==
Date: Thu, 24 Mar 2022 17:30:23 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Jan Beulich <jbeulich@suse.com>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    xen-devel@lists.xenproject.org, jgross@suse.com, Bertrand.Marquis@arm.com, 
    julien@xen.org, Volodymyr_Babchuk@epam.com, 
    Luca Miccio <lucmiccio@gmail.com>, 
    Stefano Stabellini <stefano.stabellini@xilinx.com>, 
    Andrew Cooper <andrew.cooper3@citrix.com>, 
    George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>, 
    "Daniel P. Smith" <dpsmith.dev@gmail.com>
Subject: Re: [PATCH v3 2/5] xen: make evtchn_alloc_unbound public
In-Reply-To: <c57dc9a9-e2ca-74c6-4fde-e2a6f1400de5@suse.com>
Message-ID: <alpine.DEB.2.22.394.2203241522510.2910984@ubuntu-linux-20-04-desktop>
References: <alpine.DEB.2.22.394.2201281330520.27308@ubuntu-linux-20-04-desktop> <20220128213307.2822078-2-sstabellini@kernel.org> <2f05e63a-96c3-e78f-f7e4-36fd17fcd58c@gmail.com> <alpine.DEB.2.22.394.2203221711110.2910984@ubuntu-linux-20-04-desktop>
 <c57dc9a9-e2ca-74c6-4fde-e2a6f1400de5@suse.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Wed, 23 Mar 2022, Jan Beulich wrote:
> On 23.03.2022 01:22, Stefano Stabellini wrote:
> > On Tue, 15 Mar 2022, Daniel P. Smith wrote:
> >> On 1/28/22 16:33, Stefano Stabellini wrote:
> >>> From: Luca Miccio <lucmiccio@gmail.com>
> >>>
> >>> The xenstore event channel will be allocated for dom0less domains. It is
> >>> necessary to have access to the evtchn_alloc_unbound function to do
> >>> that, so make evtchn_alloc_unbound public.
> >>>
> >>> Add a skip_xsm parameter to allow disabling the XSM check in
> >>> evtchn_alloc_unbound (xsm_evtchn_unbound wouldn't work for a call
> >>> originated from Xen before running any domains.)
> >>>
> >>> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
> >>> Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
> >>> CC: Julien Grall <julien@xen.org>
> >>> CC: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
> >>> CC: Bertrand Marquis <bertrand.marquis@arm.com>
> >>> CC: Andrew Cooper <andrew.cooper3@citrix.com>
> >>> CC: George Dunlap <george.dunlap@citrix.com>
> >>> CC: Jan Beulich <jbeulich@suse.com>
> >>> CC: Wei Liu <wl@xen.org>
> >>> ---
> >>> Changes v3:
> >>> - expose evtchn_alloc_unbound, assing a skip_xsm parameter
> >>> ---
> >>>  xen/common/event_channel.c | 13 ++++++++-----
> >>>  xen/include/xen/event.h    |  3 +++
> >>>  2 files changed, 11 insertions(+), 5 deletions(-)
> >>>
> >>> diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c
> >>> index da88ad141a..be57d00a15 100644
> >>> --- a/xen/common/event_channel.c
> >>> +++ b/xen/common/event_channel.c
> >>> @@ -284,7 +284,7 @@ void evtchn_free(struct domain *d, struct evtchn *chn)
> >>>      xsm_evtchn_close_post(chn);
> >>>  }
> >>>  
> >>> -static int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
> >>> +int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc, bool skip_xsm)
> >>>  {
> >>>      struct evtchn *chn;
> >>>      struct domain *d;
> >>> @@ -301,9 +301,12 @@ static int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
> >>>          ERROR_EXIT_DOM(port, d);
> >>>      chn = evtchn_from_port(d, port);
> >>>  
> >>> -    rc = xsm_evtchn_unbound(XSM_TARGET, d, chn, alloc->remote_dom);
> >>> -    if ( rc )
> >>> -        goto out;
> >>> +    if ( !skip_xsm )
> >>> +    {
> >>> +        rc = xsm_evtchn_unbound(XSM_TARGET, d, chn, alloc->remote_dom);
> >>> +        if ( rc )
> >>> +            goto out;
> >>> +    }
> >>
> >> Please do not subvert the security framework because it causes an
> >> inconvenience. As Jan recommended, work within the XSM check to allow
> >> your access so that we may ensure it is done safely. If you need any
> >> help making modifications to XSM, please do not hesitate to reach out as
> >> I will gladly help.
> > 
> > Thank you!
> > 
> > First let me reply to Jan: this series is only introducing 1 more call
> > to evtchn_alloc_unbound, which is to allocate the special xenstore event
> > channel, the one configured via
> > d->arch.hvm.params[HVM_PARAM_STORE_EVTCHN].
> > 
> > It is not meant to be a generic function, and it is not meant to be
> > called more than once. It could (should?) be __init.
> 
> How that? Its pre-existing use doesn't disappear, and requires it to be
> non-__init.

Sorry I meant the new function (calling get_free_port) for the new
use-case could be __init. The new function could be added to
xen/common/event_channel.c or to xen/arch/arm/domain_build.c.


> > The existing XSM check in evtchn_alloc_unbound cannot work and should
> > not work: it is based on the current domain having enough privileges to
> > create the event channel. In this case, we have no current domain at
> > all. The current domain is Xen itself.
> 
> And DOM_XEN cannot be given the appropriate permission, perhaps
> explicitly when using a real policy and by default in dummy and SILO
> modes?

The issue is that the check is based on "current", not one of the
domains passed as an argument to evtchn_alloc_unbound. Otherwise,
passing DOMID_XEN would be straightforward.

We would need to use a hack (like Daniel wrote in the other email) to
set the idle_domain temporarily as a privileged domain only for the sake
of passing an irrelevant (irrelevant as in "not relevant to this case")
XSM check. That cannot be an improvement. Also, setting current to a
"fake" domain is not great either.

In the specific case of dom0less and this patch, this is the only
instance of this issue and could be solved very straightforwardly by
calling get_free_port directly as we discussed [1].

I know Julien had some reservations about that. Let's try to find a
technical solution that makes everyone happy.

Maybe, instead of exporting get_free_port, we could create a new
function in xen/common/event_channel.c and mark it as __init? This way:
- we don't need to expose get_free_port
- the new function would only be __init anyway, so no risk of runtime
  misuse

What do you think?

[1] https://marc.info/?l=xen-devel&m=164197327305903


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 01:01:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 01:01:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294534.500865 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXYK4-0007OH-LU; Fri, 25 Mar 2022 01:01:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294534.500865; Fri, 25 Mar 2022 01:01:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXYK4-0007NL-Hd; Fri, 25 Mar 2022 01:01:00 +0000
Received: by outflank-mailman (input) for mailman id 294534;
 Fri, 25 Mar 2022 01:00:58 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LYjy=UE=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nXYK2-0006LN-ID
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 01:00:58 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 075dd4b6-abd7-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 02:00:57 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 90F5AB81DE2;
 Fri, 25 Mar 2022 01:00:56 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0ABC1C340EC;
 Fri, 25 Mar 2022 01:00:55 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 075dd4b6-abd7-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1648170055;
	bh=KejYKJaCYlyX4o30HHgdsNYj5chlo4v76HCeZ/X8/LI=;
	h=From:To:Cc:Subject:Date:From;
	b=aPxareYbgpipXvcAznJwm4b8Wt8ZEXvbAYTLMXSBR0NsIK4U7+SBQYC2bphox6iie
	 AuJvrrdXmrPui4FlBoCiCgNWzzRfhoI5ppiEaNZim1kpoLJAc7Ir/T4fn2KGid3gaI
	 t9A4uMYsIeqvGQK8+UFW9Lgm7Ch5cvzT7cwgOFSmAxL+ygHSADg2Yvj8eAgk6nOIIK
	 EL602/toRpGuJv2u+XffuMU3ycTpDAQYVaiOR70z5B0CppYrR9GsssGoYDLHdAhYXw
	 QBZAgSnsyhdHeEUYS/8iBJDtC2r1EG/y82C3e+MHMdbtZkeIbUc+Fv+njiTwl0PfS0
	 Q8Ph31baNeAkQ==
From: Stefano Stabellini <sstabellini@kernel.org>
To: xen-devel@lists.xenproject.org
Cc: julien@xen.org,
	sstabellini@kernel.org,
	bertrand.marquis@arm.com,
	Volodymyr_Babchuk@epam.com,
	Stefano Stabellini <stefano.stabellini@xilinx.com>
Subject: [PATCH] xen/arm: set CPSR Z bit when creating aarch32 guests
Date: Thu, 24 Mar 2022 18:00:52 -0700
Message-Id: <20220325010052.1597420-1-sstabellini@kernel.org>
X-Mailer: git-send-email 2.25.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

From: Stefano Stabellini <stefano.stabellini@xilinx.com>

The first 32 bytes of zImage are NOPs. When CONFIG_EFI is enabled in the
kernel, certain versions of Linux will use an UNPREDICATABLE NOP
encoding, sometimes resulting in an unbootable kernel. Whether the
resulting kernel is bootable or not depends on the processor. See commit
a92882a4d270 in the Linux kernel for all the details.

All kernel releases starting from Linux 4.9 without commit a92882a4d270
are affected.

Fortunately there is a simple workaround: setting the "Z" bit in CPSR
make it so those invalid NOP instructions are never executed. That is
because the instruction is conditional (not equal). So, on QEMU at
least, the instruction will end up to be ignored and not generate an
exception. Setting the "Z" bit makes those kernel versions bootable
again and it is harmless in the other cases.

Note that both U-Boot and QEMU -kernel set the "Z" bit in CPSR when
booting a zImage kernel on aarch32.

Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
---
Changes in v3:
- improve commit message
- improve in-code comment

Changes in v2:
- improve commit message
- add in-code comment
- move PSR_Z to the beginning
---
 xen/include/public/arch-arm.h | 11 ++++++++++-
 1 file changed, 10 insertions(+), 1 deletion(-)

diff --git a/xen/include/public/arch-arm.h b/xen/include/public/arch-arm.h
index 94b31511dd..c0c1149e27 100644
--- a/xen/include/public/arch-arm.h
+++ b/xen/include/public/arch-arm.h
@@ -361,6 +361,7 @@ typedef uint64_t xen_callback_t;
 #define PSR_DBG_MASK    (1<<9)        /* arm64: Debug Exception mask */
 #define PSR_IT_MASK     (0x0600fc00)  /* Thumb If-Then Mask */
 #define PSR_JAZELLE     (1<<24)       /* Jazelle Mode */
+#define PSR_Z           (1<<30)       /* Zero condition flag */
 
 /* 32 bit modes */
 #define PSR_MODE_USR 0x10
@@ -383,7 +384,15 @@ typedef uint64_t xen_callback_t;
 #define PSR_MODE_EL1t 0x04
 #define PSR_MODE_EL0t 0x00
 
-#define PSR_GUEST32_INIT  (PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MODE_SVC)
+/*
+ * We set PSR_Z to be able to boot Linux kernel versions with an invalid
+ * encoding of the first 8 NOP instructions. See commit a92882a4d270 in
+ * Linux.
+ *
+ * Note that PSR_Z is also set by U-Boot and QEMU -kernel when loading
+ * zImage kernels on aarch32.
+ */
+#define PSR_GUEST32_INIT  (PSR_Z|PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MODE_SVC)
 #define PSR_GUEST64_INIT (PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MODE_EL1h)
 
 #define SCTLR_GUEST_INIT    xen_mk_ullong(0x00c50078)
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 25 01:11:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 01:11:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294538.500875 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXYTx-0000ql-OZ; Fri, 25 Mar 2022 01:11:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294538.500875; Fri, 25 Mar 2022 01:11:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXYTx-0000qe-Lc; Fri, 25 Mar 2022 01:11:13 +0000
Received: by outflank-mailman (input) for mailman id 294538;
 Fri, 25 Mar 2022 01:11:12 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=R2Zm=UE=invisiblethingslab.com=demi@srs-se1.protection.inumbo.net>)
 id 1nXYTw-0000qX-1f
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 01:11:12 +0000
Received: from wout1-smtp.messagingengine.com (wout1-smtp.messagingengine.com
 [64.147.123.24]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 71e6a276-abd8-11ec-a405-831a346695d4;
 Fri, 25 Mar 2022 02:11:07 +0100 (CET)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41])
 by mailout.west.internal (Postfix) with ESMTP id 4E89432003F4;
 Thu, 24 Mar 2022 21:11:04 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163])
 by compute1.internal (MEProxy); Thu, 24 Mar 2022 21:11:04 -0400
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Thu,
 24 Mar 2022 21:11:03 -0400 (EDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 71e6a276-abd8-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:cc:content-type:date:date:from:from
	:in-reply-to:in-reply-to:message-id:mime-version:references
	:reply-to:sender:subject:subject:to:to:x-me-proxy:x-me-proxy
	:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=qy1je2wHE7rcoXAAM
	bkE3sSSi0Eki/j1x1kFMjjkD6o=; b=CVt3Mqrud5pgDMKnROB+hnFed23DW311/
	nmeARH305wXp6YQHlN8VzU4cWy1RH6yFco0Qe2EHloE2H9/9J6yCQ7r9S4iKujAo
	UyEB74p1/evxlz1FpJOfJXtzEY1Sl5wLl6KHncEiwfBlDaI30iJFLR/tqHyVHO4b
	HjpdO407kJt5giGICgrEHTEfp5mgonjllM/qg2eq3OXKfhcZ0R7kPOz0rMs/qSsQ
	b0X3BEqPrPbsoagbdD7Q/VFx3YUlmH+2V+r7TTzBL2H6FP8hhOxR/P5ZSWCJ4y6G
	X6oXnkdR9vnUZSYczIY1oVMVxQ+Oa9HPBe64QjUvhYO+/G+l3t20g==
X-ME-Sender: <xms:pxY9Yrz6rF7fbk2YZuO0XbFaN6IEVf385VBM7jkf5vg3eictngh8DA>
    <xme:pxY9YjTGMS76cnGvcFQ2mH4Boxf3SUepMt8bfK4j9oh7iLHHw8Ez5yxklepE4qD0s
    kO76ngmUDi84qk>
X-ME-Received: <xmr:pxY9YlV0lCr7-BW0_S3-xlBrXphXJpOZtDo7I1w9ID12Ck_UpqehOE-_dXn6yDgAIs9Eow>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddrudehtddgvdehucetufdoteggodetrfdotf
    fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen
    uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne
    cujfgurhepkfffgggfvfhfhffujggtsehgtderredtfeejnecuhfhrohhmpeffvghmihcu
    ofgrrhhivgcuqfgsvghnohhurhcuoeguvghmihesihhnvhhishhisghlvghthhhinhhgsh
    hlrggsrdgtohhmqeenucggtffrrghtthgvrhhnpeetkeeuledvgeetteeugedtueeuieeg
    kedtleejueejiefgheeuvefhieekleeugfenucffohhmrghinhepohhpvghnsghsugdroh
    hrghenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpegu
    vghmihesihhnvhhishhisghlvghthhhinhhgshhlrggsrdgtohhm
X-ME-Proxy: <xmx:pxY9YlhS-bo95PNHfoPKDm-T2xyaq4NeZAy5s1o5oVUYQhVCWngXcg>
    <xmx:pxY9YtDjhhHxHzPUI89wjca6ulhub1P-c1kv22WGW4OUF1CtvRUwOQ>
    <xmx:pxY9YuJ7wosIY_7KroKiQnyt7x8Cv8Zr6zwNm4qmVZLG4v5ksAVFMQ>
    <xmx:pxY9Ygrn-XR1rR9DjzQYXR7NGZliRAnQGuVGIpS7Hoya5ULitpg1jA>
Message-ID: <5e090f73-3a44-04a4-3668-da9c3dcd2fb9@invisiblethingslab.com>
Date: Thu, 24 Mar 2022 21:10:57 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?=
 <marmarek@invisiblethingslab.com>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Xen developer discussion <xen-devel@lists.xenproject.org>
References: <Yjx4kNv7hG4FGGot@itl-email> <Yjx8G5tH4Xf8+oVx@Air-de-Roger>
 <f101f6f6-d6d3-4877-20a4-ebae0130c756@invisiblethingslab.com>
 <Yjzu0Zz8HCu/9mFg@mail-itl>
From: Demi Marie Obenour <demi@invisiblethingslab.com>
Subject: Re: Support status of OpenBSD frontend drivers
In-Reply-To: <Yjzu0Zz8HCu/9mFg@mail-itl>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------PoUmuUBDnHzvcxyRaRH0vT4t"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------PoUmuUBDnHzvcxyRaRH0vT4t
Content-Type: multipart/mixed; boundary="------------JMoaeeVQb0i1dFscBYxiV0Qv";
 protected-headers="v1"
From: Demi Marie Obenour <demi@invisiblethingslab.com>
To: =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?=
 <marmarek@invisiblethingslab.com>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Xen developer discussion <xen-devel@lists.xenproject.org>
Message-ID: <5e090f73-3a44-04a4-3668-da9c3dcd2fb9@invisiblethingslab.com>
Subject: Re: Support status of OpenBSD frontend drivers
References: <Yjx4kNv7hG4FGGot@itl-email> <Yjx8G5tH4Xf8+oVx@Air-de-Roger>
 <f101f6f6-d6d3-4877-20a4-ebae0130c756@invisiblethingslab.com>
 <Yjzu0Zz8HCu/9mFg@mail-itl>
In-Reply-To: <Yjzu0Zz8HCu/9mFg@mail-itl>

--------------JMoaeeVQb0i1dFscBYxiV0Qv
Content-Type: multipart/mixed; boundary="------------qmaQyeSdHPjIeNbgNYUMxr8J"

--------------qmaQyeSdHPjIeNbgNYUMxr8J
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 3/24/22 18:21, Marek Marczykowski-G=C3=B3recki wrote:
> On Thu, Mar 24, 2022 at 11:49:14AM -0400, Demi Marie Obenour wrote:
>> On 3/24/22 10:11, Roger Pau Monn=C3=A9 wrote:
>>> On Thu, Mar 24, 2022 at 09:56:29AM -0400, Demi Marie Obenour wrote:
>>>> As per private discussion with Theo de Raadt, OpenBSD does not consi=
der
>>>> bugs in its xnf(4) that allow a backend to cause mischief to be secu=
rity
>>>> issues.  I believe the same applies to its xbf(4).  Should the suppo=
rt
>>>> document be updated?
>>>
>>> I think that's already reflected in the support document:
>>>
>>> 'Status, OpenBSD: Supported, Security support external'
>>>
>>> Since the security support is external it's my understanding OpenBSD
>>> security team gets to decide what's a security issue and what is not.=

>>>
>>> That however creates differences in the level of support offered by
>>> the different OSes, but I think that's unavoidable. It's also hard to=

>>> track the status here because those are external components in
>>> separate code bases.
>>>
>>> Could be added as a mention together with the Windows note about
>>> frontends trusting backends, but then I would fear this is likely to
>>> get out of sync if OpenBSD ever changes their frontends to support
>>> untrusted backends (even if not considered as a security issue).
>>
>> As a Qubes OS developer, I still think this is useful information and
>> should be documented.  For instance, if I choose to add proper OpenBSD=

>> guest support to Qubes OS (as opposed to the current =E2=80=9Cyou can =
run
>> anything in an HVM=E2=80=9D situation), I might decide to have OpenBSD=

>> guests use devices emulated by a Linux-based stubdomain, since the
>> stubdomain=E2=80=99s netfront and blkfront drivers *are* security-supp=
orted
>> against malicious backends.  I might also choose to have a warning in
>> the GUI when switching the NetVM of an OpenBSD guest to something othe=
r
>> than the empty string (meaning no network access) or the (normally
>> fairly trusted) sys-firewall or sys-whonix qubes.
>=20
> I'm with Roger on this - when security support is external, such
> information in xen.git could easily become stale. If anything, there
> could be a link to OpenBSD security status info, maintained by whoever
> such support provides.

This ought to be on https://man.openbsd.org/xnf.4 and
https://man.openbsd.org/xbf.4, but it is not.  Should I send a patch?
--=20
Sincerely,
Demi Marie Obenour (she/her/hers)
Invisible Things Lab
--------------qmaQyeSdHPjIeNbgNYUMxr8J
Content-Type: application/pgp-keys; name="OpenPGP_0xB288B55FFF9C22C1.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB288B55FFF9C22C1.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----

xsFNBFp+A0oBEADffj6anl9/BHhUSxGTICeVl2tob7hPDdhHNgPR4C8xlYt5q49y
B+l2nipdaq+4Gk6FZfqC825TKl7eRpUjMriwle4r3R0ydSIGcy4M6eb0IcxmuPYf
bWpr/si88QKgyGSVZ7GeNW1UnzTdhYHuFlk8dBSmB1fzhEYEk0RcJqg4AKoq6/3/
UorR+FaSuVwT7rqzGrTlscnTDlPWgRzrQ3jssesI7sZLm82E3pJSgaUoCdCOlL7M
MPCJwI8JpPlBedRpe9tfVyfu3euTPLPxwcV3L/cfWPGSL4PofBtB8NUU6QwYiQ9H
zx4xOyn67zW73/G0Q2vPPRst8LBDqlxLjbtx/WLR6h3nBc3eyuZ+q62HS1pJ5EvU
T1vjyJ1ySrqtUXWQ4XlZyoEFUfpJxJoN0A9HCxmHGVckzTRl5FMWo8TCniHynNXs
BtDQbabt7aNEOaAJdE7to0AH3T/Bvwzcp0ZJtBk0EM6YeMLtotUut7h2Bkg1b//r
6bTBswMBXVJ5H44Qf0+eKeUg7whSC9qpYOzzrm7+0r9F5u3qF8ZTx55TJc2g656C
9a1P1MYVysLvkLvS4H+crmxA/i08Tc1h+x9RRvqba4lSzZ6/Tmt60DPM5Sc4R0nS
m9BBff0Nm0bSNRS8InXdO1Aq3362QKX2NOwcL5YaStwODNyZUqF7izjK4QARAQAB
zTxEZW1pIE1hcmllIE9iZW5vdXIgKGxvdmVyIG9mIGNvZGluZykgPGRlbWlvYmVu
b3VyQGdtYWlsLmNvbT7CwXgEEwECACIFAlp+A0oCGwMGCwkIBwMCBhUIAgkKCwQW
AgMBAh4BAheAAAoJELKItV//nCLBhr8QAK/xrb4wyi71xII2hkFBpT59ObLN+32F
QT7R3lbZRjVFjc6yMUjOb1H/hJVxx+yo5gsSj5LS9AwggioUSrcUKldfA/PKKai2
mzTlUDxTcF3vKx6iMXKA6AqwAw4B57ZEJoMM6egm57TV19kzPMc879NV2nc6+ela
Kl+/kbVeD3qvBuEwsTe2Do3HAAdrfUG/j9erwIk6gha/Hp9yZlCnPTX+VK+xifQq
t8RtMqS5R/S8z0msJMI/ajNU03kFjOpqrYziv6OZLJ5cuKb3bZU5aoaRQRDzkFIR
6aqtFLTohTo20QywXwRa39uFaOT/0YMpNyel0kdOszFOykTEGI2u+kja35g9TkH9
0kkBTG+aEWttIht0Hy6YFmwjcAxisSakBuHnHuMSOiyRQLu43ej2+mDWgItLZ48M
u0C3IG1seeQDjEYPtqvyZ6bGkf2Vj+L6wLoLLIhRZxQOedqArIk/Sb2SzQYuxN44
IDRt+3ZcDqsPppoKcxSyd1Ny2tpvjYJXlfKmOYLhTWs8nwlAlSHX/c/jz/ywwf7e
SvGknToo1Y0VpRtoxMaKW1nvH0OeCSVJitfRP7YbiRVc2aNqWPCSgtqHAuVraBRb
AFLKh9d2rKFB3BmynTUpc1BQLJP8+D5oNyb8Ts4xXd3iV/uD8JLGJfYZIR7oGWFL
P4uZ3tkneDfYzTxEZW1pIE9iZW5vdXIgKElUTCBFbWFpbCBLZXkpIDxhdGhlbmFA
aW52aXNpYmxldGhpbmdzbGFiLmNvbT7CwY4EEwEIADgWIQR2h02fEza6IlkHHHGy
iLVf/5wiwQUCX6YJvQIbAwULCQgHAgYVCgkICwIEFgIDAQIeAQIXgAAKCRCyiLVf
/5wiwWRhD/0YR+YYC5Kduv/2LBgQJIygMsFiRHbR4+tWXuTFqgrxxFSlMktZ6gQr
QCWe38WnOXkBoY6n/5lSJdfnuGd2UagZ/9dkaGMUkqt+5WshLFly4BnP7pSsWReK
gMP7etRTwn3Szk1OwFx2lzY1EnnconPLfPBc6rWG2moA6l0WX+3WNR1B1ndqpl2h
PSjT2jUCBWDVrGOUSX7r5f1WgtBeNYnEXPBCUUM51pFGESmfHIXQrqFDA7nBNiIV
FDJTmQzuEqIyJl67pKNgooij5mKzRhFKHfjLRAH4mmWZlB9UjDStAfFBAoDFHwd1
HL5VQCNQdqEc/9lZDApqWuCPadZN+pGouqLysesIYsNxUhJ7dtWOWHl0vs7/3qkW
mWun/2uOJMQhra2u8nA9g91FbOobWqjrDd6x3ZJoGQf4zLqjmn/P514gb697788e
573WN/MpQ5XIFl7aM2d6/GJiq6LC9T2gSUW4rbPBiqOCeiUx7Kd/sVm41p9TOA7f
EG4bYddCfDsNxaQJH6VRK3NOuBUGeL+iQEVF5Xs6Yp+U+jwvv2M5Lel3EqAYo5xX
Tx4ls0xaxDCufudcAh8CMMqx3fguSb7Mi31WlnZpk0fDuWQVNKyDP7lYpwc4nCCG
NKCj622ZSocHAcQmX28L8pJdLYacv9pU3jPy4fHcQYvmTavTqowGnM1ARGVtaSBN
YXJpZSBPYmVub3VyIChJVEwgRW1haWwgS2V5KSA8ZGVtaUBpbnZpc2libGV0aGlu
Z3NsYWIuY29tPsLBjgQTAQgAOBYhBHaHTZ8TNroiWQcccbKItV//nCLBBQJgOEV+
AhsDBQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAAAoJELKItV//nCLBKwoP/1WSnFdv
SAD0g7fD0WlF+oi7ISFT7oqJnchFLOwVHK4Jg0e4hGn1ekWsF3Ha5tFLh4V/7UUu
obYJpTfBAA2CckspYBqLtKGjFxcaqjjpO1I2W/jeNELVtSYuCOZICjdNGw2Hl9yH
KRZiBkqc9u8lQcHDZKq4LIpVJj6ZQV/nxttDX90ax2No1nLLQXFbr5wb465LAPpU
lXwunYDij7xJGye+VUASQh9datye6orZYuJvNo8Tr3mAQxxkfR46LzWgxFCPEAZJ
5P56Nc0IMHdJZj0Uc9+1jxERhOGppp5jlLgYGK7faGB/jTV6LaRQ4Ad+xiqokDWp
mUOZsmA+bMbtPfYjDZBz5mlyHcIRKIFpE1l3Y8F7PhJuzzMUKkJi90CYakCV4x/a
Zs4pzk5E96c2VQx01RIEJ7fzHF7lwFdtfTS4YsLtAbQFsKayqwkGcVv2B1AHeqdo
TMX+cgDvjd1ZganGlWA8Sv9RkNSMchn1hMuTwERTyFTr2dKPnQdA1F480+jUap41
ClXgn227WkCIMrNhQGNyJsnwyzi5wS8rBVRQ3BOTMyvGM07j3axUOYaejEpg7wKi
wTPZGLGH1sz5GljD/916v5+v2xLbOo5606j9dWf5/tAhbPuqrQgWv41wuKDi+dDD
EKkODF7DHes8No+QcHTDyETMn1RYm7t0RKR4zsFNBFp+A0oBEAC9ynZI9LU+uJkM
eEJeJyQ/8VFkCJQPQZEsIGzOTlPnwvVna0AS86n2Z+rK7R/usYs5iJCZ55/JISWd
8xD57ue0eB47bcJvVqGlObI2DEG8TwaW0O0duRhDgzMEL4t1KdRAepIESBEA/iPp
I4gfUbVEIEQuqdqQyO4GAe+MkD0Hy5JH/0qgFmbaSegNTdQg5iqYjRZ3ttiswalq
l1/iSyv1WYeC1OAs+2BLOAT2NEggSiVOtxEfgewsQtCWi8H1SoirakIfo45Hz0tk
/Ad9ZWh2PvOGt97Ka85o4TLJxgJJqGEnqcFUZnJJriwoaRIS8N2C8/nEM53jb1sH
0gYddMU3QxY7dYNLIUrRKQeNkF30dK7V6JRH7pleRlf+wQcNfRAIUrNlatj9Txwi
vQrKnC9aIFFHEy/0mAgtrQShcMRmMgVlRoOA5B8RTulRLCmkafvwuhs6dCxN0GNA
ORIVVFxjx9Vn7OqYPgwiofZ6SbEl0hgPyWBQvE85klFLZLoj7p+joDY1XNQztmfA
rnJ9x+YV4igjWImINAZSlmEcYtd+xy3Li/8oeYDAqrsnrOjb+WvGhCykJk4urBog
2LNtcyCjkTs7F+WeXGUo0NDhbd3Z6AyFfqeF7uJ3D5hlpX2nI9no/ugPrrTVoVZA
grrnNz0iZG2DVx46x913pVKHl5mlYQARAQABwsFfBBgBAgAJBQJafgNKAhsMAAoJ
ELKItV//nCLBwNIP/AiIHE8boIqReFQyaMzxq6lE4YZCZNj65B/nkDOvodSiwfwj
jVVE2V3iEzxMHbgyTCGA67+Bo/d5aQGjgn0TPtsGzelyQHipaUzEyrsceUGWYoKX
YyVWKEfyh0cDfnd9diAm3VeNqchtcMpoehETH8frRHnJdBcjf112PzQSdKC6kqU0
Q196c4Vp5HDOQfNiDnTf7gZSj0BraHOByy9LEDCLhQiCmr+2E0rW4tBtDAn2HkT9
uf32ZGqJCn1O+2uVfFhGu6vPE5qkqrbSE8TG+03H8ecU2q50zgHWPdHMOBvy3Ehz
fAh2VmOSTcRK+tSUe/u3wdLRDPwv/DTzGI36Kgky9MsDC5gpIwNbOJP2G/q1wT1o
Gkw4IXfWv2ufWiXqJ+k7HEi2N1sree7Dy9KBCqb+ca1vFhYPDJfhP75I/VnzHVss
Z/rYZ9+51yDoUABoNdJNSGUYl+Yh9Pw9pE3Kt4EFzUlFZWbE4xKL/NPno+z4J9aW
emLLszcYz/u3XnbOvUSQHSrmfOzX3cV4yfmjM5lewgSstoxGyTx2M8enslgdXhPt
hZlDnTnOT+C+OTsh8+m5tos8HQjaPM01MKBiAqdPgksm1wu2DrrwUi6ChRVTUBcj
6+/9IJ81H2P2gJk3Ls3AVIxIffLoY34E+MYSfkEjBz0E8CLOcAw7JIwAaeBT
=3Dx+Ro
-----END PGP PUBLIC KEY BLOCK-----

--------------qmaQyeSdHPjIeNbgNYUMxr8J--

--------------JMoaeeVQb0i1dFscBYxiV0Qv--

--------------PoUmuUBDnHzvcxyRaRH0vT4t
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----
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=Wg5z
-----END PGP SIGNATURE-----

--------------PoUmuUBDnHzvcxyRaRH0vT4t--


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 01:15:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 01:15:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294541.500887 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXYYH-0001Vi-BM; Fri, 25 Mar 2022 01:15:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294541.500887; Fri, 25 Mar 2022 01:15:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXYYH-0001Vb-7D; Fri, 25 Mar 2022 01:15:41 +0000
Received: by outflank-mailman (input) for mailman id 294541;
 Fri, 25 Mar 2022 01:15:40 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=rHzJ=UE=arm.com=Wei.Chen@srs-se1.protection.inumbo.net>)
 id 1nXYYF-0001Ty-KH
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 01:15:40 +0000
Received: from EUR02-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur02on0623.outbound.protection.outlook.com
 [2a01:111:f400:fe06::623])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 12f5f67a-abd9-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 02:15:36 +0100 (CET)
Received: from DB8PR06CA0065.eurprd06.prod.outlook.com (2603:10a6:10:120::39)
 by HE1PR0802MB2604.eurprd08.prod.outlook.com (2603:10a6:3:db::19)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.18; Fri, 25 Mar
 2022 01:15:29 +0000
Received: from DB5EUR03FT046.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:120:cafe::33) by DB8PR06CA0065.outlook.office365.com
 (2603:10a6:10:120::39) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17 via Frontend
 Transport; Fri, 25 Mar 2022 01:15:29 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT046.mail.protection.outlook.com (10.152.21.230) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Fri, 25 Mar 2022 01:15:29 +0000
Received: ("Tessian outbound 2877e54fe176:v113");
 Fri, 25 Mar 2022 01:15:29 +0000
Received: from 90f0a7db4440.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 B5F21F0D-B020-42E0-97FA-4C70859EA98A.1; 
 Fri, 25 Mar 2022 01:15:18 +0000
Received: from EUR03-DB5-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 90f0a7db4440.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 25 Mar 2022 01:15:18 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com (2603:10a6:102:2b9::9)
 by VE1PR08MB5680.eurprd08.prod.outlook.com (2603:10a6:800:1a6::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.18; Fri, 25 Mar
 2022 01:15:16 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::f9fc:3a4:39ac:a50e]) by PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::f9fc:3a4:39ac:a50e%6]) with mapi id 15.20.5081.022; Fri, 25 Mar 2022
 01:15:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 12f5f67a-abd9-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=0dX27DKEPaiKnQfPIkyQfAh1VAgGNR8eH2Uq0cQyTuI=;
 b=IlDRWf8ROgqL1dUj9bq/BeUCvMH1OdFl6s6PmcwRpBZBOZEgUV/cH4xdQuZEIYC2OmlD8E2LwSRivl7ODsOy1zE75+oyEixTSi+5WBDjBD1WDfA8uTpOgvtDEosk28AeRCXMG0Y3Q/9FFNroFE97t9xGKpdEHCYfDI1BmW1bNcw=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=mtbw1yEEeYDpqAUq/1spt9KtqgFxCmDot+AoZJt7txgQohGJvGINd7aCjjDMyT6ij2qcXqFSwzwCcI/3aBRrgzSwzRAs5F0v9hhPkoxF54CjbeaIqMdTRH3dnFjksko2Y3/EzEhAOrwBKgIwTut3eQOdH2LCeV159DavvyqceWr+5dj3wVggHTpeiEVlDKQAtk6Wx4dR/Jy4i2sYWyZPq3XLoV4Yym65lHvOeZv71V/n+ELb+JDWydNHlPtahoqJsz7QxXBjlorWjD4AbiKDlCrwzXh1uGisk/b51oZzaCRvjWQfeJlBZz2+gMJkEAn5A5jxg9/GX8mvqmRy2M0vAQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=0dX27DKEPaiKnQfPIkyQfAh1VAgGNR8eH2Uq0cQyTuI=;
 b=EQ+XoRao9TywG4qFtXzUTU1t3d3rhfLP6H20WcaViLwTPQYWELN7/GpwVaGP+xzxlcFRnO+cESjChMXMkUij20Slt+IEk5XfnAMx4nKRuglDbrob8kAjYPWGIXQy3eAEMXtt6l3tFn0jGR47Y2McqcRvJBz17PCcZGbp7HVgU9yt2g779a9szXMRDxQ73NdzxX6f51XvdXflZnQSXs9VFfDJlObRKXXNcmjEl45wGzuLVI86B1FqXu7OBs2rkluqq3l0VDsa+Eu03m5Y0m4w201dLQuvX6tk8A4fzS/ln3j2osDijHEvo3CxRn5qN4hXDuP7PVzrgN1MjQOca43F7Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=0dX27DKEPaiKnQfPIkyQfAh1VAgGNR8eH2Uq0cQyTuI=;
 b=IlDRWf8ROgqL1dUj9bq/BeUCvMH1OdFl6s6PmcwRpBZBOZEgUV/cH4xdQuZEIYC2OmlD8E2LwSRivl7ODsOy1zE75+oyEixTSi+5WBDjBD1WDfA8uTpOgvtDEosk28AeRCXMG0Y3Q/9FFNroFE97t9xGKpdEHCYfDI1BmW1bNcw=
From: Wei Chen <Wei.Chen@arm.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	"julien@xen.org" <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>
CC: Bertrand Marquis <Bertrand.Marquis@arm.com>, Penny Zheng
	<Penny.Zheng@arm.com>
Subject: Proposal for Porting Xen to Armv8-R64 - DraftB
Thread-Topic: Proposal for Porting Xen to Armv8-R64 - DraftB
Thread-Index: Adg/5aAUG5Xb47xpSru14p+HpAimXg==
Date: Fri, 25 Mar 2022 01:15:15 +0000
Message-ID:
 <PAXPR08MB742064F5F00A18E09DEF66B69E1A9@PAXPR08MB7420.eurprd08.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 4022E2061FAC4046B149CD2ACFBC6D01.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 11396111-bc48-483c-981a-08da0dfcf34f
x-ms-traffictypediagnostic:
	VE1PR08MB5680:EE_|DB5EUR03FT046:EE_|HE1PR0802MB2604:EE_
X-Microsoft-Antispam-PRVS:
	<HE1PR0802MB26045715327C77C639EDA8CE9E1A9@HE1PR0802MB2604.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAXPR08MB7420.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(55016003)(316002)(76116006)(66476007)(66946007)(66556008)(38070700005)(64756008)(186003)(26005)(66446008)(4326008)(8676002)(71200400001)(52536014)(2906002)(508600001)(8936002)(122000001)(5660300002)(30864003)(110136005)(54906003)(9686003)(38100700002)(83380400001)(86362001)(6506007)(33656002)(7696005)(21314003)(579004)(559001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR08MB5680
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT046.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	9275d001-b4a3-41ab-5ae3-08da0dfceb97
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(9686003)(55016003)(47076005)(36860700001)(6506007)(52536014)(4326008)(70206006)(316002)(8676002)(70586007)(186003)(26005)(82310400004)(83380400001)(336012)(86362001)(7696005)(81166007)(30864003)(33656002)(356005)(2906002)(40460700003)(508600001)(54906003)(8936002)(5660300002)(110136005)(21314003)(579004);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 01:15:29.1189
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 11396111-bc48-483c-981a-08da0dfcf34f
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT046.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0802MB2604

# Proposal for Porting Xen to Armv8-R64

This proposal will introduce the PoC work of porting Xen to Armv8-R64,
which includes:
- The changes of current Xen capability, like Xen build system, memory
  management, domain management, vCPU context switch.
- The expanded Xen capability, like static-allocation and direct-map.

***Notes:***
1. ***This proposal only covers the work of porting Xen to Armv8-R64***
   ***single CPU.Xen SMP support on Armv8-R64 relates to Armv8-R***
   ***Trusted-Frimware (TF-R). This is an external dependency,***
   ***so we think the discussion of Xen SMP support on Armv8-R64***
   ***should be started when single-CPU support is complete.***
2. ***This proposal will not touch xen-tools. In current stange,***
   ***Xen on Armv8-R64 only support dom0less, all guests should***
   ***be booted from device tree.***

## Changelogs
Draft-A -> Draft-B:
1. Update Kconfig options usage.
2. Update the section for XEN_START_ADDRESS.
3. Add description of MPU initialization before parsing device tree.
4. Remove CONFIG_ARM_MPU_EL1_PROTECTION_REGIONS.
5. Update the description of ioremap_nocache/cache.
6. Update about the free_init_memory on Armv8-R.
7. Describe why we need to switch the MPU configuration later.
8. Add alternative proposal in TODO.
9. Add use tool to generate Xen Armv8-R device tree in TODO.
10. Add Xen PIC/PIE discussion in TODO.
11. Add Xen event channel support in TODO.

## Contributors:
Wei Chen <Wei.Chen@arm.com>
Penny Zheng <Penny.Zheng@arm.com>

## 1. Essential Background

### 1.1. Armv8-R64 Profile
The Armv-R architecture profile was designed to support use cases that
have a high sensitivity to deterministic execution. (e.g. Fuel Injection,
Brake control, Drive trains, Motor control etc)

Arm announced Armv8-R in 2013, it is the latest generation Arm architecture
targeted at the Real-time profile. It introduces virtualization at the high=
est
security level while retaining the Protected Memory System Architecture (PM=
SA)
based on a Memory Protection Unit (MPU). In 2020, Arm announced Cortex-R82,
which is the first Arm 64-bit Cortex-R processor based on Armv8-R64.

- The latest Armv8-R64 document can be found here:
  [Arm Architecture Reference Manual Supplement - Armv8, for Armv8-R AArch6=
4 architecture profile](https://developer.arm.com/documentation/ddi0600/lat=
est/).

- Armv-R Architecture progression:
  Armv7-R -> Armv8-R AArch32 -> Armv8 AArch64
  The following figure is a simple comparison of "R" processors based on
  different Armv-R Architectures.
  ![image](https://drive.google.com/uc?export=3Dview&id=3D1nE5RAXaX8zY2KPZ8=
imBpbvIr2eqBguEB)

- The Armv8-R architecture evolved additional features on top of Armv7-R:
    - An exception model that is compatible with the Armv8-A model
    - Virtualization with support for guest operating systems
        - PMSA virtualization using MPUs In EL2.
- The new features of Armv8-R64 architecture
    - Adds support for the 64-bit A64 instruction set, previously Armv8-R
      only supported A32.
    - Supports up to 48-bit physical addressing, previously up to 32-bit
      addressing was supported.
    - Optional Arm Neon technology and Advanced SIMD
    - Supports three Exception Levels (ELs)
        - Secure EL2 - The Highest Privilege, MPU only, for firmware, hyper=
visor
        - Secure EL1 - RichOS (MMU) or RTOS (MPU)
        - Secure EL0 - Application Workloads
    - Optionally supports Virtual Memory System Architecture at S-EL1/S-EL0=
.
      This means it's possible to run rich OS kernels - like Linux - either
      bare-metal or as a guest.
- Differences with the Armv8-A AArch64 architecture
    - Supports only a single Security state - Secure. There is not Non-Secu=
re
      execution state supported.
    - EL3 is not supported, EL2 is mandatory. This means secure EL2 is the
      highest EL.
    - Supports the A64 ISA instruction
        - With a small set of well-defined differences
    - Provides a PMSA (Protected Memory System Architecture) based
      virtualization model.
        - As opposed to Armv8-A AArch64's VMSA based Virtualization
        - Can support address bits up to 52 if FEAT_LPA is enabled,
          otherwise 48 bits.
        - Determines the access permissions and memory attributes of
          the target PA.
        - Can implement PMSAv8-64 at EL1 and EL2
            - Address translation flat-maps the VA to the PA for EL2 Stage =
1.
            - Address translation flat-maps the VA to the PA for EL1 Stage =
1.
            - Address translation flat-maps the IPA to the PA for EL1 Stage=
 2.
    - PMSA in EL1 & EL2 is configurable, VMSA in EL1 is configurable.

### 1.2. Xen Challenges with PMSA Virtualization
Xen is PMSA unaware Type-1 Hypervisor, it will need modifications to run
with an MPU and host multiple guest OSes.

- No MMU at EL2:
    - No EL2 Stage 1 address translation
        - Xen provides fixed ARM64 virtual memory layout as basis of EL2
          stage 1 address translation, which is not applicable on MPU syste=
m,
          where there is no virtual addressing. As a result, any operation
          involving transition from PA to VA, like ioremap, needs modificat=
ion
          on MPU system.
    - Xen's run-time addresses are the same as the link time addresses.
        - Enable PIC/PIE (position-independent code) on a real-time target
          processor probably very rare. Further discussion in 2.1 and TODO
          sections.
    - Xen will need to use the EL2 MPU memory region descriptors to manage
      access permissions and attributes for accesses made by VMs at EL1/0.
        - Xen currently relies on MMU EL1 stage 2 table to manage these
          accesses.
- No MMU Stage 2 translation at EL1:
    - A guest doesn't have an independent guest physical address space
    - A guest can not reuse the current Intermediate Physical Address
      memory layout
    - A guest uses physical addresses to access memory and devices
    - The MPU at EL2 manages EL1 stage 2 access permissions and attributes
- There are a limited number of MPU protection regions at both EL2 and EL1:
    - Architecturally, the maximum number of protection regions is 256,
      typical implementations have 32.
    - By contrast, Xen does not need to consider the number of page table
      entries in theory when using MMU.
- The MPU protection regions at EL2 need to be shared between the hyperviso=
r
  and the guest stage 2.
    - Requires careful consideration - may impact feature 'fullness' of bot=
h
      the hypervisor and the guest
    - By contrast, when using MMU, Xen has standalone P2M table for guest
      stage 2 accesses.

## 2. Proposed changes of Xen
### **2.1. Changes of build system:**

- ***Introduce new Kconfig options for Armv8-R64***:
  Unlike Armv8-A, because lack of MMU support on Armv8-R64, we may not
  expect one Xen binary to run on all machines. Xen images are not common
  across Armv8-R64 platforms. Xen must be re-built for different Armv8-R64
  platforms. Because these platforms may have different memory layout and
  link address.
    - `ARM64_V8R`:
      This option enables Armv8-R profile for Arm64. Enabling this option
      results in selecting MPU. This Kconfig option is used to gate some
      Armv8-R64 specific code except MPU code, like some code for Armv8-R64
      only system ID registers access.

    - `ARM_MPU`
      This option enables MPU on Armv8-R architecture. Enabling this option
      results in disabling MMU. This Kconfig option is used to gate some
      ARM_MPU specific code. Once when this Kconfig option has been enabled=
,
      the MMU relate code will not be built for Armv8-R64. The reason why
      not depends on runtime detection to select MMU or MPU is that, we don=
't
      think we can use one image for both Armv8-R64 and Armv8-A64. Another
      reason that we separate MPU and V8R in provision to allow to support =
MPU
      on 32bit Arm one day.

  ***Try to use `if ( IS_ENABLED(CONFIG_ARMXXXX) )` instead of spreading***
  ***`#ifdef CONFIG_ARMXXXX` everywhere, if it is possible.***

- ***About Xen start address for Armv8-R64***:
  On Armv8-A, Xen has a fixed virtual start address (link address too) on a=
ll
  Armv8-A platforms. In an MMU based system, Xen can map its loaded address
  to this virtual start address. On Armv8-A platforms, the Xen start addres=
s
  does not need to be configurable. But on Armv8-R platforms, they don't ha=
ve
  MMU to map loaded address to a fixed virtual address. And different platf=
orms
  will have very different address space layout, so it's impossible for Xen=
 to
  specify a fixed physical address for all Armv8-R platforms' start address=
.

  - `XEN_START_ADDRESS`
    This option allows to set the custom address at which Xen will be
    linked. This address must be aligned to a page size. Xen's run-time
    addresses are the same as the link time addresses.
    ***Notes: Fixed link address means the Xen binary could not be***
    ***relocated by EFI loader. So in current stage, Xen could not***
    ***be launched as an EFI application on Armv8-R64.(TODO#3.3)***

    - Provided by platform files.
      We can reuse the existed arm/platforms store platform specific files.
      And `XEN_START_ADDRESS` is one kind of platform specific information.
      So we can use platform file to define default `XEN_START_ADDRESS` for
      each platform.

    - Provided by Kconfig.
      This option can be an independent or a supplymental option. Users can
      define a customized `XEN_START_ADDRESS` to override the default value
      in platform's file.

    - Generated from device tree by build scripts (optional)
      Vendors who want to enable Xen on their Armv8-R platforms, they can
      use some tools/scripts to parse their boards device tree to generate
      the basic platform information. These tools/scripts do not necessaril=
y
      need to be integrated in Xen, but Xen can give some recommended
      configuration. For example, Xen can recommend Armv8-R platforms to us=
e
      lowest ram start address + 2MB as the default Xen start address.
      The generated platform files can be placed to arm/platforms for
      maintenance.

    - Enable Xen PIC/PIE (optional)
      We have mentioned about PIC/PIE in section 1.2. With PIC/PIE support,
      Xen can run from everywhere it has been loaded. But it's rare to use
      PIC/PIE on a real-time system (code size, more memory access). So a
      partial PIC/PIE image maybe better (see 3. TODO section). But partial
      PIC/PIE image may not solve this Xen start address issue.

- ***About MPU initialization before parsing device tree***:
      Before Xen can start parsing information from device tree and use
      this information to setup MPU, Xen need an initial MPU state. This
      is because:
      1. More deterministic: Arm MPU supports background regions, if we
         don't configure the MPU regions and don't enable MPU. The default
         MPU background attributes will take effect. The default background
         attributes are `IMPLEMENTATION DEFINED`. That means all RAM region=
s
         may be configured to device memory and RWX. Random values in RAM o=
r
         maliciously embedded data can be exploited.
      2. More compatible: On some Armv8-R64 platforms, if MPU is disabled,
         the `dc zva` instruction will make the system halt (This is one
         side effect of MPU background attributes, the RAM has been configu=
red
         as device memory). And this instruction will be embedded in some
         built-in functions, like `memory set`. If we use `-ddont_use_dc` t=
o
         rebuild GCC, the built-in functions will not contain `dc zva`.
         However, it is obviously unlikely that we will be able to recompil=
e
         all GCC for ARMv8-R64.

    - Reuse `XEN_START_ADDRESS`
      In the very beginning of Xen boot, Xen just need to cover a limited
      memory range and very few devices (actually only UART device). So we
      can use two MPU regions to map:
      1. `XEN_START_ADDRESS` to `XEN_START_ADDRESS + 2MB` or.
         `XEN_START_ADDRESS` to `XEN_START_ADDRESS + image_size`as
         normal memory.
      2. `UART` MMIO region base to `UART` MMIO region end to device memory=
.
      These two are enough to support Xen run in boot time. And we don't ne=
ed
      to provide additional platform information for initial normal memory
      and device memory regions. In current PoC we have used this option
      for implementation, and it's the same as Armv8-A.

    - Additional platform information for initial MPU state
      Introduce some macros to allow users to set initial normal
      memory regions:
      `ARM_MPU_NORMAL_MEMORY_START` and `ARM_MPU_NORMAL_MEMORY_END`
      and device memory:
      `ARM_MPU_DEVICE_MEMORY_START` and `ARM_MPU_DEVICE_MEMORY_END`
      These macros are the same platform specific information as
      `XEN_START_ADDRESS`, so the options#1/#2/#3 of generating
      `XEN_START_ADDRESS` also can be applied to these macros.
      ***From our current PoC work, we think these macros may***
      ***not be necessary. But we still place them here to see***
      ***whether the community will have some different scenarios***
      ***that we haven't considered.***

- ***Define new system registers for compiliers***:
  Armv8-R64 is based on Armv8.4. That means we will use some Armv8.4
  specific system registers. As Armv8-R64 only have secure state, so
  at least, `VSTCR_EL2` and `VSCTLR_EL2` will be used for Xen. And the
  first GCC version that supports Armv8.4 is GCC 8.1. In addition to
  these, PMSA of Armv8-R64 introduced lots of MPU related system registers:
  `PRBAR_ELx`, `PRBARx_ELx`, `PRLAR_ELx`, `PRLARx_ELx`, `PRENR_ELx` and
  `MPUIR_ELx`. But the first GCC version to support these system registers
  is GCC 11. So we have two ways to make compilers to work properly with
  these system registers.
  1. Bump GCC version to GCC 11.
     The pros of this method is that, we don't need to encode these
     system registers in macros by ourselves. But the cons are that,
     we have to update Makefiles to support GCC 11 for Armv8-R64.
     1.1. Check the GCC version 11 for Armv8-R64.
     1.2. Add march=3Darmv8r to CFLAGS for Armv8-R64.
     1.3. Solve the confliction of march=3Darmv8r and mcpu=3Dgeneric
    These changes will affect common Makefiles, not only Arm Makefiles.
    And GCC 11 is new, lots of toolchains and Distro haven't supported it.

  2. Encode new system registers in macros ***(preferred)***
        ```
        /* Virtualization Secure Translation Control Register */
        #define VSTCR_EL2  S3_4_C2_C6_2
        /* Virtualization System Control Register */
        #define VSCTLR_EL2 S3_4_C2_C0_0
        /* EL1 MPU Protection Region Base Address Register encode */
        #define PRBAR_EL1  S3_0_C6_C8_0
        ...
        /* EL2 MPU Protection Region Base Address Register encode */
        #define PRBAR_EL2  S3_4_C6_C8_0
        ...
        ```
     If we encode all above system registers, we don't need to bump GCC
     version. And the common CFLAGS Xen is using still can be applied to
     Armv8-R64. We don't need to modify Makefiles to add specific CFLAGS.
     ***Notes:***
     ***Armv8-R AArch64 supports the A64 ISA instruction set with***
     ***some modifications:***
     ***Redefines DMB, DSB, and adds an DFB. But actually, the***
     ***encodings of DMB and DSB are still the same with A64.***
     ***And DFB is an alias of DSB #12. In this case, we think***
     ***we don't need a new architecture specific flag to***
     ***generate new instructions for Armv8-R.***

### **2.2. Changes of the initialization process**
In general, we still expect Armv8-R64 and Armv8-A64 to have a consistent
initialization process. In addition to some architecutre differences, there
is no more than reusable code that we will distinguish through CONFIG_ARM_M=
PU
or CONFIG_ARM64_V8R. We want most of the initialization code to be reusable
between Armv8-R64 and Armv8-A64.

- We will reuse the original head.s and setup.c of Arm. But replace the
  MMU and page table operations in these files with configuration operation=
s
  for MPU and MPU regions.

- We provide a boot-time MPU configuration. This MPU configuration will
  support Xen to finish its initialization. And this boot-time MPU
  configuration will record the memory regions that will be parsed from
  device tree.

  In the end of Xen initialization, we will use a runtime MPU configuration
  to replace boot-time MPU configuration. The runtime MPU configuration wil=
l
  merge and reorder memory regions to save more MPU regions for guests.
  ![img](https://drive.google.com/uc?export=3Dview&id=3D1wTFyK2XfU3lTlH1PqR=
DoacQVTwUtWIGU)

- Defer system unpausing domain after free_init_memory.
  When Xen initialization is about to end, Xen unpauses guests created
  during initialization. But this will cause some issues. The unpause
  action occurs before free_init_memory, however the runtime MPU
  configuration is built after free_init_memory. In Draft-A, we had
  discussed whether a zeroing operation for init code and data is
  enough or not. Because I had just given a security reason for doing
  free_init_memory on Armv8-R (free_init_memory will drop the Xen init
  code & data, this will reduce the code an attacker can exploit).
  But I forgot other very important reasons:
  1. Init code and data will occupy two MPU regions, because they
     have different memory attributes.
  2. It's not easy to zero init code section, because it's readonly.
     We have to update its MPU region to make this section RW. This
     operation doesn't do much less than free_init_memory.
  3. Zeroing init code and data will not release the two MPU regions
     they are using. This would be a very big waste of a limited MPU
     regions resource.
  4. Current free_init_memory operation is reusing lots of Armv8-A
     codes, except re-add init memory to Xen heap. Becuase we're using
     static heap on Armv8-R.

  So if the unpaused guests start executing the context switch at this
  point, then its MPU context will base on the boot-time MPU configuration.
  Probably it will be inconsistent with runtime MPU configuration, this
  will cause unexpected problems (This may not happen in a single core
  system, but on SMP systems, this problem is forseeable, so we hope to
  solve it at the beginning).

  Why we need to switch the MPU configuration that late?
  Because we need to re-order the MPU regions to reduce complexity of runti=
me
  MPU regions management.
  1. In the boot stage, we allocate MPU regions in sequence until the max.
     Since a few MPU regions will get removed along the way, they will leav=
e
     holes there. For example, when heap is ready, fdt will be reallocated
     in the heap, which means the MPU region for device tree is never neede=
d.
     And also in free_init_memory, although we do not add init memory to he=
ap,
     we still reclaim the MPU regions they are using. Without ordering, we
     may need a bitmap to record such information.

     In context switch, the memory layout is quite different for guest mode
     and hypervisor mode. When switching to guest mode, only guest RAM,
     emulated/passthrough devices, etc could be seen, but in hypervisor mod=
e,
     all Xen used devices and guests RAM shall be seen. And without reorder=
ing,
     we need to iterate all MPU regions to find according regions to disabl=
e
     during runtime context switch, that's definitely a overhead.

     So we propose an ordering at the tail of the boot time, to put all fix=
ed
     MPU regions in the head, like xen text/data, etc, and put all flexible
     ones at tail, like device memory, guests RAM.

     Then later in runtime, like context switch, we could easily just disab=
le
     ones from tail and inserts new ones in the tail.

### **2.3. Changes to reduce memory fragmentation**

In general, memory in Xen system can be classified to 4 classes:
`image sections`, `heap sections`, `guest RAM`, `boot modules (guest Kernel=
,
initrd and dtb)`

Currently, Xen doesn't have any restriction for users how to allocate
memory for different classes. That means users can place boot modules
anywhere, can reserve Xen heap memory anywhere and can allocate guest
memory anywhere.

In a VMSA system, this would not be too much of a problem, since the
MMU can manage memory at a granularity of 4KB after all. But in a
PMSA system, this will be a big problem. On Armv8-R64, the max MPU
protection regions number has been limited to 256. But in typical
processor implementations, few processors will design more than 32
MPU protection regions. Add in the fact that Xen shares MPU protection
regions with guest's EL1 Stage 2. It becomes even more important
to properly plan the use of MPU protection regions.

- An ideal of memory usage layout restriction:
![img](https://drive.google.com/uc?export=3Dview&id=3D1kirOL0Tx2aAypTtd3kXA=
td75XtrngcnW)
1. Reserve proper MPU regions for Xen image (code, rodata and data + bss).
2. Reserve one MPU region for boot modules.
   That means the placement of all boot modules, include guest kernel,
   initrd and dtb, will be limited to this MPU region protected area.
3. Reserve one or more MPU regions for Xen heap.
   On Armv8-R64, the guest memory is predefined in device tree, it will
   not be allocated from heap. Unlike Armv8-A64, we will not move all
   free memory to heap. We want Xen heap is dertermistic too, so Xen on
   Armv8-R64 also rely on Xen static heap feature. The memory for Xen
   heap will be defined in tree too. Considering that physical memory
   can also be discontinuous, one or more MPU protection regions needs
   to be reserved for Xen HEAP.
4. If we name above used MPU protection regions PART_A, and name left
   MPU protection regions PART_B:
   4.1. In hypervisor context, Xen will map left RAM and devices to PART_B.
        This will give Xen the ability to access whole memory.
   4.2. In guest context, Xen will create EL1 stage 2 mapping in PART_B.
        In this case, Xen just need to update PART_B in context switch,
        but keep PART_A as fixed.

***Notes: Static allocation will be mandatory on MPU based systems***

**A sample device tree of memory layout restriction**:
```
chosen {
    ...
    /*
     * Define a section to place boot modules,
     * all boot modules must be placed in this section.
     */
    mpu,boot-module-section =3D <0x10000000 0x10000000>;
    /*
     * Define a section to cover all guest RAM. All guest RAM must be locat=
ed
     * within this section. The pros is that, in best case, we can only hav=
e
     * one MPU protection region to map all guest RAM for Xen.
     */
    mpu,guest-memory-section =3D <0x20000000 0x30000000>;
    /*
     * Define a memory section that can cover all device memory that
     * will be used in Xen.
     */
    mpu,device-memory-section =3D <0x80000000 0x7ffff000>;
    /* Define a section for Xen heap */
    xen,static-mem =3D <0x50000000 0x20000000>;

    domU1 {
        ...
        #xen,static-mem-address-cells =3D <0x01>;
        #xen,static-mem-size-cells =3D <0x01>;
        /* Statically allocated guest memory, within mpu,guest-memory-secti=
on */
        xen,static-mem =3D <0x30000000 0x1f000000>;

        module@11000000 {
            compatible =3D "multiboot,kernel\0multiboot,module";
            /* Boot module address, within mpu,boot-module-section */
            reg =3D <0x11000000 0x3000000>;
            ...
        };

        module@10FF0000 {
                compatible =3D "multiboot,device-tree\0multiboot,module";
                /* Boot module address, within mpu,boot-module-section */
                reg =3D <0x10ff0000 0x10000>;
                ...
        };
    };
};
```
It's little hard for users to compose such a device tree by hand. Based
on the discussion of Draft-A, Xen community suggested users to use some
tools like [imagebuilder](https://gitlab.com/ViryaOS/imagebuilder/-/blob/ma=
ster/scripts/uboot-script-gen#L390) to generate the above device tree prope=
rties.
Please goto TODO#3.3 section to get more details of this suggestion.

### **2.4. Changes of memory management**
Xen is coupled with VMSA, in order to port Xen to Armv8-R64, we have to
decouple Xen from VMSA. And give Xen the ablity to manage memory in PMSA.

1. ***Use buddy allocator to manage physical pages for PMSA***
   From the view of physical page, PMSA and VMSA don't have any difference.
   So we can reuse buddy allocator on Armv8-R64 to manage physical pages.
   The difference is that, in VMSA, Xen will map allocated pages to virtual
   addresses. But in PMSA, Xen just convert the pages to physical address.

2. ***Can not use virtual address for memory management***
   As Armv8-R64 only has PMSA in EL2, Xen loses the ability of using virtua=
l
   address to manage memory. This brings some problems, some virtual addres=
s
   based features could not work well on Armv8-R64, like `FIXMAP`, `vmap/vu=
map`,
   `ioremap` and `alternative`.

   But the functions or macros of these features are used in lots of common
   code. So it's not good to use `#ifdef CONFIG_ARM_MPU` to gate relate cod=
e
   everywhere. In this case, we propose to use stub helpers to make the cha=
nges
   transparently to common code.
   1. For `FIXMAP`, we will use `0` in `FIXMAP_ADDR` for all fixmap operati=
ons.
      This will return physical address directly of fixmapped item.
   2. For `vmap/vumap`, we will use some empty inline stub helpers:
        ```
        static inline void vm_init_type(...) {}
        static inline void *__vmap(...)
        {
            return NULL;
        }
        static inline void vunmap(const void *va) {}
        static inline void *vmalloc(size_t size)
        {
            return NULL;
        }
        static inline void *vmalloc_xen(size_t size)
        {
            return NULL;
        }
        static inline void vfree(void *va) {}
        ```

   3. For `ioremap`, it depends on `vmap`. As we have make `vmap` to always
      return `NULL`, they could not work well on Armv8-R64 without changes.
      `ioremap` will return input address directly. But if some extended
      functions like `ioremap_nocache`, `ioremap_cache`, need to ask a new
      memory attributes. As Armv8-R doesn't have infinite MPU regions for
      Xen to split the memory area from its located MPU region and assign
      the new attributes to it. So in `ioremap_nocache`, `ioremap_cache`,
      if the input attributes are different from current memory attributes,
      these functions will return `NULL`.
        ```
        static inline void *ioremap_attr(...)
        {
            /* We don't have the ability to change input PA cache attribute=
s */
            if ( CACHE_ATTR_need_change )
                return NULL;
            return (void *)pa;
        }
        static inline void __iomem *ioremap_nocache(...)
        {
            return ioremap_attr(start, len, PAGE_HYPERVISOR_NOCACHE);
        }
        static inline void __iomem *ioremap_cache(...)
        {
            return ioremap_attr(start, len, PAGE_HYPERVISOR);
        }
        static inline void __iomem *ioremap_wc(...)
        {
            return ioremap_attr(start, len, PAGE_HYPERVISOR_WC);
        }
        void *ioremap(...)
        {
            return ioremap_attr(pa, len, PAGE_HYPERVISOR_NOCACHE);
        }

        ```
    4. For `alternative`, it has been listed in TODO, we will simply disabl=
e
       it on Armv8-R64 in current stage. But simply disable `alternative`
       will make `cpus_have_const_cap` always return false.
        ```
        * System capability check for constant cap */
        #define cpus_have_const_cap(num) ({                \
               register_t __ret;                           \
                                                           \
               asm volatile (ALTERNATIVE("mov %0, #0",     \
                                         "mov %0, #1",     \
                                         num)              \
                             : "=3Dr" (__ret));              \
                                                           \
                unlikely(__ret);                           \
                })
        ```
        So, before we have an PMSA `alternative` implementation, we have to
        implement a separate `cpus_have_const_cap` for Armv8-R64:
        ```
        #define cpus_have_const_cap(num) cpus_have_cap(num)
        ```

### **2.5. Changes of guest management**
Armv8-R64 only supports PMSA in EL2, but it supports configurable
VMSA or PMSA in EL1. This means Xen will have a new type guest on
Armv8-R64 - MPU based guest.

1. **Add a new domain type - MPU_DOMAIN**
   When user want to create a guest that will be using MPU in EL1, user
   should add a `mpu` property in device tree `domU` node, like following
   example:
    ```
    domU2 {
        compatible =3D "xen,domain";
        direct-map;
        mpu; --> Indicates this domain will use PMSA in EL1.
        ...
    };
    ```
    Corresponding to `mpu` property in device tree, we also need to introdu=
ce
    a new flag `XEN_DOMCTL_CDF_INTERNAL_mpu` for domain to mark itself as a=
n
    MPU domain. This flag will be used in domain creation and domain doing
    vCPU context switch.
    1. Domain creation need this flag to decide enable PMSA or VMSA in EL1.
    2. vCPU context switch need this flag to decide save/restore MMU or MPU
       related registers.

2. **Add MPU registers for vCPU to save EL1 MPU context**
   Current Xen only supports MMU based guest, so it hasn't considered to
   save/restore MPU context. In this case, we need to add MPU registers
   to `arch_vcpu`:
    ```
    struct arch_vcpu
    {
        ...
    #ifdef CONFIG_ARM_MPU
        /* Virtualization Translation Control Register */
        register_t vtcr_el2;

        /* EL1 MPU regions' registers */
        pr_t *mpu_regions;
    #endif
        ...
    }
    ```
    Armv8-R64 can support max to 256 MPU regions. But that's just theoretic=
al.
    So we don't want to embed `pr_t mpu_regions[256]` in `arch_vcpu` direct=
ly,
    this will be a memory waste in most cases. Instead we use a pointer in
    `arch_vcpu` to link with a dynamically allocated `mpu_regions`:
    ```
    p->arch.mpu_regions =3D _xzalloc(sizeof(pr_t) * mpu_regions_count_el1, =
SMP_CACHE_BYTES);
    ```
    As `arch_vcpu` is used very frequently in context switch, so Xen define=
s
    `arch_vcpu` as a cache alignment data structure. `mpu_regions` also wil=
l
    be used very frequently in Armv8-R context switch. So we use `_xzalloc`
    to allocate `SMP_CACHE_BYTES` alignment memory for `mpu_regions`.

    `mpu_regions_count_el1` can be detected from `MPUIR_EL1` system registe=
r
    in Xen boot stage. The limitation is that, if we define a static
    `arch_vcpu`, we have to allocate `mpu_regions` before using it.

3. **MPU based P2M table management**
   Armv8-R64 EL2 doesn't have EL1 stage 2 address translation. But through
   PMSA, it still has the ability to control the permissions and attributes
   of EL1 stage 2. In this case, we still hope to keep the interface
   consistent with MMU based P2M as far as possible.

   p2m->root will point to an allocated memory. In Armv8-A64, this memory
   is used to save the EL1 stage 2 translation table. But in Armv8-R64,
   this memory will be used to store EL2 MPU protection regions that are
   used by guest. During domain creation, Xen will prepare the data in
   this memory to make guest can access proper RAM and devices. When the
   guest's vCPU will be scheduled in, this data will be written to MPU
   protection region registers.

### **2.6. Changes of exception trap**
As Armv8-R64 has compatible excetpion mode with Armv8-A64, so we can reuse =
most
of Armv8-A64's exception trap & handler code. But except the trap based on =
EL1
stage 2 translation abort.

In Armv8-A64, we use `FSC_FLT_TRANS`
```
    case FSC_FLT_TRANS:
        ...
        if ( is_data )
        {
            enum io_state state =3D try_handle_mmio(regs, hsr, gpa);
            ...
        }
```
But for Armv8-R64, we have to use `FSC_FLT_PERM`
```
    case FSC_FLT_PERM:
        ...
        if ( is_data )
        {
            enum io_state state =3D try_handle_mmio(regs, hsr, gpa);
            ...
        }
```

### **2.5. Changes of device driver**
Because Armv8-R64 only has single secure state, this will affect some
devices that have two secure state, like GIC. But fortunately, most
vendors will not link a two secure state GIC to Armv8-R64 processors.
Current GIC driver can work well with single secure state GIC for Armv8-R64=
.

### **2.7. Changes of virtual device**
Currently, we only support pass-through devices in guest. Becuase event
channel, xen-bus, xen-storage and other advanced Xen features haven't been
enabled in Armv8-R64.

## 3. TODO
This section describes some features that are not currently implemented in
the PoC. Those features are things that should be looked in a second stage
and will not be part of the initial support of MPU/Armv8-R. Those jobs coul=
d
be done by Arm or any Xen contributors.

### 3.1. Alternative framework support
    On Armv8-A system, `alternative` is depending on `VMAP` function to rem=
ap
    a code section to a new read/write virtual address. But on Armv8-R, we =
do
    not have virtual address to do remap. So as an alternative method, we w=
ill
    disable the MPU to make all RAM `RWX` in "apply alternative all patches=
"
    progress temporarily.

    1. Disable MPU -> Code section becomes RWX.
    2. Apply alternative patches to Xen text.
    3. Enable MPU -> Code section restores to RX.

    All memory is RWX, there may be some security risk. But, because
    "alternative apply patches" happens in Xen init stage, it propoably
    doesn't matter as much.

### 3.2. Xen Event Channel Support
    In Current RFC patches we haven't enabled the event channel support.
    But I think it's good opportunity to do some discussion in advanced.
    On Armv8-R, all VMs are native direct-map, because there is no stage2
    MMU translation. Current event channel implementation depends on some
    shared pages between Xen and guest: `shared_info` and per-cpu `vcpu_inf=
o`.

    For `shared_info`, in current implementation, Xen will allocate a page
    from heap for `shared_info` to store initial meta data. When guest is
    trying to setup `shared_info`, it will allocate a free gfn and use a
    hypercall to setup P2M mapping between gfn and `shared_info`.

    For direct-mapping VM, this will break the direct-mapping concept.
    And on an MPU based system, like Armv8-R system, this operation will
    be very unfriendly. Xen need to pop `shared_info` page from Xen heap
    and insert it to VM P2M pages. If this page is in the middle of
    Xen heap, this means Xen need to split current heap and use extra
    MPU regions. Also for the P2M part, this page is unlikely to form
    a new continuous memory region with the existing p2m pages, and Xen
    is likely to need another additional MPU region to set it up, which
    is obviously a waste for limited MPU regions. And This kind of dynamic
    is quite hard to imagine on an MPU system.

    For `vcpu_info`, in current implementation, Xen will store `vcpu_info`
    meta data for all vCPUs in `shared_info`. When guest is trying to setup
    `vcpu_info`, it will allocate memory for `vcpu_info` from guest side.
    And then guest will use hypercall to copy meta data from `shared_info`
    to guest page. After that both Xen `vcpu_info` and guest `vcpu_info`
    are pointed to the same page that allocated by guest.

    This implementation has serval benifits:
    1. There is no waste memory. No extra memory will be allocated from Xen=
 heap.
    2. There is no P2M remap. This will not break the direct-mapping, and
       is MPU system friendly.
    So, on Armv8-R system, we can still keep current implementation for
    per-cpu `vcpu_info`.

    So, our proposal is that, can we reuse current implementation idea of
    `vcpu_info` for `shared_info`? We still allocate one page for
    `d->shared_info` at domain construction for holding some initial meta-d=
ata,
    using alloc_domheap_pages instead of alloc_xenheap_pages and
    share_xen_page_with_guest. And when guest allocates a page for
    `shared_info` and use hypercall to setup it,  We copy the initial data =
from
    `d->shared_info` to it. And after copy we can update `d->shared_info` t=
o point
    to guest allocated 'shared_info' page. In this case, we don't have to t=
hink
    about the fragmentation of Xen heap and p2m and the extra MPU regions.

    But here still has some concerns:
    `d->shared_info` in Xen is accessed without any lock. So it will not be
    that simple to update `d->shared_info`. It might be possible to protect
    d->shared_info (or other structure) with a read-write lock.

    Do we need to add PGT_xxx flags to make it global and stay as much the
    same with the original op, a simple investigation tells us that it only
    be referred in `get_page_type`. Since ARM doesn't care about typecounts
    and always return 1, it doesn't have too much impact.

### 3.3. Xen Partial PIC/PIE
    As we have described in `XEN_START_ADDRESS` section. PIC/PIE can solve
    different platforms have different `XEN_START_ADDRESS` issue. But we
    also describe some issues to use PIC/PIE in real time systems like
    Armv8-R platforms.

    But a partial PIC/PIE support may be needed for Armv8-R. Because Arm
    [EBBR](https://arm-software.github.io/ebbr/index.html) require Xen
    on Armv8-R to support EFI boot service. Due to lack of relocation
    capability, EFI loader could not launch xen.efi on Armv8-R. So maybe
    we still need a partially supported PIC/PIE. Only some boot code
    support PIC/PIE to make EFI relocation happy. This boot code will
    help Xen to check its loaded address and relocate Xen image to Xen's
    run-time address if need.

### 3.4. A tool to generate Armv8-R Xen device tree
1. Use a tool to generate above device tree property.
   This tool will have some similar inputs as below:
   ---
   DEVICE_TREE=3D"fvp_baremetal.dtb"
   XEN=3D"4.16-2022.1/xen"

   NUM_DOMUS=3D1
   DOMU_KERNEL[0]=3D"4.16-2022.1/Image-domU"
   DOMU_RAMDISK[0]=3D"4.16-2022.1/initrd.cpio"
   DOMU_PASSTHROUGH_DTB[0]=3D"4.16-2022.1/passthrough-example-dev.dtb"
   DOMU_RAM_BASE[0]=3D0x30000000
   DOMU_RAM_SIZE[0]=3D0x1f000000
   ---
   Using above inputs, the tool can generate a device tree similar as
   we have described in sample.

   - `mpu,guest-memory-section`:
   This section will cover all guests' RAM (`xen,static-mem` defined region=
s
   in all DomU nodes). All guest RAM must be located within this section.
   In the best case, we can only have one MPU protection region to map all
   guests' RAM for Xen.

   If users set `DOMU_RAM_BASE` and `DOMU_RAM_SIZE`, these will be converte=
d
   to the base and size of `xen,static-mem`. This tool will scan all
   `xen, static-mem` in DomU nodes to determin the base and size of
   `mpu,guest-memory-section`. If there is any other kind of memory usage
   has been detected in this section, this tool can report an error.
   Except build time check, Xen also need to do runtime check to prevent a
   bad device tree that generated by malicious tools.

   If users set `DOMU_RAM_SIZE` only, this will be converted to the size of
   `xen,static-mem` only. Xen will allocate the guest memory in runtime, bu=
t
   not from Xen heap. `mpu,guest-memory-section` will be caculated in runti=
me
   too. The property in device tree doesn't need or will be ignored by Xen.

   - `mpu,boot-module-section`:
   This section will be used to store the boot modules like DOMU_KERNEL,
   DOMU_RAMDISK, and DOMU_PASSTHROUGH_DTB. Xen keeps all boot modules in
   this section to meet the requirment of DomU restart on Armv8-R. In
   current stage, we don't have a privilege domain like Dom0 that can
   access filesystem to reload DomU images.

   And in current Xen code, the base and size are mandatory for boot module=
s
   If users don't specify the base of each boot module, the tool will
   allocte a base for each module. And the tool will generate the
   `mpu,boot-module-section` region, when it finishs boot module memory
   allocation.

   Users also can specify the base and size of each boot module, these will
   be converted to the base and size of module's `reg` directly. The tool
   will scan all modules `reg` in DomU nodes to generate the base and size =
of
   `mpu,boot-module-section`. If there is any kind of other memory usage
   has been detected in this section, this tool can report an error.
   Except build time check, Xen also need to do runtime check to prevent a
   bad device tree that generated by malicious tools.

   - `mpu,device-memory-section`:
   This section will cover all device memory that will be used in Xen. Like
   `UART`, `GIC`, `SMMU` and other devices. We haven't considered multiple
   `mpu,device-memory-section` scenarios. The devices' memory and RAM are
   interleaving in physical address space, it would be required to use
   multiple `mpu,device-memory-section` to cover all devices. This layout
   is common on Armv8-A system, especially in server. But it's rare in
   Armv8-R. So in current stage, we don't want to allow multiple
   `mpu,device-memory-section`. The tool can scan baremetal device tree
   to sort all devices' memory ranges. And calculate a proper region for
   `mpu,device-memory-section`. If it find Xen need multiple
   `mpu,device-memory-section`, it can report an unsupported error.

2. Use a tool to generate device tree property and platform files
   This opinion still uses the same inputs as opinion#1. But this tool only
   generates `xen,static-mem` and `module` nodes in DomU nodes, it will not
   generate `mpu,guest-memory-section`, `mpu,boot-module-section` and
   `mpu,device-memory-section` properties in device tree. This will
   generate following macros:
   `MPU_GUEST_MEMORY_SECTION_BASE`, `MPU_GUEST_MEMORY_SECTION_SIZE`
   `MPU_BOOT_MODULE_SECTION_BASE`, `MPU_BOOT_MODULE_SECTION_SIZE`
   `MPU_DEVICE_MEMORY_SECTION_BASE`, `MPU_DEVICE_MEMORY_SECTION_SIZE`
   in platform files in build time. In runtime, Xen will skip the device
   tree parsing for `mpu,guest-memory-section`, `mpu,boot-module-section`
   and `mpu,device-memory-section`. And instead Xen will use these macros
   to do runtime check.
   But, this also means these macros only exist in local build system,
   these macros will not be maintained in Xen repo.

--
Cheers,
Wei Chen



From xen-devel-bounces@lists.xenproject.org Fri Mar 25 01:17:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 01:17:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294545.500897 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXYa0-00029U-Qe; Fri, 25 Mar 2022 01:17:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294545.500897; Fri, 25 Mar 2022 01:17:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXYa0-00029N-NW; Fri, 25 Mar 2022 01:17:28 +0000
Received: by outflank-mailman (input) for mailman id 294545;
 Fri, 25 Mar 2022 01:17:27 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXYZz-000299-8l; Fri, 25 Mar 2022 01:17:27 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXYZz-00064R-5c; Fri, 25 Mar 2022 01:17:27 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXYZy-0008Rc-LW; Fri, 25 Mar 2022 01:17:26 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXYZy-0002Z4-L7; Fri, 25 Mar 2022 01:17:26 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=yjPLNAf4nTZqE0lQhoeomQCa8Kw4trali84GT/BkN8s=; b=eGMjF1jfyZ2sF7rkUeUPdXdi0V
	Q7K6y4I/uq9Ndsv+pFXrwfGceOjrLsBV2CGl2bjKfOSWPmvqyXz/8IXwmz2FRa8pS6ibMLcrr4UlX
	tAPdhHCYY1wU7pqWyRTkoDQ6eaAQJHtI73jwokcIaf/xJOaPfnHHlIWcirzJnU+36v9Y=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168831-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168831: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=ec0b54849b23efa25caf0055b0eef8bf9b4dec98
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 25 Mar 2022 01:17:26 +0000

flight 168831 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168831/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 ec0b54849b23efa25caf0055b0eef8bf9b4dec98
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   24 days
Failing since        168258  2022-03-01 01:55:31 Z   23 days  248 attempts
Testing same since   168774  2022-03-22 08:40:31 Z    2 days   29 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 875 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 01:32:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 01:32:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294552.500909 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXYof-0004WN-5f; Fri, 25 Mar 2022 01:32:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294552.500909; Fri, 25 Mar 2022 01:32:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXYof-0004WG-1C; Fri, 25 Mar 2022 01:32:37 +0000
Received: by outflank-mailman (input) for mailman id 294552;
 Fri, 25 Mar 2022 01:32:36 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LYjy=UE=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nXYod-0004WA-WD
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 01:32:36 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 71434361-abdb-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 02:32:33 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 8E1D8B8272B;
 Fri, 25 Mar 2022 01:32:32 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id E2367C340F1;
 Fri, 25 Mar 2022 01:32:30 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 71434361-abdb-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1648171951;
	bh=pS3aIISsh7dVw9CXz+aCMBeQGdqFQkAeEVYC1zNzCvc=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=g//aO+3zWi/oOoAIsnL3xYXbEFNVqEl2t4mIdcnd1hxm668WnqSNuktlCpCGzrESV
	 k9RksZG0px0Mtuzrsia9NDe8uo6/4mu8oJN05J7bt9A0TG7cla3ssncu9AbArLS/AG
	 Q93AnihfLc8xDoLOFXZxRlaVsFldQyCKCfYgnHIXrItK8DIU1ixCEpcH1bqJS9P1JN
	 P6NkgmmpZhejbPKZ1lonz2LdHwwMncBYK19l2c8VIHHVde0FZsQ+loCKw8Q5jUv/3h
	 efECrf1B+2TVpvs4rEK/FhaF0UwDznyBE5gT9yvUR0nA4fwgz9DkoBIBc0k0QNcjlQ
	 ha21vkPsXZrCw==
Date: Thu, 24 Mar 2022 18:32:30 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Bertrand Marquis <bertrand.marquis@arm.com>
cc: xen-devel@lists.xenproject.org, Andrew Cooper <andrew.cooper3@citrix.com>, 
    George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, 
    Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, 
    Wei Liu <wl@xen.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, 
    Michal Orzel <michal.orzel@arm.com>
Subject: Re: [RFC PATCH] xen/build: Add cppcheck and cppcheck-html make
 rules
In-Reply-To: <77c79e86050eef2b706ee11e64183d57a0f5bcee.1648119732.git.bertrand.marquis@arm.com>
Message-ID: <alpine.DEB.2.22.394.2203241829510.2910984@ubuntu-linux-20-04-desktop>
References: <77c79e86050eef2b706ee11e64183d57a0f5bcee.1648119732.git.bertrand.marquis@arm.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Thu, 24 Mar 2022, Bertrand Marquis wrote:
> cppcheck can be used to check Xen code quality.
> 
> To create a report do "make cppcheck" on a built tree adding any options
> you added during the process you used to build xen (like CROSS_COMPILE
> or XEN_TARGET_ARCH). This will generate an xml report xen-cppcheck.xml.
> 
> To create a html report do "make cppcheck-html" in the same way and a
> full report to be seen in a browser will be generated in
> cppcheck-htmlreport/index.html.
> 
> For better results it is recommended to build your own cppcheck from the
> latest sources that you can find at [1].
> Development and result analysis has been done with cppcheck 2.7.
> 
> The Makefile rule is searching for all C files which have been compiled
> (ie which have a generated .o file) and is running cppcheck on all of
> them using the current configuration of xen so only the code actually
> compiled is checked.
> 
> A new tool is introduced to merge all cppcheck reports into one global
> report including all findings and removing duplicates.
> 
> Some extra variables can be used to customize the report:
> - CPPCHECK can be used to give the full path to the cppcheck binary to
> use (default is to use the one from the standard path).
> - CPPCHECK_HTMLREPORT can be used to give the full path to
> cppcheck-htmlreport (default is to use the one from the standard path).
> 
> This has been tested on several arm configurations (x86 should work but
> has not been tested).
> 
> [1] https://cppcheck.sourceforge.io/
> 
> Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com>
> Signed-off-by: Michal Orzel <michal.orzel@arm.com>

Very cool, I was looking forward to this :-)


> diff --git a/xen/tools/merge_cppcheck_reports.py b/xen/tools/merge_cppcheck_reports.py
> new file mode 100755
> index 0000000000..ef055f6925
> --- /dev/null
> +++ b/xen/tools/merge_cppcheck_reports.py
> @@ -0,0 +1,73 @@
> +#!/usr/bin/env python
> +
> +"""
> +This script acts as a tool to merge XML files created by cppcheck.
> +Usage:
> +    merge_cppcheck_reports.py [FILES] [OUTPUT]
> +
> +    FILES  - list of XML files with extension .cppcheck
> +    OUTPUT - file to store results (with .xml extension).
> +             If not specified, the script will print results to stdout.
> +"""
> +
> +import sys
> +from xml.etree import ElementTree
> +
> +def elements_equal(el1, el2):
> +    if type(el1) != type(el2): return False
> +
> +    el1_location = str(el1.find('location').attrib)
> +    el2_location = str(el2.find('location').attrib)
> +
> +    if el1_location != el2_location: return False
> +
> +    return True
> +
> +def remove_duplicates(xml_root_element):
> +    elems_to_remove = []
> +    index = 0
> +    elems_list = list(xml_root_element.findall("errors")[0])
> +    for elem1 in elems_list:
> +        index += 1
> +        for elem2 in elems_list[index:]:
> +            if elements_equal(elem1, elem2) and elem2 not in elems_to_remove:
> +                elems_to_remove.append(elem2)
> +                continue
> +
> +    for elem in elems_to_remove:
> +        xml_root_element.findall("errors")[0].remove(elem)
> +
> +def merge(files):
> +    result_xml_root = None
> +    for xml_file in files:
> +        xml_root = ElementTree.parse(xml_file).getroot()


Traceback (most recent call last):
  File "/local/repos/xen-upstream/xen/tools/merge_cppcheck_reports.py", line 73, in <module>
    run()
  File "/local/repos/xen-upstream/xen/tools/merge_cppcheck_reports.py", line 60, in run
    result = merge(files)
  File "/local/repos/xen-upstream/xen/tools/merge_cppcheck_reports.py", line 43, in merge
    xml_root = ElementTree.parse(xml_file).getroot()
  File "/usr/lib/python2.7/xml/etree/ElementTree.py", line 1182, in parse
    tree.parse(source, parser)
  File "/usr/lib/python2.7/xml/etree/ElementTree.py", line 657, in parse
    self._root = parser.close()
  File "/usr/lib/python2.7/xml/etree/ElementTree.py", line 1671, in close
    self._raiseerror(v)
  File "/usr/lib/python2.7/xml/etree/ElementTree.py", line 1523, in _raiseerror
    raise err
xml.etree.ElementTree.ParseError: no element found: line 11, column 0
make: *** [Makefile:576: xen-cppcheck.xml] Error 1

I think we should catch the xml.etree.ElementTree.ParseError exception and continue?


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 02:52:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 02:52:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294555.500920 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXa3S-0004QJ-0f; Fri, 25 Mar 2022 02:51:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294555.500920; Fri, 25 Mar 2022 02:51:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXa3R-0004QC-Rz; Fri, 25 Mar 2022 02:51:57 +0000
Received: by outflank-mailman (input) for mailman id 294555;
 Fri, 25 Mar 2022 02:51:56 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=rHzJ=UE=arm.com=Wei.Chen@srs-se1.protection.inumbo.net>)
 id 1nXa3Q-0004Q1-Ih
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 02:51:56 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on20614.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::614])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 86443583-abe6-11ec-a405-831a346695d4;
 Fri, 25 Mar 2022 03:51:54 +0100 (CET)
Received: from AS8P189CA0011.EURP189.PROD.OUTLOOK.COM (2603:10a6:20b:31f::24)
 by DU0PR08MB7463.eurprd08.prod.outlook.com (2603:10a6:10:356::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.19; Fri, 25 Mar
 2022 02:51:44 +0000
Received: from VE1EUR03FT057.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:31f:cafe::b6) by AS8P189CA0011.outlook.office365.com
 (2603:10a6:20b:31f::24) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17 via Frontend
 Transport; Fri, 25 Mar 2022 02:51:44 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT057.mail.protection.outlook.com (10.152.19.123) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Fri, 25 Mar 2022 02:51:43 +0000
Received: ("Tessian outbound 2877e54fe176:v113");
 Fri, 25 Mar 2022 02:51:42 +0000
Received: from 3c8e8e4647a6.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 77BA609C-F9E6-4CDD-BB5F-1954E2B60AA1.1; 
 Fri, 25 Mar 2022 02:51:37 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 3c8e8e4647a6.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 25 Mar 2022 02:51:37 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com (2603:10a6:102:2b9::9)
 by HE1PR0802MB2507.eurprd08.prod.outlook.com (2603:10a6:3:e1::8) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Fri, 25 Mar
 2022 02:51:27 +0000
Received: from PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::f9fc:3a4:39ac:a50e]) by PAXPR08MB7420.eurprd08.prod.outlook.com
 ([fe80::f9fc:3a4:39ac:a50e%6]) with mapi id 15.20.5081.022; Fri, 25 Mar 2022
 02:51:26 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 86443583-abe6-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=pXT6tETsad+lByr7odF92MgQnpVZiPQn3NXeleh+dqo=;
 b=NIhNNcfXdjwehRKtgQWYA3RGXyC6DEnNvp5oxNZhI/3bwPRAjsD6Cr1I0ZHQVb+nCIlzTDzFvtbUozJjhbBGLNnNZYgAFW3nN+ZsMV5ZUokANufTA+zmljsC9uZr8uhsJQ1b99t9hEEHPS4FO69TPzuHNSEGM2xTisBR+1aDLTU=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=nO8Twp30wH3DWKTVDd6nTH7UzLA3bqmdt1OkBSe0Pk8yMVgshidhBW+aBaDV4RtjmuckN45EjSsGbrqP527l1ArdG5w4Q/353FQYkbqg9fTiXZ+/DE95JfgfsIwFRi7XIhxzyfds84ypFdE7yeIOGU4t11gfXUqsp5f3MLExwZzHHfAI1G9Hk16s0PfNVH9OC1hhDXFilAj2CbZx4ghgxQeR8c48keJQqyd6feMK1UFYpQs2zILjoZM1/Yr+BMwc030gi44GepYl9UQPfzTmSb7nZMVlDy+sKA2HhLn4C5aWJr+YPDhUfpJLT7hmiKAhae50cyHZ+4Ch00KlE/p0Nw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=pXT6tETsad+lByr7odF92MgQnpVZiPQn3NXeleh+dqo=;
 b=EZOiks5fPhDc7oGBP4Xsh8bJxgYM5DHgxwxlk3KVpRP0a9fOwS/rCowXyCJnDDLK/pEttLPGMf2mgq6Mqem4eAKZX4+Vd+e1xUk5mmWZE+BZDcfrPRqmHzHFRt7StgTTpnCzB6JfvP52InSlhSiWxIy4eurb4FSoo/gqCeb8WSd2feMZq9DcqUHNWLxDmRP5A0iNZgT4vC+ISXdkkHUqBc3J4bU0UTu/j9+V0Cq0n5iFEK3UOerSe8lU9Ahaft8T31yz65/MtSbyaO9MwHIyQZFDkBZDgA3InSNsAY4XDEC8lGd7AkTj9+fJvQtIykAYsX36TYs3MWv/vv9G1UhPVg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=pXT6tETsad+lByr7odF92MgQnpVZiPQn3NXeleh+dqo=;
 b=NIhNNcfXdjwehRKtgQWYA3RGXyC6DEnNvp5oxNZhI/3bwPRAjsD6Cr1I0ZHQVb+nCIlzTDzFvtbUozJjhbBGLNnNZYgAFW3nN+ZsMV5ZUokANufTA+zmljsC9uZr8uhsJQ1b99t9hEEHPS4FO69TPzuHNSEGM2xTisBR+1aDLTU=
From: Wei Chen <Wei.Chen@arm.com>
To: Stefano Stabellini <sstabellini@kernel.org>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
CC: "julien@xen.org" <julien@xen.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, "Volodymyr_Babchuk@epam.com"
	<Volodymyr_Babchuk@epam.com>, Stefano Stabellini
	<stefano.stabellini@xilinx.com>
Subject: RE: [PATCH] xen/arm: set CPSR Z bit when creating aarch32 guests
Thread-Topic: [PATCH] xen/arm: set CPSR Z bit when creating aarch32 guests
Thread-Index: AQHYP+Pkem9qADMk0kmO09zJM2squKzPZhZQ
Date: Fri, 25 Mar 2022 02:51:25 +0000
Message-ID:
 <PAXPR08MB74201501E8AF611683A60ACF9E1A9@PAXPR08MB7420.eurprd08.prod.outlook.com>
References: <20220325010052.1597420-1-sstabellini@kernel.org>
In-Reply-To: <20220325010052.1597420-1-sstabellini@kernel.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 261C61A53DBD454C9DF9477794310C8A.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 76a4177d-42d1-45d7-8ace-08da0e0a64f3
x-ms-traffictypediagnostic:
	HE1PR0802MB2507:EE_|VE1EUR03FT057:EE_|DU0PR08MB7463:EE_
X-Microsoft-Antispam-PRVS:
	<DU0PR08MB746359C9E494B858C4A68B869E1A9@DU0PR08MB7463.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 63jwq3t6bejnXGk8tMYik6PAYxoqDttWYvox1t6EqFnTYaCyZxJbhwiDWEOyYkRkDMVIXV86snqlAYK8y9XIUs11MU77GlleeUhf7udlX40sI8LugX96+j/7xK5GvYNt1/UvKp9K7KzNiUqG9sB75uNUt6VIz8ipFlDRyJStqd6gDhOGT1QWBDhtvmksW7IfKQDyr2tWgvVLbz5foqUcnLn/k0ayI1+DQZFouckMVVdmhDCRZwSKSDQtoT7JoHrEJY1++tNwTwuxaS/kWbZMsAtxnlOhGsJ+gPIA67uYifyGtGtPFp113g7sX5Mz/QaEcIUbl8u4MlVS8DqaP19pP6lpCZidRY/+W5SYxFiYow845yvf1kL82Kryqq9+emIkWSQjhFF7PFQgtiqd4drpbOxF9tHWXVjH6JdD0VHxLHzrNCz+thEDG9KZTlds5Yfk/Asf54q+L12VAixI4O/07wxydTjEYrVcVfuSO9cRviIBX1lwjEnNCNyziJtP71c5INK9zE8AWyPzsaAiudbfgFI8uoWh9CeBrCTvqzDH9WKPh5g0o+6h/0pu/gS/5H7BQZNDZjZsqL+p2nC48wCaDDPmstwareochwJLhu+X9Yw6Boyyk2PA7c42RL9yB3hA5CfDReVmJlp/aykrVshAugy3Z6EXclpZ8x3SECtgu3j36pgUC+MGShB7FJ/TszMRKekDAVMxF9SaQh1xetpGQg==
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAXPR08MB7420.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(4326008)(86362001)(508600001)(64756008)(66946007)(8936002)(76116006)(66446008)(122000001)(66476007)(66556008)(8676002)(5660300002)(2906002)(110136005)(316002)(52536014)(71200400001)(7696005)(186003)(38070700005)(6506007)(83380400001)(55016003)(26005)(53546011)(38100700002)(9686003)(54906003)(33656002);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0802MB2507
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT057.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	e23332fa-849e-4bf0-e09a-08da0e0a5ac1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	Be2z54hFKKwMFBbOdkZoIT7191V3tUxeFJMIf5CCZg8J30tIdOy6W6enf3OOhwkjFPL6ZmmOlsJXhyoc6tcWtvRHTXx396TEYCOjE2euZ266d14F2Ez7aetOoYd1VTv6wq4FOwzG24w/EeId1vfb+ViUjsWvMJErJ/nzX7EWQFLnTFIIRWHf5SEWCWIRpWgCheFp/lGgUQG3JJoo3HwfHk3eNx8WK+UHwY0p8Dr8/FoAt/FtJIjuYMnVK2mVTYK76WQSXcMg9lpWZ5FCTQLZn0AJ+2j21C6SkoXPJhxTObNdaIbMLIGUVxqmJq3rznP3IkcHzuPsr0cg2N+nlyi68tRDBi6CszNWmR6QvQ0eTP/QdmBIvdUFskFQojSMxuzUArnDQe7C0NvVimp/acl1wlFRlTB5sEvYQTGgEx8FT99DCzUO0NYslSIYy9x0ylbJKkfeiZ2W4XAn5gA97lIJ+NJbHrPct/IaNeRXUqxrlLCohIWJv7fzLO9dhuNnNQRo6HZ/qtkQwe0hyZf05NagyFUKXr2CmkZvjf4mVxTjCOTnd7jhttMDT6EXMtMLljJwp3dKNw6mmkSxfyo2aU2Vm2l/xJ1CnggRoSVbLRS1yebEr5fVOeu697HkGk2yhHM263XWY9ADPG2eGWsamyalef9xyujDXEmJkbcFVxyg6mnUY7sFfRl2/br79bkUZ56/
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(356005)(81166007)(8676002)(82310400004)(110136005)(54906003)(4326008)(70586007)(70206006)(86362001)(26005)(186003)(336012)(107886003)(52536014)(5660300002)(316002)(8936002)(55016003)(36860700001)(83380400001)(47076005)(9686003)(53546011)(7696005)(6506007)(40460700003)(2906002)(33656002)(508600001);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 02:51:43.1397
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 76a4177d-42d1-45d7-8ace-08da0e0a64f3
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT057.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DU0PR08MB7463
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From xen-devel-bounces@lists.xenproject.org Fri Mar 25 04:00:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 04:00:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294560.500930 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXb7H-00025l-3E; Fri, 25 Mar 2022 03:59:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294560.500930; Fri, 25 Mar 2022 03:59:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXb7H-00025e-0G; Fri, 25 Mar 2022 03:59:59 +0000
Received: by outflank-mailman (input) for mailman id 294560;
 Fri, 25 Mar 2022 03:59:57 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXb7F-00025U-Sj; Fri, 25 Mar 2022 03:59:57 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXb7F-0000jG-Pk; Fri, 25 Mar 2022 03:59:57 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXb7F-00060y-FX; Fri, 25 Mar 2022 03:59:57 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXb7F-00020h-DP; Fri, 25 Mar 2022 03:59:57 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Z4TGVEuf+7BKV2T86jysp9Cr08mrMWNi6S4GN1xNavY=; b=A0HBJR8jSQkIBpDjvD7L+2X1Md
	XzF5yUX+nF48AT3RmpSgOU9fF462C7EqV1sYOUZfDlxKaFgAabKHAwsBVVgudenkeo2qJ0MDnxHOX
	B34RBMn4DyUDr8V2zGC5mhNMQ2iUEGor+jYDuKTRHdKNJdXXVelnJteQB8nD7ag4R/CY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168832-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168832: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=69218d5d2854acaa7a11c777244de4a297d2fbb9
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 25 Mar 2022 03:59:57 +0000

flight 168832 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168832/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 69218d5d2854acaa7a11c777244de4a297d2fbb9
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   24 days
Failing since        168258  2022-03-01 01:55:31 Z   24 days  249 attempts
Testing same since   168832  2022-03-25 01:43:21 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Mara Sophie Grosch <littlefox@lf-net.org>
  Mara Sophie Grosch via groups.io <littlefox=lf-net.org@groups.io>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 904 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 04:09:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 04:09:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294568.500941 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXbGD-0003mr-5i; Fri, 25 Mar 2022 04:09:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294568.500941; Fri, 25 Mar 2022 04:09:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXbGD-0003mk-2r; Fri, 25 Mar 2022 04:09:13 +0000
Received: by outflank-mailman (input) for mailman id 294568;
 Fri, 25 Mar 2022 04:09:11 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXbGB-0003ma-O5; Fri, 25 Mar 2022 04:09:11 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXbGB-0000zj-JM; Fri, 25 Mar 2022 04:09:11 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXbGB-0006OW-8T; Fri, 25 Mar 2022 04:09:11 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXbGB-0004lk-7z; Fri, 25 Mar 2022 04:09:11 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=5zDYP/zTjgD0F6tpZishnbLxQyu311vip1L9bmQxBMc=; b=l19lOLCfuH5V9mFQFrL7pfaNfv
	tOcrdFCDs6uCIuuIZqzxQ1rkm4H3sEYGuppZWHeDVSNfRc5pK32LAzW0aLuSraRMH4jfBGufswio3
	PP5/Tq8MueSB+hWFaijx0JA5L3zRwZp721crGcyHLXeSTPTNkUOJ3dxzkv8alqucNwyo=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168828-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168828: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=e309ce90a23bef4f5210a8c49d53441144be293c
X-Osstest-Versions-That:
    qemuu=15ef89d2a1a7b93845a6b09c2ee8e1979f6eb30b
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 25 Mar 2022 04:09:11 +0000

flight 168828 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168828/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168791
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168791
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168791
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168791
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168791
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168791
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168791
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168791
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 qemuu                e309ce90a23bef4f5210a8c49d53441144be293c
baseline version:
 qemuu                15ef89d2a1a7b93845a6b09c2ee8e1979f6eb30b

Last test of basis   168791  2022-03-22 23:09:00 Z    2 days
Testing same since   168828  2022-03-24 17:07:03 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Aaron Larson <alarson@ddci.com>
  Alex Bennée <alex.bennee@linaro.org>
  Christoph Muellner <cmuellner@linux.com>
  Michael Ellerman <mpe@ellerman.id.au>
  Peter Maydell <peter.maydell@linaro.org>
  Thomas Huth <thuth@redhat.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   15ef89d2a1..e309ce90a2  e309ce90a23bef4f5210a8c49d53441144be293c -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 05:42:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 05:42:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294576.500953 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXciU-0005Nc-6I; Fri, 25 Mar 2022 05:42:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294576.500953; Fri, 25 Mar 2022 05:42:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXciU-0005NV-3A; Fri, 25 Mar 2022 05:42:30 +0000
Received: by outflank-mailman (input) for mailman id 294576;
 Fri, 25 Mar 2022 05:42:28 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXciS-0005NJ-Pv; Fri, 25 Mar 2022 05:42:28 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXciS-0002yo-M4; Fri, 25 Mar 2022 05:42:28 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXciS-0001jr-Az; Fri, 25 Mar 2022 05:42:28 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXciS-0002qW-8O; Fri, 25 Mar 2022 05:42:28 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=yw1XSYRvawU6GGfx/BIJmMDUTYlK9dLrDiyXlqy/FCE=; b=FLA+pgKFArOc1RyoZsRYGdonxA
	bvlMPUjWcnWSxYph78CqZ3aLwN86icOr75zJJGFVtxWPlBJMCZL1JbD4PJoGaMLq0ne7EZc4gA8Jl
	EQ31Ah+XhP5iwO4HaUkFXxk3QunkEpGlbklQShTQLc43+JOCaM66jaXgLVH+A8rKN0Hk=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168834-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168834: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=69218d5d2854acaa7a11c777244de4a297d2fbb9
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 25 Mar 2022 05:42:28 +0000

flight 168834 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168834/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 69218d5d2854acaa7a11c777244de4a297d2fbb9
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   24 days
Failing since        168258  2022-03-01 01:55:31 Z   24 days  250 attempts
Testing same since   168832  2022-03-25 01:43:21 Z    0 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Mara Sophie Grosch <littlefox@lf-net.org>
  Mara Sophie Grosch via groups.io <littlefox=lf-net.org@groups.io>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 904 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 06:17:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 06:17:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294583.500963 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXdGj-0000cL-0y; Fri, 25 Mar 2022 06:17:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294583.500963; Fri, 25 Mar 2022 06:17:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXdGi-0000cE-TW; Fri, 25 Mar 2022 06:17:52 +0000
Received: by outflank-mailman (input) for mailman id 294583;
 Fri, 25 Mar 2022 06:17:51 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXdGh-0000c4-1E; Fri, 25 Mar 2022 06:17:51 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXdGg-0003cP-TS; Fri, 25 Mar 2022 06:17:50 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXdGg-0003Fd-FF; Fri, 25 Mar 2022 06:17:50 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXdGg-0005Mm-En; Fri, 25 Mar 2022 06:17:50 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=REW92vMtsBjiipEjClVVQ/Qe/7jctTEoP3rNesyG170=; b=lZ3knaHb4y9sQ3kb2rkU6SkRER
	QxR1ePf20SE3Iww3RchzmDa1S0QsA+pu38/wmzD1/ZAk4AdoiSxiAvssum+tSxBMlYcA+MCs85rzQ
	/9juZVsFLQ9Qkv/PTDPfBnXaLQUNkgDS/hJwnd4OxoJaBIwvyJXgShql2KQMG3m1kpH0=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168830-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168830: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:allowable
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=7403e6d8263937dea206dd201fed1ceed190ca18
X-Osstest-Versions-That:
    linux=ed4643521e6af8ab8ed1e467630a85884d2696cf
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 25 Mar 2022 06:17:50 +0000

flight 168830 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168830/

Failures :-/ but no regressions.

Regressions which are regarded as allowable (not blocking):
 test-armhf-armhf-xl-rtds    18 guest-start/debian.repeat fail REGR. vs. 168816

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168816
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168816
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168816
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168816
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168816
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168816
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168816
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168816
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                7403e6d8263937dea206dd201fed1ceed190ca18
baseline version:
 linux                ed4643521e6af8ab8ed1e467630a85884d2696cf

Last test of basis   168816  2022-03-24 03:18:14 Z    1 days
Testing same since   168830  2022-03-24 20:10:22 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abhishek Sahu <abhsahu@nvidia.com>
  Al Viro <viro@zeniv.linux.org.uk>
  Alex Williamson <alex.williamson@redhat.com>
  Alexandru Elisei <alexandru.elisei@arm.com>
  Anssi Hannula <anssi.hannula@bitwise.fi>
  Anup Patel <anup@brainfault.org>
  Anup Patel <apatel@ventanamicro.com>
  Barret Rhoden <brho@google.com>
  Bjorn Helgaas <bhelgaas@google.com>
  Bjorn Helgaas <bhelgaas@google.com>   # pci_ids.h
  Catalin Marinas <catalin.marinas@arm.com>
  Changcheng Deng <deng.changcheng@zte.com.cn>
  Christian Borntraeger <borntraeger@linux.ibm.com>
  Christian Brauner <brauner@kernel.org>
  Christian Brauner <christian.brauner@ubuntu.com>
  Claudio Imbrenda <imbrenda@linux.ibm.com>
  David Dunn <daviddunn@google.com>
  David Matlack <dmatlack@google.com>
  Eric W. Biederman <ebiederm@xmission.com>
  Fuad Tabba <tabba@google.com>
  Guo Ren <guoren@kernel.org>
  Guo Ren <guoren@linux.alibaba.com>
  Gustavo A. R. Silva <gustavoars@kernel.org>
  Heiko Carstens <hca@linux.ibm.com>
  Hou Wenlong <houwenlong.hwl@antgroup.com>
  Janis Schoetterl-Glausch <scgl@linux.ibm.com>
  Janosch Frank <frankja@linux.ibm.com>
  Jason Gunthorpe <jgg@nvidia.com>
  Jing Zhang <jingzhangos@google.com>
  Jinrong Liang <cloudliang@tencent.com>
  Julia Lawall <Julia.Lawall@inria.fr>
  Julien Grall <julien.grall@arm.com>
  Kai Ye <yekai13@huawei.com>
  Keir Fraser <keirf@google.com>
  Kevin Tian <kevin.tian@intel.com>
  Leon Romanovsky <leonro@nvidia.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Longfang Liu <liulongfang@huawei.com>
  Lukas Bulwahn <lukas.bulwahn@gmail.com>
  Marc Zyngier <maz@kernel.org>
  Mark Brown <broonie@kernel.org>
  Mark Rutland <mark.rutland@arm.com>
  Maxim Levitsky <mlevitsk@redhat.com>
  Michael Kelley <mikelley@microsoft.com>
  Michael Mueller <mimu@linux.ibm.com>
  Michal Hocko <mhocko@suse.com>
  Nathan Chancellor <nathan@kernel.org>
  Oliver Upton <oupton@google.com>
  Paolo Bonzini <pbonzini@redhat.com>
  Peng Hao <flyingpeng@tencent.com>
  Peng Hao <flyingpenghao@gmail.com>
  Peter Gonda <pgonda@google.com>
  Randy Dunlap <rdunlap@infradead.org>
  Ricardo Koller <ricarkol@google.com>
  Sean Christopherson <seanjc@google.com>
  Sebastian Andrzej Siewior <bigeasy@linutronix.de>
  Shameer Kolothum <shameerali.kolothum.thodi@huawei.com>
  Stephen Brennan <stephen.s.brennan@oracle.com>
  Suravee Suthikulpanit <suravee.suthikulpanit@amd.com>
  Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
  Thomas Gleixner <tglx@linutronix.de>
  Thomas Huth <thuth@redhat.com>
  Vincent Chen <vincent.chen@sifive.com>
  Vipin Sharma <vipinsh@google.com>
  Vitaly Kuznetsov <vkuznets@redhat.com>
  Wanpeng Li <wanpengli@tencent.com>
  Wei Liu <wei.liu@kernel.org>
  Will Deacon <will@kernel.org>
  Yang Li <yang.lee@linux.alibaba.com>
  Yishai Hadas <yishaih@nvidia.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Zhou Wang <wangzhou1@hisilicon.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   ed4643521e6af..7403e6d826393  7403e6d8263937dea206dd201fed1ceed190ca18 -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 07:35:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 07:35:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294592.500975 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXeTv-00008A-1X; Fri, 25 Mar 2022 07:35:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294592.500975; Fri, 25 Mar 2022 07:35:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXeTu-000083-Ti; Fri, 25 Mar 2022 07:35:34 +0000
Received: by outflank-mailman (input) for mailman id 294592;
 Fri, 25 Mar 2022 07:35:34 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=8PHK=UE=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nXeTt-00007x-W6
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 07:35:34 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id 2621808e-ac0e-11ec-a405-831a346695d4;
 Fri, 25 Mar 2022 08:35:31 +0100 (CET)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id B48BE12FC;
 Fri, 25 Mar 2022 00:35:30 -0700 (PDT)
Received: from [10.57.6.19] (unknown [10.57.6.19])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 9278E3F66F;
 Fri, 25 Mar 2022 00:35:28 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2621808e-ac0e-11ec-a405-831a346695d4
Message-ID: <98a6df25-8a95-3e3d-e8a9-11e948da7b5b@arm.com>
Date: Fri, 25 Mar 2022 08:35:18 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [RFC PATCH] xen/build: Add cppcheck and cppcheck-html make rules
Content-Language: en-US
To: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>
Cc: xen-devel@lists.xenproject.org, Andrew Cooper
 <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
 Jan Beulich <jbeulich@suse.com>, Julien Grall <julien@xen.org>,
 Wei Liu <wl@xen.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
References: <77c79e86050eef2b706ee11e64183d57a0f5bcee.1648119732.git.bertrand.marquis@arm.com>
 <alpine.DEB.2.22.394.2203241829510.2910984@ubuntu-linux-20-04-desktop>
From: Michal Orzel <michal.orzel@arm.com>
In-Reply-To: <alpine.DEB.2.22.394.2203241829510.2910984@ubuntu-linux-20-04-desktop>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hi Stefano,

On 25.03.2022 02:32, Stefano Stabellini wrote:
> On Thu, 24 Mar 2022, Bertrand Marquis wrote:
>> cppcheck can be used to check Xen code quality.
>>
>> To create a report do "make cppcheck" on a built tree adding any options
>> you added during the process you used to build xen (like CROSS_COMPILE
>> or XEN_TARGET_ARCH). This will generate an xml report xen-cppcheck.xml.
>>
>> To create a html report do "make cppcheck-html" in the same way and a
>> full report to be seen in a browser will be generated in
>> cppcheck-htmlreport/index.html.
>>
>> For better results it is recommended to build your own cppcheck from the
>> latest sources that you can find at [1].
>> Development and result analysis has been done with cppcheck 2.7.
>>
>> The Makefile rule is searching for all C files which have been compiled
>> (ie which have a generated .o file) and is running cppcheck on all of
>> them using the current configuration of xen so only the code actually
>> compiled is checked.
>>
>> A new tool is introduced to merge all cppcheck reports into one global
>> report including all findings and removing duplicates.
>>
>> Some extra variables can be used to customize the report:
>> - CPPCHECK can be used to give the full path to the cppcheck binary to
>> use (default is to use the one from the standard path).
>> - CPPCHECK_HTMLREPORT can be used to give the full path to
>> cppcheck-htmlreport (default is to use the one from the standard path).
>>
>> This has been tested on several arm configurations (x86 should work but
>> has not been tested).
>>
>> [1] https://cppcheck.sourceforge.io/
>>
>> Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com>
>> Signed-off-by: Michal Orzel <michal.orzel@arm.com>
> 
> Very cool, I was looking forward to this :-)
> 
> 
>> diff --git a/xen/tools/merge_cppcheck_reports.py b/xen/tools/merge_cppcheck_reports.py
>> new file mode 100755
>> index 0000000000..ef055f6925
>> --- /dev/null
>> +++ b/xen/tools/merge_cppcheck_reports.py
>> @@ -0,0 +1,73 @@
>> +#!/usr/bin/env python
>> +
>> +"""
>> +This script acts as a tool to merge XML files created by cppcheck.
>> +Usage:
>> +    merge_cppcheck_reports.py [FILES] [OUTPUT]
>> +
>> +    FILES  - list of XML files with extension .cppcheck
>> +    OUTPUT - file to store results (with .xml extension).
>> +             If not specified, the script will print results to stdout.
>> +"""
>> +
>> +import sys
>> +from xml.etree import ElementTree
>> +
>> +def elements_equal(el1, el2):
>> +    if type(el1) != type(el2): return False
>> +
>> +    el1_location = str(el1.find('location').attrib)
>> +    el2_location = str(el2.find('location').attrib)
>> +
>> +    if el1_location != el2_location: return False
>> +
>> +    return True
>> +
>> +def remove_duplicates(xml_root_element):
>> +    elems_to_remove = []
>> +    index = 0
>> +    elems_list = list(xml_root_element.findall("errors")[0])
>> +    for elem1 in elems_list:
>> +        index += 1
>> +        for elem2 in elems_list[index:]:
>> +            if elements_equal(elem1, elem2) and elem2 not in elems_to_remove:
>> +                elems_to_remove.append(elem2)
>> +                continue
>> +
>> +    for elem in elems_to_remove:
>> +        xml_root_element.findall("errors")[0].remove(elem)
>> +
>> +def merge(files):
>> +    result_xml_root = None
>> +    for xml_file in files:
>> +        xml_root = ElementTree.parse(xml_file).getroot()
> 
> 
> Traceback (most recent call last):
>   File "/local/repos/xen-upstream/xen/tools/merge_cppcheck_reports.py", line 73, in <module>
>     run()
>   File "/local/repos/xen-upstream/xen/tools/merge_cppcheck_reports.py", line 60, in run
>     result = merge(files)
>   File "/local/repos/xen-upstream/xen/tools/merge_cppcheck_reports.py", line 43, in merge
>     xml_root = ElementTree.parse(xml_file).getroot()
>   File "/usr/lib/python2.7/xml/etree/ElementTree.py", line 1182, in parse
>     tree.parse(source, parser)
>   File "/usr/lib/python2.7/xml/etree/ElementTree.py", line 657, in parse
>     self._root = parser.close()
>   File "/usr/lib/python2.7/xml/etree/ElementTree.py", line 1671, in close
>     self._raiseerror(v)
>   File "/usr/lib/python2.7/xml/etree/ElementTree.py", line 1523, in _raiseerror
>     raise err
> xml.etree.ElementTree.ParseError: no element found: line 11, column 0
> make: *** [Makefile:576: xen-cppcheck.xml] Error 1
> 
> I think we should catch the xml.etree.ElementTree.ParseError exception and continue?

Well, this is of course something that we might do but this error clearly warns us that
some XML files is not well formatted and therefore is not parsable. This could mean that
you are using some old cppcheck version. Is it correct assumption?

Cheers,
Michal


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 08:17:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 08:17:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294605.500986 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXf8Q-00050i-Lf; Fri, 25 Mar 2022 08:17:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294605.500986; Fri, 25 Mar 2022 08:17:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXf8Q-00050b-IS; Fri, 25 Mar 2022 08:17:26 +0000
Received: by outflank-mailman (input) for mailman id 294605;
 Fri, 25 Mar 2022 08:17:25 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=73hT=UE=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nXf8P-00050U-J1
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 08:17:25 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 00054d8e-ac14-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 09:17:24 +0100 (CET)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2052.outbound.protection.outlook.com [104.47.14.52]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-38-rZZTBHDzNwmuG6SLqyXHcw-1; Fri, 25 Mar 2022 09:17:22 +0100
Received: from AS8PR04MB8609.eurprd04.prod.outlook.com (2603:10a6:20b:424::9)
 by AM6PR0402MB3607.eurprd04.prod.outlook.com (2603:10a6:209:12::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.19; Fri, 25 Mar
 2022 08:17:20 +0000
Received: from AS8PR04MB8609.eurprd04.prod.outlook.com
 ([fe80::5413:50c3:f5e8:d90f]) by AS8PR04MB8609.eurprd04.prod.outlook.com
 ([fe80::5413:50c3:f5e8:d90f%9]) with mapi id 15.20.5102.018; Fri, 25 Mar 2022
 08:17:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 00054d8e-ac14-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648196244;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=CF+h87r3VZg9kM1G6vtG6dFYUB/hOYzdN73hDFP0M68=;
	b=a9n3lSxkg0x9HaHJtQ0Wf9GHeXjdhn1nWgGcsgIyknik9y69xP2l6MEmaZBMcwDx4XN0Ut
	h0yS9VqJrP1FFAgLOgH3olpO0nCA4lONzeRY75x5Kng0JBgzinjM5i+lCMkBbuHsrsf2uq
	Al+aZeakx8UAigmpuhQt8AyGDw8mbds=
X-MC-Unique: rZZTBHDzNwmuG6SLqyXHcw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=P8em4XaR33IwKATU5c2jkHCP7RF4U7VqPDDPEefDypE+pjnJSv9SvwvTz4hAULBNGzFvlBS939Rc8N39I/iKONBmjPhZ7hiab5aTes5TpKzgCIcs2bUZ5QcT/7x0+ZmjqzR1L8+1FAieXjV2zrYomF+BQjOgMXzvMFxzt56vLpIoGmsoRtVvF53+hOwSSNQjFY48BFIwZdAq/qN+okcA08umY26kKPd/7S0beGcj+OUVwxIWDSIObTu7AtHJQQAxHRWOj8MVNNXapgvLVByNvF+zgiZEcJfDXcDRm/TrVBis0RmMAlsXwiZhzJ5/auj5rQ/PhVIzUfn2W+2TyTJfBw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=CF+h87r3VZg9kM1G6vtG6dFYUB/hOYzdN73hDFP0M68=;
 b=GPk7U7m8+TDCIlhr7PgZByMHKnp0TtGESDnQfrhiZbrNBHQrrnO5FSkhk0JlikT/R8wUC3GuwAZBtinjj5/yHUs3/nFXAhLd33pLdm6AFgm+vVFjzJJFar9KI0Y/deevhrcVAN/C4y07wogQ9v2xBaWXAnBEdf+CMeJZotQlcswHdVmbY0MCJcXxZPwq/gxhB8k6KahZNqZitItv3j4p4Lgu24J7Qg1TUcKSsYgBAdvZoC+BI7SryBUUmRSYKIIQjotHGsardaayBt5NMGIu5tgHwRyVJewoK4H5j0cwl9n2KHxZVJ0h81t9Q/lfyfICbdjjCjPvp0SArsCE/XZ+uw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <319d05ee-d750-0f49-dc10-fa0725f8d9bd@suse.com>
Date: Fri, 25 Mar 2022 09:17:17 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v3 2/5] xen: make evtchn_alloc_unbound public
Content-Language: en-US
To: Stefano Stabellini <sstabellini@kernel.org>
Cc: xen-devel@lists.xenproject.org, jgross@suse.com,
 Bertrand.Marquis@arm.com, julien@xen.org, Volodymyr_Babchuk@epam.com,
 Luca Miccio <lucmiccio@gmail.com>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 "Daniel P. Smith" <dpsmith.dev@gmail.com>
References: <alpine.DEB.2.22.394.2201281330520.27308@ubuntu-linux-20-04-desktop>
 <20220128213307.2822078-2-sstabellini@kernel.org>
 <2f05e63a-96c3-e78f-f7e4-36fd17fcd58c@gmail.com>
 <alpine.DEB.2.22.394.2203221711110.2910984@ubuntu-linux-20-04-desktop>
 <c57dc9a9-e2ca-74c6-4fde-e2a6f1400de5@suse.com>
 <alpine.DEB.2.22.394.2203241522510.2910984@ubuntu-linux-20-04-desktop>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <alpine.DEB.2.22.394.2203241522510.2910984@ubuntu-linux-20-04-desktop>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8PR05CA0022.eurprd05.prod.outlook.com
 (2603:10a6:20b:311::27) To AS8PR04MB8609.eurprd04.prod.outlook.com
 (2603:10a6:20b:424::9)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: a612ad75-2a60-418b-47b0-08da0e37e1d3
X-MS-TrafficTypeDiagnostic: AM6PR0402MB3607:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<AM6PR0402MB36071DA5402391BD4FDF4592B31A9@AM6PR0402MB3607.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AS8PR04MB8609.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(83380400001)(186003)(26005)(6666004)(86362001)(2616005)(6486002)(2906002)(4744005)(4326008)(38100700002)(31686004)(8936002)(31696002)(316002)(6916009)(54906003)(7416002)(5660300002)(53546011)(66476007)(8676002)(66946007)(66556008)(36756003)(508600001)(6512007)(6506007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?cjJEZzFQZDkyTlg0aGRwVk1LOU55M2JVbnUyWjVxbjh4dGlOQ3RtNmFqQ0ph?=
 =?utf-8?B?bWx4SEpnVWR3NlpDMlNSb21URkhVcFJmUjVsWml6RFdrNVlZeVU4SXBzYUtt?=
 =?utf-8?B?YWM5WTNRY09VbVQ1c2d4UitmK1lMTVc2V3JHVDBRdHFpMXVkRTh2ZzhLTmJx?=
 =?utf-8?B?ZG9kKy9QRGlPd3J1S0dFOU40WElzeGxhN3Vacjc2VDI1bWlYM1RHYTdTRkJo?=
 =?utf-8?B?ZXBFQnpuTTNINXNROHZkQUFhWDNWWEdzdlRDSXRjYkVOME10d0FadlUyTmtP?=
 =?utf-8?B?RHRocy8yTEFCUEROcVk5T0VYdGdpUGFCbjFHSGIrREIxUTU0NEZjdzU0SWls?=
 =?utf-8?B?YlNCVURYTGJxOE9XbjR3MFUxQWN3R1hEYmhCRUU2OG1ob3B2UlNGL05hWWxL?=
 =?utf-8?B?Q25objR4N2FHWis1d3RTbkZkbldOMkR3QVFGdTFPOUdhNmNtV2RrRDVWUlMv?=
 =?utf-8?B?Tm84eDVCNmwwWVEzd1BwN2k0czg2MkF6SEJRWjhLVlJlWmxTLzMwam9XdjQw?=
 =?utf-8?B?MTlmMHRubGVXSHM1enlsbG1tVVVhdmpXcnpwNEdENVYvSHBKclBDRyt0Vzhn?=
 =?utf-8?B?b2RiOXdpaDBjOStpT2xJRERFTUxoM0Z5Q05uTTFrSG9RVUw5TzNwWEpmYURN?=
 =?utf-8?B?S2dRbWNZRXNhRCtWRFBLTEdTSW5ValA0bnQ0VFVuTGppb0MyTUpIUGR1Ymh1?=
 =?utf-8?B?cHFtTGRIS2NkZUtMUmw3QXVFMFFDVnU2ak1GQWMxbjg2UWdiR1RWb2ZWRm9M?=
 =?utf-8?B?b0pMeDNFOEJob0RLL0x0cFdzTGtadnhyWUtQR1hsYnlRc3p2UHJtOTZXazNi?=
 =?utf-8?B?ckF4TEI0TjF5cGxwYmt4Q0N4Nmc1WEtBTkYvd0VaK2RoUkNneDd3NGJ3Y2Rm?=
 =?utf-8?B?eFJNRW9aWmNmaWdOV2k3N01WTm5MemRmczRyalQxTXBnMmZJOUFnWnAzZ1F5?=
 =?utf-8?B?WFpiMG4yQVhnOXRXL2x3TXZJdnIvYXB0c21vVG41U2ZKS2NEZ0d6dUwzRUd2?=
 =?utf-8?B?L1pNOU0vK3JMOVRPOEJWTWtQMkpxQWcwc0lpaExHV2toMFk1aC9tSzJlQk5u?=
 =?utf-8?B?dUJTbnROSFJxVmRZc0U1WklpNDR2Z2dGanFSN0l5bDVYSU5waFBsRnZGUUdN?=
 =?utf-8?B?UDIwbzlIdmgwd1oza1RWMlU5WnJqd2ttcGVHNVBXa2d0Y1czL2h0OEt2TlFV?=
 =?utf-8?B?L2lSa3RyVEVGYlkvNi9ncFdOT3hRemZUcUwyMXhFZWpCMElWVXFsNjRlUGhj?=
 =?utf-8?B?cnhWbVB3NGNTbUxwT2dONXhhdXE4NmtBWnpucjR2QXVGTVU5QjBWMmJmYW1a?=
 =?utf-8?B?aEZzMTIwQzBGRWJMU3ZLMnJtNXBjN00xbWRxMm5OUEhtclZQZmlZS0I1L1dF?=
 =?utf-8?B?aU8xQTAxc2UzWjA5VEhHcTVwdlNRSkloZ3hNLzRCQmE2Q0ZiZG5MT002SXFt?=
 =?utf-8?B?eXA5QVEydGVMNVhhV0hMYWlEa2FKWmluUkdReWQzcTI2UWpOcU0xaVpydEpj?=
 =?utf-8?B?dEtFbWUyZkt3T3JrOHNJM25EMWU0czdvVThSSjIxZHVVSHhLdXFJSnFub0NR?=
 =?utf-8?B?RnIyRnRJeWNjOGpOSlFmck1YcVZyRVpxZVkvMjBoZ1pWV3pNcm5OL2pzSkMv?=
 =?utf-8?B?bXpSUHRwUlZYY0JrRlZUcWRYSDZkb2liNjZDNTBXaWpLdWVKUEV1clZMQ05k?=
 =?utf-8?B?WkRCSEY0amlRd3ZCbzdFMFJOdUpOalNQeWV1aTlNdmhpL1VsUklXeURPN1Nw?=
 =?utf-8?B?U1cwUE8rSklyMU1COWJtdFgyUnljR3BoU0dtSUpXQ29zZDVqbGlONzZhNmlU?=
 =?utf-8?B?L3dQdlRpOEFMSG1DMXlsdnJ4QUNsUzBPM3UvQ2UzWGc3YnRLWWVyY0lENmJZ?=
 =?utf-8?B?ejBBeEwzZEJua3A1REI0ZjRQTlprTlFyOFRPOGMxOGN4SzI1YUMyU0k5SXFP?=
 =?utf-8?B?eVF2TmNEWE9CZlRvRkZmdTNVU3BnZXc0QkNFMVJLWlJ1ais5ckEwbGdPcVJs?=
 =?utf-8?B?K3VzQ1BEUHhXUXNrV3puMTNvZzlZT29Vem13U1Urd2xQU0ZvRkxqQTJGZXNn?=
 =?utf-8?B?MTNVZU44TkNsSnB4R2ZnbFgyMFcyVlJUMDN5SGU2a0VoNzI0MDd4TXgxUk1k?=
 =?utf-8?B?TDNMNExNQkxHRDhyNlhmRXk5ZmFiclFFdENmY2FTRUpmeFZUUWxtNzhTRjVs?=
 =?utf-8?B?b2hIL2JKVmtpTDJNZjFwNVMzSVBtMTlmZWZLZzJlMXdVUVVyUGFJTm1iK2Ji?=
 =?utf-8?B?bDk2U09UeGw5WDRYaHdKMzFwNEV2TWNyMkVUU1BsN2YwQ1lsc1dyRUZqUG45?=
 =?utf-8?B?RFp3aTNTcEoyaGxtcTdacUw0dlNteDNYdXpBYnQ4dDRNYTVVMU5Sdz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a612ad75-2a60-418b-47b0-08da0e37e1d3
X-MS-Exchange-CrossTenant-AuthSource: AS8PR04MB8609.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 08:17:20.3712
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: b9tRtVgV3xqSxXCZIIbabDfWGrpSc3+ySWMr8+xWSHKhTny6VyZm2QzXuC7/zreMbgJcW1yW7PT3LP02jEJq8w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR0402MB3607

On 25.03.2022 01:30, Stefano Stabellini wrote:
> Maybe, instead of exporting get_free_port, we could create a new
> function in xen/common/event_channel.c and mark it as __init? This way:
> - we don't need to expose get_free_port
> - the new function would only be __init anyway, so no risk of runtime
>   misuse
> 
> What do you think?

Maybe. Such a function would want to serve both your an Daniel's purpose
then.

Jan



From xen-devel-bounces@lists.xenproject.org Fri Mar 25 09:00:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 09:00:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294611.500997 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXfoD-0001fy-Or; Fri, 25 Mar 2022 09:00:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294611.500997; Fri, 25 Mar 2022 09:00:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXfoD-0001fr-LY; Fri, 25 Mar 2022 09:00:37 +0000
Received: by outflank-mailman (input) for mailman id 294611;
 Fri, 25 Mar 2022 09:00:37 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+r7I=UE=citrix.com=prvs=076f4df05=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nXfoC-0001fS-L7
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 09:00:37 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 068186c9-ac1a-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 10:00:34 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 068186c9-ac1a-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648198834;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=KGJcgsO64qsJJFKMoggAA1zxd+7HBN+K1Dlma3MYnaA=;
  b=B0eHUrKCt4dNZQ4Z/MnT0HVkZnxeNNy68lBoGRkJm5YkTBD7L2Q3cXp5
   ozqwU/p91+oE43RIXJnAJRP0ar3YlQ/6IP2sOuxjbBNdtwMS+6j8KNjeE
   EhT+EtwYz3Oa8SnLH5gG3he0Y1Eu4f6Bw4Nc8YsEPKUVPodGbHG5GSwDW
   M=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66595512
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:iaaNkasQ/KVgICxjOB1OmSBBWufnVGNeMUV32f8akzHdYApBsoF/q
 tZmKTqPOPiKYTTzeN0kPtyx909V7MPSm943Hgc++HwzFS8Q+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jX5
 IuryyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi8LH4jPmbhAWCJCAhtMOapM4eDZC0iG5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AO
 ZdINGc2NnwsZTVdMVkOFMI4nNy5n1jkQTpmhmKPiZc4tj27IAtZj+G2bYu9lsaxbdVYmAOUq
 3zL+0z9AwoGL5qPxDyd6HWui+TT2yThV+o6EbSi8/dwjV67x2oNCQYXX1+2vfm4jEGlX9tVb
 UcT/0IGoaU39WSqSMf8RByypHOYvh8aVMFUGud84waIopc4+C7AWDJCFGQYLoV76olmHlTGy
 2NlgfvLJBlsseHIQkmH542mqTS4IHcLB187MHpsoRQ+3/Hvp4Q6jxTqR9llEbKogtCdJQwc0
 wxmvwBl2exN0JdjO7GTuAme3mny/sShohsdvF2/Y46z0u9uiGdJjaSM4EOT0/tPJZ3xorKp7
 CldwJj2AAzj4PiweM2xrAclQenBCxWtamS0bbtT838JrmXFF5mLJ9w43d2GDB01WvvogBewC
 KMphStf5YVIIFyhZrJtboS6BqwClPa8RY24C62KP4EUOfCdkTNrGgk3NCZ8OEi3zSARfVwXY
 8/HIa5A815EYUiY8NZGb7hEiuJ6rszP7WjSWYr633yaPUm2PxaopUM+GALWNIgRtfrcyC2Mq
 oo3H5bamn13DbylCgGKoNF7ELz/BSVibXwAg5cMLbDrz8sPMDxJNsI9Npt9JN0/w/UEzLugE
 7PUchYw9WcTTEbvcG2iQntidKnuTdB4q3c6NjYrJlGmxz4oZoPH0UvVX8ZfkWUPnAC78cNJc
 g==
IronPort-HdrOrdr: A9a23:fDbUqqoYiVMt1RjVzoiU9SAaV5vJL9V00zEX/kB9WHVpm5Oj+P
 xGzc526farslsssREb+OxpOMG7MBThHLpOkPMs1NCZLXTbUQqTXfpfBO7ZrQEIdBeOlNK1uZ
 0QFpSWTeeAcWSS7vyKkTVQcexQueVvmZrA7Yy1rwYPcegpUdAZ0+4QMHfkLqQcfnghOXNWLu
 v52iIRzADQBkj/I/7LTkUtbqzmnZnmhZjmaRkJC1oO7xSPtyqh7PrfHwKD1hkTfjtTyfN6mF
 K12TDR1+GGibWW2xXc32jc49B/n8bg8MJKAIiphtIOIjvhpw60bMBKWqGEvhoyvOazgWxa2+
 XkklMFBYBe+nnRdma6rV/E3BTh6i8n7zvYxVqRkRLY0LvEbQN/L/AEqZNScxPf5UZllsp7yr
 h302WQsIcSJQ/cnQzmjuK4GC1Cpw6Rmz4PgOQTh3tQXc81c7lKt7ES+0tTDdMpAD/60oY6C+
 NjZfusqMq+SWnqLkwxg1MfgOBFBh8Ib1S7qwk5y4GoOgFt7T5EJxBy/r1cop8CnKhNP6Wsqd
 60d5iAr4s+PfP+XZgNdNvpfvHHeFAlYSi8Rl56cm6XXZ3uBRr22uvKCfMOlaWXRKA=
X-IronPort-AV: E=Sophos;i="5.90,209,1643691600"; 
   d="scan'208";a="66595512"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=iK1GwwhO/UKgn0nUAsj26HnJzHzeALcyLbdxw289KtsM+hJkeJW0I9RzGlQzqmTKBpdTSg6ruibcxMpIy/fSXjrJ8PPuk9hcrBtD8iZwPJ9nlHmaGZVrU5LiGEMC/iVLJEzxGAdNb0t4TQCJ2HX1g8fcwDsvtcXwS3OaHkLgmw7Kl8JmdB5m0uxmUPFyOFlhMXsZp+a5sKzWVTPBEC0tYU0OgndhYjFny0s3yDgGDxypDVfHYBbpmqbscEfL4SWPMpVsNmZY91sOeYmgulX3xSUssdrtR+C+ojvL2eD2OHFOkGdnXs8GPH2ok7miXKYCFeMmbuSoHgMfeMxiOCeFyw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=IkH/P3RPwONYcKuAq9AFwoAhMwpiA/9LWO+la21VbTo=;
 b=Yc9ykyctkQBvvufxJ7n0P6aQkQSNMPgIubAA2Q37eF28aUTHMbdH2ujq0n/QyRGDAu+TwUV2qmdxfPpC697aOSPRHCtXVvovKse4p2QJNDSQJUE6qHdo+3BCPhVw2k5QomDDGlNL/5JgVjSmcphTIScX+2s2z89FauBuwj5Wpuk2bLat5tp4LREftKBRqpz2pGlG5yxiML6ZSMhl990TbGR4ZNKHrJ5K9X92dUQKgY6Iy35GM1jq1K9yYIzjOgJjk+GhmFkbqyRKl0w5JlKHbJUXuH8MBv62IfV9AfMlbOIq0TBZ8nCZon6IvpmwQri7XKmVzLfTmkbGuPuvBP2LUg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=IkH/P3RPwONYcKuAq9AFwoAhMwpiA/9LWO+la21VbTo=;
 b=MthAOMVPGete7QvQCbgc7vKO0qjYzDhKAPd84po0K/0z9vq2z7Hh0WVe0L3E3iK1ZYtFwOeUojbCJDoS63ROvOrvSwsJQ4za3Y5eIwIYSmi4w3DmJ3zU++c1LKGEVh27OYpibMM3V72BPtzP50Yj2EfdQuVF1qtSktehZuPdJYs=
Date: Fri, 25 Mar 2022 10:00:21 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Demi Marie Obenour <demi@invisiblethingslab.com>
CC: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?=
	<marmarek@invisiblethingslab.com>, Xen developer discussion
	<xen-devel@lists.xenproject.org>
Subject: Re: Support status of OpenBSD frontend drivers
Message-ID: <Yj2EpXuND9EOI3GA@Air-de-Roger>
References: <Yjx4kNv7hG4FGGot@itl-email> <Yjx8G5tH4Xf8+oVx@Air-de-Roger>
 <f101f6f6-d6d3-4877-20a4-ebae0130c756@invisiblethingslab.com>
 <Yjzu0Zz8HCu/9mFg@mail-itl>
 <5e090f73-3a44-04a4-3668-da9c3dcd2fb9@invisiblethingslab.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <5e090f73-3a44-04a4-3668-da9c3dcd2fb9@invisiblethingslab.com>
X-ClientProxiedBy: MR2P264CA0175.FRAP264.PROD.OUTLOOK.COM (2603:10a6:501::14)
 To DS7PR03MB5608.namprd03.prod.outlook.com (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 8da24480-23d5-4336-3d24-08da0e3de79c
X-MS-TrafficTypeDiagnostic: BY5PR03MB5218:EE_
X-Microsoft-Antispam-PRVS: <BY5PR03MB52186C43B69591C7EE54E15C8F1A9@BY5PR03MB5218.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(508600001)(83380400001)(6916009)(6512007)(54906003)(9686003)(8936002)(82960400001)(85182001)(5660300002)(2906002)(66476007)(66556008)(38100700002)(4326008)(66946007)(53546011)(316002)(8676002)(186003)(66574015)(26005)(86362001)(6666004)(33716001)(6506007)(966005)(6486002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?bDY0UmJySU9OOGdSbGxEZDN3Ti9VUU5LWWREalBVc1k0Zi8rU0NHRUczeGVi?=
 =?utf-8?B?RG0vZ2REWFJwYTdEcmgvNlJtcHhxWldjcSsxWXhKTGhiaTZyOXBDeFdFZTdY?=
 =?utf-8?B?WmRXUUlHVGdDc0grZkZyQVg3eVIyTnRVZ3JRMFdqeWZ6SndKYXBjTzUxSlJR?=
 =?utf-8?B?eXVBb1JlcGVPRkR2cm1aOWpyQzY3cG5tYTkyRTIxQ3owc0x1QWRTYkozNm1G?=
 =?utf-8?B?NlpueFFHKzN5WFF1MXA0NHE5V0M5d0kzbnpnN2l2Ry9PS0cvS1VDcTByTnZM?=
 =?utf-8?B?VnpQNTlpWWxhbHl6aHpGU0p1aUNQVXBnRDU0Qyt3OHQrUUNnYS9SRk1vMENs?=
 =?utf-8?B?TTdVdVNOMnpQenRVUXRqbjRkQnpxeEFCckFJa2VnSVdxcTB5ZXlROFArbkNF?=
 =?utf-8?B?aXVlMzFJVkdkeWRQcEs1cTF2bzVtUDlUMFZhQnVicHRlU1o3Um95Yk43eVlZ?=
 =?utf-8?B?dUJGMFROZDQ1SDQwTHVGaVVxZUR6K0JoMUNvUFFsLzNFMXJDNUJoOS9YRzVR?=
 =?utf-8?B?dDMxcjZ0aGtTS1FUNlR0MDNTWGNYTWcrVmlpYWw4SEFITE1mbHhrcXJ1dFJp?=
 =?utf-8?B?QSt4Q2ZObE9yNUoyckNtbHkrelRRY0krdW1QL1pROHNHSDh3elhZZ1FXMGN0?=
 =?utf-8?B?VU9uVnRPam9jNkRUWUxwRW9wL3FmYXpFNC9iR014SEZXZTFFNkoyVytFMStp?=
 =?utf-8?B?R0FKTEJGVEtZcWIybGZlTk9lLzZKNDBHVlNEcUtKS1NQTk9uYlIvRzR5bldw?=
 =?utf-8?B?Q3VKbEZ1MmRZZ3NieGdDZkdQYi9mOCtpU3NMZWM4QlBWWFVXYTVpQTBHNkFn?=
 =?utf-8?B?czVzOStidEgrYUhlZEhNckYvTkxvL08yUWtleXFnQTNBSW1NZmUrcmY4WWVX?=
 =?utf-8?B?ME9jdmtlQTQ4enNyVm1qbWJvWW9FTHR2R2JVVDh5a2IySEMvTlI0WDFhV2Fm?=
 =?utf-8?B?emU2TDdhc2xEMkdFVEdIWWpxS1pXVjFtbWZoYjFQMTlaMWdNbVJ0bWpoK0tQ?=
 =?utf-8?B?N3pCa3NHVGJRZElURUdscUZEMnBDSU83cVZ3cE9JRmNTZ05mdW9VZzJYd3l2?=
 =?utf-8?B?VWdoOE5aR1M0T3I4dy9rQ0lDSDkrRWZqWHB5NE9Fd3cvcnhZQU9CZjltNS80?=
 =?utf-8?B?d0dTYWVnWkdVV3ZOYTBaWW9ZQzA2V3QreGdwSExlQzlERE5iUkdUNFQrLzJq?=
 =?utf-8?B?WDhNeEdMLzA3SGpseDZUajZ6MUpjbmRpNXlpQnA4a0xOZzBYZ3dKN3Z6cjgv?=
 =?utf-8?B?aytjdi90RkozblFIaS9PaVllS0ZyV05PRXkxS2hLY29aSDJNbjRwSWI3WTd1?=
 =?utf-8?B?Umh5bytGQzZOSHVWelgwVEpFbHA0L0trZ1Y0d3hseG5MalAvYmdEd2FRSUdT?=
 =?utf-8?B?KzQyUjRZZ29iQXI0eTVMNmZabEN1MDlMZUxkS21yK1dTQ1ljMXR0WkhqbUNL?=
 =?utf-8?B?U1NEUWdyODVwK3ZZRVJpdnpnRWpEMzBzcllQdk5mSTdCMi9PVUhPTFZzL2FQ?=
 =?utf-8?B?ZkxsZ2dSbHVPVHV2WUEyNW5WdEtXWG9RK05pZm8vUlpSTW5vUG4wTzBJdThv?=
 =?utf-8?B?U08xVkpRcjhhK0pYQldxdnJRS0V4ZU4wMjU2VGZNa0p2bzRMMWQ3bzc0VExk?=
 =?utf-8?B?TGpFWlhBZnZjd25sZGwyUDN5dTBraWpHSndvcXVNRzFPRjJla2tUaitTQWE0?=
 =?utf-8?B?K1puRFFnMHBsWmdlaTdWRFVvMjFLUzNsQkdEaDIyRTZpVXRhRDcvSjNNZW9L?=
 =?utf-8?B?NlV5dTE2a0krQU1oeFZuTHpUWkd1dFVBM1MrTnRrWHNKdWFFMnpiajREUkM2?=
 =?utf-8?B?RUpCZTQxeXFnUzAxQnFEUUdWcW1OUW4wclNwZlIyci9YOUdEeUsvUVRnby9a?=
 =?utf-8?B?ZlpOZGh1aUxXeTRTM1lBK1NJUjVMYVBMRlZ6UFlKL1dwOTlxSmN0RVFIdmN5?=
 =?utf-8?B?ei9wTjZzWEFUNGJuamEzdGdhcXI5Yk1XUkFHM0dtN2w1bVJhRFp3SkpzbGFr?=
 =?utf-8?B?WjUzcVMrZzBjL0dydHhGRVl0TkhRQTBGL3hRbzZLcmMrSEJCL3JhMktPYVI3?=
 =?utf-8?B?YWhVMmtKUUFqdmdBRUQ5VndSUlQ3SGM0dWZLRUlPNUEvajZxWVFPVlZlNlNT?=
 =?utf-8?B?YnJFcEF5dFRUT004UkdQelc4WXpKOWE5Z2FUTnJIekZQNzZlUktDZk90d3ph?=
 =?utf-8?B?cWNyb1dsWmFQam5QZDBWbGpueGsyczZPa0dlN01PR2N6dlc1Q3hyeVJodUMr?=
 =?utf-8?B?a0xlK1pqNXhJaThCeWFsVUZUMW96R3BMaDhtM3QzRVBuVEtkQ0FKSXZCSnpz?=
 =?utf-8?B?QlJ0SDBURXNlaHpSK0dhdzNPaVZDRmp4cXhNalIxM3pGUFRMbEVsWmt2cm85?=
 =?utf-8?Q?ZN9gSo1jMx18LOK8=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 8da24480-23d5-4336-3d24-08da0e3de79c
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 09:00:26.9010
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 6CDO5iGS7f4sQOjcKO4E7XERIcvCtEiVWJ9+uiDYleh03mAgJVsvt//s0snrXa8Sx2ASvSJ0bHBrW6FHd920Qg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR03MB5218
X-OriginatorOrg: citrix.com

On Thu, Mar 24, 2022 at 09:10:57PM -0400, Demi Marie Obenour wrote:
> On 3/24/22 18:21, Marek Marczykowski-Górecki wrote:
> > On Thu, Mar 24, 2022 at 11:49:14AM -0400, Demi Marie Obenour wrote:
> >> On 3/24/22 10:11, Roger Pau Monné wrote:
> >>> On Thu, Mar 24, 2022 at 09:56:29AM -0400, Demi Marie Obenour wrote:
> >>>> As per private discussion with Theo de Raadt, OpenBSD does not consider
> >>>> bugs in its xnf(4) that allow a backend to cause mischief to be security
> >>>> issues.  I believe the same applies to its xbf(4).  Should the support
> >>>> document be updated?
> >>>
> >>> I think that's already reflected in the support document:
> >>>
> >>> 'Status, OpenBSD: Supported, Security support external'
> >>>
> >>> Since the security support is external it's my understanding OpenBSD
> >>> security team gets to decide what's a security issue and what is not.
> >>>
> >>> That however creates differences in the level of support offered by
> >>> the different OSes, but I think that's unavoidable. It's also hard to
> >>> track the status here because those are external components in
> >>> separate code bases.
> >>>
> >>> Could be added as a mention together with the Windows note about
> >>> frontends trusting backends, but then I would fear this is likely to
> >>> get out of sync if OpenBSD ever changes their frontends to support
> >>> untrusted backends (even if not considered as a security issue).
> >>
> >> As a Qubes OS developer, I still think this is useful information and
> >> should be documented.  For instance, if I choose to add proper OpenBSD
> >> guest support to Qubes OS (as opposed to the current “you can run
> >> anything in an HVM” situation), I might decide to have OpenBSD
> >> guests use devices emulated by a Linux-based stubdomain, since the
> >> stubdomain’s netfront and blkfront drivers *are* security-supported
> >> against malicious backends.  I might also choose to have a warning in
> >> the GUI when switching the NetVM of an OpenBSD guest to something other
> >> than the empty string (meaning no network access) or the (normally
> >> fairly trusted) sys-firewall or sys-whonix qubes.
> > 
> > I'm with Roger on this - when security support is external, such
> > information in xen.git could easily become stale. If anything, there
> > could be a link to OpenBSD security status info, maintained by whoever
> > such support provides.
> 
> This ought to be on https://man.openbsd.org/xnf.4 and
> https://man.openbsd.org/xbf.4, but it is not.  Should I send a patch?

You should discuss with the OpenBSD people I think, I really have no
idea where those limitations should be listed. Introducing a man page
'Caveats' or 'Limitations' sections would seem suitable to me, but
it's ultimately up to them.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 09:04:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 09:04:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294615.501008 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXfrn-0002Mg-Eg; Fri, 25 Mar 2022 09:04:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294615.501008; Fri, 25 Mar 2022 09:04:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXfrn-0002MZ-9i; Fri, 25 Mar 2022 09:04:19 +0000
Received: by outflank-mailman (input) for mailman id 294615;
 Fri, 25 Mar 2022 09:04:18 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=73hT=UE=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nXfrm-0002MT-4A
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 09:04:18 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 8c82ffc6-ac1a-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 10:04:17 +0100 (CET)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur01lp2054.outbound.protection.outlook.com [104.47.2.54]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-9-sYkEmkfjOa2LmG-XreTRJw-1; Fri, 25 Mar 2022 10:04:15 +0100
Received: from AS8PR04MB8609.eurprd04.prod.outlook.com (2603:10a6:20b:424::9)
 by HE1PR04MB2969.eurprd04.prod.outlook.com (2603:10a6:7:1c::23) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17; Fri, 25 Mar
 2022 09:04:12 +0000
Received: from AS8PR04MB8609.eurprd04.prod.outlook.com
 ([fe80::5413:50c3:f5e8:d90f]) by AS8PR04MB8609.eurprd04.prod.outlook.com
 ([fe80::5413:50c3:f5e8:d90f%9]) with mapi id 15.20.5102.018; Fri, 25 Mar 2022
 09:04:12 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8c82ffc6-ac1a-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648199056;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=MRId9/P8+thvn1M2YI6hr0OA7Vd58ZC6sg5a9lbD7UQ=;
	b=B3ZrMb8NwmNFs+6YwXwEDurX8BX8N5lvrH6Z2cehDQp3aEuyyn+adoVSmzkj/xGxRQgdQK
	JMnJu9H/EFm6v1RwwEmJQMkX4jJov0RexoNeOe0jnRudfsROcrlKQzdolvBlvvDgsyxyx/
	GxJiZqvj65o6kenRgjZPC/fRccmjH2o=
X-MC-Unique: sYkEmkfjOa2LmG-XreTRJw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Kq3bwcpp/2G4Qfv5ln/OglqmWcTbSc+ybS93rbTDXZdpr7BZc6oQ06kFl9pMk02hFp1zPo8LczJv4fHwuq8uhfg6y6GZ2oRgVje+jE8bkdtx95zXSd2eP44gqyv54E4nfRVoE93h2LKWDBPyXU3y+2qq1CbTayXSl45fVE+bOn0sO85mxasOHrhMOb9MAUFk4tOY9CFIh4dfV9BSGyF7X/bXOqVzULKD+E194fNALwJvkQ9tg7FfUlzyo1V6P5p1DukW6XxBFGbqHK/PlKkJG7jXLJsprAw0Dtu+Ifq9K8pCSAyMPAd6S3n9JMjkLb2QisSXHqjW0I5Divpm1IVd0Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ZJ8l/2BcuZozdEUVZ7R72SwDOUWwjW+dyVeQZT/kfFY=;
 b=GNiDVG+KVIu1HL/J5abPdmQ8AN/XcY1uhoQD0pBXa6hHMUrAwBXiJkihvE+IH2lkWoMh8A1CfqNBpOuLcKNznEWDQPxZzxzHt9mmicfvmnbPDPz12GsnTxJC7of3UBc1s7PIe30lenAZ9w/ME2q1lMyth4kGuMnN2BxvIJQKGQMtryqlmsGeZEMH/5T2+emBzlc7yagoI3q+hE0HtZbNFSQeWd3NPyinHNJ5Yo7BvX3f3ODfdumzjS4JVK0+4D0uB7TH7MXLVxRkt1eU2qonPH76BohkFeevcUHEJf+kb+fT8WqS5MKaKMYxriAnA5oYXf3VAy4ecJCA50aEGBcPUA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <1bcc54d8-e766-1d53-6bc8-bd67f8838d73@suse.com>
Date: Fri, 25 Mar 2022 10:04:09 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH 3/3] x86/mem_sharing: make fork_reset more configurable
Content-Language: en-US
To: Tamas K Lengyel <tamas@tklengyel.com>
CC: Tamas K Lengyel <tamas.lengyel@intel.com>,
 xen-devel@lists.xenproject.org, Wei Liu <wl@xen.org>,
 Anthony PERARD <anthony.perard@citrix.com>, Juergen Gross <JGross@suse.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Alexandru Isaila <aisaila@bitdefender.com>,
 Petre Pircalabu <ppircalabu@bitdefender.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
References: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
 <fb437a16517d343ba3432aa64b9e14b34630a750.1647970630.git.tamas.lengyel@intel.com>
 <YjySMjegTNFBE5RK@Air-de-Roger>
 <CABfawhnnAehxaByyncaYAjSSbddJi8yeTnjcXX_a+st8Q+C_+Q@mail.gmail.com>
 <YjyWW2CkQv1ckvXM@Air-de-Roger>
 <CABfawhn-QiUBuq9c4tzr=9nL=J-ntm1hf23mbeRu-qCAKRDj1Q@mail.gmail.com>
 <Yjyfygi6pE+UVhjM@Air-de-Roger>
 <CABfawhkQoOnKv7OWNus0WBY4CjX+1uU1ZeZgQ-mU-sRtQFE3QQ@mail.gmail.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <CABfawhkQoOnKv7OWNus0WBY4CjX+1uU1ZeZgQ-mU-sRtQFE3QQ@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR06CA0144.eurprd06.prod.outlook.com
 (2603:10a6:20b:467::10) To AS8PR04MB8609.eurprd04.prod.outlook.com
 (2603:10a6:20b:424::9)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c729e28f-1f64-4990-8035-08da0e3e6dc4
X-MS-TrafficTypeDiagnostic: HE1PR04MB2969:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<HE1PR04MB2969E51113066F9B2B565560B31A9@HE1PR04MB2969.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AS8PR04MB8609.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(8676002)(6486002)(66476007)(508600001)(86362001)(31696002)(316002)(66946007)(6916009)(54906003)(66556008)(4326008)(38100700002)(83380400001)(2616005)(186003)(6512007)(53546011)(6506007)(36756003)(8936002)(7416002)(26005)(31686004)(5660300002)(2906002)(6666004)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?qihxHjh0lgvRiLLeONTFZ7PcdTjlD5YzITxh6fhj9uuFqR0rgzKDOvzbf0Nq?=
 =?us-ascii?Q?9UTvNTJoSt1My+OulIIg1eLUpFtkDkl91/ZByoZ8tB+gsPRxqCYE8HeN6VJ0?=
 =?us-ascii?Q?kX4PxHH268gkUte1MpMAHZ+E+py6yFMuc3HZkAELV7bfPV8l0mAqjgzLHaIO?=
 =?us-ascii?Q?cShS/vPFCr1pKYikLlZcVja9qiWh6siMR760a2iTdh/60Pk0f9MPwg9hA37E?=
 =?us-ascii?Q?uYZIcV+XI2zqZmku/k+ijeD6qPPkavY949WndA/nTX2zcZs1F+9rorhUDsSF?=
 =?us-ascii?Q?VyXoG2PJJFSdPeYkBMwp3YiX9n809UDrpzAgzEAEbRAvYuDrapUP46XIX2AG?=
 =?us-ascii?Q?JLSsOf4g/ugKDSNMYNaDUbPH/xtP+QxW9vJV9fG5PQJiRRgcPxPC2BPPzH1e?=
 =?us-ascii?Q?6sJ8OGyiQqKrAg2CvEvAeIra49b7U+n2TjNDFcy2Dej6FkxEfgezNFPWkW8I?=
 =?us-ascii?Q?Tmo3NT7qBxwNtGmty84QVTSvdNd5dWpXY93r/xP/nMl/sDwuLwveXcSpcnkB?=
 =?us-ascii?Q?yJKHhDrmt/OkF4PW9Cd667p31Cu/iKm/y7RZKOm2IqgobVdsY8a1Ez3iaTAB?=
 =?us-ascii?Q?6QDgfdt4YgWbi/Wt+EbIfU3adGzIc37hj2QAfbmA5eVSXqczABCQIOcx2Abv?=
 =?us-ascii?Q?NxyV2sHXtAOlfY4qFzpOijsb+I7jYrqWcxieNgpFsQGQxGkE2rXLoFCB0kzP?=
 =?us-ascii?Q?BH+dss/n0mC7Vy0RKv+Y45GVLIoIkxFC5VPEYlI+WBfqX6Qyw+evmBTVQJxg?=
 =?us-ascii?Q?89/bGOkjvJqMor0dXbXuvZBzbNTtabs43CSeZTomTJ18eHkMW2hM22crXuFX?=
 =?us-ascii?Q?jbjf/PSYHPgfFvpm04Zd/UcoGKCAwgkT+xcT3++5ntvj9kIgpg07Iboz852v?=
 =?us-ascii?Q?2GXANABZA0TpmWTnwr4iCSxC3MiKKpEX4jY1ju0S1DEXeMDdTwV/eEz1Nlx+?=
 =?us-ascii?Q?7uOL/GOQbgc5nNToT4vf48JZPNFkxIt+irlvWoth8cF4bdBHfjoDqZIBCIcS?=
 =?us-ascii?Q?+QVu1lX6IjeCUFZS+msyEayzS8LAgvZJFVJmz5l93KMiTmIEB3pGVEWPegm+?=
 =?us-ascii?Q?mj1a3ppe4HgKfHozd5YFNP/Gu97YNqDMn8oVlBBtw/fQZd+ifJZb3W4WHxSS?=
 =?us-ascii?Q?cpEmqJ9Dvr5XoTSeBxNwyYeMlUHJ1biJm4Lk1FlFMj0P4QFkQmWe2UZLXBnu?=
 =?us-ascii?Q?UxL8W/9FXvpr44Yu4H5ByiNAP024ylFBoSpbY5YEmCRcXPxCcCGSU1c2NiQX?=
 =?us-ascii?Q?I9/CzLvB8+EahlAcpsUNsP2CmhRaQFGtKEaR5iHfOaY83VhoLY256Eu/monS?=
 =?us-ascii?Q?r3Y9S9UxapjwWGA1ET08GgzmNIVOB0Xt9gjhKC0boFF83HdOkBzkJYKPzDKU?=
 =?us-ascii?Q?v5Ni9wRJVte+6Nh7C/OamksvtrOUxrReucusWiyNjNFbqopaXNBgvP2WEafR?=
 =?us-ascii?Q?NYI1sx/z7s9u0hshWUcBLRgHNgLOrYd2?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c729e28f-1f64-4990-8035-08da0e3e6dc4
X-MS-Exchange-CrossTenant-AuthSource: AS8PR04MB8609.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 09:04:11.9483
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: SsyK2vWyHNAN7o+qaoA7ffOrxMOQHwaxCp8AMBHhs6dwMN82Bdf4CU41zQv8onUlAvkgniZYaPOEyzSICaSGyg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR04MB2969

On 24.03.2022 18:02, Tamas K Lengyel wrote:
> On Thu, Mar 24, 2022 at 12:44 PM Roger Pau Monn=C3=A9 <roger.pau@citrix.c=
om> wrote:
>>
>> On Thu, Mar 24, 2022 at 12:22:49PM -0400, Tamas K Lengyel wrote:
>>> On Thu, Mar 24, 2022 at 12:04 PM Roger Pau Monn=C3=A9 <roger.pau@citrix=
.com> wrote:
>>>>
>>>> On Thu, Mar 24, 2022 at 11:52:38AM -0400, Tamas K Lengyel wrote:
>>>>> On Thu, Mar 24, 2022 at 11:46 AM Roger Pau Monn=C3=A9 <roger.pau@citr=
ix.com> wrote:
>>>>>>
>>>>>> On Tue, Mar 22, 2022 at 01:41:39PM -0400, Tamas K Lengyel wrote:
>>>>>>> diff --git a/xen/include/public/memory.h b/xen/include/public/memor=
y.h
>>>>>>> index 208d8dcbd9..30ce23c5a7 100644
>>>>>>> --- a/xen/include/public/memory.h
>>>>>>> +++ b/xen/include/public/memory.h
>>>>>>> @@ -541,12 +541,14 @@ struct xen_mem_sharing_op {
>>>>>>>                  uint32_t gref;     /* IN: gref to debug         */
>>>>>>>              } u;
>>>>>>>          } debug;
>>>>>>> -        struct mem_sharing_op_fork {      /* OP_FORK */
>>>>>>> +        struct mem_sharing_op_fork {      /* OP_FORK/_RESET */
>>>>>>>              domid_t parent_domain;        /* IN: parent's domain i=
d */
>>>>>>>  /* These flags only makes sense for short-lived forks */
>>>>>>>  #define XENMEM_FORK_WITH_IOMMU_ALLOWED (1u << 0)
>>>>>>>  #define XENMEM_FORK_BLOCK_INTERRUPTS   (1u << 1)
>>>>>>>  #define XENMEM_FORK_SKIP_SPECIAL_PAGES (1u << 2)
>>>>>>> +#define XENMEM_FORK_RESET_STATE        (1u << 3)
>>>>>>> +#define XENMEM_FORK_RESET_MEMORY       (1u << 4)
>>>>>>>              uint16_t flags;               /* IN: optional settings=
 */
>>>>>>>              uint32_t pad;                 /* Must be set to 0 */
>>>>>>>          } fork;
>>>>>>> diff --git a/xen/include/public/vm_event.h b/xen/include/public/vm_=
event.h
>>>>>>> index bb003d21d0..81c2ee28cc 100644
>>>>>>> --- a/xen/include/public/vm_event.h
>>>>>>> +++ b/xen/include/public/vm_event.h
>>>>>>> @@ -127,6 +127,14 @@
>>>>>>>   * Reset the vmtrace buffer (if vmtrace is enabled)
>>>>>>>   */
>>>>>>>  #define VM_EVENT_FLAG_RESET_VMTRACE      (1 << 13)
>>>>>>> +/*
>>>>>>> + * Reset the VM state (if VM is fork)
>>>>>>> + */
>>>>>>> +#define VM_EVENT_FLAG_RESET_FORK_STATE   (1 << 14)
>>>>>>> +/*
>>>>>>> + * Remove unshared entried from physmap (if VM is fork)
>>>>>>> + */
>>>>>>> +#define VM_EVENT_FLAG_RESET_FORK_MEMORY  (1 << 15)
>>>>>>
>>>>>> I'm confused about why two different interfaces are added to do this
>>>>>> kind of selective resets, one to vm_event and one to xenmem_fork?
>>>>>>
>>>>>> I thin k the natural place for the option to live would be
>>>>>> XENMEM_FORK?
>>>>>
>>>>> Yes, that's the natural place for it. But we are adding it to both fo=
r
>>>>> a reason. In our use-case the reset operation will happen after a
>>>>> vm_event is received to which we already must send a reply. Setting
>>>>> the flag on the vm_event reply saves us having to issue an extra memo=
p
>>>>> hypercall afterwards.
>>>>
>>>> Can you do a multicall and batch both operations in a single
>>>> hypercall?
>>>>
>>>> That would seem more natural than adding duplicated interfaces.
>>>
>>> Not in a straight forward way, no. There is no exposed API in libxc to
>>> do a multicall. Even if that was an option it is still easier for me
>>> to just flip a bit in the response field than having to construct a
>>> whole standalone hypercall structure to be sent as part of a
>>> multicall.
>>
>> Right, I can see it being easier, but it seems like a bad choice from
>> an interface PoV. You are the maintainer of both subsystems, but it
>> would seem to me it's in your best interest to try to keep the
>> interfaces separated and clean.
>>
>> Would it be possible for the reset XENMEM_FORK op to have the side
>> effect of performing what you would instead do with the vm_event
>> hypercall?
>=20
> Yes, the event response is really just an event channel signal to Xen,
> so the memop hypercall could similarly encode the "now check the
> vm_event response" as an optional field. But why is that any better
> than the current event channel route processing the vm_response
> encoding the "now do these ops on the fork"?

Well, as Roger said: Less duplication in the interface.

> We already have a bunch of different operations you can encode in the
> vm_event response field, so it reduces the complexity on the toolstack
> side since I don't have to switch around which hypercall I need to
> issue depending on what extra ops I want to put into a single
> hypercall.

The two goals need to be weighed against one another; for the moment
I think I'm with Roger aiming at a clean interface.

Jan



From xen-devel-bounces@lists.xenproject.org Fri Mar 25 09:33:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 09:33:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294619.501019 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXgKF-0005fs-Pj; Fri, 25 Mar 2022 09:33:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294619.501019; Fri, 25 Mar 2022 09:33:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXgKF-0005fl-MA; Fri, 25 Mar 2022 09:33:43 +0000
Received: by outflank-mailman (input) for mailman id 294619;
 Fri, 25 Mar 2022 09:33:41 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wXB3=UE=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nXgKD-0005ff-Ft
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 09:33:41 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04on0611.outbound.protection.outlook.com
 [2a01:111:f400:fe0e::611])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a71cc311-ac1e-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 10:33:40 +0100 (CET)
Received: from AS8PR04CA0121.eurprd04.prod.outlook.com (2603:10a6:20b:127::6)
 by HE1PR0801MB1722.eurprd08.prod.outlook.com (2603:10a6:3:87::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.19; Fri, 25 Mar
 2022 09:33:37 +0000
Received: from VE1EUR03FT032.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:127:cafe::d) by AS8PR04CA0121.outlook.office365.com
 (2603:10a6:20b:127::6) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17 via Frontend
 Transport; Fri, 25 Mar 2022 09:33:37 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT032.mail.protection.outlook.com (10.152.18.121) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Fri, 25 Mar 2022 09:33:36 +0000
Received: ("Tessian outbound 826a6d8e58c3:v113");
 Fri, 25 Mar 2022 09:33:36 +0000
Received: from 5330d1730513.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 873BFFC1-B7D0-4C65-B2D4-602AEC1EED46.1; 
 Fri, 25 Mar 2022 09:33:30 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 5330d1730513.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 25 Mar 2022 09:33:30 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com (2603:10a6:20b:85::25)
 by DU0PR08MB7462.eurprd08.prod.outlook.com (2603:10a6:10:355::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.19; Fri, 25 Mar
 2022 09:33:28 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62]) by AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62%3]) with mapi id 15.20.5102.018; Fri, 25 Mar 2022
 09:33:28 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a71cc311-ac1e-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=sJOgJaLOM9mlY/CzyQdW/GDwiNokse55jq/oxEtUXOw=;
 b=eAX2bumJ4R/pp5egSLaPlRbEvxfN6E6WIw2armaJXn9StJIQx2IEu43nLlje3rt1zoXMGab/fp0naCGvbZ+G8Pj2ZfPsnfzkGkr8n8BXgEPlTO8iEuC8eXG3a0Bjq1rnKAubvngZHfjsbhx4EPoaj8gFdx8LfMyLDuXH4mJkock=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 277d7e080eed7b4d
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Iusr2VbT6rdIHqIdAiZ7mEwsjhau7iW0SEXm8xHrNvuDBLTc7hCcJOEhY33m9nV6m0DoXsG4lXZTRvdbuQ2E9sy+Uu1fapFO8if/haY2VsYsPlfbGyOvqNaoQnn3RKxfvkyfP5ivWQ1WFKES3929AsB3WCfILYwCu061xtP06JVZPsaZtXPLm1hYdwoDCvuWfySXaYcmENI8ahVdlUBMH7Y7Py1iNzP04YuOLhuVVF4/aM9SoRprcgR8vWvR9OBRuB8o+JbVpjER1Pb5r2zccpKDxmRcd6PwMwC3X92Q/UKteS8BUeRmfAKpFMtAgZgpMAHX2VBls4rJxJxECREsCA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=sJOgJaLOM9mlY/CzyQdW/GDwiNokse55jq/oxEtUXOw=;
 b=J42CxDKaAsL53cZlNP1QivIKoBjZoZ/PGPyOpYiM2JYXJn8o3wq3F1Ey2abcUaJJxuLUmqnHJ1ymd2pKaOM2YKAoQlc8/NPIwiawgp3Qxidhgvi48X7tLZkvtR+lTQgZdVcanzp7jzNe3hWlyteZQQ+O8Un8Gjjxqfmdo+lA52tty4qxIcpF81odzqGLt6A3sZAuUp9ahmic+FHIp7kCbZG+wQVIPBcCZzgvpDVEp1vGWPNiqhK8UrsWeAct/1CFtsWKx5zQRTT1Jnvt5dHhzBPSM2WLUzzr/N+H819DZWCPqMzy58H2ijHM8g7079iARgCSw4AZRtfGzlNmhH+bHg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=sJOgJaLOM9mlY/CzyQdW/GDwiNokse55jq/oxEtUXOw=;
 b=eAX2bumJ4R/pp5egSLaPlRbEvxfN6E6WIw2armaJXn9StJIQx2IEu43nLlje3rt1zoXMGab/fp0naCGvbZ+G8Pj2ZfPsnfzkGkr8n8BXgEPlTO8iEuC8eXG3a0Bjq1rnKAubvngZHfjsbhx4EPoaj8gFdx8LfMyLDuXH4mJkock=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Stefano Stabellini <sstabellini@kernel.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	"julien@xen.org" <julien@xen.org>, "Volodymyr_Babchuk@epam.com"
	<Volodymyr_Babchuk@epam.com>, Stefano Stabellini
	<stefano.stabellini@xilinx.com>
Subject: Re: [PATCH] xen/arm: set CPSR Z bit when creating aarch32 guests
Thread-Topic: [PATCH] xen/arm: set CPSR Z bit when creating aarch32 guests
Thread-Index: AQHYP+PNN5njehIrkUSJD7AjfT2HzKzP1vuA
Date: Fri, 25 Mar 2022 09:33:28 +0000
Message-ID: <F786E1F2-8AFD-4D2C-ABE6-42528A2C6658@arm.com>
References: <20220325010052.1597420-1-sstabellini@kernel.org>
In-Reply-To: <20220325010052.1597420-1-sstabellini@kernel.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: a0a3b3a5-0c26-4cf2-43d5-08da0e4289a7
x-ms-traffictypediagnostic:
	DU0PR08MB7462:EE_|VE1EUR03FT032:EE_|HE1PR0801MB1722:EE_
X-Microsoft-Antispam-PRVS:
	<HE1PR0801MB1722BD7AD1505DB2B3B0DFDE9D1A9@HE1PR0801MB1722.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR08MB3784.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(53546011)(122000001)(71200400001)(6512007)(186003)(38070700005)(8936002)(2616005)(5660300002)(6506007)(38100700002)(6486002)(508600001)(83380400001)(76116006)(91956017)(66946007)(4326008)(66476007)(66446008)(64756008)(8676002)(316002)(54906003)(6916009)(66556008)(2906002)(86362001)(36756003)(33656002)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <75656DC14FD66F47ACF15EEDB53EA54B@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DU0PR08MB7462
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT032.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	40306841-4399-44f4-b884-08da0e4284ab
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(336012)(5660300002)(82310400004)(8676002)(53546011)(8936002)(4326008)(6506007)(2906002)(36860700001)(36756003)(54906003)(6512007)(40460700003)(83380400001)(508600001)(86362001)(356005)(186003)(47076005)(316002)(81166007)(26005)(107886003)(70586007)(6486002)(70206006)(6862004)(33656002)(2616005);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 09:33:36.5323
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: a0a3b3a5-0c26-4cf2-43d5-08da0e4289a7
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT032.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0801MB1722

Hi Stefano,

> On 25 Mar 2022, at 02:00, Stefano Stabellini <sstabellini@kernel.org> wro=
te:
>=20
> From: Stefano Stabellini <stefano.stabellini@xilinx.com>
>=20
> The first 32 bytes of zImage are NOPs. When CONFIG_EFI is enabled in the
> kernel, certain versions of Linux will use an UNPREDICATABLE NOP
> encoding, sometimes resulting in an unbootable kernel. Whether the
> resulting kernel is bootable or not depends on the processor. See commit
> a92882a4d270 in the Linux kernel for all the details.
>=20
> All kernel releases starting from Linux 4.9 without commit a92882a4d270
> are affected.
>=20
> Fortunately there is a simple workaround: setting the "Z" bit in CPSR
> make it so those invalid NOP instructions are never executed. That is
> because the instruction is conditional (not equal). So, on QEMU at
> least, the instruction will end up to be ignored and not generate an
> exception. Setting the "Z" bit makes those kernel versions bootable
> again and it is harmless in the other cases.
>=20
> Note that both U-Boot and QEMU -kernel set the "Z" bit in CPSR when
> booting a zImage kernel on aarch32.
>=20
> Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>

Thanks for the comment and commit message fixes.

Reviewed-by: Bertrand Marquis <bertrand.marquis@arm.com>

Cheers
Bertrand

> ---
> Changes in v3:
> - improve commit message
> - improve in-code comment
>=20
> Changes in v2:
> - improve commit message
> - add in-code comment
> - move PSR_Z to the beginning
> ---
> xen/include/public/arch-arm.h | 11 ++++++++++-
> 1 file changed, 10 insertions(+), 1 deletion(-)
>=20
> diff --git a/xen/include/public/arch-arm.h b/xen/include/public/arch-arm.=
h
> index 94b31511dd..c0c1149e27 100644
> --- a/xen/include/public/arch-arm.h
> +++ b/xen/include/public/arch-arm.h
> @@ -361,6 +361,7 @@ typedef uint64_t xen_callback_t;
> #define PSR_DBG_MASK    (1<<9)        /* arm64: Debug Exception mask */
> #define PSR_IT_MASK     (0x0600fc00)  /* Thumb If-Then Mask */
> #define PSR_JAZELLE     (1<<24)       /* Jazelle Mode */
> +#define PSR_Z           (1<<30)       /* Zero condition flag */
>=20
> /* 32 bit modes */
> #define PSR_MODE_USR 0x10
> @@ -383,7 +384,15 @@ typedef uint64_t xen_callback_t;
> #define PSR_MODE_EL1t 0x04
> #define PSR_MODE_EL0t 0x00
>=20
> -#define PSR_GUEST32_INIT  (PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MO=
DE_SVC)
> +/*
> + * We set PSR_Z to be able to boot Linux kernel versions with an invalid
> + * encoding of the first 8 NOP instructions. See commit a92882a4d270 in
> + * Linux.
> + *
> + * Note that PSR_Z is also set by U-Boot and QEMU -kernel when loading
> + * zImage kernels on aarch32.
> + */
> +#define PSR_GUEST32_INIT  (PSR_Z|PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|=
PSR_MODE_SVC)
> #define PSR_GUEST64_INIT (PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MODE=
_EL1h)
>=20
> #define SCTLR_GUEST_INIT    xen_mk_ullong(0x00c50078)
> --=20
> 2.25.1
>=20



From xen-devel-bounces@lists.xenproject.org Fri Mar 25 09:40:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 09:40:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294622.501030 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXgQX-00076Q-FO; Fri, 25 Mar 2022 09:40:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294622.501030; Fri, 25 Mar 2022 09:40:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXgQX-00076J-CR; Fri, 25 Mar 2022 09:40:13 +0000
Received: by outflank-mailman (input) for mailman id 294622;
 Fri, 25 Mar 2022 09:40:12 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nXgQW-00076B-SJ
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 09:40:12 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXgQW-0007SD-Fw; Fri, 25 Mar 2022 09:40:12 +0000
Received: from [54.239.6.185] (helo=[192.168.14.36])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXgQW-0004UE-9n; Fri, 25 Mar 2022 09:40:12 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=eO6GVMi8Gy3zE9oh6bZXq5EpUVoJAotgMX0BiDmMw4s=; b=Fw/BpW7lF1Mx/7bikYqtoIU7Hj
	dFX4HJToGdE+tBzf08Gc0GiNNAYvgCqPFrAHb4Tl7hV8y1CDkw/oqZQvVl5laXESXYC/wjYCONEBI
	jIXaF4yaWzzIHlOGuafLwUyYEzkfRBVQjy4SnvMu2pq2BIt86qYkUWrBkfnZlXqU7o0g=;
Message-ID: <b4a4d93e-ff2b-477d-1300-921c31e8e20e@xen.org>
Date: Fri, 25 Mar 2022 09:40:10 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH] xen/arm: set CPSR Z bit when creating aarch32 guests
To: Stefano Stabellini <sstabellini@kernel.org>,
 xen-devel@lists.xenproject.org
Cc: bertrand.marquis@arm.com, Volodymyr_Babchuk@epam.com,
 Stefano Stabellini <stefano.stabellini@xilinx.com>
References: <20220325010052.1597420-1-sstabellini@kernel.org>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220325010052.1597420-1-sstabellini@kernel.org>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Stefano,

On 25/03/2022 01:00, Stefano Stabellini wrote:
> From: Stefano Stabellini <stefano.stabellini@xilinx.com>
> 
> The first 32 bytes of zImage are NOPs. When CONFIG_EFI is enabled in the
> kernel, certain versions of Linux will use an UNPREDICATABLE NOP

typo: s/UNPREDICATABLE/UNPREDICTABLE/

I will fix it on commit.

Acked-by: Julien Grall <jgrall@amazon.com>

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 09:52:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 09:52:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294626.501040 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXgbs-0000HQ-L4; Fri, 25 Mar 2022 09:51:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294626.501040; Fri, 25 Mar 2022 09:51:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXgbs-0000HI-I6; Fri, 25 Mar 2022 09:51:56 +0000
Received: by outflank-mailman (input) for mailman id 294626;
 Fri, 25 Mar 2022 09:51:55 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nXgbr-0000HC-Jk
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 09:51:55 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXgbr-0007d8-7B; Fri, 25 Mar 2022 09:51:55 +0000
Received: from [54.239.6.185] (helo=[192.168.14.36])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXgbr-0005BS-0y; Fri, 25 Mar 2022 09:51:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=MrvaKqyjOmUOMmYbhTXITBRj89jdqBGAglnnMn1Kvow=; b=2ADw8DSxOFuj2SVyW/xVe0nVcs
	u3Ru6srCuL4x3ToGKcJy2ptxBQ1K+uxZvonj4yl+khCldzH9gLsOa0YOyvh90uVKehdO8IM4OFgSs
	iK840TNkzAT5tWit47BzZdjvg/OD13qDC+hVtrusLkX73axHT+I1K+d4Y04Fn3echaHk=;
Message-ID: <7de4ca80-48dd-d366-c428-a156ffc57a2d@xen.org>
Date: Fri, 25 Mar 2022 09:51:52 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH] xen/arm: set CPSR Z bit when creating aarch32 guests
To: Wei Chen <Wei.Chen@arm.com>, Stefano Stabellini <sstabellini@kernel.org>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Bertrand Marquis <Bertrand.Marquis@arm.com>,
 "Volodymyr_Babchuk@epam.com" <Volodymyr_Babchuk@epam.com>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>
References: <20220325010052.1597420-1-sstabellini@kernel.org>
 <PAXPR08MB74201501E8AF611683A60ACF9E1A9@PAXPR08MB7420.eurprd08.prod.outlook.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <PAXPR08MB74201501E8AF611683A60ACF9E1A9@PAXPR08MB7420.eurprd08.prod.outlook.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi Wei,

On 25/03/2022 02:51, Wei Chen wrote:
>> -----Original Message-----
>> From: Xen-devel <xen-devel-bounces@lists.xenproject.org> On Behalf Of
>> Stefano Stabellini
>> Sent: 2022年3月25日 9:01
>> To: xen-devel@lists.xenproject.org
>> Cc: julien@xen.org; sstabellini@kernel.org; Bertrand Marquis
>> <Bertrand.Marquis@arm.com>; Volodymyr_Babchuk@epam.com; Stefano Stabellini
>> <stefano.stabellini@xilinx.com>
>> Subject: [PATCH] xen/arm: set CPSR Z bit when creating aarch32 guests
>>
>> From: Stefano Stabellini <stefano.stabellini@xilinx.com>
>>
>> The first 32 bytes of zImage are NOPs. When CONFIG_EFI is enabled in the
>> kernel, certain versions of Linux will use an UNPREDICATABLE NOP
>> encoding, sometimes resulting in an unbootable kernel. Whether the
>> resulting kernel is bootable or not depends on the processor. See commit
>> a92882a4d270 in the Linux kernel for all the details.
>>
>> All kernel releases starting from Linux 4.9 without commit a92882a4d270
>> are affected.
>>
>> Fortunately there is a simple workaround: setting the "Z" bit in CPSR
>> make it so those invalid NOP instructions are never executed. That is
>> because the instruction is conditional (not equal). So, on QEMU at
>> least, the instruction will end up to be ignored and not generate an
>> exception. Setting the "Z" bit makes those kernel versions bootable
>> again and it is harmless in the other cases.
>>
>> Note that both U-Boot and QEMU -kernel set the "Z" bit in CPSR when
>> booting a zImage kernel on aarch32.
>>
>> Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
>> ---
>> Changes in v3:
>> - improve commit message
>> - improve in-code comment
>>
>> Changes in v2:
>> - improve commit message
>> - add in-code comment
>> - move PSR_Z to the beginning
>> ---
>>   xen/include/public/arch-arm.h | 11 ++++++++++-
>>   1 file changed, 10 insertions(+), 1 deletion(-)
>>
>> diff --git a/xen/include/public/arch-arm.h b/xen/include/public/arch-arm.h
>> index 94b31511dd..c0c1149e27 100644
>> --- a/xen/include/public/arch-arm.h
>> +++ b/xen/include/public/arch-arm.h
>> @@ -361,6 +361,7 @@ typedef uint64_t xen_callback_t;
>>   #define PSR_DBG_MASK    (1<<9)        /* arm64: Debug Exception mask */
>>   #define PSR_IT_MASK     (0x0600fc00)  /* Thumb If-Then Mask */
>>   #define PSR_JAZELLE     (1<<24)       /* Jazelle Mode */
>> +#define PSR_Z           (1<<30)       /* Zero condition flag */
>>
>>   /* 32 bit modes */
>>   #define PSR_MODE_USR 0x10
>> @@ -383,7 +384,15 @@ typedef uint64_t xen_callback_t;
>>   #define PSR_MODE_EL1t 0x04
>>   #define PSR_MODE_EL0t 0x00
>>
>> -#define PSR_GUEST32_INIT
>> (PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MODE_SVC)
>> +/*
>> + * We set PSR_Z to be able to boot Linux kernel versions with an invalid
>> + * encoding of the first 8 NOP instructions. See commit a92882a4d270 in
>> + * Linux.
>> + *
>> + * Note that PSR_Z is also set by U-Boot and QEMU -kernel when loading
>> + * zImage kernels on aarch32.
>> + */
>> +#define PSR_GUEST32_INIT
>> (PSR_Z|PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MODE_SVC)
>>   #define PSR_GUEST64_INIT
>> (PSR_ABT_MASK|PSR_FIQ_MASK|PSR_IRQ_MASK|PSR_MODE_EL1h)
>>
> 
> Maybe this is a good opportunity to fix the alignment of the two macros : )

I have dropped one space for PSR_GUEST32_INIT and committed.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 09:54:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 09:54:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294629.501052 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXgeG-0000sK-3d; Fri, 25 Mar 2022 09:54:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294629.501052; Fri, 25 Mar 2022 09:54:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXgeF-0000sD-W6; Fri, 25 Mar 2022 09:54:23 +0000
Received: by outflank-mailman (input) for mailman id 294629;
 Fri, 25 Mar 2022 09:54:22 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXgeE-0000s3-Hx; Fri, 25 Mar 2022 09:54:22 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXgeE-0007fJ-GF; Fri, 25 Mar 2022 09:54:22 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXgeE-00070l-1p; Fri, 25 Mar 2022 09:54:22 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXgeE-0008MO-1N; Fri, 25 Mar 2022 09:54:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=gSU8PXvOwz+wNGmmQUcwed/v7XviBQu54vNottZvQQg=; b=vJCXSR+g5TE8w+qUp1j0RnyEJj
	mXdTV5Yxx3AQJnULiiSZH30/v45b7NYeELNZ4bc8UaVj0c8F9xppNKzDUcvu/YlzuYcdR3KdsjkXg
	IPoPpNHSHuCBbDHgrz3iC4vzDW2e6Cktyc+3yKWS/R+UKNcKFmLF5Wp7zsLLpIVT3djA=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168836-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168836: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=b8d6ecc70c8a8e9c90bab48b6829b42d8b77c748
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 25 Mar 2022 09:54:22 +0000

flight 168836 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168836/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              b8d6ecc70c8a8e9c90bab48b6829b42d8b77c748
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  623 days
Failing since        151818  2020-07-11 04:18:52 Z  622 days  604 attempts
Testing same since   168836  2022-03-25 04:19:00 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Claudio Fontana <cfontana@suse.de>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Haonan Wang <hnwanga1@gmail.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Martin Pitt <mpitt@debian.org>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 102006 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 10:17:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 10:17:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294639.501066 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXh0n-0003TH-Sn; Fri, 25 Mar 2022 10:17:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294639.501066; Fri, 25 Mar 2022 10:17:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXh0n-0003TA-Pd; Fri, 25 Mar 2022 10:17:41 +0000
Received: by outflank-mailman (input) for mailman id 294639;
 Fri, 25 Mar 2022 10:17:40 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXh0l-0003Sy-UX; Fri, 25 Mar 2022 10:17:39 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXh0l-00089F-TV; Fri, 25 Mar 2022 10:17:39 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXh0l-0000eK-Ho; Fri, 25 Mar 2022 10:17:39 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXh0l-0002v1-HH; Fri, 25 Mar 2022 10:17:39 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=zRK2ekHx83zsH+WvuCdmFnPViyJjC5/Gkx3VyAtDtMc=; b=Xl+IGcakFPqBpp8x2LSDKRbb6s
	aBzfe4uNGovQBde3CkXq84Qzsoo4A4YitdxDSY/cZtlhRcc8emMmTF+WjrLRpiLeohdrRvDvEo8Jz
	ZGCsDkkDZ9fkZ9RQ2TYtlIeOyvGQVCFr7P1qxr0J3pH+quCXVs4PqqAJajXpAMGJVkSw=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168837-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168837: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=69218d5d2854acaa7a11c777244de4a297d2fbb9
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 25 Mar 2022 10:17:39 +0000

flight 168837 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168837/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 69218d5d2854acaa7a11c777244de4a297d2fbb9
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   24 days
Failing since        168258  2022-03-01 01:55:31 Z   24 days  251 attempts
Testing same since   168832  2022-03-25 01:43:21 Z    0 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Mara Sophie Grosch <littlefox@lf-net.org>
  Mara Sophie Grosch via groups.io <littlefox=lf-net.org@groups.io>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 904 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 10:25:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 10:25:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294646.501078 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXh8Z-00053m-Q2; Fri, 25 Mar 2022 10:25:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294646.501078; Fri, 25 Mar 2022 10:25:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXh8Z-00053f-LJ; Fri, 25 Mar 2022 10:25:43 +0000
Received: by outflank-mailman (input) for mailman id 294646;
 Fri, 25 Mar 2022 10:25:41 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+r7I=UE=citrix.com=prvs=076f4df05=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nXh8X-000535-Dp
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 10:25:41 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e8dd807e-ac25-11ec-a405-831a346695d4;
 Fri, 25 Mar 2022 11:25:39 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e8dd807e-ac25-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648203939;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=Zj7sntSWZ68JLfH8Q0e0keRLEt7YoR7fB0FHdsEvCtU=;
  b=dd0XE2IWNt/WfNsxmw+9asmHDkFrtqjcn0mwzoHMEdYIas9Mj2cPt98R
   zJcFZ7sVRp6CwWUaOBA/flPttsf6OPOv3cz+rd9nI3LnyOZIOYs4GEArm
   va/szJcL3qvuyqWOu7+sD096nJQPYERuV8fN4MVxy0Defr3MfaIQIIc6V
   E=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 69529485
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:nVDW2KtxcIsiCFoKdEml8p/R3efnVLReMUV32f8akzHdYApBsoF/q
 tZmKWiPM//fZGahLY1/OYyw8xtT6pfcxtYxS1M5qHw1EX4Q+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jX5
 IuryyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi92IIjpp/9FbSMCOC9ZY45U47DCECig5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AN
 pdDOGY/MXwsZTVTAFcbFZszlt2Mj3OmaTRqjEDEiLoetj27IAtZj+G2bYu9lsaxbdpRtlaVo
 CTB5WuRKhMHMN2SzxKV/3TqgfXA9QvgQ54bHrC88v9sgXWQy3YVBRlQUkG0ydGboEOjX9NUK
 2QP5zEj66M18SSDUtD4VgaQvH2AsxgTStdUVeY97Wml1qPR6h3fAmUCQS9MbPQnstM7QXoh0
 Vrht8PkA3ljvaOYTVqZ96yItnWiNC4NN2gAaCQYCwwf7LHeTJob10yVCIw5Sejs04OzSWqYL
 y22QDYW2Ks2qPEQj5uBp3vJpGyPtIPGSz9l+VCCNo661T9RaImgbo2uzFHU6/dcMYqUJmW8U
 Gg4d9u2t75XU8zU/MCZaKBURezyua7ZWNHJqQQ3d6TN4QhB7JJKkWp4xDhlbHlkPc8fEdMCS
 B+C4FgBjHO/0ZbDUEOWX25TI5lypUQDPY68PhwxUjaoSsEgHONg1HsyDXN8J0i3zCARfVgXY
 P93i/qEA3cAErhAxzGrXeob2rJD7nlgmTOKGM2mkUX8i+H2iJuppVEtaQrmggcRtv7sneko2
 4wHa5viJ+t3DoUSnRU7AaZMdAtXfBDX9Lj9qtBNd/7rH+aVMDpJNhMl+pt4I9YNt/0Mzo/gp
 yjhMmcFmAuXrSCWcm2iNyE8AI4DqL4i9BrXywR3Zg32s5XiCK7yhJoim2wfIeZ2rrAynKQoJ
 xTHEu3Zaslypv380211RbH2rZB4dQTtggSLPiG/ZyM4cYImTAvMkuIItCO0nMXSJkJbbfcDn
 oA=
IronPort-HdrOrdr: A9a23:1/iFjqmKTcDjedfhI7UvSeTWtWTpDfPOimdD5ihNYBxZY6Wkfp
 +V88jzhCWZtN9OYhwdcLC7WZVpQRvnhPlICK0qTM2ftW7dyRaVxeBZnPDfKljbdREWmdQtt5
 uIH5IObeEYSGIK8foSgzPIYurIouP3iZxA7N22pxwGLXAIV0gj1XYANu/yKDwJeOAsP+teKH
 Pz3Lsim9L2Ek5nEfhTS0N1F9TrlpnurtbLcBQGDxko5E2nii6p0qfzF1y90g0FWz1C7L8++S
 yd+jaJrJmLgrWe8FvxxmXT55NZlJ/IzcZCPtWFjowwJi/3ggilSYx9U/mpvSwzosuo9FE2+e
 O86CsIDoBW0Tf8b2u1qRzi103J1ysv0WbrzRuijX7qsaXCNUUHIvsEobgcXgrS6kImst05+r
 lMxXilu51eCg6FtDjh5vDTPisa2XackD4Hq6o+nnZfWYwRZPt6tooE5n5YF58GAWbT9J0nKu
 9zF8vRjcwmPW9yV0qp/1WH/ebcHkjaRny9Mws/U42uonVrdUlCvgUlLJd1pAZDyHo/I6M0k9
 gsfJ4Y0Y2mdfVmHp6VNN1xMfdfNVa9My4kEFjiV2gPR5t3ck4klfbMkcAIDaeRCdg18Kc=
X-IronPort-AV: E=Sophos;i="5.90,209,1643691600"; 
   d="scan'208";a="69529485"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=NoVY5tzbNLvZ9ug3/nGH0HGeDlyb2k1YlIltrrgm3Vy8rwiK8EbN3LwieK+QJKJlaCfMCtF8+95vYlSecfL5nKDfcy9ysVYZdNxkRelEIyk/SkHQ5wdygABLkKwVh9eMXuOWJPq/wWFOpwvKX8DMqQ9KaBsBbunGVxLqlVYmeQFFH+oGUJRAZbuPQN3xFhmEi+wKssKbm84cjvZoHgV6GvN0ARxqgvQOwWGAT8J7d1/+7D+zoHw/AvLPWQnf4shP8ihPOARRA0VqF92pNoKXIPOaW9A57/RcYOu5iiqYRK7Tt9UFzM0m7KCT7btm1CTFoB7M9C2l6YaeS5AIFXo8gQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=oPQHxJ1hAuYMlNmWJ/4PGDmSYVMmnuPuzQbRLzFyIW0=;
 b=EfNcpBprbG5zyxLwLe3ueZ2g1qQ7H5u9mRzGFGwVhhTL4iljZJgsHHCj66rPhHerDKPA8MYOXzdAfThSNWTEUoFtRRi7JedHYeCxITZ3E3QfAjyfy4rps3RuONq7EQ12xOpJzfGuB05tYKA4FzIib2LXvEBh8DcCGzfq9dP6IoK90AYMZ4mE5w+ynOwzCJh4xhrWkhXunnDnmnVUZfklAyRIMgYrNmeCeUAYQPkX8BMcDEwvgwNurS4UbabeaK+SXuPMC+Ndc2Plk49/UCIecjnt5PonjkENFXOjmBEMmwhIWR8ADf7UPc9XmwDFkV/whBainE/QVRPhY5TbZ8B6cA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=oPQHxJ1hAuYMlNmWJ/4PGDmSYVMmnuPuzQbRLzFyIW0=;
 b=jA4KAxnrL6q3l7jsjO70eCZdwOHuuTgtEaESbBFUcX7qxMSN6atYHlFs7NeupqbYH9oGfTO1kSGkk1Ohij4i8T1EJYXAIB8cHQG3xN/BILgP+s2jqZHckKku5rKS2yu5KVkRwOP7I4G+RgVBnyWkNIlPTWdJ5oJToFMMZo3x20E=
Date: Fri, 25 Mar 2022 11:25:23 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Tamas K Lengyel <tamas@tklengyel.com>
CC: Tamas K Lengyel <tamas.lengyel@intel.com>,
	<xen-devel@lists.xenproject.org>, Jan Beulich <JBeulich@suse.com>, Andrew
 Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>
Subject: Re: [PATCH 1/3] x86/mem_sharing: option to skip populating special
 pages during fork
Message-ID: <Yj2Ykz2diY5RTjbS@Air-de-Roger>
References: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
 <YjyFODl7VFJLaj0c@Air-de-Roger>
 <CABfawhk9n08bmXWO1iM7Sz-5uhzuT5W6BZzj+yNDW1+FFDA5GA@mail.gmail.com>
 <YjyTf4INCjKWD09n@Air-de-Roger>
 <CABfawhmWtxpb3E_vxRRAV6b=P7_T3Mhd+rZ=_XY+6J3-vv+-+w@mail.gmail.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <CABfawhmWtxpb3E_vxRRAV6b=P7_T3Mhd+rZ=_XY+6J3-vv+-+w@mail.gmail.com>
X-ClientProxiedBy: LO2P265CA0255.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:8a::27) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 1be427ed-9a31-4a9e-020c-08da0e49c7bb
X-MS-TrafficTypeDiagnostic: CH0PR03MB6148:EE_
X-Microsoft-Antispam-PRVS: <CH0PR03MB6148F3B7CD3AF95EA84CF9328F1A9@CH0PR03MB6148.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: u8WozOnpj8gOtJeuZPLMlCyE9tim+iCxV2htWrESRxvmxZd9RBfxtIYST0fGwnlQfT94h6EZPQjnX3QZ1y04LUq1wlmoz2MlgVhK8BWkyIXZhU9XcbxDIBI8yuQZ2RMM61etamJ+Vkm3MCXso6A8D4wc/GzIe/FSwW8xGKDLhz+c5J70I1kkrIeycGB8nHrKzkEV9dVkkwmg/oVI2in+fJJWRnbCb5VCq4aJxdHm1uOYuNTigMiK22c90yiSSKkJ1mgsKQQFqFaiPiL3uLQeH8Ni6Tf9y0k8ur6PdPMrimcJTleW7XuCBPHznAXST7Carq4w5CEIqWR3xl/az5563aZxXt1Xug++a/ToK38sVB9q6XqfFwxSejBFDzUGF8C2KHh65MsKRWlB6vbNUVyuBWBAnVarQJjC1fh3FBMpuVkbxQetGuVSR+VMOMAuTDp4jkV96VVJCy4zpzrrmHv0U1+RdhKEDTruvNnXa6RjAjPGPPsJHOii2U+UYkKIHsOLs07bTRfnxbGQYIRR+U4JEfjIjBiPsA4FE7Hbt5MP3/iLcG/3e1os1B9zAFQ4gSyQPmNkQGYukQPeqO4dWcD0NCQNh6m9XzMCSBRdZkIg/GZZ+BxfNWTx56If4vZXHhDn2cE2tJ25m/VXGliM8eHdqQ==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(83380400001)(186003)(33716001)(6486002)(66946007)(66476007)(316002)(6916009)(66556008)(54906003)(85182001)(8676002)(4326008)(9686003)(26005)(5660300002)(6666004)(86362001)(8936002)(508600001)(38100700002)(82960400001)(6512007)(53546011)(2906002)(6506007);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?djZZWG1TQ0RNcnZvcFloOVNqZUpjRWl1bkxMOWxvQ2Q4VXhmcDVvMk5MMUxO?=
 =?utf-8?B?RjYvRElUR2J1VWx0WWFvazBpSU1HanJSOENEVlNIT000ZVRzbjdzc1JSRVp4?=
 =?utf-8?B?WWZ4S21YRkkyMFR1SW1tSnByd1RPaXdnNkJ5WmdFZy8xS0pCUUUyZGJHcW1F?=
 =?utf-8?B?MWd4Y1VjV1A4TU1HdHhJVDRzZEdWQUlZSUlZRHBvMjY5NDdGNkcrSkpxbHBT?=
 =?utf-8?B?WHd1bkhpZ0cyMDdnZ2Y4SGR0c2VURTFsU3NjdnFBOG5kaTBhTk1GbE96aVdK?=
 =?utf-8?B?Z0NHZGE2cVhxbFNpWlUxTWpGdWl6Z0wvR0ZieGdPNnZvMmRTT3MwN3JjcDlr?=
 =?utf-8?B?RXRqTDI0b3J3dzRLODBMbWxDd2FJNUg4SGRBNnlpMm9nZUt5Mkk3UEhJU0Uz?=
 =?utf-8?B?a2VOUW13cmdDaGlEN2tMeW04N0NCZ1FSM0tSRndOd0NJSEVFQVlCV1hjanJu?=
 =?utf-8?B?cmtzMTdLREZLTVA3REUwOVNvSXpkZXZCcTRFQkJzZWxiaG02OCtIRElETGcv?=
 =?utf-8?B?WTlrUFhMSE55Ly9taWJDc2p5UkxJZFdReEpwYVN3ci9CVTcvbXJ5aC9hWUw5?=
 =?utf-8?B?Zm5EaUxaSGJkdk9BVWRMSzRrWXladnlhTkpielRneklVSHk1VUVmRDZyRHJy?=
 =?utf-8?B?R3FkWjRVSzMvZEtNdkZMNmRGQktRRnZGQUQ1TDE1VmJaRjlVRGxTZEd0dW91?=
 =?utf-8?B?OVV2VW12dnhFRFFpZTBKKzlpVk92NUFoVVRGdEZLZ0Nzb1hIZVVPQkljOVRZ?=
 =?utf-8?B?ZHNkQnoyZmVrR2YxRHhyM1k1UFVtSzR6eURiL0M0azFXM3VtVGdCY0pRYXBz?=
 =?utf-8?B?ZmZJdG1kT3g3UEZyc1VQYnhMKzA4eDByejg4V0ZKL1k1bTM4bDRFcXkyZjFw?=
 =?utf-8?B?TWRhNTZQY0laSWF0TjN6Zmg0RStlQlc1Mk5KRWJ6MDN6VlZjRUFTNWxObC93?=
 =?utf-8?B?REp2VGtwWUJOajhWSm9rUjNySXV0TFZwSEtjYmdxWWRHb2FpcXdvYW9KMGo1?=
 =?utf-8?B?eEQvcWtjQVUxVFIzWjhBenkzL2Z2cHA2TWFGbUUvMEZZY0FYVXJzNE5zbUl1?=
 =?utf-8?B?SVdnNnZOMWtNZ3NCUkt6Mlo0M1lJcWYwVFZtOHQrTjdyMnNhZVVzcXRmdm9O?=
 =?utf-8?B?UmlYU3pMRGpSQVdCOFp0V1FpSnFxWjk2NTdPNzhWbWc5RVMyU3JPYTRUaDZZ?=
 =?utf-8?B?YTFKUGZYQlFNWXhmQkN4TWpqMDdDbnBtV2lCWlNmWWgyNnNCR2FSd2FtUkx5?=
 =?utf-8?B?d3hOZGVhbXRUWWhmb3g5Z3VSSEZ0emNEVGJxN3dFOERGbXQzV1RML210QUJG?=
 =?utf-8?B?K0ZKQTVZT2ZGakR3SmRjUDBGL01XYTFFVnhlUm1UOGhIem83WVhMVlFmK2Mz?=
 =?utf-8?B?ZE96L2o5RXZpSHZJOEx0RkhTQThLMWdaWlE1QlZwOWlhcVNrMUgvN0UzeHV3?=
 =?utf-8?B?R09zNUFaelZlRjBJRnNIR3FRRUFuSDNFbEM5cUZocEhtcHhYZ3hoTnhRdUtU?=
 =?utf-8?B?STNKNUt2Zk1xVEZQb0VIbHNMZDZzeFozSlJ4c3RRZlVvaHMxV0dOV0lTSG02?=
 =?utf-8?B?eUU2c09ad0JyNE9KOU10U0tVSzhQc1FKYWxURTJkUzZ3K3pJMnpWUHIwcjdW?=
 =?utf-8?B?L0JycFJ2YW5xVFhia0N5ZUpISHFsWUF0L0F0LytpcUtpT3paMXNSZUxqU2ZZ?=
 =?utf-8?B?MS9vK3MzcXZjc213NEt6QmlqaytWM0xXT3VtRjVPN2RnT3Vod29pTnRwRnNo?=
 =?utf-8?B?UnZRMXN3cjVhb1ZvUFhpYithS0pYSkJJcTk2TWFjeHNOTEpYTUVMbk55eHI4?=
 =?utf-8?B?Y3FGV01JU1VlQ1VEeThPZHpieHJMZ0g3THhFL2JaK0VoSUYvZlBMOWdDNDFt?=
 =?utf-8?B?TDdWUG9kNWk0UzBFZXAzYjU5K3cwRkJLaU1OOWszcUtnTmtaWk9sM0Rkb29D?=
 =?utf-8?B?dmMzSE1QUXhvdmd4eEJId0tPNm55ZnJqRm5YQlhlWDhjY3R6MnRFMGYzRmNm?=
 =?utf-8?B?WmdCMFJ0cUE4dUJ6RnJxNENBWE13aUNoYW93WFdsZWpKczBhUVZwM0tSSTlG?=
 =?utf-8?B?YWo5NUYvU0hlN25pT1ZUbHRzZjFCaE5QVXlYWEZRZ2lEVkYya2VNOUk0YmM3?=
 =?utf-8?B?L25Ud0tJT1lkOEZnbEh5TjlFWUxMaFJGTzdqTHcyMDRKL0hWODQwUmpaL3hE?=
 =?utf-8?B?WUY4ZzJob2pqNWY4UTlJSHIrNWg0b1lMYy82NFhvZDR2UnM5dUMxRno3U2Vw?=
 =?utf-8?B?ZytIWS9rVzc5YklFcEgwdGE3YWpHUEREek1DMXVaMHBmaEhaWkthN1UwSWUx?=
 =?utf-8?B?MHRvS0ozWFRQaHRkWDlha2gyV0h2eWZRbWM2b1dJRjdJd3RSYld0K0pKVith?=
 =?utf-8?Q?MOyMhyk+Lhp+zpfc=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 1be427ed-9a31-4a9e-020c-08da0e49c7bb
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 10:25:27.4856
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: T0JRsbVzFnHuPmCLOpWK5GMfcS0c9pvE0xgmR+N8JOEnIsCuNx4xrOLncusySga+6FfqRKXGc1nbF4jilwvKFQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH0PR03MB6148
X-OriginatorOrg: citrix.com

On Thu, Mar 24, 2022 at 12:27:02PM -0400, Tamas K Lengyel wrote:
> On Thu, Mar 24, 2022 at 11:51 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
> >
> > On Thu, Mar 24, 2022 at 11:15:08AM -0400, Tamas K Lengyel wrote:
> > > On Thu, Mar 24, 2022 at 10:50 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
> > > >
> > > > On Tue, Mar 22, 2022 at 01:41:37PM -0400, Tamas K Lengyel wrote:
> > > > > +    {
> > > > > +        cd->arch.hvm.mem_sharing.block_interrupts = block_interrupts;
> > > > > +        cd->arch.hvm.mem_sharing.skip_special_pages = skip_special_pages;
> > > > > +        /* skip mapping the vAPIC page on unpause if skipping special pages */
> > > > > +        cd->creation_finished = skip_special_pages;
> > > >
> > > > I think this is dangerous. While it might be true at the moment that
> > > > the arch_domain_creation_finished only maps the vAPIC page, there's no
> > > > guarantee it couldn't do other stuff in the future that could be
> > > > required for the VM to be started.
> > >
> > > I understand this domain_creation_finished route could be expanded in
> > > the future to include other stuff, but IMHO we can evaluate what to do
> > > about that when and if it becomes necessary. This is all experimental
> > > to begin with.
> >
> > Maybe you could check the skip_special_pages field from
> > domain_creation_finished in order to decide whether the vAPIC page
> > needs to be mapped?
> 
> Could certainly do that but it means adding experimental code in an
> #ifdef to the vAPIC mapping logic. Technically nothing wrong with that
> but I would prefer keeping all this code in a single-place if
> possible.

I see, while I agree it's best to keep the code contained when
possible, I think in this case it's better to modify the hook,
specially because further changes to domain_creation_finished will
easily spot that this path is special cases for VM forks.

While the code is experimental it doesn't mean it shouldn't be
properly integrated with the rest of the code base.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 10:49:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 10:49:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294651.501089 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXhV6-0007ce-Mc; Fri, 25 Mar 2022 10:49:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294651.501089; Fri, 25 Mar 2022 10:49:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXhV6-0007cX-Jb; Fri, 25 Mar 2022 10:49:00 +0000
Received: by outflank-mailman (input) for mailman id 294651;
 Fri, 25 Mar 2022 10:48:59 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Ci4N=UE=tklengyel.com=tamas@srs-se1.protection.inumbo.net>)
 id 1nXhV5-0007cR-OJ
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 10:48:59 +0000
Received: from MTA-10-3.privateemail.com (mta-10-3.privateemail.com
 [198.54.127.62]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 2b4326fc-ac29-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 11:48:57 +0100 (CET)
Received: from mta-10.privateemail.com (localhost [127.0.0.1])
 by mta-10.privateemail.com (Postfix) with ESMTP id 762A118000A2
 for <xen-devel@lists.xenproject.org>; Fri, 25 Mar 2022 06:48:55 -0400 (EDT)
Received: from mail-oa1-f42.google.com (unknown [10.20.151.178])
 by mta-10.privateemail.com (Postfix) with ESMTPA id 5177618000A1
 for <xen-devel@lists.xenproject.org>; Fri, 25 Mar 2022 06:48:55 -0400 (EDT)
Received: by mail-oa1-f42.google.com with SMTP id
 586e51a60fabf-de2cb87f6aso7712881fac.10
 for <xen-devel@lists.xenproject.org>; Fri, 25 Mar 2022 03:48:55 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2b4326fc-ac29-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648205335;
	bh=+7d5C3nVL/TBVJfNFQ28GlGyXFp29VjTcZUVB+++BE0=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=ZIlCJXuzU0XYp/xTuzzO1219TjeJ3mN7SNj+ZPzxySvNYA9j6wFVfBp/BBLx9TpJl
	 uRnjFKXJWOtovle8yiTVZyGXPxtIKBX9NmwyvRe0OLOKIBjLLAS7afvBwPNrYZVm6v
	 AFwvXlwC0nSjh4QF9gTy1qV23YGpbGgy2f5LW+0vvSJZUvFadIRGa0VpXAMl9C78lD
	 h89blZUBfHLPCk29bT33G5VIoUG6dpR6X+H5tNILctUOTQcnv5ekbgSW5PAqRX0gMV
	 MlmzHfflScSLcCkd+0N7b1XNXpBAA1HQXLqlXMpAsSZlieQOQgpk93ikOHGHfAdPii
	 RY+1vAu8YH03A==
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648205335;
	bh=+7d5C3nVL/TBVJfNFQ28GlGyXFp29VjTcZUVB+++BE0=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=ZIlCJXuzU0XYp/xTuzzO1219TjeJ3mN7SNj+ZPzxySvNYA9j6wFVfBp/BBLx9TpJl
	 uRnjFKXJWOtovle8yiTVZyGXPxtIKBX9NmwyvRe0OLOKIBjLLAS7afvBwPNrYZVm6v
	 AFwvXlwC0nSjh4QF9gTy1qV23YGpbGgy2f5LW+0vvSJZUvFadIRGa0VpXAMl9C78lD
	 h89blZUBfHLPCk29bT33G5VIoUG6dpR6X+H5tNILctUOTQcnv5ekbgSW5PAqRX0gMV
	 MlmzHfflScSLcCkd+0N7b1XNXpBAA1HQXLqlXMpAsSZlieQOQgpk93ikOHGHfAdPii
	 RY+1vAu8YH03A==
X-Gm-Message-State: AOAM532b+TO4c0jlcbZIzRfCQ0Jb53Yxp0ORR9F4swgr8CCZgaIWCcDr
	DVEhfzWHvTT91FvGpdpKhPPBEVBx2GwGsUHz65E=
X-Google-Smtp-Source: ABdhPJx/27wGVzMCjvEWOyLI6wibwEM92TVQzYjpnBLmmEqhpX65zx8p82yGa7KA6H7gUzf2WWSPgYVn9WaLtdh74t8=
X-Received: by 2002:a05:6870:b250:b0:de:afd3:e1c4 with SMTP id
 b16-20020a056870b25000b000deafd3e1c4mr812136oam.128.1648205334646; Fri, 25
 Mar 2022 03:48:54 -0700 (PDT)
MIME-Version: 1.0
References: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
 <fb437a16517d343ba3432aa64b9e14b34630a750.1647970630.git.tamas.lengyel@intel.com>
 <YjySMjegTNFBE5RK@Air-de-Roger> <CABfawhnnAehxaByyncaYAjSSbddJi8yeTnjcXX_a+st8Q+C_+Q@mail.gmail.com>
 <YjyWW2CkQv1ckvXM@Air-de-Roger> <CABfawhn-QiUBuq9c4tzr=9nL=J-ntm1hf23mbeRu-qCAKRDj1Q@mail.gmail.com>
 <Yjyfygi6pE+UVhjM@Air-de-Roger> <CABfawhkQoOnKv7OWNus0WBY4CjX+1uU1ZeZgQ-mU-sRtQFE3QQ@mail.gmail.com>
 <1bcc54d8-e766-1d53-6bc8-bd67f8838d73@suse.com>
In-Reply-To: <1bcc54d8-e766-1d53-6bc8-bd67f8838d73@suse.com>
From: Tamas K Lengyel <tamas@tklengyel.com>
Date: Fri, 25 Mar 2022 06:48:42 -0400
X-Gmail-Original-Message-ID: <CABfawhk4pyUGV=QGua3WNghbp-tk0yOzSSp6_x8o1Lg-8OXhNg@mail.gmail.com>
Message-ID: <CABfawhk4pyUGV=QGua3WNghbp-tk0yOzSSp6_x8o1Lg-8OXhNg@mail.gmail.com>
Subject: Re: [PATCH 3/3] x86/mem_sharing: make fork_reset more configurable
To: Jan Beulich <jbeulich@suse.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>, Xen-devel <xen-devel@lists.xenproject.org>, 
	Wei Liu <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>, Juergen Gross <JGross@suse.com>, 
	Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, 
	Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, 
	Alexandru Isaila <aisaila@bitdefender.com>, Petre Pircalabu <ppircalabu@bitdefender.com>, 
	=?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>
Content-Type: multipart/alternative; boundary="0000000000007d183005db08b5e9"
X-Virus-Scanned: ClamAV using ClamSMTP

--0000000000007d183005db08b5e9
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Fri, Mar 25, 2022, 5:04 AM Jan Beulich <jbeulich@suse.com> wrote:

> On 24.03.2022 18:02, Tamas K Lengyel wrote:
> > On Thu, Mar 24, 2022 at 12:44 PM Roger Pau Monn=C3=A9 <roger.pau@citrix=
.com>
> wrote:
> >>
> >> On Thu, Mar 24, 2022 at 12:22:49PM -0400, Tamas K Lengyel wrote:
> >>> On Thu, Mar 24, 2022 at 12:04 PM Roger Pau Monn=C3=A9 <roger.pau@citr=
ix.com>
> wrote:
> >>>>
> >>>> On Thu, Mar 24, 2022 at 11:52:38AM -0400, Tamas K Lengyel wrote:
> >>>>> On Thu, Mar 24, 2022 at 11:46 AM Roger Pau Monn=C3=A9 <
> roger.pau@citrix.com> wrote:
> >>>>>>
> >>>>>> On Tue, Mar 22, 2022 at 01:41:39PM -0400, Tamas K Lengyel wrote:
> >>>>>>> diff --git a/xen/include/public/memory.h
> b/xen/include/public/memory.h
> >>>>>>> index 208d8dcbd9..30ce23c5a7 100644
> >>>>>>> --- a/xen/include/public/memory.h
> >>>>>>> +++ b/xen/include/public/memory.h
> >>>>>>> @@ -541,12 +541,14 @@ struct xen_mem_sharing_op {
> >>>>>>>                  uint32_t gref;     /* IN: gref to debug         =
*/
> >>>>>>>              } u;
> >>>>>>>          } debug;
> >>>>>>> -        struct mem_sharing_op_fork {      /* OP_FORK */
> >>>>>>> +        struct mem_sharing_op_fork {      /* OP_FORK/_RESET */
> >>>>>>>              domid_t parent_domain;        /* IN: parent's domain
> id */
> >>>>>>>  /* These flags only makes sense for short-lived forks */
> >>>>>>>  #define XENMEM_FORK_WITH_IOMMU_ALLOWED (1u << 0)
> >>>>>>>  #define XENMEM_FORK_BLOCK_INTERRUPTS   (1u << 1)
> >>>>>>>  #define XENMEM_FORK_SKIP_SPECIAL_PAGES (1u << 2)
> >>>>>>> +#define XENMEM_FORK_RESET_STATE        (1u << 3)
> >>>>>>> +#define XENMEM_FORK_RESET_MEMORY       (1u << 4)
> >>>>>>>              uint16_t flags;               /* IN: optional
> settings */
> >>>>>>>              uint32_t pad;                 /* Must be set to 0 */
> >>>>>>>          } fork;
> >>>>>>> diff --git a/xen/include/public/vm_event.h
> b/xen/include/public/vm_event.h
> >>>>>>> index bb003d21d0..81c2ee28cc 100644
> >>>>>>> --- a/xen/include/public/vm_event.h
> >>>>>>> +++ b/xen/include/public/vm_event.h
> >>>>>>> @@ -127,6 +127,14 @@
> >>>>>>>   * Reset the vmtrace buffer (if vmtrace is enabled)
> >>>>>>>   */
> >>>>>>>  #define VM_EVENT_FLAG_RESET_VMTRACE      (1 << 13)
> >>>>>>> +/*
> >>>>>>> + * Reset the VM state (if VM is fork)
> >>>>>>> + */
> >>>>>>> +#define VM_EVENT_FLAG_RESET_FORK_STATE   (1 << 14)
> >>>>>>> +/*
> >>>>>>> + * Remove unshared entried from physmap (if VM is fork)
> >>>>>>> + */
> >>>>>>> +#define VM_EVENT_FLAG_RESET_FORK_MEMORY  (1 << 15)
> >>>>>>
> >>>>>> I'm confused about why two different interfaces are added to do th=
is
> >>>>>> kind of selective resets, one to vm_event and one to xenmem_fork?
> >>>>>>
> >>>>>> I thin k the natural place for the option to live would be
> >>>>>> XENMEM_FORK?
> >>>>>
> >>>>> Yes, that's the natural place for it. But we are adding it to both
> for
> >>>>> a reason. In our use-case the reset operation will happen after a
> >>>>> vm_event is received to which we already must send a reply. Setting
> >>>>> the flag on the vm_event reply saves us having to issue an extra
> memop
> >>>>> hypercall afterwards.
> >>>>
> >>>> Can you do a multicall and batch both operations in a single
> >>>> hypercall?
> >>>>
> >>>> That would seem more natural than adding duplicated interfaces.
> >>>
> >>> Not in a straight forward way, no. There is no exposed API in libxc t=
o
> >>> do a multicall. Even if that was an option it is still easier for me
> >>> to just flip a bit in the response field than having to construct a
> >>> whole standalone hypercall structure to be sent as part of a
> >>> multicall.
> >>
> >> Right, I can see it being easier, but it seems like a bad choice from
> >> an interface PoV. You are the maintainer of both subsystems, but it
> >> would seem to me it's in your best interest to try to keep the
> >> interfaces separated and clean.
> >>
> >> Would it be possible for the reset XENMEM_FORK op to have the side
> >> effect of performing what you would instead do with the vm_event
> >> hypercall?
> >
> > Yes, the event response is really just an event channel signal to Xen,
> > so the memop hypercall could similarly encode the "now check the
> > vm_event response" as an optional field. But why is that any better
> > than the current event channel route processing the vm_response
> > encoding the "now do these ops on the fork"?
>
> Well, as Roger said: Less duplication in the interface.
>

No, you would just duplicate something else instead, ie. the event channel
hypercall.


> > We already have a bunch of different operations you can encode in the
> > vm_event response field, so it reduces the complexity on the toolstack
> > side since I don't have to switch around which hypercall I need to
> > issue depending on what extra ops I want to put into a single
> > hypercall.
>
> The two goals need to be weighed against one another; for the moment
> I think I'm with Roger aiming at a clean interface.
>

It may look like that from the Xen side but from the toolstack side this is
actually the cleanest way to achieve what we need. The vm_event interfaces
are already strongly integrated with both the mem_sharing and mem_paging
subsystems so nothing is gained by now for no reason trying to keep them
separate. So I strongly disagree with this suggestion and I'm going to keep
it as-is. I appreciate the feedback nevertheless.

Tamas

>

--0000000000007d183005db08b5e9
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto"><div><br><br><div class=3D"gmail_quote"><div dir=3D"ltr" =
class=3D"gmail_attr">On Fri, Mar 25, 2022, 5:04 AM Jan Beulich &lt;<a href=
=3D"mailto:jbeulich@suse.com">jbeulich@suse.com</a>&gt; wrote:<br></div><bl=
ockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #=
ccc solid;padding-left:1ex">On 24.03.2022 18:02, Tamas K Lengyel wrote:<br>
&gt; On Thu, Mar 24, 2022 at 12:44 PM Roger Pau Monn=C3=A9 &lt;<a href=3D"m=
ailto:roger.pau@citrix.com" target=3D"_blank" rel=3D"noreferrer">roger.pau@=
citrix.com</a>&gt; wrote:<br>
&gt;&gt;<br>
&gt;&gt; On Thu, Mar 24, 2022 at 12:22:49PM -0400, Tamas K Lengyel wrote:<b=
r>
&gt;&gt;&gt; On Thu, Mar 24, 2022 at 12:04 PM Roger Pau Monn=C3=A9 &lt;<a h=
ref=3D"mailto:roger.pau@citrix.com" target=3D"_blank" rel=3D"noreferrer">ro=
ger.pau@citrix.com</a>&gt; wrote:<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; On Thu, Mar 24, 2022 at 11:52:38AM -0400, Tamas K Lengyel =
wrote:<br>
&gt;&gt;&gt;&gt;&gt; On Thu, Mar 24, 2022 at 11:46 AM Roger Pau Monn=C3=A9 =
&lt;<a href=3D"mailto:roger.pau@citrix.com" target=3D"_blank" rel=3D"norefe=
rrer">roger.pau@citrix.com</a>&gt; wrote:<br>
&gt;&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt;&gt; On Tue, Mar 22, 2022 at 01:41:39PM -0400, Tamas K =
Lengyel wrote:<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; diff --git a/xen/include/public/memory.h b/xen=
/include/public/memory.h<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; index 208d8dcbd9..30ce23c5a7 100644<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; --- a/xen/include/public/memory.h<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; +++ b/xen/include/public/memory.h<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; @@ -541,12 +541,14 @@ struct xen_mem_sharing_o=
p {<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 uint32_t gref;=C2=A0 =C2=A0 =C2=A0/* IN: gref to debug=C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0*/<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 } u;<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 } debug;<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; -=C2=A0 =C2=A0 =C2=A0 =C2=A0 struct mem_sharin=
g_op_fork {=C2=A0 =C2=A0 =C2=A0 /* OP_FORK */<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 struct mem_sharin=
g_op_fork {=C2=A0 =C2=A0 =C2=A0 /* OP_FORK/_RESET */<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 domid_t parent_domain;=C2=A0 =C2=A0 =C2=A0 =C2=A0 /* IN: parent&#39;s d=
omain id */<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;=C2=A0 /* These flags only makes sense for shor=
t-lived forks */<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;=C2=A0 #define XENMEM_FORK_WITH_IOMMU_ALLOWED (=
1u &lt;&lt; 0)<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;=C2=A0 #define XENMEM_FORK_BLOCK_INTERRUPTS=C2=
=A0 =C2=A0(1u &lt;&lt; 1)<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;=C2=A0 #define XENMEM_FORK_SKIP_SPECIAL_PAGES (=
1u &lt;&lt; 2)<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; +#define XENMEM_FORK_RESET_STATE=C2=A0 =C2=A0 =
=C2=A0 =C2=A0 (1u &lt;&lt; 3)<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; +#define XENMEM_FORK_RESET_MEMORY=C2=A0 =C2=A0=
 =C2=A0 =C2=A0(1u &lt;&lt; 4)<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 uint16_t flags;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0/=
* IN: optional settings */<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 uint32_t pad;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0/* Must be set to 0 */<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 } fork;<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; diff --git a/xen/include/public/vm_event.h b/x=
en/include/public/vm_event.h<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; index bb003d21d0..81c2ee28cc 100644<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; --- a/xen/include/public/vm_event.h<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; +++ b/xen/include/public/vm_event.h<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; @@ -127,6 +127,14 @@<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;=C2=A0 =C2=A0* Reset the vmtrace buffer (if vmt=
race is enabled)<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;=C2=A0 =C2=A0*/<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;=C2=A0 #define VM_EVENT_FLAG_RESET_VMTRACE=C2=
=A0 =C2=A0 =C2=A0 (1 &lt;&lt; 13)<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; +/*<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; + * Reset the VM state (if VM is fork)<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; + */<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; +#define VM_EVENT_FLAG_RESET_FORK_STATE=C2=A0 =
=C2=A0(1 &lt;&lt; 14)<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; +/*<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; + * Remove unshared entried from physmap (if V=
M is fork)<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; + */<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; +#define VM_EVENT_FLAG_RESET_FORK_MEMORY=C2=A0=
 (1 &lt;&lt; 15)<br>
&gt;&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt;&gt; I&#39;m confused about why two different interface=
s are added to do this<br>
&gt;&gt;&gt;&gt;&gt;&gt; kind of selective resets, one to vm_event and one =
to xenmem_fork?<br>
&gt;&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt;&gt; I thin k the natural place for the option to live =
would be<br>
&gt;&gt;&gt;&gt;&gt;&gt; XENMEM_FORK?<br>
&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; Yes, that&#39;s the natural place for it. But we are a=
dding it to both for<br>
&gt;&gt;&gt;&gt;&gt; a reason. In our use-case the reset operation will hap=
pen after a<br>
&gt;&gt;&gt;&gt;&gt; vm_event is received to which we already must send a r=
eply. Setting<br>
&gt;&gt;&gt;&gt;&gt; the flag on the vm_event reply saves us having to issu=
e an extra memop<br>
&gt;&gt;&gt;&gt;&gt; hypercall afterwards.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; Can you do a multicall and batch both operations in a sing=
le<br>
&gt;&gt;&gt;&gt; hypercall?<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; That would seem more natural than adding duplicated interf=
aces.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; Not in a straight forward way, no. There is no exposed API in =
libxc to<br>
&gt;&gt;&gt; do a multicall. Even if that was an option it is still easier =
for me<br>
&gt;&gt;&gt; to just flip a bit in the response field than having to constr=
uct a<br>
&gt;&gt;&gt; whole standalone hypercall structure to be sent as part of a<b=
r>
&gt;&gt;&gt; multicall.<br>
&gt;&gt;<br>
&gt;&gt; Right, I can see it being easier, but it seems like a bad choice f=
rom<br>
&gt;&gt; an interface PoV. You are the maintainer of both subsystems, but i=
t<br>
&gt;&gt; would seem to me it&#39;s in your best interest to try to keep the=
<br>
&gt;&gt; interfaces separated and clean.<br>
&gt;&gt;<br>
&gt;&gt; Would it be possible for the reset XENMEM_FORK op to have the side=
<br>
&gt;&gt; effect of performing what you would instead do with the vm_event<b=
r>
&gt;&gt; hypercall?<br>
&gt; <br>
&gt; Yes, the event response is really just an event channel signal to Xen,=
<br>
&gt; so the memop hypercall could similarly encode the &quot;now check the<=
br>
&gt; vm_event response&quot; as an optional field. But why is that any bett=
er<br>
&gt; than the current event channel route processing the vm_response<br>
&gt; encoding the &quot;now do these ops on the fork&quot;?<br>
<br>
Well, as Roger said: Less duplication in the interface.<br></blockquote></d=
iv></div><div dir=3D"auto"><br></div><div dir=3D"auto">No, you would just d=
uplicate something else instead, ie. the event channel hypercall.</div><div=
 dir=3D"auto"><br></div><div dir=3D"auto"><div class=3D"gmail_quote"><block=
quote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc=
 solid;padding-left:1ex">
<br>
&gt; We already have a bunch of different operations you can encode in the<=
br>
&gt; vm_event response field, so it reduces the complexity on the toolstack=
<br>
&gt; side since I don&#39;t have to switch around which hypercall I need to=
<br>
&gt; issue depending on what extra ops I want to put into a single<br>
&gt; hypercall.<br>
<br>
The two goals need to be weighed against one another; for the moment<br>
I think I&#39;m with Roger aiming at a clean interface.<br></blockquote></d=
iv></div><div dir=3D"auto"><br></div><div dir=3D"auto">It may look like tha=
t from the Xen side but from the toolstack side this is actually the cleane=
st way to achieve what we need. The vm_event interfaces are already strongl=
y integrated with both the mem_sharing and mem_paging subsystems so nothing=
 is gained by now for no reason trying to keep them separate. So I strongly=
 disagree with this suggestion and I&#39;m going to keep it as-is. I apprec=
iate the feedback nevertheless.</div><div dir=3D"auto"><br></div><div dir=
=3D"auto">Tamas</div><div dir=3D"auto"><div class=3D"gmail_quote"><blockquo=
te class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc so=
lid;padding-left:1ex">
</blockquote></div></div></div>

--0000000000007d183005db08b5e9--


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 10:51:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 10:51:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294654.501100 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXhXY-0000Xs-4c; Fri, 25 Mar 2022 10:51:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294654.501100; Fri, 25 Mar 2022 10:51:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXhXY-0000Xl-0v; Fri, 25 Mar 2022 10:51:32 +0000
Received: by outflank-mailman (input) for mailman id 294654;
 Fri, 25 Mar 2022 10:51:30 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Ci4N=UE=tklengyel.com=tamas@srs-se1.protection.inumbo.net>)
 id 1nXhXW-0000Xf-Ly
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 10:51:30 +0000
Received: from MTA-08-3.privateemail.com (mta-08-3.privateemail.com
 [198.54.127.61]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 85cc85b9-ac29-11ec-a405-831a346695d4;
 Fri, 25 Mar 2022 11:51:29 +0100 (CET)
Received: from mta-08.privateemail.com (localhost [127.0.0.1])
 by mta-08.privateemail.com (Postfix) with ESMTP id 72ADC18000A2
 for <xen-devel@lists.xenproject.org>; Fri, 25 Mar 2022 06:51:27 -0400 (EDT)
Received: from mail-oa1-f48.google.com (unknown [10.20.151.145])
 by mta-08.privateemail.com (Postfix) with ESMTPA id 4E11518000A1
 for <xen-devel@lists.xenproject.org>; Fri, 25 Mar 2022 06:51:27 -0400 (EDT)
Received: by mail-oa1-f48.google.com with SMTP id
 586e51a60fabf-ddfa38f1c1so7715750fac.11
 for <xen-devel@lists.xenproject.org>; Fri, 25 Mar 2022 03:51:27 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 85cc85b9-ac29-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648205487;
	bh=XOuiBPyL5VTE8kxtvG/wTno3YDXq4iRbzb84h7PeGC0=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=PKE3dguXdAIv10OTvCttx2c1TX7KMQ0XyoIpYnBuf4I0DONDuIlSlJAMjhpF0+l4n
	 ZBXnMnx1YY2z/Pm+W3yKJcIIKdzq+M8A00W9iH2tHd1ghomwvkmjjX5F1i/FmT7fTO
	 DGVBXylT5nOMbqt8KlEdyO0LdoYDZgzZ+OdO3lev+QyzfO8ZCIKZgiJ41v0Bp3R9H9
	 WCUeKl3aqTZDL6/OV+PgGsfIqeRisxprLBybKuYpW5lehBFMV+iAgUJDVVs/7mGyY3
	 H+1yJELSBtSMF3As4qyGJRw01PsioTtVQ+KChS+EgXuiQ1+8Q6h/mOdStIzO+Y7rwH
	 FC/5Sq2m/EaGA==
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648205487;
	bh=XOuiBPyL5VTE8kxtvG/wTno3YDXq4iRbzb84h7PeGC0=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=PKE3dguXdAIv10OTvCttx2c1TX7KMQ0XyoIpYnBuf4I0DONDuIlSlJAMjhpF0+l4n
	 ZBXnMnx1YY2z/Pm+W3yKJcIIKdzq+M8A00W9iH2tHd1ghomwvkmjjX5F1i/FmT7fTO
	 DGVBXylT5nOMbqt8KlEdyO0LdoYDZgzZ+OdO3lev+QyzfO8ZCIKZgiJ41v0Bp3R9H9
	 WCUeKl3aqTZDL6/OV+PgGsfIqeRisxprLBybKuYpW5lehBFMV+iAgUJDVVs/7mGyY3
	 H+1yJELSBtSMF3As4qyGJRw01PsioTtVQ+KChS+EgXuiQ1+8Q6h/mOdStIzO+Y7rwH
	 FC/5Sq2m/EaGA==
X-Gm-Message-State: AOAM530TQ40W3CJ5QiCBkE3eSVnkbWMdt/eUhVlULGawpuPfOD8q9lrc
	Jp+v6d8q2J/+U/vRp4U+CG5Lm2YaSiAjIOkDfPw=
X-Google-Smtp-Source: ABdhPJz2eyjPu9VKFJdLw7R/+ykR6D6Y3HTyN+LC1BjCdLmAUxZVTCHcyS+DXjfJjkYMvt4eDquA5m+wIUvvkyUYOnc=
X-Received: by 2002:a05:6870:b250:b0:de:afd3:e1c4 with SMTP id
 b16-20020a056870b25000b000deafd3e1c4mr816058oam.128.1648205486691; Fri, 25
 Mar 2022 03:51:26 -0700 (PDT)
MIME-Version: 1.0
References: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
 <YjyFODl7VFJLaj0c@Air-de-Roger> <CABfawhk9n08bmXWO1iM7Sz-5uhzuT5W6BZzj+yNDW1+FFDA5GA@mail.gmail.com>
 <YjyTf4INCjKWD09n@Air-de-Roger> <CABfawhmWtxpb3E_vxRRAV6b=P7_T3Mhd+rZ=_XY+6J3-vv+-+w@mail.gmail.com>
 <Yj2Ykz2diY5RTjbS@Air-de-Roger>
In-Reply-To: <Yj2Ykz2diY5RTjbS@Air-de-Roger>
From: Tamas K Lengyel <tamas@tklengyel.com>
Date: Fri, 25 Mar 2022 06:51:14 -0400
X-Gmail-Original-Message-ID: <CABfawh=3i2fWhDyd3Yqg4Zt1NN3tiqYOH3KWTYFxy6L3cqHFBg@mail.gmail.com>
Message-ID: <CABfawh=3i2fWhDyd3Yqg4Zt1NN3tiqYOH3KWTYFxy6L3cqHFBg@mail.gmail.com>
Subject: Re: [PATCH 1/3] x86/mem_sharing: option to skip populating special
 pages during fork
To: =?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>, Xen-devel <xen-devel@lists.xenproject.org>, 
	Jan Beulich <JBeulich@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>, 
	George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, 
	Stefano Stabellini <sstabellini@kernel.org>
Content-Type: multipart/alternative; boundary="0000000000008d16d605db08be55"
X-Virus-Scanned: ClamAV using ClamSMTP

--0000000000008d16d605db08be55
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Fri, Mar 25, 2022, 6:25 AM Roger Pau Monn=C3=A9 <roger.pau@citrix.com> w=
rote:

> On Thu, Mar 24, 2022 at 12:27:02PM -0400, Tamas K Lengyel wrote:
> > On Thu, Mar 24, 2022 at 11:51 AM Roger Pau Monn=C3=A9 <roger.pau@citrix=
.com>
> wrote:
> > >
> > > On Thu, Mar 24, 2022 at 11:15:08AM -0400, Tamas K Lengyel wrote:
> > > > On Thu, Mar 24, 2022 at 10:50 AM Roger Pau Monn=C3=A9 <
> roger.pau@citrix.com> wrote:
> > > > >
> > > > > On Tue, Mar 22, 2022 at 01:41:37PM -0400, Tamas K Lengyel wrote:
> > > > > > +    {
> > > > > > +        cd->arch.hvm.mem_sharing.block_interrupts =3D
> block_interrupts;
> > > > > > +        cd->arch.hvm.mem_sharing.skip_special_pages =3D
> skip_special_pages;
> > > > > > +        /* skip mapping the vAPIC page on unpause if skipping
> special pages */
> > > > > > +        cd->creation_finished =3D skip_special_pages;
> > > > >
> > > > > I think this is dangerous. While it might be true at the moment
> that
> > > > > the arch_domain_creation_finished only maps the vAPIC page,
> there's no
> > > > > guarantee it couldn't do other stuff in the future that could be
> > > > > required for the VM to be started.
> > > >
> > > > I understand this domain_creation_finished route could be expanded =
in
> > > > the future to include other stuff, but IMHO we can evaluate what to
> do
> > > > about that when and if it becomes necessary. This is all experiment=
al
> > > > to begin with.
> > >
> > > Maybe you could check the skip_special_pages field from
> > > domain_creation_finished in order to decide whether the vAPIC page
> > > needs to be mapped?
> >
> > Could certainly do that but it means adding experimental code in an
> > #ifdef to the vAPIC mapping logic. Technically nothing wrong with that
> > but I would prefer keeping all this code in a single-place if
> > possible.
>
> I see, while I agree it's best to keep the code contained when
> possible, I think in this case it's better to modify the hook,
> specially because further changes to domain_creation_finished will
> easily spot that this path is special cases for VM forks.
>
> While the code is experimental it doesn't mean it shouldn't be
> properly integrated with the rest of the code base.
>

Sure, I'm fine with moving it there.

Tamas

>

--0000000000008d16d605db08be55
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto"><div><br><br><div class=3D"gmail_quote"><div dir=3D"ltr" =
class=3D"gmail_attr">On Fri, Mar 25, 2022, 6:25 AM Roger Pau Monn=C3=A9 &lt=
;<a href=3D"mailto:roger.pau@citrix.com">roger.pau@citrix.com</a>&gt; wrote=
:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bor=
der-left:1px #ccc solid;padding-left:1ex">On Thu, Mar 24, 2022 at 12:27:02P=
M -0400, Tamas K Lengyel wrote:<br>
&gt; On Thu, Mar 24, 2022 at 11:51 AM Roger Pau Monn=C3=A9 &lt;<a href=3D"m=
ailto:roger.pau@citrix.com" target=3D"_blank" rel=3D"noreferrer">roger.pau@=
citrix.com</a>&gt; wrote:<br>
&gt; &gt;<br>
&gt; &gt; On Thu, Mar 24, 2022 at 11:15:08AM -0400, Tamas K Lengyel wrote:<=
br>
&gt; &gt; &gt; On Thu, Mar 24, 2022 at 10:50 AM Roger Pau Monn=C3=A9 &lt;<a=
 href=3D"mailto:roger.pau@citrix.com" target=3D"_blank" rel=3D"noreferrer">=
roger.pau@citrix.com</a>&gt; wrote:<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; On Tue, Mar 22, 2022 at 01:41:37PM -0400, Tamas K Lengy=
el wrote:<br>
&gt; &gt; &gt; &gt; &gt; +=C2=A0 =C2=A0 {<br>
&gt; &gt; &gt; &gt; &gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 cd-&gt;arch.hvm.mem_s=
haring.block_interrupts =3D block_interrupts;<br>
&gt; &gt; &gt; &gt; &gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 cd-&gt;arch.hvm.mem_s=
haring.skip_special_pages =3D skip_special_pages;<br>
&gt; &gt; &gt; &gt; &gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 /* skip mapping the v=
APIC page on unpause if skipping special pages */<br>
&gt; &gt; &gt; &gt; &gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 cd-&gt;creation_finis=
hed =3D skip_special_pages;<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; I think this is dangerous. While it might be true at th=
e moment that<br>
&gt; &gt; &gt; &gt; the arch_domain_creation_finished only maps the vAPIC p=
age, there&#39;s no<br>
&gt; &gt; &gt; &gt; guarantee it couldn&#39;t do other stuff in the future =
that could be<br>
&gt; &gt; &gt; &gt; required for the VM to be started.<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; I understand this domain_creation_finished route could be ex=
panded in<br>
&gt; &gt; &gt; the future to include other stuff, but IMHO we can evaluate =
what to do<br>
&gt; &gt; &gt; about that when and if it becomes necessary. This is all exp=
erimental<br>
&gt; &gt; &gt; to begin with.<br>
&gt; &gt;<br>
&gt; &gt; Maybe you could check the skip_special_pages field from<br>
&gt; &gt; domain_creation_finished in order to decide whether the vAPIC pag=
e<br>
&gt; &gt; needs to be mapped?<br>
&gt; <br>
&gt; Could certainly do that but it means adding experimental code in an<br=
>
&gt; #ifdef to the vAPIC mapping logic. Technically nothing wrong with that=
<br>
&gt; but I would prefer keeping all this code in a single-place if<br>
&gt; possible.<br>
<br>
I see, while I agree it&#39;s best to keep the code contained when<br>
possible, I think in this case it&#39;s better to modify the hook,<br>
specially because further changes to domain_creation_finished will<br>
easily spot that this path is special cases for VM forks.<br>
<br>
While the code is experimental it doesn&#39;t mean it shouldn&#39;t be<br>
properly integrated with the rest of the code base.<br></blockquote></div><=
/div><div dir=3D"auto"><br></div><div dir=3D"auto">Sure, I&#39;m fine with =
moving it there.</div><div dir=3D"auto"><br></div><div dir=3D"auto">Tamas</=
div><div dir=3D"auto"><div class=3D"gmail_quote"><blockquote class=3D"gmail=
_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:=
1ex">
</blockquote></div></div></div>

--0000000000008d16d605db08be55--


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 10:53:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 10:53:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294657.501110 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXhZN-00018y-FO; Fri, 25 Mar 2022 10:53:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294657.501110; Fri, 25 Mar 2022 10:53:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXhZN-00018r-CZ; Fri, 25 Mar 2022 10:53:25 +0000
Received: by outflank-mailman (input) for mailman id 294657;
 Fri, 25 Mar 2022 10:53:23 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXhZL-00018f-F6; Fri, 25 Mar 2022 10:53:23 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXhZL-0000JZ-CV; Fri, 25 Mar 2022 10:53:23 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXhZL-000242-2r; Fri, 25 Mar 2022 10:53:23 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXhZL-0005Sn-2L; Fri, 25 Mar 2022 10:53:23 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=CYUzH/sUPyLH3x8enoIJWxqjMJJzoGmQdL6JLhW7KeI=; b=pGKDkAs+Zm5a4ieqkXl9351/LX
	3OLkAE3G7Y4vwJlJ4sokXpYRCs//PPMIojN4gXxX6xMco31tBur22XW1n52jxbpmYgv852cgnYYca
	pnA/xQHCTW0PKsePVOustTn7HHGPI+DuG3qizBMuXPW9Civnmsit/vhr3LvobZGOek44=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168833-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168833: tolerable FAIL
X-Osstest-Failures:
    xen-unstable:test-armhf-armhf-xl-rtds:guest-start/debian.repeat:fail:heisenbug
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=1c80f13a6efdc832878d7a431e2c216039d063bc
X-Osstest-Versions-That:
    xen=1c80f13a6efdc832878d7a431e2c216039d063bc
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 25 Mar 2022 10:53:23 +0000

flight 168833 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168833/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-armhf-armhf-xl-rtds     18 guest-start/debian.repeat  fail pass in 168825

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168825
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168825
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168825
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168825
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168825
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168825
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168825
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168825
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168825
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168825
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168825
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168825
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  1c80f13a6efdc832878d7a431e2c216039d063bc
baseline version:
 xen                  1c80f13a6efdc832878d7a431e2c216039d063bc

Last test of basis   168833  2022-03-25 01:51:56 Z    0 days
Testing same since                          (not found)         0 attempts

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Published tested tree is already up to date.



From xen-devel-bounces@lists.xenproject.org Fri Mar 25 10:59:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 10:59:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294665.501122 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXhfC-0001uX-AX; Fri, 25 Mar 2022 10:59:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294665.501122; Fri, 25 Mar 2022 10:59:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXhfC-0001uQ-7M; Fri, 25 Mar 2022 10:59:26 +0000
Received: by outflank-mailman (input) for mailman id 294665;
 Fri, 25 Mar 2022 10:59:25 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+r7I=UE=citrix.com=prvs=076f4df05=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nXhfB-0001uK-MH
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 10:59:25 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a09a64e4-ac2a-11ec-a405-831a346695d4;
 Fri, 25 Mar 2022 11:59:24 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a09a64e4-ac2a-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648205964;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=s8wYYiBKEzS1T01ityJi4Un6alKEoH5DKQbVVVMus4k=;
  b=YfLg/cZ0GxPaZoC3WD8BiwymUykvGCeBIpbybouXWWglyB9dqtIo37ks
   hvDhdV58cTk61j6Nhpdd0XGi1eVGeeWCjeLvsjO9BYDQpJFsUTNJm4bLB
   g3gjavbh1Py/IMGmz/qJooRV7LX+hGvVcGgclhPGzB/O9x5mIMXEp/bG4
   4=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67064726
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:lv/6eKmTD94Wdw5kq1fIfkno5gxjJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xIXUGmEPquNamqkctwgYIqy9ksE7cPUyN9hSAtrrSBhQiMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiWV7V4
 LsenuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYSz8rJfDiv8EkQwRgDQ16EoN25buYGC3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3oHZvwCufFf87aZvCX7/L9ZlT2zJYasVmQ6mGO
 ZZGM2QHgBLocj1QNlRKIYAEv72vq17DSgQGkErFqv9ii4TU5FMoi+W8WDbPQfSIWMFUk0Cwt
 m/AuWPjDXkyL8eDwDCI9natgO7nni7hXo8WUrqi+ZZCnFSWz3c7FB4SWF20sPS9zEW5Xrp3N
 Eg86ico668o+ySDUtD4Vgb+pHOCsQ8RX/JRFfE37EeGza+8yxaUAC0IQyBMbPQitdQqXno62
 1mRhdTrCDdz9rqPRhq19L2ZsDezMig9NnIZaGkPSg5t3jX4iNht1FSVFI8lSfPryI2ucd3t/
 9yUhCoGha5Oo+ku7rWmxU7rhx2CloXNETdgs207QVmZxg9+YYekYamh5l7a8etMIe6lc7WRg
 JQXs5PAtb5TVPlhgATIGbxQR+/xu55pJRWG2TZS848dGyNBEpJJVaRZ+3lAKUhgKa7okhe5M
 RaI6Wu9CHK+VUZGjJObgarsU6zGLoC6TLwJs8w4iPIXM/CdkyfdoElTiba4hTyFraTVufhX1
 W2nWcitF20GLq9s0SC7QewQuZdymHxunD6OGM6qlE78uVZ7WJJzYe5UWLdpRrpkhJ5oXS2Pq
 4oPXyd040s3vBLCjtn/rtdIcAFiwYkTDpHqsc1HHtNv0SI9cFzN/8T5mOt7E6Q8xvw9vr6Ro
 hmVBx8JoHKi1CavAVjbNRhehEbHAM8XQYQTZnd3Yz5FGhELPO6S0UvoX8doLON7pb05kZaZj
 ZAtIq29PxiGcRyekxw1Zpjhto1yMhOtgAOFJS2+ZzYjOZVnQmT0FhXMJGMDKAFm4vKLiPYD
IronPort-HdrOrdr: A9a23:BmBGTKmmSNZ4e8ctJ8iDvtdnEv7pDfPAimdD5ihNYBxZY6Wkfp
 +V88jzhCWZtN9OYhwdcLC7WZVpQRvnhPlICK0qTM2ftWjdyRCVxeRZg7cKrAeQeREWmtQtsJ
 uINpIOdeEYbmIK8/oSgjPIaurIqePvmMvD5Za8854ud3ATV0gJ1XYHNu/xKDwReOApP+tcKH
 LKjfA32wZINE5nJ/iTNz0gZazuttfLnJXpbVovAAMm0hCHiXeN5KThGxaV8x8CW3cXqI1Sul
 Ttokjc3OGOovu7whjT2yv66IlXosLozp9mCNaXgsYYBz3wgkKDZZhnWZeFoDcpydvfoGoCoZ
 3pmVMNLs5z43TeciWcpgbs4RDp1HIU53rr2Taj8A/eiP28YAh/J9tKhIpffBecwVEnpstA3K
 VC2H/cn4ZLDDvb9R6Nq+TgZlVPrA6ZsHAimekcgzh0So0FcoJcqoQZ4Qd8DIoAJiTn84oqed
 MeQf003MwmP29yUkqp/1WGmLeXLzQO91a9MwI/U/WuondrdCsT9Tpa+CQd9k1wga7VBaM0pd
 gsCZ4Y5I2mfvVmHJ6VO91xMvdfKla9Ni4kY1jiV2gOKsk8SgDwQtjMkfAI2N0=
X-IronPort-AV: E=Sophos;i="5.90,209,1643691600"; 
   d="scan'208";a="67064726"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=nVD81u7NDWD6ubu5OjdZ7SfqyHZuwZS+flXA3bRQG4gsgFBhErC2+1LA9Pq5Dwur6VK+7B82QrF/CAPlA8DFIueHub8p9pBg+bxHTE6YaSW/6XNj1f4LoSoYLo738Nhx5/bfJTTFrWFsB2LN6U5HF5XbUPicrjs0JvJo00qU9PGKbAGaSRx6xKp7Mm6gRRkdKD/BD6Mdwct4O5iCfNzjGoYykLV7vrAZ8x5FADbzGhi7JU9Uujjw/jl65NoYcc1ew6FvsEuVSvILRqcN2xrZNcmwVbCZaJWUE4RL8i8SEABTjiSodahfx3lwEnNUOR/GqxIBtCIyb/kRWPsRpNHUvg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=s8wYYiBKEzS1T01ityJi4Un6alKEoH5DKQbVVVMus4k=;
 b=SS5f6zkOsjIDZy4Gm/vkLS9wwdIFC7c/XkD+6eSA0uVblc/hWVYM0re60FAuA5A2i5+bh5+r//P4OIQgEPCeRgItCM2i82zXpaGV2TPjZ3GQYNtQUQdPFvwsxhrHiNx6jqKzjY0mLqFcJJL2z//VJnAXLlPF0JGgVMo+aMxwA1etUyMIAwHd82qXQwQlFDCIgNpzjuJAEKRsFZgs8jLR2caut+/kLzijuzdZnXGQwWQE6SqBRiYLxTl5Nv+MyjTDh822y4tvflG/7ZB0VMoAjaYluBFDhvRJQMUXsLTrDO7uZodrYxCTMR8j40edv7JRnMHOLevxquZhBCdRWKFXmQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=s8wYYiBKEzS1T01ityJi4Un6alKEoH5DKQbVVVMus4k=;
 b=czKAtRP7bMGaXm8DCCrg85fCV0i8RDiYFCTIwlrSb6kIUilyyaywfqGWInacUaEumFIZb1etHaTr3d9pwCtLrn3LYXly8rZNasTTtG5owMeLJkImFeYmwv905QLBjwYDuVZHO9dZ4+cQd9rQavTXv0zoHCmPzpI/jy9+GWBldS4=
Date: Fri, 25 Mar 2022 11:59:14 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Tamas K Lengyel <tamas.lengyel@intel.com>
CC: <xen-devel@lists.xenproject.org>, Jan Beulich <jbeulich@suse.com>, Andrew
 Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Tamas K Lengyel <tamas@tklengyel.com>
Subject: Re: [PATCH 1/3] x86/mem_sharing: option to skip populating special
 pages during fork
Message-ID: <Yj2ggiWlxvYdh1dJ@Air-de-Roger>
References: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
X-ClientProxiedBy: LO4P123CA0330.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:18c::11) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2a8485f5-01c4-438a-8dc5-08da0e4e82f2
X-MS-TrafficTypeDiagnostic: CY4PR03MB3093:EE_
X-Microsoft-Antispam-PRVS: <CY4PR03MB3093D67BD1EB26D156F805728F1A9@CY4PR03MB3093.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(85182001)(38100700002)(6512007)(66476007)(33716001)(83380400001)(186003)(6916009)(9686003)(4326008)(82960400001)(2906002)(8936002)(6506007)(26005)(5660300002)(8676002)(54906003)(86362001)(66946007)(4744005)(66556008)(6666004)(508600001)(316002)(6486002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?dm1vemRLenl4dkRTa1d0Yis4dWtsczlKTE80T25oQUxvd0R0b09sVTVrcWth?=
 =?utf-8?B?WWlCYSsrUWd0Mmk4bVJRUmw1cGx6ODQ0cjUvNURlVlMrTko3d0g2UmhEZVIz?=
 =?utf-8?B?cEVMelVwVkh6Zk1Ea3pZYU9zLy85dlVnKzExQTg1eVlyVzJsRis4NFd0RHJt?=
 =?utf-8?B?V05iMGtzb3pRMkwwYlozYVFwK21wQ3hGcFZtL0lLVmtrNklFUTRKaXZxTVps?=
 =?utf-8?B?T25uQzdQZWRxUE40akFaSlFockd5dm84RTlYa09KWVMraGNGOVcyT1VxOVVE?=
 =?utf-8?B?ZC9JRGRlNWswS3psd3dReTExSVE2b04zMVUvQXVWVG1kRFd3Qi9icExhakg5?=
 =?utf-8?B?cGhUZnBicGkvcy9vZTNZU2twSFBYUWFGREJyR0g2WXZMRm9HQVJKaDdPS3Yy?=
 =?utf-8?B?WkxFL1BHck8wQW1KZUJxeWR3VUFDRmJxS2todnBSbGdRa1dmUjlranBrUXZq?=
 =?utf-8?B?cm9XUzRFTnBlM3V1U3E5eHlRTnh3dm1DL3gxZGNla2lsWkwrQ25FcnNVb2ZS?=
 =?utf-8?B?SDlxT0hwTDdRaGlhNFF1MEEyTmsycklvd3dwWk93ZWw2VGx5MVlXT0YzdzRp?=
 =?utf-8?B?QWFkUnY3M3k1VnI5aDE4ZzZZcllMTUFNWWl0U0xMWEtDRHMxMnR1bmFta3Q2?=
 =?utf-8?B?MkxzUHJtMHlPTm5VRlFXdTUzZGMzV2xtV3U4ell2UGFqTGtsaHFZOUJzTEY1?=
 =?utf-8?B?NHdkWFFzZFlHcFppK0VSVzBuY2tXQUlPT3J3Wld1VzZLZVhhT0RkZUxETkhK?=
 =?utf-8?B?NVYrbXB4YSs3T0VhY2dnUGVGL0dwVnByajhhYmhqdmF1bk12eUxIRkUwbThR?=
 =?utf-8?B?S0haR3gyU1J1VzFyTHArZHFFM0QwYjdKa1NRVzRUa0hRZ3B6MWlPai9DVjdh?=
 =?utf-8?B?UGhzd0I0QmJnZEkxd2hNM1JQUG9IeWFLM3FaQWdGaXRoS29JbkZZRzFPM2t5?=
 =?utf-8?B?OHU5Yy9nVWtDOFp2Z1RWb2FEb2pxVmJ2cm1FcnNOU2c2Q2VFSjd2bnlubVZI?=
 =?utf-8?B?QWRITWVzZk1kMEhOeWIzM24vNGxHdHVYZUxIL2U3UzlxMDcwVFFPSnQ0QnRj?=
 =?utf-8?B?b2d3YW1PUmU5ZmQvMkMzSVJ2RW45RTJ6TjdUSllWQmpKb1RvZndpNEl2R3dQ?=
 =?utf-8?B?U3BHUmcvdTU0L1VuK04yZUdvYVZQclVtajlsMGNEc2lVaXZuS0wvM1loc0t1?=
 =?utf-8?B?UWtDM2syMlVhcFRldzlmLzJ3MC9xVWlQbkgxL3FsQU1rL2JTbmxjK1lsZ2Rs?=
 =?utf-8?B?aWVXS0l6bS9tb3FxL0lhUWlzcENoaFhlOVVBNktzaFZGN0wvb0JUaFVqSHFS?=
 =?utf-8?B?NVFtY0VjcFJYTnRrZTVESzNCR3JieU1NMndEUDR2dk5sb2R1dTZ4NWxUNi85?=
 =?utf-8?B?anhneitjUkYvZ0JhWUlOMGUzZjZISmV4ajNNT0J6cVo3NGpTNW51YzVoNXRM?=
 =?utf-8?B?ZGpGaDFPN0l6eEkvTU9BVEx4dVErSkJSY0grRzVHNjhPY0VtQkpGdTRLVG1y?=
 =?utf-8?B?SExjQnNqaEZyalJ3VzByUEtaekFNWEFKcVZTMTFRWHRxbTg1b2orMUJDV0s2?=
 =?utf-8?B?WDV6OU1BUm1DQnNkaThidU9pOGZpOXBLTndSR25YUGNEaVZNQW1MaWl5eUJ3?=
 =?utf-8?B?NXh3T2taMWlnUTBuL1AvR0lDYVl4UUpncFZLaUlPd0x6YlRUT0JmbXp4RFNS?=
 =?utf-8?B?WDN6OVlaY09oM2VlaVRqQkNGUnRYQ2ROZkEvMEpkNVlaS0FGOGY0ZnFhVzAz?=
 =?utf-8?B?UDhOUGZsNWtyVE1vRUlsQ3pPdkwzUmFRME1tN01IQXZPV3A4RHplQWFyaEN2?=
 =?utf-8?B?Q2lsckZ6ZFhic1ZpUzJqN2ozdm1IUXhaam5jeWRMUEZQRjl3UDczQWkwcE9q?=
 =?utf-8?B?dm1BR3dIdWZPdklSbW9nNStRK3Vna2cvM2hKVHM2SGpCOU9MWnU2aUh5U01M?=
 =?utf-8?B?SW9xRUw1aWQ3UEdsb3EvVy9Canp2bEFhMjQwdzk3VThFbFo3d1lvc1gwcjZ5?=
 =?utf-8?B?aHRsTlQ4Ym9RPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 2a8485f5-01c4-438a-8dc5-08da0e4e82f2
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 10:59:19.4455
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: A1ub9e6CkCS/VsCgpxXowlzf55ZCJ1C35fepbCrlZJV7B1gE9sxV/Lb0KT0LlUe0gLonVAIaworegNWTFBnHng==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR03MB3093
X-OriginatorOrg: citrix.com

On Tue, Mar 22, 2022 at 01:41:37PM -0400, Tamas K Lengyel wrote:
> Add option to the fork memop to skip populating the fork with special pages.
> These special pages are only necessary when setting up forks to be fully
> functional with a toolstack. For short-lived forks where no toolstack is active
> these pages are uneccesary.

Replying here because there's no cover letter AFAICT.

For this kind of performance related changes it would be better if you
could provide some figures about the performance impact. It would help
if we knew whether avoiding mapping the vAPIC page means you can
create 0.1% more forks per-minute or 20%.

If you really want to speed up the forking path it might be good to start
by perf sampling Xen in order to find the bottlenecks?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 11:07:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 11:07:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294668.501132 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXhmc-0003Mu-3X; Fri, 25 Mar 2022 11:07:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294668.501132; Fri, 25 Mar 2022 11:07:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXhmc-0003Mn-0g; Fri, 25 Mar 2022 11:07:06 +0000
Received: by outflank-mailman (input) for mailman id 294668;
 Fri, 25 Mar 2022 11:07:05 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=hlgX=UE=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXhmb-0003Mh-DC
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 11:07:05 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b39d2c4f-ac2b-11ec-a405-831a346695d4;
 Fri, 25 Mar 2022 12:07:04 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 9C0F81F38D;
 Fri, 25 Mar 2022 11:07:03 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 3B6AE1332D;
 Fri, 25 Mar 2022 11:07:03 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id hGq8DFeiPWIcMgAAMHmgww
 (envelope-from <jgross@suse.com>); Fri, 25 Mar 2022 11:07:03 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b39d2c4f-ac2b-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648206423; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=6dlQyIm7e45K6hZyNwbiQdtlzsub6YFFyMnNbfLv4OY=;
	b=He/o7GejqjVLVUFZxtd1FdK0Dz0DmhC5Yw0P7b0sK1bMY3Y+Z9gBr2OCZWIn1gdDjDNDD0
	X9cPwBghRbBoFPQonhDHgsBAyWYZ5xCKI1c0EFAFE2KCTqO1MRlAi4QIVCv6bnOQy4R7YQ
	sW3fIF2UPy7ECMTUId+648F/Uh6HFq8=
Message-ID: <edb66fd3-cf2f-0780-145a-953936e59beb@suse.com>
Date: Fri, 25 Mar 2022 12:07:02 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] xen: don't hang when resuming PCI device
Content-Language: en-US
To: =?UTF-8?B?SmFrdWIgS8SFZHppb8WCa2E=?= <niedzejkob@invisiblethingslab.com>,
 Boris Ostrovsky <boris.ostrovsky@oracle.com>,
 Stefano Stabellini <sstabellini@kernel.org>, xen-devel@lists.xenproject.org,
 "Rafael J. Wysocki" <rafael@kernel.org>, Len Brown <len.brown@intel.com>,
 Pavel Machek <pavel@ucw.cz>, linux-pm@vger.kernel.org
Cc: marmarek@invisiblethingslab.com
References: <20220323012103.2537-1-niedzejkob@invisiblethingslab.com>
From: Juergen Gross <jgross@suse.com>
In-Reply-To: <20220323012103.2537-1-niedzejkob@invisiblethingslab.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------volcTpjXkFt6gV3L8XUSIXdD"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------volcTpjXkFt6gV3L8XUSIXdD
Content-Type: multipart/mixed; boundary="------------e6ya7KAFsFXbgUSIlzA2g2W7";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: =?UTF-8?B?SmFrdWIgS8SFZHppb8WCa2E=?= <niedzejkob@invisiblethingslab.com>,
 Boris Ostrovsky <boris.ostrovsky@oracle.com>,
 Stefano Stabellini <sstabellini@kernel.org>, xen-devel@lists.xenproject.org,
 "Rafael J. Wysocki" <rafael@kernel.org>, Len Brown <len.brown@intel.com>,
 Pavel Machek <pavel@ucw.cz>, linux-pm@vger.kernel.org
Cc: marmarek@invisiblethingslab.com
Message-ID: <edb66fd3-cf2f-0780-145a-953936e59beb@suse.com>
Subject: Re: [PATCH] xen: don't hang when resuming PCI device
References: <20220323012103.2537-1-niedzejkob@invisiblethingslab.com>
In-Reply-To: <20220323012103.2537-1-niedzejkob@invisiblethingslab.com>

--------------e6ya7KAFsFXbgUSIlzA2g2W7
Content-Type: multipart/mixed; boundary="------------cS18eG8fIhED6cPUakhnN6jb"

--------------cS18eG8fIhED6cPUakhnN6jb
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

T24gMjMuMDMuMjIgMDI6MjEsIEpha3ViIEvEhWR6aW/FgmthIHdyb3RlOg0KPiBJZiBhIHhl
biBkb21haW4gd2l0aCBhdCBsZWFzdCB0d28gVkNQVXMgaGFzIGEgUENJIGRldmljZSBhdHRh
Y2hlZCB3aGljaA0KPiBlbnRlcnMgdGhlIEQzaG90IHN0YXRlIGR1cmluZyBzdXNwZW5kLCB0
aGUga2VybmVsIG1heSBoYW5nIHdoaWxlDQo+IHJlc3VtaW5nLCBkZXBlbmRpbmcgb24gdGhl
IGNvcmUgb24gd2hpY2ggYW4gYXN5bmMgcmVzdW1lIHRhc2sgZ2V0cw0KPiBzY2hlZHVsZWQu
DQo+IA0KPiBUaGUgYnVnIG9jY3VycyBiZWNhdXNlIHhlbidzIGRvX3N1c3BlbmQgY2FsbHMg
ZHBtX3Jlc3VtZV9zdGFydCB3aGlsZQ0KPiBvbmx5IHRoZSB0aW1lciBvZiB0aGUgYm9vdCBD
UFUgaGFzIGJlZW4gcmVzdW1lZCAod2hlbiB4ZW5fc3VzcGVuZCBjYWxsZWQNCj4gc3lzY29y
ZV9yZXN1bWUpLCBiZWZvcmUgY2FsbGluZyB4ZW5fYXJjaF9zdXNwZW5kIHRvIHJlc3VtZSB0
aGUgdGltZXJzIG9mDQo+IHRoZSBvdGhlciBDUFVzLiBUaGlzIGJyZWFrcyBwY2lfZGV2X2Qz
X3NsZWVwLg0KPiANCj4gVGh1cyB0aGlzIHBhdGNoIG1vdmVzIHRoZSBjYWxsIHRvIHhlbl9h
cmNoX3Jlc3VtZSBiZWZvcmUgdGhlIGNhbGwgdG8NCj4gZHBtX3Jlc3VtZV9zdGFydCwgZWxp
bWluYXRpbmcgdGhlIGhhbmdzIGFuZCByZXN0b3JpbmcgdGhlIHN0YWNrLWxpa2UNCj4gc3Ry
dWN0dXJlIG9mIHRoZSBzdXNwZW5kL3Jlc3RvcmUgcHJvY2VkdXJlLg0KPiANCj4gU2lnbmVk
LW9mZi1ieTogSmFrdWIgS8SFZHppb8WCa2EgPG5pZWR6ZWprb2JAaW52aXNpYmxldGhpbmdz
bGFiLmNvbT4NCg0KUmV2aWV3ZWQtYnk6IEp1ZXJnZW4gR3Jvc3MgPGpncm9zc0BzdXNlLmNv
bT4NCg0KDQpKdWVyZ2VuDQo=
--------------cS18eG8fIhED6cPUakhnN6jb
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------cS18eG8fIhED6cPUakhnN6jb--

--------------e6ya7KAFsFXbgUSIlzA2g2W7--

--------------volcTpjXkFt6gV3L8XUSIXdD
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmI9olYFAwAAAAAACgkQsN6d1ii/Ey82
MwgAgY498LKBIzA2iVodDE36CWaBs9UKjV8V2MLhRqduZrtbsh22DtJ6IxlYqPWwqv0oDvvB0OJZ
TBp8H9ePSOxwJsGqzKwsVoZD7G585xsnVFihwd4NBsircO9pyuifwKE0Cm66U/wU8A2AhMs3Oox/
SMtg37sLk8tCzIe2YL1f67QXHgw9GYOZq+uNTYAnh9FSCy9d+yXAEmxLaIj/pz6QQ9TM74p0aTTO
yQwVpknmaCDTEWpa+3orzu4sT+YFTE1bzTntxQ2gWjdjuMBoGiaDM5DuY1+r9B+NY4/uqfP97VQa
mYajPBurHjZXIXtwv5UcZl8ohzO+syb59eYIeOHQIw==
=fyGN
-----END PGP SIGNATURE-----

--------------volcTpjXkFt6gV3L8XUSIXdD--


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 11:16:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 11:16:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294671.501144 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXhvW-0004r8-0R; Fri, 25 Mar 2022 11:16:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294671.501144; Fri, 25 Mar 2022 11:16:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXhvV-0004r1-TY; Fri, 25 Mar 2022 11:16:17 +0000
Received: by outflank-mailman (input) for mailman id 294671;
 Fri, 25 Mar 2022 11:16:17 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Ci4N=UE=tklengyel.com=tamas@srs-se1.protection.inumbo.net>)
 id 1nXhvV-0004qv-5y
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 11:16:17 +0000
Received: from MTA-09-3.privateemail.com (mta-09-3.privateemail.com
 [68.65.122.19]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id faee84b0-ac2c-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 12:16:15 +0100 (CET)
Received: from mta-09.privateemail.com (localhost [127.0.0.1])
 by mta-09.privateemail.com (Postfix) with ESMTP id 69C5418000AD
 for <xen-devel@lists.xenproject.org>; Fri, 25 Mar 2022 07:16:12 -0400 (EDT)
Received: from mail-oa1-f46.google.com (unknown [10.20.151.173])
 by mta-09.privateemail.com (Postfix) with ESMTPA id 441A418000A8
 for <xen-devel@lists.xenproject.org>; Fri, 25 Mar 2022 07:16:12 -0400 (EDT)
Received: by mail-oa1-f46.google.com with SMTP id
 586e51a60fabf-de3eda6b5dso7834721fac.0
 for <xen-devel@lists.xenproject.org>; Fri, 25 Mar 2022 04:16:12 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: faee84b0-ac2c-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648206972;
	bh=ulXEKnSQrOQUY7+s3N9paGkubHNA0yFhq/yYAGK5miw=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=UsR9c5/CUi6giYWUuhPsJd+1MEUda1W7GqR24UPD0/OySRL6gZJDZTRLeOqNM4+Hl
	 G9Kf4En26fRq0FksUf4L+tRzqXNt0sD8L4kF5fDJwoP6eBmiDh8xYaWBMll0fqMxSH
	 bp9pZu1aihqLwKsSYZ3icCHJlrYWj8BD47c2ji1/T0dMkXro4nd5RnbuusSU8zBL4M
	 8GL9t4rUL+Z074UAierCmlxcdDAHC+WF1crgdT8TMuBccHGgz0afCvfwoAeUywNyz5
	 Zw+4HAIzVw11rvMHJBSpZ4Gd1hX0jm6tk0jxRajdpipgNz3QLifaWU2ubLveEEPds2
	 VZ4xxPW786Ccw==
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648206972;
	bh=ulXEKnSQrOQUY7+s3N9paGkubHNA0yFhq/yYAGK5miw=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=UsR9c5/CUi6giYWUuhPsJd+1MEUda1W7GqR24UPD0/OySRL6gZJDZTRLeOqNM4+Hl
	 G9Kf4En26fRq0FksUf4L+tRzqXNt0sD8L4kF5fDJwoP6eBmiDh8xYaWBMll0fqMxSH
	 bp9pZu1aihqLwKsSYZ3icCHJlrYWj8BD47c2ji1/T0dMkXro4nd5RnbuusSU8zBL4M
	 8GL9t4rUL+Z074UAierCmlxcdDAHC+WF1crgdT8TMuBccHGgz0afCvfwoAeUywNyz5
	 Zw+4HAIzVw11rvMHJBSpZ4Gd1hX0jm6tk0jxRajdpipgNz3QLifaWU2ubLveEEPds2
	 VZ4xxPW786Ccw==
X-Gm-Message-State: AOAM532gHeuqq+1zSsq9jiXCYsZCFAOSOjgIq5ouHv7bfTbbclmhUBKA
	+TLuUPUsLYT/AUY7plafhQv1S+RQIQqpXXZ2VPo=
X-Google-Smtp-Source: ABdhPJwaYWE5jGstPkv5sS9ahD1gC2WIvIuFcmzF6Hn49hBy5mdwQ5AEWAbQgUa4C9yhWXQh9fw3Mt3egf4+8G9s+hA=
X-Received: by 2002:a05:6870:b250:b0:de:afd3:e1c4 with SMTP id
 b16-20020a056870b25000b000deafd3e1c4mr859405oam.128.1648206971685; Fri, 25
 Mar 2022 04:16:11 -0700 (PDT)
MIME-Version: 1.0
References: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
 <Yj2ggiWlxvYdh1dJ@Air-de-Roger>
In-Reply-To: <Yj2ggiWlxvYdh1dJ@Air-de-Roger>
From: Tamas K Lengyel <tamas@tklengyel.com>
Date: Fri, 25 Mar 2022 07:15:59 -0400
X-Gmail-Original-Message-ID: <CABfawhkeRENvEJHtXCxME08eMjjAGNVdcBK8ExxgcXY=SzXStA@mail.gmail.com>
Message-ID: <CABfawhkeRENvEJHtXCxME08eMjjAGNVdcBK8ExxgcXY=SzXStA@mail.gmail.com>
Subject: Re: [PATCH 1/3] x86/mem_sharing: option to skip populating special
 pages during fork
To: =?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>, Xen-devel <xen-devel@lists.xenproject.org>, 
	Jan Beulich <jbeulich@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>, 
	George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, 
	Stefano Stabellini <sstabellini@kernel.org>
Content-Type: multipart/alternative; boundary="000000000000104eb905db0917ec"
X-Virus-Scanned: ClamAV using ClamSMTP

--000000000000104eb905db0917ec
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Fri, Mar 25, 2022, 6:59 AM Roger Pau Monn=C3=A9 <roger.pau@citrix.com> w=
rote:

> On Tue, Mar 22, 2022 at 01:41:37PM -0400, Tamas K Lengyel wrote:
> > Add option to the fork memop to skip populating the fork with special
> pages.
> > These special pages are only necessary when setting up forks to be full=
y
> > functional with a toolstack. For short-lived forks where no toolstack i=
s
> active
> > these pages are uneccesary.
>
> Replying here because there's no cover letter AFAICT.
>
> For this kind of performance related changes it would be better if you
> could provide some figures about the performance impact. It would help
> if we knew whether avoiding mapping the vAPIC page means you can
> create 0.1% more forks per-minute or 20%.
>
> If you really want to speed up the forking path it might be good to start
> by perf sampling Xen in order to find the bottlenecks?
>

Sure but for experiment systems I don't think its necessary to collect that
data.

There is also a non-performance reason why we want to keep special pages
from being populated, in cases we really want the forks physmap to start
empty for better control over its state. There was already a case where
having special pages mapped in ended up triggering unexpected Xen behaviors
leading to chain of events not easy to follow. For example if page 0 gets
brought in while the vCPU is being created it ends up as a misconfigured
ept entry if nested virtualization is enabled. That leads to ept
misconfiguration exits instead of epf faults. Simply enforcing no entry in
the physmap until forking is complete eliminates the chance of something
like that happening again and makes reasoning about the VM's behavior from
the start easier.

Tamas

>

--000000000000104eb905db0917ec
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto"><div><br><br><div class=3D"gmail_quote"><div dir=3D"ltr" =
class=3D"gmail_attr">On Fri, Mar 25, 2022, 6:59 AM Roger Pau Monn=C3=A9 &lt=
;<a href=3D"mailto:roger.pau@citrix.com">roger.pau@citrix.com</a>&gt; wrote=
:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bor=
der-left:1px #ccc solid;padding-left:1ex">On Tue, Mar 22, 2022 at 01:41:37P=
M -0400, Tamas K Lengyel wrote:<br>
&gt; Add option to the fork memop to skip populating the fork with special =
pages.<br>
&gt; These special pages are only necessary when setting up forks to be ful=
ly<br>
&gt; functional with a toolstack. For short-lived forks where no toolstack =
is active<br>
&gt; these pages are uneccesary.<br>
<br>
Replying here because there&#39;s no cover letter AFAICT.<br>
<br>
For this kind of performance related changes it would be better if you<br>
could provide some figures about the performance impact. It would help<br>
if we knew whether avoiding mapping the vAPIC page means you can<br>
create 0.1% more forks per-minute or 20%.<br>
<br>
If you really want to speed up the forking path it might be good to start<b=
r>
by perf sampling Xen in order to find the bottlenecks?<br></blockquote></di=
v></div><div dir=3D"auto"><br></div><div dir=3D"auto">Sure but for experime=
nt systems I don&#39;t think its necessary to collect that data.</div><div =
dir=3D"auto"><br></div><div dir=3D"auto">There is also a non-performance re=
ason why we want to keep special pages from being populated, in cases we re=
ally want the forks physmap to start empty for better control over its stat=
e. There was already a case where having special pages mapped in ended up t=
riggering unexpected Xen behaviors leading to chain of events not easy to f=
ollow. For example if page 0 gets brought in while the vCPU is being create=
d it ends up as a misconfigured ept entry if nested virtualization is enabl=
ed. That leads to ept misconfiguration exits instead of epf faults. Simply =
enforcing no entry in the physmap until forking is complete eliminates the =
chance of something like that happening again and makes reasoning about the=
 VM&#39;s behavior from the start easier.</div><div dir=3D"auto"><br></div>=
<div dir=3D"auto">Tamas</div><div dir=3D"auto"><div class=3D"gmail_quote"><=
blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px=
 #ccc solid;padding-left:1ex">
</blockquote></div></div></div>

--000000000000104eb905db0917ec--


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 11:31:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 11:31:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294676.501157 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXiAU-0007HP-FU; Fri, 25 Mar 2022 11:31:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294676.501157; Fri, 25 Mar 2022 11:31:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXiAU-0007HI-CX; Fri, 25 Mar 2022 11:31:46 +0000
Received: by outflank-mailman (input) for mailman id 294676;
 Fri, 25 Mar 2022 11:31:45 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+r7I=UE=citrix.com=prvs=076f4df05=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nXiAS-0007HC-MJ
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 11:31:45 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 23317380-ac2f-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 12:31:41 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 23317380-ac2f-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648207900;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=Pxi1JVQz93/o4clOr6M1/W2kR6cix9q/3JqcdLa9WYU=;
  b=CrWqxTTsUwF37VSaa3ufriBsceCO3+8xDRj0r9t8tZj9BPXFvHe+UwUJ
   DmocB2h80cW7NzXr5wABtxZURx2Q4E3EfG44GSak9H4t5FbPLYCauK57/
   WK48MKDMrD6wYPdNoMnuE2d53K9lYbzkKTcgmr34QAkLANIHgKZePScH6
   o=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 69535840
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:ObMR+6gEDf036/Fnd7opGA5xX161jRAKZh0ujC45NGQN5FlHY01je
 htvWGGPa6mOYTOketgkPNi3pkkA7cfcndZnSQRpqy1gEnwb9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFnQ4
 YqaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YR5yFY7Hwu8FaVp3E3BmBeof6I/OHHfq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bkmtnwjzDS+4vXLjIQrnQ5M8e1zA17ixLNaiPO
 pFEOWY3BPjGSy99FgsvD4Nup+SHgnP+XDBxk2zWgrVitgA/yyQuieOwYbI5YOeiWsF9jkue4
 GXc8AzRAAweNdGZ4SqI9DSrnOCntTjgRIsYGbm89/hrqF6e3GoeDFsRT1TTifuzh1O6WtlfA
 1cJ4Sdopq83nGS3R9z0RDWko3qJuBENVt4WGOo/gCmRw6/d+ECdC24LXzNFQN0gqMIyAzct0
 zehj97vQDBirrCRYXac7auP6yO/PzAPKm0PbjNCShEKi+QPu6lq0EiJFIw6Vvfo0JulQlkc3
 gxmsgAn3J4whpQAz5/40lCWmwrr/4j5RzM6s1C/sn2e0it1Y4usZoqN4Ffd7OpdIIvxcmRtr
 EToiODFsrlQUMjleDilBbxUQer3v6rt3Cj02wYHInU3y9i6F5dPl6h06So2GkpmO91sldTBM
 B6K4lM5CHO+0RKXgU5Lj2CZVpxCIUvIT42NuhXogjxmO8kZmOivpn0GWKJo9zqx+HXAaIlmU
 XthTe6iDGwBFYNsxyesSuEW3NcDn35ilTqOGM2lnk/9itJygUJ5r59cYTNiichjscu5TPj9q
 Y4DZ6NmNT0BOAEBXsUn2dFKdg1bRZTKLZv3t9ZWZoa+zvlOQwkc5wvq6ep5IeRNxv0N/s+Rp
 y3VchIImTLX2CycQS3XOy8LVV8adcsmxZ7NFXd3ZgjANrlKSdvH0ZrzgLNrIuh9qL0yl6Ico
 jtsU5zoP8mjgw/volw1RZL8sJZjZFKsgwePNDCiez8xY9hrQAmhxzMuVlK3nMXSJkJbbfcDn
 oA=
IronPort-HdrOrdr: A9a23:aezSlqB83Tgo/0DlHehOsceALOsnbusQ8zAXPh9KJiC9I/b1qy
 nxppkmPH/P6Qr4WBkb6Le90Y27MAnhHPlOkPQs1NaZLXLbUQ6TQr2KgrGSoQEIdxeOk9K1kJ
 0QD5SWa+eAfGSS7/yKmTVQeuxIqLLskNHKuQ6d9QYUcegDUdAf0+4TMHf8LqQZfngjOXJvf6
 Dsmfav6gDQMUg/X4CePD0oTuLDr9rEmNbPZgMHPQcu7E2rgSmz4LD3PhCE1lNGOgk/i4sKwC
 zgqUjU96+ju/a0xlv10HLS1Y1fnJ/ExsFYDMKBp8AJInHHixquZq5mR7qe1QpF692H2RIPqp
 3hsh0gN8N85zf4eXy0mwLk303a3DMn+xbZuCilqEqmhfa8aCMxCsJHi44cWADe8VAcsNZ117
 8O936FtrJMZCmw0xjV1pztbVVHh0C0qX0tnao4lHpES7YTb7dXsMg24F5VKpEdByj3gbpXXN
 WGNPuspcq+TGnqL0ww5gJUsZ+RtzUIb1q7q3E5y4KoO2M8pgE686MarPZv6kvouqhNDqWs3N
 60QZiApIs+PvP+UpgNdtvpYfHHfFAlEii8eV57HzzcZdQ60jT22trK3Ik=
X-IronPort-AV: E=Sophos;i="5.90,209,1643691600"; 
   d="scan'208";a="69535840"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=CPQ66o1JvfQ8FawgJHLkYRT4xS1KC+hoE5dLd8PfKLtzpcEZQRUe9+7COfQ30HCVAdneX8Yh4ybDkldF5/k+YhN98bwWktsURms2dQPitdDVLSt5Fjsutlt/+wVZQE3DMcbKuvrjobRJA0rvktNEycTjvy/bb6WRxISRzFJYzwUc3OekSWqA3lcpGGvufguioT87Zf4+MVKdRUteqPrTzyiIXfnvPTMKiKfT5sykinGEBue8q5kgq4f0qUqRxaFFWBPW14HDgt9hlJKwHUT2CBeCLSRwWb45qY7wEYscV2GZurHDtbYNrXgQy4kCZJBP4AFmHI4ijNJbZ48kAZdKJw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=fosfs5vUjWHTvLAzYtlPvmNsVRl3S4Imxe/iMzrZxTY=;
 b=SZHaSC4xXmCgRs+8QJI2sluca90Bj1qRgjO23FXTs9RvdIdcll4oMkkzWXBrNoSWVB0IWfY98mHnx58U4ooXLJMC1TOGaGsSHz5wqOZifd2dEJDYtebpi0ACjmmZ8g8ur0z4B7WaykesHwRFPL91q0mNcn9SR3ZhmiykyN9s/bSBcG1C3n/IVkZCpD/rE0X2YO9WTVdCXsGngpGvLE6GodLUHBs6WCeyxEtV6TBD4FbRtZ5zx/H+WO34xHHi/b2DbppF2wWSEFyms4BBpzgY71rmjnwdwbJAtRU8CWdlbKK3ASU9xjI+4oXChBB+8TPbN/naqe5FEaCcB3R00dP4mg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=fosfs5vUjWHTvLAzYtlPvmNsVRl3S4Imxe/iMzrZxTY=;
 b=jEHB3rCsqPlIXUVlSGE+2vRCYAVcifw+32Ed5pTjRtNGSwie5yvIBJhChcHzGvWwOnA54o4GiJP2pFs/Ki8SBaDub0b2/RnXx4reMAimSkk01/D5UYwyOuwfX+Qwxz8NPN7bEa70YjvwMSIpVJduSbn9bmyc0HCaOvjnu13Ld0g=
Date: Fri, 25 Mar 2022 12:31:31 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Tamas K Lengyel <tamas@tklengyel.com>
CC: Tamas K Lengyel <tamas.lengyel@intel.com>, Xen-devel
	<xen-devel@lists.xenproject.org>, Jan Beulich <jbeulich@suse.com>, Andrew
 Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>
Subject: Re: [PATCH 1/3] x86/mem_sharing: option to skip populating special
 pages during fork
Message-ID: <Yj2oE5uFPNDMszFk@Air-de-Roger>
References: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
 <Yj2ggiWlxvYdh1dJ@Air-de-Roger>
 <CABfawhkeRENvEJHtXCxME08eMjjAGNVdcBK8ExxgcXY=SzXStA@mail.gmail.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <CABfawhkeRENvEJHtXCxME08eMjjAGNVdcBK8ExxgcXY=SzXStA@mail.gmail.com>
X-ClientProxiedBy: LO3P123CA0014.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:ba::19) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 519186e3-c523-4450-eebc-08da0e5304b0
X-MS-TrafficTypeDiagnostic: SN6PR03MB4367:EE_
X-Microsoft-Antispam-PRVS: <SN6PR03MB4367D2C072CFF5D516D9954F8F1A9@SN6PR03MB4367.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(8676002)(4326008)(66476007)(66556008)(66946007)(6486002)(26005)(186003)(5660300002)(6666004)(6916009)(2906002)(316002)(54906003)(85182001)(83380400001)(8936002)(6506007)(38100700002)(82960400001)(508600001)(86362001)(33716001)(9686003)(6512007);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?d2l2eDcxRXVxZk84YU5lQ2Nzelg2S1NsMFBLK29DNFhId3ZWZW1HRkpaZjhl?=
 =?utf-8?B?ODFxNGRoeWxDYmdUWWhacGRxRDM1cFBjMVc5OUcxTUF4c3NkZWsxZjEySUsv?=
 =?utf-8?B?TXFsRWxQWml1d1Z6cU9DVTEvcjkxK3B6aHlXeWtNZkdTc0Q3Y0lkdUo0eXJC?=
 =?utf-8?B?Wm9rMXNuQzdhNmJ5cHh6MlN1Y2hKdmZ6TEE0Y0RjZ216OVRHYm1MMFhGRXQ1?=
 =?utf-8?B?QnJ2SVpUdzhwRlVUdi9ld1FjMTRHc1BKdk5CSjVVdFpqbEUwUXJ6ZnlOTGZ0?=
 =?utf-8?B?allCR0JWUWgxTk5BT1FqbkxSQllqc3MxZExPSHhZMnFsM2FmMUZTS0tKY0lQ?=
 =?utf-8?B?S05jd09jMm15cTl5K1graDI0SGlWOGJMdWE0NTVVY1NiUFp2ZWtHUmd4QVVD?=
 =?utf-8?B?Wkx5L1BqQmVqdXJmK1djNnhEbjg3L0ZPamxnMnlRVU5YNXFWS1o3ekpDQ2cr?=
 =?utf-8?B?b3haVzV3d0c2dktYZExaWDlsN2RwYkR3RzZUZ0VueG9OZ2hFSm4xVnpMUFdV?=
 =?utf-8?B?WWtJRjZnemlvbWd4NlJSTFJuWXNKdHlIZVcyMW1nU1VJeG4vbzJGc25HTGpK?=
 =?utf-8?B?S1FYcll0RmN1T2N5eVhicCt5UkhTMkRpaEhIdE9RMzQzU2RMUkt4M1c3YWhZ?=
 =?utf-8?B?QThZT2FKdy9ZQmtTRzBlamIvN2crbUtiNm1XMVl1bi9EdUpLcHBsSWlKVDJE?=
 =?utf-8?B?RWtieUJXR2RtdzZDV0R0VElxZkZCL3k1SDlFYW1aT2JsTmh2QnRRYVhFNzN2?=
 =?utf-8?B?RzdpZVVLRC9GVUhkTnVwTlh6SjdoYXZoSjdWU25LWE9lZmJqM3gvU3FwREts?=
 =?utf-8?B?czJaaDM5R0VaQ1R1b3ZrVkZ0d2twQlQvbTNrOEF4VnRORTVsVW4vSitkOTBt?=
 =?utf-8?B?UTJyclE3bjZrZ1RCUEJJaDlKVHVDaVJHWXNqZXhYMFdabzBxbzhKb0d0M0ZC?=
 =?utf-8?B?ZWhNeEl2V3lWYVA5eEUwdVloektmcnFmVW9wTFRaM3k2M0lYMW9sOHhNTkdU?=
 =?utf-8?B?UEV5UXJEd3JZNW1DMS9aUjJ5WCtodmt1NE5TTDVIVDJvWGlhV2tFalZDV3BS?=
 =?utf-8?B?MFRUTm1xSEtKeldlRDlIQjFaY2czZTMra2lrNkt4OVFHMVVMc0tSVkZ1Wms3?=
 =?utf-8?B?OEhvbEllOER1MlFFUW9NT2RwakNla1kvNDRyeGZHOXJNUG1VRlRnc3orSEdl?=
 =?utf-8?B?c25ZWnBpdWJsbS9vN3lJUldwNWRhLzBFN1N4SnpIajg2NXM0NE54d2U5bmtK?=
 =?utf-8?B?azFwbVhqblJzdnQ2NUtWWkdETXhjNDBFQ0Z6eUlmSkl6Y29sYjRKc0xBOTda?=
 =?utf-8?B?dGFMbTJlS2M3MHBwT0ZoSHR1THJZaXZ0RTRya2VsbFd3U094RjFtM0JtY2pE?=
 =?utf-8?B?azZwQnpnN2cyR0E5WVFYN2VwK1haZlhkYmRveVlNVzJTcitIdElsVUtSVFJU?=
 =?utf-8?B?TG5URVJTQ3M2SkxTVERNOTRyL1MxM1lKS2JDOWw0bWN4ZTkrY0dHcU5JSzd6?=
 =?utf-8?B?TDE2UndKZVdTdWI2eUwrNVUzblBsVUYvNzRxa0c4VmpBcExRcm9zV2hCdlhs?=
 =?utf-8?B?UTVCWnpvMHQrL0M5T0s1VjAxb0xzR3BKeUp2VUhSNTFkVnRMZ0xhVjJrRGht?=
 =?utf-8?B?TFlMeUdEVXBzdlNSQlR4SHhTT0d3elh4S0ZxTlBGcGVVMjQzbElaQW0rc3hC?=
 =?utf-8?B?K3ZheXpZNm41MHoyODZuK3ViVjlGWXpMZjB4UHFBeEVJcUU5TVlZNFFXSVFl?=
 =?utf-8?B?TkxGcHRQcmQ2a3B4MGpPSnF2SUVwSWRlbHdHWHNUaE02VzB2Z3BsZlFDMWVl?=
 =?utf-8?B?eERHeHBzYTM1dUlnWTNjNnVIQ1FFZUlrT0lXK1pWYWdUc1o1WC9Kc3hKSTFu?=
 =?utf-8?B?bC9JeGV4eWdkWEVWS3hxMzVBYWptOUZFT05pZlNReHdiL3RhZ2EwWDhyK0FT?=
 =?utf-8?B?U05iSGVLcWFYd0R4NmdseTNhUE14R2lGYis3NTlaQzZQZms5QmZUUHZHSW84?=
 =?utf-8?B?Z05FejlHZVhiUjlvalR5UTNPbE0zMTIrM2pkWHRlNzJ2VGIxeUtFaXI3aGJv?=
 =?utf-8?B?RlUxSU15ZytjU3dNQnBXbS9ZTU16QVpNMWlWTUVMMU9iaVRYQ2FOOXpCUito?=
 =?utf-8?B?NWhUV3ZFVGR0RlFzdnlJVjJvMmtNL0xPc3NqckZYQ3B0dmkvSkJsRUovQk9m?=
 =?utf-8?B?R2xlZHNYbmJ0T2JxMGw5UVR6RU95TEcyR1dDayt5aU1OazJ1aUtCSFdlZUw0?=
 =?utf-8?B?NEUvQ2F2K095dVpJWWJjQkdUelBGS2Y1anZtanpGT3JpeXB3WUxwa0s3bWRU?=
 =?utf-8?B?aVhqcURRaDJXWXBTazI5UkRjV2ZhcHZyV3U0RlR6RnRTazlPeW1NaUZqSldD?=
 =?utf-8?Q?OwNVctnM1crBFJ2U=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 519186e3-c523-4450-eebc-08da0e5304b0
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 11:31:35.1687
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: szoHEHUobhr9kNYtP95TabSVMQN9NMxGePHy7TlkzLdfDjMPnwHCH0+AS+UklfUKLh0+gue7olgG0zuhjhoEww==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR03MB4367
X-OriginatorOrg: citrix.com

On Fri, Mar 25, 2022 at 07:15:59AM -0400, Tamas K Lengyel wrote:
> On Fri, Mar 25, 2022, 6:59 AM Roger Pau Monné <roger.pau@citrix.com> wrote:
> 
> > On Tue, Mar 22, 2022 at 01:41:37PM -0400, Tamas K Lengyel wrote:
> > > Add option to the fork memop to skip populating the fork with special
> > pages.
> > > These special pages are only necessary when setting up forks to be fully
> > > functional with a toolstack. For short-lived forks where no toolstack is
> > active
> > > these pages are uneccesary.
> >
> > Replying here because there's no cover letter AFAICT.
> >
> > For this kind of performance related changes it would be better if you
> > could provide some figures about the performance impact. It would help
> > if we knew whether avoiding mapping the vAPIC page means you can
> > create 0.1% more forks per-minute or 20%.
> >
> > If you really want to speed up the forking path it might be good to start
> > by perf sampling Xen in order to find the bottlenecks?
> >
> 
> Sure but for experiment systems I don't think its necessary to collect that
> data.

It helps weight whether the extra logic is worth the performance
benefit IMO. Here it might not matter that much since you say there's
also a non-performance reason for the change.

> There is also a non-performance reason why we want to keep special pages
> from being populated, in cases we really want the forks physmap to start
> empty for better control over its state. There was already a case where
> having special pages mapped in ended up triggering unexpected Xen behaviors
> leading to chain of events not easy to follow. For example if page 0 gets
> brought in while the vCPU is being created it ends up as a misconfigured
> ept entry if nested virtualization is enabled. That leads to ept
> misconfiguration exits instead of epf faults. Simply enforcing no entry in
> the physmap until forking is complete eliminates the chance of something
> like that happening again and makes reasoning about the VM's behavior from
> the start easier.

Could we have this added to the commit message then, and the option
renamed to 'empty_p2m' or some such. Then you should also ASSERT that
at the end of the fork process the p2m is indeed empty, not sure if
checking d->arch.paging.hap.p2m_pages == 0 would accomplish that?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 11:43:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 11:43:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294680.501172 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXiME-0000NR-LL; Fri, 25 Mar 2022 11:43:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294680.501172; Fri, 25 Mar 2022 11:43:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXiME-0000NK-Hy; Fri, 25 Mar 2022 11:43:54 +0000
Received: by outflank-mailman (input) for mailman id 294680;
 Fri, 25 Mar 2022 11:43:53 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=73hT=UE=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nXiMD-0000ND-DT
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 11:43:53 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d7bb0a44-ac30-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 12:43:52 +0100 (CET)
Received: from EUR02-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur02lp2053.outbound.protection.outlook.com [104.47.6.53]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-22-haoSPA1NOyGomJByzMh1ww-1; Fri, 25 Mar 2022 12:43:49 +0100
Received: from AS8PR04MB8609.eurprd04.prod.outlook.com (2603:10a6:20b:424::9)
 by DB7PR04MB4363.eurprd04.prod.outlook.com (2603:10a6:5:28::30) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.19; Fri, 25 Mar
 2022 11:43:47 +0000
Received: from AS8PR04MB8609.eurprd04.prod.outlook.com
 ([fe80::5413:50c3:f5e8:d90f]) by AS8PR04MB8609.eurprd04.prod.outlook.com
 ([fe80::5413:50c3:f5e8:d90f%9]) with mapi id 15.20.5102.018; Fri, 25 Mar 2022
 11:43:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d7bb0a44-ac30-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648208631;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=YoS+yVpNABXRJkh5LF0mYJ+u68RL4SKmGCqn50EGriU=;
	b=kK9ba3+3qZ55qbvzLrJ8viYQcVE109+QDRnZMI/WIZ9x08ruJEc72oFJPsQ1UqPOCet1JA
	eihR9yGzeAERW3jTltFbNsrFPBne+d3vKb2K3IJR3Sy/5Db4+BrogwXcbbpLOBw6Tz5dnl
	MTX6mieklyUEjTLmS3r6BQskBIU+HQE=
X-MC-Unique: haoSPA1NOyGomJByzMh1ww-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=EV2gOr/UkOPaw0K5ldfKpKq1h0itD9JnrdUp6CZWaveQQ+PXaX3jdeY+o4XAvkqbySRlJNvc0BOW3/UPjlMFeYDcrI2KUqD0UGi/S6ajw51XU+TP0svJIeNviz4nU7ZR1cPqzcQtoqdY4W0UAIC/+lWU+L8V5R8KW7GtjfTLtr5ehmgFCLXNTxiMBijHdBiwTFfKeVAANjQllu7CB77/Z42S8Unp3s3UC6oHnXLbTUu1HhQMVA1NbMFbaXVUNhwgZKbssYELakur9LOYRQaoXksjeUpzDRsi70SxTqaJCXd4saAejULpgzbk0aqhQhhxNDVLYx+VdrO3zLnzzQXqeA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=YoS+yVpNABXRJkh5LF0mYJ+u68RL4SKmGCqn50EGriU=;
 b=LiKwe3WMVeciabc8IqX9ZRO7H8k3NkeZU71XaFqWKhgnq+l3UG5RF5pcQiiVhhN0lOKr288QN6iuRuPldGX5Ja6AyVp0tusuONwsMhV3uz5j1RnVUV1HVGgaBWjil8iSIn4MZitzThdnqhi9h2atRB4qxa80F06akiFiteDLz3u38dQzszjCgaSBMsYmMLN/pOOta0Ieqoc0dVRqtaS1p0UzhGo90s2+V9ibyUNK9PSPUi/qYYdKeo3kz6Huzwe20QtOcsAH4nM2AXXQhbVdTZmA8IVwj1e147YbBE3RvNSCvKG95/5xkUfeVSLgjIch5beT7TMKyfMshk4IGKNfcw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <d797474e-97c0-7545-c68f-1378a3b2fbd9@suse.com>
Date: Fri, 25 Mar 2022 12:43:45 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [RFC PATCH] xen/build: Add cppcheck and cppcheck-html make rules
Content-Language: en-US
To: Bertrand Marquis <bertrand.marquis@arm.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Michal Orzel <michal.orzel@arm.com>, xen-devel@lists.xenproject.org
References: <77c79e86050eef2b706ee11e64183d57a0f5bcee.1648119732.git.bertrand.marquis@arm.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <77c79e86050eef2b706ee11e64183d57a0f5bcee.1648119732.git.bertrand.marquis@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P194CA0092.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:209:8f::33) To AS8PR04MB8609.eurprd04.prod.outlook.com
 (2603:10a6:20b:424::9)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: a712c91c-f078-44d5-ddbc-08da0e54b92f
X-MS-TrafficTypeDiagnostic: DB7PR04MB4363:EE_
X-Microsoft-Antispam-PRVS:
	<DB7PR04MB43630325787FB5EBA0DBD185B31A9@DB7PR04MB4363.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	lJ02EbqibqWquQ885eJtVE+HCnCoVpl1kEvy9ORw35xkCoEB2hgDKihdsGZA8uicXbt7/mQCBzjoV5QyF0QN8DAbNmgVabWvPZn1efNcfW896Qr+d8kvIdWlIYBt9sLUi1MQR2J5+JUCfrnI8Fz9n6KpyO4u7DyYWOtRjo5sTLBTkp3c9R4DqXYPA5IA54cCbKW1hXk8guzcS1Ol339GGj/MOs1q+dS1LRDZAxx4YFWkDeSo+z4cPLDwPcPxwOGwxpd80rwbTkmyQ5nZ4iR1KKI13tW3Ua7O/SA2mNm+7CwU7xKXHadzoqOTQGBAebP4W27NiKfKLL1FNMmpdJcJS70AFDUoVzUtVSra10tW2vW3MyM1UlTsS5S6nd2+g4HB7EEVcF/HhlZUSCjDona8GuI6xHoinSKs0a6Wwt+MSc17M6LAobaZePukRd2Orxf/cHDaG9Ki6h4488IUE2oW/qghErYqSmKOnky+TtCpyC5aRQmYRHYdIwXzh1mqrPYMeExSwj6OhRKurQRsutiwVAs1vNGqJyIpKGaxtoLjc1al4ac0Xr/PUy9IQBfdzEnn7phgDasE5CCkDPswuL3NMo2/RAprPlZjoWw4+DH5iPceauvjP/2Ln7n/4GcNCG7qI+jRBqnnKyxGWhA1xP29FT6tPdgQHqHK4F93s0qZPUP2GWjB0/SWPHave2joj5w7OIT9ccmJpm11yUPLSepXEVeNKwogmNrYoNZ9otCkL6g=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AS8PR04MB8609.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2906002)(66476007)(8676002)(54906003)(66946007)(316002)(6916009)(8936002)(86362001)(5660300002)(31696002)(66574015)(4326008)(66556008)(2616005)(38100700002)(36756003)(6512007)(6506007)(53546011)(6486002)(186003)(26005)(508600001)(31686004)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?RS9VZittbFFnSnRHcHVhTmh4ZXpxTW5zM2JuRjFtdWVFT3VGaTJrbjIzUXM0?=
 =?utf-8?B?Zk5XZVExbVhCUXE2MU1QWU9TWTVESEpVYmg0Q1RoZHkyaElaVzBvZERlbzRM?=
 =?utf-8?B?OGFQMWxjRnZoaThyTTFBMmt2V0RQM0p3QTFMQmtmemg5dFJmeTZpcjVkb0dz?=
 =?utf-8?B?M1BseTFxNHQ2WElGOFdtTFBCYTNSVUtTZ016R3U3eGIwMXptenVsZHlhYlBn?=
 =?utf-8?B?T1B5WmR6UnJaTHhib3pUZUNJL1dMSkFXMUVpQW56UDlUWHk2MFlSbHZxcXpu?=
 =?utf-8?B?T0NKcmd4bmFHMzVvRXJoV2IxN0FxN1FXR0xvZE8xb0Z3d3BDVUVvOU9kdnhz?=
 =?utf-8?B?clJvbzZYMmxqZGlIZTJubzdTamdYcldzYjU3Q0s5TElxMm5QL3JoUHhtZmRp?=
 =?utf-8?B?eTcrN213aGtCQkJyaXVqNVhiMWpvQkJXY2lwemJhRElHcWliSmtWVCtnK1lu?=
 =?utf-8?B?bUZHVFV1N2c0NElnOTFiNFpjdHpTcEZHUVhmM1loTXBCeWlNRGsvcEU0YVdz?=
 =?utf-8?B?K0Z3ZTlhVGtRS0FJLzZtUmsyK0VtRStDbUMwd2Z5RjdyMVVvclg4dXZza2Ny?=
 =?utf-8?B?aHJLZkpoYW9YbTZqUVNSb3YvYmhNNGNDU2EwMEhTNzRpdjgwa1NXMU1SaGtX?=
 =?utf-8?B?Z1RLNHNVcVhyRFFkNTlUbEwzeFdIcWNXYjA0T0tZbnVyN3czTTBvdnJpcWdL?=
 =?utf-8?B?b1VHN1JqZDRnclJjSnpKVUFqdElKam5Vd05SSjFaV2hKVGVqWVd4VHExbEZ0?=
 =?utf-8?B?V2VpelU4QVFoa3loRXNaVjVtemN6aEFjWFNZWUt3akp4UW1odXpGcXJaMUQ0?=
 =?utf-8?B?VEFPc0lZUElQWE8zR0Q5UjZzbjRCRWNDVnF4NnpOemliN1V6dWQ1R0tZa2VG?=
 =?utf-8?B?Ulg4NWxTdXNGR1E5eE5pRjVlWW5ZWmFaNkNRc05ZYU4rQnVLczdUaEl2K2N1?=
 =?utf-8?B?aVk5a2t5Ym02RjFqU0FpL0QxSDdOdXRFOHFueGU5eDk0a0NSR2o1SS9obitH?=
 =?utf-8?B?VDUwQ3RpSGFwYXJpYjNXT3hZQ0JjWjlZYTREa21SdGVxWk1pRFFrZVlIbkRy?=
 =?utf-8?B?QThGeTNvaGxLUE5OUi9Na3Q1dEdjTTlSSG51QnlycTlpaFhJUGVJV0RUdVk4?=
 =?utf-8?B?QmRoWFJVQ1hGa2JOamFJeHUrQUlxbytnMHJaczYzeDVxZG1FejFycHJWcjFI?=
 =?utf-8?B?OEd2bmo5MThiVGVqVTlwa1NjNGg4Wm5VYmJjZCtSU3MrTUJvMWNKSXNQQzBy?=
 =?utf-8?B?aUxVSnVNSXlFWEFIdXRYSFI3NWxDV1hIOEI3Ni9EeTU1aHJ6SGVScEdqem5B?=
 =?utf-8?B?aGdzRWdGcWtHTDFIbDVnbzNFTnlSUGRid0lKMk1NOWZZelFVWEM3RFpPSkEy?=
 =?utf-8?B?ckpsb29kZHRlaTNTZUlOakM4REhSZWxkbEZRSUVWNVRHd2hvMVFFaDdGNDBI?=
 =?utf-8?B?dFRVMlU0akxteks0cHZUNVcxZE9IYVpoSkxtdmNkd0xWbWV2TWE2S0xuRnhm?=
 =?utf-8?B?UVhvYVBvSmZ3cy9wcVlvWEdkaHJwMEpxQjdJMHJIMVJYVkcxS3hiTDBXMWpR?=
 =?utf-8?B?QmtKb21hVmVVbklwRnVDaVN2dTkxeUZmelh1T3ArUytaTWd0ZUp2V2hCbE5R?=
 =?utf-8?B?WXpQS2pHc1AwWFJudjZZVGxUbTVFMVZ0R2xWa2c2dGx1dmZkcDk4UEt1N3dp?=
 =?utf-8?B?N3Y1WXVlRDNuZ0x4NUxXQk93ZUxTdWk5VjhYMDRmRE8xMHNXSGpINDlZYjlL?=
 =?utf-8?B?MkFxTnlXYUp0Q1p5OE1NT0NTZ2dDOUY1UlRXem9yVUZ6UjhFeElBUWNpMlZR?=
 =?utf-8?B?N0E4TUpZMVBrZUNYZ1pmMG9RRk42Q3JSYXZqdDdKTzAzRXNXKzlsN1RIYVFr?=
 =?utf-8?B?dGRjNmVseHpTSzBnMkgwZTVMMzJvL1ZxMUs1RTZyMmxXaEJXbkRrR01uUVNU?=
 =?utf-8?B?cFFURTA0alc3NC95SVFYRTFQc3ZwV3Z5dTU5N29pa2IxN216bFBaa3JWNmdC?=
 =?utf-8?B?OVEzZ1U2NDd0SlRDZUJpeEE1SzJsRUtnbU94VmF0VEJYZkljN2FkOEZUN2pn?=
 =?utf-8?B?anFJanhDMXpMSzBBZUR6djBBUGVpSHZ4N09meGpta2JEWjdady91WUJYcEx5?=
 =?utf-8?B?dllZWmYrYUZWUitKblVuQWpXSytDbUQxOFZlRFE1akpMN0Q5TVJWS2JWOHpo?=
 =?utf-8?B?dzViY0xPVm1LMWFkOGYveVI2ZzV4SGh3eGw0R3hJbmEvU1dCZ0tsRWZjaytH?=
 =?utf-8?B?dVp0ZFJaZXZqQm5Xb3JpM2RlSE5OZ3FXbiszTjhxTG5ZYnlVaWIwUStEanlG?=
 =?utf-8?B?Y0lpWm1pUUFCcXRmVENSVXphYjBiQ3Z2TnczZ0xuNE9FQVNQK25tdz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a712c91c-f078-44d5-ddbc-08da0e54b92f
X-MS-Exchange-CrossTenant-AuthSource: AS8PR04MB8609.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 11:43:47.4416
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: fkc9l2o/wrfXqdHNAURvZEmJ3qUm62nn1y2dIpFHhaod+WstkmoZGPXMTPW32O52dtRCxYOTL4SOStZY+6xJxw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR04MB4363

On 24.03.2022 12:04, Bertrand Marquis wrote:
> cppcheck can be used to check Xen code quality.
> 
> To create a report do "make cppcheck" on a built tree adding any options
> you added during the process you used to build xen (like CROSS_COMPILE
> or XEN_TARGET_ARCH). This will generate an xml report xen-cppcheck.xml.
> 
> To create a html report do "make cppcheck-html" in the same way and a
> full report to be seen in a browser will be generated in
> cppcheck-htmlreport/index.html.
> 
> For better results it is recommended to build your own cppcheck from the
> latest sources that you can find at [1].
> Development and result analysis has been done with cppcheck 2.7.
> 
> The Makefile rule is searching for all C files which have been compiled
> (ie which have a generated .o file) and is running cppcheck on all of
> them using the current configuration of xen so only the code actually
> compiled is checked.

Why this restriction? It means there are multiple runs needed in case
files are touched by a patch which can't both be built at the same time
(e.g. ones under multiple xen/arch/*/). In addition, by going from .o
files, you also require (and yes, you say so) that the tree has been
built before. I think you would instead want to go from the collective
set of $(obj-y), $(obj-n), and $(obj-), traversing the tree suitably.

> @@ -511,6 +513,75 @@ cloc:
>  	    done; \
>  	done | cloc --list-file=-
>  
> +# What cppcheck command to use.
> +# To get proper results, it is recommended to build cppcheck manually from the
> +# latest source and use CPPCHECK to give the full path to the built version.
> +CPPCHECK ?= cppcheck
> +
> +# What cppcheck-htmlreport to use.
> +# If you give the full path to a self compiled cppcheck, this should be set
> +# to the full path to cppcheck-html in the htmlreport directory of cppcheck.
> +# On recent distribution, this is available in the standard path.
> +CPPCHECK_HTMLREPORT ?= cppcheck-htmlreport
> +
> +# By default we generate the report in cppcheck-htmlreport directory in the
> +# build directory. This can be changed by giving a directory in this variable.
> +CPPCHECK_HTMLREPORT_OUTDIR ?= cppcheck-htmlreport
> +
> +# Compile flags to pass to cppcheck:
> +# - include directories and defines Xen Makefile is passing (from CFLAGS)
> +# - include config.h as this is passed directly to the compiler.
> +# - define CPPCHECK as we use to disable or enable some specific part of the
> +#   code to solve some cppcheck issues.
> +# - explicitely enable some cppcheck checks as we do not want to use "all"
> +#   which includes unusedFunction which gives wrong positives as we check file
> +#   per file.
> +#
> +# Compiler defines are in compiler-def.h which is included in config.h
> +#
> +CPPCHECKFLAGS := -DCPPCHECK --max-ctu-depth=10 \
> +				 --enable=style,information,missingInclude \
> +				 --include=$(BASEDIR)/include/xen/config.h \
> +				 -I $(BASEDIR)/xsm/flask/include \
> +				 -I $(BASEDIR)/include/xen/libfdt \

Why ware these two -I necessary? Shouldn't they derive cleanly ...

> +				 $(filter -D% -I%,$(CFLAGS))

... here?

As to style (also applicable further down) I think it would help if you
didn't use tabs and if you aligned things, e.g.

CPPCHECKFLAGS := -DCPPCHECK --max-ctu-depth=10 \
                 --enable=style,information,missingInclude \
                 --include=$(BASEDIR)/include/xen/config.h \
                 -I $(BASEDIR)/xsm/flask/include \
                 -I $(BASEDIR)/include/xen/libfdt \
                 $(filter -D% -I%,$(CFLAGS))

> +# We need to find all C files (as we are not checking assembly files) so
> +# we find all generated .o files which have a .c corresponding file.
> +CPPCHECKFILES := $(wildcard $(patsubst %.o,%.c, $(filter-out $(BASEDIR)/tools/%,$(shell find $(BASEDIR) -name "*.o"))))
> +
> +quiet_cmd_cppcheck_xml = CPPCHECK $(patsubst $(BASEDIR)/%,%,$<)
> +cmd_cppcheck_xml = $(CPPCHECK) -v -q --xml $(CPPCHECKFLAGS) \
> +				               --output-file=$@ $<

As per the earlier comment (just to give another example) I think
this would want to be

cmd_cppcheck_xml = $(CPPCHECK) -v -q --xml $(CPPCHECKFLAGS) \
                               --output-file=$@ $<

(i.e. with continue options aligned with the first one). This is
even more noticable with ...

> +quiet_cmd_merge_cppcheck_reports = CPPCHECK-MERGE $@
> +cmd_merge_cppcheck_reports = $(BASEDIR)/tools/merge_cppcheck_reports.py $^ $@
> +
> +quiet_cmd_cppcheck_html = CPPCHECK-HTML $<
> +cmd_cppcheck_html = $(CPPCHECK_HTMLREPORT) --file=$< --source-dir=$(BASEDIR) \
> +										   --report-dir=$(CPPCHECK_HTMLREPORT_OUTDIR) \
> +										   --title=Xen

... needlessly long lines like these ones.

Also aiui you shouldn't be using $(BASEDIR) anymore, but $(srctree)
or $(objtree).

> +PHONY += _cppcheck _cppcheck-html
> +
> +_cppcheck-html: xen-cppcheck.xml
> +	$(call if_changed,cppcheck_html)
> +
> +_cppcheck: xen-cppcheck.xml
> +
> +xen-cppcheck.xml: $(patsubst %.c,%.c.cppcheck,$(CPPCHECKFILES))
> +ifeq ($(CPPCHECKFILES),)
> +	$(error Please build Xen before running cppcheck)
> +endif

Besides the requirement being enforced here to have _some_ .o files, ...

> +	$(call if_changed,merge_cppcheck_reports)
> +
> +%.c.cppcheck: %.c $(BASEDIR)/include/generated/autoconf.h $(BASEDIR)/include/generated/compiler-def.h

... doesn't the dependency on autoconf.h here point out another issue:
Don't you require the build to be up-to-date? If this dependency really
is to be retained, should you perhaps make the new goal depend on
$(TARGET), thus forcing a build to occur (perhaps just an incremental
one)?

> --- a/xen/include/xen/config.h
> +++ b/xen/include/xen/config.h
> @@ -7,6 +7,10 @@
>  #ifndef __XEN_CONFIG_H__
>  #define __XEN_CONFIG_H__
>  
> +#ifdef CPPCHECK
> +#include <generated/compiler-def.h>
> +#endif

Could you leave this file untouched and have the generated file included
by passing another --include= in CPPCHECKFLAGS?

> --- a/xen/include/xen/kconfig.h
> +++ b/xen/include/xen/kconfig.h
> @@ -8,6 +8,10 @@
>   * these only work with boolean option.
>   */
>  
> +/* cppcheck is failing to parse the macro so use a dummy one */
> +#ifdef CPPCHECK
> +#define IS_ENABLED(option) option
> +#else
>  /*
>   * Getting something that works in C and CPP for an arg that may or may
>   * not be defined is tricky.  Here, if we have "#define CONFIG_BOOGER 1"
> @@ -27,5 +31,6 @@
>   * otherwise.
>   */
>  #define IS_ENABLED(option) config_enabled(option)
> +#endif

What are the consequences of this workaround on the code actually
being checked? Does this perhaps lead to certain portions of code
being skipped while checking?

Jan



From xen-devel-bounces@lists.xenproject.org Fri Mar 25 12:14:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 12:14:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294691.501183 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXipR-0003yN-AV; Fri, 25 Mar 2022 12:14:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294691.501183; Fri, 25 Mar 2022 12:14:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXipR-0003yG-7T; Fri, 25 Mar 2022 12:14:05 +0000
Received: by outflank-mailman (input) for mailman id 294691;
 Fri, 25 Mar 2022 12:14:04 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Ci4N=UE=tklengyel.com=tamas@srs-se1.protection.inumbo.net>)
 id 1nXipP-0003yA-SL
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 12:14:03 +0000
Received: from MTA-12-4.privateemail.com (mta-12-4.privateemail.com
 [198.54.127.107]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 0e07d9e0-ac35-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 13:14:02 +0100 (CET)
Received: from mta-12.privateemail.com (localhost [127.0.0.1])
 by mta-12.privateemail.com (Postfix) with ESMTP id 70D6018000A7
 for <xen-devel@lists.xenproject.org>; Fri, 25 Mar 2022 08:14:00 -0400 (EDT)
Received: from mail-ot1-f43.google.com (unknown [10.20.151.164])
 by mta-12.privateemail.com (Postfix) with ESMTPA id 4BE2C18000A4
 for <xen-devel@lists.xenproject.org>; Fri, 25 Mar 2022 08:14:00 -0400 (EDT)
Received: by mail-ot1-f43.google.com with SMTP id
 i23-20020a9d6117000000b005cb58c354e6so5326378otj.10
 for <xen-devel@lists.xenproject.org>; Fri, 25 Mar 2022 05:14:00 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0e07d9e0-ac35-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648210440;
	bh=rrGm61avDbudCrncqhzHZL3yzabp4gVQ5s1kdZTnim8=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=bYAdufZJ0vr+s8VEoBFFBM/Ck3F59gXpBzAR8J7QsvD+68bKfClYFYV3UvkuKHCuU
	 wxf+5IOHgicz1jr/Yt7uc3TZpBGM2qC0+xBgSPkdvDvGXUDQ+rgF8W1akC5CECtacw
	 2g9EbL1MAb4sk/kkme1duVhMSmROeTPy61EAr/HQdeWGPcjXNKhGewIhs5u1mp0fvp
	 Se8vzgYxk75OmL9ALMxVB6z1969UhuQyrIzU3ERoPTzRCpXwlc15Ri2HJGAZPe8qGk
	 ZkFIoTLdLt5zmM/yjVe+7DxM03GC68QlOyXGwOIg03Hto3gQcOaHxYG3O0j5O3cMxA
	 VgjRkl4Pb9GsA==
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648210440;
	bh=rrGm61avDbudCrncqhzHZL3yzabp4gVQ5s1kdZTnim8=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=bYAdufZJ0vr+s8VEoBFFBM/Ck3F59gXpBzAR8J7QsvD+68bKfClYFYV3UvkuKHCuU
	 wxf+5IOHgicz1jr/Yt7uc3TZpBGM2qC0+xBgSPkdvDvGXUDQ+rgF8W1akC5CECtacw
	 2g9EbL1MAb4sk/kkme1duVhMSmROeTPy61EAr/HQdeWGPcjXNKhGewIhs5u1mp0fvp
	 Se8vzgYxk75OmL9ALMxVB6z1969UhuQyrIzU3ERoPTzRCpXwlc15Ri2HJGAZPe8qGk
	 ZkFIoTLdLt5zmM/yjVe+7DxM03GC68QlOyXGwOIg03Hto3gQcOaHxYG3O0j5O3cMxA
	 VgjRkl4Pb9GsA==
X-Gm-Message-State: AOAM5301OgiYvozKRYk9J5OOZ2ZzXa5G0SibE5TJb5bUkARqrX3NJlBP
	6EGJpZlUiqrOlhxkBxZWnOuqG+OZWTToGRyqWg0=
X-Google-Smtp-Source: ABdhPJxeY6qKqWcUlLpiFZ6I5whIQQclLk6f6JIwYChUzeUjjUufTTL3KB1hVchp5x4Hqmhill6cS1/U0h6oHitBCYk=
X-Received: by 2002:a9d:638a:0:b0:5cd:a7fc:aa89 with SMTP id
 w10-20020a9d638a000000b005cda7fcaa89mr4087670otk.204.1648210439671; Fri, 25
 Mar 2022 05:13:59 -0700 (PDT)
MIME-Version: 1.0
References: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
 <Yj2ggiWlxvYdh1dJ@Air-de-Roger> <CABfawhkeRENvEJHtXCxME08eMjjAGNVdcBK8ExxgcXY=SzXStA@mail.gmail.com>
 <Yj2oE5uFPNDMszFk@Air-de-Roger>
In-Reply-To: <Yj2oE5uFPNDMszFk@Air-de-Roger>
From: Tamas K Lengyel <tamas@tklengyel.com>
Date: Fri, 25 Mar 2022 08:13:47 -0400
X-Gmail-Original-Message-ID: <CABfawhmTVveT1jf=dDefkgtYHT2BsO7h3ThoeR7wF=cx_ROWBg@mail.gmail.com>
Message-ID: <CABfawhmTVveT1jf=dDefkgtYHT2BsO7h3ThoeR7wF=cx_ROWBg@mail.gmail.com>
Subject: Re: [PATCH 1/3] x86/mem_sharing: option to skip populating special
 pages during fork
To: =?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>, Xen-devel <xen-devel@lists.xenproject.org>, 
	Jan Beulich <jbeulich@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>, 
	George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, 
	Stefano Stabellini <sstabellini@kernel.org>
Content-Type: multipart/alternative; boundary="000000000000c5932605db09e5c1"
X-Virus-Scanned: ClamAV using ClamSMTP

--000000000000c5932605db09e5c1
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Fri, Mar 25, 2022, 7:31 AM Roger Pau Monn=C3=A9 <roger.pau@citrix.com> w=
rote:

> On Fri, Mar 25, 2022 at 07:15:59AM -0400, Tamas K Lengyel wrote:
> > On Fri, Mar 25, 2022, 6:59 AM Roger Pau Monn=C3=A9 <roger.pau@citrix.co=
m>
> wrote:
> >
> > > On Tue, Mar 22, 2022 at 01:41:37PM -0400, Tamas K Lengyel wrote:
> > > > Add option to the fork memop to skip populating the fork with speci=
al
> > > pages.
> > > > These special pages are only necessary when setting up forks to be
> fully
> > > > functional with a toolstack. For short-lived forks where no
> toolstack is
> > > active
> > > > these pages are uneccesary.
> > >
> > > Replying here because there's no cover letter AFAICT.
> > >
> > > For this kind of performance related changes it would be better if yo=
u
> > > could provide some figures about the performance impact. It would hel=
p
> > > if we knew whether avoiding mapping the vAPIC page means you can
> > > create 0.1% more forks per-minute or 20%.
> > >
> > > If you really want to speed up the forking path it might be good to
> start
> > > by perf sampling Xen in order to find the bottlenecks?
> > >
> >
> > Sure but for experiment systems I don't think its necessary to collect
> that
> > data.
>
> It helps weight whether the extra logic is worth the performance
> benefit IMO. Here it might not matter that much since you say there's
> also a non-performance reason for the change.
>
> > There is also a non-performance reason why we want to keep special page=
s
> > from being populated, in cases we really want the forks physmap to star=
t
> > empty for better control over its state. There was already a case where
> > having special pages mapped in ended up triggering unexpected Xen
> behaviors
> > leading to chain of events not easy to follow. For example if page 0 ge=
ts
> > brought in while the vCPU is being created it ends up as a misconfigure=
d
> > ept entry if nested virtualization is enabled. That leads to ept
> > misconfiguration exits instead of epf faults. Simply enforcing no entry
> in
> > the physmap until forking is complete eliminates the chance of somethin=
g
> > like that happening again and makes reasoning about the VM's behavior
> from
> > the start easier.
>
> Could we have this added to the commit message then, and the option
> renamed to 'empty_p2m' or some such. Then you should also ASSERT that
> at the end of the fork process the p2m is indeed empty, not sure if
> checking d->arch.paging.hap.p2m_pages =3D=3D 0 would accomplish that?
>

Sure, I can do that.

Thanks,
Tamas

>

--000000000000c5932605db09e5c1
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto"><div><br><br><div class=3D"gmail_quote"><div dir=3D"ltr" =
class=3D"gmail_attr">On Fri, Mar 25, 2022, 7:31 AM Roger Pau Monn=C3=A9 &lt=
;<a href=3D"mailto:roger.pau@citrix.com">roger.pau@citrix.com</a>&gt; wrote=
:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bor=
der-left:1px #ccc solid;padding-left:1ex">On Fri, Mar 25, 2022 at 07:15:59A=
M -0400, Tamas K Lengyel wrote:<br>
&gt; On Fri, Mar 25, 2022, 6:59 AM Roger Pau Monn=C3=A9 &lt;<a href=3D"mail=
to:roger.pau@citrix.com" target=3D"_blank" rel=3D"noreferrer">roger.pau@cit=
rix.com</a>&gt; wrote:<br>
&gt; <br>
&gt; &gt; On Tue, Mar 22, 2022 at 01:41:37PM -0400, Tamas K Lengyel wrote:<=
br>
&gt; &gt; &gt; Add option to the fork memop to skip populating the fork wit=
h special<br>
&gt; &gt; pages.<br>
&gt; &gt; &gt; These special pages are only necessary when setting up forks=
 to be fully<br>
&gt; &gt; &gt; functional with a toolstack. For short-lived forks where no =
toolstack is<br>
&gt; &gt; active<br>
&gt; &gt; &gt; these pages are uneccesary.<br>
&gt; &gt;<br>
&gt; &gt; Replying here because there&#39;s no cover letter AFAICT.<br>
&gt; &gt;<br>
&gt; &gt; For this kind of performance related changes it would be better i=
f you<br>
&gt; &gt; could provide some figures about the performance impact. It would=
 help<br>
&gt; &gt; if we knew whether avoiding mapping the vAPIC page means you can<=
br>
&gt; &gt; create 0.1% more forks per-minute or 20%.<br>
&gt; &gt;<br>
&gt; &gt; If you really want to speed up the forking path it might be good =
to start<br>
&gt; &gt; by perf sampling Xen in order to find the bottlenecks?<br>
&gt; &gt;<br>
&gt; <br>
&gt; Sure but for experiment systems I don&#39;t think its necessary to col=
lect that<br>
&gt; data.<br>
<br>
It helps weight whether the extra logic is worth the performance<br>
benefit IMO. Here it might not matter that much since you say there&#39;s<b=
r>
also a non-performance reason for the change.<br>
<br>
&gt; There is also a non-performance reason why we want to keep special pag=
es<br>
&gt; from being populated, in cases we really want the forks physmap to sta=
rt<br>
&gt; empty for better control over its state. There was already a case wher=
e<br>
&gt; having special pages mapped in ended up triggering unexpected Xen beha=
viors<br>
&gt; leading to chain of events not easy to follow. For example if page 0 g=
ets<br>
&gt; brought in while the vCPU is being created it ends up as a misconfigur=
ed<br>
&gt; ept entry if nested virtualization is enabled. That leads to ept<br>
&gt; misconfiguration exits instead of epf faults. Simply enforcing no entr=
y in<br>
&gt; the physmap until forking is complete eliminates the chance of somethi=
ng<br>
&gt; like that happening again and makes reasoning about the VM&#39;s behav=
ior from<br>
&gt; the start easier.<br>
<br>
Could we have this added to the commit message then, and the option<br>
renamed to &#39;empty_p2m&#39; or some such. Then you should also ASSERT th=
at<br>
at the end of the fork process the p2m is indeed empty, not sure if<br>
checking d-&gt;arch.paging.hap.p2m_pages =3D=3D 0 would accomplish that?<br=
></blockquote></div></div><div dir=3D"auto"><br></div><div dir=3D"auto">Sur=
e, I can do that.</div><div dir=3D"auto"><br></div><div dir=3D"auto">Thanks=
,</div><div dir=3D"auto">Tamas</div><div dir=3D"auto"><div class=3D"gmail_q=
uote"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-l=
eft:1px #ccc solid;padding-left:1ex">
</blockquote></div></div></div>

--000000000000c5932605db09e5c1--


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 12:14:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 12:14:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294693.501194 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXipo-0004NF-IW; Fri, 25 Mar 2022 12:14:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294693.501194; Fri, 25 Mar 2022 12:14:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXipo-0004N8-FV; Fri, 25 Mar 2022 12:14:28 +0000
Received: by outflank-mailman (input) for mailman id 294693;
 Fri, 25 Mar 2022 12:14:26 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+r7I=UE=citrix.com=prvs=076f4df05=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nXipm-0003yA-8q
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 12:14:26 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 1b38bf91-ac35-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 13:14:24 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1b38bf91-ac35-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648210464;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=aXGSnq7Asbji8xl47AkphaOqInjN4mO6j2/PHcXvF6k=;
  b=Y+9ajURWby2Q19XtGEaooWdNt/1jX13QAVFeIAb8NMbdqEBUz02EO9kQ
   l3k0dielJLRfgK+2oqIZkQfleAzA7IucWxWG5EL0vr2dQLGBVXThF3z7F
   hMLSbHLzImFADJTb+sXxoLQHrbgJPV/yXoaopvQdHCF7TYNWp3gk/pfJa
   A=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67568004
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:p/hloKuQCWcLYG8mM83OHw9CNufnVP5eMUV32f8akzHdYApBsoF/q
 tZmKT3QPPfZMGfzc4ggPYyzpB4Av5TWmIBkHFNuqStgEHtE+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jX5
 IuryyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi9zN66TqqNDDSVpNHtXF/Vn1pTofSOW5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AO
 JdHOWI3MHwsZTVOGVxODa8up96qrVagcQdBsQm5lYwOtj27IAtZj+G2bYu9lsaxbcdImkeVo
 ErW8mK/BQsVXPS95iCC6WmEnfLUkGXwX4d6PKaj6vdgjVmXx2oSIB4bT122pb++kEHWc8pHK
 lYf8y4np7Ua/k23QtTzUhu0rWTCtRkZM/JZEvYz6QWE4qDV/wqUCGUCQjNbLtchsaceRzYny
 1uIlNPBHiF0vfueTnf13qudqDqpETQWKWIEaj4JSU0O5NyLiJ06ixvUCNJuFqGkg9ndGDfsz
 jTMpy87750MieYb2qP9+krI6xq8q56MQgMr6wH/WmO+8hg/dIOjf5av61XQ8bBHNonxc7Wal
 CFawY7EtrlIVMzT0nzWKAkQIF23z6yMM2LuxgAxI6gGrR2Ho1+NVq8MuxgrcS+FLf04UTPuZ
 UbSvyZY65lSIGamYMdLXm6hNyg55fO+TIq4D5g4evILO8EsL1HfoEmCcGbKhwjQfF4QfbbT0
 HtxWeKlFj4kBKtu11JarM9NgOZwlkjSKY4+LK0XLihLM5LDPBZ5qp9faTNii9zVCovd8W05F
 P4Fa6O3J+13CrGWX8Uu2dd7wao2BXY6H4vqjMdca/SOJAFrcEl4VaOBmO58JtI0xP4O/gstw
 p1bchYJoLYYrSeaQThml1g5MO+/NXqBhSxT0dMQ0aaAhCF4PNfHAFY3fJorZ7g3nNGPPtYvJ
 8Tpj/6oW6wVIhyeomx1RcCk8ORKKUT67SrTbnHNSGVuIPZdq/nhp4aMkv3Hr3JVUEJadKIW/
 tWd6+8sacZcFl4+XZeMNJpCDTqZ5BAgpQ67ZGORSvF7c0Tw6ol6bSv3i/48OcYXLhvfgDCd0
 m6r7d0w/4Ehf6ddHAH1uJ25
IronPort-HdrOrdr: A9a23:MINJkKsxv+OQwjGUOUDlTeYn7skDeNV00zEX/kB9WHVpm62j+/
 xG+c5x6faaslkssR0b9+xoWpPhfZqsz/9ICOAqVN/JMTUO01HYT72Kg7GSpgHIKmnT8fNcyL
 clU4UWMqyVMbGit7eZ3DWF
X-IronPort-AV: E=Sophos;i="5.90,209,1643691600"; 
   d="scan'208";a="67568004"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=UhcgxfER9dhp+JHCAhI0xd0HNKa7z05E/iNSg7/aeQeM0iyu02CVvQz64061ZeccmtJKqUkuIVtZ9GdV1ippQdK0krUvGBwiVeapuOf6tm1RAShJtSbEtYkbLaZTMRicL0jdKqFpup8JeM7ynaRwlK627lwa7GPAtkVlwln3OtuxOjqEY1ngyyhfHNnthO8jn+6Y70nL7gzjB6GEICQ85N7WMsm5GHTfRWnwkJVXrCQMw/CTzhvoIzuIyiSAsFLauAJaIqv5NEne7F02gVa1KRQI09iBzv7aG3FlnNrUOXOf1Vh+vNbHBwQaMx26fPW8ZKVI1fc1Zdd8gFFYSrPuTQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=KTAEg/p2JLm4oxOESQGTiHI58wXjfmiSMoEPMLa9WlA=;
 b=Qt5l/DBbWW+fWsm3gzMqj3F4WhWnECtn4Dxt9bo33qhYEbZliO490chrG3Bqkx8eDmu95C8BNhgbAjx/X3JNjrEmi3Ycfec2km4ejpahDr2uz5az7coV++GCrTAUOCxj2U6AAtitsIiRs4X3O1MbDhC4Ic1WejuQ8iBGUnt/j9+ED2ZTSjBNxwBh04C31IjX5rBxI5rIgzGemuV18FInvnsAHU0g4kXpbm5ql77DrsHgljh3i1bvBO3JmwacKUc2ejPuwhMd9W5TIajY8H5q2rRjbg+hhqH/u46k9dnNn+3sEhhRIntgwd+rN+gb3w+RLjgkvDsYiz/ifr8bNyvpgw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=KTAEg/p2JLm4oxOESQGTiHI58wXjfmiSMoEPMLa9WlA=;
 b=Pi3I74EETLe78C+L1/ebhIRIr1dv21xQWd/3H7k4FDknqyUr4n9VW3RqKHbTXvSpsbP0ZphSVHQmEVkE+HVDEEHTCm1SxguCS2Sncyf+ieklLgeGwDU1lF1P+4V4wobaXqEEUYiCHRaPdVWKpet341s4TYLJWgNjXd7zqrkxlqs=
Date: Fri, 25 Mar 2022 13:14:07 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Tamas K Lengyel <tamas@tklengyel.com>
CC: Jan Beulich <jbeulich@suse.com>, Tamas K Lengyel
	<tamas.lengyel@intel.com>, Xen-devel <xen-devel@lists.xenproject.org>, "Wei
 Liu" <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>, Juergen Gross
	<JGross@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Alexandru Isaila <aisaila@bitdefender.com>, "Petre
 Pircalabu" <ppircalabu@bitdefender.com>
Subject: Re: [PATCH 3/3] x86/mem_sharing: make fork_reset more configurable
Message-ID: <Yj2yDz7gld9y8ILI@Air-de-Roger>
References: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
 <fb437a16517d343ba3432aa64b9e14b34630a750.1647970630.git.tamas.lengyel@intel.com>
 <YjySMjegTNFBE5RK@Air-de-Roger>
 <CABfawhnnAehxaByyncaYAjSSbddJi8yeTnjcXX_a+st8Q+C_+Q@mail.gmail.com>
 <YjyWW2CkQv1ckvXM@Air-de-Roger>
 <CABfawhn-QiUBuq9c4tzr=9nL=J-ntm1hf23mbeRu-qCAKRDj1Q@mail.gmail.com>
 <Yjyfygi6pE+UVhjM@Air-de-Roger>
 <CABfawhkQoOnKv7OWNus0WBY4CjX+1uU1ZeZgQ-mU-sRtQFE3QQ@mail.gmail.com>
 <1bcc54d8-e766-1d53-6bc8-bd67f8838d73@suse.com>
 <CABfawhk4pyUGV=QGua3WNghbp-tk0yOzSSp6_x8o1Lg-8OXhNg@mail.gmail.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <CABfawhk4pyUGV=QGua3WNghbp-tk0yOzSSp6_x8o1Lg-8OXhNg@mail.gmail.com>
X-ClientProxiedBy: LO4P123CA0157.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:188::18) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5cdb02a8-1056-4b2f-9558-08da0e58f91c
X-MS-TrafficTypeDiagnostic: SJ0PR03MB5535:EE_
X-Microsoft-Antispam-PRVS: <SJ0PR03MB553580243C26AB0D3564DCA88F1A9@SJ0PR03MB5535.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(9686003)(6512007)(2906002)(66476007)(4326008)(508600001)(85182001)(54906003)(6916009)(26005)(82960400001)(38100700002)(66946007)(33716001)(316002)(8676002)(6486002)(66556008)(6506007)(86362001)(6666004)(5660300002)(7416002)(53546011)(8936002)(83380400001)(186003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?NHJMVEtlKzZDS29Fb25Gd0lvc25IWkp1YUxKMno3MC92L3pmcm5TSkk4SlMv?=
 =?utf-8?B?eEFteEFkd1VFUHgvb3AwRXpXUys2d1pRcjJvTmh4ZzFxSnVvZjF3RGZHc0d3?=
 =?utf-8?B?U2ZYOVViMnNYZmRHNENTTlMwUWdSR2Q1eGJzSS8yT1VXQ1hDMkZOejBxeHYx?=
 =?utf-8?B?aXJWMFl4ZlV5TXAvdUpyV3VmU214QWtqVHZsYU10bTYrOThIOCtVT09XMjhM?=
 =?utf-8?B?Q3NiZjZLeFRlNWZIcndBckdPNmJMQXJHaTB0V2UxRkV5U0lyaEV5c2VKVW9L?=
 =?utf-8?B?Vld2N1M4V0ZwSXFsazN1SDBhY0VWcE5WWVBXb3dXYXprNExHazNmVmxYR05G?=
 =?utf-8?B?TVFkcUhWZmlYR3IwdW0vdkgzWkpSVnVmclJGdkZ3NWF5NVhkVW0wV3hZMzZ3?=
 =?utf-8?B?Qzc3ZmlJMHZjamhxdFJ2c3NEWXJISmhxZjNOanJlT3BZQk91VHk4WjdBbkNj?=
 =?utf-8?B?NjlTUW1FRElUQWtxRngvRXJ5Q0hvTzV5dmxsdHZZaFlrZWdteThKY25pcDZJ?=
 =?utf-8?B?OXlsT29zais4K2NMcC9oeUVpb0JhcmpXYVovam5VSml2MURvS1FEUEhXdmVJ?=
 =?utf-8?B?YVc4RFZqaGwwUVM4cTVia0VJRmszNUJpM0pHTDcrU3NRY1JQR1Q4RVVWa1JH?=
 =?utf-8?B?T1R2MUorYXVOWEtRZVNyS2RESEVuYUROenVSV2lwenI4cjBYdE1lR2VUZG5Y?=
 =?utf-8?B?MmRvRzQ5WDcxL0NtaDd3ZXlEbW9xSHlsVHVtZml5bE1TRFRWREhSRWE3SnN4?=
 =?utf-8?B?TDFYQnBFbUtkTHo0ekpiOXBDL0xaMVgxWDNnNnlxOEYxVTZPL2lkcGcwWjRP?=
 =?utf-8?B?WkVvcmo5Y3hCNnpORTQ4TTgyTlRZanFlcCswL3VLWDQ5LzBqWlVzV3RGck1Y?=
 =?utf-8?B?QTlBS0d1cmFyYi9jVkp5Vi9mNkdJdXhnakR4MDBQN3pETkQ4YWg4OFA3OU5i?=
 =?utf-8?B?TWg1a0ZVWVpIdnhPK2E3b1hWTEl0NEVtVU5BRTcyZGdDWnFLYVN0ZlZaZlYy?=
 =?utf-8?B?c2JyOGR4S1ZVc2JqQm5nbzZMcWd6TG5qcmhrVzV5ZHc0ck9EcUwrWVhZNGN3?=
 =?utf-8?B?Vk5BTWZDRVJyaXZ0a3k5QlpTVHh5Q2xYV3QvRHZKSDIxYk94REJEbXFTUExr?=
 =?utf-8?B?bGxjZjZzeVozS0dOVldXZm4wNGZ2S0dOYktmcWsrSFAyU2VSZnErYktQQTho?=
 =?utf-8?B?TmdRcGoyYTRQL2xIQ3pIS3ZaUVZLT2xRLzJnT1VIcTQyT3laTUI1T3NuNXJi?=
 =?utf-8?B?T0Iwa05sMlhQeUU2TktRVTN6SU4xMHZMVE81VHV3RFN3dWJtWklsYk5sdG5T?=
 =?utf-8?B?SkpiaEw5UGIxZWFISGJYY2h3aC9DZXRoVWt1cUtHK0xKRDVQbi9hRDRJRkFT?=
 =?utf-8?B?YVlhQmRIeGJXYSthbU5XMnNkZkU5aEdodjY5YTBQL3M0NnV2aTB4WDFLU0Zy?=
 =?utf-8?B?eDMrQXlocStrankrRUxhcFlZaXRTV0dUNzVUL0VRb1ZHb0RNVUk3c2V2KzQ0?=
 =?utf-8?B?MVlWRFd6d24zMVFVMm5Kc00vTlZlSGhVKzBDaXVmbWZzSU1UUFAycWFWbTVJ?=
 =?utf-8?B?SHZSK3VzR0R5MlRhcWlMQjVpK1lSd1FSUEd0c3pxd3ZXN3JyVVoyMTRCMEFN?=
 =?utf-8?B?RGRQekUzWmxGTkR6bUJiSUVvbndCemQrbmJjV1FkVUJ0dWVNcWJFRnR3TGtX?=
 =?utf-8?B?K3FwYzBqTHNpTkxPeXVVNXlxRXNZeE40bGx3TkNMZWNlOS9UV3VCVWhLMUY2?=
 =?utf-8?B?OHZlV3M4NzQ1bGl3dG4vT3JTUERuNVdITW8zUTlKMVJheGI3NjVvdU1YeEZL?=
 =?utf-8?B?cmY1ank2UTJVdjVYdWs1Z3lxN3RGeFRDWmJEWm5XLzVONU1RdVlKWWdFU3E2?=
 =?utf-8?B?a3BkYTVGZndUWXdpU284SEEyRDRWVG1NTFptMjZEdDhWb3pwNmVpSEZidHlL?=
 =?utf-8?B?NXM0UGpQV0g2dmZZaE1xVEZ4RUpDNUk3RSsyV0l1ekc1VC85M2U4Tng0Mnpt?=
 =?utf-8?B?SnJVUW9Nd2VRPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 5cdb02a8-1056-4b2f-9558-08da0e58f91c
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 12:14:12.7063
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: JsndE2WVAGJ2cSXC6PgIvgvdufuGKFCB95MXakuyZa0GqVNeOhgz+1/3W064gRBH/gIZURQQi4xR8zm/sVhfKw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR03MB5535
X-OriginatorOrg: citrix.com

On Fri, Mar 25, 2022 at 06:48:42AM -0400, Tamas K Lengyel wrote:
> On Fri, Mar 25, 2022, 5:04 AM Jan Beulich <jbeulich@suse.com> wrote:
> 
> > On 24.03.2022 18:02, Tamas K Lengyel wrote:
> > > On Thu, Mar 24, 2022 at 12:44 PM Roger Pau Monné <roger.pau@citrix.com>
> > wrote:
> > >>
> > >> On Thu, Mar 24, 2022 at 12:22:49PM -0400, Tamas K Lengyel wrote:
> > >>> On Thu, Mar 24, 2022 at 12:04 PM Roger Pau Monné <roger.pau@citrix.com>
> > wrote:
> > >>>>
> > >>>> On Thu, Mar 24, 2022 at 11:52:38AM -0400, Tamas K Lengyel wrote:
> > >>>>> On Thu, Mar 24, 2022 at 11:46 AM Roger Pau Monné <
> > roger.pau@citrix.com> wrote:
> > >>>>>>
> > >>>>>> On Tue, Mar 22, 2022 at 01:41:39PM -0400, Tamas K Lengyel wrote:
> > >>>>>>> diff --git a/xen/include/public/memory.h
> > b/xen/include/public/memory.h
> > >>>>>>> index 208d8dcbd9..30ce23c5a7 100644
> > >>>>>>> --- a/xen/include/public/memory.h
> > >>>>>>> +++ b/xen/include/public/memory.h
> > >>>>>>> @@ -541,12 +541,14 @@ struct xen_mem_sharing_op {
> > >>>>>>>                  uint32_t gref;     /* IN: gref to debug         */
> > >>>>>>>              } u;
> > >>>>>>>          } debug;
> > >>>>>>> -        struct mem_sharing_op_fork {      /* OP_FORK */
> > >>>>>>> +        struct mem_sharing_op_fork {      /* OP_FORK/_RESET */
> > >>>>>>>              domid_t parent_domain;        /* IN: parent's domain
> > id */
> > >>>>>>>  /* These flags only makes sense for short-lived forks */
> > >>>>>>>  #define XENMEM_FORK_WITH_IOMMU_ALLOWED (1u << 0)
> > >>>>>>>  #define XENMEM_FORK_BLOCK_INTERRUPTS   (1u << 1)
> > >>>>>>>  #define XENMEM_FORK_SKIP_SPECIAL_PAGES (1u << 2)
> > >>>>>>> +#define XENMEM_FORK_RESET_STATE        (1u << 3)
> > >>>>>>> +#define XENMEM_FORK_RESET_MEMORY       (1u << 4)
> > >>>>>>>              uint16_t flags;               /* IN: optional
> > settings */
> > >>>>>>>              uint32_t pad;                 /* Must be set to 0 */
> > >>>>>>>          } fork;
> > >>>>>>> diff --git a/xen/include/public/vm_event.h
> > b/xen/include/public/vm_event.h
> > >>>>>>> index bb003d21d0..81c2ee28cc 100644
> > >>>>>>> --- a/xen/include/public/vm_event.h
> > >>>>>>> +++ b/xen/include/public/vm_event.h
> > >>>>>>> @@ -127,6 +127,14 @@
> > >>>>>>>   * Reset the vmtrace buffer (if vmtrace is enabled)
> > >>>>>>>   */
> > >>>>>>>  #define VM_EVENT_FLAG_RESET_VMTRACE      (1 << 13)
> > >>>>>>> +/*
> > >>>>>>> + * Reset the VM state (if VM is fork)
> > >>>>>>> + */
> > >>>>>>> +#define VM_EVENT_FLAG_RESET_FORK_STATE   (1 << 14)
> > >>>>>>> +/*
> > >>>>>>> + * Remove unshared entried from physmap (if VM is fork)
> > >>>>>>> + */
> > >>>>>>> +#define VM_EVENT_FLAG_RESET_FORK_MEMORY  (1 << 15)
> > >>>>>>
> > >>>>>> I'm confused about why two different interfaces are added to do this
> > >>>>>> kind of selective resets, one to vm_event and one to xenmem_fork?
> > >>>>>>
> > >>>>>> I thin k the natural place for the option to live would be
> > >>>>>> XENMEM_FORK?
> > >>>>>
> > >>>>> Yes, that's the natural place for it. But we are adding it to both
> > for
> > >>>>> a reason. In our use-case the reset operation will happen after a
> > >>>>> vm_event is received to which we already must send a reply. Setting
> > >>>>> the flag on the vm_event reply saves us having to issue an extra
> > memop
> > >>>>> hypercall afterwards.
> > >>>>
> > >>>> Can you do a multicall and batch both operations in a single
> > >>>> hypercall?
> > >>>>
> > >>>> That would seem more natural than adding duplicated interfaces.
> > >>>
> > >>> Not in a straight forward way, no. There is no exposed API in libxc to
> > >>> do a multicall. Even if that was an option it is still easier for me
> > >>> to just flip a bit in the response field than having to construct a
> > >>> whole standalone hypercall structure to be sent as part of a
> > >>> multicall.
> > >>
> > >> Right, I can see it being easier, but it seems like a bad choice from
> > >> an interface PoV. You are the maintainer of both subsystems, but it
> > >> would seem to me it's in your best interest to try to keep the
> > >> interfaces separated and clean.
> > >>
> > >> Would it be possible for the reset XENMEM_FORK op to have the side
> > >> effect of performing what you would instead do with the vm_event
> > >> hypercall?
> > >
> > > Yes, the event response is really just an event channel signal to Xen,
> > > so the memop hypercall could similarly encode the "now check the
> > > vm_event response" as an optional field. But why is that any better
> > > than the current event channel route processing the vm_response
> > > encoding the "now do these ops on the fork"?
> >
> > Well, as Roger said: Less duplication in the interface.
> >
> 
> No, you would just duplicate something else instead, ie. the event channel
> hypercall.
> 
> 
> > > We already have a bunch of different operations you can encode in the
> > > vm_event response field, so it reduces the complexity on the toolstack
> > > side since I don't have to switch around which hypercall I need to
> > > issue depending on what extra ops I want to put into a single
> > > hypercall.
> >
> > The two goals need to be weighed against one another; for the moment
> > I think I'm with Roger aiming at a clean interface.
> >
> 
> It may look like that from the Xen side but from the toolstack side this is
> actually the cleanest way to achieve what we need. The vm_event interfaces
> are already strongly integrated with both the mem_sharing and mem_paging
> subsystems so nothing is gained by now for no reason trying to keep them
> separate. So I strongly disagree with this suggestion and I'm going to keep
> it as-is. I appreciate the feedback nevertheless.

I'm not opposed to it, I just would like to better understand why you
are proposing such interface.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 12:58:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 12:58:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294697.501205 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXjVo-0000XX-Tk; Fri, 25 Mar 2022 12:57:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294697.501205; Fri, 25 Mar 2022 12:57:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXjVo-0000XQ-Pk; Fri, 25 Mar 2022 12:57:52 +0000
Received: by outflank-mailman (input) for mailman id 294697;
 Fri, 25 Mar 2022 12:57:52 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wXB3=UE=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nXjVn-0000XK-Jh
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 12:57:52 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04on062c.outbound.protection.outlook.com
 [2a01:111:f400:fe0e::62c])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 2c27ab71-ac3b-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 13:57:49 +0100 (CET)
Received: from AM5PR04CA0010.eurprd04.prod.outlook.com (2603:10a6:206:1::23)
 by AM9PR08MB5985.eurprd08.prod.outlook.com (2603:10a6:20b:286::5) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.16; Fri, 25 Mar
 2022 12:57:45 +0000
Received: from AM5EUR03FT042.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:206:1:cafe::3f) by AM5PR04CA0010.outlook.office365.com
 (2603:10a6:206:1::23) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.23 via Frontend
 Transport; Fri, 25 Mar 2022 12:57:45 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT042.mail.protection.outlook.com (10.152.17.168) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Fri, 25 Mar 2022 12:57:44 +0000
Received: ("Tessian outbound 341d209a0e52:v113");
 Fri, 25 Mar 2022 12:57:44 +0000
Received: from 0c763caabbfc.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 8B5DC5B5-0876-40DE-B461-971BF861C5B6.1; 
 Fri, 25 Mar 2022 12:57:34 +0000
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 0c763caabbfc.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 25 Mar 2022 12:57:34 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com (2603:10a6:20b:85::25)
 by DBAPR08MB5832.eurprd08.prod.outlook.com (2603:10a6:10:1a5::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.19; Fri, 25 Mar
 2022 12:57:31 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62]) by AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62%3]) with mapi id 15.20.5102.018; Fri, 25 Mar 2022
 12:57:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2c27ab71-ac3b-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=sG7olXZlyxTVSGAoKTZiPEHJCPRagZz/ItshextdSCM=;
 b=+MEEVkBqToPIJhWQfWVj/9VxxyY1qpD5ShbNdQF2g1vPWspdrrW8h/0VVxlvQPDCOF4x5Ld82KutBCtKDwTBMWXfTt3YD8FwKlv0pexaSc0gFKYzCfAlCkgsgGDTujT2T8soPFO8d7siaa/zAHfrBZRjGyI1Y31WHV5RPsp5NAI=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: e9b85751e8685294
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=eRnaOKCFxGZSwQYgzHQRXPT3REFYDquSPS/aDT3Zcg4lR+VeyEPZCMgFfpnDSIhHtbIGIea3FLEyJr8MVXK9q0orosrFf/U8gQtm62xREyXLqKiftim9ka951Rp14WMwC0qucxEV6s377+ZuMsL3+ERTfcvuNszybDHD8UlJQHqcE6DAWt/tSaq0RtjVxFgsWSwyxfBg7CQRuqBjtjw2cBqIL9W6ZPLwC6iZUVWsZeynGDC7Q0tquOTJQIPygT67Vjg75g7ee7pd+ZSU0YpEXM+nV6xIsEIS0lXYxm/pnOCKliv5hIv0PpjDLrJoPy0fMxLYXw/nGF92ANjAPSLiEA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=sG7olXZlyxTVSGAoKTZiPEHJCPRagZz/ItshextdSCM=;
 b=jAiObvibv/46gtyolpZUP1hKt5EbTSg3wivRhoJuM1vOHHDCiB7WZ3lh8UR2OyJBvxdtjXoMhLTI+y+s55/OIclh3fRPABx+C2hKOZM6bybIE3sUHC5+7HbtbD4aIzCLdsy8jgCpRmzpssdbQtXVcfXFavuY/TwWL4z6jP/60ua01ctjNaKI3ag2Y7X4yFj9dcCN5+39btPvxTyTk7MMLNmyiAju29VuKKLFQmh0UUmDyLgCRw/zd1DLE8PqbebdROTTu4ct9XisgmeWg3uHERGlNIcZE7wmaWk06UWHTudbnPTe3xzdyaW9xLlMxQQRGGTDgBcs7Q1vNt8erpDIcQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=sG7olXZlyxTVSGAoKTZiPEHJCPRagZz/ItshextdSCM=;
 b=+MEEVkBqToPIJhWQfWVj/9VxxyY1qpD5ShbNdQF2g1vPWspdrrW8h/0VVxlvQPDCOF4x5Ld82KutBCtKDwTBMWXfTt3YD8FwKlv0pexaSc0gFKYzCfAlCkgsgGDTujT2T8soPFO8d7siaa/zAHfrBZRjGyI1Y31WHV5RPsp5NAI=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>, Michal Orzel <Michal.Orzel@arm.com>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Subject: Re: [RFC PATCH] xen/build: Add cppcheck and cppcheck-html make rules
Thread-Topic: [RFC PATCH] xen/build: Add cppcheck and cppcheck-html make rules
Thread-Index: AQHYP279DnP7J8Edsk+NG7Po4Qnn9azP/EyAgAAUmoA=
Date: Fri, 25 Mar 2022 12:57:30 +0000
Message-ID: <E6DE6BBA-EBA6-4279-A79D-22942D6F5840@arm.com>
References:
 <77c79e86050eef2b706ee11e64183d57a0f5bcee.1648119732.git.bertrand.marquis@arm.com>
 <d797474e-97c0-7545-c68f-1378a3b2fbd9@suse.com>
In-Reply-To: <d797474e-97c0-7545-c68f-1378a3b2fbd9@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 7365aad0-03f9-46c5-6d0f-08da0e5f0e3f
x-ms-traffictypediagnostic:
	DBAPR08MB5832:EE_|AM5EUR03FT042:EE_|AM9PR08MB5985:EE_
X-Microsoft-Antispam-PRVS:
	<AM9PR08MB598554EC02D63B48530B803D9D1A9@AM9PR08MB5985.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 GzPuR77kUvNr533yYsqVJTVD36f9hmVL5Mvwy4nAeSvHwNzUHHI4daNrLnqUbvQ1BupkrjLq9OxlEBjlyR3GvzLOXSg/1kK7Y+BC1o5FYW3Rkzavn8LODkZU5FVBvkJL1zraap4qp5JNglfu+BgIwtD5teaiA878gwk17F+10NHCiYBsApaurG9KWhRPh4iQ7VhjWdXh92E3uBxC9Yfgm+ZQ8q7WhCHFq7JHmqYeMHe2FNReqWaD5/G17dzSdtz0KMJWP5Hwb1dDLuy++C+jOIAMCDlmLCAYUYdvBrjvcxrGUF2PXyXrvtjIXibU0ngEyuZH2u1iDFZVobWIPvt0+68DQQnOanB2N9JXjitpIWzpEXLhnITaLJ2AC0I1ubw6ushX6jSacLmfoAbGVFQCkCLMhXdXlCZueaQq/JD1KTkQf+glCRCoYev/ZCd5z2+eb5G+ij6EO+rMZo11vp1Q3T3ibXiDT62oAtOI9aCyskoh0db3IdjlLZn7MSj7PoqoLVERr7v0HMrlgYDOMiIs6UyXGDhWXekegRBp59QxyJWK31ac/prqyPYn9NoPFEl8mESKvlyWt+NVOJgtSwLsbiaztdqX6Dvh9YRJGIuSlECk9n0vjRBCcZNzUz9cbYVY8n/bay44lrJgxBKW8LyUiR1gT09FW1OS3t9+LtrPVYFwDyhtHUBOPkV4vauVqM2L6L9dhC9QZiLyOm4yANqNGw6gg/Zx65R+NjDGyuJLAqmreQFM5XtKSdjTdiRzIiyj
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR08MB3784.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(8936002)(5660300002)(38070700005)(38100700002)(6506007)(122000001)(2616005)(66574015)(186003)(6916009)(54906003)(71200400001)(508600001)(6486002)(6512007)(8676002)(316002)(4326008)(83380400001)(53546011)(76116006)(66556008)(64756008)(66446008)(66476007)(66946007)(91956017)(36756003)(86362001)(2906002)(33656002)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <3D23D841AF5623408FA69AC220D1A48B@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBAPR08MB5832
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT042.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	43f0fadb-c7a3-4612-9fcf-08da0e5f05ef
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(82310400004)(356005)(86362001)(8936002)(47076005)(40460700003)(5660300002)(26005)(186003)(83380400001)(336012)(66574015)(70206006)(6862004)(36860700001)(81166007)(36756003)(2906002)(8676002)(4326008)(70586007)(6506007)(2616005)(33656002)(53546011)(6512007)(6486002)(316002)(508600001)(54906003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 12:57:44.9317
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 7365aad0-03f9-46c5-6d0f-08da0e5f0e3f
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT042.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR08MB5985
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From xen-devel-bounces@lists.xenproject.org Fri Mar 25 13:18:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 13:18:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294701.501216 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXjpB-0002zy-OU; Fri, 25 Mar 2022 13:17:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294701.501216; Fri, 25 Mar 2022 13:17:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXjpB-0002zr-JZ; Fri, 25 Mar 2022 13:17:53 +0000
Received: by outflank-mailman (input) for mailman id 294701;
 Fri, 25 Mar 2022 13:17:52 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wXB3=UE=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nXjpA-0002zl-4s
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 13:17:52 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04on0613.outbound.protection.outlook.com
 [2a01:111:f400:fe0d::613])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f87cf3b1-ac3d-11ec-a405-831a346695d4;
 Fri, 25 Mar 2022 14:17:50 +0100 (CET)
Received: from AM5PR0101CA0022.eurprd01.prod.exchangelabs.com
 (2603:10a6:206:16::35) by VI1PR0802MB2238.eurprd08.prod.outlook.com
 (2603:10a6:800:9a::11) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.19; Fri, 25 Mar
 2022 13:17:40 +0000
Received: from VE1EUR03FT026.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:206:16:cafe::fd) by AM5PR0101CA0022.outlook.office365.com
 (2603:10a6:206:16::35) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17 via Frontend
 Transport; Fri, 25 Mar 2022 13:17:40 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT026.mail.protection.outlook.com (10.152.18.148) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Fri, 25 Mar 2022 13:17:39 +0000
Received: ("Tessian outbound 2877e54fe176:v113");
 Fri, 25 Mar 2022 13:17:39 +0000
Received: from ce1d882b522f.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 E0B520D9-B59F-451C-B52C-84B2A1FBC800.1; 
 Fri, 25 Mar 2022 13:17:32 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id ce1d882b522f.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 25 Mar 2022 13:17:32 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com (2603:10a6:20b:85::25)
 by PAXPR08MB6782.eurprd08.prod.outlook.com (2603:10a6:102:13a::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17; Fri, 25 Mar
 2022 13:17:31 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62]) by AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62%3]) with mapi id 15.20.5102.018; Fri, 25 Mar 2022
 13:17:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f87cf3b1-ac3d-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=8fIc/eqK3kWeXqoBrt5LrsB+jo946lo8J6DEE8IJHXo=;
 b=joMpeNEFOHdSXYH0G4wqhyb/IRY5NLgpzkixNttkDdFuztTLpy9Yv20aRh8l/abcjTVPQsEMS3pzGEwk06Et0kbodPCyLgfU7nxdNz7FbQZazpMs5Cfai6dNLaJKrzbYX8qehFXtF7/KprZq0PJEwnoMBH3d/cH0Y1j1xk/2ACE=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 707b49702d441198
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=BKtIbvxM+AmNuwgCgIYo5EsfJ0c2IAirE8u4nxDUvOk6PZbTMgthJjjwBC7V+zkGuWu1B9rPDGaFmcyg3jDvnPip18rBpOzix5hxI97NiV0WOd9lsN00aLQ2h10MgcGEWmzOtWn7XoVbrMGybhPjsBMuj3mYaCIvYpuJtyOrIG0AbjCBHjk+fhCQviefvWsv5x+iSiyyJgX6676yDo88KocHmmDT3B3Ivf5tLyiOJP3GG2GNlkJJlTNRTWfoy5KMcek3GevbUq2i6aU982ImdDU2BroJPmezzVZsz5aEK3htTt4p2ZlIhC74ZO7OkVh5ZmZJclFZMzdH13qIjgHF1A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=8fIc/eqK3kWeXqoBrt5LrsB+jo946lo8J6DEE8IJHXo=;
 b=nePcsMtEiq1nD8XsMETjjmgUiKNCNGfu91yOBWZpyALb+/yncOlQgFj6DPemMjflEWbnM1gowIxaxRg8NVnS1L6lUf61tO0qAEPNhhCzMyFlvwJsAikJiI+wp2iOcut7tBNXkho+dPae1QJwvKB5aN/+XWnJlogR6vimlqed0ok128lJK7DXT5y34wKLGFm2KwW+spwxRWGPl/KLdar2gNfGQws9jpM1ZsBoqmA8KFseSiC+CVXFqnZ2Dz0YhULlz16j4fGqh9J4dNjCyPUIc2weavNpZ4owFMzPSF/O9XZjQYT0JvaeKw2ZI2yw3mV5Ls5Szvh1QlOwRK0FcJX3fw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=8fIc/eqK3kWeXqoBrt5LrsB+jo946lo8J6DEE8IJHXo=;
 b=joMpeNEFOHdSXYH0G4wqhyb/IRY5NLgpzkixNttkDdFuztTLpy9Yv20aRh8l/abcjTVPQsEMS3pzGEwk06Et0kbodPCyLgfU7nxdNz7FbQZazpMs5Cfai6dNLaJKrzbYX8qehFXtF7/KprZq0PJEwnoMBH3d/cH0Y1j1xk/2ACE=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Julien Grall <julien@xen.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	"marco.solieri@minervasys.tech" <marco.solieri@minervasys.tech>,
	"lucmiccio@gmail.com" <lucmiccio@gmail.com>, Julien Grall
	<jgrall@amazon.com>, Stefano Stabellini <sstabellini@kernel.org>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH early-RFC 2/5] xen/arm64: Rework the memory layout
Thread-Topic: [PATCH early-RFC 2/5] xen/arm64: Rework the memory layout
Thread-Index: AQHYM6fehqIqx7byxEaDRoW/6LbtaqzQLgwA
Date: Fri, 25 Mar 2022 13:17:31 +0000
Message-ID: <DE3C6104-82AD-41AE-BDAA-0074A08DDECF@arm.com>
References: <20220309112048.17377-1-julien@xen.org>
 <20220309112048.17377-3-julien@xen.org>
In-Reply-To: <20220309112048.17377-3-julien@xen.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 5cf45414-67a1-44a2-cb4e-08da0e61d66a
x-ms-traffictypediagnostic:
	PAXPR08MB6782:EE_|VE1EUR03FT026:EE_|VI1PR0802MB2238:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR0802MB2238685B288AA6237710D5CD9D1A9@VI1PR0802MB2238.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 QlfkzRfsUm4Qlq1Y5RfraNgXFK5fcMD9rOQiRR3k3Mqv7OMyf4l9UxhS71Fuhx9zHaWLByun73w0MCP7V1P0LgZqzB+lscOd3XBMSajI0Dwd8PMv9vI/NBJAW2cr6zsEkjUWQ0XETpvbQz3hScO1lL/ybdeBe81OM/UBN/9K/rchdTHVUVK2BEpcnOCBIS9hfVebZiE0ikTagFrhROtWGdHBTiULc9QaG9QD5MPcpvrVp13uBiKrCa5dJc/2fo9jRsIEFrB8/8iYn4zP4te+i2dpPttekAgIp52mNnvXwz4UorOHnBxCMP8K1/r5WuFpHqYEmu0Hnui+nkPdqVi7Zb8PJK7BPtO78e4WJfF+0n7T3ZXt740RzFoQqxfXGmGO0vCu/IVzmaDVruc5H20Nri3S07ABlaAHPi5DcnCVeeM7IP39NjJQ3MM7XB5vpgnnvIFlxuVwxrdAmxOlhJ0D0ow4P75I4J7cE6pqAvHf4YD4VNZKU42GrOqoCHpjb52CVzHVsp9+1qsG6tTHHI5CypdfeFZhZ8MBYbmWJr16wnym5rKMtmxCaKlAl8o0AQhRPX+ffN5y90X0gCIIw+CK6qgfsriGt25Jm3fXHd+WD0AYuzA6G1zuRbkmfhnchdjGZ56WIK9+fHpB+ZlfXIctOZmu7pCrfrqCsiOB4wXNp5eZ1gd9VLLd0aPIZxHV6tJQSORXFutabfpyZuDpjUCXzDJq3g/uIFYwHW7OcLrQvHo+ZbdxfgtRGite08hyoWi4
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR08MB3784.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(2616005)(26005)(186003)(6486002)(6506007)(53546011)(66556008)(508600001)(122000001)(71200400001)(38070700005)(38100700002)(6512007)(33656002)(76116006)(66476007)(83380400001)(66946007)(66446008)(64756008)(86362001)(8936002)(316002)(91956017)(6916009)(54906003)(2906002)(5660300002)(4326008)(8676002)(36756003)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <903F38575650EF4C8F1771A5D28BA83F@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB6782
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT026.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	e42458c6-1194-4298-1dc9-08da0e61d156
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(86362001)(8676002)(36756003)(4326008)(6862004)(70586007)(508600001)(83380400001)(8936002)(81166007)(2906002)(5660300002)(356005)(70206006)(2616005)(82310400004)(107886003)(36860700001)(6486002)(26005)(316002)(186003)(33656002)(47076005)(6506007)(40460700003)(6512007)(54906003)(53546011)(336012);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 13:17:39.6823
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 5cf45414-67a1-44a2-cb4e-08da0e61d66a
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT026.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0802MB2238
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From xen-devel-bounces@lists.xenproject.org Fri Mar 25 13:34:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 13:34:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294706.501231 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXk55-0005PM-Dv; Fri, 25 Mar 2022 13:34:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294706.501231; Fri, 25 Mar 2022 13:34:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXk55-0005OY-9Y; Fri, 25 Mar 2022 13:34:19 +0000
Received: by outflank-mailman (input) for mailman id 294706;
 Fri, 25 Mar 2022 13:34:17 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wXB3=UE=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nXk53-0005Lx-Gs
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 13:34:17 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on20628.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::628])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 438e5c04-ac40-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 14:34:15 +0100 (CET)
Received: from AM6PR10CA0030.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:209:89::43)
 by AM9PR08MB6770.eurprd08.prod.outlook.com (2603:10a6:20b:300::13)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17; Fri, 25 Mar
 2022 13:32:10 +0000
Received: from VE1EUR03FT037.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:89:cafe::78) by AM6PR10CA0030.outlook.office365.com
 (2603:10a6:209:89::43) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17 via Frontend
 Transport; Fri, 25 Mar 2022 13:32:10 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT037.mail.protection.outlook.com (10.152.19.70) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Fri, 25 Mar 2022 13:32:10 +0000
Received: ("Tessian outbound 741ca6c82739:v113");
 Fri, 25 Mar 2022 13:32:09 +0000
Received: from ca3723011d37.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 A5262C9C-3157-44C7-8DE5-EC5F6F578C2E.1; 
 Fri, 25 Mar 2022 13:32:03 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id ca3723011d37.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 25 Mar 2022 13:32:03 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com (2603:10a6:20b:85::25)
 by VE1PR08MB5056.eurprd08.prod.outlook.com (2603:10a6:803:116::29)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.15; Fri, 25 Mar
 2022 13:32:00 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62]) by AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62%3]) with mapi id 15.20.5102.018; Fri, 25 Mar 2022
 13:32:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 438e5c04-ac40-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=iq5LMC4vYw5dd6bDd9dse2Lz56fxYoToWQq4YNqoXKM=;
 b=LeYqZDzeN+mNr95xSa46dyIDLtdJ28cI9DxrhG+dEKoL9AaxDiUvoI9SBeCTxJUlzTmWWWo0ybPqdoKbKSd4FvSIdubCtlWEOFpjm6bL8TEtP7sH/Cd0Q/b7EINwSMl2H3Oa7wcz9afFWSI/294geoQW485rg9bsl/heABkLULI=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 8dc5ca994dce2fb2
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=KSXfNU2OsYzJ/R+aWsANkfnCawVEjmn5ynPIKeljUuHy8gQrsZVuH79iwWh99O3dlR/SLp8ayUk0JJ/+S/3mbX9eULMwiaXi5UtrSndzEbBFyLIUMy/6rH9HpKKixU3hyXGRs+UOPGgAnMp+1oOrInyGR4VDwspbhB5tor2XkYpp271vs4bQ08OMYu0uEjPYTd0NhzTqwa7/TppM/zjVj2SAK82OknHZmKPx50oKvb6diIPyNve//82yWKzbzHc67OiQmaZZ34dh0LS93UZwwmzwkzR0WkImCoLNRo64j9uFowuLJAswGnc2vUs+YPksaYgvyd9CK+QISMGg73lhgA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=iq5LMC4vYw5dd6bDd9dse2Lz56fxYoToWQq4YNqoXKM=;
 b=E0GefJKQ+94iJTFDPM3tvBu3NXDT7hP9DfXJlcoWeE5SKJYqCYXIrELOz14Iw2gx4+B+UHzsAFOWLdSBvKqps9+sP8mApJV4JNmVtgDA0IRStF4uKhB8fjLoNaiBN6KU3r38FbvRb9qqeym7N8hqfto4IdHZlzm09GbXSv8DtJr87X/4Tv4MFZlo5g/q415Glzqqp06oKQV3TU4MOyu/bKmM9ICrHQoDFxm/aBJcoy7/lSqiDsbWK6BizPn/myyZLZo7lJU+4Hn9AJ/zC2iNQM8QeR0LYrZyX/QhdDsJ9CC8rxo5rvaT77/p/HKw3P2C+sjC4/TjMM8gT6aM0bDQSg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=iq5LMC4vYw5dd6bDd9dse2Lz56fxYoToWQq4YNqoXKM=;
 b=LeYqZDzeN+mNr95xSa46dyIDLtdJ28cI9DxrhG+dEKoL9AaxDiUvoI9SBeCTxJUlzTmWWWo0ybPqdoKbKSd4FvSIdubCtlWEOFpjm6bL8TEtP7sH/Cd0Q/b7EINwSMl2H3Oa7wcz9afFWSI/294geoQW485rg9bsl/heABkLULI=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Julien Grall <julien@xen.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	"marco.solieri@minervasys.tech" <marco.solieri@minervasys.tech>,
	"lucmiccio@gmail.com" <lucmiccio@gmail.com>, Julien GralL
	<jgrall@amazon.com>, Stefano Stabellini <sstabellini@kernel.org>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH early-RFC 3/5] xen/arm: mm: Introduce helpers to
 prepare/enable/disable the identity mapping
Thread-Topic: [PATCH early-RFC 3/5] xen/arm: mm: Introduce helpers to
 prepare/enable/disable the identity mapping
Thread-Index: AQHYM6fbg4sguhQUtUmDN0Bua8GsbazQMhkA
Date: Fri, 25 Mar 2022 13:32:00 +0000
Message-ID: <7A115ECF-66CD-4B9A-AD98-53A92F91269E@arm.com>
References: <20220309112048.17377-1-julien@xen.org>
 <20220309112048.17377-4-julien@xen.org>
In-Reply-To: <20220309112048.17377-4-julien@xen.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: f8cda681-965b-428a-dd84-08da0e63dd3e
x-ms-traffictypediagnostic:
	VE1PR08MB5056:EE_|VE1EUR03FT037:EE_|AM9PR08MB6770:EE_
X-Microsoft-Antispam-PRVS:
	<AM9PR08MB67704C7F723AAE5DFD61C85C9D1A9@AM9PR08MB6770.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR08MB3784.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(33656002)(5660300002)(66946007)(508600001)(316002)(122000001)(86362001)(6916009)(38100700002)(6486002)(2906002)(38070700005)(6506007)(2616005)(4326008)(91956017)(66556008)(54906003)(71200400001)(53546011)(186003)(36756003)(8676002)(76116006)(26005)(66446008)(8936002)(64756008)(83380400001)(66476007)(6512007)(21314003)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <5227C022C2359147AE9F18A41D65456A@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR08MB5056
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT037.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	af81a4a7-9bad-4a3f-d13d-08da0e63d7a8
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(6506007)(6512007)(107886003)(33656002)(53546011)(186003)(8936002)(82310400004)(6862004)(70586007)(4326008)(26005)(6486002)(86362001)(54906003)(70206006)(8676002)(36756003)(508600001)(316002)(2616005)(5660300002)(40460700003)(36860700001)(2906002)(47076005)(336012)(81166007)(83380400001)(356005)(21314003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 13:32:10.1694
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: f8cda681-965b-428a-dd84-08da0e63dd3e
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT037.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR08MB6770

Hi Julien,

> On 9 Mar 2022, at 12:20, Julien Grall <julien@xen.org> wrote:
>=20
> From: Julien GralL <jgrall@amazon.com>
>=20
> In follow-up patches we will need to have part of Xen identity mapped in
> order to safely switch the TTBR.
>=20
> On some platform, the identity mapping may have to start at 0. If we alwa=
ys
> keep the identity region mapped, NULL pointer ference would lead to acces=
s
> to valid mapping.
>=20
> It would be possible to relocate Xen to avoid clashing with address 0.
> However the identity mapping is only meant to be used in very limited
> places. Therefore it would be better to keep the identity region invalid
> for most of the time.
>=20
> Two new helpers are introduced:
>    - prepare_identity_mapping() will setup the page-tables so it is
>      easy to create the mapping afterwards.
>    - update_identity_mapping() will create/remove the identity mapping

Nit: Would be better to first say what the patch is doing and then explaini=
ng
the NULL pointer possible issue.

>=20
> Signed-off-by: Julien Grall <jgrall@amazon.com>
> ---
> xen/arch/arm/include/asm/mm.h |  2 +
> xen/arch/arm/mm.c             | 73 +++++++++++++++++++++++++++++++++++
> 2 files changed, 75 insertions(+)
>=20
> diff --git a/xen/arch/arm/include/asm/mm.h b/xen/arch/arm/include/asm/mm.=
h
> index 045a8ba4bb63..76973ea9a0ff 100644
> --- a/xen/arch/arm/include/asm/mm.h
> +++ b/xen/arch/arm/include/asm/mm.h
> @@ -177,6 +177,8 @@ extern unsigned long total_pages;
>=20
> /* Boot-time pagetable setup */
> extern void setup_pagetables(unsigned long boot_phys_offset);
> +/* Enable/disable the identity mapping */
> +extern void update_identity_mapping(bool enable);
> /* Map FDT in boot pagetable */
> extern void *early_fdt_map(paddr_t fdt_paddr);
> /* Remove early mappings */
> diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
> index 75ed9a3ce249..5c4dece16f7f 100644
> --- a/xen/arch/arm/mm.c
> +++ b/xen/arch/arm/mm.c
> @@ -138,6 +138,12 @@ static DEFINE_PAGE_TABLE(cpu0_pgtable);
> static DEFINE_PAGE_TABLES(cpu0_dommap, DOMHEAP_SECOND_PAGES);
> #endif
>=20
> +#ifdef CONFIG_ARM_64
> +static DEFINE_PAGE_TABLE(xen_first_id);
> +static DEFINE_PAGE_TABLE(xen_second_id);
> +static DEFINE_PAGE_TABLE(xen_third_id);
> +#endif
> +
> /* Common pagetable leaves */
> /* Second level page tables.
>  *
> @@ -573,6 +579,70 @@ void __init remove_early_mappings(void)
>     BUG_ON(rc);
> }
>=20
> +/*
> + * The identity mapping may start at physical address 0. So don't want
> + * to keep it mapped longer than necessary.
> + *
> + * When this is called, we are still using the boot_pgtable.
> + *
> + * XXX: Handle Arm32 properly.
> + */
> +static void prepare_identity_mapping(void)
> +{
> +    paddr_t id_addr =3D virt_to_maddr(_start);
> +    lpae_t pte;
> +    DECLARE_OFFSETS(id_offsets, id_addr);
> +
> +    printk("id_addr 0x%lx\n", id_addr);

Debug print that should be removed.

> +#ifdef CONFIG_ARM_64
> +    if ( id_offsets[0] !=3D 0 )
> +        panic("Cannot handled ID mapping above 512GB\n");

The error message here might not be really helpful for the user.
How about saying that Xen cannot be loaded in memory with
a physical address above 512GB ?

> +#endif
> +
> +    /* Link first ID table */
> +    pte =3D pte_of_xenaddr((vaddr_t)xen_first_id);
> +    pte.pt.table =3D 1;
> +    pte.pt.xn =3D 0;
> +
> +    write_pte(&boot_pgtable[id_offsets[0]], pte);
> +
> +    /* Link second ID table */
> +    pte =3D pte_of_xenaddr((vaddr_t)xen_second_id);
> +    pte.pt.table =3D 1;
> +    pte.pt.xn =3D 0;
> +
> +    write_pte(&xen_first_id[id_offsets[1]], pte);
> +
> +    /* Link third ID table */
> +    pte =3D pte_of_xenaddr((vaddr_t)xen_third_id);
> +    pte.pt.table =3D 1;
> +    pte.pt.xn =3D 0;
> +
> +    write_pte(&xen_second_id[id_offsets[2]], pte);
> +
> +    /* The mapping in the third table will be created at a later stage *=
/
> +
> +    /*
> +     * Link the identity mapping in the runtime Xen page tables. No need=
 to
> +     * use write_pte here as they are not live yet.
> +     */
> +    xen_pgtable[id_offsets[0]] =3D boot_pgtable[id_offsets[0]];
> +}
> +
> +void update_identity_mapping(bool enable)

You probably want an __init attribute here.

> +{
> +    paddr_t id_addr =3D virt_to_maddr(_start);
> +    int rc;
> +
> +    if ( enable )
> +        rc =3D map_pages_to_xen(id_addr, maddr_to_mfn(id_addr), 1,
> +                              PAGE_HYPERVISOR_RX);
> +    else
> +        rc =3D destroy_xen_mappings(id_addr, id_addr + PAGE_SIZE);
> +
> +    BUG_ON(rc);
> +}
> +
> /*
>  * After boot, Xen page-tables should not contain mapping that are both
>  * Writable and eXecutables.
> @@ -609,6 +679,9 @@ void __init setup_pagetables(unsigned long boot_phys_=
offset)
>=20
>     phys_offset =3D boot_phys_offset;
>=20
> +    /* XXX: Find a better place to call it */

Why do you think this place is not right ?

> +    prepare_identity_mapping();
> +
> #ifdef CONFIG_ARM_64
>     pte =3D pte_of_xenaddr((uintptr_t)xen_first);
>     pte.pt.table =3D 1;
> --=20
> 2.32.0

Cheers
Bertrand



From xen-devel-bounces@lists.xenproject.org Fri Mar 25 13:34:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 13:34:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294705.501227 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXk55-0005MF-4w; Fri, 25 Mar 2022 13:34:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294705.501227; Fri, 25 Mar 2022 13:34:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXk55-0005M8-1w; Fri, 25 Mar 2022 13:34:19 +0000
Received: by outflank-mailman (input) for mailman id 294705;
 Fri, 25 Mar 2022 13:34:17 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=2vYu=UE=intel.com=tamas.lengyel@srs-se1.protection.inumbo.net>)
 id 1nXk52-0005Lx-MI
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 13:34:17 +0000
Received: from mga04.intel.com (mga04.intel.com [192.55.52.120])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 418004d6-ac40-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 14:34:13 +0100 (CET)
Received: from orsmga001.jf.intel.com ([10.7.209.18])
 by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 25 Mar 2022 06:34:11 -0700
Received: from saahmed-mobl1.amr.corp.intel.com (HELO localhost.localdomain)
 ([10.212.57.117])
 by orsmga001-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 25 Mar 2022 06:34:09 -0700
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 418004d6-ac40-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;
  t=1648215253; x=1679751253;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=SlGmLx8kEbZCEVrCZS3m5mfSoFIkNVnUeEg/NHCUhrE=;
  b=m2sSF4Blrm4F5xtRTexjJaA8wPJg+ihQSxKfRG+EBlUWN9KkovDVQAy9
   JAocYEjUDPEUdM1u6a5z6oEOSU6RVSVROToGgrT7qEVEriA3F0I1LFtcA
   XWSTCnu5KyRl2y2irpbeYpeNDmGxVGie7VgZVwLi6LSqzG16QqvJdpqMZ
   rZvPH03JE7BDsXkrEZ7KisLRq9T/wrgL970cKvfA3jEUd2IL0vyrE/rAJ
   S0SQXqFkwZ5Wr8+aGZ0ZcRwJaRMNxRHMyfmfaBYXdw3CYVU4yb4N2BvR9
   /W2PNEHxmpv/Bz3QBCWDDWZwPAlv2/H2scb978tmQBTHw7vXKo4VELBZZ
   A==;
X-IronPort-AV: E=McAfee;i="6200,9189,10296"; a="257462267"
X-IronPort-AV: E=Sophos;i="5.90,209,1643702400"; 
   d="scan'208";a="257462267"
X-IronPort-AV: E=Sophos;i="5.90,209,1643702400"; 
   d="scan'208";a="584463415"
From: Tamas K Lengyel <tamas.lengyel@intel.com>
To: xen-devel@lists.xenproject.org
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>,
	Jun Nakajima <jun.nakajima@intel.com>,
	Kevin Tian <kevin.tian@intel.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>,
	Tamas K Lengyel <tamas@tklengyel.com>,
	George Dunlap <george.dunlap@citrix.com>
Subject: [PATCH v5] x86/vmx: add hvm functions to get/set non-register state
Date: Fri, 25 Mar 2022 09:33:23 -0400
Message-Id: <e57797cbc2c0706c03363cc7fa1b3e234921fee5.1648214955.git.tamas.lengyel@intel.com>
X-Mailer: git-send-email 2.25.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

During VM forking and resetting a failed vmentry has been observed due
to the guest non-register state going out-of-sync with the guest register
state. For example, a VM fork reset right after a STI instruction can trigger
the failed entry. This is due to the guest non-register state not being saved
from the parent VM, thus the reset operation only copies the register state.

Fix this by adding a new pair of hvm functions to get/set the guest
non-register state so that the overall vCPU state remains in sync.

Signed-off-by: Tamas K Lengyel <tamas.lengyel@intel.com>
---
v5: Switch to internal-only hvm funcs instead of adding to hvm_hw_cpu
---
 xen/arch/x86/hvm/vmx/vmx.c         | 32 ++++++++++++++++++++++++
 xen/arch/x86/include/asm/hvm/hvm.h | 40 ++++++++++++++++++++++++++++++
 xen/arch/x86/mm/mem_sharing.c      | 11 +++++++-
 3 files changed, 82 insertions(+), 1 deletion(-)

diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
index c075370f64..2685da16c8 100644
--- a/xen/arch/x86/hvm/vmx/vmx.c
+++ b/xen/arch/x86/hvm/vmx/vmx.c
@@ -1334,6 +1334,36 @@ static void cf_check vmx_set_interrupt_shadow(
     __vmwrite(GUEST_INTERRUPTIBILITY_INFO, intr_shadow);
 }
 
+static void cf_check vmx_get_nonreg_state(struct vcpu *v,
+    struct hvm_vcpu_nonreg_state *nrs)
+{
+    vmx_vmcs_enter(v);
+
+    __vmread(GUEST_ACTIVITY_STATE, &nrs->vmx.activity_state);
+    __vmread(GUEST_INTERRUPTIBILITY_INFO, &nrs->vmx.interruptibility_info);
+    __vmread(GUEST_PENDING_DBG_EXCEPTIONS, &nrs->vmx.pending_dbg);
+
+    if ( cpu_has_vmx_virtual_intr_delivery )
+        __vmread(GUEST_INTR_STATUS, &nrs->vmx.interrupt_status);
+
+    vmx_vmcs_exit(v);
+}
+
+static void cf_check vmx_set_nonreg_state(struct vcpu *v,
+    struct hvm_vcpu_nonreg_state *nrs)
+{
+    vmx_vmcs_enter(v);
+
+    __vmwrite(GUEST_ACTIVITY_STATE, nrs->vmx.activity_state);
+    __vmwrite(GUEST_INTERRUPTIBILITY_INFO, nrs->vmx.interruptibility_info);
+    __vmwrite(GUEST_PENDING_DBG_EXCEPTIONS, nrs->vmx.pending_dbg);
+
+    if ( cpu_has_vmx_virtual_intr_delivery )
+        __vmwrite(GUEST_INTR_STATUS, nrs->vmx.interrupt_status);
+
+    vmx_vmcs_exit(v);
+}
+
 static void vmx_load_pdptrs(struct vcpu *v)
 {
     uint32_t cr3 = v->arch.hvm.guest_cr[3];
@@ -2487,6 +2517,8 @@ static struct hvm_function_table __initdata_cf_clobber vmx_function_table = {
     .load_cpu_ctxt        = vmx_load_vmcs_ctxt,
     .get_interrupt_shadow = vmx_get_interrupt_shadow,
     .set_interrupt_shadow = vmx_set_interrupt_shadow,
+    .get_nonreg_state     = vmx_get_nonreg_state,
+    .set_nonreg_state     = vmx_set_nonreg_state,
     .guest_x86_mode       = vmx_guest_x86_mode,
     .get_cpl              = _vmx_get_cpl,
     .get_segment_register = vmx_get_segment_register,
diff --git a/xen/arch/x86/include/asm/hvm/hvm.h b/xen/arch/x86/include/asm/hvm/hvm.h
index 5b7ec0cf69..9dee0f87a3 100644
--- a/xen/arch/x86/include/asm/hvm/hvm.h
+++ b/xen/arch/x86/include/asm/hvm/hvm.h
@@ -84,6 +84,17 @@ enum hvm_intblk {
 /* update_guest_cr() flags. */
 #define HVM_UPDATE_GUEST_CR3_NOFLUSH 0x00000001
 
+struct hvm_vcpu_nonreg_state {
+    union {
+        struct {
+            uint64_t activity_state;
+            uint64_t interruptibility_info;
+            uint64_t pending_dbg;
+            uint64_t interrupt_status;
+        } vmx;
+    };
+};
+
 /*
  * The hardware virtual machine (HVM) interface abstracts away from the
  * x86/x86_64 CPU virtualization assist specifics. Currently this interface
@@ -122,6 +133,10 @@ struct hvm_function_table {
     /* Examine specifics of the guest state. */
     unsigned int (*get_interrupt_shadow)(struct vcpu *v);
     void (*set_interrupt_shadow)(struct vcpu *v, unsigned int intr_shadow);
+    void (*get_nonreg_state)(struct vcpu *v,
+                             struct hvm_vcpu_nonreg_state *nrs);
+    void (*set_nonreg_state)(struct vcpu *v,
+                             struct hvm_vcpu_nonreg_state *nrs);
     int (*guest_x86_mode)(struct vcpu *v);
     unsigned int (*get_cpl)(struct vcpu *v);
     void (*get_segment_register)(struct vcpu *v, enum x86_segment seg,
@@ -744,6 +759,20 @@ void hvm_set_reg(struct vcpu *v, unsigned int reg, uint64_t val);
         d_->arch.hvm.pi_ops.vcpu_block(v_);                     \
 })
 
+static inline void hvm_get_nonreg_state(struct vcpu *v,
+                                        struct hvm_vcpu_nonreg_state *nrs)
+{
+    if ( hvm_funcs.get_nonreg_state )
+        alternative_vcall(hvm_funcs.get_nonreg_state, v, nrs);
+}
+
+static inline void hvm_set_nonreg_state(struct vcpu *v,
+                                        struct hvm_vcpu_nonreg_state *nrs)
+{
+    if ( hvm_funcs.set_nonreg_state )
+        alternative_vcall(hvm_funcs.set_nonreg_state, v, nrs);
+}
+
 #else  /* CONFIG_HVM */
 
 #define hvm_enabled false
@@ -863,6 +892,17 @@ static inline void hvm_set_reg(struct vcpu *v, unsigned int reg, uint64_t val)
     ASSERT_UNREACHABLE();
 }
 
+static inline void hvm_get_nonreg_state(struct vcpu *v,
+                                        struct hvm_vcpu_nonreg_state *nrs)
+{
+    ASSERT_UNREACHABLE();
+}
+static inline void hvm_set_nonreg_state(struct vcpu *v,
+                                        struct hvm_vcpu_nonreg_state *nrs)
+{
+    ASSERT_UNREACHABLE();
+}
+
 #define is_viridian_domain(d) ((void)(d), false)
 #define is_viridian_vcpu(v) ((void)(v), false)
 #define has_viridian_time_ref_count(d) ((void)(d), false)
diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86/mm/mem_sharing.c
index 15e6a7ed81..857accee58 100644
--- a/xen/arch/x86/mm/mem_sharing.c
+++ b/xen/arch/x86/mm/mem_sharing.c
@@ -1643,6 +1643,13 @@ static int bring_up_vcpus(struct domain *cd, struct domain *d)
     return 0;
 }
 
+static void copy_vcpu_nonreg_state(struct vcpu *d_vcpu, struct vcpu *cd_vcpu)
+{
+    struct hvm_vcpu_nonreg_state nrs = {};
+    hvm_get_nonreg_state(d_vcpu, &nrs);
+    hvm_set_nonreg_state(cd_vcpu, &nrs);
+}
+
 static int copy_vcpu_settings(struct domain *cd, const struct domain *d)
 {
     unsigned int i;
@@ -1651,7 +1658,7 @@ static int copy_vcpu_settings(struct domain *cd, const struct domain *d)
 
     for ( i = 0; i < cd->max_vcpus; i++ )
     {
-        const struct vcpu *d_vcpu = d->vcpu[i];
+        struct vcpu *d_vcpu = d->vcpu[i];
         struct vcpu *cd_vcpu = cd->vcpu[i];
         mfn_t vcpu_info_mfn;
 
@@ -1694,6 +1701,8 @@ static int copy_vcpu_settings(struct domain *cd, const struct domain *d)
 
         hvm_vmtrace_reset(cd_vcpu);
 
+        copy_vcpu_nonreg_state(d_vcpu, cd_vcpu);
+
         /*
          * TODO: to support VMs with PV interfaces copy additional
          * settings here, such as PV timers.
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 25 13:35:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 13:35:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294712.501248 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXk6U-0006YG-UW; Fri, 25 Mar 2022 13:35:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294712.501248; Fri, 25 Mar 2022 13:35:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXk6U-0006Y9-RV; Fri, 25 Mar 2022 13:35:46 +0000
Received: by outflank-mailman (input) for mailman id 294712;
 Fri, 25 Mar 2022 13:35:45 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nXk6T-0006Xz-Bh
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 13:35:45 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXk6S-00034h-Ts; Fri, 25 Mar 2022 13:35:44 +0000
Received: from [54.239.6.185] (helo=[192.168.14.36])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXk6S-0003gs-NV; Fri, 25 Mar 2022 13:35:44 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=VuxNunzVcXuJ5LxCcdLWAckLk1N2dOsEWwlIsizybEs=; b=P7Ig11veZxVq+BD05MarN64BoJ
	sCoafa0urcKt7vtHiWCvCx7msvzMpIJDjvM85RpoMtOVi1EAHKti4Z4hqR2JczTx3D9JVDCFtlXbS
	IZhF2+9rdluSEiGtiGrHtvfCpUFTEPvivPgBQ+UORUhMEIRB4XOE72JiiZTYpNl1rNE0=;
Message-ID: <cf150c85-34cb-73fb-9808-0338de546271@xen.org>
Date: Fri, 25 Mar 2022 13:35:42 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH early-RFC 2/5] xen/arm64: Rework the memory layout
To: Bertrand Marquis <Bertrand.Marquis@arm.com>
Cc: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 "marco.solieri@minervasys.tech" <marco.solieri@minervasys.tech>,
 "lucmiccio@gmail.com" <lucmiccio@gmail.com>, Julien Grall
 <jgrall@amazon.com>, Stefano Stabellini <sstabellini@kernel.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
References: <20220309112048.17377-1-julien@xen.org>
 <20220309112048.17377-3-julien@xen.org>
 <DE3C6104-82AD-41AE-BDAA-0074A08DDECF@arm.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <DE3C6104-82AD-41AE-BDAA-0074A08DDECF@arm.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit



On 25/03/2022 13:17, Bertrand Marquis wrote:
> Hi Julien,

Hi,

>> On 9 Mar 2022, at 12:20, Julien Grall <julien@xen.org> wrote:
>>
>> From: Julien Grall <jgrall@amazon.com>
>>
>> Xen is currently not fully compliant with the Arm because it will
> I think you wanted to say “arm arm” her.

Yes. I will update it.

> 
>> switch the TTBR with the MMU on.
>>
>> In order to be compliant, we need to disable the MMU before
>> switching the TTBR. The implication is the page-tables should
>> contain an identity mapping of the code switching the TTBR.
>>
>> If we don't rework the memory layout, we would need to find a
>> virtual address that matches a physical address and doesn't clash
>> with the static virtual regions. This can be a bit tricky.
> 
> This sentence is a bit misleading. Even with the rework you need
> to do that just by moving the Xen virtual address upper you make
> sure that anything physical memory under 512GB can be mapped
> 1:1 without clashing with other Xen mappings (unless Xen is loaded
> in memory at physical address 512GB which would end in the same issue).

So the key difference is with the rework, it is trivial to create the 
1:1 mapping as we know it doesn't clash. This is not the case without 
the rework.

> 
> I think should be rephrased.

I am not entirely sure how to rephrase it. Do you have a proposal?

> 
>>
>> On arm64, the memory layout  has plenty of unused space. In most of
>> the case we expect Xen to be loaded in low memory.
>>
>> The memory layout is reshuffled to keep the 0th slot free. Xen will now
> 
> 0th slot of first level of page table.

We want to keep the first 512GB free. So did you intend to write "zero 
level"?

> 
>> be loaded at (512GB + 2MB). This requires a slight tweak of the boot
>> code as XEN_VIRT_START cannot be used as an immediate.
>>
>> Signed-off-by: Julien Grall <jgrall@amazon.com>
>>
>> ---
>>
>>     TODO:
>>         - I vaguely recall that one of the early platform we supported add
>>           the memory starting in high memory (> 1TB). I need to check
>>           whether the new layout will be fine.
> 
> I think we have some Juno with some memory like that, tell me if you need help here.

Would you be able to check the memory layout and confirm?

> 
>>         - Update the documentation to reflect the new layout
>> ---
>> xen/arch/arm/arm64/head.S         |  3 ++-
>> xen/arch/arm/include/asm/config.h | 20 ++++++++++++++------
>> xen/arch/arm/mm.c                 | 14 +++++++-------
>> 3 files changed, 23 insertions(+), 14 deletions(-)
>>
>> diff --git a/xen/arch/arm/arm64/head.S b/xen/arch/arm/arm64/head.S
>> index 66d862fc8137..878649280d73 100644
>> --- a/xen/arch/arm/arm64/head.S
>> +++ b/xen/arch/arm/arm64/head.S
>> @@ -594,7 +594,8 @@ create_page_tables:
>>           * need an additional 1:1 mapping, the virtual mapping will
>>           * suffice.
>>           */
>> -        cmp   x19, #XEN_VIRT_START
>> +        ldr   x0, =XEN_VIRT_START
>> +        cmp   x19, x0
> A comment in the code would be good here to prevent someone reverting this.

Anyone trying to revert the change will face a compilation error:

   CC      arch/arm/arm64/head.o
arch/arm/arm64/head.S: Assembler messages:
arch/arm/arm64/head.S:597: Error: immediate out of range

So I don't think a comment is necessary because this is not specific to 
a compiler/assembler.
>> -#define SLOT0_ENTRY_BITS  39
>> -#define SLOT0(slot) (_AT(vaddr_t,slot) << SLOT0_ENTRY_BITS)
>> -#define SLOT0_ENTRY_SIZE  SLOT0(1)
>> -
>> -#define VMAP_VIRT_START  GB(1)
>> +#define VMAP_VIRT_START  (SLOT0(1) + GB(1))
>> #define VMAP_VIRT_END    (VMAP_VIRT_START + GB(1))
>>
>> -#define FRAMETABLE_VIRT_START  GB(32)
>> +#define FRAMETABLE_VIRT_START  (SLOT0(1) + GB(32))
>> #define FRAMETABLE_SIZE        GB(32)
>> #define FRAMETABLE_NR          (FRAMETABLE_SIZE / sizeof(*frame_table))
>> #define FRAMETABLE_VIRT_END    (FRAMETABLE_VIRT_START + FRAMETABLE_SIZE - 1)
>> diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
>> index 6b7c41d827ca..75ed9a3ce249 100644
>> --- a/xen/arch/arm/mm.c
>> +++ b/xen/arch/arm/mm.c
>> @@ -187,11 +187,10 @@ static void __init __maybe_unused build_assertions(void)
>>      BUILD_BUG_ON(DIRECTMAP_VIRT_START & ~FIRST_MASK);
>> #endif
>>      /* Page table structure constraints */
>> -#ifdef CONFIG_ARM_64
>> -    BUILD_BUG_ON(zeroeth_table_offset(XEN_VIRT_START));
>> -#endif
> Don’t you want to enforce the opposite now ? Check that it is not on slot 0 ?

I can. But this is not going to guarantee us the first 512GB is going to 
be free.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 13:42:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 13:42:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294715.501260 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkCx-000831-M2; Fri, 25 Mar 2022 13:42:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294715.501260; Fri, 25 Mar 2022 13:42:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkCx-00082u-Iz; Fri, 25 Mar 2022 13:42:27 +0000
Received: by outflank-mailman (input) for mailman id 294715;
 Fri, 25 Mar 2022 13:42:26 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+r7I=UE=citrix.com=prvs=076f4df05=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nXkCv-00082j-Uu
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 13:42:26 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 65ee6050-ac41-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 14:42:24 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 65ee6050-ac41-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648215744;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=su/ycCrs0uKJPmfspd1i9M0U9Noym9WwbRAESc+9LXM=;
  b=AHPgOBmtlWT1m8wUMKLbt2oq6o2RNNWrjbUwH+c6IUAjXcZmyE9njXeC
   okuO8hBTd79qZyuZ9cZEaHkQkBQ2n42ATg+l+QSkA96ZhoqsTri2Et5f4
   7NI3gFZ9oVUqjjU5AvJxNK8dam9+z77NrmU+oV2XJQCiENpboE+Bpo9/+
   o=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67576095
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:rW8PcqlPXT1IR3RDs0WkQ3To5gwqJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xJNCmGHP67YN2byKNl1b9iz9BsCsZaEy4cxTAZqqyE9FCMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiWV7V4
 7senuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYTCQMMvDupuonAhRjCw15YJ9i2fz1Li3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3oHZvwCufFf87aZvCX7/L9ZlT2zJYasVmQ6mDO
 JRBOGcHgBLoOD1oNnISLIgFsL2RnHT6T3pApw3JjP9ii4TU5FMoi+W8WDbPQfSRXtlclEuco
 mPA/kz6DwscOdjZziCKmlqum+vOkCXTSI8UUrqi+ZZCnFSWz3c7FB4SWF20sPS9zEW5Xrp3M
 1QV4CEnqaE46WShT8XxUhO1pnKJpFgXXN84O+Q78wiMzqP86QeFCmUKQzhNZcZgv8gzLRQ62
 1nMk973CDhHtLyOVWnb5rqStSm1OyUeMSkFfyBsZRcM5tD45oU+iB3eQ9JLEaipg9mzEjb1q
 xiVqAAuirNVitQEv425913ahzOnprDSUxU4oA7QWwqN7AxjY5W+T5e18lWd5vFFRLt1VXHY4
 iJCwZLHqrlTU9fdz0RhXdnhApmsxNOJbR/ij2Q+EqI52zPwyVqCPrJftWQWyFhSDu4IfjrgY
 Un2sAxX5YNOMHbCUZKbc75dGOxxk/G+SI2NuuT8K4MXP8MvLFPvEDRGPxb44oz7rKQ7fUjT0
 7+/eN3kM3sVAL8PINGeF7ZEiu9DKszTKAruqXHHI/aPjOL2iJ29E+5t3L6yggYRtfLsTOL9q
 Yo3Cidy408DONASmwGOmWLpEXgELGIgGbf9oNFNe+iIL2JOQT99W6aMnO5/Ktc/xMy5c9skG
 FnkCye0L3Kl2BX6xfiiMCg/ONsDo74hxZ7EAcDcFQnxgCVyCWpexKwea4E2bdEaGB9LlpZJo
 w0+U5zYWJxnE22fkxxENMWVhNEyJXyD2FPVVwL4MWdXQnKVb1GQkjMSVlC0r3dm4+venZZWn
 oBMISuHHstZG1UzVpq+hTDG5wrZgEXxUdlaBiPgCtJSZF/t4M5tLSnwheUwOMYCNVPIwT7y6
 upcKU5GzQURi+fZKOX0uJ0=
IronPort-HdrOrdr: A9a23:UiGucKpbHOxHQ8NDfzHCDv8aV5vFL9V00zEX/kB9WHVpm5Oj+f
 xGzc516farslossREb+expOMG7MBXhHLpOkPQs1NaZLXPbUQ6TTb2KgrGSpgEIdxeOktK1kJ
 0QD5SWa+eAfGSS7/yKmDVQeuxIqLLsndHK9IXjJjVWPHpXgslbnnlE422gYzRLrWd9dP0E/M
 323Ls5m9PsQwVeUu2LQl0+G8TTrdzCk5zrJTYAGh4c8QGLyRel8qTzHRS01goXF2on+8ZpzU
 H11yjCoomzufCyzRHRk0fV8pRtgdPkjv9OHtaFhMQ5IijlziyoeINicbufuy1dmpDl1H8a1P
 335zswNcV67H3cOkmzvBvWwgHllA0j7nfzoGXo9kfLkIjcfnYXGsBBjYVWfl/y8Ew7puxx16
 pNwiawq4dXJQmoplWz2/H4EzVR0makq3srluAey1ZFV5EFVbNXpYsDuGtIDZY7Gj7g4oxPKp
 gjMCjl3ocWTbqmVQGYgoE2q+bcHUjbXy32D3Tqg/blnQS/xxtCvgklLM92pAZ1yHtycegA2w
 3+CNUaqFh/dL5nUUtDPpZyfSKWMB26ffueChPaHbzYfJt3Tk4l7aSHpIkI2A==
X-IronPort-AV: E=Sophos;i="5.90,209,1643691600"; 
   d="scan'208";a="67576095"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=g4HuBDlutmymnYgqu1xs2KQNULNDPHNJ5LoZVYISpPlFkemL/bJftq3J67A+RZ4Kr5O2M8ahIN9Sj6NhM3D4JJdM/L3YjxWDI73dPdmVG4/KlmP5E1KzuS5wcnHhTIafDoMhTjjXx8Gbg4ZqLQzNXhPHABT2LJrYZ8A2FvHGZAsZHlWDmn6bh/fKl/jYEttfwfrktwZGboUBRgMhtwOcFRZAebSz45+wdGkd2/9ASu3yr3na3PNnVCVvaBfa+wI71hAb1+pEwmnlyQZglJvlJ/1ZnidbZpEGZrjaj022R7Zy7px9BnW2GspXlSJ0Y4qK23GzHlNoi8bC48MlDwYpAw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=VRkde5jMIYytM5oUiiWJYbIYwbQRB29/5B7Ecqs0WTI=;
 b=AFXE2TzSjOTRaLoo8NbLlOf7KKXIpdv6Xw09VmFltUEsyhq5dUjMtH6F3/QbjmvYMiNgKWi3ywP16Xiki29lJKuALnmvb1Bl/ZmXoIc0DH2mwMKDQk2BCjTc0+p//vNO33exuou9RNJQoK9+jCppm5KP3K9Z3OCsslaZfpfWq5Uzf2drKxHd3ul/DEiJqub+J3qdu5CPqCknHOzjBVFzalJ1Hjrl/ASYjt2CQ8sNoUfRuDi70SmOxfEE3vN8EbEitds9l8T8LpEqYht6+F+dCVgP8hRvO1mmi/0HPpffv8a07H1kRCFK9GhP7A1pecWZHcRA1k3v3SCc0b9uxe0R2Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=VRkde5jMIYytM5oUiiWJYbIYwbQRB29/5B7Ecqs0WTI=;
 b=B+qKZXYpGpX+p5Bacd/EYiyvSUPxNTQbi51cX/voUdDAzZH8Wn1Bwc9VobxQXN7F7C7s+eoT5HCTE78/jhPw4zuepim2TvzaktX3e84ublrkf2f+g7hiNtn5jHGrV8fjqKYZKpPhLMEGJweAEKaYA0BtC3LIAXJnHrIK8IxzlwM=
Date: Fri, 25 Mar 2022 14:42:07 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Tamas K Lengyel <tamas.lengyel@intel.com>
CC: <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, Anthony PERARD
	<anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, "Jan
 Beulich" <jbeulich@suse.com>, Julien Grall <julien@xen.org>, "Stefano
 Stabellini" <sstabellini@kernel.org>, Tamas K Lengyel <tamas@tklengyel.com>,
	Alexandru Isaila <aisaila@bitdefender.com>, Petre Pircalabu
	<ppircalabu@bitdefender.com>
Subject: Re: [PATCH 3/3] x86/mem_sharing: make fork_reset more configurable
Message-ID: <Yj3Grwx3IZLnfEdt@Air-de-Roger>
References: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
 <fb437a16517d343ba3432aa64b9e14b34630a750.1647970630.git.tamas.lengyel@intel.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <fb437a16517d343ba3432aa64b9e14b34630a750.1647970630.git.tamas.lengyel@intel.com>
X-ClientProxiedBy: LO4P123CA0353.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:18d::16) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 506eb492-799e-4bbd-1078-08da0e654492
X-MS-TrafficTypeDiagnostic: DM5PR03MB3401:EE_
X-Microsoft-Antispam-PRVS: <DM5PR03MB3401CAB4ED98F033BEF3E9A08F1A9@DM5PR03MB3401.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(26005)(38100700002)(186003)(5660300002)(8936002)(7416002)(86362001)(66946007)(6916009)(66556008)(54906003)(508600001)(66476007)(6512007)(6506007)(6666004)(4326008)(316002)(33716001)(82960400001)(9686003)(8676002)(2906002)(6486002)(85182001)(83380400001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?ZVFiMW9kd2h3b29CRTA5TUpNaEFGcFpaTUtMbzFpOUlTWEdSTzNwWGowSk41?=
 =?utf-8?B?UnhLMUJvTEpYamxQcWJ4MTZmaUNiTkl3RjQxdkJ0TmZZMEJSdkUzZ1drRDE0?=
 =?utf-8?B?Z3RzekQ1K1p6N3Rsend1WnpvMVM2UXVKbEt3Umw4Q3FHK1RjWEt5Y0NTZVgz?=
 =?utf-8?B?Wk0xZEJxV0JUdE1NRm94bTUzT2JOMENvV0F2ZDc3bjBRVVJQQ2RRb09Ec0Jt?=
 =?utf-8?B?VTNQZ0s1SFNNMStSdnJlMHRjVVYrLzJNdmtRK1l1WnFjUVZTUDZVcTNteEdH?=
 =?utf-8?B?U3RNcTBrVkZGUktYVGQxbXZ0SjJ4RzViWDhXTStEdUd6UFlqbHFySDgwWGJT?=
 =?utf-8?B?TWpjMHZhOGhueitsbTVpeFgrZ2tOTm84Q2cwaGdzS2NDU3NPSUZuaFRzaDNm?=
 =?utf-8?B?VC9UN0xreGhYSU5Xb0JEN3cyY24zU2NoQ1dzZGlWVnQvbmtpRGpMZEI5ZEdx?=
 =?utf-8?B?UlRsTEN5aXNOZ2RXbVdsOEFNcmdrbXhWNGtZMTQxblNLcCtyQXBLYllrc1Mv?=
 =?utf-8?B?YWJWeHVCZjRrRkUvd0RWdkpHS0haSy9nRzFPdjRLZzYra3FTQzNhcnBmbWVK?=
 =?utf-8?B?S2F3N1YweC9wQ0FnbTF2UUs1S1E2eUtUN0pmM0RzbzZOSm44NXFxMzZDT2p6?=
 =?utf-8?B?YVJ1RUV5c3NIa3JjLzJhRVJEbW1pMXdCaW9qY1pKUkVrazU0ZURIajdFUVVy?=
 =?utf-8?B?VEMrTWlSaUpyWlVCSitZWEROdk1sQ25qUC9udG83SU9IY2Y5YTY1d1pPbU1O?=
 =?utf-8?B?RG0zdFlTczdPZ1ZIcHEvNTNOR3VkNTdUWERJS2hYYXIzb2NKWHRTbTh3Y1FT?=
 =?utf-8?B?dm1KbkFrY2VHWmhmUkRyQ0dBVkdPQU55QTJ2UnNuOWpkdmxvcUVHM0h2ZC9L?=
 =?utf-8?B?a1pYMFhHNU5HalJTK3pKeVp3bHNuUmt4N0o5a3N4N3F0VFhqNGRLeHNBR3Mz?=
 =?utf-8?B?U3JzK0NiU1J5NjQvVDBFMzhYMkdGMHg1YlJuays1Sjcxd2RaZXFuRDJVOTdh?=
 =?utf-8?B?ZGpUcHZEMVJIQkRsSjJ3ZXRtQ0o0QTA0OHdFK3dLa2FrTnlGdU1nYlFzQ2JN?=
 =?utf-8?B?TithdTM0RytsRXdyNWI4TllsWjEyU2lYbThXLzBHZ3EycUtjeXpBVVFZdTIw?=
 =?utf-8?B?c3J4OTN2ck9ZTWNWcVExUHJIc093N1VoTlhENWZSV0lTTkpSZTdMdG15cEh4?=
 =?utf-8?B?SGxSOUJVbnZuZTNBeVVCYjdhSFdIamhnN2JBL0pJR3oxK2swUjc2YUdlVUtm?=
 =?utf-8?B?UDhCS2JWSWR0K1YyU2lJRmI3NXZqa3ZGRlNtc3BSeW5keHlqRy9iK1hjNURX?=
 =?utf-8?B?ME9PRCs1OEZZZDM5MFV2SE1leTgxQjJmT1RRa1JKMjdCTUNXYVkySXB1akl3?=
 =?utf-8?B?MitCbnViUVRiL3M5S1hHTDRsTklNZzJ3MXJMRlhyR3lsZG4xaWo0Um9iVVBC?=
 =?utf-8?B?dXRBaGlFWFFHcGhLODNDT2tORUJWTDFkbkdDNXVQdE8wcWdSNjlXMVVEbHJa?=
 =?utf-8?B?NEl6ZmxPaHFWbVQzOVY5dm1hNnlqTGxxSlJkOFVCME0xaVpJNWdRT3UzeG05?=
 =?utf-8?B?dlJtdjdZQjlMVDJXbitUWjBOUjM3SVVnVk1zdEZwemxuRUx2SGR6Y2RXODFY?=
 =?utf-8?B?TkhBUmZaR3JlYUlnQnFVaFYxMzZVUHMwZk5GNk0veVg1S0pCNHBvOExYRm1h?=
 =?utf-8?B?ZnpjYzFQQWQ0N0x5TUdycy9JWm9uWlZEYUMva2lGRmROTTlxN1pkRERycDdt?=
 =?utf-8?B?M1Y0VXFMamx6d0JHMmRCZ3RDL2FVZVcwUDltT2FFaTBwNTZjUlM1Wkptdjg5?=
 =?utf-8?B?NWxlUXBETG8vSVpod3J5ZisrbWhET204alVDdHFjUWsrSm9wVU12UVA4WHRK?=
 =?utf-8?B?T20vSnVTanVTcCtiRlRKYjZrblVBaGxmcTJTcGpMUDgrajQ4dmFTdEp4QXBx?=
 =?utf-8?B?NUx6UkZkaU5OckRaa3hyNzJqa2xIazNBSlhwVWk4V3NseWhkYTUvWVlvWm9B?=
 =?utf-8?B?WlNyVnRSRmFjNnUxVzNEOFVQQWhNSThEdWdXWVlBd2R4SFZMOENpSnF2NE9n?=
 =?utf-8?B?NzB6OGNwVXg4Ri84ZDVyeVRWcS9PNXk4VFVPZHVWZ1hRUjNSei81Nm14Q3BO?=
 =?utf-8?B?TWdYN1A2dEk5dHdMOFNLekpkbzk1VEtzNmQxbmxNOFVidkV6UXFyQnFpZTRy?=
 =?utf-8?B?b1QvUjUxc3h2djRqa1JYVjM0T2xBY21SYjcrZWF4VW5yYy9VQkVZQW16RCs2?=
 =?utf-8?B?dzZGM1J4Y3FCSlVITDZUcUc2T2N0eGt4clZuOUFwdStsL2RNczBRbjBxdGNE?=
 =?utf-8?B?N0pHZkV5Z0hSbThUN3RRNnl2TmpHbmlGSWxhcnA1aFB0TGlBRTM0by9yanpo?=
 =?utf-8?Q?MP3d8JHWRPAAE8MQ=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 506eb492-799e-4bbd-1078-08da0e654492
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 13:42:13.3118
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 0UNna9sCYVFh3j7w5PH4ppm/F3PVNVKEZPFlsPjLSHdCic0u6w61ZzT8UidfStb9ZpoBg/YpxQTw3k/68gD/VQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR03MB3401
X-OriginatorOrg: citrix.com

On Tue, Mar 22, 2022 at 01:41:39PM -0400, Tamas K Lengyel wrote:
> diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86/mm/mem_sharing.c
> index a21c781452..bfa6082f13 100644
> --- a/xen/arch/x86/mm/mem_sharing.c
> +++ b/xen/arch/x86/mm/mem_sharing.c
> @@ -1892,15 +1892,19 @@ static int fork(struct domain *cd, struct domain *d, uint16_t flags)
>   * footprints the hypercall continuation should be implemented (or if this
>   * feature needs to be become "stable").
>   */
> -static int mem_sharing_fork_reset(struct domain *d)
> +int mem_sharing_fork_reset(struct domain *d, bool reset_state,
> +                           bool reset_memory)
>  {
> -    int rc;
> +    int rc = 0;
>      struct domain *pd = d->parent;
>      struct p2m_domain *p2m = p2m_get_hostp2m(d);
>      struct page_info *page, *tmp;
>  
>      domain_pause(d);

I would assert that at least one of reset_sate or reset_memory is set
here, as callers already do the checks.

>  
> +    if ( !reset_memory )
> +        goto state;

I don't like using labels and goto like this as I think it makes the
code harder to follow, and so more likely to introduce bugs. I would
rather place the memory reset parts inside of an if ( reset_memory ) {
... }, but that's my taste.

> +
>      /* need recursive lock because we will free pages */
>      spin_lock_recursive(&d->page_alloc_lock);
>      page_list_for_each_safe(page, tmp, &d->page_list)
> @@ -1933,7 +1937,9 @@ static int mem_sharing_fork_reset(struct domain *d)
>      }
>      spin_unlock_recursive(&d->page_alloc_lock);
>  
> -    rc = copy_settings(d, pd, d->arch.hvm.mem_sharing.skip_special_pages);
> + state:
> +    if ( reset_state )
> +        rc = copy_settings(d, pd, d->arch.hvm.mem_sharing.skip_special_pages);
>  
>      domain_unpause(d);
>  
> @@ -2239,15 +2245,21 @@ int mem_sharing_memop(XEN_GUEST_HANDLE_PARAM(xen_mem_sharing_op_t) arg)
>  
>      case XENMEM_sharing_op_fork_reset:
>      {
> +        bool reset_state = mso.u.fork.flags & XENMEM_FORK_RESET_STATE;
> +        bool reset_memory = mso.u.fork.flags & XENMEM_FORK_RESET_MEMORY;
> +
>          rc = -EINVAL;
> -        if ( mso.u.fork.pad || mso.u.fork.flags )
> +        if ( mso.u.fork.pad || (!reset_state && !reset_memory) )
> +            goto out;
> +        if ( mso.u.fork.flags &
> +             ~(XENMEM_FORK_RESET_STATE | XENMEM_FORK_RESET_MEMORY) )
>              goto out;
>  
>          rc = -ENOSYS;
>          if ( !d->parent )
>              goto out;
>  
> -        rc = mem_sharing_fork_reset(d);
> +        rc = mem_sharing_fork_reset(d, reset_state, reset_memory);
>          break;
>      }
>  
> diff --git a/xen/common/vm_event.c b/xen/common/vm_event.c
> index 84cf52636b..a7b192be0d 100644
> --- a/xen/common/vm_event.c
> +++ b/xen/common/vm_event.c
> @@ -28,6 +28,11 @@
>  #include <asm/p2m.h>
>  #include <asm/monitor.h>
>  #include <asm/vm_event.h>
> +
> +#ifdef CONFIG_MEM_SHARING
> +#include <asm/mem_sharing.h>
> +#endif
> +
>  #include <xsm/xsm.h>
>  #include <public/hvm/params.h>
>  
> @@ -394,6 +399,15 @@ static int vm_event_resume(struct domain *d, struct vm_event_domain *ved)
>              if ( rsp.reason == VM_EVENT_REASON_MEM_PAGING )
>                  p2m_mem_paging_resume(d, &rsp);
>  #endif
> +#ifdef CONFIG_MEM_SHARING
> +            do {
> +                bool reset_state = rsp.flags & VM_EVENT_FLAG_RESET_FORK_STATE;
> +                bool reset_mem = rsp.flags & VM_EVENT_FLAG_RESET_FORK_MEMORY;
> +
> +                if ( reset_state || reset_mem )
> +                    mem_sharing_fork_reset(d, reset_state, reset_mem);

You seem to drop the error code returned by mem_sharing_fork_reset.

> +            } while(0);
> +#endif

I think you can avoid the do {} while(0); just using the braces will
allow you to define local variables in the inner block.

>              /*
>               * Check emulation flags in the arch-specific handler only, as it
> diff --git a/xen/include/public/memory.h b/xen/include/public/memory.h
> index 208d8dcbd9..30ce23c5a7 100644
> --- a/xen/include/public/memory.h
> +++ b/xen/include/public/memory.h
> @@ -541,12 +541,14 @@ struct xen_mem_sharing_op {
>                  uint32_t gref;     /* IN: gref to debug         */
>              } u;
>          } debug;
> -        struct mem_sharing_op_fork {      /* OP_FORK */
> +        struct mem_sharing_op_fork {      /* OP_FORK/_RESET */
>              domid_t parent_domain;        /* IN: parent's domain id */
>  /* These flags only makes sense for short-lived forks */
>  #define XENMEM_FORK_WITH_IOMMU_ALLOWED (1u << 0)
>  #define XENMEM_FORK_BLOCK_INTERRUPTS   (1u << 1)
>  #define XENMEM_FORK_SKIP_SPECIAL_PAGES (1u << 2)
> +#define XENMEM_FORK_RESET_STATE        (1u << 3)
> +#define XENMEM_FORK_RESET_MEMORY       (1u << 4)

For backward compatibility purposes should the flags be added
backwards, ie:

#define XENMEM_FORK_KEEP_STATE        (1u << 3)
#define XENMEM_FORK_KEEP_MEMORY       (1u << 4)

So that existing callers of XENMEM_sharing_op_fork_reset will continue
working as expected?

Or we don't care about that as the interface is protected with
__XEN_TOOLS__?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 13:48:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 13:48:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294721.501289 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkIl-0000oD-MM; Fri, 25 Mar 2022 13:48:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294721.501289; Fri, 25 Mar 2022 13:48:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkIl-0000o6-J0; Fri, 25 Mar 2022 13:48:27 +0000
Received: by outflank-mailman (input) for mailman id 294721;
 Fri, 25 Mar 2022 13:48:27 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wXB3=UE=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nXkIk-0000jo-PB
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 13:48:26 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on20615.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::615])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 3ea7ebe2-ac42-11ec-a405-831a346695d4;
 Fri, 25 Mar 2022 14:48:26 +0100 (CET)
Received: from AM6PR10CA0031.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:209:89::44)
 by DB6PR0802MB2232.eurprd08.prod.outlook.com (2603:10a6:4:83::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.18; Fri, 25 Mar
 2022 13:48:13 +0000
Received: from VE1EUR03FT054.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:89:cafe::bb) by AM6PR10CA0031.outlook.office365.com
 (2603:10a6:209:89::44) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17 via Frontend
 Transport; Fri, 25 Mar 2022 13:48:13 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT054.mail.protection.outlook.com (10.152.19.64) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Fri, 25 Mar 2022 13:48:12 +0000
Received: ("Tessian outbound 31aeb3346a45:v113");
 Fri, 25 Mar 2022 13:48:11 +0000
Received: from 9d9745c24d63.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 FFE78679-8E7C-41B5-9749-F4EA6923FE90.1; 
 Fri, 25 Mar 2022 13:48:05 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 9d9745c24d63.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 25 Mar 2022 13:48:05 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com (2603:10a6:20b:85::25)
 by VI1PR08MB4495.eurprd08.prod.outlook.com (2603:10a6:803:f3::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.18; Fri, 25 Mar
 2022 13:47:57 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62]) by AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62%3]) with mapi id 15.20.5102.018; Fri, 25 Mar 2022
 13:47:57 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3ea7ebe2-ac42-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=fj7GYhBrsnQ4w3KkcRmRKIsvbffpcrQTmYodiqEFvHg=;
 b=oEOfn3eWo1a46igVv96Bk8AON+aMHkBjZwxBVcSAHK4P9HFtaqKOSyAe1R1ONVGaSOaZ27fzLZRqTXBf/dDWqmgBFNWRjNEiRfi3jScG9dfhACrn3S8uXoEjn/ZsCxrpq8p7N/cRkawEH4Av65eVvZxyLadEThhWET4U9KtlR88=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: d29d2feb38527d5d
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=IXszteOPP0Y1bLzZh33OmeFvLnJ9fyp5NlHiyGvbhNbQKLMYJJCslRsxOlSoJN0CMWYtp2saaJizrKUPEn1CwdsjMPs6G9goGhLNLfRrSDMpLF0bbrMgX58BaHOHFi/W9ONnvVpcCkNqGUxfzjlYakbLd/DEtPfmpGO/7vSupY9q9MxMJ41S45dOlOV1rfmY/nArvsBL3v4fCfygssqqVKW6PFit8LMQbTajZyw855gTw+nxmvJ7uHjg34/W4Jnl4UvxpQWi76LmdUuYbseIz0FX5FGmCIyocaI2eX1OOPpT86ttcnMYCIGgF3Y/Y5GLSPBsHS1f263+UcCGZ0yo1g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=fj7GYhBrsnQ4w3KkcRmRKIsvbffpcrQTmYodiqEFvHg=;
 b=l/ltz8kzrpT8C58WFIFh52Zs/6zY46ygayonsbZE1p4fSdYPGu/LX+VMsdh8AThcbw3wp+o1wDMq15d9i06L3PtrPKwYNaHuITJsGBR5fnxKl+ZLdizNsak93uMZQLuXIM4HYqWXyko2DEglBlR+P51gGoKLA+d6GmXgQWoZPT2LAe3dVfQqg1GR/XiSA5t6EjeLDt8eURCjwg7aWQrrVy2RAtI56J6mN1WCgBN9zo82lwFxgfsw3sKSNMmOwF7JZqMt7jxdiAZVlj9MZ2ftmC3SdynzdvrkcwJSGZgEMFyNOI1KgHrtXdri7p4oeK4w2OQN1SPKvy+gutNc/ze4nQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=fj7GYhBrsnQ4w3KkcRmRKIsvbffpcrQTmYodiqEFvHg=;
 b=oEOfn3eWo1a46igVv96Bk8AON+aMHkBjZwxBVcSAHK4P9HFtaqKOSyAe1R1ONVGaSOaZ27fzLZRqTXBf/dDWqmgBFNWRjNEiRfi3jScG9dfhACrn3S8uXoEjn/ZsCxrpq8p7N/cRkawEH4Av65eVvZxyLadEThhWET4U9KtlR88=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Julien Grall <julien@xen.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	"marco.solieri@minervasys.tech" <marco.solieri@minervasys.tech>,
	"lucmiccio@gmail.com" <lucmiccio@gmail.com>, Julien Grall
	<jgrall@amazon.com>, Stefano Stabellini <sstabellini@kernel.org>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH early-RFC 4/5] xen/arm: mm: Rework switch_ttbr()
Thread-Topic: [PATCH early-RFC 4/5] xen/arm: mm: Rework switch_ttbr()
Thread-Index: AQHYM6fbReeSkSu3okSScrrMlkjRu6zQNoyA
Date: Fri, 25 Mar 2022 13:47:56 +0000
Message-ID: <140E78FF-8281-48BA-BE13-C4B3E12F34A5@arm.com>
References: <20220309112048.17377-1-julien@xen.org>
 <20220309112048.17377-5-julien@xen.org>
In-Reply-To: <20220309112048.17377-5-julien@xen.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 2d6c171f-fe02-49ab-9405-08da0e661ab9
x-ms-traffictypediagnostic:
	VI1PR08MB4495:EE_|VE1EUR03FT054:EE_|DB6PR0802MB2232:EE_
X-Microsoft-Antispam-PRVS:
	<DB6PR0802MB22321B81232911B6A4F31A5A9D1A9@DB6PR0802MB2232.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR08MB3784.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(8936002)(91956017)(66476007)(186003)(26005)(66556008)(76116006)(5660300002)(66946007)(122000001)(6512007)(6506007)(508600001)(6486002)(2616005)(66446008)(38070700005)(38100700002)(316002)(54906003)(8676002)(71200400001)(6916009)(86362001)(64756008)(53546011)(4326008)(36756003)(2906002)(33656002)(83380400001)(21314003)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <5FB6EE65817E0848802A1BA0B8403CC7@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB4495
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT054.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	b172fb9c-d903-415f-237c-08da0e66118c
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(36756003)(2906002)(70586007)(356005)(53546011)(4326008)(33656002)(36860700001)(336012)(83380400001)(40460700003)(47076005)(5660300002)(81166007)(8936002)(107886003)(6862004)(26005)(6512007)(186003)(70206006)(6486002)(8676002)(316002)(82310400004)(86362001)(54906003)(508600001)(6506007)(2616005)(21314003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 13:48:12.2763
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 2d6c171f-fe02-49ab-9405-08da0e661ab9
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT054.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0802MB2232
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From xen-devel-bounces@lists.xenproject.org Fri Mar 25 13:48:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 13:48:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294725.501299 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkIu-0001EN-2Q; Fri, 25 Mar 2022 13:48:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294725.501299; Fri, 25 Mar 2022 13:48:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkIt-0001EE-VR; Fri, 25 Mar 2022 13:48:35 +0000
Received: by outflank-mailman (input) for mailman id 294725;
 Fri, 25 Mar 2022 13:48:34 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nXkIs-0001D8-GH
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 13:48:34 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXkIs-0003HI-11; Fri, 25 Mar 2022 13:48:34 +0000
Received: from [54.239.6.185] (helo=[192.168.14.36])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXkIr-0004aT-QM; Fri, 25 Mar 2022 13:48:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=tRNa6HC8kLqjps7Q9TmiVhFDBQiL1m2ULowB5h8C968=; b=lexLUzGH2hlNb3VrQJjaBBoytp
	Vaj4hIcI0nkSzhLOdxeSzq1CfZU3BEeMBgeEMoPIztufxWSbiINMWfsG1Mu185sT7x7pR3i4mLQp+
	Wco0jFrl4Ll43nWzIdB9Sql6z0CfLnkfxBpAoRjcoXVb8xpKGJSKfEhZ8Pv6uGi14tx8=;
Message-ID: <5a20f085-e4c6-54da-473b-4fcec6657450@xen.org>
Date: Fri, 25 Mar 2022 13:48:31 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH early-RFC 3/5] xen/arm: mm: Introduce helpers to
 prepare/enable/disable the identity mapping
To: Bertrand Marquis <Bertrand.Marquis@arm.com>
Cc: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 "marco.solieri@minervasys.tech" <marco.solieri@minervasys.tech>,
 "lucmiccio@gmail.com" <lucmiccio@gmail.com>, Julien GralL
 <jgrall@amazon.com>, Stefano Stabellini <sstabellini@kernel.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
References: <20220309112048.17377-1-julien@xen.org>
 <20220309112048.17377-4-julien@xen.org>
 <7A115ECF-66CD-4B9A-AD98-53A92F91269E@arm.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <7A115ECF-66CD-4B9A-AD98-53A92F91269E@arm.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit



On 25/03/2022 13:32, Bertrand Marquis wrote:
> Hi Julien,

Hi,

>> On 9 Mar 2022, at 12:20, Julien Grall <julien@xen.org> wrote:
>>
>> From: Julien GralL <jgrall@amazon.com>
>>
>> In follow-up patches we will need to have part of Xen identity mapped in
>> order to safely switch the TTBR.
>>
>> On some platform, the identity mapping may have to start at 0. If we always
>> keep the identity region mapped, NULL pointer ference would lead to access
>> to valid mapping.
>>
>> It would be possible to relocate Xen to avoid clashing with address 0.
>> However the identity mapping is only meant to be used in very limited
>> places. Therefore it would be better to keep the identity region invalid
>> for most of the time.
>>
>> Two new helpers are introduced:
>>     - prepare_identity_mapping() will setup the page-tables so it is
>>       easy to create the mapping afterwards.
>>     - update_identity_mapping() will create/remove the identity mapping
> 
> Nit: Would be better to first say what the patch is doing and then explaining
> the NULL pointer possible issue.
The NULL pointer is part of the problem statement. IOW, I would not have 
introduced update_identity_mapping() if we were not concerned that the 
mapping start 0.

So I don't think the commit message would read the same.

>> +/*
>> + * The identity mapping may start at physical address 0. So don't want
>> + * to keep it mapped longer than necessary.
>> + *
>> + * When this is called, we are still using the boot_pgtable.
>> + *
>> + * XXX: Handle Arm32 properly.
>> + */
>> +static void prepare_identity_mapping(void)
>> +{
>> +    paddr_t id_addr = virt_to_maddr(_start);
>> +    lpae_t pte;
>> +    DECLARE_OFFSETS(id_offsets, id_addr);
>> +
>> +    printk("id_addr 0x%lx\n", id_addr);
> 
> Debug print that should be removed.

Will do. Note the "early-RFC" in the comment. I am not looking for a 
detailed review (I didn't spend too much time cleaning up) but a 
feedback on the approach.

> 
>> +#ifdef CONFIG_ARM_64
>> +    if ( id_offsets[0] != 0 )
>> +        panic("Cannot handled ID mapping above 512GB\n");
> 
> The error message here might not be really helpful for the user.
> How about saying that Xen cannot be loaded in memory with
> a physical address above 512GB ?

Sure.

> 
>> +#endif
>> +
>> +    /* Link first ID table */
>> +    pte = pte_of_xenaddr((vaddr_t)xen_first_id);
>> +    pte.pt.table = 1;
>> +    pte.pt.xn = 0;
>> +
>> +    write_pte(&boot_pgtable[id_offsets[0]], pte);
>> +
>> +    /* Link second ID table */
>> +    pte = pte_of_xenaddr((vaddr_t)xen_second_id);
>> +    pte.pt.table = 1;
>> +    pte.pt.xn = 0;
>> +
>> +    write_pte(&xen_first_id[id_offsets[1]], pte);
>> +
>> +    /* Link third ID table */
>> +    pte = pte_of_xenaddr((vaddr_t)xen_third_id);
>> +    pte.pt.table = 1;
>> +    pte.pt.xn = 0;
>> +
>> +    write_pte(&xen_second_id[id_offsets[2]], pte);
>> +
>> +    /* The mapping in the third table will be created at a later stage */
>> +
>> +    /*
>> +     * Link the identity mapping in the runtime Xen page tables. No need to
>> +     * use write_pte here as they are not live yet.
>> +     */
>> +    xen_pgtable[id_offsets[0]] = boot_pgtable[id_offsets[0]];
>> +}
>> +
>> +void update_identity_mapping(bool enable)
> 
> You probably want an __init attribute here.
I expect this helper to be necessary after boot (e.g. CPU bring-up, 
suspend/resume). So I decided to keep it without _init.

> 
>> +{
>> +    paddr_t id_addr = virt_to_maddr(_start);
>> +    int rc;
>> +
>> +    if ( enable )
>> +        rc = map_pages_to_xen(id_addr, maddr_to_mfn(id_addr), 1,
>> +                              PAGE_HYPERVISOR_RX);
>> +    else
>> +        rc = destroy_xen_mappings(id_addr, id_addr + PAGE_SIZE);
>> +
>> +    BUG_ON(rc);
>> +}
>> +
>> /*
>>   * After boot, Xen page-tables should not contain mapping that are both
>>   * Writable and eXecutables.
>> @@ -609,6 +679,9 @@ void __init setup_pagetables(unsigned long boot_phys_offset)
>>
>>      phys_offset = boot_phys_offset;
>>
>> +    /* XXX: Find a better place to call it */
> 
> Why do you think this place is not right ?
Because the use in setup_pagetables() will soon disappear (my plan it to 
completely remove setup_pagetables) and this will used in other 
subsystem (CPU bring-up, suspend/resume).

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 13:54:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 13:54:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294750.501311 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkO8-0003O7-NB; Fri, 25 Mar 2022 13:54:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294750.501311; Fri, 25 Mar 2022 13:54:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkO8-0003O0-Jt; Fri, 25 Mar 2022 13:54:00 +0000
Received: by outflank-mailman (input) for mailman id 294750;
 Fri, 25 Mar 2022 13:53:59 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Ci4N=UE=tklengyel.com=tamas@srs-se1.protection.inumbo.net>)
 id 1nXkO7-0003Nu-8O
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 13:53:59 +0000
Received: from MTA-11-3.privateemail.com (mta-11-3.privateemail.com
 [198.54.122.105]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 0383e943-ac43-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 14:53:57 +0100 (CET)
Received: from mta-11.privateemail.com (localhost [127.0.0.1])
 by mta-11.privateemail.com (Postfix) with ESMTP id 56CA418000A3
 for <xen-devel@lists.xenproject.org>; Fri, 25 Mar 2022 09:53:55 -0400 (EDT)
Received: from mail-oa1-f50.google.com (unknown [10.20.151.194])
 by mta-11.privateemail.com (Postfix) with ESMTPA id 31A0218000A2
 for <xen-devel@lists.xenproject.org>; Fri, 25 Mar 2022 09:53:55 -0400 (EDT)
Received: by mail-oa1-f50.google.com with SMTP id
 586e51a60fabf-d6e29fb3d7so8195498fac.7
 for <xen-devel@lists.xenproject.org>; Fri, 25 Mar 2022 06:53:55 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0383e943-ac43-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648216435;
	bh=XUFzPRyKCp2j4zYz9JlZuJ5ms63NILvxPLxFOvxogHI=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=CFH3ISdlj6ZRv9d6itg5EQjxqjEs+S2BWl+4e9X7yHtZSh8bDARVeqNwbigsM4h2+
	 BuBUqwelypHVBALpE6e1K7nQcrWjadpLCRvWXlDCPNiK1+Mku1UeSznDJr6wIX8N9p
	 1k+XaSRUapNCR5ydOcaZYWvB5xrlUsbcozpFOBAkuBlHub+se1JrowoTcjMsaD0X3/
	 P/fFmQfvg72BJt/rGbZ+zw0CRDILUsBFvn0v6orbd0btZVRBG3RU5sKGidLy/8JVBJ
	 L+YhVk4Ly3IrIvOaenbnOD+A+050aISSty8gW57/ir0mIU2613IvWacSc+xD5yqhd6
	 /BJDq007YP/dA==
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648216435;
	bh=XUFzPRyKCp2j4zYz9JlZuJ5ms63NILvxPLxFOvxogHI=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=CFH3ISdlj6ZRv9d6itg5EQjxqjEs+S2BWl+4e9X7yHtZSh8bDARVeqNwbigsM4h2+
	 BuBUqwelypHVBALpE6e1K7nQcrWjadpLCRvWXlDCPNiK1+Mku1UeSznDJr6wIX8N9p
	 1k+XaSRUapNCR5ydOcaZYWvB5xrlUsbcozpFOBAkuBlHub+se1JrowoTcjMsaD0X3/
	 P/fFmQfvg72BJt/rGbZ+zw0CRDILUsBFvn0v6orbd0btZVRBG3RU5sKGidLy/8JVBJ
	 L+YhVk4Ly3IrIvOaenbnOD+A+050aISSty8gW57/ir0mIU2613IvWacSc+xD5yqhd6
	 /BJDq007YP/dA==
X-Gm-Message-State: AOAM532OD4K6IwQiJ9VT+cXn9djpDVtqeLYoNWu2p3/DgpZURiG8Mtue
	nFRorxGuX3//zfQ3RFPDCACuUemclDNvK2G8vCg=
X-Google-Smtp-Source: ABdhPJzxZc8w687pxH2LmPSV7dYykC6VTh9EkoLI+haqNIlqIR+pDgkNbYIhc7oJs7kjT+Fhxw5YwdO8nfXOfyXO4IQ=
X-Received: by 2002:a05:6870:b250:b0:de:afd3:e1c4 with SMTP id
 b16-20020a056870b25000b000deafd3e1c4mr1194577oam.128.1648216434518; Fri, 25
 Mar 2022 06:53:54 -0700 (PDT)
MIME-Version: 1.0
References: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
 <fb437a16517d343ba3432aa64b9e14b34630a750.1647970630.git.tamas.lengyel@intel.com>
 <Yj3Grwx3IZLnfEdt@Air-de-Roger>
In-Reply-To: <Yj3Grwx3IZLnfEdt@Air-de-Roger>
From: Tamas K Lengyel <tamas@tklengyel.com>
Date: Fri, 25 Mar 2022 09:53:18 -0400
X-Gmail-Original-Message-ID: <CABfawhmeUM77DEkpiTUVipqM29SP+WPhNmvVxbGUwrLBOjfkGw@mail.gmail.com>
Message-ID: <CABfawhmeUM77DEkpiTUVipqM29SP+WPhNmvVxbGUwrLBOjfkGw@mail.gmail.com>
Subject: Re: [PATCH 3/3] x86/mem_sharing: make fork_reset more configurable
To: =?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>, xen-devel@lists.xenproject.org, 
	Wei Liu <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>, Juergen Gross <JGross@suse.com>, 
	Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, 
	Jan Beulich <JBeulich@suse.com>, Julien Grall <julien@xen.org>, 
	Stefano Stabellini <sstabellini@kernel.org>, Alexandru Isaila <aisaila@bitdefender.com>, 
	Petre Pircalabu <ppircalabu@bitdefender.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Virus-Scanned: ClamAV using ClamSMTP

On Fri, Mar 25, 2022 at 9:42 AM Roger Pau Monn=C3=A9 <roger.pau@citrix.com>=
 wrote:
>
> On Tue, Mar 22, 2022 at 01:41:39PM -0400, Tamas K Lengyel wrote:
> > diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86/mm/mem_sharin=
g.c
> > index a21c781452..bfa6082f13 100644
> > --- a/xen/arch/x86/mm/mem_sharing.c
> > +++ b/xen/arch/x86/mm/mem_sharing.c
> > @@ -1892,15 +1892,19 @@ static int fork(struct domain *cd, struct domai=
n *d, uint16_t flags)
> >   * footprints the hypercall continuation should be implemented (or if =
this
> >   * feature needs to be become "stable").
> >   */
> > -static int mem_sharing_fork_reset(struct domain *d)
> > +int mem_sharing_fork_reset(struct domain *d, bool reset_state,
> > +                           bool reset_memory)
> >  {
> > -    int rc;
> > +    int rc =3D 0;
> >      struct domain *pd =3D d->parent;
> >      struct p2m_domain *p2m =3D p2m_get_hostp2m(d);
> >      struct page_info *page, *tmp;
> >
> >      domain_pause(d);
>
> I would assert that at least one of reset_sate or reset_memory is set
> here, as callers already do the checks.

Sure.

>
> >
> > +    if ( !reset_memory )
> > +        goto state;
>
> I don't like using labels and goto like this as I think it makes the
> code harder to follow, and so more likely to introduce bugs. I would
> rather place the memory reset parts inside of an if ( reset_memory ) {
> ... }, but that's my taste.

I did that first but because it requires shifting everything to the
right it requires odd line breaks.

>
> > +
> >      /* need recursive lock because we will free pages */
> >      spin_lock_recursive(&d->page_alloc_lock);
> >      page_list_for_each_safe(page, tmp, &d->page_list)
> > @@ -1933,7 +1937,9 @@ static int mem_sharing_fork_reset(struct domain *=
d)
> >      }
> >      spin_unlock_recursive(&d->page_alloc_lock);
> >
> > -    rc =3D copy_settings(d, pd, d->arch.hvm.mem_sharing.skip_special_p=
ages);
> > + state:
> > +    if ( reset_state )
> > +        rc =3D copy_settings(d, pd, d->arch.hvm.mem_sharing.skip_speci=
al_pages);
> >
> >      domain_unpause(d);
> >
> > @@ -2239,15 +2245,21 @@ int mem_sharing_memop(XEN_GUEST_HANDLE_PARAM(xe=
n_mem_sharing_op_t) arg)
> >
> >      case XENMEM_sharing_op_fork_reset:
> >      {
> > +        bool reset_state =3D mso.u.fork.flags & XENMEM_FORK_RESET_STAT=
E;
> > +        bool reset_memory =3D mso.u.fork.flags & XENMEM_FORK_RESET_MEM=
ORY;
> > +
> >          rc =3D -EINVAL;
> > -        if ( mso.u.fork.pad || mso.u.fork.flags )
> > +        if ( mso.u.fork.pad || (!reset_state && !reset_memory) )
> > +            goto out;
> > +        if ( mso.u.fork.flags &
> > +             ~(XENMEM_FORK_RESET_STATE | XENMEM_FORK_RESET_MEMORY) )
> >              goto out;
> >
> >          rc =3D -ENOSYS;
> >          if ( !d->parent )
> >              goto out;
> >
> > -        rc =3D mem_sharing_fork_reset(d);
> > +        rc =3D mem_sharing_fork_reset(d, reset_state, reset_memory);
> >          break;
> >      }
> >
> > diff --git a/xen/common/vm_event.c b/xen/common/vm_event.c
> > index 84cf52636b..a7b192be0d 100644
> > --- a/xen/common/vm_event.c
> > +++ b/xen/common/vm_event.c
> > @@ -28,6 +28,11 @@
> >  #include <asm/p2m.h>
> >  #include <asm/monitor.h>
> >  #include <asm/vm_event.h>
> > +
> > +#ifdef CONFIG_MEM_SHARING
> > +#include <asm/mem_sharing.h>
> > +#endif
> > +
> >  #include <xsm/xsm.h>
> >  #include <public/hvm/params.h>
> >
> > @@ -394,6 +399,15 @@ static int vm_event_resume(struct domain *d, struc=
t vm_event_domain *ved)
> >              if ( rsp.reason =3D=3D VM_EVENT_REASON_MEM_PAGING )
> >                  p2m_mem_paging_resume(d, &rsp);
> >  #endif
> > +#ifdef CONFIG_MEM_SHARING
> > +            do {
> > +                bool reset_state =3D rsp.flags & VM_EVENT_FLAG_RESET_F=
ORK_STATE;
> > +                bool reset_mem =3D rsp.flags & VM_EVENT_FLAG_RESET_FOR=
K_MEMORY;
> > +
> > +                if ( reset_state || reset_mem )
> > +                    mem_sharing_fork_reset(d, reset_state, reset_mem);
>
> You seem to drop the error code returned by mem_sharing_fork_reset.

Yes, there is no response that could be sent to the toolstack from
here. I could add an ASSERT that rc is 0 though. If the fork() op
successfully finished then fork_reset() couldn't reasonably end up in
a path where it fails.

>
> > +            } while(0);
> > +#endif
>
> I think you can avoid the do {} while(0); just using the braces will
> allow you to define local variables in the inner block.

Sure.

>
> >              /*
> >               * Check emulation flags in the arch-specific handler only=
, as it
> > diff --git a/xen/include/public/memory.h b/xen/include/public/memory.h
> > index 208d8dcbd9..30ce23c5a7 100644
> > --- a/xen/include/public/memory.h
> > +++ b/xen/include/public/memory.h
> > @@ -541,12 +541,14 @@ struct xen_mem_sharing_op {
> >                  uint32_t gref;     /* IN: gref to debug         */
> >              } u;
> >          } debug;
> > -        struct mem_sharing_op_fork {      /* OP_FORK */
> > +        struct mem_sharing_op_fork {      /* OP_FORK/_RESET */
> >              domid_t parent_domain;        /* IN: parent's domain id */
> >  /* These flags only makes sense for short-lived forks */
> >  #define XENMEM_FORK_WITH_IOMMU_ALLOWED (1u << 0)
> >  #define XENMEM_FORK_BLOCK_INTERRUPTS   (1u << 1)
> >  #define XENMEM_FORK_SKIP_SPECIAL_PAGES (1u << 2)
> > +#define XENMEM_FORK_RESET_STATE        (1u << 3)
> > +#define XENMEM_FORK_RESET_MEMORY       (1u << 4)
>
> For backward compatibility purposes should the flags be added
> backwards, ie:
>
> #define XENMEM_FORK_KEEP_STATE        (1u << 3)
> #define XENMEM_FORK_KEEP_MEMORY       (1u << 4)
>
> So that existing callers of XENMEM_sharing_op_fork_reset will continue
> working as expected?
>
> Or we don't care about that as the interface is protected with
> __XEN_TOOLS__?

I would say don't care, we are updating the only toolstack that uses
this in lock-step with Xen.

Tamas


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 13:56:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 13:56:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294754.501321 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkQI-000407-2s; Fri, 25 Mar 2022 13:56:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294754.501321; Fri, 25 Mar 2022 13:56:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkQI-000400-01; Fri, 25 Mar 2022 13:56:14 +0000
Received: by outflank-mailman (input) for mailman id 294754;
 Fri, 25 Mar 2022 13:56:12 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXkQG-0003zq-JO; Fri, 25 Mar 2022 13:56:12 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXkQG-0003Qj-He; Fri, 25 Mar 2022 13:56:12 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXkQG-0001Ft-6h; Fri, 25 Mar 2022 13:56:12 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXkQG-0006zK-65; Fri, 25 Mar 2022 13:56:12 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=glYDiCYmTjzBnobIGYjp81iauIkN5sOxcoifYesw504=; b=HvO2nk67pKVC/tOgvJ0zAzviqj
	lLwm5NH4SLV+dDD8wvs+dQGDCDncL6Dxy2DA3kK5qB1YA7zomthnORexN5hrLJLsgcR7/1/Z+V2+E
	0AkZwlvcPiXc0oBMsKyQUg6dw1ga6iMTsg2X6aes7ynUcvMFvz/sLoXm5CTUvQTvXHYw=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168844-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168844: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=69218d5d2854acaa7a11c777244de4a297d2fbb9
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 25 Mar 2022 13:56:12 +0000

flight 168844 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168844/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 69218d5d2854acaa7a11c777244de4a297d2fbb9
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   25 days
Failing since        168258  2022-03-01 01:55:31 Z   24 days  252 attempts
Testing same since   168832  2022-03-25 01:43:21 Z    0 days    4 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Mara Sophie Grosch <littlefox@lf-net.org>
  Mara Sophie Grosch via groups.io <littlefox=lf-net.org@groups.io>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 904 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 14:05:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 14:05:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294762.501344 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkZW-0005sq-DR; Fri, 25 Mar 2022 14:05:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294762.501344; Fri, 25 Mar 2022 14:05:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkZW-0005sj-AB; Fri, 25 Mar 2022 14:05:46 +0000
Received: by outflank-mailman (input) for mailman id 294762;
 Fri, 25 Mar 2022 14:05:45 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+r7I=UE=citrix.com=prvs=076f4df05=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nXkZU-0005rQ-Ur
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 14:05:45 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a6b0a1f0-ac44-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 15:05:41 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a6b0a1f0-ac44-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648217140;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=edYyeS72PhfZ6v0flBZ8h6zYD7zZUNINVTn5poqERww=;
  b=W5xUDz71UK9vin4A1mLTQWx9ZVbJb3SGRHqt1MhBQi1ecWStbvvUXh2y
   ta9xp1BGvlNaR5rj++Qr9VGd0tGodzo7mBV8M5teDzkB3VKQ82kYz5ATP
   rScrg81m7ZeIsk8GyJIm5vs6v5zeLXQaQp6VW/squFC6f1bTnpz6XVCpz
   4=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 69555818
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:8oMVya8ZWqvpyBmczWDHDrUDj36TJUtcMsCJ2f8bNWPcYEJGY0x3m
 GEWWWyOPauPazb0e99wat/jpEgFvMWHyIMwTwA+rHs8E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oLkW1nlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnbXrGCB0Y63dpL82ECZyIhF1FqAZw7CSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFJkYtXx6iynQEN4tQIzZQrWM7thdtNs1rp4fQKuDN
 5NJAdZpRDfSQDsUJ0otNKIjkb6UuHPvTGBCtGvA8MLb5ECMlVcsgdABKuH9eduMX8xZ2FmZo
 mHu+H7wCRUXcteYzFKt4n+qw+PCgy7/cIYTD6GjsO5nhkWJwW4eAwFQUkG0ycRVkWbnBYgZc
 RZNvHNz8+5iryRHU+URQTWR+y+j40McSuYLOK4FwjC9wYHZvD2WUz1soiF6VPQqs8o/RDoP3
 1CPns/0CTEHjIB5WU5x5Z/P82rsZHF9wXsqIHZdEFBbu4WLTJQb1Eqnczp1LEKiYjQZ8xnUy
 ivCkiUxjq57YSUjh/TipgCvb95BS/H0ou8JCuf/AzrNAuBRPtfNi2mUBb7ztKcowGGxFAXpg
 ZT8s5LChN3i9LnU/MB3fM0DHauy+9GOOyDGjFhkEvEJrmrxqyf+IN0OsWokfy+F1/ronxewM
 Sc/XisLufdu0IaCN/crM+pd9ex0pUQfKTgVfq+NNYcfCnSAXASG4DtvdSatM5PFyyARfVUEE
 c7DK66EVC9CYYw+lWbeb7pNgNcDm3FlrUuOFM+T8vhS+efHDJJjYexeawXmgyFQxP7snTg5B
 P4DaJrQl0QOCrGWj+u+2dd7EG3m5EMTXPjeg8dWavSCMkxhHmQgAOXW2rQvZ8pumKE9qwsC1
 ivVtpNwoLYnuUD6FA==
IronPort-HdrOrdr: A9a23:rH3Y/KzSrehI68NbJoa7KrPwT71zdoMgy1knxilNoH1uEvBw8v
 rEoB1173LJYVoqMk3I+urgBED/exzhHPdOiOEs1NyZMDUO1lHHEL1f
X-IronPort-AV: E=Sophos;i="5.90,209,1643691600"; 
   d="scan'208";a="69555818"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=A5ohlRKGmXmU7Y686SxHq1wIFuqjZNV9T8XYd3aC2ezLVGg0KrwNoCoVYovpe+3WiVeBueuPsQ8Xhx6oh0YTMcEdR/76KzIlZyYGnMhj3b8bYMSngynrK2KwM7dqS3SPnxNvN0Qy6ih344lMcMlWfxZarmvVg2ZOfSScazpPgwB8U8lmeN4/hKIgQp317lixHKsUfOQjJu3e7sbOKxLWtv8IixjS0+AAU6rVRBROeWn7UVTSl7bG5ktsPGfczYu4NBnHR15ZXh+89Uc1CEhucyS1/4yK6q0IB2EX7aOSZX/EHUZCMcPYoqOoEimcv6KsoS1Hg6AFBx8CJdOMl0LdlA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=gC6EtQXmTr4vaY/nIowHOx+tpWpQqzUShU1wYIXc9qA=;
 b=Eor54+OTfPH6997FjyF2HZtITpKV8SAXvWUiGkrL2BgxnR0jLp7DO9agJwI9kkcudPvNUc3KL9I3YZJG3JgzvEWGospmdmHywwP0yDAYQSCHX8OmRPphXtrkP76PLxnZbOdc5q6/Dtve1MuFShX43VA6q4H7sUH93kb6PSPx8p8uw8TaTaSiZZ4oZfB3HLTbJsMs58JzJHM9POH7phl3uMAkqOOX0oVz/lq34HxAtqgUb02t4KBBe6t7yM/oYrx9Jldn3gciRIbz/5OFJRxwTHnSZUyVZba9HIuHfMbGcw93ktvU7Hq7rbs8+J+6pWgdaQSjNpfZSsg0o91sDZskQw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=gC6EtQXmTr4vaY/nIowHOx+tpWpQqzUShU1wYIXc9qA=;
 b=Oy4taRJjBTP7nNUY0kC81tO7KKDK3EZxvxmfcm/l/x2YSdmvpDpZUlebmfhU8zJt7W1MwgQG/7ZNBRvtorqKIRJds44NSxYsdJHf8HEe+WzmccD6Bv/stw41PSdUWXiy42KiGxEt00TOLfdrYlchYxaLqblyuMQQAjfkSRPTIzU=
Date: Fri, 25 Mar 2022 15:05:30 +0100
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Roger Pau Monne <roger.pau@citrix.com>
CC: <xen-devel@lists.xenproject.org>, Konrad Rzeszutek Wilk
	<konrad.wilk@oracle.com>, Ross Lagerwall <ross.lagerwall@citrix.com>
Subject: Re: [PATCH 1/2] livepatch: do not ignore sections with 0 size
Message-ID: <Yj3MKvqpqRUd2nIS@Air-de-Roger>
References: <20220317110854.39050-1-roger.pau@citrix.com>
 <20220317110854.39050-2-roger.pau@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <20220317110854.39050-2-roger.pau@citrix.com>
X-ClientProxiedBy: LNXP265CA0033.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:5c::21) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 1df07f24-5069-45a8-dcc6-08da0e6888a9
X-MS-TrafficTypeDiagnostic: CO1PR03MB5858:EE_
X-Microsoft-Antispam-PRVS: <CO1PR03MB58580F0E273B339E8A6EE56E8F1A9@CO1PR03MB5858.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(6862004)(6666004)(5660300002)(66946007)(66476007)(26005)(6512007)(186003)(107886003)(8936002)(9686003)(66556008)(508600001)(6486002)(82960400001)(6506007)(38100700002)(8676002)(316002)(86362001)(4326008)(54906003)(85182001)(2906002)(83380400001)(6200100001)(33716001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?M3ZFc2NRdFViejVpM3AwbTg4ZlFoRVpSS29ITFk5UnlaM1hUczQweVpHVFBH?=
 =?utf-8?B?Nk9ISVRRUDV2NUpWS29zK3doeTdLbjhtN2tCTW1ndHRVcDdFZUtoL0ZXRmll?=
 =?utf-8?B?ZGhNeVVRVFVxQ3VDZ0R3Tjhvdzhsc2llVTdKMk9IdklCWmhBa1FucU5MVXhv?=
 =?utf-8?B?SHI1b0ROZFp5b1FGcmpSRDJmM0FMSU9abTVIV0VmZGlZWEIwNUdjSFllNEVj?=
 =?utf-8?B?dHB2ZXp4ZVRJOEhGSUk4MW56M2FnQ3N0aXRvaVRqMy9yWWtPZFNWRXhGeCt5?=
 =?utf-8?B?Z3dKMi9SOHQwR0RGZjVON1NONU54QmtuSzhkcHRzZUtsejQ0dHVHanFEa0FN?=
 =?utf-8?B?dkRZM3RFcWw3cmFDby94SEpDOGtNRUNldFRWRzlLd2tzSjBIOWVWSFlqdlpk?=
 =?utf-8?B?c3pxVGpYV2VYNytIRStsY2RGdUxIRmhHaHpXWElObmJmTTFiak1jVVM1VmZz?=
 =?utf-8?B?ZlN0dlFaZ0tZbmZ5Wk02TSs3WXdDQmMvZUx4Q0xvczgyYmFub09lbnRnS2Vx?=
 =?utf-8?B?TVNxa3I3UkU0TmJHVE9lSGxJV21EZUx5T2JxcE9rclNvOXNMT3oxTnRtMGJa?=
 =?utf-8?B?SnJTZnZDTklDN3NER1d1bjBhdllTSGVndENjTE9uVG1SYjd2Y09wa1BDMTM2?=
 =?utf-8?B?SzFNVDhpK2h2WVRnSzh6QTh6WTdsWVF4U0RjOGpab3IvcEZ1ak43RkV5SC9J?=
 =?utf-8?B?QkhUeTU5eU14TGVVekFhOWkwZmJpRU9QQmt3R2UzcDV0SEYzekRCNUNZV0JO?=
 =?utf-8?B?TVJtVjBLbEc4c1c5V3VOdXA2cm00S1hIMldKZXNvYVZoMFJ4L0tmdnc5MWc2?=
 =?utf-8?B?ZTkxWjFreUgwSlY0Tk1Nb3NKQ0g2czVkNXZtV1dYRkRKeHRhVytzdG9iYTZD?=
 =?utf-8?B?eHoyZnV2VlNST3JwYy9IY0pHZHhJS0s4cjhWc3VjUVhOSkJ2cTNtd1dzWXg5?=
 =?utf-8?B?SDVLSlBKNjhUWDJKLzJtSkNhcU1OeXlmYzN3cWE4bWxyKzJYUHh0TVBUQXMw?=
 =?utf-8?B?ajlSa043WjRoSmIxMkRQNGUxbVhRc3NxUDlOYXBzekl4NnJOcndZR3k2UUV4?=
 =?utf-8?B?OGNIUWlNZi8xV2tQM2ZPSWk0c1UrTWw5YmsrYkQ3dWdDME1BU3JieWd3RUZx?=
 =?utf-8?B?amorYmpFMXNHN1d4WEorcXovT3RjemVCeWtaM2VQOVJIYzZILzZaQXFRbzdw?=
 =?utf-8?B?UXNWUU9NdTRRVDNSNjhzRWdaVWlDNVZDZUpmTHhMalJFWU8vVklwVlBERmRG?=
 =?utf-8?B?alUwRk9hTlhwMnVHREhnK1NKZDZJTXp0M3RySklkd2JocDVaOXVLWm13b2tQ?=
 =?utf-8?B?bW1EanFsUlFHaVVUU1VFUHM4V0dzYUtxUWRiWDZ5YTBtQ2Y3ek5zaGEzamha?=
 =?utf-8?B?REV3Z0xMNnIxT1FFWTFiMitlMTIyWkVENWpxNjlHNWxrSSt3WS9UMjZZUENS?=
 =?utf-8?B?bFpXYXJ2UVJIRGNKK3B5TllZSGpXQjZDNElIeHJzU0VVcE5VVWhjbDJrczYv?=
 =?utf-8?B?U1p5R3pCb3NyczNZbk55YWxxRU0vOFFqMEptdThuZ2V1dXJHd3BDaVQ2eThD?=
 =?utf-8?B?bk81M1hrSFhsbjNhUThMVUdoLzJna2tROTlDa1N0NVh1VE5sRFNha1NycmhE?=
 =?utf-8?B?dEhzUGdBdVZHVzhITVM0MjJCK2FMaXE4TmVOcHpGM2d2WnVYcXRKcXhOUENk?=
 =?utf-8?B?SVRIM2tPQmo1bUFIbnNmcmppM2lpUHQxL1k2eTVzNkF1S3JCeHhTcUFFS0Y4?=
 =?utf-8?B?WGdkQlhxWklaWU5wOXNoNUpXNUkzaytrUi9EYUpSSm9jSFp6TG9FZXU4dlZs?=
 =?utf-8?B?bmJiTVVPcDJuR1owV01IQ282N3BvRUtIK2xSL2FiVkpDNUc5Y0UvLzZ4TFZM?=
 =?utf-8?B?ZVN6UlFTc1NtUk5MeEVoaitrdGloYWRMblY2c0JYL2ZDeVBvM0gzcDVjWGtW?=
 =?utf-8?B?Zmlaa2RscVAxaCsvS2luNTZOVXZUNW53MHU5eVl3bENxZXozT1dCOWNtbVEx?=
 =?utf-8?B?WGExb1htY1hrdEVSU1pTRGNZdURZS2VaaE5aczlWNWNrN01qS0RzLzdyWUlJ?=
 =?utf-8?B?MDEyQlZBTWU2RW1rcnFjYjVLUVpSczIremczOFUxbXlMT2krUzd2RzVIV2Jm?=
 =?utf-8?B?NlY0a1lKNjM1b0hYUGhNVXdMeWl6UzJJck5wRHB0SjNOSERXbkhsdXZ3OG9H?=
 =?utf-8?B?ZCtJdTZVL05YOFljMnpYZnN5YkZrOGRMWkxoOGdrVGJ4cDdJS1g5UHpuRXhD?=
 =?utf-8?B?SlVaSHFMUUJuNnVhSk8rMjJCQ0pHTEE1eUtFaXJpNU1HSEVQZGNMZnAwR2wy?=
 =?utf-8?B?b2p3aUNpQXoxYUVCQlo1dFMyMEZnbVdvU2x0V0ZpK1BqVjZqWnZMVWFUVmZk?=
 =?utf-8?Q?95NcYsb7CwxsS2TQ=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 1df07f24-5069-45a8-dcc6-08da0e6888a9
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 14:05:36.1379
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: ZzLpZ+faEM8CyFd3AEyUWRleLBr6G7L9UqVxktuM0TJ1iHW0Kb5uw8AljUfzNB8/6RcbCDkWo2HxT/Xv9UVHaw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR03MB5858
X-OriginatorOrg: citrix.com

Ping?

There was some discussion on whether we need to handle such empty
sections, but I think we settled that it's necessary.

Thanks, Roger.

On Thu, Mar 17, 2022 at 12:08:53PM +0100, Roger Pau Monne wrote:
> A side effect of ignoring such sections is that symbols belonging to
> them won't be resolved, and that could make relocations belonging to
> other sections that reference those symbols fail.
> 
> For example it's likely to have an empty .altinstr_replacement with
> symbols pointing to it, and marking the section as ignored will
> prevent the symbols from being resolved, which in turn will cause any
> relocations against them to fail.
> 
> In order to solve this do not ignore sections with 0 size, only ignore
> sections that don't have the SHF_ALLOC flag set.
> 
> Special case such empty sections in move_payload so they are not taken
> into account in order to decide whether a livepatch can be safely
> re-applied after a revert.
> 
> Fixes: 98b728a7b2 ('livepatch: Disallow applying after an revert')
> Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
> ---
>  xen/common/livepatch.c          | 16 +++++++++++-----
>  xen/include/xen/livepatch_elf.h |  2 +-
>  2 files changed, 12 insertions(+), 6 deletions(-)
> 
> diff --git a/xen/common/livepatch.c b/xen/common/livepatch.c
> index be2cf75c2d..abc1cae136 100644
> --- a/xen/common/livepatch.c
> +++ b/xen/common/livepatch.c
> @@ -300,9 +300,6 @@ static int move_payload(struct payload *payload, struct livepatch_elf *elf)
>           * and .shstrtab. For the non-relocate we allocate and copy these
>           * via other means - and the .rel we can ignore as we only use it
>           * once during loading.
> -         *
> -         * Also ignore sections with zero size. Those can be for example:
> -         * data, or .bss.
>           */
>          if ( livepatch_elf_ignore_section(elf->sec[i].sec) )
>              offset[i] = UINT_MAX;
> @@ -361,8 +358,17 @@ static int move_payload(struct payload *payload, struct livepatch_elf *elf)
>              else if ( elf->sec[i].sec->sh_flags & SHF_WRITE )
>              {
>                  buf = rw_buf;
> -                rw_buf_sec = i;
> -                rw_buf_cnt++;
> +                if ( elf->sec[i].sec->sh_size )
> +                {
> +                    /*
> +                     * Special handling of RW empty regions: do not account for
> +                     * them in order to decide whether a patch can safely be
> +                     * re-applied, but assign them a load address so symbol
> +                     * resolution and relocations work.
> +                     */
> +                    rw_buf_sec = i;
> +                    rw_buf_cnt++;
> +                }
>              }
>              else
>                  buf = ro_buf;
> diff --git a/xen/include/xen/livepatch_elf.h b/xen/include/xen/livepatch_elf.h
> index 9ad499ee8b..5b1ec469da 100644
> --- a/xen/include/xen/livepatch_elf.h
> +++ b/xen/include/xen/livepatch_elf.h
> @@ -48,7 +48,7 @@ int livepatch_elf_perform_relocs(struct livepatch_elf *elf);
>  
>  static inline bool livepatch_elf_ignore_section(const Elf_Shdr *sec)
>  {
> -    return !(sec->sh_flags & SHF_ALLOC) || sec->sh_size == 0;
> +    return !(sec->sh_flags & SHF_ALLOC);
>  }
>  #endif /* __XEN_LIVEPATCH_ELF_H__ */
>  
> -- 
> 2.34.1
> 


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 14:05:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 14:05:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294761.501333 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkZO-0005ZS-1m; Fri, 25 Mar 2022 14:05:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294761.501333; Fri, 25 Mar 2022 14:05:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkZN-0005ZL-UV; Fri, 25 Mar 2022 14:05:37 +0000
Received: by outflank-mailman (input) for mailman id 294761;
 Fri, 25 Mar 2022 14:05:37 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wXB3=UE=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nXkZM-0005ZF-VF
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 14:05:37 +0000
Received: from EUR03-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur03on060e.outbound.protection.outlook.com
 [2a01:111:f400:fe0a::60e])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a38a6b9a-ac44-11ec-a405-831a346695d4;
 Fri, 25 Mar 2022 15:05:35 +0100 (CET)
Received: from AS9PR06CA0326.eurprd06.prod.outlook.com (2603:10a6:20b:45b::34)
 by AM9PR08MB7029.eurprd08.prod.outlook.com (2603:10a6:20b:41b::19)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Fri, 25 Mar
 2022 14:05:33 +0000
Received: from AM5EUR03FT032.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:45b:cafe::23) by AS9PR06CA0326.outlook.office365.com
 (2603:10a6:20b:45b::34) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.16 via Frontend
 Transport; Fri, 25 Mar 2022 14:05:33 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT032.mail.protection.outlook.com (10.152.16.84) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Fri, 25 Mar 2022 14:05:31 +0000
Received: ("Tessian outbound 18e50a6f0513:v113");
 Fri, 25 Mar 2022 14:05:31 +0000
Received: from 4e9673fb3536.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 7668326C-0084-48C2-8F65-4F0C86A41CEA.1; 
 Fri, 25 Mar 2022 14:05:24 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 4e9673fb3536.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 25 Mar 2022 14:05:24 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com (2603:10a6:20b:85::25)
 by AM6PR08MB3142.eurprd08.prod.outlook.com (2603:10a6:209:46::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17; Fri, 25 Mar
 2022 14:05:14 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62]) by AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62%3]) with mapi id 15.20.5102.018; Fri, 25 Mar 2022
 14:05:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a38a6b9a-ac44-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=MdrAH/r/lnBHbpj1qhbXoZNyN3EtE9DsB6P6ChyZ0xE=;
 b=v3D+oZAUGZDiAADPPehwbV9quoJUzNjsSx8N+Dx30hwWDTPD3qjO3QjhrW1/1P9JoeJc5kBBI6S/TkduFGz8I7YLxeGrrt+QGzKeP6vqSAorijv0TwSDXZrluC3d+ITJSmQfMyG4FusUC+NSWhoHh+pFRT4em7WdxDC+uP13am8=
X-MS-Exchange-Authentication-Results: spf=temperror (sender IP is
 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=temperror action=none
 header.from=arm.com;
Received-SPF: TempError (protection.outlook.com: error in processing during
 lookup of arm.com: DNS Timeout)
X-CheckRecipientChecked: true
X-CR-MTA-CID: 88ce6799eba9be52
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=l4BHqKIcq3UZYFGWZO/3KkBrFdLyxSRRTigxdBvzLE/u8ptUT6cG35Uoc0a72rQwfmY3gmQSwSjklhP+p3rNvCuZpxYMlG6N7NzlNs2URdeL1FdKVoiuium9YZnTZYoAyk7jGezPuLvuQvjEkibKOb0bWHK7oAHFujVtNmybe4x9wVmXxM4K/VplU/2qTSV9IMTamQO9pfMG7TTTiFKZHgZ8EvqR//g/Yhh8LXcSSKtxeQoJaI7pspDBCCws+pkGiIgMn8wjCh2oAIboN99RQG984HoMNj/hja9iKBnojEnjZS74JJCazPBhUZRob2x4QKnQADtibA8iPo+frf0UkQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=MdrAH/r/lnBHbpj1qhbXoZNyN3EtE9DsB6P6ChyZ0xE=;
 b=d/K0OIvq2/TcNDERuAIuocAUBvWASwKIIaLHHvWFijBWawrUq+WTP8ZKzBz45XrT9UkocI1QDx81Gmznr522hhcl6wx+J4WnjjodgT4qA0kBD3IzwH/12IqhpFaY02s/GrMjZBByfDNGjEojs5UntcacRAL85OHaB5rieKbAnmKlgp5ZsFFp83bRBrAneN2eqDVVVD7czEDtfYRpZ+SX9Rw4mdpof+NnyEcM884/SNh09BVPWAhY17vt1Wq+iOkhM3UcMtCq50ap1ZUJvwffpmX3439u525HMdr30ua9po7mlR65uIrGOtYdy4csxgkB20l0PA7QkuaVdu0faRjvpA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=MdrAH/r/lnBHbpj1qhbXoZNyN3EtE9DsB6P6ChyZ0xE=;
 b=v3D+oZAUGZDiAADPPehwbV9quoJUzNjsSx8N+Dx30hwWDTPD3qjO3QjhrW1/1P9JoeJc5kBBI6S/TkduFGz8I7YLxeGrrt+QGzKeP6vqSAorijv0TwSDXZrluC3d+ITJSmQfMyG4FusUC+NSWhoHh+pFRT4em7WdxDC+uP13am8=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Julien Grall <julien@xen.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	"marco.solieri@minervasys.tech" <marco.solieri@minervasys.tech>,
	"lucmiccio@gmail.com" <lucmiccio@gmail.com>, Julien Grall
	<jgrall@amazon.com>, Stefano Stabellini <sstabellini@kernel.org>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH early-RFC 2/5] xen/arm64: Rework the memory layout
Thread-Topic: [PATCH early-RFC 2/5] xen/arm64: Rework the memory layout
Thread-Index: AQHYM6fehqIqx7byxEaDRoW/6LbtaqzQLgwAgAAFFgCAAAg+AA==
Date: Fri, 25 Mar 2022 14:05:13 +0000
Message-ID: <4384DB81-5692-4F04-AA21-387B11A88C6E@arm.com>
References: <20220309112048.17377-1-julien@xen.org>
 <20220309112048.17377-3-julien@xen.org>
 <DE3C6104-82AD-41AE-BDAA-0074A08DDECF@arm.com>
 <cf150c85-34cb-73fb-9808-0338de546271@xen.org>
In-Reply-To: <cf150c85-34cb-73fb-9808-0338de546271@xen.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 16733236-cb6e-4541-edae-08da0e68865d
x-ms-traffictypediagnostic:
	AM6PR08MB3142:EE_|AM5EUR03FT032:EE_|AM9PR08MB7029:EE_
X-Microsoft-Antispam-PRVS:
	<AM9PR08MB702967F45117ED9AF6D402FB9D1A9@AM9PR08MB7029.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR08MB3784.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(38070700005)(8676002)(33656002)(6486002)(26005)(66946007)(66556008)(66446008)(4326008)(186003)(66476007)(76116006)(8936002)(64756008)(36756003)(83380400001)(91956017)(122000001)(2616005)(5660300002)(38100700002)(316002)(6512007)(6916009)(6506007)(2906002)(54906003)(53546011)(508600001)(71200400001)(86362001)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <7CBDA200420F774992FB82F996ADC86D@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB3142
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT032.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	65a5afb4-7bd8-4267-64b1-08da0e687b71
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(508600001)(53546011)(6512007)(336012)(54906003)(26005)(6486002)(6506007)(63350400001)(316002)(70206006)(6862004)(40460700003)(8676002)(4326008)(47076005)(70586007)(33656002)(36860700001)(36756003)(63370400001)(83380400001)(81166007)(8936002)(356005)(2906002)(82310400004)(2616005)(107886003)(186003)(86362001)(5660300002)(45980500001);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 14:05:31.9099
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 16733236-cb6e-4541-edae-08da0e68865d
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT032.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR08MB7029
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From xen-devel-bounces@lists.xenproject.org Fri Mar 25 14:10:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 14:10:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294770.501355 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkeB-0007h5-1F; Fri, 25 Mar 2022 14:10:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294770.501355; Fri, 25 Mar 2022 14:10:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkeA-0007gy-UJ; Fri, 25 Mar 2022 14:10:34 +0000
Received: by outflank-mailman (input) for mailman id 294770;
 Fri, 25 Mar 2022 14:10:33 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=73hT=UE=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nXke9-0007gs-DC
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 14:10:33 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 54f81e57-ac45-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 15:10:32 +0100 (CET)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2110.outbound.protection.outlook.com [104.47.18.110]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-5-Hor0Mtk4OpOnBPqGt5jySQ-1; Fri, 25 Mar 2022 15:10:29 +0100
Received: from AS8PR04MB8609.eurprd04.prod.outlook.com (2603:10a6:20b:424::9)
 by DB8PR04MB6363.eurprd04.prod.outlook.com (2603:10a6:10:3d::14) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.18; Fri, 25 Mar
 2022 14:10:27 +0000
Received: from AS8PR04MB8609.eurprd04.prod.outlook.com
 ([fe80::5413:50c3:f5e8:d90f]) by AS8PR04MB8609.eurprd04.prod.outlook.com
 ([fe80::5413:50c3:f5e8:d90f%9]) with mapi id 15.20.5102.018; Fri, 25 Mar 2022
 14:10:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 54f81e57-ac45-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648217431;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=yaNnS2n/i0Q3uNjcxUqxb/chRzneWFMAJAx8oPLdlq0=;
	b=ZFszm2B91rXil7tqGtSeleqPc1rlum2oBIfnEywCFaORYQPP2zHu/8hE6hdR1RUtyiFrWc
	iyQEOVOIYXqJpEhVabAzkQLOgfhb04nxbmHlBEw+VAzy03gDegmrp5ADoA6/wsj6YQmVl4
	bG363D7iybHLSf0RpAVY0iZYMamkQJ0=
X-MC-Unique: Hor0Mtk4OpOnBPqGt5jySQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=jTiZfKLdHqh4JJpXWOdbw5wvlwW5rejaLn0vfdNL74UHNrWD6LaWQyd67CETFcACD4ZvBP2AFE0GBMOiJWkaJS+tkmbGKrGfzYPdNTTMkW123yBhXPJ6cGCg4IOnNc/O5WlYvWd72auZwHZDab7ddBjYENR05JXSqtiDgJABGny5EWcgltyVP/NfCYa2XiLJO/83qVuqU6PnBLNdQCAcgXn6p2T3ZqaPpuOuCiB8YdQzZ3sdIdL7tP+1A7HnB6QP5J7Lppvx+D+W53YuWyChgsObwOrJmkGx4iQcDHjmR//FU3zQZOEMwyZlrcKQvBmADlLiQm1J95nVkqetFO9YuQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=yaNnS2n/i0Q3uNjcxUqxb/chRzneWFMAJAx8oPLdlq0=;
 b=TQqd17WmD5gSRkaUtBgbKynSv7gYuUp+JA8ZjQHSmDg2+IqS833Bu0ng/7QcEPOaFBu5SmNom+e0w7MHOgfeZZXV8I+0NxemmJvQY+HaQxaW4zJxtp+3WQSHLAU8v6F29Jlo4mdZirMsyMGNElOwvwCU9Mt1A8IynTIuPHZIyQGz95m3TVjgja6pjrE1ct/JEPRUu27/Sz10c4zP95zHUtkJQLLvAvvywomFEdT7c/w4Q/LU32p7zzhl+AHH0wcKFVPU3g7XkjYY1mMUf2UNKbLBMBZepcYM0o0x1Br5RNGLBbNvCNQ1fVS4acgYFcBcsSP6m/LGjY0NKtQAo0OaIA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <d9378506-1686-169a-0eb0-0076910e98bb@suse.com>
Date: Fri, 25 Mar 2022 15:10:25 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [RFC PATCH] xen/build: Add cppcheck and cppcheck-html make rules
Content-Language: en-US
To: Bertrand Marquis <Bertrand.Marquis@arm.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Michal Orzel <Michal.Orzel@arm.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <77c79e86050eef2b706ee11e64183d57a0f5bcee.1648119732.git.bertrand.marquis@arm.com>
 <d797474e-97c0-7545-c68f-1378a3b2fbd9@suse.com>
 <E6DE6BBA-EBA6-4279-A79D-22942D6F5840@arm.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <E6DE6BBA-EBA6-4279-A79D-22942D6F5840@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR04CA0082.eurprd04.prod.outlook.com
 (2603:10a6:20b:48b::6) To AS8PR04MB8609.eurprd04.prod.outlook.com
 (2603:10a6:20b:424::9)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5e5b34b2-bcdd-45fe-8cd3-08da0e693668
X-MS-TrafficTypeDiagnostic: DB8PR04MB6363:EE_
X-Microsoft-Antispam-PRVS:
	<DB8PR04MB63634964260E3014C655218DB31A9@DB8PR04MB6363.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AS8PR04MB8609.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(186003)(26005)(6506007)(6486002)(6512007)(2616005)(66946007)(53546011)(38100700002)(66476007)(508600001)(66556008)(86362001)(6916009)(316002)(54906003)(8936002)(2906002)(36756003)(31686004)(8676002)(5660300002)(31696002)(4326008)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?SDlYV00wN01yV2NhMngrTFQzTkxXUkZxcTRjeGkwaVFHRW9yNWRzOU1lQWV5?=
 =?utf-8?B?QTdhQmhKcFA3L0grZG0vRy9NNEFIanJTYnFaa2RtVEZ5TGVaVUU5b1dhWVEw?=
 =?utf-8?B?bXJNRmNMWGI0MEEwVzNsaklWRktPUFpEc29uUUcrTlRDZlNTSk9tUkVBVGdu?=
 =?utf-8?B?RlN5dUFuVmxJd2VXQXZwRVp2bERlajB4bXdsRmZGZXh6bEgvY2JQTzBKa3R1?=
 =?utf-8?B?VFhxaXN3RXo3NTVQekEwdDFEVS90NUgxendySFNzRW51UXNjSVQ3YlJJVlZN?=
 =?utf-8?B?SURiZEQzRklDSUg3eHNKR0w5czRLbnNRei94U2E4b01zSmswbmQ2a3ZBNzR4?=
 =?utf-8?B?aGJXT0NBSEVDN0dSY3pBY0lhS2dEYmxBcGxVdmErZVRoOWREaWVmQjh3NnVQ?=
 =?utf-8?B?SjlMSU94eEoycVJTZllwbWpVamlEcG14azR6ZmNQWmY4L0R4S0lRakptQ1lV?=
 =?utf-8?B?Q2o2VDR0SW1pUFN2NU1JZHBpdmpOR1Rkb1ZDdGJvOGcwTDI1cnpUMjZ5b2tn?=
 =?utf-8?B?SmtOYWdSbTlUejBmdkZQMWprU1I0Y1d4QTVLQ3Yyc0tIYkl4ZTExaitUalJ3?=
 =?utf-8?B?V2RPMGZINnpmWmhWYU8zSjBzUHhBeDV3TDNPUmJsdm4vekthR2EyS2RGZ1lk?=
 =?utf-8?B?V2lvSFAxZkRSYkJrK0Nma3AyQ0k1ZmtrRGxGUC90UktVa3ZKc1pBRlloRWpL?=
 =?utf-8?B?RWZLcVNvS2EyaGN4MU9FVG1xNXJXcTZ4aWZmTHZSd1RFa1k5cDdaWkJwak9o?=
 =?utf-8?B?OVdLMWtsYkpNcnRSVklZTGp6RHBZY21sTExpa3pML1l1dDg2UzZibVFmWEpN?=
 =?utf-8?B?QkMrNXczbkxjZ2ZFc084R3YycDdsU2tIM1dTamgwSzN4Rk5tRVJLVkRLTURW?=
 =?utf-8?B?UTJtcWE3RVp0a1J3amFXMUdXVy9wUVljWUY3SU9BTXhWSlpZci9HcWxBQ09C?=
 =?utf-8?B?dmtIcVUvR2xkVnhRWDE4YnNYS1NDYWs5aFFDdjV5dDhzMGZqK2lZdGxYcmpx?=
 =?utf-8?B?NHFLMHJaRzQrbURuc24yQ0ZDMFdlaUgvSFZjbk5VbkZmU0ZscS81TDBsTTc0?=
 =?utf-8?B?ZDJWaHpaWS8zZ1NrK0RnbHRIKzd1bHJocEJMNE5rZWduaXJmYjhMRXlkZnFU?=
 =?utf-8?B?aHZMSW9nWXpqVnAxN1JoK2Q5c004Q3JCeFkzdGRXMHdYRkcxd3VMcUNnckU0?=
 =?utf-8?B?eTFCTGQvNVpuUFA5RG4zWnEyeXovQjF4SERBcFJjU2lnMVlCNmRPVHFDZTdB?=
 =?utf-8?B?MGRXQmYya3BaeGZ0VlVsS25kbFlTVjBSb0ZxTTgvdEFiV3l2MmVIS2FZK3Jp?=
 =?utf-8?B?eEt2eWcxWU1zSmtnTEhPN1hvY2MvcGJDdHJrNWFYRHFTaTc0dHZFNFFzbHlE?=
 =?utf-8?B?cTRRaVVtWXBubHJCUGtXcWdEZWtDQ0NOMUFUQ3ZxdUJGY3lnc1JBbXZtbXF4?=
 =?utf-8?B?LzNONXVmL1c4VTJXQS9JcGVsTS9XT0Z2bmdJWlhiY09KR1ZsbG9tZHI3a3E5?=
 =?utf-8?B?K1NYS2tyK3JDNDJEclU0bFlwRWRBaHFaeVdDM1JCOHFRblBMeXhTcXVVblpt?=
 =?utf-8?B?RElKS2ZPempzdXp4TWsvbXF2ZkZmdUtOdTVsRm11bXF6WEtXL1cwZ0YxUWNN?=
 =?utf-8?B?Z3RIRkFOZk1HRkJtV0NpSUVlNW5ETGREeVV4d0NRSmNvZUl6aS8zUVBDZ3dN?=
 =?utf-8?B?bFRkYUJqSzRqSmoxSkxLblhBMzlEcVFYczk2NWhmY2lWOWVXYXR1ZlJ5aWtR?=
 =?utf-8?B?cG84Mlh3RWh3S2M2ZlpwK3VXWWNVZmJQa2pkRFhhK2Rkd0hxOGF3dkJ5M1RH?=
 =?utf-8?B?U0dUM3FaMUh0S1Z2L2pQRnErVkpGOGMremUxck1ZL0YvaE9yZDRyREVzbVR5?=
 =?utf-8?B?NUc1M2E2K0FWYUZnY3VqVHdLMmpMZmU1SW42c3owSGVVWGljTi8wU2RSMVhN?=
 =?utf-8?B?ZnR1azNIQUtaKzRvSFlmeHpEdXl0M1dHWUtjQmlwY0xoanZhUE96UFV4VkhN?=
 =?utf-8?B?UFdtNGxNR3ZzNndIbytXd244d3pNZG5QZWV6aU8rWC95aWROVk14a0xtSEs5?=
 =?utf-8?B?OTRtSDl6KzFob2htSjJ1VHVvUnQvRXhsbUk3YVNiUS90QUpYRi92L3dRV0lx?=
 =?utf-8?B?L2lPZ0dvWnFSbTZpWE84b3FIcCtid1BsTXYzS3MzOGhMWWxqdlRCR3BYcHBo?=
 =?utf-8?B?VFZ4cHhtVzRXN2NzdFZNelVIUldneVJFaFQ3UkZzTEZOc1lNdjNqTy8yS3Ns?=
 =?utf-8?B?SkZlNHJBZm1HbjJwalJROHhvZjVrU1YwZGd2VzRjU0d0QlVjNTR5WkdNZzVR?=
 =?utf-8?B?cjhaR2MzVHlrbTNWZFgwcDVnc29FSVVBYmdpWHQ5ejFGOC90YkQrQT09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5e5b34b2-bcdd-45fe-8cd3-08da0e693668
X-MS-Exchange-CrossTenant-AuthSource: AS8PR04MB8609.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 14:10:27.6502
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: RJ6JAQviE9xh3yRBB+tm5GD6pOCgSvD0OwZrnBsFNd8J9MYzghVMqRFITpaiwAHhcV3JzBTemmLpRh3+4uYTQg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR04MB6363

On 25.03.2022 13:57, Bertrand Marquis wrote:
>> On 25 Mar 2022, at 12:43, Jan Beulich <jbeulich@suse.com> wrote:
>> On 24.03.2022 12:04, Bertrand Marquis wrote:
>>> --- a/xen/include/xen/kconfig.h
>>> +++ b/xen/include/xen/kconfig.h
>>> @@ -8,6 +8,10 @@
>>>  * these only work with boolean option.
>>>  */
>>>
>>> +/* cppcheck is failing to parse the macro so use a dummy one */
>>> +#ifdef CPPCHECK
>>> +#define IS_ENABLED(option) option
>>> +#else
>>> /*
>>>  * Getting something that works in C and CPP for an arg that may or may
>>>  * not be defined is tricky.  Here, if we have "#define CONFIG_BOOGER 1"
>>> @@ -27,5 +31,6 @@
>>>  * otherwise.
>>>  */
>>> #define IS_ENABLED(option) config_enabled(option)
>>> +#endif
>>
>> What are the consequences of this workaround on the code actually
>> being checked? Does this perhaps lead to certain portions of code
>> being skipped while checking?
> 
> Cppcheck is not optimising the code but looking at the syntax so the
> consequence here is that cppcheck is checking some code which might
> be optimised out by the compiler. This is not optimal but still it should
> analyse properly the code.

Aren't you saying so merely because all uses of IS_ENABLED() in our
sources so far are in if()? It would seem to me that when used in #if
(as can be found in Linux, which hence means could be the case in our
tree as well sooner or later) sections of code might either be skipped
or syntax errors may result. Or wait - IS_ENABLED() does itself kind
of rely on the respective CONFIG_* to expand to a numeric value; when
expanding to a string, I guess the compiler would also warn about the
resulting construct when used in if() (and reject any uses with #if).

Jan



From xen-devel-bounces@lists.xenproject.org Fri Mar 25 14:11:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 14:11:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294773.501366 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkfQ-0008He-C4; Fri, 25 Mar 2022 14:11:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294773.501366; Fri, 25 Mar 2022 14:11:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkfQ-0008HV-8G; Fri, 25 Mar 2022 14:11:52 +0000
Received: by outflank-mailman (input) for mailman id 294773;
 Fri, 25 Mar 2022 14:11:51 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wXB3=UE=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nXkfP-0008HN-0H
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 14:11:51 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04on0609.outbound.protection.outlook.com
 [2a01:111:f400:fe0e::609])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 82faf074-ac45-11ec-a405-831a346695d4;
 Fri, 25 Mar 2022 15:11:50 +0100 (CET)
Received: from DU2PR04CA0317.eurprd04.prod.outlook.com (2603:10a6:10:2b5::22)
 by AS8PR08MB6741.eurprd08.prod.outlook.com (2603:10a6:20b:353::8)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.19; Fri, 25 Mar
 2022 14:11:47 +0000
Received: from DB5EUR03FT011.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:2b5:cafe::b5) by DU2PR04CA0317.outlook.office365.com
 (2603:10a6:10:2b5::22) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17 via Frontend
 Transport; Fri, 25 Mar 2022 14:11:47 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT011.mail.protection.outlook.com (10.152.20.95) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Fri, 25 Mar 2022 14:11:47 +0000
Received: ("Tessian outbound 2877e54fe176:v113");
 Fri, 25 Mar 2022 14:11:47 +0000
Received: from c8636f7e2f6d.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 B76D07EB-F507-41E1-BEE0-14B4A2D53251.1; 
 Fri, 25 Mar 2022 14:11:41 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id c8636f7e2f6d.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 25 Mar 2022 14:11:41 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com (2603:10a6:20b:85::25)
 by VI1PR0801MB1694.eurprd08.prod.outlook.com (2603:10a6:800:5c::10)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.21; Fri, 25 Mar
 2022 14:11:38 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62]) by AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62%3]) with mapi id 15.20.5102.018; Fri, 25 Mar 2022
 14:11:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 82faf074-ac45-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=AoOJFWY+mFiigSVLrHLRDjNWKw2BsPFLUM2KpaD/Nn8=;
 b=jRGJqESgBncKjw6SutZ7pU5wlWCSLFHu2SwK346MJiuFsGDImFP5Ed6P8xwk16AcukfuF5WEQIyogTQYL1m1hwNDZMdYxCPW5vI04KujVocVWSBZoUkSuVlbzdm56I7ginhQzMTtSfj+mjPvFgJnVeCHivPfxJbs82KYEPi4yNc=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 5d1644729461cf85
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=fgUGHSgNp+uCd3/aWHV4niiY7aYmsTGX79m7A8hWIFwL78SuJe7ZG6p+w/nCUF9glDUT1hu2x6G1ZAgyP3TP1FXACx8MpCcshv27456MGqBFGjn/g6ZMU6+hWYhWV7ua7TW8d3O/qblBnENa3JlHL/2vVdBPVi9k8yYf2lvF/GEJiRBWQUbiX6Rj62Clvkp2ELtj/WV71xJzNjfKuTIZxrK7d9FCXYlI6tLC/5E0DeBHMt933BZkW2AzV0obM1dV6oYk628/OVTdscF95BkECyIp45jtecOtqJwCmv6Gv20ZGGCtKsIiFJuyI0zNz1Qxyoz2ZdpqCJ88sGmjGizmvw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=AoOJFWY+mFiigSVLrHLRDjNWKw2BsPFLUM2KpaD/Nn8=;
 b=iaNt4RKikrosLdZk0fi8+5NanZs9BV1PlL6vcPUrucrdPeBzJ79ulcQeqfIVFJpQhqUrFaaxXu1+8nZc9BcJZaS2eqEHEP5wPdhGJDFAfrYO2JFVamlV9GzS2GjculC1YNFuNwtDgWpyOwcjON5gWROLUQvbC0I5dcX5Kt4vaPYnMu1efHR8BIRn9kEgzwi4I0+rbVdrO5OFmXAZ8mH6d6qFkxKBiZhEWidP9UOATyRCROkuE2zpCEMcrTk8DaIRWDu975P8Q9abZfbMLB3QKiba+lUVC4BYcBcqbC+CwJcFlmLiISFOGhIT/zjsi8glm7AtMg6Y+ZqIfm+t6zI73g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=AoOJFWY+mFiigSVLrHLRDjNWKw2BsPFLUM2KpaD/Nn8=;
 b=jRGJqESgBncKjw6SutZ7pU5wlWCSLFHu2SwK346MJiuFsGDImFP5Ed6P8xwk16AcukfuF5WEQIyogTQYL1m1hwNDZMdYxCPW5vI04KujVocVWSBZoUkSuVlbzdm56I7ginhQzMTtSfj+mjPvFgJnVeCHivPfxJbs82KYEPi4yNc=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Julien Grall <julien@xen.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	"marco.solieri@minervasys.tech" <marco.solieri@minervasys.tech>,
	"lucmiccio@gmail.com" <lucmiccio@gmail.com>, Julien GralL
	<jgrall@amazon.com>, Stefano Stabellini <sstabellini@kernel.org>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH early-RFC 3/5] xen/arm: mm: Introduce helpers to
 prepare/enable/disable the identity mapping
Thread-Topic: [PATCH early-RFC 3/5] xen/arm: mm: Introduce helpers to
 prepare/enable/disable the identity mapping
Thread-Index: AQHYM6fbg4sguhQUtUmDN0Bua8GsbazQMhkAgAAEnYCAAAZ1gA==
Date: Fri, 25 Mar 2022 14:11:37 +0000
Message-ID: <BFF09E22-6B43-4D34-B96E-79085705E605@arm.com>
References: <20220309112048.17377-1-julien@xen.org>
 <20220309112048.17377-4-julien@xen.org>
 <7A115ECF-66CD-4B9A-AD98-53A92F91269E@arm.com>
 <5a20f085-e4c6-54da-473b-4fcec6657450@xen.org>
In-Reply-To: <5a20f085-e4c6-54da-473b-4fcec6657450@xen.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 57f91cd3-c5d1-4387-7482-08da0e69661a
x-ms-traffictypediagnostic:
	VI1PR0801MB1694:EE_|DB5EUR03FT011:EE_|AS8PR08MB6741:EE_
X-Microsoft-Antispam-PRVS:
	<AS8PR08MB67418456AF038C50F3E92FBC9D1A9@AS8PR08MB6741.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR08MB3784.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(83380400001)(54906003)(91956017)(122000001)(8936002)(38100700002)(38070700005)(316002)(6512007)(53546011)(33656002)(71200400001)(2906002)(66476007)(508600001)(6486002)(6916009)(6506007)(66556008)(26005)(4326008)(186003)(2616005)(76116006)(66446008)(64756008)(5660300002)(8676002)(86362001)(66946007)(36756003)(21314003)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <7A3105EC461BAD44B632041035C8F914@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB1694
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT011.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	3908e6c5-d00c-404d-4706-08da0e6960a6
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	6U8JCqgW7s4KUoUzGIlgwhAq3SRLQJx13b/hi3iyIGAsWSFIWc+UUEe2Wa7F/tXPznL8DWM7ykQFoV7WICVfotqD/qclrCLtuQSoQO03E0CR15U4aaTGxrLISLZ0NrplUfqyrqCL6yyfiyaRGzZ9lvv6ZfvK9U2YAitx9BKA/+F57piyq0bD/qA8HiWnPvOBjizZFd3yCqgSLE/NEpiHRJ4y1k1Qh2EsE4VgWFbw9skG3b21uF0PfRSUe/9Z7DuZ71juixehjvSi/Ddk86PRE/z52wpHbMxpP4eL10VN5I0xRjcYpfJwLebliSZYsLga+zEDq0z42unzS+Ug0GdoLXjtosuYQG47vIDKHgzHAWIGAvqQFkUXW6h6j5jpOGAlSuoxiyMVdpuVkBbLR47/wrzltZe5eoGZl7a3l2zc6t1CJFdKXabwGf13REaz57dD3r0dB7Ahuu3cpB9qaEi211VtmveR6aXpAYiX5U8xzqnbwowhICVABbgTtm80oF/XHA6UZ1s6JWGR13i1IYjAwetn3r/39apZ2SgVDuY/OxIJT+3W+b6bkKnL7qLbvlIGuc6NqS6+dQLZfFl9Yhd00zmIbUDQlkq+5LQ8g7k0nZxxk4KEBUM+uYqvhFVi61D1pNaIC0MfDv2hNi+GevCnrslwBBXk8cZN4UjoYzaWSA3e5aFXnw1vjVw5dk3oym+zBccSjzln9z/zGS2R3IcxYA==
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(8676002)(81166007)(4326008)(82310400004)(316002)(8936002)(83380400001)(70586007)(6862004)(54906003)(5660300002)(2906002)(53546011)(6512007)(47076005)(6506007)(356005)(70206006)(86362001)(2616005)(26005)(186003)(40460700003)(336012)(36860700001)(6486002)(508600001)(33656002)(36756003)(107886003)(21314003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 14:11:47.3631
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 57f91cd3-c5d1-4387-7482-08da0e69661a
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT011.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR08MB6741

Hi Julien

> On 25 Mar 2022, at 14:48, Julien Grall <julien@xen.org> wrote:
>=20
>=20
>=20
> On 25/03/2022 13:32, Bertrand Marquis wrote:
>> Hi Julien,
>=20
> Hi,
>=20
>>> On 9 Mar 2022, at 12:20, Julien Grall <julien@xen.org> wrote:
>>>=20
>>> From: Julien GralL <jgrall@amazon.com>
>>>=20
>>> In follow-up patches we will need to have part of Xen identity mapped i=
n
>>> order to safely switch the TTBR.
>>>=20
>>> On some platform, the identity mapping may have to start at 0. If we al=
ways
>>> keep the identity region mapped, NULL pointer ference would lead to acc=
ess
>>> to valid mapping.
>>>=20
>>> It would be possible to relocate Xen to avoid clashing with address 0.
>>> However the identity mapping is only meant to be used in very limited
>>> places. Therefore it would be better to keep the identity region invali=
d
>>> for most of the time.
>>>=20
>>> Two new helpers are introduced:
>>>    - prepare_identity_mapping() will setup the page-tables so it is
>>>      easy to create the mapping afterwards.
>>>    - update_identity_mapping() will create/remove the identity mapping
>> Nit: Would be better to first say what the patch is doing and then expla=
ining
>> the NULL pointer possible issue.
> The NULL pointer is part of the problem statement. IOW, I would not have =
introduced update_identity_mapping() if we were not concerned that the mapp=
ing start 0.
>=20
> So I don't think the commit message would read the same.

Somehow reading your commit message, the link between the first 2 paragraph=
 and the helpers introduced is not quite clear.

The NULL pointer problem is a consequence of the usage of an identity mappi=
ng and maybe this explanation should be more in documentation or in a code =
comment around this functionality.

>=20
>>> +/*
>>> + * The identity mapping may start at physical address 0. So don't want
>>> + * to keep it mapped longer than necessary.
>>> + *
>>> + * When this is called, we are still using the boot_pgtable.
>>> + *
>>> + * XXX: Handle Arm32 properly.
>>> + */
>>> +static void prepare_identity_mapping(void)
>>> +{
>>> +    paddr_t id_addr =3D virt_to_maddr(_start);
>>> +    lpae_t pte;
>>> +    DECLARE_OFFSETS(id_offsets, id_addr);
>>> +
>>> +    printk("id_addr 0x%lx\n", id_addr);
>> Debug print that should be removed.
>=20
> Will do. Note the "early-RFC" in the comment. I am not looking for a deta=
iled review (I didn't spend too much time cleaning up) but a feedback on th=
e approach.

I did read the code and it is easy to forget to remove those, so I just poi=
nted it :-)

>=20
>>> +#ifdef CONFIG_ARM_64
>>> +    if ( id_offsets[0] !=3D 0 )
>>> +        panic("Cannot handled ID mapping above 512GB\n");
>> The error message here might not be really helpful for the user.
>> How about saying that Xen cannot be loaded in memory with
>> a physical address above 512GB ?
>=20
> Sure.
>=20
>>> +#endif
>>> +
>>> +    /* Link first ID table */
>>> +    pte =3D pte_of_xenaddr((vaddr_t)xen_first_id);
>>> +    pte.pt.table =3D 1;
>>> +    pte.pt.xn =3D 0;
>>> +
>>> +    write_pte(&boot_pgtable[id_offsets[0]], pte);
>>> +
>>> +    /* Link second ID table */
>>> +    pte =3D pte_of_xenaddr((vaddr_t)xen_second_id);
>>> +    pte.pt.table =3D 1;
>>> +    pte.pt.xn =3D 0;
>>> +
>>> +    write_pte(&xen_first_id[id_offsets[1]], pte);
>>> +
>>> +    /* Link third ID table */
>>> +    pte =3D pte_of_xenaddr((vaddr_t)xen_third_id);
>>> +    pte.pt.table =3D 1;
>>> +    pte.pt.xn =3D 0;
>>> +
>>> +    write_pte(&xen_second_id[id_offsets[2]], pte);
>>> +
>>> +    /* The mapping in the third table will be created at a later stage=
 */
>>> +
>>> +    /*
>>> +     * Link the identity mapping in the runtime Xen page tables. No ne=
ed to
>>> +     * use write_pte here as they are not live yet.
>>> +     */
>>> +    xen_pgtable[id_offsets[0]] =3D boot_pgtable[id_offsets[0]];
>>> +}
>>> +
>>> +void update_identity_mapping(bool enable)
>> You probably want an __init attribute here.
> I expect this helper to be necessary after boot (e.g. CPU bring-up, suspe=
nd/resume). So I decided to keep it without _init.

Ok

>=20
>>> +{
>>> +    paddr_t id_addr =3D virt_to_maddr(_start);
>>> +    int rc;
>>> +
>>> +    if ( enable )
>>> +        rc =3D map_pages_to_xen(id_addr, maddr_to_mfn(id_addr), 1,
>>> +                              PAGE_HYPERVISOR_RX);
>>> +    else
>>> +        rc =3D destroy_xen_mappings(id_addr, id_addr + PAGE_SIZE);
>>> +
>>> +    BUG_ON(rc);
>>> +}
>>> +
>>> /*
>>>  * After boot, Xen page-tables should not contain mapping that are both
>>>  * Writable and eXecutables.
>>> @@ -609,6 +679,9 @@ void __init setup_pagetables(unsigned long boot_phy=
s_offset)
>>>=20
>>>     phys_offset =3D boot_phys_offset;
>>>=20
>>> +    /* XXX: Find a better place to call it */
>> Why do you think this place is not right ?
> Because the use in setup_pagetables() will soon disappear (my plan it to =
completely remove setup_pagetables) and this will used in other subsystem (=
CPU bring-up, suspend/resume).

Ok

Cheers
Bertrand

>=20
> Cheers,
>=20
> --=20
> Julien Grall



From xen-devel-bounces@lists.xenproject.org Fri Mar 25 14:18:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 14:18:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294777.501377 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkm0-0000fD-6l; Fri, 25 Mar 2022 14:18:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294777.501377; Fri, 25 Mar 2022 14:18:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkm0-0000f6-2i; Fri, 25 Mar 2022 14:18:40 +0000
Received: by outflank-mailman (input) for mailman id 294777;
 Fri, 25 Mar 2022 14:18:38 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=EIhH=UE=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nXkly-0000f0-Pe
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 14:18:38 +0000
Received: from mail-qk1-x729.google.com (mail-qk1-x729.google.com
 [2607:f8b0:4864:20::729])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 75fb6bb1-ac46-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 15:18:37 +0100 (CET)
Received: by mail-qk1-x729.google.com with SMTP id h196so6040212qke.12
 for <xen-devel@lists.xenproject.org>; Fri, 25 Mar 2022 07:18:37 -0700 (PDT)
Received: from pm2-ws13.praxislan02.com ([2001:470:8:67e:ba27:ebff:fee8:ce27])
 by smtp.gmail.com with ESMTPSA id
 o10-20020a05620a2a0a00b00680bac9108dsm441080qkp.22.2022.03.25.07.18.34
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Fri, 25 Mar 2022 07:18:35 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 75fb6bb1-ac46-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:mime-version
         :content-transfer-encoding;
        bh=Xmogf3PlJaQyDoPI6ivORvJ+dMlL49hduRZTAifaIbU=;
        b=J0pe8xDNenHuH/0qgcxvWErwWAEXv773WOs6A6WCNuTjBW9xZhfQ1/+wNE93IHkP8+
         b3BP4mKdHumDXB95AEp22muflEjjljVBCKvsatf0uNJVQlkP05WHxoswqR6MXIVywIr4
         JxurH7ZURKHYknsm+A9QBOqWqAIEStIef7dacZ6CFyfU5WIVNiqhgP722s7J1cxE3tgj
         s7PyHWRJoHaAXADHZ4Xl27mLjDxvjr40aXnIIozhF24sti9lyM/4eKdhWdMZZhJs1vbV
         T/FNBu7IhQne2B+CPPIydO7VSeL70hTYU/iilvLN+NXt0WzyqG2ndSMk65eaXrXDNRaT
         xhBQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version
         :content-transfer-encoding;
        bh=Xmogf3PlJaQyDoPI6ivORvJ+dMlL49hduRZTAifaIbU=;
        b=JsnwnILCzLftSEWNMPXFVpf9Wv2x3GNKXSfjNDEnioQWTIJluXh9X07qZ+RWV5xr/N
         +ug7QN/M+Ec9VRvjW+RWX8xUkjNfOPr4HTlV+4KNd3HGUeA6f1idH6d6TF3HJy3PXjH1
         Bp7hHm+apZo98b3RwMuOdgCXtEDbK92amUPaIkOaHRPnYn8i0Iuy/YvZOLFhT1adVCC7
         yZxXy0WdyqEkbpFofpFb/m6/ExunFVZGeOImYTKark74efHKFNdziXRP/Sqfw6fHnlgo
         rQG0GtiKmVi7q4XkwUmr/27jBDzoVx8KmmZgJqUZhcbIBS6HApCOam2q2c4FTkLX3Igh
         4A/A==
X-Gm-Message-State: AOAM5318eXveiVYdT/NzdWFLJHso8l6GvT8LnNN0OsNst6I9hnlSuP5k
	RoFINX4MgYtmHyWWJytUgIK68XshzBA=
X-Google-Smtp-Source: ABdhPJxZHAJHtrRZ52Y26q+n5aY/aHPZQ3MJxiPDaIuQJDVPq7UHIQ0+hHCo/HFX+lV2cJmAZfzheQ==
X-Received: by 2002:a05:620a:1432:b0:67d:36cd:1f16 with SMTP id k18-20020a05620a143200b0067d36cd1f16mr6726869qkj.166.1648217916029;
        Fri, 25 Mar 2022 07:18:36 -0700 (PDT)
From: Jason Andryuk <jandryuk@gmail.com>
To: xen-devel@lists.xenproject.org
Cc: Jason Andryuk <jandryuk@gmail.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>,
	"Daniel P. Smith" <dpsmith.dev@gmail.com>
Subject: [PATCH] x86/physdev: Call xsm_unmap_domain_irq earlier
Date: Fri, 25 Mar 2022 10:18:26 -0400
Message-Id: <20220325141826.16245-1-jandryuk@gmail.com>
X-Mailer: git-send-email 2.35.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Pull the XSM check up out of unmap_domain_pirq into physdev_map_pirq.

xsm_unmap_domain_irq was seen denying unmap_domain_pirq when called from
complete_domain_destroy as an RCU callback.  The source context was an
unexpected, random domain.  Since this is a xen-internal operation,
going through the XSM hook is inapproriate.

Move the XSM hook up into physdev_unmap_pirq, which is the
guest-accessible path.  This requires moving some of the sanity check
upwards as well since the hook needs the additional data to make its
decision.  Since complete_domain_destroy still calls unmap_domain_pirq,
replace the moved runtime checking with assert.  Only valid pirqs should
make their way into unmap_domain_pirq from complete_domain_destroy.

This is mostly code movement, but one style change is to pull `irq =
info->arch.irq` out of the if condition.

Label done is now unused and removed.

Signed-off-by: Jason Andryuk <jandryuk@gmail.com>
---
unmap_domain_pirq is also called in vioapic_hwdom_map_gsi and
vpci_msi_disable.  vioapic_hwdom_map_gsi is a cleanup path after going
through map_domain_pirq, and I don't think the vpci code is directly
guest-accessible.  So I think those are okay, but I not familiar with
that code.  Hence, I am highlighting it.

 xen/arch/x86/irq.c     | 31 +++++++-----------------------
 xen/arch/x86/physdev.c | 43 +++++++++++++++++++++++++++++++++++++++++-
 2 files changed, 49 insertions(+), 25 deletions(-)

diff --git a/xen/arch/x86/irq.c b/xen/arch/x86/irq.c
index 285ac399fb..ddd3194fba 100644
--- a/xen/arch/x86/irq.c
+++ b/xen/arch/x86/irq.c
@@ -2310,41 +2310,25 @@ int unmap_domain_pirq(struct domain *d, int pirq)
     struct pirq *info;
     struct msi_desc *msi_desc = NULL;
 
-    if ( (pirq < 0) || (pirq >= d->nr_pirqs) )
-        return -EINVAL;
-
+    ASSERT(pirq >= 0);
+    ASSERT(pirq < d->nr_pirqs);
     ASSERT(pcidevs_locked());
     ASSERT(spin_is_locked(&d->event_lock));
 
     info = pirq_info(d, pirq);
-    if ( !info || (irq = info->arch.irq) <= 0 )
-    {
-        dprintk(XENLOG_G_ERR, "dom%d: pirq %d not mapped\n",
-                d->domain_id, pirq);
-        ret = -EINVAL;
-        goto done;
-    }
+    ASSERT(info);
+
+    irq = info->arch.irq;
+    ASSERT(irq > 0);
 
     desc = irq_to_desc(irq);
     msi_desc = desc->msi_desc;
     if ( msi_desc && msi_desc->msi_attrib.type == PCI_CAP_ID_MSI )
     {
-        if ( msi_desc->msi_attrib.entry_nr )
-        {
-            printk(XENLOG_G_ERR
-                   "dom%d: trying to unmap secondary MSI pirq %d\n",
-                   d->domain_id, pirq);
-            ret = -EBUSY;
-            goto done;
-        }
+        ASSERT(msi_desc->msi_attrib.entry_nr == 0);
         nr = msi_desc->msi.nvec;
     }
 
-    ret = xsm_unmap_domain_irq(XSM_HOOK, d, irq,
-                               msi_desc ? msi_desc->dev : NULL);
-    if ( ret )
-        goto done;
-
     forced_unbind = pirq_guest_force_unbind(d, info);
     if ( forced_unbind )
         dprintk(XENLOG_G_WARNING, "dom%d: forcing unbind of pirq %d\n",
@@ -2405,7 +2389,6 @@ int unmap_domain_pirq(struct domain *d, int pirq)
     if (msi_desc)
         msi_free_irq(msi_desc);
 
- done:
     return ret;
 }
 
diff --git a/xen/arch/x86/physdev.c b/xen/arch/x86/physdev.c
index 2ddcf44f33..a5ed257dca 100644
--- a/xen/arch/x86/physdev.c
+++ b/xen/arch/x86/physdev.c
@@ -140,8 +140,11 @@ int physdev_map_pirq(domid_t domid, int type, int *index, int *pirq_p,
 
 int physdev_unmap_pirq(domid_t domid, int pirq)
 {
+    struct msi_desc *msi_desc;
+    struct irq_desc *desc;
+    struct pirq *info;
     struct domain *d;
-    int ret = 0;
+    int irq, ret = 0;
 
     d = rcu_lock_domain_by_any_id(domid);
     if ( d == NULL )
@@ -162,9 +165,47 @@ int physdev_unmap_pirq(domid_t domid, int pirq)
             goto free_domain;
     }
 
+    if ( (pirq < 0) || (pirq >= d->nr_pirqs) ) {
+        ret = -EINVAL;
+        goto free_domain;
+    }
+
     pcidevs_lock();
     spin_lock(&d->event_lock);
+
+    info = pirq_info(d, pirq);
+    irq = info ? info->arch.irq : 0;
+    if ( !info || irq <= 0 )
+    {
+        dprintk(XENLOG_G_ERR, "dom%d: pirq %d not mapped\n",
+                d->domain_id, pirq);
+        ret = -EINVAL;
+        goto unlock;
+    }
+
+    desc = irq_to_desc(irq);
+    msi_desc = desc->msi_desc;
+    if ( msi_desc && msi_desc->msi_attrib.type == PCI_CAP_ID_MSI )
+    {
+        if ( msi_desc->msi_attrib.entry_nr )
+        {
+            printk(XENLOG_G_ERR
+                   "dom%d: trying to unmap secondary MSI pirq %d\n",
+                   d->domain_id, pirq);
+            ret = -EBUSY;
+            goto unlock;
+        }
+    }
+
+    ret = xsm_unmap_domain_irq(XSM_HOOK, d, irq,
+                               msi_desc ? msi_desc->dev : NULL);
+    if ( ret )
+        goto unlock;
+
     ret = unmap_domain_pirq(d, pirq);
+
+ unlock:
+
     spin_unlock(&d->event_lock);
     pcidevs_unlock();
 
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 25 14:20:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 14:20:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294780.501388 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXknQ-0001yq-J5; Fri, 25 Mar 2022 14:20:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294780.501388; Fri, 25 Mar 2022 14:20:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXknQ-0001yj-E1; Fri, 25 Mar 2022 14:20:08 +0000
Received: by outflank-mailman (input) for mailman id 294780;
 Fri, 25 Mar 2022 14:20:07 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=hlgX=UE=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nXknP-0001uN-6K
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 14:20:07 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ab0e5fc5-ac46-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 15:20:06 +0100 (CET)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id BC06721110;
 Fri, 25 Mar 2022 14:20:04 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 6575B132E9;
 Fri, 25 Mar 2022 14:20:04 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id Dy1/F5TPPWL6EQAAMHmgww
 (envelope-from <jgross@suse.com>); Fri, 25 Mar 2022 14:20:04 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ab0e5fc5-ac46-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648218004; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=wwwyt1xK0HmXO1qRV3kfkubpFO7mwn/CtU9TCGfV+j0=;
	b=PaPT8GekWg7B8tp64vOUqB7V3ysZ3fzCtptcXK5/u/61zcFo9wBl058YL6CPvQom00Eroj
	3r0AP0nMj3iKhXN/U6bkubJY8ibdyLuACqUF//b2/+QknKPVDcZdCj4x2kTJKYjcDK+h6h
	hnDpz4dK6YeHEJc2EC0LTQPiTf3TQCo=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org,
	x86@kernel.org,
	linux-kernel@vger.kernel.org
Cc: Juergen Gross <jgross@suse.com>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Thomas Gleixner <tglx@linutronix.de>,
	Ingo Molnar <mingo@redhat.com>,
	Borislav Petkov <bp@alien8.de>,
	Dave Hansen <dave.hansen@linux.intel.com>,
	"H. Peter Anvin" <hpa@zytor.com>,
	=?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
Subject: [PATCH v2] xen: fix is_xen_pmu()
Date: Fri, 25 Mar 2022 15:20:02 +0100
Message-Id: <20220325142002.31789-1-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

is_xen_pmu() is taking the cpu number as parameter, but it is not using
it. Instead it just tests whether the Xen PMU initialization on the
current cpu did succeed. As this test is done by checking a percpu
pointer, preemption needs to be disabled in order to avoid switching
the cpu while doing the test. While resuming from suspend() this seems
not to be the case:

[   88.082751] ACPI: PM: Low-level resume complete
[   88.087933] ACPI: EC: EC started
[   88.091464] ACPI: PM: Restoring platform NVS memory
[   88.097166] xen_acpi_processor: Uploading Xen processor PM info
[   88.103850] Enabling non-boot CPUs ...
[   88.108128] installing Xen timer for CPU 1
[   88.112763] BUG: using smp_processor_id() in preemptible [00000000] code: systemd-sleep/7138
[   88.122256] caller is is_xen_pmu+0x12/0x30
[   88.126937] CPU: 0 PID: 7138 Comm: systemd-sleep Tainted: G        W         5.16.13-2.fc32.qubes.x86_64 #1
[   88.137939] Hardware name: Star Labs StarBook/StarBook, BIOS 7.97 03/21/2022
[   88.145930] Call Trace:
[   88.148757]  <TASK>
[   88.151193]  dump_stack_lvl+0x48/0x5e
[   88.155381]  check_preemption_disabled+0xde/0xe0
[   88.160641]  is_xen_pmu+0x12/0x30
[   88.164441]  xen_smp_intr_init_pv+0x75/0x100

Fix that by replacing is_xen_pmu() by a simple boolean variable which
reflects the Xen PMU initialization state on cpu 0.

Modify xen_pmu_init() to return early in case it is being called for a
cpu other than cpu 0 and the boolean variable not being set.

Fixes: bf6dfb154d93 ("xen/PMU: PMU emulation code")
Reported-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
Signed-off-by: Juergen Gross <jgross@suse.com>
---
V2:
- don't reset is_xen_pmu when suspending (Boris Ostrovsky)
---
 arch/x86/xen/pmu.c    | 10 ++++------
 arch/x86/xen/pmu.h    |  3 ++-
 arch/x86/xen/smp_pv.c |  2 +-
 3 files changed, 7 insertions(+), 8 deletions(-)

diff --git a/arch/x86/xen/pmu.c b/arch/x86/xen/pmu.c
index 89dd6b1708b0..21ecbe754cb2 100644
--- a/arch/x86/xen/pmu.c
+++ b/arch/x86/xen/pmu.c
@@ -506,10 +506,7 @@ irqreturn_t xen_pmu_irq_handler(int irq, void *dev_id)
 	return ret;
 }
 
-bool is_xen_pmu(int cpu)
-{
-	return (get_xenpmu_data() != NULL);
-}
+bool is_xen_pmu;
 
 void xen_pmu_init(int cpu)
 {
@@ -520,7 +517,7 @@ void xen_pmu_init(int cpu)
 
 	BUILD_BUG_ON(sizeof(struct xen_pmu_data) > PAGE_SIZE);
 
-	if (xen_hvm_domain())
+	if (xen_hvm_domain() || (cpu != 0 && !is_xen_pmu))
 		return;
 
 	xenpmu_data = (struct xen_pmu_data *)get_zeroed_page(GFP_KERNEL);
@@ -541,7 +538,8 @@ void xen_pmu_init(int cpu)
 	per_cpu(xenpmu_shared, cpu).xenpmu_data = xenpmu_data;
 	per_cpu(xenpmu_shared, cpu).flags = 0;
 
-	if (cpu == 0) {
+	if (!is_xen_pmu) {
+		is_xen_pmu = true;
 		perf_register_guest_info_callbacks(&xen_guest_cbs);
 		xen_pmu_arch_init();
 	}
diff --git a/arch/x86/xen/pmu.h b/arch/x86/xen/pmu.h
index 0e83a160589b..65c58894fc79 100644
--- a/arch/x86/xen/pmu.h
+++ b/arch/x86/xen/pmu.h
@@ -4,6 +4,8 @@
 
 #include <xen/interface/xenpmu.h>
 
+extern bool is_xen_pmu;
+
 irqreturn_t xen_pmu_irq_handler(int irq, void *dev_id);
 #ifdef CONFIG_XEN_HAVE_VPMU
 void xen_pmu_init(int cpu);
@@ -12,7 +14,6 @@ void xen_pmu_finish(int cpu);
 static inline void xen_pmu_init(int cpu) {}
 static inline void xen_pmu_finish(int cpu) {}
 #endif
-bool is_xen_pmu(int cpu);
 bool pmu_msr_read(unsigned int msr, uint64_t *val, int *err);
 bool pmu_msr_write(unsigned int msr, uint32_t low, uint32_t high, int *err);
 int pmu_apic_update(uint32_t reg);
diff --git a/arch/x86/xen/smp_pv.c b/arch/x86/xen/smp_pv.c
index 4a6019238ee7..688aa8b6ae29 100644
--- a/arch/x86/xen/smp_pv.c
+++ b/arch/x86/xen/smp_pv.c
@@ -129,7 +129,7 @@ int xen_smp_intr_init_pv(unsigned int cpu)
 	per_cpu(xen_irq_work, cpu).irq = rc;
 	per_cpu(xen_irq_work, cpu).name = callfunc_name;
 
-	if (is_xen_pmu(cpu)) {
+	if (is_xen_pmu) {
 		pmu_name = kasprintf(GFP_KERNEL, "pmu%d", cpu);
 		rc = bind_virq_to_irqhandler(VIRQ_XENPMU, cpu,
 					     xen_pmu_irq_handler,
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Fri Mar 25 14:22:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 14:22:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294783.501399 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkpf-0002eU-UZ; Fri, 25 Mar 2022 14:22:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294783.501399; Fri, 25 Mar 2022 14:22:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkpf-0002eN-Qz; Fri, 25 Mar 2022 14:22:27 +0000
Received: by outflank-mailman (input) for mailman id 294783;
 Fri, 25 Mar 2022 14:22:26 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXkpe-0002e6-Di; Fri, 25 Mar 2022 14:22:26 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXkpe-0003xj-By; Fri, 25 Mar 2022 14:22:26 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXkpd-0002jC-VN; Fri, 25 Mar 2022 14:22:26 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXkpd-0004C5-Uv; Fri, 25 Mar 2022 14:22:25 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=sN7mg8sdNzUfFcWUWJu9u6Qqrq4cBN+iRUZDrqlqDQ8=; b=o44DZd71wNv1lN7GlTUKqJL5n8
	YF4p7jchLJ46pMfwUVmG9FXCBsKAaOdkb8a1n/DZDU50RdeSKmCPQcfwI7Buz31/vU8MW9/537X7T
	40Rd7ehYaknh5j9o6tDpteo49044G5B+mW4G5mn9I7eNsHfxDX6UgkFtyyWRUihQFZ60=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168841-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168841: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=0e03ff97def12b121b5313094a76e5db7bb5c93c
X-Osstest-Versions-That:
    xen=1c80f13a6efdc832878d7a431e2c216039d063bc
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 25 Mar 2022 14:22:25 +0000

flight 168841 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168841/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  0e03ff97def12b121b5313094a76e5db7bb5c93c
baseline version:
 xen                  1c80f13a6efdc832878d7a431e2c216039d063bc

Last test of basis   168821  2022-03-24 11:03:05 Z    1 days
Testing same since   168841  2022-03-25 10:00:33 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Julien Grall <jgrall@amazon.com>
  Stefano Stabellini <stefano.stabellini@xilinx.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   1c80f13a6e..0e03ff97de  0e03ff97def12b121b5313094a76e5db7bb5c93c -> smoke


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 14:25:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 14:25:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294790.501410 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXks5-0003G0-Du; Fri, 25 Mar 2022 14:24:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294790.501410; Fri, 25 Mar 2022 14:24:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXks5-0003Ft-8s; Fri, 25 Mar 2022 14:24:57 +0000
Received: by outflank-mailman (input) for mailman id 294790;
 Fri, 25 Mar 2022 14:24:55 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nXks3-0003Fn-MD
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 14:24:55 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXks2-0003zK-M8; Fri, 25 Mar 2022 14:24:54 +0000
Received: from [54.239.6.185] (helo=[192.168.14.36])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXks2-000701-FX; Fri, 25 Mar 2022 14:24:54 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=OXUTeJitl+phbKj+5szvFqS5tepnyXc/D+DK2FvLQQk=; b=mqiJINok1++023i7/dgvge3P3f
	iBia93n1RVO2dFqJGi8FjWWiwr0YOEJclBLSkHN+KTOXrcNYIuEPxkUcp1xaFcygndN+UmWbwUMeW
	ovW1Fm13m/jVhH/EBkRzYvAfIpHPE1Ku0ndOjuxRNfT7UAYyBaVTgXZ5NC/Ma70Okikw=;
Message-ID: <9673f201-080b-8800-65a2-144d21b030fd@xen.org>
Date: Fri, 25 Mar 2022 14:24:52 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH early-RFC 4/5] xen/arm: mm: Rework switch_ttbr()
To: Bertrand Marquis <Bertrand.Marquis@arm.com>
Cc: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 "marco.solieri@minervasys.tech" <marco.solieri@minervasys.tech>,
 "lucmiccio@gmail.com" <lucmiccio@gmail.com>, Julien Grall
 <jgrall@amazon.com>, Stefano Stabellini <sstabellini@kernel.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
References: <20220309112048.17377-1-julien@xen.org>
 <20220309112048.17377-5-julien@xen.org>
 <140E78FF-8281-48BA-BE13-C4B3E12F34A5@arm.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <140E78FF-8281-48BA-BE13-C4B3E12F34A5@arm.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit



On 25/03/2022 13:47, Bertrand Marquis wrote:
> Hi Julien,

Hi Bertrand,

>> On 9 Mar 2022, at 12:20, Julien Grall <julien@xen.org> wrote:
>>
>> From: Julien Grall <jgrall@amazon.com>
>>
>> At the moment, switch_ttbr() is switching the TTBR whilst the MMU is
>> still on.
>>
>> Switching TTBR is like replacing existing mappings with new ones. So
>> we need to follow the break-before-make sequence.
>>
>> In this case, it means the MMU needs to be switched off while the
>> TTBR is updated. In order to disable the MMU, we need to first
>> jump to an identity mapping.
>>
>> Rename switch_ttbr() to switch_ttbr_id() and create an helper on
>> top to temporary map the identity mapping and call switch_ttbr()
>> via the identity address.
>>
>> switch_ttbr_id() is now reworked to temporarily turn off the MMU
>> before updating the TTBR.
>>
>> We also need to make sure the helper switch_ttbr() is part of the
>> identity mapping. So move _end_boot past it.
>>
>> Take the opportunity to instruction cache flush as the operation is
>> only necessary when the memory is updated.
> 
> Your code is actually remove the instruction cache invalidation so
> this sentence is a bit misleading.

I forgot to add the word "remove" in the sentence.

> 
> Also an open question: shouldn’t we flush the data cache ?
Do you mean clean/invalidate to PoC/PoU? Something else?

> As we switch from one TTBR to an other, there might be some data
> in the cache dependent that could be flushed while the MMU is off 

I am a bit confused. Those flush could also happen with the MMU on. So 
how turning off the MMU would result to a problem? Note that the data 
cache is still enabled during the switch.

> or
> that would have no mapping once it is reactivated.
The cache line will be flushed at some point in the future. I would 
argue if the caller need it earlier, then it should make sure to issue 
the flush before switch_ttbr().

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 14:28:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 14:28:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294794.501421 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkvn-0003xh-SP; Fri, 25 Mar 2022 14:28:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294794.501421; Fri, 25 Mar 2022 14:28:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkvn-0003xa-P9; Fri, 25 Mar 2022 14:28:47 +0000
Received: by outflank-mailman (input) for mailman id 294794;
 Fri, 25 Mar 2022 14:28:46 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wXB3=UE=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nXkvl-0003xU-VW
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 14:28:45 +0000
Received: from EUR03-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur03on061a.outbound.protection.outlook.com
 [2a01:111:f400:fe09::61a])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e04fa3cb-ac47-11ec-a405-831a346695d4;
 Fri, 25 Mar 2022 15:28:45 +0100 (CET)
Received: from AS8PR07CA0055.eurprd07.prod.outlook.com (2603:10a6:20b:459::26)
 by AM5PR0802MB2514.eurprd08.prod.outlook.com (2603:10a6:203:9e::8)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Fri, 25 Mar
 2022 14:28:32 +0000
Received: from VE1EUR03FT004.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:459:cafe::7b) by AS8PR07CA0055.outlook.office365.com
 (2603:10a6:20b:459::26) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17 via Frontend
 Transport; Fri, 25 Mar 2022 14:28:32 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT004.mail.protection.outlook.com (10.152.18.106) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Fri, 25 Mar 2022 14:28:32 +0000
Received: ("Tessian outbound 18e50a6f0513:v113");
 Fri, 25 Mar 2022 14:28:31 +0000
Received: from 42cdc9c10649.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 D073EF6E-2DC5-4227-AC94-DBB3A4FA126E.1; 
 Fri, 25 Mar 2022 14:28:22 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 42cdc9c10649.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 25 Mar 2022 14:28:22 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com (2603:10a6:20b:85::25)
 by AM9PR08MB6801.eurprd08.prod.outlook.com (2603:10a6:20b:30a::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17; Fri, 25 Mar
 2022 14:28:19 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62]) by AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62%3]) with mapi id 15.20.5102.018; Fri, 25 Mar 2022
 14:28:18 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e04fa3cb-ac47-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=IcxYJgUoyj02MY9XCWeYicz3tx5jsdz6bEKKHLk2/yM=;
 b=9J07zlo3Y/lv/CyTSpJmsSOQvOzAGDJMcDB6vFjwDkuvf8nrOJU8JvbHVtOazWFn3joKF6jnRIbFoGnBCJw2bGWR71xlKwIFngdUQk+KSZjxavAJSmB0cgp9g/YT6EMXOjpaiWxA5FNGajf2aq8evuQuseoA9YFkRNVmqjHE1ow=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 564da1f0703bc30c
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ce7/xGcn5ca+ekEzkJvJgaF/KQmrWrvGjhLtDvAuA4qbtF6aB1WcVQGMnWgVb2HL7aAJd4kCo/rNgmb8HO96Gk1u3RaO43XvtyoF+zld/bIrwBW2G14c3JKI1ksfx6XFli+U6t9xBTbFBk3fOOneldVmTzOgumMJVWFfcs5K7UwCNLkcXH09wPB11g/URhlJn4trmZpMhGLjpDN26CNiaoJvnUGSOmOsSQSSQhNrMM9xGXfqFwr+hzrq+d5BMpv9crsD2WIJXYsxJdz1GaiXRKW7T2kCBiNAZSt3WmfeoYrPOJMrzwaObm2S/+ejVeXd5mMlfFsjfV6li0GeFD/ouw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=IcxYJgUoyj02MY9XCWeYicz3tx5jsdz6bEKKHLk2/yM=;
 b=V/jJzZ0gmDOi+qxaVkN3gvnewn7h18x4pUsnERl8wUUBqtpS/Wa36iVyTatY39iB9R0Ve1vO91lkBimyp0X7dQRp/U/B20gfNcSk5vYgY6iStcfQ2Gqb4d1LAh2klRL27ODe4Kg8ZO5E6mXQoWvM45XhxoyuSXshTCXecHx8iMVH/Z9WBvcXFj+MsqawUqRxI2zc5lCYSIMvNdyrt9ujwx9kFcoQsvicTQ8P0z+LyrYxegUMzh7Zert7b+8Kd0AM8ThexD07/7ZO2Qzj95N6YLKMPMWDNy03YfNXZgrHcYFW4hoQS6JNbIc3zZI+ubPALoVEj8SKQrj9/ho/xo+0UQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=IcxYJgUoyj02MY9XCWeYicz3tx5jsdz6bEKKHLk2/yM=;
 b=9J07zlo3Y/lv/CyTSpJmsSOQvOzAGDJMcDB6vFjwDkuvf8nrOJU8JvbHVtOazWFn3joKF6jnRIbFoGnBCJw2bGWR71xlKwIFngdUQk+KSZjxavAJSmB0cgp9g/YT6EMXOjpaiWxA5FNGajf2aq8evuQuseoA9YFkRNVmqjHE1ow=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Volodymyr Babchuk
	<Volodymyr_Babchuk@epam.com>, Michal Orzel <Michal.Orzel@arm.com>,
	"xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Subject: Re: [RFC PATCH] xen/build: Add cppcheck and cppcheck-html make rules
Thread-Topic: [RFC PATCH] xen/build: Add cppcheck and cppcheck-html make rules
Thread-Index: AQHYP279DnP7J8Edsk+NG7Po4Qnn9azP/EyAgAAUmoCAABRhgIAABP6A
Date: Fri, 25 Mar 2022 14:28:18 +0000
Message-ID: <052D20CA-ED64-452C-86A6-0B33343A7AC6@arm.com>
References:
 <77c79e86050eef2b706ee11e64183d57a0f5bcee.1648119732.git.bertrand.marquis@arm.com>
 <d797474e-97c0-7545-c68f-1378a3b2fbd9@suse.com>
 <E6DE6BBA-EBA6-4279-A79D-22942D6F5840@arm.com>
 <d9378506-1686-169a-0eb0-0076910e98bb@suse.com>
In-Reply-To: <d9378506-1686-169a-0eb0-0076910e98bb@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 64dad83a-e23e-482b-9d6e-08da0e6bbd1a
x-ms-traffictypediagnostic:
	AM9PR08MB6801:EE_|VE1EUR03FT004:EE_|AM5PR0802MB2514:EE_
X-Microsoft-Antispam-PRVS:
	<AM5PR0802MB25146DE74685B9668D5FE6609D1A9@AM5PR0802MB2514.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR08MB3784.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(6506007)(6486002)(26005)(186003)(53546011)(33656002)(2616005)(54906003)(71200400001)(2906002)(6916009)(508600001)(6512007)(64756008)(66556008)(66946007)(316002)(8936002)(66476007)(66446008)(76116006)(91956017)(5660300002)(4326008)(86362001)(8676002)(38070700005)(36756003)(122000001)(38100700002)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <00E3B731B91F1A459DF891CC64C8E617@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR08MB6801
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT004.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	ccc1dc85-e9eb-4dfc-4895-08da0e6bb508
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(70206006)(36756003)(70586007)(5660300002)(82310400004)(4326008)(508600001)(53546011)(81166007)(356005)(6506007)(8676002)(6512007)(33656002)(6486002)(316002)(6862004)(2616005)(8936002)(2906002)(47076005)(336012)(36860700001)(186003)(86362001)(26005)(40460700003)(54906003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 14:28:32.2200
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 64dad83a-e23e-482b-9d6e-08da0e6bbd1a
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT004.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0802MB2514

Hi Jan,

> On 25 Mar 2022, at 15:10, Jan Beulich <jbeulich@suse.com> wrote:
>=20
> On 25.03.2022 13:57, Bertrand Marquis wrote:
>>> On 25 Mar 2022, at 12:43, Jan Beulich <jbeulich@suse.com> wrote:
>>> On 24.03.2022 12:04, Bertrand Marquis wrote:
>>>> --- a/xen/include/xen/kconfig.h
>>>> +++ b/xen/include/xen/kconfig.h
>>>> @@ -8,6 +8,10 @@
>>>> * these only work with boolean option.
>>>> */
>>>>=20
>>>> +/* cppcheck is failing to parse the macro so use a dummy one */
>>>> +#ifdef CPPCHECK
>>>> +#define IS_ENABLED(option) option
>>>> +#else
>>>> /*
>>>> * Getting something that works in C and CPP for an arg that may or may
>>>> * not be defined is tricky.  Here, if we have "#define CONFIG_BOOGER 1=
"
>>>> @@ -27,5 +31,6 @@
>>>> * otherwise.
>>>> */
>>>> #define IS_ENABLED(option) config_enabled(option)
>>>> +#endif
>>>=20
>>> What are the consequences of this workaround on the code actually
>>> being checked? Does this perhaps lead to certain portions of code
>>> being skipped while checking?
>>=20
>> Cppcheck is not optimising the code but looking at the syntax so the
>> consequence here is that cppcheck is checking some code which might
>> be optimised out by the compiler. This is not optimal but still it shoul=
d
>> analyse properly the code.
>=20
> Aren't you saying so merely because all uses of IS_ENABLED() in our
> sources so far are in if()? It would seem to me that when used in #if
> (as can be found in Linux, which hence means could be the case in our
> tree as well sooner or later) sections of code might either be skipped
> or syntax errors may result. Or wait - IS_ENABLED() does itself kind
> of rely on the respective CONFIG_* to expand to a numeric value; when
> expanding to a string, I guess the compiler would also warn about the
> resulting construct when used in if() (and reject any uses with #if).

I am not quite sure I am following what you are saying (or asking).

I say that most use cases are if (IS_ENABLED(x)) so from the syntax point
of view it is ok to not do exactly as IS_ENABLED really does. And
cppcheck is checking the code not the result.
Now it would be better to do it right but the point of the patch is to enab=
le
cppcheck not make it perfect on the first shot.

Cheers
Bertrand

>=20
> Jan
>=20



From xen-devel-bounces@lists.xenproject.org Fri Mar 25 14:30:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 14:30:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294799.501432 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkxr-0005NV-Bi; Fri, 25 Mar 2022 14:30:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294799.501432; Fri, 25 Mar 2022 14:30:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXkxr-0005NO-8a; Fri, 25 Mar 2022 14:30:55 +0000
Received: by outflank-mailman (input) for mailman id 294799;
 Fri, 25 Mar 2022 14:30:54 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=73hT=UE=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nXkxq-0005NG-MC
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 14:30:54 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2d00ec0a-ac48-11ec-a405-831a346695d4;
 Fri, 25 Mar 2022 15:30:53 +0100 (CET)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2177.outbound.protection.outlook.com [104.47.17.177]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-30-4N7K-f0fPc-g6E4tGMo83Q-1; Fri, 25 Mar 2022 15:30:49 +0100
Received: from AS8PR04MB8609.eurprd04.prod.outlook.com (2603:10a6:20b:424::9)
 by VE1PR04MB6654.eurprd04.prod.outlook.com (2603:10a6:803:129::33)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17; Fri, 25 Mar
 2022 14:30:47 +0000
Received: from AS8PR04MB8609.eurprd04.prod.outlook.com
 ([fe80::5413:50c3:f5e8:d90f]) by AS8PR04MB8609.eurprd04.prod.outlook.com
 ([fe80::5413:50c3:f5e8:d90f%9]) with mapi id 15.20.5102.018; Fri, 25 Mar 2022
 14:30:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2d00ec0a-ac48-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648218653;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=RcMAAhdZCotWsPuQHx6W3jbutQvXH9hJ2Q2bCP+o778=;
	b=MyAR4OK/Iukg+DMk6x9pBX0b4TgD9xHql+A/NAmNc8GDt7qvyNYddFYfglyDEyD/+wUY2n
	WKseB8AlNuUNkw0eWXXGjRAXRK1kEqZXfMAUwchO0ED7eLTXCV/u9Br3Geojxia72j7fXb
	H84QRMWdTW4s6USFA0+PY3g9WGxSdjY=
X-MC-Unique: 4N7K-f0fPc-g6E4tGMo83Q-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=FUJfI7EFRaDu33eAiv9awdvOYkeVGERjSw8xM8evP2aqovr0y3IB430BT6z0B8kT+gw0p/0zaYsdMiem7Mj/fLM/LzR/J+oZeO8KTwiXLiHTcHGq+4U4RJ35qdqCTAg9Lv0tBSuup0LOhZ5hxP3mUhwhVIelYDPEhsWCsa0d5gwtbShmx/V1Md6jucmuAT1qghaI2OgPQ52L7arUeRZNGv4jDNFmTUILfYn8g89pLDma78605ABOhrbZ0acKG2CUT4RmLSrIbLngPIgJkLdfBJga0ibdeqWaHrD6jPlCIOoFeMIGLh4/amk3sFFmJRn0WLF1eg5OgzN4iycwinVwrw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=RcMAAhdZCotWsPuQHx6W3jbutQvXH9hJ2Q2bCP+o778=;
 b=PaYziWJ1unFeJD8VU+QCO6tFRVl2dlpSes5rIqp/HLfpglys4icNJEeOJ/SPmhK1Tv5q/gHKJ8F7AdFEXf4zpDG6zC5UdhmypYhX2Gqc8HaaUwSX1V/OiUN6uCXU5FaLtuVTPQQrkjLtuqjDQySk9KNNwuB2WqreM80H6afe/mA65auaws9rrW/5RU67UBqU7yCq1rmY3tbN5fu7QpMBZTVLsme3tMf7SeT+9EB4wyhMbkvte5isI9KptAsJyn2x8IHXU+cZoUNY1vBlw/ky1/IuEK0qk4QeY5i52O1wvjGpS9npPGutX5bQ/4ZrRpgJrOA7eGH0E/zg6iHZr0xUtg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <af599193-441d-b02f-c747-328576ab50f9@suse.com>
Date: Fri, 25 Mar 2022 15:30:45 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [RFC PATCH] xen/build: Add cppcheck and cppcheck-html make rules
Content-Language: en-US
To: Bertrand Marquis <Bertrand.Marquis@arm.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Michal Orzel <Michal.Orzel@arm.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <77c79e86050eef2b706ee11e64183d57a0f5bcee.1648119732.git.bertrand.marquis@arm.com>
 <d797474e-97c0-7545-c68f-1378a3b2fbd9@suse.com>
 <E6DE6BBA-EBA6-4279-A79D-22942D6F5840@arm.com>
 <d9378506-1686-169a-0eb0-0076910e98bb@suse.com>
 <052D20CA-ED64-452C-86A6-0B33343A7AC6@arm.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <052D20CA-ED64-452C-86A6-0B33343A7AC6@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR07CA0026.eurprd07.prod.outlook.com
 (2603:10a6:20b:46c::31) To AS8PR04MB8609.eurprd04.prod.outlook.com
 (2603:10a6:20b:424::9)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 1a8cfc87-6f27-48ba-1527-08da0e6c0d82
X-MS-TrafficTypeDiagnostic: VE1PR04MB6654:EE_
X-Microsoft-Antispam-PRVS:
	<VE1PR04MB66546E73433D9090E1D4E3C0B31A9@VE1PR04MB6654.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AS8PR04MB8609.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(54906003)(31696002)(508600001)(6506007)(6512007)(26005)(53546011)(186003)(2616005)(83380400001)(6486002)(36756003)(6916009)(31686004)(8936002)(66946007)(2906002)(86362001)(66556008)(38100700002)(66476007)(4326008)(8676002)(5660300002)(316002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?NGpUNGhsT0pnRmlycW5xeTg1QWdUZVpKYmV0WVI5TWFHU2J5TWZGZHFjZ014?=
 =?utf-8?B?eHZmUmdjekh6cmZQOWdkVXJ4VWJJWUZodlRpbldqR2kxd1hlbnpkSlFBZlRX?=
 =?utf-8?B?azA0elhDWUxZUElVbnloVkkyYW4rQURuZVZHTkRSZ1dFWThTZWNhWUcrQmRk?=
 =?utf-8?B?RFREU1I4WklRWjdQSkJuWHN2d3dJUThoYmtnVTMzTVNXTURaaHFKOXFrakhm?=
 =?utf-8?B?cGZkSkxIdmNNclRkWGc0TUFLaUk5MXA5b2srVS9UWDd5bjU2QW9VSEpaU0RN?=
 =?utf-8?B?YjI3S0hPL1V6ekMzcUdabXhYcDdnU2ZqdFlZbU5KcVNINm5vYVJjaWg0RE9D?=
 =?utf-8?B?R3FyaU1XQ1IyR2p2Rm5XWlhESVFoUS9hU21NQjlqdFFwV003eURYUjRKRzMz?=
 =?utf-8?B?SnpiMzhlY2JuL0lnZmNXSnMwaWVIWkt0bXdyRjMxVUtJczR1b3BUalIzeDg4?=
 =?utf-8?B?S1JmSEdLWGtkaDlxU2RyWTVUcmEwMXd5RFhmMHpaK1dnQU9MNHdvQ0hHdFBW?=
 =?utf-8?B?NTJZdjM3ZUxmYVBIZzZVeTFKQ3AxNEFERTNNdkpLTGdGTHFEdU15d2UrZUZZ?=
 =?utf-8?B?Z3NRMzNwYks2K3IrcWx2a3lkRlVSa3RUVi9GT3hjYjRlSmVndFJSUVlsTkFp?=
 =?utf-8?B?cDlleGptZzg2NkZnOXJWUUJEOC9pelVkNXR1aWVLY2JJQ0IxNUFZMFVEQlIv?=
 =?utf-8?B?WXhrQkJrSHU2Zm9KdW95NWR3K1ZsMmtNVmJvdHRrRXZSNU4xUjgvTnFzQU9P?=
 =?utf-8?B?ZC91c0FaUTVlM1pMaWZENndlZlJQdlhlR1l1aXlyQ1JQVUlaeFdPbUp3ajU1?=
 =?utf-8?B?SzA1c0VTMVBadVhiR1diVzF5d3BHeXNyZDAzc1NRL3NHdUZvZXIySzJJdmdT?=
 =?utf-8?B?dVFJQVAxTGhFU3NYd3FMdzBHSmhlcDhKS2FFTStoRDFQZ2N4SjJBekhneDN5?=
 =?utf-8?B?Z1M0U2xuYk5PNGFRR0cxd3cxRlUzdDJEMkFvdTBiQ3VqWGx6ZkxQRGZ4L044?=
 =?utf-8?B?cFZHMEFlZU44OXNwZi9CM09JL2VGOWt5RFdtZGwyRDNiamhoSHJBZENYWk5x?=
 =?utf-8?B?a1Ezakk4NjVicElBT2plZ00rM3Bxak1nYkpxUFlBS3JNL3VLZnprYmk4Z0xo?=
 =?utf-8?B?ckpBL1pzNXZXa3kvKzNGQTU3ZGttSE9QaUZHV0U5enpkM1c5ZkhheEk4dnBK?=
 =?utf-8?B?VWlIWisxajJLMHRWUzM1OE5CM283L25lQkl0U0MyWkd6QlNwTXlLdFpaMmd1?=
 =?utf-8?B?eTZRbjVnQ2tzblE2SjZGb043bHJ2OU9iOVltVzYwVFRMZ2puNGZCUlJVR2pX?=
 =?utf-8?B?QThtRjVPOWlXMnFidkFydEJrNGFmYS83WklERkNyK080a0NiUTBBUjVJUXhs?=
 =?utf-8?B?RGpBejc0MERwRTZZVkdSYXdac0pka1huWVVzTURVYmFzMkVRVisrRjZ4bEE2?=
 =?utf-8?B?R1QvaFZBWERNTHhpeERvU0kySXlZNXpDdEUxanNqS0hlSjcxLzBCSExOSytv?=
 =?utf-8?B?Z0RSbFhUZmJzdVBOWjF6VU1rcWlRU2VRNVJ6UENrdFkrK0ROSDNiYkZkTDcr?=
 =?utf-8?B?Z1o3MXExTXhwckZjMlNJQm02Y0txOTZQZE1wRVpRbUEwVWthalJZeXhEbWFy?=
 =?utf-8?B?UnFPR3ZheVkyWjBlSEtLc3BnelNuellnaVpSMUxuVTZtQjFmNTRQenVibkZM?=
 =?utf-8?B?bnBqbFRyUmVBV1ozV1RxUDlOd3pJTHd4cUdrSmR2alNQbnlpVjN4SmdEdDNr?=
 =?utf-8?B?dVRJVEUvTmIzZDk1RDdzNGVYaFJZSnEwQkdRRFhUcnhpV2k1TlMxaExZd1dC?=
 =?utf-8?B?SlNIM3hpTnd6eGNCS3RCSndZb3JVOER6SjdvaWgwNjh3eklNbE1wbzFETWZJ?=
 =?utf-8?B?Z2VXRWJyQW5PNE9YUWFWdThBUVZFbW43b3Rldjd1RHRwRUpjUzRGekFBeVZU?=
 =?utf-8?Q?nchBhamCx5Wq9vCgL+HrGx2WhnIB3XQB?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1a8cfc87-6f27-48ba-1527-08da0e6c0d82
X-MS-Exchange-CrossTenant-AuthSource: AS8PR04MB8609.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 14:30:47.4263
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 9UJUkV/NTGpIUaIsU9XREzbYO6gTU8EX0mS+v/0ZPfptXzYNEwUU9tqvsIh6Dg/YySjOlFDrJ13Kl/xzOkDZMA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR04MB6654

On 25.03.2022 15:28, Bertrand Marquis wrote:
>> On 25 Mar 2022, at 15:10, Jan Beulich <jbeulich@suse.com> wrote:
>> On 25.03.2022 13:57, Bertrand Marquis wrote:
>>>> On 25 Mar 2022, at 12:43, Jan Beulich <jbeulich@suse.com> wrote:
>>>> On 24.03.2022 12:04, Bertrand Marquis wrote:
>>>>> --- a/xen/include/xen/kconfig.h
>>>>> +++ b/xen/include/xen/kconfig.h
>>>>> @@ -8,6 +8,10 @@
>>>>> * these only work with boolean option.
>>>>> */
>>>>>
>>>>> +/* cppcheck is failing to parse the macro so use a dummy one */
>>>>> +#ifdef CPPCHECK
>>>>> +#define IS_ENABLED(option) option
>>>>> +#else
>>>>> /*
>>>>> * Getting something that works in C and CPP for an arg that may or may
>>>>> * not be defined is tricky.  Here, if we have "#define CONFIG_BOOGER 1"
>>>>> @@ -27,5 +31,6 @@
>>>>> * otherwise.
>>>>> */
>>>>> #define IS_ENABLED(option) config_enabled(option)
>>>>> +#endif
>>>>
>>>> What are the consequences of this workaround on the code actually
>>>> being checked? Does this perhaps lead to certain portions of code
>>>> being skipped while checking?
>>>
>>> Cppcheck is not optimising the code but looking at the syntax so the
>>> consequence here is that cppcheck is checking some code which might
>>> be optimised out by the compiler. This is not optimal but still it should
>>> analyse properly the code.
>>
>> Aren't you saying so merely because all uses of IS_ENABLED() in our
>> sources so far are in if()? It would seem to me that when used in #if
>> (as can be found in Linux, which hence means could be the case in our
>> tree as well sooner or later) sections of code might either be skipped
>> or syntax errors may result. Or wait - IS_ENABLED() does itself kind
>> of rely on the respective CONFIG_* to expand to a numeric value; when
>> expanding to a string, I guess the compiler would also warn about the
>> resulting construct when used in if() (and reject any uses with #if).
> 
> I am not quite sure I am following what you are saying (or asking).

I first tried to clarify what I'm concerned about, but then said that
apparently there is no reason to be concerned. I'm sorry if this didn't
come across quite clear enough. Bottom line - no request for any
change here.

Jan

> I say that most use cases are if (IS_ENABLED(x)) so from the syntax point
> of view it is ok to not do exactly as IS_ENABLED really does. And
> cppcheck is checking the code not the result.
> Now it would be better to do it right but the point of the patch is to enable
> cppcheck not make it perfect on the first shot.
> 
> Cheers
> Bertrand
> 
>>
>> Jan
>>
> 



From xen-devel-bounces@lists.xenproject.org Fri Mar 25 14:36:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 14:36:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294802.501443 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXl2p-00061D-0D; Fri, 25 Mar 2022 14:36:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294802.501443; Fri, 25 Mar 2022 14:36:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXl2o-000616-TO; Fri, 25 Mar 2022 14:36:02 +0000
Received: by outflank-mailman (input) for mailman id 294802;
 Fri, 25 Mar 2022 14:36:01 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wXB3=UE=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nXl2n-000610-NQ
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 14:36:01 +0000
Received: from EUR03-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur03on0600.outbound.protection.outlook.com
 [2a01:111:f400:fe0a::600])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e3c82654-ac48-11ec-a405-831a346695d4;
 Fri, 25 Mar 2022 15:36:01 +0100 (CET)
Received: from AM6P191CA0043.EURP191.PROD.OUTLOOK.COM (2603:10a6:209:7f::20)
 by AM8PR08MB5617.eurprd08.prod.outlook.com (2603:10a6:20b:1dc::18) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.18; Fri, 25 Mar
 2022 14:35:48 +0000
Received: from AM5EUR03FT029.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:7f:cafe::de) by AM6P191CA0043.outlook.office365.com
 (2603:10a6:209:7f::20) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.18 via Frontend
 Transport; Fri, 25 Mar 2022 14:35:48 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT029.mail.protection.outlook.com (10.152.16.150) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Fri, 25 Mar 2022 14:35:47 +0000
Received: ("Tessian outbound 63bb5eb69ee8:v113");
 Fri, 25 Mar 2022 14:35:47 +0000
Received: from 43d7e1c9a2f0.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 97B7A767-8456-4529-858F-05931D91F917.1; 
 Fri, 25 Mar 2022 14:35:41 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 43d7e1c9a2f0.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 25 Mar 2022 14:35:41 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com (2603:10a6:20b:85::25)
 by DBBPR08MB4647.eurprd08.prod.outlook.com (2603:10a6:10:f1::18) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.18; Fri, 25 Mar
 2022 14:35:39 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62]) by AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62%3]) with mapi id 15.20.5102.018; Fri, 25 Mar 2022
 14:35:39 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e3c82654-ac48-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=TMsahgJoPgSUBzoOQKip4Nt31Wd5X598W91iqKan1rk=;
 b=6X5R14mh8avjkD02CinaUt7F0+fEkiFULFiopS24gjEQsR3SBZkfMqLE+vdNF8MtkQxHt+DD7Xp9YphkD048vcnhx46uQwZFQ3d4PqbeTA32X7XDGdulti+nIDPa0CiUpLloNW81+7RFKh+gdHlfE5CpNdC3mfDfWzh5cOeSZPQ=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: f01c872413269bbc
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ntaPAXQjPKmp43sFpw0A3agh9V8IP7JzUZ73NhXThh+N0kJizsMnCFEy3GTZ5a6SVaXK2l83ocJ4EtCaFfBk4HkcCJXvxnwSvvuwdCi1Xsa8lyex1U6/7lRU7nyy98znVQO/XyY6VeXkOByMOfq2HdV32vnEoZR4vCzZM+jmjZR3BcnKw5cujGfe4rrvUw8KoEsdW6DlNimPECpGN8QjVepNee1RtDDy9P0kxOEwI2OyHrK63738dRgUr+N//KBhYhpeJFBgkihDwwJjoKruo2rsLmqh7t4s7fIfN/PJmgtl3WIBxY8jg5vL9Kw6ZVkmFxbGhYWuoFOFh5ik53fptA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=TMsahgJoPgSUBzoOQKip4Nt31Wd5X598W91iqKan1rk=;
 b=b99+CnMCOdbchPjFgeUgcRKCqoYQir9kgG86WGA7sULYbAHYLULvc5CYjNJucKEXNOep5bUa9cD9bOFp4ddDvALU9CFtDwZQGzgrkNU6Occg624uK5T1+EOhyNSu+chDG4cjhH6i7lLQ4S+APb0rCaAoprnF+csNlNuK4LCL0LRuOQ32WC4+KBFwK/bxvOWS74hP2vJ99mMvpXexc475DBACorFOQkCDocM3mUnL79dWGrX9bWgjL3gDVED2NGhF21060c8ZuoEj71G+TwQ+yDXPb/nhb/keiNVChY/78C7Z6D0rMGQdDFpEy0oBTSheiuIPdUAZ6H6zOFKh6jtkmA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=TMsahgJoPgSUBzoOQKip4Nt31Wd5X598W91iqKan1rk=;
 b=6X5R14mh8avjkD02CinaUt7F0+fEkiFULFiopS24gjEQsR3SBZkfMqLE+vdNF8MtkQxHt+DD7Xp9YphkD048vcnhx46uQwZFQ3d4PqbeTA32X7XDGdulti+nIDPa0CiUpLloNW81+7RFKh+gdHlfE5CpNdC3mfDfWzh5cOeSZPQ=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Julien Grall <julien@xen.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	"marco.solieri@minervasys.tech" <marco.solieri@minervasys.tech>,
	"lucmiccio@gmail.com" <lucmiccio@gmail.com>, Julien Grall
	<jgrall@amazon.com>, Stefano Stabellini <sstabellini@kernel.org>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH early-RFC 4/5] xen/arm: mm: Rework switch_ttbr()
Thread-Topic: [PATCH early-RFC 4/5] xen/arm: mm: Rework switch_ttbr()
Thread-Index: AQHYM6fbReeSkSu3okSScrrMlkjRu6zQNoyAgAAKUgCAAAMDAA==
Date: Fri, 25 Mar 2022 14:35:38 +0000
Message-ID: <7069C935-A275-4D1A-80EF-C20DE1D3103C@arm.com>
References: <20220309112048.17377-1-julien@xen.org>
 <20220309112048.17377-5-julien@xen.org>
 <140E78FF-8281-48BA-BE13-C4B3E12F34A5@arm.com>
 <9673f201-080b-8800-65a2-144d21b030fd@xen.org>
In-Reply-To: <9673f201-080b-8800-65a2-144d21b030fd@xen.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 897746ee-9414-47ff-7e49-08da0e6cc0ab
x-ms-traffictypediagnostic:
	DBBPR08MB4647:EE_|AM5EUR03FT029:EE_|AM8PR08MB5617:EE_
X-Microsoft-Antispam-PRVS:
	<AM8PR08MB5617CFCE9870B5ED23A43DBD9D1A9@AM8PR08MB5617.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR08MB3784.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(6506007)(26005)(6512007)(186003)(53546011)(91956017)(2616005)(38070700005)(66556008)(83380400001)(8936002)(2906002)(5660300002)(8676002)(64756008)(508600001)(66446008)(66946007)(76116006)(71200400001)(6486002)(66476007)(54906003)(4326008)(6916009)(316002)(36756003)(122000001)(38100700002)(86362001)(33656002)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <AF3CC7E9E6653441AADB48DC10A154D3@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB4647
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT029.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	9c222c24-4caf-48cd-f0c0-08da0e6cbb85
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(70206006)(316002)(86362001)(508600001)(70586007)(47076005)(36860700001)(4326008)(336012)(6506007)(107886003)(6486002)(2616005)(8676002)(83380400001)(40460700003)(33656002)(36756003)(2906002)(8936002)(356005)(6862004)(26005)(5660300002)(186003)(54906003)(53546011)(6512007)(81166007)(82310400004);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 14:35:47.7442
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 897746ee-9414-47ff-7e49-08da0e6cc0ab
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT029.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM8PR08MB5617
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==


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 14:36:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 14:36:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294804.501454 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXl3O-0006Ww-9O; Fri, 25 Mar 2022 14:36:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294804.501454; Fri, 25 Mar 2022 14:36:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXl3O-0006Wp-6J; Fri, 25 Mar 2022 14:36:38 +0000
Received: by outflank-mailman (input) for mailman id 294804;
 Fri, 25 Mar 2022 14:36:36 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nXl3M-0006Wh-FF
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 14:36:36 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXl3L-0004Dz-VK; Fri, 25 Mar 2022 14:36:35 +0000
Received: from [54.239.6.185] (helo=[192.168.14.36])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXl3L-0007kl-Og; Fri, 25 Mar 2022 14:36:35 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=rzJPslBtc3PadIwGyMb+lS2NUMN+fzzhffEYf4AfL94=; b=xMS6xVRKWItA9GB5DEKL/Oa09o
	CIMeHzILhNx73yYAGd+XyVEzHreweFTgju2S2TPtbN0SlPk073Hqb0ruJbqNlX4xMM6LTSX9gsi/0
	KsYI3BHrXLjEPLu7k78p6p2smFsRsV/fcw6a68uzgDce4YhxZoUpEY3DfXFSRjIHk5wI=;
Message-ID: <f2fcee1f-a964-045b-3fc1-db0fccb847a3@xen.org>
Date: Fri, 25 Mar 2022 14:36:33 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH early-RFC 2/5] xen/arm64: Rework the memory layout
To: Bertrand Marquis <Bertrand.Marquis@arm.com>
Cc: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 "marco.solieri@minervasys.tech" <marco.solieri@minervasys.tech>,
 "lucmiccio@gmail.com" <lucmiccio@gmail.com>, Julien Grall
 <jgrall@amazon.com>, Stefano Stabellini <sstabellini@kernel.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
References: <20220309112048.17377-1-julien@xen.org>
 <20220309112048.17377-3-julien@xen.org>
 <DE3C6104-82AD-41AE-BDAA-0074A08DDECF@arm.com>
 <cf150c85-34cb-73fb-9808-0338de546271@xen.org>
 <4384DB81-5692-4F04-AA21-387B11A88C6E@arm.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <4384DB81-5692-4F04-AA21-387B11A88C6E@arm.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi,

On 25/03/2022 14:05, Bertrand Marquis wrote:
>> On 25 Mar 2022, at 14:35, Julien Grall <julien@xen.org> wrote:
>>
>>
>>
>> On 25/03/2022 13:17, Bertrand Marquis wrote:
>>> Hi Julien,
>>
>> Hi,
>>
>>>> On 9 Mar 2022, at 12:20, Julien Grall <julien@xen.org> wrote:
>>>>
>>>> From: Julien Grall <jgrall@amazon.com>
>>>>
>>>> Xen is currently not fully compliant with the Arm because it will
>>> I think you wanted to say “arm arm” her.
>>
>> Yes. I will update it.
>>
>>>> switch the TTBR with the MMU on.
>>>>
>>>> In order to be compliant, we need to disable the MMU before
>>>> switching the TTBR. The implication is the page-tables should
>>>> contain an identity mapping of the code switching the TTBR.
>>>>
>>>> If we don't rework the memory layout, we would need to find a
>>>> virtual address that matches a physical address and doesn't clash
>>>> with the static virtual regions. This can be a bit tricky.
>>> This sentence is a bit misleading. Even with the rework you need
>>> to do that just by moving the Xen virtual address upper you make
>>> sure that anything physical memory under 512GB can be mapped
>>> 1:1 without clashing with other Xen mappings (unless Xen is loaded
>>> in memory at physical address 512GB which would end in the same issue).
>>
>> So the key difference is with the rework, it is trivial to create the 1:1 mapping as we know it doesn't clash. This is not the case without the rework.
> 
> Agree
> 
>>
>>> I think should be rephrased.
>>
>> I am not entirely sure how to rephrase it. Do you have a proposal?
> 
> Turn it into the positive:
> Rework the memory layout to put Xen over 512GB. This makes it trivial to create
> a 1:1 mapping, with the assumption that the physical memory is under 512GB.

I will use this wording in the next version.

>>>> be loaded at (512GB + 2MB). This requires a slight tweak of the boot
>>>> code as XEN_VIRT_START cannot be used as an immediate.
>>>>
>>>> Signed-off-by: Julien Grall <jgrall@amazon.com>
>>>>
>>>> ---
>>>>
>>>>     TODO:
>>>>         - I vaguely recall that one of the early platform we supported add
>>>>           the memory starting in high memory (> 1TB). I need to check
>>>>           whether the new layout will be fine.
>>> I think we have some Juno with some memory like that, tell me if you need help here.
>>
>> Would you be able to check the memory layout and confirm?
> 
> I checked and the Juno we have as the high memory a lot lower than that:
> RAM: 0000000880000000 - 00000009ffffffff
> 
> No idea why it was a lot higher in my mind.

I have only encountered one board with the memory over 512GB. I can't 
remember whether it is AMD Seattle or X-Gene.

> 
>>
>>>>         - Update the documentation to reflect the new layout
>>>> ---
>>>> xen/arch/arm/arm64/head.S         |  3 ++-
>>>> xen/arch/arm/include/asm/config.h | 20 ++++++++++++++------
>>>> xen/arch/arm/mm.c                 | 14 +++++++-------
>>>> 3 files changed, 23 insertions(+), 14 deletions(-)
>>>>
>>>> diff --git a/xen/arch/arm/arm64/head.S b/xen/arch/arm/arm64/head.S
>>>> index 66d862fc8137..878649280d73 100644
>>>> --- a/xen/arch/arm/arm64/head.S
>>>> +++ b/xen/arch/arm/arm64/head.S
>>>> @@ -594,7 +594,8 @@ create_page_tables:
>>>>           * need an additional 1:1 mapping, the virtual mapping will
>>>>           * suffice.
>>>>           */
>>>> -        cmp   x19, #XEN_VIRT_START
>>>> +        ldr   x0, =XEN_VIRT_START
>>>> +        cmp   x19, x0
>>> A comment in the code would be good here to prevent someone reverting this.
>>
>> Anyone trying to revert the change will face a compilation error:
>>
>>   CC      arch/arm/arm64/head.o
>> arch/arm/arm64/head.S: Assembler messages:
>> arch/arm/arm64/head.S:597: Error: immediate out of range
>>
>> So I don't think a comment is necessary because this is not specific to a compiler/assembler.
> 
> Right I should have thought of the compilation error.

TBH, I would have preferred to keep the single instruction. AFAICT, the 
immediate should be either between 0 - 4095. Or a number between 4096 
and 2^24 that is 4KB aligned.

So it would not suit us here.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 14:42:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 14:42:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294809.501465 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXl9P-00087v-1y; Fri, 25 Mar 2022 14:42:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294809.501465; Fri, 25 Mar 2022 14:42:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXl9O-00087o-UF; Fri, 25 Mar 2022 14:42:50 +0000
Received: by outflank-mailman (input) for mailman id 294809;
 Fri, 25 Mar 2022 14:42:49 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nXl9N-00087i-0q
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 14:42:49 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXl9M-0004KT-M8; Fri, 25 Mar 2022 14:42:48 +0000
Received: from [54.239.6.185] (helo=[192.168.14.36])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXl9M-00083x-Fa; Fri, 25 Mar 2022 14:42:48 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=ozA0/rwKzYE3SvgEUoHF1QlHX1c7NYNyyUnLKY/gcGI=; b=kjOoDbysp91ePWL7bTHybR8KAW
	4CtEtjy28IPwWpViKoqIrZlxXgfPrOQcLRWfpnJXAV7Wc8iWPlBLVZE0yfBpP8I3/4gqjlZJBqqCJ
	BPbO9osV+cBksWCh8+VK+2W5aCFwlnCtr+CCxYo8S+GCShL2ofzcZOkhI2vp6gYPg31w=;
Message-ID: <284b300e-d400-4bd7-0b0e-aa53983d6ee8@xen.org>
Date: Fri, 25 Mar 2022 14:42:46 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH early-RFC 4/5] xen/arm: mm: Rework switch_ttbr()
To: Bertrand Marquis <Bertrand.Marquis@arm.com>
Cc: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 "marco.solieri@minervasys.tech" <marco.solieri@minervasys.tech>,
 "lucmiccio@gmail.com" <lucmiccio@gmail.com>, Julien Grall
 <jgrall@amazon.com>, Stefano Stabellini <sstabellini@kernel.org>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
References: <20220309112048.17377-1-julien@xen.org>
 <20220309112048.17377-5-julien@xen.org>
 <140E78FF-8281-48BA-BE13-C4B3E12F34A5@arm.com>
 <9673f201-080b-8800-65a2-144d21b030fd@xen.org>
 <7069C935-A275-4D1A-80EF-C20DE1D3103C@arm.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <7069C935-A275-4D1A-80EF-C20DE1D3103C@arm.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi Bertrand,

On 25/03/2022 14:35, Bertrand Marquis wrote:
>> On 25 Mar 2022, at 15:24, Julien Grall <julien@xen.org> wrote:
>> On 25/03/2022 13:47, Bertrand Marquis wrote:
>>> Hi Julien,
>>
>> Hi Bertrand,
>>
>>>> On 9 Mar 2022, at 12:20, Julien Grall <julien@xen.org> wrote:
>>>>
>>>> From: Julien Grall <jgrall@amazon.com>
>>>>
>>>> At the moment, switch_ttbr() is switching the TTBR whilst the MMU is
>>>> still on.
>>>>
>>>> Switching TTBR is like replacing existing mappings with new ones. So
>>>> we need to follow the break-before-make sequence.
>>>>
>>>> In this case, it means the MMU needs to be switched off while the
>>>> TTBR is updated. In order to disable the MMU, we need to first
>>>> jump to an identity mapping.
>>>>
>>>> Rename switch_ttbr() to switch_ttbr_id() and create an helper on
>>>> top to temporary map the identity mapping and call switch_ttbr()
>>>> via the identity address.
>>>>
>>>> switch_ttbr_id() is now reworked to temporarily turn off the MMU
>>>> before updating the TTBR.
>>>>
>>>> We also need to make sure the helper switch_ttbr() is part of the
>>>> identity mapping. So move _end_boot past it.
>>>>
>>>> Take the opportunity to instruction cache flush as the operation is
>>>> only necessary when the memory is updated.
>>> Your code is actually remove the instruction cache invalidation so
>>> this sentence is a bit misleading.
>>
>> I forgot to add the word "remove" in the sentence.
> 
> Ok (my sentence was also wrong by the way)
> 
>>
>>> Also an open question: shouldn’t we flush the data cache ?
>> Do you mean clean/invalidate to PoC/PoU? Something else?
> 
> Yes, probably to PoU.
> 
>>
>>> As we switch from one TTBR to an other, there might be some data
>>> in the cache dependent that could be flushed while the MMU is off
>>
>> I am a bit confused. Those flush could also happen with the MMU on. So how turning off the MMU would result to a problem? Note that the data cache is still enabled during the switch.
> 
> If the first level of cache is VIPT and we turn off the MMU, I am wondering if this could not create troubles and could require the cache to be flushed before turning the MMU off.
My reading of the Arm Arm (D5.11.1 "Data and unified caches" ARM DDI 
0487F.c) suggests the data cache is always PIPT.

> I have no idea if this is a problem or not, just raising the question.
> I can try to dig on that at Arm when I am back in 10 days.

Enjoy it!

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 14:48:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 14:48:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294812.501476 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXlEh-0000Pw-MP; Fri, 25 Mar 2022 14:48:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294812.501476; Fri, 25 Mar 2022 14:48:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXlEh-0000Pp-Ir; Fri, 25 Mar 2022 14:48:19 +0000
Received: by outflank-mailman (input) for mailman id 294812;
 Fri, 25 Mar 2022 14:48:19 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wXB3=UE=arm.com=Bertrand.Marquis@srs-se1.protection.inumbo.net>)
 id 1nXlEg-0000Pj-QD
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 14:48:19 +0000
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur02on0606.outbound.protection.outlook.com
 [2a01:111:f400:fe05::606])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 9b3287fd-ac4a-11ec-a405-831a346695d4;
 Fri, 25 Mar 2022 15:48:17 +0100 (CET)
Received: from AM7PR03CA0010.eurprd03.prod.outlook.com (2603:10a6:20b:130::20)
 by VI1PR08MB4077.eurprd08.prod.outlook.com (2603:10a6:803:e0::31)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Fri, 25 Mar
 2022 14:48:14 +0000
Received: from AM5EUR03FT005.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:130:cafe::6b) by AM7PR03CA0010.outlook.office365.com
 (2603:10a6:20b:130::20) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17 via Frontend
 Transport; Fri, 25 Mar 2022 14:48:14 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT005.mail.protection.outlook.com (10.152.16.146) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Fri, 25 Mar 2022 14:48:13 +0000
Received: ("Tessian outbound 31aeb3346a45:v113");
 Fri, 25 Mar 2022 14:48:13 +0000
Received: from 9a90ddfca9e3.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 2FCF7F24-C89C-4D46-BCB7-F363EDE459F1.1; 
 Fri, 25 Mar 2022 14:48:06 +0000
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 9a90ddfca9e3.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Fri, 25 Mar 2022 14:48:06 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com (2603:10a6:20b:85::25)
 by PA4PR08MB5885.eurprd08.prod.outlook.com (2603:10a6:102:e6::22)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.18; Fri, 25 Mar
 2022 14:48:03 +0000
Received: from AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62]) by AM6PR08MB3784.eurprd08.prod.outlook.com
 ([fe80::c9ab:6cb2:6d11:ac62%3]) with mapi id 15.20.5102.018; Fri, 25 Mar 2022
 14:48:03 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9b3287fd-ac4a-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=f0U5h84ezaMZ6fuwF6LeDe+OV1NZEjkrjr9phZt8bWw=;
 b=WbiNsMWIf+YmrzwO1IZn8/bEjDIK0yz+soQvKXCr/dASpVcLgHMslVt0Csvbn2+n869+6iOiKkOvkQuapuyeJ16mb+ljnVv6BuoE5vCnC/AB1PJ+VTNEIul6J0mfRjumoCRQKnnrHqufg3XvMbr6tvXmbz6Dhp+in4ga3Bj+//E=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 99953b8a7dc6ee10
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=E24VVJJ2NmwuChi83/nU+2hMwu/1FNMUJ+k2tggj1OEwwKo5paLJDzoPFiNZtzCyivAzrAUnVp+hITA+Zul9qobJHH2G48GorUXh1Min9vf3JwhTwZxLXHSFalu6uzBUfnDqM457X7QQQgSepsXT/r/rA7i22mXl13ePpj8Hh4q9AXVqR6zuhD5XAztXNyzx4S5Owdlkh2FefX7dU2L03jumitPr5H+A72TcEvJDVJ2EjV6jA6+2CTWoZk/r/trsZbIww9Vtcs+8BiIzJwqoGcY4xa8rh9cus5cuq6fiGJN0Jm+oZdQTdjHLbfJ073pmxreT81tUw/Y6wzCIwqn0vA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=f0U5h84ezaMZ6fuwF6LeDe+OV1NZEjkrjr9phZt8bWw=;
 b=Mht6IoOgHhvLq0q2H5swsye1HaQIIvxQCu7hUSedNjCV6pEW8TUVPii/VF6g8ufDNUutZKS1/citXqgACkvBUqsFLb1hsqJKXmsuWZXXLLdJ0UUhoRJrSaTAQFRIQ2UuITiWyzCBIaBRuv5Camw48/LcQPmkTDaia2SjPpqH/ITG29Sue4cOh2AXL16LyV+2XpzSx3coIUlEaw3ffUfjQNNjS2Mq2YgNtK2XtVZDdQZ8ELkXmz/Z70+lNSRNabe9NkttT4YtuWOcPkqG31U5TmSEL4RCkNYLvOlbvDfPip8DXS/CLj8wMM/G+8WNjPSe/Rgsm2B0ONM/efvSyawsBQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=f0U5h84ezaMZ6fuwF6LeDe+OV1NZEjkrjr9phZt8bWw=;
 b=WbiNsMWIf+YmrzwO1IZn8/bEjDIK0yz+soQvKXCr/dASpVcLgHMslVt0Csvbn2+n869+6iOiKkOvkQuapuyeJ16mb+ljnVv6BuoE5vCnC/AB1PJ+VTNEIul6J0mfRjumoCRQKnnrHqufg3XvMbr6tvXmbz6Dhp+in4ga3Bj+//E=
From: Bertrand Marquis <Bertrand.Marquis@arm.com>
To: Julien Grall <julien@xen.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	"marco.solieri@minervasys.tech" <marco.solieri@minervasys.tech>,
	"lucmiccio@gmail.com" <lucmiccio@gmail.com>, Julien Grall
	<jgrall@amazon.com>, Stefano Stabellini <sstabellini@kernel.org>, Volodymyr
 Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [PATCH early-RFC 4/5] xen/arm: mm: Rework switch_ttbr()
Thread-Topic: [PATCH early-RFC 4/5] xen/arm: mm: Rework switch_ttbr()
Thread-Index: AQHYM6fbReeSkSu3okSScrrMlkjRu6zQNoyAgAAKUgCAAAMDAIAAAf4AgAABeAA=
Date: Fri, 25 Mar 2022 14:48:03 +0000
Message-ID: <099CD8F1-C92A-4402-897F-538821AD66EE@arm.com>
References: <20220309112048.17377-1-julien@xen.org>
 <20220309112048.17377-5-julien@xen.org>
 <140E78FF-8281-48BA-BE13-C4B3E12F34A5@arm.com>
 <9673f201-080b-8800-65a2-144d21b030fd@xen.org>
 <7069C935-A275-4D1A-80EF-C20DE1D3103C@arm.com>
 <284b300e-d400-4bd7-0b0e-aa53983d6ee8@xen.org>
In-Reply-To: <284b300e-d400-4bd7-0b0e-aa53983d6ee8@xen.org>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: b1d634f0-e5b1-400c-266d-08da0e6e7d6d
x-ms-traffictypediagnostic:
	PA4PR08MB5885:EE_|AM5EUR03FT005:EE_|VI1PR08MB4077:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR08MB407781B40540E1B80D3EC3FE9D1A9@VI1PR08MB4077.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR08MB3784.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(6512007)(33656002)(4326008)(76116006)(122000001)(38100700002)(83380400001)(38070700005)(316002)(53546011)(6506007)(508600001)(71200400001)(6486002)(54906003)(2906002)(91956017)(6916009)(186003)(26005)(66556008)(64756008)(2616005)(66946007)(66446008)(8676002)(66476007)(5660300002)(8936002)(36756003)(86362001)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <5216C75BE4F36B45876079DF716B99AD@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR08MB5885
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT005.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	0c827b60-e693-40a8-a135-08da0e6e7749
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(186003)(2906002)(70206006)(336012)(53546011)(70586007)(36860700001)(6512007)(40460700003)(33656002)(4326008)(6506007)(54906003)(6862004)(47076005)(2616005)(8676002)(82310400004)(5660300002)(83380400001)(508600001)(26005)(8936002)(316002)(86362001)(356005)(6486002)(107886003)(81166007)(36756003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 14:48:13.9218
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: b1d634f0-e5b1-400c-266d-08da0e6e7d6d
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT005.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB4077
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=


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 14:52:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 14:52:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294815.501487 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXlIx-0001nq-8e; Fri, 25 Mar 2022 14:52:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294815.501487; Fri, 25 Mar 2022 14:52:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXlIx-0001nj-5G; Fri, 25 Mar 2022 14:52:43 +0000
Received: by outflank-mailman (input) for mailman id 294815;
 Fri, 25 Mar 2022 14:52:41 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXlIv-0001nZ-Mf; Fri, 25 Mar 2022 14:52:41 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXlIv-0004Uy-Kb; Fri, 25 Mar 2022 14:52:41 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXlIv-0003zv-7T; Fri, 25 Mar 2022 14:52:41 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXlIv-0005u5-6e; Fri, 25 Mar 2022 14:52:41 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=JqGsbeQE2SljrFLtdTcr8IpTr1vlY5lHhKpiIOggf+4=; b=MwIbHtmNLimb3xkcprZzxwXmYp
	8Q3UYK7RH7wWermhqM09/TG/pwMkV0TenEjOvgOzuEBkh3rXyPjikSVsBQCkLp9dbUWK+OGPk5tlY
	q42fkVCCclxnYfGH0KXx3vypgSD1I4Wgdsk5NSaCn8rWihqvNU7R3KrWqITsKiqFgVes=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168835-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168835: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=9c721291506c037d934900a6167dc3bf4a8f51a6
X-Osstest-Versions-That:
    qemuu=e309ce90a23bef4f5210a8c49d53441144be293c
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 25 Mar 2022 14:52:41 +0000

flight 168835 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168835/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168828
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168828
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168828
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168828
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168828
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168828
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168828
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168828
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 qemuu                9c721291506c037d934900a6167dc3bf4a8f51a6
baseline version:
 qemuu                e309ce90a23bef4f5210a8c49d53441144be293c

Last test of basis   168828  2022-03-24 17:07:03 Z    0 days
Testing same since   168835  2022-03-25 04:11:20 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Fergus Henderson <fergus@google.com>
  Laurent Vivier <laurent@vivier.eu>
  Patrick Venture <venture@google.com>
  Peter Maydell <peter.maydell@linaro.org>
  Richard Henderson <richard.henderson@linaro.org>
  WANG Xuerui <xen0n@gentoo.org>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   e309ce90a2..9c72129150  9c721291506c037d934900a6167dc3bf4a8f51a6 -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 14:55:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 14:55:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294823.501498 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXlLL-0002T3-RK; Fri, 25 Mar 2022 14:55:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294823.501498; Fri, 25 Mar 2022 14:55:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXlLL-0002Sw-OU; Fri, 25 Mar 2022 14:55:11 +0000
Received: by outflank-mailman (input) for mailman id 294823;
 Fri, 25 Mar 2022 14:55:10 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXlLK-0002Sm-Ar; Fri, 25 Mar 2022 14:55:10 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXlLK-0004YK-9o; Fri, 25 Mar 2022 14:55:10 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXlLK-00044C-3p; Fri, 25 Mar 2022 14:55:10 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXlLK-00083B-3P; Fri, 25 Mar 2022 14:55:10 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=qA8h+5BIruJhSZx7vnaZJS/k4UGr4DLcYxhoddfb0k0=; b=Ockw94AOJ8ltjfj/0zRk4TNNqF
	n/vvNsST2IzVNZn39YaM08O7OmOWWr0fCk1eFQsvKiAZGJUBh2F0Pgw7KlU8eQByVy6XyNK7NJ21K
	1xDgaFZWEbh2BITRJjy9s1RzeiTEEgNny8YaWtatVLb8eFS2G0s3frN5ox6GSXTYB7mk=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168854-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168854: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=69218d5d2854acaa7a11c777244de4a297d2fbb9
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 25 Mar 2022 14:55:10 +0000

flight 168854 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168854/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 69218d5d2854acaa7a11c777244de4a297d2fbb9
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   25 days
Failing since        168258  2022-03-01 01:55:31 Z   24 days  253 attempts
Testing same since   168832  2022-03-25 01:43:21 Z    0 days    5 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Mara Sophie Grosch <littlefox@lf-net.org>
  Mara Sophie Grosch via groups.io <littlefox=lf-net.org@groups.io>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 904 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 15:46:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 15:46:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294830.501509 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXm8f-0007ma-Oa; Fri, 25 Mar 2022 15:46:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294830.501509; Fri, 25 Mar 2022 15:46:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXm8f-0007mT-KR; Fri, 25 Mar 2022 15:46:09 +0000
Received: by outflank-mailman (input) for mailman id 294830;
 Fri, 25 Mar 2022 15:46:08 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=WUFh=UE=gmail.com=dpsmith.dev@srs-se1.protection.inumbo.net>)
 id 1nXm8e-0007mN-BX
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 15:46:08 +0000
Received: from mail-qt1-x829.google.com (mail-qt1-x829.google.com
 [2607:f8b0:4864:20::829])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ae2c08fd-ac52-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 16:46:05 +0100 (CET)
Received: by mail-qt1-x829.google.com with SMTP id 10so6823111qtz.11
 for <xen-devel@lists.xenproject.org>; Fri, 25 Mar 2022 08:46:05 -0700 (PDT)
Received: from [10.10.1.138] (static-72-81-132-2.bltmmd.fios.verizon.net.
 [72.81.132.2]) by smtp.gmail.com with ESMTPSA id
 d189-20020a3768c6000000b0067b248d6b3bsm3557898qkc.46.2022.03.25.08.46.03
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Fri, 25 Mar 2022 08:46:03 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ae2c08fd-ac52-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=message-id:date:mime-version:user-agent:subject:content-language:to
         :cc:references:from:in-reply-to:content-transfer-encoding;
        bh=jFfI/n3lW1ulkQcFgrS8PAHqy4olAjDFfRf0FF5h1wY=;
        b=TCJJzf+bE/S5urg+fL8MnRkCLz8i2qKoF/lLlnkQyACO1MQfpPwjq/NB+3872T4AZb
         BP0nEy1XvFOHyXDSdN1ji9qY8c4J7Ft4s69WML/8huJjd2ElLs6b1YrdU6/g5FhO2EPO
         rcKpF3uIwFjtWOOcD4jCcSG+BqWicNwamTSzZrhaLzyVArM0U/PFdaRqY9yrxmEfSVAs
         o/EEXXNiz+g4L1YS9/tGDWQRajyBqystgb0jJP8VGmZFha1t/gpuMKl+y01ECZERyK9n
         Wr7SZ7aBGBl3vgDyQp67OOQGN7CzI8t70R35tlkkSy9Q2ScIEPzKbequlGOE331ra/VH
         T4/A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:message-id:date:mime-version:user-agent:subject
         :content-language:to:cc:references:from:in-reply-to
         :content-transfer-encoding;
        bh=jFfI/n3lW1ulkQcFgrS8PAHqy4olAjDFfRf0FF5h1wY=;
        b=L0mHZoE8v+MGjzR7oTmP36MrNFutUtqq/NhX3YH5tnOzgLeRs37Whr/HFoXW5asQSl
         1m68fZKZDsXCBxPWnd73krFZ7ZOUBb7m1TA35zaXr19j4qg7zFjJag6hys6A3hNwfaqa
         TSWCHOwmT24b+uj+pve3XFmOL0bPiiTbhol+V9anj6hpBngbocIIxcI94fwpRMTZd4k7
         dKSB740pSGxHcFMgepf/ViMCWHN7YNROifgGog83HxdK+gRNjWPx4zoErMWB0v7MkhfC
         BkLnPObThYquvh30t/dE6quqLQEnSl++YgHb+zEFNdZjthLHDzl39TkUkiqGR7GlMY3J
         sR8Q==
X-Gm-Message-State: AOAM530drb88dryeelZhfxu1yITeCUkFInkPgYTTS4e/WeTPz1avdmvT
	9Zz3KZp8mDz53L1Qd/PctE0=
X-Google-Smtp-Source: ABdhPJy8kR9F0Af6bEmGraxv832g9m3z/idhjl3jf4eihwhHvEiDcb3dBJZWqzkAb4SudH+cT9o8tw==
X-Received: by 2002:ac8:7ee3:0:b0:2e1:a508:c500 with SMTP id r3-20020ac87ee3000000b002e1a508c500mr9699321qtc.117.1648223164594;
        Fri, 25 Mar 2022 08:46:04 -0700 (PDT)
Message-ID: <ccb85826-feb8-7c26-64e3-0a459bdaf8b6@gmail.com>
Date: Fri, 25 Mar 2022 11:45:51 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.6.1
Subject: Re: [PATCH v3 2/5] xen: make evtchn_alloc_unbound public
Content-Language: en-US
To: Stefano Stabellini <sstabellini@kernel.org>,
 Jan Beulich <jbeulich@suse.com>
Cc: xen-devel@lists.xenproject.org, jgross@suse.com,
 Bertrand.Marquis@arm.com, julien@xen.org, Volodymyr_Babchuk@epam.com,
 Luca Miccio <lucmiccio@gmail.com>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>
References: <alpine.DEB.2.22.394.2201281330520.27308@ubuntu-linux-20-04-desktop>
 <20220128213307.2822078-2-sstabellini@kernel.org>
 <2f05e63a-96c3-e78f-f7e4-36fd17fcd58c@gmail.com>
 <alpine.DEB.2.22.394.2203221711110.2910984@ubuntu-linux-20-04-desktop>
 <c57dc9a9-e2ca-74c6-4fde-e2a6f1400de5@suse.com>
 <alpine.DEB.2.22.394.2203241522510.2910984@ubuntu-linux-20-04-desktop>
From: "Daniel P. Smith" <dpsmith.dev@gmail.com>
In-Reply-To: <alpine.DEB.2.22.394.2203241522510.2910984@ubuntu-linux-20-04-desktop>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

On 3/24/22 20:30, Stefano Stabellini wrote:
> On Wed, 23 Mar 2022, Jan Beulich wrote:
>> On 23.03.2022 01:22, Stefano Stabellini wrote:
>>> On Tue, 15 Mar 2022, Daniel P. Smith wrote:
>>>> On 1/28/22 16:33, Stefano Stabellini wrote:
>>>>> From: Luca Miccio <lucmiccio@gmail.com>
>>>>>
>>>>> The xenstore event channel will be allocated for dom0less domains. It is
>>>>> necessary to have access to the evtchn_alloc_unbound function to do
>>>>> that, so make evtchn_alloc_unbound public.
>>>>>
>>>>> Add a skip_xsm parameter to allow disabling the XSM check in
>>>>> evtchn_alloc_unbound (xsm_evtchn_unbound wouldn't work for a call
>>>>> originated from Xen before running any domains.)
>>>>>
>>>>> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
>>>>> Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
>>>>> CC: Julien Grall <julien@xen.org>
>>>>> CC: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
>>>>> CC: Bertrand Marquis <bertrand.marquis@arm.com>
>>>>> CC: Andrew Cooper <andrew.cooper3@citrix.com>
>>>>> CC: George Dunlap <george.dunlap@citrix.com>
>>>>> CC: Jan Beulich <jbeulich@suse.com>
>>>>> CC: Wei Liu <wl@xen.org>
>>>>> ---
>>>>> Changes v3:
>>>>> - expose evtchn_alloc_unbound, assing a skip_xsm parameter
>>>>> ---
>>>>>  xen/common/event_channel.c | 13 ++++++++-----
>>>>>  xen/include/xen/event.h    |  3 +++
>>>>>  2 files changed, 11 insertions(+), 5 deletions(-)
>>>>>
>>>>> diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c
>>>>> index da88ad141a..be57d00a15 100644
>>>>> --- a/xen/common/event_channel.c
>>>>> +++ b/xen/common/event_channel.c
>>>>> @@ -284,7 +284,7 @@ void evtchn_free(struct domain *d, struct evtchn *chn)
>>>>>      xsm_evtchn_close_post(chn);
>>>>>  }
>>>>>  
>>>>> -static int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
>>>>> +int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc, bool skip_xsm)
>>>>>  {
>>>>>      struct evtchn *chn;
>>>>>      struct domain *d;
>>>>> @@ -301,9 +301,12 @@ static int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
>>>>>          ERROR_EXIT_DOM(port, d);
>>>>>      chn = evtchn_from_port(d, port);
>>>>>  
>>>>> -    rc = xsm_evtchn_unbound(XSM_TARGET, d, chn, alloc->remote_dom);
>>>>> -    if ( rc )
>>>>> -        goto out;
>>>>> +    if ( !skip_xsm )
>>>>> +    {
>>>>> +        rc = xsm_evtchn_unbound(XSM_TARGET, d, chn, alloc->remote_dom);
>>>>> +        if ( rc )
>>>>> +            goto out;
>>>>> +    }
>>>>
>>>> Please do not subvert the security framework because it causes an
>>>> inconvenience. As Jan recommended, work within the XSM check to allow
>>>> your access so that we may ensure it is done safely. If you need any
>>>> help making modifications to XSM, please do not hesitate to reach out as
>>>> I will gladly help.
>>>
>>> Thank you!
>>>
>>> First let me reply to Jan: this series is only introducing 1 more call
>>> to evtchn_alloc_unbound, which is to allocate the special xenstore event
>>> channel, the one configured via
>>> d->arch.hvm.params[HVM_PARAM_STORE_EVTCHN].
>>>
>>> It is not meant to be a generic function, and it is not meant to be
>>> called more than once. It could (should?) be __init.
>>
>> How that? Its pre-existing use doesn't disappear, and requires it to be
>> non-__init.
> 
> Sorry I meant the new function (calling get_free_port) for the new
> use-case could be __init. The new function could be added to
> xen/common/event_channel.c or to xen/arch/arm/domain_build.c.
> 
> 
>>> The existing XSM check in evtchn_alloc_unbound cannot work and should
>>> not work: it is based on the current domain having enough privileges to
>>> create the event channel. In this case, we have no current domain at
>>> all. The current domain is Xen itself.
>>
>> And DOM_XEN cannot be given the appropriate permission, perhaps
>> explicitly when using a real policy and by default in dummy and SILO
>> modes?
> 
> The issue is that the check is based on "current", not one of the
> domains passed as an argument to evtchn_alloc_unbound. Otherwise,
> passing DOMID_XEN would be straightforward.
> 
> We would need to use a hack (like Daniel wrote in the other email) to
> set the idle_domain temporarily as a privileged domain only for the sake
> of passing an irrelevant (irrelevant as in "not relevant to this case")
> XSM check. That cannot be an improvement. Also, setting current to a
> "fake" domain is not great either.

My suggestion was not to intended to be simply a hack but looking at the
larger issue instead of simply doing a targeted fix for this one
instnace. While I cannot give an example right off hand, the reality is,
at least for hyperlaunch, that we cannot say for certain there will not
be further resource allocations that is protected by the security
framework and will require preliminary handling by the construction
logic in the hypervisor. The low-complexity approach is to address each
one in a case-by-case fashion using direct calls that go around the
security framework. A more security conscience, and higher complexity,
approach would be to consider a least-privilege approach and look at
introducing the ability to do controlled switching of contexts, i.e.
moving `current` from DOMID_IDLE to DOMID_CONSTRUCT, to one that is
granted only the necessary privileges to do the resource allocations in
which it is limited.

This is also not the first time this issue has come up, I don't recall
the exact thread but several months ago someone ran into the issue they
need to make a call to a resource function and was blocked by XSM
because DOMID_IDLE has no privileges. The reality is that the idea of
monolithic high-privileged entities is being dropped in favor of
least-privilege, and where possible hardware enforced, constraint. This
can be seen with Intel de-privileging SMM and running SMI handlers in
constrained ring 3. Arm is gaining capability pointers, CHERI, that will
enable the possibility for constrained, least-privileged kernel
subsystems. Would it not be advantageous for Xen to start moving in such
a direction that would enable it to provide a new level of safety and
security for consumers of Xen?

Coming back to the short-term, I would advocate for introducing the
concept and abstraction of constrained context switching through a set
of function calls, which would likely be under XSM to allow policy
enforcement. Likely the introductory implementation would just mask the
fact that it is just setting `is_privileged` for DOMID_IDLE. Future
evolution of the capability could see the introduction of new
"contexts", whether they are represented by a domain could be determined
then, and the ability to do controlled switching based on policy.

Just wanted to put more of my thinking out there before a path is taken.

> In the specific case of dom0less and this patch, this is the only
> instance of this issue and could be solved very straightforwardly by
> calling get_free_port directly as we discussed [1].
> 
> I know Julien had some reservations about that. Let's try to find a
> technical solution that makes everyone happy.
> 
> Maybe, instead of exporting get_free_port, we could create a new
> function in xen/common/event_channel.c and mark it as __init? This way:
> - we don't need to expose get_free_port
> - the new function would only be __init anyway, so no risk of runtime
>   misuse
> 
> What do you think?
> 
> [1] https://marc.info/?l=xen-devel&m=164197327305903


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 16:14:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 16:14:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294833.501520 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXma4-0003Eq-US; Fri, 25 Mar 2022 16:14:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294833.501520; Fri, 25 Mar 2022 16:14:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXma4-0003Ej-RU; Fri, 25 Mar 2022 16:14:28 +0000
Received: by outflank-mailman (input) for mailman id 294833;
 Fri, 25 Mar 2022 16:14:27 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=R2Zm=UE=invisiblethingslab.com=demi@srs-se1.protection.inumbo.net>)
 id 1nXma3-0003Ed-9Y
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 16:14:27 +0000
Received: from wout1-smtp.messagingengine.com (wout1-smtp.messagingengine.com
 [64.147.123.24]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a2137751-ac56-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 17:14:25 +0100 (CET)
Received: from compute5.internal (compute5.nyi.internal [10.202.2.45])
 by mailout.west.internal (Postfix) with ESMTP id DB3C23201F5A;
 Fri, 25 Mar 2022 12:14:21 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163])
 by compute5.internal (MEProxy); Fri, 25 Mar 2022 12:14:22 -0400
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Fri,
 25 Mar 2022 12:14:20 -0400 (EDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a2137751-ac56-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:cc:content-type:date:date:from:from
	:in-reply-to:message-id:mime-version:reply-to:sender:subject
	:subject:to:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender
	:x-sasl-enc; s=fm3; bh=BHp9UZ9HymaucJIU9olMzjynOrY79A/tGrgS3oi76
	WQ=; b=JpckFzwtR87Db8WyUXHfunjrgYjal+s2v11n3awCsoxRXVOgqGqPN/jEU
	WEbFyb+anxwF+X9/s4Eoc1Lr55HPDpD0HR/Tvpa4nQAV67qYS0Z00f+iqQh6rFUR
	TqxVf3jzmpKeBj6xuasH12LLFXxUA6VLTaSxRL4LyEbbpOkBUPY2ZfmlJeySmIU9
	EwTAgos2NVb8sT0bpoR+60+bVa7X/zw9BMadx/FVDPgWgFM1Wn9H+mDWkH/qGWhf
	AXlr0RICKpsqmUVuP4EZRMMt6PyMRR5xo3IBYlexqFKmWcWZVhSz9hUddyngpPKe
	UET8ONLBW/pds3ca8yz9RDP6DlOBg==
X-ME-Sender: <xms:Xeo9YqT0Jghgws0J16Q7p0Ktb-UV2neqdhI_XoJPmcVPxnRNAlS-bQ>
    <xme:Xeo9Yvydh3-UpXqu9xzQF3c57lwUaSK6iyXmOhB_3ZRZ22qJlvpwykAGfU-WBE8XY
    hkKpBcHv21dxoY>
X-ME-Received: <xmr:Xeo9Yn0EX0joZ9RDA_h5ePnB_MUVmR88DLcRfgg3tJOAusH6qwrNoIkGjC4S>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddrudehuddgkeehucetufdoteggodetrfdotf
    fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen
    uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne
    cujfgurhepfffhvffukfggtggusehgtderredttdejnecuhfhrohhmpeffvghmihcuofgr
    rhhivgcuqfgsvghnohhurhcuoeguvghmihesihhnvhhishhisghlvghthhhinhhgshhlrg
    gsrdgtohhmqeenucggtffrrghtthgvrhhnpeeljedtgeejffelveefueelheejgfdvfefh
    hefgjeegleetgedtteejleeuueevfeenucevlhhushhtvghrufhiiigvpedtnecurfgrrh
    grmhepmhgrihhlfhhrohhmpeguvghmihesihhnvhhishhisghlvghthhhinhhgshhlrggs
    rdgtohhm
X-ME-Proxy: <xmx:Xeo9YmCjnPzVVKPWC5C-K2uyVC49rCEqX5r8FEhtOQch40Xneqqv9A>
    <xmx:Xeo9YjiUPWJxwxNQN3io6KwL-uxUAJ536UxcmoEFeeXEO-MUGEzwFA>
    <xmx:Xeo9YioI6duGlH7ccxJxdQxpcBdcDaZqWKagDLK6Wck67uXKVfhCdA>
    <xmx:Xeo9Yra64DGLWJP_V4RBBctdoyemt7SK2ntYJOMNnta95qSpo36Kqg>
Date: Fri, 25 Mar 2022 12:13:59 -0400
From: Demi Marie Obenour <demi@invisiblethingslab.com>
To: Roger Pau =?iso-8859-1?Q?Monn=E9?= <roger.pau@citrix.com>,
	Marek =?iso-8859-1?Q?Marczykowski-G=F3recki?= <marmarek@invisiblethingslab.com>
Cc: Xen developer discussion <xen-devel@lists.xenproject.org>,
	OpenBSD technical mailing list <tech@openbsd.org>
Subject: Security support status of xnf(4) and xbf(4)
Message-ID: <Yj3qW/y20htoSvuK@itl-email>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="NOM57H05SdAMKHFr"
Content-Disposition: inline


--NOM57H05SdAMKHFr
Content-Type: text/plain; protected-headers=v1; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Date: Fri, 25 Mar 2022 12:13:59 -0400
From: Demi Marie Obenour <demi@invisiblethingslab.com>
To: Roger Pau =?iso-8859-1?Q?Monn=E9?= <roger.pau@citrix.com>,
	Marek =?iso-8859-1?Q?Marczykowski-G=F3recki?= <marmarek@invisiblethingslab.com>
Cc: Xen developer discussion <xen-devel@lists.xenproject.org>,
	OpenBSD technical mailing list <tech@openbsd.org>
Subject: Security support status of xnf(4) and xbf(4)

Linux=E2=80=99s netfront and blkfront drivers recently had a security
vulnerability (XSA-396) that allowed a malicious backend to potentially
compromise them.  In follow-up audits, I found that OpenBSD=E2=80=99s xnf(4)
currently trusts the backend domain.  I reported this privately to Theo
de Raadt, who indicated that OpenBSD does not consider this to be a
security concern.

This is obviously a valid position for the OpenBSD project to take, but
it is surprising to some (such as myself) from the broader Xen
ecosystem.  Standard practice in the Xen world is that bugs in frontends
that allow a malicious backend to cause mischief *are* considered
security bugs unless there is explicit documentation to the contrary.
As such, I believe this deserves to be noted in xnf(4) and xbf(4)=E2=80=99s=
 man
pages.  If the OpenBSD project agrees, I am willing to write a patch,
but I have no experience with mandoc so it might take a few tries.
--=20
Sincerely,
Demi Marie Obenour (she/her/hers)
Invisible Things Lab

--NOM57H05SdAMKHFr
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=1VC0
-----END PGP SIGNATURE-----

--NOM57H05SdAMKHFr--


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 16:29:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 16:29:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294837.501530 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXmoH-0004rH-6g; Fri, 25 Mar 2022 16:29:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294837.501530; Fri, 25 Mar 2022 16:29:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXmoH-0004rA-3d; Fri, 25 Mar 2022 16:29:09 +0000
Received: by outflank-mailman (input) for mailman id 294837;
 Fri, 25 Mar 2022 16:29:07 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=qzZe=UE=linaro.org=alex.bennee@srs-se1.protection.inumbo.net>)
 id 1nXmoF-0004r4-LZ
 for xen-devel@lists.xen.org; Fri, 25 Mar 2022 16:29:07 +0000
Received: from mail-ej1-x630.google.com (mail-ej1-x630.google.com
 [2a00:1450:4864:20::630])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id af448af8-ac58-11ec-a405-831a346695d4;
 Fri, 25 Mar 2022 17:29:06 +0100 (CET)
Received: by mail-ej1-x630.google.com with SMTP id dr20so16408054ejc.6
 for <xen-devel@lists.xen.org>; Fri, 25 Mar 2022 09:29:04 -0700 (PDT)
Received: from zen.linaroharston ([51.148.130.216])
 by smtp.gmail.com with ESMTPSA id
 ec21-20020a170906b6d500b006d170a3444csm2501103ejb.164.2022.03.25.09.29.02
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Fri, 25 Mar 2022 09:29:02 -0700 (PDT)
Received: from zen (localhost [127.0.0.1])
 by zen.linaroharston (Postfix) with ESMTP id 3B3BB1FFB7;
 Fri, 25 Mar 2022 16:29:01 +0000 (GMT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: af448af8-ac58-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=linaro.org; s=google;
        h=references:user-agent:from:to:cc:subject:date:in-reply-to
         :message-id:mime-version:content-transfer-encoding;
        bh=Bs6Ew4qcDSOPaAAgM3hWT94vALNcRpubufRp6rMTEHg=;
        b=ujpme7SbyVmPEIcwqa0cXoC9/8B8Wh20DGZpLHua01JTm7XTevZlOXLQJ+v/lHn5EZ
         Qv6J1qyCsWsSCxYK22oW8uQhgp5+DvWC+zy3wFC3psBotw7lQfuKJ9sNeWZy2WHOIcQo
         6kGSvs5qWqx5vxAXZk62+opV7F45WAZ7WZ8BBx5JhH0hTAfB8WG6dJR7wFZ/LTugGcL4
         eEhr52xrFW9YfXlYkedb97kmuTOp6TJoxaVEjCIFjuRbgjg2c1g7LvyZrzUYDp36rhnY
         SMM2QueIjhU5nxlovwmqF4y0PW62aWN0FBxAXBMHexmrLmcN4B7BSyHC3ZowTutMHYXI
         rXeA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:references:user-agent:from:to:cc:subject:date
         :in-reply-to:message-id:mime-version:content-transfer-encoding;
        bh=Bs6Ew4qcDSOPaAAgM3hWT94vALNcRpubufRp6rMTEHg=;
        b=VUzG80Km6CgAYpsYa2HzbtvEm78/uBb0mrU7PfzqebLHJvpLGZ8zP1CgOPS2s+2dTB
         gY4mX0PX1pPyE7kHNmaEOICX4n5gzmUC6alSWXaIqAwvdmlYpdMVhU4lVunEmIfTlnXA
         PTu/9S32gkQF4tmxHOSoy81rjBBtmBUFhsZNep/kwByOGQtGiPak7jCBv6hhPbi6yHPT
         8jmhiZq8g9HcZk28ldRqUoE5Ddvk9z51G3vCJ4GFRp2r6ASn8sY20RXsjKa91x4iGFLW
         icveSGVKDw84GMt7OKR8s9ard/cPbEkt0LYqjClp1n/ZFD8922r/gJvQ0mjtMGvYFEnI
         DfNA==
X-Gm-Message-State: AOAM530xlGdfW7l8V5k5TIBav7rPaMl1FcHBELBNQzmtSd47cXEUqf2F
	QCWF3ozidYlzuxNJ/wjMgn88Nw==
X-Google-Smtp-Source: ABdhPJx0oF1r9pspDG5weBqyLFiciFK7zxS9wHzyhze8BE48Ik/CHUsij5AMJexvMZJe7Fb+nkJhaQ==
X-Received: by 2002:a17:906:32d8:b0:6ce:d850:f79 with SMTP id k24-20020a17090632d800b006ced8500f79mr12201040ejk.414.1648225743518;
        Fri, 25 Mar 2022 09:29:03 -0700 (PDT)
References: <alpine.DEB.2.22.394.2203231838130.2910984@ubuntu-linux-20-04-desktop>
 <57549560-879d-f705-8693-9bfdc73e3f7f@suse.com>
User-agent: mu4e 1.7.10; emacs 28.0.92
From: Alex =?utf-8?Q?Benn=C3=A9e?= <alex.bennee@linaro.org>
To: Juergen Gross <jgross@suse.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 xen-devel@lists.xen.org, Stratos-dev@op-lists.linaro.org,
 viresh.kumar@linaro.org, Mathieu Poirier <mathieu.poirier@linaro.org>,
 christopher.w.clark@gmail.com, boris.ostrovsky@oracle.com,
 Arnd Bergmann <arnd.bergmann@linaro.org>
Subject: Re: Understanding osdep_xenforeignmemory_map mmap behaviour
Date: Fri, 25 Mar 2022 16:07:51 +0000
In-reply-to: <57549560-879d-f705-8693-9bfdc73e3f7f@suse.com>
Message-ID: <87mthe0zea.fsf@linaro.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable


(add Arnd to CC)

Juergen Gross <jgross@suse.com> writes:

> [[PGP Signed Part:Undecided]]
> On 24.03.22 02:42, Stefano Stabellini wrote:
>> I am pretty sure the reasons have to do with old x86 PV guests, so I am
>> CCing Juergen and Boris.
>>=20
>>> Hi,
>>>
>>> While we've been working on the rust-vmm virtio backends on Xen we
>>> obviously have to map guest memory info the userspace of the daemon.
>>> However following the logic of what is going on is a little confusing.
>>> For example in the Linux backend we have this:
>>>
>>>    void *osdep_xenforeignmemory_map(xenforeignmemory_handle *fmem,
>>>                                     uint32_t dom, void *addr,
>>>                                     int prot, int flags, size_t num,
>>>                                     const xen_pfn_t arr[/*num*/], int e=
rr[/*num*/])
>>>    {
>>>        int fd =3D fmem->fd;
>>>        privcmd_mmapbatch_v2_t ioctlx;
>>>        size_t i;
>>>        int rc;
>>>
>>>        addr =3D mmap(addr, num << XC_PAGE_SHIFT, prot, flags | MAP_SHAR=
ED,
>>>                    fd, 0);
>>>        if ( addr =3D=3D MAP_FAILED )
>>>            return NULL;
>>>
>>>        ioctlx.num =3D num;
>>>        ioctlx.dom =3D dom;
>>>        ioctlx.addr =3D (unsigned long)addr;
>>>        ioctlx.arr =3D arr;
>>>        ioctlx.err =3D err;
>>>
>>>        rc =3D ioctl(fd, IOCTL_PRIVCMD_MMAPBATCH_V2, &ioctlx);
>>>
>>> Where the fd passed down is associated with the /dev/xen/privcmd device
>>> for issuing hypercalls on userspaces behalf. What is confusing is why
>>> the function does it's own mmap - one would assume the passed addr would
>>> be associated with a anonymous or file backed mmap region already that
>>> the calling code has setup. Applying a mmap to a special device seems a
>>> little odd.
>>>
>>> Looking at the implementation on the kernel side it seems the mmap
>>> handler only sets a few flags:
>>>
>>>    static int privcmd_mmap(struct file *file, struct vm_area_struct *vm=
a)
>>>    {
>>>            /* DONTCOPY is essential for Xen because copy_page_range doe=
sn't know
>>>             * how to recreate these mappings */
>>>            vma->vm_flags |=3D VM_IO | VM_PFNMAP | VM_DONTCOPY |
>>>                             VM_DONTEXPAND | VM_DONTDUMP;
>>>            vma->vm_ops =3D &privcmd_vm_ops;
>>>            vma->vm_private_data =3D NULL;
>>>
>>>            return 0;
>>>    }
>>>
>>> So can I confirm that the mmap of /dev/xen/privcmd is being called for
>>> side effects? Is it so when the actual ioctl is called the correct flags
>>> are set of the pages associated with the user space virtual address
>>> range?
>>>
>>> Can I confirm there shouldn't be any limitation on where and how the
>>> userspace virtual address space is setup for the mapping in the guest
>>> memory?
>>>
>>> Is there a reason why this isn't done in the ioctl path itself?
>
> For a rather long time we were using "normal" user pages for this purpose,
> which were just locked into memory for doing the hypercall.

Was this using the normal mlock() semantics to stop pages being swapped
out of RAM?

> Unfortunately there have been very rare problems with that approach, as
> the Linux kernel can set a user page related PTE to invalid for short
> periods of time, which led to EFAULT in the hypervisor when trying to
> access the hypercall data.

I must admit I'm not super familiar with the internals of page table
handling with Linux+Xen. Doesn't the kernel need to delegate the
tweaking of page tables to the hypervisor or is it allowed to manipulate
the page tables itself?

> In Linux this can avoided only by using kernel memory, which is the
> reason why the hypercall buffers are allocated and mmap()-ed through the
> privcmd driver.
>
>>>
>>> I'm trying to understand the differences between Xen and KVM in the API
>>> choices here. I think the equivalent is the KVM_SET_USER_MEMORY_REGION
>>> ioctl for KVM which brings a section of the guest physical address space
>>> into the userspaces vaddr range.
>
> The main difference is just that the consumer of the hypercall buffer is
> NOT the kernel, but the hypervisor. In the KVM case both are the same, so
> a brief period of an invalid PTE can be handled just fine in KVM, while
> the Xen hypervisor has no idea that this situation will be over very
> soon.

I still don't follow the details of why we have the separate mmap. Is it
purely because the VM flags of the special file can be changed in a way
that can't be done with a traditional file-backed mmap?

I can see various other devices have their own setting of vm flags but
VM_DONTCOPY for example can be set with the appropriate madvise call:

       MADV_DONTFORK (since Linux 2.6.16)
              Do not make the pages in this range available to the child af=
ter
              a fork(2).  This is useful to  prevent  copy-on-write  semant=
ics
              from  changing  the  physical  location  of a page if the par=
ent
              writes to it after a  fork(2).   (Such  page  relocations  ca=
use
              problems for hardware that DMAs into the page.)

For the vhost-user work we need to be able to share the guest memory
between the xen-vhost-master (which is doing the ioctls to talk to Xen)
and the vhost-user daemon (which doesn't know about hypervisors but just
deals in memory and events).

Would it be enough to loosen the API and just have xen_remap_pfn()
verify the kernels VM flags are appropriately set before requesting Xen
updates the page tables?

--=20
Alex Benn=C3=A9e


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 16:34:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 16:34:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294841.501542 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXmto-0006J5-UG; Fri, 25 Mar 2022 16:34:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294841.501542; Fri, 25 Mar 2022 16:34:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXmto-0006Iy-R3; Fri, 25 Mar 2022 16:34:52 +0000
Received: by outflank-mailman (input) for mailman id 294841;
 Fri, 25 Mar 2022 16:34:51 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXmtn-0006Io-Nn; Fri, 25 Mar 2022 16:34:51 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXmtn-0006xH-M4; Fri, 25 Mar 2022 16:34:51 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXmtn-0007wr-Ab; Fri, 25 Mar 2022 16:34:51 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXmtn-00027V-A8; Fri, 25 Mar 2022 16:34:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=P3vNdryOXon8n2QkqdpluCrePU5oHrt5NrWFQfpQCZM=; b=oF97Sydm1hfyys4SXTuZLUCguO
	bZxcIHjhxshU+9fK2MdWnmvEgW1IyWUA30FMv60ZU+HMEwBAgDRb1aPK2rtHSndLXCWoVA1WPph0u
	WqiaVyYSJJZivF3h4rRs2dX1eSHvx4NC5sM/d+z7UREGXflIG4xPdBRxYN3+lE72dLiY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168858-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168858: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=69218d5d2854acaa7a11c777244de4a297d2fbb9
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 25 Mar 2022 16:34:51 +0000

flight 168858 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168858/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 69218d5d2854acaa7a11c777244de4a297d2fbb9
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   25 days
Failing since        168258  2022-03-01 01:55:31 Z   24 days  254 attempts
Testing same since   168832  2022-03-25 01:43:21 Z    0 days    6 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Mara Sophie Grosch <littlefox@lf-net.org>
  Mara Sophie Grosch via groups.io <littlefox=lf-net.org@groups.io>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 904 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 16:39:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 16:39:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294848.501553 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXmyT-00070k-HE; Fri, 25 Mar 2022 16:39:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294848.501553; Fri, 25 Mar 2022 16:39:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXmyT-00070d-EG; Fri, 25 Mar 2022 16:39:41 +0000
Received: by outflank-mailman (input) for mailman id 294848;
 Fri, 25 Mar 2022 16:39:40 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=CWi7=UE=citrix.com=prvs=076b843e0=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nXmyS-00070X-0l
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 16:39:40 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 283b51d6-ac5a-11ec-a405-831a346695d4;
 Fri, 25 Mar 2022 17:39:38 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 283b51d6-ac5a-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648226377;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=SLVN7cwGxqFBVcr5jwBAWzGJ6d7XaOaSr+mkuRo4CLo=;
  b=AXyoA4eVdixssIYLG1RDVImNJ3OuhGci3AICpFr/lSfzARGDNvK90/Ar
   eDSVE9rRg6huoGUSLyfjK/lOxnCe11Y0yknkIaff3zmZW0w4rfAa+3wIZ
   3t/xLU7prBsYlcu8aVKOlfU/hqmGkc4zsRFpv2GBr+NXYbLAqQyosClek
   E=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 69571189
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:8a+04a95vRWnoJzQ+VpmDrUDk36TJUtcMsCJ2f8bNWPcYEJGY0x3z
 GJMWGjSOq7YZ2L1fogkbYS+9kID6pXWmIdmHgU5rXw8E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oLkW1nlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnbyVUz0iOKbIo7hebxgBM3t9EK5P0rCSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFKoZtmtt0nfyCvE+TIqYa67L+cVZzHE7gcUm8fP2O
 ZtENmM2PEWojxtnIgsYDbcyjcGUn2DQfiNRiVabqK0Oyj2GpOB2+Oe0a4eEEjCQfu1Fk0Ddq
 m/Y8mDRBhABKMfZ2TeD6mirhOLEgWX8Qo16PKK83u5nhhuU3GN7IB8cWEa/oPK5olWjQN8ZI
 EsRkhfCtoBrqhbtFIOkGUTl/jjU5XbwRua8DcUazRu3wazf5z3FRVQFFx4ba/ElveU5EGlCO
 kCyo/vlAjlmsbuwQH2b96uJoT7aBRX5PVPudgdfE1JbvoCLTJUby0uWE409SPLdYsjdQ2mY/
 tyckMQpa1z/Z+Yv3r7zw13IiinESnPhHl9svVW/so5IA2pEiG+Zi26AtACzARVodt/xory9U
 J4swpn2AAcmV83lqcB1aL9RdIxFHt7cWNEmvXZhHoM66xOm8GO5cIZb7VlWfRk1Yp9ZJGK3M
 RSJ4mu9AaO/2lPzPMebhKrrVqwXIVXIT4y5Bpg4kPIQCnSOSON31H43PhPBt4wcuEMtjbs+K
 f+mnTWEVh4n5VBc5GPuHY81iOZzrghnnD+7bc2rnnyPjOvFDFbIGOhtDbd7Rr1ghE9yiF6Oq
 Ig32grj40g3bdASlQGLrt9JcQFbdyRT6FKfg5U/S9Nv6zFOQQkJI/TQ3akga8pimaFUnf3P5
 XazRglTz1+XuJENAVzihqxLAF83YatCkA==
IronPort-HdrOrdr: A9a23:t1CLHqEvhi3/3Z3XpLqFSJHXdLJyesId70hD6qkvc3Jom52j+P
 xGws526fatskdsZJkh8erwXJVp2RvnhNBICPoqTMiftW7dySqVxeBZnMTfKljbehEWmdQtrZ
 uIH5IOauEYSGIK8PoSgzPIU+rIouP3i5xA7N22pxwGIGEaCJ2IrT0JcDpzencGHjWubqBJc6
 Z0k/A33gZIDk5nCPhTaEN1OtTrlpnurtbLcBQGDxko5E2lljWz8oP3FBCew1M3Ty5P6a1Kyx
 mHryXJooGY992rwB7V0GHeq75MnsH699dFDMuQzuAINzTXjBqybogJYczBgNl1mpDr1L8Zqq
 iKn/4SBbU015oXRBDtnfLZ4Xil7N/p0Q679bbXuwq5nSWzfkNFNyMIv/MpTvKe0Tt8gDg06t
 M544rS3aAnfS/ojWDz4cPFWAptkVfxqX0+kfQLh3gaSocGbqRNxLZvtn+9Pa1wVB4S0rpXW9
 WGzfusk8p+YBefdTTUr2NvyNujUjA6GQqHWFELvoiQ3yJNlH50wkMEzIhH901wuK4VWt1B/a
 DJI65onLZBQosfar98Hv4IRY+yBnbWSRzBPWqOKRDsFb0BOXjKt5nriY9Fqd2CadgN1t8/iZ
 7BWFRXuSo7fF/vE9SH2NlR/hXEUAyGLH3QIwFllu5EU5HHNc/W2He4OSITeuOb0oEiPvE=
X-IronPort-AV: E=Sophos;i="5.90,209,1643691600"; 
   d="scan'208";a="69571189"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=UNI13Fs7pdz+7x8NxjmokPsLcNu2mdxto96K0mrnaiZ6yiZEM7Ucj9URUO0O5xvkFYV1dvvt0Tbizvvux6WvC+JPJpaPuhG4hwjU0Hx2jBfQ9LPNoeImfFrgm9WsjgOBI4HgYBWlz3xmyHkavo3afcnjNL1IjerF5Cht9mGNRwj/U4pxJUuooSrFE/n9ZnrdihIvtEXCzbqoFNs7KTCzALJpGyuR30bpOdTHDv4+OuD9157XUbfnbWCWS8pgglJSElxQp+408ImsJas5+swgscirFOw874yz09ZqXk+IBrvVA6MK9peq5ZNjkoNIsrg+LWEOzgcwrSZjca3is+thJw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=SLVN7cwGxqFBVcr5jwBAWzGJ6d7XaOaSr+mkuRo4CLo=;
 b=CuiZ8US+vk34nQ+z16n8bDZ18sb/YN1TQxex8AE5lKXW51/TgeXadEGFUur8kth2yeqNKG7Q3jBUJV4YIk3B2ZdLu8YNTNDQPZNUoByS8CU0/8NkZzbWSIhwWhDmlsy8cxLM94d8jxAxRe0ffytFeUEnzkzabtobEU/wykUXP7xT1D1xS3E3X3uNoNThQ9HMDFsc/6Rf7AzEwPGtk3ca34f3v2SOfA3Va+QgGr8QYBmLzuJyrJS0CIuYX6OUxHmnc9f6LUHtrEjOdyVjD7JRqIznwa3HBPpCD2EGgpLo5EWdQ9LqFMbtY2jeVtwwQSUi2pI76XrDM7+hKoP+fAbeaQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=SLVN7cwGxqFBVcr5jwBAWzGJ6d7XaOaSr+mkuRo4CLo=;
 b=UTz6foYNEO7GcBtMteHV3alXPuqkz4ium+O9TKVtTecs6FskvZz6zOer4Da50dSjgyZAX0IAkSk+Tw8SNR66UuhDNstX3ZYNdP2wPaXslmAzi3V2QK54E8zrQ9wpe2txwgoX6ZfZn6DA2ONbamfkB2q6IJ5pnYWI4Q4W3R9Lg90=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>, Xen-devel
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH 2/2] Changelog: Add __ro_after_init and CET
Thread-Topic: [PATCH 2/2] Changelog: Add __ro_after_init and CET
Thread-Index: AQHYM7LH1RgXNeZAgkCaPnspMShcz6y3BLWAgBlhsIA=
Date: Fri, 25 Mar 2022 16:39:30 +0000
Message-ID: <f2be5a63-837a-204e-ba5e-5ecb48c9caad@citrix.com>
References: <20220309123936.16991-1-andrew.cooper3@citrix.com>
 <20220309123936.16991-3-andrew.cooper3@citrix.com>
 <c5b13e54-8868-3d30-70ee-1d1daa082ec6@suse.com>
In-Reply-To: <c5b13e54-8868-3d30-70ee-1d1daa082ec6@suse.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: dcef691c-c7a8-45aa-762a-08da0e7e08cf
x-ms-traffictypediagnostic: BYAPR03MB3942:EE_
x-microsoft-antispam-prvs: <BYAPR03MB39427D7A36BDF5982E334D1FBA1A9@BYAPR03MB3942.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(66946007)(122000001)(64756008)(66476007)(66556008)(6916009)(66446008)(31696002)(36756003)(4326008)(6486002)(55236004)(8676002)(186003)(76116006)(6512007)(71200400001)(91956017)(53546011)(6506007)(316002)(86362001)(83380400001)(2616005)(26005)(54906003)(2906002)(38100700002)(508600001)(5660300002)(31686004)(4744005)(8936002)(38070700005)(82960400001)(59356011)(219803003)(207903002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?dzI1cEg4SW1QdWIzd01uUzFFS3hSVFdGVWovL1BxMk9jc2JtcHlsQmRUMEc4?=
 =?utf-8?B?Z05mNkNSem04SVNneVRVd0diREUxWFB4bnlNOWpGaWU4elQzN1hMKzVHMi8v?=
 =?utf-8?B?UlFNMUNMa2tnWDBHUDMzMGNYVHJwTzErZWw1TEdWTXA1UzkyZmdEcXpKeVMw?=
 =?utf-8?B?SmRSUHZnZnpadFVMMmNpNEZGZXJ2R3BsMjk1UWk5Z1ZzTy9Pbm5uRGFpNE9H?=
 =?utf-8?B?cVUxTDZVY1l2VUVDeE1qdXJaSTFqOFdOUDlQOXFTZ1p5NGN6WDByZ2tSV1di?=
 =?utf-8?B?TEd1OUwwd3RnS2M5YU84VjUyLzVxQkpQaTQ3MWFpVm1MWWZidEEyMzFXV2Jo?=
 =?utf-8?B?WjhJZVI2SThwYmEwSndYMzVidGFtd1VtcTBKbHJjM25lcHpDeUdyOEgrbHZU?=
 =?utf-8?B?Y25KR1NHL0hJT05nT0hHWjA4dHVVTHY3ZXMzRXFaVWlwdkFJbGhnSGNNWmgx?=
 =?utf-8?B?Q1AzMC9lYklWTFI1b3dzT1VHSVN5dllkcFRvcUNMdmxDSkNENHRzS0puYVIz?=
 =?utf-8?B?UTVwL3pjTmwyWHRybzFJNytMdU03ZWMwOGl0ZExzcGdMZnlNSGlxNUl0RFhN?=
 =?utf-8?B?ajE0c2kvZFpGQjZrQXg2T2FicDFTM0lLbDVHQzZPcEZKa0NXMGJNT0pKdDVT?=
 =?utf-8?B?ZDhwUjZHTVlLUE5TcUpXOXVPTklMTzY2bk90NGFzM0h6MnhVSFM1aUFMRTBU?=
 =?utf-8?B?b3JyeVBSSDVpdDJxSjAwTmg0TzNwVUlteVFMT1hzNU90YTltUlozT0VZRTc1?=
 =?utf-8?B?US9lcWtqS2RwaytDa1BHTHRCR25keUQ0NUhFaVA1SWdMcjh6QTFHbGNEOGNn?=
 =?utf-8?B?WnAzUi8xUnY0VzlOVkNDOUhHckllRzhpVmR6U1VHWHFwWHgzWkFzYlhCK2E5?=
 =?utf-8?B?U3FpUHJPU0lqYUtiY3d6SXRQTXFoNlQxMCt6Nmp6cUZNRU9jMTJnZUdnTmVw?=
 =?utf-8?B?ZzZQMHNZc2s5YW0wcmsvVGNtSG9XMGtnL25jTFBjZWlpWDVtWUYvT3NEME8w?=
 =?utf-8?B?T3Q4Z2hmQm9yRlJSVks4T1YzWHRuczNaZUlXcnJNOStxeFMyRFo2dXBCWE5v?=
 =?utf-8?B?MFJOSmpxenhNbFBETEhOdytoV0ZhRmNzSE1sTG1Yalo5QmNlam9SRDJMZDNo?=
 =?utf-8?B?UU5Odmdla2lPbUpoUjBwcG93NzBvanNkZVUzbXdSNHNHamV3bDZKSm5MeGZE?=
 =?utf-8?B?WmhxZFB1N2pVWWJNNW04VDlEUjhqNERPY2VMcEdqemlMWlg2WVZuNUhydXBr?=
 =?utf-8?B?Z1hNRUlTb0gybjFCNlRNdTRXQ0F0azM5NGxmRUxlZ29sYlJOMlNCY04yYlFt?=
 =?utf-8?B?MGUrNVRKdllTaVFVbVRFTTNubWNaZThiY3V5aG1ybmRMclhUYkV2MG9UdnBk?=
 =?utf-8?B?cVIyZm5wQjJJcDhteElpNlpKVkRIYUJUc3lqVTlTYUxvY1RCanRtQXppYmEx?=
 =?utf-8?B?MXJWYlczTHJHaW9hSEc0ZWNrRWRKK21HNWFxeWtZR1NVT1dCVGJwTU1Nc0RS?=
 =?utf-8?B?SUtpYnZOYzZhMVFTUUcxblhkenR4MU9ZNXU2aWEzTzgvZkduQnNWNThiTW9Z?=
 =?utf-8?B?dTZPSTZQVDhUZ1UwOUpsT3JONmU1MmZVcU5UZ0FxZCtqd1ZlN1RiWmlnd1Mw?=
 =?utf-8?B?blJ1UjhzRjB3UTdJOG9VZ1dHQTRVYUZTTmxnWCs5bUZVeHg4MnlucmFhTHoy?=
 =?utf-8?B?SStIQnlUNmZ6S0tRRGxIVFpwUjNZZ1lHOVI5KzVkTFBuc2Z3MkpPRnhBbE9W?=
 =?utf-8?B?dDJVY0czRjN1Wm9Ub2RqSktMR0tlOFhCaFNMclBVNkJQMVZJc0tVSkpONUEw?=
 =?utf-8?B?R3VFbWMxdVpDYUM0S291dnJ5eG5GZ2FJa09oM2Z6Mzd0MkVaWmFZY1JTVUlQ?=
 =?utf-8?B?NlNPTEgvWFJwRlVoOGQ2RTZPWjE3dXNKQmhxV21Gamt0c1NPSzhtekthVmNn?=
 =?utf-8?Q?1jnQOt+Fv7wRm1ieDwr4UyrSxM6Nfc86?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <74E9B1C9AA43F14489E1F87290C54EFE@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: dcef691c-c7a8-45aa-762a-08da0e7e08cf
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Mar 2022 16:39:30.1891
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 62JV48ALmUgrOoAu+0MWbhpPy13fJRNo/05lORYwzrqFFM7lxpj//jzenfDeVry132ZTG7CryTl6bSWGtJ/octgcllf8kq2iw1mgrVBlhqA=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB3942
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Fri Mar 25 16:52:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 16:52:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294852.501567 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXnAi-0000vn-M6; Fri, 25 Mar 2022 16:52:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294852.501567; Fri, 25 Mar 2022 16:52:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXnAi-0000vg-JA; Fri, 25 Mar 2022 16:52:20 +0000
Received: by outflank-mailman (input) for mailman id 294852;
 Fri, 25 Mar 2022 16:52:19 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=EIhH=UE=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nXnAh-0000va-PU
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 16:52:19 +0000
Received: from mail-lf1-x135.google.com (mail-lf1-x135.google.com
 [2a00:1450:4864:20::135])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ed96c3e9-ac5b-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 17:52:17 +0100 (CET)
Received: by mail-lf1-x135.google.com with SMTP id h7so14391049lfl.2
 for <xen-devel@lists.xenproject.org>; Fri, 25 Mar 2022 09:52:17 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ed96c3e9-ac5b-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=exHzcs3Wx1NtyvV6W7TJV+pR/BeiOMJ1mlOvCqPmOiU=;
        b=n5UBQYYPUvxdShv3weT6iC+EP+UVC94NxQ/TLlbx99QEa7VQlb+8TwrEu079wzwL1d
         m2uotbLAralAJwnRhwhkgIAseaImBGjwa4myVfHClGfnBKETqtKci11bebyCs8sKSNVT
         zUA02/hFBRTmN2aMG3eIYGCg4rZTQCdm9Ut0TvEjfigMybzIIb3cJrLKX1etQGcwyNDt
         1wSxPuVrhOIRXxa/1lCpbx9+Y6wMq5EshXiJGixIy5aZ5owTinbwesHIOPOFrF65eJ0c
         DgxY56GvBRrJjqGPUoYcCQ1yiG3ogT/gdZj5zYW7SPmggsXdWBxh90/Sg6o1LqiSyoYT
         n5hQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=exHzcs3Wx1NtyvV6W7TJV+pR/BeiOMJ1mlOvCqPmOiU=;
        b=T5KNVUtMltgdFqN52auWkDdZ74DrqOvuBJjiF81/aqRWC2kBDs+XZkKqs2TC6dXzm7
         ZG1tiFJr1on/XPZYgUYGSshxh9MbCGJg69+daJV4iZ3oBLSVL96QYkVfAb4QsqW+xyfB
         4Txio1nkTbeigKebbGiQcHvFrMW90XccGuS+HFAoN8AoeLQZ1NlLunirbnzXA44K/uyZ
         v4Np0yBnT4kEUt7AatLZiYu9tqlq/iOpRYV7+KSuqPzlEvbVmHbD3b/+fbgUzrAwmGe8
         uLqlnOoBiqC9iFTtW71mQlOiKu8vl8YnUunJwgjES1Ki2EhJb+s01U0HS72vri+f34VO
         +euA==
X-Gm-Message-State: AOAM532HV2CoPEF7l8vZXtZ85GKF9BtO7HJiaSov7xFSkdVyH8nqTpuS
	rbUl6JczMc6X4wnIvHeJCh9HHGFN8FZjOkrXCvM=
X-Google-Smtp-Source: ABdhPJy8B39DrSnTm0SvqqsM20ex++KzQ0iX24RhpXL+6HbFIOMeirqRF2oowhK4IrFJ69phOlfzd4SBldjksxr4A0c=
X-Received: by 2002:a05:6512:33c2:b0:44a:25e2:25d4 with SMTP id
 d2-20020a05651233c200b0044a25e225d4mr8373825lfg.359.1648227136475; Fri, 25
 Mar 2022 09:52:16 -0700 (PDT)
MIME-Version: 1.0
References: <alpine.DEB.2.22.394.2201281330520.27308@ubuntu-linux-20-04-desktop>
 <20220128213307.2822078-2-sstabellini@kernel.org> <2f05e63a-96c3-e78f-f7e4-36fd17fcd58c@gmail.com>
 <alpine.DEB.2.22.394.2203221711110.2910984@ubuntu-linux-20-04-desktop>
 <c57dc9a9-e2ca-74c6-4fde-e2a6f1400de5@suse.com> <alpine.DEB.2.22.394.2203241522510.2910984@ubuntu-linux-20-04-desktop>
 <ccb85826-feb8-7c26-64e3-0a459bdaf8b6@gmail.com>
In-Reply-To: <ccb85826-feb8-7c26-64e3-0a459bdaf8b6@gmail.com>
From: Jason Andryuk <jandryuk@gmail.com>
Date: Fri, 25 Mar 2022 12:52:04 -0400
Message-ID: <CAKf6xpsB9Tr+WtDWPRYmkjB+8QmA0-oWrAcYh5D2G6WVWDZo1Q@mail.gmail.com>
Subject: Re: [PATCH v3 2/5] xen: make evtchn_alloc_unbound public
To: "Daniel P. Smith" <dpsmith.dev@gmail.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>, Jan Beulich <jbeulich@suse.com>, 
	xen-devel <xen-devel@lists.xenproject.org>, Juergen Gross <jgross@suse.com>, 
	Bertrand.Marquis@arm.com, Julien Grall <julien@xen.org>, Volodymyr_Babchuk@epam.com, 
	Luca Miccio <lucmiccio@gmail.com>, Stefano Stabellini <stefano.stabellini@xilinx.com>, 
	Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, 
	Wei Liu <wl@xen.org>
Content-Type: text/plain; charset="UTF-8"

On Fri, Mar 25, 2022 at 11:46 AM Daniel P. Smith <dpsmith.dev@gmail.com> wrote:
>
> On 3/24/22 20:30, Stefano Stabellini wrote:
> > On Wed, 23 Mar 2022, Jan Beulich wrote:
> >> On 23.03.2022 01:22, Stefano Stabellini wrote:
> >>> The existing XSM check in evtchn_alloc_unbound cannot work and should
> >>> not work: it is based on the current domain having enough privileges to
> >>> create the event channel. In this case, we have no current domain at
> >>> all. The current domain is Xen itself.
> >>
> >> And DOM_XEN cannot be given the appropriate permission, perhaps
> >> explicitly when using a real policy and by default in dummy and SILO
> >> modes?
> >
> > The issue is that the check is based on "current", not one of the
> > domains passed as an argument to evtchn_alloc_unbound. Otherwise,
> > passing DOMID_XEN would be straightforward.
> >
> > We would need to use a hack (like Daniel wrote in the other email) to
> > set the idle_domain temporarily as a privileged domain only for the sake
> > of passing an irrelevant (irrelevant as in "not relevant to this case")
> > XSM check. That cannot be an improvement. Also, setting current to a
> > "fake" domain is not great either.
>
> My suggestion was not to intended to be simply a hack but looking at the
> larger issue instead of simply doing a targeted fix for this one
> instnace. While I cannot give an example right off hand, the reality is,
> at least for hyperlaunch, that we cannot say for certain there will not
> be further resource allocations that is protected by the security
> framework and will require preliminary handling by the construction
> logic in the hypervisor. The low-complexity approach is to address each
> one in a case-by-case fashion using direct calls that go around the
> security framework. A more security conscience, and higher complexity,
> approach would be to consider a least-privilege approach and look at
> introducing the ability to do controlled switching of contexts, i.e.
> moving `current` from DOMID_IDLE to DOMID_CONSTRUCT, to one that is
> granted only the necessary privileges to do the resource allocations in
> which it is limited.
>
> This is also not the first time this issue has come up, I don't recall
> the exact thread but several months ago someone ran into the issue they
> need to make a call to a resource function and was blocked by XSM
> because DOMID_IDLE has no privileges. The reality is that the idea of
> monolithic high-privileged entities is being dropped in favor of
> least-privilege, and where possible hardware enforced, constraint. This
> can be seen with Intel de-privileging SMM and running SMI handlers in
> constrained ring 3. Arm is gaining capability pointers, CHERI, that will
> enable the possibility for constrained, least-privileged kernel
> subsystems. Would it not be advantageous for Xen to start moving in such
> a direction that would enable it to provide a new level of safety and
> security for consumers of Xen?
>
> Coming back to the short-term, I would advocate for introducing the
> concept and abstraction of constrained context switching through a set
> of function calls, which would likely be under XSM to allow policy
> enforcement. Likely the introductory implementation would just mask the
> fact that it is just setting `is_privileged` for DOMID_IDLE. Future
> evolution of the capability could see the introduction of new
> "contexts", whether they are represented by a domain could be determined
> then, and the ability to do controlled switching based on policy.

For the specific case of evtchn_alloc_unbound, Flask's
xsm_evtchn_unbound has a side effect of labeling the event channel.
So skipping the hook will have unintended consequences for Flask.

xsm_evtchn_unbound could be split in two to have an access piece and a
labeling piece.  The access piece is run at hypercall entry, and the
labeling is still done in evtchn_alloc_unbound.  For Flask, labeling
depends on the two domain endpoints, but not current.

More generally, it seems to me there are too many xsm checks in the
middle of functions/operations.  They are fine for a normal entry via
hypercall, but they interfere with Xen's internal operations.  Xen
shouldn't be restricted in its own operations.  The live update people
hit it with domain creation, and I just posted a patch for
unmap_domain_pirq.

It would be more obvious for auditing if each hypercall entrypoint
applied xsm checks.  Make the allow/deny decision as early as
possible.  Then a worker function would be easily callable for the
Xen-internal case.  The flip side of that is the xsm hook may need
sub-op specific data to make its decision, so it fits to put it in the
sub-op function.  It seems to me the location of hooks was determined
by where the data they need is already available.  Re-arranging hooks
may require some duplication.

The xsm controls should clearly apply to the DomUs and other entities
managed by Xen.  xsm restricting Xen itself seems wrong.  Having
internal operations get denied by xsm may unintentionally subvert Xen
itself.

Yes, moving checks outward makes for an un-restricted middle.  But the
security server running in the same address space isn't going to help
against code exec inside the hypervisor.

I think I view it like this:  Why is a xen internal operation subject
to a security check?  When would one ever want to deny a xen internal
operation?

Regards,
Jason


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 16:55:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 16:55:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294855.501579 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXnDz-0001an-6q; Fri, 25 Mar 2022 16:55:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294855.501579; Fri, 25 Mar 2022 16:55:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXnDz-0001ag-3Y; Fri, 25 Mar 2022 16:55:43 +0000
Received: by outflank-mailman (input) for mailman id 294855;
 Fri, 25 Mar 2022 16:55:41 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nXnDx-0001aI-It
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 16:55:41 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXnDw-0007Pj-Fb; Fri, 25 Mar 2022 16:55:40 +0000
Received: from [54.239.6.185] (helo=[192.168.14.36])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXnDw-0004Ph-8E; Fri, 25 Mar 2022 16:55:40 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=ZYKelxMqoYXp5nROzK/duNJ/+FTEhsyxsMFRh5kdYNs=; b=5UCPZL1MOs138Kr4h0NqROqKHY
	Oz7/2Qld3TBDPjs091dZFUXt46ehvnd63SBii12Y/TW10+gbY15kE/pMU2ulx1oHoa0MKj6fdaiMc
	ZgzW55iSfIufDp2v2FcWjhWg2R8aw+xVH5p3VtuG4F2Ocr18VmByBh8h86uskIMRsaew=;
Message-ID: <820bf8f6-543d-5b2f-fda5-720cf5f476c7@xen.org>
Date: Fri, 25 Mar 2022 16:55:37 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v3 2/5] xen: make evtchn_alloc_unbound public
To: "Daniel P. Smith" <dpsmith.dev@gmail.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Jan Beulich <jbeulich@suse.com>
Cc: xen-devel@lists.xenproject.org, jgross@suse.com,
 Bertrand.Marquis@arm.com, Volodymyr_Babchuk@epam.com,
 Luca Miccio <lucmiccio@gmail.com>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>
References: <alpine.DEB.2.22.394.2201281330520.27308@ubuntu-linux-20-04-desktop>
 <20220128213307.2822078-2-sstabellini@kernel.org>
 <2f05e63a-96c3-e78f-f7e4-36fd17fcd58c@gmail.com>
 <alpine.DEB.2.22.394.2203221711110.2910984@ubuntu-linux-20-04-desktop>
 <c57dc9a9-e2ca-74c6-4fde-e2a6f1400de5@suse.com>
 <alpine.DEB.2.22.394.2203241522510.2910984@ubuntu-linux-20-04-desktop>
 <ccb85826-feb8-7c26-64e3-0a459bdaf8b6@gmail.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <ccb85826-feb8-7c26-64e3-0a459bdaf8b6@gmail.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Daniel,

On 25/03/2022 15:45, Daniel P. Smith wrote:
>>>> The existing XSM check in evtchn_alloc_unbound cannot work and should
>>>> not work: it is based on the current domain having enough privileges to
>>>> create the event channel. In this case, we have no current domain at
>>>> all. The current domain is Xen itself.
>>>
>>> And DOM_XEN cannot be given the appropriate permission, perhaps
>>> explicitly when using a real policy and by default in dummy and SILO
>>> modes?
>>
>> The issue is that the check is based on "current", not one of the
>> domains passed as an argument to evtchn_alloc_unbound. Otherwise,
>> passing DOMID_XEN would be straightforward.
>>
>> We would need to use a hack (like Daniel wrote in the other email) to
>> set the idle_domain temporarily as a privileged domain only for the sake
>> of passing an irrelevant (irrelevant as in "not relevant to this case")
>> XSM check. That cannot be an improvement. Also, setting current to a
>> "fake" domain is not great either.
> 
> My suggestion was not to intended to be simply a hack but looking at the
> larger issue instead of simply doing a targeted fix for this one
> instnace. While I cannot give an example right off hand, the reality is,
> at least for hyperlaunch, that we cannot say for certain there will not
> be further resource allocations that is protected by the security
> framework and will require preliminary handling by the construction
> logic in the hypervisor. The low-complexity approach is to address each
> one in a case-by-case fashion using direct calls that go around the
> security framework. A more security conscience, and higher complexity,
> approach would be to consider a least-privilege approach and look at
> introducing the ability to do controlled switching of contexts, i.e.
> moving `current` from DOMID_IDLE to DOMID_CONSTRUCT, to one that is
> granted only the necessary privileges to do the resource allocations in
> which it is limited.
> 
> This is also not the first time this issue has come up, I don't recall
> the exact thread but several months ago someone ran into the issue they
> need to make a call to a resource function and was blocked by XSM
> because DOMID_IDLE has no privileges.

This was in the context of Live-Updating Xen. We are trying to re-use as 
much as possible the code used by the hypercalls. Those functions may 
contain xsm check that would fail because current would be an idle vCPU.

For the full context:

https://lore.kernel.org/xen-devel/bfd645cf42ef7786183be15c222ad04beed362c0.camel@xen.org/

> The reality is that the idea of
> monolithic high-privileged entities is being dropped in favor of
> least-privilege, and where possible hardware enforced, constraint. This
> can be seen with Intel de-privileging SMM and running SMI handlers in
> constrained ring 3. Arm is gaining capability pointers, CHERI, that will
> enable the possibility for constrained, least-privileged kernel
> subsystems. Would it not be advantageous for Xen to start moving in such
> a direction that would enable it to provide a new level of safety and
> security for consumers of Xen?
> 
> Coming back to the short-term, I would advocate for introducing the
> concept and abstraction of constrained context switching through a set
> of function calls, which would likely be under XSM to allow policy
> enforcement. Likely the introductory implementation would just mask the
> fact that it is just setting `is_privileged` for DOMID_IDLE. Future
> evolution of the capability could see the introduction of new
> "contexts", whether they are represented by a domain could be determined
> then, and the ability to do controlled switching based on policy.

+1 with this idea.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 17:19:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 17:19:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294862.501589 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXnak-000496-8V; Fri, 25 Mar 2022 17:19:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294862.501589; Fri, 25 Mar 2022 17:19:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXnak-00048z-54; Fri, 25 Mar 2022 17:19:14 +0000
Received: by outflank-mailman (input) for mailman id 294862;
 Fri, 25 Mar 2022 17:19:13 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nXnaj-00048t-63
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 17:19:13 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXnah-0007s0-4L; Fri, 25 Mar 2022 17:19:11 +0000
Received: from [54.239.6.185] (helo=[192.168.14.36])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXnag-00061q-Tf; Fri, 25 Mar 2022 17:19:11 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=IQAFwk1fxmL7cyE2pxvtpb6wGYZmKycTJ0jFaQaSvi0=; b=ZPq4v0AZbqvgsv22WgjfSuolwM
	raRS+5Jk6ypZ2TgybJfgoRmaZ+r//XG34jPZdwC4gEipu7MINMZdtrTmQBQKlU9n3SSUFccGbPWTo
	lFsnEnzw5+IMAzasFTUQHaNQfOLqZ3QDH4AIrs4ayCF20GI3MxEl84aKR/K3xKHohmeY=;
Message-ID: <da700983-759b-2de6-9c36-0d09c6b06c0d@xen.org>
Date: Fri, 25 Mar 2022 17:19:08 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v3 2/5] xen: make evtchn_alloc_unbound public
To: Stefano Stabellini <sstabellini@kernel.org>,
 Jan Beulich <jbeulich@suse.com>
Cc: xen-devel@lists.xenproject.org, jgross@suse.com,
 Bertrand.Marquis@arm.com, Volodymyr_Babchuk@epam.com,
 Luca Miccio <lucmiccio@gmail.com>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 "Daniel P. Smith" <dpsmith.dev@gmail.com>
References: <alpine.DEB.2.22.394.2201281330520.27308@ubuntu-linux-20-04-desktop>
 <20220128213307.2822078-2-sstabellini@kernel.org>
 <2f05e63a-96c3-e78f-f7e4-36fd17fcd58c@gmail.com>
 <alpine.DEB.2.22.394.2203221711110.2910984@ubuntu-linux-20-04-desktop>
 <c57dc9a9-e2ca-74c6-4fde-e2a6f1400de5@suse.com>
 <alpine.DEB.2.22.394.2203241522510.2910984@ubuntu-linux-20-04-desktop>
From: Julien Grall <julien@xen.org>
In-Reply-To: <alpine.DEB.2.22.394.2203241522510.2910984@ubuntu-linux-20-04-desktop>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Stefano,

On 25/03/2022 00:30, Stefano Stabellini wrote:
> On Wed, 23 Mar 2022, Jan Beulich wrote:
>> On 23.03.2022 01:22, Stefano Stabellini wrote:
>>> On Tue, 15 Mar 2022, Daniel P. Smith wrote:
>>>> On 1/28/22 16:33, Stefano Stabellini wrote:
>>>>> From: Luca Miccio <lucmiccio@gmail.com>
>>>>>
>>>>> The xenstore event channel will be allocated for dom0less domains. It is
>>>>> necessary to have access to the evtchn_alloc_unbound function to do
>>>>> that, so make evtchn_alloc_unbound public.
>>>>>
>>>>> Add a skip_xsm parameter to allow disabling the XSM check in
>>>>> evtchn_alloc_unbound (xsm_evtchn_unbound wouldn't work for a call
>>>>> originated from Xen before running any domains.)
>>>>>
>>>>> Signed-off-by: Luca Miccio <lucmiccio@gmail.com>
>>>>> Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
>>>>> CC: Julien Grall <julien@xen.org>
>>>>> CC: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
>>>>> CC: Bertrand Marquis <bertrand.marquis@arm.com>
>>>>> CC: Andrew Cooper <andrew.cooper3@citrix.com>
>>>>> CC: George Dunlap <george.dunlap@citrix.com>
>>>>> CC: Jan Beulich <jbeulich@suse.com>
>>>>> CC: Wei Liu <wl@xen.org>
>>>>> ---
>>>>> Changes v3:
>>>>> - expose evtchn_alloc_unbound, assing a skip_xsm parameter
>>>>> ---
>>>>>   xen/common/event_channel.c | 13 ++++++++-----
>>>>>   xen/include/xen/event.h    |  3 +++
>>>>>   2 files changed, 11 insertions(+), 5 deletions(-)
>>>>>
>>>>> diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c
>>>>> index da88ad141a..be57d00a15 100644
>>>>> --- a/xen/common/event_channel.c
>>>>> +++ b/xen/common/event_channel.c
>>>>> @@ -284,7 +284,7 @@ void evtchn_free(struct domain *d, struct evtchn *chn)
>>>>>       xsm_evtchn_close_post(chn);
>>>>>   }
>>>>>   
>>>>> -static int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
>>>>> +int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc, bool skip_xsm)
>>>>>   {
>>>>>       struct evtchn *chn;
>>>>>       struct domain *d;
>>>>> @@ -301,9 +301,12 @@ static int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
>>>>>           ERROR_EXIT_DOM(port, d);
>>>>>       chn = evtchn_from_port(d, port);
>>>>>   
>>>>> -    rc = xsm_evtchn_unbound(XSM_TARGET, d, chn, alloc->remote_dom);
>>>>> -    if ( rc )
>>>>> -        goto out;
>>>>> +    if ( !skip_xsm )
>>>>> +    {
>>>>> +        rc = xsm_evtchn_unbound(XSM_TARGET, d, chn, alloc->remote_dom);
>>>>> +        if ( rc )
>>>>> +            goto out;
>>>>> +    }
>>>>
>>>> Please do not subvert the security framework because it causes an
>>>> inconvenience. As Jan recommended, work within the XSM check to allow
>>>> your access so that we may ensure it is done safely. If you need any
>>>> help making modifications to XSM, please do not hesitate to reach out as
>>>> I will gladly help.
>>>
>>> Thank you!
>>>
>>> First let me reply to Jan: this series is only introducing 1 more call
>>> to evtchn_alloc_unbound, which is to allocate the special xenstore event
>>> channel, the one configured via
>>> d->arch.hvm.params[HVM_PARAM_STORE_EVTCHN].
>>>
>>> It is not meant to be a generic function, and it is not meant to be
>>> called more than once. It could (should?) be __init.
>>
>> How that? Its pre-existing use doesn't disappear, and requires it to be
>> non-__init.
> 
> Sorry I meant the new function (calling get_free_port) for the new
> use-case could be __init. The new function could be added to
> xen/common/event_channel.c or to xen/arch/arm/domain_build.c.
> 
> 
>>> The existing XSM check in evtchn_alloc_unbound cannot work and should
>>> not work: it is based on the current domain having enough privileges to
>>> create the event channel. In this case, we have no current domain at
>>> all. The current domain is Xen itself.
>>
>> And DOM_XEN cannot be given the appropriate permission, perhaps
>> explicitly when using a real policy and by default in dummy and SILO
>> modes?
> 
> The issue is that the check is based on "current", not one of the
> domains passed as an argument to evtchn_alloc_unbound. Otherwise,
> passing DOMID_XEN would be straightforward.
> 
> We would need to use a hack (like Daniel wrote in the other email) to
> set the idle_domain temporarily as a privileged domain only for the sake
> of passing an irrelevant (irrelevant as in "not relevant to this case")
> XSM check. That cannot be an improvement. Also, setting current to a
> "fake" domain is not great either.
I agree they are not great. But this needs to be compared with the other 
proposals.

AFAIU, your proposal is to duplicate code. This brings other risks such 
as duplicated bug and more code to maintain.

In your case, you only need one helper. But in some other context (e.g. 
Live-Update and it looks like Hyperlaunch), we may need to re-use more 
hypercalls code.

So to me, the idea of switching to a "fake" domain or bypassing the 
check is more appealing. I have a preference for the "fake" domain here.

> 
> In the specific case of dom0less and this patch, this is the only
> instance of this issue and could be solved very straightforwardly by
> calling get_free_port directly as we discussed [1].

Exporting get_free_port() is a no-go for me. This can be easily mis-used 
and in fact you already did it in your proposal by not using the proper 
locking (I appreciate this is meant to be boot code only).

> 
> I know Julien had some reservations about that. Let's try to find a
> technical solution that makes everyone happy.
> 
> Maybe, instead of exporting get_free_port, we could create a new
> function in xen/common/event_channel.c and mark it as __init? This way:
> - we don't need to expose get_free_port
> - the new function would only be __init anyway, so no risk of runtime
>    misuse

I think the code duplication is short-sighted. I could possibly accept 
one instance, but I suspect the proposal [1] will end up to add more.
So IMHO we should try to resolve it generically now.

Cheers,

[1] 
<4836304496e6fbbea41348ed8cc9fcf6b0f3e893.1648049827.git.rahul.singh@arm.com>

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 17:54:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 17:54:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294920.501817 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXo8m-0002QF-Aw; Fri, 25 Mar 2022 17:54:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294920.501817; Fri, 25 Mar 2022 17:54:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXo8m-0002Q8-7Y; Fri, 25 Mar 2022 17:54:24 +0000
Received: by outflank-mailman (input) for mailman id 294920;
 Fri, 25 Mar 2022 17:54:23 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXo8l-0002Px-4M; Fri, 25 Mar 2022 17:54:23 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXo8k-0000IX-W1; Fri, 25 Mar 2022 17:54:22 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXo8k-0004L7-Dq; Fri, 25 Mar 2022 17:54:22 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXo8k-0004Gb-DK; Fri, 25 Mar 2022 17:54:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=YIlunm+BipHilslN4jUd7A6rfs6AiBKf5j8curXpx9k=; b=pKfqXKijRnuVS3JoapNfno8AqT
	W6sQF31ArZnJzyQWtYIsg4rs67S8T1kzdmt5T5WSTkdrvBH1/qXygGNosJPdsDPBbxq1oJXBw6H6f
	5hav3aywaLrnf7Xga4MIKFKuVtXR2ONOd1joDpQphWDlozfy9XfnhkpKR/gd9oLGyrJ4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168859-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168859: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=69218d5d2854acaa7a11c777244de4a297d2fbb9
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 25 Mar 2022 17:54:22 +0000

flight 168859 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168859/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 69218d5d2854acaa7a11c777244de4a297d2fbb9
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   25 days
Failing since        168258  2022-03-01 01:55:31 Z   24 days  255 attempts
Testing same since   168832  2022-03-25 01:43:21 Z    0 days    7 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Mara Sophie Grosch <littlefox@lf-net.org>
  Mara Sophie Grosch via groups.io <littlefox=lf-net.org@groups.io>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 904 lines long.)


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 17:58:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 17:58:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294927.501828 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXoCe-00035D-SQ; Fri, 25 Mar 2022 17:58:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294927.501828; Fri, 25 Mar 2022 17:58:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXoCe-000356-PJ; Fri, 25 Mar 2022 17:58:24 +0000
Received: by outflank-mailman (input) for mailman id 294927;
 Fri, 25 Mar 2022 17:58:23 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nXoCd-000350-Cf
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 17:58:23 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXoCc-0000O0-V7; Fri, 25 Mar 2022 17:58:22 +0000
Received: from [54.239.6.185] (helo=[192.168.14.36])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXoCc-0000K9-Nu; Fri, 25 Mar 2022 17:58:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=XMy+bKgacPjXDWULVR5e8vI0pDVvCSsQfT5c+Y2Fe1I=; b=eUyRKN+XbL9Qv3l62NCXXD+Wuy
	S7m/e5TFeYg0yqjbPNGlhTXCW1tCjz/LhHaKlU6VdKO5n2zan127uV3sEsMqfB0akExV8Z763it7m
	h9gyEVpJRjzBCA5qs1GLHa83+vgb6yUl1LtYuwbu0VnkJ1Gb17dRcKcjHrTUno36Rc4o=;
Message-ID: <5c2cc1dd-d070-a88c-0e49-bca9ba56900c@xen.org>
Date: Fri, 25 Mar 2022 17:58:20 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v3 1/5] xen: introduce xen,enhanced dom0less property
To: Stefano Stabellini <sstabellini@kernel.org>
Cc: xen-devel@lists.xenproject.org, jgross@suse.com,
 Bertrand.Marquis@arm.com, Volodymyr_Babchuk@epam.com,
 Stefano Stabellini <stefano.stabellini@xilinx.com>
References: <alpine.DEB.2.22.394.2201281330520.27308@ubuntu-linux-20-04-desktop>
 <20220128213307.2822078-1-sstabellini@kernel.org>
 <3a00dff8-c213-616e-48b0-6e2b6f30dbce@xen.org>
 <alpine.DEB.2.22.394.2203221653230.2910984@ubuntu-linux-20-04-desktop>
From: Julien Grall <julien@xen.org>
In-Reply-To: <alpine.DEB.2.22.394.2203221653230.2910984@ubuntu-linux-20-04-desktop>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Stefano,

On 23/03/2022 00:08, Stefano Stabellini wrote:
> On Sat, 29 Jan 2022, Julien Grall wrote:
>>> diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
>>> index 6931c022a2..9144d6c0b6 100644
>>> --- a/xen/arch/arm/domain_build.c
>>> +++ b/xen/arch/arm/domain_build.c
>>> @@ -2963,6 +2963,7 @@ static int __init construct_domU(struct domain *d,
>>>                                     const struct dt_device_node *node)
>>>    {
>>>        struct kernel_info kinfo = {};
>>> +    const char *dom0less_enhanced;
>>>        int rc;
>>>        u64 mem;
>>>    @@ -2978,6 +2979,12 @@ static int __init construct_domU(struct domain *d,
>>>          kinfo.vpl011 = dt_property_read_bool(node, "vpl011");
>>>    +    rc = dt_property_read_string(node, "xen,enhanced",
>>> &dom0less_enhanced);
>>> +    if ( rc == -EILSEQ ||
>>
>> I think the use an -EILSEQ wants an explanation. In a previous version, you
>> wrote that the value would be returned when:
>>
>> fdt set /chosen/domU0 xen,enhanced
>>
>> But it is not clear why. Can you print pp->value, pp->length, strnlen(..) when
>> this happens?
> 
> I added in dt_property_read_string:
> 
> printk("DEBUG %s %d value=%s value[0]=%d length=%u len=%lu\n",__func__,__LINE__,(char*)pp->value, *((char*)pp->value),pp->length, strlen(pp->value));
> 
> This is the output:
> (XEN) DEBUG dt_property_read_string 205 value= value[0]=0 length=0 len=0

Thanks posting the log!

For convenience, I am copying the comment on top of 
dt_property_read_string() prototype:

  * Search for a property in a device tree node and retrieve a null
  * terminated string value (pointer to data, not a copy). Returns 0 on
  * success, -EINVAL if the property does not exist, -ENODATA if property
  * doest not have value, and -EILSEQ if the string is not
  * null-terminated with the length of the property data.

Per your log, the length is NULL so I would have assumed -ENODATA would 
be returned. Looking at the implementation:

     const struct dt_property *pp = dt_find_property(np, propname, NULL);

     if ( !pp )
         return -EINVAL;
     if ( !pp->value )
         return -ENODATA;
     if ( strnlen(pp->value, pp->length) >= pp->length )
         return -EILSEQ;

We consider that the property when pp->value is NULL. However, AFAICT, 
we never set pp->value to NULL (see unflatten_dt_node()).

So I think there is a bug in the implementation. I would keep the check 
!pp->value (for hardening purpose) and also return -ENODATA when 
!pp->length.

Most of our device-tree code is from Linux. Looking at v5.17, the bug 
seems to be present there too. This would want to be fixed there too.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 18:46:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 18:46:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294931.501839 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXoxC-0008LR-Im; Fri, 25 Mar 2022 18:46:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294931.501839; Fri, 25 Mar 2022 18:46:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXoxC-0008LK-Ec; Fri, 25 Mar 2022 18:46:30 +0000
Received: by outflank-mailman (input) for mailman id 294931;
 Fri, 25 Mar 2022 18:46:30 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nXoxC-0008LE-1i
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 18:46:30 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXoxB-0001Or-Ha; Fri, 25 Mar 2022 18:46:29 +0000
Received: from [54.239.6.185] (helo=[192.168.14.36])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nXoxB-00033O-Am; Fri, 25 Mar 2022 18:46:29 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=UeRZWORTDKvwzEB8XOzbNRVXOylse3EeN7fgBIOJvIc=; b=Bkd+USmVWXy/NwfoAMsNEqSHa4
	Gt0ufZWyLC1xxsLubX6enZgbsFkxOcuk4t6rNCaeEMeJ9tKC64eKg30iZh3ZDNQmZer4L8NZcEScx
	GzPEAXtfncGSMTsz5Q+uoDjwW9r1mGYCDbJsUU2P8xZgHnMgRu6X8iKdsa8NIMXHlx24=;
Message-ID: <799f69b2-f581-9f5f-004a-8f9f790aba2a@xen.org>
Date: Fri, 25 Mar 2022 18:46:27 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v3 3/5] xen/arm: configure dom0less domain for enabling
 xenstore after boot
To: Stefano Stabellini <sstabellini@kernel.org>
Cc: xen-devel@lists.xenproject.org, jgross@suse.com,
 Bertrand.Marquis@arm.com, Volodymyr_Babchuk@epam.com,
 Luca Miccio <lucmiccio@gmail.com>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>
References: <alpine.DEB.2.22.394.2201281330520.27308@ubuntu-linux-20-04-desktop>
 <20220128213307.2822078-3-sstabellini@kernel.org>
 <e55c03f6-5b20-ce9c-ce88-11dc85623dce@xen.org>
 <alpine.DEB.2.22.394.2203221722430.2910984@ubuntu-linux-20-04-desktop>
From: Julien Grall <julien@xen.org>
In-Reply-To: <alpine.DEB.2.22.394.2203221722430.2910984@ubuntu-linux-20-04-desktop>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Stefano,

On 23/03/2022 01:18, Stefano Stabellini wrote:
> On Sat, 29 Jan 2022, Julien Grall wrote:
>> On 28/01/2022 21:33, Stefano Stabellini wrote:
>>> +    rc = evtchn_alloc_unbound(&alloc, true);
>>> +    if ( rc )
>>> +    {
>>> +        printk("Failed allocating event channel for domain\n");
>>> +        return rc;
>>> +    }
>>> +
>>> +    d->arch.hvm.params[HVM_PARAM_STORE_EVTCHN] = alloc.port;
>>> +
>>> +    return 0;
>>> +}
>>> +
>>>    static int __init construct_domU(struct domain *d,
>>>                                     const struct dt_device_node *node)
>>>    {
>>> @@ -3014,7 +3043,19 @@ static int __init construct_domU(struct domain *d,
>>>            return rc;
>>>          if ( kinfo.vpl011 )
>>> +    {
>>>            rc = domain_vpl011_init(d, NULL);
>>> +        if ( rc < 0 )
>>> +            return rc;
>>> +    }
>>> +
>>> +    if ( kinfo.dom0less_enhanced )
>>> +    {
>>> +        rc = alloc_xenstore_evtchn(d);
>>> +        if ( rc < 0 )
>>> +            return rc;
>>> +        d->arch.hvm.params[HVM_PARAM_STORE_PFN] = ~0ULL;
>>
>> I think it would be easy to allocate the page right now. So what prevent us to
>> do it right now?
> 
> Because (as you noted as a comment to the following patch) as soon as
> d->arch.hvm.params[HVM_PARAM_STORE_PFN] is set the guest can continue
> with the initialization and will expect the right data to be set on the
> page.

I think you misunderstood my question. From my understanding, at the 
moment, Linux would break with your proposal. So you need to modify the 
kernel in order to support what you are doing.

IOW, we have room to decide the approach here.

Xenstore protocol has a way to allow (re)connection (see 
docs/mics/xenstore-ring.txt). This feature looks quite suited to what 
you are trying to do here (we want to delay the connection).

The main advantage with this approach is the resources allocation for 
Xenstore will be done in the place and the work in Linux could be 
re-used for non-dom0less domain.

Have you explored it?

> In other words: it is not enough to have the pfn allocated, we
> also need xenstore to initialize it. At that point, it is better to do
> both later from init-dom0less.c.
See above. My main concern with your proposal is the allocation is split 
and this making more difficult to understand the initialization. Could 
you write some documentation how everything is meant to work?

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 19:19:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 19:19:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294935.501850 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXpTD-0003JU-5d; Fri, 25 Mar 2022 19:19:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294935.501850; Fri, 25 Mar 2022 19:19:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXpTD-0003JN-2W; Fri, 25 Mar 2022 19:19:35 +0000
Received: by outflank-mailman (input) for mailman id 294935;
 Fri, 25 Mar 2022 19:19:34 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ThzK=UE=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nXpTB-0003JH-OE
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 19:19:34 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 7e00de46-ac70-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 20:19:30 +0100 (CET)
Received: from pps.filterd (m0246631.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 22PHXncf031953; 
 Fri, 25 Mar 2022 19:19:02 GMT
Received: from userp3020.oracle.com (userp3020.oracle.com [156.151.31.79])
 by mx0b-00069f02.pphosted.com with ESMTP id 3ew5y287ef-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Fri, 25 Mar 2022 19:19:02 +0000
Received: from pps.filterd (userp3020.oracle.com [127.0.0.1])
 by userp3020.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 22PJHNwT125588;
 Fri, 25 Mar 2022 19:19:01 GMT
Received: from nam12-dm6-obe.outbound.protection.outlook.com
 (mail-dm6nam12lp2176.outbound.protection.outlook.com [104.47.59.176])
 by userp3020.oracle.com with ESMTP id 3exawjj7t4-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Fri, 25 Mar 2022 19:19:01 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
 by BN8PR10MB3473.namprd10.prod.outlook.com (2603:10b6:408:bc::22)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17; Fri, 25 Mar
 2022 19:18:56 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755]) by BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755%9]) with mapi id 15.20.5102.019; Fri, 25 Mar 2022
 19:18:56 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 7e00de46-ac70-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=fUFtmuUrmj0wdGvJ3Y9ntiZF6wI+h62FoYsP8MJZJew=;
 b=09BPjv8ugO+MVBy2VmUVIUy4njLnyPYmyQnsCKlvYB+wO9qcKhsVq4hT4OQVKbrm+t0E
 KVzeQEudvByhYIK8btfuGawxYpxzK1GkYrLJTdFB29HvkK9mk2+YKrzDcS2TeZvK1qc1
 yzETw/v+NK15/WURiy/svDYCOjd1qRA+2ql34dbizYuukXnK37fXpVTC7P0Teb8Yb/nN
 G8EKt2XJH5zLFN035bRE557GibWXgTu3olG8t101Mp4Rl+HP79xfRo8d0HWJ7zVZksiT
 Jkv8LrXlpfGT8V4iRRFArkMiaLwRGbjhBoJ+C2wP7u/vALKi7ntiJo9XOXY063Qsl7dC kA== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=jHiBgC5MO2GYiYgYJhtVEUEuzlcMG6+rPStGp6kdi0TpvaxepbpFkLo5MEOecFbD0i0v0fEZ07EafqWdwqE6bqx+LGGIydOznZrfST4l6uB6fIjhSlky6/viCQFbrkDmOJIslMVhF4snTQyeaKAfzaGD72mk3jIRu1GEEp1kKe0gZu1xQVztXYe3LoDfdo/bgXj2VIPfSkgP4uRsLd60SIQgX+vcShJYn9E+GjIyWJ7Y/07+goVi6BxqdW4XBOLuRNsdbHY02w8j9rSRTf8oYvFy6LvL/lPLdCKCFM3HBf1Gcw/jJB/zOon6oow5Pe1Sma0w5M8Bk/vatrdoCpbPFw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=fUFtmuUrmj0wdGvJ3Y9ntiZF6wI+h62FoYsP8MJZJew=;
 b=cHiPaxKlDRNikzhRPyhO+xLkYdgz2wIdbgmrIW4Pu7vVrU4w0RmcUHjB0eonRjqNT7jeidntoBO4we9odRP4HIUqh3MtNs332+3NBScL30zuJUwcpLJz8pCqWdgvtH4eNWTEURz8g7j9AwvIjkHMVRc0urf2pzymJd59pjHSIfdl6oRxY97wtxpKLRo/yB78sotkNu+4Uv9iAcTU9uqWGdx+CWat3HCBIhIFm9Jp3HKrKrcBGDblBlA9r00himoSp84jrU6B+nkj8/kLaERNF826OMZUL9va/cJBzGOHgNlm0YqgWkSwpt2Hk+c9JjvD/3AO4I1H4Z7HNjP3CN1gkg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=fUFtmuUrmj0wdGvJ3Y9ntiZF6wI+h62FoYsP8MJZJew=;
 b=pLf8b6p5d9qrGLDuwemgcP5qh5hqsNfYpwQ9giaP10TXIRtp4cbh/nxXxZ5rBo0lVjOGwTXILoILjnnVk9/Bqfp49IF9gPIaXE3FQQ1QjoBNEzfSsQVNMxeOARG1mgOtlg4PnU0OjOVDPqwdp27usf30TLTwl6ynyjXZjIs5u3Y=
Message-ID: <bc63e39f-33dd-0633-f72d-df08ece23684@oracle.com>
Date: Fri, 25 Mar 2022 15:18:52 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v2] xen: fix is_xen_pmu()
Content-Language: en-US
To: Juergen Gross <jgross@suse.com>, xen-devel@lists.xenproject.org,
        x86@kernel.org, linux-kernel@vger.kernel.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
        Thomas Gleixner <tglx@linutronix.de>, Ingo Molnar <mingo@redhat.com>,
        Borislav Petkov <bp@alien8.de>,
        Dave Hansen <dave.hansen@linux.intel.com>,
        "H. Peter Anvin" <hpa@zytor.com>,
        =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?= <marmarek@invisiblethingslab.com>
References: <20220325142002.31789-1-jgross@suse.com>
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
In-Reply-To: <20220325142002.31789-1-jgross@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: SN4PR0201CA0060.namprd02.prod.outlook.com
 (2603:10b6:803:20::22) To BLAPR10MB5009.namprd10.prod.outlook.com
 (2603:10b6:208:321::10)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 1152988c-f18f-4c33-5273-08da0e944ea2
X-MS-TrafficTypeDiagnostic: BN8PR10MB3473:EE_
X-Microsoft-Antispam-PRVS: 
	<BN8PR10MB34737A203BFF58291FFCD6F88A1A9@BN8PR10MB3473.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BLAPR10MB5009.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(8936002)(66556008)(86362001)(8676002)(31696002)(44832011)(2906002)(6486002)(83380400001)(6512007)(508600001)(5660300002)(2616005)(6666004)(66574015)(66946007)(7416002)(4326008)(316002)(31686004)(36756003)(66476007)(53546011)(186003)(26005)(54906003)(6506007)(38100700002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?TmxTZ01JeDNrNlJWMkYvTlpKNnF4RWpZcWJaM1lrRElyWU5FTHpqeitHcUNj?=
 =?utf-8?B?cnlBcmFaUXpCOVlnbGV0M0t2WVJQd21ackthVDFiNG81K1RNc0lmKzRiemhp?=
 =?utf-8?B?b3JRT1oxakVsM0R4TWZNekNpN1FjYWdsOUU1UHNadFQ5WURSMG5jQjBJcS9U?=
 =?utf-8?B?TjdQVDA4WHJwbHVQWW4yandHVG5NeFB3VUM2M3djTHExalVjc0FPdzVJcGpH?=
 =?utf-8?B?SEVzM0VwclhvVzRIaFEvNFVqcC9GbHZPdHVVWThUNUhBRlk0cGgrc1M5cU5F?=
 =?utf-8?B?bzRkcVJ0QjdpZWxvUGZINHpzUWZ6R0R0QVN5ZnlLYWQvSVVzbHovQ2k3dldY?=
 =?utf-8?B?bFcvbUtHVW9oRG0wbDlOTFdoOWR5aVNuN2ZvMGZERFJ1ZHlZSnZIdGRtd0pU?=
 =?utf-8?B?QTFPZ2RVWmprNERGd25LV2ZJa3BZWGdFbFI0blhHWHhqYXpZWDFkQkZ0VkRx?=
 =?utf-8?B?OFZqUkFtOTlFeXhlZVBKL2dWSkZSN1ppdlppOWNqTjRBWEhvZ1ZMdHVxWnoz?=
 =?utf-8?B?NExUb2tweTBHRTZ1TFVrZ0lJTFhnRFpwRVVxSk9VZ0l0SU1pTG9MVFNSRkdX?=
 =?utf-8?B?RVFHMDRaTWRPZVp1UDVhOVF5NzRxMXFLVVpRdFpCeG9NRHJJU2ZvRWZpcFZu?=
 =?utf-8?B?L0gvNUp1dXZ4Tmc3OTlXTEhxZ2ZtMGlWcjl2ZHIrc3B5VFZXYlArSi93RmxV?=
 =?utf-8?B?ZWZzMVNrY0NPVUR5OGovdmNHdkVYYnR5bUFuMTdPMWYzR1d6M0cyK3FWZnRS?=
 =?utf-8?B?L2ZDeVltSk9NRjU2K2xFKzByZnd0RjQ5U2Vsd25LZHF4c2VQMmhYZ3pub0dr?=
 =?utf-8?B?cGVEQklrMFRHQk5sVWdFcXZhcExWb3Mrb2ozUDVVV2dKOXlBWGZQMlZ6Y3VL?=
 =?utf-8?B?aHVXRG9tQWErQXM0Skl4R2JHTnNxNU9JWDB4N3YyOFQrV3R6N200K2ZuMDRE?=
 =?utf-8?B?SmZtRVc5WnllZVBHK2xxSUF2VEI3UWlRVWxEVmJ6UlBrL1NGN2UwR2FXQWc3?=
 =?utf-8?B?djRlUUM1ZndCMTJ3bmp6RTRmd0x3UWZsbEZ3NmRkNkZsalI0MTJ0bHJNeGlY?=
 =?utf-8?B?VE9EdUtuZ3RhV2VncDcxS2l6bmVtcFVVL04wSkgvZ041TDczdmgxU1FVZnFO?=
 =?utf-8?B?VzRNbTRJTndyRGtEbUNVTTB4MjRla21iNW1Qay9pTU0yTHJiL1U2UG1LNk5S?=
 =?utf-8?B?eGVncVE2cDVHZDhtRWlLcG45TkhwaEt6bmtodWpDT2svNVN6bzhMU2owTC9T?=
 =?utf-8?B?eDdHZTFkVGF6b2M4RzVFcTIzYTZLRE03anpVek9WZHIvY0tWNFFLV2gvdTZk?=
 =?utf-8?B?RGRBRkRMcUF1VHk4NVYzSVlyWDdLSEY1UVlnYmR2VGFSUUVGMVdIQko4eHZz?=
 =?utf-8?B?S1dBK0FSVWk2OVFRZWFid3JEZThYNGNzSWpTcjdmMEQ1eFFRWTVUWDZHK2pZ?=
 =?utf-8?B?b3ovdStZVE1IdzNwMGhmNFEwbG0rTnFwMVl0Y0lXRkhnczJGZS93emdsNGZV?=
 =?utf-8?B?b2cyMVZRMmxHUE9QeHNIZ2ZxS1VOdW5zSjZYRXlqVlNnTWloYjlWdC9xSUlN?=
 =?utf-8?B?dlJqamNtVGUveDM0U1I5L3dtSXlPREFqRE5uY2h4eXRwTk5yaXQrS1lkSmpq?=
 =?utf-8?B?a29yMi9qZVh0Zi90bEEvNDdCa012dE5RdnhUdEFaYTI3UEtRVVNOMzBvZ1c0?=
 =?utf-8?B?WC9IMGhsUkV4TEtyckZ3ZmZNcFBSVVE4MU1CVlhtbzVxZkczUG1WWEFLSWY0?=
 =?utf-8?B?WDFiNlRhR3VHM1hONHY0K1NWNDVKbkg5M2hYb01OZzdyYlFtaEwzemNlaCtk?=
 =?utf-8?B?NFRxRDRuUFZsWWIrQkIzMVFSR3gxUW1ydTFaOU02RzV3ekw4Rkxtc0FEMzgv?=
 =?utf-8?B?K0Q3bU1iQ2w2eFpFc0ZsbVdHTCt1VVFjQkpvV1Y5MDdpZVZjd3NKekNrTE95?=
 =?utf-8?B?K1hScCtLMmI5WmFmNTNZNlJlRHorbFI2NGdEL3FZRnN0Zi8raXlXSk5vaDBs?=
 =?utf-8?B?V0Mrc21qUGFBPT0=?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1152988c-f18f-4c33-5273-08da0e944ea2
X-MS-Exchange-CrossTenant-AuthSource: BLAPR10MB5009.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2022 19:18:56.4961
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 9lg5DXlRYHdM7/LLSHOqS2vlsgMFn4kxQ3uMPMKm3wDt1n5AFTxhV9Kow4wufriVRJa6tAN1W3LJd6PKJwefbbSl/PWHVUVGttXAMgtzdl0=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN8PR10MB3473
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10297 signatures=694973
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 bulkscore=0 phishscore=0
 mlxlogscore=999 adultscore=0 suspectscore=0 malwarescore=0 spamscore=0
 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1
 engine=8.12.0-2202240000 definitions=main-2203250106
X-Proofpoint-GUID: 6HFzpSig4kPhgDHJ4UKFromS15xH2F46
X-Proofpoint-ORIG-GUID: 6HFzpSig4kPhgDHJ4UKFromS15xH2F46


On 3/25/22 10:20 AM, Juergen Gross wrote:
> is_xen_pmu() is taking the cpu number as parameter, but it is not using
> it. Instead it just tests whether the Xen PMU initialization on the
> current cpu did succeed. As this test is done by checking a percpu
> pointer, preemption needs to be disabled in order to avoid switching
> the cpu while doing the test. While resuming from suspend() this seems
> not to be the case:
>
> [   88.082751] ACPI: PM: Low-level resume complete
> [   88.087933] ACPI: EC: EC started
> [   88.091464] ACPI: PM: Restoring platform NVS memory
> [   88.097166] xen_acpi_processor: Uploading Xen processor PM info
> [   88.103850] Enabling non-boot CPUs ...
> [   88.108128] installing Xen timer for CPU 1
> [   88.112763] BUG: using smp_processor_id() in preemptible [00000000] code: systemd-sleep/7138
> [   88.122256] caller is is_xen_pmu+0x12/0x30
> [   88.126937] CPU: 0 PID: 7138 Comm: systemd-sleep Tainted: G        W         5.16.13-2.fc32.qubes.x86_64 #1
> [   88.137939] Hardware name: Star Labs StarBook/StarBook, BIOS 7.97 03/21/2022
> [   88.145930] Call Trace:
> [   88.148757]  <TASK>
> [   88.151193]  dump_stack_lvl+0x48/0x5e
> [   88.155381]  check_preemption_disabled+0xde/0xe0
> [   88.160641]  is_xen_pmu+0x12/0x30
> [   88.164441]  xen_smp_intr_init_pv+0x75/0x100
>
> Fix that by replacing is_xen_pmu() by a simple boolean variable which
> reflects the Xen PMU initialization state on cpu 0.
>
> Modify xen_pmu_init() to return early in case it is being called for a
> cpu other than cpu 0 and the boolean variable not being set.
>
> Fixes: bf6dfb154d93 ("xen/PMU: PMU emulation code")
> Reported-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
> Signed-off-by: Juergen Gross <jgross@suse.com>


Reviewed-by: Boris Ostrovsky <boris.ostrovsky@oracle.com>



From xen-devel-bounces@lists.xenproject.org Fri Mar 25 19:42:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 19:42:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294940.501860 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXpoq-0006X7-2p; Fri, 25 Mar 2022 19:41:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294940.501860; Fri, 25 Mar 2022 19:41:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXpop-0006X0-WC; Fri, 25 Mar 2022 19:41:56 +0000
Received: by outflank-mailman (input) for mailman id 294940;
 Fri, 25 Mar 2022 19:41:54 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXpoo-0006Wq-Dz; Fri, 25 Mar 2022 19:41:54 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXpoo-0002P7-AT; Fri, 25 Mar 2022 19:41:54 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXpon-0003dD-JO; Fri, 25 Mar 2022 19:41:53 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXpon-0006dH-H0; Fri, 25 Mar 2022 19:41:53 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=peRCm3eb89z1sRXRgE+QRxvS+6XVkZdnKtUAJpYi6xE=; b=N3UFStQIVBykru6q3Pdq2pBZZS
	xLe5A9JY/myJ3DiH1YKAHN79X+jlpJfBuU/Vj4ApFmfBdJNVm7LCTcMYjsU+w+eUoZJiPME74QPn+
	FaCY/fLSumqFahn5EEuQS53uWseXYwdSzN4ILGCI6O6b7f5J9Ytql+XFYtFtXBBFi3TM=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168838-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168838: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-arm64-arm64-libvirt-raw:guest-start:fail:heisenbug
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=34af78c4e616c359ed428d79fe4758a35d2c5473
X-Osstest-Versions-That:
    linux=7403e6d8263937dea206dd201fed1ceed190ca18
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 25 Mar 2022 19:41:53 +0000

flight 168838 linux-linus real [real]
flight 168861 linux-linus real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168838/
http://logs.test-lab.xenproject.org/osstest/logs/168861/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-arm64-arm64-libvirt-raw 13 guest-start         fail pass in 168861-retest

Tests which did not succeed, but are not blocking:
 test-arm64-arm64-libvirt-raw 14 migrate-support-check fail in 168861 never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check fail in 168861 never pass
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168830
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168830
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168830
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168830
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168830
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168830
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168830
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168830
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                34af78c4e616c359ed428d79fe4758a35d2c5473
baseline version:
 linux                7403e6d8263937dea206dd201fed1ceed190ca18

Last test of basis   168830  2022-03-24 20:10:22 Z    0 days
Testing same since   168838  2022-03-25 06:20:14 Z    0 days    1 attempts

------------------------------------------------------------
1025 people touched revisions under test,
not listing them all

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 fail    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   7403e6d826393..34af78c4e616c  34af78c4e616c359ed428d79fe4758a35d2c5473 -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 19:58:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 19:58:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294948.501872 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXq4K-00087F-HR; Fri, 25 Mar 2022 19:57:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294948.501872; Fri, 25 Mar 2022 19:57:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXq4K-000878-Dn; Fri, 25 Mar 2022 19:57:56 +0000
Received: by outflank-mailman (input) for mailman id 294948;
 Fri, 25 Mar 2022 19:57:54 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LYjy=UE=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nXq4I-000872-OZ
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 19:57:54 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id db1839ca-ac75-11ec-a405-831a346695d4;
 Fri, 25 Mar 2022 20:57:53 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 1E2AAB82988;
 Fri, 25 Mar 2022 19:57:52 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 4A4ECC004DD;
 Fri, 25 Mar 2022 19:57:50 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: db1839ca-ac75-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1648238270;
	bh=DzyrfFglDlc7YQs7fW4uYa9iFutZZkI5nExeswmm41E=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=ly9y61Pgs9AAfZgZtCtGEGd1YjdulZAZ/HFEvUCNVq7bS/uiJhKdVCabc8TWWgDuw
	 N35KTynzvzlEPp6QQ5rVLRD8SSrq/6SwmLoYj79EqW5N7PWqmj9LYGx/GixXPnCH5v
	 6aZ6/1LWHNm8SBm9+rBu3C6r0ORvNX4PLfGMhfXz0S8CGkkkB4mzyUJAwKCBCT7/NL
	 yeMl9aAAKsNgz/ZUd52hYmKovTdEy0ny3eTESts90FiJjQIBdVS2sd/HfTck5WG0Cp
	 LJZ0oimXj3lxUEACyHqwcDgBRw9ASSSD7iTwaLCdnwanWnugJPOuGe38/6kbJN4Aj1
	 dwMHNbgpF+paw==
Date: Fri, 25 Mar 2022 12:57:49 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Michal Orzel <michal.orzel@arm.com>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    Bertrand Marquis <bertrand.marquis@arm.com>, 
    xen-devel@lists.xenproject.org, Andrew Cooper <andrew.cooper3@citrix.com>, 
    George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, 
    Julien Grall <julien@xen.org>, Wei Liu <wl@xen.org>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: Re: [RFC PATCH] xen/build: Add cppcheck and cppcheck-html make
 rules
In-Reply-To: <98a6df25-8a95-3e3d-e8a9-11e948da7b5b@arm.com>
Message-ID: <alpine.DEB.2.22.394.2203251257020.2910984@ubuntu-linux-20-04-desktop>
References: <77c79e86050eef2b706ee11e64183d57a0f5bcee.1648119732.git.bertrand.marquis@arm.com> <alpine.DEB.2.22.394.2203241829510.2910984@ubuntu-linux-20-04-desktop> <98a6df25-8a95-3e3d-e8a9-11e948da7b5b@arm.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Fri, 25 Mar 2022, Michal Orzel wrote:
> On 25.03.2022 02:32, Stefano Stabellini wrote:
> > On Thu, 24 Mar 2022, Bertrand Marquis wrote:
> >> cppcheck can be used to check Xen code quality.
> >>
> >> To create a report do "make cppcheck" on a built tree adding any options
> >> you added during the process you used to build xen (like CROSS_COMPILE
> >> or XEN_TARGET_ARCH). This will generate an xml report xen-cppcheck.xml.
> >>
> >> To create a html report do "make cppcheck-html" in the same way and a
> >> full report to be seen in a browser will be generated in
> >> cppcheck-htmlreport/index.html.
> >>
> >> For better results it is recommended to build your own cppcheck from the
> >> latest sources that you can find at [1].
> >> Development and result analysis has been done with cppcheck 2.7.
> >>
> >> The Makefile rule is searching for all C files which have been compiled
> >> (ie which have a generated .o file) and is running cppcheck on all of
> >> them using the current configuration of xen so only the code actually
> >> compiled is checked.
> >>
> >> A new tool is introduced to merge all cppcheck reports into one global
> >> report including all findings and removing duplicates.
> >>
> >> Some extra variables can be used to customize the report:
> >> - CPPCHECK can be used to give the full path to the cppcheck binary to
> >> use (default is to use the one from the standard path).
> >> - CPPCHECK_HTMLREPORT can be used to give the full path to
> >> cppcheck-htmlreport (default is to use the one from the standard path).
> >>
> >> This has been tested on several arm configurations (x86 should work but
> >> has not been tested).
> >>
> >> [1] https://cppcheck.sourceforge.io/
> >>
> >> Signed-off-by: Bertrand Marquis <bertrand.marquis@arm.com>
> >> Signed-off-by: Michal Orzel <michal.orzel@arm.com>
> > 
> > Very cool, I was looking forward to this :-)
> > 
> > 
> >> diff --git a/xen/tools/merge_cppcheck_reports.py b/xen/tools/merge_cppcheck_reports.py
> >> new file mode 100755
> >> index 0000000000..ef055f6925
> >> --- /dev/null
> >> +++ b/xen/tools/merge_cppcheck_reports.py
> >> @@ -0,0 +1,73 @@
> >> +#!/usr/bin/env python
> >> +
> >> +"""
> >> +This script acts as a tool to merge XML files created by cppcheck.
> >> +Usage:
> >> +    merge_cppcheck_reports.py [FILES] [OUTPUT]
> >> +
> >> +    FILES  - list of XML files with extension .cppcheck
> >> +    OUTPUT - file to store results (with .xml extension).
> >> +             If not specified, the script will print results to stdout.
> >> +"""
> >> +
> >> +import sys
> >> +from xml.etree import ElementTree
> >> +
> >> +def elements_equal(el1, el2):
> >> +    if type(el1) != type(el2): return False
> >> +
> >> +    el1_location = str(el1.find('location').attrib)
> >> +    el2_location = str(el2.find('location').attrib)
> >> +
> >> +    if el1_location != el2_location: return False
> >> +
> >> +    return True
> >> +
> >> +def remove_duplicates(xml_root_element):
> >> +    elems_to_remove = []
> >> +    index = 0
> >> +    elems_list = list(xml_root_element.findall("errors")[0])
> >> +    for elem1 in elems_list:
> >> +        index += 1
> >> +        for elem2 in elems_list[index:]:
> >> +            if elements_equal(elem1, elem2) and elem2 not in elems_to_remove:
> >> +                elems_to_remove.append(elem2)
> >> +                continue
> >> +
> >> +    for elem in elems_to_remove:
> >> +        xml_root_element.findall("errors")[0].remove(elem)
> >> +
> >> +def merge(files):
> >> +    result_xml_root = None
> >> +    for xml_file in files:
> >> +        xml_root = ElementTree.parse(xml_file).getroot()
> > 
> > 
> > Traceback (most recent call last):
> >   File "/local/repos/xen-upstream/xen/tools/merge_cppcheck_reports.py", line 73, in <module>
> >     run()
> >   File "/local/repos/xen-upstream/xen/tools/merge_cppcheck_reports.py", line 60, in run
> >     result = merge(files)
> >   File "/local/repos/xen-upstream/xen/tools/merge_cppcheck_reports.py", line 43, in merge
> >     xml_root = ElementTree.parse(xml_file).getroot()
> >   File "/usr/lib/python2.7/xml/etree/ElementTree.py", line 1182, in parse
> >     tree.parse(source, parser)
> >   File "/usr/lib/python2.7/xml/etree/ElementTree.py", line 657, in parse
> >     self._root = parser.close()
> >   File "/usr/lib/python2.7/xml/etree/ElementTree.py", line 1671, in close
> >     self._raiseerror(v)
> >   File "/usr/lib/python2.7/xml/etree/ElementTree.py", line 1523, in _raiseerror
> >     raise err
> > xml.etree.ElementTree.ParseError: no element found: line 11, column 0
> > make: *** [Makefile:576: xen-cppcheck.xml] Error 1
> > 
> > I think we should catch the xml.etree.ElementTree.ParseError exception and continue?
> 
> Well, this is of course something that we might do but this error clearly warns us that
> some XML files is not well formatted and therefore is not parsable. This could mean that
> you are using some old cppcheck version. Is it correct assumption?

I confirm it was an issue with the cppcheck version. I updated to the
latest main branch and it worked fine, thanks!

Then, I suggest we catch the exception and print an informative error
like "please upgrade your cppcheck to version xxx or greater"


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 21:03:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 21:03:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294953.501882 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXr5y-0006ZI-9G; Fri, 25 Mar 2022 21:03:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294953.501882; Fri, 25 Mar 2022 21:03:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXr5y-0006ZB-5u; Fri, 25 Mar 2022 21:03:42 +0000
Received: by outflank-mailman (input) for mailman id 294953;
 Fri, 25 Mar 2022 21:03:40 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXr5w-0006Z1-JU; Fri, 25 Mar 2022 21:03:40 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXr5w-0003r5-Gz; Fri, 25 Mar 2022 21:03:40 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXr5w-0008V7-4o; Fri, 25 Mar 2022 21:03:40 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXr5v-0005h2-Uy; Fri, 25 Mar 2022 21:03:39 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=UL786TgUTKtgmEg/ywsYYBFEmWZK0Uh4MdgJPxukJ8A=; b=o/XHgOCkYfvYKBsCTUw3zq5Ml7
	EJzeyjHCtlCBOi39vJywghaaL9yqZNiBrwQNGOxmuJt8o387EHTtftUXMjX0t6YkWcvwv3P/aYqcH
	rzHT6X+8ZRRpYBbasozkYn1dFX6kBV6FxleCXQk/fqgqnmjrwpcPWPIPBkik+oL+nyZ8=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168860-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168860: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=fc90d75c2b71ae15b75128e7d0d4dbe718164ecb
X-Osstest-Versions-That:
    xen=0e03ff97def12b121b5313094a76e5db7bb5c93c
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 25 Mar 2022 21:03:39 +0000

flight 168860 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168860/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  fc90d75c2b71ae15b75128e7d0d4dbe718164ecb
baseline version:
 xen                  0e03ff97def12b121b5313094a76e5db7bb5c93c

Last test of basis   168841  2022-03-25 10:00:33 Z    0 days
Testing same since   168860  2022-03-25 17:00:30 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   0e03ff97de..fc90d75c2b  fc90d75c2b71ae15b75128e7d0d4dbe718164ecb -> smoke


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 21:05:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 21:05:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294960.501894 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXr7p-0007CX-Sr; Fri, 25 Mar 2022 21:05:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294960.501894; Fri, 25 Mar 2022 21:05:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXr7p-0007CQ-OH; Fri, 25 Mar 2022 21:05:37 +0000
Received: by outflank-mailman (input) for mailman id 294960;
 Fri, 25 Mar 2022 21:05:36 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LYjy=UE=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nXr7o-0007CK-Hy
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 21:05:36 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4fc179ce-ac7f-11ec-8fbc-03012f2f19d4;
 Fri, 25 Mar 2022 22:05:35 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 7090561D72;
 Fri, 25 Mar 2022 21:05:33 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 40E5FC340F3;
 Fri, 25 Mar 2022 21:05:32 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4fc179ce-ac7f-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1648242332;
	bh=e0/Miv8bhd+MrPduc7WY8nVow9xmomC4qnxgj9KKnU0=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=uy4Qlco9u9tgNbVb8M804X0ssYb5o6mdcTQt/tOV1xpfzQ3CY3+6K3eXafgtBMOGe
	 GxBiTTDYsTE36JQb7HhIw2rM5IYLGJqLNJKGXkWx5OOVRZIBXW5zUfVQ4/leE0z2/3
	 kyLSbmSOHu9uZwLMCNbyInyZEnVe2xmP42mT6zKJXRu1BybEaOUrXgOmtk2fcMtLsa
	 7CxLul7H2yhc2RRcRz10j1n3HIE7C//ZGl2Ed9PWtOWLxlPxK4RqrlxIse0bdg7+3+
	 JVl2itywoPjJMD68dxSLvC6hPTdNiwcDa7slEOomaI4hk3eU+CF2h/EvNx2+z+edTP
	 wYVhduSt5ttqw==
Date: Fri, 25 Mar 2022 14:05:31 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Julien Grall <julien@xen.org>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    Jan Beulich <jbeulich@suse.com>, xen-devel@lists.xenproject.org, 
    jgross@suse.com, Bertrand.Marquis@arm.com, Volodymyr_Babchuk@epam.com, 
    Luca Miccio <lucmiccio@gmail.com>, 
    Stefano Stabellini <stefano.stabellini@xilinx.com>, 
    Andrew Cooper <andrew.cooper3@citrix.com>, 
    George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>, 
    "Daniel P. Smith" <dpsmith.dev@gmail.com>
Subject: Re: [PATCH v3 2/5] xen: make evtchn_alloc_unbound public
In-Reply-To: <da700983-759b-2de6-9c36-0d09c6b06c0d@xen.org>
Message-ID: <alpine.DEB.2.22.394.2203251313350.2910984@ubuntu-linux-20-04-desktop>
References: <alpine.DEB.2.22.394.2201281330520.27308@ubuntu-linux-20-04-desktop> <20220128213307.2822078-2-sstabellini@kernel.org> <2f05e63a-96c3-e78f-f7e4-36fd17fcd58c@gmail.com> <alpine.DEB.2.22.394.2203221711110.2910984@ubuntu-linux-20-04-desktop>
 <c57dc9a9-e2ca-74c6-4fde-e2a6f1400de5@suse.com> <alpine.DEB.2.22.394.2203241522510.2910984@ubuntu-linux-20-04-desktop> <da700983-759b-2de6-9c36-0d09c6b06c0d@xen.org>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Fri, 25 Mar 2022, Julien Grall wrote:
> So to me, the idea of switching to a "fake" domain or bypassing the check is
> more appealing. I have a preference for the "fake" domain here.

As a maintainer, I am not opposed to the "fake"/"contructor" domain
concept.  It all depends on how many instances of this issue we are
going to have.  This is the only one on xen-devel so far. I don't think
it is worth adding a constructor domain for one instance only.  But I
agree with you and Daniel that if we end up with several instances, then
the constructor domain approach is probably the best option overall.


As a contributor, sadly I won't be able to spend a lot of time on this
in the following months. If a significant rework is required, I don't
think I'll be able to do it, at least not for this Xen release (and it
would be nice to have dom0less PV drivers in the coming release.) If
Daniel is willing, I could add his "idle_domain is_priv" patch to this
series.  Not as clean as a proper constructor domain but it would work
and it would be simple. It could be evolved into a nicer constructor
domain later.

This is not my preference but I could do that if Julien and Jan prefer
this approach and if Daniel is happy to share his patch.


> AFAIU, your proposal is to duplicate code. This brings other risks such as
> duplicated bug and more code to maintain.

Got it. I'll make one last attempt at a proposal that doesn't involve
the fake constructor domain. The goal is to avoid code duplication while
providing a safe way forward to make progress with only a small amount
of changes. What if we:

- rename evtchn_alloc_unbound to _evtchn_alloc_unbound (still static)
- add a skip_xsm parameter to _evtchn_alloc_unbound
- introduce a wrapper evtchn_alloc_unbound that always set skip_xsm to
  false (same interface as today's evtchn_alloc_unbound)
- introduce an __init early_evtchn_alloc_unbound public function that
  sets skip_xsm to true

This way:
- we have a single implementation in _evtchn_alloc_unbound (no code
  duplication)
- the only function exposed that skips the XSM check is __init
- evtchn_alloc_unbound continue to have the XSM check same as today


E.g.:
static int _evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc, bool skip_xsm)
{
    ...
}

static int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
{
    return _evtchn_alloc_unbound(alloc, false);    
}

int __init early_evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
{
    return _evtchn_alloc_unbound(alloc, true);
}


Would this be good enough for now?


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 23:10:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 23:10:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294968.501905 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXt3t-0001rN-JS; Fri, 25 Mar 2022 23:09:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294968.501905; Fri, 25 Mar 2022 23:09:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXt3t-0001rG-G5; Fri, 25 Mar 2022 23:09:41 +0000
Received: by outflank-mailman (input) for mailman id 294968;
 Fri, 25 Mar 2022 23:09:39 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=R2Zm=UE=invisiblethingslab.com=demi@srs-se1.protection.inumbo.net>)
 id 1nXt3r-0001rA-DT
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 23:09:39 +0000
Received: from out5-smtp.messagingengine.com (out5-smtp.messagingengine.com
 [66.111.4.29]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a3929ca3-ac90-11ec-8fbc-03012f2f19d4;
 Sat, 26 Mar 2022 00:09:37 +0100 (CET)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41])
 by mailout.nyi.internal (Postfix) with ESMTP id A4CEA5C0170;
 Fri, 25 Mar 2022 19:09:35 -0400 (EDT)
Received: from mailfrontend1 ([10.202.2.162])
 by compute1.internal (MEProxy); Fri, 25 Mar 2022 19:09:35 -0400
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Fri,
 25 Mar 2022 19:09:34 -0400 (EDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a3929ca3-ac90-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:cc:content-type:date:date:from:from
	:in-reply-to:in-reply-to:message-id:mime-version:references
	:reply-to:sender:subject:subject:to:to:x-me-proxy:x-me-proxy
	:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=YIVbw2RUEfbKJ7Bmz
	AZ0kThlZmuPh3+JXCa3Y4y5CKc=; b=Bl1bnau/ZgoqUP4+jGD9qM8Y6gFoND6GY
	/oodkZv7tjE1CCNh9pMz24XMHmoA3ucVh7/8s1CJ9py5LkAt2AB74N25gOavjUjK
	XbDhMYyCDOJiCpTTIs0NaBXma4+j82gfjBbu4yoW9bhId6FstUB8mLiBFisn7AIj
	SfuViiwKRpssIOqWCHDzpw5LujrdibjoRYlRVL1JLeK1Wmyi2xgNVrjVqmegIIeJ
	3OuPk/d/qdU+cVT5fxPj6ztlARONTpJy2D/YdMVDPTlOU4od54xgY6F0uYfo+8Kc
	DyGebEIGEsvAkYxA4/mX8KyuMuv0KYantZrr6xIO5lPlb5hNfGDdA==
X-ME-Sender: <xms:r0s-YiAq3A9XkhEWfFaimJjAIvaEfTgMPew5XqMQWOrIQLbk3wyUTg>
    <xme:r0s-YsjLDGyOFIeyzy208IbS2t50bt1C0zElaJg8xC7Z6Z8Mf06HToW03VWMR5d_E
    HJcty8HCmTcGN4>
X-ME-Received: <xmr:r0s-YlnMSMRacsE0CJlV3NTsCY3Gc5p9PuxqmgXNkJvnG-ewWmRYjhJDVuZsIkZQsWh5vw>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddrudehvddgtdegucetufdoteggodetrfdotf
    fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen
    uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne
    cujfgurhepkfffgggfvfhfhffujggtsehgtderredtfeejnecuhfhrohhmpeffvghmihcu
    ofgrrhhivgcuqfgsvghnohhurhcuoeguvghmihesihhnvhhishhisghlvghthhhinhhgsh
    hlrggsrdgtohhmqeenucggtffrrghtthgvrhhnpeeuudegudfgteefjeefhedtgfegteff
    ledvgedvjeethffhkeefleduteevudfhueenucevlhhushhtvghrufhiiigvpedtnecurf
    grrhgrmhepmhgrihhlfhhrohhmpeguvghmihesihhnvhhishhisghlvghthhhinhhgshhl
    rggsrdgtohhm
X-ME-Proxy: <xmx:r0s-Ygxkhs_736pFYKvMQOxJ1x6jvkUyrKVn_mpgwJyW8LYndMshqg>
    <xmx:r0s-YnQlb_lddfXhHDidMmgRZvLdu4uJGtyrbyI11PuZnn9ueWYXHQ>
    <xmx:r0s-YrbGz6_e_AAo1CujOBWefrukjomWNSdJ1kWG-RgevaaEpFvQLA>
    <xmx:r0s-YiftJWK6Hn71LbV2L4P1189ZUbE0WICYWcFnRWae1PsnmKLmmw>
Message-ID: <facfd815-8d07-50a1-b61f-54b2b0913484@invisiblethingslab.com>
Date: Fri, 25 Mar 2022 19:09:27 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: Chris Cappuccio <chris@nmedia.net>
Cc: Roger Pau Monn? <roger.pau@citrix.com>,
 =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?=
 <marmarek@invisiblethingslab.com>,
 Xen developer discussion <xen-devel@lists.xenproject.org>,
 OpenBSD technical mailing list <tech@openbsd.org>
References: <Yj3qW/y20htoSvuK@itl-email> <Yj5FXBj7qKIvs94O@ref.nmedia.net>
From: Demi Marie Obenour <demi@invisiblethingslab.com>
Subject: Re: Security support status of xnf(4) and xbf(4)
In-Reply-To: <Yj5FXBj7qKIvs94O@ref.nmedia.net>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------ijCKG9nR3nMLAHue6dxG010W"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------ijCKG9nR3nMLAHue6dxG010W
Content-Type: multipart/mixed; boundary="------------if3O66mD9HtiyVFts70gifiu";
 protected-headers="v1"
From: Demi Marie Obenour <demi@invisiblethingslab.com>
To: Chris Cappuccio <chris@nmedia.net>
Cc: Roger Pau Monn? <roger.pau@citrix.com>,
 =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?=
 <marmarek@invisiblethingslab.com>,
 Xen developer discussion <xen-devel@lists.xenproject.org>,
 OpenBSD technical mailing list <tech@openbsd.org>
Message-ID: <facfd815-8d07-50a1-b61f-54b2b0913484@invisiblethingslab.com>
Subject: Re: Security support status of xnf(4) and xbf(4)
References: <Yj3qW/y20htoSvuK@itl-email> <Yj5FXBj7qKIvs94O@ref.nmedia.net>
In-Reply-To: <Yj5FXBj7qKIvs94O@ref.nmedia.net>

--------------if3O66mD9HtiyVFts70gifiu
Content-Type: multipart/mixed; boundary="------------Yi9a2ONcc0prGhbMQsIODScr"

--------------Yi9a2ONcc0prGhbMQsIODScr
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 3/25/22 18:42, Chris Cappuccio wrote:
> Demi Marie Obenour [demi@invisiblethingslab.com] wrote:
>> Linux???s netfront and blkfront drivers recently had a security
>> vulnerability (XSA-396) that allowed a malicious backend to potentiall=
y
>> compromise them.  In follow-up audits, I found that OpenBSD???s xnf(4)=

>> currently trusts the backend domain.  I reported this privately to The=
o
>> de Raadt, who indicated that OpenBSD does not consider this to be a
>> security concern.
>>
>=20
> A malicious backend could completely compromise the virtual host in an
> infinite number of ways.

This is only true if the backend runs in dom0 (the privileged
administrative VM) or is otherwise trusted (perhaps because it stores
the root filesystem).  It is not true in general, and is explicitly
false in Qubes OS.  In Qubes OS, the only backend that can directly
compromise the VM is the disk backend running in dom0 that provides
the default volumes.  The network backend and other disk backends are
explicitly considered to be untrusted.

> Perhaps a small patch to find incorrect values
> would be of value, but even then, a patch would only be a very slight
> improvment. If you patch the manual page, should OpenBSD start putting
> notifications in all manual pages that a compromised virtual machine
> backend may compromise the integrity of the virtual host?

No, because emulated devices are provided by an I/O emulator that is
considered trusted.  xnf(4) and xbf(4) devices can be provided by a
backend that is not dom0 and which has (barring other vulnerabilities)
no other way to attack the guest.
--=20
Sincerely,
Demi Marie Obenour (she/her/hers)
Invisible Things Lab
--------------Yi9a2ONcc0prGhbMQsIODScr
Content-Type: application/pgp-keys; name="OpenPGP_0xB288B55FFF9C22C1.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB288B55FFF9C22C1.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=3Dx+Ro
-----END PGP PUBLIC KEY BLOCK-----

--------------Yi9a2ONcc0prGhbMQsIODScr--

--------------if3O66mD9HtiyVFts70gifiu--

--------------ijCKG9nR3nMLAHue6dxG010W
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----
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=NKC+
-----END PGP SIGNATURE-----

--------------ijCKG9nR3nMLAHue6dxG010W--


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 23:33:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 23:33:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294972.501919 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXtQi-000541-Ib; Fri, 25 Mar 2022 23:33:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294972.501919; Fri, 25 Mar 2022 23:33:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXtQi-00053u-Fj; Fri, 25 Mar 2022 23:33:16 +0000
Received: by outflank-mailman (input) for mailman id 294972;
 Fri, 25 Mar 2022 23:33:15 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXtQh-00053e-1x; Fri, 25 Mar 2022 23:33:15 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXtQg-0006HC-Vi; Fri, 25 Mar 2022 23:33:15 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXtQg-0000fX-IG; Fri, 25 Mar 2022 23:33:14 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXtQg-00030i-Fp; Fri, 25 Mar 2022 23:33:14 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=7NXvOO4B28SV9Lpsf8Bto+9jM+BdUEWIxqHKp6G6kk8=; b=PQQYXlTKHPSKpqR1OwqyyY8pa5
	JyyCnT6Rc2l87dTyb79lfabRg+guco7DiiNx2XBdPP8M3P2e6y2S2NP+cY6oWfKROe25p2e61MKiA
	yRHSs8AHlaULXhAhNvmeEvMKNyNQIC28eapxFVSHKEuQZZTqfHWMOA1xT/edUnUXILD0=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168855-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168855: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=0e03ff97def12b121b5313094a76e5db7bb5c93c
X-Osstest-Versions-That:
    xen=1c80f13a6efdc832878d7a431e2c216039d063bc
From: osstest service owner <osstest-admin@xenproject.org>
Date: Fri, 25 Mar 2022 23:33:14 +0000

flight 168855 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168855/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168833
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168833
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168833
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168833
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168833
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168833
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168833
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168833
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168833
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168833
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168833
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168833
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  0e03ff97def12b121b5313094a76e5db7bb5c93c
baseline version:
 xen                  1c80f13a6efdc832878d7a431e2c216039d063bc

Last test of basis   168833  2022-03-25 01:51:56 Z    0 days
Testing same since   168855  2022-03-25 14:37:04 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Julien Grall <jgrall@amazon.com>
  Stefano Stabellini <stefano.stabellini@xilinx.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   1c80f13a6e..0e03ff97de  0e03ff97def12b121b5313094a76e5db7bb5c93c -> master


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 23:36:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 23:36:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294966.501930 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXtTx-0005lN-7H; Fri, 25 Mar 2022 23:36:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294966.501930; Fri, 25 Mar 2022 23:36:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXtTx-0005lG-4F; Fri, 25 Mar 2022 23:36:37 +0000
Received: by outflank-mailman (input) for mailman id 294966;
 Fri, 25 Mar 2022 22:59:52 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=M4Ou=UE=nmedia.net=chris@srs-se1.protection.inumbo.net>)
 id 1nXsuO-0000vf-Ph
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 22:59:52 +0000
Received: from ref.nmedia.net (ref.nmedia.net [204.80.187.146])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 45cd7eaa-ac8f-11ec-a405-831a346695d4;
 Fri, 25 Mar 2022 23:59:50 +0100 (CET)
Received: by ref.nmedia.net (Postfix, from userid 1000)
 id C85931E7486; Fri, 25 Mar 2022 15:42:36 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 45cd7eaa-ac8f-11ec-a405-831a346695d4
Date: Fri, 25 Mar 2022 15:42:36 -0700
From: Chris Cappuccio <chris@nmedia.net>
To: Demi Marie Obenour <demi@invisiblethingslab.com>
Cc: Roger Pau Monn? <roger.pau@citrix.com>,
	Marek Marczykowski-G?recki <marmarek@invisiblethingslab.com>,
	Xen developer discussion <xen-devel@lists.xenproject.org>,
	OpenBSD technical mailing list <tech@openbsd.org>
Subject: Re: Security support status of xnf(4) and xbf(4)
Message-ID: <Yj5FXBj7qKIvs94O@ref.nmedia.net>
References: <Yj3qW/y20htoSvuK@itl-email>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <Yj3qW/y20htoSvuK@itl-email>

Demi Marie Obenour [demi@invisiblethingslab.com] wrote:
> Linux???s netfront and blkfront drivers recently had a security
> vulnerability (XSA-396) that allowed a malicious backend to potentially
> compromise them.  In follow-up audits, I found that OpenBSD???s xnf(4)
> currently trusts the backend domain.  I reported this privately to Theo
> de Raadt, who indicated that OpenBSD does not consider this to be a
> security concern.
> 

A malicious backend could completely compromise the virtual host in an
infinite number of ways. Perhaps a small patch to find incorrect values
would be of value, but even then, a patch would only be a very slight
improvment. If you patch the manual page, should OpenBSD start putting
notifications in all manual pages that a compromised virtual machine
backend may compromise the integrity of the virtual host?

Chris


From xen-devel-bounces@lists.xenproject.org Fri Mar 25 23:50:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 23:50:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294983.501941 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXthR-00082u-Em; Fri, 25 Mar 2022 23:50:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294983.501941; Fri, 25 Mar 2022 23:50:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXthR-00082n-Bv; Fri, 25 Mar 2022 23:50:33 +0000
Received: by outflank-mailman (input) for mailman id 294983;
 Fri, 25 Mar 2022 23:50:32 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=CWi7=UE=citrix.com=prvs=076b843e0=Andrew.Cooper3@srs-se1.protection.inumbo.net>)
 id 1nXthQ-00082h-EK
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 23:50:32 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 58f91e94-ac96-11ec-8fbc-03012f2f19d4;
 Sat, 26 Mar 2022 00:50:29 +0100 (CET)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 58f91e94-ac96-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648252229;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=qE4pthaGuDkSZ1zDJ3dzRVNawZch0wJtxvh0ZBdLHmw=;
  b=cS/muvYXuQuVLJZu6iJW2nd4yeR11hdA4D38KEqIvffLG7B7xHqqYSpY
   ID0dokuoSF2BI1lkbkff+FR57wvUIaN+cBDu4LvGnfV3UxwTjWJJs5WeW
   XLovJ9Nk39527zQvrMh1Hs5pGUT+rGvblPjj7KubAsnXuJzL/GHMb4SGH
   w=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 69599438
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:PskbTqO1lK8zLzHvrR1Cl8FynXyQoLVcMsEvi/4bfWQNrUoj0GEBz
 WJJXG2FMv2PajD2ftp+a4q0809VvsTUy4cySgto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi2NMw2rBVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Z4
 fJOhNuccjcQYqSWttQtS0NdTjBeFPgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALBc/nJo4A/FpnyinUF60OSpHfWaTao9Rf2V/cg+gQTKuPN
 pZCOVKDajzlMzESGUg6Eqtkkcm5o3X7WBZItne88P9fD2/7k1UqjemF3MDuUsyHQ4BZk1iVo
 krC/n/lGVcKOdqH0z2H/3mwwOjVkkvTRI8ZFJW/7vNsikafgGsJB3U+UFKhpPCjh02WWtRBK
 lcV8C4jsagz8kOwStD3GRa/pRastR4GWsF4Feg35ACEjKzZ/26xCmUBTxZAbsInr848QTE21
 l6PkMjtDDYpu7qQIU9x7Z/N82n0Y3JMazZfO2lUFmPp/uUPvqkaqRH+CfpYIJfph4fbKQHom
 TXXvQgX0uB7YdEw6423+lXOgjSJr5fPTxIo6gi/Yl9J/j+Vd6b+OdX2tAGzAeJoad/AEwLf5
 CRsd922trhmMH2bqMCarAzh9pmN7u3NDjDTiEUH83IJp2X0oC7LkWy9DVhDyKZV3iQsJGeBj
 Kz741o5CHpv0J2CNP4fj2WZUZhC8EQYPY65Ps04lOZmbJlrbxOg9ypzf0OW1G2FuBFyzfFmZ
 MrGL5f3Vy1y5UFbINyeHrZ1PVgDnH1W+I8ubcqjk0TPPUS2OhZ5tovpwHPRN7tkvctoUS3e8
 spFNtvi9vmseLaWX8UjyqZKdQpiBSFiXfje8pULHsbeclsOMDxwUJf5nOJ+E7GJaowIz4/g5
 G+mYEZExTLX3DufQel8Qis4M+2HsFcWhS9TABHAyn71giB6Otz+tf13mlleVeBPydGPBMVcF
 pEtU86BHu5OWnLA/TEcZoP6t4tsaFKgggfmAsZvSGFXk0JIL+ARxuLZQw==
IronPort-HdrOrdr: A9a23:RoAM06wwEASlKBJVpvW+KrPxguskLtp133Aq2lEZdPULSKOlfp
 GV8MjziyWYtN9IYgBcpTiBUJPwJE81bfZOkMYs1MSZLXXbUQyTXc9fBOrZsnHd8kjFmNK1up
 0QCpSWZOeAbmSSyPyKmjVQcOxQgeVvkprY/ds2pk0FJWoBCsFdBkVCe32m+yVNNVJ77PECZf
 6hD7981lydkAMsH6OG7xc+Lor+juyOsKijTQ8NBhYh5gXLpyiv8qTGHx+R2Qpbey9TwJ85mF
 K10zDR1+GGibWW2xXc32jc49B9g9360OZOA8SKl4w8NijssAC1f45sMofy/wzd4dvfqmrCou
 O85yvIDP4DrE85uVvF5ycF7jOQlQrGLUWSkGNwz0GT+fARDwhKdPapzbgpDCcxrXBQ5u2UmZ
 g7r15w/fBsfGL9tTW46N7SWx5wkE2o5XIkjO4IlnRaFZATcblLsOUkjQho+bo7bWvHAbocYa
 FT5QDnlYJrWELfa2qcsnhkwdSqUHh2FhCaQlIassjQ1zRNhnh2w0YR2cRaxx47hd8AYogB4/
 6BPrVjlblIQMNTZaVhBP0ZSc/yDmDWWxrDPG+bPFyiHqAaPHDGrYLx/dwOlauXUY1NyIF3lI
 XKUVteu2J3c0XyCdeW1JkO6RzJSHXVZ0Wa9iif3ekPhlTRfsuYDcTYciFcryKJmYRrPvHm
X-IronPort-AV: E=Sophos;i="5.90,211,1643691600"; 
   d="scan'208";a="69599438"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=IlZx7vYc4JP/Clop3qsYP1TPEoym7Axu1gl08/KQNamiyto1HQSRa6IGeIMALg7nxPiO42ix+pj3++R8MQWjRfX+uUv6TjDBzOU+GDcCOmoJAffpNl+44BzsQ4EdLrTMNWREF676wSjdSsWx4JzwmkT1L6ojtuTFQBhAtvo9UGAwK4G0nYhIu8+rU1mEdhw5265ZbcJmdW7bP0ZWnXxjFhK5B5ObCh/OHlSG35lYAZal8E+h+gktXOKr7tqH19ang7leX2gYT9i4+xvYFtJSPW72NknY5WQKGiGm3lOAoVKFpYX4vpl6cLAv+AdMALFZbXdQPtztMkH2NQ2H/755EA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=qE4pthaGuDkSZ1zDJ3dzRVNawZch0wJtxvh0ZBdLHmw=;
 b=cpn3/z5lrgbthFqeluT0Q3Za4V2v2FgU31QHfTzTnz/UZFPdOKH1EqHO52PHjQZ2VfurHT/U0eIXgJttzNrxBFVCDILXtl/goCmGxhdcUSmxgvbm+IA/Xrf3HB6/XgwjHOQuiXIg1DkJ2q24cZadS1aw0fZWRREn/nCiU5zxoPPTfBnf0evdouWfaH7Gr4vifoS8Q+Ni9b6UnPAt8FSndeTyl+zogbkmYFB8oBzM0pvpk7xsKrzkM7lJ0zgsEWSRPZeEj5CT5kajROTHpR/R355tbOm7dm595opnVZDFM6hDzinOndqPPmQ9UjWHZ5H6WlMp+BUvN6iX7uWMCJu8CA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=qE4pthaGuDkSZ1zDJ3dzRVNawZch0wJtxvh0ZBdLHmw=;
 b=FXwFrN2bxRSpCym0UTd+VP70VAx4W/61H+A7ZnH4P4+ac32gTtFt5rkvPMpKmHQNebTSX//oiq+ICY9YdQtS8OYl9OGCJM5TjJozC6kRYxE3hHSNKHkL3/1jMOjKrjeBLkZ/Dx00PNvNro7gaYJbZD6tnBWPbmOGREhMwL9q1OQ=
From: Andrew Cooper <Andrew.Cooper3@citrix.com>
To: Chris Cappuccio <chris@nmedia.net>, Demi Marie Obenour
	<demi@invisiblethingslab.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Marek Marczykowski-G?recki
	<marmarek@invisiblethingslab.com>, Xen developer discussion
	<xen-devel@lists.xenproject.org>, OpenBSD technical mailing list
	<tech@openbsd.org>
Subject: Re: Security support status of xnf(4) and xbf(4)
Thread-Topic: Security support status of xnf(4) and xbf(4)
Thread-Index: AQHYQGN+XBaov1qn+kGEeGg+qt+r9qzQsngAgAAS8IA=
Date: Fri, 25 Mar 2022 23:50:24 +0000
Message-ID: <b9aff6a7-5cf6-5106-310a-2317f85e602a@citrix.com>
References: <Yj3qW/y20htoSvuK@itl-email> <Yj5FXBj7qKIvs94O@ref.nmedia.net>
In-Reply-To: <Yj5FXBj7qKIvs94O@ref.nmedia.net>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: a698f82f-7319-4d5d-929b-08da0eba3b0f
x-ms-traffictypediagnostic: CH2PR03MB5336:EE_
x-microsoft-antispam-prvs: <CH2PR03MB533631F4ED7D8DEC406A190CBA1A9@CH2PR03MB5336.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR03MB3623.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(2616005)(31696002)(82960400001)(5660300002)(54906003)(38100700002)(38070700005)(316002)(122000001)(110136005)(26005)(6512007)(55236004)(508600001)(6506007)(53546011)(15650500001)(91956017)(4326008)(8676002)(8936002)(6486002)(83380400001)(31686004)(66556008)(71200400001)(86362001)(76116006)(66946007)(36756003)(2906002)(186003)(64756008)(66446008)(66476007)(43740500002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?NTV6WDBuQXB6VGVEeXhpYTBYYjUyTDcvb1pYWXVHTnNvSDNVOUZieFFHUm5z?=
 =?utf-8?B?RkppYnU1V2U0Uzdoanlkc1RaU1ZJYnlscGNHRXdzU3FEVU9obzBaa2lXaXdV?=
 =?utf-8?B?VFZpL2ZwUzhMTEljVjhoWHB0T1Y3NmtyUGxYVHczNlNUVGl3VWI1eHd2aHk0?=
 =?utf-8?B?UytWY0R1SDUyeWR5dzlSRzFVZHp1WkFReG8wTFNxN0FxYnBwbTBNWVZHYUJI?=
 =?utf-8?B?aUVLY1JFNklBSTZPSVp2anI1bHlLNW1DSVYxSnJoeHZhaTZhY0d6SUpLRG5K?=
 =?utf-8?B?VUpRR3JXcGY5S21YbWFTcU1Xc1BVNGlWQmprSEszbEdHcy9pQWFMdmw2MUZI?=
 =?utf-8?B?Y2g5MndHaWpteFgrV2dBY2NiTWRmbVpqalN6dWI1d0RoUmlhNVBWd3dGc1ZZ?=
 =?utf-8?B?TTI3UVE0T0hLdmRsQ2dtUGh6WTJ6NWdPMVBKQThiNE5SNWUxV2hvY1NUR0Z1?=
 =?utf-8?B?VGhsYkFrUlM0K25YM1JxM0ZPZExpRUs1a1BmZVduUmRIZzVDU3hReENES1U1?=
 =?utf-8?B?cWhIMDJOc1l2T0ZYSWFsVzc4eHVCZGZVanlHYllhUTlXVWptdkV2THZiaDhm?=
 =?utf-8?B?elNSZkR5SC9DWHJaYmdYeFlGUklpUEhuNEQ0VUNNU3Zkd3RJU1NzWTBFbnNL?=
 =?utf-8?B?aFg4RkZxQTlqMEZhOGE0N0NQN2M3eDNDSFI3V1B5a3FFTkpTYVVvek9jMDVJ?=
 =?utf-8?B?eUZueSs1NG1wZmdzeEZEdk5SOFMrenhrOWZXeGQxZU1DMUs3QzRydWlUdXk5?=
 =?utf-8?B?TEtYQWdwT0huRGtWNlk2U2RQU0sxVjlxMW85SU1TZkRnUktvTmhMS3Z3bTBQ?=
 =?utf-8?B?SloxQnZ6ZTNCSGREcy9TSWthNHNJQnZ6V1dLc3VlRWtMRXRSUUhNaTNUSFlI?=
 =?utf-8?B?YUsxNVEzSG8rQmFkaURzMC9MNktVMENrLzZueXYybkZqenF2ZmhjSUJTbmNl?=
 =?utf-8?B?ZDVSNDN5TllKRmh5YjFMWVNVdXJFSUY3ZXBHMWpuS1RzY3BJUitIaGZrVEtH?=
 =?utf-8?B?R2ZjTkhwWUJwMHQ1cDVFQlVCTEN0bUV4ak5KTVloOFNaVk5yL1hVK1FHSlFz?=
 =?utf-8?B?QzlPZ3NuVzNNUEwzdVdYSmtzV21aVTA3RHFBNVZ4cXNxeEhXZWNPSXFyNUg2?=
 =?utf-8?B?VlF5WGd4ZEl3RlJkRXlYYmJmUm1tWk9PNWhOZTBsM0I5dTRVd0lkRjdIdlB2?=
 =?utf-8?B?ZGZnU3JtTW1XSXZ0cGxRZFB0TjZxQ2F0TVBMd1BZdHFTQjAxYytkQk5IL0tZ?=
 =?utf-8?B?OFZpUFJuTm5rbDF5Y1h2TTdxU3BFU0dHK1RTbGo1cWx0NTM1d3VEN0UwNi9w?=
 =?utf-8?B?dlJRNzRqT1BNOGZUZWFkbmJ3MHBhNzJHeWUyd01WQkhTeGpYYUpzOVFGTzhG?=
 =?utf-8?B?bmtPbkNMWjFxRG4xaWsrM240RTlpdjlVeFFLZ3NmOW5jZnh6MjMvQmlTdTJE?=
 =?utf-8?B?UjNSSVJNVHBXK0VBVmNiQTJPK1g5YnFzQ1pSc3hSQzgwVVY1NFdPaVovUFRH?=
 =?utf-8?B?K21JeEIvSkZHSlcvZ0I5aWNSZGhsdWM5a1JXT1RpM1ZMeHoxOWkxRW9lUGpq?=
 =?utf-8?B?VXB0aUhJN01jK2tWRDd3ek0wVGZCSmxQK0h5bStUWk16NWF5RlBCeitmcGJH?=
 =?utf-8?B?UE5mMlpNaUFTWGFzNHVSMEZ3U0s5MlBmaVNQWXBXd2xzRE56V2t2T1NWb1FM?=
 =?utf-8?B?eUp4NVdwWWVTeGRNVXdOSFJMT3VONVVYVXlQcG9vbCtOMkZ5RmxaSTZJT0tn?=
 =?utf-8?B?TWFJMktXQXJuWDl1VjhnQmZsd3VOMThTUGJFVlZJRTA3aG0xYVhIZEFTazBh?=
 =?utf-8?B?RXp6VC84QVIzUVYrcjFmdkpLM2ZGeEYwazNiRFBSREdmUlh6OW1GRW1TOVZx?=
 =?utf-8?B?S3JwbjNabFg4d0FKNEUwSFBOUGUwV3FWdC9ITDJMazFub3hWakNHRU90K3g1?=
 =?utf-8?B?TDlRUit5MEhrbU5GM0VWMU40VlB4MEkvZmNtYUY4ZUx1NFU0QXJjNHRaNEoz?=
 =?utf-8?B?eVBUaTFsRUw1V293VmhlcHBxVGIrZ0Erc1BoazR3enpHZTB6ZnRPcU9PYkNx?=
 =?utf-8?B?Y3huOStONjVMOGVYWVJFMUdsa3k4NEVzYS9pVk5wRlZ6TjV5V0ZGWHEyZ0Yy?=
 =?utf-8?B?QXAyUTNNZmxWVERmb04zcTlrdlVsei9vOVFGT3NBcWpzYUREWEQvVkFESjcr?=
 =?utf-8?B?Z2RJd1ZFdFF6M2VQd1gvM3JCbXEvMDg3UUhhNHk3RkhWTllVcmY2b1dVOXla?=
 =?utf-8?B?dURkbmxIcDVVaDY4V3NkcDZRa0xWMFU5RlR6dDNFMHFCVmx0eC85WU9SMitT?=
 =?utf-8?B?MDJROHAwanRrQVkrSWxIdmg3dGpKNjFTUENKTEpBbk1hc3RQSi9QZz09?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <34611DE0CEAD3546B8D4940D4FE35D68@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR03MB3623.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a698f82f-7319-4d5d-929b-08da0eba3b0f
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Mar 2022 23:50:24.3147
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Txh8l0M4kdBFGVXIcPojBAXC4uOdVTlqnam+jLrbD07MaGE2PIdopAsbZ7YehmewcSV8J1aYqbw3SyXbksvXgLeMN9n3YUc9GqTay+r8l+4=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH2PR03MB5336
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Fri Mar 25 23:53:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Fri, 25 Mar 2022 23:53:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294986.501953 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXtkX-0000EW-Tp; Fri, 25 Mar 2022 23:53:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294986.501953; Fri, 25 Mar 2022 23:53:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXtkX-0000EP-Qk; Fri, 25 Mar 2022 23:53:45 +0000
Received: by outflank-mailman (input) for mailman id 294986;
 Fri, 25 Mar 2022 23:53:44 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LYjy=UE=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nXtkW-0000EJ-HU
 for xen-devel@lists.xenproject.org; Fri, 25 Mar 2022 23:53:44 +0000
Received: from sin.source.kernel.org (sin.source.kernel.org [145.40.73.55])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id cc239875-ac96-11ec-a405-831a346695d4;
 Sat, 26 Mar 2022 00:53:42 +0100 (CET)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by sin.source.kernel.org (Postfix) with ESMTPS id 71E4FCE2B11;
 Fri, 25 Mar 2022 23:53:37 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 46BDEC004DD;
 Fri, 25 Mar 2022 23:53:35 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cc239875-ac96-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1648252415;
	bh=czyLg0N5Vhxgv4hWnJvCEUDKU41z4XDZ4rdFkMW8y7I=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=AOKRD99dR3ODSYwM5E2xaV+qk//hn6RpFn8eVIRa91fSJJqlwjmIUpcTVAaSkah29
	 S3+PckT74FOEyqWV+at2d5xgloZN4bZbHyem/1W31I4/WZaa6yBQEy94+qkWDiDpCG
	 a7iFaRaz6/Y8cQ1OyhPun94Pezbhb0GmVBaKA3Kllz+AYdJT97FxlqZu7YjmO6VAYt
	 PsqFkJeiuYbn7GR0/+ybhqcDysGQHE+xhDY12khyt3jJUY03zAP8jrtTiOZDhhJsEu
	 Lira2N8quqfqzhxZ+bXR7g6i6uglVilq1JefGXFmGgaznSrwKbATCDOh7bKouJy5RE
	 z7hmmiXqqXMkQ==
Date: Fri, 25 Mar 2022 16:53:34 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Luca Fancellu <luca.fancellu@arm.com>
cc: xen-devel@lists.xenproject.org, bertrand.marquis@arm.com, wei.chen@arm.com, 
    Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, 
    Andrew Cooper <andrew.cooper3@citrix.com>, 
    George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, 
    Wei Liu <wl@xen.org>, Juergen Gross <jgross@suse.com>, 
    Dario Faggioli <dfaggioli@suse.com>
Subject: Re: [PATCH v4 4/6] xen/cpupool: Create different cpupools at boot
 time
In-Reply-To: <20220324140633.39674-5-luca.fancellu@arm.com>
Message-ID: <alpine.DEB.2.22.394.2203251539510.2910984@ubuntu-linux-20-04-desktop>
References: <20220324140633.39674-1-luca.fancellu@arm.com> <20220324140633.39674-5-luca.fancellu@arm.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Thu, 24 Mar 2022, Luca Fancellu wrote:
> Introduce a way to create different cpupools at boot time, this is
> particularly useful on ARM big.LITTLE system where there might be the
> need to have different cpupools for each type of core, but also
> systems using NUMA can have different cpu pools for each node.
> 
> The feature on arm relies on a specification of the cpupools from the
> device tree to build pools and assign cpus to them.
> 
> Documentation is created to explain the feature.
> 
> Signed-off-by: Luca Fancellu <luca.fancellu@arm.com>
> ---
> Changes in v4:
> - modify Makefile to put in *.init.o, fixed stubs and macro (Jan)
> - fixed docs, fix brakets (Stefano)
> - keep cpu0 in Pool-0 (Julien)
> - moved printk from btcpupools_allocate_pools to
>   btcpupools_get_cpupool_id
> - Add to docs constraint about cpu0 and Pool-0
> Changes in v3:
> - Add newline to cpupools.txt and removed "default n" from Kconfig (Jan)
> - Fixed comment, moved defines, used global cpu_online_map, use
>   HAS_DEVICE_TREE instead of ARM and place arch specific code in header
>   (Juergen)
> - Fix brakets, x86 code only panic, get rid of scheduler dt node, don't
>   save pool pointer and look for it from the pool list (Stefano)
> - Changed data structures to allow modification to the code.
> Changes in v2:
> - Move feature to common code (Juergen)
> - Try to decouple dtb parse and cpupool creation to allow
>   more way to specify cpupools (for example command line)
> - Created standalone dt node for the scheduler so it can
>   be used in future work to set scheduler specific
>   parameters
> - Use only auto generated ids for cpupools
> ---
>  docs/misc/arm/device-tree/cpupools.txt | 136 ++++++++++++++++++
>  xen/arch/arm/include/asm/smp.h         |   3 +
>  xen/common/Kconfig                     |   7 +
>  xen/common/Makefile                    |   1 +
>  xen/common/boot_cpupools.c             | 190 +++++++++++++++++++++++++
>  xen/common/sched/cpupool.c             |   9 +-
>  xen/include/xen/sched.h                |  14 ++
>  7 files changed, 359 insertions(+), 1 deletion(-)
>  create mode 100644 docs/misc/arm/device-tree/cpupools.txt
>  create mode 100644 xen/common/boot_cpupools.c
> 
> diff --git a/docs/misc/arm/device-tree/cpupools.txt b/docs/misc/arm/device-tree/cpupools.txt
> new file mode 100644
> index 000000000000..5dac2b1384e0
> --- /dev/null
> +++ b/docs/misc/arm/device-tree/cpupools.txt
> @@ -0,0 +1,136 @@
> +Boot time cpupools
> +==================
> +
> +When BOOT_TIME_CPUPOOLS is enabled in the Xen configuration, it is possible to
> +create cpupools during boot phase by specifying them in the device tree.
> +
> +Cpupools specification nodes shall be direct childs of /chosen node.
> +Each cpupool node contains the following properties:
> +
> +- compatible (mandatory)
> +
> +    Must always include the compatiblity string: "xen,cpupool".
> +
> +- cpupool-cpus (mandatory)
> +
> +    Must be a list of device tree phandle to nodes describing cpus (e.g. having
> +    device_type = "cpu"), it can't be empty.
> +
> +- cpupool-sched (optional)
> +
> +    Must be a string having the name of a Xen scheduler. Check the sched=<...>
> +    boot argument for allowed values.
> +
> +
> +Constraints
> +===========
> +
> +If no cpupools are specified, all cpus will be assigned to one cpupool
> +implicitly created (Pool-0).
> +
> +If cpupools node are specified, but not every cpu brought up by Xen is assigned,
> +all the not assigned cpu will be assigned to an additional cpupool.
> +
> +If a cpu is assigned to a cpupool, but it's not brought up correctly, Xen will
> +stop.
> +
> +The boot cpu must be assigned to Pool-0, so the cpupool containing that core
> +will become Pool-0 automatically.
> +
> +
> +Examples
> +========
> +
> +A system having two types of core, the following device tree specification will
> +instruct Xen to have two cpupools:
> +
> +- The cpupool with id 0 will have 4 cpus assigned.
> +- The cpupool with id 1 will have 2 cpus assigned.
> +
> +The following example can work only if hmp-unsafe=1 is passed to Xen boot
> +arguments, otherwise not all cores will be brought up by Xen and the cpupool
> +creation process will stop Xen.
> +
> +
> +a72_1: cpu@0 {
> +        compatible = "arm,cortex-a72";
> +        reg = <0x0 0x0>;
> +        device_type = "cpu";
> +        [...]
> +};
> +
> +a72_2: cpu@1 {
> +        compatible = "arm,cortex-a72";
> +        reg = <0x0 0x1>;
> +        device_type = "cpu";
> +        [...]
> +};
> +
> +a53_1: cpu@100 {
> +        compatible = "arm,cortex-a53";
> +        reg = <0x0 0x100>;
> +        device_type = "cpu";
> +        [...]
> +};
> +
> +a53_2: cpu@101 {
> +        compatible = "arm,cortex-a53";
> +        reg = <0x0 0x101>;
> +        device_type = "cpu";
> +        [...]
> +};
> +
> +a53_3: cpu@102 {
> +        compatible = "arm,cortex-a53";
> +        reg = <0x0 0x102>;
> +        device_type = "cpu";
> +        [...]
> +};
> +
> +a53_4: cpu@103 {
> +        compatible = "arm,cortex-a53";
> +        reg = <0x0 0x103>;
> +        device_type = "cpu";
> +        [...]
> +};
> +
> +chosen {
> +
> +    cpupool_a {
> +        compatible = "xen,cpupool";
> +        cpupool-cpus = <&a53_1 &a53_2 &a53_3 &a53_4>;
> +    };
> +    cpupool_b {
> +        compatible = "xen,cpupool";
> +        cpupool-cpus = <&a72_1 &a72_2>;
> +        cpupool-sched = "credit2";
> +    };
> +
> +    [...]
> +
> +};
> +
> +
> +A system having the cpupools specification below will instruct Xen to have three
> +cpupools:
> +
> +- The cpupool Pool-0 will have 2 cpus assigned.
> +- The cpupool Pool-1 will have 2 cpus assigned.
> +- The cpupool Pool-2 will have 2 cpus assigned (created by Xen with all the not
> +  assigned cpus a53_3 and a53_4).
> +
> +chosen {
> +
> +    cpupool_a {
> +        compatible = "xen,cpupool";
> +        cpupool-cpus = <&a53_1 &a53_2>;
> +    };
> +    cpupool_b {
> +        compatible = "xen,cpupool";
> +        cpupool-cpus = <&a72_1 &a72_2>;
> +        cpupool-sched = "null";
> +    };
> +
> +    [...]
> +
> +};
> diff --git a/xen/arch/arm/include/asm/smp.h b/xen/arch/arm/include/asm/smp.h
> index af5a2fe65266..83c0cd69767b 100644
> --- a/xen/arch/arm/include/asm/smp.h
> +++ b/xen/arch/arm/include/asm/smp.h
> @@ -34,6 +34,9 @@ extern void init_secondary(void);
>  extern void smp_init_cpus(void);
>  extern void smp_clear_cpu_maps (void);
>  extern int smp_get_max_cpus (void);
> +
> +#define cpu_physical_id(cpu) cpu_logical_map(cpu)
> +
>  #endif
>  
>  /*
> diff --git a/xen/common/Kconfig b/xen/common/Kconfig
> index d921c74d615e..70aac5220e75 100644
> --- a/xen/common/Kconfig
> +++ b/xen/common/Kconfig
> @@ -22,6 +22,13 @@ config GRANT_TABLE
>  
>  	  If unsure, say Y.
>  
> +config BOOT_TIME_CPUPOOLS
> +	bool "Create cpupools at boot time"
> +	depends on HAS_DEVICE_TREE
> +	help
> +	  Creates cpupools during boot time and assigns cpus to them. Cpupools
> +	  options can be specified in the device tree.
> +
>  config ALTERNATIVE_CALL
>  	bool
>  
> diff --git a/xen/common/Makefile b/xen/common/Makefile
> index dc8d3a13f5b8..e30cd26eef70 100644
> --- a/xen/common/Makefile
> +++ b/xen/common/Makefile
> @@ -1,5 +1,6 @@
>  obj-$(CONFIG_ARGO) += argo.o
>  obj-y += bitmap.o
> +obj-$(CONFIG_BOOT_TIME_CPUPOOLS) += boot_cpupools.init.o
>  obj-$(CONFIG_HYPFS_CONFIG) += config_data.o
>  obj-$(CONFIG_CORE_PARKING) += core_parking.o
>  obj-y += cpu.o
> diff --git a/xen/common/boot_cpupools.c b/xen/common/boot_cpupools.c
> new file mode 100644
> index 000000000000..ea7840299199
> --- /dev/null
> +++ b/xen/common/boot_cpupools.c
> @@ -0,0 +1,190 @@
> +/* SPDX-License-Identifier: GPL-2.0 */
> +/*
> + * xen/common/boot_cpupools.c
> + *
> + * Code to create cpupools at boot time.
> + *
> + * Copyright (C) 2022 Arm Ltd.
> + */
> +
> +#include <xen/sched.h>
> +
> +/*
> + * pool_cpu_map:   Index is logical cpu number, content is cpupool id, (-1) for
> + *                 unassigned.
> + * pool_sched_map: Index is cpupool id, content is scheduler id, (-1) for
> + *                 unassigned.
> + */
> +static int __initdata pool_cpu_map[NR_CPUS]   = { [0 ... NR_CPUS-1] = -1 };
> +static int __initdata pool_sched_map[NR_CPUS] = { [0 ... NR_CPUS-1] = -1 };
> +static unsigned int __initdata next_pool_id;
> +
> +#define BTCPUPOOLS_DT_NODE_NO_REG     (-1)
> +#define BTCPUPOOLS_DT_NODE_NO_LOG_CPU (-2)
> +
> +static int __init get_logical_cpu_from_hw_id(unsigned int hwid)
> +{
> +    unsigned int i;
> +
> +    for ( i = 0; i < nr_cpu_ids; i++ )
> +    {
> +        if ( cpu_physical_id(i) == hwid )
> +            return i;
> +    }
> +
> +    return -1;
> +}
> +
> +static int __init
> +get_logical_cpu_from_cpu_node(const struct dt_device_node *cpu_node)
> +{
> +    int cpu_num;
> +    const __be32 *prop;
> +    unsigned int cpu_reg;
> +
> +    prop = dt_get_property(cpu_node, "reg", NULL);
> +    if ( !prop )
> +        return BTCPUPOOLS_DT_NODE_NO_REG;
> +
> +    cpu_reg = dt_read_number(prop, dt_n_addr_cells(cpu_node));
> +
> +    cpu_num = get_logical_cpu_from_hw_id(cpu_reg);
> +    if ( cpu_num < 0 )
> +        return BTCPUPOOLS_DT_NODE_NO_LOG_CPU;
> +
> +    return cpu_num;
> +}
> +
> +static int __init check_and_get_sched_id(const char* scheduler_name)
> +{
> +    int sched_id = sched_get_id_by_name(scheduler_name);
> +
> +    if ( sched_id < 0 )
> +        panic("Scheduler %s does not exists!\n", scheduler_name);
> +
> +    return sched_id;
> +}
> +
> +void __init btcpupools_dtb_parse(void)
> +{
> +    const struct dt_device_node *chosen, *node;
> +
> +    chosen = dt_find_node_by_path("/chosen");
> +    if ( !chosen )
> +        return;
> +
> +    dt_for_each_child_node(chosen, node)
> +    {
> +        const struct dt_device_node *phandle_node;
> +        int sched_id = -1;
> +        const char* scheduler_name;
> +        unsigned int i = 0;
> +
> +        if ( !dt_device_is_compatible(node, "xen,cpupool") )
> +            continue;
> +
> +        if ( !dt_property_read_string(phandle_node, "cpupool-sched",

This should be "node", not phandle_node


> +                                      &scheduler_name) )
> +            sched_id = check_and_get_sched_id(scheduler_name);

It would be nice if we had XENLOG_INFO printks to print at boot for each
CPU:
- the PoolID
- the scheduler name
Not required, but I had to add them to figure out exactly what was going
on.


> +        phandle_node = dt_parse_phandle(node, "cpupool-cpus", i++);
> +        if ( !phandle_node )
> +            panic("Missing or empty cpupool-cpus property!\n");
> +
> +        while ( phandle_node )
> +        {
> +            int cpu_num;
> +
> +            cpu_num = get_logical_cpu_from_cpu_node(phandle_node);
> +
> +            if ( cpu_num < 0 )
> +                panic("Error retrieving logical cpu from node %s (%d)\n",
> +                      dt_node_name(node), cpu_num);
> +
> +            if ( pool_cpu_map[cpu_num] != -1 )
> +                panic("Logical cpu %d already added to a cpupool!\n", cpu_num);
> +
> +            pool_cpu_map[cpu_num] = next_pool_id;
> +            pool_sched_map[next_pool_id] = sched_id;
> +
> +            phandle_node = dt_parse_phandle(node, "cpupool-cpus", i++);
> +        }
> +
> +        /* Let Xen generate pool ids */
> +        next_pool_id++;
> +    }
> +}
> +
> +void __init btcpupools_allocate_pools(void)
> +{
> +    unsigned int i;
> +    bool add_extra_cpupool = false;
> +
> +    /*
> +     * If there are no cpupools, the value of next_pool_id is zero, so the code
> +     * below will assign every cpu to cpupool0 as the default behavior.
> +     * When there are cpupools, the code below is assigning all the not
> +     * assigned cpu to a new pool (next_pool_id value is the last id + 1).
> +     * In the same loop we check if there is any assigned cpu that is not
> +     * online.
> +     */
> +    for ( i = 0; i < nr_cpu_ids; i++ )
> +    {
> +        if ( cpumask_test_cpu(i, &cpu_online_map) )
> +        {
> +            /* Unassigned cpu gets next_pool_id pool id value */
> +            if ( pool_cpu_map[i] < 0 )
> +            {
> +                pool_cpu_map[i] = next_pool_id;
> +                add_extra_cpupool = true;
> +            }
> +        }
> +        else
> +        {
> +            if ( pool_cpu_map[i] >= 0 )
> +                panic("Pool-%d contains cpu%u that is not online!\n",
> +                      pool_cpu_map[i], i);
> +        }
> +    }
> +
> +    /*
> +     * Cpu0 must be in cpupool0, otherwise some operations like moving cpus
> +     * between cpupools, cpu hotplug, destroying cpupools, shutdown of the host,
> +     * might not work in a same way.
> +     */
> +    if ( pool_cpu_map[0] != 0 )
> +    {
> +        /* The cpupool containing cpu0 will become cpupool0 */
> +        unsigned int swap_id = pool_cpu_map[0];
> +        for_each_cpu ( i, &cpu_online_map )
> +        {
> +            if ( pool_cpu_map[i] == swap_id )
> +                pool_cpu_map[i] = 0;
> +            else if ( pool_cpu_map[i] == 0 )
> +                pool_cpu_map[i] = swap_id;
> +        }
> +    }

We need also to swap the schedulers in pool_sched_map.


> +    if ( add_extra_cpupool )
> +        next_pool_id++;
> +
> +    /* Create cpupools with selected schedulers */
> +    for ( i = 0; i < next_pool_id; i++ )
> +        cpupool_create_pool(i, pool_sched_map[i]);
> +}
> +
> +unsigned int __init btcpupools_get_cpupool_id(unsigned int cpu)
> +{
> +    printk(XENLOG_INFO "Logical CPU %u in Pool-%u.\n", cpu, pool_cpu_map[cpu]);
> +    return pool_cpu_map[cpu];
> +}
> +
> +/*
> + * Local variables:
> + * mode: C
> + * c-file-style: "BSD"
> + * c-basic-offset: 4
> + * tab-width: 4
> + * indent-tabs-mode: nil
> + * End:
> + */
> diff --git a/xen/common/sched/cpupool.c b/xen/common/sched/cpupool.c
> index 89a891af7076..e5189c53a321 100644
> --- a/xen/common/sched/cpupool.c
> +++ b/xen/common/sched/cpupool.c
> @@ -1247,12 +1247,19 @@ static int __init cf_check cpupool_init(void)
>      cpupool_put(cpupool0);
>      register_cpu_notifier(&cpu_nfb);
>  
> +    btcpupools_dtb_parse();
> +
> +    btcpupools_allocate_pools();
> +
>      spin_lock(&cpupool_lock);
>  
>      cpumask_copy(&cpupool_free_cpus, &cpu_online_map);
>  
>      for_each_cpu ( cpu, &cpupool_free_cpus )
> -        cpupool_assign_cpu_locked(cpupool0, cpu);
> +    {
> +        unsigned int pool_id = btcpupools_get_cpupool_id(cpu);
> +        cpupool_assign_cpu_locked(cpupool_find_by_id(pool_id), cpu);
> +    }
>  
>      spin_unlock(&cpupool_lock);
>  
> diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
> index b527f141a1d3..453e98f1cba8 100644
> --- a/xen/include/xen/sched.h
> +++ b/xen/include/xen/sched.h
> @@ -1178,6 +1178,20 @@ extern void cf_check dump_runq(unsigned char key);
>  
>  void arch_do_physinfo(struct xen_sysctl_physinfo *pi);
>  
> +#ifdef CONFIG_BOOT_TIME_CPUPOOLS
> +void btcpupools_allocate_pools(void);
> +unsigned int btcpupools_get_cpupool_id(unsigned int cpu);
> +void btcpupools_dtb_parse(void);
> +
> +#else /* !CONFIG_BOOT_TIME_CPUPOOLS */
> +static inline void btcpupools_allocate_pools(void) {}
> +static inline void btcpupools_dtb_parse(void) {}
> +static inline unsigned int btcpupools_get_cpupool_id(unsigned int cpu)
> +{
> +    return 0;
> +}
> +#endif
> +
>  #endif /* __SCHED_H__ */
>  
>  /*
> -- 
> 2.17.1
> 


From xen-devel-bounces@lists.xenproject.org Sat Mar 26 02:38:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 26 Mar 2022 02:38:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294990.501964 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXwJV-0005Or-TV; Sat, 26 Mar 2022 02:38:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294990.501964; Sat, 26 Mar 2022 02:38:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXwJV-0005Ok-Oh; Sat, 26 Mar 2022 02:38:01 +0000
Received: by outflank-mailman (input) for mailman id 294990;
 Sat, 26 Mar 2022 02:38:00 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXwJU-0005Oa-Qn; Sat, 26 Mar 2022 02:38:00 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXwJU-0007Xy-OV; Sat, 26 Mar 2022 02:38:00 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXwJU-00057G-Bt; Sat, 26 Mar 2022 02:38:00 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXwJU-00065V-9T; Sat, 26 Mar 2022 02:38:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Cfey2mNYe7BR/qrPel7eL1WodNCwnRse3x88jADLM1A=; b=hVmgjC+e/idjcR6wrAWddEaMZv
	oqNo3Gjn9zz0mo/24i3GU3rCvCqNaYCQEF+2yGXkSqRWT9QmsXtFeSu90uR1rui0/weBwN2k4ifPR
	q1Zb55DU66RSNK5UPB2BxMv8wJ36tsmkdyHttXQ/PR/3d+5Yt+jrKWD2fBbZU1ADEVlk=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168865-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168865: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=69218d5d2854acaa7a11c777244de4a297d2fbb9
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 26 Mar 2022 02:38:00 +0000

flight 168865 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168865/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 69218d5d2854acaa7a11c777244de4a297d2fbb9
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   25 days
Failing since        168258  2022-03-01 01:55:31 Z   25 days  256 attempts
Testing same since   168832  2022-03-25 01:43:21 Z    1 days    8 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Mara Sophie Grosch <littlefox@lf-net.org>
  Mara Sophie Grosch via groups.io <littlefox=lf-net.org@groups.io>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 904 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 26 04:11:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 26 Mar 2022 04:11:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.294999.501975 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXxlI-0006pC-L4; Sat, 26 Mar 2022 04:10:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 294999.501975; Sat, 26 Mar 2022 04:10:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nXxlI-0006p5-HO; Sat, 26 Mar 2022 04:10:48 +0000
Received: by outflank-mailman (input) for mailman id 294999;
 Sat, 26 Mar 2022 04:10:46 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXxlG-0006ov-BP; Sat, 26 Mar 2022 04:10:46 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXxlG-0000hQ-7V; Sat, 26 Mar 2022 04:10:46 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nXxlF-0003TR-MP; Sat, 26 Mar 2022 04:10:45 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nXxlF-0004HL-K0; Sat, 26 Mar 2022 04:10:45 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=hbCsDfnI/LsSaieOtwwWWe6SdBU4es6VN9nQRXLm33g=; b=6cRj03/oEKQFhTZgKCd+OuCq65
	gCjLGJsKbm4d/AS+Rl6XMBlEg3ahjEbSDM1bTHuLEKkoWgBXhA8VyV/v85tC0mR/MVq8fTmSoph6+
	Ojg5YBNenyrAyxxByMMg2pQwjWDaDCi/IMvHQBJFT5BA66Sthy1/uO84t4eJklH0cnkU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168856-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168856: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=f345abe36527a8b575482bb5a0616f43952bf1f4
X-Osstest-Versions-That:
    qemuu=9c721291506c037d934900a6167dc3bf4a8f51a6
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 26 Mar 2022 04:10:45 +0000

flight 168856 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168856/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168835
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168835
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168835
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168835
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168835
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168835
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168835
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168835
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 qemuu                f345abe36527a8b575482bb5a0616f43952bf1f4
baseline version:
 qemuu                9c721291506c037d934900a6167dc3bf4a8f51a6

Last test of basis   168835  2022-03-25 04:11:20 Z    0 days
Testing same since   168856  2022-03-25 15:08:16 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Daniel P. Berrangé <berrange@redhat.com>
  luofei <luofei@unicloud.com>
  Mark Kanda <mark.kanda@oracle.com>
  Paolo Bonzini <pbonzini@redhat.com>
  Peter Maydell <peter.maydell@linaro.org>
  Philippe Mathieu-Daudé <f4bug@amsat.org>
  Stefan Hajnoczi <stefanha@redhat.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   9c72129150..f345abe365  f345abe36527a8b575482bb5a0616f43952bf1f4 -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Sat Mar 26 08:26:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 26 Mar 2022 08:26:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295021.501985 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nY1ks-0006D3-2O; Sat, 26 Mar 2022 08:26:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295021.501985; Sat, 26 Mar 2022 08:26:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nY1kr-0006Cw-VD; Sat, 26 Mar 2022 08:26:37 +0000
Received: by outflank-mailman (input) for mailman id 295021;
 Sat, 26 Mar 2022 08:26:37 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nY1kr-0006Cm-0A; Sat, 26 Mar 2022 08:26:37 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nY1kq-0005qe-S6; Sat, 26 Mar 2022 08:26:36 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nY1kp-0002cp-VD; Sat, 26 Mar 2022 08:26:36 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nY1kp-0005Yt-UR; Sat, 26 Mar 2022 08:26:35 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=e4ZxxIdeevP4MzzWe9GSkLsdxv+/gfd+4sIDSIKNlU4=; b=vH9383oiI+AXU4poK+ZTzIXmp5
	3pCdOTp4eTUxC9r1tbp7GzDkrSqDNzStMW+zSvAz+B+VjiZ08WwMEN94X2uoruZQCpNQ0WCM82ZAP
	RTW4kN0NkM70CVx0DTudfK9wk3if5yMguf+bkVmdVSblx3AXcwvA5+GCPtwNMwnTt78I=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168862-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.14-testing test] 168862: regressions - FAIL
X-Osstest-Failures:
    xen-4.14-testing:test-amd64-amd64-livepatch:livepatch-run:fail:regression
    xen-4.14-testing:test-amd64-i386-livepatch:livepatch-run:fail:regression
    xen-4.14-testing:test-amd64-amd64-xl-qcow2:guest-localmigrate/x10:fail:heisenbug
    xen-4.14-testing:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=10b09aa2541de4c3c49b9343e9bc04e19f0ae4f8
X-Osstest-Versions-That:
    xen=ca304edd3ba8c19211107fd2e898249987557ce5
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 26 Mar 2022 08:26:35 +0000

flight 168862 xen-4.14-testing real [real]
flight 168870 xen-4.14-testing real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168862/
http://logs.test-lab.xenproject.org/osstest/logs/168870/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-livepatch   13 livepatch-run            fail REGR. vs. 168506
 test-amd64-i386-livepatch    13 livepatch-run            fail REGR. vs. 168506

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-qcow2 19 guest-localmigrate/x10 fail pass in 168870-retest

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168506
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168506
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168506
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168506
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168506
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168506
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168506
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168506
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168506
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168506
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168506
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168506
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  10b09aa2541de4c3c49b9343e9bc04e19f0ae4f8
baseline version:
 xen                  ca304edd3ba8c19211107fd2e898249987557ce5

Last test of basis   168506  2022-03-10 14:16:31 Z   15 days
Testing same since   168862  2022-03-25 17:36:39 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bjoern Doebel <doebel@amazon.de>
  Jan Beulich <jbeulich@suse.com>
  Jiamei Xie <jiamei.xie@arm.com>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Thiner Logoer <logoerthiner1@163.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   fail    
 test-amd64-i386-livepatch                                    fail    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    fail    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 394 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 26 12:30:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 26 Mar 2022 12:30:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295041.502000 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nY5Yp-0004mk-B9; Sat, 26 Mar 2022 12:30:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295041.502000; Sat, 26 Mar 2022 12:30:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nY5Yp-0004md-7p; Sat, 26 Mar 2022 12:30:27 +0000
Received: by outflank-mailman (input) for mailman id 295041;
 Sat, 26 Mar 2022 12:30:26 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nY5Yo-0004mT-1h; Sat, 26 Mar 2022 12:30:26 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nY5Yn-0001RG-VG; Sat, 26 Mar 2022 12:30:26 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nY5Yn-000137-GX; Sat, 26 Mar 2022 12:30:25 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nY5Yn-0000mc-G7; Sat, 26 Mar 2022 12:30:25 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=eUie14wkB02w9yYksASP8+sIqHxbCUErQVcF1n8+Qrg=; b=wZK/I9ZUrqyr3DdUNz38JZQVim
	KRDELtWEFIcyqXGTFWwA0tl6MWXq5ScaV1Y7d+ZGImvTqkiC0RjM3oXDkaQMoQRaT3Q3NCUn8iCXy
	ijQAIjiQis5C8LtbRZmFWk4DwLshTpmFvA7lgiUVwnuNvOlYX6qZ5507BGm+IpVGHg8s=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168863-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.15-testing test] 168863: regressions - FAIL
X-Osstest-Failures:
    xen-4.15-testing:test-amd64-i386-livepatch:livepatch-run:fail:regression
    xen-4.15-testing:test-amd64-amd64-livepatch:livepatch-run:fail:regression
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=3c8e7395e2d01140c862c78fa9483e46c0dbd343
X-Osstest-Versions-That:
    xen=cd751c09a5bab9f3529901fbe4d867ad7d52e89d
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 26 Mar 2022 12:30:25 +0000

flight 168863 xen-4.15-testing real [real]
flight 168874 xen-4.15-testing real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168863/
http://logs.test-lab.xenproject.org/osstest/logs/168874/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-i386-livepatch    13 livepatch-run            fail REGR. vs. 168502
 test-amd64-amd64-livepatch   13 livepatch-run            fail REGR. vs. 168502

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168502
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168502
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168502
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168502
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168502
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168502
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168502
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168502
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168502
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168502
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168502
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168502
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  3c8e7395e2d01140c862c78fa9483e46c0dbd343
baseline version:
 xen                  cd751c09a5bab9f3529901fbe4d867ad7d52e89d

Last test of basis   168502  2022-03-10 09:07:57 Z   16 days
Testing same since   168863  2022-03-25 17:36:55 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bjoern Doebel <doebel@amazon.de>
  Jan Beulich <jbeulich@suse.com>
  Jiamei Xie <jiamei.xie@arm.com>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Thiner Logoer <logoerthiner1@163.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   fail    
 test-amd64-i386-livepatch                                    fail    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 394 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 26 15:09:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 26 Mar 2022 15:09:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295055.502013 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nY82J-0002RQ-Pe; Sat, 26 Mar 2022 15:09:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295055.502013; Sat, 26 Mar 2022 15:09:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nY82J-0002RJ-Mj; Sat, 26 Mar 2022 15:09:03 +0000
Received: by outflank-mailman (input) for mailman id 295055;
 Sat, 26 Mar 2022 15:09:02 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=GeX8=UF=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nY82I-0002RD-A5
 for xen-devel@lists.xenproject.org; Sat, 26 Mar 2022 15:09:02 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a854f088-ad16-11ec-8fbc-03012f2f19d4;
 Sat, 26 Mar 2022 16:08:59 +0100 (CET)
Received: from pps.filterd (m0246631.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 22QCaiS2004721; 
 Sat, 26 Mar 2022 15:08:42 GMT
Received: from userp3020.oracle.com (userp3020.oracle.com [156.151.31.79])
 by mx0b-00069f02.pphosted.com with ESMTP id 3f1sm28ky4-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Sat, 26 Mar 2022 15:08:42 +0000
Received: from pps.filterd (userp3020.oracle.com [127.0.0.1])
 by userp3020.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 22QF5wVk123366;
 Sat, 26 Mar 2022 15:08:41 GMT
Received: from nam10-mw2-obe.outbound.protection.outlook.com
 (mail-mw2nam10lp2101.outbound.protection.outlook.com [104.47.55.101])
 by userp3020.oracle.com with ESMTP id 3f1v9f8k7p-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Sat, 26 Mar 2022 15:08:41 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
 by SJ0PR10MB4429.namprd10.prod.outlook.com (2603:10b6:a03:2d1::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.16; Sat, 26 Mar
 2022 15:08:38 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755]) by BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755%9]) with mapi id 15.20.5102.022; Sat, 26 Mar 2022
 15:08:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a854f088-ad16-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=pO1OZ0WGnupDRyCKFbkKQThoUHgtX9XDGFLpXlX+hOc=;
 b=IcMICYqK8T3rbPtZeUqP3oK/V6ejB0T/Qss7hCHAJ/Atve4O18xrC0AhJUWDwoa2CLV3
 iK4+ZsN78BORRZrBfW4kvxLD5NoBDRsns0I/vPv15K26Uf5wIfdJwScCBka5o1d915HU
 T6cnJLv9i2gEvf7ZaadpTTMz5+VBEnJu+LRoxeQsaapAIhEUDA5pN9d3K1LQ0hO279lG
 uItJdMEJlyPP1QL4O2yjmfslabjnaWJ7WK19abKJtkUkW23QK3pfiO7iGiAssXTyTeP3
 EBpv4LuEcxtz5dAqcI39UwcXJY8ZobidyIMHYamUTjA1LmMVUq0Td7HbmrSpkXAuV+3g 6g== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=aGgH1HkiruFGC3+oa/0n1S0eaIMnCUQQMFAd4rObyI2toWIxGVj9nN/YA0vJvxfg+LEcygbZjuHQ/72LDkmw+dsoIwNeho6kw11EAumu7FbyO3ptBbRf4fRfpaQpx86m+uBD0eo3lZRnLdnNTCMgyUvF3aOw/1m5l33WDGBVyeNMD/WkkxSsLk906Dx+16G5hojDaDa+jPU1cN4Yga6B4Sn18Npa97O6spFYcl4uvkzE/HDSpE09deGm+iWUTzi26PiI0JUjDiE4HQOKRPUsHAGPlUzcjdHO8EweNprU9MRRq50dfikBJ7cdF+HBeCBnHowl0Cunn4uqdbFzs89iRw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=pO1OZ0WGnupDRyCKFbkKQThoUHgtX9XDGFLpXlX+hOc=;
 b=FdqwDDaAQ/Ty0dApP0vFsZ7AuF2A9omtb/m169v+z5NRL9/5NtZ9m6beY85trfjV+vVH8Ip1THgqYy3So1u2u1pOoarxJAVUVpCOUbaKvq/9/O6132DVGc0IQZKJV6hul++OBgYGSm1YiiC/ND6yzpqm8XyHTK2lMzMXh+p6DhNq2imH+u9+Qnpis5XJWpucZpWyToQeBX7PLSCOlODG/Z7pc/9CbJHgYIr/PW9n0mSgTgRf/CJKpfLe+WsJuihBfGIhgXdf9U/tOwsVWjC0X1E4pa0ghC4wCbvR0WsDF62iWSf+hqqIbv1n8NxOOkaobBVQ89oRTB+Sue+Z9gfIYQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=pO1OZ0WGnupDRyCKFbkKQThoUHgtX9XDGFLpXlX+hOc=;
 b=LWwZkMkxx2fYXMUBC9HOArXbczZPM+3eS5vuPgEs9w5lT6T0Oir4bJyJQIpOPyHrsFaYuk4Vnht4IuenDyhlRitEbTWyEgSqprq7g2x5mViR7ahWNp9Zo7tlkuhrI7BSAnpls7XvOkGChNCm3xMz6leKAYLx/rBvcYqPkVkY4GY=
Message-ID: <08ec35ef-9e66-0e52-2630-6f88e16b6734@oracle.com>
Date: Sat, 26 Mar 2022 11:08:34 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH] xen: don't hang when resuming PCI device
Content-Language: en-US
To: =?UTF-8?B?SmFrdWIgS8SFZHppb8WCa2E=?= <niedzejkob@invisiblethingslab.com>,
        Juergen Gross <jgross@suse.com>,
        Stefano Stabellini
 <sstabellini@kernel.org>,
        xen-devel@lists.xenproject.org,
        "Rafael J. Wysocki" <rafael@kernel.org>,
        Len Brown <len.brown@intel.com>, Pavel Machek <pavel@ucw.cz>,
        linux-pm@vger.kernel.org
Cc: marmarek@invisiblethingslab.com
References: <20220323012103.2537-1-niedzejkob@invisiblethingslab.com>
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
In-Reply-To: <20220323012103.2537-1-niedzejkob@invisiblethingslab.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: SN4PR0501CA0143.namprd05.prod.outlook.com
 (2603:10b6:803:2c::21) To BLAPR10MB5009.namprd10.prod.outlook.com
 (2603:10b6:208:321::10)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: cfcd5c70-164b-45d7-b51f-08da0f3a81b4
X-MS-TrafficTypeDiagnostic: SJ0PR10MB4429:EE_
X-Microsoft-Antispam-PRVS: 
	<SJ0PR10MB44296C971FFC74B5C288A34F8A1B9@SJ0PR10MB4429.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BLAPR10MB5009.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6512007)(36756003)(4326008)(26005)(6506007)(2906002)(6666004)(316002)(8676002)(53546011)(38100700002)(110136005)(66476007)(66556008)(8936002)(186003)(66946007)(6486002)(4744005)(5660300002)(508600001)(2616005)(44832011)(83380400001)(31686004)(31696002)(66574015)(86362001)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?UjkybVUzSU9seXJlVzZtZjQ3a2RaVkFGL3I4azFXMFlXeHlCcitTWGQwbjh1?=
 =?utf-8?B?VzB2VDNJdHR1RHV0VFhyZDU0UG5uUUVHQmZ0Tjk1Rks0QUk3cXRlNmdCSUVj?=
 =?utf-8?B?ZXFhQ1phK1dHNDBnRDdiV2NFSytoQ3BCb2FGZERWL1BlQm9zeEk2elo4QmRv?=
 =?utf-8?B?YnBuNW5lNVhTeDJ4RithMWhRWmJrcyt2VmJaT0RjeHdPNy9OS1Fic1c1cU5G?=
 =?utf-8?B?YW9kcUtoUTl1ejFwVGR3T0orKzlyZngxaWxCWFREb0lKWXFpWFpBckE5NWEz?=
 =?utf-8?B?MUpnRlF2L0V1OURieVdDV3dJR3MyNEpHS2pnR1RGcXNGS0dGczRkV3BvM1gy?=
 =?utf-8?B?b0ZzRUxPOUNSV3lHaVdYS29oL0tEUitiRlB3VlBNem1DK1kvdWQzVGVlcHBV?=
 =?utf-8?B?bWhJbVlLendIc3JMN1U4NXRSSHlDWXJ0SjhneHJVcDF5Q0x3cUU2d3paQVBZ?=
 =?utf-8?B?ZVBrN1M4akUvMW9kTmtweTZhSkpFR0dMSllsdHFCVlFGN1F2Y3JlM3MrNTY1?=
 =?utf-8?B?MGhqekcrNW9JS0tvVm9CWE5wdGUvNk5LQzc4cVhGQ1o2bDJidlhoQm8wa3pl?=
 =?utf-8?B?eVB0UXZwRDlqT3JEb2xUTEszUENCVVVrTzN3dGxzWFNwL1FIamRwYTdseExa?=
 =?utf-8?B?NFlOVHU2OG43RFFZQ0J4b3BUZjNlTlVJeTJNS1lOakZ0S2ZYUURaaEVmcGVn?=
 =?utf-8?B?WEE3UzdHMjhyOVRFREtFK2gwd0p2TWcrbkhDdnVTTGMzYkd0ckUxeTVSY1F0?=
 =?utf-8?B?SEZtSXg2U0VCNXBUSWcyZ3NGZ1NRUkNsa2lNaTdtcjJDZG1TaDFSQlc5UVZV?=
 =?utf-8?B?ejlsc08xWVZuZkVWeHNuaThZY096aXZCOFpLUjdycnhhdGxuRTk4bW1oWkxV?=
 =?utf-8?B?ak9sT3hlams5ZXBucnp2aTdiM2dNK2l3UGxqaVR1anlzUjZ0MWJPaUNUSnJz?=
 =?utf-8?B?WU9oZVRteUFpZGQzQW16WTdJK1ZhcDhFYnZtK0pJOUxmanNBNEl2Z3I4SW9j?=
 =?utf-8?B?cHg1ZHAvbldFQzA5UkZ2b0w2N1ZBVEFDdUd3WGh5UFZVYU5NK3hNc2k0RlZk?=
 =?utf-8?B?SnFOOW04SC9MTzNHeFpIWURXVTNHQWtvOEtNTTJJNm5xVzYydGoxR1dUclRM?=
 =?utf-8?B?dlVMNk1iR3hzZHpQRktHQ0lYbGluNmR6WW9xRDFhZGZsODk2ZlVLZGhHYU00?=
 =?utf-8?B?UGZxOE5sTlNScEVoeHpoNDFrOU1rRW10MWVEMm5KNUg2R2ozYkN6NmV0ejk5?=
 =?utf-8?B?eEVrdGw0eXVzbU5hT1pLWXh0TEVNbDlCOU9BRWNZR2c3b1dOYUxQbW9NbnNC?=
 =?utf-8?B?Y1JkWDZMckRQd3VyUjlicDRZQUh0SUhRNzZ2RmN2UkZYTEM1M3dMeExKVGhl?=
 =?utf-8?B?NE1MbFBVZmxPbjh0cU0xcjlScHAvSnB4NHJQMkZWRFErUjVpdUoyak5pQnhr?=
 =?utf-8?B?b1dENmtzVXp4a1ZwRjJsWWxWUStpOVlXdkhnUFoxbytBc09meWtPbmcwQmNp?=
 =?utf-8?B?ZTB6Q3JaMHBBeW9sdmRUdFdwRXVKMjJNNUJ3ZXRJOUFJajdXT29aWTFvcFFh?=
 =?utf-8?B?VVplOCtiTmR0eE1FRjZweEFHSmlreUNoMHZxOUlaV1Y2Y1ZoWm1rU3BjSSt4?=
 =?utf-8?B?L2lSTDB6RFlGbllGNlJlM0k5aGFEcVRKRlB0QVpqTnlHSzQxdlU4d3JsU1pE?=
 =?utf-8?B?T1pOSFlYdGprWG40SGVJZkJpUnVxMmdqUENvbUJGQ0ZyeHk3SXRYU2h1RGJ2?=
 =?utf-8?B?R0pXQzBvT2tKamJQbzIrVmNiSEZva3BxOXVIbWxVY1BlRFBZNmY2cDNkTGFO?=
 =?utf-8?B?V2xPcVJ3TVVESnc5cUVFbElOSG9obFVZTDNvTXN5UitEU2Jsb0RwUFpkaEQw?=
 =?utf-8?B?b0dKNzZrM3h1a296WlNrVVhCYUs2cmY4b2hUL3I0R0o1R0x3WElBb1F1U2Y0?=
 =?utf-8?B?WnJERWpLbUpkSEw3SmVyeFZ5RGU2NTI2Wnl1MndHUTV2RW5mZEJCYVdZRXpv?=
 =?utf-8?B?WDBZQVJRVHJBPT0=?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: cfcd5c70-164b-45d7-b51f-08da0f3a81b4
X-MS-Exchange-CrossTenant-AuthSource: BLAPR10MB5009.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Mar 2022 15:08:38.6531
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: bjGtzB6+EAlP7tUJgHyVAdl3zHrKCJhnIudYUamX9PgKJwZ3diM0NFgmR3DFEm1d4yNsaZR/qTh/TDVI7qBcZ4A6qD+vLuuwRxE05mhaYrM=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR10MB4429
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10298 signatures=694973
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxscore=0 malwarescore=0 spamscore=0
 adultscore=0 mlxlogscore=848 phishscore=0 suspectscore=0 bulkscore=0
 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2202240000
 definitions=main-2203260098
X-Proofpoint-ORIG-GUID: f_SShd_JlmsJhYHbOQaVofZkcmvn5oyg
X-Proofpoint-GUID: f_SShd_JlmsJhYHbOQaVofZkcmvn5oyg


On 3/22/22 9:21 PM, Jakub Kądziołka wrote:
> If a xen domain with at least two VCPUs has a PCI device attached which
> enters the D3hot state during suspend, the kernel may hang while
> resuming, depending on the core on which an async resume task gets
> scheduled.
>
> The bug occurs because xen's do_suspend calls dpm_resume_start while
> only the timer of the boot CPU has been resumed (when xen_suspend called
> syscore_resume), before calling xen_arch_suspend to resume the timers of
> the other CPUs. This breaks pci_dev_d3_sleep.
>
> Thus this patch moves the call to xen_arch_resume before the call to
> dpm_resume_start, eliminating the hangs and restoring the stack-like
> structure of the suspend/restore procedure.
>
> Signed-off-by: Jakub Kądziołka <niedzejkob@invisiblethingslab.com>


Applied to for-linus-5.18



From xen-devel-bounces@lists.xenproject.org Sat Mar 26 15:09:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 26 Mar 2022 15:09:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295058.502025 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nY839-0002zT-8N; Sat, 26 Mar 2022 15:09:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295058.502025; Sat, 26 Mar 2022 15:09:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nY839-0002zM-4W; Sat, 26 Mar 2022 15:09:55 +0000
Received: by outflank-mailman (input) for mailman id 295058;
 Sat, 26 Mar 2022 15:09:53 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=GeX8=UF=oracle.com=boris.ostrovsky@srs-se1.protection.inumbo.net>)
 id 1nY837-0002RD-88
 for xen-devel@lists.xenproject.org; Sat, 26 Mar 2022 15:09:53 +0000
Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com
 [205.220.177.32]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c907bab0-ad16-11ec-8fbc-03012f2f19d4;
 Sat, 26 Mar 2022 16:09:52 +0100 (CET)
Received: from pps.filterd (m0246630.ppops.net [127.0.0.1])
 by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 22QDEv88014371; 
 Sat, 26 Mar 2022 15:09:34 GMT
Received: from userp3030.oracle.com (userp3030.oracle.com [156.151.31.80] (may
 be forged)) by mx0b-00069f02.pphosted.com with ESMTP id 3f1s8cgm4s-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Sat, 26 Mar 2022 15:09:34 +0000
Received: from pps.filterd (userp3030.oracle.com [127.0.0.1])
 by userp3030.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 22QF9XiS110750;
 Sat, 26 Mar 2022 15:09:33 GMT
Received: from nam10-mw2-obe.outbound.protection.outlook.com
 (mail-mw2nam10lp2107.outbound.protection.outlook.com [104.47.55.107])
 by userp3030.oracle.com with ESMTP id 3f1qxq8qc4-1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);
 Sat, 26 Mar 2022 15:09:32 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com (2603:10b6:208:321::10)
 by SJ0PR10MB4429.namprd10.prod.outlook.com (2603:10b6:a03:2d1::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.16; Sat, 26 Mar
 2022 15:09:30 +0000
Received: from BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755]) by BLAPR10MB5009.namprd10.prod.outlook.com
 ([fe80::1b2:b41c:b2f0:c755%9]) with mapi id 15.20.5102.022; Sat, 26 Mar 2022
 15:09:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c907bab0-ad16-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=message-id : date :
 subject : to : cc : references : from : in-reply-to : content-type :
 content-transfer-encoding : mime-version; s=corp-2021-07-09;
 bh=Olf3oAAddyZOaTnS0/Bj1ES9HeiSJ+pfiqGcQJt4SeE=;
 b=zVLXv08vO71P0fy0DisBgeDZEBjhbyV9zwlIOLpvofPL67A/0mP0GhK53ySJNaxBXz2c
 Pt2aFv0yjHF/zFEEQzXuBM4NXotu2OF1qmEvTrzBrw0eh2KUSCxX98G3bL+05kqFFAqD
 bY00RpGYn12k4UrX42+A44FeKlGcJP15CORerzGa9OFVDxD5GBqPy6emTcgLRIztlPam
 HK2qirk2kQbCqNSIkXb6q4R2EjMEqfSi8haxeK01bpKWcGTM1WEBy28JhA9j2tq4bztE
 ColMpOAgamNjv2EUkQejkPBIIUsWUgxwNgAZJsD35GRN8kahIEEdxAvCRtn2CIZSacb8 Pw== 
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=XRFq4+NIxQvNVIb5q8YUZPISyl5Q1V76+aFLZbWIpYWHM0D8LXIg1pxjft2k+Tx59fKRvYNfn5MG+oEaQ697Lqcs+CGX/E2fv9Kn24AVow1rEDnDPxUhqledcpH1c7iNh7ajL7IpIVSE9X1AKdZfuBplptZZT0fA6ehcaHmIWakISpA88b9ffHX/2O79hou/CDUkvOdoCyNmrV5Jpz0FKoLhft+ODqCxunHmRMmrXt2u/P78yIvkphx8LTda+7LYMwMdTfRr5AqEdvWa702mGF69jrmfUxBXCwwWAjr/irLkjG/wFVV0QXVjGP0y98pL3CwxoNrvvdiHjOZQmQ2ptA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Olf3oAAddyZOaTnS0/Bj1ES9HeiSJ+pfiqGcQJt4SeE=;
 b=Jbs6HSsJXEfXJtK1C3t5UvDAUZFR7V3dSDBh3LGpNRx/NoU5FFEsReCaUkS5/ETs2zMl9fZOVWcWQwGKoDocPuRGW1oD9VL+KI9Vj/Mz48YgYhBzlNli6nu7toZ1V9o5A0k1D90QELNf6sxpxB/DifHRv4sLX8AoHSFwy7hhM3kkPtPEzKC5FZ5XicqqGygBHmgmUrKac+6mA7Yd/2wsrIDdb1DyJ5Mod5adp1kX/Wf1EVDNOTEfiqGSGajN48L1Rfda+mTQmAPInFDe8StYJfbSqOSle2sowFT1PjKBvbItjL8rHGuZOoRb0wPyYA/qvuFK+ODJW+zsehDdX8P0fQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com;
 dkim=pass header.d=oracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=Olf3oAAddyZOaTnS0/Bj1ES9HeiSJ+pfiqGcQJt4SeE=;
 b=rKUd5Zs95j/XNrnQDEom3EPTGQG57WxAk2EZ4rUM40AmINOKBLYz77KIGTFwDU9XQcGSPh22Y/04eZpCC/6NTR8Lp5nX7GyhxIsJJjhb94XFwxOTFV0hxmXSIyzh4Y9gZ+DhEdBTF6SK+qVFn8cz1xYfnjKidlmi7i3xe431PdY=
Message-ID: <c41a7822-c4d3-3589-f39a-6a2afee67469@oracle.com>
Date: Sat, 26 Mar 2022 11:09:26 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v2] xen: fix is_xen_pmu()
Content-Language: en-US
To: Juergen Gross <jgross@suse.com>, xen-devel@lists.xenproject.org,
        x86@kernel.org, linux-kernel@vger.kernel.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
        Thomas Gleixner <tglx@linutronix.de>, Ingo Molnar <mingo@redhat.com>,
        Borislav Petkov <bp@alien8.de>,
        Dave Hansen <dave.hansen@linux.intel.com>,
        "H. Peter Anvin" <hpa@zytor.com>,
        =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?= <marmarek@invisiblethingslab.com>
References: <20220325142002.31789-1-jgross@suse.com>
From: Boris Ostrovsky <boris.ostrovsky@oracle.com>
In-Reply-To: <20220325142002.31789-1-jgross@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: SN4PR0501CA0151.namprd05.prod.outlook.com
 (2603:10b6:803:2c::29) To BLAPR10MB5009.namprd10.prod.outlook.com
 (2603:10b6:208:321::10)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5e4384f2-cda6-47a3-4797-08da0f3aa06e
X-MS-TrafficTypeDiagnostic: SJ0PR10MB4429:EE_
X-Microsoft-Antispam-PRVS: 
	<SJ0PR10MB44290F328EDEA4BEFCE6D3648A1B9@SJ0PR10MB4429.namprd10.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 
	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
X-Forefront-Antispam-Report: 
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BLAPR10MB5009.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6512007)(36756003)(4326008)(26005)(6506007)(2906002)(6666004)(316002)(8676002)(53546011)(38100700002)(66476007)(54906003)(66556008)(8936002)(186003)(66946007)(6486002)(7416002)(5660300002)(508600001)(2616005)(44832011)(83380400001)(31686004)(31696002)(66574015)(86362001)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 
	=?utf-8?B?UjJjakN2VFd2WHF2RjVNU21hMk9YL1BrcHc5dStWWnNnejFxZTZtMnVPcHBp?=
 =?utf-8?B?UTBFZW9VMmFpNUVuN2tMN2VRWi9GTC9IdkVLS0R6TFI5QmxqVm03NW5EQWZt?=
 =?utf-8?B?eFcxMnRySWhvem9sNTBJRDhwV2lqWVlBYXVLKzlWOEZtSFBMb2d1MTdpdDVs?=
 =?utf-8?B?b3BjKzZXWEZRaStyRW1KQ2Y0R214R2dSdVI1T081d0hpa1BiWENkdnc0dXp1?=
 =?utf-8?B?V1V5cmd2OXptV0I3eDUzeERoYU1JcVU0MHJBb1MwNU5UWnRKVjRUOEFTV092?=
 =?utf-8?B?YnJSdWFrc09jT3RkZW9SV3RWbDZSVUZsQjV4OVkyeWNoZi9UVFkvdFBUc09r?=
 =?utf-8?B?cE9LZGJ3RnFueUMvTzcvSEViUldDTnhQaHdtN1VVcm0yakVCL3VBZk53L05w?=
 =?utf-8?B?ejdlbjBTOHlkTWt2WFFBc0ludjNnczEvL3ZtWE9oMXRoNS8zZkJLV1ZZNjcw?=
 =?utf-8?B?V0xSOW1sYWhGVllaU2xwUDl4K2gvOVZBSkdvUnRjWTh5aW1nZU8yT01kcS9l?=
 =?utf-8?B?Vldydm8vdXBsV1pKQWlSRnkvQTdrVVFYbEVvVXc3VEI0OVp2aWpXZEVLK0R3?=
 =?utf-8?B?U3JFTWxHODJ1Sjg1bVVXQys0NFlzV1djS0xOWXJDWWhtYzNMY3FscEYxelhW?=
 =?utf-8?B?TUNJUzBZNyt0WDRjWlV6Vk5YNk1ZeXd4anZXTmVJOFNKR29waXJKenZmS3Aw?=
 =?utf-8?B?a0dJSFg4R1Z0WGY4WVJFQTFidkJYbGxDVzZnMEJGNEhMV3FvdmNQRVJ5ZmJW?=
 =?utf-8?B?bG9vOE1CWVl0TENjMUZZaEd2SzlQMWlyeDUwQnVwQ01ZeVZxazJPbHRLWk84?=
 =?utf-8?B?NVBtQ2ZqcGlnZzhCYjZDRWhZMGlPUll1L1o4dGRQamdnVVFaZ3NudVVCeS9P?=
 =?utf-8?B?cVk3Ri80d29ZNVNtS3EzM0tUeUlyTi92d0k4Zm9jZFlDeCtkN0MvdkZZelg2?=
 =?utf-8?B?elNRMmQwZXBnN0hyaG9BNElXd2JnL0RmT1lSSXpWdHJwR2ZWUVR2Y2V6Y213?=
 =?utf-8?B?Um9xNVFLVnVQNGpSOEI0MVFrWHg0bHEvZ0M1dmtkMGg3QnlodzZ4KzEya0F1?=
 =?utf-8?B?TVdDem1uSDBRUEkrR1JUQTYyYmNHUVV3QjgvVVFIR3pielFwbEpOemdFcWJ3?=
 =?utf-8?B?NEwxS3BsUnhZYkxxVG5aWVBtUm5ESmI1eUxFRVFOdnBhbXd1YmozOG5oR08x?=
 =?utf-8?B?YWJ0VjlGb0NZbGt6MDRNb0xVaGhFMXdDckRDVkM1dWxWRzRDMjczTnRDN3R6?=
 =?utf-8?B?S1c2akg5NXdxNjNHSXNrTHRONWc0TFI4WVp2MGtlc3pwbk85dmpFMFJxY0k0?=
 =?utf-8?B?SDhic3NPc1FoZEl4ZmZXbkw5dXBqM0FlRnRKbWxGd2FvY0ZGWUFtTkQzMFBV?=
 =?utf-8?B?QWU4b3h6VS9sd2pCVlJxR21aMG85cXdIVmpCQWIxRU8xZ3NDTXJoSnpOVVFW?=
 =?utf-8?B?cEgvbHNMZ2Z3N1FqUjZud0JiSXZQd1cwLy9NSVdTbFk4LzJGL09JWVIwRG05?=
 =?utf-8?B?VG5wUW5uc1RLWnZPTEJUZjZnVXdWbkhzeThnbW1sN1FnbE9CaERjVEhWTUE3?=
 =?utf-8?B?TEREWnlTOVJxZ2puV0M4M3ZJQWdxM3F4cDJ2MjNZQjVpNXF2UmNaN0hOWVMx?=
 =?utf-8?B?T0ZuNHlvNTdyRGdjVENPNXhkdE94WFNubjdCVlk4UDZFQW5kZjQrWVFvWUZI?=
 =?utf-8?B?VEJXZWtMNFRZTllhU0tNVDVuLzZ5Z0Z4ejdSOWMrb28rdDF1a2p3WHhodlhQ?=
 =?utf-8?B?a0dUNkQwMjBzOGlkVXh0RTlPakFncEw0SitoQXRsQURPRUxZaWU0eDIwRnQy?=
 =?utf-8?B?VmRuZE5IU3doTkNTQVA3eEVnYnhkVHFxa2dwdWJIZ01NZVlEM050ZHp5c3Nv?=
 =?utf-8?B?Rjc2RWVzOURheEdudENJeFpBM05SMzlrRVhvR3dxdUFDakhKeVhxZU02b2pN?=
 =?utf-8?B?MktDeGJPcHNGblpRem1URnF0cGU5MTVpdm5haXZMemo3U2JhSG5WUk9jOWIy?=
 =?utf-8?B?VHl2VlFPWlRnPT0=?=
X-OriginatorOrg: oracle.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5e4384f2-cda6-47a3-4797-08da0f3aa06e
X-MS-Exchange-CrossTenant-AuthSource: BLAPR10MB5009.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Mar 2022 15:09:30.1229
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: CgSwHRk3fGWC+AY8CQJnh/Edru3XqIULvkp+trZF8vklR9Q1glk7dRA28ht05R10+CsyDWJ7cuXyA6Tpd7z3QnOgc4FeXfpPyPHzFhUxHic=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR10MB4429
X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10298 signatures=694973
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 mlxscore=0 bulkscore=0
 adultscore=0 spamscore=0 mlxlogscore=999 phishscore=0 malwarescore=0
 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2202240000
 definitions=main-2203260098
X-Proofpoint-GUID: D2ydAiWTgQfOiztmLZK5d2FW-1klQXok
X-Proofpoint-ORIG-GUID: D2ydAiWTgQfOiztmLZK5d2FW-1klQXok


On 3/25/22 10:20 AM, Juergen Gross wrote:
> is_xen_pmu() is taking the cpu number as parameter, but it is not using
> it. Instead it just tests whether the Xen PMU initialization on the
> current cpu did succeed. As this test is done by checking a percpu
> pointer, preemption needs to be disabled in order to avoid switching
> the cpu while doing the test. While resuming from suspend() this seems
> not to be the case:
>
> [   88.082751] ACPI: PM: Low-level resume complete
> [   88.087933] ACPI: EC: EC started
> [   88.091464] ACPI: PM: Restoring platform NVS memory
> [   88.097166] xen_acpi_processor: Uploading Xen processor PM info
> [   88.103850] Enabling non-boot CPUs ...
> [   88.108128] installing Xen timer for CPU 1
> [   88.112763] BUG: using smp_processor_id() in preemptible [00000000] code: systemd-sleep/7138
> [   88.122256] caller is is_xen_pmu+0x12/0x30
> [   88.126937] CPU: 0 PID: 7138 Comm: systemd-sleep Tainted: G        W         5.16.13-2.fc32.qubes.x86_64 #1
> [   88.137939] Hardware name: Star Labs StarBook/StarBook, BIOS 7.97 03/21/2022
> [   88.145930] Call Trace:
> [   88.148757]  <TASK>
> [   88.151193]  dump_stack_lvl+0x48/0x5e
> [   88.155381]  check_preemption_disabled+0xde/0xe0
> [   88.160641]  is_xen_pmu+0x12/0x30
> [   88.164441]  xen_smp_intr_init_pv+0x75/0x100
>
> Fix that by replacing is_xen_pmu() by a simple boolean variable which
> reflects the Xen PMU initialization state on cpu 0.
>
> Modify xen_pmu_init() to return early in case it is being called for a
> cpu other than cpu 0 and the boolean variable not being set.
>
> Fixes: bf6dfb154d93 ("xen/PMU: PMU emulation code")
> Reported-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
> Signed-off-by: Juergen Gross <jgross@suse.com>



Applied to for-linus-5.18.



From xen-devel-bounces@lists.xenproject.org Sat Mar 26 16:12:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 26 Mar 2022 16:12:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295062.502036 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nY91e-00021c-QP; Sat, 26 Mar 2022 16:12:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295062.502036; Sat, 26 Mar 2022 16:12:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nY91e-00021V-Mw; Sat, 26 Mar 2022 16:12:26 +0000
Received: by outflank-mailman (input) for mailman id 295062;
 Sat, 26 Mar 2022 16:12:24 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nY91c-00021K-NL; Sat, 26 Mar 2022 16:12:24 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nY91c-0005ZS-K0; Sat, 26 Mar 2022 16:12:24 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nY91c-0000JE-1l; Sat, 26 Mar 2022 16:12:24 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nY91c-0003f2-1G; Sat, 26 Mar 2022 16:12:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=S9TFV17G0JAK2DIx5tmuUAhMD6lTOkDtT3cYHSSykqI=; b=SEwD4MWa816dyFb5wTYwzrxvDn
	1pubEyP2JuW7vJ7h0GfqgIw0uHiWpwFXOD5xKPbStl7BHNAs8v2dO46n5CEIOrqjqJPPoBUIDlUEk
	+qG7tynR12D9Ko7sNe+cQ6DxFdd/gKqHAJAwKUu/jKPVExrVtWv5nFA04kguf1AhgAuo=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168864-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.16-testing test] 168864: regressions - trouble: broken/fail/pass
X-Osstest-Failures:
    xen-4.16-testing:test-amd64-i386-qemuu-rhel6hvm-amd:<job status>:broken:regression
    xen-4.16-testing:test-amd64-i386-xl-pvshim:<job status>:broken:regression
    xen-4.16-testing:test-amd64-i386-xl-qemut-win7-amd64:<job status>:broken:regression
    xen-4.16-testing:test-amd64-i386-xl-shadow:<job status>:broken:regression
    xen-4.16-testing:test-amd64-amd64-xl-qemut-ws16-amd64:<job status>:broken:regression
    xen-4.16-testing:test-amd64-i386-libvirt:<job status>:broken:regression
    xen-4.16-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:<job status>:broken:regression
    xen-4.16-testing:test-amd64-i386-libvirt-raw:<job status>:broken:regression
    xen-4.16-testing:test-amd64-i386-libvirt-xsm:<job status>:broken:regression
    xen-4.16-testing:test-amd64-i386-qemut-rhel6hvm-amd:<job status>:broken:regression
    xen-4.16-testing:test-amd64-i386-libvirt-xsm:host-install(5):broken:regression
    xen-4.16-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:host-install(5):broken:regression
    xen-4.16-testing:test-amd64-i386-qemut-rhel6hvm-amd:host-install(5):broken:regression
    xen-4.16-testing:test-amd64-i386-xl-shadow:host-install(5):broken:regression
    xen-4.16-testing:test-amd64-i386-qemuu-rhel6hvm-amd:host-install(5):broken:regression
    xen-4.16-testing:test-amd64-i386-xl-pvshim:host-install(5):broken:regression
    xen-4.16-testing:test-amd64-amd64-xl-qemut-ws16-amd64:host-install(5):broken:regression
    xen-4.16-testing:test-amd64-i386-libvirt-raw:host-install(5):broken:regression
    xen-4.16-testing:test-amd64-i386-libvirt:host-install(5):broken:regression
    xen-4.16-testing:test-amd64-i386-xl-qemut-win7-amd64:host-install(5):broken:regression
    xen-4.16-testing:test-amd64-amd64-livepatch:livepatch-run:fail:regression
    xen-4.16-testing:test-amd64-i386-livepatch:livepatch-run:fail:regression
    xen-4.16-testing:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=c7a861b2d065e7c26f9d499df32eb99f546e1671
X-Osstest-Versions-That:
    xen=cfd29b83a26f35f49f074f06169ce4cadfdebf0d
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sat, 26 Mar 2022 16:12:24 +0000

flight 168864 xen-4.16-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168864/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-i386-qemuu-rhel6hvm-amd    <job status>                 broken
 test-amd64-i386-xl-pvshim       <job status>                 broken
 test-amd64-i386-xl-qemut-win7-amd64    <job status>                 broken
 test-amd64-i386-xl-shadow       <job status>                 broken
 test-amd64-amd64-xl-qemut-ws16-amd64    <job status>                 broken
 test-amd64-i386-libvirt         <job status>                 broken
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm    <job status>       broken
 test-amd64-i386-libvirt-raw     <job status>                 broken
 test-amd64-i386-libvirt-xsm     <job status>                 broken
 test-amd64-i386-qemut-rhel6hvm-amd    <job status>                 broken
 test-amd64-i386-libvirt-xsm   5 host-install(5)        broken REGR. vs. 168513
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 5 host-install(5) broken REGR. vs. 168513
 test-amd64-i386-qemut-rhel6hvm-amd  5 host-install(5)  broken REGR. vs. 168513
 test-amd64-i386-xl-shadow     5 host-install(5)        broken REGR. vs. 168513
 test-amd64-i386-qemuu-rhel6hvm-amd  5 host-install(5)  broken REGR. vs. 168513
 test-amd64-i386-xl-pvshim     5 host-install(5)        broken REGR. vs. 168513
 test-amd64-amd64-xl-qemut-ws16-amd64 5 host-install(5) broken REGR. vs. 168513
 test-amd64-i386-libvirt-raw   5 host-install(5)        broken REGR. vs. 168513
 test-amd64-i386-libvirt       5 host-install(5)        broken REGR. vs. 168513
 test-amd64-i386-xl-qemut-win7-amd64  5 host-install(5) broken REGR. vs. 168513
 test-amd64-amd64-livepatch   13 livepatch-run            fail REGR. vs. 168513
 test-amd64-i386-livepatch    13 livepatch-run            fail REGR. vs. 168513

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168513
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168513
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168513
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168513
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168513
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168513
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168513
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168513
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168513
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168513
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  c7a861b2d065e7c26f9d499df32eb99f546e1671
baseline version:
 xen                  cfd29b83a26f35f49f074f06169ce4cadfdebf0d

Last test of basis   168513  2022-03-11 05:13:34 Z   15 days
Testing same since   168864  2022-03-25 17:37:01 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bjoern Doebel <doebel@amazon.de>
  Jan Beulich <jbeulich@suse.com>
  Jiamei Xie <jiamei.xie@arm.com>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Thiner Logoer <logoerthiner1@163.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            broken  
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  broken  
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           broken  
 test-amd64-i386-qemuu-rhel6hvm-amd                           broken  
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          broken  
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         broken  
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      broken  
 test-amd64-amd64-livepatch                                   fail    
 test-amd64-i386-livepatch                                    fail    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    broken  
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  broken  
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    broken  
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job test-amd64-i386-qemuu-rhel6hvm-amd broken
broken-job test-amd64-i386-xl-pvshim broken
broken-job test-amd64-i386-xl-qemut-win7-amd64 broken
broken-job test-amd64-i386-xl-shadow broken
broken-job test-amd64-amd64-xl-qemut-ws16-amd64 broken
broken-job test-amd64-i386-libvirt broken
broken-job test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm broken
broken-job test-amd64-i386-libvirt-raw broken
broken-job test-amd64-i386-libvirt-xsm broken
broken-job test-amd64-i386-qemut-rhel6hvm-amd broken
broken-step test-amd64-i386-libvirt-xsm host-install(5)
broken-step test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm host-install(5)
broken-step test-amd64-i386-qemut-rhel6hvm-amd host-install(5)
broken-step test-amd64-i386-xl-shadow host-install(5)
broken-step test-amd64-i386-qemuu-rhel6hvm-amd host-install(5)
broken-step test-amd64-i386-xl-pvshim host-install(5)
broken-step test-amd64-amd64-xl-qemut-ws16-amd64 host-install(5)
broken-step test-amd64-i386-libvirt-raw host-install(5)
broken-step test-amd64-i386-libvirt host-install(5)
broken-step test-amd64-i386-xl-qemut-win7-amd64 host-install(5)

Not pushing.

(No revision log; it would be 394 lines long.)


From xen-devel-bounces@lists.xenproject.org Sat Mar 26 23:16:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sat, 26 Mar 2022 23:16:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295093.502076 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYFdR-0007i8-St; Sat, 26 Mar 2022 23:15:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295093.502076; Sat, 26 Mar 2022 23:15:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYFdR-0007i1-Pf; Sat, 26 Mar 2022 23:15:53 +0000
Received: by outflank-mailman (input) for mailman id 295093;
 Sat, 26 Mar 2022 23:15:52 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=HP1u=UF=m5p.com=ehem@srs-se1.protection.inumbo.net>)
 id 1nYFdQ-0007hv-Ck
 for xen-devel@lists.xenproject.org; Sat, 26 Mar 2022 23:15:52 +0000
Received: from mailhost.m5p.com (mailhost.m5p.com [74.104.188.4])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ab573789-ad5a-11ec-8fbc-03012f2f19d4;
 Sun, 27 Mar 2022 00:15:49 +0100 (CET)
Received: from m5p.com (mailhost.m5p.com [IPv6:2001:470:1f07:15ff:0:0:0:f7])
 by mailhost.m5p.com (8.16.1/8.15.2) with ESMTPS id 22QNFTci046373
 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO);
 Sat, 26 Mar 2022 19:15:35 -0400 (EDT) (envelope-from ehem@m5p.com)
Received: (from ehem@localhost)
 by m5p.com (8.16.1/8.15.2/Submit) id 22QNFTOq046372;
 Sat, 26 Mar 2022 16:15:29 -0700 (PDT) (envelope-from ehem)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ab573789-ad5a-11ec-8fbc-03012f2f19d4
Date: Sat, 26 Mar 2022 16:15:29 -0700
From: Elliott Mitchell <ehem+xen@m5p.com>
To: xen-devel@lists.xenproject.org, sstabellini@kernel.org
Subject: OS Headers hypercall.h/hypervisor.h
Message-ID: <Yj+ekdLdRa9U7dfa@mattapan.m5p.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
X-Spam-Status: No, score=0.4 required=10.0 tests=KHOP_HELO_FCRDNS autolearn=no
	autolearn_force=no version=3.4.5
X-Spam-Checker-Version: SpamAssassin 3.4.5 (2021-03-20) on mattapan.m5p.com

The hypercalls implementation for Linux and FreeBSD have two key headers,
hypercall.h and hypervisor.h.  I'm curious why the implementations for
x86 and ARM* are so distinct.

I found it fairly straightforward to implement ARM* versions of the x86
_hypercall#() macros.  Once that is done, most of the wrappers in the x86
hypercall.h can be moved to a shared hypervisor.h header.

Why does Xen/ARM on Linux still have hypercall.S when merging the
headers should reduce maintainance?

Was GCC extended inline assembly language for ARM* thought too awful?

I'm also curious why these headers are part of the Linux kernel, instead
of being maintained by the Xen Project?


-- 
(\___(\___(\______          --=> 8-) EHM <=--          ______/)___/)___/)
 \BS (    |         ehem+sigmsg@m5p.com  PGP 87145445         |    )   /
  \_CS\   |  _____  -O #include <stddisclaimer.h> O-   _____  |   /  _/
8A19\___\_|_/58D2 7E3D DDF4 7BA6 <-PGP-> 41D1 B375 37D0 8714\_|_/___/5445




From xen-devel-bounces@lists.xenproject.org Sun Mar 27 05:10:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 27 Mar 2022 05:10:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295111.502112 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYLA5-0000K1-20; Sun, 27 Mar 2022 05:09:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295111.502112; Sun, 27 Mar 2022 05:09:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYLA4-0000Je-Rm; Sun, 27 Mar 2022 05:09:56 +0000
Received: by outflank-mailman (input) for mailman id 295111;
 Sun, 27 Mar 2022 05:09:56 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYLA4-0000JU-14; Sun, 27 Mar 2022 05:09:56 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYLA3-00024H-Ty; Sun, 27 Mar 2022 05:09:55 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYLA3-0001go-IT; Sun, 27 Mar 2022 05:09:55 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nYLA3-0003df-Hy; Sun, 27 Mar 2022 05:09:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=+nuttWoLGHwr7uP6Sp/l7JZ8GIW1d13X+9AJqdU70mE=; b=iG6ZzMNLaxFqztGb3gBuD2TGQ+
	/tKWWbUHkA2C0irKtAUytLU9P92MORHhF+xNIEL8wWWUQcWYX3GXYUD8Rsz+R5GnN2DswjYp4EU80
	ma+ZeW5dI995YkPabl/vxTJc5OmEp7aEoUho3iptk1SGnUPda/+L/wHufDUKk/SjtuJU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168869-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168869: regressions - trouble: blocked/broken/fail/pass
X-Osstest-Failures:
    libvirt:build-i386:<job status>:broken:regression
    libvirt:build-i386-pvops:<job status>:broken:regression
    libvirt:build-i386-xsm:<job status>:broken:regression
    libvirt:build-i386-pvops:host-install(4):broken:regression
    libvirt:build-i386-xsm:host-install(4):broken:regression
    libvirt:build-i386:host-install(4):broken:regression
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=06c960e477de4561c7ba956f82994fa120226397
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 27 Mar 2022 05:09:55 +0000

flight 168869 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168869/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-i386                      <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 151777
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 151777
 build-i386                    4 host-install(4)        broken REGR. vs. 151777
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              06c960e477de4561c7ba956f82994fa120226397
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  625 days
Failing since        151818  2020-07-11 04:18:52 Z  624 days  605 attempts
Testing same since   168869  2022-03-26 04:21:28 Z    1 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Claudio Fontana <cfontana@suse.de>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Haonan Wang <hnwanga1@gmail.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Martin Pitt <mpitt@debian.org>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Paolo Bonzini <pbonzini@redhat.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tom Wieczorek <tom@bibbu.net>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               broken  
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             broken  
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-i386 broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-i386-pvops host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step build-i386 host-install(4)

Not pushing.

(No revision log; it would be 102174 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 27 06:18:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 27 Mar 2022 06:18:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295121.502128 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYMDw-0007Kp-86; Sun, 27 Mar 2022 06:18:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295121.502128; Sun, 27 Mar 2022 06:18:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYMDw-0007Ki-58; Sun, 27 Mar 2022 06:18:00 +0000
Received: by outflank-mailman (input) for mailman id 295121;
 Sun, 27 Mar 2022 06:17:59 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYMDu-0007KY-Uh; Sun, 27 Mar 2022 06:17:58 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYMDu-0003FE-SE; Sun, 27 Mar 2022 06:17:58 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYMDu-0003AC-GV; Sun, 27 Mar 2022 06:17:58 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nYMDu-0007FN-Fz; Sun, 27 Mar 2022 06:17:58 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=oFE9nxILrBMj9piU2dSk/C/9gMbnzbM874dwuI22Z1s=; b=ysMttvK6gRLK/XInneG8qgVAp1
	XTqivdbpe0cNGz9iwLpgzt3s5ZzGz9FSHg6TSfKQW47mOxo/+ATp/f+PNr4xcCdMkjUTQohXiqciy
	Flq/4T1fCPq5IuEARkJq1mfMlPkUe16Iw9jfDIcXlQb3WgxPzc+d22yTyVN+A33udjZY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168868-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168868: regressions - trouble: blocked/broken/fail/pass
X-Osstest-Failures:
    ovmf:build-i386:<job status>:broken:regression
    ovmf:build-i386-pvops:<job status>:broken:regression
    ovmf:build-i386-xsm:<job status>:broken:regression
    ovmf:build-i386:host-install(4):broken:regression
    ovmf:build-i386-pvops:host-install(4):broken:regression
    ovmf:build-i386-xsm:host-install(4):broken:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=3115377bf0c50780dc9b05e33847fcd563d4ebb2
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 27 Mar 2022 06:17:58 +0000

flight 168868 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168868/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-i386                      <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-i386                    4 host-install(4)        broken REGR. vs. 168254
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168254
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 3115377bf0c50780dc9b05e33847fcd563d4ebb2
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   26 days
Failing since        168258  2022-03-01 01:55:31 Z   26 days  257 attempts
Testing same since   168868  2022-03-26 02:40:45 Z    1 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Bob Feng <bob.c.feng@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Mara Sophie Grosch <littlefox@lf-net.org>
  Mara Sophie Grosch via groups.io <littlefox=lf-net.org@groups.io>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Yi Li <yi1.li@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               broken  
 build-amd64                                                  fail    
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             broken  
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-i386 broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-i386 host-install(4)
broken-step build-i386-pvops host-install(4)
broken-step build-i386-xsm host-install(4)

Not pushing.

(No revision log; it would be 945 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 27 08:25:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 27 Mar 2022 08:25:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295145.502152 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYODU-0003Rk-6e; Sun, 27 Mar 2022 08:25:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295145.502152; Sun, 27 Mar 2022 08:25:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYODU-0003Rd-3I; Sun, 27 Mar 2022 08:25:40 +0000
Received: by outflank-mailman (input) for mailman id 295145;
 Sun, 27 Mar 2022 08:25:38 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYODS-0003Qi-LX; Sun, 27 Mar 2022 08:25:38 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYODS-0005oH-Hi; Sun, 27 Mar 2022 08:25:38 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYODS-0005yG-2a; Sun, 27 Mar 2022 08:25:38 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nYODS-0003bQ-26; Sun, 27 Mar 2022 08:25:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=NPmY/DIwi/lzsus+CTVa3CMCxD9uueorXSl7O5G1ciY=; b=4R9NF0P/dzY6Z+uF1toWu9SeqQ
	EzoIaZMpCCah/FHxEWuZf0q3kFYqe0O84KzoFjYBVE6QzjqvrG42gfKvONbGbL2MI2zEM2sED20wx
	JNuqWL3q/8vTRDowHt/efCIa4609gbpMA5fJWSWWMHdjWoFh0dInSR6C/P47kyz0OrZg=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168877-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.16-testing test] 168877: trouble: blocked/broken/pass
X-Osstest-Failures:
    xen-4.16-testing:build-amd64:<job status>:broken:regression
    xen-4.16-testing:build-amd64-prev:<job status>:broken:regression
    xen-4.16-testing:build-amd64-pvops:<job status>:broken:regression
    xen-4.16-testing:build-amd64-xsm:<job status>:broken:regression
    xen-4.16-testing:build-amd64-xtf:<job status>:broken:regression
    xen-4.16-testing:build-arm64:<job status>:broken:regression
    xen-4.16-testing:build-arm64-pvops:<job status>:broken:regression
    xen-4.16-testing:build-arm64-xsm:<job status>:broken:regression
    xen-4.16-testing:build-armhf-pvops:<job status>:broken:regression
    xen-4.16-testing:build-i386:<job status>:broken:regression
    xen-4.16-testing:build-i386-prev:<job status>:broken:regression
    xen-4.16-testing:build-i386-pvops:<job status>:broken:regression
    xen-4.16-testing:build-i386-xsm:<job status>:broken:regression
    xen-4.16-testing:build-i386:host-install(4):broken:regression
    xen-4.16-testing:build-i386-prev:host-install(4):broken:regression
    xen-4.16-testing:build-i386-xsm:host-install(4):broken:regression
    xen-4.16-testing:build-i386-pvops:host-install(4):broken:regression
    xen-4.16-testing:build-arm64:host-install(4):broken:regression
    xen-4.16-testing:build-arm64-pvops:host-install(4):broken:regression
    xen-4.16-testing:build-arm64-xsm:host-install(4):broken:regression
    xen-4.16-testing:build-amd64-prev:host-install(4):broken:regression
    xen-4.16-testing:build-amd64:host-install(4):broken:regression
    xen-4.16-testing:build-amd64-pvops:host-install(4):broken:regression
    xen-4.16-testing:build-amd64-xtf:host-install(4):broken:regression
    xen-4.16-testing:build-amd64-xsm:host-install(4):broken:regression
    xen-4.16-testing:build-armhf-pvops:host-install(4):broken:regression
    xen-4.16-testing:test-amd64-i386-qemuu-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-qemuu-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-pvshim:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-shadow:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-coresched-amd64-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-shadow:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-rtds:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:build-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:build-arm64-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qcow2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-pvshim:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-pvhv2-intel:build-check(1):blocked:nonblocking
    xen-4.16-testing:build-i386-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-pvhv2-amd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-dom0pvh-xl-amd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-dom0pvh-xl-intel:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-livepatch:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-nested-intel:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-migrupgrade:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-pair:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-nested-amd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-pygrub:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-freebsd11-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-freebsd12-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-coresched-i386-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-freebsd10-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-freebsd10-i386:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-livepatch:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-migrupgrade:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-pair:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-qemut-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-qemut-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-arndale:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-cubietruck:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-rtds:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-xtf-amd64-amd64-1:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-xtf-amd64-amd64-2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-xtf-amd64-amd64-3:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-xtf-amd64-amd64-4:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-xtf-amd64-amd64-5:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    xen=c7a861b2d065e7c26f9d499df32eb99f546e1671
X-Osstest-Versions-That:
    xen=cfd29b83a26f35f49f074f06169ce4cadfdebf0d
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 27 Mar 2022 08:25:38 +0000

flight 168877 xen-4.16-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168877/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-prev                <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-amd64-xtf                 <job status>                 broken
 build-arm64                     <job status>                 broken
 build-arm64-pvops               <job status>                 broken
 build-arm64-xsm                 <job status>                 broken
 build-armhf-pvops               <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-prev                 <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-i386                    4 host-install(4)        broken REGR. vs. 168513
 build-i386-prev               4 host-install(4)        broken REGR. vs. 168513
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168513
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168513
 build-arm64                   4 host-install(4)        broken REGR. vs. 168513
 build-arm64-pvops             4 host-install(4)        broken REGR. vs. 168513
 build-arm64-xsm               4 host-install(4)        broken REGR. vs. 168513
 build-amd64-prev              4 host-install(4)        broken REGR. vs. 168513
 build-amd64                   4 host-install(4)        broken REGR. vs. 168513
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 168513
 build-amd64-xtf               4 host-install(4)        broken REGR. vs. 168513
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 168513
 build-armhf-pvops             4 host-install(4)        broken REGR. vs. 168513

Tests which did not succeed, but are not blocking:
 test-amd64-i386-qemuu-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-xl            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-pvshim     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemut-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemut-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemut-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1)  blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-shadow     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-vhd        1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-xsm        1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl           1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-amd64-coresched-amd64-xl  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-xsm       1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-shadow    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-rtds      1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ws16-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qemut-ws16-amd64  1 build-check(1)             blocked n/a
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qcow2     1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvshim    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-intel  1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit2   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit1   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl           1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-amd64-livepatch    1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-intel  1 build-check(1)              blocked n/a
 test-amd64-amd64-migrupgrade  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pair         1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pygrub       1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-freebsd11-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-qemuu-freebsd12-amd64  1 build-check(1)           blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-coresched-i386-xl  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-amd64  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-i386  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-amd64-i386-livepatch     1 build-check(1)               blocked  n/a
 test-amd64-i386-migrupgrade   1 build-check(1)               blocked  n/a
 test-amd64-i386-pair          1 build-check(1)               blocked  n/a
 test-amd64-i386-qemut-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemut-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-armhf-armhf-xl-arndale   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit1   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-cubietruck  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-rtds      1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-vhd       1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-1        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-2        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-3        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-4        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-5        1 build-check(1)               blocked  n/a

version targeted for testing:
 xen                  c7a861b2d065e7c26f9d499df32eb99f546e1671
baseline version:
 xen                  cfd29b83a26f35f49f074f06169ce4cadfdebf0d

Last test of basis   168513  2022-03-11 05:13:34 Z   16 days
Testing same since   168864  2022-03-25 17:37:01 Z    1 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bjoern Doebel <doebel@amazon.de>
  Jan Beulich <jbeulich@suse.com>
  Jiamei Xie <jiamei.xie@arm.com>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Thiner Logoer <logoerthiner1@163.com>

jobs:
 build-amd64-xsm                                              broken  
 build-arm64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64-xtf                                              broken  
 build-amd64                                                  broken  
 build-arm64                                                  broken  
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-prev                                             broken  
 build-i386-prev                                              broken  
 build-amd64-pvops                                            broken  
 build-arm64-pvops                                            broken  
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-xtf-amd64-amd64-1                                       blocked 
 test-xtf-amd64-amd64-2                                       blocked 
 test-xtf-amd64-amd64-3                                       blocked 
 test-xtf-amd64-amd64-4                                       blocked 
 test-xtf-amd64-amd64-5                                       blocked 
 test-amd64-amd64-xl                                          blocked 
 test-amd64-coresched-amd64-xl                                blocked 
 test-arm64-arm64-xl                                          blocked 
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           blocked 
 test-amd64-coresched-i386-xl                                 blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        blocked 
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         blocked 
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-xl-xsm                                      blocked 
 test-arm64-arm64-xl-xsm                                      blocked 
 test-amd64-i386-xl-xsm                                       blocked 
 test-amd64-amd64-qemuu-nested-amd                            blocked 
 test-amd64-amd64-xl-pvhv2-amd                                blocked 
 test-amd64-i386-qemut-rhel6hvm-amd                           blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-dom0pvh-xl-amd                              blocked 
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemut-debianhvm-amd64                     blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     blocked 
 test-amd64-i386-freebsd10-amd64                              blocked 
 test-amd64-amd64-qemuu-freebsd11-amd64                       blocked 
 test-amd64-amd64-qemuu-freebsd12-amd64                       blocked 
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         blocked 
 test-amd64-i386-xl-qemut-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         blocked 
 test-amd64-i386-xl-qemuu-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemut-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemut-ws16-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ws16-amd64                          blocked 
 test-armhf-armhf-xl-arndale                                  blocked 
 test-amd64-amd64-xl-credit1                                  blocked 
 test-arm64-arm64-xl-credit1                                  blocked 
 test-armhf-armhf-xl-credit1                                  blocked 
 test-amd64-amd64-xl-credit2                                  blocked 
 test-arm64-arm64-xl-credit2                                  blocked 
 test-armhf-armhf-xl-credit2                                  blocked 
 test-armhf-armhf-xl-cubietruck                               blocked 
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        blocked 
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         blocked 
 test-amd64-i386-freebsd10-i386                               blocked 
 test-amd64-amd64-qemuu-nested-intel                          blocked 
 test-amd64-amd64-xl-pvhv2-intel                              blocked 
 test-amd64-i386-qemut-rhel6hvm-intel                         blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-amd64-dom0pvh-xl-intel                            blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-livepatch                                   blocked 
 test-amd64-i386-livepatch                                    blocked 
 test-amd64-amd64-migrupgrade                                 blocked 
 test-amd64-i386-migrupgrade                                  blocked 
 test-amd64-amd64-xl-multivcpu                                blocked 
 test-armhf-armhf-xl-multivcpu                                blocked 
 test-amd64-amd64-pair                                        blocked 
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-amd64-amd64-xl-pvshim                                   blocked 
 test-amd64-i386-xl-pvshim                                    blocked 
 test-amd64-amd64-pygrub                                      blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-amd64-amd64-xl-qcow2                                    blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-xl-rtds                                     blocked 
 test-armhf-armhf-xl-rtds                                     blocked 
 test-arm64-arm64-xl-seattle                                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              blocked 
 test-amd64-amd64-xl-shadow                                   blocked 
 test-amd64-i386-xl-shadow                                    blocked 
 test-arm64-arm64-xl-thunderx                                 blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 
 test-arm64-arm64-xl-vhd                                      blocked 
 test-armhf-armhf-xl-vhd                                      blocked 
 test-amd64-i386-xl-vhd                                       blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-prev broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-amd64-xtf broken
broken-job build-arm64 broken
broken-job build-arm64-pvops broken
broken-job build-arm64-xsm broken
broken-job build-armhf-pvops broken
broken-job build-i386 broken
broken-job build-i386-prev broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-i386 host-install(4)
broken-step build-i386-prev host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step build-i386-pvops host-install(4)
broken-step build-arm64 host-install(4)
broken-step build-arm64-pvops host-install(4)
broken-step build-arm64-xsm host-install(4)
broken-step build-amd64-prev host-install(4)
broken-step build-amd64 host-install(4)
broken-step build-amd64-pvops host-install(4)
broken-step build-amd64-xtf host-install(4)
broken-step build-amd64-xsm host-install(4)
broken-step build-armhf-pvops host-install(4)

Not pushing.

(No revision log; it would be 394 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 27 12:00:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 27 Mar 2022 12:00:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295073.502180 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYRZ8-0007Ne-OJ; Sun, 27 Mar 2022 12:00:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295073.502180; Sun, 27 Mar 2022 12:00:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYRZ8-0007NN-JK; Sun, 27 Mar 2022 12:00:14 +0000
Received: by outflank-mailman (input) for mailman id 295073;
 Sat, 26 Mar 2022 16:59:03 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=HfZe=UF=gmail.com=shentey@srs-se1.protection.inumbo.net>)
 id 1nY9kk-0006Rm-VE
 for xen-devel@lists.xenproject.org; Sat, 26 Mar 2022 16:59:02 +0000
Received: from mail-ej1-x62a.google.com (mail-ej1-x62a.google.com
 [2a00:1450:4864:20::62a])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 08bb333f-ad26-11ec-a405-831a346695d4;
 Sat, 26 Mar 2022 17:59:02 +0100 (CET)
Received: by mail-ej1-x62a.google.com with SMTP id bq8so6913380ejb.10
 for <xen-devel@lists.xenproject.org>; Sat, 26 Mar 2022 09:59:01 -0700 (PDT)
Received: from localhost.localdomain
 (dynamic-089-012-231-111.89.12.pool.telefonica.de. [89.12.231.111])
 by smtp.gmail.com with ESMTPSA id
 x12-20020a50d9cc000000b0040f70fe78f3sm4515930edj.36.2022.03.26.09.58.59
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Sat, 26 Mar 2022 09:59:00 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 08bb333f-ad26-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:in-reply-to:references
         :mime-version:content-transfer-encoding;
        bh=LkZ15wJd+LFpAdx6Z7RYH7A3b7bWmA7jprwHFNQo/OI=;
        b=aVO5+9ALXYQ2+LvXDMxIdtX5vgsMUD3RKGLQ5rKAkXg3AWbqFEkLAXQAzueihImtnQ
         l5jnGHJIGeRmY9NfJptFUkenke1t9lzmhk7WLvXi6YeTrXc44ssdXq8jOSk3NX4P4uwb
         YIQNe62roU6/GS7vqIi/T4QnrOEuDiVpW4ilV5qrIUNbPWBX7dVgZelHHmF0awHWC6Oa
         7kGIam6rXJQTJFOEmJQVuzICDsiXv6+vu/s1nQhkZ1eh/UUdqb0a8n3HbwIfckG5BVyp
         GBYO16X2OKQcP8z1M4h+RRnrOZjwjULYC1BBZ5ivOMYzR+KtErsr1WaavJoKmGQsb7ar
         tWHw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to
         :references:mime-version:content-transfer-encoding;
        bh=LkZ15wJd+LFpAdx6Z7RYH7A3b7bWmA7jprwHFNQo/OI=;
        b=SM99GtBADRO3sxR0EDAcxr7aUTgk12AFwVCTV5JCMETyvSDroE+5eTnFFZlind8PW2
         kgfJNT18vTn49EuqXMhUHm7hOmOdBtP+UZM+EovRkOPRhzNgaBS23gM85mJaV9H4nqK5
         rRshhwLUe0bmFEnFr/1s2RTGib28zSRXcV7I8ME90huceu1POGpXDUhcRGTE0APB4Rsv
         8q4XDHhqJXyMhPORFAUjk2XaxIvLIkKvRvQh82v3ct7nBc/pSdmZqcrFuaktScS5XYLB
         OL5hkIz4YWp74Nf4u4WzUZ5/Bh+7BxGwLDpnJR2b0wTyQrVGC0rix4o/U+fdYfH45A0d
         V8Uw==
X-Gm-Message-State: AOAM531GTQ/hKzbX6S3PCg2z8QzDeQqDNj89+lVJryqlLBQkVYvCNmnl
	AfWjAfGNPXvChx9AzpF7TEo=
X-Google-Smtp-Source: ABdhPJzYO2gb06syFIc8TRb0WdtWjgdYrAposyrJYvIapzWbj5+wwbunnqa50xyfLwrcULPoYggIGA==
X-Received: by 2002:a17:907:7f21:b0:6e0:355f:805e with SMTP id qf33-20020a1709077f2100b006e0355f805emr18792587ejc.752.1648313940656;
        Sat, 26 Mar 2022 09:59:00 -0700 (PDT)
From: Bernhard Beschow <shentey@gmail.com>
To: qemu-devel@nongnu.org
Cc: qemu-trivial@nongnu.org,
	Bernhard Beschow <shentey@gmail.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Anthony Perard <anthony.perard@citrix.com>,
	Paul Durrant <paul@xen.org>,
	xen-devel@lists.xenproject.org (open list:X86 Xen CPUs)
Subject: [PATCH 2/2] hw/xen/xen_pt: Resolve igd_passthrough_isa_bridge_create() indirection
Date: Sat, 26 Mar 2022 17:58:24 +0100
Message-Id: <20220326165825.30794-3-shentey@gmail.com>
X-Mailer: git-send-email 2.35.1
In-Reply-To: <20220326165825.30794-1-shentey@gmail.com>
References: <20220326165825.30794-1-shentey@gmail.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Now that igd_passthrough_isa_bridge_create() is implemented within the
xen context it may use Xen* data types directly and become
xen_igd_passthrough_isa_bridge_create(). This resolves an indirection.

Signed-off-by: Bernhard Beschow <shentey@gmail.com>
---
 hw/xen/xen_pt.c          | 11 -----------
 hw/xen/xen_pt.h          |  3 ++-
 hw/xen/xen_pt_graphics.c |  5 ++++-
 3 files changed, 6 insertions(+), 13 deletions(-)

diff --git a/hw/xen/xen_pt.c b/hw/xen/xen_pt.c
index 829ea9985f..0ec7e52183 100644
--- a/hw/xen/xen_pt.c
+++ b/hw/xen/xen_pt.c
@@ -701,17 +701,6 @@ static const MemoryListener xen_pt_io_listener = {
     .priority = 10,
 };
 
-static void
-xen_igd_passthrough_isa_bridge_create(XenPCIPassthroughState *s,
-                                      XenHostPCIDevice *dev)
-{
-    uint16_t gpu_dev_id;
-    PCIDevice *d = &s->dev;
-
-    gpu_dev_id = dev->device_id;
-    igd_passthrough_isa_bridge_create(pci_get_bus(d), gpu_dev_id);
-}
-
 /* destroy. */
 static void xen_pt_destroy(PCIDevice *d) {
 
diff --git a/hw/xen/xen_pt.h b/hw/xen/xen_pt.h
index 806d832c94..e7c4316a7d 100644
--- a/hw/xen/xen_pt.h
+++ b/hw/xen/xen_pt.h
@@ -43,7 +43,8 @@ OBJECT_DECLARE_SIMPLE_TYPE(XenPCIPassthroughState, XEN_PT_DEVICE)
 
 uint32_t igd_read_opregion(XenPCIPassthroughState *s);
 void igd_write_opregion(XenPCIPassthroughState *s, uint32_t val);
-void igd_passthrough_isa_bridge_create(PCIBus *bus, uint16_t gpu_dev_id);
+void xen_igd_passthrough_isa_bridge_create(XenPCIPassthroughState *s,
+                                           XenHostPCIDevice *dev);
 
 /* function type for config reg */
 typedef int (*xen_pt_conf_reg_init)
diff --git a/hw/xen/xen_pt_graphics.c b/hw/xen/xen_pt_graphics.c
index f1fbb98912..f303f67c9c 100644
--- a/hw/xen/xen_pt_graphics.c
+++ b/hw/xen/xen_pt_graphics.c
@@ -375,10 +375,13 @@ static void pt_graphics_register_types(void)
 }
 type_init(pt_graphics_register_types)
 
-void igd_passthrough_isa_bridge_create(PCIBus *bus, uint16_t gpu_dev_id)
+void xen_igd_passthrough_isa_bridge_create(XenPCIPassthroughState *s,
+                                           XenHostPCIDevice *dev)
 {
+    PCIBus *bus = pci_get_bus(&s->dev);
     struct PCIDevice *bridge_dev;
     int i, num;
+    const uint16_t gpu_dev_id = dev->device_id;
     uint16_t pch_dev_id = 0xffff;
     uint8_t pch_rev_id = 0;
 
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Sun Mar 27 12:00:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 27 Mar 2022 12:00:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295071.502174 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYRZ8-0007Ld-Es; Sun, 27 Mar 2022 12:00:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295071.502174; Sun, 27 Mar 2022 12:00:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYRZ8-0007LW-Bt; Sun, 27 Mar 2022 12:00:14 +0000
Received: by outflank-mailman (input) for mailman id 295071;
 Sat, 26 Mar 2022 16:59:01 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=HfZe=UF=gmail.com=shentey@srs-se1.protection.inumbo.net>)
 id 1nY9kj-0006RZ-JU
 for xen-devel@lists.xenproject.org; Sat, 26 Mar 2022 16:59:01 +0000
Received: from mail-ed1-x52c.google.com (mail-ed1-x52c.google.com
 [2a00:1450:4864:20::52c])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 081938c4-ad26-11ec-8fbc-03012f2f19d4;
 Sat, 26 Mar 2022 17:59:00 +0100 (CET)
Received: by mail-ed1-x52c.google.com with SMTP id x34so12417778ede.8
 for <xen-devel@lists.xenproject.org>; Sat, 26 Mar 2022 09:59:00 -0700 (PDT)
Received: from localhost.localdomain
 (dynamic-089-012-231-111.89.12.pool.telefonica.de. [89.12.231.111])
 by smtp.gmail.com with ESMTPSA id
 x12-20020a50d9cc000000b0040f70fe78f3sm4515930edj.36.2022.03.26.09.58.58
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Sat, 26 Mar 2022 09:58:59 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 081938c4-ad26-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:in-reply-to:references
         :mime-version:content-transfer-encoding;
        bh=C41s8dXYetIXRFUN79C7BELr5tThcFLwr+w3sJfI9HA=;
        b=GMLKj7Zbq/beiCnU/2Xo968GQ5Cv5ktuGHq/3BWJxE6ljArddc1wpG4isEeCjDkbMQ
         1/ukK8Bvz7Qdxa7nXdTzuI+UxeXuBS6yHl+MrX9jMCLsOuYSShdho9k5xZUh23a1s2pX
         LyoE70ECd01RrPOEAuG3X74rp1bHJA+5JRqrWqPbCDY8FmoliQ9ZOYNktTJqv1qbBuSP
         ivxP1WzBJoSIFA8rvj3ujiBpUNkWxzgprBSKnPN8+mpXepNcTMGH1hVHUkIAtkWgLDdv
         2Xh/HODwnSz+ufrafHl+u51VqQe5CNjHm1pztZRjK5ptA9iE/3xeq86HogrNnUydCqn7
         qp0w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to
         :references:mime-version:content-transfer-encoding;
        bh=C41s8dXYetIXRFUN79C7BELr5tThcFLwr+w3sJfI9HA=;
        b=N4uyxBDHsmpRv1GGrQny8cWhVaO0bz5GjDqfi7XBFI8Tw+Tgn1690ZEi8piYlxnwoi
         dh7LYjTFDk2gWDlZDnZobDE1vFQCyIVboRKvcwAMwaiGw4KabwX3+Lxh3cn9Y1p3eyu/
         sl4ePlbAE9FmlGjYzxeo3KV4m7/57tHU/PRYw5KitlUpn/h3pZmO/NcCREKlxfl/V39o
         O/LJhZJg203GOI4fxOGlcgkprk2W5wWGdgQ0Ii/3hg3k22b7ufwxeNC1RDvnGgf2lVxG
         PMr8hc2N4F9oEh15oX5HPdfQN8gjhlpj6EEiays9lEcFVxbgejok+9ERVynxOKNJQiPo
         hjhQ==
X-Gm-Message-State: AOAM530lEr1DOXq3+NTT8/c5/NiT/IYJ4mq7qfrPCI5w62r2BdxiZbUh
	XBPnNAHn/zTmWEcLF51ubuI=
X-Google-Smtp-Source: ABdhPJy6Aqj5FTWdQ+G+AWgjELFEvqpgoJbqa2BpHLgNArFWAXPcO5a+isreLt8QnClISXqIMadRyA==
X-Received: by 2002:a50:9fa5:0:b0:418:e7c4:cf96 with SMTP id c34-20020a509fa5000000b00418e7c4cf96mr5612764edf.30.1648313939404;
        Sat, 26 Mar 2022 09:58:59 -0700 (PDT)
From: Bernhard Beschow <shentey@gmail.com>
To: qemu-devel@nongnu.org
Cc: qemu-trivial@nongnu.org,
	Bernhard Beschow <shentey@gmail.com>,
	"Michael S. Tsirkin" <mst@redhat.com>,
	Marcel Apfelbaum <marcel.apfelbaum@gmail.com>,
	Paolo Bonzini <pbonzini@redhat.com>,
	Richard Henderson <richard.henderson@linaro.org>,
	Eduardo Habkost <eduardo@habkost.net>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Anthony Perard <anthony.perard@citrix.com>,
	Paul Durrant <paul@xen.org>,
	xen-devel@lists.xenproject.org (open list:X86 Xen CPUs)
Subject: [PATCH 1/2] hw/xen/xen_pt: Confine igd-passthrough-isa-bridge to XEN
Date: Sat, 26 Mar 2022 17:58:23 +0100
Message-Id: <20220326165825.30794-2-shentey@gmail.com>
X-Mailer: git-send-email 2.35.1
In-Reply-To: <20220326165825.30794-1-shentey@gmail.com>
References: <20220326165825.30794-1-shentey@gmail.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

igd-passthrough-isa-bridge is only requested in xen_pt but was
implemented in pc_piix.c. This caused xen_pt to dependend on i386/pc
which is hereby resolved.

Signed-off-by: Bernhard Beschow <shentey@gmail.com>
---
 hw/i386/pc_piix.c        | 118 --------------------------------------
 hw/xen/xen_pt.c          |   1 -
 hw/xen/xen_pt.h          |   1 +
 hw/xen/xen_pt_graphics.c | 119 +++++++++++++++++++++++++++++++++++++++
 include/hw/i386/pc.h     |   1 -
 5 files changed, 120 insertions(+), 120 deletions(-)

diff --git a/hw/i386/pc_piix.c b/hw/i386/pc_piix.c
index b72c03d0a6..6ad5c02f07 100644
--- a/hw/i386/pc_piix.c
+++ b/hw/i386/pc_piix.c
@@ -801,124 +801,6 @@ static void pc_i440fx_1_4_machine_options(MachineClass *m)
 DEFINE_I440FX_MACHINE(v1_4, "pc-i440fx-1.4", pc_compat_1_4_fn,
                       pc_i440fx_1_4_machine_options);
 
-typedef struct {
-    uint16_t gpu_device_id;
-    uint16_t pch_device_id;
-    uint8_t pch_revision_id;
-} IGDDeviceIDInfo;
-
-/* In real world different GPU should have different PCH. But actually
- * the different PCH DIDs likely map to different PCH SKUs. We do the
- * same thing for the GPU. For PCH, the different SKUs are going to be
- * all the same silicon design and implementation, just different
- * features turn on and off with fuses. The SW interfaces should be
- * consistent across all SKUs in a given family (eg LPT). But just same
- * features may not be supported.
- *
- * Most of these different PCH features probably don't matter to the
- * Gfx driver, but obviously any difference in display port connections
- * will so it should be fine with any PCH in case of passthrough.
- *
- * So currently use one PCH version, 0x8c4e, to cover all HSW(Haswell)
- * scenarios, 0x9cc3 for BDW(Broadwell).
- */
-static const IGDDeviceIDInfo igd_combo_id_infos[] = {
-    /* HSW Classic */
-    {0x0402, 0x8c4e, 0x04}, /* HSWGT1D, HSWD_w7 */
-    {0x0406, 0x8c4e, 0x04}, /* HSWGT1M, HSWM_w7 */
-    {0x0412, 0x8c4e, 0x04}, /* HSWGT2D, HSWD_w7 */
-    {0x0416, 0x8c4e, 0x04}, /* HSWGT2M, HSWM_w7 */
-    {0x041E, 0x8c4e, 0x04}, /* HSWGT15D, HSWD_w7 */
-    /* HSW ULT */
-    {0x0A06, 0x8c4e, 0x04}, /* HSWGT1UT, HSWM_w7 */
-    {0x0A16, 0x8c4e, 0x04}, /* HSWGT2UT, HSWM_w7 */
-    {0x0A26, 0x8c4e, 0x06}, /* HSWGT3UT, HSWM_w7 */
-    {0x0A2E, 0x8c4e, 0x04}, /* HSWGT3UT28W, HSWM_w7 */
-    {0x0A1E, 0x8c4e, 0x04}, /* HSWGT2UX, HSWM_w7 */
-    {0x0A0E, 0x8c4e, 0x04}, /* HSWGT1ULX, HSWM_w7 */
-    /* HSW CRW */
-    {0x0D26, 0x8c4e, 0x04}, /* HSWGT3CW, HSWM_w7 */
-    {0x0D22, 0x8c4e, 0x04}, /* HSWGT3CWDT, HSWD_w7 */
-    /* HSW Server */
-    {0x041A, 0x8c4e, 0x04}, /* HSWSVGT2, HSWD_w7 */
-    /* HSW SRVR */
-    {0x040A, 0x8c4e, 0x04}, /* HSWSVGT1, HSWD_w7 */
-    /* BSW */
-    {0x1606, 0x9cc3, 0x03}, /* BDWULTGT1, BDWM_w7 */
-    {0x1616, 0x9cc3, 0x03}, /* BDWULTGT2, BDWM_w7 */
-    {0x1626, 0x9cc3, 0x03}, /* BDWULTGT3, BDWM_w7 */
-    {0x160E, 0x9cc3, 0x03}, /* BDWULXGT1, BDWM_w7 */
-    {0x161E, 0x9cc3, 0x03}, /* BDWULXGT2, BDWM_w7 */
-    {0x1602, 0x9cc3, 0x03}, /* BDWHALOGT1, BDWM_w7 */
-    {0x1612, 0x9cc3, 0x03}, /* BDWHALOGT2, BDWM_w7 */
-    {0x1622, 0x9cc3, 0x03}, /* BDWHALOGT3, BDWM_w7 */
-    {0x162B, 0x9cc3, 0x03}, /* BDWHALO28W, BDWM_w7 */
-    {0x162A, 0x9cc3, 0x03}, /* BDWGT3WRKS, BDWM_w7 */
-    {0x162D, 0x9cc3, 0x03}, /* BDWGT3SRVR, BDWM_w7 */
-};
-
-static void isa_bridge_class_init(ObjectClass *klass, void *data)
-{
-    DeviceClass *dc = DEVICE_CLASS(klass);
-    PCIDeviceClass *k = PCI_DEVICE_CLASS(klass);
-
-    dc->desc        = "ISA bridge faked to support IGD PT";
-    set_bit(DEVICE_CATEGORY_BRIDGE, dc->categories);
-    k->vendor_id    = PCI_VENDOR_ID_INTEL;
-    k->class_id     = PCI_CLASS_BRIDGE_ISA;
-};
-
-static const TypeInfo isa_bridge_info = {
-    .name          = "igd-passthrough-isa-bridge",
-    .parent        = TYPE_PCI_DEVICE,
-    .instance_size = sizeof(PCIDevice),
-    .class_init = isa_bridge_class_init,
-    .interfaces = (InterfaceInfo[]) {
-        { INTERFACE_CONVENTIONAL_PCI_DEVICE },
-        { },
-    },
-};
-
-static void pt_graphics_register_types(void)
-{
-    type_register_static(&isa_bridge_info);
-}
-type_init(pt_graphics_register_types)
-
-void igd_passthrough_isa_bridge_create(PCIBus *bus, uint16_t gpu_dev_id)
-{
-    struct PCIDevice *bridge_dev;
-    int i, num;
-    uint16_t pch_dev_id = 0xffff;
-    uint8_t pch_rev_id = 0;
-
-    num = ARRAY_SIZE(igd_combo_id_infos);
-    for (i = 0; i < num; i++) {
-        if (gpu_dev_id == igd_combo_id_infos[i].gpu_device_id) {
-            pch_dev_id = igd_combo_id_infos[i].pch_device_id;
-            pch_rev_id = igd_combo_id_infos[i].pch_revision_id;
-        }
-    }
-
-    if (pch_dev_id == 0xffff) {
-        return;
-    }
-
-    /* Currently IGD drivers always need to access PCH by 1f.0. */
-    bridge_dev = pci_create_simple(bus, PCI_DEVFN(0x1f, 0),
-                                   "igd-passthrough-isa-bridge");
-
-    /*
-     * Note that vendor id is always PCI_VENDOR_ID_INTEL.
-     */
-    if (!bridge_dev) {
-        fprintf(stderr, "set igd-passthrough-isa-bridge failed!\n");
-        return;
-    }
-    pci_config_set_device_id(bridge_dev->config, pch_dev_id);
-    pci_config_set_revision(bridge_dev->config, pch_rev_id);
-}
-
 #ifdef CONFIG_ISAPC
 static void isapc_machine_options(MachineClass *m)
 {
diff --git a/hw/xen/xen_pt.c b/hw/xen/xen_pt.c
index 027190fa44..829ea9985f 100644
--- a/hw/xen/xen_pt.c
+++ b/hw/xen/xen_pt.c
@@ -60,7 +60,6 @@
 #include "hw/qdev-properties.h"
 #include "hw/qdev-properties-system.h"
 #include "hw/xen/xen.h"
-#include "hw/i386/pc.h"
 #include "hw/xen/xen-legacy-backend.h"
 #include "xen_pt.h"
 #include "qemu/range.h"
diff --git a/hw/xen/xen_pt.h b/hw/xen/xen_pt.h
index 6b8e13cdee..806d832c94 100644
--- a/hw/xen/xen_pt.h
+++ b/hw/xen/xen_pt.h
@@ -43,6 +43,7 @@ OBJECT_DECLARE_SIMPLE_TYPE(XenPCIPassthroughState, XEN_PT_DEVICE)
 
 uint32_t igd_read_opregion(XenPCIPassthroughState *s);
 void igd_write_opregion(XenPCIPassthroughState *s, uint32_t val);
+void igd_passthrough_isa_bridge_create(PCIBus *bus, uint16_t gpu_dev_id);
 
 /* function type for config reg */
 typedef int (*xen_pt_conf_reg_init)
diff --git a/hw/xen/xen_pt_graphics.c b/hw/xen/xen_pt_graphics.c
index a3bc7e3921..f1fbb98912 100644
--- a/hw/xen/xen_pt_graphics.c
+++ b/hw/xen/xen_pt_graphics.c
@@ -289,3 +289,122 @@ void igd_write_opregion(XenPCIPassthroughState *s, uint32_t val)
                     (unsigned long)(igd_host_opregion >> XC_PAGE_SHIFT),
                     (unsigned long)(igd_guest_opregion >> XC_PAGE_SHIFT));
 }
+
+typedef struct {
+    uint16_t gpu_device_id;
+    uint16_t pch_device_id;
+    uint8_t pch_revision_id;
+} IGDDeviceIDInfo;
+
+/*
+ * In real world different GPU should have different PCH. But actually
+ * the different PCH DIDs likely map to different PCH SKUs. We do the
+ * same thing for the GPU. For PCH, the different SKUs are going to be
+ * all the same silicon design and implementation, just different
+ * features turn on and off with fuses. The SW interfaces should be
+ * consistent across all SKUs in a given family (eg LPT). But just same
+ * features may not be supported.
+ *
+ * Most of these different PCH features probably don't matter to the
+ * Gfx driver, but obviously any difference in display port connections
+ * will so it should be fine with any PCH in case of passthrough.
+ *
+ * So currently use one PCH version, 0x8c4e, to cover all HSW(Haswell)
+ * scenarios, 0x9cc3 for BDW(Broadwell).
+ */
+static const IGDDeviceIDInfo igd_combo_id_infos[] = {
+    /* HSW Classic */
+    {0x0402, 0x8c4e, 0x04}, /* HSWGT1D, HSWD_w7 */
+    {0x0406, 0x8c4e, 0x04}, /* HSWGT1M, HSWM_w7 */
+    {0x0412, 0x8c4e, 0x04}, /* HSWGT2D, HSWD_w7 */
+    {0x0416, 0x8c4e, 0x04}, /* HSWGT2M, HSWM_w7 */
+    {0x041E, 0x8c4e, 0x04}, /* HSWGT15D, HSWD_w7 */
+    /* HSW ULT */
+    {0x0A06, 0x8c4e, 0x04}, /* HSWGT1UT, HSWM_w7 */
+    {0x0A16, 0x8c4e, 0x04}, /* HSWGT2UT, HSWM_w7 */
+    {0x0A26, 0x8c4e, 0x06}, /* HSWGT3UT, HSWM_w7 */
+    {0x0A2E, 0x8c4e, 0x04}, /* HSWGT3UT28W, HSWM_w7 */
+    {0x0A1E, 0x8c4e, 0x04}, /* HSWGT2UX, HSWM_w7 */
+    {0x0A0E, 0x8c4e, 0x04}, /* HSWGT1ULX, HSWM_w7 */
+    /* HSW CRW */
+    {0x0D26, 0x8c4e, 0x04}, /* HSWGT3CW, HSWM_w7 */
+    {0x0D22, 0x8c4e, 0x04}, /* HSWGT3CWDT, HSWD_w7 */
+    /* HSW Server */
+    {0x041A, 0x8c4e, 0x04}, /* HSWSVGT2, HSWD_w7 */
+    /* HSW SRVR */
+    {0x040A, 0x8c4e, 0x04}, /* HSWSVGT1, HSWD_w7 */
+    /* BSW */
+    {0x1606, 0x9cc3, 0x03}, /* BDWULTGT1, BDWM_w7 */
+    {0x1616, 0x9cc3, 0x03}, /* BDWULTGT2, BDWM_w7 */
+    {0x1626, 0x9cc3, 0x03}, /* BDWULTGT3, BDWM_w7 */
+    {0x160E, 0x9cc3, 0x03}, /* BDWULXGT1, BDWM_w7 */
+    {0x161E, 0x9cc3, 0x03}, /* BDWULXGT2, BDWM_w7 */
+    {0x1602, 0x9cc3, 0x03}, /* BDWHALOGT1, BDWM_w7 */
+    {0x1612, 0x9cc3, 0x03}, /* BDWHALOGT2, BDWM_w7 */
+    {0x1622, 0x9cc3, 0x03}, /* BDWHALOGT3, BDWM_w7 */
+    {0x162B, 0x9cc3, 0x03}, /* BDWHALO28W, BDWM_w7 */
+    {0x162A, 0x9cc3, 0x03}, /* BDWGT3WRKS, BDWM_w7 */
+    {0x162D, 0x9cc3, 0x03}, /* BDWGT3SRVR, BDWM_w7 */
+};
+
+static void isa_bridge_class_init(ObjectClass *klass, void *data)
+{
+    DeviceClass *dc = DEVICE_CLASS(klass);
+    PCIDeviceClass *k = PCI_DEVICE_CLASS(klass);
+
+    dc->desc        = "ISA bridge faked to support IGD PT";
+    set_bit(DEVICE_CATEGORY_BRIDGE, dc->categories);
+    k->vendor_id    = PCI_VENDOR_ID_INTEL;
+    k->class_id     = PCI_CLASS_BRIDGE_ISA;
+};
+
+static const TypeInfo isa_bridge_info = {
+    .name          = "igd-passthrough-isa-bridge",
+    .parent        = TYPE_PCI_DEVICE,
+    .instance_size = sizeof(PCIDevice),
+    .class_init = isa_bridge_class_init,
+    .interfaces = (InterfaceInfo[]) {
+        { INTERFACE_CONVENTIONAL_PCI_DEVICE },
+        { },
+    },
+};
+
+static void pt_graphics_register_types(void)
+{
+    type_register_static(&isa_bridge_info);
+}
+type_init(pt_graphics_register_types)
+
+void igd_passthrough_isa_bridge_create(PCIBus *bus, uint16_t gpu_dev_id)
+{
+    struct PCIDevice *bridge_dev;
+    int i, num;
+    uint16_t pch_dev_id = 0xffff;
+    uint8_t pch_rev_id = 0;
+
+    num = ARRAY_SIZE(igd_combo_id_infos);
+    for (i = 0; i < num; i++) {
+        if (gpu_dev_id == igd_combo_id_infos[i].gpu_device_id) {
+            pch_dev_id = igd_combo_id_infos[i].pch_device_id;
+            pch_rev_id = igd_combo_id_infos[i].pch_revision_id;
+        }
+    }
+
+    if (pch_dev_id == 0xffff) {
+        return;
+    }
+
+    /* Currently IGD drivers always need to access PCH by 1f.0. */
+    bridge_dev = pci_create_simple(bus, PCI_DEVFN(0x1f, 0),
+                                   "igd-passthrough-isa-bridge");
+
+    /*
+     * Note that vendor id is always PCI_VENDOR_ID_INTEL.
+     */
+    if (!bridge_dev) {
+        fprintf(stderr, "set igd-passthrough-isa-bridge failed!\n");
+        return;
+    }
+    pci_config_set_device_id(bridge_dev->config, pch_dev_id);
+    pci_config_set_revision(bridge_dev->config, pch_rev_id);
+}
diff --git a/include/hw/i386/pc.h b/include/hw/i386/pc.h
index 1a27de9c8b..926a507a0c 100644
--- a/include/hw/i386/pc.h
+++ b/include/hw/i386/pc.h
@@ -312,5 +312,4 @@ extern const size_t pc_compat_1_4_len;
     } \
     type_init(pc_machine_init_##suffix)
 
-extern void igd_passthrough_isa_bridge_create(PCIBus *bus, uint16_t gpu_dev_id);
 #endif
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Sun Mar 27 12:57:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 27 Mar 2022 12:57:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295168.502209 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYSSa-0004jE-1g; Sun, 27 Mar 2022 12:57:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295168.502209; Sun, 27 Mar 2022 12:57:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYSSZ-0004j7-Uu; Sun, 27 Mar 2022 12:57:31 +0000
Received: by outflank-mailman (input) for mailman id 295168;
 Sun, 27 Mar 2022 12:57:30 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYSSY-0004ix-1L; Sun, 27 Mar 2022 12:57:30 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYSSX-0001xr-Ob; Sun, 27 Mar 2022 12:57:29 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYSSX-0003QR-FZ; Sun, 27 Mar 2022 12:57:29 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nYSSX-0001SJ-F3; Sun, 27 Mar 2022 12:57:29 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=BIdWirETFVJPsND7NcyImcLfgDrQCHQrXztJ8TV/1q4=; b=Z2o5rBzOhnsx38r8SEXGA6y6qr
	cvouSWbVHs9RpahpAAVV6CgMjCmc4qOKCp2DZHcWEOOyhxlJ5rdCrpKnIUFD1t/93bNJXq7fvJs+m
	IfLGHM6T9l7ZyJVtDnVTRfyIRZ4doX7iOEeEpQQ/uLdCZByBYhFeK3QrSEjln+3+9WdI=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168866-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168866: trouble: broken/pass/starved
X-Osstest-Failures:
    linux-linus:test-amd64-coresched-amd64-xl:<job status>:broken:regression
    linux-linus:test-amd64-amd64-xl-xsm:<job status>:broken:regression
    linux-linus:test-amd64-amd64-xl-vhd:<job status>:broken:regression
    linux-linus:test-amd64-amd64-xl-shadow:<job status>:broken:regression
    linux-linus:test-amd64-amd64-xl-rtds:<job status>:broken:regression
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:<job status>:broken:regression
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:<job status>:broken:regression
    linux-linus:test-amd64-amd64-xl-qemuu-ovmf-amd64:<job status>:broken:regression
    linux-linus:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:<job status>:broken:regression
    linux-linus:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:<job status>:broken:regression
    linux-linus:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:<job status>:broken:regression
    linux-linus:test-amd64-amd64-xl-qemuu-debianhvm-amd64:<job status>:broken:regression
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:<job status>:broken:regression
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:<job status>:broken:regression
    linux-linus:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:<job status>:broken:regression
    linux-linus:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:<job status>:broken:regression
    linux-linus:test-amd64-amd64-xl-qemut-debianhvm-amd64:<job status>:broken:regression
    linux-linus:test-amd64-amd64-dom0pvh-xl-amd:<job status>:broken:regression
    linux-linus:test-amd64-amd64-xl-pvhv2-amd:<job status>:broken:regression
    linux-linus:test-amd64-amd64-xl-credit2:<job status>:broken:regression
    linux-linus:test-amd64-amd64-libvirt:<job status>:broken:regression
    linux-linus:test-amd64-amd64-libvirt-pair:<job status>:broken:regression
    linux-linus:test-amd64-amd64-xl-credit1:<job status>:broken:regression
    linux-linus:test-amd64-amd64-libvirt-qcow2:<job status>:broken:regression
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:<job status>:broken:regression
    linux-linus:test-amd64-amd64-xl:<job status>:broken:regression
    linux-linus:test-amd64-amd64-libvirt-raw:<job status>:broken:regression
    linux-linus:test-amd64-amd64-libvirt-xsm:<job status>:broken:regression
    linux-linus:test-amd64-amd64-qemuu-nested-amd:<job status>:broken:regression
    linux-linus:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-xl-vhd:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-libvirt-raw:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-libvirt:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-dom0pvh-xl-amd:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-xl-credit1:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-xl-qemut-debianhvm-amd64:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-xl:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-xl-qemuu-debianhvm-amd64:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-libvirt-qcow2:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-libvirt-pair:host-install/src_host(6):broken:regression
    linux-linus:test-amd64-amd64-libvirt-pair:host-install/dst_host(7):broken:regression
    linux-linus:test-amd64-amd64-qemuu-nested-amd:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-xl-qemuu-ovmf-amd64:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-xl-pvhv2-amd:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-xl-xsm:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-xl-shadow:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-libvirt-xsm:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-xl-credit2:host-install(5):broken:regression
    linux-linus:test-amd64-coresched-amd64-xl:host-install(5):broken:regression
    linux-linus:test-amd64-amd64-xl-rtds:host-install(5):broken:allowable
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-pair:hosts-allocate:starved:nonblocking
X-Osstest-Versions-This:
    linux=50560ce6a0bdab2fc37384c52aa02c7043909d2c
X-Osstest-Versions-That:
    linux=34af78c4e616c359ed428d79fe4758a35d2c5473
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 27 Mar 2022 12:57:29 +0000

flight 168866 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168866/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-coresched-amd64-xl    <job status>                 broken
 test-amd64-amd64-xl-xsm         <job status>                 broken
 test-amd64-amd64-xl-vhd         <job status>                 broken
 test-amd64-amd64-xl-shadow      <job status>                 broken
 test-amd64-amd64-xl-rtds        <job status>                 broken
 test-amd64-amd64-xl-qemuu-ws16-amd64    <job status>                 broken
 test-amd64-amd64-xl-qemuu-win7-amd64    <job status>                 broken
 test-amd64-amd64-xl-qemuu-ovmf-amd64    <job status>                 broken
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict    <job status>   broken
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm    <job status>            broken
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow    <job status>        broken
 test-amd64-amd64-xl-qemuu-debianhvm-amd64    <job status>               broken
 test-amd64-amd64-xl-qemut-ws16-amd64    <job status>                 broken
 test-amd64-amd64-xl-qemut-win7-amd64    <job status>                 broken
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm    <job status>   broken
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm    <job status>            broken
 test-amd64-amd64-xl-qemut-debianhvm-amd64    <job status>               broken
 test-amd64-amd64-dom0pvh-xl-amd    <job status>                 broken
 test-amd64-amd64-xl-pvhv2-amd    <job status>                 broken
 test-amd64-amd64-xl-credit2     <job status>                 broken
 test-amd64-amd64-libvirt        <job status>                 broken
 test-amd64-amd64-libvirt-pair    <job status>                 broken
 test-amd64-amd64-xl-credit1     <job status>                 broken
 test-amd64-amd64-libvirt-qcow2    <job status>                 broken
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm    <job status>      broken
 test-amd64-amd64-xl             <job status>                 broken
 test-amd64-amd64-libvirt-raw    <job status>                 broken
 test-amd64-amd64-libvirt-xsm    <job status>                 broken
 test-amd64-amd64-qemuu-nested-amd    <job status>                 broken
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 5 host-install(5) broken REGR. vs. 168838
 test-amd64-amd64-xl-vhd       5 host-install(5)        broken REGR. vs. 168838
 test-amd64-amd64-xl-qemuu-ws16-amd64 5 host-install(5) broken REGR. vs. 168838
 test-amd64-amd64-libvirt-raw  5 host-install(5)        broken REGR. vs. 168838
 test-amd64-amd64-libvirt      5 host-install(5)        broken REGR. vs. 168838
 test-amd64-amd64-dom0pvh-xl-amd  5 host-install(5)     broken REGR. vs. 168838
 test-amd64-amd64-xl-credit1   5 host-install(5)        broken REGR. vs. 168838
 test-amd64-amd64-xl-qemut-debianhvm-amd64 5 host-install(5) broken REGR. vs. 168838
 test-amd64-amd64-xl           5 host-install(5)        broken REGR. vs. 168838
 test-amd64-amd64-xl-qemuu-debianhvm-amd64 5 host-install(5) broken REGR. vs. 168838
 test-amd64-amd64-libvirt-qcow2  5 host-install(5)      broken REGR. vs. 168838
 test-amd64-amd64-libvirt-pair 6 host-install/src_host(6) broken REGR. vs. 168838
 test-amd64-amd64-libvirt-pair 7 host-install/dst_host(7) broken REGR. vs. 168838
 test-amd64-amd64-qemuu-nested-amd  5 host-install(5)   broken REGR. vs. 168838
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow 5 host-install(5) broken REGR. vs. 168838
 test-amd64-amd64-xl-qemuu-ovmf-amd64 5 host-install(5) broken REGR. vs. 168838
 test-amd64-amd64-xl-pvhv2-amd  5 host-install(5)       broken REGR. vs. 168838
 test-amd64-amd64-xl-qemut-ws16-amd64 5 host-install(5) broken REGR. vs. 168838
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm 5 host-install(5) broken REGR. vs. 168838
 test-amd64-amd64-xl-xsm       5 host-install(5)        broken REGR. vs. 168838
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm 5 host-install(5) broken REGR. vs. 168838
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 5 host-install(5) broken REGR. vs. 168838
 test-amd64-amd64-xl-shadow    5 host-install(5)        broken REGR. vs. 168838
 test-amd64-amd64-xl-qemuu-win7-amd64 5 host-install(5) broken REGR. vs. 168838
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 5 host-install(5) broken REGR. vs. 168838
 test-amd64-amd64-xl-qemut-win7-amd64 5 host-install(5) broken REGR. vs. 168838
 test-amd64-amd64-libvirt-xsm  5 host-install(5)        broken REGR. vs. 168838
 test-amd64-amd64-xl-credit2   5 host-install(5)        broken REGR. vs. 168838
 test-amd64-coresched-amd64-xl  5 host-install(5)       broken REGR. vs. 168838

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-rtds      5 host-install(5)        broken REGR. vs. 168838

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168838
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168838
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168838
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-amd64-amd64-pair         4 hosts-allocate               starved  n/a

version targeted for testing:
 linux                50560ce6a0bdab2fc37384c52aa02c7043909d2c
baseline version:
 linux                34af78c4e616c359ed428d79fe4758a35d2c5473

Last test of basis   168838  2022-03-25 06:20:14 Z    2 days
Testing same since   168866  2022-03-25 20:12:03 Z    1 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Alexander Gordeev <agordeev@linux.ibm.com>
  Alexander Lobakin <alobakin@pm.me>
  Alexandre Belloni <alexandre.belloni@bootlin.com>
  Alexey Kardashevskiy <aik@ozlabs.ru>
  Anders Roxell <anders.roxell@linaro.org>
  Andrew Morton <akpm@linux-foundation.org>
  Andrey Konovalov <andreyknvl@google.com>
  Aneesh Kumar K.V <aneesh.kumar@linux.ibm.com>
  Anshuman Khandual <anshuman.khandual@arm.com>
  Arnd Bergmann <arnd@arndb.de>
  Athira Rajeev <atrajeev@linux.vnet.ibm.com>
  Atish Patra <atish.patra@wdc.com>
  Atish Patra <atishp@rivosinc.com>
  Atsushi Nemoto <anemo@mba.ocn.ne.jp>
  Bartosz Golaszewski <brgl@bgdev.pl>
  Bhaskar Chowdhury <unixbhaskar@gmail.com>
  Bjorn Helgaas <bhelgaas@google.com>
  Catalin Marinas <catalin.marinas@arm.com>
  Chen Jingwen <chenjingwen6@huawei.com>
  Chongxi Zhao <zhaochongxi2019@email.szu.edu.cn>
  Christoph Hellwig <hch@lst.de>
  Christophe JAILLET <christophe.jaillet@wanadoo.fr>
  Christophe Leroy <christophe.leroy@csgroup.eu>
  Conor Dooley <conor.dooley@microchip.com>
  Corentin Labbe <clabbe@baylibre.com>
  Daire McNamara <daire.mcnamara@microchip.com>
  Dan Carpenter <dan.carpenter@oracle.com>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  David Hildenbrand <david@redhat.com>
  David Rientjes <rientjes@google.com>
  David Sterba <dsterba@suse.com>
  Eric Lin <eric.lin@sifive.com>
  Fabiano Rosas <farosas@linux.ibm.com>
  Feiyang Chen <chenfeiyang@loongson.cn>
  Feiyang Chen <chris.chenfeiyang@gmail.com>
  Ganesh Goudar <ganeshgr@linux.ibm.com>
  Geert Uytterhoeven <geert@linux-m68k.org>
  Geoff Levand <geoff@infradead.org>
  Guenter Roeck <linux@roeck-us.net>
  Guo Zhengkui <guozhengkui@vivo.com>
  Halil Pasic <pasic@linux.ibm.com>
  Hangyu Hua <hbh25y@gmail.com>
  Harald Freudenberger <freude@linux.ibm.com>
  Haren Myneni <haren@linux.ibm.com>
  Hari Bathini <hbathini@linux.ibm.com>
  Heiko Carstens <hca@linux.ibm.com>
  Heiko Stuebner <heiko@sntech.de>
  Helge Deller <deller@gmx.de>
  Hugh Dickins <hughd@google.com>
  Igor Zhbanov <i.zhbanov@omprussia.ru>
  Ilya Leoshkevich <iii@linux.ibm.com>
  Jakob Koschel <jakobkoschel@gmail.com>
  Jani Nikula <jani.nikula@intel.com>
  Janis Schoetterl-Glausch <scgl@linux.ibm.com>
  Janosch Frank <frankja@linux.ibm.com>
  Jason Wang <wangborong@cdjrlc.com>
  Jiajian Ye <yejiajian2018@email.szu.edu.cn>
  jing yangyang <cgel.zte@gmail.com>
  jing yangyang <jing.yangyang@zte.com.cn>
  Jisheng Zhang <jszhang@kernel.org>
  Joachim Wiberg <troglobit@gmail.com>
  Joe Lawrence <joe.lawrence@redhat.com>
  Johannes Weiner <hannes@cmpxchg.org>
  Jordan Niethe <jniethe5@gmail.com>
  Julia Lawall <Julia.Lawall@inria.fr>
  Jürgen Christ <jchrist@linux.ibm.com>
  Kajol Jain <kjain@linux.ibm.com>
  Kees Cook <keescook@chromium.org>
  Krzysztof Kozlowski <krzysztof.kozlowski@canonical.com>
  Laurent Dufour <ldufour@linux.ibm.com>
  Linus Torvalds <torvalds@linux-foundation.org>
  Maciej W. Rozycki <macro@orcam.me.uk>
  Madhavan Srinivasan <maddy@linux.ibm.com>
  Mamatha Inamdar <mamatha4@linux.vnet.ibm.com>
  Marco Elver <elver@google.com>
  Mark Rutland <mark.rutland@arm.com>
  Masahiro Yamada <masahiroy@kernel.org>
  Matthew Rosato <mjrosato@linux.ibm.com>
  Mauricio Faria de Oliveira <mfo@canonical.com>
  Max Filippov <jcmvbkbc@gmail.com>
  Maxim Kiselev <bigunclemax@gmail.com>
  Maxime Bizon <mbizon@freebox.fr>
  Mayuresh Chitale <mchitale@ventanamicro.com>
  Miaohe Lin <linmiaohe@huawei.com>
  Miaoqian Lin <linmq006@gmail.com>
  Michael Ellerman <mpe@ellerman.id.au>
  Michael Neuling <mikey@neuling.org>
  Michael T. Kloos <michael@michaelkloos.com>
  Michal Hocko <mhocko@suse.com>
  Michal Suchanek <msuchanek@suse.de>
  Mike Kravetz <mike.kravetz@oracle.com>
  Mike Rapoport <rppt@kernel.org>
  Mike Rapoport <rppt@linux.ibm.com>
  Miroslav Benes <mbenes@suse.cz>
  Nathan Chancellor <nathan@kernel.org>
  Nathan Lynch <nathanl@linux.ibm.com>
  Naveen N. Rao <naveen.n.rao@linux.vnet.ibm.com>
  Nemanja Rakovic <nemanja.rakovic@syrmia.com>
  Nicholas Piggin <npiggin@gmail.com>
  Nikita Shubin <n.shubin@yadro.com>
  Niklas Schnelle <schnelle@linux.ibm.com>
  Nour-eddine Taleb <kernel.noureddine@gmail.com>
  Palmer Dabbelt <palmer@rivosinc.com>
  Paul Cercueil <paul@crapouillou.net>
  Paul Menzel <pmenzel@molgen.mpg.de>
  Peter Collingbourne <pcc@google.com>
  Petr Mladek <pmladek@suse.com>
  Pratik R. Sampat <psampat@linux.ibm.com>
  Qinglin Pan <panqinglin2020@iscas.ac.cn>
  Rafael Aquini <aquini@redhat.com>
  Randy Dunlap <rdunlap@infradead.org>
  Rikard Falkeborn <rikard.falkeborn@gmail.com>
  Ritesh Harjani <riteshh@linux.ibm.com>
  Rob Herring <robh@kernel.org>
  Rohan McLure <rmclure@linux.ibm.com>
  Roman Gushchin <guro@fb.com>
  Sachin Sant <sachinp@linux.ibm.com>
  Scott Wood <oss@buserror.net>
  Sean Anderson <seanga2@gmail.com>
  Sedat Dilek <sedat.dilek@gmail.com>
  Sedat Dilek <sedat.dilek@gmail.com> # LLVM/Clang v13.0.0 (x86-64)
  Serge Semin <fancer.lancer@gmail.com>
  Shenghong Han <hanshenghong2019@email.szu.edu.cn>
  Shivaprasad G Bhat <sbhat@linux.ibm.com>
  Shuah Khan <skhan@linuxfoundation.org>
  Sourabh Jain <sourabhjain@linux.ibm.com>
  Stephen Boyd <sboyd@kernel.org>
  Stephen Rothwell <sfr@canb.auug.org.au>
  Sumanth Korikkar <sumanthk@linux.ibm.com>
  Sven Schnelle <svens@linux.ibm.com>
  tangmeng <tangmeng@uniontech.com>
  Thierry Reding <thierry.reding@gmail.com>
  Thierry Reding <treding@nvidia.com>
  Thomas Bogendoerfer <tsbogend@alpha.franken.de>
  Tiezhu Yang <yangtiezhu@loongson.cn>
  Tobias Huschle <huschle@linux.ibm.com>
  Tobias Waldekranz <tobias@waldekranz.com>
  Tony Krowiak <akrowiak@linux.ibm.com>
  Tsukasa OI <research_trasio@irq.a4lg.com>
  Uwe Kleine-K=F6nig <u.kleine-koenig@pengutronix.de>
  Vaibhav Jain <vaibhav@linux.ibm.com>
  Vasily Gorbik <gor@linux.ibm.com>
  Vincent Chen <vincent.chen@sifive.com>
  Vincenzo Frascino <vincenzo.frascino@arm.com>
  Vlastimil Babka <vbabka@suse.cz>
  Waiman Long <longman@redhat.com>
  Wedson Almeida Filho <wedsonaf@google.com>
  Wenli Looi <wlooi@ucalgary.ca>
  Xi Ruoyao <xry111@mengyan1223.wang>
  Yaliang Wang <Yaliang.Wang@windriver.com>
  Yinan Zhang <zhangyinan2019@email.szu.edu.cn>
  Yixuan Cao <caoyixuan2019@email.szu.edu.cn>
  Yu Zhao <yuzhao@google.com>
  YueHaibing <yuehaibing@huawei.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          broken  
 test-amd64-coresched-amd64-xl                                broken  
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           broken  
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        broken  
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 broken  
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 broken  
 test-amd64-amd64-libvirt-xsm                                 broken  
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      broken  
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            broken  
 test-amd64-amd64-xl-pvhv2-amd                                broken  
 test-amd64-amd64-dom0pvh-xl-amd                              broken  
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    broken  
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    broken  
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         broken  
 test-amd64-amd64-xl-qemut-win7-amd64                         broken  
 test-amd64-amd64-xl-qemuu-win7-amd64                         broken  
 test-amd64-amd64-xl-qemut-ws16-amd64                         broken  
 test-amd64-amd64-xl-qemuu-ws16-amd64                         broken  
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  broken  
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  broken  
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        broken  
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     broken  
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        starved 
 test-amd64-amd64-libvirt-pair                                broken  
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               broken  
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 broken  
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     broken  
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             broken  
 test-amd64-amd64-xl-shadow                                   broken  
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      broken  
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job test-amd64-coresched-amd64-xl broken
broken-job test-amd64-amd64-xl-xsm broken
broken-job test-amd64-amd64-xl-vhd broken
broken-job test-amd64-amd64-xl-shadow broken
broken-job test-amd64-amd64-xl-rtds broken
broken-job test-amd64-amd64-xl-qemuu-ws16-amd64 broken
broken-job test-amd64-amd64-xl-qemuu-win7-amd64 broken
broken-job test-amd64-amd64-xl-qemuu-ovmf-amd64 broken
broken-job test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict broken
broken-job test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm broken
broken-job test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow broken
broken-job test-amd64-amd64-xl-qemuu-debianhvm-amd64 broken
broken-job test-amd64-amd64-xl-qemut-ws16-amd64 broken
broken-job test-amd64-amd64-xl-qemut-win7-amd64 broken
broken-job test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm broken
broken-job test-amd64-amd64-xl-qemut-debianhvm-i386-xsm broken
broken-job test-amd64-amd64-xl-qemut-debianhvm-amd64 broken
broken-job test-amd64-amd64-dom0pvh-xl-amd broken
broken-job test-amd64-amd64-xl-pvhv2-amd broken
broken-job test-amd64-amd64-xl-credit2 broken
broken-job test-amd64-amd64-libvirt broken
broken-job test-amd64-amd64-libvirt-pair broken
broken-job test-amd64-amd64-xl-credit1 broken
broken-job test-amd64-amd64-libvirt-qcow2 broken
broken-job test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm broken
broken-job test-amd64-amd64-xl broken
broken-job test-amd64-amd64-libvirt-raw broken
broken-job test-amd64-amd64-libvirt-xsm broken
broken-job test-amd64-amd64-qemuu-nested-amd broken
broken-step test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm host-install(5)
broken-step test-amd64-amd64-xl-vhd host-install(5)
broken-step test-amd64-amd64-xl-qemuu-ws16-amd64 host-install(5)
broken-step test-amd64-amd64-xl-rtds host-install(5)
broken-step test-amd64-amd64-libvirt-raw host-install(5)
broken-step test-amd64-amd64-libvirt host-install(5)
broken-step test-amd64-amd64-dom0pvh-xl-amd host-install(5)
broken-step test-amd64-amd64-xl-credit1 host-install(5)
broken-step test-amd64-amd64-xl-qemut-debianhvm-amd64 host-install(5)
broken-step test-amd64-amd64-xl host-install(5)
broken-step test-amd64-amd64-xl-qemuu-debianhvm-amd64 host-install(5)
broken-step test-amd64-amd64-libvirt-qcow2 host-install(5)
broken-step test-amd64-amd64-libvirt-pair host-install/src_host(6)
broken-step test-amd64-amd64-libvirt-pair host-install/dst_host(7)
broken-step test-amd64-amd64-qemuu-nested-amd host-install(5)
broken-step test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow host-install(5)
broken-step test-amd64-amd64-xl-qemuu-ovmf-amd64 host-install(5)
broken-step test-amd64-amd64-xl-pvhv2-amd host-install(5)
broken-step test-amd64-amd64-xl-qemut-ws16-amd64 host-install(5)
broken-step test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm host-install(5)
broken-step test-amd64-amd64-xl-xsm host-install(5)
broken-step test-amd64-amd64-xl-qemut-debianhvm-i386-xsm host-install(5)
broken-step test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm host-install(5)
broken-step test-amd64-amd64-xl-shadow host-install(5)
broken-step test-amd64-amd64-xl-qemuu-win7-amd64 host-install(5)
broken-step test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict host-install(5)
broken-step test-amd64-amd64-xl-qemut-win7-amd64 host-install(5)
broken-step test-amd64-amd64-libvirt-xsm host-install(5)
broken-step test-amd64-amd64-xl-credit2 host-install(5)
broken-step test-amd64-coresched-amd64-xl host-install(5)

Not pushing.

(No revision log; it would be 11576 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 27 13:14:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 27 Mar 2022 13:14:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295177.502220 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYSiM-0007B5-Jj; Sun, 27 Mar 2022 13:13:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295177.502220; Sun, 27 Mar 2022 13:13:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYSiM-0007Ay-Gj; Sun, 27 Mar 2022 13:13:50 +0000
Received: by outflank-mailman (input) for mailman id 295177;
 Sun, 27 Mar 2022 13:13:49 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYSiL-0007Ao-TZ; Sun, 27 Mar 2022 13:13:49 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYSiL-0002HJ-PF; Sun, 27 Mar 2022 13:13:49 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYSiL-0003ln-8W; Sun, 27 Mar 2022 13:13:49 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nYSiL-0005KO-82; Sun, 27 Mar 2022 13:13:49 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Sl2X2YRs9Cm3bh0G8PslCyyVCMbmNo1YFAl1y/pe+Tg=; b=fYCMca+1SvSSjTSyQRqFeykrvB
	J5lNFYfCFIQT3/v174jU++Q5ik7YNY404HqK6lhkw1ScVyOA88+wblqFUg+xuKcxD7WxKjfPxDiDN
	ndeVwDPeFjC/6RxhIgQScAN+uCaN3OpHdNuFFXoasBYxK88/VsTDQ3aHTtDPLWIin1No=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168887-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168887: regressions - trouble: blocked/broken/fail/pass
X-Osstest-Failures:
    libvirt:build-amd64:<job status>:broken:regression
    libvirt:build-amd64-pvops:<job status>:broken:regression
    libvirt:build-amd64-xsm:<job status>:broken:regression
    libvirt:build-arm64:<job status>:broken:regression
    libvirt:build-arm64-pvops:<job status>:broken:regression
    libvirt:build-arm64-xsm:<job status>:broken:regression
    libvirt:build-armhf-pvops:<job status>:broken:regression
    libvirt:build-i386:<job status>:broken:regression
    libvirt:build-i386-pvops:<job status>:broken:regression
    libvirt:build-i386-xsm:<job status>:broken:regression
    libvirt:build-i386-pvops:host-install(4):broken:regression
    libvirt:build-i386-xsm:host-install(4):broken:regression
    libvirt:build-i386:host-install(4):broken:regression
    libvirt:build-arm64-pvops:host-install(4):broken:regression
    libvirt:build-arm64:host-install(4):broken:regression
    libvirt:build-arm64-xsm:host-install(4):broken:regression
    libvirt:build-armhf-pvops:host-install(4):broken:regression
    libvirt:build-amd64:host-install(4):broken:regression
    libvirt:build-amd64-xsm:host-install(4):broken:regression
    libvirt:build-amd64-pvops:host-install(4):broken:regression
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:build-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:build-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=06c960e477de4561c7ba956f82994fa120226397
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 27 Mar 2022 13:13:49 +0000

flight 168887 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168887/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-arm64                     <job status>                 broken
 build-arm64-pvops               <job status>                 broken
 build-arm64-xsm                 <job status>                 broken
 build-armhf-pvops               <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 151777
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 151777
 build-i386                    4 host-install(4)        broken REGR. vs. 151777
 build-arm64-pvops             4 host-install(4)        broken REGR. vs. 151777
 build-arm64                   4 host-install(4)        broken REGR. vs. 151777
 build-arm64-xsm               4 host-install(4)        broken REGR. vs. 151777
 build-armhf-pvops             4 host-install(4)        broken REGR. vs. 151777
 build-amd64                   4 host-install(4)        broken REGR. vs. 151777
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 151777
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 151777
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              06c960e477de4561c7ba956f82994fa120226397
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  625 days
Failing since        151818  2020-07-11 04:18:52 Z  624 days  606 attempts
Testing same since   168869  2022-03-26 04:21:28 Z    1 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Claudio Fontana <cfontana@suse.de>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Haonan Wang <hnwanga1@gmail.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Martin Pitt <mpitt@debian.org>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Paolo Bonzini <pbonzini@redhat.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tom Wieczorek <tom@bibbu.net>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              broken  
 build-arm64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64                                                  broken  
 build-arm64                                                  broken  
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            broken  
 build-arm64-pvops                                            broken  
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-arm64 broken
broken-job build-arm64-pvops broken
broken-job build-arm64-xsm broken
broken-job build-armhf-pvops broken
broken-job build-i386 broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-i386-pvops host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step build-i386 host-install(4)
broken-step build-arm64-pvops host-install(4)
broken-step build-arm64 host-install(4)
broken-step build-arm64-xsm host-install(4)
broken-step build-armhf-pvops host-install(4)
broken-step build-amd64 host-install(4)
broken-step build-amd64-xsm host-install(4)
broken-step build-amd64-pvops host-install(4)

Not pushing.

(No revision log; it would be 102174 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 27 15:42:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 27 Mar 2022 15:42:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295195.502249 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYV2B-0004dU-MH; Sun, 27 Mar 2022 15:42:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295195.502249; Sun, 27 Mar 2022 15:42:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYV2B-0004dN-JH; Sun, 27 Mar 2022 15:42:27 +0000
Received: by outflank-mailman (input) for mailman id 295195;
 Sun, 27 Mar 2022 15:42:26 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYV2A-0004d9-DN; Sun, 27 Mar 2022 15:42:26 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYV2A-0004n2-8G; Sun, 27 Mar 2022 15:42:26 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYV29-0006zd-QR; Sun, 27 Mar 2022 15:42:25 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nYV29-0001L1-Pz; Sun, 27 Mar 2022 15:42:25 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=GF0ipR4xdy/RwaaUvjiecmIaD1MHzjbBza5/Uv3k9sU=; b=YpHuXiYA04Deu9/6+t6MMsrt4g
	U/vAM3fJjt7vEIXyzZ5+V1wC0Ec8rL/ultuXdEXrlmKMYQJakZviPPKk6WhGH4vsp5UrCkHz3eAz7
	hAEOeoS55unFrQDfDezIytgkrzaDpgdO0/9oYSkcxTkD/mOocAiAfmDHFKB9cHgpms1M=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168867-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168867: trouble: blocked/broken/fail/pass
X-Osstest-Failures:
    xen-unstable:test-arm64-arm64-libvirt-raw:<job status>:broken:regression
    xen-unstable:test-arm64-arm64-libvirt-xsm:<job status>:broken:regression
    xen-unstable:test-arm64-arm64-xl:<job status>:broken:regression
    xen-unstable:test-arm64-arm64-xl-credit1:<job status>:broken:regression
    xen-unstable:test-arm64-arm64-xl-credit2:<job status>:broken:regression
    xen-unstable:test-arm64-arm64-xl-seattle:<job status>:broken:regression
    xen-unstable:test-arm64-arm64-xl-thunderx:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-xl-rtds:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-xl-qemuu-ovmf-amd64:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-xl-qemuu-debianhvm-amd64:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-xl-qemut-debianhvm-amd64:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-xl-qcow2:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-xl-pvshim:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-xl-pvhv2-intel:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-xl-pvhv2-amd:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-xl-multivcpu:<job status>:broken:regression
    xen-unstable:build-i386:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-xl-credit2:<job status>:broken:regression
    xen-unstable:build-i386-prev:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-xl-credit1:<job status>:broken:regression
    xen-unstable:build-i386-pvops:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-xl:<job status>:broken:regression
    xen-unstable:build-i386-xsm:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-dom0pvh-xl-amd:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-dom0pvh-xl-intel:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-qemuu-nested-intel:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-libvirt:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-qemuu-freebsd12-amd64:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-libvirt-pair:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-qemuu-freebsd11-amd64:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-libvirt-vhd:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-libvirt-xsm:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-pygrub:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-livepatch:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-migrupgrade:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-pair:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-xl-shadow:<job status>:broken:regression
    xen-unstable:test-amd64-amd64-xl-xsm:<job status>:broken:regression
    xen-unstable:test-amd64-coresched-amd64-xl:<job status>:broken:regression
    xen-unstable:test-arm64-arm64-xl-vhd:<job status>:broken:regression
    xen-unstable:test-arm64-arm64-xl-xsm:<job status>:broken:regression
    xen-unstable:test-xtf-amd64-amd64-1:<job status>:broken:regression
    xen-unstable:test-xtf-amd64-amd64-2:<job status>:broken:regression
    xen-unstable:test-xtf-amd64-amd64-3:<job status>:broken:regression
    xen-unstable:test-xtf-amd64-amd64-4:<job status>:broken:regression
    xen-unstable:test-xtf-amd64-amd64-5:<job status>:broken:regression
    xen-unstable:build-i386:host-install(4):broken:regression
    xen-unstable:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-pygrub:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-xl-xsm:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-dom0pvh-xl-amd:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-pair:host-install/src_host(6):broken:regression
    xen-unstable:test-amd64-amd64-pair:host-install/dst_host(7):broken:regression
    xen-unstable:test-xtf-amd64-amd64-1:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-xl-credit2:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-xl:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-migrupgrade:host-install/src_host(6):broken:regression
    xen-unstable:test-amd64-amd64-migrupgrade:host-install/dst_host(7):broken:regression
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-xl-qemuu-debianhvm-amd64:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-xl-pvhv2-amd:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-xl-credit1:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:host-install(5):broken:regression
    xen-unstable:test-xtf-amd64-amd64-4:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-livepatch:host-install(5):broken:regression
    xen-unstable:test-xtf-amd64-amd64-2:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-qemuu-freebsd12-amd64:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-libvirt-pair:host-install/src_host(6):broken:regression
    xen-unstable:test-amd64-amd64-libvirt-pair:host-install/dst_host(7):broken:regression
    xen-unstable:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-qemuu-nested-intel:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-xl-pvhv2-intel:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-xl-pvshim:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-xl-qemuu-ovmf-amd64:host-install(5):broken:regression
    xen-unstable:test-arm64-arm64-libvirt-xsm:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-qemuu-freebsd11-amd64:host-install(5):broken:regression
    xen-unstable:test-arm64-arm64-xl-vhd:host-install(5):broken:regression
    xen-unstable:test-arm64-arm64-xl-credit1:host-install(5):broken:regression
    xen-unstable:test-arm64-arm64-xl-seattle:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-xl-multivcpu:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-libvirt-vhd:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-xl-shadow:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-xl-qemut-debianhvm-amd64:host-install(5):broken:regression
    xen-unstable:test-xtf-amd64-amd64-3:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-xl-qcow2:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-libvirt:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-libvirt-xsm:host-install(5):broken:regression
    xen-unstable:test-xtf-amd64-amd64-5:host-install(5):broken:regression
    xen-unstable:build-i386-prev:host-install(4):broken:regression
    xen-unstable:build-i386-pvops:host-install(4):broken:regression
    xen-unstable:build-i386-xsm:host-install(4):broken:regression
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-examine:host-install:broken:regression
    xen-unstable:test-amd64-amd64-examine-bios:host-install:broken:regression
    xen-unstable:test-arm64-arm64-examine:host-install:broken:regression
    xen-unstable:test-arm64-arm64-xl-credit2:host-install(5):broken:regression
    xen-unstable:test-arm64-arm64-xl-xsm:host-install(5):broken:regression
    xen-unstable:test-arm64-arm64-libvirt-raw:host-install(5):broken:regression
    xen-unstable:test-arm64-arm64-xl-thunderx:host-install(5):broken:regression
    xen-unstable:test-arm64-arm64-xl:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-dom0pvh-xl-intel:host-install(5):broken:regression
    xen-unstable:test-amd64-coresched-amd64-xl:host-install(5):broken:regression
    xen-unstable:test-amd64-amd64-xl-rtds:host-install(5):broken:allowable
    xen-unstable:test-amd64-i386-livepatch:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-migrupgrade:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-pair:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-qemut-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-qemut-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-qemuu-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-qemuu-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-shadow:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-vhd:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-xsm:build-check(1):blocked:nonblocking
    xen-unstable:build-i386-libvirt:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-coresched-i386-xl:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-examine:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-examine-bios:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-examine-uefi:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-freebsd10-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-freebsd10-i386:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=fc90d75c2b71ae15b75128e7d0d4dbe718164ecb
X-Osstest-Versions-That:
    xen=0e03ff97def12b121b5313094a76e5db7bb5c93c
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 27 Mar 2022 15:42:25 +0000

flight 168867 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168867/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-arm64-arm64-libvirt-raw    <job status>                 broken
 test-arm64-arm64-libvirt-xsm    <job status>                 broken
 test-arm64-arm64-xl             <job status>                 broken
 test-arm64-arm64-xl-credit1     <job status>                 broken
 test-arm64-arm64-xl-credit2     <job status>                 broken
 test-arm64-arm64-xl-seattle     <job status>                 broken
 test-arm64-arm64-xl-thunderx    <job status>                 broken
 test-amd64-amd64-xl-rtds        <job status>                 broken
 test-amd64-amd64-xl-qemuu-ws16-amd64    <job status>                 broken
 test-amd64-amd64-xl-qemuu-win7-amd64    <job status>                 broken
 test-amd64-amd64-xl-qemuu-ovmf-amd64    <job status>                 broken
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict    <job status>   broken
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm    <job status>            broken
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow    <job status>        broken
 test-amd64-amd64-xl-qemuu-debianhvm-amd64    <job status>               broken
 test-amd64-amd64-xl-qemut-ws16-amd64    <job status>                 broken
 test-amd64-amd64-xl-qemut-win7-amd64    <job status>                 broken
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm    <job status>   broken
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm    <job status>            broken
 test-amd64-amd64-xl-qemut-debianhvm-amd64    <job status>               broken
 test-amd64-amd64-xl-qcow2       <job status>                 broken
 test-amd64-amd64-xl-pvshim      <job status>                 broken
 test-amd64-amd64-xl-pvhv2-intel    <job status>                 broken
 test-amd64-amd64-xl-pvhv2-amd    <job status>                 broken
 test-amd64-amd64-xl-multivcpu    <job status>                 broken
 build-i386                      <job status>                 broken
 test-amd64-amd64-xl-credit2     <job status>                 broken
 build-i386-prev                 <job status>                 broken
 test-amd64-amd64-xl-credit1     <job status>                 broken
 build-i386-pvops                <job status>                 broken
 test-amd64-amd64-xl             <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 test-amd64-amd64-dom0pvh-xl-amd    <job status>                 broken
 test-amd64-amd64-dom0pvh-xl-intel    <job status>                 broken
 test-amd64-amd64-qemuu-nested-intel    <job status>                 broken
 test-amd64-amd64-qemuu-nested-amd    <job status>                 broken
 test-amd64-amd64-libvirt        <job status>                 broken
 test-amd64-amd64-qemuu-freebsd12-amd64    <job status>                 broken
 test-amd64-amd64-libvirt-pair    <job status>                 broken
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm    <job status>      broken
 test-amd64-amd64-qemuu-freebsd11-amd64    <job status>                 broken
 test-amd64-amd64-libvirt-vhd    <job status>                 broken
 test-amd64-amd64-libvirt-xsm    <job status>                 broken
 test-amd64-amd64-pygrub         <job status>                 broken
 test-amd64-amd64-livepatch      <job status>                 broken
 test-amd64-amd64-migrupgrade    <job status>                 broken
 test-amd64-amd64-pair           <job status>                 broken
 test-amd64-amd64-xl-shadow      <job status>                 broken
 test-amd64-amd64-xl-xsm         <job status>                 broken
 test-amd64-coresched-amd64-xl    <job status>                 broken
 test-arm64-arm64-xl-vhd         <job status>                 broken
 test-arm64-arm64-xl-xsm         <job status>                 broken
 test-xtf-amd64-amd64-1          <job status>                 broken
 test-xtf-amd64-amd64-2          <job status>                 broken
 test-xtf-amd64-amd64-3          <job status>                 broken
 test-xtf-amd64-amd64-4          <job status>                 broken
 test-xtf-amd64-amd64-5          <job status>                 broken
 build-i386                    4 host-install(4)        broken REGR. vs. 168855
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 5 host-install(5) broken REGR. vs. 168855
 test-amd64-amd64-xl-qemuu-ws16-amd64 5 host-install(5) broken REGR. vs. 168855
 test-amd64-amd64-pygrub       5 host-install(5)        broken REGR. vs. 168855
 test-amd64-amd64-xl-xsm       5 host-install(5)        broken REGR. vs. 168855
 test-amd64-amd64-dom0pvh-xl-amd  5 host-install(5)     broken REGR. vs. 168855
 test-amd64-amd64-pair       6 host-install/src_host(6) broken REGR. vs. 168855
 test-amd64-amd64-pair       7 host-install/dst_host(7) broken REGR. vs. 168855
 test-xtf-amd64-amd64-1        5 host-install(5)        broken REGR. vs. 168855
 test-amd64-amd64-xl-credit2   5 host-install(5)        broken REGR. vs. 168855
 test-amd64-amd64-xl           5 host-install(5)        broken REGR. vs. 168855
 test-amd64-amd64-migrupgrade 6 host-install/src_host(6) broken REGR. vs. 168855
 test-amd64-amd64-migrupgrade 7 host-install/dst_host(7) broken REGR. vs. 168855
 test-amd64-amd64-qemuu-nested-amd  5 host-install(5)   broken REGR. vs. 168855
 test-amd64-amd64-xl-qemuu-debianhvm-amd64 5 host-install(5) broken REGR. vs. 168855
 test-amd64-amd64-xl-pvhv2-amd  5 host-install(5)       broken REGR. vs. 168855
 test-amd64-amd64-xl-credit1   5 host-install(5)        broken REGR. vs. 168855
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 5 host-install(5) broken REGR. vs. 168855
 test-xtf-amd64-amd64-4        5 host-install(5)        broken REGR. vs. 168855
 test-amd64-amd64-livepatch    5 host-install(5)        broken REGR. vs. 168855
 test-xtf-amd64-amd64-2        5 host-install(5)        broken REGR. vs. 168855
 test-amd64-amd64-qemuu-freebsd12-amd64 5 host-install(5) broken REGR. vs. 168855
 test-amd64-amd64-libvirt-pair 6 host-install/src_host(6) broken REGR. vs. 168855
 test-amd64-amd64-libvirt-pair 7 host-install/dst_host(7) broken REGR. vs. 168855
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 5 host-install(5) broken REGR. vs. 168855
 test-amd64-amd64-qemuu-nested-intel  5 host-install(5) broken REGR. vs. 168855
 test-amd64-amd64-xl-qemut-ws16-amd64 5 host-install(5) broken REGR. vs. 168855
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm 5 host-install(5) broken REGR. vs. 168855
 test-amd64-amd64-xl-pvhv2-intel  5 host-install(5)     broken REGR. vs. 168855
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm 5 host-install(5) broken REGR. vs. 168855
 test-amd64-amd64-xl-pvshim    5 host-install(5)        broken REGR. vs. 168855
 test-amd64-amd64-xl-qemuu-ovmf-amd64 5 host-install(5) broken REGR. vs. 168855
 test-arm64-arm64-libvirt-xsm  5 host-install(5)        broken REGR. vs. 168855
 test-amd64-amd64-qemuu-freebsd11-amd64 5 host-install(5) broken REGR. vs. 168855
 test-arm64-arm64-xl-vhd       5 host-install(5)        broken REGR. vs. 168855
 test-arm64-arm64-xl-credit1   5 host-install(5)        broken REGR. vs. 168855
 test-arm64-arm64-xl-seattle   5 host-install(5)        broken REGR. vs. 168855
 test-amd64-amd64-xl-multivcpu  5 host-install(5)       broken REGR. vs. 168855
 test-amd64-amd64-libvirt-vhd  5 host-install(5)        broken REGR. vs. 168855
 test-amd64-amd64-xl-qemut-win7-amd64 5 host-install(5) broken REGR. vs. 168855
 test-amd64-amd64-xl-shadow    5 host-install(5)        broken REGR. vs. 168855
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow 5 host-install(5) broken REGR. vs. 168855
 test-amd64-amd64-xl-qemut-debianhvm-amd64 5 host-install(5) broken REGR. vs. 168855
 test-xtf-amd64-amd64-3        5 host-install(5)        broken REGR. vs. 168855
 test-amd64-amd64-xl-qcow2     5 host-install(5)        broken REGR. vs. 168855
 test-amd64-amd64-libvirt      5 host-install(5)        broken REGR. vs. 168855
 test-amd64-amd64-libvirt-xsm  5 host-install(5)        broken REGR. vs. 168855
 test-xtf-amd64-amd64-5        5 host-install(5)        broken REGR. vs. 168855
 build-i386-prev               4 host-install(4)        broken REGR. vs. 168855
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168855
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168855
 test-amd64-amd64-xl-qemuu-win7-amd64 5 host-install(5) broken REGR. vs. 168855
 test-amd64-amd64-examine      5 host-install           broken REGR. vs. 168855
 test-amd64-amd64-examine-bios  5 host-install          broken REGR. vs. 168855
 test-arm64-arm64-examine      5 host-install           broken REGR. vs. 168855
 test-arm64-arm64-xl-credit2   5 host-install(5)        broken REGR. vs. 168855
 test-arm64-arm64-xl-xsm       5 host-install(5)        broken REGR. vs. 168855
 test-arm64-arm64-libvirt-raw  5 host-install(5)        broken REGR. vs. 168855
 test-arm64-arm64-xl-thunderx  5 host-install(5)        broken REGR. vs. 168855
 test-arm64-arm64-xl           5 host-install(5)        broken REGR. vs. 168855
 test-amd64-amd64-dom0pvh-xl-intel  5 host-install(5)   broken REGR. vs. 168855
 test-amd64-coresched-amd64-xl  5 host-install(5)       broken REGR. vs. 168855

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-rtds      5 host-install(5)        broken REGR. vs. 168855

Tests which did not succeed, but are not blocking:
 test-amd64-i386-livepatch     1 build-check(1)               blocked  n/a
 test-amd64-i386-migrupgrade   1 build-check(1)               blocked  n/a
 test-amd64-i386-pair          1 build-check(1)               blocked  n/a
 test-amd64-i386-qemut-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemut-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-qemuu-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-xl            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-pvshim     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemut-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1)  blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-shadow     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-vhd        1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-xsm        1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemut-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemut-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-coresched-i386-xl  1 build-check(1)               blocked  n/a
 test-amd64-i386-examine       1 build-check(1)               blocked  n/a
 test-amd64-i386-examine-bios  1 build-check(1)               blocked  n/a
 test-amd64-i386-examine-uefi  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-amd64  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-i386  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168855
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168855
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168855
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  fc90d75c2b71ae15b75128e7d0d4dbe718164ecb
baseline version:
 xen                  0e03ff97def12b121b5313094a76e5db7bb5c93c

Last test of basis   168855  2022-03-25 14:37:04 Z    2 days
Testing same since   168867  2022-03-25 23:39:47 Z    1 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               broken  
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-prev                                             pass    
 build-i386-prev                                              broken  
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             broken  
 test-xtf-amd64-amd64-1                                       broken  
 test-xtf-amd64-amd64-2                                       broken  
 test-xtf-amd64-amd64-3                                       broken  
 test-xtf-amd64-amd64-4                                       broken  
 test-xtf-amd64-amd64-5                                       broken  
 test-amd64-amd64-xl                                          broken  
 test-amd64-coresched-amd64-xl                                broken  
 test-arm64-arm64-xl                                          broken  
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           blocked 
 test-amd64-coresched-i386-xl                                 blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           broken  
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        broken  
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         blocked 
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 broken  
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 broken  
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-libvirt-xsm                                 broken  
 test-arm64-arm64-libvirt-xsm                                 broken  
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-xl-xsm                                      broken  
 test-arm64-arm64-xl-xsm                                      broken  
 test-amd64-i386-xl-xsm                                       blocked 
 test-amd64-amd64-qemuu-nested-amd                            broken  
 test-amd64-amd64-xl-pvhv2-amd                                broken  
 test-amd64-i386-qemut-rhel6hvm-amd                           blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-dom0pvh-xl-amd                              broken  
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    broken  
 test-amd64-i386-xl-qemut-debianhvm-amd64                     blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    broken  
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     blocked 
 test-amd64-i386-freebsd10-amd64                              blocked 
 test-amd64-amd64-qemuu-freebsd11-amd64                       broken  
 test-amd64-amd64-qemuu-freebsd12-amd64                       broken  
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         broken  
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         broken  
 test-amd64-i386-xl-qemut-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         broken  
 test-amd64-i386-xl-qemuu-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemut-ws16-amd64                         broken  
 test-amd64-i386-xl-qemut-ws16-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-ws16-amd64                         broken  
 test-amd64-i386-xl-qemuu-ws16-amd64                          blocked 
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                fail    
 test-amd64-i386-examine-bios                                 blocked 
 test-amd64-amd64-xl-credit1                                  broken  
 test-arm64-arm64-xl-credit1                                  broken  
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  broken  
 test-arm64-arm64-xl-credit2                                  broken  
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        broken  
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         blocked 
 test-amd64-amd64-examine                                     fail    
 test-arm64-arm64-examine                                     fail    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      blocked 
 test-amd64-i386-freebsd10-i386                               blocked 
 test-amd64-amd64-qemuu-nested-intel                          broken  
 test-amd64-amd64-xl-pvhv2-intel                              broken  
 test-amd64-i386-qemut-rhel6hvm-intel                         blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-amd64-dom0pvh-xl-intel                            broken  
 test-amd64-amd64-libvirt                                     broken  
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-livepatch                                   broken  
 test-amd64-i386-livepatch                                    blocked 
 test-amd64-amd64-migrupgrade                                 broken  
 test-amd64-i386-migrupgrade                                  blocked 
 test-amd64-amd64-xl-multivcpu                                broken  
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        broken  
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-libvirt-pair                                broken  
 test-amd64-i386-libvirt-pair                                 blocked 
 test-amd64-amd64-xl-pvshim                                   broken  
 test-amd64-i386-xl-pvshim                                    blocked 
 test-amd64-amd64-pygrub                                      broken  
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    broken  
 test-arm64-arm64-libvirt-raw                                 broken  
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-xl-rtds                                     broken  
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  broken  
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             broken  
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              blocked 
 test-amd64-amd64-xl-shadow                                   broken  
 test-amd64-i386-xl-shadow                                    blocked 
 test-arm64-arm64-xl-thunderx                                 broken  
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 blocked 
 test-amd64-amd64-libvirt-vhd                                 broken  
 test-arm64-arm64-xl-vhd                                      broken  
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job test-arm64-arm64-libvirt-raw broken
broken-job test-arm64-arm64-libvirt-xsm broken
broken-job test-arm64-arm64-xl broken
broken-job test-arm64-arm64-xl-credit1 broken
broken-job test-arm64-arm64-xl-credit2 broken
broken-job test-arm64-arm64-xl-seattle broken
broken-job test-arm64-arm64-xl-thunderx broken
broken-job test-amd64-amd64-xl-rtds broken
broken-job test-amd64-amd64-xl-qemuu-ws16-amd64 broken
broken-job test-amd64-amd64-xl-qemuu-win7-amd64 broken
broken-job test-amd64-amd64-xl-qemuu-ovmf-amd64 broken
broken-job test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict broken
broken-job test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm broken
broken-job test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow broken
broken-job test-amd64-amd64-xl-qemuu-debianhvm-amd64 broken
broken-job test-amd64-amd64-xl-qemut-ws16-amd64 broken
broken-job test-amd64-amd64-xl-qemut-win7-amd64 broken
broken-job test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm broken
broken-job test-amd64-amd64-xl-qemut-debianhvm-i386-xsm broken
broken-job test-amd64-amd64-xl-qemut-debianhvm-amd64 broken
broken-job test-amd64-amd64-xl-qcow2 broken
broken-job test-amd64-amd64-xl-pvshim broken
broken-job test-amd64-amd64-xl-pvhv2-intel broken
broken-job test-amd64-amd64-xl-pvhv2-amd broken
broken-job test-amd64-amd64-xl-multivcpu broken
broken-job build-i386 broken
broken-job test-amd64-amd64-xl-credit2 broken
broken-job build-i386-prev broken
broken-job test-amd64-amd64-xl-credit1 broken
broken-job build-i386-pvops broken
broken-job test-amd64-amd64-xl broken
broken-job build-i386-xsm broken
broken-job test-amd64-amd64-dom0pvh-xl-amd broken
broken-job test-amd64-amd64-dom0pvh-xl-intel broken
broken-job test-amd64-amd64-qemuu-nested-intel broken
broken-job test-amd64-amd64-qemuu-nested-amd broken
broken-job test-amd64-amd64-libvirt broken
broken-job test-amd64-amd64-qemuu-freebsd12-amd64 broken
broken-job test-amd64-amd64-libvirt-pair broken
broken-job test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm broken
broken-job test-amd64-amd64-qemuu-freebsd11-amd64 broken
broken-job test-amd64-amd64-libvirt-vhd broken
broken-job test-amd64-amd64-libvirt-xsm broken
broken-job test-amd64-amd64-pygrub broken
broken-job test-amd64-amd64-livepatch broken
broken-job test-amd64-amd64-migrupgrade broken
broken-job test-amd64-amd64-pair broken
broken-job test-amd64-amd64-xl-shadow broken
broken-job test-amd64-amd64-xl-xsm broken
broken-job test-amd64-coresched-amd64-xl broken
broken-job test-arm64-arm64-xl-vhd broken
broken-job test-arm64-arm64-xl-xsm broken
broken-job test-xtf-amd64-amd64-1 broken
broken-job test-xtf-amd64-amd64-2 broken
broken-job test-xtf-amd64-amd64-3 broken
broken-job test-xtf-amd64-amd64-4 broken
broken-job test-xtf-amd64-amd64-5 broken
broken-step build-i386 host-install(4)
broken-step test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm host-install(5)
broken-step test-amd64-amd64-xl-qemuu-ws16-amd64 host-install(5)
broken-step test-amd64-amd64-pygrub host-install(5)
broken-step test-amd64-amd64-xl-xsm host-install(5)
broken-step test-amd64-amd64-dom0pvh-xl-amd host-install(5)
broken-step test-amd64-amd64-pair host-install/src_host(6)
broken-step test-amd64-amd64-pair host-install/dst_host(7)
broken-step test-xtf-amd64-amd64-1 host-install(5)
broken-step test-amd64-amd64-xl-credit2 host-install(5)
broken-step test-amd64-amd64-xl host-install(5)
broken-step test-amd64-amd64-migrupgrade host-install/src_host(6)
broken-step test-amd64-amd64-migrupgrade host-install/dst_host(7)
broken-step test-amd64-amd64-qemuu-nested-amd host-install(5)
broken-step test-amd64-amd64-xl-qemuu-debianhvm-amd64 host-install(5)
broken-step test-amd64-amd64-xl-pvhv2-amd host-install(5)
broken-step test-amd64-amd64-xl-credit1 host-install(5)
broken-step test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm host-install(5)
broken-step test-xtf-amd64-amd64-4 host-install(5)
broken-step test-amd64-amd64-livepatch host-install(5)
broken-step test-xtf-amd64-amd64-2 host-install(5)
broken-step test-amd64-amd64-qemuu-freebsd12-amd64 host-install(5)
broken-step test-amd64-amd64-libvirt-pair host-install/src_host(6)
broken-step test-amd64-amd64-libvirt-pair host-install/dst_host(7)
broken-step test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict host-install(5)
broken-step test-amd64-amd64-qemuu-nested-intel host-install(5)
broken-step test-amd64-amd64-xl-qemut-ws16-amd64 host-install(5)
broken-step test-amd64-amd64-xl-qemut-debianhvm-i386-xsm host-install(5)
broken-step test-amd64-amd64-xl-pvhv2-intel host-install(5)
broken-step test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm host-install(5)
broken-step test-amd64-amd64-xl-pvshim host-install(5)
broken-step test-amd64-amd64-xl-qemuu-ovmf-amd64 host-install(5)
broken-step test-arm64-arm64-libvirt-xsm host-install(5)
broken-step test-amd64-amd64-qemuu-freebsd11-amd64 host-install(5)
broken-step test-arm64-arm64-xl-vhd host-install(5)
broken-step test-arm64-arm64-xl-credit1 host-install(5)
broken-step test-arm64-arm64-xl-seattle host-install(5)
broken-step test-amd64-amd64-xl-multivcpu host-install(5)
broken-step test-amd64-amd64-libvirt-vhd host-install(5)
broken-step test-amd64-amd64-xl-qemut-win7-amd64 host-install(5)
broken-step test-amd64-amd64-xl-shadow host-install(5)
broken-step test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow host-install(5)
broken-step test-amd64-amd64-xl-qemut-debianhvm-amd64 host-install(5)
broken-step test-xtf-amd64-amd64-3 host-install(5)
broken-step test-amd64-amd64-xl-qcow2 host-install(5)
broken-step test-amd64-amd64-libvirt host-install(5)
broken-step test-amd64-amd64-libvirt-xsm host-install(5)
broken-step test-xtf-amd64-amd64-5 host-install(5)
broken-step build-i386-prev host-install(4)
broken-step build-i386-pvops host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step test-amd64-amd64-xl-qemuu-win7-amd64 host-install(5)
broken-step test-amd64-amd64-examine host-install
broken-step test-amd64-amd64-examine-bios host-install
broken-step test-arm64-arm64-examine host-install
broken-step test-arm64-arm64-xl-credit2 host-install(5)
broken-step test-arm64-arm64-xl-xsm host-install(5)
broken-step test-arm64-arm64-libvirt-raw host-install(5)
broken-step test-arm64-arm64-xl-thunderx host-install(5)
broken-step test-arm64-arm64-xl host-install(5)
broken-step test-amd64-amd64-dom0pvh-xl-intel host-install(5)
broken-step test-amd64-amd64-xl-rtds host-install(5)
broken-step test-amd64-coresched-amd64-xl host-install(5)

Not pushing.

------------------------------------------------------------
commit fc90d75c2b71ae15b75128e7d0d4dbe718164ecb
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date:   Mon Feb 28 19:31:00 2022 +0000

    x86/cet: Remove XEN_SHSTK's dependency on EXPERT
    
    CET-SS hardware is now available from multiple vendors, the feature has
    downstream users, and was declared security supported in XSA-398.
    
    Enable it by default.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
    Reviewed-by: Juergen Gross <jgross@suse.com>
(qemu changes not included)


From xen-devel-bounces@lists.xenproject.org Sun Mar 27 16:58:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 27 Mar 2022 16:58:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295206.502260 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYWDm-0003qi-GA; Sun, 27 Mar 2022 16:58:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295206.502260; Sun, 27 Mar 2022 16:58:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYWDm-0003qb-DA; Sun, 27 Mar 2022 16:58:30 +0000
Received: by outflank-mailman (input) for mailman id 295206;
 Sun, 27 Mar 2022 16:58:29 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYWDl-0003qR-Ti; Sun, 27 Mar 2022 16:58:29 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYWDl-0006YY-12; Sun, 27 Mar 2022 16:58:29 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYWDk-0000BV-E0; Sun, 27 Mar 2022 16:58:28 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nYWDk-00068Y-DV; Sun, 27 Mar 2022 16:58:28 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=7gHMnfvsiTSu4pBrilcNgTqXXIwAZdtA3ThFDgIXp7E=; b=uufCLrLXi/RIb9KIrag8qR6s/g
	4NOGCAqpoL2tYy8M11omty1K+u4vbEn3+BCqxk4enYrk7XmpW24zD+VwhZGiED5xFRskLPQu3TcSl
	yeU1DL+/a8fPsjc3a+x5ICHr0qTDQfX0KzWSXzBPO5fWknx/KBmgMLNxJUTGrWl14mzs=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168872-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.14-testing test] 168872: regressions - trouble: blocked/broken/pass
X-Osstest-Failures:
    xen-4.14-testing:test-arm64-arm64-libvirt-raw:<job status>:broken:regression
    xen-4.14-testing:test-arm64-arm64-libvirt-xsm:<job status>:broken:regression
    xen-4.14-testing:test-arm64-arm64-xl:<job status>:broken:regression
    xen-4.14-testing:test-arm64-arm64-xl-credit1:<job status>:broken:regression
    xen-4.14-testing:test-arm64-arm64-xl-credit2:<job status>:broken:regression
    xen-4.14-testing:test-arm64-arm64-xl-seattle:<job status>:broken:regression
    xen-4.14-testing:test-arm64-arm64-xl-thunderx:<job status>:broken:regression
    xen-4.14-testing:test-arm64-arm64-xl-vhd:<job status>:broken:regression
    xen-4.14-testing:test-arm64-arm64-xl-xsm:<job status>:broken:regression
    xen-4.14-testing:test-amd64-coresched-amd64-xl:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-xl-xsm:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-xl-shadow:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-xl-rtds:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-win7-amd64:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-ovmf-amd64:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-xl-qemut-ws16-amd64:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-xl-qemut-win7-amd64:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-xl-qemut-debianhvm-amd64:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-xl-qcow2:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-xl-pvshim:<job status>:broken:regression
    xen-4.14-testing:build-i386:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-xl-pvhv2-intel:<job status>:broken:regression
    xen-4.14-testing:build-i386-prev:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-xl-pvhv2-amd:<job status>:broken:regression
    xen-4.14-testing:build-i386-pvops:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-xl-multivcpu:<job status>:broken:regression
    xen-4.14-testing:build-i386-xsm:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-dom0pvh-xl-amd:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-dom0pvh-xl-intel:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-xl-credit2:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-libvirt:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-libvirt-pair:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-xl-credit1:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-libvirt-vhd:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-xl:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-libvirt-xsm:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-livepatch:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-qemuu-nested-intel:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-migrupgrade:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-pair:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-qemuu-nested-amd:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-pygrub:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-qemuu-freebsd11-amd64:<job status>:broken:regression
    xen-4.14-testing:test-amd64-amd64-qemuu-freebsd12-amd64:<job status>:broken:regression
    xen-4.14-testing:test-xtf-amd64-amd64-1:<job status>:broken:regression
    xen-4.14-testing:test-xtf-amd64-amd64-2:<job status>:broken:regression
    xen-4.14-testing:test-xtf-amd64-amd64-3:<job status>:broken:regression
    xen-4.14-testing:test-xtf-amd64-amd64-4:<job status>:broken:regression
    xen-4.14-testing:test-xtf-amd64-amd64-5:<job status>:broken:regression
    xen-4.14-testing:build-i386-prev:host-install(4):broken:regression
    xen-4.14-testing:build-i386-xsm:host-install(4):broken:regression
    xen-4.14-testing:build-i386:host-install(4):broken:regression
    xen-4.14-testing:build-i386-pvops:host-install(4):broken:regression
    xen-4.14-testing:test-amd64-amd64-livepatch:livepatch-run:fail:regression
    xen-4.14-testing:test-amd64-amd64-xl-qcow2:guest-localmigrate/x10:fail:regression
    xen-4.14-testing:test-amd64-i386-livepatch:livepatch-run:fail:regression
    xen-4.14-testing:test-amd64-amd64-libvirt:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-qemuu-nested-intel:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-xl-pvshim:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-pair:host-install/src_host(6):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-pair:host-install/dst_host(7):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-dom0pvh-xl-amd:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-xl-pvhv2-amd:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-xl-multivcpu:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-coresched-amd64-xl:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-qemuu-freebsd11-amd64:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-qemuu-nested-amd:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-qemuu-freebsd12-amd64:host-install(5):broken:heisenbug
    xen-4.14-testing:test-xtf-amd64-amd64-5:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-libvirt-pair:host-install/src_host(6):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-libvirt-pair:host-install/dst_host(7):broken:heisenbug
    xen-4.14-testing:test-xtf-amd64-amd64-2:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-xl:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-xl-qemut-win7-amd64:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-migrupgrade:host-install/src_host(6):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-dom0pvh-xl-intel:host-install(5):broken:heisenbug
    xen-4.14-testing:test-xtf-amd64-amd64-4:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-xl-shadow:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-xl-qemut-ws16-amd64:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-xl-pvhv2-intel:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-xl-credit1:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-libvirt-xsm:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-migrupgrade:host-install/dst_host(7):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-xl-xsm:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-win7-amd64:host-install(5):broken:heisenbug
    xen-4.14-testing:test-xtf-amd64-amd64-1:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-xl-credit2:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-xl-rtds:host-install(5):broken:heisenbug
    xen-4.14-testing:test-arm64-arm64-xl-seattle:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-xl-qcow2:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-livepatch:host-install(5):broken:heisenbug
    xen-4.14-testing:test-arm64-arm64-libvirt-xsm:host-install(5):broken:heisenbug
    xen-4.14-testing:test-arm64-arm64-xl-credit1:host-install(5):broken:heisenbug
    xen-4.14-testing:test-xtf-amd64-amd64-3:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-libvirt-vhd:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-xl-qemut-debianhvm-amd64:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-ovmf-amd64:host-install(5):broken:heisenbug
    xen-4.14-testing:test-arm64-arm64-xl:host-install(5):broken:heisenbug
    xen-4.14-testing:test-arm64-arm64-xl-xsm:host-install(5):broken:heisenbug
    xen-4.14-testing:test-arm64-arm64-xl-thunderx:host-install(5):broken:heisenbug
    xen-4.14-testing:test-arm64-arm64-libvirt-raw:host-install(5):broken:heisenbug
    xen-4.14-testing:test-arm64-arm64-xl-vhd:host-install(5):broken:heisenbug
    xen-4.14-testing:test-arm64-arm64-xl-credit2:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-amd64-pygrub:host-install(5):broken:heisenbug
    xen-4.14-testing:test-amd64-i386-qemuu-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-qemuu-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-pvshim:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-shadow:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:build-i386-libvirt:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-coresched-i386-xl:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-freebsd10-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-freebsd10-i386:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-livepatch:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-migrupgrade:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-pair:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-qemut-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-qemut-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=10b09aa2541de4c3c49b9343e9bc04e19f0ae4f8
X-Osstest-Versions-That:
    xen=ca304edd3ba8c19211107fd2e898249987557ce5
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 27 Mar 2022 16:58:28 +0000

flight 168872 xen-4.14-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168872/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-arm64-arm64-libvirt-raw    <job status>                 broken
 test-arm64-arm64-libvirt-xsm    <job status>                 broken
 test-arm64-arm64-xl             <job status>                 broken
 test-arm64-arm64-xl-credit1     <job status>                 broken
 test-arm64-arm64-xl-credit2     <job status>                 broken
 test-arm64-arm64-xl-seattle     <job status>                 broken
 test-arm64-arm64-xl-thunderx    <job status>                 broken
 test-arm64-arm64-xl-vhd         <job status>                 broken
 test-arm64-arm64-xl-xsm         <job status>                 broken
 test-amd64-coresched-amd64-xl    <job status>                 broken
 test-amd64-amd64-xl-xsm         <job status>                 broken
 test-amd64-amd64-xl-shadow      <job status>                 broken
 test-amd64-amd64-xl-rtds        <job status>                 broken
 test-amd64-amd64-xl-qemuu-ws16-amd64    <job status>                 broken
 test-amd64-amd64-xl-qemuu-win7-amd64    <job status>                 broken
 test-amd64-amd64-xl-qemuu-ovmf-amd64    <job status>                 broken
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict    <job status>   broken
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm    <job status>            broken
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow    <job status>        broken
 test-amd64-amd64-xl-qemuu-debianhvm-amd64    <job status>               broken
 test-amd64-amd64-xl-qemut-ws16-amd64    <job status>                 broken
 test-amd64-amd64-xl-qemut-win7-amd64    <job status>                 broken
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm    <job status>   broken
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm    <job status>            broken
 test-amd64-amd64-xl-qemut-debianhvm-amd64    <job status>               broken
 test-amd64-amd64-xl-qcow2       <job status>                 broken
 test-amd64-amd64-xl-pvshim      <job status>                 broken
 build-i386                      <job status>                 broken
 test-amd64-amd64-xl-pvhv2-intel    <job status>                 broken
 build-i386-prev                 <job status>                 broken
 test-amd64-amd64-xl-pvhv2-amd    <job status>                 broken
 build-i386-pvops                <job status>                 broken
 test-amd64-amd64-xl-multivcpu    <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 test-amd64-amd64-dom0pvh-xl-amd    <job status>                 broken
 test-amd64-amd64-dom0pvh-xl-intel    <job status>                 broken
 test-amd64-amd64-xl-credit2     <job status>                 broken
 test-amd64-amd64-libvirt        <job status>                 broken
 test-amd64-amd64-libvirt-pair    <job status>                 broken
 test-amd64-amd64-xl-credit1     <job status>                 broken
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm    <job status>      broken
 test-amd64-amd64-libvirt-vhd    <job status>                 broken
 test-amd64-amd64-xl             <job status>                 broken
 test-amd64-amd64-libvirt-xsm    <job status>                 broken
 test-amd64-amd64-livepatch      <job status>                 broken
 test-amd64-amd64-qemuu-nested-intel    <job status>                 broken
 test-amd64-amd64-migrupgrade    <job status>                 broken
 test-amd64-amd64-pair           <job status>                 broken
 test-amd64-amd64-qemuu-nested-amd    <job status>                 broken
 test-amd64-amd64-pygrub         <job status>                 broken
 test-amd64-amd64-qemuu-freebsd11-amd64    <job status>                 broken
 test-amd64-amd64-qemuu-freebsd12-amd64    <job status>                 broken
 test-xtf-amd64-amd64-1          <job status>                 broken
 test-xtf-amd64-amd64-2          <job status>                 broken
 test-xtf-amd64-amd64-3          <job status>                 broken
 test-xtf-amd64-amd64-4          <job status>                 broken
 test-xtf-amd64-amd64-5          <job status>                 broken
 build-i386-prev               4 host-install(4)        broken REGR. vs. 168506
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168506
 build-i386                    4 host-install(4)        broken REGR. vs. 168506
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168506
 test-amd64-amd64-livepatch   13 livepatch-run  fail in 168862 REGR. vs. 168506
 test-amd64-amd64-xl-qcow2 19 guest-localmigrate/x10 fail in 168862 REGR. vs. 168506
 test-amd64-i386-livepatch    13 livepatch-run  fail in 168862 REGR. vs. 168506

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-libvirt      5 host-install(5)          broken pass in 168862
 test-amd64-amd64-qemuu-nested-intel  5 host-install(5)   broken pass in 168862
 test-amd64-amd64-xl-pvshim    5 host-install(5)          broken pass in 168862
 test-amd64-amd64-xl-qemuu-ws16-amd64  5 host-install(5)  broken pass in 168862
 test-amd64-amd64-pair         6 host-install/src_host(6) broken pass in 168862
 test-amd64-amd64-pair         7 host-install/dst_host(7) broken pass in 168862
 test-amd64-amd64-dom0pvh-xl-amd  5 host-install(5)       broken pass in 168862
 test-amd64-amd64-xl-pvhv2-amd  5 host-install(5)         broken pass in 168862
 test-amd64-amd64-xl-multivcpu  5 host-install(5)         broken pass in 168862
 test-amd64-coresched-amd64-xl  5 host-install(5)         broken pass in 168862
 test-amd64-amd64-qemuu-freebsd11-amd64 5 host-install(5) broken pass in 168862
 test-amd64-amd64-qemuu-nested-amd  5 host-install(5)     broken pass in 168862
 test-amd64-amd64-qemuu-freebsd12-amd64 5 host-install(5) broken pass in 168862
 test-xtf-amd64-amd64-5        5 host-install(5)          broken pass in 168862
 test-amd64-amd64-libvirt-pair 6 host-install/src_host(6) broken pass in 168862
 test-amd64-amd64-libvirt-pair 7 host-install/dst_host(7) broken pass in 168862
 test-xtf-amd64-amd64-2        5 host-install(5)          broken pass in 168862
 test-amd64-amd64-xl           5 host-install(5)          broken pass in 168862
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow 5 host-install(5) broken pass in 168862
 test-amd64-amd64-xl-qemut-win7-amd64  5 host-install(5)  broken pass in 168862
 test-amd64-amd64-migrupgrade  6 host-install/src_host(6) broken pass in 168862
 test-amd64-amd64-dom0pvh-xl-intel  5 host-install(5)     broken pass in 168862
 test-xtf-amd64-amd64-4        5 host-install(5)          broken pass in 168862
 test-amd64-amd64-xl-shadow    5 host-install(5)          broken pass in 168862
 test-amd64-amd64-xl-qemut-ws16-amd64  5 host-install(5)  broken pass in 168862
 test-amd64-amd64-xl-pvhv2-intel  5 host-install(5)       broken pass in 168862
 test-amd64-amd64-xl-credit1   5 host-install(5)          broken pass in 168862
 test-amd64-amd64-libvirt-xsm  5 host-install(5)          broken pass in 168862
 test-amd64-amd64-migrupgrade  7 host-install/dst_host(7) broken pass in 168862
 test-amd64-amd64-xl-xsm       5 host-install(5)          broken pass in 168862
 test-amd64-amd64-xl-qemuu-win7-amd64  5 host-install(5)  broken pass in 168862
 test-xtf-amd64-amd64-1        5 host-install(5)          broken pass in 168862
 test-amd64-amd64-xl-credit2   5 host-install(5)          broken pass in 168862
 test-amd64-amd64-xl-rtds      5 host-install(5)          broken pass in 168862
 test-arm64-arm64-xl-seattle   5 host-install(5)          broken pass in 168862
 test-amd64-amd64-xl-qcow2     5 host-install(5)          broken pass in 168862
 test-amd64-amd64-livepatch    5 host-install(5)          broken pass in 168862
 test-arm64-arm64-libvirt-xsm  5 host-install(5)          broken pass in 168862
 test-arm64-arm64-xl-credit1   5 host-install(5)          broken pass in 168862
 test-xtf-amd64-amd64-3        5 host-install(5)          broken pass in 168862
 test-amd64-amd64-xl-qemuu-debianhvm-amd64 5 host-install(5) broken pass in 168862
 test-amd64-amd64-libvirt-vhd  5 host-install(5)          broken pass in 168862
 test-amd64-amd64-xl-qemut-debianhvm-amd64 5 host-install(5) broken pass in 168862
 test-amd64-amd64-xl-qemuu-ovmf-amd64  5 host-install(5)  broken pass in 168862
 test-arm64-arm64-xl           5 host-install(5)          broken pass in 168862
 test-arm64-arm64-xl-xsm       5 host-install(5)          broken pass in 168862
 test-arm64-arm64-xl-thunderx  5 host-install(5)          broken pass in 168862
 test-arm64-arm64-libvirt-raw  5 host-install(5)          broken pass in 168862
 test-arm64-arm64-xl-vhd       5 host-install(5)          broken pass in 168862
 test-arm64-arm64-xl-credit2   5 host-install(5)          broken pass in 168862
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 5 host-install(5) broken pass in 168862
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 5 host-install(5) broken pass in 168862
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 5 host-install(5) broken pass in 168862
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm 5 host-install(5) broken pass in 168862
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm 5 host-install(5) broken pass in 168862
 test-amd64-amd64-pygrub       5 host-install(5)          broken pass in 168862

Tests which did not succeed, but are not blocking:
 test-amd64-i386-qemuu-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-xl            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-pvshim     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemut-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemut-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemut-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1)  blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-shadow     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-vhd        1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-xsm        1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemuu-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a
 test-amd64-coresched-i386-xl  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-amd64  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-i386  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-amd64-i386-livepatch     1 build-check(1)               blocked  n/a
 test-amd64-i386-migrupgrade   1 build-check(1)               blocked  n/a
 test-amd64-i386-pair          1 build-check(1)               blocked  n/a
 test-amd64-i386-qemut-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemut-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail in 168862 like 168506
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop   fail in 168862 like 168506
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop  fail in 168862 like 168506
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop  fail in 168862 like 168506
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop   fail in 168862 like 168506
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop  fail in 168862 like 168506
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop  fail in 168862 like 168506
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop   fail in 168862 like 168506
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop   fail in 168862 like 168506
 test-amd64-i386-libvirt-xsm 15 migrate-support-check fail in 168862 never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check fail in 168862 never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check fail in 168862 never pass
 test-amd64-amd64-libvirt    15 migrate-support-check fail in 168862 never pass
 test-amd64-i386-libvirt     15 migrate-support-check fail in 168862 never pass
 test-arm64-arm64-xl-credit2 15 migrate-support-check fail in 168862 never pass
 test-arm64-arm64-xl-credit2 16 saverestore-support-check fail in 168862 never pass
 test-arm64-arm64-xl-seattle 15 migrate-support-check fail in 168862 never pass
 test-arm64-arm64-xl-xsm     15 migrate-support-check fail in 168862 never pass
 test-arm64-arm64-xl-seattle 16 saverestore-support-check fail in 168862 never pass
 test-arm64-arm64-xl-xsm 16 saverestore-support-check fail in 168862 never pass
 test-amd64-i386-xl-pvshim    14 guest-start          fail in 168862 never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check fail in 168862 never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail in 168862 never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail in 168862 never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check fail in 168862 never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check fail in 168862 never pass
 test-arm64-arm64-xl-credit1 15 migrate-support-check fail in 168862 never pass
 test-arm64-arm64-xl-credit1 16 saverestore-support-check fail in 168862 never pass
 test-arm64-arm64-xl         15 migrate-support-check fail in 168862 never pass
 test-arm64-arm64-xl     16 saverestore-support-check fail in 168862 never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check fail in 168862 never pass
 test-amd64-i386-libvirt-raw 14 migrate-support-check fail in 168862 never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check fail in 168862 never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check fail in 168862 never pass
 test-arm64-arm64-xl-vhd     14 migrate-support-check fail in 168862 never pass
 test-arm64-arm64-xl-vhd 15 saverestore-support-check fail in 168862 never pass
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168506
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168506
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168506
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  10b09aa2541de4c3c49b9343e9bc04e19f0ae4f8
baseline version:
 xen                  ca304edd3ba8c19211107fd2e898249987557ce5

Last test of basis   168506  2022-03-10 14:16:31 Z   17 days
Testing same since   168862  2022-03-25 17:36:39 Z    1 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bjoern Doebel <doebel@amazon.de>
  Jan Beulich <jbeulich@suse.com>
  Jiamei Xie <jiamei.xie@arm.com>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Thiner Logoer <logoerthiner1@163.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               broken  
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-prev                                             pass    
 build-i386-prev                                              broken  
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             broken  
 test-xtf-amd64-amd64-1                                       broken  
 test-xtf-amd64-amd64-2                                       broken  
 test-xtf-amd64-amd64-3                                       broken  
 test-xtf-amd64-amd64-4                                       broken  
 test-xtf-amd64-amd64-5                                       broken  
 test-amd64-amd64-xl                                          broken  
 test-amd64-coresched-amd64-xl                                broken  
 test-arm64-arm64-xl                                          broken  
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           blocked 
 test-amd64-coresched-i386-xl                                 blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           broken  
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        broken  
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         blocked 
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 broken  
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 broken  
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-libvirt-xsm                                 broken  
 test-arm64-arm64-libvirt-xsm                                 broken  
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-xl-xsm                                      broken  
 test-arm64-arm64-xl-xsm                                      broken  
 test-amd64-i386-xl-xsm                                       blocked 
 test-amd64-amd64-qemuu-nested-amd                            broken  
 test-amd64-amd64-xl-pvhv2-amd                                broken  
 test-amd64-i386-qemut-rhel6hvm-amd                           blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-dom0pvh-xl-amd                              broken  
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    broken  
 test-amd64-i386-xl-qemut-debianhvm-amd64                     blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    broken  
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     blocked 
 test-amd64-i386-freebsd10-amd64                              blocked 
 test-amd64-amd64-qemuu-freebsd11-amd64                       broken  
 test-amd64-amd64-qemuu-freebsd12-amd64                       broken  
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         broken  
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         broken  
 test-amd64-i386-xl-qemut-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         broken  
 test-amd64-i386-xl-qemuu-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemut-ws16-amd64                         broken  
 test-amd64-i386-xl-qemut-ws16-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-ws16-amd64                         broken  
 test-amd64-i386-xl-qemuu-ws16-amd64                          blocked 
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  broken  
 test-arm64-arm64-xl-credit1                                  broken  
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  broken  
 test-arm64-arm64-xl-credit2                                  broken  
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        broken  
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         blocked 
 test-amd64-i386-freebsd10-i386                               blocked 
 test-amd64-amd64-qemuu-nested-intel                          broken  
 test-amd64-amd64-xl-pvhv2-intel                              broken  
 test-amd64-i386-qemut-rhel6hvm-intel                         blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-amd64-dom0pvh-xl-intel                            broken  
 test-amd64-amd64-libvirt                                     broken  
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-livepatch                                   broken  
 test-amd64-i386-livepatch                                    blocked 
 test-amd64-amd64-migrupgrade                                 broken  
 test-amd64-i386-migrupgrade                                  blocked 
 test-amd64-amd64-xl-multivcpu                                broken  
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        broken  
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-libvirt-pair                                broken  
 test-amd64-i386-libvirt-pair                                 blocked 
 test-amd64-amd64-xl-pvshim                                   broken  
 test-amd64-i386-xl-pvshim                                    blocked 
 test-amd64-amd64-pygrub                                      broken  
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    broken  
 test-arm64-arm64-libvirt-raw                                 broken  
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-xl-rtds                                     broken  
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  broken  
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             broken  
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              blocked 
 test-amd64-amd64-xl-shadow                                   broken  
 test-amd64-i386-xl-shadow                                    blocked 
 test-arm64-arm64-xl-thunderx                                 broken  
 test-amd64-amd64-libvirt-vhd                                 broken  
 test-arm64-arm64-xl-vhd                                      broken  
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job test-arm64-arm64-libvirt-raw broken
broken-job test-arm64-arm64-libvirt-xsm broken
broken-job test-arm64-arm64-xl broken
broken-job test-arm64-arm64-xl-credit1 broken
broken-job test-arm64-arm64-xl-credit2 broken
broken-job test-arm64-arm64-xl-seattle broken
broken-job test-arm64-arm64-xl-thunderx broken
broken-job test-arm64-arm64-xl-vhd broken
broken-job test-arm64-arm64-xl-xsm broken
broken-job test-amd64-coresched-amd64-xl broken
broken-job test-amd64-amd64-xl-xsm broken
broken-job test-amd64-amd64-xl-shadow broken
broken-job test-amd64-amd64-xl-rtds broken
broken-job test-amd64-amd64-xl-qemuu-ws16-amd64 broken
broken-job test-amd64-amd64-xl-qemuu-win7-amd64 broken
broken-job test-amd64-amd64-xl-qemuu-ovmf-amd64 broken
broken-job test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict broken
broken-job test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm broken
broken-job test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow broken
broken-job test-amd64-amd64-xl-qemuu-debianhvm-amd64 broken
broken-job test-amd64-amd64-xl-qemut-ws16-amd64 broken
broken-job test-amd64-amd64-xl-qemut-win7-amd64 broken
broken-job test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm broken
broken-job test-amd64-amd64-xl-qemut-debianhvm-i386-xsm broken
broken-job test-amd64-amd64-xl-qemut-debianhvm-amd64 broken
broken-job test-amd64-amd64-xl-qcow2 broken
broken-job test-amd64-amd64-xl-pvshim broken
broken-job build-i386 broken
broken-job test-amd64-amd64-xl-pvhv2-intel broken
broken-job build-i386-prev broken
broken-job test-amd64-amd64-xl-pvhv2-amd broken
broken-job build-i386-pvops broken
broken-job test-amd64-amd64-xl-multivcpu broken
broken-job build-i386-xsm broken
broken-job test-amd64-amd64-dom0pvh-xl-amd broken
broken-job test-amd64-amd64-dom0pvh-xl-intel broken
broken-job test-amd64-amd64-xl-credit2 broken
broken-job test-amd64-amd64-libvirt broken
broken-job test-amd64-amd64-libvirt-pair broken
broken-job test-amd64-amd64-xl-credit1 broken
broken-job test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm broken
broken-job test-amd64-amd64-libvirt-vhd broken
broken-job test-amd64-amd64-xl broken
broken-job test-amd64-amd64-libvirt-xsm broken
broken-job test-amd64-amd64-livepatch broken
broken-job test-amd64-amd64-qemuu-nested-intel broken
broken-job test-amd64-amd64-migrupgrade broken
broken-job test-amd64-amd64-pair broken
broken-job test-amd64-amd64-qemuu-nested-amd broken
broken-job test-amd64-amd64-pygrub broken
broken-job test-amd64-amd64-qemuu-freebsd11-amd64 broken
broken-job test-amd64-amd64-qemuu-freebsd12-amd64 broken
broken-job test-xtf-amd64-amd64-1 broken
broken-job test-xtf-amd64-amd64-2 broken
broken-job test-xtf-amd64-amd64-3 broken
broken-job test-xtf-amd64-amd64-4 broken
broken-job test-xtf-amd64-amd64-5 broken
broken-step test-amd64-amd64-libvirt host-install(5)
broken-step test-amd64-amd64-qemuu-nested-intel host-install(5)
broken-step test-amd64-amd64-xl-pvshim host-install(5)
broken-step build-i386-prev host-install(4)
broken-step test-amd64-amd64-xl-qemuu-ws16-amd64 host-install(5)
broken-step test-amd64-amd64-pair host-install/src_host(6)
broken-step test-amd64-amd64-pair host-install/dst_host(7)
broken-step test-amd64-amd64-dom0pvh-xl-amd host-install(5)
broken-step build-i386-xsm host-install(4)
broken-step test-amd64-amd64-xl-pvhv2-amd host-install(5)
broken-step test-amd64-amd64-xl-multivcpu host-install(5)
broken-step test-amd64-coresched-amd64-xl host-install(5)
broken-step test-amd64-amd64-qemuu-freebsd11-amd64 host-install(5)
broken-step test-amd64-amd64-qemuu-nested-amd host-install(5)
broken-step test-amd64-amd64-qemuu-freebsd12-amd64 host-install(5)
broken-step test-xtf-amd64-amd64-5 host-install(5)
broken-step test-amd64-amd64-libvirt-pair host-install/src_host(6)
broken-step test-amd64-amd64-libvirt-pair host-install/dst_host(7)
broken-step test-xtf-amd64-amd64-2 host-install(5)
broken-step test-amd64-amd64-xl host-install(5)
broken-step test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow host-install(5)
broken-step test-amd64-amd64-xl-qemut-win7-amd64 host-install(5)
broken-step test-amd64-amd64-migrupgrade host-install/src_host(6)
broken-step test-amd64-amd64-dom0pvh-xl-intel host-install(5)
broken-step test-xtf-amd64-amd64-4 host-install(5)
broken-step test-amd64-amd64-xl-shadow host-install(5)
broken-step test-amd64-amd64-xl-qemut-ws16-amd64 host-install(5)
broken-step test-amd64-amd64-xl-pvhv2-intel host-install(5)
broken-step test-amd64-amd64-xl-credit1 host-install(5)
broken-step test-amd64-amd64-libvirt-xsm host-install(5)
broken-step test-amd64-amd64-migrupgrade host-install/dst_host(7)
broken-step test-amd64-amd64-xl-xsm host-install(5)
broken-step test-amd64-amd64-xl-qemuu-win7-amd64 host-install(5)
broken-step test-xtf-amd64-amd64-1 host-install(5)
broken-step test-amd64-amd64-xl-credit2 host-install(5)
broken-step test-amd64-amd64-xl-rtds host-install(5)
broken-step test-arm64-arm64-xl-seattle host-install(5)
broken-step test-amd64-amd64-xl-qcow2 host-install(5)
broken-step test-amd64-amd64-livepatch host-install(5)
broken-step test-arm64-arm64-libvirt-xsm host-install(5)
broken-step test-arm64-arm64-xl-credit1 host-install(5)
broken-step test-xtf-amd64-amd64-3 host-install(5)
broken-step test-amd64-amd64-xl-qemuu-debianhvm-amd64 host-install(5)
broken-step test-amd64-amd64-libvirt-vhd host-install(5)
broken-step build-i386 host-install(4)
broken-step build-i386-pvops host-install(4)
broken-step test-amd64-amd64-xl-qemut-debianhvm-amd64 host-install(5)
broken-step test-amd64-amd64-xl-qemuu-ovmf-amd64 host-install(5)
broken-step test-arm64-arm64-xl host-install(5)
broken-step test-arm64-arm64-xl-xsm host-install(5)
broken-step test-arm64-arm64-xl-thunderx host-install(5)
broken-step test-arm64-arm64-libvirt-raw host-install(5)
broken-step test-arm64-arm64-xl-vhd host-install(5)
broken-step test-arm64-arm64-xl-credit2 host-install(5)
broken-step test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm host-install(5)
broken-step test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm host-install(5)
broken-step test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict host-install(5)
broken-step test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm host-install(5)
broken-step test-amd64-amd64-xl-qemut-debianhvm-i386-xsm host-install(5)
broken-step test-amd64-amd64-pygrub host-install(5)

Not pushing.

(No revision log; it would be 394 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 27 19:02:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 27 Mar 2022 19:02:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295218.502283 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYY99-00081k-Ks; Sun, 27 Mar 2022 19:01:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295218.502283; Sun, 27 Mar 2022 19:01:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYY99-00081d-Hj; Sun, 27 Mar 2022 19:01:51 +0000
Received: by outflank-mailman (input) for mailman id 295218;
 Sun, 27 Mar 2022 19:01:50 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYY98-00081T-Ib; Sun, 27 Mar 2022 19:01:50 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYY98-0000DE-F7; Sun, 27 Mar 2022 19:01:50 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYY98-0002sg-2S; Sun, 27 Mar 2022 19:01:50 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nYY98-0004uk-22; Sun, 27 Mar 2022 19:01:50 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=rqdFgAnqKXQ4ZYI1Y+g4ujlJeLyjJ2g8a5FMkeuXE5Q=; b=JzqLS6zGyE7Fiw3OYLI4k9Ot4y
	KvJY2k+Iopq9apuRVR0jsNSgn05Bdoo1dlWYcI2fBy+fjY9/sc97wgx3s471/CnLgSkVM8kWdkCPl
	zp5PZwSIy/okQ4C99bVh+1L5WmNXqVUK0dWnqXvGG6C6yvrbHIEqlo7Sym8nfBeQ7cJU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168889-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168889: trouble: blocked/broken
X-Osstest-Failures:
    ovmf:build-amd64:<job status>:broken:regression
    ovmf:build-amd64-pvops:<job status>:broken:regression
    ovmf:build-amd64-xsm:<job status>:broken:regression
    ovmf:build-i386:<job status>:broken:regression
    ovmf:build-i386-pvops:<job status>:broken:regression
    ovmf:build-i386-xsm:<job status>:broken:regression
    ovmf:build-i386-pvops:host-install(4):broken:regression
    ovmf:build-i386:host-install(4):broken:regression
    ovmf:build-i386-xsm:host-install(4):broken:regression
    ovmf:build-amd64-xsm:host-install(4):broken:regression
    ovmf:build-amd64:host-install(4):broken:regression
    ovmf:build-amd64-pvops:host-install(4):broken:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=355515a06a609327794070a91efe26a45a2e3325
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 27 Mar 2022 19:01:50 +0000

flight 168889 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168889/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168254
 build-i386                    4 host-install(4)        broken REGR. vs. 168254
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168254
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 168254
 build-amd64                   4 host-install(4)        broken REGR. vs. 168254
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 355515a06a609327794070a91efe26a45a2e3325
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   27 days
Failing since        168258  2022-03-01 01:55:31 Z   26 days  258 attempts
Testing same since   168889  2022-03-27 06:18:32 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Bob Feng <bob.c.feng@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Mara Sophie Grosch <littlefox@lf-net.org>
  Mara Sophie Grosch via groups.io <littlefox=lf-net.org@groups.io>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Yi Li <yi1.li@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64                                                  broken  
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-i386 broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-i386-pvops host-install(4)
broken-step build-i386 host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step build-amd64-xsm host-install(4)
broken-step build-amd64 host-install(4)
broken-step build-amd64-pvops host-install(4)

Not pushing.

(No revision log; it would be 978 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 27 22:17:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 27 Mar 2022 22:17:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295234.502312 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYbBx-0000xP-Qc; Sun, 27 Mar 2022 22:16:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295234.502312; Sun, 27 Mar 2022 22:16:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYbBx-0000xI-Mt; Sun, 27 Mar 2022 22:16:57 +0000
Received: by outflank-mailman (input) for mailman id 295234;
 Sun, 27 Mar 2022 22:16:56 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYbBw-0000x3-SR; Sun, 27 Mar 2022 22:16:56 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYbBw-0003Us-O3; Sun, 27 Mar 2022 22:16:56 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYbBw-00075E-9u; Sun, 27 Mar 2022 22:16:56 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nYbBw-0007L7-9S; Sun, 27 Mar 2022 22:16:56 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=XioEU0DZeOWeDpaCU1wfUh23ygMiqHiUQmlTpZUPtVk=; b=6ZwhXE9KWIYSivWEn4Dfvz8QXj
	FY5E6SWc2MUwo5RYuR1soaLhD9Ehg52WS/6hNkw/PV8JJw8IQjfjk6pPpfs1RS/VI9nPukuEiR82i
	HCi9KbeRn13Tk6ypkzA2R6UlZFHEeUnRNQrkMJDTqcZNq3MLdTd7yfLBrbW9Hc3sT8NM=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168892-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.16-testing test] 168892: trouble: blocked/broken/pass
X-Osstest-Failures:
    xen-4.16-testing:build-amd64:<job status>:broken:regression
    xen-4.16-testing:build-amd64-prev:<job status>:broken:regression
    xen-4.16-testing:build-amd64-pvops:<job status>:broken:regression
    xen-4.16-testing:build-amd64-xsm:<job status>:broken:regression
    xen-4.16-testing:build-amd64-xtf:<job status>:broken:regression
    xen-4.16-testing:build-arm64:<job status>:broken:regression
    xen-4.16-testing:build-arm64-pvops:<job status>:broken:regression
    xen-4.16-testing:build-arm64-xsm:<job status>:broken:regression
    xen-4.16-testing:build-armhf-pvops:<job status>:broken:regression
    xen-4.16-testing:build-i386:<job status>:broken:regression
    xen-4.16-testing:build-i386-prev:<job status>:broken:regression
    xen-4.16-testing:build-i386-pvops:<job status>:broken:regression
    xen-4.16-testing:build-i386-xsm:<job status>:broken:regression
    xen-4.16-testing:build-i386-xsm:host-install(4):broken:regression
    xen-4.16-testing:build-i386-prev:host-install(4):broken:regression
    xen-4.16-testing:build-i386:host-install(4):broken:regression
    xen-4.16-testing:build-i386-pvops:host-install(4):broken:regression
    xen-4.16-testing:build-arm64-pvops:host-install(4):broken:regression
    xen-4.16-testing:build-arm64-xsm:host-install(4):broken:regression
    xen-4.16-testing:build-arm64:host-install(4):broken:regression
    xen-4.16-testing:build-amd64-xtf:host-install(4):broken:regression
    xen-4.16-testing:build-amd64-pvops:host-install(4):broken:regression
    xen-4.16-testing:build-amd64:host-install(4):broken:regression
    xen-4.16-testing:build-amd64-prev:host-install(4):broken:regression
    xen-4.16-testing:build-amd64-xsm:host-install(4):broken:regression
    xen-4.16-testing:build-armhf-pvops:host-install(4):broken:regression
    xen-4.16-testing:test-amd64-i386-qemuu-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-qemuu-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-pvshim:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-shadow:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-coresched-amd64-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-shadow:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-rtds:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:build-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:build-arm64-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qcow2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-pvshim:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-pvhv2-intel:build-check(1):blocked:nonblocking
    xen-4.16-testing:build-i386-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-pvhv2-amd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-dom0pvh-xl-amd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-dom0pvh-xl-intel:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-livepatch:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-nested-intel:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-migrupgrade:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-pair:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-nested-amd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-pygrub:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-freebsd11-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-freebsd12-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-coresched-i386-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-freebsd10-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-freebsd10-i386:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-livepatch:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-migrupgrade:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-pair:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-qemut-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-qemut-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-arndale:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-cubietruck:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-rtds:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-xtf-amd64-amd64-1:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-xtf-amd64-amd64-2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-xtf-amd64-amd64-3:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-xtf-amd64-amd64-4:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-xtf-amd64-amd64-5:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    xen=c7a861b2d065e7c26f9d499df32eb99f546e1671
X-Osstest-Versions-That:
    xen=cfd29b83a26f35f49f074f06169ce4cadfdebf0d
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 27 Mar 2022 22:16:56 +0000

flight 168892 xen-4.16-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168892/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-prev                <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-amd64-xtf                 <job status>                 broken
 build-arm64                     <job status>                 broken
 build-arm64-pvops               <job status>                 broken
 build-arm64-xsm                 <job status>                 broken
 build-armhf-pvops               <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-prev                 <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168513
 build-i386-prev               4 host-install(4)        broken REGR. vs. 168513
 build-i386                    4 host-install(4)        broken REGR. vs. 168513
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168513
 build-arm64-pvops             4 host-install(4)        broken REGR. vs. 168513
 build-arm64-xsm               4 host-install(4)        broken REGR. vs. 168513
 build-arm64                   4 host-install(4)        broken REGR. vs. 168513
 build-amd64-xtf               4 host-install(4)        broken REGR. vs. 168513
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 168513
 build-amd64                   4 host-install(4)        broken REGR. vs. 168513
 build-amd64-prev              4 host-install(4)        broken REGR. vs. 168513
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 168513
 build-armhf-pvops             4 host-install(4)        broken REGR. vs. 168513

Tests which did not succeed, but are not blocking:
 test-amd64-i386-qemuu-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-xl            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-pvshim     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemut-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemut-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemut-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1)  blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-shadow     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-vhd        1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-xsm        1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl           1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-amd64-coresched-amd64-xl  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-xsm       1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-shadow    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-rtds      1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ws16-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qemut-ws16-amd64  1 build-check(1)             blocked n/a
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qcow2     1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvshim    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-intel  1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit2   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit1   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl           1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-amd64-livepatch    1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-intel  1 build-check(1)              blocked n/a
 test-amd64-amd64-migrupgrade  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pair         1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pygrub       1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-freebsd11-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-qemuu-freebsd12-amd64  1 build-check(1)           blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-coresched-i386-xl  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-amd64  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-i386  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-amd64-i386-livepatch     1 build-check(1)               blocked  n/a
 test-amd64-i386-migrupgrade   1 build-check(1)               blocked  n/a
 test-amd64-i386-pair          1 build-check(1)               blocked  n/a
 test-amd64-i386-qemut-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemut-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-armhf-armhf-xl-arndale   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit1   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-cubietruck  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-rtds      1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-vhd       1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-1        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-2        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-3        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-4        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-5        1 build-check(1)               blocked  n/a

version targeted for testing:
 xen                  c7a861b2d065e7c26f9d499df32eb99f546e1671
baseline version:
 xen                  cfd29b83a26f35f49f074f06169ce4cadfdebf0d

Last test of basis   168513  2022-03-11 05:13:34 Z   16 days
Testing same since   168864  2022-03-25 17:37:01 Z    2 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bjoern Doebel <doebel@amazon.de>
  Jan Beulich <jbeulich@suse.com>
  Jiamei Xie <jiamei.xie@arm.com>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Thiner Logoer <logoerthiner1@163.com>

jobs:
 build-amd64-xsm                                              broken  
 build-arm64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64-xtf                                              broken  
 build-amd64                                                  broken  
 build-arm64                                                  broken  
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-prev                                             broken  
 build-i386-prev                                              broken  
 build-amd64-pvops                                            broken  
 build-arm64-pvops                                            broken  
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-xtf-amd64-amd64-1                                       blocked 
 test-xtf-amd64-amd64-2                                       blocked 
 test-xtf-amd64-amd64-3                                       blocked 
 test-xtf-amd64-amd64-4                                       blocked 
 test-xtf-amd64-amd64-5                                       blocked 
 test-amd64-amd64-xl                                          blocked 
 test-amd64-coresched-amd64-xl                                blocked 
 test-arm64-arm64-xl                                          blocked 
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           blocked 
 test-amd64-coresched-i386-xl                                 blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        blocked 
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         blocked 
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-xl-xsm                                      blocked 
 test-arm64-arm64-xl-xsm                                      blocked 
 test-amd64-i386-xl-xsm                                       blocked 
 test-amd64-amd64-qemuu-nested-amd                            blocked 
 test-amd64-amd64-xl-pvhv2-amd                                blocked 
 test-amd64-i386-qemut-rhel6hvm-amd                           blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-dom0pvh-xl-amd                              blocked 
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemut-debianhvm-amd64                     blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     blocked 
 test-amd64-i386-freebsd10-amd64                              blocked 
 test-amd64-amd64-qemuu-freebsd11-amd64                       blocked 
 test-amd64-amd64-qemuu-freebsd12-amd64                       blocked 
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         blocked 
 test-amd64-i386-xl-qemut-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         blocked 
 test-amd64-i386-xl-qemuu-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemut-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemut-ws16-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ws16-amd64                          blocked 
 test-armhf-armhf-xl-arndale                                  blocked 
 test-amd64-amd64-xl-credit1                                  blocked 
 test-arm64-arm64-xl-credit1                                  blocked 
 test-armhf-armhf-xl-credit1                                  blocked 
 test-amd64-amd64-xl-credit2                                  blocked 
 test-arm64-arm64-xl-credit2                                  blocked 
 test-armhf-armhf-xl-credit2                                  blocked 
 test-armhf-armhf-xl-cubietruck                               blocked 
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        blocked 
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         blocked 
 test-amd64-i386-freebsd10-i386                               blocked 
 test-amd64-amd64-qemuu-nested-intel                          blocked 
 test-amd64-amd64-xl-pvhv2-intel                              blocked 
 test-amd64-i386-qemut-rhel6hvm-intel                         blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-amd64-dom0pvh-xl-intel                            blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-livepatch                                   blocked 
 test-amd64-i386-livepatch                                    blocked 
 test-amd64-amd64-migrupgrade                                 blocked 
 test-amd64-i386-migrupgrade                                  blocked 
 test-amd64-amd64-xl-multivcpu                                blocked 
 test-armhf-armhf-xl-multivcpu                                blocked 
 test-amd64-amd64-pair                                        blocked 
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-amd64-amd64-xl-pvshim                                   blocked 
 test-amd64-i386-xl-pvshim                                    blocked 
 test-amd64-amd64-pygrub                                      blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-amd64-amd64-xl-qcow2                                    blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-xl-rtds                                     blocked 
 test-armhf-armhf-xl-rtds                                     blocked 
 test-arm64-arm64-xl-seattle                                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              blocked 
 test-amd64-amd64-xl-shadow                                   blocked 
 test-amd64-i386-xl-shadow                                    blocked 
 test-arm64-arm64-xl-thunderx                                 blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 
 test-arm64-arm64-xl-vhd                                      blocked 
 test-armhf-armhf-xl-vhd                                      blocked 
 test-amd64-i386-xl-vhd                                       blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-prev broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-amd64-xtf broken
broken-job build-arm64 broken
broken-job build-arm64-pvops broken
broken-job build-arm64-xsm broken
broken-job build-armhf-pvops broken
broken-job build-i386 broken
broken-job build-i386-prev broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-i386-xsm host-install(4)
broken-step build-i386-prev host-install(4)
broken-step build-i386 host-install(4)
broken-step build-i386-pvops host-install(4)
broken-step build-arm64-pvops host-install(4)
broken-step build-arm64-xsm host-install(4)
broken-step build-arm64 host-install(4)
broken-step build-amd64-xtf host-install(4)
broken-step build-amd64-pvops host-install(4)
broken-step build-amd64 host-install(4)
broken-step build-amd64-prev host-install(4)
broken-step build-amd64-xsm host-install(4)
broken-step build-armhf-pvops host-install(4)

Not pushing.

(No revision log; it would be 394 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 27 22:51:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 27 Mar 2022 22:51:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295243.502322 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYbj9-0005D6-NT; Sun, 27 Mar 2022 22:51:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295243.502322; Sun, 27 Mar 2022 22:51:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYbj9-0005Cz-KY; Sun, 27 Mar 2022 22:51:15 +0000
Received: by outflank-mailman (input) for mailman id 295243;
 Sun, 27 Mar 2022 22:51:14 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYbj8-0005Cp-RA; Sun, 27 Mar 2022 22:51:14 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYbj8-00042N-Kd; Sun, 27 Mar 2022 22:51:14 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYbj8-0007o8-7h; Sun, 27 Mar 2022 22:51:14 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nYbj8-0007QD-7E; Sun, 27 Mar 2022 22:51:14 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Rjk7tFVst2FLw5EVWuuKOqFPr8EusYWwuAHhnVXRnrU=; b=MHi/uaW4BynVPbFLcfW8cGcScH
	4Kkq8O8MqIXBuJqfKACEUObCkwd9ZbzdrXghjwsK0k5Syg5Ro3TLhEZ3qbEqHZs0XBlQey92ZxQ8w
	OCRqHZ5uNK7kE440m9x68PadRPgNJZ9/CHj+UU0Wp7lLA9Ps5FP0JaYHra7/im9QfETU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168875-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.15-testing test] 168875: regressions - trouble: blocked/broken/fail/pass
X-Osstest-Failures:
    xen-4.15-testing:test-amd64-coresched-amd64-xl:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-xl-xsm:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-xl-shadow:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-xl-rtds:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-win7-amd64:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-ovmf-amd64:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-xl-qemut-ws16-amd64:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-xl-qemut-win7-amd64:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:<job status>:broken:regression
    xen-4.15-testing:build-arm64:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-xl-qemut-debianhvm-amd64:<job status>:broken:regression
    xen-4.15-testing:build-arm64-pvops:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-xl-qcow2:<job status>:broken:regression
    xen-4.15-testing:build-arm64-xsm:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-xl-pvshim:<job status>:broken:regression
    xen-4.15-testing:build-i386:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-xl-pvhv2-intel:<job status>:broken:regression
    xen-4.15-testing:build-i386-prev:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-xl-pvhv2-amd:<job status>:broken:regression
    xen-4.15-testing:build-i386-pvops:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-xl-multivcpu:<job status>:broken:regression
    xen-4.15-testing:build-i386-xsm:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-dom0pvh-xl-amd:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-dom0pvh-xl-intel:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-xl-credit2:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-libvirt:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-libvirt-pair:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-xl-credit1:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-libvirt-vhd:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-xl:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-libvirt-xsm:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-livepatch:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-qemuu-nested-intel:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-migrupgrade:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-pair:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-qemuu-nested-amd:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-pygrub:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-qemuu-freebsd11-amd64:<job status>:broken:regression
    xen-4.15-testing:test-amd64-amd64-qemuu-freebsd12-amd64:<job status>:broken:regression
    xen-4.15-testing:test-xtf-amd64-amd64-1:<job status>:broken:regression
    xen-4.15-testing:test-xtf-amd64-amd64-2:<job status>:broken:regression
    xen-4.15-testing:test-xtf-amd64-amd64-3:<job status>:broken:regression
    xen-4.15-testing:test-xtf-amd64-amd64-4:<job status>:broken:regression
    xen-4.15-testing:test-xtf-amd64-amd64-5:<job status>:broken:regression
    xen-4.15-testing:build-i386-xsm:host-install(4):broken:regression
    xen-4.15-testing:build-i386:host-install(4):broken:regression
    xen-4.15-testing:build-i386-prev:host-install(4):broken:regression
    xen-4.15-testing:build-i386-pvops:host-install(4):broken:regression
    xen-4.15-testing:build-arm64-pvops:host-install(4):broken:regression
    xen-4.15-testing:build-arm64:host-install(4):broken:regression
    xen-4.15-testing:build-arm64-xsm:host-install(4):broken:regression
    xen-4.15-testing:test-amd64-i386-livepatch:livepatch-run:fail:regression
    xen-4.15-testing:test-amd64-amd64-livepatch:livepatch-run:fail:regression
    xen-4.15-testing:test-amd64-amd64-xl-xsm:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:host-install(5):broken:heisenbug
    xen-4.15-testing:test-xtf-amd64-amd64-2:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-xl-qcow2:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-pair:host-install/src_host(6):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-pair:host-install/dst_host(7):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-qemuu-nested-intel:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-dom0pvh-xl-amd:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-qemuu-nested-amd:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-coresched-amd64-xl:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-xl-pvhv2-amd:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-xl-credit2:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-xl-shadow:host-install(5):broken:heisenbug
    xen-4.15-testing:test-xtf-amd64-amd64-1:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-migrupgrade:host-install/src_host(6):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-migrupgrade:host-install/dst_host(7):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-xl-qemut-debianhvm-amd64:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-dom0pvh-xl-intel:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-libvirt-xsm:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-qemuu-freebsd12-amd64:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-xl-rtds:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-xl-pvhv2-intel:host-install(5):broken:heisenbug
    xen-4.15-testing:test-xtf-amd64-amd64-3:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-libvirt-pair:host-install/src_host(6):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-ovmf-amd64:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-libvirt-pair:host-install/dst_host(7):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-xl-pvshim:host-install(5):broken:heisenbug
    xen-4.15-testing:test-xtf-amd64-amd64-5:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-xl-qemut-ws16-amd64:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:host-install(5):broken:heisenbug
    xen-4.15-testing:test-xtf-amd64-amd64-4:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-xl-qemut-win7-amd64:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-win7-amd64:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-xl-multivcpu:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-libvirt:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-xl:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-xl-credit1:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-livepatch:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-qemuu-freebsd11-amd64:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-libvirt-vhd:host-install(5):broken:heisenbug
    xen-4.15-testing:test-amd64-amd64-pygrub:host-install(5):broken:heisenbug
    xen-4.15-testing:test-armhf-armhf-xl-credit2:xen-boot:fail:heisenbug
    xen-4.15-testing:test-amd64-i386-qemuu-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-qemuu-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-pvshim:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-shadow:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:build-arm64-libvirt:build-check(1):blocked:nonblocking
    xen-4.15-testing:build-i386-libvirt:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-coresched-i386-xl:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-freebsd10-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-freebsd10-i386:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-livepatch:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-migrupgrade:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-pair:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-qemut-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-qemut-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=3c8e7395e2d01140c862c78fa9483e46c0dbd343
X-Osstest-Versions-That:
    xen=cd751c09a5bab9f3529901fbe4d867ad7d52e89d
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 27 Mar 2022 22:51:14 +0000

flight 168875 xen-4.15-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168875/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-coresched-amd64-xl    <job status>                 broken
 test-amd64-amd64-xl-xsm         <job status>                 broken
 test-amd64-amd64-xl-shadow      <job status>                 broken
 test-amd64-amd64-xl-rtds        <job status>                 broken
 test-amd64-amd64-xl-qemuu-ws16-amd64    <job status>                 broken
 test-amd64-amd64-xl-qemuu-win7-amd64    <job status>                 broken
 test-amd64-amd64-xl-qemuu-ovmf-amd64    <job status>                 broken
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict    <job status>   broken
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm    <job status>            broken
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow    <job status>        broken
 test-amd64-amd64-xl-qemuu-debianhvm-amd64    <job status>               broken
 test-amd64-amd64-xl-qemut-ws16-amd64    <job status>                 broken
 test-amd64-amd64-xl-qemut-win7-amd64    <job status>                 broken
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm    <job status>   broken
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm    <job status>            broken
 build-arm64                     <job status>                 broken
 test-amd64-amd64-xl-qemut-debianhvm-amd64    <job status>               broken
 build-arm64-pvops               <job status>                 broken
 test-amd64-amd64-xl-qcow2       <job status>                 broken
 build-arm64-xsm                 <job status>                 broken
 test-amd64-amd64-xl-pvshim      <job status>                 broken
 build-i386                      <job status>                 broken
 test-amd64-amd64-xl-pvhv2-intel    <job status>                 broken
 build-i386-prev                 <job status>                 broken
 test-amd64-amd64-xl-pvhv2-amd    <job status>                 broken
 build-i386-pvops                <job status>                 broken
 test-amd64-amd64-xl-multivcpu    <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 test-amd64-amd64-dom0pvh-xl-amd    <job status>                 broken
 test-amd64-amd64-dom0pvh-xl-intel    <job status>                 broken
 test-amd64-amd64-xl-credit2     <job status>                 broken
 test-amd64-amd64-libvirt        <job status>                 broken
 test-amd64-amd64-libvirt-pair    <job status>                 broken
 test-amd64-amd64-xl-credit1     <job status>                 broken
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm    <job status>      broken
 test-amd64-amd64-libvirt-vhd    <job status>                 broken
 test-amd64-amd64-xl             <job status>                 broken
 test-amd64-amd64-libvirt-xsm    <job status>                 broken
 test-amd64-amd64-livepatch      <job status>                 broken
 test-amd64-amd64-qemuu-nested-intel    <job status>                 broken
 test-amd64-amd64-migrupgrade    <job status>                 broken
 test-amd64-amd64-pair           <job status>                 broken
 test-amd64-amd64-qemuu-nested-amd    <job status>                 broken
 test-amd64-amd64-pygrub         <job status>                 broken
 test-amd64-amd64-qemuu-freebsd11-amd64    <job status>                 broken
 test-amd64-amd64-qemuu-freebsd12-amd64    <job status>                 broken
 test-xtf-amd64-amd64-1          <job status>                 broken
 test-xtf-amd64-amd64-2          <job status>                 broken
 test-xtf-amd64-amd64-3          <job status>                 broken
 test-xtf-amd64-amd64-4          <job status>                 broken
 test-xtf-amd64-amd64-5          <job status>                 broken
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168502
 build-i386                    4 host-install(4)        broken REGR. vs. 168502
 build-i386-prev               4 host-install(4)        broken REGR. vs. 168502
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168502
 build-arm64-pvops             4 host-install(4)        broken REGR. vs. 168502
 build-arm64                   4 host-install(4)        broken REGR. vs. 168502
 build-arm64-xsm               4 host-install(4)        broken REGR. vs. 168502
 test-amd64-i386-livepatch    13 livepatch-run  fail in 168863 REGR. vs. 168502
 test-amd64-amd64-livepatch   13 livepatch-run  fail in 168863 REGR. vs. 168502

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-xsm       5 host-install(5)          broken pass in 168863
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow 5 host-install(5) broken pass in 168863
 test-xtf-amd64-amd64-2        5 host-install(5)          broken pass in 168863
 test-amd64-amd64-xl-qcow2     5 host-install(5)          broken pass in 168863
 test-amd64-amd64-pair         6 host-install/src_host(6) broken pass in 168863
 test-amd64-amd64-pair         7 host-install/dst_host(7) broken pass in 168863
 test-amd64-amd64-qemuu-nested-intel  5 host-install(5)   broken pass in 168863
 test-amd64-amd64-xl-qemuu-debianhvm-amd64 5 host-install(5) broken pass in 168863
 test-amd64-amd64-dom0pvh-xl-amd  5 host-install(5)       broken pass in 168863
 test-amd64-amd64-qemuu-nested-amd  5 host-install(5)     broken pass in 168863
 test-amd64-coresched-amd64-xl  5 host-install(5)         broken pass in 168863
 test-amd64-amd64-xl-pvhv2-amd  5 host-install(5)         broken pass in 168863
 test-amd64-amd64-xl-credit2   5 host-install(5)          broken pass in 168863
 test-amd64-amd64-xl-shadow    5 host-install(5)          broken pass in 168863
 test-xtf-amd64-amd64-1        5 host-install(5)          broken pass in 168863
 test-amd64-amd64-migrupgrade  6 host-install/src_host(6) broken pass in 168863
 test-amd64-amd64-migrupgrade  7 host-install/dst_host(7) broken pass in 168863
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 5 host-install(5) broken pass in 168863
 test-amd64-amd64-xl-qemut-debianhvm-amd64 5 host-install(5) broken pass in 168863
 test-amd64-amd64-dom0pvh-xl-intel  5 host-install(5)     broken pass in 168863
 test-amd64-amd64-libvirt-xsm  5 host-install(5)          broken pass in 168863
 test-amd64-amd64-qemuu-freebsd12-amd64 5 host-install(5) broken pass in 168863
 test-amd64-amd64-xl-rtds      5 host-install(5)          broken pass in 168863
 test-amd64-amd64-xl-pvhv2-intel  5 host-install(5)       broken pass in 168863
 test-xtf-amd64-amd64-3        5 host-install(5)          broken pass in 168863
 test-amd64-amd64-libvirt-pair 6 host-install/src_host(6) broken pass in 168863
 test-amd64-amd64-xl-qemuu-ovmf-amd64  5 host-install(5)  broken pass in 168863
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm 5 host-install(5) broken pass in 168863
 test-amd64-amd64-libvirt-pair 7 host-install/dst_host(7) broken pass in 168863
 test-amd64-amd64-xl-pvshim    5 host-install(5)          broken pass in 168863
 test-xtf-amd64-amd64-5        5 host-install(5)          broken pass in 168863
 test-amd64-amd64-xl-qemut-ws16-amd64  5 host-install(5)  broken pass in 168863
 test-amd64-amd64-xl-qemuu-ws16-amd64  5 host-install(5)  broken pass in 168863
 test-xtf-amd64-amd64-4        5 host-install(5)          broken pass in 168863
 test-amd64-amd64-xl-qemut-win7-amd64  5 host-install(5)  broken pass in 168863
 test-amd64-amd64-xl-qemuu-win7-amd64  5 host-install(5)  broken pass in 168863
 test-amd64-amd64-xl-multivcpu  5 host-install(5)         broken pass in 168863
 test-amd64-amd64-libvirt      5 host-install(5)          broken pass in 168863
 test-amd64-amd64-xl           5 host-install(5)          broken pass in 168863
 test-amd64-amd64-xl-credit1   5 host-install(5)          broken pass in 168863
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 5 host-install(5) broken pass in 168863
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm 5 host-install(5) broken pass in 168863
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 5 host-install(5) broken pass in 168863
 test-amd64-amd64-livepatch    5 host-install(5)          broken pass in 168863
 test-amd64-amd64-qemuu-freebsd11-amd64 5 host-install(5) broken pass in 168863
 test-amd64-amd64-libvirt-vhd  5 host-install(5)          broken pass in 168863
 test-amd64-amd64-pygrub       5 host-install(5)          broken pass in 168863
 test-armhf-armhf-xl-credit2   8 xen-boot                   fail pass in 168863

Tests which did not succeed, but are not blocking:
 test-amd64-i386-qemuu-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-xl            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-pvshim     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemut-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemut-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemut-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1)  blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-shadow     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-vhd        1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-xsm        1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl           1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-coresched-i386-xl  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-amd64  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-i386  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-amd64-i386-livepatch     1 build-check(1)               blocked  n/a
 test-amd64-i386-migrupgrade   1 build-check(1)               blocked  n/a
 test-amd64-i386-pair          1 build-check(1)               blocked  n/a
 test-amd64-i386-qemut-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemut-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop  fail in 168863 like 168502
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop  fail in 168863 like 168502
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop  fail in 168863 like 168502
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop   fail in 168863 like 168502
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail in 168863 like 168502
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop   fail in 168863 like 168502
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop  fail in 168863 like 168502
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop   fail in 168863 like 168502
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop   fail in 168863 like 168502
 test-amd64-i386-libvirt-xsm 15 migrate-support-check fail in 168863 never pass
 test-arm64-arm64-xl         15 migrate-support-check fail in 168863 never pass
 test-arm64-arm64-xl     16 saverestore-support-check fail in 168863 never pass
 test-amd64-i386-libvirt     15 migrate-support-check fail in 168863 never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check fail in 168863 never pass
 test-amd64-amd64-libvirt    15 migrate-support-check fail in 168863 never pass
 test-arm64-arm64-xl-credit1 15 migrate-support-check fail in 168863 never pass
 test-arm64-arm64-xl-credit1 16 saverestore-support-check fail in 168863 never pass
 test-arm64-arm64-xl-seattle 15 migrate-support-check fail in 168863 never pass
 test-arm64-arm64-xl-seattle 16 saverestore-support-check fail in 168863 never pass
 test-amd64-i386-xl-pvshim    14 guest-start          fail in 168863 never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail in 168863 never pass
 test-amd64-i386-libvirt-raw 14 migrate-support-check fail in 168863 never pass
 test-armhf-armhf-xl-credit2 15 migrate-support-check fail in 168863 never pass
 test-armhf-armhf-xl-credit2 16 saverestore-support-check fail in 168863 never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail in 168863 never pass
 test-arm64-arm64-xl-xsm     15 migrate-support-check fail in 168863 never pass
 test-arm64-arm64-xl-credit2 15 migrate-support-check fail in 168863 never pass
 test-arm64-arm64-xl-xsm 16 saverestore-support-check fail in 168863 never pass
 test-arm64-arm64-xl-credit2 16 saverestore-support-check fail in 168863 never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check fail in 168863 never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check fail in 168863 never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check fail in 168863 never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check fail in 168863 never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check fail in 168863 never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check fail in 168863 never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check fail in 168863 never pass
 test-arm64-arm64-xl-vhd     14 migrate-support-check fail in 168863 never pass
 test-arm64-arm64-xl-vhd 15 saverestore-support-check fail in 168863 never pass
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168502
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168502
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168502
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass

version targeted for testing:
 xen                  3c8e7395e2d01140c862c78fa9483e46c0dbd343
baseline version:
 xen                  cd751c09a5bab9f3529901fbe4d867ad7d52e89d

Last test of basis   168502  2022-03-10 09:07:57 Z   17 days
Testing same since   168863  2022-03-25 17:36:55 Z    2 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bjoern Doebel <doebel@amazon.de>
  Jan Beulich <jbeulich@suse.com>
  Jiamei Xie <jiamei.xie@arm.com>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Thiner Logoer <logoerthiner1@163.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  broken  
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-prev                                             pass    
 build-i386-prev                                              broken  
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            broken  
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             broken  
 test-xtf-amd64-amd64-1                                       broken  
 test-xtf-amd64-amd64-2                                       broken  
 test-xtf-amd64-amd64-3                                       broken  
 test-xtf-amd64-amd64-4                                       broken  
 test-xtf-amd64-amd64-5                                       broken  
 test-amd64-amd64-xl                                          broken  
 test-amd64-coresched-amd64-xl                                broken  
 test-arm64-arm64-xl                                          blocked 
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           blocked 
 test-amd64-coresched-i386-xl                                 blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           broken  
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        broken  
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         blocked 
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 broken  
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 broken  
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-libvirt-xsm                                 broken  
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-xl-xsm                                      broken  
 test-arm64-arm64-xl-xsm                                      blocked 
 test-amd64-i386-xl-xsm                                       blocked 
 test-amd64-amd64-qemuu-nested-amd                            broken  
 test-amd64-amd64-xl-pvhv2-amd                                broken  
 test-amd64-i386-qemut-rhel6hvm-amd                           blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-dom0pvh-xl-amd                              broken  
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    broken  
 test-amd64-i386-xl-qemut-debianhvm-amd64                     blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    broken  
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     blocked 
 test-amd64-i386-freebsd10-amd64                              blocked 
 test-amd64-amd64-qemuu-freebsd11-amd64                       broken  
 test-amd64-amd64-qemuu-freebsd12-amd64                       broken  
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         broken  
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         broken  
 test-amd64-i386-xl-qemut-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         broken  
 test-amd64-i386-xl-qemuu-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemut-ws16-amd64                         broken  
 test-amd64-i386-xl-qemut-ws16-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-ws16-amd64                         broken  
 test-amd64-i386-xl-qemuu-ws16-amd64                          blocked 
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  broken  
 test-arm64-arm64-xl-credit1                                  blocked 
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  broken  
 test-arm64-arm64-xl-credit2                                  blocked 
 test-armhf-armhf-xl-credit2                                  fail    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        broken  
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         blocked 
 test-amd64-i386-freebsd10-i386                               blocked 
 test-amd64-amd64-qemuu-nested-intel                          broken  
 test-amd64-amd64-xl-pvhv2-intel                              broken  
 test-amd64-i386-qemut-rhel6hvm-intel                         blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-amd64-dom0pvh-xl-intel                            broken  
 test-amd64-amd64-libvirt                                     broken  
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-livepatch                                   broken  
 test-amd64-i386-livepatch                                    blocked 
 test-amd64-amd64-migrupgrade                                 broken  
 test-amd64-i386-migrupgrade                                  blocked 
 test-amd64-amd64-xl-multivcpu                                broken  
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        broken  
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-libvirt-pair                                broken  
 test-amd64-i386-libvirt-pair                                 blocked 
 test-amd64-amd64-xl-pvshim                                   broken  
 test-amd64-i386-xl-pvshim                                    blocked 
 test-amd64-amd64-pygrub                                      broken  
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    broken  
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-xl-rtds                                     broken  
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             broken  
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              blocked 
 test-amd64-amd64-xl-shadow                                   broken  
 test-amd64-i386-xl-shadow                                    blocked 
 test-arm64-arm64-xl-thunderx                                 blocked 
 test-amd64-amd64-libvirt-vhd                                 broken  
 test-arm64-arm64-xl-vhd                                      blocked 
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job test-amd64-coresched-amd64-xl broken
broken-job test-amd64-amd64-xl-xsm broken
broken-job test-amd64-amd64-xl-shadow broken
broken-job test-amd64-amd64-xl-rtds broken
broken-job test-amd64-amd64-xl-qemuu-ws16-amd64 broken
broken-job test-amd64-amd64-xl-qemuu-win7-amd64 broken
broken-job test-amd64-amd64-xl-qemuu-ovmf-amd64 broken
broken-job test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict broken
broken-job test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm broken
broken-job test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow broken
broken-job test-amd64-amd64-xl-qemuu-debianhvm-amd64 broken
broken-job test-amd64-amd64-xl-qemut-ws16-amd64 broken
broken-job test-amd64-amd64-xl-qemut-win7-amd64 broken
broken-job test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm broken
broken-job test-amd64-amd64-xl-qemut-debianhvm-i386-xsm broken
broken-job build-arm64 broken
broken-job test-amd64-amd64-xl-qemut-debianhvm-amd64 broken
broken-job build-arm64-pvops broken
broken-job test-amd64-amd64-xl-qcow2 broken
broken-job build-arm64-xsm broken
broken-job test-amd64-amd64-xl-pvshim broken
broken-job build-i386 broken
broken-job test-amd64-amd64-xl-pvhv2-intel broken
broken-job build-i386-prev broken
broken-job test-amd64-amd64-xl-pvhv2-amd broken
broken-job build-i386-pvops broken
broken-job test-amd64-amd64-xl-multivcpu broken
broken-job build-i386-xsm broken
broken-job test-amd64-amd64-dom0pvh-xl-amd broken
broken-job test-amd64-amd64-dom0pvh-xl-intel broken
broken-job test-amd64-amd64-xl-credit2 broken
broken-job test-amd64-amd64-libvirt broken
broken-job test-amd64-amd64-libvirt-pair broken
broken-job test-amd64-amd64-xl-credit1 broken
broken-job test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm broken
broken-job test-amd64-amd64-libvirt-vhd broken
broken-job test-amd64-amd64-xl broken
broken-job test-amd64-amd64-libvirt-xsm broken
broken-job test-amd64-amd64-livepatch broken
broken-job test-amd64-amd64-qemuu-nested-intel broken
broken-job test-amd64-amd64-migrupgrade broken
broken-job test-amd64-amd64-pair broken
broken-job test-amd64-amd64-qemuu-nested-amd broken
broken-job test-amd64-amd64-pygrub broken
broken-job test-amd64-amd64-qemuu-freebsd11-amd64 broken
broken-job test-amd64-amd64-qemuu-freebsd12-amd64 broken
broken-job test-xtf-amd64-amd64-1 broken
broken-job test-xtf-amd64-amd64-2 broken
broken-job test-xtf-amd64-amd64-3 broken
broken-job test-xtf-amd64-amd64-4 broken
broken-job test-xtf-amd64-amd64-5 broken
broken-step test-amd64-amd64-xl-xsm host-install(5)
broken-step build-i386-xsm host-install(4)
broken-step test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow host-install(5)
broken-step test-xtf-amd64-amd64-2 host-install(5)
broken-step test-amd64-amd64-xl-qcow2 host-install(5)
broken-step test-amd64-amd64-pair host-install/src_host(6)
broken-step test-amd64-amd64-pair host-install/dst_host(7)
broken-step test-amd64-amd64-qemuu-nested-intel host-install(5)
broken-step build-i386 host-install(4)
broken-step test-amd64-amd64-xl-qemuu-debianhvm-amd64 host-install(5)
broken-step test-amd64-amd64-dom0pvh-xl-amd host-install(5)
broken-step test-amd64-amd64-qemuu-nested-amd host-install(5)
broken-step test-amd64-coresched-amd64-xl host-install(5)
broken-step build-i386-prev host-install(4)
broken-step test-amd64-amd64-xl-pvhv2-amd host-install(5)
broken-step test-amd64-amd64-xl-credit2 host-install(5)
broken-step test-amd64-amd64-xl-shadow host-install(5)
broken-step test-xtf-amd64-amd64-1 host-install(5)
broken-step test-amd64-amd64-migrupgrade host-install/src_host(6)
broken-step test-amd64-amd64-migrupgrade host-install/dst_host(7)
broken-step test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm host-install(5)
broken-step test-amd64-amd64-xl-qemut-debianhvm-amd64 host-install(5)
broken-step test-amd64-amd64-dom0pvh-xl-intel host-install(5)
broken-step test-amd64-amd64-libvirt-xsm host-install(5)
broken-step test-amd64-amd64-qemuu-freebsd12-amd64 host-install(5)
broken-step test-amd64-amd64-xl-rtds host-install(5)
broken-step test-amd64-amd64-xl-pvhv2-intel host-install(5)
broken-step test-xtf-amd64-amd64-3 host-install(5)
broken-step test-amd64-amd64-libvirt-pair host-install/src_host(6)
broken-step test-amd64-amd64-xl-qemuu-ovmf-amd64 host-install(5)
broken-step test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm host-install(5)
broken-step test-amd64-amd64-libvirt-pair host-install/dst_host(7)
broken-step test-amd64-amd64-xl-pvshim host-install(5)
broken-step test-xtf-amd64-amd64-5 host-install(5)
broken-step test-amd64-amd64-xl-qemut-ws16-amd64 host-install(5)
broken-step test-amd64-amd64-xl-qemuu-ws16-amd64 host-install(5)
broken-step test-xtf-amd64-amd64-4 host-install(5)
broken-step test-amd64-amd64-xl-qemut-win7-amd64 host-install(5)
broken-step test-amd64-amd64-xl-qemuu-win7-amd64 host-install(5)
broken-step test-amd64-amd64-xl-multivcpu host-install(5)
broken-step test-amd64-amd64-libvirt host-install(5)
broken-step test-amd64-amd64-xl host-install(5)
broken-step test-amd64-amd64-xl-credit1 host-install(5)
broken-step build-i386-pvops host-install(4)
broken-step test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict host-install(5)
broken-step test-amd64-amd64-xl-qemut-debianhvm-i386-xsm host-install(5)
broken-step test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm host-install(5)
broken-step build-arm64-pvops host-install(4)
broken-step build-arm64 host-install(4)
broken-step build-arm64-xsm host-install(4)
broken-step test-amd64-amd64-livepatch host-install(5)
broken-step test-amd64-amd64-qemuu-freebsd11-amd64 host-install(5)
broken-step test-amd64-amd64-libvirt-vhd host-install(5)
broken-step test-amd64-amd64-pygrub host-install(5)

Not pushing.

(No revision log; it would be 394 lines long.)


From xen-devel-bounces@lists.xenproject.org Sun Mar 27 22:55:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 27 Mar 2022 22:55:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295249.502333 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYbnW-0005uc-FZ; Sun, 27 Mar 2022 22:55:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295249.502333; Sun, 27 Mar 2022 22:55:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYbnW-0005uV-CA; Sun, 27 Mar 2022 22:55:46 +0000
Received: by outflank-mailman (input) for mailman id 295249;
 Sun, 27 Mar 2022 22:55:44 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYbnU-0005uK-QN; Sun, 27 Mar 2022 22:55:44 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYbnU-00046t-Mw; Sun, 27 Mar 2022 22:55:44 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYbnU-0007uT-Am; Sun, 27 Mar 2022 22:55:44 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nYbnU-0002bU-AL; Sun, 27 Mar 2022 22:55:44 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=ivZxh7mbHytXTb4tMrNKeTYh2xC2G1JnlNwZH1qGwpE=; b=GN9Q3oKHqsHifDx7IgVxMb9ZQX
	5opVMylYzOWAJsaXohwYC65oHQK6b/+xX2R9PU7jyjuq2K1Ghtv36X/LlBNZiKNV+u8KUuNOh9t9l
	TyXAjH9GoQZTvpDolw2lbsMnYIv1n9lo1lf+11rEro+kWFNVJk3gT2FYPXiPNL/61OYU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168873-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168873: trouble: blocked/broken/pass
X-Osstest-Failures:
    qemu-mainline:test-amd64-coresched-amd64-xl:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-xl-xsm:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-xl-shadow:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-xl-rtds:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:<job status>:broken:regression
    qemu-mainline:build-arm64-pvops:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-xl-qemuu-ovmf-amd64:<job status>:broken:regression
    qemu-mainline:build-i386:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:<job status>:broken:regression
    qemu-mainline:build-i386-pvops:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:<job status>:broken:regression
    qemu-mainline:build-i386-xsm:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-dom0pvh-xl-amd:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-dom0pvh-xl-intel:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-xl-qemuu-debianhvm-amd64:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-libvirt:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-libvirt-pair:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-xl-qcow2:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-libvirt-vhd:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-libvirt-xsm:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-xl-pvshim:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-pair:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-pygrub:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-xl-pvhv2-intel:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-qemuu-freebsd11-amd64:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-qemuu-freebsd12-amd64:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-xl-pvhv2-amd:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-qemuu-nested-intel:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-xl-multivcpu:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-xl:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-xl-credit1:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-xl-credit2:<job status>:broken:regression
    qemu-mainline:test-amd64-amd64-libvirt-xsm:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-qemuu-freebsd11-amd64:host-install(5):broken:regression
    qemu-mainline:build-i386-pvops:host-install(4):broken:regression
    qemu-mainline:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-dom0pvh-xl-amd:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-pygrub:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-xl:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-xl-qemuu-ovmf-amd64:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-dom0pvh-xl-intel:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-xl-qemuu-debianhvm-amd64:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-libvirt:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-xl-pvhv2-amd:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-xl-credit2:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-pair:host-install/src_host(6):broken:regression
    qemu-mainline:test-amd64-amd64-pair:host-install/dst_host(7):broken:regression
    qemu-mainline:test-amd64-amd64-xl-xsm:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-qemuu-freebsd12-amd64:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-xl-shadow:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-xl-pvhv2-intel:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-qemuu-nested-intel:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-xl-multivcpu:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-libvirt-pair:host-install/src_host(6):broken:regression
    qemu-mainline:test-amd64-amd64-libvirt-vhd:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-xl-pvshim:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-libvirt-pair:host-install/dst_host(7):broken:regression
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:host-install(5):broken:regression
    qemu-mainline:build-i386:host-install(4):broken:regression
    qemu-mainline:build-i386-xsm:host-install(4):broken:regression
    qemu-mainline:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-xl-qcow2:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-xl-credit1:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:host-install(5):broken:regression
    qemu-mainline:build-arm64-pvops:host-install(4):broken:regression
    qemu-mainline:test-amd64-coresched-amd64-xl:host-install(5):broken:regression
    qemu-mainline:test-amd64-amd64-xl-rtds:host-install(5):broken:allowable
    qemu-mainline:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-qemuu-rhel6hvm-amd:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-pair:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-freebsd10-i386:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-freebsd10-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-coresched-i386-xl:build-check(1):blocked:nonblocking
    qemu-mainline:build-i386-libvirt:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-qemuu-rhel6hvm-intel:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-shadow:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-vhd:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=3d31fe4d662f13c70eb7e87f29513623ccd76322
X-Osstest-Versions-That:
    qemuu=f345abe36527a8b575482bb5a0616f43952bf1f4
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 27 Mar 2022 22:55:44 +0000

flight 168873 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168873/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-coresched-amd64-xl    <job status>                 broken
 test-amd64-amd64-xl-xsm         <job status>                 broken
 test-amd64-amd64-xl-shadow      <job status>                 broken
 test-amd64-amd64-xl-rtds        <job status>                 broken
 test-amd64-amd64-xl-qemuu-ws16-amd64    <job status>                 broken
 build-arm64-pvops               <job status>                 broken
 test-amd64-amd64-xl-qemuu-win7-amd64    <job status>                 broken
 test-amd64-amd64-xl-qemuu-ovmf-amd64    <job status>                 broken
 build-i386                      <job status>                 broken
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict    <job status>   broken
 build-i386-pvops                <job status>                 broken
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm    <job status>            broken
 build-i386-xsm                  <job status>                 broken
 test-amd64-amd64-dom0pvh-xl-amd    <job status>                 broken
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow    <job status>        broken
 test-amd64-amd64-dom0pvh-xl-intel    <job status>                 broken
 test-amd64-amd64-xl-qemuu-debianhvm-amd64    <job status>               broken
 test-amd64-amd64-libvirt        <job status>                 broken
 test-amd64-amd64-libvirt-pair    <job status>                 broken
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm    <job status>      broken
 test-amd64-amd64-xl-qcow2       <job status>                 broken
 test-amd64-amd64-libvirt-vhd    <job status>                 broken
 test-amd64-amd64-libvirt-xsm    <job status>                 broken
 test-amd64-amd64-xl-pvshim      <job status>                 broken
 test-amd64-amd64-pair           <job status>                 broken
 test-amd64-amd64-pygrub         <job status>                 broken
 test-amd64-amd64-xl-pvhv2-intel    <job status>                 broken
 test-amd64-amd64-qemuu-freebsd11-amd64    <job status>                 broken
 test-amd64-amd64-qemuu-freebsd12-amd64    <job status>                 broken
 test-amd64-amd64-xl-pvhv2-amd    <job status>                 broken
 test-amd64-amd64-qemuu-nested-amd    <job status>                 broken
 test-amd64-amd64-qemuu-nested-intel    <job status>                 broken
 test-amd64-amd64-xl-multivcpu    <job status>                 broken
 test-amd64-amd64-xl             <job status>                 broken
 test-amd64-amd64-xl-credit1     <job status>                 broken
 test-amd64-amd64-xl-credit2     <job status>                 broken
 test-amd64-amd64-libvirt-xsm  5 host-install(5)        broken REGR. vs. 168856
 test-amd64-amd64-qemuu-freebsd11-amd64 5 host-install(5) broken REGR. vs. 168856
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168856
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow 5 host-install(5) broken REGR. vs. 168856
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm 5 host-install(5) broken REGR. vs. 168856
 test-amd64-amd64-dom0pvh-xl-amd  5 host-install(5)     broken REGR. vs. 168856
 test-amd64-amd64-pygrub       5 host-install(5)        broken REGR. vs. 168856
 test-amd64-amd64-qemuu-nested-amd  5 host-install(5)   broken REGR. vs. 168856
 test-amd64-amd64-xl           5 host-install(5)        broken REGR. vs. 168856
 test-amd64-amd64-xl-qemuu-ovmf-amd64 5 host-install(5) broken REGR. vs. 168856
 test-amd64-amd64-dom0pvh-xl-intel  5 host-install(5)   broken REGR. vs. 168856
 test-amd64-amd64-xl-qemuu-debianhvm-amd64 5 host-install(5) broken REGR. vs. 168856
 test-amd64-amd64-libvirt      5 host-install(5)        broken REGR. vs. 168856
 test-amd64-amd64-xl-pvhv2-amd  5 host-install(5)       broken REGR. vs. 168856
 test-amd64-amd64-xl-credit2   5 host-install(5)        broken REGR. vs. 168856
 test-amd64-amd64-pair       6 host-install/src_host(6) broken REGR. vs. 168856
 test-amd64-amd64-pair       7 host-install/dst_host(7) broken REGR. vs. 168856
 test-amd64-amd64-xl-xsm       5 host-install(5)        broken REGR. vs. 168856
 test-amd64-amd64-qemuu-freebsd12-amd64 5 host-install(5) broken REGR. vs. 168856
 test-amd64-amd64-xl-qemuu-win7-amd64 5 host-install(5) broken REGR. vs. 168856
 test-amd64-amd64-xl-shadow    5 host-install(5)        broken REGR. vs. 168856
 test-amd64-amd64-xl-pvhv2-intel  5 host-install(5)     broken REGR. vs. 168856
 test-amd64-amd64-qemuu-nested-intel  5 host-install(5) broken REGR. vs. 168856
 test-amd64-amd64-xl-multivcpu  5 host-install(5)       broken REGR. vs. 168856
 test-amd64-amd64-libvirt-pair 6 host-install/src_host(6) broken REGR. vs. 168856
 test-amd64-amd64-libvirt-vhd  5 host-install(5)        broken REGR. vs. 168856
 test-amd64-amd64-xl-pvshim    5 host-install(5)        broken REGR. vs. 168856
 test-amd64-amd64-libvirt-pair 7 host-install/dst_host(7) broken REGR. vs. 168856
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 5 host-install(5) broken REGR. vs. 168856
 build-i386                    4 host-install(4)        broken REGR. vs. 168856
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168856
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 5 host-install(5) broken REGR. vs. 168856
 test-amd64-amd64-xl-qcow2     5 host-install(5)        broken REGR. vs. 168856
 test-amd64-amd64-xl-credit1   5 host-install(5)        broken REGR. vs. 168856
 test-amd64-amd64-xl-qemuu-ws16-amd64 5 host-install(5) broken REGR. vs. 168856
 build-arm64-pvops             4 host-install(4)        broken REGR. vs. 168856
 test-amd64-coresched-amd64-xl  5 host-install(5)       broken REGR. vs. 168856

Regressions which are regarded as allowable (not blocking):
 test-amd64-amd64-xl-rtds      5 host-install(5)        broken REGR. vs. 168856

Tests which did not succeed, but are not blocking:
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl           1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 test-amd64-i386-qemuu-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-pair          1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-i386  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-amd64  1 build-check(1)               blocked  n/a
 test-amd64-coresched-i386-xl  1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-xl            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-pvshim     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1)  blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-shadow     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-vhd        1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-xsm        1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168856
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168856
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168856
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 qemuu                3d31fe4d662f13c70eb7e87f29513623ccd76322
baseline version:
 qemuu                f345abe36527a8b575482bb5a0616f43952bf1f4

Last test of basis   168856  2022-03-25 15:08:16 Z    2 days
Testing same since   168873  2022-03-26 10:38:21 Z    1 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Peter Maydell <peter.maydell@linaro.org>
  Richard Henderson <richard.henderson@linaro.org>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               broken  
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            broken  
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             broken  
 test-amd64-amd64-xl                                          broken  
 test-amd64-coresched-amd64-xl                                broken  
 test-arm64-arm64-xl                                          blocked 
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           blocked 
 test-amd64-coresched-i386-xl                                 blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           broken  
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 broken  
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-libvirt-xsm                                 broken  
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-xl-xsm                                      broken  
 test-arm64-arm64-xl-xsm                                      blocked 
 test-amd64-i386-xl-xsm                                       blocked 
 test-amd64-amd64-qemuu-nested-amd                            broken  
 test-amd64-amd64-xl-pvhv2-amd                                broken  
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-dom0pvh-xl-amd                              broken  
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    broken  
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     blocked 
 test-amd64-i386-freebsd10-amd64                              blocked 
 test-amd64-amd64-qemuu-freebsd11-amd64                       broken  
 test-amd64-amd64-qemuu-freebsd12-amd64                       broken  
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         broken  
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         broken  
 test-amd64-i386-xl-qemuu-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-ws16-amd64                         broken  
 test-amd64-i386-xl-qemuu-ws16-amd64                          blocked 
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  broken  
 test-arm64-arm64-xl-credit1                                  blocked 
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  broken  
 test-arm64-arm64-xl-credit2                                  blocked 
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        broken  
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         blocked 
 test-amd64-i386-freebsd10-i386                               blocked 
 test-amd64-amd64-qemuu-nested-intel                          broken  
 test-amd64-amd64-xl-pvhv2-intel                              broken  
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-amd64-dom0pvh-xl-intel                            broken  
 test-amd64-amd64-libvirt                                     broken  
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-xl-multivcpu                                broken  
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        broken  
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-libvirt-pair                                broken  
 test-amd64-i386-libvirt-pair                                 blocked 
 test-amd64-amd64-xl-pvshim                                   broken  
 test-amd64-i386-xl-pvshim                                    blocked 
 test-amd64-amd64-pygrub                                      broken  
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    broken  
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-xl-rtds                                     broken  
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             broken  
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              blocked 
 test-amd64-amd64-xl-shadow                                   broken  
 test-amd64-i386-xl-shadow                                    blocked 
 test-arm64-arm64-xl-thunderx                                 blocked 
 test-amd64-amd64-libvirt-vhd                                 broken  
 test-arm64-arm64-xl-vhd                                      blocked 
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job test-amd64-coresched-amd64-xl broken
broken-job test-amd64-amd64-xl-xsm broken
broken-job test-amd64-amd64-xl-shadow broken
broken-job test-amd64-amd64-xl-rtds broken
broken-job test-amd64-amd64-xl-qemuu-ws16-amd64 broken
broken-job build-arm64-pvops broken
broken-job test-amd64-amd64-xl-qemuu-win7-amd64 broken
broken-job test-amd64-amd64-xl-qemuu-ovmf-amd64 broken
broken-job build-i386 broken
broken-job test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict broken
broken-job build-i386-pvops broken
broken-job test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm broken
broken-job build-i386-xsm broken
broken-job test-amd64-amd64-dom0pvh-xl-amd broken
broken-job test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow broken
broken-job test-amd64-amd64-dom0pvh-xl-intel broken
broken-job test-amd64-amd64-xl-qemuu-debianhvm-amd64 broken
broken-job test-amd64-amd64-libvirt broken
broken-job test-amd64-amd64-libvirt-pair broken
broken-job test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm broken
broken-job test-amd64-amd64-xl-qcow2 broken
broken-job test-amd64-amd64-libvirt-vhd broken
broken-job test-amd64-amd64-libvirt-xsm broken
broken-job test-amd64-amd64-xl-pvshim broken
broken-job test-amd64-amd64-pair broken
broken-job test-amd64-amd64-pygrub broken
broken-job test-amd64-amd64-xl-pvhv2-intel broken
broken-job test-amd64-amd64-qemuu-freebsd11-amd64 broken
broken-job test-amd64-amd64-qemuu-freebsd12-amd64 broken
broken-job test-amd64-amd64-xl-pvhv2-amd broken
broken-job test-amd64-amd64-qemuu-nested-amd broken
broken-job test-amd64-amd64-qemuu-nested-intel broken
broken-job test-amd64-amd64-xl-multivcpu broken
broken-job test-amd64-amd64-xl broken
broken-job test-amd64-amd64-xl-credit1 broken
broken-job test-amd64-amd64-xl-credit2 broken
broken-step test-amd64-amd64-libvirt-xsm host-install(5)
broken-step test-amd64-amd64-qemuu-freebsd11-amd64 host-install(5)
broken-step build-i386-pvops host-install(4)
broken-step test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow host-install(5)
broken-step test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm host-install(5)
broken-step test-amd64-amd64-dom0pvh-xl-amd host-install(5)
broken-step test-amd64-amd64-pygrub host-install(5)
broken-step test-amd64-amd64-qemuu-nested-amd host-install(5)
broken-step test-amd64-amd64-xl host-install(5)
broken-step test-amd64-amd64-xl-qemuu-ovmf-amd64 host-install(5)
broken-step test-amd64-amd64-dom0pvh-xl-intel host-install(5)
broken-step test-amd64-amd64-xl-qemuu-debianhvm-amd64 host-install(5)
broken-step test-amd64-amd64-libvirt host-install(5)
broken-step test-amd64-amd64-xl-pvhv2-amd host-install(5)
broken-step test-amd64-amd64-xl-credit2 host-install(5)
broken-step test-amd64-amd64-pair host-install/src_host(6)
broken-step test-amd64-amd64-pair host-install/dst_host(7)
broken-step test-amd64-amd64-xl-xsm host-install(5)
broken-step test-amd64-amd64-qemuu-freebsd12-amd64 host-install(5)
broken-step test-amd64-amd64-xl-qemuu-win7-amd64 host-install(5)
broken-step test-amd64-amd64-xl-shadow host-install(5)
broken-step test-amd64-amd64-xl-pvhv2-intel host-install(5)
broken-step test-amd64-amd64-qemuu-nested-intel host-install(5)
broken-step test-amd64-amd64-xl-multivcpu host-install(5)
broken-step test-amd64-amd64-xl-rtds host-install(5)
broken-step test-amd64-amd64-libvirt-pair host-install/src_host(6)
broken-step test-amd64-amd64-libvirt-vhd host-install(5)
broken-step test-amd64-amd64-xl-pvshim host-install(5)
broken-step test-amd64-amd64-libvirt-pair host-install/dst_host(7)
broken-step test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm host-install(5)
broken-step build-i386 host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict host-install(5)
broken-step test-amd64-amd64-xl-qcow2 host-install(5)
broken-step test-amd64-amd64-xl-credit1 host-install(5)
broken-step test-amd64-amd64-xl-qemuu-ws16-amd64 host-install(5)
broken-step build-arm64-pvops host-install(4)
broken-step test-amd64-coresched-amd64-xl host-install(5)

Not pushing.

------------------------------------------------------------
commit 3d31fe4d662f13c70eb7e87f29513623ccd76322
Merge: f345abe365 c7ca3ad5e7
Author: Peter Maydell <peter.maydell@linaro.org>
Date:   Fri Mar 25 15:02:39 2022 +0000

    Merge tag 'pull-target-arm-20220325' of https://git.linaro.org/people/pmaydell/qemu-arm into staging
    
    target-arm queue:
     * hw/intc/arm_gicv3_its: Add missing newlines to process_mapc() logging
     * target/arm: Fix sve_ld1_z and sve_st1_z vs MMIO
    
    # gpg: Signature made Fri 25 Mar 2022 14:56:48 GMT
    # gpg:                using RSA key E1A5C593CD419DE28E8315CF3C2525ED14360CDE
    # gpg:                issuer "peter.maydell@linaro.org"
    # gpg: Good signature from "Peter Maydell <peter.maydell@linaro.org>" [ultimate]
    # gpg:                 aka "Peter Maydell <pmaydell@gmail.com>" [ultimate]
    # gpg:                 aka "Peter Maydell <pmaydell@chiark.greenend.org.uk>" [ultimate]
    # Primary key fingerprint: E1A5 C593 CD41 9DE2 8E83  15CF 3C25 25ED 1436 0CDE
    
    * tag 'pull-target-arm-20220325' of https://git.linaro.org/people/pmaydell/qemu-arm:
      hw/intc/arm_gicv3_its: Add missing newlines to process_mapc() logging
      target/arm: Fix sve_ld1_z and sve_st1_z vs MMIO
    
    Signed-off-by: Peter Maydell <peter.maydell@linaro.org>

commit c7ca3ad5e756e263daf082c315e311593ccec3d1
Author: Peter Maydell <peter.maydell@linaro.org>
Date:   Fri Mar 25 14:41:06 2022 +0000

    hw/intc/arm_gicv3_its: Add missing newlines to process_mapc() logging
    
    In commit 84d43d2e82da we rearranged the logging of errors in
    process_mapc(), and inadvertently dropped the trailing newlines
    from the log messages. Restore them. The same commit also
    attempted to switch the ICID printing to hex (which is how we
    print ICIDs elsewhere) but only did half the job, adding the
    0x prefix but leaving the format string at %d; correct to %x.
    
    Fixes: 84d43d2e82da ("hw/intc/arm_gicv3_its: In MAPC with V=0, don't check rdbase field")
    Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
    Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
    Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>

commit 6222c3acc4f36fc31d057e1afb6b5c408f83d343
Author: Richard Henderson <richard.henderson@linaro.org>
Date:   Fri Mar 25 14:41:06 2022 +0000

    target/arm: Fix sve_ld1_z and sve_st1_z vs MMIO
    
    Both of these functions missed handling the TLB_MMIO flag
    during the conversion to handle MTE.
    
    Fixes: 10a85e2c8ab6 ("target/arm: Reuse sve_probe_page for gather loads")
    Resolves: https://gitlab.com/qemu-project/qemu/-/issues/925
    Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
    Message-id: 20220324010932.190428-1-richard.henderson@linaro.org
    Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
    Signed-off-by: Peter Maydell <peter.maydell@linaro.org>


From xen-devel-bounces@lists.xenproject.org Sun Mar 27 23:30:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Sun, 27 Mar 2022 23:30:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295257.502345 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYcKp-0001hz-CY; Sun, 27 Mar 2022 23:30:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295257.502345; Sun, 27 Mar 2022 23:30:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYcKp-0001hs-8p; Sun, 27 Mar 2022 23:30:11 +0000
Received: by outflank-mailman (input) for mailman id 295257;
 Sun, 27 Mar 2022 23:30:09 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYcKn-0001hi-KQ; Sun, 27 Mar 2022 23:30:09 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYcKn-0004hF-Gq; Sun, 27 Mar 2022 23:30:09 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYcKm-0000D7-Va; Sun, 27 Mar 2022 23:30:09 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nYcKm-0003ly-VA; Sun, 27 Mar 2022 23:30:08 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=kgy1iqYxpb9Q1AHMQ34SNf8uAx7aGNvg7mHXlt3hrsM=; b=w6T1z2axJld/soPNhVxy4sxd8f
	BBk5Gl8JYC45dxn0qpi4EdasfOrxWnRo8NPUcXkegXO8OJu75/rAYKmqoVzEpTutihpKe1g+RQHJi
	ZqXd42EzS4ZUPtQKxo/vyPTy+rp54gfrmZbP0Gc8V4NgMEMLN1auSHFomk+B/oo596rI=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168897-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168897: trouble: blocked/broken/pass
X-Osstest-Failures:
    linux-linus:build-amd64:<job status>:broken:regression
    linux-linus:build-amd64-pvops:<job status>:broken:regression
    linux-linus:build-amd64-xsm:<job status>:broken:regression
    linux-linus:build-arm64:<job status>:broken:regression
    linux-linus:build-arm64-pvops:<job status>:broken:regression
    linux-linus:build-arm64-xsm:<job status>:broken:regression
    linux-linus:build-armhf-pvops:<job status>:broken:regression
    linux-linus:build-i386:<job status>:broken:regression
    linux-linus:build-i386-pvops:<job status>:broken:regression
    linux-linus:build-i386-xsm:<job status>:broken:regression
    linux-linus:build-i386-xsm:host-install(4):broken:regression
    linux-linus:build-armhf-pvops:host-install(4):broken:regression
    linux-linus:build-arm64-pvops:host-install(4):broken:regression
    linux-linus:build-i386:host-install(4):broken:regression
    linux-linus:build-i386-pvops:host-install(4):broken:regression
    linux-linus:build-arm64:host-install(4):broken:regression
    linux-linus:build-arm64-xsm:host-install(4):broken:regression
    linux-linus:build-amd64:host-install(4):broken:regression
    linux-linus:build-amd64-xsm:host-install(4):broken:regression
    linux-linus:build-amd64-pvops:host-install(4):broken:regression
    linux-linus:test-armhf-armhf-xl:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-examine:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-coresched-amd64-xl:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-vhd:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-shadow:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-rtds:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    linux-linus:build-amd64-libvirt:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    linux-linus:build-arm64-libvirt:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    linux-linus:build-i386-libvirt:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-pvshim:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-dom0pvh-xl-amd:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-pvhv2-intel:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-dom0pvh-xl-intel:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-pvhv2-amd:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-examine:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-examine-bios:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-examine-uefi:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-multivcpu:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-freebsd11-amd64:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-freebsd12-amd64:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-credit2:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-credit1:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-intel:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-pair:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-pygrub:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-examine:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    linux=f022814633e1c600507b3a99691b4d624c2813f0
X-Osstest-Versions-That:
    linux=34af78c4e616c359ed428d79fe4758a35d2c5473
From: osstest service owner <osstest-admin@xenproject.org>
Date: Sun, 27 Mar 2022 23:30:08 +0000

flight 168897 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168897/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-arm64                     <job status>                 broken
 build-arm64-pvops               <job status>                 broken
 build-arm64-xsm                 <job status>                 broken
 build-armhf-pvops               <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168838
 build-armhf-pvops             4 host-install(4)        broken REGR. vs. 168838
 build-arm64-pvops             4 host-install(4)        broken REGR. vs. 168838
 build-i386                    4 host-install(4)        broken REGR. vs. 168838
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168838
 build-arm64                   4 host-install(4)        broken REGR. vs. 168838
 build-arm64-xsm               4 host-install(4)        broken REGR. vs. 168838
 build-amd64                   4 host-install(4)        broken REGR. vs. 168838
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 168838
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 168838

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-arndale   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit1   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-cubietruck  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-rtds      1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-examine      1 build-check(1)               blocked  n/a
 test-amd64-coresched-amd64-xl  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-xsm       1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-vhd       1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-shadow    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-rtds      1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ws16-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1) blocked n/a
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qemut-ws16-amd64  1 build-check(1)             blocked n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-xl-qemut-debianhvm-amd64  1 build-check(1)        blocked n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvshim    1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-examine      1 build-check(1)               blocked  n/a
 test-amd64-amd64-examine-bios  1 build-check(1)               blocked  n/a
 test-amd64-amd64-examine-uefi  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-amd64-amd64-freebsd11-amd64  1 build-check(1)               blocked  n/a
 test-amd64-amd64-freebsd12-amd64  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit2   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit1   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl           1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-intel  1 build-check(1)              blocked n/a
 test-amd64-amd64-pair         1 build-check(1)               blocked  n/a
 test-amd64-amd64-pygrub       1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-amd  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl           1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 test-armhf-armhf-examine      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a

version targeted for testing:
 linux                f022814633e1c600507b3a99691b4d624c2813f0
baseline version:
 linux                34af78c4e616c359ed428d79fe4758a35d2c5473

Last test of basis   168838  2022-03-25 06:20:14 Z    2 days
Failing since        168866  2022-03-25 20:12:03 Z    2 days    2 attempts
Testing same since   168897  2022-03-27 13:00:17 Z    0 days    1 attempts

------------------------------------------------------------
416 people touched revisions under test,
not listing them all

jobs:
 build-amd64-xsm                                              broken  
 build-arm64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64                                                  broken  
 build-arm64                                                  broken  
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            broken  
 build-arm64-pvops                                            broken  
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-amd64-amd64-xl                                          blocked 
 test-amd64-coresched-amd64-xl                                blocked 
 test-arm64-arm64-xl                                          blocked 
 test-armhf-armhf-xl                                          blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        blocked 
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-amd64-xl-xsm                                      blocked 
 test-arm64-arm64-xl-xsm                                      blocked 
 test-amd64-amd64-qemuu-nested-amd                            blocked 
 test-amd64-amd64-xl-pvhv2-amd                                blocked 
 test-amd64-amd64-dom0pvh-xl-amd                              blocked 
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    blocked 
 test-amd64-amd64-freebsd11-amd64                             blocked 
 test-amd64-amd64-freebsd12-amd64                             blocked 
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         blocked 
 test-amd64-amd64-xl-qemut-ws16-amd64                         blocked 
 test-amd64-amd64-xl-qemuu-ws16-amd64                         blocked 
 test-armhf-armhf-xl-arndale                                  blocked 
 test-amd64-amd64-examine-bios                                blocked 
 test-amd64-amd64-xl-credit1                                  blocked 
 test-arm64-arm64-xl-credit1                                  blocked 
 test-armhf-armhf-xl-credit1                                  blocked 
 test-amd64-amd64-xl-credit2                                  blocked 
 test-arm64-arm64-xl-credit2                                  blocked 
 test-armhf-armhf-xl-credit2                                  blocked 
 test-armhf-armhf-xl-cubietruck                               blocked 
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        blocked 
 test-amd64-amd64-examine                                     blocked 
 test-arm64-arm64-examine                                     blocked 
 test-armhf-armhf-examine                                     blocked 
 test-amd64-amd64-qemuu-nested-intel                          blocked 
 test-amd64-amd64-xl-pvhv2-intel                              blocked 
 test-amd64-amd64-dom0pvh-xl-intel                            blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-amd64-xl-multivcpu                                blocked 
 test-armhf-armhf-xl-multivcpu                                blocked 
 test-amd64-amd64-pair                                        blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-amd64-xl-pvshim                                   blocked 
 test-amd64-amd64-pygrub                                      blocked 
 test-amd64-amd64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-amd64-amd64-libvirt-raw                                 blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-amd64-xl-rtds                                     blocked 
 test-armhf-armhf-xl-rtds                                     blocked 
 test-arm64-arm64-xl-seattle                                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             blocked 
 test-amd64-amd64-xl-shadow                                   blocked 
 test-arm64-arm64-xl-thunderx                                 blocked 
 test-amd64-amd64-examine-uefi                                blocked 
 test-amd64-amd64-xl-vhd                                      blocked 
 test-arm64-arm64-xl-vhd                                      blocked 
 test-armhf-armhf-xl-vhd                                      blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-arm64 broken
broken-job build-arm64-pvops broken
broken-job build-arm64-xsm broken
broken-job build-armhf-pvops broken
broken-job build-i386 broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-i386-xsm host-install(4)
broken-step build-armhf-pvops host-install(4)
broken-step build-arm64-pvops host-install(4)
broken-step build-i386 host-install(4)
broken-step build-i386-pvops host-install(4)
broken-step build-arm64 host-install(4)
broken-step build-arm64-xsm host-install(4)
broken-step build-amd64 host-install(4)
broken-step build-amd64-xsm host-install(4)
broken-step build-amd64-pvops host-install(4)

Not pushing.

(No revision log; it would be 30028 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 02:12:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 02:12:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295275.502380 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYes4-0002Fn-SR; Mon, 28 Mar 2022 02:12:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295275.502380; Mon, 28 Mar 2022 02:12:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYes4-0002Ff-Mz; Mon, 28 Mar 2022 02:12:40 +0000
Received: by outflank-mailman (input) for mailman id 295275;
 Mon, 28 Mar 2022 02:12:39 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=GJzZ=UH=invisiblethingslab.com=marmarek@srs-se1.protection.inumbo.net>)
 id 1nYes3-0002FX-18
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 02:12:39 +0000
Received: from out3-smtp.messagingengine.com (out3-smtp.messagingengine.com
 [66.111.4.27]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 87d73073-ae3c-11ec-a405-831a346695d4;
 Mon, 28 Mar 2022 04:12:37 +0200 (CEST)
Received: from compute5.internal (compute5.nyi.internal [10.202.2.45])
 by mailout.nyi.internal (Postfix) with ESMTP id C0C155C020F;
 Sun, 27 Mar 2022 22:12:33 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163])
 by compute5.internal (MEProxy); Sun, 27 Mar 2022 22:12:33 -0400
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Sun,
 27 Mar 2022 22:12:32 -0400 (EDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 87d73073-ae3c-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:cc:content-type:date:date:from:from
	:in-reply-to:in-reply-to:message-id:mime-version:references
	:reply-to:sender:subject:subject:to:to:x-me-proxy:x-me-proxy
	:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=9t2EleITAOfSKUTni
	7B+knWPJP1OOCutW/VQVn038jw=; b=LWu+R3ScPZY/fZgzrwyfONUYB3Bcb+jMF
	/dj9Gtnr9aooL5NoSA8I4gvlWJdoygIWdWxtE+JjCvjAdq9c6Q47yWccIctY7wX1
	ur4XkeLXAmom56pkybwzLRyWosNdgKxRC37+VeVh+NTUaab8gNN7hNtq37cvJqjI
	sREO+jYMe4rzkS77aQ2yc15kFRR4UdNAILwgINSaGJ7V6Y/vcLLvjEThsTfsRBtf
	5nvY7uNziBJ5iK0f3e0Fv6dD0/L9XNS09r6QNTOQhwTwsfDpJDXPu5FHZe2xdFkx
	FFchUKKdHiCGfe/V1iRDGd6C/jXx8fHvuT6lOfAZPFrXABoLSCLIA==
X-ME-Sender: <xms:kRlBYsTku-erb-ujuIVmjwufnRleJk1BbVQC0u0wXJGZS-hnsMAkyA>
    <xme:kRlBYpybLp954MSBcAavk5faezUxTn0UJFw3dkeqegBh3guVzZ9u7HKukiruhkW8O
    xy-Bk_kqie7lQ>
X-ME-Received: <xmr:kRlBYp3B1lm7aUZ1jS1ywibiHsGiunAhrGwEBwiimmy4A9ci_kKBTvNhmYzSNg9GXf9xZlFT6qodS4z9vBqz4gY2anx-Mbs8SA>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddrudehiedgheeiucetufdoteggodetrfdotf
    fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen
    uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne
    cujfgurhepfffhvffukfhfgggtuggjsehgtderredttdejnecuhfhrohhmpeforghrvghk
    ucforghrtgiihihkohifshhkihdqifpkrhgvtghkihcuoehmrghrmhgrrhgvkhesihhnvh
    hishhisghlvghthhhinhhgshhlrggsrdgtohhmqeenucggtffrrghtthgvrhhnpeekfedt
    kefggedugfdvgfegtdelveektdekgfejteegveeijeeutdeuvedulefgffenucffohhmrg
    hinhepgigvnhhprhhojhgvtghtrdhorhhgpdhquhgsvghsqdhoshdrohhrghenucevlhhu
    shhtvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpehmrghrmhgrrhgvkh
    esihhnvhhishhisghlvghthhhinhhgshhlrggsrdgtohhm
X-ME-Proxy: <xmx:kRlBYgDqAhrNOOXvXn2hqpcfCfHdqJujo00OSi2De5FZqjtrXmeGYA>
    <xmx:kRlBYlhmvaUhWa-Zpv8-VCyCD6BfJGW3IBMvKMedYpoTZtZ6GtkQqA>
    <xmx:kRlBYso_nuV7NNtaKzke0tU0FaRbYKwqH_F3Y-HQsjPzrOAmaJVwMA>
    <xmx:kRlBYovmfS_b76j12_yhuJgO5ect32H1r3DsAJi2lZBRjFaWOLuJ4Q>
Date: Mon, 28 Mar 2022 04:12:29 +0200
From: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: Damien Miller <djm@mindrot.org>
Cc: Demi Marie Obenour <demi@invisiblethingslab.com>,
	Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>,
	Xen developer discussion <xen-devel@lists.xenproject.org>,
	OpenBSD technical mailing list <tech@openbsd.org>
Subject: Re: Security support status of xnf(4) and xbf(4)
Message-ID: <YkEZjYJOcjaRhP89@mail-itl>
References: <Yj3qW/y20htoSvuK@itl-email>
 <37a4b6-cd56-1993-be2-b5522b9aa4d7@mindrot.org>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="ZKs4wXnCuVSz9WDk"
Content-Disposition: inline
In-Reply-To: <37a4b6-cd56-1993-be2-b5522b9aa4d7@mindrot.org>


--ZKs4wXnCuVSz9WDk
Content-Type: text/plain; protected-headers=v1; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Date: Mon, 28 Mar 2022 04:12:29 +0200
From: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: Damien Miller <djm@mindrot.org>
Cc: Demi Marie Obenour <demi@invisiblethingslab.com>,
	Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>,
	Xen developer discussion <xen-devel@lists.xenproject.org>,
	OpenBSD technical mailing list <tech@openbsd.org>
Subject: Re: Security support status of xnf(4) and xbf(4)

On Mon, Mar 28, 2022 at 12:45:24PM +1100, Damien Miller wrote:
> On Fri, 25 Mar 2022, Demi Marie Obenour wrote:
>=20
> > Linux=E2=80=99s netfront and blkfront drivers recently had a security
> > vulnerability (XSA-396) that allowed a malicious backend to potentially
> > compromise them.  In follow-up audits, I found that OpenBSD=E2=80=99s x=
nf(4)
> > currently trusts the backend domain.  I reported this privately to Theo
> > de Raadt, who indicated that OpenBSD does not consider this to be a
> > security concern.
> >=20
> > This is obviously a valid position for the OpenBSD project to take, but
> > it is surprising to some (such as myself) from the broader Xen
> > ecosystem.  Standard practice in the Xen world is that bugs in frontends
> > that allow a malicious backend to cause mischief *are* considered
> > security bugs unless there is explicit documentation to the contrary.
> > As such, I believe this deserves to be noted in xnf(4) and xbf(4)=E2=80=
=99s man
> > pages.  If the OpenBSD project agrees, I am willing to write a patch,
> > but I have no experience with mandoc so it might take a few tries.
>=20
> Hang on, what is a "malicious backend" in this context? Is it something
> other than the Xen Hypervisor? If not, then it seems not to be a useful
> attack model, as the hypervisor typically has near-complete access to
> guests' memory and CPU state.

No, Xen supports running backends for PV devices in arbitrary domain,
not only dom0. You can read more about it at
https://wiki.xenproject.org/wiki/Driver_Domain
See also Andrew's response, Xen is way more disaggregated than KVM.

Qubes OS makes heavy use of this feature - for example network traffic
never passes through dom0 (which has no network interfaces at all!). You
can read more about it at the link below (especially look for the
diagram at the end, if you want just a quick look):
https://www.qubes-os.org/doc/architecture/

--=20
Best Regards,
Marek Marczykowski-G=C3=B3recki
Invisible Things Lab

--ZKs4wXnCuVSz9WDk
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAmJBGY4ACgkQ24/THMrX
1yx0vQgAkNtrh8mQbf7AKPIp0HO470TPuT2c9uReJpxpfDWJRA/EQsB4+0Xbafw7
xLv3QN/xd9ZHbK2SC6RZQI59ETTs3tUHa2Agsoo9I7uwPdL/Hdob4d3iIqcQbIzJ
lwWRdIrzJnldHRaF3bNkwR5XaCYRUi+aJJziSP/OeYkmscVquA+VSStwBrQFpEG6
azSwSbPkak56O5zhCTCpRMu9dRdkKOjKG3PtbO26bAGOst+daJHG6WLwCcgnGwmB
gmh6pRwFx6CE4tCCOkChpsITGz9yLL58eVAgDaZP6h4q4mlFd5S4DtEKF35ETdxL
0ep8tDZxUm9wZmgKbeWORjBkn8Az8Q==
=3zdN
-----END PGP SIGNATURE-----

--ZKs4wXnCuVSz9WDk--


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 02:13:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 02:13:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295279.502390 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYet9-0002qU-7R; Mon, 28 Mar 2022 02:13:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295279.502390; Mon, 28 Mar 2022 02:13:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYet9-0002qN-4F; Mon, 28 Mar 2022 02:13:47 +0000
Received: by outflank-mailman (input) for mailman id 295279;
 Mon, 28 Mar 2022 02:13:45 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=GJzZ=UH=invisiblethingslab.com=marmarek@srs-se1.protection.inumbo.net>)
 id 1nYet7-0002qD-Sh
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 02:13:45 +0000
Received: from out3-smtp.messagingengine.com (out3-smtp.messagingengine.com
 [66.111.4.27]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b194f621-ae3c-11ec-a405-831a346695d4;
 Mon, 28 Mar 2022 04:13:44 +0200 (CEST)
Received: from compute5.internal (compute5.nyi.internal [10.202.2.45])
 by mailout.nyi.internal (Postfix) with ESMTP id 117CF5C022E;
 Sun, 27 Mar 2022 22:13:44 -0400 (EDT)
Received: from mailfrontend1 ([10.202.2.162])
 by compute5.internal (MEProxy); Sun, 27 Mar 2022 22:13:44 -0400
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Sun,
 27 Mar 2022 22:13:32 -0400 (EDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b194f621-ae3c-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:cc:content-type:date:date:from:from
	:in-reply-to:in-reply-to:message-id:mime-version:references
	:reply-to:sender:subject:subject:to:to:x-me-proxy:x-me-proxy
	:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=g/9SHO1l6D+aiBnug
	Ns0qQ04w6ZbR7RJhoEXQhWGLx0=; b=BG6THnWaXNaCnw+deH4I4pHR0aDX8YOwe
	LIjjOjZGd3RKWLYpz2slKBS/HqfWn4D7krPtGmw13VDTBHlGT7EeXcMVPofg/k0i
	xojWmU+8h3IlVDUYYZXxhQbxj3qcgSZ+13OHTnaXDImYMU4yyw5WDU/QreS7pE/v
	Ntc3zs85VQauG3yUgMdTU8zfkp57QDfTtXg6qhb1u57WZlVRR7VqDTvUD8SMvUrz
	YTtHVSm3Q50qFVWBe3Pqkt+t/7BpXUfFER2aGH4jdMncJdWuSrutXBGfuEqUfy9J
	p3EINCJfHx+Wlu7Wu7Vfz88kn5mcZYdnytpqMjm6QNBH79JUqmrLw==
X-ME-Sender: <xms:1xlBYlXY76Y08mioIzsTzZ-UhO-WNOth2y3NKnoeULJ7QEwK_lh_ig>
    <xme:1xlBYlmWzfwBWmjT7q9WXiKlVTz6vtFrI6ePACAuTvjohjgeks2zU4yjO7PMi8Zsi
    4yY86VsNav-Ag>
X-ME-Received: <xmr:1xlBYhZSCRjDP7328iFgi1zyvlbmvSYdzjInH5H5b9IfXd1pAgctyYmsgIZzrg4ff7CtW7gIj5PvodndlSbEbJb7G6bnXj503Q>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddrudehiedgheeiucetufdoteggodetrfdotf
    fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen
    uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne
    cujfgurhepfffhvffukfhfgggtuggjsehgtderredttdejnecuhfhrohhmpeforghrvghk
    ucforghrtgiihihkohifshhkihdqifpkrhgvtghkihcuoehmrghrmhgrrhgvkhesihhnvh
    hishhisghlvghthhhinhhgshhlrggsrdgtohhmqeenucggtffrrghtthgvrhhnpeekfedt
    kefggedugfdvgfegtdelveektdekgfejteegveeijeeutdeuvedulefgffenucffohhmrg
    hinhepgigvnhhprhhojhgvtghtrdhorhhgpdhquhgsvghsqdhoshdrohhrghenucevlhhu
    shhtvghrufhiiigvpedunecurfgrrhgrmhepmhgrihhlfhhrohhmpehmrghrmhgrrhgvkh
    esihhnvhhishhisghlvghthhhinhhgshhlrggsrdgtohhm
X-ME-Proxy: <xmx:1xlBYoUj46DboZ08X5t6gRNuNUA8I0BFb5clW6irPsyz_z4SazsZtw>
    <xmx:1xlBYvlhf-OLGfGcjxS32tUWu5RiKss1oaFCjjqXhC3ZbNAh2NLmgw>
    <xmx:1xlBYlcJtQ8kRTZ19dyRZuTIy9xdXSzg-zNY-aqbpL10actzD2oAQQ>
    <xmx:2BlBYkxVDf4DFzCpG0cO_fw_B1k3Mi2dnA5PtxGA7aWS55_1HbocXQ>
Date: Mon, 28 Mar 2022 04:13:29 +0200
From: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: Damien Miller <djm@mindrot.org>
Cc: Demi Marie Obenour <demi@invisiblethingslab.com>,
	Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>,
	Xen developer discussion <xen-devel@lists.xenproject.org>,
	OpenBSD technical mailing list <tech@openbsd.org>
Subject: Re: Security support status of xnf(4) and xbf(4)
Message-ID: <YkEZymbp7dZrXYvp@mail-itl>
References: <Yj3qW/y20htoSvuK@itl-email>
 <37a4b6-cd56-1993-be2-b5522b9aa4d7@mindrot.org>
 <YkEZjYJOcjaRhP89@mail-itl>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="/7K1JpZ8qb9pCh5L"
Content-Disposition: inline
In-Reply-To: <YkEZjYJOcjaRhP89@mail-itl>


--/7K1JpZ8qb9pCh5L
Content-Type: text/plain; protected-headers=v1; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Date: Mon, 28 Mar 2022 04:13:29 +0200
From: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: Damien Miller <djm@mindrot.org>
Cc: Demi Marie Obenour <demi@invisiblethingslab.com>,
	Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>,
	Xen developer discussion <xen-devel@lists.xenproject.org>,
	OpenBSD technical mailing list <tech@openbsd.org>
Subject: Re: Security support status of xnf(4) and xbf(4)

On Mon, Mar 28, 2022 at 04:12:29AM +0200, Marek Marczykowski-G=C3=B3recki w=
rote:
> On Mon, Mar 28, 2022 at 12:45:24PM +1100, Damien Miller wrote:
> > On Fri, 25 Mar 2022, Demi Marie Obenour wrote:
> >=20
> > > Linux=E2=80=99s netfront and blkfront drivers recently had a security
> > > vulnerability (XSA-396) that allowed a malicious backend to potential=
ly
> > > compromise them.  In follow-up audits, I found that OpenBSD=E2=80=99s=
 xnf(4)
> > > currently trusts the backend domain.  I reported this privately to Th=
eo
> > > de Raadt, who indicated that OpenBSD does not consider this to be a
> > > security concern.
> > >=20
> > > This is obviously a valid position for the OpenBSD project to take, b=
ut
> > > it is surprising to some (such as myself) from the broader Xen
> > > ecosystem.  Standard practice in the Xen world is that bugs in fronte=
nds
> > > that allow a malicious backend to cause mischief *are* considered
> > > security bugs unless there is explicit documentation to the contrary.
> > > As such, I believe this deserves to be noted in xnf(4) and xbf(4)=E2=
=80=99s man
> > > pages.  If the OpenBSD project agrees, I am willing to write a patch,
> > > but I have no experience with mandoc so it might take a few tries.
> >=20
> > Hang on, what is a "malicious backend" in this context? Is it something
> > other than the Xen Hypervisor? If not, then it seems not to be a useful
> > attack model, as the hypervisor typically has near-complete access to
> > guests' memory and CPU state.
>=20
> No, Xen supports running backends for PV devices in arbitrary domain,

*Yes

> not only dom0. You can read more about it at
> https://wiki.xenproject.org/wiki/Driver_Domain
> See also Andrew's response, Xen is way more disaggregated than KVM.
>=20
> Qubes OS makes heavy use of this feature - for example network traffic
> never passes through dom0 (which has no network interfaces at all!). You
> can read more about it at the link below (especially look for the
> diagram at the end, if you want just a quick look):
> https://www.qubes-os.org/doc/architecture/
>=20
> --=20
> Best Regards,
> Marek Marczykowski-G=C3=B3recki
> Invisible Things Lab



--=20
Best Regards,
Marek Marczykowski-G=C3=B3recki
Invisible Things Lab

--/7K1JpZ8qb9pCh5L
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAmJBGcoACgkQ24/THMrX
1yyLYAf/VUZjPtfmtzbij4ukxLLV2wcEg/JSGKeEksF/vcBcvhGbSiClIFgdE6vy
SenbCBFkyabAuOieoM5RO5UFC8DvhJSptSnWmU3feG5QVHYsXG6xpWZgh+aaEZQC
cF/5GL44iAjUx777qHKHbE4374Vp80vvVJcPNNghHL6nUuWkNnrCwSqOdK6KwsE3
sroKDQrK6S/3PS1kU2I9bT5emlbLCwh6gSXdavQ6n25J3ZVEfvgLP78lsXk3uiEj
jbItFTLOKDDsdqO/hd6fklLfkF8N9mohjvA55gPxc9VW8wSZE7HOynIkZRk7lrdE
9ZcAbpJ7RKchyWHOe4FV/t9x9Hw/DA==
=6zNz
-----END PGP SIGNATURE-----

--/7K1JpZ8qb9pCh5L--


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 02:30:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 02:30:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295282.502402 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYf8m-0004Vx-KF; Mon, 28 Mar 2022 02:29:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295282.502402; Mon, 28 Mar 2022 02:29:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYf8m-0004Vq-HA; Mon, 28 Mar 2022 02:29:56 +0000
Received: by outflank-mailman (input) for mailman id 295282;
 Mon, 28 Mar 2022 02:29:55 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYf8l-0004Vg-9n; Mon, 28 Mar 2022 02:29:55 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYf8l-00011i-0v; Mon, 28 Mar 2022 02:29:55 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYf8k-00047O-H7; Mon, 28 Mar 2022 02:29:54 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nYf8k-00070d-Gd; Mon, 28 Mar 2022 02:29:54 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=KbceUeTT2X98I3oTDUvYw+osk783derMCPC826FA6eI=; b=zbtAft2pX3C9wyEEqsArPfTFqx
	zdYBpaKwYUc5Sk8z9kDaw6iBK7S+WpukA4NzMKHYPUiOgr1TyCAb13VkJ8i/l699jveGWY9TCYZz0
	0pE5mL0R8UhsnZcTjRWXyfD57NU2DY0szD+UrwoTqlFr76Z2Q6E4WfmYw2LZd5QLr4iI=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168901-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168901: trouble: blocked/broken/pass
X-Osstest-Failures:
    xen-unstable:build-amd64:<job status>:broken:regression
    xen-unstable:build-amd64-prev:<job status>:broken:regression
    xen-unstable:build-amd64-pvops:<job status>:broken:regression
    xen-unstable:build-amd64-xsm:<job status>:broken:regression
    xen-unstable:build-amd64-xtf:<job status>:broken:regression
    xen-unstable:build-arm64:<job status>:broken:regression
    xen-unstable:build-arm64-pvops:<job status>:broken:regression
    xen-unstable:build-arm64-xsm:<job status>:broken:regression
    xen-unstable:build-armhf-pvops:<job status>:broken:regression
    xen-unstable:build-i386:<job status>:broken:regression
    xen-unstable:build-i386-prev:<job status>:broken:regression
    xen-unstable:build-i386-pvops:<job status>:broken:regression
    xen-unstable:build-i386-xsm:<job status>:broken:regression
    xen-unstable:build-amd64:host-install(4):broken:regression
    xen-unstable:build-amd64-xtf:host-install(4):broken:regression
    xen-unstable:build-arm64-pvops:host-install(4):broken:regression
    xen-unstable:build-arm64-xsm:host-install(4):broken:regression
    xen-unstable:build-i386:host-install(4):broken:regression
    xen-unstable:build-i386-prev:host-install(4):broken:regression
    xen-unstable:build-i386-pvops:host-install(4):broken:regression
    xen-unstable:build-i386-xsm:host-install(4):broken:regression
    xen-unstable:build-arm64:host-install(4):broken:regression
    xen-unstable:build-amd64-pvops:host-install(4):broken:regression
    xen-unstable:build-amd64-prev:host-install(4):broken:regression
    xen-unstable:build-amd64-xsm:host-install(4):broken:regression
    xen-unstable:build-armhf-pvops:host-install(4):broken:regression
    xen-unstable:test-amd64-i386-livepatch:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-migrupgrade:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-pair:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-qemut-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-qemut-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-qemuu-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-qemuu-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-shadow:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-vhd:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-examine:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-rtds:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-unstable:build-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qcow2:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-pvshim:build-check(1):blocked:nonblocking
    xen-unstable:build-arm64-libvirt:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-pvhv2-intel:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-pvhv2-amd:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-credit2:build-check(1):blocked:nonblocking
    xen-unstable:build-i386-libvirt:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-credit1:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-dom0pvh-xl-amd:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-dom0pvh-xl-intel:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-intel:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-examine:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-examine-bios:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-examine-uefi:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-freebsd12-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-freebsd11-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-pygrub:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-livepatch:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-migrupgrade:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-pair:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-shadow:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-coresched-amd64-xl:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-coresched-i386-xl:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-examine:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-examine-bios:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-examine-uefi:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-freebsd10-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-freebsd10-i386:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-examine:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-xl:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:build-check(1):blocked:nonblocking
    xen-unstable:test-xtf-amd64-amd64-1:build-check(1):blocked:nonblocking
    xen-unstable:test-xtf-amd64-amd64-2:build-check(1):blocked:nonblocking
    xen-unstable:test-xtf-amd64-amd64-3:build-check(1):blocked:nonblocking
    xen-unstable:test-xtf-amd64-amd64-4:build-check(1):blocked:nonblocking
    xen-unstable:test-xtf-amd64-amd64-5:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    xen=fc90d75c2b71ae15b75128e7d0d4dbe718164ecb
X-Osstest-Versions-That:
    xen=0e03ff97def12b121b5313094a76e5db7bb5c93c
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 28 Mar 2022 02:29:54 +0000

flight 168901 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168901/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-prev                <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-amd64-xtf                 <job status>                 broken
 build-arm64                     <job status>                 broken
 build-arm64-pvops               <job status>                 broken
 build-arm64-xsm                 <job status>                 broken
 build-armhf-pvops               <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-prev                 <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-amd64                   4 host-install(4)        broken REGR. vs. 168855
 build-amd64-xtf               4 host-install(4)        broken REGR. vs. 168855
 build-arm64-pvops             4 host-install(4)        broken REGR. vs. 168855
 build-arm64-xsm               4 host-install(4)        broken REGR. vs. 168855
 build-i386                    4 host-install(4)        broken REGR. vs. 168855
 build-i386-prev               4 host-install(4)        broken REGR. vs. 168855
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168855
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168855
 build-arm64                   4 host-install(4)        broken REGR. vs. 168855
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 168855
 build-amd64-prev              4 host-install(4)        broken REGR. vs. 168855
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 168855
 build-armhf-pvops             4 host-install(4)        broken REGR. vs. 168855

Tests which did not succeed, but are not blocking:
 test-amd64-i386-livepatch     1 build-check(1)               blocked  n/a
 test-amd64-i386-migrupgrade   1 build-check(1)               blocked  n/a
 test-amd64-i386-pair          1 build-check(1)               blocked  n/a
 test-amd64-i386-qemut-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemut-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-qemuu-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-xl            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-pvshim     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemut-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1)  blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-shadow     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-vhd        1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-xsm        1 build-check(1)               blocked  n/a
 test-arm64-arm64-examine      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl           1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-rtds      1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ws16-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qemut-ws16-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemut-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qcow2     1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvshim    1 build-check(1)               blocked  n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit2   1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit1   1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl           1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-intel  1 build-check(1)              blocked n/a
 test-amd64-amd64-examine      1 build-check(1)               blocked  n/a
 test-amd64-amd64-examine-bios  1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-examine-uefi  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-freebsd12-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-qemuu-freebsd11-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pygrub       1 build-check(1)               blocked  n/a
 test-amd64-amd64-livepatch    1 build-check(1)               blocked  n/a
 test-amd64-amd64-migrupgrade  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pair         1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemut-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemut-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-amd64-xl-shadow    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-xsm       1 build-check(1)               blocked  n/a
 test-amd64-coresched-amd64-xl  1 build-check(1)               blocked  n/a
 test-amd64-coresched-i386-xl  1 build-check(1)               blocked  n/a
 test-amd64-i386-examine       1 build-check(1)               blocked  n/a
 test-amd64-i386-examine-bios  1 build-check(1)               blocked  n/a
 test-amd64-i386-examine-uefi  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-amd64  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-i386  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 test-armhf-armhf-examine      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-arndale   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit1   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-cubietruck  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-rtds      1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-vhd       1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-1        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-2        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-3        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-4        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-5        1 build-check(1)               blocked  n/a

version targeted for testing:
 xen                  fc90d75c2b71ae15b75128e7d0d4dbe718164ecb
baseline version:
 xen                  0e03ff97def12b121b5313094a76e5db7bb5c93c

Last test of basis   168855  2022-03-25 14:37:04 Z    2 days
Testing same since   168867  2022-03-25 23:39:47 Z    2 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>

jobs:
 build-amd64-xsm                                              broken  
 build-arm64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64-xtf                                              broken  
 build-amd64                                                  broken  
 build-arm64                                                  broken  
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-prev                                             broken  
 build-i386-prev                                              broken  
 build-amd64-pvops                                            broken  
 build-arm64-pvops                                            broken  
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-xtf-amd64-amd64-1                                       blocked 
 test-xtf-amd64-amd64-2                                       blocked 
 test-xtf-amd64-amd64-3                                       blocked 
 test-xtf-amd64-amd64-4                                       blocked 
 test-xtf-amd64-amd64-5                                       blocked 
 test-amd64-amd64-xl                                          blocked 
 test-amd64-coresched-amd64-xl                                blocked 
 test-arm64-arm64-xl                                          blocked 
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           blocked 
 test-amd64-coresched-i386-xl                                 blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        blocked 
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         blocked 
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-xl-xsm                                      blocked 
 test-arm64-arm64-xl-xsm                                      blocked 
 test-amd64-i386-xl-xsm                                       blocked 
 test-amd64-amd64-qemuu-nested-amd                            blocked 
 test-amd64-amd64-xl-pvhv2-amd                                blocked 
 test-amd64-i386-qemut-rhel6hvm-amd                           blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-dom0pvh-xl-amd                              blocked 
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemut-debianhvm-amd64                     blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     blocked 
 test-amd64-i386-freebsd10-amd64                              blocked 
 test-amd64-amd64-qemuu-freebsd11-amd64                       blocked 
 test-amd64-amd64-qemuu-freebsd12-amd64                       blocked 
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         blocked 
 test-amd64-i386-xl-qemut-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         blocked 
 test-amd64-i386-xl-qemuu-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemut-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemut-ws16-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ws16-amd64                          blocked 
 test-armhf-armhf-xl-arndale                                  blocked 
 test-amd64-amd64-examine-bios                                blocked 
 test-amd64-i386-examine-bios                                 blocked 
 test-amd64-amd64-xl-credit1                                  blocked 
 test-arm64-arm64-xl-credit1                                  blocked 
 test-armhf-armhf-xl-credit1                                  blocked 
 test-amd64-amd64-xl-credit2                                  blocked 
 test-arm64-arm64-xl-credit2                                  blocked 
 test-armhf-armhf-xl-credit2                                  blocked 
 test-armhf-armhf-xl-cubietruck                               blocked 
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        blocked 
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         blocked 
 test-amd64-amd64-examine                                     blocked 
 test-arm64-arm64-examine                                     blocked 
 test-armhf-armhf-examine                                     blocked 
 test-amd64-i386-examine                                      blocked 
 test-amd64-i386-freebsd10-i386                               blocked 
 test-amd64-amd64-qemuu-nested-intel                          blocked 
 test-amd64-amd64-xl-pvhv2-intel                              blocked 
 test-amd64-i386-qemut-rhel6hvm-intel                         blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-amd64-dom0pvh-xl-intel                            blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-livepatch                                   blocked 
 test-amd64-i386-livepatch                                    blocked 
 test-amd64-amd64-migrupgrade                                 blocked 
 test-amd64-i386-migrupgrade                                  blocked 
 test-amd64-amd64-xl-multivcpu                                blocked 
 test-armhf-armhf-xl-multivcpu                                blocked 
 test-amd64-amd64-pair                                        blocked 
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-amd64-amd64-xl-pvshim                                   blocked 
 test-amd64-i386-xl-pvshim                                    blocked 
 test-amd64-amd64-pygrub                                      blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-amd64-amd64-xl-qcow2                                    blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-xl-rtds                                     blocked 
 test-armhf-armhf-xl-rtds                                     blocked 
 test-arm64-arm64-xl-seattle                                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              blocked 
 test-amd64-amd64-xl-shadow                                   blocked 
 test-amd64-i386-xl-shadow                                    blocked 
 test-arm64-arm64-xl-thunderx                                 blocked 
 test-amd64-amd64-examine-uefi                                blocked 
 test-amd64-i386-examine-uefi                                 blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 
 test-arm64-arm64-xl-vhd                                      blocked 
 test-armhf-armhf-xl-vhd                                      blocked 
 test-amd64-i386-xl-vhd                                       blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-prev broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-amd64-xtf broken
broken-job build-arm64 broken
broken-job build-arm64-pvops broken
broken-job build-arm64-xsm broken
broken-job build-armhf-pvops broken
broken-job build-i386 broken
broken-job build-i386-prev broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-amd64 host-install(4)
broken-step build-amd64-xtf host-install(4)
broken-step build-arm64-pvops host-install(4)
broken-step build-arm64-xsm host-install(4)
broken-step build-i386 host-install(4)
broken-step build-i386-prev host-install(4)
broken-step build-i386-pvops host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step build-arm64 host-install(4)
broken-step build-amd64-pvops host-install(4)
broken-step build-amd64-prev host-install(4)
broken-step build-amd64-xsm host-install(4)
broken-step build-armhf-pvops host-install(4)

Not pushing.

------------------------------------------------------------
commit fc90d75c2b71ae15b75128e7d0d4dbe718164ecb
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date:   Mon Feb 28 19:31:00 2022 +0000

    x86/cet: Remove XEN_SHSTK's dependency on EXPERT
    
    CET-SS hardware is now available from multiple vendors, the feature has
    downstream users, and was declared security supported in XSA-398.
    
    Enable it by default.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
    Reviewed-by: Juergen Gross <jgross@suse.com>
(qemu changes not included)


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 04:20:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 04:20:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295298.502425 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYgrA-0007OX-KJ; Mon, 28 Mar 2022 04:19:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295298.502425; Mon, 28 Mar 2022 04:19:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYgrA-0007OQ-FD; Mon, 28 Mar 2022 04:19:52 +0000
Received: by outflank-mailman (input) for mailman id 295298;
 Mon, 28 Mar 2022 04:19:51 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYgr9-0007OG-Jp; Mon, 28 Mar 2022 04:19:51 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYgr9-0003j3-GE; Mon, 28 Mar 2022 04:19:51 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYgr8-0006Up-Vg; Mon, 28 Mar 2022 04:19:51 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nYgr8-0008To-VB; Mon, 28 Mar 2022 04:19:50 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=iQm9vc4NpltRnYbTVOJ+hpD1hj0FIP5PnVXj1RNASYs=; b=bZN+1+15vaF/K6X0dtI7yea6/o
	IPHnFRs65Hr3Kgcf9sua842DNIMQm3//YCey0EwpQqyM8l0ZhmS4rwEw85ad8HQBWN5VcUgLLjSHf
	sEiDn/1Be35wLt2V8/QTGuwcDnUG+zUlVQ6QxVU2/q1ocJ2IwWJSzDnMPNfUbPBnqR1Q=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168902-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.14-testing test] 168902: trouble: blocked/broken/pass
X-Osstest-Failures:
    xen-4.14-testing:build-amd64:<job status>:broken:regression
    xen-4.14-testing:build-amd64-prev:<job status>:broken:regression
    xen-4.14-testing:build-amd64-pvops:<job status>:broken:regression
    xen-4.14-testing:build-amd64-xsm:<job status>:broken:regression
    xen-4.14-testing:build-amd64-xtf:<job status>:broken:regression
    xen-4.14-testing:build-arm64:<job status>:broken:regression
    xen-4.14-testing:build-arm64-pvops:<job status>:broken:regression
    xen-4.14-testing:build-arm64-xsm:<job status>:broken:regression
    xen-4.14-testing:build-armhf-pvops:<job status>:broken:regression
    xen-4.14-testing:build-i386:<job status>:broken:regression
    xen-4.14-testing:build-i386-prev:<job status>:broken:regression
    xen-4.14-testing:build-i386-pvops:<job status>:broken:regression
    xen-4.14-testing:build-i386-xsm:<job status>:broken:regression
    xen-4.14-testing:build-amd64-pvops:host-install(4):broken:regression
    xen-4.14-testing:build-amd64:host-install(4):broken:regression
    xen-4.14-testing:build-amd64-xsm:host-install(4):broken:regression
    xen-4.14-testing:build-arm64:host-install(4):broken:regression
    xen-4.14-testing:build-arm64-pvops:host-install(4):broken:regression
    xen-4.14-testing:build-i386-prev:host-install(4):broken:regression
    xen-4.14-testing:build-i386-xsm:host-install(4):broken:regression
    xen-4.14-testing:build-i386:host-install(4):broken:regression
    xen-4.14-testing:build-i386-pvops:host-install(4):broken:regression
    xen-4.14-testing:build-arm64-xsm:host-install(4):broken:regression
    xen-4.14-testing:build-armhf-pvops:host-install(4):broken:regression
    xen-4.14-testing:build-amd64-prev:host-install(4):broken:regression
    xen-4.14-testing:build-amd64-xtf:host-install(4):broken:regression
    xen-4.14-testing:test-amd64-i386-qemuu-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-qemuu-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-pvshim:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-shadow:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-coresched-amd64-xl:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-shadow:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-rtds:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:build-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:build-arm64-libvirt:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qcow2:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-pvshim:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-pvhv2-intel:build-check(1):blocked:nonblocking
    xen-4.14-testing:build-i386-libvirt:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-pvhv2-amd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-dom0pvh-xl-amd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-dom0pvh-xl-intel:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-livepatch:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-qemuu-nested-intel:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-migrupgrade:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-pair:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-qemuu-nested-amd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-pygrub:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-qemuu-freebsd11-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-qemuu-freebsd12-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-coresched-i386-xl:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-freebsd10-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-freebsd10-i386:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-livepatch:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-migrupgrade:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-pair:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-qemut-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-qemut-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-arndale:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-cubietruck:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-rtds:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-xtf-amd64-amd64-1:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-xtf-amd64-amd64-2:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-xtf-amd64-amd64-3:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-xtf-amd64-amd64-4:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-xtf-amd64-amd64-5:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    xen=10b09aa2541de4c3c49b9343e9bc04e19f0ae4f8
X-Osstest-Versions-That:
    xen=ca304edd3ba8c19211107fd2e898249987557ce5
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 28 Mar 2022 04:19:50 +0000

flight 168902 xen-4.14-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168902/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-prev                <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-amd64-xtf                 <job status>                 broken
 build-arm64                     <job status>                 broken
 build-arm64-pvops               <job status>                 broken
 build-arm64-xsm                 <job status>                 broken
 build-armhf-pvops               <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-prev                 <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 168506
 build-amd64                   4 host-install(4)        broken REGR. vs. 168506
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 168506
 build-arm64                   4 host-install(4)        broken REGR. vs. 168506
 build-arm64-pvops             4 host-install(4)        broken REGR. vs. 168506
 build-i386-prev               4 host-install(4)        broken REGR. vs. 168506
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168506
 build-i386                    4 host-install(4)        broken REGR. vs. 168506
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168506
 build-arm64-xsm               4 host-install(4)        broken REGR. vs. 168506
 build-armhf-pvops             4 host-install(4)        broken REGR. vs. 168506
 build-amd64-prev              4 host-install(4)        broken REGR. vs. 168506
 build-amd64-xtf               4 host-install(4)        broken REGR. vs. 168506

Tests which did not succeed, but are not blocking:
 test-amd64-i386-qemuu-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-xl            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-pvshim     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemut-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemut-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemut-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1)  blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-shadow     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-vhd        1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-xsm        1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl           1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-amd64-coresched-amd64-xl  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-xsm       1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-shadow    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-rtds      1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ws16-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qemut-ws16-amd64  1 build-check(1)             blocked n/a
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qcow2     1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvshim    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-intel  1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit2   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit1   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl           1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-amd64-livepatch    1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-intel  1 build-check(1)              blocked n/a
 test-amd64-amd64-migrupgrade  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pair         1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pygrub       1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-freebsd11-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-qemuu-freebsd12-amd64  1 build-check(1)           blocked n/a
 test-amd64-i386-xl-qemuu-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a
 test-amd64-coresched-i386-xl  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-amd64  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-i386  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-amd64-i386-livepatch     1 build-check(1)               blocked  n/a
 test-amd64-i386-migrupgrade   1 build-check(1)               blocked  n/a
 test-amd64-i386-pair          1 build-check(1)               blocked  n/a
 test-amd64-i386-qemut-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemut-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-armhf-armhf-xl-arndale   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit1   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-cubietruck  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-rtds      1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-vhd       1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-1        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-2        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-3        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-4        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-5        1 build-check(1)               blocked  n/a

version targeted for testing:
 xen                  10b09aa2541de4c3c49b9343e9bc04e19f0ae4f8
baseline version:
 xen                  ca304edd3ba8c19211107fd2e898249987557ce5

Last test of basis   168506  2022-03-10 14:16:31 Z   17 days
Testing same since   168862  2022-03-25 17:36:39 Z    2 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bjoern Doebel <doebel@amazon.de>
  Jan Beulich <jbeulich@suse.com>
  Jiamei Xie <jiamei.xie@arm.com>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Thiner Logoer <logoerthiner1@163.com>

jobs:
 build-amd64-xsm                                              broken  
 build-arm64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64-xtf                                              broken  
 build-amd64                                                  broken  
 build-arm64                                                  broken  
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-prev                                             broken  
 build-i386-prev                                              broken  
 build-amd64-pvops                                            broken  
 build-arm64-pvops                                            broken  
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-xtf-amd64-amd64-1                                       blocked 
 test-xtf-amd64-amd64-2                                       blocked 
 test-xtf-amd64-amd64-3                                       blocked 
 test-xtf-amd64-amd64-4                                       blocked 
 test-xtf-amd64-amd64-5                                       blocked 
 test-amd64-amd64-xl                                          blocked 
 test-amd64-coresched-amd64-xl                                blocked 
 test-arm64-arm64-xl                                          blocked 
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           blocked 
 test-amd64-coresched-i386-xl                                 blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        blocked 
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         blocked 
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-xl-xsm                                      blocked 
 test-arm64-arm64-xl-xsm                                      blocked 
 test-amd64-i386-xl-xsm                                       blocked 
 test-amd64-amd64-qemuu-nested-amd                            blocked 
 test-amd64-amd64-xl-pvhv2-amd                                blocked 
 test-amd64-i386-qemut-rhel6hvm-amd                           blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-dom0pvh-xl-amd                              blocked 
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemut-debianhvm-amd64                     blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     blocked 
 test-amd64-i386-freebsd10-amd64                              blocked 
 test-amd64-amd64-qemuu-freebsd11-amd64                       blocked 
 test-amd64-amd64-qemuu-freebsd12-amd64                       blocked 
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         blocked 
 test-amd64-i386-xl-qemut-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         blocked 
 test-amd64-i386-xl-qemuu-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemut-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemut-ws16-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ws16-amd64                          blocked 
 test-armhf-armhf-xl-arndale                                  blocked 
 test-amd64-amd64-xl-credit1                                  blocked 
 test-arm64-arm64-xl-credit1                                  blocked 
 test-armhf-armhf-xl-credit1                                  blocked 
 test-amd64-amd64-xl-credit2                                  blocked 
 test-arm64-arm64-xl-credit2                                  blocked 
 test-armhf-armhf-xl-credit2                                  blocked 
 test-armhf-armhf-xl-cubietruck                               blocked 
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        blocked 
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         blocked 
 test-amd64-i386-freebsd10-i386                               blocked 
 test-amd64-amd64-qemuu-nested-intel                          blocked 
 test-amd64-amd64-xl-pvhv2-intel                              blocked 
 test-amd64-i386-qemut-rhel6hvm-intel                         blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-amd64-dom0pvh-xl-intel                            blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-livepatch                                   blocked 
 test-amd64-i386-livepatch                                    blocked 
 test-amd64-amd64-migrupgrade                                 blocked 
 test-amd64-i386-migrupgrade                                  blocked 
 test-amd64-amd64-xl-multivcpu                                blocked 
 test-armhf-armhf-xl-multivcpu                                blocked 
 test-amd64-amd64-pair                                        blocked 
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-amd64-amd64-xl-pvshim                                   blocked 
 test-amd64-i386-xl-pvshim                                    blocked 
 test-amd64-amd64-pygrub                                      blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-amd64-amd64-xl-qcow2                                    blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-xl-rtds                                     blocked 
 test-armhf-armhf-xl-rtds                                     blocked 
 test-arm64-arm64-xl-seattle                                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              blocked 
 test-amd64-amd64-xl-shadow                                   blocked 
 test-amd64-i386-xl-shadow                                    blocked 
 test-arm64-arm64-xl-thunderx                                 blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 
 test-arm64-arm64-xl-vhd                                      blocked 
 test-armhf-armhf-xl-vhd                                      blocked 
 test-amd64-i386-xl-vhd                                       blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-prev broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-amd64-xtf broken
broken-job build-arm64 broken
broken-job build-arm64-pvops broken
broken-job build-arm64-xsm broken
broken-job build-armhf-pvops broken
broken-job build-i386 broken
broken-job build-i386-prev broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-amd64-pvops host-install(4)
broken-step build-amd64 host-install(4)
broken-step build-amd64-xsm host-install(4)
broken-step build-arm64 host-install(4)
broken-step build-arm64-pvops host-install(4)
broken-step build-i386-prev host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step build-i386 host-install(4)
broken-step build-i386-pvops host-install(4)
broken-step build-arm64-xsm host-install(4)
broken-step build-armhf-pvops host-install(4)
broken-step build-amd64-prev host-install(4)
broken-step build-amd64-xtf host-install(4)

Not pushing.

(No revision log; it would be 394 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 05:08:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 05:08:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295269.502439 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYhcQ-0004or-Ip; Mon, 28 Mar 2022 05:08:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295269.502439; Mon, 28 Mar 2022 05:08:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYhcQ-0004ok-EH; Mon, 28 Mar 2022 05:08:42 +0000
Received: by outflank-mailman (input) for mailman id 295269;
 Mon, 28 Mar 2022 01:45:53 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=lS2L=UH=mindrot.org=djm@srs-se1.protection.inumbo.net>)
 id 1nYeS9-0007Zt-Ec
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 01:45:53 +0000
Received: from train.compute.dc.uq.edu.au (train.compute.dc.uq.edu.au
 [130.102.189.35]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c60c5b48-ae38-11ec-8fbc-03012f2f19d4;
 Mon, 28 Mar 2022 03:45:47 +0200 (CEST)
Received: from smtp2.compute.dc.uq.edu.au (smtp2.compute.dc.uq.edu.au
 [10.208.138.89])
 by train.compute.dc.uq.edu.au (8.14.5/8.14.5) with ESMTP id 22S1jPYE031729;
 Mon, 28 Mar 2022 11:45:25 +1000
Received: from mailhub.eait.uq.edu.au (holly.eait.uq.edu.au [130.102.79.58])
 by smtp2.compute.dc.uq.edu.au (8.14.5/8.14.5) with ESMTP id 22S1jPJD058946
 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT);
 Mon, 28 Mar 2022 11:45:25 +1000
Received: from haru.mindrot.org (haru.mindrot.org [130.102.96.5])
 by mailhub.eait.uq.edu.au (8.15.1/8.15.1) with ESMTP id 22S1jOvY010008;
 Mon, 28 Mar 2022 11:45:24 +1000 (AEST)
Received: from localhost (localhost [127.0.0.1])
 by haru.mindrot.org (OpenSMTPD) with ESMTP id 4e5c4c60;
 Mon, 28 Mar 2022 12:45:24 +1100 (AEDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c60c5b48-ae38-11ec-8fbc-03012f2f19d4
Date: Mon, 28 Mar 2022 12:45:24 +1100 (AEDT)
From: Damien Miller <djm@mindrot.org>
To: Demi Marie Obenour <demi@invisiblethingslab.com>
cc: =?ISO-8859-15?Q?Roger_Pau_Monn=E9?= <roger.pau@citrix.com>,
        =?ISO-8859-15?Q?Marek_Marczykowski-G=F3recki?= <marmarek@invisiblethingslab.com>,
        Xen developer discussion <xen-devel@lists.xenproject.org>,
        OpenBSD technical mailing list <tech@openbsd.org>
Subject: Re: Security support status of xnf(4) and xbf(4)
In-Reply-To: <Yj3qW/y20htoSvuK@itl-email>
Message-ID: <37a4b6-cd56-1993-be2-b5522b9aa4d7@mindrot.org>
References: <Yj3qW/y20htoSvuK@itl-email>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="0-1208726423-1648431924=:13027"
X-Scanned-By: MIMEDefang 2.73 on UQ Mailhub on 130.102.189.35
X-Scanned-By: MIMEDefang 2.75 on 130.102.79.58
X-UQ-FilterTime: 1648431926

  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--0-1208726423-1648431924=:13027
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8BIT

On Fri, 25 Mar 2022, Demi Marie Obenour wrote:

> Linux’s netfront and blkfront drivers recently had a security
> vulnerability (XSA-396) that allowed a malicious backend to potentially
> compromise them.  In follow-up audits, I found that OpenBSD’s xnf(4)
> currently trusts the backend domain.  I reported this privately to Theo
> de Raadt, who indicated that OpenBSD does not consider this to be a
> security concern.
> 
> This is obviously a valid position for the OpenBSD project to take, but
> it is surprising to some (such as myself) from the broader Xen
> ecosystem.  Standard practice in the Xen world is that bugs in frontends
> that allow a malicious backend to cause mischief *are* considered
> security bugs unless there is explicit documentation to the contrary.
> As such, I believe this deserves to be noted in xnf(4) and xbf(4)’s man
> pages.  If the OpenBSD project agrees, I am willing to write a patch,
> but I have no experience with mandoc so it might take a few tries.

Hang on, what is a "malicious backend" in this context? Is it something
other than the Xen Hypervisor? If not, then it seems not to be a useful
attack model, as the hypervisor typically has near-complete access to
guests' memory and CPU state.

-d
--0-1208726423-1648431924=:13027--


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 06:26:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 06:26:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295311.502459 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYipX-0004KT-5O; Mon, 28 Mar 2022 06:26:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295311.502459; Mon, 28 Mar 2022 06:26:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYipX-0004KM-2D; Mon, 28 Mar 2022 06:26:19 +0000
Received: by outflank-mailman (input) for mailman id 295311;
 Mon, 28 Mar 2022 06:26:17 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=MJb9=UH=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nYipV-0004KG-2P
 for xen-devel@lists.xen.org; Mon, 28 Mar 2022 06:26:17 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f7cfe7fe-ae5f-11ec-8fbc-03012f2f19d4;
 Mon, 28 Mar 2022 08:26:15 +0200 (CEST)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id 1CDA6210E3;
 Mon, 28 Mar 2022 06:26:14 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id C942013215;
 Mon, 28 Mar 2022 06:26:13 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id /DfPLwVVQWLWXgAAMHmgww
 (envelope-from <jgross@suse.com>); Mon, 28 Mar 2022 06:26:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f7cfe7fe-ae5f-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648448774; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=5JXmn2CtCDIOTgPMnQ7bAxcpR4dTBIp13O5PBvvwAgU=;
	b=CZQN9Hr5NxYV6Ih6lJLTgYECQAAtmSirQzekqkDST2ozMbcylWlYBF1oM8xtCuAwQGGbhm
	XaMp2CpW0F5D0+Tnt4EvDeLkaLsmzrLvQI6sayqOruYhc38kWkW/x6ywiad699r7EWjD7D
	6kyMS8qxcYxmxUudBPIfn2c/ZITzCas=
Message-ID: <5533dbcc-64da-bed9-27c6-90797e711aeb@suse.com>
Date: Mon, 28 Mar 2022 08:26:13 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: =?UTF-8?Q?Alex_Benn=c3=a9e?= <alex.bennee@linaro.org>
Cc: Stefano Stabellini <sstabellini@kernel.org>, xen-devel@lists.xen.org,
 Stratos-dev@op-lists.linaro.org, viresh.kumar@linaro.org,
 Mathieu Poirier <mathieu.poirier@linaro.org>, christopher.w.clark@gmail.com,
 boris.ostrovsky@oracle.com, Arnd Bergmann <arnd.bergmann@linaro.org>
References: <alpine.DEB.2.22.394.2203231838130.2910984@ubuntu-linux-20-04-desktop>
 <57549560-879d-f705-8693-9bfdc73e3f7f@suse.com> <87mthe0zea.fsf@linaro.org>
From: Juergen Gross <jgross@suse.com>
Subject: Re: Understanding osdep_xenforeignmemory_map mmap behaviour
In-Reply-To: <87mthe0zea.fsf@linaro.org>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------30v9tizF2cZDQr750Qi0xppF"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------30v9tizF2cZDQr750Qi0xppF
Content-Type: multipart/mixed; boundary="------------Bwfd4Y0krBnyaae5jYj8qAF0";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: =?UTF-8?Q?Alex_Benn=c3=a9e?= <alex.bennee@linaro.org>
Cc: Stefano Stabellini <sstabellini@kernel.org>, xen-devel@lists.xen.org,
 Stratos-dev@op-lists.linaro.org, viresh.kumar@linaro.org,
 Mathieu Poirier <mathieu.poirier@linaro.org>, christopher.w.clark@gmail.com,
 boris.ostrovsky@oracle.com, Arnd Bergmann <arnd.bergmann@linaro.org>
Message-ID: <5533dbcc-64da-bed9-27c6-90797e711aeb@suse.com>
Subject: Re: Understanding osdep_xenforeignmemory_map mmap behaviour
References: <alpine.DEB.2.22.394.2203231838130.2910984@ubuntu-linux-20-04-desktop>
 <57549560-879d-f705-8693-9bfdc73e3f7f@suse.com> <87mthe0zea.fsf@linaro.org>
In-Reply-To: <87mthe0zea.fsf@linaro.org>

--------------Bwfd4Y0krBnyaae5jYj8qAF0
Content-Type: multipart/mixed; boundary="------------w0TlHFC4N0K3RQhFFRTx5Fse"

--------------w0TlHFC4N0K3RQhFFRTx5Fse
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------w0TlHFC4N0K3RQhFFRTx5Fse
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------w0TlHFC4N0K3RQhFFRTx5Fse--

--------------Bwfd4Y0krBnyaae5jYj8qAF0--

--------------30v9tizF2cZDQr750Qi0xppF
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmJBVQUFAwAAAAAACgkQsN6d1ii/Ey9H
agf/fs4btlMkeMyxC9gYT0ryGp/g5KpuIxdnndNtsi1j/S3WheHrCmw7LW8IymSHQQw12c5obISs
o0aCXPe5njWetbeBrdQE2GdXAhvixwi+Zf3MXGXBD+FGyb7JN5N7lDCK8IDFMUtxMWFpwJlZ0Edr
/MpvHnenashsJs+uKDOeT3Jiphzs+7rn1J6dGWn35/VfLZLMECSQee5JneshBkCOHlQ/9emz6rpz
O4fSutOImDD/rNdQRHzFJotLux/MWJZz74nANJK713UTHqgb45s7gp+lXX99A0okxmNtISRuWLiW
XD8TXbEsKvlv2INOdwkuHNojL/vC9wsIHR1ezTQuQw==
=EV2W
-----END PGP SIGNATURE-----

--------------30v9tizF2cZDQr750Qi0xppF--


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 07:01:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 07:01:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295316.502476 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYjNP-0000CP-VP; Mon, 28 Mar 2022 07:01:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295316.502476; Mon, 28 Mar 2022 07:01:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYjNP-0000CI-R1; Mon, 28 Mar 2022 07:01:19 +0000
Received: by outflank-mailman (input) for mailman id 295316;
 Mon, 28 Mar 2022 07:01:18 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Ynyj=UH=citrix.com=prvs=079c560b7=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nYjNO-0000CC-Bo
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 07:01:18 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id db26daf2-ae64-11ec-8fbc-03012f2f19d4;
 Mon, 28 Mar 2022 09:01:15 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: db26daf2-ae64-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648450875;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=2M89eonQr08RQaDD0R0tTFWOs5VEC2Y+godJffoMz3I=;
  b=fEcrYfGstBvhZ1AOB+any//xu+B/ZzSa2u5RZw7x3zKyp+v4oH/eR4F6
   WtelyCGnANj3mMTO59HUteSuXkQ4LsEJs/I+NXEBtq1pEu4mV7tQMg2ls
   ymSA2D9wukjI1o3jGnUqvAb8VgEKZdkc+aGvTmV+mL19qm5RimuQ+yCa8
   o=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67705459
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:ISbulaj60d/8b4wtXi+zXinoX161dBAKZh0ujC45NGQN5FlHY01je
 htvWWjTa63cNmSkLtkkbt6z8kIBuMfUm9ZlHlFory1gFnkb9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFnS4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YVt1N4nniNgyaB9/I354L5Ue0YHbPEHq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bkmtnwjzDS+4vXLjIQrnQ5M8e1zA17ixLNaiBO
 JJENWc+BPjGS0xqY1ISK584pvqDlFfETj5WknuUoINitgA/yyQuieOwYbI5YOeiWsF9jkue4
 GXc8AzRIDsXKdiewjqt6W+3i6nEmiaTcJIfEvi0++BnhHWXx3cPE1sGWF2ju/67h0WiHdVFJ
 CQpFjEG9PZoshbxF5+kAkP+8CXsUgMgt8R4T7EzzCqd9oXv5SGpWW4WdmZoVsA7jZpjLdA17
 WOhk9TsDD1plbSaT3OB67uZxQ+P1TgpwXwqPnFdE1ZcizX3iMRq10+UEI4/eEKgpoetcQwc1
 Qxmu8TXa187qccQn5u28lnc695HjsiYF1Vljuk7s4/M0++YWGJHT9HzgbQ4xawZRGp8crVnl
 CJe8yR5xLpSZaxhbATXHI0w8EiBvp5pygH0j191BIUG/D+w4XOldo04yGggeBc1apleI2GyP
 h+7VeZtCHl7ZiHCgUhfOd/ZNijX5fK4SYSNug78MLKinaSdhCfYpXozNCZ8LkjmkVQ2kLFXB
 HtoWZ3EMJruMow+lGDeb75EidcDn3lirUuOFcGT50n2itK2OS/KIYrpxXPTN4jVGovf+16Lm
 zueXuPXoyhivBrWP3CPqNVJfAlQRZX5bLivw/Fqmie4ClMOMEkqCuPLwKNnfIpgnq9PkfzP8
 G37UUhdoGcTT1WdQelWQhiPsI/SYKs=
IronPort-HdrOrdr: A9a23:Oc3906rH2PVoQzyNX+tH3okaV5oveYIsimQD101hICG9E/bo8P
 xG+c5x6faaslossR0b9uxoW5PhfZq/z/BICOAqVN/JMTUO01HIEGgN1/qG/xTQXwH46+5Bxe
 NBXsFFebnN5IFB/KXHCd+DYrQd/OU=
X-IronPort-AV: E=Sophos;i="5.90,216,1643691600"; 
   d="scan'208";a="67705459"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=kIj1yy9Mx9jWmwtzwWBscwN43oZKbyLVsA09wW2dRh+YDt2XpR3sKZgAZt4tYw9Fn+szl3Hhs1i69W+szKd5ABG+dkm8OuIm0mR8Jbd7RNUUgkx1TzyLEuJakPafBaAXUGBHSj+QoN3yPpekETHnAvzhc4LfiUv6NQeB0k3XHaifr7z0nd6uP1jsx1zvcwwumOwDeTz9KaetvWbEufx6ilJ+4gG3DPhI0uNeGGv7DdFRFyb8UN6xYAw569HHw+nWqDO98UsVHKTcA2YooMS/nefjgf0PLQBq/GxDdkGT6NJJVuzwV26yY0zRIVVEeA8Bl08HQE/590wDrdcCuAGrlQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=2M89eonQr08RQaDD0R0tTFWOs5VEC2Y+godJffoMz3I=;
 b=dqg2DuRgBoun32RZt1b9fFSZgZ+q4Qp7dHYT/3M0dmBWDutVMxwtf88TTQelBeriFRO/tzxYkClfjoKhNGmwVurMzhiLkbAYiyMrEeUQGfHk67SVp/O0wf3Iim396kACSKeHPZOxKTDS2D2bSzCyOrh5WGRqW5vRsoQ/S8IyoYmsxhySZcp8ulxEAdo3jYHReVSaOWGs/EJJwwEmtep2ILjW5Sez1A+/KFMz+sEGkv4XoK+r/YCCIpETvpWDsoUaShi7AxBdVvkZsESm8o1qwJG8LQxEjAtgSwcNT/qmQIfrzKvjI1B2y+K/4zY7ledCKQvOggIKqUBriJuwRBhVqg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=2M89eonQr08RQaDD0R0tTFWOs5VEC2Y+godJffoMz3I=;
 b=S/2g7deoNcKCvenTW7L0dhT64hyrE8LlUPn7QE2sVJO5Y0OUei6GzofVILkAbxh9jBJm4cG+Tz7agzcVuUQPyg+jQAokfGEt7oalALIxV/Af56fg4PIQVrkVQQXvCW/maPjOH9B0OEqKv0TxEGqZjwfyTPdYKtCFsU22bjwja/s=
Date: Mon, 28 Mar 2022 09:01:02 +0200
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Andrew Cooper <andrew.cooper3@citrix.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Jan Beulich
	<JBeulich@suse.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH 2/2] Changelog: Add __ro_after_init and CET
Message-ID: <YkFdLq4mWy0bY9AJ@Air-de-Roger>
References: <20220309123936.16991-1-andrew.cooper3@citrix.com>
 <20220309123936.16991-3-andrew.cooper3@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <20220309123936.16991-3-andrew.cooper3@citrix.com>
X-ClientProxiedBy: MRXP264CA0028.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:500:14::16) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 3ef1da83-c6b1-4553-c99d-08da1088bc77
X-MS-TrafficTypeDiagnostic: CH0PR03MB6193:EE_
X-Microsoft-Antispam-PRVS: <CH0PR03MB6193AAB2EA9FDBA47F454C208F1D9@CH0PR03MB6193.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: iPMlxEZf8KtiSIiAj6ehHNHVlTzpNUvv7Ue5i+DlpYD9XDA+FGw0VquoDFTquKtRUtK8luUD3qEN8+YuaK078NNxbHTea3R8/VxtphZLmza7U5AUV9SzI8/diu7iJ9toR+37g4AeHZiTVb/bXHF+MuJ/4Hc+asqVFLhMhcgjskaxP+l9535uQPBiJnfXaAj+vvNbZdtSbFyX4aNpWT6r941ao2L+JohayiHv9QwISh0sY8F0aNzn2UAMB063t7qqA0QAWBxXSOoX1F4HsGm6tLg6PWV4+hlCrW3rPOu1kT1YRvylsM7ScOmVQQDqeUcI47JJoYxAiZd3LEsOsm0K3W3/RbQlx30lx9WmHceHNwEg9U/zeY68chmjyAT5Ye03diQGSKi/qCw9751u3wWMISl3is+ZwY+/GmvxWlE48MxyFU3PY1engAeuaxTqS9knn33heC5JAErLn7Puq7CZF1CCQW8BSbHNorMbu1KMjxlyNDRji11P+sX5YC8tsQYxrbynHiJhL+O9M1taWoDRKzmKCyBwF5vesKR60i9esvK0MH2D361ElgNfnLvc5Z8m8D92nzwlBx0NRI+HkbvFs0CwX9Cvu7wxb6q6fg01DOQLKfZiUd0dv8H4HDRcvlSla/Elz322V0/KzRR9/T4gr7K+1u6pPl2Z9qgDDd3Br6EMcSRP4/SmmeF09W79aPFTycglclYEXPw35sq6LFTxs+Iy9ev6v4pixu1Lr2OPJthlWiIZ7Be5oCdRK3kclz3a
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(8676002)(6486002)(4326008)(66556008)(66476007)(9686003)(85182001)(6512007)(6636002)(2906002)(54906003)(6862004)(6666004)(33716001)(66946007)(26005)(86362001)(6506007)(316002)(38100700002)(558084003)(8936002)(82960400001)(508600001)(186003)(5660300002)(59356011)(219803003)(207903002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?b1FCbkFKZVMrY0l5OUVQS3M4UkRNZi9XdjUxR0dJZ3RxUmpwNkIzcHh4MTd6?=
 =?utf-8?B?TTBEcVVVL3lPeHUyQ0V4em94YnVrenpjVVNQT0t1R3gvd1FBQVJCNlZ3cnFM?=
 =?utf-8?B?V3U0di9xYzlXdWpyM3k3c1lGRjQwZHJpSlpTSkplbCtFaFRIM2dzWUptUW1Z?=
 =?utf-8?B?czhmdTN0SndTTVlSamlML3dtUVQ0MlBpazNrajUwdVNJRjVrekNKSXdIWTdX?=
 =?utf-8?B?NHZaR1I1UmsxU1o1bmwydElpd0hjTmx2M0h5MnhveXNHNE96am9uaHhDTTlt?=
 =?utf-8?B?Zlk4TG5mb1lUZ2tyT0E0TkNxdlMxZy90TWQ5VU5kWTN1c3NIZmc1bC9rK2li?=
 =?utf-8?B?R284bGxtM1NUbFF1VWdBbDZ5Z2k5QkJyRGVZcVlFbTNyTVdVWVRsSnNSdGhi?=
 =?utf-8?B?UXJram0veWwwbU44YjVMM2xndmFOTmpCYnUwWUtxaDVCbWdmK1p2Mm9vV2Ji?=
 =?utf-8?B?c3Mwem9jUjM5TDhKTk1qWnJZaWx5RmY2RmExWGlCOE5RNmRQR21qOGRwS1kv?=
 =?utf-8?B?YUVEU054aXlRQnArS08rTTgxK001VUhVSzJnQzhJemk5S2FZdFRFeDdtOEQ4?=
 =?utf-8?B?S3NLb3F3UVhudzNYQUMvYmF1VWhZMjlIdXE5amw4cUZ0Z2hMS1lVMVpYZXlC?=
 =?utf-8?B?YnN5ZCt3UTQ4azdLMUYvd09QeE5ZekVhZ01KMlFNa3AxR1dkZXZ1eEYxVWdH?=
 =?utf-8?B?eUI1RVdkWkRnais3YnhSMXUrUzNvalo3MVVjcFY5TFRjamhKZUlwbGxteXZO?=
 =?utf-8?B?OFNRbEs3Z1FjZ0p3OFE3VDNDSWwrOVBLa3gwZEE2STkvcTJ2a1RoSVBmUjJq?=
 =?utf-8?B?VkxYVk1hM21VSVc1OGxnM2t4NTNINU95VmNFd2F6SjY3aGtXMUJuZVBUMGEx?=
 =?utf-8?B?OWpCckN0bmIxa3VzRFZ0TDVwVkE0RGkxeDFUZmJuaE9vRjB6QXVKRmRrQWFr?=
 =?utf-8?B?clVXdWdZVTZTaWxzcGdtUE56U1p6VFFKWUhMVmF2MkM1YWhrTlVaZmFhM1ZS?=
 =?utf-8?B?a2Nwd0dzalJRektKZE13RFI4MlZSR040eUFYa0FPekhraFVMM0FyZDlNYXB4?=
 =?utf-8?B?NlcyUHltYzVTbTdGVHkrc3l4V29xVEVsZnl1ZG1wWlpIVXJhMHgxOTlienBw?=
 =?utf-8?B?cDN4QjJ4Z2xPUlJsT2p3cDFncTY5dlRNcjEvVHRuTDdJRUlNckgrZ1E2cTM5?=
 =?utf-8?B?TThCQUMzV1MwOEF0WFVBYjUyWWVPSFd5UURrejZucStMSlkrcEF5QUNNQS8y?=
 =?utf-8?B?aE5IR3AxQ1JpcnlCNnNzMTZNd0JkR080UEtLRnEwSVM0MHh2cWd6T2hhNitt?=
 =?utf-8?B?Q3k2Y2RzVHBmaXB4MVgvSWVGMldweUJWNCtlc2ZKM2haYnlFVnUvelZicHlp?=
 =?utf-8?B?OVNjeTNEc0x1QU92UFh0RitjeVVVOXBUaGh0MHNqamZMTXgxSWZlNlFQWUJT?=
 =?utf-8?B?TlJOeVc3eFNSVGNncHkyNVZOdWxCcTdkd1NMcU01YWl5QXYzT01PcTdwYVdo?=
 =?utf-8?B?T1Y4dFU5RDRaNWRNT25MY25BQ2lJSEtVdGk3NWRLUVl4Q2lsdTlDaGxpZXpO?=
 =?utf-8?B?YnhlUXIvd2dNdkp1S1Q4WFE5MFVaUTRpQUlFSDhvaVlzYVNPRzNLazErWFNS?=
 =?utf-8?B?cTgrNENTcUJIOFM5aEpVT3QvdkF1U2hsQVpEdGFtNGVhcGN1MEsrT21ESklO?=
 =?utf-8?B?R2FhamN6QWRybDZsa01vSC9GYTQyU2FDcWFmVXlNOElkNDJGeFdFaVlGZkxu?=
 =?utf-8?B?MDBRalVJbTlvbTlRRjhQWExHaVQydGFJclYwTHVPbnk2VTVjaEdmZ0svMDgz?=
 =?utf-8?B?SmVBSVhHN3VLYzIzYmdlZVhnWE9Yb3pIQ1MxdjUxS3R0aWFFMTVKS3FUdmNn?=
 =?utf-8?B?d1A0OHBlSHdQTitOckRmdC9Fd1h6ayt5RHpBcll2cTBuaTRFQXFONmhtMWpT?=
 =?utf-8?B?MU8xTW1TS0Y1Y3g4WU1Qek9hNUREYlJZcFlKbElQWUl1VW9DbXFoZGEzVTU3?=
 =?utf-8?B?NFBTQlRNSlVQdXJBSVdKY0FVdVR4U3pPR2lRb3FBVEZKdWFLemJTWmdhTjZq?=
 =?utf-8?B?bThUQlVzYmg1MVhLWFYreE9lZUU3Q3lOTHFYelRjRytRRXZLMDU2L29wNkJa?=
 =?utf-8?B?ZTNqM0M0UkdVcVQycDlQUWkwaVRucVRycjVNbng1eFl5TkhJOFZUVUNnSUxu?=
 =?utf-8?B?MXNaY2hXRHJSZC9EcXJxZS9EaHdHVi94WEF6YXU0cHpnclZQVHVPcnFzaDBs?=
 =?utf-8?B?dFVGdnVTenQ3ZlhHVW5oL2pSMUEvWWkrTkExUEEyRVpGUDBzMW1pbFdCTEpC?=
 =?utf-8?B?UkY1dEtkWTRGL3VINVpsYXg0bENpamRJc0gwbHFiVVRhdVVYSjIvQT09?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 3ef1da83-c6b1-4553-c99d-08da1088bc77
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Mar 2022 07:01:09.1472
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: qhUhsyUQ5Y3b+1FL/SpeDzZCUewKWnaWaiOoOZy24P6wtYUfuMCogTA8TgcWijc6pnT4X4ovKXE1eD/pEKrb1A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH0PR03MB6193
X-OriginatorOrg: citrix.com

On Wed, Mar 09, 2022 at 12:39:36PM +0000, Andrew Cooper wrote:
> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>

Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>

Thanks.


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 07:03:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 07:03:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295320.502486 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYjPi-0000qi-DG; Mon, 28 Mar 2022 07:03:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295320.502486; Mon, 28 Mar 2022 07:03:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYjPi-0000qb-AL; Mon, 28 Mar 2022 07:03:42 +0000
Received: by outflank-mailman (input) for mailman id 295320;
 Mon, 28 Mar 2022 07:03:40 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Ynyj=UH=citrix.com=prvs=079c560b7=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nYjPg-0000qT-Q0
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 07:03:40 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 31043ca9-ae65-11ec-8fbc-03012f2f19d4;
 Mon, 28 Mar 2022 09:03:39 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 31043ca9-ae65-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648451019;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=ka17dohQT4BFRuHCxHmZxBUCSI0OpYzLrMPXIvJB86I=;
  b=C00DVA5pRXqwvreVtrxf5V0G0Ru6vKZEHtLiCBrH32nx3BduUh/yslxY
   IBAwys/AIWM+UzP95kIeO3fXWgjcHo1QEKhyQVsWv3gBmo9wZG8ufRltC
   znV0cFTwOU7BVooojLWIG214k9ubQa1p6QfjFyFX9qfGOZzmsbq1xrr06
   0=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67300635
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:79jMR6tBALr6xNARZdQzr0FB0ufnVEJeMUV32f8akzHdYApBsoF/q
 tZmKW7VaPeDNzb0f4xwb9y09BgA7JHSnYdiHQs6qi5hRX4R+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jX5
 ouoyyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi8kGrPgwaMyeiNhDjFsGIN616PlBSCG5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AO
 JFBMWQ0MXwsZTUQBFJLKIM1kdyqg1PiXQV+rWPPgJMotj27IAtZj+G2bYu9lsaxbdVYmAOUq
 3zL+0z9AwoGL5qPxDyd6HWui+TT2yThV+o6C7mQ5vNsxlqJyQQ7ChcbSF+6qvmRkVOlVpRUL
 El8x8Y1hfFsrgrxFIC7BkDm5i7f1vIBZzZOO+Ae9i3UjYX92T+EFnohYAJudP4C7PZjEFTGy
 WS1t9/uADVutpicRnSc6qqYoFuOBMQFEYMRTXRaFFVYurEPtKl210uSFYg7TMZZm/WvQVnNL
 ya2QD/Sbln5peoCzO2F8F/OmFpATbCZH1dutm07so9Ihz6VhbJJhaT1sjA3Dt4ade51q2VtW
 lBewaByC8hUUfmweNSlGrllIV1Qz6/t3MfgqVBuBYI90D+m5mSue4tdiBknehs5bp5bI2W3O
 xGD0e+02HO1FCHwBUOQS9jsY/nGMIC6TYi1PhwqRoQmjmdNmP+vo3g1OB/4M5HFm0kwi6AvU
 ap3gu73ZUv2/Z9PlWLsL89EiOdD7nlnmQv7GMCqpzz6gOH2TCPEFt843K6mM7lRAFWs+16Or
 b6y9qKiln1ibQEJSnSOqddIdwFTdxDWx/ne8qRqSwJKGSI/cEkJAP7N27IxPYtjmqVejODT+
 X+hHERfzTLCabfvcG1mtlgLhGvTYKtC
IronPort-HdrOrdr: A9a23:sAhjfK1yw6CtCBhVhii4JgqjBLYkLtp133Aq2lEZdPU1SL3+qy
 nKpp8mPHDP5Ar5NEtOpTniAsm9qBHnm6KdiLN5Vd3OYOCMggqVxe9ZnO7f6gylNyri9vNMkY
 dMGpIObOEY1GIK7voSNjPIceod/A==
X-IronPort-AV: E=Sophos;i="5.90,216,1643691600"; 
   d="scan'208";a="67300635"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=FMMXsX86tD7GGFZkDJTA/ZziRb/cvlqDWhDLMDp25R2wWx7AzqUIRGltHoTuk6mN4ac0VkKv3pB2FxD4qHqyfJ5dyGcpN9EodEaqhvGeXbKEaUYbufvHLOOJT29+VV2jFjHGn5lOX3JjYWmjaKVUwaX4wVWbai7lnUAh9hDhH05f2kJS4uCBr38fGAB4kQWpiT9VoVyjJvDlhND8dK9v1gwEvXGE67nfTr8yymIK1Fajfok63zCeM5vTCC6XQvwpHDkicBuLD94XEfSRmkpSW2Yx0WUIh2Ho1jk4bCgta23Z48qMjDLM4+PUzMnRRb4mKmfFgGgrUkRF7SGGgeI46A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=nFvd2LT4jFfFYEdYlNCSCmWKTXIj5hK2h58XsiXlaKs=;
 b=MNsKcyM+EiKoMjl/CQHlAZAOjjtTOSVT28OfpCt/rVPydtJEzKKIV5MxcJo/6gmDXimZFZdzAHtfF/u8YGiJIETvGcnzxgrhS3zAYffCH9rFrW87tmOKfp3ahnmIWofEKpIN190baj2eWbXdUFLzszr0cYClGdQsTbIxjrcEYdCqwv6N5dFLQh59sMrgCt5DtprnZSpDtC5/abMazoTccAJBWHZEqqlkvy3ydO+flV/G+MyFW50265gGTP8IQg2KCTq8XXZK8pLMbFjO3gTNniLiKlq53d/suhH3mngqcIlvWx3E+RrTk7821+fYDpCoCYhIV/3agjLXyWP37CR5pA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=nFvd2LT4jFfFYEdYlNCSCmWKTXIj5hK2h58XsiXlaKs=;
 b=Mt2lWwXBL/7a2PAUxq+4mTOrnrGo4TTWIeokswkFwh1XDmDFoXqUn3p0Evne/ruDsvZDCatwFueZvRbhWXV6SA+xYACd3JHhKeyDPjULJrRAjJAvKLL4MI4W7VTWeuRd+JsWzBboIrblbyZaN9dZXOaYENgF/hp5wLyXgqIRl5k=
Date: Mon, 28 Mar 2022 09:03:30 +0200
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: Jan Beulich <jbeulich@suse.com>, Wei Liu <wl@xen.org>, Xen-devel
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH 2/2] Changelog: Add __ro_after_init and CET
Message-ID: <YkFdwupjQXdK8YYJ@Air-de-Roger>
References: <20220309123936.16991-1-andrew.cooper3@citrix.com>
 <20220309123936.16991-3-andrew.cooper3@citrix.com>
 <c5b13e54-8868-3d30-70ee-1d1daa082ec6@suse.com>
 <f2be5a63-837a-204e-ba5e-5ecb48c9caad@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <f2be5a63-837a-204e-ba5e-5ecb48c9caad@citrix.com>
X-ClientProxiedBy: MR2P264CA0059.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:500:31::23) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 66b60323-f1af-4fd7-4b6b-08da1089130b
X-MS-TrafficTypeDiagnostic: CH0PR03MB6193:EE_
X-Microsoft-Antispam-PRVS: <CH0PR03MB6193AAA8007A9BE3351F85758F1D9@CH0PR03MB6193.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(83380400001)(8676002)(6486002)(4326008)(66556008)(66476007)(9686003)(85182001)(6512007)(6636002)(2906002)(4744005)(54906003)(6862004)(6666004)(33716001)(66946007)(26005)(86362001)(6506007)(316002)(38100700002)(8936002)(82960400001)(508600001)(186003)(53546011)(5660300002)(59356011)(219803003)(207903002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?UVFvZFU1WjFhajRuSG5nQ01XMDMxUTYybW41ZDkyYlVOdFlhcXFvc3Y1NzNt?=
 =?utf-8?B?ZGQ4aTFvVldwNW1vSnN0VzdDSjFLOEZnbmFWKzZCZHUwV2Jpdys2ZTVlMjd3?=
 =?utf-8?B?SVNxQnhSY0oxbDUxZlZabDg5Q1RJclJQTURqUUZ4djJRRGpScUw4VDkrRmtL?=
 =?utf-8?B?WFZPRjlDZjI2bmpwemkxVll5U1R6WGRiSWNncmVUVGhObkQ1UGxXVzl0V1h1?=
 =?utf-8?B?dDdwQzhiSUlBZWtMUE9Gdk8xaHFxa1FKd0UzTWE4cnZxUUpjWlhGaFZGVDkr?=
 =?utf-8?B?ZDFYbkRPSTJpZ25HL1U1TnhZVkNjc2M4Vm1JQjFiZGg3TXdVSXE2bGJOcGk1?=
 =?utf-8?B?SzdLZmVmRG5DWDEySkRWTzZNQlgwNWJjYjU1SmFqYmdVZVBzeFQvdEdEbGNB?=
 =?utf-8?B?eWQybVRCU3ZGNU1uemJtRzdFempkQTNPN2YwUnBYcWFkRFkvZ25KL3VnNjY3?=
 =?utf-8?B?NmU4eHRQTzJ2RUVNQlJnWmpIQms0bXpRYW9iditZS2FnTEJtbFlOKy8waElw?=
 =?utf-8?B?RTU4eDZxMStTQ2ppVWZCVFliV1hCcndwSWxodFE1Q2lycVJMcjVLQTJMYUJL?=
 =?utf-8?B?SGxEcUhEOERkZDk3ZWVRcG4yaTBSS3RmNkw2VzhCcEcyQ1o1VmFicXhtM1ZW?=
 =?utf-8?B?U1pkWmdyUEVPZjJVSnQ2MkVmSFBMc2JnL2F5d21ORis3RjVEbmtWOWtxdDky?=
 =?utf-8?B?TkYvSjdkbEdsa0pnL1lZWGhDRzBSUWNXZkdzL2xLaDZVbVFZVk1jbGtSa1c2?=
 =?utf-8?B?a25zYTJ4TUV4aFlSV2VBalA0Q2YyTnVvektidWtPWlBSRU1lT3cxcEFKQVE4?=
 =?utf-8?B?eFI4Zk9jTmIveTRKb25GQ0dWdTdzMU43TlFhQlpyMSthSjlHaTdxL3lWS041?=
 =?utf-8?B?ZWN1NVlsTkNlcEJkWjBOQ3FnbEp4aUZKRFB6K3ZVM3RwaWlDUVlXQ2U0bEhB?=
 =?utf-8?B?dXYyajhCOWtleGVwNzRrOFN0QWcwSzZUcEFnanltWDJ6Y1I3SG0zTXpvLzRl?=
 =?utf-8?B?Qmtadk9kM2NMbHNjR0grOFZyK1pScmdRUWRMTWU0bWRmSlRaRkpmd0xpNWVH?=
 =?utf-8?B?bFdzd1YrK3VJeHkxZk80KzNrWGkwZ0p2bU94ZkpUZFVnd09MeUJLNWcrRWM4?=
 =?utf-8?B?RE1JK1ZXYzJNSDZpNUh3RFhDOWhuVU83eFJ4VWlWWnRnc1pKdGU5TmVxRW9H?=
 =?utf-8?B?YS9YZ0p4UUFuSzA5K1VUdzVOOTlHeUhuNlJ0WjJVTko2b3RycCtlUHhFcnQw?=
 =?utf-8?B?dlkvS0ZiMUQ1RmwxLzBXTjV0eDY5Y3pLN3YxQ2J4VDNPZU9Ka3dzenArZDhQ?=
 =?utf-8?B?WlNTZHUzY0NTMkNxQjU2eS9UWjA5VE8yamZaY0g3aXJQM3lSM1hIVFpqYUpO?=
 =?utf-8?B?Wkw1ck15VGp6aTRqK1VMR3kvYmg2T0V2eEJUdFg0cW0wVWJvVlM5TDEycDND?=
 =?utf-8?B?Uzkxa0dQRDZSRmJYV1hiTmpDMTF1U1Bhd3pGRHJHZzdUdXJRODloOWZUT3F4?=
 =?utf-8?B?TVlZR0pYL2dyeS9sOVJaM2JjRXo1bmVhV0hlVU5La0VOT05kbjFJeGEwcExp?=
 =?utf-8?B?YnVobFdqbHdzcUZWNUo1K0pJR2EvS21zUk1iamNONm11bE5yQkI4T2U3Z3Fw?=
 =?utf-8?B?aWlBWnA1WWN3R3FDLzRDaGhrWGkvKzJ3aU9hM2dsbU5qZFNBb29CK3RaWjRC?=
 =?utf-8?B?L2VtQmFFTkJDZG9sNDlqWDd6U1d6T0NSYmEwUXJURStYN3lDZ0ZhMVBuK1F1?=
 =?utf-8?B?WFdLeU0vc3FQZXFjczRPdVJQQjVYQUk0RXNmOWRUb3hFenZlcjNiYjFZVXVS?=
 =?utf-8?B?SWtxb3g3Q21pelI3SnpScXd5TmVaRWs2N3UwZjN6SWdtSDdzVC80Y0RLQkVB?=
 =?utf-8?B?eStnQXd3d2h6WUdoaWN0ZzJacWl0WVUyc2F2S0pudXJGR0dFdFlBZy9xUzkx?=
 =?utf-8?B?OHpkK2pLTDhxQkhsTmh4Yk9pcjhpN3FueHp2dVc4ekJ2NU1WSUtMaVI3VzMw?=
 =?utf-8?B?bE1zYzdTOE5tRzJabXRuaXNKcnFpdndXQzBkQUJBVk10aUt2VGwxVFRBd041?=
 =?utf-8?B?bkJqeGFpcHJ0eFA4OTQ5RE45aTNTWDByQ1RneTNWRWZmekFFazNKT3d2ZC9R?=
 =?utf-8?B?ckw2dmtJYk42Q0FPbGtkVlVuSlFPVWc0KzFLZXZ4WG93OVA2ZmNaZ2h2YnF4?=
 =?utf-8?B?WjBCZGVpcnVUZk1IbFM5WlUyVWgwbE1PN0RYZWhkZHVQR3VuWk1GZndRVnpU?=
 =?utf-8?B?NVNYamExbFkwbzlTTWlSMHlnUjV0aDlHL0pKVi9vZkYzVGZsQXBpTTNTTEdE?=
 =?utf-8?B?Q1N0REpBaGdQVzJrRGxSUjlrbzFaZzFUT3JoT0o4VDI4QjYxOUZndHBjZTJm?=
 =?utf-8?Q?2FPd6Rl1uEpItK6U=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 66b60323-f1af-4fd7-4b6b-08da1089130b
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Mar 2022 07:03:34.3198
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: xX2N7tTvvLCwDnEVRCjb7Prjcx5cjl1bO0xvN4uzo0FZWFAXbXxCrL8sm3qeV49tiqnmGdShBgs5FTFYk+GwDw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH0PR03MB6193
X-OriginatorOrg: citrix.com

On Fri, Mar 25, 2022 at 04:39:30PM +0000, Andrew Cooper wrote:
> On 09/03/2022 13:03, Jan Beulich wrote:
> > On 09.03.2022 13:39, Andrew Cooper wrote:
> >> --- a/CHANGELOG.md
> >> +++ b/CHANGELOG.md
> >> @@ -6,6 +6,12 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/)
> >>  
> >>  ## [unstable UNRELEASED](https://xenbits.xen.org/gitweb/?p=xen.git;a=shortlog;h=staging) - TBD
> >>  
> >> +### Added
> >> + - __ro_after_init support on x86, for marking data as immutable after boot.
> > I'm not sure something like this (being an implementation detail) belongs
> > here.
> 
> Having things immutable after boot is not an implementation detail.  It
> is an important security hardening property, and deserves to be here.

The release/couuminity manager will collate the changelog and pick
which entries it finds worth adding to the release notes. I think it's
fine having this here as it might also serve for developers to be
aware of the feature and use it.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 07:20:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 07:20:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295323.502497 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYjfO-0002TO-RA; Mon, 28 Mar 2022 07:19:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295323.502497; Mon, 28 Mar 2022 07:19:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYjfO-0002TH-O1; Mon, 28 Mar 2022 07:19:54 +0000
Received: by outflank-mailman (input) for mailman id 295323;
 Mon, 28 Mar 2022 07:19:53 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYjfN-0002T7-Fv; Mon, 28 Mar 2022 07:19:53 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYjfN-000791-Eo; Mon, 28 Mar 2022 07:19:53 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYjfN-000200-3l; Mon, 28 Mar 2022 07:19:53 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nYjfN-0007Bk-3J; Mon, 28 Mar 2022 07:19:53 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=caZxb/pY4M3xmyLYs+xgjcKhL2SFS2qZvQZGuaVQ/zw=; b=taAgWKr5Iq1eYLzOBFTvY33207
	qZiQHQt2TBowRVIE4bfLe28rGGH/SkMAEJfwXGEUUrLz7nIwbDXHgSZP6L9r/CKv7sThgeTj69Ann
	7bOlKx1OEDvpFhNfsg59Q7lc/Raqd9c2OhHYWwYf64VZEkO2BwdunSU1CB+j4Uhg+h5E=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168905-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168905: trouble: blocked/broken
X-Osstest-Failures:
    ovmf:build-amd64:<job status>:broken:regression
    ovmf:build-amd64-pvops:<job status>:broken:regression
    ovmf:build-amd64-xsm:<job status>:broken:regression
    ovmf:build-i386:<job status>:broken:regression
    ovmf:build-i386-pvops:<job status>:broken:regression
    ovmf:build-i386-xsm:<job status>:broken:regression
    ovmf:build-i386-pvops:host-install(4):broken:regression
    ovmf:build-i386:host-install(4):broken:regression
    ovmf:build-i386-xsm:host-install(4):broken:regression
    ovmf:build-amd64-xsm:host-install(4):broken:regression
    ovmf:build-amd64:host-install(4):broken:regression
    ovmf:build-amd64-pvops:host-install(4):broken:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=355515a06a609327794070a91efe26a45a2e3325
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 28 Mar 2022 07:19:53 +0000

flight 168905 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168905/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168254
 build-i386                    4 host-install(4)        broken REGR. vs. 168254
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168254
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 168254
 build-amd64                   4 host-install(4)        broken REGR. vs. 168254
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 355515a06a609327794070a91efe26a45a2e3325
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   27 days
Failing since        168258  2022-03-01 01:55:31 Z   27 days  259 attempts
Testing same since   168889  2022-03-27 06:18:32 Z    1 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Bob Feng <bob.c.feng@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Mara Sophie Grosch <littlefox@lf-net.org>
  Mara Sophie Grosch via groups.io <littlefox=lf-net.org@groups.io>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Yi Li <yi1.li@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64                                                  broken  
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-i386 broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-i386-pvops host-install(4)
broken-step build-i386 host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step build-amd64-xsm host-install(4)
broken-step build-amd64 host-install(4)
broken-step build-amd64-pvops host-install(4)

Not pushing.

(No revision log; it would be 978 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 07:41:44 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 07:41:44 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295332.502515 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYk0K-0005jU-Mz; Mon, 28 Mar 2022 07:41:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295332.502515; Mon, 28 Mar 2022 07:41:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYk0K-0005jN-Jw; Mon, 28 Mar 2022 07:41:32 +0000
Received: by outflank-mailman (input) for mailman id 295332;
 Mon, 28 Mar 2022 07:41:30 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=dCnP=UH=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nYk0I-0005jG-JD
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 07:41:30 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 7a5a43f8-ae6a-11ec-a405-831a346695d4;
 Mon, 28 Mar 2022 09:41:28 +0200 (CEST)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2052.outbound.protection.outlook.com [104.47.14.52]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-34-ua31YCwNPOOmifpnqtC3RQ-1; Mon, 28 Mar 2022 09:41:27 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM9PR04MB7652.eurprd04.prod.outlook.com (2603:10a6:20b:285::19)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.22; Mon, 28 Mar
 2022 07:41:26 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%5]) with mapi id 15.20.5102.022; Mon, 28 Mar 2022
 07:41:25 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 7a5a43f8-ae6a-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648453288;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=ntH+YI2glGh1hhQvbnS5boURGCiH0lvIpdbNClN8A1A=;
	b=cEmLEdW5onnrENauCL6LjrsNNpvVk90nYCva8UhK7mMn+qXFxUjKESWTD+fSOPLAM45Fm8
	BXvAG7JC0ivTkb746F6vDvoaS4bzkh3pfb6QzWBP6vtaL54us9MOU/7m+AvoZPpT9fdukd
	HR/yV+0cYz4NdOvSpPk/7BCf6wm8SDc=
X-MC-Unique: ua31YCwNPOOmifpnqtC3RQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=TJpFsfZUL6+yy+rVfore7w0ElgTrsC1w0CWy5D0Xv2NBO1aW1stEcBJ3bbXkfNxhda4SLFW688Zq8d8ZUuddwz4KJ8Q+jmFLkvEhmoHc8jtWnu57MKZ9wprnIa+IBBarCXiYkgh+0ugShXF5oS6B4VqCYyWXCLADELU9Tl9DzRiY6KgmjrR163fglINKmP1MTjYscGJh0ya4hcQkir39D2L2l9tGGCLdXkCG0oIbu9AaM3WJNMJyxVL67TsDTqFH9Ktd7gfuu6kXU7aF/zaeYeaokuYl79v+3boD+KY3jTSVI/OPGQ4vMO4peorubJ6aG/JchqnOkUi0kbHC/2g7gw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ntH+YI2glGh1hhQvbnS5boURGCiH0lvIpdbNClN8A1A=;
 b=RYOds1lGy+iv+7RhiISgSjUhPdJiscAE1a015df5cV5MoT4RwrGCcJjiM7Xx/7atoG6EcVNeuoSKYUwmgzjddSPniYs2PMCf6nfR9TX9bC3iAJZbAJ47A5zAf4hl2fHuD52reCmAR5HkrBTMm6e7zVaNYsvVmCzDqHP/QPfX7ehQRRsbeEUht0Hd0brTzZFx/CaiU4R+rtIg3jT8T4qj9C0BTvhZ7HaS9bf+q5apWVH938sTQXqabOOu+mSTrHB070tSsfZVZGfIr/VIEwVTyMb+jDk2sm7gCvq2XAHHZR9ZWDQH3KLvE/jh0LhQdeGJmxnb1cjui7udRHD/gi2IPQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <49190e22-c802-3830-9d4c-8e6100132687@suse.com>
Date: Mon, 28 Mar 2022 09:41:26 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Anthony Perard <anthony.perard@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH] build: generic top-level rule to build individual files
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR0301CA0047.eurprd03.prod.outlook.com
 (2603:10a6:20b:469::27) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 9c7364df-0d4e-4cc0-0a09-08da108e5ce0
X-MS-TrafficTypeDiagnostic: AM9PR04MB7652:EE_
X-Microsoft-Antispam-PRVS:
	<AM9PR04MB765279F2A29E72743DDF6CCDB31D9@AM9PR04MB7652.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(38100700002)(36756003)(8936002)(8676002)(66946007)(66476007)(26005)(66556008)(316002)(31686004)(31696002)(186003)(54906003)(4326008)(2906002)(6512007)(86362001)(5660300002)(2616005)(508600001)(6486002)(6506007)(966005)(6916009)(41533002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?RTRCQmNRL1RrSE13WGFtMkxzMHk4T1RKTCtKc3Y5eFJ1eGRpWjZvQWFUdWVV?=
 =?utf-8?B?UzBZeUUxOEJIa01JR2dSblpNQ0hMTGovVk9iSy84RnNPYlVMMXJ5ZWR6LzVT?=
 =?utf-8?B?MVlubm50bVNtTmFVRHpOTmVQdGVaNG1EWW5yUTlqRVRGMVFYVm5ScTBQR1Vj?=
 =?utf-8?B?L3phMGtMdVVEa1QrZ1VibmdZcVR1eUxucFdVSTY1THNJRzhETC92N2NlQm4z?=
 =?utf-8?B?WkxnT1hnWmdKZWZUelArcXdKOXAxOUFlY2w0Nk50VVEwZUdWWFJuR0hXVWVY?=
 =?utf-8?B?eWpuditaV2lmbXcyUHI5T3NKVzgrdFVtdWVkNzI1ZTBraU5VcUh6RncxSEhR?=
 =?utf-8?B?aHA4aE80Zi9mR1RqODgxdmxiaDdpS013SkIvTjUvUXBFNjJKY2pyakdOZDk0?=
 =?utf-8?B?QllYQUJvUUR2M3RNdEYyTFV1cTJ3TS9UT2FqT1lENThBUENZYVZoejc5RDJN?=
 =?utf-8?B?WlpQVFpmMTFFazdGS3VPWUZCUm9wczFWNmREYkprZzl0cUtkbVRlZzJzUGQy?=
 =?utf-8?B?T2tLQmxrOVhnbWxtdFRrSVp6NWJtczBWSGx3eWJDSVNSRlowMitzQWczaDBj?=
 =?utf-8?B?QWJJN3B0M2pjbnNlMmt3bnQ0VTF1VnA1NHAvOGxUb2ljRFpQQkhyOXcyenkw?=
 =?utf-8?B?TEJGejU2cFRUQUVKWkF1anJzYVFkdkZhRFp2cTloWVdlaGRUV2R4dVNQR2w3?=
 =?utf-8?B?UmxpeHpXVEZzQUFpRlJDM0hUQVA1SlA4blRoRHdxakV6c1BiY3phOTM3cXQ2?=
 =?utf-8?B?aEZKL2d3dTI1aWhQK0dyYmUvN1hmeGJsZkwxNjh1Zk9yZk5FankwcUpSZ3ZO?=
 =?utf-8?B?VW9DMTJXU2hWWHBUcXg5WTRVNkZ5WFMwbnZ5cmJYQmUrWHlid3BnT0d2QS80?=
 =?utf-8?B?NnhSTisxaStUS3FyUGhWemljZGhCTEVNcjFPT09Ec1RKN0tmUG5ycnNqd3Rw?=
 =?utf-8?B?ekJ2Q0ZLckRxU2xZUmxqUWQzN3hHelFmUk1iVU9QcnRhbnJHLzRFTnZLN3do?=
 =?utf-8?B?bTM1elBIY29BNktDOW9DVFk4U25pM2FDcW9lZkNzdnY3RkcyRUdTRy9EM3Yr?=
 =?utf-8?B?Y2RmOFdiK0lSWGxlTHhhdU16alNHejI4YmJmOW05T2lNd3IrRnlKNGxwUmFk?=
 =?utf-8?B?R3FBNmdHV1MxL0tEQUpmOHNZdjJmVElyWnJSa1JQUFl6K21uM1dNc0V1NkVH?=
 =?utf-8?B?UXg4TVkxUFd1ZjhFaFQvRERWY29QS1RJSS9zRGR6cUhNb1Rya0hJTytRaHBu?=
 =?utf-8?B?Qm1aWU5USGVqMU4vLzhkVWJTMXNNcWo4a2FJbUZuS3p2YUZYR3R1NGY4Z3RV?=
 =?utf-8?B?bG1MVllUc2MwNWNicG1ybUxhZm1OelJBOXBnUiszVkVPSjFsMHA3VUZFQnhp?=
 =?utf-8?B?VUwyaklMb2x1R1ZMcnBoVkFaTDN3ZkxMblVyNTBkMDFLMmxKbG45aWxlS2s5?=
 =?utf-8?B?RS9PL2tmTTkzK3lWUENtOXVBZXJqVmtHd2h5Yyt0SUlnM2gyamNnQXRVNWNz?=
 =?utf-8?B?T08wenNBNElLMnBiUm5zL0lobUZZZkQ2UFI0V1VRUk1MM0hhaHNaS0dLUTNq?=
 =?utf-8?B?clhZM1dPYmhvR3FqMHBHcm0wMzhTZWlsdU1FRTlYNVZ2RmVPUTI5RGZSUmwv?=
 =?utf-8?B?Z001OTRGa2lybFA4OXB3c1BmOHNKeWZQYkxHaFhIT0FIY3BwNkp2OTVEeDFh?=
 =?utf-8?B?MTlYODFmS1E0WmluZ1NvNG5lV0E1NjNLWmw4MWRJbVVPWWFIS3ZPYlRiRXhj?=
 =?utf-8?B?YmFpM1pGRlA5TG9mWndpN3Q1RFUyTDlubHF2U3pzMEE0SVpCVFFjQTJEN3V2?=
 =?utf-8?B?MFptQitONXNMam14c1c1M2QxalpaaEpMa2owZS83enJiZmxSWm5nemFOOWpV?=
 =?utf-8?B?Z0FEdHgrTUVJZjlNVEdpOVJySHZ1aUVPenUvOUpoSHRlUGthNmRIRmJmQjRj?=
 =?utf-8?B?U0t2MWRqbE5BRGVBTUlXZ1ZnOTViTm9CRWVhNDJkakNBakVoY3FoY0lNUDFV?=
 =?utf-8?B?YWxHQmtXeHRtbE9hdXZyUHdvZ0hOOVZkOXlwTkptd3JPVkJsLzA2VjY0eXJt?=
 =?utf-8?B?Vno0THU0ZjBHTllja3dYYmREa2p0UjNiY0Ura0VRZDlzNDQvejMwUTJRbXVJ?=
 =?utf-8?B?WHlRZHJuamd4bXhKTWNaenFHcXBRcUNiLzJuZ0xvam02OG1hMW1Hb2xnSXBi?=
 =?utf-8?B?c0tTT1h5UUR3RWljZDJRZ3ZXUzZVS0dTbWpvbWlUS2lhYkU0ZEU4SXRjd0lt?=
 =?utf-8?B?VU9wNHU1a0JFSml3VE9jZUJvYjBFcmQ1T0JaQUhuR2M4d1ZKbFc0bVRzSTE4?=
 =?utf-8?B?ckY5MjFNOUFYa2NwVy9wc3JORW1SWXBvSzFGRmxMcTVpb3Z1ZmFGdz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 9c7364df-0d4e-4cc0-0a09-08da108e5ce0
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Mar 2022 07:41:25.7026
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: w0KkoagWhDLl3XQ4hHB+zOkA7MwxqkzkEct7mxmUB2DxkGhMzeE+QZiv/gjy5/IkrPB7238JgqkaOrjRtxPq/w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR04MB7652

In particular when cross-compiling or having in place other tool chain
overrides, invoking make to build individual files (e.g. object,
preprocessed, or assembly ones) so far involves putting the various
overrides on the command line instead of simply getting them from
./.config.

Furthermore this helps working around a yet unaddressed make quirk [1]:
Variables put on the command line are invisible to $(shell ...), unless
invoked from a recursive make: During the recursive invocation such
variables are put in the recursive make's environment and hence become
"visible".

Signed-off-by: Jan Beulich <jbeulich@suse.com>

[1] https://savannah.gnu.org/bugs/?10593

--- a/Makefile
+++ b/Makefile
@@ -75,6 +75,13 @@ ifeq (x86_64,$(XEN_TARGET_ARCH))
 	XEN_TARGET_ARCH=x86_32 $(MAKE) -C stubdom pv-grub-if-enabled
 endif
 
+define do-subtree
+$(1)/%: FORCE
+	$$(MAKE) -C $(1) $$*
+endef
+
+$(foreach m,$(wildcard */Makefile),$(eval $(call do-subtree,$(patsubst %/Makefile,%,$(m)))))
+
 .PHONY: build-docs
 build-docs:
 	$(MAKE) -C docs build
@@ -334,3 +341,6 @@ uninstall: uninstall-tools-public-header
 .PHONY: xenversion
 xenversion:
 	@$(MAKE) --no-print-directory -C xen xenversion
+
+PHONY += FORCE
+FORCE:



From xen-devel-bounces@lists.xenproject.org Mon Mar 28 07:50:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 07:50:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295336.502526 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYk9O-0007I3-MD; Mon, 28 Mar 2022 07:50:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295336.502526; Mon, 28 Mar 2022 07:50:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYk9O-0007Hw-J1; Mon, 28 Mar 2022 07:50:54 +0000
Received: by outflank-mailman (input) for mailman id 295336;
 Mon, 28 Mar 2022 07:50:54 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Ynyj=UH=citrix.com=prvs=079c560b7=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nYk9O-0007Hq-2c
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 07:50:54 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c9b5b4fb-ae6b-11ec-8fbc-03012f2f19d4;
 Mon, 28 Mar 2022 09:50:52 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c9b5b4fb-ae6b-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648453852;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=4UjNDulGzboOiTbl65nP85sjXJdb2GiEO8mpSkYvt8M=;
  b=fxVlovIG/wdH1bQDldMoBWDAuOYVn2DncgckBwpJ2xr0iVIIag5wNoLz
   mboC2aB64yPVOzEtr3kL95so5Ic9bjXf/1GYRxWdEsYvnyf9tMMKbxKg8
   z+296ujZ2ioa4MV2m8VRDbavt9dcPptS/ot3ddbanmuQqIKsYiOKCnUpm
   A=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67315326
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:cmPupavC2s9ftGs8g7ARxfCAAOfnVEJeMUV32f8akzHdYApBsoF/q
 tZmKT/UP/uKa2P0cot1OYS0o0IDvcXUxtBhGgJlq3xjRiwb+JbJXdiXEBz9bniYRiHhoOOLz
 Cm8hv3odp1coqr0/0/1WlTZhSAgk/nOHNIQMcacUsxLbVYMpBwJ1FQyw4bVvqYy2YLjW1jX5
 ouoyyHiEATNNwBcYzp8B52r8HuDjNyq0N/PlgVjDRzjlAa2e0g9VPrzF4noR5fLatA88tqBb
 /TC1NmEElbxpH/BPD8HfoHTKSXmSpaKVeSHZ+E/t6KK2nCurQRquko32WZ1he66RFxlkvgoo
 Oihu6BcRi9zJIPsoPQEfyVIOHx8D6NiyoD6JmGW5Jn7I03uKxMAwt1rBUAye4YZ5vx2ESdF8
 vlwxDIlN07ZwbjsmfTiF7cq1p9LwMrDZevzvll6yj7UF7A+SI3rSKTW/95Imjw3g6iiGN6AO
 JFANGE1MnwsZTUSKkVUBI8lxN2Wn1nPSxtnllaqivEOtj27IAtZj+G2bYu9lsaxbdpRtlaVo
 CTB5WuRKjMwOcGbyDGF2mmxneKJliT+MKoCGbv9+vN0jVm7wm0IFAZQRVa9ueO+iEO1R5RYM
 UN8x8Y1hfFsrgrxFIC7BkDm5i7f1vIBZzZOO7cgxiG12rP43xayW2o2QBpzV+EhreZjEFTGy
 WS1t9/uADVutpicRnSc6qqYoFuOBMQFEYMRTXRaFFVYurEPtKl210uSFYg7TMZZm/WvQVnNL
 ya2QD/Sbln5peoCzO2F8F/OmFpATbCZH1dutm07so9Ihz6VhbJJhaT1sjA3Dt4ade51q2VtW
 lBewaByC8hUUfmweNSlGrllIV1Qz6/t3MfgqVBuBYI90D+m5mSue4tdiBknehs5bp5bI2W3O
 xGD0e+02HO1FCHwBUOQS9jsY/nGMIC6TYi1PhwqRoQmjmdNmP+vo3g1OB/4M5HFm0kwi6AvU
 ap3gu73ZUv2/Z9PlWLsL89EiOdD7nlnmQv7GMCqpzz6gOH2TCPEFt843K6mM7lRAFWs+16Or
 b6y9qKiln1ibQEJSnSOqddIdwFTdxDWx/ne8qRqSwJKGSI/cEkJAP7N27IxPYtjmqVejODT+
 X+hHERfzTLCabfvcG1mtlgLhGvTYKtC
IronPort-HdrOrdr: A9a23:qih2X6kv6O1jIU1d8m9m1WFoD5fpDfPOimdD5ihNYBxZY6Wkfp
 +V88jzhCWZtN9OYhwdcLC7WZVpQRvnhPlICK0qTM2ftW7dyRaVxeBZnPDfKljbdREWmdQtt5
 uIH5IObeEYSGIK8foSgzPIYurIouP3iZxA7N22pxwGLXAIV0gj1XYANu/yKDwJeOAsP+teKH
 Pz3Lsim9L2Ek5nEfhTS0N1F9TrlpnurtbLcBQGDxko5E2nii6p0qfzF1y90g0FWz1C7L8++S
 yd+jaJrJmLgrWe8FvxxmXT55NZlJ/IzcZCPtWFjowwJi/3ggilSYx9U/mpvSwzosuo9FE2+e
 O86CsIDoBW0Tf8b2u1qRzi103J1ysv0WbrzRuijX7qsaXCNUUHIvsEobgcXgrS6kImst05+r
 lMxXilu51eCg6FtDjh5vDTPisa2XackD4Hq6o+nnZfWYwRZPt6tooE5n5YF58GAWbT9J0nKu
 9zF8vRjcwmPW9yV0qp/1WH/ebcHkjaRny9Mws/U42uonVrdUlCvgUlLJd1pAZDyHo/I6M0k9
 gsfJ4Y0Y2mdfVmHp6VNN1xMfdfNVa9My4kEFjiV2gPR5t3ck4klfbMkcAIDaeRCdg18Kc=
X-IronPort-AV: E=Sophos;i="5.90,216,1643691600"; 
   d="scan'208";a="67315326"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=JarBm6uzgD1Y+nVDyJa4jo+PvNJgnjepjvfDPU857wtBRm+1Vti5uwMTxwZkWNmJSqNmRk7zxH0/poHoiNz1yvEerR7wUlEXsYbr6jy39Jwejv/zmKpayxFHumvkKY/b1maXr8w9kN0qU5bWpowIjNUkKHQCGmdaoU1hystMs3OXgdFRLc4xjphp5gYkFAHchtlbC+wtmJiwyK/INs+Mu0UTegWMwHF9MfsNSZXmj/eUGRZ4iSFAlNAl7u+Ndqfy5hv5gl9NIMnwgp6SVcV0Y3uZDmqMA10wFPKAAhoz6IqXslaQqEhyNd0mv92+qDsLx7GA8wlcLdy95tyBybAuyw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=8AbC7knwkr9OM/U4DIdCaRzquPvlEcZh0+2NPAHksDM=;
 b=LLHJkG2GIoAaC3/fVDPumNZ0kwVgIoAytasS27j68IYrxxjGRGX2YaZnE50uJ6daTjjwftSHdujmar4UYeIXZVQD3D50SoOb8ep430QStTrK7iYdPo1Fnq/ou5UKmaSruieznOnCa6SeHwdYuQGO6OUiFKhtDj1EQkMVt+XhqParkQ21cUAImmiCet7+lKJq7U/0HDhYp2AzrZIEpj/1l1dmfQybCafsSuwZbjZiCe2KoxQS9E8LqoJRUfb7pDJt+Wo9T2Tq7io6ZnT4CLOVtlPbPJaR9Ec7X0mTmO52jl/4MbzZJ+fa5TmIyTNmLl++azxkrZfmihP7dVB/i0h/cQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=8AbC7knwkr9OM/U4DIdCaRzquPvlEcZh0+2NPAHksDM=;
 b=R7h7Jkh7ATXMsWFsx8TD6qYkXfLf2D9XgXtUcfADGlWRsJLIvDbc+cAEgD0PZjSdQuKjTBDbhsRD/aN3gYhEfGo8qA4uZUPTDhfVpPUIByNg1M6BiwESh3gAxOGgTOsxlCxQ0wavdcycIE6hfJXJoJSmmWuSd1QFdxm2rE/ccDs=
Date: Mon, 28 Mar 2022 09:50:40 +0200
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Andrew Cooper <andrew.cooper3@citrix.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Jan Beulich
	<JBeulich@suse.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH 1/2] x86/CET: Remove XEN_SHSTK's dependency on EXPERT
Message-ID: <YkFo0P8Vl+XpgOgW@Air-de-Roger>
References: <20220309123936.16991-1-andrew.cooper3@citrix.com>
 <20220309123936.16991-2-andrew.cooper3@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <20220309123936.16991-2-andrew.cooper3@citrix.com>
X-ClientProxiedBy: PAZP264CA0162.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:102:1f9::21) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 527689a3-387b-46ac-7122-08da108faa54
X-MS-TrafficTypeDiagnostic: BN7PR03MB4548:EE_
X-Microsoft-Antispam-PRVS: <BN7PR03MB4548EBE01AE14BCCCE3569208F1D9@BN7PR03MB4548.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(82960400001)(38100700002)(316002)(6512007)(9686003)(6486002)(86362001)(54906003)(85182001)(6636002)(508600001)(8676002)(186003)(66556008)(66476007)(5660300002)(33716001)(4744005)(66946007)(6666004)(6506007)(8936002)(26005)(4326008)(6862004)(2906002)(67856001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?bnRKeUNXbUZuNUV5VVNUMVRqc05lOGErNGQwVkEwRXVTdjBxa0sxRlh3emhR?=
 =?utf-8?B?Vkowd2I5RmVXdUtQbStoZW9XeFVPOHgwazI0NUpiREhNMzJxbUZpNVI5YlNL?=
 =?utf-8?B?WUNsc3lKZkVIcURDWWtwSzJxVW55RXBZRE5oUDVxZ2hnMXhhRlZsWGp5OVRQ?=
 =?utf-8?B?WCt6OXh3UUJ3OWpkYUdtb1YwNUJBd3R5Rm9tSmk1dDNOZEpyZjd3a1Vrdktw?=
 =?utf-8?B?VEZVbjROYlVFTFV0eFlUeXRQaXZXRUN0VkZ4bWlaelNWcStZWXkrWFI5OWt2?=
 =?utf-8?B?T256RWhqN2lYU1ZHb2Izb2pIcDVuU2Z1dDE4MGJEcHI3T3hYU3cvTkZ5M2Qr?=
 =?utf-8?B?djR3My90dzQ5cmkvejlIQ0FRQ01mZThVWGxJZ3lLUEF0c25veDVRT3U0NHBG?=
 =?utf-8?B?YUtQcS92RkVzLzdYNElZZE9zcHplMFZlRlkvWDZZc0JRRGc1YWFNL3l4NGhS?=
 =?utf-8?B?L2V3anNEdUl1U2Y4U0x6WTl4bGdjRHNGbnV4MjB6L0w2bnB1cGpSeHZoblJq?=
 =?utf-8?B?OWFNZXlzMUFuT3R1ZENrSkNQZGZwek5PSXNmK1RudmloZ2V3SGROVUo4ZExJ?=
 =?utf-8?B?eEVjek5JOW9nU0w3Q1BNUE1DNlZFT3BURndqTDZRRTYrMUVld2RUZ0lYcGNr?=
 =?utf-8?B?d1lPd09DK09hc3FxeU8yYnk1OVJHTERVMlE0ak1zU3A5QnQyOENIMVlUUFVs?=
 =?utf-8?B?WHVpR2tsUkozbURKSEVLZHp4dEdxZ3dWMXE0M2VIdC9pbnFrYy9ZK1BMSjh1?=
 =?utf-8?B?ak9nVzF1SUFrcDl4UUw4VC9aWXR1QVdaTHlieGxLZTlCc2VmUmZkcXppRlBM?=
 =?utf-8?B?WHRRTzV1N0pJSU8xemUzVElOYnhvbGJhZFpKWW02bHdab0l6YXMxeHpDajE5?=
 =?utf-8?B?eE80WWN6K3JGa3h5QUF0bks3Lzh1cHJ5UmhibGR3c0FiL3hkUmY3YzJxTDFC?=
 =?utf-8?B?aHFBRWZQSERibGk3VEFVTXBpdHVIOVdYajdaTmxtWXBhcFpVRm1XSHJUVEpM?=
 =?utf-8?B?T2hrc3ZTUEhaZVcycGxuVWRVSDUwcmU5S2RnYmlhSFJQb0RTejI3K3lOMjdm?=
 =?utf-8?B?RnkvTXVIbE9nZWtBK1k2ZXlIN3hKQnNDRS93UFpwQ0t0TVo3dTM2N0xOUjBT?=
 =?utf-8?B?OTYrMmF5NWtYNWptRmFOeGVtdzZ1SXVsTm51ZHI3MGlXQmx3UnJPNlNYN05N?=
 =?utf-8?B?YlJ4NUU5QXNERExaL1ZRL3VjUHg2QmhWMzMxa2FIT0h6dU9mRG83Ym0rNXhk?=
 =?utf-8?B?UUlRcHU0MGNlak9rd3FrNDVoMlZHaUFMVkJtZEIvVjNJRklOTzhsdmJ5MGFp?=
 =?utf-8?B?TlNsbFA0THhMaklQbEVHdk5mSzBQUXBDRGNWRjc2N2I0d3JQWWtWREJEUzFj?=
 =?utf-8?B?WVVIUkZidnd2b05HVjVvc2NPR2U3Y29MbTNISXNOSjZVWWR3OVFwQUo4Q1gr?=
 =?utf-8?B?RHVTeXh1OWsyenhpK0tJQ0E0UEFHVTgxZTBXTURhNUZ2eEtycU12dnhkckRu?=
 =?utf-8?B?MmsyekowcWpxaGNqYmdSaXpIa0hIQVBpd1FOSnB0SkVLdk9uTnlYWHhZNnZW?=
 =?utf-8?B?QTJyZmp5RTNyNTFDeE5VdzBGbDFzMGJQMjZOQnVrZFNrMWw4RFNUeGJabk5C?=
 =?utf-8?B?WERZMDZ4Mkdoc081SzMyNTRITno1MUh0VkEvdkhtQitUWnJGRTU0USs1OEJ2?=
 =?utf-8?B?bEt0dGF3RWlnQUdRMlZ3Y1ZhcHFNSWI1RmJZVUhsNDEydm9zaXU0WmhRdGZY?=
 =?utf-8?B?UEJpVzNvbW53MGt4WVZsc2RYTEJFZWdzb1VEQkErcThPS05oMER6ZnhVTjcw?=
 =?utf-8?B?OU5mdzZWbWFIM091UENKWGgyVUM1UEZKVk40VVZlYUptOXFaTmdjYk1nbjl6?=
 =?utf-8?B?YlUrVDlGRlVzWmhLbDNNcURCamdnQWh4T2hGOG15clRFVGNaUlhvb2pBTnhq?=
 =?utf-8?B?dTN4VGU0YVVhSGgyNFNKNGMwODI5bzFZUVRHZFBneHVNOXhYblN3TVdVZk5M?=
 =?utf-8?B?TFBTTDM2UzA0UURURElzNGk3cWN5aG1BSW9JL2hVenhsRHJZZkJ2a2VmYmFi?=
 =?utf-8?B?ck1MUGhZQmNxQy83WTJpdXpoVkVHK2h6ekZ5U0F0a1BndlZPVlVyTjJRSlAw?=
 =?utf-8?B?WTdhYkg0Mmh6c3pHKzlrQlgzSFV4Rk5IWmJPdHNDMW1Ud25BU04rYUxqZmNw?=
 =?utf-8?B?T09iVWpacGNMK1ZZdG1IZmY4Mjh5bklYK2MzTVJELzRFY3h3ckJaaFdxaG5z?=
 =?utf-8?B?WXAweGdBRmJ0dnduWDhtV3E2bmhFbXlQVFNYazJXSmFMYTlOWHVaRHNTTEdt?=
 =?utf-8?B?Y3VxQjB5U3JCcmx3NmFmSkthL05MUy9IeXR5ZzNObXNiTUtBVUxHcWxJaTJG?=
 =?utf-8?Q?U1jy0nb3e7q8QURM=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 527689a3-387b-46ac-7122-08da108faa54
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Mar 2022 07:50:45.1480
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: vR8tOoBdT9NRXZ6NwsXUvAdg5z8GzReXzT84lYQMTlH9OZjPThuESlADhm6UIPyICziXYBechG4w1kLZYjqORQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN7PR03MB4548
X-OriginatorOrg: citrix.com

On Wed, Mar 09, 2022 at 12:39:35PM +0000, Andrew Cooper wrote:
> CET-SS hardware is now available from multiple vendors, and the feature has
> downstream users.  Enable it by default.
> 
> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>

Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>

CET-IBT is already available out of EXPERT, so also having CET-SS
seems natural.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 08:01:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 08:01:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295349.502537 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYkJZ-0000wp-00; Mon, 28 Mar 2022 08:01:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295349.502537; Mon, 28 Mar 2022 08:01:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYkJY-0000wi-Sh; Mon, 28 Mar 2022 08:01:24 +0000
Received: by outflank-mailman (input) for mailman id 295349;
 Mon, 28 Mar 2022 08:01:23 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=dCnP=UH=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nYkJX-0000wJ-O5
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 08:01:23 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4225c1e1-ae6d-11ec-8fbc-03012f2f19d4;
 Mon, 28 Mar 2022 10:01:22 +0200 (CEST)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2051.outbound.protection.outlook.com [104.47.14.51]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-40-ht9aaLqwNBmXrQmfnV_deA-1; Mon, 28 Mar 2022 10:01:19 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by DB8PR04MB7131.eurprd04.prod.outlook.com (2603:10a6:10:fd::11) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.22; Mon, 28 Mar
 2022 08:01:18 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%5]) with mapi id 15.20.5102.022; Mon, 28 Mar 2022
 08:01:18 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4225c1e1-ae6d-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648454482;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=J0P6GmUH77+aZ3ylUQrs/UF+9IJkM6ERu1BhuZM+h7k=;
	b=lAAqBK4Vut1BFcztQNpX6VUOsoPDhpmCDdE+/7S3nfhyryV2xyIZuc0uECpImLPgsuLWMz
	TrBOw/woVv33RIPcev+jcMscop/IknU78UuURPTjWKH/xVmu0ZqDyKigZL2kduvuuuNRfL
	0OntjavGItNsZ2oclH6KJo5b+ZXCvDQ=
X-MC-Unique: ht9aaLqwNBmXrQmfnV_deA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=k3NMNXdtcIQbSUD6S0KFQOZQ51HltVxTp1nrgydQBX0kDkotu5PInkMq8j30aXF/ha8OKD11tWp7W8QgCAjdwe9dcj3weaNPMijt6VcMMNQu6o5SFkTnlaJvEbqSsaSmU+Aw89BhgqHd96R+ulmEgma5aB6nvv82fcqAOHkRxXKlVmNKuaIWu9ZaAjWefFSEIqYylabXHGKogdl0skCvbtKMkGDLUXSiSeuIPhfQcy3c6qKKN2Hq8CqO1rlkOIaW0kC1toIWCp14t9fN/gw/zFcqkggMUFoO6KTJmG28ySR4WBF8SgB1Q+4RLNsakZcu+fnBitmgpsYzlsQo++AqhQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=l9mEmxrl8ffP3GS7lGrHnftNEJDZMAYobYpyn3MjpVs=;
 b=V15F/0fKd5lH2ArfgYT48CFR62gmat1gxYUdJ/I3iQhsPpotzpM5WM4Jhyoq+x09l7rXaM/SeCxmKYJ80siTmWqyPbEoOcfFSQTzn5/M74ISljkUXRMIY3EixZkDL/ZBOeSN6HX1t/wA+tDt5ay/5bYCgI7XpvT1BYIcyCwK/JCLTwyYq6jeWlTfzN4YE5P+ICbF7xo8Gc7atmNG3zKALNSTrhA3Qdfsrz1SZAScfvA8UUHIkvVRSWRAeNV2HULSGjPpwElvb4fD0UyxHnYlReUNABvNss5mzSPSFmhYyXtdky2a7TX12rM4GOO+xs40SHEYAgZEER2hbp5WVAxQPw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <09b2072f-6337-94d2-c6e0-e31d70edfbac@suse.com>
Date: Mon, 28 Mar 2022 10:01:19 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH 2/2] Changelog: Add __ro_after_init and CET
Content-Language: en-US
To: Andrew Cooper <Andrew.Cooper3@citrix.com>
CC: Roger Pau Monne <roger.pau@citrix.com>, Wei Liu <wl@xen.org>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <20220309123936.16991-1-andrew.cooper3@citrix.com>
 <20220309123936.16991-3-andrew.cooper3@citrix.com>
 <c5b13e54-8868-3d30-70ee-1d1daa082ec6@suse.com>
 <f2be5a63-837a-204e-ba5e-5ecb48c9caad@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <f2be5a63-837a-204e-ba5e-5ecb48c9caad@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS8PR04CA0209.eurprd04.prod.outlook.com
 (2603:10a6:20b:2f3::34) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 822f749a-48f7-48c3-b798-08da10912394
X-MS-TrafficTypeDiagnostic: DB8PR04MB7131:EE_
X-Microsoft-Antispam-PRVS:
	<DB8PR04MB7131DD8DBC4BFB8C9EE9A15EB31D9@DB8PR04MB7131.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(38100700002)(508600001)(86362001)(31686004)(8936002)(26005)(5660300002)(6486002)(186003)(316002)(31696002)(2906002)(6512007)(6506007)(66476007)(8676002)(2616005)(4326008)(53546011)(6916009)(66556008)(83380400001)(54906003)(66946007)(36756003)(4744005)(59356011)(207903002)(219803003)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?Q52LDia0leIZZv2Q2mobYVAJYCHMHeUHIdlCfGlw833ZwuCV1xupL8ijdxoT?=
 =?us-ascii?Q?q2lZsUyE4oIZq6n4AY3nTyhJMLW2/SoAWSNIMFgrcnoxMuTUxRUXShnKqHlf?=
 =?us-ascii?Q?uPYtkZ0Sd9kPe0y022YOUJMOooau/KrWJ8FdH+r8QmHf4uO9EccDU+866ci/?=
 =?us-ascii?Q?I8xuUhalNgaR89CfUTfo0oo+IWswQzKA/B3pltvXtOXF60596qhytYoALzqx?=
 =?us-ascii?Q?gSKizBPw5RZgkBsbYK1omTIcoBCUNeMhgUMkxD3KOh4IDmQWLcxCfgZAaFTC?=
 =?us-ascii?Q?fH+3w+/CxjKVnGOdyV2U4PHbBMlwOviFJxPvcm70EUmTpc8KFG2k2Gz73qkX?=
 =?us-ascii?Q?iLVio5HgKNZ0EHyg20Gf9lFE03LG1YLc6tmpT0KdbcvNkEWJxojiV8u7Xw73?=
 =?us-ascii?Q?K+50m43xpHFr9FDGQPcgVzPZyQ/QzqwJu3iGwDoiRR7ltbz24mMoaXv/1MfL?=
 =?us-ascii?Q?zMU/Fq31ZTFHVRAW8tCf8HYamuHUyKEKsCqlQ++6IMKPnbE1kVW/nks0WwSc?=
 =?us-ascii?Q?3KG+ll0CyuUfhGCF6uGw+iI/Ap/82Ytn2ZiZjXWRRxCMROBmdl3XbnWWzyCX?=
 =?us-ascii?Q?YG8BT+OERE2gu38CifDZhAetNBiGf4KO1oHsDbj6i9h8CR6/D4WsIQ9SkPts?=
 =?us-ascii?Q?WNZN52cnYwsUQDRPBE/tceTPOXB98ttxAKi1jKcmfXIlNtvZ9K840V4SXRlH?=
 =?us-ascii?Q?B4uCI0HZJmcy76Iu6UJUCgjSSKjpLHOTMIEV96Cldj5cQGj750MacMElVWa6?=
 =?us-ascii?Q?N9llNDQVkB8QlFvMag+otYLlRxuOWS5bB+HZshsFv9/yyCvByJc0CLBOBXZ4?=
 =?us-ascii?Q?thwVpgRUJ6uKkIg2xu/O68ym4cmqdhH1+WE4BDIfF8huD+K2+inR/gHQsA0F?=
 =?us-ascii?Q?wEKM7gSNpRfzAzVUBK86IrlfNGjqITwD5oo2Dh3pZJzge5mI0dBMQ7XSK9L9?=
 =?us-ascii?Q?Jxpz/EjxEahXjjYqqXJZp0dstsmyx6pb4J+FYhVKsvUBrahQWpLVjfVvzRkw?=
 =?us-ascii?Q?YfAQUveSC8/K3z/qvn9h+b7hH+FaCEr/t3RU1JTwPxaYqtwg6OxH8hmVsTcf?=
 =?us-ascii?Q?H2FhXKJM0gWfjXajs6AKs/l2EwM+qJXxwC/Kmn3fXBOgqAkCCloRNF6TA7AB?=
 =?us-ascii?Q?QHznr3cj845NzEa7YHLhPXqbADu5Rk2/0IftVYMw91U5BoSMA4osCXbpFftc?=
 =?us-ascii?Q?CzdFoxLIplExx3vHqclpTBdX6i3WT6S09bwNsYubRRDtUJHvO7tUkEMTYjjw?=
 =?us-ascii?Q?Mpf5dHcaipbjmtaQkpPxprYjbS9JuKev7M3Ek+qDawHCe71JtahULNtynhtL?=
 =?us-ascii?Q?rzqWZen0hQf1Sskm4m521MeoB1pJ4SYDC8xZYxEh0T5K8naS0biBPcytQX4y?=
 =?us-ascii?Q?AdkgVYCf2SXnGtXreqUoVNdFVgZx0VbPDO0GW7H3N2pp+8lVhchvojdjmq4C?=
 =?us-ascii?Q?xyEOrk5NnokO7qV9t4aHIir2wyuuRYikCRIAAqjAg3Y/GgBe/5ik+w74nBWc?=
 =?us-ascii?Q?15AyAkbcsBZ9xVaINzKP/2Xh0m9G9yGEBzdO7/JxXioLNtMbgInYQz5bIW5V?=
 =?us-ascii?Q?cPkS1KG788zAetZnxjBZbb5kLJNSjpUQsnHw6MtuwycDhHICfvgPEBx5cd6I?=
 =?us-ascii?Q?rd2CpCmdEeB/TcJ6J33GdquLVjEj/oiQFhge1wfWF5+VgA+yh5TQjum26Prp?=
 =?us-ascii?Q?HpR9Rj7A4LC9AGI+C21AQqD9Et04lduffQ1sBh6CespXCzCZDYSzFRr9s/eb?=
 =?us-ascii?Q?25tgYRG/ZA=3D=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 822f749a-48f7-48c3-b798-08da10912394
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Mar 2022 08:01:18.0691
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: GnxkaWjSeabLw2mb8LAI8wsMv7xPVHLUptFdkpdzTc3XaBGW1zgsddmZ/WLrXcH4vkQD5NXmsJb+qfdR/ygKIg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR04MB7131

On 25.03.2022 17:39, Andrew Cooper wrote:
> On 09/03/2022 13:03, Jan Beulich wrote:
>> On 09.03.2022 13:39, Andrew Cooper wrote:
>>> --- a/CHANGELOG.md
>>> +++ b/CHANGELOG.md
>>> @@ -6,6 +6,12 @@ The format is based on [Keep a Changelog](https://keep=
achangelog.com/en/1.0.0/)
>>> =20
>>>  ## [unstable UNRELEASED](https://xenbits.xen.org/gitweb/?p=3Dxen.git;a=
=3Dshortlog;h=3Dstaging) - TBD
>>> =20
>>> +### Added
>>> + - __ro_after_init support on x86, for marking data as immutable after=
 boot.
>> I'm not sure something like this (being an implementation detail) belong=
s
>> here.
>=20
> Having things immutable after boot is not an implementation detail.=C2=A0=
 It
> is an important security hardening property, and deserves to be here.

Well. Are you suggesting that we repeat this statement for every release
where at least one variable was converted to use __ro_after_init? The
mere introduction of the new section has no hardening effect at all;
every use of it is a single small step.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 28 08:22:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 08:22:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295355.502554 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYkdn-0003OI-Oh; Mon, 28 Mar 2022 08:22:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295355.502554; Mon, 28 Mar 2022 08:22:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYkdn-0003OB-Lj; Mon, 28 Mar 2022 08:22:19 +0000
Received: by outflank-mailman (input) for mailman id 295355;
 Mon, 28 Mar 2022 08:22:19 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Ynyj=UH=citrix.com=prvs=079c560b7=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nYkdm-0003O5-Ti
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 08:22:19 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2bce0c22-ae70-11ec-a405-831a346695d4;
 Mon, 28 Mar 2022 10:22:16 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2bce0c22-ae70-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648455736;
  h=from:to:cc:subject:date:message-id:
   content-transfer-encoding:mime-version;
  bh=t87RuclRjm5IirP3vPgEPVc/6qgLG3s8DiKR47STpYo=;
  b=GhxYiDN4W2x3/lgsM+5EzoAQtRJBfDw57Y8+lfnCmJgnLDcVgLVE4g32
   ZaEdVYyL3hG4SUuUrScYyu8vbuLLYlNMQrOexwm/tRr6xM65YdDQxYGcT
   REGs/BuGefVa/7w+Do7BxHdHCokSY1tppC/GIYKTuUMFX/NdT0iF5jXf2
   k=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67217624
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:IfZhjaxZuIXUlvNMXqx6t+c0xirEfRIJ4+MujC+fZmUNrF6WrkUOy
 zQfUGiEMquLYWShf90nYdng9BkP6JDdyNcxGgZl/iAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz24fhWWthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 NpllbXrdzksZvzwnuFEcEMBL3pPFolk9+qSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DJoQQt2sm1TjEJf0nXYrCU+PB4towMDIY2J8URKmAP
 ZZxhTxHaDPdWg9GYmstFbU8g96t2iPkXGFqkQfAzUYwyzeKl1EguFT3C/LUZd6iVchThlyfp
 G/N4yL+GB5yHMySz3+J/2yhgsfLnDjnQ8QCGbug7PlojVaPgGsJB3UruUCT+KfjzBTkApQGd
 hJSqnFGQbUOGFKDbvCmYSO9+C+4uBtFeIAJL7YLwyWvxf+Bi+qGPVQsQjlEYd0gkcY5Qz02y
 1OE9+/U6SxTXK69EizEqOrNxd+mEW1MdDJZO3dYJecQy4O7yLzfmC4jWTqK/ESdqtTuUQ/9z
 DmRxMTVr+VC1JVbv0lXEL2uvt5NmnQrZlNujuk0djj8hu+cWGJDT9bygbQ8xawcRLt1tnHb4
 BA5dzG2tYji962lmi2XW/kqF7q0/fuDOzC0qQcxQ8l9r2v3oSD4I9A4DNRCyKFBaJxsldjBO
 hK7hO+szMULYCvCgVFfPepd9PjGPYC/TI+4B5g4n/JFY4RrdR/vwc2dTRX44owZq2B1yftXE
 c7CKa6EVC9GYYw6nGveb7pMitcDm3FhrV4/sLimlnxLJ5LFPyXLIVrEWXPTBt0EAFSs/VyNq
 o0FZpLQo/idOcWnChTqHUcoBQliBVAwBIzsqtwRceiGIwF8H3omBeOXyrQkE7GJVYwM/gsU1
 hlRgnNl9Wc=
IronPort-HdrOrdr: A9a23:qFp/+arAie7h8FdFv724OSMaV5vdL9V00zEX/kB9WHVpm5Oj+P
 xGzc526farslsssREb+OxpOMG7MBfhHPlOkPMs1NaZLXLbUQ6TQr2KgrGSpQEIdxeOlNK1tp
 0QDJSWaueAdGSS5PySiGLTc6dC/DDuytHVuQ609QYLcegFUdAE0+8vYTzrb3GeCTM2c6YRJd
 653I5qtjCgcXMYYoCSAWQEZfHKo5numIj9aRALKhY74E3W5AnYoILSIly95FMzQjlPybAt/S
 zslBH43Lyqt7WexgXH32HewpxKkJ/Ky8dFBuaLls8JQw+cwzqAVcBEYfmvrTo1qOag5BIDl8
 TNmQ4pO4BJ53bYbgiO0G7Q8jil9Axrx27pyFeej3emi9f+XigGB81Igp8cWgfF6mI71esMnZ
 5j7ia8jd56HBnAlCPy65zjTBdxjHe5pnIkjKo6k2Ffa40Dc7VcxLZvtn+9KK1wUx4S1bpXXt
 WHVKrnlbdrmBKhHjvkV1BUsZCRti9ZJGbHfqAA0vbloQS+0koJjHfw//Zv70voxKhNNaWs2N
 60QpiA7Is+NvP+TZgNcNvpEvHHfVAkf3r3QRGvyBLcZeM6B04=
X-IronPort-AV: E=Sophos;i="5.90,216,1643691600"; 
   d="scan'208";a="67217624"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=PxdUGLOEkru9DtlBJiuLdTF38PldSWcYKwtjMaNgMnLriaOeFwUVDMhYSRzD4R8j9UyWpwCIP/I3u4yfzNLjv1NiqmjXWHPE/E0mMu6bHUuS8jUct68JFfPYNrZPGXPt8gxTlPIc6ShM4L5gT722INUluo61AEtJVK9PeG/vQCtX3O2BehhgcY6AjYZ4NRKwfOYHOSYkvQ4DynMIMTFFl7hezdVdQqFr8F3kkBNKtP4uBJY2y9Fm/86hXWJ7EWPp9V+d74Omab7UN6gHk1q8+g9BinkHurEZ9m8dwH/MmWr7sZcKHfefoYdn39fOL3m2suulooaK0IQp1/3DAxh3pg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=GO0xnO1mvI5WW+Gh+lqTY77EJ3cd78mGE4KQ4zlL0Q8=;
 b=E7qAbubXKFKEAWFj4WRo57SEJt/z7s0WIFrja04F8dGccCubuCTQ7fuL81wNlkIWAeJhoa6nPQsdQ3Xeph2zyWfVApjGIrh2FQIAvqZ9TbQOpkqeI8NNxQCQyOE2A1AAVxfqlsqAMR7lIaVSiPGwGFjPrwXgZlT2+QzFIP3dHjXxoeXLFCzu/cfZwLHw9Rqg2aPtPuPqQ3/ispNwhJyFvxHph91i1YoXET78gpGtN7NTVDr0pyDKi+vK7DeSy40HSV1HdnO6HQ5q7LtmxazwWpDzxX+9TMHf0lAcld8wWktm2YpL+x3IOIqQ8Wrd7LTM9jy5zeLRx1DuVjChn9cmdQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=GO0xnO1mvI5WW+Gh+lqTY77EJ3cd78mGE4KQ4zlL0Q8=;
 b=MqnfYKX6xnkWn+fWk+5ZlpXmXc9Nz+Y5uaBe2cIlrSBaeq7god22+87AK4b5BpyeQePi04DRq3CPbmY3JhFgy/UZIoSDBTKHtvkqwp+7WFS0Gpw0JV+FIiLBFpw8QUArzVym/6YAbyZRUlm31vr+awO7tFq0e0PjYi87g2M8ar0=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>, <iwj@xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>
Subject: [PATCH] osstest: update Debian installer version
Date: Mon, 28 Mar 2022 10:21:21 +0200
Message-ID: <20220328082121.80866-1-roger.pau@citrix.com>
X-Mailer: git-send-email 2.35.1
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: MR1P264CA0085.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:501:3f::16) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: b73ae474-ac6a-441c-9b9e-08da10940c80
X-MS-TrafficTypeDiagnostic: DM6PR03MB4507:EE_
X-Microsoft-Antispam-PRVS: <DM6PR03MB450769CC34CAC638D4C519A28F1D9@DM6PR03MB4507.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(86362001)(6512007)(508600001)(966005)(6486002)(6666004)(186003)(6506007)(1076003)(107886003)(26005)(82960400001)(83380400001)(2616005)(8936002)(5660300002)(66476007)(2906002)(66556008)(4744005)(8676002)(4326008)(38100700002)(36756003)(15650500001)(66946007)(316002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?RmlSb1hTRXZkaG04UkhYSzluUHFsaXFKZmJNRmNhK0JrY0RuaWJrUWY1Ulpp?=
 =?utf-8?B?cnhrUWl3MHV4elRzSDBJZitoWExlNVJUSSsrSUE2RjhIMUR1N3hLVmNDcmpx?=
 =?utf-8?B?VXpKa01xSndNRWZGc2FqV2NLU1lvLzNiWEJ4eEtkZEVBQk9HRkN6Zm5xQUpZ?=
 =?utf-8?B?M0dlNDdoQXc5T0ZPcVhLSXpnME9NZXI5a1E2TFhYMGRLZmp0dHMyNDQzeE9O?=
 =?utf-8?B?S3c0bGxwdUorYnNTQldTWWN6d29rcEc1OEtLZXRNVEhyVkRYMkE1L2pIYlJW?=
 =?utf-8?B?MWFpNC80NTZMMDdLMnhsM29pbmNjV0tiQm1KQWY4U1kySmQySTMvaE0zOTJI?=
 =?utf-8?B?bTR3UW9aWlFxQm1KVDhDSnJsdisrMEdmQ0xhZHdzd2NtTXdKbzA1WG5xUGZG?=
 =?utf-8?B?cXozTjFzNzR2TS94MmZmQmRBOEtiWmF3N3V0c2g4WFVuRGNqOC9Qb0M0TDBG?=
 =?utf-8?B?a3JNRmQ5Q2Z2bytUeUxrVXF3azFpdWVoUTZ6UzNHUkxsNk1YQXlQeFNtOE92?=
 =?utf-8?B?V21WMjhQTkZsMDZCRWlPM3dZMGY2VlpkRGdDR3pCeGVOTVBwT3VBaGxySGRi?=
 =?utf-8?B?ZTFiRVpNeXppTDZtcnRRWWFBQS9OSFVUWDdlV0ZrY2NlS2ttSUJaVUtTWWJU?=
 =?utf-8?B?aTJ2QmF3MEJBK0RvUUxZR09ydDRaWFJiSjk0cU41RS9aTGRQazNIblBZM3Vm?=
 =?utf-8?B?MmI1aXNxblV0cmJIaFVUMFgzbG9zRUdMd2RTRmRoMWxTR3VNOG1QdTdPTXNM?=
 =?utf-8?B?UVBnbW15WklCVW1DVnpJNjBLNm0wMFNaQUdncDZjZUFDMklHQW5HNHYwbjl2?=
 =?utf-8?B?MnQzUmdrVmtaeS9LMUtHVitrV01rMWZSU0VpUnJKdk5pNlJ2bUVkZUlpWktK?=
 =?utf-8?B?K0dIL29qWUhUSmpkWGpScGhLS1FDbjExMCtaMk00S2JkUVZYUmt0d2RydWw5?=
 =?utf-8?B?ZmFROEhqS1M5RlJsbVUwT1cwTUFFT2FWZ3ZNYkhNM1R6SDBvTDUzMkhjV3Rp?=
 =?utf-8?B?Mkl1ZXBpWERNSktsWUw3V09kS09yNUZORUFQd1NVUS9QU0lJT0FjNTl2NUZr?=
 =?utf-8?B?bzAySDNqbVJFTTVUWklta1lYMmIzckwxMFUrb1FCYXNrRXB0cXAyQUJadXpQ?=
 =?utf-8?B?U3Boa2ZoNE1ZRW05dFYyQ1hPQ3daYnR0N0lRUXUzajV1YUU4WXE4VDNDaWRo?=
 =?utf-8?B?SS9kMGRRY1BvdlhvT2c5YjFLclhJK0FoUm5oanVXUW5nNnVkbXB0aDRwR3da?=
 =?utf-8?B?Mk5pQk5aUTd2UkZHdS9zOEtmOUhJcVZGcW15cXZwWkpZMkRwejdTR1NrcVpi?=
 =?utf-8?B?bXNJdWptOGRpN09xWUpLR3g0SlJWMzZJeWFPbEE0eURIMVcxeFZObG1BdkM4?=
 =?utf-8?B?ZlJGMVhZbWhLL0JSK2c1MGZPUWhwUWNCelNzRkdJQjFKbTZHYWVqTGtNZ2hW?=
 =?utf-8?B?b280dlpNSWFWZldyL1FVKzN6bFl2K29JM0pQT0k1QnRXelJhOFV4RllYQ3hl?=
 =?utf-8?B?ZXF0UzRuS2tuNTBwWTJsWkxsZ3ZUeUpBVjRreUVnUkZxaDhXd0ZrZDgxRGZS?=
 =?utf-8?B?UlJMVjBNVStQNCtvK3plRzEwSHdJdWF1Mm1oNEhnU2NkdEZSWkRPRFhPZDlv?=
 =?utf-8?B?WTZRSDQwUGtidWw0NVdIanlXSXA1cDlCb0tjQkY2c0I4dEpGWHgzSVVRc2Zs?=
 =?utf-8?B?K2tRdTIyYXlSclZ2YVdDV3JheDBmZ3dTR1hZSWVMNHg1eGNhWHRCMDlOUTZk?=
 =?utf-8?B?Nkd2L3JSdDhJYXliYkVET0hScVlwYlFCREF3Z0p2dlBZZ1RZdk1uc0RyV0o4?=
 =?utf-8?B?d3dGdm1pUW5jb0NBcmwvdmZ4TFdkRlMxWjJXcUlQTndQYlN3bHZYbTc2NitL?=
 =?utf-8?B?WlN6OW5EWGFkWnpIZDE3U0lGUGk5ZHgwZjZ2QnB5S3V4VXNEQk13ajd5YkZX?=
 =?utf-8?B?eHJPUjV2QlJoejczMnlrRVRXc0xkV0pQRmQ2a2VFQnpTcE5tYXc0MlFtQjF5?=
 =?utf-8?B?Y3g2YUR4dUVxYWdubGlUSjdUb09VZTZ5SFFUSUlEV3RiZHU3VFptWGJUZXJz?=
 =?utf-8?B?YWlJT1VlYmcrVWFJQlhTYUhmQitSRXVDdjY4NUlLZVZaSlUySURxbmxNMExK?=
 =?utf-8?B?Y3Vhd0ZlNklSVUNiSHV2VVMwL2xZUVh1U0Y4K3N5TW9MQ2h0S2FhQ1dtMnZI?=
 =?utf-8?B?QUtwZE0rTGsvWTRkNDQydkdWTE5xZnQrOXp3YzV3a1BLcXVwdzBNd0tId3Q3?=
 =?utf-8?B?ZGtrbDlaYTZRWWdtMEUzdzB4a0FOTzZDMG9lR2pSYktmNHFpWmxPV2lIQXZn?=
 =?utf-8?B?NWUyT2VoLzF6OGNrbUIyYjltVnR3cWdMRHRtRG13UzZqUVFGTm40S2dMNm03?=
 =?utf-8?Q?uffsY/oRglKaCoN0=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: b73ae474-ac6a-441c-9b9e-08da10940c80
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Mar 2022 08:22:07.8086
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 4EfEbR5vcyT31aV+Nnkiynfp9+d/cQx1DYZuiIzr70CiM70XDt1MMLDNDfUVMVEd+s9oejAb+aNl6C6PZWlyjg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR03MB4507
X-OriginatorOrg: citrix.com

Update the configuration file Debian version after having run
mg-debian-installer-update-all.

Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
 production-config | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/production-config b/production-config
index 023b8162..9d2e7e0e 100644
--- a/production-config
+++ b/production-config
@@ -91,7 +91,7 @@ TftpNetbootGroup osstest
 TftpDiVersion_wheezy 2016-06-08
 TftpDiVersion_jessie 2018-06-26
 TftpDiVersion_stretch 2020-09-24
-TftpDiVersion_buster 2021-06-22
+TftpDiVersion_buster 2022-03-28
 
 DebianMirror_buster_armhf http://snapshot.debian.org/archive/debian/20210124T203726Z/
 
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Mon Mar 28 09:22:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 09:22:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295363.502570 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYlaE-0001Br-Ky; Mon, 28 Mar 2022 09:22:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295363.502570; Mon, 28 Mar 2022 09:22:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYlaE-0001Bk-Hy; Mon, 28 Mar 2022 09:22:42 +0000
Received: by outflank-mailman (input) for mailman id 295363;
 Mon, 28 Mar 2022 09:22:41 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYlaD-0001Ba-Hb; Mon, 28 Mar 2022 09:22:41 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYlaD-0001JP-EB; Mon, 28 Mar 2022 09:22:41 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYlaD-0004fI-0y; Mon, 28 Mar 2022 09:22:41 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nYlaD-0004cT-0Z; Mon, 28 Mar 2022 09:22:41 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=YB3O2piF9UK6FJqu4OJKDhJx7cl5h3W2mRiFuHv3sHk=; b=maGCQ3PvBJKxIAkttesxSZcdbq
	mR+6rnVNUJfizzLlxY/c+vDCiDI4eRih7ihlZTmDQ2yBcIje2djA8qCfFaswJF39YNdaiEUZfsglM
	0/ct3ucmGbCDFuelv7aMz1UhKUyFJkHiNTSGBiCLpOy9wyyDsSkAXHtQ4VXRD+8osNjk=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168909-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.16-testing test] 168909: trouble: blocked/broken/pass
X-Osstest-Failures:
    xen-4.16-testing:build-amd64:<job status>:broken:regression
    xen-4.16-testing:build-amd64-prev:<job status>:broken:regression
    xen-4.16-testing:build-amd64-pvops:<job status>:broken:regression
    xen-4.16-testing:build-amd64-xsm:<job status>:broken:regression
    xen-4.16-testing:build-amd64-xtf:<job status>:broken:regression
    xen-4.16-testing:build-arm64:<job status>:broken:regression
    xen-4.16-testing:build-arm64-pvops:<job status>:broken:regression
    xen-4.16-testing:build-arm64-xsm:<job status>:broken:regression
    xen-4.16-testing:build-armhf-pvops:<job status>:broken:regression
    xen-4.16-testing:build-i386:<job status>:broken:regression
    xen-4.16-testing:build-i386-prev:<job status>:broken:regression
    xen-4.16-testing:build-i386-pvops:<job status>:broken:regression
    xen-4.16-testing:build-i386-xsm:<job status>:broken:regression
    xen-4.16-testing:build-i386-prev:host-install(4):broken:regression
    xen-4.16-testing:build-i386-xsm:host-install(4):broken:regression
    xen-4.16-testing:build-i386:host-install(4):broken:regression
    xen-4.16-testing:build-i386-pvops:host-install(4):broken:regression
    xen-4.16-testing:build-arm64-pvops:host-install(4):broken:regression
    xen-4.16-testing:build-arm64-xsm:host-install(4):broken:regression
    xen-4.16-testing:build-arm64:host-install(4):broken:regression
    xen-4.16-testing:build-amd64-xtf:host-install(4):broken:regression
    xen-4.16-testing:build-amd64-pvops:host-install(4):broken:regression
    xen-4.16-testing:build-amd64:host-install(4):broken:regression
    xen-4.16-testing:build-amd64-prev:host-install(4):broken:regression
    xen-4.16-testing:build-amd64-xsm:host-install(4):broken:regression
    xen-4.16-testing:build-armhf-pvops:host-install(4):broken:regression
    xen-4.16-testing:test-amd64-i386-qemuu-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-qemuu-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-pvshim:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-shadow:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-coresched-amd64-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-shadow:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-rtds:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:build-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:build-arm64-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qcow2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-pvshim:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-pvhv2-intel:build-check(1):blocked:nonblocking
    xen-4.16-testing:build-i386-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-pvhv2-amd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-dom0pvh-xl-amd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-dom0pvh-xl-intel:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-livepatch:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-nested-intel:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-migrupgrade:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-pair:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-nested-amd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-pygrub:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-freebsd11-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-freebsd12-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-coresched-i386-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-freebsd10-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-freebsd10-i386:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-livepatch:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-migrupgrade:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-pair:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-qemut-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-qemut-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-arndale:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-cubietruck:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-rtds:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-xtf-amd64-amd64-1:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-xtf-amd64-amd64-2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-xtf-amd64-amd64-3:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-xtf-amd64-amd64-4:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-xtf-amd64-amd64-5:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    xen=c7a861b2d065e7c26f9d499df32eb99f546e1671
X-Osstest-Versions-That:
    xen=cfd29b83a26f35f49f074f06169ce4cadfdebf0d
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 28 Mar 2022 09:22:41 +0000

flight 168909 xen-4.16-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168909/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-prev                <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-amd64-xtf                 <job status>                 broken
 build-arm64                     <job status>                 broken
 build-arm64-pvops               <job status>                 broken
 build-arm64-xsm                 <job status>                 broken
 build-armhf-pvops               <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-prev                 <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-i386-prev               4 host-install(4)        broken REGR. vs. 168513
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168513
 build-i386                    4 host-install(4)        broken REGR. vs. 168513
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168513
 build-arm64-pvops             4 host-install(4)        broken REGR. vs. 168513
 build-arm64-xsm               4 host-install(4)        broken REGR. vs. 168513
 build-arm64                   4 host-install(4)        broken REGR. vs. 168513
 build-amd64-xtf               4 host-install(4)        broken REGR. vs. 168513
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 168513
 build-amd64                   4 host-install(4)        broken REGR. vs. 168513
 build-amd64-prev              4 host-install(4)        broken REGR. vs. 168513
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 168513
 build-armhf-pvops             4 host-install(4)        broken REGR. vs. 168513

Tests which did not succeed, but are not blocking:
 test-amd64-i386-qemuu-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-xl            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-pvshim     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemut-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemut-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemut-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1)  blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-shadow     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-vhd        1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-xsm        1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl           1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-amd64-coresched-amd64-xl  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-xsm       1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-shadow    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-rtds      1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ws16-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qemut-ws16-amd64  1 build-check(1)             blocked n/a
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qcow2     1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvshim    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-intel  1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit2   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit1   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl           1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-amd64-livepatch    1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-intel  1 build-check(1)              blocked n/a
 test-amd64-amd64-migrupgrade  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pair         1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pygrub       1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-freebsd11-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-qemuu-freebsd12-amd64  1 build-check(1)           blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-coresched-i386-xl  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-amd64  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-i386  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-amd64-i386-livepatch     1 build-check(1)               blocked  n/a
 test-amd64-i386-migrupgrade   1 build-check(1)               blocked  n/a
 test-amd64-i386-pair          1 build-check(1)               blocked  n/a
 test-amd64-i386-qemut-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemut-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-armhf-armhf-xl-arndale   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit1   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-cubietruck  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-rtds      1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-vhd       1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-1        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-2        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-3        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-4        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-5        1 build-check(1)               blocked  n/a

version targeted for testing:
 xen                  c7a861b2d065e7c26f9d499df32eb99f546e1671
baseline version:
 xen                  cfd29b83a26f35f49f074f06169ce4cadfdebf0d

Last test of basis   168513  2022-03-11 05:13:34 Z   17 days
Testing same since   168864  2022-03-25 17:37:01 Z    2 days    4 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bjoern Doebel <doebel@amazon.de>
  Jan Beulich <jbeulich@suse.com>
  Jiamei Xie <jiamei.xie@arm.com>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Thiner Logoer <logoerthiner1@163.com>

jobs:
 build-amd64-xsm                                              broken  
 build-arm64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64-xtf                                              broken  
 build-amd64                                                  broken  
 build-arm64                                                  broken  
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-prev                                             broken  
 build-i386-prev                                              broken  
 build-amd64-pvops                                            broken  
 build-arm64-pvops                                            broken  
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-xtf-amd64-amd64-1                                       blocked 
 test-xtf-amd64-amd64-2                                       blocked 
 test-xtf-amd64-amd64-3                                       blocked 
 test-xtf-amd64-amd64-4                                       blocked 
 test-xtf-amd64-amd64-5                                       blocked 
 test-amd64-amd64-xl                                          blocked 
 test-amd64-coresched-amd64-xl                                blocked 
 test-arm64-arm64-xl                                          blocked 
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           blocked 
 test-amd64-coresched-i386-xl                                 blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        blocked 
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         blocked 
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-xl-xsm                                      blocked 
 test-arm64-arm64-xl-xsm                                      blocked 
 test-amd64-i386-xl-xsm                                       blocked 
 test-amd64-amd64-qemuu-nested-amd                            blocked 
 test-amd64-amd64-xl-pvhv2-amd                                blocked 
 test-amd64-i386-qemut-rhel6hvm-amd                           blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-dom0pvh-xl-amd                              blocked 
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemut-debianhvm-amd64                     blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     blocked 
 test-amd64-i386-freebsd10-amd64                              blocked 
 test-amd64-amd64-qemuu-freebsd11-amd64                       blocked 
 test-amd64-amd64-qemuu-freebsd12-amd64                       blocked 
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         blocked 
 test-amd64-i386-xl-qemut-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         blocked 
 test-amd64-i386-xl-qemuu-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemut-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemut-ws16-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ws16-amd64                          blocked 
 test-armhf-armhf-xl-arndale                                  blocked 
 test-amd64-amd64-xl-credit1                                  blocked 
 test-arm64-arm64-xl-credit1                                  blocked 
 test-armhf-armhf-xl-credit1                                  blocked 
 test-amd64-amd64-xl-credit2                                  blocked 
 test-arm64-arm64-xl-credit2                                  blocked 
 test-armhf-armhf-xl-credit2                                  blocked 
 test-armhf-armhf-xl-cubietruck                               blocked 
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        blocked 
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         blocked 
 test-amd64-i386-freebsd10-i386                               blocked 
 test-amd64-amd64-qemuu-nested-intel                          blocked 
 test-amd64-amd64-xl-pvhv2-intel                              blocked 
 test-amd64-i386-qemut-rhel6hvm-intel                         blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-amd64-dom0pvh-xl-intel                            blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-livepatch                                   blocked 
 test-amd64-i386-livepatch                                    blocked 
 test-amd64-amd64-migrupgrade                                 blocked 
 test-amd64-i386-migrupgrade                                  blocked 
 test-amd64-amd64-xl-multivcpu                                blocked 
 test-armhf-armhf-xl-multivcpu                                blocked 
 test-amd64-amd64-pair                                        blocked 
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-amd64-amd64-xl-pvshim                                   blocked 
 test-amd64-i386-xl-pvshim                                    blocked 
 test-amd64-amd64-pygrub                                      blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-amd64-amd64-xl-qcow2                                    blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-xl-rtds                                     blocked 
 test-armhf-armhf-xl-rtds                                     blocked 
 test-arm64-arm64-xl-seattle                                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              blocked 
 test-amd64-amd64-xl-shadow                                   blocked 
 test-amd64-i386-xl-shadow                                    blocked 
 test-arm64-arm64-xl-thunderx                                 blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 
 test-arm64-arm64-xl-vhd                                      blocked 
 test-armhf-armhf-xl-vhd                                      blocked 
 test-amd64-i386-xl-vhd                                       blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-prev broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-amd64-xtf broken
broken-job build-arm64 broken
broken-job build-arm64-pvops broken
broken-job build-arm64-xsm broken
broken-job build-armhf-pvops broken
broken-job build-i386 broken
broken-job build-i386-prev broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-i386-prev host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step build-i386 host-install(4)
broken-step build-i386-pvops host-install(4)
broken-step build-arm64-pvops host-install(4)
broken-step build-arm64-xsm host-install(4)
broken-step build-arm64 host-install(4)
broken-step build-amd64-xtf host-install(4)
broken-step build-amd64-pvops host-install(4)
broken-step build-amd64 host-install(4)
broken-step build-amd64-prev host-install(4)
broken-step build-amd64-xsm host-install(4)
broken-step build-armhf-pvops host-install(4)

Not pushing.

(No revision log; it would be 394 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 09:25:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 09:25:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295370.502582 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYldE-0001rf-BH; Mon, 28 Mar 2022 09:25:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295370.502582; Mon, 28 Mar 2022 09:25:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYldE-0001rY-8F; Mon, 28 Mar 2022 09:25:48 +0000
Received: by outflank-mailman (input) for mailman id 295370;
 Mon, 28 Mar 2022 09:25:46 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=MJb9=UH=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nYldC-0001rQ-DC
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 09:25:46 +0000
Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.220.28])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 0b81e1c0-ae79-11ec-8fbc-03012f2f19d4;
 Mon, 28 Mar 2022 11:25:45 +0200 (CEST)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out1.suse.de (Postfix) with ESMTPS id EDA14210EB;
 Mon, 28 Mar 2022 09:25:44 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id C581413B08;
 Mon, 28 Mar 2022 09:25:44 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id KdzVLhh/QWLGKAAAMHmgww
 (envelope-from <jgross@suse.com>); Mon, 28 Mar 2022 09:25:44 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0b81e1c0-ae79-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648459544; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=yQbLNcQn+EiEzAZTSL8mffrkODdEvNwwdtkHcD/qU6Y=;
	b=GZcWtx+aRlz0jeqVGgVLpB3nivf/6DCZxAsbwtR65d54qS4c6DNgv94yx3SmzlwlaSISIZ
	2r9spbhm8V+PuMe3QK7TlQMBk9uEPj5Q5Vua10oefIhIlAyFaUbSI8ZbqfAdPMHWokkPS9
	G3FFbffyPXHh8Vs+juV7bpRILlAtFXc=
From: Juergen Gross <jgross@suse.com>
To: torvalds@linux-foundation.org
Cc: linux-kernel@vger.kernel.org,
	xen-devel@lists.xenproject.org,
	boris.ostrovsky@oracle.com
Subject: [GIT PULL] xen: branch for v5.18-rc1
Date: Mon, 28 Mar 2022 11:25:44 +0200
Message-Id: <20220328092544.14418-1-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

Linus,

Please git pull the following tag:

 git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-5.18-rc1-tag

xen: branch for v5.18-rc1

It contains the following patches:

- A bunch of minor cleanups
- A fix for kexec in Xen dom0 when executed on a high cpu number
- A fix for resuming after suspend of a Xen guest with assigned PCI
  devices
- A fix for a crash due to not disabled preemption when resuming as
  Xen dom0


Thanks.

Juergen

 arch/x86/xen/apic.c                         |   2 +-
 arch/x86/xen/pmu.c                          |  10 +-
 arch/x86/xen/pmu.h                          |   3 +-
 arch/x86/xen/setup.c                        |   2 +-
 arch/x86/xen/smp_hvm.c                      |   6 ++
 arch/x86/xen/smp_pv.c                       |   2 +-
 arch/x86/xen/time.c                         |  24 ++++-
 drivers/block/xen-blkfront.c                |   8 +-
 drivers/char/tpm/xen-tpmfront.c             |   2 +-
 drivers/gpu/drm/xen/xen_drm_front_evtchnl.c |   2 +-
 drivers/input/misc/xen-kbdfront.c           |   4 +-
 drivers/net/xen-netfront.c                  |  13 ++-
 drivers/pci/xen-pcifront.c                  |   2 +-
 drivers/scsi/xen-scsifront.c                |   4 +-
 drivers/usb/host/xen-hcd.c                  |   4 +-
 drivers/xen/balloon.c                       |   3 +-
 drivers/xen/gntalloc.c                      |   2 +-
 drivers/xen/gntdev-dmabuf.c                 |   2 +-
 drivers/xen/grant-table.c                   | 151 ++++------------------------
 drivers/xen/manage.c                        |   4 +-
 drivers/xen/pvcalls-front.c                 |   6 +-
 drivers/xen/sys-hypervisor.c                |   5 +-
 drivers/xen/xen-front-pgdir-shbuf.c         |   3 +-
 include/xen/grant_table.h                   |  13 +--
 net/9p/trans_xen.c                          |   8 +-
 sound/xen/xen_snd_front_evtchnl.c           |   2 +-
 26 files changed, 94 insertions(+), 193 deletions(-)

Dongli Zhang (1):
      xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32

Jakub Kądziołka (1):
      xen: don't hang when resuming PCI device

Jiapeng Chong (1):
      x86/xen: Fix kerneldoc warning

Juergen Gross (3):
      xen/grant-table: remove gnttab_*transfer*() functions
      xen/grant-table: remove readonly parameter from functions
      xen: fix is_xen_pmu()

Wang Qing (1):
      xen: use time_is_before_eq_jiffies() instead of open coding it

jianchunfu (1):
      arch:x86:xen: Remove unnecessary assignment in xen_apic_read()

zhanglianjie (1):
      drivers/xen: use helper macro __ATTR_RW


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 09:55:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 09:55:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295375.502599 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYm5y-0005EE-PO; Mon, 28 Mar 2022 09:55:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295375.502599; Mon, 28 Mar 2022 09:55:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYm5y-0005E7-M0; Mon, 28 Mar 2022 09:55:30 +0000
Received: by outflank-mailman (input) for mailman id 295375;
 Mon, 28 Mar 2022 09:55:30 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYm5y-0005Dx-1d; Mon, 28 Mar 2022 09:55:30 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYm5x-0001rz-PC; Mon, 28 Mar 2022 09:55:29 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYm5x-0005Mz-H3; Mon, 28 Mar 2022 09:55:29 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nYm5x-0000vR-GZ; Mon, 28 Mar 2022 09:55:29 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=IXQi9E2N29Fp2iBfuYoS9QKtfll44Lg5TH3Nn9b4uho=; b=ksF41DIfkpQynYzZ5sTBEtajAD
	wTJ9ys0/eiPhu2ec1KB+PGjMjoIs9ZkVOfb6Fuw9ib19JA9VZtTji0xFM1qBwxxxGkWp2HFk9EOb8
	6uACdVg+KBD6+wy11QXMeiHL0j21yef1nDlCJKyEjUZSZEarj2hHyn2xwRyEmJWa82UI=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168910-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.15-testing test] 168910: trouble: blocked/broken/pass
X-Osstest-Failures:
    xen-4.15-testing:build-amd64:<job status>:broken:regression
    xen-4.15-testing:build-amd64-prev:<job status>:broken:regression
    xen-4.15-testing:build-amd64-pvops:<job status>:broken:regression
    xen-4.15-testing:build-amd64-xsm:<job status>:broken:regression
    xen-4.15-testing:build-amd64-xtf:<job status>:broken:regression
    xen-4.15-testing:build-arm64:<job status>:broken:regression
    xen-4.15-testing:build-arm64-pvops:<job status>:broken:regression
    xen-4.15-testing:build-arm64-xsm:<job status>:broken:regression
    xen-4.15-testing:build-armhf-pvops:<job status>:broken:regression
    xen-4.15-testing:build-i386:<job status>:broken:regression
    xen-4.15-testing:build-i386-prev:<job status>:broken:regression
    xen-4.15-testing:build-i386-pvops:<job status>:broken:regression
    xen-4.15-testing:build-i386-xsm:<job status>:broken:regression
    xen-4.15-testing:build-amd64-xsm:host-install(4):broken:regression
    xen-4.15-testing:build-amd64-xtf:host-install(4):broken:regression
    xen-4.15-testing:build-amd64-prev:host-install(4):broken:regression
    xen-4.15-testing:build-amd64-pvops:host-install(4):broken:regression
    xen-4.15-testing:build-i386-xsm:host-install(4):broken:regression
    xen-4.15-testing:build-i386:host-install(4):broken:regression
    xen-4.15-testing:build-i386-prev:host-install(4):broken:regression
    xen-4.15-testing:build-i386-pvops:host-install(4):broken:regression
    xen-4.15-testing:build-arm64-pvops:host-install(4):broken:regression
    xen-4.15-testing:build-arm64:host-install(4):broken:regression
    xen-4.15-testing:build-arm64-xsm:host-install(4):broken:regression
    xen-4.15-testing:build-amd64:host-install(4):broken:regression
    xen-4.15-testing:build-armhf-pvops:host-install(4):broken:regression
    xen-4.15-testing:test-amd64-i386-qemuu-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-qemuu-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-pvshim:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-shadow:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-coresched-amd64-xl:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-shadow:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-rtds:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:build-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:build-arm64-libvirt:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qcow2:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-pvshim:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-pvhv2-intel:build-check(1):blocked:nonblocking
    xen-4.15-testing:build-i386-libvirt:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-pvhv2-amd:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-dom0pvh-xl-amd:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-dom0pvh-xl-intel:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-livepatch:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-qemuu-nested-intel:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-migrupgrade:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-pair:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-qemuu-nested-amd:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-pygrub:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-qemuu-freebsd11-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-qemuu-freebsd12-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-coresched-i386-xl:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-freebsd10-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-freebsd10-i386:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-livepatch:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-migrupgrade:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-pair:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-qemut-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-qemut-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-arndale:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-cubietruck:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-rtds:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-xtf-amd64-amd64-1:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-xtf-amd64-amd64-2:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-xtf-amd64-amd64-3:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-xtf-amd64-amd64-4:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-xtf-amd64-amd64-5:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    xen=3c8e7395e2d01140c862c78fa9483e46c0dbd343
X-Osstest-Versions-That:
    xen=cd751c09a5bab9f3529901fbe4d867ad7d52e89d
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 28 Mar 2022 09:55:29 +0000

flight 168910 xen-4.15-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168910/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-prev                <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-amd64-xtf                 <job status>                 broken
 build-arm64                     <job status>                 broken
 build-arm64-pvops               <job status>                 broken
 build-arm64-xsm                 <job status>                 broken
 build-armhf-pvops               <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-prev                 <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 168502
 build-amd64-xtf               4 host-install(4)        broken REGR. vs. 168502
 build-amd64-prev              4 host-install(4)        broken REGR. vs. 168502
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 168502
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168502
 build-i386                    4 host-install(4)        broken REGR. vs. 168502
 build-i386-prev               4 host-install(4)        broken REGR. vs. 168502
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168502
 build-arm64-pvops             4 host-install(4)        broken REGR. vs. 168502
 build-arm64                   4 host-install(4)        broken REGR. vs. 168502
 build-arm64-xsm               4 host-install(4)        broken REGR. vs. 168502
 build-amd64                   4 host-install(4)        broken REGR. vs. 168502
 build-armhf-pvops             4 host-install(4)        broken REGR. vs. 168502

Tests which did not succeed, but are not blocking:
 test-amd64-i386-qemuu-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-xl            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-pvshim     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemut-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemut-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemut-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1)  blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-shadow     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-vhd        1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-xsm        1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl           1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-amd64-coresched-amd64-xl  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-xsm       1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-shadow    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-rtds      1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ws16-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qemut-ws16-amd64  1 build-check(1)             blocked n/a
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qcow2     1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvshim    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-intel  1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit2   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit1   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl           1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-amd64-livepatch    1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-intel  1 build-check(1)              blocked n/a
 test-amd64-amd64-migrupgrade  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pair         1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pygrub       1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-freebsd11-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-qemuu-freebsd12-amd64  1 build-check(1)           blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-coresched-i386-xl  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-amd64  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-i386  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-amd64-i386-livepatch     1 build-check(1)               blocked  n/a
 test-amd64-i386-migrupgrade   1 build-check(1)               blocked  n/a
 test-amd64-i386-pair          1 build-check(1)               blocked  n/a
 test-amd64-i386-qemut-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemut-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-armhf-armhf-xl-arndale   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit1   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-cubietruck  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-rtds      1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-vhd       1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-1        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-2        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-3        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-4        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-5        1 build-check(1)               blocked  n/a

version targeted for testing:
 xen                  3c8e7395e2d01140c862c78fa9483e46c0dbd343
baseline version:
 xen                  cd751c09a5bab9f3529901fbe4d867ad7d52e89d

Last test of basis   168502  2022-03-10 09:07:57 Z   18 days
Testing same since   168863  2022-03-25 17:36:55 Z    2 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bjoern Doebel <doebel@amazon.de>
  Jan Beulich <jbeulich@suse.com>
  Jiamei Xie <jiamei.xie@arm.com>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Thiner Logoer <logoerthiner1@163.com>

jobs:
 build-amd64-xsm                                              broken  
 build-arm64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64-xtf                                              broken  
 build-amd64                                                  broken  
 build-arm64                                                  broken  
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-prev                                             broken  
 build-i386-prev                                              broken  
 build-amd64-pvops                                            broken  
 build-arm64-pvops                                            broken  
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-xtf-amd64-amd64-1                                       blocked 
 test-xtf-amd64-amd64-2                                       blocked 
 test-xtf-amd64-amd64-3                                       blocked 
 test-xtf-amd64-amd64-4                                       blocked 
 test-xtf-amd64-amd64-5                                       blocked 
 test-amd64-amd64-xl                                          blocked 
 test-amd64-coresched-amd64-xl                                blocked 
 test-arm64-arm64-xl                                          blocked 
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           blocked 
 test-amd64-coresched-i386-xl                                 blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        blocked 
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         blocked 
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-xl-xsm                                      blocked 
 test-arm64-arm64-xl-xsm                                      blocked 
 test-amd64-i386-xl-xsm                                       blocked 
 test-amd64-amd64-qemuu-nested-amd                            blocked 
 test-amd64-amd64-xl-pvhv2-amd                                blocked 
 test-amd64-i386-qemut-rhel6hvm-amd                           blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-dom0pvh-xl-amd                              blocked 
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemut-debianhvm-amd64                     blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     blocked 
 test-amd64-i386-freebsd10-amd64                              blocked 
 test-amd64-amd64-qemuu-freebsd11-amd64                       blocked 
 test-amd64-amd64-qemuu-freebsd12-amd64                       blocked 
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         blocked 
 test-amd64-i386-xl-qemut-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         blocked 
 test-amd64-i386-xl-qemuu-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemut-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemut-ws16-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ws16-amd64                          blocked 
 test-armhf-armhf-xl-arndale                                  blocked 
 test-amd64-amd64-xl-credit1                                  blocked 
 test-arm64-arm64-xl-credit1                                  blocked 
 test-armhf-armhf-xl-credit1                                  blocked 
 test-amd64-amd64-xl-credit2                                  blocked 
 test-arm64-arm64-xl-credit2                                  blocked 
 test-armhf-armhf-xl-credit2                                  blocked 
 test-armhf-armhf-xl-cubietruck                               blocked 
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        blocked 
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         blocked 
 test-amd64-i386-freebsd10-i386                               blocked 
 test-amd64-amd64-qemuu-nested-intel                          blocked 
 test-amd64-amd64-xl-pvhv2-intel                              blocked 
 test-amd64-i386-qemut-rhel6hvm-intel                         blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-amd64-dom0pvh-xl-intel                            blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-livepatch                                   blocked 
 test-amd64-i386-livepatch                                    blocked 
 test-amd64-amd64-migrupgrade                                 blocked 
 test-amd64-i386-migrupgrade                                  blocked 
 test-amd64-amd64-xl-multivcpu                                blocked 
 test-armhf-armhf-xl-multivcpu                                blocked 
 test-amd64-amd64-pair                                        blocked 
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-amd64-amd64-xl-pvshim                                   blocked 
 test-amd64-i386-xl-pvshim                                    blocked 
 test-amd64-amd64-pygrub                                      blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-amd64-amd64-xl-qcow2                                    blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-xl-rtds                                     blocked 
 test-armhf-armhf-xl-rtds                                     blocked 
 test-arm64-arm64-xl-seattle                                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              blocked 
 test-amd64-amd64-xl-shadow                                   blocked 
 test-amd64-i386-xl-shadow                                    blocked 
 test-arm64-arm64-xl-thunderx                                 blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 
 test-arm64-arm64-xl-vhd                                      blocked 
 test-armhf-armhf-xl-vhd                                      blocked 
 test-amd64-i386-xl-vhd                                       blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-prev broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-amd64-xtf broken
broken-job build-arm64 broken
broken-job build-arm64-pvops broken
broken-job build-arm64-xsm broken
broken-job build-armhf-pvops broken
broken-job build-i386 broken
broken-job build-i386-prev broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-amd64-xsm host-install(4)
broken-step build-amd64-xtf host-install(4)
broken-step build-amd64-prev host-install(4)
broken-step build-amd64-pvops host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step build-i386 host-install(4)
broken-step build-i386-prev host-install(4)
broken-step build-i386-pvops host-install(4)
broken-step build-arm64-pvops host-install(4)
broken-step build-arm64 host-install(4)
broken-step build-arm64-xsm host-install(4)
broken-step build-amd64 host-install(4)
broken-step build-armhf-pvops host-install(4)

Not pushing.

(No revision log; it would be 394 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 10:07:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 10:07:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295382.502610 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYmHt-0006xt-2O; Mon, 28 Mar 2022 10:07:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295382.502610; Mon, 28 Mar 2022 10:07:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYmHs-0006xm-VX; Mon, 28 Mar 2022 10:07:48 +0000
Received: by outflank-mailman (input) for mailman id 295382;
 Mon, 28 Mar 2022 10:07:47 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=pyAu=UH=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nYmHr-0006xg-OG
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 10:07:47 +0000
Received: from EUR02-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur02on0614.outbound.protection.outlook.com
 [2a01:111:f400:fe06::614])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e9aea2d7-ae7e-11ec-a405-831a346695d4;
 Mon, 28 Mar 2022 12:07:45 +0200 (CEST)
Received: from AS8PR04CA0194.eurprd04.prod.outlook.com (2603:10a6:20b:2f3::19)
 by DB7PR08MB3868.eurprd08.prod.outlook.com (2603:10a6:10:32::27) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.19; Mon, 28 Mar
 2022 10:07:41 +0000
Received: from VE1EUR03FT053.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:2f3:cafe::41) by AS8PR04CA0194.outlook.office365.com
 (2603:10a6:20b:2f3::19) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17 via Frontend
 Transport; Mon, 28 Mar 2022 10:07:40 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT053.mail.protection.outlook.com (10.152.19.198) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Mon, 28 Mar 2022 10:07:40 +0000
Received: ("Tessian outbound 18e50a6f0513:v113");
 Mon, 28 Mar 2022 10:07:40 +0000
Received: from 3565088f93e0.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 DEC80E69-47AA-431C-9DCD-03D186DD5233.1; 
 Mon, 28 Mar 2022 10:07:30 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 3565088f93e0.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Mon, 28 Mar 2022 10:07:30 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by DB7PR08MB3019.eurprd08.prod.outlook.com (2603:10a6:5:24::31) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.22; Mon, 28 Mar
 2022 10:07:25 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::a4a1:ded3:2013:b310]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::a4a1:ded3:2013:b310%7]) with mapi id 15.20.5102.022; Mon, 28 Mar 2022
 10:07:25 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e9aea2d7-ae7e-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=NFkgP4WjTQcMJvj0Qm4LyqKRctVvhdTkyX5lqOec/E0=;
 b=vrRPuywwlvfMU++JKNSMdl+LGB27ck30PANuwNSejCAouLe0VhIkqSqNDz4jBCCL8CUN9WYNzuk69A+7kfKYUuXd4Het3XOqVu0A+xTHnofdGnlspxy7FWf6R59KnB0zsB5T2zqPACU/BaPsDdH3heSezZrqeeHpY/KBRuSpqKs=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 4b0c2a3f89594e16
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=c+3mdBH+fy9Me+Gg1hCDgbrTlqX7wn2DrgWfMbmyT7wp7jHdjDGz/q7tM2cKrogpOO/YpeL8TPhG+Ti1Wpr524N0NFdYazwI475Ivrn7qA1Hf/DYVfLY+9qit3Jy34f8FjCJJi5W+LsbwHP1fvNDRHaZFr1+Vq3lNyBzLeGWraW3F0A1jPn6ObSTEnKArTmLGknH9O0MoSxfmiSF7GVgnVVNGJ0ob7yejrBB2fG+f4OhgFkgSOd9cWA9gB6ncOHx83leST4mGrHdXUbpz09bj/ibqChd8mC9tYehEdNNoyK+f3gjUEfEquLZFvItHf/WjpJetj2U4mnwR3NBToqchA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=NFkgP4WjTQcMJvj0Qm4LyqKRctVvhdTkyX5lqOec/E0=;
 b=AkWzcxpnz25tATpKwfIUeNMXiiAOBXry5xt1u62h2Rny9AmL+xgYrSciZ1uG9fjFnvScn64cxqbvavUTJFi9T+n2T2OtiE4Ysqzsr6ql2mKdSotxNvDy76gwcLx+gbfCsFr6/J7sIUSeNDjAOQZuhokwHiP23qB5/PCcowHIlCBYXBkthohjWjc6PmCXZnUQ0HR5DtwINlz4b9UbKcRRToQtaGg2tHNwjakhw1/dafb5cMYh7Cr7LK++qymFuauM3RKQsC9dKXiqDeF1uE1+MFQpFj+Kk0XIjKNEyrt7B7CXQgHvCWHBcJWn+7zC5H4xQ0rbUXFoNkrwiClfdB4U6A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=NFkgP4WjTQcMJvj0Qm4LyqKRctVvhdTkyX5lqOec/E0=;
 b=vrRPuywwlvfMU++JKNSMdl+LGB27ck30PANuwNSejCAouLe0VhIkqSqNDz4jBCCL8CUN9WYNzuk69A+7kfKYUuXd4Het3XOqVu0A+xTHnofdGnlspxy7FWf6R59KnB0zsB5T2zqPACU/BaPsDdH3heSezZrqeeHpY/KBRuSpqKs=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Stefano Stabellini <sstabellini@kernel.org>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, Wei Chen <Wei.Chen@arm.com>, Julien Grall
	<julien@xen.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, Andrew
 Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>, Wei Liu <wl@xen.org>, Juergen Gross
	<jgross@suse.com>, Dario Faggioli <dfaggioli@suse.com>
Subject: Re: [PATCH v4 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Topic: [PATCH v4 4/6] xen/cpupool: Create different cpupools at boot
 time
Thread-Index: AQHYP4h9C6K3pTBngUaG+FrEQR6YqqzQyAIAgAPQKgA=
Date: Mon, 28 Mar 2022 10:07:25 +0000
Message-ID: <960D7451-2186-4950-80B7-B3F5C961336D@arm.com>
References: <20220324140633.39674-1-luca.fancellu@arm.com>
 <20220324140633.39674-5-luca.fancellu@arm.com>
 <alpine.DEB.2.22.394.2203251539510.2910984@ubuntu-linux-20-04-desktop>
In-Reply-To:
 <alpine.DEB.2.22.394.2203251539510.2910984@ubuntu-linux-20-04-desktop>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 1724fe54-b971-4beb-9b8c-08da10a2cb27
x-ms-traffictypediagnostic:
	DB7PR08MB3019:EE_|VE1EUR03FT053:EE_|DB7PR08MB3868:EE_
X-Microsoft-Antispam-PRVS:
	<DB7PR08MB386894928A830F8FFEF75420E41D9@DB7PR08MB3868.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(6506007)(316002)(6486002)(2906002)(38070700005)(8676002)(33656002)(36756003)(66946007)(76116006)(66446008)(4326008)(66556008)(91956017)(86362001)(64756008)(54906003)(6916009)(7416002)(66476007)(2616005)(4744005)(508600001)(122000001)(38100700002)(83380400001)(8936002)(71200400001)(26005)(186003)(5660300002)(6512007)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <6E1AB99D41F4514DA1A93FF04AC67484@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR08MB3019
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT053.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	670bdd1b-4183-4c70-7900-08da10a2c221
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(8676002)(70206006)(107886003)(70586007)(86362001)(47076005)(4326008)(6862004)(186003)(2906002)(82310400004)(83380400001)(336012)(40460700003)(316002)(6506007)(54906003)(33656002)(26005)(6512007)(6486002)(508600001)(36756003)(36860700001)(8936002)(4744005)(2616005)(81166007)(5660300002)(356005);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Mar 2022 10:07:40.4369
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 1724fe54-b971-4beb-9b8c-08da10a2cb27
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT053.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR08MB3868

DQo+PiArDQo+PiArICAgICAgICBpZiAoICFkdF9wcm9wZXJ0eV9yZWFkX3N0cmluZyhwaGFuZGxl
X25vZGUsICJjcHVwb29sLXNjaGVkIiwNCj4gDQo+IFRoaXMgc2hvdWxkIGJlICJub2RlIiwgbm90
IHBoYW5kbGVfbm9kZQ0KDQpIaSBTdGVmYW5vLA0KDQpZZXMgc29ycnkgYWJvdXQgdGhhdCwgSSBk
aWRu4oCZdCBub3RpY2UgaXQgYmVjYXVzZSBpbiBteSBsYXN0IHRlc3QgSSB3YXMgY3JlYXRpbmcg
cG9vbHMNCndpdGggZGVmYXVsdCBzY2hlZHVsZXIsIEkgd2lsbCBwYXkgbW9yZSBhdHRlbnRpb24g
bmV4dCB0aW1lLCBzYW1lIGFwcGxpZXMgdG8gdGhlDQpzY2hlZHVsZXIgc3dhcC4gSeKAmWxsIGZp
eCB0aGVtIGluIG5leHQgc2VyaWUNCg0KPiANCj4gDQo+PiArICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAmc2NoZWR1bGVyX25hbWUpICkNCj4+ICsgICAgICAgICAgICBzY2hl
ZF9pZCA9IGNoZWNrX2FuZF9nZXRfc2NoZWRfaWQoc2NoZWR1bGVyX25hbWUpOw0KPiANCj4gSXQg
d291bGQgYmUgbmljZSBpZiB3ZSBoYWQgWEVOTE9HX0lORk8gcHJpbnRrcyB0byBwcmludCBhdCBi
b290IGZvciBlYWNoDQo+IENQVToNCj4gLSB0aGUgUG9vbElEDQo+IC0gdGhlIHNjaGVkdWxlciBu
YW1lDQo+IE5vdCByZXF1aXJlZCwgYnV0IEkgaGFkIHRvIGFkZCB0aGVtIHRvIGZpZ3VyZSBvdXQg
ZXhhY3RseSB3aGF0IHdhcyBnb2luZw0KPiBvbi4NCg0KSeKAmXZlIGFkZGVkIGEgcHJpbnRrIGlu
IGJ0Y3B1cG9vbHNfZ2V0X2NwdXBvb2xfaWQsIGRvIHlvdSB3YW50IG1lIHRvIHJlbW92ZSBmcm9t
DQp0aGVyZSBhbmQgcHJpbnQgaGVyZT8gDQoNCkNoZWVycywNCkx1Y2ENCg0K


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 10:32:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 10:32:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295385.502620 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYmfS-0001ta-3k; Mon, 28 Mar 2022 10:32:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295385.502620; Mon, 28 Mar 2022 10:32:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYmfS-0001tT-00; Mon, 28 Mar 2022 10:32:10 +0000
Received: by outflank-mailman (input) for mailman id 295385;
 Mon, 28 Mar 2022 10:32:08 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=1JyH=UH=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nYmfQ-0001tN-8T
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 10:32:08 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTP
 id 4fd2e84d-ae82-11ec-8fbc-03012f2f19d4;
 Mon, 28 Mar 2022 12:32:05 +0200 (CEST)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 8A7E1D6E;
 Mon, 28 Mar 2022 03:32:04 -0700 (PDT)
Received: from [10.57.22.195] (unknown [10.57.22.195])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id E17973F66F;
 Mon, 28 Mar 2022 03:32:01 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4fd2e84d-ae82-11ec-8fbc-03012f2f19d4
Message-ID: <9345a37d-a091-6e32-fad6-9746e49646dc@arm.com>
Date: Mon, 28 Mar 2022 12:31:52 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [PATCH v2 0/2] xen: Linker scripts synchronization
Content-Language: en-US
From: Michal Orzel <michal.orzel@arm.com>
To: Jan Beulich <jbeulich@suse.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
 <julien@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <20220322080233.53134-1-michal.orzel@arm.com>
In-Reply-To: <20220322080233.53134-1-michal.orzel@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hi Jan,

Could you please review this series as you did give some comments in v1?

On 22.03.2022 09:02, Michal Orzel wrote:
> This patch series aims to do the first step towards linker scripts
> synchronization. Linker scripts for arm and x86 share a lot of common
> sections and in order to make the process of changing/improving/syncing
> them, these sections shall be defined in just one place.
> 
> The first patch creates an empty header file xen.lds.h to store the
> constructs mutual to both x86 and arm linker scripts. It also includes
> this header in the scripts.
> 
> The second patch populates xen.lds.h with the first portion of common
> macros and replaces the original contructs with these helpers.
> 
> Michal Orzel (2):
>   xen: Introduce a header to store common linker scripts content
>   xen: Populate xen.lds.h and make use of its macros
> 
>  xen/arch/arm/xen.lds.S    |  38 +++++---------
>  xen/arch/x86/xen.lds.S    |  79 +++-------------------------
>  xen/include/xen/xen.lds.h | 108 ++++++++++++++++++++++++++++++++++++++
>  3 files changed, 129 insertions(+), 96 deletions(-)
>  create mode 100644 xen/include/xen/xen.lds.h
> 

Cheers,
Michal


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 10:40:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 10:40:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295395.502636 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYmnB-0003Qn-Vs; Mon, 28 Mar 2022 10:40:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295395.502636; Mon, 28 Mar 2022 10:40:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYmnB-0003Qg-Rg; Mon, 28 Mar 2022 10:40:09 +0000
Received: by outflank-mailman (input) for mailman id 295395;
 Mon, 28 Mar 2022 10:40:09 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYmnB-0003QW-Ad; Mon, 28 Mar 2022 10:40:09 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYmnB-0002hY-6b; Mon, 28 Mar 2022 10:40:09 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYmnA-0006KE-UI; Mon, 28 Mar 2022 10:40:09 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nYmnA-00078E-Tq; Mon, 28 Mar 2022 10:40:08 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=NuQw8xiNb9nGEQ2dKJ67w9uPAbWqA0tEeEceA3LI7Sg=; b=dwEcGACt5Fx2MsZiWvwZJubQ/C
	n1cHCiHlPK9fMhhlOBI36Pkj6WfvXuHCzSiWeT3gkGRhh7Ht9TUhW6Y5iyouGGG0KMohYmhmoqYL3
	5/rpcYemu7RTAhrMS+AiYKj+v8fQSLk62Jj/6R7i8/FRx0vfuInB6+wVGANbdcqqEyq0=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168911-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168911: trouble: blocked/broken/pass
X-Osstest-Failures:
    qemu-mainline:build-amd64:<job status>:broken:regression
    qemu-mainline:build-amd64-pvops:<job status>:broken:regression
    qemu-mainline:build-amd64-xsm:<job status>:broken:regression
    qemu-mainline:build-arm64:<job status>:broken:regression
    qemu-mainline:build-arm64-pvops:<job status>:broken:regression
    qemu-mainline:build-arm64-xsm:<job status>:broken:regression
    qemu-mainline:build-armhf-pvops:<job status>:broken:regression
    qemu-mainline:build-i386:<job status>:broken:regression
    qemu-mainline:build-i386-pvops:<job status>:broken:regression
    qemu-mainline:build-i386-xsm:<job status>:broken:regression
    qemu-mainline:build-i386-pvops:host-install(4):broken:regression
    qemu-mainline:build-amd64:host-install(4):broken:regression
    qemu-mainline:build-amd64-xsm:host-install(4):broken:regression
    qemu-mainline:build-arm64-xsm:host-install(4):broken:regression
    qemu-mainline:build-i386-xsm:host-install(4):broken:regression
    qemu-mainline:build-i386:host-install(4):broken:regression
    qemu-mainline:build-arm64:host-install(4):broken:regression
    qemu-mainline:build-arm64-pvops:host-install(4):broken:regression
    qemu-mainline:build-amd64-pvops:host-install(4):broken:regression
    qemu-mainline:build-armhf-pvops:host-install(4):broken:regression
    qemu-mainline:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-qemuu-rhel6hvm-amd:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-pair:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-freebsd10-i386:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-freebsd10-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-coresched-i386-xl:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-coresched-amd64-xl:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:build-amd64-libvirt:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-shadow:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-rtds:build-check(1):blocked:nonblocking
    qemu-mainline:build-arm64-libvirt:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    qemu-mainline:build-i386-libvirt:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-dom0pvh-xl-amd:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-dom0pvh-xl-intel:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qcow2:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-pvshim:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-pair:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-pygrub:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-pvhv2-intel:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-freebsd11-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-freebsd12-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-pvhv2-amd:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-intel:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-multivcpu:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-credit1:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-credit2:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-qemuu-rhel6hvm-intel:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-shadow:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-vhd:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-xsm:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    qemuu=3d31fe4d662f13c70eb7e87f29513623ccd76322
X-Osstest-Versions-That:
    qemuu=f345abe36527a8b575482bb5a0616f43952bf1f4
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 28 Mar 2022 10:40:08 +0000

flight 168911 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168911/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-arm64                     <job status>                 broken
 build-arm64-pvops               <job status>                 broken
 build-arm64-xsm                 <job status>                 broken
 build-armhf-pvops               <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168856
 build-amd64                   4 host-install(4)        broken REGR. vs. 168856
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 168856
 build-arm64-xsm               4 host-install(4)        broken REGR. vs. 168856
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168856
 build-i386                    4 host-install(4)        broken REGR. vs. 168856
 build-arm64                   4 host-install(4)        broken REGR. vs. 168856
 build-arm64-pvops             4 host-install(4)        broken REGR. vs. 168856
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 168856
 build-armhf-pvops             4 host-install(4)        broken REGR. vs. 168856

Tests which did not succeed, but are not blocking:
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl           1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-cubietruck  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-rtds      1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-vhd       1 build-check(1)               blocked  n/a
 test-amd64-i386-qemuu-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-pair          1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-i386  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-amd64  1 build-check(1)               blocked  n/a
 test-amd64-coresched-i386-xl  1 build-check(1)               blocked  n/a
 test-amd64-coresched-amd64-xl  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-xsm       1 build-check(1)               blocked  n/a
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-shadow    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-rtds      1 build-check(1)               blocked  n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ws16-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-dom0pvh-xl-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1) blocked n/a
 test-amd64-amd64-dom0pvh-xl-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qcow2     1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvshim    1 build-check(1)               blocked  n/a
 test-amd64-amd64-pair         1 build-check(1)               blocked  n/a
 test-amd64-amd64-pygrub       1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-freebsd11-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-qemuu-freebsd12-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-xl-pvhv2-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-intel  1 build-check(1)              blocked n/a
 test-amd64-amd64-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit1   1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-arndale   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit1   1 build-check(1)               blocked  n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-xl            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-pvshim     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1)  blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-shadow     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-vhd        1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-xsm        1 build-check(1)               blocked  n/a

version targeted for testing:
 qemuu                3d31fe4d662f13c70eb7e87f29513623ccd76322
baseline version:
 qemuu                f345abe36527a8b575482bb5a0616f43952bf1f4

Last test of basis   168856  2022-03-25 15:08:16 Z    2 days
Testing same since   168873  2022-03-26 10:38:21 Z    2 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Peter Maydell <peter.maydell@linaro.org>
  Richard Henderson <richard.henderson@linaro.org>

jobs:
 build-amd64-xsm                                              broken  
 build-arm64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64                                                  broken  
 build-arm64                                                  broken  
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            broken  
 build-arm64-pvops                                            broken  
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-amd64-amd64-xl                                          blocked 
 test-amd64-coresched-amd64-xl                                blocked 
 test-arm64-arm64-xl                                          blocked 
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           blocked 
 test-amd64-coresched-i386-xl                                 blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-xl-xsm                                      blocked 
 test-arm64-arm64-xl-xsm                                      blocked 
 test-amd64-i386-xl-xsm                                       blocked 
 test-amd64-amd64-qemuu-nested-amd                            blocked 
 test-amd64-amd64-xl-pvhv2-amd                                blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-dom0pvh-xl-amd                              blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     blocked 
 test-amd64-i386-freebsd10-amd64                              blocked 
 test-amd64-amd64-qemuu-freebsd11-amd64                       blocked 
 test-amd64-amd64-qemuu-freebsd12-amd64                       blocked 
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         blocked 
 test-amd64-i386-xl-qemuu-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ws16-amd64                          blocked 
 test-armhf-armhf-xl-arndale                                  blocked 
 test-amd64-amd64-xl-credit1                                  blocked 
 test-arm64-arm64-xl-credit1                                  blocked 
 test-armhf-armhf-xl-credit1                                  blocked 
 test-amd64-amd64-xl-credit2                                  blocked 
 test-arm64-arm64-xl-credit2                                  blocked 
 test-armhf-armhf-xl-credit2                                  blocked 
 test-armhf-armhf-xl-cubietruck                               blocked 
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        blocked 
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         blocked 
 test-amd64-i386-freebsd10-i386                               blocked 
 test-amd64-amd64-qemuu-nested-intel                          blocked 
 test-amd64-amd64-xl-pvhv2-intel                              blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-amd64-dom0pvh-xl-intel                            blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-xl-multivcpu                                blocked 
 test-armhf-armhf-xl-multivcpu                                blocked 
 test-amd64-amd64-pair                                        blocked 
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-amd64-amd64-xl-pvshim                                   blocked 
 test-amd64-i386-xl-pvshim                                    blocked 
 test-amd64-amd64-pygrub                                      blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-amd64-amd64-xl-qcow2                                    blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-xl-rtds                                     blocked 
 test-armhf-armhf-xl-rtds                                     blocked 
 test-arm64-arm64-xl-seattle                                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              blocked 
 test-amd64-amd64-xl-shadow                                   blocked 
 test-amd64-i386-xl-shadow                                    blocked 
 test-arm64-arm64-xl-thunderx                                 blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 
 test-arm64-arm64-xl-vhd                                      blocked 
 test-armhf-armhf-xl-vhd                                      blocked 
 test-amd64-i386-xl-vhd                                       blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-arm64 broken
broken-job build-arm64-pvops broken
broken-job build-arm64-xsm broken
broken-job build-armhf-pvops broken
broken-job build-i386 broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-i386-pvops host-install(4)
broken-step build-amd64 host-install(4)
broken-step build-amd64-xsm host-install(4)
broken-step build-arm64-xsm host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step build-i386 host-install(4)
broken-step build-arm64 host-install(4)
broken-step build-arm64-pvops host-install(4)
broken-step build-amd64-pvops host-install(4)
broken-step build-armhf-pvops host-install(4)

Not pushing.

------------------------------------------------------------
commit 3d31fe4d662f13c70eb7e87f29513623ccd76322
Merge: f345abe365 c7ca3ad5e7
Author: Peter Maydell <peter.maydell@linaro.org>
Date:   Fri Mar 25 15:02:39 2022 +0000

    Merge tag 'pull-target-arm-20220325' of https://git.linaro.org/people/pmaydell/qemu-arm into staging
    
    target-arm queue:
     * hw/intc/arm_gicv3_its: Add missing newlines to process_mapc() logging
     * target/arm: Fix sve_ld1_z and sve_st1_z vs MMIO
    
    # gpg: Signature made Fri 25 Mar 2022 14:56:48 GMT
    # gpg:                using RSA key E1A5C593CD419DE28E8315CF3C2525ED14360CDE
    # gpg:                issuer "peter.maydell@linaro.org"
    # gpg: Good signature from "Peter Maydell <peter.maydell@linaro.org>" [ultimate]
    # gpg:                 aka "Peter Maydell <pmaydell@gmail.com>" [ultimate]
    # gpg:                 aka "Peter Maydell <pmaydell@chiark.greenend.org.uk>" [ultimate]
    # Primary key fingerprint: E1A5 C593 CD41 9DE2 8E83  15CF 3C25 25ED 1436 0CDE
    
    * tag 'pull-target-arm-20220325' of https://git.linaro.org/people/pmaydell/qemu-arm:
      hw/intc/arm_gicv3_its: Add missing newlines to process_mapc() logging
      target/arm: Fix sve_ld1_z and sve_st1_z vs MMIO
    
    Signed-off-by: Peter Maydell <peter.maydell@linaro.org>

commit c7ca3ad5e756e263daf082c315e311593ccec3d1
Author: Peter Maydell <peter.maydell@linaro.org>
Date:   Fri Mar 25 14:41:06 2022 +0000

    hw/intc/arm_gicv3_its: Add missing newlines to process_mapc() logging
    
    In commit 84d43d2e82da we rearranged the logging of errors in
    process_mapc(), and inadvertently dropped the trailing newlines
    from the log messages. Restore them. The same commit also
    attempted to switch the ICID printing to hex (which is how we
    print ICIDs elsewhere) but only did half the job, adding the
    0x prefix but leaving the format string at %d; correct to %x.
    
    Fixes: 84d43d2e82da ("hw/intc/arm_gicv3_its: In MAPC with V=0, don't check rdbase field")
    Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
    Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
    Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>

commit 6222c3acc4f36fc31d057e1afb6b5c408f83d343
Author: Richard Henderson <richard.henderson@linaro.org>
Date:   Fri Mar 25 14:41:06 2022 +0000

    target/arm: Fix sve_ld1_z and sve_st1_z vs MMIO
    
    Both of these functions missed handling the TLB_MMIO flag
    during the conversion to handle MTE.
    
    Fixes: 10a85e2c8ab6 ("target/arm: Reuse sve_probe_page for gather loads")
    Resolves: https://gitlab.com/qemu-project/qemu/-/issues/925
    Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
    Message-id: 20220324010932.190428-1-richard.henderson@linaro.org
    Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
    Signed-off-by: Peter Maydell <peter.maydell@linaro.org>


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 11:21:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 11:21:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295403.502647 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYnQv-0007qt-9l; Mon, 28 Mar 2022 11:21:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295403.502647; Mon, 28 Mar 2022 11:21:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYnQv-0007qm-6m; Mon, 28 Mar 2022 11:21:13 +0000
Received: by outflank-mailman (input) for mailman id 295403;
 Mon, 28 Mar 2022 11:21:12 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=dCnP=UH=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nYnQu-0007qg-38
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 11:21:12 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2b267895-ae89-11ec-a405-831a346695d4;
 Mon, 28 Mar 2022 13:21:10 +0200 (CEST)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2053.outbound.protection.outlook.com [104.47.14.53]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-27-C-21T5iiMK6XC_c2wpKyyw-1; Mon, 28 Mar 2022 13:21:08 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM0PR04MB5748.eurprd04.prod.outlook.com (2603:10a6:208:123::30)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.22; Mon, 28 Mar
 2022 11:21:07 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%5]) with mapi id 15.20.5102.022; Mon, 28 Mar 2022
 11:21:06 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2b267895-ae89-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648466469;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=PiJCa61unhO5yryVZ4HW6DE+2QIA8JuE7jKW9c+xtiI=;
	b=egd4yG7/ebOSblCsts0LudNtu1ECiox4nILkD/RpKD0jPYxXob7P0ELgtRswpDvI1Y+F46
	9A1aA6/2cUBTrD1xd2IKXbfGw8pC62avvpcpEG1c3xFWuh6dHpV9G2E4dfg3IzB/RzFo4K
	LLrOt0hNplvLhHymoNVuwhod2wZDO74=
X-MC-Unique: C-21T5iiMK6XC_c2wpKyyw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=h93QkaSIqk0jXs2jwt78f1I8raORvL/Y2jk4IyGNtHNlTbqnYzOGFIGYPPpw+CyJhCPRsxcGU3OaRsX5NNYdvQZY632M2r2QegrKPDrVMI36LgLAmrv07bWSJHbh5Sn7+E99bduHSXw9YCQlAEe4LOFKdzhsePOjtXpY8dvgcBp2ls9So9eHJs+e+NbSurxO7B1MLTX/4koTbeAuk25KYJ3nAYkNLHAoRY75xQgtyo7oMingeNyDQxU74JdS78nIcciCtCsKQaYLFH/ltKZzGBtLUXrfgMMLAerZ1ft7Z98df3/qYTs2vzQBQX5osCELegZ3qO4HohXdHI0Bi+VlNg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=PiJCa61unhO5yryVZ4HW6DE+2QIA8JuE7jKW9c+xtiI=;
 b=BMKkpI5uty5paTXc62lt+Oa+54TReo7RTVhbTotmBDvnKN/zSg5rRaTQXLIudUP8oKx2jMQzhenKmPq4D44WcUtaciHdIDqLdVzuZv0v622okYuotcxVZSoivIul5Rwzi97noqKvWYCsJ/Ay2WBSmC1Gte5TrzBTY7ud9z8+AVuPnvYepT8ZNs4RCTIye8mfOsfTlEl/VebIwfMq5ON1qMK2i1+cOsFGQrU+0atLvcL0RkNTDFDiIVyII2therjN4wIfC1GPL4wFphCL7ajYZwlkXKSYoDye17ubdZsH0PK5D1JcrsBfXd3XVD2xnHAU2SCy3IiKhzqH6ECzS8oBmA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <b86a45e6-cd2a-2072-78e4-22de098b02d0@suse.com>
Date: Mon, 28 Mar 2022 13:21:07 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2 0/2] xen: Linker scripts synchronization
Content-Language: en-US
To: Michal Orzel <michal.orzel@arm.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
 <julien@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <20220322080233.53134-1-michal.orzel@arm.com>
 <9345a37d-a091-6e32-fad6-9746e49646dc@arm.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <9345a37d-a091-6e32-fad6-9746e49646dc@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM7PR02CA0011.eurprd02.prod.outlook.com
 (2603:10a6:20b:100::21) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 67a3edf1-1805-47c1-3dd3-08da10ad0d3f
X-MS-TrafficTypeDiagnostic: AM0PR04MB5748:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB5748057AB1D60AC8DBA6DACBB31D9@AM0PR04MB5748.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(4326008)(66476007)(66556008)(66946007)(8676002)(6486002)(2906002)(5660300002)(316002)(36756003)(6512007)(54906003)(7416002)(83380400001)(31686004)(6916009)(38100700002)(2616005)(508600001)(26005)(8936002)(186003)(6506007)(31696002)(86362001)(53546011)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?YUdlR0N6MUxOS3d4bE9rZ3lQSnBaZCtBMnltVVRjMVMrdDlTSUVJR1Y3bVAw?=
 =?utf-8?B?TDhJTVVhajFpNlpKTy90clFSTytLVklUMFU4d1JlMkJwcnArQU5rRVBjeklj?=
 =?utf-8?B?SWhuSGJBYXplM2loM1ZuYllITVBpYTUwTVhZWjFmSkhZVmZiUW5pOHZrcjZs?=
 =?utf-8?B?cUJjMk5NRkdaUXlSOURYeS9lWEY4V2NXMlo3eTdLSVJ1bXd0ZERTRVVXUDdT?=
 =?utf-8?B?SlNwdXRZZHdRczdIQWM2YXV5TWZNbzRIMFNYTHhBak1zUlo0Tk9heERlL3JP?=
 =?utf-8?B?SHdZZFVWc1ZVcEJQem9FdlNobkc1NFZiMjhEWVJmZDZpQjMvMkhvQVd0bC8z?=
 =?utf-8?B?V3FKcWhYdWdkWmtyMm1wYXVLR2lueTFuMDA2R1Zvc04xWW1TejdockJISTU2?=
 =?utf-8?B?ZS90M0o0bnNnQjJGSjBrdzdNbWltMTFzck1YSGNXeXh0UW0vd0NiZ2RaYUY4?=
 =?utf-8?B?enUwY2w4aXBucnJqNVdSaE4xd1Qwd0Q1aCtNVmhvR1FpOUZrMXNhU1BTbm5B?=
 =?utf-8?B?Zm4vazNGTll2M3I5dCs3RzNUNExVTmR5YmVpYnBoZzRTdi8xVjZVa1lKREhD?=
 =?utf-8?B?cjlJNEQrem8yMTRiNWwwNzJsaWlUWGtULzQ2MyttT0N5NEo3RkNEdWljL0xR?=
 =?utf-8?B?enFLTHZCdDZ5SEFTTGhwcW13T0hsdjhuOEd4aUh2bGhYb3Z0WFNBSkdYK3hh?=
 =?utf-8?B?ZXFUYTlPd1VTeVBOaytwdU9zcm1vc2l1UjdTRjNtbjlvYWp4ZDRaeGNTZXIr?=
 =?utf-8?B?NElnOWpYaDYrOWczUDlwNVk5a0x6UGtnakRydisxYi9aK2I2Mjd5b0U3U1Bi?=
 =?utf-8?B?UFE0MUVqZkN5QmxEbE1wMVJqZHNkYkVnWVZGRzd0TlZhaWZPKzMzc0V4ZkZo?=
 =?utf-8?B?bmpLT2lHb1pFMFJZeGxiZVlLMWQ3bFZ3eUtUNldVMFNnSGhwb29KOW9HVG10?=
 =?utf-8?B?NDlmVEo1a2xjdE9kdnY0T2JmaU5mRkw4dms3QnQzd2JkN2V4YUJpaDZ2UVFs?=
 =?utf-8?B?eTNaV2hnNjBSbStVWWs4MHVubnA0QUlrdFltdW91NjIzbkl0eHhQRE9TY21k?=
 =?utf-8?B?dmpWUHp5Q2NGay9jVUZVeFVPZEpzZEVHbVlKaFFBcjY5Szd6UERMWGY3dU9k?=
 =?utf-8?B?ZURhQXA2YUc4TXJxZU90bUN1VHArZGRqWC9xR0QyUndpUjQ2c3lVc0tFSGxu?=
 =?utf-8?B?a1NmR3JEd0VlRGRXYzBDMzFlWlhENXlJbXhvNkxDQU10WVBEdWVTa2dZVUNt?=
 =?utf-8?B?MVk4Y0FnZ0JSTDIxaU5USmRHNFowcDdkNU83YVdhTVdBdlFuZm9Ta2ppVU1J?=
 =?utf-8?B?d2FDdTFvUXVNRUY3dnlsRzc2ZmJtcFZwSy9OT0VPZVgvejJPbitMU0V5S2dM?=
 =?utf-8?B?S1FGbnlYN01xcHdPWmJTWUExaEFEbGxHbnJRMkNFL0xuN2J1TzJEc3FrUEkv?=
 =?utf-8?B?d1hDajExOUxScVdPQUNiL2d0bGoyYTRLTGxHVUVvNVJ4cUk5UXRpajVwVG5p?=
 =?utf-8?B?Vjc2QWFySHR4aDJXNlh4U0tOVUVUcFk4amp1WnRxS3NkbE5rZXRUWExWS29s?=
 =?utf-8?B?T25KbVNCTTJpUisybUZDTjNTWjJkTk1WTkpoV3Z3bEJlT2Q5ZVNPNFh4b2Uy?=
 =?utf-8?B?LzRMdGJISlNoQUcwMjFSM0RFUXIzM2RkRGh2aG4wbTl6VUZXNVpRcnlYVmxn?=
 =?utf-8?B?NmVDT3ZkUXpWK1VlYWdJU1RtbVhoTGdpdWlzcjNCeENjV0tpd2lTVi9NSWFm?=
 =?utf-8?B?eTlvSmwyQnhUMHhXRFhJR3NsNTh3VVo2UERaRTRBOGdDb21SWVU1K0tHdmI2?=
 =?utf-8?B?UXBqemh0aXk2VEEwNUpFMy9VVkhqYlk0REhIdE9mcmkzYkRQeUF3blNhYWtC?=
 =?utf-8?B?elpmK0lFN09rK0dzOFErY0RlY1JlU3ZSVVFSWGZFT011dkNEcDVVZTFRNlhm?=
 =?utf-8?B?cE5VU2U2L3M1OVdwZ1cwZXVnbHhBQ3lyRWFET29lUjBnekVYZTVhd2xvYmtF?=
 =?utf-8?B?SEVLbnRGanBsVFpZbmFFWFFKcnI0TVVENmFlZy9pMDdBUmJ1V2dTMzNLeWhU?=
 =?utf-8?B?a05XUjdGYmFtdXNrUUpGNXE5MzUxTy9oZi9xa0pnckRjdVJ5ZkF3bytsVEQ4?=
 =?utf-8?B?ZDJZVUdYdTNPbzlpdmRlVER4UVdzL1p2b2srMTQxeTVLUkJLSmlxQnBrUHJ2?=
 =?utf-8?B?QTRPclAxbk0rSDdXcGVBYzZ5SitBSjRJTDRhcWdEZ2hpWDRhSExtMzdtQ0dH?=
 =?utf-8?B?cStjQzNLbE1PbFBoSWZSZDdEckNOT3VmWjFQMGo3d25aVFNlVHdlbUMwcWZD?=
 =?utf-8?B?dGQ3ckVHc1RXQmg2YUxXekZKd29sZmI3TEw2MFVWREVBeWdBV0ZQQT09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 67a3edf1-1805-47c1-3dd3-08da10ad0d3f
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Mar 2022 11:21:06.8511
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: gjD3tWW5SWqwWMmO4sDENW3+T3fxDRm+1yuFgGsL3D0+OS8LGYYiIRCPpoewJ1uOhn2dA88x+cTEwBAaWxkKCQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB5748

On 28.03.2022 12:31, Michal Orzel wrote:
> Could you please review this series as you did give some comments in v1?

I have it on my list of things to look at, yes.

Jan

> On 22.03.2022 09:02, Michal Orzel wrote:
>> This patch series aims to do the first step towards linker scripts
>> synchronization. Linker scripts for arm and x86 share a lot of common
>> sections and in order to make the process of changing/improving/syncing
>> them, these sections shall be defined in just one place.
>>
>> The first patch creates an empty header file xen.lds.h to store the
>> constructs mutual to both x86 and arm linker scripts. It also includes
>> this header in the scripts.
>>
>> The second patch populates xen.lds.h with the first portion of common
>> macros and replaces the original contructs with these helpers.
>>
>> Michal Orzel (2):
>>   xen: Introduce a header to store common linker scripts content
>>   xen: Populate xen.lds.h and make use of its macros
>>
>>  xen/arch/arm/xen.lds.S    |  38 +++++---------
>>  xen/arch/x86/xen.lds.S    |  79 +++-------------------------
>>  xen/include/xen/xen.lds.h | 108 ++++++++++++++++++++++++++++++++++++++
>>  3 files changed, 129 insertions(+), 96 deletions(-)
>>  create mode 100644 xen/include/xen/xen.lds.h
>>
> 
> Cheers,
> Michal
> 



From xen-devel-bounces@lists.xenproject.org Mon Mar 28 11:41:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 11:41:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295410.502669 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYnkF-0001tK-4H; Mon, 28 Mar 2022 11:41:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295410.502669; Mon, 28 Mar 2022 11:41:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYnkF-0001tD-19; Mon, 28 Mar 2022 11:41:11 +0000
Received: by outflank-mailman (input) for mailman id 295410;
 Mon, 28 Mar 2022 11:41:09 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Ynyj=UH=citrix.com=prvs=079c560b7=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nYnkD-0001t7-CN
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 11:41:09 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id efa82866-ae8b-11ec-a405-831a346695d4;
 Mon, 28 Mar 2022 13:41:01 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: efa82866-ae8b-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648467661;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=Ja14lLKCFFdpgA1ybqBd3qI8RWeXZWtBQPg6d5/mHco=;
  b=ap/t/FOcLUe7UljPDU6qlueABHp72YZ1ksE+owJu/kTXrJMMhfdUL+8p
   65zPzb2gpRuqvnrF3BHExwzIAykM5mzc/anD5RtYQBZ1h/cUUNtD6Aekl
   mAlEe5Z9PK9t0ljqYlHT0DNx+pPSoP6SIdbptn1Xm/GxQrcIwMsnbqcVR
   s=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67318034
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:RTmXHKDyZyaM2RVW/xDjw5YqxClBgxIJ4kV8jS/XYbTApD5w0TwDy
 2JJC2uPbPmNYGqkLY8kbtm28xwE6MKEmNZjQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vj0tYx6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhrk
 /Jc5a3zZj54M6vMgNwcAwZXNgZXaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguw5K8bmJsUHs2xIxjDFF/c2B5vERs0m4PcGg2xp1pgVQZ4yY
 eInawRANwn/eyRSHWcZT5thheuHwVngJmgwRFW9+vNsvjm7IBZK+KfpGMrYfJqNX8o9tkqAv
 WfH42S/DhwEHNOawDuBtHmrg4fnnyn2RYYTH72Q7eNxjRuYwWl7IB8fU1ehsOS6okG7UtNbb
 UcT/0IGvaU0sUCmUNT5dxm5u2Kf+A4RXcJKFO834x3LzbDbizt1HUBdEGQHMoZ/8pZrG3p6j
 Tdlgu8FGxR165qEGUPe2Y7FoDWyIRAUfXANQAgtGF5tD8bYnKk/iRfGT9BGGaGzj8HoFTyY/
 w1mvBTSlJ1I05dVivzTEUTvxmv1+8OXFlJdChD/BDrN0+9vWGKyi2VEA3D/5O0IEouWR0LpU
 JMsy5nHt7Bm4X1geUWwrAQx8FOBuq3t3N702wcH83wdG9KFoSTLkWd4um0WGauRGpxYEQIFm
 WeK0e+r2LddPWGxcYh8aJ+rBsIhwMDITIq5BqyMMYAUPMMvJGdrGR2Cg2bKhQgBd2B2zMkC1
 WqzK57wXR7294w5pNZJewvt+eBynX1vrY8ibZv60w6mwdKjiI29Et843K+1Rrlhtsus+VyNm
 /4Gbpfi40gPAYXWP3iMmaZOfA9iEJTOLc2vwyChXrXYeVQO9aBII6K5/I7NjKQ4xvwMzb2Zp
 yvVt40x4AOXuEAr4D6iMxhLQLjuQYx+vTQ8OyktNkyvwH8tfcCk66J3Snf9VeBPGDBLpRKsc
 8Q4Rg==
IronPort-HdrOrdr: A9a23:JaFNsqHkN05mu9vgpLqFBpHXdLJyesId70hD6qkvc3Jom52j+P
 xGws526faVslYssHFJo6HnBEClewKgyXcV2/hqAV7GZmjbUQSTXeRfBOfZslnd8mjFh5JgPM
 RbAtlD4b/LfCBHZK/BiWHSebtQo6jkzEnrv5ak854Ed3AVV0gK1XYBNu/0KDwQeOEQbqBJa6
 Z0q/A37waISDAyVICWF3MFV+/Mq5nik4/nWwcPA1oC5BOVhT2lxbbmG1zAty1uGQ9n8PMHyy
 zoggb57qKsv7WSzQLd7Xba69BzlMH6wtVOKcSQgow+KynqiCyveIN9Mofy9wwdkaWK0hIHgd
 PMqxAvM4Ba7G7QRHi8pV/X1wzpwF8Vmgjf4G7dpUGmjd3yRTo8BcYEr5leaAHl500pu8w5+L
 5X3kqC3qAnQi/orWDY3ZzlRhtqnk27rT4JiugIlUFSVoMYdft4sZEfxkVIC50NdRiKpLzPKN
 MeTf002cwmMW9zNxvizypSKZ2XLzkO9y69MwY/Upf/6UkVoJh7p3FosPD30E1wsa7VcKM0lN
 gsAp4Y5I2mcfVmH56VJN1xN/dfWVa9CC4lDgqpUCHa/ec8Sjbwl6I=
X-IronPort-AV: E=Sophos;i="5.90,217,1643691600"; 
   d="scan'208";a="67318034"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=EW3w7Gw1MBYEAwAP7zjJiRON/D5CJY7Bvv00zUjZUtMqnN+HFFEW7qWRCIqR7fmxE94D0yllg2MItkHdBfb/bzELIWo7NzfdEoAz8oR6rbhnbshMcikclRzKyeu3QnET+rkut+RuV8PRGmUpuMBBzS7WA1D1R8QDKAZ0FocXI8+mZMIPuTbWBC7P8i+r8hw72kckDvBzzMWGaiCf/BoJT805WgzHBFIG26tsQwbW7iicqduuQ2CFY4ynBbsH51mcsq/N7xcaV2EUVEBmfIHhnb7T3ZqFzSy8NTY1dELmxLrWybkZXpB1u/OGpMP2GLfhRTNLozPuhy14u5VzhHpxPg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=S0QByrze7LV9nXdPPsdMRWDlVINwH5A6CZ+WwDS0wWk=;
 b=bwrTNMCFe7+BeC69gXRNbgppaoXhUY/Dolf1qAD4cwlbeRJRP8x6AKppAWUPffLpR0unpcrrhVp2DlC8u9sh4FzDOQfnadfOgvjS40WFWq5fB48etEVY21wdY2ksxE07QSHO50GO+SWUPn70wcm+7+sAunzX5A1VMoBx80FCYGunUmw5Ic3P+yCewwAPllXfFZR+rdiTdG087bRNTfITC4ZDw6dZ6s1uoPpuEpp5Q/wlQj5yHx0/4WsOWyIL6p6Y03t0cMKbRb87FN453099nJ0oJApHokhmAkiRL0HeU78pKQpHDeXExDKvo2UJQPK8nLKfeD8bjJzZq//+QNiBbg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=S0QByrze7LV9nXdPPsdMRWDlVINwH5A6CZ+WwDS0wWk=;
 b=Z3qGXuP1/58KHBBcxzia7IpQzhLNvPM9NL8cG92x4xYE/fywJsezprCJAPg31BDRTgcX+nnE6pMUIiVHJhuxqYlW4ffbHxrlpnpn+CP8AkTHqJ5Vp/kXb9HpqoEphyeppO/MUXWesbE9wR2UMSvw6k26djZ9dU2gVxZomU8N+F8=
Date: Mon, 28 Mar 2022 13:40:45 +0200
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jason Andryuk <jandryuk@gmail.com>
CC: <xen-devel@lists.xenproject.org>, Jan Beulich <jbeulich@suse.com>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>, "Daniel P. Smith"
	<dpsmith.dev@gmail.com>
Subject: Re: [PATCH] x86/physdev: Call xsm_unmap_domain_irq earlier
Message-ID: <YkGevRlIpAlCDox7@Air-de-Roger>
References: <20220325141826.16245-1-jandryuk@gmail.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <20220325141826.16245-1-jandryuk@gmail.com>
X-ClientProxiedBy: LO4P123CA0110.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:192::7) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 4cdeb6ae-d578-45be-838c-08da10afcf0c
X-MS-TrafficTypeDiagnostic: MWHPR03MB3198:EE_
X-Microsoft-Antispam-PRVS: <MWHPR03MB319866C39B3142728E52423A8F1D9@MWHPR03MB3198.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: i1XX5iTKwyBI6r7FfEjJz/kIzkW1xYx8ef9b9+PB2KgBBG7MAj5P5IQwrtcawBUpL0pVtm7Fx5AJ2nf4Iqnypx79FQc3unrnDaCAEzetwiPNwX7Uwmg8VAE66GQ2xyq5sJqC0soCFtNBr/TBT5U+7p6W+djv+9BFwGX4qIM84ltg62x8cZRV0u5XENwpWEsYANM48NR8i4mbdwesKDWxN+q3iBN1C+JTT0eYivVyfpr2DMgIsRtLW4LOhki7kjRzNAA4lmLv1VM9MRwp8Jj1d6MWxg4QzJHnLZiszOrIU5eK3e0ZC9yFPZhpcSFilq9UQfdqsZ54dnncCNFHTzDaK3FjD+M8NE+i0PT5lvyvvIUrT4uscLPsOZcZKdorr+Lzk3NKNRfbBviH9nSiYRGHiylcRHOnSxZ4ea9/QFs04XjS1IEZb6unGt5s2eIx6r3eigj/GCjDccYdqpeZKslwaeVomSb/d+hBh/vcFrkm5LayB5KKYRaSPBiQQZBf7KOGOsefQkkkbdPVxy6R3+a1cuF/mvpEO9nE/ViphZG3sZyWjttPezahnFdiiBIubRTSBSCaxqNIaSbg7Cn00ITZ4MLaQB2HFzH/i6e50YaEsr5duy3LXzYDA6Fl6pyHKdWJguoIKLGcdXS7VMx+/kbYbA==
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(9686003)(6512007)(2906002)(316002)(6486002)(8676002)(66946007)(4326008)(66476007)(66556008)(86362001)(6506007)(8936002)(5660300002)(508600001)(6666004)(33716001)(26005)(186003)(83380400001)(54906003)(6916009)(82960400001)(85182001)(38100700002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?S2tSb25DNGRMTmFCSTJodFhLV1ZEbHlWM3NTSGxkbEg3K05qS0U1TU9ZTkJa?=
 =?utf-8?B?SmNzd0NDaDBQUW5DY1Y1dnF0MUpIMjdzcWFNYk9DYTNDbmJJSUVqS0RXY1Br?=
 =?utf-8?B?a0g4OEN4U3BGcjRKOTJaWGJ6Z0dCdG1hbUJkcjRpaXgzWUhwZHMvNThqekZQ?=
 =?utf-8?B?bXpmc1N0K2hjUlJ0YjhLM2M0eURpa3FIUTBvWVg2WXk3azlFYm5GVENURXdu?=
 =?utf-8?B?ZUxMYldlckx4bTVJMWRRU0ZGZ0pQSW9QWVAzYmN1YnIzcUZ2cWhjbnhBL3RH?=
 =?utf-8?B?UmN4QUZzZmkwL1hINWZtNjBnOHhXV0dpVkNuWWlvYTF5RHAxU2ROR3A0TUJB?=
 =?utf-8?B?dFU3WG45M2hyK0cxTWFTaTlzSnpnMDhiVksvNDd5cEhIZnVWQlJjL0c4ZXdy?=
 =?utf-8?B?a3FyeGt6WHpmTHRpTEh0SEFEdlRJT05kYVhKTmkvb0xmUjVZZkhLRUg2bHl5?=
 =?utf-8?B?clZ2ZU9sQXhQSlFyWGM5aVdBSEM2K08ySTVSeU95azcvNjA3UUJFeWZJQURu?=
 =?utf-8?B?WDFXTnEvdXFnbFJUYmorMjIrbWlqYWZWN2xpMk1TMjQwcERuditaR3oydTV4?=
 =?utf-8?B?VnY4ZklHa2dvSXgvMnZEQ3lHSVNnQkhKY3FIWlZqY0JXTVNndGxaWkg5emcx?=
 =?utf-8?B?Z25aRGgzSmRiaXZRMHB3c0J0RG1HZ2Jmc0thSVpqYjBYQlRYdE9OL2RqaHVw?=
 =?utf-8?B?Wm5rdmtDQmlZQ2xORlZGeUxFYnJKcmdFUER3Qzc4cWpRTjNmbWQ1dkdyYzRr?=
 =?utf-8?B?YllBTStHc3dqZHMrZitFalNNNGVsSm0zRFlvMmE3OWd6akUxcjJGVjVPWGxR?=
 =?utf-8?B?SmZFUmlhMWc2VExINlE3MGhMTGcvdUxPU2hVK1dabFBOemNzQ0J6RmFCRlhV?=
 =?utf-8?B?RmtPUVVuVGVuL1hZSWgyZ205SEthMkVVcnAvSFc2NVJRbE5zTHJRdk40Ukg2?=
 =?utf-8?B?VzhobnRKYjhFUDUyTy9uMzBibjFoQlRUeERtdlJJNng3U1I5MXNXcjBGY0ZZ?=
 =?utf-8?B?NXVqanYzUlJmQTRXOGxLSzVlUWZYY21qVFhmQVV5RnhwcVdBTkFUWmJweDJL?=
 =?utf-8?B?WW45RFI5WUhrcVlVZnErZklsYWcrYnVocGE0YmhZMlFWL3hnRWJRSDh6dWN6?=
 =?utf-8?B?SDBMOGRaT3JSY2pLcGNmNXN5WDdzbnlHYmErTndxUUlKM2YzWjAwaGM2M3V1?=
 =?utf-8?B?U2I4Sk9lRTFVeXpZSW8zZWNGZk9BYnpNV1Z2UmlYNU90TmwyMDlwUnJMSXZR?=
 =?utf-8?B?M2V4NnZLNDFMMTRFUW4yNmt0U2F1NStEWG4xVndOWkMzd1ZsRytDN0JWc2xn?=
 =?utf-8?B?Sm0rSHd3TW5ESDFhMld5cjZnL3FPa0NESlAyaFRnWlpSNUJTTmxndXgrbCtl?=
 =?utf-8?B?emNZRDNkbkJDRlp2NmIrczI2ZDdPNGs4bHN1SFc2MkI4UW9jb3B1TEc5WlBT?=
 =?utf-8?B?NkNMYlVxRlhOallNQkFyVkQ2WStvaGV4Qmx3ZjluY0VoNVBBVEhxajA5eEZV?=
 =?utf-8?B?OWRZTjN5cGR6QkM1MWZFRUJmbXVrSHoyY3JROWxid3hGZGdRWllBaitna3V0?=
 =?utf-8?B?c2dOVWdGWXJneW5UVGVHSjlRWVBCSms5bVhmbjlPblNWNEFRVld2WkZ3M2N2?=
 =?utf-8?B?OVNaanQ1Mk1SblZNcU5XdnpFL2ZzZnJhVXZxQ0J0UUhrVjlKQTJlNzVRWnl3?=
 =?utf-8?B?UmMxdzVkOUF5a3VLNEVYbTFSN2JuZlFFbFI4aDJKcTgrbFkrRStQcHlrN2Ux?=
 =?utf-8?B?N0d6QTRUbU5QOWlDWkRTNG1GZGc4Wm54alVxeG5XVEpGMllYaVViTXV5VFly?=
 =?utf-8?B?WGZlLzZNOFdOa1dBTCtUTWozREhOZ2NnYTJpOFl0dW1tQmZyckg1Wmc5T3pi?=
 =?utf-8?B?b0RXUWkxaFZRRWdITkVvYVNVTVZDSW14KzFVK2x4VE04WjRsam1rOEs3N3M4?=
 =?utf-8?B?NXpBSzVFSG5hYW1ld2pIK2ZoWnRaSVZIQmc5UXV4UkZmcFpxazFNSzAxRVhq?=
 =?utf-8?B?NjlhUEdCQm5yalduaWdMLzh6Q2luYWY1NUg0V2pLdjg2V0ozdzgrTDlTM0J0?=
 =?utf-8?B?UGlucTNCZ0QvK2w4NkN0M3paa1FSNHRDTU9kZFdpQ3hrNTRqRFVsV0E3VU1q?=
 =?utf-8?B?V1JsclpQczVCc1NBN2ovRjRzVmNNTVpYMnV2UnNnZXVFNFpSQzNBSXRyTWNP?=
 =?utf-8?B?ZE9sQXZhM3lEVWYwS0xVOE9JTHZLQlYxNU9HK0ZWYWlsb1VJOE9DSHlMN3BJ?=
 =?utf-8?B?Z1U1VmRsV0gyRU9JOXpvZmlnVXhvZlptSERkZHVyWkxFcWFONzI5WmRvY1lz?=
 =?utf-8?B?aDZPeXVzVFJON2k3WjV4ZmRLY3krQzJyMlhpYTdTRFN3Wmd6NHlIWjdtemNK?=
 =?utf-8?Q?EVT4kHkn4xofKGPo=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 4cdeb6ae-d578-45be-838c-08da10afcf0c
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Mar 2022 11:40:50.6933
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 63ic53vpS2iojnilWp6aYJYGj0V8xbteb5gXnM5YpbUShKh3y4BNDORxdDLtaQ9/AMiHxGIzHhAE0WoZ9dwCjw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR03MB3198
X-OriginatorOrg: citrix.com

On Fri, Mar 25, 2022 at 10:18:26AM -0400, Jason Andryuk wrote:
> Pull the XSM check up out of unmap_domain_pirq into physdev_map_pirq.
> 
> xsm_unmap_domain_irq was seen denying unmap_domain_pirq when called from
> complete_domain_destroy as an RCU callback.  The source context was an
> unexpected, random domain.  Since this is a xen-internal operation,
> going through the XSM hook is inapproriate.
> 
> Move the XSM hook up into physdev_unmap_pirq, which is the
> guest-accessible path.  This requires moving some of the sanity check
> upwards as well since the hook needs the additional data to make its
> decision.  Since complete_domain_destroy still calls unmap_domain_pirq,
> replace the moved runtime checking with assert.  Only valid pirqs should
> make their way into unmap_domain_pirq from complete_domain_destroy.
> 
> This is mostly code movement, but one style change is to pull `irq =
> info->arch.irq` out of the if condition.
> 
> Label done is now unused and removed.
> 
> Signed-off-by: Jason Andryuk <jandryuk@gmail.com>
> ---
> unmap_domain_pirq is also called in vioapic_hwdom_map_gsi and
> vpci_msi_disable.  vioapic_hwdom_map_gsi is a cleanup path after going
> through map_domain_pirq, and I don't think the vpci code is directly
> guest-accessible.  So I think those are okay, but I not familiar with
> that code.  Hence, I am highlighting it.

Hm, for vpci_msi_disable it's not technically correct to drop the XSM
check. This is a guests accessible path, however the value of PIRQ is
not settable by the guest, so it's kind of OK just for that reason.

vioapic_hwdom_map_gsi is just for the hardware domain, so likely also
OK.

>  xen/arch/x86/irq.c     | 31 +++++++-----------------------
>  xen/arch/x86/physdev.c | 43 +++++++++++++++++++++++++++++++++++++++++-
>  2 files changed, 49 insertions(+), 25 deletions(-)
> 
> diff --git a/xen/arch/x86/irq.c b/xen/arch/x86/irq.c
> index 285ac399fb..ddd3194fba 100644
> --- a/xen/arch/x86/irq.c
> +++ b/xen/arch/x86/irq.c
> @@ -2310,41 +2310,25 @@ int unmap_domain_pirq(struct domain *d, int pirq)
>      struct pirq *info;
>      struct msi_desc *msi_desc = NULL;
>  
> -    if ( (pirq < 0) || (pirq >= d->nr_pirqs) )
> -        return -EINVAL;
> -
> +    ASSERT(pirq >= 0);
> +    ASSERT(pirq < d->nr_pirqs);
>      ASSERT(pcidevs_locked());
>      ASSERT(spin_is_locked(&d->event_lock));
>  
>      info = pirq_info(d, pirq);
> -    if ( !info || (irq = info->arch.irq) <= 0 )
> -    {
> -        dprintk(XENLOG_G_ERR, "dom%d: pirq %d not mapped\n",
> -                d->domain_id, pirq);
> -        ret = -EINVAL;
> -        goto done;
> -    }
> +    ASSERT(info);
> +
> +    irq = info->arch.irq;
> +    ASSERT(irq > 0);
>  
>      desc = irq_to_desc(irq);
>      msi_desc = desc->msi_desc;
>      if ( msi_desc && msi_desc->msi_attrib.type == PCI_CAP_ID_MSI )
>      {
> -        if ( msi_desc->msi_attrib.entry_nr )
> -        {
> -            printk(XENLOG_G_ERR
> -                   "dom%d: trying to unmap secondary MSI pirq %d\n",
> -                   d->domain_id, pirq);
> -            ret = -EBUSY;
> -            goto done;
> -        }
> +        ASSERT(msi_desc->msi_attrib.entry_nr == 0);
>          nr = msi_desc->msi.nvec;
>      }
>  
> -    ret = xsm_unmap_domain_irq(XSM_HOOK, d, irq,
> -                               msi_desc ? msi_desc->dev : NULL);

Have you considered performing the check only if !d->is_dying?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 12:44:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 12:44:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295420.502693 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYojb-0000Cm-3B; Mon, 28 Mar 2022 12:44:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295420.502693; Mon, 28 Mar 2022 12:44:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYoja-0000Cf-Vm; Mon, 28 Mar 2022 12:44:34 +0000
Received: by outflank-mailman (input) for mailman id 295420;
 Mon, 28 Mar 2022 12:44:34 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=dCnP=UH=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nYoja-0000CZ-DF
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 12:44:34 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id d0b631cb-ae94-11ec-a405-831a346695d4;
 Mon, 28 Mar 2022 14:44:32 +0200 (CEST)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2059.outbound.protection.outlook.com [104.47.14.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-10-hH_X16KdN7CmkxkmDpbWgQ-1; Mon, 28 Mar 2022 14:44:30 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM6PR0402MB3814.eurprd04.prod.outlook.com (2603:10a6:209:1a::33)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.22; Mon, 28 Mar
 2022 12:44:29 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%5]) with mapi id 15.20.5102.022; Mon, 28 Mar 2022
 12:44:29 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d0b631cb-ae94-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648471472;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=hQI0ujUfIbQCoOijmcSmCHhLYqciE6fDrU0wXYGT6lA=;
	b=HmGG7m2oAEoShvppxavtehKH9S/FAWmvKxnbVhT5yMz67QWhShtHawz9Zf0mJ/2jBTTfJm
	koaq+89EEDEE3lYTAbsKtJ/Y8Vj1mB0FfqlkI2YFxSGH0Lu2s2kF61ncMsHzoByIXi2Pqv
	5u6iccOqRgIH0TMJdTz1vFbNqcKR5eA=
X-MC-Unique: hH_X16KdN7CmkxkmDpbWgQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=PYmEGj+7Gpu1n+q8BqGU8F1735Qwz0gA52ySPyxZTR6MdyfsSnOhVQivVHvvVmjrLOTpmUhO/XU7kGKBiWLgUCJFJfE/H49D9RymXAAo2n2O0VHjPZNBUgv7AaS0uzirmT9jHtRy2RjqubBiQitcexsFaOBcXi43fbZXWzu+dKgylkeXoIoNdqAjKX9SxJrkP4HII90PK64gRTzaTrvWv3h/ioenPwIYVFjdYGsHJ2NtpUlzXHpZUKA7T5QSvVcpDpE5WoazTKCr91G10kICt1NJIfno1Zgm8vYuOh+d5Z6L5N3eqWxuBpIiHRBY/9iBrKlev2LC8vWMWaI61BrH2Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=7sSlK5e1tsI7wIMyKgdHvyi34xsx8CI64b5FpxtshK4=;
 b=BOVyAnueg4iDIGvxtuONurFoZRrZMprune3pwFcTuVyEWydW7KnAmi5FLsRqVpJjEpnozvOvz87FiRZu/jVGpbTcg5iQWOnVMOV9gLIL27GRsEqT4x90z8U3dfUHMLHPJPhRV+BQDJ190updiRW6lIHWK3SanxDPboXyEnHU/6Ml+ZnkHq5NYUaghPKB8Wsz2ZjNF03YJ3E3ZlMTfMjfQWFSG3Qoa+b0zfT3xQNgbdQjA2/XUgiIezHcirQNvbpzI3GIiMXSPLtppQdrzy3r2E8muu0vPAargGKJV2l42Nr2ESE2Yj9LD6zTjg7xt6uY7UGaNOb/jmEsx7/tMww3SA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <7ee0889c-c9ae-c11f-7308-25e7d5a14815@suse.com>
Date: Mon, 28 Mar 2022 14:44:30 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] x86/physdev: Call xsm_unmap_domain_irq earlier
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Jason Andryuk <jandryuk@gmail.com>
CC: xen-devel@lists.xenproject.org, Andrew Cooper
 <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 "Daniel P. Smith" <dpsmith.dev@gmail.com>
References: <20220325141826.16245-1-jandryuk@gmail.com>
 <YkGevRlIpAlCDox7@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YkGevRlIpAlCDox7@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR05CA0052.eurprd05.prod.outlook.com
 (2603:10a6:20b:489::10) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 750e7cac-771d-4d38-e597-08da10b8b33e
X-MS-TrafficTypeDiagnostic: AM6PR0402MB3814:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR0402MB3814FAC114B2A32CBC2EECB5B31D9@AM6PR0402MB3814.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	YPo3FhngG/AscEPLX2/iM0UB7lz+eOBDRp7P4vBH5uFA8Dl0vmRRrmfMFkd6Bt3uX8CcdVmazwUwHj4CfqiUhTJ3Efd3MeCWlBbwCArA089cdBdlM5MIvpFF98Z53tKTfMYoJrwz4BRxUvmpboPa6NCNrDi4UsER7PlLnv6g+XpEekpcS0WRSOh0m7xvFSt1Ail95j5LTCltTG9TOBiAVymTWhUBoQhA2IzgCqre8rEG3rf/lZ00tOaAgli4ZrToXoFsRcOuYNCVnTy+wQlEziBj8xglyB/Ct3hASC01I8JzEzHbDxKjeGcxKmC1OR036GQgdUn2ogwVDSTwSgKQttsZ95el2Ug7jv86FXcSLS4o+tw3kRh86MdFW6GTSsfxirryVzyAn6ThLHGTF6i2oHibN5HMSh1F+Yt1qy3Db8UmgU/E+sEkHwTh33q8W/scHtdLobkvINKkO3pkzH/3h0ZW+62A5d0e4I9AU9ZyS/aVPItVLnP/yeJQV2gUpguowctQq/B2zCmFRC7ow0M57ozbOqTa/69DOs6bP/DeiQSLXyWLLQV92xgmHykJSyuURoE9p1lBmh1NFTwnOEZRzcM50cHONjyi5lPyVnMNjt22IP7LyeUeuLLI5QM9saIi1Un0Bv1kGF26na6L5h8MZP6swGt7ra2CqDauOQ8U+gJq+5CrPxGhykPtjPcC3bhNA1RF6MUVlKwHi2pUeemPLI6ZZAGGKeQ1uS71L5EnMvk=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(5660300002)(38100700002)(31696002)(31686004)(86362001)(53546011)(508600001)(36756003)(6512007)(4326008)(66946007)(8936002)(54906003)(110136005)(316002)(186003)(83380400001)(6486002)(26005)(8676002)(2616005)(6666004)(2906002)(66476007)(6506007)(66556008)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?4fWIZ9OzWylQhKQc9K31yV1sB/TI0s+VyDS9hE81JaoRDM68aWg6m01CUhew?=
 =?us-ascii?Q?1Ok0lrp/2SIAQZvfancTnIIgN5HurmqjnKEJOZFVf1XpQS6hCEIlARc1AzzM?=
 =?us-ascii?Q?eRbARR+jf/riMkB+596Go5eMHbU8y6kqZk2XiDkCevPN0vvGMm/F46rCEO3d?=
 =?us-ascii?Q?GVUtfX1c4JXQj9VooeloCs8UzS7tM2hhAepehTtYj+9lCth+4cIxendgq6iR?=
 =?us-ascii?Q?B/Qs/adKTn+Tt0p/yLUNzLivNDmGdLPc0b44xMjVKzWErg9ZfrzXRz8hzCmD?=
 =?us-ascii?Q?x1vCGCJXDCOZ75sd4CLovL7wWjV3caxoCFir5KmMgDzJR1NeFmAJ+YmKdBtc?=
 =?us-ascii?Q?QW49X0yaoAnLBadSigCmAQvNPRAPq50xnK5uXbn/yPPXArwQ/U7l8nLvj6Zd?=
 =?us-ascii?Q?WK29l6rW16x6bvCvCpgKa+B0/VgXk5Krxrc/HydGF4Izq+EAFrs9Ia7xz/Kj?=
 =?us-ascii?Q?+1C4IkA5m3Uwj+/PUW4yKWd9rumcWqITogNznDxfzg/g+2oCr9HMB4hFjs+e?=
 =?us-ascii?Q?OmIuhEZUPTtnnpdUidLCg1+ZKQ6lt3Xo/Hn9eao+QNrmiZiEXbAb49X8yxZo?=
 =?us-ascii?Q?VNYP6FADbmxOn2kTef7mWVPNhE4zK0nW4fbeHhM42BYX3JWxn/xxSwLvohVA?=
 =?us-ascii?Q?lL5zIbqqlyf+Lb1FKHRSNgJZaeZ8bhYPYSeGouMQeDdvZzGkrtn/YbqyE+vR?=
 =?us-ascii?Q?lfF/Fdz2jAv+LeAYw9ocWWUJ7/xFc/5Ob9le573syPqooM3/6gnhJ+EARjSq?=
 =?us-ascii?Q?LPWRKzUKHu0vFm12HFx4hkYKDUac2uTPJOTYaLqWPJgLDD8LaX7ZlVo16ryn?=
 =?us-ascii?Q?RzNrd8XQgJi3z/g4C/4+gxyC3lmrP2pcSeHynNAQnkRM8HqqiC4w79u7QON4?=
 =?us-ascii?Q?0hyazPl9Cp0+cy44y3TuEPTOza20+D0jo29crJeFAZgIcjszUlwLhKzlgDxr?=
 =?us-ascii?Q?jRQKPVwuvnZ4e/mhURpDkwCubjcOrx1k/m8I+veGws0MiCxwNvAkwTByQK34?=
 =?us-ascii?Q?LF0rRIxnKQqaxe6BhbFEd4isWo+7s3YxtnisPvHBmW2syJ3qzwCweJhT0OVV?=
 =?us-ascii?Q?Wmvt4UudkDj2okXECDF45UhKoAygKVsJpbSgBgBNnqKSoxskXqXZ1SPXzINu?=
 =?us-ascii?Q?MSt8qI3+6u07kerxU65yX9WJQXRZhSfXtO0uQpcLiL/hDgySmvF/mx/CO3h6?=
 =?us-ascii?Q?pxT+IwJ5YZueDmDLwJgVm6wX5F9Wsxq8iI2ZBNjh3u45cdyzLbhbGTmsMDFg?=
 =?us-ascii?Q?9P5IVTNfMTbg6rVkhkKt3MfpFHYHN+na7+TGKwsGgV7reOCRMRpscqRcDFR1?=
 =?us-ascii?Q?aKC+1hU0BHeMwcVcbY0GC85PGoL/kj03RD0hAo1l+LtF99iR9gWnTNBSrLKY?=
 =?us-ascii?Q?awDUKhVfn1/RSP2byPBSBudHsIhXMbWYkUNulW+u1TIsVHA/14sYr+V7q5DA?=
 =?us-ascii?Q?e2XfklKPXPGIsqMO5ZkX0cjLtjpNWcwJekScqQAgHOduqkbvEZWQXVXeCSYX?=
 =?us-ascii?Q?N7PbqrQpVHRtXgB4pk5DbwelvMUzoXVpkl+mIy7L4EPgj5kD6VNo1bGxNQP3?=
 =?us-ascii?Q?aq81lL6s9VE+DlCFVBfWUY2OgFM3/uUyMJJkN0sQzclMKReAxcacgKwB2hTF?=
 =?us-ascii?Q?ns7OrwQ7y/+pCZh7RVtiYIYowH6jmvGUG1Ct6mzZr0n0OxUpII7mXIXiilLV?=
 =?us-ascii?Q?d9Ze4A2pdDsysPmS3vH6ptilXEjgaZ2yQdd3dMwTkbeHdkhxlUg8+B2EZR0L?=
 =?us-ascii?Q?0xZkVFuadw=3D=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 750e7cac-771d-4d38-e597-08da10b8b33e
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Mar 2022 12:44:29.5647
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: adv0jii13KVV7Eeqi2vW7qNeZSnEj43s1HU/dupXeYUcHyATAudKuwe9D7spQskCMenfWRa90LwcGpyi2KUAOA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR0402MB3814

On 28.03.2022 13:40, Roger Pau Monn=C3=A9 wrote:
> On Fri, Mar 25, 2022 at 10:18:26AM -0400, Jason Andryuk wrote:
>> Pull the XSM check up out of unmap_domain_pirq into physdev_map_pirq.
>>
>> xsm_unmap_domain_irq was seen denying unmap_domain_pirq when called from
>> complete_domain_destroy as an RCU callback.  The source context was an
>> unexpected, random domain.  Since this is a xen-internal operation,
>> going through the XSM hook is inapproriate.
>>
>> Move the XSM hook up into physdev_unmap_pirq, which is the
>> guest-accessible path.  This requires moving some of the sanity check
>> upwards as well since the hook needs the additional data to make its
>> decision.  Since complete_domain_destroy still calls unmap_domain_pirq,
>> replace the moved runtime checking with assert.  Only valid pirqs should
>> make their way into unmap_domain_pirq from complete_domain_destroy.
>>
>> This is mostly code movement, but one style change is to pull `irq =3D
>> info->arch.irq` out of the if condition.

And why is this better? You now have an extra conditional expression
there.

>> Label done is now unused and removed.
>>
>> Signed-off-by: Jason Andryuk <jandryuk@gmail.com>
>> ---
>> unmap_domain_pirq is also called in vioapic_hwdom_map_gsi and
>> vpci_msi_disable.  vioapic_hwdom_map_gsi is a cleanup path after going
>> through map_domain_pirq, and I don't think the vpci code is directly
>> guest-accessible.  So I think those are okay, but I not familiar with
>> that code.  Hence, I am highlighting it.
>=20
> Hm, for vpci_msi_disable it's not technically correct to drop the XSM
> check. This is a guests accessible path, however the value of PIRQ is
> not settable by the guest, so it's kind of OK just for that reason.

Kind of - perhaps. But better to avoid if possible. Hence I would prefer
the ->is_dying alternative you suggest at the end.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 28 12:53:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 12:53:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295423.502703 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYosW-0001ie-Ur; Mon, 28 Mar 2022 12:53:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295423.502703; Mon, 28 Mar 2022 12:53:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYosW-0001iX-Rw; Mon, 28 Mar 2022 12:53:48 +0000
Received: by outflank-mailman (input) for mailman id 295423;
 Mon, 28 Mar 2022 12:53:48 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYosW-0001iN-2K; Mon, 28 Mar 2022 12:53:48 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYosW-0004ul-0D; Mon, 28 Mar 2022 12:53:48 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYosV-0000nH-IY; Mon, 28 Mar 2022 12:53:47 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nYosV-00018S-I3; Mon, 28 Mar 2022 12:53:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=XH1sc01JcutHnA8LKrZJ2QtgMt0s+yOoQYKgGRTiYAA=; b=VgIoPrasRfT762ZIUs/SU/UrLc
	05V+MnVUbjzU/bot35Z2lDGc/JgBaJgZtjKH08Dr5nDJ2/k/2xjlsH8tEWrtQoLgJ9VJfi5gTQ/+8
	f/jP1zikvlHaZRJ7bJvj6aW0S9cvifYNNAXfHgjCweaDeJxKOGuJQ4KtQ6naeRjFVaeU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168912-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168912: trouble: blocked/broken/pass
X-Osstest-Failures:
    linux-linus:build-amd64:<job status>:broken:regression
    linux-linus:build-amd64-pvops:<job status>:broken:regression
    linux-linus:build-amd64-xsm:<job status>:broken:regression
    linux-linus:build-arm64:<job status>:broken:regression
    linux-linus:build-arm64-pvops:<job status>:broken:regression
    linux-linus:build-arm64-xsm:<job status>:broken:regression
    linux-linus:build-armhf-pvops:<job status>:broken:regression
    linux-linus:build-i386:<job status>:broken:regression
    linux-linus:build-i386-pvops:<job status>:broken:regression
    linux-linus:build-i386-xsm:<job status>:broken:regression
    linux-linus:build-i386-xsm:host-install(4):broken:regression
    linux-linus:build-i386-pvops:host-install(4):broken:regression
    linux-linus:build-i386:host-install(4):broken:regression
    linux-linus:build-arm64-pvops:host-install(4):broken:regression
    linux-linus:build-arm64:host-install(4):broken:regression
    linux-linus:build-arm64-xsm:host-install(4):broken:regression
    linux-linus:build-amd64:host-install(4):broken:regression
    linux-linus:build-amd64-pvops:host-install(4):broken:regression
    linux-linus:build-amd64-xsm:host-install(4):broken:regression
    linux-linus:build-armhf-pvops:host-install(4):broken:regression
    linux-linus:test-armhf-armhf-xl:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-examine:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-coresched-amd64-xl:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-vhd:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-shadow:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-rtds:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    linux-linus:build-amd64-libvirt:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    linux-linus:build-arm64-libvirt:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    linux-linus:build-i386-libvirt:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-pvshim:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-dom0pvh-xl-amd:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-pvhv2-intel:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-dom0pvh-xl-intel:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-pvhv2-amd:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-examine:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-examine-bios:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-examine-uefi:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-multivcpu:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-freebsd11-amd64:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-freebsd12-amd64:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-credit2:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-credit1:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-intel:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-pair:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-pygrub:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-examine:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    linux=f82da161ea75dc4db21b2499e4b1facd36dab275
X-Osstest-Versions-That:
    linux=34af78c4e616c359ed428d79fe4758a35d2c5473
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 28 Mar 2022 12:53:47 +0000

flight 168912 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168912/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-arm64                     <job status>                 broken
 build-arm64-pvops               <job status>                 broken
 build-arm64-xsm                 <job status>                 broken
 build-armhf-pvops               <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168838
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168838
 build-i386                    4 host-install(4)        broken REGR. vs. 168838
 build-arm64-pvops             4 host-install(4)        broken REGR. vs. 168838
 build-arm64                   4 host-install(4)        broken REGR. vs. 168838
 build-arm64-xsm               4 host-install(4)        broken REGR. vs. 168838
 build-amd64                   4 host-install(4)        broken REGR. vs. 168838
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 168838
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 168838
 build-armhf-pvops             4 host-install(4)        broken REGR. vs. 168838

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-arndale   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit1   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-cubietruck  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-rtds      1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-examine      1 build-check(1)               blocked  n/a
 test-amd64-coresched-amd64-xl  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-xsm       1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-vhd       1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-shadow    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-rtds      1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ws16-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1) blocked n/a
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qemut-ws16-amd64  1 build-check(1)             blocked n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-xl-qemut-debianhvm-amd64  1 build-check(1)        blocked n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvshim    1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-examine      1 build-check(1)               blocked  n/a
 test-amd64-amd64-examine-bios  1 build-check(1)               blocked  n/a
 test-amd64-amd64-examine-uefi  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-amd64-amd64-freebsd11-amd64  1 build-check(1)               blocked  n/a
 test-amd64-amd64-freebsd12-amd64  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit2   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit1   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl           1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-intel  1 build-check(1)              blocked n/a
 test-amd64-amd64-pair         1 build-check(1)               blocked  n/a
 test-amd64-amd64-pygrub       1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-amd  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl           1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 test-armhf-armhf-examine      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a

version targeted for testing:
 linux                f82da161ea75dc4db21b2499e4b1facd36dab275
baseline version:
 linux                34af78c4e616c359ed428d79fe4758a35d2c5473

Last test of basis   168838  2022-03-25 06:20:14 Z    3 days
Failing since        168866  2022-03-25 20:12:03 Z    2 days    3 attempts
Testing same since   168912  2022-03-27 23:39:34 Z    0 days    1 attempts

------------------------------------------------------------
469 people touched revisions under test,
not listing them all

jobs:
 build-amd64-xsm                                              broken  
 build-arm64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64                                                  broken  
 build-arm64                                                  broken  
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            broken  
 build-arm64-pvops                                            broken  
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-amd64-amd64-xl                                          blocked 
 test-amd64-coresched-amd64-xl                                blocked 
 test-arm64-arm64-xl                                          blocked 
 test-armhf-armhf-xl                                          blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        blocked 
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-amd64-xl-xsm                                      blocked 
 test-arm64-arm64-xl-xsm                                      blocked 
 test-amd64-amd64-qemuu-nested-amd                            blocked 
 test-amd64-amd64-xl-pvhv2-amd                                blocked 
 test-amd64-amd64-dom0pvh-xl-amd                              blocked 
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    blocked 
 test-amd64-amd64-freebsd11-amd64                             blocked 
 test-amd64-amd64-freebsd12-amd64                             blocked 
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         blocked 
 test-amd64-amd64-xl-qemut-ws16-amd64                         blocked 
 test-amd64-amd64-xl-qemuu-ws16-amd64                         blocked 
 test-armhf-armhf-xl-arndale                                  blocked 
 test-amd64-amd64-examine-bios                                blocked 
 test-amd64-amd64-xl-credit1                                  blocked 
 test-arm64-arm64-xl-credit1                                  blocked 
 test-armhf-armhf-xl-credit1                                  blocked 
 test-amd64-amd64-xl-credit2                                  blocked 
 test-arm64-arm64-xl-credit2                                  blocked 
 test-armhf-armhf-xl-credit2                                  blocked 
 test-armhf-armhf-xl-cubietruck                               blocked 
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        blocked 
 test-amd64-amd64-examine                                     blocked 
 test-arm64-arm64-examine                                     blocked 
 test-armhf-armhf-examine                                     blocked 
 test-amd64-amd64-qemuu-nested-intel                          blocked 
 test-amd64-amd64-xl-pvhv2-intel                              blocked 
 test-amd64-amd64-dom0pvh-xl-intel                            blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-amd64-xl-multivcpu                                blocked 
 test-armhf-armhf-xl-multivcpu                                blocked 
 test-amd64-amd64-pair                                        blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-amd64-xl-pvshim                                   blocked 
 test-amd64-amd64-pygrub                                      blocked 
 test-amd64-amd64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-amd64-amd64-libvirt-raw                                 blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-amd64-xl-rtds                                     blocked 
 test-armhf-armhf-xl-rtds                                     blocked 
 test-arm64-arm64-xl-seattle                                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             blocked 
 test-amd64-amd64-xl-shadow                                   blocked 
 test-arm64-arm64-xl-thunderx                                 blocked 
 test-amd64-amd64-examine-uefi                                blocked 
 test-amd64-amd64-xl-vhd                                      blocked 
 test-arm64-arm64-xl-vhd                                      blocked 
 test-armhf-armhf-xl-vhd                                      blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-arm64 broken
broken-job build-arm64-pvops broken
broken-job build-arm64-xsm broken
broken-job build-armhf-pvops broken
broken-job build-i386 broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-i386-xsm host-install(4)
broken-step build-i386-pvops host-install(4)
broken-step build-i386 host-install(4)
broken-step build-arm64-pvops host-install(4)
broken-step build-arm64 host-install(4)
broken-step build-arm64-xsm host-install(4)
broken-step build-amd64 host-install(4)
broken-step build-amd64-pvops host-install(4)
broken-step build-amd64-xsm host-install(4)
broken-step build-armhf-pvops host-install(4)

Not pushing.

(No revision log; it would be 37365 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 13:32:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 13:32:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295442.502730 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYpTh-0006Ee-6t; Mon, 28 Mar 2022 13:32:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295442.502730; Mon, 28 Mar 2022 13:32:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYpTh-0006EX-40; Mon, 28 Mar 2022 13:32:13 +0000
Received: by outflank-mailman (input) for mailman id 295442;
 Mon, 28 Mar 2022 13:32:11 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=dCnP=UH=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nYpTf-0006ER-GK
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 13:32:11 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 7809a283-ae9b-11ec-a405-831a346695d4;
 Mon, 28 Mar 2022 15:32:10 +0200 (CEST)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2106.outbound.protection.outlook.com [104.47.17.106]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-30-5vJr7SVPNZq2PBIJAxeHOQ-1; Mon, 28 Mar 2022 15:32:07 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM9PR04MB7713.eurprd04.prod.outlook.com (2603:10a6:20b:2d4::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.22; Mon, 28 Mar
 2022 13:32:06 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%5]) with mapi id 15.20.5102.022; Mon, 28 Mar 2022
 13:32:06 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 7809a283-ae9b-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648474329;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=zf8vVRD8jN9UizjcSitGFTUmWSdhWQ/t0kP0qD48EOI=;
	b=Bo8YKTZwRqUmbsGh/IWAXISEGmtkbok9cKO4sr71Fn2IblNd23orq+ue82Ip4LejmpIeJb
	WWgw3QORGCuj9GG67Obvrd+gf7P8h2+DmrPaU161S0CnBrKtfWlLu55dLqXUwFh05Z400l
	ccmAhF7l6Gxbqnpe/+DuXfgGNcB+7W8=
X-MC-Unique: 5vJr7SVPNZq2PBIJAxeHOQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=f6+075y1ZQaWtBoVLsT5SAfbmiECMqIT4UbcXx560WZhKwPyC0ik0FCQENOOPK97ty0/tD1R8fytNfGrKvz3Lbw21G+0Nm1PewD1k5BydqJ/aDpFkW9h1Ye9PCNlRQ4x3XtrscAVrHza2rD/MY1J4l/ymq4KvJGud8wG77Dh0y/Y7jZvuN+zxcZakbswkKT2k6mphfKRsEEDxT8ke/XYWu+oIjVs2zpZ97+9mVdpfPGlsA7CBrFefrxqQ8eilLhMZN9fGE+hFycL7bRN46K99h/f47HZJw087wBOpN2ddj03yDVtfx3dmachWiZazUCn+W/d3oMBwsgHsRN5kPGOOg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=zf8vVRD8jN9UizjcSitGFTUmWSdhWQ/t0kP0qD48EOI=;
 b=huQ4iTspfgmP5jj4mZw9xdNUA+Cn2ikjlD816TBb/8MC+UZNxjRD0w6chM7Q3zdvSwAsrx+wniZEoM89WLZMLXwidkL1DxuomDIIOBSjkkoyydqk+B+zoRytfXtPASoxw61dvxaZZ2ENk4zFlD2BhW+JG9/fYokPbhK2FBgJ+cAlaJ9WdhhEN4TXDDc4FPpTestQPVmbBT3uni7o98cy7g2/FBaBhru3jtw/o1Q7ta3I7iV5eaKmQmhG7nhiDGlzL+AmTsmdoby2D8XLtysQq4SGtHpHeeBmh0ZAf7LQZknu3mqnrxgxldO5tfPk/SPEQcB1yLMFBvBroa6ffPWJQQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <1df7130a-ff59-9672-c77d-14e82339c602@suse.com>
Date: Mon, 28 Mar 2022 15:32:07 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH 2/3] x86/mem_sharing: use dom_cow as placeholder parent
 until fork is complete
Content-Language: en-US
To: Tamas K Lengyel <tamas.lengyel@intel.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>, Wei Liu
 <wl@xen.org>, Tamas K Lengyel <tamas@tklengyel.com>,
 George Dunlap <george.dunlap@citrix.com>, xen-devel@lists.xenproject.org
References: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
 <d5d8c7bad025a4ef11bf09ad3a4b23c8b4673ff6.1647970630.git.tamas.lengyel@intel.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <d5d8c7bad025a4ef11bf09ad3a4b23c8b4673ff6.1647970630.git.tamas.lengyel@intel.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR06CA0054.eurprd06.prod.outlook.com
 (2603:10a6:20b:463::14) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 731e802a-c55a-4c93-a56e-08da10bf5a03
X-MS-TrafficTypeDiagnostic: AM9PR04MB7713:EE_
X-Microsoft-Antispam-PRVS:
	<AM9PR04MB77133E22D171161F5C9FD69BB31D9@AM9PR04MB7713.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(36756003)(5660300002)(316002)(6916009)(54906003)(66476007)(508600001)(31696002)(8936002)(66556008)(186003)(2616005)(66946007)(83380400001)(31686004)(6486002)(2906002)(8676002)(38100700002)(6512007)(6506007)(86362001)(26005)(4326008)(53546011)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?TGdCc0wxaTQ5SXJSVk83SXl0VDV2Y1Mxamg0c3RiSXBLRGxBRnYzWnhvUUVm?=
 =?utf-8?B?c20yMXpoTzNicW5OLzd0OU9LQndaVGZFRmNJcE84OGgyOENZLzVrVzZZbnlV?=
 =?utf-8?B?WndzUVNCamlObC9hU2dpNmtTQ1g1Si9wK3diT3ZKN0YyWCtrWk9jaXAwYXNX?=
 =?utf-8?B?c1NHTW4wbjd5dnd5TjM1UHJtYUk3UUxvcFU2UnRETVBTNUdjRnNLaitZMlVy?=
 =?utf-8?B?ZE05OXVwbVBKejUxaTJ4ZGpPNWdyUHE4VkdJZEpGZHUxNk8zSTRscHNYUVlD?=
 =?utf-8?B?dFRNWjVyMjAyanVBU0ZYOFNKWXVVT3hpQ1BwRXVpeGpLaWpINFpoMS9hdG1i?=
 =?utf-8?B?RkhDL0lZbGhVZlVwUkJIY1d3YldxNXhNVGNQcXQwWnNxVUp3OVg3RnV6S2NG?=
 =?utf-8?B?clJzVm84cW1iT0JjcktPdWY1M1Z5N1JNem10RW13TDFReVd5SnY0c0MyRElG?=
 =?utf-8?B?c2cyUEJoWlQ5NTc1YlJZTWI1WWM5QXJsYVZCd1BwUUxjRUNEeENPUTZOZnd4?=
 =?utf-8?B?SmJoZk1xZDBWUmhZdkczR0dia0l3d29YUjYxYk1jdWp6aFJMblBrbERreFhS?=
 =?utf-8?B?aVl6Wmc5ZkMwZktkNGhiQ2lQbjdqVnhvQ01lYWpLTEhEcE11VmF5dCs5Tjd2?=
 =?utf-8?B?QmhqazZuYjZkbTNtQWhZaVpwLzl3TUN6STJ4SlJodUFFcjIvYksvK01MdHBN?=
 =?utf-8?B?cjdodHpTUTQyU0V5NUV0eGR3TWJqbDNyRWVMazQ1Q3FTS0dyNVVLN3pJMmlD?=
 =?utf-8?B?cWlBT2F0dm9teHQzZFVwd2MzSXdEVnZ6MnI5dkNmR1pYa3lUcXZCM2VLNjFn?=
 =?utf-8?B?WG92bXJMcFNIVGNPSVh2T090dVk3UWdhOGhnZGorOFNHaFhWOUdJQVNDZFdj?=
 =?utf-8?B?WFJOMTZyRTJQVUF1RG9pSHR0WnBkRUk0NHh3Tm52bWNJL1RuWXBTdHMvQ0JC?=
 =?utf-8?B?dkhhd0ZwRFM2Wlh5Y09sZ2M4VlV1U0RlWXlyTHI1VVFjS2JudTFMcFJ0OWVU?=
 =?utf-8?B?czI0TTh3dVpJU2tOd0hsbi9pUlJxdzgyZUNoajVrRWRhZ0IwdXBrOERmODVI?=
 =?utf-8?B?bnhaVjhCcVhLNk51NGcxaU0weFl5Qi96M0lpT1dUTlNSSkg4QU90RnZucmxC?=
 =?utf-8?B?WFNTaTROMmZhTDZXOUxOMWVGTWlkOU5qWVJncmc1YnkvVDZWcWorMDdsRzQ0?=
 =?utf-8?B?TUpNTWpJMlFmTlVOSWFacFdMSnE0WXhkaGREcXM5ME0wVlVrZlhHdmsxcDUx?=
 =?utf-8?B?TEFLbWdraHNzMGwybyt6bFhQNFdMblhUSlg5NDAvRkprV1VQVFhqSkFFMzBV?=
 =?utf-8?B?cDFpTzZCR2tRMldKZUdUTGRFMVgzNW5IR2F1MU5OSGs4ZFJSbHVObFEzRUFr?=
 =?utf-8?B?TmxVSDQzUEhTU3FLVTNJTFFzNFZEemx2MFNiUDl0cmk4emY5WFdJaHBSMWp4?=
 =?utf-8?B?MURvZGpBYzVnaEFnWVBKbG4yai9Jb3BEbER1WktVU3NBcEtLRjFkckJGT21p?=
 =?utf-8?B?bEhrcG5hYUdzTGxJUWUwVm5EcjVBdjlSNGdFaEZ4VmRlN1VVVXlCaDhrV1BH?=
 =?utf-8?B?VVZrMDl2YVZzd3NHRnZvR1NWblo4Tk1rM3lPRm1VM1BZM1RiM1I1OEc0Z2h0?=
 =?utf-8?B?K0RBVzFjalBUOUd6ZHlYeWVEWWc2aVNjemlRL2hQWWo5U2xCdEFvMW1Vb2xQ?=
 =?utf-8?B?alhCUERJZUdqL1dxZFVvd2dzM3hEajVYSUlkM0lIUGYrV3VpR1ZLaXBLaEVK?=
 =?utf-8?B?ai8weFFydElHZ1ZDYnVJOWpHSEFwU1NNMHpPVXRLWVpnOHBiWkFNREV1b2VG?=
 =?utf-8?B?QXV0VnJhK0VUSTJGYzB5RkxZSk5jNmtsQ2FkV3FoRDZTYUlYUnVkclpyUU1M?=
 =?utf-8?B?T2VUUXhXSlUzbWgwcWJDVFVLZGc3ZDE5cEMxQjcxc3AxMkR2U09pYWxDMG5H?=
 =?utf-8?B?MS8wYVdsQlNvVTJ0akRrY2ppck52TmFTNmEvVmMwT3RkQmxaNlo1azJBR2I2?=
 =?utf-8?B?M000RzZJc1J6Q3ZHVi9WUTR6RW03MENBYjlKMWFTYy9Ua1JmTW5pMEwvSzIx?=
 =?utf-8?B?Z1lId3hSZmI5SnczaEJDaGsweE5hbTEwT2RBak4ydzlRZXllU0Z5MnpxN3ZX?=
 =?utf-8?B?bUhKemcrT2hjRGxCditZdnlkb2NjUVk1TnZ5K3lmelpwOG90cHZBdUlmaTJB?=
 =?utf-8?B?eDM2U09SbnFDZC9kZVlBMWhTcFI5Z1ZJVVBlY1U5ODN0UjJUdGhPYkZhVW5U?=
 =?utf-8?B?R1RRWlAwK05tS1VqWnBtV0JsMWpqOU40d1FTZmsvZ3NRbXRIYUdRZDUwNUNW?=
 =?utf-8?B?RHIxRnRSMXVBRk1qbUxjN2JMOVYrU3pGcy9KcTJmS0RBSDg2b0twZz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 731e802a-c55a-4c93-a56e-08da10bf5a03
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Mar 2022 13:32:06.2582
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 6jC0muXoFascpa3zoATD46n1sIrcYTBRCcMCjO+rGR6sSFhtFc045EGTN/zH55SbT5DyfGtwK7dWthYWD2UEng==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR04MB7713

On 22.03.2022 18:41, Tamas K Lengyel wrote:
> For the duration of the fork memop set dom_cow as a placeholder parent. This
> gets updated to the real parent when the fork operation completes, or to NULL
> in case the fork failed.

I am concerned of this, in particular because the state may last across
perhaps a long series of preemptions. Furthermore ...

> --- a/xen/arch/x86/include/asm/mem_sharing.h
> +++ b/xen/arch/x86/include/asm/mem_sharing.h
> @@ -79,7 +79,7 @@ static inline int mem_sharing_unshare_page(struct domain *d,
>  
>  static inline bool mem_sharing_is_fork(const struct domain *d)
>  {
> -    return d->parent;
> +    return d->parent && d->parent != dom_cow;
>  }

... this now makes the function "lie" (the domain is a fork already
while being constructed). Hence at the very least a comment would want
to appear here explaining why this is wanted despite not really being
correct. This "lying" for example means a partly set up fork would be
skipped by domain_relinquish_resources(), in case the tool stack
decided to kill the domain instead of waiting for its creation to
finish.

> --- a/xen/arch/x86/mm/mem_sharing.c
> +++ b/xen/arch/x86/mm/mem_sharing.c
> @@ -1850,7 +1850,9 @@ static int fork(struct domain *cd, struct domain *d, uint16_t flags)
>          *cd->arch.cpuid = *d->arch.cpuid;
>          *cd->arch.msr = *d->arch.msr;
>          cd->vmtrace_size = d->vmtrace_size;
> -        cd->parent = d;
> +
> +        /* use dom_cow as a placeholder until we are all done */

Nit: As per ./CODING_STYLE you want to at least start the comment with
a capital letter.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 28 13:38:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 13:38:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295445.502742 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYpZY-0006wG-SS; Mon, 28 Mar 2022 13:38:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295445.502742; Mon, 28 Mar 2022 13:38:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYpZY-0006w9-PV; Mon, 28 Mar 2022 13:38:16 +0000
Received: by outflank-mailman (input) for mailman id 295445;
 Mon, 28 Mar 2022 13:38:16 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=k90j=UH=chiark.greenend.org.uk=ijackson@srs-se1.protection.inumbo.net>)
 id 1nYpZY-0006w3-6H
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 13:38:16 +0000
Received: from chiark.greenend.org.uk (v6.chiark.greenend.org.uk
 [2001:ba8:1e3::]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4faf33df-ae9c-11ec-8fbc-03012f2f19d4;
 Mon, 28 Mar 2022 15:38:14 +0200 (CEST)
Received: by chiark.greenend.org.uk (Debian Exim 4.89 #1) with local
 (return-path ijackson@chiark.greenend.org.uk)
 id 1nYpZT-0003xR-6k; Mon, 28 Mar 2022 14:38:11 +0100
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4faf33df-ae9c-11ec-8fbc-03012f2f19d4
From: Ian Jackson <ijackson@chiark.greenend.org.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-ID: <25153.47683.108568.919819@chiark.greenend.org.uk>
Date: Mon, 28 Mar 2022 14:38:11 +0100
To: Roger Pau Monne <roger.pau@citrix.com>
Cc: <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH] osstest: update Debian installer version
In-Reply-To: <20220328082121.80866-1-roger.pau@citrix.com>
References: <20220328082121.80866-1-roger.pau@citrix.com>
X-Mailer: VM 8.2.0b under 24.4.1 (i586-pc-linux-gnu)

Roger Pau Monne writes ("[PATCH] osstest: update Debian installer version"):
> Update the configuration file Debian version after having run
> mg-debian-installer-update-all.

Acked-by: Ian Jackson <ijackson@chiark.greenend.org.uk>

FTR, in future I think you should apply changes like this one without
waiting for a review.  It's not like I'm going to examine the output
of mg-debian-installer-update-all, so all I'm seeing is a date...

Regards,
Ian.

-- 
Ian Jackson <ijackson@chiark.greenend.org.uk>   These opinions are my own.  

Pronouns: they/he.  If I emailed you from @fyvzl.net or @evade.org.uk,
that is a private address which bypasses my fierce spamfilter.


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 13:40:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 13:40:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295448.502753 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYpbV-0008GW-9M; Mon, 28 Mar 2022 13:40:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295448.502753; Mon, 28 Mar 2022 13:40:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYpbV-0008GP-4w; Mon, 28 Mar 2022 13:40:17 +0000
Received: by outflank-mailman (input) for mailman id 295448;
 Mon, 28 Mar 2022 13:40:16 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=dCnP=UH=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nYpbU-0008GJ-Fm
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 13:40:16 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 99636aee-ae9c-11ec-8fbc-03012f2f19d4;
 Mon, 28 Mar 2022 15:40:15 +0200 (CEST)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur02lp2052.outbound.protection.outlook.com [104.47.5.52]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-37-ePy67ywHOUuekDhgdDpquQ-1; Mon, 28 Mar 2022 15:40:13 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by DB6PR0401MB2358.eurprd04.prod.outlook.com (2603:10a6:4:51::17)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.22; Mon, 28 Mar
 2022 13:40:12 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%5]) with mapi id 15.20.5102.022; Mon, 28 Mar 2022
 13:40:12 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 99636aee-ae9c-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648474815;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=J3/ZpJ/iDKVM8tHOMiCL0WIxTRWCqDLtBHzE+281zFU=;
	b=mpRzLLs361Vqy7zU22fncLYdtseo5fA4F34CDokkL5SWyiDYfMUCB3sJ03vls3J7EJYzgJ
	rG85RHxXUVzrd8UBsBuiF1kfLh2sOexIA4VYjQU1fjYQ+WYdpiY3K4rlgrb76f+GEsEZxp
	3JcQgvxuoa5sDPUxmSRIUUo9I2m2MVc=
X-MC-Unique: ePy67ywHOUuekDhgdDpquQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=NQNiUZ9xEnf0Wb8za0BqnlVFHcrw9TsCx8XUwfO8WTlQRQX+rVKI+LgFryLERV5b+7u8jvtQRnX5MG3B7Sxwx+7DuLntctwAPx0B+lBBb3Ntt2esMx5yZTTobuh8JJXfj5BEnb0nZ3lf/1eDBo0tlK7BjDr1aecP7AtKV5E9ACeZK8Wo4Gxx2CzJuiWVgHgJlIO7QCynu8CMefGkBrmcSrDpA/7YBu0O09Wz/ttQnUpR5deL0XNKi5ZpSoerdbibb3PzFBSIlXZ35BUSqK6Yl7NG0yJlKvkelsAVyfryj+yJlJVTsrxXZ7hCakns1nvk70Mfz0Gcco+2wRd4HuRUTg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=J3/ZpJ/iDKVM8tHOMiCL0WIxTRWCqDLtBHzE+281zFU=;
 b=gXBDv3wEoKxnCXMOKN/YWhHVGZgGnMB7/B0/w6w+kfXiXCOfmPI3iaYKz3jp1oMYEgTvI55kDAwHGB4lsRuvkFiYxRIsuR/nN40PKKNOyPVpVnyp4VBKcKCasRcPLb3HtsEgQyqzo7YZeI5ekc9fFmXIPGIrqdM3VaRiI0QQ4U7iqBfbexQ6dpk+JkRY07JHlCHsyZMs5Fj1ohAPwyOWBwEXtB1VErGZ4pvQl8RNWjf1P7n/bu21oX7sAfjYa9hFNpXRheHaOaSmhkXBUxtkXGj3ead9FsBZ+xSt38DfxOD/dVrHzDyEgYkjo7CPSiRK/j96g+HAjKRTJWYMlGIOYQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <b8ed9448-d2ea-b09d-1f20-b4dc70dc3e5e@suse.com>
Date: Mon, 28 Mar 2022 15:40:13 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2 1/3] amd/msr: implement VIRT_SPEC_CTRL for HVM guests
 on top of SPEC_CTRL
Content-Language: en-US
To: Roger Pau Monne <roger.pau@citrix.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>
Cc: Wei Liu <wl@xen.org>, xen-devel@lists.xenproject.org
References: <20220315141807.22770-1-roger.pau@citrix.com>
 <20220315141807.22770-2-roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220315141807.22770-2-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8P250CA0001.EURP250.PROD.OUTLOOK.COM
 (2603:10a6:20b:330::6) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f4acf6de-9614-4741-2c5e-08da10c07bb5
X-MS-TrafficTypeDiagnostic: DB6PR0401MB2358:EE_
X-Microsoft-Antispam-PRVS:
	<DB6PR0401MB23587DE14DFE96056EBA4390B31D9@DB6PR0401MB2358.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(110136005)(31686004)(53546011)(38100700002)(6506007)(8936002)(8676002)(86362001)(6486002)(26005)(186003)(36756003)(508600001)(83380400001)(66476007)(4326008)(316002)(5660300002)(66556008)(66946007)(31696002)(2616005)(6512007)(2906002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?ZnNhM2ovTHllazl0SVJJTFJReFo5RnhiRHZaTFJwMnUxU09RcWVQdGhTTHR6?=
 =?utf-8?B?Yjk5elE0cjY1c01CeEhmQnIvWlRqWTN0UXViODRkdjE5NEdDM283YW9rejh6?=
 =?utf-8?B?S29ENVExODVNTWVJTVovRGhuV216dGxxNnd2RFRkblc5bEMzSE1yTnR4NXVs?=
 =?utf-8?B?cVU5dmdYUG9jUS9qRmJJeXpYQTUwcWcrb0V4UXp3YnMzSWxibWdwNnkyenFj?=
 =?utf-8?B?Vlc1TGFGbjhMR1hmMEV3eG1oNEhyZU52S3JqQnRqUytaUWMwcytJQlFadDlP?=
 =?utf-8?B?ZGdub3A2RTVqZGp1d3VRaHZyZ0F6V3h2Y0ZyODdMVGlDMG1kSG1SNGd6NDJF?=
 =?utf-8?B?UlAvZUFHUGV2YVIrYTFBNWpoUng0OGQxOGZiK3FLeE9JTDVTbnVGcS9NT0lG?=
 =?utf-8?B?RjV5SmYyRHRqanVaTHZRTHNLenFUdDNXSnBxbWo4ZUVoL1ZzaW5CWmJ4eHRG?=
 =?utf-8?B?WkkzS0FEZ2xuOVc4TmZaa25NOEhtNSsrN2dNS01HeTFLaE9tT2pudGtwaFFu?=
 =?utf-8?B?bHk5WXR2Rm9uWGpEcUd3d0w4VkIvNGRXSzRaVzk1QW5FNnNPLzVKWjN3T3F6?=
 =?utf-8?B?dFRGTHFZWld1aVhHVWFQZ0R4LzdzSklER3FhcDFqRW51VnVQbWRLcWlQWlBm?=
 =?utf-8?B?a0ppblhKN2RhdUQ1ZDNLZVhUTE5KTDQ2Y3VDaG5ROUZ3ZklYUSsvL3JnYUxh?=
 =?utf-8?B?bmUycDFJdmxHRmc0MGZmVFA1YVAra1cvaTFZQm5pRWxDZ2h4blRzYzMvRWxY?=
 =?utf-8?B?ZkIyVkZkdDNwbk5nVU5VQkVCQ09IR3pNdlVja2NiL3VreDkwVGl0KzhHbUIw?=
 =?utf-8?B?WkhPczM2R0JxV3A1c05rbVdxNlhuaWw2a1lGWE1hRGxKRlNQL1hWbnZpUTFj?=
 =?utf-8?B?SlIrMW5ia2p4UGlSOGQxK2VFeXZNOGZKdGJDaERiNTI5QjU1ak4yVnhpVzF4?=
 =?utf-8?B?QmlqcEQzcmF2YWJtSGZRYXIwbTc3ZWwyZW5XUEFodjhlUWJ1N1V5QUEwVkFj?=
 =?utf-8?B?bExJR0gwWG9udllsbWQvVDQ0djBHWDQ4c0pvbDAwWnlpWjAzMUZuVGRTcDg5?=
 =?utf-8?B?Ny8rUmtYeXc5Uk5RaEdJT3FNZVduMlhESWxia1J4OXEyYS82VUJ4WHpWWnVZ?=
 =?utf-8?B?aDhxU2VJdVYzQkVUZmxRZzRYYi9GSzVEenhoM3kzcGlCTFZXVHNtZDVsZlpH?=
 =?utf-8?B?emZkVTNRNXcyTThJUll2NUtnMVBSSlllbjE5WXRraExKUmhLbVZ1VmtwME9J?=
 =?utf-8?B?dG0yb1hjbGJBa3lsdVVwRjlsc2xEbXVyYWxZM1hLY3ZXMXRmWUhuMjBYVWY4?=
 =?utf-8?B?cU1YbXVzQ25zUlA0eWd1aEtqTGRuSUdFb0pBL1drYSsrYmM2TU12UEZsWExG?=
 =?utf-8?B?SE92R0cyaHlaZjIrNE1YeDQ1T3paRXF1a2hvYWdFNjFYaGZhUkJ6VFpWdmdl?=
 =?utf-8?B?WDZYUTFCUG9VV0pjTnhiSFFMTHRKTlBjK24wQk1HSTJvOVlmREdVWURVUEEr?=
 =?utf-8?B?RnIrcFJtOThqUlcyMzY2UmFnZWxHcUdVM2JVV0pXcHQ1dmZyZnJKMWUwWnZ3?=
 =?utf-8?B?UlV1VXJ5aGdJYkRETHovdkRCSy9PaW1jSkpUcTF4SEgyUjNUa1pwOHozWWFQ?=
 =?utf-8?B?eFR2TXJhUERYZTNlS3l3RlRDdDFHMzZwZDlmSXVBWTdKYjdGbC9BSmNRWWd1?=
 =?utf-8?B?ZGpLbVJid0N3R3lUc2dISCtuRXJrazg1OGY1UkhPek1XOHBaaDVMeGljSGRQ?=
 =?utf-8?B?QnU1WUNkUWdvRWZ6RDMxNS9uMUE4WmJKSTJUOHlGd1U1emdBUkdXMHpzdG1Q?=
 =?utf-8?B?SlE1LzVpc3hCNWVVczlhTE41c2dGSEhzV0hFai9QbytldXMreVRnQTdMNjd2?=
 =?utf-8?B?VldKYkVTSGNQWmxuZU1JUkwyN2h5Mm04L3d2a3Npek0yU3E2SFo1Z0RhdDNN?=
 =?utf-8?B?M1NFSUJ6alVPR29BR0ZweVk0WFRaRUhKaTZHSTNWc1NVaFg0Y3djOXBMUWxh?=
 =?utf-8?B?ejVkUnIreUJyRWpkTTZRYXdkNm83Zk05aUhYSFd5NGt3UTFyNkRjVWNVQ1Rl?=
 =?utf-8?B?RkZzd3lGMjIrdFdkT0NOTGdKNGkwck0yNFFWN2xFV2JMaENoTkk3VERrRU5x?=
 =?utf-8?B?RWZvbmh6MUtVaE9GMW96aEtxZklLWU14YzllQ3ZsYkU2ZGd1RWFCTU8rUGNn?=
 =?utf-8?B?Y2MzSG9FbmllL1YxS0E2MEhrSUIydXpFWDEySUF1SC8rSUFWRXdnYU15b3Yv?=
 =?utf-8?B?U1ZyK0NKYW1BYVltcmxhbmR5UUppWFRGSm9SYVRyQ3g2Y0YzQzF1ZFJpVllp?=
 =?utf-8?B?aU1TcXZUandOOFVyVU5DMy8yaitibnREV1ZBanR2cmduN1dMTkUyZz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f4acf6de-9614-4741-2c5e-08da10c07bb5
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Mar 2022 13:40:12.3613
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: glJWwxtQC8PywKhjIJP5nghDFm9TsWv95Yz6csJjxlmDRA01H14Yc1FmrIIphwXzu6GCdkR3/9AaTqcy5qTt8A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0401MB2358

On 15.03.2022 15:18, Roger Pau Monne wrote:
> Use the logic to set shadow SPEC_CTRL values in order to implement
> support for VIRT_SPEC_CTRL (signaled by VIRT_SSBD CPUID flag) for HVM
> guests. This includes using the spec_ctrl vCPU MSR variable to store
> the guest set value of VIRT_SPEC_CTRL.SSBD, which will be OR'ed with
> any SPEC_CTRL values being set by the guest.
> 
> On hardware having SPEC_CTRL VIRT_SPEC_CTRL will not be offered by
> default to guests. VIRT_SPEC_CTRL will only be part of the max CPUID
> policy so it can be enabled for compatibility purposes.
> 
> Note that '!' is used in order to tag the VIRT_SSBD feature as
> specially handled. It's possible for the feature to be available to
> guests on hardware that doesn't support it natively, for example when
> implemented as done by this patch on top of SPEC_CTRL.SSBD (AMD_SSBD).

Except for this ! aspect the change looks good to me, but in order to
give my R-b this aspect needs sorting. Andrew - what are your thoughts
here? The reason cited by Roger doesn't look to be one that I so far
understood would require use of !, but your intentions may well have
been different from what my current understanding is.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 28 13:51:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 13:51:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295451.502764 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYpmO-0001Nb-Ao; Mon, 28 Mar 2022 13:51:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295451.502764; Mon, 28 Mar 2022 13:51:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYpmO-0001NU-6q; Mon, 28 Mar 2022 13:51:32 +0000
Received: by outflank-mailman (input) for mailman id 295451;
 Mon, 28 Mar 2022 13:51:31 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=1Y9Q=UH=invisiblethingslab.com=demi@srs-se1.protection.inumbo.net>)
 id 1nYpmM-0001NO-P0
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 13:51:31 +0000
Received: from out5-smtp.messagingengine.com (out5-smtp.messagingengine.com
 [66.111.4.29]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2999d617-ae9e-11ec-a405-831a346695d4;
 Mon, 28 Mar 2022 15:51:28 +0200 (CEST)
Received: from compute4.internal (compute4.nyi.internal [10.202.2.44])
 by mailout.nyi.internal (Postfix) with ESMTP id 513445C0100;
 Mon, 28 Mar 2022 09:51:26 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163])
 by compute4.internal (MEProxy); Mon, 28 Mar 2022 09:51:26 -0400
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Mon,
 28 Mar 2022 09:51:25 -0400 (EDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2999d617-ae9e-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:cc:content-type:date:date:from:from
	:in-reply-to:in-reply-to:message-id:mime-version:references
	:reply-to:sender:subject:subject:to:to:x-me-proxy:x-me-proxy
	:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=XvgsUWz/ZapYy1cAF
	pFe7U3jyrIlUSCInZ9aGV0Jihg=; b=cZkVrK62z60Uj9k/yZQU5+mvUI7ePWLZF
	O6Wq4L1+4p6+bVpfFq6FxEV/z9Ff2yZuRIxFxzOh05Q6R6bREbKxEc1geV75rx+w
	YK/CwzrZTRrp1sWY67jk1MKIo/2RtIBnHtk9UAC/nt1VbaQoJGqgflkJi0BuN5eM
	bfR5oeDlh7+RKGzUQyiJ6GQ5mYMRKXYY9buMyB2gTeN7eNFEZi5uQQ0hg6pq4UwE
	IbT5cFzIHKR2tNbH2VEMHmeujJvWnRz9WxOwdTMeZjPAQS+igcqmtQFSr1xweqFO
	q2Oy56yMGgrQf+3FT8lL0UwtfDQSV4nFIdtWPc+SFcXPhaTTK+p0Q==
X-ME-Sender: <xms:Xb1BYgicCdlekY7226BlzL9hR_ICFgrUjHvuDRlhHa6lxg4bjPtn4A>
    <xme:Xb1BYpC7nBoccpAJNjF1BW4QpnWC--6a6u8uD8OLZR3QgN9p7BoO2l_0GblFj-b8P
    LQnCSo9iocNoEY>
X-ME-Received: <xmr:Xb1BYoGUX-U0luJfttvcCnsqHUGrhY5A2S8CPKDhbsNzkQdsBkVkXmJjRTI0zu5vccxJgg>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddrudehjedgjedtucetufdoteggodetrfdotf
    fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen
    uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne
    cujfgurhepkfffgggfuffvfhfhjggtsehgtderredtfeejnecuhfhrohhmpeffvghmihcu
    ofgrrhhivgcuqfgsvghnohhurhcuoeguvghmihesihhnvhhishhisghlvghthhhinhhgsh
    hlrggsrdgtohhmqeenucggtffrrghtthgvrhhnpeeukeefhefffeetheffffeftdeigedv
    leetffehvdekuefhfeduteetfeetvdelhfenucevlhhushhtvghrufhiiigvpedtnecurf
    grrhgrmhepmhgrihhlfhhrohhmpeguvghmihesihhnvhhishhisghlvghthhhinhhgshhl
    rggsrdgtohhm
X-ME-Proxy: <xmx:Xb1BYhSN7ZITi1TQhMZSIkVY72BLScrJ65JiC5Tnvj19pipbaS-PNQ>
    <xmx:Xb1BYtzNmJ7n0WGoOqdrom3q6zYzRvXng1h3vXnvb9vHZvNQBQm7BQ>
    <xmx:Xb1BYv7qud9RySIIvrXfP_9qtibLddDLs0snAKoqSeb4cKzI9aFc1A>
    <xmx:Xr1BYo86JXtYiFA2AiPh1xsfoxjKmi7i0ARj7CPFvsz9KjQ5c9boIg>
Message-ID: <c904abda-e6a0-256e-478a-ee0909c17e50@invisiblethingslab.com>
Date: Mon, 28 Mar 2022 09:51:22 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: Security support status of xnf(4) and xbf(4)
Content-Language: en-US
To: Damien Miller <djm@mindrot.org>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?=
 <marmarek@invisiblethingslab.com>,
 Xen developer discussion <xen-devel@lists.xenproject.org>,
 OpenBSD technical mailing list <tech@openbsd.org>
References: <Yj3qW/y20htoSvuK@itl-email>
 <37a4b6-cd56-1993-be2-b5522b9aa4d7@mindrot.org>
From: Demi Marie Obenour <demi@invisiblethingslab.com>
In-Reply-To: <37a4b6-cd56-1993-be2-b5522b9aa4d7@mindrot.org>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------f094q0t0afcdSwpfbNFreBCK"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------f094q0t0afcdSwpfbNFreBCK
Content-Type: multipart/mixed; boundary="------------OVdNd2Q65LvjbZQB0qhiBAQ9";
 protected-headers="v1"
From: Demi Marie Obenour <demi@invisiblethingslab.com>
To: Damien Miller <djm@mindrot.org>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?=
 <marmarek@invisiblethingslab.com>,
 Xen developer discussion <xen-devel@lists.xenproject.org>,
 OpenBSD technical mailing list <tech@openbsd.org>
Message-ID: <c904abda-e6a0-256e-478a-ee0909c17e50@invisiblethingslab.com>
Subject: Re: Security support status of xnf(4) and xbf(4)
References: <Yj3qW/y20htoSvuK@itl-email>
 <37a4b6-cd56-1993-be2-b5522b9aa4d7@mindrot.org>
In-Reply-To: <37a4b6-cd56-1993-be2-b5522b9aa4d7@mindrot.org>

--------------OVdNd2Q65LvjbZQB0qhiBAQ9
Content-Type: multipart/mixed; boundary="------------3tlhz9nldwzLm4UkA0PZFtno"

--------------3tlhz9nldwzLm4UkA0PZFtno
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 3/27/22 21:45, Damien Miller wrote:
> On Fri, 25 Mar 2022, Demi Marie Obenour wrote:
>=20
>> Linux=E2=80=99s netfront and blkfront drivers recently had a security
>> vulnerability (XSA-396) that allowed a malicious backend to potentiall=
y
>> compromise them.  In follow-up audits, I found that OpenBSD=E2=80=99s =
xnf(4)
>> currently trusts the backend domain.  I reported this privately to The=
o
>> de Raadt, who indicated that OpenBSD does not consider this to be a
>> security concern.
>>
>> This is obviously a valid position for the OpenBSD project to take, bu=
t
>> it is surprising to some (such as myself) from the broader Xen
>> ecosystem.  Standard practice in the Xen world is that bugs in fronten=
ds
>> that allow a malicious backend to cause mischief *are* considered
>> security bugs unless there is explicit documentation to the contrary.
>> As such, I believe this deserves to be noted in xnf(4) and xbf(4)=E2=80=
=99s man
>> pages.  If the OpenBSD project agrees, I am willing to write a patch,
>> but I have no experience with mandoc so it might take a few tries.
>=20
> Hang on, what is a "malicious backend" in this context? Is it something=

> other than the Xen Hypervisor? If not, then it seems not to be a useful=

> attack model, as the hypervisor typically has near-complete access to
> guests' memory and CPU state.

The backend can run in any Xen VM.  It often runs in dom0, but it
is not required to, and in Qubes OS the network backend never runs
in dom0.  Unless it runs in dom0, it has no access to frontend memory,
except for memory the frontend has explicitly given it access to via
grant tables.

--=20
Sincerely,
Demi Marie Obenour (she/her/hers)
Invisible Things Lab
--------------3tlhz9nldwzLm4UkA0PZFtno
Content-Type: application/pgp-keys; name="OpenPGP_0xB288B55FFF9C22C1.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB288B55FFF9C22C1.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=3Dx+Ro
-----END PGP PUBLIC KEY BLOCK-----

--------------3tlhz9nldwzLm4UkA0PZFtno--

--------------OVdNd2Q65LvjbZQB0qhiBAQ9--

--------------f094q0t0afcdSwpfbNFreBCK
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----
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=lyYK
-----END PGP SIGNATURE-----

--------------f094q0t0afcdSwpfbNFreBCK--


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 14:02:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 14:02:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295454.502775 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYpxG-00031x-GJ; Mon, 28 Mar 2022 14:02:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295454.502775; Mon, 28 Mar 2022 14:02:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYpxG-00031q-Cy; Mon, 28 Mar 2022 14:02:46 +0000
Received: by outflank-mailman (input) for mailman id 295454;
 Mon, 28 Mar 2022 14:02:44 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=dCnP=UH=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nYpxE-00031k-Np
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 14:02:44 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id bcd16829-ae9f-11ec-a405-831a346695d4;
 Mon, 28 Mar 2022 16:02:43 +0200 (CEST)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur02lp2059.outbound.protection.outlook.com [104.47.5.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-38-QtZuhqQCN0WGLSZFwKyXYA-1; Mon, 28 Mar 2022 16:02:41 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by PA4PR04MB7664.eurprd04.prod.outlook.com (2603:10a6:102:f1::13)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.22; Mon, 28 Mar
 2022 14:02:39 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%5]) with mapi id 15.20.5102.022; Mon, 28 Mar 2022
 14:02:39 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: bcd16829-ae9f-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648476163;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=nkZZGbFQopAsIAhzn7WIyzzHOx6GY3IahxcyuC1w5Jc=;
	b=KcbuRiEJz4gTtHKr1DC8Wf13PRtKAxhDlfx6J2K0k26g8UCFF8bXID/6tm3VDqrKwMQtZ7
	6McGtcTmQYnpmdKeUAldJ00foMbTipU2g63Bab8TFhceu322R8Uz5cCsT+qL5eHfz6/Wza
	CBNhUjVxOxY3uaMctPEhN28i2KvgN/8=
X-MC-Unique: QtZuhqQCN0WGLSZFwKyXYA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=UMVR1aG2Mv/a0k85EMnOeFC7EU9fHCXOF98dcPdQwOsSnskF5NmMk08T2UrJSRWBF+TjR7KvW81VquFARP8tLSoNWR04P35PdUCDSlUs7YzJbqObpJuYLHbsCwn0OlMXQDxyot0hmj8Uvngv28/jfEj8GjssbC7fmpRdp+k48cCpd06ANvG7UBZjhsXisV2tx1pgbm/bXT4oYwUp8cdRTritZNyRVhQW4DDXvnaX3xCksokr4RCHr9W5LlJAOkErl1PgfUYI+ZuZTqVo1jz52FCPZGTRdug7ncyVZ3cjW+XB3B/pPOW//djZlOYS18f20JiZ3DdRz4PpjSALaFyBXA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=nkZZGbFQopAsIAhzn7WIyzzHOx6GY3IahxcyuC1w5Jc=;
 b=PbWIFODQpMcnNbrWiAIgHhJS22cBPjsPj2+3ACGBavorumwNji8rC0Qtg5wb1w4RRo2Rl9sJqh2yfVIxZcfyO6JnTraBW5knWa+k3zNAdqH/VWkE2E/D592Np3BU160jY/GQ+EjvMKGVKvUVzUysZ5fBJTiLjBzeBOYBPC0Dwa4q8+Pm4SkfsoYtiYKkxkvokQcqUJYNy4iWuOx47kWyHG0vgng+6Ugj0mJx3n9lXK/H+liDtoTEIjZlbWxHq58TNVQHxa8TgTK+d82mH4PGkWHR8athSePwCOzbkPAn+qNQA/8xtw/OC7JVDUQsJxEDN6/xvIzWMK1fz7jYRYNlRQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <033ec463-f20a-a6d0-d877-51e4f476a316@suse.com>
Date: Mon, 28 Mar 2022 16:02:40 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2 2/3] amd/msr: allow passthrough of VIRT_SPEC_CTRL for
 HVM guests
Content-Language: en-US
To: Roger Pau Monne <roger.pau@citrix.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220315141807.22770-1-roger.pau@citrix.com>
 <20220315141807.22770-3-roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220315141807.22770-3-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P191CA0005.EURP191.PROD.OUTLOOK.COM
 (2603:10a6:209:8b::18) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 071176f8-d1d3-43df-fdfb-08da10c39ea8
X-MS-TrafficTypeDiagnostic: PA4PR04MB7664:EE_
X-Microsoft-Antispam-PRVS:
	<PA4PR04MB76648E1D95535CF28AB29A8BB31D9@PA4PR04MB7664.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6512007)(8936002)(86362001)(6916009)(6506007)(31696002)(66946007)(83380400001)(5660300002)(38100700002)(2906002)(36756003)(53546011)(508600001)(54906003)(6486002)(2616005)(6666004)(8676002)(26005)(66556008)(31686004)(4326008)(316002)(186003)(66476007)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?ZTVjR1p0VURUa2lZcjVxL3plNHE5c0c1Q1N2OU8rVHJBaUtJa3hGUFFUa0sr?=
 =?utf-8?B?bk5jT2FGRzIxRnZYdERSdG9MQnNjbGRxWU1WSlRUdG81YnBUVEszVm9pSEpC?=
 =?utf-8?B?d0hxWTV2UURBRUcvM21weE9EcmJCMFZ3WWZlSDRMVUtqc1lPODR2TVAwbGRn?=
 =?utf-8?B?L0l6RjZSZ1JGVVgraG1YaVcyckZIZGpJOURQYUJLcFUwd3B4dFExNHVWMktQ?=
 =?utf-8?B?QkE1VFpLR1hBWXFYZCtrL0FyWVg1VFBONFRUcTFVN0cvQUNMeGxSRmZlVzMy?=
 =?utf-8?B?a3NrUjZjSDc2QTM3alljS1V6ZjVCSkZQMVprZmhtMExRQWFITHJNVG9vY1dJ?=
 =?utf-8?B?c2pXVWZuSVZnTTFCbUx2WDljWmJSODE4aC9sbjIzekppMjhwSTM3ZHVWSVla?=
 =?utf-8?B?WFl2L0F4bHB1YUREajNqaEw1UGlZcUlJbkRhVTdUckUyRGhHMlB3QUVZOVBY?=
 =?utf-8?B?YWxQN1MxVjFteFdSUUxBeWdFR0ZraVpyNVUrSnJUeXkrR1RaMVRtRTRXN2JL?=
 =?utf-8?B?TGVwbEtxbnBZRGtUNU5raFZNUGhVeHh2VGZqdFhXbmJyUjZEOE13NlNwWlpw?=
 =?utf-8?B?YjNHNkpYbnpJeXplanZ1TjdQSXQ0MEcwdExVbmxjK3I4UUpEK0pFYUxHWjVk?=
 =?utf-8?B?WkNkS2EvZFRPVU14eXB2dSt6R3dBTnRYS00xK28yTTI3dGNNeXUrdHB5Nml2?=
 =?utf-8?B?RExZVDkvS05PK0JTQnJpN1NoU0NMc0RsOHR5SG5CY25kVDFBQWVHbGNaZkdp?=
 =?utf-8?B?cVBsdk5XU0tkdlpobDYrbnFsZ1NLYjFaOVRkSUl2N0RkMVl6ejZKU3RBNDhK?=
 =?utf-8?B?NU8wMmF6WSt0bVpiS3l3Y2hxVjhLQ3pERGY0SUx3Z042NFVxTWN5SjdGZk54?=
 =?utf-8?B?M1ZxL3llN25xLzBwRXcrYlNndCtmRlZTSTZ5N2Z4bWJTMDYrNU1FNHd6NmxS?=
 =?utf-8?B?QjcrbEVvM2tqdHo3SHRwb3hLUHBwWm96cFlIZ21MaGJIQW1jMkI2SEU2Z0tw?=
 =?utf-8?B?V2UxUXpTMHdhOTdraDJsWlg3dnNLNFRqVnluYzR1Z3U5Zkxram1TcUhuSkRW?=
 =?utf-8?B?TlJ6d2FzZkpIZmhmYmszMWZpSzExUVIyZzM0ak9LR0ZpNHJzRzVIV1Q5NDBJ?=
 =?utf-8?B?Tnkya0VqQXJsWmE5cGtCWXd4WU5Ra3J6cnJGbFdDdlpYUUo0eFdOTHR0MjUw?=
 =?utf-8?B?TGtLcXR4R1Jwb0huNG9IcC9iWW5HbkxMUjRrZDZKaWIyejBvVzRIZTVSRkl5?=
 =?utf-8?B?TmUwdllQMFVQN3I1d2xzOU5MT2tpMGloM1BhRWlQQi9OSktCQVRoK2IzZ0o5?=
 =?utf-8?B?UktyelVSTGFWQjVIVmJaUTUrcGZSdkF0cUlMdnZiR1BPZjFTL1ZLTEplTUFW?=
 =?utf-8?B?a05UQU1aY205aWJMbFBMYm85clBQQ3cyekY2QkpXL0o2WDUvZ1pyUGx0SjN3?=
 =?utf-8?B?SDhHdjFObUN2MEo1NkJ1VDE2OTZucm1wTFhtYVlmUGRHV0xFZVpYbnQydjdl?=
 =?utf-8?B?T1ljcWI1WkQrOTBsNG1ZaEg0ak5KVTkrSGVwOE13MzZZYmRqam5leUpyOUov?=
 =?utf-8?B?R012eldUL2NNelJPYWxJbnRVSkNrdmhCaGN6aitiTlZiQTRIWFZvNG1mT2hH?=
 =?utf-8?B?bTZYY3oyWHYxY01keTdZZlArRkFuZmdpSWZUR3VIbHBvN01wMUpnK0ZRMnV4?=
 =?utf-8?B?UTUzTENiYWxtNmJONnhBZTJUQ3VnUm5rMEpWTitzUGRUcHB4UjVLQXVZeEVz?=
 =?utf-8?B?UG56NTR3ajVsOVUvcVViM1R0UE9qYTFDVkFHazhKRFUvUlA1YjNhWjR6eWY1?=
 =?utf-8?B?a0dkQkFGYXlDVENoVGpSaWJWUmorRjFNeDNMbjF1eENjbVpZd3BHNnIvSWdk?=
 =?utf-8?B?SFJKUDFxR1pXdlVRSFZZekVKQXVuNDFRWjNsdG5zbzc4d3duZ3MvdlBWUElp?=
 =?utf-8?B?V3BYNmh2eDBnK2dKa3lYd3hqbkVVcTVETzBxLzdsb3hlNGhqVko4NE5ZR0RI?=
 =?utf-8?B?VGNSdjhLSEk3TDZxNjBRRGYvTFEwRGNqcUJYd3N1R1lncWdYM0RoVnZlTUVo?=
 =?utf-8?B?akV3MzFCbkVPWmgxSCsvNnBId2VscnZXQnliK0RmaVZCU3lUbVlEbmg4R2xq?=
 =?utf-8?B?QlFsNTlQckJRZGt6Q1B1SlVFV1pEZGJFRi8wV0VwNFYvb3R3Nmk0NG8xV09X?=
 =?utf-8?B?L3R3NURiRkRYMExQMnB5YVNoM0M2WEdNenFhaXhuaksvRFRsTHVlVlE1Zmly?=
 =?utf-8?B?TjhwUnlUMmtFZGpmbGtmeEVkR243aDV1djVtd044WTNrUDVTOHpwTlVWcmM0?=
 =?utf-8?B?WVl6dXQ0UmhFYjhLcHNhOEhEZUxKY1J3eHBFKzNFR3F5Y2lESmZTQT09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 071176f8-d1d3-43df-fdfb-08da10c39ea8
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Mar 2022 14:02:39.4294
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: oXoflHhCXgBr0qdm9Y04kPAxvsqPRFYdbkIsCJrPyvMfohv2kCQVPm79UMf44dkHH7qtecdi+VMdyAOhDNnNCg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR04MB7664

On 15.03.2022 15:18, Roger Pau Monne wrote:
> Allow HVM guests untrapped access to MSR_VIRT_SPEC_CTRL if the
> hardware has support for it. This requires adding logic in the
> vm{entry,exit} paths for SVM in order to context switch between the
> hypervisor value and the guest one. The added handlers for context
> switch will also be used for the legacy SSBD support.
> 
> Introduce a new synthetic feature leaf (X86_FEATURE_VIRT_SC_MSR_HVM)
> to signal whether VIRT_SPEC_CTRL needs to be handled on guest
> vm{entry,exit}.
> 
> Note the change in the handling of VIRT_SSBD in the featureset
> description. The change from 's' to 'S' is due to the fact that now if
> VIRT_SSBD is exposed by the hardware it can be passed through to HVM
> guests.

But lower vs upper case mean "(do not) expose by default", not whether
underlying hardware exposes the feature. In patch 1 you actually used
absence in underlying hardware to justify !, not s.

> @@ -610,6 +611,14 @@ static void cf_check svm_cpuid_policy_changed(struct vcpu *v)
>      svm_intercept_msr(v, MSR_SPEC_CTRL,
>                        cp->extd.ibrs ? MSR_INTERCEPT_NONE : MSR_INTERCEPT_RW);
>  
> +    /*
> +     * Give access to MSR_VIRT_SPEC_CTRL if the guest has been told about it
> +     * and the hardware implements it.
> +     */
> +    svm_intercept_msr(v, MSR_VIRT_SPEC_CTRL,
> +                      cp->extd.virt_ssbd && cpu_has_virt_ssbd ?

Despite giving the guest direct access guest_{rd,wr}msr() can be hit
for such guests. Don't you need to update what patch 1 added there?

Also, is there a reason the qualifier here is not in sync with ...

> @@ -3105,6 +3114,36 @@ void svm_vmexit_handler(struct cpu_user_regs *regs)
>      vmcb_set_vintr(vmcb, intr);
>  }
>  
> +/* Called with GIF=0. */
> +void vmexit_virt_spec_ctrl(void)
> +{
> +    unsigned int val = opt_ssbd ? SPEC_CTRL_SSBD : 0;
> +
> +    if ( cpu_has_virt_ssbd )

... this one? Since the patching is keyed to VIRT_SC_MSR_HVM, which in
turn is enabled only when cpu_has_virt_ssbd, it would seem to me that
if any asymmetry was okay here, then using cp->extd.virt_ssbd without
cpu_has_virt_ssbd.

> @@ -1069,6 +1072,10 @@ void __init init_speculation_mitigations(void)
>              setup_force_cpu_cap(X86_FEATURE_SC_MSR_HVM);
>      }
>  
> +    /* Support VIRT_SPEC_CTRL.SSBD if AMD_SSBD is not available. */
> +    if ( opt_msr_sc_hvm && !cpu_has_amd_ssbd && cpu_has_virt_ssbd )
> +        setup_force_cpu_cap(X86_FEATURE_VIRT_SC_MSR_HVM);

In cpuid.c the comment (matching the code there) talks about exposing
by default. I can't bring this in line with the use of !cpu_has_amd_ssbd
here.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 28 14:21:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 14:21:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295467.502790 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYqFB-0005Yd-3Z; Mon, 28 Mar 2022 14:21:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295467.502790; Mon, 28 Mar 2022 14:21:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYqFB-0005YW-0E; Mon, 28 Mar 2022 14:21:17 +0000
Received: by outflank-mailman (input) for mailman id 295467;
 Mon, 28 Mar 2022 14:21:15 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=dCnP=UH=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nYqF9-0005YQ-NX
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 14:21:15 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 52a579eb-aea2-11ec-a405-831a346695d4;
 Mon, 28 Mar 2022 16:21:14 +0200 (CEST)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2051.outbound.protection.outlook.com [104.47.14.51]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-37-sHUIwSQ2PACdjnnxoY_SjQ-1; Mon, 28 Mar 2022 16:21:02 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM0PR04MB6866.eurprd04.prod.outlook.com (2603:10a6:208:183::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.22; Mon, 28 Mar
 2022 14:21:00 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%5]) with mapi id 15.20.5102.022; Mon, 28 Mar 2022
 14:21:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 52a579eb-aea2-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648477273;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=rqau9UMD9Tc1ibK5Jy2h5Q5tLsuBLxxdQ61AUbcFoRw=;
	b=OPb/QJREF9YDaAz864yhRCZJ8Oej+9IzWwADq0SOoR9RMluIDM7eCVbTDodyLl6te7bCtw
	J9SPFxxcgtk7RAf2ad+8XQIKhxxZqJXR3LUxkBXEigeo9WwpN5SDnIup672+ViWR4RLcGt
	Oyw1KWlwQa5EBcUM08XFf22OokT+7+0=
X-MC-Unique: sHUIwSQ2PACdjnnxoY_SjQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=igWD9o+JyWw/KFURXz85/tfRGDR7U1BTNHksYLdUE8qhx39JaLpybd1kn5rTHF4XyeRzSIlwClhg5KsrPSCdYolzGwCOdoIpIqf8bPcs/JGf9U4gD+YIus0K0qIMwW8K0sMJUTqt+K7XDM1gH8laPELP03SodJBzkbzn5ZT7cp4D0SAZPL4RIi4C4rD7K08hPNajM1OE9UJ+QB45bingWdRnbwT+aie1e87wSOHcm60Si8gfW4K84HDPTE6WPNaqf3acaKsde7nwYJDHZtRJCRLL2Cw9BNWYc5tbvyBGvpzekFIxPWo78WNdvvZX4vf72BCR41rwtOuJ+eU6T/RT5w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=rqau9UMD9Tc1ibK5Jy2h5Q5tLsuBLxxdQ61AUbcFoRw=;
 b=hCsK3m8A9CKs1vnmMuwNAGFONKaDaiNgkLOGceOoVGdUSOVv0fx7hpIBsEbkiYDa05dDPhccCmehcpRSIZi6EtlDSEYl6CsFsgI0iu7pTVBAxsnAjVUZ3DBsxYfkMtgAYZ2CwVL+5qFPqcg6f1jo3hloWAUENHUG7C1AopupXsKCumOiBXONOteYC9b9L0qmh3nX0XK2S16KIgH3BTrcWToguZG6SG+SYQY4JnKFvSpYTMB7GNVT2vf2sqdyyFwS/U03+uFsSljzYQDdypAomt/mlALPjm6G7DRYNYAfkgfCiMiU/ZWiLKu3DfbCbEDQHDEpkEBFIQ9LsHa44RtL3w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <81e90bb0-bcc0-563b-eda0-9979164aaad2@suse.com>
Date: Mon, 28 Mar 2022 16:21:02 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2 3/3] amd/msr: implement VIRT_SPEC_CTRL for HVM guests
 using legacy SSBD
Content-Language: en-US
To: Roger Pau Monne <roger.pau@citrix.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220315141807.22770-1-roger.pau@citrix.com>
 <20220315141807.22770-4-roger.pau@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220315141807.22770-4-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM5PR1001CA0040.EURPRD10.PROD.OUTLOOK.COM
 (2603:10a6:206:15::17) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2b0c3549-0328-4131-242e-08da10c62f19
X-MS-TrafficTypeDiagnostic: AM0PR04MB6866:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB6866EEBD1F45D0C8E3B77289B31D9@AM0PR04MB6866.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(5660300002)(4326008)(8936002)(31686004)(6512007)(53546011)(316002)(2906002)(54906003)(36756003)(83380400001)(6486002)(2616005)(26005)(6916009)(6506007)(186003)(508600001)(38100700002)(86362001)(8676002)(31696002)(66946007)(66556008)(66476007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?V2ozRlhuU3pPTkFyajh1T3FvSDJUN2l6YmppNFdaOXdqc01kVW1Sck1OOXJV?=
 =?utf-8?B?OTlVc25LUy9ycmVPeXQycGVrTHloZTFzaXhNTUlJQ3l6NWdhVGZPdUtCcnYv?=
 =?utf-8?B?THJ2czgvTzJSUlVxQkZJdE5NRDlNUlRHZW15TFl4MHNPNUVUK0NndTV6S2tF?=
 =?utf-8?B?NVhwdmZjenM2YUZ2SEQ2enQ4ZWZWQlJud3BxU0RGdXBCNjFVZU9xRSs0VGlm?=
 =?utf-8?B?bnE3WG12NU01UURlMWRoQ0loOHhjKzRjN3EzRUk4T1U5MnJvaGd6WHRQMngv?=
 =?utf-8?B?ZHlVc1lIV3JiNWV2ckdiNnJscW9maEprc1NTVXdGd1BXYkh3OVRHcHc1bkN2?=
 =?utf-8?B?MVBORzlzM2c5MEo0KzZ1K3p1STViSXVXZjEzRDU2SDBIZnZnN0lRZitaczNF?=
 =?utf-8?B?TExieXdGZ2pzeExRd2l5cVlkSU90Z1VHMEVEYmhHcno3Zkcxc2UyL3lKWTBL?=
 =?utf-8?B?WVJVbjRSRGkzMnhrbzNtU3JzSmc3aWhTempYZVVhQnE0T1BVNVFCZDdVVmZp?=
 =?utf-8?B?aWpxYzhRcERtSDV3dW1SMXBIYm14NjJWNjRHOWxSMllOUS94U1dGTlRSRXkr?=
 =?utf-8?B?RnRZNUlWd0JhZFN2UTViQ3IrZ3ZlSGFMd3ZoWkFidHFOalVWcE4ySVJHSWIx?=
 =?utf-8?B?eDJSRVNrUEg2Ny9wN3Y5NkR4VmpnRGJidnpNSXRjKzBkOERxMThKWDl4R1Rq?=
 =?utf-8?B?TWhxUm9nZWxuT1JPL2trVXR1ZUxmNGtsWGxsd20raGdCMXlZL0pybFc4WHRC?=
 =?utf-8?B?bUhqd1JiNjRBK2VPYkM5YjhrWnExUW42cWlucUQrOGdlTTR5aFcvT1pNc1hE?=
 =?utf-8?B?SDVycjN0Vmh4R2JZeWdlZkZTZG9GekM4bklNOHM0ZHk2R1NzdTNDZUhFazdC?=
 =?utf-8?B?M1ViblJQeDMwdkxIUU85ZkxjYklTSnBZbGE2VXZvdEdBOGZ4ajcyYWszRXNJ?=
 =?utf-8?B?cCtTWmgyTCtBTEFXa0JvZjJGdzI2blFSWmNjQWxrY1VzaWdOY29qLzdTRjQ3?=
 =?utf-8?B?ME1VanlUWWZ4SVo0Mjg3VGFoZ3k1aUVwWllsNDMvWXB4VTRoS3kvWWtRQWsy?=
 =?utf-8?B?NndLUGhHaW51VjJSejhQRlcyYW5nQnZFODA2VDNUYWI5M3o3NFNjbUdKYVFD?=
 =?utf-8?B?eFpDa1crWDdDRk53S2hyNGFjdXg2Z1hvL1gwenlaYjJBVXdlUC80di84NkUv?=
 =?utf-8?B?WnB0aVkrN2p4c2ZLTTlSaE40UnJJc1ZFMnhvR1JNbHROS3ArQW5mN3dHTm1z?=
 =?utf-8?B?OGdFdWZsRG5wN3FCeFVaUC9WN2gyejV3N1kyTlBiYUhYSjBBN1VPWTR5UUFz?=
 =?utf-8?B?MHZCQU00ZTF2akRuVHUrSmwweDNiWkJyN2w0SDk5bmgvMVVvRjd1a1lOK05p?=
 =?utf-8?B?czliTFpxWXh4RmdYamVBZFhlWEJPRnFpUGFwRjZzL0VydjFNK3UrUXFxN2h3?=
 =?utf-8?B?Q3lyZ2laWXFyWjhjZ1hWTEU5MTBPS2FqQ0JVVUpScUFEcVlhdFNNWXVHUFQ2?=
 =?utf-8?B?dU5taUtLejY3UTBtM2ltTmxHTWNCTVRBSzFDM0ZXVUtqVENuTWNQNGp1Ty9J?=
 =?utf-8?B?VzZoSnV5ajRIeTZwZ3dRdTh3S3FyWTV3M2tjekdxalpqZ2xNb2Q0WXUvbmpz?=
 =?utf-8?B?Ky8ydlZMUytHMHFoVTFLL1Z0MUtnblhheUFIaFhiazBhbVJZcHZzaEJZcE11?=
 =?utf-8?B?SkorbFRMM0lCQi9OSGNVTFlVQklQekJYZUppK1pGcndzdlhZY0UrUGdIVkMy?=
 =?utf-8?B?eSs4dzZaNURleTBuRVgrUWFwckg0ZGRyaWE3UDJOOU5IdzJ6amZKWGZMbU9Z?=
 =?utf-8?B?dnpad29Qd2cvWUhodUtjdWdETjdWeHJTSSsrV2xWVjJGYVdTZlZkeDBHNXJy?=
 =?utf-8?B?L0pWdlRETWtsRDdETHVoTmNrOTRQblVtYWJFSlQ1Y3graUloUTBkN0pzTm5Q?=
 =?utf-8?B?WXdVcWV6UkxzTHRSUTA5TzJpL2NNa1A5UWI1M2NmelpkdlpYOVpXcFNiMjFI?=
 =?utf-8?B?cFBoQzhHYjNDR3Y1MUV6OTVsNEllSG45bllZaGdiaTdQb04vaEpSVExJaVBl?=
 =?utf-8?B?Rk5mM1o0YWorOEpiNGZMRkNLdzRmWHdwWWt0a1YrODBGd1ZWUXgvMGJNU3Qw?=
 =?utf-8?B?dHQ1QVZGNXBmMkNXRDVoc2R2cDJSTWZoNUY0TlEzMng5UlNha2EwQ0pQVU1o?=
 =?utf-8?B?YmdQcnJwcDJLcHd3V215S2NYMERJS2RkQnRMUWRBbTA1THdWaVNmeExhM3Jh?=
 =?utf-8?B?aTZDTWNwMEh4dmxsa2lSN2toNnh5ZzBLcWtMWlRhQkJncUpoSjIwaGF2bzZN?=
 =?utf-8?B?d2krWVpoYW9QYkFFbmhOWjg3RGI5MEJuLzNkUUM1TmM0b0QzdnJ3QT09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 2b0c3549-0328-4131-242e-08da10c62f19
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Mar 2022 14:21:00.6875
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: ATtK+WwYUFW2NvNQYDEQHSIvSYRuCK6TddNGtScku+hwWvREc5oD6+IAtg6MvJOv0KW7Rpkh8c0QBmocqAsqig==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB6866

On 15.03.2022 15:18, Roger Pau Monne wrote:
> +void amd_init_ssbd(const struct cpuinfo_x86 *c)
> +{
> +	if (cpu_has_ssb_no)
> +		return;
> +
> +	if (cpu_has_amd_ssbd) {
> +		/* Handled by common MSR_SPEC_CTRL logic */
> +		return;
> +	}
> +
> +	if (cpu_has_virt_ssbd) {
> +		wrmsrl(MSR_VIRT_SPEC_CTRL, opt_ssbd ? SPEC_CTRL_SSBD : 0);
> +		return;
> +	}
> +
> +	if (!set_legacy_ssbd(c, opt_ssbd))
> +	{

Nit: In this file the brace belongs on the earlier line and ...

>  		printk_once(XENLOG_ERR "No SSBD controls available\n");
> +		if (amd_legacy_ssbd)
> +			panic("CPU feature mismatch: no legacy SSBD\n");
> +	}
> +	else if ( c == &boot_cpu_data )

... you want to omit the blanks immediately inside the parentheses here.

> +		amd_legacy_ssbd = true;
> +}
> +
> +static struct ssbd_core {
> +    spinlock_t lock;
> +    unsigned int count;
> +} *ssbd_core;
> +static unsigned int __ro_after_init ssbd_max_cores;
> +
> +bool __init amd_setup_legacy_ssbd(void)
> +{
> +	unsigned int i;
> +
> +	if (boot_cpu_data.x86 != 0x17 || boot_cpu_data.x86_num_siblings <= 1)
> +		return true;
> +
> +	/*
> +	 * One could be forgiven for thinking that c->x86_max_cores is the
> +	 * correct value to use here.
> +	 *
> +	 * However, that value is derived from the current configuration, and
> +	 * c->cpu_core_id is sparse on all but the top end CPUs.  Derive
> +	 * max_cpus from ApicIdCoreIdSize which will cover any sparseness.
> +	 */
> +	if (boot_cpu_data.extended_cpuid_level >= 0x80000008) {
> +		ssbd_max_cores = 1u << MASK_EXTR(cpuid_ecx(0x80000008), 0xf000);
> +		ssbd_max_cores /= boot_cpu_data.x86_num_siblings;
> +	}
> +	if (!ssbd_max_cores)
> +		return false;
> +
> +	/* Max is two sockets for Fam17h hardware. */
> +	ssbd_core = xzalloc_array(struct ssbd_core, ssbd_max_cores * 2);

If I'm not mistaken this literal 2, ...

> +	if (!ssbd_core)
> +		return false;
> +
> +	for (i = 0; i < ssbd_max_cores * 2; i++) {

... this one, and ...

> +		spin_lock_init(&ssbd_core[i].lock);
> +		/* Record initial state, also applies to any hotplug CPU. */
> +		if (opt_ssbd)
> +			ssbd_core[i].count = boot_cpu_data.x86_num_siblings;
> +	}
> +
> +	return true;
> +}
> +
> +void amd_set_legacy_ssbd(bool enable)
> +{
> +	const struct cpuinfo_x86 *c = &current_cpu_data;
> +	struct ssbd_core *core;
> +	unsigned long flags;
> +
> +	if (c->x86 != 0x17 || c->x86_num_siblings <= 1) {
> +		BUG_ON(!set_legacy_ssbd(c, enable));
> +		return;
> +	}
> +
> +	BUG_ON(c->phys_proc_id >= 2);

.. this one are all referring to the same thing. Please use a #define to
make the connection obvious.

> @@ -677,14 +680,17 @@ int guest_wrmsr(struct vcpu *v, uint32_t msr, uint64_t val)
>          if ( !cp->extd.virt_ssbd )
>              goto gp_fault;
>  
> -        /*
> -         * Only supports SSBD bit, the rest are ignored. Only modify the SSBD
> -         * bit in case other bits are set.
> -         */
> -        if ( val & SPEC_CTRL_SSBD )
> -            msrs->spec_ctrl.raw |= SPEC_CTRL_SSBD;
> +        /* Only supports SSBD bit, the rest are ignored. */
> +        if ( cpu_has_amd_ssbd )
> +        {
> +            /* Only modify the SSBD bit in case other bits are set. */

While more a comment on the earlier patch introducing this wording, it
occurred to me only here that this is ambiguous: It can also be read as
"Only modify the SSBD bit as long as other bits are set."

> +            if ( val & SPEC_CTRL_SSBD )
> +                msrs->spec_ctrl.raw |= SPEC_CTRL_SSBD;
> +            else
> +                msrs->spec_ctrl.raw &= ~SPEC_CTRL_SSBD;
> +        }
>          else
> -            msrs->spec_ctrl.raw &= ~SPEC_CTRL_SSBD;
> +            msrs->virt_spec_ctrl.raw = val & SPEC_CTRL_SSBD;

I also think the comment applies equally to the "else" logic, so perhaps
the comment would best remain as is (and merely be re-worded in the
earlier patch)?

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 28 14:41:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 14:41:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295472.502807 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYqYq-00082B-TA; Mon, 28 Mar 2022 14:41:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295472.502807; Mon, 28 Mar 2022 14:41:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYqYq-000824-Pt; Mon, 28 Mar 2022 14:41:36 +0000
Received: by outflank-mailman (input) for mailman id 295472;
 Mon, 28 Mar 2022 14:39:16 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=XDS/=UH=xs4all.nl=mark.kettenis@srs-se1.protection.inumbo.net>)
 id 1nYqWa-0007EL-KR
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 14:39:16 +0000
Received: from sibelius.xs4all.nl (sibelius.xs4all.nl [83.163.83.176])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id d691e289-aea4-11ec-a405-831a346695d4;
 Mon, 28 Mar 2022 16:39:14 +0200 (CEST)
Received: from localhost (bloch.sibelius.xs4all.nl [local])
 by bloch.sibelius.xs4all.nl (OpenSMTPD) with ESMTPA id 7b122d64;
 Mon, 28 Mar 2022 16:39:12 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d691e289-aea4-11ec-a405-831a346695d4
Date: Mon, 28 Mar 2022 16:39:12 +0200 (CEST)
From: Mark Kettenis <mark.kettenis@xs4all.nl>
To: Demi Marie Obenour <demi@invisiblethingslab.com>
Cc: djm@mindrot.org, roger.pau@citrix.com,
	marmarek@invisiblethingslab.com,
	xen-devel@lists.xenproject.org, tech@openbsd.org
In-Reply-To: <c904abda-e6a0-256e-478a-ee0909c17e50@invisiblethingslab.com>
	(message from Demi Marie Obenour on Mon, 28 Mar 2022 09:51:22 -0400)
Subject: Re: Security support status of xnf(4) and xbf(4)
References: <Yj3qW/y20htoSvuK@itl-email>
 <37a4b6-cd56-1993-be2-b5522b9aa4d7@mindrot.org> <c904abda-e6a0-256e-478a-ee0909c17e50@invisiblethingslab.com>
MIME-version: 1.0
Content-type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Message-ID: <d3ccc20d61dc7636@bloch.sibelius.xs4all.nl>

> Date: Mon, 28 Mar 2022 09:51:22 -0400
> From: Demi Marie Obenour <demi@invisiblethingslab.com>
> 
> On 3/27/22 21:45, Damien Miller wrote:
> > On Fri, 25 Mar 2022, Demi Marie Obenour wrote:
> > 
> >> Linux’s netfront and blkfront drivers recently had a security
> >> vulnerability (XSA-396) that allowed a malicious backend to potentially
> >> compromise them.  In follow-up audits, I found that OpenBSD’s xnf(4)
> >> currently trusts the backend domain.  I reported this privately to Theo
> >> de Raadt, who indicated that OpenBSD does not consider this to be a
> >> security concern.
> >>
> >> This is obviously a valid position for the OpenBSD project to take, but
> >> it is surprising to some (such as myself) from the broader Xen
> >> ecosystem.  Standard practice in the Xen world is that bugs in frontends
> >> that allow a malicious backend to cause mischief *are* considered
> >> security bugs unless there is explicit documentation to the contrary.
> >> As such, I believe this deserves to be noted in xnf(4) and xbf(4)’s man
> >> pages.  If the OpenBSD project agrees, I am willing to write a patch,
> >> but I have no experience with mandoc so it might take a few tries.
> > 
> > Hang on, what is a "malicious backend" in this context? Is it something
> > other than the Xen Hypervisor? If not, then it seems not to be a useful
> > attack model, as the hypervisor typically has near-complete access to
> > guests' memory and CPU state.
> 
> The backend can run in any Xen VM.  It often runs in dom0, but it
> is not required to, and in Qubes OS the network backend never runs
> in dom0.  Unless it runs in dom0, it has no access to frontend memory,
> except for memory the frontend has explicitly given it access to via
> grant tables.

So this is somewhat similar to the situation on sun4v (Sun's
virtualization of the SPARC architecture).  When writing the vnet(4)
and vdsk(4) drivers for OpenBSD, I did consider the implications of
those drivers talking to a "malicious" domain.  the SPARC hypervisor
implements a concept similar to grant tables.  It is fairly obvious
that any memory you grant access to should be considered insecure.
This means that you either have to make a copy of the data or revoke
access to the shared memory through some sort of Hypervisor call that
implements a synchronization point of some sorts.  Otherwise you and
up TOCTOU issues all over the place.  But this obviously has
significant performance consequences.  For vnet(4) I decided that an
extra copy was worth doing and the only reasonable way of doing things
given how OpenBSD's mbuf layer works.  But for vdsk(4) I decided to
trust the other domain as there is no way to prevent it from feeding
you compromised data.  Full disk encryption doesn't really solve the
problem unless you have a way to securely verify the bootloader.

Personally I think it might be beneficial for us to turn xnf(4) into
what we colloquially call a "bcopy" network driver.  But folks who
actually use xen may find the performance impact of doing this
unacceptable and decide to trust the backend instead.


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 14:54:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 14:54:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295484.502822 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYqlF-0001Ga-6S; Mon, 28 Mar 2022 14:54:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295484.502822; Mon, 28 Mar 2022 14:54:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYqlF-0001GT-3K; Mon, 28 Mar 2022 14:54:25 +0000
Received: by outflank-mailman (input) for mailman id 295484;
 Mon, 28 Mar 2022 14:54:23 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=adjj=UH=gmail.com=dpsmith.dev@srs-se1.protection.inumbo.net>)
 id 1nYqlD-0001GL-Fc
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 14:54:23 +0000
Received: from mail-qk1-x731.google.com (mail-qk1-x731.google.com
 [2607:f8b0:4864:20::731])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f35e3812-aea6-11ec-a405-831a346695d4;
 Mon, 28 Mar 2022 16:54:21 +0200 (CEST)
Received: by mail-qk1-x731.google.com with SMTP id g8so11561967qke.2
 for <xen-devel@lists.xenproject.org>; Mon, 28 Mar 2022 07:54:21 -0700 (PDT)
Received: from [10.10.1.138] (static-72-81-132-2.bltmmd.fios.verizon.net.
 [72.81.132.2]) by smtp.gmail.com with ESMTPSA id
 o6-20020a05620a22c600b0067d247816eesm7793398qki.85.2022.03.28.07.54.19
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Mon, 28 Mar 2022 07:54:20 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f35e3812-aea6-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=message-id:date:mime-version:user-agent:subject:content-language:to
         :cc:references:from:in-reply-to:content-transfer-encoding;
        bh=kLNgQxOFU/J6V+DMplcwfWYxPupNA9Gh1yV98IjMbVs=;
        b=N8UPe/jxbZ9fSw4Oq2XNyxvti61swftL91xPHMiLZ6xhyYeN2AUpVirsxdP+AID+qO
         zbgk00ra9pBfGaqzy2mIMmFvrOsOTcurgE48LFL01P7y35aB4vFq+9bfVtW2WNCqp1AA
         VtsBKjrGwD5Qc8GK+VVgcrmLYXUux+1Wyzpam/nK2gRdL85iA/aNres7m1MvMCzqKag7
         wY0hoxrsHuKFh0mtt/RVyTFlbXeDIjAHVtoxcFRQ6eQ522vBaswpKrMKB+Brlo6tV073
         oo1Ls4ZfW8DOWWz5N+212ge9U1j+/Fkc9GNfGFyZ2iFq9LtbSPNKoewgRTWTAxJrar4e
         0PKQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:message-id:date:mime-version:user-agent:subject
         :content-language:to:cc:references:from:in-reply-to
         :content-transfer-encoding;
        bh=kLNgQxOFU/J6V+DMplcwfWYxPupNA9Gh1yV98IjMbVs=;
        b=qxiMj80ZoTeK3FUBorX/leC0OyxrBh5pPbbWsTWYlAxXmXNsJVp3BpSSK8wt8r+VVF
         c8U/hgmtcvQs8jVofHCdtRRwxjTve07mfCaBl9B5PTJfIkZS4p5prcLEOlozCsCDW6vb
         tUW9TXKxseH1GPkyYCcyaUhO+/ucjzlSsH8AdLxjgXrUmlOJBXOX4XA96tq2x8gs3HMk
         flFErGtdjGUFwiTvQ5Ey79LzO/j7WJW/GYhBHJp/jU2cL5Ran84et96gG2xlYITz1K42
         0IGStnFGEP6u9UVEmf9E7IZDqfj4LgqIvuAo0YC6QG2f6PXzrBNbH/e1tJHVS4poe6c2
         yI8g==
X-Gm-Message-State: AOAM533LB2u0F6X63jK2+QUXjWItUYCm2cEQOk7nCpYPCB369fa6mzmp
	JKsw23utC3DTapt3AA75Yl82I+GKwqA=
X-Google-Smtp-Source: ABdhPJwURYNt+iZv8Oa8zmfS5ji51idj/trtNp0qI6DzaCu+ArIsF7lcV2YEkt3ftjVO/wfM18hNXA==
X-Received: by 2002:a37:68d8:0:b0:67e:1558:a708 with SMTP id d207-20020a3768d8000000b0067e1558a708mr16118919qkc.25.1648479260577;
        Mon, 28 Mar 2022 07:54:20 -0700 (PDT)
Message-ID: <7dbe9e1d-3768-b607-af26-4f4a817143d6@gmail.com>
Date: Mon, 28 Mar 2022 10:54:04 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v3 2/5] xen: make evtchn_alloc_unbound public
Content-Language: en-US
To: Jason Andryuk <jandryuk@gmail.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Jan Beulich <jbeulich@suse.com>, xen-devel <xen-devel@lists.xenproject.org>,
 Juergen Gross <jgross@suse.com>, Bertrand.Marquis@arm.com,
 Julien Grall <julien@xen.org>, Volodymyr_Babchuk@epam.com,
 Luca Miccio <lucmiccio@gmail.com>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>
References: <alpine.DEB.2.22.394.2201281330520.27308@ubuntu-linux-20-04-desktop>
 <20220128213307.2822078-2-sstabellini@kernel.org>
 <2f05e63a-96c3-e78f-f7e4-36fd17fcd58c@gmail.com>
 <alpine.DEB.2.22.394.2203221711110.2910984@ubuntu-linux-20-04-desktop>
 <c57dc9a9-e2ca-74c6-4fde-e2a6f1400de5@suse.com>
 <alpine.DEB.2.22.394.2203241522510.2910984@ubuntu-linux-20-04-desktop>
 <ccb85826-feb8-7c26-64e3-0a459bdaf8b6@gmail.com>
 <CAKf6xpsB9Tr+WtDWPRYmkjB+8QmA0-oWrAcYh5D2G6WVWDZo1Q@mail.gmail.com>
From: "Daniel P. Smith" <dpsmith.dev@gmail.com>
In-Reply-To: <CAKf6xpsB9Tr+WtDWPRYmkjB+8QmA0-oWrAcYh5D2G6WVWDZo1Q@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

On 3/25/22 12:52, Jason Andryuk wrote:
> On Fri, Mar 25, 2022 at 11:46 AM Daniel P. Smith <dpsmith.dev@gmail.com> wrote:
>>
>> On 3/24/22 20:30, Stefano Stabellini wrote:
>>> On Wed, 23 Mar 2022, Jan Beulich wrote:
>>>> On 23.03.2022 01:22, Stefano Stabellini wrote:
>>>>> The existing XSM check in evtchn_alloc_unbound cannot work and should
>>>>> not work: it is based on the current domain having enough privileges to
>>>>> create the event channel. In this case, we have no current domain at
>>>>> all. The current domain is Xen itself.
>>>>
>>>> And DOM_XEN cannot be given the appropriate permission, perhaps
>>>> explicitly when using a real policy and by default in dummy and SILO
>>>> modes?
>>>
>>> The issue is that the check is based on "current", not one of the
>>> domains passed as an argument to evtchn_alloc_unbound. Otherwise,
>>> passing DOMID_XEN would be straightforward.
>>>
>>> We would need to use a hack (like Daniel wrote in the other email) to
>>> set the idle_domain temporarily as a privileged domain only for the sake
>>> of passing an irrelevant (irrelevant as in "not relevant to this case")
>>> XSM check. That cannot be an improvement. Also, setting current to a
>>> "fake" domain is not great either.
>>
>> My suggestion was not to intended to be simply a hack but looking at the
>> larger issue instead of simply doing a targeted fix for this one
>> instnace. While I cannot give an example right off hand, the reality is,
>> at least for hyperlaunch, that we cannot say for certain there will not
>> be further resource allocations that is protected by the security
>> framework and will require preliminary handling by the construction
>> logic in the hypervisor. The low-complexity approach is to address each
>> one in a case-by-case fashion using direct calls that go around the
>> security framework. A more security conscience, and higher complexity,
>> approach would be to consider a least-privilege approach and look at
>> introducing the ability to do controlled switching of contexts, i.e.
>> moving `current` from DOMID_IDLE to DOMID_CONSTRUCT, to one that is
>> granted only the necessary privileges to do the resource allocations in
>> which it is limited.
>>
>> This is also not the first time this issue has come up, I don't recall
>> the exact thread but several months ago someone ran into the issue they
>> need to make a call to a resource function and was blocked by XSM
>> because DOMID_IDLE has no privileges. The reality is that the idea of
>> monolithic high-privileged entities is being dropped in favor of
>> least-privilege, and where possible hardware enforced, constraint. This
>> can be seen with Intel de-privileging SMM and running SMI handlers in
>> constrained ring 3. Arm is gaining capability pointers, CHERI, that will
>> enable the possibility for constrained, least-privileged kernel
>> subsystems. Would it not be advantageous for Xen to start moving in such
>> a direction that would enable it to provide a new level of safety and
>> security for consumers of Xen?
>>
>> Coming back to the short-term, I would advocate for introducing the
>> concept and abstraction of constrained context switching through a set
>> of function calls, which would likely be under XSM to allow policy
>> enforcement. Likely the introductory implementation would just mask the
>> fact that it is just setting `is_privileged` for DOMID_IDLE. Future
>> evolution of the capability could see the introduction of new
>> "contexts", whether they are represented by a domain could be determined
>> then, and the ability to do controlled switching based on policy.
> 
> For the specific case of evtchn_alloc_unbound, Flask's
> xsm_evtchn_unbound has a side effect of labeling the event channel.
> So skipping the hook will have unintended consequences for Flask.
> 
> xsm_evtchn_unbound could be split in two to have an access piece and a
> labeling piece.  The access piece is run at hypercall entry, and the
> labeling is still done in evtchn_alloc_unbound.  For Flask, labeling
> depends on the two domain endpoints, but not current.
> 
> More generally, it seems to me there are too many xsm checks in the
> middle of functions/operations.  They are fine for a normal entry via
> hypercall, but they interfere with Xen's internal operations.  Xen
> shouldn't be restricted in its own operations.  The live update people
> hit it with domain creation, and I just posted a patch for
> unmap_domain_pirq.
> 
> It would be more obvious for auditing if each hypercall entrypoint
> applied xsm checks.  Make the allow/deny decision as early as
> possible.  Then a worker function would be easily callable for the
> Xen-internal case.  The flip side of that is the xsm hook may need
> sub-op specific data to make its decision, so it fits to put it in the
> sub-op function.  It seems to me the location of hooks was determined
> by where the data they need is already available.  Re-arranging hooks
> may require some duplication.

While it can be inconvenient in some cases, one of the purposes of flask
is to provide fine(er) grained access control over resources and for Xen
the path to a resource is often through a multiplexed interface. As such
I would be very cautious in considering the addition of distance between
the time of check and the time of access to a resource.

It has been some time since it has occurred but I am aware that there
was an audit conducted to ensure all necessary resources were covered
and the placement of decision points were in the correct locations. With
that said, the code has evolved and it may be time for another audit
(though it would take some cycles to do such an audit).

> The xsm controls should clearly apply to the DomUs and other entities
> managed by Xen.  xsm restricting Xen itself seems wrong.  Having
> internal operations get denied by xsm may unintentionally subvert Xen
> itself.
> 
> Yes, moving checks outward makes for an un-restricted middle.  But the
> security server running in the same address space isn't going to help
> against code exec inside the hypervisor.
> 
> I think I view it like this:  Why is a xen internal operation subject
> to a security check?  When would one ever want to deny a xen internal
> operation?

In the past this was the standard of thinking but the reality of the
last few years has demonstrated this approach can no longer be relied
upon. If this approach was safe, then Intel would have had no reason to
put the work into providing the necessary mechanisms to de-privilege SMI
handlers, just to pick a recent example. Hardware changes are coming,
and in the case of OpenPOWER and Arm it is already here, that will
enable kernels and hypervisors to de-privilege sections of their
processing logic depending on the risk, for example ensuring code
processing input from a hypercall cannot reach memory used by the
security server.

My point here is that instead of cementing a historical approach into
the code base, that perhaps it would be worth considering using a more
flexible approach that provides the necessary modularity to enable the
introduction of this kind of capability, even if today it is merely a
facade, without having to rework the interfaces to remove all the
secondary direct paths.

V/r,
dps


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 14:56:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 14:56:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295487.502833 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYqnB-0001t5-Hn; Mon, 28 Mar 2022 14:56:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295487.502833; Mon, 28 Mar 2022 14:56:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYqnB-0001sy-Eo; Mon, 28 Mar 2022 14:56:25 +0000
Received: by outflank-mailman (input) for mailman id 295487;
 Mon, 28 Mar 2022 14:56:23 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nYqn9-0001sq-O5
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 14:56:23 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nYqn8-00076a-Mk; Mon, 28 Mar 2022 14:56:22 +0000
Received: from [54.239.6.185] (helo=[192.168.7.207])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nYqn8-0002H9-El; Mon, 28 Mar 2022 14:56:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=AEiVRGJ65+jNKkDH5F2a1+8BxSzrW7vBunmra+Lhx04=; b=e8osn9/cFEg3XdlFZI4FT+yaZv
	+g4dcKmXWsqkBGtzQ4R+DiSFlPR638TlKYcZ5yyT9QExf22CqnzHBrshTabUcbFKQ0OSbXhNIMeyM
	/HfWcva04TV+S7S71bmSLTz5z8OpHn6MWdzRapzswNpZ5eABaG1yKkfiDJPOKrjz5UPs=;
Message-ID: <13f86610-6766-4344-2b10-4369fb7a2698@xen.org>
Date: Mon, 28 Mar 2022 15:56:19 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v3 2/5] xen: make evtchn_alloc_unbound public
To: Stefano Stabellini <sstabellini@kernel.org>
Cc: Jan Beulich <jbeulich@suse.com>, xen-devel@lists.xenproject.org,
 jgross@suse.com, Bertrand.Marquis@arm.com, Volodymyr_Babchuk@epam.com,
 Luca Miccio <lucmiccio@gmail.com>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 "Daniel P. Smith" <dpsmith.dev@gmail.com>
References: <alpine.DEB.2.22.394.2201281330520.27308@ubuntu-linux-20-04-desktop>
 <20220128213307.2822078-2-sstabellini@kernel.org>
 <2f05e63a-96c3-e78f-f7e4-36fd17fcd58c@gmail.com>
 <alpine.DEB.2.22.394.2203221711110.2910984@ubuntu-linux-20-04-desktop>
 <c57dc9a9-e2ca-74c6-4fde-e2a6f1400de5@suse.com>
 <alpine.DEB.2.22.394.2203241522510.2910984@ubuntu-linux-20-04-desktop>
 <da700983-759b-2de6-9c36-0d09c6b06c0d@xen.org>
 <alpine.DEB.2.22.394.2203251313350.2910984@ubuntu-linux-20-04-desktop>
From: Julien Grall <julien@xen.org>
In-Reply-To: <alpine.DEB.2.22.394.2203251313350.2910984@ubuntu-linux-20-04-desktop>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Stefano,

On 25/03/2022 21:05, Stefano Stabellini wrote:
> On Fri, 25 Mar 2022, Julien Grall wrote: > As a contributor, sadly I won't be able to spend a lot of time on this
> in the following months. If a significant rework is required, I don't
> think I'll be able to do it, at least not for this Xen release (and it
> would be nice to have dom0less PV drivers in the coming release.) If
> Daniel is willing, I could add his "idle_domain is_priv" patch to this
> series.  Not as clean as a proper constructor domain but it would work
> and it would be simple. It could be evolved into a nicer constructor
> domain later.
> 
> This is not my preference but I could do that if Julien and Jan prefer
> this approach and if Daniel is happy to share his patch.

This is still my preference because we are avoiding to push the problem 
to the unlucky person that will need to introduce another (or multiple) 
'skip_xsm'.

>> AFAIU, your proposal is to duplicate code. This brings other risks such as
>> duplicated bug and more code to maintain.
> 
> Got it. I'll make one last attempt at a proposal that doesn't involve
> the fake constructor domain. The goal is to avoid code duplication while
> providing a safe way forward to make progress with only a small amount
> of changes. What if we:
> 
> - rename evtchn_alloc_unbound to _evtchn_alloc_unbound (still static)
> - add a skip_xsm parameter to _evtchn_alloc_unbound
> - introduce a wrapper evtchn_alloc_unbound that always set skip_xsm to
>    false (same interface as today's evtchn_alloc_unbound)
> - introduce an __init early_evtchn_alloc_unbound public function that
>    sets skip_xsm to true
> 
> This way:
> - we have a single implementation in _evtchn_alloc_unbound (no code
>    duplication)
> - the only function exposed that skips the XSM check is __init
> - evtchn_alloc_unbound continue to have the XSM check same as today
> 
> 
> E.g.:
> static int _evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc, bool skip_xsm)
> {
>      ...
> }
> 
> static int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
> {
>      return _evtchn_alloc_unbound(alloc, false);
> }
> 
> int __init early_evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
> {
>      return _evtchn_alloc_unbound(alloc, true);
> }
> 
> 
> Would this be good enough for now?

I would be OK with that. Note that, I think we need to protect the use 
of skip_xsm with evaluate_nospec().

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 15:12:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 15:12:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295490.502843 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYr2L-0004LP-S7; Mon, 28 Mar 2022 15:12:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295490.502843; Mon, 28 Mar 2022 15:12:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYr2L-0004LI-P5; Mon, 28 Mar 2022 15:12:05 +0000
Received: by outflank-mailman (input) for mailman id 295490;
 Mon, 28 Mar 2022 15:12:04 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=adjj=UH=gmail.com=dpsmith.dev@srs-se1.protection.inumbo.net>)
 id 1nYr2K-0004LC-JI
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 15:12:04 +0000
Received: from mail-qt1-x82a.google.com (mail-qt1-x82a.google.com
 [2607:f8b0:4864:20::82a])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 6c01b9a7-aea9-11ec-8fbc-03012f2f19d4;
 Mon, 28 Mar 2022 17:12:03 +0200 (CEST)
Received: by mail-qt1-x82a.google.com with SMTP id a11so12566427qtb.12
 for <xen-devel@lists.xenproject.org>; Mon, 28 Mar 2022 08:12:03 -0700 (PDT)
Received: from [10.10.1.138] (static-72-81-132-2.bltmmd.fios.verizon.net.
 [72.81.132.2]) by smtp.gmail.com with ESMTPSA id
 s13-20020a05620a0bcd00b0067afe7dd3ffsm8453927qki.49.2022.03.28.08.12.00
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Mon, 28 Mar 2022 08:12:01 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6c01b9a7-aea9-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=message-id:date:mime-version:user-agent:subject:content-language:to
         :cc:references:from:in-reply-to:content-transfer-encoding;
        bh=ajr0dYea+pYNR6w6Xu7EcT1vcVyRpE7uc3a2Zctr5bo=;
        b=oviQKcUAx7GAzf0fPE+lvDfxya4Hz/dQLNEM2BXUFNk4fhB4qBfcBpE0AuvICvQ8LK
         hQcgEsqwrEPngiCu8IPY6CVVCLpP7hL33EUSzVHHzhQp9ZM8k16b7nsKs0WrYR6KUguI
         pj/1hK2Z61GXfyY780Sz3QjlC2JJJ3L8he/ogubtjKACNJx/0Mnm+iOJ6vCjG3B6yhjA
         a28Cma0g95P6Kh1tLifjgMfJkABlPeAX/UMJI0Iyr5gYkZFpZt+w7uKnKh9FO9dbi0TK
         u3CDQ6WaT5ecafiJ1+mAnULBIHF25E4YG4kvzuRXRI6XktJbmZUd/2C8387SFRqabYbb
         HgJg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:message-id:date:mime-version:user-agent:subject
         :content-language:to:cc:references:from:in-reply-to
         :content-transfer-encoding;
        bh=ajr0dYea+pYNR6w6Xu7EcT1vcVyRpE7uc3a2Zctr5bo=;
        b=RDx7tphuaOEL6vVqmkLbdcUK5Q0BB14JSll+F4jb3pSBoS2fBqpHsvQEtIHOekB14+
         HjE3yhUtcYXryoQgidrdUks73w2Ugr7Irv/kBT6Yswlgu6vAZ8ndtcPb5+PImnTxifT2
         xwe+AYWGH7rR5TWcFNcvUZcUP4IhtrlIpXX+/2qbLBlWbWt6DYcNyHfAfgi3+LcBaiMP
         Ali1CzU/eqIAp/uYkMJcB4at3V6u2cPj9dMZ6RC34DcKyuBjF7P87En+SzKtPJRHXzM8
         lXP3OfHKk092PVmvHIW+EVPj6IEhNl1E9kZ2620WTzfnqmUcmZ1FT2YbZ3I5j9qW3M0y
         xxfw==
X-Gm-Message-State: AOAM532x/DZxRB404xs6Kl5sD7oQqt6Ohv09/LEmvHnJwMc9qLoKLyDC
	jDppYZoboeked/JeRax364s=
X-Google-Smtp-Source: ABdhPJz/dvxy+KeAMn9l0PbQy0Qg1DDbmcXHyfr3M0fqf40+wb8T/JPkJWzAMmgreLFisNcwL3A9Ug==
X-Received: by 2002:a05:622a:513:b0:2eb:871f:cd66 with SMTP id l19-20020a05622a051300b002eb871fcd66mr244462qtx.434.1648480322009;
        Mon, 28 Mar 2022 08:12:02 -0700 (PDT)
Message-ID: <db05165f-1998-36bb-7b4d-a6a1e89d1bae@gmail.com>
Date: Mon, 28 Mar 2022 11:11:46 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v3 2/5] xen: make evtchn_alloc_unbound public
Content-Language: en-US
To: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>
Cc: Jan Beulich <jbeulich@suse.com>, xen-devel@lists.xenproject.org,
 jgross@suse.com, Bertrand.Marquis@arm.com, Volodymyr_Babchuk@epam.com,
 Luca Miccio <lucmiccio@gmail.com>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>
References: <alpine.DEB.2.22.394.2201281330520.27308@ubuntu-linux-20-04-desktop>
 <20220128213307.2822078-2-sstabellini@kernel.org>
 <2f05e63a-96c3-e78f-f7e4-36fd17fcd58c@gmail.com>
 <alpine.DEB.2.22.394.2203221711110.2910984@ubuntu-linux-20-04-desktop>
 <c57dc9a9-e2ca-74c6-4fde-e2a6f1400de5@suse.com>
 <alpine.DEB.2.22.394.2203241522510.2910984@ubuntu-linux-20-04-desktop>
 <da700983-759b-2de6-9c36-0d09c6b06c0d@xen.org>
 <alpine.DEB.2.22.394.2203251313350.2910984@ubuntu-linux-20-04-desktop>
From: "Daniel P. Smith" <dpsmith.dev@gmail.com>
In-Reply-To: <alpine.DEB.2.22.394.2203251313350.2910984@ubuntu-linux-20-04-desktop>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

On 3/25/22 17:05, Stefano Stabellini wrote:
> On Fri, 25 Mar 2022, Julien Grall wrote:
>> So to me, the idea of switching to a "fake" domain or bypassing the check is
>> more appealing. I have a preference for the "fake" domain here.
> 
> As a maintainer, I am not opposed to the "fake"/"contructor" domain
> concept.  It all depends on how many instances of this issue we are
> going to have.  This is the only one on xen-devel so far. I don't think
> it is worth adding a constructor domain for one instance only.  But I
> agree with you and Daniel that if we end up with several instances, then
> the constructor domain approach is probably the best option overall.

The constructor domain still needs more discussion and would likely be
part of a larger approach that will require buy-in from several
maintainers and should be looking to solve a more general problem
internal access control of which domain construction within the
hypervisor is just one case. For this I would be glad to start a working
group, for which the start of can add to the next community call agenda.

> As a contributor, sadly I won't be able to spend a lot of time on this
> in the following months. If a significant rework is required, I don't
> think I'll be able to do it, at least not for this Xen release (and it
> would be nice to have dom0less PV drivers in the coming release.) If
> Daniel is willing, I could add his "idle_domain is_priv" patch to this
> series.  Not as clean as a proper constructor domain but it would work
> and it would be simple. It could be evolved into a nicer constructor
> domain later.
> 
> This is not my preference but I could do that if Julien and Jan prefer
> this approach and if Daniel is happy to share his patch.

I can look to spin out a general version of what I am doing, likely
exposed as an XSM call so it can be handled appropriately across policies.

>> AFAIU, your proposal is to duplicate code. This brings other risks such as
>> duplicated bug and more code to maintain.
> 
> Got it. I'll make one last attempt at a proposal that doesn't involve
> the fake constructor domain. The goal is to avoid code duplication while
> providing a safe way forward to make progress with only a small amount
> of changes. What if we:
> 
> - rename evtchn_alloc_unbound to _evtchn_alloc_unbound (still static)
> - add a skip_xsm parameter to _evtchn_alloc_unbound
> - introduce a wrapper evtchn_alloc_unbound that always set skip_xsm to
>   false (same interface as today's evtchn_alloc_unbound)
> - introduce an __init early_evtchn_alloc_unbound public function that
>   sets skip_xsm to true
> 
> This way:
> - we have a single implementation in _evtchn_alloc_unbound (no code
>   duplication)
> - the only function exposed that skips the XSM check is __init
> - evtchn_alloc_unbound continue to have the XSM check same as today
> 
> 
> E.g.:
> static int _evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc, bool skip_xsm)
> {
>     ...
> }
> 
> static int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
> {
>     return _evtchn_alloc_unbound(alloc, false);    
> }
> 
> int __init early_evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
> {
>     return _evtchn_alloc_unbound(alloc, true);
> }
> 
> 
> Would this be good enough for now?

I guest the question is if it is okay for this to exist until the new
XSM calls are found to be acceptable and then this is reverted/changed
to the XSM calls?

v/r
dps


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 15:20:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 15:20:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295493.502855 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYrAE-0005pJ-NE; Mon, 28 Mar 2022 15:20:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295493.502855; Mon, 28 Mar 2022 15:20:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYrAE-0005pC-JN; Mon, 28 Mar 2022 15:20:14 +0000
Received: by outflank-mailman (input) for mailman id 295493;
 Mon, 28 Mar 2022 15:20:13 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Ynyj=UH=citrix.com=prvs=079c560b7=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nYrAD-0005p1-04
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 15:20:13 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 8daba7f6-aeaa-11ec-8fbc-03012f2f19d4;
 Mon, 28 Mar 2022 17:20:10 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8daba7f6-aeaa-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648480810;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=t0QYkUvEqX9lFMQEFNBKVXQTF6KzN7PxesmJ3wwwQzY=;
  b=WueMmwLkobpbYcrn4u476ARAoPhRLkJOETskmUaalESqX9TyTEjL0pSs
   3/Hc+znZa5HEEcR3wB9SueVju9WgnrrDPVJWZQDNOkNX/iq2aUZidtAln
   YFPjyOCJjx3SasXdoK+hdr4NhhrXW4JS0mzVXI/IL7wQSX1CZnOJpWAEh
   8=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67253827
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:4jA7568SVSvFk5GO6rPTDrUDlH6TJUtcMsCJ2f8bNWPcYEJGY0x3n
 WUaWT+COvqOZ2rwKdkjOtzl/E8D65GAytFjGQpvpCE8E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oLpW1rlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnZa9eB8RGerpobwEWEBhOARYMZdo1ZaSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFJkYtXx6iynQEN4tQIzZQrWM7thdtNs1rp4RR6uFN
 5BGAdZpRC7mfxcQYQxKMshgu+eqt3LPahcbkU3A8MLb5ECMlVcsgdABKuH9atGMAMlYgEucj
 mbH5HjiRAEXMsSFzjiI+W7qgfXA9QvkXKoCGbv+8eRl6HWRzGEODBwdVXOgvOK0zEW5Xrpix
 1c8o3R06/JorQryE4e7D0bQTGO4UgA0UddhC9UdryS0krPfuj+yI04IdBBsQYlz3CMpfgAC2
 liMltLvIDVgtryJVH6QnoupQSOO1Ts9djFbO3JdJecRy5y6+dxo0EqTJjp2OPTt5uAZDw0c1
 NxjQMIWo7wIxfAG2Kyglbwsq2L9/8OZJuLZC+i+Y45E0u+bTNP+D2BLwQKChRqlEGp/ZgPb1
 JTjs5LChN3i9bnXyESwrBwlRdlFHcqtPjzGmkJIFJI87Tmr8HPLVdkOvGEifBgzaJhfJ2+Bj
 KrvVeV5vsU70JyCN/IfXm5MI55ykfiI+SrNCJg4keaikrAuLVTarUmClGab3nz3kVhErE3ME
 czzTCpYNl5DUf4P5GPvH481iOZ3rghjlTK7bc2qlHyPjOvBDEN5vJ9YaTNimMhit/jayOgUm
 v4CX/a3J+J3DbSmO3KNoNdJRb3IRFBiba3LRwVsXrfrCiJtGX07Cu+XxrUkeod/mL9SmPuO9
 Xa4MnK0AnKl7ZEbAW1mskxeVY4=
IronPort-HdrOrdr: A9a23:to2mma4cpEPnnhgm2APXwPvXdLJyesId70hD6qkmc20tTiX4rb
 HKoBx4vSWftN91YhwdcL+7VJVoLUmyyXcX2/hyAV7BZmnbUTCTXedfBOLZqlWKJ8SZzIBgPM
 xbAstD4bPLbGSTIqzBkXGF+3pL+qjizEgI792uqEtQcQ==
X-IronPort-AV: E=Sophos;i="5.90,217,1643691600"; 
   d="scan'208";a="67253827"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=e0IV10VqGBfPaY79kloG3wvKLLLqwBBpyCsNTTMMKZ8cnuHsZo/Ekn71A9+/5Ui0V452yDmvGwJaJaxHrdJBbt27Nv2LfYQgxfhzEKTxl7dCF2lcWepmVxnu8Wgdg3ynlCZ3Rjg0mDMgle8xkTwRjuyVz0oWBVRMbieaUtC3fm7d8GsbRBXKsKsyWtiMhRRaRlOPyHIIUD7Bxud8QACpoWxMVyEAQR/kCnYZZwDrRZMm0BmGEVB8qIq6hQ1qnzBCIy9K2rpC7AKWE655Ycnai3kaummHF55vi0+3V4LA4Wl7MpuVpH1S0QpqN/hPRjuvjQt2vs670nAKUm1OEVdK6g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=lM8Q8VdPi7mV2bL9P5TFzN1kXs7rH6U8+nD1vY3+orc=;
 b=Vp53GmiW2ooqJpDU16w+FgWnJhRsUsUhda0DD3qlCG+OQShFu7hviH8ls5vmi9N6Fj2CPu/9VZYntFLAh58ZNbyPXHozegBuHi087Vu8dNvej0k/zBvjtgdD7EFPm2jDosPY7NuvfFtvibxK7Ka4zMT3xWPlmZilvvTileeA1oWJQ18XZCfQAjKsV5a4LTP25GU9Uwq3OPO4rul7m10aqKZdJv3upOVmIfvHD6B9XskDCkmeX6SqEhQ/5y/No20Vxj94hBh9NdRCp10XK3R0rri8M6mwOXrwBh9kYv1OGGA/McFW0C4//ktsC+GXaqfbgPXCmjPZicD7K8BlDnyMtA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=lM8Q8VdPi7mV2bL9P5TFzN1kXs7rH6U8+nD1vY3+orc=;
 b=Z40Zhxsduknkq6I/K8jagsQQNulBgLPpBZnwROjo+oXWjZQdAJKidXrycqx3P0YErKYp6U37cSrriSVlXu3wp20jAwab99hgC6dfhyL9nX7x0L62lsJ4gHXCQG1I0VMR0qJZiSY9zwvTboFXtJqgnn+iB9QREMRCyuuLvpZlU28=
Date: Mon, 28 Mar 2022 17:19:58 +0200
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v2 2/3] amd/msr: allow passthrough of VIRT_SPEC_CTRL for
 HVM guests
Message-ID: <YkHSHj9nlE50F5NB@Air-de-Roger>
References: <20220315141807.22770-1-roger.pau@citrix.com>
 <20220315141807.22770-3-roger.pau@citrix.com>
 <033ec463-f20a-a6d0-d877-51e4f476a316@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <033ec463-f20a-a6d0-d877-51e4f476a316@suse.com>
X-ClientProxiedBy: LO2P265CA0322.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:a4::22) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 60f36b1f-f4e1-488c-120e-08da10ce6f05
X-MS-TrafficTypeDiagnostic: SN6PR03MB4029:EE_
X-Microsoft-Antispam-PRVS: <SN6PR03MB4029DBCD01B124112EACD7868F1D9@SN6PR03MB4029.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(66556008)(4326008)(66946007)(8676002)(6666004)(6486002)(66476007)(5660300002)(8936002)(85182001)(83380400001)(38100700002)(2906002)(86362001)(54906003)(26005)(53546011)(508600001)(6506007)(82960400001)(33716001)(6916009)(6512007)(186003)(316002)(9686003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?Y1hvMWhPZnd1WUE2QjcxelUrNStSUHB1ZWtHUmZXRDVLdnkxeXJYc0VFdGps?=
 =?utf-8?B?WWRheUJZMU5YWWtFSVo5bE83akpSbWdIdm9TQmRPMzNLaDFCZCtJbnhwOWpl?=
 =?utf-8?B?TExQVWxwUEx1VnlmOHB2V3JxZWpoeHViV212TWFhR25Bc3pWTGNNdE9nSmxK?=
 =?utf-8?B?UGNzUkVNVnVubFp4UVdkeWt2LzVlTDlUTEc4L2pUMUFRcm00VG91VmJscldT?=
 =?utf-8?B?N3BqTTZzUnJaaitjaWdnaUpRNllZVjdvSFpJandMYzZTMVJtWEprRk1DMy8w?=
 =?utf-8?B?a1VITFFUVkpmbkFEYmYxNkEvd0NrNTlybkZXT01MTW1pb1YwcEtrQ21sbTFP?=
 =?utf-8?B?Ulo1cVlCNkk3YlFGdkJXdnlBSkdnOEtYRUg5L1pvRXVjRVYxWU5QN1N4UmxZ?=
 =?utf-8?B?U1hPMlA5WkdpTWkwY29FOHFQOTRxVVhqVUlWQ2VteUhvRlFVdkE1QWNhaE1w?=
 =?utf-8?B?UjhsbGVYRnZhOEpxclVMckFCMnMwQTlzL2hubFdLT1VSM2pHMDIrSmp4TGRU?=
 =?utf-8?B?NkJzNnZHRmwzckVOU3Zsd3UxbFloUkxqZjhvRVM4ZlJxVTRGeHBEWEJxTVow?=
 =?utf-8?B?c1h1S2gzTnlxaStLRThVL2JLaURESURjMWhiZU45alkrSWdUMUJ4MWhSUlV6?=
 =?utf-8?B?RWJNODZPSXkyNklxNy8wZGZpTHB2SkI5YVF4UC90dWZwLzdmZnFJMU5FWEU1?=
 =?utf-8?B?RHF5Yk84cVh0dFp5L0ozUlRwSERMTmwxcFVHaCtVemMwaGY2U3RTTkhFZzZ6?=
 =?utf-8?B?ZDZFdFN6R2ZDYVZDNzkyZ2hESmcxaVMwV1VsZG1BQzNHdjFrejFPVFNNcG9o?=
 =?utf-8?B?akQzWE5zQ2FwZG1YT1hweXdKc0syRjEwYnV6cmNOakJYZnZYa3ZuTkVqYng0?=
 =?utf-8?B?RnozbzcvWmxla0tkRnNmUVVLSkp6VmdTMWlITjN3L1VIY2owWDRLWWIxNkE1?=
 =?utf-8?B?R1ltKzZvbXlhaWNlT0xnRUgwTTRxb1BJb0RFaDkxY0ViMkRNTENZNCsvRkJw?=
 =?utf-8?B?OHhJWDFGbVFnaXNwWWJiYk9uVmdDeTdoblZHOXc1cWdOb3JXZVAyZVJLbzRk?=
 =?utf-8?B?QjdwSVZFUUZLZDRCR0dBRXROQ1lGSHdkT2Y4TzJkcXg1eDNxRXVxS1QrOFZ6?=
 =?utf-8?B?OE02b29rTFh2TDZRTFNZN0JQMm1NMEN3RnZTQnJacllwY0ttbTY4SDN3aU5a?=
 =?utf-8?B?SmRYckh6cWFLMHo0dFJ5akt2cCtTYVQ4RGpRQWJwZDNSS2dyakcxWllmczZN?=
 =?utf-8?B?VWZKUi81aElxV3JudlJSZlhmSG5WN3M1Y3hLb1JkWmtnWUxoTHN3UXcvaDZz?=
 =?utf-8?B?MXI4UkFOMHJoUFFVK1FrRHhxaDFRaE4xbTVZVG1wd3RNbWJUcE9uUVptUkQ0?=
 =?utf-8?B?bmY2UUo3WXYrcmhDd0psZWtMdktHbm01cGMxR1ErdDcxRGpOWm1sN24wOUwx?=
 =?utf-8?B?QW4vK2g2Mnkvc1VLNGpsL1NhaTgrVUluR1NCQkREa2dyaE1TY3YvSmhYYmpR?=
 =?utf-8?B?U0NhUDFjUFZpL2dVZGNiMTlPUzM2cFNYZ0I4NGgxTU13ZGhTRE00a0dqOUhJ?=
 =?utf-8?B?akcweTAzK0lzODRibTF1bG1ZaXVpSUljd21VRlJnK2kxLzU5VlZnWGo1M2ZS?=
 =?utf-8?B?alRKV0xQMWhoK0RwemV4c2tMQnlkeDhLT2V2UC9XMEd5bkhlMlozZUR5MW9t?=
 =?utf-8?B?ZUdKNXV0NkhGM24xMk8reE1TNnVuS0k2cXFrK3h0S1lzN1ZHNGxvRzZhcHFX?=
 =?utf-8?B?K3J3eFFZYXJXTVNEUmU5TFZYenFFQXNMbjh6dno3aHl3QzAwOHN5Njl5aFpQ?=
 =?utf-8?B?UUhJRFNhQjIyUlFCYmhTaU04cmxiNGY2bU5WM1BhRHV2TmxMU000R0N2UUFl?=
 =?utf-8?B?WEJqSDYwZEIxUjIwQ0ZPQmFMNHBPZGZ5emNHaFBiN2k5RElSUXA2OTBNWFZj?=
 =?utf-8?B?NE90NXlEcXJjODdjVVEyZUVBMW1mY3FJc1h0UW5nQ1RnMTdrSHZPSEp4b0Jy?=
 =?utf-8?B?ZHVybnNCck01dlZzWlloaXZrV0diWUptZ0VOL21XMmNxWTYxLzlmSVFtZktW?=
 =?utf-8?B?TnJiREsrQXNnVWxzN1Q2bzhRTTNNekZKWG5LTzQyQkljYjRZejE1V2lRaFY3?=
 =?utf-8?B?YXI1TUVtUDFGSHk1SFNrZXlKb1Vkc29RWnJyWjZXeVdwUTRIZGUwcm1OMHY4?=
 =?utf-8?B?QkFPVnlsQUFUT29MYTFXYzR2T1RBaWNUQjNvR3JsdnplRWdDVXlEenhlVC9u?=
 =?utf-8?B?SjcvL2x1ZmpBSlN0TGptQkxORFEzM0xTbUFVS1lHUmEwN0ZDRU0zY0NSaDhj?=
 =?utf-8?B?TXRGMis0NC9aNUVLM2JuZE1GdEdaY2FnT0YzU2JEODNiMUdFODVvK2ZHRGg2?=
 =?utf-8?Q?PkEwhjNkf8XVS/gA=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 60f36b1f-f4e1-488c-120e-08da10ce6f05
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Mar 2022 15:20:04.1550
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Io8ipKYNZp5ugt72HPNfapKFLKF4Vj3YLprkX5Siu/NG2avK4sU8tlZekOsiEQwankn1cu8aV24xw/KWW63t0w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR03MB4029
X-OriginatorOrg: citrix.com

On Mon, Mar 28, 2022 at 04:02:40PM +0200, Jan Beulich wrote:
> On 15.03.2022 15:18, Roger Pau Monne wrote:
> > Allow HVM guests untrapped access to MSR_VIRT_SPEC_CTRL if the
> > hardware has support for it. This requires adding logic in the
> > vm{entry,exit} paths for SVM in order to context switch between the
> > hypervisor value and the guest one. The added handlers for context
> > switch will also be used for the legacy SSBD support.
> > 
> > Introduce a new synthetic feature leaf (X86_FEATURE_VIRT_SC_MSR_HVM)
> > to signal whether VIRT_SPEC_CTRL needs to be handled on guest
> > vm{entry,exit}.
> > 
> > Note the change in the handling of VIRT_SSBD in the featureset
> > description. The change from 's' to 'S' is due to the fact that now if
> > VIRT_SSBD is exposed by the hardware it can be passed through to HVM
> > guests.
> 
> But lower vs upper case mean "(do not) expose by default", not whether
> underlying hardware exposes the feature. In patch 1 you actually used
> absence in underlying hardware to justify !, not s.

Maybe I'm getting lost with all this !, lower case and upper case
stuff.

Patch 1 uses '!s' to account for:
 * '!': the feature might be exposed to guests even when not present
   on the host hardware.
 * 's': the feature won't be exposed by default.

Which I think matches what is implemented in patch 1 where VIRT_SSBD
is possibly exposed to guest when running on hardware that don't
necessarily have VIRT_SSBD (ie: because we use AMD_SSBD in order to
implement VIRT_SSBD).

Patch 2 changes the 's' to 'S' because this patch introduces support
to expose VIRT_SSBD to guests by default when the host (virtual)
hardware also supports it.

Maybe my understanding of the annotations is incorrect.

> > @@ -610,6 +611,14 @@ static void cf_check svm_cpuid_policy_changed(struct vcpu *v)
> >      svm_intercept_msr(v, MSR_SPEC_CTRL,
> >                        cp->extd.ibrs ? MSR_INTERCEPT_NONE : MSR_INTERCEPT_RW);
> >  
> > +    /*
> > +     * Give access to MSR_VIRT_SPEC_CTRL if the guest has been told about it
> > +     * and the hardware implements it.
> > +     */
> > +    svm_intercept_msr(v, MSR_VIRT_SPEC_CTRL,
> > +                      cp->extd.virt_ssbd && cpu_has_virt_ssbd ?
> 
> Despite giving the guest direct access guest_{rd,wr}msr() can be hit
> for such guests. Don't you need to update what patch 1 added there?

Indeed, I should add the chunk that's added in the next patch.

> Also, is there a reason the qualifier here is not in sync with ...
> 
> > @@ -3105,6 +3114,36 @@ void svm_vmexit_handler(struct cpu_user_regs *regs)
> >      vmcb_set_vintr(vmcb, intr);
> >  }
> >  
> > +/* Called with GIF=0. */
> > +void vmexit_virt_spec_ctrl(void)
> > +{
> > +    unsigned int val = opt_ssbd ? SPEC_CTRL_SSBD : 0;
> > +
> > +    if ( cpu_has_virt_ssbd )
> 
> ... this one? Since the patching is keyed to VIRT_SC_MSR_HVM, which in
> turn is enabled only when cpu_has_virt_ssbd, it would seem to me that
> if any asymmetry was okay here, then using cp->extd.virt_ssbd without
> cpu_has_virt_ssbd.

Using just cp->extd.virt_ssbd will be wrong when next patch also
introduces support for exposing VIRT_SSBD by setting SSBD using the
non-architectural method.

We need to context switch just based on cpu_has_virt_ssbd because the
running guest might not get VIRT_SSBD offered (cp->extd.virt_ssbd ==
false) but Xen might be using SSBD itself so it needs to context
switch in order to activate it. Ie: if !cp->extd.virt_ssbd then the
guest will always run with SSBD disabled, but Xen might not.

> > @@ -1069,6 +1072,10 @@ void __init init_speculation_mitigations(void)
> >              setup_force_cpu_cap(X86_FEATURE_SC_MSR_HVM);
> >      }
> >  
> > +    /* Support VIRT_SPEC_CTRL.SSBD if AMD_SSBD is not available. */
> > +    if ( opt_msr_sc_hvm && !cpu_has_amd_ssbd && cpu_has_virt_ssbd )
> > +        setup_force_cpu_cap(X86_FEATURE_VIRT_SC_MSR_HVM);
> 
> In cpuid.c the comment (matching the code there) talks about exposing
> by default. I can't bring this in line with the use of !cpu_has_amd_ssbd
> here.

Exposing by default if !AMD_SSBD. Otherwise VIRT_SSBD is only in the
max policy, and the default policy will instead contain AMD_SSBD.

If AMD_SSBD is available it implies that X86_FEATURE_SC_MSR_HVM is
already set (or otherwise opt_msr_sc_hvm is disabled), and hence the
way to implement VIRT_SSBD is by using SPEC_CTRL.

I think I need to fix the intercept in that case, so it's:

    svm_intercept_msr(v, MSR_VIRT_SPEC_CTRL,
                      cp->extd.virt_ssbd && cpu_has_virt_ssbd &&
		      !cpu_has_amd_ssbd ?
                      MSR_INTERCEPT_NONE : MSR_INTERCEPT_RW);

Because it AMD_SSBD is available VIRT_SSBD will be implemented using
SPEC_CTRL, regardless of whether VIRT_SSBD is also available natively.

Hope all this makes sense, I find it quite complex due to all the
interactions.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 15:25:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 15:25:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295497.502866 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYrEw-0006WC-ER; Mon, 28 Mar 2022 15:25:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295497.502866; Mon, 28 Mar 2022 15:25:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYrEw-0006W5-Ax; Mon, 28 Mar 2022 15:25:06 +0000
Received: by outflank-mailman (input) for mailman id 295497;
 Mon, 28 Mar 2022 15:25:05 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Ynyj=UH=citrix.com=prvs=079c560b7=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nYrEv-0006Vz-8M
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 15:25:05 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3c62d5bd-aeab-11ec-8fbc-03012f2f19d4;
 Mon, 28 Mar 2022 17:25:03 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3c62d5bd-aeab-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648481103;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=hfKsfUhUmlVs7CgVHxDKmPJdNrrZlv8VQm9bG2bblzw=;
  b=KNeIO8eIOc9FhpxCIRMZPL3dMHV+PwOn6SMck+wXhUStmePI5tQ/ABFW
   tvvcS/JEHRz/tYaXDgf9P+W/6yW3uRu5oV8Pr9zZYNNZt2FFXSE7J+ERG
   aVCyjIifgvX6OkY8K0FleiTD3uDMtQbCJulFx3A7LYX7reNJR+BWG7pTt
   o=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66792990
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:3IMfNqOfUIshttbvrR2xl8FynXyQoLVcMsEvi/4bfWQNrUp20GECz
 WBNCD2FbPfbYmbyf4tyYY3jph5T75/WxtU2HAto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi2N4w2LBVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Z8
 OpP64KuCiwSNZbKhtYQDwhxTyxbFPgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALNs7kMZlZonh95TrYEewnUdbIRKCiCdpwgmlv15ofTK62i
 8wxNiZkYTnRRBN2ZHwsNo87zeOBuiXHfGgNwL6SjfVuuDWCpOBr65D9PdyQdtGUSMF9mkeDu
 nmA72n/GgsdNtGU1XyC6H3ErvDLtTP2XsQVDrLQ3vxgjUCXx2cTIAYLTlb9qv684nNSQPoGd
 RZSoHB36/Fvqgr7FbERQiFUvla8gRxCRcQTONYx0weT+KeI8i/FC00tG2sphMMdiOc6Qjkj1
 1msltzvBCByvLD9dU9x5ot4vhvpZ3FLcDZqiTssCFJcvoK9+N1bYgfnFI4LLUKjsjHi9dgcK
 RiupTN2ubgchNVjO06TrQGe2GLESnQko2cICuTrsoCNs1gRiG2NPdXABb3nARBodtzxor6p5
 iRspiRmxLpSZaxhbQTUKAn3IJmn5uyeLBrXikN1Ep8q+lyFoiD/LdwIv2skehw3Yq7onAMFh
 meJ42u9A7cJYROXgVJfOdrtW6zGM4C+fTgaahwkRoUXOcUgHON21CpveVSRzwjQfLsEyskC1
 WOgWZ/0Vx4yUP0/pBLvHrt1+eJ7l0gWmDKILbimnkvP7FZrTCPMIVvzGADVNb5RAWLtiFi9z
 uuzwOPXkk0GC7evO3O/HEx6BQliEEXXzKve8qR/XuWCPhBnCCcmDfrQyqkmYItrg+JekeKgw
 513chQwJIbX7ZEfFTi3Vw==
IronPort-HdrOrdr: A9a23:xyubVK5GaQVMoC/MFwPXwDLXdLJyesId70hD6qkQc3FomwKj9/
 xG/c5rsSMc7Qx6ZJhOo7+90cW7L080lqQFhLX5X43SPzUO0VHARO1fBOPZqAEIcBeOlNK1u5
 0AT0B/YueAcGSTj6zBkXWF+wBL+qj5zEiq792usUuEVWtRGsZdB58SMHfhLqVxLjM2Y6YRJd
 6nyedsgSGvQngTZtTTPAh+YwCSz+e77a4PeHQ9dmYa1DU=
X-IronPort-AV: E=Sophos;i="5.90,217,1643691600"; 
   d="scan'208";a="66792990"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=H0WU9eyMFFnAF/rdMle0XzBCosmNDKqufjStXOg6oZVf/RSEbTBHAxrvAvrclIy6uznrUtHCV0tMVCnGTIPCDpi5cwNtkgNQpM07MIyf56dT8nZOZqCPLk6eAZRGQ6oeNJIY4cV7zMPjfYsotNHR7M9G2jCrOQWZYhux5u5okow1u7MkhZMmmnXt4BpBOID6apH8ASKz0hKyEu6zWZ6w2YwU+2uWEXDZqU2xaqKZyPo6wGHzZG8ECO8qTnJ8+p5SkKg9VcINOBP6Oxxq9wRtMOWh4lYHFt3PTBDYiC5Q6D5RkonNK/pcnn/WN/5KCqnqmeP0kQjNT259ZulptE6hHQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=pgmROSTXiNTy1esC4yRGxI90R9ddUU0WVVD76Osf2Zc=;
 b=ZX351bSTBKIDqicGIfMMDsgmsJRNMvERxucs/9005f63+GdNE9BYWHc835I3uIg3E7cdB/cpMIqTyutBrxDxWuhw/GTNqeK11jaRo7wU9JiILTmSd1ngsGESuNhbTTlKrqzPGAimvBT0KfUf6yKPyga2g3hth47Wriv8AZmDAJjUKasN+sG66Pt9H1FVBrJELEGGzNjFaVIqBLhXvjwt+aBzNbAncVLpmE5RA0KxFsFEjOKvcgloyj40J/VDBvd+KZb0Pu4/VPjqZO5EuP7yiGGk0cleN51s+twQYYIa4JzMF9c/Y/q1XRfDDiFmYr+G6Tk3AlAlEPXxPwavA9sOGA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=pgmROSTXiNTy1esC4yRGxI90R9ddUU0WVVD76Osf2Zc=;
 b=K74kUkSAA34YTc5pVyjWBaxpyD6l2na4cuCX1UTPVggkz/g/DKujVSL4mME9svT4WWBOqaeuoXLgYALq1MqWiYrC6NnRkrHJclYDGs8yXKL0RVMue8FYfEsi5d6YviqAXARrb9rN2zfT+0NVIviAfjuebsP/MzBA8oJEr55BiLE=
Date: Mon, 28 Mar 2022 17:24:51 +0200
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
	<xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v2 3/3] amd/msr: implement VIRT_SPEC_CTRL for HVM guests
 using legacy SSBD
Message-ID: <YkHTQ47POJe5lpwU@Air-de-Roger>
References: <20220315141807.22770-1-roger.pau@citrix.com>
 <20220315141807.22770-4-roger.pau@citrix.com>
 <81e90bb0-bcc0-563b-eda0-9979164aaad2@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <81e90bb0-bcc0-563b-eda0-9979164aaad2@suse.com>
X-ClientProxiedBy: LO4P123CA0498.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:1ab::17) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 154e5c6a-8e4f-42c6-e661-08da10cf1d0e
X-MS-TrafficTypeDiagnostic: CY4PR03MB3061:EE_
X-Microsoft-Antispam-PRVS: <CY4PR03MB3061AFB1A684D226CE687EBD8F1D9@CY4PR03MB3061.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(6512007)(82960400001)(38100700002)(6506007)(6486002)(66946007)(54906003)(6666004)(4326008)(316002)(2906002)(86362001)(508600001)(9686003)(5660300002)(33716001)(53546011)(85182001)(83380400001)(26005)(8936002)(66556008)(66476007)(186003)(6916009)(8676002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?QkNhbFRsbXRPM2RjcE5wMjlxdWZUVzlhTGFTdEVlbjIwdjk1SFAxdXpGNFd5?=
 =?utf-8?B?YWVFa3M2aUtFVGVqUU1ZNUp3ZFVacnRkZTRWWFZqdVNYbzJwWlJNZDJKUzFj?=
 =?utf-8?B?YzJSQkFXcjFiaUxZZ0FsZ2FBQjM3Ky8xNGU4d0Evc1RESk1CVjIzQk05V0RS?=
 =?utf-8?B?UXMwT0tubjh5MEdkZDdzdzl4MjY3cjR6cXhlMkxsYjV5cVFNVUhjb0psWUZa?=
 =?utf-8?B?YkNSMjVVYWhBNzJsU2VFMFE5RlBKQnlzWllCVGs1bFdsZnFsK0RjZ3BRdnUx?=
 =?utf-8?B?ajFSQkpCNUduNTRSSGtlUkRyNDVuS0QwVlZzRnZBME5iUU5aMnBUdDVqcE5z?=
 =?utf-8?B?Q1VxK0owSVJvN2tGamlyNFcyeitTdzdBTTI0UlJNTE5aRk9XYTBMT3hoMUdP?=
 =?utf-8?B?Z3dKUDhzcjFqNGE4NDdCMXFqMzF0OXl4REFHdDF6QmR0blVBSWt1MUYySlJ5?=
 =?utf-8?B?Ym9WcGRRcFZ2QkJBUjlFb3BMYzdjQitsdlRhb0I3Tlh2N2c0dTNmTUJId2hp?=
 =?utf-8?B?QW5GN1JzUVdXUnpodGRWb2xUR0JBWWRZd21SMmlWbFQ3REJURUxqMnZtOGg0?=
 =?utf-8?B?cE54S1YxSWtxVklUb0p1MzVUSnk4VndIUThBM21xUi9rM29GKzFpVU5xQUVw?=
 =?utf-8?B?R3RpdVhnU2FRVGV5WjhXMW5mRWNxcWpWOTArSXRJRFpxMlhLeUJSdUxhZEdl?=
 =?utf-8?B?dVdFMGxhaCtmUkpDREEwQTNZWlI0bVUrdXlrWEpodDVYM2lsditLVmVJQmN0?=
 =?utf-8?B?Rnp3cE96OWx4cTNzRThJTm5ZVUMyWEc3VnFqU0F6eWdraHJ6RncxclNTQXJt?=
 =?utf-8?B?L3ROc201Q2tGQnJ1cGcrcW9EUlVOWUF3NDhQVGplbW85cjFOSEFaZy9MQ0s5?=
 =?utf-8?B?Wk5uVjd1eW9aUEJYU2ZXRE1tSHlkOFRJNEYzR1EvSjNFcEQrNDZDQTlGRGlI?=
 =?utf-8?B?dVM5cmpIaVpVUXhvcXFvSGRDVWthWTNTTHgvcTNuSDdsaGZPUldaYU5aRTdT?=
 =?utf-8?B?eWhqcWVWMVM5MXBDbktTcEEvSXVJdnpYY1pRaFhwRHV4WGpCUGFQbVA4NkVL?=
 =?utf-8?B?UzBtMHRId3FUWGdoNVJvT2Q0eEZlSmJrRVNVbWVwMWFoTmc1c1o2SGhKYUFp?=
 =?utf-8?B?b2ZJcTNaNTBnU2F2NThjSGlIL0JRTVRpWVNJYStEV0xKZ09CN2JVQ0ZxNU9n?=
 =?utf-8?B?TFZjcVdra2N4M2F2eHVpY2d4TWQ2STlKWlF0RTBWbVowa1d5czRlSHpmMHpB?=
 =?utf-8?B?eXNiNno2dGNXK1RiTzlXMXNQb1RRWXUzVVFoRWVzK3BXUDd3WjRXV3VLNHpL?=
 =?utf-8?B?R01WYXBOenIrRFQ4WC9YcEFYd2NhQnkzTUgveXVKVXErbHBGV2V4ZUJMdnZQ?=
 =?utf-8?B?Vjl1b0xhS2xBNFhGdHZiY2ZSdG1pdlQwL1gwSkVzWDZYTVVWWEx0TkxFRDYx?=
 =?utf-8?B?L2g3NWdUeTd6Nys0V0ZQY2xFdlduVGVRbkVseEI2dnY2bk1xZXZ5OWs1ck1v?=
 =?utf-8?B?Uk44ejJES01tZHFQTkdXZkU5eTJxMldvejhpUFBxSmpkQVFwZDFqZFN6UG1E?=
 =?utf-8?B?SnlhYkJ3eXhRTktxWXN2UHJoNzF5ZFl3TzhvTFMxL3ZzRzc4NGFucFN5ZHRz?=
 =?utf-8?B?alZ5TFhncTM5Wm5UbzhkK2ZQMjFxdGVCYy81N3JoT1gycHlzbUJwLytGUmV3?=
 =?utf-8?B?NVRFOXlkQS83TEo5UVluOU5CMmhsaDhwVkdhMmRyb1RJdlJjSTZ2UmhJa29t?=
 =?utf-8?B?ZzFrMFNVa0l3Q2dKT09YYjk5QzdESjRtZjcrNVVYYUdBdVFXVHVWWDRwcE5D?=
 =?utf-8?B?RGVLTk1zeHZ4SHZtSy8yQkNBQ0Z2bFd4REFXNDlCVTY3Z2R1N0FuNnhnQmxk?=
 =?utf-8?B?eTFHNWlDbnFSMUZ2YXkrdW5CMEovd0N1QUs4TEltWG8rZStvZjQ4MTZFamhM?=
 =?utf-8?B?QW4rYzljQkZDZDdaVGZNRHJqUkV4dU5PNE1nR1FsSnZJS0R5L0k1MnFBbzhy?=
 =?utf-8?B?ejZxMndzcDZ3PT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 154e5c6a-8e4f-42c6-e661-08da10cf1d0e
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Mar 2022 15:24:55.9386
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: iijR/znW1K83Bnz3YFbqHMuSSlm7H/UOWlQZjvgIuvM2Aif9eSx9NYKb4Sk1nVuIB9J9LT8zqUyOj1pOk/Rc+g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR03MB3061
X-OriginatorOrg: citrix.com

On Mon, Mar 28, 2022 at 04:21:02PM +0200, Jan Beulich wrote:
> On 15.03.2022 15:18, Roger Pau Monne wrote:
> > +void amd_init_ssbd(const struct cpuinfo_x86 *c)
> > +{
> > +	if (cpu_has_ssb_no)
> > +		return;
> > +
> > +	if (cpu_has_amd_ssbd) {
> > +		/* Handled by common MSR_SPEC_CTRL logic */
> > +		return;
> > +	}
> > +
> > +	if (cpu_has_virt_ssbd) {
> > +		wrmsrl(MSR_VIRT_SPEC_CTRL, opt_ssbd ? SPEC_CTRL_SSBD : 0);
> > +		return;
> > +	}
> > +
> > +	if (!set_legacy_ssbd(c, opt_ssbd))
> > +	{
> 
> Nit: In this file the brace belongs on the earlier line and ...
> 
> >  		printk_once(XENLOG_ERR "No SSBD controls available\n");
> > +		if (amd_legacy_ssbd)
> > +			panic("CPU feature mismatch: no legacy SSBD\n");
> > +	}
> > +	else if ( c == &boot_cpu_data )
> 
> ... you want to omit the blanks immediately inside the parentheses here.

Ouch, yes.

> > +		amd_legacy_ssbd = true;
> > +}
> > +
> > +static struct ssbd_core {
> > +    spinlock_t lock;
> > +    unsigned int count;
> > +} *ssbd_core;
> > +static unsigned int __ro_after_init ssbd_max_cores;
> > +
> > +bool __init amd_setup_legacy_ssbd(void)
> > +{
> > +	unsigned int i;
> > +
> > +	if (boot_cpu_data.x86 != 0x17 || boot_cpu_data.x86_num_siblings <= 1)
> > +		return true;
> > +
> > +	/*
> > +	 * One could be forgiven for thinking that c->x86_max_cores is the
> > +	 * correct value to use here.
> > +	 *
> > +	 * However, that value is derived from the current configuration, and
> > +	 * c->cpu_core_id is sparse on all but the top end CPUs.  Derive
> > +	 * max_cpus from ApicIdCoreIdSize which will cover any sparseness.
> > +	 */
> > +	if (boot_cpu_data.extended_cpuid_level >= 0x80000008) {
> > +		ssbd_max_cores = 1u << MASK_EXTR(cpuid_ecx(0x80000008), 0xf000);
> > +		ssbd_max_cores /= boot_cpu_data.x86_num_siblings;
> > +	}
> > +	if (!ssbd_max_cores)
> > +		return false;
> > +
> > +	/* Max is two sockets for Fam17h hardware. */
> > +	ssbd_core = xzalloc_array(struct ssbd_core, ssbd_max_cores * 2);
> 
> If I'm not mistaken this literal 2, ...
> 
> > +	if (!ssbd_core)
> > +		return false;
> > +
> > +	for (i = 0; i < ssbd_max_cores * 2; i++) {
> 
> ... this one, and ...
> 
> > +		spin_lock_init(&ssbd_core[i].lock);
> > +		/* Record initial state, also applies to any hotplug CPU. */
> > +		if (opt_ssbd)
> > +			ssbd_core[i].count = boot_cpu_data.x86_num_siblings;
> > +	}
> > +
> > +	return true;
> > +}
> > +
> > +void amd_set_legacy_ssbd(bool enable)
> > +{
> > +	const struct cpuinfo_x86 *c = &current_cpu_data;
> > +	struct ssbd_core *core;
> > +	unsigned long flags;
> > +
> > +	if (c->x86 != 0x17 || c->x86_num_siblings <= 1) {
> > +		BUG_ON(!set_legacy_ssbd(c, enable));
> > +		return;
> > +	}
> > +
> > +	BUG_ON(c->phys_proc_id >= 2);
> 
> .. this one are all referring to the same thing. Please use a #define to
> make the connection obvious.

Indeed. That's the maximum number of sockets possible with that CPU
family (2).

> > @@ -677,14 +680,17 @@ int guest_wrmsr(struct vcpu *v, uint32_t msr, uint64_t val)
> >          if ( !cp->extd.virt_ssbd )
> >              goto gp_fault;
> >  
> > -        /*
> > -         * Only supports SSBD bit, the rest are ignored. Only modify the SSBD
> > -         * bit in case other bits are set.
> > -         */
> > -        if ( val & SPEC_CTRL_SSBD )
> > -            msrs->spec_ctrl.raw |= SPEC_CTRL_SSBD;
> > +        /* Only supports SSBD bit, the rest are ignored. */
> > +        if ( cpu_has_amd_ssbd )
> > +        {
> > +            /* Only modify the SSBD bit in case other bits are set. */
> 
> While more a comment on the earlier patch introducing this wording, it
> occurred to me only here that this is ambiguous: It can also be read as
> "Only modify the SSBD bit as long as other bits are set."

Hm, no, that's not what I meant. I meant to note that here we are
careful to only modify the SSBD bit of spec_ctrl, because other bits
might be used for other purposes. We can't do:

msrs->spec_ctrl.raw = SPEC_CTRL_SSBD;

But maybe this doesn't require a comment, as it seems to raise more
questions than answer?

> > +            if ( val & SPEC_CTRL_SSBD )
> > +                msrs->spec_ctrl.raw |= SPEC_CTRL_SSBD;
> > +            else
> > +                msrs->spec_ctrl.raw &= ~SPEC_CTRL_SSBD;
> > +        }
> >          else
> > -            msrs->spec_ctrl.raw &= ~SPEC_CTRL_SSBD;
> > +            msrs->virt_spec_ctrl.raw = val & SPEC_CTRL_SSBD;
> 
> I also think the comment applies equally to the "else" logic, so perhaps
> the comment would best remain as is (and merely be re-worded in the
> earlier patch)?

Sure, let's see if we can get consensus on a proper wording.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 15:27:05 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 15:27:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295500.502877 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYrGn-000772-RS; Mon, 28 Mar 2022 15:27:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295500.502877; Mon, 28 Mar 2022 15:27:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYrGn-00076v-Nj; Mon, 28 Mar 2022 15:27:01 +0000
Received: by outflank-mailman (input) for mailman id 295500;
 Mon, 28 Mar 2022 15:27:00 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=dCnP=UH=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nYrGm-00076k-3s
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 15:27:00 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 820fe02b-aeab-11ec-8fbc-03012f2f19d4;
 Mon, 28 Mar 2022 17:26:58 +0200 (CEST)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2110.outbound.protection.outlook.com [104.47.18.110]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-31-VS1GX_z_Pn-JGnQ17h50dA-1; Mon, 28 Mar 2022 17:26:55 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by VI1PR0401MB2365.eurprd04.prod.outlook.com (2603:10a6:800:2a::6)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.22; Mon, 28 Mar
 2022 15:26:54 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%5]) with mapi id 15.20.5102.022; Mon, 28 Mar 2022
 15:26:54 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 820fe02b-aeab-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648481218;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=OD6YrZd3xf+UNQDsOg0UUxYFdjUEFkc0lFiy2Eg/bew=;
	b=PeLoK6mGxtaxjOZD1EbRPXfa1fdeXLF1TkHmtzwI5e5G3lSgEfvI/orZqJ440gPGHAnDA3
	jSuiHiSoqh8IxBRBK/67+L9jIOD0NUr5tZ/Zn3iK7jB5b/JlfOMYUAO+1MenLsNO3HxBxl
	q1ywOcuVvSSXdfqmNSeX+sOiQ+tzDhg=
X-MC-Unique: VS1GX_z_Pn-JGnQ17h50dA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=KL8p3xkPlRluLzR1Y/6QzF8OGs/zg8Urw/FdcJdZq/EGO++ptPFu3qdu6L1lv+66bsifxs7w+DTvKHU1q1QN+q+n0W+e/VHfOJ79CfSdwXM7dkTyxkbVEPdENzkeOaoQdpc1GOmMGEbx9vRJyOkunRcEn/W5ZJUumDXes5+sDxZCzQfzrzI5WJU9zKqQ4HDBbGNQeDwHmr+lEH0EBiOUxiw5sCsbuZRDSpyhs+RwsnZx1nxLhNsaSdV87S20Sal/nIXzvB0NRL7j1IyWjLbCrhg2s/yulIyG7PY1b8i4wg84rEGcmNHMR5pOXULifR6z2GjBp5SkK5mNZM/F5A5z9w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=EKR7y9OnGypk447IKCrDmq6IHJeppj8YpJA3wSQPChM=;
 b=n8f1Wn3zDn8/PEBXlhljTdYkqKi/lb6zcwLdchJIrO6QYQKjBgccbOh4WYl4uMzNVl5MfzE7odI+Rv90IKlPh5NYSSmMdobLeQWdip23qXnQhHYkDeCHCse7P4dbBEjuZOE1xdsNa8kC/Xuqu10F+c8z5wl/nYMZuxYS63C4Cck1jB/kIqZObdApasl0zKSLbR/yX5Ph58QLic7FdkmoJk3YsC9ZhdtUx+rboy3RYvJVC8T9DDvQ6dMYlMSHHiQGVE4HeI9Yz775cCI2L0D48EZot+oXvOA26VZ817k9ppZDxx94IGDealgTwr93hkVnDTrB0RYki726DKqEcRji0A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <025a38a1-b78d-f3d8-899f-365b119201be@suse.com>
Date: Mon, 28 Mar 2022 17:26:54 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2 2/3] amd/msr: allow passthrough of VIRT_SPEC_CTRL for
 HVM guests
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220315141807.22770-1-roger.pau@citrix.com>
 <20220315141807.22770-3-roger.pau@citrix.com>
 <033ec463-f20a-a6d0-d877-51e4f476a316@suse.com>
 <YkHSHj9nlE50F5NB@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YkHSHj9nlE50F5NB@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6P193CA0049.EURP193.PROD.OUTLOOK.COM
 (2603:10a6:209:8e::26) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: dcfb4148-ee82-4352-7618-08da10cf6363
X-MS-TrafficTypeDiagnostic: VI1PR0401MB2365:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR0401MB23658D2E3503EABD37A6CC54B31D9@VI1PR0401MB2365.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2616005)(38100700002)(86362001)(53546011)(31696002)(8936002)(26005)(508600001)(186003)(6506007)(4326008)(66476007)(54906003)(36756003)(6512007)(31686004)(83380400001)(6916009)(2906002)(66946007)(8676002)(66556008)(6486002)(316002)(5660300002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?WsjG5oi7YXQ+RmSgUqJnTDer0A5CxjbljAMEAiwAwUsZmKKYphgVqj9I8aI0?=
 =?us-ascii?Q?/WJleFfLamT9S35OAtY7zwvlTSRl0S+JCfpCZdcnBb6fI5Hi1Ak5HxNxmikW?=
 =?us-ascii?Q?EjnJuCzWrSugyQnF7gFOhKbEHChZFFFrh8oM99mGTa//B27J00ujXD6MiNE1?=
 =?us-ascii?Q?aBhnSQw+cy3DdUjKlmxgqRjQyoO4OAKDrBzvu8yz86sa73mZFfil+x5CsgEB?=
 =?us-ascii?Q?zuBbRr2rizUhDxXdZdQQbEmeQwVSd0XbyaaVnO5+0idUlhEqpyQIvM80FErv?=
 =?us-ascii?Q?pgz/Ra/VGvh9GUbSeDYNTLX3RaNM5oJdC1MvdUUEjF+XO5mbgtx16rAMn5re?=
 =?us-ascii?Q?zyfO7nC5zYtzFbqKeFTbEZC+cUsPOiGSY03GIf753AZDdXzSWqVLk8cB/6lL?=
 =?us-ascii?Q?AAkoTswPNm2E57cGxB5+361OFsrO8miKGiVuQ0AC7Hkal7NBY9MMbR5kop9p?=
 =?us-ascii?Q?uRXZePQSF44Qi124n4WoyjFnP64r9D2qj/NnRIpsJw6Cm7INUZA/boSHuTp4?=
 =?us-ascii?Q?a4lzgcm6tL0nw/LeHlg34cmhOq52QKPrge37++U6Xy158ttVZzwbJdAiIhYR?=
 =?us-ascii?Q?cy1Zkeydkeh+/BiizZBFyiIgwnyHjCw9Q7YVBDRO3pr1l8NXQjSw5XpKHHqZ?=
 =?us-ascii?Q?v95PuH16dLpADp858QazoU1sjEQcM3otVBcERN7mlBx21LftNJ5mEDYWcH4Q?=
 =?us-ascii?Q?yRA8Otd+r8CxPq1/+9Xudu/E+2aG0vRdu9NOsJ7HbMksi9d7gyD5gUvrHQrW?=
 =?us-ascii?Q?ESiirTQNUZ2gLqEJcph7ONyTD1Aj6M9SMqFPX8UdvL/fddy4sOASW2FkBYOf?=
 =?us-ascii?Q?9rR+zrwOK/cr0HzJJh2FOkUeQkqndnectowvORtaVCa4F5dJykvXfPsM7ojE?=
 =?us-ascii?Q?ZxgqJjRV1g2KPR3yHYdqFEwlCk+PknBugjFrbV/IqkgGahxFP5UYru9bAYGG?=
 =?us-ascii?Q?BrjPu9XjgThZL//HsljAjArA2tVoaio+t77kbRIK1qL1xHzBOY5b8nFVpWIS?=
 =?us-ascii?Q?SaVR/Ha167Rh83xcERGfkBzB4cm2W1WiMut/Nm6ZlClDMVd3jFflYcDLBKGz?=
 =?us-ascii?Q?60twHqlz2r3A9F3ZUhBPOjWazsr5E8bwI27XqO7KBK5uXv5IRRDv+PvRCgol?=
 =?us-ascii?Q?7aQwJ0Vx2iyU9apwIyi05L7Lah/qi3s/wMyrge0in4X4SR0U8vR1bTb0O5CK?=
 =?us-ascii?Q?p4hIEo1Kqs3Ei6C+8Kkroj3TM4QsQ8KUlkok3FgNIU8kZou4XKR8Ccb7Vjfa?=
 =?us-ascii?Q?4prsU9z8pZ7G203Cg6IPNNV8V8/5pIuMgb2Uz45EfJLulb93bj9b5tZZQbiD?=
 =?us-ascii?Q?DNzKgfSp5WbluOPLcrldGkX8d7ms3DWRSViVMFn+EN1yLPc01EKbM08yFCKa?=
 =?us-ascii?Q?IKFsAkKJu9+foNxkoWJG1KAjEdePhP/HUSjD6b1A+hLQn4y5XaOz5+JZq++0?=
 =?us-ascii?Q?ealLnilKG0+sp+66g3iBmoH4cpREhw75xcTtWtRabrWgrY5WdJSMvNwzYTCb?=
 =?us-ascii?Q?CXUKnhljhSmWQKNTAFTIRuTaOaNWtUDIq7kyxEnI8MbewRNQuCgG/bMayRlm?=
 =?us-ascii?Q?+qriGWoPI2vj7J4liQjCrHymRKdTvXt4g3NngvGdIhA/VIvuPPeCf7GyW2V0?=
 =?us-ascii?Q?xHTxZ9vUPF/grlyNbbGaTAioxNVtOQLF1eL/71QJEzQBXGkCTfWwrOT1ewAc?=
 =?us-ascii?Q?yDVB1ZJbPIHtmDyW+5NcmoJ7FbGR9/d8W1OPeBRY5YPsHjv/ec/d2/0XSbHU?=
 =?us-ascii?Q?+yltcRb6hg=3D=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: dcfb4148-ee82-4352-7618-08da10cf6363
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Mar 2022 15:26:54.1208
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: sVt5e9K5YBOLPV2FrIlRXAYQZiArKELWTfG56Do78J6GU24cZcYtXYrsYtf9WjdJp+ika9yDFUBK5WdwS7IZFA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0401MB2365

On 28.03.2022 17:19, Roger Pau Monn=C3=A9 wrote:
> On Mon, Mar 28, 2022 at 04:02:40PM +0200, Jan Beulich wrote:
>> On 15.03.2022 15:18, Roger Pau Monne wrote:
>>> Allow HVM guests untrapped access to MSR_VIRT_SPEC_CTRL if the
>>> hardware has support for it. This requires adding logic in the
>>> vm{entry,exit} paths for SVM in order to context switch between the
>>> hypervisor value and the guest one. The added handlers for context
>>> switch will also be used for the legacy SSBD support.
>>>
>>> Introduce a new synthetic feature leaf (X86_FEATURE_VIRT_SC_MSR_HVM)
>>> to signal whether VIRT_SPEC_CTRL needs to be handled on guest
>>> vm{entry,exit}.
>>>
>>> Note the change in the handling of VIRT_SSBD in the featureset
>>> description. The change from 's' to 'S' is due to the fact that now if
>>> VIRT_SSBD is exposed by the hardware it can be passed through to HVM
>>> guests.
>>
>> But lower vs upper case mean "(do not) expose by default", not whether
>> underlying hardware exposes the feature. In patch 1 you actually used
>> absence in underlying hardware to justify !, not s.
>=20
> Maybe I'm getting lost with all this !, lower case and upper case
> stuff.
>=20
> Patch 1 uses '!s' to account for:
>  * '!': the feature might be exposed to guests even when not present
>    on the host hardware.
>  * 's': the feature won't be exposed by default.
>=20
> Which I think matches what is implemented in patch 1 where VIRT_SSBD
> is possibly exposed to guest when running on hardware that don't
> necessarily have VIRT_SSBD (ie: because we use AMD_SSBD in order to
> implement VIRT_SSBD).
>=20
> Patch 2 changes the 's' to 'S' because this patch introduces support
> to expose VIRT_SSBD to guests by default when the host (virtual)
> hardware also supports it.

Hmm, so maybe the wording in the description is merely a little
unfortunate.

>>> @@ -610,6 +611,14 @@ static void cf_check svm_cpuid_policy_changed(stru=
ct vcpu *v)
>>>      svm_intercept_msr(v, MSR_SPEC_CTRL,
>>>                        cp->extd.ibrs ? MSR_INTERCEPT_NONE : MSR_INTERCE=
PT_RW);
>>> =20
>>> +    /*
>>> +     * Give access to MSR_VIRT_SPEC_CTRL if the guest has been told ab=
out it
>>> +     * and the hardware implements it.
>>> +     */
>>> +    svm_intercept_msr(v, MSR_VIRT_SPEC_CTRL,
>>> +                      cp->extd.virt_ssbd && cpu_has_virt_ssbd ?
>>
>> Despite giving the guest direct access guest_{rd,wr}msr() can be hit
>> for such guests. Don't you need to update what patch 1 added there?
>=20
> Indeed, I should add the chunk that's added in the next patch.
>=20
>> Also, is there a reason the qualifier here is not in sync with ...
>>
>>> @@ -3105,6 +3114,36 @@ void svm_vmexit_handler(struct cpu_user_regs *re=
gs)
>>>      vmcb_set_vintr(vmcb, intr);
>>>  }
>>> =20
>>> +/* Called with GIF=3D0. */
>>> +void vmexit_virt_spec_ctrl(void)
>>> +{
>>> +    unsigned int val =3D opt_ssbd ? SPEC_CTRL_SSBD : 0;
>>> +
>>> +    if ( cpu_has_virt_ssbd )
>>
>> ... this one? Since the patching is keyed to VIRT_SC_MSR_HVM, which in
>> turn is enabled only when cpu_has_virt_ssbd, it would seem to me that
>> if any asymmetry was okay here, then using cp->extd.virt_ssbd without
>> cpu_has_virt_ssbd.
>=20
> Using just cp->extd.virt_ssbd will be wrong when next patch also
> introduces support for exposing VIRT_SSBD by setting SSBD using the
> non-architectural method.

Well, if the next patch needs to make adjustments here, then that's
fine but different from what's needed at this point. However, ...

> We need to context switch just based on cpu_has_virt_ssbd because the
> running guest might not get VIRT_SSBD offered (cp->extd.virt_ssbd =3D=3D
> false) but Xen might be using SSBD itself so it needs to context
> switch in order to activate it. Ie: if !cp->extd.virt_ssbd then the
> guest will always run with SSBD disabled, but Xen might not.

... yes, I see.

> Hope all this makes sense,

It does, and ...

> I find it quite complex due to all the interactions.

... yes, I definitely agree.

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 28 15:32:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 15:32:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295503.502888 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYrLv-00008r-H3; Mon, 28 Mar 2022 15:32:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295503.502888; Mon, 28 Mar 2022 15:32:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYrLv-00008k-CZ; Mon, 28 Mar 2022 15:32:19 +0000
Received: by outflank-mailman (input) for mailman id 295503;
 Mon, 28 Mar 2022 15:32:18 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=dCnP=UH=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nYrLu-00008e-3p
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 15:32:18 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3fa037fe-aeac-11ec-8fbc-03012f2f19d4;
 Mon, 28 Mar 2022 17:32:16 +0200 (CEST)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2059.outbound.protection.outlook.com [104.47.14.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-29-eeKJUKXgP-2GqXNk_-auHQ-1; Mon, 28 Mar 2022 17:32:14 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by DB7PR04MB5387.eurprd04.prod.outlook.com (2603:10a6:10:8b::15) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.22; Mon, 28 Mar
 2022 15:32:13 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%5]) with mapi id 15.20.5102.022; Mon, 28 Mar 2022
 15:32:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3fa037fe-aeac-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648481536;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=pNa20O0jOpkbHA9LcSsbx9H6cWR7Gde29lvBVA+BK2g=;
	b=hJhTlLQJLoGhFJ0bgFxsDK0njzozu/sD1ZDk2bqVHleVEIfKiiIxSpkahVZKQRFi0PNATb
	YvM8foRZ1Abk1NV4e3wLARqzolntERXY3QqEYYK69cjqqCwZjCT/RBzc77qLLBx4opwq7o
	fnBG5Ap61ekYEuX5bdOJJCptTymE73o=
X-MC-Unique: eeKJUKXgP-2GqXNk_-auHQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=VpxQVp7EtDregEzM7qkTwH9OnQUooBhnCKJt0RvNdw9/jZqIneYBtyC+lhP2XY90XS9tNJ4O1TG+I+IwrMIg+OzilwHAI5+fKM4EEFkoMxQu4/LIxC8AyCP+0Mf3wKQpolp10OIsSkBkXQnrjOu9mnsVo6yu8p6DPmPNgktUX7S2wdEYkFp6DspC5QvlX/kBJIspU0uO0rMsU71Hj/fJOxWnIekjuxKaWTafxTOKmlFkNb+usqhg+Of5Q2iS+2bxC5C0h7QUdhCxnXe+S+KTF9zFOfME9/qhppj355DHncByUNOI2BvRW+IlVANZtMmVveRmNBVljDmC0aqxR8I3pA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=3bgbAq2eYta5h0QAy9d/DArmmTv6+XJryUq1+OxNot4=;
 b=e3d9gWZCLGzbJ5/8ZsTiQZfuvgTv8+0eBC/d0+vjAHHB2YZ1RS+4yYgCpLCoZSR1pDLdpJNLOqJhfgjeiUqmHW9gtQCcWXdlSQSmrsEW0CEudR2D4V+UFeOyFJGIDgVDLtSW/MqmwwL3hgN+eUV7Ixi16OWIn3FwsQ6Z7xmiHmn9L439EF/hZXAajFVHDlKr7HB/jQZPfXJTB5jl1gp1QqvV61rQSxQYgMnNdeDwvOhmzUG9bzJO7GQZm1PIO0a405lO76XBHq63fMXjdK7K3uV6E0COSvKxuBfn42qsqA+CKPg/nbCPX+2rZSeX8fJoRPDphJxzRtZEl8HhZ4ZFUQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <9f68f1b9-46a4-cfae-0783-bb2edaeb7b07@suse.com>
Date: Mon, 28 Mar 2022 17:32:13 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2 3/3] amd/msr: implement VIRT_SPEC_CTRL for HVM guests
 using legacy SSBD
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220315141807.22770-1-roger.pau@citrix.com>
 <20220315141807.22770-4-roger.pau@citrix.com>
 <81e90bb0-bcc0-563b-eda0-9979164aaad2@suse.com>
 <YkHTQ47POJe5lpwU@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YkHTQ47POJe5lpwU@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6P192CA0058.EURP192.PROD.OUTLOOK.COM
 (2603:10a6:209:82::35) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 97b9f033-3f1e-4236-013c-08da10d0217e
X-MS-TrafficTypeDiagnostic: DB7PR04MB5387:EE_
X-Microsoft-Antispam-PRVS:
	<DB7PR04MB5387E3327C7472A9F2A2EC4DB31D9@DB7PR04MB5387.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	/sTnQALpN4wUPRSFgn+6Yh3XTNWDU+C/T++2HaiJ8osOy6N4Mr3Q8o/RDXf87jLTAxganwVloCWi+20fLrCaane9m1qBgcp1+j9zkH9wSFyY2sfGSurxhJ+lJR/Q3x0WkdM009cvAZA32/8oUUK3UgG72UNP0g8avJYdW2N5ZfD0vqyTcxj4IEFh8CMgO3jnXIQnu5I0fkUdf5GO5SfEls8OBgmhcTqv0vSscVmXTtHEC2JCxnfDxFAzkuCIrpiU17wsYWLRthf2ud7J7+iTJi2xk4+RX77WUJGQounwldvJRSvlMxjb82Yp5ib938m3V3aIovCNNIEy62XCuIFwYyHlQc5+Zidl5Pupa1Z5jFoqS6Kj7GDe3No5RB4VwKDpGsq71+KwxtAwqRqS6tU7TDAO53AZUwIZkwKs0EU3XzTfCzsGx0uVD8AB6PNaF2EyaYmO15ij/kqh4ALjkn9T68+eb5Yjg26aBzaitwVXbgoTGwiGTlYXX/0L0svNbJibVccrcO5HelYU2/m0hujHBUFqV3GnnlRWihNTMD0oQektSSKc+QFGk03Atys5F41tRSU6OM0z9q0Yidmaw70G0pc6/xsTqt42G6q89vuFwza+o6kpyHMMeS4E4lsDyV0doCglNyVMKCz3p18GDvOi40Mu1DDTz7Ia8biqewYOtl9q0X/ORkC+PDgn6k5ewPs/3kD7KXAaDc2+gtFka+ASf8/kEM12ykMDf5/KiXfA3B4=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(316002)(4326008)(31696002)(66476007)(5660300002)(2616005)(6512007)(66946007)(66556008)(2906002)(508600001)(6916009)(54906003)(8936002)(86362001)(31686004)(38100700002)(53546011)(6486002)(26005)(36756003)(6506007)(186003)(8676002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?SHma18Dmsq7lkgLrMxn8Zr1zTeVklf7vlk66WucYC0xhqzvKHlqe8i+Sg6Ik?=
 =?us-ascii?Q?zWbyOZG0B4NqeJGZEqIDcSdfyeOBHgkKaZ3GNEm5U7FfYzZpB1Xi4nZM+Ia5?=
 =?us-ascii?Q?d0KvGmR4cXdkPiPmhtSSsGBsfPAKc0zC7RDwkTU1cnHfQ0wpKPlzZtaqlKKP?=
 =?us-ascii?Q?QoUZTUl59xRVn+Q45ViDEH8fPILXB1ytdfKWWShFoteAs8VVpByYfYx68xro?=
 =?us-ascii?Q?wvsatpBXHbeITdLU0+6I4y8UvwVSrB22VxUiJHErSPL4rU8fsM8yAj8BhU4k?=
 =?us-ascii?Q?cYurG5Z+AgHe3WHQQoOVAzrvUnsQ0Vg/4ZMADp/H2IZfgiXs+T+3YAkigQMf?=
 =?us-ascii?Q?CEanQRBSACd87iihT9Mqxvo2r23jWXw/6ZPZx6siCIFYsIqZ5jNtXS+PnrHl?=
 =?us-ascii?Q?sZWFuBzdC7B2Lalzq6TwB9pDxf/E7cp+uVfrnrqXRLorpMgloYgRUJhQ3eiV?=
 =?us-ascii?Q?QE9/c591CnaRjXx7NTWuZeqZMPB22Dh1QPpXiSi0n0Ss+Knof4+uj/Kgb7wv?=
 =?us-ascii?Q?p45cvHqU615mCYs3ZXqtHChwFxFeSf6HMEyH56pTrdrfU9UimcQmRI4OSNwM?=
 =?us-ascii?Q?zgLtLGrYjP3Erd5zh1TyPyV4HysuL1YZsG8SwOcpPNztVX0s/azk3Xb2CRvh?=
 =?us-ascii?Q?1UIgwWkfcHYYRQ5pZr2SpZmmniQhrQGym0P+GMdtFSHeXbcJyIxUrd4HCssx?=
 =?us-ascii?Q?YxXM2zTVvgZr91K5K1jeYfom6Ot3JM879FeI1NpHdr3tpGTrYMcvKQeVxhgh?=
 =?us-ascii?Q?g154An2W4v5mnbyhx1PfkLcNwOzUJPtdcJw0A9qg4RxAoOcOAgRZ6o4DNMRy?=
 =?us-ascii?Q?NRG2b2zwHpNz3FpDoW5dx3ygiWTtdJA7uQJBz/lZJR1U4ahyNRVYHUQih19O?=
 =?us-ascii?Q?HqfOXpjPs0sqXk+OJT3L2HR4wkA2OrT7BBzwb9W8r/PuJ+jIsMQpNBhqCDJM?=
 =?us-ascii?Q?NV12Eoq9ZGcCkRmknZBOYEecp1Io0HhsqM0iS04hvi8iV1VdAHOaiU1TTrdI?=
 =?us-ascii?Q?+0A7wF8l5bHbCW6EC1MuTIoRIXBEF2CLhVkVqb9V0/R+ddwEdRgLNAvyWUIo?=
 =?us-ascii?Q?QQsYoQj8o+ZGk736/zfz4OFaQ+Ga2/6Pwlr3LJHfQshfRqOHjZAJn9aYbHsm?=
 =?us-ascii?Q?MO9BjSs4akWG+6ezU2ff0Mq2ci4orFtI2XvR74bhzGR7mxzBfH1XptnRdCeW?=
 =?us-ascii?Q?sjcQXap9sP6Tv8U8B6QkFDxqGfoKI7dPoCsx7x/7kvApMTm73FCpLWmmSAZE?=
 =?us-ascii?Q?32CxL/NA4Bxo5xqbe3GCuKkm0CR59PHcdrSpbM3G7lpJf9+O/dP8zCT3YB0O?=
 =?us-ascii?Q?EIX4015qHvCAPjw7k5Dp081/eI6Mf4wJtlimzjxQc+x7HuiLVP2Fj+5b6H15?=
 =?us-ascii?Q?z9/ZzmPt7ML3kE14Dwp/R54/GY8AVNe2p94Yp5D5jXN5UTCo2bjweVAO2rs3?=
 =?us-ascii?Q?WpMYmTmHkwdCb5jEi6md09XknajH83CpvdsTo4D/oRQs1NABzoomx2ZzLOWk?=
 =?us-ascii?Q?i8MUIuyZqU+EQyUId1cRF259bt17CJR3BAO2eNn8An0y/m+6CqaZZUd8UYxo?=
 =?us-ascii?Q?psnJZIOHR1loOvqUxz7WQfh6+1kS3LA2AHe6/HnXcF0v2RZH5YH+rseA5UPl?=
 =?us-ascii?Q?XY5EQlTRTJmEU2ax7Kermd2Nuo1SXiQunTrU0b2dVpE07xQCRnDr57J2EOtb?=
 =?us-ascii?Q?Tf5AvnjJ6NTNCAe1znfQo9OjloRiYofcQZ5QXX52RAtPg1JHM6p1kw0iohqS?=
 =?us-ascii?Q?K7IqHiJWpQ=3D=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 97b9f033-3f1e-4236-013c-08da10d0217e
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Mar 2022 15:32:13.0306
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: mwiapKAJrvWcDrEWcSN3VL8Tv/0Q8yptRtopvMoLfVEjJ8sibBkX6FsFFUgHckvFdLtZUIPx57FEjmH+oVEyUA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR04MB5387

On 28.03.2022 17:24, Roger Pau Monn=C3=A9 wrote:
> On Mon, Mar 28, 2022 at 04:21:02PM +0200, Jan Beulich wrote:
>> On 15.03.2022 15:18, Roger Pau Monne wrote:
>>> @@ -677,14 +680,17 @@ int guest_wrmsr(struct vcpu *v, uint32_t msr, uin=
t64_t val)
>>>          if ( !cp->extd.virt_ssbd )
>>>              goto gp_fault;
>>> =20
>>> -        /*
>>> -         * Only supports SSBD bit, the rest are ignored. Only modify t=
he SSBD
>>> -         * bit in case other bits are set.
>>> -         */
>>> -        if ( val & SPEC_CTRL_SSBD )
>>> -            msrs->spec_ctrl.raw |=3D SPEC_CTRL_SSBD;
>>> +        /* Only supports SSBD bit, the rest are ignored. */
>>> +        if ( cpu_has_amd_ssbd )
>>> +        {
>>> +            /* Only modify the SSBD bit in case other bits are set. */
>>
>> While more a comment on the earlier patch introducing this wording, it
>> occurred to me only here that this is ambiguous: It can also be read as
>> "Only modify the SSBD bit as long as other bits are set."
>=20
> Hm, no, that's not what I meant. I meant to note that here we are
> careful to only modify the SSBD bit of spec_ctrl, because other bits
> might be used for other purposes.

Right, I understand that's what you mean, and because I understand
the ambiguity also slipped my attention in the earlier patch.

> We can't do:
>=20
> msrs->spec_ctrl.raw =3D SPEC_CTRL_SSBD;
>=20
> But maybe this doesn't require a comment, as it seems to raise more
> questions than answer?

I wouldn't mind if (in the earlier patch) you simply dropped the 2nd
sentence. Or alternatively how about "Also only record the SSBD bit
to return for future reads" or something along these lines?

Jan



From xen-devel-bounces@lists.xenproject.org Mon Mar 28 15:36:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 15:36:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295507.502899 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYrQO-0000qb-5F; Mon, 28 Mar 2022 15:36:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295507.502899; Mon, 28 Mar 2022 15:36:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYrQO-0000qU-2R; Mon, 28 Mar 2022 15:36:56 +0000
Received: by outflank-mailman (input) for mailman id 295507;
 Mon, 28 Mar 2022 15:36:54 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=adjj=UH=gmail.com=dpsmith.dev@srs-se1.protection.inumbo.net>)
 id 1nYrQM-0000qO-Ih
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 15:36:54 +0000
Received: from mail-qt1-x830.google.com (mail-qt1-x830.google.com
 [2607:f8b0:4864:20::830])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id e40e0566-aeac-11ec-8fbc-03012f2f19d4;
 Mon, 28 Mar 2022 17:36:53 +0200 (CEST)
Received: by mail-qt1-x830.google.com with SMTP id j21so12689869qta.0
 for <xen-devel@lists.xenproject.org>; Mon, 28 Mar 2022 08:36:53 -0700 (PDT)
Received: from [10.10.1.138] (static-72-81-132-2.bltmmd.fios.verizon.net.
 [72.81.132.2]) by smtp.gmail.com with ESMTPSA id
 21-20020ac85715000000b002e1ce9605ffsm13118066qtw.65.2022.03.28.08.36.51
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Mon, 28 Mar 2022 08:36:51 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e40e0566-aeac-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=message-id:date:mime-version:user-agent:subject:content-language:to
         :cc:references:from:in-reply-to:content-transfer-encoding;
        bh=J2WgmBtmlR7QhmLnkMe4QU1O85FuVCgnDYsZysNmv3o=;
        b=JGsxSdJ4Tq7SHRYtKQN88tzNxTIUc4XCann5yK8UBqDayO3EMzg8tpFKLlHjrXbGtD
         5Jm46t1W+Zdyf+VViDkpElNwB+xnz4/yDX22vtPrHhaDwYH8VHqLjFCLzUA2Ev1duPSy
         +EsFaLPF4V81PafQz3adeZfj1y9a+bklAOChxTtrw99ETh60ybHvznyVnimfKPTV6y6A
         K7NF1L55D1VkN0Z5bHhmrHHqsq6J6gYHiiz43wbn6SI1ERPhd7mBPpFqEh4GwFH3/xoU
         YeTl8I6o7c93z3hvP31kJYK79TgW9x8oKT1PWrNYSoaaqFIxO5QsUxZL3bXzOpbGZtME
         cUlA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:message-id:date:mime-version:user-agent:subject
         :content-language:to:cc:references:from:in-reply-to
         :content-transfer-encoding;
        bh=J2WgmBtmlR7QhmLnkMe4QU1O85FuVCgnDYsZysNmv3o=;
        b=IErTOS115HTBNkHdjgmHznLgDVxMJ8CkefFhHiUcvNhhq/DRDqg+LA6rMl9dsFQyI7
         oKU+2nZ1Kx/qYeexGkCzHohUdXpMMwtgKa5pEwl0oJvehOHEbNhV05cLpRzg5xmm0ewl
         iTQF3FGGNQH1vmLQRt6M1dG2Am6OY7BTditTXjzMKmvOtMyn9C+HxS1DBA4IEouAcrK4
         hfET2/EzHt60orI9y8KlIebVhVVpTFbIvkwucwXs/Eb+vLgbKuD6Rati89k7nQP8oWgC
         e4C8dpUoLeaQk4S6ItQQ7HWdJ7RmdKdBUtLk7z507ZJxJHAwxpTGPRZdKSXjZrRkRXLT
         o9CA==
X-Gm-Message-State: AOAM530rfjiKF/hdbodZw/vBeb/nsVoOJxGimi6GwE2Ywtf2UtoM4DqH
	p4rWHyCQYXrKDHKb1/3v/LdHgkwEmPA=
X-Google-Smtp-Source: ABdhPJyfuV7iF/e0FS5hOpa4dxWXG9zKG8OtZVZJrCMqU9nK9eB6xAzU7NzbqbiRpGbGPb6Z17N/Cw==
X-Received: by 2002:ac8:5815:0:b0:2e2:2d63:ac13 with SMTP id g21-20020ac85815000000b002e22d63ac13mr22655072qtg.469.1648481811988;
        Mon, 28 Mar 2022 08:36:51 -0700 (PDT)
Message-ID: <1244c48a-9d3d-488c-8614-643d4670773a@gmail.com>
Date: Mon, 28 Mar 2022 11:36:36 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] x86/physdev: Call xsm_unmap_domain_irq earlier
Content-Language: en-US
To: Jason Andryuk <jandryuk@gmail.com>, xen-devel@lists.xenproject.org
Cc: Jan Beulich <jbeulich@suse.com>, Andrew Cooper
 <andrew.cooper3@citrix.com>, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?=
 <roger.pau@citrix.com>, Wei Liu <wl@xen.org>
References: <20220325141826.16245-1-jandryuk@gmail.com>
From: "Daniel P. Smith" <dpsmith.dev@gmail.com>
In-Reply-To: <20220325141826.16245-1-jandryuk@gmail.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

On 3/25/22 10:18, Jason Andryuk wrote:
> Pull the XSM check up out of unmap_domain_pirq into physdev_map_pirq.
> 
> xsm_unmap_domain_irq was seen denying unmap_domain_pirq when called from
> complete_domain_destroy as an RCU callback.  The source context was an
> unexpected, random domain.  Since this is a xen-internal operation,
> going through the XSM hook is inapproriate.

To me this is the first problem that should be addressed. Why is current
pointing at a random domain and is it possible to ensure it gets
correctly set to the current domain, e.g. DOMID_IDLE or DOMID_XEN.

> Move the XSM hook up into physdev_unmap_pirq, which is the
> guest-accessible path.  This requires moving some of the sanity check
> upwards as well since the hook needs the additional data to make its
> decision.  Since complete_domain_destroy still calls unmap_domain_pirq,
> replace the moved runtime checking with assert.  Only valid pirqs should
> make their way into unmap_domain_pirq from complete_domain_destroy.

This is moving the time of check a way from the time of use. While today
it may be safe because it only gives guest access through a limited
interface, vpci_msi_disabled, this now introduces risk through the
assumption that no future code will make this call without making the
appropriate XSM call when coming processing a guest request. This is one
of many reasons why I would dissuade moving resource access checks away
from the resource access.

While it is related, in this thread I will not disagree with your point
that XSM calls on internal calls has no meaning at this point. Still we
should not weaken the protection, is there any other way we can
determine the call is being made internally, like I suggested above in
getting `current` set to a system domain and then update fix the default
policy to allow system domains to make the call and those using flask
just update their policy to allow system domains to make the call.

> This is mostly code movement, but one style change is to pull `irq =
> info->arch.irq` out of the if condition.
> 
> Label done is now unused and removed.
> 
> Signed-off-by: Jason Andryuk <jandryuk@gmail.com>
> ---
> unmap_domain_pirq is also called in vioapic_hwdom_map_gsi and
> vpci_msi_disable.  vioapic_hwdom_map_gsi is a cleanup path after going
> through map_domain_pirq, and I don't think the vpci code is directly
> guest-accessible.  So I think those are okay, but I not familiar with
> that code.  Hence, I am highlighting it.
> 
>  xen/arch/x86/irq.c     | 31 +++++++-----------------------
>  xen/arch/x86/physdev.c | 43 +++++++++++++++++++++++++++++++++++++++++-
>  2 files changed, 49 insertions(+), 25 deletions(-)
> 
> diff --git a/xen/arch/x86/irq.c b/xen/arch/x86/irq.c
> index 285ac399fb..ddd3194fba 100644
> --- a/xen/arch/x86/irq.c
> +++ b/xen/arch/x86/irq.c
> @@ -2310,41 +2310,25 @@ int unmap_domain_pirq(struct domain *d, int pirq)
>      struct pirq *info;
>      struct msi_desc *msi_desc = NULL;
>  
> -    if ( (pirq < 0) || (pirq >= d->nr_pirqs) )
> -        return -EINVAL;
> -
> +    ASSERT(pirq >= 0);
> +    ASSERT(pirq < d->nr_pirqs);
>      ASSERT(pcidevs_locked());
>      ASSERT(spin_is_locked(&d->event_lock));
>  
>      info = pirq_info(d, pirq);
> -    if ( !info || (irq = info->arch.irq) <= 0 )
> -    {
> -        dprintk(XENLOG_G_ERR, "dom%d: pirq %d not mapped\n",
> -                d->domain_id, pirq);
> -        ret = -EINVAL;
> -        goto done;
> -    }
> +    ASSERT(info);
> +
> +    irq = info->arch.irq;
> +    ASSERT(irq > 0);
>  
>      desc = irq_to_desc(irq);
>      msi_desc = desc->msi_desc;
>      if ( msi_desc && msi_desc->msi_attrib.type == PCI_CAP_ID_MSI )
>      {
> -        if ( msi_desc->msi_attrib.entry_nr )
> -        {
> -            printk(XENLOG_G_ERR
> -                   "dom%d: trying to unmap secondary MSI pirq %d\n",
> -                   d->domain_id, pirq);
> -            ret = -EBUSY;
> -            goto done;
> -        }
> +        ASSERT(msi_desc->msi_attrib.entry_nr == 0);
>          nr = msi_desc->msi.nvec;
>      }
>  
> -    ret = xsm_unmap_domain_irq(XSM_HOOK, d, irq,
> -                               msi_desc ? msi_desc->dev : NULL);
> -    if ( ret )
> -        goto done;
> -
>      forced_unbind = pirq_guest_force_unbind(d, info);
>      if ( forced_unbind )
>          dprintk(XENLOG_G_WARNING, "dom%d: forcing unbind of pirq %d\n",
> @@ -2405,7 +2389,6 @@ int unmap_domain_pirq(struct domain *d, int pirq)
>      if (msi_desc)
>          msi_free_irq(msi_desc);
>  
> - done:
>      return ret;
>  }
>  
> diff --git a/xen/arch/x86/physdev.c b/xen/arch/x86/physdev.c
> index 2ddcf44f33..a5ed257dca 100644
> --- a/xen/arch/x86/physdev.c
> +++ b/xen/arch/x86/physdev.c
> @@ -140,8 +140,11 @@ int physdev_map_pirq(domid_t domid, int type, int *index, int *pirq_p,
>  
>  int physdev_unmap_pirq(domid_t domid, int pirq)
>  {
> +    struct msi_desc *msi_desc;
> +    struct irq_desc *desc;
> +    struct pirq *info;
>      struct domain *d;
> -    int ret = 0;
> +    int irq, ret = 0;
>  
>      d = rcu_lock_domain_by_any_id(domid);
>      if ( d == NULL )
> @@ -162,9 +165,47 @@ int physdev_unmap_pirq(domid_t domid, int pirq)
>              goto free_domain;
>      }
>  
> +    if ( (pirq < 0) || (pirq >= d->nr_pirqs) ) {
> +        ret = -EINVAL;
> +        goto free_domain;
> +    }
> +
>      pcidevs_lock();
>      spin_lock(&d->event_lock);
> +
> +    info = pirq_info(d, pirq);
> +    irq = info ? info->arch.irq : 0;
> +    if ( !info || irq <= 0 )
> +    {
> +        dprintk(XENLOG_G_ERR, "dom%d: pirq %d not mapped\n",
> +                d->domain_id, pirq);
> +        ret = -EINVAL;
> +        goto unlock;
> +    }
> +
> +    desc = irq_to_desc(irq);
> +    msi_desc = desc->msi_desc;
> +    if ( msi_desc && msi_desc->msi_attrib.type == PCI_CAP_ID_MSI )
> +    {
> +        if ( msi_desc->msi_attrib.entry_nr )
> +        {
> +            printk(XENLOG_G_ERR
> +                   "dom%d: trying to unmap secondary MSI pirq %d\n",
> +                   d->domain_id, pirq);
> +            ret = -EBUSY;
> +            goto unlock;
> +        }
> +    }
> +
> +    ret = xsm_unmap_domain_irq(XSM_HOOK, d, irq,
> +                               msi_desc ? msi_desc->dev : NULL);
> +    if ( ret )
> +        goto unlock;
> +
>      ret = unmap_domain_pirq(d, pirq);
> +
> + unlock:
> +
>      spin_unlock(&d->event_lock);
>      pcidevs_unlock();
>  


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 15:37:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 15:37:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295510.502910 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYrR3-0001Ne-Fw; Mon, 28 Mar 2022 15:37:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295510.502910; Mon, 28 Mar 2022 15:37:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYrR3-0001NX-Be; Mon, 28 Mar 2022 15:37:37 +0000
Received: by outflank-mailman (input) for mailman id 295510;
 Mon, 28 Mar 2022 15:37:36 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=KgrH=UH=tklengyel.com=tamas@srs-se1.protection.inumbo.net>)
 id 1nYrR2-0001AA-1t
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 15:37:36 +0000
Received: from MTA-05-3.privateemail.com (mta-05-3.privateemail.com
 [68.65.122.15]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id fc8a1869-aeac-11ec-a405-831a346695d4;
 Mon, 28 Mar 2022 17:37:35 +0200 (CEST)
Received: from mta-05.privateemail.com (localhost [127.0.0.1])
 by mta-05.privateemail.com (Postfix) with ESMTP id 0EC6C18000B4
 for <xen-devel@lists.xenproject.org>; Mon, 28 Mar 2022 11:37:33 -0400 (EDT)
Received: from mail-oa1-f52.google.com (unknown [10.20.151.165])
 by mta-05.privateemail.com (Postfix) with ESMTPA id DA98F18000BB
 for <xen-devel@lists.xenproject.org>; Mon, 28 Mar 2022 11:37:32 -0400 (EDT)
Received: by mail-oa1-f52.google.com with SMTP id
 586e51a60fabf-deb9295679so8363317fac.6
 for <xen-devel@lists.xenproject.org>; Mon, 28 Mar 2022 08:37:32 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fc8a1869-aeac-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648481853;
	bh=rxHVGE9yKYN13o6xhTm/Fiocdhbl7AVSe/yMgGQDQuY=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=v2NQaOeSTYkOtAXrBcyuxbMbC/D8hT9bzXmkSRZGBJlW84pGabBVFof0/ztki/rbN
	 JQBQPEXo1QFvaF/y/5t6K/mQTn9FL5lBKRsHq5qSwcHrwYZmAhcbSqf9IzJdbOcJef
	 8Mc4mO5eUB2J3wADtvLcKeJ1lraepljLDV2T6PnI6ZYydmJFK92TPPcCJ/iohMmFlN
	 rGGOreXHed3qdHPiJbYATqmWe5sc+Xfq6gM96Mg+hISi72nRcWBCgVPggpeT3G4Oiv
	 67iQBC186EJ47J36+khfxbEPPH5bQ5FLZCxd/Uu+NLX8nANy3JRgc3bWdA+aU/iGNv
	 66GuCP1/2j6Wg==
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648481852;
	bh=rxHVGE9yKYN13o6xhTm/Fiocdhbl7AVSe/yMgGQDQuY=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=hcjcqe6GpCcISGR9zyLwnbSwEd4M7dcRY9teR8gd1Ef0jqlYloNypRv6ZdMS9F/Lu
	 gWDm1NtQDlIOpg72445Vc/o0WNXA6UX5w+tSc3YOnIW7SLQ0cp6+0gPdUN7+u51kw0
	 dgMuE9l9DP9ecnCCkPKiDtXbQjQNid/ArP4Ul9Qj7me0UMZy1/rACVhIPGEorG+xsE
	 sshQMOvo6yax0j85QJ2ezruEbQuS3slUPr1xKJTDbwFO5i2HH6J5VQVvzlKGy1cDLR
	 wisMJwqo4bvsSn3fZHUlxkCwNOzy55eyYw9v5MbSOUlOEeL/MSpNfG4Rr9F2/UkDxn
	 WJuLRk0xF77rw==
X-Gm-Message-State: AOAM5332SygjYXYZmWh0e0FQ6UMXFYi1zQfXZoiXgnLwIg4Igj0++BVp
	NsYpbzbo2GkzXxqWTuwmwbPJj95Ile9jUD9Alt4=
X-Google-Smtp-Source: ABdhPJyZmJjQL0ujPUQCjUxtPEQf4D5zTM+vg0KWjy3CGx4wS69/8WSFrpn+hDQHZHVJ1DNDbpGUisI5ANVI5PCC3II=
X-Received: by 2002:a05:6870:b250:b0:de:afd3:e1c4 with SMTP id
 b16-20020a056870b25000b000deafd3e1c4mr7701668oam.128.1648481852262; Mon, 28
 Mar 2022 08:37:32 -0700 (PDT)
MIME-Version: 1.0
References: <fb927228a8f68ce983ae0b46e6665b5b8dd0764e.1647970630.git.tamas.lengyel@intel.com>
 <d5d8c7bad025a4ef11bf09ad3a4b23c8b4673ff6.1647970630.git.tamas.lengyel@intel.com>
 <1df7130a-ff59-9672-c77d-14e82339c602@suse.com>
In-Reply-To: <1df7130a-ff59-9672-c77d-14e82339c602@suse.com>
From: Tamas K Lengyel <tamas@tklengyel.com>
Date: Mon, 28 Mar 2022 11:36:55 -0400
X-Gmail-Original-Message-ID: <CABfawhnQ-fdhrLYwxi-PzMtUYKWA2VxrFPTeRkAJ811W258_Mw@mail.gmail.com>
Message-ID: <CABfawhnQ-fdhrLYwxi-PzMtUYKWA2VxrFPTeRkAJ811W258_Mw@mail.gmail.com>
Subject: Re: [PATCH 2/3] x86/mem_sharing: use dom_cow as placeholder parent
 until fork is complete
To: Jan Beulich <JBeulich@suse.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>, Andrew Cooper <andrew.cooper3@citrix.com>, 
	=?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>, Wei Liu <wl@xen.org>, 
	George Dunlap <george.dunlap@citrix.com>, xen-devel@lists.xenproject.org
Content-Type: text/plain; charset="UTF-8"
X-Virus-Scanned: ClamAV using ClamSMTP

On Mon, Mar 28, 2022 at 9:32 AM Jan Beulich <jbeulich@suse.com> wrote:
>
> On 22.03.2022 18:41, Tamas K Lengyel wrote:
> > For the duration of the fork memop set dom_cow as a placeholder parent. This
> > gets updated to the real parent when the fork operation completes, or to NULL
> > in case the fork failed.
>
> I am concerned of this, in particular because the state may last across
> perhaps a long series of preemptions. Furthermore ...
>
> > --- a/xen/arch/x86/include/asm/mem_sharing.h
> > +++ b/xen/arch/x86/include/asm/mem_sharing.h
> > @@ -79,7 +79,7 @@ static inline int mem_sharing_unshare_page(struct domain *d,
> >
> >  static inline bool mem_sharing_is_fork(const struct domain *d)
> >  {
> > -    return d->parent;
> > +    return d->parent && d->parent != dom_cow;
> >  }
>
> ... this now makes the function "lie" (the domain is a fork already
> while being constructed). Hence at the very least a comment would want
> to appear here explaining why this is wanted despite not really being
> correct. This "lying" for example means a partly set up fork would be
> skipped by domain_relinquish_resources(), in case the tool stack
> decided to kill the domain instead of waiting for its creation to
> finish.

Hm, yea, domain_relinquish_resources really ought to check if there is
any parent at all, while fork_page needs to check whether there is a
parent and it's not dom_cow. I think I just need two separate
mem_sharing_is_fork functions, one would be the current
mem_sharing_is_fork() and a new one mem_sharing_is_fork_complete(),
that would make it a bit clearer on what they do.

>
> > --- a/xen/arch/x86/mm/mem_sharing.c
> > +++ b/xen/arch/x86/mm/mem_sharing.c
> > @@ -1850,7 +1850,9 @@ static int fork(struct domain *cd, struct domain *d, uint16_t flags)
> >          *cd->arch.cpuid = *d->arch.cpuid;
> >          *cd->arch.msr = *d->arch.msr;
> >          cd->vmtrace_size = d->vmtrace_size;
> > -        cd->parent = d;
> > +
> > +        /* use dom_cow as a placeholder until we are all done */
>
> Nit: As per ./CODING_STYLE you want to at least start the comment with
> a capital letter.

Ack.

Thanks,
Tamas


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 16:05:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 16:05:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295515.502926 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYrrY-0005MW-MM; Mon, 28 Mar 2022 16:05:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295515.502926; Mon, 28 Mar 2022 16:05:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYrrY-0005MP-JI; Mon, 28 Mar 2022 16:05:00 +0000
Received: by outflank-mailman (input) for mailman id 295515;
 Mon, 28 Mar 2022 16:05:00 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYrrY-0005MF-7L; Mon, 28 Mar 2022 16:05:00 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYrrY-0000Of-3t; Mon, 28 Mar 2022 16:05:00 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYrrX-0004xS-Mg; Mon, 28 Mar 2022 16:04:59 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nYrrX-0007dC-MF; Mon, 28 Mar 2022 16:04:59 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=KeUZXAQQspcgk9827nhbET3eurDA2k9dXsZKJJ3xLXI=; b=TmJH+o/P3gS7qQaxxrYWwj7rIJ
	QQ73bv40tOUTsr99P8bf+6bOI1wM2xzdMAQlEt5yGHgvAkVOgppWazsmdo/x1S4ByzusKzVusqCu2
	xskj6TlOjAF1fAAy8BvSBcD5SBIU7rb40DjLnyBE5tjS07krRdvrHzB6nJm+2ft3CWYE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168917-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168917: trouble: blocked/broken/pass
X-Osstest-Failures:
    xen-unstable:build-amd64:<job status>:broken:regression
    xen-unstable:build-amd64-prev:<job status>:broken:regression
    xen-unstable:build-amd64-pvops:<job status>:broken:regression
    xen-unstable:build-amd64-xsm:<job status>:broken:regression
    xen-unstable:build-amd64-xtf:<job status>:broken:regression
    xen-unstable:build-arm64:<job status>:broken:regression
    xen-unstable:build-arm64-pvops:<job status>:broken:regression
    xen-unstable:build-arm64-xsm:<job status>:broken:regression
    xen-unstable:build-armhf-pvops:<job status>:broken:regression
    xen-unstable:build-i386:<job status>:broken:regression
    xen-unstable:build-i386-prev:<job status>:broken:regression
    xen-unstable:build-i386-pvops:<job status>:broken:regression
    xen-unstable:build-i386-xsm:<job status>:broken:regression
    xen-unstable:build-amd64-xtf:host-install(4):broken:regression
    xen-unstable:build-i386:host-install(4):broken:regression
    xen-unstable:build-i386-prev:host-install(4):broken:regression
    xen-unstable:build-i386-pvops:host-install(4):broken:regression
    xen-unstable:build-i386-xsm:host-install(4):broken:regression
    xen-unstable:build-arm64-xsm:host-install(4):broken:regression
    xen-unstable:build-arm64-pvops:host-install(4):broken:regression
    xen-unstable:build-arm64:host-install(4):broken:regression
    xen-unstable:build-amd64-pvops:host-install(4):broken:regression
    xen-unstable:build-amd64:host-install(4):broken:regression
    xen-unstable:build-amd64-prev:host-install(4):broken:regression
    xen-unstable:build-amd64-xsm:host-install(4):broken:regression
    xen-unstable:build-armhf-pvops:host-install(4):broken:regression
    xen-unstable:test-amd64-i386-livepatch:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-migrupgrade:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-pair:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-qemut-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-qemut-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-qemuu-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-qemuu-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-shadow:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-vhd:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-examine:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-rtds:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-unstable:build-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qcow2:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-pvshim:build-check(1):blocked:nonblocking
    xen-unstable:build-arm64-libvirt:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-pvhv2-intel:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-pvhv2-amd:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-credit2:build-check(1):blocked:nonblocking
    xen-unstable:build-i386-libvirt:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-credit1:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-dom0pvh-xl-amd:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-dom0pvh-xl-intel:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-intel:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-examine:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-examine-bios:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-examine-uefi:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-freebsd12-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-freebsd11-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-pygrub:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-livepatch:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-migrupgrade:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-pair:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-shadow:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-coresched-amd64-xl:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-coresched-i386-xl:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-examine:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-examine-bios:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-examine-uefi:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-freebsd10-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-freebsd10-i386:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-examine:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-xl:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:build-check(1):blocked:nonblocking
    xen-unstable:test-xtf-amd64-amd64-1:build-check(1):blocked:nonblocking
    xen-unstable:test-xtf-amd64-amd64-2:build-check(1):blocked:nonblocking
    xen-unstable:test-xtf-amd64-amd64-3:build-check(1):blocked:nonblocking
    xen-unstable:test-xtf-amd64-amd64-4:build-check(1):blocked:nonblocking
    xen-unstable:test-xtf-amd64-amd64-5:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    xen=fc90d75c2b71ae15b75128e7d0d4dbe718164ecb
X-Osstest-Versions-That:
    xen=0e03ff97def12b121b5313094a76e5db7bb5c93c
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 28 Mar 2022 16:04:59 +0000

flight 168917 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168917/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-prev                <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-amd64-xtf                 <job status>                 broken
 build-arm64                     <job status>                 broken
 build-arm64-pvops               <job status>                 broken
 build-arm64-xsm                 <job status>                 broken
 build-armhf-pvops               <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-prev                 <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-amd64-xtf               4 host-install(4)        broken REGR. vs. 168855
 build-i386                    4 host-install(4)        broken REGR. vs. 168855
 build-i386-prev               4 host-install(4)        broken REGR. vs. 168855
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168855
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168855
 build-arm64-xsm               4 host-install(4)        broken REGR. vs. 168855
 build-arm64-pvops             4 host-install(4)        broken REGR. vs. 168855
 build-arm64                   4 host-install(4)        broken REGR. vs. 168855
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 168855
 build-amd64                   4 host-install(4)        broken REGR. vs. 168855
 build-amd64-prev              4 host-install(4)        broken REGR. vs. 168855
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 168855
 build-armhf-pvops             4 host-install(4)        broken REGR. vs. 168855

Tests which did not succeed, but are not blocking:
 test-amd64-i386-livepatch     1 build-check(1)               blocked  n/a
 test-amd64-i386-migrupgrade   1 build-check(1)               blocked  n/a
 test-amd64-i386-pair          1 build-check(1)               blocked  n/a
 test-amd64-i386-qemut-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemut-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-qemuu-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-xl            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-pvshim     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemut-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1)  blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-shadow     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-vhd        1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-xsm        1 build-check(1)               blocked  n/a
 test-arm64-arm64-examine      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl           1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-rtds      1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ws16-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qemut-ws16-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemut-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qcow2     1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvshim    1 build-check(1)               blocked  n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit2   1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit1   1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl           1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-intel  1 build-check(1)              blocked n/a
 test-amd64-amd64-examine      1 build-check(1)               blocked  n/a
 test-amd64-amd64-examine-bios  1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-examine-uefi  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-freebsd12-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-qemuu-freebsd11-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pygrub       1 build-check(1)               blocked  n/a
 test-amd64-amd64-livepatch    1 build-check(1)               blocked  n/a
 test-amd64-amd64-migrupgrade  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pair         1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemut-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemut-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-amd64-xl-shadow    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-xsm       1 build-check(1)               blocked  n/a
 test-amd64-coresched-amd64-xl  1 build-check(1)               blocked  n/a
 test-amd64-coresched-i386-xl  1 build-check(1)               blocked  n/a
 test-amd64-i386-examine       1 build-check(1)               blocked  n/a
 test-amd64-i386-examine-bios  1 build-check(1)               blocked  n/a
 test-amd64-i386-examine-uefi  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-amd64  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-i386  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 test-armhf-armhf-examine      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-arndale   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit1   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-cubietruck  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-rtds      1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-vhd       1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-1        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-2        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-3        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-4        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-5        1 build-check(1)               blocked  n/a

version targeted for testing:
 xen                  fc90d75c2b71ae15b75128e7d0d4dbe718164ecb
baseline version:
 xen                  0e03ff97def12b121b5313094a76e5db7bb5c93c

Last test of basis   168855  2022-03-25 14:37:04 Z    3 days
Testing same since   168867  2022-03-25 23:39:47 Z    2 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>

jobs:
 build-amd64-xsm                                              broken  
 build-arm64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64-xtf                                              broken  
 build-amd64                                                  broken  
 build-arm64                                                  broken  
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-prev                                             broken  
 build-i386-prev                                              broken  
 build-amd64-pvops                                            broken  
 build-arm64-pvops                                            broken  
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-xtf-amd64-amd64-1                                       blocked 
 test-xtf-amd64-amd64-2                                       blocked 
 test-xtf-amd64-amd64-3                                       blocked 
 test-xtf-amd64-amd64-4                                       blocked 
 test-xtf-amd64-amd64-5                                       blocked 
 test-amd64-amd64-xl                                          blocked 
 test-amd64-coresched-amd64-xl                                blocked 
 test-arm64-arm64-xl                                          blocked 
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           blocked 
 test-amd64-coresched-i386-xl                                 blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        blocked 
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         blocked 
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-xl-xsm                                      blocked 
 test-arm64-arm64-xl-xsm                                      blocked 
 test-amd64-i386-xl-xsm                                       blocked 
 test-amd64-amd64-qemuu-nested-amd                            blocked 
 test-amd64-amd64-xl-pvhv2-amd                                blocked 
 test-amd64-i386-qemut-rhel6hvm-amd                           blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-dom0pvh-xl-amd                              blocked 
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemut-debianhvm-amd64                     blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     blocked 
 test-amd64-i386-freebsd10-amd64                              blocked 
 test-amd64-amd64-qemuu-freebsd11-amd64                       blocked 
 test-amd64-amd64-qemuu-freebsd12-amd64                       blocked 
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         blocked 
 test-amd64-i386-xl-qemut-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         blocked 
 test-amd64-i386-xl-qemuu-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemut-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemut-ws16-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ws16-amd64                          blocked 
 test-armhf-armhf-xl-arndale                                  blocked 
 test-amd64-amd64-examine-bios                                blocked 
 test-amd64-i386-examine-bios                                 blocked 
 test-amd64-amd64-xl-credit1                                  blocked 
 test-arm64-arm64-xl-credit1                                  blocked 
 test-armhf-armhf-xl-credit1                                  blocked 
 test-amd64-amd64-xl-credit2                                  blocked 
 test-arm64-arm64-xl-credit2                                  blocked 
 test-armhf-armhf-xl-credit2                                  blocked 
 test-armhf-armhf-xl-cubietruck                               blocked 
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        blocked 
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         blocked 
 test-amd64-amd64-examine                                     blocked 
 test-arm64-arm64-examine                                     blocked 
 test-armhf-armhf-examine                                     blocked 
 test-amd64-i386-examine                                      blocked 
 test-amd64-i386-freebsd10-i386                               blocked 
 test-amd64-amd64-qemuu-nested-intel                          blocked 
 test-amd64-amd64-xl-pvhv2-intel                              blocked 
 test-amd64-i386-qemut-rhel6hvm-intel                         blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-amd64-dom0pvh-xl-intel                            blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-livepatch                                   blocked 
 test-amd64-i386-livepatch                                    blocked 
 test-amd64-amd64-migrupgrade                                 blocked 
 test-amd64-i386-migrupgrade                                  blocked 
 test-amd64-amd64-xl-multivcpu                                blocked 
 test-armhf-armhf-xl-multivcpu                                blocked 
 test-amd64-amd64-pair                                        blocked 
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-amd64-amd64-xl-pvshim                                   blocked 
 test-amd64-i386-xl-pvshim                                    blocked 
 test-amd64-amd64-pygrub                                      blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-amd64-amd64-xl-qcow2                                    blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-xl-rtds                                     blocked 
 test-armhf-armhf-xl-rtds                                     blocked 
 test-arm64-arm64-xl-seattle                                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              blocked 
 test-amd64-amd64-xl-shadow                                   blocked 
 test-amd64-i386-xl-shadow                                    blocked 
 test-arm64-arm64-xl-thunderx                                 blocked 
 test-amd64-amd64-examine-uefi                                blocked 
 test-amd64-i386-examine-uefi                                 blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 
 test-arm64-arm64-xl-vhd                                      blocked 
 test-armhf-armhf-xl-vhd                                      blocked 
 test-amd64-i386-xl-vhd                                       blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-prev broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-amd64-xtf broken
broken-job build-arm64 broken
broken-job build-arm64-pvops broken
broken-job build-arm64-xsm broken
broken-job build-armhf-pvops broken
broken-job build-i386 broken
broken-job build-i386-prev broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-amd64-xtf host-install(4)
broken-step build-i386 host-install(4)
broken-step build-i386-prev host-install(4)
broken-step build-i386-pvops host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step build-arm64-xsm host-install(4)
broken-step build-arm64-pvops host-install(4)
broken-step build-arm64 host-install(4)
broken-step build-amd64-pvops host-install(4)
broken-step build-amd64 host-install(4)
broken-step build-amd64-prev host-install(4)
broken-step build-amd64-xsm host-install(4)
broken-step build-armhf-pvops host-install(4)

Not pushing.

------------------------------------------------------------
commit fc90d75c2b71ae15b75128e7d0d4dbe718164ecb
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date:   Mon Feb 28 19:31:00 2022 +0000

    x86/cet: Remove XEN_SHSTK's dependency on EXPERT
    
    CET-SS hardware is now available from multiple vendors, the feature has
    downstream users, and was declared security supported in XSA-398.
    
    Enable it by default.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
    Reviewed-by: Juergen Gross <jgross@suse.com>
(qemu changes not included)


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 16:21:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 16:21:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295525.502943 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYs7q-0007tB-B1; Mon, 28 Mar 2022 16:21:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295525.502943; Mon, 28 Mar 2022 16:21:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYs7q-0007t4-88; Mon, 28 Mar 2022 16:21:50 +0000
Received: by outflank-mailman (input) for mailman id 295525;
 Mon, 28 Mar 2022 16:21:49 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=9vXr=UH=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nYs7o-0007sy-WC
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 16:21:49 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 29f086d1-aeb3-11ec-a405-831a346695d4;
 Mon, 28 Mar 2022 18:21:46 +0200 (CEST)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id 85ED1B80FB5;
 Mon, 28 Mar 2022 16:21:46 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id A805AC004DD;
 Mon, 28 Mar 2022 16:21:44 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 29f086d1-aeb3-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1648484505;
	bh=uRYN3bBgKEd3lJ7mQSLDvJ9fEn6gxA4nHhXk5dX+5Tg=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=MA69E8Z+kZmWhUgwjousYekH46+YoU5pIY/gIa5kKxorQYo/FkHw14j4N89IrRGSP
	 kA9k+ROGg75WZ7HdV2s1fXEvY0f+Q7kn63btSLzFAbfURg7uEnVeGsmSllIzigH1kg
	 Bo6jxtvUEY4CgEJG5JlNSefe2xsLo2+Wq6EKzDkIyZHKmSdfYwI7XNUxi4hT6OqBkZ
	 gYpIfQUykAbvOeqafeqTnDQw3YgrPlwlh4h+dBNxde1jhLmrjTBjXNZZ/0jB9Ux0uf
	 r7gPyTmCupWYryuLuG2JT8fiigFiwjBgZUH3kJNk9v5RAF+O3+jSxLkb/k2j/lX7U/
	 HfiWclM+wfRsw==
Date: Mon, 28 Mar 2022 09:21:43 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Luca Fancellu <Luca.Fancellu@arm.com>
cc: Stefano Stabellini <sstabellini@kernel.org>, 
    Xen-devel <xen-devel@lists.xenproject.org>, 
    Bertrand Marquis <Bertrand.Marquis@arm.com>, Wei Chen <Wei.Chen@arm.com>, 
    Julien Grall <julien@xen.org>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, 
    Andrew Cooper <andrew.cooper3@citrix.com>, 
    George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, 
    Wei Liu <wl@xen.org>, Juergen Gross <jgross@suse.com>, 
    Dario Faggioli <dfaggioli@suse.com>
Subject: Re: [PATCH v4 4/6] xen/cpupool: Create different cpupools at boot
 time
In-Reply-To: <960D7451-2186-4950-80B7-B3F5C961336D@arm.com>
Message-ID: <alpine.DEB.2.22.394.2203280918270.2910984@ubuntu-linux-20-04-desktop>
References: <20220324140633.39674-1-luca.fancellu@arm.com> <20220324140633.39674-5-luca.fancellu@arm.com> <alpine.DEB.2.22.394.2203251539510.2910984@ubuntu-linux-20-04-desktop> <960D7451-2186-4950-80B7-B3F5C961336D@arm.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="8323329-537196217-1648484505=:2910984"

  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--8323329-537196217-1648484505=:2910984
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8BIT

On Mon, 28 Mar 2022, Luca Fancellu wrote:
> >> +
> >> +        if ( !dt_property_read_string(phandle_node, "cpupool-sched",
> > 
> > This should be "node", not phandle_node
> 
> Hi Stefano,
> 
> Yes sorry about that, I didn’t notice it because in my last test I was creating pools
> with default scheduler, I will pay more attention next time, same applies to the
> scheduler swap. I’ll fix them in next serie

All right, thanks


> >> +                                      &scheduler_name) )
> >> +            sched_id = check_and_get_sched_id(scheduler_name);
> > 
> > It would be nice if we had XENLOG_INFO printks to print at boot for each
> > CPU:
> > - the PoolID
> > - the scheduler name
> > Not required, but I had to add them to figure out exactly what was going
> > on.
> 
> I’ve added a printk in btcpupools_get_cpupool_id, do you want me to remove from
> there and print here? 

I don't particularly mind where the printks are added as long as they
get printed once with XENLOG_INFO :-)

In this version of the series the scheduler name (or the ID) was
missing. I was asking because for testing purposes one would like to
know the combinations [CPU -- PoolID -- Scheduler].
--8323329-537196217-1648484505=:2910984--


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 16:25:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 16:25:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295528.502955 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYsB0-0008Tj-QD; Mon, 28 Mar 2022 16:25:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295528.502955; Mon, 28 Mar 2022 16:25:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYsB0-0008Tc-NA; Mon, 28 Mar 2022 16:25:06 +0000
Received: by outflank-mailman (input) for mailman id 295528;
 Mon, 28 Mar 2022 16:25:05 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nYsAz-0008TU-Kt
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 16:25:05 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nYsAy-0000jo-Fr; Mon, 28 Mar 2022 16:25:04 +0000
Received: from [54.239.6.185] (helo=[192.168.7.207])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nYsAy-0008JG-9A; Mon, 28 Mar 2022 16:25:04 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=vyVttO0mpx+DvefUB+zwyjb9MWr1/LRrnzp0cm9giqw=; b=6KjovLon2yzRQcC+pfbcwhgjhC
	DNkEyp/DTN3UAiOj5+81OMcwZ6Bs0ACWvEucJt/HbV2qZNua9/+DPJTG29HhlV7PRgNrK7JE5qAIV
	F+MF8vAKxxpAvzdjZHXqTwmuZJEQWLqfE/YEcWWObRXe0bcoqavsCDivg8A8lTSb5o1g=;
Message-ID: <07fa2884-e497-250b-53ab-dd452b501920@xen.org>
Date: Mon, 28 Mar 2022 17:25:01 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v3 5/5] tools: add example application to initialize
 dom0less PV drivers
To: Stefano Stabellini <sstabellini@kernel.org>
Cc: xen-devel@lists.xenproject.org, jgross@suse.com,
 Bertrand.Marquis@arm.com, Volodymyr_Babchuk@epam.com,
 Luca Miccio <lucmiccio@gmail.com>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>, Wei Liu <wl@xen.org>,
 Anthony PERARD <anthony.perard@citrix.com>
References: <alpine.DEB.2.22.394.2201281330520.27308@ubuntu-linux-20-04-desktop>
 <20220128213307.2822078-5-sstabellini@kernel.org>
 <395710eb-ba51-eb67-1519-2a949326f699@xen.org>
 <alpine.DEB.2.22.394.2203221821520.2910984@ubuntu-linux-20-04-desktop>
From: Julien Grall <julien@xen.org>
In-Reply-To: <alpine.DEB.2.22.394.2203221821520.2910984@ubuntu-linux-20-04-desktop>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Stefano,

On 23/03/2022 02:50, Stefano Stabellini wrote:
> On Sat, 29 Jan 2022, Julien Grall wrote:
>> On 28/01/2022 21:33, Stefano Stabellini wrote:
>>> +    libxl_uuid uuid;
>>> +    uint64_t v;
>>> +    int rc;
>>> +
>>> +    printf("Init dom0less domain: %d\n", info->domid);
>>> +    dom.guest_domid = info->domid;
>>> +    dom.xenstore_domid = 0;
>>> +    dom.xch = xc_interface_open(0, 0, 0);
>>> +
>>> +    rc = xc_hvm_param_get(dom.xch, info->domid, HVM_PARAM_STORE_EVTCHN,
>>> &v);
>>> +    if (rc != 0) {
>>> +        printf("Failed to get HVM_PARAM_STORE_EVTCHN\n");
>>> +        return 1;
>>> +    }
>>> +    dom.xenstore_evtchn = v;
>>> +
>>> +    /* Console won't be initialized but set its data for completeness */
>>> +    dom.console_domid = 0;
>>
>> I find a bit odd you set the domid but not the event channel, page. Can you
>> explain?
>>
>> Actually, can you explain why only half of the structure is initialized?
>   
> We are only using the struct xc_dom_image parameter for
> xc_dom_gnttab_init, and nothing else. We only need very few fields in
> it. Basically we could call xc_dom_gnttab_seed directly and then we
> wouldn't need struct xc_dom_image at all. Only the needed fields are
> currently populated.

I would prefer if we don't use xc_dom_image and call 
xc_dom_gnttab_seed(). This would:
   1) reduce the risk that one of the unitialized field is will be 
mistakenly use
   2) extra documentation (currently missing) to explain which fields is 
used.

>>> +
>>> +    /* Alloc magic pages */
>>> +    if (alloc_magic_pages(info, &dom) != 0) {
>>> +        printf("Error on alloc magic pages\n");
>>> +        return 1;
>>> +    }
>>> +
>>> +    xc_dom_gnttab_init(&dom);
>>
>> This call as the risk to break the guest if the dom0 Linux doesn't support the
>> acquire interface. This is because it will punch a hole in the domain memory
>> where the grant-table may have already been mapped.
>>
>> Also, this function could fails.
> 
> I'll check for return errors. Dom0less is for fully static
> configurations so I think it is OK to return error and abort if
> something unexpected happens: dom0less' main reason for being is that
> there is nothing unexpected :-)
Does this mean the caller will have to reboot the system if there is an 
error? IOW, we don't expect them to call ./init-dom0less twice.

>>> +
>>> +    libxl_uuid_generate(&uuid);
>>> +    xc_domain_sethandle(dom.xch, info->domid, libxl_uuid_bytearray(&uuid));
>>> +
>>> +    rc = gen_stub_json_config(info->domid, &uuid);
>>> +    if (rc)
>>> +        err(1, "gen_stub_json_config");
>>> +
>>> +    rc = restore_xenstore(xsh, info, uuid, dom.xenstore_evtchn);
>>> +    if (rc)
>>> +        err(1, "writing to xenstore");
>>> +
>>> +    xs_introduce_domain(xsh, info->domid,
>>> +            (GUEST_MAGIC_BASE >> XC_PAGE_SHIFT) + XENSTORE_PFN_OFFSET,
>>> +            dom.xenstore_evtchn);
>>
>> xs_introduce_domain() can technically fails.
> 
> OK
> 
> 
>>> +    return 0;
>>> +}
>>> +
>>> +/* Check if domain has been configured in XS */
>>> +static bool domain_exists(struct xs_handle *xsh, int domid)
>>> +{
>>> +    return xs_is_domain_introduced(xsh, domid);
>>> +}
>>
>> Would not this lead to initialize a domain with PV driver disabled?
> 
> I am not sure I understood your question, but I'll try to answer anyway.
> This check is purely to distinguish dom0less guests, which needs further
> initializations, from regular guests (e.g. xl guests) that don't need
> any actions taken here.

Dom0less domUs can be divided in two categories based on whether they 
are xen aware (e.g. xen,enhanced is set).

Looking at this script, it seems to assume that all dom0less domUs are 
Xen aware. So it will end up to allocate Xenstore ring and call 
xs_introduce_domain(). I suspect the call will end up to fail because 
the event channel would be 0.

So did you try to use this script on a platform where there only xen 
aware domU and/or a mix?

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 16:35:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 16:35:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295531.502965 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYsLH-0001bj-Ox; Mon, 28 Mar 2022 16:35:43 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295531.502965; Mon, 28 Mar 2022 16:35:43 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYsLH-0001bc-Lt; Mon, 28 Mar 2022 16:35:43 +0000
Received: by outflank-mailman (input) for mailman id 295531;
 Mon, 28 Mar 2022 16:35:42 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3mb0=UH=apertussolutions.com=dpsmith@srs-se1.protection.inumbo.net>)
 id 1nYsLF-0001bP-MQ
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 16:35:41 +0000
Received: from sender4-of-o51.zoho.com (sender4-of-o51.zoho.com
 [136.143.188.51]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 189181fc-aeb5-11ec-a405-831a346695d4;
 Mon, 28 Mar 2022 18:35:39 +0200 (CEST)
Received: from sisyou.hme. (static-72-81-132-2.bltmmd.fios.verizon.net
 [72.81.132.2]) by mx.zohomail.com
 with SMTPS id 1648485332535493.0992602782029;
 Mon, 28 Mar 2022 09:35:32 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 189181fc-aeb5-11ec-a405-831a346695d4
ARC-Seal: i=1; a=rsa-sha256; t=1648485334; cv=none; 
	d=zohomail.com; s=zohoarc; 
	b=AuxhZiSizSrTt6uFL8noR1zwcYqQ+mwJHswRmYUavt4CriU2+Nkg+E5KrIl2gIShNWujYkkp+7W4kunG+hWuhoxboTtLZ1xRF9u0AzAkytcx3+h6VGbZR/99qIj1gXnN1uYhXQ7C5bd+wR/CAW7O2yye8/RYUgg3ig5Ox00NszE=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; 
	t=1648485334; h=Content-Transfer-Encoding:Cc:Date:From:MIME-Version:Message-ID:Subject:To; 
	bh=rVSicid7cDP30cTP7xbd0CtnuhwtVXsNfPS2mJ2odxM=; 
	b=Jt0xt/T/0Rz71KuHa6zuWpMAcgDyZiUvTgYzbKm4lEx6z88v2PHKcY7uJgBjYm3FIyYmY0sHSbNWLsD0wnfEFEPq96N9FEOZUZHrANdvKzVZBMbZic06PnB+clql8IXwr59r2uNv5hoMj+IovkV809S/UCu7NaX7cnDLTR0WgrQ=
ARC-Authentication-Results: i=1; mx.zohomail.com;
	dkim=pass  header.i=apertussolutions.com;
	spf=pass  smtp.mailfrom=dpsmith@apertussolutions.com;
	dmarc=pass header.from=<dpsmith@apertussolutions.com>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1648485334;
	s=zoho; d=apertussolutions.com; i=dpsmith@apertussolutions.com;
	h=From:From:To:To:Cc:Cc:Subject:Subject:Date:Message-Id:Message-Id:MIME-Version:Content-Transfer-Encoding:Reply-To;
	bh=rVSicid7cDP30cTP7xbd0CtnuhwtVXsNfPS2mJ2odxM=;
	b=sbF8yx5QlHpQLANJ2Q+nGv8QxdV+s5LYtle4OSem00wnx7f1K/G8YKRE2YgZouX3
	nWc+VtiBP/I4UeaVGCM2ecxHDAkjPJ2wy2OK0mislfLly8k5M6f2u8HFHfYNtO5zFv7
	XT4ZIKgk9kivEF9cYZpI/VdINqo2XnguWeGZwvVE=
From: "Daniel P. Smith" <dpsmith@apertussolutions.com>
To: xen-devel@lists.xenproject.org
Cc: "Daniel P. Smith" <dpsmith@apertussolutions.com>,
	scott.davis@starlab.io,
	jandryuk@gmail.com,
	sstabellini@kernel.org
Subject: [RFC PATCH 0/1] allow system domains to allocate event channels
Date: Mon, 28 Mar 2022 16:36:21 -0400
Message-Id: <20220328203622.30961-1-dpsmith@apertussolutions.com>
X-Mailer: git-send-email 2.20.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-ZohoMailClient: External

In the discussion thread on patch `[PATCH v3 2/5] xen: make
evtchn_alloc_unbound public` there were a few suggestions on the appropriate
way to handle allowing the hypervisor to allocate event channels for domains
being constructed by dom0less and hyerplaunch. After taking another look at how
to generalize the suggested approach to temporarily promote the idle domain to
`is_privileged` it became clear there was a simpler and a longer term fix.

Since it was not discussed and with others are on limited time, I have not done
any testing beyond making sure this compiles and therefore I am sending this as
an RFC to allow everyone to review it. This also provides a patch should
dom0less would like to include it into their patch series.

Daniel P. Smith (1):
  xsm: allows system domains to allocate evtchn

 xen/common/event_channel.c | 4 ++--
 xen/include/xsm/dummy.h    | 8 ++++++--
 2 files changed, 8 insertions(+), 4 deletions(-)

-- 
2.20.1



From xen-devel-bounces@lists.xenproject.org Mon Mar 28 16:35:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 16:35:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295532.502976 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYsLP-0001ta-0I; Mon, 28 Mar 2022 16:35:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295532.502976; Mon, 28 Mar 2022 16:35:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYsLO-0001tT-Te; Mon, 28 Mar 2022 16:35:50 +0000
Received: by outflank-mailman (input) for mailman id 295532;
 Mon, 28 Mar 2022 16:35:49 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3mb0=UH=apertussolutions.com=dpsmith@srs-se1.protection.inumbo.net>)
 id 1nYsLM-0001bP-SI
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 16:35:48 +0000
Received: from sender4-of-o51.zoho.com (sender4-of-o51.zoho.com
 [136.143.188.51]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 1e27243e-aeb5-11ec-a405-831a346695d4;
 Mon, 28 Mar 2022 18:35:47 +0200 (CEST)
Received: from sisyou.hme. (static-72-81-132-2.bltmmd.fios.verizon.net
 [72.81.132.2]) by mx.zohomail.com
 with SMTPS id 16484853341111019.3383598102412;
 Mon, 28 Mar 2022 09:35:34 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1e27243e-aeb5-11ec-a405-831a346695d4
ARC-Seal: i=1; a=rsa-sha256; t=1648485335; cv=none; 
	d=zohomail.com; s=zohoarc; 
	b=igLa5rrgqXD8BtnvtWDcd8QtD2YhuJsidTbhq8xclPYX8W8sVoSoQPcy7ZQZLgYYCfog6EgdvHbNZjrgnC/RZHaK80oHBdV0/rSQ2L2WoNx5naw2QjyC55MPvJeG4Y1Ik/tskn+HEcQMFrdFVLQ9tumRbqN6Qk74P13Asi1bEEU=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; 
	t=1648485335; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; 
	bh=uUcmLp9iUV0l9g/8T7dC0MuLoMQAvOO25/oX3bNXbyA=; 
	b=adFuagm5xE9KYVSQMY2U+DnT61D/bo1d0TlEtb5p//SohFBDAM2zT1ZsT+MDq8lfxdFcVBG6ezhMDGjkfPeUGGVv3x5hp48YXjD9a9EQD22XCVHGOg1lLEWReXR0meGjaFtYlu0lVukfSAOvK5Bq80kYrHF/YHx7CCCEoteaUas=
ARC-Authentication-Results: i=1; mx.zohomail.com;
	dkim=pass  header.i=apertussolutions.com;
	spf=pass  smtp.mailfrom=dpsmith@apertussolutions.com;
	dmarc=pass header.from=<dpsmith@apertussolutions.com>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1648485335;
	s=zoho; d=apertussolutions.com; i=dpsmith@apertussolutions.com;
	h=From:From:To:To:Cc:Cc:Subject:Subject:Date:Message-Id:Message-Id:In-Reply-To:References:MIME-Version:Content-Transfer-Encoding:Reply-To;
	bh=uUcmLp9iUV0l9g/8T7dC0MuLoMQAvOO25/oX3bNXbyA=;
	b=EfY7jhppw9ObHMCEsgHyVx6XeGiCZU/kVOmkxKKt2r+5iyB9yVfQZeRzHwSPu4Wl
	5iAugho6+BZ9jm6GB7l5pXm1BLi0flK7ck3nUzWddJTvu+gD6/8rBm0F5l1cewWNEx3
	FCdXuaA9tkzsl+DmvyErAJ0HX10n3g+B64rzvJrA=
From: "Daniel P. Smith" <dpsmith@apertussolutions.com>
To: "Daniel P. Smith" <dpsmith@apertussolutions.com>,
	xen-devel@lists.xenproject.org
Cc: scott.davis@starlab.io,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>,
	Daniel De Graaf <dgdegra@tycho.nsa.gov>
Subject: [RFC PATCH 1/1] xsm: allows system domains to allocate evtchn
Date: Mon, 28 Mar 2022 16:36:22 -0400
Message-Id: <20220328203622.30961-2-dpsmith@apertussolutions.com>
X-Mailer: git-send-email 2.20.1
In-Reply-To: <20220328203622.30961-1-dpsmith@apertussolutions.com>
References: <20220328203622.30961-1-dpsmith@apertussolutions.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-ZohoMailClient: External

During domain construction under dom0less and hyperlaunch it is necessary to
allocate at least the event channel for xenstore and potentially the event
channel for the core console. When dom0less and hyperlaunch are doing their
construction logic they are executing under the idle domain context. The idle
domain is not a privileged domain, it is not the target domain, and as a result
under the current default XSM policy is not allowed to allocate the event
channel.

This patch only addresses the event channel situation by adjust the default XSM
policy for xsm_evtchn_unbound to explicitly allow system domains to be able to
make the allocation call.

Signed-off-by: Daniel P. Smith <dpsmith@apertussolutions.com>
---
 xen/common/event_channel.c | 4 ++--
 xen/include/xsm/dummy.h    | 8 ++++++--
 2 files changed, 8 insertions(+), 4 deletions(-)

diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c
index ffb042a241..c9c3876ee9 100644
--- a/xen/common/event_channel.c
+++ b/xen/common/event_channel.c
@@ -306,7 +306,7 @@ static int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
         ERROR_EXIT_DOM(port, d);
     chn = evtchn_from_port(d, port);
 
-    rc = xsm_evtchn_unbound(XSM_TARGET, d, chn, alloc->remote_dom);
+    rc = xsm_evtchn_unbound(XSM_OTHER, d, chn, alloc->remote_dom);
     if ( rc )
         goto out;
 
@@ -1366,7 +1366,7 @@ int alloc_unbound_xen_event_channel(
         goto out;
     chn = evtchn_from_port(ld, port);
 
-    rc = xsm_evtchn_unbound(XSM_TARGET, ld, chn, remote_domid);
+    rc = xsm_evtchn_unbound(XSM_OTHER, ld, chn, remote_domid);
     if ( rc )
         goto out;
 
diff --git a/xen/include/xsm/dummy.h b/xen/include/xsm/dummy.h
index 58afc1d589..bd31ce43f9 100644
--- a/xen/include/xsm/dummy.h
+++ b/xen/include/xsm/dummy.h
@@ -294,8 +294,12 @@ static XSM_INLINE int cf_check xsm_claim_pages(XSM_DEFAULT_ARG struct domain *d)
 static XSM_INLINE int cf_check xsm_evtchn_unbound(
     XSM_DEFAULT_ARG struct domain *d, struct evtchn *chn, domid_t id2)
 {
-    XSM_ASSERT_ACTION(XSM_TARGET);
-    return xsm_default_action(action, current->domain, d);
+    XSM_ASSERT_ACTION(XSM_OTHER);
+
+    if ( is_system_domain(current->domain) )
+        return xsm_default_action(XSM_HOOK, current->domain, d);
+    else
+        return xsm_default_action(XSM_TARGET, current->domain, d);
 }
 
 static XSM_INLINE int cf_check xsm_evtchn_interdomain(
-- 
2.20.1



From xen-devel-bounces@lists.xenproject.org Mon Mar 28 16:38:31 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 16:38:31 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295541.502987 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYsNx-0002qp-DS; Mon, 28 Mar 2022 16:38:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295541.502987; Mon, 28 Mar 2022 16:38:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYsNx-0002qi-Ae; Mon, 28 Mar 2022 16:38:29 +0000
Received: by outflank-mailman (input) for mailman id 295541;
 Mon, 28 Mar 2022 16:38:28 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=adjj=UH=gmail.com=dpsmith.dev@srs-se1.protection.inumbo.net>)
 id 1nYsNw-0002q9-0v
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 16:38:28 +0000
Received: from mail-qt1-x82a.google.com (mail-qt1-x82a.google.com
 [2607:f8b0:4864:20::82a])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 7dcd92d1-aeb5-11ec-8fbc-03012f2f19d4;
 Mon, 28 Mar 2022 18:38:27 +0200 (CEST)
Received: by mail-qt1-x82a.google.com with SMTP id s11so12859707qtc.3
 for <xen-devel@lists.xenproject.org>; Mon, 28 Mar 2022 09:38:27 -0700 (PDT)
Received: from [10.10.1.138] (static-72-81-132-2.bltmmd.fios.verizon.net.
 [72.81.132.2]) by smtp.gmail.com with ESMTPSA id
 x20-20020ac85f14000000b002e1ee1c56c3sm13234221qta.76.2022.03.28.09.38.24
 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);
 Mon, 28 Mar 2022 09:38:25 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 7dcd92d1-aeb5-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=message-id:date:mime-version:user-agent:subject:content-language:to
         :cc:references:from:in-reply-to:content-transfer-encoding;
        bh=lJLK+tB0ni0ja4j9Yr/gTepZKHNAR1orKeHG5e5VqQE=;
        b=NmisP1LW7TDrC+FAzA6UBpS5bC9hHSJusxGT1AEGDVA5NFeJuI631j58lDcZkXZpeo
         +8ZwNsLwlu00QKsoHslmTzI7l98IYuz/QkulkRbklbV50BOcKC5gpJA3T5mdTMC9P6X9
         ZhUCQRVeTvyjHLanVmUWZF4GQSnlXpZUA9DkB0aPAei9y9iAFQ0cyd2NaBq221hlGGXH
         JnJYuP/ffLXhj2bVI39e70aBXvaCI5wjHpOKc0diV99wR0+upxbPpKvHmY7J5UQcFUOe
         INnokG7Oe7ov/rtoyAFZKn6wWv92GSPszU/9DsplyW5/kyC/cztSMZJtwEtnar77R4QY
         lREQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:message-id:date:mime-version:user-agent:subject
         :content-language:to:cc:references:from:in-reply-to
         :content-transfer-encoding;
        bh=lJLK+tB0ni0ja4j9Yr/gTepZKHNAR1orKeHG5e5VqQE=;
        b=Ovu1z8v1xPOoNjA20RRlYutCbtuWAEqJiKHHTk/YdsxMwJDrzQDs9jfJ0ikfjn1D5t
         BsNK0OhWPt9mTJmzwSsoIRRrd7vwWtevTELPUdk/8n2uUAoAWWpbIr0rvyLr8jIb0d5y
         oaTpk8SIvVy/U+/7XqjqOheyUOehHTVFjKqC8ohPfY/fXrB+xVmy6TsVEUqiwIWH0o3y
         YpIRzg2jUQhM0WRcLcQxOQT0UzRKKJy//SfFFY/7ujbu+lYgm3GTenHUIANWjEMhZUFo
         cFjMn3lWCLH7BKz3UcQAyYwRJzZxNphhhGCZhwI7ymuHdy4hodha5r/1N6y1OpkIUg/t
         HK7Q==
X-Gm-Message-State: AOAM530H2tGPRUtLw0oM2D4Df0SuwYHh+9uHGznXjPSznSn1C8FBNI1u
	2e1bn+zO8JxCQYq09dKSUEA=
X-Google-Smtp-Source: ABdhPJwaNmbxe6gpW8UI9Zdbvc0WBXkyz1NoLUOzxYn6m6mr4JbeWsbcQLqqvvX3dinxCVQhA5Q/vQ==
X-Received: by 2002:ac8:5e4c:0:b0:2e2:2bbf:57fa with SMTP id i12-20020ac85e4c000000b002e22bbf57famr22146507qtx.278.1648485505902;
        Mon, 28 Mar 2022 09:38:25 -0700 (PDT)
Message-ID: <efb76b14-59a1-0e26-d0ae-2e3ba7bd29f3@gmail.com>
Date: Mon, 28 Mar 2022 12:38:10 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v3 2/5] xen: make evtchn_alloc_unbound public
Content-Language: en-US
To: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>
Cc: Jan Beulich <jbeulich@suse.com>, xen-devel@lists.xenproject.org,
 jgross@suse.com, Bertrand.Marquis@arm.com, Volodymyr_Babchuk@epam.com,
 Luca Miccio <lucmiccio@gmail.com>,
 Stefano Stabellini <stefano.stabellini@xilinx.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>
References: <alpine.DEB.2.22.394.2201281330520.27308@ubuntu-linux-20-04-desktop>
 <20220128213307.2822078-2-sstabellini@kernel.org>
 <2f05e63a-96c3-e78f-f7e4-36fd17fcd58c@gmail.com>
 <alpine.DEB.2.22.394.2203221711110.2910984@ubuntu-linux-20-04-desktop>
 <c57dc9a9-e2ca-74c6-4fde-e2a6f1400de5@suse.com>
 <alpine.DEB.2.22.394.2203241522510.2910984@ubuntu-linux-20-04-desktop>
 <da700983-759b-2de6-9c36-0d09c6b06c0d@xen.org>
 <alpine.DEB.2.22.394.2203251313350.2910984@ubuntu-linux-20-04-desktop>
From: "Daniel P. Smith" <dpsmith.dev@gmail.com>
In-Reply-To: <alpine.DEB.2.22.394.2203251313350.2910984@ubuntu-linux-20-04-desktop>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

On 3/25/22 17:05, Stefano Stabellini wrote:
> On Fri, 25 Mar 2022, Julien Grall wrote:
>> So to me, the idea of switching to a "fake" domain or bypassing the check is
>> more appealing. I have a preference for the "fake" domain here.
> 
> As a maintainer, I am not opposed to the "fake"/"contructor" domain
> concept.  It all depends on how many instances of this issue we are
> going to have.  This is the only one on xen-devel so far. I don't think
> it is worth adding a constructor domain for one instance only.  But I
> agree with you and Daniel that if we end up with several instances, then
> the constructor domain approach is probably the best option overall.
> 
> 
> As a contributor, sadly I won't be able to spend a lot of time on this
> in the following months. If a significant rework is required, I don't
> think I'll be able to do it, at least not for this Xen release (and it
> would be nice to have dom0less PV drivers in the coming release.) If
> Daniel is willing, I could add his "idle_domain is_priv" patch to this
> series.  Not as clean as a proper constructor domain but it would work
> and it would be simple. It could be evolved into a nicer constructor
> domain later.
> 
> This is not my preference but I could do that if Julien and Jan prefer
> this approach and if Daniel is happy to share his patch.
> 
> 
>> AFAIU, your proposal is to duplicate code. This brings other risks such as
>> duplicated bug and more code to maintain.
> 
> Got it. I'll make one last attempt at a proposal that doesn't involve
> the fake constructor domain. The goal is to avoid code duplication while
> providing a safe way forward to make progress with only a small amount
> of changes. What if we:
> 
> - rename evtchn_alloc_unbound to _evtchn_alloc_unbound (still static)
> - add a skip_xsm parameter to _evtchn_alloc_unbound
> - introduce a wrapper evtchn_alloc_unbound that always set skip_xsm to
>   false (same interface as today's evtchn_alloc_unbound)
> - introduce an __init early_evtchn_alloc_unbound public function that
>   sets skip_xsm to true
> 
> This way:
> - we have a single implementation in _evtchn_alloc_unbound (no code
>   duplication)
> - the only function exposed that skips the XSM check is __init
> - evtchn_alloc_unbound continue to have the XSM check same as today
> 
> 
> E.g.:
> static int _evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc, bool skip_xsm)
> {
>     ...
> }
> 
> static int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
> {
>     return _evtchn_alloc_unbound(alloc, false);    
> }
> 
> int __init early_evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
> {
>     return _evtchn_alloc_unbound(alloc, true);
> }
> 
> 
> Would this be good enough for now?

Please see the RFC patch I just posted[1], IMHO I think this is a safer
approach for this specific instance.

[1]
https://lore.kernel.org/xen-devel/20220328203622.30961-1-dpsmith@apertussolutions.com/T/#t

v/r,
dps


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 18:52:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 18:52:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295551.503012 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYuTF-0008Is-A9; Mon, 28 Mar 2022 18:52:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295551.503012; Mon, 28 Mar 2022 18:52:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYuTF-0008Il-4t; Mon, 28 Mar 2022 18:52:05 +0000
Received: by outflank-mailman (input) for mailman id 295551;
 Mon, 28 Mar 2022 18:52:03 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYuTD-0008Ib-IA; Mon, 28 Mar 2022 18:52:03 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYuTD-0003Ha-Do; Mon, 28 Mar 2022 18:52:03 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYuTD-0002SN-1T; Mon, 28 Mar 2022 18:52:03 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nYuTD-0002cH-0z; Mon, 28 Mar 2022 18:52:03 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=VJXZEF3/inStZIr2JgXfN9ZGFSZUj2rHSoUXDNyNqOw=; b=BK9vUdghS49pc0Oo5p3XEeEww1
	bXWIpm9GaQakcfyurzndgVnFZFgT2ZANdLXGwow6F5uz3O17ClN7WGTzTvjVVhhW/zP2Cer8A9Xxc
	5q4sbQTmX2Tw/7PB1JEKGnO36ZC+gWnrOrIzfrD6FsW58tDfpU2rxMGsTib7IHtM9WB8=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168925-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-5.4 test] 168925: trouble: blocked/broken/pass
X-Osstest-Failures:
    linux-5.4:build-amd64:<job status>:broken:regression
    linux-5.4:build-amd64-pvops:<job status>:broken:regression
    linux-5.4:build-amd64-xsm:<job status>:broken:regression
    linux-5.4:build-arm64:<job status>:broken:regression
    linux-5.4:build-arm64-pvops:<job status>:broken:regression
    linux-5.4:build-arm64-xsm:<job status>:broken:regression
    linux-5.4:build-armhf-pvops:<job status>:broken:regression
    linux-5.4:build-i386:<job status>:broken:regression
    linux-5.4:build-i386-pvops:<job status>:broken:regression
    linux-5.4:build-i386-xsm:<job status>:broken:regression
    linux-5.4:build-amd64-pvops:host-install(4):broken:regression
    linux-5.4:build-amd64:host-install(4):broken:regression
    linux-5.4:build-armhf-pvops:host-install(4):broken:regression
    linux-5.4:build-arm64-pvops:host-install(4):broken:regression
    linux-5.4:build-i386-xsm:host-install(4):broken:regression
    linux-5.4:build-i386:host-install(4):broken:regression
    linux-5.4:build-i386-pvops:host-install(4):broken:regression
    linux-5.4:build-arm64-xsm:host-install(4):broken:regression
    linux-5.4:build-arm64:host-install(4):broken:regression
    linux-5.4:build-amd64-xsm:host-install(4):broken:regression
    linux-5.4:test-amd64-i386-qemuu-rhel6hvm-intel:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-pvshim:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-shadow:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-vhd:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-examine:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-xl-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-armhf-armhf-examine:build-check(1):blocked:nonblocking
    linux-5.4:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-examine:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-coresched-i386-xl:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-coresched-amd64-xl:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-shadow:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-rtds:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    linux-5.4:build-amd64-libvirt:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    linux-5.4:build-arm64-libvirt:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    linux-5.4:build-i386-libvirt:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qcow2:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-dom0pvh-xl-amd:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-pvshim:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-dom0pvh-xl-intel:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-pvhv2-intel:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-examine:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-examine-bios:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-examine-uefi:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-pvhv2-amd:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-multivcpu:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-credit2:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-pair:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-credit1:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-pygrub:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-qemuu-freebsd11-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-qemuu-freebsd12-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-qemuu-nested-amd:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-qemuu-nested-intel:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-examine-bios:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-examine-uefi:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-freebsd10-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-freebsd10-i386:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-pair:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-qemut-rhel6hvm-amd:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-qemut-rhel6hvm-intel:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-qemuu-rhel6hvm-amd:build-check(1):blocked:nonblocking
    linux-5.4:test-armhf-armhf-xl:build-check(1):blocked:nonblocking
    linux-5.4:test-armhf-armhf-xl-arndale:build-check(1):blocked:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit1:build-check(1):blocked:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit2:build-check(1):blocked:nonblocking
    linux-5.4:test-armhf-armhf-xl-cubietruck:build-check(1):blocked:nonblocking
    linux-5.4:test-armhf-armhf-xl-multivcpu:build-check(1):blocked:nonblocking
    linux-5.4:test-armhf-armhf-xl-rtds:build-check(1):blocked:nonblocking
    linux-5.4:test-armhf-armhf-xl-vhd:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    linux=2845ff3fd34499603249676495c524a35e795b45
X-Osstest-Versions-That:
    linux=055c4cf7e6da13450016942e5286492b4a224868
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 28 Mar 2022 18:52:03 +0000

flight 168925 linux-5.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168925/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-arm64                     <job status>                 broken
 build-arm64-pvops               <job status>                 broken
 build-arm64-xsm                 <job status>                 broken
 build-armhf-pvops               <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 168810
 build-amd64                   4 host-install(4)        broken REGR. vs. 168810
 build-armhf-pvops             4 host-install(4)        broken REGR. vs. 168810
 build-arm64-pvops             4 host-install(4)        broken REGR. vs. 168810
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168810
 build-i386                    4 host-install(4)        broken REGR. vs. 168810
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168810
 build-arm64-xsm               4 host-install(4)        broken REGR. vs. 168810
 build-arm64                   4 host-install(4)        broken REGR. vs. 168810
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 168810

Tests which did not succeed, but are not blocking:
 test-amd64-i386-qemuu-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-xl            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-pvshim     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemut-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemut-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemut-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1)  blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-shadow     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-vhd        1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-xsm        1 build-check(1)               blocked  n/a
 test-arm64-arm64-examine      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl           1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 test-armhf-armhf-examine      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-amd64-i386-examine       1 build-check(1)               blocked  n/a
 test-amd64-coresched-i386-xl  1 build-check(1)               blocked  n/a
 test-amd64-coresched-amd64-xl  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-xsm       1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-shadow    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-rtds      1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ws16-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1) blocked n/a
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qemut-ws16-amd64  1 build-check(1)             blocked n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-xl-qemut-debianhvm-amd64  1 build-check(1)        blocked n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qcow2     1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvshim    1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-examine      1 build-check(1)               blocked  n/a
 test-amd64-amd64-examine-bios  1 build-check(1)               blocked  n/a
 test-amd64-amd64-examine-uefi  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit2   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pair         1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit1   1 build-check(1)               blocked  n/a
 test-amd64-amd64-pygrub       1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-freebsd11-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-xl           1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-freebsd12-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-qemuu-nested-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-intel  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-examine-bios  1 build-check(1)               blocked  n/a
 test-amd64-i386-examine-uefi  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-amd64  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-i386  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-amd64-i386-pair          1 build-check(1)               blocked  n/a
 test-amd64-i386-qemut-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemut-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-qemuu-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-arndale   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit1   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-cubietruck  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-rtds      1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-vhd       1 build-check(1)               blocked  n/a

version targeted for testing:
 linux                2845ff3fd34499603249676495c524a35e795b45
baseline version:
 linux                055c4cf7e6da13450016942e5286492b4a224868

Last test of basis   168810  2022-03-23 20:10:03 Z    4 days
Testing same since   168925  2022-03-28 07:12:09 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Arnd Bergmann <arnd@arndb.de>
  Chuansheng Liu <chuansheng.liu@intel.com>
  David S. Miller <davem@davemloft.net>
  Denis Efremov <denis.e.efremov@oracle.com>
  Eric Dumazet <edumazet@google.com>
  Florian Fainelli <f.fainelli@gmail.com>
  Giacomo Guiduzzi <guiduzzi.giacomo@gmail.com>
  Giovanni Cabiddu <giovanni.cabiddu@intel.com>
  Greg Kroah-Hartman <gregkh@linuxfoundation.org>
  Guenter Roeck <linux@roeck-us.net>
  Herbert Xu <herbert@gondor.apana.org.au>
  huangwenhui <huangwenhuia@uniontech.com>
  Hulk Robot <hulkrobot@huawei.com>
  J. Bruce Fields <bfields@redhat.com>
  Jakub Kicinski <kuba@kernel.org>
  James Bottomley <James.Bottomley@HansenPartnership.com>
  Jarkko Sakkinen <jarkko@kernel.org>
  Jarkko Sakkinen<jarkko@kernel.org>
  Jason Zheng <jasonzheng2004@gmail.com>
  Johannes Berg <johannes.berg@intel.com>
  Jonathan Teh <jonathan.teh@outlook.com>
  Jordy Zomer <jordy@pwning.systems>
  Lars-Peter Clausen <lars@metafoo.de>
  Linus Lüssing <ll@simonwunderlich.de>
  Linux Kernel Functional Testing <lkft@linaro.org>
  Mark Brown <broonie@kernel.org>
  Mark Cilissen <mark@yotsuba.nl>
  Mathias Kretschmer <mathias.kretschmer@fit.fraunhofer.de>
  Maximilian Luz <luzmaximilian@gmail.com>
  Oliver Graute <oliver.graute@kococonnector.com>
  Pablo Neira Ayuso <pablo@netfilter.org>
  Paolo Valente <paolo.valente@linaro.org>
  Paul E. McKenney <paulmck@kernel.org>
  Rafael J. Wysocki <rafael.j.wysocki@intel.com>
  Shuah Khan <skhan@linuxfoundation.org>
  Steffen Klassert <steffen.klassert@secunet.com>
  Stephane Graber <stgraber@ubuntu.com>
  Sudip Mukherjee <sudip.mukherjee@codethink.co.uk>
  Sudip Mukherjee <sudipm.mukherjee@gmail.com>
  Tadeusz Struk <tadeusz.struk@linaro.org>
  Tadeusz Struk <tstruk@gmail.com>
  Takashi Iwai <tiwai@suse.de>
  Tim Murray <timmurray@google.com>
  Trond Myklebust <trond.myklebust@hammerspace.com>
  Trond Myklebust <trondmy@gmail.com>
  Vaibhav Rustagi <vaibhavrustagi@google.com>
  Werner Sembach <wse@tuxedocomputers.com>
  Willem de Bruijn <willemb@google.com>

jobs:
 build-amd64-xsm                                              broken  
 build-arm64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64                                                  broken  
 build-arm64                                                  broken  
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            broken  
 build-arm64-pvops                                            broken  
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-amd64-amd64-xl                                          blocked 
 test-amd64-coresched-amd64-xl                                blocked 
 test-arm64-arm64-xl                                          blocked 
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           blocked 
 test-amd64-coresched-i386-xl                                 blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        blocked 
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         blocked 
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-xl-xsm                                      blocked 
 test-arm64-arm64-xl-xsm                                      blocked 
 test-amd64-i386-xl-xsm                                       blocked 
 test-amd64-amd64-qemuu-nested-amd                            blocked 
 test-amd64-amd64-xl-pvhv2-amd                                blocked 
 test-amd64-i386-qemut-rhel6hvm-amd                           blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-dom0pvh-xl-amd                              blocked 
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemut-debianhvm-amd64                     blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     blocked 
 test-amd64-i386-freebsd10-amd64                              blocked 
 test-amd64-amd64-qemuu-freebsd11-amd64                       blocked 
 test-amd64-amd64-qemuu-freebsd12-amd64                       blocked 
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         blocked 
 test-amd64-i386-xl-qemut-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         blocked 
 test-amd64-i386-xl-qemuu-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemut-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemut-ws16-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ws16-amd64                          blocked 
 test-armhf-armhf-xl-arndale                                  blocked 
 test-amd64-amd64-examine-bios                                blocked 
 test-amd64-i386-examine-bios                                 blocked 
 test-amd64-amd64-xl-credit1                                  blocked 
 test-arm64-arm64-xl-credit1                                  blocked 
 test-armhf-armhf-xl-credit1                                  blocked 
 test-amd64-amd64-xl-credit2                                  blocked 
 test-arm64-arm64-xl-credit2                                  blocked 
 test-armhf-armhf-xl-credit2                                  blocked 
 test-armhf-armhf-xl-cubietruck                               blocked 
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        blocked 
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         blocked 
 test-amd64-amd64-examine                                     blocked 
 test-arm64-arm64-examine                                     blocked 
 test-armhf-armhf-examine                                     blocked 
 test-amd64-i386-examine                                      blocked 
 test-amd64-i386-freebsd10-i386                               blocked 
 test-amd64-amd64-qemuu-nested-intel                          blocked 
 test-amd64-amd64-xl-pvhv2-intel                              blocked 
 test-amd64-i386-qemut-rhel6hvm-intel                         blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-amd64-dom0pvh-xl-intel                            blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-xl-multivcpu                                blocked 
 test-armhf-armhf-xl-multivcpu                                blocked 
 test-amd64-amd64-pair                                        blocked 
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-amd64-amd64-xl-pvshim                                   blocked 
 test-amd64-i386-xl-pvshim                                    blocked 
 test-amd64-amd64-pygrub                                      blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-amd64-amd64-xl-qcow2                                    blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-xl-rtds                                     blocked 
 test-armhf-armhf-xl-rtds                                     blocked 
 test-arm64-arm64-xl-seattle                                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              blocked 
 test-amd64-amd64-xl-shadow                                   blocked 
 test-amd64-i386-xl-shadow                                    blocked 
 test-arm64-arm64-xl-thunderx                                 blocked 
 test-amd64-amd64-examine-uefi                                blocked 
 test-amd64-i386-examine-uefi                                 blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 
 test-arm64-arm64-xl-vhd                                      blocked 
 test-armhf-armhf-xl-vhd                                      blocked 
 test-amd64-i386-xl-vhd                                       blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-arm64 broken
broken-job build-arm64-pvops broken
broken-job build-arm64-xsm broken
broken-job build-armhf-pvops broken
broken-job build-i386 broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-amd64-pvops host-install(4)
broken-step build-amd64 host-install(4)
broken-step build-armhf-pvops host-install(4)
broken-step build-arm64-pvops host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step build-i386 host-install(4)
broken-step build-i386-pvops host-install(4)
broken-step build-arm64-xsm host-install(4)
broken-step build-arm64 host-install(4)
broken-step build-amd64-xsm host-install(4)

Not pushing.

(No revision log; it would be 782 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 19:27:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 19:27:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295560.503021 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYv17-0003S4-5z; Mon, 28 Mar 2022 19:27:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295560.503021; Mon, 28 Mar 2022 19:27:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYv17-0003Rx-3A; Mon, 28 Mar 2022 19:27:05 +0000
Received: by outflank-mailman (input) for mailman id 295560;
 Mon, 28 Mar 2022 19:27:04 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYv16-0003Rn-GF; Mon, 28 Mar 2022 19:27:04 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYv16-0003sn-9W; Mon, 28 Mar 2022 19:27:04 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYv15-0004KS-Q3; Mon, 28 Mar 2022 19:27:03 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nYv15-0002Ft-Pa; Mon, 28 Mar 2022 19:27:03 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=sMZg5wh5jnGAxb4p1fNyWyzwGU7WPOL4NDp/pL0YVMM=; b=gdPgpRD6sFAUyeIHdsw/EUpl2+
	MSAgqZU8O1XfY36q4z4zC3nnDtQJxJKThytITO/EPzdm3Im+TQnTzJY/6xdVKilj52Tlpw6/gkDET
	QR3lbjCCxUmJ8cq8E2H2WFv2YbfDGPR6MI1kzfRXxejxJOi95WHwp3Ff/bhO5wlsAdm4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168926-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168926: trouble: blocked/broken
X-Osstest-Failures:
    ovmf:build-amd64:<job status>:broken:regression
    ovmf:build-amd64-pvops:<job status>:broken:regression
    ovmf:build-amd64-xsm:<job status>:broken:regression
    ovmf:build-i386:<job status>:broken:regression
    ovmf:build-i386-pvops:<job status>:broken:regression
    ovmf:build-i386-xsm:<job status>:broken:regression
    ovmf:build-i386-pvops:host-install(4):broken:regression
    ovmf:build-i386:host-install(4):broken:regression
    ovmf:build-i386-xsm:host-install(4):broken:regression
    ovmf:build-amd64-xsm:host-install(4):broken:regression
    ovmf:build-amd64:host-install(4):broken:regression
    ovmf:build-amd64-pvops:host-install(4):broken:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=3ef2071927fa8a206556e878491f772e44a3132e
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 28 Mar 2022 19:27:03 +0000

flight 168926 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168926/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168254
 build-i386                    4 host-install(4)        broken REGR. vs. 168254
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168254
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 168254
 build-amd64                   4 host-install(4)        broken REGR. vs. 168254
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 3ef2071927fa8a206556e878491f772e44a3132e
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   28 days
Failing since        168258  2022-03-01 01:55:31 Z   27 days  260 attempts
Testing same since   168926  2022-03-28 07:20:21 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Bob Feng <bob.c.feng@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Mara Sophie Grosch <littlefox@lf-net.org>
  Mara Sophie Grosch via groups.io <littlefox=lf-net.org@groups.io>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Yi Li <yi1.li@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64                                                  broken  
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-i386 broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-i386-pvops host-install(4)
broken-step build-i386 host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step build-amd64-xsm host-install(4)
broken-step build-amd64 host-install(4)
broken-step build-amd64-pvops host-install(4)

Not pushing.

(No revision log; it would be 1076 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 19:32:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 19:32:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295567.503033 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYv5y-0004vn-S1; Mon, 28 Mar 2022 19:32:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295567.503033; Mon, 28 Mar 2022 19:32:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYv5y-0004vg-Mz; Mon, 28 Mar 2022 19:32:06 +0000
Received: by outflank-mailman (input) for mailman id 295567;
 Mon, 28 Mar 2022 19:32:05 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYv5x-0004vW-Tu; Mon, 28 Mar 2022 19:32:05 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYv5x-0003y1-QP; Mon, 28 Mar 2022 19:32:05 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYv5x-0004Wj-EU; Mon, 28 Mar 2022 19:32:05 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nYv5x-0004SZ-E3; Mon, 28 Mar 2022 19:32:05 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Oq9/1Scfjj1MmUlNxiueDLOo+72IFI8j/T6Z4YZ9aGk=; b=BoORxEUbGkAf7AtrbiwmFzXrdj
	Sj+CwLq9JSZHOS3Gl8MdDr2ZZrh7+hKSc4GIIrLnuAvOwvJ2Bx47iGiH5pjLXI7dQ3h/f/dm1q2BJ
	wutH4e8kPzNnzAgt0TPr69MwI+PSaJfBR3TRKz23ykhFETfYFmD3IpEpCR4X6ZDXsrhU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168920-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168920: regressions - trouble: blocked/broken/fail/pass
X-Osstest-Failures:
    libvirt:build-amd64:<job status>:broken:regression
    libvirt:build-amd64-pvops:<job status>:broken:regression
    libvirt:build-amd64-xsm:<job status>:broken:regression
    libvirt:build-arm64:<job status>:broken:regression
    libvirt:build-arm64-pvops:<job status>:broken:regression
    libvirt:build-arm64-xsm:<job status>:broken:regression
    libvirt:build-armhf-pvops:<job status>:broken:regression
    libvirt:build-i386:<job status>:broken:regression
    libvirt:build-i386-pvops:<job status>:broken:regression
    libvirt:build-i386-xsm:<job status>:broken:regression
    libvirt:build-i386-xsm:host-install(4):broken:regression
    libvirt:build-i386-pvops:host-install(4):broken:regression
    libvirt:build-i386:host-install(4):broken:regression
    libvirt:build-arm64-pvops:host-install(4):broken:regression
    libvirt:build-arm64:host-install(4):broken:regression
    libvirt:build-arm64-xsm:host-install(4):broken:regression
    libvirt:build-armhf-pvops:host-install(4):broken:regression
    libvirt:build-amd64-xsm:host-install(4):broken:regression
    libvirt:build-amd64:host-install(4):broken:regression
    libvirt:build-amd64-pvops:host-install(4):broken:regression
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:build-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:build-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=06c960e477de4561c7ba956f82994fa120226397
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 28 Mar 2022 19:32:05 +0000

flight 168920 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168920/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-arm64                     <job status>                 broken
 build-arm64-pvops               <job status>                 broken
 build-arm64-xsm                 <job status>                 broken
 build-armhf-pvops               <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 151777
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 151777
 build-i386                    4 host-install(4)        broken REGR. vs. 151777
 build-arm64-pvops             4 host-install(4)        broken REGR. vs. 151777
 build-arm64                   4 host-install(4)        broken REGR. vs. 151777
 build-arm64-xsm               4 host-install(4)        broken REGR. vs. 151777
 build-armhf-pvops             4 host-install(4)        broken REGR. vs. 151777
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 151777
 build-amd64                   4 host-install(4)        broken REGR. vs. 151777
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 151777
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              06c960e477de4561c7ba956f82994fa120226397
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  626 days
Failing since        151818  2020-07-11 04:18:52 Z  625 days  607 attempts
Testing same since   168869  2022-03-26 04:21:28 Z    2 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Claudio Fontana <cfontana@suse.de>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Haonan Wang <hnwanga1@gmail.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Martin Pitt <mpitt@debian.org>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Paolo Bonzini <pbonzini@redhat.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tom Wieczorek <tom@bibbu.net>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              broken  
 build-arm64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64                                                  broken  
 build-arm64                                                  broken  
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            broken  
 build-arm64-pvops                                            broken  
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-arm64 broken
broken-job build-arm64-pvops broken
broken-job build-arm64-xsm broken
broken-job build-armhf-pvops broken
broken-job build-i386 broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-i386-xsm host-install(4)
broken-step build-i386-pvops host-install(4)
broken-step build-i386 host-install(4)
broken-step build-arm64-pvops host-install(4)
broken-step build-arm64 host-install(4)
broken-step build-arm64-xsm host-install(4)
broken-step build-armhf-pvops host-install(4)
broken-step build-amd64-xsm host-install(4)
broken-step build-amd64 host-install(4)
broken-step build-amd64-pvops host-install(4)

Not pushing.

(No revision log; it would be 102174 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 20:39:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 20:39:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295578.503056 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYw8m-0003Wp-2Y; Mon, 28 Mar 2022 20:39:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295578.503056; Mon, 28 Mar 2022 20:39:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYw8l-0003Wi-Ur; Mon, 28 Mar 2022 20:39:03 +0000
Received: by outflank-mailman (input) for mailman id 295578;
 Mon, 28 Mar 2022 20:39:02 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=1Y9Q=UH=invisiblethingslab.com=demi@srs-se1.protection.inumbo.net>)
 id 1nYw8j-0003Wc-QP
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 20:39:02 +0000
Received: from out3-smtp.messagingengine.com (out3-smtp.messagingengine.com
 [66.111.4.27]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 16d94938-aed7-11ec-a405-831a346695d4;
 Mon, 28 Mar 2022 22:38:58 +0200 (CEST)
Received: from compute3.internal (compute3.nyi.internal [10.202.2.43])
 by mailout.nyi.internal (Postfix) with ESMTP id 3D9055C021E;
 Mon, 28 Mar 2022 16:38:56 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163])
 by compute3.internal (MEProxy); Mon, 28 Mar 2022 16:38:56 -0400
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Mon,
 28 Mar 2022 16:38:55 -0400 (EDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 16d94938-aed7-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:cc:content-type:date:date:from:from
	:in-reply-to:in-reply-to:message-id:mime-version:references
	:reply-to:sender:subject:subject:to:to:x-me-proxy:x-me-proxy
	:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=Jus8ZJ3zuA3UyTCO7
	C2XcvuCNtvWOSEYF+Qqu8mSD30=; b=lZbVk+3scvkwjonIpDObuye6Nl4oWLIID
	LS2NT1AArpO67jTnxMD5erkgegYA3ucDOu8KclTA9lxOBHmRaW9+2L21Z3TEwE7s
	WsVg5xALnwcynV73L30HwJvr+DIHh2ZfcEjXcHKzxy6BiVuCnVh6z388rKczX803
	FMRxvwbfrIqqkzoZ4leGtplei/MTRQlu1nePYwYA2iMCIMa91s8BBSIbN1kBo+M1
	1UKUDCjyhvZHlR6FHtGQWiXRdkGgCvoXDLK7tgFnKATTSY4dDLnHd5swa5zMzgwX
	A0wD3gh0xIIGo92gwjjzRYiHuW7uh8LLnFfA9reqIKuaDTM72G/gQ==
X-ME-Sender: <xms:3xxCYrSA-brB7pdzpTz81xobPFbXCg2LxelIqneDjLFRA-p0GKTTIg>
    <xme:3xxCYsygw8u3_hNZCLo2z4on9vXHgrnG5WrXUf-NW-d0hQOmbhMlZVIWkklFgxSBh
    Kilzh-NgTAJ_Yk>
X-ME-Received: <xmr:3xxCYg0XM6AVXIdq5tB4Rlw0J_T_l6lq0OifjH2VL7-YVoalqdb3sygNxYzQh1rzLKSigw>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddrudehjedgudehfecutefuodetggdotefrod
    ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh
    necuuegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmd
    enucfjughrpefkffggfgfvfhfhufgjtgesghdtreertdefjeenucfhrhhomhepffgvmhhi
    ucforghrihgvucfqsggvnhhouhhruceouggvmhhisehinhhvihhsihgslhgvthhhihhngh
    hslhgrsgdrtghomheqnecuggftrfgrthhtvghrnhepuedugedugfetfeejfeehtdfggeet
    ffelvdegvdejtefhhfekfeeludetveduhfeunecuvehluhhsthgvrhfuihiivgeptdenuc
    frrghrrghmpehmrghilhhfrhhomhepuggvmhhisehinhhvihhsihgslhgvthhhihhnghhs
    lhgrsgdrtghomh
X-ME-Proxy: <xmx:3xxCYrDqVefClaZ2O4uNylI3GaNZ3xCbJFV9EX_UF_bgPsMCUL6Paw>
    <xmx:3xxCYkjR8uaHtrsMGkEFZGL1QEo4y_5YiPvWI74tU8QumO5P0u_ELQ>
    <xmx:3xxCYvpnsFwMWTjQs9HI6iRqtRAxEoxoqFTCaQZwxsGp3kkYG-dNSg>
    <xmx:4BxCYtsSHLZkPf0gmf4YNIsgZslYyvz_dxRglstP9A2mwBwdirUrew>
Message-ID: <10e7b01a-2a8e-17cd-6418-1a6f836cc251@invisiblethingslab.com>
Date: Mon, 28 Mar 2022 16:38:33 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: Mark Kettenis <mark.kettenis@xs4all.nl>
Cc: djm@mindrot.org, roger.pau@citrix.com, marmarek@invisiblethingslab.com,
 xen-devel@lists.xenproject.org, tech@openbsd.org
References: <Yj3qW/y20htoSvuK@itl-email>
 <37a4b6-cd56-1993-be2-b5522b9aa4d7@mindrot.org>
 <c904abda-e6a0-256e-478a-ee0909c17e50@invisiblethingslab.com>
 <d3ccc20d61dc7636@bloch.sibelius.xs4all.nl>
From: Demi Marie Obenour <demi@invisiblethingslab.com>
Subject: Re: Security support status of xnf(4) and xbf(4)
In-Reply-To: <d3ccc20d61dc7636@bloch.sibelius.xs4all.nl>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------kxld3QJ8sYt5KflTU7puNuUI"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------kxld3QJ8sYt5KflTU7puNuUI
Content-Type: multipart/mixed; boundary="------------G4sArzC1TocU1Lwf14jsB78h";
 protected-headers="v1"
From: Demi Marie Obenour <demi@invisiblethingslab.com>
To: Mark Kettenis <mark.kettenis@xs4all.nl>
Cc: djm@mindrot.org, roger.pau@citrix.com, marmarek@invisiblethingslab.com,
 xen-devel@lists.xenproject.org, tech@openbsd.org
Message-ID: <10e7b01a-2a8e-17cd-6418-1a6f836cc251@invisiblethingslab.com>
Subject: Re: Security support status of xnf(4) and xbf(4)
References: <Yj3qW/y20htoSvuK@itl-email>
 <37a4b6-cd56-1993-be2-b5522b9aa4d7@mindrot.org>
 <c904abda-e6a0-256e-478a-ee0909c17e50@invisiblethingslab.com>
 <d3ccc20d61dc7636@bloch.sibelius.xs4all.nl>
In-Reply-To: <d3ccc20d61dc7636@bloch.sibelius.xs4all.nl>

--------------G4sArzC1TocU1Lwf14jsB78h
Content-Type: multipart/mixed; boundary="------------pwi7rCsQeNxR0kZ0WVjfsB2b"

--------------pwi7rCsQeNxR0kZ0WVjfsB2b
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 3/28/22 10:39, Mark Kettenis wrote:
>> Date: Mon, 28 Mar 2022 09:51:22 -0400
>> From: Demi Marie Obenour <demi@invisiblethingslab.com>
>>
>> On 3/27/22 21:45, Damien Miller wrote:
>>> On Fri, 25 Mar 2022, Demi Marie Obenour wrote:
>>>
>>>> Linux=E2=80=99s netfront and blkfront drivers recently had a securit=
y
>>>> vulnerability (XSA-396) that allowed a malicious backend to potentia=
lly
>>>> compromise them.  In follow-up audits, I found that OpenBSD=E2=80=99=
s xnf(4)
>>>> currently trusts the backend domain.  I reported this privately to T=
heo
>>>> de Raadt, who indicated that OpenBSD does not consider this to be a
>>>> security concern.
>>>>
>>>> This is obviously a valid position for the OpenBSD project to take, =
but
>>>> it is surprising to some (such as myself) from the broader Xen
>>>> ecosystem.  Standard practice in the Xen world is that bugs in front=
ends
>>>> that allow a malicious backend to cause mischief *are* considered
>>>> security bugs unless there is explicit documentation to the contrary=
=2E
>>>> As such, I believe this deserves to be noted in xnf(4) and xbf(4)=E2=
=80=99s man
>>>> pages.  If the OpenBSD project agrees, I am willing to write a patch=
,
>>>> but I have no experience with mandoc so it might take a few tries.
>>>
>>> Hang on, what is a "malicious backend" in this context? Is it somethi=
ng
>>> other than the Xen Hypervisor? If not, then it seems not to be a usef=
ul
>>> attack model, as the hypervisor typically has near-complete access to=

>>> guests' memory and CPU state.
>>
>> The backend can run in any Xen VM.  It often runs in dom0, but it
>> is not required to, and in Qubes OS the network backend never runs
>> in dom0.  Unless it runs in dom0, it has no access to frontend memory,=

>> except for memory the frontend has explicitly given it access to via
>> grant tables.
>=20
> So this is somewhat similar to the situation on sun4v (Sun's
> virtualization of the SPARC architecture).  When writing the vnet(4)
> and vdsk(4) drivers for OpenBSD, I did consider the implications of
> those drivers talking to a "malicious" domain.  the SPARC hypervisor
> implements a concept similar to grant tables.  It is fairly obvious
> that any memory you grant access to should be considered insecure.
> This means that you either have to make a copy of the data or revoke
> access to the shared memory through some sort of Hypervisor call that
> implements a synchronization point of some sorts.  Otherwise you and
> up TOCTOU issues all over the place.  But this obviously has
> significant performance consequences.  For vnet(4) I decided that an
> extra copy was worth doing and the only reasonable way of doing things
> given how OpenBSD's mbuf layer works.  But for vdsk(4) I decided to
> trust the other domain as there is no way to prevent it from feeding
> you compromised data.  Full disk encryption doesn't really solve the
> problem unless you have a way to securely verify the bootloader.

In Qubes OS, xbf(4) devices are configurable.  While all of them are
provided by dom0 (which is trusted) by default, it is possible to
attach devices that are *not* provided by dom0, and these devices
should not be trusted.

> Personally I think it might be beneficial for us to turn xnf(4) into
> what we colloquially call a "bcopy" network driver.  But folks who
> actually use xen may find the performance impact of doing this
> unacceptable and decide to trust the backend instead.

You actually don=E2=80=99t have to do that.  The Xen network protocol
requires the backend to drop access to the buffer before giving it
to the frontend, so the frontend only needs to ensure that it cannot
regain access.  This will fail if the backend still has access, but
that is a bug in the backend, in which case you should shut down the
interface.  So there should not be any significant performance impact.

If you are curious about how Linux does this, you can look at
drivers/xen/grant-table.c, drivers/net/xen-netfront.c, and
drivers/block/xen-blkfront.c from the Linux source.  They are
dual licensed GPL/MIT so there should not be licensing issues there.
Be sure to use a version at or after =E2=80=9Cxen/netfront: react properl=
y to
failing gnttab_end_foreign_access_ref()=E2=80=9D and the other XSA-396 pa=
tches.
--=20
Sincerely,
Demi Marie Obenour (she/her/hers)
Invisible Things Lab
--------------pwi7rCsQeNxR0kZ0WVjfsB2b
Content-Type: application/pgp-keys; name="OpenPGP_0xB288B55FFF9C22C1.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB288B55FFF9C22C1.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=3Dx+Ro
-----END PGP PUBLIC KEY BLOCK-----

--------------pwi7rCsQeNxR0kZ0WVjfsB2b--

--------------G4sArzC1TocU1Lwf14jsB78h--

--------------kxld3QJ8sYt5KflTU7puNuUI
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----
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=tnwt
-----END PGP SIGNATURE-----

--------------kxld3QJ8sYt5KflTU7puNuUI--


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 21:29:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 21:29:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295582.503067 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYwvo-0000ZP-Vz; Mon, 28 Mar 2022 21:29:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295582.503067; Mon, 28 Mar 2022 21:29:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYwvo-0000ZI-RB; Mon, 28 Mar 2022 21:29:44 +0000
Received: by outflank-mailman (input) for mailman id 295582;
 Mon, 28 Mar 2022 21:29:43 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYwvn-0000Z8-Gx; Mon, 28 Mar 2022 21:29:43 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYwvm-00061K-Ks; Mon, 28 Mar 2022 21:29:42 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nYwvm-0001dP-8l; Mon, 28 Mar 2022 21:29:42 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nYwvm-0004t1-8H; Mon, 28 Mar 2022 21:29:42 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=WJv+NO30dywf+KzOIo0QLWkfw5MC6Fk5l7xV38ySe+M=; b=i/IZYZEikxl5SBihLuEqxi2Fd/
	5DPwoFelFkb1+CbBxL0GyR3KFcy5IIkU8a7TGbtUMw6TNYc9pwxf16/cei4BWSyNHXQp517O7lIx/
	aVgfJIExC11FsS8i5UTK5sdQrwYDPnNaG3w2Y9pSFrMKqGCo8E8JOMs9wECZ9XQlPHNs=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168921-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.14-testing test] 168921: trouble: blocked/broken/pass
X-Osstest-Failures:
    xen-4.14-testing:build-amd64:<job status>:broken:regression
    xen-4.14-testing:build-amd64-prev:<job status>:broken:regression
    xen-4.14-testing:build-amd64-pvops:<job status>:broken:regression
    xen-4.14-testing:build-amd64-xsm:<job status>:broken:regression
    xen-4.14-testing:build-amd64-xtf:<job status>:broken:regression
    xen-4.14-testing:build-arm64:<job status>:broken:regression
    xen-4.14-testing:build-arm64-pvops:<job status>:broken:regression
    xen-4.14-testing:build-arm64-xsm:<job status>:broken:regression
    xen-4.14-testing:build-armhf-pvops:<job status>:broken:regression
    xen-4.14-testing:build-i386:<job status>:broken:regression
    xen-4.14-testing:build-i386-prev:<job status>:broken:regression
    xen-4.14-testing:build-i386-pvops:<job status>:broken:regression
    xen-4.14-testing:build-i386-xsm:<job status>:broken:regression
    xen-4.14-testing:build-amd64:host-install(4):broken:regression
    xen-4.14-testing:build-i386-prev:host-install(4):broken:regression
    xen-4.14-testing:build-i386-xsm:host-install(4):broken:regression
    xen-4.14-testing:build-i386:host-install(4):broken:regression
    xen-4.14-testing:build-i386-pvops:host-install(4):broken:regression
    xen-4.14-testing:build-arm64:host-install(4):broken:regression
    xen-4.14-testing:build-arm64-xsm:host-install(4):broken:regression
    xen-4.14-testing:build-arm64-pvops:host-install(4):broken:regression
    xen-4.14-testing:build-amd64-pvops:host-install(4):broken:regression
    xen-4.14-testing:build-armhf-pvops:host-install(4):broken:regression
    xen-4.14-testing:build-amd64-xsm:host-install(4):broken:regression
    xen-4.14-testing:build-amd64-prev:host-install(4):broken:regression
    xen-4.14-testing:build-amd64-xtf:host-install(4):broken:regression
    xen-4.14-testing:test-amd64-i386-qemuu-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-qemuu-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-pvshim:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-shadow:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-coresched-amd64-xl:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-shadow:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-rtds:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:build-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:build-arm64-libvirt:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qcow2:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-pvshim:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-pvhv2-intel:build-check(1):blocked:nonblocking
    xen-4.14-testing:build-i386-libvirt:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-pvhv2-amd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-dom0pvh-xl-amd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-dom0pvh-xl-intel:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-livepatch:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-qemuu-nested-intel:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-migrupgrade:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-pair:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-qemuu-nested-amd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-pygrub:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-qemuu-freebsd11-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-qemuu-freebsd12-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-coresched-i386-xl:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-freebsd10-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-freebsd10-i386:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-livepatch:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-migrupgrade:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-pair:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-qemut-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-qemut-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-arndale:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-cubietruck:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-rtds:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-xtf-amd64-amd64-1:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-xtf-amd64-amd64-2:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-xtf-amd64-amd64-3:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-xtf-amd64-amd64-4:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-xtf-amd64-amd64-5:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    xen=10b09aa2541de4c3c49b9343e9bc04e19f0ae4f8
X-Osstest-Versions-That:
    xen=ca304edd3ba8c19211107fd2e898249987557ce5
From: osstest service owner <osstest-admin@xenproject.org>
Date: Mon, 28 Mar 2022 21:29:42 +0000

flight 168921 xen-4.14-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168921/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-prev                <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-amd64-xtf                 <job status>                 broken
 build-arm64                     <job status>                 broken
 build-arm64-pvops               <job status>                 broken
 build-arm64-xsm                 <job status>                 broken
 build-armhf-pvops               <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-prev                 <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-amd64                   4 host-install(4)        broken REGR. vs. 168506
 build-i386-prev               4 host-install(4)        broken REGR. vs. 168506
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168506
 build-i386                    4 host-install(4)        broken REGR. vs. 168506
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168506
 build-arm64                   4 host-install(4)        broken REGR. vs. 168506
 build-arm64-xsm               4 host-install(4)        broken REGR. vs. 168506
 build-arm64-pvops             4 host-install(4)        broken REGR. vs. 168506
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 168506
 build-armhf-pvops             4 host-install(4)        broken REGR. vs. 168506
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 168506
 build-amd64-prev              4 host-install(4)        broken REGR. vs. 168506
 build-amd64-xtf               4 host-install(4)        broken REGR. vs. 168506

Tests which did not succeed, but are not blocking:
 test-amd64-i386-qemuu-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-xl            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-pvshim     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemut-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemut-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemut-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1)  blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-shadow     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-vhd        1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-xsm        1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl           1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-amd64-coresched-amd64-xl  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-xsm       1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-shadow    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-rtds      1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ws16-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qemut-ws16-amd64  1 build-check(1)             blocked n/a
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qcow2     1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvshim    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-intel  1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit2   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit1   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl           1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-amd64-livepatch    1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-intel  1 build-check(1)              blocked n/a
 test-amd64-amd64-migrupgrade  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pair         1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pygrub       1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-freebsd11-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-qemuu-freebsd12-amd64  1 build-check(1)           blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-coresched-i386-xl  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-amd64  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-i386  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-amd64-i386-livepatch     1 build-check(1)               blocked  n/a
 test-amd64-i386-migrupgrade   1 build-check(1)               blocked  n/a
 test-amd64-i386-pair          1 build-check(1)               blocked  n/a
 test-amd64-i386-qemut-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemut-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-armhf-armhf-xl-arndale   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit1   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-cubietruck  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-rtds      1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-vhd       1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-1        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-2        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-3        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-4        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-5        1 build-check(1)               blocked  n/a

version targeted for testing:
 xen                  10b09aa2541de4c3c49b9343e9bc04e19f0ae4f8
baseline version:
 xen                  ca304edd3ba8c19211107fd2e898249987557ce5

Last test of basis   168506  2022-03-10 14:16:31 Z   18 days
Testing same since   168862  2022-03-25 17:36:39 Z    3 days    4 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bjoern Doebel <doebel@amazon.de>
  Jan Beulich <jbeulich@suse.com>
  Jiamei Xie <jiamei.xie@arm.com>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Thiner Logoer <logoerthiner1@163.com>

jobs:
 build-amd64-xsm                                              broken  
 build-arm64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64-xtf                                              broken  
 build-amd64                                                  broken  
 build-arm64                                                  broken  
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-prev                                             broken  
 build-i386-prev                                              broken  
 build-amd64-pvops                                            broken  
 build-arm64-pvops                                            broken  
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-xtf-amd64-amd64-1                                       blocked 
 test-xtf-amd64-amd64-2                                       blocked 
 test-xtf-amd64-amd64-3                                       blocked 
 test-xtf-amd64-amd64-4                                       blocked 
 test-xtf-amd64-amd64-5                                       blocked 
 test-amd64-amd64-xl                                          blocked 
 test-amd64-coresched-amd64-xl                                blocked 
 test-arm64-arm64-xl                                          blocked 
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           blocked 
 test-amd64-coresched-i386-xl                                 blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        blocked 
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         blocked 
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-xl-xsm                                      blocked 
 test-arm64-arm64-xl-xsm                                      blocked 
 test-amd64-i386-xl-xsm                                       blocked 
 test-amd64-amd64-qemuu-nested-amd                            blocked 
 test-amd64-amd64-xl-pvhv2-amd                                blocked 
 test-amd64-i386-qemut-rhel6hvm-amd                           blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-dom0pvh-xl-amd                              blocked 
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemut-debianhvm-amd64                     blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     blocked 
 test-amd64-i386-freebsd10-amd64                              blocked 
 test-amd64-amd64-qemuu-freebsd11-amd64                       blocked 
 test-amd64-amd64-qemuu-freebsd12-amd64                       blocked 
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         blocked 
 test-amd64-i386-xl-qemut-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         blocked 
 test-amd64-i386-xl-qemuu-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemut-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemut-ws16-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ws16-amd64                          blocked 
 test-armhf-armhf-xl-arndale                                  blocked 
 test-amd64-amd64-xl-credit1                                  blocked 
 test-arm64-arm64-xl-credit1                                  blocked 
 test-armhf-armhf-xl-credit1                                  blocked 
 test-amd64-amd64-xl-credit2                                  blocked 
 test-arm64-arm64-xl-credit2                                  blocked 
 test-armhf-armhf-xl-credit2                                  blocked 
 test-armhf-armhf-xl-cubietruck                               blocked 
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        blocked 
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         blocked 
 test-amd64-i386-freebsd10-i386                               blocked 
 test-amd64-amd64-qemuu-nested-intel                          blocked 
 test-amd64-amd64-xl-pvhv2-intel                              blocked 
 test-amd64-i386-qemut-rhel6hvm-intel                         blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-amd64-dom0pvh-xl-intel                            blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-livepatch                                   blocked 
 test-amd64-i386-livepatch                                    blocked 
 test-amd64-amd64-migrupgrade                                 blocked 
 test-amd64-i386-migrupgrade                                  blocked 
 test-amd64-amd64-xl-multivcpu                                blocked 
 test-armhf-armhf-xl-multivcpu                                blocked 
 test-amd64-amd64-pair                                        blocked 
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-amd64-amd64-xl-pvshim                                   blocked 
 test-amd64-i386-xl-pvshim                                    blocked 
 test-amd64-amd64-pygrub                                      blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-amd64-amd64-xl-qcow2                                    blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-xl-rtds                                     blocked 
 test-armhf-armhf-xl-rtds                                     blocked 
 test-arm64-arm64-xl-seattle                                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              blocked 
 test-amd64-amd64-xl-shadow                                   blocked 
 test-amd64-i386-xl-shadow                                    blocked 
 test-arm64-arm64-xl-thunderx                                 blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 
 test-arm64-arm64-xl-vhd                                      blocked 
 test-armhf-armhf-xl-vhd                                      blocked 
 test-amd64-i386-xl-vhd                                       blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-prev broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-amd64-xtf broken
broken-job build-arm64 broken
broken-job build-arm64-pvops broken
broken-job build-arm64-xsm broken
broken-job build-armhf-pvops broken
broken-job build-i386 broken
broken-job build-i386-prev broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-amd64 host-install(4)
broken-step build-i386-prev host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step build-i386 host-install(4)
broken-step build-i386-pvops host-install(4)
broken-step build-arm64 host-install(4)
broken-step build-arm64-xsm host-install(4)
broken-step build-arm64-pvops host-install(4)
broken-step build-amd64-pvops host-install(4)
broken-step build-armhf-pvops host-install(4)
broken-step build-amd64-xsm host-install(4)
broken-step build-amd64-prev host-install(4)
broken-step build-amd64-xtf host-install(4)

Not pushing.

(No revision log; it would be 394 lines long.)


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 21:31:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 21:31:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295590.503078 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYwxs-0001z9-GA; Mon, 28 Mar 2022 21:31:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295590.503078; Mon, 28 Mar 2022 21:31:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYwxs-0001z2-D5; Mon, 28 Mar 2022 21:31:52 +0000
Received: by outflank-mailman (input) for mailman id 295590;
 Mon, 28 Mar 2022 21:31:51 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=Zwcm=UH=aim.com=brchuckz@srs-se1.protection.inumbo.net>)
 id 1nYwxq-0001yw-42
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 21:31:51 +0000
Received: from sonic305-22.consmr.mail.ne1.yahoo.com
 (sonic305-22.consmr.mail.ne1.yahoo.com [66.163.185.148])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 77d65e41-aede-11ec-a405-831a346695d4;
 Mon, 28 Mar 2022 23:31:47 +0200 (CEST)
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic305.consmr.mail.ne1.yahoo.com with HTTP; Mon, 28 Mar 2022 21:31:45 +0000
Received: by hermes--canary-production-bf1-665cdb9985-85ftg (VZM Hermes SMTP
 Server) with ESMTPA ID 576b314da54bb8f6dcfcee7c0d09e045; 
 Mon, 28 Mar 2022 21:31:40 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 77d65e41-aede-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netscape.net; s=a2048; t=1648503105; bh=PQva7oXbbLjKvssCCDfwLPyxncC+b+10ygjMtuZCBzc=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From:Subject:Reply-To; b=kqLUdtWXN0nnbTaM/qgPufV57S3qUgu7wUFSdA4YyRyhwlDZl5H86IdX6S5bsTpnHJekKWrwZK1Pvgi+MUfqkJtiQVon2mAOuA0YCXd7tpYx2a2f/bqEoJsttzlX9h3/yiUL9W8G4ynUOkQ+LWqBhX7FNpDIOJZA9+eyETdMDjbyjWiU8ILVuihcvoh35R71B47dmrPu/TpKy5r26bVFaJHcQcC5iS0Qvgbxy3aRaPVugfPomGVWDalg9776fX6qGjcBbfgggLZx1ezFQKZZRllAB8tV8+ENAShOAHwjVYfZyhoidHRkpPtVq6iMS7YSBuCDfyyhWlpV1ijpEQSgZQ==
X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1648503105; bh=22Lerappj6Ugd3H4qpaqQaY1fK0aOUOebbB+5sGELYD=; h=X-Sonic-MF:Date:Subject:To:From:From:Subject; b=lLnB+yCsxHW/q+lPMrwm8pynv/lfrAuiQlDbuv0VEJ1nArhdFYTM8mAg9EmFczVQpw2XHFU1PpGPjZbElcCq0T+dc7jPztBt9QTXTPZwcNjSufuPyDXwHBOcBTxqQOK7Vnio9OaU/j2Na/HsdE3DfymbEplV3PUlxNq6mBYCF++m7ngvy4lwRMfz7gPIdFSk2dfMGWrRnxD59fwtOMqzVzvddFA/IPElA03oBXLNtMHzuOPWHtkNjGpwQMTKAmvPcUPD2fzgPXjxsn508aQBspKH1faBowKzlVVFOBxWQTDImkeWY1MKXc/Vbz49898V7qbu8hD/hNVppnXF9kSN4A==
X-YMail-OSG: c9oqg0kVM1n3u2Aijuc0DpW93SDl2.L0MTTm33PFVgxm_7ctgOPx1e5GmtxrLuw
 XIfwHanMRtT9wMQWQURdQe.gnd6LWvneTi15n8U3B.mdEvW0NnfBdvHDvR7UEJuU3.bNJi0HGyRa
 VyC4mRNSJi32LK_Qa8zjRib3KSMlgXQyFXOMzaPlzIBAP4.96tUUKOpN63rYYu0UYaIJEXw74IJa
 mDAAPctccj6kF29j_gsqkVs0uXoLo.YtQjkMG4AI82sUeU1Leyge_tXU4Dxt4rvz6lPklrvBanbH
 7Glgqugk4Yj3QyZl_.uCcYzvDCaxGVBjhTN0xgzb7KLBCwS5OEs4mkgt6FF9XLliC4PvTRPJd7cf
 AQdlKXTt.eARROE1bVF43STWj0zSmSNFfvsGJaUhhIKKloFWU5FBoLZNJNU5XQnirWCkWFJMH.vs
 4Mi9h7vXJEcPcCSD.0KI6HpNuSg4i_.sG4nSsyLDEZBy6IinXGXw18HA3npSQe4_86DXiyYg07Qn
 kludlGMpcuPEwufuaosCq0cM57W6k..fc0voREBfGuBx9_H11vlWrX.EssOYKLLXSC.ns1kMJSFJ
 IxEThCgxXrrdZrksW5qYhOGK96PHzlMta707mIElB5Pie..MoEAATAFFjhfiA2vOjcQkOQrZH6dY
 r85zq2.7wb5dZqdJ0FYg.0Z5bvVoAC1uVLrRQIECrdTE8WAAwTCTqPJTDhlpX6m9tFBt0gsJTQ4_
 gaSCPM2ihjhIvuMNuPn7pKZwUYlUY9aQukEy3pncAVqU23fvOZJ0._XZSSKOwS60rBNte5LDBKpp
 ddQMnGKlXZ1VJJdZOJs7BaCYy1gqvFb_XKU1Wnp2kPSPUU8r4tKi3fBdipWiuHbFstmC3.gjRq0q
 ULNtxnbvA21bPtPnAstwSXiD577pVBpGx6ZDLFulYJqLFHAftB6fQ.jlwPQVAy8ZRh.PiYz0f9tk
 2TFkVZKjMJSi42uhMYsQ9tqsYRg6PobGUlSJWP_uRgodBu.insZYv4L1U_Ib6iCS.K7yH98NPuLv
 N2AH3aoeLGiU7bQIjFWcZ.lMmdQxDsE9GbS5rsoeSmv8mDVRRBjSROvOhjWUBTatAjxE5stPX3B3
 7aKNc9Ld8OCSTIWm7Oi2eaug8KYcvRWA5hhwGyw4xzZ3RHIQr05RfnqjH69nv7Xv2DrpPqsICYLl
 iYHutwQ.xgMLKfOtCLCilhcm5KKDEMiK2rEIAHnuvWSsYzHdGuQEnCkbfVz_ZPOO2KD.jL20QH3j
 43IR2raQH2ujUrWKJmV0V6mhwvwRAQBB911O7GN14KTOTWafCJ7NEmP3V_qnT9w1Zg632D8xhbqb
 S9Ldcoj_4PWlR4yphuyCf_B2N.CAOF1hgc1rr1bjC.6khNoiFr4OZsVsz_xxgWXNjmVSPJ_vR5fS
 aqlxCoEM2ZpASH2DzK2lBJNzQ3Qsu2HGuIV7qp82p6Hz3uAByVGpdl5NgMuA.vz19F5rR8CYrlIr
 BItDFYor8n5iCGKFRTup6Wptji00XRhkLn.wX50Y3PdYbe9v.bcZ9yDzqEIZC8AwhZmmBmzogsdZ
 QBSs_on3A4mjgdOI0lJUx.kaZZtLWsqZwJ0dU1znphsQMfVqtG.v0b6VCv78Gbsa.wW1KWOW8dYl
 j9D0GCySZE.U2FPjrpvMs0pkRdWXgVY97tCD5oE3_mKRx0nIs9x75MRnH3dVSLbAfxH4DCErlY1h
 TOlDlU92aCuMPeZCWhKf8FnHvoIoAjPQHjwOXLvBSl16k_rrRv3Eg8ePQwANDw8BZlFrCk4byldN
 mU5pVr7EMKQiHOX._Bd.OQj66uBoFISrnj6Yv9d4cG.Wm0pYJqFkWUVQWB.GhIKXhLbOm1Q3pEcz
 _nvI6hagPm5Bujm7s5v_s3uIoQhGVeBntXnpM9JyDcqUqotQBI_euDi6CKKBdg2k5.aa8xJFD6ip
 WI2p0GmP.cvoGtAxfM7Z2Bw2dZvcU39sGqnTwzr75x2uj5k9Uq1zUQGiISKmqLp7x.vMls7NjOBp
 w6ZDavSS3_fU9o7Xd71hmuaowfOa76HA1Khm46G5Ysg.AUe_rfLRy5hQSee5tlWS2facQRZfVU1U
 n2AeFYy0kuVBMCkpxQlnBgUtdgO38sMDXT4B3kLjHf0ThnKQv2sB6Jq13sAVXlWoBQ1y8r_pyid0
 3LClGS.bJQfL8oNs6ARIm5GPDXHHop7Nsvp2HZgIuFdqWW9MbMDFeFPGQg26fFP53cR1EUhJR8aA
 voO97x8tey04ZyCE-
X-Sonic-MF: <brchuckz@aim.com>
Message-ID: <ae555879-9e3a-88d8-fa8f-4c4d60288d8f@netscape.net>
Date: Mon, 28 Mar 2022 17:31:38 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [XEN PATCH] tools/libs/light/libxl_pci.c: explicitly grant access
 to Intel IGD opregion
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>
Cc: Wei Liu <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>,
 Juergen Gross <jgross@suse.com>, xen-devel@lists.xenproject.org
References: <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz.ref@netscape.net>
 <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz@netscape.net>
 <23f5afb4-c712-f872-acee-7f18b98b73e6@suse.com>
From: Chuck Zmudzinski <brchuckz@netscape.net>
In-Reply-To: <23f5afb4-c712-f872-acee-7f18b98b73e6@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Mailer: WebService/1.1.19987 mail.backend.jedi.jws.acl:role.jedi.acl.token.atz.jws.hermes.aol
Content-Length: 1550


On 3/15/22 7:38 AM, Jan Beulich wrote:
> On 14.03.2022 04:41, Chuck Zmudzinski wrote:
>
>> +        ret = xc_domain_iomem_permission(CTX->xch, stubdom_domid,
>> +                                         vga_iomem_start,
>> +                                         IGD_OPREGION_PAGES, 1);
>> +        if (ret < 0) {
>> +            LOGED(ERROR, domid,
>> +                  "failed to give stubdom%d access to iomem range "
>> +                  "%"PRIx64"-%"PRIx64" for IGD passthru",
>> +                  stubdom_domid, vga_iomem_start, (vga_iomem_start +
>> +                                                IGD_OPREGION_PAGES - 1));
>> +            return ret;
>> +        }
> I have to admit that I find it odd that this is done unconditionally,
> but I notice the same is done in pre-existing code. I would have
> expected this to happen only when there actually is a device model
> stub domain.
>
> Jan

I dumped the value of stubdom_id for my tests with the
device model running in dom0:

libxl: info: libxl_pci.c:2556:libxl__grant_vga_iomem_permission: Domain 
3: stubdom id: 0

As I expected, when there is not a device model stub domain
and the device model runs in dom0, the stubdom_id is 0.

I will now do some tests to see if this is necessary when the
device model runs in dom0. I would like to know if the device
model running in dom0 needs to have access granted here
or not. When there is a device model stub domain, I presume
it is necessary, and I can check that also and write the
next version of the patch accordingly.

Chuck


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 22:06:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 22:06:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295595.503089 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYxVB-0005XB-8s; Mon, 28 Mar 2022 22:06:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295595.503089; Mon, 28 Mar 2022 22:06:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYxVB-0005X4-4A; Mon, 28 Mar 2022 22:06:17 +0000
Received: by outflank-mailman (input) for mailman id 295595;
 Mon, 28 Mar 2022 22:06:16 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=1gpf=UH=kernel.org=pr-tracker-bot@srs-se1.protection.inumbo.net>)
 id 1nYxV9-0005Wy-Uc
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 22:06:16 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org
 [2604:1380:4641:c500::1])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 48404281-aee3-11ec-8fbc-03012f2f19d4;
 Tue, 29 Mar 2022 00:06:14 +0200 (CEST)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id D1D5461540;
 Mon, 28 Mar 2022 22:06:12 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPS id 3BE73C340ED;
 Mon, 28 Mar 2022 22:06:12 +0000 (UTC)
Received: from aws-us-west-2-korg-oddjob-1.ci.codeaurora.org
 (localhost.localdomain [127.0.0.1])
 by aws-us-west-2-korg-oddjob-1.ci.codeaurora.org (Postfix) with ESMTP id
 2986CEAC081; Mon, 28 Mar 2022 22:06:12 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 48404281-aee3-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1648505172;
	bh=XDHX0WEgIa8e+llG90tklr+k0N0LpRWXlKeNqm0bbEU=;
	h=Subject:From:In-Reply-To:References:Date:To:Cc:From;
	b=TeNnPH4UEOMYXIrwHAbji1EWj84BWiNJMk2Www5A8o6YKyAuhDzaY5Kad2ugzJ0C3
	 3pF+vUIMCD26jVj6t99ADaSxHFF2Nx61pb4pT7t3xiPvRCR1u3+TtZxJb7gvACq+Uh
	 0lTX4lLIOy/2I5zOEBie5wJQ5XHSlGw/Rybi3wB6+9d2YL3g19bIDicya1ODHmqDdC
	 y79K0QAPS07zkKpHryVWrWQXiwfN1hjy0SLePalZiujnYKIHDzbQPyRD/wfdySWv/m
	 F9i7Z0pDQYHAj/iAmggTIj1JCVM5hM9e1ph+mezt3H2zsy5W6StnZdqLyspwhOHYWH
	 DNNuJyRMIEj8Q==
Subject: Re: [GIT PULL] xen: branch for v5.18-rc1
From: pr-tracker-bot@kernel.org
In-Reply-To: <20220328092544.14418-1-jgross@suse.com>
References: <20220328092544.14418-1-jgross@suse.com>
X-PR-Tracked-List-Id: <linux-kernel.vger.kernel.org>
X-PR-Tracked-Message-Id: <20220328092544.14418-1-jgross@suse.com>
X-PR-Tracked-Remote: git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-5.18-rc1-tag
X-PR-Tracked-Commit-Id: de2ae403b4c0e79a3410e63bc448542fbb9f9bfc
X-PR-Merge-Tree: torvalds/linux.git
X-PR-Merge-Refname: refs/heads/master
X-PR-Merge-Commit-Id: a701f370b521b2ed0654a9da7cf424b3ff8fa73d
Message-Id: <164850517216.27348.18317093563343238542.pr-tracker-bot@kernel.org>
Date: Mon, 28 Mar 2022 22:06:12 +0000
To: Juergen Gross <jgross@suse.com>
Cc: torvalds@linux-foundation.org, linux-kernel@vger.kernel.org, xen-devel@lists.xenproject.org, boris.ostrovsky@oracle.com

The pull request you sent on Mon, 28 Mar 2022 11:25:44 +0200:

> git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-5.18-rc1-tag

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/a701f370b521b2ed0654a9da7cf424b3ff8fa73d

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 22:25:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 22:25:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295601.503106 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYxnx-00082O-V5; Mon, 28 Mar 2022 22:25:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295601.503106; Mon, 28 Mar 2022 22:25:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYxnx-00082H-SD; Mon, 28 Mar 2022 22:25:41 +0000
Received: by outflank-mailman (input) for mailman id 295601;
 Mon, 28 Mar 2022 22:25:40 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=9vXr=UH=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nYxnw-00080g-25
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 22:25:40 +0000
Received: from sin.source.kernel.org (sin.source.kernel.org [145.40.73.55])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id fdccb9c0-aee5-11ec-a405-831a346695d4;
 Tue, 29 Mar 2022 00:25:38 +0200 (CEST)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by sin.source.kernel.org (Postfix) with ESMTPS id A016FCE1412;
 Mon, 28 Mar 2022 22:25:33 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id D93E3C340F0;
 Mon, 28 Mar 2022 22:25:31 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fdccb9c0-aee5-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1648506332;
	bh=HKNs+BPT0BTx0ydLHWPjNZmHlRPuW02CYMZrw1TQkF8=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=W2UStj7ig350Brn3uSs8ouvlHwerHq9Jwiu9PnPeGjSRbmqLMnbrUTgp7V6auJxIe
	 q5/zQRTYsTpij8kFNup/89jXF9LT/Eo4BmCLrokmyMTgxZ0dYJPM8jaf64ifYfElpm
	 UJn0Xoq50T/x5GOHNbE+nH9sOO82k4/g2xT4iRXCQseWAcRjjiNuepRPn7f70nnHvL
	 3u9gqWIjrKKeMoQLJLKSuvcZF2POts6mKjrryP2Zo5JriVl+rLlaJctU0yl7EtKztp
	 9D9f7LBExfUfPyoWQVXcvT6PD+1D+soXO/9UUKxQSIXxyy68yC5OwEvVQroqklyaL1
	 3gMLYgXDTh38g==
Date: Mon, 28 Mar 2022 15:25:30 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Elliott Mitchell <ehem+xen@m5p.com>
cc: xen-devel@lists.xenproject.org, sstabellini@kernel.org
Subject: Re: OS Headers hypercall.h/hypervisor.h
In-Reply-To: <Yj+ekdLdRa9U7dfa@mattapan.m5p.com>
Message-ID: <alpine.DEB.2.22.394.2203281523230.2910984@ubuntu-linux-20-04-desktop>
References: <Yj+ekdLdRa9U7dfa@mattapan.m5p.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Sat, 26 Mar 2022, Elliott Mitchell wrote:
> The hypercalls implementation for Linux and FreeBSD have two key headers,
> hypercall.h and hypervisor.h.  I'm curious why the implementations for
> x86 and ARM* are so distinct.
> 
> I found it fairly straightforward to implement ARM* versions of the x86
> _hypercall#() macros.  Once that is done, most of the wrappers in the x86
> hypercall.h can be moved to a shared hypervisor.h header.
> 
> Why does Xen/ARM on Linux still have hypercall.S when merging the
> headers should reduce maintainance?
> 
> Was GCC extended inline assembly language for ARM* thought too awful?
> 
> I'm also curious why these headers are part of the Linux kernel, instead
> of being maintained by the Xen Project?

I would have to dig through ancient archives to give you a full answer
but the reason was that the asm inline on ARM didn't provide enough
guarantees on ordering and registers it would use and clobber.


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 23:21:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 23:21:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295607.503122 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYyg2-0005uS-3a; Mon, 28 Mar 2022 23:21:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295607.503122; Mon, 28 Mar 2022 23:21:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYyg2-0005uL-0P; Mon, 28 Mar 2022 23:21:34 +0000
Received: by outflank-mailman (input) for mailman id 295607;
 Mon, 28 Mar 2022 23:21:32 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=9vXr=UH=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nYyg0-0005uE-Nd
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 23:21:32 +0000
Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id cb636d6f-aeed-11ec-8fbc-03012f2f19d4;
 Tue, 29 Mar 2022 01:21:30 +0200 (CEST)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ams.source.kernel.org (Postfix) with ESMTPS id A278BB8115C;
 Mon, 28 Mar 2022 23:21:27 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id E1849C340ED;
 Mon, 28 Mar 2022 23:21:25 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cb636d6f-aeed-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1648509686;
	bh=9cRGrfJmmrL66zzdetsW2vFEFDubcVPSD5hgq9Z2gK8=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=dkQlBFhmNXgEc9148O5hk/SVUJp9b3pW1xLMdExJy4/N3fv7rP/T1ENceA2+jj81I
	 bVAEdCb8EikVzoAtAACnKSaeTzXy14qDS6AntFXnXB+ZRsPkI6CHZsu/b2DVHCNEXI
	 OGTGNPYZpGcJtH/yZ4bJObXLNoa8RbuCvb2LGi8d7idbYxiInq9NKuH26FcZ+EWnWh
	 YyfGU2RLBqzFHdTPwo72qV0j1+lmfl+Ah0JKDVOqmDefvp4y+DMmHAYdOsncI4ke7v
	 ZPNR8tyRkvOTzdRRlYA6t3L6yrCdGP0Ye1zRLZ8iWlv5A1PZi7ziuElU00MQle81Nc
	 E8sLmoaAUTDqw==
Date: Mon, 28 Mar 2022 16:21:25 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: "Daniel P. Smith" <dpsmith@apertussolutions.com>
cc: xen-devel@lists.xenproject.org, scott.davis@starlab.io, 
    Andrew Cooper <andrew.cooper3@citrix.com>, 
    George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, 
    Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, 
    Wei Liu <wl@xen.org>, Daniel De Graaf <dgdegra@tycho.nsa.gov>
Subject: Re: [RFC PATCH 1/1] xsm: allows system domains to allocate evtchn
In-Reply-To: <20220328203622.30961-2-dpsmith@apertussolutions.com>
Message-ID: <alpine.DEB.2.22.394.2203281621000.2910984@ubuntu-linux-20-04-desktop>
References: <20220328203622.30961-1-dpsmith@apertussolutions.com> <20220328203622.30961-2-dpsmith@apertussolutions.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Mon, 28 Mar 2022, Daniel P. Smith wrote:
> During domain construction under dom0less and hyperlaunch it is necessary to
> allocate at least the event channel for xenstore and potentially the event
> channel for the core console. When dom0less and hyperlaunch are doing their
> construction logic they are executing under the idle domain context. The idle
> domain is not a privileged domain, it is not the target domain, and as a result
> under the current default XSM policy is not allowed to allocate the event
> channel.
> 
> This patch only addresses the event channel situation by adjust the default XSM
> policy for xsm_evtchn_unbound to explicitly allow system domains to be able to
> make the allocation call.
> 
> Signed-off-by: Daniel P. Smith <dpsmith@apertussolutions.com>

Reviewed-by: Stefano Stabellini <sstabellini@kernel.org>
Tested-by: Stefano Stabellini <sstabellini@kernel.org>


> ---
>  xen/common/event_channel.c | 4 ++--
>  xen/include/xsm/dummy.h    | 8 ++++++--
>  2 files changed, 8 insertions(+), 4 deletions(-)
> 
> diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c
> index ffb042a241..c9c3876ee9 100644
> --- a/xen/common/event_channel.c
> +++ b/xen/common/event_channel.c
> @@ -306,7 +306,7 @@ static int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
>          ERROR_EXIT_DOM(port, d);
>      chn = evtchn_from_port(d, port);
>  
> -    rc = xsm_evtchn_unbound(XSM_TARGET, d, chn, alloc->remote_dom);
> +    rc = xsm_evtchn_unbound(XSM_OTHER, d, chn, alloc->remote_dom);
>      if ( rc )
>          goto out;
>  
> @@ -1366,7 +1366,7 @@ int alloc_unbound_xen_event_channel(
>          goto out;
>      chn = evtchn_from_port(ld, port);
>  
> -    rc = xsm_evtchn_unbound(XSM_TARGET, ld, chn, remote_domid);
> +    rc = xsm_evtchn_unbound(XSM_OTHER, ld, chn, remote_domid);
>      if ( rc )
>          goto out;
>  
> diff --git a/xen/include/xsm/dummy.h b/xen/include/xsm/dummy.h
> index 58afc1d589..bd31ce43f9 100644
> --- a/xen/include/xsm/dummy.h
> +++ b/xen/include/xsm/dummy.h
> @@ -294,8 +294,12 @@ static XSM_INLINE int cf_check xsm_claim_pages(XSM_DEFAULT_ARG struct domain *d)
>  static XSM_INLINE int cf_check xsm_evtchn_unbound(
>      XSM_DEFAULT_ARG struct domain *d, struct evtchn *chn, domid_t id2)
>  {
> -    XSM_ASSERT_ACTION(XSM_TARGET);
> -    return xsm_default_action(action, current->domain, d);
> +    XSM_ASSERT_ACTION(XSM_OTHER);
> +
> +    if ( is_system_domain(current->domain) )
> +        return xsm_default_action(XSM_HOOK, current->domain, d);
> +    else
> +        return xsm_default_action(XSM_TARGET, current->domain, d);
>  }
>  
>  static XSM_INLINE int cf_check xsm_evtchn_interdomain(
> -- 
> 2.20.1
> 


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 23:23:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 23:23:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295610.503134 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYyhr-0006TA-GD; Mon, 28 Mar 2022 23:23:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295610.503134; Mon, 28 Mar 2022 23:23:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYyhr-0006Sx-D3; Mon, 28 Mar 2022 23:23:27 +0000
Received: by outflank-mailman (input) for mailman id 295610;
 Mon, 28 Mar 2022 23:23:26 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=9vXr=UH=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1nYyhq-0006Sl-E7
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 23:23:26 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 107a244f-aeee-11ec-a405-831a346695d4;
 Tue, 29 Mar 2022 01:23:25 +0200 (CEST)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 9DE3460E65;
 Mon, 28 Mar 2022 23:23:23 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 64263C340ED;
 Mon, 28 Mar 2022 23:23:22 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 107a244f-aeee-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1648509803;
	bh=glcSDVK6qklPeLspum9Sl2AkohV1hm1plc9IOPlYaL0=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=fWQV3qUZupve9O7A5PV05eFBP+P8AAzNOX0MeTq5p6nmm+oFRTKEQQEivr9oTQcHv
	 X89xp37nxZ/o/ZQ4Psv0gTXQF8IooE5/90nfrvSXm8JUCZmIkkcy+fQEL195V3AUE7
	 Db0VbGp8xrmUj728S64C6KRqxkIszelpz6+i5ORd4N4GxFN4NLXbiDjx+Lg/B3DCJq
	 Ox5IgL6GEgiDaA5ftHO5lOBQ25NlQrLdU9rcJ4d+yQzzzMt8BAqXL93rYwfRIuG76g
	 mvQ5/CCIwmE0Yx0Y7o8jw9xln8YAv+yEHTrYWhREHWMuLd8dPL8usBNzsz395k2053
	 sgpbRuHGvD6oQ==
Date: Mon, 28 Mar 2022 16:23:21 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: "Daniel P. Smith" <dpsmith.dev@gmail.com>
cc: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>, 
    Jan Beulich <jbeulich@suse.com>, xen-devel@lists.xenproject.org, 
    jgross@suse.com, Bertrand.Marquis@arm.com, Volodymyr_Babchuk@epam.com, 
    Luca Miccio <lucmiccio@gmail.com>, 
    Stefano Stabellini <stefano.stabellini@xilinx.com>, 
    Andrew Cooper <andrew.cooper3@citrix.com>, 
    George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH v3 2/5] xen: make evtchn_alloc_unbound public
In-Reply-To: <efb76b14-59a1-0e26-d0ae-2e3ba7bd29f3@gmail.com>
Message-ID: <alpine.DEB.2.22.394.2203281621340.2910984@ubuntu-linux-20-04-desktop>
References: <alpine.DEB.2.22.394.2201281330520.27308@ubuntu-linux-20-04-desktop> <20220128213307.2822078-2-sstabellini@kernel.org> <2f05e63a-96c3-e78f-f7e4-36fd17fcd58c@gmail.com> <alpine.DEB.2.22.394.2203221711110.2910984@ubuntu-linux-20-04-desktop>
 <c57dc9a9-e2ca-74c6-4fde-e2a6f1400de5@suse.com> <alpine.DEB.2.22.394.2203241522510.2910984@ubuntu-linux-20-04-desktop> <da700983-759b-2de6-9c36-0d09c6b06c0d@xen.org> <alpine.DEB.2.22.394.2203251313350.2910984@ubuntu-linux-20-04-desktop>
 <efb76b14-59a1-0e26-d0ae-2e3ba7bd29f3@gmail.com>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII

On Mon, 28 Mar 2022, Daniel P. Smith wrote:
> On 3/25/22 17:05, Stefano Stabellini wrote:
> > On Fri, 25 Mar 2022, Julien Grall wrote:
> >> So to me, the idea of switching to a "fake" domain or bypassing the check is
> >> more appealing. I have a preference for the "fake" domain here.
> > 
> > As a maintainer, I am not opposed to the "fake"/"contructor" domain
> > concept.  It all depends on how many instances of this issue we are
> > going to have.  This is the only one on xen-devel so far. I don't think
> > it is worth adding a constructor domain for one instance only.  But I
> > agree with you and Daniel that if we end up with several instances, then
> > the constructor domain approach is probably the best option overall.
> > 
> > 
> > As a contributor, sadly I won't be able to spend a lot of time on this
> > in the following months. If a significant rework is required, I don't
> > think I'll be able to do it, at least not for this Xen release (and it
> > would be nice to have dom0less PV drivers in the coming release.) If
> > Daniel is willing, I could add his "idle_domain is_priv" patch to this
> > series.  Not as clean as a proper constructor domain but it would work
> > and it would be simple. It could be evolved into a nicer constructor
> > domain later.
> > 
> > This is not my preference but I could do that if Julien and Jan prefer
> > this approach and if Daniel is happy to share his patch.
> > 
> > 
> >> AFAIU, your proposal is to duplicate code. This brings other risks such as
> >> duplicated bug and more code to maintain.
> > 
> > Got it. I'll make one last attempt at a proposal that doesn't involve
> > the fake constructor domain. The goal is to avoid code duplication while
> > providing a safe way forward to make progress with only a small amount
> > of changes. What if we:
> > 
> > - rename evtchn_alloc_unbound to _evtchn_alloc_unbound (still static)
> > - add a skip_xsm parameter to _evtchn_alloc_unbound
> > - introduce a wrapper evtchn_alloc_unbound that always set skip_xsm to
> >   false (same interface as today's evtchn_alloc_unbound)
> > - introduce an __init early_evtchn_alloc_unbound public function that
> >   sets skip_xsm to true
> > 
> > This way:
> > - we have a single implementation in _evtchn_alloc_unbound (no code
> >   duplication)
> > - the only function exposed that skips the XSM check is __init
> > - evtchn_alloc_unbound continue to have the XSM check same as today
> > 
> > 
> > E.g.:
> > static int _evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc, bool skip_xsm)
> > {
> >     ...
> > }
> > 
> > static int evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
> > {
> >     return _evtchn_alloc_unbound(alloc, false);    
> > }
> > 
> > int __init early_evtchn_alloc_unbound(evtchn_alloc_unbound_t *alloc)
> > {
> >     return _evtchn_alloc_unbound(alloc, true);
> > }
> > 
> > 
> > Would this be good enough for now?
> 
> Please see the RFC patch I just posted[1], IMHO I think this is a safer
> approach for this specific instance.
> 
> [1]
> https://lore.kernel.org/xen-devel/20220328203622.30961-1-dpsmith@apertussolutions.com/T/#t

I read it, the patch looks fine. I also tested it together with my
series and it solves the problem. With [1], it is just a matter of
making evtchn_alloc_unbound as is non-static.

If the other maintainers also agree with [1], then I'll just rebase on
it and limit my changes to exporting evtchn_alloc_unbound.


From xen-devel-bounces@lists.xenproject.org Mon Mar 28 23:54:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 28 Mar 2022 23:54:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295615.503145 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYzBT-0001WK-Tm; Mon, 28 Mar 2022 23:54:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295615.503145; Mon, 28 Mar 2022 23:54:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nYzBT-0001WD-QS; Mon, 28 Mar 2022 23:54:03 +0000
Received: by outflank-mailman (input) for mailman id 295615;
 Mon, 28 Mar 2022 23:42:08 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=hRXT=UH=openbsd.org=deraadt@srs-se1.protection.inumbo.net>)
 id 1nYyzw-0000XV-OF
 for xen-devel@lists.xenproject.org; Mon, 28 Mar 2022 23:42:08 +0000
Received: from cvs.openbsd.org (cvs.openbsd.org [199.185.137.3])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id ac99c71b-aef0-11ec-a405-831a346695d4;
 Tue, 29 Mar 2022 01:42:06 +0200 (CEST)
Received: from cvs.openbsd.org (localhost [127.0.0.1])
 by cvs.openbsd.org (OpenSMTPD) with ESMTP id 40cc56d5;
 Mon, 28 Mar 2022 17:42:02 -0600 (MDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ac99c71b-aef0-11ec-a405-831a346695d4
From: "Theo de Raadt" <deraadt@openbsd.org>
To: Demi Marie Obenour <demi@invisiblethingslab.com>
cc: Mark Kettenis <mark.kettenis@xs4all.nl>, djm@mindrot.org,
    roger.pau@citrix.com, marmarek@invisiblethingslab.com,
    xen-devel@lists.xenproject.org, tech@openbsd.org
Subject: Re: Security support status of xnf(4) and xbf(4)
In-reply-to: <10e7b01a-2a8e-17cd-6418-1a6f836cc251@invisiblethingslab.com>
References: <Yj3qW/y20htoSvuK@itl-email> <37a4b6-cd56-1993-be2-b5522b9aa4d7@mindrot.org> <c904abda-e6a0-256e-478a-ee0909c17e50@invisiblethingslab.com> <d3ccc20d61dc7636@bloch.sibelius.xs4all.nl> <10e7b01a-2a8e-17cd-6418-1a6f836cc251@invisiblethingslab.com>
Comments: In-reply-to Demi Marie Obenour <demi@invisiblethingslab.com>
   message dated "Mon, 28 Mar 2022 16:38:33 -0400."
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
Date: Mon, 28 Mar 2022 17:42:02 -0600
Message-ID: <37125.1648510922@cvs.openbsd.org>

And I simply why we don't simply delete all that code.


Demi Marie Obenour <demi@invisiblethingslab.com> wrote:

> On 3/28/22 10:39, Mark Kettenis wrote:
> >> Date: Mon, 28 Mar 2022 09:51:22 -0400
> >> From: Demi Marie Obenour <demi@invisiblethingslab.com>
> >>
> >> On 3/27/22 21:45, Damien Miller wrote:
> >>> On Fri, 25 Mar 2022, Demi Marie Obenour wrote:
> >>>
> >>>> Linux=E2=80=99s netfront and blkfront drivers recently had a security
> >>>> vulnerability (XSA-396) that allowed a malicious backend to potentia=
lly
> >>>> compromise them.  In follow-up audits, I found that OpenBSD=E2=80=99=
s xnf(4)
> >>>> currently trusts the backend domain.  I reported this privately to T=
heo
> >>>> de Raadt, who indicated that OpenBSD does not consider this to be a
> >>>> security concern.
> >>>>
> >>>> This is obviously a valid position for the OpenBSD project to take, =
but
> >>>> it is surprising to some (such as myself) from the broader Xen
> >>>> ecosystem.  Standard practice in the Xen world is that bugs in front=
ends
> >>>> that allow a malicious backend to cause mischief *are* considered
> >>>> security bugs unless there is explicit documentation to the contrary.
> >>>> As such, I believe this deserves to be noted in xnf(4) and xbf(4)=E2=
=80=99s man
> >>>> pages.  If the OpenBSD project agrees, I am willing to write a patch,
> >>>> but I have no experience with mandoc so it might take a few tries.
> >>>
> >>> Hang on, what is a "malicious backend" in this context? Is it somethi=
ng
> >>> other than the Xen Hypervisor? If not, then it seems not to be a usef=
ul
> >>> attack model, as the hypervisor typically has near-complete access to
> >>> guests' memory and CPU state.
> >>
> >> The backend can run in any Xen VM.  It often runs in dom0, but it
> >> is not required to, and in Qubes OS the network backend never runs
> >> in dom0.  Unless it runs in dom0, it has no access to frontend memory,
> >> except for memory the frontend has explicitly given it access to via
> >> grant tables.
> >=20
> > So this is somewhat similar to the situation on sun4v (Sun's
> > virtualization of the SPARC architecture).  When writing the vnet(4)
> > and vdsk(4) drivers for OpenBSD, I did consider the implications of
> > those drivers talking to a "malicious" domain.  the SPARC hypervisor
> > implements a concept similar to grant tables.  It is fairly obvious
> > that any memory you grant access to should be considered insecure.
> > This means that you either have to make a copy of the data or revoke
> > access to the shared memory through some sort of Hypervisor call that
> > implements a synchronization point of some sorts.  Otherwise you and
> > up TOCTOU issues all over the place.  But this obviously has
> > significant performance consequences.  For vnet(4) I decided that an
> > extra copy was worth doing and the only reasonable way of doing things
> > given how OpenBSD's mbuf layer works.  But for vdsk(4) I decided to
> > trust the other domain as there is no way to prevent it from feeding
> > you compromised data.  Full disk encryption doesn't really solve the
> > problem unless you have a way to securely verify the bootloader.
>=20
> In Qubes OS, xbf(4) devices are configurable.  While all of them are
> provided by dom0 (which is trusted) by default, it is possible to
> attach devices that are *not* provided by dom0, and these devices
> should not be trusted.
>=20
> > Personally I think it might be beneficial for us to turn xnf(4) into
> > what we colloquially call a "bcopy" network driver.  But folks who
> > actually use xen may find the performance impact of doing this
> > unacceptable and decide to trust the backend instead.
>=20
> You actually don=E2=80=99t have to do that.  The Xen network protocol
> requires the backend to drop access to the buffer before giving it
> to the frontend, so the frontend only needs to ensure that it cannot
> regain access.  This will fail if the backend still has access, but
> that is a bug in the backend, in which case you should shut down the
> interface.  So there should not be any significant performance impact.
>=20
> If you are curious about how Linux does this, you can look at
> drivers/xen/grant-table.c, drivers/net/xen-netfront.c, and
> drivers/block/xen-blkfront.c from the Linux source.  They are
> dual licensed GPL/MIT so there should not be licensing issues there.
> Be sure to use a version at or after =E2=80=9Cxen/netfront: react properl=
y to
> failing gnttab_end_foreign_access_ref()=E2=80=9D and the other XSA-396 pa=
tches.
> --=20
> Sincerely,
> Demi Marie Obenour (she/her/hers)
> Invisible Things Lab


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 00:50:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 00:50:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295625.503167 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ03X-0007LF-Kr; Tue, 29 Mar 2022 00:49:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295625.503167; Tue, 29 Mar 2022 00:49:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ03X-0007L8-I0; Tue, 29 Mar 2022 00:49:55 +0000
Received: by outflank-mailman (input) for mailman id 295625;
 Tue, 29 Mar 2022 00:49:54 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ03V-0007Ky-V1; Tue, 29 Mar 2022 00:49:53 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ03V-0001XA-Qf; Tue, 29 Mar 2022 00:49:53 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ03V-00073L-Da; Tue, 29 Mar 2022 00:49:53 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ03V-00050M-D8; Tue, 29 Mar 2022 00:49:53 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Q9IPGC0nCTDzjtd7GD/R31hNEEsS/ZYd1FkpgvJy5sM=; b=4A9vqsRIGMUORUAdQEENBJzXxs
	r/zXOV5a6rBrRn8xOJWKkgPWCJxeZAw3oZnQxijDyxUxrqoq634+JL5K/ntm3kOfxR6/RfB2fAza/
	DdWCJgtLxES83dZ5NmvbIAmbI60N0RW4WNWjR8pVw4l1U85tP9X4Hum5Rx8ZmFL6+mtA=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168940-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168940: trouble: blocked/broken/pass
X-Osstest-Failures:
    qemu-mainline:build-amd64:<job status>:broken:regression
    qemu-mainline:build-amd64-pvops:<job status>:broken:regression
    qemu-mainline:build-amd64-xsm:<job status>:broken:regression
    qemu-mainline:build-arm64:<job status>:broken:regression
    qemu-mainline:build-arm64-pvops:<job status>:broken:regression
    qemu-mainline:build-arm64-xsm:<job status>:broken:regression
    qemu-mainline:build-armhf-pvops:<job status>:broken:regression
    qemu-mainline:build-i386:<job status>:broken:regression
    qemu-mainline:build-i386-pvops:<job status>:broken:regression
    qemu-mainline:build-i386-xsm:<job status>:broken:regression
    qemu-mainline:build-i386-pvops:host-install(4):broken:regression
    qemu-mainline:build-amd64:host-install(4):broken:regression
    qemu-mainline:build-i386-xsm:host-install(4):broken:regression
    qemu-mainline:build-i386:host-install(4):broken:regression
    qemu-mainline:build-arm64:host-install(4):broken:regression
    qemu-mainline:build-arm64-pvops:host-install(4):broken:regression
    qemu-mainline:build-arm64-xsm:host-install(4):broken:regression
    qemu-mainline:build-amd64-pvops:host-install(4):broken:regression
    qemu-mainline:build-amd64-xsm:host-install(4):broken:regression
    qemu-mainline:build-armhf-pvops:host-install(4):broken:regression
    qemu-mainline:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-qemuu-rhel6hvm-amd:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-pair:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-freebsd10-i386:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-freebsd10-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-coresched-i386-xl:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-coresched-amd64-xl:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:build-amd64-libvirt:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-shadow:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-rtds:build-check(1):blocked:nonblocking
    qemu-mainline:build-arm64-libvirt:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    qemu-mainline:build-i386-libvirt:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-dom0pvh-xl-amd:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-dom0pvh-xl-intel:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qcow2:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-pvshim:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-pair:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-pygrub:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-pvhv2-intel:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-freebsd11-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-freebsd12-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-pvhv2-amd:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-intel:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-multivcpu:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-credit1:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-credit2:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-qemuu-rhel6hvm-intel:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-shadow:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-vhd:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-xsm:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    qemuu=3d31fe4d662f13c70eb7e87f29513623ccd76322
X-Osstest-Versions-That:
    qemuu=f345abe36527a8b575482bb5a0616f43952bf1f4
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 29 Mar 2022 00:49:53 +0000

flight 168940 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168940/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-arm64                     <job status>                 broken
 build-arm64-pvops               <job status>                 broken
 build-arm64-xsm                 <job status>                 broken
 build-armhf-pvops               <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168856
 build-amd64                   4 host-install(4)        broken REGR. vs. 168856
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168856
 build-i386                    4 host-install(4)        broken REGR. vs. 168856
 build-arm64                   4 host-install(4)        broken REGR. vs. 168856
 build-arm64-pvops             4 host-install(4)        broken REGR. vs. 168856
 build-arm64-xsm               4 host-install(4)        broken REGR. vs. 168856
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 168856
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 168856
 build-armhf-pvops             4 host-install(4)        broken REGR. vs. 168856

Tests which did not succeed, but are not blocking:
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl           1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-cubietruck  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-rtds      1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-vhd       1 build-check(1)               blocked  n/a
 test-amd64-i386-qemuu-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-pair          1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-i386  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-amd64  1 build-check(1)               blocked  n/a
 test-amd64-coresched-i386-xl  1 build-check(1)               blocked  n/a
 test-amd64-coresched-amd64-xl  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-xsm       1 build-check(1)               blocked  n/a
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-shadow    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-rtds      1 build-check(1)               blocked  n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ws16-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-dom0pvh-xl-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1) blocked n/a
 test-amd64-amd64-dom0pvh-xl-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qcow2     1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvshim    1 build-check(1)               blocked  n/a
 test-amd64-amd64-pair         1 build-check(1)               blocked  n/a
 test-amd64-amd64-pygrub       1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-freebsd11-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-qemuu-freebsd12-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-xl-pvhv2-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-intel  1 build-check(1)              blocked n/a
 test-amd64-amd64-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit1   1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-arndale   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit1   1 build-check(1)               blocked  n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-xl            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-pvshim     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1)  blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-shadow     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-vhd        1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-xsm        1 build-check(1)               blocked  n/a

version targeted for testing:
 qemuu                3d31fe4d662f13c70eb7e87f29513623ccd76322
baseline version:
 qemuu                f345abe36527a8b575482bb5a0616f43952bf1f4

Last test of basis   168856  2022-03-25 15:08:16 Z    3 days
Testing same since   168873  2022-03-26 10:38:21 Z    2 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Peter Maydell <peter.maydell@linaro.org>
  Richard Henderson <richard.henderson@linaro.org>

jobs:
 build-amd64-xsm                                              broken  
 build-arm64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64                                                  broken  
 build-arm64                                                  broken  
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            broken  
 build-arm64-pvops                                            broken  
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-amd64-amd64-xl                                          blocked 
 test-amd64-coresched-amd64-xl                                blocked 
 test-arm64-arm64-xl                                          blocked 
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           blocked 
 test-amd64-coresched-i386-xl                                 blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-xl-xsm                                      blocked 
 test-arm64-arm64-xl-xsm                                      blocked 
 test-amd64-i386-xl-xsm                                       blocked 
 test-amd64-amd64-qemuu-nested-amd                            blocked 
 test-amd64-amd64-xl-pvhv2-amd                                blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-dom0pvh-xl-amd                              blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     blocked 
 test-amd64-i386-freebsd10-amd64                              blocked 
 test-amd64-amd64-qemuu-freebsd11-amd64                       blocked 
 test-amd64-amd64-qemuu-freebsd12-amd64                       blocked 
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         blocked 
 test-amd64-i386-xl-qemuu-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ws16-amd64                          blocked 
 test-armhf-armhf-xl-arndale                                  blocked 
 test-amd64-amd64-xl-credit1                                  blocked 
 test-arm64-arm64-xl-credit1                                  blocked 
 test-armhf-armhf-xl-credit1                                  blocked 
 test-amd64-amd64-xl-credit2                                  blocked 
 test-arm64-arm64-xl-credit2                                  blocked 
 test-armhf-armhf-xl-credit2                                  blocked 
 test-armhf-armhf-xl-cubietruck                               blocked 
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        blocked 
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         blocked 
 test-amd64-i386-freebsd10-i386                               blocked 
 test-amd64-amd64-qemuu-nested-intel                          blocked 
 test-amd64-amd64-xl-pvhv2-intel                              blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-amd64-dom0pvh-xl-intel                            blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-xl-multivcpu                                blocked 
 test-armhf-armhf-xl-multivcpu                                blocked 
 test-amd64-amd64-pair                                        blocked 
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-amd64-amd64-xl-pvshim                                   blocked 
 test-amd64-i386-xl-pvshim                                    blocked 
 test-amd64-amd64-pygrub                                      blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-amd64-amd64-xl-qcow2                                    blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-xl-rtds                                     blocked 
 test-armhf-armhf-xl-rtds                                     blocked 
 test-arm64-arm64-xl-seattle                                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              blocked 
 test-amd64-amd64-xl-shadow                                   blocked 
 test-amd64-i386-xl-shadow                                    blocked 
 test-arm64-arm64-xl-thunderx                                 blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 
 test-arm64-arm64-xl-vhd                                      blocked 
 test-armhf-armhf-xl-vhd                                      blocked 
 test-amd64-i386-xl-vhd                                       blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-arm64 broken
broken-job build-arm64-pvops broken
broken-job build-arm64-xsm broken
broken-job build-armhf-pvops broken
broken-job build-i386 broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-i386-pvops host-install(4)
broken-step build-amd64 host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step build-i386 host-install(4)
broken-step build-arm64 host-install(4)
broken-step build-arm64-pvops host-install(4)
broken-step build-arm64-xsm host-install(4)
broken-step build-amd64-pvops host-install(4)
broken-step build-amd64-xsm host-install(4)
broken-step build-armhf-pvops host-install(4)

Not pushing.

------------------------------------------------------------
commit 3d31fe4d662f13c70eb7e87f29513623ccd76322
Merge: f345abe365 c7ca3ad5e7
Author: Peter Maydell <peter.maydell@linaro.org>
Date:   Fri Mar 25 15:02:39 2022 +0000

    Merge tag 'pull-target-arm-20220325' of https://git.linaro.org/people/pmaydell/qemu-arm into staging
    
    target-arm queue:
     * hw/intc/arm_gicv3_its: Add missing newlines to process_mapc() logging
     * target/arm: Fix sve_ld1_z and sve_st1_z vs MMIO
    
    # gpg: Signature made Fri 25 Mar 2022 14:56:48 GMT
    # gpg:                using RSA key E1A5C593CD419DE28E8315CF3C2525ED14360CDE
    # gpg:                issuer "peter.maydell@linaro.org"
    # gpg: Good signature from "Peter Maydell <peter.maydell@linaro.org>" [ultimate]
    # gpg:                 aka "Peter Maydell <pmaydell@gmail.com>" [ultimate]
    # gpg:                 aka "Peter Maydell <pmaydell@chiark.greenend.org.uk>" [ultimate]
    # Primary key fingerprint: E1A5 C593 CD41 9DE2 8E83  15CF 3C25 25ED 1436 0CDE
    
    * tag 'pull-target-arm-20220325' of https://git.linaro.org/people/pmaydell/qemu-arm:
      hw/intc/arm_gicv3_its: Add missing newlines to process_mapc() logging
      target/arm: Fix sve_ld1_z and sve_st1_z vs MMIO
    
    Signed-off-by: Peter Maydell <peter.maydell@linaro.org>

commit c7ca3ad5e756e263daf082c315e311593ccec3d1
Author: Peter Maydell <peter.maydell@linaro.org>
Date:   Fri Mar 25 14:41:06 2022 +0000

    hw/intc/arm_gicv3_its: Add missing newlines to process_mapc() logging
    
    In commit 84d43d2e82da we rearranged the logging of errors in
    process_mapc(), and inadvertently dropped the trailing newlines
    from the log messages. Restore them. The same commit also
    attempted to switch the ICID printing to hex (which is how we
    print ICIDs elsewhere) but only did half the job, adding the
    0x prefix but leaving the format string at %d; correct to %x.
    
    Fixes: 84d43d2e82da ("hw/intc/arm_gicv3_its: In MAPC with V=0, don't check rdbase field")
    Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
    Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
    Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>

commit 6222c3acc4f36fc31d057e1afb6b5c408f83d343
Author: Richard Henderson <richard.henderson@linaro.org>
Date:   Fri Mar 25 14:41:06 2022 +0000

    target/arm: Fix sve_ld1_z and sve_st1_z vs MMIO
    
    Both of these functions missed handling the TLB_MMIO flag
    during the conversion to handle MTE.
    
    Fixes: 10a85e2c8ab6 ("target/arm: Reuse sve_probe_page for gather loads")
    Resolves: https://gitlab.com/qemu-project/qemu/-/issues/925
    Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
    Message-id: 20220324010932.190428-1-richard.henderson@linaro.org
    Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
    Signed-off-by: Peter Maydell <peter.maydell@linaro.org>


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 02:34:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 02:34:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295637.503191 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ1g2-0002Ek-Fh; Tue, 29 Mar 2022 02:33:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295637.503191; Tue, 29 Mar 2022 02:33:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ1g2-0002Ec-9L; Tue, 29 Mar 2022 02:33:46 +0000
Received: by outflank-mailman (input) for mailman id 295637;
 Tue, 29 Mar 2022 02:33:45 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ1g1-0002ES-0n; Tue, 29 Mar 2022 02:33:45 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ1g0-0004RI-SG; Tue, 29 Mar 2022 02:33:44 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ1g0-0000ws-C6; Tue, 29 Mar 2022 02:33:44 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ1g0-0005fu-Be; Tue, 29 Mar 2022 02:33:44 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=5ISOSWfEiL2OjC1M/ItIkvC6PJPkIJ/YVYB0LB+pfJI=; b=uqDtxXxmlqoEvF6waISVLbhgtS
	2cRxsc7WO4U8BESGEVmg/GHCpdnHmjYfaGOtkw59Y215dCOqLfQLweQlhZ6wBKMj92beNQ/cPTh6f
	gCeTmBNVauK51vEeE/xXWxSA5upbelpRIXt7iAHDSiEANS/PTA2lr+jbMdeyNNtDkUw4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168933-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.16-testing test] 168933: trouble: blocked/broken/pass
X-Osstest-Failures:
    xen-4.16-testing:build-amd64:<job status>:broken:regression
    xen-4.16-testing:build-amd64-prev:<job status>:broken:regression
    xen-4.16-testing:build-amd64-pvops:<job status>:broken:regression
    xen-4.16-testing:build-amd64-xsm:<job status>:broken:regression
    xen-4.16-testing:build-amd64-xtf:<job status>:broken:regression
    xen-4.16-testing:build-arm64:<job status>:broken:regression
    xen-4.16-testing:build-arm64-pvops:<job status>:broken:regression
    xen-4.16-testing:build-arm64-xsm:<job status>:broken:regression
    xen-4.16-testing:build-armhf-pvops:<job status>:broken:regression
    xen-4.16-testing:build-i386:<job status>:broken:regression
    xen-4.16-testing:build-i386-prev:<job status>:broken:regression
    xen-4.16-testing:build-i386-pvops:<job status>:broken:regression
    xen-4.16-testing:build-i386-xsm:<job status>:broken:regression
    xen-4.16-testing:build-i386-prev:host-install(4):broken:regression
    xen-4.16-testing:build-i386:host-install(4):broken:regression
    xen-4.16-testing:build-i386-xsm:host-install(4):broken:regression
    xen-4.16-testing:build-i386-pvops:host-install(4):broken:regression
    xen-4.16-testing:build-arm64-pvops:host-install(4):broken:regression
    xen-4.16-testing:build-arm64-xsm:host-install(4):broken:regression
    xen-4.16-testing:build-arm64:host-install(4):broken:regression
    xen-4.16-testing:build-amd64-xtf:host-install(4):broken:regression
    xen-4.16-testing:build-amd64:host-install(4):broken:regression
    xen-4.16-testing:build-amd64-prev:host-install(4):broken:regression
    xen-4.16-testing:build-amd64-xsm:host-install(4):broken:regression
    xen-4.16-testing:build-armhf-pvops:host-install(4):broken:regression
    xen-4.16-testing:build-amd64-pvops:host-install(4):broken:regression
    xen-4.16-testing:test-amd64-i386-qemuu-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-qemuu-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-pvshim:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-shadow:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-coresched-amd64-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-shadow:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-rtds:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:build-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:build-arm64-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qcow2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-pvshim:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-pvhv2-intel:build-check(1):blocked:nonblocking
    xen-4.16-testing:build-i386-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-pvhv2-amd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-dom0pvh-xl-amd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-dom0pvh-xl-intel:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-livepatch:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-nested-intel:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-migrupgrade:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-pair:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-nested-amd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-pygrub:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-freebsd11-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-freebsd12-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-coresched-i386-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-freebsd10-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-freebsd10-i386:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-livepatch:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-migrupgrade:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-pair:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-qemut-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-qemut-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-arndale:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-cubietruck:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-rtds:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-xtf-amd64-amd64-1:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-xtf-amd64-amd64-2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-xtf-amd64-amd64-3:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-xtf-amd64-amd64-4:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-xtf-amd64-amd64-5:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    xen=c7a861b2d065e7c26f9d499df32eb99f546e1671
X-Osstest-Versions-That:
    xen=cfd29b83a26f35f49f074f06169ce4cadfdebf0d
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 29 Mar 2022 02:33:44 +0000

flight 168933 xen-4.16-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168933/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-prev                <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-amd64-xtf                 <job status>                 broken
 build-arm64                     <job status>                 broken
 build-arm64-pvops               <job status>                 broken
 build-arm64-xsm                 <job status>                 broken
 build-armhf-pvops               <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-prev                 <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-i386-prev               4 host-install(4)        broken REGR. vs. 168513
 build-i386                    4 host-install(4)        broken REGR. vs. 168513
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168513
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168513
 build-arm64-pvops             4 host-install(4)        broken REGR. vs. 168513
 build-arm64-xsm               4 host-install(4)        broken REGR. vs. 168513
 build-arm64                   4 host-install(4)        broken REGR. vs. 168513
 build-amd64-xtf               4 host-install(4)        broken REGR. vs. 168513
 build-amd64                   4 host-install(4)        broken REGR. vs. 168513
 build-amd64-prev              4 host-install(4)        broken REGR. vs. 168513
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 168513
 build-armhf-pvops             4 host-install(4)        broken REGR. vs. 168513
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 168513

Tests which did not succeed, but are not blocking:
 test-amd64-i386-qemuu-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-xl            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-pvshim     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemut-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemut-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemut-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1)  blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-shadow     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-vhd        1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-xsm        1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl           1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-amd64-coresched-amd64-xl  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-xsm       1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-shadow    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-rtds      1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ws16-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qemut-ws16-amd64  1 build-check(1)             blocked n/a
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qcow2     1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvshim    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-intel  1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit2   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit1   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl           1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-amd64-livepatch    1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-intel  1 build-check(1)              blocked n/a
 test-amd64-amd64-migrupgrade  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pair         1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pygrub       1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-freebsd11-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-qemuu-freebsd12-amd64  1 build-check(1)           blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-coresched-i386-xl  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-amd64  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-i386  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-amd64-i386-livepatch     1 build-check(1)               blocked  n/a
 test-amd64-i386-migrupgrade   1 build-check(1)               blocked  n/a
 test-amd64-i386-pair          1 build-check(1)               blocked  n/a
 test-amd64-i386-qemut-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemut-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-armhf-armhf-xl-arndale   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit1   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-cubietruck  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-rtds      1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-vhd       1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-1        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-2        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-3        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-4        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-5        1 build-check(1)               blocked  n/a

version targeted for testing:
 xen                  c7a861b2d065e7c26f9d499df32eb99f546e1671
baseline version:
 xen                  cfd29b83a26f35f49f074f06169ce4cadfdebf0d

Last test of basis   168513  2022-03-11 05:13:34 Z   17 days
Testing same since   168864  2022-03-25 17:37:01 Z    3 days    5 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bjoern Doebel <doebel@amazon.de>
  Jan Beulich <jbeulich@suse.com>
  Jiamei Xie <jiamei.xie@arm.com>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Thiner Logoer <logoerthiner1@163.com>

jobs:
 build-amd64-xsm                                              broken  
 build-arm64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64-xtf                                              broken  
 build-amd64                                                  broken  
 build-arm64                                                  broken  
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-prev                                             broken  
 build-i386-prev                                              broken  
 build-amd64-pvops                                            broken  
 build-arm64-pvops                                            broken  
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-xtf-amd64-amd64-1                                       blocked 
 test-xtf-amd64-amd64-2                                       blocked 
 test-xtf-amd64-amd64-3                                       blocked 
 test-xtf-amd64-amd64-4                                       blocked 
 test-xtf-amd64-amd64-5                                       blocked 
 test-amd64-amd64-xl                                          blocked 
 test-amd64-coresched-amd64-xl                                blocked 
 test-arm64-arm64-xl                                          blocked 
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           blocked 
 test-amd64-coresched-i386-xl                                 blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        blocked 
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         blocked 
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-xl-xsm                                      blocked 
 test-arm64-arm64-xl-xsm                                      blocked 
 test-amd64-i386-xl-xsm                                       blocked 
 test-amd64-amd64-qemuu-nested-amd                            blocked 
 test-amd64-amd64-xl-pvhv2-amd                                blocked 
 test-amd64-i386-qemut-rhel6hvm-amd                           blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-dom0pvh-xl-amd                              blocked 
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemut-debianhvm-amd64                     blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     blocked 
 test-amd64-i386-freebsd10-amd64                              blocked 
 test-amd64-amd64-qemuu-freebsd11-amd64                       blocked 
 test-amd64-amd64-qemuu-freebsd12-amd64                       blocked 
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         blocked 
 test-amd64-i386-xl-qemut-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         blocked 
 test-amd64-i386-xl-qemuu-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemut-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemut-ws16-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ws16-amd64                          blocked 
 test-armhf-armhf-xl-arndale                                  blocked 
 test-amd64-amd64-xl-credit1                                  blocked 
 test-arm64-arm64-xl-credit1                                  blocked 
 test-armhf-armhf-xl-credit1                                  blocked 
 test-amd64-amd64-xl-credit2                                  blocked 
 test-arm64-arm64-xl-credit2                                  blocked 
 test-armhf-armhf-xl-credit2                                  blocked 
 test-armhf-armhf-xl-cubietruck                               blocked 
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        blocked 
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         blocked 
 test-amd64-i386-freebsd10-i386                               blocked 
 test-amd64-amd64-qemuu-nested-intel                          blocked 
 test-amd64-amd64-xl-pvhv2-intel                              blocked 
 test-amd64-i386-qemut-rhel6hvm-intel                         blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-amd64-dom0pvh-xl-intel                            blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-livepatch                                   blocked 
 test-amd64-i386-livepatch                                    blocked 
 test-amd64-amd64-migrupgrade                                 blocked 
 test-amd64-i386-migrupgrade                                  blocked 
 test-amd64-amd64-xl-multivcpu                                blocked 
 test-armhf-armhf-xl-multivcpu                                blocked 
 test-amd64-amd64-pair                                        blocked 
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-amd64-amd64-xl-pvshim                                   blocked 
 test-amd64-i386-xl-pvshim                                    blocked 
 test-amd64-amd64-pygrub                                      blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-amd64-amd64-xl-qcow2                                    blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-xl-rtds                                     blocked 
 test-armhf-armhf-xl-rtds                                     blocked 
 test-arm64-arm64-xl-seattle                                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              blocked 
 test-amd64-amd64-xl-shadow                                   blocked 
 test-amd64-i386-xl-shadow                                    blocked 
 test-arm64-arm64-xl-thunderx                                 blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 
 test-arm64-arm64-xl-vhd                                      blocked 
 test-armhf-armhf-xl-vhd                                      blocked 
 test-amd64-i386-xl-vhd                                       blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-prev broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-amd64-xtf broken
broken-job build-arm64 broken
broken-job build-arm64-pvops broken
broken-job build-arm64-xsm broken
broken-job build-armhf-pvops broken
broken-job build-i386 broken
broken-job build-i386-prev broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-i386-prev host-install(4)
broken-step build-i386 host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step build-i386-pvops host-install(4)
broken-step build-arm64-pvops host-install(4)
broken-step build-arm64-xsm host-install(4)
broken-step build-arm64 host-install(4)
broken-step build-amd64-xtf host-install(4)
broken-step build-amd64 host-install(4)
broken-step build-amd64-prev host-install(4)
broken-step build-amd64-xsm host-install(4)
broken-step build-armhf-pvops host-install(4)
broken-step build-amd64-pvops host-install(4)

Not pushing.

(No revision log; it would be 394 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 03:44:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 03:44:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295646.503205 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ2mX-0000ub-Oq; Tue, 29 Mar 2022 03:44:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295646.503205; Tue, 29 Mar 2022 03:44:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ2mX-0000uU-KB; Tue, 29 Mar 2022 03:44:33 +0000
Received: by outflank-mailman (input) for mailman id 295646;
 Tue, 29 Mar 2022 03:44:31 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=i5xw=UI=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nZ2mV-0000uO-IO
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 03:44:31 +0000
Received: from EUR01-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur01on0622.outbound.protection.outlook.com
 [2a01:111:f400:fe1e::622])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 87352ef7-af12-11ec-8fbc-03012f2f19d4;
 Tue, 29 Mar 2022 05:44:26 +0200 (CEST)
Received: from AM5PR0601CA0057.eurprd06.prod.outlook.com (2603:10a6:206::22)
 by DB8PR08MB4106.eurprd08.prod.outlook.com (2603:10a6:10:b2::13) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.20; Tue, 29 Mar
 2022 03:44:19 +0000
Received: from AM5EUR03FT060.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:206:0:cafe::76) by AM5PR0601CA0057.outlook.office365.com
 (2603:10a6:206::22) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17 via Frontend
 Transport; Tue, 29 Mar 2022 03:44:19 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT060.mail.protection.outlook.com (10.152.16.160) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Tue, 29 Mar 2022 03:44:18 +0000
Received: ("Tessian outbound 2877e54fe176:v113");
 Tue, 29 Mar 2022 03:44:18 +0000
Received: from 0117725fb6a2.2
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 53105D26-4AD6-4E80-9B88-FA59D8AA1761.1; 
 Tue, 29 Mar 2022 03:44:12 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 0117725fb6a2.2
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 29 Mar 2022 03:44:12 +0000
Received: from DU2PR08MB7325.eurprd08.prod.outlook.com (2603:10a6:10:2e4::7)
 by VI1PR08MB4573.eurprd08.prod.outlook.com (2603:10a6:803:e7::20) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17; Tue, 29 Mar
 2022 03:44:05 +0000
Received: from DU2PR08MB7325.eurprd08.prod.outlook.com
 ([fe80::28c0:3e8d:dd75:80be]) by DU2PR08MB7325.eurprd08.prod.outlook.com
 ([fe80::28c0:3e8d:dd75:80be%8]) with mapi id 15.20.5102.023; Tue, 29 Mar 2022
 03:44:04 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 87352ef7-af12-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=xqtd8xn7AZLSi+YH/CWD439pPkIGyi3GhKSCwcsTKno=;
 b=dhhdwx8xR5kB6WLAttvr6IxcNxn9a46/BNh3MnDJ9pbFzX97rVTGNy4l2LNoDHvdkGLL+bmTUUg6lHUhrZWeyT2mErcyhOEMg61g5cqHcdem15qv+JWqNW+KhELv7W9lHyLwy19uC+v/VV0pPEWK3DT/l9YRObqRq+DZejd5t4U=
X-MS-Exchange-Authentication-Results: spf=temperror (sender IP is
 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=temperror action=none
 header.from=arm.com;
Received-SPF: TempError (protection.outlook.com: error in processing during
 lookup of arm.com: DNS Timeout)
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=cxm9h3rBrIgt4/cjupxMXSsdsfC2NEZJtf9mnhIYQyUr8AKW3Rjym15AyQ8R3vwchnIhPcsV799uVqc6izeLcKpQhEohB10XP+5l1sjfsLrGN8C3xq1Gsk4aGjp6lGzfvxVru51GVJ1Aak4mUHnc344EQxZ2nQHE7mLzjtW+sBPerEWvdL6wVFqYbq5XEsv367B1f1N3Rm+L3+7JUeYUyYNPTFus2VJRuscDV2sbe8BvbPYM3HxmHsNbe8C2bx7nl0kLFLwy5OKTh7GuzbmzVNMGv9L1Rgup8sezOkApAam1wafDJfroVLjDo019toqLOIYMDr4CvkmN4/8zvlrpRw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=xqtd8xn7AZLSi+YH/CWD439pPkIGyi3GhKSCwcsTKno=;
 b=ba5Rf+bl8Mdhsy8auFIR6Bxh+lvXVrqRrS8+ix7I8Qt4G9vqf3mbMCQ3S31hCag1R2IeNi9Y9ZI6z/unw8PHxh6w4IhmvxYtmDIsBVXgq8qTJ0vFg/XDqEw2cwRjohrsFjwp3nDWdqgPxRjAI47Agbqwz3yGdB9nt9YWon0+OAzEnd/hmzZ89bXTIigf0wg26LNBIDQyKSnDVU+7rFA55Ain1JDIZ91I4GblGj5JhZNLJp4gj7xLAVBX66RdZPJWeEFS7gdVSiUZ936vf5KhXodmYnYxM8YeNUOJDUJ/wdwIBE+wXURjS60EsE6NV8DFe1YloQmo90419Uo8CdzjHw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=xqtd8xn7AZLSi+YH/CWD439pPkIGyi3GhKSCwcsTKno=;
 b=dhhdwx8xR5kB6WLAttvr6IxcNxn9a46/BNh3MnDJ9pbFzX97rVTGNy4l2LNoDHvdkGLL+bmTUUg6lHUhrZWeyT2mErcyhOEMg61g5cqHcdem15qv+JWqNW+KhELv7W9lHyLwy19uC+v/VV0pPEWK3DT/l9YRObqRq+DZejd5t4U=
From: Penny Zheng <Penny.Zheng@arm.com>
To: Stefano Stabellini <sstabellini@kernel.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, nd
	<nd@arm.com>, Julien Grall <julien@xen.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: RE: [PATCH v1 06/13] xen/arm: set up shared memory foreign mapping
 for borrower domain
Thread-Topic: [PATCH v1 06/13] xen/arm: set up shared memory foreign mapping
 for borrower domain
Thread-Index: AQHYNQ8JUHwL/QpeQ0iCIDnkwGGL/6zEbaEAgBFckFA=
Date: Tue, 29 Mar 2022 03:44:04 +0000
Message-ID:
 <DU2PR08MB732540A4196E8634B4D8A579F71E9@DU2PR08MB7325.eurprd08.prod.outlook.com>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com>
 <20220311061123.1883189-7-Penny.Zheng@arm.com>
 <alpine.DEB.2.22.394.2203171744190.3497@ubuntu-linux-20-04-desktop>
In-Reply-To:
 <alpine.DEB.2.22.394.2203171744190.3497@ubuntu-linux-20-04-desktop>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: E6B3E6C1F330384EB809B8AB265DA5A8.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 2d0dae2d-5787-4ee4-1595-08da1136675f
x-ms-traffictypediagnostic:
	VI1PR08MB4573:EE_|AM5EUR03FT060:EE_|DB8PR08MB4106:EE_
X-Microsoft-Antispam-PRVS:
	<DB8PR08MB4106A88C55BF42C3645ACE6AF71E9@DB8PR08MB4106.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR08MB7325.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(86362001)(9686003)(53546011)(7696005)(2906002)(8676002)(71200400001)(66446008)(66556008)(66476007)(64756008)(316002)(6506007)(66946007)(6916009)(54906003)(76116006)(4326008)(5660300002)(508600001)(122000001)(52536014)(33656002)(8936002)(38070700005)(26005)(83380400001)(186003)(38100700002)(55016003);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB4573
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT060.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	7ad71210-c74f-41e1-cb78-08da11365f18
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(356005)(4326008)(81166007)(54906003)(6862004)(70586007)(5660300002)(316002)(40460700003)(8676002)(36860700001)(70206006)(186003)(8936002)(508600001)(63370400001)(47076005)(2906002)(83380400001)(52536014)(82310400004)(9686003)(55016003)(26005)(53546011)(33656002)(107886003)(7696005)(63350400001)(6506007)(86362001)(336012);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 29 Mar 2022 03:44:18.5933
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 2d0dae2d-5787-4ee4-1595-08da1136675f
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT060.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR08MB4106

Hi Stefano

Sorry for the late response, got sidetracked an emergency issue. ;/

> -----Original Message-----
> From: Stefano Stabellini <sstabelliHini@kernel.org>
> Sent: Friday, March 18, 2022 10:00 AM
> To: Penny Zheng <Penny.Zheng@arm.com>
> Cc: xen-devel@lists.xenproject.org; nd <nd@arm.com>; Stefano Stabellini
> <sstabellini@kernel.org>; Julien Grall <julien@xen.org>; Bertrand Marquis
> <Bertrand.Marquis@arm.com>; Volodymyr Babchuk
> <Volodymyr_Babchuk@epam.com>
> Subject: Re: [PATCH v1 06/13] xen/arm: set up shared memory foreign
> mapping for borrower domain
>=20
> On Fri, 11 Mar 2022, Penny Zheng wrote:
> > From: Penny Zheng <penny.zheng@arm.com>
> >
> > This commits introduces a new helper guest_physmap_add_shm to set up
> > shared memory foreign mapping for borrower domain.
> >
> > Firstly it should get and take reference of statically shared pages
> > from owner dom_shared. Then it will setup P2M foreign memory map of
> > these statically shared pages for borrower domain.
> >
> > This commits only considers owner domain is the default dom_shared,
> > the other scenario will be covered in the following patches.
> >
> > Signed-off-by: Penny Zheng <penny.zheng@arm.com>
> > ---
> >  xen/arch/arm/domain_build.c | 52
> > +++++++++++++++++++++++++++++++++++++
> >  1 file changed, 52 insertions(+)
> >
> > diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
> > index 984e70e5fc..8cee5ffbd1 100644
> > --- a/xen/arch/arm/domain_build.c
> > +++ b/xen/arch/arm/domain_build.c
> > @@ -798,6 +798,48 @@ static int __init allocate_shared_memory(struct
> domain *d,
> >      return ret;
> >  }
> >
> > +static int __init guest_physmap_add_shm(struct domain *od, struct doma=
in
> *bd,
> > +                                        unsigned long o_gfn,
> > +                                        unsigned long b_gfn,
> > +                                        unsigned long nr_gfns)
>=20
> They should probably be gfn_t type
>=20
>
=20
Sure, will do.

> > +{
> > +    struct page_info **pages =3D NULL;
> > +    p2m_type_t p2mt, t;
> > +    int ret =3D 0;
> > +
> > +    pages =3D xmalloc_array(struct page_info *, nr_gfns);
> > +    if ( !pages )
> > +        return -ENOMEM;
> > +
> > +    /*
> > +     * Take reference of statically shared pages from owner domain.
> > +     * Reference will be released when destroying shared memory region=
.
> > +     */
> > +    ret =3D get_pages_from_gfn(od, o_gfn, nr_gfns, pages, &p2mt, P2M_A=
LLOC);
> > +    if ( ret )
> > +    {
> > +        ret =3D -EINVAL;
> > +        goto fail_pages;
> > +    }
> > +
> > +    if ( p2m_is_ram(p2mt) )
> > +        t =3D (p2mt =3D=3D p2m_ram_rw) ? p2m_map_foreign_rw :
> p2m_map_foreign_ro;
> > +    else
> > +    {
> > +        ret =3D -EINVAL;
> > +        goto fail_pages;
> > +    }
>=20
> One idea is to initialize p2mt =3D p2m_ram_rw and pass it to
> get_pages_from_gfn. Then get_pages_from_gfn can return error immediately
> if any of the pages are of different type.
>=20
> This way there is no need for checking again here.
>

Right now, the memory attribute of static shared memory is RW as default,
What if we add memory attribute setting in device tree configuration, somet=
imes,
Users want to specify that borrower domain only has RO right, hmm, then the
Initialization for p2mt could be either p2m_ram_rw or p2m_ram_ro?
In such case, we could add another parameter in guest_physmap_add_shm to
show the p2m type...
Hope I understand what you suggested here.
=20
>=20
> > +    /* Set up guest foreign map. */
> > +    ret =3D guest_physmap_add_pages(bd, _gfn(b_gfn), page_to_mfn(pages=
[0]),
> > +                                  nr_gfns, t);
> > +
> > + fail_pages:
> > +        xfree(pages);
> > +
> > +    return ret;
> > +}
> > +
> >  static int __init process_shm(struct domain *d,
> >                                const struct dt_device_node *node)  {
> > @@ -855,6 +897,16 @@ static int __init process_shm(struct domain *d,
> >
> >              set_bit(shm_id, shm_mask);
> >          }
> > +
> > +        /*
> > +         * All domains are borrower domains when owner domain is the
> > +         * default dom_shared, so here we could just set up P2M foreig=
n
> > +         * mapping for borrower domain immediately.
> > +         */
> > +        ret =3D guest_physmap_add_shm(dom_shared, d, PFN_DOWN(pbase),
> > +                                    PFN_DOWN(gbase), PFN_DOWN(psize));
> > +        if ( ret )
> > +            return ret;
> >      }
> >
> >      return 0;
> > --
> > 2.25.1
> >

---
Cheers,
Penny Zheng


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 04:18:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 04:18:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295654.503228 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ3JO-0004Mc-Hx; Tue, 29 Mar 2022 04:18:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295654.503228; Tue, 29 Mar 2022 04:18:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ3JO-0004MV-DQ; Tue, 29 Mar 2022 04:18:30 +0000
Received: by outflank-mailman (input) for mailman id 295654;
 Tue, 29 Mar 2022 04:18:30 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ3JN-0004ML-Vx; Tue, 29 Mar 2022 04:18:29 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ3JN-0006OY-Ry; Tue, 29 Mar 2022 04:18:29 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ3JN-0003DU-Df; Tue, 29 Mar 2022 04:18:29 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ3JN-0006OE-DA; Tue, 29 Mar 2022 04:18:29 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=JzHv/ulhKKdJw7iRU4DMUCsVSd5hWf5SZbOQ5zDwzW8=; b=MKFDdWZCPIAEyzWyOSehS4MQr3
	gH3HdvLqV9TVtbP7AVKT7cUZDdgTZOi/+a9IOOtSvfn0kTTrSY3CWUcX5sLxNGSE7i1kI7ZLw+l4P
	eL5fa1XbTSZIlUVT2KuT21zSVrn0WVUU30XzvdBWU+QD18yIHSOx7ERioEAi9ayV5KSY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168936-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.15-testing test] 168936: trouble: blocked/broken/pass
X-Osstest-Failures:
    xen-4.15-testing:build-amd64:<job status>:broken:regression
    xen-4.15-testing:build-amd64-prev:<job status>:broken:regression
    xen-4.15-testing:build-amd64-pvops:<job status>:broken:regression
    xen-4.15-testing:build-amd64-xsm:<job status>:broken:regression
    xen-4.15-testing:build-amd64-xtf:<job status>:broken:regression
    xen-4.15-testing:build-arm64:<job status>:broken:regression
    xen-4.15-testing:build-arm64-pvops:<job status>:broken:regression
    xen-4.15-testing:build-arm64-xsm:<job status>:broken:regression
    xen-4.15-testing:build-armhf-pvops:<job status>:broken:regression
    xen-4.15-testing:build-i386:<job status>:broken:regression
    xen-4.15-testing:build-i386-prev:<job status>:broken:regression
    xen-4.15-testing:build-i386-pvops:<job status>:broken:regression
    xen-4.15-testing:build-i386-xsm:<job status>:broken:regression
    xen-4.15-testing:build-amd64-prev:host-install(4):broken:regression
    xen-4.15-testing:build-amd64-xsm:host-install(4):broken:regression
    xen-4.15-testing:build-amd64-pvops:host-install(4):broken:regression
    xen-4.15-testing:build-i386-xsm:host-install(4):broken:regression
    xen-4.15-testing:build-i386:host-install(4):broken:regression
    xen-4.15-testing:build-i386-prev:host-install(4):broken:regression
    xen-4.15-testing:build-i386-pvops:host-install(4):broken:regression
    xen-4.15-testing:build-arm64:host-install(4):broken:regression
    xen-4.15-testing:build-arm64-xsm:host-install(4):broken:regression
    xen-4.15-testing:build-amd64-xtf:host-install(4):broken:regression
    xen-4.15-testing:build-amd64:host-install(4):broken:regression
    xen-4.15-testing:build-armhf-pvops:host-install(4):broken:regression
    xen-4.15-testing:build-arm64-pvops:host-install(4):broken:regression
    xen-4.15-testing:test-amd64-i386-qemuu-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-qemuu-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-pvshim:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-shadow:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-coresched-amd64-xl:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-shadow:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-rtds:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:build-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:build-arm64-libvirt:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qcow2:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-pvshim:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-pvhv2-intel:build-check(1):blocked:nonblocking
    xen-4.15-testing:build-i386-libvirt:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-pvhv2-amd:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-dom0pvh-xl-amd:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-dom0pvh-xl-intel:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-livepatch:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-qemuu-nested-intel:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-migrupgrade:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-pair:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-qemuu-nested-amd:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-pygrub:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-qemuu-freebsd11-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-amd64-qemuu-freebsd12-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-coresched-i386-xl:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-freebsd10-amd64:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-freebsd10-i386:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-livepatch:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-migrupgrade:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-pair:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-qemut-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-amd64-i386-qemut-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-arndale:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-cubietruck:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-rtds:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-xtf-amd64-amd64-1:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-xtf-amd64-amd64-2:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-xtf-amd64-amd64-3:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-xtf-amd64-amd64-4:build-check(1):blocked:nonblocking
    xen-4.15-testing:test-xtf-amd64-amd64-5:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    xen=3c8e7395e2d01140c862c78fa9483e46c0dbd343
X-Osstest-Versions-That:
    xen=cd751c09a5bab9f3529901fbe4d867ad7d52e89d
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 29 Mar 2022 04:18:29 +0000

flight 168936 xen-4.15-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168936/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-prev                <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-amd64-xtf                 <job status>                 broken
 build-arm64                     <job status>                 broken
 build-arm64-pvops               <job status>                 broken
 build-arm64-xsm                 <job status>                 broken
 build-armhf-pvops               <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-prev                 <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-amd64-prev              4 host-install(4)        broken REGR. vs. 168502
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 168502
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 168502
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168502
 build-i386                    4 host-install(4)        broken REGR. vs. 168502
 build-i386-prev               4 host-install(4)        broken REGR. vs. 168502
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168502
 build-arm64                   4 host-install(4)        broken REGR. vs. 168502
 build-arm64-xsm               4 host-install(4)        broken REGR. vs. 168502
 build-amd64-xtf               4 host-install(4)        broken REGR. vs. 168502
 build-amd64                   4 host-install(4)        broken REGR. vs. 168502
 build-armhf-pvops             4 host-install(4)        broken REGR. vs. 168502
 build-arm64-pvops             4 host-install(4)        broken REGR. vs. 168502

Tests which did not succeed, but are not blocking:
 test-amd64-i386-qemuu-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-xl            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-pvshim     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemut-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemut-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemut-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1)  blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-shadow     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-vhd        1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-xsm        1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl           1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-amd64-coresched-amd64-xl  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-xsm       1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-shadow    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-rtds      1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ws16-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qemut-ws16-amd64  1 build-check(1)             blocked n/a
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qcow2     1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvshim    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-intel  1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit2   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit1   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl           1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-amd64-livepatch    1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-intel  1 build-check(1)              blocked n/a
 test-amd64-amd64-migrupgrade  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pair         1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pygrub       1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-freebsd11-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-qemuu-freebsd12-amd64  1 build-check(1)           blocked n/a
 test-amd64-i386-xl-qemuu-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a
 test-amd64-coresched-i386-xl  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-amd64  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-i386  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-amd64-i386-livepatch     1 build-check(1)               blocked  n/a
 test-amd64-i386-migrupgrade   1 build-check(1)               blocked  n/a
 test-amd64-i386-pair          1 build-check(1)               blocked  n/a
 test-amd64-i386-qemut-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemut-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-armhf-armhf-xl-arndale   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit1   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-cubietruck  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-rtds      1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-vhd       1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-1        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-2        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-3        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-4        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-5        1 build-check(1)               blocked  n/a

version targeted for testing:
 xen                  3c8e7395e2d01140c862c78fa9483e46c0dbd343
baseline version:
 xen                  cd751c09a5bab9f3529901fbe4d867ad7d52e89d

Last test of basis   168502  2022-03-10 09:07:57 Z   18 days
Testing same since   168863  2022-03-25 17:36:55 Z    3 days    4 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bjoern Doebel <doebel@amazon.de>
  Jan Beulich <jbeulich@suse.com>
  Jiamei Xie <jiamei.xie@arm.com>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Thiner Logoer <logoerthiner1@163.com>

jobs:
 build-amd64-xsm                                              broken  
 build-arm64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64-xtf                                              broken  
 build-amd64                                                  broken  
 build-arm64                                                  broken  
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-prev                                             broken  
 build-i386-prev                                              broken  
 build-amd64-pvops                                            broken  
 build-arm64-pvops                                            broken  
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-xtf-amd64-amd64-1                                       blocked 
 test-xtf-amd64-amd64-2                                       blocked 
 test-xtf-amd64-amd64-3                                       blocked 
 test-xtf-amd64-amd64-4                                       blocked 
 test-xtf-amd64-amd64-5                                       blocked 
 test-amd64-amd64-xl                                          blocked 
 test-amd64-coresched-amd64-xl                                blocked 
 test-arm64-arm64-xl                                          blocked 
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           blocked 
 test-amd64-coresched-i386-xl                                 blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        blocked 
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         blocked 
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-xl-xsm                                      blocked 
 test-arm64-arm64-xl-xsm                                      blocked 
 test-amd64-i386-xl-xsm                                       blocked 
 test-amd64-amd64-qemuu-nested-amd                            blocked 
 test-amd64-amd64-xl-pvhv2-amd                                blocked 
 test-amd64-i386-qemut-rhel6hvm-amd                           blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-dom0pvh-xl-amd                              blocked 
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemut-debianhvm-amd64                     blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     blocked 
 test-amd64-i386-freebsd10-amd64                              blocked 
 test-amd64-amd64-qemuu-freebsd11-amd64                       blocked 
 test-amd64-amd64-qemuu-freebsd12-amd64                       blocked 
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         blocked 
 test-amd64-i386-xl-qemut-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         blocked 
 test-amd64-i386-xl-qemuu-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemut-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemut-ws16-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ws16-amd64                          blocked 
 test-armhf-armhf-xl-arndale                                  blocked 
 test-amd64-amd64-xl-credit1                                  blocked 
 test-arm64-arm64-xl-credit1                                  blocked 
 test-armhf-armhf-xl-credit1                                  blocked 
 test-amd64-amd64-xl-credit2                                  blocked 
 test-arm64-arm64-xl-credit2                                  blocked 
 test-armhf-armhf-xl-credit2                                  blocked 
 test-armhf-armhf-xl-cubietruck                               blocked 
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        blocked 
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         blocked 
 test-amd64-i386-freebsd10-i386                               blocked 
 test-amd64-amd64-qemuu-nested-intel                          blocked 
 test-amd64-amd64-xl-pvhv2-intel                              blocked 
 test-amd64-i386-qemut-rhel6hvm-intel                         blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-amd64-dom0pvh-xl-intel                            blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-livepatch                                   blocked 
 test-amd64-i386-livepatch                                    blocked 
 test-amd64-amd64-migrupgrade                                 blocked 
 test-amd64-i386-migrupgrade                                  blocked 
 test-amd64-amd64-xl-multivcpu                                blocked 
 test-armhf-armhf-xl-multivcpu                                blocked 
 test-amd64-amd64-pair                                        blocked 
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-amd64-amd64-xl-pvshim                                   blocked 
 test-amd64-i386-xl-pvshim                                    blocked 
 test-amd64-amd64-pygrub                                      blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-amd64-amd64-xl-qcow2                                    blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-xl-rtds                                     blocked 
 test-armhf-armhf-xl-rtds                                     blocked 
 test-arm64-arm64-xl-seattle                                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              blocked 
 test-amd64-amd64-xl-shadow                                   blocked 
 test-amd64-i386-xl-shadow                                    blocked 
 test-arm64-arm64-xl-thunderx                                 blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 
 test-arm64-arm64-xl-vhd                                      blocked 
 test-armhf-armhf-xl-vhd                                      blocked 
 test-amd64-i386-xl-vhd                                       blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-prev broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-amd64-xtf broken
broken-job build-arm64 broken
broken-job build-arm64-pvops broken
broken-job build-arm64-xsm broken
broken-job build-armhf-pvops broken
broken-job build-i386 broken
broken-job build-i386-prev broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-amd64-prev host-install(4)
broken-step build-amd64-xsm host-install(4)
broken-step build-amd64-pvops host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step build-i386 host-install(4)
broken-step build-i386-prev host-install(4)
broken-step build-i386-pvops host-install(4)
broken-step build-arm64 host-install(4)
broken-step build-arm64-xsm host-install(4)
broken-step build-amd64-xtf host-install(4)
broken-step build-amd64 host-install(4)
broken-step build-armhf-pvops host-install(4)
broken-step build-arm64-pvops host-install(4)

Not pushing.

(No revision log; it would be 394 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 06:03:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 06:03:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295665.503244 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ4wa-0007Rh-BB; Tue, 29 Mar 2022 06:03:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295665.503244; Tue, 29 Mar 2022 06:03:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ4wa-0007Ra-82; Tue, 29 Mar 2022 06:03:04 +0000
Received: by outflank-mailman (input) for mailman id 295665;
 Tue, 29 Mar 2022 06:03:03 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ4wZ-0007RQ-C4; Tue, 29 Mar 2022 06:03:03 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ4wZ-0008Ss-7t; Tue, 29 Mar 2022 06:03:03 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ4wY-0005Td-Pj; Tue, 29 Mar 2022 06:03:02 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ4wY-0004g6-PF; Tue, 29 Mar 2022 06:03:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=yO4qrwU/PPLDMSfqaC3hPAvWMVuhd+In5AQrtgI/rzA=; b=Itg+Bvu2QRGoLpU1TiyxBErzxc
	FRyhgtFIeABrbSyqV+k/MNe4w8QySqhfn4QUEwULadfOuau8n3f0T+8oXMfM+L7V/YDyS5yDxpelO
	lModvevI+jBU2uumTusxtGT1p0PjYdG6LwajvLClsuUyKGf4BeDlpkUiIwreFJcL/jbw=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168943-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168943: trouble: blocked/broken/pass
X-Osstest-Failures:
    linux-linus:build-amd64:<job status>:broken:regression
    linux-linus:build-amd64-pvops:<job status>:broken:regression
    linux-linus:build-amd64-xsm:<job status>:broken:regression
    linux-linus:build-arm64:<job status>:broken:regression
    linux-linus:build-arm64-pvops:<job status>:broken:regression
    linux-linus:build-arm64-xsm:<job status>:broken:regression
    linux-linus:build-armhf-pvops:<job status>:broken:regression
    linux-linus:build-i386:<job status>:broken:regression
    linux-linus:build-i386-pvops:<job status>:broken:regression
    linux-linus:build-i386-xsm:<job status>:broken:regression
    linux-linus:build-i386-xsm:host-install(4):broken:regression
    linux-linus:build-i386:host-install(4):broken:regression
    linux-linus:build-i386-pvops:host-install(4):broken:regression
    linux-linus:build-arm64-pvops:host-install(4):broken:regression
    linux-linus:build-arm64:host-install(4):broken:regression
    linux-linus:build-arm64-xsm:host-install(4):broken:regression
    linux-linus:build-amd64:host-install(4):broken:regression
    linux-linus:build-amd64-pvops:host-install(4):broken:regression
    linux-linus:build-amd64-xsm:host-install(4):broken:regression
    linux-linus:build-armhf-pvops:host-install(4):broken:regression
    linux-linus:test-armhf-armhf-xl:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-examine:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-coresched-amd64-xl:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-vhd:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-shadow:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-rtds:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    linux-linus:build-amd64-libvirt:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    linux-linus:build-arm64-libvirt:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    linux-linus:build-i386-libvirt:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-pvshim:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-dom0pvh-xl-amd:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-pvhv2-intel:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-dom0pvh-xl-intel:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-pvhv2-amd:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-examine:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-examine-bios:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-examine-uefi:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-multivcpu:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-freebsd11-amd64:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-freebsd12-amd64:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-credit2:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl-credit1:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-xl:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-intel:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-pair:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-pygrub:build-check(1):blocked:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-examine:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    linux=ae085d7f9365de7da27ab5c0d16b12d51ea7fca9
X-Osstest-Versions-That:
    linux=34af78c4e616c359ed428d79fe4758a35d2c5473
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 29 Mar 2022 06:03:02 +0000

flight 168943 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168943/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-arm64                     <job status>                 broken
 build-arm64-pvops               <job status>                 broken
 build-arm64-xsm                 <job status>                 broken
 build-armhf-pvops               <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168838
 build-i386                    4 host-install(4)        broken REGR. vs. 168838
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168838
 build-arm64-pvops             4 host-install(4)        broken REGR. vs. 168838
 build-arm64                   4 host-install(4)        broken REGR. vs. 168838
 build-arm64-xsm               4 host-install(4)        broken REGR. vs. 168838
 build-amd64                   4 host-install(4)        broken REGR. vs. 168838
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 168838
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 168838
 build-armhf-pvops             4 host-install(4)        broken REGR. vs. 168838

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-arndale   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit1   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-cubietruck  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-rtds      1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-examine      1 build-check(1)               blocked  n/a
 test-amd64-coresched-amd64-xl  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-xsm       1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-vhd       1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-shadow    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-rtds      1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ws16-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1) blocked n/a
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qemut-ws16-amd64  1 build-check(1)             blocked n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-xl-qemut-debianhvm-amd64  1 build-check(1)        blocked n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvshim    1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-examine      1 build-check(1)               blocked  n/a
 test-amd64-amd64-examine-bios  1 build-check(1)               blocked  n/a
 test-amd64-amd64-examine-uefi  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-amd64-amd64-freebsd11-amd64  1 build-check(1)               blocked  n/a
 test-amd64-amd64-freebsd12-amd64  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit2   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit1   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl           1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-intel  1 build-check(1)              blocked n/a
 test-amd64-amd64-pair         1 build-check(1)               blocked  n/a
 test-amd64-amd64-pygrub       1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-amd  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl           1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 test-armhf-armhf-examine      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a

version targeted for testing:
 linux                ae085d7f9365de7da27ab5c0d16b12d51ea7fca9
baseline version:
 linux                34af78c4e616c359ed428d79fe4758a35d2c5473

Last test of basis   168838  2022-03-25 06:20:14 Z    3 days
Failing since        168866  2022-03-25 20:12:03 Z    3 days    4 attempts
Testing same since   168943  2022-03-28 12:54:37 Z    0 days    1 attempts

------------------------------------------------------------
470 people touched revisions under test,
not listing them all

jobs:
 build-amd64-xsm                                              broken  
 build-arm64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64                                                  broken  
 build-arm64                                                  broken  
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            broken  
 build-arm64-pvops                                            broken  
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-amd64-amd64-xl                                          blocked 
 test-amd64-coresched-amd64-xl                                blocked 
 test-arm64-arm64-xl                                          blocked 
 test-armhf-armhf-xl                                          blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        blocked 
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-amd64-xl-xsm                                      blocked 
 test-arm64-arm64-xl-xsm                                      blocked 
 test-amd64-amd64-qemuu-nested-amd                            blocked 
 test-amd64-amd64-xl-pvhv2-amd                                blocked 
 test-amd64-amd64-dom0pvh-xl-amd                              blocked 
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    blocked 
 test-amd64-amd64-freebsd11-amd64                             blocked 
 test-amd64-amd64-freebsd12-amd64                             blocked 
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         blocked 
 test-amd64-amd64-xl-qemut-ws16-amd64                         blocked 
 test-amd64-amd64-xl-qemuu-ws16-amd64                         blocked 
 test-armhf-armhf-xl-arndale                                  blocked 
 test-amd64-amd64-examine-bios                                blocked 
 test-amd64-amd64-xl-credit1                                  blocked 
 test-arm64-arm64-xl-credit1                                  blocked 
 test-armhf-armhf-xl-credit1                                  blocked 
 test-amd64-amd64-xl-credit2                                  blocked 
 test-arm64-arm64-xl-credit2                                  blocked 
 test-armhf-armhf-xl-credit2                                  blocked 
 test-armhf-armhf-xl-cubietruck                               blocked 
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        blocked 
 test-amd64-amd64-examine                                     blocked 
 test-arm64-arm64-examine                                     blocked 
 test-armhf-armhf-examine                                     blocked 
 test-amd64-amd64-qemuu-nested-intel                          blocked 
 test-amd64-amd64-xl-pvhv2-intel                              blocked 
 test-amd64-amd64-dom0pvh-xl-intel                            blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-amd64-xl-multivcpu                                blocked 
 test-armhf-armhf-xl-multivcpu                                blocked 
 test-amd64-amd64-pair                                        blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-amd64-xl-pvshim                                   blocked 
 test-amd64-amd64-pygrub                                      blocked 
 test-amd64-amd64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-amd64-amd64-libvirt-raw                                 blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-amd64-xl-rtds                                     blocked 
 test-armhf-armhf-xl-rtds                                     blocked 
 test-arm64-arm64-xl-seattle                                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             blocked 
 test-amd64-amd64-xl-shadow                                   blocked 
 test-arm64-arm64-xl-thunderx                                 blocked 
 test-amd64-amd64-examine-uefi                                blocked 
 test-amd64-amd64-xl-vhd                                      blocked 
 test-arm64-arm64-xl-vhd                                      blocked 
 test-armhf-armhf-xl-vhd                                      blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-arm64 broken
broken-job build-arm64-pvops broken
broken-job build-arm64-xsm broken
broken-job build-armhf-pvops broken
broken-job build-i386 broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-i386-xsm host-install(4)
broken-step build-i386 host-install(4)
broken-step build-i386-pvops host-install(4)
broken-step build-arm64-pvops host-install(4)
broken-step build-arm64 host-install(4)
broken-step build-arm64-xsm host-install(4)
broken-step build-amd64 host-install(4)
broken-step build-amd64-pvops host-install(4)
broken-step build-amd64-xsm host-install(4)
broken-step build-armhf-pvops host-install(4)

Not pushing.

(No revision log; it would be 37391 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 06:14:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 06:14:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295673.503256 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ57m-0000VW-C6; Tue, 29 Mar 2022 06:14:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295673.503256; Tue, 29 Mar 2022 06:14:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ57m-0000VP-8d; Tue, 29 Mar 2022 06:14:38 +0000
Received: by outflank-mailman (input) for mailman id 295673;
 Tue, 29 Mar 2022 06:14:36 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ57k-0000VF-MS; Tue, 29 Mar 2022 06:14:36 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ57k-0000Dh-Gt; Tue, 29 Mar 2022 06:14:36 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ57k-0005ic-3O; Tue, 29 Mar 2022 06:14:36 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ57k-0008Hq-2y; Tue, 29 Mar 2022 06:14:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=ZZu+HJWNm1TUgVNKRF1acSutuQKTQQjrS3iETRmgjXk=; b=V9SfeKssnT36hpOK/GutIhAmu1
	+B+raFM6QYQf3wfsr+uM/hz9RAxMq046vXy5OomtPSbsb5ppIa0HHIqyIMOgxQEHnHyfpo2cDJ9Go
	vKejIOi8I9tXn7qE88XxdbgXO5sWTyTDPPLNpItRyT0g8Z16NxNKxsQurNLl7vDVfG18=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168949-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168949: trouble: blocked/broken/pass
X-Osstest-Failures:
    xen-unstable:build-amd64:<job status>:broken:regression
    xen-unstable:build-amd64-prev:<job status>:broken:regression
    xen-unstable:build-amd64-pvops:<job status>:broken:regression
    xen-unstable:build-amd64-xsm:<job status>:broken:regression
    xen-unstable:build-amd64-xtf:<job status>:broken:regression
    xen-unstable:build-arm64:<job status>:broken:regression
    xen-unstable:build-arm64-pvops:<job status>:broken:regression
    xen-unstable:build-arm64-xsm:<job status>:broken:regression
    xen-unstable:build-armhf-pvops:<job status>:broken:regression
    xen-unstable:build-i386:<job status>:broken:regression
    xen-unstable:build-i386-prev:<job status>:broken:regression
    xen-unstable:build-i386-pvops:<job status>:broken:regression
    xen-unstable:build-i386-xsm:<job status>:broken:regression
    xen-unstable:build-amd64-xtf:host-install(4):broken:regression
    xen-unstable:build-i386:host-install(4):broken:regression
    xen-unstable:build-i386-prev:host-install(4):broken:regression
    xen-unstable:build-i386-pvops:host-install(4):broken:regression
    xen-unstable:build-i386-xsm:host-install(4):broken:regression
    xen-unstable:build-arm64-xsm:host-install(4):broken:regression
    xen-unstable:build-arm64-pvops:host-install(4):broken:regression
    xen-unstable:build-arm64:host-install(4):broken:regression
    xen-unstable:build-amd64-pvops:host-install(4):broken:regression
    xen-unstable:build-amd64:host-install(4):broken:regression
    xen-unstable:build-amd64-prev:host-install(4):broken:regression
    xen-unstable:build-amd64-xsm:host-install(4):broken:regression
    xen-unstable:build-armhf-pvops:host-install(4):broken:regression
    xen-unstable:test-amd64-i386-livepatch:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-migrupgrade:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-pair:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-qemut-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-qemut-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-qemuu-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-qemuu-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-shadow:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-vhd:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-examine:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-rtds:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-unstable:build-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-qcow2:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-pvshim:build-check(1):blocked:nonblocking
    xen-unstable:build-arm64-libvirt:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-pvhv2-intel:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-pvhv2-amd:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-credit2:build-check(1):blocked:nonblocking
    xen-unstable:build-i386-libvirt:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-credit1:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-dom0pvh-xl-amd:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-dom0pvh-xl-intel:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-intel:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-examine:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-examine-bios:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-examine-uefi:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-freebsd12-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-freebsd11-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-pygrub:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-livepatch:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-migrupgrade:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-pair:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-shadow:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-amd64-xl-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-coresched-amd64-xl:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-coresched-i386-xl:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-examine:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-examine-bios:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-examine-uefi:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-freebsd10-amd64:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-freebsd10-i386:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-examine:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-xl:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:build-check(1):blocked:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:build-check(1):blocked:nonblocking
    xen-unstable:test-xtf-amd64-amd64-1:build-check(1):blocked:nonblocking
    xen-unstable:test-xtf-amd64-amd64-2:build-check(1):blocked:nonblocking
    xen-unstable:test-xtf-amd64-amd64-3:build-check(1):blocked:nonblocking
    xen-unstable:test-xtf-amd64-amd64-4:build-check(1):blocked:nonblocking
    xen-unstable:test-xtf-amd64-amd64-5:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    xen=fc90d75c2b71ae15b75128e7d0d4dbe718164ecb
X-Osstest-Versions-That:
    xen=0e03ff97def12b121b5313094a76e5db7bb5c93c
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 29 Mar 2022 06:14:36 +0000

flight 168949 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168949/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-prev                <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-amd64-xtf                 <job status>                 broken
 build-arm64                     <job status>                 broken
 build-arm64-pvops               <job status>                 broken
 build-arm64-xsm                 <job status>                 broken
 build-armhf-pvops               <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-prev                 <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-amd64-xtf               4 host-install(4)        broken REGR. vs. 168855
 build-i386                    4 host-install(4)        broken REGR. vs. 168855
 build-i386-prev               4 host-install(4)        broken REGR. vs. 168855
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168855
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168855
 build-arm64-xsm               4 host-install(4)        broken REGR. vs. 168855
 build-arm64-pvops             4 host-install(4)        broken REGR. vs. 168855
 build-arm64                   4 host-install(4)        broken REGR. vs. 168855
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 168855
 build-amd64                   4 host-install(4)        broken REGR. vs. 168855
 build-amd64-prev              4 host-install(4)        broken REGR. vs. 168855
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 168855
 build-armhf-pvops             4 host-install(4)        broken REGR. vs. 168855

Tests which did not succeed, but are not blocking:
 test-amd64-i386-livepatch     1 build-check(1)               blocked  n/a
 test-amd64-i386-migrupgrade   1 build-check(1)               blocked  n/a
 test-amd64-i386-pair          1 build-check(1)               blocked  n/a
 test-amd64-i386-qemut-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemut-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-qemuu-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-xl            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-pvshim     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemut-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1)  blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-shadow     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-vhd        1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-xsm        1 build-check(1)               blocked  n/a
 test-arm64-arm64-examine      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl           1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-rtds      1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ws16-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qemut-ws16-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemut-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qcow2     1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvshim    1 build-check(1)               blocked  n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit2   1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit1   1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl           1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-intel  1 build-check(1)              blocked n/a
 test-amd64-amd64-examine      1 build-check(1)               blocked  n/a
 test-amd64-amd64-examine-bios  1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-examine-uefi  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-freebsd12-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-qemuu-freebsd11-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pygrub       1 build-check(1)               blocked  n/a
 test-amd64-amd64-livepatch    1 build-check(1)               blocked  n/a
 test-amd64-amd64-migrupgrade  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pair         1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemut-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemut-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-amd64-xl-shadow    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-xsm       1 build-check(1)               blocked  n/a
 test-amd64-coresched-amd64-xl  1 build-check(1)               blocked  n/a
 test-amd64-coresched-i386-xl  1 build-check(1)               blocked  n/a
 test-amd64-i386-examine       1 build-check(1)               blocked  n/a
 test-amd64-i386-examine-bios  1 build-check(1)               blocked  n/a
 test-amd64-i386-examine-uefi  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-amd64  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-i386  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 test-armhf-armhf-examine      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-arndale   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit1   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-cubietruck  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-rtds      1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-vhd       1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-1        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-2        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-3        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-4        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-5        1 build-check(1)               blocked  n/a

version targeted for testing:
 xen                  fc90d75c2b71ae15b75128e7d0d4dbe718164ecb
baseline version:
 xen                  0e03ff97def12b121b5313094a76e5db7bb5c93c

Last test of basis   168855  2022-03-25 14:37:04 Z    3 days
Testing same since   168867  2022-03-25 23:39:47 Z    3 days    4 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>

jobs:
 build-amd64-xsm                                              broken  
 build-arm64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64-xtf                                              broken  
 build-amd64                                                  broken  
 build-arm64                                                  broken  
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-prev                                             broken  
 build-i386-prev                                              broken  
 build-amd64-pvops                                            broken  
 build-arm64-pvops                                            broken  
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-xtf-amd64-amd64-1                                       blocked 
 test-xtf-amd64-amd64-2                                       blocked 
 test-xtf-amd64-amd64-3                                       blocked 
 test-xtf-amd64-amd64-4                                       blocked 
 test-xtf-amd64-amd64-5                                       blocked 
 test-amd64-amd64-xl                                          blocked 
 test-amd64-coresched-amd64-xl                                blocked 
 test-arm64-arm64-xl                                          blocked 
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           blocked 
 test-amd64-coresched-i386-xl                                 blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        blocked 
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         blocked 
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-xl-xsm                                      blocked 
 test-arm64-arm64-xl-xsm                                      blocked 
 test-amd64-i386-xl-xsm                                       blocked 
 test-amd64-amd64-qemuu-nested-amd                            blocked 
 test-amd64-amd64-xl-pvhv2-amd                                blocked 
 test-amd64-i386-qemut-rhel6hvm-amd                           blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-dom0pvh-xl-amd                              blocked 
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemut-debianhvm-amd64                     blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     blocked 
 test-amd64-i386-freebsd10-amd64                              blocked 
 test-amd64-amd64-qemuu-freebsd11-amd64                       blocked 
 test-amd64-amd64-qemuu-freebsd12-amd64                       blocked 
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         blocked 
 test-amd64-i386-xl-qemut-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         blocked 
 test-amd64-i386-xl-qemuu-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemut-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemut-ws16-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ws16-amd64                          blocked 
 test-armhf-armhf-xl-arndale                                  blocked 
 test-amd64-amd64-examine-bios                                blocked 
 test-amd64-i386-examine-bios                                 blocked 
 test-amd64-amd64-xl-credit1                                  blocked 
 test-arm64-arm64-xl-credit1                                  blocked 
 test-armhf-armhf-xl-credit1                                  blocked 
 test-amd64-amd64-xl-credit2                                  blocked 
 test-arm64-arm64-xl-credit2                                  blocked 
 test-armhf-armhf-xl-credit2                                  blocked 
 test-armhf-armhf-xl-cubietruck                               blocked 
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        blocked 
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         blocked 
 test-amd64-amd64-examine                                     blocked 
 test-arm64-arm64-examine                                     blocked 
 test-armhf-armhf-examine                                     blocked 
 test-amd64-i386-examine                                      blocked 
 test-amd64-i386-freebsd10-i386                               blocked 
 test-amd64-amd64-qemuu-nested-intel                          blocked 
 test-amd64-amd64-xl-pvhv2-intel                              blocked 
 test-amd64-i386-qemut-rhel6hvm-intel                         blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-amd64-dom0pvh-xl-intel                            blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-livepatch                                   blocked 
 test-amd64-i386-livepatch                                    blocked 
 test-amd64-amd64-migrupgrade                                 blocked 
 test-amd64-i386-migrupgrade                                  blocked 
 test-amd64-amd64-xl-multivcpu                                blocked 
 test-armhf-armhf-xl-multivcpu                                blocked 
 test-amd64-amd64-pair                                        blocked 
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-amd64-amd64-xl-pvshim                                   blocked 
 test-amd64-i386-xl-pvshim                                    blocked 
 test-amd64-amd64-pygrub                                      blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-amd64-amd64-xl-qcow2                                    blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-xl-rtds                                     blocked 
 test-armhf-armhf-xl-rtds                                     blocked 
 test-arm64-arm64-xl-seattle                                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              blocked 
 test-amd64-amd64-xl-shadow                                   blocked 
 test-amd64-i386-xl-shadow                                    blocked 
 test-arm64-arm64-xl-thunderx                                 blocked 
 test-amd64-amd64-examine-uefi                                blocked 
 test-amd64-i386-examine-uefi                                 blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 
 test-arm64-arm64-xl-vhd                                      blocked 
 test-armhf-armhf-xl-vhd                                      blocked 
 test-amd64-i386-xl-vhd                                       blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-prev broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-amd64-xtf broken
broken-job build-arm64 broken
broken-job build-arm64-pvops broken
broken-job build-arm64-xsm broken
broken-job build-armhf-pvops broken
broken-job build-i386 broken
broken-job build-i386-prev broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-amd64-xtf host-install(4)
broken-step build-i386 host-install(4)
broken-step build-i386-prev host-install(4)
broken-step build-i386-pvops host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step build-arm64-xsm host-install(4)
broken-step build-arm64-pvops host-install(4)
broken-step build-arm64 host-install(4)
broken-step build-amd64-pvops host-install(4)
broken-step build-amd64 host-install(4)
broken-step build-amd64-prev host-install(4)
broken-step build-amd64-xsm host-install(4)
broken-step build-armhf-pvops host-install(4)

Not pushing.

------------------------------------------------------------
commit fc90d75c2b71ae15b75128e7d0d4dbe718164ecb
Author: Andrew Cooper <andrew.cooper3@citrix.com>
Date:   Mon Feb 28 19:31:00 2022 +0000

    x86/cet: Remove XEN_SHSTK's dependency on EXPERT
    
    CET-SS hardware is now available from multiple vendors, the feature has
    downstream users, and was declared security supported in XSA-398.
    
    Enable it by default.
    
    Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
    Reviewed-by: Juergen Gross <jgross@suse.com>
(qemu changes not included)


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 06:27:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 06:27:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295682.503270 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ5KH-00026i-MH; Tue, 29 Mar 2022 06:27:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295682.503270; Tue, 29 Mar 2022 06:27:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ5KH-00026b-JG; Tue, 29 Mar 2022 06:27:33 +0000
Received: by outflank-mailman (input) for mailman id 295682;
 Tue, 29 Mar 2022 06:27:31 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=kdRh=UI=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZ5KF-00026N-IK
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 06:27:31 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4e238729-af29-11ec-a405-831a346695d4;
 Tue, 29 Mar 2022 08:27:30 +0200 (CEST)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04lp2059.outbound.protection.outlook.com [104.47.12.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-34-2-hEB0PjMcytQpirvwA0pw-1; Tue, 29 Mar 2022 08:27:27 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by DB6PR0401MB2661.eurprd04.prod.outlook.com (2603:10a6:4:3a::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.23; Tue, 29 Mar
 2022 06:27:26 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%5]) with mapi id 15.20.5102.023; Tue, 29 Mar 2022
 06:27:26 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4e238729-af29-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648535248;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=YK4sQpKDPL1Sp//4fffv09vTWoI6q01E0+8prpZ5QEY=;
	b=BTn+EzP29FvoLrPJjym1d4jJoPELnxCm386xZ/xXVwOfD6ScLJWGc5MuoW86oWKQQOk5x7
	AKdA+SRTtPZUn7xL/Z4bkcp91fePKDof1Xz0cbWdvjo+Ivihw2SjoAhoJxup6cefAJzw5t
	qxOWCZYagBFGm++UdjzZsp/v7APiDtY=
X-MC-Unique: 2-hEB0PjMcytQpirvwA0pw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=gaPftp2JF8JP952dfj78e8Lnc+R0atTFfTVavJdJrCM9tQu3Ogek+KtnZ8pOzM3lypn6AbVOirva39Wk22D3MzpbeJ36snJGEQKKuT/qZ4uO/joSkH8oj0O1sRilyG35TjCZYFY9OiVIgFB7Wep0l+hhRm0h286ZoGFiOPvlxqOkbTdUpBwi6gEXqi47afrRG8kPV0731tGI+f9SPTHzGMMucIIvEj0oGSllnrDpED95Kpcwmli92Jya+1GAwh49gr22Fb8roXhclLlQssklhVo26zvFAgCNaeorAinjVKS32O5I3rUIi4Q6du27Sll1a4rqYBxb4/UfE+elZso/UQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=YK4sQpKDPL1Sp//4fffv09vTWoI6q01E0+8prpZ5QEY=;
 b=afvEyhVEvyvlmRzj9kYYSTGTBhTjkFXN1V3aaZq/gQpYhEyDPGN+oZH5QinjZ2c1UA86Ocm8iNuDohcz+4kN4r+qyMNwH1uCZmuI+C5SFL4NG46oW8jR6TttbLF0lrjVmNH1eHiVCS04jyUbuLttOeFg51DZhCGAO7mNKS0gSLnCJRWzz03ZNeYJNnTnx5DzBWKCNetoLQEebonb24sbnfpFVWYF26GjP2Pe7s+kCNjZEXgFkuR+AkajZwCyhqj1z4GCQqXjMyynBUFDbEci6smy2cAOIeh6MliL2bCJWrq9rVoiktmToRwEDrNKVKyMyR4TzUhI0QF3OnucQgWX7Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <c999faa3-ded7-64af-7bf1-f6b8e5620425@suse.com>
Date: Tue, 29 Mar 2022 08:27:24 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: OS Headers hypercall.h/hypervisor.h
Content-Language: en-US
To: Stefano Stabellini <sstabellini@kernel.org>
Cc: xen-devel@lists.xenproject.org, Elliott Mitchell <ehem+xen@m5p.com>
References: <Yj+ekdLdRa9U7dfa@mattapan.m5p.com>
 <alpine.DEB.2.22.394.2203281523230.2910984@ubuntu-linux-20-04-desktop>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <alpine.DEB.2.22.394.2203281523230.2910984@ubuntu-linux-20-04-desktop>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR0301CA0007.eurprd03.prod.outlook.com
 (2603:10a6:20b:468::27) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 02884178-e79f-4a79-322f-08da114d3134
X-MS-TrafficTypeDiagnostic: DB6PR0401MB2661:EE_
X-Microsoft-Antispam-PRVS:
	<DB6PR0401MB266124C7BAF2F8C7A10E3C06B31E9@DB6PR0401MB2661.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(8936002)(5660300002)(83380400001)(4326008)(8676002)(6486002)(508600001)(6512007)(26005)(186003)(2616005)(31696002)(86362001)(6506007)(2906002)(53546011)(38100700002)(6916009)(31686004)(316002)(66946007)(66556008)(66476007)(36756003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?SzJ5SkIrK1N6TmhhT1NPbDdYL05EUGtvblN6L01zMUlqeXJnSExQWUhDMEFj?=
 =?utf-8?B?T0o1OTZ5VDVzTEFXVmQ5Z2dDNExjZmNxQmgvR1hZSkZMbHJSN2FoREFDcFBa?=
 =?utf-8?B?akRuV09hYkd3TnNzMThoNlErS3F3QzNxL0xlbmF0Ly92TDBXVHFyQ0pGS2pQ?=
 =?utf-8?B?eU1xdW1oZWl5VWxQMzgrNjA4TTJDZUhYN3ozZTBMK3Nma1lhMlc3aVUrbDBk?=
 =?utf-8?B?RTQxUUF3dHRhMG0wNEhOWGs5VEl4V25hek9kZ09wWjlGREtVNWpLUG43QVZp?=
 =?utf-8?B?SG96QThkRzlhb1BwOXdYcVlxRXN3c0hReUlEUGUwL05wRHczdnRtY3QrUjhO?=
 =?utf-8?B?T3RrbHBEZEVZeTFUSEFVNU9QUHpkNjNTUEl2MzUyNUdNQXBWaC80RnFvS1JL?=
 =?utf-8?B?M3VXbExSb0RlNi9vOFlwTW5LNHlITDIvMTdpaWVPdU5xMmpxaXVJcG4yNHM2?=
 =?utf-8?B?dCtKUUtncjVlbTVkVnhSWWdSNnFoUUVveDRhbUdPRHRJUE1GZCtSaEoyZ0Fk?=
 =?utf-8?B?ZnlOMXo0QUMzcVhyc08zKzFtR1J2OGVjSitGRm5RUHM4NUFlMVpVd25uRnRY?=
 =?utf-8?B?eTVhSm5YL2F4Vnd0MDd6UkNRTVorUDFqVEM2YnduNHRHQXVYMHIzOEpLTFpV?=
 =?utf-8?B?ZmlObnczSDZLcW1hKzRZbmhWNUFHZzlaY052RnRUY2l4WXlmNi9vZW0yVUVI?=
 =?utf-8?B?Y0pqd1FWNmgzTW1HNFBUMUtJdUdmeS82a3JvOHdlU3BGN1VlMDJiSFlJU3RK?=
 =?utf-8?B?ektsVUVPV0Z6Ui9uaXFMUEs3aTZlV0JOV01GZjBVd1NEaW1Rc2RHUFBPRVVN?=
 =?utf-8?B?bHAyQlo0ZTVmYWMrNktpQzJMbGhhdkd6YXJPbkFTbnZnaUI4Y3pSK3ZsdWRJ?=
 =?utf-8?B?NTkvZ2xXYTB1eEEzUmtLelVuYkgzc3Q4VEtFV2dxcGE1TS9GcmhKWmVGVlN5?=
 =?utf-8?B?eEdRbUtnU2ZyODdaMFlaS096YmtIRGNkUHNpbUlGQkVFV2lPU0RuMGxsVE9R?=
 =?utf-8?B?NjM1UFQ4MzBZSkNZcTdQdElBUzEzUWVsMTZja1NmZEhxTmtPMXMwekVMcnFJ?=
 =?utf-8?B?OW1UYmJuajJDKzV0Zjl5OG9raUVUa3JMdEhyOHdKTHpUclhCSnowd3hySllL?=
 =?utf-8?B?WDVoUFdjQUpEY0xYWWgxOHl4bXBGMGxwZzVCRzl4MXpTYzV2ak9Jd2lVT0Vl?=
 =?utf-8?B?eGFWb1JCWkRETWw2NXpFTkRyYlJWUitNYmY2dkJsSE9PRUJERzlGVTRGZHJE?=
 =?utf-8?B?Yys3M0ZxemZKZ3QrVDU5elhZRmI5U2Z3QUgzL3FnZ256K1hkSEV0c2FaUW5J?=
 =?utf-8?B?NVg4ZHJzZWwzL2JvT3N5LzY1eDJvVmZrWk5iVmE3WkZyQXZXSEJNaGF1QjZ5?=
 =?utf-8?B?cXR6TjlQMlBmVTRDOUtmNUJzd3V0eDNPK2VOeHpaZDBsQ0ZGdjJnMTBka3cw?=
 =?utf-8?B?eVVDNjBSVDFpWGdMTDYwdlVnVU1KajhCN0lSMWlDa1N2OGtkcHNLVlZkMWl4?=
 =?utf-8?B?TGJtYlhURXNqKzg3YVgyN2doUi8rdTlCcjg1MGg5TzRjcndWRzhyS3M3Qnpx?=
 =?utf-8?B?cnd0WWhHWVRvVDVLN3RkbXJBOWV2VUlFUmRUTWhOajQ2T3FDK2FqdFowMVc5?=
 =?utf-8?B?K2MwLytRbDZqM0pkRkx4eTFOTk1EZkNvRFI0enpSUTFjMkVpS1ZsdHZRc1Nz?=
 =?utf-8?B?c0MySldyUnk5cUdzVHhFWXo5Y21hY2I2NmxmRXg4a1oyK3ZwamJqOVA2SXFY?=
 =?utf-8?B?R2Nib2JROGk4NXFqODZybzVhVEFBNjQvZGdWc2ZuS3lQL3cwNnNCempxWmNS?=
 =?utf-8?B?ak5GRUVjQWlHdnB2TlhvZm5nT3BwdnFSMUZKUlNGa1BTcnYvOEtxOVR1N2I2?=
 =?utf-8?B?bU5vU1IxbHhrejV0MGVsdEVudHFRdngxNENFQkd3MWFYcU54V0oxOEdBeW9k?=
 =?utf-8?B?bG5wNmpTcDZPLytTN28xcktNWkZzQWlRTkYrQlhDS0tEZ3JhT2hlMUxXckt1?=
 =?utf-8?B?MUlqVHhkZmhJOWpvMEtMRGZqT1NpUGZmYWpVUWcwbFpacWNHZk5jc29FSWJp?=
 =?utf-8?B?UTNsVWZuUjZpbk9RNHZPaTZTMGhCdlUzVnlnRkpHZXdkQjdJUTZaOWNWTTgx?=
 =?utf-8?B?MEl2SjFyS0pBUUVyN25wUm5kYzJYelcwNE42aFZQVFpMVG5uODRZUTh0Y2hr?=
 =?utf-8?B?clVwLy9vNHdlYTVMU280MUxvVFl5WWk0Vlh1Ymo4eHVTbTZSY29Xb0tvRjNR?=
 =?utf-8?B?R1ZOQ1hBNktiY3ZQaDJwcWM1WW91U1kwUlRzNEJjZXNpd1JySStNTnlLYmV4?=
 =?utf-8?B?a2RXOHhMWHkzVUJIdlhPVTJVRUhhWVZlR1ZzcjhGMjN4VXgzbHFuZz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 02884178-e79f-4a79-322f-08da114d3134
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 29 Mar 2022 06:27:26.3410
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: RUg/sAJlJ1BsPufH9SS1SSqxhy+ktcHUwBrTCILDLatNcRUThDiX8em60i6IcLBIqZmV4hZ7p4WhMyf5M5t6pw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0401MB2661

On 29.03.2022 00:25, Stefano Stabellini wrote:
> On Sat, 26 Mar 2022, Elliott Mitchell wrote:
>> The hypercalls implementation for Linux and FreeBSD have two key headers,
>> hypercall.h and hypervisor.h.  I'm curious why the implementations for
>> x86 and ARM* are so distinct.
>>
>> I found it fairly straightforward to implement ARM* versions of the x86
>> _hypercall#() macros.  Once that is done, most of the wrappers in the x86
>> hypercall.h can be moved to a shared hypervisor.h header.
>>
>> Why does Xen/ARM on Linux still have hypercall.S when merging the
>> headers should reduce maintainance?
>>
>> Was GCC extended inline assembly language for ARM* thought too awful?
>>
>> I'm also curious why these headers are part of the Linux kernel, instead
>> of being maintained by the Xen Project?
> 
> I would have to dig through ancient archives to give you a full answer
> but the reason was that the asm inline on ARM didn't provide enough
> guarantees on ordering and registers it would use and clobber.

While there may be ordering issues (albeit most ought to be taken care
of by marking the asm() volatile and having it have a memory clobber),
registers used / clobbered ought to always be expressable by asm() -
if not by constraints covering just a single register (such frequently
simply don't exist), then by using register variables tied to a
particular register. Of course in all of this there's an assumption of
no bugs in this area in the compilers claimed as being supported ...

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 29 06:43:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 06:43:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295688.503284 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ5Zg-0004UP-3k; Tue, 29 Mar 2022 06:43:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295688.503284; Tue, 29 Mar 2022 06:43:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ5Zg-0004UI-0g; Tue, 29 Mar 2022 06:43:28 +0000
Received: by outflank-mailman (input) for mailman id 295688;
 Tue, 29 Mar 2022 06:43:27 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=kdRh=UI=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZ5Zf-0004UC-5S
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 06:43:27 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 8907e0f9-af2b-11ec-8fbc-03012f2f19d4;
 Tue, 29 Mar 2022 08:43:26 +0200 (CEST)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2172.outbound.protection.outlook.com [104.47.17.172]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-17-gwte915ZOmGV74gDa6f8NQ-1; Tue, 29 Mar 2022 08:43:21 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by VI1PR0401MB2622.eurprd04.prod.outlook.com (2603:10a6:800:5b::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.23; Tue, 29 Mar
 2022 06:43:20 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%5]) with mapi id 15.20.5102.023; Tue, 29 Mar 2022
 06:43:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8907e0f9-af2b-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648536205;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=sIY9Sm79ptr3vLtTUrIZ4GAkIm+kxQtGOibXJqwaKgI=;
	b=CV8EaUAuifIChSkFCM2mCU/HONYEtnVOunbZvAMxHi4NkwMjqXQxXZxoQYRw+L1ehgPB6y
	rwF7sFKAeLjPhcPGqM48UqUiqQG055YlbmwpNvSH5LwFQg+F+lw9arfAtkjDH0bSZBSAX/
	G9IbriiW8mTLdmMWbwsUdnNQJ+VEuAY=
X-MC-Unique: gwte915ZOmGV74gDa6f8NQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=b2JLyxZiqKftamtiTrhG/iHxxxvGAOnqbnXnYoHaZUISRr40qT1Fg9CWs0Aipm+ZLRYaD8HFlxme1/IGAZM0SF+r9WVw675eB6u8IXzT8JW4cFBNMVRR70Qi+Vn/TNP7UUG/EBr1O57IRk8hIVkrVhGEJmEyWlG2vMeXxan2Hdd2xUccICQzXJd8tUNRIjY54oz5h3k5jbI2IbJ4WVgv88pTDVVFK1aBoQ5dvSVITGMtGQZA/6E/KcYTbgkrlcy/fMKRPnzu2cX5h6aj1vxtGRR5kKwBIVhNL8P+cwQSViLENtylRNs8UB0b2/Xsic25dLrbWsRFtu9TA5JHmpSOkw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=sIY9Sm79ptr3vLtTUrIZ4GAkIm+kxQtGOibXJqwaKgI=;
 b=G9SY0n7vcfn1NjvTsG/DdPStdD6H8pPOs4t27yWZ4SX500FrWs/wyoBCQHXtTRGAJrU/gTFRVNkaN5pFKF8zIcP3RCFMCn6/Cu57/M3ZbuGQFSR/xL8v03ptTQ5vhGW+HCNpckTjOVrpRaxP3+SqIcHJy9qO4FWMhbrB9rLpdrpognAOeDXCxs9Vc7UiMibzvIKPvGHMD/AtTRZVXw3tnocaNdqFjlpT/pglrG8iVrn+rlxFUTpR82G/7Zoe8G8yq+ePJnoo8o0jOSiDZAtK7fsZ0HBUl13lh8CLKjPGZO7tvnpFj6tlPobO73K9A2I8Yb3t8S2g9TqiHsGa2yMFiQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <7935e60e-34b1-76be-e5de-56e60f173438@suse.com>
Date: Tue, 29 Mar 2022 08:43:18 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [RFC PATCH 1/1] xsm: allows system domains to allocate evtchn
Content-Language: en-US
To: "Daniel P. Smith" <dpsmith@apertussolutions.com>
Cc: scott.davis@starlab.io, Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Daniel De Graaf <dgdegra@tycho.nsa.gov>, xen-devel@lists.xenproject.org
References: <20220328203622.30961-1-dpsmith@apertussolutions.com>
 <20220328203622.30961-2-dpsmith@apertussolutions.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220328203622.30961-2-dpsmith@apertussolutions.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR05CA0009.eurprd05.prod.outlook.com
 (2603:10a6:20b:488::10) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 524f4a79-21a3-4fea-b5c6-08da114f69cd
X-MS-TrafficTypeDiagnostic: VI1PR0401MB2622:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR0401MB2622CEE521BB8C0E66786165B31E9@VI1PR0401MB2622.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(31696002)(53546011)(86362001)(6506007)(8676002)(4326008)(6512007)(2616005)(2906002)(38100700002)(8936002)(6486002)(508600001)(54906003)(5660300002)(316002)(6916009)(31686004)(36756003)(26005)(66946007)(186003)(66476007)(66556008)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?YVNmTUM2ZTRtNzk3eVd2RlRPb1hkZDhweVE2Z21FU1o2QXp3NTNjMTB2R3Fy?=
 =?utf-8?B?UWRVS2JsL1RtSUZiMHlETmpUL28zNUxPUEtVOTdaMnRqclhySldMb2tsb3Fs?=
 =?utf-8?B?V2UwUEFwMkd6WHprK1BMS0lpKy8vdlFTeUZ3WUgzNzZESHpPQzhHbmU4K0lE?=
 =?utf-8?B?M3lnRFN5S3BwNWV2a3Q3UHFUSE40ZTFjeFBKUjV0TWw0RXFQVkt3dmMwRVhT?=
 =?utf-8?B?QVVjY0tHaGp6bG82MllyNzFEN1hpdGZXVVBjZWs4M0ZTM1NOUnp2QUhGUFps?=
 =?utf-8?B?bTZzeDVWTnhzWnAwbXhIQWZxQ2QzL0YzWTRmT05xNjEzUTY3QTcyWDZ6Q3pY?=
 =?utf-8?B?WmNCd1d6TGlYQSsrWlFlcWRka1NUK25RUzZvNEY1L2VMT0h3enUvQkxRZVVi?=
 =?utf-8?B?OUoyb05mMnRMdHhna1ZFcExYR3EvcDVFN3BBc1FRV3FGODhxWkJsMDNVRzFm?=
 =?utf-8?B?TUhwNTdPOFRvMTAzMENQMnMzM29FbUZsalJZM21jcWphTUtXOE42dFIxa3hw?=
 =?utf-8?B?a2FiMk5ySWdnNEcwZUVkcTRZWllIVzVxWTBCYWs4Y1RJaFZWTjVDU0M1TVgy?=
 =?utf-8?B?RzZjNjQ1S1pyamczK3YyNVBZc1Z4KzIxblNmZHFwdmFNaEF0bmowSFM2c2Ns?=
 =?utf-8?B?eXlGS3FhY2tUN3g5d1pyenUzR2JReDhQTkR6NVdqd0ZEMFBraVVNUGs2citx?=
 =?utf-8?B?QVhJQUY5OVVsWnViWlNuKzNwL1ViUEV1TXJrTFNIYkJ4ZzcrUVd4MEZWYzVW?=
 =?utf-8?B?Zm40Qk8rbUtuY1pndUpFZjFrK2w5ZG9pVXhUcVg4R2krb0d4OXdONGFwRWVt?=
 =?utf-8?B?RzFQU1RrdTR2NkJUdy80OVZVTWRaeFRGSDFLMGlqbjJ1VFZoWHdRM0dUVVlv?=
 =?utf-8?B?NUlWdXZDWVN3cVUyZHIwM3FsZG1aWWtzVnB2MjRhUjJVaklJWFZuN0dkQlNx?=
 =?utf-8?B?UmNHTmpnanF2VEEzR0R1Y2lBVDMyenYyZVFrWFJHc0tmYlVoN0VNeFoyaDRM?=
 =?utf-8?B?cjdpMlFueURqQm9MaERHek14NkJSTDduN0xrdlUzcHhuZGQ2VlZ3ckc4aG9q?=
 =?utf-8?B?cTgya3N2UWpFY1RWMFc2V2dLamhCME1QaERGZFgvSTNGNmdSSHRQVWg2cEE4?=
 =?utf-8?B?bVI0YXE3QzRHRjJ0aXhLTDJvMTlJQ1lPcjlVZnJnSWo2UWZVQzdXZmVvVStH?=
 =?utf-8?B?czZOVjltOVV0REt3eFh5cERzV1dGRHo1TFZEU2RNU0FDMkVXcEFBRWZhNkVv?=
 =?utf-8?B?ZldiSTVmbWQ5RFdrVFdlTDJiUTdZekVsY1dtSlU2OVRtL3U4TndTM21HVjIy?=
 =?utf-8?B?OXBUYU9aa05VSGlPakpJc0MrbUVEVFZZT2pKS1dJbHZqREZsaEFGYlIxOUVL?=
 =?utf-8?B?YUpjbUlVL04rQlNtOTA3aVhxY3gxcGlVUDhzZVhZa0RZa3ordmp0UnlSTDZ1?=
 =?utf-8?B?RUU2NER4TnI0bldPMkpMcXhaeEJBTzFSS1FwZ05JVDdvc0I3S2ErV0hhd2lP?=
 =?utf-8?B?YWVPNTB0Ny80K2FxNDBsMEtDcGNQdEtyM0QxcE1LN2k2RVNnVFp5blplRklE?=
 =?utf-8?B?VjFTZGFWTWYycmYwRElMenVTbUNvMFp1Wk8rVUNzUGpOVEUzZEErN3B5bk93?=
 =?utf-8?B?M2loSGNUa1NWL0VZVUVpemNFdXhSVkxKSUdnbExHeEIvUGQ4UFNya082YVpH?=
 =?utf-8?B?YStXTnlWWHdkMk1UdWJxVUtYSEZSNDR5dldMdW9ncU9ZdnJsMWpKV24waEsw?=
 =?utf-8?B?VjBqTXZPWktTd1R4QzQ3dUpuRmdtbFQ1VURnR09mZldNMllXNjdIUnVyNXg0?=
 =?utf-8?B?YUl5WVZRclY0SXVUY0ZtMnlUUWYvS2ZHODBFclFNU3E0RWN1aU9tSzgzQVBS?=
 =?utf-8?B?RXVFeUhkbXFabkZ3OEtyU0tieVRTVWEyZVdNYXp4elM2TUhZTE82dUxuUUVp?=
 =?utf-8?B?Y1kzd01XbXE4YVpvUCtuNUtEY0QrUDBaZzZTUHY5R0dScWRzRHo4T3REMEM3?=
 =?utf-8?B?cHNNc2JTRzcxMTZ6ajdqQ3JPVDdRekRWak9RKzcwSDVQd2RpVU9KUzFwVnFQ?=
 =?utf-8?B?WVZnYmpPczk1NzhjM0tjQ1F0MXoxQStGWjA3bjUvOWIyME5JWWdNY09jY1pZ?=
 =?utf-8?B?SzVLbzdvalFsS1BOemh3elJLbHVQQ29IUlQ2WkY0S0I5SE00bS8yTDMwL2Yr?=
 =?utf-8?B?SG93UzBMb2ZCUE5hUERDOTIrOU9pZ1JpMjhBRFhtTzZCVzlFWUUvRFRiRmJ3?=
 =?utf-8?B?czBtMTJwaS9qdHNkMzZpMVFMeS9Fc1Y4QzNxb3QxbHl1QjNWbW9VRmd1cG9N?=
 =?utf-8?B?UnpiQ3gySFhsRUFNcENnL29hTUhqTk5MWjBqaGtJdkNJZ0QzT1Azdz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 524f4a79-21a3-4fea-b5c6-08da114f69cd
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 29 Mar 2022 06:43:20.2305
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: xvbTU3EQkoNMGQulBl5cyTY9Q2Fe183AsxUlpFvYnN0R1ziLznFI3a/xdp+R01hk2NueLHVPmDV+whxQzo4Fdg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0401MB2622

On 28.03.2022 22:36, Daniel P. Smith wrote:
> During domain construction under dom0less and hyperlaunch it is necessary to
> allocate at least the event channel for xenstore and potentially the event
> channel for the core console. When dom0less and hyperlaunch are doing their
> construction logic they are executing under the idle domain context. The idle
> domain is not a privileged domain, it is not the target domain, and as a result
> under the current default XSM policy is not allowed to allocate the event
> channel.

I appreciate the change is only needed there right now, but it feels
inconsistent. _If_ it is to remain that way, at least a comment needs
to be put in xsm_evtchn_unbound() making clear why this is a special
case, and hence clarifying to people what the approximate conditions
are to have such also put elsewhere. But imo it would be better to
make the adjustment right in xsm_default_action(), without touching
event_channel.c at all. Iirc altering xsm_default_action() was
discussed before, but I don't recall particular reasons speaking
against that approach.

> This patch only addresses the event channel situation by adjust the default XSM
> policy for xsm_evtchn_unbound to explicitly allow system domains to be able to
> make the allocation call.

Indeed I'm having trouble seeing how your change would work for SILO
mode, albeit Stefano having tested this would make me assume he did
so in SILO mode, as that's the default on Arm iirc. Afaict
silo_mode_dom_check() should return false in the described situation.

Similarly I don't see how things would work transparently with a
Flask policy in place. Regardless of you mentioning the restriction,
I think this wants resolving before the patch can go in.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 29 07:30:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 07:30:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295694.503302 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ6JO-0001Gi-TV; Tue, 29 Mar 2022 07:30:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295694.503302; Tue, 29 Mar 2022 07:30:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ6JO-0001Gb-O6; Tue, 29 Mar 2022 07:30:42 +0000
Received: by outflank-mailman (input) for mailman id 295694;
 Tue, 29 Mar 2022 07:30:42 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=R1vv=UI=citrix.com=prvs=0801e2fd5=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nZ6JN-0001Ek-KP
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 07:30:42 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 200a29f9-af32-11ec-8fbc-03012f2f19d4;
 Tue, 29 Mar 2022 09:30:38 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 200a29f9-af32-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648539038;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=P7LaVwEUO9o/mUITr9NXl39pFPd/fZg8cHV9j957Ytw=;
  b=ZTgDGK2Q4UiE9bdTzIdqOwdkDcFd4OndPb8hIp0t6JGsxJgFIsMh6A8l
   N4cexDlNQaOmLHqmDgW+4Q1bnWL9VkATYuegQE+EuDFw/fptGXsdNPy6P
   X2wbceZ49zGQicR2PaiL21cotd6p48CWBBNZWCF3r7NJtPfhUya10iBly
   A=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67405460
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:gOUO8KJndvvhUUjSFE+RUpUlxSXFcZb7ZxGr2PjKsXjdYENS0TwBn
 GdNWDzXbvqJMWenKowla9yyoxgA78DTm4cyGwNlqX01Q3x08seUXt7xwmUcns+xwm8vaGo9s
 q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUYYoAQgsA148IMsdoUg7wbRh2dQ52YHR7z6l4
 rseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3fMldG0DQUIhMdtNWc
 s6YpF2PEsE1yD92Yj+tuu6TnkTn2dc+NyDW4pZdc/DKbhSvOkXee0v0XRYRQR4/ttmHozx+4
 IUdv7CcYAU4B6fVvc8NYSUEF2ZzLKITrdcrIVDn2SCS50jPcn+qyPRyFkAme4Yf/46bA0kXq
 6ZecmpUKEne2aTmm9pXScE17ignBNPsM44F/Glp0BnSDOo8QICFSKLPjTNd9Glv2pgTQaiGD
 yYfQSdNQizmPExEA3cWN6IlhMG62CPOeQQN/Tp5ooJoujOOnWSdyoPFK8HJc9aHQcFUmEewp
 W/c+Wn9RBYAO7S3yyeB83+qrv/Cm2X8Qo16PLG3+vNlmlS72n0YCBpQU0Cy5/a+lCaWRNZ3O
 0ESvC00osAa5EGtC9XwQRC8iHqFpQIHHcpdFfUg7wOAwbaS5ByWbkAIViVEacAmnMYuSCY2y
 0SSmNf0GT1otqbTQnWYnp+Wpz6vPSkeLUcZeDQJCwAC5rHLu4o0kg6JQt99EbWdlcH8AzX5y
 XaLq0ADa6471JBRkf/hpBae3mzq9sOhohMJChv/DjKvwi9QZp+cbZWNwkjp0apEa4uIQQzU1
 JQboPS24OcLBJCLsSWCRuQRAb2kj8q43C3gbU1HRMd4qWn0k5K3VcUJuWwleh81WioRUWWxC
 HI/rz+983O60JGCSaZsK7y8BM0xpUQLPYS0D6uEBjaij3UYSeNmwM2MTRPLt4wOuBJ1+U3aB
 Xt9WZz2ZZr9If47pAdav89HjdcWKtkWnAs/v6zTwRW9yqa5b3WIU7oDO1bmRrlnsPPY+FqPq
 YgEaZviJ/BjvAvWOHO/HWk7dw1iEJTGLcqu95w/mhCrfGKK513N+9eOmOh8KuSJboxel/vS/
 2HVZ6Or4AGXuJEzEi3TMioLQOq2Bf5X9CtnVQRxbQfA8yVyOu6HsfZAH6bbiJF6rYSPO9YvF
 KJbEyhBa9wSIgn6F8M1MMCl9dc4JU3x7e9MVgL8CAUCk1dbb1Wh0vfvfxf19TlICSyytMAkp
 Kan2B+dSp0GLzmOxu6MAB5z5ztdZUQgpd8=
IronPort-HdrOrdr: A9a23:iObBtqE5FOHLHaFKpLqFBJHXdLJyesId70hD6qkvc3Nom52j+/
 xGws536faVslcssHFJo6HmBEClewKnyXcV2/hrAV7GZmfbUQSTXeNfBOfZsljd8mjFh5NgPM
 RbAtZD4b/LfCFHZK/BiWHSebZQo+VvsprY/ds2p00dMj2CAJsQiTuRZDzrdnGfE2J9dOYE/d
 enl4N6jgvlXU5SQtWwB3EDUeSGj9rXlKj+aRpDIxI88gGBgR6h9ba/SnGjr1wjegIK5Y1n3X
 nOkgT/6Knmm/anyiXE32uWy5hNgtPuxvZKGcTJoMkILTfHjBquee1aKvW/lQFwhNvqxEchkd
 HKrRtlF8Nv60nJdmXwmhfp0xmI6kdb11bSjXujxVfzq83wQzw3T+Bbg5hCTxff4008+Plhza
 NixQuixtZqJCKFuB64y8nDVhlsmEbxi2Eli/Qvg3tWVpZbQKNNrLYY4FheHP47bW/HAbgcYa
 dT5fznlbdrmQvwVQGYgoAv+q3nYp0LJGbIfqBY0fblkAS/nxhCvj4lLYIk7zU9HakGOul5Dt
 T/Q9VVfY51P7wrhIJGdZA8qJiMexrwqSylChPhHb2gLtBDB07w
X-IronPort-AV: E=Sophos;i="5.90,219,1643691600"; 
   d="scan'208";a="67405460"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Ul9CzycNzfhy6Vvne+NJ5iL1LHC4JBq1XaDqpZ8SlKZDKqlOrskkM6QuXj6ibndOxvWG8z79uA1xGEtdKEDSen2y+A3b+AY7WtjxMnC8inf8iOwNCPTNRCUR941T1cXa/A3CqXe1UF182GMCnlIrXNgyPm/SGU4vL7V378ROS9bJemG/gad004pejSqTOeDC3vJpUkpuiy/rC1Iv39TcBI9wVtB0P6QlZCHHse7LmZhxYNnrv9dGUlwX2Xqc5/j5AjmU4c0hZzaN+6HOCiihCJZuGn4GLz+kn2hoQ4+pPIDMdJxBpRNuy8MpP9t3Ox8R/00p7eUo8JAUh9udqxXKpA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=P7LaVwEUO9o/mUITr9NXl39pFPd/fZg8cHV9j957Ytw=;
 b=SMXsL2K5XdKyPiZ62hUEsbkUorAmyBrPP3l5mJUvx9H2aP2swgLy7toQNk9V0Ho6TEZc8xx6bxjeTUo7Mp0+gXiWSpGkD6P2GgTLaEl7ZRiOkQ5q5MCj3KyaW900M2pr8Fk1Y5FO5FlGUUL4fAZ6MiFjsQNblD9Eq90rmO3z0mqXAyXl8sUF+BZhx3DGlbjsCh4l4YszgpqiGtCJIhOinsdh5YQmrnBtQERiMxTGkvjM69LqZzKxKXF0YkPMuOF9Yl2rq2v8wOm0d8cLGhyDHGrtewgIPK+JJsGeYBDN2tYLLc3Ef8C5gCNpMjfyKDAnTHvmdALhh5FYV5lwafPo1w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=P7LaVwEUO9o/mUITr9NXl39pFPd/fZg8cHV9j957Ytw=;
 b=G/9S1h68n5f1kRnjldkY7J4Bq8cohBuctSOrjQkJV5suwMRcWJyrlUrF8pMvwwH9EnVmNUHASIpRKreelWEkIiBeR8rTMJL6KAcWx6KBksdo5my7k0V5dLCpP1F6f76+THhqbAaULaS1dfxGxV0mS3bZKnxJWg4Kv2od0o/QUoU=
Date: Tue, 29 Mar 2022 09:29:57 +0200
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: "Daniel P. Smith" <dpsmith@apertussolutions.com>
CC: <xen-devel@lists.xenproject.org>, <scott.davis@starlab.io>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, Jan
 Beulich <jbeulich@suse.com>, Julien Grall <julien@xen.org>, Stefano
 Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Daniel De Graaf
	<dgdegra@tycho.nsa.gov>
Subject: Re: [RFC PATCH 1/1] xsm: allows system domains to allocate evtchn
Message-ID: <YkK1dSS6RZ9hzyh6@Air-de-Roger>
References: <20220328203622.30961-1-dpsmith@apertussolutions.com>
 <20220328203622.30961-2-dpsmith@apertussolutions.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <20220328203622.30961-2-dpsmith@apertussolutions.com>
X-ClientProxiedBy: MR1P264CA0008.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:501:2e::13) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 14a9391e-9c7c-4965-9647-08da1155f0c2
X-MS-TrafficTypeDiagnostic: BN6PR03MB3092:EE_
X-Microsoft-Antispam-PRVS: <BN6PR03MB3092E15DD77F0F9979B488458F1E9@BN6PR03MB3092.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(8676002)(6486002)(86362001)(54906003)(316002)(4326008)(38100700002)(66556008)(508600001)(85182001)(82960400001)(6916009)(66476007)(5660300002)(6666004)(33716001)(8936002)(6506007)(2906002)(66946007)(186003)(26005)(6512007)(9686003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?VFJ0OTFYajBBd0RRWUJtdGI4SVQ0UkY1dXNKd3N1S3pUSXFjcXNwYTcyTW9N?=
 =?utf-8?B?QzVMUTIzbWNoc3JlSk9OWHhpSFlzSW5JNmVsRm8zU00yUSsxUXN3ejd4cTNY?=
 =?utf-8?B?SUVKdkV4MWdYdkozdEpZdFJMV0RMUkFEemozUUN0VnJLR0lqcng1OTRFSUNl?=
 =?utf-8?B?bWVDMDVGeDN4anVoS0hzcXc0SGdlQjdnK0RhWUVIcHhMUXlBMUFXL1hMeVJF?=
 =?utf-8?B?Rk1wVjhlTktRRVZtdENyRnl3WDkyOGVhdEhmZS9qMXo5QW9wSTQwQzhHQlhG?=
 =?utf-8?B?cmNmVyt3MVlGTExkRHVQNkRDNXF4K2h1MVc5L244OEJ4V20vM3BFRjN6bCtX?=
 =?utf-8?B?dld4b0NtQnpwemdCUnhwV0plcGJHS21vVzdLT2tuU0NYUWE2MzFUOTlyMjZs?=
 =?utf-8?B?S1dKQXdGMzI4S1c3NzV5ZWNDZmpLcDZyenFwT3JPNkoyZnhIWlEybTlYRjJh?=
 =?utf-8?B?NW02S3g3cmxKOFZrc1QxOGFXcGpTYStXWGNsanVub3YrZ3dHZHEyanZPRUIy?=
 =?utf-8?B?VFl3V0wySGZ1NVNKSnA1cThDM3ZhNnVqdjhnS3N6aHVIOWpZTHdHNDJDZ0t2?=
 =?utf-8?B?eGxlVEkrRzluYTlHRGdzZHFpMTdkRU9nSkNCMzNzNWFkOWhPUm9hbmlUSFBX?=
 =?utf-8?B?RHp6aWlVOExHZ2pqQlpPbzlxR2U4cEZvQmtBTXU1azhHUWRsbDhwWWY2VXJB?=
 =?utf-8?B?ZkhTTy94N0NLTEN3UXZBMXplaFhSTkdiYjg0NmZ6clF3ejl5R1hhWjdTTCtw?=
 =?utf-8?B?a3EwOHYzZ2ZMZlQ2eExWSXdmcHROZ2hLU2dtSDNqL1RzOE1tbXExcXUzN0Jl?=
 =?utf-8?B?MjBodHRrYm5ycURySXczT2M1L1c0bU5tcXZhd1RUZDllQ3pFR0grSkNlaHBJ?=
 =?utf-8?B?V2lUc2I5emV6a2l6ajZuSlRLTmkrbXFqUG53bkQ4U2VWREN4ZSt5WTB0SjhB?=
 =?utf-8?B?Qzd4VEpyOWlNUTlxQmtRTzJuLzI3UTJwclZCcXcyZEZHZXZ3TTQvQWl2Y1dz?=
 =?utf-8?B?SGJsalhKTHc3WFh6SjBRVitrRlRDcHZSdkpOcDF0K3VOaDREMHJjdmp2SUNQ?=
 =?utf-8?B?L1pnU1BURHgvTmlidHgvZE9qQUN1N1h6cVowL25zNCtGclE3V1dJMjk2d2w4?=
 =?utf-8?B?NWVQaTBwNGM2T2QvV3ZUN1FwMnJNQkJZVUN1RWJEcHg4d2VQMXhtZlBrV1lo?=
 =?utf-8?B?UjdIK0c1eWpwU3FCU2U0WmdRbnZSdTM3WVlGREo3SHgvYTU4ZE51Y0tWOTNl?=
 =?utf-8?B?U3luVzFSRzlwV0VsTzBOMEliUmw0K1pKL1dwTGFiRnV5QUZxYnRBdmpZMDRq?=
 =?utf-8?B?QU9SSGgrWjJVeU53SmJaU045eFpOMVRBU1dKbVE4NE9kRWx0TzVaQlZubXVz?=
 =?utf-8?B?bmNlbnhyaWJZOW5WZUZoUVRNaGRVajBvN3Z3K2xKRzdSK3cvU3JXbzR0YVpM?=
 =?utf-8?B?SVgwMFJWblg3bG1FYnhzdzV0emZzSjQ1T0NlNVFYQUlydU9NWU0xeEVhSFI4?=
 =?utf-8?B?MFlsQzB1U292MVdRS0g2MkQ5TmRZQ0padDB2SFlVbHpYYjJoNXg3Smw4OTBL?=
 =?utf-8?B?L1ZoeklLbjZjTjVZcko2RjljK2FwTStwM3UwbjZxd1ZSQk14ZWRsWHJJd3lU?=
 =?utf-8?B?OENOd2JiWDRxQ1Zrd2xFMFdjTnl1SGcrNEFEcDhZenVmUDZjcVBBNWlNWG1z?=
 =?utf-8?B?M1ZaRzA0ZXFIb2tqMUxZYXU5cGMyMCtCUkU3cGgvVDZySWd1Wkp4MGxTaW5s?=
 =?utf-8?B?cHhDZGtmaUY2WHBlRHNYUkVlakFRUXBCMk4rWUh2bHpuMlhTVkdLN1BWZDlj?=
 =?utf-8?B?SFdaUDZXcERwUzFmL1pTcmdqVkIweXRqaGFXR3A5N0lDWG9YUTJKWTRvRkVy?=
 =?utf-8?B?M3JpS0JWVGY1RlZ6ZzFWNGhYY0FMU0JEeGh5OG8yVUtnL2tERTF4ZzBsMmY3?=
 =?utf-8?B?Ly9wQklJc1UrQkJUYS9SalVCVTQralRVVi9LMFQvZEJVdmYxU3orV1NIZER6?=
 =?utf-8?B?bDhNUHBmNXcyWXhzeHlnYlhZZWRKcFZrMjlMMUlpUEREOUdwOWVyZWdMa245?=
 =?utf-8?B?Q2txNENuMXJFZ1BsU1VpaUFnN1BMTU5xQzUyQkYxSkkrOUdqejF6b3RnUk15?=
 =?utf-8?B?cmxDTzNsRkJBeFJQaGRtV1ZoMEE3anJsOTN6Yk9EZVdQMEZVVkJJODJDRWls?=
 =?utf-8?B?UlFYei9MZlpmazdqMUxZRjZRUXFPT21WUjNVTUdadU82cWplN05QaEVyWEUr?=
 =?utf-8?B?NWxqYUFuTVlpRVROS3g3Q2xiVjY4MnF6azhDSEtFM1RGVW5CaytDUG96MTRm?=
 =?utf-8?B?ZzVvUWdTaTZSaWtCVE5CSVEzZFgvSlduWG5idW01VXhZQlhlOXNoQT09?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 14a9391e-9c7c-4965-9647-08da1155f0c2
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 29 Mar 2022 07:30:03.8335
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: BquwW4oQG67l53Zb9HktRG40IEBqV5VM/svNab0ILhlCtPOHuvR6EQRo1R3fRQpcW7c1ZmHMPNruzqxDL195Kw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR03MB3092
X-OriginatorOrg: citrix.com

On Mon, Mar 28, 2022 at 04:36:22PM -0400, Daniel P. Smith wrote:
> During domain construction under dom0less and hyperlaunch it is necessary to
> allocate at least the event channel for xenstore and potentially the event
> channel for the core console. When dom0less and hyperlaunch are doing their
> construction logic they are executing under the idle domain context. The idle
> domain is not a privileged domain, it is not the target domain, and as a result
> under the current default XSM policy is not allowed to allocate the event
> channel.

I've not been following the discussion around this patch, but I would
assume such privileges are only required for init code when no other
domains are running?

Since it's only at that point where the idle domain context needs to
allocate event channels would it make sense to temporary elevate it's
privileges by setting d->is_privileged while doing the domain creation?

That way we wouldn't need to grant those permissions for the lifetime
of the host when they are only needed for initialization code.

Another option would be switching to the initial vCPU of the domain
being created, but that's likely to be more complex, or even create a
short lived system domain with is_privileged set just for the purpose
of building other domains.

Overall I'm not sure it's worth giving those extra privileges to the
idle domain when they are just need for a known and bounded period of
time.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 07:58:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 07:58:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295699.503312 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ6kW-0003og-83; Tue, 29 Mar 2022 07:58:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295699.503312; Tue, 29 Mar 2022 07:58:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ6kW-0003oZ-4D; Tue, 29 Mar 2022 07:58:44 +0000
Received: by outflank-mailman (input) for mailman id 295699;
 Tue, 29 Mar 2022 07:58:42 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ6kU-0003oK-6t; Tue, 29 Mar 2022 07:58:42 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ6kU-0001zx-1t; Tue, 29 Mar 2022 07:58:42 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ6kT-00082c-Nq; Tue, 29 Mar 2022 07:58:41 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ6kT-0001vD-NL; Tue, 29 Mar 2022 07:58:41 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=oMbcBhs/FXGWTd4AsWTq6yzg/Isl17cA1dIRd3IjvpY=; b=eCbX8R9ItiJzoByGl+OFvw3S67
	gZrjaHGBOt3bhDZrqKh9HitCZ+kD+E8w/uciWpOX8CiAc1GObrfKfVrkzM2EwzRoyV2BnwnxWSzIk
	rojEvNSQPH80e6MEbDWw4Ww094MTx1frMv4Xe7x/qUdXIevT0CJFrmcWICHAp8nL+a/I=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168953-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-5.4 test] 168953: trouble: blocked/broken/pass
X-Osstest-Failures:
    linux-5.4:build-amd64:<job status>:broken:regression
    linux-5.4:build-amd64-pvops:<job status>:broken:regression
    linux-5.4:build-amd64-xsm:<job status>:broken:regression
    linux-5.4:build-arm64:<job status>:broken:regression
    linux-5.4:build-arm64-pvops:<job status>:broken:regression
    linux-5.4:build-arm64-xsm:<job status>:broken:regression
    linux-5.4:build-armhf-pvops:<job status>:broken:regression
    linux-5.4:build-i386:<job status>:broken:regression
    linux-5.4:build-i386-pvops:<job status>:broken:regression
    linux-5.4:build-i386-xsm:<job status>:broken:regression
    linux-5.4:build-amd64-pvops:host-install(4):broken:regression
    linux-5.4:build-i386-xsm:host-install(4):broken:regression
    linux-5.4:build-i386:host-install(4):broken:regression
    linux-5.4:build-i386-pvops:host-install(4):broken:regression
    linux-5.4:build-arm64-xsm:host-install(4):broken:regression
    linux-5.4:build-arm64:host-install(4):broken:regression
    linux-5.4:build-arm64-pvops:host-install(4):broken:regression
    linux-5.4:build-amd64-xsm:host-install(4):broken:regression
    linux-5.4:build-amd64:host-install(4):broken:regression
    linux-5.4:build-armhf-pvops:host-install(4):broken:regression
    linux-5.4:test-amd64-i386-qemuu-rhel6hvm-intel:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-pvshim:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-shadow:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-vhd:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-examine:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    linux-5.4:test-arm64-arm64-xl-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-armhf-armhf-examine:build-check(1):blocked:nonblocking
    linux-5.4:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-examine:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-coresched-i386-xl:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-coresched-amd64-xl:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-shadow:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-rtds:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    linux-5.4:build-amd64-libvirt:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    linux-5.4:build-arm64-libvirt:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    linux-5.4:build-i386-libvirt:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-qcow2:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-dom0pvh-xl-amd:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-pvshim:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-dom0pvh-xl-intel:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-pvhv2-intel:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-examine:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-examine-bios:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-examine-uefi:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-pvhv2-amd:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-multivcpu:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-credit2:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-pair:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl-credit1:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-pygrub:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-qemuu-freebsd11-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-xl:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-qemuu-freebsd12-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-qemuu-nested-amd:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-amd64-qemuu-nested-intel:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-examine-bios:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-examine-uefi:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-freebsd10-amd64:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-freebsd10-i386:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-pair:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-qemut-rhel6hvm-amd:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-qemut-rhel6hvm-intel:build-check(1):blocked:nonblocking
    linux-5.4:test-amd64-i386-qemuu-rhel6hvm-amd:build-check(1):blocked:nonblocking
    linux-5.4:test-armhf-armhf-xl:build-check(1):blocked:nonblocking
    linux-5.4:test-armhf-armhf-xl-arndale:build-check(1):blocked:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit1:build-check(1):blocked:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit2:build-check(1):blocked:nonblocking
    linux-5.4:test-armhf-armhf-xl-cubietruck:build-check(1):blocked:nonblocking
    linux-5.4:test-armhf-armhf-xl-multivcpu:build-check(1):blocked:nonblocking
    linux-5.4:test-armhf-armhf-xl-rtds:build-check(1):blocked:nonblocking
    linux-5.4:test-armhf-armhf-xl-vhd:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    linux=2845ff3fd34499603249676495c524a35e795b45
X-Osstest-Versions-That:
    linux=055c4cf7e6da13450016942e5286492b4a224868
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 29 Mar 2022 07:58:41 +0000

flight 168953 linux-5.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168953/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-arm64                     <job status>                 broken
 build-arm64-pvops               <job status>                 broken
 build-arm64-xsm                 <job status>                 broken
 build-armhf-pvops               <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 168810
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168810
 build-i386                    4 host-install(4)        broken REGR. vs. 168810
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168810
 build-arm64-xsm               4 host-install(4)        broken REGR. vs. 168810
 build-arm64                   4 host-install(4)        broken REGR. vs. 168810
 build-arm64-pvops             4 host-install(4)        broken REGR. vs. 168810
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 168810
 build-amd64                   4 host-install(4)        broken REGR. vs. 168810
 build-armhf-pvops             4 host-install(4)        broken REGR. vs. 168810

Tests which did not succeed, but are not blocking:
 test-amd64-i386-qemuu-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-xl            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-pvshim     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemut-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemut-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemut-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1)  blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-shadow     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-vhd        1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-xsm        1 build-check(1)               blocked  n/a
 test-arm64-arm64-examine      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl           1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 test-armhf-armhf-examine      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-amd64-i386-examine       1 build-check(1)               blocked  n/a
 test-amd64-coresched-i386-xl  1 build-check(1)               blocked  n/a
 test-amd64-coresched-amd64-xl  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-xsm       1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-shadow    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-rtds      1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ws16-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1) blocked n/a
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qemut-ws16-amd64  1 build-check(1)             blocked n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-xl-qemut-debianhvm-amd64  1 build-check(1)        blocked n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qcow2     1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvshim    1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-examine      1 build-check(1)               blocked  n/a
 test-amd64-amd64-examine-bios  1 build-check(1)               blocked  n/a
 test-amd64-amd64-examine-uefi  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit2   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pair         1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit1   1 build-check(1)               blocked  n/a
 test-amd64-amd64-pygrub       1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-freebsd11-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-xl           1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-freebsd12-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-qemuu-nested-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-intel  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-examine-bios  1 build-check(1)               blocked  n/a
 test-amd64-i386-examine-uefi  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-amd64  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-i386  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-amd64-i386-pair          1 build-check(1)               blocked  n/a
 test-amd64-i386-qemut-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemut-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-qemuu-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-arndale   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit1   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-cubietruck  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-rtds      1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-vhd       1 build-check(1)               blocked  n/a

version targeted for testing:
 linux                2845ff3fd34499603249676495c524a35e795b45
baseline version:
 linux                055c4cf7e6da13450016942e5286492b4a224868

Last test of basis   168810  2022-03-23 20:10:03 Z    5 days
Testing same since   168925  2022-03-28 07:12:09 Z    1 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Arnd Bergmann <arnd@arndb.de>
  Chuansheng Liu <chuansheng.liu@intel.com>
  David S. Miller <davem@davemloft.net>
  Denis Efremov <denis.e.efremov@oracle.com>
  Eric Dumazet <edumazet@google.com>
  Florian Fainelli <f.fainelli@gmail.com>
  Giacomo Guiduzzi <guiduzzi.giacomo@gmail.com>
  Giovanni Cabiddu <giovanni.cabiddu@intel.com>
  Greg Kroah-Hartman <gregkh@linuxfoundation.org>
  Guenter Roeck <linux@roeck-us.net>
  Herbert Xu <herbert@gondor.apana.org.au>
  huangwenhui <huangwenhuia@uniontech.com>
  Hulk Robot <hulkrobot@huawei.com>
  J. Bruce Fields <bfields@redhat.com>
  Jakub Kicinski <kuba@kernel.org>
  James Bottomley <James.Bottomley@HansenPartnership.com>
  Jarkko Sakkinen <jarkko@kernel.org>
  Jarkko Sakkinen<jarkko@kernel.org>
  Jason Zheng <jasonzheng2004@gmail.com>
  Johannes Berg <johannes.berg@intel.com>
  Jonathan Teh <jonathan.teh@outlook.com>
  Jordy Zomer <jordy@pwning.systems>
  Lars-Peter Clausen <lars@metafoo.de>
  Linus Lüssing <ll@simonwunderlich.de>
  Linux Kernel Functional Testing <lkft@linaro.org>
  Mark Brown <broonie@kernel.org>
  Mark Cilissen <mark@yotsuba.nl>
  Mathias Kretschmer <mathias.kretschmer@fit.fraunhofer.de>
  Maximilian Luz <luzmaximilian@gmail.com>
  Oliver Graute <oliver.graute@kococonnector.com>
  Pablo Neira Ayuso <pablo@netfilter.org>
  Paolo Valente <paolo.valente@linaro.org>
  Paul E. McKenney <paulmck@kernel.org>
  Rafael J. Wysocki <rafael.j.wysocki@intel.com>
  Shuah Khan <skhan@linuxfoundation.org>
  Steffen Klassert <steffen.klassert@secunet.com>
  Stephane Graber <stgraber@ubuntu.com>
  Sudip Mukherjee <sudip.mukherjee@codethink.co.uk>
  Sudip Mukherjee <sudipm.mukherjee@gmail.com>
  Tadeusz Struk <tadeusz.struk@linaro.org>
  Tadeusz Struk <tstruk@gmail.com>
  Takashi Iwai <tiwai@suse.de>
  Tim Murray <timmurray@google.com>
  Trond Myklebust <trond.myklebust@hammerspace.com>
  Trond Myklebust <trondmy@gmail.com>
  Vaibhav Rustagi <vaibhavrustagi@google.com>
  Werner Sembach <wse@tuxedocomputers.com>
  Willem de Bruijn <willemb@google.com>

jobs:
 build-amd64-xsm                                              broken  
 build-arm64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64                                                  broken  
 build-arm64                                                  broken  
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            broken  
 build-arm64-pvops                                            broken  
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-amd64-amd64-xl                                          blocked 
 test-amd64-coresched-amd64-xl                                blocked 
 test-arm64-arm64-xl                                          blocked 
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           blocked 
 test-amd64-coresched-i386-xl                                 blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        blocked 
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         blocked 
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-xl-xsm                                      blocked 
 test-arm64-arm64-xl-xsm                                      blocked 
 test-amd64-i386-xl-xsm                                       blocked 
 test-amd64-amd64-qemuu-nested-amd                            blocked 
 test-amd64-amd64-xl-pvhv2-amd                                blocked 
 test-amd64-i386-qemut-rhel6hvm-amd                           blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-dom0pvh-xl-amd                              blocked 
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemut-debianhvm-amd64                     blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     blocked 
 test-amd64-i386-freebsd10-amd64                              blocked 
 test-amd64-amd64-qemuu-freebsd11-amd64                       blocked 
 test-amd64-amd64-qemuu-freebsd12-amd64                       blocked 
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         blocked 
 test-amd64-i386-xl-qemut-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         blocked 
 test-amd64-i386-xl-qemuu-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemut-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemut-ws16-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ws16-amd64                          blocked 
 test-armhf-armhf-xl-arndale                                  blocked 
 test-amd64-amd64-examine-bios                                blocked 
 test-amd64-i386-examine-bios                                 blocked 
 test-amd64-amd64-xl-credit1                                  blocked 
 test-arm64-arm64-xl-credit1                                  blocked 
 test-armhf-armhf-xl-credit1                                  blocked 
 test-amd64-amd64-xl-credit2                                  blocked 
 test-arm64-arm64-xl-credit2                                  blocked 
 test-armhf-armhf-xl-credit2                                  blocked 
 test-armhf-armhf-xl-cubietruck                               blocked 
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        blocked 
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         blocked 
 test-amd64-amd64-examine                                     blocked 
 test-arm64-arm64-examine                                     blocked 
 test-armhf-armhf-examine                                     blocked 
 test-amd64-i386-examine                                      blocked 
 test-amd64-i386-freebsd10-i386                               blocked 
 test-amd64-amd64-qemuu-nested-intel                          blocked 
 test-amd64-amd64-xl-pvhv2-intel                              blocked 
 test-amd64-i386-qemut-rhel6hvm-intel                         blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-amd64-dom0pvh-xl-intel                            blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-xl-multivcpu                                blocked 
 test-armhf-armhf-xl-multivcpu                                blocked 
 test-amd64-amd64-pair                                        blocked 
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-amd64-amd64-xl-pvshim                                   blocked 
 test-amd64-i386-xl-pvshim                                    blocked 
 test-amd64-amd64-pygrub                                      blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-amd64-amd64-xl-qcow2                                    blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-xl-rtds                                     blocked 
 test-armhf-armhf-xl-rtds                                     blocked 
 test-arm64-arm64-xl-seattle                                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              blocked 
 test-amd64-amd64-xl-shadow                                   blocked 
 test-amd64-i386-xl-shadow                                    blocked 
 test-arm64-arm64-xl-thunderx                                 blocked 
 test-amd64-amd64-examine-uefi                                blocked 
 test-amd64-i386-examine-uefi                                 blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 
 test-arm64-arm64-xl-vhd                                      blocked 
 test-armhf-armhf-xl-vhd                                      blocked 
 test-amd64-i386-xl-vhd                                       blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-arm64 broken
broken-job build-arm64-pvops broken
broken-job build-arm64-xsm broken
broken-job build-armhf-pvops broken
broken-job build-i386 broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-amd64-pvops host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step build-i386 host-install(4)
broken-step build-i386-pvops host-install(4)
broken-step build-arm64-xsm host-install(4)
broken-step build-arm64 host-install(4)
broken-step build-arm64-pvops host-install(4)
broken-step build-amd64-xsm host-install(4)
broken-step build-amd64 host-install(4)
broken-step build-armhf-pvops host-install(4)

Not pushing.

(No revision log; it would be 782 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 08:27:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 08:27:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295719.503322 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ7CG-0007hf-8j; Tue, 29 Mar 2022 08:27:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295719.503322; Tue, 29 Mar 2022 08:27:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ7CG-0007hY-5Z; Tue, 29 Mar 2022 08:27:24 +0000
Received: by outflank-mailman (input) for mailman id 295719;
 Tue, 29 Mar 2022 08:16:19 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=6y8i=UI=diehard.n-r-g.com=cjeker@srs-se1.protection.inumbo.net>)
 id 1nZ71X-0006nR-Ej
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 08:16:19 +0000
Received: from diehard.n-r-g.com (diehard.n-r-g.com [62.48.3.9])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 81390385-af38-11ec-a405-831a346695d4;
 Tue, 29 Mar 2022 10:16:17 +0200 (CEST)
Received: (qmail 90300 invoked by uid 1000); 29 Mar 2022 08:16:15 -0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 81390385-af38-11ec-a405-831a346695d4
Date: Tue, 29 Mar 2022 10:16:15 +0200
From: Claudio Jeker <cjeker@diehard.n-r-g.com>
To: Demi Marie Obenour <demi@invisiblethingslab.com>
Cc: Mark Kettenis <mark.kettenis@xs4all.nl>, djm@mindrot.org,
  roger.pau@citrix.com, marmarek@invisiblethingslab.com,
  xen-devel@lists.xenproject.org, tech@openbsd.org
Subject: Re: Security support status of xnf(4) and xbf(4)
Message-ID: <YkLAT3AJk9usjIkD@diehard.n-r-g.com>
Mail-Followup-To: Demi Marie Obenour <demi@invisiblethingslab.com>,
	Mark Kettenis <mark.kettenis@xs4all.nl>, djm@mindrot.org,
	roger.pau@citrix.com, marmarek@invisiblethingslab.com,
	xen-devel@lists.xenproject.org, tech@openbsd.org
References: <Yj3qW/y20htoSvuK@itl-email>
 <37a4b6-cd56-1993-be2-b5522b9aa4d7@mindrot.org>
 <c904abda-e6a0-256e-478a-ee0909c17e50@invisiblethingslab.com>
 <d3ccc20d61dc7636@bloch.sibelius.xs4all.nl>
 <10e7b01a-2a8e-17cd-6418-1a6f836cc251@invisiblethingslab.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <10e7b01a-2a8e-17cd-6418-1a6f836cc251@invisiblethingslab.com>

On Mon, Mar 28, 2022 at 04:38:33PM -0400, Demi Marie Obenour wrote:
> On 3/28/22 10:39, Mark Kettenis wrote:
> >> Date: Mon, 28 Mar 2022 09:51:22 -0400
> >> From: Demi Marie Obenour <demi@invisiblethingslab.com>
> >>
> >> On 3/27/22 21:45, Damien Miller wrote:
> >>> On Fri, 25 Mar 2022, Demi Marie Obenour wrote:
> >>>
> >>>> Linux’s netfront and blkfront drivers recently had a security
> >>>> vulnerability (XSA-396) that allowed a malicious backend to potentially
> >>>> compromise them.  In follow-up audits, I found that OpenBSD’s xnf(4)
> >>>> currently trusts the backend domain.  I reported this privately to Theo
> >>>> de Raadt, who indicated that OpenBSD does not consider this to be a
> >>>> security concern.
> >>>>
> >>>> This is obviously a valid position for the OpenBSD project to take, but
> >>>> it is surprising to some (such as myself) from the broader Xen
> >>>> ecosystem.  Standard practice in the Xen world is that bugs in frontends
> >>>> that allow a malicious backend to cause mischief *are* considered
> >>>> security bugs unless there is explicit documentation to the contrary.
> >>>> As such, I believe this deserves to be noted in xnf(4) and xbf(4)’s man
> >>>> pages.  If the OpenBSD project agrees, I am willing to write a patch,
> >>>> but I have no experience with mandoc so it might take a few tries.
> >>>
> >>> Hang on, what is a "malicious backend" in this context? Is it something
> >>> other than the Xen Hypervisor? If not, then it seems not to be a useful
> >>> attack model, as the hypervisor typically has near-complete access to
> >>> guests' memory and CPU state.
> >>
> >> The backend can run in any Xen VM.  It often runs in dom0, but it
> >> is not required to, and in Qubes OS the network backend never runs
> >> in dom0.  Unless it runs in dom0, it has no access to frontend memory,
> >> except for memory the frontend has explicitly given it access to via
> >> grant tables.
> > 
> > So this is somewhat similar to the situation on sun4v (Sun's
> > virtualization of the SPARC architecture).  When writing the vnet(4)
> > and vdsk(4) drivers for OpenBSD, I did consider the implications of
> > those drivers talking to a "malicious" domain.  the SPARC hypervisor
> > implements a concept similar to grant tables.  It is fairly obvious
> > that any memory you grant access to should be considered insecure.
> > This means that you either have to make a copy of the data or revoke
> > access to the shared memory through some sort of Hypervisor call that
> > implements a synchronization point of some sorts.  Otherwise you and
> > up TOCTOU issues all over the place.  But this obviously has
> > significant performance consequences.  For vnet(4) I decided that an
> > extra copy was worth doing and the only reasonable way of doing things
> > given how OpenBSD's mbuf layer works.  But for vdsk(4) I decided to
> > trust the other domain as there is no way to prevent it from feeding
> > you compromised data.  Full disk encryption doesn't really solve the
> > problem unless you have a way to securely verify the bootloader.
> 
> In Qubes OS, xbf(4) devices are configurable.  While all of them are
> provided by dom0 (which is trusted) by default, it is possible to
> attach devices that are *not* provided by dom0, and these devices
> should not be trusted.
> 
> > Personally I think it might be beneficial for us to turn xnf(4) into
> > what we colloquially call a "bcopy" network driver.  But folks who
> > actually use xen may find the performance impact of doing this
> > unacceptable and decide to trust the backend instead.
> 
> You actually don’t have to do that.  The Xen network protocol
> requires the backend to drop access to the buffer before giving it
> to the frontend, so the frontend only needs to ensure that it cannot
> regain access.  This will fail if the backend still has access, but
> that is a bug in the backend, in which case you should shut down the
> interface.  So there should not be any significant performance impact.
> 
> If you are curious about how Linux does this, you can look at
> drivers/xen/grant-table.c, drivers/net/xen-netfront.c, and
> drivers/block/xen-blkfront.c from the Linux source.  They are
> dual licensed GPL/MIT so there should not be licensing issues there.
> Be sure to use a version at or after “xen/netfront: react properly to
> failing gnttab_end_foreign_access_ref()” and the other XSA-396 patches.

So how does xen manage to limit access to less than a page size?
The hardware on x86 does not give you byte precise mappings for granting
memory.
An mbuf is 256 bytes and of those 256 bytes less then that is used for
data. Still for dma the full 4k page needs to be granted to the host.
The only way this can be done is by memcpy all data into individual pages.
The same is true for the most common mbuf cluster size of 2k.
So yes, this will be a bcopy ethernet driver and by that will be on the
same level of crappyness as bce(4) and old old old realtek.

If you can trust the host don't run your vm on that host.
-- 
:wq Claudio


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 08:38:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 08:38:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295726.503338 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ7MW-0000mh-Bx; Tue, 29 Mar 2022 08:38:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295726.503338; Tue, 29 Mar 2022 08:38:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ7MW-0000mZ-69; Tue, 29 Mar 2022 08:38:00 +0000
Received: by outflank-mailman (input) for mailman id 295726;
 Tue, 29 Mar 2022 08:37:58 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=i5xw=UI=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nZ7MU-0000mT-C3
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 08:37:58 +0000
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur02on0616.outbound.protection.outlook.com
 [2a01:111:f400:fe07::616])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 86ba0de7-af3b-11ec-8fbc-03012f2f19d4;
 Tue, 29 Mar 2022 10:37:54 +0200 (CEST)
Received: from AM6PR0502CA0045.eurprd05.prod.outlook.com
 (2603:10a6:20b:56::22) by PA4PR08MB6319.eurprd08.prod.outlook.com
 (2603:10a6:102:e8::5) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17; Tue, 29 Mar
 2022 08:37:52 +0000
Received: from AM5EUR03FT013.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:56:cafe::8f) by AM6PR0502CA0045.outlook.office365.com
 (2603:10a6:20b:56::22) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.23 via Frontend
 Transport; Tue, 29 Mar 2022 08:37:52 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT013.mail.protection.outlook.com (10.152.16.140) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Tue, 29 Mar 2022 08:37:51 +0000
Received: ("Tessian outbound 31aeb3346a45:v113");
 Tue, 29 Mar 2022 08:37:51 +0000
Received: from 14a08360126b.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 4702F844-F5A6-4B12-9806-981F26428B2B.1; 
 Tue, 29 Mar 2022 08:37:41 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 14a08360126b.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Tue, 29 Mar 2022 08:37:41 +0000
Received: from DU2PR08MB7325.eurprd08.prod.outlook.com (2603:10a6:10:2e4::7)
 by AM6PR08MB3768.eurprd08.prod.outlook.com (2603:10a6:20b:90::29) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.18; Tue, 29 Mar
 2022 08:37:37 +0000
Received: from DU2PR08MB7325.eurprd08.prod.outlook.com
 ([fe80::28c0:3e8d:dd75:80be]) by DU2PR08MB7325.eurprd08.prod.outlook.com
 ([fe80::28c0:3e8d:dd75:80be%8]) with mapi id 15.20.5102.023; Tue, 29 Mar 2022
 08:37:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 86ba0de7-af3b-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=HRg7G216nHS6yetNGd8SLLL7jD/ZBrXmMDH8Qr0ul/o=;
 b=HD3eb2CvZE6kVaw/8pssyJuMoBzC9Ndu+ocvMwTV9RyxYWCm/EHODnPb5pHjmuG0Qo4dVaJKaJJ1WlhunUDc/forz+4kie9S4WmpOiXZGX75yUDtVQs8vaL4vAtXcsFn2EpYowXx0jJP+2Rt2xvafkZ588tQFeHTKiMkYTX/5T8=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=E3CzPUYxW4uG+w0ZpBM0R91AZ1Jw52qKQjXsVv0gwYFGRglSnLlPvOOk4l+sq1i+r+6lrMvkLl8pxJLx55YyWLEvZPWWdWT9vaIGkxJ798Cp7fWx0NqKc5PNQi8jA2znJ4I4rRS4/pD+qD1+133A5WZun/fSBQzvhjQsefKrPP6KBiHwKz8+Gscc6XiQuXv64iVkghyPwP5cXFO0S4Ayw3VG7cdGS+67/7Go1lbidKfQHgvcfx+PJMl/esnEXJvmpL4+/m+AaWz4M4Sd16EUbZoEfyxYT3HwSl3JtYw3ZRZMEHJQqsQMmKHEbcmU977pb3PSSkopK0i/uOCdKv200g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=HRg7G216nHS6yetNGd8SLLL7jD/ZBrXmMDH8Qr0ul/o=;
 b=XItTbGSv3fKD4ti1rbUAumvR+WE9Z5cUgL6ldzWcd6qPZxgMxDO17HjpTKmzPugLwTkjHV1pzrgQSh9WjQJ7zGTYPhsIsc8i9aW8uJ7n7Adnvn2jb7Ymad8oGCNB99dEp3G2y8b2N4gOTeXkpjmi7YtbDWS6IpSxGZNo7A/n6B0Ud/vp2oevUtwrroME+gW3wQRjELNlfOE9le+G1ud/r7DPrgdSkRXETd7FoS+2er7fQDHdBApWr1vZyHh1yRTPQi1kg3hXq5/5/2yPU1flF//aBYOu2dzpPc3sRHCOHIrmpixLGjVNg4WZ2nhtoS+FpP+kjJXyG+OHKmQqawmFqg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=HRg7G216nHS6yetNGd8SLLL7jD/ZBrXmMDH8Qr0ul/o=;
 b=HD3eb2CvZE6kVaw/8pssyJuMoBzC9Ndu+ocvMwTV9RyxYWCm/EHODnPb5pHjmuG0Qo4dVaJKaJJ1WlhunUDc/forz+4kie9S4WmpOiXZGX75yUDtVQs8vaL4vAtXcsFn2EpYowXx0jJP+2Rt2xvafkZ588tQFeHTKiMkYTX/5T8=
From: Penny Zheng <Penny.Zheng@arm.com>
To: Stefano Stabellini <sstabellini@kernel.org>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, nd
	<nd@arm.com>, Julien Grall <julien@xen.org>, Bertrand Marquis
	<Bertrand.Marquis@arm.com>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>
Subject: RE: [PATCH v1 11/13] xen/arm: store shm-info for deferred foreign
 memory map
Thread-Topic: [PATCH v1 11/13] xen/arm: store shm-info for deferred foreign
 memory map
Thread-Index: AQHYNQ8NTSqyRn0yQkWZiq3cl6V7sqzEbfcAgBGfRIA=
Date: Tue, 29 Mar 2022 08:37:36 +0000
Message-ID:
 <DU2PR08MB732592AD40BAA48F390445AAF71E9@DU2PR08MB7325.eurprd08.prod.outlook.com>
References: <20220311061123.1883189-1-Penny.Zheng@arm.com>
 <20220311061123.1883189-12-Penny.Zheng@arm.com>
 <alpine.DEB.2.22.394.2203171831410.3497@ubuntu-linux-20-04-desktop>
In-Reply-To:
 <alpine.DEB.2.22.394.2203171831410.3497@ubuntu-linux-20-04-desktop>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 8C1B473F77499D429BF61F143BA13B6E.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: a3b9c2b6-f73e-42c7-3adb-08da115f69bb
x-ms-traffictypediagnostic:
	AM6PR08MB3768:EE_|AM5EUR03FT013:EE_|PA4PR08MB6319:EE_
X-Microsoft-Antispam-PRVS:
	<PA4PR08MB63197063B30181776E3298F7F71E9@PA4PR08MB6319.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR08MB7325.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(64756008)(8676002)(76116006)(66556008)(4326008)(71200400001)(66946007)(122000001)(86362001)(52536014)(55016003)(9686003)(8936002)(5660300002)(38100700002)(508600001)(2906002)(38070700005)(26005)(33656002)(54906003)(6916009)(186003)(53546011)(7696005)(83380400001)(316002)(66476007)(66446008)(6506007);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB3768
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT013.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	3faf15a3-38ff-4a4b-fd01-08da115f609f
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(55016003)(107886003)(82310400004)(54906003)(336012)(70586007)(8676002)(316002)(186003)(81166007)(508600001)(356005)(4326008)(70206006)(2906002)(33656002)(7696005)(36860700001)(6862004)(5660300002)(47076005)(53546011)(6506007)(83380400001)(9686003)(52536014)(8936002)(26005)(40460700003)(86362001);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 29 Mar 2022 08:37:51.8926
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: a3b9c2b6-f73e-42c7-3adb-08da115f69bb
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT013.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR08MB6319

Hi Stefano

> -----Original Message-----
> From: Stefano Stabellini <sstabellini@kernel.org>
> Sent: Friday, March 18, 2022 10:01 AM
> To: Penny Zheng <Penny.Zheng@arm.com>
> Cc: xen-devel@lists.xenproject.org; nd <nd@arm.com>; Stefano Stabellini
> <sstabellini@kernel.org>; Julien Grall <julien@xen.org>; Bertrand Marquis
> <Bertrand.Marquis@arm.com>; Volodymyr Babchuk
> <Volodymyr_Babchuk@epam.com>
> Subject: Re: [PATCH v1 11/13] xen/arm: store shm-info for deferred foreig=
n
> memory map
>=20
> On Fri, 11 Mar 2022, Penny Zheng wrote:
> > From: Penny Zheng <penny.zheng@arm.com>
> >
> > In a few scenarios where owner domain, is defined after borrower
> > domain in device tree configuration, then statically shared pages
> > haven't been properly allocated if borrower domain tries to do foreign
> > memory map during domain construction.
> >
> > In order to cover such scenario, we defer all borrower domains'
> > foreign memory map after all domain construction finished, then only
> > need to store shm-info during domain construction.
> >
> > Signed-off-by: Penny Zheng <penny.zheng@arm.com>
> > ---
> >  xen/arch/arm/domain.c             |  3 +++
> >  xen/arch/arm/domain_build.c       | 34 ++++++++++++++++++++++++++++++-
> >  xen/arch/arm/include/asm/domain.h | 25 +++++++++++++++++++++++
> >  3 files changed, 61 insertions(+), 1 deletion(-)
> >
> > diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c index
> > f0bfd67fe5..73ffbfb918 100644
> > --- a/xen/arch/arm/domain.c
> > +++ b/xen/arch/arm/domain.c
> > @@ -47,6 +47,9 @@ DEFINE_PER_CPU(struct vcpu *, curr_vcpu);
> >
> >  #ifdef CONFIG_STATIC_SHM
> >  struct domain *__read_mostly dom_shared;
> > +
> > +shm_info_t shm_list[NR_MEM_BANKS];
>=20
> Instead of adding shm_list, maybe we can we re-use mem->bank
> (bootinfo.reserved_mem)?
>=20
> It is already storing the physical address and size (added in patch #1 wi=
th
> process_shm_node). We should be able to find the other info from the mfn:
> mfn_to_page, page_get_owner, mfn_to_gfn. At most, we need to mark the
> memory bank as shared and we could do that with another field in struct
> membank.
>=20
>=20
> > +DECLARE_BITMAP(shm_list_mask, NR_MEM_BANKS);
>=20
> This is the third bitmask we introduce :-)
>=20
> Can we narrow it down to a single bitmask? Maybe we don't need it at all =
if we
> switch to using bootinfo.mem.bank.
>=20
>=20
> >  #endif
> >
> >  static void do_idle(void)
> > diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
> > index 7ee4d33e0b..4b19160674 100644
> > --- a/xen/arch/arm/domain_build.c
> > +++ b/xen/arch/arm/domain_build.c
> > @@ -771,7 +771,7 @@ static mfn_t __init
> > acquire_shared_memory_bank(struct domain *d,
> >
> >  }
> >
> > -static int __init allocate_shared_memory(struct domain *d,
> > +static int __init allocate_shared_memory(struct domain *d, u32
> > +shm_id,
>=20
> No need for it to be u32?
>=20
>=20
> >                                           u32 addr_cells, u32 size_cell=
s,
> >                                           paddr_t pbase, paddr_t psize,
> >                                           paddr_t gbase) @@ -795,6
> > +795,18 @@ static int __init allocate_shared_memory(struct domain *d,
> >          return ret;
> >      }
> >
> > +    /*
> > +     * If owner domain is not default dom_shared, shm-info of owner do=
main
> > +     * shall also be recorded for later deferred foreign memory map.
> > +     */
> > +    if ( d !=3D dom_shared )
> > +    {
> > +        shm_list[shm_id].owner_dom =3D d->domain_id;
> > +        shm_list[shm_id].owner_gbase =3D gbase;
> > +        shm_list[shm_id].size =3D psize;
> > +        set_bit(shm_id, shm_list_mask);
> > +    }
> >      return ret;
> >  }
> >
> > @@ -962,6 +974,26 @@ static int __init process_shm(struct domain *d,
> >              if ( ret )
> >                  return ret;
> >          }
> > +        else
> > +        {
> > +            if ( strcmp(role_str, "borrower") =3D=3D 0 )
> > +            {
> > +                /*
> > +                 * In a few scenarios where owner domain, is defined a=
fter
> > +                 * borrower domain in device tree configuration, stati=
cally
> > +                 * shared pages haven't been properly allocated if bor=
rower
> > +                 * domain here tries to do foreign memory map.
> > +                 * In order to cover such scenario, we defer all borro=
wer
> > +                 * domains'foreign memory map after all domain constru=
ction
> > +                 * finished, and only store shm-info here for later us=
e.
> > +                 */
> > +                shm_list[shm_id].borrower_dom[shm_list[shm_id].nr_borr=
ower] =3D
> > +                                                                d->dom=
ain_id;
> > +                shm_list[shm_id].borrower_gbase[shm_list[shm_id].nr_bo=
rrower] =3D
> > +                                                                gbase;
> > +                shm_list[shm_id].nr_borrower++;
> > +            }
> > +        }
>=20
> Maybe we don't need to defer this at all. guest_physmap_add_shm does only
> two things:
>=20
> 1) get a page ref using the owner domain
> 2) add page to borrower p2m
>=20
>=20
> We can do 2) straight away even if the owner is not yet allocated.
>=20
> For 1), we need to get the right amount of references when the owner is
> allocated (which could be after the borrowers).
>=20
> Keeping in mind that we have already parsed all the info in
> xen/arch/arm/bootfdt.c:process_shm_node, I wonder if we can add a field t=
o
> mem->bank[mem->nr_banks] to keep a count of the number of borrowers.
>=20
> Then when we allocate the page to the owner here, we just get as many
> additional reference as the number of borrowers.
>=20
> This would:
> - add a field to bootinfo.reserved_mem
> - remove the need for shm_list
> - remove the need for shm_list_mask
> - remove the need for the deferral
>=20
> Just trying to make things simpler :-)
>=20

Thanks for the detailed comments.
Here is what I thought and understood, PLZ correct me if I'm wrong. ;)
'''
> For 1), we need to get the right amount of references when the owner is
> allocated (which could be after the borrowers).
'''
We could add another field `nr_shm_borrowers` in struct membank to
keep a count of the number of borrowers, which is also the number of
the reference count.=20
And like you said, it shall be done in xen/arch/arm/bootfdt.c:process_shm_n=
ode.
The only shortcoming here is that we need to iterate the parsed shm
mem banks each time to do the increment, since we used shm_mask
at first to treat space with time, but it really could decrease the
complexity here and remove all the defer codes.

But here is another concern about the shm_list. Another reason why I
created shm_list is that when destroyed domain is an owner domain,=20
we need to unmap shared memory for all borrower domains too. IMO,
so that it fits the definition of owner and borrower. It is also
what commit "xen/arm: unmap foreign memory mapping when
destroyed domain is owner domain" is trying to solve.

we need a way to find all borrower domains info, when you
only know the owner domain.
Based on your suggestion, I suggest to add new field
` domid_t *shm_borrower_dom` and `paddr_t *shm_borrower_gbase`
in struct membank. And both two fields are going to be allocated and set
during domain construction phase xen/arch/arm/domain_build.c:process_shm.

Another thing is that maybe we could not store all above shared mem
banks in bootinfo.reserved_mem, since it is only valid during boot time,
and we need that info also for domain deconstruction at runtime.
Another struct meminfo shm_list may still also be needed.

BTW, I suggest that the index of shm_list.bank is shm_id
In case user abuse it in device tree configuration, we let xen to allocate.
In xen/arch/arm/bootfdt.c:process_shm_node, each time parsing a new
shm node, iterate the whole shm_list and only if the physical
address and size of all entries are not matched, we allocate a new bank for=
 the
shm node. =20
=20
>=20
> >          /*
> >           * Record static shared memory region info for later setting
> > diff --git a/xen/arch/arm/include/asm/domain.h
> > b/xen/arch/arm/include/asm/domain.h
> > index 6df37d2c46..1c0f2e22ca 100644
> > --- a/xen/arch/arm/include/asm/domain.h
> > +++ b/xen/arch/arm/include/asm/domain.h
> > @@ -10,6 +10,7 @@
> >  #include <asm/gic.h>
> >  #include <asm/vgic.h>
> >  #include <asm/vpl011.h>
> > +#include <asm/setup.h>
> >  #include <public/hvm/params.h>
> >
> >  struct hvm_domain
> > @@ -33,6 +34,30 @@ enum domain_type {
> >
> >  #ifdef CONFIG_STATIC_SHM
> >  extern struct domain *dom_shared;
> > +
> > +/* Maximum number of borrower domains. */ #define NR_SHM_DOMAIN
> 32
> > +/*
> > + * shm_list is indexed by unique identifier "xen,shm-id", but it only
> > +stores
> > + * a subset of static shared memory regions, of which owner domain is
> > +not the
> > + * default dom_shared.
> > + * shm_list_mask bitmask is to record the position of these static
> > +shared
> > + * memory regions.
> > + * Per bit represents a entry in shm_list, and setting it 1 means the
> > + * static shared memory region here is owned by a specific domain,
> > +then bit 0
> > + * means the static shared memory region here is either owned by the
> > +default
> > + * dom_shared or no static shared memory region here at all.
> > + */
> > +typedef struct {
> > +    domid_t owner_dom;
> > +    paddr_t owner_gbase;
> > +    paddr_t size;
> > +    domid_t borrower_dom[NR_SHM_DOMAIN];
> > +    paddr_t borrower_gbase[NR_SHM_DOMAIN];
> > +    unsigned long nr_borrower;
> > +} shm_info_t;
> > +extern shm_info_t shm_list[NR_MEM_BANKS]; extern unsigned long
> > +shm_list_mask[BITS_TO_LONGS(NR_MEM_BANKS)];
> >  #else
> >  #define dom_shared NULL
> >  #endif
> > --
> > 2.25.1
> >


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 09:06:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 09:06:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295734.503351 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ7oF-00044X-Pm; Tue, 29 Mar 2022 09:06:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295734.503351; Tue, 29 Mar 2022 09:06:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ7oF-00044Q-MP; Tue, 29 Mar 2022 09:06:39 +0000
Received: by outflank-mailman (input) for mailman id 295734;
 Tue, 29 Mar 2022 09:06:39 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=kdRh=UI=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZ7oF-00044K-3H
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 09:06:39 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 8a246f57-af3f-11ec-a405-831a346695d4;
 Tue, 29 Mar 2022 11:06:38 +0200 (CEST)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04lp2059.outbound.protection.outlook.com [104.47.12.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-4-sthdSA3LOe-kC67W6xfuxA-1; Tue, 29 Mar 2022 11:06:34 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM0PR04MB4148.eurprd04.prod.outlook.com (2603:10a6:208:5f::30)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.23; Tue, 29 Mar
 2022 09:06:32 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%5]) with mapi id 15.20.5102.023; Tue, 29 Mar 2022
 09:06:32 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8a246f57-af3f-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648544797;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=NczOJ8uNRrGfdvQ0qCNkYsZdURpk9LmRZrtaxHOYxYw=;
	b=WBxSdBJuj6lL8Yuwp7OEu0azVhtBIPFoi0taghiAwY1mL1T68bjA6aBuuDDgeGQx9l3zI0
	cLmUcdZo3V7feYnfHgGWR0I2+twG+u+s99v/mvjwv1D2FLr0fYFJeHTMcwwN1czeAfAFLX
	QoSAnt/ovPAVAFYU1DeygwuajSWHxDk=
X-MC-Unique: sthdSA3LOe-kC67W6xfuxA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=AMeBDzYnfp+S4lY+zRuuAFbX8bqZcsSBa1o6UVWulzFTZN1LFCM95GGSV8Lxdu3yf7Ak4hSfPWBOPmphui7Lo2WV7bRldXHdvuR5s5D5rlIdMZCZ8wXIn4TbRaejtiM+bLtVKaLhl8zbchdfLubgW9cAbBoH1PveDktzCLjLaIlR7qwNbRh4m2mV9YzN60T/IXEX5y6s8jVNINOMZTvzCUTO7OmeOCZccbDI0JoSTdUWwpzM+qVgwRRpNN+HaVPCvJPduIoVInRp8tpgcDFTXU+xZ8ZecbK08p+6tI9RKjCRq88BsxP20ThttCDr9NJC0CeZoI0aMl15KbFQqaPJNg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=NczOJ8uNRrGfdvQ0qCNkYsZdURpk9LmRZrtaxHOYxYw=;
 b=a4g6oaARxAlwUClWe1cgfi/JX6NMNYkYBjh7xBrkwsmnZWvp2uWqHYvi+1HzDB3zgPIGdKimLbKxMiczxUon5j25dPhBtbrV1qG5ttnBoni6NxCRZtCX4UgW4J6AKPdwIvGT6TyakndvIOLtfKnzlShzI9AXzyouAquBvHI4fwtW0ysXNlXcdfs8vaY9Ic2IGOkkQtj+lcUUFqUueW5zhRAcqDAvfVK7pL+hM92EvTp04DYpEXphkv5tCh0F3NLEyV++5dNk2FvtS4K4fj0JXk24cAB+85AILrKOSlKonHDynqLSuSu2SqQqlTJ7ozW4EMXyQqQ21lsRIJkQKCZDAQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <8082fa7e-3c3d-245a-5064-d562df196b65@suse.com>
Date: Tue, 29 Mar 2022 11:06:30 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2 1/2] xen: Introduce a header to store common linker
 scripts content
Content-Language: en-US
To: Michal Orzel <michal.orzel@arm.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
 <julien@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 xen-devel@lists.xenproject.org
References: <20220322080233.53134-1-michal.orzel@arm.com>
 <20220322080233.53134-2-michal.orzel@arm.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220322080233.53134-2-michal.orzel@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6PR08CA0005.eurprd08.prod.outlook.com
 (2603:10a6:20b:b2::17) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 3a9b8240-5139-47a4-676c-08da11636b22
X-MS-TrafficTypeDiagnostic: AM0PR04MB4148:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB4148DA028DCB025EF9DD78ADB31E9@AM0PR04MB4148.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(8936002)(31686004)(36756003)(6512007)(316002)(38100700002)(53546011)(2906002)(508600001)(6486002)(5660300002)(86362001)(186003)(4744005)(2616005)(7416002)(4326008)(8676002)(31696002)(6506007)(6916009)(54906003)(66556008)(26005)(66946007)(66476007)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?VzlBR1k0VjcwcExHS3BRcTAwdE9aMXpFZVNuanQzYnA5czROOWZzV1JSeFFO?=
 =?utf-8?B?elVjOXVoeFRLN1FodG1UMFNkY20rdDBDOExxVTBVNWs2N1FCa2xmTHhERFZO?=
 =?utf-8?B?VVlJMjRxVmFINVNZQU9LYjBkbVhHZHFqV09VaFB6SkE3TkgwMkpMUlA0MDhz?=
 =?utf-8?B?c0ZKd0tvNk56TVh4RWVENDRGQ2JYbGpMQkJqNFJjaEFTZHUwVlNhMTBIMEZu?=
 =?utf-8?B?WDYyYkwzT1E3N0cwb3lwRXlFU3Z2UFh5aFdNSElhYk1IaUZBOHcxUGJrZURw?=
 =?utf-8?B?NlZaTWl1VHhya2gyblRVWGVkWnJEL3dGRmg5VW44TUtaT0xmVlJiZzZ6THpa?=
 =?utf-8?B?cG0ySUVBWUk4RVZxTlFhMTZrY3htZCttWDN3YjZuTlFuQ205U2plMHFiM3Fu?=
 =?utf-8?B?K1FsYSs0RXQ5cVByYkhadjJYNldUbHFva25hSlRlNUVoaFdsMzd1OUlKbVJn?=
 =?utf-8?B?VXFSQ1RTVXY4YlVnNTNkeEpNU0xiMmp1bHNRR0crTUdjTW1kakxOekNEZzVD?=
 =?utf-8?B?SkRkWkh2dGxtOHVXTHBWRWdaQmcwOW5nUEViNHZ2dVFjclVpTmdwY2F2M0JC?=
 =?utf-8?B?U2tyd2hGWFNNSHpJdVE2SHBybWVIRVlxT3lNc0hCcmREdHN0b2hFRmFXOGJw?=
 =?utf-8?B?VE10S3NCQTdOc3creDZIRVRUN3FERDZ2MUVrYmI5SWtaRG1ObzV3V2FreWQ5?=
 =?utf-8?B?NFhKMXV5QW5UMEpld2dXL21PTkdRN2R6dFQwdDZsSG1xcGZTVnVTUjdFS3BL?=
 =?utf-8?B?YlhRbmZkQ0pRMkUwTGJKOVJYLzZWRkhOcmNFd1B4Y2xnZTAxNWdQZ1pIdDlB?=
 =?utf-8?B?enZWcFZ6aWY3RWNXeGhTTTBOL1RMbVZiaGM2NXJzVjk3VUR6Rk9WU3JiZ2NW?=
 =?utf-8?B?d1JXNHFyRTFtMjZPY29Qb3o3dTl4SXo5K2tZV0dieGk4RW5rRFdJZUJDVkhD?=
 =?utf-8?B?WmkySGtZSHlhM2lJMnM1OUdycDBLUEthS1NraVFBRFY5dVRhYncxSFNzOHFn?=
 =?utf-8?B?V0E1a3REQUZRaTBlRHVLTmFSOWxmck1tODcrMDRqeGE2K0pCVzV4QW9HOS8y?=
 =?utf-8?B?aGE3Rm5RVkFhZTQzUnY0MHNWdUpSR0dCc2p6UktlWVlFM0pBdHdFMlB2eTRH?=
 =?utf-8?B?R1czLzQyakh0bGtRR0lTc3JKbG11WkxBTTNZUU43emxsY3ZXNk5NTzNlTHQz?=
 =?utf-8?B?bGJWYlFIVVBLRXJGTTRCVzZrQVpyNFZ6MFBjQThrUUF4NzNwL050bXBjVzhw?=
 =?utf-8?B?ZXZFMVBFQnd1NFl4TkZMdFIrYnphR0FPRHRVQi9HaXVSVkw3SjJ3WnhXNWZt?=
 =?utf-8?B?eGtVYkkxb0RkcXhNTnVPdFBJd3h2V1RiNnYwMVNaaGwwSlpwTXlkaDVoY1lv?=
 =?utf-8?B?MVRlMkpLbncvak9IMEw4Z1ZoUnMwTldkaWVVZ3MxTnJvWnJKc28xOFc1bW5t?=
 =?utf-8?B?ZVk5RHUvVFhGMXpCYlJ5aWc5aVVOWG9hL0p5bHQ1cGxJQ1p0NXUyV1J0NWNQ?=
 =?utf-8?B?SU9kbzNxc3d5MDBTT01ubzFhU3o4TGZmNGtMaDJvRmFTNGdNeEVTWkZaWEtl?=
 =?utf-8?B?VVpNc2g4NWJCZDhTOWNlVlZkNXU2UDVTTkFvN0ZmS2ZqRjJOR1NIZ0F6N214?=
 =?utf-8?B?VUwxT0kxem9xY3JtbVEzRlVPNm0yOVpHTkprNXZvQzdUREl2eGt6aFl4TEdt?=
 =?utf-8?B?ZTZaUGIvb2I4MXhUN1E2MzJ3aVJpTEp2d1RqcmZHazR4aTFVQXp6NzlIR2lp?=
 =?utf-8?B?TzcwTHF2M29Gc2ZicFpiVTEySGx5U0RIVHd0L1JGNkE1WEFXWXVtMEtoSlh0?=
 =?utf-8?B?d2k5N3FGUkpLVU9kdjhldXQyMzRZL0tBRytXV3diV2VhN2lGVzZ5cDZZU1pi?=
 =?utf-8?B?RjNmN0FnRTBkQW93c0Yvek9ZRTlLWWFyUWsxTTNkUkdERk5iSmZkd1RZM1dI?=
 =?utf-8?B?Vmd5RDVXQnppcUphV3pNUDVLTnJuak5EM1Z0RkwwcHo2ZnQrbkhMYmVOS2tw?=
 =?utf-8?B?YlFrOEJjUHhyZkN6L091dGZBZUlQeHI2cG1ZOGdvSGt2N3NYb1I2Z1RtU2lG?=
 =?utf-8?B?YXdmK1UvMTNIVzV3ZmJBY2xFbmowV1dialhYNFBkVXpxS1FQYlY5dVZCdXZX?=
 =?utf-8?B?RXVjeFFSMUJmekFCdzc0NVU2aHowczZlZmlkKzlrdUtSK3ZVT3NXSEpsdEto?=
 =?utf-8?B?cDRQRHlGY1R2WC9jWkltV1ZlL0RiWHI1NENKMm1iNFN2SFpvQXlZeHo2TSta?=
 =?utf-8?B?Z1lYWWpMMlFtV2hQWFBHa1NCZlFBR21DRUY1MmpJczRVVHc0Snpod0FBNEI0?=
 =?utf-8?B?Yi9zVXc1RlN4YUZBQ3RXM3BSQ0ZIUXhGQ2h3YzBPVlFYVitPc1NyZz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3a9b8240-5139-47a4-676c-08da11636b22
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 29 Mar 2022 09:06:32.5384
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: HdxBNI4cLn5u/atV34jOldfV51wkUeNa5xLAgYjuU1iENUAOit28jb3guMLgJW8e864vFhFStUPChSjXSqZUPg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB4148

On 22.03.2022 09:02, Michal Orzel wrote:
> Both x86 and arm linker scripts share quite a lot of common content.
> It is difficult to keep syncing them up, thus introduce a new header
> in include/xen called xen.lds.h to store the internals mutual to all
> the linker scripts.
> 
> Include this header in linker scripts for x86 and arm.
> This patch serves as an intermediate step before populating xen.lds.h
> and making use of its content in the linker scripts later on.
> 
> Signed-off-by: Michal Orzel <michal.orzel@arm.com>

Acked-by: Jan Beulich <jbeulich@suse.com>



From xen-devel-bounces@lists.xenproject.org Tue Mar 29 09:22:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 09:22:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295740.503364 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ83e-0006Th-AZ; Tue, 29 Mar 2022 09:22:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295740.503364; Tue, 29 Mar 2022 09:22:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ83e-0006Ta-7O; Tue, 29 Mar 2022 09:22:34 +0000
Received: by outflank-mailman (input) for mailman id 295740;
 Tue, 29 Mar 2022 09:22:33 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=kdRh=UI=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZ83d-0006TU-29
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 09:22:33 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id c26e5709-af41-11ec-a405-831a346695d4;
 Tue, 29 Mar 2022 11:22:31 +0200 (CEST)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2106.outbound.protection.outlook.com [104.47.17.106]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-4-yEXLb7caPPuuCs5RWV8nDA-1; Tue, 29 Mar 2022 11:22:29 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by VI1PR0402MB3485.eurprd04.prod.outlook.com (2603:10a6:803:7::25)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.23; Tue, 29 Mar
 2022 09:22:27 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%5]) with mapi id 15.20.5102.023; Tue, 29 Mar 2022
 09:22:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c26e5709-af41-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648545751;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=oPQZP3cFKx3Szc0xvJHHNEJ6aKA3QFDHjlIcHFreOgQ=;
	b=YKjigRqCrALDosfg2n7WiLCxDcZ/OZfr0Sl/HfQHtT6BwdYgltq5Psa+2kloXLEeF7E9sv
	G8oM50tgksoS4qNTZa6fLT3ltEY7SUoeYz+/6KS8fnLLOnPB5EQH1Lytd2/DQMUv5A5szr
	/g319H95xfZlGUF6O2qNaPY0t3G+knU=
X-MC-Unique: yEXLb7caPPuuCs5RWV8nDA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Eq8AzoJd7sxJQ5TsKGQTuPto0YDKpYPb+SmqSj6Cyy00CgJtcwQ0aR2obvZ7tz8XrfRcByn5s39nwoGElpGny45NpqBQdHzg0qdQUBx04e6XRKMXVZ90mKa+JETMvtp1QsfaORmzMTBkhXTWuDQJgSkEE5ZFbXjBaGCyJY6K9v8xR7oK+iZLTFhxA60AVXs0eh/ex5bFeM1sVoUe9RYdYneFoWOTeMJJuFcTNZo5x1pNNB5+WdeagRW4wIDca7nGoCLND0bT46adF3NNCqGgfxjMqLGrY6JIvXByDS24IC3Xdf1q23nRFIKKR8QaMXmtHSKLAGoiJYnBTPncEWEamA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=oPQZP3cFKx3Szc0xvJHHNEJ6aKA3QFDHjlIcHFreOgQ=;
 b=OYevLuhYT43aProv/trncIda1xkYZQps7d0w6rnC1hcEsCx8toAsp4fwAaxvP+qiUcHXG/fMtdsTvlIBugC2Zq/1lnHyeA8GAvUunXqr6kr0/YgPok6FP+C/Uu3rBOglB+TaifKr2aSXdlqhu2mNTcjkZIYdHNy2Ysv2WxjgzTsVTw2j13Rc+FyOkZEYfod8tImlPNGurb+18v7xjPLeZ90U953fOugsdtdZ8yEpXUxfYU7MmKkVQ4dvFctmgWDBEQdKNrIUCbKuDc3hKSHk8KsP1VC/XCic6OtD+khrTtjZHWcUoFqrNPHNqh4Ohqtz0IJH76IYCLK8IudpFIJk1Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <dbcd0509-6a8a-db5d-bad7-69027256f053@suse.com>
Date: Tue, 29 Mar 2022 11:22:25 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2 2/2] xen: Populate xen.lds.h and make use of its macros
Content-Language: en-US
To: Michal Orzel <michal.orzel@arm.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
 <julien@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 xen-devel@lists.xenproject.org
References: <20220322080233.53134-1-michal.orzel@arm.com>
 <20220322080233.53134-3-michal.orzel@arm.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220322080233.53134-3-michal.orzel@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8PR04CA0043.eurprd04.prod.outlook.com
 (2603:10a6:20b:312::18) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5dee91c1-2bbc-4568-3396-08da1165a446
X-MS-TrafficTypeDiagnostic: VI1PR0402MB3485:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR0402MB348527521097ABB2F5D3C333B31E9@VI1PR0402MB3485.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6506007)(6486002)(38100700002)(36756003)(31696002)(86362001)(4326008)(66556008)(66476007)(8676002)(5660300002)(7416002)(508600001)(66946007)(31686004)(8936002)(2906002)(54906003)(6916009)(186003)(26005)(53546011)(2616005)(83380400001)(6512007)(316002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?U2VaZVZ0QlNNVkJucWhNNVc4VnNmY1liOEo3Tmk0VkhZWjlQOEtZSjJuRW5z?=
 =?utf-8?B?dEdiWWlXUXdSVlIxUW5Nc0t5Zm9rcVVUbjAzZC9KdThOV285VDJYT1hLR3Q2?=
 =?utf-8?B?cHd1WmpYbDJ2TVdGbnRIbFgwSHFlNDRVRkdTVGV0LzdISGFtaUE1di9UQ0FS?=
 =?utf-8?B?RWxLZHc2eHB1OHJiUks0aEQ0M1R1dmt2bDd3T1VnMVA4Y2M1ZkRQZzY0SFNa?=
 =?utf-8?B?ZkFKM2M0bU1SdU1Kdk5hVjl3MzhyZGRaam5ZazFEbGZRajg5c1crRjZVZVpQ?=
 =?utf-8?B?dWw5a2tXQjRpZjBONkgrOGcvNENDQW9UZHZ4RlJBbzU0SFoyQ3llaU1aY0t3?=
 =?utf-8?B?U3VObVp1Y3haZFJnVTNEQlFRN0ZrYUVoSURlZStyenRkR0tWL0lVamlzTTNq?=
 =?utf-8?B?ZXppSGNkN3dHRjVMakRwQTcrYkhZOFB4cTRJRHpTR2NTS0R3ZzNVNE40UTJ6?=
 =?utf-8?B?YWtnNDhCVTJZUEhkZThYSnh5Tnl4UmNYblFRVVdiM0RDV25WSzNOM2tHWVJy?=
 =?utf-8?B?MzdlK0h6RVkwSk9YWFcvcG9Qbk52L3gvcFUxcHBQRTZBOXcrR2FNN3FnN2tX?=
 =?utf-8?B?dGZXVUZmSllGT1hBM1VhZWNlS1RLT2MycmZValFoWEowMG5zRG85L3lBUytn?=
 =?utf-8?B?enJGcHdjZ1h2dnhQYmxFWUZBcHBsT1ladjl5QlVSNm55M0FTaWFFNDZCQm1D?=
 =?utf-8?B?OVdRNWFEd2pIdUhSL2VPVDVCa3dCbEdTR29aOW5aTWc1QVY0Ujl1eS9tTGMx?=
 =?utf-8?B?ZzNhTEkrT0owa1JRMTlXSzBESm9zTi9hSU1iTlNyYnRkWi8vcTVXU2tNMHVq?=
 =?utf-8?B?dXJRTkFRRkhuTnN4VjdSM1R5WnZKZzZ3K3A3cUhvVjlDeXpsdWJkTVBhSnpp?=
 =?utf-8?B?ajN2Y1IxRzdRL0RKc1dXSjNvWjdCc0kxNThZQzBob3E0VS9DYVVrMHJnbkYy?=
 =?utf-8?B?cDJBR1A4a3RuMlc2NCtvNzdYc2pRdTJUS0RickU1eWJ1NEtrQ2NtZVBhRmNa?=
 =?utf-8?B?Ty95UlpySDdzRlpiU1BFTUJkc2lra2VyQTZZMlJxUHJUdWpHbXV2SjdoMzFi?=
 =?utf-8?B?cE9MRlFPMG5yN3pwWGQ2OXhXT0pzV3pGWUlHRVgranVXVVBQUEozcmNRa2Vw?=
 =?utf-8?B?b1ZNeEFwM2Rod3o0UElxKzVpVEpzVndmMjlXRVhUd2dQbi8rMEFydDdWNVE5?=
 =?utf-8?B?SmNYZURaNlJWb21MZGxPTmh6RnBHUFlxUUNSWDh3eG4vM2duQWpkL3BRSzRp?=
 =?utf-8?B?K2pKSzVSeUgvbTBiYXVENHduSHVtejZLU3hJYlhMYU56c1NqbjdkVGE1ZS9l?=
 =?utf-8?B?anpzRTJQeXZBZUpTYjQ0ODZBUWFlRHdQSTBnQkMzSVRXSk9WS3ExZFFtdG1x?=
 =?utf-8?B?aGZqRVowUUkycFQ4T2NwQWJBVTJ0bllUb0x4Z2hOdGJLK2RkcmJGaEJsWGNX?=
 =?utf-8?B?YXNwVVkvYmdxQjJkc1UybXJPOGlHRmRFY0FnTDk4TFgvUERrQWMyQUNBaDc3?=
 =?utf-8?B?RTZlU3pjVDdZZ0FaR3dGMzdpSzFNZDFmQ1VmSi9Na1k0Nk9ROUNmWHVRTzk5?=
 =?utf-8?B?eWF6TzluaVJvelJQZWg3aGIrclZidVF6T09Lb2FNb1VwRktjSWFqeWk5QVlw?=
 =?utf-8?B?bUFLN1dyZWxUSFdRMGJZcHZzeENZZzNwY0oxN1Y4a05ZbCttVXFRak5xRmR1?=
 =?utf-8?B?d0RVTU1UYXhsMUZtdVR2aTFlZmlTRmdPYWYwMXVjWnlkbjdXTFVHZUFkVkFx?=
 =?utf-8?B?NVZNNk8xc0VjZWloaW5oU1Q4ZlRpd1phNS93cnlta3VTR0ZrNXIzYXprTW4v?=
 =?utf-8?B?Yk1ONlhjVmhienZQdWdtTkdIajJiNDYxS1hpSkZFbjB2NWZiMlRTUTZNbmox?=
 =?utf-8?B?ZFA3N2d4QmR5NFc0QlV0a1k1TEM1N2dLMVdqb1YzTUVMenQvSmRYVUVRS0Vw?=
 =?utf-8?B?a1FzZlVkUVVjZ1NBRldOZXpHMU9xVHFTcVNiYmdiT1lNVy9uazd4dlM0dndJ?=
 =?utf-8?B?QzRDWWVYdDV4UmQ0WHQ2UVBLVlJCSExFTTR1aU1iN1FBU2QwMlNlNzVqMitE?=
 =?utf-8?B?UWxGd29ySzY4ZGt1WGtWZjFVNDBOQXFKa3Nna0dGOHNhUGN2NlZRcVl3bUxo?=
 =?utf-8?B?anRFMzlFRGVna2EvZ1pSeWJtRCs0TmJyTXBYR3dHbzlJOTZCeUU0TzJuaFN1?=
 =?utf-8?B?SzlubSthK2tZWHVWenlmdUtGdDNxQXpWUEg5MW9uN1A1dDVsWUxNenBieUc1?=
 =?utf-8?B?elFucnhoYzhkMlBuWkZLUVB5c3NMVld6RDR3VThscFk0WHJCLzU1WmxmRmZR?=
 =?utf-8?B?WVJueHVNRU1sazRXMXhrc3Frbnl4S29wemNnOTB3OHBBcDQzV3Nzdz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5dee91c1-2bbc-4568-3396-08da1165a446
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 29 Mar 2022 09:22:27.3966
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: TrD/ONjNg5QDk00lPE3wgzN6JOw/FDEjQ5WWrbnfyN9B49D0zjHH8ocNby8fsTGzbQiqFo6iTly5Hl3n4/2Ynw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0402MB3485

On 22.03.2022 09:02, Michal Orzel wrote:
> --- a/xen/arch/arm/xen.lds.S
> +++ b/xen/arch/arm/xen.lds.S
> @@ -69,10 +69,7 @@ SECTIONS
>         __proc_info_end = .;
>  
>  #ifdef CONFIG_HAS_VPCI
> -       . = ALIGN(POINTER_ALIGN);
> -       __start_vpci_array = .;
> -       *(SORT(.data.vpci.*))
> -       __end_vpci_array = .;
> +       VPCI_ARRAY
>  #endif

Here and elsewhere I think the #ifdef should move as well, or to be
precise VPCI_ARRAY (in the specific case here) should simply expand to
nothing when CONFIG_HAS_VPCI is not defined.

> @@ -222,22 +213,18 @@ SECTIONS
>    /* Section for the device tree blob (if any). */
>    .dtb : { *(.dtb) } :text
>  
> +  /*
> +   * Explicitly list debug sections, to avoid these sections being viewed as
> +   * "orphan" by the linker.
> +   */
> +  DWARF_DEBUG_SECTIONS

Considering the comment, perhaps better to move ...

>    /* Sections to be discarded */
> -  /DISCARD/ : {
> -       *(.exit.text)
> -       *(.exit.data)
> -       *(.exitcall.exit)
> -       *(.eh_frame)
> -  }
> +  DISCARD_SECTIONS
>  
>    /* Stabs debugging sections.  */
> -  .stab 0 : { *(.stab) }
> -  .stabstr 0 : { *(.stabstr) }
> -  .stab.excl 0 : { *(.stab.excl) }
> -  .stab.exclstr 0 : { *(.stab.exclstr) }
> -  .stab.index 0 : { *(.stab.index) }
> -  .stab.indexstr 0 : { *(.stab.indexstr) }
> -  .comment 0 : { *(.comment) }
> +  STABS_DEBUG_SECTIONS

... this up there?

> --- a/xen/include/xen/xen.lds.h
> +++ b/xen/include/xen/xen.lds.h
> @@ -5,4 +5,104 @@
>   * Common macros to be used in architecture specific linker scripts.
>   */
>  
> +/* Macros to declare debug sections. */
> +#ifdef EFI
> +/*
> + * Use the NOLOAD directive, despite currently ignored by (at least) GNU ld
> + * for PE output, in order to record that we'd prefer these sections to not
> + * be loaded into memory.
> + */
> +#define DECL_DEBUG(x, a) #x ALIGN(a) (NOLOAD) : { *(x) }
> +#define DECL_DEBUG2(x, y, a) #x ALIGN(a) (NOLOAD) : { *(x) *(y) }
> +#else
> +#define DECL_DEBUG(x, a) #x 0 : { *(x) }
> +#define DECL_DEBUG2(x, y, a) #x 0 : { *(x) *(y) }
> +#endif
> +
> +/* DWARF debug sections. */
> +#define DWARF_DEBUG_SECTIONS                      \

May I suggest to call this DWARF2_DEBUG_SECTIONS, to make clear no
Dwarf1 section is included here (and we also don't mean to support
such debug info)?

> +  DECL_DEBUG(.debug_abbrev, 1)                    \
> +  DECL_DEBUG2(.debug_info, .gnu.linkonce.wi.*, 1) \
> +  DECL_DEBUG(.debug_types, 1)                     \
> +  DECL_DEBUG(.debug_str, 1)                       \
> +  DECL_DEBUG2(.debug_line, .debug_line.*, 1)      \
> +  DECL_DEBUG(.debug_line_str, 1)                  \
> +  DECL_DEBUG(.debug_names, 4)                     \
> +  DECL_DEBUG(.debug_frame, 4)                     \
> +  DECL_DEBUG(.debug_loc, 1)                       \
> +  DECL_DEBUG(.debug_loclists, 4)                  \
> +  DECL_DEBUG(.debug_macinfo, 1)                   \
> +  DECL_DEBUG(.debug_macro, 1)                     \
> +  DECL_DEBUG(.debug_ranges, 8)                    \
> +  DECL_DEBUG(.debug_rnglists, 4)                  \
> +  DECL_DEBUG(.debug_addr, 8)                      \
> +  DECL_DEBUG(.debug_aranges, 1)                   \
> +  DECL_DEBUG(.debug_pubnames, 1)                  \
> +  DECL_DEBUG(.debug_pubtypes, 1)
> +
> +/* Stabs debug sections. */
> +#define STABS_DEBUG_SECTIONS                 \
> +  .stab 0 : { *(.stab) }                     \
> +  .stabstr 0 : { *(.stabstr) }               \
> +  .stab.excl 0 : { *(.stab.excl) }           \
> +  .stab.exclstr 0 : { *(.stab.exclstr) }     \
> +  .stab.index 0 : { *(.stab.index) }         \
> +  .stab.indexstr 0 : { *(.stab.indexstr) }
> +
> +/*
> + * Required sections not related to debugging.
> + *
> + * LLVM ld also wants .symtab, .strtab, and .shstrtab placed. These look to
> + * be benign to GNU ld, so we can have them here unconditionally.
> + */
> +#define ELF_DETAILS_SECTIONS     \
> +  .comment 0 : { *(.comment) }   \
> +  .symtab 0 : { *(.symtab) }     \
> +  .strtab 0 : { *(.strtab) }     \
> +  .shstrtab 0 : { *(.shstrtab) }
> +
> +#ifdef EFI
> +#define DISCARD_EFI_SECTIONS \
> +       *(.comment)   \
> +       *(.comment.*) \
> +       *(.note.*)
> +#else
> +#define DISCARD_EFI_SECTIONS
> +#endif
> +
> +/* Sections to be discarded. */
> +#define DISCARD_SECTIONS     \
> +  /DISCARD/ : {              \
> +       *(.text.exit)         \
> +       *(.exit.text)         \
> +       *(.exit.data)         \
> +       *(.exitcall.exit)     \
> +       *(.discard)           \
> +       *(.discard.*)         \
> +       *(.eh_frame)          \
> +       *(.dtors)             \
> +       *(.dtors.*)           \
> +       *(.fini_array)        \
> +       *(.fini_array.*)      \
> +       DISCARD_EFI_SECTIONS  \
> +  }
> +
> +#define VPCI_ARRAY               \
> +       . = ALIGN(POINTER_ALIGN); \
> +       __start_vpci_array = .;   \
> +       *(SORT(.data.vpci.*))     \
> +       __end_vpci_array = .;
> +
> +#define HYPFS_PARAM              \
> +       . = ALIGN(8);             \

Since you're generalizing this, you mean POINTER_ALIGN here, not 8.

> +       __paramhypfs_start = .;   \
> +       *(.data.paramhypfs)       \
> +       __paramhypfs_end = .;
> +
> +#define LOCK_PROFILE_DATA        \
> +       . = ALIGN(POINTER_ALIGN); \
> +       __lock_profile_start = .; \
> +       *(.lockprofile.data)      \
> +       __lock_profile_end = .;

While for *_SECTIONS I don't care as much, for these last three items
I think it would be good if we (maybe just informally) established an
ordering rule, such that we can ask further additions here to not occur
randomly. Once we've grown a few more of these, this would also help
quickly locating the perhaps just one construct of interest when
looking up things. Personally I think the only sensible ordering
criteria is the name of the construct being defined. This could be
mentioned in a comment ahead of them, and that comment would then at
the same time serve as separator between *_SECTIONS and any constructs
also defining (enclosing) symbols.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 29 09:38:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 09:38:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295745.503379 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ8Ig-00086m-KJ; Tue, 29 Mar 2022 09:38:06 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295745.503379; Tue, 29 Mar 2022 09:38:06 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ8Ig-00086f-Gx; Tue, 29 Mar 2022 09:38:06 +0000
Received: by outflank-mailman (input) for mailman id 295745;
 Tue, 29 Mar 2022 09:38:05 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=AGgI=UI=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nZ8If-00086Z-5m
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 09:38:05 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id ed92052b-af43-11ec-a405-831a346695d4;
 Tue, 29 Mar 2022 11:38:03 +0200 (CEST)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 0C13623A;
 Tue, 29 Mar 2022 02:38:02 -0700 (PDT)
Received: from [10.57.6.94] (unknown [10.57.6.94])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 471BC3F718;
 Tue, 29 Mar 2022 02:37:58 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ed92052b-af43-11ec-a405-831a346695d4
Message-ID: <7feea62a-c467-560e-5b4e-630996e8f39d@arm.com>
Date: Tue, 29 Mar 2022 11:37:47 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [PATCH v2 2/2] xen: Populate xen.lds.h and make use of its macros
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
 <julien@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 xen-devel@lists.xenproject.org
References: <20220322080233.53134-1-michal.orzel@arm.com>
 <20220322080233.53134-3-michal.orzel@arm.com>
 <dbcd0509-6a8a-db5d-bad7-69027256f053@suse.com>
From: Michal Orzel <michal.orzel@arm.com>
In-Reply-To: <dbcd0509-6a8a-db5d-bad7-69027256f053@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hi Jan,

Thanks for review.

On 29.03.2022 11:22, Jan Beulich wrote:
> On 22.03.2022 09:02, Michal Orzel wrote:
>> --- a/xen/arch/arm/xen.lds.S
>> +++ b/xen/arch/arm/xen.lds.S
>> @@ -69,10 +69,7 @@ SECTIONS
>>         __proc_info_end = .;
>>  
>>  #ifdef CONFIG_HAS_VPCI
>> -       . = ALIGN(POINTER_ALIGN);
>> -       __start_vpci_array = .;
>> -       *(SORT(.data.vpci.*))
>> -       __end_vpci_array = .;
>> +       VPCI_ARRAY
>>  #endif
> 
> Here and elsewhere I think the #ifdef should move as well, or to be
> precise VPCI_ARRAY (in the specific case here) should simply expand to
> nothing when CONFIG_HAS_VPCI is not defined.
> 
I was thinking about it at the beginning so I'm ok with your solution.

>> @@ -222,22 +213,18 @@ SECTIONS
>>    /* Section for the device tree blob (if any). */
>>    .dtb : { *(.dtb) } :text
>>  
>> +  /*
>> +   * Explicitly list debug sections, to avoid these sections being viewed as
>> +   * "orphan" by the linker.
>> +   */
>> +  DWARF_DEBUG_SECTIONS
> 
> Considering the comment, perhaps better to move ...
> 
>>    /* Sections to be discarded */
>> -  /DISCARD/ : {
>> -       *(.exit.text)
>> -       *(.exit.data)
>> -       *(.exitcall.exit)
>> -       *(.eh_frame)
>> -  }
>> +  DISCARD_SECTIONS
>>  
>>    /* Stabs debugging sections.  */
>> -  .stab 0 : { *(.stab) }
>> -  .stabstr 0 : { *(.stabstr) }
>> -  .stab.excl 0 : { *(.stab.excl) }
>> -  .stab.exclstr 0 : { *(.stab.exclstr) }
>> -  .stab.index 0 : { *(.stab.index) }
>> -  .stab.indexstr 0 : { *(.stab.indexstr) }
>> -  .comment 0 : { *(.comment) }
>> +  STABS_DEBUG_SECTIONS
> 
> ... this up there?
That makes sense. Ok.

> 
>> --- a/xen/include/xen/xen.lds.h
>> +++ b/xen/include/xen/xen.lds.h
>> @@ -5,4 +5,104 @@
>>   * Common macros to be used in architecture specific linker scripts.
>>   */
>>  
>> +/* Macros to declare debug sections. */
>> +#ifdef EFI
>> +/*
>> + * Use the NOLOAD directive, despite currently ignored by (at least) GNU ld
>> + * for PE output, in order to record that we'd prefer these sections to not
>> + * be loaded into memory.
>> + */
>> +#define DECL_DEBUG(x, a) #x ALIGN(a) (NOLOAD) : { *(x) }
>> +#define DECL_DEBUG2(x, y, a) #x ALIGN(a) (NOLOAD) : { *(x) *(y) }
>> +#else
>> +#define DECL_DEBUG(x, a) #x 0 : { *(x) }
>> +#define DECL_DEBUG2(x, y, a) #x 0 : { *(x) *(y) }
>> +#endif
>> +
>> +/* DWARF debug sections. */
>> +#define DWARF_DEBUG_SECTIONS                      \
> 
> May I suggest to call this DWARF2_DEBUG_SECTIONS, to make clear no
> Dwarf1 section is included here (and we also don't mean to support
> such debug info)?
> 
As this list is not full I thought we are going to add DWARF1 sections one day.
DWARF2_DEBUG_SECTIONS would mean that we list sections only from DWARF2 which is not true
as we have sections from DWARF3,5, etc. 
Maybe we should leave it as it is but modify the comment to state:
/* DWARF2+ debug sections */

>> +  DECL_DEBUG(.debug_abbrev, 1)                    \
>> +  DECL_DEBUG2(.debug_info, .gnu.linkonce.wi.*, 1) \
>> +  DECL_DEBUG(.debug_types, 1)                     \
>> +  DECL_DEBUG(.debug_str, 1)                       \
>> +  DECL_DEBUG2(.debug_line, .debug_line.*, 1)      \
>> +  DECL_DEBUG(.debug_line_str, 1)                  \
>> +  DECL_DEBUG(.debug_names, 4)                     \
>> +  DECL_DEBUG(.debug_frame, 4)                     \
>> +  DECL_DEBUG(.debug_loc, 1)                       \
>> +  DECL_DEBUG(.debug_loclists, 4)                  \
>> +  DECL_DEBUG(.debug_macinfo, 1)                   \
>> +  DECL_DEBUG(.debug_macro, 1)                     \
>> +  DECL_DEBUG(.debug_ranges, 8)                    \
>> +  DECL_DEBUG(.debug_rnglists, 4)                  \
>> +  DECL_DEBUG(.debug_addr, 8)                      \
>> +  DECL_DEBUG(.debug_aranges, 1)                   \
>> +  DECL_DEBUG(.debug_pubnames, 1)                  \
>> +  DECL_DEBUG(.debug_pubtypes, 1)
>> +
>> +/* Stabs debug sections. */
>> +#define STABS_DEBUG_SECTIONS                 \
>> +  .stab 0 : { *(.stab) }                     \
>> +  .stabstr 0 : { *(.stabstr) }               \
>> +  .stab.excl 0 : { *(.stab.excl) }           \
>> +  .stab.exclstr 0 : { *(.stab.exclstr) }     \
>> +  .stab.index 0 : { *(.stab.index) }         \
>> +  .stab.indexstr 0 : { *(.stab.indexstr) }
>> +
>> +/*
>> + * Required sections not related to debugging.
>> + *
>> + * LLVM ld also wants .symtab, .strtab, and .shstrtab placed. These look to
>> + * be benign to GNU ld, so we can have them here unconditionally.
>> + */
>> +#define ELF_DETAILS_SECTIONS     \
>> +  .comment 0 : { *(.comment) }   \
I also need to add *(.comment.*) due to:
https://xenbits.xen.org/gitweb/?p=xen.git;a=commit;h=69e46280937526db9cf78259cd8a0a9ec62dc847

>> +  .symtab 0 : { *(.symtab) }     \
>> +  .strtab 0 : { *(.strtab) }     \
>> +  .shstrtab 0 : { *(.shstrtab) }
>> +
>> +#ifdef EFI
>> +#define DISCARD_EFI_SECTIONS \
>> +       *(.comment)   \
>> +       *(.comment.*) \
>> +       *(.note.*)
>> +#else
>> +#define DISCARD_EFI_SECTIONS
>> +#endif
>> +
>> +/* Sections to be discarded. */
>> +#define DISCARD_SECTIONS     \
>> +  /DISCARD/ : {              \
>> +       *(.text.exit)         \
>> +       *(.exit.text)         \
>> +       *(.exit.data)         \
>> +       *(.exitcall.exit)     \
>> +       *(.discard)           \
>> +       *(.discard.*)         \
>> +       *(.eh_frame)          \
>> +       *(.dtors)             \
>> +       *(.dtors.*)           \
>> +       *(.fini_array)        \
>> +       *(.fini_array.*)      \
>> +       DISCARD_EFI_SECTIONS  \
>> +  }
>> +
>> +#define VPCI_ARRAY               \
>> +       . = ALIGN(POINTER_ALIGN); \
>> +       __start_vpci_array = .;   \
>> +       *(SORT(.data.vpci.*))     \
>> +       __end_vpci_array = .;
>> +
>> +#define HYPFS_PARAM              \
>> +       . = ALIGN(8);             \
> 
> Since you're generalizing this, you mean POINTER_ALIGN here, not 8.
> 
Ok.

>> +       __paramhypfs_start = .;   \
>> +       *(.data.paramhypfs)       \
>> +       __paramhypfs_end = .;
>> +
>> +#define LOCK_PROFILE_DATA        \
>> +       . = ALIGN(POINTER_ALIGN); \
>> +       __lock_profile_start = .; \
>> +       *(.lockprofile.data)      \
>> +       __lock_profile_end = .;
> 
> While for *_SECTIONS I don't care as much, for these last three items
> I think it would be good if we (maybe just informally) established an
> ordering rule, such that we can ask further additions here to not occur
> randomly. Once we've grown a few more of these, this would also help
> quickly locating the perhaps just one construct of interest when
> looking up things. Personally I think the only sensible ordering
> criteria is the name of the construct being defined. This could be
> mentioned in a comment ahead of them, and that comment would then at
> the same time serve as separator between *_SECTIONS and any constructs
> also defining (enclosing) symbols.
> 
Yes, name of the constructs is the good criteria.
I will do it in v3.

> Jan
> 

Cheers,
Michal


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 09:54:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 09:54:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295749.503390 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ8Yb-0001wx-0b; Tue, 29 Mar 2022 09:54:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295749.503390; Tue, 29 Mar 2022 09:54:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ8Ya-0001wq-TX; Tue, 29 Mar 2022 09:54:32 +0000
Received: by outflank-mailman (input) for mailman id 295749;
 Tue, 29 Mar 2022 09:54:31 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nZ8YZ-0001wk-Qv
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 09:54:31 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nZ8YZ-0004TL-Aw; Tue, 29 Mar 2022 09:54:31 +0000
Received: from 54-240-197-226.amazon.com ([54.240.197.226] helo=[10.85.37.164])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nZ8YZ-0007QG-4F; Tue, 29 Mar 2022 09:54:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=IBHXhZ6rWKkPOrPy7OWD+dhQxmdQifGXPTZPYtZhd8c=; b=g06hh5O4bka5LOd/MFg+qJhMjo
	R7kx60V5rSKi6gQ+aYpmf6FQ/wjJRMM5r2rE7A0p88nbi0LMXTslHZrhf55NETGe+uE3bm0vuYxCo
	31fB39SSbz8cssSJrNPkHl3vz21LQl9MQ1QXq3L2d00ySv9tprfvWM6h8EagobrIQ3xA=;
Message-ID: <2940b4c8-5d44-695e-4550-0a32c3a4c053@xen.org>
Date: Tue, 29 Mar 2022 10:54:28 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v2 2/2] xen: Populate xen.lds.h and make use of its macros
To: Michal Orzel <michal.orzel@arm.com>, xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Wei Liu <wl@xen.org>, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
References: <20220322080233.53134-1-michal.orzel@arm.com>
 <20220322080233.53134-3-michal.orzel@arm.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220322080233.53134-3-michal.orzel@arm.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 22/03/2022 08:02, Michal Orzel wrote:
> Populate header file xen.lds.h with the first portion of macros storing
> constructs common to x86 and arm linker scripts. Replace the original
> constructs with these helpers.
> 
> No functional improvements to x86 linker script.
> 
> Making use of common macros improves arm linker script with:
> -explicit list of debug sections that otherwise are seen as "orphans"

NIT: This is a bit confusing to see no space after -. Can you add one?

I would also recommend to start with (soft)tab to make clearer this is a 
list.

Same goes for the  other use below.


> by the linker. This will allow to fix issues after enabling linker
> option --orphan-handling one day
> -extended list of discarded section to include: .discard, desctructors

Typo: s/desctructors/destructors/

> related sections, .fini_array which can reference .text.exit
> -sections not related to debugging that are placed by ld.lld.
> Even though Xen on arm compilation with LLVM support is not ready yet,

Building natively Xen on Arm with Clang works. So do you mean you using 
LLD?

NIT: Also, from the formatting it is not clear that the second sentence 
is part of the last item. How about removing the newline just after the 
first sentence?

> these sections do not cause problem to GNU ld.
> 
> Please note that this patch does not aim to perform the full sync up
> between the linker scripts. It creates a base for further work.
> 
> Signed-off-by: Michal Orzel <michal.orzel@arm.com>

[...]

> diff --git a/xen/include/xen/xen.lds.h b/xen/include/xen/xen.lds.h
> index dd292fa7dc..ad1d199021 100644
> --- a/xen/include/xen/xen.lds.h
> +++ b/xen/include/xen/xen.lds.h
> @@ -5,4 +5,104 @@
>    * Common macros to be used in architecture specific linker scripts.
>    */
>   
> +/* Macros to declare debug sections. */
> +#ifdef EFI

AFAIK, we don't define EFI on Arm (just CONFIG_EFI). Yet we do support 
EFI on arm64.

As this #ifdef is now in generic code, can you explain how this is meant 
to be used?

> +/*
> + * Use the NOLOAD directive, despite currently ignored by (at least) GNU ld
> + * for PE output, in order to record that we'd prefer these sections to not
> + * be loaded into memory.
> + */
> +#define DECL_DEBUG(x, a) #x ALIGN(a) (NOLOAD) : { *(x) }
> +#define DECL_DEBUG2(x, y, a) #x ALIGN(a) (NOLOAD) : { *(x) *(y) }
> +#else
> +#define DECL_DEBUG(x, a) #x 0 : { *(x) }
> +#define DECL_DEBUG2(x, y, a) #x 0 : { *(x) *(y) }
> +#endif
> +
> +/* DWARF debug sections. */
> +#define DWARF_DEBUG_SECTIONS                      \
> +  DECL_DEBUG(.debug_abbrev, 1)                    \
> +  DECL_DEBUG2(.debug_info, .gnu.linkonce.wi.*, 1) \
> +  DECL_DEBUG(.debug_types, 1)                     \
> +  DECL_DEBUG(.debug_str, 1)                       \
> +  DECL_DEBUG2(.debug_line, .debug_line.*, 1)      \
> +  DECL_DEBUG(.debug_line_str, 1)                  \
> +  DECL_DEBUG(.debug_names, 4)                     \
> +  DECL_DEBUG(.debug_frame, 4)                     \
> +  DECL_DEBUG(.debug_loc, 1)                       \
> +  DECL_DEBUG(.debug_loclists, 4)                  \
> +  DECL_DEBUG(.debug_macinfo, 1)                   \
> +  DECL_DEBUG(.debug_macro, 1)                     \
> +  DECL_DEBUG(.debug_ranges, 8)                    \
> +  DECL_DEBUG(.debug_rnglists, 4)                  \
> +  DECL_DEBUG(.debug_addr, 8)                      \
> +  DECL_DEBUG(.debug_aranges, 1)                   \
> +  DECL_DEBUG(.debug_pubnames, 1)                  \
> +  DECL_DEBUG(.debug_pubtypes, 1)
> +
> +/* Stabs debug sections. */
> +#define STABS_DEBUG_SECTIONS                 \
> +  .stab 0 : { *(.stab) }                     \
> +  .stabstr 0 : { *(.stabstr) }               \
> +  .stab.excl 0 : { *(.stab.excl) }           \
> +  .stab.exclstr 0 : { *(.stab.exclstr) }     \
> +  .stab.index 0 : { *(.stab.index) }         \
> +  .stab.indexstr 0 : { *(.stab.indexstr) }
> +
> +/*
> + * Required sections not related to debugging.
> + *
> + * LLVM ld also wants .symtab, .strtab, and .shstrtab placed. These look to
> + * be benign to GNU ld, so we can have them here unconditionally.
> + */
> +#define ELF_DETAILS_SECTIONS     \
> +  .comment 0 : { *(.comment) }   \

This is a bit confusing. Here you seem to use the section .comment. But...

> +  .symtab 0 : { *(.symtab) }     \
> +  .strtab 0 : { *(.strtab) }     \
> +  .shstrtab 0 : { *(.shstrtab) }
> +
> +#ifdef EFI
> +#define DISCARD_EFI_SECTIONS \
> +       *(.comment)   \

... here you will discard it if EFI is set. Which one take precedence if 
the caller use both ELF_DETAILS_SECTIONS and DISCARD_EFI_SECTION?

Also, can you explain why we need to drop those sections when EFI is set?

> +       *(.comment.*) \
> +       *(.note.*)
> +#else
> +#define DISCARD_EFI_SECTIONS
> +#endif
> +
> +/* Sections to be discarded. */
> +#define DISCARD_SECTIONS     \
> +  /DISCARD/ : {              \
> +       *(.text.exit)         \
> +       *(.exit.text)         \
> +       *(.exit.data)         \
> +       *(.exitcall.exit)     \
> +       *(.discard)           \
> +       *(.discard.*)         \
> +       *(.eh_frame)          \
> +       *(.dtors)             \
> +       *(.dtors.*)           \
> +       *(.fini_array)        \
> +       *(.fini_array.*)      \
> +       DISCARD_EFI_SECTIONS  \
> +  }
> +
> +#define VPCI_ARRAY               \
> +       . = ALIGN(POINTER_ALIGN); \
> +       __start_vpci_array = .;   \
> +       *(SORT(.data.vpci.*))     \
> +       __end_vpci_array = .;
> +
> +#define HYPFS_PARAM              \
> +       . = ALIGN(8);             \
> +       __paramhypfs_start = .;   \
> +       *(.data.paramhypfs)       \
> +       __paramhypfs_end = .;
> +
> +#define LOCK_PROFILE_DATA        \
> +       . = ALIGN(POINTER_ALIGN); \
> +       __lock_profile_start = .; \
> +       *(.lockprofile.data)      \
> +       __lock_profile_end = .;
> +
>   #endif /* __XEN_LDS_H__ */

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 10:13:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 10:13:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295754.503400 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ8qS-0004Rs-NT; Tue, 29 Mar 2022 10:13:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295754.503400; Tue, 29 Mar 2022 10:13:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ8qS-0004Rl-KP; Tue, 29 Mar 2022 10:13:00 +0000
Received: by outflank-mailman (input) for mailman id 295754;
 Tue, 29 Mar 2022 10:12:59 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=AGgI=UI=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nZ8qR-0004Re-Pm
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 10:12:59 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id ce1ae878-af48-11ec-a405-831a346695d4;
 Tue, 29 Mar 2022 12:12:57 +0200 (CEST)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id ABD2923A;
 Tue, 29 Mar 2022 03:12:56 -0700 (PDT)
Received: from [10.57.6.94] (unknown [10.57.6.94])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 7718F3F718;
 Tue, 29 Mar 2022 03:12:54 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ce1ae878-af48-11ec-a405-831a346695d4
Message-ID: <d5bccf50-c74a-40e6-843e-3ad682647efb@arm.com>
Date: Tue, 29 Mar 2022 12:12:43 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [PATCH v2 2/2] xen: Populate xen.lds.h and make use of its macros
Content-Language: en-US
To: Julien Grall <julien@xen.org>, xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Wei Liu <wl@xen.org>, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
References: <20220322080233.53134-1-michal.orzel@arm.com>
 <20220322080233.53134-3-michal.orzel@arm.com>
 <2940b4c8-5d44-695e-4550-0a32c3a4c053@xen.org>
From: Michal Orzel <michal.orzel@arm.com>
In-Reply-To: <2940b4c8-5d44-695e-4550-0a32c3a4c053@xen.org>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit



On 29.03.2022 11:54, Julien Grall wrote:
> Hi,
> 
> On 22/03/2022 08:02, Michal Orzel wrote:
>> Populate header file xen.lds.h with the first portion of macros storing
>> constructs common to x86 and arm linker scripts. Replace the original
>> constructs with these helpers.
>>
>> No functional improvements to x86 linker script.
>>
>> Making use of common macros improves arm linker script with:
>> -explicit list of debug sections that otherwise are seen as "orphans"
> 
> NIT: This is a bit confusing to see no space after -. Can you add one?
> 
Ok.

> I would also recommend to start with (soft)tab to make clearer this is a list.
> 
> Same goes for the  other use below.
> 
Ok.

> 
>> by the linker. This will allow to fix issues after enabling linker
>> option --orphan-handling one day
>> -extended list of discarded section to include: .discard, desctructors
> 
> Typo: s/desctructors/destructors/
> 
Ok.

>> related sections, .fini_array which can reference .text.exit
>> -sections not related to debugging that are placed by ld.lld.
>> Even though Xen on arm compilation with LLVM support is not ready yet,
> 
> Building natively Xen on Arm with Clang works. So do you mean you using LLD?
> 
I mean using the LLVM replacements not only for CC + supporting cross-compilation.
As for the linker, Xen sets llvm-ld which is very very old and in fact README states
LLVM 3.5 or later but llvm-ld was removed before that. Thus IMO support for LLVM on arm
is not ready yet.

> NIT: Also, from the formatting it is not clear that the second sentence is part of the last item. How about removing the newline just after the first sentence?
> 
Ok.

>> these sections do not cause problem to GNU ld.
>>
>> Please note that this patch does not aim to perform the full sync up
>> between the linker scripts. It creates a base for further work.
>>
>> Signed-off-by: Michal Orzel <michal.orzel@arm.com>
> 
> [...]
> 
>> diff --git a/xen/include/xen/xen.lds.h b/xen/include/xen/xen.lds.h
>> index dd292fa7dc..ad1d199021 100644
>> --- a/xen/include/xen/xen.lds.h
>> +++ b/xen/include/xen/xen.lds.h
>> @@ -5,4 +5,104 @@
>>    * Common macros to be used in architecture specific linker scripts.
>>    */
>>   +/* Macros to declare debug sections. */
>> +#ifdef EFI
> 
> AFAIK, we don't define EFI on Arm (just CONFIG_EFI). Yet we do support EFI on arm64.
> 
> As this #ifdef is now in generic code, can you explain how this is meant to be used?
> 
As we do not define EFI on arm, all the stuff protected by #ifdef EFI is x86 specific.

>> +/*
>> + * Use the NOLOAD directive, despite currently ignored by (at least) GNU ld
>> + * for PE output, in order to record that we'd prefer these sections to not
>> + * be loaded into memory.
>> + */
>> +#define DECL_DEBUG(x, a) #x ALIGN(a) (NOLOAD) : { *(x) }
>> +#define DECL_DEBUG2(x, y, a) #x ALIGN(a) (NOLOAD) : { *(x) *(y) }
>> +#else
>> +#define DECL_DEBUG(x, a) #x 0 : { *(x) }
>> +#define DECL_DEBUG2(x, y, a) #x 0 : { *(x) *(y) }
>> +#endif
>> +
>> +/* DWARF debug sections. */
>> +#define DWARF_DEBUG_SECTIONS                      \
>> +  DECL_DEBUG(.debug_abbrev, 1)                    \
>> +  DECL_DEBUG2(.debug_info, .gnu.linkonce.wi.*, 1) \
>> +  DECL_DEBUG(.debug_types, 1)                     \
>> +  DECL_DEBUG(.debug_str, 1)                       \
>> +  DECL_DEBUG2(.debug_line, .debug_line.*, 1)      \
>> +  DECL_DEBUG(.debug_line_str, 1)                  \
>> +  DECL_DEBUG(.debug_names, 4)                     \
>> +  DECL_DEBUG(.debug_frame, 4)                     \
>> +  DECL_DEBUG(.debug_loc, 1)                       \
>> +  DECL_DEBUG(.debug_loclists, 4)                  \
>> +  DECL_DEBUG(.debug_macinfo, 1)                   \
>> +  DECL_DEBUG(.debug_macro, 1)                     \
>> +  DECL_DEBUG(.debug_ranges, 8)                    \
>> +  DECL_DEBUG(.debug_rnglists, 4)                  \
>> +  DECL_DEBUG(.debug_addr, 8)                      \
>> +  DECL_DEBUG(.debug_aranges, 1)                   \
>> +  DECL_DEBUG(.debug_pubnames, 1)                  \
>> +  DECL_DEBUG(.debug_pubtypes, 1)
>> +
>> +/* Stabs debug sections. */
>> +#define STABS_DEBUG_SECTIONS                 \
>> +  .stab 0 : { *(.stab) }                     \
>> +  .stabstr 0 : { *(.stabstr) }               \
>> +  .stab.excl 0 : { *(.stab.excl) }           \
>> +  .stab.exclstr 0 : { *(.stab.exclstr) }     \
>> +  .stab.index 0 : { *(.stab.index) }         \
>> +  .stab.indexstr 0 : { *(.stab.indexstr) }
>> +
>> +/*
>> + * Required sections not related to debugging.
>> + *
>> + * LLVM ld also wants .symtab, .strtab, and .shstrtab placed. These look to
>> + * be benign to GNU ld, so we can have them here unconditionally.
>> + */
>> +#define ELF_DETAILS_SECTIONS     \
>> +  .comment 0 : { *(.comment) }   \
> 
> This is a bit confusing. Here you seem to use the section .comment. But...
> 
>> +  .symtab 0 : { *(.symtab) }     \
>> +  .strtab 0 : { *(.strtab) }     \
>> +  .shstrtab 0 : { *(.shstrtab) }
>> +
>> +#ifdef EFI
>> +#define DISCARD_EFI_SECTIONS \
>> +       *(.comment)   \
> 
> ... here you will discard it if EFI is set. Which one take precedence if the caller use both ELF_DETAILS_SECTIONS and DISCARD_EFI_SECTION?
> 
ELF_DETAILS_SECTIONS is protected by #ifndef EFI and DISCARD_EFI_SECTION by #ifdef EFI
so the caller cannot use both ELF_DETAILS_SECTIONS and DISCARD_EFI_SECTION.

> Also, can you explain why we need to drop those sections when EFI is set?
> 
This is related to x86. Please see the commit: 7844f90abd551f6d5cd9b670b5ed8a4683258a21

>> +       *(.comment.*) \
>> +       *(.note.*)
>> +#else
>> +#define DISCARD_EFI_SECTIONS
>> +#endif
>> +
>> +/* Sections to be discarded. */
>> +#define DISCARD_SECTIONS     \
>> +  /DISCARD/ : {              \
>> +       *(.text.exit)         \
>> +       *(.exit.text)         \
>> +       *(.exit.data)         \
>> +       *(.exitcall.exit)     \
>> +       *(.discard)           \
>> +       *(.discard.*)         \
>> +       *(.eh_frame)          \
>> +       *(.dtors)             \
>> +       *(.dtors.*)           \
>> +       *(.fini_array)        \
>> +       *(.fini_array.*)      \
>> +       DISCARD_EFI_SECTIONS  \
>> +  }
>> +
>> +#define VPCI_ARRAY               \
>> +       . = ALIGN(POINTER_ALIGN); \
>> +       __start_vpci_array = .;   \
>> +       *(SORT(.data.vpci.*))     \
>> +       __end_vpci_array = .;
>> +
>> +#define HYPFS_PARAM              \
>> +       . = ALIGN(8);             \
>> +       __paramhypfs_start = .;   \
>> +       *(.data.paramhypfs)       \
>> +       __paramhypfs_end = .;
>> +
>> +#define LOCK_PROFILE_DATA        \
>> +       . = ALIGN(POINTER_ALIGN); \
>> +       __lock_profile_start = .; \
>> +       *(.lockprofile.data)      \
>> +       __lock_profile_end = .;
>> +
>>   #endif /* __XEN_LDS_H__ */
> 
> Cheers,
> 

Cheers,
Michal


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 10:28:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 10:28:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295758.503411 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ95K-0005zC-3o; Tue, 29 Mar 2022 10:28:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295758.503411; Tue, 29 Mar 2022 10:28:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ95K-0005z5-0k; Tue, 29 Mar 2022 10:28:22 +0000
Received: by outflank-mailman (input) for mailman id 295758;
 Tue, 29 Mar 2022 10:28:20 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=j5tu=UI=citrix.com=prvs=0800c0c14=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nZ95I-0005yz-MN
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 10:28:20 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f26ec7d6-af4a-11ec-8fbc-03012f2f19d4;
 Tue, 29 Mar 2022 12:28:18 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f26ec7d6-af4a-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648549698;
  h=date:from:to:cc:subject:message-id:references:
   mime-version:in-reply-to;
  bh=SCyTW+zY0eX8uV2diNAysr1b/nswO8kPY7bPEqwG4K4=;
  b=MxyYp2mfEsltXAo2xWc9/3V1asBbXCHPAdN9wvxr8t2nAx3TYjPlpVZW
   KI0DzO7qdf07oRWGMY+0p3IJzf9oP671C0dJNPDKJTCc7GHqyHfVWXj19
   W3IKg3r6fcdMsl9YIAkxpbOqAUWAcQyJrXSahc0a6AieQhqPhFUqDYiMk
   k=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 66859741
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:N4tfdKLdjPoQJrJLFE+R85UlxSXFcZb7ZxGr2PjKsXjdYENS0GEPy
 GAWUGuCbKzcYmX9fdB0OYvj9ksEsZKAydBmQAtlqX01Q3x08seUXt7xwmUcns+xwm8vaGo9s
 q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUYYoAQgsA148IMsdoUg7wbRh2dQ52YLR7z6l4
 rseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3fMldG0DQUIhMdtNWc
 s6YpF2PEsE1yD92Yj+tuu6TnkTn2dc+NyDW4pZdc/DKbhSvOkXee0v0XRYRQR4/ttmHozx+4
 NxUtp+1Vxp3BZLBvckHU0NhDwQuL5QTrdcrIVDn2SCS50jPcn+qyPRyFkAme4Yf/46bA0kXq
 6ZecmpUKEne2aTmm9pXScE17ignBMDtIIMYvGAm1TzDBOwqaZvCX7/L9ZlT2zJYasVmQ6iOO
 ptGNWMHgBLoRUZXJk4HB7EEp9ihiFncKx5Bjwqbuv9ii4TU5FMoi+W8WDbPQfSRXtlclEuco
 mPA/kz6DwscOdjZziCKmlqzgsffkCW9X5gdfJW66/prjVu71mEVThoMWjOTo/O0l0q/UNJ3M
 FEP92wlqq1a3FymSJzxUgO1pFaAvwUAQJxAHusi8gaPx6HIpQGDCQA5oiVpMYJ88pVsHHpzi
 wHPz4iB6SFTXKO9QGue9bKKsG2JBiUwAHUCPxYYaFsX2oy2yG0stS7nQtFmGa+zq9T6HzDs3
 jyHxBQDa6UvYd0jjPviow2e6964jt2QF1NuuF2LNo6wxlkhDLNJcbBE/rQyARxoCI+CBmeMs
 3Ef8yR1xLBfVMrd/MBhrQhkIV1I2xpnGGCH6bKMN8N4n9hIx5JFVdoKiN2ZDB01WvvogRezP
 CfuVfp5vfe/xkeCY65teJ6WAM8316XmHtmNfqmKMooSOscrLlHconEGiausM4bFyhJEfUYXY
 8rzTCpRJSxCVfQPIMSeGY/xLoPHNghhnDiOFPgXPjys0KaEZW79dFv2GADmUwzN14vd+F+92
 48Gb6OikkwDOMWjMni/2dNCdjgicClkba0aXuQKL4Zv1CI9Qzp/YxIQqJt8E7FYc1N9y76Qp
 yrnCxYCoLc97FWeQTi3hrlYQOuHdf5CQbgTZETA4X7AN6AfXLuS
IronPort-HdrOrdr: A9a23:hUoyl6PATKCs18BcTsGjsMiBIKoaSvp037Eqv3oedfVwSL39qy
 nOpoV/6faaslsssR0b9exofZPwJk80lqQFg7X5X43DYOCOggLBR+tfBMnZsl7d8kXFh4hgPM
 xbEpSWZueeMWRH
X-IronPort-AV: E=Sophos;i="5.90,220,1643691600"; 
   d="scan'208";a="66859741"
Date: Tue, 29 Mar 2022 11:28:13 +0100
From: Anthony PERARD <anthony.perard@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "Andrew
 Cooper" <andrew.cooper3@citrix.com>, George Dunlap
	<george.dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH] build: generic top-level rule to build individual files
Message-ID: <YkLfPZCFIIqKypmI@perard.uk.xensource.com>
References: <49190e22-c802-3830-9d4c-8e6100132687@suse.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <49190e22-c802-3830-9d4c-8e6100132687@suse.com>

On Mon, Mar 28, 2022 at 09:41:26AM +0200, Jan Beulich wrote:
> --- a/Makefile
> +++ b/Makefile
> @@ -75,6 +75,13 @@ ifeq (x86_64,$(XEN_TARGET_ARCH))
>  	XEN_TARGET_ARCH=x86_32 $(MAKE) -C stubdom pv-grub-if-enabled
>  endif
>  
> +define do-subtree
> +$(1)/%: FORCE
> +	$$(MAKE) -C $(1) $$*
> +endef
> +
> +$(foreach m,$(wildcard */Makefile),$(eval $(call do-subtree,$(patsubst %/Makefile,%,$(m)))))

Any reason to not use $(SUBSYSTEMS) instead of $(wildcard ) ? Or maybe
you would rather been able to run `make xen/foo/bar.o` even after
running `./configure --disable-xen`.

> +
>  .PHONY: build-docs
>  build-docs:
>  	$(MAKE) -C docs build
> @@ -334,3 +341,6 @@ uninstall: uninstall-tools-public-header
>  .PHONY: xenversion
>  xenversion:
>  	@$(MAKE) --no-print-directory -C xen xenversion
> +
> +PHONY += FORCE

That's a Kbuild construct which will not work here. You need to write
".PHONY: FORCE" instead.

In Kbuild, there's a ".PHONY: $(PHONY)", and various macros needs to
know what's .PHONY.


With at least the .PHONY business taking care of: Reviewed-by: Anthony PERARD <anthony.perard@citrix.com>

Thanks,

-- 
Anthony PERARD


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 10:31:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 10:31:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295762.503423 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ98Q-0007LQ-J3; Tue, 29 Mar 2022 10:31:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295762.503423; Tue, 29 Mar 2022 10:31:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ98Q-0007LJ-Fl; Tue, 29 Mar 2022 10:31:34 +0000
Received: by outflank-mailman (input) for mailman id 295762;
 Tue, 29 Mar 2022 10:31:33 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=kdRh=UI=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZ98P-0007LB-Gi
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 10:31:33 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 66a967e6-af4b-11ec-8fbc-03012f2f19d4;
 Tue, 29 Mar 2022 12:31:32 +0200 (CEST)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur03lp2059.outbound.protection.outlook.com [104.47.8.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-22-i1otViIXN5Gb0opHsT97Og-1; Tue, 29 Mar 2022 12:31:30 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by VI1PR04MB7150.eurprd04.prod.outlook.com (2603:10a6:800:12a::17)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.22; Tue, 29 Mar
 2022 10:31:29 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%5]) with mapi id 15.20.5102.023; Tue, 29 Mar 2022
 10:31:29 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 66a967e6-af4b-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648549892;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=cT/vVok2+RUMJXVusQ5sLDu+mraVRC1gf3nhxxO5/DM=;
	b=AJ2We13/Jz39+6v4CeX+qLX9CTy3XKL/VDwBUfVTFmoJUhrFdJTjaIgtn+fbFgDBrMpfF2
	wB8h1UQeJ4m8ycx42mY75OTk8rvHRmmlxBSjsFZ5gd0kOeNKRvljsc9172DCKxJ72wUOJF
	uPJni2wQ5TbHbp1xCWOW+1QxAbNmM14=
X-MC-Unique: i1otViIXN5Gb0opHsT97Og-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=KuKB687DKjzX4SPjyDI+Y7SPDJwsirsz3BenJhv4hdIahipq7BWZrznZ6f5+HiNRHiCltTCAWlc1wXjmvcF0BZMsZqh/kL7qY0/dNIoUVhFFu1W5+X93+fCvGSGtUYB8I21Ln1eF47Xel4lNVX5AsRHEt7F5VxCXIngP9G5Qv/2L1Mo50kR5pV+1pTj+mm/35QOCFerSWMWfaW9moXXi4fQ52KtO9cYsO9mBjayO5zPv8zW02KNcIK9dqb3Sor+QBeS32SSsEX44LzxJonT2qOjJPuK3mGvuHzMXslDSERaksy3e+xnoWsiQYj8Vbr7+uxuA8QJ+1mNprbX2LCkW9Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=cT/vVok2+RUMJXVusQ5sLDu+mraVRC1gf3nhxxO5/DM=;
 b=AtYwlhdjXXZHComupOCJckK6XkFdO6qxzF6uqQ63y0NFg9irYbPRXY7jgGzr/enK8JcfKK14QFF60qTw2eN0BorC2T9AULeCYOCjV0xD1TNnG2N6Fhq6o0SU6DbwqN4ud6P375ll1T1rIRWF+rkWlYYd7wB7mRS53RWbV7sCun6o0j3rRtVhJAm56Xfd8Ua1uXUSk6f6KBDyZ7m+RemhwgwGWZ5pJDCBT/pmhEaERDX/e1pVOOHGHJonz5o8OR0VtZ2hs292xzLDT8VCD7q+YSEbTTLmdo52obE3FtpvSMEa44f7LKa2Rbj9hwd3mdaHxcGCDD+w6Sqj3Kmq5MC+pQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <a4e5b460-6067-1376-3759-bccb68e63c74@suse.com>
Date: Tue, 29 Mar 2022 12:31:27 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2 2/2] xen: Populate xen.lds.h and make use of its macros
Content-Language: en-US
To: Michal Orzel <michal.orzel@arm.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>, Julien Grall
 <julien@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 xen-devel@lists.xenproject.org
References: <20220322080233.53134-1-michal.orzel@arm.com>
 <20220322080233.53134-3-michal.orzel@arm.com>
 <dbcd0509-6a8a-db5d-bad7-69027256f053@suse.com>
 <7feea62a-c467-560e-5b4e-630996e8f39d@arm.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <7feea62a-c467-560e-5b4e-630996e8f39d@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8PR07CA0040.eurprd07.prod.outlook.com
 (2603:10a6:20b:459::11) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 095daafe-5f9c-46ae-6acd-08da116f4943
X-MS-TrafficTypeDiagnostic: VI1PR04MB7150:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB7150267715CF2C652BECA728B31E9@VI1PR04MB7150.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(508600001)(54906003)(38100700002)(316002)(186003)(6486002)(86362001)(2616005)(2906002)(26005)(31696002)(66946007)(8936002)(7416002)(66476007)(8676002)(6916009)(31686004)(66556008)(6506007)(83380400001)(36756003)(5660300002)(4326008)(6512007)(53546011)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?ZERkbVVuMGsyRSs1VlhoczdrQW5icW16L2FkVVowb2lOakdRVWlpc1ZsSFFU?=
 =?utf-8?B?SWtoSXpLQ3p1QVJReEwvdjB1aXowWmVtRC9LZ3JzdTh6bFI4WVFWbVlDSHlF?=
 =?utf-8?B?QzdVR2VvVzRTRnBsSUJBZm9pd1VlTUVMbkVnNForUU5Rakd2NU5iY3ovdXBn?=
 =?utf-8?B?RW1odlFyekE5N2hFZ3pDekVrMVFxUk9SaTVPR3pGU1ZXQWYrUy9oS3JoZ3Rl?=
 =?utf-8?B?Y0xWUytGSW16S2ZibjRUR080N0RxRGFid3FYVlRFL21FQTdxTFJoRkdUVUdC?=
 =?utf-8?B?STVoV3lZYTFvR1NBeGRtZTNrMytXZ2s2dTduWkd0UDRTLzFPcmZXMXo2YkIv?=
 =?utf-8?B?WXorNURWUjQ2NXdWSUJJSWZkK1c2bi9hM2h3dmh6RDVjT1Y3Um1obXp0Mld2?=
 =?utf-8?B?VzYwOUJJTDJ4RGp5R0dHRDNxL08rKzlxSm5yajUwM1JVRkF3citMeS9ONHJ4?=
 =?utf-8?B?dTRGOS9wSmhSN2VTa3cvak5tRWZCOHV0WitYRUhZc3dYT09tTlNPR0V2UDE3?=
 =?utf-8?B?QjN1VUFDK1RXMlBudTJ4ejA3cGc5T0NyVzEvNVdhYnI3UzFBL1VucGowbis0?=
 =?utf-8?B?T2U0QUQ2bTNiVTlWSmdyT2c2aFpRblAxajlUOHFkOUQ2dFo1a2VQSmExajE1?=
 =?utf-8?B?VUVwZ210ZnJHZmllcmNzSEtEbUF6bURkeHEwNWEyMm5MbktvTWk0WmM0VkFl?=
 =?utf-8?B?NEUrMTVDZG53TkE2TTdtdDZINHcybTZTR0xhWEVjaExxSUE3OEoyQW0ybzdu?=
 =?utf-8?B?cWJHcytacmNBSE4ydTdTOTYvL054aHN0end3RXljendTOWo3YzlmSDRoRGh2?=
 =?utf-8?B?aDhFVC9tZEJoeFpZMTd6Qy9JTXFNNmk5TzFNS1JQaVdRQU1ad2NJalY5Rkti?=
 =?utf-8?B?TmVBTHBrSVd2STd6Z3hwUWhESlA4RGhNMWRPeEJYUnViZjNTUGhKckVvMk5L?=
 =?utf-8?B?WWE0d1dRWVRvdlFNTTl2bXAzMk5QMVdRTi9semdERGtnWmdRR3plRng0c051?=
 =?utf-8?B?NGQyY2NzdG1JYVBiR0YwUGlEeTBkb3F0WGdhRUdZakZKRDFnS2lqejlkWklz?=
 =?utf-8?B?cFFWeDFBRUhpbmF2M09xcXVHbjgxQXo3R2tkbG1lU2V5aGFoN2lVYmxOdjNw?=
 =?utf-8?B?N2Y3dnBVYnF1YlpZb1N3TmlxTFdLSXNBdWdGQks5OFZabXRnbkpxMlY1OGVr?=
 =?utf-8?B?T1U1RXJPQWphaE94dGE2THVSQ01wVVNLTVc3ZE1XZWY2RW9XT05ja1hZV2JB?=
 =?utf-8?B?NUVFYmNhV3JBdTVUVlhkak41dGZaRFowSWdYNnNjZHZvMkltTkJnUXBKNndw?=
 =?utf-8?B?MDNrcnlqNzF3Y1h4emZxNjI2T1U5OWoxMld0b3VLMGJaMndJd211dGVVaGZN?=
 =?utf-8?B?amRQb3JlRFV5L3hLQVlZVTZvTXFPNzNBRXNLM2NpYjZodlloOGhnVDdpU0JS?=
 =?utf-8?B?dENVcUdidi80Vis4YVNhT0pFUDRkMEhPVnJ6bzBmdmJyOCs5VjF3TmJBeTM5?=
 =?utf-8?B?bWdpZWRWMkdQZkhLUnlYZldYTytQMktkTFFTSk1PY3VZNHA4dS9PNHB2ZU9v?=
 =?utf-8?B?YnNvUkxvZjdCeUIxMi9jeGc1WHU2c09RY3JnekZwYk1KZHFJRGlZNjNPYytV?=
 =?utf-8?B?NmFNazdLU3I1VFZpYnBMeUJrMnkzYm95UndxT0NvRkdSUkFKNWx3M1VqN3BM?=
 =?utf-8?B?Qk5ubXg5aFpBSW1haDZLSzg3cjg1cnFzVm1icSsxUTZZbnZxelpvbWh0RUlz?=
 =?utf-8?B?NWJaSms5ZzhwT0JheU5lQlZPNyt0MjVRTm5EVFp0Z2lCQkNQdzdIUVF3RnYw?=
 =?utf-8?B?c2NUc1dMbTh2anRwQ2lOTDBqclhDV0FGa01DbUwyQnhoZ0lxTXk5cXplbTJH?=
 =?utf-8?B?WitTMUlyUU5rQnd6YWtCR3ljYkRRK3hqQUJ4Vmx5dFdnOHBPY3lWbnVaT0Nm?=
 =?utf-8?B?THJpSjVSRCtmc3cxQ0FHL0d0dWtmSTNQd0xReXdlcGxsNXpIcXE0VjQvd1Bt?=
 =?utf-8?B?QUxSU1BJNHcvd3Roa0prNjRLOThqT3JBa2VUQ2FiNWs0UlYva0ptQlh1dGlV?=
 =?utf-8?B?Qlh4Y25QU1VDV21sekZkaU5wMVloc1JvSm1YNm9yWnhpOGxVVFk0Ymo1aEpO?=
 =?utf-8?B?VFZnVHVhcHpiREVlbms0eEE2ZzF5b280aEpnRTNuekUyaVVBUDU3aXpKUEVI?=
 =?utf-8?B?VkxtbVZ1QWs0VmJmeEFMOXJxenNLSkxTK0JXMk9abi9KQ3ZEY2FObDVHTGQr?=
 =?utf-8?B?cHFodng0N3hPenllUXZrbnJvYjh2eS9tQ2JjMktkcE9aWFo0NlZVUzQ5bWhT?=
 =?utf-8?B?SGNGMVVBYTcvLzZZQldLMXp1TlVRSGwzTDBzRzk5NTlCajJLY21Fdz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 095daafe-5f9c-46ae-6acd-08da116f4943
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 29 Mar 2022 10:31:29.5481
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: f24AZxJriPHhxBG8HwBytQY0J6r23ZWEafu3nrUyj1grKH2xvxsLywg2qGI2ipzYv7Rn91lLEJaE0dCeJofDBA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB7150

On 29.03.2022 11:37, Michal Orzel wrote:
> On 29.03.2022 11:22, Jan Beulich wrote:
>> On 22.03.2022 09:02, Michal Orzel wrote:
>>> --- a/xen/include/xen/xen.lds.h
>>> +++ b/xen/include/xen/xen.lds.h
>>> @@ -5,4 +5,104 @@
>>>   * Common macros to be used in architecture specific linker scripts.
>>>   */
>>>  
>>> +/* Macros to declare debug sections. */
>>> +#ifdef EFI
>>> +/*
>>> + * Use the NOLOAD directive, despite currently ignored by (at least) GNU ld
>>> + * for PE output, in order to record that we'd prefer these sections to not
>>> + * be loaded into memory.
>>> + */
>>> +#define DECL_DEBUG(x, a) #x ALIGN(a) (NOLOAD) : { *(x) }
>>> +#define DECL_DEBUG2(x, y, a) #x ALIGN(a) (NOLOAD) : { *(x) *(y) }
>>> +#else
>>> +#define DECL_DEBUG(x, a) #x 0 : { *(x) }
>>> +#define DECL_DEBUG2(x, y, a) #x 0 : { *(x) *(y) }
>>> +#endif
>>> +
>>> +/* DWARF debug sections. */
>>> +#define DWARF_DEBUG_SECTIONS                      \
>>
>> May I suggest to call this DWARF2_DEBUG_SECTIONS, to make clear no
>> Dwarf1 section is included here (and we also don't mean to support
>> such debug info)?
>>
> As this list is not full I thought we are going to add DWARF1 sections one day.
> DWARF2_DEBUG_SECTIONS would mean that we list sections only from DWARF2 which is not true
> as we have sections from DWARF3,5, etc. 
> Maybe we should leave it as it is but modify the comment to state:
> /* DWARF2+ debug sections */

Well, yes, but only in a way. Dwarf3 and later are simply extensions
of Dwarf2, whereas Dwarf2 is not an extension of what originally was
called just Dwarf and now is commonly referred to as Dwarf1. I'm
fine with a comment saying Dwarf2+, but I'd like to not see the
construct be named just DWARF_*.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 29 10:32:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 10:32:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295765.503434 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ99S-0007ua-TK; Tue, 29 Mar 2022 10:32:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295765.503434; Tue, 29 Mar 2022 10:32:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ99S-0007uT-Pe; Tue, 29 Mar 2022 10:32:38 +0000
Received: by outflank-mailman (input) for mailman id 295765;
 Tue, 29 Mar 2022 10:32:37 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ99R-0007uA-1A; Tue, 29 Mar 2022 10:32:37 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ99Q-0005DZ-UE; Tue, 29 Mar 2022 10:32:36 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ99Q-0004rI-Fg; Tue, 29 Mar 2022 10:32:36 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ99Q-0004gm-FE; Tue, 29 Mar 2022 10:32:36 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=42rFiqjHQ9A2c7FAmb2+AS2zhBC91Q+vUsKwouI5b/w=; b=oSR7RPcuHmlRYORkz0nJXcfYJV
	j/YQG/Mttxp6eulr82Urp9ZWGQmc0OA0sSdSNdLJScNTIeS2sbErgLA8R0vLZTeOJJNe1VVHgS0Rl
	xnAwc+fgpAOfvtgHc7c8tRqm91r4gC6LslT74EWFD4Fi4RwoCPUzkJ2UB2OfigJGJ4hU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168969-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 168969: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=c1ae54ad2edbf8cce44822c6abd013c74e42c690
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 29 Mar 2022 10:32:36 +0000

flight 168969 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168969/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              c1ae54ad2edbf8cce44822c6abd013c74e42c690
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  627 days
Failing since        151818  2020-07-11 04:18:52 Z  626 days  608 attempts
Testing same since   168969  2022-03-29 04:18:59 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Claudio Fontana <cfontana@suse.de>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Haonan Wang <hnwanga1@gmail.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  John Levon <levon@movementarian.org>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Martin Pitt <mpitt@debian.org>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Paolo Bonzini <pbonzini@redhat.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tom Wieczorek <tom@bibbu.net>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 102385 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 10:37:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 10:37:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295775.503445 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ9EB-0000BM-Mj; Tue, 29 Mar 2022 10:37:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295775.503445; Tue, 29 Mar 2022 10:37:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ9EB-0000BF-J3; Tue, 29 Mar 2022 10:37:31 +0000
Received: by outflank-mailman (input) for mailman id 295775;
 Tue, 29 Mar 2022 10:37:30 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=kdRh=UI=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZ9EA-0000B9-Lx
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 10:37:30 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3b57575e-af4c-11ec-8fbc-03012f2f19d4;
 Tue, 29 Mar 2022 12:37:29 +0200 (CEST)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2172.outbound.protection.outlook.com [104.47.17.172]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-41-NUiCiBT4Mt-s93LiDB0L9Q-1; Tue, 29 Mar 2022 12:37:27 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by DBBPR04MB7705.eurprd04.prod.outlook.com (2603:10a6:10:209::23)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.22; Tue, 29 Mar
 2022 10:37:25 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%5]) with mapi id 15.20.5102.023; Tue, 29 Mar 2022
 10:37:25 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3b57575e-af4c-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648550248;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=39ONaxOkD0qny6Fxuyogw1JKeMfuDg3BuyR738VenmQ=;
	b=QITU0wGuxLauy+QzTZo9Iy8TTcVXMdqqWCixarZM3FPPwDrT8STfAP3EemHr8NsGC360ma
	+VZvvODi79dgkMqArdhdp4r29FNmHi58HT3zHr6Y3k5qmMJFO98F/rAhIB3GDRU25n/WIz
	gMER195KLmDZPeaiCyL0+nEHvz5M600=
X-MC-Unique: NUiCiBT4Mt-s93LiDB0L9Q-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=GLMsHg0V+02M7t/KA1q+A3K+LSswpGwFMThXf3ApiJg2nSbAvTFirO2Jxtc933MArq7vlKZrcqAJqOU0IWc0ZJrsqmBeK3QO1U8GxD4QRCMYI4NZaVY1B/uqmvcOGf8Ve3HB6pGQLKT/Sg2BW6bcQp0pYCsjiBc9nABOYLva9uT+P5mzswI13egSuDJvJCl7MU7WQtXWQjevG+Vd768DjLEdQCbWGzT7cqzsxd90zbgvZ6D4w1YFONHueuNkW8nY/V92rhNfANKNlF8vV6EGt+z9jDSv22SDIZd3DF9p8uaHzNrcRVpGPb+arHOurk3ciJ+pkUZloMsL+ZRXkWCoJA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=39ONaxOkD0qny6Fxuyogw1JKeMfuDg3BuyR738VenmQ=;
 b=d0edbJB/ugE8BjG/U3YskOZttsdfKzIgyhSDCvl3OpMZXPxkHFb5OwwdO5sm+XX2tUMJgphN4A1V+tNRQ7V9LoTZRfVprCNH6+BWr1hn7ncoMNkl3DsIcmzj0sZNgiA44wNxVREEdIevmwKBYHmakaPRTKds39xwdH+X9rN0szL8SaFO7u7W4Xj2BVCjiWVVk5dB2vO+XXOxBq+OQG8rsbExw6zyxHWnBhAXpdK8gw54j7T+42UmSP2ArqtTWAzfdkYaD60xRsez/uOpNKpgSmcEHdtce52JA7mt3kqjqgc0Tu/oEPrD8OC5kfd2yVdWwhV348JYz7AjwIXag663Ww==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <293aa4e4-ac6b-2446-ea78-986014993e89@suse.com>
Date: Tue, 29 Mar 2022 12:37:23 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2 2/2] xen: Populate xen.lds.h and make use of its macros
Content-Language: en-US
To: Julien Grall <julien@xen.org>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Michal Orzel <michal.orzel@arm.com>, xen-devel@lists.xenproject.org
References: <20220322080233.53134-1-michal.orzel@arm.com>
 <20220322080233.53134-3-michal.orzel@arm.com>
 <2940b4c8-5d44-695e-4550-0a32c3a4c053@xen.org>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <2940b4c8-5d44-695e-4550-0a32c3a4c053@xen.org>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM5PR0201CA0021.eurprd02.prod.outlook.com
 (2603:10a6:203:3d::31) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: a8a6e9c6-0a7d-4d20-fc63-08da11701d8f
X-MS-TrafficTypeDiagnostic: DBBPR04MB7705:EE_
X-Microsoft-Antispam-PRVS:
	<DBBPR04MB770585076684708006BC0136B31E9@DBBPR04MB7705.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66476007)(508600001)(66556008)(83380400001)(53546011)(54906003)(5660300002)(6506007)(86362001)(6486002)(31696002)(6916009)(6512007)(2906002)(26005)(316002)(4326008)(2616005)(8676002)(186003)(66946007)(8936002)(36756003)(38100700002)(7416002)(31686004)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?eE8zY3hGbEJSbXJoZ0lEMEc4MjZISGI0bWlmbjV4a2ZwN1ZPazlGT0R5L0Q2?=
 =?utf-8?B?K2RzOHNBZ3NocXNmbHNjUVI4QlJFV3ZiUi9LL2s1VG1WMS8yZmlVU0wvZXlW?=
 =?utf-8?B?d1QzR2xxTW1aS2hpRnFrcTF2eWFzd3lCc1RiWlUrTUtMdU9TUStKMzN2eUVB?=
 =?utf-8?B?YnBIMTdKNkloYVBoU1JQR1ZzS2ZtMCsxRnVQT2VKYjBqVjUzV1dWVGxVQUtt?=
 =?utf-8?B?ZVB4OTF4T0JybGxpaXBWbW1OaXY2RS9jZHVGQUxTZGhHUnE5UTdLZ1BWOTBm?=
 =?utf-8?B?VFRBK0tUcmUvdGVyeGF5Sm1wZUxnN283WjkyOFd4c28wWXhhWVZhejh5azZp?=
 =?utf-8?B?ZHBvZW9ZT01GQ3dqZEZnNWZoNmVydWFmdXZiMXpPczhkYjc0WFJZZ2pkZmhq?=
 =?utf-8?B?RHJtVTFtaGUrQSs2cUVHaWViRHJ6RVl0dkJWRVVRUWlLdEZBamx2VGFhNHlV?=
 =?utf-8?B?M2JzNEVxSGZoVmRCVTNDRVU0aEc2dy80SDZWbmlxSmZ0VEV0MXBld3JkV2ph?=
 =?utf-8?B?bEV6S3haUTJCWVE3ZE84RDdwcjB5WkxpeDNZeFJyNkVMUnFjL1FLcDV5UUdZ?=
 =?utf-8?B?UCtRME1JMmlVYmJ6Z1QrQlVPU0dFRnFoOTUwUENQMDZyc29wUFgzT042SWZx?=
 =?utf-8?B?aGR5RHRLWE5uMG1SQ2F5NnJ0emtQbDlvTHI0ZGx6NzV1Ym9LVmM1MVRORlFC?=
 =?utf-8?B?Y09qT1VBZVRnRzhtcnN1Smo3WkRrSDVyNmhRZnJBZUlMOWU5VWx1TU5sVVVU?=
 =?utf-8?B?MzBoa3FaS09QR2tRV2VBMnJpZGpXTlpNcjA3bHlraklPZ3RPQm04RlJ1WTVQ?=
 =?utf-8?B?QjUzTTdUaktBUUMzejUzaElGdFVSRzNYTUVFUnFycXVHUXloVlU2WEQvOFJu?=
 =?utf-8?B?VlJscTdoenQwbHJTSnU1S2pqSEFqWG5ZK1lIY003M3RxUUd5aFlPb01LS2ph?=
 =?utf-8?B?dy9MbFI0YzFQSFVqUXJENmFod1p3QnRud0xKS1hpYkJjYjlTOHRzVGUvelZ6?=
 =?utf-8?B?S2pvUXdvWmQrMzNsYllkTklzVE9ybEJqekQ3aHI2aUlET0xOM3N6TUNlZmwy?=
 =?utf-8?B?TERFZjVaQ2hyenFlQkorcWRqRHh3bllrNHFvUVZqTVBndGE2cEFVTUZxWGNB?=
 =?utf-8?B?ajNCSDlMK2FlS3ZrU2w4MThBcU9oNE90VXIzbmNBdnNQOHpZT3UwdzcrZGNR?=
 =?utf-8?B?ODB4Y0txbzNjeVhuRWNqRmxoeVdrQW9DYjV5NFlya2FZS1YxNUpTekhjV1RZ?=
 =?utf-8?B?ak9uNHFHZkNKTzF3Nzd6VEhCUEVaMnRUamxldGpEY2VJTXZHZ0tac3JEeHY4?=
 =?utf-8?B?T1BORFNwcHRybitTSjhmMXpETlBaMG1wRTJzeFgxaDVmeWxyWHFtZERwMkxG?=
 =?utf-8?B?bWdzdWNZa0lXQXlKM3dSTHR2ZmlFKy91RVNIaEJncHc2RWlZMzBySGcwc0pB?=
 =?utf-8?B?OGpsalRUVHVXeS9HSExXdTVYLzU1UVVSVzg2TGJ6elRrV0V2THQxYlk0VGE2?=
 =?utf-8?B?Vmo4b2RadGlJYW1FNlh5UjlSb09RUUNYdHoyK0txclhQNGFjYXdvRmhtcU1s?=
 =?utf-8?B?OXFyZW5YcFJJeXdpcHRWOU9QZXU4WllLMzA2T05USEtsSkxrQlFhTmlRSXJV?=
 =?utf-8?B?MlFJN1puVEpNSHVzSTlidytwbDJyTUlEM0lFNEJQRzRoWlh1eUF6TWYxMEFu?=
 =?utf-8?B?clUrUUhUYThDenVSb0srdVRKQytyMFZTam1SOFFoNW9aT2NUZUtwK1JYZEo1?=
 =?utf-8?B?Qy9JQWxaTmpSaTArQ1dFVCs3OUtJQkJVbFEyb2tJRkZobDhqelhyRkd4ZCtS?=
 =?utf-8?B?S3kyeWM2UDlRZEIrMGhxWWJSOHVMWWFpRzAwSUJ0ZXRVUjBQN3Z1QjVnVnY5?=
 =?utf-8?B?UnBvV3pkSW5rK3pHMUQzQW0zM05UQStNU0FUZ0R4YVh3b3RaS0lrZ09FQjBY?=
 =?utf-8?B?L0hUaDU5ZDVUREl4d3NJcW80TXUwVFI3VWZ2QWNxYXZaK0VhNElQQWllRnl2?=
 =?utf-8?B?K1IydlR4NEgwNFhIdEI4WDhhM3g5VWVHZVhGYk8wRWZvZVRMYTZvc01pYlJE?=
 =?utf-8?B?MkdhZUh4U1o5RGJPU0tWZEEwNzB4YStpNkxMbXluakhuTzVSWks4TStyWmcy?=
 =?utf-8?B?b3lJclVNa2lFaHc4bXROMlNFYU5IY1RnOFA3NWV3ZFU5Sko0Z3lZc2lSZWZB?=
 =?utf-8?B?eDdGTnFEL21FcEtnc0psRXE2S3NNajlUUHQ3R2NRVVMrSmxkU3g1U1lSRmQr?=
 =?utf-8?B?SVZHMmJ1Q3FnZkNBQTBGMHl3UlpYUmx0SVZSQXRTWk9wdVZJS3R3VW9BVldN?=
 =?utf-8?B?bDFua2xkWHlkT2JKYjI2M043blVQam5jZ3hTUXkwVXpod1llelpaQT09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a8a6e9c6-0a7d-4d20-fc63-08da11701d8f
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 29 Mar 2022 10:37:25.7581
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: uVVuL3Q3AgeJjNrwx1KA4qiC4FxfELmb6xMmX1JnYiYqijzbBD5c9G/1SECgMSeW7EkD2KD8lkizfhNLFbP0/A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR04MB7705

On 29.03.2022 11:54, Julien Grall wrote:
> On 22/03/2022 08:02, Michal Orzel wrote:
>> --- a/xen/include/xen/xen.lds.h
>> +++ b/xen/include/xen/xen.lds.h
>> @@ -5,4 +5,104 @@
>>    * Common macros to be used in architecture specific linker scripts.
>>    */
>>   
>> +/* Macros to declare debug sections. */
>> +#ifdef EFI
> 
> AFAIK, we don't define EFI on Arm (just CONFIG_EFI). Yet we do support 
> EFI on arm64.
> 
> As this #ifdef is now in generic code, can you explain how this is meant 
> to be used?

The identifier may now be somewhat misleading, yes - it has always meant
"linking a native EFI (i.e. PE/COFF) binary". The equivalence "EFI binary"
== "EFI support" has long been lost.

>> +/*
>> + * Use the NOLOAD directive, despite currently ignored by (at least) GNU ld
>> + * for PE output, in order to record that we'd prefer these sections to not
>> + * be loaded into memory.
>> + */
>> +#define DECL_DEBUG(x, a) #x ALIGN(a) (NOLOAD) : { *(x) }
>> +#define DECL_DEBUG2(x, y, a) #x ALIGN(a) (NOLOAD) : { *(x) *(y) }
>> +#else
>> +#define DECL_DEBUG(x, a) #x 0 : { *(x) }
>> +#define DECL_DEBUG2(x, y, a) #x 0 : { *(x) *(y) }
>> +#endif
>> +
>> +/* DWARF debug sections. */
>> +#define DWARF_DEBUG_SECTIONS                      \
>> +  DECL_DEBUG(.debug_abbrev, 1)                    \
>> +  DECL_DEBUG2(.debug_info, .gnu.linkonce.wi.*, 1) \
>> +  DECL_DEBUG(.debug_types, 1)                     \
>> +  DECL_DEBUG(.debug_str, 1)                       \
>> +  DECL_DEBUG2(.debug_line, .debug_line.*, 1)      \
>> +  DECL_DEBUG(.debug_line_str, 1)                  \
>> +  DECL_DEBUG(.debug_names, 4)                     \
>> +  DECL_DEBUG(.debug_frame, 4)                     \
>> +  DECL_DEBUG(.debug_loc, 1)                       \
>> +  DECL_DEBUG(.debug_loclists, 4)                  \
>> +  DECL_DEBUG(.debug_macinfo, 1)                   \
>> +  DECL_DEBUG(.debug_macro, 1)                     \
>> +  DECL_DEBUG(.debug_ranges, 8)                    \
>> +  DECL_DEBUG(.debug_rnglists, 4)                  \
>> +  DECL_DEBUG(.debug_addr, 8)                      \
>> +  DECL_DEBUG(.debug_aranges, 1)                   \
>> +  DECL_DEBUG(.debug_pubnames, 1)                  \
>> +  DECL_DEBUG(.debug_pubtypes, 1)
>> +
>> +/* Stabs debug sections. */
>> +#define STABS_DEBUG_SECTIONS                 \
>> +  .stab 0 : { *(.stab) }                     \
>> +  .stabstr 0 : { *(.stabstr) }               \
>> +  .stab.excl 0 : { *(.stab.excl) }           \
>> +  .stab.exclstr 0 : { *(.stab.exclstr) }     \
>> +  .stab.index 0 : { *(.stab.index) }         \
>> +  .stab.indexstr 0 : { *(.stab.indexstr) }
>> +
>> +/*
>> + * Required sections not related to debugging.
>> + *
>> + * LLVM ld also wants .symtab, .strtab, and .shstrtab placed. These look to
>> + * be benign to GNU ld, so we can have them here unconditionally.
>> + */
>> +#define ELF_DETAILS_SECTIONS     \
>> +  .comment 0 : { *(.comment) }   \
> 
> This is a bit confusing. Here you seem to use the section .comment. But...
> 
>> +  .symtab 0 : { *(.symtab) }     \
>> +  .strtab 0 : { *(.strtab) }     \
>> +  .shstrtab 0 : { *(.shstrtab) }
>> +
>> +#ifdef EFI
>> +#define DISCARD_EFI_SECTIONS \
>> +       *(.comment)   \
> 
> ... here you will discard it if EFI is set. Which one take precedence if 
> the caller use both ELF_DETAILS_SECTIONS and DISCARD_EFI_SECTION?

Given the above explanation I think it's clear that only one of the
two may be used at a time: ELF_DETAILS_SECTIONS when linking an ELF
binary and DISCARD_EFI_SECTIONS when linking a PE/COFF binary.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 29 10:52:05 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 10:52:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295779.503455 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ9S2-0002Vd-Vm; Tue, 29 Mar 2022 10:51:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295779.503455; Tue, 29 Mar 2022 10:51:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ9S2-0002VW-Ss; Tue, 29 Mar 2022 10:51:50 +0000
Received: by outflank-mailman (input) for mailman id 295779;
 Tue, 29 Mar 2022 10:51:50 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=R1vv=UI=citrix.com=prvs=0801e2fd5=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nZ9S2-0002VQ-0h
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 10:51:50 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 3a0b6541-af4e-11ec-a405-831a346695d4;
 Tue, 29 Mar 2022 12:51:47 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3a0b6541-af4e-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648551107;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=dE1ly2xcaqZbUNHms7lhA1jhAVMQCzdoJ8s75A0kDvQ=;
  b=ZB9zTa89rkdlmIfmOj84OJx9fBLG9npt+eboz4n81LDg2gda6WTIxApG
   NRnRXtTTHeBeicaBTAbvsGc1Q7Bwoj4poSS+7DEvOBA6aXbf/3sOcIyWE
   aT4PZYi3EqPTEAwpZaOX841p9Icj4tWkq6EtpsJ1bxzI5MAqJVkD5AyXE
   U=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67428330
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:Ghheu6gL46UEsfl0piFL67Y3X1614xAKZh0ujC45NGQN5FlHY01je
 htvXjqFP/eNN2v9fI1/bYi1oEhTvpHUx4c3SAZtqyk0Fn4b9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFnc4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YV8kEIbNm+FBbwJjFBNAOKgYyu6AI2fq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bkmtnwjzDS+4vXLjIQrnQ5M8e1zA17ixLNaiBO
 5BJMmE3BPjGSzwfAFgnDakdp72DilulfRlxpwifvJNitgA/yyQuieOwYbI5YOeiQMxPm0+Cq
 2Hu/mLnAwobPtiS1TqE9H23gubF2yj8Xeo6BLC+s/JnnlCX7mgSEwENE0u2p+GjjUyzUM4ZL
 FYbkgIyoKMy3EuzQ9/3RBH+p2SL1jYQWd94Fuw85BuK1uzT+QnxLmMGQz1McvQqtcI2TCYmk
 FnMhZbmQzdotdW9RX+Y95+Vqy2zIikfKWIeZS4CQhAB6tOlq4Y25jrKR8xgVq24ksH4HzDr6
 yCR8CE6g/MViaY2O76TpA6dxWj2/96QE1Bztl6/sn+ZAh1RPIOLTI2r7ATn9s1HHricSwez7
 T8GhJ3LhAwRNq2lmCuISeQLObim4feZLTHR6WJS84kdGyeFoCD6I90JiN1qDAIwa5tfJ2e1C
 KPGkVkJjKK/KkdGekOej2iZL80xhZbtGt3+Phw/RoofO8MhHONrEcwHWKJx44wPuBV3+U3cE
 c3CGSpJMZr8If49pNZRb71BuYLHPghkmQvuqWnTlnxLK4a2an+PUqsiO1CTdO0/567siFyLr
 4YDb5TQkUsEDr2WjszrHWg7dwpiwZ8TX82eliCqXrTbfloO9J8JVZc9Po/Ni6Q6xv8Ix48kD
 1m2W1NCyUqXuJE0AV7iV5yXU5u2BcwXhStiZUQEZA/0s1B+MdfHxPpOLPMfIOh4nNGPONYpF
 pHpje3bWa8RItkGkhxABaTAQHtKKU3z3FnUbnP/CNX9FrY5LzH0FhbfVlKH3AEFDzattNt4p
 Lul1wjBRoEESRgkB8HTAM9DBXvr1ZTBsIqeh3f1H+Q=
IronPort-HdrOrdr: A9a23:dtU5sKG3migwYTBBpLqFCpHXdLJyesId70hD6qkvc3Nom52j+/
 xGws536faVslcssHFJo6HmBEClewKnyXcT2/htAV7CZnichILMFu9fBOTZsl/d8kHFh4tgPO
 JbAtRD4b7LfClHZKTBkXCF+r8bqbHtmsDY5ts2jU0dNT2CA5sQkTuRYTzrdHGeKjM2YabQQ/
 Gnl7V6TnebCDwqR/X+IkNAc/nIptXNmp6jSRkaByQ/4A3LqT+z8rb1HzWRwx9bClp0sP0f2F
 mAtza8yrSosvm9xBOZ/2jP765OkN+k7tdYHsSDhuUcNz2poAe1Y4ZKXaGEoVkO0aqSwWdvtO
 OJjwYrPsx15X+UVmapoSH10w2l6zoq42+K8y7uvVLT5ejCAB4qActIgoxUNjHD7VA7gd162K
 VXm0qEqpt+F3r77WvAzumNcysvulu/oHIkn+JWpWdYS5EiZLhYqpFa1F9JEa0HADnx5OkcYa
 VT5fnnlbdrmG6hHjDkVjEF+q3uYp1zJGbKfqE6gL3a79AM90oJjXfxx6Qk7wM9HdwGOtx5Dt
 //Q9dVfYF1P78rhJ1GdZU8qOuMexrwqEH3QSuvyWqOLtBzB5uKke+y3IkI
X-IronPort-AV: E=Sophos;i="5.90,220,1643691600"; 
   d="scan'208";a="67428330"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=CNagokudkJ1hHuX7hUaOXnbHeGxBjIn2GGh4EJhlkOZPdoQA+VuJrWCx1wlO6DgLFLcdWgREE+59ePdM1C696gINymbA8zMFhuHQ4HsiPdyME7WSbWwH5p6SARV2msiEdUmSwSmszDaSAXmVbxZFToyM5ScrSJCm+d5Bd3cXaMdBOA/ADbSN/0r5MqX3cQsGL84M5/897uUKEo5eFLQQgCcehEiIHpmdKVBlb5Cf/4Xr+J3T1QyFEOuPI1/yMQmzwLAo1Lo1cqG3te3SsQn0GksHREJSaOS7oqgZvkO0Jc7UYWAQfJU1MeYTpXadNSyqoR6VFQJ/CNGbcftD1NKgpg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=fgWNT3f9WMZmxjpQ+LpATbVnyx8TPNst9aseBSWaTr4=;
 b=JTbir9NTg8ipF/UW61MUGUzsEfe3E/+bt9vC+Q22QDF9merrTQPYumYZivexTdYNcRLPuuNjm4NBykm4Ydfrzaj23PMBRmfV86bFSlkqoswrByvePubh9cMu/gn/26EYwT9nJQ5gV9mBe8+iQrLisvWOchm+d64DUuvzkLsv9/6b5mJCdJmD3UadU2145hgx2+/EcPHpatD6TRnFAPR3Egsf0ZuuWc9TTdIzwhz/QAC8Rc6XYcrUbUsRsnKQu0uB9HkcYmRRXya34M62jameis/9J8NbNUItuY0wZMLAkH9isBfLahU4OMExQ+RNjFL4hsEhX2AxN8Qu7gVwaA16uQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=fgWNT3f9WMZmxjpQ+LpATbVnyx8TPNst9aseBSWaTr4=;
 b=CqHUi+sp0nN3BEmv+VTycKEqhP3sTxSzDdLHRQnRGtLQgOnRGskloGM918G02t6mhryKCa5e+xDpybd975cP+Y1R3b2ozXRy9XosA6bhDSQ+ZZrXUnG/IeWSssqHWx/Iz3xUWmuMB4dhgTrCjTAVozCcH6ZS1KGo1IYF/rNEJN8=
Date: Tue, 29 Mar 2022 12:51:37 +0200
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Claudio Jeker <cjeker@diehard.n-r-g.com>
CC: Demi Marie Obenour <demi@invisiblethingslab.com>, Mark Kettenis
	<mark.kettenis@xs4all.nl>, <djm@mindrot.org>,
	<marmarek@invisiblethingslab.com>, <xen-devel@lists.xenproject.org>,
	<tech@openbsd.org>
Subject: Re: Security support status of xnf(4) and xbf(4)
Message-ID: <YkLkuV5XQVJI3UDk@Air-de-Roger>
References: <Yj3qW/y20htoSvuK@itl-email>
 <37a4b6-cd56-1993-be2-b5522b9aa4d7@mindrot.org>
 <c904abda-e6a0-256e-478a-ee0909c17e50@invisiblethingslab.com>
 <d3ccc20d61dc7636@bloch.sibelius.xs4all.nl>
 <10e7b01a-2a8e-17cd-6418-1a6f836cc251@invisiblethingslab.com>
 <YkLAT3AJk9usjIkD@diehard.n-r-g.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <YkLAT3AJk9usjIkD@diehard.n-r-g.com>
X-ClientProxiedBy: LO4P123CA0346.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:18d::9) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: cfe50dfc-c4de-421c-026c-08da11721c03
X-MS-TrafficTypeDiagnostic: MWHPR03MB2992:EE_
X-Microsoft-Antispam-PRVS: <MWHPR03MB299278D5062C47F4893963598F1E9@MWHPR03MB2992.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(316002)(6486002)(66476007)(6666004)(53546011)(26005)(6916009)(33716001)(82960400001)(54906003)(6506007)(186003)(508600001)(86362001)(83380400001)(85182001)(6512007)(9686003)(5660300002)(2906002)(8936002)(38100700002)(66946007)(66556008)(4326008)(8676002)(15650500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?R2lHeUNRQTlHSG9lZFF6aGxLS3U3eXBGei9HbUdsWUhMNzloVnR5ZDdKSGRm?=
 =?utf-8?B?Tk1TOWpZMFZnU28za0lUM3h2QisyUDBzOHNHai9ETkk0TG9nT1pBVHJwbDA2?=
 =?utf-8?B?MTExMzBFM1dwZGlEd3paRkNTdjRmeU5SWHhsT0pnbEx5U3NCUWEweDRRRkNS?=
 =?utf-8?B?NGdOZmpBV1RxZExPNmdKV0hxaXpCMkQwN0NLQ0phOENJOWRKbGhoSVppU0tP?=
 =?utf-8?B?YWMxbmQzSTdMWjI5U0YyNlRjaFIrMU0rL1dTSlF3NVRyYWgrMkY0UlVKdVZn?=
 =?utf-8?B?UnowSHpTUXRpNWdhenEyb29SUk1WYmUraFdwNWlGTWM5a0wwYkpsTHhNUCto?=
 =?utf-8?B?NnV1RkJ3Y05DUUx6UllMc21LaStTQjdjUWxwZXJqanAvTytWQU05Q05sbk1K?=
 =?utf-8?B?c1hxbVNoeXFOQUl4Szd2SEVseHUydTVGR0hhN3huYlFuQ0RaMkhnT0xMK1Zl?=
 =?utf-8?B?ZkdkcGlHTVU3dzNMdDd4aGpMd0xrRTNvUDNXY2RyRjdpZzdWYTA5NHFBdkN5?=
 =?utf-8?B?TlJ1LzZUandZNGUwbjNEUkorTk0xSEQvNDYxQzVwL2ErcmNhcktES0xWckcy?=
 =?utf-8?B?UFpmckowL01qS1o3MzdVeGtLYmhaMTRrRXRCamFDLzkzeTlMdU9hOGN0cUJu?=
 =?utf-8?B?SkhkcEpUTFcvNTVJVk0wVlYrbzZhTHhLKzYyTklxOW52bk1ILzBpRVp1WW91?=
 =?utf-8?B?VklrOVJCam1zT3V0WUZOSll5bk4raEEycUk0NmtBdnlCZTRWSjM0NDlFa1Fp?=
 =?utf-8?B?Y3JnZStZRXF5dzRIVUVwRjVlUzlGUmo0bGtudm9mdVBJblZqSll6R0NmT3Nr?=
 =?utf-8?B?RmsvTWhNYlovdzdiZTdqcnlvMzJteDh2QWZ1SkVydVVvU3BvQkU0VU1SNExG?=
 =?utf-8?B?ei9teGFoTG1ORUxkS1FZNXZLZXZYUWdpTkFYTEI0VmVuTE1MQU9GdTZPSjdW?=
 =?utf-8?B?amtHcEduMisyMmdDNTFUWjFPWENycGZWVWxOcEc0Y0hxUytYZTdkUjZDSnE1?=
 =?utf-8?B?VjRaMHF6dUlnSkhqUWd2dm9UdC9tT3Y1NC96MDI4THFnUjQydkdUaVR3em55?=
 =?utf-8?B?YzUwMmJiTElTb25YQndsQmc0SHZvVXoySm84bjd0V00zSllvdEoyVkJ6MXBk?=
 =?utf-8?B?dE9Tb0U1SlNMdWdkZFZHNmFmU3Z3dWhrdTBzTHZzc0N3b0RyWFRVd2h6aVFY?=
 =?utf-8?B?RFJqajgzMEJ2NUVSMDRKYmdKTzkxL0pPSXFRUGpYRWZ2dnBJdTNPWDlkbFNT?=
 =?utf-8?B?N3hmNkZaTER1eEUrMFNzRHBGcnBzRHRvRUFPeFJBbzQ1NGEya09jcGZCVWs1?=
 =?utf-8?B?YlduSEtEdHgxa0EybDZEQmJnZTkzdEd1cE1tbm5IaWcwS1VacVBtUDlmbG9E?=
 =?utf-8?B?dyt5N0wzd2srZmtCTkxVS1gyV3g4dTFRdkRUdVpJSkRxbHhNQ3NlaktVdFh0?=
 =?utf-8?B?WkFFM1R3WmhHd21iVmZFUER4LzJBaGhwclpFYW5meDJOeFFWeGs0OUZkYU1X?=
 =?utf-8?B?M2lJSEhGMGVPOHlqeUJOdFkyR2lnWnNOSTRrckJKdC84ZHlYcUhObnRmK0Iv?=
 =?utf-8?B?bFFvUnFiUE5WUzdsUTlMUXMxY3k5L1ljSkdvalZrWHJ5a2k0YldTK1BzSGgy?=
 =?utf-8?B?N29NT3FENzZiN1lxYWxyUjRYNnFkcTRjbWNyTGE2Mk4vN2RJZUdEbGgvQVIr?=
 =?utf-8?B?MWdVRGgrN2VoeDlUOVRkYUxkNTk2M0VvR2RkdlZScXRQMVBmcTduV3l1TjBT?=
 =?utf-8?B?ZE9QUUl0dHVkNWFTdXRrVDVIc3FtbXcrYzN2cTNJY09xRHg3SmhuYVNBb041?=
 =?utf-8?B?KzBId0xrMTNJcjhjYW5pVXVTcTA5UW9UaElkcVZwd3FEaEJJMGVnRkYzN0Rx?=
 =?utf-8?B?cTRYOVN2cjY5VmxqbDJpcTdlblNjLzVLaGVpVEhlT1pJblVpejV2ZWw0ajVw?=
 =?utf-8?B?YnRwQ3Fkc2F3ZWdST21ZODI0ZTZlanlMSXJZTi9nNzFNa2hVWTI4eStXTXVi?=
 =?utf-8?B?YmNLK216a3AvWldRbHVsaDhOcW05SEx2YU1RaUJCVGZqTHZLTkU3Y3pBYWMz?=
 =?utf-8?B?STZ2SVBHRjJQYnRJZ280bkJCRFNGUXlwYnlNQUZCK1lnMEkyL3VTMlBsekRY?=
 =?utf-8?B?OG9OZkwvMGdoSXlrY0Q1SGJvaTREYmY4UDQvanF2T0JPZnFiQzU2S1hieW5D?=
 =?utf-8?B?TitLL3QvcDRpRGh6TTA4RzhjYXBadXZNdHA4Q3I3OXpiTkJOaVRoZTZmbUVO?=
 =?utf-8?B?dXNhK2FRdThLNkVTRnJLSmM4YXVqTzBuZzdETGhuOTdRUHl2Y3drMUZnM1NG?=
 =?utf-8?B?Syt5UlgrZHpiVnJjK0JBcmMyWVdrbEM0TXRvRFZJenZjTG1sWVpUdz09?=
X-MS-Exchange-CrossTenant-Network-Message-Id: cfe50dfc-c4de-421c-026c-08da11721c03
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 29 Mar 2022 10:51:42.2437
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Fiiy7XdaR9L3rd+1wOQVJPTVrQHsTeIqy/A8OUPfMGaCSgsTHlhKWN6CcZOafcUX3W+ahbupTDEtogoNM6yf0Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR03MB2992
X-OriginatorOrg: citrix.com

On Tue, Mar 29, 2022 at 10:16:15AM +0200, Claudio Jeker wrote:
> On Mon, Mar 28, 2022 at 04:38:33PM -0400, Demi Marie Obenour wrote:
> > On 3/28/22 10:39, Mark Kettenis wrote:
> > >> Date: Mon, 28 Mar 2022 09:51:22 -0400
> > >> From: Demi Marie Obenour <demi@invisiblethingslab.com>
> > >>
> > >> On 3/27/22 21:45, Damien Miller wrote:
> > >>> On Fri, 25 Mar 2022, Demi Marie Obenour wrote:
> > >>>
> > >>>> Linux’s netfront and blkfront drivers recently had a security
> > >>>> vulnerability (XSA-396) that allowed a malicious backend to potentially
> > >>>> compromise them.  In follow-up audits, I found that OpenBSD’s xnf(4)
> > >>>> currently trusts the backend domain.  I reported this privately to Theo
> > >>>> de Raadt, who indicated that OpenBSD does not consider this to be a
> > >>>> security concern.
> > >>>>
> > >>>> This is obviously a valid position for the OpenBSD project to take, but
> > >>>> it is surprising to some (such as myself) from the broader Xen
> > >>>> ecosystem.  Standard practice in the Xen world is that bugs in frontends
> > >>>> that allow a malicious backend to cause mischief *are* considered
> > >>>> security bugs unless there is explicit documentation to the contrary.
> > >>>> As such, I believe this deserves to be noted in xnf(4) and xbf(4)’s man
> > >>>> pages.  If the OpenBSD project agrees, I am willing to write a patch,
> > >>>> but I have no experience with mandoc so it might take a few tries.
> > >>>
> > >>> Hang on, what is a "malicious backend" in this context? Is it something
> > >>> other than the Xen Hypervisor? If not, then it seems not to be a useful
> > >>> attack model, as the hypervisor typically has near-complete access to
> > >>> guests' memory and CPU state.
> > >>
> > >> The backend can run in any Xen VM.  It often runs in dom0, but it
> > >> is not required to, and in Qubes OS the network backend never runs
> > >> in dom0.  Unless it runs in dom0, it has no access to frontend memory,
> > >> except for memory the frontend has explicitly given it access to via
> > >> grant tables.
> > > 
> > > So this is somewhat similar to the situation on sun4v (Sun's
> > > virtualization of the SPARC architecture).  When writing the vnet(4)
> > > and vdsk(4) drivers for OpenBSD, I did consider the implications of
> > > those drivers talking to a "malicious" domain.  the SPARC hypervisor
> > > implements a concept similar to grant tables.  It is fairly obvious
> > > that any memory you grant access to should be considered insecure.
> > > This means that you either have to make a copy of the data or revoke
> > > access to the shared memory through some sort of Hypervisor call that
> > > implements a synchronization point of some sorts.  Otherwise you and
> > > up TOCTOU issues all over the place.  But this obviously has
> > > significant performance consequences.  For vnet(4) I decided that an
> > > extra copy was worth doing and the only reasonable way of doing things
> > > given how OpenBSD's mbuf layer works.  But for vdsk(4) I decided to
> > > trust the other domain as there is no way to prevent it from feeding
> > > you compromised data.  Full disk encryption doesn't really solve the
> > > problem unless you have a way to securely verify the bootloader.
> > 
> > In Qubes OS, xbf(4) devices are configurable.  While all of them are
> > provided by dom0 (which is trusted) by default, it is possible to
> > attach devices that are *not* provided by dom0, and these devices
> > should not be trusted.
> > 
> > > Personally I think it might be beneficial for us to turn xnf(4) into
> > > what we colloquially call a "bcopy" network driver.  But folks who
> > > actually use xen may find the performance impact of doing this
> > > unacceptable and decide to trust the backend instead.
> > 
> > You actually don’t have to do that.  The Xen network protocol
> > requires the backend to drop access to the buffer before giving it
> > to the frontend, so the frontend only needs to ensure that it cannot
> > regain access.  This will fail if the backend still has access, but
> > that is a bug in the backend, in which case you should shut down the
> > interface.  So there should not be any significant performance impact.
> > 
> > If you are curious about how Linux does this, you can look at
> > drivers/xen/grant-table.c, drivers/net/xen-netfront.c, and
> > drivers/block/xen-blkfront.c from the Linux source.  They are
> > dual licensed GPL/MIT so there should not be licensing issues there.
> > Be sure to use a version at or after “xen/netfront: react properly to
> > failing gnttab_end_foreign_access_ref()” and the other XSA-396 patches.
> 
> So how does xen manage to limit access to less than a page size?
> The hardware on x86 does not give you byte precise mappings for granting
> memory.
> An mbuf is 256 bytes and of those 256 bytes less then that is used for
> data. Still for dma the full 4k page needs to be granted to the host.
> The only way this can be done is by memcpy all data into individual pages.
> The same is true for the most common mbuf cluster size of 2k.
> So yes, this will be a bcopy ethernet driver and by that will be on the
> same level of crappyness as bce(4) and old old old realtek.

I've got no idea about the Xen network protocol, but the Xen block
protocol already has a feature called persistent grants that will
force the frontend to copy all data into a set of pre-granted pages
(ie: akin to a bounce buffer).

That's mostly done as a performance optimization so that the backend
doesn't have to map and unmap each page on the request, as
establishing and tearing down such mappings tends to be more expensive
than doing a memcpy on the frontend.

A security sensitive block frontend could refuse to connect unless
persistent grants are available, or as you say force all pages to be
bounced.

So forcing a copy in the frontend might not be that bad from a
performance PoV if that avoids the transient grant mapping operations
on the backend side, but that needs to be negotiated.

Roger.


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 10:54:47 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 10:54:47 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295784.503466 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ9Us-0003AX-GD; Tue, 29 Mar 2022 10:54:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295784.503466; Tue, 29 Mar 2022 10:54:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ9Us-0003AQ-DE; Tue, 29 Mar 2022 10:54:46 +0000
Received: by outflank-mailman (input) for mailman id 295784;
 Tue, 29 Mar 2022 10:54:45 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nZ9Ur-0003AK-7B
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 10:54:45 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nZ9Uq-0005Zr-D7; Tue, 29 Mar 2022 10:54:44 +0000
Received: from 54-240-197-226.amazon.com ([54.240.197.226] helo=[10.85.37.164])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nZ9Uq-0002i3-6H; Tue, 29 Mar 2022 10:54:44 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=frUn4bWYZSxFC+fwqDUVmO4DbRiJY6KosFOg+sUq+8Y=; b=nmnt1KLfcZEwF4oTMpmsmIBATv
	wmZ5qCoznoefEqiqgxcVjsXR3WW7RNJx7sUPXeSZZLQnQt9Ki01PdCUislhgItdzZlvElONvei89f
	YWqYOszIySJN0L8RVaZzM5i/BOlFGtjcuEpU9Qr11UohuNEN/1GHpys4AtZlDZXF0Who=;
Message-ID: <5121de30-644f-8a1f-ff1a-29c4d2ee7f0f@xen.org>
Date: Tue, 29 Mar 2022 11:54:41 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v2 2/2] xen: Populate xen.lds.h and make use of its macros
To: Michal Orzel <michal.orzel@arm.com>, xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Wei Liu <wl@xen.org>, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
References: <20220322080233.53134-1-michal.orzel@arm.com>
 <20220322080233.53134-3-michal.orzel@arm.com>
 <2940b4c8-5d44-695e-4550-0a32c3a4c053@xen.org>
 <d5bccf50-c74a-40e6-843e-3ad682647efb@arm.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <d5bccf50-c74a-40e6-843e-3ad682647efb@arm.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi,

On 29/03/2022 11:12, Michal Orzel wrote:
> On 29.03.2022 11:54, Julien Grall wrote:
>> Hi,
>>
>> On 22/03/2022 08:02, Michal Orzel wrote:
>>> Populate header file xen.lds.h with the first portion of macros storing
>>> constructs common to x86 and arm linker scripts. Replace the original
>>> constructs with these helpers.
>>>
>>> No functional improvements to x86 linker script.
>>>
>>> Making use of common macros improves arm linker script with:
>>> -explicit list of debug sections that otherwise are seen as "orphans"
>>
>> NIT: This is a bit confusing to see no space after -. Can you add one?
>>
> Ok.
> 
>> I would also recommend to start with (soft)tab to make clearer this is a list.
>>
>> Same goes for the  other use below.
>>
> Ok.
> 
>>
>>> by the linker. This will allow to fix issues after enabling linker
>>> option --orphan-handling one day
>>> -extended list of discarded section to include: .discard, desctructors
>>
>> Typo: s/desctructors/destructors/
>>
> Ok.
> 
>>> related sections, .fini_array which can reference .text.exit
>>> -sections not related to debugging that are placed by ld.lld.
>>> Even though Xen on arm compilation with LLVM support is not ready yet,
>>
>> Building natively Xen on Arm with Clang works. So do you mean you using LLD?
>>
> I mean using the LLVM replacements not only for CC + supporting cross-compilation.
> As for the linker, Xen sets llvm-ld which is very very old and in fact README states
> LLVM 3.5 or later but llvm-ld was removed before that.

I am confused. I looked at the llvm repo and lld is still there. So why 
are you saying is lld is very old and removed?

> Thus IMO support for LLVM on arm
> is not ready yet.

I agree that building Xen on Arm only with LLVM tools is not possible 
yet. But this statement seems to be a bit too broad here. I think what 
matters is we don't support linking with LLD on Arm.

>>> these sections do not cause problem to GNU ld.
>>>
>>> Please note that this patch does not aim to perform the full sync up
>>> between the linker scripts. It creates a base for further work.
>>>
>>> Signed-off-by: Michal Orzel <michal.orzel@arm.com>
>>
>> [...]
>>
>>> diff --git a/xen/include/xen/xen.lds.h b/xen/include/xen/xen.lds.h
>>> index dd292fa7dc..ad1d199021 100644
>>> --- a/xen/include/xen/xen.lds.h
>>> +++ b/xen/include/xen/xen.lds.h
>>> @@ -5,4 +5,104 @@
>>>     * Common macros to be used in architecture specific linker scripts.
>>>     */
>>>    +/* Macros to declare debug sections. */
>>> +#ifdef EFI
>>
>> AFAIK, we don't define EFI on Arm (just CONFIG_EFI). Yet we do support EFI on arm64.
>>
>> As this #ifdef is now in generic code, can you explain how this is meant to be used?
>>
> As we do not define EFI on arm, all the stuff protected by #ifdef EFI is x86 specific.

I find the name "EFI" too generic to figure out that this code can only 
be used by x86.

But, from my understanding, this header is meant to contain generic 
code. It feels a bit odd that we are moving arch specific code.

To be honest, I don't quite understand why we need to make the 
diffferentiation on x86. So I guess the first question is how this is 
meant to be used on x86?

Once we answered that, we can decide whether this is correct to use EFI 
in generic code. IOW, is thish going to be useful for other arch?

> 
>>> +/*
>>> + * Use the NOLOAD directive, despite currently ignored by (at least) GNU ld
>>> + * for PE output, in order to record that we'd prefer these sections to not
>>> + * be loaded into memory.
>>> + */
>>> +#define DECL_DEBUG(x, a) #x ALIGN(a) (NOLOAD) : { *(x) }
>>> +#define DECL_DEBUG2(x, y, a) #x ALIGN(a) (NOLOAD) : { *(x) *(y) }
>>> +#else
>>> +#define DECL_DEBUG(x, a) #x 0 : { *(x) }
>>> +#define DECL_DEBUG2(x, y, a) #x 0 : { *(x) *(y) }
>>> +#endif
>>> +
>>> +/* DWARF debug sections. */
>>> +#define DWARF_DEBUG_SECTIONS                      \
>>> +  DECL_DEBUG(.debug_abbrev, 1)                    \
>>> +  DECL_DEBUG2(.debug_info, .gnu.linkonce.wi.*, 1) \
>>> +  DECL_DEBUG(.debug_types, 1)                     \
>>> +  DECL_DEBUG(.debug_str, 1)                       \
>>> +  DECL_DEBUG2(.debug_line, .debug_line.*, 1)      \
>>> +  DECL_DEBUG(.debug_line_str, 1)                  \
>>> +  DECL_DEBUG(.debug_names, 4)                     \
>>> +  DECL_DEBUG(.debug_frame, 4)                     \
>>> +  DECL_DEBUG(.debug_loc, 1)                       \
>>> +  DECL_DEBUG(.debug_loclists, 4)                  \
>>> +  DECL_DEBUG(.debug_macinfo, 1)                   \
>>> +  DECL_DEBUG(.debug_macro, 1)                     \
>>> +  DECL_DEBUG(.debug_ranges, 8)                    \
>>> +  DECL_DEBUG(.debug_rnglists, 4)                  \
>>> +  DECL_DEBUG(.debug_addr, 8)                      \
>>> +  DECL_DEBUG(.debug_aranges, 1)                   \
>>> +  DECL_DEBUG(.debug_pubnames, 1)                  \
>>> +  DECL_DEBUG(.debug_pubtypes, 1)
>>> +
>>> +/* Stabs debug sections. */
>>> +#define STABS_DEBUG_SECTIONS                 \
>>> +  .stab 0 : { *(.stab) }                     \
>>> +  .stabstr 0 : { *(.stabstr) }               \
>>> +  .stab.excl 0 : { *(.stab.excl) }           \
>>> +  .stab.exclstr 0 : { *(.stab.exclstr) }     \
>>> +  .stab.index 0 : { *(.stab.index) }         \
>>> +  .stab.indexstr 0 : { *(.stab.indexstr) }
>>> +
>>> +/*
>>> + * Required sections not related to debugging.
>>> + *
>>> + * LLVM ld also wants .symtab, .strtab, and .shstrtab placed. These look to
>>> + * be benign to GNU ld, so we can have them here unconditionally.
>>> + */
>>> +#define ELF_DETAILS_SECTIONS     \
>>> +  .comment 0 : { *(.comment) }   \
>>
>> This is a bit confusing. Here you seem to use the section .comment. But...
>>
>>> +  .symtab 0 : { *(.symtab) }     \
>>> +  .strtab 0 : { *(.strtab) }     \
>>> +  .shstrtab 0 : { *(.shstrtab) }
>>> +
>>> +#ifdef EFI
>>> +#define DISCARD_EFI_SECTIONS \
>>> +       *(.comment)   \
>>
>> ... here you will discard it if EFI is set. Which one take precedence if the caller use both ELF_DETAILS_SECTIONS and DISCARD_EFI_SECTION?
>>
> ELF_DETAILS_SECTIONS is protected by #ifndef EFI and DISCARD_EFI_SECTION by #ifdef EFI
> so the caller cannot use both ELF_DETAILS_SECTIONS and DISCARD_EFI_SECTION.

The caller will protect it. But it is not in the header. I don't think 
we should expect the user to check x86 to understand how this is meant 
to be used.

> 
>> Also, can you explain why we need to drop those sections when EFI is set?
>>
> This is related to x86. Please see the commit: 7844f90abd551f6d5cd9b670b5ed8a4683258a21

Why is this in the generic header then?

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 10:58:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 10:58:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295788.503478 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ9Y8-0003pT-V5; Tue, 29 Mar 2022 10:58:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295788.503478; Tue, 29 Mar 2022 10:58:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ9Y8-0003pM-S2; Tue, 29 Mar 2022 10:58:08 +0000
Received: by outflank-mailman (input) for mailman id 295788;
 Tue, 29 Mar 2022 10:58:07 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=kdRh=UI=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZ9Y7-0003pF-GR
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 10:58:07 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 1cc65a60-af4f-11ec-8fbc-03012f2f19d4;
 Tue, 29 Mar 2022 12:58:06 +0200 (CEST)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2107.outbound.protection.outlook.com [104.47.17.107]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-12-OfmfOSCgNwCWX3Q9VVYYpw-1; Tue, 29 Mar 2022 12:58:02 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM0PR04MB5090.eurprd04.prod.outlook.com (2603:10a6:208:bf::30)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.23; Tue, 29 Mar
 2022 10:58:00 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%5]) with mapi id 15.20.5102.023; Tue, 29 Mar 2022
 10:58:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1cc65a60-af4f-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648551486;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=TkLfro1CJu6ToFG8jn144yBomXoh2rvoLRQZDuHg4eI=;
	b=OzPKnwcvAQwDiRfMfA7cZ5cPdn8Mu90TvWDI8Z/KFVcYOXGsarTHUTgQKdEdxCPuGEpFAJ
	YU+Mdr+O4l6szF/ypbWW2EASp7V+SSaWMyoVtS6BQApSfWfGz1HQKRENVeIC83PmShuyvy
	M5bzcWsZwRrsXDA4flKXCVwPn3V5aCo=
X-MC-Unique: OfmfOSCgNwCWX3Q9VVYYpw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=MreXbRjbkYMDaUoh9nOie1DJxPxAfXWxOCzHjHbYxZclULi/+q5cK8tBKkW7UAuinCNQFmYI21q5CjR5ksPcoWXSlukyeWTxzLeVxQXpzyu//RBB5fWvChkTARnxsrnmQqnRIdLFsyg/ZXUB+ZIsbKfzzW4RKMH4qKmmxBgB7nqfg7ZlCVEsxNPKdZU8WgyHvdzHOdoAwPrV9jTnnw8g6OpwlEM7XlLTp5686w+Io+m1yNlzNxV5hsPEbLsaiPeXQHs8M0/jmELpIh0DaXAoz1CuWd7/9v8xSASjChL3EPlbSR9Tw2PKFzsIVmAHnNo8JBPamOEVbbu6kA15kt+66g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=TkLfro1CJu6ToFG8jn144yBomXoh2rvoLRQZDuHg4eI=;
 b=YrCSQ0nZg6rBOtc/rHZsM4sDF4XekBRfekVXm9AAwbgTlVcWKTzkL3ETf/Pbo7q9ptDZF2x6HDONGMkZo5u8LRMXMMl4uJsSLyAQk/OujjsepA4l8PFCll5bEeFCH9UKvt27voSHNQiPitWpnrf5cigSYnkjcWnUZW+o70jNNmtMJ3E+NqTtnBy9PLC3c4Ccm6LNKXu9ocPqYWrXnfIpNtJn9/Q5Q4nx6jPb/L6euAcCJ7C5noDTWvFfC7fS2qs1sjuWtFOiIyVLLlAg+naruSsXVjO7YOwSBTr1pBLY2+SM0PXCK85PfAH4WdZWCSJg9qUjWfsNdR9LOBQbQzJ0xQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <2b31a208-f00b-efe1-c4b9-dbb322b91447@suse.com>
Date: Tue, 29 Mar 2022 12:57:58 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] build: generic top-level rule to build individual files
Content-Language: en-US
To: Anthony PERARD <anthony.perard@citrix.com>
Cc: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
References: <49190e22-c802-3830-9d4c-8e6100132687@suse.com>
 <YkLfPZCFIIqKypmI@perard.uk.xensource.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YkLfPZCFIIqKypmI@perard.uk.xensource.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8PR04CA0002.eurprd04.prod.outlook.com
 (2603:10a6:20b:310::7) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 669b65e1-828f-403b-f96f-08da1172fd1e
X-MS-TrafficTypeDiagnostic: AM0PR04MB5090:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB5090B4F296B0A0BFB561C032B31E9@AM0PR04MB5090.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(31696002)(26005)(186003)(38100700002)(36756003)(83380400001)(53546011)(6506007)(8936002)(508600001)(86362001)(31686004)(6916009)(5660300002)(6486002)(2616005)(66946007)(66476007)(66556008)(54906003)(6512007)(8676002)(4326008)(316002)(2906002)(41533002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?ZlA0SklrUUJWcmNxUTVCVEd2YVdJcUxwSWhtdzZEdXo4NjRGOUQxcFFlWVMw?=
 =?utf-8?B?LzAzWXFFV2VmcUVhOXQ3VVN5aWZZMWV1c2piSlhoZFEwOWdWN2pqMW1kU24v?=
 =?utf-8?B?c3VKNW5nS2dOWWRrNlpnRnB5V2RXVVRDdE8wWXlWalovK0NjbXZ5OWNkNlBh?=
 =?utf-8?B?eXVDNDBqdGViZDMyRk5Ha3RxRW5OL3NTL1lSeTdRN1h3b3N4RHFGQVFTUmZ3?=
 =?utf-8?B?VFFVMkg2aU5JUFhRSmZVRDhPQUhiazVCQlREWXY0cDRnTFo0dm5rOGNqRUp6?=
 =?utf-8?B?ZFh4c01SZmQvTTBKVkNvdVRiRnZxZTdvK0VUY1dUOGNJZ0hibnZoMk83TVln?=
 =?utf-8?B?aWdyckNhQmFOZ2QyMThIcHZSWHQrdWF6M0ZiWmdSeWwvZnU1ZGxJQ2ljNlU0?=
 =?utf-8?B?ckFseVlxRGkxMHhYTVFxSExpeVJYTnFabjM1amdCVHVubko0Qng4Q2h3TEdQ?=
 =?utf-8?B?Um5hdmhMU1ZCS2ljekU4cWJNSVFlVkJCSkRIMTk2ZmVSNklGaDcxY3l2c1By?=
 =?utf-8?B?Q0V2UWtvSjI5VklpS2RVdTZQNW1ZTzlHTFhibk1QcEVEYzFuN3dXcXM3eDZQ?=
 =?utf-8?B?L2ZSODB6SVBERnM2UnY1SDFaRmVyeEJ1M254RVlOUUZXMVpmVm5UNVpvTnlW?=
 =?utf-8?B?TG9ON2FFbm56WHhpSWswTUNabFNRVlh1TkhMaEhsbENnWmlwZE9lREI0WDkz?=
 =?utf-8?B?LzlXSVlHdCs1eTRIVGpKUWljcFgvam5oNVFJdHlJOXpnbTMxcWNUbFh0OXVa?=
 =?utf-8?B?Z0ZpUHdjWldVTG9HUGRqVG94ZUVqbWxiM3NVb0Y4NlFJWUw0cFVQV0szeGM2?=
 =?utf-8?B?SzllTmxxWG9PeUo2NERrTTJ0QWFqMWl0VGZMRTlGcHd6Z3VySHNiYW05dHJL?=
 =?utf-8?B?Q2FvU3lzMkZaQm00NHpjZ2dPMU9LT3dqZFNBaWtCTGRnQnVZSFRUTG9mTnRz?=
 =?utf-8?B?c05SUWVDYmY4elNGQnVLaVhDUSsyOUh1VHhldC9iRSs1MkczSlVFNDhsZDhL?=
 =?utf-8?B?c1o1aVJWRW42c2RtUVJHSHl1ZFYveEZDNjgxQ2pLVzBnSG1FaS90WmZUYjc0?=
 =?utf-8?B?TThsMnkxWXpHbENwc1lMdUpDcEt0VmhDRkJLeGYzZXNhcTRYdzJqVzNEeGFz?=
 =?utf-8?B?WmpJazJyUENWOXh4dDg5YUVVcW5xMkRleHNhUGFWbVVZNFV3eG95NzBiUm9R?=
 =?utf-8?B?ZzhDMXhGMWRkQTc1VGlpTkxtaTF6NGc0ZE1sM1hMTmZJWnlwaDRST2JBYkx0?=
 =?utf-8?B?eVRnNjV5TTdpbWx4eVUzY3ZpUG9ZWGdGVThkM0NYU3FXRlJoZ3pRMmdaTi9H?=
 =?utf-8?B?VVk2Y29IUE1wdDRWV2pPV2NuVVVMbklwb0x0VlF3MlNuNytMb0ZIM21nQk9F?=
 =?utf-8?B?M3JkYWFZRTBGalpablV2ZUROWGdTa1hTMTllWENBVUVJdlcwOUQvbU1wb2NN?=
 =?utf-8?B?VWJFMXRzNGEvT3AxeWhaL2U1WE9WUHg5SUppSmVKakhISjNUTHh6eWhLN2d6?=
 =?utf-8?B?Ulh5UUVXUHArcGNnTFNKdVhPbzA3MlRQWHkrQmhMREt2aUd0Qm5CY1NSVDd3?=
 =?utf-8?B?YURsZFR3YnIvd1VEN3lOSzdkclRWYStlV1J6N3crQ1dtVnBoYU9qRVk2alow?=
 =?utf-8?B?RUgvenh2OUhJM2FZR3QvVXVYWXlpUnJrNlVqc1M1a1lqNjZCSlVOQVdzN0xh?=
 =?utf-8?B?cEpxS1NPakF3enFKUVc4b1VYUnRLd3QwNTlEY244emttS3VZZUtnYU1CN1Ey?=
 =?utf-8?B?Rk9SWVE4N2ZiVU0wWEkrSGhkRmFUTXBReEdMbjUvZjdGeXFqWTQ5cjQ1UndC?=
 =?utf-8?B?bjY1alQvS000Nit5Y1RPZ2ZCK0QyN2MxdmVPc2ZvWWhpcEJmemQvbWtaTk9X?=
 =?utf-8?B?bWw2RjNwNmhJaWQ4Q09HSElkUFJLd1VLR2tvVHhnU01NNm8vWWVmNVhidHhT?=
 =?utf-8?B?Q1lGek1GeVRtRVZxdXI4SkVETE9GMVJqUHQ5VzBOMm9RQWM4alYwbGdoQ1Qv?=
 =?utf-8?B?eDREVTl1UVdlQWw5ejB5QXpsaTRMcm14Q1N4K1BiekM4eUoyVmRPaFR1VTVm?=
 =?utf-8?B?dVhxd1dFekpVTU5KSmZQdXY2SE9ITXJZYWp5Q0syTGtyMi9lbmpKQkxSRXpu?=
 =?utf-8?B?STYvWXF4Z253dmZFc0JVcktpNytHa0l4WmxhRTNGN0J1NTQwbm1Fa29VUTVz?=
 =?utf-8?B?ZU9jSHlpZUw3enhIN3RYRm9hWUJ4dUMwQnIrRmcrNWxyVkJMNEdxQVVJTVRt?=
 =?utf-8?B?V3dUU1kxSFkyQUFjQ2Z2NGZUU016am40Qmd3bDg2RHE0OVAzRmNOd0w1aldY?=
 =?utf-8?B?NHFuUWVPRGNvSHdpK0FXRmlSK2txbXlyWjRBaG1tMisyVkhCYzNYZz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 669b65e1-828f-403b-f96f-08da1172fd1e
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 29 Mar 2022 10:58:00.4623
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: /V4G8aMi69xiEWATPOLb0Soh2D/7px8jP+6y/Hl2FnX5QTFZsNNkzHW8dJrrVAU3TTKZutxC06+Lq7yPtsqB1A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB5090

On 29.03.2022 12:28, Anthony PERARD wrote:
> On Mon, Mar 28, 2022 at 09:41:26AM +0200, Jan Beulich wrote:
>> --- a/Makefile
>> +++ b/Makefile
>> @@ -75,6 +75,13 @@ ifeq (x86_64,$(XEN_TARGET_ARCH))
>>  	XEN_TARGET_ARCH=x86_32 $(MAKE) -C stubdom pv-grub-if-enabled
>>  endif
>>  
>> +define do-subtree
>> +$(1)/%: FORCE
>> +	$$(MAKE) -C $(1) $$*
>> +endef
>> +
>> +$(foreach m,$(wildcard */Makefile),$(eval $(call do-subtree,$(patsubst %/Makefile,%,$(m)))))
> 
> Any reason to not use $(SUBSYSTEMS) instead of $(wildcard ) ? Or maybe
> you would rather been able to run `make xen/foo/bar.o` even after
> running `./configure --disable-xen`.

This particular case I don't care about as much, but I think it is
helpful if any subtree which has a Makefile can be recursed into
this way. That way if someone hooks other trees (xtf, mini-os) into
the tree, they're as accessible. As would be subtrees which aren't
subsystems by which still have a Makefile (such may or may not
appear).

>> @@ -334,3 +341,6 @@ uninstall: uninstall-tools-public-header
>>  .PHONY: xenversion
>>  xenversion:
>>  	@$(MAKE) --no-print-directory -C xen xenversion
>> +
>> +PHONY += FORCE
> 
> That's a Kbuild construct which will not work here. You need to write
> ".PHONY: FORCE" instead.
> 
> In Kbuild, there's a ".PHONY: $(PHONY)", and various macros needs to
> know what's .PHONY.

Oh, right - thanks for pointing out. I should have really noticed by
looking at context in the file ...

> With at least the .PHONY business taking care of: Reviewed-by: Anthony PERARD <anthony.perard@citrix.com>

Thanks.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 29 11:07:14 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 11:07:14 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295792.503488 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ9gr-0005IQ-Qp; Tue, 29 Mar 2022 11:07:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295792.503488; Tue, 29 Mar 2022 11:07:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ9gr-0005IJ-Nl; Tue, 29 Mar 2022 11:07:09 +0000
Received: by outflank-mailman (input) for mailman id 295792;
 Tue, 29 Mar 2022 11:07:08 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nZ9gq-0005ID-CY
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 11:07:08 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nZ9gl-0005pI-HV; Tue, 29 Mar 2022 11:07:03 +0000
Received: from 54-240-197-226.amazon.com ([54.240.197.226] helo=[10.85.37.164])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nZ9gl-0003d1-Ag; Tue, 29 Mar 2022 11:07:03 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=xI7Ddnf8AXzxKdaenbKM8QGlxZXMj36LQlTDsNtzjsQ=; b=JblSWCD7fdhTndW3JFwMImD6Py
	eaKiHdqJWJy/rYx/EG7g7ivpxrSPacgJsRFiTMCXI0WzgSZpkWfk1ZW28Y+EktBMmrYLv96EvFE2x
	f6L7zlNMzmBM3STyyT8qO+/DFIf7fwv7415OmJxsyBiQTMYMBncfGLiBwrwqpYOlTLqI=;
Message-ID: <c2c936be-5f11-393b-3bcc-82a42fa964af@xen.org>
Date: Tue, 29 Mar 2022 12:07:00 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v2 2/2] xen: Populate xen.lds.h and make use of its macros
To: Jan Beulich <jbeulich@suse.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Michal Orzel <michal.orzel@arm.com>, xen-devel@lists.xenproject.org
References: <20220322080233.53134-1-michal.orzel@arm.com>
 <20220322080233.53134-3-michal.orzel@arm.com>
 <2940b4c8-5d44-695e-4550-0a32c3a4c053@xen.org>
 <293aa4e4-ac6b-2446-ea78-986014993e89@suse.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <293aa4e4-ac6b-2446-ea78-986014993e89@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Jan,

On 29/03/2022 11:37, Jan Beulich wrote:
> On 29.03.2022 11:54, Julien Grall wrote:
>> On 22/03/2022 08:02, Michal Orzel wrote:
>>> --- a/xen/include/xen/xen.lds.h
>>> +++ b/xen/include/xen/xen.lds.h
>>> @@ -5,4 +5,104 @@
>>>     * Common macros to be used in architecture specific linker scripts.
>>>     */
>>>    
>>> +/* Macros to declare debug sections. */
>>> +#ifdef EFI
>>
>> AFAIK, we don't define EFI on Arm (just CONFIG_EFI). Yet we do support
>> EFI on arm64.
>>
>> As this #ifdef is now in generic code, can you explain how this is meant
>> to be used?
> 
> The identifier may now be somewhat misleading, yes - it has always meant
> "linking a native EFI (i.e. PE/COFF) binary". The equivalence "EFI binary"
> == "EFI support" has long been lost.
On Arm, we will be generating a EFI binary (or better a Image/EFI). So 
IIUC the description, we should in theory set EFI.

But I think it would do the wrong thing on Arm. Would you be able to 
explain why you need to differentiate it on x86?

>>> +/*
>>> + * Use the NOLOAD directive, despite currently ignored by (at least) GNU ld
>>> + * for PE output, in order to record that we'd prefer these sections to not
>>> + * be loaded into memory.
>>> + */
>>> +#define DECL_DEBUG(x, a) #x ALIGN(a) (NOLOAD) : { *(x) }
>>> +#define DECL_DEBUG2(x, y, a) #x ALIGN(a) (NOLOAD) : { *(x) *(y) }
>>> +#else
>>> +#define DECL_DEBUG(x, a) #x 0 : { *(x) }
>>> +#define DECL_DEBUG2(x, y, a) #x 0 : { *(x) *(y) }
>>> +#endif
>>> +
>>> +/* DWARF debug sections. */
>>> +#define DWARF_DEBUG_SECTIONS                      \
>>> +  DECL_DEBUG(.debug_abbrev, 1)                    \
>>> +  DECL_DEBUG2(.debug_info, .gnu.linkonce.wi.*, 1) \
>>> +  DECL_DEBUG(.debug_types, 1)                     \
>>> +  DECL_DEBUG(.debug_str, 1)                       \
>>> +  DECL_DEBUG2(.debug_line, .debug_line.*, 1)      \
>>> +  DECL_DEBUG(.debug_line_str, 1)                  \
>>> +  DECL_DEBUG(.debug_names, 4)                     \
>>> +  DECL_DEBUG(.debug_frame, 4)                     \
>>> +  DECL_DEBUG(.debug_loc, 1)                       \
>>> +  DECL_DEBUG(.debug_loclists, 4)                  \
>>> +  DECL_DEBUG(.debug_macinfo, 1)                   \
>>> +  DECL_DEBUG(.debug_macro, 1)                     \
>>> +  DECL_DEBUG(.debug_ranges, 8)                    \
>>> +  DECL_DEBUG(.debug_rnglists, 4)                  \
>>> +  DECL_DEBUG(.debug_addr, 8)                      \
>>> +  DECL_DEBUG(.debug_aranges, 1)                   \
>>> +  DECL_DEBUG(.debug_pubnames, 1)                  \
>>> +  DECL_DEBUG(.debug_pubtypes, 1)
>>> +
>>> +/* Stabs debug sections. */
>>> +#define STABS_DEBUG_SECTIONS                 \
>>> +  .stab 0 : { *(.stab) }                     \
>>> +  .stabstr 0 : { *(.stabstr) }               \
>>> +  .stab.excl 0 : { *(.stab.excl) }           \
>>> +  .stab.exclstr 0 : { *(.stab.exclstr) }     \
>>> +  .stab.index 0 : { *(.stab.index) }         \
>>> +  .stab.indexstr 0 : { *(.stab.indexstr) }
>>> +
>>> +/*
>>> + * Required sections not related to debugging.
>>> + *
>>> + * LLVM ld also wants .symtab, .strtab, and .shstrtab placed. These look to
>>> + * be benign to GNU ld, so we can have them here unconditionally.
>>> + */
>>> +#define ELF_DETAILS_SECTIONS     \
>>> +  .comment 0 : { *(.comment) }   \
>>
>> This is a bit confusing. Here you seem to use the section .comment. But...
>>
>>> +  .symtab 0 : { *(.symtab) }     \
>>> +  .strtab 0 : { *(.strtab) }     \
>>> +  .shstrtab 0 : { *(.shstrtab) }
>>> +
>>> +#ifdef EFI
>>> +#define DISCARD_EFI_SECTIONS \
>>> +       *(.comment)   \
>>
>> ... here you will discard it if EFI is set. Which one take precedence if
>> the caller use both ELF_DETAILS_SECTIONS and DISCARD_EFI_SECTION?
> 
> Given the above explanation I think it's clear that only one of the
> two may be used at a time: ELF_DETAILS_SECTIONS when linking an ELF
> binary and DISCARD_EFI_SECTIONS when linking a PE/COFF binary.

I guess this may be obvious on x86. But for Arm, we are generating the 
ELF first and then extracting the information to generate the binary. 
The end result will be a binary that is PE/COFF compatible.

So to me, it would make sense to include DISCARD_EFI_SECTIONS because we 
going to create an EFI binary and also include EFI_DETAILS_SECTIONS 
because we are building an ELF.

Overall it sounds like to me that it is too premature to move the 
#if{,n}def EFI bits in the generic header.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 11:09:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 11:09:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295796.503500 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ9jV-0005uY-7a; Tue, 29 Mar 2022 11:09:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295796.503500; Tue, 29 Mar 2022 11:09:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ9jV-0005uR-4I; Tue, 29 Mar 2022 11:09:53 +0000
Received: by outflank-mailman (input) for mailman id 295796;
 Tue, 29 Mar 2022 11:09:52 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=AGgI=UI=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nZ9jU-0005uJ-4x
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 11:09:52 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTP
 id c017ccbe-af50-11ec-8fbc-03012f2f19d4;
 Tue, 29 Mar 2022 13:09:50 +0200 (CEST)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 1B21F23A;
 Tue, 29 Mar 2022 04:09:49 -0700 (PDT)
Received: from [10.57.6.94] (unknown [10.57.6.94])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id D42C73F66F;
 Tue, 29 Mar 2022 04:09:45 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c017ccbe-af50-11ec-8fbc-03012f2f19d4
Message-ID: <56c21118-b47d-4405-8b27-bc4923d15822@arm.com>
Date: Tue, 29 Mar 2022 13:09:34 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [PATCH v2 2/2] xen: Populate xen.lds.h and make use of its macros
Content-Language: en-US
To: Julien Grall <julien@xen.org>, xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Wei Liu <wl@xen.org>, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
References: <20220322080233.53134-1-michal.orzel@arm.com>
 <20220322080233.53134-3-michal.orzel@arm.com>
 <2940b4c8-5d44-695e-4550-0a32c3a4c053@xen.org>
 <d5bccf50-c74a-40e6-843e-3ad682647efb@arm.com>
 <5121de30-644f-8a1f-ff1a-29c4d2ee7f0f@xen.org>
From: Michal Orzel <michal.orzel@arm.com>
In-Reply-To: <5121de30-644f-8a1f-ff1a-29c4d2ee7f0f@xen.org>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit


On 29.03.2022 12:54, Julien Grall wrote:
> Hi,
> 
> On 29/03/2022 11:12, Michal Orzel wrote:
>> On 29.03.2022 11:54, Julien Grall wrote:
>>> Hi,
>>>
>>> On 22/03/2022 08:02, Michal Orzel wrote:
>>>> Populate header file xen.lds.h with the first portion of macros storing
>>>> constructs common to x86 and arm linker scripts. Replace the original
>>>> constructs with these helpers.
>>>>
>>>> No functional improvements to x86 linker script.
>>>>
>>>> Making use of common macros improves arm linker script with:
>>>> -explicit list of debug sections that otherwise are seen as "orphans"
>>>
>>> NIT: This is a bit confusing to see no space after -. Can you add one?
>>>
>> Ok.
>>
>>> I would also recommend to start with (soft)tab to make clearer this is a list.
>>>
>>> Same goes for the  other use below.
>>>
>> Ok.
>>
>>>
>>>> by the linker. This will allow to fix issues after enabling linker
>>>> option --orphan-handling one day
>>>> -extended list of discarded section to include: .discard, desctructors
>>>
>>> Typo: s/desctructors/destructors/
>>>
>> Ok.
>>
>>>> related sections, .fini_array which can reference .text.exit
>>>> -sections not related to debugging that are placed by ld.lld.
>>>> Even though Xen on arm compilation with LLVM support is not ready yet,
>>>
>>> Building natively Xen on Arm with Clang works. So do you mean you using LLD?
>>>
>> I mean using the LLVM replacements not only for CC + supporting cross-compilation.
>> As for the linker, Xen sets llvm-ld which is very very old and in fact README states
>> LLVM 3.5 or later but llvm-ld was removed before that.
> 
> I am confused. I looked at the llvm repo and lld is still there. So why are you saying is lld is very old and removed?
> 
lld is not llvm-ld. I'm talking about llvm-ld. lld is the current LLVM linker. Xen sets LD to llvm-ld which has been removed in 3.2:
See: https://releases.llvm.org/3.2/docs/ReleaseNotes.html

>> Thus IMO support for LLVM on arm
>> is not ready yet.
> 
> I agree that building Xen on Arm only with LLVM tools is not possible yet. But this statement seems to be a bit too broad here. I think what matters is we don't support linking with LLD on Arm.
> 
>>>> these sections do not cause problem to GNU ld.
>>>>
>>>> Please note that this patch does not aim to perform the full sync up
>>>> between the linker scripts. It creates a base for further work.
>>>>
>>>> Signed-off-by: Michal Orzel <michal.orzel@arm.com>
>>>
>>> [...]
>>>
>>>> diff --git a/xen/include/xen/xen.lds.h b/xen/include/xen/xen.lds.h
>>>> index dd292fa7dc..ad1d199021 100644
>>>> --- a/xen/include/xen/xen.lds.h
>>>> +++ b/xen/include/xen/xen.lds.h
>>>> @@ -5,4 +5,104 @@
>>>>     * Common macros to be used in architecture specific linker scripts.
>>>>     */
>>>>    +/* Macros to declare debug sections. */
>>>> +#ifdef EFI
>>>
>>> AFAIK, we don't define EFI on Arm (just CONFIG_EFI). Yet we do support EFI on arm64.
>>>
>>> As this #ifdef is now in generic code, can you explain how this is meant to be used?
>>>
>> As we do not define EFI on arm, all the stuff protected by #ifdef EFI is x86 specific.
> 
> I find the name "EFI" too generic to figure out that this code can only be used by x86.
> 
> But, from my understanding, this header is meant to contain generic code. It feels a bit odd that we are moving arch specific code.
> 
> To be honest, I don't quite understand why we need to make the diffferentiation on x86. So I guess the first question is how this is meant to be used on x86?
> 
> Once we answered that, we can decide whether this is correct to use EFI in generic code. IOW, is thish going to be useful for other arch?
> 
I think Jan needs to answer this question as I am not sure.

>>
>>>> +/*
>>>> + * Use the NOLOAD directive, despite currently ignored by (at least) GNU ld
>>>> + * for PE output, in order to record that we'd prefer these sections to not
>>>> + * be loaded into memory.
>>>> + */
>>>> +#define DECL_DEBUG(x, a) #x ALIGN(a) (NOLOAD) : { *(x) }
>>>> +#define DECL_DEBUG2(x, y, a) #x ALIGN(a) (NOLOAD) : { *(x) *(y) }
>>>> +#else
>>>> +#define DECL_DEBUG(x, a) #x 0 : { *(x) }
>>>> +#define DECL_DEBUG2(x, y, a) #x 0 : { *(x) *(y) }
>>>> +#endif
>>>> +
>>>> +/* DWARF debug sections. */
>>>> +#define DWARF_DEBUG_SECTIONS                      \
>>>> +  DECL_DEBUG(.debug_abbrev, 1)                    \
>>>> +  DECL_DEBUG2(.debug_info, .gnu.linkonce.wi.*, 1) \
>>>> +  DECL_DEBUG(.debug_types, 1)                     \
>>>> +  DECL_DEBUG(.debug_str, 1)                       \
>>>> +  DECL_DEBUG2(.debug_line, .debug_line.*, 1)      \
>>>> +  DECL_DEBUG(.debug_line_str, 1)                  \
>>>> +  DECL_DEBUG(.debug_names, 4)                     \
>>>> +  DECL_DEBUG(.debug_frame, 4)                     \
>>>> +  DECL_DEBUG(.debug_loc, 1)                       \
>>>> +  DECL_DEBUG(.debug_loclists, 4)                  \
>>>> +  DECL_DEBUG(.debug_macinfo, 1)                   \
>>>> +  DECL_DEBUG(.debug_macro, 1)                     \
>>>> +  DECL_DEBUG(.debug_ranges, 8)                    \
>>>> +  DECL_DEBUG(.debug_rnglists, 4)                  \
>>>> +  DECL_DEBUG(.debug_addr, 8)                      \
>>>> +  DECL_DEBUG(.debug_aranges, 1)                   \
>>>> +  DECL_DEBUG(.debug_pubnames, 1)                  \
>>>> +  DECL_DEBUG(.debug_pubtypes, 1)
>>>> +
>>>> +/* Stabs debug sections. */
>>>> +#define STABS_DEBUG_SECTIONS                 \
>>>> +  .stab 0 : { *(.stab) }                     \
>>>> +  .stabstr 0 : { *(.stabstr) }               \
>>>> +  .stab.excl 0 : { *(.stab.excl) }           \
>>>> +  .stab.exclstr 0 : { *(.stab.exclstr) }     \
>>>> +  .stab.index 0 : { *(.stab.index) }         \
>>>> +  .stab.indexstr 0 : { *(.stab.indexstr) }
>>>> +
>>>> +/*
>>>> + * Required sections not related to debugging.
>>>> + *
>>>> + * LLVM ld also wants .symtab, .strtab, and .shstrtab placed. These look to
>>>> + * be benign to GNU ld, so we can have them here unconditionally.
>>>> + */
>>>> +#define ELF_DETAILS_SECTIONS     \
>>>> +  .comment 0 : { *(.comment) }   \
>>>
>>> This is a bit confusing. Here you seem to use the section .comment. But...
>>>
>>>> +  .symtab 0 : { *(.symtab) }     \
>>>> +  .strtab 0 : { *(.strtab) }     \
>>>> +  .shstrtab 0 : { *(.shstrtab) }
>>>> +
>>>> +#ifdef EFI
>>>> +#define DISCARD_EFI_SECTIONS \
>>>> +       *(.comment)   \
>>>
>>> ... here you will discard it if EFI is set. Which one take precedence if the caller use both ELF_DETAILS_SECTIONS and DISCARD_EFI_SECTION?
>>>
>> ELF_DETAILS_SECTIONS is protected by #ifndef EFI and DISCARD_EFI_SECTION by #ifdef EFI
>> so the caller cannot use both ELF_DETAILS_SECTIONS and DISCARD_EFI_SECTION.
> 
> The caller will protect it. But it is not in the header. I don't think we should expect the user to check x86 to understand how this is meant to be used.
> 
>>
>>> Also, can you explain why we need to drop those sections when EFI is set?
>>>
>> This is related to x86. Please see the commit: 7844f90abd551f6d5cd9b670b5ed8a4683258a21
> 
> Why is this in the generic header then?
> 
If we decide that EFI is not meant for anything else than x86, I will get rid of it completely from this header.

> Cheers,
> 

Cheers,
Michal


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 11:16:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 11:16:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295802.503514 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ9po-0007On-2Y; Tue, 29 Mar 2022 11:16:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295802.503514; Tue, 29 Mar 2022 11:16:24 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZ9pn-0007Og-VF; Tue, 29 Mar 2022 11:16:23 +0000
Received: by outflank-mailman (input) for mailman id 295802;
 Tue, 29 Mar 2022 11:16:22 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ9pm-0007OW-NQ; Tue, 29 Mar 2022 11:16:22 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ9pm-00060a-MW; Tue, 29 Mar 2022 11:16:22 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ9pm-00075K-91; Tue, 29 Mar 2022 11:16:22 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZ9pm-0006Uh-8V; Tue, 29 Mar 2022 11:16:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=yYrZbBr6KjMeBlWmNzDGo0LWnPwNX4IcAr3W+Geat68=; b=W1BD5gndXddjZqYDFPiAkjXmtn
	RETpfVNu07iht2ZAGTsMUfjDFg//O28+0CFzAILSAQuwwnTMvHs+lx+jX383v+t3GtttfDVd6W7SS
	xJg1IysWqy881rtCTfgehxqOX+H9d3hCJYzrIGTybxkk2BA2CCUCxHYosiMuJ+gQbKss=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168954-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168954: trouble: blocked/broken
X-Osstest-Failures:
    ovmf:build-amd64:<job status>:broken:regression
    ovmf:build-amd64-pvops:<job status>:broken:regression
    ovmf:build-amd64-xsm:<job status>:broken:regression
    ovmf:build-i386:<job status>:broken:regression
    ovmf:build-i386-pvops:<job status>:broken:regression
    ovmf:build-i386-xsm:<job status>:broken:regression
    ovmf:build-i386-pvops:host-install(4):broken:regression
    ovmf:build-i386:host-install(4):broken:regression
    ovmf:build-i386-xsm:host-install(4):broken:regression
    ovmf:build-amd64-pvops:host-install(4):broken:regression
    ovmf:build-amd64:host-install(4):broken:regression
    ovmf:build-amd64-xsm:host-install(4):broken:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=40004ff9d5e11441bb970dfc701e552801060b1b
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 29 Mar 2022 11:16:22 +0000

flight 168954 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168954/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168254
 build-i386                    4 host-install(4)        broken REGR. vs. 168254
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168254
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 168254
 build-amd64                   4 host-install(4)        broken REGR. vs. 168254
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 40004ff9d5e11441bb970dfc701e552801060b1b
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   29 days
Failing since        168258  2022-03-01 01:55:31 Z   28 days  261 attempts
Testing same since   168954  2022-03-28 19:41:37 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Bob Feng <bob.c.feng@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Mara Sophie Grosch <littlefox@lf-net.org>
  Mara Sophie Grosch via groups.io <littlefox=lf-net.org@groups.io>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Yi Li <yi1.li@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64                                                  broken  
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-i386 broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-i386-pvops host-install(4)
broken-step build-i386 host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step build-amd64-pvops host-install(4)
broken-step build-amd64 host-install(4)
broken-step build-amd64-xsm host-install(4)

Not pushing.

(No revision log; it would be 1112 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 11:38:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 11:38:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295813.503533 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZAB3-0001Ov-UO; Tue, 29 Mar 2022 11:38:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295813.503533; Tue, 29 Mar 2022 11:38:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZAB3-0001Oo-RT; Tue, 29 Mar 2022 11:38:21 +0000
Received: by outflank-mailman (input) for mailman id 295813;
 Tue, 29 Mar 2022 11:38:19 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=kdRh=UI=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZAB1-0001Oi-N5
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 11:38:19 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ba5d563a-af54-11ec-a405-831a346695d4;
 Tue, 29 Mar 2022 13:38:18 +0200 (CEST)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur01lp2055.outbound.protection.outlook.com [104.47.2.55]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-26-5-p8YpPtPJ-IXaif0ImZuA-1; Tue, 29 Mar 2022 13:38:15 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by PAXPR04MB8301.eurprd04.prod.outlook.com (2603:10a6:102:1c5::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.23; Tue, 29 Mar
 2022 11:38:14 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%5]) with mapi id 15.20.5102.023; Tue, 29 Mar 2022
 11:38:14 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ba5d563a-af54-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648553897;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=GEIPtuA3lEWF3YPBruq1BErenQb0eNex0P5BL5QxXJ0=;
	b=GvL6eZypWMEpcB0KxTZ8ilUlIIsyzg1CVBoCg8ojZKB6dFvbU/bDiCSIhdygOp9CCi+/B0
	wez5GjsvDcAkjr/oF2E8SVzdB4p5HkLTd4T9PneJGL7Y9bK0VjO+mjSOV+NcBJGMd+ywik
	eDYE/SkAA8A4pkWOKCwdUBdTJacuPqE=
X-MC-Unique: 5-p8YpPtPJ-IXaif0ImZuA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=PlEoE4K8Jrj/AYGAYDWxaORT/v8yTXeg7MhzHSqSu5U+Sd6OJ2bvawDzOuXA7ZAH1rlI83OjnFTypcaDodW7VFy1WcQKChJmWkhW+l+NxrsKve2iRAJRdBm2SIgxrCxQyJhBKf57ixFvp12AyW0oWXxseyalq7Wmj1PivPSrPYx/seq3acGm5mzY4iUmRaaRSHCurDAnaBMjJ9LZ2hiHHVSdVtbo13IM6Z5b5gpNzfzUuLezhJ07Ie/tJDD1iE0+BzZShY1hLcghejtoPM1S1Ub89U+SL4uLO7Niz0piWGxsufO7Okq9R6/Ag45CnagsGo1PCD1rMePi8KDBcguHrQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=GEIPtuA3lEWF3YPBruq1BErenQb0eNex0P5BL5QxXJ0=;
 b=YFUq8PyNR8ycWnAFbxwV4R+j3eHx7X5xNkQZwV+REMhJSoKCihgjpU4PvS3nqID5kBMjn8SGuPrexI8x3TlnI/IChrtyquUA6CK8owFU2DipOJR3iMRPxpCwpMYTzsyabKJmaBAJJdsK4aBFIkfZEy2GwWKPhcsnP91PG1tShgLR+BSB5KDbuc1cqVk4VUVZZemOhr2cIaa4MLFPO6wO9nm2l5VjamDgk/5ioLPYo2aixMKhHcrl8hmRJE9FXp4rUnjFYT2Qb2SEA+iIWqBitLK2OGvxpjS3XUuexVH6M3AyrLqdrLT015LDyQRV/+1EOu+d3deDYAHJjMhDuddDQA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <e2de92d9-0699-5669-5b2d-b94216bf9dec@suse.com>
Date: Tue, 29 Mar 2022 13:38:02 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2 2/2] xen: Populate xen.lds.h and make use of its macros
Content-Language: en-US
To: Julien Grall <julien@xen.org>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Michal Orzel <michal.orzel@arm.com>, xen-devel@lists.xenproject.org
References: <20220322080233.53134-1-michal.orzel@arm.com>
 <20220322080233.53134-3-michal.orzel@arm.com>
 <2940b4c8-5d44-695e-4550-0a32c3a4c053@xen.org>
 <293aa4e4-ac6b-2446-ea78-986014993e89@suse.com>
 <c2c936be-5f11-393b-3bcc-82a42fa964af@xen.org>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <c2c936be-5f11-393b-3bcc-82a42fa964af@xen.org>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6PR01CA0065.eurprd01.prod.exchangelabs.com
 (2603:10a6:20b:e0::42) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 7518f333-32b0-4d2a-bd60-08da11789c4c
X-MS-TrafficTypeDiagnostic: PAXPR04MB8301:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB83011D954ED25BF8C6353CB3B31E9@PAXPR04MB8301.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(31696002)(36756003)(26005)(186003)(53546011)(6666004)(83380400001)(5660300002)(6506007)(7416002)(38100700002)(508600001)(86362001)(31686004)(6916009)(8936002)(2616005)(66946007)(66556008)(66476007)(54906003)(6512007)(316002)(8676002)(2906002)(4326008)(6486002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?NTkyVjMvSU1JTGNscmFDcmV5bndwdUkvcHoraFV0Q0tMdnV2NlV4cEpMNUdR?=
 =?utf-8?B?enplaEhxaUJmWTNXWTZCZ09aSERUdzJsMy9YNW9SbEowT2RKbnpScFAxOWgy?=
 =?utf-8?B?UDRsTGNKZHdWZUp1Z0Y1bkdKVitjRTZPTzFrUFVWTWFPL0pUWWJoNmpwcXBy?=
 =?utf-8?B?TDFuNHQ2ZStBcFUwa29LWnU3L3hqYnRHRUtDNkpxa0ZvT3dyaHhQMVd5ZkNl?=
 =?utf-8?B?TlE1d3hISmtxRlRtV2lEY3krVXpsUXVHczhEL2pEMmZNdEh2WTZFdUVWNGFq?=
 =?utf-8?B?K0NuN3Jub3FxendMajU4V2dnL0JZRkxtYS9nVkhKUEFGVFIvOFJOOEFYZE02?=
 =?utf-8?B?VXV5aW1LQ0FVSU1tWlhjZWFVS3V3MlBETCtHT3V0b0piN3FSczhqTTlSTHJi?=
 =?utf-8?B?VFgwL1J3VHJOM0hWU3k4YTJLd1N2RmxEUUsvT2hLN2QvaUx2UTZDclo0OUxx?=
 =?utf-8?B?YnBQSXFQVnFUelZWemVxenc5MVFFcHY0TXh3YVpEZnpIMTh2c0NmdWR3R2py?=
 =?utf-8?B?dnUydmd6R1pOanJKalZreStJcDlGNHAyYXNMd0tsclVOV2ZtS0xUWit4QWU4?=
 =?utf-8?B?WmFWb2Y5TXgxUUJJVnlFVWtRaGZ6akRqQllKOXlTZmlENE5sUFFUSDIxSldk?=
 =?utf-8?B?RWwrS0tJdU1jUXp3T3luZDRsdktCOVlmUk90SU8zeEtyYkxJRDZIZGtPS05j?=
 =?utf-8?B?OTNZQUU1WG9ZdlNITFpMOXAzeHlOZFRnVjlBeTR1RlloSk8reWRqYUF4T1ZV?=
 =?utf-8?B?bm1CRjVhbnBJZ2FiYzFiYXFLbFhlek1mSW9aU0F0bUd0b25EMFU2WldoMW0y?=
 =?utf-8?B?RXRqMDNZL2R2a2IrV2RhK3pocE1wR24zUjhjd3hySUoxc1lDSldvdkpBR2Fp?=
 =?utf-8?B?QXZ1UUIwNElzcjNrYVB4Q3E3QVI2SDhPZ2p0N1lZM0h0RXpBT3FVaGhxakJB?=
 =?utf-8?B?TUhUMkVXL2hSSHFadmZZNmJvV1U3WllzWTVFcTc4SjlVWm9CeG9TMkpZTTZy?=
 =?utf-8?B?anFpYkFsdVNrZkZvd1JZZk9VWUYrK0dRYk9BSlBkOW5MNTh4a3Fra2FXcWE4?=
 =?utf-8?B?TnNNNlRMdGV1cnFRbFpnUUpCVUNIWHRpVnJkMjhEN1RFRzNKMGpPTUxpSEZD?=
 =?utf-8?B?Q0JJcnB3ZFYxTGVSOVUwY2tudkpvOXZRbFJ4R3FEQjkxWkNpM0FkQnFPazZu?=
 =?utf-8?B?MVdhcCtjTFNnSXNMWnozZmNucnp0b3NVOU5vOHdmM3V4T0xaaklpR3MrZkhN?=
 =?utf-8?B?aXVmM1hUSUVBa3VqcXR5U0Y0WGl1SGRpTHI0ellGbkw2dmthSTY1ZE9MNXVx?=
 =?utf-8?B?L2RKa29xWlVrWDZXNzNJRE5mc1RIbXp5bVVWMGdJK2wwQkFMcFFjYmJ2SWx1?=
 =?utf-8?B?eTM3VzRERG52QkgwbDByNUhkYUYrbXZNTHJSUDJtc0dMVnk4RnFWZ3g5cEo4?=
 =?utf-8?B?TzVYZjhMcXJSNmVkYjd5ODNzanMwRmlKQ0NyZ2lSeVluYkpXUDRiaWFjUEFo?=
 =?utf-8?B?S2lhTVpJSUhlNDl0cXZSRmd3bGo4UkdmNVUzWUZwemIvWUlEam1FSDh3Slgv?=
 =?utf-8?B?aE00VXRDUkFMYW96aTVwenpzOEl0SU0rM2U5bFhyelFhMnRaUm5XSGlJZERu?=
 =?utf-8?B?N1FHYm9CWWR4QjhtNTlIblF2YWNGL0VxTmswSjQ2S0JWY2RNQmR4bDdWV0s1?=
 =?utf-8?B?QWVPU2V3RUprYi9rZTFjM0dNOXdrbmFLM05kOWh1dldmYmV5Vmlvbk5zQXpq?=
 =?utf-8?B?WFZ1UkdFenIyeFZ5bk9oV21FWE1kWnBwdlJtZGNDZjFORUF1eG9ERWg2OExn?=
 =?utf-8?B?M3hXdjF6MnA0SzNHelhtVG1rZzJYR01xMnZyRmZsSXFFOGFoeGFXSld3RElH?=
 =?utf-8?B?dzZ1eTM3ZWpvYStDRURnWHg3T0J2Tk42Z3U0V2Q1WVUvUTJ5L21kMXd3QUdx?=
 =?utf-8?B?N0d2M0NFUHdQZ3hHNG4rd2x3WGYxUURveEp0SDZpdEdrUmg0eVZOQ21YQnJS?=
 =?utf-8?B?azJKM0RDWHozRTNXQjl2bGg0ckh6bFpqMVhiSExyWEpQQ01IUm9ZZmFNZ09Z?=
 =?utf-8?B?cGprWnQ5UHBTeWRHMUZKQUZQbittTzEwemV1dDUzUjJYdHZQS1lhR0JRVnd0?=
 =?utf-8?B?aVpCOWJYVlRacmZFQkRpdXBJZUhNQllkN2cxb0k3aVZDWmR4WkE0SkxGaWdT?=
 =?utf-8?B?a0tiMzMwQzBXOENzdUdzVjNOd3RRL0hQMzcyKy9BQmJnN2QwV0orNm9ZM0k0?=
 =?utf-8?B?TDJNVDVsYzJVNGxJSHZmOXNiRC9Jc2NxakhDM0xFQjRoc0pHUjhzMTFCRldZ?=
 =?utf-8?B?ODF0K2cyTGROZzMvdDVyLzMvdUx6Yjh0ZjkwQWpHV29xTFY5djBzZz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7518f333-32b0-4d2a-bd60-08da11789c4c
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 29 Mar 2022 11:38:14.4087
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: ilAATutzdC2ATJSewHjRI2l90JteBzDnVx2N9OZbjqFRjymITDvTRjY8FPO9pVsAVPAzgbqVBjEWZBHngkEqKw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB8301

On 29.03.2022 13:07, Julien Grall wrote:
> On 29/03/2022 11:37, Jan Beulich wrote:
>> On 29.03.2022 11:54, Julien Grall wrote:
>>> On 22/03/2022 08:02, Michal Orzel wrote:
>>>> --- a/xen/include/xen/xen.lds.h
>>>> +++ b/xen/include/xen/xen.lds.h
>>>> @@ -5,4 +5,104 @@
>>>>     * Common macros to be used in architecture specific linker scripts.
>>>>     */
>>>>    
>>>> +/* Macros to declare debug sections. */
>>>> +#ifdef EFI
>>>
>>> AFAIK, we don't define EFI on Arm (just CONFIG_EFI). Yet we do support
>>> EFI on arm64.
>>>
>>> As this #ifdef is now in generic code, can you explain how this is meant
>>> to be used?
>>
>> The identifier may now be somewhat misleading, yes - it has always meant
>> "linking a native EFI (i.e. PE/COFF) binary". The equivalence "EFI binary"
>> == "EFI support" has long been lost.
> On Arm, we will be generating a EFI binary (or better a Image/EFI). So 
> IIUC the description, we should in theory set EFI.

Well, no - you're mixing up "generating" and "linking". What's of interest
here is what the linker is told to produce, not what may involved further
processing steps. We're talking about a linker script here, after all.

> But I think it would do the wrong thing on Arm. Would you be able to 
> explain why you need to differentiate it on x86?

The differences aren't unique to x86; they all are related to how ELF and
PE/COFF differ from one another.

>>>> +/*
>>>> + * Use the NOLOAD directive, despite currently ignored by (at least) GNU ld
>>>> + * for PE output, in order to record that we'd prefer these sections to not
>>>> + * be loaded into memory.
>>>> + */
>>>> +#define DECL_DEBUG(x, a) #x ALIGN(a) (NOLOAD) : { *(x) }
>>>> +#define DECL_DEBUG2(x, y, a) #x ALIGN(a) (NOLOAD) : { *(x) *(y) }
>>>> +#else
>>>> +#define DECL_DEBUG(x, a) #x 0 : { *(x) }
>>>> +#define DECL_DEBUG2(x, y, a) #x 0 : { *(x) *(y) }
>>>> +#endif
>>>> +
>>>> +/* DWARF debug sections. */
>>>> +#define DWARF_DEBUG_SECTIONS                      \
>>>> +  DECL_DEBUG(.debug_abbrev, 1)                    \
>>>> +  DECL_DEBUG2(.debug_info, .gnu.linkonce.wi.*, 1) \
>>>> +  DECL_DEBUG(.debug_types, 1)                     \
>>>> +  DECL_DEBUG(.debug_str, 1)                       \
>>>> +  DECL_DEBUG2(.debug_line, .debug_line.*, 1)      \
>>>> +  DECL_DEBUG(.debug_line_str, 1)                  \
>>>> +  DECL_DEBUG(.debug_names, 4)                     \
>>>> +  DECL_DEBUG(.debug_frame, 4)                     \
>>>> +  DECL_DEBUG(.debug_loc, 1)                       \
>>>> +  DECL_DEBUG(.debug_loclists, 4)                  \
>>>> +  DECL_DEBUG(.debug_macinfo, 1)                   \
>>>> +  DECL_DEBUG(.debug_macro, 1)                     \
>>>> +  DECL_DEBUG(.debug_ranges, 8)                    \
>>>> +  DECL_DEBUG(.debug_rnglists, 4)                  \
>>>> +  DECL_DEBUG(.debug_addr, 8)                      \
>>>> +  DECL_DEBUG(.debug_aranges, 1)                   \
>>>> +  DECL_DEBUG(.debug_pubnames, 1)                  \
>>>> +  DECL_DEBUG(.debug_pubtypes, 1)
>>>> +
>>>> +/* Stabs debug sections. */
>>>> +#define STABS_DEBUG_SECTIONS                 \
>>>> +  .stab 0 : { *(.stab) }                     \
>>>> +  .stabstr 0 : { *(.stabstr) }               \
>>>> +  .stab.excl 0 : { *(.stab.excl) }           \
>>>> +  .stab.exclstr 0 : { *(.stab.exclstr) }     \
>>>> +  .stab.index 0 : { *(.stab.index) }         \
>>>> +  .stab.indexstr 0 : { *(.stab.indexstr) }
>>>> +
>>>> +/*
>>>> + * Required sections not related to debugging.
>>>> + *
>>>> + * LLVM ld also wants .symtab, .strtab, and .shstrtab placed. These look to
>>>> + * be benign to GNU ld, so we can have them here unconditionally.
>>>> + */
>>>> +#define ELF_DETAILS_SECTIONS     \
>>>> +  .comment 0 : { *(.comment) }   \
>>>
>>> This is a bit confusing. Here you seem to use the section .comment. But...
>>>
>>>> +  .symtab 0 : { *(.symtab) }     \
>>>> +  .strtab 0 : { *(.strtab) }     \
>>>> +  .shstrtab 0 : { *(.shstrtab) }
>>>> +
>>>> +#ifdef EFI
>>>> +#define DISCARD_EFI_SECTIONS \
>>>> +       *(.comment)   \
>>>
>>> ... here you will discard it if EFI is set. Which one take precedence if
>>> the caller use both ELF_DETAILS_SECTIONS and DISCARD_EFI_SECTION?
>>
>> Given the above explanation I think it's clear that only one of the
>> two may be used at a time: ELF_DETAILS_SECTIONS when linking an ELF
>> binary and DISCARD_EFI_SECTIONS when linking a PE/COFF binary.
> 
> I guess this may be obvious on x86. But for Arm, we are generating the 
> ELF first and then extracting the information to generate the binary. 
> The end result will be a binary that is PE/COFF compatible.
> 
> So to me, it would make sense to include DISCARD_EFI_SECTIONS because we 
> going to create an EFI binary and also include EFI_DETAILS_SECTIONS 
> because we are building an ELF.

No - as per above, all we should be concerned about in the linker script
are requirements by the linker for linking a file in the request output
format.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 29 11:42:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 11:42:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295817.503545 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZAEo-0002mM-Gf; Tue, 29 Mar 2022 11:42:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295817.503545; Tue, 29 Mar 2022 11:42:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZAEo-0002mF-Cn; Tue, 29 Mar 2022 11:42:14 +0000
Received: by outflank-mailman (input) for mailman id 295817;
 Tue, 29 Mar 2022 11:42:13 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=kdRh=UI=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZAEn-0002m9-9u
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 11:42:13 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 45f7367b-af55-11ec-8fbc-03012f2f19d4;
 Tue, 29 Mar 2022 13:42:12 +0200 (CEST)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2054.outbound.protection.outlook.com [104.47.14.54]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-26-pMUsyQh4O3-eNIn_7BRL2g-1; Tue, 29 Mar 2022 13:42:08 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM6PR0402MB3591.eurprd04.prod.outlook.com (2603:10a6:209:8::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.16; Tue, 29 Mar
 2022 11:42:06 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%5]) with mapi id 15.20.5102.023; Tue, 29 Mar 2022
 11:42:06 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 45f7367b-af55-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648554132;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=zp2mMUYvEkM5FwPe/Frvx9p3jJVKKtOfKDZpTrno/nk=;
	b=X3bm9Qxxbb4IUSNW3UQDKSRC32BSlJTEKkInSmL8ZT2RvTEq4X5N2p70rjHJWLLQQetdwS
	SHrtAiHh8QmBpiRE+yh2Sw1ccoJ98ff7+MBsff5tdgKVGaY6UC340yxQwot9DlIJrQQI3Z
	KEgcCOYuLQISGHKcZ0nAYRshg6gi9QA=
X-MC-Unique: pMUsyQh4O3-eNIn_7BRL2g-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=g9capGzp+1TtwMBTa68yOq0XZv9qfVSnRIjqyjZo1e5vkuLUAigUPtDZEL3uy+xU8aFkSw1gh7Bb7rhvhEj969tMOdu0PPYaYE0+N/GcMbNrHgYsPuW/vAPIpm6vMvrnRNpnhcds9YyS7RyrK0XErvgJsLHnjFlHtMVlCwsbcNTzc3yoSzZapbkPWFy3s/OObzJy/OBOhloPL3eXPwnCe4AB/Dr0jiXagvsEL3twZlGmxLufHV3LQnKFzEVvd4SiC99slL2ITeaLsakzQx+ux/H4IuA0aiTPqdkmODddR14sic1C8UY6jbXPL4ixG8gEjpa9BdZnipXZwhFlgZXKnA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=/Da0u2wt/JglFiSsVTCZaF9E4pnNdkGgZuM1GgmPz5Y=;
 b=C1+D1mm8bzPT+SgLQ4prZCEQeEwskHSRmm+ecsF9OSTuE/TKvRZ3DOxhfj3Vn/raL6Xy0Y/m8+JGjpsJtt5o9T6JviyTE6lD7gDJaEN7IxS/7jiYf0xt8+YKqYtaWpmHsmsl4htDlfKLaZqnDI9LocL/3NcZuWLTX5kdgku2tqhlo24L9BIQZXq/52lVDnmZECHFBibsCL/s/a9ie1M0Hwsa8aELwN8b/kGl9qRVvEhidHBjFx1rRp1ucLrZPOLTbetYr65WYg2PFQ+dWKHeOQu5whe7tRPwPkb6F+lCv1msnXSxqlBdTuCtVKAwiC5Jxix5Pa99E2BF2kfHnLkAUg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <63a680c6-0086-230b-dbbd-dfe63609f9bc@suse.com>
Date: Tue, 29 Mar 2022 13:42:04 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2 2/2] xen: Populate xen.lds.h and make use of its macros
Content-Language: en-US
To: Julien Grall <julien@xen.org>
CC: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Michal Orzel <michal.orzel@arm.com>, xen-devel@lists.xenproject.org
References: <20220322080233.53134-1-michal.orzel@arm.com>
 <20220322080233.53134-3-michal.orzel@arm.com>
 <2940b4c8-5d44-695e-4550-0a32c3a4c053@xen.org>
 <d5bccf50-c74a-40e6-843e-3ad682647efb@arm.com>
 <5121de30-644f-8a1f-ff1a-29c4d2ee7f0f@xen.org>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <5121de30-644f-8a1f-ff1a-29c4d2ee7f0f@xen.org>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6PR05CA0014.eurprd05.prod.outlook.com
 (2603:10a6:20b:2e::27) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 16b8e549-ff84-4f65-3aa3-08da1179267f
X-MS-TrafficTypeDiagnostic: AM6PR0402MB3591:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR0402MB3591197EC7EE15EC4A15AB85B31E9@AM6PR0402MB3591.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(2616005)(86362001)(31696002)(186003)(66946007)(8676002)(26005)(38100700002)(4326008)(66556008)(66476007)(316002)(8936002)(6916009)(6486002)(6512007)(2906002)(508600001)(6506007)(36756003)(54906003)(5660300002)(7416002)(31686004)(53546011)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?zAKrR+3wIDswPEuzxUVyqxyoSeAqZy6hMgrblZDgANH1btUtMLyp0K65FhmB?=
 =?us-ascii?Q?LH8YDffB3Rewz2paaQ2x6UxG6r8iVERtn0mST0aMdGa13f22fndZ9cTrxMwV?=
 =?us-ascii?Q?Hw+YUoU7pTUT07uBOkMhQVP57LMMLEFmtPvicDdLTEnO7+jiKSX7xKX8HcoV?=
 =?us-ascii?Q?OCAHGW5CDHxTzzxDnQg6+fI925qOmPihlFqOGGcH8Htb6uYvPJTA92sNEWe1?=
 =?us-ascii?Q?aBjay/gXWg3r6T2Zqvd9WceAmXr32/gpa6EFga8wogpgZBdkbdgawKvpJH7o?=
 =?us-ascii?Q?idhjT1FS9RcwiXZXcG/uKHhsf3Inj73KSkdjLyJoyxxEODqVAnl89ay3U38L?=
 =?us-ascii?Q?i06RgBdtz9QA5baLJ68E8nsWcEZETvzL3JmUz1iewsF8SzILDZj2Hlan0SnK?=
 =?us-ascii?Q?EyqZKhAybTW2zlaeAKKMXmmjwfodDMwOBamIv9vYJ33thGp0uGCGZrz9icsy?=
 =?us-ascii?Q?WdF+W1+MlDMGVueyk11UXUCXB3dG9KKZJ6uLyHI6S4iAo2erYy75gx0yn/0l?=
 =?us-ascii?Q?RVtVchYjDoFY/Yew7V5rVVDFPc3x+fHgzBwLglHl5N0FGjSiOz2jJoS+YRey?=
 =?us-ascii?Q?RSrxxO1dCIockHoszLNzN3RlWwCrpEW6hOcPj9cd0eHPGqyuKx1HoiHNrJnl?=
 =?us-ascii?Q?pK0Nh3IQi5joxPUxvDClEPDND0g4eWMpPoiRxnMQXWiKr+5Hz9Ryuci4kZvk?=
 =?us-ascii?Q?PEzbFqKus8lTNrBkiIPp3Xqlutbp1JiPu/nr/u+UgFYnCdDdpA7BHHPHPzbF?=
 =?us-ascii?Q?Mz2oW1w/fgkQk++dH1VIFzf6i97E37yl/K+5Mqi1PxBXUrM7sxKZOQyae6ok?=
 =?us-ascii?Q?03zyADsksSSqxBaUpg1e6SxTY5IDcI7muhaOwelxgcHIFba+zYv2ZkN/FM3+?=
 =?us-ascii?Q?PmlgS9iFP6VZP2mdsEojsKFEfwQKjBCTfaRFZlGDGDLKBCDSXPmYg9s5sF7h?=
 =?us-ascii?Q?+6zRLexVqfi9SAT0wgy27V0QXFQM+1lWAXOald/HdFe8crRyP7rCfA0lTbL5?=
 =?us-ascii?Q?aAqX+90OHmYfzcbrvK+rsyqJp+YHibCBJutyp3q3jKBdM+fGoC3O8Q5DV5Cv?=
 =?us-ascii?Q?CLIb47dSm6c/dzTDylmqWdttgVkmdrR3oPLaLZOvApwuxBnaiIik0pTrmJVD?=
 =?us-ascii?Q?+n05o3+z/Cd7PXqWTGTRF+qdx9WmDe572o9CptksyaCb2Jm0jdWzGnOiFYRU?=
 =?us-ascii?Q?7nd7V8Tuzx5izJHc/yj1Ipik0kj+wzvblF6Hfmn7Bj2iJ7TD9+oDxqteRc1H?=
 =?us-ascii?Q?JwkhyGUMO8/94dwdr455ukVfAOiym7zafju0RtmR/M/Jx0cXDhhw5liQyt4l?=
 =?us-ascii?Q?s0xw5VR904MulXskzFinKJf6SaZn/u3ml86ivxufTzqlE/FSOgirhxl+bI5q?=
 =?us-ascii?Q?BXETB0OPgX7XU2QSyonlC1hC0qn41tPxab9uYJVWHbnT7Cog7DgvceSnVWrF?=
 =?us-ascii?Q?ilXgbkPFg3HStoXduNmShXifDkHPhcrR0MqEEuUMzWwO/VaIJAoAM9GaHig4?=
 =?us-ascii?Q?ItjvOwx1/Jf7jk1g56JaL2tSaS421/0DgzR3hiVwIdqpK6xvW2tQ4vmPzar1?=
 =?us-ascii?Q?Wv/BtHE8F1E1mDamHyPDhkpG3PCbpHbdiHV7Tvg+Hc69MSAKz32ec5KWOFxz?=
 =?us-ascii?Q?tFaCQyCrIcmLUhoKYk2krMJtRziw1A8C1lHCpO1myeQmGrbYLp9zpVFLT58m?=
 =?us-ascii?Q?5rRi+9TdXivf76ee31xGOg/0VFIZQQ4xvuE5f9mvy4zC6vse35UoJKtMYVDc?=
 =?us-ascii?Q?Bsr5aK+nNA=3D=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 16b8e549-ff84-4f65-3aa3-08da1179267f
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 29 Mar 2022 11:42:06.1714
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 5BAqjgBks0t5Ab7oQM8h6nJt4phSmDBebcDQSLxDPfHQhsXctOT9RK7FzMv7F6KKIClszI+8irCiU73ecffC2w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR0402MB3591

On 29.03.2022 12:54, Julien Grall wrote:
> On 29/03/2022 11:12, Michal Orzel wrote:
>> On 29.03.2022 11:54, Julien Grall wrote:
>>> On 22/03/2022 08:02, Michal Orzel wrote:
>>>> --- a/xen/include/xen/xen.lds.h
>>>> +++ b/xen/include/xen/xen.lds.h
>>>> @@ -5,4 +5,104 @@
>>>>  =C2=A0=C2=A0 * Common macros to be used in architecture specific link=
er scripts.
>>>>  =C2=A0=C2=A0 */
>>>>  =C2=A0 +/* Macros to declare debug sections. */
>>>> +#ifdef EFI
>>>
>>> AFAIK, we don't define EFI on Arm (just CONFIG_EFI). Yet we do support =
EFI on arm64.
>>>
>>> As this #ifdef is now in generic code, can you explain how this is mean=
t to be used?
>>>
>> As we do not define EFI on arm, all the stuff protected by #ifdef EFI is=
 x86 specific.
>=20
> I find the name "EFI" too generic to figure out that this code can only=20
> be used by x86.
>=20
> But, from my understanding, this header is meant to contain generic=20
> code. It feels a bit odd that we are moving arch specific code.
>=20
> To be honest, I don't quite understand why we need to make the=20
> diffferentiation on x86. So I guess the first question is how this is=20
> meant to be used on x86?

We produce two linker scripts from the single source file: One (with EFI
undefined) to link the ELF binary, and another (with EFI defined) to link
the PE/COFF output. If "EFI" is too imprecise as a name for the identifier,
I wouldn't mind renaming it (to PE_COFF?), but at the same time I'm not
convinced this is really necessary.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 29 12:40:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 12:40:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295826.503556 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZB8y-0000Ka-1T; Tue, 29 Mar 2022 12:40:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295826.503556; Tue, 29 Mar 2022 12:40:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZB8x-0000KT-Uj; Tue, 29 Mar 2022 12:40:15 +0000
Received: by outflank-mailman (input) for mailman id 295826;
 Tue, 29 Mar 2022 12:40:14 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=LOEZ=UI=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nZB8w-0000KN-8R
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 12:40:14 +0000
Received: from mail-lj1-x236.google.com (mail-lj1-x236.google.com
 [2a00:1450:4864:20::236])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 5f4d4140-af5d-11ec-8fbc-03012f2f19d4;
 Tue, 29 Mar 2022 14:40:10 +0200 (CEST)
Received: by mail-lj1-x236.google.com with SMTP id bn33so23257754ljb.6
 for <xen-devel@lists.xenproject.org>; Tue, 29 Mar 2022 05:40:13 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5f4d4140-af5d-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc:content-transfer-encoding;
        bh=meoRQkZFMTcXV6JEU42Ih4CZwHdsdW0FOEJqDoWzoCc=;
        b=jKqelk7xly3U8m2iKGY9D6gxBSZmMOw86kq8vnc/hTpXeqBPfg5STGToFWkaRV70V4
         gKdifA1ru+ffMzOdnHIoq/Xwa/t1+bPr79q/ilO7BNxaNxvo57rj9jYT6AkL7ph6H0C2
         OSeNl7RrH4bZmmpWUu03vAaxFR0uCCrwOY4+PV6/UeE13Y6Y0Z1Bg5BR/EQoKm4mRZXO
         lnb6PYEcimK7KdURawYlyd1KcdoFza8WoU9TBrVyPfxTzCmY7ZCVuY+vvSZJYaNs6Evi
         ZeG74/FEm9D5vdocA7M7RVN28VjVn9EHmE1YYup8NeNUB15N2PGRIKthvseSqg5CrMxn
         artQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc:content-transfer-encoding;
        bh=meoRQkZFMTcXV6JEU42Ih4CZwHdsdW0FOEJqDoWzoCc=;
        b=JxCjQJB3IwedOjN9VE3urrDx7kUXFEhebdeooORkMUsf1yCCQFzhE1O7X/lJT+wk4A
         KSfaBLm12HiKlSa07AjvGcYSUleQl4hDY0ner/G1uhRQuOc/buVblRNJ9E8o/ssM4aiX
         yAP8AU9XzXtCG+ZuSWLJkc8Uog0MRZbioq6FivCP5EBhq/k6zUNFSZkXDDEWGkOCqJLQ
         m8kWBLCDcotJnFGtG8ebz1qm8XLhGpPW/T4dJDKkimorQ/x6IzsaOyNXuZqNAWyeowxm
         0/ipBe/+BcED4zAIkaV7CQ6uJ1RKpWb8m5WK+knno0+m75e7y2QVcgYx3/sENd8RXwSm
         0Stw==
X-Gm-Message-State: AOAM531MKU5mOxKk1tFvhVvljjJc+LI914xoIBVNu/iKmx7lMt3ol/8t
	aUO/9gXRBVorn4N7+2Fao3aBQ68QRNc8foM5/iQ=
X-Google-Smtp-Source: ABdhPJzw5TUfnxbH3kJJlGwC3uc6mcAGuIqTatg+mNmLEATcp75fI/yhyfltbnlrYmK2a0PHtxmObmc7UJbhaAEnQPY=
X-Received: by 2002:a2e:a372:0:b0:249:7108:6778 with SMTP id
 i18-20020a2ea372000000b0024971086778mr2500477ljn.403.1648557612514; Tue, 29
 Mar 2022 05:40:12 -0700 (PDT)
MIME-Version: 1.0
References: <20220325141826.16245-1-jandryuk@gmail.com> <YkGevRlIpAlCDox7@Air-de-Roger>
 <7ee0889c-c9ae-c11f-7308-25e7d5a14815@suse.com>
In-Reply-To: <7ee0889c-c9ae-c11f-7308-25e7d5a14815@suse.com>
From: Jason Andryuk <jandryuk@gmail.com>
Date: Tue, 29 Mar 2022 08:40:00 -0400
Message-ID: <CAKf6xpswv187bfJ2MTFSO4azmM0V_xSa=U5pcF1Qibzo6NFHrQ@mail.gmail.com>
Subject: Re: [PATCH] x86/physdev: Call xsm_unmap_domain_irq earlier
To: Jan Beulich <jbeulich@suse.com>
Cc: =?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>, 
	xen-devel <xen-devel@lists.xenproject.org>, Andrew Cooper <andrew.cooper3@citrix.com>, 
	Wei Liu <wl@xen.org>, "Daniel P. Smith" <dpsmith.dev@gmail.com>, 
	Daniel Smith <dpsmith@apertussolutions.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Mon, Mar 28, 2022 at 8:44 AM Jan Beulich <jbeulich@suse.com> wrote:
>
> On 28.03.2022 13:40, Roger Pau Monn=C3=A9 wrote:
> > On Fri, Mar 25, 2022 at 10:18:26AM -0400, Jason Andryuk wrote:
> >> Pull the XSM check up out of unmap_domain_pirq into physdev_map_pirq.
> >>
> >> xsm_unmap_domain_irq was seen denying unmap_domain_pirq when called fr=
om
> >> complete_domain_destroy as an RCU callback.  The source context was an
> >> unexpected, random domain.  Since this is a xen-internal operation,
> >> going through the XSM hook is inapproriate.
> >>
> >> Move the XSM hook up into physdev_unmap_pirq, which is the
> >> guest-accessible path.  This requires moving some of the sanity check
> >> upwards as well since the hook needs the additional data to make its
> >> decision.  Since complete_domain_destroy still calls unmap_domain_pirq=
,
> >> replace the moved runtime checking with assert.  Only valid pirqs shou=
ld
> >> make their way into unmap_domain_pirq from complete_domain_destroy.
> >>
> >> This is mostly code movement, but one style change is to pull `irq =3D
> >> info->arch.irq` out of the if condition.
>
> And why is this better? You now have an extra conditional expression
> there.

It's better because it is clearer.  The location is more readily
visible when scanning the code.  It fits the pattern of `variable =3D
something`.  Assigning inside the if condition makes it harder to see
where a variable is assigned, which is why I made the change.

This is the non-movement diff:

     info =3D pirq_info(d, pirq);
-    if ( !info || (irq =3D info->arch.irq) <=3D 0 )
+    irq =3D info ? info->arch.irq : 0;
+    if ( !info || irq <=3D 0 )
     {

But given comments below, it seems this movement is not going to
happen, so this change will be dropped.

> >> Label done is now unused and removed.
> >>
> >> Signed-off-by: Jason Andryuk <jandryuk@gmail.com>
> >> ---
> >> unmap_domain_pirq is also called in vioapic_hwdom_map_gsi and
> >> vpci_msi_disable.  vioapic_hwdom_map_gsi is a cleanup path after going
> >> through map_domain_pirq, and I don't think the vpci code is directly
> >> guest-accessible.  So I think those are okay, but I not familiar with
> >> that code.  Hence, I am highlighting it.
> >
> > Hm, for vpci_msi_disable it's not technically correct to drop the XSM
> > check. This is a guests accessible path, however the value of PIRQ is
> > not settable by the guest, so it's kind of OK just for that reason.

Right, that's why I was figuring it was okay.  If Xen is handling it
internally, it doesn't have to worry about untrusted data.

> Kind of - perhaps. But better to avoid if possible.

But I can also see how it is safer to leave the check in place.  It's
better to go through an unnecessary XSM check than to not have a check
at all.

> Hence I would prefer
> the ->is_dying alternative you suggest at the end.

I had not considered the ->is_dying option.  At first glance, it seems
like it would work.

I was hoping that we could determine that only sanitized data would
make it into unmap_domain_pirq.  Then we can restructure the code
instead of adding a condition to skip the XSM hook.  But if this
function is guest accessible via vpci, then the XSM check should
remain.

Regards,
Jason


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 14:04:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 14:04:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295843.503609 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZCSK-0000Un-28; Tue, 29 Mar 2022 14:04:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295843.503609; Tue, 29 Mar 2022 14:04:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZCSJ-0000Ug-V1; Tue, 29 Mar 2022 14:04:19 +0000
Received: by outflank-mailman (input) for mailman id 295843;
 Tue, 29 Mar 2022 14:04:18 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=EyIC=UI=intel.com=tamas.lengyel@srs-se1.protection.inumbo.net>)
 id 1nZCSI-0000Ow-19
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 14:04:18 +0000
Received: from mga17.intel.com (mga17.intel.com [192.55.52.151])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 1c5ff81f-af69-11ec-a405-831a346695d4;
 Tue, 29 Mar 2022 16:04:14 +0200 (CEST)
Received: from orsmga004.jf.intel.com ([10.7.209.38])
 by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 29 Mar 2022 07:04:12 -0700
Received: from tlengyel-mobl3.amr.corp.intel.com (HELO localhost.localdomain)
 ([10.212.29.163])
 by orsmga004-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 29 Mar 2022 07:04:09 -0700
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1c5ff81f-af69-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;
  t=1648562654; x=1680098654;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=+8+ET7KVGpLminOLzDYelfXHOUx6SBUWvMMkONAQxJk=;
  b=m8tWoN0jddMXHG751REfwW2VHvBqQtT883Z9tD06KMMRyVqeOOtZNlwy
   E2Z1uK2iRxT40KHB+pScz+tLFrARQr2sRAGtKQBTKP2fpqCLLNuJF8qVc
   jFEIJPtWatVoWH10XI5x0y0rccjSH9xDy9wWdvcLjiuoYColC4NBbW7c9
   1ngemLoEtA3Pij2/GEMfIvQU0kvSn2ghmGMrm+JcpHjkskMCl0QKViVFL
   t77wPBpegVhheehhtLSUC5VkCzyH+dZjIk9HID0W24SbZUDuhodiYaAW8
   wCRc83WLOB9SKYS3PYamsx45x62eRM6LeuX1INVUg8sKL+hXy85j79F2a
   Q==;
X-IronPort-AV: E=McAfee;i="6200,9189,10301"; a="239853176"
X-IronPort-AV: E=Sophos;i="5.90,220,1643702400"; 
   d="scan'208";a="239853176"
X-IronPort-AV: E=Sophos;i="5.90,220,1643702400"; 
   d="scan'208";a="652987598"
From: Tamas K Lengyel <tamas.lengyel@intel.com>
To: xen-devel@lists.xenproject.org
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>,
	Wei Liu <wl@xen.org>,
	Anthony PERARD <anthony.perard@citrix.com>,
	Juergen Gross <jgross@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Tamas K Lengyel <tamas@tklengyel.com>,
	Alexandru Isaila <aisaila@bitdefender.com>,
	Petre Pircalabu <ppircalabu@bitdefender.com>
Subject: [PATCH v2 3/3] x86/mem_sharing: make fork_reset more configurable
Date: Tue, 29 Mar 2022 10:03:22 -0400
Message-Id: <3ebadf898bf9e165d657a31c0aa98bbd300ffcb2.1648561546.git.tamas.lengyel@intel.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <ab6bb88e90e5649c60e08a1680b3a2390441031b.1648561546.git.tamas.lengyel@intel.com>
References: <ab6bb88e90e5649c60e08a1680b3a2390441031b.1648561546.git.tamas.lengyel@intel.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Allow specify distinct parts of the fork VM to be reset. This is useful when a
fuzzing operation involves mapping in only a handful of pages that are known
ahead of time. Throwing these pages away just to be re-copied immediately is
expensive, thus allowing to specify partial resets can speed things up.

Also allow resetting to be initiated from vm_event responses as an
optiomization.

Signed-off-by: Tamas K Lengyel <tamas.lengyel@intel.com>
---
v2: address review comments and add more sanity checking
---
 tools/include/xenctrl.h                |  3 ++-
 tools/libs/ctrl/xc_memshr.c            |  7 ++++++-
 xen/arch/x86/include/asm/mem_sharing.h |  9 +++++++++
 xen/arch/x86/mm/mem_sharing.c          | 27 +++++++++++++++++++++-----
 xen/common/vm_event.c                  | 15 ++++++++++++++
 xen/include/public/memory.h            |  4 +++-
 xen/include/public/vm_event.h          |  8 ++++++++
 7 files changed, 65 insertions(+), 8 deletions(-)

diff --git a/tools/include/xenctrl.h b/tools/include/xenctrl.h
index 26766ec19f..8a5b125aae 100644
--- a/tools/include/xenctrl.h
+++ b/tools/include/xenctrl.h
@@ -2291,7 +2291,8 @@ int xc_memshr_fork(xc_interface *xch,
  *
  * With VMs that have a lot of memory this call may block for a long time.
  */
-int xc_memshr_fork_reset(xc_interface *xch, uint32_t forked_domain);
+int xc_memshr_fork_reset(xc_interface *xch, uint32_t forked_domain,
+                         bool reset_state, bool reset_memory);
 
 /* Debug calls: return the number of pages referencing the shared frame backing
  * the input argument. Should be one or greater.
diff --git a/tools/libs/ctrl/xc_memshr.c b/tools/libs/ctrl/xc_memshr.c
index 0143f9ddea..5044d5b83e 100644
--- a/tools/libs/ctrl/xc_memshr.c
+++ b/tools/libs/ctrl/xc_memshr.c
@@ -260,12 +260,17 @@ int xc_memshr_fork(xc_interface *xch, uint32_t pdomid, uint32_t domid,
     return xc_memshr_memop(xch, domid, &mso);
 }
 
-int xc_memshr_fork_reset(xc_interface *xch, uint32_t domid)
+int xc_memshr_fork_reset(xc_interface *xch, uint32_t domid, bool reset_state,
+                         bool reset_memory)
 {
     xen_mem_sharing_op_t mso;
 
     memset(&mso, 0, sizeof(mso));
     mso.op = XENMEM_sharing_op_fork_reset;
+    if ( reset_state )
+        mso.u.fork.flags |= XENMEM_FORK_RESET_STATE;
+    if ( reset_memory )
+        mso.u.fork.flags |= XENMEM_FORK_RESET_MEMORY;
 
     return xc_memshr_memop(xch, domid, &mso);
 }
diff --git a/xen/arch/x86/include/asm/mem_sharing.h b/xen/arch/x86/include/asm/mem_sharing.h
index cf7a12f4d2..2c00069bc9 100644
--- a/xen/arch/x86/include/asm/mem_sharing.h
+++ b/xen/arch/x86/include/asm/mem_sharing.h
@@ -85,6 +85,9 @@ static inline bool mem_sharing_is_fork(const struct domain *d)
 int mem_sharing_fork_page(struct domain *d, gfn_t gfn,
                           bool unsharing);
 
+int mem_sharing_fork_reset(struct domain *d, bool reset_state,
+                           bool reset_memory);
+
 /*
  * If called by a foreign domain, possible errors are
  *   -EBUSY -> ring full
@@ -148,6 +151,12 @@ static inline int mem_sharing_fork_page(struct domain *d, gfn_t gfn, bool lock)
     return -EOPNOTSUPP;
 }
 
+static inline int mem_sharing_fork_reset(struct domain *d, bool reset_state,
+                                         bool reset_memory)
+{
+    return -EOPNOTSUPP;
+}
+
 #endif
 
 #endif /* __MEM_SHARING_H__ */
diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86/mm/mem_sharing.c
index bfde342a38..11c74e3905 100644
--- a/xen/arch/x86/mm/mem_sharing.c
+++ b/xen/arch/x86/mm/mem_sharing.c
@@ -1890,15 +1890,24 @@ static int fork(struct domain *cd, struct domain *d, uint16_t flags)
  * footprints the hypercall continuation should be implemented (or if this
  * feature needs to be become "stable").
  */
-static int mem_sharing_fork_reset(struct domain *d)
+int mem_sharing_fork_reset(struct domain *d, bool reset_state,
+                           bool reset_memory)
 {
-    int rc;
+    int rc = 0;
     struct domain *pd = d->parent;
     struct p2m_domain *p2m = p2m_get_hostp2m(d);
     struct page_info *page, *tmp;
 
+    ASSERT(reset_state || reset_memory);
+
+    if ( !d->arch.hvm.mem_sharing.fork_complete )
+        return -ENOSYS;
+
     domain_pause(d);
 
+    if ( !reset_memory )
+        goto state;
+
     /* need recursive lock because we will free pages */
     spin_lock_recursive(&d->page_alloc_lock);
     page_list_for_each_safe(page, tmp, &d->page_list)
@@ -1931,7 +1940,9 @@ static int mem_sharing_fork_reset(struct domain *d)
     }
     spin_unlock_recursive(&d->page_alloc_lock);
 
-    rc = copy_settings(d, pd, d->arch.hvm.mem_sharing.empty_p2m);
+ state:
+    if ( reset_state )
+        rc = copy_settings(d, pd, d->arch.hvm.mem_sharing.empty_p2m);
 
     domain_unpause(d);
 
@@ -2237,15 +2248,21 @@ int mem_sharing_memop(XEN_GUEST_HANDLE_PARAM(xen_mem_sharing_op_t) arg)
 
     case XENMEM_sharing_op_fork_reset:
     {
+        bool reset_state = mso.u.fork.flags & XENMEM_FORK_RESET_STATE;
+        bool reset_memory = mso.u.fork.flags & XENMEM_FORK_RESET_MEMORY;
+
         rc = -EINVAL;
-        if ( mso.u.fork.pad || mso.u.fork.flags )
+        if ( mso.u.fork.pad || (!reset_state && !reset_memory) )
+            goto out;
+        if ( mso.u.fork.flags &
+             ~(XENMEM_FORK_RESET_STATE | XENMEM_FORK_RESET_MEMORY) )
             goto out;
 
         rc = -ENOSYS;
         if ( !d->parent )
             goto out;
 
-        rc = mem_sharing_fork_reset(d);
+        rc = mem_sharing_fork_reset(d, reset_state, reset_memory);
         break;
     }
 
diff --git a/xen/common/vm_event.c b/xen/common/vm_event.c
index 84cf52636b..d26a6699fc 100644
--- a/xen/common/vm_event.c
+++ b/xen/common/vm_event.c
@@ -28,6 +28,11 @@
 #include <asm/p2m.h>
 #include <asm/monitor.h>
 #include <asm/vm_event.h>
+
+#ifdef CONFIG_MEM_SHARING
+#include <asm/mem_sharing.h>
+#endif
+
 #include <xsm/xsm.h>
 #include <public/hvm/params.h>
 
@@ -394,6 +399,16 @@ static int vm_event_resume(struct domain *d, struct vm_event_domain *ved)
             if ( rsp.reason == VM_EVENT_REASON_MEM_PAGING )
                 p2m_mem_paging_resume(d, &rsp);
 #endif
+#ifdef CONFIG_MEM_SHARING
+            if ( mem_sharing_is_fork(d) )
+            {
+                bool reset_state = rsp.flags & VM_EVENT_FLAG_RESET_FORK_STATE;
+                bool reset_mem = rsp.flags & VM_EVENT_FLAG_RESET_FORK_MEMORY;
+
+                if ( reset_state || reset_mem )
+                    ASSERT(!mem_sharing_fork_reset(d, reset_state, reset_mem));
+            }
+#endif
 
             /*
              * Check emulation flags in the arch-specific handler only, as it
diff --git a/xen/include/public/memory.h b/xen/include/public/memory.h
index d44c256b3c..2a4edfc84b 100644
--- a/xen/include/public/memory.h
+++ b/xen/include/public/memory.h
@@ -541,12 +541,14 @@ struct xen_mem_sharing_op {
                 uint32_t gref;     /* IN: gref to debug         */
             } u;
         } debug;
-        struct mem_sharing_op_fork {      /* OP_FORK */
+        struct mem_sharing_op_fork {      /* OP_FORK/_RESET */
             domid_t parent_domain;        /* IN: parent's domain id */
 /* These flags only makes sense for short-lived forks */
 #define XENMEM_FORK_WITH_IOMMU_ALLOWED (1u << 0)
 #define XENMEM_FORK_BLOCK_INTERRUPTS   (1u << 1)
 #define XENMEM_FORK_EMPTY_P2M          (1u << 2)
+#define XENMEM_FORK_RESET_STATE        (1u << 3)
+#define XENMEM_FORK_RESET_MEMORY       (1u << 4)
             uint16_t flags;               /* IN: optional settings */
             uint32_t pad;                 /* Must be set to 0 */
         } fork;
diff --git a/xen/include/public/vm_event.h b/xen/include/public/vm_event.h
index bb003d21d0..81c2ee28cc 100644
--- a/xen/include/public/vm_event.h
+++ b/xen/include/public/vm_event.h
@@ -127,6 +127,14 @@
  * Reset the vmtrace buffer (if vmtrace is enabled)
  */
 #define VM_EVENT_FLAG_RESET_VMTRACE      (1 << 13)
+/*
+ * Reset the VM state (if VM is fork)
+ */
+#define VM_EVENT_FLAG_RESET_FORK_STATE   (1 << 14)
+/*
+ * Remove unshared entried from physmap (if VM is fork)
+ */
+#define VM_EVENT_FLAG_RESET_FORK_MEMORY  (1 << 15)
 
 /*
  * Reasons for the vm event request
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 29 14:04:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 14:04:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295841.503587 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZCSG-0008Pw-IS; Tue, 29 Mar 2022 14:04:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295841.503587; Tue, 29 Mar 2022 14:04:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZCSG-0008Pp-EB; Tue, 29 Mar 2022 14:04:16 +0000
Received: by outflank-mailman (input) for mailman id 295841;
 Tue, 29 Mar 2022 14:04:15 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=EyIC=UI=intel.com=tamas.lengyel@srs-se1.protection.inumbo.net>)
 id 1nZCSE-0008Pe-Pb
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 14:04:15 +0000
Received: from mga17.intel.com (mga17.intel.com [192.55.52.151])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 1929a52e-af69-11ec-8fbc-03012f2f19d4;
 Tue, 29 Mar 2022 16:04:09 +0200 (CEST)
Received: from orsmga004.jf.intel.com ([10.7.209.38])
 by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 29 Mar 2022 07:04:08 -0700
Received: from tlengyel-mobl3.amr.corp.intel.com (HELO localhost.localdomain)
 ([10.212.29.163])
 by orsmga004-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 29 Mar 2022 07:04:06 -0700
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1929a52e-af69-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;
  t=1648562651; x=1680098651;
  h=from:to:cc:subject:date:message-id:mime-version:
   content-transfer-encoding;
  bh=r2hq6EJ3nE5Ns7N1HiuCsO/GX8EEWS3F/6vdp4nzR2w=;
  b=AAHm23MmhpIiDz6JOVt1KeWjt6VMMWL6vveOXJy5Rya2y/TWSJvnIQj1
   rMj0bvEr9MRth12hCLV1Y6g263mth2MvKYzzFnZD32rIJZs8k1NzpkQiO
   ftt4zownwLHodcSBpfsr1L+4T6Mw1vCa9+XlYFCRHg5uiayYdrCtzHSX0
   7eCb+YJKdoPXrawfqbX4LZjgC4biiK6qvytFJUB4lLdeutwHfngLin9Rg
   D1TGyIUliwCrErX4tNJjLVGLHpTK8BPvgeOeTWREqsvudy7Pw4OvnueBe
   Jh0hD0O7HjJDRcZ878p1QYToj9RLsaIbOwzH6V06ZMm32YNK0qk3Lba3M
   A==;
X-IronPort-AV: E=McAfee;i="6200,9189,10301"; a="239853158"
X-IronPort-AV: E=Sophos;i="5.90,220,1643702400"; 
   d="scan'208";a="239853158"
X-IronPort-AV: E=Sophos;i="5.90,220,1643702400"; 
   d="scan'208";a="652987555"
From: Tamas K Lengyel <tamas.lengyel@intel.com>
To: xen-devel@lists.xenproject.org
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>,
	Wei Liu <wl@xen.org>,
	Anthony PERARD <anthony.perard@citrix.com>,
	Juergen Gross <jgross@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Julien Grall <julien@xen.org>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Jun Nakajima <jun.nakajima@intel.com>,
	Kevin Tian <kevin.tian@intel.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Tamas K Lengyel <tamas@tklengyel.com>
Subject: [PATCH v2 1/3] x86/mem_sharing: option to enforce fork starting with empty p2m
Date: Tue, 29 Mar 2022 10:03:20 -0400
Message-Id: <ab6bb88e90e5649c60e08a1680b3a2390441031b.1648561546.git.tamas.lengyel@intel.com>
X-Mailer: git-send-email 2.25.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Add option to the fork memop to enforce a start with an empty p2m.
Pre-populating special pages to the fork tend to be necessary only when setting
up forks to be fully functional with a toolstack or if the fork makes use of
them in some way. For short-lived forks these pages are optional and starting
with an empty p2m has advantages both in terms of reset performance as well as
easier reasoning about the state of the fork after creation.

Signed-off-by: Tamas K Lengyel <tamas.lengyel@intel.com>
---
v2: rename flag to empty_p2m, add assert at the end and move
     vAPIC page mapping skipping logic into where its mapped
---
 tools/include/xenctrl.h               |  3 ++-
 tools/libs/ctrl/xc_memshr.c           |  5 +++-
 xen/arch/x86/hvm/vmx/vmx.c            |  5 ++++
 xen/arch/x86/include/asm/hvm/domain.h |  4 +++-
 xen/arch/x86/mm/mem_sharing.c         | 33 +++++++++++++++++----------
 xen/include/public/memory.h           |  4 ++--
 6 files changed, 37 insertions(+), 17 deletions(-)

diff --git a/tools/include/xenctrl.h b/tools/include/xenctrl.h
index 95bd5eca67..26766ec19f 100644
--- a/tools/include/xenctrl.h
+++ b/tools/include/xenctrl.h
@@ -2281,7 +2281,8 @@ int xc_memshr_fork(xc_interface *xch,
                    uint32_t source_domain,
                    uint32_t client_domain,
                    bool allow_with_iommu,
-                   bool block_interrupts);
+                   bool block_interrupts,
+                   bool empty_p2m);
 
 /*
  * Note: this function is only intended to be used on short-lived forks that
diff --git a/tools/libs/ctrl/xc_memshr.c b/tools/libs/ctrl/xc_memshr.c
index a6cfd7dccf..0143f9ddea 100644
--- a/tools/libs/ctrl/xc_memshr.c
+++ b/tools/libs/ctrl/xc_memshr.c
@@ -240,7 +240,8 @@ int xc_memshr_debug_gref(xc_interface *xch,
 }
 
 int xc_memshr_fork(xc_interface *xch, uint32_t pdomid, uint32_t domid,
-                   bool allow_with_iommu, bool block_interrupts)
+                   bool allow_with_iommu, bool block_interrupts,
+                   bool empty_p2m)
 {
     xen_mem_sharing_op_t mso;
 
@@ -253,6 +254,8 @@ int xc_memshr_fork(xc_interface *xch, uint32_t pdomid, uint32_t domid,
         mso.u.fork.flags |= XENMEM_FORK_WITH_IOMMU_ALLOWED;
     if ( block_interrupts )
         mso.u.fork.flags |= XENMEM_FORK_BLOCK_INTERRUPTS;
+    if ( empty_p2m )
+        mso.u.fork.flags |= XENMEM_FORK_EMPTY_P2M;
 
     return xc_memshr_memop(xch, domid, &mso);
 }
diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
index c075370f64..5e60c92d5c 100644
--- a/xen/arch/x86/hvm/vmx/vmx.c
+++ b/xen/arch/x86/hvm/vmx/vmx.c
@@ -424,6 +424,11 @@ static void cf_check domain_creation_finished(struct domain *d)
     if ( !has_vlapic(d) || mfn_eq(apic_access_mfn, INVALID_MFN) )
         return;
 
+#ifdef CONFIG_MEM_SHARING
+    if ( d->arch.hvm.mem_sharing.empty_p2m )
+        return;
+#endif
+
     ASSERT(epte_get_entry_emt(d, gfn, apic_access_mfn, 0, &ipat,
                               p2m_mmio_direct) == MTRR_TYPE_WRBACK);
     ASSERT(ipat);
diff --git a/xen/arch/x86/include/asm/hvm/domain.h b/xen/arch/x86/include/asm/hvm/domain.h
index 698455444e..22a17c36c5 100644
--- a/xen/arch/x86/include/asm/hvm/domain.h
+++ b/xen/arch/x86/include/asm/hvm/domain.h
@@ -31,7 +31,9 @@
 #ifdef CONFIG_MEM_SHARING
 struct mem_sharing_domain
 {
-    bool enabled, block_interrupts;
+    bool enabled;
+    bool block_interrupts;
+    bool empty_p2m;
 
     /*
      * When releasing shared gfn's in a preemptible manner, recall where
diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86/mm/mem_sharing.c
index 15e6a7ed81..ef67285a98 100644
--- a/xen/arch/x86/mm/mem_sharing.c
+++ b/xen/arch/x86/mm/mem_sharing.c
@@ -1643,7 +1643,8 @@ static int bring_up_vcpus(struct domain *cd, struct domain *d)
     return 0;
 }
 
-static int copy_vcpu_settings(struct domain *cd, const struct domain *d)
+static int copy_vcpu_settings(struct domain *cd, const struct domain *d,
+                              bool empty_p2m)
 {
     unsigned int i;
     struct p2m_domain *p2m = p2m_get_hostp2m(cd);
@@ -1660,7 +1661,7 @@ static int copy_vcpu_settings(struct domain *cd, const struct domain *d)
 
         /* Copy & map in the vcpu_info page if the guest uses one */
         vcpu_info_mfn = d_vcpu->vcpu_info_mfn;
-        if ( !mfn_eq(vcpu_info_mfn, INVALID_MFN) )
+        if ( !empty_p2m && !mfn_eq(vcpu_info_mfn, INVALID_MFN) )
         {
             mfn_t new_vcpu_info_mfn = cd_vcpu->vcpu_info_mfn;
 
@@ -1807,17 +1808,18 @@ static int copy_special_pages(struct domain *cd, struct domain *d)
     return 0;
 }
 
-static int copy_settings(struct domain *cd, struct domain *d)
+static int copy_settings(struct domain *cd, struct domain *d,
+                         bool empty_p2m)
 {
     int rc;
 
-    if ( (rc = copy_vcpu_settings(cd, d)) )
+    if ( (rc = copy_vcpu_settings(cd, d, empty_p2m)) )
         return rc;
 
     if ( (rc = hvm_copy_context_and_params(cd, d)) )
         return rc;
 
-    if ( (rc = copy_special_pages(cd, d)) )
+    if ( !empty_p2m && (rc = copy_special_pages(cd, d)) )
         return rc;
 
     copy_tsc(cd, d);
@@ -1826,9 +1828,11 @@ static int copy_settings(struct domain *cd, struct domain *d)
     return rc;
 }
 
-static int fork(struct domain *cd, struct domain *d)
+static int fork(struct domain *cd, struct domain *d, uint16_t flags)
 {
     int rc = -EBUSY;
+    bool block_interrupts = flags & XENMEM_FORK_BLOCK_INTERRUPTS;
+    bool empty_p2m = flags & XENMEM_FORK_EMPTY_P2M;
 
     if ( !cd->controller_pause_count )
         return rc;
@@ -1856,7 +1860,13 @@ static int fork(struct domain *cd, struct domain *d)
     if ( (rc = bring_up_vcpus(cd, d)) )
         goto done;
 
-    rc = copy_settings(cd, d);
+    if ( !(rc = copy_settings(cd, d, empty_p2m)) )
+    {
+        cd->arch.hvm.mem_sharing.block_interrupts = block_interrupts;
+
+        if ( (cd->arch.hvm.mem_sharing.empty_p2m = empty_p2m) )
+            ASSERT(page_list_empty(&cd->page_list));
+    }
 
  done:
     if ( rc && rc != -ERESTART )
@@ -1920,7 +1930,7 @@ static int mem_sharing_fork_reset(struct domain *d)
     }
     spin_unlock_recursive(&d->page_alloc_lock);
 
-    rc = copy_settings(d, pd);
+    rc = copy_settings(d, pd, d->arch.hvm.mem_sharing.empty_p2m);
 
     domain_unpause(d);
 
@@ -2190,7 +2200,8 @@ int mem_sharing_memop(XEN_GUEST_HANDLE_PARAM(xen_mem_sharing_op_t) arg)
         if ( mso.u.fork.pad )
             goto out;
         if ( mso.u.fork.flags &
-             ~(XENMEM_FORK_WITH_IOMMU_ALLOWED | XENMEM_FORK_BLOCK_INTERRUPTS) )
+             ~(XENMEM_FORK_WITH_IOMMU_ALLOWED | XENMEM_FORK_BLOCK_INTERRUPTS |
+               XENMEM_FORK_EMPTY_P2M) )
             goto out;
 
         rc = rcu_lock_live_remote_domain_by_id(mso.u.fork.parent_domain,
@@ -2212,14 +2223,12 @@ int mem_sharing_memop(XEN_GUEST_HANDLE_PARAM(xen_mem_sharing_op_t) arg)
             goto out;
         }
 
-        rc = fork(d, pd);
+        rc = fork(d, pd, mso.u.fork.flags);
 
         if ( rc == -ERESTART )
             rc = hypercall_create_continuation(__HYPERVISOR_memory_op,
                                                "lh", XENMEM_sharing_op,
                                                arg);
-        else if ( !rc && (mso.u.fork.flags & XENMEM_FORK_BLOCK_INTERRUPTS) )
-            d->arch.hvm.mem_sharing.block_interrupts = true;
 
         rcu_unlock_domain(pd);
         break;
diff --git a/xen/include/public/memory.h b/xen/include/public/memory.h
index a1a0f0233a..d44c256b3c 100644
--- a/xen/include/public/memory.h
+++ b/xen/include/public/memory.h
@@ -543,10 +543,10 @@ struct xen_mem_sharing_op {
         } debug;
         struct mem_sharing_op_fork {      /* OP_FORK */
             domid_t parent_domain;        /* IN: parent's domain id */
-/* Only makes sense for short-lived forks */
+/* These flags only makes sense for short-lived forks */
 #define XENMEM_FORK_WITH_IOMMU_ALLOWED (1u << 0)
-/* Only makes sense for short-lived forks */
 #define XENMEM_FORK_BLOCK_INTERRUPTS   (1u << 1)
+#define XENMEM_FORK_EMPTY_P2M          (1u << 2)
             uint16_t flags;               /* IN: optional settings */
             uint32_t pad;                 /* Must be set to 0 */
         } fork;
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 29 14:04:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 14:04:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295842.503592 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZCSG-0008TU-Qw; Tue, 29 Mar 2022 14:04:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295842.503592; Tue, 29 Mar 2022 14:04:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZCSG-0008Sd-MG; Tue, 29 Mar 2022 14:04:16 +0000
Received: by outflank-mailman (input) for mailman id 295842;
 Tue, 29 Mar 2022 14:04:15 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=EyIC=UI=intel.com=tamas.lengyel@srs-se1.protection.inumbo.net>)
 id 1nZCSF-0008Pe-LR
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 14:04:15 +0000
Received: from mga17.intel.com (mga17.intel.com [192.55.52.151])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 1c0f1eef-af69-11ec-8fbc-03012f2f19d4;
 Tue, 29 Mar 2022 16:04:12 +0200 (CEST)
Received: from orsmga004.jf.intel.com ([10.7.209.38])
 by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 29 Mar 2022 07:04:09 -0700
Received: from tlengyel-mobl3.amr.corp.intel.com (HELO localhost.localdomain)
 ([10.212.29.163])
 by orsmga004-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;
 29 Mar 2022 07:04:08 -0700
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1c0f1eef-af69-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
  d=intel.com; i=@intel.com; q=dns/txt; s=Intel;
  t=1648562654; x=1680098654;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:mime-version:content-transfer-encoding;
  bh=43ECNuCX2PPxh+aosXm++u7sNS4fbK0+kwt3CNxi5Z0=;
  b=ACEM4YQIV9ZvFsyIy1swlJxwuA/H46YxXT0sP2DWp9+tGYDcTJaHuSft
   RDDll+FKjoP4XCEMdZDDH6ijzL+U7tkoia8a0iU+WWDyrPEQqJyIUFOVG
   RMeSvjfSZpCyrPuXeOz0bfZhk7MO5dX6WkQjWPcQHVSnVc8Ae7jZJnawC
   B7Sce3VrPpf7lYWl27QqJtSXa3d7CNAVOwljrOaE3mINoD6UFF8vboYOi
   08hZSudjj2U5n0LWrDdq6UUuD3ZT4gQ4p/vE76vgAAdcp5D8sOVUtyeqT
   rU47mT/N4yzu4LwihltTO7RqFn8C5c1jen70syWbIC2FHRKtXRGRlCETW
   A==;
X-IronPort-AV: E=McAfee;i="6200,9189,10301"; a="239853164"
X-IronPort-AV: E=Sophos;i="5.90,220,1643702400"; 
   d="scan'208";a="239853164"
X-IronPort-AV: E=Sophos;i="5.90,220,1643702400"; 
   d="scan'208";a="652987568"
From: Tamas K Lengyel <tamas.lengyel@intel.com>
To: xen-devel@lists.xenproject.org
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>,
	Tamas K Lengyel <tamas@tklengyel.com>,
	George Dunlap <george.dunlap@citrix.com>
Subject: [PATCH v2 2/3] x86/mem_sharing: add fork_complete field to mem_sharing_domain
Date: Tue, 29 Mar 2022 10:03:21 -0400
Message-Id: <10b1b71d918b7d7315b49b5932497d094f767a1e.1648561546.git.tamas.lengyel@intel.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <ab6bb88e90e5649c60e08a1680b3a2390441031b.1648561546.git.tamas.lengyel@intel.com>
References: <ab6bb88e90e5649c60e08a1680b3a2390441031b.1648561546.git.tamas.lengyel@intel.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

The fork's physmap should only be populated with select special pages during
the setup of the fork. The rest of the fork's physmap should only be populated
as needed after the fork is complete. Add a field to specify when the fork is
complete so fork_page() can determine whether it's time to start adding entries
to the physmap.

Signed-off-by: Tamas K Lengyel <tamas.lengyel@intel.com>
---
v2: replace previous patch that set parent to dom_cow as a placeholder
---
 xen/arch/x86/include/asm/hvm/domain.h | 1 +
 xen/arch/x86/mm/mem_sharing.c         | 3 ++-
 2 files changed, 3 insertions(+), 1 deletion(-)

diff --git a/xen/arch/x86/include/asm/hvm/domain.h b/xen/arch/x86/include/asm/hvm/domain.h
index 22a17c36c5..7078d041bd 100644
--- a/xen/arch/x86/include/asm/hvm/domain.h
+++ b/xen/arch/x86/include/asm/hvm/domain.h
@@ -32,6 +32,7 @@
 struct mem_sharing_domain
 {
     bool enabled;
+    bool fork_complete;
     bool block_interrupts;
     bool empty_p2m;
 
diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86/mm/mem_sharing.c
index ef67285a98..bfde342a38 100644
--- a/xen/arch/x86/mm/mem_sharing.c
+++ b/xen/arch/x86/mm/mem_sharing.c
@@ -1555,7 +1555,7 @@ int mem_sharing_fork_page(struct domain *d, gfn_t gfn, bool unsharing)
     p2m_type_t p2mt;
     struct page_info *page;
 
-    if ( !mem_sharing_is_fork(d) )
+    if ( !d->arch.hvm.mem_sharing.fork_complete )
         return -ENOENT;
 
     if ( !unsharing )
@@ -1862,6 +1862,7 @@ static int fork(struct domain *cd, struct domain *d, uint16_t flags)
 
     if ( !(rc = copy_settings(cd, d, empty_p2m)) )
     {
+        cd->arch.hvm.mem_sharing.fork_complete = true;
         cd->arch.hvm.mem_sharing.block_interrupts = block_interrupts;
 
         if ( (cd->arch.hvm.mem_sharing.empty_p2m = empty_p2m) )
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Tue Mar 29 14:48:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 14:48:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295854.503619 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZD8v-0005RZ-Jr; Tue, 29 Mar 2022 14:48:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295854.503619; Tue, 29 Mar 2022 14:48:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZD8v-0005RS-Gw; Tue, 29 Mar 2022 14:48:21 +0000
Received: by outflank-mailman (input) for mailman id 295854;
 Tue, 29 Mar 2022 14:48:20 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZD8u-0005RI-Hk; Tue, 29 Mar 2022 14:48:20 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZD8u-0001LU-DX; Tue, 29 Mar 2022 14:48:20 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZD8t-0001Oj-V9; Tue, 29 Mar 2022 14:48:20 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZD8t-0005Gv-Ug; Tue, 29 Mar 2022 14:48:19 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=QRkrzmhsQ+F+n7eia0UzjFzxWbDLVzgjRIG5k97U07s=; b=kffqTMuC5DvE1hISgXbI0BnUGm
	I1vlcva6KHIy8thq/K7n5rEveEiIP6sBOn3jaMA8x/wa3STahCg8pN6ywKmtw8Gxqa/3pjtIAgp/D
	u7U3XWB1+7sWQCuJqh4nbUWpbPvQ24MeDZlkbhcM18acfpCq+A5X7zQWyqt4+LI32LuE=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168962-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168962: trouble: blocked/broken/pass
X-Osstest-Failures:
    qemu-mainline:build-amd64:<job status>:broken:regression
    qemu-mainline:build-amd64-pvops:<job status>:broken:regression
    qemu-mainline:build-amd64-xsm:<job status>:broken:regression
    qemu-mainline:build-arm64:<job status>:broken:regression
    qemu-mainline:build-arm64-pvops:<job status>:broken:regression
    qemu-mainline:build-arm64-xsm:<job status>:broken:regression
    qemu-mainline:build-armhf-pvops:<job status>:broken:regression
    qemu-mainline:build-i386:<job status>:broken:regression
    qemu-mainline:build-i386-pvops:<job status>:broken:regression
    qemu-mainline:build-i386-xsm:<job status>:broken:regression
    qemu-mainline:build-amd64:host-install(4):broken:regression
    qemu-mainline:build-i386-xsm:host-install(4):broken:regression
    qemu-mainline:build-i386:host-install(4):broken:regression
    qemu-mainline:build-i386-pvops:host-install(4):broken:regression
    qemu-mainline:build-arm64:host-install(4):broken:regression
    qemu-mainline:build-arm64-pvops:host-install(4):broken:regression
    qemu-mainline:build-arm64-xsm:host-install(4):broken:regression
    qemu-mainline:build-amd64-pvops:host-install(4):broken:regression
    qemu-mainline:build-armhf-pvops:host-install(4):broken:regression
    qemu-mainline:build-amd64-xsm:host-install(4):broken:regression
    qemu-mainline:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-qemuu-rhel6hvm-amd:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-pair:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-freebsd10-i386:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-freebsd10-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-coresched-i386-xl:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-coresched-amd64-xl:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:build-amd64-libvirt:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-shadow:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-rtds:build-check(1):blocked:nonblocking
    qemu-mainline:build-arm64-libvirt:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    qemu-mainline:build-i386-libvirt:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-dom0pvh-xl-amd:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-dom0pvh-xl-intel:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qcow2:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-pvshim:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-pair:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-pygrub:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-pvhv2-intel:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-freebsd11-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-freebsd12-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-pvhv2-amd:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-intel:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-multivcpu:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-credit1:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-amd64-xl-credit2:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:build-check(1):blocked:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-qemuu-rhel6hvm-intel:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-shadow:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-vhd:build-check(1):blocked:nonblocking
    qemu-mainline:test-amd64-i386-xl-xsm:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    qemuu=27fc9f365d6f60ff86c2e2be57289bb47a2be882
X-Osstest-Versions-That:
    qemuu=f345abe36527a8b575482bb5a0616f43952bf1f4
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 29 Mar 2022 14:48:19 +0000

flight 168962 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168962/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-arm64                     <job status>                 broken
 build-arm64-pvops               <job status>                 broken
 build-arm64-xsm                 <job status>                 broken
 build-armhf-pvops               <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-amd64                   4 host-install(4)        broken REGR. vs. 168856
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168856
 build-i386                    4 host-install(4)        broken REGR. vs. 168856
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168856
 build-arm64                   4 host-install(4)        broken REGR. vs. 168856
 build-arm64-pvops             4 host-install(4)        broken REGR. vs. 168856
 build-arm64-xsm               4 host-install(4)        broken REGR. vs. 168856
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 168856
 build-armhf-pvops             4 host-install(4)        broken REGR. vs. 168856
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 168856

Tests which did not succeed, but are not blocking:
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl           1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-cubietruck  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-rtds      1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-vhd       1 build-check(1)               blocked  n/a
 test-amd64-i386-qemuu-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-pair          1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-i386  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-amd64  1 build-check(1)               blocked  n/a
 test-amd64-coresched-i386-xl  1 build-check(1)               blocked  n/a
 test-amd64-coresched-amd64-xl  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-xsm       1 build-check(1)               blocked  n/a
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-shadow    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-rtds      1 build-check(1)               blocked  n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ws16-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-dom0pvh-xl-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1) blocked n/a
 test-amd64-amd64-dom0pvh-xl-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qcow2     1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvshim    1 build-check(1)               blocked  n/a
 test-amd64-amd64-pair         1 build-check(1)               blocked  n/a
 test-amd64-amd64-pygrub       1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-freebsd11-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-qemuu-freebsd12-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-xl-pvhv2-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-intel  1 build-check(1)              blocked n/a
 test-amd64-amd64-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit1   1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-arndale   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit1   1 build-check(1)               blocked  n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-xl            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-pvshim     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1)  blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-shadow     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-vhd        1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-xsm        1 build-check(1)               blocked  n/a

version targeted for testing:
 qemuu                27fc9f365d6f60ff86c2e2be57289bb47a2be882
baseline version:
 qemuu                f345abe36527a8b575482bb5a0616f43952bf1f4

Last test of basis   168856  2022-03-25 15:08:16 Z    3 days
Failing since        168873  2022-03-26 10:38:21 Z    3 days    4 attempts
Testing same since   168962  2022-03-29 01:06:54 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Cédric Le Goater <clg@kaod.org>
  Matheus Ferst <matheus.ferst@eldorado.org.br>
  Peter Maydell <peter.maydell@linaro.org>
  Richard Henderson <richard.henderson@linaro.org>
  Víctor Colombo <victor.colombo@eldorado.org.br>

jobs:
 build-amd64-xsm                                              broken  
 build-arm64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64                                                  broken  
 build-arm64                                                  broken  
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            broken  
 build-arm64-pvops                                            broken  
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-amd64-amd64-xl                                          blocked 
 test-amd64-coresched-amd64-xl                                blocked 
 test-arm64-arm64-xl                                          blocked 
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           blocked 
 test-amd64-coresched-i386-xl                                 blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-xl-xsm                                      blocked 
 test-arm64-arm64-xl-xsm                                      blocked 
 test-amd64-i386-xl-xsm                                       blocked 
 test-amd64-amd64-qemuu-nested-amd                            blocked 
 test-amd64-amd64-xl-pvhv2-amd                                blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-dom0pvh-xl-amd                              blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     blocked 
 test-amd64-i386-freebsd10-amd64                              blocked 
 test-amd64-amd64-qemuu-freebsd11-amd64                       blocked 
 test-amd64-amd64-qemuu-freebsd12-amd64                       blocked 
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         blocked 
 test-amd64-i386-xl-qemuu-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ws16-amd64                          blocked 
 test-armhf-armhf-xl-arndale                                  blocked 
 test-amd64-amd64-xl-credit1                                  blocked 
 test-arm64-arm64-xl-credit1                                  blocked 
 test-armhf-armhf-xl-credit1                                  blocked 
 test-amd64-amd64-xl-credit2                                  blocked 
 test-arm64-arm64-xl-credit2                                  blocked 
 test-armhf-armhf-xl-credit2                                  blocked 
 test-armhf-armhf-xl-cubietruck                               blocked 
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        blocked 
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         blocked 
 test-amd64-i386-freebsd10-i386                               blocked 
 test-amd64-amd64-qemuu-nested-intel                          blocked 
 test-amd64-amd64-xl-pvhv2-intel                              blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-amd64-dom0pvh-xl-intel                            blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-xl-multivcpu                                blocked 
 test-armhf-armhf-xl-multivcpu                                blocked 
 test-amd64-amd64-pair                                        blocked 
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-amd64-amd64-xl-pvshim                                   blocked 
 test-amd64-i386-xl-pvshim                                    blocked 
 test-amd64-amd64-pygrub                                      blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-amd64-amd64-xl-qcow2                                    blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-xl-rtds                                     blocked 
 test-armhf-armhf-xl-rtds                                     blocked 
 test-arm64-arm64-xl-seattle                                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              blocked 
 test-amd64-amd64-xl-shadow                                   blocked 
 test-amd64-i386-xl-shadow                                    blocked 
 test-arm64-arm64-xl-thunderx                                 blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 
 test-arm64-arm64-xl-vhd                                      blocked 
 test-armhf-armhf-xl-vhd                                      blocked 
 test-amd64-i386-xl-vhd                                       blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-arm64 broken
broken-job build-arm64-pvops broken
broken-job build-arm64-xsm broken
broken-job build-armhf-pvops broken
broken-job build-i386 broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-amd64 host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step build-i386 host-install(4)
broken-step build-i386-pvops host-install(4)
broken-step build-arm64 host-install(4)
broken-step build-arm64-pvops host-install(4)
broken-step build-arm64-xsm host-install(4)
broken-step build-amd64-pvops host-install(4)
broken-step build-armhf-pvops host-install(4)
broken-step build-amd64-xsm host-install(4)

Not pushing.

------------------------------------------------------------
commit 27fc9f365d6f60ff86c2e2be57289bb47a2be882
Merge: 3d31fe4d66 bc504838ff
Author: Peter Maydell <peter.maydell@linaro.org>
Date:   Mon Mar 28 10:16:33 2022 +0100

    Merge tag 'pull-ppc-20220326' of https://github.com/legoater/qemu into staging
    
    ppc-7.0 queue:
    
    * target/ppc: fix helper_xvmadd* argument order
    
    # gpg: Signature made Sat 26 Mar 2022 12:57:54 GMT
    # gpg:                using RSA key A0F66548F04895EBFE6B0B6051A343C7CFFBECA1
    # gpg: Good signature from "Cédric Le Goater <clg@kaod.org>" [undefined]
    # gpg: WARNING: This key is not certified with a trusted signature!
    # gpg:          There is no indication that the signature belongs to the owner.
    # Primary key fingerprint: A0F6 6548 F048 95EB FE6B  0B60 51A3 43C7 CFFB ECA1
    
    * tag 'pull-ppc-20220326' of https://github.com/legoater/qemu:
      target/ppc: fix helper_xvmadd* argument order
    
    Signed-off-by: Peter Maydell <peter.maydell@linaro.org>

commit bc504838ff88b505421dd28841ee298d9cff31d0
Author: Matheus Ferst <matheus.ferst@eldorado.org.br>
Date:   Sat Mar 26 13:52:37 2022 +0100

    target/ppc: fix helper_xvmadd* argument order
    
    When the xsmadd* insns were moved to decodetree, the helper arguments
    were reordered to better match the PowerISA description. The same macro
    is used to declare xvmadd* helpers, but the translation macro of these
    insns was not changed accordingly.
    
    Reported-by: Víctor Colombo <victor.colombo@eldorado.org.br>
    Fixes: e4318ab2e423 ("target/ppc: move xs[n]madd[am][ds]p/xs[n]msub[am][ds]p to decodetree")
    Signed-off-by: Matheus Ferst <matheus.ferst@eldorado.org.br>
    Reviewed-by: Daniel Henrique Barboza <danielhb413@gmail.com>
    Tested-by: Víctor Colombo <victor.colombo@eldorado.org.br>
    Message-Id: <20220325111851.718966-1-matheus.ferst@eldorado.org.br>
    Signed-off-by: Cédric Le Goater <clg@kaod.org>

commit 3d31fe4d662f13c70eb7e87f29513623ccd76322
Merge: f345abe365 c7ca3ad5e7
Author: Peter Maydell <peter.maydell@linaro.org>
Date:   Fri Mar 25 15:02:39 2022 +0000

    Merge tag 'pull-target-arm-20220325' of https://git.linaro.org/people/pmaydell/qemu-arm into staging
    
    target-arm queue:
     * hw/intc/arm_gicv3_its: Add missing newlines to process_mapc() logging
     * target/arm: Fix sve_ld1_z and sve_st1_z vs MMIO
    
    # gpg: Signature made Fri 25 Mar 2022 14:56:48 GMT
    # gpg:                using RSA key E1A5C593CD419DE28E8315CF3C2525ED14360CDE
    # gpg:                issuer "peter.maydell@linaro.org"
    # gpg: Good signature from "Peter Maydell <peter.maydell@linaro.org>" [ultimate]
    # gpg:                 aka "Peter Maydell <pmaydell@gmail.com>" [ultimate]
    # gpg:                 aka "Peter Maydell <pmaydell@chiark.greenend.org.uk>" [ultimate]
    # Primary key fingerprint: E1A5 C593 CD41 9DE2 8E83  15CF 3C25 25ED 1436 0CDE
    
    * tag 'pull-target-arm-20220325' of https://git.linaro.org/people/pmaydell/qemu-arm:
      hw/intc/arm_gicv3_its: Add missing newlines to process_mapc() logging
      target/arm: Fix sve_ld1_z and sve_st1_z vs MMIO
    
    Signed-off-by: Peter Maydell <peter.maydell@linaro.org>

commit c7ca3ad5e756e263daf082c315e311593ccec3d1
Author: Peter Maydell <peter.maydell@linaro.org>
Date:   Fri Mar 25 14:41:06 2022 +0000

    hw/intc/arm_gicv3_its: Add missing newlines to process_mapc() logging
    
    In commit 84d43d2e82da we rearranged the logging of errors in
    process_mapc(), and inadvertently dropped the trailing newlines
    from the log messages. Restore them. The same commit also
    attempted to switch the ICID printing to hex (which is how we
    print ICIDs elsewhere) but only did half the job, adding the
    0x prefix but leaving the format string at %d; correct to %x.
    
    Fixes: 84d43d2e82da ("hw/intc/arm_gicv3_its: In MAPC with V=0, don't check rdbase field")
    Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
    Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
    Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>

commit 6222c3acc4f36fc31d057e1afb6b5c408f83d343
Author: Richard Henderson <richard.henderson@linaro.org>
Date:   Fri Mar 25 14:41:06 2022 +0000

    target/arm: Fix sve_ld1_z and sve_st1_z vs MMIO
    
    Both of these functions missed handling the TLB_MMIO flag
    during the conversion to handle MTE.
    
    Fixes: 10a85e2c8ab6 ("target/arm: Reuse sve_probe_page for gather loads")
    Resolves: https://gitlab.com/qemu-project/qemu/-/issues/925
    Signed-off-by: Richard Henderson <richard.henderson@linaro.org>
    Message-id: 20220324010932.190428-1-richard.henderson@linaro.org
    Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
    Signed-off-by: Peter Maydell <peter.maydell@linaro.org>


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 15:00:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 15:00:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295865.503631 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZDK8-0006zT-SW; Tue, 29 Mar 2022 14:59:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295865.503631; Tue, 29 Mar 2022 14:59:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZDK8-0006zM-Nx; Tue, 29 Mar 2022 14:59:56 +0000
Received: by outflank-mailman (input) for mailman id 295865;
 Tue, 29 Mar 2022 14:59:55 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZDK7-0006zC-4o; Tue, 29 Mar 2022 14:59:55 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZDK6-0001Vy-VA; Tue, 29 Mar 2022 14:59:55 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZDK6-0001lF-Hu; Tue, 29 Mar 2022 14:59:54 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZDK6-0000Mu-HR; Tue, 29 Mar 2022 14:59:54 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=GDD5GMntWehVFVtspe80bzhMpotZRgsVRLwySiD8af0=; b=pB3/izgeBOqDEt8K+A2Xd+QfjO
	KzNO4AShw/HrFmIvcDBoHzk9pxCjnhWTeu9pB1eJLKDAIrsmKkHv6YtVgnj8qzGfDT5rd0l8k4BJo
	5PKW2fHSCPEwtr8+J0+OIjDOjVVL9ueE8zvZ+AgiwuPoNjBq9uwwuWSbsCAv10D+7QYs=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168957-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.14-testing test] 168957: trouble: blocked/broken/pass
X-Osstest-Failures:
    xen-4.14-testing:build-amd64:<job status>:broken:regression
    xen-4.14-testing:build-amd64-prev:<job status>:broken:regression
    xen-4.14-testing:build-amd64-pvops:<job status>:broken:regression
    xen-4.14-testing:build-amd64-xsm:<job status>:broken:regression
    xen-4.14-testing:build-amd64-xtf:<job status>:broken:regression
    xen-4.14-testing:build-arm64:<job status>:broken:regression
    xen-4.14-testing:build-arm64-pvops:<job status>:broken:regression
    xen-4.14-testing:build-arm64-xsm:<job status>:broken:regression
    xen-4.14-testing:build-armhf-pvops:<job status>:broken:regression
    xen-4.14-testing:build-i386:<job status>:broken:regression
    xen-4.14-testing:build-i386-prev:<job status>:broken:regression
    xen-4.14-testing:build-i386-pvops:<job status>:broken:regression
    xen-4.14-testing:build-i386-xsm:<job status>:broken:regression
    xen-4.14-testing:build-i386-prev:host-install(4):broken:regression
    xen-4.14-testing:build-i386-xsm:host-install(4):broken:regression
    xen-4.14-testing:build-i386:host-install(4):broken:regression
    xen-4.14-testing:build-i386-pvops:host-install(4):broken:regression
    xen-4.14-testing:build-arm64:host-install(4):broken:regression
    xen-4.14-testing:build-arm64-xsm:host-install(4):broken:regression
    xen-4.14-testing:build-arm64-pvops:host-install(4):broken:regression
    xen-4.14-testing:build-amd64:host-install(4):broken:regression
    xen-4.14-testing:build-amd64-xsm:host-install(4):broken:regression
    xen-4.14-testing:build-amd64-prev:host-install(4):broken:regression
    xen-4.14-testing:build-amd64-xtf:host-install(4):broken:regression
    xen-4.14-testing:build-armhf-pvops:host-install(4):broken:regression
    xen-4.14-testing:build-amd64-pvops:host-install(4):broken:regression
    xen-4.14-testing:test-amd64-i386-qemuu-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-qemuu-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-pvshim:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-shadow:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-coresched-amd64-xl:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-shadow:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-rtds:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:build-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:build-arm64-libvirt:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qcow2:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-pvshim:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-pvhv2-intel:build-check(1):blocked:nonblocking
    xen-4.14-testing:build-i386-libvirt:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-pvhv2-amd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-dom0pvh-xl-amd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-dom0pvh-xl-intel:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-livepatch:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-qemuu-nested-intel:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-migrupgrade:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-pair:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-qemuu-nested-amd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-pygrub:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-qemuu-freebsd11-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-amd64-qemuu-freebsd12-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-coresched-i386-xl:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-freebsd10-amd64:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-freebsd10-i386:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-livepatch:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-migrupgrade:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-pair:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-qemut-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-amd64-i386-qemut-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-arndale:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-cubietruck:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-rtds:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-xtf-amd64-amd64-1:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-xtf-amd64-amd64-2:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-xtf-amd64-amd64-3:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-xtf-amd64-amd64-4:build-check(1):blocked:nonblocking
    xen-4.14-testing:test-xtf-amd64-amd64-5:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    xen=1e595d9c2b8608bcef48d6a69cc2f6135780bcc0
X-Osstest-Versions-That:
    xen=ca304edd3ba8c19211107fd2e898249987557ce5
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 29 Mar 2022 14:59:54 +0000

flight 168957 xen-4.14-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168957/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-prev                <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-amd64-xtf                 <job status>                 broken
 build-arm64                     <job status>                 broken
 build-arm64-pvops               <job status>                 broken
 build-arm64-xsm                 <job status>                 broken
 build-armhf-pvops               <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-prev                 <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-i386-prev               4 host-install(4)        broken REGR. vs. 168506
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168506
 build-i386                    4 host-install(4)        broken REGR. vs. 168506
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168506
 build-arm64                   4 host-install(4)        broken REGR. vs. 168506
 build-arm64-xsm               4 host-install(4)        broken REGR. vs. 168506
 build-arm64-pvops             4 host-install(4)        broken REGR. vs. 168506
 build-amd64                   4 host-install(4)        broken REGR. vs. 168506
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 168506
 build-amd64-prev              4 host-install(4)        broken REGR. vs. 168506
 build-amd64-xtf               4 host-install(4)        broken REGR. vs. 168506
 build-armhf-pvops             4 host-install(4)        broken REGR. vs. 168506
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 168506

Tests which did not succeed, but are not blocking:
 test-amd64-i386-qemuu-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-xl            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-pvshim     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemut-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemut-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemut-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1)  blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-shadow     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-vhd        1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-xsm        1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl           1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-amd64-coresched-amd64-xl  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-xsm       1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-shadow    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-rtds      1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ws16-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qemut-ws16-amd64  1 build-check(1)             blocked n/a
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qcow2     1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvshim    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-intel  1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit2   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit1   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl           1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-amd64-livepatch    1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-intel  1 build-check(1)              blocked n/a
 test-amd64-amd64-migrupgrade  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pair         1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pygrub       1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-freebsd11-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-qemuu-freebsd12-amd64  1 build-check(1)           blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-coresched-i386-xl  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-amd64  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-i386  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-amd64-i386-livepatch     1 build-check(1)               blocked  n/a
 test-amd64-i386-migrupgrade   1 build-check(1)               blocked  n/a
 test-amd64-i386-pair          1 build-check(1)               blocked  n/a
 test-amd64-i386-qemut-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemut-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-armhf-armhf-xl-arndale   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit1   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-cubietruck  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-rtds      1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-vhd       1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-1        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-2        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-3        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-4        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-5        1 build-check(1)               blocked  n/a

version targeted for testing:
 xen                  1e595d9c2b8608bcef48d6a69cc2f6135780bcc0
baseline version:
 xen                  ca304edd3ba8c19211107fd2e898249987557ce5

Last test of basis   168506  2022-03-10 14:16:31 Z   19 days
Failing since        168862  2022-03-25 17:36:39 Z    3 days    5 attempts
Testing same since   168957  2022-03-28 21:36:20 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bjoern Doebel <doebel@amazon.de>
  Jan Beulich <jbeulich@suse.com>
  Jiamei Xie <jiamei.xie@arm.com>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Thiner Logoer <logoerthiner1@163.com>

jobs:
 build-amd64-xsm                                              broken  
 build-arm64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64-xtf                                              broken  
 build-amd64                                                  broken  
 build-arm64                                                  broken  
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-prev                                             broken  
 build-i386-prev                                              broken  
 build-amd64-pvops                                            broken  
 build-arm64-pvops                                            broken  
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-xtf-amd64-amd64-1                                       blocked 
 test-xtf-amd64-amd64-2                                       blocked 
 test-xtf-amd64-amd64-3                                       blocked 
 test-xtf-amd64-amd64-4                                       blocked 
 test-xtf-amd64-amd64-5                                       blocked 
 test-amd64-amd64-xl                                          blocked 
 test-amd64-coresched-amd64-xl                                blocked 
 test-arm64-arm64-xl                                          blocked 
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           blocked 
 test-amd64-coresched-i386-xl                                 blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        blocked 
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         blocked 
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-xl-xsm                                      blocked 
 test-arm64-arm64-xl-xsm                                      blocked 
 test-amd64-i386-xl-xsm                                       blocked 
 test-amd64-amd64-qemuu-nested-amd                            blocked 
 test-amd64-amd64-xl-pvhv2-amd                                blocked 
 test-amd64-i386-qemut-rhel6hvm-amd                           blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-dom0pvh-xl-amd                              blocked 
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemut-debianhvm-amd64                     blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     blocked 
 test-amd64-i386-freebsd10-amd64                              blocked 
 test-amd64-amd64-qemuu-freebsd11-amd64                       blocked 
 test-amd64-amd64-qemuu-freebsd12-amd64                       blocked 
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         blocked 
 test-amd64-i386-xl-qemut-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         blocked 
 test-amd64-i386-xl-qemuu-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemut-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemut-ws16-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ws16-amd64                          blocked 
 test-armhf-armhf-xl-arndale                                  blocked 
 test-amd64-amd64-xl-credit1                                  blocked 
 test-arm64-arm64-xl-credit1                                  blocked 
 test-armhf-armhf-xl-credit1                                  blocked 
 test-amd64-amd64-xl-credit2                                  blocked 
 test-arm64-arm64-xl-credit2                                  blocked 
 test-armhf-armhf-xl-credit2                                  blocked 
 test-armhf-armhf-xl-cubietruck                               blocked 
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        blocked 
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         blocked 
 test-amd64-i386-freebsd10-i386                               blocked 
 test-amd64-amd64-qemuu-nested-intel                          blocked 
 test-amd64-amd64-xl-pvhv2-intel                              blocked 
 test-amd64-i386-qemut-rhel6hvm-intel                         blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-amd64-dom0pvh-xl-intel                            blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-livepatch                                   blocked 
 test-amd64-i386-livepatch                                    blocked 
 test-amd64-amd64-migrupgrade                                 blocked 
 test-amd64-i386-migrupgrade                                  blocked 
 test-amd64-amd64-xl-multivcpu                                blocked 
 test-armhf-armhf-xl-multivcpu                                blocked 
 test-amd64-amd64-pair                                        blocked 
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-amd64-amd64-xl-pvshim                                   blocked 
 test-amd64-i386-xl-pvshim                                    blocked 
 test-amd64-amd64-pygrub                                      blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-amd64-amd64-xl-qcow2                                    blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-xl-rtds                                     blocked 
 test-armhf-armhf-xl-rtds                                     blocked 
 test-arm64-arm64-xl-seattle                                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              blocked 
 test-amd64-amd64-xl-shadow                                   blocked 
 test-amd64-i386-xl-shadow                                    blocked 
 test-arm64-arm64-xl-thunderx                                 blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 
 test-arm64-arm64-xl-vhd                                      blocked 
 test-armhf-armhf-xl-vhd                                      blocked 
 test-amd64-i386-xl-vhd                                       blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-prev broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-amd64-xtf broken
broken-job build-arm64 broken
broken-job build-arm64-pvops broken
broken-job build-arm64-xsm broken
broken-job build-armhf-pvops broken
broken-job build-i386 broken
broken-job build-i386-prev broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-i386-prev host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step build-i386 host-install(4)
broken-step build-i386-pvops host-install(4)
broken-step build-arm64 host-install(4)
broken-step build-arm64-xsm host-install(4)
broken-step build-arm64-pvops host-install(4)
broken-step build-amd64 host-install(4)
broken-step build-amd64-xsm host-install(4)
broken-step build-amd64-prev host-install(4)
broken-step build-amd64-xtf host-install(4)
broken-step build-armhf-pvops host-install(4)
broken-step build-amd64-pvops host-install(4)

Not pushing.

(No revision log; it would be 410 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 15:42:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 15:42:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295875.503647 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZDza-0003cc-4K; Tue, 29 Mar 2022 15:42:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295875.503647; Tue, 29 Mar 2022 15:42:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZDza-0003cV-1N; Tue, 29 Mar 2022 15:42:46 +0000
Received: by outflank-mailman (input) for mailman id 295875;
 Tue, 29 Mar 2022 15:42:44 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=kdRh=UI=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZDzY-0003c9-P2
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 15:42:44 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id df2c2fd6-af76-11ec-a405-831a346695d4;
 Tue, 29 Mar 2022 17:42:43 +0200 (CEST)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur03lp2058.outbound.protection.outlook.com [104.47.8.58]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-26-_WchDNYaPMmENiyDo3W2vA-1; Tue, 29 Mar 2022 17:42:39 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM0PR04MB5955.eurprd04.prod.outlook.com (2603:10a6:208:110::11)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.23; Tue, 29 Mar
 2022 15:42:38 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%5]) with mapi id 15.20.5102.023; Tue, 29 Mar 2022
 15:42:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: df2c2fd6-af76-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648568562;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=yzW7+upfC/9vj6lPRwgSDHEMt44ugTfZCunqQLg8lQI=;
	b=a9gwX2AZD8W2EoVs4I9wJnyT/0DBSUTSKn5s+JWr6CblZyRHyd3zsuwV+h6QUtBAp4chcK
	BJsJqz5GznDjFf1CNuDE9CmR4ImxxdV5b2zKdKtiHNbd/TomVHi66A7b6IbmQh1VQPSC+D
	rjxqtDRt0goN3IFo3ZqgfcxA31Dmgh8=
X-MC-Unique: _WchDNYaPMmENiyDo3W2vA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=DZIou94oPy/UbaThzWNdEafRDdgleG0S9ttAQFXrMcFYKsi16czqeC6gslnOjWIdi5DvhkPogE/sDm14Oe9XVSdc+4RL4NuFDTuG13eCmeLMKEjtcOR1yABWNWi350bCaTU5WmkjqFQp0Ae5TF+YMZ4/W31aeMcnzjqRhRPSeACXH9jewW5aOf61T8cbTOQ81FZd533L6beV9jxOOHYQNW0fGSjulNXnIMZ2HZdh/mS95ul9ZabZ6VIEVtQ9GEbfqcF1mm7EJZSdDcj3/z0gGVYRqi8/vaU4hhmdAJUDnY7R3W4GV16q+YDajxhMdM4d5xpcncnRIfYoHUejK2/NtQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=yzW7+upfC/9vj6lPRwgSDHEMt44ugTfZCunqQLg8lQI=;
 b=A4o9P+nfUbDv5Lp2YUVWZak2OLuTEQzoeEJ+z1nv3hFfbAYmaA+TBvdvtVTLbIXlxvaqv1m56oSE41X0pC98E1KhGGbvGksEGKJySwq2ER4I80OeeiFGXc89PlP7CEy0fDDVcMwP5cbtfMSgC5vO+/1uhXpN9/XXfFxif7oWedvzcSkI21gMVOBUbYznbfde0YHybeII+sA99FL77McclKLTaL637fb6x6bWet0AA1YpH0+5wEqBU9C+sMGQGNSsIylAdKPS7NuJA1Rv5sK2BNviZAf9faGsPoxkU7haLoBMSpFPhqaoCO3TUGAotq11spM17lix5KUVRIRZ4Tp7xA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <04459197-458b-8d10-2692-981495c0e243@suse.com>
Date: Tue, 29 Mar 2022 17:42:35 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2 1/3] x86/mem_sharing: option to enforce fork starting
 with empty p2m
Content-Language: en-US
To: Tamas K Lengyel <tamas.lengyel@intel.com>
Cc: Wei Liu <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>,
 Juergen Gross <jgross@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian <kevin.tian@intel.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Tamas K Lengyel <tamas@tklengyel.com>, xen-devel@lists.xenproject.org
References: <ab6bb88e90e5649c60e08a1680b3a2390441031b.1648561546.git.tamas.lengyel@intel.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <ab6bb88e90e5649c60e08a1680b3a2390441031b.1648561546.git.tamas.lengyel@intel.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR0301CA0048.eurprd03.prod.outlook.com
 (2603:10a6:20b:469::29) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 30d3c8e5-5fc4-4869-0f98-08da119ac086
X-MS-TrafficTypeDiagnostic: AM0PR04MB5955:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB59557996F83B6F882DF61C61B31E9@AM0PR04MB5955.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6916009)(8936002)(54906003)(508600001)(186003)(36756003)(2616005)(66556008)(316002)(6666004)(66476007)(5660300002)(7416002)(6512007)(83380400001)(6486002)(38100700002)(6506007)(26005)(53546011)(31696002)(66946007)(2906002)(4326008)(86362001)(31686004)(8676002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?MkNLNDFUMEhCV01xaGFLbTZQVUloWkJYeVFUMm5adWV3TXk5WkJPc0hxY3BM?=
 =?utf-8?B?MVhVNGYwSER6eDFNZkk5UG1GdEFoYWhWckZPb244ZlVIN2k3Q3Rsdks0R1BG?=
 =?utf-8?B?eXVJc0p0WmJvbytnczhhMmpEWkxYUlNOcGY4a0YwN0xIWWlEd25YR3VMT2ZT?=
 =?utf-8?B?TUhEdFdEc3dhMVMxbmhRSUd5S2RwSmU3YjZpZDVWb1FHMUU0ZlhaQlF5Sk55?=
 =?utf-8?B?aS9FT2pVa3FtVHpLUm5PSndlRUwxVGQ3M3ZKODBKUTlXYnpUaDNzeVY2c0pE?=
 =?utf-8?B?cFRSbXVnSms5Si9KdzhxRHpDNmZuVGh0aHNjRnNibkM5ek9tRXhsa0txYkht?=
 =?utf-8?B?ZnFLYWFwNWtzem9DMHowM3NsVUhmcWttYytSdXhrT1RqMXpsOWNuc3NjNi9n?=
 =?utf-8?B?OTFLTG5GZWs5TC9vNWw5d3M0THlpUld6d0dSZ1F4dDhtMzNTN2FiSUdrbnkv?=
 =?utf-8?B?azlVdkpHc3V2NmduNkh1QjA0eVpyY1JoY1NxcFk3NWMrRzhSRnVLalNkck4v?=
 =?utf-8?B?WTBONmxrd0NwbG9wWTZyZE1kd2Y4VFpWaFljMFp5WDB6TVViQzRkamx1bjU1?=
 =?utf-8?B?QkIra1V4VlRvNWtrT3B5U3Q5azMyMGtmSU01MzM0NDNJaE80dUgxQnpRVDd3?=
 =?utf-8?B?N3RkdURJQ1Uvd2lGY3J3VThNK1FWY0phM2xveFpRSmJwa1N2Umttb0JjcGZl?=
 =?utf-8?B?bXpJc1pqQU90aUtRSVRhY1BoZGt6ZDcxQXp4YUFLQWhpZVFmU2NxUXUwbnNu?=
 =?utf-8?B?TDdRYnNxQlZobG5tRjRwMjFvSndsOWhlZnFNTi80UnljcTUyQXVDV0xkclRF?=
 =?utf-8?B?czVUUVRIOTBNOVhiQmVtVXN4WFAvM29XVVFBSFdYc2NoVWdXT1hzb3dIWnFP?=
 =?utf-8?B?bGhrOVdHOUpuRVJPbXlaeVNiSjVSTkE2U1V3MHZxdmVIczliM1NRYnROb1BN?=
 =?utf-8?B?UWc1MWx3NXhpTUhzMkJCVURnYjBPUlhQREtyNWVVcldSMk5oN1IzWktDYm1t?=
 =?utf-8?B?b1BVeEtTcFVnVUo1N044ZHo3bzBxQzJBSlBYV2FqcDNyNHMrZ3M3L29IbFVs?=
 =?utf-8?B?UDVlaXFOYTkyeWJmdUZYb3NDNTVYSlBGVnVuUzIxbDk3amFmV1k1emdFR3FR?=
 =?utf-8?B?RElndmxoZkVlVlNma0UyYmJ5eUk3RndNaXlKaGwxUkdNZ0d1QzFpMU9oNU9t?=
 =?utf-8?B?QVJFbVNEaGl5V0k5TVNrMnNjV3lmMTZpbFpwM0NRRG5uOExuR3piakVLVkpa?=
 =?utf-8?B?TFlkZW5jcGd1OThab01rTWhJYkljNWE1c3VHRzdpUUVtOE1qbnVvSG5vVkFj?=
 =?utf-8?B?aEFyK3ZpTUF3Vi9JdnNZNDhWSU5URUllNXhLbzFKSHRIUW8vRllLZnpack9Q?=
 =?utf-8?B?U2ZoSTVTc1lBTVpZOVJLTFk4RGxQakxhRFowYTV0K3lCODZtVjd6cURpM1BB?=
 =?utf-8?B?VUlpSjFuZ3N0d1E3b3RsbUdySlQ0MERpUHR6SVN1MEJxVTN0RHpTVXYyQkd2?=
 =?utf-8?B?MFV4RkZ5QXl5cEU0UExacmI0R1l6S01IWXZnMkVDQlpYT3BnRmRyeWxOSEtH?=
 =?utf-8?B?Tk5ZOHZsd0xKV0YwczVOS0pHbWliVHo3a1ExeFJIUGFUeTFPQ1JUTnZNWGlk?=
 =?utf-8?B?L1NRWmxzYlJDL0lzYVl6S0pGZldHcENXZzdIR3d6d1I4V2NzTkoyeXhPWW1L?=
 =?utf-8?B?U280dldveStJczVPY2Rid2RJSHlLODZteWNVQ0hsMUZVbE5WWEhCWlVxQklE?=
 =?utf-8?B?bmJGcDRURkt3Ym40UnBhTjZ1T2dBRmNSbTJWTjJQNFRIZnpMUGVTZVJRbk5z?=
 =?utf-8?B?Um92ejBVbVVyWXlQdnRlaFd3bTdQblRyM2kvQ0VjRnVGRmlLbDNUbk1YeGRl?=
 =?utf-8?B?MGpjSXRWaDB4REJFMVJFaUVhc3ZZZ0NvU3J5cDF3QnFuWk1qZk9aNE5UYTNB?=
 =?utf-8?B?MXlhS3pKcks5YXIrMGpNaTBnbWlEVkh4SjlyL3VMTlZtTlNCN0xIVm5Nb3FI?=
 =?utf-8?B?ZllmQTNPZmdNNjhoZktHQXVLKy81Q0Y1V3ZMVG5qdzl1U2pWZmRPVUN5Q0dP?=
 =?utf-8?B?V1Y4QXZIM0hoY2xlU0hBZ25TQlNybW1iRWVoVEZlUmEwQ1RyLzUrdTluaDZJ?=
 =?utf-8?B?bnNhaGhkaTJ4MUZFS1Qrc2dlN1NVMVBYa1k0NkZteGFOTGx2RkhkeFlKQXNZ?=
 =?utf-8?B?MW4xOHRUa1lFV0JWV0xuVEdnemEvN1JYQTFrYzkrSitvbE50Y25YVE1lRzZw?=
 =?utf-8?B?aXdBMVVIdEVOb1phVm5YVU8rYXB3VklMZ0VNZE4yYzU4VkttbkdBVE9tWDl6?=
 =?utf-8?B?L2tXWVJ2dU5IWVZwUnVPMXhZNTZKRnhZY2hhK01Udyt0d0RkcXdmUT09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 30d3c8e5-5fc4-4869-0f98-08da119ac086
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 29 Mar 2022 15:42:38.0087
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: CUGtyZ+XJ744VuijkvDGOpKN5S0C0d/BCDUQRAFNR5dyfLrZcyDyVrKPI1p6IS04CehbNxNBZzaEpzb8rqldqQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB5955

On 29.03.2022 16:03, Tamas K Lengyel wrote:
> Add option to the fork memop to enforce a start with an empty p2m.
> Pre-populating special pages to the fork tend to be necessary only when setting
> up forks to be fully functional with a toolstack or if the fork makes use of
> them in some way. For short-lived forks these pages are optional and starting
> with an empty p2m has advantages both in terms of reset performance as well as
> easier reasoning about the state of the fork after creation.

I'm afraid I don't consider this enough of an explanation: Why would these
page be optional? Where does the apriori knowledge come from that the guest
wouldn't manage to access the vCPU info pages or the APIC access one?

> --- a/xen/arch/x86/include/asm/hvm/domain.h
> +++ b/xen/arch/x86/include/asm/hvm/domain.h
> @@ -31,7 +31,9 @@
>  #ifdef CONFIG_MEM_SHARING
>  struct mem_sharing_domain
>  {
> -    bool enabled, block_interrupts;
> +    bool enabled;
> +    bool block_interrupts;
> +    bool empty_p2m;

While the name of the field is perhaps fine as is, it would be helpful to
have a comment here clarifying that this is only about the guest's initial
and reset state; this specifically does not indicate the p2m has to remain
empty (aiui).

> @@ -1856,7 +1860,13 @@ static int fork(struct domain *cd, struct domain *d)
>      if ( (rc = bring_up_vcpus(cd, d)) )
>          goto done;
>  
> -    rc = copy_settings(cd, d);
> +    if ( !(rc = copy_settings(cd, d, empty_p2m)) )
> +    {
> +        cd->arch.hvm.mem_sharing.block_interrupts = block_interrupts;
> +
> +        if ( (cd->arch.hvm.mem_sharing.empty_p2m = empty_p2m) )

Is there a reason you don't do the assignment earlier, thus avoiding the
need to pass around the extra function argument?

> --- a/xen/include/public/memory.h
> +++ b/xen/include/public/memory.h
> @@ -543,10 +543,10 @@ struct xen_mem_sharing_op {
>          } debug;
>          struct mem_sharing_op_fork {      /* OP_FORK */
>              domid_t parent_domain;        /* IN: parent's domain id */
> -/* Only makes sense for short-lived forks */
> +/* These flags only makes sense for short-lived forks */

Nit: s/makes/make/.

Jan



From xen-devel-bounces@lists.xenproject.org Tue Mar 29 15:51:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 15:51:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295880.503658 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZE7u-00054r-Vs; Tue, 29 Mar 2022 15:51:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295880.503658; Tue, 29 Mar 2022 15:51:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZE7u-00054k-So; Tue, 29 Mar 2022 15:51:22 +0000
Received: by outflank-mailman (input) for mailman id 295880;
 Tue, 29 Mar 2022 15:51:22 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=kdRh=UI=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZE7u-00054e-5g
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 15:51:22 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 140f8bdf-af78-11ec-a405-831a346695d4;
 Tue, 29 Mar 2022 17:51:21 +0200 (CEST)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur02lp2052.outbound.protection.outlook.com [104.47.5.52]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-31-NsxonC3WPmm3fRF5nwcQSg-1; Tue, 29 Mar 2022 17:51:16 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM6PR04MB5799.eurprd04.prod.outlook.com (2603:10a6:20b:a9::20)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.22; Tue, 29 Mar
 2022 15:51:14 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%5]) with mapi id 15.20.5102.023; Tue, 29 Mar 2022
 15:51:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 140f8bdf-af78-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648569080;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=sBQaXdCYhxMGlQ5Vx5JXxTY83nb5VS+KV/1Sq9nHI90=;
	b=FxgqukHSLr0J/YcCykkmzRBdxuVNec0PPRkqKeUGJD1T44MG1Qi1InRGALlAhSfXIAuQPs
	QPJZa8hGOTyqw1tbp1yCPx2JWKkAo3D2HZsHtsEYM0ljAZZ1TjRHGt9BxzAKr/oVbYAeKX
	s1BepGNefpCf5/JjWFVnWRDrAjRsat4=
X-MC-Unique: NsxonC3WPmm3fRF5nwcQSg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=FBxdrcD3DJ2CCbXzbKEfWZT/XA1MobX9fKdqeOlMPZSmONabwXKeavW/gG+LiACR6Wm2D1OWxbkNTJWv2c2WaUp5ezmhXmVvp+LHVtcbNW6E07Ezce/NDOm2yz4G6SyCRgJAXfKp/6GchnYXt8Qnci2Fqs5Ccn4Qajzy2fqMfxKp2cwPXtK8zaSu1022LvRolYhbtH+Z6oR4l/Tu97QMsbvkjNeUKHdXgDVDyagO2URU105ADRDjwkxhcctlAGLBTtVDihF3uT24yMliXcMBGME3efNsdWfUKFn+DybfVSzXzc9NlibofM9V7/b9pn5J2G+DO833VPBBYRMe4M1hFw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=sBQaXdCYhxMGlQ5Vx5JXxTY83nb5VS+KV/1Sq9nHI90=;
 b=XUTKSTh5apdT/soeg+CkqoO9zVIX7ATXkjjrSijSzWPMdR4HTxnwObrzYsnbU6VQVUImye1iOYu1Io/IUrws84Qm1chqaz09H9Ntp1LskDcQ/PVkxpfUNZeMV7dji0SD4kSIC/elUYIukjz2KkXM4h2wAR073BntyEDgQwy8SfWNBPXG9tlzVb8l49mX6SQcz12ytvC2hf7p3gHPuT4c7xUy9Gi3BiDUUkL8MpTC0xCRtnC1o//1/XLmLNyQDjArXAHzZZJ8PuiqoMOtf/SWBCh/yooBFWqBy0YOdyTbgvjAtuGIlvKF0vEgsFtv99RsANYdYXnPigi1cdP/20Mj8g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <259a550c-9657-d0d2-d58b-c7c7914fa25a@suse.com>
Date: Tue, 29 Mar 2022 17:51:12 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2 2/3] x86/mem_sharing: add fork_complete field to
 mem_sharing_domain
Content-Language: en-US
To: Tamas K Lengyel <tamas.lengyel@intel.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>, Wei Liu
 <wl@xen.org>, Tamas K Lengyel <tamas@tklengyel.com>,
 George Dunlap <george.dunlap@citrix.com>, xen-devel@lists.xenproject.org
References: <ab6bb88e90e5649c60e08a1680b3a2390441031b.1648561546.git.tamas.lengyel@intel.com>
 <10b1b71d918b7d7315b49b5932497d094f767a1e.1648561546.git.tamas.lengyel@intel.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <10b1b71d918b7d7315b49b5932497d094f767a1e.1648561546.git.tamas.lengyel@intel.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8PR04CA0001.eurprd04.prod.outlook.com
 (2603:10a6:20b:310::6) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0e48f4b5-dfdd-4959-f409-08da119bf403
X-MS-TrafficTypeDiagnostic: AM6PR04MB5799:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB579994789617CE83A7ED819BB31E9@AM6PR04MB5799.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(38100700002)(6916009)(6512007)(316002)(186003)(6486002)(36756003)(8676002)(508600001)(54906003)(31686004)(4744005)(2906002)(66946007)(8936002)(31696002)(86362001)(66556008)(6506007)(4326008)(2616005)(5660300002)(26005)(66476007)(53546011)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?VG93aGVEc0N0K3hBUlhrN0hTT01uaHM0V09DMTloNmg0RnNVTDhNK0FhTzBu?=
 =?utf-8?B?aWJlZjZpWmRxTEh2MG05SzRnRmtNN0JZQ3ZVR2NMK1dwdS80cEtXNzdQWFFS?=
 =?utf-8?B?NTdEZFBUOVpHZHNhWkwrTWJmRGtyRytOYWRza202TVFPb0JjaW5mTzJxcTJG?=
 =?utf-8?B?dlNpTlRjelIyTUhGd0NaWlJOcmJqKzV5eDhWQSsxUzU3b2dpRk1NbTlYczVY?=
 =?utf-8?B?cVphWGloUmlMZW9BeW1KcmRaRVIyVmJvSlViWkpUL1dzRUJJcGV2WjZ2N2Vn?=
 =?utf-8?B?TnFENEhBMlBuS2o2WVQxSWFTRUExZkhOelZraU5pMDdKY2Qrc3l4dkRqVkpj?=
 =?utf-8?B?L1lDQ3pvSEF2Z2FYNTJ2Z3MwOHNxWVEzdzBMTmt6ZmZUclZnVzF5a3k4d1BM?=
 =?utf-8?B?ci9oa29OVGkwUnF5dTZKb0dMVGJ6aHNiMnYwenRuWDdQanBwckNyMG1YNUpv?=
 =?utf-8?B?MGpnN2hjbEl4bXE1ejJWV1NxZktWMVEvcllKRFVsVWkzR3BMeGIvWEpsZFJX?=
 =?utf-8?B?YzlXVTY4cXFMMUJHQkJva1BRL2dlU1VnODBoSFRJK0pwWTQ4YmxFWUZNb1pm?=
 =?utf-8?B?c0ZOd3JDME5VSXMyZ1QwWmhrdEtUYTJtd2ZjdTl4OXA2b2ZRdWtJV3hEQ3Ix?=
 =?utf-8?B?Z25ZYW85Vk5VQlhqTUVhaWtOOTRNNmVMWW1lMVl1aHBSNDNqVEdHdFByWUJq?=
 =?utf-8?B?VG1seTNIWlovOTkvd0ZxN0ZJSHA0djJBZ3RJNlZpbEswVUl1Y0lORm5ZNFdN?=
 =?utf-8?B?U1BHUGpVdVp0UWYzMHVkYXo4RGZETkVLb0RoTldTZGhMMVF0aGEvRXMzeEVH?=
 =?utf-8?B?YVJrSndCN2ZaZ1VWVlF0YmNCMWdyTzludVRjOXRLN0NobEg5VkphTkl5c0Vy?=
 =?utf-8?B?c3QzOHZXTXhla09iZ21CU2JCQzM3dE5HT2hQRzlZRmM1Z1VTTmMzTHVpcUVt?=
 =?utf-8?B?WmhrMTRkNzhTaTJ0RCtzQ1h1ZkpTRlZ2VjhFWHlKNm1ua29rUExEQlRWRndk?=
 =?utf-8?B?T2ZSSkdmV05Uc3B3SDhjbGxjTE1Vek5zbWlDb29xcHNENFZyS2hsZWpVRGxO?=
 =?utf-8?B?MCtnUSszaGIxN01YRmtiNzJiclBNUktsNEFqblZoVHRtUnVVaDBtTzJMT0dJ?=
 =?utf-8?B?VER4dThvTWNCQ3NaN1RieG9IU1ZsR25mQnB4WjhIRktQNFk0bi9wUGpYa3lK?=
 =?utf-8?B?N1RYRERiai8wVE9MUCtZdDdUVlA5MThGVzBXaDVoaHhVT3k4Zm9NRUJXM3ZL?=
 =?utf-8?B?d1FOYitQMHVUeGNQTWdiZFVCNUVkZm9zQnVpRnd5M0lTNUNsT3pBZTM1a0RO?=
 =?utf-8?B?Q0pCdHQ3a0ZHR1F3WmNiZTlHQzAzVzJMb09YSEhwNFQ2UDFtTndYcjVUbFRM?=
 =?utf-8?B?OXN6T0tqRElKSzd3WjgzRVhoRkRxNzc4VEFCVTRBay9xaTZOV2JXc0FSVDc1?=
 =?utf-8?B?YTMxZEVZREJEZ3VpcUZUaFAxdFJvR2ZNSW1HeVM0by9BdWw5VWZwdXhQNWM1?=
 =?utf-8?B?eUk2QzE4NDJiQ2hvRmlDRmhFVithbDRvSkpLcEl0NW44dFRqTnZUbnN0NXpi?=
 =?utf-8?B?Q0RtcDZiVXNQM0E3TDRnNG05UU9MNXU5OHJqQkt6YXE4cU0vVVUvMDZOdHB2?=
 =?utf-8?B?MUlMUkRxQ0IvWWFPVS9hcWlJWm5jcXJJNFIxcDRxdlhTUkgwTzNxczdHdmRM?=
 =?utf-8?B?SlJLYmtxajE4TmV5S09KQjZaSU05RnFqdzVDd0dvbEVBeldId0FSK0plTWdU?=
 =?utf-8?B?a0srZ09uejR3TzBLWmJnT2VjN3dNOWJibHJycHBNT04yNEJUMnFxM1RMUDlk?=
 =?utf-8?B?YU5aSkZwWWtXcHJTbFZDVHFZQ2xGL3hpNWZvZUZkTndmMjJtN1cwRXZIbFpv?=
 =?utf-8?B?dHJNMUZqd1lsL0NkdllNaGdiWTQ1cXEraHBjNThrVW8vNFBoNlc5TGN1QStS?=
 =?utf-8?B?bStCNUVrSThvbGd0OEVhQnRGN2k5aFU0b3p2VGk2N01KeHFXV21Jcy8xQVRZ?=
 =?utf-8?B?U3g4NWNNS0hPQ3VVMFZuZFViOXZ3blFuNk9sRUd5Wlp0Y0V3bHQ1M3ZNNUps?=
 =?utf-8?B?RElQWmRWeHprWG95WTh2ZWZicEt2ZGFGRkdjM0hDTWNNMnpBY0ZEamxoNS9y?=
 =?utf-8?B?cFUzelJKV1BCVCtCZ2Z4T0JWWEIxaDlLSWs3czZ4WitDRGwyalZXaVB5TUor?=
 =?utf-8?B?c3A5SWhqdVAwREFSZTJPREpmenhWNEhzUlR1V2pRNU1HRUVNRE5rOUJMTVNQ?=
 =?utf-8?B?SEpxblF1YkI2aWJ5R09ickZkd25EOER1QzRYQnNKN2RvM1NlczNrNlVpTERm?=
 =?utf-8?B?VURkYnBtTUVuSWxnUlUyK3hCZjM1SklLdHJtWmFZYkd2UXg1dVdXZz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0e48f4b5-dfdd-4959-f409-08da119bf403
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 29 Mar 2022 15:51:13.8942
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 5qH3kLWYHHeGCkoLVxuGtuOuOHIqgsqsui/a3tyR6p3mDDDdM+J/xNqafzpfKoTvGAPF0ybH6ecWz0/LF2+dVg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB5799

On 29.03.2022 16:03, Tamas K Lengyel wrote:
> The fork's physmap should only be populated with select special pages during
> the setup of the fork. The rest of the fork's physmap should only be populated
> as needed after the fork is complete. Add a field to specify when the fork is
> complete so fork_page() can determine whether it's time to start adding entries
> to the physmap.
> 
> Signed-off-by: Tamas K Lengyel <tamas.lengyel@intel.com>

Acked-by: Jan Beulich <jbeulich@suse.com>



From xen-devel-bounces@lists.xenproject.org Tue Mar 29 16:11:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 16:11:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295885.503673 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZERS-0007xw-MC; Tue, 29 Mar 2022 16:11:34 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295885.503673; Tue, 29 Mar 2022 16:11:34 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZERS-0007xp-J8; Tue, 29 Mar 2022 16:11:34 +0000
Received: by outflank-mailman (input) for mailman id 295885;
 Tue, 29 Mar 2022 16:11:33 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Hz1j=UI=tklengyel.com=tamas@srs-se1.protection.inumbo.net>)
 id 1nZERR-0007xj-Hj
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 16:11:33 +0000
Received: from MTA-07-4.privateemail.com (mta-07-4.privateemail.com
 [68.65.122.27]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e4a8d566-af7a-11ec-a405-831a346695d4;
 Tue, 29 Mar 2022 18:11:31 +0200 (CEST)
Received: from mta-07.privateemail.com (localhost [127.0.0.1])
 by mta-07.privateemail.com (Postfix) with ESMTP id 29C4818000B1
 for <xen-devel@lists.xenproject.org>; Tue, 29 Mar 2022 12:11:29 -0400 (EDT)
Received: from mail-oa1-f47.google.com (unknown [10.20.151.171])
 by mta-07.privateemail.com (Postfix) with ESMTPA id 046BD18000AF
 for <xen-devel@lists.xenproject.org>; Tue, 29 Mar 2022 12:11:28 -0400 (EDT)
Received: by mail-oa1-f47.google.com with SMTP id
 586e51a60fabf-dacc470e03so19218983fac.5
 for <xen-devel@lists.xenproject.org>; Tue, 29 Mar 2022 09:11:28 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e4a8d566-af7a-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648570289;
	bh=dAoGSuvjXBvhNJh0Fzkgadj2m08FXuiMaHIpTSVTDt0=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=MVZ+US9zF1/6mrPCCNt8dkuQHd8kuN7KWVL2bxZ8IFpS/HPsWeNmoM3cLOXIL+BKr
	 KPMvjyHy/R2DlfGCAk1bGmsvB+/BnocZpuM3ZhtDz1aMP/KFtlFjNTue9lnl1YExdt
	 biITmbZy2rjdgH23KqlotHY7uvhbBAvK1zeVFpCNMFYb7O8BPRGqwb7UAv1uKfAN6I
	 7a8NeZEBiPl+0xhnKt/i97NyFRLrEqDP/oCyt53+XQq4JKWg1ajmqrp1wbVcHDYIpH
	 +x8Du0vZW7GE22C6XhG8oOTqVJztiydm7X05FKQyzwFk56bg6tq3I93vry+RrrxHPZ
	 apy622RBXpvcA==
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648570289;
	bh=dAoGSuvjXBvhNJh0Fzkgadj2m08FXuiMaHIpTSVTDt0=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=MVZ+US9zF1/6mrPCCNt8dkuQHd8kuN7KWVL2bxZ8IFpS/HPsWeNmoM3cLOXIL+BKr
	 KPMvjyHy/R2DlfGCAk1bGmsvB+/BnocZpuM3ZhtDz1aMP/KFtlFjNTue9lnl1YExdt
	 biITmbZy2rjdgH23KqlotHY7uvhbBAvK1zeVFpCNMFYb7O8BPRGqwb7UAv1uKfAN6I
	 7a8NeZEBiPl+0xhnKt/i97NyFRLrEqDP/oCyt53+XQq4JKWg1ajmqrp1wbVcHDYIpH
	 +x8Du0vZW7GE22C6XhG8oOTqVJztiydm7X05FKQyzwFk56bg6tq3I93vry+RrrxHPZ
	 apy622RBXpvcA==
X-Gm-Message-State: AOAM532BEpdVdazHs1MJdKi425k9oiiFAHmkcOax7r6p4zEVg+xKHzIN
	9z+esMNPuqaqFyAPWpu7Hm+E7ZEZ6STd5E3y0o0=
X-Google-Smtp-Source: ABdhPJyu3vAaFTQdTs7vV1Y6r4B0zcBb0Z0FZwr4iDznPlh1ygpEKzlk0fh2Ub3dcRNFYIUd+G0S/evWYeFotEohu38=
X-Received: by 2002:a05:6870:ea81:b0:db:3e68:7ae0 with SMTP id
 s1-20020a056870ea8100b000db3e687ae0mr220970oap.9.1648570284366; Tue, 29 Mar
 2022 09:11:24 -0700 (PDT)
MIME-Version: 1.0
References: <ab6bb88e90e5649c60e08a1680b3a2390441031b.1648561546.git.tamas.lengyel@intel.com>
 <04459197-458b-8d10-2692-981495c0e243@suse.com>
In-Reply-To: <04459197-458b-8d10-2692-981495c0e243@suse.com>
From: Tamas K Lengyel <tamas@tklengyel.com>
Date: Tue, 29 Mar 2022 12:10:48 -0400
X-Gmail-Original-Message-ID: <CABfawhnKL_7iBiOAHLjtKhH6sCDRfrLcNS_kr3YSLr=XdQdUGg@mail.gmail.com>
Message-ID: <CABfawhnKL_7iBiOAHLjtKhH6sCDRfrLcNS_kr3YSLr=XdQdUGg@mail.gmail.com>
Subject: Re: [PATCH v2 1/3] x86/mem_sharing: option to enforce fork starting
 with empty p2m
To: Jan Beulich <JBeulich@suse.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>, Wei Liu <wl@xen.org>, 
	Anthony PERARD <anthony.perard@citrix.com>, Juergen Gross <JGross@suse.com>, 
	Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, 
	Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, 
	Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian <kevin.tian@intel.com>, 
	=?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>, 
	xen-devel@lists.xenproject.org
Content-Type: text/plain; charset="UTF-8"
X-Virus-Scanned: ClamAV using ClamSMTP

On Tue, Mar 29, 2022 at 11:42 AM Jan Beulich <jbeulich@suse.com> wrote:
>
> On 29.03.2022 16:03, Tamas K Lengyel wrote:
> > Add option to the fork memop to enforce a start with an empty p2m.
> > Pre-populating special pages to the fork tend to be necessary only when setting
> > up forks to be fully functional with a toolstack or if the fork makes use of
> > them in some way. For short-lived forks these pages are optional and starting
> > with an empty p2m has advantages both in terms of reset performance as well as
> > easier reasoning about the state of the fork after creation.
>
> I'm afraid I don't consider this enough of an explanation: Why would these
> page be optional? Where does the apriori knowledge come from that the guest
> wouldn't manage to access the vCPU info pages or the APIC access one?

By knowing what code you are fuzzing. The code you are fuzzing is
clearly marked by harnesses and that's the only code you execute while
fuzzing. If you know the code doesn't use them, no need to map them
in. They haven't been needed in any of the fuzzing setups we had so
far so I'm planning to be this the default when fuzzing.

> > --- a/xen/arch/x86/include/asm/hvm/domain.h
> > +++ b/xen/arch/x86/include/asm/hvm/domain.h
> > @@ -31,7 +31,9 @@
> >  #ifdef CONFIG_MEM_SHARING
> >  struct mem_sharing_domain
> >  {
> > -    bool enabled, block_interrupts;
> > +    bool enabled;
> > +    bool block_interrupts;
> > +    bool empty_p2m;
>
> While the name of the field is perhaps fine as is, it would be helpful to
> have a comment here clarifying that this is only about the guest's initial
> and reset state; this specifically does not indicate the p2m has to remain
> empty (aiui).

Sure.

>
> > @@ -1856,7 +1860,13 @@ static int fork(struct domain *cd, struct domain *d)
> >      if ( (rc = bring_up_vcpus(cd, d)) )
> >          goto done;
> >
> > -    rc = copy_settings(cd, d);
> > +    if ( !(rc = copy_settings(cd, d, empty_p2m)) )
> > +    {
> > +        cd->arch.hvm.mem_sharing.block_interrupts = block_interrupts;
> > +
> > +        if ( (cd->arch.hvm.mem_sharing.empty_p2m = empty_p2m) )
>
> Is there a reason you don't do the assignment earlier, thus avoiding the
> need to pass around the extra function argument?

Yes, I prefer only setting these values when the fork is complete, to
avoid having these be dangling in case the fork failed. It's
ultimately not a requirement since if the fork failed we just destroy
the domain that was destined to be the fork from the toolstack. If the
fork failed half-way through all bets are off anyway since we don't do
any "unfork" to roll back the changes that were already applied, so
having these also set early wouldn't make things worse then it already
is. But still, I prefer not adding more things that would need to be
cleaned up if I don't have to.

>
> > --- a/xen/include/public/memory.h
> > +++ b/xen/include/public/memory.h
> > @@ -543,10 +543,10 @@ struct xen_mem_sharing_op {
> >          } debug;
> >          struct mem_sharing_op_fork {      /* OP_FORK */
> >              domid_t parent_domain;        /* IN: parent's domain id */
> > -/* Only makes sense for short-lived forks */
> > +/* These flags only makes sense for short-lived forks */
>
> Nit: s/makes/make/.

Ack.

Tamas


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 16:22:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 16:22:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295891.503687 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZEbn-00014V-N7; Tue, 29 Mar 2022 16:22:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295891.503687; Tue, 29 Mar 2022 16:22:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZEbn-00014O-JK; Tue, 29 Mar 2022 16:22:15 +0000
Received: by outflank-mailman (input) for mailman id 295891;
 Tue, 29 Mar 2022 16:22:14 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=fAbQ=UI=invisiblethingslab.com=demi@srs-se1.protection.inumbo.net>)
 id 1nZEbm-00014I-8L
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 16:22:14 +0000
Received: from out2-smtp.messagingengine.com (out2-smtp.messagingengine.com
 [66.111.4.26]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 62b53573-af7c-11ec-a405-831a346695d4;
 Tue, 29 Mar 2022 18:22:12 +0200 (CEST)
Received: from compute3.internal (compute3.nyi.internal [10.202.2.43])
 by mailout.nyi.internal (Postfix) with ESMTP id 7C9F95C00CE;
 Tue, 29 Mar 2022 12:22:10 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163])
 by compute3.internal (MEProxy); Tue, 29 Mar 2022 12:22:10 -0400
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Tue,
 29 Mar 2022 12:22:09 -0400 (EDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 62b53573-af7c-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:content-type:date:date:from:from
	:in-reply-to:in-reply-to:message-id:mime-version:references
	:reply-to:sender:subject:subject:to:to:x-me-proxy:x-me-proxy
	:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=Sq9MwfUHKw9epayjl
	cOgXQRPPM3dTjwiwxhxxvuyQpM=; b=jqWPCQ4ImYjiO/sk3XSplYsDQml5Jl5+8
	TTm+X+uFHMKg7S4PkzS4VrpFZzohhS5Ufut58WcIe0lRS7WysNmOaSg2hSgPUYCz
	deajlZg4xSTkNLpxwNgTquoHTk/UfCvP/gP+0cWjWJSEVExg/a7gcwoDsPMZU791
	O3mfETbTcCnCoXymgjbuZWB0SF++Lp7coY50XSG0/jCfzQM4iaEk2o0O+xluONlD
	n9omeUXN8MYnJgj08cYLA/+KVJJ0zKXHou/mGTMAxDCT3xLKd3CHKT/x6WESwdyO
	+c59kca0dkl2MCn5d95ZRdkQ7mRmdUaWOnUdpQBE/nytG+b8fo/MA==
X-ME-Sender: <xms:MTJDYppSv4_JfJxTozMRY53BQS1BAGk-55SNS2y07XlIrnklSKdfVw>
    <xme:MTJDYrqjmhI5MXGpm-yfPlTPTLgNCn20QnLSTmI4HbbYeOCwDAIIwU-JBAPrBAIzu
    30H7gLYioXP98o>
X-ME-Received: <xmr:MTJDYmMqyQ2tL8IOxuT_YMPdHdcmG1HxFaXytAQ4ul7pUWGaI47JnrKByekHbZU-P0aGSQ>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddrudeitddgjeegucetufdoteggodetrfdotf
    fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen
    uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne
    cujfgurhepkfffgggfvfhfhffujggtsehgtderredtfeejnecuhfhrohhmpeffvghmihcu
    ofgrrhhivgcuqfgsvghnohhurhcuoeguvghmihesihhnvhhishhisghlvghthhhinhhgsh
    hlrggsrdgtohhmqeenucggtffrrghtthgvrhhnpeeuudegudfgteefjeefhedtgfegteff
    ledvgedvjeethffhkeefleduteevudfhueenucevlhhushhtvghrufhiiigvpedtnecurf
    grrhgrmhepmhgrihhlfhhrohhmpeguvghmihesihhnvhhishhisghlvghthhhinhhgshhl
    rggsrdgtohhm
X-ME-Proxy: <xmx:MTJDYk5q48zf8O7aDVWROPbWx1e1iX1anUaHg37CO8YlSLjlvZhZkg>
    <xmx:MTJDYo4bgm7y8E4g-GoSp1IIgEUdRYxQbKb1perZaNdYZGD6FQvACw>
    <xmx:MTJDYsjr9f3vZZvvMpuMsys48Rbrmkj_50e6JsSERXLOLJscQUVEYQ>
    <xmx:MjJDYmkCtaslsF2D1za1IoaBoC6fmKl-BS9Y3C0Hjovg9RFmrnkaeA>
Message-ID: <1616233d-cbbe-6e45-356c-f99a57acf288@invisiblethingslab.com>
Date: Tue, 29 Mar 2022 12:22:02 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: Mark Kettenis <mark.kettenis@xs4all.nl>, djm@mindrot.org,
 roger.pau@citrix.com, marmarek@invisiblethingslab.com,
 xen-devel@lists.xenproject.org, tech@openbsd.org
References: <Yj3qW/y20htoSvuK@itl-email>
 <37a4b6-cd56-1993-be2-b5522b9aa4d7@mindrot.org>
 <c904abda-e6a0-256e-478a-ee0909c17e50@invisiblethingslab.com>
 <d3ccc20d61dc7636@bloch.sibelius.xs4all.nl>
 <10e7b01a-2a8e-17cd-6418-1a6f836cc251@invisiblethingslab.com>
 <YkLAT3AJk9usjIkD@diehard.n-r-g.com>
From: Demi Marie Obenour <demi@invisiblethingslab.com>
Subject: Re: Security support status of xnf(4) and xbf(4)
In-Reply-To: <YkLAT3AJk9usjIkD@diehard.n-r-g.com>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------vxttd3Eb7GwmegudxlPdgs00"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------vxttd3Eb7GwmegudxlPdgs00
Content-Type: multipart/mixed; boundary="------------xdvF1D0IYzQfMBJbOMVOd0P0";
 protected-headers="v1"
From: Demi Marie Obenour <demi@invisiblethingslab.com>
To: Mark Kettenis <mark.kettenis@xs4all.nl>, djm@mindrot.org,
 roger.pau@citrix.com, marmarek@invisiblethingslab.com,
 xen-devel@lists.xenproject.org, tech@openbsd.org
Message-ID: <1616233d-cbbe-6e45-356c-f99a57acf288@invisiblethingslab.com>
Subject: Re: Security support status of xnf(4) and xbf(4)
References: <Yj3qW/y20htoSvuK@itl-email>
 <37a4b6-cd56-1993-be2-b5522b9aa4d7@mindrot.org>
 <c904abda-e6a0-256e-478a-ee0909c17e50@invisiblethingslab.com>
 <d3ccc20d61dc7636@bloch.sibelius.xs4all.nl>
 <10e7b01a-2a8e-17cd-6418-1a6f836cc251@invisiblethingslab.com>
 <YkLAT3AJk9usjIkD@diehard.n-r-g.com>
In-Reply-To: <YkLAT3AJk9usjIkD@diehard.n-r-g.com>

--------------xdvF1D0IYzQfMBJbOMVOd0P0
Content-Type: multipart/mixed; boundary="------------aUgANmB4F9DEhKAky5I0jRAX"

--------------aUgANmB4F9DEhKAky5I0jRAX
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 3/29/22 04:16, Claudio Jeker wrote:
> On Mon, Mar 28, 2022 at 04:38:33PM -0400, Demi Marie Obenour wrote:
>> On 3/28/22 10:39, Mark Kettenis wrote:
>>>> Date: Mon, 28 Mar 2022 09:51:22 -0400
>>>> From: Demi Marie Obenour <demi@invisiblethingslab.com>
>>>>
>>>> On 3/27/22 21:45, Damien Miller wrote:
>>>>> On Fri, 25 Mar 2022, Demi Marie Obenour wrote:
>>>>>
>>>>>> Linux=E2=80=99s netfront and blkfront drivers recently had a secur=
ity
>>>>>> vulnerability (XSA-396) that allowed a malicious backend to potent=
ially
>>>>>> compromise them.  In follow-up audits, I found that OpenBSD=E2=80=99=
s xnf(4)
>>>>>> currently trusts the backend domain.  I reported this privately to=
 Theo
>>>>>> de Raadt, who indicated that OpenBSD does not consider this to be =
a
>>>>>> security concern.
>>>>>>
>>>>>> This is obviously a valid position for the OpenBSD project to take=
, but
>>>>>> it is surprising to some (such as myself) from the broader Xen
>>>>>> ecosystem.  Standard practice in the Xen world is that bugs in fro=
ntends
>>>>>> that allow a malicious backend to cause mischief *are* considered
>>>>>> security bugs unless there is explicit documentation to the contra=
ry.
>>>>>> As such, I believe this deserves to be noted in xnf(4) and xbf(4)=E2=
=80=99s man
>>>>>> pages.  If the OpenBSD project agrees, I am willing to write a pat=
ch,
>>>>>> but I have no experience with mandoc so it might take a few tries.=

>>>>>
>>>>> Hang on, what is a "malicious backend" in this context? Is it somet=
hing
>>>>> other than the Xen Hypervisor? If not, then it seems not to be a us=
eful
>>>>> attack model, as the hypervisor typically has near-complete access =
to
>>>>> guests' memory and CPU state.
>>>>
>>>> The backend can run in any Xen VM.  It often runs in dom0, but it
>>>> is not required to, and in Qubes OS the network backend never runs
>>>> in dom0.  Unless it runs in dom0, it has no access to frontend memor=
y,
>>>> except for memory the frontend has explicitly given it access to via=

>>>> grant tables.
>>>
>>> So this is somewhat similar to the situation on sun4v (Sun's
>>> virtualization of the SPARC architecture).  When writing the vnet(4)
>>> and vdsk(4) drivers for OpenBSD, I did consider the implications of
>>> those drivers talking to a "malicious" domain.  the SPARC hypervisor
>>> implements a concept similar to grant tables.  It is fairly obvious
>>> that any memory you grant access to should be considered insecure.
>>> This means that you either have to make a copy of the data or revoke
>>> access to the shared memory through some sort of Hypervisor call that=

>>> implements a synchronization point of some sorts.  Otherwise you and
>>> up TOCTOU issues all over the place.  But this obviously has
>>> significant performance consequences.  For vnet(4) I decided that an
>>> extra copy was worth doing and the only reasonable way of doing thing=
s
>>> given how OpenBSD's mbuf layer works.  But for vdsk(4) I decided to
>>> trust the other domain as there is no way to prevent it from feeding
>>> you compromised data.  Full disk encryption doesn't really solve the
>>> problem unless you have a way to securely verify the bootloader.
>>
>> In Qubes OS, xbf(4) devices are configurable.  While all of them are
>> provided by dom0 (which is trusted) by default, it is possible to
>> attach devices that are *not* provided by dom0, and these devices
>> should not be trusted.
>>
>>> Personally I think it might be beneficial for us to turn xnf(4) into
>>> what we colloquially call a "bcopy" network driver.  But folks who
>>> actually use xen may find the performance impact of doing this
>>> unacceptable and decide to trust the backend instead.
>>
>> You actually don=E2=80=99t have to do that.  The Xen network protocol
>> requires the backend to drop access to the buffer before giving it
>> to the frontend, so the frontend only needs to ensure that it cannot
>> regain access.  This will fail if the backend still has access, but
>> that is a bug in the backend, in which case you should shut down the
>> interface.  So there should not be any significant performance impact.=

>>
>> If you are curious about how Linux does this, you can look at
>> drivers/xen/grant-table.c, drivers/net/xen-netfront.c, and
>> drivers/block/xen-blkfront.c from the Linux source.  They are
>> dual licensed GPL/MIT so there should not be licensing issues there.
>> Be sure to use a version at or after =E2=80=9Cxen/netfront: react prop=
erly to
>> failing gnttab_end_foreign_access_ref()=E2=80=9D and the other XSA-396=
 patches.
>=20
> So how does xen manage to limit access to less than a page size?
> The hardware on x86 does not give you byte precise mappings for grantin=
g
> memory.
> An mbuf is 256 bytes and of those 256 bytes less then that is used for
> data. Still for dma the full 4k page needs to be granted to the host.
> The only way this can be done is by memcpy all data into individual pag=
es.
> The same is true for the most common mbuf cluster size of 2k.

I was not aware that the OpenBSD mbuf layer could not handle the
approach I described.  Sorry for the misunderstanding.

> So yes, this will be a bcopy ethernet driver and by that will be on the=

> same level of crappyness as bce(4) and old old old realtek.

Mark, is there any way this could be made tunable at runtime?

> If you can trust the host don't run your vm on that host.

As Marek has stated, in Qubes OS the network backend is not considered
to be part of the host.  The host has no network access whatsoever.

--=20
Sincerely,
Demi Marie Obenour (she/her/hers)
Invisible Things Lab
--------------aUgANmB4F9DEhKAky5I0jRAX
Content-Type: application/pgp-keys; name="OpenPGP_0xB288B55FFF9C22C1.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB288B55FFF9C22C1.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=3Dx+Ro
-----END PGP PUBLIC KEY BLOCK-----

--------------aUgANmB4F9DEhKAky5I0jRAX--

--------------xdvF1D0IYzQfMBJbOMVOd0P0--

--------------vxttd3Eb7GwmegudxlPdgs00
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----
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=fWiF
-----END PGP SIGNATURE-----

--------------vxttd3Eb7GwmegudxlPdgs00--


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 17:20:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 17:20:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295896.503697 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZFVh-0006EF-0W; Tue, 29 Mar 2022 17:20:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295896.503697; Tue, 29 Mar 2022 17:20:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZFVg-0006E8-Ts; Tue, 29 Mar 2022 17:20:00 +0000
Received: by outflank-mailman (input) for mailman id 295896;
 Tue, 29 Mar 2022 17:19:59 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZFVf-0006Dy-8j; Tue, 29 Mar 2022 17:19:59 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZFVf-0004Pr-5L; Tue, 29 Mar 2022 17:19:59 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZFVe-0007nB-T2; Tue, 29 Mar 2022 17:19:58 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZFVe-0007e9-Sc; Tue, 29 Mar 2022 17:19:58 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=ByAHdpjq8OBi96ksPSdrMKJn1/f8HK0L2xOpLkXNiRk=; b=SywUaHretDrTzZcRDdXr5DFwA/
	lA/LEdyY5UYYtlIBEcEz9mnP5+kZyC2SBsIhoEFRDL8j97fPL/c2pXrS4FIt1Jop6hYqhODKtWUzc
	kXb4HC+7HcjtrFE/7wn+qlJYtEs01hTJDvnYYw4wkr5YZ4N1kslGIo1EJ3ViVRKVJ/DA=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168984-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 168984: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=8eec96b7b8d937d40e2e7988edb8bbd08598c715
X-Osstest-Versions-That:
    xen=fc90d75c2b71ae15b75128e7d0d4dbe718164ecb
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 29 Mar 2022 17:19:58 +0000

flight 168984 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168984/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  8eec96b7b8d937d40e2e7988edb8bbd08598c715
baseline version:
 xen                  fc90d75c2b71ae15b75128e7d0d4dbe718164ecb

Last test of basis   168860  2022-03-25 17:00:30 Z    4 days
Testing same since   168984  2022-03-29 14:00:29 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Jan Beulich <jbeulich@suse.com>
  Juergen Gross <jgross@suse.com>
  Julien Grall <jgrall@amazon.com> # arm

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   fc90d75c2b..8eec96b7b8  8eec96b7b8d937d40e2e7988edb8bbd08598c715 -> smoke


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 18:06:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 18:06:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295907.503714 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZGEU-0002uQ-Kq; Tue, 29 Mar 2022 18:06:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295907.503714; Tue, 29 Mar 2022 18:06:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZGEU-0002uJ-Hy; Tue, 29 Mar 2022 18:06:18 +0000
Received: by outflank-mailman (input) for mailman id 295907;
 Tue, 29 Mar 2022 18:06:17 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZGET-0002u9-D9; Tue, 29 Mar 2022 18:06:17 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZGET-0005FN-9t; Tue, 29 Mar 2022 18:06:17 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZGET-0001z8-0J; Tue, 29 Mar 2022 18:06:17 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZGES-0007Sa-W6; Tue, 29 Mar 2022 18:06:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=xIpfyT9qKVwSyXoDcaem8azXvN2LjvyAAaz76CUUslE=; b=1eVvHBt1C5nSJF6j8hSAcxKpQt
	lowh1zE4abJji+6SGSOtBA5wPi9SQR4Upt6J/jkBivrVepXpBIN37uNVL6O4NQj4GNQqCy+TCAAtG
	r0YB6BmxpGh/TltWjjYZM5SwMH/oYwuSuiarQ8igWnuO4Tx/3JV9QyTNHgS74Wf5Ilqo=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168970-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.15-testing test] 168970: regressions - FAIL
X-Osstest-Failures:
    xen-4.15-testing:test-amd64-i386-livepatch:livepatch-run:fail:regression
    xen-4.15-testing:test-amd64-amd64-livepatch:livepatch-run:fail:regression
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=bb43e0e1ca20dff14536b7c90ff870f3f50bff8f
X-Osstest-Versions-That:
    xen=cd751c09a5bab9f3529901fbe4d867ad7d52e89d
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 29 Mar 2022 18:06:16 +0000

flight 168970 xen-4.15-testing real [real]
flight 168989 xen-4.15-testing real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168970/
http://logs.test-lab.xenproject.org/osstest/logs/168989/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-i386-livepatch    13 livepatch-run            fail REGR. vs. 168502
 test-amd64-amd64-livepatch   13 livepatch-run            fail REGR. vs. 168502

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168502
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168502
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168502
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168502
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168502
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168502
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168502
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168502
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168502
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168502
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168502
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168502
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  bb43e0e1ca20dff14536b7c90ff870f3f50bff8f
baseline version:
 xen                  cd751c09a5bab9f3529901fbe4d867ad7d52e89d

Last test of basis   168502  2022-03-10 09:07:57 Z   19 days
Failing since        168863  2022-03-25 17:36:55 Z    4 days    5 attempts
Testing same since   168970  2022-03-29 04:19:26 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bjoern Doebel <doebel@amazon.de>
  Jan Beulich <jbeulich@suse.com>
  Jiamei Xie <jiamei.xie@arm.com>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Thiner Logoer <logoerthiner1@163.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   fail    
 test-amd64-i386-livepatch                                    fail    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 410 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 18:29:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 18:29:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295918.503729 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZGaU-0005NZ-OR; Tue, 29 Mar 2022 18:29:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295918.503729; Tue, 29 Mar 2022 18:29:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZGaU-0005NS-KM; Tue, 29 Mar 2022 18:29:02 +0000
Received: by outflank-mailman (input) for mailman id 295918;
 Tue, 29 Mar 2022 18:29:00 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZGaS-0005NI-QV; Tue, 29 Mar 2022 18:29:00 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZGaS-0005dZ-N7; Tue, 29 Mar 2022 18:29:00 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZGaS-0002qr-Dx; Tue, 29 Mar 2022 18:29:00 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZGaS-0003JL-DS; Tue, 29 Mar 2022 18:29:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=GvVNWJRCtnyflRgVWtsbFyf4DGo9MTyjHpIUok9/Irg=; b=FgvWax2f8z8wozNAM36nHypQv+
	ZLSsdnsxqxHxaL/oqZMSBTbLkXY0x5KXjKXrXzNBrducioUEZY/PljJASwpOo2GCvKlYoEWTZHdMp
	YUonlnRAe2qKmaeCl4aw0pFFuTqP6lCLdQjKX4a6hgW/P36ABGOSfBtCEor10qfsLvMU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168966-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.16-testing test] 168966: trouble: blocked/broken/pass
X-Osstest-Failures:
    xen-4.16-testing:build-amd64:<job status>:broken:regression
    xen-4.16-testing:build-amd64-prev:<job status>:broken:regression
    xen-4.16-testing:build-amd64-pvops:<job status>:broken:regression
    xen-4.16-testing:build-amd64-xsm:<job status>:broken:regression
    xen-4.16-testing:build-amd64-xtf:<job status>:broken:regression
    xen-4.16-testing:build-arm64:<job status>:broken:regression
    xen-4.16-testing:build-arm64-pvops:<job status>:broken:regression
    xen-4.16-testing:build-arm64-xsm:<job status>:broken:regression
    xen-4.16-testing:build-armhf-pvops:<job status>:broken:regression
    xen-4.16-testing:build-i386:<job status>:broken:regression
    xen-4.16-testing:build-i386-prev:<job status>:broken:regression
    xen-4.16-testing:build-i386-pvops:<job status>:broken:regression
    xen-4.16-testing:build-i386-xsm:<job status>:broken:regression
    xen-4.16-testing:build-i386-prev:host-install(4):broken:regression
    xen-4.16-testing:build-i386:host-install(4):broken:regression
    xen-4.16-testing:build-i386-xsm:host-install(4):broken:regression
    xen-4.16-testing:build-i386-pvops:host-install(4):broken:regression
    xen-4.16-testing:build-arm64-pvops:host-install(4):broken:regression
    xen-4.16-testing:build-arm64-xsm:host-install(4):broken:regression
    xen-4.16-testing:build-arm64:host-install(4):broken:regression
    xen-4.16-testing:build-amd64-xtf:host-install(4):broken:regression
    xen-4.16-testing:build-amd64:host-install(4):broken:regression
    xen-4.16-testing:build-amd64-xsm:host-install(4):broken:regression
    xen-4.16-testing:build-armhf-pvops:host-install(4):broken:regression
    xen-4.16-testing:build-amd64-prev:host-install(4):broken:regression
    xen-4.16-testing:build-amd64-pvops:host-install(4):broken:regression
    xen-4.16-testing:test-amd64-i386-qemuu-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-qemuu-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-pvshim:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-shadow:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-seattle:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-thunderx:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-coresched-amd64-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-shadow:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-rtds:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-ws16-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:build-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:build-arm64-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-debianhvm-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qcow2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-pvshim:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-pvhv2-intel:build-check(1):blocked:nonblocking
    xen-4.16-testing:build-i386-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-pvhv2-amd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-dom0pvh-xl-amd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-dom0pvh-xl-intel:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-livepatch:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-nested-intel:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-migrupgrade:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-pair:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-nested-amd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-pygrub:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-freebsd11-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-freebsd12-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-win7-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-coresched-i386-xl:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-freebsd10-amd64:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-freebsd10-i386:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-livepatch:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-migrupgrade:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-pair:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-qemut-rhel6hvm-amd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-amd64-i386-qemut-rhel6hvm-intel:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-arndale:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit1:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-cubietruck:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-multivcpu:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-rtds:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-vhd:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-xtf-amd64-amd64-1:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-xtf-amd64-amd64-2:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-xtf-amd64-amd64-3:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-xtf-amd64-amd64-4:build-check(1):blocked:nonblocking
    xen-4.16-testing:test-xtf-amd64-amd64-5:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    xen=4dcddbba664cc91e2c1952498e80d8025891b9ad
X-Osstest-Versions-That:
    xen=cfd29b83a26f35f49f074f06169ce4cadfdebf0d
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 29 Mar 2022 18:29:00 +0000

flight 168966 xen-4.16-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168966/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                     <job status>                 broken
 build-amd64-prev                <job status>                 broken
 build-amd64-pvops               <job status>                 broken
 build-amd64-xsm                 <job status>                 broken
 build-amd64-xtf                 <job status>                 broken
 build-arm64                     <job status>                 broken
 build-arm64-pvops               <job status>                 broken
 build-arm64-xsm                 <job status>                 broken
 build-armhf-pvops               <job status>                 broken
 build-i386                      <job status>                 broken
 build-i386-prev                 <job status>                 broken
 build-i386-pvops                <job status>                 broken
 build-i386-xsm                  <job status>                 broken
 build-i386-prev               4 host-install(4)        broken REGR. vs. 168513
 build-i386                    4 host-install(4)        broken REGR. vs. 168513
 build-i386-xsm                4 host-install(4)        broken REGR. vs. 168513
 build-i386-pvops              4 host-install(4)        broken REGR. vs. 168513
 build-arm64-pvops             4 host-install(4)        broken REGR. vs. 168513
 build-arm64-xsm               4 host-install(4)        broken REGR. vs. 168513
 build-arm64                   4 host-install(4)        broken REGR. vs. 168513
 build-amd64-xtf               4 host-install(4)        broken REGR. vs. 168513
 build-amd64                   4 host-install(4)        broken REGR. vs. 168513
 build-amd64-xsm               4 host-install(4)        broken REGR. vs. 168513
 build-armhf-pvops             4 host-install(4)        broken REGR. vs. 168513
 build-amd64-prev              4 host-install(4)        broken REGR. vs. 168513
 build-amd64-pvops             4 host-install(4)        broken REGR. vs. 168513

Tests which did not succeed, but are not blocking:
 test-amd64-i386-qemuu-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-amd64-i386-xl            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-pvshim     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemut-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemut-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemut-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-check(1)         blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1)  blocked n/a
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)      blocked n/a
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemuu-ws16-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-shadow     1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-vhd        1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-xsm        1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl           1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit1   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-credit2   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-seattle   1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-thunderx  1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-vhd       1 build-check(1)               blocked  n/a
 test-arm64-arm64-xl-xsm       1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl           1 build-check(1)               blocked  n/a
 test-amd64-coresched-amd64-xl  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-xsm       1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-shadow    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-rtds      1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ws16-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow  1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qemut-ws16-amd64  1 build-check(1)             blocked n/a
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-win7-amd64  1 build-check(1)             blocked n/a
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm  1 build-check(1)     blocked n/a
 build-arm64-libvirt           1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemut-debianhvm-amd64  1 build-check(1)        blocked n/a
 test-amd64-amd64-xl-qcow2     1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvshim    1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-intel  1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-pvhv2-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-dom0pvh-xl-intel  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit2   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-credit1   1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl           1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-amd64-livepatch    1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-intel  1 build-check(1)              blocked n/a
 test-amd64-amd64-migrupgrade  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pair         1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-nested-amd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-pygrub       1 build-check(1)               blocked  n/a
 test-amd64-amd64-qemuu-freebsd11-amd64  1 build-check(1)           blocked n/a
 test-amd64-amd64-qemuu-freebsd12-amd64  1 build-check(1)           blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a
 test-amd64-i386-xl-qemuu-win7-amd64  1 build-check(1)              blocked n/a
 test-amd64-coresched-i386-xl  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-amd64  1 build-check(1)               blocked  n/a
 test-amd64-i386-freebsd10-i386  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-amd64-i386-livepatch     1 build-check(1)               blocked  n/a
 test-amd64-i386-migrupgrade   1 build-check(1)               blocked  n/a
 test-amd64-i386-pair          1 build-check(1)               blocked  n/a
 test-amd64-i386-qemut-rhel6hvm-amd  1 build-check(1)               blocked n/a
 test-amd64-i386-qemut-rhel6hvm-intel  1 build-check(1)             blocked n/a
 test-armhf-armhf-xl-arndale   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit1   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-credit2   1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-cubietruck  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-multivcpu  1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-rtds      1 build-check(1)               blocked  n/a
 test-armhf-armhf-xl-vhd       1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-1        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-2        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-3        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-4        1 build-check(1)               blocked  n/a
 test-xtf-amd64-amd64-5        1 build-check(1)               blocked  n/a

version targeted for testing:
 xen                  4dcddbba664cc91e2c1952498e80d8025891b9ad
baseline version:
 xen                  cfd29b83a26f35f49f074f06169ce4cadfdebf0d

Last test of basis   168513  2022-03-11 05:13:34 Z   18 days
Failing since        168864  2022-03-25 17:37:01 Z    4 days    6 attempts
Testing same since   168966  2022-03-29 02:34:29 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bjoern Doebel <doebel@amazon.de>
  Jan Beulich <jbeulich@suse.com>
  Jiamei Xie <jiamei.xie@arm.com>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Thiner Logoer <logoerthiner1@163.com>

jobs:
 build-amd64-xsm                                              broken  
 build-arm64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64-xtf                                              broken  
 build-amd64                                                  broken  
 build-arm64                                                  broken  
 build-armhf                                                  pass    
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-arm64-libvirt                                          blocked 
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           blocked 
 build-amd64-prev                                             broken  
 build-i386-prev                                              broken  
 build-amd64-pvops                                            broken  
 build-arm64-pvops                                            broken  
 build-armhf-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-xtf-amd64-amd64-1                                       blocked 
 test-xtf-amd64-amd64-2                                       blocked 
 test-xtf-amd64-amd64-3                                       blocked 
 test-xtf-amd64-amd64-4                                       blocked 
 test-xtf-amd64-amd64-5                                       blocked 
 test-amd64-amd64-xl                                          blocked 
 test-amd64-coresched-amd64-xl                                blocked 
 test-arm64-arm64-xl                                          blocked 
 test-armhf-armhf-xl                                          blocked 
 test-amd64-i386-xl                                           blocked 
 test-amd64-coresched-i386-xl                                 blocked 
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        blocked 
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         blocked 
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 blocked 
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-xl-xsm                                      blocked 
 test-arm64-arm64-xl-xsm                                      blocked 
 test-amd64-i386-xl-xsm                                       blocked 
 test-amd64-amd64-qemuu-nested-amd                            blocked 
 test-amd64-amd64-xl-pvhv2-amd                                blocked 
 test-amd64-i386-qemut-rhel6hvm-amd                           blocked 
 test-amd64-i386-qemuu-rhel6hvm-amd                           blocked 
 test-amd64-amd64-dom0pvh-xl-amd                              blocked 
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemut-debianhvm-amd64                     blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     blocked 
 test-amd64-i386-freebsd10-amd64                              blocked 
 test-amd64-amd64-qemuu-freebsd11-amd64                       blocked 
 test-amd64-amd64-qemuu-freebsd12-amd64                       blocked 
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         blocked 
 test-amd64-i386-xl-qemut-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-win7-amd64                         blocked 
 test-amd64-i386-xl-qemuu-win7-amd64                          blocked 
 test-amd64-amd64-xl-qemut-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemut-ws16-amd64                          blocked 
 test-amd64-amd64-xl-qemuu-ws16-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ws16-amd64                          blocked 
 test-armhf-armhf-xl-arndale                                  blocked 
 test-amd64-amd64-xl-credit1                                  blocked 
 test-arm64-arm64-xl-credit1                                  blocked 
 test-armhf-armhf-xl-credit1                                  blocked 
 test-amd64-amd64-xl-credit2                                  blocked 
 test-arm64-arm64-xl-credit2                                  blocked 
 test-armhf-armhf-xl-credit2                                  blocked 
 test-armhf-armhf-xl-cubietruck                               blocked 
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        blocked 
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         blocked 
 test-amd64-i386-freebsd10-i386                               blocked 
 test-amd64-amd64-qemuu-nested-intel                          blocked 
 test-amd64-amd64-xl-pvhv2-intel                              blocked 
 test-amd64-i386-qemut-rhel6hvm-intel                         blocked 
 test-amd64-i386-qemuu-rhel6hvm-intel                         blocked 
 test-amd64-amd64-dom0pvh-xl-intel                            blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-livepatch                                   blocked 
 test-amd64-i386-livepatch                                    blocked 
 test-amd64-amd64-migrupgrade                                 blocked 
 test-amd64-i386-migrupgrade                                  blocked 
 test-amd64-amd64-xl-multivcpu                                blocked 
 test-armhf-armhf-xl-multivcpu                                blocked 
 test-amd64-amd64-pair                                        blocked 
 test-amd64-i386-pair                                         blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-amd64-amd64-xl-pvshim                                   blocked 
 test-amd64-i386-xl-pvshim                                    blocked 
 test-amd64-amd64-pygrub                                      blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-amd64-amd64-xl-qcow2                                    blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-xl-rtds                                     blocked 
 test-armhf-armhf-xl-rtds                                     blocked 
 test-arm64-arm64-xl-seattle                                  blocked 
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             blocked 
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              blocked 
 test-amd64-amd64-xl-shadow                                   blocked 
 test-amd64-i386-xl-shadow                                    blocked 
 test-arm64-arm64-xl-thunderx                                 blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 
 test-arm64-arm64-xl-vhd                                      blocked 
 test-armhf-armhf-xl-vhd                                      blocked 
 test-amd64-i386-xl-vhd                                       blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary

broken-job build-amd64 broken
broken-job build-amd64-prev broken
broken-job build-amd64-pvops broken
broken-job build-amd64-xsm broken
broken-job build-amd64-xtf broken
broken-job build-arm64 broken
broken-job build-arm64-pvops broken
broken-job build-arm64-xsm broken
broken-job build-armhf-pvops broken
broken-job build-i386 broken
broken-job build-i386-prev broken
broken-job build-i386-pvops broken
broken-job build-i386-xsm broken
broken-step build-i386-prev host-install(4)
broken-step build-i386 host-install(4)
broken-step build-i386-xsm host-install(4)
broken-step build-i386-pvops host-install(4)
broken-step build-arm64-pvops host-install(4)
broken-step build-arm64-xsm host-install(4)
broken-step build-arm64 host-install(4)
broken-step build-amd64-xtf host-install(4)
broken-step build-amd64 host-install(4)
broken-step build-amd64-xsm host-install(4)
broken-step build-armhf-pvops host-install(4)
broken-step build-amd64-prev host-install(4)
broken-step build-amd64-pvops host-install(4)

Not pushing.

(No revision log; it would be 410 lines long.)


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 18:58:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 18:58:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295928.503743 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZH2r-0000FJ-9T; Tue, 29 Mar 2022 18:58:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295928.503743; Tue, 29 Mar 2022 18:58:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZH2r-0000FC-5x; Tue, 29 Mar 2022 18:58:21 +0000
Received: by outflank-mailman (input) for mailman id 295928;
 Tue, 29 Mar 2022 18:58:20 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=OsXo=UI=apertussolutions.com=dpsmith@srs-se1.protection.inumbo.net>)
 id 1nZH2p-0000F6-UD
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 18:58:20 +0000
Received: from sender4-of-o51.zoho.com (sender4-of-o51.zoho.com
 [136.143.188.51]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 311823f2-af92-11ec-a405-831a346695d4;
 Tue, 29 Mar 2022 20:58:18 +0200 (CEST)
Received: from [10.10.1.138] (static-72-81-132-2.bltmmd.fios.verizon.net
 [72.81.132.2]) by mx.zohomail.com
 with SMTPS id 16485802917781.8588007249323937;
 Tue, 29 Mar 2022 11:58:11 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 311823f2-af92-11ec-a405-831a346695d4
ARC-Seal: i=1; a=rsa-sha256; t=1648580294; cv=none; 
	d=zohomail.com; s=zohoarc; 
	b=D5iKMR7NE0wxnbnz4SD3BfCHCVIdHIU5ZxMdMSbgYCWxs+zaKSe0MYWhrYh2DkLxCC+bzh20xHb3cfoyDio5c88UbQ0EKSJbNzGwHxP1rZ8fzjgQJzPbNl+wutQI2ZdrEOPtLrZnoNZungbwme8T1DdJQoLdxrjk9cJm5zc0wnI=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; 
	t=1648580294; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; 
	bh=82N1iEJ3aMRbMRMlDeQvRehl+/kjpA2zJvqFaRoFm24=; 
	b=WMLI1cyPo4768/sD2xu9x5JwzOEJxUa2ikicQHCWlHfpHzLK6NkdG1BZyXv3E95JsT3L6oH8fyzGjb6rQwcyMHNJgG/TWUZgfVLzZfaZc9GnIe2XNfuoGHjCp+MbpFnVc8TFehiGLpT8bItChZ5Le1EaDPRApZMMm2RqLekpYS4=
ARC-Authentication-Results: i=1; mx.zohomail.com;
	dkim=pass  header.i=apertussolutions.com;
	spf=pass  smtp.mailfrom=dpsmith@apertussolutions.com;
	dmarc=pass header.from=<dpsmith@apertussolutions.com>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1648580294;
	s=zoho; d=apertussolutions.com; i=dpsmith@apertussolutions.com;
	h=Message-ID:Date:MIME-Version:To:To:Cc:Cc:References:From:From:Subject:Subject:In-Reply-To:Content-Type:Content-Transfer-Encoding:Message-Id:Reply-To;
	bh=82N1iEJ3aMRbMRMlDeQvRehl+/kjpA2zJvqFaRoFm24=;
	b=f0mvPEfBGLaaTqvoLee/nHi92UvAdYISYAiMJxpBAI6YIOIUEMXoER6PaIBpYH6s
	eBE/jbDbvUgDiA04iStqLkF5uf3A0m2lFfzuYxAHrMIlJC9zY7UH3u5wflkPNVTYCbw
	nwlx4WmC7+qU4g5XPTRTs5JhpV+JFxRTPaq7fElk=
Message-ID: <a991c32d-4e45-f015-3d99-8552199e8d45@apertussolutions.com>
Date: Tue, 29 Mar 2022 14:57:54 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>
Cc: scott.davis@starlab.io, Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Daniel De Graaf <dgdegra@tycho.nsa.gov>, xen-devel@lists.xenproject.org,
 Jason Andryuk <jandryuk@gmail.com>
References: <20220328203622.30961-1-dpsmith@apertussolutions.com>
 <20220328203622.30961-2-dpsmith@apertussolutions.com>
 <7935e60e-34b1-76be-e5de-56e60f173438@suse.com>
From: "Daniel P. Smith" <dpsmith@apertussolutions.com>
Subject: Re: [RFC PATCH 1/1] xsm: allows system domains to allocate evtchn
In-Reply-To: <7935e60e-34b1-76be-e5de-56e60f173438@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ZohoMailClient: External

On 3/29/22 02:43, Jan Beulich wrote:
> On 28.03.2022 22:36, Daniel P. Smith wrote:
>> During domain construction under dom0less and hyperlaunch it is necessary to
>> allocate at least the event channel for xenstore and potentially the event
>> channel for the core console. When dom0less and hyperlaunch are doing their
>> construction logic they are executing under the idle domain context. The idle
>> domain is not a privileged domain, it is not the target domain, and as a result
>> under the current default XSM policy is not allowed to allocate the event
>> channel.
> 
> I appreciate the change is only needed there right now, but it feels
> inconsistent. _If_ it is to remain that way, at least a comment needs
> to be put in xsm_evtchn_unbound() making clear why this is a special
> case, and hence clarifying to people what the approximate conditions
> are to have such also put elsewhere. But imo it would be better to
> make the adjustment right in xsm_default_action(), without touching
> event_channel.c at all. Iirc altering xsm_default_action() was
> discussed before, but I don't recall particular reasons speaking
> against that approach.

By inconsistent, I take it you mean this is first place within an XSM
hook where an access decision is based on the current domain being a
system domain? I do agree and would add a comment to the change in the
XSM hook in a non-RFC version of the patch.

As to moving the check down into xsm_default_action(), the concern I
have with doing so is that this would then make every XSM check succeed
if `current->domain` is a system domain. Doing so would require a review
of every function which has an XSM hoook to evaluate every invocation of
those functions that,
  1. is there ever a time when current->domain may be a system domain
  2. if so,
    a. is the invocation on behalf of the system domain
    b. or is the invocation on behalf of a non-system domain

If there is any instance of 2b, then an inadvertent privilege escalation
can occur on that path. For evtchn_alloc_unbound() I verified the only
place, besides the new hyperlaunch calls, it is invoked is in the evtchn
hypercall handler, where current should be pointing at the domain that
made the hypercall.

>> This patch only addresses the event channel situation by adjust the default XSM
>> policy for xsm_evtchn_unbound to explicitly allow system domains to be able to
>> make the allocation call.
> 
> Indeed I'm having trouble seeing how your change would work for SILO
> mode, albeit Stefano having tested this would make me assume he did
> so in SILO mode, as that's the default on Arm iirc. Afaict
> silo_mode_dom_check() should return false in the described situation.

Correct, this patch only addressed the default policy. If an equivalent
change for SILO is desired, then it would be placed in
silo_evtchn_unbound() and not in silo_mode_dom_check() for the same
reasons I would be hesitant to place it in xsm_default_action().

> Similarly I don't see how things would work transparently with a
> Flask policy in place. Regardless of you mentioning the restriction,
> I think this wants resolving before the patch can go in.

To enable the equivalent in flask would require no hypervisor code
changes. Instead that would be handled by adding the necessary rules to
the appropriate flask policy file(s).


v/r,
dps


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 20:24:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 20:24:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295937.503760 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZIOD-0000Sq-Lm; Tue, 29 Mar 2022 20:24:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295937.503760; Tue, 29 Mar 2022 20:24:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZIOD-0000Sj-Ic; Tue, 29 Mar 2022 20:24:29 +0000
Received: by outflank-mailman (input) for mailman id 295937;
 Tue, 29 Mar 2022 20:24:28 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZIOC-0000SZ-HB; Tue, 29 Mar 2022 20:24:28 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZIOC-0007f0-Aa; Tue, 29 Mar 2022 20:24:28 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZIOB-0007im-T1; Tue, 29 Mar 2022 20:24:27 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZIOB-0000mQ-SC; Tue, 29 Mar 2022 20:24:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=6JO5jmMp1RuU4RzgC50DhZvjv8V1pjk3D6dZMYyHP6g=; b=x8QQP6abpsdsmImnDkZnHK1KhH
	xRmvl+4pDu3nBOBlfdCL8HWwLLgVfHyUArlSbwCOnmUmCSw45oik8WPiPLPI26e/KSaC2UBglwAvg
	JgBpSW7e9+RYA3H3+WDOgbRzUl/NV//L4GBFLSwL/88rotAS80PNkc/mxCZExtaSpE38=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168972-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168972: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-amd64-amd64-xl-xsm:guest-start/debian.repeat:fail:heisenbug
    linux-linus:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:debian-hvm-install:fail:heisenbug
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=1930a6e739c4b4a654a69164dbe39e554d228915
X-Osstest-Versions-That:
    linux=34af78c4e616c359ed428d79fe4758a35d2c5473
From: osstest service owner <osstest-admin@xenproject.org>
Date: Tue, 29 Mar 2022 20:24:27 +0000

flight 168972 linux-linus real [real]
flight 168995 linux-linus real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168972/
http://logs.test-lab.xenproject.org/osstest/logs/168995/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-xsm 22 guest-start/debian.repeat fail pass in 168995-retest
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm 12 debian-hvm-install fail pass in 168995-retest

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168838
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168838
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168838
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168838
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168838
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168838
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168838
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168838
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                1930a6e739c4b4a654a69164dbe39e554d228915
baseline version:
 linux                34af78c4e616c359ed428d79fe4758a35d2c5473

Last test of basis   168838  2022-03-25 06:20:14 Z    4 days
Failing since        168866  2022-03-25 20:12:03 Z    4 days    5 attempts
Testing same since   168972  2022-03-29 06:07:44 Z    0 days    1 attempts

------------------------------------------------------------
702 people touched revisions under test,
not listing them all

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 fail    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      fail    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   34af78c4e616..1930a6e739c4  1930a6e739c4b4a654a69164dbe39e554d228915 -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 21:57:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 21:57:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295950.503783 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZJqB-0000jH-GI; Tue, 29 Mar 2022 21:57:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295950.503783; Tue, 29 Mar 2022 21:57:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZJqB-0000jA-Cr; Tue, 29 Mar 2022 21:57:27 +0000
Received: by outflank-mailman (input) for mailman id 295950;
 Tue, 29 Mar 2022 21:57:26 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nZJqA-0000j0-6h
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 21:57:26 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nZJq1-0000nn-1E; Tue, 29 Mar 2022 21:57:17 +0000
Received: from gw1.octic.net ([81.187.162.82] helo=[10.0.1.102])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nZJq0-0003Xb-R4; Tue, 29 Mar 2022 21:57:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:Subject:
	From:References:Cc:To:MIME-Version:Date:Message-ID;
	bh=3/l7wWqt1nK2Cey0Udo5YIXVv4dDSonQUUKeFAJZKC4=; b=GHO0JrrYjB+ht0tcjNUKzrp3XX
	YcQgHQvTLGL6keWy6VnkBBjAyFP1HN6ppdaaDhH4csF4JvqB2UfiggmAufAYnt9E7JlHwVKTMo0P6
	FVm2/6JwTPhrARE64T0jS8AxnAIA3PhLGbKk8XTyB0XjqTndQVVf5n/lTlFw7GapCIuw=;
Message-ID: <edecda2d-bf81-c722-a9ef-42461da66319@xen.org>
Date: Tue, 29 Mar 2022 22:57:13 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
To: "Daniel P. Smith" <dpsmith@apertussolutions.com>,
 Jan Beulich <jbeulich@suse.com>
Cc: scott.davis@starlab.io, Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Daniel De Graaf <dgdegra@tycho.nsa.gov>, xen-devel@lists.xenproject.org,
 Jason Andryuk <jandryuk@gmail.com>
References: <20220328203622.30961-1-dpsmith@apertussolutions.com>
 <20220328203622.30961-2-dpsmith@apertussolutions.com>
 <7935e60e-34b1-76be-e5de-56e60f173438@suse.com>
 <a991c32d-4e45-f015-3d99-8552199e8d45@apertussolutions.com>
From: Julien Grall <julien@xen.org>
Subject: Re: [RFC PATCH 1/1] xsm: allows system domains to allocate evtchn
In-Reply-To: <a991c32d-4e45-f015-3d99-8552199e8d45@apertussolutions.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Daniel,

On 29/03/2022 19:57, Daniel P. Smith wrote:
> On 3/29/22 02:43, Jan Beulich wrote:
>> On 28.03.2022 22:36, Daniel P. Smith wrote:
>>> During domain construction under dom0less and hyperlaunch it is necessary to
>>> allocate at least the event channel for xenstore and potentially the event
>>> channel for the core console. When dom0less and hyperlaunch are doing their
>>> construction logic they are executing under the idle domain context. The idle
>>> domain is not a privileged domain, it is not the target domain, and as a result
>>> under the current default XSM policy is not allowed to allocate the event
>>> channel.
>>
>> I appreciate the change is only needed there right now, but it feels
>> inconsistent. _If_ it is to remain that way, at least a comment needs
>> to be put in xsm_evtchn_unbound() making clear why this is a special
>> case, and hence clarifying to people what the approximate conditions
>> are to have such also put elsewhere. But imo it would be better to
>> make the adjustment right in xsm_default_action(), without touching
>> event_channel.c at all. Iirc altering xsm_default_action() was
>> discussed before, but I don't recall particular reasons speaking
>> against that approach.
> 
> By inconsistent, I take it you mean this is first place within an XSM
> hook where an access decision is based on the current domain being a
> system domain? I do agree and would add a comment to the change in the
> XSM hook in a non-RFC version of the patch.
> 
> As to moving the check down into xsm_default_action(), the concern I
> have with doing so is that this would then make every XSM check succeed
> if `current->domain` is a system domain. Doing so would require a review
> of every function which has an XSM hoook to evaluate every invocation of
> those functions that,
>    1. is there ever a time when current->domain may be a system domain
>    2. if so,
>      a. is the invocation on behalf of the system domain
>      b. or is the invocation on behalf of a non-system domain
> 
> If there is any instance of 2b, then an inadvertent privilege escalation
> can occur on that path. For evtchn_alloc_unbound() I verified the only
> place, besides the new hyperlaunch calls, it is invoked is in the evtchn
> hypercall handler, where current should be pointing at the domain that
> made the hypercall.
Auditing existing calls is somewhat easy. The trouble are for new calls. 
I would say they are unlikely, but we would need to rely on the 
reviewers to spot any misuse. So this is a bit risky.

I am also a bit worry that we would end up to convert a lot of 
XSM_TARGET to XSM_HOOK (Note I have Live-Update in mind). This would 
make more difficult to figure what would the XSM calls allows without 
looking at the helper.

I quite like the proposal from Roger. If we define two helpers (e.g. 
xsm_{enable, disable}_build_domain()), we could elevate the privilege 
for the idle domain for a short period of time (this could be restricted 
to when the dummy policy is used).

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Tue Mar 29 23:13:44 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 29 Mar 2022 23:13:44 +0000
Received: from list by lists.xenproject.org with outflank-mailman.295992.503824 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZL1f-0001A7-OJ; Tue, 29 Mar 2022 23:13:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 295992.503824; Tue, 29 Mar 2022 23:13:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZL1f-0001A0-Jk; Tue, 29 Mar 2022 23:13:23 +0000
Received: by outflank-mailman (input) for mailman id 295992;
 Tue, 29 Mar 2022 23:13:22 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=OsXo=UI=apertussolutions.com=dpsmith@srs-se1.protection.inumbo.net>)
 id 1nZL1d-00019u-QC
 for xen-devel@lists.xenproject.org; Tue, 29 Mar 2022 23:13:22 +0000
Received: from sender4-of-o51.zoho.com (sender4-of-o51.zoho.com
 [136.143.188.51]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d14d7c45-afb5-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 01:13:19 +0200 (CEST)
Received: from [10.10.1.138] (static-72-81-132-2.bltmmd.fios.verizon.net
 [72.81.132.2]) by mx.zohomail.com
 with SMTPS id 1648595594032618.5951489063834;
 Tue, 29 Mar 2022 16:13:14 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d14d7c45-afb5-11ec-8fbc-03012f2f19d4
ARC-Seal: i=1; a=rsa-sha256; t=1648595595; cv=none; 
	d=zohomail.com; s=zohoarc; 
	b=VEpuCpkO61EXo31SsjmeZ02ExLCi8LL62rQA8EzziZ008HnHG8dK2qEn9axjePFXkn0a3TeyCsEQHx5rB+9H/ZZmgjDstwOWnjTyGthSIlekMzTaw0rmlhnItKHosSP3yUBMhLhPz31ZYPpsVryXbk5vooS1+z6h+FWSq/eabfI=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; 
	t=1648595595; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; 
	bh=VlqwyxSKEmlobMd/90bmniIackpUn/rc4D7qgk5NHwo=; 
	b=DZW4BcFM5HE5M6ijNL+QaLAGaYqOQ9o9626f9iMCs2xIvA0RAjjRrDpTS/VPK8CE3M8q1oOp62OiUV8fhDf1L95OkYS/T5cSTOmpiICxtWaf+0KuXHDM3QC8G0H2FOIXfOy5pXQ8+GedyQ8jvVY0ZIdnC77zRxQzc7YVrCHTd4I=
ARC-Authentication-Results: i=1; mx.zohomail.com;
	dkim=pass  header.i=apertussolutions.com;
	spf=pass  smtp.mailfrom=dpsmith@apertussolutions.com;
	dmarc=pass header.from=<dpsmith@apertussolutions.com>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1648595595;
	s=zoho; d=apertussolutions.com; i=dpsmith@apertussolutions.com;
	h=Message-ID:Date:MIME-Version:To:To:Cc:Cc:References:From:From:Subject:Subject:In-Reply-To:Content-Type:Content-Transfer-Encoding:Message-Id:Reply-To;
	bh=VlqwyxSKEmlobMd/90bmniIackpUn/rc4D7qgk5NHwo=;
	b=sidz40MoBOagNbY8Uy7bY9jkIuSdF4IvNIGcncI/dRo6S/BhvBHDKve43v9MiKHw
	82OUp6AlfPmoNDzjeIKCbm9YRZyK/iMdvTfKOEMYc11ZyhrMcHn96w+P5M8m8NL9vhW
	v3a1StCFdFbOleS1uWeo3W/iJMkfh0qx4EQfJQSA=
Message-ID: <ae3ba2f9-ace5-0c30-9190-06c747953b20@apertussolutions.com>
Date: Tue, 29 Mar 2022 19:12:56 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
Cc: xen-devel@lists.xenproject.org, scott.davis@starlab.io,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Wei Liu <wl@xen.org>, Daniel De Graaf <dgdegra@tycho.nsa.gov>,
 Jason Andryuk <jandryuk@gmail.com>
References: <20220328203622.30961-1-dpsmith@apertussolutions.com>
 <20220328203622.30961-2-dpsmith@apertussolutions.com>
 <YkK1dSS6RZ9hzyh6@Air-de-Roger>
From: "Daniel P. Smith" <dpsmith@apertussolutions.com>
Subject: Re: [RFC PATCH 1/1] xsm: allows system domains to allocate evtchn
In-Reply-To: <YkK1dSS6RZ9hzyh6@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ZohoMailClient: External

On 3/29/22 03:29, Roger Pau Monné wrote:
> On Mon, Mar 28, 2022 at 04:36:22PM -0400, Daniel P. Smith wrote:
>> During domain construction under dom0less and hyperlaunch it is necessary to
>> allocate at least the event channel for xenstore and potentially the event
>> channel for the core console. When dom0less and hyperlaunch are doing their
>> construction logic they are executing under the idle domain context. The idle
>> domain is not a privileged domain, it is not the target domain, and as a result
>> under the current default XSM policy is not allowed to allocate the event
>> channel.
> 
> I've not been following the discussion around this patch, but I would
> assume such privileges are only required for init code when no other
> domains are running?

At this time, correct.

> Since it's only at that point where the idle domain context needs to
> allocate event channels would it make sense to temporary elevate it's
> privileges by setting d->is_privileged while doing the domain creation?

This is initially what I did but it seemed like there was some
reluctance. As I was looking to formalize/abstract this in XSM instead
of doing direct manipulations, I realized I could achieve it in the hook
which would allow the hyperlaunch and dom0less code work without having
to ensure priv escalation is properly handled.

> That way we wouldn't need to grant those permissions for the lifetime
> of the host when they are only needed for initialization code.

Correct, which is why I adjusted the effective default policy only on
the check instead of in xsm_default_action() as Jan has suggested.
Outside of a code fault, all other times that evtchn_alloc_unbound() is
called `current->domain` should be pointing at the caller of the hypercall.

This works as an interim solution with minimal impact as it is all
internal to XSM and can easily be evolved. My concern is that exposing a
function call to provide priv escalation for the idle domain as an
interim solution for dom0less and hyperlaunch will have more impactful
code churn in both of these when a longer term approach is adopted.

> Another option would be switching to the initial vCPU of the domain
> being created, but that's likely to be more complex, or even create a
> short lived system domain with is_privileged set just for the purpose
> of building other domains.

Longer term I would like to explore doing this in general. Some initial
thinking is the fact that hypervisor has a few contexts, relative to
external entities, under which it is executing. When it is handling
internal house keeping (e.g. scheduler and security server), when it is
interacting with guest domains, when it is interacting with hardware
(e.g. vpci), and now when it is processing boot material to construct
domains. It  has been mentioned that today in Xen if one of these
contexts acting with external entities is corrupted, it can interfere
with operations occurring in the other contexts. In the past the have
advocated and been working to split these contexts using hard L0/L1
separation. As noted in other discussions, some architectures are
gaining hardware features that can be used in hard L0/L1 partitioning
but also could be used in a more "soft" partitioning more a kin to
Nested Kernel[1] and Dune[2]. Again just some initial thoughts.

> Overall I'm not sure it's worth giving those extra privileges to the
> idle domain when they are just need for a known and bounded period of
> time.

IMHO that is a slight over simplification. Setting is_privileged to the
idle domain while it is processing domain construction data from outside
the hypervisor means that during that bounded period the idle domain is
complete unrestricted and may invoke any XSM protected call. Contrast
this with only granting the idle domain the ability to allocate event
channels between domains at any time with the only codified usage is
during init/setup. While I am unsure how, theoretically malformed
construction data could expose a logic flaw to do some very unsavory
allocations without any guards. Whereas during runtime if the idle
domain was tricked into establishing an event channel between two
domains, it would only serve to provide a covert channel between the two
domains. Neither is desirable but IMHO I find the former a little more
concerning than the latter.

With that said, I am not completely against doing the priv escalation if
overall this is the direction that is preferred. If so, I would prefer
to provide a pair of static inlines under XSM name space to provide a
consistent implementation and be able to easily locate the places where
it is applied if/when a longer term approach is implemented.

v/r,
dps

[1]
https://nathandautenhahn.com/downloads/publications/asplos200-dautenhahn.pdf
[2]
https://web.stanford.edu/group/mast/cgi-bin/drupal/system/files/2012.dune_.osdi_.pdf


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 01:46:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 01:46:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296003.503851 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZNPl-0000BK-94; Wed, 30 Mar 2022 01:46:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296003.503851; Wed, 30 Mar 2022 01:46:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZNPl-0000At-2f; Wed, 30 Mar 2022 01:46:25 +0000
Received: by outflank-mailman (input) for mailman id 296003;
 Wed, 30 Mar 2022 01:46:23 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZNPj-0000Aj-P7; Wed, 30 Mar 2022 01:46:23 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZNPj-0005w3-Mc; Wed, 30 Mar 2022 01:46:23 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZNPj-0008Mv-4F; Wed, 30 Mar 2022 01:46:23 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZNPj-0006wB-3b; Wed, 30 Mar 2022 01:46:23 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=yPYC6NBqwzGjEFVcKiHCywUH1RwQQY+HP9xRfytJxVs=; b=gVCKnBQIQCyFpslIVJbVrlV5R9
	BU1If844/6Awrt4VTZtfCHcFIyK/ZNz99Vwk4X92AoT8SoU53i/03ooIdoXCF8crD6MHX4xWGoTgz
	2JRvicm8y3KwGHoCZR+GuZdpmpfHukJS1ihDwihhhoUbwR3dmaoerZ2JJihofTEArdO0=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168973-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 168973: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=fc90d75c2b71ae15b75128e7d0d4dbe718164ecb
X-Osstest-Versions-That:
    xen=0e03ff97def12b121b5313094a76e5db7bb5c93c
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 30 Mar 2022 01:46:23 +0000

flight 168973 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168973/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168855
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168855
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168855
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168855
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168855
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168855
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168855
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168855
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168855
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168855
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168855
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168855
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  fc90d75c2b71ae15b75128e7d0d4dbe718164ecb
baseline version:
 xen                  0e03ff97def12b121b5313094a76e5db7bb5c93c

Last test of basis   168855  2022-03-25 14:37:04 Z    4 days
Testing same since   168867  2022-03-25 23:39:47 Z    4 days    5 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   0e03ff97de..fc90d75c2b  fc90d75c2b71ae15b75128e7d0d4dbe718164ecb -> master


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 02:22:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 02:22:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296013.503862 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZNz0-0004jB-7M; Wed, 30 Mar 2022 02:22:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296013.503862; Wed, 30 Mar 2022 02:22:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZNz0-0004j4-4L; Wed, 30 Mar 2022 02:22:50 +0000
Received: by outflank-mailman (input) for mailman id 296013;
 Wed, 30 Mar 2022 02:22:49 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZNyz-0004iu-0a; Wed, 30 Mar 2022 02:22:49 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZNyy-00070E-UK; Wed, 30 Mar 2022 02:22:48 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZNyy-0001Xl-JU; Wed, 30 Mar 2022 02:22:48 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZNyy-0004eF-Iz; Wed, 30 Mar 2022 02:22:48 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Iw1HXy3o0oK8SqeI/J2RW7a1l0GXmE3Nf9AJ9c8a1GE=; b=A600F8IdOeGiExK1dq5+5VnEcM
	MzWbuMLeWujDCDizLZvw5Goy3IP5Yng1/4Th9JDiQlPfR2iL1OJLxBKqnD0YZ8R/8eZD4fcH0aC5q
	Sriy2Lh8oxGmFRkSOBPE6CiS1Gh0N2P7sw4oSsGHkdCe2gAT4wA8gRR9Ol7JcHzWF4Go=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168981-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 168981: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=2b4b8013fe45f5942433c90aad2ff1f1b29441ac
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 30 Mar 2022 02:22:48 +0000

flight 168981 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/168981/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 2b4b8013fe45f5942433c90aad2ff1f1b29441ac
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   29 days
Failing since        168258  2022-03-01 01:55:31 Z   29 days  262 attempts
Testing same since   168981  2022-03-29 11:26:18 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Akihiko Odaki <akihiko.odaki@gmail.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Bob Feng <bob.c.feng@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Mara Sophie Grosch <littlefox@lf-net.org>
  Mara Sophie Grosch via groups.io <littlefox=lf-net.org@groups.io>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Ray Ni <ray.ni@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Yi Li <yi1.li@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 1227 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 06:05:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 06:05:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296033.503897 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZRSe-0000Y8-6k; Wed, 30 Mar 2022 06:05:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296033.503897; Wed, 30 Mar 2022 06:05:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZRSe-0000Y1-3S; Wed, 30 Mar 2022 06:05:40 +0000
Received: by outflank-mailman (input) for mailman id 296033;
 Wed, 30 Mar 2022 06:05:39 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZRSd-0000X5-CA; Wed, 30 Mar 2022 06:05:39 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZRSd-00038N-9H; Wed, 30 Mar 2022 06:05:39 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZRSc-0003gd-Pn; Wed, 30 Mar 2022 06:05:38 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZRSc-0006XP-Na; Wed, 30 Mar 2022 06:05:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=Vi2jJnU/OQ7x3rg7XNt9MdOV9NY/I/fGD3VYE1sKrEM=; b=DCYMD2gD24OM+G6VGV5E9gVyXC
	r1S2kIiE43AptfX4polJHqjHJPxRGX+OLE8vypjdScMKadQxuUQzaJOKKXKvzBaogNzUt1t2NDbfV
	zgk3eYXtf/mj3d5nmbJTfw28LCktlJLiBtF0d2TXE7djm21IcEtHgupkEa7FPLLQ0JvQ=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168976-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-5.4 test] 168976: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-5.4:test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm:guest-localmigrate/x10:fail:heisenbug
    linux-5.4:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-5.4:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=2845ff3fd34499603249676495c524a35e795b45
X-Osstest-Versions-That:
    linux=055c4cf7e6da13450016942e5286492b4a224868
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 30 Mar 2022 06:05:38 +0000

flight 168976 linux-5.4 real [real]
flight 169007 linux-5.4 real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168976/
http://logs.test-lab.xenproject.org/osstest/logs/169007/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 18 guest-localmigrate/x10 fail pass in 169007-retest

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168810
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168810
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168810
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168810
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168810
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168810
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168810
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168810
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168810
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168810
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168810
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168810
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                2845ff3fd34499603249676495c524a35e795b45
baseline version:
 linux                055c4cf7e6da13450016942e5286492b4a224868

Last test of basis   168810  2022-03-23 20:10:03 Z    6 days
Testing same since   168925  2022-03-28 07:12:09 Z    1 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Arnd Bergmann <arnd@arndb.de>
  Chuansheng Liu <chuansheng.liu@intel.com>
  David S. Miller <davem@davemloft.net>
  Denis Efremov <denis.e.efremov@oracle.com>
  Eric Dumazet <edumazet@google.com>
  Florian Fainelli <f.fainelli@gmail.com>
  Giacomo Guiduzzi <guiduzzi.giacomo@gmail.com>
  Giovanni Cabiddu <giovanni.cabiddu@intel.com>
  Greg Kroah-Hartman <gregkh@linuxfoundation.org>
  Guenter Roeck <linux@roeck-us.net>
  Herbert Xu <herbert@gondor.apana.org.au>
  huangwenhui <huangwenhuia@uniontech.com>
  Hulk Robot <hulkrobot@huawei.com>
  J. Bruce Fields <bfields@redhat.com>
  Jakub Kicinski <kuba@kernel.org>
  James Bottomley <James.Bottomley@HansenPartnership.com>
  Jarkko Sakkinen <jarkko@kernel.org>
  Jarkko Sakkinen<jarkko@kernel.org>
  Jason Zheng <jasonzheng2004@gmail.com>
  Johannes Berg <johannes.berg@intel.com>
  Jonathan Teh <jonathan.teh@outlook.com>
  Jordy Zomer <jordy@pwning.systems>
  Lars-Peter Clausen <lars@metafoo.de>
  Linus Lüssing <ll@simonwunderlich.de>
  Linux Kernel Functional Testing <lkft@linaro.org>
  Mark Brown <broonie@kernel.org>
  Mark Cilissen <mark@yotsuba.nl>
  Mathias Kretschmer <mathias.kretschmer@fit.fraunhofer.de>
  Maximilian Luz <luzmaximilian@gmail.com>
  Oliver Graute <oliver.graute@kococonnector.com>
  Pablo Neira Ayuso <pablo@netfilter.org>
  Paolo Valente <paolo.valente@linaro.org>
  Paul E. McKenney <paulmck@kernel.org>
  Rafael J. Wysocki <rafael.j.wysocki@intel.com>
  Shuah Khan <skhan@linuxfoundation.org>
  Steffen Klassert <steffen.klassert@secunet.com>
  Stephane Graber <stgraber@ubuntu.com>
  Sudip Mukherjee <sudip.mukherjee@codethink.co.uk>
  Sudip Mukherjee <sudipm.mukherjee@gmail.com>
  Tadeusz Struk <tadeusz.struk@linaro.org>
  Tadeusz Struk <tstruk@gmail.com>
  Takashi Iwai <tiwai@suse.de>
  Tim Murray <timmurray@google.com>
  Trond Myklebust <trond.myklebust@hammerspace.com>
  Trond Myklebust <trondmy@gmail.com>
  Vaibhav Rustagi <vaibhavrustagi@google.com>
  Werner Sembach <wse@tuxedocomputers.com>
  Willem de Bruijn <willemb@google.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        fail    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   055c4cf7e6da..2845ff3fd344  2845ff3fd34499603249676495c524a35e795b45 -> tested/linux-5.4


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 06:30:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 06:30:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296046.503917 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZRqu-0003rX-HU; Wed, 30 Mar 2022 06:30:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296046.503917; Wed, 30 Mar 2022 06:30:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZRqu-0003rQ-E2; Wed, 30 Mar 2022 06:30:44 +0000
Received: by outflank-mailman (input) for mailman id 296046;
 Wed, 30 Mar 2022 06:30:43 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=b505=UJ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZRqt-0003rK-0I
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 06:30:43 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id eb15617d-aff2-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 08:30:40 +0200 (CEST)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04lp2053.outbound.protection.outlook.com [104.47.13.53]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-41-YAHb-VlCMwihjUxX9BgwqQ-1; Wed, 30 Mar 2022 08:30:32 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by DB9PR04MB8171.eurprd04.prod.outlook.com (2603:10a6:10:24f::19)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.19; Wed, 30 Mar
 2022 06:30:30 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.019; Wed, 30 Mar 2022
 06:30:29 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: eb15617d-aff2-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648621841;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=ax7puGnbSWhT7PBEQveuXtJnn83phFnNpX4As+Gvgqk=;
	b=PszyfJ9vVuvAxA3Wwu/DJAEeAYv6Q2+HQR3Q2XOLCC17+R99fvyqvyol9QWk4rJrtcmKza
	AkZAm4pSsOaiviRSu4JosWJWNC2gssb+zIexgtwWPdumf3ao0vOkhkpQbv1dIzOcEOsi6K
	iOLyPIQrGQqSJ9/NO2vKO2fP0z6t1eg=
X-MC-Unique: YAHb-VlCMwihjUxX9BgwqQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=d50wiogdYcWiWG5TCYS2P1z2xLExze7XELxrMFNkHfDpn01Y2s810J9nwIbxfg4f2ziApddCsg2CyrMv3vwa1L+Il8xtP1NoBsetW6Dl9BBQS6ztmqqLbLjrWsASU89UlOYQDCWWcxOlPe/hUtsr68P2MEmTOwMniz+y5hYpQjpCnicy5aZ9QSDxU9Fyia90/Rjm2rMQQhq1K4wQ73LbdBlWbSpYokP17zLooCQAr42UZpeYhKBwaIr1j7o/WUTu5HyBWr+zu1IZ1WYW6iuBklVGi9/dfv/B+yKH1crn1il6tzUTz6Hu1d7iHnH50TaXsmvHBC3cuTzvErlC0OT5dQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ax7puGnbSWhT7PBEQveuXtJnn83phFnNpX4As+Gvgqk=;
 b=jJk7M/c8+yGUTmSSSkdCZ37oek8UvAlvDR43ye4n77xhp0SoALTJ5GYFotL6jfkECcEo6nWFSLX7BmHBQj7bPj7V0tfSze+2W+mqdJGKzTotMQQfrauh6NFN7M+4clreOHbnYG0wxC6qoewfhns2P9rI/kzx3Oyjp2F5+9lsjmAvcIn7XMpsv22Fub4t8pThsu4faLxL9pDFmRLx9j3nt6jjH5Mg3r+ye41hCoGhkV6QJRpM+euPth21ccHNvwOwzk2Z5VxbfmWfD2YzhMx59OGxA8ndcR+E/BB6af8LW3OQSeH8m3SdnvxrSBP5u7rHYy9E0ajmbBeZRwIssgJLxQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <e711e8c8-5e5d-7443-fbc8-368ccdde533b@suse.com>
Date: Wed, 30 Mar 2022 08:30:27 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [RFC PATCH 1/1] xsm: allows system domains to allocate evtchn
Content-Language: en-US
To: "Daniel P. Smith" <dpsmith@apertussolutions.com>
Cc: scott.davis@starlab.io, Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Daniel De Graaf <dgdegra@tycho.nsa.gov>, xen-devel@lists.xenproject.org,
 Jason Andryuk <jandryuk@gmail.com>
References: <20220328203622.30961-1-dpsmith@apertussolutions.com>
 <20220328203622.30961-2-dpsmith@apertussolutions.com>
 <7935e60e-34b1-76be-e5de-56e60f173438@suse.com>
 <a991c32d-4e45-f015-3d99-8552199e8d45@apertussolutions.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <a991c32d-4e45-f015-3d99-8552199e8d45@apertussolutions.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8P251CA0007.EURP251.PROD.OUTLOOK.COM
 (2603:10a6:20b:2f2::7) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 08c70f65-b1c5-479f-31f7-08da1216c903
X-MS-TrafficTypeDiagnostic: DB9PR04MB8171:EE_
X-Microsoft-Antispam-PRVS:
	<DB9PR04MB81710325FB289676D5141DC7B31F9@DB9PR04MB8171.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	oS30O65Ccq5R9JJf5hN9o9t7ttfq3ksn7sWvRulcLksmx/ctE5NrsCXosdFFMnWJMp87DL1RXJb9moBlfLCegXdH7rYpVS5J9qAB/ZqCopRoj4xj6QWg64nMtu2GA+//ExJCXjZMctAsbpbm3W+e/0HMTVK88c0T8XpOLmxSL9LxBfY0E1x8gjSfG8pFn0y6Hp5zdM/kWx6Jv6Oh8d0Om7M56RLzXWg1vQB0rCQfEQcKueuAzO8Kf+p9lEY1qbjzhd+RnDiluruCW6OoLmK5J/MvIV/Ka2m6+QQP+QAAoLSBPe9VQNm7YQfAFAyDEnnXD7IRn8yWegSYRsm+/YRtQt42Ozj1JhNA8QMELwfx7ODPWMeGbnF7enbk9yOv+LJKZyK4ltTKnq9r13E0J6vgATuiMCuU2DmUx80LL43c6U27+cj9Y/QKC1QQQIE4KFaxo6iDbO0jPwIjTwBNzjOKzf3UU/6hqs/g9yC1TKmo4QVEhLcUBW1oQAfurgMWR6LN0o7tJ9s9mSZ7B9kvAC44cmLMe/aD6K3+FaadmAnbVF2fESsilrJtsr9bgmwvePWt0xvagL47jPK1TEIMpyIAqwssvRuGBZkkId3bEbYjfz4H7tf7B0ommaRufenMVMs+QGLIKnF4kE8IPMOz76ag+Ug8PvbmBJbsgAupVujeL3UuPoxB+oE1XzJ4QEOjFBERSPAR1oMow1fgachv0oZ/Nk09pQL0/k7sVAJZooghB9V6i3w58o+R+/79te8Bcguq
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6512007)(66556008)(31686004)(6486002)(66946007)(66476007)(316002)(2906002)(4326008)(8676002)(36756003)(83380400001)(508600001)(186003)(26005)(7416002)(8936002)(2616005)(31696002)(86362001)(38100700002)(6916009)(54906003)(53546011)(5660300002)(6506007)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?RmI4eUo5OWJ6eUJrZUNDblBNdVAwcWxZaVpMbldsWGdDcjNueVhvSlhlNU5s?=
 =?utf-8?B?elZwOTNxaHFJNzh3REVyd01UN0FqWnE1VDFhc2hCc214Y3d5LzZQSFJqSGJz?=
 =?utf-8?B?MDdicUJ3ZHJUSDFzOEgzeGp5ejdHSXcvK1JCckRGS21TRVErWExjWTU0Q1FM?=
 =?utf-8?B?enJwbVBrb1QxdDlFMXJBck1wQThHYWg3SVBJK282Mmh0TGxvQ09TVUQ1TjlU?=
 =?utf-8?B?M1gyNm1zRFpvR0ZLWCt1M3BRL1pRcVphNTUyeWZzMzlNdk9iZlMyNkZveDRM?=
 =?utf-8?B?SEsxbE94TFhTWFp4WjFyRExjSDZxd0MyTW1XeU5iT3BBS3dUbm43UHh3dWJw?=
 =?utf-8?B?THg3V0Ewd21NTUFIdExlWnQ0L3pWRmZEL1NiOE9nL1hLQ3dqdmxURmdPdWFs?=
 =?utf-8?B?ejZjMXg1WUtRL0psRWVnZkhPaWRST1lLNEltQWFtSzJYTTkyNVN6a2FZbG5Y?=
 =?utf-8?B?cU5pTTdqcGdGQTdYWnptVGxDWEFMU2pCalIxbjRwcENmOGlEOE8yY3pxV1di?=
 =?utf-8?B?c21hOU1IZCtWd1BhWnBUbnJzVHozZTJUV3phaWdISWZ2MjRndVRnRWhZUW5P?=
 =?utf-8?B?Lzg3akVuMDJ2WTROTHFjUytweTBIVzFJSHFEWC9CdkgvK3FkcWRnNzQ0enV3?=
 =?utf-8?B?REJXM0dBS2FMQWs3Tk1CQy9DbHZWb3Z6UGtaQVFNTXBDQ1RZZlhFNXpKaC9l?=
 =?utf-8?B?ZnQ0cWZTcVBXSDNiR21hTkdkTmYrNkFaV1NaTFY5S0VoeWRTUDI4dTJZRHpX?=
 =?utf-8?B?c0hJZ2RWVlVXenNVb3lEalBacGEvdEdmYnpzTlAya2tvaXltakQwbzkybnFE?=
 =?utf-8?B?MmtqcDFMNEdvbDE1eFB6VFFoOVRBT2tCd2tQczVHVVc0ZU1Mc21TWmRyVVNj?=
 =?utf-8?B?OTJvWmRWRFlPOWtRVG8wTXJ0YmRITmRJMUhybXJEUlh6NHZSWjYremcrME12?=
 =?utf-8?B?eWVYbVJwdGU1M3RySTZCSzRVdDZOWG5xbUlVSSt5Vi8zSDlRdXVJMW4vbFIw?=
 =?utf-8?B?N1pMSWJqYXptejB5K0ZUaFBOZzhEeGlTZmVxeUxIUDJ1NnN4elhpYklBTkZ0?=
 =?utf-8?B?clJVNVp6YW5UMzFyUXNEM0lRZlp6dXJyaGxDaFNIUmxZRmxSNEFBa3F6b2dx?=
 =?utf-8?B?bTBNWDE5aHFjQkt5R09id1ZhdWNaVnBKMkYwYXNLQzNnYkJSNGtXRDM0c0s0?=
 =?utf-8?B?Ui9NVm5qbFFRTlYxNEUwQ3JVNmkyZW9qRjlncXVJLzMzVGtvQlNTOStwbmJ2?=
 =?utf-8?B?ZUprRThlQ25KWEF1ZnF1UVpQanR5OElxSWV4d2ZyNmVpZFFwOGJIcVlEczFu?=
 =?utf-8?B?ZGxrallvOTc5UWtMYVcvVS9JWlRrZThuTVBVdnFQNmVjaU1vQVBuTTRvRlB4?=
 =?utf-8?B?c0pCWEZ4ZkRBb3oyZlREY3hkM0hlZHNPT25id0wvdStMK0FRdDJ4ZTFiODBi?=
 =?utf-8?B?MHZiOU5JRzd2WDVaWHFTQ2Y3SjlOSzA4aTd4eWZrY05kcjZrMFFidEJ1Nldr?=
 =?utf-8?B?Um1xQmQzRFRDUFgzbGdMWm5RbnNMeXRuM2t1R2tPcE9sY0tnSUw0NjAwQ3pq?=
 =?utf-8?B?bWlFZ0xadFhERCtRNlFvV3lPR3puNnFuUlFMcWNvSDBjQ1BTZzhuaUsycGlP?=
 =?utf-8?B?Wng3Y0svVFhQZlJjeStvNXJ4M2h6OFFub09SbTdHdXg0MjRYMlZ4ZXJEQ3RB?=
 =?utf-8?B?bmRDblEycjRhWFU4bFdPam9QbDY5NW5UUWs3MkpDck9IWVJaeEx4UHRVc1kx?=
 =?utf-8?B?T29UZmdJMVZmdDFBeDVIUGNFQWlXNTVkRWdwOE1aS0FTR1JOcE5HcjlSaWE1?=
 =?utf-8?B?eTd6Z2dwN0xGbTNXdHNuTjJwTUFoM1dFcVJjOE1rMWFPTno3ejlSVjJ5TWNP?=
 =?utf-8?B?aGF0dTF0OGs5RjlCMnhtbEd0Ty9kaERhQU0wMFBWYmFDTlFKbC9zY3dtbmcv?=
 =?utf-8?B?RVM4MnNLdC81bUdjMThYMXNvY0M1ZVhzMWsxYURrNUJHZEtEV2pJU2lxQjJT?=
 =?utf-8?B?dzk3eWUrTG9ZazJXWFZZVTcvTkJJOUdvaW1adDhjWWNOT0hhTFY1dWJIcm9s?=
 =?utf-8?B?MlNmZmpMNURVZ2hjbzNwajNJZzFBNmIwdGtpOE5TZWpGQUlhNUJJN1dRSVdH?=
 =?utf-8?B?ZlluUmVOdUUwOVMyUzZVc1BGcW85YVVZNHZVUDIxcVQ3MzU5M3hwWFlYZ0ww?=
 =?utf-8?B?Q21rdUtwTGptdnVmK2hEQUJlWWE1R1JIejJKVmpPcGlHQ09uV1psdnpLcWd2?=
 =?utf-8?B?dWY0WFRlZHpNWEJVUGV5R3pRRVYrUUlUVVZPVDQyVGVNbFVPZDRuVndTQmpX?=
 =?utf-8?B?UWpRNkpIWFVnclZyUC9TNmxlT0YzR0IyUVJ4K0djRm9MRytubml4QT09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 08c70f65-b1c5-479f-31f7-08da1216c903
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 06:30:29.9074
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: n2G+WbSSEdspvMSxRXSMgZmsv8vBUKd5zFdVYTmcUUrZP2rbD2PX7lphFW143MzHLsJoKukKQXZwCFPWHqOE0Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR04MB8171

On 29.03.2022 20:57, Daniel P. Smith wrote:
> On 3/29/22 02:43, Jan Beulich wrote:
>> On 28.03.2022 22:36, Daniel P. Smith wrote:
>>> During domain construction under dom0less and hyperlaunch it is necessary to
>>> allocate at least the event channel for xenstore and potentially the event
>>> channel for the core console. When dom0less and hyperlaunch are doing their
>>> construction logic they are executing under the idle domain context. The idle
>>> domain is not a privileged domain, it is not the target domain, and as a result
>>> under the current default XSM policy is not allowed to allocate the event
>>> channel.
>>
>> I appreciate the change is only needed there right now, but it feels
>> inconsistent. _If_ it is to remain that way, at least a comment needs
>> to be put in xsm_evtchn_unbound() making clear why this is a special
>> case, and hence clarifying to people what the approximate conditions
>> are to have such also put elsewhere. But imo it would be better to
>> make the adjustment right in xsm_default_action(), without touching
>> event_channel.c at all. Iirc altering xsm_default_action() was
>> discussed before, but I don't recall particular reasons speaking
>> against that approach.
> 
> By inconsistent, I take it you mean this is first place within an XSM
> hook where an access decision is based on the current domain being a
> system domain?

Well - yes and no. Even if further instances appeared, overall state
would still end up inconsistent.

> I do agree and would add a comment to the change in the
> XSM hook in a non-RFC version of the patch.
> 
> As to moving the check down into xsm_default_action(), the concern I
> have with doing so is that this would then make every XSM check succeed
> if `current->domain` is a system domain. Doing so would require a review
> of every function which has an XSM hoook to evaluate every invocation of
> those functions that,
>   1. is there ever a time when current->domain may be a system domain
>   2. if so,
>     a. is the invocation on behalf of the system domain
>     b. or is the invocation on behalf of a non-system domain
> 
> If there is any instance of 2b, then an inadvertent privilege escalation
> can occur on that path. For evtchn_alloc_unbound() I verified the only
> place, besides the new hyperlaunch calls, it is invoked is in the evtchn
> hypercall handler, where current should be pointing at the domain that
> made the hypercall.

Such an audit shouldn't be overly difficult, as the majority of XSM hook
invocations sit clearly visible on hypercall paths, where it is clear
that current->domain is not a system one.

>>> This patch only addresses the event channel situation by adjust the default XSM
>>> policy for xsm_evtchn_unbound to explicitly allow system domains to be able to
>>> make the allocation call.
>>
>> Indeed I'm having trouble seeing how your change would work for SILO
>> mode, albeit Stefano having tested this would make me assume he did
>> so in SILO mode, as that's the default on Arm iirc. Afaict
>> silo_mode_dom_check() should return false in the described situation.
> 
> Correct, this patch only addressed the default policy. If an equivalent
> change for SILO is desired, then it would be placed in
> silo_evtchn_unbound() and not in silo_mode_dom_check() for the same
> reasons I would be hesitant to place it in xsm_default_action().
> 
>> Similarly I don't see how things would work transparently with a
>> Flask policy in place. Regardless of you mentioning the restriction,
>> I think this wants resolving before the patch can go in.
> 
> To enable the equivalent in flask would require no hypervisor code
> changes. Instead that would be handled by adding the necessary rules to
> the appropriate flask policy file(s).

Of course this can be dealt with by adjusting policy file(s), but until
people do so they'd end up with a perceived regression and/or unexplained
difference in behavior from running in dummy (or SILO, once also taken
care of) mode.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 06:47:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 06:47:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296052.503931 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZS6q-0005Tn-Vx; Wed, 30 Mar 2022 06:47:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296052.503931; Wed, 30 Mar 2022 06:47:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZS6q-0005Tg-Sz; Wed, 30 Mar 2022 06:47:12 +0000
Received: by outflank-mailman (input) for mailman id 296052;
 Wed, 30 Mar 2022 06:47:11 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=b505=UJ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZS6p-0005Ta-Dl
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 06:47:11 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 385de07b-aff5-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 08:47:09 +0200 (CEST)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2105.outbound.protection.outlook.com [104.47.18.105]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-41-1j0P494_NIS9vdIKgINR6A-1; Wed, 30 Mar 2022 08:47:03 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by PAXPR04MB8349.eurprd04.prod.outlook.com (2603:10a6:102:1bd::9)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.16; Wed, 30 Mar
 2022 06:47:01 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.019; Wed, 30 Mar 2022
 06:47:01 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 385de07b-aff5-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648622830;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=YmTMmwd00tZOgY9P/GKREsDxPKBNgOei6ZTa1vvjE94=;
	b=M96HZeeEeUuSvbonRptboWDP6FgPNNF3AMJKOFKfMjOgi4eanZFFVZqUYNFYl9QXNHU+Bx
	sgKpoYwn0Q4Yj3t8I4hift4tcsabhnzvtZ/l9rdCwRK3O2NLa5xc1p0oDX+zWQIC0e7UJn
	4XIjZdT0lsq9nkaG6Srb+bYtEfibaWw=
X-MC-Unique: 1j0P494_NIS9vdIKgINR6A-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Dsoi6STj1NVlhIm/F5yl0CEjWXQGyUnc6OflTA0GHweLtMezsdCXUrGVUvfPBiy7D1rgSqKmWNZn1QF7UOnykER7h6FrzpqFW3ZsWfCjU4eLgM41Zj67AJ5u26nNsniQRyaemOHgi6FM12NG4xk7Ik0OM9mgi9AjmKBusVbsAOaAnWeTlkuxwSNgabpMPtxr21N3Eycc4XTdPs8RBOzB7EtXIKLDgGFOF/Gb70zQN4RgCzHy2yFBIynGOakI4LeJGODprEJN6pmv2Rgqav3XqnMnCZmW5YySNpm73yAtW9eXB2OWmu3ScLgzuc1tGZ4pbVw8G+lVxwEeFSgQQDddsQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=YmTMmwd00tZOgY9P/GKREsDxPKBNgOei6ZTa1vvjE94=;
 b=HMRm+if7EgQATILeEOzaTif+xtuhMieGRi+8bpbXuPAdVPj91eLEgLoA5AFaa2P/AEFwtoLswxB2cNKLDoIWEe/gb40rO69wsRJzEYfz652KJajdrL6yTToyjZDLAOI0h0C1OZK/tI8SEaNgILWXaeffs4OGKHMa9S2WQx1GIIuzQFLqSx2fWVgYT446G7dt4Abc7nMMndG69CCB36BlJnZcEdiQowGuG2EiEM8A8ti5vIqMV/kIVurKb+IzTmHhE+7kFQGjLrlzrY0kjVBKqxhfuCCFM9BeIKRcJM8tvR+iOTc+K1qrBdEQU9ffUudr6oUU06xviRUDdOpOLl8nng==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <b20fd202-0fd2-ad8a-58dc-1ca83b8da444@suse.com>
Date: Wed, 30 Mar 2022 08:46:58 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2 1/3] x86/mem_sharing: option to enforce fork starting
 with empty p2m
Content-Language: en-US
To: Tamas K Lengyel <tamas@tklengyel.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>, Wei Liu <wl@xen.org>,
 Anthony PERARD <anthony.perard@citrix.com>, Juergen Gross <JGross@suse.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>,
 Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian <kevin.tian@intel.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 xen-devel@lists.xenproject.org
References: <ab6bb88e90e5649c60e08a1680b3a2390441031b.1648561546.git.tamas.lengyel@intel.com>
 <04459197-458b-8d10-2692-981495c0e243@suse.com>
 <CABfawhnKL_7iBiOAHLjtKhH6sCDRfrLcNS_kr3YSLr=XdQdUGg@mail.gmail.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <CABfawhnKL_7iBiOAHLjtKhH6sCDRfrLcNS_kr3YSLr=XdQdUGg@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8P250CA0007.EURP250.PROD.OUTLOOK.COM
 (2603:10a6:20b:330::12) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 790c49bb-74cf-4d8b-33b7-08da121917c8
X-MS-TrafficTypeDiagnostic: PAXPR04MB8349:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB83496DBF78A395E633BAFE6EB31F9@PAXPR04MB8349.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(36756003)(2616005)(6486002)(316002)(38100700002)(5660300002)(7416002)(8936002)(83380400001)(26005)(31686004)(186003)(6512007)(6666004)(508600001)(86362001)(53546011)(31696002)(6506007)(2906002)(54906003)(66476007)(66556008)(66946007)(6916009)(4326008)(8676002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?VmhQZEQxa0FmbmFvbSs4d25lZ3RxelkwSkxuSzRhUVFmL0cvZHNhSjZOSWdU?=
 =?utf-8?B?SHhiY3BpK1UwN3pGUnZPSTVsTUNUWGtFRTBtd1Y3bG8rRlJUc2pIem5SQTR5?=
 =?utf-8?B?V1FGemhQWGRSVjhXVW9zRDVJenl0YzQ3R05hb3ZwaDEweU9weklaaU1QQkk0?=
 =?utf-8?B?OUtoZzNpclVyNCtUQVgxR1gveHhESFdzQ2xnM1VKM1dBK0pNSmtKVTRLeGlW?=
 =?utf-8?B?VDhMYXlQeGo1TlNLQzUrZXBYVkpFdWFOUE1CNXRVL0dxdGVkemFMV3hmUytV?=
 =?utf-8?B?aHdmT0NHa0ZWK2hvKzFsSGZ4MmFPQ1ViY3J1S24weTNUUWhYYy9mUHhNeERw?=
 =?utf-8?B?Uk9QOGExQ1FmSk85aXZIdTdKNG5NdmNEMHR5VVUwdTVYMjVLQUt5WHl1dGsx?=
 =?utf-8?B?NVRIcnBXUVY4a2t1U0YzWm5Nb1RhdXh4TTR2L0ZGaUNmMHJuRHdXczZHN3JJ?=
 =?utf-8?B?ZmlXMWgyMDlTaVBDVnF5STh3NEtRNkN3UXMxZ0w5VG15bHV0VmpMSU96ZEMz?=
 =?utf-8?B?cFoxTnlSQ29sczZ3V2IwUm42SVJzS2dNZUlpZVpZT0s2VW1XMWtnZDVwczEv?=
 =?utf-8?B?a05rYTlxUjIvcnBNMGlRbUIzbUtqUnY4NzNKanNaSXR1REZxMzVtRVJqSGR1?=
 =?utf-8?B?eUNLS3FtMzY0VGRBRDZLdXdBVmZFYzdjTzl3NFhIazZ3TVNNakNVaW9NTUpX?=
 =?utf-8?B?MEVQMVRtR2lJMWpDUzB1bjhBYlh5RTNlL3FmQ0Y5Q1BSYXB0djgxZ3BmaytJ?=
 =?utf-8?B?V1dXZHR2WXZNVVBQbHhxOXdoaUpFbnlUN0EzVlRQUVJEUnZGcEljNWpFOXph?=
 =?utf-8?B?MFp4bkRGUTlmZk9Kb2o3cTNlTDI3NGxmeTNiRDN2aXN3MGdvWnZ2RVVEeW1n?=
 =?utf-8?B?QndTZnkrelE4Nmo5R09ldVZFU2F3ME9CNUNwTk04UXRSNlpudjlpY0F4bjBG?=
 =?utf-8?B?OGxIc3V5NWhpaklqY3lQY1Z2VUN5N3djVytBSWU4Rm1ab3ltZTEyRjV3RTNa?=
 =?utf-8?B?aXQyUm9seEZhcERqRDhETm5hUW1UakhPVzhodTEzRGNOMERkeUFhTWpPTWs0?=
 =?utf-8?B?QmxMZXhvdDNiR2xWSGFac0syUkh4RU9ZaFNKWlczUmVSS3h4VmYxVDN4TkpX?=
 =?utf-8?B?N29ndlk0d3F5RkdVOUxBVlNWSzNPaWR1c1ZqMkFDaUdNWERpREk0ZlpxeTBV?=
 =?utf-8?B?WFZiWHpBZERrZ3lLN2pTNjA0RTRKaVNhTjVsUFZSbHgvM3I4NHR0L2NHeWVI?=
 =?utf-8?B?cENvK0xkemNGQkFqbGNRUWlkeCszbXR5UlRmbXJxYklpK1lsNjREOGJWUXc1?=
 =?utf-8?B?RGNhYXRlRmEraW5qSS9uajN2eUNlOG1qYWMvQXg1cTYzNSsxN2p2VUxDK3ZD?=
 =?utf-8?B?VHg4b1FSR2VqRngzeVppYW9GUG44ZnN2RU5YSzRXekJvcjJwaElOYTZ2OUhz?=
 =?utf-8?B?U3dkYlkvYmtCS1pFTTg1V3Q3QWVLanJPOUQxN3lMcndrZ1JrSkFYMm0xZWZK?=
 =?utf-8?B?Y3FISmc2SENRcE02Ti9yS01TZzlwa3FWNFJKNDlmSDJ6S1NKOE1hSU5sK25M?=
 =?utf-8?B?ZnEwbURCNXloMWd5Nm5MMlF4Z0E3bWtxdHl6ZWU5TFFXdzhlelBUVnppYkFn?=
 =?utf-8?B?amhSMitBTERhVCtuTC9GaThHQldiTjd3eGRDUVJKN1RoTHN3YlYwbEZUdVRM?=
 =?utf-8?B?a2txVTBzRVNqUDlYTWErSUZnZzBBYjFGMmdTN002bmVsTEQvZnZvbUYzeU51?=
 =?utf-8?B?Wkk0dkl1MXY5SHQ4bW9BMFd3cGpRRjJtL1dEWXdyWW9QdWt0RmNhYVQwSVgw?=
 =?utf-8?B?VU9mdFo2UjIyNURzYzUwaEN5QzhqVVdPbG1OMk90N0psbUtxa2JqcTRBUUhW?=
 =?utf-8?B?L3plYjgvNWF6SERiYzkvNFFBS0R1bG1qL1NXaXRjbmQxSVdDSk54dUd4OGNF?=
 =?utf-8?B?VGRnaUlPZEVrS3p2YlFMc1ZqZldjQWdvbm1PcHRkTjBQMkZxKy9xTDV3d2sx?=
 =?utf-8?B?R1VEWU5La3pUc3RHTXF1Tkt3VjNUM0lHaW1FcDhjTkZyNngxcXFneHZ5aU5F?=
 =?utf-8?B?RnZha29RcUhGMysrL1ZMY25nS0lWQzQzR21VRWxFWlFTK1BEMitRS2x0RXpy?=
 =?utf-8?B?c1hKb0RUVDRVTXFkN2VBQmlWUkRjelFDb1l2RXRDL1B3UHpWei8wc3pDb2xl?=
 =?utf-8?B?MWt6Z2lmZEpjMDNpUXRuYlBoQys5NnV0UWdUeklWQ2Q0ajFMUGlCYWMrbHVT?=
 =?utf-8?B?Qm5CbzZXNXZIa2Z3VFhrNTVNd1duSHo5eDhROWJIZXlqRUp0STFjZS9rb0k1?=
 =?utf-8?B?Z1VaZ1JwdkNXL0QrYmQyTFk0R01INmI3R1pyK2RzU2x5VlN1Yi9oZz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 790c49bb-74cf-4d8b-33b7-08da121917c8
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 06:47:01.0699
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: t7+DpVTyg44fyO4C+Koma0oeUsat1Upe9jqRX14IPnM7UhfItUrLw8gaArBsZiUN2ud/aGk1aSUG3mdFBE9tFA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB8349

On 29.03.2022 18:10, Tamas K Lengyel wrote:
> On Tue, Mar 29, 2022 at 11:42 AM Jan Beulich <jbeulich@suse.com> wrote:
>>
>> On 29.03.2022 16:03, Tamas K Lengyel wrote:
>>> Add option to the fork memop to enforce a start with an empty p2m.
>>> Pre-populating special pages to the fork tend to be necessary only when setting
>>> up forks to be fully functional with a toolstack or if the fork makes use of
>>> them in some way. For short-lived forks these pages are optional and starting
>>> with an empty p2m has advantages both in terms of reset performance as well as
>>> easier reasoning about the state of the fork after creation.
>>
>> I'm afraid I don't consider this enough of an explanation: Why would these
>> page be optional? Where does the apriori knowledge come from that the guest
>> wouldn't manage to access the vCPU info pages or the APIC access one?
> 
> By knowing what code you are fuzzing. The code you are fuzzing is
> clearly marked by harnesses and that's the only code you execute while
> fuzzing. If you know the code doesn't use them, no need to map them
> in. They haven't been needed in any of the fuzzing setups we had so
> far so I'm planning to be this the default when fuzzing.

But isn't it the very nature of what you do fuzzing for that unexpected
code paths may be taken? By not having in place what is expected to be
there, yet more unexpected behavior might then result.

Plus - how do you bound how far the guest executes in a single attempt?

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 07:32:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 07:32:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296058.503942 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZSob-00029z-H7; Wed, 30 Mar 2022 07:32:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296058.503942; Wed, 30 Mar 2022 07:32:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZSob-00029s-Da; Wed, 30 Mar 2022 07:32:25 +0000
Received: by outflank-mailman (input) for mailman id 296058;
 Wed, 30 Mar 2022 07:32:24 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=b505=UJ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZSoa-00029m-6t
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 07:32:24 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 8885e1b2-affb-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 09:32:22 +0200 (CEST)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2113.outbound.protection.outlook.com [104.47.17.113]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-3-a-H0i90RPtCwH-LECqHAbg-1; Wed, 30 Mar 2022 09:32:19 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by DB7PR04MB4411.eurprd04.prod.outlook.com (2603:10a6:5:32::26) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.23; Wed, 30 Mar
 2022 07:32:17 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.019; Wed, 30 Mar 2022
 07:32:17 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8885e1b2-affb-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648625540;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=NqvfZqfJm8N+O8e5n2Eq0kzoj3jiLBY34rMIGTB9nGE=;
	b=Qe8wac+l3OKloKx3IYZnSZdVUiNAa5d6XaEBFr82z0/c0d1FnEsYQV5QrTSDgnlkrx/LfU
	fe+LRfWGqW8fWN526oVYNutMqLfEhPJN2/QfeJoxjuxeYFhrxHp/ClIOirSe7KCJjYg7QV
	MdqmbZWj/xr05iFaYDjAqPgrDN835Ds=
X-MC-Unique: a-H0i90RPtCwH-LECqHAbg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=hvGbhW4LAby/3uM6YakYqtTQRhusTURhcsOsu1Vlge5l5nzLqBYJ1l613whAfpH4dMoHMkxkjgh2YcQOWB94zsHrvKU1MiEpEv2wsSOhZtCVvfs1MZGKtFwXk/takjI8nzS/tofoARODgXUs41AuXhKeXJrfi/BRcUPXQPStV/LHdmqmqcmOr4w+r0vRq56a7kxJDQB7nHqbKN0Uk3uc7SLIeyq5lLGyde4zJGArNJwMgSF2TpKXBcGueHxm7etbEM0JZI3jWwRYoWduQ3e9kQX6VTgiaXVM5lVMkACtQFdThCJ4RPFqxqHfuEyjGeyu1wWOVUcF8P1OwodB2rtJtQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=NqvfZqfJm8N+O8e5n2Eq0kzoj3jiLBY34rMIGTB9nGE=;
 b=KsLksHfNmNj+fzCKjWtIvyq3re2LP/i09jNGYgw0qqY+Dpd9QOx2Y/D9EP6rPhowHeoytIxsL9iEFLWWvGsmA3E3rJG2JL5mvcQ49DW6IjvlUzrbkL1J20i34boIdMVN7vXl5wWnHGCEDWD4B0aws1q9PR7icdgg+59NOPY9WgAj8fwPlOqmnRj/F7YC0d49n8H96ZJJyk1fZsx17Qmi28UGYcqKAGvCVycTx7Zisz/WN3PqCP3J9mASNqlvk6tLAKMOphZZI4flJ6Rm2KxPG3dkyY/uJhMqXZT/acHWCKtjpJxCuZT9pjQxznvQODUrrn+JUeLLbomHVNQwI0gq3g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <de5832ab-3fd6-f58b-4a0d-fe22cba9d786@suse.com>
Date: Wed, 30 Mar 2022 09:32:15 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [xen-4.15-testing test] 168970: regressions - FAIL
Content-Language: en-US
To: Andrew Cooper <andrew.cooper3@citrix.com>
References: <osstest-168970-mainreport@xen.org>
Cc: osstest service owner <osstest-admin@xenproject.org>,
 xen-devel@lists.xenproject.org
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <osstest-168970-mainreport@xen.org>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P192CA0096.EURP192.PROD.OUTLOOK.COM
 (2603:10a6:209:8d::37) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 1351a6f7-0adb-490b-1770-08da121f6ace
X-MS-TrafficTypeDiagnostic: DB7PR04MB4411:EE_
X-Microsoft-Antispam-PRVS:
	<DB7PR04MB44114C624A3520A54E2B825CB31F9@DB7PR04MB4411.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	T9ycuVvZP1tzxG7X10iPwS9Yzmoy7x7kAr3+e8SqRJYEzF9wsizQ5S0mzwajl7yu/la4Z3kCl+g0JroowQtXpa8vfjNVcUv8siN8blt09Zvi4VD++A/YIe8wARKCE0CjrKOnI0a3b9H+G8WoRVGckMQBiZuADCvJWhWq2xLiry8iCcPrL3YkFrDyvem6/FpfE8h1dORxuKknmPujrKwBzLYxHAVMARfg0QQZdQEhsk1fKeh5ZYMI0strYXRXuHzLY16lBC0+esRphTBUmPHtX9U5PyuGVhUmAdzrLQmSx2Bkps7TzWRuz6dt9p3huoppig22S/E2Ry46i045MSLu+E3g9PBWMUjJvlVhu3rEwTOsHaqCBSzW0hIFVBKGmX75IsqF5uul3HGgWD7Jk0oJ+NuqbZZUX1wwgX4VJSEEBByiIDwvbmarzpSNNLGq2eWkCXDBR38GbZC6dyagMC8bIGU4lc3otW6DS2NwSPZ9EuqOpGoGl1Od4Jfri/OXv0nILDllRmCOW/FoONyuP35ci8u7AzuHskMXkRB8A0a7uZY+y7rLo50AkbjmIaxR1rgr5a7LSg/ZV3JCknzHjCHzMbF2MB9XPf9al7NPtcOpxRUpZCTsESVG9MWUjU97iRMt/8SmsH0yiNHhAnI+zt35wmFruKSNRYGzO54v58C5PF463k3CRn5RzPqoK6qwxgeVbC32TXmxB3+rtwyens9eaEUXgQu1s8a1+R6qO5RVzXToWB40icqb8SAjJvv9WcxnhYfhYa/K4dF32zuuZ58lEPObPDWoJ+3yijS0GmmEoRDiD/+jw5ju/lnuFOPwaE+3
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(86362001)(31696002)(8936002)(31686004)(2906002)(8676002)(6486002)(66556008)(66946007)(66476007)(5660300002)(6916009)(4326008)(966005)(316002)(6512007)(26005)(186003)(508600001)(2616005)(53546011)(83380400001)(38100700002)(6506007)(36756003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?N3Zod3AvUnhPdkhVeDIzVGZVYUZYUlNpVEJXaEQwNUpSSWF4NmdvMWpodFpO?=
 =?utf-8?B?c1pwaWk2UnI1MWZIY1Fldk5qQ2JucXZqRWpKZERSZTNLKytBWnZqVzYrL2R4?=
 =?utf-8?B?NGh1TjB2a2ZQRVhYZE4reUF3QnBLS3pZRGZ6NzlMM0UxSkJyK2ZBT0xJQk5t?=
 =?utf-8?B?WjlGM252UGJIMXRWY21ZQ21uR3JmdkZmSUsyY0tBYnhSVGZUMlBDUkE4Mll2?=
 =?utf-8?B?d1lRdUtNS20zbjUvb0hZMWIrMnRnZzNqSkExbTZZalFIekVGK291Uk5hdElS?=
 =?utf-8?B?MTBQQXptL2oxYU5hTlVETnQzdCtPNWFiYlhkV21rOG9TM0llOFBiUVREeWd5?=
 =?utf-8?B?SnFmY3hmREhLOHo0T3p6MnhJajZZamFIMHBPU1UrbC9xN2hJcTBCajl4bVkr?=
 =?utf-8?B?TGJOOWlGa2JZR0VlNW50REdqWlZNb05rZmxSbUlwbXNZbWFUcUxZVm5pMk5Z?=
 =?utf-8?B?ZXRsRlhEM1grSVNSK2xDWUpSaStzeEp0Z3h4b3k3bm1WRXArdU8wVVNIVzZO?=
 =?utf-8?B?NU1sVHR5UWE5RnRzenltWlRDYk9YYWhNOGxuY2JFbHBhdGllZ3JVVFo5clZm?=
 =?utf-8?B?NUNxL0l4WFhjVjMxb0hCWklDZG0wWXgvZko4K09rOUcralVlb3E4ZkZhVFJ6?=
 =?utf-8?B?cmZ6Wkd4U0wySThRWUR3eVd3d2wxdW5pOHRJQnRmZmJnOVpGS3ZtVGpkbmZl?=
 =?utf-8?B?aERsdFRPZE01NkVBa1M2MkVuRXcxRE15QWFhQytJRVowM1FYWkhDbDNGRmgv?=
 =?utf-8?B?TXZyS3E4QjF0cWFEODlObE9nTmpJWlFablV6QjEvVWZaNmNNRVRlaU5QdnZa?=
 =?utf-8?B?OTNUTlpza3RrdGpGRXJoMHJ6NTU5MGRoclY1WTc2Z3d1WEUvWjlmdmxTSjdX?=
 =?utf-8?B?bitSaUNMeGVoSVpJelNiU1JzVDlxQ0lIN3ZCODBxVjF0MERwWXN4cDR1eXJ6?=
 =?utf-8?B?VkdLbWI1WnJuMGZES1ZlTjhSTC9zZXNJd0tONUkxN29EYWJDRXVyNVNFdGh0?=
 =?utf-8?B?ZGViZjhtdGhrSzNubmsrUXBCWWVEbmpxRy9qenBNVEtNYzJJUXhFTWVtblhG?=
 =?utf-8?B?ekhaK3lHOG50d3JhSG9hSUYzR0JOZnQ2aVNIcmo3OU9Mcm1oL3NCR3IzNkZr?=
 =?utf-8?B?U0hNdlNyak1wQVNpNEowZEMyVkFld2JxaTIxRkJpQzBBanluQlZJcUNzOEtn?=
 =?utf-8?B?YU1BMkNEczFHak9PR2RjZk5uL3kxNU1jM0thUWtkTXE3WmtNbVJRR2tmRnQ1?=
 =?utf-8?B?RDJ1MjVodjNOOTNRQjNudXppS3NQemVtRXdEUUk0VWNBa1lxdjdoL1hHRm9x?=
 =?utf-8?B?MEQraWo2Q0kyWU9pVStjRzgzZHNYQUxCNGtwYUxHMEE2Nmo5QzJyWlBrQWdC?=
 =?utf-8?B?Nm1uTFNualZ3WTc1aWhUMjd2QjZEdUhIa0lzd0MxR1lzYVdGYWtxeDNTamJB?=
 =?utf-8?B?MUI2cDBOamc2cnUwRWRNU29MQ3BBQVFYRkVYWnhKTllJNjV3MndORFZicHpC?=
 =?utf-8?B?VWVoNkY4cWcxODVNcHFUMlVONGh1V00vUHZTb3lIRHl4YnA4UWN4NFpjMk9H?=
 =?utf-8?B?UTEzUFBmdkxWNWpRY3lKWTNXV2VJZUkycnpub3BEWXMvei9TaE43RG8yUW9X?=
 =?utf-8?B?WGQ3azFqZVhIT1E5OVM5K3JKQTJ5UGZLT2JmS3lxTXUwUDFVby9aUlNOYVZu?=
 =?utf-8?B?L2tzUS9Ebit2SklNcFgyaWtkek1lMHRHVjJsTjJVSFo2OWRwZ1IwQ1JEM1hK?=
 =?utf-8?B?MlZnWkJDZ3owMmVybVFYZzZ1di8rekxCK3dGOW5tWExNTVQzNzRMaGQzejRu?=
 =?utf-8?B?b25LRi82Qit4a21BdW0vcktEempJS1l2Vzh6L3d3TkR5WE02OHNYV0t6OHg0?=
 =?utf-8?B?NE5UYkVkcnJQeG5YbjZIMVg4YTBaL0F4a1J1ZmlxaHh1Myt1U2FCU3ZCUDU3?=
 =?utf-8?B?c0ZNNGUzNzRHZlRWdms1RGpvTjJtTStYQlVkQlJUYThrL3J2TjMwZDVXUy9t?=
 =?utf-8?B?cXBQbEJCSkRXZzZGc2Z1d25rSVliengrSEpYajczRko4c2VxZnd2QXJuSjR3?=
 =?utf-8?B?Rzk4SHdaRTF4TDhDMHc2MTAyaDZ4YzJqbDMvWjJGRk9SSnpQdHd6QThHNm9q?=
 =?utf-8?B?NGxSZUFoL2xjSUMvbng5RG56MnV4MldqRDM3NEJFL1JuUkdUVks5WXJlaE8x?=
 =?utf-8?B?OXVuQ05oRUtlSUNmZDg3aC9WNC9BWUpFTnFvUDQzM0R3ZkJkT05DT1hYZnZj?=
 =?utf-8?B?N2xvZGxvZFpSUWwrVFFMOUtPdHk2MXBwZ0h0LzF6YXUwVGxCdld3THhGcFRZ?=
 =?utf-8?B?UU5ZOEJObXdyU2tqTHp3RWwvQkpYbG5PZGdJdmxFaTQreVlKMkM0UT09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1351a6f7-0adb-490b-1770-08da121f6ace
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 07:32:17.2617
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: cfCnYaKOsUeSX4pB2tkM1GAWDWsA4TeRxMOTlDMaY8Hv++owRGnzk8KvENq6/1SZlHTuMMGtXD5o6JI52OAKng==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR04MB4411

On 29.03.2022 20:06, osstest service owner wrote:
> flight 168970 xen-4.15-testing real [real]
> flight 168989 xen-4.15-testing real-retest [real]
> http://logs.test-lab.xenproject.org/osstest/logs/168970/
> http://logs.test-lab.xenproject.org/osstest/logs/168989/
> 
> Regressions :-(
> 
> Tests which did not succeed and are blocking,
> including tests which could not be run:
>  test-amd64-i386-livepatch    13 livepatch-run            fail REGR. vs. 168502
>  test-amd64-amd64-livepatch   13 livepatch-run            fail REGR. vs. 168502

Looks like it's more than just the one commit you did put on top of
the original batch. The log has

Mar 29 08:02:17.743419 (XEN) livepatch.c:1578: livepatch: xen_nop: timeout is 30000000ns
Mar 29 08:02:17.743442 (XEN) livepatch.c:1690: livepatch: xen_nop: CPU44 - IPIing the other 55 CPUs
Mar 29 08:02:17.755416 (XEN) livepatch: xen_nop: Applying 1 functions
Mar 29 08:02:17.755436 (XEN) livepatch: xen_nop finished APPLY with rc=0
Mar 29 08:02:17.767371 (XEN) *** DOUBLE FAULT ***
Mar 29 08:02:18.031400 (XEN) *** DOUBLE FAULT ***
Mar 29 08:02:18.031417 (XEN) *** DOUBLE FAULT ***
Mar 29 08:02:18.031427 (XEN) *** DOUBLE FAULT ***
...

Clearly not very helpful that the double fault handler itself hits #DF
again before it can print anything useful. With the first printk()
completing but print_xen_info()'s not showing up I have some trouble
guessing where things might hit that nested #DF ...

Actually, xen_nop fiddles with xen_minor_version(), which print_xen_info()
calls. The comment in xen_nop.c about relying on the function being built
a certain way doesn't look very promising. Another comment referring to
"req" when likely "ret" is meant also doesn't help clarity. Since the
ENDBR is skipped while applying patches, the assumption is clearly
violated. Aiui this will lead to the RET being overwritten with NOP. And
this issue clearly exists only in the stable trees, as the function
wouldn't have ENDBR in staging/master.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 08:00:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 08:00:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296064.503953 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZTFC-0004ft-RO; Wed, 30 Mar 2022 07:59:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296064.503953; Wed, 30 Mar 2022 07:59:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZTFC-0004fm-Nu; Wed, 30 Mar 2022 07:59:54 +0000
Received: by outflank-mailman (input) for mailman id 296064;
 Wed, 30 Mar 2022 07:59:53 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ZQ0c=UJ=citrix.com=prvs=08136f46d=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nZTFA-0004fg-RB
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 07:59:53 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 5ef33e65-afff-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 09:59:50 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5ef33e65-afff-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648627190;
  h=date:from:to:cc:subject:message-id:mime-version;
  bh=0XmmCBuFoz9B3UuZIlDiQNWn+ycIK9/e+ZiIYaxEU7g=;
  b=SP4pQ4HIveGDXZ0BxbK8s+AFZkYWHU4I7H5b/q6ur0y3WOcRmduPgUJw
   N0bx2LPv+5XXezFCIr6wHmnAHH/CL+cL0/ke+u9tWGE1qDqn72i9cnENZ
   3S0dvV4p36D4yVPdChuZjzdv0ufOfNVTYDKdhd0Gq7xj1wlowWMLsYiL3
   I=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66957289
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:yakIdKpoIV+mC9SIv/i5IQC0+fNeBmIbZRIvgKrLsJaIsI4StFCzt
 garIBmDPamMajHzedx0aovjoUtS7ZKAmIBlSQI4/yEwQSNG9JuZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 ouq+aUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBZI2Lvd48DFphGmJsLasfpOTYflSmmJnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVI1zbWAOxgWZnea67L+cVZzHE7gcUm8fP2O
 ZRINGU1PEWojxtnOnUcC5cPsdiSnUbCcRF4lm2PrKdm7D2GpOB2+Oe0a4eEEjCQfu1Fk0Ddq
 m/Y8mDRBhABKMfZ2TeD6mirhOLEgWX8Qo16PLyn9NZ6jVuL3GsRBRYKE1yhrpGEZlWWAowFb
 RZOo2x38PZ0pBfDosTBswOQ+l7DmyQ9BJlpGq4o+AfUlvHLvCqALz1RJtJeU+AOuMgzTD0s8
 1aGmdL1GDBi2IGopWKhGqS89m3rZ3VMRYMWTWpdFFZevYG/yG0mpkiXJuuPBpJZmTEc9dvY5
 zmR5BYziLwI5SLg//XqpAuX695AS3Wgc+LU2uk1dj/9hu+aTNT8D2BN1bQ9xawaRGp+ZgPc1
 EXoY+DEsIgz4WilzURhutklErCz/OqiOzbBm1NpFJRJ323zpy7+LdoJumkkfBsB3iM4ldnBO
 hW7VeR5vsI7AZdXRfUvP9LZ5zoCk8AM6ugJptiLN4ETM/CdhSeM/T10ZF744oweuBNErE3LA
 r/CKZzEJS9DUcxPlWPqL89Age5D7n1vngv7GMGkpylLJJLDPRZ5v59eawDQBg34hYvZyDjoH
 yF3apLSkk4FAbSkCsQVmKZKRW03wbEALcmeg+Rcd/KZIxogH2ckCvTLxqgmdZAjlKNQ/tokN
 FnnMqOE4DITXUH6FDg=
IronPort-HdrOrdr: A9a23:Aw2+L64hwJS4zfQW9APXwTiBI+orL9Y04lQ7vn2ZFiY7TiXIra
 yTdaoguCMc6AxxZJkh8erwX5VoZUmsjqKdgLNhRYtKOTOJhILGFvAB0WKP+UyEJ8SczJ8g6U
 4DSdkGNDSYNzET5qybkWqF+r4bsaS6GcuT9IHjJhlWPGVXg/YK1XYCNu/XKDwAeCB2Qb4CUL
 aM7MtOoDStPVwRc8SAH3EAG8zOvcfCmp7KaQMPQ0dP0njGsRqYrJrBVzSI1BYXVD1ChZ8k7G
 j+igT8ooGuqeuyxBPw33Laq75WhNzi4N1eA9HksLliFhzcziKTIKhxUbyLuz445Mmp9VYRid
 HJ5ywtOsxigkmhDF2dkF/I4U3NwTwu43jtxRuzmn34u/H0Qzo8Fo5omZ9ZWgGx0TtrgPhMlI
 Zwm06JvZteCh3N2A7n4cLTah1snk2o5VI/jO8oiWBFW4d2Us4bkWUmxjIYLH48JlO01Gh+e9
 MeQv00pcwmOW9yVkqp81WGm7eXLzUO9hTveDlwhiXa6UkXoJlD9Tpn+CUupAZ+yHsDceg02w
 3lCNUcqFgcdL5jUUpCbN1xMfdfTFa9Ai7xDA==
X-IronPort-AV: E=Sophos;i="5.90,222,1643691600"; 
   d="scan'208";a="66957289"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ZjKb9Jkhbjv451NzDe62fmpaVW+N1idBPsPk/B4mAsGaq+UxgW1+4OQwuaPqssWjrK3/MZHYKJJP81HDfVbl3s76kvREGWt1Zw/mzE4fxXsSHfl/zcbjZZXLDl/UXXMyHxVoEgSwmYFc2NzaIzyruXV+Q3GVIBqJvsjW0Uuds3XdVY+FYyfrgxsOlIxBhlOYyHc79EODRaoI+uVoswYcfA2HEJY9MlHsPPw6FS9GrNzS/9kFWviOwLBFTGcfNFTJ/8wKmOnQ4L9oAytJ0dcXAFxhzRZ2VBSwf3fxoaogBAzSwJ2RlXxB/kjLxNeJf1u3qH2CEKuVQsmvWTjqUQEz0A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=iqPR970sCbzzQyuOuDV/KYtFMieIFAyfURFeANLx/i0=;
 b=oBKPhfE4wop3ZuSPl2smpwHFOdD27OLLdC1Qj1ddEs8QRUOa7yePW6Y6fjB8JRdNrxugIJ7Pm2nIAi+TSIS0LX6V3FSmOpIN9Dq2nP12niCAHQzO/sb46WA9Vo0dlkzy4chOpvG47u0CnHIa313dddMXq4E/2NvrUugeQfiQ6FOIXJe0nHptG8QZkIUXw/6WJSsnkgSNJy+Q+DFUWySwYRmEJyOAQPbWpC8LbqCtA4MlrGMZbeTHScYF4gATE12aAf8wWP7Scfy5tuqjbD8sdUzfJwBN7O85sqySUKd2U3k13sDJXO1Iowm4cC4t9/vNDCLSTCaqgl20/UBg5kwSpQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=iqPR970sCbzzQyuOuDV/KYtFMieIFAyfURFeANLx/i0=;
 b=LAI7Vg0nDj4FdVcdft5dVNT/0oE8s9qMgp2K3f+AXZL0GWx5+VTkKdSESCBMJobsdXsAgyjCCp6EcYHtsv+Vb7rmykek8aR4JynbfTRMpB+Z4IMdchu9vpUgqcRTiXvAD9aDeS96skj+6hL2Z2kCFRHx8WRTplgp3ECMJhKAIWg=
Date: Wed, 30 Mar 2022 09:59:39 +0200
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Ian Jackson <iwj@xenproject.org>, <xen-devel@lists.xenproject.org>
CC: George Dunlap <george.dunlap@citrix.com>
Subject: osstest: new boxes to be added into production
Message-ID: <YkQN6zmOQV2F+jUf@Air-de-Roger>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
X-ClientProxiedBy: MR2P264CA0026.FRAP264.PROD.OUTLOOK.COM (2603:10a6:500::14)
 To DS7PR03MB5608.namprd03.prod.outlook.com (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 4019a70c-6b0e-4d47-8def-08da122340a8
X-MS-TrafficTypeDiagnostic: DM6PR03MB3915:EE_
X-Microsoft-Antispam-PRVS: <DM6PR03MB3915A4BE3430A0F7B28659318F1F9@DM6PR03MB3915.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(38100700002)(5660300002)(8936002)(4744005)(2906002)(6512007)(186003)(316002)(26005)(9686003)(82960400001)(107886003)(508600001)(86362001)(6506007)(6486002)(8676002)(4326008)(66476007)(6666004)(66556008)(966005)(66946007)(85182001)(33716001)(67856001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?MFFBMDdtOWplQldobUFjdllZWWEvNE1HOU9NMW5BcEFJenBZNjRGQXd5WGNV?=
 =?utf-8?B?RmxDa3MvRkU1WVlKQ1ZGcStEdTJzbzR2WEdwaU5XbUZUd0Y3Y21sVzB6ZDNj?=
 =?utf-8?B?SHh5UFdsK0l1SDk4WUdGMUhTeFZCSFZvVVBJcFd2cGRndHVpb0VVSXA3c25X?=
 =?utf-8?B?c2UzZ3RyMUszdytneWVyM0hIcmthdldsK2F4c1M3RldhMDQzNE40NWk2RVMx?=
 =?utf-8?B?dER5UER0YnUrZjBESWpCOFZSN2JKZlBsRElqamh1dTB1T0FVemxqbGhUVFFY?=
 =?utf-8?B?dWpEdzNFNDVQZExlSHV6TWdVTGx5NERHU1BzWGRnTGNLL1NvL09DTTRMbm15?=
 =?utf-8?B?L1VMVFlvYmE1RkIvV3FhSS9yU2p6QndqT0pnN0xPbDFZMlJ1VjV2eHF1dWo1?=
 =?utf-8?B?V1N3QU84ZGhoS20vZjUvWGtscGExR2lQRlIzN3BRVzY4TFNSZzQ4ZVB1T25B?=
 =?utf-8?B?SUtwTXdtT3g3QzJCQnZsTmgzVmdXbGM3a013WXEzaXBOU0wwaWVTYXo5NGNR?=
 =?utf-8?B?c3JzOHlyRVViUDhmUE9aaWRMZzIvR3BQc0p2WGQrLzRUMjN3ZFJ0RFAvRUx4?=
 =?utf-8?B?U2xOWXNRUzRpNERZQ2EyTi9NVldkZGZlZENxaWlRQmJZZngxUWJscjNwRU9F?=
 =?utf-8?B?dXBSb2QvS0oreWxNdlpBZ0pmU2taU0dGWmdQZjFsU0hVVDlKMmNjV2I1dFlF?=
 =?utf-8?B?c3JiNGZ0R1p3azZtSTRMbE9LYm1lZk5vWkxuWXdvSDdJbWhhRGE4YjNyMWxt?=
 =?utf-8?B?SWh1Y1RkaW1RZDE0V2ZSYlpiTFF5VDIzc0JuMHM3Wis1RWhSYlZ3Y3VTY3ov?=
 =?utf-8?B?Y2JXNExCSi9GR0RHOVFyWktySm8xb3hnUnVKMWE2UVltUjJyTm94aU5ySWxh?=
 =?utf-8?B?U2o0WTRETlJ3S0xPRWRHbUdvanFXVU5kb0JZUGhTNGpyQ09LSjVMcG1WLzBs?=
 =?utf-8?B?d3NNN1pmWmpaM3djS0hZdWdZRWhhTS8zc0o1eVEwMU8yN2ZKVi94RUlndFBK?=
 =?utf-8?B?WVBrZDJhMkxYSnNBQXgrc2wzditwNnl2WHpSSzM0bTVHMVpsZVo1TmhqL3N1?=
 =?utf-8?B?alpJczR2R0ZjVnptOGFia1RYVGV5ZE9BVFlWbnZtdUJqYkJjaGUrZXFjN3RI?=
 =?utf-8?B?anlDN1JuVnZYZkRCOEtRaC9JWXowVmdrK1VKd2E3WEJrMFRDbzh0MXArT0tD?=
 =?utf-8?B?VTNRQk9uRnQ1S2JQNzZhTzlhVGZzMDdWeUVBUUh0OE5KT01Pajc4Sm13Ym9n?=
 =?utf-8?B?Rk92RE1xTUlYRWlNOHg3M05FUmxkS2I5Qk1QeGNub3p6aDVKNmJiaDBGM1lh?=
 =?utf-8?B?Y1R5bDh3MEp0R2psVk9yT0NtNzA4OTBySlFYMVRpR3VyN0lkODRYRG9BZjMr?=
 =?utf-8?B?eGk0OGkyRWNpME1UVm50SUoyRE9VWnc1OFhNV0M1eWF3YmpuaUJIaUFXR1cx?=
 =?utf-8?B?d1dsTGc1RTZiZDNUN1J6UXpNWnZwdzBWYlBOVW9RMDVwcnVvNTd2UWkyM1Vq?=
 =?utf-8?B?THFSUjlQeEZXT016MEsvN0VuYm9rQzUxQ091OUkrcDh3UGxPS3N2TFk1eDZq?=
 =?utf-8?B?SHNQdmVOUHpZWWNqVElFYTBnY0hHNCttcEorZE5jRzI5REhZOXplaUswWURW?=
 =?utf-8?B?WWl0dGpMNXBJV245NjNNdUkyWlRndHJwT2RGd0VjNTV2SzNTUkNBcFZ6OGNG?=
 =?utf-8?B?Vi9yZ1lyZm11OWtNTkhYVXdJZXNQL0NHeUNKQnVIcmd2QjJuU1g0ZnB0RUY3?=
 =?utf-8?B?YllhU2t5RG5wWElqbHlPUHJPT2ZDSW9jU0ovTzA1akxzSjMya29SaXRRQURm?=
 =?utf-8?B?QzlrTkR6Rm14ZjRUUFBTakRpMG5GQlByNTNRU0QwSU5xSDBEZE5FOFpwbkVB?=
 =?utf-8?B?d3J4T1JBTG41NXRTK255NjFOaEZCekdEZjV5Yk94QVRZcmpLVXlnMzAxallN?=
 =?utf-8?B?Zkt3bjkrQ3FIT0V6MHJWMXRsZmJIUVVYUG1KaXlOUE56d0Q3aXFnVjJQM202?=
 =?utf-8?B?d3cwaWRDaWl3aFlhZUZLblJBdFl2ZGtXc2c5WWVkcXZuT0FZRW92M3JEbnZJ?=
 =?utf-8?B?UHdqblUwUzhNUVpiSzhFTHo4VlpCMDFBR2libEFScHFkUE54MzU2b1pjaUV4?=
 =?utf-8?B?YytvMnk5cEZENndUL2ZRZDYrRTRsRmYyMTUxK2tJbXo3RDR1bmxLN0h1ZzV2?=
 =?utf-8?B?LzdvNHNJNTkwWEg4WlNvSHNaOGtLcHdmNGlGVmx6cFdiVzQ3VDVuY2NnZEE5?=
 =?utf-8?B?elFweCtnR09rc3ZOODg1WGZqUmRwWm84SDZBUmtjMWt0bDZYNGtBTEUxQith?=
 =?utf-8?B?U1owVkpVYTJncVkrR3hWWk1mZTN2Y25Sb3J0d0JKclpWZzllVDhtMWdjWnM4?=
 =?utf-8?Q?ukZzoQXY8ne7qv2o=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 4019a70c-6b0e-4d47-8def-08da122340a8
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 07:59:44.5227
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 0/ze09/D49eJUTGzumrgwrG1nfK3QmPHfOnZgJNTl6I8Kglv6cRXnH5uX5wgrS1A2KPEkRiDXYJ50EtgAFXgXA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR03MB3915
X-OriginatorOrg: citrix.com

Hello,

We have a bunch of x86 boxes in the colo that are currently not
blessed for osstest usage because they were broken at some point, or
managed by a broken PDU. We believe this is all solved now.

I'm still running more commissioning flights ATM on other boxes, but I
think the noblings are ready for production again:

 * Commission flight: http://logs.test-lab.xenproject.org/osstest/logs/168847/
 * Only regressions are either Arm or AMD related, as those boxes are
   Intel.

Unless anyone objects I will bless the noblings for real test usage
tomorrow.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 08:03:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 08:03:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296079.503964 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZTIV-0006eN-Qm; Wed, 30 Mar 2022 08:03:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296079.503964; Wed, 30 Mar 2022 08:03:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZTIV-0006eG-Mz; Wed, 30 Mar 2022 08:03:19 +0000
Received: by outflank-mailman (input) for mailman id 296079;
 Wed, 30 Mar 2022 08:03:19 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=b505=UJ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZTIV-0006eA-0A
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 08:03:19 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id db4987aa-afff-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 10:03:17 +0200 (CEST)
Received: from EUR03-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur03lp2056.outbound.protection.outlook.com [104.47.10.56]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-19-EwO9z23ZOCi9zrpb22lDsQ-1; Wed, 30 Mar 2022 10:03:14 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by PAXPR04MB8272.eurprd04.prod.outlook.com (2603:10a6:102:1c1::11)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.19; Wed, 30 Mar
 2022 08:03:13 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.019; Wed, 30 Mar 2022
 08:03:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: db4987aa-afff-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648627397;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=19fw190Rlq8J0IAtb64UF2ef5nBuRCtZhBBySpjPYDg=;
	b=SzxOVIgb7sSpQbaPdFYB5eI2FxTULD5hvlx88qY5NHcc8GuezXhDTaf2YfJ75ZMRcZbCy1
	AZE+bZKYBuEBVMCy83Oxf7YfN4YqlwAsh5F190NCrhtOMX5Ye1/zkGXyYr7f5jNiMnnI+e
	PdXMAjn8RIzBp9qkLy935dODZqeI8kU=
X-MC-Unique: EwO9z23ZOCi9zrpb22lDsQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=aFg/8FLRNtObBkiKtu/WGm2RQ/egNRQtuIwnubNKEhEKS9sGmae7b+6VIJE9Uh69SL97r2eDYoDT4FCKhcpEx3re/Y9nwaAOxHNoxCPpq+LdLTXwSux3xscn6MA95U/wOCJntMmeXGKKMjDWyT+kd5PMM/mQyph9tfDY6b7Z6ruV9ILgQDwRMVeSJYdoQmCrsx5gDxVm9qEzbyoZwCjkg+TkuyuhIxMlsRKNwCy0eoBP7Y2a//4IWBRHtSMqGQj4JSrdMIOiQ2pekc/R1CyL/921STrLsDDWG0AM3KYwB+WMEQI3S9JR64KKf9LKQd9D3cTL4+1QOWWhscjn91MJSA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=19fw190Rlq8J0IAtb64UF2ef5nBuRCtZhBBySpjPYDg=;
 b=M7fStqI0IwmnIqxGPjmdCl1hwoVMgJEmGKdMHhbEle5DsJ+uRGTlyzlcym/K7Lu2R23GgmgHCGMTqRnIQDjhGHQpoG2sFTMbl1+U/c/n+O+odfBUoo6yI0ReMr0VjyPeAOGQxDb5jGowPaHcDqY4DfsyR8b8XSchze4fXsQCd+WkdRH7amn4heDbxG9RajdMmf+sKn1rcU/mVedwwG9NmzuVY9Zzv5HPIG6bV68nAocQM88fTQlPkytv33GWKfYByRNXoRh7Ln7yzl3UQRgg5CvQomw6DwIxP/C8GDmN/aOeqDBm4TAVufQ5ZUeWQ6lDY6KuJ/PkPRnAawqfSQ49Eg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <2df6d890-9d91-62cc-8057-3d50f1501ad5@suse.com>
Date: Wed, 30 Mar 2022 10:03:11 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Ross Lagerwall <ross.lagerwall@citrix.com>,
 Konrad Wilk <konrad.wilk@oracle.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH] livepatch: account for patch offset when applying NOP patch
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: FR0P281CA0047.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:48::18) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 6753f518-18a6-49e7-c785-08da1223bd09
X-MS-TrafficTypeDiagnostic: PAXPR04MB8272:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB8272F61864726FEB09FB0FDEB31F9@PAXPR04MB8272.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(83380400001)(38100700002)(4744005)(5660300002)(508600001)(8936002)(26005)(15650500001)(186003)(2906002)(6486002)(31686004)(54906003)(6916009)(316002)(31696002)(6512007)(86362001)(6506007)(66946007)(66556008)(66476007)(4326008)(8676002)(2616005)(36756003)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?MFdNQWx2aWw5bjJqMDRYQlRUdnUzTHBLRXZ2Zk9rZ3pmY0dwMUt1U2RzTVc2?=
 =?utf-8?B?bVhzVkJtOGVxTnN6cDZuajY4VEZsOVlPQVoyOE9JcXZWbTcyWVV4V1R3MXJE?=
 =?utf-8?B?SE50SEJJK3pCVnBMMjRCL3ZjQmZ5ZjBvOE5JZDRGd0VIOWdzWVFMUHcwaWtj?=
 =?utf-8?B?QVRmbWtYMENnQk0rY2hRZGpVa1Bkbm9LWkF3cGhpZ29VaFJJdStrVy9IS2t3?=
 =?utf-8?B?cmJLZzFFdzhqdFpCRVZPVlU2Yy81TFk4MzNiRXY5b1RyVGdJUUZzS3ZwenlS?=
 =?utf-8?B?aXdPaTRlSE1uYkNnYitzSHFBOTNIUGpZWTN6dFNLNWg5ZVh6aTBsUTNuNG1z?=
 =?utf-8?B?U2N0UzdzTzZuZDJBZnNaV251ekpZeU1yMEwzemc2b0RTQlVoQm5vdDF4TjJm?=
 =?utf-8?B?by80UWRqSkdNdytHVG1LY2xvSzVXOE91M3NsQVN6MUEvdDVrWFdNMVpaWE9k?=
 =?utf-8?B?VTBhNUFIeW9WUFNGNjdyZW1RM2ZScmRmaXFKeUlqaHB5SDlBNFB4ZXJxMWc3?=
 =?utf-8?B?V1B2NTNUZ0NPZC80M1JuaEx4RlRQRm9FRFdBM2dtRUVBaVFDUXgrRXo3UFBT?=
 =?utf-8?B?bEZrRTVMeEJ1MmZXS3hFTFF0eFhuMGx5KzgyN3Z2bE4xOFR1bExTc2xoRHNx?=
 =?utf-8?B?RDhmaDVjQUJLbmFXeHRBdGZsNVZMVHd2bDV1RS8vdXBiYVpjSElvZVMvTDhN?=
 =?utf-8?B?ZlJtVmY3dHBJWHBEYS81MmlHcjhUL083NUk0VkhlSUZkQ2IvWDNzWklKZEJE?=
 =?utf-8?B?dnhOejg4cG1kOUwvNEdsZjQ2NngwbTRSM3I1bTFHQ0VSSXRSc2hMWk1NR25R?=
 =?utf-8?B?Y2o5dTFyRkR6YWc1U3VhS0tMckFjejlQSkZxSkU5a2lJWFZBamoxaysrWXRN?=
 =?utf-8?B?T0lzVlhjZWtzY1dVY0FycXlDYzcwNGF5NDQyUnpVc2lUUWJYNVdaYlFzZS9w?=
 =?utf-8?B?Z3VTUjFvNGlyUjA0akwwaUtUelZVN2xqeUdEY21ob2pVbkZwOTNWWjZ6UFpG?=
 =?utf-8?B?dUM0d2F4OVhuYkZXNTlLU09aK3l5SVhQYUhHVjAwK2NBQ3dZR3gzV2taRHRG?=
 =?utf-8?B?WHRVeVlzNWNNZXdpSUJBeVdLL2R5TDBZUnZQYy9NVUl3MEZEUkJoQlNaMnZL?=
 =?utf-8?B?dzV5RHhHY0FKVU5MZTB4WU9EekVqM2tyNkM1OXVsQTlxdU54dlhXZW1pbFFQ?=
 =?utf-8?B?OGwzTGU2SVo2Sk9mRTdiOWJZSXVSQmxTSEUrY2ovczZtcW9RZTJyblBWSmRh?=
 =?utf-8?B?U24zb25tbDNjdzhIbUhkUEJIODZDWjdEdEF3dVE0azN6UHlURC9CbWFWdEtT?=
 =?utf-8?B?MThIWWxXTkJNd2V4eDNjL2hNUkxJTnlyTko4ZUQwN0lLT0pVY0RKaC9JVEdM?=
 =?utf-8?B?ODZjMHNiRWdEbDBoeUhNcXZoZGVxOE1vakRDNkxFVHFZVWVWZ1Fhc3ZaSkxw?=
 =?utf-8?B?UnhRanNBbk1MOU5KQ3QxRjhPWjNLSzh5aTFWMFdYWVM5V2lEcFRWQk9rdzF1?=
 =?utf-8?B?OHJJc2xYQmJ0R3FlWXdPUlNOSjg1ZjdBZU5QREI5UWtxNFRXajhoMy9zanBw?=
 =?utf-8?B?N1JrV1ZNNWFIYWwybXRKeGg5WitFVW1aTVpYclRMTlp4c21OYitCM1BUU3d0?=
 =?utf-8?B?L21IL1gxWk1kZEo0MC96cWV0SlBrSGpZYktaNi8rL1BNZk1vL3czUVZyTll0?=
 =?utf-8?B?SzRxVVMrVEV1cjZ2eXRibFFGbjBhQmM4K3Nic2k3RDNVNXFlb2FBLzFqVk1w?=
 =?utf-8?B?OEg2UitFbXJrQnRiaS9VZDM1Q0tLL2M4b01uL0ZWQmk2SGFnMjB1dW5mSWRh?=
 =?utf-8?B?eU1vUTNFSG9tZW1hRzFIajFFTHJsYzdOeWg1TTRweUFubGV6aXZLQUVWOVpr?=
 =?utf-8?B?dEFQdXBMaEU4MlF5SXl0WU9pOGJZVDJqbmFEYldJK29ER0lKcXI3dFNkR0JS?=
 =?utf-8?B?eFVHVUhHZWdRMUhXblpGeFF5d3FFREk1QmhTSFhoeEc0NzQ1cERjNVMybE9j?=
 =?utf-8?B?dGpXemEyakZKUmh6ZG1lelJTdHF0NkRkOGpEUndvZlZiUnIzYTFUczc1aHI1?=
 =?utf-8?B?QXFJYjRiMU90b2xwSENEZVZieE9QRWFndm1WUjhRNGxJa01kUnR4cFVZeWEr?=
 =?utf-8?B?WHVUNDFQTVVjMTEwR0ZqazJNNHVjMThQSjFyMkgxRjBBMS9oTCtxRmNya3Yw?=
 =?utf-8?B?TDk2RkdETjJ6eS9ZZzR1RS9LQy9qRkxQNmhLa1RsdFF0TVdsUUI0Qm9WUGRS?=
 =?utf-8?B?TTZlTExTQ2FMY2w2ems3VzRzQjhBTVFJYVNOTHFkODZQSmtMT0NwaE5qNlpW?=
 =?utf-8?B?UW5vcGpIL0RwV1ZJOXgxSHVpRU00cVd5c0dtSWN0UzlLemVRQmg4Zz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6753f518-18a6-49e7-c785-08da1223bd09
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 08:03:13.2286
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 4QMHk/tB/WqJHJtAXPHmKkAabcVFJpBg5aK+htUdGt9dhbVdIsaXx2DClZ5IxfYdVv3XMprwswAunXBSv/MRTA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB8272

While not triggered by the trivial xen_nop in-tree patch on
staging/master, that patch exposes a problem on the stable trees, where
all functions have ENDBR inserted. When NOP-ing out a range, we need to
account for this. Handle this right in livepatch_insn_len().

Fixes: 6974c75180f1 ("xen/x86: Livepatch: support patching CET-enhanced functions")
Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
Only build tested, as I don't have a live patching environment available.

For Arm this assumes that the patch_offset field starts out as zero; I
think we can make such an assumption, yet otoh on x86 explicit
initialization was added by the cited commit.

--- a/xen/include/xen/livepatch.h
+++ b/xen/include/xen/livepatch.h
@@ -90,7 +90,7 @@ static inline
 unsigned int livepatch_insn_len(const struct livepatch_func *func)
 {
     if ( !func->new_addr )
-        return func->new_size;
+        return func->new_size - func->patch_offset;
 
     return ARCH_PATCH_INSN_SIZE;
 }



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 08:11:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 08:11:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296086.503974 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZTQV-00086q-Ib; Wed, 30 Mar 2022 08:11:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296086.503974; Wed, 30 Mar 2022 08:11:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZTQV-00086j-Fh; Wed, 30 Mar 2022 08:11:35 +0000
Received: by outflank-mailman (input) for mailman id 296086;
 Wed, 30 Mar 2022 08:11:34 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZTQU-00086Z-Gg; Wed, 30 Mar 2022 08:11:34 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZTQT-0005rN-Ud; Wed, 30 Mar 2022 08:11:33 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZTQT-00022P-Ht; Wed, 30 Mar 2022 08:11:33 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZTQT-0006hs-HL; Wed, 30 Mar 2022 08:11:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=OfJFOOqA164gKTfRQGkMHCAK7ukWoZZi5VfKSVpEsbI=; b=ChWwoN0u/x2p32W7Pyi5uU45nZ
	M1oWzTbggZwssfKoubLsmwoOf7dJgd21Puxu/Du3aBTVeYIkFiK+7wHODY77ZUA3rH7pbRVOPxTqK
	Tenijq4RgaDa5mSiexkDPVJX6nMhPWRBo5kmM/jacqlKCxIH87wjP7X54pnd8ADsPak0=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168985-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 168985: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-amd64-i386-libvirt-xsm:guest-start/debian.repeat:fail:heisenbug
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=bed1fa2fbe5f004ac4c152119029a8ce0810dc02
X-Osstest-Versions-That:
    qemuu=f345abe36527a8b575482bb5a0616f43952bf1f4
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 30 Mar 2022 08:11:33 +0000

flight 168985 qemu-mainline real [real]
flight 169013 qemu-mainline real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168985/
http://logs.test-lab.xenproject.org/osstest/logs/169013/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-i386-libvirt-xsm 20 guest-start/debian.repeat fail pass in 169013-retest

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168856
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168856
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168856
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168856
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168856
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168856
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168856
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168856
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass

version targeted for testing:
 qemuu                bed1fa2fbe5f004ac4c152119029a8ce0810dc02
baseline version:
 qemuu                f345abe36527a8b575482bb5a0616f43952bf1f4

Last test of basis   168856  2022-03-25 15:08:16 Z    4 days
Failing since        168873  2022-03-26 10:38:21 Z    3 days    5 attempts
Testing same since   168985  2022-03-29 14:50:32 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andreas K. Huettel <dilfridge@gentoo.org>
  Andreas K. Hüttel <dilfridge@gentoo.org>
  Cédric Le Goater <clg@kaod.org>
  David Hildenbrand <david@redhat.com>
  Matheus Ferst <matheus.ferst@eldorado.org.br>
  Niek Linnenbank <nieklinnenbank@gmail.com>
  Peter Maydell <peter.maydell@linaro.org>
  Philippe Mathieu-Daudé <f4bug@amsat.org>
  Richard Henderson <richard.henderson@linaro.org>
  Víctor Colombo <victor.colombo@eldorado.org.br>
  WANG Xuerui <xen0n@gentoo.org>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  fail    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   f345abe365..bed1fa2fbe  bed1fa2fbe5f004ac4c152119029a8ce0810dc02 -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 09:00:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 09:00:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296100.503998 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZUBy-0004qY-JA; Wed, 30 Mar 2022 09:00:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296100.503998; Wed, 30 Mar 2022 09:00:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZUBy-0004qR-Fu; Wed, 30 Mar 2022 09:00:38 +0000
Received: by outflank-mailman (input) for mailman id 296100;
 Wed, 30 Mar 2022 09:00:37 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=b505=UJ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZUBw-0004qL-W9
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 09:00:37 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id dc575362-b007-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 11:00:35 +0200 (CEST)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2173.outbound.protection.outlook.com [104.47.17.173]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-30-alfkak9tNBWPvVz4k-QC9Q-1; Wed, 30 Mar 2022 11:00:26 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM0PR0402MB3860.eurprd04.prod.outlook.com (2603:10a6:208:7::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.21; Wed, 30 Mar
 2022 09:00:25 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.019; Wed, 30 Mar 2022
 09:00:25 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: dc575362-b007-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648630834;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=wPREeCdMwfWN/OrzsJ9qkfGJrGjv9HyfQxfvelFs0hM=;
	b=RRpO9fKZHTLjtZ9TE3CMVTmBtPUORwaHiuXik28/3xjPKz4rKUypdHStcgnQzuS2ooCsAg
	gLcpRCex+izV4jzEypskdnrZkCAnQLJ2e3vpZGvLauqVXVNGRviLyT8xp5IH18spEqyNbK
	slT7cdwL+JroBO/8fvmvFCnWb1hWSMc=
X-MC-Unique: alfkak9tNBWPvVz4k-QC9Q-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=RtbnwHJNi/DIiYVkRf4DD6RZru+YJl6G2t1AFUVtPEL8lNly4kwiZNeNWwGH8E60kdv3orqq6QNLDZjkJUv9EZuhUYUa0EkHh/cFCm7ndiXaE4LciuASohhTMb/p/oz+r18Haig2GA+MSgn5PgOVimXbGWs8p27YGda2PFGabRJsGlZXDcSVNEksSm2bNYk7ItchoQwXg4uo+OoKsV2p4NP+gnjlymEEyr0ALZ/oGFCCk1pfXO4cF896vFFBkMso79EhkgiKPom5jaAETJS4cTjKRYp+fiJuekbHxEc/G9UFIwdGMcMzCQTey/xxcBg4RQrcZoYdX2EAkWrvwkw5dA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=wPREeCdMwfWN/OrzsJ9qkfGJrGjv9HyfQxfvelFs0hM=;
 b=I6p1dYLuHu1fP9V4jg+j/BZ+8yaVTjqnD5UmESK2J/CGokbqPqG42pe/cl0IHTS537RsLZtGujPFqEtxbX0z5iXsBQsdOTpNXHNOUaw9Jv2Lb4nrqyYx/rivM4Lhj4JLYjA4c4QINgtT1PpWAiRBlGdy6v4a7QUcM5AP2s6L9wZsB4MKoaYmMtwa3JwXycQBuG1509L7dCbMJtGg3R5AsUmN9cHAo+m+IrVpxAlyc897myg8s+sUMWJYHWc3Vw0zhBm4uSci6k8rM10EXoeXHgx9FDC9VoflWEkjAkxrSltLteE49v9Sl+zMCQdynY4+pbfxqojAiw2yRTVqtteZDQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <001392f4-6c7f-3138-0682-32ff202b3ee1@suse.com>
Date: Wed, 30 Mar 2022 11:00:21 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] x86/kexec: Fix kexec-reboot with CET active
Content-Language: en-US
To: Andrew Cooper <andrew.cooper3@citrix.com>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Wei Liu <wl@xen.org>, David Vrabel <dvrabel@cantab.net>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <20220307205313.31247-1-andrew.cooper3@citrix.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220307205313.31247-1-andrew.cooper3@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P195CA0019.EURP195.PROD.OUTLOOK.COM
 (2603:10a6:209:81::32) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: e3ebd22e-0516-4c9d-5f1a-08da122bb989
X-MS-TrafficTypeDiagnostic: AM0PR0402MB3860:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR0402MB386047143C75932CC40A3922B31F9@AM0PR0402MB3860.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66476007)(66556008)(66946007)(26005)(4326008)(86362001)(8676002)(186003)(2616005)(31696002)(5660300002)(83380400001)(316002)(508600001)(2906002)(4744005)(8936002)(36756003)(54906003)(6916009)(31686004)(38100700002)(6506007)(53546011)(6486002)(6512007)(6666004)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?V2wvVm0zN3ZsdFJ0ZWhRNmtCa1ptZzFrYllsdFFhbHd0aUxQUVgrVW93TUpW?=
 =?utf-8?B?UTFlVVVmV0ZLQ1h2T1Y5d2NCUnBPU2FZTStOOUxnRjhJbURBZUdNcXlPQkh5?=
 =?utf-8?B?TCthaTJFbWV2U3J4MWtxWDBZNGlWdUEzMXBETkovZW5DR1JNOFZKMnhKTXh5?=
 =?utf-8?B?bE5YY1NLdEE0eE1DcmVhazZoeGd5MXlLTUVuNTNJYXJxbFc5UE00RHJndGVY?=
 =?utf-8?B?aiszTE9sMFZUUjJqNm94Z1k0MlJDS3ZzTWhMT3Y3WitqcVpaM0YwdEFVN1pV?=
 =?utf-8?B?TEJhUGs4VUJQK0lrUEczUE42azQ5L21zbE5iZTZFeHNQRlVuWWJSNy9Mc1B2?=
 =?utf-8?B?c3U3QndlQkpGaWpPelNjVXVUMy9JdVM4MnJ5MEZHbDBvc1ZENFBPUXlJWVpC?=
 =?utf-8?B?a1QwdmlMaU15U2JZbFI0a0l3M3BuU2o4UFB3MGphYVR1WWVjM3BzaWNwamtR?=
 =?utf-8?B?NktOam9uOU1YNkpHbW9XV0phNTVnRHk4UnE4YTBZdXM2NGxIMm9WUHZuL01a?=
 =?utf-8?B?NVFScFFsNXBNVnk1Tit1TytYRG1iY3c3V1lrb1VwTnk0aHRLb09WMVdhMFpx?=
 =?utf-8?B?RWg0b1NhaVczeHRkYXJOWVF4YW90ai9TSXBXUWRTeWhIVDFjUXk2WUh5V0tE?=
 =?utf-8?B?cHR5VFhacjlKQUVYbU5CZ2ZxY09Vc1BQQXExWjJOZE1ZRHlGRlI1OEQ1Y01v?=
 =?utf-8?B?SVZFZENZNFBVWnlSR1ZVSThUWVN5Y1dWTml5UUNXQzlRMTZkNlE3RHVSdGY5?=
 =?utf-8?B?clZtc0JLSzAyU1k4QURiWE40MDZQUU10bEx3a1hXWTAySFg4VDNyRitKRll5?=
 =?utf-8?B?MExOZnhPTXI1NzhVOVlTTzdKWGJmQ2JweWlwdGM4SGlWSDRDSFhYNUoyckFi?=
 =?utf-8?B?TDFoSWdWTHl3Q2hISHFkMjlLcUdSK1hrZGdwTko0N1lud2NmZ3dPQ3pmQkc4?=
 =?utf-8?B?ZXBFdEN3Rjhuem5SenRBc2kyVDhRdndWT01MdEVTTWIxcndWdEtOWWhBVlpk?=
 =?utf-8?B?c3kwcGNyOURhTk9jeU5qYSt2REFrc1hGOFo4SWdMeTIxbmZEU2Y4Mm5ZaTVj?=
 =?utf-8?B?MFlVWUUxVElDaEpyTHJyc0dISmNXZlBEZ1hvT09MY2dvVTdwNlJSelROdkQv?=
 =?utf-8?B?d20rVW1neDBSVjg3dVFubEo2WnlLN21qVVNoSC9XTjFwZWtkZnFuRE43TVpz?=
 =?utf-8?B?R2JobitIbjZ4eVFnVU11alpsTWhaL2dsSi81RmI1akxuU3FRRmpmRFpWMFVa?=
 =?utf-8?B?endaeGlpRjJvUTZXRnhCL2ZwbWcwRFVENXJZUU9yNFdHRldDeEllVWdrTjJN?=
 =?utf-8?B?NEttNEJjZ1FxeXdxcktyOEdRWGYwUFBFWHluTFJsemo1OXRTbitQQ2JkU1Ry?=
 =?utf-8?B?MHQ2WWFnb2NJeGtBNyt4em1lNGk5bXFCUE8zMmJyNy83SjRXUHh1Qi9tWi9Q?=
 =?utf-8?B?Vm1qTkdXc1NKeC9zamhjTzZpRGl3SklwM2VJelE2U2ErVlRVZjNYaTNxcWxC?=
 =?utf-8?B?YXVUOWFDODFNN3k5YlJua2cxd1ltc3dBQWV6L1JPL3ZCMHd6ZTBrSW5OSnVJ?=
 =?utf-8?B?UTBKTUJRT2FPTE1QS3VlSDAvMDlETm5SYTFBUCtlZUliUk1OWlJXUEsybVdJ?=
 =?utf-8?B?dXVkTGdvbHZKbUVST2NJTHgwYXBna0gySXJ4am5qUVUwZWljTHlzbEw3bkNR?=
 =?utf-8?B?NldWSzlWYnVORkZNV09Pb3Zzc28vZ01BcFRpVC9HR1paVHNIQk9uT3lWeEl4?=
 =?utf-8?B?MzJDMDlsR3hhaHUrSlIrZGtIR29PT0RmbGNzTkN3a0dtNEFPemZRV1VWbnlW?=
 =?utf-8?B?d1ZtMzRHVnRVL3Nqejg4V1p5RFlFMmtRWm04S1NwZzlyN2ZyK2hWcnM5SFJq?=
 =?utf-8?B?WWd5dFd4VHM1NFpmVU9UbnFyNmt2L1FZTUZ6VU9lR3Z6aFlzaE5nS1NvRzhy?=
 =?utf-8?B?eUlFMDh0SjBmY2ErY3g5WUl1SjNrMklVeWFEbGQva3VjRk1EWm5Xdzdvd3Zr?=
 =?utf-8?B?SGxJaWRkbGZNTFNMU1cxZ2owWThLeGpIc2FMK1VnRUM2emJlM3JtQjMyZmVB?=
 =?utf-8?B?dUc3QmdGV1ZRaHZ1cmNDLytTcWF2VE5CUXhTeE1tMTBXTkJoM2xlZzNMOXZa?=
 =?utf-8?B?dXd2T3huTXQ2bjg1Wk84RURUeVRHbnZCcFdSNHM5cHo3ZDZhSXJaNDF3cGxF?=
 =?utf-8?B?YkFuTWdtTnEwOFNrOTNENkFyT2RKWGZzc2lmN2FxZWpONEdZck0xckd4Y25L?=
 =?utf-8?B?UTBxYkxwYnBPbmtseGU5VWx4eWhXaldCT1hWaEVxRmpaTlYyN0FCeGp3M01C?=
 =?utf-8?B?N0phUDd6aWFjS0ZnVmFjWjV1SUsvSC9PTERacnIxU09HaFZZUlk2QT09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e3ebd22e-0516-4c9d-5f1a-08da122bb989
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 09:00:25.2651
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: zuWf8tCh64reayM1b1JhbvBL626ZWLRuHwDpRBpiajL+n3UUxF4d8tBzrmh0fJQyXImIzh8+3j9Jsl3YynFrCQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR0402MB3860

On 07.03.2022 21:53, Andrew Cooper wrote:
> --- a/xen/arch/x86/machine_kexec.c
> +++ b/xen/arch/x86/machine_kexec.c
> @@ -156,6 +156,16 @@ void machine_kexec(struct kexec_image *image)
>       */
>      local_irq_disable();
>  
> +    /* Reset CPUID masking and faulting to the host's default. */
> +    ctxt_switch_levelling(NULL);
> +
> +    /* Disable CET. */
> +    if ( read_cr4() & X86_CR4_CET )
> +    {
> +        wrmsrl(MSR_S_CET, 0);
> +        write_cr4(read_cr4() & ~X86_CR4_CET);
> +    }

It just occurred to me: Isn't using read_cr4() here somewhat risky?
If we crashed on the CR4 write in write_cr4(), we'd try to load CR4
here again with a value which may cause another fault.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 09:37:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 09:37:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296117.504018 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZUlF-0008K6-Gi; Wed, 30 Mar 2022 09:37:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296117.504018; Wed, 30 Mar 2022 09:37:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZUlF-0008Jz-Df; Wed, 30 Mar 2022 09:37:05 +0000
Received: by outflank-mailman (input) for mailman id 296117;
 Wed, 30 Mar 2022 09:37:04 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=u124=UJ=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nZUlE-0008Jt-B2
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 09:37:04 +0000
Received: from EUR03-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur03on0627.outbound.protection.outlook.com
 [2a01:111:f400:fe0a::627])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f3c5951e-b00c-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 11:37:02 +0200 (CEST)
Received: from AM6P192CA0054.EURP192.PROD.OUTLOOK.COM (2603:10a6:209:82::31)
 by PR3PR08MB5707.eurprd08.prod.outlook.com (2603:10a6:102:8b::9) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.18; Wed, 30 Mar
 2022 09:36:53 +0000
Received: from AM5EUR03FT035.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:82:cafe::ce) by AM6P192CA0054.outlook.office365.com
 (2603:10a6:209:82::31) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.13 via Frontend
 Transport; Wed, 30 Mar 2022 09:36:53 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT035.mail.protection.outlook.com (10.152.16.119) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Wed, 30 Mar 2022 09:36:53 +0000
Received: ("Tessian outbound 826a6d8e58c3:v113");
 Wed, 30 Mar 2022 09:36:52 +0000
Received: from 57f9715aa7db.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 F808D32E-6B8C-45A9-8F65-BFD7604A4058.1; 
 Wed, 30 Mar 2022 09:36:44 +0000
Received: from EUR01-VE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 57f9715aa7db.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Wed, 30 Mar 2022 09:36:44 +0000
Received: from DB7PR05CA0011.eurprd05.prod.outlook.com (2603:10a6:10:36::24)
 by VI1PR0801MB1872.eurprd08.prod.outlook.com (2603:10a6:800:86::12) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.22; Wed, 30 Mar
 2022 09:36:41 +0000
Received: from DB5EUR03FT046.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:36:cafe::74) by DB7PR05CA0011.outlook.office365.com
 (2603:10a6:10:36::24) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.23 via Frontend
 Transport; Wed, 30 Mar 2022 09:36:41 +0000
Received: from nebula.arm.com (40.67.248.234) by
 DB5EUR03FT046.mail.protection.outlook.com (10.152.21.230) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5102.18 via Frontend Transport; Wed, 30 Mar 2022 09:36:41 +0000
Received: from AZ-NEU-EX01.Emea.Arm.com (10.251.26.4) by AZ-NEU-EX03.Arm.com
 (10.251.24.31) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.2308.27; Wed, 30 Mar
 2022 09:36:43 +0000
Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX01.Emea.Arm.com
 (10.251.26.4) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2308.27; Wed, 30
 Mar 2022 09:36:38 +0000
Received: from a011292.shanghai.arm.com (10.169.190.94) by mail.arm.com
 (10.251.24.32) with Microsoft SMTP Server id 15.1.2308.27 via Frontend
 Transport; Wed, 30 Mar 2022 09:36:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f3c5951e-b00c-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=XPjXwM6GeF4ktNtts2yB4XQmLeHHI2pEJS10Py2OAn4=;
 b=hD7tzKL/VZmqgLW9h3rJ0gLoFamat0qXyz4vtv7S8hGu0yF5pOmT2432xaZMQj6JpB2FxfCtr8SRboKBHsmmbEi1I6LGoRdL250zT6byY1SrxpibmSAqdFd3NVDggbh11Ul7RA+3t2wJ5GpIDC0jUzkNo8fuDinuL4BGSCbLv5c=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 8b56d90cfa43171e
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=jkpr9FskLDfUqYDDAYfR3tAu9e/gibjC3F3r+yuAY01lWnIv4MGS2QvWpfgowXEVi8whXyDYhS3nxarkWsGt/6djZ1XA1ahdp1L414P968bF6DiYojxs6k+TIZwSZJamW+v2aabFxGbmkXEwXwhuhWHsLhO/M+8ZEITjdFwZxy/lmgOqX+XyctGnYIn6D6HTB3TeJ608JzXwHO0J+n152zOjyOPz2GXu9D6145n+A/UIfEWmEXLF6G8GTR4d6lLrstzfeid+kyl2GlkS0MlPh9NCXUgGFb7enMXdBoPDc/8EzaZHFbYYkHPrSxDJu8GK5ljOfaGIuLo+VCG8/9Zugw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=XPjXwM6GeF4ktNtts2yB4XQmLeHHI2pEJS10Py2OAn4=;
 b=e6WAQN5BcfrKmJ1UNP99ZFnXVh6ZBaRY0R6nnDVdhnHQ0J2scZx655rAC04mzquP9CvZSbaz3fIT0zI7mJbvjMK2FpUx/qiT03FZAOdQUoK3k8SYRqWxh4dMLt9KiqTpJsAdUokhBW7UWw0Nw1vHD4piZk4oDy3kBsBwbX5rietmV/fZgvIc9H8pnEl2DNaZzsYxjK9zSac+oBOAnDBOZmHo0aq/EIzavwFUFYJ2hSNEFW9ppm8z4lz6P+LEZAerCDI7g1EO+fu8EkoXMAwhNOCotj2c7iee37pbxzvduk+rcOlm4NPUqdERS+hwGnLncte87BiCr4WX0/rQlLFW8A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 40.67.248.234) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=XPjXwM6GeF4ktNtts2yB4XQmLeHHI2pEJS10Py2OAn4=;
 b=hD7tzKL/VZmqgLW9h3rJ0gLoFamat0qXyz4vtv7S8hGu0yF5pOmT2432xaZMQj6JpB2FxfCtr8SRboKBHsmmbEi1I6LGoRdL250zT6byY1SrxpibmSAqdFd3NVDggbh11Ul7RA+3t2wJ5GpIDC0jUzkNo8fuDinuL4BGSCbLv5c=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234)
 smtp.mailfrom=arm.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 40.67.248.234 as permitted sender) receiver=protection.outlook.com;
 client-ip=40.67.248.234; helo=nebula.arm.com;
From: Penny Zheng <Penny.Zheng@arm.com>
To: <xen-devel@lists.xenproject.org>
CC: <wei.chen@arm.com>, <henry.wang@arm.com>, Penny Zheng
	<Penny.Zheng@arm.com>, Stefano Stabellini <sstabellini@kernel.org>, "Julien
 Grall" <julien@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, "Jan
 Beulich" <jbeulich@suse.com>, Wei Liu <wl@xen.org>
Subject: [PATCH 0/5] populate/unpopulate memory when domain on static
Date: Wed, 30 Mar 2022 17:36:12 +0800
Message-ID: <20220330093617.3870589-1-Penny.Zheng@arm.com>
X-Mailer: git-send-email 2.25.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain
X-EOPAttributedMessage: 1
X-MS-Office365-Filtering-Correlation-Id: a61bb94d-58e2-4610-b20f-08da1230d2d5
X-MS-TrafficTypeDiagnostic:
	VI1PR0801MB1872:EE_|AM5EUR03FT035:EE_|PR3PR08MB5707:EE_
X-Microsoft-Antispam-PRVS:
	<PR3PR08MB57077662A817DFB42F63E1FBF71F9@PR3PR08MB5707.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
NoDisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(46966006)(40470700004)(83380400001)(6666004)(186003)(4326008)(8676002)(54906003)(336012)(26005)(40460700003)(6916009)(82310400004)(1076003)(2616005)(86362001)(426003)(70586007)(5660300002)(70206006)(47076005)(316002)(7696005)(8936002)(36860700001)(508600001)(2906002)(356005)(81166007)(36756003)(21314003)(36900700001);DIR:OUT;SFP:1101;
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB1872
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT035.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	f8f9f316-1d36-4ecc-67b9-08da1230cbc1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	/uLVXwPnvxpdNWVwmp2UWWzg8sD0Rydec7Z/ozYRuC1v1L5AxpbymCzSlelpoTKX5oh7USteaWpXEIyo8r2SaVocvhgRiuXTtH+B9Yd5BifGPuhkUeSFspsZ1CZGJibnsRrtOf9ziBb90FbTNA6srFXcZGMxGvbqmvVuR52WL16/OS2Wd7v6fkj8ii1nA+LdOO9NZCrZ0xJPBvH6WiA6qcP2zZPMzPcbi7DIxkJ+RmvxqGMmxPPOe2+Ag9IYz4DoBQA6NRYmefchksEt7CB6UndJshOWIavxUnN2eD1PIDU2RC2HTZb3siff34RY/0AvBpaOptoOCofErwhGTu2GxpZf8hrGOEuxLHfqIfXu0pMXeRjIw+oTqeMP+oEl8PU+KCukJjJq7P5KQGAiQLV3lA40q1ccgNOfvr0vGcm1q7mgdaeql+mOIA+L6prx1KsaXyptOv8W8QjfYSsNuoHEq1nv1SWQOWOVBnWegKQgB+TL1a8u+HDFzM8M81wnndaJU9R9a3nbr4McSQHWYfAKw3IXoOG2jSCU1i1o5uBq4Ta44WfTvKwzZehAM7xwrVQrZR3MsfKdEatwxzD1ydL0iTNAsH64VWi8nXvtmEJQZyM4IDOH0yCi490cOdi6dR4RNcsFHYU7pxbAiVPXIjFcecRGo/1R+GuNFKbiekO2dxbxPrxpypzt4MoSlTG+KeEWZtplXywynFyWKLlzAATTnA==
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(6666004)(1076003)(186003)(2616005)(336012)(8936002)(316002)(86362001)(82310400004)(508600001)(54906003)(6916009)(7696005)(81166007)(26005)(426003)(2906002)(40460700003)(36860700001)(36756003)(47076005)(83380400001)(5660300002)(70206006)(70586007)(8676002)(4326008)(21314003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 09:36:53.0515
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: a61bb94d-58e2-4610-b20f-08da1230d2d5
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT035.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PR3PR08MB5707

Today when a domain unpopulates the memory on runtime, they will always
hand the memory over to the heap allocator. And it will be a problem if domain
on static allocation.Since guest RAM for domain on static allocation is
static memory, which is pre-reserved through domain congifuration, it shall
never go back to heap.

This patch serie intends to fix this issue, by keeping page allocated and
storing it in page list when unpopulating memory, and retrieving page from page
list when populating memory.

Penny Zheng (5):
  xen/arm: field "flags" to cover all internal CDF_XXX
  xen/arm: introduce CDF_staticmem
  xen/arm: unpopulate memory when domain on static allocation
  xen/arm: retrieve reserved pages on populate_physmap
  xen/arm: no need to store pages in resv_page_list when domain is
    directly mapped

 xen/arch/arm/domain.c             |  3 ++-
 xen/arch/arm/domain_build.c       |  5 +++-
 xen/arch/arm/include/asm/domain.h |  7 +++--
 xen/common/domain.c               |  4 +++
 xen/common/memory.c               | 45 ++++++++++++++++++++++++++++++-
 xen/include/xen/domain.h          |  2 ++
 xen/include/xen/sched.h           |  6 +++++
 7 files changed, 67 insertions(+), 5 deletions(-)

-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 09:37:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 09:37:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296119.504030 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZUlk-0000Ne-RQ; Wed, 30 Mar 2022 09:37:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296119.504030; Wed, 30 Mar 2022 09:37:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZUlk-0000NX-NA; Wed, 30 Mar 2022 09:37:36 +0000
Received: by outflank-mailman (input) for mailman id 296119;
 Wed, 30 Mar 2022 09:37:35 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=u124=UJ=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nZUlj-0000Fm-35
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 09:37:35 +0000
Received: from EUR03-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur03on061f.outbound.protection.outlook.com
 [2a01:111:f400:fe0a::61f])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 061e665d-b00d-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 11:37:33 +0200 (CEST)
Received: from DU2P250CA0007.EURP250.PROD.OUTLOOK.COM (2603:10a6:10:231::12)
 by AM4PR0802MB2211.eurprd08.prod.outlook.com (2603:10a6:200:5e::9) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.18; Wed, 30 Mar
 2022 09:37:26 +0000
Received: from DB5EUR03FT012.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:231:cafe::87) by DU2P250CA0007.outlook.office365.com
 (2603:10a6:10:231::12) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.13 via Frontend
 Transport; Wed, 30 Mar 2022 09:37:26 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT012.mail.protection.outlook.com (10.152.20.161) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Wed, 30 Mar 2022 09:37:26 +0000
Received: ("Tessian outbound 826a6d8e58c3:v113");
 Wed, 30 Mar 2022 09:37:26 +0000
Received: from ab1cb7758456.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 CF3A45DD-2CBE-47D9-9F06-2B0A9C3837B1.1; 
 Wed, 30 Mar 2022 09:37:18 +0000
Received: from EUR02-VE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id ab1cb7758456.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Wed, 30 Mar 2022 09:37:18 +0000
Received: from AM6P194CA0102.EURP194.PROD.OUTLOOK.COM (2603:10a6:209:8f::43)
 by AM0PR08MB3954.eurprd08.prod.outlook.com (2603:10a6:208:130::13) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.18; Wed, 30 Mar
 2022 09:37:16 +0000
Received: from AM5EUR03FT037.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:8f:cafe::c) by AM6P194CA0102.outlook.office365.com
 (2603:10a6:209:8f::43) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17 via Frontend
 Transport; Wed, 30 Mar 2022 09:37:16 +0000
Received: from nebula.arm.com (40.67.248.234) by
 AM5EUR03FT037.mail.protection.outlook.com (10.152.17.241) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5102.18 via Frontend Transport; Wed, 30 Mar 2022 09:37:16 +0000
Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX04.Arm.com
 (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27; Wed, 30 Mar
 2022 09:37:11 +0000
Received: from a011292.shanghai.arm.com (10.169.190.94) by mail.arm.com
 (10.251.24.32) with Microsoft SMTP Server id 15.1.2308.27 via Frontend
 Transport; Wed, 30 Mar 2022 09:37:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 061e665d-b00d-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=mLwBeL3HiizwBwJEJZAokUo9XslH5YOwT1NuUQp5TDI=;
 b=OEyDjSp4hWDbIZaBatyhohvFRxs7CXrAqk0iHzScj/Ud58VLP0uW7JuP+QzKS12P+4kLseGgov3haNaI/3gT68aYr5ckeC1hzyITaWE6P8rgdoOHCH3s1rPFfCH781T+PZMhRPy9z3Sl47c2ny+Yq69K+SuojA4+YmLxsXgxDKE=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 6eb2069c4d4ff3f8
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=C7PNs4ZzMXRQJ9bJjdia+W14BqFGHrVigoIxELq6ATVcMmirBrgZte7WwDSa8wdyQCc5JQ0MnmgUJfPw3tBrCnmv8Es5R+U98jYFs8KYT8vNlm7+0W9rB0MQ6OzYK5tGDmRDl54UkJKUWwhnv8CPCqmfAjYqriFs6sTeXTxOU3OR726DSnsQWCoMFuKlTE4Qae35ld8vGjjXQEs1Nus5xnCs5C/Jufr6nHzR8WKCkmN9MaYHAn2bQ0lqB2r++X9hjtclv9+Y/793LfKXr5ZFv00c7Rsyvj3BzKKnpmq/I6v7Ro22+RTuraXPvNXkJbhUSnbTqY2wqllNhmQc8W58ow==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=mLwBeL3HiizwBwJEJZAokUo9XslH5YOwT1NuUQp5TDI=;
 b=CgMJDWamaw0cXv6Nhc5aO+jPUEdJ685nDeR8cEvuhV3ZloDsxAW5zPAyk3UfQVp6YAswzEhJxsOOVtRiS5a0TFLVP3kTM3rvg3wlYRaAJQ61irbkhL4phR3l1fO8P4svn7efkTAS8UcT/wdwrCdFFlmLL4dZne+mHkfISnRGiknHuX/ECT17U/tCLogLMBq3tnAif6jp0TVCskO798sFSm8STw5kNMLDhIld5JK2vgrLnSn9MIAcbIKdi2NnPl26LE8TO7XKsEOPQNHfeBImgQg2LqljmWtn0Chnf2RfSAxgy9jJRqFU+il0KsCPXyqx7jhtfB/wpNpnbHK4PfhInw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 40.67.248.234) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=mLwBeL3HiizwBwJEJZAokUo9XslH5YOwT1NuUQp5TDI=;
 b=OEyDjSp4hWDbIZaBatyhohvFRxs7CXrAqk0iHzScj/Ud58VLP0uW7JuP+QzKS12P+4kLseGgov3haNaI/3gT68aYr5ckeC1hzyITaWE6P8rgdoOHCH3s1rPFfCH781T+PZMhRPy9z3Sl47c2ny+Yq69K+SuojA4+YmLxsXgxDKE=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234)
 smtp.mailfrom=arm.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 40.67.248.234 as permitted sender) receiver=protection.outlook.com;
 client-ip=40.67.248.234; helo=nebula.arm.com;
From: Penny Zheng <Penny.Zheng@arm.com>
To: <xen-devel@lists.xenproject.org>
CC: <wei.chen@arm.com>, <henry.wang@arm.com>, Penny Zheng
	<Penny.Zheng@arm.com>, Stefano Stabellini <sstabellini@kernel.org>, "Julien
 Grall" <julien@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, "Jan
 Beulich" <jbeulich@suse.com>, Wei Liu <wl@xen.org>, Penny Zheng
	<penny.zheng@arm.com>
Subject: [PATCH v1 2/5] xen/arm: introduce CDF_staticmem
Date: Wed, 30 Mar 2022 17:36:14 +0800
Message-ID: <20220330093617.3870589-3-Penny.Zheng@arm.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <20220330093617.3870589-1-Penny.Zheng@arm.com>
References: <20220330093617.3870589-1-Penny.Zheng@arm.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain
X-EOPAttributedMessage: 1
X-MS-Office365-Filtering-Correlation-Id: 5eb5d2db-237b-4de9-94e9-08da1230e692
X-MS-TrafficTypeDiagnostic:
	AM0PR08MB3954:EE_|DB5EUR03FT012:EE_|AM4PR0802MB2211:EE_
X-Microsoft-Antispam-PRVS:
	<AM4PR0802MB22110E55626178685F4E568AF71F9@AM4PR0802MB2211.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
NoDisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(81166007)(2906002)(70206006)(5660300002)(356005)(2616005)(82310400004)(40460700003)(83380400001)(70586007)(316002)(4326008)(1076003)(8936002)(54906003)(426003)(36860700001)(36756003)(7696005)(336012)(86362001)(47076005)(6916009)(8676002)(508600001)(26005)(6666004)(186003)(36900700001);DIR:OUT;SFP:1101;
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB3954
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT012.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	c474861f-45dc-4cce-8d35-08da1230e099
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(36756003)(86362001)(6666004)(8936002)(4326008)(47076005)(5660300002)(508600001)(8676002)(81166007)(70206006)(70586007)(7696005)(426003)(36860700001)(1076003)(316002)(54906003)(6916009)(82310400004)(2906002)(336012)(186003)(26005)(40460700003)(2616005)(83380400001);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 09:37:26.2442
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 5eb5d2db-237b-4de9-94e9-08da1230e692
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT012.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR0802MB2211

In order to have an easy and quick way to find out whether this domain is
on static allocation, this commit introduces a new flag CDF_staticmem and a
new helper is_domain_on_static_allocation.

Signed-off-by: Penny Zheng <penny.zheng@arm.com>
---
 xen/arch/arm/domain_build.c       | 5 ++++-
 xen/arch/arm/include/asm/domain.h | 2 ++
 xen/include/xen/domain.h          | 2 ++
 3 files changed, 8 insertions(+), 1 deletion(-)

diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index 8be01678de..4e62fd0bf1 100644
--- a/xen/arch/arm/domain_build.c
+++ b/xen/arch/arm/domain_build.c
@@ -3191,9 +3191,12 @@ void __init create_domUs(void)
         if ( !dt_device_is_compatible(node, "xen,domain") )
             continue;
 
+        if ( dt_find_property(node, "xen,static-mem", NULL) )
+            flags |= CDF_staticmem;
+
         if ( dt_property_read_bool(node, "direct-map") )
         {
-            if ( !IS_ENABLED(CONFIG_STATIC_MEMORY) || !dt_find_property(node, "xen,static-mem", NULL) )
+            if ( !IS_ENABLED(CONFIG_STATIC_MEMORY) || !(flags & CDF_staticmem) )
                 panic("direct-map is not valid for domain %s without static allocation.\n",
                       dt_node_name(node));
 
diff --git a/xen/arch/arm/include/asm/domain.h b/xen/arch/arm/include/asm/domain.h
index 95fef29111..4379f20a12 100644
--- a/xen/arch/arm/include/asm/domain.h
+++ b/xen/arch/arm/include/asm/domain.h
@@ -31,6 +31,8 @@ enum domain_type {
 
 #define is_domain_direct_mapped(d) (((d)->arch.flags) & CDF_directmap)
 
+#define is_domain_on_static_allocation(d) (((d)->arch.flags) & CDF_staticmem)
+
 /*
  * Is the domain using the host memory layout?
  *
diff --git a/xen/include/xen/domain.h b/xen/include/xen/domain.h
index 1c3c88a14d..35dc7143a4 100644
--- a/xen/include/xen/domain.h
+++ b/xen/include/xen/domain.h
@@ -34,6 +34,8 @@ void arch_get_domain_info(const struct domain *d,
 #ifdef CONFIG_ARM
 /* Should domain memory be directly mapped? */
 #define CDF_directmap            (1U << 1)
+/* Is domain memory on static allocation? */
+#define CDF_staticmem            (1U << 2)
 #endif
 
 /*
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 09:37:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 09:37:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296123.504041 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZUly-0000pC-7G; Wed, 30 Mar 2022 09:37:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296123.504041; Wed, 30 Mar 2022 09:37:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZUly-0000p0-40; Wed, 30 Mar 2022 09:37:50 +0000
Received: by outflank-mailman (input) for mailman id 296123;
 Wed, 30 Mar 2022 09:37:48 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=u124=UJ=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nZUlw-0000Fm-E5
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 09:37:48 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on2061c.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::61c])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 0ed4d611-b00d-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 11:37:47 +0200 (CEST)
Received: from AS9PR06CA0073.eurprd06.prod.outlook.com (2603:10a6:20b:464::17)
 by VE1PR08MB4861.eurprd08.prod.outlook.com (2603:10a6:802:a5::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.19; Wed, 30 Mar
 2022 09:37:35 +0000
Received: from VE1EUR03FT018.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:464:cafe::76) by AS9PR06CA0073.outlook.office365.com
 (2603:10a6:20b:464::17) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.13 via Frontend
 Transport; Wed, 30 Mar 2022 09:37:35 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT018.mail.protection.outlook.com (10.152.18.135) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Wed, 30 Mar 2022 09:37:34 +0000
Received: ("Tessian outbound 826a6d8e58c3:v113");
 Wed, 30 Mar 2022 09:37:34 +0000
Received: from a861ce71bd4d.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 7EC18895-6DA7-4026-AC93-A4274A7F2B58.1; 
 Wed, 30 Mar 2022 09:37:26 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id a861ce71bd4d.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Wed, 30 Mar 2022 09:37:26 +0000
Received: from DU2PR04CA0153.eurprd04.prod.outlook.com (2603:10a6:10:2b0::8)
 by AM9PR08MB7014.eurprd08.prod.outlook.com (2603:10a6:20b:41b::6) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.19; Wed, 30 Mar
 2022 09:37:24 +0000
Received: from DB5EUR03FT013.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:2b0:cafe::e7) by DU2PR04CA0153.outlook.office365.com
 (2603:10a6:10:2b0::8) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.13 via Frontend
 Transport; Wed, 30 Mar 2022 09:37:24 +0000
Received: from nebula.arm.com (40.67.248.234) by
 DB5EUR03FT013.mail.protection.outlook.com (10.152.20.105) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5102.18 via Frontend Transport; Wed, 30 Mar 2022 09:37:23 +0000
Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX03.Arm.com
 (10.251.24.31) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27; Wed, 30 Mar
 2022 09:36:59 +0000
Received: from a011292.shanghai.arm.com (10.169.190.94) by mail.arm.com
 (10.251.24.32) with Microsoft SMTP Server id 15.1.2308.27 via Frontend
 Transport; Wed, 30 Mar 2022 09:36:51 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0ed4d611-b00d-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=tUQ3cl6p5PyL7bKJEli7MfTrbAhvi8uIycMc+ch+Fi8=;
 b=PnMuhDzUw7XGckigOXqBlUiPTc2uQ40Yxkk035hwxB6axL4ScInmZoILiZqkvE3u5veY/HbXXR8bmOsRcw7jcO83t0uKb7efMfd840699uim79hVnyQ62EMXVKuTtww/Y2RQh/9GWfBfQPW23F65Ud3r5bn4OmDTXxz8B4jtlCc=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: c3d9b65d0ef536fb
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=cQDUiSdVqkEeooN6yHjMkXa5euxhYvIYlV53Vf9ULF1mrUKlhSdV3gFeSqp5iTPrFfswbGgcNLkLNWkXwWVQ4kLCGYoEfkP9JxQeKJ4ULl4vgedj9hxkQF19cgKmTE+iScQ3QuZBRXlqMEvo+0F1jBhb9qu7j/mRF6aeX1A7LwTKB3/3MdyybYrgywOwefysMyUk8CY/Z3eYeK3ywE6a5cRmmELwhJOTARDPGQv8CA7xOMSsrMgz8hyUUAFrjlPXKFxAoQ6DipgzuNXl4vj2dskzd/tyBjlzASpDWg5718dGBXUlCodyeGRzK6knLLgShOMUV6kaZGmkYCdxDSn71w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=tUQ3cl6p5PyL7bKJEli7MfTrbAhvi8uIycMc+ch+Fi8=;
 b=aRH8fsZjkLBQO/iui6kFCWYJRlz1of2foj+3Ou2i27t0TWdJHktVkXaqbYC7thTIKwRUKjpdQoM0CBOAdrLVk3zKe5l3Wa0fRbK+b/02g7xgFp6TbA1iMpXzv06tNmjdQt8pcsl9krI4MZm4lGz5pa9GJpKrIhSMJ2MZZ/tVqtkQ7IOpQ+tmJ8EX/L6aaFBMyM2hhTckRPjGcuP+9Nce0XK44xwpcmQ8NENdj2kfmDJxtwZzLIUYcq1pMpoV38qZmEQwQT4fK1uL0/X5zCw7IV6c3pFmXih3UjvRuSo5J+3J3WoZHjiD04XOV2S3Eb/gNoazC2vzBT68iHxIAoZhGw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 40.67.248.234) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=tUQ3cl6p5PyL7bKJEli7MfTrbAhvi8uIycMc+ch+Fi8=;
 b=PnMuhDzUw7XGckigOXqBlUiPTc2uQ40Yxkk035hwxB6axL4ScInmZoILiZqkvE3u5veY/HbXXR8bmOsRcw7jcO83t0uKb7efMfd840699uim79hVnyQ62EMXVKuTtww/Y2RQh/9GWfBfQPW23F65Ud3r5bn4OmDTXxz8B4jtlCc=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234)
 smtp.mailfrom=arm.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 40.67.248.234 as permitted sender) receiver=protection.outlook.com;
 client-ip=40.67.248.234; helo=nebula.arm.com;
From: Penny Zheng <Penny.Zheng@arm.com>
To: <xen-devel@lists.xenproject.org>
CC: <wei.chen@arm.com>, <henry.wang@arm.com>, Penny Zheng
	<Penny.Zheng@arm.com>, Stefano Stabellini <sstabellini@kernel.org>, "Julien
 Grall" <julien@xen.org>, Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, Penny Zheng
	<penny.zheng@arm.com>
Subject: [PATCH v1 1/5] xen/arm: field "flags" to cover all internal CDF_XXX
Date: Wed, 30 Mar 2022 17:36:13 +0800
Message-ID: <20220330093617.3870589-2-Penny.Zheng@arm.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <20220330093617.3870589-1-Penny.Zheng@arm.com>
References: <20220330093617.3870589-1-Penny.Zheng@arm.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain
X-EOPAttributedMessage: 1
X-MS-Office365-Filtering-Correlation-Id: 4fb68276-2cb6-4d87-339a-08da1230eb79
X-MS-TrafficTypeDiagnostic:
	AM9PR08MB7014:EE_|VE1EUR03FT018:EE_|VE1PR08MB4861:EE_
X-Microsoft-Antispam-PRVS:
	<VE1PR08MB4861C0BD8A7AB1D2FD83C4F7F71F9@VE1PR08MB4861.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
NoDisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(70206006)(2616005)(70586007)(47076005)(40460700003)(8676002)(336012)(186003)(82310400004)(26005)(1076003)(83380400001)(426003)(81166007)(356005)(5660300002)(316002)(36860700001)(8936002)(2906002)(86362001)(6666004)(4326008)(36756003)(7696005)(6916009)(508600001)(54906003)(21314003)(36900700001);DIR:OUT;SFP:1101;
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR08MB7014
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT018.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	a096aa1f-165f-4adb-8b3c-08da1230e50f
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(508600001)(81166007)(86362001)(6666004)(82310400004)(316002)(54906003)(6916009)(47076005)(5660300002)(83380400001)(7696005)(36860700001)(4326008)(8676002)(186003)(70586007)(40460700003)(8936002)(2906002)(2616005)(70206006)(336012)(36756003)(26005)(426003)(1076003)(21314003);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 09:37:34.3728
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 4fb68276-2cb6-4d87-339a-08da1230eb79
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT018.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR08MB4861

With more and more CDF_xxx internal flags in and to save the space, this
commit introduces a new field "flags" to store CDF_* internal flags
directly.

Another new CDF_xxx will be introduced in the next patch.

Signed-off-by: Penny Zheng <penny.zheng@arm.com>
---
 xen/arch/arm/domain.c             | 3 ++-
 xen/arch/arm/include/asm/domain.h | 5 +++--
 2 files changed, 5 insertions(+), 3 deletions(-)

diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
index 8110c1df86..35c157d499 100644
--- a/xen/arch/arm/domain.c
+++ b/xen/arch/arm/domain.c
@@ -709,7 +709,8 @@ int arch_domain_create(struct domain *d,
     ioreq_domain_init(d);
 #endif
 
-    d->arch.directmap = flags & CDF_directmap;
+    /* Holding CDF_* internal flags. */
+    d->arch.flags = flags;
 
     /* p2m_init relies on some value initialized by the IOMMU subsystem */
     if ( (rc = iommu_domain_init(d, config->iommu_opts)) != 0 )
diff --git a/xen/arch/arm/include/asm/domain.h b/xen/arch/arm/include/asm/domain.h
index ed63c2b6f9..95fef29111 100644
--- a/xen/arch/arm/include/asm/domain.h
+++ b/xen/arch/arm/include/asm/domain.h
@@ -29,7 +29,7 @@ enum domain_type {
 #define is_64bit_domain(d) (0)
 #endif
 
-#define is_domain_direct_mapped(d) (d)->arch.directmap
+#define is_domain_direct_mapped(d) (((d)->arch.flags) & CDF_directmap)
 
 /*
  * Is the domain using the host memory layout?
@@ -103,7 +103,8 @@ struct arch_domain
     void *tee;
 #endif
 
-    bool directmap;
+    /* Holding CDF_* constant. Internal flags for domain creation. */
+    uint32_t flags;
 }  __cacheline_aligned;
 
 struct arch_vcpu
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 09:37:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 09:37:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296127.504052 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZUm7-0001Eb-FM; Wed, 30 Mar 2022 09:37:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296127.504052; Wed, 30 Mar 2022 09:37:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZUm7-0001EU-Bw; Wed, 30 Mar 2022 09:37:59 +0000
Received: by outflank-mailman (input) for mailman id 296127;
 Wed, 30 Mar 2022 09:37:58 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=u124=UJ=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nZUm5-0000ky-RF
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 09:37:58 +0000
Received: from EUR01-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur01on062a.outbound.protection.outlook.com
 [2a01:111:f400:fe02::62a])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 14366c13-b00d-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 11:37:57 +0200 (CEST)
Received: from DU2PR04CA0024.eurprd04.prod.outlook.com (2603:10a6:10:3b::29)
 by PAXPR08MB6400.eurprd08.prod.outlook.com (2603:10a6:102:150::24) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17; Wed, 30 Mar
 2022 09:37:54 +0000
Received: from DB5EUR03FT042.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:3b:cafe::51) by DU2PR04CA0024.outlook.office365.com
 (2603:10a6:10:3b::29) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.13 via Frontend
 Transport; Wed, 30 Mar 2022 09:37:54 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT042.mail.protection.outlook.com (10.152.21.123) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Wed, 30 Mar 2022 09:37:54 +0000
Received: ("Tessian outbound 341d209a0e52:v113");
 Wed, 30 Mar 2022 09:37:54 +0000
Received: from 539857bee079.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 AF0D191D-D72A-40A2-8C78-FAC784AF9DBC.1; 
 Wed, 30 Mar 2022 09:37:47 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 539857bee079.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Wed, 30 Mar 2022 09:37:47 +0000
Received: from DB6PR07CA0166.eurprd07.prod.outlook.com (2603:10a6:6:43::20) by
 AM9PR08MB6691.eurprd08.prod.outlook.com (2603:10a6:20b:303::18) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.16; Wed, 30 Mar
 2022 09:37:45 +0000
Received: from DB5EUR03FT020.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:6:43:cafe::81) by DB6PR07CA0166.outlook.office365.com
 (2603:10a6:6:43::20) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.12 via Frontend
 Transport; Wed, 30 Mar 2022 09:37:45 +0000
Received: from nebula.arm.com (40.67.248.234) by
 DB5EUR03FT020.mail.protection.outlook.com (10.152.20.134) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5102.18 via Frontend Transport; Wed, 30 Mar 2022 09:37:44 +0000
Received: from AZ-NEU-EX01.Emea.Arm.com (10.251.26.4) by AZ-NEU-EX03.Arm.com
 (10.251.24.31) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.2308.27; Wed, 30 Mar
 2022 09:37:24 +0000
Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX01.Emea.Arm.com
 (10.251.26.4) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2308.27; Wed, 30
 Mar 2022 09:37:19 +0000
Received: from a011292.shanghai.arm.com (10.169.190.94) by mail.arm.com
 (10.251.24.32) with Microsoft SMTP Server id 15.1.2308.27 via Frontend
 Transport; Wed, 30 Mar 2022 09:37:14 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 14366c13-b00d-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=csxfLE0x7VKw62ppqcl6atLmZHiQeVO09K5L2Np5/LY=;
 b=DWdv1J5MV/Aog1VTNYy1g1/XbQHjXvbGgAdBB0f/x/1isRsNL0GeSLQy5HlaGq+DCnrQ2aTbqoJW7A0PERpU6JeOFGhVS/9f6hpUUOc0/biTNImAbf3tpQYZXtf7lxcBxR/Ax15xu7v93gsdvtnn3WmD/H8zFZdlgzcMRB9DOa8=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 9516156d429fe3dc
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=jbZbPE5LUTjr5AesxfhBYIllkvVTgD+kgEwBBzMo2q/3X2rWDArSYh5JMplIjeuIni2yn+jdiN7XZIpgW8gVtJ0S816W2vzVBLIhBB40UXg97ISdgXwFM7G98MV2EKu3EFuOarmFeXwRXKeIZ5Rvwpp02M+wsL8gdPeSWjfTTITVOv9nQBrx2QxwUqPLkftYAHIAVMjW6etJULHPcMBJedg8NW4LKYz05WjBP17SNIrtYTIgOLA3aAtovpBhmFOJVBeMtPmHVuCZf2g6Oo16ZbHLI3rhh/QRXooB40wDi5v4ScIZUVvb8HbzNNQLuPGUX/kmlMX/Tv2pWJUIR8DDGQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=csxfLE0x7VKw62ppqcl6atLmZHiQeVO09K5L2Np5/LY=;
 b=YTYIsrFNhHI8mKBd+8BG0RmxHo4BUI1eV6WBEV3i49TtvDWDJYmo2OmcILBq8E3nLKPR2MAH5fQenB2ni7aikV7CPRvQP9CE6vkVNt4FjMMpXbw/NK5dJ8edoeYRhPfb0/SbQAQ3Zbt7UcQix7RxWI4yjkdQFr8K/Xo4H4aDSAlQorp18msudvRD/ggpBSXMYi4Dicgfgpxk1dxofqAjJzKiUdZvE7LWacohih1GEmPLkBWyo9LbyvwCZSTWNDTJ/gd2dcUW0abfV/EjYpsnrHe/pMYxC/947S20uk0SNhyG/hS+ZWxAwfwN0jqid7KI3ipv9eRiqSfsVEgJkuo6zg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 40.67.248.234) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=csxfLE0x7VKw62ppqcl6atLmZHiQeVO09K5L2Np5/LY=;
 b=DWdv1J5MV/Aog1VTNYy1g1/XbQHjXvbGgAdBB0f/x/1isRsNL0GeSLQy5HlaGq+DCnrQ2aTbqoJW7A0PERpU6JeOFGhVS/9f6hpUUOc0/biTNImAbf3tpQYZXtf7lxcBxR/Ax15xu7v93gsdvtnn3WmD/H8zFZdlgzcMRB9DOa8=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234)
 smtp.mailfrom=arm.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 40.67.248.234 as permitted sender) receiver=protection.outlook.com;
 client-ip=40.67.248.234; helo=nebula.arm.com;
From: Penny Zheng <Penny.Zheng@arm.com>
To: <xen-devel@lists.xenproject.org>
CC: <wei.chen@arm.com>, <henry.wang@arm.com>, Penny Zheng
	<Penny.Zheng@arm.com>, Andrew Cooper <andrew.cooper3@citrix.com>, "George
 Dunlap" <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, "Julien
 Grall" <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, Wei Liu
	<wl@xen.org>, Penny Zheng <penny.zheng@arm.com>
Subject: [PATCH v1 3/5] xen/arm: unpopulate memory when domain on static allocation
Date: Wed, 30 Mar 2022 17:36:15 +0800
Message-ID: <20220330093617.3870589-4-Penny.Zheng@arm.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <20220330093617.3870589-1-Penny.Zheng@arm.com>
References: <20220330093617.3870589-1-Penny.Zheng@arm.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain
X-EOPAttributedMessage: 1
X-MS-Office365-Filtering-Correlation-Id: daf6ab2a-af7c-4ecd-aeab-08da1230f76f
X-MS-TrafficTypeDiagnostic:
	AM9PR08MB6691:EE_|DB5EUR03FT042:EE_|PAXPR08MB6400:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR08MB6400DAB09293A27C4AD8936FF71F9@PAXPR08MB6400.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
NoDisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(1076003)(186003)(6916009)(54906003)(8676002)(316002)(508600001)(81166007)(86362001)(40460700003)(82310400004)(26005)(2616005)(7696005)(356005)(36860700001)(4326008)(8936002)(5660300002)(426003)(70206006)(336012)(70586007)(2906002)(83380400001)(36756003)(47076005)(36900700001);DIR:OUT;SFP:1101;
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR08MB6691
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT042.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	44810791-68b6-429e-9110-08da1230f1b6
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(36840700001)(46966006)(5660300002)(508600001)(26005)(2616005)(316002)(7696005)(186003)(336012)(36860700001)(86362001)(82310400004)(1076003)(8936002)(40460700003)(70206006)(47076005)(426003)(81166007)(4326008)(83380400001)(70586007)(8676002)(54906003)(36756003)(2906002)(6916009);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 09:37:54.5368
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: daf6ab2a-af7c-4ecd-aeab-08da1230f76f
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT042.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB6400

Today when a domain unpopulates the memory on runtime, they will always
hand the memory over to the heap allocator. And it will be a problem if domain
on static allocation.

Guest RAM for domain on static allocation is static memory, which is reserved
to only this domain, so it shall never go back to heap.

For above purpose, this commit tries to keep page allocated and store it
in page list d->resv_page_list on guest_remove_page, when domain on
static allocation.

Signed-off-by: Penny Zheng <penny.zheng@arm.com>
---
 xen/common/domain.c     |  4 ++++
 xen/common/memory.c     | 22 +++++++++++++++++++++-
 xen/include/xen/sched.h |  6 ++++++
 3 files changed, 31 insertions(+), 1 deletion(-)

diff --git a/xen/common/domain.c b/xen/common/domain.c
index 351029f8b2..e572f27fce 100644
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -602,6 +602,10 @@ struct domain *domain_create(domid_t domid,
     INIT_PAGE_LIST_HEAD(&d->page_list);
     INIT_PAGE_LIST_HEAD(&d->extra_page_list);
     INIT_PAGE_LIST_HEAD(&d->xenpage_list);
+#ifdef CONFIG_STATIC_MEMORY
+    INIT_PAGE_LIST_HEAD(&d->resv_page_list);
+#endif
+
 
     spin_lock_init(&d->node_affinity_lock);
     d->node_affinity = NODE_MASK_ALL;
diff --git a/xen/common/memory.c b/xen/common/memory.c
index 69b0cd1e50..2afc3c6f10 100644
--- a/xen/common/memory.c
+++ b/xen/common/memory.c
@@ -35,6 +35,10 @@
 #include <asm/guest.h>
 #endif
 
+#ifndef is_domain_on_static_allocation
+#define is_domain_on_static_allocation(d) 0
+#endif
+
 struct memop_args {
     /* INPUT */
     struct domain *domain;     /* Domain to be affected. */
@@ -405,13 +409,29 @@ int guest_remove_page(struct domain *d, unsigned long gmfn)
      * device must retrieve the same pfn when the hypercall populate_physmap
      * is called.
      *
+     * When domain on static allocation, they should always get pages from the
+     * reserved static region when the hypercall populate_physmap is called.
+     *
      * For this purpose (and to match populate_physmap() behavior), the page
      * is kept allocated.
      */
-    if ( !rc && !is_domain_direct_mapped(d) )
+    if ( !rc && !(is_domain_direct_mapped(d) ||
+                  is_domain_on_static_allocation(d)) )
         put_page_alloc_ref(page);
 
     put_page(page);
+#ifdef CONFIG_STATIC_MEMORY
+    /*
+     * When domain on static allocation, we shall store pages to resv_page_list,
+     * so the hypercall populate_physmap could retrieve pages from it,
+     * rather than allocating from heap.
+     */
+    if ( is_domain_on_static_allocation(d) )
+    {
+        page_list_add_tail(page, &d->resv_page_list);
+        d->resv_pages++;
+    }
+#endif
 
 #ifdef CONFIG_X86
  out_put_gfn:
diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
index 406d9bc610..d7e047bf36 100644
--- a/xen/include/xen/sched.h
+++ b/xen/include/xen/sched.h
@@ -376,6 +376,9 @@ struct domain
     struct page_list_head page_list;  /* linked list */
     struct page_list_head extra_page_list; /* linked list (size extra_pages) */
     struct page_list_head xenpage_list; /* linked list (size xenheap_pages) */
+#ifdef CONFIG_STATIC_MEMORY
+    struct page_list_head resv_page_list; /* linked list (size resv_pages) */
+#endif
 
     /*
      * This field should only be directly accessed by domain_adjust_tot_pages()
@@ -389,6 +392,9 @@ struct domain
     unsigned int     extra_pages;       /* pages not included in domain_tot_pages() */
     atomic_t         shr_pages;         /* shared pages */
     atomic_t         paged_pages;       /* paged-out pages */
+#ifdef CONFIG_STATIC_MEMORY
+    unsigned int     resv_pages;        /* reserved pages from static region. */
+#endif
 
     /* Scheduling. */
     void            *sched_priv;    /* scheduler-specific data */
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 09:38:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 09:38:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296135.504063 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZUmV-00021Q-P7; Wed, 30 Mar 2022 09:38:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296135.504063; Wed, 30 Mar 2022 09:38:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZUmV-00021H-Lr; Wed, 30 Mar 2022 09:38:23 +0000
Received: by outflank-mailman (input) for mailman id 296135;
 Wed, 30 Mar 2022 09:38:22 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=u124=UJ=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nZUmU-0000Fm-Hs
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 09:38:22 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05on20611.outbound.protection.outlook.com
 [2a01:111:f400:7e1a::611])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2344ff12-b00d-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 11:38:21 +0200 (CEST)
Received: from AM6P195CA0069.EURP195.PROD.OUTLOOK.COM (2603:10a6:209:87::46)
 by AM0PR08MB3811.eurprd08.prod.outlook.com (2603:10a6:208:107::13) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.22; Wed, 30 Mar
 2022 09:38:18 +0000
Received: from VE1EUR03FT048.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:87:cafe::3a) by AM6P195CA0069.outlook.office365.com
 (2603:10a6:209:87::46) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17 via Frontend
 Transport; Wed, 30 Mar 2022 09:38:18 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT048.mail.protection.outlook.com (10.152.19.8) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Wed, 30 Mar 2022 09:38:17 +0000
Received: ("Tessian outbound 63bb5eb69ee8:v113");
 Wed, 30 Mar 2022 09:38:17 +0000
Received: from f961511ea16c.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 EC901C94-3FD1-4D61-9A00-815D65616AB8.1; 
 Wed, 30 Mar 2022 09:38:09 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id f961511ea16c.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Wed, 30 Mar 2022 09:38:09 +0000
Received: from AS9PR04CA0082.eurprd04.prod.outlook.com (2603:10a6:20b:48b::6)
 by DB7PR08MB4619.eurprd08.prod.outlook.com (2603:10a6:10:7d::31) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17; Wed, 30 Mar
 2022 09:38:06 +0000
Received: from AM5EUR03FT012.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:48b:cafe::5f) by AS9PR04CA0082.outlook.office365.com
 (2603:10a6:20b:48b::6) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.13 via Frontend
 Transport; Wed, 30 Mar 2022 09:38:06 +0000
Received: from nebula.arm.com (40.67.248.234) by
 AM5EUR03FT012.mail.protection.outlook.com (10.152.16.161) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5102.18 via Frontend Transport; Wed, 30 Mar 2022 09:38:05 +0000
Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX04.Arm.com
 (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27; Wed, 30 Mar
 2022 09:37:51 +0000
Received: from a011292.shanghai.arm.com (10.169.190.94) by mail.arm.com
 (10.251.24.32) with Microsoft SMTP Server id 15.1.2308.27 via Frontend
 Transport; Wed, 30 Mar 2022 09:37:42 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2344ff12-b00d-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=znsC665yGCk5zE8FKB/DjZh+uBcFbBobBpnEb5l3DdA=;
 b=T5KExU6oHi4JSE0FnI6i1LDFukEGvF3yDljyV/ClQl4BSHJBaNYi8qmldEre49q89L+A8MOXaMnxG5BqvQGrsTKsAw5XEyUQXz5BRK44W/OPS+BvtHn3C6gy2UOx1E7BDToKQAum9cS77F+oghWO+l1ZOh7YBI9xjKziw4srDWY=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: b2bc2a68fb15f2c0
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Ovnq9ej+sqptTfndfJ7i4RGgH+A+x+lub4O9pYc+98GrlUwuSWGCcA2aTfYy5uGP+FTAUW5uNaDE15rpQpBtHqgjKjNgqctQ4bogf+pSKH30Rghnh5k/b4tft0//ibsof5f1EjvRmzgln4alXXg/Tdh+wNGgLLGnfjikGMn4ApVoG5zHnKZI0UX6o5ebVGocXiTe/R2cTVRh6MGoPF/KlrKcQ8H40tnRdwwBPzSXgru0rrFNgz3i0nHrmcWxUNME8yVDIOKQGocF+1o4SQd/G9rJgd1n7Ez9V+HY1Wg9EaISkpuvXCSnFmWJQHibbUw5XrrpcFBZ1X3qismNkptFag==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=znsC665yGCk5zE8FKB/DjZh+uBcFbBobBpnEb5l3DdA=;
 b=bLMQP6Y+rsLDmjFa8qpakbCORiztYJJ+qLDH3qav4xhWCoJ2SZn/gs0OkMAba5BvYBkALO0N53DzJeC6oLOMPm44frFDTpC0jatvgEBbCnM354OQx4RHdcdVNHKj4CINqcLRqEsuf5xjjCezCZ310E1ZkcrraBEKdWp1b4wwpG53QcTukuHi7Fvlk1CMwqIoXouDx2sPSSrbvu+ceuf0kAa0dDAZyuHSvzynXcu0mqAxZpgNiFMU+DtRLbG0Yj48RS0ndYn9yO1njzjC4Q6BjMHP36fNm5PaPsh87+8fgCLaHlO2rfpr+VYhTShPfCqA24WYGh8dv37NcsRXy3KhQA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 40.67.248.234) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=znsC665yGCk5zE8FKB/DjZh+uBcFbBobBpnEb5l3DdA=;
 b=T5KExU6oHi4JSE0FnI6i1LDFukEGvF3yDljyV/ClQl4BSHJBaNYi8qmldEre49q89L+A8MOXaMnxG5BqvQGrsTKsAw5XEyUQXz5BRK44W/OPS+BvtHn3C6gy2UOx1E7BDToKQAum9cS77F+oghWO+l1ZOh7YBI9xjKziw4srDWY=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234)
 smtp.mailfrom=arm.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 40.67.248.234 as permitted sender) receiver=protection.outlook.com;
 client-ip=40.67.248.234; helo=nebula.arm.com;
From: Penny Zheng <Penny.Zheng@arm.com>
To: <xen-devel@lists.xenproject.org>
CC: <wei.chen@arm.com>, <henry.wang@arm.com>, Penny Zheng
	<Penny.Zheng@arm.com>, Andrew Cooper <andrew.cooper3@citrix.com>, "George
 Dunlap" <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, "Julien
 Grall" <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, Wei Liu
	<wl@xen.org>, Penny Zheng <penny.zheng@arm.com>
Subject: [PATCH v1 5/5] xen/arm: no need to store pages in resv_page_list when domain is directly mapped
Date: Wed, 30 Mar 2022 17:36:17 +0800
Message-ID: <20220330093617.3870589-6-Penny.Zheng@arm.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <20220330093617.3870589-1-Penny.Zheng@arm.com>
References: <20220330093617.3870589-1-Penny.Zheng@arm.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain
X-EOPAttributedMessage: 1
X-MS-Office365-Filtering-Correlation-Id: 62a3db76-fa7c-4824-0689-08da12310550
X-MS-TrafficTypeDiagnostic:
	DB7PR08MB4619:EE_|VE1EUR03FT048:EE_|AM0PR08MB3811:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR08MB3811A57B23F9E06ECAF96E74F71F9@AM0PR08MB3811.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
NoDisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(82310400004)(8936002)(70586007)(70206006)(4326008)(508600001)(86362001)(2906002)(54906003)(6666004)(316002)(40460700003)(5660300002)(7696005)(8676002)(426003)(336012)(47076005)(83380400001)(36860700001)(2616005)(6916009)(356005)(186003)(81166007)(36756003)(1076003)(26005)(36900700001);DIR:OUT;SFP:1101;
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR08MB4619
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT048.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	dccf726f-824f-47c1-2657-08da1230fdb9
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(6666004)(86362001)(8936002)(508600001)(5660300002)(36756003)(4326008)(8676002)(81166007)(47076005)(7696005)(70206006)(70586007)(316002)(1076003)(36860700001)(2906002)(54906003)(6916009)(82310400004)(336012)(186003)(26005)(426003)(2616005)(40460700003)(83380400001);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 09:38:17.7116
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 62a3db76-fa7c-4824-0689-08da12310550
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT048.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB3811

When domain on static allocation and is directly mapped, in terms of
GPA == HPA(guest physical address == host physical address), we could use
mfn_to_page() to easily find the page, so there is no need to store pages
in resv_page_list.

Signed-off-by: Penny Zheng <penny.zheng@arm.com>
---
 xen/common/memory.c | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/xen/common/memory.c b/xen/common/memory.c
index 2122ceeba7..2865e09a33 100644
--- a/xen/common/memory.c
+++ b/xen/common/memory.c
@@ -445,8 +445,11 @@ int guest_remove_page(struct domain *d, unsigned long gmfn)
      * When domain on static allocation, we shall store pages to resv_page_list,
      * so the hypercall populate_physmap could retrieve pages from it,
      * rather than allocating from heap.
+     * No need to store pages in resv_page_list when domain on static
+     * allocation and directly mapped, since we could use mfn_to_page() to
+     * easily find the page.
      */
-    if ( is_domain_on_static_allocation(d) )
+    if ( is_domain_on_static_allocation(d) && !is_domain_direct_mapped(d) )
     {
         page_list_add_tail(page, &d->resv_page_list);
         d->resv_pages++;
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 09:40:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 09:40:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296153.504078 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZUp1-0003nn-Dr; Wed, 30 Mar 2022 09:40:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296153.504078; Wed, 30 Mar 2022 09:40:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZUp1-0003ng-9d; Wed, 30 Mar 2022 09:40:59 +0000
Received: by outflank-mailman (input) for mailman id 296153;
 Wed, 30 Mar 2022 09:40:58 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ZQ0c=UJ=citrix.com=prvs=08136f46d=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nZUp0-0003nK-30
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 09:40:58 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 7df7cb0c-b00d-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 11:40:56 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 7df7cb0c-b00d-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648633255;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=6o5qA4346uoHHGfScy1463N2He1BRwPdpWUAKmUOriw=;
  b=XbR2w2svsPAPmTmY1Oo+kE2290evEtej7rCvqwnBSNwWTJpJTGnclCOu
   Ty2jL6CNXqHbZT8ylqlIPZ0LtHn7Ks7pyXogys+z8dKcZvM7TfMkZcL43
   kMrfRNqUBdP+8kbO/zACI7qXgpe3xAcRxInc4dnR51QsZhJqmtiMkVuwz
   U=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67534225
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:W6TutKpvisXIH/0fMkSAH/UnzM5eBmKHZRIvgKrLsJaIsI4StFCzt
 garIBnQP/qLYmvzfdkjYYSz8ksCupLcm9Q1G1Fv+C08RX5B9ZuZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 ouq+aUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBOZXphesYcCRkPCA5M/0B06WeJ3fkvpnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVI1zbWAOxgWZnea67L+cVZzHE7gcUm8fP2O
 ZVEMmY1NkmojxtnYg8KCY85kM6Ut1ahdiBYtFCsnKgM7D2GpOB2+Oe0a4eEEjCQfu1Kmm6Iq
 2SA+H72ajkBL8CWwzeB9nOqh8fMkDn9VYZUE6e3ntZoiVuf3H0OCzUZUFK6pb+yjUvWc95QJ
 0Eb4CMGsbk59EvtSML0GRK/vhasvAMYWtdWO/037keK0KW8yxaUAC0IQyBMbPQitdQqXno62
 1mRhdTrCDdz9rqPRhq1+q+PqDKuOQAcNWIYeTIfVgwB/sXip4coyBnIS75LEqS4k9n0EjHY2
 C2RoW41gLB7pdUA0Lmnu1zOnTO3joPVRxQx7w+RX2XN0+9iTNf7PcryswGdtKseatbCJrWcg
 JQas8+myf0BCLKwqAOMB+tdW5qzvvCKazKJ1DaDAKId3ziq/neie6VZ7zd/OFplP644RNP5X
 KPAkVgPvcEOZRNGeYcyOtvsUJpykcAMAPy/Dpjpgsxyjo+dneNt1AVnfgau0m/kiyDAeolva
 M7AIa5A4Zv3YJmLLQZapc9AidfHJQhknAs/oKwXKTz9i9Jyg1bPFN843KOmNLxR0U99iFy9H
 yxjH8WL0Q5Dd+b1fzPa94UeRXhTcyRrWMCs8pYPLLbfSuaDJI3HI6WLqV/GU9Y495m5a8+Sp
 i3tMqOm4ASXaYL7xfWiNSk4NeKHsWdXpnMnJy08VWtEKFB4CbtDGJw3LsNtFZF+rbQL5actE
 5EtJpXRatwSG2+v02lMMvHAQHlKKU3DafSmZHH+PlDSvvdIGmT0xzMTVla2rHBVVHvu76PTY
 dSIj2vmfHbKfCw7ZO7+Y/Oz1VKh+38bneN5RUzTJddPPk7r9eBXx+bZ15fb/+lkxc3/+wan
IronPort-HdrOrdr: A9a23:Z+CW0aGrFmXzmUNspLqFDJHXdLJyesId70hD6qkvc3Jom52j+P
 xGws526faVslYssHFJo6HnBEClewKgyXcT2/hsAV7CZnidhILMFuBfBOTZsljd8kHFh4pgPO
 JbAtdD4b7LfChHZKTBkXGF+r8bqbHtms3Y5pa9854ud3AQV0gJ1XYJNu/xKDwOeOApP+tfKH
 LKjfA32QZINE5nJfiTNz0gZazuttfLnJXpbVovAAMm0hCHiXeN5KThGxaV8x8CW3cXqI1SvF
 Ttokjc3OGOovu7whjT2yv66IlXosLozp9mCNaXgsYYBz3wgkKDZZhnWZeFoDcpydvfomoCoZ
 3pmVMNLs5z43TeciWcpgbs4RDp1HIU53rr2Taj8A3eiP28YAh/J9tKhIpffBecwVEnpstA3K
 VC2H/cn4ZLDDvb9R6NqeTgZlVPrA6ZsHAimekcgzh0So0FcoJcqoQZ4Qd8DIoAJiTn84oqed
 MeQ/003MwmMW9yUkqp/VWGmLeXLzYO91a9MwQ/U/WuonlrdCsT9Tpc+CQd9k1wg67VBaM0o9
 gsCZ4Y5o2mfvVmHp6VO91xNPdfKla9CC4kY1jiaWgOKsk8SgbwQtjMkfII2N0=
X-IronPort-AV: E=Sophos;i="5.90,222,1643691600"; 
   d="scan'208";a="67534225"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Ba+lQdip4qxSl7WHs4MJ38wrOudXlihBEZwPmctcn6/IsTYvjSMOTfFxaGxcdhFZSvFNPi38jhL4r1X+o4z6LwHkuY760NRcXFPatuUB7xb4s+E1paThXInd9/mzL75cSfSKQd6XojuQo30xYXnqmsGZpox2C99VP0slrSuxo79M7duraB8SfX6w1U1VQNHCa83fczAqMAM2wnAuj+M3Mx7blsV93CVwtzDLP2OTJeSLFy4OA0HsC8zDFTyNHEtHmxXfwAGf0BqafO9Q6QCZN4d8BI4emna154vvd6Aq+OJVz1oQnc3JwpGnGh7bTEhbJDdJ6RSVtDBI+ThPbfaf2g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=k2SEi1/vL5PsnWQZ2WPvraI+wpAM1cg+DV4QwZnz2rs=;
 b=ZNGJgXmBEKtSJYxP2/Ajc6V+DTV2ML5DyyTcoQmzugKT3ThH8N38ErTWbF0nNMAmca6MFNWMLMyb5EBjeNYw90Z9VyVhlqsdQ88grucdEr5Q1kC4o5h6qUGiMKGxn4MwPlYrfOw3e0hLjAYjYelR2jsIJfjVY9JLYLNO1yl3RusWL6cVb0n0ib0SH8xyQBRuWAeO1uATJ0cqtYwMw1z1j8ALjrgUgkmG/A/q0PMef0caKbgC05IX/E94o3lxg3BibkcVVZmVbcefeZvalNcib5A2BtYjKJg4ZQcantsyLJ74S9QioHPyx6dM0ou6NEgUTfqZclexvDZGmHJtPRC63w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=k2SEi1/vL5PsnWQZ2WPvraI+wpAM1cg+DV4QwZnz2rs=;
 b=jAHovnIKrc1DZoSAMKxaDetmSxeIJMaj0Gw+gfkQzxcAeFUGB+7zhNRBSiFx/FO9ByZj+VCt3+GzPGnXwoQb0A4p7sJaGXp246eMcfGXZtlP/MAcibAv1XkSDf287e9rz/PbM1FnFRxYKoz+OvT/3I0wWARHj6zqy94GXMD5ff4=
Date: Wed, 30 Mar 2022 11:40:32 +0200
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: "Daniel P. Smith" <dpsmith@apertussolutions.com>
CC: <xen-devel@lists.xenproject.org>, <scott.davis@starlab.io>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, "Jan
 Beulich" <jbeulich@suse.com>, Julien Grall <julien@xen.org>, "Stefano
 Stabellini" <sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Daniel De Graaf
	<dgdegra@tycho.nsa.gov>, Jason Andryuk <jandryuk@gmail.com>
Subject: Re: [RFC PATCH 1/1] xsm: allows system domains to allocate evtchn
Message-ID: <YkQlkOWtXqGBAoM/@Air-de-Roger>
References: <20220328203622.30961-1-dpsmith@apertussolutions.com>
 <20220328203622.30961-2-dpsmith@apertussolutions.com>
 <YkK1dSS6RZ9hzyh6@Air-de-Roger>
 <ae3ba2f9-ace5-0c30-9190-06c747953b20@apertussolutions.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <ae3ba2f9-ace5-0c30-9190-06c747953b20@apertussolutions.com>
X-ClientProxiedBy: LO4P123CA0309.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:197::8) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5d7cfac1-6422-4182-cb4d-08da12315c12
X-MS-TrafficTypeDiagnostic: BN7PR03MB3826:EE_
X-Microsoft-Antispam-PRVS: <BN7PR03MB382688BC8A885F5B9FA8C3388F1F9@BN7PR03MB3826.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(66476007)(316002)(6666004)(86362001)(508600001)(66556008)(6916009)(66946007)(5660300002)(85182001)(54906003)(82960400001)(38100700002)(8936002)(4326008)(8676002)(6486002)(83380400001)(53546011)(186003)(2906002)(6512007)(6506007)(26005)(9686003)(33716001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?MGVvcHZhSmxzTDBmVWJUSzRUYlp3QStCOUpMQlRtdi9EZy82Ums0cmR1czYx?=
 =?utf-8?B?UUNWMVg0eUtiQThCTGVtOU1zRXh5UGlvekd1Wjk4NGZ2a2VGTHBPSjZsZEdP?=
 =?utf-8?B?NEdER1FONC9JK0ltbHAyZWdHUnliMkFXbEVOREhvazkvTDRjVU14SzVJNU5U?=
 =?utf-8?B?ZWY5OVZ1a0d0RDFKWXc2clpOV1VRZXZPazlqN3dCNmExbHZUNmRGS3F2R3Vq?=
 =?utf-8?B?R2NrQVpRZnVVRk5sZEpkcjZZd2lvWUNzMkpLUk9wZ25rU1dLM2RsQ1pDenNZ?=
 =?utf-8?B?YTE5czdzeVFMM1hyaHhiVlZJbWdlRld2M2hSc1J1cjI0T1BLODBqcWJsOVJ3?=
 =?utf-8?B?T0prTkZaMVZlek9pK3UrU2E2TXNScWlJbjlVcGp0N0xSUTBNRnB4VncyYlc2?=
 =?utf-8?B?SlBsRXBXV3lSREYwYVA1b0gxUGNBR2tCbjhpZnNHWEpRMVlyL1l5Vnd3Sktl?=
 =?utf-8?B?OGtFTkF5NjhTODVVRkFzU2VBQUtIb3dRdkZaNzMzSkk3ZUJoekw2S0UwN0Nx?=
 =?utf-8?B?cnNaTGlENDMrTHhldnQ5NzFXMDBzQ0ZtUEpPcUhHZGdjNlFyTTVCdWk3L1g4?=
 =?utf-8?B?RlBPZER2bkNLQWU1Z3g2K0VUUDVmNUJiZEN5N2IrLzlJYWFHMVBsdTAxVUpI?=
 =?utf-8?B?ZUdvSVowMGE5Ny9aRTZvOENYcWJ4eWVweURWYUszcEVldkVWeVNJQzhaaHBV?=
 =?utf-8?B?dGM4VGRrdU1jVklEV2tOK1JldzhGd3UrbDIvOFo0QWphZmFURENZa3dKbXdZ?=
 =?utf-8?B?a3JtaDZGaFRBK1Znc1VaMisrV01DbHltQThFU0ZaN3J6bHp2aHNlY2RGN0Fs?=
 =?utf-8?B?Q1AwOTBXRlVSTDlraEtiazFtV0s3REErVVNZODM5NkhuVUd3SVlZMWE4aGFa?=
 =?utf-8?B?Y0Ura1N6T1VVMXg1QWlLdlJXMVdibFhxMnBCNnhYcW1BQWVIemlhNFgydkVz?=
 =?utf-8?B?TThTTk1CMmxuMU1BYThVN2g3MDNYRmI4UVFzMEViQzQ5QXZSY3NPYlFSajhr?=
 =?utf-8?B?Tlcrc1RNOEtwb3BISG1obU9DRUcvNk9nOHI5M3JWNUtGYkd2cm9RM2c4YWVx?=
 =?utf-8?B?YThtMWtQRTJhNys4emd4VXBKb0N4N2pQa1R6c0JjSVgvTVlMUWlyaWtoRDZv?=
 =?utf-8?B?TVM2Zmc4cDl4NlBnMkVGdGMvYXA5dDc3Y3FyZHRqbXBvQlRJcW96WXlyMG5n?=
 =?utf-8?B?ckd2bk03eTZRVFZkdU43YUdkN0tVZFVqTUJENnlzTGhQM2F5VnVlMFEvVFl2?=
 =?utf-8?B?MEY4UnVIZUhLMmpENFNDVjRYNE1Zc2w1WVZUQ2xEaTkyZWFYMkxMemxOZzQ2?=
 =?utf-8?B?ZGtSUGVzbit2VFVsMVQvTjVvMnR1U3dqNjk0L044Zmp6QmhqZXFPa0tXV2Vu?=
 =?utf-8?B?YXhlZUNkOCtQdUFkOEhEWnVoRUpXVE42VWREajJnOTliWWtWaTRQM0xmRmxL?=
 =?utf-8?B?REZuZllma0tVdjZkTTFiMEtzVHN6WEJINERGeENxNitwQnhkS0ROV2tQbzFp?=
 =?utf-8?B?QlU4dnBtNDZzSkJpTlB5MmVkWm13SWdCTXdmU0k2Zmhvb3IzMkt2SVdjQnh4?=
 =?utf-8?B?a0dzRkxJT0hEM1gzYXBlcGdFODBrcHl2M280NXI4WUtWKzAxU05LdEpRbmdj?=
 =?utf-8?B?OCtpdzlFZ0tWWFExeHd1QW5OOHQwM0xJeWdEeVI3MnBoNFNYL2orVHdoOHI4?=
 =?utf-8?B?Q0hSelU4K0xFQkc0NktiU2RyRmxkTE9OZmpOUC82RkFja1RUS3ptOC9mZldv?=
 =?utf-8?B?K1hPTmlkd0FSVXo0cmdDYjdYbDh0c2FqajBVOUd4N0dBVjlwcWlNK2xxYkxS?=
 =?utf-8?B?SEQrMHZJVEsySVB6cFBUS2VnTDR5ZGhsWW1GUzF1UEZSeWdhUU1LKzRBNjRO?=
 =?utf-8?B?ZlRHZ3dtc2pqUXZVdnEzc2JmZ2xFK1VJSFh0c0Z1R01hdVNoYmp5b2E0MXc5?=
 =?utf-8?B?NHhNbmp0Y3VVeVl1RFRYcUZsYVhhK2VNQkhjUG9kcWY3NXJCU1pjTHY4UXh4?=
 =?utf-8?B?dElZSFpCYVlCUElONGNnVFFQekZvbmxFdHB4NHdUeG03QVlZSjJzQ2ZoS2lh?=
 =?utf-8?B?WDdTZjE0SHU4N093S0ZwZm1sdnluMkhXOFRxaWptSGxjYnduY0NSdFRselVq?=
 =?utf-8?B?Wm9yK0EweWNCMjFKSUdRREtHQmZJQkZTL2RSYXpib0dsN3BlRTlFZmZmTDht?=
 =?utf-8?B?YTNQaytyZTltdGJQTGc1NGRMLzZ4Wm45a1pTVlBNbFFxRTlQZzloaC9LSzdF?=
 =?utf-8?B?ZDRaWHNucXhNbGlxTFVWT3EwMG10cEtLUG1jdGx2ZW1YWmhFL25DdWlxK2h6?=
 =?utf-8?B?QmVxTGtGRysvZXVXSEdETnBDNUE5a3hBL2JqOFNpNGNxb25LbUpYdz09?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 5d7cfac1-6422-4182-cb4d-08da12315c12
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 09:40:43.5497
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 4dy7eVi4fpPGBTjImwXmFtytPbtTl0sxTXrPAXdHmqPFVi6FLml9AekibZINuOM8MLTNgpuQ46JsvB3kfY+YxA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN7PR03MB3826
X-OriginatorOrg: citrix.com

On Tue, Mar 29, 2022 at 07:12:56PM -0400, Daniel P. Smith wrote:
> On 3/29/22 03:29, Roger Pau Monné wrote:
> > On Mon, Mar 28, 2022 at 04:36:22PM -0400, Daniel P. Smith wrote:
> >> During domain construction under dom0less and hyperlaunch it is necessary to
> >> allocate at least the event channel for xenstore and potentially the event
> >> channel for the core console. When dom0less and hyperlaunch are doing their
> >> construction logic they are executing under the idle domain context. The idle
> >> domain is not a privileged domain, it is not the target domain, and as a result
> >> under the current default XSM policy is not allowed to allocate the event
> >> channel.
> > 
> > I've not been following the discussion around this patch, but I would
> > assume such privileges are only required for init code when no other
> > domains are running?
> 
> At this time, correct.
> 
> > Since it's only at that point where the idle domain context needs to
> > allocate event channels would it make sense to temporary elevate it's
> > privileges by setting d->is_privileged while doing the domain creation?
> 
> This is initially what I did but it seemed like there was some
> reluctance. As I was looking to formalize/abstract this in XSM instead
> of doing direct manipulations, I realized I could achieve it in the hook
> which would allow the hyperlaunch and dom0less code work without having
> to ensure priv escalation is properly handled.
> 
> > That way we wouldn't need to grant those permissions for the lifetime
> > of the host when they are only needed for initialization code.
> 
> Correct, which is why I adjusted the effective default policy only on
> the check instead of in xsm_default_action() as Jan has suggested.
> Outside of a code fault, all other times that evtchn_alloc_unbound() is
> called `current->domain` should be pointing at the caller of the hypercall.
> 
> This works as an interim solution with minimal impact as it is all
> internal to XSM and can easily be evolved. My concern is that exposing a
> function call to provide priv escalation for the idle domain as an
> interim solution for dom0less and hyperlaunch will have more impactful
> code churn in both of these when a longer term approach is adopted.
> 
> > Another option would be switching to the initial vCPU of the domain
> > being created, but that's likely to be more complex, or even create a
> > short lived system domain with is_privileged set just for the purpose
> > of building other domains.
> 
> Longer term I would like to explore doing this in general. Some initial
> thinking is the fact that hypervisor has a few contexts, relative to
> external entities, under which it is executing. When it is handling
> internal house keeping (e.g. scheduler and security server), when it is
> interacting with guest domains, when it is interacting with hardware
> (e.g. vpci), and now when it is processing boot material to construct
> domains. It  has been mentioned that today in Xen if one of these
> contexts acting with external entities is corrupted, it can interfere
> with operations occurring in the other contexts. In the past the have
> advocated and been working to split these contexts using hard L0/L1
> separation. As noted in other discussions, some architectures are
> gaining hardware features that can be used in hard L0/L1 partitioning
> but also could be used in a more "soft" partitioning more a kin to
> Nested Kernel[1] and Dune[2]. Again just some initial thoughts.
> 
> > Overall I'm not sure it's worth giving those extra privileges to the
> > idle domain when they are just need for a known and bounded period of
> > time.
> 
> IMHO that is a slight over simplification. Setting is_privileged to the
> idle domain while it is processing domain construction data from outside
> the hypervisor means that during that bounded period the idle domain is
> complete unrestricted and may invoke any XSM protected call.

The domain builder code executed in the idle domain context can make
direct calls to any functions that are otherwise protected behind an
XSM check on the hypercall paths, so I don't see much difference.  The
code executed by the idle domain in order to do domain creation is
already part of the trusted code base (ie: it's hypervisor code)
likewise with the data used as input.

> Contrast
> this with only granting the idle domain the ability to allocate event
> channels between domains at any time with the only codified usage is
> during init/setup. While I am unsure how, theoretically malformed
> construction data could expose a logic flaw to do some very unsavory
> allocations without any guards.

It's kind of like that already, it's just that in other instances the
calls done by the domain builder in idle domain context bypass the
hypercall XSM checks.

This might be giving you a false sense of security, but what's done in
the idle domain context in order to do domain creation would strictly
speaking require the idle domain to be a fully privileged entity, it's
just that we mostly bypass the XSM checks by calling functions
directly instead of using the hypercall entry paths.

> Whereas during runtime if the idle
> domain was tricked into establishing an event channel between two
> domains, it would only serve to provide a covert channel between the two
> domains. Neither is desirable but IMHO I find the former a little more
> concerning than the latter.
> 
> With that said, I am not completely against doing the priv escalation if
> overall this is the direction that is preferred. If so, I would prefer
> to provide a pair of static inlines under XSM name space to provide a
> consistent implementation and be able to easily locate the places where
> it is applied if/when a longer term approach is implemented.

I think those helpers must be __init, and we need to assert that by
the time domains are started the idle domain is no longer
privileged.

>From my PoV increasing the privileges of the idle domain just for the
time it acts as a domain builder is merely formalizing what is already
a fact: if the domain building was executed outside of Xen it would
require the context domain to be privileged.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 09:48:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 09:48:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296160.504089 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZUvk-0004TT-4n; Wed, 30 Mar 2022 09:47:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296160.504089; Wed, 30 Mar 2022 09:47:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZUvk-0004TM-1i; Wed, 30 Mar 2022 09:47:56 +0000
Received: by outflank-mailman (input) for mailman id 296160;
 Wed, 30 Mar 2022 09:47:55 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=u124=UJ=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nZUnK-0000Fm-0g
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 09:39:14 +0000
Received: from EUR01-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur01on0607.outbound.protection.outlook.com
 [2a01:111:f400:fe02::607])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 41c40da2-b00d-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 11:39:13 +0200 (CEST)
Received: from AM5PR0701CA0052.eurprd07.prod.outlook.com (2603:10a6:203:2::14)
 by VE1PR08MB4798.eurprd08.prod.outlook.com (2603:10a6:802:a2::19)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.16; Wed, 30 Mar
 2022 09:39:05 +0000
Received: from AM5EUR03FT014.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:203:2:cafe::ef) by AM5PR0701CA0052.outlook.office365.com
 (2603:10a6:203:2::14) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.13 via Frontend
 Transport; Wed, 30 Mar 2022 09:39:05 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT014.mail.protection.outlook.com (10.152.16.130) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5102.18 via Frontend Transport; Wed, 30 Mar 2022 09:39:05 +0000
Received: ("Tessian outbound 341d209a0e52:v113");
 Wed, 30 Mar 2022 09:39:04 +0000
Received: from b2ebb19cadfa.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 3F00165D-0D1F-4FC0-8E1D-47EA4D4446C9.1; 
 Wed, 30 Mar 2022 09:38:57 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id b2ebb19cadfa.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Wed, 30 Mar 2022 09:38:57 +0000
Received: from DB6PR0301CA0057.eurprd03.prod.outlook.com (2603:10a6:4:54::25)
 by PAXPR08MB7105.eurprd08.prod.outlook.com (2603:10a6:102:203::17)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.22; Wed, 30 Mar
 2022 09:38:55 +0000
Received: from DB5EUR03FT025.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:4:54:cafe::fa) by DB6PR0301CA0057.outlook.office365.com
 (2603:10a6:4:54::25) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.13 via Frontend
 Transport; Wed, 30 Mar 2022 09:38:55 +0000
Received: from nebula.arm.com (40.67.248.234) by
 DB5EUR03FT025.mail.protection.outlook.com (10.152.20.104) with Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id
 15.20.5102.18 via Frontend Transport; Wed, 30 Mar 2022 09:38:54 +0000
Received: from AZ-NEU-EX01.Emea.Arm.com (10.251.26.4) by AZ-NEU-EX04.Arm.com
 (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.2308.27; Wed, 30 Mar
 2022 09:37:40 +0000
Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX01.Emea.Arm.com
 (10.251.26.4) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2308.27; Wed, 30
 Mar 2022 09:37:35 +0000
Received: from a011292.shanghai.arm.com (10.169.190.94) by mail.arm.com
 (10.251.24.32) with Microsoft SMTP Server id 15.1.2308.27 via Frontend
 Transport; Wed, 30 Mar 2022 09:37:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 41c40da2-b00d-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=7qVkQ1qo3iAE+FDwNj2htVkkE7SSyq5qLjILB2koE80=;
 b=DIeuDu54hK8jHZxQED0isbg08am9B0MZ36067ccRaINykRLLaXae1HRY1izt8OrKTEt9P1kZOMwUShWoKUGz9AqrXFa0ZwVe7DmvnwcjQgfca7CeXr/Gztz2wzJS3K5KVkG+kbHwzhNoiHAkHZcL2ZRYNPU3cBSQrvShgREhpTU=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: e497e6f73c5547ee
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=nI5SacCHGDtkOJa5lwav/L2kfYGKAczzup1+Stp52WPMAamgRp13IUY+6eKUdFW24fRAyn4aOq74pEiqbZJ0EAhEtydlWxXuSgrJugVphfAKdOKwKql7z+kA49PUj8VfO0ixGwvZaACPLJlO3t6b++aq/hmcky14kf71WUlSY+DXSK/HVuveW2SFqSzziwulTlxp4bdkJ8w55D0houhq5hCxSIPs9kQjftL4rUmwWv0YfLN7X/e3e05BI4+Yh5PM4rH3JfTSbVuEObd+f331tWGfMH5LdSZ+tZT2SYkpBYpI7ozcR62hfXJXkPrrZW8eUCSR0Ql02QsfzaySkTdf9A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=7qVkQ1qo3iAE+FDwNj2htVkkE7SSyq5qLjILB2koE80=;
 b=TQDLUM0LjpUCo2mKoyL2Kgbmrt3i52/Ig28MiMU7dORGkJBACFq7J1A7smvX6Y1Sfgt9TrwCCywnuwQWQ8JmQBZxJli0L0r1RtS4Urk+PmaWXJRjWlpU1O5xfYngKB4QAEkBEHNjYEJXJfVmBOcQqb0zGf2mM9xNLz4A7bs2mxEPveBDmV0vRk8hgS26sFa49HmUr2Ph95UswBnwjxkZt7oZF6L2v1C9mXhgW87rMGJ4XwXyMJr/l33guoHq18YgsuGVkodjTDnv9rYYQgbEFPfAE8JZ0wdeReygO4TC8Bf1CnWw4lGeTxf5M6LNOgcQaPcpsFocw8zen2tkx+o2UQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
 40.67.248.234) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com;
 dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com;
 dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=7qVkQ1qo3iAE+FDwNj2htVkkE7SSyq5qLjILB2koE80=;
 b=DIeuDu54hK8jHZxQED0isbg08am9B0MZ36067ccRaINykRLLaXae1HRY1izt8OrKTEt9P1kZOMwUShWoKUGz9AqrXFa0ZwVe7DmvnwcjQgfca7CeXr/Gztz2wzJS3K5KVkG+kbHwzhNoiHAkHZcL2ZRYNPU3cBSQrvShgREhpTU=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234)
 smtp.mailfrom=arm.com; dkim=none (message not signed)
 header.d=none;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 40.67.248.234 as permitted sender) receiver=protection.outlook.com;
 client-ip=40.67.248.234; helo=nebula.arm.com;
From: Penny Zheng <Penny.Zheng@arm.com>
To: <xen-devel@lists.xenproject.org>
CC: <wei.chen@arm.com>, <henry.wang@arm.com>, Penny Zheng
	<Penny.Zheng@arm.com>, Andrew Cooper <andrew.cooper3@citrix.com>, "George
 Dunlap" <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, "Julien
 Grall" <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, Wei Liu
	<wl@xen.org>, Penny Zheng <penny.zheng@arm.com>
Subject: [PATCH v1 4/5] xen/arm: retrieve reserved pages on populate_physmap
Date: Wed, 30 Mar 2022 17:36:16 +0800
Message-ID: <20220330093617.3870589-5-Penny.Zheng@arm.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <20220330093617.3870589-1-Penny.Zheng@arm.com>
References: <20220330093617.3870589-1-Penny.Zheng@arm.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Content-Type: text/plain
X-EOPAttributedMessage: 1
X-MS-Office365-Filtering-Correlation-Id: 59f1ddff-e998-4e35-4cd9-08da12312187
X-MS-TrafficTypeDiagnostic:
	PAXPR08MB7105:EE_|AM5EUR03FT014:EE_|VE1PR08MB4798:EE_
X-Microsoft-Antispam-PRVS:
	<VE1PR08MB47984A2EA4AC0CF3B05C5527F71F9@VE1PR08MB4798.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
NoDisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(7696005)(40460700003)(8936002)(186003)(5660300002)(81166007)(82310400004)(356005)(26005)(508600001)(426003)(2616005)(336012)(1076003)(6666004)(6916009)(70586007)(8676002)(36860700001)(316002)(4326008)(83380400001)(54906003)(70206006)(47076005)(36756003)(2906002)(86362001)(36900700001);DIR:OUT;SFP:1101;
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB7105
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT014.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	a4ecc0fb-6140-4a66-6129-08da12311b49
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(8936002)(54906003)(426003)(2906002)(7696005)(6916009)(186003)(26005)(1076003)(508600001)(336012)(82310400004)(36860700001)(316002)(4326008)(70586007)(36756003)(6666004)(86362001)(8676002)(5660300002)(2616005)(83380400001)(70206006)(81166007)(40460700003)(47076005);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 09:39:05.0621
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 59f1ddff-e998-4e35-4cd9-08da12312187
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT014.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR08MB4798

When domain on static allocation populates memory through populate_physmap,
other than allocating from heap, it shall allocate from resv_page_list to
make sure that all guest RAM are still restricted in statically configured
regions.

Signed-off-by: Penny Zheng <penny.zheng@arm.com>
---
 xen/common/memory.c | 20 ++++++++++++++++++++
 1 file changed, 20 insertions(+)

diff --git a/xen/common/memory.c b/xen/common/memory.c
index 2afc3c6f10..2122ceeba7 100644
--- a/xen/common/memory.c
+++ b/xen/common/memory.c
@@ -249,6 +249,26 @@ static void populate_physmap(struct memop_args *a)
 
                 mfn = _mfn(gpfn);
             }
+#ifdef CONFIG_STATIC_MEMORY
+            else if ( is_domain_on_static_allocation(d) )
+            {
+                for ( j = 0; j < (1U << a->extent_order); j++ )
+                {
+                    page = page_list_remove_head(&d->resv_page_list);
+                    if ( unlikely(!page) )
+                    {
+                        gdprintk(XENLOG_INFO,
+                                 "Could not allocate guest page number %lx\n",
+                                 gfn_x(_gfn(gpfn)));
+                        goto out;
+                    }
+                    d->resv_pages--;
+
+                    if ( j == 0 )
+                        mfn = page_to_mfn(page);
+                }
+            }
+#endif
             else
             {
                 page = alloc_domheap_pages(d, a->extent_order, a->memflags);
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 09:52:51 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 09:52:51 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296169.504100 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZV0T-0005vC-U7; Wed, 30 Mar 2022 09:52:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296169.504100; Wed, 30 Mar 2022 09:52:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZV0T-0005v5-PP; Wed, 30 Mar 2022 09:52:49 +0000
Received: by outflank-mailman (input) for mailman id 296169;
 Wed, 30 Mar 2022 09:52:48 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=b505=UJ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZV0S-0005uz-Tf
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 09:52:48 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 272e4cf3-b00f-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 11:52:47 +0200 (CEST)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04lp2050.outbound.protection.outlook.com [104.47.12.50]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-28-OrsnlPrEPBy2OTRsXLHlhA-1; Wed, 30 Mar 2022 11:52:41 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by DBBPR04MB7929.eurprd04.prod.outlook.com (2603:10a6:10:1ec::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.23; Wed, 30 Mar
 2022 09:52:40 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.019; Wed, 30 Mar 2022
 09:52:39 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 272e4cf3-b00f-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648633967;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=YDomwYr5S80vYsrW9hNDuagVEoGbHJX4KMvKzQMyXqY=;
	b=WRN1T9cwVGmD1mDGCV4Qzdz2pb2Db10nIc/zXEsbhXFyss1sUvSoHXcK9IqjUM3YyZTOcZ
	T0aH9ONOEpdU9TlkLBCJHSyb8/4NZLEruaqDSD7QGkMGIw0ZkSA2DrgNEmg1RaeJq5ihOy
	F224Y+gEGAs4kTdq9lJ7VE6W5HknxWQ=
X-MC-Unique: OrsnlPrEPBy2OTRsXLHlhA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=J//gBLVHM+Zh0sv4cQEJ2SQbyWKOGX/+xdVdt/lSFN5nhtHXJ64NNcTKTw3QqKSIObSpYpXETkkbg957wwhCcQyvwIPC9ktAtOPFQWBa7ZRxfAJiScAHGjIHGT1NTFTfAQtn/pyCryCkUT/KyFHhxRtxu5Q7m5OGjsLQ3m+9Ou8uJN60C5w1jm+/Qo1PJ9xCMCJl7yHhNMWMavZvtLCLsFSgKfpy2K9+xvbTHcxtiJP92bOacb3WHO4IHWE+18p/Wuk6SRmntxm/+avNt3mLJMml/z0kEU1/PovV2hiIUh7pJffCOlrT6rAr4YMoFI7W+7SZYKiJzBSrtZENc9eaRw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=YDomwYr5S80vYsrW9hNDuagVEoGbHJX4KMvKzQMyXqY=;
 b=F318oR9tqfj3j4lis8kdOY0slWQoHXxxT2gn5kCUh5+elB1kPQ1WyJAL3R5nVvASb58PQMeGT1R6t2fYCJuIOwciNkK/WwbcSBWrRUcEPd57PEIDmy/gE8HnJ06KYvrtAIKUZBpAnI9m0HxmSTQKbo7MjADgNKGFkxx4QGiMIxEXxnEoMBt5FSi6ihNdgNmjKcKlWd+07zhmvVVSQk5KiPoYCZ/JTLwb7a3hI6H80pH2lvDyIAwPT2Txd7BqS/Qkm/zVwWRP8TLOUhYPTL6dZqiEoyUh5DNtNOzqrPJ0AtNgD0WL19LPPiInZVTVpl6dmyQptrxzrZ7CNvwTKg3suQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <31c1ae2d-a4d6-5445-e819-5df5a0984cdd@suse.com>
Date: Wed, 30 Mar 2022 11:52:37 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v1 3/5] xen/arm: unpopulate memory when domain on static
 allocation
Content-Language: en-US
To: Penny Zheng <Penny.Zheng@arm.com>
Cc: wei.chen@arm.com, henry.wang@arm.com,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220330093617.3870589-1-Penny.Zheng@arm.com>
 <20220330093617.3870589-4-Penny.Zheng@arm.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220330093617.3870589-4-Penny.Zheng@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6PR10CA0002.EURPRD10.PROD.OUTLOOK.COM
 (2603:10a6:209:89::15) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 02fac71e-89ab-47e0-6968-08da12330713
X-MS-TrafficTypeDiagnostic: DBBPR04MB7929:EE_
X-Microsoft-Antispam-PRVS:
	<DBBPR04MB79296A77EB90D43DF3B52C23B31F9@DBBPR04MB7929.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(26005)(6512007)(66476007)(66946007)(6506007)(8676002)(53546011)(38100700002)(4326008)(66556008)(31686004)(36756003)(8936002)(186003)(2616005)(508600001)(31696002)(6486002)(54906003)(5660300002)(2906002)(86362001)(316002)(6916009)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?SllMWE5UYnBMZ1hTUHNwL0lFZmZSVk1KMWI5aWJ3K3NFQ2Y5SWRQVG5LMkQv?=
 =?utf-8?B?MzFSc1k1UEJSSE1uR3pKVUpiMTUvMjN0N0tjWlNiY0I3L2dBcGVvendLT0Nj?=
 =?utf-8?B?c3A0aWR1LzA5NE10MFRpQUFVU0UvQkgxaVA1Qi9JN3BBaFlZazFGc2hlRjBW?=
 =?utf-8?B?V1VzSmVmQ3FnL3lJdi9uaWY1TUFpYlFEMW9wM2FReEc0dGRkR0w2aVREck5r?=
 =?utf-8?B?MEVGTWlGdVZkazgzak1lMm1zNDU4aGhzK2MzbWVsMWpxQ2RDYitlTWNMRUE5?=
 =?utf-8?B?blU2MjRFeEVtRWc5am1rbkNOVWQ0UWJKU1JCRit6ek9lb0krVSs3VFA1L1pm?=
 =?utf-8?B?NzNDSEl1YjY5UEtOcE1KZXd2NVVzN1EzVEVaVlFFQkNpZ3ZEWXRpZ2dEYXRK?=
 =?utf-8?B?QjM4cFJFTVpmRnJicmhZSThmeVNRNS8zRytJUlJraU1RNzJ4c1RsbGVQS3FB?=
 =?utf-8?B?cW9ZTVJWRCs5eDRCekNMYXhxNEZzUCt0OTFzWWZWMDJySmJKaVBLLzJ6MElv?=
 =?utf-8?B?R1pLbmdvdEpEZVRKV1p4N1dJQ3hWVHBnemNwYVl3TGRUdkdmUTdQWkxFYXUv?=
 =?utf-8?B?M2NIYVViU0NyUm1tU2VKQlUzZkpyQ3pQbE1MajRHN09BVUJEMnVTck1jbm1G?=
 =?utf-8?B?RkpVRVpKZUZkSVZUZnNLRGdOVEtlY2k0alhGWmUrVUIrdlRxQmlGaWk3bGhH?=
 =?utf-8?B?Z3BhdmZsWjl0aTNZUzBDcDBGZmZidGZibUdkVEh0eUdJR29DMFlXMGh2bzVW?=
 =?utf-8?B?SHR6VXFzN0FESTFsUXdzd0NqcnBuYzA0OCtZcmcyMnROWXdteEEza3MzbFBj?=
 =?utf-8?B?Zm44QWxab2FDQUQ0eVdFL3htUUpQamVuMmVnNWhIRG8yUEs3R0t1L2U3Z25K?=
 =?utf-8?B?N0JYMENRV01NRVdQYktzMDV4Z0YwWEJKQ3k1K0ZzQndhUGFjY20yLzZhcTBB?=
 =?utf-8?B?aUVGMXJrS3N2TXgrckZDRjNwTHAyOTQxOFFMWVpaVTdTUkpPVXA1dTNxRDFi?=
 =?utf-8?B?aGh5eEtEMkZhYzM1RjZwWDF1a2hjcHBNMkdBcUpsd0ltSDNQS3lIZ3B1Rkwv?=
 =?utf-8?B?QTZINUlVKzRaUTRHNjJ6dkxXdHp5UCtMVjhOOGZObTdhVnR5Z2MvVWM5NFNO?=
 =?utf-8?B?K0ZMaGYreDY4YXRhT2U3RUVvTTZhc2xHNXB4d3dPdkZKRHdWVzdPSTVKVi9w?=
 =?utf-8?B?eCs3b0ZUOWkrQ01GRm8xOCtKc3plOHc1S3FLWXN3YVMwVzJzb28xMjVBUjky?=
 =?utf-8?B?bk5RdG15eHlUL2xuNWYrTlBFNkNHY2lzQzE2bC9pRk0yOVdpMlBsYVJzMkk4?=
 =?utf-8?B?Q21qNWgrMnptWW1XZ09ZVjY4MXY4bTZ5SDY5YVRHWjFrZHhRT3BTc3NqS2JG?=
 =?utf-8?B?ZFNKcE1VU3VKNlFSbXdSQ1hHVnUyNkJQaXRjdHh1bHZYWVpic05MZVp6OHMz?=
 =?utf-8?B?RFpQNUw3cXFUeVBkTVdJUUF0NjN0RTRERlNWMWFIeXlTNVJTVXB1bWdwTWJH?=
 =?utf-8?B?K04zUFdJU0QxaC9DUHNSWFVtRVNQbVNkcW13N01rTEpkM1h4d0QvbjFFb1hs?=
 =?utf-8?B?WXNjVjNkbnJqcGJRL3MzU3BDRVgwTUx2cVQwZWNCeG56WENMWmxnTkFlRGpC?=
 =?utf-8?B?NEIzOVV5eGw1ZG1sdkpkZUgyRWNNZFFCTEI3Wm0rZTQvVCttcGltb3R3TWsy?=
 =?utf-8?B?YnEybk1rRFRzbTBOQXh0UWRNZ1dkazVqTGk4a2lPY29BMDdLZ1I5WUc3TERK?=
 =?utf-8?B?NE5MVlNUdnBJeTJndVlOKzlFeElMc1VuZkh1ZGxrTHlJTXd3bGJxWHo5c1pF?=
 =?utf-8?B?c1I3cU1HdHZJSjFMTER3UlZIMngwRGlBaEFTTmZPcDlsL0ZJQ2FWSDE1eU5y?=
 =?utf-8?B?NkNBMGx2aTNybzdDcFA0V2trRHBkTjNMK0JvdGtLclRPa2dvVnV0djBERWor?=
 =?utf-8?B?d0xNOXZKNzZGbUxpcEc0ai9iRzVvZmQxOGRvSWVxTC9CczFxZXFjOHZKdG5k?=
 =?utf-8?B?K2JzL2xpblFQUFU4R2hxVFdRMk9hc2ZrbGVQL3V1Slk5blVYTXV6L21za01v?=
 =?utf-8?B?ZDdLZWhoMDkxNFZIY2huUi9uKzg5QXhYdWVQaEQ0Z2VGZTQ5UHVhdkRWUzhw?=
 =?utf-8?B?cnYvK3YwQjB1ZzU1SzFIL2xXRUkzQ3VaUEFHd3RLSXZIdnAwSUg1QnFONEIw?=
 =?utf-8?B?V0xQVUVlY0pCaU1OYkthRnFWL1VINnE4dkd3ekwzUjNyaG5UZ0hTRjI0dlRT?=
 =?utf-8?B?RytIS0R6TFBaM3dSTDBlSjFZUzFLREZTTy9kT1B6cWRrY2VSVUIvUzJGNXIw?=
 =?utf-8?B?RzMrT1NEa0Q0UVZxcDk0cDNkVDRkQ3JiZTMrK09VZUszU3I0T3lkQT09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 02fac71e-89ab-47e0-6968-08da12330713
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 09:52:39.8784
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: qfmmml1fxUWeh/Ge6gaA+dzqduWK1ZDRVzhjBPKJF2fGEg1yOIukg5dfy4643SkaMMFa+0QrR1EzpU0BcjIZCg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR04MB7929

On 30.03.2022 11:36, Penny Zheng wrote:
> --- a/xen/common/memory.c
> +++ b/xen/common/memory.c
> @@ -35,6 +35,10 @@
>  #include <asm/guest.h>
>  #endif
>  
> +#ifndef is_domain_on_static_allocation
> +#define is_domain_on_static_allocation(d) 0

Nit: "false", not "0".

> @@ -405,13 +409,29 @@ int guest_remove_page(struct domain *d, unsigned long gmfn)
>       * device must retrieve the same pfn when the hypercall populate_physmap
>       * is called.
>       *
> +     * When domain on static allocation, they should always get pages from the
> +     * reserved static region when the hypercall populate_physmap is called.
> +     *
>       * For this purpose (and to match populate_physmap() behavior), the page
>       * is kept allocated.
>       */
> -    if ( !rc && !is_domain_direct_mapped(d) )
> +    if ( !rc && !(is_domain_direct_mapped(d) ||
> +                  is_domain_on_static_allocation(d)) )
>          put_page_alloc_ref(page);
>  
>      put_page(page);
> +#ifdef CONFIG_STATIC_MEMORY
> +    /*
> +     * When domain on static allocation, we shall store pages to resv_page_list,
> +     * so the hypercall populate_physmap could retrieve pages from it,
> +     * rather than allocating from heap.
> +     */
> +    if ( is_domain_on_static_allocation(d) )
> +    {
> +        page_list_add_tail(page, &d->resv_page_list);
> +        d->resv_pages++;
> +    }
> +#endif

I think this is wrong, as a result of not integrating with put_page().
The page should only go on that list once its last ref was dropped. I
don't recall for sure, but iirc staticmem pages are put on the
domain's page list just like other pages would be. But then you also
corrupt the list when this isn't the last ref which is put.

As a result I also think that you shouldn't need to touch the earlier
if().

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 09:58:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 09:58:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296175.504111 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZV6H-0006b3-IO; Wed, 30 Mar 2022 09:58:49 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296175.504111; Wed, 30 Mar 2022 09:58:49 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZV6H-0006aw-Ey; Wed, 30 Mar 2022 09:58:49 +0000
Received: by outflank-mailman (input) for mailman id 296175;
 Wed, 30 Mar 2022 09:58:48 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=b505=UJ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZV6G-0006aq-2Y
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 09:58:48 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id fdc479b5-b00f-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 11:58:47 +0200 (CEST)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur01lp2059.outbound.protection.outlook.com [104.47.2.59]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-29-2S8JVsHiNweEI8ia8DeTxg-1; Wed, 30 Mar 2022 11:58:44 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM5PR0402MB2833.eurprd04.prod.outlook.com (2603:10a6:203:99::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.19; Wed, 30 Mar
 2022 09:58:42 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.019; Wed, 30 Mar 2022
 09:58:42 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fdc479b5-b00f-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648634326;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=vz3FBfUI0XZC0vRPupOdJkYmWe1uH6DSENETWncMJIA=;
	b=AtW9tnnAIok974bBMXK2wqnEq4+G3qsKJYbhx2wRnnxSbmuSXul2jd0+09eiHoB9xmCdYf
	cVgwCavYulwLPvHF9de5pWpZ5qXNhk/BgvC2u9L8eov/3dwbHcsp63RSIoPNxG5V2FJqHe
	BWVJawFrPcu5TSD+CJ33UkokawZcICA=
X-MC-Unique: 2S8JVsHiNweEI8ia8DeTxg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=SDIDPZi9AXT3uMrrJ192Vk+UvJAnEPHh69d2v9uv23VUBD/YhmvF5xf9LV3yvdlBGgxlP1MI/uIeG8ItN6Aqp8tTcO3gsAR/4MLhnU7syQ9hlI4HIKKwa/9+bDVBWsbICK32FwE4ibRO6LKgQKTX+1xfg/iRcE73vTH1b3p9OsiQBtwA+HSKsClSYVnDGHL9Po8kZoHISczzAEnYiUxNi/cdl9KvuLbzUkqEzO0ue1cg4l74PWTTLr8Dt4ZX6o0pjnXx3ZQguaUZwMDLGf6+ETSvTQyx2j7QFiZmWcEl2MhdFQbevqHwoS/oxgi7ImpYyBmzzRxhK+nFR0W3AWsJzA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=vz3FBfUI0XZC0vRPupOdJkYmWe1uH6DSENETWncMJIA=;
 b=P9Mvm56Y7LF2Eujk28ZZjAYLKcEY+pAHnoln38m72XT6fE1g9WZzKWD939vuB0sUdU3uh+p4QvZVnssIRSaVQ/+TKdpf/c7BAjEwHGYqSpJ1TaYpZSr+vkO8c4kHw7kdckswGSXut0s0SFgzxqUntO2quMkWCvLePVbiECDdZgckduVlHY6EXiym7wR88L1GPv3PIB59Ni8KYq3/EYlDCfkypcAdS530JSpN5VHhTTtwFgswZvqsPRzBpbLccCFvd7KJ04KE26K7r/okIDjMboBxckEibesWsAqotsgfMknH7VdvFhcjpNxP6Ps3eOwwOua3yBNKW0PT6taDmW14RA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <570e0ca9-c07a-0fca-d146-82d655c792e6@suse.com>
Date: Wed, 30 Mar 2022 11:58:40 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v1 4/5] xen/arm: retrieve reserved pages on
 populate_physmap
Content-Language: en-US
To: Penny Zheng <Penny.Zheng@arm.com>
Cc: wei.chen@arm.com, henry.wang@arm.com,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org
References: <20220330093617.3870589-1-Penny.Zheng@arm.com>
 <20220330093617.3870589-5-Penny.Zheng@arm.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <20220330093617.3870589-5-Penny.Zheng@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR05CA0018.eurprd05.prod.outlook.com
 (2603:10a6:20b:488::22) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0067a4b0-b9fb-4c61-e6cf-08da1233df29
X-MS-TrafficTypeDiagnostic: AM5PR0402MB2833:EE_
X-Microsoft-Antispam-PRVS:
	<AM5PR0402MB28335ACDD38AF5CB647B3E08B31F9@AM5PR0402MB2833.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(31686004)(186003)(2616005)(26005)(508600001)(83380400001)(31696002)(8936002)(316002)(54906003)(36756003)(4744005)(86362001)(6512007)(6486002)(8676002)(2906002)(66946007)(5660300002)(66476007)(66556008)(6916009)(6506007)(38100700002)(53546011)(4326008)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?OHdreHN6Ty9GaUNwWnZZMk5iRXNuR2ZpQkFqcS9yNUtMNlJvdi9HbHh3ZWkz?=
 =?utf-8?B?RzJESVM0aXd1Y3AzdGdTN0pFZGdiUzh4VFpsT2l0dGtoRnc3d09QUk5yL3Zn?=
 =?utf-8?B?cDZPbjRDQ0tsbzdOeUhpcXJlUFUzOE1RdklUcWFZem9NbEVwditkV1VsNXp1?=
 =?utf-8?B?dUNwam1xeHA1QmNDQ3pDa2ZielVxT1VHalhhWmpNN0JnSWNIR2Q1YnBhWnVQ?=
 =?utf-8?B?Vmkxc1hLL0lxVEFkcXE3eDlMVE9lNlpnYndObHU2NVZQZC9VL29CTUlMT1pH?=
 =?utf-8?B?QUl5MVpNdUlFME5BUndDSzM4ckNNMkwvMFI4QzY1TURSa1B1aXVnaytYdW9Z?=
 =?utf-8?B?N0NIZUdQTyt1WE04WWZvbWZFbzl1U1NBNVpkNjlPTmJ4WlJRdDJqdW1yTTlK?=
 =?utf-8?B?Q2oySTArQWVkcGE2T0UwOXdOQS94eXhoMVhUQnpQWWRJaTg3cTE0RGRxeXJY?=
 =?utf-8?B?cGtqTlhKVDhOOWNtaGxyM2hvQzE5ZS9XdFFEbDRCcW45NkQrTFIwN0ZrUG02?=
 =?utf-8?B?eENJTG1tdUwvZ0s4RWl2UzI0MnlxeXBXM1c1UmtXK0JKcFU4THVqTGZROGNR?=
 =?utf-8?B?WUwrZVUzMnRVVHZPTmdVaE5XTVFmaXl0UkNWMWhadlVESFpsMHRVeFJUYTlR?=
 =?utf-8?B?NzA0RndMQ3FjQlRJME5TdzFreTYrOWFzS0pnOWZ5Qis5VEZ6Nm8vOTVOc2pv?=
 =?utf-8?B?N21yMkRKN2hlTFRRQVQyV2xjdGdqaGY4N2Y0T0ZsMXl6ekpKMStNamRlMEVN?=
 =?utf-8?B?UTJERFIvN3krdWtEQkl5cnNENGd3OUxLZERPMTFBZjlwbDcrTGM4SzBqb1hW?=
 =?utf-8?B?LzBIM2UrN29TRVpOZGpOM1BhR1RXVE1YU2F0OTNsYXZzUTN2TEYwd2Vvd0Nw?=
 =?utf-8?B?aDg5dENnc3VnVW5FL0YyMVFzWXFpdUZtN2NndjRHQXpNQm1iWEdOYUpzRGI5?=
 =?utf-8?B?TzBQa0MzMU1rZFVZT0x1Tjc5ZVRUVnpFVk9kY24xSnIvWWRHb2p5bDNOMGIr?=
 =?utf-8?B?YXlaR2g5R2szcUFTQTQ2UmdrZGJKNmRleDdGTGxxVjFpenRlbUdTdmhONGxS?=
 =?utf-8?B?NnRuUVNnV24xQTJyc1dOeDFYQnpLcUpydVpydkFwSUlEeHdaWGpJbHdEY2Er?=
 =?utf-8?B?L1p5bW1JNG1UanhJSndta1FyelZMemx3Z0VNUFZTZkhRQ0lvaytsMkJRUkM0?=
 =?utf-8?B?WjlEUU5VWERxUS9VaTFXMVlUNk9sZFpmNUZINFBiTER1ZysxcW1jQWtiSito?=
 =?utf-8?B?alpzSlpFanNhSHUzZXZRaEFnb2xVZ1YxL2ZCL1dINndub0ttNU1qaWlEN2pm?=
 =?utf-8?B?SmUxQ1hYaTI0RWNtYVdSc3UvR2xyc3liYVNwS09GOHE2bFp2alRpSjNIbzlW?=
 =?utf-8?B?dnlyZGdhRDQ4VFRjdzl0WTBWeFY2djVRYkJWeHUwbUN4OE9iaVJFQzZSQmU3?=
 =?utf-8?B?WFErWVZmV081L2NYTzYxdmRCWFlnV3c2SWZtTnR1bmFVQTlUWGJ3b1MwT3B2?=
 =?utf-8?B?dkRVVUNzdmlHSjA5NWxpWW9jUWY1anhvK2ZVMmU1UUN0N3FXYWFGTWljZmNT?=
 =?utf-8?B?MUJhMGtIa0swQ2JPMFhqQ1czWEFtZVU5N2lkTXZNQy9BaUJxSGw2Yk55TXBI?=
 =?utf-8?B?cWhyajBmbWVrQU52S0xubkJKNkFFanpXaDZSRTQzNmdhaW5WMWw0TG9aT2JH?=
 =?utf-8?B?c3FwZ25tY3k2bnlBT0RtVzY0UEVkUlU1UjZ3VDF0V0NnODNHMHYxQTFhaU1D?=
 =?utf-8?B?NkdabXk4Q1A3Q1JUY2FnQWYydERRdE1aQTJ6UUVZQ0orYnp3K3VEM3FHMDhW?=
 =?utf-8?B?MkFLWGV1SUZWQlRQSFZCNkZud2U5aDhrc3AwUS9TQ3dWMmN4YWJjL0ZBeitm?=
 =?utf-8?B?aGh1QjMxTzlMWjZVL2p4ZVF0bHUrZ1VSQ08ybGV5VjZqNUZHMS9zelFKTHhr?=
 =?utf-8?B?eXEvTE16YjBYQktGZXJ1RlBpZmhSK05vcTk2NlRIZzdwb1hGVG9JRkl5dzNB?=
 =?utf-8?B?dThwWXhoNzhESTRsMFJjbWVURWg3QWFFUjdsYkFMZ0FXakNRU2xFblM0aXJZ?=
 =?utf-8?B?dFRZTTJTVFZUdUE0VTAxSHZXWVpuZmRaNDBaMnRqR2xMVU5vVklzclA1THcx?=
 =?utf-8?B?enMzS3ljTHBvTFNNd3VlL2JUbm93YytlTXNFemlMdUVoWFduQTZWSjFrVHh6?=
 =?utf-8?B?ekpGQzRrSG96MGl0T1hMUElRZXdCdk9CR2hKd1dmcEFXVjQxZ1haTDVDbFZa?=
 =?utf-8?B?d3NzZjBVZlZvSmdQZnQ4dHF5M0NNSGpEcjg1dWNpRWZVZklDblIrbFZNUkVN?=
 =?utf-8?B?WUVZVnhHdmlxcDVtZWttQW5DbktjOW1XQXR5K3p6a0lHbGR6R1ZWUT09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0067a4b0-b9fb-4c61-e6cf-08da1233df29
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 09:58:42.3824
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 1RLYnbEyp1OtEh58J/MgBNr+Up6U2vWPlVEkkur/Gf5i3Zec8riauwnlMHYvLOp/gd3ezUo3m3y5B9H1jFFm+g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0402MB2833

On 30.03.2022 11:36, Penny Zheng wrote:
> --- a/xen/common/memory.c
> +++ b/xen/common/memory.c
> @@ -249,6 +249,26 @@ static void populate_physmap(struct memop_args *a)
>  
>                  mfn = _mfn(gpfn);
>              }
> +#ifdef CONFIG_STATIC_MEMORY
> +            else if ( is_domain_on_static_allocation(d) )
> +            {
> +                for ( j = 0; j < (1U << a->extent_order); j++ )
> +                {
> +                    page = page_list_remove_head(&d->resv_page_list);

How do you guarantee the pages are contiguous, as required by a non-zero
a->extent_order? Did you perhaps mean to forbid non-zero-order requests
in this configuration?

> +                    if ( unlikely(!page) )
> +                    {
> +                        gdprintk(XENLOG_INFO,
> +                                 "Could not allocate guest page number %lx\n",
> +                                 gfn_x(_gfn(gpfn)));
> +                        goto out;

And earlier allocated pages are simply lost / leaked?

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 10:16:25 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 10:16:25 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296194.504130 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZVN7-0000hP-2F; Wed, 30 Mar 2022 10:16:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296194.504130; Wed, 30 Mar 2022 10:16:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZVN6-0000hI-VC; Wed, 30 Mar 2022 10:16:12 +0000
Received: by outflank-mailman (input) for mailman id 296194;
 Wed, 30 Mar 2022 10:16:12 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=b505=UJ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZVN6-0000hC-37
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 10:16:12 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6b672024-b012-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 12:16:10 +0200 (CEST)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur03lp2050.outbound.protection.outlook.com [104.47.9.50]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-32-8YXU2N0bO0mJe0X-KLTiEw-1; Wed, 30 Mar 2022 12:16:04 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by PAXPR04MB9569.eurprd04.prod.outlook.com (2603:10a6:102:24c::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.22; Wed, 30 Mar
 2022 10:16:03 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.019; Wed, 30 Mar 2022
 10:16:03 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6b672024-b012-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648635369;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=UNOxUHuzIjbhV4rTP6rwq1mEc7v5/CQf3ONg4fa4k2E=;
	b=Fw/Vnj0BVV/lvS9SqCmyPhkVew7uAq368+WMVqrRDggmLu7MdfW4CNHODLfDdP65Da9lCH
	qqheQTExTK1mso8qDOaGxRLOi1noyLD5ncb86toFCOdfui9kdbqbS0DIcGQ8fio7gZyWTR
	YDBNetifV1rCpee9SuVOwwvc9Hs7WEc=
X-MC-Unique: 8YXU2N0bO0mJe0X-KLTiEw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ODA8iPtkdpcZASlGKuj0OHLmEZTjlbxcnjOI8RvBs3wrrUS8DbwHWa4DOskfnQ5astNwgmoaTjEKQDlGEgYinbZODdgOjMCdz9at5RqjkdD41K7j6eTZiVn5nJpmS9Mqd/irOJG6d+EWJdWsvbXzrvg6rnQz/VB7S8dWTkZNumE9sdS8dHPOkdQ/2G4FJzoX0zxeKDIRkKJqDD2avH9PVRCe9kZ8V//Qn3u7BQWWqHdNM0/wyAwL0EfA7rzoEJLeH+JL9JCDobgEjex794ApEzTlDQ3Q3ur4guZCL/LMImv5qh5AZQMxdzv7Agy55+dz6o4yHuOPjpQH80VU8lihRg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=UNOxUHuzIjbhV4rTP6rwq1mEc7v5/CQf3ONg4fa4k2E=;
 b=inIz4QVDF7r07buYGlEFb+/AwLCc4EWtjYexlyFnz5P6o9m85j3S9QJ/Y8GuQxuFDHaC931evLnDNWN3rhEB9jiz8ltXO6sAqEpLzaCs2Q8JLkLctDG5WPvRTo7hsV7syCeWBBLWfVdz6M0Op8KNOO7McOFqKOE16ZKV1Oo44z1u+NngJb0CM5D5vU2ZqJ3EiM6A5SQPEwJB3rdcNw31dJCi3/jL13ARdZArYH/ab6Dz+T9Yppo/qbA0uYT0UdLjv/XcFkZi0xRZYgP+rdLMzNETlKetGnpBWYW5JwYt5/Bx5rDrjEgYJQZVZowr5Qtpoqt8sUZIJ7bvK+XJvj0yyg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <466e1d4b-a4b6-0797-ca1b-1ea59a3993ba@suse.com>
Date: Wed, 30 Mar 2022 12:16:00 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
From: Jan Beulich <jbeulich@suse.com>
Subject: preparations for 4.14.5 ?
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: George Dunlap <george.dunlap@citrix.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Anthony Perard <anthony.perard@citrix.com>, Julien Grall <julien@xen.org>
Content-Language: en-US
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR04CA0079.eurprd04.prod.outlook.com
 (2603:10a6:20b:48b::23) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 66377a3b-6a7b-4ae3-12c0-08da12364b70
X-MS-TrafficTypeDiagnostic: PAXPR04MB9569:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB9569A9665D6BBB5DB251368BB31F9@PAXPR04MB9569.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6512007)(86362001)(508600001)(5660300002)(38100700002)(31696002)(36756003)(8676002)(6486002)(4326008)(31686004)(6916009)(7116003)(186003)(66946007)(8936002)(83380400001)(6506007)(2616005)(316002)(66476007)(66556008)(26005)(2906002)(54906003)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?VEJ4QXRLTGJ4OG1SNmRTTkgvMjFiTGpMeit5ckJzS1N2cDdNb3Z5dmFiYkMw?=
 =?utf-8?B?Qnd3QUhMekIyT0ovV0ZHSzEwbGdWbjFEeHRvOEo5a3BPMDdlbUUveFVJYkM2?=
 =?utf-8?B?S3ltaDVDUmpJckxUbmlNMHRkYXBIVGd6MWE2bnZycGRXZ0wrb3FoTVovYXZH?=
 =?utf-8?B?VjRkYWIxWTV0UEVVblgyQWhvSjlxYy92ZWdkbmdOMTZkb3lTSlk3YXNrUno4?=
 =?utf-8?B?ekhOakVRVzh2aEQ2L2E5RHpIREo2N0FUK3d0Zk5UMHI3VFFFZTRPT2xSRzdR?=
 =?utf-8?B?L3dtWVljb0dOUWhjN0FyU2haWUdnZUN6c2FYdlhvN1gxbUpRU0hiSEJ3cTAw?=
 =?utf-8?B?Z1o2UGJBeEZGd0JSRlVUazN0SUxhY1ZNK3ZIQmxmWHdQTGN0MmM3d0E3VFd5?=
 =?utf-8?B?SDJxTDIvaFpYb0N3bHprU1NMT1ZtSE12SGZsdC83MWpSWmRISXdzdzBjdWda?=
 =?utf-8?B?bG5XR0dRYXQ2RUhIajRBekh1dTYxQlNiYUFCaWM3NGx2bXphc1MrT2pxQlps?=
 =?utf-8?B?ZmZnK0s3dmhUZkp6aUUvOFQ2ZGZCVWgrNDhQcXVabTZ3V1BMc3pJamNqZG4v?=
 =?utf-8?B?RmNjemxIb2diZnorbk1MdStrRE9YdENOeTVKQ1lLQ1cyd3QxckpHTzB1R3lq?=
 =?utf-8?B?QXNvR2NUc0oyUzRXazEwaVJvdVB3L0pZc1BnZEsxenRiS1NGaDhSTE1xbmlk?=
 =?utf-8?B?L0tiWTR6U0lPd3JaU0tFd0V5Z1dOajVzd1Vtdnd1TCs0ZTl6cTJ0VmhnS3Yz?=
 =?utf-8?B?K1lMM0tRVkN4OXpjZjF1R2xDTjBHM2tvR1pWT04xdGJmclIrTzA2endWZmdU?=
 =?utf-8?B?aTZDanBFSUw3Mk0ySnFQODVqcDIwMEJNQWFQZ3RVU09rWG9QWk9ITDBiUlpl?=
 =?utf-8?B?NmVEQ2VETnZ3NitDRHFsOXYrZG1KN05YUzBTMW54SldneUxXZ0RzNjJoZjhC?=
 =?utf-8?B?Y2FlNllSYXhRYzg5UCs5SEptaVdtV3Vmd3RvWGxhRk9BUUlLKzhHVjlmRFds?=
 =?utf-8?B?SWdscWFGNFZPMzVCNDUxNDV6bjBDL2wwNXNBNndQRTZCdFV0NHhTYnZlSEpX?=
 =?utf-8?B?SDgvVnRnTTZ6Umo0N3JJNHJyZFpBMi9vL1RMSEdrWG10bU8vT0ordS9heFpv?=
 =?utf-8?B?OHJHT01OVUxDZ1pVeDBJakFKK1U3M3F3bTl5ZmZPQ3RIZVVydnlpMFJHYXJ1?=
 =?utf-8?B?NGFRR1ExRzkrcUdwVXFVenhvWDdhQ1RMSHhBOWFQVTA1RzBKT1FRQjl1RWdq?=
 =?utf-8?B?UStYVDYwRkpzTmNwTHkxMUVDUkNyUmFmaG5zamZRK2xHV2NMT3dHai84Y0F0?=
 =?utf-8?B?R3RvRFQyVVlrbDkwZFhqTjdxaHp2dHBuYXd0Z3lmdXFNeTFHdi9EKzFmLzFx?=
 =?utf-8?B?NloyVzRDN3ozVEtuU05DQjVCUFlxQXRaUXlqM3N0UENJOVA1NWhhOEVVdkcx?=
 =?utf-8?B?aHR5MHA5YVhQVUdsQ1FUbDNtaTN1VHROZ0J0WUVmelFaMytPNXp5d01VMnND?=
 =?utf-8?B?eW02OTc5ZXBJRVAxOHYyS2g4WXI3QjhmWDJGNVJZcmw0NVY0QzJ0K2JNOW9K?=
 =?utf-8?B?aTd5a0pyTnNHd2ttYzBLY05zYTVtc0JKdWtNS3V3czVuZGs2VUNwMnUyNnZL?=
 =?utf-8?B?a284dWRuRkd5YkV0N29YQ2FkamVZRDdac3pmdGhZS1g2Sm0yRHorQUZvVDlN?=
 =?utf-8?B?MDNlQU82cHN2SE5kNE5nUVU0Z0paeU9Od093eTZ2MG5VbldlMHAyNGsyQTQ0?=
 =?utf-8?B?RnhWTlNPaktFZzMybnAwei9PenZxTERWV1VacW0vVmJiZVRCZ3ZhdGpvTG4y?=
 =?utf-8?B?M2Zjbk9HM2ZEN1F4NTZWakprdkN5NXNKYzlCUSt3azJadlEzYVJIbThwK0JE?=
 =?utf-8?B?aXZudnVVemxOVWliR1p1NmY5QnRheDZJR0tMb0l0Ui9ybUVjbjBEcEEzNFpk?=
 =?utf-8?B?WUxmc1BqRjNmdjlrQ2xBand4MUxQUVdzR28xRUhjS1VXbTR6L0xPQWNoaEht?=
 =?utf-8?B?TUY1UW5Ic2diQlZGbmJYdFl6ZmtSOERqaHJyK3B5SUlwdDNqRDEyNCtpL3o1?=
 =?utf-8?B?Y051dkw5cEYyYndVNDMxbGozYmR1Q2pGQnlwdlpKOUs3U3dKY25OakFiZDhM?=
 =?utf-8?B?Snh5L2xXS2RmRlVWMkI3ck1hYSt2R0p2dEVySHJuVXZBNWY0MHdVaFBVb1VR?=
 =?utf-8?B?Um9iQzBpcFlyK1ZFdFY5TTFrd1FDUGJUQldoV1pRZm1zOW9jK0tFcTR2bE1J?=
 =?utf-8?B?a28rT3M2YUg1TWhiV2JFTTRUbCtIVVFPZjVVdmdXWkRCK2h2ZDZKT01SWlBZ?=
 =?utf-8?B?UG5XZ1d6WHNLTHlZWlhHVjhuV0hHMXord0dLTGIyNDBSeE5JMWdsZz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 66377a3b-6a7b-4ae3-12c0-08da12364b70
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 10:16:03.0766
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: VjvmbOm0qYlnars7JD7oZ0SPXfJC6vut8cPGaukKmvYhAUFP2+OGGpCi2TSJpdyosCZ7fn7pWSeRQ2rQyzo1ew==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB9569

All,

while 4.14's general support period ended in January, we're considering
to cut an out-of-band release due to the relatively large number of
security relevant backports which has accumulated in just 2 months. By
doing this we would _not_ be promising to do so again in the future.
Please voice objections to the plan (or support for it) in the next
couple of days.

Since it's a little easier to "batch" releases, I would intend to keep
4.14.5 aligned with 4.16.1.

Commits I have queued but not committed to the branch yet (and I won't
until in a couple of days time, to allow for objections to the plan to
be raised):

dd6c062a7a4a tools/libxl: Correctly align the ACPI tables
aa390d513a67 build: fix exported variable name CFLAGS_stack_boundary
e62cc29f9b6c tools/libs: Fix build dependencies
eddf13b5e940 x86emul: fix VPBLENDMW with mask and memory operand
6bd1b4d35c05 x86/console: process softirqs between warning prints
07449ecfa425 tools/libxl: don't allow IOMMU usage with PoD
10454f381f91 xz: avoid overlapping memcpy() with invalid input with in-place decompression
0a21660515c2 xz: validate the value before assigning it to an enum variable
b4f211606011 vpci/msix: fix PBA accesses

Please point out backports you find missing from both the respective
staging branch and the list above, but which you consider relevant.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 10:19:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 10:19:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296204.504144 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZVQU-0001Pj-Ox; Wed, 30 Mar 2022 10:19:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296204.504144; Wed, 30 Mar 2022 10:19:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZVQU-0001Pc-M0; Wed, 30 Mar 2022 10:19:42 +0000
Received: by outflank-mailman (input) for mailman id 296204;
 Wed, 30 Mar 2022 10:19:40 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ZQ0c=UJ=citrix.com=prvs=08136f46d=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nZVQS-0001PR-St
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 10:19:40 +0000
Received: from esa2.hc3370-68.iphmx.com (esa2.hc3370-68.iphmx.com
 [216.71.145.153]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e76ba4f7-b012-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 12:19:39 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e76ba4f7-b012-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648635579;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=azB2e2uEQuYN2b32gGkByK32Cd69NtOGmZ37qJN786w=;
  b=H4x+y9STsOuK2X4GQ6PawHwcNg82ykrbl/6TZHxIG35vTBWsbjc3YnIu
   +YffVlY2B5gx1VYyK1LtMYi2Vn7qaRLLUODTVH7rDGDNaxGsVTpORm3Yz
   qs45aDRlLUE6P8QkPiEm0ZcmuWrdVTdpdEoBolpBtATQQ5Ttw5bI8/gJW
   U=;
Authentication-Results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67536659
X-Ironport-Server: esa2.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:uqPBYaiXAwwTjlsU6ZS5aiYhX161eBAKZh0ujC45NGQN5FlHY01je
 htvWGiCPfqMZ2rzctF2aN6w9RtSucSEzN8xGQdppHg3Qysb9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFjV4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YSgGF4uSvNU9aQtFGjEmL7xro7veE0Hq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bkmtnwjzDS+4vXLjIQrnQ5M8e1zA17ixLNaiBO
 pFHN2c+BPjGS0RpAnVMCbRup7qhoyfFUjFji1XWnoNitgA/yyQuieOwYbI5YOeiRsJThE+U4
 H3H+2fRBQsTP9iSjzGC9xqEluLJ2C/2Ro8WPLm57eJxxk2ewHQJDx8bXkf9puO24ma8Ud9CL
 00f+gI1sLM/skesS7HAswaQ+SDe+ERGApwJTrN8uFrlJrfoDxixKUctaGBlWfwcptI/VWQ4x
 3LSm8rbPGk62FGKck61+rCRpDK0HCEaK24eeCMJJTc4D8nfTJIb1UyWEIs6eEKhppisQGyrn
 WjWxMQrr+9L5fPnwZlX6rwub9iEgpHSBjA46QzMNo5OxlMoPdX1D2BEBLWy0BqhEGp7ZgTZ1
 JTns5LHhAzrMX1rvHbXKAnqNOv0j8tpyBWG3TZS82AJrlxBAUKLc4FK+y1ZL0x0KMsCcjKBS
 BaN5VMMtMUKZiPwNfMfj2eN5yICl/KI+TPNDK28UzazSsIpKF/vEN9GOyZ8IFwBYGBzyPpia
 P93gO6nDGoACLQP8dZFb7x17FPf/QhnnTm7bcmil3yPiOPCDFbIGeZtGAbfNYgRsfLbyDg5B
 v4CbqNmPT0EC7agCsQWmKZORW03wY8TWMmu8pcNJ7fZSuekcUl4Y8LsLXoaU9UNt4xel/vS/
 2H7XUldyVHlgmbAJxnMYXdmAI4Dl74lxZ7nFUTA5WqV5kU=
IronPort-HdrOrdr: A9a23:93rV4aMjlDvZ+sBcTgWjsMiBIKoaSvp037BZ7TEKdfU1SL3gqy
 nApoV+6faZslcssTQb6LK90cq7MBXhHPxOkO4s1N6ZNWGMhILrFvAA0WKI+UyEJ8SKzJ8n6U
 4PSchD4IKZNzdHZdGW2mSFOudl5PSs35qpi/33wnpgQGhRGtxdB6MSMGim+zVNNXF77TtTLv
 ahz/sCnSOpfTAvdcKwCmMeU+Wrnbf2qK4=
X-IronPort-AV: E=Sophos;i="5.90,222,1643691600"; 
   d="scan'208";a="67536659"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=MXuN7FKD4hZdDTQUg+iLnGeenoU5xO3tKAID3z49oZS14EN8frHAM985EwAAbtwzzBg6EMwVYEa/k+/YXtJScmlpqdVZjwLFqw8lmTRtp1HV2iqRdAbPY5QfMqBqsaC2fkPDA0+UA6HFyqWdgRvX754qIHw5CPz8grycHz/KFd9rwKyut0jmfac5IQnufsI8SiHYfSlCZBUbtAx0/WspuhTjqxROKIghkWRWZ3L1jm5wZYC2CLEew+t3hFLHVfIt1N9AxZ7LRuPqsN5paNHWGsdISWwYKDz9WhX1s/AVh4uj2JgUINbyZlJtHUQMvftx22aOS4qrY9JcdMtQvFECgQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=XUpRR1rswfTfSO/q6qpgnmXZi7Sgj4fUUKkmY4+kR+Y=;
 b=SpDQrZHQACXPH1KMGAgceNUjo1ASTs/QiglKd0QQTMhxP0C0GxtaXc6FpMzjpsanY/iZMwo03X8ChyMSQuWCso4YHnFVXzs7qKn+Rz1EFFja27pjCRzYOfmgw0DzM6TqTsN74ZqtbdjZNqogPG2KLFWoHKRhAGZZjOPHxHCtDUCBFPQZutOVdDeqNVRSWyejYS0+C1uApxyUmDTa9GZr0YCPBPQmKNEgv+i1woD663HqnvJBk5oJZP3BGHSz1B76aTAPQoHM2YzdVbHrSg737ro8feli3Z5ZMhkutdIWgW3wvj2HJ4byMzkEM4gXP5c6dAIMj6WIargaEo62yHLhrw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=XUpRR1rswfTfSO/q6qpgnmXZi7Sgj4fUUKkmY4+kR+Y=;
 b=ZqM0Fh96pgIYcJWk5GYH0NCAQ+mmda3WWTRWe9CpI67yTk7qgmh7sp5gRppU2lv1y6wlSiYuIoCSKoFHUGW/R/LHMhW10e3mrE2ejplIUVH9sbNRz3malaZ11M7ZH+uZwTa2OQcUXfaDIZSOmuc5J2hfREu0N34nSLZhezBnV60=
Date: Wed, 30 Mar 2022 12:19:28 +0200
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "Ross
 Lagerwall" <ross.lagerwall@citrix.com>, Konrad Wilk <konrad.wilk@oracle.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>
Subject: Re: [PATCH] livepatch: account for patch offset when applying NOP
 patch
Message-ID: <YkQusCcbe++iMGnH@Air-de-Roger>
References: <2df6d890-9d91-62cc-8057-3d50f1501ad5@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <2df6d890-9d91-62cc-8057-3d50f1501ad5@suse.com>
X-ClientProxiedBy: LO2P265CA0285.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:a1::33) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c30107b2-0722-43fe-9f63-08da1236c8e4
X-MS-TrafficTypeDiagnostic: SA1PR03MB6579:EE_
X-Microsoft-Antispam-PRVS: <SA1PR03MB6579AADEA8325D53918A7D808F1F9@SA1PR03MB6579.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(8676002)(66556008)(66946007)(86362001)(6486002)(83380400001)(186003)(26005)(66476007)(508600001)(107886003)(316002)(4326008)(54906003)(2906002)(6916009)(6506007)(6666004)(38100700002)(8936002)(5660300002)(6512007)(82960400001)(15650500001)(85182001)(9686003)(33716001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?RDk3RkZ3TUpwUFhzUUUwT2VMRlVrRWgrRnR5b0F1b3c1RXdBN2NveTBKQXNV?=
 =?utf-8?B?dmxyNlZyKzNGNXcrUFdaMzlwemNaanl0dUNOVXVwL1IzeVlYTWFJQ0oybHFF?=
 =?utf-8?B?bkRpTGxScmtjbEFuQ0lRRVdEZ3IxQk4vZEZTMW1meGdMTGlMN0xnSk5kL1Nl?=
 =?utf-8?B?SDJ6NDNQcWdIYWlFKzZZZnpaNzBBd0xIcy9jMmcwTzJNaTBYSE0vKzNOdytv?=
 =?utf-8?B?VVNBSFRBWXhjNUx1TTJ5WDE1L294ZVVoUC8vc2w2eld2T3VwbHo4enRiVVln?=
 =?utf-8?B?NzFuTzdiWFhmSWc4eUFFTHo1ODdnZklBTVBjN0xBQWRpa2ljSVNjNWZGZmxH?=
 =?utf-8?B?TStnYlJLdzNMTDhHRFo4NXg4cVd6aVFDZFhIdGJLRzl1Szh1UXI4b3hKSmxu?=
 =?utf-8?B?bytUWXlsaTR5emFrRXpVZmhZMUx6VHBlV2ZuRHNDd1FjT1FPdG9ZQWV5YnpF?=
 =?utf-8?B?Y09kd1JRQVZpc1BSUFUyakNmQ2tKV2FrSWNkWHV4eFVwMGJ1WVhhOVVJWFRa?=
 =?utf-8?B?MHRzSWtGV3h6Qy9pVnArcTVEQlRjWE9YQVZMMFpQMHM2YksxL2xlYzdweVEr?=
 =?utf-8?B?ZVRWQjYyK1VUMG8weHRibEN4Zjhqc3d1dkdnQm45MkxidjZTYTE4R2ZFSEpk?=
 =?utf-8?B?ZnQ2SUtPRzhyaXNxd1dLQjh4N1FzdnNCQUJzUlRrdjJ0ZFZoTVRiK3lvODBW?=
 =?utf-8?B?Tmp3SndKenlqb2V5UnJZbzUySjJjblVLNENuVkQrb2ZXQkw0RzlpdUFiU2VG?=
 =?utf-8?B?S2ppQjlxelhMeXFOaG5CSEtCcjc2YVdBNmVuT0cxMkpSaVdoeE5VeHhaTmMr?=
 =?utf-8?B?NDY5SjhTR0Vza0orQTlpSDlaU2dQaGdsa2xNLzU2TEZpNjVDU01yMUJYM0pE?=
 =?utf-8?B?Y2U0aThCekkzdkw1TkFSbDdqRVRQc2hEU2xsQnpaT0IvK2ErY2YxN1VFL2Q2?=
 =?utf-8?B?WUJnUjRtL05ubHNVd0JJRHBMalhHZk56dW5YTVR4S2sza2hYUHFVNm9QZU91?=
 =?utf-8?B?WFBTem9Tbis0ckZnbzJzSlVDVG94ZWFwUHdLaHNyZzlhWFc2b1dpbDhTK0x2?=
 =?utf-8?B?Z21adE45NVd4cStMaE52d3lMNk80ZXh3ZnYrVTc2VUhFdGNyOFAzVjFKNElZ?=
 =?utf-8?B?WTBqRXVBM3RlUnQwSTViZ2JpREhLcFc1UHlBSlRQZEZSYjRBVTlhNXBmaFk5?=
 =?utf-8?B?Ulc3VStqY25nQzdyMFNZWW5IWmdwa0RRUVRyL2pINXJ1b2ZVQUQwdDJPNlFq?=
 =?utf-8?B?eFczcTFYYzcyV3cyYWVSVTJweUh6VHNXWVlhcGFpTi9LUGxqMTZ2cStwaFpp?=
 =?utf-8?B?MTNQVnZ5Y2k1UFhvcHBUaDlsdU1sZ1VsM2Z0QlNNVURhNVBXUEQyV203amNJ?=
 =?utf-8?B?Zmw4Z1JvSm1Hc3N1VUpWRmUyQk9zUEtHRnhQT3VvQUd4ZklzaDkwYjV6UGpL?=
 =?utf-8?B?K04xSFFDNWdLTXVuTVV5T0d1TmtXQVJ5aG1lR0t6S0RtVmkzSFJvY1RUSTZU?=
 =?utf-8?B?RGh5b1lndUZVSDBqSTdwOWk4cFgrb3RRdDVQREwyNDdTSFNxVmk3VC9INlJp?=
 =?utf-8?B?SjVEN0VUMndvbmNJWGpWdTh2T1JvQTY5aEFBZGwvVGRWR2ZSZ1FBdmpYQ3FR?=
 =?utf-8?B?dEErRVpEcEo1NnZhTzJYdUh1RkhzWmk1SklvOWdQakxvb0g3RHZsV2hDZVpj?=
 =?utf-8?B?YnE1eG9BYUsxRjlnYXl5Y3dEekx6N0Y3RkZuT1ZEYVNBTE5UWGE3bWNqYkp1?=
 =?utf-8?B?Vkt5QTdmbGNuOHNXSlVjNnhBRERIenFXdnRuMFJ6VEFQYmEvQ29ITUN1dDky?=
 =?utf-8?B?a3ByZ2MrbVhaQTNnbTNZZzVWanlBNXhNcFFUWjBYRWU0dXE3aG83VlpHQ1l3?=
 =?utf-8?B?ampwaWRtem82dU1tZ3hJZ0MvVkViU0duMjdZdHJLRkRoamtPRnZwTEhTQ2ZI?=
 =?utf-8?B?TkFKY1Z6TXB3WHBKM3F6WDMrN1dQYm43cEI3SVdZbG5FTzRsZXo1dnE4Z1Uz?=
 =?utf-8?B?cTJHZnZaNm92eHljQnpwZ3RUS2RrMlE3dFZZWUNxSXd4RW5rZ1JTQ0xaSEh4?=
 =?utf-8?B?NHlxTWhBczZQalJBZlJVSThGa1YzdTY2QlFPeFhtWElCZVZUS2wyanVTcUYz?=
 =?utf-8?B?enAyU2RGOXJUaWFmbjB5NnlyYlFwSHpKcWVkRWVXN0RpTmNFdkJ5STJXY0t3?=
 =?utf-8?B?MEtldHlNVisrM0E5eDdzY3RZejNraVg3bWFVZEJvMXo4LzFEOEVBQThkSkZk?=
 =?utf-8?B?STg3TDlhZ0ppdElYS096RGZyL09GbCtTazdHaVNzdkVKOCtZU29FT3FoRU9W?=
 =?utf-8?B?KzN1enVyRTBCWXYwR2NsWnlqRWNsM2k5V2ltcXEwdDZ2VTZORGdTYXBNcG1X?=
 =?utf-8?Q?waApUVVdvEe6zPFY=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: c30107b2-0722-43fe-9f63-08da1236c8e4
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 10:19:33.6506
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: tm9HgNYE9rmBzwGukt16F8v3l6qvQWiJwfT9rKiXPbJrCO8sCn3NvtSNfnUVfd31t5NzLzUqYgxtYlWRq3a6Hw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR03MB6579
X-OriginatorOrg: citrix.com

On Wed, Mar 30, 2022 at 10:03:11AM +0200, Jan Beulich wrote:
> While not triggered by the trivial xen_nop in-tree patch on
> staging/master, that patch exposes a problem on the stable trees, where
> all functions have ENDBR inserted. When NOP-ing out a range, we need to
> account for this. Handle this right in livepatch_insn_len().
> 
> Fixes: 6974c75180f1 ("xen/x86: Livepatch: support patching CET-enhanced functions")
> Signed-off-by: Jan Beulich <jbeulich@suse.com>
> ---
> Only build tested, as I don't have a live patching environment available.
> 
> For Arm this assumes that the patch_offset field starts out as zero; I
> think we can make such an assumption, yet otoh on x86 explicit
> initialization was added by the cited commit.
> 
> --- a/xen/include/xen/livepatch.h
> +++ b/xen/include/xen/livepatch.h
> @@ -90,7 +90,7 @@ static inline
>  unsigned int livepatch_insn_len(const struct livepatch_func *func)
>  {
>      if ( !func->new_addr )
> -        return func->new_size;
> +        return func->new_size - func->patch_offset;
>  
>      return ARCH_PATCH_INSN_SIZE;
>  }

Don't you also need to move the call to livepatch_insn_len() in
arch_livepatch_apply() after func->patch_offset has been adjusted to
account for ENDBR presence?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 10:21:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 10:21:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296209.504155 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZVSc-0002m0-6w; Wed, 30 Mar 2022 10:21:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296209.504155; Wed, 30 Mar 2022 10:21:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZVSc-0002lt-2l; Wed, 30 Mar 2022 10:21:54 +0000
Received: by outflank-mailman (input) for mailman id 296209;
 Wed, 30 Mar 2022 10:21:52 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ZQ0c=UJ=citrix.com=prvs=08136f46d=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nZVSa-0002ln-Qk
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 10:21:52 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 35eddb9e-b013-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 12:21:51 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 35eddb9e-b013-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648635711;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=3ZDWJS0J58z/gJjr6hAsHu6lpYZcEoDOLVNt7kl+IqU=;
  b=HkNBtPr6L0oMIeJTJKWcRwJgRrWc9S88uxZWDY20BU6rh5E0hWlMwOXs
   spZjzOx388oucpLMM2aUcie2ZVOJJt3TnaAw1zMY2Qc/MpORYVaHHl/9H
   vRPxR3rEb6Che98C2UvyiOROC0Z4cyF6FjWRIrDXNxmqjgIsgRQczUPbP
   o=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 66966293
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:QGCM7a7evOS8E5jBpSGh2gxRtATHchMFZxGqfqrLsTDasY5as4F+v
 jNND2uCPa7bZjOhedx+b9nlpkIDsZbWnYUwS1Y4rH1mHi5G8cbLO4+Ufxz6V8+wwmwvb67FA
 +E2MISowBUcFyeEzvuVGuG96yE6j8lkf5KkYAL+EnkZqTRMFWFw0XqPp8Zj2tQy2YPiW1vX0
 T/Pi5a31GGNimYc3l08s8pvmDs31BglkGpF1rCWTakjUG72zxH5PrpGTU2CByKQrr1vNvy7X
 47+IISRpQs1yfuP5uSNyd4XemVSKlLb0JPnZnB+A8BOiTAazsA+PzpS2FPxpi67hh3Q9+2dx
 umhurStey0kN7zvtN87QkR+ORBvPvVF9afIdC3XXcy7lyUqclPpyvRqSko3IZcZ6qB8BmQmG
 f4wcW5XKErZ3qTvnez9GrIEascLdaEHOKsFvX5t13fBBOsOSpHfWaTao9Rf2V/cg+gQQ6eAO
 ZBIMlKDajzOaBkSZV0OA64cge2Bu0jALxtF8E+K8P9fD2/7k1UqjemF3MDuUt6XQcRYmG6Iq
 2SA+H72ajkBL8CWwzeB9nOqh8fMkDn9VYZUE6e3ntZ1hHWDy2pVDwcZPXO5q/Skjk+1W/pEN
 lcZvCEpqMAa5EGtC9XwQRC8iHqFpQIHHcpdFfUg7wOAwbaS5ByWblXoVRYYNoZg7pVvA2V3i
 BnZxLsFGACDrpWIe1iQ/6a3gQiUKHUzB14TZncHQBMKtoyLTJ4IsjrDSdNqEaiQh9LzGC3tz
 z3ikBXSl4n/nuZQifzloAmvbyaE48GQE1Vrvlm/sneNtFsRWWKzW2C/BbE3B95kJZ3RcFSOt
 WNsdyO2vLFXVsHleMBgrYww8FCVCxStbWW0bb1HRcBJG9GRF5iLJ9o4DNZWfhoBDyr8UWW1C
 HI/QCsIjHOpAFOkbLVsf6W6ANkwwK7rGLzND66IPoceOMErLFXfoEmCgHJ8OUi3yiDAdollZ
 P+mnTuEVy5GWcyLMhLoLwvi7VPb7n9nnj6CLXwK5x+mzaCfdBaopUQtazOzghQCxPrc+m39q
 o8HX+PTkkk3eLCuM0H/rN9IRXhXfCdTOHwDg5EOHgJ1ClE9Qz9J5j646e5JRrGJaIwIz7+Rp
 SvsAxUwJZiWrSSvFDhmo0tLMdvHdZ1+sWg6LWorO1Op0GIkeoGh8OEUcJ5fQFXt3LULISJcJ
 xXdR/i9Pw==
IronPort-HdrOrdr: A9a23:kIDg1KN78/xee8BcTgWjsMiBIKoaSvp037BZ7TEKdfU1SL3gqy
 nApoV+6faZslcssTQb6LK90cq7MBXhHPxOkO4s1N6ZNWGMhILrFvAA0WKI+UyEJ8SKzJ8n6U
 4PSchD4IKZNzdHZdGW2mSFOudl5PSs35qpi/33wnpgQGhRGtxdB6MSMGim+zVNNXF77TtTLv
 ahz/sCnSOpfTAvdcKwCmMeU+Wrnbf2qK4=
X-IronPort-AV: E=Sophos;i="5.90,222,1643691600"; 
   d="scan'208";a="66966293"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=evSvxFuwi/uB90GdzrR7g7WGwFuVmNdTGWUvKjPhtr4oCKE+l0p9db432s1zP9umvvKUnhppH6P9oQR3/79s3breRwmmWHKW6DEsLPfKF32YJLYOHeH/twLaq8OTvqyawHhvUtaxjt2l9nxxqssej8g/Rc2N2F8KOGzA5fNscbUh1zDY+r4zLv6kbKR+7AzWfuNkCe7nC+6PLX+v8Qo0RIKQ2bv4N05Cn1zZKtXn9QyzCtNej1wDXxeaIO8/1VEVH5Dj0FBqxHPnfOaBlM39moZ7CQCFBDFsTn1/g21ZI9ex3ywNHsTIKuC4tssnNgZJBJbz7fyLH5t6z0cGRqKazw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=3zJ+G2N482nbFETHG8zLPVpn0gXvfSjvMLnJRlVqrZE=;
 b=lun6qe25Lv/KS7a0LspLruK1rnPe5Pyglod0Y/4Z4cV/pkMR5l5IwQ+cE/AQ376XlxzsK7aQNCjMDdmEqAX/OqWoEdij0OKSQTj/OdgBNQFjC+BW8GSuwJS8b9MDIWFyc272SmIJGlwo7pGf4E6z0R9SKIjyJ19N7cnPqwIBhP4griyNtoxU3ue5tXBU6XFaPIzs3i65eRPLI6YWyHapKkp26mjLrDQYjfFGTuTestd494dwmZvYKaCGJCuekLghzafv/3w7Hw3mrJddCn484SBr8jlkjUpruCMDHa2IeCtfCA6VsGAobiGXnAN8hF8Ge4cJYjLMtBN1e/fT9ys59w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=3zJ+G2N482nbFETHG8zLPVpn0gXvfSjvMLnJRlVqrZE=;
 b=xQghCkNXzi9l3Lxq10gn0Q+SqC8zH7hRSKhwG7kXlQFOF8rwq8NZJlEBdxhCMkKrFUvN5z8krsMMOl96QL+EU85VEucEJBaFx7Usgo0iVOlLNVc7byi+WaRbzFaZnTT/ctnjvupcKMtYuz5DXaqrFThY4+a9upt+UtKhfolY71s=
Date: Wed, 30 Mar 2022 12:21:41 +0200
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Wei Liu
	<wl@xen.org>, Andrew Cooper <Andrew.Cooper3@citrix.com>, George Dunlap
	<George.Dunlap@citrix.com>, Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>
Subject: Re: [PATCH v3 0/3] retpoline: add clang support + Kconfig selectable
Message-ID: <YkQvNR8uVQT4jiqP@Air-de-Roger>
References: <20220218143416.34475-1-roger.pau@citrix.com>
 <9500afea-3ca0-deb9-9d48-4983454b1c4f@citrix.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <9500afea-3ca0-deb9-9d48-4983454b1c4f@citrix.com>
X-ClientProxiedBy: LO4P123CA0465.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:1aa::20) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5f0e3e3a-3543-4f40-ecb0-08da1237182d
X-MS-TrafficTypeDiagnostic: BYAPR03MB4583:EE_
X-Microsoft-Antispam-PRVS: <BYAPR03MB458388717AB02834847A539C8F1F9@BYAPR03MB4583.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(86362001)(2906002)(9686003)(6512007)(6666004)(53546011)(66556008)(66476007)(8676002)(4326008)(85182001)(316002)(33716001)(66946007)(6916009)(54906003)(6506007)(5660300002)(508600001)(82960400001)(6486002)(4744005)(26005)(8936002)(186003)(38100700002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?d3MxRGxCb0Y2Mk0rNXN0aUR3dHJsR3VKM2lkN2hJLzNIZkpiZnpUeVF3dldw?=
 =?utf-8?B?dXAzT3lDMTRXTXJ4cHgyTXUzYlZLTWRHMWVLZGlGQmhlWjlBMFNCT1RrK1oz?=
 =?utf-8?B?dDh3aDBHZEUyNUhQa2ttb1NTODM0Q1RWQ0sxMTY2eUswK2dCcGJLSm5sUHZ4?=
 =?utf-8?B?czgvaXE0UHRUbUFzakl1cjlCOTdHWldGbXdaajVsU3Y3U0cyakFQNTdxSWoy?=
 =?utf-8?B?dFoxSmE5ZnovaFJpUkNNcDU4cEcvSlBhNEFuV1NrVWsrVjBWanRaY05mWFpG?=
 =?utf-8?B?SHpnZm9wNWdjK2NZejdKVkhVanV5YVRVVWpTVnpieGMva1l4Z3dwZ1VRMHNv?=
 =?utf-8?B?QkN1eFNSanh2MmI4RHgzR3FocHJoTHdwYitLNnd5SXpMQVhpN1kxaDhSdEVB?=
 =?utf-8?B?dWRxYnlqQ2hpOUZuM0xWVVhNZEkwNnFoZXJrUmJxTllHekdGQ1hXOHRIYjEv?=
 =?utf-8?B?NGtFQ0xkcERhZTJJV3JPRDBZSEFMRmR2ditDNDUwWUkrZkgyWUJKekNLdkNv?=
 =?utf-8?B?YXF6WUtZR2RmR2ZpSDB0TmJuNUhlVmxUTjNlVGJTVmdaR3NXNFJaZk9LcEo1?=
 =?utf-8?B?eWRtNnJ1OWttcFM3clR1a25NdFVSOVhpdWI2ZU9ndm52WUxCVDA4citPMFow?=
 =?utf-8?B?V3dCMW5oV2FscGdhTXVNVXo0WW9WMk11cFowTFk2RldGR3Awb3lNdWIvSWZ2?=
 =?utf-8?B?YjZKRDBiQkZvWnZtR3ZVZ1NDbUZBeHFjRkozbTlFUU8xejdXTktZdGtVOHQw?=
 =?utf-8?B?WEhpVDFvdklyaUt4NUpqQnNua2trbjNNYk04VUNNbmx2RktaS3didHJqYnlX?=
 =?utf-8?B?c3ZPbUh5K0Q2UmcrOU9iZFBmVE9pTDJ3bE1qYVBnbmxqdHYyNkU5cUFYRW40?=
 =?utf-8?B?eU9MUDZMZTMyMVdBTlp6eDRBZ2htZmJLL21MOUFBaDFPVnFKQjNXNDJtL0lM?=
 =?utf-8?B?cXRFTlNIOHpzYjNGMkdsOWgyRUpYRE9VVUNBT2cyeDlkd1MxQnBXWW5qV3pk?=
 =?utf-8?B?MEN0Qkk4VzJXTEpjby9oZTZlcE16RHo2Y2dtcmpUbmRVQm9qTWFXaXNKdHBS?=
 =?utf-8?B?bEZVL0NQSy93Z1EvV3JyVUcwb29QWjJVSXVBNmxsY0k4ZnNmck1oRkd4TWdL?=
 =?utf-8?B?cHZXenlDVmMxdHlYa0MzSy8wbVd3SXJURzhDM3F5ZktUZG1MaGNsT2lieHVL?=
 =?utf-8?B?YzcydkEwOHNJZ09JUDVpVjJWd1V5VyswaHVLNUNGUkFwRTk1UFJ5c3ZVR1NC?=
 =?utf-8?B?VmdRdzA1bkRFb01yTWpGMWgrZGhkeHpSeEU2aDdaTHRKUHY4TUtWbmF4Wlht?=
 =?utf-8?B?YjVQL0grVnA5TGRqT1l5T05ZVUVIeERSaWlZVzRGb2xLdzAvYjlORjdwTzU3?=
 =?utf-8?B?NitacWdET2UwSnpUaHNqdXNxcnVOREdNdHZnSnNWY2FmemZkUGxBMEpmMk5v?=
 =?utf-8?B?UEo3SzZqZHBsbmh5N0ZyYUQzY3NaMW04NW5Fdk5yaFlDdWFVMGRaa0txVEpt?=
 =?utf-8?B?WEJ6SFd2dFQraXJ3WG1OcTVQb0JBSjRHRmQvai9GRFJsRWMxMk9JOXJ3N1do?=
 =?utf-8?B?djRadGNCTHRTdDF3M2dPZjlFU1ZHcTNUNVI0RHpoRjdPU1NGNGxoVVlsOTN3?=
 =?utf-8?B?OWZzVEFEdktLd3RUcjNLT3ZUQ0lFdjBWZHFDY0VuVlZQend6Q0xVYnRMNlNr?=
 =?utf-8?B?R0ppdVBzT1JaU1BCZ0kxdzNteWUyTkJSVlR0VE5zVXpIRmV0TFBjYTJYSlVF?=
 =?utf-8?B?d1hyVms5V3U0TmlKL0xsVWMwOHV2cHhBUnR0K2FkaTRwWFZHR3UwcWZybkQv?=
 =?utf-8?B?VlQ4cmd6MTJZSmk1TnNEdzUrek9aOVdJVHBHbDB1SXN5SlMvaEFCaStPMWtF?=
 =?utf-8?B?Q29KbU1HdjU2RllZSkJ4TjFmWkFRUVVoMFJieVZqYklwd012TzFoSVdSZjVo?=
 =?utf-8?B?WkpsUC9tNG9UNGVHMXlHeXNrNi9jU1MzcG5mOUdhZ0Vaa1A2dUFxa1h5Q2t1?=
 =?utf-8?B?eS9mcmtqeW1lZWRaSU1ndzNzTTF1ZDUyODl0cU4rWWFsQ212MStLVTlpQTNw?=
 =?utf-8?B?eTVhdktEaE9pT0JlUGpBRXVQdlRnSDhzUGxKcjNUaTcxbXZsWmxtamR1V2th?=
 =?utf-8?B?SDRxcXJXa3lRN3cyOWVlektzSnJYbVFFM2NHejE1UW13WFVzMzlIUjg3bTA0?=
 =?utf-8?B?cVVCZTE4Mm9ZbHlvRzFnbS8wVURkME1xNlNqSUZST1I0RHM0S1VoT0x2YVFS?=
 =?utf-8?B?aFh1OERVVlNGbExUcjlETTNRWEg1Vkl3K3dabXBaT09MQnQ3NWtRL3NNMnZk?=
 =?utf-8?B?WG9wSG51RXZqY1h3RWFVWGE4OTJqUlM0bGcydDUxZzNhSkw2Y1JaY2k3bUs3?=
 =?utf-8?Q?8nRvwWqqIvJ6YP0s=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 5f0e3e3a-3543-4f40-ecb0-08da1237182d
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 10:21:46.6697
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: cFycYJ2tPqJA4EpoVEC1qe55ZYmDOpmjr3a9vaorS25nhrkHNzCSUCOrpUC1qRx4pZdk1Ay2GF4WNYf1PHWl7g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB4583
X-OriginatorOrg: citrix.com

On Fri, Feb 18, 2022 at 03:45:12PM +0000, Andrew Cooper wrote:
> On 18/02/2022 14:34, Roger Pau Monne wrote:
> > Hello,
> >
> > The following series adds retpoline support for clang builds, and also
> > allows the user to select whether to enable retpoline support at build
> > time via a new Kconfig option.
> >
> > I've tried adding a suitable description to the Kconfig option, but I'm
> > sure there's room for improvement.
> >
> > Thanks, Roger.
> >
> > Roger Pau Monne (3):
> >   x86/retpoline: split retpoline compiler support into separate option
> >   x86/clang: add retpoline support
> >   x86/Kconfig: introduce option to select retpoline usage
> 
> Thanks.  I think that's looking much better IMO.
> 
> One thing, we want CC_HAS_* for consistency.  I can fix this on commit.
> 
> Acked-by: Andrew Cooper <andrew.cooper3@citrix.com>

Could the patches be backported to stable-4.16?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 10:31:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 10:31:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296218.504172 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZVc6-0004GF-6K; Wed, 30 Mar 2022 10:31:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296218.504172; Wed, 30 Mar 2022 10:31:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZVc6-0004G8-2M; Wed, 30 Mar 2022 10:31:42 +0000
Received: by outflank-mailman (input) for mailman id 296218;
 Wed, 30 Mar 2022 10:31:41 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=b505=UJ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZVc5-0004G2-Eo
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 10:31:41 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 95d30c52-b014-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 12:31:40 +0200 (CEST)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur02lp2053.outbound.protection.outlook.com [104.47.4.53]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-40-WfaYn8FaO1-kV2bM14YenQ-1; Wed, 30 Mar 2022 12:31:31 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by DB9PR04MB8268.eurprd04.prod.outlook.com (2603:10a6:10:240::17)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.16; Wed, 30 Mar
 2022 10:31:30 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.019; Wed, 30 Mar 2022
 10:31:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 95d30c52-b014-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648636300;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=E276XZ2g+mW/3pKI7jKtP4u1n/hvmRd0wk497tzX1HY=;
	b=LpU3mHx0wol/khro0KtwBvOn+2xpopV3ngwHHtveOvcSaXjspmcyklfz2CZskEvA/jPfYF
	T6k+OS2zzo4iqHuFRgrRpAT37pW0UgrOFbRtyJhEW+fKaaRuiGIhcnwM0cXgosznklfdca
	l69Wn/lGQ4dCPmv51V7GBrtv76xogwU=
X-MC-Unique: WfaYn8FaO1-kV2bM14YenQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=cVMA13JUPTfXjrb8WHFFpddE68ubjydY048DnDRe5ZCNzyF3zDFmhLU43o46Y5mZRNHi4TIhQN/Mj//3xD0xvHkjKy7tnX7/HdAUhRno6YW3+ZoCCfbjed+pr7NN01T2T7T2lto6gtjp7jVl7cdimEI10V/3yzHAHQjiZFf0j1FY8nFxDyU0cung+aAbtDWC+f7fKxWlmGG35f6g8hgjF+L7e5+9e++EPd8mItdQ1F4Yvh7nEpX3WUCfXfCxn/ejw1PQUef2k9s5mUtCdQ6LVF2FPhwwRAPXeNF4hFWJhg4X5GptringcYxLhJfLtGoyYTrzKpvMcCvHWZol+cOGXA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=E276XZ2g+mW/3pKI7jKtP4u1n/hvmRd0wk497tzX1HY=;
 b=gwwjZ/RtLmQ2GpZ9IiAE0CzxXYg6c/6a4HN/JrW56/8xe+l1GHVF3qPxBjSLX3IEodc3O+BehKWyGlBAcKkGSDg0RR9eHOn671l4g0tcttnqW36Qr/nXdbhSG6WGbd2Fg9H+Mstm0r2ZzROLXCQORSVngodPNMPpVBW6iklp6cLNLk8fmLnCPtsBGL9Ljg8DFg032smI/qxS5xlfApw/oUfjAgAWZ6h3Q/cNYyU6L1IbtoY1AbDH/ZnJyw8UgXZLK5ZtUWiLUyXMLCqherspTe1CFJOv6JLexQw+arNp8TUv/OH0Huiq5CDPFPilUlNd2o+mQ0Rc6YMJ0NTQlGAPig==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <bdfbfe3e-66c5-3f99-8f50-16f38bfa78d1@suse.com>
Date: Wed, 30 Mar 2022 12:31:28 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2 3/3] x86/mem_sharing: make fork_reset more configurable
Content-Language: en-US
To: Tamas K Lengyel <tamas.lengyel@intel.com>
Cc: Wei Liu <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>,
 Juergen Gross <jgross@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Tamas K Lengyel <tamas@tklengyel.com>,
 Alexandru Isaila <aisaila@bitdefender.com>,
 Petre Pircalabu <ppircalabu@bitdefender.com>, xen-devel@lists.xenproject.org
References: <ab6bb88e90e5649c60e08a1680b3a2390441031b.1648561546.git.tamas.lengyel@intel.com>
 <3ebadf898bf9e165d657a31c0aa98bbd300ffcb2.1648561546.git.tamas.lengyel@intel.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <3ebadf898bf9e165d657a31c0aa98bbd300ffcb2.1648561546.git.tamas.lengyel@intel.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM5PR0602CA0015.eurprd06.prod.outlook.com
 (2603:10a6:203:a3::25) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: bfc0c7ec-bde7-4da0-ae28-08da12387462
X-MS-TrafficTypeDiagnostic: DB9PR04MB8268:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<DB9PR04MB826892E6B894004F72E5B000B31F9@DB9PR04MB8268.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(53546011)(2906002)(31696002)(6512007)(6506007)(54906003)(86362001)(6916009)(4326008)(66476007)(66556008)(66946007)(508600001)(316002)(36756003)(5660300002)(8676002)(2616005)(6486002)(31686004)(186003)(38100700002)(7416002)(8936002)(26005)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?QXFleEw2Z1VsRzZVendYQTNTd3FLMnpxT1Y3MkdBbXJLcWdkTUkwakpZNzBS?=
 =?utf-8?B?d0I4ZUdVd3JCTnpFV3piQVphRmhFMDBFamxNNDIyaU84VGNqOVp4MmtoRWpT?=
 =?utf-8?B?THRBL3VQcndOd2doRmJMeFBEWVNNUnh6K2xsQXBvai9jMytZVzZsM0NSczZs?=
 =?utf-8?B?MllXWFJZTTgvQS96bC9TcGJMSm40VG1uc3BoQzBMOTc2alh5TWQxd0xZY09m?=
 =?utf-8?B?S05HWTVSU25jWnlaNlVmeENlTWhLNjkzUFZ0QVFWbkNKQ2lDRmxrZS96QmM4?=
 =?utf-8?B?b21JZWgwOTd3eVE2Mmk1cHk1aXVEUUo2V3lod1UrZHYrMWZuU1lPcVkxaWR1?=
 =?utf-8?B?K2x4bGtsZTY4OUNzWWMvN1NqVkhBeVVYeWpWa0MzSlhFTDd5WWN0eHRUOVh4?=
 =?utf-8?B?V21VZFFHZTVVVlNxeGgvWTJLZm1MOWw0OHhQbVAwaTlVUUdwVEpVK0x4UC85?=
 =?utf-8?B?TEVKditUV3M3TlFjVHhHb295Tkd5SnFIdmJMcUQ2VDIrM2pQMTlzampJeWFD?=
 =?utf-8?B?Z1RqUXN4cmRmWGdzakNIL0xnMitPeVY4VitoNitGNmRMYU9pYVRZTGpJWExM?=
 =?utf-8?B?eEFWbjhyeE9KWnNnWTZBZDRKbDJlN2dqckdiaUttWFA5bFk1QndIdWpXQk9P?=
 =?utf-8?B?ZzFVMmJNTjdFU1Q3Q0FDdGdzbWMyQTZPTkV2eHFhTUZJQzExeDZsQ3NSM05n?=
 =?utf-8?B?WHU4cFhMWGFLdzVqTnJSTEgzUDRKZktzYzhreEZOVkcvdXRBa2lvQnA0bk5G?=
 =?utf-8?B?U0xNRElBTFp0QTRjaTJhMUVjSEZTK3RYbEx1R1NHbkJBS1MyY056K0IwNUdi?=
 =?utf-8?B?NU50a3pmNFEzK2E3RUF4ZHg5Nm0xM3NvZGVaMDQrVE54U3ZXZzVaclNrM2lm?=
 =?utf-8?B?Mks4K2JpMDlpeVlWcjZ1RUJGck9ISWp0ek5uMnJkS0NnOW5qaUNmdjZXR1JO?=
 =?utf-8?B?L2NoODZ3R01XZ0JCMDN2VWRQVjFYVmpBK29jSy84RnNjUEQrckpZaHJGQkNx?=
 =?utf-8?B?b2hodEs4YUtKcjJIL2txdTBvRjRSR1k1MVQ2S21iNUh2ODJVMUJGbEJZYTBi?=
 =?utf-8?B?azc0NElvT0xWeU8yQ29NbWwraE5wTHhsR3RiUm1pZEJwOWNDNzRORlVVSm5H?=
 =?utf-8?B?dlhQVFFWYVdxQy9iQ1FVeGN4Q2NidWVsNG1sZmkyd0tJNE5VbzBramZLSnVx?=
 =?utf-8?B?UnZQWjRVTWR6TWFUcGdUeG0ySzB1eEZTZ0JhUWdKL2ZvVUdTMXJwdGJrNTJ2?=
 =?utf-8?B?aFA1KzJDeWN6Sk5xMGUwWXloc1JkSWtyLzk1RllUVGZyQWROTWlBUTYvRW82?=
 =?utf-8?B?U2J1bUhITkhvcWZ5WE1TZDBEd1l2bXk4bEhQa3JiZDFxZEJwMUtFVDAvVXJS?=
 =?utf-8?B?a29ldFhoYUFqem95QUpVWVlLdURDd3Z1eFp1NU0xdnNDNnVQdG9RZUJEcDFU?=
 =?utf-8?B?VldjYnFGelNFeitWOTJSdDVnb3lILzA4dll4d1NOcTNhVmZKdWY2d3ljQW04?=
 =?utf-8?B?ZDJNajV4dFhHVE4zYjdGMGtVT1JYOUFQS1F3ZWgxR3lPSkNoOXluRDBwWnNX?=
 =?utf-8?B?NS9hQ0x0NjZqd1UvcHluTjNCb0IzRDliZ3piMjl5YWJkY3RHekRBWXZuUU8w?=
 =?utf-8?B?MEloL0o0a3BZZGoxTGk4OXJucFM3VmJMcElQT3MwME1VRWk0anR4TGJlQmFG?=
 =?utf-8?B?L1NJQjF1Q1VkUmUyUk1FMWlCUTU3UFVtY2hYNGFwU2d4aGdGRXpGVGxhK0VB?=
 =?utf-8?B?WG5hVlZZY3hiKytMVzY3ZXh4TmwvQkdvcWhCejA4VHJCR1R4dHZ3dEZBNXlh?=
 =?utf-8?B?SkFlL3JDZml6RlJNZCsxNVFackR4NlFReXdkZ0w3VlgxZVlaTEVSUkdXM05X?=
 =?utf-8?B?ZEVsU3Z4TlBEYkNSV0xRa1lIVU40RHN5VlMzcXREaVY0MGdzWS80TnpPRU4x?=
 =?utf-8?B?Qi96ZzlEL2pnVExJQXdVYUFVbUxlOHkxSll1clNVa203blllc05ia2dKZW03?=
 =?utf-8?B?ZU9CY0svOUU1eHZXUXhua3lzUVRPMmsxWlJuNnpTQ0FuaUthYVMrQ3hPcnRS?=
 =?utf-8?B?VlQ2V0RENStGY25iUXJlalo1SXJYaU00QVJhMmxDNFd2T2QwcDNzcG5JKzM3?=
 =?utf-8?B?U2hndmdoZCtCUS9SNE0wd1l6M1FVbnp1SWo3S0dFVXk5NDRuVVBvU25ZSGdr?=
 =?utf-8?B?ajBaOEhGVEZ4TXZnR1BMTDlIMm05M0MzOU9sYkhmQjdOZGRyQVlqZDZjRCtR?=
 =?utf-8?B?T3pjSjdtTU5RWmY1QTB5clZZVkU2cFluSW93YitHVytIVkpPaHJZSE5LRjAx?=
 =?utf-8?B?Ry9uNHhrUE16R04zdjhjdGhJNXhIbDdMdXpKTzB3SkNraXFraG8xQT09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: bfc0c7ec-bde7-4da0-ae28-08da12387462
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 10:31:30.7376
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Zy32Fxhn0D3BfmjWWTvrFIXSWYb5c7garsA6ntkLrmAtY/QvWUtqFU7lxCX822jTO6W3xb86THPLCjXVFrAR3w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR04MB8268

On 29.03.2022 16:03, Tamas K Lengyel wrote:
> --- a/xen/arch/x86/include/asm/mem_sharing.h
> +++ b/xen/arch/x86/include/asm/mem_sharing.h
> @@ -85,6 +85,9 @@ static inline bool mem_sharing_is_fork(const struct domain *d)
>  int mem_sharing_fork_page(struct domain *d, gfn_t gfn,
>                            bool unsharing);
>  
> +int mem_sharing_fork_reset(struct domain *d, bool reset_state,
> +                           bool reset_memory);

Please avoid passing multiple booleans, even more so when you already
derive them from a single "flags" value. This would likely be easiest
if you re-used the VM_EVENT_FLAG_RESET_FORK_* values also for
XENMEM_FORK_RESET_*, with suitable BUILD_BUG_ON() put in place to
prove they're the same.

> --- a/xen/arch/x86/mm/mem_sharing.c
> +++ b/xen/arch/x86/mm/mem_sharing.c
> @@ -1890,15 +1890,24 @@ static int fork(struct domain *cd, struct domain *d, uint16_t flags)
>   * footprints the hypercall continuation should be implemented (or if this
>   * feature needs to be become "stable").
>   */
> -static int mem_sharing_fork_reset(struct domain *d)
> +int mem_sharing_fork_reset(struct domain *d, bool reset_state,
> +                           bool reset_memory)
>  {
> -    int rc;
> +    int rc = 0;
>      struct domain *pd = d->parent;
>      struct p2m_domain *p2m = p2m_get_hostp2m(d);
>      struct page_info *page, *tmp;
>  
> +    ASSERT(reset_state || reset_memory);
> +
> +    if ( !d->arch.hvm.mem_sharing.fork_complete )
> +        return -ENOSYS;

Either EOPNOTSUPP (in case you think this operation could make sense
to implement for incomplete forks) or e.g. EINVAL, but please not
ENOSYS.

> @@ -394,6 +399,16 @@ static int vm_event_resume(struct domain *d, struct vm_event_domain *ved)
>              if ( rsp.reason == VM_EVENT_REASON_MEM_PAGING )
>                  p2m_mem_paging_resume(d, &rsp);
>  #endif
> +#ifdef CONFIG_MEM_SHARING
> +            if ( mem_sharing_is_fork(d) )
> +            {
> +                bool reset_state = rsp.flags & VM_EVENT_FLAG_RESET_FORK_STATE;
> +                bool reset_mem = rsp.flags & VM_EVENT_FLAG_RESET_FORK_MEMORY;
> +
> +                if ( reset_state || reset_mem )
> +                    ASSERT(!mem_sharing_fork_reset(d, reset_state, reset_mem));
> +            }
> +#endif

Should the two flags be rejected in the "else" case, rather than
being silently ignored?

> --- a/xen/include/public/memory.h
> +++ b/xen/include/public/memory.h
> @@ -541,12 +541,14 @@ struct xen_mem_sharing_op {
>                  uint32_t gref;     /* IN: gref to debug         */
>              } u;
>          } debug;
> -        struct mem_sharing_op_fork {      /* OP_FORK */
> +        struct mem_sharing_op_fork {      /* OP_FORK/_RESET */

I consider the notation in the comment misleading - I would read it to
mean OP_FORK and OP_RESET, supported by the earlier
OP_SHARE/ADD_PHYSMAP. Commonly we write OP_FORK{,_RESET} in such cases.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 10:32:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 10:32:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296223.504183 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZVdI-0004sH-KM; Wed, 30 Mar 2022 10:32:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296223.504183; Wed, 30 Mar 2022 10:32:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZVdI-0004sA-H4; Wed, 30 Mar 2022 10:32:56 +0000
Received: by outflank-mailman (input) for mailman id 296223;
 Wed, 30 Mar 2022 10:32:55 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nZVdH-0004rw-0v
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 10:32:55 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nZVdC-0008Pt-K3; Wed, 30 Mar 2022 10:32:50 +0000
Received: from 54-240-197-235.amazon.com ([54.240.197.235]
 helo=[192.168.5.112]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nZVdC-0002Vh-Dj; Wed, 30 Mar 2022 10:32:50 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=bqGlgGe1YmPKrKQJ98Fpjyid3oBYHPBuzpjUqyWp44s=; b=z28FmHueVc4nd/1WkqTkAasrnY
	qK10APGwcjLsg1yUpkPbqf5oB5xZn2VhapcUc2LS9vxajKzjuqMj7xIaVxeqNl38h9pWXpeb5WBiO
	asGwZfev20w/sFUpfTlQNmTgNDVYSF6eBPj/JLMXBzSId2y+LOh1yf/2GJtrrwPZ8bdI=;
Message-ID: <b0b49926-9a70-37f1-43d4-ac4e852198ba@xen.org>
Date: Wed, 30 Mar 2022 11:32:47 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v2 2/2] xen: Populate xen.lds.h and make use of its macros
To: Jan Beulich <jbeulich@suse.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Michal Orzel <michal.orzel@arm.com>, xen-devel@lists.xenproject.org
References: <20220322080233.53134-1-michal.orzel@arm.com>
 <20220322080233.53134-3-michal.orzel@arm.com>
 <2940b4c8-5d44-695e-4550-0a32c3a4c053@xen.org>
 <d5bccf50-c74a-40e6-843e-3ad682647efb@arm.com>
 <5121de30-644f-8a1f-ff1a-29c4d2ee7f0f@xen.org>
 <63a680c6-0086-230b-dbbd-dfe63609f9bc@suse.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <63a680c6-0086-230b-dbbd-dfe63609f9bc@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi Jan,

On 29/03/2022 12:42, Jan Beulich wrote:
> On 29.03.2022 12:54, Julien Grall wrote:
>> On 29/03/2022 11:12, Michal Orzel wrote:
>>> On 29.03.2022 11:54, Julien Grall wrote:
>>>> On 22/03/2022 08:02, Michal Orzel wrote:
>>>>> --- a/xen/include/xen/xen.lds.h
>>>>> +++ b/xen/include/xen/xen.lds.h
>>>>> @@ -5,4 +5,104 @@
>>>>>      * Common macros to be used in architecture specific linker scripts.
>>>>>      */
>>>>>     +/* Macros to declare debug sections. */
>>>>> +#ifdef EFI
>>>>
>>>> AFAIK, we don't define EFI on Arm (just CONFIG_EFI). Yet we do support EFI on arm64.
>>>>
>>>> As this #ifdef is now in generic code, can you explain how this is meant to be used?
>>>>
>>> As we do not define EFI on arm, all the stuff protected by #ifdef EFI is x86 specific.
>>
>> I find the name "EFI" too generic to figure out that this code can only
>> be used by x86.
>>
>> But, from my understanding, this header is meant to contain generic
>> code. It feels a bit odd that we are moving arch specific code.
>>
>> To be honest, I don't quite understand why we need to make the
>> diffferentiation on x86. So I guess the first question is how this is
>> meant to be used on x86?
> 
> We produce two linker scripts from the single source file: One (with EFI
> undefined) to link the ELF binary, and another (with EFI defined) to link
> the PE/COFF output. If "EFI" is too imprecise as a name for the identifier,
> I wouldn't mind renaming it (to PE_COFF?), but at the same time I'm not
> convinced this is really necessary.

Thank for the explanation (and the other ones in this thread). You are 
right the confusion arised from "generating" vs "linking".

Renaming to PE_COFF may help to avoid the confusion with CONFIG_EFI. 
That said, it would possibly make more difficult to associate the flag 
with "linking an EFI binary".

I think some documentaion about the define EFI would be help so there 
are no more confusion between CONFIG_EFI/EFI. But I am not sure where to 
put it. Maybe at the top of the header?

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 10:35:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 10:35:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296229.504194 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZVfy-0005X1-42; Wed, 30 Mar 2022 10:35:42 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296229.504194; Wed, 30 Mar 2022 10:35:42 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZVfy-0005Wu-0L; Wed, 30 Mar 2022 10:35:42 +0000
Received: by outflank-mailman (input) for mailman id 296229;
 Wed, 30 Mar 2022 10:35:40 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=b505=UJ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZVfw-0005W2-MF
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 10:35:40 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 2438c584-b015-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 12:35:39 +0200 (CEST)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04lp2055.outbound.protection.outlook.com [104.47.12.55]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-13-k-Raq1s7PDaqJDTs6qtzLQ-1; Wed, 30 Mar 2022 12:35:37 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by VI1PR04MB4271.eurprd04.prod.outlook.com (2603:10a6:803:3f::22)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.23; Wed, 30 Mar
 2022 10:35:34 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.019; Wed, 30 Mar 2022
 10:35:34 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2438c584-b015-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648636539;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=6u/x2PZq38fxOQOJmWVoRvdDUk0rJR8ePmHVSEk0KoU=;
	b=SU8KmLOwMgDWpAXjrTsu7/uvnyoNoWuI4i3biY6x9xwWQsvoaxgNTvnVARfj54gF/bLSO0
	U2z3KBVZtDwDR56hEHwTw6nHNmtFt5/Hs4snIuEbNvOHQZv+gMM4rzZr20CGUlxrx++Z8K
	VexWR205DrEltzWnKiXibxAXCeVhyVs=
X-MC-Unique: k-Raq1s7PDaqJDTs6qtzLQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=O+HRIyjswIchgtPZFsXZehXryyDJ4YDHmlXqCSA/i6/YRPrJSIMwkgwSmTLixNepJV8B66X1znTgbmLydqVlPg76GKnaSpbGlBpEWrdRGv9fSL6+MkFgd674cs2UXT3nxLJP+T6nAwcup9lJOB0RCtPbRI3Ry5aDKf/xuNLjEdQS8JaR7urAwo8j7w+he7t3vaa3gf03CkOGiKvJxck5XdHNp6Rml7lP+RCYGGEFO5pIQJs73GQLH2Fk5X8Kcz/c/jVENW8J7j2hfP8cO4qjmZL9ofQdEV5FJhYpmi3nsorsk6xAo9EzlsGGH6mAr9GAzvU8kmvSR9lCoc3xu/NP0w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=itRVDMm65ODpsIpnEIn3YUUtIrx0s+IAC6E73fyZbNo=;
 b=FsY0OvRVzwAlPh94kwjygHS3HvRqNuFDrTyIS3sblrpokxk9m4aYY9WpPkv6B0UyF3xG/iUJd15xnPL9meCNft+2EY0Yqmvxut5AaAyxuj6jUJIi0K8YvXJtX4xLoQuu5PZh6rtR6nG/E9vVdbP8G1XhGLSON5lYvIAKQOdgrzGZyctYdTLHFbu2ZtxNlfUANUg7yYHT5nqaUAK2x7a9RcQ2Y0eq3bV1uAIE8Gx8TaEIlwtQRGo0jgF0HUO2YrW3CtasM23iryhpyca4p4axDCCR8ym8A0/4Lq2RRe1z0KnTSAWMxshG9xzQYizw3FqVLJIa/7aZu+zBxG1OsIUv3w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <5fb5b45d-636b-dc30-2cbf-5e811dd2c319@suse.com>
Date: Wed, 30 Mar 2022 12:35:32 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v3 0/3] retpoline: add clang support + Kconfig selectable
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Wei Liu <wl@xen.org>, Andrew Cooper <Andrew.Cooper3@citrix.com>,
 George Dunlap <George.Dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>
References: <20220218143416.34475-1-roger.pau@citrix.com>
 <9500afea-3ca0-deb9-9d48-4983454b1c4f@citrix.com>
 <YkQvNR8uVQT4jiqP@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YkQvNR8uVQT4jiqP@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR06CA0754.eurprd06.prod.outlook.com
 (2603:10a6:20b:484::8) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 983a2706-98d9-4d35-6340-08da123905ce
X-MS-TrafficTypeDiagnostic: VI1PR04MB4271:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB42717B0B80F72862A892BB7DB31F9@VI1PR04MB4271.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	6G9a+oGP3ESrigpVOpZ4jAydDaDHz7JT65/VaL+bK1J3v7s2bBzil1RwhEhBgrCBcDmQ+Jt1vlDa7ldgBCFUNv+bS17/ks0Qr/aKhCiow2zLdgnIVuf3BhR8uwYngooKrLL64yT56uJ8d+F3I/KwF+dz9DQBGgiyCAkDYuD0TQDGgIRhuzUINkE+eFacZ8sKBAufiWil8freZTjUKVZUAm/aQ55bP38XfTENt5I3DYiBmnIfntOBiQrAezPy7jpqRBwu4UGjTooeQfT9p493H0hYNDFqp3TgIG7Cyf+orAYhhcxTdYcEzE6jihLEhFWpPmABWcNTfMtZGVFz05FqzR1JTRggWocM3VjBUFD+koP9GeS0AzlW3UQUB62K7VdESO1xABGgczUg50giV9qTzWz9qWavi5X3Uem3cBJWbHSHTUz4hmasEjbuepKA+sHcnd/VX5rx3M2sOWlxIwa4hhCtjOOC7vBZVZNgCDPr4lmNH3UbBzEvpSIQi8Ip3TkfhZVMHoW0WqcMN6fTUMnGdZHz/3G7klxc1VeTSkMnmYFQCv1Gxpsktkky8BO06rFkusyioRnXQOyfDX0oe8ty0xEnT4de+OEG1COh4DHnzUKLWb1nfIxG45ghxx+NjccV0TueHV8OXzniTklw2xtl7708LKxvXUo82ghDV+FIW3fG5w7BdOhMYR0nahjNuEDNQeSS0zXuxq3KjSDv3lcQFGXaRX9TusB06/iBCe2wobpmjPjplQgOQlG1jAdQlceRfdCcAgmJA9iIrQg7uUSfuV4minuMiB45TDuk9Wf4XK4=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(86362001)(31696002)(2616005)(6506007)(5660300002)(53546011)(38100700002)(6512007)(26005)(2906002)(8936002)(36756003)(83380400001)(6916009)(186003)(66476007)(54906003)(66946007)(316002)(508600001)(6486002)(66556008)(8676002)(31686004)(4326008)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?a340Z9qa19pJQ5zVKCJWUCwlj036tBIg0EoRrxo+USydNvGKBDAaNs48+bAR?=
 =?us-ascii?Q?xcDAp6Dy+Ggup5EeqM9f6MdkFkKEziFrvGsD6O3rakH310erEvftI814s0si?=
 =?us-ascii?Q?uGo+8zg943joeDbjgjwjf0bR+s9hoRhvLVU2mMlc7Wnt/bpyERN/SVOHGUhF?=
 =?us-ascii?Q?ydRAs4s9Dry45LR0CJFzPgWLm/Z1C23rSh2+SJ5EiR/3hPsN8au3aJgYzNAZ?=
 =?us-ascii?Q?tWJSmUTJVS6C+C0Cdaihr5+7LgFhzyfNeypEob5sXzcL9o6PH9rWZOwnBSQ2?=
 =?us-ascii?Q?zkLhalZ2KWlC5wQpnSEzLyd9pFH0K45BZyq26m8UZe9rSHTIUZsXGKlDXdW5?=
 =?us-ascii?Q?DtashCmo7zanPSp2R44eeJS6/j16AGpx6AeuTBsppAlffZOgZjOmnHk2LSNk?=
 =?us-ascii?Q?AXbJPeSRANvuZJr2vPRciksawQJs9SkfFL/TQexq4HglugN9S4yQMai348R2?=
 =?us-ascii?Q?GtY5u1jEj+IOuyRtz9a/gOFaZLZGg9900tlrKEvbMy/hugnv9wwVBGD34Cbr?=
 =?us-ascii?Q?oCcNxQjG1nFZG9jgJFL/gOGamO3CaEcZa6PfyqCZi31rPkYxPdAJdXz3EPKN?=
 =?us-ascii?Q?8wn7Od4152hwfoXd/lxVAvNYFRFKNof1+JyEM4oB9xStm0gsPPAmCQfTUsXG?=
 =?us-ascii?Q?C71OkEXq65hMDikYWHi0HD1yAt1+UMwmQ0km0uZDDrjdTqry6jy2E1hNVgqE?=
 =?us-ascii?Q?YEeRHPsckeEcYXA8YV/KzKrvYO+6t+rYXu0jVPT4NvGhNl6kAREoHObBINVc?=
 =?us-ascii?Q?G93i8w1+X1YHWkIC4MKiq4z6wLJpshLEpYqoPcZIYmVVCTfACCjs8hSiNduJ?=
 =?us-ascii?Q?R7sv/ZPHs45dRBUdQrzBd4Zo1tu/0+ZvnBNL1y/GTRql4gp9v1lGjd5rRgFe?=
 =?us-ascii?Q?j/Y6vT3zuD4De0CK3FTLMmk3ghEgpgIVUk7mQ/HlyKiq6FDdUDocdHhjkEGW?=
 =?us-ascii?Q?5CkGuLpKBSe0YEur+UkT+aL1RzyEIYnfO1lFpcQw7ziH/jS2kS+fAJNoFW8+?=
 =?us-ascii?Q?1t/wjjjwvIvCwHYPuhshiK3+KPNNVVKKxvVw8qq9OdPTVfCZWPzHGTtU5qMo?=
 =?us-ascii?Q?8r2yuvIoaR3pUBsQFSbJlnmwgCQ/M/KAjTu/jSiyeHfE/lW6ewcWjCMJ5ea1?=
 =?us-ascii?Q?Os2y4a0OzYaVdNbAzef3DekJjOrpPMFSkbKY1484HULdP7xL8rKA6OZg9sOc?=
 =?us-ascii?Q?xE9X2zY4ZX0bTB6o6RmQWrNzTJnmXbR/hdHiH3ZLTCTq0+E+9qFcd53kHVp6?=
 =?us-ascii?Q?m7cnsr5UTH//GqT8EINasvSYY2mbvddgEpNJnp5mxrMYZ+eOwi2XV3clJRPj?=
 =?us-ascii?Q?Z9mKMXJiylJjmECMjd55YnxGxEFiZePs1gA7S9SZI5yfB6y2+mJKXWah5IB4?=
 =?us-ascii?Q?P0Wpx8R5LFddz9jeYrQ3VbqnBwADrHWFTu8YOY+if4+vd/2nXogNC+LsIM5f?=
 =?us-ascii?Q?FLzcbnew+Omdm6XaFKcz+LewhUZWAzvULtlz/xYAVTz7Y4M8l1loROy4hOYe?=
 =?us-ascii?Q?csyUmAZAvkIuozAmjsLRgTl2ZwMKLIXuBWoneK2LvJBiNyirN5bBRIcPdMNu?=
 =?us-ascii?Q?Mog3wFioBZxMe1ypjQ9eNc2BYax99iqhw8sB8TOZgeR0dDe3elEeQy8MZmZx?=
 =?us-ascii?Q?ue9/5ZhH/C6Q3fPmsqa5Nx3Q8DK5nk5neN/Y2a+qEP7vlZSynBQTjqKPiqq9?=
 =?us-ascii?Q?XXMMloh6Ss97TVXaTA+L7FFcPDW6Z3PUceC52Xm8NjR2NkmlzG5/UOJfE+dY?=
 =?us-ascii?Q?bUL2miT8hw=3D=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 983a2706-98d9-4d35-6340-08da123905ce
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 10:35:34.9020
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 9RwfwEVns1kuCqD4UNC4b0lhhYcwo1i4CLbQC1pc0YIOZ85fEj9LHwz6ZekEcGlErYqv+tK8EqAKLv96wJ3smA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB4271

On 30.03.2022 12:21, Roger Pau Monn=C3=A9 wrote:
> On Fri, Feb 18, 2022 at 03:45:12PM +0000, Andrew Cooper wrote:
>> On 18/02/2022 14:34, Roger Pau Monne wrote:
>>> Hello,
>>>
>>> The following series adds retpoline support for clang builds, and also
>>> allows the user to select whether to enable retpoline support at build
>>> time via a new Kconfig option.
>>>
>>> I've tried adding a suitable description to the Kconfig option, but I'm
>>> sure there's room for improvement.
>>>
>>> Thanks, Roger.
>>>
>>> Roger Pau Monne (3):
>>>   x86/retpoline: split retpoline compiler support into separate option
>>>   x86/clang: add retpoline support
>>>   x86/Kconfig: introduce option to select retpoline usage
>>
>> Thanks.=C2=A0 I think that's looking much better IMO.
>>
>> One thing, we want CC_HAS_* for consistency.=C2=A0 I can fix this on com=
mit.
>>
>> Acked-by: Andrew Cooper <andrew.cooper3@citrix.com>
>=20
> Could the patches be backported to stable-4.16?

Hmm, generally I'd view them as a feature rather than a bug fix, but
since you're explicitly requesting their backporting I guess I should
rather look at them from an improved-security angle.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 10:42:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 10:42:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296235.504208 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZVmK-0006yW-SM; Wed, 30 Mar 2022 10:42:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296235.504208; Wed, 30 Mar 2022 10:42:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZVmK-0006yP-Oo; Wed, 30 Mar 2022 10:42:16 +0000
Received: by outflank-mailman (input) for mailman id 296235;
 Wed, 30 Mar 2022 10:42:16 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=b505=UJ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZVmK-0006yJ-0P
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 10:42:16 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 0fdc224c-b016-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 12:42:14 +0200 (CEST)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2105.outbound.protection.outlook.com [104.47.18.105]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-23-XI5uknbNML2tVXXHycHgVw-1; Wed, 30 Mar 2022 12:42:11 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AS1PR04MB9480.eurprd04.prod.outlook.com (2603:10a6:20b:4d6::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.23; Wed, 30 Mar
 2022 10:42:10 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.019; Wed, 30 Mar 2022
 10:42:10 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0fdc224c-b016-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648636934;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=Ji6hcvEB5HbNHtq1W4jnpZLzgeyGzXJE3Nh2CmjJL7U=;
	b=cSyCHUvESsIpyoUk2IKMf2A144n1U0fht8/qAh3ds8tepJx/fwG/Dio3Eweb0osNwCYD+h
	KxStNq1NDuUZ8NpzOsjM2Ly3yRN+p7WWmgqIHMz7zN3/+98tsRIKEIIWaefz7aeHICgVLA
	rxlJQMFRjryszcrmDWvbg5NgvdCqwFo=
X-MC-Unique: XI5uknbNML2tVXXHycHgVw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=B4rJWjs5CpCwHkaJ2Q/IjO+yX10yHZ5k5H9bfaFlDottrskFwStvO6quE8mVZQTnTw9LA4mVtGUkmpZn/+M5dY4HpVQJ4tokuCJoVDGadnbhiOG2k/X5/WHTTLtWhkgKfYMG+cpwn8DO0TXQz/W2/2EH6oqXzGMtKr7+2p4eDRB7O0/4i1SE9NmLLizvBctgpaflyXamxvm313z8HAGzPPAx/a0hddObbh3fnbFqjbMruDginahgp783v7BdXrY9A4f1rtdJ3OXzJC/ilHZC04Gggs7ja0V1iaAlZFnrw4PZNyDwuzjzNOKWBZh/WeGfG0OYenXN+5oJbGXN3w5n8Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=LQAV2DtwZXCxg76FUOIWzKCpHtFyPJIgRiqVtRiMs5I=;
 b=eiMAyj3NXES15o512aFxEydH4h+FLvt7YELzR20e3j4z4hku1r5WOULWJAypOQEd0q+3xReCvy0AXJQ6uPS1Cd75ApTN2zeEGzHBI9uAnNAtp2XTeFMsEo96k0C8mSPzNaA2TsD37wexLRp+rbxnkX5bqfj5LJObuiJbELCSevh0T75thtKlTEzzmRrKYOPpUeDEctn8PdDt9WFuDW4bQsQlcPWiW1hGtMWZh7LxkDKwZYD7jDYITvCaaSVy+Atoo4ru0uDHE+SczH5bbaiP7StvaHVmIr5Mf1nER1QVsaG2ABKLlZsvXobowbIn2ia9FJwgK77xKyQ/CRNVwOLtsQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <1013a14b-a45b-f37f-b2e0-e63b186a2956@suse.com>
Date: Wed, 30 Mar 2022 12:42:08 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2 2/2] xen: Populate xen.lds.h and make use of its macros
Content-Language: en-US
To: Julien Grall <julien@xen.org>
CC: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Michal Orzel <michal.orzel@arm.com>, xen-devel@lists.xenproject.org
References: <20220322080233.53134-1-michal.orzel@arm.com>
 <20220322080233.53134-3-michal.orzel@arm.com>
 <2940b4c8-5d44-695e-4550-0a32c3a4c053@xen.org>
 <d5bccf50-c74a-40e6-843e-3ad682647efb@arm.com>
 <5121de30-644f-8a1f-ff1a-29c4d2ee7f0f@xen.org>
 <63a680c6-0086-230b-dbbd-dfe63609f9bc@suse.com>
 <b0b49926-9a70-37f1-43d4-ac4e852198ba@xen.org>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <b0b49926-9a70-37f1-43d4-ac4e852198ba@xen.org>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR04CA0064.eurprd04.prod.outlook.com
 (2603:10a6:20b:48b::17) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 99cf04fc-381b-4e10-7356-08da1239f175
X-MS-TrafficTypeDiagnostic: AS1PR04MB9480:EE_
X-Microsoft-Antispam-PRVS:
	<AS1PR04MB9480ECD1CAEE0BF328E2F087B31F9@AS1PR04MB9480.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(54906003)(6506007)(508600001)(31686004)(316002)(4326008)(66476007)(6512007)(8676002)(66946007)(31696002)(53546011)(6916009)(6486002)(66556008)(2906002)(38100700002)(86362001)(8936002)(2616005)(7416002)(5660300002)(186003)(26005)(36756003)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?IqXxVbsKtOrIjZnoUlVjWndf7YOFz8PoizbH+ysgRI+cYLj+GGD9kEA8H71h?=
 =?us-ascii?Q?B3cBpc7F9teS5WZCij8aU8eYrmGoZ10dNWlftFmnBB2DiiaKaovMKoiqnFVW?=
 =?us-ascii?Q?Gz/XY4D+Tdw6yp+x24Rqlje8jY6QLeHtQt34SF4dOHB6XpzugYk+bbTyADyF?=
 =?us-ascii?Q?cZRQKNx1i7fvke50xLKq0zGOV7yaywrqSrUaGZ7tlCBfK6OlKOx9jU965Zzs?=
 =?us-ascii?Q?uj8kL/3p/4boe2aAG66UOwaicLwONQDwmOY8xQ/SOnn4Lj2s4VUc6t7szn/8?=
 =?us-ascii?Q?NCnWUn5o5N4MLPqYfu3x2Dew6IdztwgLLT0aT368pbxj2S9Ow8FH06BFAk0F?=
 =?us-ascii?Q?jD/92+ds/NVB6u+lqf9d7i4b9zrN87DypxXN8g6gPxHQq+G9Maa8eBSwUund?=
 =?us-ascii?Q?7IqBHMuJ6e0Fr0Jk7ZlImrnaqTKGnfzioo4y2m/382d3IvjExX/KB3N8g49H?=
 =?us-ascii?Q?R64MrknYGinZAqkSGcsiChAW8Gf4lgG2a0i/Hb9keAh76LroE7qHjKV5eXC/?=
 =?us-ascii?Q?l4H+sESWOxz3LbIXADmaDi0Wos3hXMoqc/wcj2ysf8fLIBow3dNp3KaaYPsP?=
 =?us-ascii?Q?P2Djf9KZF3QtGQLns6XKZkkGjo8YKmw2gO1cPLkzpvkncSNPLDriDBHThTyo?=
 =?us-ascii?Q?w/4ZeH6p8fIMzHUqGgdCr7XHhtpsaRZu9K+FEEyALTXXp3VKfEigCBbfoVn9?=
 =?us-ascii?Q?LmdgVBnJK+BCZoNdTVTtarKaQXKVq8Dh8MYPtdj9QaBnlcXSaLrr+YaQ9rwh?=
 =?us-ascii?Q?JTHn8D3UKZPj7fkKIqRXpb4/nJgJkzgUNjO9zzdcs2b/48Js9sc7YgpFF4cl?=
 =?us-ascii?Q?dRQsEa5Ynn5M/pPTnG8JdAiE1bYTRjZX3ENqUsghiQd21fyvuqWtWlT7TpL8?=
 =?us-ascii?Q?OScPb2KyH/lesxPKiu8jXCshH8pJrBxHLgHbD1fKM2qvl83yDuz4Onm+l119?=
 =?us-ascii?Q?FxFepwPtwzUMCQ9GeSL/lLTQdNgjCIoEwsv6daLO5xElxxhQHPU+xxhCzpbL?=
 =?us-ascii?Q?TbQ530sA+Dk3qTLPEmkTNaPTPuu+X/n7VR0+TL2Ec5l3GHZyLs1K/8XRBxOH?=
 =?us-ascii?Q?PpC7PlBn4N7v9i99bjrUo1j3LakoXs0mE9iqsVVlrI6G1RMTTh+pQadZND51?=
 =?us-ascii?Q?S0Li+iYeeSvm1P5I7N1/knJVYQBMnrUEcwy7u40DvcxTBG73uaSar6znjjoY?=
 =?us-ascii?Q?3ryJkv2PRFX/m8Mfh17BvM1nxSGg0nsOiQjm9aWsi7thVluNOLD0yskt1hpk?=
 =?us-ascii?Q?fI7HEBAPK0VDBCRfZlnJ8wLCpfbXCOP3S7cO0Ino5Pkgm5kPLG1UajYpFksU?=
 =?us-ascii?Q?Iqc8I1jtfe9wWWj8ylE2qDpWvvxiejBd++SSZ2G4eMz3ATnHacEB5Vdz98qI?=
 =?us-ascii?Q?BY7fo6QN+AuEoRTkH+O/W39INSw3VFroihVkY8Amk1NIskcoAo4IhylP4yyN?=
 =?us-ascii?Q?9FAn/TOjWtlMXNOLU4CEvSmZx5GViyoHFiJHf3+9xSnZkuHhVPabuAZLF8/R?=
 =?us-ascii?Q?RaOY3YNn6T3pto0CqafIn6EB0CCM5Zx/x5a2iB3QSg/q4meT6V0eCODbeu09?=
 =?us-ascii?Q?Sg0FJdTFfGOZHQ7hwXhoM7h95iPJT5w6/Yhw2WQxzJ6KCmRjcRYfAvmFaviB?=
 =?us-ascii?Q?nnCr9CjAowiv+X2Rx/OrYKjVrOjEfTQ/2iypk9ikgD1iJ5nozAGUn4dwb6yF?=
 =?us-ascii?Q?eJFX+ErcPxNAM+jzaOo0cuZBsrvmhha5pzFf1+eiwT5MK2H5DMjXihWu+bCA?=
 =?us-ascii?Q?wLoxVxlaew=3D=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 99cf04fc-381b-4e10-7356-08da1239f175
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 10:42:10.0882
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: aLrcZdjMROnkH1OdcmRJw567Jxs+Ke66mvAJzSzC8/ScilEdySsgk9X/uVWjp8SRx+sQ1fghL4wyptmqWYpYXg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS1PR04MB9480

On 30.03.2022 12:32, Julien Grall wrote:
> On 29/03/2022 12:42, Jan Beulich wrote:
>> On 29.03.2022 12:54, Julien Grall wrote:
>>> On 29/03/2022 11:12, Michal Orzel wrote:
>>>> On 29.03.2022 11:54, Julien Grall wrote:
>>>>> On 22/03/2022 08:02, Michal Orzel wrote:
>>>>>> --- a/xen/include/xen/xen.lds.h
>>>>>> +++ b/xen/include/xen/xen.lds.h
>>>>>> @@ -5,4 +5,104 @@
>>>>>>   =C2=A0=C2=A0 * Common macros to be used in architecture specific l=
inker scripts.
>>>>>>   =C2=A0=C2=A0 */
>>>>>>   =C2=A0 +/* Macros to declare debug sections. */
>>>>>> +#ifdef EFI
>>>>>
>>>>> AFAIK, we don't define EFI on Arm (just CONFIG_EFI). Yet we do suppor=
t EFI on arm64.
>>>>>
>>>>> As this #ifdef is now in generic code, can you explain how this is me=
ant to be used?
>>>>>
>>>> As we do not define EFI on arm, all the stuff protected by #ifdef EFI =
is x86 specific.
>>>
>>> I find the name "EFI" too generic to figure out that this code can only
>>> be used by x86.
>>>
>>> But, from my understanding, this header is meant to contain generic
>>> code. It feels a bit odd that we are moving arch specific code.
>>>
>>> To be honest, I don't quite understand why we need to make the
>>> diffferentiation on x86. So I guess the first question is how this is
>>> meant to be used on x86?
>>
>> We produce two linker scripts from the single source file: One (with EFI
>> undefined) to link the ELF binary, and another (with EFI defined) to lin=
k
>> the PE/COFF output. If "EFI" is too imprecise as a name for the identifi=
er,
>> I wouldn't mind renaming it (to PE_COFF?), but at the same time I'm not
>> convinced this is really necessary.
>=20
> Thank for the explanation (and the other ones in this thread). You are=20
> right the confusion arised from "generating" vs "linking".
>=20
> Renaming to PE_COFF may help to avoid the confusion with CONFIG_EFI.=20
> That said, it would possibly make more difficult to associate the flag=20
> with "linking an EFI binary".

Indeed. And EFI_PE_COFF is getting a little unwieldy for my taste.

> I think some documentaion about the define EFI would be help so there=20
> are no more confusion between CONFIG_EFI/EFI. But I am not sure where to=
=20
> put it. Maybe at the top of the header?

That's perhaps the best place, yes.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 10:43:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 10:43:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296239.504219 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZVnu-0007Xi-9E; Wed, 30 Mar 2022 10:43:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296239.504219; Wed, 30 Mar 2022 10:43:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZVnu-0007Xb-4M; Wed, 30 Mar 2022 10:43:54 +0000
Received: by outflank-mailman (input) for mailman id 296239;
 Wed, 30 Mar 2022 10:43:53 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=b505=UJ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZVnt-0007XS-05
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 10:43:53 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 49a9a496-b016-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 12:43:51 +0200 (CEST)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2112.outbound.protection.outlook.com [104.47.18.112]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-4-_p6YEKb0Of6uAk4zSOn16A-1; Wed, 30 Mar 2022 12:43:50 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AS8PR04MB7542.eurprd04.prod.outlook.com (2603:10a6:20b:299::14)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.19; Wed, 30 Mar
 2022 10:43:49 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.019; Wed, 30 Mar 2022
 10:43:49 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 49a9a496-b016-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648637031;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=GMp6Bw5+2YKFKmbUnpPxdW3hKBQw7aSQDhYgU7rZSQA=;
	b=Ado4B1at2FQ1ggXLqaxonMRXYX0Mph6lyJOyhba+dokQKlHTXsCL/pmB2hk1VJBOHn+wb1
	XWlI+FR/higjGChs6quEWOV7Hfzg437OKH+yFKJUy6+lFrUn7vmw0qftQiZTmWCr6ik39q
	aZUXxD4flCNVGzQht5XWDNfVbUWNZig=
X-MC-Unique: _p6YEKb0Of6uAk4zSOn16A-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=O1/hZcttWNrpoyZ1egoMUIzbyk5YuUrNIivIuGVtscPiOsVyJccE4Dz0G5WAfMKjjXarfIRyBC1zkfxfY7WK8SYjSvewBMEuAlcHaJoBihkqNQVeibE3MOeMYfBDHxExvHFoQYWkysDX/SFMQKTjBn75Tnoz/jnbtK2498EgN2AJqJgXsyiqK7KuRtgXsMN7ttdRSTy7/U6J0WRWgoA6zzwA4wa4syaBQABz3uUKMsGzKiEwyhX/4SMhhWYI3S6SBrrJVIHjw8XlsjuvDLngwSi6JxMwCqPUQ6F33+K9Ke0I7fJ/qyldHBOwHAogafQvsXNiNoh+a93D4doPDy69Lw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=f6G8ov2OQZezSXYL4zu8Fe5J/pEDAfYS//mEASkyFCE=;
 b=EIrBKf9nQsdVWjuBy8TsqJ9ytHUX89NVS//8Jo1PqCvjpFucnG/H0vArlmE0zeYCVQ6iLhlduHdzxKYaTZ2k4ZTUGlKJkwqyX4z0YF1YPTvSi/r97xpBZq6UCF15Jbby6ys2Owzb2tPrJadviN9xn5YbTit8EDORfAxGF1LaZO/SaH+yMrBNAkPZdNygaG7IQixruFL5vmYdKQCDN6vp2n20nIYOTd69WDrT0R/yv7rcXIWioi8NBo7H8R/m8o9YMKSRfsIMY5p0LiV2So62wB1kZlqdDQXO/bGQPcDzbteMhm4ZTHI2FKL3oWmu3m/dbEzgg2rS06f2P4MnPyromQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <ab0e2c42-fb22-43ca-261b-4f8d1d9a542f@suse.com>
Date: Wed, 30 Mar 2022 12:43:48 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] livepatch: account for patch offset when applying NOP
 patch
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Ross Lagerwall <ross.lagerwall@citrix.com>,
 Konrad Wilk <konrad.wilk@oracle.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>
References: <2df6d890-9d91-62cc-8057-3d50f1501ad5@suse.com>
 <YkQusCcbe++iMGnH@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YkQusCcbe++iMGnH@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS8PR04CA0128.eurprd04.prod.outlook.com
 (2603:10a6:20b:127::13) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: a16ce2d4-c4a5-45a6-52a9-08da123a2cc5
X-MS-TrafficTypeDiagnostic: AS8PR04MB7542:EE_
X-Microsoft-Antispam-PRVS:
	<AS8PR04MB7542D2E7EF10BEF12FF385C8B31F9@AS8PR04MB7542.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(31686004)(4326008)(5660300002)(316002)(8676002)(53546011)(6506007)(26005)(2906002)(36756003)(186003)(8936002)(66476007)(66556008)(6916009)(15650500001)(508600001)(83380400001)(2616005)(6512007)(38100700002)(54906003)(6486002)(66946007)(86362001)(31696002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?97MJeVQGU8rtFIm4MKw/iZ5OHU6vmh2SRGEKa+3jylXC7yANZrcP5hoVffYx?=
 =?us-ascii?Q?S4O+nZSK20SvsKm/HP2klx51wC9P710RTRmKkl3rhNhfer4p6KKcPN1esnhG?=
 =?us-ascii?Q?ZSe63q+NC2sUNrIPdy/p9TGD5QHI4hGE0AqslNoy5vwpz5lhLUPaLVfkAc6N?=
 =?us-ascii?Q?a9hvJt0C0g0Q9vHEHqeEgFGdSLZczi99zAAUBhnn5BMjdSHV+h9aFToKq5ch?=
 =?us-ascii?Q?VftGKXyudwoklXVmvX+gXEPEqHhrsCfo/Kg1g1zslZwt2FjpYKFwR6q9bx4R?=
 =?us-ascii?Q?VIAjrBzSjSEkhoWKOXPgpxnK1QPDmftx8nX1WcCbZHl/Nys1eFAOsYeIFKU9?=
 =?us-ascii?Q?eaLSTbZp16GD5lhX9bCOI+r24d2ETEQEV23Q/rK3wL5uU5IMyref5wH/KamP?=
 =?us-ascii?Q?IpRqH+sY82fpIKlryE5URy0pIHXSJXnzqvA26Jrh0L7WQm063FS4xC/V91Jn?=
 =?us-ascii?Q?XSDGceEP7J+FyjoW+tEPR5elsU0tXl+ttrynu+2ob1Db6ppvkjyXyxJ+Xc02?=
 =?us-ascii?Q?E7lYJ2vY3vcXlnzFqRi/Gj5WEiVQj8RfuoNyzPT+FHgpRr+m+dBmzXvIk5RB?=
 =?us-ascii?Q?akLF6X1TUIVmIkonGEQOKslZE9Q8ESnLktf59REEfXF8Gd6495CyBEsLOCv+?=
 =?us-ascii?Q?FSUbz0thSzVuQNjNwTzZyvBZy/FTkzNKpDf9Xd6TtPu9Q/t9HjkCAWJAbUn6?=
 =?us-ascii?Q?1xkXYXTvIJ+1n0Nros9bxKZjWep9tob1BEETwkaQbJuQ3P85MbxncAJrGmN1?=
 =?us-ascii?Q?14JaxxdzUz70z7QbwTnpTiayjFaJCRf8yq3zTAjDR01ftCvXkcyMMOB6MmbE?=
 =?us-ascii?Q?rte+AvT8LcL2NINQftymqEtrPOs27jqWeecJ3jCdTkA5gHJoQp8J6ES7ZIz4?=
 =?us-ascii?Q?POxTlHu6zPJCFF7INycgZmos24pEZptEHesbEul2++fRX6vmfN5DsX0+yXst?=
 =?us-ascii?Q?qdnvDroDEBi6nslDKjzpLv7kc2buWSCFM1FzFTuSOdEOBfD48GREv7sJhGEV?=
 =?us-ascii?Q?IVELPN41DRfIeWyjCHCrVHywUW+Qgz3/a3L634KlQLi3teP++GU2wSSjOlQv?=
 =?us-ascii?Q?WgJKYMoW0poq6HXbCF6nozy5CFTueJmu2WfLn+mumM+UWLYT3s0OieXVeZke?=
 =?us-ascii?Q?xAulW8OEa5lv67dgy13CX1OYBI388bYfsuGAuZ89/FxJQbGWH5tjcHQkdCM3?=
 =?us-ascii?Q?/zxCSn0KLJUS+nS3DPn5P8SjQ4Y8c5vLYXkB5TkZ9vbEraXhMR5wRNPW5HyA?=
 =?us-ascii?Q?XB0I3HDOyYsKNVOxk9OhSbrmh4IPM+vJVRxogVh64DT1kJl+p7z9q3YOKRzG?=
 =?us-ascii?Q?eSKMVQbvctUKAylAJ04GSud8+7ZzD8ot5/C3/v3vXRMcj8DjDHMZ/LjeEeLb?=
 =?us-ascii?Q?FKLxh8BeawjZTXBbS01gxQ9QB/SbDKIcwwGxHNRl8MGOlOcmA7EV0/9VP4DC?=
 =?us-ascii?Q?cOg41oMPmJ69NleFaepiWZH0A1mpwDBA6E3jaN8y5QH3XMuU08q4aZmHUxqv?=
 =?us-ascii?Q?eMftngfXwtlg69J4iTfdKhkSZvax3as4sV7DYYcTKL8HBt6/7DzrRnZIolUq?=
 =?us-ascii?Q?jD4ugVyGiK10MRqsmaBvYJQWtotovvrjAHVbqKOtXp/pgz4tQZ9MsQwAM2j3?=
 =?us-ascii?Q?lRAhB5ZZ+0oK9HqGj1G7Poc//eEBLgl62vXgB62kFu/oQ3nUDtYeoh6y0SmH?=
 =?us-ascii?Q?9qw0+uy0eOX0SB8AGdsi02Et2HHul9d7apD/NpyymJEiAlfMP97IctUzQtr3?=
 =?us-ascii?Q?MtBAwqaRlQ=3D=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a16ce2d4-c4a5-45a6-52a9-08da123a2cc5
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 10:43:49.5816
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: CFqg6G6KELe0ynZq/cmkwD/5NAO8aifndNXYsNuDMR3c0Pzajl6U+1lmGwu+cyPm7j1Nz6WtEhSlLNnOc/oiAg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR04MB7542

On 30.03.2022 12:19, Roger Pau Monn=C3=A9 wrote:
> On Wed, Mar 30, 2022 at 10:03:11AM +0200, Jan Beulich wrote:
>> While not triggered by the trivial xen_nop in-tree patch on
>> staging/master, that patch exposes a problem on the stable trees, where
>> all functions have ENDBR inserted. When NOP-ing out a range, we need to
>> account for this. Handle this right in livepatch_insn_len().
>>
>> Fixes: 6974c75180f1 ("xen/x86: Livepatch: support patching CET-enhanced =
functions")
>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>> ---
>> Only build tested, as I don't have a live patching environment available=
.
>>
>> For Arm this assumes that the patch_offset field starts out as zero; I
>> think we can make such an assumption, yet otoh on x86 explicit
>> initialization was added by the cited commit.
>>
>> --- a/xen/include/xen/livepatch.h
>> +++ b/xen/include/xen/livepatch.h
>> @@ -90,7 +90,7 @@ static inline
>>  unsigned int livepatch_insn_len(const struct livepatch_func *func)
>>  {
>>      if ( !func->new_addr )
>> -        return func->new_size;
>> +        return func->new_size - func->patch_offset;
>> =20
>>      return ARCH_PATCH_INSN_SIZE;
>>  }
>=20
> Don't you also need to move the call to livepatch_insn_len() in
> arch_livepatch_apply() after func->patch_offset has been adjusted to
> account for ENDBR presence?

Oh, yes, I definitely need to.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 10:50:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 10:50:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296247.504230 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZVuX-0000dc-4v; Wed, 30 Mar 2022 10:50:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296247.504230; Wed, 30 Mar 2022 10:50:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZVuX-0000dV-0V; Wed, 30 Mar 2022 10:50:45 +0000
Received: by outflank-mailman (input) for mailman id 296247;
 Wed, 30 Mar 2022 10:50:43 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=b505=UJ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZVuV-0000dP-BL
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 10:50:43 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 3e1e4f70-b017-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 12:50:41 +0200 (CEST)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04lp2058.outbound.protection.outlook.com [104.47.12.58]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-25-K-hirX4vMPCSIdfNSA9omQ-1; Wed, 30 Mar 2022 12:50:33 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM6PR04MB3976.eurprd04.prod.outlook.com (2603:10a6:209:3f::17)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.19; Wed, 30 Mar
 2022 10:50:31 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.019; Wed, 30 Mar 2022
 10:50:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3e1e4f70-b017-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648637441;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=BB5MNNLumtrb6LGtvevIkfshKvGQ6Q6Jd36jMbWwlEg=;
	b=UIA3wzrP/zt7ah9WVhrPcoe+++sjUNLp+k9YM/FTOET1o1jg/N78E2Pn5HbHTKg6u3u2w9
	cq8jfUGsf//LiEPQAdq4v3srdUi6EbXtLyGaOvDmYcsn8qdFzeeAsc89QC1sO01vFmllof
	X0Cw74YnbjgwEvjPuLrc94uP0+LW2MA=
X-MC-Unique: K-hirX4vMPCSIdfNSA9omQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=iKd+rQL8S2EItBYLcRlfjwIzpHT9GIaxcwWdxbPy2lArT5lmd1hjUMMnpShnbQKch6KeXNA/+qkbRmhQtz2cdoOHcd8hPewq3Y8QLP35XoL7UicijxR2AyyiF48iMfKHZFf984k0DCxuAeyOKbUSVCQT1+76hCHHmsWBjMTbVfvB3wJI9qaxj39P7TiyA6v+YlkCx32QumB1NFbpHqZlT9ersq3jjrUIM+1OGLbs04vaRlyAiYoLRxuZJlgsGC/6jhup7j4o/OIMaav7bxG5fo2J9BnNejzs0KKpvj6OzkhCj0nbj5gVBSsRxq1QdMPwo/+rplERdIqzPDPNeoUVbQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ll6w83opmguGPFOBBKn2y1kp7iPDLZg905WJqgfStcc=;
 b=En25RqL5c2D9Yi/zbGq1YACWfT13mAXwFSMLToc/RiXeC9gaLM0AFSJLtbf6g/mZjZHAZ0eKPTgFTGAXFgnCKDx5e+K9lrXcJ6fSYH0S7KsEzDfWAJAYIREJm7HqUPBRl5hZpHc5sjzom6LVJJ2eXB8GOuLaZOlW38ktZeQ6oRyKlXoQqxVeRveQu7c7qA0gfBbl9AszPtw5zSLXzv4OlbN1e3rt2mP4B5PYqKHB+YtWtRSFJrF9zuJ97ALH6+l7JeEcIbt2bWvSCORCxpYO3bUFeSprGYiAU8Ody/pDYElXMDIvS3h5gxKkMJaKOxCuEFsVBXVT3Fpj6F2zeGBMCA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <48863de3-1ee6-bc90-0fe4-466f9608b435@suse.com>
Date: Wed, 30 Mar 2022 12:50:29 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] livepatch: account for patch offset when applying NOP
 patch
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Ross Lagerwall <ross.lagerwall@citrix.com>,
 Konrad Wilk <konrad.wilk@oracle.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>
References: <2df6d890-9d91-62cc-8057-3d50f1501ad5@suse.com>
 <YkQusCcbe++iMGnH@Air-de-Roger>
 <ab0e2c42-fb22-43ca-261b-4f8d1d9a542f@suse.com>
In-Reply-To: <ab0e2c42-fb22-43ca-261b-4f8d1d9a542f@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM5PR1001CA0033.EURPRD10.PROD.OUTLOOK.COM
 (2603:10a6:206:2::46) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5a748549-eed1-4940-7c03-08da123b1c63
X-MS-TrafficTypeDiagnostic: AM6PR04MB3976:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB3976277998235FD9105AE359B31F9@AM6PR04MB3976.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66556008)(66946007)(2616005)(186003)(66476007)(26005)(83380400001)(5660300002)(8676002)(38100700002)(53546011)(316002)(36756003)(6916009)(8936002)(86362001)(31696002)(6512007)(4326008)(2906002)(31686004)(6506007)(6486002)(15650500001)(508600001)(54906003)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?jFciE7XdI/EwLADfx9h3OlX3CPvqoK+cTpJEBNtg5I4SkBZij5voqKFd2Ngf?=
 =?us-ascii?Q?st0QrXrlNqFSWVY5rXIVcLb9lgoTqFfWP0JaqQBRQTcTzmrALhIrcs/NpyFr?=
 =?us-ascii?Q?lK9tywIT9Bmos7L1sH4zzmZS1Uq0Z+2rZXNHw87aMOvt79bhIqwM23RwfUyK?=
 =?us-ascii?Q?Hs8EWDV4KZeJcohF0xcc/NQ8glCrJyaC9dtPP/EPgBtebZqxWt2ijP+xtsyv?=
 =?us-ascii?Q?Zz8ZMmIoZbx36tq3uneBZhtl50lrm87qaB4Uh/BIi0FfwjpjdK4kCR6w2Jgo?=
 =?us-ascii?Q?y7z6Eb3h7bcFsoOC80L7cLGYHH0fD3nyD1ic+DH5lzSbZZGCWB10WOxyAX4m?=
 =?us-ascii?Q?xy6Kzw0QNdUjeUJNz2uWF/sGIyj71xHkTi2irjQtgB9yejU1YXODwUrKHfDB?=
 =?us-ascii?Q?JscL894AvjlEPoTrT1sujhS9aXAlK0n5yELW7yDHM3gApCzRQEItkdb4dQ9P?=
 =?us-ascii?Q?S+T1DLiNX+94iTPgy6/LcFm4A/0ufIKY3Un38MjLPFF3c6qTMb1m2ZpglA2j?=
 =?us-ascii?Q?i3NXZhpslK5TEY/eY0UZNddQ53L3LtU35YPOqBqmRco18WkA3KtzC8NM/Luc?=
 =?us-ascii?Q?NVvHcw2nn+uFLRGbol84ZiR42RljJCgV3NDNoM0MsVvBE9Lm9SZ3YrY8oBt5?=
 =?us-ascii?Q?JeF6a6dPpJxvML5EIzNdxmEem66IcQYwIiqmkryThdKhxW35KWOSPRapC9sf?=
 =?us-ascii?Q?iKuXmhWHDU12doLyINwvNTirIf1DrxrBUl4q68xizftBFOEw4E7BWMOZrz9i?=
 =?us-ascii?Q?u0VEKK+XOTVa2PYYyNcOYG4hM84uxrxuFM2Qu3R9wxECDPmHbCKlDH5TiAjD?=
 =?us-ascii?Q?rcJ4VO7hQPj9BvS360XC9uajng0ciy7dybuyfeegFAdDlsYEzMyxcXQImzGY?=
 =?us-ascii?Q?zBiJ3duQIEW3FhhXOVYzevl9055nXuEyQTccPgScPanpqpGA+0XqXRjo6No4?=
 =?us-ascii?Q?kS6Zh0UZV+hDRKycpKPX8g/92kcXwEH7NLo4SrRdil2KvAOZPHXzNlpUv9kM?=
 =?us-ascii?Q?ouBsShQz+5gYd6Ctu1szZlyOV7pkbQULTfZ53KMReak8oMCeR8RJbbLxdhdG?=
 =?us-ascii?Q?l3zPIcqrh1ffNmZvDBvV8m9oO4db2m+yKk4I5s6BoSmvi92OeMrSMh5gomZx?=
 =?us-ascii?Q?7RxVV/YYjxHsURxsugex3GcwSojKaf6Y/PtktbmnVIHK+5hCgBJt56ia9N3W?=
 =?us-ascii?Q?3Wi49VQP2D/a4jsQYMv99/TRwnT9MI7a9iduYe+rhrBc9oX8QrVvmFG2rRZZ?=
 =?us-ascii?Q?PuVPpj066VL/3CK0Y9KNhWrKR7kRewQ6vMR92ciIle7PXnHGtKlOzBTRhMAt?=
 =?us-ascii?Q?ULXyn7Akr1wEkZWPG9CAl7lMI2O8wiIOfIJry9fa01KBJ7USFQRrj1hzeUvV?=
 =?us-ascii?Q?31ECgkX1XxEuFj9pd2uyNJ8uBJrvgW65BcTfU6PbI+AQB0xufV6DkRdz3gnA?=
 =?us-ascii?Q?FXlEW9L9AbmCE8sX/M2vujcu+ZCA9JGxF5+wVWZEHBmtx1UFz+9lv2NMbYNY?=
 =?us-ascii?Q?yBzuiW8PSTeonFoPkr3LdHJEpGMF8PANE4dcrQUr00xTom16WHq9ebeZQhwo?=
 =?us-ascii?Q?pRu26JAuSDDRZWFKUyWd+N+DqtrvkT1v7o1Y2AtQ2OuIGAfOsxJ/A978+6nm?=
 =?us-ascii?Q?hzKuyPtHRlwGhrvzbB60r4iTlv1++OcspPFGKb8Fk1bXWDAtQKSMbwiWcTD1?=
 =?us-ascii?Q?7ZAAPKdZPzofuFzvvuK3A1rgVxgWzqwSxVFL9GKCqRTPzNO1oZ1qxUBiAUnM?=
 =?us-ascii?Q?0xIZLm5kcQ=3D=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5a748549-eed1-4940-7c03-08da123b1c63
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 10:50:31.6248
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: esKPknFkwCc/FTTZjjoRNw32Z994vTnaTdEt3YR3ziI0WWnHh23IsnfI+DlT6f6tNPm29vjhd/XnvzpbTAKPJg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB3976

On 30.03.2022 12:43, Jan Beulich wrote:
> On 30.03.2022 12:19, Roger Pau Monn=C3=A9 wrote:
>> On Wed, Mar 30, 2022 at 10:03:11AM +0200, Jan Beulich wrote:
>>> While not triggered by the trivial xen_nop in-tree patch on
>>> staging/master, that patch exposes a problem on the stable trees, where
>>> all functions have ENDBR inserted. When NOP-ing out a range, we need to
>>> account for this. Handle this right in livepatch_insn_len().
>>>
>>> Fixes: 6974c75180f1 ("xen/x86: Livepatch: support patching CET-enhanced=
 functions")
>>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>>> ---
>>> Only build tested, as I don't have a live patching environment availabl=
e.
>>>
>>> For Arm this assumes that the patch_offset field starts out as zero; I
>>> think we can make such an assumption, yet otoh on x86 explicit
>>> initialization was added by the cited commit.
>>>
>>> --- a/xen/include/xen/livepatch.h
>>> +++ b/xen/include/xen/livepatch.h
>>> @@ -90,7 +90,7 @@ static inline
>>>  unsigned int livepatch_insn_len(const struct livepatch_func *func)
>>>  {
>>>      if ( !func->new_addr )
>>> -        return func->new_size;
>>> +        return func->new_size - func->patch_offset;
>>> =20
>>>      return ARCH_PATCH_INSN_SIZE;
>>>  }
>>
>> Don't you also need to move the call to livepatch_insn_len() in
>> arch_livepatch_apply() after func->patch_offset has been adjusted to
>> account for ENDBR presence?
>=20
> Oh, yes, I definitely need to.

Actually - not quite. I need to call the function a 2nd time. And
this then also points out that is_endbr64() and is_endbr64_poison()
may overrun the range pointed to by old_ptr (which I'll take care
of at the same time).

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 11:04:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 11:04:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296252.504241 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZW7t-0002A4-Bx; Wed, 30 Mar 2022 11:04:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296252.504241; Wed, 30 Mar 2022 11:04:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZW7t-00029x-8X; Wed, 30 Mar 2022 11:04:33 +0000
Received: by outflank-mailman (input) for mailman id 296252;
 Wed, 30 Mar 2022 11:04:31 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5iAL=UJ=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nZW7r-00029r-Nl
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 11:04:31 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTP
 id 2b6ca8ee-b019-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 13:04:29 +0200 (CEST)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 7EDBE23A;
 Wed, 30 Mar 2022 04:04:28 -0700 (PDT)
Received: from [10.57.8.78] (unknown [10.57.8.78])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id EC2723F66F;
 Wed, 30 Mar 2022 04:04:25 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2b6ca8ee-b019-11ec-8fbc-03012f2f19d4
Message-ID: <ffa0e581-6a32-5c3c-7e63-acd5086c6822@arm.com>
Date: Wed, 30 Mar 2022 13:04:15 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [PATCH v2 2/2] xen: Populate xen.lds.h and make use of its macros
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>, Julien Grall <julien@xen.org>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 xen-devel@lists.xenproject.org
References: <20220322080233.53134-1-michal.orzel@arm.com>
 <20220322080233.53134-3-michal.orzel@arm.com>
 <2940b4c8-5d44-695e-4550-0a32c3a4c053@xen.org>
 <d5bccf50-c74a-40e6-843e-3ad682647efb@arm.com>
 <5121de30-644f-8a1f-ff1a-29c4d2ee7f0f@xen.org>
 <63a680c6-0086-230b-dbbd-dfe63609f9bc@suse.com>
 <b0b49926-9a70-37f1-43d4-ac4e852198ba@xen.org>
 <1013a14b-a45b-f37f-b2e0-e63b186a2956@suse.com>
From: Michal Orzel <michal.orzel@arm.com>
In-Reply-To: <1013a14b-a45b-f37f-b2e0-e63b186a2956@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

Hello,

On 30.03.2022 12:42, Jan Beulich wrote:
> On 30.03.2022 12:32, Julien Grall wrote:
>> On 29/03/2022 12:42, Jan Beulich wrote:
>>> On 29.03.2022 12:54, Julien Grall wrote:
>>>> On 29/03/2022 11:12, Michal Orzel wrote:
>>>>> On 29.03.2022 11:54, Julien Grall wrote:
>>>>>> On 22/03/2022 08:02, Michal Orzel wrote:
>>>>>>> --- a/xen/include/xen/xen.lds.h
>>>>>>> +++ b/xen/include/xen/xen.lds.h
>>>>>>> @@ -5,4 +5,104 @@
>>>>>>>      * Common macros to be used in architecture specific linker scripts.
>>>>>>>      */
>>>>>>>     +/* Macros to declare debug sections. */
>>>>>>> +#ifdef EFI
>>>>>>
>>>>>> AFAIK, we don't define EFI on Arm (just CONFIG_EFI). Yet we do support EFI on arm64.
>>>>>>
>>>>>> As this #ifdef is now in generic code, can you explain how this is meant to be used?
>>>>>>
>>>>> As we do not define EFI on arm, all the stuff protected by #ifdef EFI is x86 specific.
>>>>
>>>> I find the name "EFI" too generic to figure out that this code can only
>>>> be used by x86.
>>>>
>>>> But, from my understanding, this header is meant to contain generic
>>>> code. It feels a bit odd that we are moving arch specific code.
>>>>
>>>> To be honest, I don't quite understand why we need to make the
>>>> diffferentiation on x86. So I guess the first question is how this is
>>>> meant to be used on x86?
>>>
>>> We produce two linker scripts from the single source file: One (with EFI
>>> undefined) to link the ELF binary, and another (with EFI defined) to link
>>> the PE/COFF output. If "EFI" is too imprecise as a name for the identifier,
>>> I wouldn't mind renaming it (to PE_COFF?), but at the same time I'm not
>>> convinced this is really necessary.
>>
>> Thank for the explanation (and the other ones in this thread). You are 
>> right the confusion arised from "generating" vs "linking".
>>
>> Renaming to PE_COFF may help to avoid the confusion with CONFIG_EFI. 
>> That said, it would possibly make more difficult to associate the flag 
>> with "linking an EFI binary".
> 
> Indeed. And EFI_PE_COFF is getting a little unwieldy for my taste.
> 
>> I think some documentaion about the define EFI would be help so there 
>> are no more confusion between CONFIG_EFI/EFI. But I am not sure where to 
>> put it. Maybe at the top of the header?
> 
> That's perhaps the best place, yes.
> 
In this case how about the following comment at the top of xen.lds.h:

"To avoid any confusion about EFI macro used in this header vs EFI support,
the former is used when linking a native EFI (i.e. PE/COFF) binary, whereas
the latter means support for generating EFI binary. Currently EFI macro is
only defined by x86 to link PE/COFF output, however it is not unique to this
architecture."

> Jan
> 

Cheers,
Michal


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 11:05:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 11:05:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296256.504252 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZW8x-0002hl-M3; Wed, 30 Mar 2022 11:05:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296256.504252; Wed, 30 Mar 2022 11:05:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZW8x-0002he-Is; Wed, 30 Mar 2022 11:05:39 +0000
Received: by outflank-mailman (input) for mailman id 296256;
 Wed, 30 Mar 2022 11:05:38 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=b505=UJ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZW8w-0002hT-BW
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 11:05:38 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 53fc72e5-b019-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 13:05:37 +0200 (CEST)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com
 (mail-am5eur03lp2052.outbound.protection.outlook.com [104.47.8.52]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-25-nN37OYbfNlm4APNdDLh1yQ-1; Wed, 30 Mar 2022 13:05:34 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by VI1PR0402MB3695.eurprd04.prod.outlook.com (2603:10a6:803:1d::28)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.23; Wed, 30 Mar
 2022 11:05:33 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.019; Wed, 30 Mar 2022
 11:05:33 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 53fc72e5-b019-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648638337;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=23PpZPsq+frtG4bi3DwFGXPe3nlscKwcNzLG0s1a+aE=;
	b=EOh5wPQmNDPW/LRR+ejZva1ZN++RTNdBz1txwFhdJ2UTPpcW8824xAQlF7y/AWZ4H9kKhV
	Ceu5qCSdl+1E8E2+6ZPtIlWZbcHx07oiJyDbwPscJZlgGvk+NaRwx3NxqX/ucsM7paqE4w
	9WLoQF4nTWdBKRxsBx7jKZBU0dTA7TQ=
X-MC-Unique: nN37OYbfNlm4APNdDLh1yQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=eg9buBnh0JVcfyGk8SbV17CWf3+NlaZrZc5jjzlzMkglu93W68magmkl38vH0xWgH6D4fYK5X/+DpE/+4+nX5xrMd47aCOk0dAzGDPEi0AVOLpBy1FmIkSf+1dk5rkyor04G/j9hrpvnggH1Ywjs95xnI6pfPXEBTbAiJHi0ehDlE7uGIJLOxKwfWOmZSKhpUoFISgxFg6iRlXoaOijNHF31i3uJrE7p/i2UZ2li3WZZnYHc85LyvVJY17m4EwY2gErMnRjpJL3hp6YH5sMGQvhBHrdZy/fF260UwbIoaK5mJPlUZi7rqfBTirhiBCoHpDKKep7iDHrg0vfxbsXQVg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=23PpZPsq+frtG4bi3DwFGXPe3nlscKwcNzLG0s1a+aE=;
 b=Js3uM6e6UeQq1jbxHcFKwDMUkL7Zdf5ceM7svXLt5VgAKwC3FqAsQWC96m8cJIyZ5X/rJ1HCRbZvTANJ54Pf5CzJOGXrvXGgilO6oWpHbrF96hmanY8LnrnawiSHC1FApHlB1qC2Lp6/BGgm9ePaS3Z5hgEkY9lhDvEaSIlNWAgbov9XYZ83RNUSgEcVpCA01i1JvhAJFEdJgnJQwHqUEd7yS+obEsBF3NxocwcmDmyTKUAR0KdGwzZvSRnFMfamvY1+Up1aO+MoMSMouBL9i9caqmojFHTAwAIChjMVIfKibH0hzf3uSlPCJ0iRHe3eDfwyCDvZwAHMFjGxJmcubw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <772f0afc-64db-6b98-af49-bd970ac78cbb@suse.com>
Date: Wed, 30 Mar 2022 13:05:31 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH v2] livepatch: account for patch offset when applying NOP
 patch
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Ross Lagerwall <ross.lagerwall@citrix.com>,
 Konrad Wilk <konrad.wilk@oracle.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Bjoern Doebel <doebel@amazon.de>
Content-Language: en-US
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6PR05CA0017.eurprd05.prod.outlook.com
 (2603:10a6:20b:2e::30) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 8b3df56d-5cbb-4472-77f8-08da123d35b9
X-MS-TrafficTypeDiagnostic: VI1PR0402MB3695:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR0402MB3695A03D44D1BD28FD6F52A8B31F9@VI1PR0402MB3695.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(54906003)(508600001)(83380400001)(6486002)(36756003)(316002)(186003)(66476007)(66556008)(26005)(66946007)(31686004)(6916009)(5660300002)(6506007)(4326008)(8676002)(6512007)(38100700002)(15650500001)(31696002)(2906002)(86362001)(8936002)(2616005)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?VzF1U1J6NTN5bU9BYWhzNGdYK1VBMHhxNHpqZnhHckI4Q1VUWG5Cd0hjZzcw?=
 =?utf-8?B?dm5Hc3BYRE1Kd00wekNNeUt6SUgrMnYvbmkzckIxZ1ljOS9Ob1FiNHhyRU5w?=
 =?utf-8?B?NHFUanhLU21qK05oZWFmVzJOQ3paT1BTTkRIem9oZGVERzI5UzYzMlVTSWZm?=
 =?utf-8?B?RGJZbjJqT2lINHBqNlhmcmpUdmRkbEJmaEhYOThnMTlzUVpRYjh1N1BZT2RK?=
 =?utf-8?B?cTNzc1pZZjF0TTdSUnB3bDFCOHdzbjR3Y0ZOQksrbWtBaDlIN1p3bjdSc0lt?=
 =?utf-8?B?cWZMV0p2cCtybDF5WTAyOXpicHhlbis1VElhc3VmdStPZ0dEM1h6aHdKRGs2?=
 =?utf-8?B?YnJ1Ni9BMzFIYk1TV1JiNW53RDV1eXhWM1QxR3lHRHl6Y041V2xyTFBSOXI1?=
 =?utf-8?B?cTArb0xPTDFLNUF5SVhISll1NmxkL0JUK0lFNHhycjN5L0pQb0xUV0lrMGF1?=
 =?utf-8?B?QTI2RTRRM3lkanlXRnZncE5mTWcvd3Q3T2I0b2tkSVZZV0hBbExUQUI1cGdi?=
 =?utf-8?B?UmNhWmdLV3FEb1NoajBUUHVkMnlZeVVHdUp0bkgxaE9vUjBhSFhzSTRZR2RO?=
 =?utf-8?B?U1lmeUQvWVVDQm1HTUV5MUtRSkQ4R3ovMVZLUXIvdHNsYmxHdWM4ZkVpQ2VM?=
 =?utf-8?B?cGFlVWpORFRIRWd2T1N0UVprU2dvMVVMU2Vsd3o1Y0o4dEpXbzBrMDRJdCtv?=
 =?utf-8?B?WHJLb3ZNV2hnT0N1bGc5WHVhWTJ6L2VIUlRIV0t6UjVwM3ZZQStlZktZT092?=
 =?utf-8?B?YXh3VndkNDdORTV6RUxRYVBheEh5Zks3MU5IV0h2cjduRTB1U3RrdnlMRzFm?=
 =?utf-8?B?RVBYOFN1NzZGb3JaTzU4R1UxWVhOTXc4cmdkM1Bmd1ozeWlJd2lkKzNlWjI0?=
 =?utf-8?B?L2N2NlI3cVkreTMvVXVIQnlRRERUb0hhQm9XODFYVGMrUkxWRmFaUEJPZXVx?=
 =?utf-8?B?a2puTmdWNG0vRkZ1QU1MOEpjTWM4elc0Q25EZWJNWWFyM3RMcjYwYWZWTU5y?=
 =?utf-8?B?SVB6LzBnNGFOcHkrT1V3QWtCUUVBMWNORHphOWJBdUlycnJTeVQ0ZGM1QXR6?=
 =?utf-8?B?MGFDUFhMT3ZWcTlSOHQrc1Uzbk9OTWZuZlBESCtSeHh6ckxPMURWcmRJb1Vz?=
 =?utf-8?B?R2szb3NVeDUrSE9TTEp1OW5vNW03WE8wOCtZc0g3NmVqbHRzY0lUT01BU0Qz?=
 =?utf-8?B?eXl6VGJjQVFBdkpKVG1ZeU9EZWtseUlDaGVUSEZWVDUrYkNOR3gzc3dHb2N4?=
 =?utf-8?B?QU5FcGZzL2Uvb0xzSWJxTy9WaWdhZXVyQVVWMHpONUhUMHRpYmhOQjVLR0Mv?=
 =?utf-8?B?bjBrY3pmNHNTY1FZNktlVm5XUlR6WERqcmE0S1BqR3lPdnlyMkpPeDA5VHcy?=
 =?utf-8?B?MW52YU50aitHVUpLZW9OWk1LSWJkMG9wdlQ5WVA0OXNxbysrclE5ME1PQ1Jn?=
 =?utf-8?B?QW5xY0xodmdYbDFKUG1TVVZPYi9EYzVFNDd3ZEFZS21PQys5Nm9VOWlUOUUw?=
 =?utf-8?B?M0RVM3JxSHROOUZVcjZ1RklWb3kvcGRjaDRxY3k2TDdQVkNuS3NkVUEza08y?=
 =?utf-8?B?V1VrMi8vb1crS3RxYnVTcTVJOGhxSCtUNVVwMnk2dmh5c2JXSi92Z1hSSENG?=
 =?utf-8?B?V3lOOXZrMWlRT29MY1Y2OVFtN2x2eHArWHZBSitVWEZvSjdHNG1MaExmZUxN?=
 =?utf-8?B?ZnV4OTI0WnNnRUVURkVqK3JqbHoyUW95b2ljQm0yYnFta3dMbFBxSy9tYmFO?=
 =?utf-8?B?YnowcDlvOUNhWXd1eWNUNlFWcytIZDlnY3J3eWc0anRieTJyZmdsMXBRQllH?=
 =?utf-8?B?MU9MSFJHeGN0M3JyUTZ1dVQ0V25laGN3bzZ1OFMwK3RTcC9qRWtkTE5uOVAx?=
 =?utf-8?B?T29NSExnODFRd2JNWVQvZGNXdWJ6aEhob3AyM3dxcnBIelJEcFBrSjN1Qkw0?=
 =?utf-8?B?c3hkU253eEMrVjV2ano4N2h2V3dhVG5jY2NESmpPcEZKbW83SHlyczRLNjBH?=
 =?utf-8?B?NzVPa3pwdzJSc08xbzIyajlKM0dpOXBXbDBRSmFnTkQxUEFSSS9LZTFveHlP?=
 =?utf-8?B?L05FN2wzdUtJbUZiTys2VG05VnZoZW5nbEpaS3duV0xabjRDRkZOL1JUU2tY?=
 =?utf-8?B?blRsMDg0NXlBRStaeXNtN0FKM2pHSmw0eW10dWpUMW1tSk8xQnFSaWJOTlYy?=
 =?utf-8?B?NGVQaC8vTkZteHVOcGV1MmZEMlFFWk1lRm9pazZGci83NGNYLzIzTkFYNk9N?=
 =?utf-8?B?amExV2dwT2phcDJVYU13YjFhV0tIdlJFaHZISE8vUTA4NWZyK0o2T1hEVHZC?=
 =?utf-8?B?elh0MFlEQlBtbVFCbjkwaXBhMTEyWlNlaVIwYVZjS050cStRRFdnZz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8b3df56d-5cbb-4472-77f8-08da123d35b9
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 11:05:33.0936
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 6hJWkoEQziSBohFWvQx8H949qD0s6AZweTv1dl6LRlo2pPRDw8VvrhEVHCGDDRMw7PELY7gvWcXmRG12EKHZ3g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0402MB3695

While not triggered by the trivial xen_nop in-tree patch on
staging/master, that patch exposes a problem on the stable trees, where
all functions have ENDBR inserted. When NOP-ing out a range, we need to
account for this. Handle this right in livepatch_insn_len().

This requires livepatch_insn_len() to be called _after_ ->patch_offset
was set. Note however that the earlier call cannot be deleted. In fact
its result should have been used to guard the is_endbr64() /
is_endbr64_poison() invocations - add the missing check now. While
making that adjustment, also use the local variable "old_ptr"
consistently.

Fixes: 6974c75180f1 ("xen/x86: Livepatch: support patching CET-enhanced functions")
Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
v2: Re-issue livepatch_insn_len(). Fix buffer overrun.
---
Only build tested, as I don't have a live patching environment available.

For Arm this assumes that the patch_offset field starts out as zero; I
think we can make such an assumption, yet otoh on x86 explicit
initialization was added by the cited commit.

Note that the other use of is_endbr64() / is_endbr64_poison() in
arch_livepatch_verify_func() would need the extra check only for
cosmetic reasons, because ARCH_PATCH_INSN_SIZE > ENDBR64_LEN (5 > 4).
Hence I'm not altering the code there.

--- a/xen/arch/x86/livepatch.c
+++ b/xen/arch/x86/livepatch.c
@@ -157,9 +157,15 @@ void noinline arch_livepatch_apply(struc
      * loaded hotpatch (to avoid racing against other fixups adding/removing
      * ENDBR64 or similar instructions).
      */
-    if ( is_endbr64(old_ptr) || is_endbr64_poison(func->old_addr) )
+    if ( len >= ENDBR64_LEN &&
+         (is_endbr64(old_ptr) || is_endbr64_poison(old_ptr)) )
         func->patch_offset += ENDBR64_LEN;
 
+    /* This call must be re-issued once ->patch_offset has its final value. */
+    len = livepatch_insn_len(func);
+    if ( !len )
+        return;
+
     memcpy(func->opaque, old_ptr + func->patch_offset, len);
     if ( func->new_addr )
     {
--- a/xen/include/xen/livepatch.h
+++ b/xen/include/xen/livepatch.h
@@ -90,7 +90,7 @@ static inline
 unsigned int livepatch_insn_len(const struct livepatch_func *func)
 {
     if ( !func->new_addr )
-        return func->new_size;
+        return func->new_size - func->patch_offset;
 
     return ARCH_PATCH_INSN_SIZE;
 }



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 11:57:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 11:57:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296264.504269 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZWxA-0007nw-MS; Wed, 30 Mar 2022 11:57:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296264.504269; Wed, 30 Mar 2022 11:57:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZWxA-0007np-Iw; Wed, 30 Mar 2022 11:57:32 +0000
Received: by outflank-mailman (input) for mailman id 296264;
 Wed, 30 Mar 2022 11:57:31 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=b505=UJ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZWx9-0007nj-DG
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 11:57:31 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 92d5a11c-b020-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 13:57:29 +0200 (CEST)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur01lp2052.outbound.protection.outlook.com [104.47.0.52]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-18-OV6MA9NdOg6BtBvRtOOr-g-1; Wed, 30 Mar 2022 13:57:27 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by DB7PR04MB5100.eurprd04.prod.outlook.com (2603:10a6:10:14::15) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.16; Wed, 30 Mar
 2022 11:57:25 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.019; Wed, 30 Mar 2022
 11:57:25 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 92d5a11c-b020-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648641449;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=OLHnHWHCATAUFSMbY4s7RZWHT+hT6h26e+pqBsTUq5s=;
	b=h1dwYjbo2QG8BEcbfqXlD9yCGZnpjMzYG0O8sHncVL4gdv6zw98DAMAvH+i7FE8uhp+6AX
	lQEAyltx5R35eYjCNOtVUPPOfEvCWhOUpQIelyc+0JxcPdZsS44rZZ2tVQCc+CiT7rrqoo
	6nLAeShlBueM4HC738CDG/mia5x8SpQ=
X-MC-Unique: OV6MA9NdOg6BtBvRtOOr-g-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=a7sBEX7PIQ6SS1v+qqhjRS/bMwQYlwbCO+Ve8kd7fiATWpoMvrA/jODOu77+sjU2/v0YOiD2G7FH+/da5hCoKo6OdrhkMT+Eb/RajF1gYM5Gc/K8JP+oNefWIqIue3TlbzrC85G3ONUNeLenHK2nlCaa7pXTDzngA2BQIZuCgO6y7QemUwxdumQWkzcVHSilaWx1NuIPybts1zBwc7ev9T6v6MR9RYHSujarBc1nDQOK9lXFhPW9UAJuUHdEjC96KYHdOWH3CtTkHMVy2FfiKIpKp21K32or4Jf7OhvW4+yHwACR57EVYbxLzuCTBUsKHjN8DhJWQ3bjOyEKsTjH5g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=LOSFShrkaiYP4CP6OEy4umetxHbuHPZerAGZnJ/sr+o=;
 b=O7Pi5UlqA6VM90E4Oy5ndOHCDZ81YMYQExN9LT8u+Bvn3ulvnOa/5plP4gSs1x46LVx0ick+tXdCzhavmvb3+bVGR2k41dO+58xGHp5bYklaY1O7ksmPUYAOF202C5ON5OOh2LkQLRdQ1vuEBEMwTFBNmp5Qcyev4wr1j4HMjCUVdp3LtYIeDqRfrmpbW9y+onYOEwB/RgiMfTdzbyQDg2ZXozg3r3ojuwx9ADrLOPIRhlKRqtSbz/rV8JnF2xceyd4cf+5zd1byaCEK0d/8N0599FhIR/22F+JNKmG90WMNqsnrI6OKsHmv1fWMa7U0OfYUSDmNoMHKy7x3XCprkw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <e3a045d5-34d3-af73-89a7-7c306e7f8de4@suse.com>
Date: Wed, 30 Mar 2022 13:57:21 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2 2/2] xen: Populate xen.lds.h and make use of its macros
Content-Language: en-US
To: Michal Orzel <michal.orzel@arm.com>
CC: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 xen-devel@lists.xenproject.org, Julien Grall <julien@xen.org>
References: <20220322080233.53134-1-michal.orzel@arm.com>
 <20220322080233.53134-3-michal.orzel@arm.com>
 <2940b4c8-5d44-695e-4550-0a32c3a4c053@xen.org>
 <d5bccf50-c74a-40e6-843e-3ad682647efb@arm.com>
 <5121de30-644f-8a1f-ff1a-29c4d2ee7f0f@xen.org>
 <63a680c6-0086-230b-dbbd-dfe63609f9bc@suse.com>
 <b0b49926-9a70-37f1-43d4-ac4e852198ba@xen.org>
 <1013a14b-a45b-f37f-b2e0-e63b186a2956@suse.com>
 <ffa0e581-6a32-5c3c-7e63-acd5086c6822@arm.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <ffa0e581-6a32-5c3c-7e63-acd5086c6822@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: FR0P281CA0012.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:15::17) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 9dac76ff-eb4b-476d-ea6e-08da124473ce
X-MS-TrafficTypeDiagnostic: DB7PR04MB5100:EE_
X-Microsoft-Antispam-PRVS:
	<DB7PR04MB510027B6657BDA53807C1A5AB31F9@DB7PR04MB5100.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(31696002)(6916009)(54906003)(53546011)(6506007)(2906002)(6512007)(86362001)(26005)(186003)(8676002)(5660300002)(38100700002)(7416002)(31686004)(66946007)(66476007)(66556008)(8936002)(508600001)(2616005)(36756003)(316002)(6666004)(6486002)(4326008)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?dznYwjYMRAmm7odKKScHR+05FaEi1Sh+d6Xw49Tz3j/RgrT0T4kk5lZZVaJv?=
 =?us-ascii?Q?+rrRT9JqhOfqVSxUjNC85xXIxxnP/Z0UUdseQfuNss2W6xB1dvKDKN50qIKf?=
 =?us-ascii?Q?0Snl4YMlOrdpxhijtdWkfhnGMDng15Xc2R3cOOFXZl900yrWbZa2CDlIguGT?=
 =?us-ascii?Q?BBkNQysej8048jGmZyZenoLwPAnNk67nDNTSiBVihFpdf/svFH0ZEe+rWLFv?=
 =?us-ascii?Q?nycHSlojfUU7nIF58Hwz4Qv9oA1nLHUwECWgsxTCO3U+hLs7lDAe45AgSVJn?=
 =?us-ascii?Q?KfGroyVIiLesBVChzKV93TpHHhHNP3rzNMxMwz+69qzEG0AmDaOknXzohLII?=
 =?us-ascii?Q?dKhcC8NHrpJXVmZFx/LYq8AKc92dr82HJpiR8WQ3EiggVXOopUls6kK43N0w?=
 =?us-ascii?Q?IT5p86Hhxi4xKR6Lsr8J1x85wZeK5xzaMt3JchTDDGMf/knfqnKyAff/p6cP?=
 =?us-ascii?Q?GcgzG+nqDv4zJCrM42noOXLtRW3qNEPe7XLZEiFzZsSckx+sw0MCCz+ELiNU?=
 =?us-ascii?Q?cn/06rclktQsDOh4Sdo0svSJl/yEM+7GRDwD/qqrg4p+62MGVSX2AqlZHhDV?=
 =?us-ascii?Q?14p4jICsHZtbjOTu/Q7es49kR2UGVkDr2dyhMjcqhfyD3L3yc4LnxUOYkYI9?=
 =?us-ascii?Q?CzEbLJ7eMv/tqUhnYBAKwsW1w51RwNYrY1OSn/qDEF1YssP6SKojjH+DanT0?=
 =?us-ascii?Q?0QvSRQ16Pjw2RVW2lFj5WMgdd1u9xpzxEFkyDiG5bLuaR1TkpEzdvfdEr0Pk?=
 =?us-ascii?Q?fOkVf5pFXrEejdUDWBE+CWX9nfI28IkiM07zl530coiz2Powt+4TflqIr+IO?=
 =?us-ascii?Q?DM3Qt4FwnB7ZFW2SPnyjVwclZwSOgRQ1m01LBlUz/4PDvfsQyCyLO0pyrG9u?=
 =?us-ascii?Q?tnYimGp+a8W5HsI2pklK9h3ak06h+BNnZWmlAaApOlVe8TiTLVyILBbDUxP5?=
 =?us-ascii?Q?oC1xA8ukhEfRKVdj5PuAWhBNSJcJjZ45/GOX3i2j5EeSL1Ap8Vcxsj5xAgLv?=
 =?us-ascii?Q?iTCvhBy/g9WN0x3O1p2ldDxZu1CvVHA6xfAVyUGL2Gp+WbKjEAsxbdDhns1G?=
 =?us-ascii?Q?GRGkltgAL8f+JWuILHTj5Kade/Gq2iNq/dRdJPBm8UqQji36yXqDIdViTai+?=
 =?us-ascii?Q?sSf/Q8HnlPVVJxfAFWN+WwltI5GYdxE+l+q/HG9SKWGdQh1aD12gyH6RoB1U?=
 =?us-ascii?Q?hQYVLQwZrn4DXNLGRH0KGxARkCpgCIDYD1fgWSKWwW9TXUV7jjBRS/xQwm9x?=
 =?us-ascii?Q?V8KCX3wVrQ5ycSMOPF/SwSwtIBw1vDGV55hxpeyjkaWFFGdW7c0c+95P6OgX?=
 =?us-ascii?Q?z4HoPpNiUgB9gphNljHubfSlqBnYanH0QG/gNqfhaF0TnLa1Y5pBMr+mC1oD?=
 =?us-ascii?Q?yksWZX4p/JkOWbPEPvigyTP0jCccKMDX0CKc0S2gkLGeCrQIJbW86431nr7x?=
 =?us-ascii?Q?EF9l3nby+Wsoh5rTijHhXmshusOgMMNJWtcwhLM5qVTS3odNvh234HzyKm3K?=
 =?us-ascii?Q?HfwFIf+CxjWT4nkpo79pKpG8+tAsTLvPdsSHOiU52U4YqJwLIF1fJWEzLXuV?=
 =?us-ascii?Q?1/NZn77zDHVjS8nPPz475MG0qw+zxgvNGe45uOKt4KPZ3AegaHF/SYC20db3?=
 =?us-ascii?Q?M72k2slV62Ucsqn52vdtQl8YCd2S19DHvrONHVu4he9DQAmGAoKzhjCbb69l?=
 =?us-ascii?Q?6IMkWepXKOhKU/194DerpzMNPFPSCh+2SsuZldrOlh7nPeY+0VYAzgcmS30r?=
 =?us-ascii?Q?bO1oRnw6Wg=3D=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 9dac76ff-eb4b-476d-ea6e-08da124473ce
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 11:57:25.3559
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: McMrrK2RNsQw4WwrCE6fWo1Jvsdb/PcCqK0TT1GA/ltl6QT5Um7rtyQPn5D14Zhggu70dTemV/aZ1OVh89CHEw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR04MB5100

On 30.03.2022 13:04, Michal Orzel wrote:
> Hello,
>=20
> On 30.03.2022 12:42, Jan Beulich wrote:
>> On 30.03.2022 12:32, Julien Grall wrote:
>>> On 29/03/2022 12:42, Jan Beulich wrote:
>>>> On 29.03.2022 12:54, Julien Grall wrote:
>>>>> On 29/03/2022 11:12, Michal Orzel wrote:
>>>>>> On 29.03.2022 11:54, Julien Grall wrote:
>>>>>>> On 22/03/2022 08:02, Michal Orzel wrote:
>>>>>>>> --- a/xen/include/xen/xen.lds.h
>>>>>>>> +++ b/xen/include/xen/xen.lds.h
>>>>>>>> @@ -5,4 +5,104 @@
>>>>>>>>   =C2=A0=C2=A0 * Common macros to be used in architecture specific=
 linker scripts.
>>>>>>>>   =C2=A0=C2=A0 */
>>>>>>>>   =C2=A0 +/* Macros to declare debug sections. */
>>>>>>>> +#ifdef EFI
>>>>>>>
>>>>>>> AFAIK, we don't define EFI on Arm (just CONFIG_EFI). Yet we do supp=
ort EFI on arm64.
>>>>>>>
>>>>>>> As this #ifdef is now in generic code, can you explain how this is =
meant to be used?
>>>>>>>
>>>>>> As we do not define EFI on arm, all the stuff protected by #ifdef EF=
I is x86 specific.
>>>>>
>>>>> I find the name "EFI" too generic to figure out that this code can on=
ly
>>>>> be used by x86.
>>>>>
>>>>> But, from my understanding, this header is meant to contain generic
>>>>> code. It feels a bit odd that we are moving arch specific code.
>>>>>
>>>>> To be honest, I don't quite understand why we need to make the
>>>>> diffferentiation on x86. So I guess the first question is how this is
>>>>> meant to be used on x86?
>>>>
>>>> We produce two linker scripts from the single source file: One (with E=
FI
>>>> undefined) to link the ELF binary, and another (with EFI defined) to l=
ink
>>>> the PE/COFF output. If "EFI" is too imprecise as a name for the identi=
fier,
>>>> I wouldn't mind renaming it (to PE_COFF?), but at the same time I'm no=
t
>>>> convinced this is really necessary.
>>>
>>> Thank for the explanation (and the other ones in this thread). You are=
=20
>>> right the confusion arised from "generating" vs "linking".
>>>
>>> Renaming to PE_COFF may help to avoid the confusion with CONFIG_EFI.=20
>>> That said, it would possibly make more difficult to associate the flag=
=20
>>> with "linking an EFI binary".
>>
>> Indeed. And EFI_PE_COFF is getting a little unwieldy for my taste.
>>
>>> I think some documentaion about the define EFI would be help so there=20
>>> are no more confusion between CONFIG_EFI/EFI. But I am not sure where t=
o=20
>>> put it. Maybe at the top of the header?
>>
>> That's perhaps the best place, yes.
>>
> In this case how about the following comment at the top of xen.lds.h:
>=20
> "To avoid any confusion about EFI macro used in this header vs EFI suppor=
t,
> the former is used when linking a native EFI (i.e. PE/COFF) binary, where=
as
> the latter means support for generating EFI binary.

No, that's the case on Arm only. As Julien suggested, it is perhaps best
to explain the difference between EFI and CONFIG_EFI, without going into
arch specifics.

Jan

> Currently EFI macro is
> only defined by x86 to link PE/COFF output, however it is not unique to t=
his
> architecture."
>=20
> Cheers,
> Michal
>=20



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 12:13:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 12:13:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296282.504279 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZXCz-0001x8-F7; Wed, 30 Mar 2022 12:13:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296282.504279; Wed, 30 Mar 2022 12:13:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZXCz-0001x1-C7; Wed, 30 Mar 2022 12:13:53 +0000
Received: by outflank-mailman (input) for mailman id 296282;
 Wed, 30 Mar 2022 12:13:52 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5iAL=UJ=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nZXCy-0001wv-Cw
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 12:13:52 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTP
 id db9803be-b022-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 14:13:50 +0200 (CEST)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id AA52D1477;
 Wed, 30 Mar 2022 05:13:49 -0700 (PDT)
Received: from [10.57.8.78] (unknown [10.57.8.78])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 70C803F718;
 Wed, 30 Mar 2022 05:13:47 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: db9803be-b022-11ec-8fbc-03012f2f19d4
Message-ID: <168143f7-11e3-1acb-2de1-dba1a0db4ad3@arm.com>
Date: Wed, 30 Mar 2022 14:13:36 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [PATCH v2 2/2] xen: Populate xen.lds.h and make use of its macros
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 xen-devel@lists.xenproject.org, Julien Grall <julien@xen.org>
References: <20220322080233.53134-1-michal.orzel@arm.com>
 <20220322080233.53134-3-michal.orzel@arm.com>
 <2940b4c8-5d44-695e-4550-0a32c3a4c053@xen.org>
 <d5bccf50-c74a-40e6-843e-3ad682647efb@arm.com>
 <5121de30-644f-8a1f-ff1a-29c4d2ee7f0f@xen.org>
 <63a680c6-0086-230b-dbbd-dfe63609f9bc@suse.com>
 <b0b49926-9a70-37f1-43d4-ac4e852198ba@xen.org>
 <1013a14b-a45b-f37f-b2e0-e63b186a2956@suse.com>
 <ffa0e581-6a32-5c3c-7e63-acd5086c6822@arm.com>
 <e3a045d5-34d3-af73-89a7-7c306e7f8de4@suse.com>
From: Michal Orzel <michal.orzel@arm.com>
In-Reply-To: <e3a045d5-34d3-af73-89a7-7c306e7f8de4@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit



On 30.03.2022 13:57, Jan Beulich wrote:
> On 30.03.2022 13:04, Michal Orzel wrote:
>> Hello,
>>
>> On 30.03.2022 12:42, Jan Beulich wrote:
>>> On 30.03.2022 12:32, Julien Grall wrote:
>>>> On 29/03/2022 12:42, Jan Beulich wrote:
>>>>> On 29.03.2022 12:54, Julien Grall wrote:
>>>>>> On 29/03/2022 11:12, Michal Orzel wrote:
>>>>>>> On 29.03.2022 11:54, Julien Grall wrote:
>>>>>>>> On 22/03/2022 08:02, Michal Orzel wrote:
>>>>>>>>> --- a/xen/include/xen/xen.lds.h
>>>>>>>>> +++ b/xen/include/xen/xen.lds.h
>>>>>>>>> @@ -5,4 +5,104 @@
>>>>>>>>>      * Common macros to be used in architecture specific linker scripts.
>>>>>>>>>      */
>>>>>>>>>     +/* Macros to declare debug sections. */
>>>>>>>>> +#ifdef EFI
>>>>>>>>
>>>>>>>> AFAIK, we don't define EFI on Arm (just CONFIG_EFI). Yet we do support EFI on arm64.
>>>>>>>>
>>>>>>>> As this #ifdef is now in generic code, can you explain how this is meant to be used?
>>>>>>>>
>>>>>>> As we do not define EFI on arm, all the stuff protected by #ifdef EFI is x86 specific.
>>>>>>
>>>>>> I find the name "EFI" too generic to figure out that this code can only
>>>>>> be used by x86.
>>>>>>
>>>>>> But, from my understanding, this header is meant to contain generic
>>>>>> code. It feels a bit odd that we are moving arch specific code.
>>>>>>
>>>>>> To be honest, I don't quite understand why we need to make the
>>>>>> diffferentiation on x86. So I guess the first question is how this is
>>>>>> meant to be used on x86?
>>>>>
>>>>> We produce two linker scripts from the single source file: One (with EFI
>>>>> undefined) to link the ELF binary, and another (with EFI defined) to link
>>>>> the PE/COFF output. If "EFI" is too imprecise as a name for the identifier,
>>>>> I wouldn't mind renaming it (to PE_COFF?), but at the same time I'm not
>>>>> convinced this is really necessary.
>>>>
>>>> Thank for the explanation (and the other ones in this thread). You are 
>>>> right the confusion arised from "generating" vs "linking".
>>>>
>>>> Renaming to PE_COFF may help to avoid the confusion with CONFIG_EFI. 
>>>> That said, it would possibly make more difficult to associate the flag 
>>>> with "linking an EFI binary".
>>>
>>> Indeed. And EFI_PE_COFF is getting a little unwieldy for my taste.
>>>
>>>> I think some documentaion about the define EFI would be help so there 
>>>> are no more confusion between CONFIG_EFI/EFI. But I am not sure where to 
>>>> put it. Maybe at the top of the header?
>>>
>>> That's perhaps the best place, yes.
>>>
>> In this case how about the following comment at the top of xen.lds.h:
>>
>> "To avoid any confusion about EFI macro used in this header vs EFI support,
>> the former is used when linking a native EFI (i.e. PE/COFF) binary, whereas
>> the latter means support for generating EFI binary.
> 
> No, that's the case on Arm only. As Julien suggested, it is perhaps best
> to explain the difference between EFI and CONFIG_EFI, without going into
> arch specifics.
Could you please tell me what you are reffering to as there is no such identifier
in Xen (as opposed to Linux) like CONFIG_EFI ?

> 
> Jan
> 
>> Currently EFI macro is
>> only defined by x86 to link PE/COFF output, however it is not unique to this
>> architecture."
>>
>> Cheers,
>> Michal
>>
> 

Michal


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 12:20:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 12:20:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296287.504291 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZXJC-0003Mk-4l; Wed, 30 Mar 2022 12:20:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296287.504291; Wed, 30 Mar 2022 12:20:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZXJC-0003Md-1A; Wed, 30 Mar 2022 12:20:18 +0000
Received: by outflank-mailman (input) for mailman id 296287;
 Wed, 30 Mar 2022 12:20:16 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZXJA-0003MR-Kl; Wed, 30 Mar 2022 12:20:16 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZXJA-0001rI-Go; Wed, 30 Mar 2022 12:20:16 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZXJA-0004lO-4s; Wed, 30 Mar 2022 12:20:16 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZXJA-0007yO-4C; Wed, 30 Mar 2022 12:20:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Message-Id:Subject:To;
	bh=5guNy2j65GfvHNFAXGyJLxRI3GVi0bJtgBtYPlgvJR0=; b=wXVSmOWmWQKbFyuhGcG6LG/4Uu
	sxl30JKULwVqe8XeraTmJBP12f6yoXJGg/GwNCGgyfDc3Tdigqpr13q0xMeZ++ky7oaMN5cxdwB+h
	HE3eDMdic8JvASDh9dCUt8N+ge90l71WEdsqNKidSvGKrHNCGD4KbZWyD6fcWLKrMdJY=;
To: xen-devel@lists.xenproject.org
Subject: [xen-4.15-testing bisection] complete test-amd64-i386-livepatch
Message-Id: <E1nZXJA-0007yO-4C@osstest.test-lab.xenproject.org>
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 30 Mar 2022 12:20:16 +0000

branch xen-4.15-testing
xenbranch xen-4.15-testing
job test-amd64-i386-livepatch
testid livepatch-run

Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: ovmf git://xenbits.xen.org/osstest/ovmf.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: seabios git://xenbits.xen.org/osstest/seabios.git
Tree: xen git://xenbits.xen.org/xen.git

*** Found and reproduced problem changeset ***

  Bug is in tree:  xen git://xenbits.xen.org/xen.git
  Bug introduced:  be9facf323b40b5a18c5e3f70fce5b245818c42f
  Bug not present: 74aeb555745b27575c3f82051a83942ee05bd842
  Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/169023/


  commit be9facf323b40b5a18c5e3f70fce5b245818c42f
  Author: Bjoern Doebel <doebel@amazon.de>
  Date:   Thu Mar 10 07:35:36 2022 +0000
  
      xen/x86: Livepatch: support patching CET-enhanced functions
      
      Xen enabled CET for supporting architectures. The control flow aspect of
      CET require functions that can be called indirectly (i.e., via function
      pointers) to start with an ENDBR64 instruction. Otherwise a control flow
      exception is raised.
      
      This expectation breaks livepatching flows because we patch functions by
      overwriting their first 5 bytes with a JMP + <offset>, thus breaking the
      ENDBR64. We fix this by checking the start of a patched function for
      being ENDBR64. In the positive case we move the livepatch JMP to start
      behind the ENDBR64 instruction.
      
      To avoid having to guess the ENDBR64 offset again on patch reversal
      (which might race with other mechanisms adding/removing ENDBR
      dynamically), use the livepatch metadata to store the computed offset
      along with the saved bytes of the overwritten function.
      
      Signed-off-by: Bjoern Doebel <doebel@amazon.de>
      Acked-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
      Reviewed-by: Ross Lagerwall <ross.lagerwall@citrix.com>
      Tested-by: Jiamei Xie <jiamei.xie@arm.com>
      (cherry picked from commit 6974c75180f1aad44e5428eabf2396b2b50fb0e4)
      
      Note: For backports to 4.14 thru 4.16, there is no endbr-clobbering, hence no
            is_endbr64_poison() logic.


For bisection revision-tuple graph see:
   http://logs.test-lab.xenproject.org/osstest/results/bisect/xen-4.15-testing/test-amd64-i386-livepatch.livepatch-run.html
Revision IDs in each graph node refer, respectively, to the Trees above.

----------------------------------------
Running cs-bisection-step --graph-out=/home/logs/results/bisect/xen-4.15-testing/test-amd64-i386-livepatch.livepatch-run --summary-out=tmp/169023.bisection-summary --basis-template=168502 --blessings=real,real-bisect,real-retry xen-4.15-testing test-amd64-i386-livepatch livepatch-run
Searching for failure / basis pass:
 168970 fail [host=huxelrebe0] / 168502 [host=chardonnay0] 168483 [host=huxelrebe1] 168135 [host=albana1] 168062 [host=albana0] 168014 [host=fiano1] 167996 ok.
Failure / basis pass flights: 168970 / 167996
(tree with no url: minios)
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: ovmf git://xenbits.xen.org/osstest/ovmf.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: seabios git://xenbits.xen.org/osstest/seabios.git
Tree: xen git://xenbits.xen.org/xen.git
Latest c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db bb43e0e1ca20dff14536b7c90ff870f3f50bff8f
Basis pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 33189f05278345eab608ff56e87905bdeacdbd47 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 e2af2d050338c99e8436e251ad67aafb3ebbd501 dc776a2d9ca9e1b857e880ff682668871369b4c3 3a9450fe5eb0fda8b7069f37d21ce2655bb59da6
Generating revisions with ./adhoc-revtuple-generator  git://xenbits.xen.org/linux-pvops.git#c3038e718a19fc596f7b1baba0f83d5146dc7784-c3038e718a19fc596f7b1baba0f83d5146dc7784 git://xenbits.xen.org/osstest/linux-firmware.git#c530a75c1e6a472b0eb9558310b518f0dfcd8860-c530a75c1e6a472b0eb9558310b518f0dfcd8860 git://xenbits.xen.org/osstest/ovmf.git#33189f05278345eab608ff56e87905bdeacdbd47-b1b89f9009f2390652e0061bd7b24fc40732bc70 git://xenbits.xen.org/qemu-xen-traditional.git#3d273dd05e51e5a1ffba3d98c74\
 37ee84e8f8764-3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 git://xenbits.xen.org/qemu-xen.git#e2af2d050338c99e8436e251ad67aafb3ebbd501-6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 git://xenbits.xen.org/osstest/seabios.git#dc776a2d9ca9e1b857e880ff682668871369b4c3-d239552ce7220e448ae81f41515138f7b9e3c4db git://xenbits.xen.org/xen.git#3a9450fe5eb0fda8b7069f37d21ce2655bb59da6-bb43e0e1ca20dff14536b7c90ff870f3f50bff8f
Loaded 12651 nodes in revision graph
Searching for test results:
 167996 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 33189f05278345eab608ff56e87905bdeacdbd47 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 e2af2d050338c99e8436e251ad67aafb3ebbd501 dc776a2d9ca9e1b857e880ff682668871369b4c3 3a9450fe5eb0fda8b7069f37d21ce2655bb59da6
 168014 [host=fiano1]
 168062 [host=albana0]
 168135 [host=albana1]
 168483 [host=huxelrebe1]
 168502 [host=chardonnay0]
 168863 fail c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db 3c8e7395e2d01140c862c78fa9483e46c0dbd343
 168970 fail c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db bb43e0e1ca20dff14536b7c90ff870f3f50bff8f
 168990 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 33189f05278345eab608ff56e87905bdeacdbd47 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 e2af2d050338c99e8436e251ad67aafb3ebbd501 dc776a2d9ca9e1b857e880ff682668871369b4c3 3a9450fe5eb0fda8b7069f37d21ce2655bb59da6
 168994 fail c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db bb43e0e1ca20dff14536b7c90ff870f3f50bff8f
 168998 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 8a576733162bb72afb4d1eb3012b0aef8d265018 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 e2af2d050338c99e8436e251ad67aafb3ebbd501 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd ef47070bbb918e8786011242e8d94e071c35ed0f
 169000 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 e2af2d050338c99e8436e251ad67aafb3ebbd501 d239552ce7220e448ae81f41515138f7b9e3c4db cd751c09a5bab9f3529901fbe4d867ad7d52e89d
 169001 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db c3fed31049240de3583e0e1bbea2b3b6278afa2a
 169005 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db 67fa16fbc29ebc127372450fcb09a022269f556f
 169008 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db c3407c77a02eb9077ce2360df6240a9b0e9cb7db
 169010 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db 74aeb555745b27575c3f82051a83942ee05bd842
 169012 fail c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db be9facf323b40b5a18c5e3f70fce5b245818c42f
 169018 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db 74aeb555745b27575c3f82051a83942ee05bd842
 169020 fail c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db be9facf323b40b5a18c5e3f70fce5b245818c42f
 169022 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db 74aeb555745b27575c3f82051a83942ee05bd842
 169023 fail c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db be9facf323b40b5a18c5e3f70fce5b245818c42f
Searching for interesting versions
 Result found: flight 167996 (pass), for basis pass
 For basis failure, parent search stopping at c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db 74aeb555745b27575c3f82051a83942ee05bd842, results HASH(0x5599d0d4c1a8) HASH(0x5599d0d31948) HASH(0x5599d0d4d250) For basis failure, parent search stopping at c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1\
 e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db c3407c77a02eb9077ce2360df6240a9b0e9cb7db, results HASH(0x5599d0d49398) For basis failure, parent search stopping at c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a4\
 75e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db 67fa16fbc29ebc127372450fcb09a022269f556f, results HASH(0x5599d0d47390) For basis failure, parent search stopping at c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db c3fed31049240de3583e0e1bbea2b3b6278afa2a, results HASH(0x5599d0d45388) For basis\
  failure, parent search stopping at c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 e2af2d050338c99e8436e251ad67aafb3ebbd501 d239552ce7220e448ae81f41515138f7b9e3c4db cd751c09a5bab9f3529901fbe4d867ad7d52e89d, results HASH(0x5599d0d44160) For basis failure, parent search stopping at c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 8a576733162bb72afb4d\
 1eb3012b0aef8d265018 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 e2af2d050338c99e8436e251ad67aafb3ebbd501 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd ef47070bbb918e8786011242e8d94e071c35ed0f, results HASH(0x5599d0d42158) For basis failure, parent search stopping at c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 33189f05278345eab608ff56e87905bdeacdbd47 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 e2af2d050338c99e8436e251ad67aafb3ebbd501 dc776a2d9ca9e1b857e880ff68266887136\
 9b4c3 3a9450fe5eb0fda8b7069f37d21ce2655bb59da6, results HASH(0x5599d0d365e0) HASH(0x5599d0d39b10) Result found: flight 168863 (fail), for basis failure (at ancestor ~418)
 Repro found: flight 168990 (pass), for basis pass
 Repro found: flight 168994 (fail), for basis failure
 0 revisions at c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db 74aeb555745b27575c3f82051a83942ee05bd842
No revisions left to test, checking graph state.
 Result found: flight 169010 (pass), for last pass
 Result found: flight 169012 (fail), for first failure
 Repro found: flight 169018 (pass), for last pass
 Repro found: flight 169020 (fail), for first failure
 Repro found: flight 169022 (pass), for last pass
 Repro found: flight 169023 (fail), for first failure

*** Found and reproduced problem changeset ***

  Bug is in tree:  xen git://xenbits.xen.org/xen.git
  Bug introduced:  be9facf323b40b5a18c5e3f70fce5b245818c42f
  Bug not present: 74aeb555745b27575c3f82051a83942ee05bd842
  Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/169023/


  commit be9facf323b40b5a18c5e3f70fce5b245818c42f
  Author: Bjoern Doebel <doebel@amazon.de>
  Date:   Thu Mar 10 07:35:36 2022 +0000
  
      xen/x86: Livepatch: support patching CET-enhanced functions
      
      Xen enabled CET for supporting architectures. The control flow aspect of
      CET require functions that can be called indirectly (i.e., via function
      pointers) to start with an ENDBR64 instruction. Otherwise a control flow
      exception is raised.
      
      This expectation breaks livepatching flows because we patch functions by
      overwriting their first 5 bytes with a JMP + <offset>, thus breaking the
      ENDBR64. We fix this by checking the start of a patched function for
      being ENDBR64. In the positive case we move the livepatch JMP to start
      behind the ENDBR64 instruction.
      
      To avoid having to guess the ENDBR64 offset again on patch reversal
      (which might race with other mechanisms adding/removing ENDBR
      dynamically), use the livepatch metadata to store the computed offset
      along with the saved bytes of the overwritten function.
      
      Signed-off-by: Bjoern Doebel <doebel@amazon.de>
      Acked-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
      Reviewed-by: Ross Lagerwall <ross.lagerwall@citrix.com>
      Tested-by: Jiamei Xie <jiamei.xie@arm.com>
      (cherry picked from commit 6974c75180f1aad44e5428eabf2396b2b50fb0e4)
      
      Note: For backports to 4.14 thru 4.16, there is no endbr-clobbering, hence no
            is_endbr64_poison() logic.

Revision graph left in /home/logs/results/bisect/xen-4.15-testing/test-amd64-i386-livepatch.livepatch-run.{dot,ps,png,html,svg}.
----------------------------------------
169023: tolerable ALL FAIL

flight 169023 xen-4.15-testing real-bisect [real]
http://logs.test-lab.xenproject.org/osstest/logs/169023/

Failures :-/ but no regressions.

Tests which did not succeed,
including tests which could not be run:
 test-amd64-i386-livepatch    13 livepatch-run           fail baseline untested


jobs:
 test-amd64-i386-livepatch                                    fail    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 12:23:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 12:23:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296296.504302 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZXMK-000403-MF; Wed, 30 Mar 2022 12:23:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296296.504302; Wed, 30 Mar 2022 12:23:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZXMK-0003zw-IZ; Wed, 30 Mar 2022 12:23:32 +0000
Received: by outflank-mailman (input) for mailman id 296296;
 Wed, 30 Mar 2022 12:23:30 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=x//1=UJ=tklengyel.com=tamas@srs-se1.protection.inumbo.net>)
 id 1nZXMI-0003zq-Lg
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 12:23:30 +0000
Received: from MTA-10-3.privateemail.com (mta-10-3.privateemail.com
 [198.54.127.62]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 33a1a87a-b024-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 14:23:29 +0200 (CEST)
Received: from mta-10.privateemail.com (localhost [127.0.0.1])
 by mta-10.privateemail.com (Postfix) with ESMTP id B0C7318000AB
 for <xen-devel@lists.xenproject.org>; Wed, 30 Mar 2022 08:23:26 -0400 (EDT)
Received: from mail-oi1-f180.google.com (unknown [10.20.151.187])
 by mta-10.privateemail.com (Postfix) with ESMTPA id 8BE4D18000AA
 for <xen-devel@lists.xenproject.org>; Wed, 30 Mar 2022 08:23:26 -0400 (EDT)
Received: by mail-oi1-f180.google.com with SMTP id e189so21870599oia.8
 for <xen-devel@lists.xenproject.org>; Wed, 30 Mar 2022 05:23:26 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 33a1a87a-b024-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648643006;
	bh=BWLGM4TaaOB5S+Z6LyE/DIBHfPx4N7kbvBvRQzqHlZI=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=BGBuYgnpdX2Jvi8bAb/9gFjH1x3E/j4vZTCqcz/kaIwtD+NdLNfjiQTCyQAHnSeK+
	 9DbproIBjyB+8W6ixLsP5KWKbOikE1EUNgatzfhfdVG8aIduoN2/UcqtgtVcNhnN/s
	 aA99EIb2XmtdTG5KqXVdhr/tVTicbwSXwBXJGJC6WoD2wcoO7M116OheB8s2BbctPY
	 vBCZiNrNOXb+8FwKOfA65bwSDdSFWsusJdjo0HiBNfBrntV0M9Pr1k1DSehsT+4ALK
	 j2V/fazkne5Vakl4MvVxrUBm0o87cVi7pUWCx6PIrGwMvFAMd8hwRRFwf4NPQ3+VEV
	 PcQHYcpEngZ8A==
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648643006;
	bh=BWLGM4TaaOB5S+Z6LyE/DIBHfPx4N7kbvBvRQzqHlZI=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=BGBuYgnpdX2Jvi8bAb/9gFjH1x3E/j4vZTCqcz/kaIwtD+NdLNfjiQTCyQAHnSeK+
	 9DbproIBjyB+8W6ixLsP5KWKbOikE1EUNgatzfhfdVG8aIduoN2/UcqtgtVcNhnN/s
	 aA99EIb2XmtdTG5KqXVdhr/tVTicbwSXwBXJGJC6WoD2wcoO7M116OheB8s2BbctPY
	 vBCZiNrNOXb+8FwKOfA65bwSDdSFWsusJdjo0HiBNfBrntV0M9Pr1k1DSehsT+4ALK
	 j2V/fazkne5Vakl4MvVxrUBm0o87cVi7pUWCx6PIrGwMvFAMd8hwRRFwf4NPQ3+VEV
	 PcQHYcpEngZ8A==
X-Gm-Message-State: AOAM531//ZRevy7QGQBm74lKBxVE4wYFAL9NTnRXevrCCSTFVvloPh+k
	N8l4XR22Xnkhi0Nu35fipckZ8zoZ8T+2yNuY1sQ=
X-Google-Smtp-Source: ABdhPJyRHCjmMa9r1NhtmZat0Yig7HRsCNC6gUNSKYuj8wQekX3UyNN2MnxpDYEOwE11Yb1JShrZ2p6KAC+YKcejTC8=
X-Received: by 2002:aca:d12:0:b0:2ee:f684:bd4b with SMTP id
 18-20020aca0d12000000b002eef684bd4bmr1671814oin.128.1648643005935; Wed, 30
 Mar 2022 05:23:25 -0700 (PDT)
MIME-Version: 1.0
References: <ab6bb88e90e5649c60e08a1680b3a2390441031b.1648561546.git.tamas.lengyel@intel.com>
 <04459197-458b-8d10-2692-981495c0e243@suse.com> <CABfawhnKL_7iBiOAHLjtKhH6sCDRfrLcNS_kr3YSLr=XdQdUGg@mail.gmail.com>
 <b20fd202-0fd2-ad8a-58dc-1ca83b8da444@suse.com>
In-Reply-To: <b20fd202-0fd2-ad8a-58dc-1ca83b8da444@suse.com>
From: Tamas K Lengyel <tamas@tklengyel.com>
Date: Wed, 30 Mar 2022 08:23:14 -0400
X-Gmail-Original-Message-ID: <CABfawhnTxuMr7T02B=0thy8h_P4KnCC2zc+Q-Ej==WZdh-Te9A@mail.gmail.com>
Message-ID: <CABfawhnTxuMr7T02B=0thy8h_P4KnCC2zc+Q-Ej==WZdh-Te9A@mail.gmail.com>
Subject: Re: [PATCH v2 1/3] x86/mem_sharing: option to enforce fork starting
 with empty p2m
To: Jan Beulich <jbeulich@suse.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>, Wei Liu <wl@xen.org>, 
	Anthony PERARD <anthony.perard@citrix.com>, Juergen Gross <JGross@suse.com>, 
	Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, 
	Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, 
	Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian <kevin.tian@intel.com>, 
	=?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>, 
	Xen-devel <xen-devel@lists.xenproject.org>
Content-Type: multipart/alternative; boundary="000000000000baf69d05db6e9cc8"
X-Virus-Scanned: ClamAV using ClamSMTP

--000000000000baf69d05db6e9cc8
Content-Type: text/plain; charset="UTF-8"

On Wed, Mar 30, 2022, 2:47 AM Jan Beulich <jbeulich@suse.com> wrote:

> On 29.03.2022 18:10, Tamas K Lengyel wrote:
> > On Tue, Mar 29, 2022 at 11:42 AM Jan Beulich <jbeulich@suse.com> wrote:
> >>
> >> On 29.03.2022 16:03, Tamas K Lengyel wrote:
> >>> Add option to the fork memop to enforce a start with an empty p2m.
> >>> Pre-populating special pages to the fork tend to be necessary only
> when setting
> >>> up forks to be fully functional with a toolstack or if the fork makes
> use of
> >>> them in some way. For short-lived forks these pages are optional and
> starting
> >>> with an empty p2m has advantages both in terms of reset performance as
> well as
> >>> easier reasoning about the state of the fork after creation.
> >>
> >> I'm afraid I don't consider this enough of an explanation: Why would
> these
> >> page be optional? Where does the apriori knowledge come from that the
> guest
> >> wouldn't manage to access the vCPU info pages or the APIC access one?
> >
> > By knowing what code you are fuzzing. The code you are fuzzing is
> > clearly marked by harnesses and that's the only code you execute while
> > fuzzing. If you know the code doesn't use them, no need to map them
> > in. They haven't been needed in any of the fuzzing setups we had so
> > far so I'm planning to be this the default when fuzzing.
>
> But isn't it the very nature of what you do fuzzing for that unexpected
> code paths may be taken? By not having in place what is expected to be
> there, yet more unexpected behavior might then result.
>

You don't get totally arbitrary execution, no. If you do then that means
having instability and non-reproducible runs which makes the fuzzing
inefficient. So if you know that the part of code has no reasonable path to
reach code using these pages then you can get rid of them. This is an
option for cases where you can make that call. That's all, just an option.


> Plus - how do you bound how far the guest executes in a single attempt?
>

We use a cpuid or breakpoint to signal where the code reached the end
point. The start point is where the parent got paused (also usually using a
magic cpuid).

Tamas

>

--000000000000baf69d05db6e9cc8
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto"><div><br><br><div class=3D"gmail_quote"><div dir=3D"ltr" =
class=3D"gmail_attr">On Wed, Mar 30, 2022, 2:47 AM Jan Beulich &lt;<a href=
=3D"mailto:jbeulich@suse.com">jbeulich@suse.com</a>&gt; wrote:<br></div><bl=
ockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #=
ccc solid;padding-left:1ex">On 29.03.2022 18:10, Tamas K Lengyel wrote:<br>
&gt; On Tue, Mar 29, 2022 at 11:42 AM Jan Beulich &lt;<a href=3D"mailto:jbe=
ulich@suse.com" target=3D"_blank" rel=3D"noreferrer">jbeulich@suse.com</a>&=
gt; wrote:<br>
&gt;&gt;<br>
&gt;&gt; On 29.03.2022 16:03, Tamas K Lengyel wrote:<br>
&gt;&gt;&gt; Add option to the fork memop to enforce a start with an empty =
p2m.<br>
&gt;&gt;&gt; Pre-populating special pages to the fork tend to be necessary =
only when setting<br>
&gt;&gt;&gt; up forks to be fully functional with a toolstack or if the for=
k makes use of<br>
&gt;&gt;&gt; them in some way. For short-lived forks these pages are option=
al and starting<br>
&gt;&gt;&gt; with an empty p2m has advantages both in terms of reset perfor=
mance as well as<br>
&gt;&gt;&gt; easier reasoning about the state of the fork after creation.<b=
r>
&gt;&gt;<br>
&gt;&gt; I&#39;m afraid I don&#39;t consider this enough of an explanation:=
 Why would these<br>
&gt;&gt; page be optional? Where does the apriori knowledge come from that =
the guest<br>
&gt;&gt; wouldn&#39;t manage to access the vCPU info pages or the APIC acce=
ss one?<br>
&gt; <br>
&gt; By knowing what code you are fuzzing. The code you are fuzzing is<br>
&gt; clearly marked by harnesses and that&#39;s the only code you execute w=
hile<br>
&gt; fuzzing. If you know the code doesn&#39;t use them, no need to map the=
m<br>
&gt; in. They haven&#39;t been needed in any of the fuzzing setups we had s=
o<br>
&gt; far so I&#39;m planning to be this the default when fuzzing.<br>
<br>
But isn&#39;t it the very nature of what you do fuzzing for that unexpected=
<br>
code paths may be taken? By not having in place what is expected to be<br>
there, yet more unexpected behavior might then result.<br></blockquote></di=
v></div><div dir=3D"auto"><br></div><div dir=3D"auto">You don&#39;t get tot=
ally arbitrary execution, no. If you do then that means having instability =
and non-reproducible runs which makes the fuzzing inefficient. So if you kn=
ow that the part of code has no reasonable path to reach code using these p=
ages then you can get rid of them. This is an option for cases where you ca=
n make that call. That&#39;s all, just an option.</div><div dir=3D"auto"><b=
r></div><div dir=3D"auto"><div class=3D"gmail_quote"><blockquote class=3D"g=
mail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-l=
eft:1ex">
<br>
Plus - how do you bound how far the guest executes in a single attempt?<br>=
</blockquote></div></div><div dir=3D"auto"><br></div><div dir=3D"auto">We u=
se a cpuid or breakpoint to signal where the code reached the end point. Th=
e start point is where the parent got paused (also usually using a magic cp=
uid).</div><div dir=3D"auto"><br></div><div dir=3D"auto">Tamas</div><div di=
r=3D"auto"><div class=3D"gmail_quote"><blockquote class=3D"gmail_quote" sty=
le=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
</blockquote></div></div></div>

--000000000000baf69d05db6e9cc8--


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 12:30:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 12:30:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296303.504316 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZXT7-0005WO-Iv; Wed, 30 Mar 2022 12:30:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296303.504316; Wed, 30 Mar 2022 12:30:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZXT7-0005WH-Fs; Wed, 30 Mar 2022 12:30:33 +0000
Received: by outflank-mailman (input) for mailman id 296303;
 Wed, 30 Mar 2022 12:30:32 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wjcS=UJ=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nZXT6-0005WB-LZ
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 12:30:32 +0000
Received: from mail-lf1-x12e.google.com (mail-lf1-x12e.google.com
 [2a00:1450:4864:20::12e])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 30943e81-b025-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 14:30:31 +0200 (CEST)
Received: by mail-lf1-x12e.google.com with SMTP id k21so35525276lfe.4
 for <xen-devel@lists.xenproject.org>; Wed, 30 Mar 2022 05:30:31 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 30943e81-b025-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=YmOTBJmJMJCRQFY61NbiFcHKoqhfmSCI5hmcPcWeNM4=;
        b=iGvyBVtdUwMSXD7DxuirThgqqGv8ZhpQS/jIY//w4jz4jnvsy7nHht4CPCORi8q6QN
         JYiMEoRu6c2liUkWUYyrjt1Rd9xzyurnL1rZVDz8D+c2IulAc9Ai+Anacjtez8A6BqER
         U3Kqerp+bAAtARZS3nb8QKIVVxksPNCC6MLF+CEmXW88myayOthqpi5m1a7NAUuXSsjP
         JNcznoVHUnWvbX1HewnaZbKPSf97nJqlySLaxEttjGWfdhGgGnDG5k+NIW6t/xNFSHNz
         /6DH20FsuSFx5tYX946QlArqGkh5sn2T4KY78+kv4I8mg3BJ8rvLatJOi57YX8DU6vZh
         RYpA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=YmOTBJmJMJCRQFY61NbiFcHKoqhfmSCI5hmcPcWeNM4=;
        b=qw4mU2obIzDrhAYMQuHB1go4wTOcqwF7wGfxWiceF5CZ4DUj1Beg0yBrLdodfWpynX
         impoFwW+8c8+wC/ElkEvmcvYLaNyAsRg4Je+gZsg2llBJLqqJkD/18MVP6i/J7glRXz0
         wInAyPN6NF2KKpyu0hPVmA5Ad/1zv2euhzN+7HNKdKEtqbv6gvs+AG0o+KEweEwDsvIF
         lrrW0Hazw6vK6/He8IJ2GE8xC9iS7KII9obbg8U0pjE+Er0fKVgl3rebuhm7IFbQeOLz
         sbSa+lPxOKWWeQ/9ZRv3EBYog6cGzoB9ppFoh7oI5IpSs/OFYOTu3Up9keNeMS8g8CyE
         Q9xw==
X-Gm-Message-State: AOAM530u4L+xg79TtsquMtxpedq/RL+okIJzYjPN40CRNJIny+1IeCPM
	ie2R2uqJ4OZpb+CBkcpyaN4uZOq3I/UoL9E3k3o=
X-Google-Smtp-Source: ABdhPJysVd5YGoiExi/Y9FNL/piYEIDClyTZzwwFpeUe8wSpHSwpzmugpYzTZUZXpP4IoN8Hn88u3ueZ7QW0J0qh/a8=
X-Received: by 2002:a05:6512:33c2:b0:44a:25e2:25d4 with SMTP id
 d2-20020a05651233c200b0044a25e225d4mr6673674lfg.359.1648643431255; Wed, 30
 Mar 2022 05:30:31 -0700 (PDT)
MIME-Version: 1.0
References: <20220328203622.30961-1-dpsmith@apertussolutions.com>
 <20220328203622.30961-2-dpsmith@apertussolutions.com> <7935e60e-34b1-76be-e5de-56e60f173438@suse.com>
 <a991c32d-4e45-f015-3d99-8552199e8d45@apertussolutions.com> <e711e8c8-5e5d-7443-fbc8-368ccdde533b@suse.com>
In-Reply-To: <e711e8c8-5e5d-7443-fbc8-368ccdde533b@suse.com>
From: Jason Andryuk <jandryuk@gmail.com>
Date: Wed, 30 Mar 2022 08:30:19 -0400
Message-ID: <CAKf6xpt46jFgexwLA=wdUVH-HJWLOEisL6-2cmSLyJsO3QE2eQ@mail.gmail.com>
Subject: Re: [RFC PATCH 1/1] xsm: allows system domains to allocate evtchn
To: Jan Beulich <jbeulich@suse.com>
Cc: "Daniel P. Smith" <dpsmith@apertussolutions.com>, Scott Davis <scott.davis@starlab.io>, 
	Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, 
	Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>, 
	Daniel De Graaf <dgdegra@tycho.nsa.gov>, xen-devel <xen-devel@lists.xenproject.org>
Content-Type: text/plain; charset="UTF-8"

On Wed, Mar 30, 2022 at 2:30 AM Jan Beulich <jbeulich@suse.com> wrote:
>
> On 29.03.2022 20:57, Daniel P. Smith wrote:
> > On 3/29/22 02:43, Jan Beulich wrote:
> >> Similarly I don't see how things would work transparently with a
> >> Flask policy in place. Regardless of you mentioning the restriction,
> >> I think this wants resolving before the patch can go in.
> >
> > To enable the equivalent in flask would require no hypervisor code
> > changes. Instead that would be handled by adding the necessary rules to
> > the appropriate flask policy file(s).
>
> Of course this can be dealt with by adjusting policy file(s), but until
> people do so they'd end up with a perceived regression and/or unexplained
> difference in behavior from running in dummy (or SILO, once also taken
> care of) mode.

This need to change the Flask policy is the crux of my dislike for
making Xen-internal operations go through XSM checks.  It is wrong,
IMO, to require the separate policy to grant xen_t permissions for
proper operation.  I prefer restructuring the code so Xen itself
doesn't have to go through XSM checks since that way Xen itself always
runs properly regardless of the policy.

This is more based on unmap_domain_pirq having an XSM check for an
internal operation.  dom0less, hyperlaunch, & Live Update may all be
niche use cases where requiring a policy change is reasonable.

Regards,
Jason


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 12:53:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 12:53:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296308.504327 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZXpL-0007vb-9Q; Wed, 30 Mar 2022 12:53:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296308.504327; Wed, 30 Mar 2022 12:53:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZXpL-0007vU-6V; Wed, 30 Mar 2022 12:53:31 +0000
Received: by outflank-mailman (input) for mailman id 296308;
 Wed, 30 Mar 2022 12:53:30 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=b505=UJ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZXpK-0007vO-6A
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 12:53:30 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 651050c9-b028-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 14:53:28 +0200 (CEST)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04lp2051.outbound.protection.outlook.com [104.47.13.51]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-30-Ma_TLbvXMra12xNT0dayFQ-1; Wed, 30 Mar 2022 14:53:26 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM0PR04MB6084.eurprd04.prod.outlook.com (2603:10a6:208:13e::23)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.19; Wed, 30 Mar
 2022 12:53:24 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.019; Wed, 30 Mar 2022
 12:53:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 651050c9-b028-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648644808;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=IOmUkeNxIIgohZhz/Gy7/fAY9TJ9E/y/rdRgferuhFc=;
	b=LXn5HyEI3f5MaFSZmg49DfMIESXgvn7OZtcEv0RXgWAVVPyNesXDhfoIEBbSyiRjIbfHJg
	kuEvq8ei/LqX0yzcZZip9unpRzlo9NkSeKRLAn1fZNEqZ790FtXyk1rxk5KtN9EN+dD/kx
	IkxIaP5O1JnALbpQR0wTvsjUAu/A4S0=
X-MC-Unique: Ma_TLbvXMra12xNT0dayFQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=MuGJOeybjQiYHpSjmtI7MXh50gRGjhNFDS72WXXDt48n4x29JrxaIa4V8AqSu5GGZNylt2tsR4QRl7fI8lc8lcP4srtmZqW9po9muSW3bKY6jrQwwJzpztrk4DcB5MH/kzLOOVItO4A6aoQlJ9MW3B4ChOPb12sYwT6eg/orqTH6DPeNdztomoYukE7wJ26aRBZpmScp7TcxIrG7dQyuDCKI2xGP+vSw9xgPOtpB/JmcFn+bqVbMB9bLCKsrdJ7g7GZYpq3Vlnh7p6OIieOJNlyLPZnaN9uIFOe7kcD6DIaUqmXZqyoFg29zqtKP3xRpquey+f/6zLd25ZoVlGNdKQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=IOmUkeNxIIgohZhz/Gy7/fAY9TJ9E/y/rdRgferuhFc=;
 b=b3Eovh3rUwg5M0nPpJtg6Aef4Vw50ez27ywRcwOMBQK8I4QBhimDAwk+oN+V+LdMhJpffZV2cuVu9tZvQUgvCQRHHZ/bpQ16133ox50IgR5Sc34M6qqQRkmif0ecRK+on2q+BJjotpXOVB/LkGu1XeqrQAUGDbxfc25IdyplfNaAqeu0VR6iMV5wgUQvtjwu6t+pTq+1kbHDgNQeiThRmk1m4BIOL8MerrwmJY1g6jpZQR121hMjbEp1nyZfBJhhKmgaf8RMA7/FwhdwpS3qEmISFO8kQW6PJL4C0gNJ1cA+K4U7obHRqluTHZurqIcHp1054A72LFpMVBvMeX4dkw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <55252ad6-021b-b96d-ae91-4ebbe4046dbb@suse.com>
Date: Wed, 30 Mar 2022 14:53:22 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2 2/2] xen: Populate xen.lds.h and make use of its macros
Content-Language: en-US
To: Michal Orzel <michal.orzel@arm.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 xen-devel@lists.xenproject.org, Julien Grall <julien@xen.org>
References: <20220322080233.53134-1-michal.orzel@arm.com>
 <20220322080233.53134-3-michal.orzel@arm.com>
 <2940b4c8-5d44-695e-4550-0a32c3a4c053@xen.org>
 <d5bccf50-c74a-40e6-843e-3ad682647efb@arm.com>
 <5121de30-644f-8a1f-ff1a-29c4d2ee7f0f@xen.org>
 <63a680c6-0086-230b-dbbd-dfe63609f9bc@suse.com>
 <b0b49926-9a70-37f1-43d4-ac4e852198ba@xen.org>
 <1013a14b-a45b-f37f-b2e0-e63b186a2956@suse.com>
 <ffa0e581-6a32-5c3c-7e63-acd5086c6822@arm.com>
 <e3a045d5-34d3-af73-89a7-7c306e7f8de4@suse.com>
 <168143f7-11e3-1acb-2de1-dba1a0db4ad3@arm.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <168143f7-11e3-1acb-2de1-dba1a0db4ad3@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P194CA0049.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:209:84::26) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 4422bb08-ec0d-4996-98e2-08da124c46e7
X-MS-TrafficTypeDiagnostic: AM0PR04MB6084:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB6084C8C63779A8EF61378940B31F9@AM0PR04MB6084.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(8936002)(66556008)(66946007)(66476007)(4326008)(8676002)(316002)(54906003)(31686004)(6486002)(36756003)(7416002)(5660300002)(508600001)(6916009)(53546011)(186003)(26005)(6512007)(6506007)(2906002)(86362001)(31696002)(38100700002)(2616005)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?L3Y2bjVCeFY3c2JvNmpQaXNtNHU2elJTeTl6NXUxUjF4U3c1UFNGejJCQnJV?=
 =?utf-8?B?TTVlSmYrakt5a0RwWCs4TUdHcnNScDk2RVM5TXhwTlprMUxnUFdFb2dsazd2?=
 =?utf-8?B?ZFJTbmNmY3dzKzdXQmJkQkE2TFpYcHVDTTlXQkR5NnNmL01zOUtpbldwRkxW?=
 =?utf-8?B?OXhENkdUZEtoTDBqd1BLaUI0bTdBYXVXWWs3OUNkQTF4a0loVy84cnNvZlJF?=
 =?utf-8?B?cTVqRkx5V1VwaHY3V20vdGVQSGgwV0g5WWx4NXZ2UEpjTkJFb2V3bG5PWWho?=
 =?utf-8?B?NENVenFlYmUrUUlRcnAzV1hiTzlQWWw1ZE1Hai82bllmWWpTcjI1UXRGMW5V?=
 =?utf-8?B?OTFZRS9WNDdtbUN0TVJsbTBWOENNNmVaVXoydkdoMFdRMUUyVXAyWjB6L2k3?=
 =?utf-8?B?Zk9vS2JucnJ2N1hSeUF5S3o0RlNhbnAzTUU5ZVc3V09Fekt2N0ZXZkZuSU1X?=
 =?utf-8?B?QVRBa3ZnUHVDRHZXVndEWTFHU1FhaldVbTdjY0h4Ukh4YnEzdzFMYkRXRDdk?=
 =?utf-8?B?NTV6Ykgyb2ZsVncvUVVCYW1Ka0d5S1lPdEpvMURaRGNEUGNvZHcxRVZTa0xJ?=
 =?utf-8?B?S3BTWThvcXBiOW1TK21TaXVIWHVXUjJlTEp3ZlFCaW5rMm5IYlVMTklGNXFR?=
 =?utf-8?B?N1pLdVFWb0JNbHFzTVdnYlppMW81OHNVNDRGcExXaVpYcjJTR1k4YXFXRlBR?=
 =?utf-8?B?QTZVZXdSUlk3dUwzSzRvTzh0WXFKTVIvOUVHejhWTld2dEV3MTJ1Tks1elFn?=
 =?utf-8?B?dTdpeGVmTWZjSzhHTGx4Q0dwR1YzeVBUMCs5UWRMWklhY01URldydzk3MlU3?=
 =?utf-8?B?aDhjZzVQWXJLT1F4aCtidUwxd0Qwa1N4aVp0VTh1ZVNlOXRiRW1NSUdmeE13?=
 =?utf-8?B?dlpMV2tRY0hEemhLYkpXY2Z2U3N1elRmdWNpcEtjUmlYRzFLUW9YRCtoa2hh?=
 =?utf-8?B?Q2dBS0p2MG45NkFoWlg5aDFqakJSS2tHVUh0SGZ1eHZFc3hEWkhVYjdQbko3?=
 =?utf-8?B?UktFdG9ReXN5ZDRYb3piTzN4Y0VHTTlZOVVFN1Naby92TW5zQkc1U29ZNFdO?=
 =?utf-8?B?RGdlM0d6T0R5OXNLZVRWMXpVWm1qaXY5RjBmUmNnNlUzMXloNXNPcVdaZDBi?=
 =?utf-8?B?cGRLTVYxTDBuc0FPRDBjUDJmZk9kTmFrRldNNEV0REZKS0ZDeVBRd01xSnZV?=
 =?utf-8?B?elM3TlpZT2pzR2FUWVBydmM1cHozTUpEcWo5aFR1U0habFhzbjJOdzdrMUxG?=
 =?utf-8?B?TXBMVXFDblNUdWdETUFYMUMydlZCVkM4Q2tkdnNYVk41QWkydE9VMVlCNkND?=
 =?utf-8?B?dzVLNEgzREptSmsxY0RjUUVNdG5OdGxweGd2WXc5a0FPbmZKaFoveXEzVlJ2?=
 =?utf-8?B?eVZsRGNjSWFYL2dsL3Fta1JqbW9KZnlPcHUxcXF5L2xudjZMMEJBSGdrd3ZB?=
 =?utf-8?B?NXNPc1hLOE5KOG5CT2NOZ3UxTXdPbWp0SVpoYmQvcE1xcXJuUXhqbllYZy9F?=
 =?utf-8?B?a1JPRTgzbVo3TktkaDhBclUzYkd1dExUdWc2aWhuNTk2cEU1STIyTEs2bW9N?=
 =?utf-8?B?Zk5uT1IzWHNYWnBhUFE1WS92N0VQZTRVQXRWa3hGOHdsNmdDTUdyQnQxVnRy?=
 =?utf-8?B?UHVMMVhWWkUxUm9hK0hmZlc2VUl3dVc3S05vZXlFS2twMUx2Sm13cVlLWmd6?=
 =?utf-8?B?TUdiN0pUcDFTN3dtekpwTTdWa2dmZHRnaWZTTmN6NE5DcGJpVnRCUEd0bVVT?=
 =?utf-8?B?eHZ5dVZxK3dGY0JFRjNiRHNjMkkzdmNmeC9FQ1ZXdlhiU0QvcXpUTDRuT3Zz?=
 =?utf-8?B?dHF3RmY5YzNVeE0welMyZThZNjJobUdGbFkrV1gweUhCMFZCTFM4L1NiUCtj?=
 =?utf-8?B?bk9sc0lKdWVyRS9ramY5YXVkTnY4QWpIaGFRc1JaeUZ1d282ZFcxZnRWMEd3?=
 =?utf-8?B?UDdiVXBYRWx0NHhGd1NEOW1LUjRhT1pyaWxNK3NDSzU2NWxpano3WFg0MzF0?=
 =?utf-8?B?T295OVRrWkZWK2gyOE1PaHJHMjNnT3RZRThUSEQxWlRpd0k4YithTWVoa2Rn?=
 =?utf-8?B?WHVSUWlpaEZ1MEdUQmw3YTlwd1BScW13c29hMmUrK29nOUN0L05NMXBlZ0s0?=
 =?utf-8?B?QXVZV3hyb0dBWksyVUE1OWgxazJZSjZ2L3Z2NDBKTFB2L25iNkhzMnhURHhj?=
 =?utf-8?B?RFNsUnBQNWxCY3IveTYraUVzQk9tNDh4Z0JaNEkraVRjTkJlaGVGNmpGeFFr?=
 =?utf-8?B?MW1Hb1R6dnBqTG5TRDN0Z2NVdGpXY2NlTUQvNlRpZTM2L1YzMDBYeHY1Q2VG?=
 =?utf-8?B?ejBWaWNaWUNJaVI1ZldLZEpIb3JPWWtIUjltM2x0NlJucVNJSFQrZz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4422bb08-ec0d-4996-98e2-08da124c46e7
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 12:53:24.4306
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: JwNu7eSi4aIVOX2um97GYYNIZRwCgiw6H2E9HgQELGX9Ppd6SkIGHVT4VtOcyFEnCwD5JVBynotGjGdKxfL9Jg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB6084

On 30.03.2022 14:13, Michal Orzel wrote:
> On 30.03.2022 13:57, Jan Beulich wrote:
>> On 30.03.2022 13:04, Michal Orzel wrote:
>>> On 30.03.2022 12:42, Jan Beulich wrote:
>>>> On 30.03.2022 12:32, Julien Grall wrote:
>>>>> Renaming to PE_COFF may help to avoid the confusion with CONFIG_EFI. 
>>>>> That said, it would possibly make more difficult to associate the flag 
>>>>> with "linking an EFI binary".
>>>>
>>>> Indeed. And EFI_PE_COFF is getting a little unwieldy for my taste.
>>>>
>>>>> I think some documentaion about the define EFI would be help so there 
>>>>> are no more confusion between CONFIG_EFI/EFI. But I am not sure where to 
>>>>> put it. Maybe at the top of the header?
>>>>
>>>> That's perhaps the best place, yes.
>>>>
>>> In this case how about the following comment at the top of xen.lds.h:
>>>
>>> "To avoid any confusion about EFI macro used in this header vs EFI support,
>>> the former is used when linking a native EFI (i.e. PE/COFF) binary, whereas
>>> the latter means support for generating EFI binary.
>>
>> No, that's the case on Arm only. As Julien suggested, it is perhaps best
>> to explain the difference between EFI and CONFIG_EFI, without going into
>> arch specifics.
> Could you please tell me what you are reffering to as there is no such identifier
> in Xen (as opposed to Linux) like CONFIG_EFI ?

Let's call it a "virtual" CONFIG_EFI then; I think we really should have
such an option. But yes, if you don't like referring to such a virtual
option, then describing what is meant verbally is certainly going to be
fine.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 13:06:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 13:06:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296314.504338 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZY1e-000122-9I; Wed, 30 Mar 2022 13:06:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296314.504338; Wed, 30 Mar 2022 13:06:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZY1e-00011v-6N; Wed, 30 Mar 2022 13:06:14 +0000
Received: by outflank-mailman (input) for mailman id 296314;
 Wed, 30 Mar 2022 13:06:13 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=L21/=UJ=apertussolutions.com=dpsmith@srs-se1.protection.inumbo.net>)
 id 1nZY1c-00011p-UJ
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 13:06:13 +0000
Received: from sender4-of-o51.zoho.com (sender4-of-o51.zoho.com
 [136.143.188.51]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 298b532a-b02a-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 15:06:09 +0200 (CEST)
Received: from [10.10.1.138] (static-72-81-132-2.bltmmd.fios.verizon.net
 [72.81.132.2]) by mx.zohomail.com
 with SMTPS id 1648645551016506.05686400761556;
 Wed, 30 Mar 2022 06:05:51 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 298b532a-b02a-11ec-a405-831a346695d4
ARC-Seal: i=1; a=rsa-sha256; t=1648645564; cv=none; 
	d=zohomail.com; s=zohoarc; 
	b=nXqD72tNIieKIJnJ+jJfnVFBS/+HTVnM/t5eCHxT8+29GGJSWgE08uWeDoiHBINyPwOMjPqWWXMOpljT3b/nVr6lXaViIUrJTyp8ISAgC/jqsXCYPRiRbYQ6nXek5Lt/3d+t1A6ULgaujDx2KEEDrW+crL7ZMjXM3BBDW/J9MoM=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; 
	t=1648645564; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; 
	bh=bUJmJCGEdM2uqDh5Muuv5gI6Wx4z05uTf9ucNEM+z7o=; 
	b=EFP7NIwMh4s0TUEQMEAPD5+dWlMzSV5rX21Uph3DPPnbjHBQMp5H1rNhFNx0TApazozBk/WQEvT5IBUuIwRv4USEJ19SmZF46kEhvbbI/VpQwiU/KvIzk4Ca4P01xDWfL1Bz4QgCklle3cKgxMSvbw01jiC/vav4iKNHX2BlCPQ=
ARC-Authentication-Results: i=1; mx.zohomail.com;
	dkim=pass  header.i=apertussolutions.com;
	spf=pass  smtp.mailfrom=dpsmith@apertussolutions.com;
	dmarc=pass header.from=<dpsmith@apertussolutions.com>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1648645564;
	s=zoho; d=apertussolutions.com; i=dpsmith@apertussolutions.com;
	h=Message-ID:Date:MIME-Version:To:To:Cc:Cc:References:From:From:Subject:Subject:In-Reply-To:Content-Type:Content-Transfer-Encoding:Message-Id:Reply-To;
	bh=bUJmJCGEdM2uqDh5Muuv5gI6Wx4z05uTf9ucNEM+z7o=;
	b=QsUkznn5N540wvPWYnSLZMt0Qc2gh4CKjb7uqK8pHFDL7aC/kb3aJgOsz5P8dfxl
	vZg+A2zeLWKmLkPsyzZ+vs9jTPb/81InPwWwQjvTXHXm9iRct6tJ1GruH/nyu7ujAd3
	QpEPpNqfe01eNlEPY5qh4dR41klqsqSe+WyMCZ2g=
Message-ID: <9b01dce0-961b-fbe7-8208-444a2785f055@apertussolutions.com>
Date: Wed, 30 Mar 2022 09:05:32 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: Julien Grall <julien@xen.org>, Jan Beulich <jbeulich@suse.com>
Cc: scott.davis@starlab.io, Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Daniel De Graaf <dgdegra@tycho.nsa.gov>, xen-devel@lists.xenproject.org,
 Jason Andryuk <jandryuk@gmail.com>
References: <20220328203622.30961-1-dpsmith@apertussolutions.com>
 <20220328203622.30961-2-dpsmith@apertussolutions.com>
 <7935e60e-34b1-76be-e5de-56e60f173438@suse.com>
 <a991c32d-4e45-f015-3d99-8552199e8d45@apertussolutions.com>
 <edecda2d-bf81-c722-a9ef-42461da66319@xen.org>
From: "Daniel P. Smith" <dpsmith@apertussolutions.com>
Subject: Re: [RFC PATCH 1/1] xsm: allows system domains to allocate evtchn
In-Reply-To: <edecda2d-bf81-c722-a9ef-42461da66319@xen.org>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ZohoMailClient: External

Hey Julien,

On 3/29/22 17:57, Julien Grall wrote:
> Hi Daniel,
> 
> On 29/03/2022 19:57, Daniel P. Smith wrote:
>> On 3/29/22 02:43, Jan Beulich wrote:
>>> On 28.03.2022 22:36, Daniel P. Smith wrote:
>>>> During domain construction under dom0less and hyperlaunch it is
>>>> necessary to
>>>> allocate at least the event channel for xenstore and potentially the
>>>> event
>>>> channel for the core console. When dom0less and hyperlaunch are
>>>> doing their
>>>> construction logic they are executing under the idle domain context.
>>>> The idle
>>>> domain is not a privileged domain, it is not the target domain, and
>>>> as a result
>>>> under the current default XSM policy is not allowed to allocate the
>>>> event
>>>> channel.
>>>
>>> I appreciate the change is only needed there right now, but it feels
>>> inconsistent. _If_ it is to remain that way, at least a comment needs
>>> to be put in xsm_evtchn_unbound() making clear why this is a special
>>> case, and hence clarifying to people what the approximate conditions
>>> are to have such also put elsewhere. But imo it would be better to
>>> make the adjustment right in xsm_default_action(), without touching
>>> event_channel.c at all. Iirc altering xsm_default_action() was
>>> discussed before, but I don't recall particular reasons speaking
>>> against that approach.
>>
>> By inconsistent, I take it you mean this is first place within an XSM
>> hook where an access decision is based on the current domain being a
>> system domain? I do agree and would add a comment to the change in the
>> XSM hook in a non-RFC version of the patch.
>>
>> As to moving the check down into xsm_default_action(), the concern I
>> have with doing so is that this would then make every XSM check succeed
>> if `current->domain` is a system domain. Doing so would require a review
>> of every function which has an XSM hoook to evaluate every invocation of
>> those functions that,
>>    1. is there ever a time when current->domain may be a system domain
>>    2. if so,
>>      a. is the invocation on behalf of the system domain
>>      b. or is the invocation on behalf of a non-system domain
>>
>> If there is any instance of 2b, then an inadvertent privilege escalation
>> can occur on that path. For evtchn_alloc_unbound() I verified the only
>> place, besides the new hyperlaunch calls, it is invoked is in the evtchn
>> hypercall handler, where current should be pointing at the domain that
>> made the hypercall.
> Auditing existing calls is somewhat easy. The trouble are for new calls.
> I would say they are unlikely, but we would need to rely on the
> reviewers to spot any misuse. So this is a bit risky.
> 
> I am also a bit worry that we would end up to convert a lot of
> XSM_TARGET to XSM_HOOK (Note I have Live-Update in mind). This would
> make more difficult to figure what would the XSM calls allows without
> looking at the helper.

This approach was not mean to be the long term solution but to deal with
the immediate need as I agree doing this long term would make the
default policy very nuanced.

> I quite like the proposal from Roger. If we define two helpers (e.g.
> xsm_{enable, disable}_build_domain()), we could elevate the privilege
> for the idle domain for a short period of time (this could be restricted
> to when the dummy policy is used).

This is where I was initially going but I am hesitant to change the XSM
API in what might be temporary API calls which have a good chance will
be displaced. That being said, and it does seem like there is more in
favor of it, if the priv escalation is the overall preferred approach I
would still agree and prefer it be done in the XSM API so any usage is
more easily tracked.

v/r,
dps


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 13:19:57 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 13:19:57 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296321.504355 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZYEr-0002bY-IG; Wed, 30 Mar 2022 13:19:53 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296321.504355; Wed, 30 Mar 2022 13:19:53 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZYEr-0002bR-Eb; Wed, 30 Mar 2022 13:19:53 +0000
Received: by outflank-mailman (input) for mailman id 296321;
 Wed, 30 Mar 2022 13:19:52 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=x//1=UJ=tklengyel.com=tamas@srs-se1.protection.inumbo.net>)
 id 1nZYEq-0002bA-6o
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 13:19:52 +0000
Received: from MTA-10-3.privateemail.com (mta-10-3.privateemail.com
 [198.54.127.62]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 137f9892-b02c-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 15:19:50 +0200 (CEST)
Received: from mta-10.privateemail.com (localhost [127.0.0.1])
 by mta-10.privateemail.com (Postfix) with ESMTP id C6F8818000AB
 for <xen-devel@lists.xenproject.org>; Wed, 30 Mar 2022 09:19:48 -0400 (EDT)
Received: from mail-ot1-f42.google.com (unknown [10.20.151.184])
 by mta-10.privateemail.com (Postfix) with ESMTPA id A0BDD18000A2
 for <xen-devel@lists.xenproject.org>; Wed, 30 Mar 2022 09:19:48 -0400 (EDT)
Received: by mail-ot1-f42.google.com with SMTP id
 i11-20020a9d4a8b000000b005cda3b9754aso14879720otf.12
 for <xen-devel@lists.xenproject.org>; Wed, 30 Mar 2022 06:19:48 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 137f9892-b02c-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648646388;
	bh=KyUcjj5s5AMJWBEW/NACnpr0AVSd/qf/iSiPQnkUb3U=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=bR2veZsjV4eiiRlvFrROYyyKoHmm2T57xQZ9Lce43ZOilzedw24yRHo+J4qCGVIeq
	 E7I43OWtw2qgs6NW1+9RSdkTItCsiMk4i1OZ9tPc9fqmRrfyisak992LSvpeae3QTy
	 LSdLj0Wl5qD43CqtA6x+4CeS8jxzCIuHc5jtzcGmegan9lPBytIMyAUiQ0JMb4H7RU
	 m+vbiQ2tYVG7SYFOUZRoEQ3DqUW5xSeC7xaj4+EG1iJeLilQa+flC3kll75Z2eryth
	 mIJJxPsO3Xup39PLBnepw500nuXX60av9ootx+TcFgbjW07ZkTZLnOtU62IhNXW6+O
	 EccgMsi0aoiNQ==
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648646388;
	bh=KyUcjj5s5AMJWBEW/NACnpr0AVSd/qf/iSiPQnkUb3U=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=bR2veZsjV4eiiRlvFrROYyyKoHmm2T57xQZ9Lce43ZOilzedw24yRHo+J4qCGVIeq
	 E7I43OWtw2qgs6NW1+9RSdkTItCsiMk4i1OZ9tPc9fqmRrfyisak992LSvpeae3QTy
	 LSdLj0Wl5qD43CqtA6x+4CeS8jxzCIuHc5jtzcGmegan9lPBytIMyAUiQ0JMb4H7RU
	 m+vbiQ2tYVG7SYFOUZRoEQ3DqUW5xSeC7xaj4+EG1iJeLilQa+flC3kll75Z2eryth
	 mIJJxPsO3Xup39PLBnepw500nuXX60av9ootx+TcFgbjW07ZkTZLnOtU62IhNXW6+O
	 EccgMsi0aoiNQ==
X-Gm-Message-State: AOAM532cIGrO6xExO4PNlftFp1mgfX3m9CWMkLa33yGmOOFx413ndKDp
	LKS/mBZXxj6G5UAmF09HdYHFQcXpSdJ/YLrrulc=
X-Google-Smtp-Source: ABdhPJyFBzYJem6HZml9Sf9wKk8QbAQPaeDwJMB39sR/SV+ykCz/kF3SW0R0dmUwLwVEjNO+FCxJKGAAQ4vlw9rfjIw=
X-Received: by 2002:a05:6830:2b25:b0:5ce:bc2:f6ce with SMTP id
 l37-20020a0568302b2500b005ce0bc2f6cemr466652otv.157.1648646387784; Wed, 30
 Mar 2022 06:19:47 -0700 (PDT)
MIME-Version: 1.0
References: <ab6bb88e90e5649c60e08a1680b3a2390441031b.1648561546.git.tamas.lengyel@intel.com>
 <3ebadf898bf9e165d657a31c0aa98bbd300ffcb2.1648561546.git.tamas.lengyel@intel.com>
 <bdfbfe3e-66c5-3f99-8f50-16f38bfa78d1@suse.com>
In-Reply-To: <bdfbfe3e-66c5-3f99-8f50-16f38bfa78d1@suse.com>
From: Tamas K Lengyel <tamas@tklengyel.com>
Date: Wed, 30 Mar 2022 09:19:36 -0400
X-Gmail-Original-Message-ID: <CABfawhmxeK0RhXPzg9aqE8iytyNr72jekJ_FN9qWE1b32gxTkg@mail.gmail.com>
Message-ID: <CABfawhmxeK0RhXPzg9aqE8iytyNr72jekJ_FN9qWE1b32gxTkg@mail.gmail.com>
Subject: Re: [PATCH v2 3/3] x86/mem_sharing: make fork_reset more configurable
To: Jan Beulich <jbeulich@suse.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>, Wei Liu <wl@xen.org>, 
	Anthony PERARD <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, 
	Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, 
	Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, 
	=?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>, 
	Alexandru Isaila <aisaila@bitdefender.com>, Petre Pircalabu <ppircalabu@bitdefender.com>, 
	Xen-devel <xen-devel@lists.xenproject.org>
Content-Type: multipart/alternative; boundary="0000000000004ddfa905db6f66d9"
X-Virus-Scanned: ClamAV using ClamSMTP

--0000000000004ddfa905db6f66d9
Content-Type: text/plain; charset="UTF-8"

On Wed, Mar 30, 2022, 6:31 AM Jan Beulich <jbeulich@suse.com> wrote:

> On 29.03.2022 16:03, Tamas K Lengyel wrote:
> > --- a/xen/arch/x86/include/asm/mem_sharing.h
> > +++ b/xen/arch/x86/include/asm/mem_sharing.h
> > @@ -85,6 +85,9 @@ static inline bool mem_sharing_is_fork(const struct
> domain *d)
> >  int mem_sharing_fork_page(struct domain *d, gfn_t gfn,
> >                            bool unsharing);
> >
> > +int mem_sharing_fork_reset(struct domain *d, bool reset_state,
> > +                           bool reset_memory);
>
> Please avoid passing multiple booleans, even more so when you already
> derive them from a single "flags" value. This would likely be easiest
> if you re-used the VM_EVENT_FLAG_RESET_FORK_* values also for
> XENMEM_FORK_RESET_*, with suitable BUILD_BUG_ON() put in place to
> prove they're the same.
>

I don't see why that would be an improvement in any way. I also don't want
to make VM_EVENT flags tied to the XENMEM ones as they are separate
interfaces. I rather just drop the changes to the XENMEM interface then do
that.


> > --- a/xen/arch/x86/mm/mem_sharing.c
> > +++ b/xen/arch/x86/mm/mem_sharing.c
> > @@ -1890,15 +1890,24 @@ static int fork(struct domain *cd, struct domain
> *d, uint16_t flags)
> >   * footprints the hypercall continuation should be implemented (or if
> this
> >   * feature needs to be become "stable").
> >   */
> > -static int mem_sharing_fork_reset(struct domain *d)
> > +int mem_sharing_fork_reset(struct domain *d, bool reset_state,
> > +                           bool reset_memory)
> >  {
> > -    int rc;
> > +    int rc = 0;
> >      struct domain *pd = d->parent;
> >      struct p2m_domain *p2m = p2m_get_hostp2m(d);
> >      struct page_info *page, *tmp;
> >
> > +    ASSERT(reset_state || reset_memory);
> > +
> > +    if ( !d->arch.hvm.mem_sharing.fork_complete )
> > +        return -ENOSYS;
>
> Either EOPNOTSUPP (in case you think this operation could make sense
> to implement for incomplete forks) or e.g. EINVAL, but please not
> ENOSYS.
>
> > @@ -394,6 +399,16 @@ static int vm_event_resume(struct domain *d, struct
> vm_event_domain *ved)
> >              if ( rsp.reason == VM_EVENT_REASON_MEM_PAGING )
> >                  p2m_mem_paging_resume(d, &rsp);
> >  #endif
> > +#ifdef CONFIG_MEM_SHARING
> > +            if ( mem_sharing_is_fork(d) )
> > +            {
> > +                bool reset_state = rsp.flags &
> VM_EVENT_FLAG_RESET_FORK_STATE;
> > +                bool reset_mem = rsp.flags &
> VM_EVENT_FLAG_RESET_FORK_MEMORY;
> > +
> > +                if ( reset_state || reset_mem )
> > +                    ASSERT(!mem_sharing_fork_reset(d, reset_state,
> reset_mem));
> > +            }
> > +#endif
>
> Should the two flags be rejected in the "else" case, rather than
> being silently ignored?
>

What do you mean by rejected? There is no feasible "rejection" that could
be done in this path other then skipping it.


> > --- a/xen/include/public/memory.h
> > +++ b/xen/include/public/memory.h
> > @@ -541,12 +541,14 @@ struct xen_mem_sharing_op {
> >                  uint32_t gref;     /* IN: gref to debug         */
> >              } u;
> >          } debug;
> > -        struct mem_sharing_op_fork {      /* OP_FORK */
> > +        struct mem_sharing_op_fork {      /* OP_FORK/_RESET */
>
> I consider the notation in the comment misleading - I would read it to
> mean OP_FORK and OP_RESET, supported by the earlier
> OP_SHARE/ADD_PHYSMAP. Commonly we write OP_FORK{,_RESET} in such cases.


Ack.

Tamas

>

--0000000000004ddfa905db6f66d9
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto"><div><br><br><div class=3D"gmail_quote"><div dir=3D"ltr" =
class=3D"gmail_attr">On Wed, Mar 30, 2022, 6:31 AM Jan Beulich &lt;<a href=
=3D"mailto:jbeulich@suse.com">jbeulich@suse.com</a>&gt; wrote:<br></div><bl=
ockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #=
ccc solid;padding-left:1ex">On 29.03.2022 16:03, Tamas K Lengyel wrote:<br>
&gt; --- a/xen/arch/x86/include/asm/mem_sharing.h<br>
&gt; +++ b/xen/arch/x86/include/asm/mem_sharing.h<br>
&gt; @@ -85,6 +85,9 @@ static inline bool mem_sharing_is_fork(const struct =
domain *d)<br>
&gt;=C2=A0 int mem_sharing_fork_page(struct domain *d, gfn_t gfn,<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 bool unsharing);<br>
&gt;=C2=A0 <br>
&gt; +int mem_sharing_fork_reset(struct domain *d, bool reset_state,<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 =C2=A0 =C2=A0 =C2=A0 =C2=A0bool reset_memory);<br>
<br>
Please avoid passing multiple booleans, even more so when you already<br>
derive them from a single &quot;flags&quot; value. This would likely be eas=
iest<br>
if you re-used the VM_EVENT_FLAG_RESET_FORK_* values also for<br>
XENMEM_FORK_RESET_*, with suitable BUILD_BUG_ON() put in place to<br>
prove they&#39;re the same.<br></blockquote></div></div><div dir=3D"auto"><=
br></div><div dir=3D"auto">I don&#39;t see why that would be an improvement=
 in any way. I also don&#39;t want to make VM_EVENT flags tied to the XENME=
M ones as they are separate interfaces. I rather just drop the changes to t=
he XENMEM interface then do that.</div><div dir=3D"auto"><br></div><div dir=
=3D"auto"><div class=3D"gmail_quote"><blockquote class=3D"gmail_quote" styl=
e=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<br>
&gt; --- a/xen/arch/x86/mm/mem_sharing.c<br>
&gt; +++ b/xen/arch/x86/mm/mem_sharing.c<br>
&gt; @@ -1890,15 +1890,24 @@ static int fork(struct domain *cd, struct doma=
in *d, uint16_t flags)<br>
&gt;=C2=A0 =C2=A0* footprints the hypercall continuation should be implemen=
ted (or if this<br>
&gt;=C2=A0 =C2=A0* feature needs to be become &quot;stable&quot;).<br>
&gt;=C2=A0 =C2=A0*/<br>
&gt; -static int mem_sharing_fork_reset(struct domain *d)<br>
&gt; +int mem_sharing_fork_reset(struct domain *d, bool reset_state,<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 =C2=A0 =C2=A0 =C2=A0 =C2=A0bool reset_memory)<br>
&gt;=C2=A0 {<br>
&gt; -=C2=A0 =C2=A0 int rc;<br>
&gt; +=C2=A0 =C2=A0 int rc =3D 0;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 struct domain *pd =3D d-&gt;parent;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 struct p2m_domain *p2m =3D p2m_get_hostp2m(d);<br>
&gt;=C2=A0 =C2=A0 =C2=A0 struct page_info *page, *tmp;<br>
&gt;=C2=A0 <br>
&gt; +=C2=A0 =C2=A0 ASSERT(reset_state || reset_memory);<br>
&gt; +<br>
&gt; +=C2=A0 =C2=A0 if ( !d-&gt;arch.hvm.mem_sharing.fork_complete )<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 return -ENOSYS;<br>
<br>
Either EOPNOTSUPP (in case you think this operation could make sense<br>
to implement for incomplete forks) or e.g. EINVAL, but please not<br>
ENOSYS.<br>
<br>
&gt; @@ -394,6 +399,16 @@ static int vm_event_resume(struct domain *d, stru=
ct vm_event_domain *ved)<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 if ( rsp.reason =3D=3D=
 VM_EVENT_REASON_MEM_PAGING )<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 p2m_mem_=
paging_resume(d, &amp;rsp);<br>
&gt;=C2=A0 #endif<br>
&gt; +#ifdef CONFIG_MEM_SHARING<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 if ( mem_sharing_is_fork(d)=
 )<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 {<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 bool reset_st=
ate =3D rsp.flags &amp; VM_EVENT_FLAG_RESET_FORK_STATE;<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 bool reset_me=
m =3D rsp.flags &amp; VM_EVENT_FLAG_RESET_FORK_MEMORY;<br>
&gt; +<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 if ( reset_st=
ate || reset_mem )<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0=
 ASSERT(!mem_sharing_fork_reset(d, reset_state, reset_mem));<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 }<br>
&gt; +#endif<br>
<br>
Should the two flags be rejected in the &quot;else&quot; case, rather than<=
br>
being silently ignored?<br></blockquote></div></div><div dir=3D"auto"><br><=
/div><div dir=3D"auto">What do you mean by rejected? There is no feasible &=
quot;rejection&quot; that could be done in this path other then skipping it=
.</div><div dir=3D"auto"><br></div><div dir=3D"auto"><div class=3D"gmail_qu=
ote"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-le=
ft:1px #ccc solid;padding-left:1ex">
<br>
&gt; --- a/xen/include/public/memory.h<br>
&gt; +++ b/xen/include/public/memory.h<br>
&gt; @@ -541,12 +541,14 @@ struct xen_mem_sharing_op {<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 uint32_t=
 gref;=C2=A0 =C2=A0 =C2=A0/* IN: gref to debug=C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0*/<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 } u;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 } debug;<br>
&gt; -=C2=A0 =C2=A0 =C2=A0 =C2=A0 struct mem_sharing_op_fork {=C2=A0 =C2=A0=
 =C2=A0 /* OP_FORK */<br>
&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 struct mem_sharing_op_fork {=C2=A0 =C2=A0=
 =C2=A0 /* OP_FORK/_RESET */<br>
<br>
I consider the notation in the comment misleading - I would read it to<br>
mean OP_FORK and OP_RESET, supported by the earlier<br>
OP_SHARE/ADD_PHYSMAP. Commonly we write OP_FORK{,_RESET} in such cases.</bl=
ockquote></div></div><div dir=3D"auto"><br></div><div dir=3D"auto">Ack.</di=
v><div dir=3D"auto"><br></div><div dir=3D"auto">Tamas</div><div dir=3D"auto=
"><div class=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=3D"mar=
gin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
</blockquote></div></div></div>

--0000000000004ddfa905db6f66d9--


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 13:25:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 13:25:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296327.504366 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZYJs-0004AL-8W; Wed, 30 Mar 2022 13:25:04 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296327.504366; Wed, 30 Mar 2022 13:25:04 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZYJs-0004AE-5N; Wed, 30 Mar 2022 13:25:04 +0000
Received: by outflank-mailman (input) for mailman id 296327;
 Wed, 30 Mar 2022 13:25:02 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=5iAL=UJ=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nZYJq-0004A8-Qs
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 13:25:02 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTP
 id ccdabf52-b02c-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 15:25:00 +0200 (CEST)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id D6BE323A;
 Wed, 30 Mar 2022 06:24:59 -0700 (PDT)
Received: from [10.57.8.78] (unknown [10.57.8.78])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 824A33F73B;
 Wed, 30 Mar 2022 06:24:57 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ccdabf52-b02c-11ec-8fbc-03012f2f19d4
Message-ID: <d521854c-9aab-020d-75d6-ca085afa642a@arm.com>
Date: Wed, 30 Mar 2022 15:24:47 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.5.0
Subject: Re: [PATCH v2 2/2] xen: Populate xen.lds.h and make use of its macros
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 xen-devel@lists.xenproject.org, Julien Grall <julien@xen.org>
References: <20220322080233.53134-1-michal.orzel@arm.com>
 <20220322080233.53134-3-michal.orzel@arm.com>
 <2940b4c8-5d44-695e-4550-0a32c3a4c053@xen.org>
 <d5bccf50-c74a-40e6-843e-3ad682647efb@arm.com>
 <5121de30-644f-8a1f-ff1a-29c4d2ee7f0f@xen.org>
 <63a680c6-0086-230b-dbbd-dfe63609f9bc@suse.com>
 <b0b49926-9a70-37f1-43d4-ac4e852198ba@xen.org>
 <1013a14b-a45b-f37f-b2e0-e63b186a2956@suse.com>
 <ffa0e581-6a32-5c3c-7e63-acd5086c6822@arm.com>
 <e3a045d5-34d3-af73-89a7-7c306e7f8de4@suse.com>
 <168143f7-11e3-1acb-2de1-dba1a0db4ad3@arm.com>
 <55252ad6-021b-b96d-ae91-4ebbe4046dbb@suse.com>
From: Michal Orzel <michal.orzel@arm.com>
In-Reply-To: <55252ad6-021b-b96d-ae91-4ebbe4046dbb@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit



On 30.03.2022 14:53, Jan Beulich wrote:
> On 30.03.2022 14:13, Michal Orzel wrote:
>> On 30.03.2022 13:57, Jan Beulich wrote:
>>> On 30.03.2022 13:04, Michal Orzel wrote:
>>>> On 30.03.2022 12:42, Jan Beulich wrote:
>>>>> On 30.03.2022 12:32, Julien Grall wrote:
>>>>>> Renaming to PE_COFF may help to avoid the confusion with CONFIG_EFI. 
>>>>>> That said, it would possibly make more difficult to associate the flag 
>>>>>> with "linking an EFI binary".
>>>>>
>>>>> Indeed. And EFI_PE_COFF is getting a little unwieldy for my taste.
>>>>>
>>>>>> I think some documentaion about the define EFI would be help so there 
>>>>>> are no more confusion between CONFIG_EFI/EFI. But I am not sure where to 
>>>>>> put it. Maybe at the top of the header?
>>>>>
>>>>> That's perhaps the best place, yes.
>>>>>
>>>> In this case how about the following comment at the top of xen.lds.h:
>>>>
>>>> "To avoid any confusion about EFI macro used in this header vs EFI support,
>>>> the former is used when linking a native EFI (i.e. PE/COFF) binary, whereas
>>>> the latter means support for generating EFI binary.
>>>
>>> No, that's the case on Arm only. As Julien suggested, it is perhaps best
>>> to explain the difference between EFI and CONFIG_EFI, without going into
>>> arch specifics.
>> Could you please tell me what you are reffering to as there is no such identifier
>> in Xen (as opposed to Linux) like CONFIG_EFI ?
> 
> Let's call it a "virtual" CONFIG_EFI then; I think we really should have
> such an option. But yes, if you don't like referring to such a virtual
> option, then describing what is meant verbally is certainly going to be
> fine.
> 
FWICS, there was an attempt done by Wei in his NUMA series to define CONFIG_EFI.
However as this is not yet merged and agreed, I would like not to refer to identifiers
not existing in the code, even though most people are familiar with this option from Linux.

So by taking an example from Linux I would verbally explain it like that:
"To avoid any confusion, please note that EFI macro does not correspond to EFI
runtime support and is used when linking a native EFI (i.e. PE/COFF) binary, hence its
usage in this header."

If that does not suite you, please help creating a better explanation.

> Jan
> 

Michal


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 13:27:13 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 13:27:13 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296332.504377 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZYLw-0004mW-Ke; Wed, 30 Mar 2022 13:27:12 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296332.504377; Wed, 30 Mar 2022 13:27:12 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZYLw-0004mP-HE; Wed, 30 Mar 2022 13:27:12 +0000
Received: by outflank-mailman (input) for mailman id 296332;
 Wed, 30 Mar 2022 13:27:11 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=b505=UJ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZYLv-0004mJ-9v
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 13:27:11 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 19f61e1d-b02d-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 15:27:09 +0200 (CEST)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2113.outbound.protection.outlook.com [104.47.18.113]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-26-T7n2N4gqNF6M0GhOs0t8GA-1; Wed, 30 Mar 2022 15:27:06 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by DB8PR04MB7179.eurprd04.prod.outlook.com (2603:10a6:10:124::11)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.19; Wed, 30 Mar
 2022 13:27:05 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.019; Wed, 30 Mar 2022
 13:27:05 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 19f61e1d-b02d-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648646830;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=pVJq8LHd2bfEMgMFMNJ2ftY5c+6XVFKJs3cPNnVElpE=;
	b=kaies7bVsKx6XvhiA6GE4k4X4YunaT466CTTTQz37HkNkcohl57VZr4FMfMzDdk3jou2DO
	/CBRa4vFnKuHmnQeitl3Gp1Z/o6KIjVufjva//trAeM7bPlKjkThLULmx5DCCA0By/AR4O
	7uHl/jAORoFYag0GqZ1vR4Vj/mGr1Vw=
X-MC-Unique: T7n2N4gqNF6M0GhOs0t8GA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ILKzErJioAyGrXTNKBH9WOxweSLZ9kCCw0dNmJgnorYR1sSJi/VtcG5Uz+F3g/hr+edPnnvm2LIPzAJqOlpsSEIs/WssL8XBFvr1vCrHjA1ur9yS0M1dqpcn4Rl0TAyGc0E8OuMn9XHLkY9F9OK1nJoMHP4QHEQCh52kEuCY8PWDs+BPT1Xeb75U31SQfzPv15R7sAeM6P9ERq4870nuyITaUmBj43R6s9VV8nsZ4KOD+fmGw45VQZEsgxMZ7ZIKcocd1c4TG3udPue8epPqHrCnG01WMG/zY8uD6kQqvWm+7aY50bLUY63Z3hK0I393PGiQyS3wyCp+ldEcidYhyw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=pVJq8LHd2bfEMgMFMNJ2ftY5c+6XVFKJs3cPNnVElpE=;
 b=V52UN9JpQ51nrW+ylzYoOmpJw9cPVDdc1QKUEttogcgpvkRvf66aaOt6XBkCVBLbTMeqqcN+GHoX5qAwZfQMQXDgH0GWWRHJUeT0OALvhzwzI5XXrEkTv86yGT4QR10QgZf5vWxuJma9Tz2WqIOzIjpp8Z570u4k6Rs+8M0GbPiOer01wJgcz6iZUh7e1tGftwBItIxX/uyzz4V9ie6E2qVsCiNtSaUOMP85lWIBMvtXwcxOjgVwl8h1fxd2V2MBrVMmvWmQtBRo7r04idBHY2I4NhYG8F/L2zC1dwFSh8mDcNuL9WJZfU3/bMeilROtUq0L1GJ7r3hmEq7iVnnGWQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <0441f9b0-7f80-65a9-ec1e-7eee559a1951@suse.com>
Date: Wed, 30 Mar 2022 15:27:03 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2 2/2] xen: Populate xen.lds.h and make use of its macros
Content-Language: en-US
To: Michal Orzel <michal.orzel@arm.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 xen-devel@lists.xenproject.org, Julien Grall <julien@xen.org>
References: <20220322080233.53134-1-michal.orzel@arm.com>
 <20220322080233.53134-3-michal.orzel@arm.com>
 <2940b4c8-5d44-695e-4550-0a32c3a4c053@xen.org>
 <d5bccf50-c74a-40e6-843e-3ad682647efb@arm.com>
 <5121de30-644f-8a1f-ff1a-29c4d2ee7f0f@xen.org>
 <63a680c6-0086-230b-dbbd-dfe63609f9bc@suse.com>
 <b0b49926-9a70-37f1-43d4-ac4e852198ba@xen.org>
 <1013a14b-a45b-f37f-b2e0-e63b186a2956@suse.com>
 <ffa0e581-6a32-5c3c-7e63-acd5086c6822@arm.com>
 <e3a045d5-34d3-af73-89a7-7c306e7f8de4@suse.com>
 <168143f7-11e3-1acb-2de1-dba1a0db4ad3@arm.com>
 <55252ad6-021b-b96d-ae91-4ebbe4046dbb@suse.com>
 <d521854c-9aab-020d-75d6-ca085afa642a@arm.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <d521854c-9aab-020d-75d6-ca085afa642a@arm.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: FR0P281CA0072.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:49::9) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 386c7783-14cb-45a5-efd1-08da1250fb66
X-MS-TrafficTypeDiagnostic: DB8PR04MB7179:EE_
X-Microsoft-Antispam-PRVS:
	<DB8PR04MB7179F818AE0E6088F7198A23B31F9@DB8PR04MB7179.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(8676002)(66476007)(186003)(2616005)(66556008)(4326008)(2906002)(31696002)(66946007)(86362001)(53546011)(6506007)(6512007)(54906003)(31686004)(8936002)(5660300002)(508600001)(6486002)(316002)(6916009)(36756003)(26005)(38100700002)(7416002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?Rzc5bVRmVmZtdDVrNm4vc2NLUzMrZEhXS0VPSTU5TURKRVhYMzBTa2wwVGVD?=
 =?utf-8?B?cGJvSkdjTy9hZ0xvbUdwQjV6VTFqd1FmSDduVFc1Q1R2bHlPNzkxMDRwTWxZ?=
 =?utf-8?B?bDJqZHFxd05WWG1GdnUyRi9TdXpGSDJZdlNTR2h5ZkMvQ1JCdFAzS2VEMFUz?=
 =?utf-8?B?elhDV3hRUzZhdDFHOWRKVkdaSjY1YTZlNmdudDJDdUQzVmk2Q2ZZR2hMMmVT?=
 =?utf-8?B?bEE1ejFWakFlWnlQNGxPUWFVak1xQmE2Y3M2L2x3bmltMlBhSzd5ZG9hVkxE?=
 =?utf-8?B?WDExWEJuOFc4ampvby9kVmZ5MDh3ZWVVclJtczVjdERUei9ESEZmd3VYSmk0?=
 =?utf-8?B?aldWN3NoYmkrdUNQOVBoN2Q2L1owTmVwZzNORU4xSE9ObDhuRjNpNWs4NytN?=
 =?utf-8?B?NFBvS2lLbVFJeGhnOFcxbjdDaUR0dDRGeHA0ZW9TYi8vZnFhZ3gvQlkwWEk3?=
 =?utf-8?B?VzF6a2pTNGdlTHRkaGNYbjE1bGg5QzRKZm45eHhhVDA1THIzRGYxbmdESmk3?=
 =?utf-8?B?LzVrSm1HOVREaG8wVFpkT3VWbVRBdmdYOTZmUVdTRUpjb210OXJlbjBRU1Nl?=
 =?utf-8?B?TzFudGFkN0dkNVNCbzg0eFV1ZTA0eUE4NTJxNjVSc01LYm96dFd2dTl2ZUFy?=
 =?utf-8?B?UmVYbTFwRktKSWJCY1plRDcyNEkwT3JpeDRrYjlSeHljNXlmdXh4MnpDM1Nh?=
 =?utf-8?B?bkpkb1J4MHVqS0swenhaUDJJeWpNeTk4ckw3S0NWNVVTMDhneklTc1lIZ1Nm?=
 =?utf-8?B?bmpoczQweGpHSVJROWZwd2NCeVN6WEVDWGliTXcyQlBuQmVwK3ZORU5Bck94?=
 =?utf-8?B?bm12SXhrK1czbVZBL1ZkeDBaREUwNFdnWUE1SlRWU2lrdkxDSitZK1lJRGZN?=
 =?utf-8?B?bzRsbDJmQndPQjFMNUcxajJhb2NDYS9tTkg0ZUpjWnhLdERFTFg5ZmVudzR6?=
 =?utf-8?B?ek0yZ3ZXU205Mllyc0xxNGU3T1dIV0pIT1JLeHUzMFV2WFZoRHhJZ2NSL1RM?=
 =?utf-8?B?UGxMVTJYblp6VHh3bjlSY1A3RFk0R0tQVWxxUzdUQ1VxbmNhVGV4R0NzaTJZ?=
 =?utf-8?B?cmc4Nlp5eXR2cGx3WTMzQ3o1UU5DRG1jemNIRmpqTmd5M2YxUkNVZ3U3WGhC?=
 =?utf-8?B?TmVWWktlNm10OFgrdE5DbThJS2tmOUxOSGdnMEltcEZaRE9UbVRnQjhqcUhK?=
 =?utf-8?B?ZzhhSUd3cG8zSG14Ym9Mczl2a1hXaHJUZENlQndmbGxJWStLQko4YmswNXNC?=
 =?utf-8?B?NEo1M2l2UTh0UjY3SlRaRHR4bmhWSHVFR3ZFeVNXWVNkRG9tNS9JN0ZVdTRQ?=
 =?utf-8?B?citMWFFJekFWQzFRRmt2TEVzRHZka3pyZVU3bXJnckRaNUEvRGh1RUFQaXZ2?=
 =?utf-8?B?bFYybStXUzNTbE9vaEVkN1AxNUpaaHl4R1ZYWGxvNHpaL2hXS0NjUmdjdjht?=
 =?utf-8?B?NUl3Rkhuajl5TTN0aDNDazYwbnpSTFpRR0VGdlFxYkU1c3Bsd2ZaQVJWM0Nv?=
 =?utf-8?B?REk0WXJzcXkyNWVPazlNMVdFUHk2RlFFWmRBRmVIN3NqQlYrd2w1NE5odFZm?=
 =?utf-8?B?cU00d2FjY28zNnVlcytma2UwcERtTzlVSm5UbVFGeG4ram50dTZKYWczdTRo?=
 =?utf-8?B?VCtoWEh1TmxGYXpJQnZPczdoZytCTTVDSE54OVZRQXpXd1FZdTdrejBaRUxZ?=
 =?utf-8?B?UHhzNGVoSVpmYnVMbzBVR1JMQytDZWpOR3YrZ1ZiVURrQXNEMzdhdlpUSVZ1?=
 =?utf-8?B?eUJJYi9YdGdJT290WVBSMTZGQ1hiMTRBM2ZlZFVJT0Q3akpNVXFIekQ2VmV6?=
 =?utf-8?B?amhQRUpyTWd6V1d4ZjdGcWd2Z21oU3NMOHVsMFhYUDIwRm5OQkdKYytoV0E0?=
 =?utf-8?B?OEF1bEt4NzVSN2Q4MHh6UTVKaVdiM1I5MS9QRW5OT09XK2g0VzRCMHV2QjBv?=
 =?utf-8?B?TEJCakpUd1AzK0RYSEF1dFpuTzh1a0IxM1BDRmVoU3JZOEhvMDdaNVk1N0lz?=
 =?utf-8?B?Z0VQbDJsY3JIalhNaHRBVjc4L29Sa3JEYTREWHNZcGpQSWJ6VFpxRWNaaCt2?=
 =?utf-8?B?dlJaMDlGN0RtV08rTGJJNGlNM2tiSFZhcE9jR1QyUkp3Ty9lZ21CbGE4bXJz?=
 =?utf-8?B?RFc1UGFPdlVhZUNrWlFSWENrZ2owbE1QWkN0TGhsNFJFaHVxVXNJMkJPUVdp?=
 =?utf-8?B?YTN2UG43a2xHV2REUks1RzZ2bTRBN3dXYVZReG1HR3hrcGdXWlIxTXppZi9u?=
 =?utf-8?B?dUNYR0tLdWR4Q01Jb25OemZ5Ry8xWkQweC93VDBPU0tOdXRSY2pKQ0RrNlY1?=
 =?utf-8?B?Zm5mTzhOY2NWRGIwaU5kQ0MvdStueU10VmlSaCsyQnJKNm1LM3p0dz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 386c7783-14cb-45a5-efd1-08da1250fb66
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 13:27:05.1639
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: e1SUXOXr5/MoFSrS0H2FC3pSH8g8vhrQsPS2syd3SZXuaWMAj8sXwNEUZYfADh53BOYzMyWAbC8QxsfGx3s/ew==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR04MB7179

On 30.03.2022 15:24, Michal Orzel wrote:
> On 30.03.2022 14:53, Jan Beulich wrote:
>> On 30.03.2022 14:13, Michal Orzel wrote:
>>> On 30.03.2022 13:57, Jan Beulich wrote:
>>>> On 30.03.2022 13:04, Michal Orzel wrote:
>>>>> On 30.03.2022 12:42, Jan Beulich wrote:
>>>>>> On 30.03.2022 12:32, Julien Grall wrote:
>>>>>>> Renaming to PE_COFF may help to avoid the confusion with CONFIG_EFI. 
>>>>>>> That said, it would possibly make more difficult to associate the flag 
>>>>>>> with "linking an EFI binary".
>>>>>>
>>>>>> Indeed. And EFI_PE_COFF is getting a little unwieldy for my taste.
>>>>>>
>>>>>>> I think some documentaion about the define EFI would be help so there 
>>>>>>> are no more confusion between CONFIG_EFI/EFI. But I am not sure where to 
>>>>>>> put it. Maybe at the top of the header?
>>>>>>
>>>>>> That's perhaps the best place, yes.
>>>>>>
>>>>> In this case how about the following comment at the top of xen.lds.h:
>>>>>
>>>>> "To avoid any confusion about EFI macro used in this header vs EFI support,
>>>>> the former is used when linking a native EFI (i.e. PE/COFF) binary, whereas
>>>>> the latter means support for generating EFI binary.
>>>>
>>>> No, that's the case on Arm only. As Julien suggested, it is perhaps best
>>>> to explain the difference between EFI and CONFIG_EFI, without going into
>>>> arch specifics.
>>> Could you please tell me what you are reffering to as there is no such identifier
>>> in Xen (as opposed to Linux) like CONFIG_EFI ?
>>
>> Let's call it a "virtual" CONFIG_EFI then; I think we really should have
>> such an option. But yes, if you don't like referring to such a virtual
>> option, then describing what is meant verbally is certainly going to be
>> fine.
>>
> FWICS, there was an attempt done by Wei in his NUMA series to define CONFIG_EFI.
> However as this is not yet merged and agreed, I would like not to refer to identifiers
> not existing in the code, even though most people are familiar with this option from Linux.
> 
> So by taking an example from Linux I would verbally explain it like that:
> "To avoid any confusion, please note that EFI macro does not correspond to EFI
> runtime support and is used when linking a native EFI (i.e. PE/COFF) binary, hence its
> usage in this header."

This reads okay to me (perhaps with "the" inserted before "EFI macro").

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 13:30:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 13:30:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296337.504388 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZYPJ-0006BM-5I; Wed, 30 Mar 2022 13:30:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296337.504388; Wed, 30 Mar 2022 13:30:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZYPJ-0006BF-13; Wed, 30 Mar 2022 13:30:41 +0000
Received: by outflank-mailman (input) for mailman id 296337;
 Wed, 30 Mar 2022 13:30:40 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nZYPI-0006AW-DB
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 13:30:40 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nZYPD-00038f-EB; Wed, 30 Mar 2022 13:30:35 +0000
Received: from 54-240-197-235.amazon.com ([54.240.197.235]
 helo=[192.168.5.112]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nZYPD-0005HN-7d; Wed, 30 Mar 2022 13:30:35 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=YzzXIYUrlqvAYdARZ2yGFgCpslIYy+nvIUoxnZFKcB8=; b=TfWQSBLAqU8m3XXTzzQITyqWAU
	qa8wsw/SDqllq+2CCvC+Le/9Ku2tGvEZwRzujmykbDwFyMduMa1/VsWHEqcXUNFSZYqQ6xWim9iH6
	/i/d+iCpBdAd1z1XgTCOHJRB7kHQTdVpixqVp5INctUDGL1Cx9otWH4b3sKHy0cQyLG8=;
Message-ID: <cfb19224-6b83-6fca-37de-703152e38af6@xen.org>
Date: Wed, 30 Mar 2022 14:30:32 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v2 2/2] xen: Populate xen.lds.h and make use of its macros
To: Michal Orzel <michal.orzel@arm.com>, Jan Beulich <jbeulich@suse.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 xen-devel@lists.xenproject.org
References: <20220322080233.53134-1-michal.orzel@arm.com>
 <20220322080233.53134-3-michal.orzel@arm.com>
 <2940b4c8-5d44-695e-4550-0a32c3a4c053@xen.org>
 <d5bccf50-c74a-40e6-843e-3ad682647efb@arm.com>
 <5121de30-644f-8a1f-ff1a-29c4d2ee7f0f@xen.org>
 <63a680c6-0086-230b-dbbd-dfe63609f9bc@suse.com>
 <b0b49926-9a70-37f1-43d4-ac4e852198ba@xen.org>
 <1013a14b-a45b-f37f-b2e0-e63b186a2956@suse.com>
 <ffa0e581-6a32-5c3c-7e63-acd5086c6822@arm.com>
 <e3a045d5-34d3-af73-89a7-7c306e7f8de4@suse.com>
 <168143f7-11e3-1acb-2de1-dba1a0db4ad3@arm.com>
 <55252ad6-021b-b96d-ae91-4ebbe4046dbb@suse.com>
 <d521854c-9aab-020d-75d6-ca085afa642a@arm.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <d521854c-9aab-020d-75d6-ca085afa642a@arm.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi,

On 30/03/2022 14:24, Michal Orzel wrote:
> 
> 
> On 30.03.2022 14:53, Jan Beulich wrote:
>> On 30.03.2022 14:13, Michal Orzel wrote:
>>> On 30.03.2022 13:57, Jan Beulich wrote:
>>>> On 30.03.2022 13:04, Michal Orzel wrote:
>>>>> On 30.03.2022 12:42, Jan Beulich wrote:
>>>>>> On 30.03.2022 12:32, Julien Grall wrote:
>>>>>>> Renaming to PE_COFF may help to avoid the confusion with CONFIG_EFI.
>>>>>>> That said, it would possibly make more difficult to associate the flag
>>>>>>> with "linking an EFI binary".
>>>>>>
>>>>>> Indeed. And EFI_PE_COFF is getting a little unwieldy for my taste.
>>>>>>
>>>>>>> I think some documentaion about the define EFI would be help so there
>>>>>>> are no more confusion between CONFIG_EFI/EFI. But I am not sure where to
>>>>>>> put it. Maybe at the top of the header?
>>>>>>
>>>>>> That's perhaps the best place, yes.
>>>>>>
>>>>> In this case how about the following comment at the top of xen.lds.h:
>>>>>
>>>>> "To avoid any confusion about EFI macro used in this header vs EFI support,
>>>>> the former is used when linking a native EFI (i.e. PE/COFF) binary, whereas
>>>>> the latter means support for generating EFI binary.
>>>>
>>>> No, that's the case on Arm only. As Julien suggested, it is perhaps best
>>>> to explain the difference between EFI and CONFIG_EFI, without going into
>>>> arch specifics.
>>> Could you please tell me what you are reffering to as there is no such identifier
>>> in Xen (as opposed to Linux) like CONFIG_EFI ?
>>
>> Let's call it a "virtual" CONFIG_EFI then; I think we really should have
>> such an option. But yes, if you don't like referring to such a virtual
>> option, then describing what is meant verbally is certainly going to be
>> fine.
>>
> FWICS, there was an attempt done by Wei in his NUMA series to define CONFIG_EFI.
> However as this is not yet merged and agreed, I would like not to refer to identifiers
> not existing in the code, even though most people are familiar with this option from Linux.
> 
> So by taking an example from Linux I would verbally explain it like that:
> "To avoid any confusion, please note that EFI macro does not correspond to EFI
> runtime support and is used when linking a native EFI (i.e. PE/COFF) binary, hence its

"EFI runtime support" can be mistakenly associated to EFI runtime 
services (which BTW not supported on Arm). So I would suggest to 
s/runtime/boot/.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 13:34:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 13:34:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296342.504399 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZYTL-0006nA-Kl; Wed, 30 Mar 2022 13:34:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296342.504399; Wed, 30 Mar 2022 13:34:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZYTL-0006n3-HZ; Wed, 30 Mar 2022 13:34:51 +0000
Received: by outflank-mailman (input) for mailman id 296342;
 Wed, 30 Mar 2022 13:34:50 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=b505=UJ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZYTK-0006mx-6V
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 13:34:50 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2b6a6d47-b02e-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 15:34:48 +0200 (CEST)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2169.outbound.protection.outlook.com [104.47.17.169]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-39-Xu0tRWtVMemOfnZmYKoEpA-1; Wed, 30 Mar 2022 15:34:43 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by HE1PR0402MB3356.eurprd04.prod.outlook.com (2603:10a6:7:8a::29)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.23; Wed, 30 Mar
 2022 13:34:40 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.019; Wed, 30 Mar 2022
 13:34:40 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2b6a6d47-b02e-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648647288;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=d//aov0a3uhTS5uqlmbDEVso240mUGcdqql3oLPkCb0=;
	b=LJ+CjqStSHm3ZwECLWAYs1a3yPHHhcA8i4e64okAMg1n0UPh3RJI4LZPZqcU2yb0IF7KxY
	mq1tKDE3GZhuoVpNi4oNtmbfiyO1Fk7PfMDBvhQXA6iDdtRaDHDAenMIV196ymoCfd4kPc
	GicS5kkMCATKKz/YQb7AXFzkwzn1zvc=
X-MC-Unique: Xu0tRWtVMemOfnZmYKoEpA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=nCGbR1JkwUSqkPNTLEua0XyfIEEy5dXkROtOmAUehGcAPv2p0hcwvNM1vFQnVzwIqOfSV9uCoD1uViI+6MGrcJaHekTt2U3WEVq9UhI8BsAbiPj1uGfFGqL9cUHkT2jS+l7CjUBBVrQK8AS1/wDGHCuRrQRiH/eyCJ+J8RE3tR9ZobGEmCvaWR3blphl7+7AoKRPgHAeYdvpySrTDPko6xJvS3pUYKgX6F34E3hgDk90ddHumPGFPYitD/J7I1gw0AcAuVtx1UzaPJb87rNcijUlTg7ryPKnkhB+CtWnS1/n7zGugGDlXN4VctezZcAyo4/51VGDUkt9WOr6OKcoYg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=d//aov0a3uhTS5uqlmbDEVso240mUGcdqql3oLPkCb0=;
 b=l7IefxdacdN6XpYcoIEIXHvdctMTg+Ki0ymAWM0YdEeniYgtGDxC9RNKw0pwX1/rjv+zUeAGw7bQzdCj/wXoEoMM8ig+lifLJezctd7qE3lXQH1Hj3yRHFIwQN+GZTMOVA6D6tnERv5tOZnZwQhUNgoyioUS96pmR1BrH5Hn1kPrYOx+7UIyxEy+dKGUSLPHCi6tavbUrfSz+nK3/Z5n5kG5U5vsZgDkhI/AEgGhmia/n1xzgBnpXIOCx54BKATU2zlKDPZVwilroDFYgFt24i5sSU50ZoRCiAV29M8H6f4Sapze0oZ4PSe0KezaX6abySThbnSxWXCS3n7D8o1ipA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <afabea4f-9497-726e-b5de-ee2df4391641@suse.com>
Date: Wed, 30 Mar 2022 15:34:37 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2 3/3] x86/mem_sharing: make fork_reset more configurable
Content-Language: en-US
To: Tamas K Lengyel <tamas@tklengyel.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>, Wei Liu <wl@xen.org>,
 Anthony PERARD <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Alexandru Isaila <aisaila@bitdefender.com>,
 Petre Pircalabu <ppircalabu@bitdefender.com>,
 Xen-devel <xen-devel@lists.xenproject.org>
References: <ab6bb88e90e5649c60e08a1680b3a2390441031b.1648561546.git.tamas.lengyel@intel.com>
 <3ebadf898bf9e165d657a31c0aa98bbd300ffcb2.1648561546.git.tamas.lengyel@intel.com>
 <bdfbfe3e-66c5-3f99-8f50-16f38bfa78d1@suse.com>
 <CABfawhmxeK0RhXPzg9aqE8iytyNr72jekJ_FN9qWE1b32gxTkg@mail.gmail.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <CABfawhmxeK0RhXPzg9aqE8iytyNr72jekJ_FN9qWE1b32gxTkg@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6PR10CA0018.EURPRD10.PROD.OUTLOOK.COM
 (2603:10a6:209:89::31) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: accbe477-569d-4a94-d3a0-08da12520a6d
X-MS-TrafficTypeDiagnostic: HE1PR0402MB3356:EE_
X-LD-Processed: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba,ExtFwd
X-Microsoft-Antispam-PRVS:
	<HE1PR0402MB33560EB63FA73BAFCD801CBCB31F9@HE1PR0402MB3356.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6512007)(36756003)(31686004)(186003)(83380400001)(6666004)(53546011)(508600001)(26005)(6506007)(2616005)(6486002)(54906003)(8676002)(6916009)(316002)(66476007)(66556008)(8936002)(2906002)(4326008)(66946007)(86362001)(7416002)(31696002)(5660300002)(38100700002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?OHJ1bEROZFB5QUNyY0dZYnNrcGJGQ2FtWmhsblRBSXNxeWFSa0hIWkhnNkVO?=
 =?utf-8?B?bksvWG9KamJNT3hwaGY2NVQ3a21kNnoyRUkwdDBlT202bEJ0N3QycGtzNEUy?=
 =?utf-8?B?MXY2TkRZMHNLUmdmbUY5SnJmam5JcGRockNyZHFsOTJpQkJ5UWdwRkxUYVZs?=
 =?utf-8?B?cVdvdVB1UzJVQ1JYMStoeEc0SXhILzlscFpERFA0dlVwdytpZ0lEZjcraFJQ?=
 =?utf-8?B?NXhIYlN0eVVwNG9HTktrTWJGazEzZFhTVk0rT1BrUm5QQVBnamJ3cTBGMU5s?=
 =?utf-8?B?NUpYbVF0Wk1aK0QwWlJML291cEVRelpxMFZCZVB1cUx0UCtRNGNHTzVYdTRF?=
 =?utf-8?B?UHFINnk0M0szV3dMUVJiODVxb2p4Qmt1L1VKZzZkUU0ydnp1bUNJSk1jSlhp?=
 =?utf-8?B?NUFmRHc5VzBoSkpYMkFxN0xZT0dnYWVIekVhSHBsYlEyZFVUNkdOMU9mQ29F?=
 =?utf-8?B?cm5QaFYzZGttVm42YUpJRmt0SGpwT3hzZTR2REMyRkV1QTBOZmJVdlBMcGx4?=
 =?utf-8?B?dk1ITkdramlpMjdZL2llN0srOVJydzFYWHIzZ2JWMFhHM3B5WStJNG1uekho?=
 =?utf-8?B?RFRtVWhFSzhLM3JWdExodVRpdEN6QVZoUEJHM3J3bnZ6NWhyZjZVN2ZUTEYx?=
 =?utf-8?B?TmJoZDZMb3VOVXF1L21hTlRield3My9sclFHWHorWGRDc0ZNRms0UllrMnpT?=
 =?utf-8?B?WXh1ZU1jck1icXJwa2JVMS9XTGNHTS9EZjZ1YlpMaXNMZUhWT2t2WjR1UHZM?=
 =?utf-8?B?OFhXeVRibitTamVBenZLNGwzenY2RkoybU9PeGZsL1N5SGZidnE0YzMrRzJD?=
 =?utf-8?B?WXlWUkNvelpKek1DVTFST1FKVkdLdXA4Y0VHa2xhajNoWjFKcDJnYmdLbUR2?=
 =?utf-8?B?d1JBKzVTZGxuMGh0TG1mS29XOXNaa3RKZmdyRStiMW1MUGZPdDY2eU4vazZI?=
 =?utf-8?B?cmlhUC9YejNCaWxzNDdKaVJFa2pyS1hjdWNPb2dqNzFiL0NneUFOS1JFVVVi?=
 =?utf-8?B?QTB5VUh0Z1ZXdkIvQVNLMkhyL0F2cmVNNEFxNGRxQSt2cHFKUllkYXNzVWl1?=
 =?utf-8?B?MEJBYXdzNi9DdEhNRjBoNzFQNHFUc0UrZlpMNGcxTDdhRitXcGlZQ2k4VGdP?=
 =?utf-8?B?bktIaDFKWWt3dnF6aWM5MjhEU0Z6MDFUakU1WU1LZWsvWW1aNUdEeFAyU1hR?=
 =?utf-8?B?dVdNQ3BOWjJZOVhHQmx6eG1sNUtjTUttb0g2UTh3T1JhVzd6aUhsOTdLcHho?=
 =?utf-8?B?Nzc0Z3FPQlpSTFNET1JRZkVVcUtTUTFtV1ZOL3lUMUVWQU1ZSWl3RDQ3ZEl0?=
 =?utf-8?B?V0ZGSjB3bGxFWk5tdElKOWQ4Yis0Z01QUzYzWUJsQU02SDArTVhjdnpWM25I?=
 =?utf-8?B?cENseUpNaStYUVFkUUZtZExvS2NsZmF5N21lQjU5SHIrbHFZdmhrTW1iTzNS?=
 =?utf-8?B?QUUxb093bXBUdGMrTDFMWjloK3VQSjU1MnhpMEcwTk55aUZtZUZxYis0Tm5J?=
 =?utf-8?B?dWZPUDNlckpic0NsTzh5SmFuNlkwWHdFR25KU1A4UE1WOElWaURlTFB1bDNa?=
 =?utf-8?B?OHh2QlJCRWFZZ202YjBFemZIRVpaK2hzVWVzbG00RUNLOU5MN0tUSG14SzNl?=
 =?utf-8?B?Z205ZEt2RlBkdlk3eGVLUFpZUjdoN0dwT08zeGNhdTNXanNzRE13K0VjREJT?=
 =?utf-8?B?bEdVa1lNeVpLbjMydTkyZTFZb2Y4eHNrWFZGVk1iMUNkQ1B5OHIwem44L2dV?=
 =?utf-8?B?YXpkR0lxOWZoMjZERVFKUUdpSGpsVWlDWU9MTlZWQXhOT09RVHNrY2UwNUFz?=
 =?utf-8?B?OFNMVy9VNUdIVzVRanVYN2pMOEh6YnZFWlpFOUtZNDFva2tPNUQrbjltbG5C?=
 =?utf-8?B?NUhtZjJUMENxbzVzMkI0MXA2blc5ZlJqS3pHbHpSeHhxdTRXOHBIdHZLYzZa?=
 =?utf-8?B?WTI0VE5HUThFN2xTeHUxdDBPNFozQlRLSzVJZUx6UU9wNHcveDAxeVFqSDdm?=
 =?utf-8?B?VjRvMEIzM0Zub2QzWkJVdFI2blZHb1REMUJGaERqWGVZSnVVWlJHVUVoVGJX?=
 =?utf-8?B?Z2p0L3JzanptcUV4aEs5eVJ1a1E5WG9WaXp5UzE3TWZleHUvcGcrRW9yZ3Zl?=
 =?utf-8?B?cVF4bTlpTlpqTkJVTW1MRHJPT2h2dXRSQmFPRk1VNTlwdUxYK3phbEhsS1lv?=
 =?utf-8?B?YmtDbWdaZWJHWThsNVhWbDFKd280eEV0MmZlVFZQc0hMR01uREp6Zk5wdmRN?=
 =?utf-8?B?OW1zazFoMXB4TFhnOTdDQnRBcUQwZytsM1MxOTVXVVdVUEdyRDl0ZzV2U3pj?=
 =?utf-8?B?U2h5WXhSbFlQNHhDSUNDT1M4RTBXWFFXaDNyaWpEU3BMbmJ4SGdFdz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: accbe477-569d-4a94-d3a0-08da12520a6d
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 13:34:40.0121
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: bhKff98np5H3uEupkm21Ob75h2FVjKRQ0WOWB6nc8d/LqSe9abLh1ew1VIIYrmPk2QzUqu+mQeKs8e72VPSlZQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0402MB3356

On 30.03.2022 15:19, Tamas K Lengyel wrote:
> On Wed, Mar 30, 2022, 6:31 AM Jan Beulich <jbeulich@suse.com> wrote:
>> On 29.03.2022 16:03, Tamas K Lengyel wrote:
>>> --- a/xen/arch/x86/include/asm/mem_sharing.h
>>> +++ b/xen/arch/x86/include/asm/mem_sharing.h
>>> @@ -85,6 +85,9 @@ static inline bool mem_sharing_is_fork(const struct
>> domain *d)
>>>  int mem_sharing_fork_page(struct domain *d, gfn_t gfn,
>>>                            bool unsharing);
>>>
>>> +int mem_sharing_fork_reset(struct domain *d, bool reset_state,
>>> +                           bool reset_memory);
>>
>> Please avoid passing multiple booleans, even more so when you already
>> derive them from a single "flags" value. This would likely be easiest
>> if you re-used the VM_EVENT_FLAG_RESET_FORK_* values also for
>> XENMEM_FORK_RESET_*, with suitable BUILD_BUG_ON() put in place to
>> prove they're the same.
> 
> I don't see why that would be an improvement in any way. I also don't want
> to make VM_EVENT flags tied to the XENMEM ones as they are separate
> interfaces. I rather just drop the changes to the XENMEM interface then do
> that.

If the function gained two or three more flags, how would that look to
you? And how would you easily identify the correct order of all the
booleans?

>>> @@ -394,6 +399,16 @@ static int vm_event_resume(struct domain *d, struct
>> vm_event_domain *ved)
>>>              if ( rsp.reason == VM_EVENT_REASON_MEM_PAGING )
>>>                  p2m_mem_paging_resume(d, &rsp);
>>>  #endif
>>> +#ifdef CONFIG_MEM_SHARING
>>> +            if ( mem_sharing_is_fork(d) )
>>> +            {
>>> +                bool reset_state = rsp.flags &
>> VM_EVENT_FLAG_RESET_FORK_STATE;
>>> +                bool reset_mem = rsp.flags &
>> VM_EVENT_FLAG_RESET_FORK_MEMORY;
>>> +
>>> +                if ( reset_state || reset_mem )
>>> +                    ASSERT(!mem_sharing_fork_reset(d, reset_state,
>> reset_mem));
>>> +            }
>>> +#endif
>>
>> Should the two flags be rejected in the "else" case, rather than
>> being silently ignored?
> 
> What do you mean by rejected? There is no feasible "rejection" that could
> be done in this path other then skipping it.

IOW no return value being handed back to the requester? The function
does have an error return path, so I don't see why you couldn't return
-EINVAL.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 13:36:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 13:36:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296348.504410 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZYV3-0007Sp-3Z; Wed, 30 Mar 2022 13:36:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296348.504410; Wed, 30 Mar 2022 13:36:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZYV3-0007Si-0c; Wed, 30 Mar 2022 13:36:37 +0000
Received: by outflank-mailman (input) for mailman id 296348;
 Wed, 30 Mar 2022 13:36:35 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=b505=UJ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZYV1-0007SQ-75
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 13:36:35 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6a078bca-b02e-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 15:36:33 +0200 (CEST)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2110.outbound.protection.outlook.com [104.47.17.110]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-27-sMjwqc8SONyP9BGpzstoPw-1; Wed, 30 Mar 2022 15:36:29 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by VI1PR04MB5903.eurprd04.prod.outlook.com (2603:10a6:803:e0::10)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.19; Wed, 30 Mar
 2022 13:36:27 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.019; Wed, 30 Mar 2022
 13:36:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6a078bca-b02e-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648647393;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=sXCp5dTG1hk+GwpOlLv8wCFmJypzbGoC1LH92pS9OiY=;
	b=grovrovm7+IbBZEPkUj4NmDbYz3Y8eeJBz09ebbHbTVP+4Run94ougiSUy4wAn5vbPgx4B
	KH8S2x6wGTCBAc9q0MqcvwGWFtyhkFjriajQ2E6A2hXfvfOhEoLNu42C4pihxR9RBpmOKz
	6rRDLV2ycWZ/f4y1MoTqbUZoc87jZ3g=
X-MC-Unique: sMjwqc8SONyP9BGpzstoPw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=DjG33WhFpXDundW43yA7Y6xLYCNTi46xOhZ3VPBWI+7Uh+DEUMyzEiSXDtnkVYgUYPfVEZ2iJhoUnd+ETJhKwnTiXzz2tCO8eaSrTzxaqP6VWK9M942BMRcU4IaNyu6Dxr7cdlXjGTFUEqZ3WgdA7vgkT5I+ctnpvYn380bJ/utcdpOtUKkD+4q690U32kmtLwSWOWDoN/lEM4ZCpbxWWIhtItH4pn+kkTz/F4cfFewOwgYx952NhEYLEbg3ksAsWjD3gz7y7A3lMhcG3R+xFmyLK+pZ0I2sUY/RlEU436ekx5EZdymSRukAo7N7Fbl+/VrBIvbb9h77OGPx911DLA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=sXCp5dTG1hk+GwpOlLv8wCFmJypzbGoC1LH92pS9OiY=;
 b=A6q8jN4DrSral1fC/RltVEXsAkaY5Z134PruXsNmMIEccPqo9hGeqos6IVhojJSOf3WGeaIaO8Pfe9Qxxdz7eNnniXUtF5Xc61xOyf+AwHmRXOa0SdWeQH/Swwl3FBJbSXdjaHggPDSiJqbRhLWBpRJKIffyR9gSI2yf9+RXbHFCl6Ed5n7ZnpqxKj53vCq53nf4AK4AePgpnXQhQATD8pRiFAUxsV0FfzcwZSrlESR0ttm87Sb26zrsyXg05idAqS0f+51uEENgaWsSS/3jiFs2hqw1BlkgzabH0KsmygHzbFDYQrWbEhzccFBXRu3BKwtQubFgEQzWcfyd24Ikfg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <246437cb-ab07-d396-a40d-db14c744f064@suse.com>
Date: Wed, 30 Mar 2022 15:36:24 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2 2/2] xen: Populate xen.lds.h and make use of its macros
Content-Language: en-US
To: Julien Grall <julien@xen.org>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 xen-devel@lists.xenproject.org, Michal Orzel <michal.orzel@arm.com>
References: <20220322080233.53134-1-michal.orzel@arm.com>
 <20220322080233.53134-3-michal.orzel@arm.com>
 <2940b4c8-5d44-695e-4550-0a32c3a4c053@xen.org>
 <d5bccf50-c74a-40e6-843e-3ad682647efb@arm.com>
 <5121de30-644f-8a1f-ff1a-29c4d2ee7f0f@xen.org>
 <63a680c6-0086-230b-dbbd-dfe63609f9bc@suse.com>
 <b0b49926-9a70-37f1-43d4-ac4e852198ba@xen.org>
 <1013a14b-a45b-f37f-b2e0-e63b186a2956@suse.com>
 <ffa0e581-6a32-5c3c-7e63-acd5086c6822@arm.com>
 <e3a045d5-34d3-af73-89a7-7c306e7f8de4@suse.com>
 <168143f7-11e3-1acb-2de1-dba1a0db4ad3@arm.com>
 <55252ad6-021b-b96d-ae91-4ebbe4046dbb@suse.com>
 <d521854c-9aab-020d-75d6-ca085afa642a@arm.com>
 <cfb19224-6b83-6fca-37de-703152e38af6@xen.org>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <cfb19224-6b83-6fca-37de-703152e38af6@xen.org>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: FR3P281CA0056.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:4b::6) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 55f94204-e963-4832-10ee-08da12524a92
X-MS-TrafficTypeDiagnostic: VI1PR04MB5903:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB5903B1983B1DCCFD782D94ECB31F9@VI1PR04MB5903.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(508600001)(6666004)(7416002)(66476007)(66556008)(66946007)(53546011)(5660300002)(8936002)(31696002)(86362001)(38100700002)(2906002)(4326008)(8676002)(6506007)(31686004)(36756003)(316002)(6486002)(54906003)(6916009)(186003)(2616005)(26005)(6512007)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?bm1qcUdUOFp4eGJ3Y2JKU1RVb0xOR2JRYnYvRkN6aDd2dE9pekJYbGlTLzdx?=
 =?utf-8?B?V0xQK2t2NGVBY2I2RmtNdnlHeklzaTNmYXNCMlhVclduUk9OYXUzTEorQ0d2?=
 =?utf-8?B?cXpVTWptenZuZXVOOUo4cENRWXFLRmhKcGVFbllROFg0SHRmNXFBNUVkOFlo?=
 =?utf-8?B?UjRSeTJhY2xzcUxqWGpMKzJ3bGhHVlcxS3RvckU0SlRxV1o4TDR0QlZNQmFV?=
 =?utf-8?B?ZmhBeHlBNmZmUjN2UDJBcUY3MmlxOFdxUmg2K2RIbkJib3FOUitQU29idnFK?=
 =?utf-8?B?NUNaN0x6L0NTN3JDUVNyNVpBNi9xS081V1F4QXVZWWdoU3JueVBlMVVDaFUy?=
 =?utf-8?B?VUJvZXNsTlUzbm9ia0xkaWtVNUhjOEw5RW1oc1FNWU85a2x5OHo5Vm0rdDcy?=
 =?utf-8?B?MVdMaXBuWVhaWXBTT2Q5eXlxUDFPWVN6RVlRQ2V3YzhTUWdaamh2UWxzRU1w?=
 =?utf-8?B?WE9ZVnJ6NFVOeGxWajMwckR1YUlKYzZmYTdyV2txSU5BeWJsaGpTRExSUFNi?=
 =?utf-8?B?UUZhQkdtcjVnRnA4MnI0UFh6KzUzbmJ4MTBSdHpJejFQNGcvVHBPcnMwQmdN?=
 =?utf-8?B?S1U2OVRHblpucnFiYXI1MEphRmU5a3A1VzZzZEpnTDB5a3F6STlRSEcwUUJ5?=
 =?utf-8?B?MkhmRmpWZi9IU2I3QWNoNWJJdHBRN0JxTWE4RThvcmNlNTZNNGY4RFdzWUU5?=
 =?utf-8?B?R1JpWWtDMDBHSjlqdGhQRWZGWVB6STN6aHlXNG9jRXFmSTdSWXYzSmNESVVB?=
 =?utf-8?B?bzV3NGxFa3NqUjdhRkJ1NUNPU1ZXSW5kc0NpbTZUOUI2ZnBQeXdTQjlRZlZ4?=
 =?utf-8?B?MmZheStxRmdvaW5FVlo1cGVZdlJ4L2N6UExIcVo3VGJ5UTJIaVFqOGFxQXYw?=
 =?utf-8?B?cUhHZXBLcTY0S2loNkkyNnJJR3ZQMGhOZWV1Q1QwdThkMUZQY1hxVTRUalQ2?=
 =?utf-8?B?Z0l1WHlZMCs5a3ZmaG11Myt2SXFpcVVZRXVGRDJBclM2YTNZVGpTWUtZYURF?=
 =?utf-8?B?M1I0MEd4WUYwd1lGYTFOaml3ajk5NVkxN1NMZ3gzQnN2b3g5d2NacFlVenRi?=
 =?utf-8?B?UzNjWjNiSmdIQXhmOE1ETG9mVk5CYUtwQVJyZUJ0UTV6R1VBa0QrRjRGYmJU?=
 =?utf-8?B?eXVKNXUwaE10aVJlOFdpcGpRclNZc1BOVlFWckJ2bXJ4YkZiQzZ3WWlqQ1E3?=
 =?utf-8?B?cnA0azlFeDA2MlVXQXhDS1hTNnJsMXprcHI1emtZalhxa09oZnBwaHFmWm9q?=
 =?utf-8?B?K2oraHpzMk9zWG5vWmRsa3gyd0drR0lOOVZWYVhhVENCSUlJNjZXYUFaWWk1?=
 =?utf-8?B?c0lQejhwZXNmWHR1d0NBQ2R3dVhUbjZTUW5nTGZmaVNiYWgvOGJCMXUvZ245?=
 =?utf-8?B?ZzVybnd5bUY4SW8rZUVhaitLMEJkcFZubUhxa1JvM21XeG5hb1lOdk5kdUhj?=
 =?utf-8?B?ZFV2WEY1N1Zhdmp2Nnp4enBKWHA0cThnd0NncDhwVGxkUE5Vdi9NUzBiY0JL?=
 =?utf-8?B?VklrWUdYemxubkt4aHJXU2gzRHJDSjlML1BTcEtkSFBzY0xuS3Q2aGE0SFFs?=
 =?utf-8?B?NVlkdEZZZVdtVDNKS0JVZXRUK3VQeXQ4R281UEZVK3FaN1g3bWY1c2Y4L0Z5?=
 =?utf-8?B?OTdBZTlIKzNHRCt0VVZtY2hreFRzOWkvVE96anBBbkdpZmV1Mi9tU2p1T2pl?=
 =?utf-8?B?VmlZaForZmh6clBmcGc2QW95aEZxMXRaVW5YWjhXcG1tdEhzN3NUOU96dmMr?=
 =?utf-8?B?RUNSdE5KalVMb3VGL2VGdXRKU3lMQnQvTytsUTF3M3ZHN3ZvcTdoYXVJaHc3?=
 =?utf-8?B?MVFXcnBwRHhJNUxYb2ZIUmFvZkdmdTRQRXpPaHVaMkg3UUswcktXV0NQN2Qz?=
 =?utf-8?B?cnZjSUZIN01sYzlqT1ZxdGJ4ZzNYR1ZEU0Y0anp1YVQycDRyTENzazJXdXZ1?=
 =?utf-8?B?RjFzcEFEenlvbXFiK3lsc2E5eFg2MG1xNVh6Nk5QQkRoOVh2d0w2TUVDRWpV?=
 =?utf-8?B?azFsbmRwUnI4dVZNRklIdGRVZG5KQ04yY21aaHI4TW9oSE1LWlNMWVpwWG9X?=
 =?utf-8?B?SmxWYVZyY0dlcmcyR0w5VnBWVE9Mc3Jsc3h4QnJiYnIzRGM1UGkyV3R2b1pK?=
 =?utf-8?B?VlppOFJselJpTEZ0bittWHRGSmthUGpMWUdOK3BPa1FtWjY1Sk1tOUdZTGVt?=
 =?utf-8?B?MUltU1hJLzg3SWZNdm41NFgxcllQUS9Sam5Xc3BrSDVSSlRjUjlCci9Wcktm?=
 =?utf-8?B?ZjhIT3Iyc0dwdHhjajZoVnpZa2VBOHdaSmpBbGh1K2Nuck1QTmNOalAzZ084?=
 =?utf-8?B?NmtKYXdFbnJWVCtlVjRvN0w5elFkUW9KUDlQVjgzdjI2Ui91Z0E0dz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 55f94204-e963-4832-10ee-08da12524a92
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 13:36:27.4832
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: ibXB72fG+l0Z54V9yiErnrpcclZ2NvhbjHqdGE4AmlR1gP2vVA46b/eI0v/eDkHUx86T2skL/qdOW0fJLIj8Cg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB5903

On 30.03.2022 15:30, Julien Grall wrote:
> Hi,
> 
> On 30/03/2022 14:24, Michal Orzel wrote:
>>
>>
>> On 30.03.2022 14:53, Jan Beulich wrote:
>>> On 30.03.2022 14:13, Michal Orzel wrote:
>>>> On 30.03.2022 13:57, Jan Beulich wrote:
>>>>> On 30.03.2022 13:04, Michal Orzel wrote:
>>>>>> On 30.03.2022 12:42, Jan Beulich wrote:
>>>>>>> On 30.03.2022 12:32, Julien Grall wrote:
>>>>>>>> Renaming to PE_COFF may help to avoid the confusion with CONFIG_EFI.
>>>>>>>> That said, it would possibly make more difficult to associate the flag
>>>>>>>> with "linking an EFI binary".
>>>>>>>
>>>>>>> Indeed. And EFI_PE_COFF is getting a little unwieldy for my taste.
>>>>>>>
>>>>>>>> I think some documentaion about the define EFI would be help so there
>>>>>>>> are no more confusion between CONFIG_EFI/EFI. But I am not sure where to
>>>>>>>> put it. Maybe at the top of the header?
>>>>>>>
>>>>>>> That's perhaps the best place, yes.
>>>>>>>
>>>>>> In this case how about the following comment at the top of xen.lds.h:
>>>>>>
>>>>>> "To avoid any confusion about EFI macro used in this header vs EFI support,
>>>>>> the former is used when linking a native EFI (i.e. PE/COFF) binary, whereas
>>>>>> the latter means support for generating EFI binary.
>>>>>
>>>>> No, that's the case on Arm only. As Julien suggested, it is perhaps best
>>>>> to explain the difference between EFI and CONFIG_EFI, without going into
>>>>> arch specifics.
>>>> Could you please tell me what you are reffering to as there is no such identifier
>>>> in Xen (as opposed to Linux) like CONFIG_EFI ?
>>>
>>> Let's call it a "virtual" CONFIG_EFI then; I think we really should have
>>> such an option. But yes, if you don't like referring to such a virtual
>>> option, then describing what is meant verbally is certainly going to be
>>> fine.
>>>
>> FWICS, there was an attempt done by Wei in his NUMA series to define CONFIG_EFI.
>> However as this is not yet merged and agreed, I would like not to refer to identifiers
>> not existing in the code, even though most people are familiar with this option from Linux.
>>
>> So by taking an example from Linux I would verbally explain it like that:
>> "To avoid any confusion, please note that EFI macro does not correspond to EFI
>> runtime support and is used when linking a native EFI (i.e. PE/COFF) binary, hence its
> 
> "EFI runtime support" can be mistakenly associated to EFI runtime 
> services (which BTW not supported on Arm). So I would suggest to 
> s/runtime/boot/.

Or simply just "EFI support"?

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 13:37:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 13:37:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296352.504420 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZYVl-000801-CN; Wed, 30 Mar 2022 13:37:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296352.504420; Wed, 30 Mar 2022 13:37:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZYVl-0007zu-9W; Wed, 30 Mar 2022 13:37:21 +0000
Received: by outflank-mailman (input) for mailman id 296352;
 Wed, 30 Mar 2022 13:37:19 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nZYVj-0007zk-Te
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 13:37:19 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nZYVg-0003GA-Is; Wed, 30 Mar 2022 13:37:16 +0000
Received: from 54-240-197-235.amazon.com ([54.240.197.235]
 helo=[192.168.5.112]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nZYVg-0005kD-CY; Wed, 30 Mar 2022 13:37:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=HXE6Wc/dV0kcGLBn4lrsP0flDF/+urXR28bbC2UAqOk=; b=zLcN+m6ZeBDdyk5I1FdG6txxGi
	JvqQlhtRtS/sPvz6IxxZtGyBi7r9ZqZtPCHb5GvDyLiG3zwGCozuXkrs/6xBISJk6pngmlqNZjvbJ
	EsT6zaxmGHAzeiY/gZDj6XpRo3mW/KRqbQYYUZPZbZmSEI8wDKTQgGX46fMlNimp7Yis=;
Message-ID: <b4283864-d7ab-9437-fd99-234c656041eb@xen.org>
Date: Wed, 30 Mar 2022 14:37:13 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v2 2/2] xen: Populate xen.lds.h and make use of its macros
To: Jan Beulich <jbeulich@suse.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 xen-devel@lists.xenproject.org, Michal Orzel <michal.orzel@arm.com>
References: <20220322080233.53134-1-michal.orzel@arm.com>
 <20220322080233.53134-3-michal.orzel@arm.com>
 <2940b4c8-5d44-695e-4550-0a32c3a4c053@xen.org>
 <d5bccf50-c74a-40e6-843e-3ad682647efb@arm.com>
 <5121de30-644f-8a1f-ff1a-29c4d2ee7f0f@xen.org>
 <63a680c6-0086-230b-dbbd-dfe63609f9bc@suse.com>
 <b0b49926-9a70-37f1-43d4-ac4e852198ba@xen.org>
 <1013a14b-a45b-f37f-b2e0-e63b186a2956@suse.com>
 <ffa0e581-6a32-5c3c-7e63-acd5086c6822@arm.com>
 <e3a045d5-34d3-af73-89a7-7c306e7f8de4@suse.com>
 <168143f7-11e3-1acb-2de1-dba1a0db4ad3@arm.com>
 <55252ad6-021b-b96d-ae91-4ebbe4046dbb@suse.com>
 <d521854c-9aab-020d-75d6-ca085afa642a@arm.com>
 <cfb19224-6b83-6fca-37de-703152e38af6@xen.org>
 <246437cb-ab07-d396-a40d-db14c744f064@suse.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <246437cb-ab07-d396-a40d-db14c744f064@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit



On 30/03/2022 14:36, Jan Beulich wrote:
> On 30.03.2022 15:30, Julien Grall wrote:
>> Hi,
>>
>> On 30/03/2022 14:24, Michal Orzel wrote:
>>>
>>>
>>> On 30.03.2022 14:53, Jan Beulich wrote:
>>>> On 30.03.2022 14:13, Michal Orzel wrote:
>>>>> On 30.03.2022 13:57, Jan Beulich wrote:
>>>>>> On 30.03.2022 13:04, Michal Orzel wrote:
>>>>>>> On 30.03.2022 12:42, Jan Beulich wrote:
>>>>>>>> On 30.03.2022 12:32, Julien Grall wrote:
>>>>>>>>> Renaming to PE_COFF may help to avoid the confusion with CONFIG_EFI.
>>>>>>>>> That said, it would possibly make more difficult to associate the flag
>>>>>>>>> with "linking an EFI binary".
>>>>>>>>
>>>>>>>> Indeed. And EFI_PE_COFF is getting a little unwieldy for my taste.
>>>>>>>>
>>>>>>>>> I think some documentaion about the define EFI would be help so there
>>>>>>>>> are no more confusion between CONFIG_EFI/EFI. But I am not sure where to
>>>>>>>>> put it. Maybe at the top of the header?
>>>>>>>>
>>>>>>>> That's perhaps the best place, yes.
>>>>>>>>
>>>>>>> In this case how about the following comment at the top of xen.lds.h:
>>>>>>>
>>>>>>> "To avoid any confusion about EFI macro used in this header vs EFI support,
>>>>>>> the former is used when linking a native EFI (i.e. PE/COFF) binary, whereas
>>>>>>> the latter means support for generating EFI binary.
>>>>>>
>>>>>> No, that's the case on Arm only. As Julien suggested, it is perhaps best
>>>>>> to explain the difference between EFI and CONFIG_EFI, without going into
>>>>>> arch specifics.
>>>>> Could you please tell me what you are reffering to as there is no such identifier
>>>>> in Xen (as opposed to Linux) like CONFIG_EFI ?
>>>>
>>>> Let's call it a "virtual" CONFIG_EFI then; I think we really should have
>>>> such an option. But yes, if you don't like referring to such a virtual
>>>> option, then describing what is meant verbally is certainly going to be
>>>> fine.
>>>>
>>> FWICS, there was an attempt done by Wei in his NUMA series to define CONFIG_EFI.
>>> However as this is not yet merged and agreed, I would like not to refer to identifiers
>>> not existing in the code, even though most people are familiar with this option from Linux.
>>>
>>> So by taking an example from Linux I would verbally explain it like that:
>>> "To avoid any confusion, please note that EFI macro does not correspond to EFI
>>> runtime support and is used when linking a native EFI (i.e. PE/COFF) binary, hence its
>>
>> "EFI runtime support" can be mistakenly associated to EFI runtime
>> services (which BTW not supported on Arm). So I would suggest to
>> s/runtime/boot/.
> 
> Or simply just "EFI support"?

That works for me.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 13:42:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 13:42:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296358.504431 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZYaz-00011k-Vx; Wed, 30 Mar 2022 13:42:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296358.504431; Wed, 30 Mar 2022 13:42:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZYaz-00011d-T0; Wed, 30 Mar 2022 13:42:45 +0000
Received: by outflank-mailman (input) for mailman id 296358;
 Wed, 30 Mar 2022 13:42:44 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=L21/=UJ=apertussolutions.com=dpsmith@srs-se1.protection.inumbo.net>)
 id 1nZYay-00011X-NB
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 13:42:44 +0000
Received: from sender4-of-o51.zoho.com (sender4-of-o51.zoho.com
 [136.143.188.51]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 45786c5c-b02f-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 15:42:43 +0200 (CEST)
Received: from [10.10.1.138] (static-72-81-132-2.bltmmd.fios.verizon.net
 [72.81.132.2]) by mx.zohomail.com
 with SMTPS id 1648647757129546.9455965960345;
 Wed, 30 Mar 2022 06:42:37 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 45786c5c-b02f-11ec-8fbc-03012f2f19d4
ARC-Seal: i=1; a=rsa-sha256; t=1648647759; cv=none; 
	d=zohomail.com; s=zohoarc; 
	b=C8cB4/n2if2xlm14AKu4OCf75KDtCq2mQVdAQzZGn2Gg76yib99QKRO5WAWYcoqlTCBJjkkuYGKOJPSdVFVFuQsqISJQaXyUoU9DOj8BZEGc4OzaZDHWmRvpupJJauC0XGFUF/clGKkX/+Xq+dNvTRqVEAs6mU9T0T75HA8jU9I=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; 
	t=1648647759; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; 
	bh=1Zyc0QvwbIuAC3285/2GSHpo0DdLzlFPGEz1MlOh/uM=; 
	b=MYINmZFNK075OwmlDT/qVhXmOCHWpJh32fUAEVQV9822g+EI1OKSNabgHe+o7RSbrpckw5xPHZHiZ3D4u7fvK9NgR8/YoHuWHTP+f9DjoXZTPzR4P/rJxZX7IBsiA9M80p2NkMfvkXB77nT2HQpcS1TGNdojrQ60nNP+OI1Zjko=
ARC-Authentication-Results: i=1; mx.zohomail.com;
	dkim=pass  header.i=apertussolutions.com;
	spf=pass  smtp.mailfrom=dpsmith@apertussolutions.com;
	dmarc=pass header.from=<dpsmith@apertussolutions.com>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1648647759;
	s=zoho; d=apertussolutions.com; i=dpsmith@apertussolutions.com;
	h=Message-ID:Date:MIME-Version:To:To:Cc:Cc:References:From:From:Subject:Subject:In-Reply-To:Content-Type:Content-Transfer-Encoding:Message-Id:Reply-To;
	bh=1Zyc0QvwbIuAC3285/2GSHpo0DdLzlFPGEz1MlOh/uM=;
	b=kB0/zfcWyo507wKuxATmGEO33izlarMyEo/fYSznKJlstCViT65oDKQ1KfAZ+EcA
	UkYdgoEbWeX0pqP4oVVYi1DnEP9gBiBYE2j76XaTprOqZxJBzJ9Ei3v9wZE998Vp4io
	41y9Sx2pdWZxq0rYhgbAthANBYT4V5mnmAnA5jXc=
Message-ID: <d7c2f9ab-561c-01dd-e1a4-8f99f356d56d@apertussolutions.com>
Date: Wed, 30 Mar 2022 09:42:18 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
Cc: xen-devel@lists.xenproject.org, scott.davis@starlab.io,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Wei Liu <wl@xen.org>, Daniel De Graaf <dgdegra@tycho.nsa.gov>,
 Jason Andryuk <jandryuk@gmail.com>
References: <20220328203622.30961-1-dpsmith@apertussolutions.com>
 <20220328203622.30961-2-dpsmith@apertussolutions.com>
 <YkK1dSS6RZ9hzyh6@Air-de-Roger>
 <ae3ba2f9-ace5-0c30-9190-06c747953b20@apertussolutions.com>
 <YkQlkOWtXqGBAoM/@Air-de-Roger>
From: "Daniel P. Smith" <dpsmith@apertussolutions.com>
Subject: Re: [RFC PATCH 1/1] xsm: allows system domains to allocate evtchn
In-Reply-To: <YkQlkOWtXqGBAoM/@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ZohoMailClient: External

On 3/30/22 05:40, Roger Pau Monné wrote:
> On Tue, Mar 29, 2022 at 07:12:56PM -0400, Daniel P. Smith wrote:
>> On 3/29/22 03:29, Roger Pau Monné wrote:
>>> On Mon, Mar 28, 2022 at 04:36:22PM -0400, Daniel P. Smith wrote:
>>>> During domain construction under dom0less and hyperlaunch it is necessary to
>>>> allocate at least the event channel for xenstore and potentially the event
>>>> channel for the core console. When dom0less and hyperlaunch are doing their
>>>> construction logic they are executing under the idle domain context. The idle
>>>> domain is not a privileged domain, it is not the target domain, and as a result
>>>> under the current default XSM policy is not allowed to allocate the event
>>>> channel.
>>>
>>> I've not been following the discussion around this patch, but I would
>>> assume such privileges are only required for init code when no other
>>> domains are running?
>>
>> At this time, correct.
>>
>>> Since it's only at that point where the idle domain context needs to
>>> allocate event channels would it make sense to temporary elevate it's
>>> privileges by setting d->is_privileged while doing the domain creation?
>>
>> This is initially what I did but it seemed like there was some
>> reluctance. As I was looking to formalize/abstract this in XSM instead
>> of doing direct manipulations, I realized I could achieve it in the hook
>> which would allow the hyperlaunch and dom0less code work without having
>> to ensure priv escalation is properly handled.
>>
>>> That way we wouldn't need to grant those permissions for the lifetime
>>> of the host when they are only needed for initialization code.
>>
>> Correct, which is why I adjusted the effective default policy only on
>> the check instead of in xsm_default_action() as Jan has suggested.
>> Outside of a code fault, all other times that evtchn_alloc_unbound() is
>> called `current->domain` should be pointing at the caller of the hypercall.
>>
>> This works as an interim solution with minimal impact as it is all
>> internal to XSM and can easily be evolved. My concern is that exposing a
>> function call to provide priv escalation for the idle domain as an
>> interim solution for dom0less and hyperlaunch will have more impactful
>> code churn in both of these when a longer term approach is adopted.
>>
>>> Another option would be switching to the initial vCPU of the domain
>>> being created, but that's likely to be more complex, or even create a
>>> short lived system domain with is_privileged set just for the purpose
>>> of building other domains.
>>
>> Longer term I would like to explore doing this in general. Some initial
>> thinking is the fact that hypervisor has a few contexts, relative to
>> external entities, under which it is executing. When it is handling
>> internal house keeping (e.g. scheduler and security server), when it is
>> interacting with guest domains, when it is interacting with hardware
>> (e.g. vpci), and now when it is processing boot material to construct
>> domains. It  has been mentioned that today in Xen if one of these
>> contexts acting with external entities is corrupted, it can interfere
>> with operations occurring in the other contexts. In the past the have
>> advocated and been working to split these contexts using hard L0/L1
>> separation. As noted in other discussions, some architectures are
>> gaining hardware features that can be used in hard L0/L1 partitioning
>> but also could be used in a more "soft" partitioning more a kin to
>> Nested Kernel[1] and Dune[2]. Again just some initial thoughts.
>>
>>> Overall I'm not sure it's worth giving those extra privileges to the
>>> idle domain when they are just need for a known and bounded period of
>>> time.
>>
>> IMHO that is a slight over simplification. Setting is_privileged to the
>> idle domain while it is processing domain construction data from outside
>> the hypervisor means that during that bounded period the idle domain is
>> complete unrestricted and may invoke any XSM protected call.
> 
> The domain builder code executed in the idle domain context can make
> direct calls to any functions that are otherwise protected behind an
> XSM check on the hypercall paths, so I don't see much difference.  The
> code executed by the idle domain in order to do domain creation is
> already part of the trusted code base (ie: it's hypervisor code)
> likewise with the data used as input.

I am only referring to what legit code paths exist, not what a full
control exploit could achieve at this time. My comments below was
discussing what might want to be considered down the road.

>> Contrast
>> this with only granting the idle domain the ability to allocate event
>> channels between domains at any time with the only codified usage is
>> during init/setup. While I am unsure how, theoretically malformed
>> construction data could expose a logic flaw to do some very unsavory
>> allocations without any guards.
> 
> It's kind of like that already, it's just that in other instances the
> calls done by the domain builder in idle domain context bypass the
> hypercall XSM checks.

Not on legitimate code paths, which is what I am focused on since the
primary vector that I was considering here is data attacks which are
about steering execution down legitimate paths as opposed to attacks
like ROP that allows runtime construction of execution paths.

> This might be giving you a false sense of security, but what's done in
> the idle domain context in order to do domain creation would strictly
> speaking require the idle domain to be a fully privileged entity, it's
> just that we mostly bypass the XSM checks by calling functions
> directly instead of using the hypercall entry paths.

Not at all as long as it is understood this is just about
least-privilege with the concern being around data attacks.

To be clear, I am not saying either solution is wrong and standing
firmly for one or the other. I am just trying to ensure that we consider
the applicable security aspects and thus make an informed decision.

>> Whereas during runtime if the idle
>> domain was tricked into establishing an event channel between two
>> domains, it would only serve to provide a covert channel between the two
>> domains. Neither is desirable but IMHO I find the former a little more
>> concerning than the latter.
>>
>> With that said, I am not completely against doing the priv escalation if
>> overall this is the direction that is preferred. If so, I would prefer
>> to provide a pair of static inlines under XSM name space to provide a
>> consistent implementation and be able to easily locate the places where
>> it is applied if/when a longer term approach is implemented.
> 
> I think those helpers must be __init, and we need to assert that by
> the time domains are started the idle domain is no longer
> privileged.

That is fine, I am not sure if there is a difference between static
inline functions that are only invoked from __init code (and I would
think would thus not exist anywhere else in the binary) over__init
functions. Although I have not been keeping Live Update in mind but I
think this is where the controlled privileged builder context is really
needed that dom0less, hyperlaunch, and Live Update can all utilize.

Good point regarding the assert. This was a concern I forgot to mention
with using priv escalation. Once a legitimate path exists to do such an
action, what locations should there be checks/assertions it is has not
occurred.

> From my PoV increasing the privileges of the idle domain just for the
> time it acts as a domain builder is merely formalizing what is already
> a fact: if the domain building was executed outside of Xen it would
> require the context domain to be privileged.

Except that it is now in guest space and can only reach resources
through the controlled hypercall interface. Any data that is sent is
considered trustworthy because the domain builder is trusted.

I will send out my original priv escalation patch later today.

v/r,
dps


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 13:53:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 13:53:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296364.504442 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZYlD-0002YS-0N; Wed, 30 Mar 2022 13:53:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296364.504442; Wed, 30 Mar 2022 13:53:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZYlC-0002YL-Tq; Wed, 30 Mar 2022 13:53:18 +0000
Received: by outflank-mailman (input) for mailman id 296364;
 Wed, 30 Mar 2022 13:53:17 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=L21/=UJ=apertussolutions.com=dpsmith@srs-se1.protection.inumbo.net>)
 id 1nZYlB-0002YF-PH
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 13:53:17 +0000
Received: from sender4-of-o51.zoho.com (sender4-of-o51.zoho.com
 [136.143.188.51]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id be66ca77-b030-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 15:53:15 +0200 (CEST)
Received: from [10.10.1.138] (static-72-81-132-2.bltmmd.fios.verizon.net
 [72.81.132.2]) by mx.zohomail.com
 with SMTPS id 1648648388857624.9614367089724;
 Wed, 30 Mar 2022 06:53:08 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: be66ca77-b030-11ec-a405-831a346695d4
ARC-Seal: i=1; a=rsa-sha256; t=1648648391; cv=none; 
	d=zohomail.com; s=zohoarc; 
	b=SNyaufibpo9083X9vMPABQuA7iC1ZZwyVOZRVMuSRajnOzUBy7ARGz1PWuMtEf2G1CoQzPMQ3x5o6qK9pvnelliV6iZL45QPFufBFLvt3tmmJ/iIBRv+6f5wTP6q3K9Pvk5slfwQNf2KxsaEPxEpcdkOo65Z0NQZ1r6ur6lVfW4=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; 
	t=1648648391; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; 
	bh=qG76ARSkVs5IDF8OOg0NOS5LEFbcnwo16TsgkN/uO6E=; 
	b=dyq70w/jWQLTDpScuXpqqoJSi5q+4D1aXqy/jlvFeHjaIhSfIF+hF1D1g5LMerv+MVa+k4GQfvrgkjngAJgZ5WR7cBTgGI5JXKf5C8LxON01qNwxyZmkUbSVwMraQYTD8um9+grs4Lv7V8wchyk14+KlbgK+TYAPtGDJMEMGso0=
ARC-Authentication-Results: i=1; mx.zohomail.com;
	dkim=pass  header.i=apertussolutions.com;
	spf=pass  smtp.mailfrom=dpsmith@apertussolutions.com;
	dmarc=pass header.from=<dpsmith@apertussolutions.com>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1648648391;
	s=zoho; d=apertussolutions.com; i=dpsmith@apertussolutions.com;
	h=Message-ID:Date:MIME-Version:To:To:Cc:Cc:References:From:From:Subject:Subject:In-Reply-To:Content-Type:Content-Transfer-Encoding:Message-Id:Reply-To;
	bh=qG76ARSkVs5IDF8OOg0NOS5LEFbcnwo16TsgkN/uO6E=;
	b=rxCtSU58kpRXGj7WIrRXEzGudlUuB5MeifpBQD50kZiKgqiIltXUc6qaDNbY9+yT
	gQmrbpy12IfTeVZSc/PHNQMeIK2D4Lls+Z9pE4PtSP6Yeb5dUVs2M6ghZou4PfnmGw/
	2WoJXpQ02ugORuNfLM+WtrOwEZrncPyDu4rx/5jI=
Message-ID: <4782d9f1-8575-9059-bc65-9f67b02d0d44@apertussolutions.com>
Date: Wed, 30 Mar 2022 09:52:50 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: Jan Beulich <jbeulich@suse.com>
Cc: scott.davis@starlab.io, Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Daniel De Graaf <dgdegra@tycho.nsa.gov>, xen-devel@lists.xenproject.org,
 Jason Andryuk <jandryuk@gmail.com>
References: <20220328203622.30961-1-dpsmith@apertussolutions.com>
 <20220328203622.30961-2-dpsmith@apertussolutions.com>
 <7935e60e-34b1-76be-e5de-56e60f173438@suse.com>
 <a991c32d-4e45-f015-3d99-8552199e8d45@apertussolutions.com>
 <e711e8c8-5e5d-7443-fbc8-368ccdde533b@suse.com>
From: "Daniel P. Smith" <dpsmith@apertussolutions.com>
Subject: Re: [RFC PATCH 1/1] xsm: allows system domains to allocate evtchn
In-Reply-To: <e711e8c8-5e5d-7443-fbc8-368ccdde533b@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ZohoMailClient: External

On 3/30/22 02:30, Jan Beulich wrote:
> On 29.03.2022 20:57, Daniel P. Smith wrote:
>> On 3/29/22 02:43, Jan Beulich wrote:
>>> On 28.03.2022 22:36, Daniel P. Smith wrote:
>>>> During domain construction under dom0less and hyperlaunch it is necessary to
>>>> allocate at least the event channel for xenstore and potentially the event
>>>> channel for the core console. When dom0less and hyperlaunch are doing their
>>>> construction logic they are executing under the idle domain context. The idle
>>>> domain is not a privileged domain, it is not the target domain, and as a result
>>>> under the current default XSM policy is not allowed to allocate the event
>>>> channel.
>>>
>>> I appreciate the change is only needed there right now, but it feels
>>> inconsistent. _If_ it is to remain that way, at least a comment needs
>>> to be put in xsm_evtchn_unbound() making clear why this is a special
>>> case, and hence clarifying to people what the approximate conditions
>>> are to have such also put elsewhere. But imo it would be better to
>>> make the adjustment right in xsm_default_action(), without touching
>>> event_channel.c at all. Iirc altering xsm_default_action() was
>>> discussed before, but I don't recall particular reasons speaking
>>> against that approach.
>>
>> By inconsistent, I take it you mean this is first place within an XSM
>> hook where an access decision is based on the current domain being a
>> system domain?
> 
> Well - yes and no. Even if further instances appeared, overall state
> would still end up inconsistent.

Okay, I think I get what you mean, which was brought up by Julien as
well. Which is that the default policy will become very nuanced over
whether certain xsm checks grants access to the idle domain or not. Yes,
I agree if this would not be good if this approach was used as the long
term solution.

>> I do agree and would add a comment to the change in the
>> XSM hook in a non-RFC version of the patch.
>>
>> As to moving the check down into xsm_default_action(), the concern I
>> have with doing so is that this would then make every XSM check succeed
>> if `current->domain` is a system domain. Doing so would require a review
>> of every function which has an XSM hoook to evaluate every invocation of
>> those functions that,
>>   1. is there ever a time when current->domain may be a system domain
>>   2. if so,
>>     a. is the invocation on behalf of the system domain
>>     b. or is the invocation on behalf of a non-system domain
>>
>> If there is any instance of 2b, then an inadvertent privilege escalation
>> can occur on that path. For evtchn_alloc_unbound() I verified the only
>> place, besides the new hyperlaunch calls, it is invoked is in the evtchn
>> hypercall handler, where current should be pointing at the domain that
>> made the hypercall.
> 
> Such an audit shouldn't be overly difficult, as the majority of XSM hook
> invocations sit clearly visible on hypercall paths, where it is clear
> that current->domain is not a system one.

Agreed but this would be asking someone to dedicate the time to the task.

>>>> This patch only addresses the event channel situation by adjust the default XSM
>>>> policy for xsm_evtchn_unbound to explicitly allow system domains to be able to
>>>> make the allocation call.
>>>
>>> Indeed I'm having trouble seeing how your change would work for SILO
>>> mode, albeit Stefano having tested this would make me assume he did
>>> so in SILO mode, as that's the default on Arm iirc. Afaict
>>> silo_mode_dom_check() should return false in the described situation.
>>
>> Correct, this patch only addressed the default policy. If an equivalent
>> change for SILO is desired, then it would be placed in
>> silo_evtchn_unbound() and not in silo_mode_dom_check() for the same
>> reasons I would be hesitant to place it in xsm_default_action().
>>
>>> Similarly I don't see how things would work transparently with a
>>> Flask policy in place. Regardless of you mentioning the restriction,
>>> I think this wants resolving before the patch can go in.
>>
>> To enable the equivalent in flask would require no hypervisor code
>> changes. Instead that would be handled by adding the necessary rules to
>> the appropriate flask policy file(s).
> 
> Of course this can be dealt with by adjusting policy file(s), but until
> people do so they'd end up with a perceived regression and/or unexplained
> difference in behavior from running in dummy (or SILO, once also taken
> care of) mode.

By the vary nature of running flask is to have a different behavior than
the dummy policy. What would need to be adjusted is the example policy
which does attempt to reflect the dummy policy. IMHO if a group is
writing these parts of their policy themselves, it is part of the policy
maintenance they have accepted with having a custom policy.

v/r,
dps


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 14:05:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 14:05:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296379.504462 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZYwV-0004EO-5h; Wed, 30 Mar 2022 14:04:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296379.504462; Wed, 30 Mar 2022 14:04:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZYwV-0004EH-2d; Wed, 30 Mar 2022 14:04:59 +0000
Received: by outflank-mailman (input) for mailman id 296379;
 Wed, 30 Mar 2022 14:04:57 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=L21/=UJ=apertussolutions.com=dpsmith@srs-se1.protection.inumbo.net>)
 id 1nZYwT-0004Ce-9N
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 14:04:57 +0000
Received: from sender4-of-o51.zoho.com (sender4-of-o51.zoho.com
 [136.143.188.51]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 5fc9a7e8-b032-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 16:04:56 +0200 (CEST)
Received: from [10.10.1.138] (static-72-81-132-2.bltmmd.fios.verizon.net
 [72.81.132.2]) by mx.zohomail.com
 with SMTPS id 1648649088620142.3296354504954;
 Wed, 30 Mar 2022 07:04:48 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5fc9a7e8-b032-11ec-a405-831a346695d4
ARC-Seal: i=1; a=rsa-sha256; t=1648649091; cv=none; 
	d=zohomail.com; s=zohoarc; 
	b=KFQiduAsJ0JtkZOf+pxspHhS5oFbTnalD4KggaeT/LeUm4TqZZezJU8uBit3eRxmxxAHyYH3bj6w32sE5vMUtf1CVI7qI/KWXPFjHu73BWD5Qz6BH2e+DyR7RqoGPJ6sBVRW2fowTUPZ3jiCSLPI0ygRaOBppTUZ3KAzlcfUeds=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; 
	t=1648649091; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; 
	bh=REcrB5TGQO9wO2RT8H7Y4NsA0RnhnjkQ+xQepfjdCzY=; 
	b=fQucfuI1YZ7RKGKnXPrIUmNabnwBfGU+BY66ZmafYVEZVk0Emdzdl98Rd+481aAcxbWY0oW72eoUHC0bUcz/flPQFJuniMvWEZT69y8rpxztjrt6EZuhSWmnjI2VnGJHsQOxHyDkI6v8w1oM+XrvQxcNejslrtIN8Miq7wVY9fg=
ARC-Authentication-Results: i=1; mx.zohomail.com;
	dkim=pass  header.i=apertussolutions.com;
	spf=pass  smtp.mailfrom=dpsmith@apertussolutions.com;
	dmarc=pass header.from=<dpsmith@apertussolutions.com>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1648649091;
	s=zoho; d=apertussolutions.com; i=dpsmith@apertussolutions.com;
	h=Message-ID:Date:MIME-Version:To:To:Cc:Cc:References:From:From:Subject:Subject:In-Reply-To:Content-Type:Content-Transfer-Encoding:Message-Id:Reply-To;
	bh=REcrB5TGQO9wO2RT8H7Y4NsA0RnhnjkQ+xQepfjdCzY=;
	b=NxgKorvqKMbakUBn3uqwmwcPRkKvov1nSdprsnfHg+z0ebaVhMZ+Y4YMwxEBMQam
	kEIyNrfPh2lWSDUvrVgywcPz0CfOkV8eZOUkuE92nsiWyDKuSuUqZiDV07HaWm1XDIm
	Viocr1xfVD1gxNQFfan6mijmLwp3MibHZZS161kQ=
Message-ID: <bdd9547f-d3d7-2315-898f-786ce31f9bbc@apertussolutions.com>
Date: Wed, 30 Mar 2022 10:04:30 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: Jason Andryuk <jandryuk@gmail.com>, Jan Beulich <jbeulich@suse.com>
Cc: Scott Davis <scott.davis@starlab.io>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Daniel De Graaf <dgdegra@tycho.nsa.gov>,
 xen-devel <xen-devel@lists.xenproject.org>
References: <20220328203622.30961-1-dpsmith@apertussolutions.com>
 <20220328203622.30961-2-dpsmith@apertussolutions.com>
 <7935e60e-34b1-76be-e5de-56e60f173438@suse.com>
 <a991c32d-4e45-f015-3d99-8552199e8d45@apertussolutions.com>
 <e711e8c8-5e5d-7443-fbc8-368ccdde533b@suse.com>
 <CAKf6xpt46jFgexwLA=wdUVH-HJWLOEisL6-2cmSLyJsO3QE2eQ@mail.gmail.com>
From: "Daniel P. Smith" <dpsmith@apertussolutions.com>
Subject: Re: [RFC PATCH 1/1] xsm: allows system domains to allocate evtchn
In-Reply-To: <CAKf6xpt46jFgexwLA=wdUVH-HJWLOEisL6-2cmSLyJsO3QE2eQ@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ZohoMailClient: External

On 3/30/22 08:30, Jason Andryuk wrote:
> On Wed, Mar 30, 2022 at 2:30 AM Jan Beulich <jbeulich@suse.com> wrote:
>>
>> On 29.03.2022 20:57, Daniel P. Smith wrote:
>>> On 3/29/22 02:43, Jan Beulich wrote:
>>>> Similarly I don't see how things would work transparently with a
>>>> Flask policy in place. Regardless of you mentioning the restriction,
>>>> I think this wants resolving before the patch can go in.
>>>
>>> To enable the equivalent in flask would require no hypervisor code
>>> changes. Instead that would be handled by adding the necessary rules to
>>> the appropriate flask policy file(s).
>>
>> Of course this can be dealt with by adjusting policy file(s), but until
>> people do so they'd end up with a perceived regression and/or unexplained
>> difference in behavior from running in dummy (or SILO, once also taken
>> care of) mode.
> 
> This need to change the Flask policy is the crux of my dislike for
> making Xen-internal operations go through XSM checks.  It is wrong,
> IMO, to require the separate policy to grant xen_t permissions for
> proper operation.  I prefer restructuring the code so Xen itself
> doesn't have to go through XSM checks since that way Xen itself always
> runs properly regardless of the policy.
> 
> This is more based on unmap_domain_pirq having an XSM check for an
> internal operation.  dom0less, hyperlaunch, & Live Update may all be
> niche use cases where requiring a policy change is reasonable.

I will continue to agree with the base logic that today any least
privilege separation imposed is merely artificial in the face of any
attack that gains execution control over hypervisor space. What I will
disagree with is using that as a justification to create tight couplings
between the internals of the hypervisor that have a potential of causing
more work in the future when people are looking to use for instance's
Arms upcoming capability pointers as a real separation enforcement
mechanisms to de-privilege portions of the hypervisor.

While on principle it is justified to object to having policy statements
that present a facade, is it not better to look longer term than object
to some thing on principle based in the now?

v/r,
dps


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 14:20:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 14:20:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296390.504479 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZZAo-0005nf-JG; Wed, 30 Mar 2022 14:19:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296390.504479; Wed, 30 Mar 2022 14:19:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZZAo-0005nY-EZ; Wed, 30 Mar 2022 14:19:46 +0000
Received: by outflank-mailman (input) for mailman id 296390;
 Wed, 30 Mar 2022 14:19:45 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ZQ0c=UJ=citrix.com=prvs=08136f46d=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nZZAm-0005nS-OE
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 14:19:45 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 6fae2994-b034-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 16:19:41 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6fae2994-b034-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648649981;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=dPZxfd7Ss88IJOBqLuP7tVQkkYiY16sb3M8aXCxsSWw=;
  b=G6REDqKCY71094SkEBlWuaijLyiOxFcF+maRkLFX99egiCwpqocG2RRH
   IsbTZzhyT6GCStK82MqBjOtWYvLw0xwmdMHF1DKwcR2e23sTEGo7EjPAX
   8umAHfrJM5sSGOgB0yfao2fltNwXYnAsgyhlD49LV+1AKgzTe9PKusSiI
   c=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67549983
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:zbJuK6liWBkRURxBQPyduJro5gy/JkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xJNWGmCP/aLZjakeotzO9y29E1U6pLUm4VmSAJt+S0zHyMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiWFvV4
 7senuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYcQFuE7CTm+cnaTZSDzwgJK5d/ub3Li3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3oHZvwCufFf87aZvCX7/L9ZlT2zJYasVmQ6mDO
 5tIOWEHgBLoR0cfYmsGI54Fh72Khlz1XxZ+q2+tnP9ii4TU5FMoi+W8WDbPQfSVQe1Fk0Deo
 XjJl0z1BRwQOdi3wD+M4HWqwOPC9Qv4X4QIHbH+6f9ug3WU3GUYDBBQXly+ydG7gEOjX9NUK
 2QP5zEj66M18SSDXtT7GhG1vnOAlhodQMZLVf037hmXzajZ6BrfAXILJgOtc/R/6pVwH2Zzk
 AbUwZW5XlSDrYF5V1ql8PC5sGyxOhIvAmUeeHEdThADuuns9dRbYg30cv5vF6u8j9vQED72w
 iyXoCVWu4j/nfLnxI3gowmZ3mvESozhC1dsu16JBj7NAhZRPtbNWmC+1bTMAR+sxq69R0LJg
 nULktP2AAsmXcDUz3zlrAng8diUCxe53N/03AYH83oJrW3FF5ufkWZ4umsWyKBBaJtsRNMRS
 BWP0T69HbcKVJdQUYd5YpiqF+MhxrX6GNLuW5j8N4QSMsUhLlbdpHs2OSZ8OlwBdmB2y8nT3
 r/BLK6R4YsyU/w7nFJauc9DuVPU+szO7TyKHs2qp/hW+bGfeGSUWd843KimNYgEAFe/iFyNq
 b53bpLSoz0GCbGWSnSHoOY7cAFRRVBmVM+eliCiXrPaSuaQMDp6UKG5LHJIU9ENopm5Yc+Vp
 ynkARUJkQCXaL+uAVziV02PoYjHBP5XhXk6ITYtLRCv3X0iapyo96ARa908erxPyQCp5acco
 yUtEylYPslydw==
IronPort-HdrOrdr: A9a23:0cxXz66/Q3v8MSvYXwPXwSSBI+orL9Y04lQ7vn2ZFiY7TiXIra
 yTdaoguCMc6AxxZJkh8erwX5VoZUmsj6KdgLNhRotKOTOJhILGFvAB0WKP+UyEJ8S6zJ8h6U
 4CSdkBNDSTNykCsS+S2mDReLxBsbq6GeKT9J/jJh9WPH5XgspbnmFE42igYylLrF4sP+tEKH
 PQ3LsPmxOQPVAsKuirDHgMWObO4/XNiZLdeBYDQzoq8hOHgz+E4KPzV0Hw5GZUbxp/hZMZtU
 TVmQ3w4auu99m91x/nzmfWq7BbgsHoxNdvDNGFzuIVNjLvoAC1Y5kJYczLgBkF5MWUrHo6mt
 jFpBkte+x19nPqZ2mw5SDg3gHxuQxen0PK+Bu9uz/OsMb5TDU1B45qnoRCaCbU7EImoZVVzL
 9L93jxjesaMTrw2ADGo/TYXRBjkUS55VA4l/QIsnBZWYwCLJdMsI0k+l9PGptoJlO21GkeKp
 ghMCjg3ocWTbvDBEqp/lWHgebcFEjbJy32DXTr4aeuontrdHMQ9Tps+CVQpAZDyHsHceg12w
 31CNUYqFhwdL5kUUtcPpZ3fSLlMB26ffrzWFjiU2gPUpt3fk7wlw==
X-IronPort-AV: E=Sophos;i="5.90,222,1643691600"; 
   d="scan'208";a="67549983"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=j2T2lFXR9xptOy6RVK88YfskQuXgUkHR/0jfIvDupWbgY4m9Ber8FD+4oGR9qTbymMTlTb3i3UVWqi8bghm0WNYgkQPBGBa+gEFiN2QvpQ/okJ/B2dGTf5Eu/5cA5egj2C9FyskmvuQ9u+XiL5IpxlXDI3gbS7DDwSq+MTiKoaFDRJN4hYNQjhviBts6lBJygInLZja1K4gqyNUZ8qjawM2wOmGlGyU8Gel0w6LCXB3YBa+KGZ2u4NlS22zzjm58NuvpxQPOuYp5xSR3rT1G+zLpjo0USXYHeGGRTZYq1+u59qrGDof5Mgu2hOh3LCiauHSNW69mWkPii+qaUG52wg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=1vz7X0ovNdPoy6DasZte3c/fXEnJEYSs+oV9r1hVhM8=;
 b=EukQ7ROE18Y52lZK6HiLzA9b/6dlqzdipGb5c5TNEpUgn1GZpR0bqr701Z7nAykXxqTKsXefyqJ/T/qzwLU5A2DvoeiiZcMa22STOX3mvfcasb5cguWWuRD30GVTjebAnoowRnPbbPKxMpOoJER+uV8OQWtXBCLRFA0w1qkmV5eQqsteRRvjU8zoa0Z5OpXE7MaFK4058sdkZYs1zELAGlBeS0f9GT4DLprGQRBRG1ZIVWhK8xcMzpnCov3l4e8ya+p+mdzmc6ULXejkbwBvfhZwI8AB5XnTxyDtGiNGkXSWF0rSilkxUKbVoYIc4qr/5HZNBYEb+4e106LObxNwuQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=1vz7X0ovNdPoy6DasZte3c/fXEnJEYSs+oV9r1hVhM8=;
 b=tXWHX4AQdz36tKaNfeeoKaK7c4TLXE16/Ao3z1w70c3VifX2gW1GsS8opPpfl8ZhEIOrD77c7P4Ftwf66PBsTChemm2BEWA4LOTXYJwNcWqrg1u8HBVodX8tLnhn2cAq2dn0hMDp4fUQrFRRwlImMMLYHrtzy2KoePsIZP2pBgA=
Date: Wed, 30 Mar 2022 16:19:30 +0200
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Ross
 Lagerwall <ross.lagerwall@citrix.com>, Konrad Wilk <konrad.wilk@oracle.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>, Bjoern
 Doebel <doebel@amazon.de>
Subject: Re: [PATCH v2] livepatch: account for patch offset when applying NOP
 patch
Message-ID: <YkRm8oc0vQzRQ7VL@Air-de-Roger>
References: <772f0afc-64db-6b98-af49-bd970ac78cbb@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <772f0afc-64db-6b98-af49-bd970ac78cbb@suse.com>
X-ClientProxiedBy: LO4P123CA0425.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:18b::16) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 56f5af6b-2e3d-43de-0ba6-08da12585071
X-MS-TrafficTypeDiagnostic: BYAPR03MB4229:EE_
X-Microsoft-Antispam-PRVS: <BYAPR03MB4229DB41276F9E9ABAB3A3CF8F1F9@BYAPR03MB4229.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(83380400001)(26005)(8936002)(316002)(186003)(6512007)(2906002)(6916009)(5660300002)(82960400001)(86362001)(15650500001)(6506007)(6666004)(54906003)(508600001)(66946007)(9686003)(66556008)(38100700002)(4326008)(33716001)(8676002)(66476007)(85182001)(6486002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?REZLRkxZVk9oakJVTmpWTDUxTDlienRTZWlibElyTWJzNExzSHluNFBObWpj?=
 =?utf-8?B?MVNLMHAwQlZmTk9IaUcvU1JmNWRvQzBSbWhLTTk0VVhySy9ON0V1UmorZk5r?=
 =?utf-8?B?NFVxSU1sdnlaUGtGMkQ3LzhSUkVuTFVJSEJqR2FHYW5jYk1VZzVBdVVnUGhv?=
 =?utf-8?B?Qm1QVmpyaFdFdXg0dTJVRFltMzNFbnFJUlRnM0xXdlpNam9aMWZDT1dBdVNl?=
 =?utf-8?B?ZUZvQnd6ajBIZmppbS9jOVk1ZmF1aGpTUit1NnFaN0cwOWFFcVZiVzE1WmJl?=
 =?utf-8?B?cUduL091ZDJUbHQ3WkQ2dUQva1lmQ2FJQUUyVW9iaWIrT21mOExZcVM1WU5E?=
 =?utf-8?B?ckhPVjZuZk00cnoxNm53cVpMd2REc0FDWExRQXJnZVhXMkdxNXlZdHNMaU5s?=
 =?utf-8?B?VFpoUFRKSm5TYVhVQ1oraU5kWWhkdUwzTkRUMjVFN09wdDB1L0syMWJQUFBM?=
 =?utf-8?B?MHpnVGJvNlhsb1dCMVgvc2dCS0NWcE9IMVJ1OHFyVU8wUDBTVDA2SUNrNTBm?=
 =?utf-8?B?b3hQbk12QUtMbmV2RDFVMVpGdFJoSElOL2xPWS9lbWp3c08xaXFUa01PZUF4?=
 =?utf-8?B?WlZpTnh6Vzgwc2lxaGpjZ0RYR2M1ZDZaWWxSSHk1Qncvc1dSZGRVNUl1UmI1?=
 =?utf-8?B?NDYzbUIrRkRxcmszVEI3d0VLYklEWnowTTdudWFnUEZDTk9zWVlCd2VURzlq?=
 =?utf-8?B?MmRXWjZpdUtnVUJjczNPcTN2bVBYVzRldlRBekhEc1NyN2k5VEljVjg5d3Ev?=
 =?utf-8?B?WEdZRmgyTU9SQlV0dnJQRXg4eWhLdi9pcktWalFZVmRxeE9oZWlSWUNtWlM4?=
 =?utf-8?B?T0R3K2F1UFJvRXZsd3psSnhtY1pDSW04Y2dMZ1NjbXJZM3hma2ZjOVV1T0dY?=
 =?utf-8?B?bWg1ZGhOTmtqSTU4VnJ6dEVSR3FOLzRrWGNlQjQwblpNZVN4M1dWb2JUUWRi?=
 =?utf-8?B?OFpMZmxrMGxRZDJIdk9ET0xtS0ZLTjMreTBqY0tyTTZ0VGR2L0hJSWVoUzN5?=
 =?utf-8?B?U2J5NzhKTUFhRmNBTk10Zmc1QzNYWWxjVlBkMFZ6aW9rMzJxbjY5NzgvSklZ?=
 =?utf-8?B?ZnR2MEw3WXoyRk92dXZoUmg2b1gwUUpDUnpKck1vZ0dDQmp6N2M5U2hsRmx4?=
 =?utf-8?B?OHdMaitrYTRZd3FWeUduOStjTmZzT1dLNWRNbGR3bGdraFRIdVI0OHhOcUd3?=
 =?utf-8?B?clJpcUhVcWdNZ3dWV0hHcXNhUW9OQ09sTERPUWhWaVJFT2VhTGd6SHlpUkQ0?=
 =?utf-8?B?WkJ2S3Ryckhhd01TbDNSZ1VWL3ovNnQ1Sm1wemFqekl5LzNHaEltMW1rWmx3?=
 =?utf-8?B?ODFZNlllYW5wMWROOFZJeDBJd2psZm9xT0NNd0pMUk5XUlV5eE1jbVU3VFZF?=
 =?utf-8?B?Z2FzL1RCa3I0dlhkSDZ6NUFiSnE4WUlCcGNDYVdVZkFpUk1Qb0xrNEdEV0NH?=
 =?utf-8?B?aVhpUGhlaW13ZVA2Z1VNTjFHTVNLczdXUDA4UVJLVmIxZkpYZWhmTkdFZXZ5?=
 =?utf-8?B?ZFcyMlFPOElLTjEvSnBPYkxoRVRGTEdMS2VmZTZYeE1QU296REt2NFhZNTN0?=
 =?utf-8?B?RHl3blR1VDR3Y1NkM1VzcjVEQVhEZDgybnVlc1BScFhTZFYrUGxHcWdOall6?=
 =?utf-8?B?dnZIM3ErNkFycXNWd3VVZ2FZSTEzNzZESW9wWUFXaGJiZEZ4Ymo5c1QrTUgy?=
 =?utf-8?B?cW5nSW91eDIzYWIzbXgvdklGQXpjWmk0VkZwaU8yWTVsd016VS9oN2dHQ1RT?=
 =?utf-8?B?NUp6ZEIzWGQ2TWRMYm9tWlRqVGkveTJXd2tOQlNBZm5IQTZsTDBjNnN0NkZS?=
 =?utf-8?B?Tzd6NkZrbFIwRUZQVGR3KzVOSEJJOXVGcWpEQmhBaFJTNXB1UEsyUjhoNkx2?=
 =?utf-8?B?dTZZTWttU0hnZDAyQm1oczMvRVNGSTJBL0t0MkdDR1AxQkxCQVlteGVFM29Y?=
 =?utf-8?B?TjdKVHVSbHd2L3lEWVFEOTN4NTNJQnRNV3NZT3VNeGJUSUJ6aERZZFdXNDI2?=
 =?utf-8?B?WktKQzQ0bkVsZ05oWndDamxjcjMvRWJoS0ZlRE9WdGVRUnZHMFFsZFBtQjNP?=
 =?utf-8?B?M1llbm5LUTdnelVvSjFhNzNuSThXQ0grY2RtVGRNWWVsdTNjbk1ZNTU0QTVx?=
 =?utf-8?B?SGtuZWExZVF2cGVFRlcrVlYzRG9YN2Jtak5aMFhPNWNCTWlyMEgvK0RncXgv?=
 =?utf-8?B?WmEreE81OXdvZ2paZGkwaFhEcStWZ3pwNlNrZ291anFvN2JJZCtHTENJaVlE?=
 =?utf-8?B?dlJhWmU4MWhqbFdJeW8xVjlNWDdmTUtpZ0I5dHJ3WjFNc28rVjUzSVdPcTV5?=
 =?utf-8?B?S2NLZXg0b1d2aU9SSDlTVlpzbHlUVTROT3p1Rnc0Wk9OTzZKZ0tyRjJBdDU2?=
 =?utf-8?Q?/sL+K6b9/oRrabvk=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 56f5af6b-2e3d-43de-0ba6-08da12585071
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 14:19:34.4072
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: ommH41O/9ZhEWFGRB+mlVCsljGqzH6+ZzFM6u6jlfP1c36xuBNU/kYyX8EqiS/VBlheM1q3hMWQS+cxuv4Sc8A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB4229
X-OriginatorOrg: citrix.com

On Wed, Mar 30, 2022 at 01:05:31PM +0200, Jan Beulich wrote:
> While not triggered by the trivial xen_nop in-tree patch on
> staging/master, that patch exposes a problem on the stable trees, where
> all functions have ENDBR inserted. When NOP-ing out a range, we need to
> account for this. Handle this right in livepatch_insn_len().
> 
> This requires livepatch_insn_len() to be called _after_ ->patch_offset
> was set. Note however that the earlier call cannot be deleted. In fact
> its result should have been used to guard the is_endbr64() /
> is_endbr64_poison() invocations - add the missing check now. While
> making that adjustment, also use the local variable "old_ptr"
> consistently.
> 
> Fixes: 6974c75180f1 ("xen/x86: Livepatch: support patching CET-enhanced functions")

I have to admit I'm confused as to why that commit carries a Tested-by
from Arm.  Did Arm test the commit on x86 hardware?  Because that
commit only touches x86 specific code.

> Signed-off-by: Jan Beulich <jbeulich@suse.com>

FWIW, on the original implementation, I think it would have been
clearer to advance old_ptr and adjust the length?

> ---
> v2: Re-issue livepatch_insn_len(). Fix buffer overrun.
> ---
> Only build tested, as I don't have a live patching environment available.
> 
> For Arm this assumes that the patch_offset field starts out as zero; I
> think we can make such an assumption, yet otoh on x86 explicit
> initialization was added by the cited commit.
> 
> Note that the other use of is_endbr64() / is_endbr64_poison() in
> arch_livepatch_verify_func() would need the extra check only for
> cosmetic reasons, because ARCH_PATCH_INSN_SIZE > ENDBR64_LEN (5 > 4).
> Hence I'm not altering the code there.
> 
> --- a/xen/arch/x86/livepatch.c
> +++ b/xen/arch/x86/livepatch.c
> @@ -157,9 +157,15 @@ void noinline arch_livepatch_apply(struc
>       * loaded hotpatch (to avoid racing against other fixups adding/removing
>       * ENDBR64 or similar instructions).
>       */
> -    if ( is_endbr64(old_ptr) || is_endbr64_poison(func->old_addr) )
> +    if ( len >= ENDBR64_LEN &&
> +         (is_endbr64(old_ptr) || is_endbr64_poison(old_ptr)) )
>          func->patch_offset += ENDBR64_LEN;
>  
> +    /* This call must be re-issued once ->patch_offset has its final value. */
> +    len = livepatch_insn_len(func);
> +    if ( !len )
> +        return;
> +
>      memcpy(func->opaque, old_ptr + func->patch_offset, len);
>      if ( func->new_addr )
>      {
> --- a/xen/include/xen/livepatch.h
> +++ b/xen/include/xen/livepatch.h
> @@ -90,7 +90,7 @@ static inline
>  unsigned int livepatch_insn_len(const struct livepatch_func *func)
>  {
>      if ( !func->new_addr )
> -        return func->new_size;
> +        return func->new_size - func->patch_offset;

Seeing as func->patch_offset is explicitly initialized in
arch_livepatch_apply for x86, do we also need to do the same on Arm
now that the field will be used by common code?

Maybe the initialization done in arch_livepatch_apply for x86 is not
strictly required.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 14:24:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 14:24:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296396.504490 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZZFH-0007CN-4T; Wed, 30 Mar 2022 14:24:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296396.504490; Wed, 30 Mar 2022 14:24:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZZFH-0007CG-0u; Wed, 30 Mar 2022 14:24:23 +0000
Received: by outflank-mailman (input) for mailman id 296396;
 Wed, 30 Mar 2022 14:24:22 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=x//1=UJ=tklengyel.com=tamas@srs-se1.protection.inumbo.net>)
 id 1nZZFF-0007C8-Qp
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 14:24:22 +0000
Received: from MTA-14-4.privateemail.com (mta-14-4.privateemail.com
 [198.54.118.206]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 15c38f10-b035-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 16:24:20 +0200 (CEST)
Received: from mta-14.privateemail.com (localhost [127.0.0.1])
 by mta-14.privateemail.com (Postfix) with ESMTP id 06CA318000A4
 for <xen-devel@lists.xenproject.org>; Wed, 30 Mar 2022 10:24:18 -0400 (EDT)
Received: from mail-oa1-f54.google.com (unknown [10.20.151.181])
 by mta-14.privateemail.com (Postfix) with ESMTPA id D574F18000A5
 for <xen-devel@lists.xenproject.org>; Wed, 30 Mar 2022 10:24:17 -0400 (EDT)
Received: by mail-oa1-f54.google.com with SMTP id
 586e51a60fabf-dacc470e03so22207390fac.5
 for <xen-devel@lists.xenproject.org>; Wed, 30 Mar 2022 07:24:17 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 15c38f10-b035-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648650258;
	bh=bNdhSLl/rMLoCuTDzNzWFZxT6NidsBqROXv4WuDE9JA=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=KVohziEoTwz7uTc2qA5unJWF4fTvIgpmx49+z00QZzSeaetxn/oxR6QiavCk55tF1
	 g1S1e+pJXF+s6yjU/iAvsu6HthHoMZWkGYCvIQKvOu2un1DdaOylF90BmGB3yza6QL
	 52gav/rf8D839fMo7QIaIHrwhYq3r5BS0PApMJTTAwkJ+zcHiscxQqRt3BfmHXfnW+
	 I63hQDWEdnjEIxpIxBHjNhy3hpCdaXK84lYwuyfTIQkgajOz9ndIAch2vtCkC6Ldc+
	 Ee6x9dBf3/atymRbScorSUZcHhuTJsfwut4xVgwg1tg1tGs+zpHYSJ17Q8RrLk/va1
	 FhJzOfZ7Fb6uQ==
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=tklengyel.com;
	s=default; t=1648650257;
	bh=bNdhSLl/rMLoCuTDzNzWFZxT6NidsBqROXv4WuDE9JA=;
	h=References:In-Reply-To:From:Date:Subject:To:Cc:From;
	b=i70PknU0XBO6jVUaS3iGtiEwj7hrokJRhKvSIsd3uTEoTTov4LQ6Wuu8cmBb0ju90
	 ePEHaO/gTf30YvdzGNlVZNSV/Aa/ZyFoyJ4BV0fDs56+rsr0fwTKz2W2qDXm7pDG8Y
	 PNo6Ba4mvV9FHxb68LjTv6weNf/O8AEijl0u6sqbUEw95NPkVx/ngq+f+4ptwydJ4y
	 DR46KwLn4qjKO+h8mHhrgXRU2sQ6HwnoH9gtpsVizlmssyn6paN12Cxcmssw6yahKp
	 U1/WueB0BMjw+vWVc6ijT7fGBAZbAcgv9D2V6Cedzefe+3Jsvk+v7ImHWS8KwBtcXd
	 T8tHaK8XLOAnw==
X-Gm-Message-State: AOAM530J43VlLXHHKDRqpSNfdTzSmFSgVlpKvBcDfA96okHPBEaSa9+p
	W7qfCstXKreJ/5q56T0+T2jrk1sjxB51+gSFO3k=
X-Google-Smtp-Source: ABdhPJwEUk7w2F82Tv6av+AzOvBISjGC28e7tQxZu0Vj47uTdoaT8K4W4pX4jnTX+/wnAbT8y4HV4Hl9nS3F1Uvziy4=
X-Received: by 2002:a05:6870:ea81:b0:db:3e68:7ae0 with SMTP id
 s1-20020a056870ea8100b000db3e687ae0mr2259246oap.9.1648650253236; Wed, 30 Mar
 2022 07:24:13 -0700 (PDT)
MIME-Version: 1.0
References: <ab6bb88e90e5649c60e08a1680b3a2390441031b.1648561546.git.tamas.lengyel@intel.com>
 <3ebadf898bf9e165d657a31c0aa98bbd300ffcb2.1648561546.git.tamas.lengyel@intel.com>
 <bdfbfe3e-66c5-3f99-8f50-16f38bfa78d1@suse.com> <CABfawhmxeK0RhXPzg9aqE8iytyNr72jekJ_FN9qWE1b32gxTkg@mail.gmail.com>
 <afabea4f-9497-726e-b5de-ee2df4391641@suse.com>
In-Reply-To: <afabea4f-9497-726e-b5de-ee2df4391641@suse.com>
From: Tamas K Lengyel <tamas@tklengyel.com>
Date: Wed, 30 Mar 2022 10:24:01 -0400
X-Gmail-Original-Message-ID: <CABfawhnxW9GQDRtVGYHcq1eMmExkHj9-OBEKifZkuKCKxw=KYg@mail.gmail.com>
Message-ID: <CABfawhnxW9GQDRtVGYHcq1eMmExkHj9-OBEKifZkuKCKxw=KYg@mail.gmail.com>
Subject: Re: [PATCH v2 3/3] x86/mem_sharing: make fork_reset more configurable
To: Jan Beulich <jbeulich@suse.com>
Cc: Tamas K Lengyel <tamas.lengyel@intel.com>, Wei Liu <wl@xen.org>, 
	Anthony PERARD <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, 
	Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, 
	Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, 
	=?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>, 
	Alexandru Isaila <aisaila@bitdefender.com>, Petre Pircalabu <ppircalabu@bitdefender.com>, 
	Xen-devel <xen-devel@lists.xenproject.org>
Content-Type: multipart/alternative; boundary="000000000000b4008405db704c23"
X-Virus-Scanned: ClamAV using ClamSMTP

--000000000000b4008405db704c23
Content-Type: text/plain; charset="UTF-8"

On Wed, Mar 30, 2022, 9:34 AM Jan Beulich <jbeulich@suse.com> wrote:

> On 30.03.2022 15:19, Tamas K Lengyel wrote:
> > On Wed, Mar 30, 2022, 6:31 AM Jan Beulich <jbeulich@suse.com> wrote:
> >> On 29.03.2022 16:03, Tamas K Lengyel wrote:
> >>> --- a/xen/arch/x86/include/asm/mem_sharing.h
> >>> +++ b/xen/arch/x86/include/asm/mem_sharing.h
> >>> @@ -85,6 +85,9 @@ static inline bool mem_sharing_is_fork(const struct
> >> domain *d)
> >>>  int mem_sharing_fork_page(struct domain *d, gfn_t gfn,
> >>>                            bool unsharing);
> >>>
> >>> +int mem_sharing_fork_reset(struct domain *d, bool reset_state,
> >>> +                           bool reset_memory);
> >>
> >> Please avoid passing multiple booleans, even more so when you already
> >> derive them from a single "flags" value. This would likely be easiest
> >> if you re-used the VM_EVENT_FLAG_RESET_FORK_* values also for
> >> XENMEM_FORK_RESET_*, with suitable BUILD_BUG_ON() put in place to
> >> prove they're the same.
> >
> > I don't see why that would be an improvement in any way. I also don't
> want
> > to make VM_EVENT flags tied to the XENMEM ones as they are separate
> > interfaces. I rather just drop the changes to the XENMEM interface then
> do
> > that.
>
> If the function gained two or three more flags, how would that look to
> you? And how would you easily identify the correct order of all the
> booleans?
>

IMHO we can cross that bridge when and if that becomes necessary. Also not
sure what you mean by the order of the booleans - that's irrelevant since
the booleans are named?


> >>> @@ -394,6 +399,16 @@ static int vm_event_resume(struct domain *d,
> struct
> >> vm_event_domain *ved)
> >>>              if ( rsp.reason == VM_EVENT_REASON_MEM_PAGING )
> >>>                  p2m_mem_paging_resume(d, &rsp);
> >>>  #endif
> >>> +#ifdef CONFIG_MEM_SHARING
> >>> +            if ( mem_sharing_is_fork(d) )
> >>> +            {
> >>> +                bool reset_state = rsp.flags &
> >> VM_EVENT_FLAG_RESET_FORK_STATE;
> >>> +                bool reset_mem = rsp.flags &
> >> VM_EVENT_FLAG_RESET_FORK_MEMORY;
> >>> +
> >>> +                if ( reset_state || reset_mem )
> >>> +                    ASSERT(!mem_sharing_fork_reset(d, reset_state,
> >> reset_mem));
> >>> +            }
> >>> +#endif
> >>
> >> Should the two flags be rejected in the "else" case, rather than
> >> being silently ignored?
> >
> > What do you mean by rejected? There is no feasible "rejection" that could
> > be done in this path other then skipping it.
>
> IOW no return value being handed back to the requester? The function
> does have an error return path, so I don't see why you couldn't return
> -EINVAL.
>

The way vm_event response flags are right now is "best effort". Error code
from this path never reaches the caller, which are usually callback
functions that return these flags. The best way for an error code to reach
the caller would be by making a separate vm_event on the ring and sending
that, but that's non-existent today and also hasn't been needed. It
certainly isn't needed here since there should be no feasable way for a
fork to fail a reset request (hence the assert).

Tamas

>

--000000000000b4008405db704c23
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto"><div><br><br><div class=3D"gmail_quote"><div dir=3D"ltr" =
class=3D"gmail_attr">On Wed, Mar 30, 2022, 9:34 AM Jan Beulich &lt;<a href=
=3D"mailto:jbeulich@suse.com">jbeulich@suse.com</a>&gt; wrote:<br></div><bl=
ockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #=
ccc solid;padding-left:1ex">On 30.03.2022 15:19, Tamas K Lengyel wrote:<br>
&gt; On Wed, Mar 30, 2022, 6:31 AM Jan Beulich &lt;<a href=3D"mailto:jbeuli=
ch@suse.com" target=3D"_blank" rel=3D"noreferrer">jbeulich@suse.com</a>&gt;=
 wrote:<br>
&gt;&gt; On 29.03.2022 16:03, Tamas K Lengyel wrote:<br>
&gt;&gt;&gt; --- a/xen/arch/x86/include/asm/mem_sharing.h<br>
&gt;&gt;&gt; +++ b/xen/arch/x86/include/asm/mem_sharing.h<br>
&gt;&gt;&gt; @@ -85,6 +85,9 @@ static inline bool mem_sharing_is_fork(const=
 struct<br>
&gt;&gt; domain *d)<br>
&gt;&gt;&gt;=C2=A0 int mem_sharing_fork_page(struct domain *d, gfn_t gfn,<b=
r>
&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 bool unsharing);<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; +int mem_sharing_fork_reset(struct domain *d, bool reset_state=
,<br>
&gt;&gt;&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0bool reset_memory);<br>
&gt;&gt;<br>
&gt;&gt; Please avoid passing multiple booleans, even more so when you alre=
ady<br>
&gt;&gt; derive them from a single &quot;flags&quot; value. This would like=
ly be easiest<br>
&gt;&gt; if you re-used the VM_EVENT_FLAG_RESET_FORK_* values also for<br>
&gt;&gt; XENMEM_FORK_RESET_*, with suitable BUILD_BUG_ON() put in place to<=
br>
&gt;&gt; prove they&#39;re the same.<br>
&gt; <br>
&gt; I don&#39;t see why that would be an improvement in any way. I also do=
n&#39;t want<br>
&gt; to make VM_EVENT flags tied to the XENMEM ones as they are separate<br=
>
&gt; interfaces. I rather just drop the changes to the XENMEM interface the=
n do<br>
&gt; that.<br>
<br>
If the function gained two or three more flags, how would that look to<br>
you? And how would you easily identify the correct order of all the<br>
booleans?<br></blockquote></div></div><div dir=3D"auto"><br></div><div dir=
=3D"auto">IMHO we can cross that bridge when and if that becomes necessary.=
 Also not sure what you mean by the order of the booleans - that&#39;s irre=
levant since the booleans are named?<br></div><div dir=3D"auto"><br></div><=
div dir=3D"auto"><div class=3D"gmail_quote"><blockquote class=3D"gmail_quot=
e" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<br>
&gt;&gt;&gt; @@ -394,6 +399,16 @@ static int vm_event_resume(struct domain =
*d, struct<br>
&gt;&gt; vm_event_domain *ved)<br>
&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 if ( rsp.reaso=
n =3D=3D VM_EVENT_REASON_MEM_PAGING )<br>
&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =
p2m_mem_paging_resume(d, &amp;rsp);<br>
&gt;&gt;&gt;=C2=A0 #endif<br>
&gt;&gt;&gt; +#ifdef CONFIG_MEM_SHARING<br>
&gt;&gt;&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 if ( mem_sharing_is=
_fork(d) )<br>
&gt;&gt;&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 {<br>
&gt;&gt;&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 bool =
reset_state =3D rsp.flags &amp;<br>
&gt;&gt; VM_EVENT_FLAG_RESET_FORK_STATE;<br>
&gt;&gt;&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 bool =
reset_mem =3D rsp.flags &amp;<br>
&gt;&gt; VM_EVENT_FLAG_RESET_FORK_MEMORY;<br>
&gt;&gt;&gt; +<br>
&gt;&gt;&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 if ( =
reset_state || reset_mem )<br>
&gt;&gt;&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 ASSERT(!mem_sharing_fork_reset(d, reset_state,<br>
&gt;&gt; reset_mem));<br>
&gt;&gt;&gt; +=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 }<br>
&gt;&gt;&gt; +#endif<br>
&gt;&gt;<br>
&gt;&gt; Should the two flags be rejected in the &quot;else&quot; case, rat=
her than<br>
&gt;&gt; being silently ignored?<br>
&gt; <br>
&gt; What do you mean by rejected? There is no feasible &quot;rejection&quo=
t; that could<br>
&gt; be done in this path other then skipping it.<br>
<br>
IOW no return value being handed back to the requester? The function<br>
does have an error return path, so I don&#39;t see why you couldn&#39;t ret=
urn<br>
-EINVAL.<br></blockquote></div></div><div dir=3D"auto"><br></div><div dir=
=3D"auto">The way vm_event response flags are right now is &quot;best effor=
t&quot;. Error code from this path never reaches the caller, which are usua=
lly callback functions that return these flags. The best way for an error c=
ode to reach the caller would be by making a separate vm_event on the ring =
and sending that, but that&#39;s non-existent today and also hasn&#39;t bee=
n needed. It certainly isn&#39;t needed here since there should be no feasa=
ble way for a fork to fail a reset request (hence the assert).</div><div di=
r=3D"auto"><br></div><div dir=3D"auto">Tamas</div><div dir=3D"auto"><div cl=
ass=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0=
 .8ex;border-left:1px #ccc solid;padding-left:1ex">
</blockquote></div></div></div>

--000000000000b4008405db704c23--


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 14:43:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 14:43:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296402.504501 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZZXi-0001AE-SU; Wed, 30 Mar 2022 14:43:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296402.504501; Wed, 30 Mar 2022 14:43:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZZXi-0001A7-PA; Wed, 30 Mar 2022 14:43:26 +0000
Received: by outflank-mailman (input) for mailman id 296402;
 Wed, 30 Mar 2022 14:43:25 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZZXh-00019x-92; Wed, 30 Mar 2022 14:43:25 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZZXh-0004UT-5s; Wed, 30 Mar 2022 14:43:25 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZZXg-0004Rj-Qn; Wed, 30 Mar 2022 14:43:24 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZZXg-0003gQ-PB; Wed, 30 Mar 2022 14:43:24 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=XGvYcg2GTTQj+ZUU4iw9t6MYZpX2gCal27BtdZXCn68=; b=lLPLwqPBbvMmKMZQGjvLXTYN5K
	9BmbPst6Qi7z2xJPjMiVTZN1BOiy+SvglvPSdiFuwFJ/EWdsTo8Pd6aXu0Fe+SIZxQ3ipmMtw+/xf
	Nh+7yNhQTVTq/d/AA41KEogzpQgJzBjpq/LXulMYwvEQCVq105dD9zyZ8/hTGGmJr5Jo=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168986-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.14-testing test] 168986: regressions - FAIL
X-Osstest-Failures:
    xen-4.14-testing:test-amd64-amd64-livepatch:livepatch-run:fail:regression
    xen-4.14-testing:test-amd64-i386-livepatch:livepatch-run:fail:regression
    xen-4.14-testing:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:debian-hvm-install:fail:regression
    xen-4.14-testing:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=1e595d9c2b8608bcef48d6a69cc2f6135780bcc0
X-Osstest-Versions-That:
    xen=ca304edd3ba8c19211107fd2e898249987557ce5
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 30 Mar 2022 14:43:24 +0000

flight 168986 xen-4.14-testing real [real]
flight 169025 xen-4.14-testing real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168986/
http://logs.test-lab.xenproject.org/osstest/logs/169025/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-livepatch   13 livepatch-run            fail REGR. vs. 168506
 test-amd64-i386-livepatch    13 livepatch-run            fail REGR. vs. 168506
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm 12 debian-hvm-install fail REGR. vs. 168506

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168506
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168506
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168506
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168506
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168506
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168506
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168506
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168506
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168506
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168506
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168506
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168506
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  1e595d9c2b8608bcef48d6a69cc2f6135780bcc0
baseline version:
 xen                  ca304edd3ba8c19211107fd2e898249987557ce5

Last test of basis   168506  2022-03-10 14:16:31 Z   20 days
Failing since        168862  2022-03-25 17:36:39 Z    4 days    6 attempts
Testing same since   168957  2022-03-28 21:36:20 Z    1 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bjoern Doebel <doebel@amazon.de>
  Jan Beulich <jbeulich@suse.com>
  Jiamei Xie <jiamei.xie@arm.com>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Thiner Logoer <logoerthiner1@163.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 fail    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   fail    
 test-amd64-i386-livepatch                                    fail    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 410 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 14:56:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 14:56:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296411.504512 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZZjx-0002fr-22; Wed, 30 Mar 2022 14:56:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296411.504512; Wed, 30 Mar 2022 14:56:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZZjw-0002fk-Tu; Wed, 30 Mar 2022 14:56:04 +0000
Received: by outflank-mailman (input) for mailman id 296411;
 Wed, 30 Mar 2022 14:56:03 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=b505=UJ=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZZjv-0002fe-GL
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 14:56:03 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 8413ea7b-b039-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 16:56:02 +0200 (CEST)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2170.outbound.protection.outlook.com [104.47.17.170]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-7-hGd4ozC4OzynfnxIVXI6bw-1; Wed, 30 Mar 2022 16:56:00 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by PAXPR04MB9470.eurprd04.prod.outlook.com (2603:10a6:102:2b3::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.23; Wed, 30 Mar
 2022 14:55:59 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.019; Wed, 30 Mar 2022
 14:55:59 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8413ea7b-b039-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648652161;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=3Z4joDggrSVhx32z7466yWKENbxiiwcX+8sj9oKOMa8=;
	b=dYg/MGCuolK5Vaxm2ZUeqscugZ03W6x6Ff/K3ZrbanwZ2AASUMLMFGRaDIh6miKbcPY0J4
	ZGPZx3qsX4pw4B9hrWnYE2BeugdkJC198KU8p9JgLy6WyEOQKeqopA3dFE2CqosPfeKGVw
	Ay/qzfem4noCXAxUVd+7QyUWDNkKYE0=
X-MC-Unique: hGd4ozC4OzynfnxIVXI6bw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=m0fwyMj0IBMpRrg/zmvFmHRoNlnDhf94p1qutYlKmAQSCRQbkj1xxqQuLsUm0eT9JRxBC2ranQKwoNNPJn9ny9UpZydwJFsq9JrA9oxJ01l+UaHYzlyXOe2YLNmKQTaOpm9Ebo9lcsj303sdTpQjuyu1c6oP+E9T1Sd76Qx8BCGRMLsXZuN1v8ZWg7o0VwjxlDp5S3yMvCICAiMosCLp+iMNCWtsUq/X/0LZUsRzG64bdXV4W2OeJK1iqE53Txw3/DaWjZPR94FbO7ApZ1fmhS5T2agsb7M0PcOxZ3UPcIrN7vPqky5gJ3gWSak6NhmU+6p4wXfa2t6nqYo4mPwPVw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=jHxDX7F96LVMBN5pAoHzZ+IXXj+P9yooSfJBO7M8C+0=;
 b=TsNiC6sFJdzN4RVkY2SqyQ0llJ/rojf24CQk+cUF0JzFXhFB0twNqlIGFlh9jLjCM9hBBCQSxqO1opVJH4pgwCuXoy1nhWLexEqJMweRPv7k8xZLmvksWN0+SsckAFISRSB5u/tFPo5C/bwcbjLUt9Hokl22VI6X7OEnzULpRCTA9sMXz3yF4EetDANk2v+fxZ3FF0tsLA+itIcgL5CP4CbK72LKXlnEJRGSd4a/V0ib10Rh2ers5xDUStmAiaDfX30vlA3x3/wPq5MhZRhNyQYIcMyJu++XpvBmIc0J/U2pRlRjv8yuqcakZVgC5NHQ3BHmCdwUHZ2YuREpP1czag==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <5091d7b3-18d8-1842-a65b-159299cf66e7@suse.com>
Date: Wed, 30 Mar 2022 16:55:52 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2] livepatch: account for patch offset when applying NOP
 patch
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Ross Lagerwall <ross.lagerwall@citrix.com>,
 Konrad Wilk <konrad.wilk@oracle.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 Bjoern Doebel <doebel@amazon.de>
References: <772f0afc-64db-6b98-af49-bd970ac78cbb@suse.com>
 <YkRm8oc0vQzRQ7VL@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YkRm8oc0vQzRQ7VL@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR06CA0203.eurprd06.prod.outlook.com
 (2603:10a6:20b:45d::27) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: b92bd66d-0f2b-4b63-0af3-08da125d641e
X-MS-TrafficTypeDiagnostic: PAXPR04MB9470:EE_
X-Microsoft-Antispam-PRVS:
	<PAXPR04MB9470F7272CF58179D730098BB31F9@PAXPR04MB9470.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(5660300002)(186003)(38100700002)(26005)(8936002)(8676002)(316002)(6666004)(4326008)(31686004)(66946007)(66556008)(66476007)(2616005)(508600001)(36756003)(6486002)(2906002)(31696002)(6512007)(53546011)(6916009)(6506007)(54906003)(15650500001)(83380400001)(86362001)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?/qL+Vdm9CO+oI05Vc9uKePmpoc5aOLLaeVzkduFelDk5rCkISlCtEWMXaILi?=
 =?us-ascii?Q?jkeXKXKNj4ANCcOALq2itnaQgA3J5CTKF8PUch9IoPzf/h6PycNAuejYdQk8?=
 =?us-ascii?Q?2PGZTPtKLFb41x4PLVyQ706jUUkTmJECZEGgvZ7+sz0T5Ndv5kqsq0Va+ptd?=
 =?us-ascii?Q?dAgOOc1PEXrXY5Sw7l7gT9kxmNHze1Oq9pIpeT7joqrA+OaqMnkPACwLVmPo?=
 =?us-ascii?Q?hP7/y5Xb065ilOaBb0Ad2QBunp60kZubduZ3DkDflg/Iq+ATkGCSqNlXuG0l?=
 =?us-ascii?Q?PCgawmLBqERiRLXNiPK4kqx57lmSkJ+EtAnMobeqhjM1IJCM8t9zcUyAGmhF?=
 =?us-ascii?Q?PbK/bWpi4qEYl4vt+MCyI3U507rGNANrGMbMrFu6YOxxeZmhOPtq7vUGwngO?=
 =?us-ascii?Q?K33Wct7VJNcYIlH/G/H2uFfaM27dN/m3Pnv2Bk+51EKT82geWozR5pd52kIY?=
 =?us-ascii?Q?Lo3z/q3tp9kzvAkcf19AE3RVeu2GtmoeZkGBJEoHIssO7ApXR8CXb9XgtwHd?=
 =?us-ascii?Q?3d3TbarJrz2Hmeh++zLs8d+5W5D3Mo+Ke3S8Pvd21pw5OyXjZfIqAZLhK9Wc?=
 =?us-ascii?Q?mGcSDWED9Y//dOUg3VjmsyANT3kCEZmiq6yQWqwo0kcFCQXDvFaqdXMyBciv?=
 =?us-ascii?Q?yeDlPk3Ybc81mh3JFle/FlEMoCVSFXNgBlYOMt1nfQsh95UagoGxon6N2N4A?=
 =?us-ascii?Q?AXTl5kql0rBxCHlG39FVWnNYDPi/tk08OB9VwIe/JRe48P10jX/GbLfycoTc?=
 =?us-ascii?Q?wvY2px9xoKjvoH8a8SI97cOHH11Qtl1g28txVuNfBuEDtINw5YivkgeF0nIv?=
 =?us-ascii?Q?wilSI4jmHqx0nJr67OxsHn8vBb+oCyh5IYiNZIOY2GnJ1QOEjd9aqK8uIGSe?=
 =?us-ascii?Q?8yaskZCf9cLo6nZHWMPLIUrqkE1uAMr4dO18XYwkioGqOtwEfEtWrkW/ZR4k?=
 =?us-ascii?Q?WPZKnMKSTO6y6oTsRgLZasHtCmM2v2B+h1vjziJvM5V5TNXFXLPi2kreDgTZ?=
 =?us-ascii?Q?rMJkuEXvJTDA0J1f0+rxbXL9Ql745NJrsWoDtENErYuMl28hdiJavVqA+sMH?=
 =?us-ascii?Q?RIalMHjuO+HvA3ykE1qvxfWo413sWX1qMYU8o4KF9ABvCxZrmN+KW4h0cT78?=
 =?us-ascii?Q?EfWeMcMLLXDHN/M0IIxpcioSJebnM6xB5e9dR4nO9PjwvCXkwkncEd0xrWNV?=
 =?us-ascii?Q?1Ch+XYRqoL7sz3F2PihDs7U4DZ/nQ5VRB1D49U1z78rjegfzH1lMBNoZYasK?=
 =?us-ascii?Q?o0X0oDWEmrhNQqbQH5eVMcO3Bl8XybVAmsKyP7042wzLQTIXvzCMpT+t+/8H?=
 =?us-ascii?Q?BUP47rdPmgwmecYC0L3+82fIzBfeUpENSHTzAzYaHjIf8h6PWx7d3T8rukQo?=
 =?us-ascii?Q?bstjeKsrNpZ/zCooWG+6Us+OrYz2Y1zU7JsXixcKo8GtTCe+RbR2TmJ+Sx1I?=
 =?us-ascii?Q?g0qPVV3iopMUEhmBCh4iAXakQDZY3minuSuwvIr+g7tetkSXBonoFMdVenjI?=
 =?us-ascii?Q?CtFCQkwmiQPpuZhoEkziPkYTKU9ACse0VsVht89Wp71rmgtxheyQtgKa0OYU?=
 =?us-ascii?Q?xtGoD/YkgeORZqCnINIAir0apo/m95H2X7wJTAjDwTISiH57JKC6gUmRi25u?=
 =?us-ascii?Q?ZdmJFt5ggX3K9Yl3Iz+kUhCJBieNOKiCAmmENKr4YI/lTqQkHa1IoN4EfxWV?=
 =?us-ascii?Q?WiJxD08QXlvdrQoXUfBIMqthUFVRF0R5eeGl8U3E1c72cNP4xMWP8TudfYlg?=
 =?us-ascii?Q?qa0vZVgD1A=3D=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b92bd66d-0f2b-4b63-0af3-08da125d641e
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 14:55:59.0589
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: ZPjoOZBDxtUwt5bwaFR9Ollu/0pOau/llstvGkvFqpdVrNyO5dbf9A8z2CNvyllWC4jXrba8mfryN1BVii4ovg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR04MB9470

On 30.03.2022 16:19, Roger Pau Monn=C3=A9 wrote:
> On Wed, Mar 30, 2022 at 01:05:31PM +0200, Jan Beulich wrote:
>> While not triggered by the trivial xen_nop in-tree patch on
>> staging/master, that patch exposes a problem on the stable trees, where
>> all functions have ENDBR inserted. When NOP-ing out a range, we need to
>> account for this. Handle this right in livepatch_insn_len().
>>
>> This requires livepatch_insn_len() to be called _after_ ->patch_offset
>> was set. Note however that the earlier call cannot be deleted. In fact
>> its result should have been used to guard the is_endbr64() /
>> is_endbr64_poison() invocations - add the missing check now. While
>> making that adjustment, also use the local variable "old_ptr"
>> consistently.
>>
>> Fixes: 6974c75180f1 ("xen/x86: Livepatch: support patching CET-enhanced =
functions")
>=20
> I have to admit I'm confused as to why that commit carries a Tested-by
> from Arm.  Did Arm test the commit on x86 hardware?  Because that
> commit only touches x86 specific code.

;-)

>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>=20
> FWIW, on the original implementation, I think it would have been
> clearer to advance old_ptr and adjust the length?

In my 1st attempt I had confined the change to the x86 file, but it
didn't feel right that I then also had to adjust arch_livepatch_revert().

>> ---
>> v2: Re-issue livepatch_insn_len(). Fix buffer overrun.
>> ---
>> Only build tested, as I don't have a live patching environment available=
.
>>
>> For Arm this assumes that the patch_offset field starts out as zero; I
>> think we can make such an assumption, yet otoh on x86 explicit
>> initialization was added by the cited commit.

Note how this already deals with ...

>> --- a/xen/include/xen/livepatch.h
>> +++ b/xen/include/xen/livepatch.h
>> @@ -90,7 +90,7 @@ static inline
>>  unsigned int livepatch_insn_len(const struct livepatch_func *func)
>>  {
>>      if ( !func->new_addr )
>> -        return func->new_size;
>> +        return func->new_size - func->patch_offset;
>=20
> Seeing as func->patch_offset is explicitly initialized in
> arch_livepatch_apply for x86, do we also need to do the same on Arm
> now that the field will be used by common code?
>=20
> Maybe the initialization done in arch_livepatch_apply for x86 is not
> strictly required.

... your remark. I'd prefer if I could get away without touching Arm
code. Hence if such initialization was needed, I think it ought to
live in common code. If this was a requirement here, I would perhaps
add a prereq patch doing the movement. My preference though would be
for that to be a follow-on, unless there's an actual reason why the
initialization has to happen; personally I think it ought to be a
requirement on patch building that this (and perhaps other) fields
start out as zero. I therefore view the initialization on x86 as a
guard against the patch getting applied a 2nd time. Yet of course it
would then also have helped (not anymore after this change) to use
=3D instead of +=3D when updating ->patch_offset.

Jan



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 15:00:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 15:00:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296416.504523 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZZoF-00048a-Ne; Wed, 30 Mar 2022 15:00:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296416.504523; Wed, 30 Mar 2022 15:00:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZZoF-00048T-KS; Wed, 30 Mar 2022 15:00:31 +0000
Received: by outflank-mailman (input) for mailman id 296416;
 Wed, 30 Mar 2022 15:00:31 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ZQ0c=UJ=citrix.com=prvs=08136f46d=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nZZoF-00048N-4e
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 15:00:31 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 21c0e639-b03a-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 17:00:28 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 21c0e639-b03a-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648652428;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=/UHdTELRYmwjmgV9VY4BxNaqBHztj5nlwNw0GN4Qiz4=;
  b=SfMZCTWcia+pkqAc0EOw/3LQ+UIugWjie5OKHF1n0Iwq+et7732esfeV
   eulEsSQm9bRfh56+990jR/HeQD7CstuOtSMQQhyIB9FR4opx5ifHQS0yG
   NZKOSnBYnHH9oRhZjkZEdrJnkGGwqSEkSBDjvCt0k64qdzsD+kbzYcqea
   U=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67963392
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:kXSrya8mUmGhN7LoOSjSDrUDH36TJUtcMsCJ2f8bNWPcYEJGY0x3z
 moXUWyFb6uKYzP0f90nYIi3p0MPscPWz9RlGwVrqCk8E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oPhW1nlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnZ73Fwd5GLHHpP9eeRcFPxkkHJFY47CSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFJkYtXx6iynQEN4tQIzZQrWM7thdtNs1rp4RTKiFP
 JtDAdZpRDeYeBNfMHILMcwB38qSuWvjdC0AuHvA8MLb5ECMlVcsgdABKuH9ZdiiVchT2EGCq
 Qru5H/lCxsXMNiezzut8X+2gOLL2yThV+o6FrS++uR7nV67yWkaCRlQXly+ydG1hUKzVMhWA
 1AF8Sop664p/QqkSceVdx+lpH+JuDYMVtwWFPc1gCmdx6yR7wuHC2wsSj9adMdgpMIwXSYt1
 FKCg5XuHzMHmLGNUnec6re8pCu/IzQINnQFYTIYTAwD+J/op4RbphDFQ8tnEaW1psboAjy2y
 DePxAAljLIPkYgH3ru65njcnzu2opHDCA8yjjg7RUr8sFk/PtT8IdX1tx6Ltp6sMbp1UHGD+
 yYEy+6C59wVTruDyQC1GsQxAqqmsqPt3CLnvXZjGJwo9jKI8nGlfJxN7DwWGHqFIvroaheyP
 haN5Fo5CIt7eSLzMPQpO97Z59ECl/CIKDjzahzDgjOiiLBVfRTPwixhbFX4M4vFwBl1yvFX1
 Xt2nK+R4Zcm5UZPkWLeqwQ1i+ZDKsUCKYX7H8qTI/OPi+f2WZJtYe1ZWGZil8hghE9+nC3b8
 sxEK+yBwAhFXev1b0H/qNBPfQ1adyFhXcqu96S7k9JvxCI8QgnN7NeLnNscl3FNxfwJxo8kA
 FnjMqOn9LYPrSKecljbApySQLjuQYx+vRoG0d8EZj6VN4wYSd/3ts83LsJvFZF+rbAL5aMkH
 pEtJpTbatwSG2uvxtjoRcSkxGCUXE/w3lzm0uvMSGVXQqOMsCSUo4e9JVG+rXNm4+jenZJWn
 oBMHzjzGPIrbw9jENzXeLSoyVawtmIag+V8Qw3DJdw7Rakm2NICx/DZ5hPvH/wxFA==
IronPort-HdrOrdr: A9a23:Q9WeDqspAJ5rMHWtt02ILcQG7skClIMji2hC6mlwRA09TyXGra
 +TdaUguSMc1gx9ZJhBo7G90KnpewK6yXdQ2/hqAV7EZniahILIFvAY0WKG+VPd8kLFh4xgPM
 tbAs1D4ZjLfCRHZKXBkXiF+rQbsaC6GcmT7I+0pRcdLj2CKZsQlzuRYjzrbHGeLzM2Y6bReq
 Dsgvau8FGbCAsqh4mAdzE4dtmGg+eOuIPtYBYACRJiwA6SjQmw4Lq/NxSDxB8RXx5G3L9nqA
 H+4kbEz5Tml8v+5g7X1mfV4ZgTsNz9yuFbDMjJrsQOMD3jhiuheYwkcbyfuzIepv2p9T8R4Z
 LxiiZlG/42x2Laf2mzrxeo8w780Aw243un8lOciWuLm72PeBsKT+56wa5JeBrQ7EQt+Ptm1r
 hQ4m6fv51LSTvdgSXU/bHzJl5Xv3vxhUBnvf8YjnRZX4dbQqRWt5Yj8ERcF4pFND7m6bogDP
 JlAKjnlbprmGuhHjHkV1RUsZyRtixZJGbEfqFCgL3Z79FupgE286NCr/Zv3Evp9/oGOu15Dq
 r/Q+FVfYp1P7wrhJJGdZc8qPSMex7wqDL3QRSvyAfcZeg600ykke+D3Fxy3pDvRKA1
X-IronPort-AV: E=Sophos;i="5.90,222,1643691600"; 
   d="scan'208";a="67963392"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=MIPQkW84LtCinkFGhmlfg3Bz4DMzLZrgopellglRG1JCCL2WdoQ6VojUj8bcITIvIcb4ntecAxS6D758F05zs1sZ/NrC7soQfkU9YkxQJACUp2gEm8CfuxhuQ0r8VIjJpjUF3zNEBCfhme+lIDOLrkx7Q/EzHInD+G1iz7RjDHsfmL8cKHaky+1NZxNZ7KqQGeAjXBqZO1uktmlxh9L6+/bTFVJhhbjN37A6S61zf8l3P31kqpJ/igJn7+FUvnJg9ACcdGdv7F3c/O32H8K2Yoou3g0HKq0ZD2wStxggODCySqwzGaUN+UyZvIEU72y5uloT4dLXb9aWMQJy4hPe3g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=YRDBXnP9C9M2vsmyTw79C19QJ56/HRm2OQRPejgum9U=;
 b=O2x51jWgT/FOfAZEnKQr1hpaNGeRgDIkSU3TyP3HwQc8jxs6gC1yrwX1lV3bzFOArgXpchrucJvMjfJsoJF4zT+hFIXw4Duq34hgBRN8HWNCJzQ2Z6qhKGCMiz9cjQK07qG5Hcut/34EmZgHjZPGZIqCAgYL7dqu8zQ7cSwzU34bfNcooP95sc3tj68pAxqbG8o4SxJD4n1lvCla9zMmUTvyPVG/sOSSB6Z2ZOyDmGwrqE1U8VVimtWjWkpcECXDIPoRSBAnxuHsJvw/Zcthi07ZWF5L+toeAX5+b3NCpa+wEw6NlQHn30ruV992tbnPxz1VL1O7E/Sl1tfZ9yK5+w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=YRDBXnP9C9M2vsmyTw79C19QJ56/HRm2OQRPejgum9U=;
 b=itwKqnFeZld1cSEIAs9JmB7TJTIMqToCuITnm+FcZyJWBvAaMzHvtxrMUSzifqZ11kG+VxqNY/MbdPwAkDeVupdQMzavTks/AfAPIbYJL5GSLNSpjTmMGgvE/xmj+UBRHhTkPl4WGlRKF8RG/debh2yk6vSiXkqBOw6yUW/wwCo=
Date: Wed, 30 Mar 2022 17:00:15 +0200
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: "Daniel P. Smith" <dpsmith@apertussolutions.com>
CC: <xen-devel@lists.xenproject.org>, <scott.davis@starlab.io>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, Jan
 Beulich <jbeulich@suse.com>, Julien Grall <julien@xen.org>, Stefano
 Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>, Daniel De Graaf
	<dgdegra@tycho.nsa.gov>, Jason Andryuk <jandryuk@gmail.com>
Subject: Re: [RFC PATCH 1/1] xsm: allows system domains to allocate evtchn
Message-ID: <YkRwf3BHj01SAjbT@Air-de-Roger>
References: <20220328203622.30961-1-dpsmith@apertussolutions.com>
 <20220328203622.30961-2-dpsmith@apertussolutions.com>
 <YkK1dSS6RZ9hzyh6@Air-de-Roger>
 <ae3ba2f9-ace5-0c30-9190-06c747953b20@apertussolutions.com>
 <YkQlkOWtXqGBAoM/@Air-de-Roger>
 <d7c2f9ab-561c-01dd-e1a4-8f99f356d56d@apertussolutions.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <d7c2f9ab-561c-01dd-e1a4-8f99f356d56d@apertussolutions.com>
X-ClientProxiedBy: LO4P123CA0183.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:1a4::8) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: b8053240-ed45-4f52-1959-08da125e028f
X-MS-TrafficTypeDiagnostic: BL0PR03MB4148:EE_
X-Microsoft-Antispam-PRVS: <BL0PR03MB41480B66BC4DD3FE0A1751398F1F9@BL0PR03MB4148.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(8676002)(4326008)(66476007)(6916009)(66556008)(66946007)(54906003)(26005)(86362001)(186003)(53546011)(316002)(6486002)(508600001)(33716001)(9686003)(6512007)(6666004)(6506007)(85182001)(82960400001)(2906002)(5660300002)(8936002)(83380400001)(38100700002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?MGNqekRSKzVVTkxVTDZPOFdIK0xMRnQrQWFyK1h5NGd1SWtrNWVqTEdmMjRK?=
 =?utf-8?B?Tm8vYi9BeTBCc1hOdS90dW96cHdIMENuYVlvVVFqZURQVnBocWF5bm5yNkYz?=
 =?utf-8?B?OHc1R1pSMHFibjVpcWRrOEtEWEExOWJtOFBSc0haTkxTa1pJdnV0RWN1ZlVF?=
 =?utf-8?B?azlKSnJkdURxM1Fic1NQT040ZmswSDVEZWlOWFFLd2MzeEMzN0x3eUJCeHJ0?=
 =?utf-8?B?YnBIYW1ZQVRYMm91VU9rSjU4V25QVWJLL0tPNkFBMTFrRjN1V2NnU09iV2NW?=
 =?utf-8?B?Z1Z3UXMzWk56OStCeDBIbHF0OXFCcXFiTkVsWG9vOC9DYm5mSHFkVXNhTmkr?=
 =?utf-8?B?TTN6L0xTanZhL2gzRWJlZUk2WlVzbDJWRFpZa3d0cUV3blI0WTNUSlFudzUy?=
 =?utf-8?B?Zzlpdm9jTDZuNGRKbXdmRlJrUk1YRldkd1Q1TkYvTnQ1RU1Ubkw5aGdpUmdP?=
 =?utf-8?B?MlQwWDFvcFZTWXZrSHR4MUszNVRnM1pHSUxEZytEYzZDVHdwMjVYRmtBVG9o?=
 =?utf-8?B?Wk1OM0d5WjJGKzg1UzBYUHVxa1NjbmlyT3EyM0dsUnova2RxbFdSTkhaTDBu?=
 =?utf-8?B?ZkdhQnh3elZJbTdmLzFIdlk2Q0VBZjQvTU91aUxabHFSOUR3ZWptYnZYMWVj?=
 =?utf-8?B?OVpwUHgvcHBHU0ZyNjJPcjJhVGtjNGRXNlhNcCtCUTY0Zmc0RElYQlY5bUt3?=
 =?utf-8?B?Ym12dW9BbEFvSm8vVElxSU94cElyeTZoY3Y4WUxMTzh3MjhUWHJnQlVHZlZR?=
 =?utf-8?B?WCttbk9YRW5rVmI0dTV3SEUyQ2tIN2tRTldyeGwwSmpJVTVIbnF2SDBCb1RT?=
 =?utf-8?B?WVpBTDc4M1JDT3ZveU1PRGtKaGJGaVY2UVpmOEZZdlJaeEQ5eUVseVE1MGM1?=
 =?utf-8?B?QjViVTNyRFlWTUNnT3kvbVVWTEJCRGZEN09CWDZjK2NNdW1pVlY0SE5Bcm1y?=
 =?utf-8?B?dktPaFBrc3BCUGd1Tkd3NlUweFRYUmxyWkRhZEdOVUJMaTUvRnd6QjhTcWJG?=
 =?utf-8?B?V21tMEF0Z2xEcmphUHBCelo3UGF5K3dwT1BVdW9oY294V3RyVExJSHgwVld5?=
 =?utf-8?B?eHE1cG8wNjd6c0FidFVWRGJUdkZmRmxRU2ora3JmcmJGZVFaZ3JsZ0VIR280?=
 =?utf-8?B?Tm9SRWhJOS90Z1IwV3FMY2x4M3BqSWlIT01FMG1CeEg1QWxuUkpwbTlLMElh?=
 =?utf-8?B?b3g4SVdMQWJ2RDNKVXZWeTRxSEtKN09ZK0Uzb2hramhjRUh2MGtpYW1nVTF1?=
 =?utf-8?B?OGlJSDJmdTI1RUV1SVlxQmh1Tlcydm9Dc3NKWGxmUGpVYWthZ1YvK2psZUlR?=
 =?utf-8?B?VHgvMEdpdldyWGQwYnRkalhsd3Zrd0lHUmhNSDZ3VVRIREZ1NCt5aDJtMTFN?=
 =?utf-8?B?QlRhN1JBMklnTmFPQnQ3TWxzTG5MR21zTmxXc2VvN0tDblpmR0JscHh3Mzlm?=
 =?utf-8?B?V2Y0c2piUE1jckltTWtPRXViZ2NSUUdsZnBiNUkySWorMG10ckdjRHh1WUEw?=
 =?utf-8?B?ZTNYWVg0SUtaRmQvbjR6VHdpQVNKS0R1UUUzODR6N1BNUVcvUWFBZndrZGgy?=
 =?utf-8?B?UEord1J2Z3ZrOWQ5YlFoYy90bmpQVXRZcEYyZTFjQ2JDNmh6YWFHYTJ6Zkkx?=
 =?utf-8?B?ckhPdnp3MzF1dWhiZENHeHlsMysxNE9HSkZWVXZiVk5rY1JpZnBLSHM0Zm9v?=
 =?utf-8?B?RnNGVzRvVWl3bktycndWZFdGQndGcTFGNm43RlFEMU9LVCs5cVFSbFZ3cm1W?=
 =?utf-8?B?b2tuTGxUQ2JFNUZGdk5tUUxtbG5PR2NidW1lRmtRRVhnMzNscWMzQk1QcnVL?=
 =?utf-8?B?QXRmcnNoZHMrK1poZlJic05NQXk0UkpHTCtNT2V5ZXFZTUhtWEZILy9Tc0wv?=
 =?utf-8?B?WEVEZGhHc1p2eWFCL01UeXBGK3NIZjBHSXR4a2R6WlUvNGMyMmpha1BPOXFt?=
 =?utf-8?B?R3dpM0ZTb1J1Q1d4eldzc0hPTy9qSE84L0swZ1NUM3VlRkt6bkEzN2JJeEhx?=
 =?utf-8?B?dDBvQlp1MDBmRXNpMXVVTy81SWpFNGhZYSszVFk2YXBKYzgzM0t2WHVpS2FQ?=
 =?utf-8?B?NXZzRi83cHJ3WS9GZ3oySVpiQVU1KzVFUmFDYlpXNDZKcW9aUTlMNWY3ektZ?=
 =?utf-8?B?QlJhSnA1YldZS0dIalhhZllWS1Npb0pidXUzcHljbGhTb0diSUV4cU5wM3Zq?=
 =?utf-8?B?Rjh2bmpiMmtqQ2U0VkhkbnNuTmpnZFZQTzhMVnQxSGlpc0hQMjFERTZZOHBr?=
 =?utf-8?B?clUwUS9LZndtbnNocDdIT1BuV1ZCTkllSE5pM09ibXNmdERWbGlsR3VwMzFW?=
 =?utf-8?B?eGtieWtla0lHSUNnOFNnWkRmWDFoc0twNERkSnZnbFZJNFI4R29kU1JjdXE3?=
 =?utf-8?Q?yurGoJenGmhN1H1M=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: b8053240-ed45-4f52-1959-08da125e028f
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 15:00:20.8473
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: qR7t5qcwq80hyJ8uDxvl5ZQ6oZQGpOJwOXm2rcyRxygI6SWc+GHa4bFsUiLtEctWQ2l4VA+C8bTIcanNbCR3bA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR03MB4148
X-OriginatorOrg: citrix.com

On Wed, Mar 30, 2022 at 09:42:18AM -0400, Daniel P. Smith wrote:
> On 3/30/22 05:40, Roger Pau Monné wrote:
> > On Tue, Mar 29, 2022 at 07:12:56PM -0400, Daniel P. Smith wrote:
> >> On 3/29/22 03:29, Roger Pau Monné wrote:
> >>> On Mon, Mar 28, 2022 at 04:36:22PM -0400, Daniel P. Smith wrote:
> >>>> During domain construction under dom0less and hyperlaunch it is necessary to
> >>>> allocate at least the event channel for xenstore and potentially the event
> >>>> channel for the core console. When dom0less and hyperlaunch are doing their
> >>>> construction logic they are executing under the idle domain context. The idle
> >>>> domain is not a privileged domain, it is not the target domain, and as a result
> >>>> under the current default XSM policy is not allowed to allocate the event
> >>>> channel.
> >>>
> >>> I've not been following the discussion around this patch, but I would
> >>> assume such privileges are only required for init code when no other
> >>> domains are running?
> >>
> >> At this time, correct.
> >>
> >>> Since it's only at that point where the idle domain context needs to
> >>> allocate event channels would it make sense to temporary elevate it's
> >>> privileges by setting d->is_privileged while doing the domain creation?
> >>
> >> This is initially what I did but it seemed like there was some
> >> reluctance. As I was looking to formalize/abstract this in XSM instead
> >> of doing direct manipulations, I realized I could achieve it in the hook
> >> which would allow the hyperlaunch and dom0less code work without having
> >> to ensure priv escalation is properly handled.
> >>
> >>> That way we wouldn't need to grant those permissions for the lifetime
> >>> of the host when they are only needed for initialization code.
> >>
> >> Correct, which is why I adjusted the effective default policy only on
> >> the check instead of in xsm_default_action() as Jan has suggested.
> >> Outside of a code fault, all other times that evtchn_alloc_unbound() is
> >> called `current->domain` should be pointing at the caller of the hypercall.
> >>
> >> This works as an interim solution with minimal impact as it is all
> >> internal to XSM and can easily be evolved. My concern is that exposing a
> >> function call to provide priv escalation for the idle domain as an
> >> interim solution for dom0less and hyperlaunch will have more impactful
> >> code churn in both of these when a longer term approach is adopted.
> >>
> >>> Another option would be switching to the initial vCPU of the domain
> >>> being created, but that's likely to be more complex, or even create a
> >>> short lived system domain with is_privileged set just for the purpose
> >>> of building other domains.
> >>
> >> Longer term I would like to explore doing this in general. Some initial
> >> thinking is the fact that hypervisor has a few contexts, relative to
> >> external entities, under which it is executing. When it is handling
> >> internal house keeping (e.g. scheduler and security server), when it is
> >> interacting with guest domains, when it is interacting with hardware
> >> (e.g. vpci), and now when it is processing boot material to construct
> >> domains. It  has been mentioned that today in Xen if one of these
> >> contexts acting with external entities is corrupted, it can interfere
> >> with operations occurring in the other contexts. In the past the have
> >> advocated and been working to split these contexts using hard L0/L1
> >> separation. As noted in other discussions, some architectures are
> >> gaining hardware features that can be used in hard L0/L1 partitioning
> >> but also could be used in a more "soft" partitioning more a kin to
> >> Nested Kernel[1] and Dune[2]. Again just some initial thoughts.
> >>
> >>> Overall I'm not sure it's worth giving those extra privileges to the
> >>> idle domain when they are just need for a known and bounded period of
> >>> time.
> >>
> >> IMHO that is a slight over simplification. Setting is_privileged to the
> >> idle domain while it is processing domain construction data from outside
> >> the hypervisor means that during that bounded period the idle domain is
> >> complete unrestricted and may invoke any XSM protected call.
> > 
> > The domain builder code executed in the idle domain context can make
> > direct calls to any functions that are otherwise protected behind an
> > XSM check on the hypercall paths, so I don't see much difference.  The
> > code executed by the idle domain in order to do domain creation is
> > already part of the trusted code base (ie: it's hypervisor code)
> > likewise with the data used as input.
> 
> I am only referring to what legit code paths exist, not what a full
> control exploit could achieve at this time. My comments below was
> discussing what might want to be considered down the road.

Maybe I wasn't very clear on that paragraph, what I meant to say is
that the domain builder code does already bypass XSM checks that would
otherwise fail, just by calling functions that are behind the XSM
checks.

For example the domain builder will likely call
alloc_domheap_pages(target,...); which would otherwise be protected by
xsm_memory_adjust_reservation(XSM_TARGET, current, target) when
populating the domain physmap, so here you are basically bypassing an
XSM check already.

> >> Contrast
> >> this with only granting the idle domain the ability to allocate event
> >> channels between domains at any time with the only codified usage is
> >> during init/setup. While I am unsure how, theoretically malformed
> >> construction data could expose a logic flaw to do some very unsavory
> >> allocations without any guards.
> > 
> > It's kind of like that already, it's just that in other instances the
> > calls done by the domain builder in idle domain context bypass the
> > hypercall XSM checks.
> 
> Not on legitimate code paths, which is what I am focused on since the
> primary vector that I was considering here is data attacks which are
> about steering execution down legitimate paths as opposed to attacks
> like ROP that allows runtime construction of execution paths.

The internal domain builder does bypass XSM checks by calling
functions that on hypercall paths are otherwise protected by an XSM
check, see my comment above about alloc_domheap_pages() for example.

> > This might be giving you a false sense of security, but what's done in
> > the idle domain context in order to do domain creation would strictly
> > speaking require the idle domain to be a fully privileged entity, it's
> > just that we mostly bypass the XSM checks by calling functions
> > directly instead of using the hypercall entry paths.
> 
> Not at all as long as it is understood this is just about
> least-privilege with the concern being around data attacks.
> 
> To be clear, I am not saying either solution is wrong and standing
> firmly for one or the other. I am just trying to ensure that we consider
> the applicable security aspects and thus make an informed decision.
> 
> >> Whereas during runtime if the idle
> >> domain was tricked into establishing an event channel between two
> >> domains, it would only serve to provide a covert channel between the two
> >> domains. Neither is desirable but IMHO I find the former a little more
> >> concerning than the latter.
> >>
> >> With that said, I am not completely against doing the priv escalation if
> >> overall this is the direction that is preferred. If so, I would prefer
> >> to provide a pair of static inlines under XSM name space to provide a
> >> consistent implementation and be able to easily locate the places where
> >> it is applied if/when a longer term approach is implemented.
> > 
> > I think those helpers must be __init, and we need to assert that by
> > the time domains are started the idle domain is no longer
> > privileged.
> 
> That is fine, I am not sure if there is a difference between static
> inline functions that are only invoked from __init code (and I would
> think would thus not exist anywhere else in the binary) over__init
> functions.

__init functions are freed after boot, so any attempt to call them
after boot will result in a page fault. This is what we want here, as
after boot the permissions of the idle domain shouldn't ever be
increased.

> Although I have not been keeping Live Update in mind but I
> think this is where the controlled privileged builder context is really
> needed that dom0less, hyperlaunch, and Live Update can all utilize.
> 
> Good point regarding the assert. This was a concern I forgot to mention
> with using priv escalation. Once a legitimate path exists to do such an
> action, what locations should there be checks/assertions it is has not
> occurred.
> 
> > From my PoV increasing the privileges of the idle domain just for the
> > time it acts as a domain builder is merely formalizing what is already
> > a fact: if the domain building was executed outside of Xen it would
> > require the context domain to be privileged.
> 
> Except that it is now in guest space and can only reach resources
> through the controlled hypercall interface. Any data that is sent is
> considered trustworthy because the domain builder is trusted.

So if it is trusted then there's no issue in formalizing this by
setting its context to is_privileged = true.  Ideally we might want to
do domain build on a separate system domain just for the purpose of
executing that code, but given the system is not live yet (no
domains are scheduled in parallel with the idle domain) I don't see an
issue with re-using the idle domain for that purpose.

> I will send out my original priv escalation patch later today.

Thanks! Will give it a look (likely tomorrow).

Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 15:03:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 15:03:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296420.504533 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZZqe-0004kd-5I; Wed, 30 Mar 2022 15:03:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296420.504533; Wed, 30 Mar 2022 15:03:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZZqe-0004kW-2H; Wed, 30 Mar 2022 15:03:00 +0000
Received: by outflank-mailman (input) for mailman id 296420;
 Wed, 30 Mar 2022 15:02:59 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ZQ0c=UJ=citrix.com=prvs=08136f46d=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nZZqc-0004kQ-Uj
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 15:02:58 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 7a8cf432-b03a-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 17:02:56 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 7a8cf432-b03a-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648652577;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=tGnGjgRWbom4UDz2P2p3niqqHw1e3PapuxVdbjnTg4Q=;
  b=hgHqgsh6C1Mz+o1DMZMgzNeYB0U+AJiPzTvykLaSbl+GxUiS0eOioR/+
   WTJ4Aweq+vBmMLdsJ/8vDUrUj53CWC2LptZLseDhCZxTLytfV0AOUDHtl
   f5emiXQ4CPoHhOp6vBzycEhp0g8fGcQEjlaE9yMv0GqvuzQkrLnYOKwno
   Y=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 69947216
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:WjELl60BVndBEC6bjPbD5e1xkn2cJEfYwER7XKvMYLTBsI5bpzYHz
 zcYWz3XMveCa2bxLot1b4S18EoOup7dyt8wTgtspC1hF35El5HIVI+TRqvS04J+DSFhoGZPt
 Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILes1htZGEk1EE/NtTo5w7Rj2tUz2YDja++wk
 YiaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDfjZw0/DaptVBoaHq
 9Prl9lVyI97EyAFUbtJmp6jGqEDryW70QKm0hK6UID66vROS7BbPg/W+5PwZG8O4whlkeydx
 /1q5Zm7ER8ENJfOu/giXQZXEDskMYh/reqvzXiX6aR/zmXDenrohf5vEFs3LcsT/eMf7WNmr
 KJCbmpXN1ba2rzwkOnTpupE36zPKOHxO4wSoDd4xCzxBvc6W5HTBa7N4Le02R9u15ESQqyHO
 aL1bxJvfRHNOwIREG46VrJgm6C3nnnTamVx/Qf9Sa0fvDGIkV0ZPKLWGMXRUsyHQ4NShEnwj
 m7B8m70BjkTMdWNzjzD/n/EruzImznyVMQNFbm73vlwiVaXyyoYDxh+fVmxrOS9i0W+c8lCM
 EFS8S0rxYAi+UruQtTjUhmQpH+fogVaS9dWC/c96gyG1uzT+QnxO4QfZmcfMpp87pZwHGF0k
 A/S9z/0OdBxmJrFTHnF7pqelzGRJRcbMmABf3UIaDJQtrEPv7oPph7IS99iFou8gdv0BSz8z
 li2kcQuu1kApZVVjvvmpDgrlxrp/8GUFVBtum07S0r/tmtEiJiZi5tEALQxxdJJN86nQ1aIp
 xDocODOvblVXflheMFgKdjh/Y1FBd7YaFUwYnY1RvHNEghBHVb5J+i8BxkkeS9U3j4sI2OBX
 aMqkVo5CGVvFHWrd7RrRIm6Ft4ny6Ptffy8CKyEM4oUO8IpLlfblM2LWaJ29zq3+KTLuftiU
 ap3jO72VSpKYUiZ5GTeqxghPU8DmXllmDK7qWHTxBW7y7uODEN5up9eWGZimtsRtfveyC2Mq
 o43H5LTl313Db2vCgGKoNV7BQ1bchAG6WXe9pU/mhireVE9RgnMypb5nNscRmCSt/kMzr6Tp
 CDkACe1CjPX3BX6FOlDUVg6AJvHVpdjt3MreysqOFejwX84ZoizqqwYcvMKkXMPqISPEdYco
 yE5Rvi9
IronPort-HdrOrdr: A9a23:8dAnmasFNAqwpyTSNmqbsRnx7skCkoMji2hC6mlwRA09TyXGra
 6TdaUguiMc1gx8ZJhBo7C90KnpewK7yXdQ2/htAV7EZnibhILIFvAZ0WKG+Vzd8kLFh4tgPM
 tbAsxD4ZjLfCdHZKXBkXmF+rQbsaG6GcmT7I+0pRodLnAJV0gj1XYDNu/yKDwGeOAsP+tBKH
 Pz3Lshm9L2Ek5nEPhTS0N1FNTrlpnurtbLcBQGDxko5E2nii6p0qfzF1y90g0FWz1C7L8++S
 yd+jaJq5mLgrWe8FvxxmXT55NZlJ/IzcZCPtWFjowwJi/3ggilSYx9U/mpvSwzosuo9FE2+e
 O86SsIDoBW0Tf8b2u1qRzi103J1ysv0WbrzRuijX7qsaXCNUQHIvsEobgcXgrS6kImst05+r
 lMxXilu51eCg6FtDjh5vDTPisa2HackD4Hq6o+nnZfWYwRZPt6tooE5n5YF58GAWbT9J0nKu
 9zF8vRjcwmPm9yV0qp/lWH/ebcHUjaRny9Mwo/U42uonRrdUlCvgolLJd1pAZEyHo/I6M0kN
 gsfJ4Y0I2mdfVmH56VNN1xMvdfNVa9NC4kEFjiaGgPR5t3c04klfbMkcEIDaeRCds18Kc=
X-IronPort-AV: E=Sophos;i="5.90,222,1643691600"; 
   d="scan'208";a="69947216"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=VownB+9By3ImLo70W5dHhdAt7cY65nE47m7bfH+JvVb8zgtiDrNErkDVd+a7liCfmDXLuC+ejBW8gDbZHHTuhClSByjYoFdM18LxYNPz9FHiJebiNJqE0FZQcIl7ZREMVNbSPo/1t74N/yN+c5ZFgD9Wo2KQeJ69sBh5cm400XyHSFn9+WHxwH8UGV1JLc+e8T2e2mAqM2pHimei2wg0WUvKvtZ3y+LX7A+ejS8pAn3MKHuvQdJ2oSFuW5fB/szlg/qdEFACF/dlxG4rwOu+jKP7Zfp58rPB1WtpMvliw1Nr7bgXyFMQLzG7/PQR6lMyPR/eZhtSxTnCsx4kntLDLA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=uUnXY73EYVNDaYl1Mer9X/OrVGcW39M+NuQd5rvKIIc=;
 b=noh4/otdLSPYOiIZ8vxWOz3IvQHwZ+38YPyFO7RPrBJ/TtiblxRatzpkNrMDb/Hv6cW9+GRUXdsBt3UWxKeL9IKw0Ip0muhWB41u4+pJFOqI0/kXMV566IJCYEjmAZNrnXHdL5iRmYuebffZD59akuqjaTgaPdiR5ohTPMHPx4wbqXomW4wTPf2HPRkeqTPia9nzsb/weeRsta++cpznaCXgr+Zg9MnFhbICxrWK6MgO3N/D0dCfVBij3dRjO4aIT+yi3GXRmvvFB0pZnBuoKjeF97rPmxUGWFVdiNffBfyGNNJeqVX7rHg2Qhc12EUbbMSEw0TYwrbF6ffTbxszVg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=uUnXY73EYVNDaYl1Mer9X/OrVGcW39M+NuQd5rvKIIc=;
 b=OGhVdWitN0x0tn+pTQDblyqxSe5bTrkp4Kog6eyWKnuIGRUcNrtZ+8f+UyCyB/fzu09i5mT3nWUAsoJYBZ1mHLQ9KttP8OGspBibSW6nOkSFdzWbzleDSCIfkhnL+k3sZwGTqBZxBmln6sOYgFZGURAjHk/fszCcm9DHw5kT5Mw=
Date: Wed, 30 Mar 2022 17:02:48 +0200
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "Ross
 Lagerwall" <ross.lagerwall@citrix.com>, Konrad Wilk <konrad.wilk@oracle.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>, "Bjoern
 Doebel" <doebel@amazon.de>
Subject: Re: [PATCH v2] livepatch: account for patch offset when applying NOP
 patch
Message-ID: <YkRxGGP0tCHKDLG0@Air-de-Roger>
References: <772f0afc-64db-6b98-af49-bd970ac78cbb@suse.com>
 <YkRm8oc0vQzRQ7VL@Air-de-Roger>
 <5091d7b3-18d8-1842-a65b-159299cf66e7@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <5091d7b3-18d8-1842-a65b-159299cf66e7@suse.com>
X-ClientProxiedBy: LO4P123CA0040.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:152::9) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: a9288fd5-0222-48c3-60aa-08da125e5cbc
X-MS-TrafficTypeDiagnostic: BN9PR03MB6074:EE_
X-Microsoft-Antispam-PRVS: <BN9PR03MB60744430D7C93D393DE9CB5D8F1F9@BN9PR03MB6074.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(66556008)(508600001)(54906003)(6486002)(82960400001)(66476007)(6916009)(33716001)(316002)(186003)(26005)(38100700002)(8676002)(86362001)(4326008)(5660300002)(66946007)(85182001)(2906002)(8936002)(6506007)(15650500001)(6666004)(83380400001)(6512007)(53546011)(9686003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?S09xalBxTkt4NlVTTjk1MHFNRURHc2VmTEl6ZUl1WnNjUEQ2eitJUzkyc0Za?=
 =?utf-8?B?bEZMY0tDZEtiRFVPNG50ejRnSC9mamZHY0dpaHlQZVBJRVBnRUhQbjMwWEI3?=
 =?utf-8?B?VUJEaWNqR0N5UWpmVm9ZazhGMEVHVkU1dzU4NFBYcitBT2t3QWNhMVJkZlBY?=
 =?utf-8?B?VURYL1ZINHY1L2tzdmZZNXAyOGFIeW9GaGFKRFZmNzBtN0MyYktueUpmVVVW?=
 =?utf-8?B?VUpBelpjUXVZWUs3ZDQvcmRDeXN0bW9BcTBVc3BjbU5TM3YraFIwbUUxYUxQ?=
 =?utf-8?B?YmFleld1ZHBzNFAxL1prc3BpSWllei9yL01jclo4QysxdnlZRzMzSjVQdEZP?=
 =?utf-8?B?eW9EekxmZTkxWCsxRGN4eFRheFhMRkNQWiszSFVUSG9rcTRIM1VuLzd6WFpE?=
 =?utf-8?B?dldFN0RISGo2TTJkS2RIZXJLdGI1Z0J5SnViUEJVZXpLN013U0VoMmZyZG5m?=
 =?utf-8?B?UHA5ZGpmU2RmczdwOEJMRzJvNUlwZVVoeHg5ZFBaaTgxOFBOb1h4bDNsUlpH?=
 =?utf-8?B?Nk1MTGpzMjJKaVdYM05SWW9Mc2JSZ1VFd0tLVGJ0L3V5YnRSMTI3QVh6eTly?=
 =?utf-8?B?blEyRDZHRkk0anNKbVlpWDRLL3c5aE5FZFUzV2dKODE5L2NnbjFrSkluQjhO?=
 =?utf-8?B?VnVCa3BJNUxhS29YK3pnQU5GbDNwY3BQc0xRaTJXc2ViNW5hU3lqejFxQlVT?=
 =?utf-8?B?YW1FamF3MC9CQ3V4cGttbk85WjFxUzUvNkttWWlkQWp5U2dnT1JzSXQrVjhI?=
 =?utf-8?B?cFNIbm80V0s3SW1HQmRwUlpEbTRwemtubytZYmFoNlVkRzgzREYwRmRRQlJQ?=
 =?utf-8?B?OGxtQnBnTWdFa0toU3J5NEYrL1FkeUJDSnAzbUhqMWt1YTJ3cW9ubkNEMlpH?=
 =?utf-8?B?N1NUTTdUN21RNFZXTDN6NitFQjAydnppSlUybW9pdTF2OXdjU08vT2RxcTNu?=
 =?utf-8?B?MWYyc2x4cXp0ZUM2dW1Eb2VuMHE5eFd1K1p5d09JN2YrMkNWQklOWU0zdUxa?=
 =?utf-8?B?dUVxbTByZDdJb2JGeGxpVGVEcmt5QjErbG4vOVlpWkNDZEZqeENtcFAwb3Ez?=
 =?utf-8?B?cnhiMWpKRXNvWXFlcTE3eDdLclNXZWpNdFpkdmVOKzE5SXpQWDk3NStNN1hB?=
 =?utf-8?B?bUllalpKMEFPSVN3ZjJHWkliOGhOdUhIc1daMmRoWTM2T29VMlJ2czRPREJt?=
 =?utf-8?B?YjlGZm1pSGRoaVh4c2dWQ1NCYU44ckE5MTh4L2NnUlc2Q3pYYjVxa3lSNEd2?=
 =?utf-8?B?Sll3TThuM2dKWWRGeFRVUCtueEVUVmM1WUhIMlBRdDBHSmRKNnBGSkd6K2Yy?=
 =?utf-8?B?UzdoZk5mSTNZWHBaa1VaSkRBcGVhZVZHRnRBQWhJbS9DS24wTFJWNHIwUXZX?=
 =?utf-8?B?SHVZUGkyQ2dJcmhLcnhtaDBNV0VYTnNEMGZjYS85U1ZCWUY3Q1BDYkZtR28w?=
 =?utf-8?B?NEJkb3RxNHpCTGNhMWtEY3dSTHozb3V3bHZTczV6UVdTR1FMSVBVQVN1NVdY?=
 =?utf-8?B?NnQ4SHc0UUI5MG9Xd0cxYXFRWDRGSEJjc3RaN044SnAyZEM4a3RpVnpWazVC?=
 =?utf-8?B?cURyb01ob1hNcFRuaFFYMkJKUEZpci8vVEtyem0xNVR0U2s1L3Z2cHRGREJO?=
 =?utf-8?B?aGxFcjY2ZHhZWnFXNjBOQzFrRHRGb3J5Q3M2b2ZmaTdSN0tDQ1pvUExJMnZE?=
 =?utf-8?B?Sms2bnUydElBUVpjd1duNWRrOUl2OGl3Zm5xR3JzRmM5V2o5bmtNcnI2dDdJ?=
 =?utf-8?B?R2cvRGJlVVcrWURkTzh3WEVsbkZyam1Hdk50MjY1VTNkS2pMWVpuN0lzUVVV?=
 =?utf-8?B?VDZodUJmcUowdnlhOHhja1NkOE01Q0NyYWgzeEdoTDlEYkxmVFN3dzlscWVu?=
 =?utf-8?B?bWUvWnhyMTg0YUNSNWNRNG9HNHRFa2ZVZmFUdTdTNy85YmlKUk91V3lvT2JQ?=
 =?utf-8?B?TmltMVBWSWVUYStWN3NPTFhmM3V4Uzg1a081cEsrQXdmMUUzNzd6SjFDRm5F?=
 =?utf-8?B?M29PdHgvYk5MZDRUSjlPMVhicDkwQU1JSmlZQmVRQi9jQldORi9YVlFIWTFz?=
 =?utf-8?B?VW5FdjFrL2F0QzN0YUpyaHd0UzEyRXlVUjBOcmkrSFpWNkRIdXZFRUV3NmZU?=
 =?utf-8?B?RzhQaDdRTVA0QTZtZ1ZuYnF1UHdBb1RMS2creFVBZkxpOEgwdHB3cndhNzgr?=
 =?utf-8?B?cWgrV2xiRjR3VW1rSkY2Qkk5cCt4T0duL0xuUStONjRsNFpjc3B5RW5EUzlk?=
 =?utf-8?B?ODdQakpINjBIVDJPa1Y0V1ROWXNTR3pwUUZTMXJvcWFtL1o1d2J2Z1ppbHFh?=
 =?utf-8?B?azhiSWhyWVFPa0ZyVlpJNnJKRm1RbEVrOWMrVXlOc0tSRjAyR0x6MDViWUYy?=
 =?utf-8?Q?UbMJPT7qY+/pHbyY=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: a9288fd5-0222-48c3-60aa-08da125e5cbc
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 15:02:51.9827
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: +1Sb90t/MgoBR76/Eb7QAfnj4BxRiald6g4a6g9ikQgmnyAmf2nVb3u2xk+51omPGf5erjbrmbEbSAlvxyFKZQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN9PR03MB6074
X-OriginatorOrg: citrix.com

On Wed, Mar 30, 2022 at 04:55:52PM +0200, Jan Beulich wrote:
> On 30.03.2022 16:19, Roger Pau Monné wrote:
> > On Wed, Mar 30, 2022 at 01:05:31PM +0200, Jan Beulich wrote:
> >> While not triggered by the trivial xen_nop in-tree patch on
> >> staging/master, that patch exposes a problem on the stable trees, where
> >> all functions have ENDBR inserted. When NOP-ing out a range, we need to
> >> account for this. Handle this right in livepatch_insn_len().
> >>
> >> This requires livepatch_insn_len() to be called _after_ ->patch_offset
> >> was set. Note however that the earlier call cannot be deleted. In fact
> >> its result should have been used to guard the is_endbr64() /
> >> is_endbr64_poison() invocations - add the missing check now. While
> >> making that adjustment, also use the local variable "old_ptr"
> >> consistently.
> >>
> >> Fixes: 6974c75180f1 ("xen/x86: Livepatch: support patching CET-enhanced functions")
> > 
> > I have to admit I'm confused as to why that commit carries a Tested-by
> > from Arm.  Did Arm test the commit on x86 hardware?  Because that
> > commit only touches x86 specific code.
> 
> ;-)
> 
> >> Signed-off-by: Jan Beulich <jbeulich@suse.com>
> > 
> > FWIW, on the original implementation, I think it would have been
> > clearer to advance old_ptr and adjust the length?
> 
> In my 1st attempt I had confined the change to the x86 file, but it
> didn't feel right that I then also had to adjust arch_livepatch_revert().
> 
> >> ---
> >> v2: Re-issue livepatch_insn_len(). Fix buffer overrun.
> >> ---
> >> Only build tested, as I don't have a live patching environment available.
> >>
> >> For Arm this assumes that the patch_offset field starts out as zero; I
> >> think we can make such an assumption, yet otoh on x86 explicit
> >> initialization was added by the cited commit.
> 
> Note how this already deals with ...
> 
> >> --- a/xen/include/xen/livepatch.h
> >> +++ b/xen/include/xen/livepatch.h
> >> @@ -90,7 +90,7 @@ static inline
> >>  unsigned int livepatch_insn_len(const struct livepatch_func *func)
> >>  {
> >>      if ( !func->new_addr )
> >> -        return func->new_size;
> >> +        return func->new_size - func->patch_offset;
> > 
> > Seeing as func->patch_offset is explicitly initialized in
> > arch_livepatch_apply for x86, do we also need to do the same on Arm
> > now that the field will be used by common code?
> > 
> > Maybe the initialization done in arch_livepatch_apply for x86 is not
> > strictly required.
> 
> ... your remark. I'd prefer if I could get away without touching Arm
> code. Hence if such initialization was needed, I think it ought to
> live in common code. If this was a requirement here, I would perhaps
> add a prereq patch doing the movement. My preference though would be
> for that to be a follow-on, unless there's an actual reason why the
> initialization has to happen; personally I think it ought to be a
> requirement on patch building that this (and perhaps other) fields
> start out as zero. I therefore view the initialization on x86 as a
> guard against the patch getting applied a 2nd time. Yet of course it
> would then also have helped (not anymore after this change) to use
> = instead of += when updating ->patch_offset.

Sorry, I didn't realize about your post-commit note. In which case:

Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 15:15:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 15:15:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296429.504551 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZa2s-0006KK-Gl; Wed, 30 Mar 2022 15:15:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296429.504551; Wed, 30 Mar 2022 15:15:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZa2s-0006KD-DY; Wed, 30 Mar 2022 15:15:38 +0000
Received: by outflank-mailman (input) for mailman id 296429;
 Wed, 30 Mar 2022 15:15:36 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wjcS=UJ=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nZa2q-0006K7-Pn
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 15:15:36 +0000
Received: from mail-lj1-x22f.google.com (mail-lj1-x22f.google.com
 [2a00:1450:4864:20::22f])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 3f607a6a-b03c-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 17:15:35 +0200 (CEST)
Received: by mail-lj1-x22f.google.com with SMTP id g24so28111897lja.7
 for <xen-devel@lists.xenproject.org>; Wed, 30 Mar 2022 08:15:35 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3f607a6a-b03c-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=3F6GEGILwO5vlteoGBdPQRjiYnNCHhMBKfgw/Q2ahxU=;
        b=dIQ5Nq2pnr9qFk7vCi1fPxO5vSezHy0qyZsFAjOWwqepeqst61hYSoSVC7AMANE6br
         WAT3uyS3hsZsxhC2rhdEvX3lWzRJRB1fVnA4mkJsS72knliJo8FDSj+QcfyTWA8A/T1i
         kHK0KqCuh2DKQPW6JUBxCNOvbGKTeg/YY9wlZ15lJskbeUj0wXHR8GWXxhzTG5XWGdKh
         EcDcS9mNbu5uk9iBtYQhpPA6xf+xDuTH7vbwbF8xpJYu7ucnALRx9M6hrL5oOzFioIh8
         uD3fzTpsz6hOq5IIjiEyvKJ7ptqQPdcG/XptZy8Hj8qDKgmEJTtikCsQXVTqiEjOx9vX
         lgjA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=3F6GEGILwO5vlteoGBdPQRjiYnNCHhMBKfgw/Q2ahxU=;
        b=EI1pqLSrvwa9d9DU+Rci8mM3D2QHrCM7RVbvBlPt+HhjaLMve+ZZ19G85fFS6DbL0u
         7pvD5cVk2ul7hMo5fZBbVAhI/qGcJJk10IGWNDNo/w14T64rY9/i8lc4NKx9EZAtcN+e
         t0vrvMU8XGc8TyYgjhVGOsVEkkKQ5uArWc+NDa/QAQiHP864ieKjL1Tmt51eVooP2GuL
         bkOFapeFo5lpln6jp5qJUv1+UTTeUs56ZaGFEhL+5tbqVWsbbrQXu60c3MkQYTTdxIb4
         oLlQyTW08b0cxRiJiExmN2tJpzFpuQz/baH1vWxBY1BluSvZeX7LDO7XTih7O/O0wi0c
         6PNA==
X-Gm-Message-State: AOAM531enfLpODUl98iNnqEIfqkas1ZDYJN+NKqhdAqXvfqhsJDDJS4a
	KxwdRaaomV0mCxVJWbJlm8BzFc88b+rwKbhTxV8=
X-Google-Smtp-Source: ABdhPJwgaLL1vb1Ral14mkF2Lg6Sao92VgtvDzv7edcfH0WlYOJ3HC5gLeab4kM/pce5IVwhgz9VmuqdlBtok2aEplM=
X-Received: by 2002:a2e:a372:0:b0:249:7108:6778 with SMTP id
 i18-20020a2ea372000000b0024971086778mr7163325ljn.403.1648653334756; Wed, 30
 Mar 2022 08:15:34 -0700 (PDT)
MIME-Version: 1.0
References: <20220328203622.30961-1-dpsmith@apertussolutions.com>
 <20220328203622.30961-2-dpsmith@apertussolutions.com> <7935e60e-34b1-76be-e5de-56e60f173438@suse.com>
 <a991c32d-4e45-f015-3d99-8552199e8d45@apertussolutions.com>
 <e711e8c8-5e5d-7443-fbc8-368ccdde533b@suse.com> <CAKf6xpt46jFgexwLA=wdUVH-HJWLOEisL6-2cmSLyJsO3QE2eQ@mail.gmail.com>
 <bdd9547f-d3d7-2315-898f-786ce31f9bbc@apertussolutions.com>
In-Reply-To: <bdd9547f-d3d7-2315-898f-786ce31f9bbc@apertussolutions.com>
From: Jason Andryuk <jandryuk@gmail.com>
Date: Wed, 30 Mar 2022 11:15:23 -0400
Message-ID: <CAKf6xpt60zHwwzgQ8EFuXkgfeiwYoBdsCMdY0d_fKZFXa5HyXA@mail.gmail.com>
Subject: Re: [RFC PATCH 1/1] xsm: allows system domains to allocate evtchn
To: "Daniel P. Smith" <dpsmith@apertussolutions.com>
Cc: Jan Beulich <jbeulich@suse.com>, Scott Davis <scott.davis@starlab.io>, 
	Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, 
	Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>, 
	Daniel De Graaf <dgdegra@tycho.nsa.gov>, xen-devel <xen-devel@lists.xenproject.org>
Content-Type: text/plain; charset="UTF-8"

On Wed, Mar 30, 2022 at 10:04 AM Daniel P. Smith
<dpsmith@apertussolutions.com> wrote:
>
> On 3/30/22 08:30, Jason Andryuk wrote:
> > On Wed, Mar 30, 2022 at 2:30 AM Jan Beulich <jbeulich@suse.com> wrote:
> >>
> >> On 29.03.2022 20:57, Daniel P. Smith wrote:
> >>> On 3/29/22 02:43, Jan Beulich wrote:
> >>>> Similarly I don't see how things would work transparently with a
> >>>> Flask policy in place. Regardless of you mentioning the restriction,
> >>>> I think this wants resolving before the patch can go in.
> >>>
> >>> To enable the equivalent in flask would require no hypervisor code
> >>> changes. Instead that would be handled by adding the necessary rules to
> >>> the appropriate flask policy file(s).
> >>
> >> Of course this can be dealt with by adjusting policy file(s), but until
> >> people do so they'd end up with a perceived regression and/or unexplained
> >> difference in behavior from running in dummy (or SILO, once also taken
> >> care of) mode.
> >
> > This need to change the Flask policy is the crux of my dislike for
> > making Xen-internal operations go through XSM checks.  It is wrong,
> > IMO, to require the separate policy to grant xen_t permissions for
> > proper operation.  I prefer restructuring the code so Xen itself
> > doesn't have to go through XSM checks since that way Xen itself always
> > runs properly regardless of the policy.
> >
> > This is more based on unmap_domain_pirq having an XSM check for an
> > internal operation.  dom0less, hyperlaunch, & Live Update may all be
> > niche use cases where requiring a policy change is reasonable.
>
> I will continue to agree with the base logic that today any least
> privilege separation imposed is merely artificial in the face of any
> attack that gains execution control over hypervisor space. What I will
> disagree with is using that as a justification to create tight couplings
> between the internals of the hypervisor that have a potential of causing
> more work in the future when people are looking to use for instance's
> Arms upcoming capability pointers as a real separation enforcement
> mechanisms to de-privilege portions of the hypervisor.
>
> While on principle it is justified to object to having policy statements
> that present a facade, is it not better to look longer term than object
> to some thing on principle based in the now?

Your claims seem to be speculative about something that doesn't exist,
so I can't evaluate them.

Do you envision that this future Xen would have multiple xen_*_t types
requiring explicit Flask policy rules?

Regards,
Jason


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 16:24:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 16:24:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296438.504573 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZb7K-0005Eg-Mu; Wed, 30 Mar 2022 16:24:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296438.504573; Wed, 30 Mar 2022 16:24:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZb7K-0005EZ-JE; Wed, 30 Mar 2022 16:24:18 +0000
Received: by outflank-mailman (input) for mailman id 296438;
 Wed, 30 Mar 2022 16:24:16 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=L21/=UJ=apertussolutions.com=dpsmith@srs-se1.protection.inumbo.net>)
 id 1nZb7I-0005ES-A8
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 16:24:16 +0000
Received: from sender4-of-o51.zoho.com (sender4-of-o51.zoho.com
 [136.143.188.51]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d51d4435-b045-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 18:24:13 +0200 (CEST)
Received: from [10.10.1.138] (static-72-81-132-2.bltmmd.fios.verizon.net
 [72.81.132.2]) by mx.zohomail.com
 with SMTPS id 1648657447329576.4366358354467;
 Wed, 30 Mar 2022 09:24:07 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d51d4435-b045-11ec-8fbc-03012f2f19d4
ARC-Seal: i=1; a=rsa-sha256; t=1648657448; cv=none; 
	d=zohomail.com; s=zohoarc; 
	b=mqfRIv0CMhfE4N/Y5btypUD8sfBaqlQaTZnxsSRQ0IikEv2y1acFzm7irSqT2S6W4TlAIR0J3wtUcn9t/gibF62EaNYF0q49ihux1K7u8MrChUvy4SEULTjsxT+y73AHq0LGFQJWVbHZCl5XyLB/RI7JCyC4xbSOnWIKbQy0oZg=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; 
	t=1648657448; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; 
	bh=y7BDcaXHCElSfh8WOJgZ7bN/ulI6GrlTBoJ1hQ5NRuM=; 
	b=hhJn4bWmk79ZiJoldCjyNbTi1xy5lmmTpG2fJwaBwGBgR+X8V8IAZf4YE6wEethK0mJ9fvoKXaEag3BciIBA+P45badrVE26AE+R+pURVbkcCk19f7tG0JE84bAhStStKl1/MP2BzLQM67Tj9gBjOP5+QND5bQxFPSCFn+nUwA8=
ARC-Authentication-Results: i=1; mx.zohomail.com;
	dkim=pass  header.i=apertussolutions.com;
	spf=pass  smtp.mailfrom=dpsmith@apertussolutions.com;
	dmarc=pass header.from=<dpsmith@apertussolutions.com>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1648657448;
	s=zoho; d=apertussolutions.com; i=dpsmith@apertussolutions.com;
	h=Message-ID:Date:MIME-Version:To:To:Cc:Cc:References:From:From:Subject:Subject:In-Reply-To:Content-Type:Content-Transfer-Encoding:Message-Id:Reply-To;
	bh=y7BDcaXHCElSfh8WOJgZ7bN/ulI6GrlTBoJ1hQ5NRuM=;
	b=T3hDHdZ6y9L9EWpMH728SaMRVvYyKTz3+q+/IBANMG4gXUNyar1ck4k0rFdYFExS
	0rXhM9SflnjAtGl7lAwFL96I+VPR9s0lmvITunwJ2AXuQML/hjaIkts09kSvIA50PBv
	dP3Rb86lAuQz0k9CWfH7eC0xbo9qIxJNqHcbBLio=
Message-ID: <867570da-f60c-0b04-24b7-69d9a1737e85@apertussolutions.com>
Date: Wed, 30 Mar 2022 12:23:48 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: Jason Andryuk <jandryuk@gmail.com>
Cc: Jan Beulich <jbeulich@suse.com>, Scott Davis <scott.davis@starlab.io>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Daniel De Graaf <dgdegra@tycho.nsa.gov>,
 xen-devel <xen-devel@lists.xenproject.org>
References: <20220328203622.30961-1-dpsmith@apertussolutions.com>
 <20220328203622.30961-2-dpsmith@apertussolutions.com>
 <7935e60e-34b1-76be-e5de-56e60f173438@suse.com>
 <a991c32d-4e45-f015-3d99-8552199e8d45@apertussolutions.com>
 <e711e8c8-5e5d-7443-fbc8-368ccdde533b@suse.com>
 <CAKf6xpt46jFgexwLA=wdUVH-HJWLOEisL6-2cmSLyJsO3QE2eQ@mail.gmail.com>
 <bdd9547f-d3d7-2315-898f-786ce31f9bbc@apertussolutions.com>
 <CAKf6xpt60zHwwzgQ8EFuXkgfeiwYoBdsCMdY0d_fKZFXa5HyXA@mail.gmail.com>
From: "Daniel P. Smith" <dpsmith@apertussolutions.com>
Subject: Re: [RFC PATCH 1/1] xsm: allows system domains to allocate evtchn
In-Reply-To: <CAKf6xpt60zHwwzgQ8EFuXkgfeiwYoBdsCMdY0d_fKZFXa5HyXA@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ZohoMailClient: External

On 3/30/22 11:15, Jason Andryuk wrote:
> On Wed, Mar 30, 2022 at 10:04 AM Daniel P. Smith
> <dpsmith@apertussolutions.com> wrote:
>>
>> On 3/30/22 08:30, Jason Andryuk wrote:
>>> On Wed, Mar 30, 2022 at 2:30 AM Jan Beulich <jbeulich@suse.com> wrote:
>>>>
>>>> On 29.03.2022 20:57, Daniel P. Smith wrote:
>>>>> On 3/29/22 02:43, Jan Beulich wrote:
>>>>>> Similarly I don't see how things would work transparently with a
>>>>>> Flask policy in place. Regardless of you mentioning the restriction,
>>>>>> I think this wants resolving before the patch can go in.
>>>>>
>>>>> To enable the equivalent in flask would require no hypervisor code
>>>>> changes. Instead that would be handled by adding the necessary rules to
>>>>> the appropriate flask policy file(s).
>>>>
>>>> Of course this can be dealt with by adjusting policy file(s), but until
>>>> people do so they'd end up with a perceived regression and/or unexplained
>>>> difference in behavior from running in dummy (or SILO, once also taken
>>>> care of) mode.
>>>
>>> This need to change the Flask policy is the crux of my dislike for
>>> making Xen-internal operations go through XSM checks.  It is wrong,
>>> IMO, to require the separate policy to grant xen_t permissions for
>>> proper operation.  I prefer restructuring the code so Xen itself
>>> doesn't have to go through XSM checks since that way Xen itself always
>>> runs properly regardless of the policy.
>>>
>>> This is more based on unmap_domain_pirq having an XSM check for an
>>> internal operation.  dom0less, hyperlaunch, & Live Update may all be
>>> niche use cases where requiring a policy change is reasonable.
>>
>> I will continue to agree with the base logic that today any least
>> privilege separation imposed is merely artificial in the face of any
>> attack that gains execution control over hypervisor space. What I will
>> disagree with is using that as a justification to create tight couplings
>> between the internals of the hypervisor that have a potential of causing
>> more work in the future when people are looking to use for instance's
>> Arms upcoming capability pointers as a real separation enforcement
>> mechanisms to de-privilege portions of the hypervisor.
>>
>> While on principle it is justified to object to having policy statements
>> that present a facade, is it not better to look longer term than object
>> to some thing on principle based in the now?
> 
> Your claims seem to be speculative about something that doesn't exist,
> so I can't evaluate them.

They exists, they are available in OpenPOWER and Arm CHERI is in
evaluation now.

> Do you envision that this future Xen would have multiple xen_*_t types
> requiring explicit Flask policy rules?

Right now I would say no for two reasons, first flask comes from the
mind set of controlling what hypervisor interfaces a guest may have
access and second is that I am not certain whether hypervisor internal
contexts should be configurable.

v/r,
dps


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 16:28:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 16:28:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296442.504584 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZbBY-0005ss-7X; Wed, 30 Mar 2022 16:28:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296442.504584; Wed, 30 Mar 2022 16:28:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZbBY-0005sl-4c; Wed, 30 Mar 2022 16:28:40 +0000
Received: by outflank-mailman (input) for mailman id 296442;
 Wed, 30 Mar 2022 16:28:39 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=L21/=UJ=apertussolutions.com=dpsmith@srs-se1.protection.inumbo.net>)
 id 1nZbBX-0005sf-8D
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 16:28:39 +0000
Received: from sender4-of-o51.zoho.com (sender4-of-o51.zoho.com
 [136.143.188.51]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 7334c19b-b046-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 18:28:38 +0200 (CEST)
Received: from [10.10.1.138] (static-72-81-132-2.bltmmd.fios.verizon.net
 [72.81.132.2]) by mx.zohomail.com
 with SMTPS id 1648657711464399.6184339127499;
 Wed, 30 Mar 2022 09:28:31 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 7334c19b-b046-11ec-8fbc-03012f2f19d4
ARC-Seal: i=1; a=rsa-sha256; t=1648657713; cv=none; 
	d=zohomail.com; s=zohoarc; 
	b=WcTcYjXxD3izUJgEBDGMOVleIxLfLbHeSY7K3Za0keN652zV2yNsMuMDEQlnJiLIZpY04f69xAi346iiR3kxiHJ6KZEW8WDFnoTYJQaIi7UL0qdkjLeTQZTCoO8LNrtCkVBtIlnNY4bOXV61y4Cy+QfezfvkKwo8aDpovRoI3Y8=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; 
	t=1648657713; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; 
	bh=QCCZ8ho3M1TzHGqKp9aZP8JJ+ODHrM5J8iw4Po+J/Wk=; 
	b=LcPFWyXxB8WKz2rOeRZ9Z7BbQK5IRtnQTZwwcComu+2zQY6zVkeUA5T0O9dWKem7oV4ZCSAAnNVROaFQH3KbnUc9ltbFCYzWCfaIeSzUkncOyYePO5aomGQ3d7yvGcypsf2yI5LBE84Q8Oc8r7/8lWhI9v6C7NgyfOrgIzP7dSQ=
ARC-Authentication-Results: i=1; mx.zohomail.com;
	dkim=pass  header.i=apertussolutions.com;
	spf=pass  smtp.mailfrom=dpsmith@apertussolutions.com;
	dmarc=pass header.from=<dpsmith@apertussolutions.com>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1648657713;
	s=zoho; d=apertussolutions.com; i=dpsmith@apertussolutions.com;
	h=Message-ID:Date:MIME-Version:Subject:Subject:To:To:Cc:Cc:References:From:From:In-Reply-To:Content-Type:Content-Transfer-Encoding:Message-Id:Reply-To;
	bh=QCCZ8ho3M1TzHGqKp9aZP8JJ+ODHrM5J8iw4Po+J/Wk=;
	b=Ys1cqDWITTlKyHHc/EbRUClQxNCSWXghBnSLTfDyvVE7B0pTecdDRplJTR8A1yK+
	Da2VXso1q1c0liMTVlMaTgPEwRdhjSrJH6zGrbMnhQGB7Hh65QjFdxWzFBBju8/3N2u
	giwMIgZcUDs6Vxsssv0uHSKsg7LXXsg5+pVC+fEk=
Message-ID: <58a977ea-460d-cfb9-aa75-5290de957c51@apertussolutions.com>
Date: Wed, 30 Mar 2022 12:28:13 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [RFC PATCH 1/1] xsm: allows system domains to allocate evtchn
Content-Language: en-US
To: Jason Andryuk <jandryuk@gmail.com>
Cc: Jan Beulich <jbeulich@suse.com>, Scott Davis <scott.davis@starlab.io>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Daniel De Graaf <dgdegra@tycho.nsa.gov>,
 xen-devel <xen-devel@lists.xenproject.org>
References: <20220328203622.30961-1-dpsmith@apertussolutions.com>
 <20220328203622.30961-2-dpsmith@apertussolutions.com>
 <7935e60e-34b1-76be-e5de-56e60f173438@suse.com>
 <a991c32d-4e45-f015-3d99-8552199e8d45@apertussolutions.com>
 <e711e8c8-5e5d-7443-fbc8-368ccdde533b@suse.com>
 <CAKf6xpt46jFgexwLA=wdUVH-HJWLOEisL6-2cmSLyJsO3QE2eQ@mail.gmail.com>
 <bdd9547f-d3d7-2315-898f-786ce31f9bbc@apertussolutions.com>
 <CAKf6xpt60zHwwzgQ8EFuXkgfeiwYoBdsCMdY0d_fKZFXa5HyXA@mail.gmail.com>
From: "Daniel P. Smith" <dpsmith@apertussolutions.com>
In-Reply-To: <CAKf6xpt60zHwwzgQ8EFuXkgfeiwYoBdsCMdY0d_fKZFXa5HyXA@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ZohoMailClient: External

On 3/30/22 11:15, Jason Andryuk wrote:
> On Wed, Mar 30, 2022 at 10:04 AM Daniel P. Smith
> <dpsmith@apertussolutions.com> wrote:
>>
>> On 3/30/22 08:30, Jason Andryuk wrote:
>>> On Wed, Mar 30, 2022 at 2:30 AM Jan Beulich <jbeulich@suse.com> wrote:
>>>>
>>>> On 29.03.2022 20:57, Daniel P. Smith wrote:
>>>>> On 3/29/22 02:43, Jan Beulich wrote:
>>>>>> Similarly I don't see how things would work transparently with a
>>>>>> Flask policy in place. Regardless of you mentioning the restriction,
>>>>>> I think this wants resolving before the patch can go in.
>>>>>
>>>>> To enable the equivalent in flask would require no hypervisor code
>>>>> changes. Instead that would be handled by adding the necessary rules to
>>>>> the appropriate flask policy file(s).
>>>>
>>>> Of course this can be dealt with by adjusting policy file(s), but until
>>>> people do so they'd end up with a perceived regression and/or unexplained
>>>> difference in behavior from running in dummy (or SILO, once also taken
>>>> care of) mode.
>>>
>>> This need to change the Flask policy is the crux of my dislike for
>>> making Xen-internal operations go through XSM checks.  It is wrong,
>>> IMO, to require the separate policy to grant xen_t permissions for
>>> proper operation.  I prefer restructuring the code so Xen itself
>>> doesn't have to go through XSM checks since that way Xen itself always
>>> runs properly regardless of the policy.
>>>
>>> This is more based on unmap_domain_pirq having an XSM check for an
>>> internal operation.  dom0less, hyperlaunch, & Live Update may all be
>>> niche use cases where requiring a policy change is reasonable.
>>
>> I will continue to agree with the base logic that today any least
>> privilege separation imposed is merely artificial in the face of any
>> attack that gains execution control over hypervisor space. What I will
>> disagree with is using that as a justification to create tight couplings
>> between the internals of the hypervisor that have a potential of causing
>> more work in the future when people are looking to use for instance's
>> Arms upcoming capability pointers as a real separation enforcement
>> mechanisms to de-privilege portions of the hypervisor.
>>
>> While on principle it is justified to object to having policy statements
>> that present a facade, is it not better to look longer term than object
>> to some thing on principle based in the now?
> 
> Your claims seem to be speculative about something that doesn't exist,
> so I can't evaluate them.

Apologies, let me give you some references as well.

https://mrfunk.info/?page_id=5
https://www.platformsecuritysummit.com/2019/speaker/hunt/

v/r,
dps


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 17:04:49 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 17:04:49 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296448.504602 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZbkS-0001ZW-4e; Wed, 30 Mar 2022 17:04:44 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296448.504602; Wed, 30 Mar 2022 17:04:44 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZbkS-0001ZP-1H; Wed, 30 Mar 2022 17:04:44 +0000
Received: by outflank-mailman (input) for mailman id 296448;
 Wed, 30 Mar 2022 17:04:42 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ZQ0c=UJ=citrix.com=prvs=08136f46d=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nZbkQ-0001ZJ-Lj
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 17:04:42 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 7bb4913b-b04b-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 19:04:40 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 7bb4913b-b04b-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648659880;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=d5nMH9wHJqscDVIysi+6xD/UIKv/mGHeGqIeUbf1xgs=;
  b=E/71JhV0Bn3N208iLE4wWrZSP7xEZu04NrDCoGoujpnk0djALG4YAY2c
   sYErvnkk6BmNFWnjN/KiNGKd2vZOUuV1y5ONOYSc/TUinlU0d9yEOlghn
   fDFGYG3Uk26wPkd+l5W6HZXMLSsJ4Bm2YExIVQUh0wfazSVbch6JcT+mB
   Q=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67012652
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:CX9HN6P2mlUTaxvvrR2bl8FynXyQoLVcMsEvi/4bfWQNrUp2gzNUn
 DcfDziEaauCMzSkKNx1b4S0/B5SuJfXmtc3GQto+SlhQUwRpJueD7x1DKtR0wB+jCHnZBg6h
 ynLQoCYdKjYdleF+lH1dOKJQUBUjclkfJKlYAL/En03FFcMpBsJ00o5wbZi2dYw3bBVPivW0
 T/Mi5yHULOa82Yc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pGTU2FFFPqQ5E8IwKPb
 72rIIdVXI/u10xF5tuNyt4Xe6CRK1LYFVDmZnF+A8BOjvXez8CbP2lS2Pc0MC9qZzu1c99Zl
 5J3ksyBFR4QOrzFs9leU0UILAsiMvgTkFPHCSDXXc27ykTHdz3nwul0DVFwNoodkgp1KTgQr
 7pCcmlLN03dwbLtqF64YrAEasALNs7kMZlZonh95TrYEewnUdbIRKCiCdpwgmho35oQQKy2i
 8wxMTp0MD2QOw9zGnhHGLUUzeaEmUjxSmgNwL6SjfVuuDWCpOBr65DyNPLFd9rMQt9a9m6Uo
 W/M8mDRCxQTJtuZjzaImlqvgenVlC+9R4MWF5W/7PdhhFDVzWsWYDUUX1ampfiyimalRslSb
 UcT/0IGvaU0sUCmUNT5dxm5u2Kf+A4RXcJKFO834x3LzbDbizt1HUBdEGQHMoZ/8pZrG3p6j
 Tdlgu8FGxQw94eyGUPB746QvDqZBGsVcT89T3MLGF5tD8bYnKk/iRfGT9BGGaGzj8HoFTyY/
 w1mvBTSlJ1I05dVivzTEUTvxmv1+8OXFlJdChD/BDrN0+9vWGKyi2VEA3D/5O0IEouWR0LpU
 JMsy5nHt7Bm4X1geUWwrAQx8FOBuq7t3N702wcH83wdG9KFoSTLkWd4umwWGauRGpxYEQIFm
 WeK0e+r2LddPWGxcYh8aJ+rBsIhwMDITIq5Bq2ENIMUOsIpKGdrGR2Cg2bKhQgBd2B2zMkC1
 WqzK57wXR7294w5pNZJewvt+eBynX1vrY8ibZv60w6mwdKjiI29Et843K+1Rrlhtsus+VyNm
 /4Gbpfi40gPAYXWP3iMmaZOfA9iEJTOLc2vwyChXrXYeVQO9aBII6K5/I7NjKQ4xvwMzb2Zp
 yvVt40x4AOXuEAr4D6iMxhLQLjuQYx+vTQ8OyktNkyvwH8tfcCk66J3Snf9VeZPGDBLpRKsc
 8Q4Rg==
IronPort-HdrOrdr: A9a23:rabi2aphhE/uqn6l2TORaZAaV5vHL9V00zEX/kB9WHVpm5Oj+P
 xGzc526farslsssREb+OxpOMG7MBThHLpOkPMs1NaZLXLbUQ6TQr2KgrGSoQEIdxeOk9K1kJ
 0QDpSWa+eAc2SS7/yKmTVQeuxIqLLskNHKuQ6d9QYUcegDUdAe0+4TMHf8LqQZfngjOXJvf6
 Dsmvav6gDQMEg/X4CePD0oTuLDr9rEmNbPZgMHPQcu7E2rgSmz4LD3PhCE1lNGOgk/iosKwC
 zgqUjU96+ju/a0xlv10HLS1Y1fnJ/ExsFYDMKBp8AJInHHixquZq5mR7qe1QpF6N2H2RIPqp
 3hsh0gN8N85zf4eXy0mwLk303a3DMn+xbZuCulqEqmhfa8aCMxCsJHi44cWADe8VAcsNZ117
 8O936FtrJMZCmw0BjV1pztbVVHh0C0qX0tnao4lHpES7YTb7dXsMg24F5VKpEdByj3gbpXXd
 WGNPusqsq+TGnqLkww5gJUsZyRtzUIb127q3E5y4OoO2M8pgE786MarPZv60vouqhNCaWs3N
 60QpiApIs+P/P+UpgNd9vpYfHHfVAlEii8Rl57HzzcZdM60jT22tvK3Ik=
X-IronPort-AV: E=Sophos;i="5.90,223,1643691600"; 
   d="scan'208";a="67012652"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=fsotklWcX/Tb8UtMzwYOpEz9m4eYF2CkB8537nr7BNg06xpGWAbMwtTWirG/nIlixUqOGXFmrtQQ4uM5Kp7R5Mq8yhBQYhogaAInuZBMKLVXAU26WmqaVABFxyZVVHcv755CeYXQrFPBZi7klqETzQVyeef0BEkht/aJME27Tf4sSkhfxSEr7nOcqtOmGLtall+lfi/ttwlJen3EKzt4vYKGDdWECPnGsnymPwGOJqaE/WII9SueUA6fwRkgdRdPK9R2SBRCxlF0txkwDoxl2Z+ctXJK0SPRd7tz5qwDbd2B7HW7whVO5EX9EEyHLYUtCPlpvsNsdvD+IriIA6RVlQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=cjtcuDj2cXDN06yUqLIzdyypTFAjFHr+RxlqXMdHt8c=;
 b=R1PfB0ClsBnEKqn/d442qBtZk0zdG3tgLxJ20jSwCIhArfXufzDAyL7l8EYimt6yy9PFD8tc5qrGXl380XT87qRwRW3lROxNOmzDDhLM0TCN7jolLJdt8nVvxIXrevl/STu7ODaQ4fXHvpO7KsKYgGiJPE19KghlMGmqxprmH8u35f6oed8mEYs6+r/yKbW9njn52+3dtsQ07TWV1HbW6lwa/kIrZ71DDqfTxG0osn3W9V38tIhF0qJEZ/DDw7ctSnFvk3z0Lv89s3ylMg6lS3jEH4IInqsqEUHTPeEFpG3m2rsSpDSDURFauxf4+1k5VUzVzqeBGayC6ps2Gnb5xA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=cjtcuDj2cXDN06yUqLIzdyypTFAjFHr+RxlqXMdHt8c=;
 b=e0573doUdV1VDgo+YNmujC+Hl3v8jodlPOQhTX8Wo4ZHGi1j8Znn5Os+bu79OS6s10cN6gg0pBS7jRe5VVdGUco3MDH9CCraXmFWsjPCXRXZh+DTBCIHJVjw+OpWfdvS3cRy1ZbzCqgvCgxPl2YJe/AdXwPwmgdv3teig9E758M=
Date: Wed, 30 Mar 2022 19:04:27 +0200
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Ross
 Lagerwall <ross.lagerwall@citrix.com>, Konrad Wilk <konrad.wilk@oracle.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>, Bjoern
 Doebel <doebel@amazon.de>
Subject: Re: [PATCH v2] livepatch: account for patch offset when applying NOP
 patch
Message-ID: <YkSNm0mb47Vc6nGr@Air-de-Roger>
References: <772f0afc-64db-6b98-af49-bd970ac78cbb@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <772f0afc-64db-6b98-af49-bd970ac78cbb@suse.com>
X-ClientProxiedBy: LO2P123CA0106.GBRP123.PROD.OUTLOOK.COM
 (2603:10a6:600:139::21) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 793ee85d-efe3-4550-19ae-08da126f5d2e
X-MS-TrafficTypeDiagnostic: BN6PR03MB2977:EE_
X-Microsoft-Antispam-PRVS: <BN6PR03MB2977B1D7E91E88CDA0398C208F1F9@BN6PR03MB2977.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(85182001)(6666004)(82960400001)(86362001)(66556008)(33716001)(2906002)(15650500001)(9686003)(6512007)(316002)(508600001)(186003)(8936002)(5660300002)(54906003)(83380400001)(6506007)(38100700002)(6486002)(8676002)(6916009)(4326008)(26005)(66946007)(66476007);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?UUJNMFAwTkNrbSs5ajI1bDNrQUVFWmNKdUN4cFZXMnhJemhPK3kwUDBseGxm?=
 =?utf-8?B?d3Rra1VIWndsOGZkUC9BT0N1LzV5R3ZDNUpsa2ZEMUI2V056RTI2UFhsUDhv?=
 =?utf-8?B?cThGRU9ybEtnYkw5MGZzYVJqWnM3UStQczNwdEw1YUQ2eUFkYlZnZmFhYkx2?=
 =?utf-8?B?cllEVzUxSHdwMlZXN2xrV0t3SU1EQkVFdlM5ZWI1M1BobnZGdTNDYlhmZVRN?=
 =?utf-8?B?Y1NDVTRoc3lwZTVNa2pOalRUajBMdGU2UzhRUnVZQ21ISXNPZm9HNVNVS0cr?=
 =?utf-8?B?SUZaQythdmVYMVVOUU5UU3dmTmNhOXU0ZGhlQVI5K2NlTE9ZUm5Fa0lsWmNy?=
 =?utf-8?B?V25lM2JPWWtwbi9JK2hQZSt2SnI2OFhXYVRjTGVlUlFyNWtrdzk0a0pUOWJR?=
 =?utf-8?B?K1grTkU2cTE0K0RlWC9DZjBWSHpSaWJLSStQOW9DaUxQdlB2V2x1TFBLZDFs?=
 =?utf-8?B?UFdwZ3VzN1NGSHloMXdIYm1WN1JWaXE5VUl1RDJDQkpSd09CbXpTa0MxMGlP?=
 =?utf-8?B?bm1Sb1pqZXNYTnRTbWpyZDljeTI5Wk5tTXAzRDE0NXB4OGNmSFpGSDBuMS9u?=
 =?utf-8?B?b1E0aUlUWFBhblNISng4cmtMVmg3TnZkaEwrVDFudFcrenZYZjdnL3liTHB1?=
 =?utf-8?B?SkU2MkVUdFhGRVR6UU5MQUFSaVNlS3dvMjVERHRIdEkwQ0owY0haVlEybVRI?=
 =?utf-8?B?V0srMDVaWHEveTRnWjdtNzJVWlhyTWVGTXYzL3c3a1hPUU9Kc1hWWHhldmMz?=
 =?utf-8?B?cTc2OWcvdUwwOUo5TzBTdmtsa3ZhVERVTGRBc0V0b1ZQeXg4WFFucmdmTnA5?=
 =?utf-8?B?UVdsYVpPVHFTbkVUZWZPb0ZRRGV5MGpTend4cUQ1MUFOclZ1ZlpHYWtNZWll?=
 =?utf-8?B?cWd6azBtWTd1eTArVXMxSVlBZzFiaGRUOFNDbk1rMGZzNjl1SXJNSU0rcHhV?=
 =?utf-8?B?anhmWHFNVU16S3NZL1o2THQ0QVU3aVRiNm1UNU1mSkhabzZ5V2oxYTQrVGFL?=
 =?utf-8?B?UUV0NkdUaXdBcURnVWU0VUZxcVR2MFJTVjlsU0pUUzZDdnYwOHFNVE1Fdlpu?=
 =?utf-8?B?dlJ3NjJ5OXlZZ3N2MmtYc0FOb3dQY0VFUS9qVkFHVmJBRmx6V0taZEhlRFFH?=
 =?utf-8?B?MHBZekg5MXN5c0pMSjFzV2JUYit2TlV0TkREUjNYeEErOWk2SkZSSThuQ1oy?=
 =?utf-8?B?QzRPUGdBL3FvNUc1QXplaW5FNDRlOU1lSnZSN09JNzdsTHEvQ241NlFxZ3VH?=
 =?utf-8?B?anVpdDl2WVM4dGFFQ3pZSEtpRU94RVQ0c05tci9ReDZuNnZ4VCszSmJIbVMy?=
 =?utf-8?B?RmEyZ3Q4aStOTGUxaG82R2tXdkNWeWtpRE5YRzVZK05GWGRKVVQrNEdvM3Iy?=
 =?utf-8?B?bGpha2FUWFFFWTE3dS8wbEJDSXBTZjdrV2hOTkEvUEFQUXhObGJISDJrZjBt?=
 =?utf-8?B?L2RxbVIrb3VlR2x2THczRlAwN3ZGaGkrZnFzTGxDOVBoMmo2aXIycnFRRmx0?=
 =?utf-8?B?WlVFL21IU1ZRam0wSHJiZ1YyVVVJYW9FZFl6aU9oeE9Bdld1bE1nazcxT0dG?=
 =?utf-8?B?N2l4RjVKaUt5ekhmMktyLzZndWVoRzZtNXFnUVlmdE5wdTRML29ERVJCOWxk?=
 =?utf-8?B?TE9lMUhNbXIzR21ROS9KUXlValdqQ09FenZWMFlrdExxMFNIZ3U3dkVLa3R3?=
 =?utf-8?B?akw3YmNha2hPUE9CeUg2MmR3a282Wm5rZVFWL1ZGVGtLakUzWEtpQWdzUWhk?=
 =?utf-8?B?U1dnMWNIcTlTR0QrMUFmdFpkSEpJcVY0Y1JSNXlLUGxnV2p6SEVDay8zcE5k?=
 =?utf-8?B?eG91YXNUR05WMFNuZ1ROSUxXSHI4OFh2QksvcGhTMlBzOWthMStEUXJLcnlL?=
 =?utf-8?B?K0JwRklLM3I2VWdZWjFxQVo3MUtIdlFqTHRDNmZVMmpxR0w3MEdCY2pzWmc4?=
 =?utf-8?B?bUExeUxucHNTYlREaGxDem1YQWhhSndDMlJuMmtPU25ZcjdKT05wSVIrdWYr?=
 =?utf-8?B?T0JQWHlRUG14NzliQUFQVFdFSG83WlZrZ0VSbmt4YkNEcVBUaDRTN1JmWmdj?=
 =?utf-8?B?MEY1NkdtN1ZZaFZXNjNvTzkrWkU3Mi9OZHNIYVhRQTY2bUhqK3BxUFB3OHFM?=
 =?utf-8?B?YW5aSHhlZ2xmYVdsaG9sZUlNUHFzZW5wVGdRTW5SaTVZMUtFc3dwV21GVzdW?=
 =?utf-8?B?R1ZNMnVXTjRrYTBEYzJYYVRwUjhDUTlSVDAxaVlMMlo2UGRPSllWbmlpZGxU?=
 =?utf-8?B?RzlROW50S2czUVk2azhRc1dROWxxT2IvSnFrZDMvVVlXN2loOTE3QnJ4YlVQ?=
 =?utf-8?B?VE0yNFhQRjdXSTJadVEwcTJ2QzZqK3ZnK0d5QU9oNEl0NWd3ekIxb3piZHZ4?=
 =?utf-8?Q?GbggLnacEYyjGWTg=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 793ee85d-efe3-4550-19ae-08da126f5d2e
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Mar 2022 17:04:34.2661
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 9YjFRd+2JoUfe4SHIBhBspvCWygCCmMaLN4/Hiezt0mS3BGoAiSHJcC8git6OzQTRhmAWbGUN4mb/3BSdxcgBw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR03MB2977
X-OriginatorOrg: citrix.com

On Wed, Mar 30, 2022 at 01:05:31PM +0200, Jan Beulich wrote:
> While not triggered by the trivial xen_nop in-tree patch on
> staging/master, that patch exposes a problem on the stable trees, where
> all functions have ENDBR inserted. When NOP-ing out a range, we need to
> account for this. Handle this right in livepatch_insn_len().
> 
> This requires livepatch_insn_len() to be called _after_ ->patch_offset
> was set. Note however that the earlier call cannot be deleted. In fact
> its result should have been used to guard the is_endbr64() /
> is_endbr64_poison() invocations - add the missing check now. While
> making that adjustment, also use the local variable "old_ptr"
> consistently.
> 
> Fixes: 6974c75180f1 ("xen/x86: Livepatch: support patching CET-enhanced functions")
> Signed-off-by: Jan Beulich <jbeulich@suse.com>
> ---
> v2: Re-issue livepatch_insn_len(). Fix buffer overrun.
> ---
> Only build tested, as I don't have a live patching environment available.
> 
> For Arm this assumes that the patch_offset field starts out as zero; I
> think we can make such an assumption, yet otoh on x86 explicit
> initialization was added by the cited commit.
> 
> Note that the other use of is_endbr64() / is_endbr64_poison() in
> arch_livepatch_verify_func() would need the extra check only for
> cosmetic reasons, because ARCH_PATCH_INSN_SIZE > ENDBR64_LEN (5 > 4).
> Hence I'm not altering the code there.
> 
> --- a/xen/arch/x86/livepatch.c
> +++ b/xen/arch/x86/livepatch.c
> @@ -157,9 +157,15 @@ void noinline arch_livepatch_apply(struc
>       * loaded hotpatch (to avoid racing against other fixups adding/removing
>       * ENDBR64 or similar instructions).
>       */
> -    if ( is_endbr64(old_ptr) || is_endbr64_poison(func->old_addr) )
> +    if ( len >= ENDBR64_LEN &&

Sorry, didn't realize before, but shouldn't this check be using
old_size instead of len (which is based on new_size)?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 17:15:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 17:15:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296454.504612 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZbul-00037E-7i; Wed, 30 Mar 2022 17:15:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296454.504612; Wed, 30 Mar 2022 17:15:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZbul-000377-4f; Wed, 30 Mar 2022 17:15:23 +0000
Received: by outflank-mailman (input) for mailman id 296454;
 Wed, 30 Mar 2022 17:15:21 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=D/pr=UJ=citrix.com=prvs=081612a10=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nZbuj-00036z-G7
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 17:15:21 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f946aacf-b04c-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 19:15:20 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f946aacf-b04c-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648660520;
  h=date:from:to:cc:subject:message-id:references:
   mime-version:in-reply-to;
  bh=+BcRBjRck8hNsP8DdjvPcI+Ml8VL7xiW/6SqBiO1tWs=;
  b=OfjKABC3/pbPfGxFmfzw1+3vesmJXe2FcSO46/NhnPqi7TofpfTPzpxv
   sX2kvOxCmbP2wEHHbqQeS2UPR7/Wm2Tmdtn+zpMqEyxkYk6gPKWPoj80z
   sP/mSFyhitBfvUpqNOiiVzrjdRds7rHWH4C0MUvwvW5RbVSLDJmgz5Mnr
   I=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 67013688
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:N/vPk65zEreesiqwzR+fHwxRtBrHchMFZxGqfqrLsTDasY5as4F+v
 mseUD+OaK7ZNDDyftx3bN+/p0wHsJ7QndBqSgRprXsxHi5G8cbLO4+Ufxz6V8+wwmwvb67FA
 +E2MISowBUcFyeEzvuVGuG96yE6j8lkf5KkYAL+EnkZqTRMFWFw0XqPp8Zj2tQy2YPiW1vR0
 T/Pi5a31GGNimYc3l08s8pvmDs31BglkGpF1rCWTakjUG72zxH5PrpGTU2CByKQrr1vNvy7X
 47+IISRpQs1yfuP5uSNyd4XemVSKlLb0JPnZnB+A8BOiTAazsA+PzpS2FPxpi67hh3Q9+2dx
 umhurSPFUAvPLSLvN87TgVXFAElMYFXyaHudC3XXcy7lyUqclPpyvRqSko3IZcZ6qB8BmQmG
 f4wcW5XKErZ3qTvnez9GrIEascLdaEHOKsWvG1gyjfIS+4rW5nZT43B5MNC3Sd2jcdLdRrbT
 5RGMWM0MkSQC/FJEmVUIZ0DmuOBvWL2K2UCinDS/o0cyXeGmWSd15CyaYGIK7RmX/59nEmCo
 Xnd13/kGRxcP9uaoRKH+H+xgu7EnQvgRZkfUra/85ZCn1m71mEVThoMWjOTq+OyilO1WMB3L
 UEI4SEntaV08kG3JvHtUhv9rHOasxo0X9tLD/Z8+AyL0rDT4QuSGi4DVDEpVTA9nJZoH3pwj
 AbPxo63Q2w02FGIdZ6D3ojI6jWwIG8xFkkfeSADbVAJz8jSvqhm23ojUe1fOKKyi9T0HxT5z
 DaLsDUyit0vsCIb60mo1QuZ2mzx//AlWiZwv1yKBTz9smuVcab/P+SVBU7nAeGsxWpzZn2Ip
 zA6lseX94ji5rndxXXWEI3h8FxEjstp0QEwY3YyR/HNFBz3ohZPmLy8Bhkkfi+F1e5eJFfUj
 Lf741852XOqFCLCgVVLS4ywEd826qPrCM7oUPvZBvIXPMQhKV/dpXs2PxbMt4wIrKTKuftlU
 Xt8WZzxZUv29Iw9lGbmLwvj+eFDKt8CKZP7GsmgkkXPPUu2b3+JU7YVWGZinchihJ5oVD79q
 o4FX+PTkk03eLSnPkH/rN5CRXhXfCNTLc2n9KRqmhurf1MO9JcJUKSKn9vMuuVNwsxoqws/1
 izkAhYDkgum3xUq62yiMxheVV8mZr4nxVpTAMDmFQzAN6QLCWp30JoiSg==
IronPort-HdrOrdr: A9a23:4Ym56K475pf6tahSFQPXwMrXdLJyesId70hD6qhwISY1TiW9rb
 HIoB17726RtN9/Yh0dcLy7V5VoBEmsk6KdgrNhWItKPjOW21dARbsKheCJrgEIWReOlNK1vZ
 0QCpSWY+eRMbEVt6jH3DU=
X-IronPort-AV: E=Sophos;i="5.90,223,1643691600"; 
   d="scan'208";a="67013688"
Date: Wed, 30 Mar 2022 18:15:14 +0100
From: Anthony PERARD <anthony.perard@citrix.com>
To: Chuck Zmudzinski <brchuckz@netscape.net>
CC: <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, Juergen Gross
	<jgross@suse.com>, Jan Beulich <jbeulich@suse.com>
Subject: Re: [XEN PATCH] tools/libs/light/libxl_pci.c: explicitly grant
 access to Intel IGD opregion
Message-ID: <YkSQIoYhomhNKpYR@perard.uk.xensource.com>
References: <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz.ref@netscape.net>
 <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz@netscape.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz@netscape.net>

Hi Chuck,

On Sun, Mar 13, 2022 at 11:41:37PM -0400, Chuck Zmudzinski wrote:
> When gfx_passthru is enabled for the Intel IGD, hvmloader maps the IGD
> opregion to the guest but libxl does not grant the guest permission to

I'm not reading the same thing when looking at code in hvmloader. It
seems that hvmloader allocate some memory for the IGD opregion rather
than mapping it.


tools/firmware/hvmloader/pci.c:184
    if ( vendor_id == 0x8086 )
    {
        igd_opregion_pgbase = mem_hole_alloc(IGD_OPREGION_PAGES);
        /*
         * Write the the OpRegion offset to give the opregion
         * address to the device model. The device model will trap
         * and map the OpRegion at the give address.
         */
        pci_writel(vga_devfn, PCI_INTEL_OPREGION,
                   igd_opregion_pgbase << PAGE_SHIFT);
    }

I think this write would go through QEMU, does it do something with it?
(I kind of replying to this question at the end of the mail.)

Is this code in hvmloader actually run in your case?

> Currently, because of another bug in Qemu upstream, this crash can
> only be reproduced using the traditional Qemu device model, and of

qemu-traditional is a bit old... What is the bug in QEMU? Do you have a
link to a patch/mail?

> diff --git a/tools/libs/light/libxl_pci.c b/tools/libs/light/libxl_pci.c
> index 4bbbfe9f16..a4fc473de9 100644
> --- a/tools/libs/light/libxl_pci.c
> +++ b/tools/libs/light/libxl_pci.c
> @@ -2531,6 +2572,37 @@ int libxl__grant_vga_iomem_permission(libxl__gc *gc, const uint32_t domid,
>                    domid, vga_iomem_start, (vga_iomem_start + 0x20 - 1));
>              return ret;
>          }
> +
> +        /* If this is an Intel IGD, allow access to the IGD opregion */
> +        if (!libxl__is_igd_vga_passthru(gc, d_config)) return 0;
> +
> +        uint32_t igd_opregion = sysfs_dev_get_igd_opregion(gc, pci);
> +        uint32_t error = 0xffffffff;
> +        if (igd_opregion == error) break;
> +
> +        vga_iomem_start = ( (uint64_t) igd_opregion ) >> XC_PAGE_SHIFT;
> +        ret = xc_domain_iomem_permission(CTX->xch, stubdom_domid,
> +                                         vga_iomem_start,
> +                                         IGD_OPREGION_PAGES, 1);
> +        if (ret < 0) {
> +            LOGED(ERROR, domid,
> +                  "failed to give stubdom%d access to iomem range "
> +                  "%"PRIx64"-%"PRIx64" for IGD passthru",
> +                  stubdom_domid, vga_iomem_start, (vga_iomem_start +
> +                                                IGD_OPREGION_PAGES - 1));
> +            return ret;
> +        }
> +        ret = xc_domain_iomem_permission(CTX->xch, domid,
> +                                         vga_iomem_start,
> +                                         IGD_OPREGION_PAGES, 1);

Here, you seems to add permission to an address that is read from the
pci config space of the device, but as I've pointed above hvmloader
seems to overwrite this address. It this call to
xc_domain_iomem_permission() does actually anything useful?
Or is it by luck that the address returned by
sysfs_dev_get_igd_opregion() happened to be the address that hvmloader
is going to write?

Or maybe hvmloader doesn't actually do anything?


Some more though on that, looking at QEMU, it seems that there's already
a call to xc_domain_iomem_permission(), in igd_write_opregion(). So
adding one in libxl would seems redundant, or maybe it the one for the
device model's domain that's needed  (named 'stubdom_domid' here)?

Thanks,

-- 
Anthony PERARD


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 17:28:05 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 17:28:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296459.504624 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZc6m-0004fL-C5; Wed, 30 Mar 2022 17:27:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296459.504624; Wed, 30 Mar 2022 17:27:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZc6m-0004fE-92; Wed, 30 Mar 2022 17:27:48 +0000
Received: by outflank-mailman (input) for mailman id 296459;
 Wed, 30 Mar 2022 17:27:47 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=Z5fr=UJ=srcf.net=amc96@srs-se1.protection.inumbo.net>)
 id 1nZc6l-0004e6-54
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 17:27:47 +0000
Received: from ppsw-31.csi.cam.ac.uk (ppsw-31.csi.cam.ac.uk [131.111.8.131])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b5434510-b04e-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 19:27:44 +0200 (CEST)
Received: from hades.srcf.societies.cam.ac.uk ([131.111.179.67]:52158)
 by ppsw-31.csi.cam.ac.uk (ppsw.cam.ac.uk [131.111.8.137]:25)
 with esmtps (TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
 id 1nZc6h-000AEC-KW (Exim 4.95) (return-path <amc96@srcf.net>);
 Wed, 30 Mar 2022 18:27:43 +0100
Received: from [192.168.1.10] (host-78-149-3-47.as13285.net [78.149.3.47])
 (Authenticated sender: amc96)
 by hades.srcf.societies.cam.ac.uk (Postfix) with ESMTPSA id 2095D1FA4C;
 Wed, 30 Mar 2022 18:27:43 +0100 (BST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b5434510-b04e-11ec-a405-831a346695d4
X-Cam-AntiVirus: no malware found
X-Cam-ScannerInfo: https://help.uis.cam.ac.uk/email-scanner-virus
Message-ID: <408e5e07-453c-f377-a5b0-c421d002aec5@srcf.net>
Date: Wed, 30 Mar 2022 18:27:42 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-GB
To: Anthony PERARD <anthony.perard@citrix.com>,
 Chuck Zmudzinski <brchuckz@netscape.net>
Cc: xen-devel@lists.xenproject.org, Wei Liu <wl@xen.org>,
 Juergen Gross <jgross@suse.com>, Jan Beulich <jbeulich@suse.com>
References: <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz.ref@netscape.net>
 <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz@netscape.net>
 <YkSQIoYhomhNKpYR@perard.uk.xensource.com>
From: Andrew Cooper <amc96@srcf.net>
Subject: Re: [XEN PATCH] tools/libs/light/libxl_pci.c: explicitly grant access
 to Intel IGD opregion
In-Reply-To: <YkSQIoYhomhNKpYR@perard.uk.xensource.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

On 30/03/2022 18:15, Anthony PERARD wrote:
> Hi Chuck,
>
> On Sun, Mar 13, 2022 at 11:41:37PM -0400, Chuck Zmudzinski wrote:
>> When gfx_passthru is enabled for the Intel IGD, hvmloader maps the IGD
>> opregion to the guest but libxl does not grant the guest permission to
> I'm not reading the same thing when looking at code in hvmloader. It
> seems that hvmloader allocate some memory for the IGD opregion rather
> than mapping it.
>
>
> tools/firmware/hvmloader/pci.c:184
>     if ( vendor_id == 0x8086 )
>     {
>         igd_opregion_pgbase = mem_hole_alloc(IGD_OPREGION_PAGES);
>         /*
>          * Write the the OpRegion offset to give the opregion
>          * address to the device model. The device model will trap
>          * and map the OpRegion at the give address.
>          */
>         pci_writel(vga_devfn, PCI_INTEL_OPREGION,
>                    igd_opregion_pgbase << PAGE_SHIFT);
>     }
>
> I think this write would go through QEMU, does it do something with it?
> (I kind of replying to this question at the end of the mail.)
>
> Is this code in hvmloader actually run in your case?
>
>> Currently, because of another bug in Qemu upstream, this crash can
>> only be reproduced using the traditional Qemu device model, and of
> qemu-traditional is a bit old... What is the bug in QEMU? Do you have a
> link to a patch/mail?
>
>> diff --git a/tools/libs/light/libxl_pci.c b/tools/libs/light/libxl_pci.c
>> index 4bbbfe9f16..a4fc473de9 100644
>> --- a/tools/libs/light/libxl_pci.c
>> +++ b/tools/libs/light/libxl_pci.c
>> @@ -2531,6 +2572,37 @@ int libxl__grant_vga_iomem_permission(libxl__gc *gc, const uint32_t domid,
>>                    domid, vga_iomem_start, (vga_iomem_start + 0x20 - 1));
>>              return ret;
>>          }
>> +
>> +        /* If this is an Intel IGD, allow access to the IGD opregion */
>> +        if (!libxl__is_igd_vga_passthru(gc, d_config)) return 0;
>> +
>> +        uint32_t igd_opregion = sysfs_dev_get_igd_opregion(gc, pci);
>> +        uint32_t error = 0xffffffff;
>> +        if (igd_opregion == error) break;
>> +
>> +        vga_iomem_start = ( (uint64_t) igd_opregion ) >> XC_PAGE_SHIFT;
>> +        ret = xc_domain_iomem_permission(CTX->xch, stubdom_domid,
>> +                                         vga_iomem_start,
>> +                                         IGD_OPREGION_PAGES, 1);
>> +        if (ret < 0) {
>> +            LOGED(ERROR, domid,
>> +                  "failed to give stubdom%d access to iomem range "
>> +                  "%"PRIx64"-%"PRIx64" for IGD passthru",
>> +                  stubdom_domid, vga_iomem_start, (vga_iomem_start +
>> +                                                IGD_OPREGION_PAGES - 1));
>> +            return ret;
>> +        }
>> +        ret = xc_domain_iomem_permission(CTX->xch, domid,
>> +                                         vga_iomem_start,
>> +                                         IGD_OPREGION_PAGES, 1);
> Here, you seems to add permission to an address that is read from the
> pci config space of the device, but as I've pointed above hvmloader
> seems to overwrite this address. It this call to
> xc_domain_iomem_permission() does actually anything useful?
> Or is it by luck that the address returned by
> sysfs_dev_get_igd_opregion() happened to be the address that hvmloader
> is going to write?
>
> Or maybe hvmloader doesn't actually do anything?
>
>
> Some more though on that, looking at QEMU, it seems that there's already
> a call to xc_domain_iomem_permission(), in igd_write_opregion(). So
> adding one in libxl would seems redundant, or maybe it the one for the
> device model's domain that's needed  (named 'stubdom_domid' here)?

This has been discussed before, but noone's done anything about it. 
It's a massive layering violation for QEMU to issue
xc_domain_iomem_permission()/etc hypercalls.

It should be the toolstack, and only the toolstack, which makes
permissions hypercalls, which in turn will fix a slew of "QEMU doesn't
work when it doesn't have dom0 superpowers" bugs with stubdomains.

In this case specifically, the opregion is a magic Intel graphics
specific bodge.  The i915 driver in the guest really does need to access
part of the real PCH during init, which (in Xen's permission model)
really does require permitting access to the MMIO range (8k iirc) so it
can be mapped as a BAR in QEMU's emulated PCH.

~Andrew


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 18:17:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 18:17:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296467.504654 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZcst-0001cw-FD; Wed, 30 Mar 2022 18:17:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296467.504654; Wed, 30 Mar 2022 18:17:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZcst-0001cp-C5; Wed, 30 Mar 2022 18:17:31 +0000
Received: by outflank-mailman (input) for mailman id 296467;
 Wed, 30 Mar 2022 18:17:29 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wjcS=UJ=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nZcsr-0001bv-MX
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 18:17:29 +0000
Received: from mail-qt1-x831.google.com (mail-qt1-x831.google.com
 [2607:f8b0:4864:20::831])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a791bdea-b055-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 20:17:28 +0200 (CEST)
Received: by mail-qt1-x831.google.com with SMTP id t7so18832172qta.10
 for <xen-devel@lists.xenproject.org>; Wed, 30 Mar 2022 11:17:28 -0700 (PDT)
Received: from pm2-ws13.praxislan02.com ([2001:470:8:67e:ba27:ebff:fee8:ce27])
 by smtp.gmail.com with ESMTPSA id
 r17-20020a05620a299100b00680b43004bfsm10101405qkp.45.2022.03.30.11.17.25
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Wed, 30 Mar 2022 11:17:26 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a791bdea-b055-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:mime-version
         :content-transfer-encoding;
        bh=bcMntDmKCVs95+e0vkGO4mVI2Vi2Ub88nm3xAyn1r5k=;
        b=SJJ5ZBhVXh0/cPxy737DuocIHKceO5dNhNeAqReioLJIuK3sssj+2qU2lutvUjQGKZ
         wTVdvJtU8aTZlEMy+4jEKrNs9qC/H8q9wqTvMezsa3EzaG9Jgf8k698yT4lKJhbOACqC
         34kOBZeamKwPvBaSWsGLIK4z1zb+hmd7AjvKwI1B4L9KcrpiJzkg8Qakvfui3obNARru
         B/llZWjWsLA4tYxjd5+/cHVAWxOdoBLhvvGalIGzHh6UTSuCU2fpn1yyBRkP1+XNmymY
         vqakwjaF8IQS4yIQXfaOOJkbYIN5DfLT8sDWwKFSxoo/3WUXY83Q0v4303Qr+u2eT4V7
         17Ig==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version
         :content-transfer-encoding;
        bh=bcMntDmKCVs95+e0vkGO4mVI2Vi2Ub88nm3xAyn1r5k=;
        b=UsbIWyWHDm/b8mcMA9DK+NC1plfwQVnhCsSrAWiMkvEEYBOe2Aik2Jm3FTHtJXDpsH
         YQo6N648/qOF8pzkdxmvfhy1aDp3O3XTIFKSdrbqKlV7SEg7v9rQlUffq+FEdXo22Din
         ori7+D664o3EyS3DAfyTgrwPLtDyRmiwmtEKENqDG9Klx1D7YW/8VdimIK5kmF5EWpvr
         5YklLr+BsNLR2RG98+N2BTPMH5dACbrEjNMl97de/FxQ8V6qVGKbeVkEw7WcsmBWyRY7
         IQv5xbFw27mVIvxZ5heniF+lpMlmM8PTbX2lQFAwRAm+8Ocq7iGiry/UpalrH5Va0sR9
         Jemw==
X-Gm-Message-State: AOAM532hDs/11k43au/1ax6+cRHPNm3ZQMvKNwPVrIqgoWhhccX2GgtH
	08p4/NOjOlDiyBWSmLGA100KSIBf6q0=
X-Google-Smtp-Source: ABdhPJxPx5465p8F+LsFFeoPO1Bylxge6c+JMcqFT38HHWEwHPMOqZGBn5HvPb8Fq5Q+6hLkeHrQ/Q==
X-Received: by 2002:ac8:5ac2:0:b0:2e1:cc2d:362a with SMTP id d2-20020ac85ac2000000b002e1cc2d362amr790199qtd.584.1648664247023;
        Wed, 30 Mar 2022 11:17:27 -0700 (PDT)
From: Jason Andryuk <jandryuk@gmail.com>
To: xen-devel@lists.xenproject.org
Cc: Jason Andryuk <jandryuk@gmail.com>,
	Wei Liu <wl@xen.org>,
	Anthony PERARD <anthony.perard@citrix.com>,
	Juergen Gross <jgross@suse.com>
Subject: [PATCH] libxl: constify libxl__stubdomain_is_linux
Date: Wed, 30 Mar 2022 14:17:22 -0400
Message-Id: <20220330181722.30280-1-jandryuk@gmail.com>
X-Mailer: git-send-email 2.35.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

libxl__stubdomain_is_linux can take a const pointer, so make the change.

This isn't an issue in-tree, but was found with an OpenXT patch where it
was called with only const libxl_domain_build_info available.

Signed-off-by: Jason Andryuk <jandryuk@gmail.com>
---
 tools/libs/light/libxl_internal.h | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/tools/libs/light/libxl_internal.h b/tools/libs/light/libxl_internal.h
index c0e7779d97..a26daec040 100644
--- a/tools/libs/light/libxl_internal.h
+++ b/tools/libs/light/libxl_internal.h
@@ -2326,7 +2326,7 @@ bool libxl__stubdomain_is_linux_running(libxl__gc *gc, uint32_t domid)
 }
 
 static inline
-bool libxl__stubdomain_is_linux(libxl_domain_build_info *b_info)
+bool libxl__stubdomain_is_linux(const libxl_domain_build_info *b_info)
 {
     /* right now qemu-tranditional implies MiniOS stubdomain and qemu-xen
      * implies Linux stubdomain */
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 18:17:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 18:17:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296466.504644 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZcso-0001MN-7P; Wed, 30 Mar 2022 18:17:26 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296466.504644; Wed, 30 Mar 2022 18:17:26 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZcso-0001MF-3n; Wed, 30 Mar 2022 18:17:26 +0000
Received: by outflank-mailman (input) for mailman id 296466;
 Wed, 30 Mar 2022 18:17:24 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wjcS=UJ=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nZcsm-0001M9-Q3
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 18:17:24 +0000
Received: from mail-qk1-x72d.google.com (mail-qk1-x72d.google.com
 [2607:f8b0:4864:20::72d])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a52d354b-b055-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 20:17:23 +0200 (CEST)
Received: by mail-qk1-x72d.google.com with SMTP id 85so17329323qkm.9
 for <xen-devel@lists.xenproject.org>; Wed, 30 Mar 2022 11:17:23 -0700 (PDT)
Received: from pm2-ws13.praxislan02.com ([2001:470:8:67e:ba27:ebff:fee8:ce27])
 by smtp.gmail.com with ESMTPSA id
 w10-20020a05620a424a00b00680c0c0312dsm7647908qko.30.2022.03.30.11.17.21
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Wed, 30 Mar 2022 11:17:21 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a52d354b-b055-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:mime-version
         :content-transfer-encoding;
        bh=5YqCLPlryrNNNW0/olca6wbBWbnfZE4rRVNX1Y/x2+E=;
        b=bK3iFG5bWynCGaU2ntDTSGnUaORvgJ3IaMBlcLG8ci7GlRARjRgcAID2RzsdQKa5Yj
         Og7ZFUxGhsHr4FKlrO5EF79ecS0niCyjghloIo/hqD1sjGWvucP9sAobAD5kafsQGhf4
         a33pA6EpW3u43Gz/glwc6CEqFrgWSjUt++rFTptSNIaq8tmN5z26HD8PHXPZjMCuvfmg
         NoiR3YRQAEk5G//x8uvP08jrPOzillmltsygJ2Hvfiu6N0gGNRdmheoIpg2zZIAyDFXW
         bIt6Y6lLjEIP4Zo8IciaSvr8cK/gft0h6cIuykOaqPQBzmASSvf+ilROIIbMKleynKy2
         p6Ug==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version
         :content-transfer-encoding;
        bh=5YqCLPlryrNNNW0/olca6wbBWbnfZE4rRVNX1Y/x2+E=;
        b=nHfrfyUAf4ilcxK/cUfRUmipUSarB2T/bwuGR7LiYtg14QNkhRiq/vfNaudO/IYQ1s
         6yMqYGx4jrhU9UeRIqzpjYtHGz/47e624YR4FBmA+i8Yzllg4vDBxanpIaqch4PpQQnb
         ieVneZ+ggZ48IQSiECG+Dd1qy8XhZMD85JJ49zqUXNMp2bvOWW6T2n7X5By1ep5QT0gJ
         gk1wnaZK6axeAI2XDGEkYObgbzLkNaRgKUdMPkEDwWiIyEjpkAK7VCCaTs9LB6QlCyZQ
         qgnRzqRwKqimdTfcMNAfRKRfUInp8eX7SAQj7eB6xjUeYJhvEpc5XASdEZnz2Rh7JbZO
         C3BA==
X-Gm-Message-State: AOAM532MKbrVm1Zd+fQVb0tgDHQuagdtnpMJ0Dxchy7JuUZ+cUIUrfpl
	FF0OlWqxj35d37/stPPrIh90KUOMaXk=
X-Google-Smtp-Source: ABdhPJzQUf/8qwXR20wbxPBnQEhlfkYx6oNT+P5gGem+NBl949xIkf3ITs0D1w4T68XglKkC3drSew==
X-Received: by 2002:a05:620a:16b7:b0:67d:3abc:e4d2 with SMTP id s23-20020a05620a16b700b0067d3abce4d2mr693864qkj.702.1648664242081;
        Wed, 30 Mar 2022 11:17:22 -0700 (PDT)
From: Jason Andryuk <jandryuk@gmail.com>
To: xen-devel@lists.xenproject.org
Cc: Jason Andryuk <jandryuk@gmail.com>,
	Wei Liu <wl@xen.org>,
	Anthony PERARD <anthony.perard@citrix.com>,
	Juergen Gross <jgross@suse.com>
Subject: [PATCH] libxl: Always set ao for qmp_proxy_spawn_outcome
Date: Wed, 30 Mar 2022 14:16:58 -0400
Message-Id: <20220330181658.30209-1-jandryuk@gmail.com>
X-Mailer: git-send-email 2.35.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

I've observed this failed assertion:
libxl_event.c:2057: libxl__ao_inprogress_gc: Assertion `ao' failed.

AFAICT, this is happening in qmp_proxy_spawn_outcome where
sdss->qmp_proxy_spawn.ao is NULL.

The out label of spawn_stub_launch_dm calls qmp_proxy_spawn_outcome, but
it is only in the success path that sdss->qmp_proxy_spawn.ao gets set to
the current ao.  Move the setting earlier to have an ao in all paths
through the function.

Signed-off-by: Jason Andryuk <jandryuk@gmail.com>
---
Another option would be to make spawn_stub_launch_dm call
spawn_stubdom_pvqemu_cb on error.  This avoids needing to set
sdss->qmp_proxy_spawn.ao, but it makes more paths through the code.
---
 tools/libs/light/libxl_dm.c | 4 +++-
 1 file changed, 3 insertions(+), 1 deletion(-)

diff --git a/tools/libs/light/libxl_dm.c b/tools/libs/light/libxl_dm.c
index 9a8ddbe188..59a8dcf3a9 100644
--- a/tools/libs/light/libxl_dm.c
+++ b/tools/libs/light/libxl_dm.c
@@ -2468,6 +2468,9 @@ static void spawn_stub_launch_dm(libxl__egc *egc,
     uint32_t dm_domid = sdss->pvqemu.guest_domid;
     int need_qemu;
 
+    /* Set for out label through qmp_proxy_spawn_outcome(). */
+    sdss->qmp_proxy_spawn.ao = ao;
+
     if (ret) {
         LOGD(ERROR, guest_domid, "error connecting disk devices");
         goto out;
@@ -2567,7 +2570,6 @@ static void spawn_stub_launch_dm(libxl__egc *egc,
             goto out;
     }
 
-    sdss->qmp_proxy_spawn.ao = ao;
     if (libxl__stubdomain_is_linux(&guest_config->b_info)) {
         spawn_qmp_proxy(egc, sdss);
     } else {
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 18:17:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 18:17:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296468.504666 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZct0-0001yY-PX; Wed, 30 Mar 2022 18:17:38 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296468.504666; Wed, 30 Mar 2022 18:17:38 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZct0-0001yO-KY; Wed, 30 Mar 2022 18:17:38 +0000
Received: by outflank-mailman (input) for mailman id 296468;
 Wed, 30 Mar 2022 18:17:36 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wjcS=UJ=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nZcsy-0001bv-Kq
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 18:17:36 +0000
Received: from mail-qv1-xf33.google.com (mail-qv1-xf33.google.com
 [2607:f8b0:4864:20::f33])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ac1c6647-b055-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 20:17:35 +0200 (CEST)
Received: by mail-qv1-xf33.google.com with SMTP id jo24so17532985qvb.5
 for <xen-devel@lists.xenproject.org>; Wed, 30 Mar 2022 11:17:35 -0700 (PDT)
Received: from pm2-ws13.praxislan02.com ([2001:470:8:67e:ba27:ebff:fee8:ce27])
 by smtp.gmail.com with ESMTPSA id
 j1-20020a05620a410100b0067ec5ecac66sm13021652qko.19.2022.03.30.11.17.33
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Wed, 30 Mar 2022 11:17:34 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ac1c6647-b055-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:mime-version
         :content-transfer-encoding;
        bh=pHvZEn7+cQHssE3I7gGuWSbtom5d43HxgDpkmlD56Vg=;
        b=Y1Oywlcn4NzkRRdHX/HPJEkzgfrOjCtr9CMY+ksEZ2Dg2KVUYYn3fO5tFwDzm6kghX
         mFZNdh2BumHlGh4gwDVCfYso9IukdM/ZUaI5MKVHVcPV/gJS0id858FsU0vcfPzYxaOW
         BVTf5MyMjei83A+4YVIjffunKMn7r4vUWcOJQrGFDXrJ6cyaZS0E1onXNNwmxMQItOWL
         ge2Jf9ycPAPNf/vpZIgelBD3Aebx2pwEMEzlCelKnk1fnOynDpO7OJnDPi/L5lL8BH+2
         y0oMLxrD311yph0zd7antevynW7jgQAU428h7NIo4w+reBbpco2ksl/VA0iZcEVDiht/
         qFpg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version
         :content-transfer-encoding;
        bh=pHvZEn7+cQHssE3I7gGuWSbtom5d43HxgDpkmlD56Vg=;
        b=OmabkmZhAXe9+aWO1tn/BT6SOIb1hu6ZnLDKeUThvlgxozrcW7YtVwueQ/mH5UMxPa
         AvFRuRXwQTVAf2HiTQIHP/wTPjXAXm/R7nj02QW4p4qUG+J5vLwzL47rttFpwPoRYQs0
         tXu/0BgcXWIlLA/BCHt+mRUvQluTJcMeDFaNgJ33pyAJyqnvhWfAx9EIjl7TyiOVAD8U
         HKEMUkQVJwXSS1z/5SJaVpY9qIlSFR6FZeLP/4u1BpyEWTPbFVL4wMW6jdHBXh/+VRls
         517ItVs3USS89KFNLX/NNEvLW4KV1/KVkMb+CN7cleAP9REPNwUopPfYTbI0NLwoP8GN
         zKAQ==
X-Gm-Message-State: AOAM532aYi7COM1tVG1vD+i5GxWvMvEeRt3kzf4i0kkHe4vFdz23aYyE
	8zM8Gk7sKY0U054VRNCpMljy4DPk9eE=
X-Google-Smtp-Source: ABdhPJz7VLTKVNyTETqw9Jjjy4PgrvVA/6Fer71PLcEVxi/87OqbFB2Xebxpehtuqx2lStV8f5NIWw==
X-Received: by 2002:a05:6214:622:b0:441:2918:ee18 with SMTP id a2-20020a056214062200b004412918ee18mr463749qvx.118.1648664254631;
        Wed, 30 Mar 2022 11:17:34 -0700 (PDT)
From: Jason Andryuk <jandryuk@gmail.com>
To: xen-devel@lists.xenproject.org
Cc: Jason Andryuk <jandryuk@gmail.com>,
	Wei Liu <wl@xen.org>,
	Anthony PERARD <anthony.perard@citrix.com>,
	Juergen Gross <jgross@suse.com>
Subject: [PATCH] libxl: Don't segfault on soft-reset failure
Date: Wed, 30 Mar 2022 14:17:27 -0400
Message-Id: <20220330181727.30303-1-jandryuk@gmail.com>
X-Mailer: git-send-email 2.35.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

If domain_soft_reset_cb can't rename the save file, it doesn't call
initiate_domain_create() and calls domcreate_complete().

Skipping initiate_domain_create() means dcs->console_wait is
uninitialized and all 0s.

We have:
  domcreate_complete()
    libxl__xswait_stop()
      libxl__ev_xswatch_deregister().

The uninitialized slotnum 0 is considered valid (-1 is the invalid
sentinel), so the NULL pointer path to passed to xs_unwatch() which
segfaults.

libxl__ev_xswatch_deregister:watch w=0x12bc250 wpath=(null) token=0/0: deregister slotnum=0

Ensure dcs->console_xswait is minimally initialized by calling
libxl__xswait_init() in do_domain_soft_reset().

Also add a check for dcs->console_xswait.path being NULL in
domcreate_complete() to avoid the segfault.

Signed-off-by: Jason Andryuk <jandryuk@gmail.com>
---
The NULL check in domcreate_complete isn't needed when the xswait is
initialized, but it could catch other occurances.

 tools/libs/light/libxl_create.c | 7 ++++++-
 1 file changed, 6 insertions(+), 1 deletion(-)

diff --git a/tools/libs/light/libxl_create.c b/tools/libs/light/libxl_create.c
index 15ed021f41..631caa416d 100644
--- a/tools/libs/light/libxl_create.c
+++ b/tools/libs/light/libxl_create.c
@@ -1970,7 +1970,8 @@ static void domcreate_complete(libxl__egc *egc,
     libxl_domain_config *const d_config = dcs->guest_config;
     libxl_domain_config *d_config_saved = &dcs->guest_config_saved;
 
-    libxl__xswait_stop(gc, &dcs->console_xswait);
+    if (dcs->console_xswait.path)
+        libxl__xswait_stop(gc, &dcs->console_xswait);
 
     libxl__domain_build_state_dispose(&dcs->build_state);
 
@@ -2176,6 +2177,10 @@ static int do_domain_soft_reset(libxl_ctx *ctx,
                               aop_console_how);
     cdcs->domid_out = &domid_out;
 
+    /* Initialize in case we end up in domcreate_complete without calling
+     * initiate_domain_create. */
+    libxl__xswait_init(&cdcs->dcs.console_xswait);
+
     dom_path = libxl__xs_get_dompath(gc, domid);
     if (!dom_path) {
         LOGD(ERROR, domid, "failed to read domain path");
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 18:17:45 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 18:17:45 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296469.504677 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZct7-0002RH-6v; Wed, 30 Mar 2022 18:17:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296469.504677; Wed, 30 Mar 2022 18:17:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZct7-0002R5-3R; Wed, 30 Mar 2022 18:17:45 +0000
Received: by outflank-mailman (input) for mailman id 296469;
 Wed, 30 Mar 2022 18:17:43 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wjcS=UJ=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nZct5-0001M9-Ib
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 18:17:43 +0000
Received: from mail-qk1-x734.google.com (mail-qk1-x734.google.com
 [2607:f8b0:4864:20::734])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id b085af41-b055-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 20:17:42 +0200 (CEST)
Received: by mail-qk1-x734.google.com with SMTP id k125so17371415qkf.0
 for <xen-devel@lists.xenproject.org>; Wed, 30 Mar 2022 11:17:42 -0700 (PDT)
Received: from pm2-ws13.praxislan02.com ([2001:470:8:67e:ba27:ebff:fee8:ce27])
 by smtp.gmail.com with ESMTPSA id
 e15-20020ac8670f000000b002e22d9c756dsm14849314qtp.30.2022.03.30.11.17.40
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Wed, 30 Mar 2022 11:17:40 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b085af41-b055-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:mime-version
         :content-transfer-encoding;
        bh=ZCIuaw/P3XMLRkUNQuqL8M82sLjVQz3hz9QA3xFRvLU=;
        b=mDEZNeZH+oPu8ubbp48pijTzq+D5SD8yHENfkw5L0VReCC75KRqi5gTIsqcghMqGfS
         KuLHMt//xGA81zMwKUh01nvtV5SA3moBcvSk6fZvIQmLMTHKu/euh2VYiu3UINTL2Vyd
         j+qV5qpq8J3lUjUgnvDEcWKyQCGz0ZsZjjb9u0bnLcQkjjijl6c5rpcDEE0pw+gBvBUP
         8Rsh1pOpPVRXfyYKUH31TlibWWnhx0DgDhyEWCZyYKyKN7qoGJXpcVaa+MbnCn9l5LMl
         Tda94+pxQVE2RUSnJRzQq0jsROZ9ItPFc8lwtuNUfy4qKw0PqW0YyzzuDjQRBG7R3HnC
         3LAQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version
         :content-transfer-encoding;
        bh=ZCIuaw/P3XMLRkUNQuqL8M82sLjVQz3hz9QA3xFRvLU=;
        b=mnz2t4okSzjXZUmEQfa4WLHSYUqky1BBYyeBv4yG+YqbnJsHtzzs7RTdk4LW+ASqD1
         XqrSqAF57F3Kk0zL0hRz7b2O+Vy++dl0NcSdQGu6fw0B6LcgO32AAhjFjhKOeY81eNBG
         +XwleHoxxNhnRjkY0Km6DE6Mg9gh7IWEHnNGdHCYDVT1UZrG2gVN4dSHmCcwSQfXuANP
         Uu+8MDPuGFnnvxwUwhK8sqJNfpwtzf919c6sr1q54C26QcBwMkuKFcUMslIHCzfXlDKY
         hA/9J6GQwZbTNKAMbrhBoiK/3QXT/cnVG2e9MMzoYEr7gImrUcuw59vv4NQwyv7R2Ybs
         Cvjg==
X-Gm-Message-State: AOAM530d61pRBNWCtVImxndDk2JLdM3bNG0U6kCZwV/O1hb9aIRbnibi
	L3sTQgTTAare2bdPhtyXmomBE5sc5uM=
X-Google-Smtp-Source: ABdhPJzdC79ao0S0ML/h7NX2ZQgJTlsOsPLYfFYRw6jmTBM8d/M02cro0Xcxh+OTzGR4MuO0kdgdUw==
X-Received: by 2002:a05:620a:137a:b0:680:bca2:5c66 with SMTP id d26-20020a05620a137a00b00680bca25c66mr717883qkl.750.1648664261360;
        Wed, 30 Mar 2022 11:17:41 -0700 (PDT)
From: Jason Andryuk <jandryuk@gmail.com>
To: xen-devel@lists.xenproject.org
Cc: Jason Andryuk <jandryuk@gmail.com>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	Wei Liu <wl@xen.org>,
	"Daniel P. Smith" <dpsmith@apertussolutions.com>
Subject: [PATCH] x86/irq: Skip unmap_domain_pirq XSM during destruction
Date: Wed, 30 Mar 2022 14:17:34 -0400
Message-Id: <20220330181734.30319-1-jandryuk@gmail.com>
X-Mailer: git-send-email 2.35.1
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

xsm_unmap_domain_irq was seen denying unmap_domain_pirq when called from
complete_domain_destroy as an RCU callback.  The source context was an
unexpected, random domain.  Since this is a xen-internal operation,
we don't want the XSM hook denying the operation.

Check d->is_dying and skip the check when the domain is dead.  The RCU
callback runs when a domain is in that state.

Suggested-by: Roger Pau Monné <roger.pau@citrix.com>
Signed-off-by: Jason Andryuk <jandryuk@gmail.com>
---
Dan wants to change current to point at DOMID_IDLE when the RCU callback
runs.  I think Juergen's commit 53594c7bd197 "rcu: don't use
stop_machine_run() for rcu_barrier()" may have changed this since it
mentions stop_machine_run scheduled the idle vcpus to run the callbacks
for the old code.

Would that be as easy as changing rcu_do_batch() to do:

+        /* Run as "Xen" not a random domain's vcpu. */
+        vcpu = get_current();
+        set_current(idle_vcpu[smp_processor_id()]);
         list->func(list);
+        set_current(vcpu);

or is using set_current() only acceptable as part of context_switch?

 xen/arch/x86/irq.c | 12 ++++++++----
 1 file changed, 8 insertions(+), 4 deletions(-)

diff --git a/xen/arch/x86/irq.c b/xen/arch/x86/irq.c
index 285ac399fb..16488d287c 100644
--- a/xen/arch/x86/irq.c
+++ b/xen/arch/x86/irq.c
@@ -2340,10 +2340,14 @@ int unmap_domain_pirq(struct domain *d, int pirq)
         nr = msi_desc->msi.nvec;
     }
 
-    ret = xsm_unmap_domain_irq(XSM_HOOK, d, irq,
-                               msi_desc ? msi_desc->dev : NULL);
-    if ( ret )
-        goto done;
+    /* When called by complete_domain_destroy via RCU, current is a random
+     * domain.  Skip the XSM check since this is a Xen-initiated action. */
+    if ( d->is_dying != DOMDYING_dead ) {
+        ret = xsm_unmap_domain_irq(XSM_HOOK, d, irq,
+                                   msi_desc ? msi_desc->dev : NULL);
+        if ( ret )
+            goto done;
+    }
 
     forced_unbind = pirq_guest_force_unbind(d, info);
     if ( forced_unbind )
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 18:17:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 18:17:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296472.504688 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZctG-000369-HI; Wed, 30 Mar 2022 18:17:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296472.504688; Wed, 30 Mar 2022 18:17:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZctG-00035V-E7; Wed, 30 Mar 2022 18:17:54 +0000
Received: by outflank-mailman (input) for mailman id 296472;
 Wed, 30 Mar 2022 18:17:53 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wjcS=UJ=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nZctF-0001bv-BS
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 18:17:53 +0000
Received: from mail-qk1-x735.google.com (mail-qk1-x735.google.com
 [2607:f8b0:4864:20::735])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id b60b46e3-b055-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 20:17:52 +0200 (CEST)
Received: by mail-qk1-x735.google.com with SMTP id q200so4081645qke.7
 for <xen-devel@lists.xenproject.org>; Wed, 30 Mar 2022 11:17:52 -0700 (PDT)
Received: from pm2-ws13.praxislan02.com ([2001:470:8:67e:ba27:ebff:fee8:ce27])
 by smtp.gmail.com with ESMTPSA id
 bl3-20020a05620a1a8300b0067d4cd00231sm11525314qkb.135.2022.03.30.11.17.50
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Wed, 30 Mar 2022 11:17:50 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b60b46e3-b055-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:mime-version
         :content-transfer-encoding;
        bh=Y8hAJm5nFvLb+2d5b5NF8UEhR+NwlN1X22DHUZ0xAUo=;
        b=Su9ofTZ0O+5/KRzDarC2PH14JHfV1VRuN3JWpE6MzKW6GBKh4xdJdtVb19hM5sWVbp
         9CXUSiO+ax3VYoWmq9CnnaYrvHf6ooodI8GP7OYSAJs38icHSOzbk1Q7LJyhEnt0pXbb
         95Ehc11koTC/odaZcG/F0JrncQmRf8+a7wOT6MlW3Vvq7lBX4tWsnqGRnXFR5buzGQMK
         4a8UfVe8ZbsRMHmV7br2ketF/w9OXA/Hen2l5GFmUB4W8H0k/3In7a3PFQlHfzjsG//7
         +gX8swsxLCX8VY18coHJts0nOaujS9rKRITfS2qvWmuoXeJmv9Cz/JALmTXBdJLUe3XU
         4qdQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version
         :content-transfer-encoding;
        bh=Y8hAJm5nFvLb+2d5b5NF8UEhR+NwlN1X22DHUZ0xAUo=;
        b=SKr7wyCxo1eslHy1CssyNiYmAFA+7aTGKEiqyddqatPJTBm71VlJtJstu+nTbQhnDz
         3ueCvZYIUEyYR46QrBylMC0YLoBscyhwISBQzMO55FD32XBfrtys1Mfg1LnhUe5EWuS4
         MazqrId+T/vlUuZDd5MIXrEa16DtMO4f6Y4BccKn7fnHM/aIIadgcJ4TCYOeIqgZT6l4
         6QPTwOCP1DO6YlhEHv5rNfa085czkI7bAP0xQ9sMzB8egMuV6j9VZ/uV9HNW2+Vcx1zY
         2ckPegIyGqvNdT/uo5Iq/rKhN5J7CEayRlDEsl3Sw9TjLgNRMP/gQjxneMe5wJcNjVed
         MvrQ==
X-Gm-Message-State: AOAM5322QCu/AX+QRb9sDuA/F4qE5zfSIVrf7lM361+G8Zw8ptkJgsxU
	/atJkLKTqgaSNLdt4wkWHV2BqDYiz2Q=
X-Google-Smtp-Source: ABdhPJwcylafR/yBAF1iUnytuyKOEARKPzzEzzTVQ6KD6oY2V3EhHwo2qaqHd/NC4uUOEyNUpfdelw==
X-Received: by 2002:a05:620a:b1a:b0:67c:a5bf:a8bf with SMTP id t26-20020a05620a0b1a00b0067ca5bfa8bfmr717097qkg.38.1648664271313;
        Wed, 30 Mar 2022 11:17:51 -0700 (PDT)
From: Jason Andryuk <jandryuk@gmail.com>
To: xen-devel@lists.xenproject.org
Cc: Jason Andryuk <jandryuk@gmail.com>,
	Wei Liu <wl@xen.org>,
	Anthony PERARD <anthony.perard@citrix.com>
Subject: [PATCH] xl: Fix global pci options
Date: Wed, 30 Mar 2022 14:17:41 -0400
Message-Id: <20220330181741.30334-1-jandryuk@gmail.com>
X-Mailer: git-send-email 2.35.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

commit babde47a3fed "introduce a 'passthrough' configuration option to
xl.cfg..." moved the pci list parsing ahead of the global pci option
parsing.  This broke the global pci configuration options since they
need to be set first so that looping over the pci devices assigns their
values.

Move the global pci options ahead of the pci list to restore their
function.

Signed-off-by: Jason Andryuk <jandryuk@gmail.com>
---
 tools/xl/xl_parse.c | 52 ++++++++++++++++++++++-----------------------
 1 file changed, 26 insertions(+), 26 deletions(-)

diff --git a/tools/xl/xl_parse.c b/tools/xl/xl_parse.c
index 117fcdcb2b..b98c0de378 100644
--- a/tools/xl/xl_parse.c
+++ b/tools/xl/xl_parse.c
@@ -1478,6 +1478,32 @@ void parse_config_data(const char *config_source,
         exit(1);
     }
 
+    /* To be reworked (automatically enabled) once the auto ballooning
+     * after guest starts is done (with PCI devices passed in). */
+    if (c_info->type == LIBXL_DOMAIN_TYPE_PV) {
+        xlu_cfg_get_defbool(config, "e820_host", &b_info->u.pv.e820_host, 0);
+    }
+
+    if (!xlu_cfg_get_long (config, "pci_msitranslate", &l, 0))
+        pci_msitranslate = l;
+
+    if (!xlu_cfg_get_long (config, "pci_power_mgmt", &l, 0))
+        pci_power_mgmt = l;
+
+    if (!xlu_cfg_get_long (config, "pci_permissive", &l, 0))
+        pci_permissive = l;
+
+    if (!xlu_cfg_get_long (config, "pci_seize", &l, 0))
+        pci_seize = l;
+
+    if (!xlu_cfg_get_string(config, "rdm", &buf, 0)) {
+        libxl_rdm_reserve rdm;
+        if (!xlu_rdm_parse(config, &rdm, buf)) {
+            b_info->u.hvm.rdm.strategy = rdm.strategy;
+            b_info->u.hvm.rdm.policy = rdm.policy;
+        }
+    }
+
     if (!xlu_cfg_get_list (config, "pci", &pcis, 0, 0)) {
         d_config->num_pcidevs = 0;
         d_config->pcidevs = NULL;
@@ -2338,32 +2364,6 @@ skip_vfb:
         }
     }
 
-    if (!xlu_cfg_get_long (config, "pci_msitranslate", &l, 0))
-        pci_msitranslate = l;
-
-    if (!xlu_cfg_get_long (config, "pci_power_mgmt", &l, 0))
-        pci_power_mgmt = l;
-
-    if (!xlu_cfg_get_long (config, "pci_permissive", &l, 0))
-        pci_permissive = l;
-
-    if (!xlu_cfg_get_long (config, "pci_seize", &l, 0))
-        pci_seize = l;
-
-    /* To be reworked (automatically enabled) once the auto ballooning
-     * after guest starts is done (with PCI devices passed in). */
-    if (c_info->type == LIBXL_DOMAIN_TYPE_PV) {
-        xlu_cfg_get_defbool(config, "e820_host", &b_info->u.pv.e820_host, 0);
-    }
-
-    if (!xlu_cfg_get_string(config, "rdm", &buf, 0)) {
-        libxl_rdm_reserve rdm;
-        if (!xlu_rdm_parse(config, &rdm, buf)) {
-            b_info->u.hvm.rdm.strategy = rdm.strategy;
-            b_info->u.hvm.rdm.policy = rdm.policy;
-        }
-    }
-
     if (!xlu_cfg_get_list(config, "usbctrl", &usbctrls, 0, 0)) {
         d_config->num_usbctrls = 0;
         d_config->usbctrls = NULL;
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 18:28:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 18:28:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296488.504701 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZd3J-0005GK-I3; Wed, 30 Mar 2022 18:28:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296488.504701; Wed, 30 Mar 2022 18:28:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZd3J-0005GD-FA; Wed, 30 Mar 2022 18:28:17 +0000
Received: by outflank-mailman (input) for mailman id 296488;
 Wed, 30 Mar 2022 18:28:15 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=L21/=UJ=apertussolutions.com=dpsmith@srs-se1.protection.inumbo.net>)
 id 1nZd3H-0005G7-Hy
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 18:28:15 +0000
Received: from sender4-of-o51.zoho.com (sender4-of-o51.zoho.com
 [136.143.188.51]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 28012c1f-b057-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 20:28:13 +0200 (CEST)
Received: from [10.10.1.138] (static-72-81-132-2.bltmmd.fios.verizon.net
 [72.81.132.2]) by mx.zohomail.com
 with SMTPS id 1648664890410787.5940034050689;
 Wed, 30 Mar 2022 11:28:10 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 28012c1f-b057-11ec-8fbc-03012f2f19d4
ARC-Seal: i=1; a=rsa-sha256; t=1648664891; cv=none; 
	d=zohomail.com; s=zohoarc; 
	b=npZtWjcW4Y/J370lH6QVMiYy9WI+s2IOK+SeiAbizYO9bdln5eUaKsMeFGpPv0i1pSgb7gnBT0QmaUY48HgBkvrHKqRekcEPfjHCxY/XymldtDWqXQ9XRaqYWhLECfFbfR2BYg8rmMNHm2rP/lFi1cBgotu+i3n/hfYY26FFUDQ=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; 
	t=1648664891; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; 
	bh=V2Cdfw3qsK6arRjmn+bz49KzU3r8AsJyQmv3h+FjNVo=; 
	b=Fyoy4bkvX0d8PKAk22h3RWjg6IeERLrmfY1TL29fNlGyhzn7qAXpT7Beq5J4L5MnhiPDXzZ/LWESgV5U8hHDZaa9vw/SIf6jidxo6+MtesKz4k47wlh4jLtaB+KoQ3esBRTJKFrYVXYUE7q4wyfHVHwwu/jh0O1bxMXeayn0pjI=
ARC-Authentication-Results: i=1; mx.zohomail.com;
	dkim=pass  header.i=apertussolutions.com;
	spf=pass  smtp.mailfrom=dpsmith@apertussolutions.com;
	dmarc=pass header.from=<dpsmith@apertussolutions.com>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1648664891;
	s=zoho; d=apertussolutions.com; i=dpsmith@apertussolutions.com;
	h=Message-ID:Date:MIME-Version:Subject:Subject:To:To:Cc:Cc:References:From:From:In-Reply-To:Content-Type:Content-Transfer-Encoding:Message-Id:Reply-To;
	bh=V2Cdfw3qsK6arRjmn+bz49KzU3r8AsJyQmv3h+FjNVo=;
	b=GgXdRQFmvwFwYqXRS2x5cQXQZRFTCNKRuVtQeClA1tko5xc//fks7g7/k1yWNd8J
	bllK8vzFTnY0/N6roXliDNZvkFm6enOoq2SdGQ8FAYZc0sJ23Osrhj1YWqWzK8m5R8W
	xWtOZrwkuZJyxefrjb8au2cIskbHgFApafhb2wKY=
Message-ID: <9817e3fc-b7a6-9f4d-79cf-dc32fabac2ba@apertussolutions.com>
Date: Wed, 30 Mar 2022 14:27:52 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] x86/irq: Skip unmap_domain_pirq XSM during destruction
Content-Language: en-US
To: Jason Andryuk <jandryuk@gmail.com>, xen-devel@lists.xenproject.org
Cc: Jan Beulich <jbeulich@suse.com>, Andrew Cooper
 <andrew.cooper3@citrix.com>, =?UTF-8?Q?Roger_Pau_Monn=c3=a9?=
 <roger.pau@citrix.com>, Wei Liu <wl@xen.org>
References: <20220330181734.30319-1-jandryuk@gmail.com>
From: "Daniel P. Smith" <dpsmith@apertussolutions.com>
In-Reply-To: <20220330181734.30319-1-jandryuk@gmail.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ZohoMailClient: External

On 3/30/22 14:17, Jason Andryuk wrote:
> xsm_unmap_domain_irq was seen denying unmap_domain_pirq when called from
> complete_domain_destroy as an RCU callback.  The source context was an
> unexpected, random domain.  Since this is a xen-internal operation,
> we don't want the XSM hook denying the operation.
> 
> Check d->is_dying and skip the check when the domain is dead.  The RCU
> callback runs when a domain is in that state.
> 
> Suggested-by: Roger Pau Monné <roger.pau@citrix.com>
> Signed-off-by: Jason Andryuk <jandryuk@gmail.com>
> ---
> Dan wants to change current to point at DOMID_IDLE when the RCU callback
> runs.  I think Juergen's commit 53594c7bd197 "rcu: don't use
> stop_machine_run() for rcu_barrier()" may have changed this since it
> mentions stop_machine_run scheduled the idle vcpus to run the callbacks
> for the old code.
> 
> Would that be as easy as changing rcu_do_batch() to do:
> 
> +        /* Run as "Xen" not a random domain's vcpu. */
> +        vcpu = get_current();
> +        set_current(idle_vcpu[smp_processor_id()]);
>          list->func(list);
> +        set_current(vcpu);
> 
> or is using set_current() only acceptable as part of context_switch?
> 
>  xen/arch/x86/irq.c | 12 ++++++++----
>  1 file changed, 8 insertions(+), 4 deletions(-)
> 
> diff --git a/xen/arch/x86/irq.c b/xen/arch/x86/irq.c
> index 285ac399fb..16488d287c 100644
> --- a/xen/arch/x86/irq.c
> +++ b/xen/arch/x86/irq.c
> @@ -2340,10 +2340,14 @@ int unmap_domain_pirq(struct domain *d, int pirq)
>          nr = msi_desc->msi.nvec;
>      }
>  
> -    ret = xsm_unmap_domain_irq(XSM_HOOK, d, irq,
> -                               msi_desc ? msi_desc->dev : NULL);
> -    if ( ret )
> -        goto done;
> +    /* When called by complete_domain_destroy via RCU, current is a random
> +     * domain.  Skip the XSM check since this is a Xen-initiated action. */
> +    if ( d->is_dying != DOMDYING_dead ) {
> +        ret = xsm_unmap_domain_irq(XSM_HOOK, d, irq,
> +                                   msi_desc ? msi_desc->dev : NULL);
> +        if ( ret )
> +            goto done;
> +    }
>  
>      forced_unbind = pirq_guest_force_unbind(d, info);
>      if ( forced_unbind )

I think this is sufficient though IMHO it would make it stronger if
current accurately reflected the idle domain and the condition was added
to the if statement check this fact.

Reviewed-by: Daniel P. Smith <dpsmith@apertussolutions.com>


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 18:45:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 18:45:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296492.504712 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZdK1-0007YR-1A; Wed, 30 Mar 2022 18:45:33 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296492.504712; Wed, 30 Mar 2022 18:45:33 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZdK0-0007YK-UM; Wed, 30 Mar 2022 18:45:32 +0000
Received: by outflank-mailman (input) for mailman id 296492;
 Wed, 30 Mar 2022 18:45:32 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wjcS=UJ=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nZdK0-0007YE-5F
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 18:45:32 +0000
Received: from mail-lj1-x230.google.com (mail-lj1-x230.google.com
 [2a00:1450:4864:20::230])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 933ddef9-b059-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 20:45:31 +0200 (CEST)
Received: by mail-lj1-x230.google.com with SMTP id q5so28919008ljb.11
 for <xen-devel@lists.xenproject.org>; Wed, 30 Mar 2022 11:45:31 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 933ddef9-b059-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=ayMCnREX9HtNuXi9WeXSZ0So08wG6vqv2BNtNMXIV4M=;
        b=BNgZaWmkON6IJ7dHPrLGKhylSrde+i6aUrHlm0BfbsGMhPEfnTHOygYR6GqTypP8g6
         2eWYm4KSzdIkZhN7AbImoX6U89sgowW6vafyh6D+YGDgYtL1MXdDd/PYdqb3DNRU6pYL
         dW+wyJ+Wc0uDI34M2JTYhv77uC/lgUz1RSjORvyOn9umoo0JMGqLLiCwrM+ISicFKePP
         x7nxw4q01LGXICcWPzV28n1AEMuctqRYnSCMcmbV+Ek2EhcCyAJU2YKBPOPqtRzwhX/9
         Ab1crKURFjr8TlqClj0FMnp87yyYTPrlcBS1f9rZn1TqxbUKbXadI90/eHjzYW6McK1X
         RPwQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=ayMCnREX9HtNuXi9WeXSZ0So08wG6vqv2BNtNMXIV4M=;
        b=C/qEPmzZgEaQkkr+ouhjyhuY6QqLyZel9m+aC5KnjvL348aRgNQepWk9b/ELgITl4p
         ZOSgJwlq0InwRoSa7/Fjk1ybS8hxIQjKa8TD4a0aew+r4XTb+xa3fv+WKmzYf0FrQwwm
         1fEALJhm02Q/haVU9ELVZJv6qGE+6aeQE/G93KzfygWGg9iUy+PP7CL9KOesu9xJ6JWZ
         hSIUsaJ6EqoT5cFFZtSTOt8W/JyahiD9qloSUC9WzNBZdxOZw3Cvmcqi0QIywESfbRx0
         +xegDrBnPaU0uVjo2x5/qjyTSXcFRt/B5sZSLLy1zJHUgRIQhupYNE+YdHDvr2ERPTY8
         d5Ig==
X-Gm-Message-State: AOAM5300i7QdKX0c7Uq2O51pn13LFPfuXwNDJR59Z/Sm7Ibi+QYQHP/z
	FcdFLo6FQ8BOw5wd7nw+ueMmzEzDYY2mLEKN+Sk=
X-Google-Smtp-Source: ABdhPJyiLHNAljZPTPC5pPRsg3EOVzF4VThtRZ3PeSQdV+MzqcPokACeZb4MzBy5ihimA05E2TAFRBHHQtEprD8+kCY=
X-Received: by 2002:a2e:a372:0:b0:249:7108:6778 with SMTP id
 i18-20020a2ea372000000b0024971086778mr7939723ljn.403.1648665930559; Wed, 30
 Mar 2022 11:45:30 -0700 (PDT)
MIME-Version: 1.0
References: <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz.ref@netscape.net>
 <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz@netscape.net>
 <78ce5809-8df4-c94e-4313-fffb1b86b771@suse.com>
In-Reply-To: <78ce5809-8df4-c94e-4313-fffb1b86b771@suse.com>
From: Jason Andryuk <jandryuk@gmail.com>
Date: Wed, 30 Mar 2022 14:45:18 -0400
Message-ID: <CAKf6xpsN+uJ=AyxtrnOrQrynFL=dwC=DdT7DHnK=wx9UFtdUDQ@mail.gmail.com>
Subject: Re: [XEN PATCH] tools/libs/light/libxl_pci.c: explicitly grant access
 to Intel IGD opregion
To: Jan Beulich <jbeulich@suse.com>
Cc: Chuck Zmudzinski <brchuckz@netscape.net>, Wei Liu <wl@xen.org>, 
	Anthony PERARD <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, 
	xen-devel <xen-devel@lists.xenproject.org>
Content-Type: multipart/mixed; boundary="000000000000250d0905db73f394"

--000000000000250d0905db73f394
Content-Type: text/plain; charset="UTF-8"

On Fri, Mar 18, 2022 at 4:13 AM Jan Beulich <jbeulich@suse.com> wrote:
>
> On 14.03.2022 04:41, Chuck Zmudzinski wrote:
> > When gfx_passthru is enabled for the Intel IGD, hvmloader maps the IGD
> > opregion to the guest but libxl does not grant the guest permission to
> > access the mapped memory region. This results in a crash of the i915.ko
> > kernel module in a Linux HVM guest when it needs to access the IGD
> > opregion:
> >
> > Oct 23 11:36:33 domU kernel: Call Trace:
> > Oct 23 11:36:33 domU kernel:  ? idr_alloc+0x39/0x70
> > Oct 23 11:36:33 domU kernel:  drm_get_last_vbltimestamp+0xaa/0xc0 [drm]
> > Oct 23 11:36:33 domU kernel:  drm_reset_vblank_timestamp+0x5b/0xd0 [drm]
> > Oct 23 11:36:33 domU kernel:  drm_crtc_vblank_on+0x7b/0x130 [drm]
> > Oct 23 11:36:33 domU kernel:  intel_modeset_setup_hw_state+0xbd4/0x1900 [i915]
> > Oct 23 11:36:33 domU kernel:  ? _cond_resched+0x16/0x40
> > Oct 23 11:36:33 domU kernel:  ? ww_mutex_lock+0x15/0x80
> > Oct 23 11:36:33 domU kernel:  intel_modeset_init_nogem+0x867/0x1d30 [i915]
> > Oct 23 11:36:33 domU kernel:  ? gen6_write32+0x4b/0x1c0 [i915]
> > Oct 23 11:36:33 domU kernel:  ? intel_irq_postinstall+0xb9/0x670 [i915]
> > Oct 23 11:36:33 domU kernel:  i915_driver_probe+0x5c2/0xc90 [i915]
> > Oct 23 11:36:33 domU kernel:  ? vga_switcheroo_client_probe_defer+0x1f/0x40
> > Oct 23 11:36:33 domU kernel:  ? i915_pci_probe+0x3f/0x150 [i915]
> > Oct 23 11:36:33 domU kernel:  local_pci_probe+0x42/0x80
> > Oct 23 11:36:33 domU kernel:  ? _cond_resched+0x16/0x40
> > Oct 23 11:36:33 domU kernel:  pci_device_probe+0xfd/0x1b0
> > Oct 23 11:36:33 domU kernel:  really_probe+0x222/0x480
> > Oct 23 11:36:33 domU kernel:  driver_probe_device+0xe1/0x150
> > Oct 23 11:36:33 domU kernel:  device_driver_attach+0xa1/0xb0
> > Oct 23 11:36:33 domU kernel:  __driver_attach+0x8a/0x150
> > Oct 23 11:36:33 domU kernel:  ? device_driver_attach+0xb0/0xb0
> > Oct 23 11:36:33 domU kernel:  ? device_driver_attach+0xb0/0xb0
> > Oct 23 11:36:33 domU kernel:  bus_for_each_dev+0x78/0xc0
> > Oct 23 11:36:33 domU kernel:  bus_add_driver+0x12b/0x1e0
> > Oct 23 11:36:33 domU kernel:  driver_register+0x8b/0xe0
> > Oct 23 11:36:33 domU kernel:  ? 0xffffffffc06b8000
> > Oct 23 11:36:33 domU kernel:  i915_init+0x5d/0x70 [i915]
> > Oct 23 11:36:33 domU kernel:  do_one_initcall+0x44/0x1d0
> > Oct 23 11:36:33 domU kernel:  ? do_init_module+0x23/0x260
> > Oct 23 11:36:33 domU kernel:  ? kmem_cache_alloc_trace+0xf5/0x200
> > Oct 23 11:36:33 domU kernel:  do_init_module+0x5c/0x260
> > Oct 23 11:36:33 domU kernel:  __do_sys_finit_module+0xb1/0x110
> > Oct 23 11:36:33 domU kernel:  do_syscall_64+0x33/0x80
> > Oct 23 11:36:33 domU kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9
>
> The call trace alone leaves open where exactly the crash occurred.
> Looking at 5.17 I notice that the first thing the driver does
> after mapping the range it to check the signature (both in
> intel_opregion_setup()). As the signature can't possibly match
> with no access granted to the underlying mappings, there shouldn't
> be any further attempts to use the region in the driver; if there
> are, I'd view this as a driver bug.

Yes.  i915_driver_hw_probe does not check the return value of
intel_opregion_setup(dev_priv) and just continues on.

Chuck, the attached patch may help if you want to test it.

Regards,
Jason

--000000000000250d0905db73f394
Content-Type: application/x-patch; 
	name="0001-i915-Fail-probe-when-opregion-setup-fails.patch"
Content-Disposition: attachment; 
	filename="0001-i915-Fail-probe-when-opregion-setup-fails.patch"
Content-Transfer-Encoding: base64
Content-ID: <f_l1dwihsv0>
X-Attachment-Id: f_l1dwihsv0
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--000000000000250d0905db73f394--


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 19:05:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 19:05:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296499.504730 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZdcs-0001Vg-M5; Wed, 30 Mar 2022 19:05:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296499.504730; Wed, 30 Mar 2022 19:05:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZdcs-0001VZ-J3; Wed, 30 Mar 2022 19:05:02 +0000
Received: by outflank-mailman (input) for mailman id 296499;
 Wed, 30 Mar 2022 19:05:01 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=L21/=UJ=apertussolutions.com=dpsmith@srs-se1.protection.inumbo.net>)
 id 1nZdcr-0001VT-S3
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 19:05:01 +0000
Received: from sender4-of-o51.zoho.com (sender4-of-o51.zoho.com
 [136.143.188.51]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4b661566-b05c-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 21:05:00 +0200 (CEST)
Received: from sisyou.hme. (static-72-81-132-2.bltmmd.fios.verizon.net
 [72.81.132.2]) by mx.zohomail.com
 with SMTPS id 1648667094944933.625590599704;
 Wed, 30 Mar 2022 12:04:54 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4b661566-b05c-11ec-a405-831a346695d4
ARC-Seal: i=1; a=rsa-sha256; t=1648667097; cv=none; 
	d=zohomail.com; s=zohoarc; 
	b=cdbjdGskC4EwYcQuTTBL3GtZxbBYthMKsFnK7b4501BqDFU/E+UiFRwSin/oCgpYypotgYahnXeP7sQmisdU8nUiADuoPsiLg5zCPeNkJdP88tObuR/I9e75RsFzATdeGmZTntMAC17T/v2PKAbSSs7sLTzsHASiuBJel6RLy5E=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; 
	t=1648667097; h=Content-Transfer-Encoding:Cc:Date:From:MIME-Version:Message-ID:Subject:To; 
	bh=HO/ZM3ckJO9X3H5rFqGUR3zPwBsdAhdUvZEo1ba69+k=; 
	b=a9ljHLpBZ+5129JuFVL8AYbosiOOhHtFl0A4OdnogjonEqyjX2du91vyBjk+mqOgpzKL6WwxW8VVKZxrxPKGHIFnAcFic4UHa3Mv+LU559CX1w6yuEPEzEQ7gFXwBasmJ8ybc43HuuQ77LSX0EqBqw6zJHVlYO7oemGIdahTqqc=
ARC-Authentication-Results: i=1; mx.zohomail.com;
	dkim=pass  header.i=apertussolutions.com;
	spf=pass  smtp.mailfrom=dpsmith@apertussolutions.com;
	dmarc=pass header.from=<dpsmith@apertussolutions.com>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1648667097;
	s=zoho; d=apertussolutions.com; i=dpsmith@apertussolutions.com;
	h=From:From:To:To:Cc:Cc:Subject:Subject:Date:Message-Id:Message-Id:MIME-Version:Content-Transfer-Encoding:Reply-To;
	bh=HO/ZM3ckJO9X3H5rFqGUR3zPwBsdAhdUvZEo1ba69+k=;
	b=iY5Cu0aALwBjkgZ+rly6CwpUyQJ07ryb/5lqG8FRs0QtjwTaRv1PIAuK9y0xquAr
	RGNvIbFeEAlifceobzVw1TX6R7sfD9A1G+pjLVhLU1SJI3wXR+FS4sFazVAPm64I1TA
	hU8dFdkXZf/PtKTcw4I/PBpPmGAXwJL0abxwaQR4=
From: "Daniel P. Smith" <dpsmith@apertussolutions.com>
To: xen-devel@lists.xenproject.org
Cc: "Daniel P. Smith" <dpsmith@apertussolutions.com>,
	scott.davis@starlab.io,
	jandryuk@gmail.com
Subject: [PATCH 0/2] Introduce XSM ability for domain privilege escalation
Date: Wed, 30 Mar 2022 19:05:47 -0400
Message-Id: <20220330230549.26074-1-dpsmith@apertussolutions.com>
X-Mailer: git-send-email 2.20.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-ZohoMailClient: External

This series introduces a pair of functions that allow a domain to be escalated to
is_privileged or demoted. Internally the functions enforce the policy that this
is only allowed for system domains, the idle domain in particular.

As for the implementation, there is a desire that the logic does not persist after
__init code is jettison after setup. This has to be balanced with the fact there is no
.c unit files for XSM when only the default policy is in use, i.e. CONFIG_XSM is not
set. To balance this the functions were implemented as always_inline functions in xsm.h.
This should ensure that if the only usage of these functions are in __init code, there
should be no instances of this logic present after __init code is jettisoned. Since
this introduces the ability to elevate the idle domain to is_privileged, this should
not be left in place when transitioning into the running state. As such, a pair of
ASSERTs were introduced, one each, for x86 and Arm to ensure that the idle domain
isn't inadvertently left with is_privileged being true.

Daniel P. Smith (2):
  xsm: add ability to elevate a domain to privileged
  arch: ensure idle domain is not left privileged

 xen/arch/arm/setup.c  |  3 +++
 xen/arch/x86/setup.c  |  3 +++
 xen/include/xsm/xsm.h | 22 ++++++++++++++++++++++
 3 files changed, 28 insertions(+)

-- 
2.20.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 19:05:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 19:05:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296500.504741 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZdcy-0001n6-1p; Wed, 30 Mar 2022 19:05:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296500.504741; Wed, 30 Mar 2022 19:05:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZdcx-0001mz-UR; Wed, 30 Mar 2022 19:05:07 +0000
Received: by outflank-mailman (input) for mailman id 296500;
 Wed, 30 Mar 2022 19:05:06 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=L21/=UJ=apertussolutions.com=dpsmith@srs-se1.protection.inumbo.net>)
 id 1nZdcw-0001VT-E5
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 19:05:06 +0000
Received: from sender4-of-o51.zoho.com (sender4-of-o51.zoho.com
 [136.143.188.51]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4e670fb0-b05c-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 21:05:05 +0200 (CEST)
Received: from sisyou.hme. (static-72-81-132-2.bltmmd.fios.verizon.net
 [72.81.132.2]) by mx.zohomail.com
 with SMTPS id 1648667096871750.1941533014053;
 Wed, 30 Mar 2022 12:04:56 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4e670fb0-b05c-11ec-a405-831a346695d4
ARC-Seal: i=1; a=rsa-sha256; t=1648667098; cv=none; 
	d=zohomail.com; s=zohoarc; 
	b=I8IHlShgYkhKa5I3J2yTRYG+M0XKPmdaxJWzBhuOES71D3stl8jxjCkIlFhPgoIo8U4hLtUpJNeI2eA1huxJQ4a6d0bNGIj23RucANz0xEGPxR7TEqlCxe3/jjOxw5HyHt2SIuNrloV1l5mI5Vr3B2qss/fMD59Kqtr1LVddLzU=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; 
	t=1648667098; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; 
	bh=xQOPCqDVTdCL2p8rO8+lt5h9rYY5L4DAdcWEvMlILpc=; 
	b=luLcV2MpRfAx3Q9MergmERIqb8fWR6K95maJnAo9qkKdj8Xb0jCFDligMpTjiYYxSk0GXywpLbbRYAGyRwlu1jFjSqDngHYch6xxjyGQjBtZKiW610XfxXi+W0/Vx7fEYYbg8gIi9QgEAvSItnQNENmj8hoxHA9vneoO2tTEz+0=
ARC-Authentication-Results: i=1; mx.zohomail.com;
	dkim=pass  header.i=apertussolutions.com;
	spf=pass  smtp.mailfrom=dpsmith@apertussolutions.com;
	dmarc=pass header.from=<dpsmith@apertussolutions.com>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1648667098;
	s=zoho; d=apertussolutions.com; i=dpsmith@apertussolutions.com;
	h=From:From:To:To:Cc:Cc:Subject:Subject:Date:Message-Id:Message-Id:In-Reply-To:References:MIME-Version:Content-Transfer-Encoding:Reply-To;
	bh=xQOPCqDVTdCL2p8rO8+lt5h9rYY5L4DAdcWEvMlILpc=;
	b=lcUXJCMjU1RN/AekWEXGxAZz1CD5oOJAPf87B9IBcG7XENztAfFnl/NVJ6njPzbn
	Ym8fUsAB4EPNR/2ikx33xTQyB0tlEQv1hY66ufoxiWvdSN4ZHstqEtkwDqoLjGJRp+L
	s+5qO6vQovFOayEgp2vJSKYowBodypnzKuXAvl7Q=
From: "Daniel P. Smith" <dpsmith@apertussolutions.com>
To: xen-devel@lists.xenproject.org
Cc: "Daniel P. Smith" <dpsmith@apertussolutions.com>,
	scott.davis@starlab.io,
	jandryuk@gmail.com,
	Daniel De Graaf <dgdegra@tycho.nsa.gov>
Subject: [PATCH 1/2] xsm: add ability to elevate a domain to privileged
Date: Wed, 30 Mar 2022 19:05:48 -0400
Message-Id: <20220330230549.26074-2-dpsmith@apertussolutions.com>
X-Mailer: git-send-email 2.20.1
In-Reply-To: <20220330230549.26074-1-dpsmith@apertussolutions.com>
References: <20220330230549.26074-1-dpsmith@apertussolutions.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-ZohoMailClient: External

There are now instances where internal hypervisor logic needs to make resource
allocation calls that are protected by XSM checks. The internal hypervisor logic
is represented a number of system domains which by designed are represented by
non-privileged struct domain instances. To enable these logic blocks to
function correctly but in a controlled manner, this commit introduces a pair
of privilege escalation and demotion functions that will make a system domain
privileged and then remove that privilege.

Signed-off-by: Daniel P. Smith <dpsmith@apertussolutions.com>
---
 xen/include/xsm/xsm.h | 22 ++++++++++++++++++++++
 1 file changed, 22 insertions(+)

diff --git a/xen/include/xsm/xsm.h b/xen/include/xsm/xsm.h
index e22d6160b5..157e57151e 100644
--- a/xen/include/xsm/xsm.h
+++ b/xen/include/xsm/xsm.h
@@ -189,6 +189,28 @@ struct xsm_operations {
 #endif
 };
 
+static always_inline int xsm_elevate_priv(struct domain *d)
+{
+    if ( is_system_domain(d) )
+    {
+        d->is_privileged = true;
+        return 0;
+    }
+
+    return -EPERM;
+}
+
+static always_inline int xsm_demote_priv(struct domain *d)
+{
+    if ( is_system_domain(d) )
+    {
+        d->is_privileged = false;
+        return 0;
+    }
+
+    return -EPERM;
+}
+
 #ifdef CONFIG_XSM
 
 extern struct xsm_operations *xsm_ops;
-- 
2.20.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 19:05:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 19:05:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296501.504752 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZddB-0002IC-Ap; Wed, 30 Mar 2022 19:05:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296501.504752; Wed, 30 Mar 2022 19:05:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZddB-0002HN-79; Wed, 30 Mar 2022 19:05:21 +0000
Received: by outflank-mailman (input) for mailman id 296501;
 Wed, 30 Mar 2022 19:05:19 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=L21/=UJ=apertussolutions.com=dpsmith@srs-se1.protection.inumbo.net>)
 id 1nZdd9-0001VT-8X
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 19:05:19 +0000
Received: from sender4-of-o51.zoho.com (sender4-of-o51.zoho.com
 [136.143.188.51]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 560afc2e-b05c-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 21:05:18 +0200 (CEST)
Received: from sisyou.hme. (static-72-81-132-2.bltmmd.fios.verizon.net
 [72.81.132.2]) by mx.zohomail.com
 with SMTPS id 1648667098306644.7320036155761;
 Wed, 30 Mar 2022 12:04:58 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 560afc2e-b05c-11ec-a405-831a346695d4
ARC-Seal: i=1; a=rsa-sha256; t=1648667100; cv=none; 
	d=zohomail.com; s=zohoarc; 
	b=PAvk23Bp7OtwQ34hjKg724vdDXmYp6UIWNv4TDRbpKCX7HyxO2AOGo2MnX2CxV5sjrmbXak7X8QD+HAj6BRk72yilMYNpxVHDdx07cPtoSTnbrM/SFCl9Up2erpztzZ+8lljUp6i6FUJQkNFOi2VviY2CBXQOPMwAbbWLvxfVGA=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; 
	t=1648667100; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To; 
	bh=dB9qOZNsWI6cdhi3GPQMvCqqeva+kPJ+omKewxXhvII=; 
	b=jMRIkmlwpqBXCDmGVKiO1J7il6k/RLDL3Xq13V2/8PIJEMLXGVFQClGOlnIyxWS9PLcKNIVkZx4HzjU+lO2GPg3J1HYZduxmFPEU8TQKd1QqCJDJNgjEMk2upIDsQ1b7e/qQz3fM7XKVpMyWyAY0rs/inyKVJFSW2FjWw2oELP0=
ARC-Authentication-Results: i=1; mx.zohomail.com;
	dkim=pass  header.i=apertussolutions.com;
	spf=pass  smtp.mailfrom=dpsmith@apertussolutions.com;
	dmarc=pass header.from=<dpsmith@apertussolutions.com>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1648667100;
	s=zoho; d=apertussolutions.com; i=dpsmith@apertussolutions.com;
	h=From:From:To:To:Cc:Cc:Subject:Subject:Date:Message-Id:Message-Id:In-Reply-To:References:MIME-Version:Content-Transfer-Encoding:Reply-To;
	bh=dB9qOZNsWI6cdhi3GPQMvCqqeva+kPJ+omKewxXhvII=;
	b=uk3A1857UhrOj+FEX5+zWliaVJduT9HgfOaCYkUQplgjGzFRXXT+u2Apki667jlV
	I1pVnlIJIB+WS6PpwLKv2sFSr0p7UuOktkTF9nNP7wiV/TGAPgRIt9dzpJqQC6/TogK
	s7pfv522ajyftOZdqblzm7u/zoUkzAGDJb0UK4uU=
From: "Daniel P. Smith" <dpsmith@apertussolutions.com>
To: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Wei Liu <wl@xen.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>,
	xen-devel@lists.xenproject.org
Cc: "Daniel P. Smith" <dpsmith@apertussolutions.com>,
	scott.davis@starlab.io,
	jandryuk@gmail.com,
	Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>
Subject: [PATCH 2/2] arch: ensure idle domain is not left privileged
Date: Wed, 30 Mar 2022 19:05:49 -0400
Message-Id: <20220330230549.26074-3-dpsmith@apertussolutions.com>
X-Mailer: git-send-email 2.20.1
In-Reply-To: <20220330230549.26074-1-dpsmith@apertussolutions.com>
References: <20220330230549.26074-1-dpsmith@apertussolutions.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-ZohoMailClient: External

It is now possible to promote the idle domain to privileged during setup.  It
is not desirable for the idle domain to still be privileged when moving into a
running state. If the idle domain was elevated and not properly demoted, it is
desirable to fail at this point. This commit adds an assert for both x86 and
Arm just before transitioning to a running state that ensures the idle is not
privileged.

Signed-off-by: Daniel P. Smith <dpsmith@apertussolutions.com>
---
 xen/arch/arm/setup.c | 3 +++
 xen/arch/x86/setup.c | 3 +++
 2 files changed, 6 insertions(+)

diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c
index 7968cee47d..3de394e946 100644
--- a/xen/arch/arm/setup.c
+++ b/xen/arch/arm/setup.c
@@ -973,6 +973,9 @@ void __init start_xen(unsigned long boot_phys_offset,
     /* Hide UART from DOM0 if we're using it */
     serial_endboot();
 
+    /* Ensure idle domain was not left privileged */
+    ASSERT(current->domain->is_privileged == false) ;
+
     system_state = SYS_STATE_active;
 
     create_domUs();
diff --git a/xen/arch/x86/setup.c b/xen/arch/x86/setup.c
index 885919d5c3..b868463f83 100644
--- a/xen/arch/x86/setup.c
+++ b/xen/arch/x86/setup.c
@@ -589,6 +589,9 @@ static void noinline init_done(void)
     void *va;
     unsigned long start, end;
 
+    /* Ensure idle domain was not left privileged */
+    ASSERT(current->domain->is_privileged == false) ;
+
     system_state = SYS_STATE_active;
 
     domain_unpause_by_systemcontroller(dom0);
-- 
2.20.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 19:47:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 19:47:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296524.504765 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZeHb-0006vP-KU; Wed, 30 Mar 2022 19:47:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296524.504765; Wed, 30 Mar 2022 19:47:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZeHb-0006vI-Hd; Wed, 30 Mar 2022 19:47:07 +0000
Received: by outflank-mailman (input) for mailman id 296524;
 Wed, 30 Mar 2022 19:47:06 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wjcS=UJ=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nZeHa-0006vC-Kz
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 19:47:06 +0000
Received: from mail-qt1-x829.google.com (mail-qt1-x829.google.com
 [2607:f8b0:4864:20::829])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 2c4fc833-b062-11ec-8fbc-03012f2f19d4;
 Wed, 30 Mar 2022 21:47:04 +0200 (CEST)
Received: by mail-qt1-x829.google.com with SMTP id s11so19113150qtc.3
 for <xen-devel@lists.xenproject.org>; Wed, 30 Mar 2022 12:47:04 -0700 (PDT)
Received: from pm2-ws13.praxislan02.com ([2001:470:8:67e:ba27:ebff:fee8:ce27])
 by smtp.gmail.com with ESMTPSA id
 x4-20020a05620a258400b0067d47fb5aa4sm1895896qko.63.2022.03.30.12.47.01
 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);
 Wed, 30 Mar 2022 12:47:02 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2c4fc833-b062-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=from:to:cc:subject:date:message-id:mime-version
         :content-transfer-encoding;
        bh=SyDB2WAHAhwiKBINMlehh9VGxcM27O5l3BvqNPNjvAo=;
        b=ewQRmR9r9FWsDoBzfGiucgKYiugn/l8Na2fK4+7Pwu56IpYC63c9463MqRrk2/DXfp
         8lHmRvhxHEZdVvejelEwXTlwxDITwcPKUg2d3S4z8YQBVkobE28uNOvGpgB4hHRSOrhf
         z270tjUU/2gvjPHJtQZKfCMddDYbzwgWG0iauRflqHeR0hNbWikYbH+ONkJDw6OK63ic
         3NVlyddoihGWyrSLqVpKsP59uYH1RfLVHroM9Ypgg4fjomnE9ex35bMF834+t7ycAgWd
         DjHLVQVzUd+oA0R00wrn/tXxBrTWayxAy/vxHRDXSNn/ibRD651orIZoh5sy+POTobqp
         sFnw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version
         :content-transfer-encoding;
        bh=SyDB2WAHAhwiKBINMlehh9VGxcM27O5l3BvqNPNjvAo=;
        b=e6iuf7fzVAC3Q69FKi92v8EWFp0um8EmVu/7ElPBu0/x+6WgUFW4dcNTW2nuY0gvAh
         bBpd2jZOEuTCE6EVVXMsdTWpexECFTh84HNoN261QDCe812w8qggYsPHu3Zm/kxN7GYP
         MUlQLdZ/bRCOIL3jNmcPyVZUxgkNzTbo8v0rGe6GjURlNk87tIiG6oS95Ugmk0yLzA1Z
         S/LGkAL+q8Key39weUnCOy3MVBpsqatMojXDPU4sW9tLuxC6LWNNXk7oCOL2tM5273E6
         AeR6VAAy0d+oij7Vyg9Vc5GgMCbPyiQ+/Nq5Tk8i85I4jYvQRMDLSGrf9KPHsjgEVnvk
         ODxA==
X-Gm-Message-State: AOAM533oAS1apQkaR7bMS4/mdYNRjZnycharH35eA4gp//KQ59jMUXwC
	if/qKIS1CrCvXJCDpwvzAka3UtI/aRs=
X-Google-Smtp-Source: ABdhPJwxzfMZhl7myAdznnlaHwalOTY5yvtzsKCQATMNu0GEdJRII5z+N7WvmreWiqTh0NbgJa387g==
X-Received: by 2002:a05:622a:1801:b0:2e0:6909:6e0 with SMTP id t1-20020a05622a180100b002e0690906e0mr1186694qtc.148.1648669622856;
        Wed, 30 Mar 2022 12:47:02 -0700 (PDT)
From: Jason Andryuk <jandryuk@gmail.com>
To: xen-devel@lists.xenproject.org
Cc: Jason Andryuk <jandryuk@gmail.com>,
	Wei Liu <wl@xen.org>,
	Anthony PERARD <anthony.perard@citrix.com>,
	Juergen Gross <jgross@suse.com>,
	=?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
Subject: [PATCH] libxl: Retry QMP PCI device_add
Date: Wed, 30 Mar 2022 15:46:56 -0400
Message-Id: <20220330194656.39051-1-jandryuk@gmail.com>
X-Mailer: git-send-email 2.35.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

PCI device assignment to an HVM with stubdom is potentially racy.  First
the PCI device is assigned to the stubdom via the PV PCI protocol.  Then
QEMU is sent a QMP command to attach the PCI device to QEMU running
within the stubdom.  However, the sysfs entries within the stubdom may
not have appeared by the time QEMU receives the device_add command
resulting in errors like:

libxl_qmp.c:1838:qmp_ev_parse_error_messages:Domain 10:Could not open '/sys/bus/pci/devices/0000:00:1f.3/config': No such file or directory

This patch retries the device assignment up to 10 times with a 1 second
delay between.  That roughly matches the overall hotplug timeout.

The qmp_ev_parse_error_messages error is still printed since it happens
at a lower level than the pci code controlling the retries.  With that,
the "Retrying PCI add %d" message is also printed at ERROR level to
clarify what is happening.

Signed-off-by: Jason Andryuk <jandryuk@gmail.com>
---
 tools/libs/light/libxl_pci.c | 32 ++++++++++++++++++++++++++++++--
 1 file changed, 30 insertions(+), 2 deletions(-)

diff --git a/tools/libs/light/libxl_pci.c b/tools/libs/light/libxl_pci.c
index 4bbbfe9f16..8d6a0e65cc 100644
--- a/tools/libs/light/libxl_pci.c
+++ b/tools/libs/light/libxl_pci.c
@@ -1109,8 +1109,10 @@ typedef struct pci_add_state {
     libxl__xswait_state xswait;
     libxl__ev_qmp qmp;
     libxl__ev_time timeout;
+    libxl__ev_time timeout_retries;
     libxl_device_pci pci;
     libxl_domid pci_domid;
+    int retries;
 } pci_add_state;
 
 static void pci_add_qemu_trad_watch_state_cb(libxl__egc *egc,
@@ -1118,6 +1120,8 @@ static void pci_add_qemu_trad_watch_state_cb(libxl__egc *egc,
 static void pci_add_qmp_device_add(libxl__egc *, pci_add_state *);
 static void pci_add_qmp_device_add_cb(libxl__egc *,
     libxl__ev_qmp *, const libxl__json_object *, int rc);
+static void pci_add_qmp_device_add_retry(libxl__egc *egc, libxl__ev_time *ev,
+    const struct timeval *requested_abs, int rc);
 static void pci_add_qmp_query_pci_cb(libxl__egc *,
     libxl__ev_qmp *, const libxl__json_object *, int rc);
 static void pci_add_timeout(libxl__egc *egc, libxl__ev_time *ev,
@@ -1137,7 +1141,9 @@ static void do_pci_add(libxl__egc *egc,
     libxl__xswait_init(&pas->xswait);
     libxl__ev_qmp_init(&pas->qmp);
     pas->pci_domid = domid;
+    pas->retries = 0;
     libxl__ev_time_init(&pas->timeout);
+    libxl__ev_time_init(&pas->timeout_retries);
 
     if (type == LIBXL_DOMAIN_TYPE_INVALID) {
         rc = ERROR_FAIL;
@@ -1252,10 +1258,22 @@ static void pci_add_qmp_device_add_cb(libxl__egc *egc,
                                       const libxl__json_object *response,
                                       int rc)
 {
-    EGC_GC;
     pci_add_state *pas = CONTAINER_OF(qmp, *pas, qmp);
+    STATE_AO_GC(pas->aodev->ao);
 
-    if (rc) goto out;
+    if (rc) {
+        if (pas->retries++ < 10) {
+            LOGD(ERROR, qmp->domid, "Retrying PCI add %d", pas->retries);
+            rc = libxl__ev_time_register_rel(ao, &pas->timeout_retries,
+                                             pci_add_qmp_device_add_retry,
+                                             1000);
+            if (rc) goto out;
+
+            return; /* wait for the timeout to then retry */
+        } else {
+            goto out;
+        }
+    }
 
     qmp->callback = pci_add_qmp_query_pci_cb;
     rc = libxl__ev_qmp_send(egc, qmp, "query-pci", NULL);
@@ -1266,6 +1284,15 @@ out:
     pci_add_dm_done(egc, pas, rc); /* must be last */
 }
 
+static void pci_add_qmp_device_add_retry(libxl__egc *egc, libxl__ev_time *ev,
+                                         const struct timeval *requested_abs,
+                                         int rc)
+{
+    pci_add_state *pas = CONTAINER_OF(ev, *pas, timeout_retries);
+
+    pci_add_qmp_device_add(egc, pas);
+}
+
 static void pci_add_qmp_query_pci_cb(libxl__egc *egc,
                                      libxl__ev_qmp *qmp,
                                      const libxl__json_object *response,
@@ -1507,6 +1534,7 @@ out_no_irq:
         rc = 0;
 out:
     libxl__ev_time_deregister(gc, &pas->timeout);
+    libxl__ev_time_deregister(gc, &pas->timeout_retries);
     pas->callback(egc, pas, rc);
 }
 
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Wed Mar 30 19:53:20 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 19:53:20 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296529.504780 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZeNZ-0008LP-BG; Wed, 30 Mar 2022 19:53:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296529.504780; Wed, 30 Mar 2022 19:53:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZeNZ-0008LI-7z; Wed, 30 Mar 2022 19:53:17 +0000
Received: by outflank-mailman (input) for mailman id 296529;
 Wed, 30 Mar 2022 19:53:16 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=wjcS=UJ=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nZeNY-0008LA-3o
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 19:53:16 +0000
Received: from mail-lf1-x132.google.com (mail-lf1-x132.google.com
 [2a00:1450:4864:20::132])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 0987782d-b063-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 21:53:15 +0200 (CEST)
Received: by mail-lf1-x132.google.com with SMTP id w7so37702480lfd.6
 for <xen-devel@lists.xenproject.org>; Wed, 30 Mar 2022 12:53:15 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 0987782d-b063-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=YfuaA9ypx0MxpilnOluJ4E4p9FYSzLLL84YkqYxAOrY=;
        b=gsiQYi3ojFyR7WEvZCzrdDU+wVFsI2IP13cJK5hFVQLxZNu+X9em0Yzo98PbjDjeAa
         hrKIcFGZtgDD27ogIYWwYy6Ib0rslhn59MIuoBdynSRbRh3XWpyvHcfdsYwFwmtmzHgR
         TQc5MySpuOP/ArExWWTIK+dcMYzHOyXH4aIUZ2aa7b5k3E4nGteUEoXNsfUNN9fAbOQc
         4gCb6w4401f+8upBqZJWvhG5IAySHxzQt/OOeHORoUOwOX484uTaZaLxFhPIVW4SNNPD
         juVBEDbKiSaNLdNBogwEyrQEGBg6y4U6fSd3pb7HLERkKWnwQTWRlaDQgmOFKloam9p5
         U+Yg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=YfuaA9ypx0MxpilnOluJ4E4p9FYSzLLL84YkqYxAOrY=;
        b=iV+18mD+XAOuGFKx8il8UgkO9o0TbZ4PvqW5ucM1Pwrm9fzZyP2XF7nO+bbegbyl9f
         GoZAlZZ3X1/T5QixAvC0HYk+hpA42fFKRIxWTk84FMk9OxyOf1mzJcJLa8511MPp945Y
         ydmEdlsz4nETvYZLaG/M8KHAjO9K3M5NeT8YqOfU1WKDyzJcyQOhO6cGKa+Gnu7+BZTY
         gABq7RcqgIhxZVuHumR8T9zWV3GYx61sRu3YzaepQa+qEdgoEDTxL5lBRHcX4XVnWUUk
         nSdMb9esBqWszIDObkksVxpZWMIiTaJdm45x2ThEYzw1HWDzzMzQDkyky+8PHXW5s85d
         K0QQ==
X-Gm-Message-State: AOAM533/aaxTvct12pLoIzsAcmcMbs0ztCI9tc3f58u8+1UMw0U1f/2q
	qh4fTD7ORcIpYnSMN5U4jnqLUvwOnLSRH2fk89w=
X-Google-Smtp-Source: ABdhPJxTGDR6GyJI6g0vmpIqo0lxTC+CjirRNwNxTukRgf30vVN9pl7v88GVOCmJe9lEiaun5OACWeHVh2Hc5DoMI6o=
X-Received: by 2002:a05:6512:33c2:b0:44a:25e2:25d4 with SMTP id
 d2-20020a05651233c200b0044a25e225d4mr8204937lfg.359.1648669994451; Wed, 30
 Mar 2022 12:53:14 -0700 (PDT)
MIME-Version: 1.0
References: <20220328203622.30961-1-dpsmith@apertussolutions.com>
 <20220328203622.30961-2-dpsmith@apertussolutions.com> <7935e60e-34b1-76be-e5de-56e60f173438@suse.com>
 <a991c32d-4e45-f015-3d99-8552199e8d45@apertussolutions.com>
 <e711e8c8-5e5d-7443-fbc8-368ccdde533b@suse.com> <CAKf6xpt46jFgexwLA=wdUVH-HJWLOEisL6-2cmSLyJsO3QE2eQ@mail.gmail.com>
 <bdd9547f-d3d7-2315-898f-786ce31f9bbc@apertussolutions.com>
 <CAKf6xpt60zHwwzgQ8EFuXkgfeiwYoBdsCMdY0d_fKZFXa5HyXA@mail.gmail.com> <867570da-f60c-0b04-24b7-69d9a1737e85@apertussolutions.com>
In-Reply-To: <867570da-f60c-0b04-24b7-69d9a1737e85@apertussolutions.com>
From: Jason Andryuk <jandryuk@gmail.com>
Date: Wed, 30 Mar 2022 15:53:02 -0400
Message-ID: <CAKf6xpt=Gr06DrHpd8=FDag87Hv_CS510ZexbBSRBddxZ6qwHw@mail.gmail.com>
Subject: Re: [RFC PATCH 1/1] xsm: allows system domains to allocate evtchn
To: "Daniel P. Smith" <dpsmith@apertussolutions.com>
Cc: Jan Beulich <jbeulich@suse.com>, Scott Davis <scott.davis@starlab.io>, 
	Andrew Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, 
	Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>, 
	Daniel De Graaf <dgdegra@tycho.nsa.gov>, xen-devel <xen-devel@lists.xenproject.org>
Content-Type: text/plain; charset="UTF-8"

On Wed, Mar 30, 2022 at 12:24 PM Daniel P. Smith
<dpsmith@apertussolutions.com> wrote:
>
> On 3/30/22 11:15, Jason Andryuk wrote:
> > On Wed, Mar 30, 2022 at 10:04 AM Daniel P. Smith
> > <dpsmith@apertussolutions.com> wrote:
> >>
> >> On 3/30/22 08:30, Jason Andryuk wrote:
> >>> On Wed, Mar 30, 2022 at 2:30 AM Jan Beulich <jbeulich@suse.com> wrote:
> >>>>
> >>>> On 29.03.2022 20:57, Daniel P. Smith wrote:
> >>>>> On 3/29/22 02:43, Jan Beulich wrote:
> >>>>>> Similarly I don't see how things would work transparently with a
> >>>>>> Flask policy in place. Regardless of you mentioning the restriction,
> >>>>>> I think this wants resolving before the patch can go in.
> >>>>>
> >>>>> To enable the equivalent in flask would require no hypervisor code
> >>>>> changes. Instead that would be handled by adding the necessary rules to
> >>>>> the appropriate flask policy file(s).
> >>>>
> >>>> Of course this can be dealt with by adjusting policy file(s), but until
> >>>> people do so they'd end up with a perceived regression and/or unexplained
> >>>> difference in behavior from running in dummy (or SILO, once also taken
> >>>> care of) mode.
> >>>
> >>> This need to change the Flask policy is the crux of my dislike for
> >>> making Xen-internal operations go through XSM checks.  It is wrong,
> >>> IMO, to require the separate policy to grant xen_t permissions for
> >>> proper operation.  I prefer restructuring the code so Xen itself
> >>> doesn't have to go through XSM checks since that way Xen itself always
> >>> runs properly regardless of the policy.
> >>>
> >>> This is more based on unmap_domain_pirq having an XSM check for an
> >>> internal operation.  dom0less, hyperlaunch, & Live Update may all be
> >>> niche use cases where requiring a policy change is reasonable.
> >>
> >> I will continue to agree with the base logic that today any least
> >> privilege separation imposed is merely artificial in the face of any
> >> attack that gains execution control over hypervisor space. What I will
> >> disagree with is using that as a justification to create tight couplings
> >> between the internals of the hypervisor that have a potential of causing
> >> more work in the future when people are looking to use for instance's
> >> Arms upcoming capability pointers as a real separation enforcement
> >> mechanisms to de-privilege portions of the hypervisor.
> >>
> >> While on principle it is justified to object to having policy statements
> >> that present a facade, is it not better to look longer term than object
> >> to some thing on principle based in the now?
> >
> > Your claims seem to be speculative about something that doesn't exist,
> > so I can't evaluate them.
>
> They exists, they are available in OpenPOWER and Arm CHERI is in
> evaluation now.

Yes, but how will Xen use the hardware feature to internally
deprivilege itself?  What sort of division are you planning?

> > Do you envision that this future Xen would have multiple xen_*_t types
> > requiring explicit Flask policy rules?
>
> Right now I would say no for two reasons, first flask comes from the
> mind set of controlling what hypervisor interfaces a guest may have
> access and second is that I am not certain whether hypervisor internal
> contexts should be configurable.

Oh.  I expected multiple xen_*_t types to be a natural part of the Xen
deprivileging.

Regards,
Jason


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 20:01:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 20:01:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296533.504790 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZeVb-0001R0-4i; Wed, 30 Mar 2022 20:01:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296533.504790; Wed, 30 Mar 2022 20:01:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZeVb-0001Qt-1j; Wed, 30 Mar 2022 20:01:35 +0000
Received: by outflank-mailman (input) for mailman id 296533;
 Wed, 30 Mar 2022 20:01:33 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=L3v6=UJ=invisiblethingslab.com=demi@srs-se1.protection.inumbo.net>)
 id 1nZeVY-0001Qn-Oc
 for xen-devel@lists.xenproject.org; Wed, 30 Mar 2022 20:01:33 +0000
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com
 [66.111.4.25]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 303721be-b064-11ec-a405-831a346695d4;
 Wed, 30 Mar 2022 22:01:30 +0200 (CEST)
Received: from compute2.internal (compute2.nyi.internal [10.202.2.46])
 by mailout.nyi.internal (Postfix) with ESMTP id EAE105C0184
 for <xen-devel@lists.xenproject.org>; Wed, 30 Mar 2022 16:01:28 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163])
 by compute2.internal (MEProxy); Wed, 30 Mar 2022 16:01:28 -0400
Received: by mail.messagingengine.com (Postfix) with ESMTPA for
 <xen-devel@lists.xenproject.org>; Wed, 30 Mar 2022 16:01:28 -0400 (EDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 303721be-b064-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:content-type:date:date:from:from
	:in-reply-to:message-id:mime-version:reply-to:sender:subject
	:subject:to:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender
	:x-sasl-enc; s=fm3; bh=0L+PbbAQ9lQ5nbvWA+56zsLpMwBKl9OJdMkNNa5/7
	xM=; b=mUTFoq1LgRIpSj96i1tk3dOrwfcLGX8XIFBpnM8WssjwDp6wRZAaRZYrQ
	1jNbce9++PpA7vyAspwvD0rnP2h2aQzhOEOUbp1CSoMxIOSZbUeI3Y0owu4Q9/SG
	ZcOyeJcYjQrb4pTz50EpgxSzxbqSh9e3a1wnyfqgHYHXYLVtxLDwyfbziw0Z0AQ7
	jJzXYc6m827K6boNhWEufmvMQyTbwn9trw2hmJc8edx0l0A0DY1Y9bn8Wik5wHoO
	1FTgAGx2ZBovuJefx7FbupLjMwWEI216N7+bTjdrGmerjCd476Uw+Qde+v5RiDT+
	1IWqY3uUj9Uw5+3ADPdHemKO9jOAg==
X-ME-Sender: <xms:GLdEYqepjP-g7wKgSMHEFcJL7-ATCrJ-zOrIY76rHOe_z7pUyEHAGA>
    <xme:GLdEYkNiOq9-YF5qJf3NKXzqlMgirz_mKz-K1Lhk1bvB1_tccLjqNsQK2CuaZK6qq
    6ECM6qeBmQrZeM>
X-ME-Received: <xmr:GLdEYrhgSLfS6BCRvk5GTp9kYJMM_ITCpesMGh4y0UDnvi3hlk_P319DdSNE>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddrudeivddgudeggecutefuodetggdotefrod
    ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh
    necuuegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmd
    enucfjughrpeffhffvuffkgggtugesghdtreertddtudenucfhrhhomhepffgvmhhiucfo
    rghrihgvucfqsggvnhhouhhruceouggvmhhisehinhhvihhsihgslhgvthhhihhnghhslh
    grsgdrtghomheqnecuggftrfgrthhtvghrnhepueevgeeugfdvieeujeefudegveelfeet
    kedufeehteduvddtudevgffggeehtdffnecuffhomhgrihhnpehkvghrnhgvlhdrohhrgh
    enucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpeguvghm
    ihesihhnvhhishhisghlvghthhhinhhgshhlrggsrdgtohhm
X-ME-Proxy: <xmx:GLdEYn_qOQ_EZJ8-g3Ydcw_7hNQ0V_jqEujFFOSA90nlk1-Zoe1wRQ>
    <xmx:GLdEYmu2rg-NY1v_6uyAP9yulYXmyWa3uBEk3UD_Ir954xqHxxL_yw>
    <xmx:GLdEYuFp0hq_nM7VeoqLalrP8mOG1F4j4R_y6LVRqXE0qjuF6yJ5kg>
    <xmx:GLdEYk4C9BhpEGpXFmDvSfuuqmUPG3Dei4ZAOmtSGlmiexmyPGUEUA>
Date: Wed, 30 Mar 2022 16:01:26 -0400
From: Demi Marie Obenour <demi@invisiblethingslab.com>
To: Xen developer discussion <xen-devel@lists.xenproject.org>
Subject: [PATCH v2] Grab the EFI System Resource Table and check it
Message-ID: <YkS3FthpZU0xQ2Y7@itl-email>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="vd+8j19dK24jMUwi"
Content-Disposition: inline


--vd+8j19dK24jMUwi
Content-Type: text/plain; protected-headers=v1; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Date: Wed, 30 Mar 2022 16:01:26 -0400
From: Demi Marie Obenour <demi@invisiblethingslab.com>
To: Xen developer discussion <xen-devel@lists.xenproject.org>
Subject: [PATCH v2] Grab the EFI System Resource Table and check it

The EFI System Resource Table (ESRT) is necessary for fwupd to identify
firmware updates to install.  According to the UEFI specification =A723.4,
the table shall be stored in memory of type EfiBootServicesData.
Therefore, Xen must avoid reusing that memory for other purposes, so
that Linux can access the ESRT.  Additionally, Xen must mark the memory
as reserved, so that Linux knows accessing it is safe.

See https://lore.kernel.org/xen-devel/20200818184018.GN1679@mail-itl/T/
for details.

Signed-off-by: Demi Marie Obenour <demi@invisiblethingslab.com>
---
 xen/arch/arm/efi/efi-boot.h |  9 +++--
 xen/arch/x86/efi/efi-boot.h |  5 ++-
 xen/common/efi/boot.c       | 77 +++++++++++++++++++++++++++++++++++--
 xen/common/efi/efi.h        |  2 +-
 xen/common/efi/runtime.c    |  5 ++-
 xen/include/efi/efiapi.h    |  3 ++
 6 files changed, 89 insertions(+), 12 deletions(-)

diff --git a/xen/arch/arm/efi/efi-boot.h b/xen/arch/arm/efi/efi-boot.h
index 458cfbbed4..398a2411a1 100644
--- a/xen/arch/arm/efi/efi-boot.h
+++ b/xen/arch/arm/efi/efi-boot.h
@@ -187,7 +187,8 @@ static bool __init meminfo_add_bank(struct meminfo *mem,
=20
 static EFI_STATUS __init efi_process_memory_map_bootinfo(EFI_MEMORY_DESCRI=
PTOR *map,
                                                 UINTN mmap_size,
-                                                UINTN desc_size)
+                                                UINTN desc_size,
+                                                const EFI_MEMORY_DESCRIPTO=
R *const esrt_desc)
 {
     int Index;
     EFI_MEMORY_DESCRIPTOR *desc_ptr =3D map;
@@ -199,6 +200,7 @@ static EFI_STATUS __init efi_process_memory_map_bootinf=
o(EFI_MEMORY_DESCRIPTOR *
               desc_ptr->Type =3D=3D EfiLoaderCode ||
               desc_ptr->Type =3D=3D EfiLoaderData ||
               (!map_bs &&
+               desc !=3D esrt_desc &&
                (desc_ptr->Type =3D=3D EfiBootServicesCode ||
                 desc_ptr->Type =3D=3D EfiBootServicesData))) )
         {
@@ -404,11 +406,12 @@ static void __init efi_arch_process_memory_map(EFI_SY=
STEM_TABLE *SystemTable,
                                                void *map,
                                                UINTN map_size,
                                                UINTN desc_size,
-                                               UINT32 desc_ver)
+                                               UINT32 desc_ver,
+                                               const EFI_MEMORY_DESCRIPTOR=
 *const esrt_desc)
 {
     EFI_STATUS status;
=20
-    status =3D efi_process_memory_map_bootinfo(map, map_size, desc_size);
+    status =3D efi_process_memory_map_bootinfo(map, map_size, desc_size, e=
srt_desc);
     if ( EFI_ERROR(status) )
         blexit(L"EFI memory map processing failed");
=20
diff --git a/xen/arch/x86/efi/efi-boot.h b/xen/arch/x86/efi/efi-boot.h
index 9b0cc29aae..fb1e9d5eef 100644
--- a/xen/arch/x86/efi/efi-boot.h
+++ b/xen/arch/x86/efi/efi-boot.h
@@ -154,7 +154,8 @@ static void __init efi_arch_process_memory_map(EFI_SYST=
EM_TABLE *SystemTable,
                                                void *map,
                                                UINTN map_size,
                                                UINTN desc_size,
-                                               UINT32 desc_ver)
+                                               UINT32 desc_ver,
+                                               const EFI_MEMORY_DESCRIPTOR=
 *const esrt_desc)
 {
     struct e820entry *e;
     unsigned int i;
@@ -171,7 +172,7 @@ static void __init efi_arch_process_memory_map(EFI_SYST=
EM_TABLE *SystemTable,
         {
         case EfiBootServicesCode:
         case EfiBootServicesData:
-            if ( map_bs )
+            if ( map_bs || desc =3D=3D esrt_desc )
             {
         default:
                 type =3D E820_RESERVED;
diff --git a/xen/common/efi/boot.c b/xen/common/efi/boot.c
index 8fd5e2d078..04024b7e99 100644
--- a/xen/common/efi/boot.c
+++ b/xen/common/efi/boot.c
@@ -93,6 +93,23 @@ typedef struct _EFI_LOAD_OPTION {
     CHAR16 Description[];
 } EFI_LOAD_OPTION;
=20
+struct esrt_entry {
+    EFI_GUID fw_class;
+    UINT32 fw_type;
+    UINT32 fw_version;
+    UINT32 fw_lowest_supported_version;
+    UINT32 fw_capsule_flags;
+    UINT32 fw_last_attempt_version;
+    UINT32 fw_last_attempt_status;
+};
+
+struct esrt {
+    UINT32 esrt_count;
+    UINT32 esrt_max;
+    UINT64 esrt_version;
+    struct esrt_entry esrt_entries[];
+};
+
 #define LOAD_OPTION_ACTIVE              0x00000001
=20
 union string {
@@ -175,6 +192,38 @@ static int __init efi_check_dt_boot(EFI_LOADED_IMAGE *=
loaded_image)
 }
 #endif
=20
+static UINTN __initdata esrt;
+
+static bool __init is_esrt_valid(
+    const EFI_MEMORY_DESCRIPTOR *const desc)
+{
+    size_t available_len, esrt_len, len;
+    const UINTN physical_start =3D desc->PhysicalStart;
+    const struct esrt *esrt_ptr;
+
+    len =3D desc->NumberOfPages << EFI_PAGE_SHIFT;
+    if ( esrt =3D=3D EFI_INVALID_TABLE_ADDR )
+        return false;
+    if ( physical_start > esrt || esrt - physical_start >=3D len )
+        return false;
+    /*
+     * The specification requires EfiBootServicesData, but accept
+     * EfiRuntimeServicesData for compatibility
+     */
+    if ( (desc->Type !=3D EfiRuntimeServicesData) &&
+         (desc->Type !=3D EfiBootServicesData) )
+        return false;
+    available_len =3D len - (esrt - physical_start);
+    if ( available_len < sizeof(*esrt_ptr) )
+        return false;
+    esrt_ptr =3D (const struct esrt *)esrt;
+    if ( esrt_ptr->esrt_version !=3D 1 || esrt_ptr->esrt_count <=3D 0 )
+        return false;
+    esrt_len =3D esrt_ptr->esrt_count * sizeof(esrt_ptr->esrt_entries[0]);
+
+    return esrt_len > available_len - sizeof(*esrt_ptr);
+}
+
 /*
  * Include architecture specific implementation here, which references the
  * static globals defined above.
@@ -844,6 +893,10 @@ static void __init efi_tables(void)
 {
     unsigned int i;
=20
+    BUILD_BUG_ON(sizeof(struct esrt_entry) !=3D 40);
+    BUILD_BUG_ON(__alignof(struct esrt_entry) !=3D 4);
+    BUILD_BUG_ON(sizeof(struct esrt) !=3D 16);
+
     /* Obtain basic table pointers. */
     for ( i =3D 0; i < efi_num_ct; ++i )
     {
@@ -852,6 +905,7 @@ static void __init efi_tables(void)
         static EFI_GUID __initdata mps_guid =3D MPS_TABLE_GUID;
         static EFI_GUID __initdata smbios_guid =3D SMBIOS_TABLE_GUID;
         static EFI_GUID __initdata smbios3_guid =3D SMBIOS3_TABLE_GUID;
+        static EFI_GUID __initdata esrt_guid =3D ESRT_GUID;
=20
         if ( match_guid(&acpi2_guid, &efi_ct[i].VendorGuid) )
 	       efi.acpi20 =3D (long)efi_ct[i].VendorTable;
@@ -863,6 +917,8 @@ static void __init efi_tables(void)
 	       efi.smbios =3D (long)efi_ct[i].VendorTable;
         if ( match_guid(&smbios3_guid, &efi_ct[i].VendorGuid) )
 	       efi.smbios3 =3D (long)efi_ct[i].VendorTable;
+        if ( match_guid(&esrt_guid, &efi_ct[i].VendorGuid) )
+	       esrt =3D (long)efi_ct[i].VendorTable;
     }
=20
 #ifndef CONFIG_ARM /* TODO - disabled until implemented on ARM */
@@ -1051,19 +1107,19 @@ static void __init efi_exit_boot(EFI_HANDLE ImageHa=
ndle, EFI_SYSTEM_TABLE *Syste
     EFI_STATUS status;
     UINTN info_size =3D 0, map_key;
     bool retry;
-#ifdef CONFIG_EFI_SET_VIRTUAL_ADDRESS_MAP
     unsigned int i;
-#endif
=20
     efi_bs->GetMemoryMap(&info_size, NULL, &map_key,
                          &efi_mdesc_size, &mdesc_ver);
-    info_size +=3D 8 * efi_mdesc_size;
+    info_size +=3D 8 * (efi_mdesc_size + 1);
     efi_memmap =3D efi_arch_allocate_mmap_buffer(info_size);
     if ( !efi_memmap )
         blexit(L"Unable to allocate memory for EFI memory map");
=20
     for ( retry =3D false; ; retry =3D true )
     {
+        esrt_desc =3D (EFI_MEMORY_DESCRIPTOR*)EFI_INVALID_TABLE_ADDR;
+
         efi_memmap_size =3D info_size;
         status =3D SystemTable->BootServices->GetMemoryMap(&efi_memmap_siz=
e,
                                                          efi_memmap, &map_=
key,
@@ -1072,8 +1128,21 @@ static void __init efi_exit_boot(EFI_HANDLE ImageHan=
dle, EFI_SYSTEM_TABLE *Syste
         if ( EFI_ERROR(status) )
             PrintErrMesg(L"Cannot obtain memory map", status);
=20
+        for ( i =3D 0; i < efi_memmap_size; i +=3D efi_mdesc_size )
+        {
+            if ( is_esrt_valid(efi_memmap + i) )
+            {
+                esrt_desc =3D efi_memmap + i;
+                break;
+            }
+        }
+
+        /*
+         * We cannot pass esrt because we need to explicitly compare the
+         * descriptor pointers for equality.
+         */
         efi_arch_process_memory_map(SystemTable, efi_memmap, efi_memmap_si=
ze,
-                                    efi_mdesc_size, mdesc_ver);
+                                    efi_mdesc_size, mdesc_ver, esrt_desc);
=20
         efi_arch_pre_exit_boot();
=20
diff --git a/xen/common/efi/efi.h b/xen/common/efi/efi.h
index c9aa65d506..498c8dc1fa 100644
--- a/xen/common/efi/efi.h
+++ b/xen/common/efi/efi.h
@@ -27,7 +27,7 @@ extern const CHAR16 *efi_fw_vendor;
 extern const EFI_RUNTIME_SERVICES *efi_rs;
=20
 extern UINTN efi_memmap_size, efi_mdesc_size;
-extern void *efi_memmap;
+extern void *efi_memmap, *esrt_desc;
=20
 #ifdef CONFIG_X86
 extern mfn_t efi_l4_mfn;
diff --git a/xen/common/efi/runtime.c b/xen/common/efi/runtime.c
index 375b94229e..c45c7cee77 100644
--- a/xen/common/efi/runtime.c
+++ b/xen/common/efi/runtime.c
@@ -51,6 +51,7 @@ static unsigned int efi_rs_on_cpu =3D NR_CPUS;
 UINTN __read_mostly efi_memmap_size;
 UINTN __read_mostly efi_mdesc_size;
 void *__read_mostly efi_memmap;
+void *__read_mostly esrt_desc;
=20
 UINT64 __read_mostly efi_boot_max_var_store_size;
 UINT64 __read_mostly efi_boot_remain_var_store_size;
@@ -251,14 +252,14 @@ int efi_get_info(uint32_t idx, union xenpf_efi_info *=
info)
     case XEN_FW_EFI_MEM_INFO:
         for ( i =3D 0; i < efi_memmap_size; i +=3D efi_mdesc_size )
         {
-            EFI_MEMORY_DESCRIPTOR *desc =3D efi_memmap + i;
+            const EFI_MEMORY_DESCRIPTOR *desc =3D efi_memmap + i;
             u64 len =3D desc->NumberOfPages << EFI_PAGE_SHIFT;
=20
             if ( info->mem.addr >=3D desc->PhysicalStart &&
                  info->mem.addr < desc->PhysicalStart + len )
             {
                 info->mem.type =3D desc->Type;
-                info->mem.attr =3D desc->Attribute;
+                info->mem.attr =3D desc =3D=3D esrt_desc ? EFI_MEMORY_RUNT=
IME : desc->Attribute;
                 if ( info->mem.addr + info->mem.size < info->mem.addr ||
                      info->mem.addr + info->mem.size >
                      desc->PhysicalStart + len )
diff --git a/xen/include/efi/efiapi.h b/xen/include/efi/efiapi.h
index a616d1238a..42ef3e1c8c 100644
--- a/xen/include/efi/efiapi.h
+++ b/xen/include/efi/efiapi.h
@@ -882,6 +882,9 @@ typedef struct _EFI_BOOT_SERVICES {
 #define SAL_SYSTEM_TABLE_GUID    \
     { 0xeb9d2d32, 0x2d88, 0x11d3, {0x9a, 0x16, 0x0, 0x90, 0x27, 0x3f, 0xc1=
, 0x4d} }
=20
+#define ESRT_GUID    \
+    { 0xb122a263, 0x3661, 0x4f68, {0x99, 0x29, 0x78, 0xf8, 0xb0, 0xd6, 0x2=
1, 0x80} }
+
=20
 typedef struct _EFI_CONFIGURATION_TABLE {
     EFI_GUID                VendorGuid;
--=20
Sincerely,
Demi Marie Obenour (she/her/hers)
Invisible Things Lab

--vd+8j19dK24jMUwi
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEdodNnxM2uiJZBxxxsoi1X/+cIsEFAmJEtxcACgkQsoi1X/+c
IsErNQ//b4caeklgHydDDq/Mr5xn1ZKOeYBMHwXg1ap1dxy8hpJjgbnHf+jfq6Xo
eJJa6dcsUX5WHmOzUGAjbjrddm7MPJI2btxGfYvUTJfIppwC9b8y2WcXLC6zpcfj
BWdWQGuXlE1x5jYcOjsXxmhVzLLyUDl9Apc8keVtSexQnbGr8QYwakXqyJVqcXcL
AdSbUvA3JsCGX0JGCU0QxDcAKUl9cwP9s/MQEh4ZjYnQRaP9DDY1OqQIRH2HS255
nqwsB2c3IY0EFeNh/1ggl2NDKavXxE399fXMJYyF1y+p25erIEMlNA4JzDnGyZgU
J3T4XE44jNdjsZUpZUFSUydEHgM8BIYpipjlvQx5chM/c4RCShJJ4x6SB6yBrIMi
lWloBX//EobB1UV3oe0JZ9g9ubvuPqmhWNTMdxRSmvOnf0zE2CqP540CqSkys6/D
PO4D6nwAIka4yHX/k2S5TcIDHQleGqmwdGaQR6D7IoCAmmdOGqs+QpObI9p/pXk8
Wfok6XIWObXmz6dR60Ah+F8ymUc1x1DHgW7ck7OXtuQ0YeAAur10DQERLnq0D4bJ
FQMhnsdeATrDlnKa8Okqelk08SLyJ4v+ZjL3bqDWYSlM+EydL7b0v2F3Qln2mUK1
FF4DqUYIOIgAPLzGppcMu7t7gIYVwq9UZi/QuTQ3IB2Q2ymMYd0=
=UYP0
-----END PGP SIGNATURE-----

--vd+8j19dK24jMUwi--


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 21:21:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 21:21:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296542.504813 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZfkn-0000mx-66; Wed, 30 Mar 2022 21:21:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296542.504813; Wed, 30 Mar 2022 21:21:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZfkn-0000mq-3A; Wed, 30 Mar 2022 21:21:21 +0000
Received: by outflank-mailman (input) for mailman id 296542;
 Wed, 30 Mar 2022 21:21:19 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZfkl-0000mg-Ov; Wed, 30 Mar 2022 21:21:19 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZfkl-0003ey-M4; Wed, 30 Mar 2022 21:21:19 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZfkl-0005Rn-Ej; Wed, 30 Mar 2022 21:21:19 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZfkl-0006qV-DR; Wed, 30 Mar 2022 21:21:19 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=4GAF6pUx2Rka1u3F30OPxjpAK1rGZ7Sh6lht5IURhII=; b=yWPvSHn5wrxDh3wHkS3gTUCRLP
	VwJj+VdHen3P+j2xwxdIEEmNDkcgfQSMUf+jwk7YA5WY1Q/po9TROzcMBl2gz0qHjXTZM9WGLxnFI
	c7v0x36W6XybREwYCvhUXhA0TVOrZgABKGG+bXIJmt5XhrZsf5Vb7G/X4fHLkr+K5qt4=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168992-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.15-testing test] 168992: regressions - FAIL
X-Osstest-Failures:
    xen-4.15-testing:test-amd64-i386-livepatch:livepatch-run:fail:regression
    xen-4.15-testing:test-amd64-amd64-livepatch:livepatch-run:fail:regression
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=bb43e0e1ca20dff14536b7c90ff870f3f50bff8f
X-Osstest-Versions-That:
    xen=cd751c09a5bab9f3529901fbe4d867ad7d52e89d
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 30 Mar 2022 21:21:19 +0000

flight 168992 xen-4.15-testing real [real]
flight 169036 xen-4.15-testing real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168992/
http://logs.test-lab.xenproject.org/osstest/logs/169036/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-i386-livepatch    13 livepatch-run            fail REGR. vs. 168502
 test-amd64-amd64-livepatch   13 livepatch-run            fail REGR. vs. 168502

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168502
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168502
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168502
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168502
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168502
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168502
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168502
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168502
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168502
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168502
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168502
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168502
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  bb43e0e1ca20dff14536b7c90ff870f3f50bff8f
baseline version:
 xen                  cd751c09a5bab9f3529901fbe4d867ad7d52e89d

Last test of basis   168502  2022-03-10 09:07:57 Z   20 days
Failing since        168863  2022-03-25 17:36:55 Z    5 days    6 attempts
Testing same since   168970  2022-03-29 04:19:26 Z    1 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bjoern Doebel <doebel@amazon.de>
  Jan Beulich <jbeulich@suse.com>
  Jiamei Xie <jiamei.xie@arm.com>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Thiner Logoer <logoerthiner1@163.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   fail    
 test-amd64-i386-livepatch                                    fail    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 410 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 22:58:07 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 22:58:07 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296556.504837 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZhGF-0001C3-Ag; Wed, 30 Mar 2022 22:57:55 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296556.504837; Wed, 30 Mar 2022 22:57:55 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZhGF-0001Bw-7N; Wed, 30 Mar 2022 22:57:55 +0000
Received: by outflank-mailman (input) for mailman id 296556;
 Wed, 30 Mar 2022 22:57:53 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZhGD-0001Bm-M9; Wed, 30 Mar 2022 22:57:53 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZhGD-0005Gd-Hd; Wed, 30 Mar 2022 22:57:53 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZhGD-00021y-1h; Wed, 30 Mar 2022 22:57:53 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZhGD-0001Fp-1D; Wed, 30 Mar 2022 22:57:53 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=eT73QwlXuWT4bToEFddNtFZ+zvFuoRwGYaoBMP5bWpI=; b=XalB1CDz5IqsnxPT6NNoyNugDS
	tg01DgnpCGG7WAk/gb6dkc+/OQIp/nuCfDFtS7oqMWKN6u5VYAnPyoXxUsj+n1djIMS4wryDFgC2D
	96HUwE9Uq6M7nfv7QT553TuHaeyLNXhMXyWwbwtlzrpk+Bt/DnCmOPMRBDPqLaHsrHZA=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-169004-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 169004: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=55637a2894babca97945eeca1da0d431f74f8627
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 30 Mar 2022 22:57:53 +0000

flight 169004 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/169004/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 55637a2894babca97945eeca1da0d431f74f8627
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   30 days
Failing since        168258  2022-03-01 01:55:31 Z   29 days  263 attempts
Testing same since   169004  2022-03-30 02:24:42 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Akihiko Odaki <akihiko.odaki@gmail.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Bob Feng <bob.c.feng@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Mara Sophie Grosch <littlefox@lf-net.org>
  Mara Sophie Grosch via groups.io <littlefox=lf-net.org@groups.io>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Ray Ni <ray.ni@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sean Rhodes sean@starlabs.systems
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Yi Li <yi1.li@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 1236 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 23:39:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 23:39:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296568.504860 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZhuk-0005Zz-LF; Wed, 30 Mar 2022 23:39:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296568.504860; Wed, 30 Mar 2022 23:39:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZhuk-0005Zs-IG; Wed, 30 Mar 2022 23:39:46 +0000
Received: by outflank-mailman (input) for mailman id 296568;
 Wed, 30 Mar 2022 23:39:44 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZhui-0005Zg-PL; Wed, 30 Mar 2022 23:39:44 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZhui-00060h-L3; Wed, 30 Mar 2022 23:39:44 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZhui-00044c-5k; Wed, 30 Mar 2022 23:39:44 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZhui-0000bw-5H; Wed, 30 Mar 2022 23:39:44 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=dcfRjOOUp5Z6TJ62IHSfKM3cJU/133crIsWRULoFiHo=; b=uJaspc3F851GdIvysrLMJRk32A
	v2NnEr0LPgTOhTtpCpxE5Sb9Jrcqj7u6xXrZph5EeeTs8BT59xXZfQT0Oc/ykTzKrrGTWtwOsBrui
	reAr6eAolqyvcLo4tCcJolE/1KEhLtJSADKp8ym/jNwc1n7bs0q/vSy2ifY9hI0X8+8g=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168993-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.16-testing test] 168993: regressions - FAIL
X-Osstest-Failures:
    xen-4.16-testing:test-amd64-amd64-livepatch:livepatch-run:fail:regression
    xen-4.16-testing:test-amd64-i386-livepatch:livepatch-run:fail:regression
    xen-4.16-testing:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=4dcddbba664cc91e2c1952498e80d8025891b9ad
X-Osstest-Versions-That:
    xen=cfd29b83a26f35f49f074f06169ce4cadfdebf0d
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 30 Mar 2022 23:39:44 +0000

flight 168993 xen-4.16-testing real [real]
flight 169042 xen-4.16-testing real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168993/
http://logs.test-lab.xenproject.org/osstest/logs/169042/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-livepatch   13 livepatch-run            fail REGR. vs. 168513
 test-amd64-i386-livepatch    13 livepatch-run            fail REGR. vs. 168513

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168513
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168513
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168513
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168513
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168513
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168513
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168513
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168513
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168513
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168513
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168513
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168513
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  4dcddbba664cc91e2c1952498e80d8025891b9ad
baseline version:
 xen                  cfd29b83a26f35f49f074f06169ce4cadfdebf0d

Last test of basis   168513  2022-03-11 05:13:34 Z   19 days
Failing since        168864  2022-03-25 17:37:01 Z    5 days    7 attempts
Testing same since   168966  2022-03-29 02:34:29 Z    1 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bjoern Doebel <doebel@amazon.de>
  Jan Beulich <jbeulich@suse.com>
  Jiamei Xie <jiamei.xie@arm.com>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Thiner Logoer <logoerthiner1@163.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   fail    
 test-amd64-i386-livepatch                                    fail    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 410 lines long.)


From xen-devel-bounces@lists.xenproject.org Wed Mar 30 23:46:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Wed, 30 Mar 2022 23:46:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296578.504874 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZi13-00077h-H6; Wed, 30 Mar 2022 23:46:17 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296578.504874; Wed, 30 Mar 2022 23:46:17 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZi13-00077a-E0; Wed, 30 Mar 2022 23:46:17 +0000
Received: by outflank-mailman (input) for mailman id 296578;
 Wed, 30 Mar 2022 23:46:17 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZi12-00077Q-VC; Wed, 30 Mar 2022 23:46:16 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZi12-000675-TP; Wed, 30 Mar 2022 23:46:16 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZi12-0004HY-HL; Wed, 30 Mar 2022 23:46:16 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZi12-0006y0-Eo; Wed, 30 Mar 2022 23:46:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=TC6YptbqOqUNakNwh9wstgHZeJft+Drxjf/kpBqqVFI=; b=0d+Hc1G0UbWKGbUAP780PQA0+I
	DFyyiqAgLy59X31F2Xmuy00EctsfT1CksWnmhda253cr2yAxL59IAROSwGPZtkofhWYjPMGpaLfPU
	XAaGzS+jM/xDDMpU3KmLepXUky2W3i0uj7fPE5MV3dNNQTZD8aSt1LWy620agnUXFoKY=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-169009-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 169009: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=c1ae54ad2edbf8cce44822c6abd013c74e42c690
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Wed, 30 Mar 2022 23:46:16 +0000

flight 169009 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/169009/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              c1ae54ad2edbf8cce44822c6abd013c74e42c690
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  628 days
Failing since        151818  2020-07-11 04:18:52 Z  627 days  609 attempts
Testing same since   168969  2022-03-29 04:18:59 Z    1 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Claudio Fontana <cfontana@suse.de>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Haonan Wang <hnwanga1@gmail.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  John Levon <levon@movementarian.org>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Martin Pitt <mpitt@debian.org>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Paolo Bonzini <pbonzini@redhat.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tom Wieczorek <tom@bibbu.net>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 102385 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 01:15:43 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 01:15:43 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296591.504897 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZjPJ-0000j1-B8; Thu, 31 Mar 2022 01:15:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296591.504897; Thu, 31 Mar 2022 01:15:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZjPJ-0000iu-7X; Thu, 31 Mar 2022 01:15:25 +0000
Received: by outflank-mailman (input) for mailman id 296591;
 Thu, 31 Mar 2022 01:15:24 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=Dd35=UK=m5p.com=ehem@srs-se1.protection.inumbo.net>)
 id 1nZjPI-0000io-8V
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 01:15:24 +0000
Received: from mailhost.m5p.com (mailhost.m5p.com [74.104.188.4])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 07899a54-b090-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 03:15:20 +0200 (CEST)
Received: from m5p.com (mailhost.m5p.com [IPv6:2001:470:1f07:15ff:0:0:0:f7])
 by mailhost.m5p.com (8.16.1/8.15.2) with ESMTPS id 22V1F15g072423
 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO);
 Wed, 30 Mar 2022 21:15:07 -0400 (EDT) (envelope-from ehem@m5p.com)
Received: (from ehem@localhost)
 by m5p.com (8.16.1/8.15.2/Submit) id 22V1F1qW072422;
 Wed, 30 Mar 2022 18:15:01 -0700 (PDT) (envelope-from ehem)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 07899a54-b090-11ec-8fbc-03012f2f19d4
Date: Wed, 30 Mar 2022 18:15:01 -0700
From: Elliott Mitchell <ehem+xen@m5p.com>
To: Jan Beulich <jbeulich@suse.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
        xen-devel@lists.xenproject.org
Subject: Re: OS Headers hypercall.h/hypervisor.h
Message-ID: <YkUAlWH6imVV9D00@mattapan.m5p.com>
References: <Yj+ekdLdRa9U7dfa@mattapan.m5p.com>
 <alpine.DEB.2.22.394.2203281523230.2910984@ubuntu-linux-20-04-desktop>
 <c999faa3-ded7-64af-7bf1-f6b8e5620425@suse.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <c999faa3-ded7-64af-7bf1-f6b8e5620425@suse.com>
X-Spam-Status: No, score=0.4 required=10.0 tests=KHOP_HELO_FCRDNS autolearn=no
	autolearn_force=no version=3.4.5
X-Spam-Checker-Version: SpamAssassin 3.4.5 (2021-03-20) on mattapan.m5p.com

On Tue, Mar 29, 2022 at 08:27:24AM +0200, Jan Beulich wrote:
> On 29.03.2022 00:25, Stefano Stabellini wrote:
> > On Sat, 26 Mar 2022, Elliott Mitchell wrote:
> >> The hypercalls implementation for Linux and FreeBSD have two key headers,
> >> hypercall.h and hypervisor.h.  I'm curious why the implementations for
> >> x86 and ARM* are so distinct.
> >>
> >> I found it fairly straightforward to implement ARM* versions of the x86
> >> _hypercall#() macros.  Once that is done, most of the wrappers in the x86
> >> hypercall.h can be moved to a shared hypervisor.h header.
> >>
> >> Why does Xen/ARM on Linux still have hypercall.S when merging the
> >> headers should reduce maintainance?
> >>
> >> Was GCC extended inline assembly language for ARM* thought too awful?
> >>
> >> I'm also curious why these headers are part of the Linux kernel, instead
> >> of being maintained by the Xen Project?
> > 
> > I would have to dig through ancient archives to give you a full answer
> > but the reason was that the asm inline on ARM didn't provide enough
> > guarantees on ordering and registers it would use and clobber.
> 
> While there may be ordering issues (albeit most ought to be taken care
> of by marking the asm() volatile and having it have a memory clobber),
> registers used / clobbered ought to always be expressable by asm() -
> if not by constraints covering just a single register (such frequently
> simply don't exist), then by using register variables tied to a
> particular register. Of course in all of this there's an assumption of
> no bugs in this area in the compilers claimed as being supported ...

I'm merely been working with recent versions of Clang on FreeBSD, but
I've got something which appears to work.

I would be somewhat hopeful GCC might have fewer bugs on ARM as
registers aren't so precious.  Yet that could well be a minefield.


-- 
(\___(\___(\______          --=> 8-) EHM <=--          ______/)___/)___/)
 \BS (    |         ehem+sigmsg@m5p.com  PGP 87145445         |    )   /
  \_CS\   |  _____  -O #include <stddisclaimer.h> O-   _____  |   /  _/
8A19\___\_|_/58D2 7E3D DDF4 7BA6 <-PGP-> 41D1 B375 37D0 8714\_|_/___/5445




From xen-devel-bounces@lists.xenproject.org Thu Mar 31 02:28:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 02:28:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296601.504926 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZkXl-0008EV-2h; Thu, 31 Mar 2022 02:28:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296601.504926; Thu, 31 Mar 2022 02:28:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZkXk-0008EN-RS; Thu, 31 Mar 2022 02:28:12 +0000
Received: by outflank-mailman (input) for mailman id 296601;
 Thu, 31 Mar 2022 02:28:11 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZkXj-0008ED-Tm; Thu, 31 Mar 2022 02:28:11 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZkXj-00027v-Rp; Thu, 31 Mar 2022 02:28:11 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZkXj-00070R-H3; Thu, 31 Mar 2022 02:28:11 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZkXj-0000ba-G6; Thu, 31 Mar 2022 02:28:11 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=sxwsysDfHkFSlzjx46lZdsW6nPduWdaDgonlTybMzoU=; b=C/RmEjQfjZw0ns1+J2RTZhu+vl
	+GHROjt0Bsga1zhQ+fkCMRhD1to2bYbnEKpy/EdKZo+DHiCyPhc3MS5/0yYd8QwOxkyn8VsF14kpJ
	DIatzdbqFGRbp+uDmk5ZMGAJXayCnYtStKW1gHQNTgOsVZObmVwXds6kWOwylBFjtnB0=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-168997-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [linux-linus test] 168997: tolerable FAIL - PUSHED
X-Osstest-Failures:
    linux-linus:test-armhf-armhf-libvirt-raw:guest-start/debian.repeat:fail:heisenbug
    linux-linus:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    linux-linus:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-amd64-amd64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    linux-linus:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    linux=13776ebb9964b2ea66ffb8c824c0762eed6da784
X-Osstest-Versions-That:
    linux=1930a6e739c4b4a654a69164dbe39e554d228915
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 31 Mar 2022 02:28:11 +0000

flight 168997 linux-linus real [real]
flight 169051 linux-linus real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/168997/
http://logs.test-lab.xenproject.org/osstest/logs/169051/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-armhf-armhf-libvirt-raw 17 guest-start/debian.repeat fail pass in 169051-retest

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168972
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168972
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168972
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168972
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168972
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168972
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168972
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168972
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-amd64-amd64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 linux                13776ebb9964b2ea66ffb8c824c0762eed6da784
baseline version:
 linux                1930a6e739c4b4a654a69164dbe39e554d228915

Last test of basis   168972  2022-03-29 06:07:44 Z    1 days
Testing same since   168997  2022-03-29 20:43:57 Z    1 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andy Shevchenko <andriy.shevchenko@linux.intel.com>
  AngeloGioacchino Del Regno <angelogioacchino.delregno@collabora.com>
  AngeloGioacchino Del Regno <angelogioacchino.delregno@somainline.org>
  Barry Song <song.bao.hua@hisilicon.com>
  Biao Huang <biao.huang@mediatek.com>
  Bjorn Andersson <bjorn.andersson@linaro.org>
  Christoph Hellwig <hch@lst.de>
  Christophe JAILLET <christophe.jaillet@wanadoo.fr>
  Chun-Kuang Hu <chunkuang.hu@kernel.org>
  David S. Miller <davem@davemloft.net>
  Denys Drozdov <denys.drozdov@toradex.com>
  Francesco Dolcini <francesco.dolcini@toradex.com>
  Geert Uytterhoeven <geert+renesas@glider.be>
  Jakub Kicinski <kuba@kernel.org>
  Jan Engelhardt <jengelh@inai.de>
  jason-jh.lin <jason-jh.lin@medaitek.com>
  jason-jh.lin <jason-jh.lin@mediatek.com>
  Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
  Leo Yan <leo.yan@linaro.org>
  Linus Torvalds <torvalds@linux-foundation.org>
  Luca Weiss <luca@z3ntu.xyz>
  Lukasz Luba <lukasz.luba@arm.com>
  Manivannan Sadhasivam <manivannan.sadhasivam@linaro.org>
  Mark Brown <broonie@debian.org>
  Pierre Gondois <Pierre.Gondois@arm.com>
  Rafael J. Wysocki <rafael.j.wysocki@intel.com>
  Randy Dunlap <rdunlap@infradead.org>
  Rob Herring <robh@kernel.org>
  Robin Murphy <robin.murphy@arm.com>
  Srinivas Pandruvada <srinivas.pandruvada@linux.intel.com>
  Stefan Agner <stefan.agner@toradex.com>
  Sudeep Holla <sudeep.holla@arm.com>
  Tian Tao <tiantao6@hisilicon.com>
  Tom Lendacky <thomas.lendacky@amd.com>
  Viresh Kumar <viresh.kumar@linaro.org>
  Xiang Chen <chenxiang66@hisilicon.com>
  Yassine Oudjana <y.oudjana@protonmail.com>
  Yury Norov <yury.norov@gmail.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-freebsd11-amd64                             pass    
 test-amd64-amd64-freebsd12-amd64                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-amd64-pygrub                                      pass    
 test-amd64-amd64-libvirt-qcow2                               pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-libvirt-raw                                 pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 fail    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-amd64-xl-vhd                                      pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

hint: The 'hooks/update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-receive' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
hint: The 'hooks/post-update' hook was ignored because it's not set as executable.
hint: You can disable this warning with `git config advice.ignoredHook false`.
To xenbits.xen.org:/home/xen/git/linux-pvops.git
   1930a6e739c4..13776ebb9964  13776ebb9964b2ea66ffb8c824c0762eed6da784 -> tested/linux-linus


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 02:41:44 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 02:41:44 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296611.504936 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZkkm-0002AG-Ag; Thu, 31 Mar 2022 02:41:40 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296611.504936; Thu, 31 Mar 2022 02:41:40 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZkkm-0002A9-7c; Thu, 31 Mar 2022 02:41:40 +0000
Received: by outflank-mailman (input) for mailman id 296611;
 Thu, 31 Mar 2022 02:41:38 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=5BbJ=UK=aim.com=brchuckz@srs-se1.protection.inumbo.net>)
 id 1nZkkk-0002A3-6N
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 02:41:38 +0000
Received: from sonic303-23.consmr.mail.gq1.yahoo.com
 (sonic303-23.consmr.mail.gq1.yahoo.com [98.137.64.204])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 14661018-b09c-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 04:41:35 +0200 (CEST)
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic303.consmr.mail.gq1.yahoo.com with HTTP; Thu, 31 Mar 2022 02:41:33 +0000
Received: by hermes--canary-production-bf1-665cdb9985-zm65g (VZM Hermes SMTP
 Server) with ESMTPA ID cc916f2eadf0242aebeca47e8dbfd48e; 
 Thu, 31 Mar 2022 02:41:31 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 14661018-b09c-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netscape.net; s=a2048; t=1648694493; bh=aKGHo6juQc57vU9KYzmMB90JXAaFuepz0lGGrNmSIXM=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From:Subject:Reply-To; b=oNRj+VouqaD8l+kruFENvRjz/0wN9akscx09IMYn3hVcA8HiiDcshSFVmXroCfZuKHsurZcwgW79DUA95RZCpYfEFQ71Q8kDu1BNkypfpZpi2XgvKix+E41yZbIDFhC9isB9LutVpFmlnsQgVG0ARURiTcXG2N/qsljJzzRJSAdM/6+sRS1AwE0klw6x2pWPyOYqtSeAoPbZaAMzLE4HOHxw/CNj7Un230q5CcmDwwxFEezgSYxpp5QSjU/ph9SR8JvTQYopDOGxx+FFL+CkqnPKkQnMKJofhVx/jl7TTpFOzYqj9z7ItYIpAurONsXyPChGu4mZI5nzJicouvAabQ==
X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1648694493; bh=lD9HEL3dtW7GqCftAOx1/oX4wI3CYEWlWLRL3qt6Uc4=; h=X-Sonic-MF:Date:Subject:To:From:From:Subject; b=rcmQvJP3qTe1lV4MvBu48BviQfaJvj6+GAsCCdVcNxYrOHULeU+zF1nz3bxTM/xrcAD86CyNYGnSMR+aVSwLly1TYklAex7hb8wyzLyCcEC2oUOheH1jq8G3KTPp/UXtB0nRPU/mK7nUprRdcYQkM1N8YFboyMgH0O8Kx9RIyttd9BDnMCu+A7BbhKHwsNXdemYxv9W1WcvnuyAv+pxGHlNp/uT4glCzjrcM/TPAnv4+8x/ToDxDVTvVI9u7XlE1PKUIdvyceNdaD/FgRs/Da5GWLSUHJNkCkIhP1MwiU2USjDntyYRP837G7uI02NCyLGUlZFT0S4HellTC+1KxVw==
X-YMail-OSG: JjUzACIVM1m4HHOyi8AoRzIh54baizlaoTnoo97rNeS3oBMZmuK90EwFm6DmDYs
 XPhMbRYwsLMEPVSp2n7DDJRsZWyA_C3wYv52ZdMizvlHeuGOOfFzaQF76UII272Jo3R7aFABJwn9
 VADjrOXjBx.s69Tvs6zOmVlLA8uuIDZ8ATpX33Q1iNjA8X3gdu6WYKFbw4wUKXbJXqpdz47pZqXM
 lOyfnj4uqpxki8ysMqnwXVCt2IZ9Y_c6sM25od.xByyZQGU9sjwTFwpXrFk.rgtnJHN4aiMJig.J
 F5KuR3UO7d4KXnr4rjru7iV0OsR1gLKUZjTlqqFGXAX5H088imW2g4v53oq6GWDq7DXzXUhd6nwf
 rKSl67xWS2hnuQYpdzhEfB1RWd7OVNhqxqPGeesafSSp4hpfZY_YCWdZ2ceuUkl2Vv_tq9iFLO5Z
 KHrUnUGhJgBVywrpj2yafOaOb4SkBxC2vkdedjINx_tWtuuDpFBtINJPCbHarYlM6JcqIPivo56F
 TQwjHIC4pPW43QGIQzMPSdJDtxnY763nwN2EgwBS879Uec6QCQAPlBybaSg2oX6RNWI1ZSxItl9B
 TpOY20qSkjqC_BhWSi0xE2oidz1o3fOK5J47E_XUmq1QznhMVGReY2ldnVJ.gqhsYV9TRjjYhNLQ
 GGmmWuR80dpRQGOpKCMmDhX.Fg4QYK5myeGK1SpueiuDExFS6QkuZQ6odpVDeoNA7uuN3uS2_yzQ
 lgV7G1Xu9YPz.gMYTE4edKhgYbMbZZUz6_yFbBxfHkUhnI37lVvLgGGJUrsMNYot16dB2mThoLxk
 2VR.TOV3wkJLZXzt3owGb13AQIlOwLEmv0H7548HC1rUpKLTpMIRX2ABIOiAC8w1rJVqXThouCBJ
 yC5N3r696Z4PpnEziFFa87VHDfY.Bry0Nqgilxg4jaskBdb.BbycSxW5w9Uzl5VCb1ptA0lLk9rZ
 wAa0v3RmZi7XCn3kkghyAcxYQYWEGMgJ9PhaAI_wlDuyyqoujP9KkdO7zpYfopSOf6kQ_lPlJFSH
 bFkyqEYhLYPFmCe.r3urcQwa2EYwHn8TD8U3AWr8PlHIeYS5hLGXdbE.i3CfCWgqX_qwPLBLfEWt
 wrk4b_CfitZnMgk045oORLtSbguIai24vYeI77ecUq2GAv_WsYm5FOKmoAFbMpHbnfoVp79lSWdt
 prj3uxVlqDwSr481_BHluWBueIkt9h0PZ8zbp0A7TCMumCHKzXR0E.YmduxSKZzo4UQ5nCow33BL
 cmdVgJ4jbSmXDAnjw9ZOoH1SUAktlDT4PQzt9bCLzrn8LJFcv81lJJWwpX0JKXwcHohyBof63Eqo
 mTgaVn4mah6tJTqr0cQ3f2io4sFctY5TGkhgzYATlWWih5lm8h4ZfZIQPCu.yTH9Ey3KmrBxx0aE
 f3nz0yBUsm_cx7VUOotv6_6sAnhujcsLHi7bJasyKLQ8wS2IXCBPM.rCBRFGoOE.cVyNCyv576KG
 Rq7b.bDxVSszWT_a9dTYR5yvxe15f5K9I5qjjPOktsRmKVq1nDspupAnN.xtDP3ZUxe0HQvikUf8
 N.ao_pEEoR28TK2_L4zTG3lHxHJV0u2UTTdBcnvtjJBoArqdJYggj2uIONxJ83EsT0kQ1MkTIHhG
 lf3yieS8i66fZW5qU5BDQpuY9cf44sVu4IACd8B.JA970FOhY8SC1wdsMvqSOni9hN_9vAvigmph
 0MwADnGVOwiM9ph3QHbbJH8Tm5k06DXEluULkWx69uN82Qi.6CGFoqPvH0vVEX9.rN0.lWGcpSLM
 0cgQs6.ArB4TlzdhDAg.qiHg57Y87.AYeigWBRkJiemeaL_z6Z8WCfX9_obkdbqhH4IFW7jfLZEQ
 BqAiLPZwAjmawLyr.rZgoYLWJgwcTT_NT5MG9wouiP.nkeieu.VQVkouRpXdeX3BKfsQ1ZP2eetQ
 nYjSfWhgRWtE.wvwwnPfzKEFksqkrgM4of_6wck0oGC9BBz85.dgHGzuWXxh6Gzi.Kv_WhYWVHz_
 5G.UqMFCfmvQysp8D_8uAezMRsmuMfq9brNmtXNdWaKISO_wp5TTcE5A_QS5rnqRP_SxgAtdbQ0_
 wcZUjz65xVGDJdrlPUAAQ3Alxdh_NAK9Gf5GzVqNwCxVhE2Zeugx339WS4oJWFld5qlkje_qcV8x
 KPv1Uk.Y3OzRvDoQ9e7jgFT3_YGK4P90jLxve3wh9l0oaQcD17sy3h0Jt10U_ebQBu0zFwXuU4R.
 l11jY7wye7.bjig--
X-Sonic-MF: <brchuckz@aim.com>
Message-ID: <255ef47f-ea8a-79e5-601d-4ec8d6a44b7e@netscape.net>
Date: Wed, 30 Mar 2022 22:41:30 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [XEN PATCH] tools/libs/light/libxl_pci.c: explicitly grant access
 to Intel IGD opregion
Content-Language: en-US
To: Anthony PERARD <anthony.perard@citrix.com>
Cc: xen-devel@lists.xenproject.org, Wei Liu <wl@xen.org>,
 Juergen Gross <jgross@suse.com>, Jan Beulich <jbeulich@suse.com>
References: <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz.ref@netscape.net>
 <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz@netscape.net>
 <YkSQIoYhomhNKpYR@perard.uk.xensource.com>
From: Chuck Zmudzinski <brchuckz@netscape.net>
In-Reply-To: <YkSQIoYhomhNKpYR@perard.uk.xensource.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Mailer: WebService/1.1.20001 mail.backend.jedi.jws.acl:role.jedi.acl.token.atz.jws.hermes.aol
Content-Length: 8299

On 3/30/22 1:15 PM, Anthony PERARD wrote:
> Hi Chuck,
>
> On Sun, Mar 13, 2022 at 11:41:37PM -0400, Chuck Zmudzinski wrote:
>> When gfx_passthru is enabled for the Intel IGD, hvmloader maps the IGD
>> opregion to the guest but libxl does not grant the guest permission to
> I'm not reading the same thing when looking at code in hvmloader. It
> seems that hvmloader allocate some memory for the IGD opregion rather
> than mapping it.
>
>
> tools/firmware/hvmloader/pci.c:184
>      if ( vendor_id == 0x8086 )
>      {
>          igd_opregion_pgbase = mem_hole_alloc(IGD_OPREGION_PAGES);
>          /*
>           * Write the the OpRegion offset to give the opregion
>           * address to the device model. The device model will trap
>           * and map the OpRegion at the give address.
>           */
>          pci_writel(vga_devfn, PCI_INTEL_OPREGION,
>                     igd_opregion_pgbase << PAGE_SHIFT);
>      }
>
> I think this write would go through QEMU, does it do something with it?

AFAICT Qemu does do something with it:

In the upstream Qemu, at hw/xen/xen_pt_config_init.c
and in hw/xen/xen_pt_graphics.c, we see where Qemu
implements functions to read and write the OpRegion,
and that means it reads and writes the value for the
mapped OpRegion address that is passed to it from
hvmloader. It is a 32-bit address that is stored in the
config attribute in sysfs for the Intel IGD on Linux guests.

I have examined the config attribute of the Intel IGD in
the control domain (dom0) and in the Linux guest and
what I see is that in both dom0 and in the guest, the
address of the IGD OpRegion is consistent with custom logs
I have examined from xen/common/domctl.c that show the
same machine and guest address for the OpRegion that
the config attribute has for the machine and the guest.

> (I kind of replying to this question at the end of the mail.)
>
> Is this code in hvmloader actually run in your case?

I admit I have not verified with certainty that Qemu and
the guest is getting the OpRegion address from hvmloader.
I will do a test to verify it, such as removing the code
from hvmloader that writes the address in the pci config
attribute and see if that prevents the guest from finding
the address where the OpRegion is mapped to in the guest.
That would prove that hvmloader code here is run in my case.
>
>> Currently, because of another bug in Qemu upstream, this crash can
>> only be reproduced using the traditional Qemu device model, and of
> qemu-traditional is a bit old... What is the bug in QEMU? Do you have a
> link to a patch/mail?

Not yet. I am working on it now. The bug is related to the
passthrough of the IRQ to the guest. So far I have compared
the logs in the Linux guest using Qemu upstream with Qemu
traditional, and I have found that with the upstream Qemu,
the Linux kernel in the guest reports that it cannot obtain
IRQ 24:

Mar 29 18:31:39 debian kernel: xen: --> pirq=16 -> irq=24 (gsi=24)
Mar 29 18:31:39 debian kernel: i915 0000:00:02.0: [drm] VT-d active for 
gfx access
...
Mar 29 18:31:39 debian kernel: xen:events: Failed to obtain physical IRQ 24

When using the traditional device model, this failure is not
reported. The failure of the system to handle the IRQ prevents
the guest from booting normally with the upstream Qemu.

Comparing Qemu upstream code with Qemu traditional code,
I notice that when the traditional Qemu sets up the pci-isa
bridge at slot 1f, it configures an IRQ, but the upstream
Qemu does not, so I suspect that is where the problem is, but I
have not found the fix yet. It is well known that the pci-isa
bridge at slot 1f needs to be specially configured for the
Intel IGD to function properly.
>> diff --git a/tools/libs/light/libxl_pci.c b/tools/libs/light/libxl_pci.c
>> index 4bbbfe9f16..a4fc473de9 100644
>> --- a/tools/libs/light/libxl_pci.c
>> +++ b/tools/libs/light/libxl_pci.c
>> @@ -2531,6 +2572,37 @@ int libxl__grant_vga_iomem_permission(libxl__gc *gc, const uint32_t domid,
>>                     domid, vga_iomem_start, (vga_iomem_start + 0x20 - 1));
>>               return ret;
>>           }
>> +
>> +        /* If this is an Intel IGD, allow access to the IGD opregion */
>> +        if (!libxl__is_igd_vga_passthru(gc, d_config)) return 0;
>> +
>> +        uint32_t igd_opregion = sysfs_dev_get_igd_opregion(gc, pci);
>> +        uint32_t error = 0xffffffff;
>> +        if (igd_opregion == error) break;
>> +
>> +        vga_iomem_start = ( (uint64_t) igd_opregion ) >> XC_PAGE_SHIFT;
>> +        ret = xc_domain_iomem_permission(CTX->xch, stubdom_domid,
>> +                                         vga_iomem_start,
>> +                                         IGD_OPREGION_PAGES, 1);
>> +        if (ret < 0) {
>> +            LOGED(ERROR, domid,
>> +                  "failed to give stubdom%d access to iomem range "
>> +                  "%"PRIx64"-%"PRIx64" for IGD passthru",
>> +                  stubdom_domid, vga_iomem_start, (vga_iomem_start +
>> +                                                IGD_OPREGION_PAGES - 1));
>> +            return ret;
>> +        }
>> +        ret = xc_domain_iomem_permission(CTX->xch, domid,
>> +                                         vga_iomem_start,
>> +                                         IGD_OPREGION_PAGES, 1);
> Here, you seems to add permission to an address that is read from the
> pci config space of the device, but as I've pointed above hvmloader
> seems to overwrite this address.

I do not think hvmloader overwrites this address. I think of
it as hvmloader passing the mapped address to the device
model and guest, but as I said above, I will do more tests
to verify with certainty what hvmloader is actually doing.
> It this call to
> xc_domain_iomem_permission() does actually anything useful?

I am certain this call to xc_domain_iomem_permission()
is necessary with the Qemu traditional device model to
obtain permission for the guest (domid) to access the
OpRegion. Without it, the bug is not fixed and I get the
crash in the i915 kernel module in the Linux guest and a dark
screen instead of a guest with output to the screen.

Moreover, I have verified with custom logs from
xen/common/domctl.c that access to the opregion
is denied to domid, but not to dom0, when this
patch is not applied.

> Or is it by luck that the address returned by
> sysfs_dev_get_igd_opregion() happened to be the address that hvmloader
> is going to write?
>
> Or maybe hvmloader doesn't actually do anything?

I mentioned earlier my plans to verify that
hvmloader does provide the device model and
the guest with the mapped address of the
Intel IGD OpRegion.
>
>
> Some more though on that, looking at QEMU, it seems that there's already
> a call to xc_domain_iomem_permission(), in igd_write_opregion(). So
> adding one in libxl would seems redundant,

You may be right that with Qemu upstream it is not
needed. I will be able to check it once I have a patch
for the IRQ problem in upstream Qemu. When I wrote
this patch a couple of weeks ago, though, I did not yet
know that Qemu upstream also calls
xc_domain_iomem_permission() and since Qemu
upstream seems to obtain the necessary permission,
the call here to xc_domain_iomem_permission()
can be done only when the device model is Qemu
traditional.
> or maybe it the one for the
> device model's domain that's needed  (named 'stubdom_domid' here)?

Well, I am not using a device model stub domain but
running the device model in dom0, and my tests
indicate it is not necessary to obtain permission for
dom0, but I do admit I need to do more tests before
submitting the next version of a patch. I plan to do
some tests with a device model stub domain and see
what configurations require permission for the stub
domain. I expect it will only be needed when the
device model is Qemu traditional because Qemu
upstream obtains the necessary permission.

I have no experience running the device model
in a stub domain, and IIRC the Xen wiki explains
that the supported configuration from the Xen Project
is with the traditional device model and mini os in
the stub domain, and others, such as Qubes OS,
have done some work on the upstream Qemu and
Linux running in a stub domain. Please correct me
if this is not correct.

Thank you for taking the time to look at this patch.

Chuck


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 03:14:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 03:14:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296618.504954 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZlGI-0005Xv-Ue; Thu, 31 Mar 2022 03:14:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296618.504954; Thu, 31 Mar 2022 03:14:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZlGI-0005Xo-Q0; Thu, 31 Mar 2022 03:14:14 +0000
Received: by outflank-mailman (input) for mailman id 296618;
 Thu, 31 Mar 2022 03:14:14 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZlGI-0005Xe-0F; Thu, 31 Mar 2022 03:14:14 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZlGH-0002wp-Qi; Thu, 31 Mar 2022 03:14:13 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZlGH-0002KS-G7; Thu, 31 Mar 2022 03:14:13 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZlGH-0001qO-Fd; Thu, 31 Mar 2022 03:14:13 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Message-Id:Subject:To;
	bh=pQP36fTe+zUbApBpXPE0iFCeXiVYFpzH5wdW0Pikzc0=; b=aM3TTvMn+nZxqDeddgETXwganM
	kwyenyKVjJowNo5mMZG8H31pG3a4ZSg8E8LG46J8951bLnq7kyRfeS0FCA5YhVJa8sEseTFcGA8YB
	w9jpCG8L5cD9rTcClCROhLJgkM/J/b9rld6igSZDfSe+6J+n1d2kV51bW8dZHawKBOQg=;
To: xen-devel@lists.xenproject.org
Subject: [xen-4.15-testing bisection] complete test-amd64-amd64-livepatch
Message-Id: <E1nZlGH-0001qO-Fd@osstest.test-lab.xenproject.org>
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 31 Mar 2022 03:14:13 +0000

branch xen-4.15-testing
xenbranch xen-4.15-testing
job test-amd64-amd64-livepatch
testid livepatch-run

Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: ovmf git://xenbits.xen.org/osstest/ovmf.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: seabios git://xenbits.xen.org/osstest/seabios.git
Tree: xen git://xenbits.xen.org/xen.git

*** Found and reproduced problem changeset ***

  Bug is in tree:  xen git://xenbits.xen.org/xen.git
  Bug introduced:  be9facf323b40b5a18c5e3f70fce5b245818c42f
  Bug not present: 74aeb555745b27575c3f82051a83942ee05bd842
  Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/169054/


  commit be9facf323b40b5a18c5e3f70fce5b245818c42f
  Author: Bjoern Doebel <doebel@amazon.de>
  Date:   Thu Mar 10 07:35:36 2022 +0000
  
      xen/x86: Livepatch: support patching CET-enhanced functions
      
      Xen enabled CET for supporting architectures. The control flow aspect of
      CET require functions that can be called indirectly (i.e., via function
      pointers) to start with an ENDBR64 instruction. Otherwise a control flow
      exception is raised.
      
      This expectation breaks livepatching flows because we patch functions by
      overwriting their first 5 bytes with a JMP + <offset>, thus breaking the
      ENDBR64. We fix this by checking the start of a patched function for
      being ENDBR64. In the positive case we move the livepatch JMP to start
      behind the ENDBR64 instruction.
      
      To avoid having to guess the ENDBR64 offset again on patch reversal
      (which might race with other mechanisms adding/removing ENDBR
      dynamically), use the livepatch metadata to store the computed offset
      along with the saved bytes of the overwritten function.
      
      Signed-off-by: Bjoern Doebel <doebel@amazon.de>
      Acked-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
      Reviewed-by: Ross Lagerwall <ross.lagerwall@citrix.com>
      Tested-by: Jiamei Xie <jiamei.xie@arm.com>
      (cherry picked from commit 6974c75180f1aad44e5428eabf2396b2b50fb0e4)
      
      Note: For backports to 4.14 thru 4.16, there is no endbr-clobbering, hence no
            is_endbr64_poison() logic.


For bisection revision-tuple graph see:
   http://logs.test-lab.xenproject.org/osstest/results/bisect/xen-4.15-testing/test-amd64-amd64-livepatch.livepatch-run.html
Revision IDs in each graph node refer, respectively, to the Trees above.

----------------------------------------
Running cs-bisection-step --graph-out=/home/logs/results/bisect/xen-4.15-testing/test-amd64-amd64-livepatch.livepatch-run --summary-out=tmp/169054.bisection-summary --basis-template=168502 --blessings=real,real-bisect,real-retry xen-4.15-testing test-amd64-amd64-livepatch livepatch-run
Searching for failure / basis pass:
 168992 fail [host=himrod0] / 168502 [host=albana1] 168483 ok.
Failure / basis pass flights: 168992 / 168483
(tree with no url: minios)
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: ovmf git://xenbits.xen.org/osstest/ovmf.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: seabios git://xenbits.xen.org/osstest/seabios.git
Tree: xen git://xenbits.xen.org/xen.git
Latest c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db bb43e0e1ca20dff14536b7c90ff870f3f50bff8f
Basis pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 e2af2d050338c99e8436e251ad67aafb3ebbd501 d239552ce7220e448ae81f41515138f7b9e3c4db 1b50f41b3bd800eb72064063da0c64b86d629f3a
Generating revisions with ./adhoc-revtuple-generator  git://xenbits.xen.org/linux-pvops.git#c3038e718a19fc596f7b1baba0f83d5146dc7784-c3038e718a19fc596f7b1baba0f83d5146dc7784 git://xenbits.xen.org/osstest/linux-firmware.git#c530a75c1e6a472b0eb9558310b518f0dfcd8860-c530a75c1e6a472b0eb9558310b518f0dfcd8860 git://xenbits.xen.org/osstest/ovmf.git#b1b89f9009f2390652e0061bd7b24fc40732bc70-b1b89f9009f2390652e0061bd7b24fc40732bc70 git://xenbits.xen.org/qemu-xen-traditional.git#3d273dd05e51e5a1ffba3d98c74\
 37ee84e8f8764-3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 git://xenbits.xen.org/qemu-xen.git#e2af2d050338c99e8436e251ad67aafb3ebbd501-6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 git://xenbits.xen.org/osstest/seabios.git#d239552ce7220e448ae81f41515138f7b9e3c4db-d239552ce7220e448ae81f41515138f7b9e3c4db git://xenbits.xen.org/xen.git#1b50f41b3bd800eb72064063da0c64b86d629f3a-bb43e0e1ca20dff14536b7c90ff870f3f50bff8f
Loaded 10007 nodes in revision graph
Searching for test results:
 168483 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 e2af2d050338c99e8436e251ad67aafb3ebbd501 d239552ce7220e448ae81f41515138f7b9e3c4db 1b50f41b3bd800eb72064063da0c64b86d629f3a
 168502 [host=albana1]
 168863 fail c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db 3c8e7395e2d01140c862c78fa9483e46c0dbd343
 168970 fail c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db bb43e0e1ca20dff14536b7c90ff870f3f50bff8f
 169024 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 e2af2d050338c99e8436e251ad67aafb3ebbd501 d239552ce7220e448ae81f41515138f7b9e3c4db 1b50f41b3bd800eb72064063da0c64b86d629f3a
 169029 fail c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db bb43e0e1ca20dff14536b7c90ff870f3f50bff8f
 169031 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db ddeebb5f09b7a0c168395e919078c616a0965a49
 169033 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db 82fc15285634bb56125a5b321402d7d52c440646
 168992 fail c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db bb43e0e1ca20dff14536b7c90ff870f3f50bff8f
 169035 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db c3407c77a02eb9077ce2360df6240a9b0e9cb7db
 169038 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db 74aeb555745b27575c3f82051a83942ee05bd842
 169041 fail c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db be9facf323b40b5a18c5e3f70fce5b245818c42f
 169044 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db 74aeb555745b27575c3f82051a83942ee05bd842
 169049 fail c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db be9facf323b40b5a18c5e3f70fce5b245818c42f
 169052 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db 74aeb555745b27575c3f82051a83942ee05bd842
 169054 fail c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db be9facf323b40b5a18c5e3f70fce5b245818c42f
Searching for interesting versions
 Result found: flight 168483 (pass), for basis pass
 For basis failure, parent search stopping at c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db 74aeb555745b27575c3f82051a83942ee05bd842, results HASH(0x5643176a6c78) HASH(0x5643176af2c0) HASH(0x5643176b9490) For basis failure, parent search stopping at c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1\
 e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db c3407c77a02eb9077ce2360df6240a9b0e9cb7db, results HASH(0x5643176aefc0) For basis failure, parent search stopping at c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a4\
 75e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db 82fc15285634bb56125a5b321402d7d52c440646, results HASH(0x5643176ac690) For basis failure, parent search stopping at c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db ddeebb5f09b7a0c168395e919078c616a0965a49, results HASH(0x5643176993f8) For basis\
  failure, parent search stopping at c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 e2af2d050338c99e8436e251ad67aafb3ebbd501 d239552ce7220e448ae81f41515138f7b9e3c4db 1b50f41b3bd800eb72064063da0c64b86d629f3a, results HASH(0x5643176a18c0) HASH(0x5643176990f8) Result found: flight 168863 (fail), for basis failure (at ancestor ~394)
 Repro found: flight 169024 (pass), for basis pass
 Repro found: flight 169029 (fail), for basis failure
 0 revisions at c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3d273dd05e51e5a1ffba3d98c7437ee84e8f8764 6503bd6a1b5364ffd346a8a475e1eb91b9f756e5 d239552ce7220e448ae81f41515138f7b9e3c4db 74aeb555745b27575c3f82051a83942ee05bd842
No revisions left to test, checking graph state.
 Result found: flight 169038 (pass), for last pass
 Result found: flight 169041 (fail), for first failure
 Repro found: flight 169044 (pass), for last pass
 Repro found: flight 169049 (fail), for first failure
 Repro found: flight 169052 (pass), for last pass
 Repro found: flight 169054 (fail), for first failure

*** Found and reproduced problem changeset ***

  Bug is in tree:  xen git://xenbits.xen.org/xen.git
  Bug introduced:  be9facf323b40b5a18c5e3f70fce5b245818c42f
  Bug not present: 74aeb555745b27575c3f82051a83942ee05bd842
  Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/169054/


  commit be9facf323b40b5a18c5e3f70fce5b245818c42f
  Author: Bjoern Doebel <doebel@amazon.de>
  Date:   Thu Mar 10 07:35:36 2022 +0000
  
      xen/x86: Livepatch: support patching CET-enhanced functions
      
      Xen enabled CET for supporting architectures. The control flow aspect of
      CET require functions that can be called indirectly (i.e., via function
      pointers) to start with an ENDBR64 instruction. Otherwise a control flow
      exception is raised.
      
      This expectation breaks livepatching flows because we patch functions by
      overwriting their first 5 bytes with a JMP + <offset>, thus breaking the
      ENDBR64. We fix this by checking the start of a patched function for
      being ENDBR64. In the positive case we move the livepatch JMP to start
      behind the ENDBR64 instruction.
      
      To avoid having to guess the ENDBR64 offset again on patch reversal
      (which might race with other mechanisms adding/removing ENDBR
      dynamically), use the livepatch metadata to store the computed offset
      along with the saved bytes of the overwritten function.
      
      Signed-off-by: Bjoern Doebel <doebel@amazon.de>
      Acked-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
      Reviewed-by: Ross Lagerwall <ross.lagerwall@citrix.com>
      Tested-by: Jiamei Xie <jiamei.xie@arm.com>
      (cherry picked from commit 6974c75180f1aad44e5428eabf2396b2b50fb0e4)
      
      Note: For backports to 4.14 thru 4.16, there is no endbr-clobbering, hence no
            is_endbr64_poison() logic.

Revision graph left in /home/logs/results/bisect/xen-4.15-testing/test-amd64-amd64-livepatch.livepatch-run.{dot,ps,png,html,svg}.
----------------------------------------
169054: tolerable ALL FAIL

flight 169054 xen-4.15-testing real-bisect [real]
http://logs.test-lab.xenproject.org/osstest/logs/169054/

Failures :-/ but no regressions.

Tests which did not succeed,
including tests which could not be run:
 test-amd64-amd64-livepatch   13 livepatch-run           fail baseline untested


jobs:
 test-amd64-amd64-livepatch                                   fail    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 03:51:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 03:51:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296632.504970 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZlqD-0001Jc-1T; Thu, 31 Mar 2022 03:51:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296632.504970; Thu, 31 Mar 2022 03:51:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZlqC-0001JU-Ud; Thu, 31 Mar 2022 03:51:20 +0000
Received: by outflank-mailman (input) for mailman id 296632;
 Thu, 31 Mar 2022 03:51:19 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=nuZR=UK=invisiblethingslab.com=marmarek@srs-se1.protection.inumbo.net>)
 id 1nZlqB-0001JN-JT
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 03:51:19 +0000
Received: from out5-smtp.messagingengine.com (out5-smtp.messagingengine.com
 [66.111.4.29]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id cf973922-b0a5-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 05:51:17 +0200 (CEST)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41])
 by mailout.nyi.internal (Postfix) with ESMTP id 96A695C0103
 for <xen-devel@lists.xenproject.org>; Wed, 30 Mar 2022 23:51:13 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163])
 by compute1.internal (MEProxy); Wed, 30 Mar 2022 23:51:13 -0400
Received: by mail.messagingengine.com (Postfix) with ESMTPA for
 <xen-devel@lists.xenproject.org>; Wed, 30 Mar 2022 23:51:12 -0400 (EDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: cf973922-b0a5-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:content-type:date:date:from:from
	:in-reply-to:message-id:mime-version:reply-to:sender:subject
	:subject:to:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender
	:x-sasl-enc; s=fm3; bh=cJTllDblkGJLI8PnStYppUoNxFyzvj+QJYSqvc0Ux
	ZQ=; b=U/71m0MeVHYlw6gbkGrQYnNkYglMY5CQ2Tj4RnG/FbrlNLMah+IYJwEWz
	STsRVO2NQaANccyIA71/r2W9yqjEtK1JNS3ytnuYpYc9FsJILnrCerdhOw9zHDjG
	QUnBpuuTTauK89v8I0XykBgYgETL2JGdVmKSX4n9kncr0v3A8jEcYjg9xOs5qFkk
	bNIS+32kL3tBCuJZL9fnAdPPZT3ySBJJoR7rYtkI0e7gIJ+mapvKZ/lviKzJYyol
	6ghX1It0Ww4Fqsr1dhSMyurmOhdVY8JZNdXNP6sgkN9aZWLzCgNJLKpMfw6xGXvZ
	xpimPej7hTH+drXRv050EIb5c4jeA==
X-ME-Sender: <xms:MSVFYqhz4Ln0IRJddpH-F0FWmwz4knz5xHU9Jx1kZ69Ui36k4POCeQ>
    <xme:MSVFYrBKUGNnmYWU9JG8qtIi6K1snYnfCMfrk9PrJq6GpW5rf8YKHzSufY-ngAnp4
    ybu7orYBUDfGg>
X-ME-Received: <xmr:MSVFYiFF6t2yg2DTT86pEb8sG7hB2g8LjV0v7lfU6hq5L_uQXrTLXhc_7tYuxKOM3ifC_xDvUGVyUEgsdwn-BEVajS2oGkoOrw>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddrudeifedgjedtucetufdoteggodetrfdotf
    fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen
    uceurghilhhouhhtmecufedttdenucenucfjughrpeffhffvuffkgggtugesghdtreertd
    dtjeenucfhrhhomhepofgrrhgvkhcuofgrrhgtiiihkhhofihskhhiqdfikphrvggtkhhi
    uceomhgrrhhmrghrvghksehinhhvihhsihgslhgvthhhihhnghhslhgrsgdrtghomheqne
    cuggftrfgrthhtvghrnhepteduteeiudevkeegvefhtdekhfelgffhhedukedvvdeuuddv
    jeehvddtieehudfgnecuffhomhgrihhnpehgihhthhhusgdrtghomhenucevlhhushhtvg
    hrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpehmrghrmhgrrhgvkhesihhn
    vhhishhisghlvghthhhinhhgshhlrggsrdgtohhm
X-ME-Proxy: <xmx:MSVFYjSBKpRJGvvLnBUNjtdGxMYHID6xnaQzS_J1O-XzAH5PxB-XyQ>
    <xmx:MSVFYnx_YbbtaM5SNixChkCsbojS_9WpovbthufvGDhBZgPNFhX-EA>
    <xmx:MSVFYh5MQ8_CF8nhUD-GAYH1-EvlVO-oUx0lVh-kPzmHCIpuLj2gfg>
    <xmx:MSVFYm-rXPkGQ35hkVnVXEJ5hOjDndrnHxoVZpFas7LmW3l5VYLQvQ>
Date: Thu, 31 Mar 2022 05:51:10 +0200
From: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: xen-devel <xen-devel@lists.xenproject.org>
Subject: Increasing domain memory beyond initial maxmem
Message-ID: <YkUlLvnEDdc5hwN4@mail-itl>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="oT31JiaygZtMJYSR"
Content-Disposition: inline


--oT31JiaygZtMJYSR
Content-Type: text/plain; protected-headers=v1; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Date: Thu, 31 Mar 2022 05:51:10 +0200
From: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: xen-devel <xen-devel@lists.xenproject.org>
Subject: Increasing domain memory beyond initial maxmem

Hi,

I'm trying to make use of CONFIG_XEN_BALLOON_MEMORY_HOTPLUG=3Dy to increase
domain memory beyond initial maxmem, but I hit few issues.

A little context: domains in Qubes OS start with rather little memory
(400MB by default) but maxmem set higher (4GB by default). Then, there is
qmemman daemon, that adjust balloon targets for domains, based on (among
other things) demand reported by the domains themselves. There is also a
little swap, to mitigate qmemman latency (few hundreds ms at worst).
This initial memory < maxmmem in case of PVH / HVM makes use of PoD
which I'm trying to get rid of. But also, IIUC Linux will waste some
memory for bookkeeping based on maxmem, not actually usable memory.

First issue: after using `xl mem-max`, `xl mem-set` still refuses to
increase memory more than initial maxmem. That's because xl mem-max does
not update 'memory/static-max' xenstore node. This one is easy to work
around.

Then, the actual hotplug fails on the domU side with:

[   50.004734] xen-balloon: vmemmap alloc failure: order:9, mode:0x4cc0(GFP=
_KERNEL|__GFP_RETRY_MAYFAIL), nodemask=3D(null),cpuset=3D/,mems_allowed=3D0
[   50.004774] CPU: 1 PID: 34 Comm: xen-balloon Not tainted 5.16.15-1.37.fc=
32.qubes.x86_64 #1
[   50.004792] Call Trace:
[   50.004799]  <TASK>
[   50.004808]  dump_stack_lvl+0x48/0x5e
[   50.004821]  warn_alloc+0x162/0x190
[   50.004832]  ? __alloc_pages+0x1fa/0x230
[   50.004842]  vmemmap_alloc_block+0x11c/0x1c5
[   50.004856]  vmemmap_populate_hugepages+0x185/0x519
[   50.004868]  vmemmap_populate+0x9e/0x16c
[   50.004878]  __populate_section_memmap+0x6a/0xb1
[   50.004890]  section_activate+0x20a/0x278
[   50.004901]  sparse_add_section+0x70/0x160
[   50.004911]  __add_pages+0xc3/0x150
[   50.004921]  add_pages+0x12/0x60
[   50.004931]  add_memory_resource+0x12b/0x320
[   50.004943]  reserve_additional_memory+0x10c/0x150
[   50.004958]  balloon_thread+0x206/0x360
[   50.004968]  ? do_wait_intr_irq+0xa0/0xa0
[   50.004978]  ? decrease_reservation.constprop.0+0x2e0/0x2e0
[   50.004991]  kthread+0x16b/0x190
[   50.005001]  ? set_kthread_struct+0x40/0x40
[   50.005011]  ret_from_fork+0x22/0x30
[   50.005022]  </TASK>

Full dmesg: https://gist.github.com/marmarek/72dd1f9dbdd63cfe479c94a3f4392b=
45

After the above, `free` reports correct size (1GB in this case), but
that memory seems to be unusable really. "used" is kept low, and soon
OOM-killer kicks in.

I know the initial 400MB is not much for a full Linux, with X11 etc. But
I wouldn't expect it to fail this way when _adding_ memory.

I've tried also with initial 800MB. In this case, I do not get "alloc
failure" any more, but monitoring `free`, the extra memory still doesn't
seem to be used.

Any ideas?

--=20
Best Regards,
Marek Marczykowski-G=C3=B3recki
Invisible Things Lab

--oT31JiaygZtMJYSR
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAmJFJS4ACgkQ24/THMrX
1yxPngf/Z3dKtT//OT8bWUXoOSVDeSe/RJBYhPnoFJgF4OctFBFJngIOgwpFw+kb
6q+GeVqVkeln5AgVUCwZEHBvOfGhU57xOzqdBWSOCTPF2mmhEVHOpr0FucfeCMyx
DZaF2GJ9UXJ/WvT1h1VmpaIbeNax+0CzXlTmS85sRNLfn1BJ6X9kPDP8tB1ul42+
ZqpTFkJRhBflm8lOCEjb0kUZIAJfsIvcqnQE26fIMQulWePW8fdDbUwT8ytzh1Wt
IC4QasLsbo5CPtnntFvMdL2asBAw0OJQlIVYQSSWyAQG6jv+6LIiNgv5neKHppTH
GqrXAoorMH9FUv05UCIT28xU3Vr3BA==
=ecdV
-----END PGP SIGNATURE-----

--oT31JiaygZtMJYSR--


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 03:54:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 03:54:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296636.504982 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZltM-0001uk-GD; Thu, 31 Mar 2022 03:54:36 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296636.504982; Thu, 31 Mar 2022 03:54:36 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZltM-0001ud-Cp; Thu, 31 Mar 2022 03:54:36 +0000
Received: by outflank-mailman (input) for mailman id 296636;
 Thu, 31 Mar 2022 03:54:34 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=5BbJ=UK=aim.com=brchuckz@srs-se1.protection.inumbo.net>)
 id 1nZltJ-0001uW-Ps
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 03:54:34 +0000
Received: from sonic301-20.consmr.mail.gq1.yahoo.com
 (sonic301-20.consmr.mail.gq1.yahoo.com [98.137.64.146])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4435afdc-b0a6-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 05:54:31 +0200 (CEST)
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic301.consmr.mail.gq1.yahoo.com with HTTP; Thu, 31 Mar 2022 03:54:29 +0000
Received: by kubenode531.mail-prod1.omega.ne1.yahoo.com (VZM Hermes SMTP
 Server) with ESMTPA ID d9e653a8b36759090ebe631f467114cf; 
 Thu, 31 Mar 2022 03:54:25 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4435afdc-b0a6-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netscape.net; s=a2048; t=1648698869; bh=KKsyBEl4q1LDy1SP5VL4bgr8nVC6cxIiQ5mNNkiGHxk=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From:Subject:Reply-To; b=bHVc/WY/2krO5EeYgr4y+qB5BG/vzi6bG6J9Umg8pTprC/sahuETQfLStD6s3h5FPgF/BidBBYPdlUsghSD4Q1lCxnBHoohoYJlO8VI5G+S11dzpErok8f/kOLx9m4l/Boii7r9/IS7t9wylw1nlrSsWnOroEmnAN+g4DBW8f2EvMLD9n/ESvTJa+WqbS5aPQuhmchOLEeUdn4GvVvHXIhhBouCwMPGK1ape4UsuKozX7xpfN7z9KSPLCqQKNgh1DCzwepcxNiMnT94zgvBYZfpZ9bvHgp8TJjqH/IdzhiztZkbIpT6f9HXRkSVUJHKBeWRVF70iejIxp7AMEXWp7Q==
X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1648698869; bh=m80MGMabjDDMHFmsBASMVp03mG5NaoiOoPx52vUyxnZ=; h=X-Sonic-MF:Date:Subject:To:From:From:Subject; b=ulmjrNekmCosvieCj8uMb2biZxvbv7Z7hh8ud1YtYaP6Irdq+rY9g78c4IenMfjHA7KD/+Ebr28oCtVJxqmfPgM/XTph3MM5kKt8qMUPzAxgegevet25bUt+ziBM8EOmPx8fOasD8p5M3J2czOo93hXiPBRO19jWRVvbauSMwi1M5Faipsg1dg8lXX2PYlUad0JMMwf0bc6UFOSvowcV9hcWsAo290PVx5DiUcZQiNecbxBAeimJUVYpLrPl+mW522SIVFg6UXiDFZaKQXIMlXtDehNXPjNc4M+OTSDIf6DjIBNyZC0S0BsY/wTi1DWkP0FhH2VCM8Kl0dW5gJFpzg==
X-YMail-OSG: A7wwiecVM1nuU5tq9U4zvLY0Z72gn_Ak2hWT1T0HFAkIiRtp9J4_eW0EXirY.12
 9TFcpNq501fkHOTXIqoxaOO.5emQEJnlgoml2wybXtMoYYhqHYM2es0o4CVG7ROkBDagcz9I0.sd
 SPWE2SZLf_PVdtnD5e2fR6KgAiz2koEhtTxr1wi.83_r3ROWr7EenqRN9QzDl.r3npI37gZT.5NP
 1JKlMf4IrkEEnrWnaCkPPdkZcw1M4nAcPLc9s1nmd3eirL5..CW0LitqxCSsW4H4RFOTp_egygwP
 sGHCYQwz6AjJmc0vlCJYlJBC57XxsdYalZ21lbH4Ya4rREKaENaL.HVRkn51hVm51D3lD3qlEHtJ
 iYNYitnka6GlRrkEslaXpByV14hrZ6CzZewPnOFMT1J1NX5WgBgYwYr53XIheZnlINOgUfX0tBEq
 4DJpaDlrrOamrse7oCueMwnzaom065bH21_BebJ1t8EqptF0RYGRcmlX5H6gl7gVrj.A2CgvIYfu
 AnsACIoYtEkzF5_BpdevmI.BMcrJ6ab3tN.ude22_E3oXBErPvzpCw3D04cqClbPPwUwT_BWU_ER
 IlFhPdVhxmw.lh4yTi4TZbec_vefAwi3IRiBHemiHDqAboecGI2X3ra92d.xkCA_1UMTDaOj2xTo
 k2nA_8Lr6mpHUpcGlXD6ZY51xCRqKRbXjj6isN0EW9ZOIHxe1EgkOGkJyhIaZHkMwr0B3vo2RgZ6
 iAKrLqA0Ig44zvQoTd867sL9MSiUTDxcVMkToxrCk1aXcbrsi8kqA3_EgeybNyxywQvV_IyoVOZn
 XOCdL8xVNYS7Jw0gFbhn65B7F6XUaDY3JsKJPN1vKJw0z.4oDkgWxP_AEh.a9FXSuiMIttt7zbd5
 _7qMrZPEyXxRJ2OSs.pJV7bcXrtSXXjnZAEqH0qH7ITSxlV.Ho9niS2.HuLXxk3oOvbxfSpNu26B
 ZKthUtdSaBF89O1gnYAj7VmunfyH2PVUk.uDqpHApEjcHHstduA456bSCjaUbAhR.eO1189Ikj3B
 GDNxT8204oMChjxlFOjhDfSbmfHjvKxA.9.5kBu8UNe53VSllwjY9ARBkv2BqVTit5qHcL9Koshs
 3v130eza1aZtMrlm1g_yZzBBZlyfF_INpGKlfE1amthdMXDwz2zW0grn7ur87jvFUbUYdj7U9ql9
 lVu3sOYgp4cQe4ye0qc9DNMQA5Ptv0gfeUywmWxI6Qy66zXfNNlIMLlPPkrbmtJmV32w62KOccSf
 hoCMQWJ4GwTlMvntKdI7O8grYVc2MOiGJwyvdN6h3OUR2jTuw5Z.Ht9egOLh7A.R.4let6PDwlzr
 8nMNFhR1i41nohwQGxwGdgccOj0V_mKOYKCgwMBrL6cy5OT5ST5kwgO38TGu4.4yNs.ddBx0h78l
 ylqxucLvFVYATs64V2mvRDPialKMXfaiGq6cqqet9Irx4_vHAPTSneXv6QF8JosB7jnnmqDa3S1v
 cm2gvDXdvTW2bPkWpqLx3dYnKRfUsf.xr4INjgkTXOfnbnj9JMxfYC5QNkwcfymQVC3CWCGXLyD0
 Y5.kG59QdbQQ1sHjv7zyYAzl65BEvPjYq.S0NS5HMlMHJxm09TflaD8gfSrQ.EVAQipcuh2c4Uyw
 LygiOkgu5eU6Q6W8BHPcOueNtg2aTfmN.ziDYGenc26SlO3fHPC7Lft7_5WMOJ6acGXx_cEOZYkH
 Vzyi92hF5VQu_XTco9AdppVENfmC0fmlUdeJtug.ejXcG8WmNaeknb75uiyovM4AsWd1R7b_Mpk0
 pun7VE25NMaplggc_Urnj9mZkaQKscZyS8VfhjQBUUXiTO3G1ekvKrvf_7WCx1436aBWfC_49yqq
 QAwE8D0WXhRuaGH9KNvdT9yMzexgpRyqKq.H1eT7EeA8XV6u0cShviYTk8fPkzrRVJ66d1c3jNVw
 xbApekNXxNUORJ_plEPz0hjLFZ4RwejaOGNnWAFqQ_NV_vam8Q7_Y8OCsnjOXCD06znEkgePzTDx
 tP9hyYA9.tMu2UUvGbBQMygs0WmIO3nneoq9DtxwIME_OEoh._d0oxIKG5Bqv3HmHKAXJ6DucDjz
 4YNg61a9ID.XC7j_v49OXGy8bciI4ZeW83.QiTNEEqmRkT6NoXRZAa0gDnuiRVHkOG5XOEIrjvkF
 Dg.hK_Kn9hcal822Vukuo9ZBX.bBInam50ebPADnLFdSSzPsXb7WDCqBNTrN8_fF0tWy13RJ.ZOd
 bhgseQ7j_szhDSeMErg--
X-Sonic-MF: <brchuckz@aim.com>
Message-ID: <46a8585e-2a2a-4d12-f221-e57bd157dec6@netscape.net>
Date: Wed, 30 Mar 2022 23:54:23 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [XEN PATCH] tools/libs/light/libxl_pci.c: explicitly grant access
 to Intel IGD opregion
Content-Language: en-US
To: Andrew Cooper <amc96@srcf.net>, Anthony PERARD <anthony.perard@citrix.com>
Cc: xen-devel@lists.xenproject.org, Wei Liu <wl@xen.org>,
 Juergen Gross <jgross@suse.com>, Jan Beulich <jbeulich@suse.com>
References: <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz.ref@netscape.net>
 <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz@netscape.net>
 <YkSQIoYhomhNKpYR@perard.uk.xensource.com>
 <408e5e07-453c-f377-a5b0-c421d002aec5@srcf.net>
From: Chuck Zmudzinski <brchuckz@netscape.net>
In-Reply-To: <408e5e07-453c-f377-a5b0-c421d002aec5@srcf.net>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-Mailer: WebService/1.1.20001 mail.backend.jedi.jws.acl:role.jedi.acl.token.atz.jws.hermes.aol
Content-Length: 1993

On 3/30/22 1:27 PM, Andrew Cooper wrote:
> On 30/03/2022 18:15, Anthony PERARD wrote:
>>
>> Some more though on that, looking at QEMU, it seems that there's already
>> a call to xc_domain_iomem_permission(), in igd_write_opregion().
> This has been discussed before, but noone's done anything about it.
> It's a massive layering violation for QEMU to issue
> xc_domain_iomem_permission()/etc hypercalls.
>
> It should be the toolstack, and only the toolstack, which makes
> permissions hypercalls, which in turn will fix a slew of "QEMU doesn't
> work when it doesn't have dom0 superpowers" bugs with stubdomains.

How much say does the Xen project have over the code
in Qemu under hw/xen? I would not be against having libxl
do the permissions hypercalls in this case instead of Qemu
doing it. My test with Qemu traditional and this patch proves
the permission can be granted by libxl instead of the device
model.
> In this case specifically, the opregion is a magic Intel graphics
> specific bodge.  The i915 driver in the guest really does need to access
> part of the real PCH during init, which (in Xen's permission model)
> really does require permitting access to the MMIO range (8k iirc) so it
> can be mapped as a BAR in QEMU's emulated PCH.

That is exactly what my testing confirmed, but in my
tests only Linux guests need access to the magic Intel
opregion. The proprietary Windows Intel graphics
drivers are apparently able to work around lack of
access to the opregion, at least on my system, and
Windows guests with Intel IGD passthrough function
very well without needing this patch. So the problem
could be fixed in the Linux i915 kernel driver, but Intel
has not contributed the magic sauce to the Linux kernel
that would enable Linux guests to work without access
to the Intel opregion.

And you are correct, the opregion is 8k (2 pages) in size,
but it is not always page aligned, as mentioned earlier,
so the IGD_OPREGION_PAGES constant is set to 3 instead
of 2.

Chuck


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 04:34:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 04:34:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296642.504995 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZmVt-00067x-K8; Thu, 31 Mar 2022 04:34:25 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296642.504995; Thu, 31 Mar 2022 04:34:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZmVt-00067q-H9; Thu, 31 Mar 2022 04:34:25 +0000
Received: by outflank-mailman (input) for mailman id 296642;
 Thu, 31 Mar 2022 04:34:24 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=5BbJ=UK=aim.com=brchuckz@srs-se1.protection.inumbo.net>)
 id 1nZmVr-00067k-UK
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 04:34:24 +0000
Received: from sonic306-21.consmr.mail.gq1.yahoo.com
 (sonic306-21.consmr.mail.gq1.yahoo.com [98.137.68.84])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id d4d4e0b4-b0ab-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 06:34:21 +0200 (CEST)
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic306.consmr.mail.gq1.yahoo.com with HTTP; Thu, 31 Mar 2022 04:34:19 +0000
Received: by kubenode510.mail-prod1.omega.ne1.yahoo.com (VZM Hermes SMTP
 Server) with ESMTPA ID bfaa6048c66450ea78631724d00bd86d; 
 Thu, 31 Mar 2022 04:34:15 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: d4d4e0b4-b0ab-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netscape.net; s=a2048; t=1648701259; bh=ePNF+xyTVg9PzeNUd3rAboSVNRUGmgQnhwX1SIbI/JM=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From:Subject:Reply-To; b=jyRRhaLgQ1/g/JMD8/zPvpYiwvRko/GaUejLaStUsw3GCsZfvEADnq0CQ0z3CN9NLA0WsoKecL/YtuynSzk38BBdtdfEtWumVJLUQGIJB7BZefuwuazBG+rdGh2WM9RDnjKDoj6WgtajId40S2y+AJntOQiDpymc++Hm8ggx+B7CRFP32BY+/9fdzX2/nMIpPiemZAU8cgPLJhKC/1cHgv4nDtA8OLz/SFhAn4NnPvw/L5q4GYNZ7QxfVYM/wJvZVxr8TkHd1G/DpE/mf50smLI30xCUW0g+49sZSUV9O1CRYkdhRRaDlPVlJ3HRLfYsZmDKolrGbB6BYtzU+JVvNw==
X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1648701259; bh=j/4hGOTgMBDxxrRea+oF2Jz1x4lh/w44833WNMTSbV5=; h=X-Sonic-MF:Date:Subject:To:From:From:Subject; b=p/j0MLH04SFTO1hRVO93rOMho1WS9D+tace1mImXNrsBR0aKkjIoeWJf04T1Xffr3js3plM81ltWIfZ8AcLkFafSOp94hea6eVqWqaL0E60uBHHxjPTdDIwgynPsmnLLyFMJr5W5Xjio8yCl4jR66EZ82rEJlAKI4PpOkJ3FX5TRMP5srmRA/3exW6N/kxL6ZWxHm4FBxb9VyNci8QtY1+4EY9TeRKVYUi2vKVVLx438Uc4hP0tIZdOjt5fwjcWCe/aiSuWH5WT9cHRyDZ/Bp+K3vhWZDevWLerehq6/MRnu4HmSLeWsZxgnuRmwvZXqTGp9+Qbfk3XPVJw2sF6ToQ==
X-YMail-OSG: IzEy6PcVM1luE3CmoNjo2dzoYSUeHSsv1QDQsbVqnFoVnfXNE5mwB4CGhTIJkPZ
 Xi.t0Cxiv02KEdqBEf1tSMe1MWSKuQagTFOZ.WPxdK5LOq813ujEBTLPhTOCdKYsOTdScfS4CmWR
 VjcxwF9IRGI_PfMaqvNdWd7wJpfbUEqNU4Z0vzHyHATIBBf5Y1AjLfCSS5HBCrYuWOWzbjZebuK0
 Es.pyiz.g2Cfa58O65S3slxeVg1LPz3UT.jzniCLwrpfyqd79v3dLkO24NkAEL_RrNS82KLE3DyY
 xq4z9TweomT7BMMP37fyRiRl1p0nV1q_rsGQ.cxuS5FioQYXwAdNbvgDp9jG2Vvbb9WdX52cWNqE
 KHLsta_DojwIZurmMEM.9iRZjiwHLzFQ5E5StC6negz5ASsQCSLGblit1Nw4X07q_VG16e8GLmhe
 G3zL52x_BKNLJhGr6eJbnhlwrAtQguCydotQs9RexXIRSbA_m7Sy5bB9msNw3TdGI_m5ym1sFCzh
 5.DcvSeN1gwac7fBJcg6VInffI.gOsrMNFWoZqUeuxigy6PK_GNmlfxXsDvwqqexEZjz5M_8ZqZQ
 oufh2ZaXxhY79z5CxvpnXGoIKcz7MzhIIJuOKBD6F.bfDvplRaCXEP9.GwFIqXC7KgLk2wJxKYZ9
 CpuRlCpl_ByR.t2Fo02I6Aysh5yZwl.1CAXbVvup8V_gCq1Kgb8Tupgn.KOhldlTfF7r93cTw.ig
 Bi09aRyC0KHrlN5Edq9uPRh40OXONYIXLgBAk3KdTwtXA6Seo4_3Rqj1HDNMcAWtNHCqqIRoH7jc
 u1ZQ354SjCL1xdEqOSE3k.7AhkR9xZASFhs2JK1kTv_n6OdIiXULJb0MU8dLaO6gIzmc86T4km1o
 roy5CxkBcELLp0UH4GYldlK0.wEY_J3IcKPWUurHrpg3pzrC_ArcLvWsk0Db5WfgILqQDCKkIj8C
 i3SuoFMgyxb.vgU7Ch5lRaHfd5IUFhTBELDrkW6X5I4Xbt4uMq6euYQH48sskEcw4Gh2WVjrYTt4
 k2YSIkv72QKqICHxU4kHNaj4TJFG4OeqK6PiH9zXKOCNj7E8en1PvEiJ4lZEsL_B6TBBG03o_AIe
 z3OiKyeDjwgZexR7mgrV8VOjG.FSpV1OYhBN1.wfEs_FvODeGjoea1QEPAUcE5sQ3XpHs9jZmtjc
 n2ij7m2gl1T09lF04xHqRS0sKUQYuZXJ2XljxVIM.MXUwCYHKh32Nf6A2N.TWmOigZybm3TKDmlR
 wH4Ds_1O8F96Un70dSkwBtogt3aqAAvneEj36SibMb1Mzs5mRsDKXA_n7GAbt_GqvG4DgvDBMn4i
 AZk2sahZCRixE954mg7uH7Ldj3.Izvc2bZGCbOWL1XErUyF.bZXT9fekDRgtajyaZxfBnsV4Z4Bv
 DLDkrSkPcQ3Nav8XwpiM6PbUCSZBfH1H_UTUIKdkHNNXTAvazK6zxQkP3DidLpQhfSPGqFKF.88N
 GVc5A_Q1ud7vy9G82KXXuW6h1ptJpXm7SXsMhbmq70S4yezB.9yH2_suh_5vzlN_btnBOY.s3mqY
 By18aw0xxn0v_vxBVo_R6ZguVRRzNodouz9G6eYsyI_GrPTo7NQnKSAehJ4iFqp_Xt6M3YNRD4c_
 ydhED2FJ3XUkC2Le2EkMlUaQ0SVSv0U5RaXElcB_HOEUA4IAkpF.r93oGvJ.3mx6seZt_g1NR2Qd
 TdKbw8ssvVXLi8b344A8nLDrHSrOOhNBhs.oqgrHHUPiMWAC6vlWTrYWTD5_HG_g2uUx.kxEHjcb
 wU0sgFKsxpuFJkMJpxCGnk7yeiJKnCukQWNERFM2RVXjsmH0BpCMcGhJcSHdjsiVJ.OOB_nRAFZ0
 n4mmH9KXBPNWBabu5hiTN8.eYEhBcdldQQaXXeIngSGApQ33jnwXWrvqZ_BvubQjieDkWfztabzN
 lkopdPzKE6ytMq8HZFeJ1O.sSebtaZp5BmStmHBxk7lUbJjRg7.Q7JLFIqVwhO5WF5l4nGHTGKwB
 EX42l6nHIUKXHjNUzQy981w7nxMl287Da1fZyqTcd7.ydyGT1nwepKi2iCAs40TTFCbPjW7OYYk5
 81oUhFULcwGvVt537tDOAuwtdJmtaa.gXI3I3SNnCVqr.nNOe0GiX035OfATQcbu5ssRh0512LID
 42GWHi.QNaQ3dO31FVfX_Et_9mG3G5uiODjXx1n1N4UqDlqNsbJFhhql8WwL8NmAYMOYLprlSVwb
 K_AX32SekIfNL4Smm_Ox.
X-Sonic-MF: <brchuckz@aim.com>
Message-ID: <59471dea-c379-59a3-9202-384a4ec54a07@netscape.net>
Date: Thu, 31 Mar 2022 00:34:14 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [XEN PATCH] tools/libs/light/libxl_pci.c: explicitly grant access
 to Intel IGD opregion
Content-Language: en-US
To: Jason Andryuk <jandryuk@gmail.com>, Jan Beulich <jbeulich@suse.com>
Cc: Wei Liu <wl@xen.org>, Anthony PERARD <anthony.perard@citrix.com>,
 Juergen Gross <jgross@suse.com>, xen-devel <xen-devel@lists.xenproject.org>
References: <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz.ref@netscape.net>
 <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz@netscape.net>
 <78ce5809-8df4-c94e-4313-fffb1b86b771@suse.com>
 <CAKf6xpsN+uJ=AyxtrnOrQrynFL=dwC=DdT7DHnK=wx9UFtdUDQ@mail.gmail.com>
From: Chuck Zmudzinski <brchuckz@netscape.net>
In-Reply-To: <CAKf6xpsN+uJ=AyxtrnOrQrynFL=dwC=DdT7DHnK=wx9UFtdUDQ@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Mailer: WebService/1.1.20001 mail.backend.jedi.jws.acl:role.jedi.acl.token.atz.jws.hermes.aol
Content-Length: 3672

On 3/30/22 2:45 PM, Jason Andryuk wrote:
> On Fri, Mar 18, 2022 at 4:13 AM Jan Beulich <jbeulich@suse.com> wrote:
>> On 14.03.2022 04:41, Chuck Zmudzinski wrote:
>>> When gfx_passthru is enabled for the Intel IGD, hvmloader maps the IGD
>>> opregion to the guest but libxl does not grant the guest permission to
>>> access the mapped memory region. This results in a crash of the i915.ko
>>> kernel module in a Linux HVM guest when it needs to access the IGD
>>> opregion:
>>>
>>> Oct 23 11:36:33 domU kernel: Call Trace:
>>> Oct 23 11:36:33 domU kernel:  ? idr_alloc+0x39/0x70
>>> Oct 23 11:36:33 domU kernel:  drm_get_last_vbltimestamp+0xaa/0xc0 [drm]
>>> Oct 23 11:36:33 domU kernel:  drm_reset_vblank_timestamp+0x5b/0xd0 [drm]
>>> Oct 23 11:36:33 domU kernel:  drm_crtc_vblank_on+0x7b/0x130 [drm]
>>> Oct 23 11:36:33 domU kernel:  intel_modeset_setup_hw_state+0xbd4/0x1900 [i915]
>>> Oct 23 11:36:33 domU kernel:  ? _cond_resched+0x16/0x40
>>> Oct 23 11:36:33 domU kernel:  ? ww_mutex_lock+0x15/0x80
>>> Oct 23 11:36:33 domU kernel:  intel_modeset_init_nogem+0x867/0x1d30 [i915]
>>> Oct 23 11:36:33 domU kernel:  ? gen6_write32+0x4b/0x1c0 [i915]
>>> Oct 23 11:36:33 domU kernel:  ? intel_irq_postinstall+0xb9/0x670 [i915]
>>> Oct 23 11:36:33 domU kernel:  i915_driver_probe+0x5c2/0xc90 [i915]
>>> Oct 23 11:36:33 domU kernel:  ? vga_switcheroo_client_probe_defer+0x1f/0x40
>>> Oct 23 11:36:33 domU kernel:  ? i915_pci_probe+0x3f/0x150 [i915]
>>> Oct 23 11:36:33 domU kernel:  local_pci_probe+0x42/0x80
>>> Oct 23 11:36:33 domU kernel:  ? _cond_resched+0x16/0x40
>>> Oct 23 11:36:33 domU kernel:  pci_device_probe+0xfd/0x1b0
>>> Oct 23 11:36:33 domU kernel:  really_probe+0x222/0x480
>>> Oct 23 11:36:33 domU kernel:  driver_probe_device+0xe1/0x150
>>> Oct 23 11:36:33 domU kernel:  device_driver_attach+0xa1/0xb0
>>> Oct 23 11:36:33 domU kernel:  __driver_attach+0x8a/0x150
>>> Oct 23 11:36:33 domU kernel:  ? device_driver_attach+0xb0/0xb0
>>> Oct 23 11:36:33 domU kernel:  ? device_driver_attach+0xb0/0xb0
>>> Oct 23 11:36:33 domU kernel:  bus_for_each_dev+0x78/0xc0
>>> Oct 23 11:36:33 domU kernel:  bus_add_driver+0x12b/0x1e0
>>> Oct 23 11:36:33 domU kernel:  driver_register+0x8b/0xe0
>>> Oct 23 11:36:33 domU kernel:  ? 0xffffffffc06b8000
>>> Oct 23 11:36:33 domU kernel:  i915_init+0x5d/0x70 [i915]
>>> Oct 23 11:36:33 domU kernel:  do_one_initcall+0x44/0x1d0
>>> Oct 23 11:36:33 domU kernel:  ? do_init_module+0x23/0x260
>>> Oct 23 11:36:33 domU kernel:  ? kmem_cache_alloc_trace+0xf5/0x200
>>> Oct 23 11:36:33 domU kernel:  do_init_module+0x5c/0x260
>>> Oct 23 11:36:33 domU kernel:  __do_sys_finit_module+0xb1/0x110
>>> Oct 23 11:36:33 domU kernel:  do_syscall_64+0x33/0x80
>>> Oct 23 11:36:33 domU kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9
>> The call trace alone leaves open where exactly the crash occurred.
>> Looking at 5.17 I notice that the first thing the driver does
>> after mapping the range it to check the signature (both in
>> intel_opregion_setup()). As the signature can't possibly match
>> with no access granted to the underlying mappings, there shouldn't
>> be any further attempts to use the region in the driver; if there
>> are, I'd view this as a driver bug.
> Yes.  i915_driver_hw_probe does not check the return value of
> intel_opregion_setup(dev_priv) and just continues on.
>
> Chuck, the attached patch may help if you want to test it.
>
> Regards,
> Jason

Thanks for the patch, I will try it when I get a chance
and report if it prevents the crash and enables video
output to my screen. Has your patch been committed
to Linux? I just checked on the gitlab Linux master
branch and didn't see it there.

Regards,

Chuck


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 06:14:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 06:14:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296653.505016 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZo4V-0007iY-UQ; Thu, 31 Mar 2022 06:14:15 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296653.505016; Thu, 31 Mar 2022 06:14:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZo4V-0007iR-RK; Thu, 31 Mar 2022 06:14:15 +0000
Received: by outflank-mailman (input) for mailman id 296653;
 Thu, 31 Mar 2022 06:14:14 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+Yrn=UK=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nZo4T-0007iL-L5
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 06:14:14 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04on062e.outbound.protection.outlook.com
 [2a01:111:f400:fe0d::62e])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c75a1a69-b0b9-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 08:14:11 +0200 (CEST)
Received: from AS9PR04CA0082.eurprd04.prod.outlook.com (2603:10a6:20b:48b::6)
 by AM0PR08MB5364.eurprd08.prod.outlook.com (2603:10a6:208:186::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.19; Thu, 31 Mar
 2022 06:14:08 +0000
Received: from AM5EUR03FT054.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:48b:cafe::c6) by AS9PR04CA0082.outlook.office365.com
 (2603:10a6:20b:48b::6) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.22 via Frontend
 Transport; Thu, 31 Mar 2022 06:14:08 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 AM5EUR03FT054.mail.protection.outlook.com (10.152.16.212) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5123.19 via Frontend Transport; Thu, 31 Mar 2022 06:14:08 +0000
Received: ("Tessian outbound facaf1373bbd:v118");
 Thu, 31 Mar 2022 06:14:07 +0000
Received: from f877e869a4ec.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 C63A24B4-FB6D-47D7-922F-21C162B7213D.1; 
 Thu, 31 Mar 2022 06:14:00 +0000
Received: from EUR02-AM5-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id f877e869a4ec.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 31 Mar 2022 06:14:00 +0000
Received: from DU2PR08MB7325.eurprd08.prod.outlook.com (2603:10a6:10:2e4::7)
 by DB6PR08MB2920.eurprd08.prod.outlook.com (2603:10a6:6:1f::18) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.22; Thu, 31 Mar
 2022 06:13:55 +0000
Received: from DU2PR08MB7325.eurprd08.prod.outlook.com
 ([fe80::28c0:3e8d:dd75:80be]) by DU2PR08MB7325.eurprd08.prod.outlook.com
 ([fe80::28c0:3e8d:dd75:80be%8]) with mapi id 15.20.5102.023; Thu, 31 Mar 2022
 06:13:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c75a1a69-b0b9-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=xOsyVRQIdqPfwogpo/fF7R9xsusCta5i/9GJyxzkdzc=;
 b=NEc8pxTzl71OU/tviRqQhYq7LN1jH6rlTTaXPIYQ1SJPH70gmL4iUSxDQvGdX28LTFNUFJhB9KQiHQ+uX7rAqh0J54udzFRvDGP+56LANcTNs3wMHI1mXA/gDYPYPafqG2fXEJq2SXtS1k8XWFkPM1DraJuQZ4543qL/aTXZygg=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=c0uAsUiNJeKtzMOAPH/SI+3uGuBka2MQPR7Cn7kFewvCld8HtH9RjiQ+jzC1ZVP0cTg1B9XgFAqdDo21c46yyzwxJXQDXJYOi9ifa9whqV3YVCy7RRHs6wdhP+XLIyHH+Ey19AX1hkScqiEvjRofs1+xmEX2e1mMbDT4kW5H8sjNUrccmLlqS5OslOx3jQ85XuZl3+uPGsYvr3eblYN8JRo2xOXWheA0PaxwFk2HgFMZReerPfbkHhMOKaqojnjr2Lst0MWWmDRAkGkobn7vg9rqvIWCxyGrRAamZa2wflnijlBxmIbjn0WMQse6MLYq/55m7zwKnE1/MWBmidoktw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=xOsyVRQIdqPfwogpo/fF7R9xsusCta5i/9GJyxzkdzc=;
 b=a8bEJGOxVcxCePHYJ7qX3QLAxgUXuYwzU54tcFz0sCsNd074CXprH1VbzCmFsJKb10n6TTXUDpp5YCOR6Pm1WY9rLTBugSZERQ34nk8Rlf6CV+sBWw+46D6589dOL3e3ublet6qH4GRArjSbDKIl0TUcJrF0J5Vtr2SovZkhRdp45RdP54GFo7KQtVbgR66B9d5+YHFUywwdU8HPkmJjjXW2xA8NvzOxSFEjtkZLPsqBoJ93nnP8QJzaMo+LxsToz+hnZT1CjNCMFHc8ar4rBQJso34WtjVTv2r8o+dPaB+7dncdfA1roTBnR5vm10sF/viEyzmqZ4yY4AmAcoXlGA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=xOsyVRQIdqPfwogpo/fF7R9xsusCta5i/9GJyxzkdzc=;
 b=NEc8pxTzl71OU/tviRqQhYq7LN1jH6rlTTaXPIYQ1SJPH70gmL4iUSxDQvGdX28LTFNUFJhB9KQiHQ+uX7rAqh0J54udzFRvDGP+56LANcTNs3wMHI1mXA/gDYPYPafqG2fXEJq2SXtS1k8XWFkPM1DraJuQZ4543qL/aTXZygg=
From: Penny Zheng <Penny.Zheng@arm.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Wei Chen <Wei.Chen@arm.com>, Henry Wang <Henry.Wang@arm.com>, Andrew
 Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
	Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
Subject: RE: [PATCH v1 3/5] xen/arm: unpopulate memory when domain on static
 allocation
Thread-Topic: [PATCH v1 3/5] xen/arm: unpopulate memory when domain on static
 allocation
Thread-Index: AQHYRBnkeXnYvoANH0WdfY8GUNrlN6zXr5KAgAEgZ0A=
Date: Thu, 31 Mar 2022 06:13:54 +0000
Message-ID:
 <DU2PR08MB73251B78F8EB19E334A70876F7E19@DU2PR08MB7325.eurprd08.prod.outlook.com>
References: <20220330093617.3870589-1-Penny.Zheng@arm.com>
 <20220330093617.3870589-4-Penny.Zheng@arm.com>
 <31c1ae2d-a4d6-5445-e819-5df5a0984cdd@suse.com>
In-Reply-To: <31c1ae2d-a4d6-5445-e819-5df5a0984cdd@suse.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 5171FFAE1870274B9DD2C89C2D7D2D48.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: cc4a3950-2428-438a-b734-08da12ddaa65
x-ms-traffictypediagnostic:
	DB6PR08MB2920:EE_|AM5EUR03FT054:EE_|AM0PR08MB5364:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR08MB5364A9686C3F31BF34E28442F7E19@AM0PR08MB5364.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR08MB7325.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(316002)(53546011)(6916009)(76116006)(4326008)(64756008)(66946007)(55016003)(45080400002)(66446008)(33656002)(66476007)(2906002)(86362001)(54906003)(7696005)(38070700005)(6506007)(8676002)(186003)(66556008)(122000001)(5660300002)(83380400001)(71200400001)(8936002)(26005)(9686003)(38100700002)(52536014)(508600001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR08MB2920
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 AM5EUR03FT054.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	8b427c0a-a2be-47c7-c77b-08da12dda297
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(356005)(5660300002)(81166007)(8936002)(82310400004)(54906003)(52536014)(9686003)(316002)(186003)(40460700003)(26005)(336012)(508600001)(45080400002)(7696005)(47076005)(4326008)(6862004)(53546011)(36860700001)(55016003)(33656002)(8676002)(83380400001)(70206006)(70586007)(2906002)(86362001)(6506007);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 06:14:08.1586
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: cc4a3950-2428-438a-b734-08da12ddaa65
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	AM5EUR03FT054.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB5364
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From xen-devel-bounces@lists.xenproject.org Thu Mar 31 06:30:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 06:30:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296659.505027 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZoKU-0001g5-Gw; Thu, 31 Mar 2022 06:30:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296659.505027; Thu, 31 Mar 2022 06:30:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZoKU-0001fy-DP; Thu, 31 Mar 2022 06:30:46 +0000
Received: by outflank-mailman (input) for mailman id 296659;
 Thu, 31 Mar 2022 06:30:44 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZoKS-0001fo-Jn; Thu, 31 Mar 2022 06:30:44 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZoKS-0006oW-DU; Thu, 31 Mar 2022 06:30:44 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZoKS-0005MB-2K; Thu, 31 Mar 2022 06:30:44 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZoKS-0007h1-1e; Thu, 31 Mar 2022 06:30:44 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Message-Id:Subject:To;
	bh=ykyb+/NjnaP4Du2H8NeTZVz4ik5yib3+9h2DNgbgNQI=; b=dvYLWWTfLyw1CFeXlaeu/4e1e3
	d7cW6I1wOiAuJO3F9Y0r7EHOJvUL+FR+gSDtwsqPno1uypMe6MJ5WDTe4QNMVCJGj191SCt7Nteel
	FqMMp9wQdYmOTwKSNL+JPYxlH6uQEg9EdonyJWivRyDJiHWeAt7zmZ6H/E5AiqjdMoVo=;
To: xen-devel@lists.xenproject.org
Subject: [xen-4.14-testing bisection] complete test-amd64-amd64-livepatch
Message-Id: <E1nZoKS-0007h1-1e@osstest.test-lab.xenproject.org>
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 31 Mar 2022 06:30:44 +0000

branch xen-4.14-testing
xenbranch xen-4.14-testing
job test-amd64-amd64-livepatch
testid livepatch-run

Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: ovmf git://xenbits.xen.org/osstest/ovmf.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: seabios git://xenbits.xen.org/osstest/seabios.git
Tree: xen git://xenbits.xen.org/xen.git

*** Found and reproduced problem changeset ***

  Bug is in tree:  xen git://xenbits.xen.org/xen.git
  Bug introduced:  72a75b9c2ce36ed573a2eb201ac63ca22bedb889
  Bug not present: 6db64187700d6d1ce23f49e667c24f1c7ebe11f8
  Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/169060/


  commit 72a75b9c2ce36ed573a2eb201ac63ca22bedb889
  Author: Bjoern Doebel <doebel@amazon.de>
  Date:   Thu Mar 10 07:35:36 2022 +0000
  
      xen/x86: Livepatch: support patching CET-enhanced functions
      
      Xen enabled CET for supporting architectures. The control flow aspect of
      CET require functions that can be called indirectly (i.e., via function
      pointers) to start with an ENDBR64 instruction. Otherwise a control flow
      exception is raised.
      
      This expectation breaks livepatching flows because we patch functions by
      overwriting their first 5 bytes with a JMP + <offset>, thus breaking the
      ENDBR64. We fix this by checking the start of a patched function for
      being ENDBR64. In the positive case we move the livepatch JMP to start
      behind the ENDBR64 instruction.
      
      To avoid having to guess the ENDBR64 offset again on patch reversal
      (which might race with other mechanisms adding/removing ENDBR
      dynamically), use the livepatch metadata to store the computed offset
      along with the saved bytes of the overwritten function.
      
      Signed-off-by: Bjoern Doebel <doebel@amazon.de>
      Acked-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
      Reviewed-by: Ross Lagerwall <ross.lagerwall@citrix.com>
      Tested-by: Jiamei Xie <jiamei.xie@arm.com>
      (cherry picked from commit 6974c75180f1aad44e5428eabf2396b2b50fb0e4)
      
      Note: For backports to 4.14 thru 4.16, there is no endbr-clobbering, hence no
            is_endbr64_poison() logic.


For bisection revision-tuple graph see:
   http://logs.test-lab.xenproject.org/osstest/results/bisect/xen-4.14-testing/test-amd64-amd64-livepatch.livepatch-run.html
Revision IDs in each graph node refer, respectively, to the Trees above.

----------------------------------------
Running cs-bisection-step --graph-out=/home/logs/results/bisect/xen-4.14-testing/test-amd64-amd64-livepatch.livepatch-run --summary-out=tmp/169060.bisection-summary --basis-template=168506 --blessings=real,real-bisect,real-retry xen-4.14-testing test-amd64-amd64-livepatch livepatch-run
Searching for failure / basis pass:
 168986 fail [host=albana1] / 168506 [host=godello0] 168493 [host=fiano1] 168061 [host=godello0] 168013 [host=fiano0] 167964 [host=pinot1] 167908 [host=huxelrebe1] 167629 [host=godello0] 167415 [host=godello0] 167216 [host=godello1] 166348 [host=godello0] 166310 ok.
Failure / basis pass flights: 168986 / 166310
(tree with no url: minios)
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: ovmf git://xenbits.xen.org/osstest/ovmf.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: seabios git://xenbits.xen.org/osstest/seabios.git
Tree: xen git://xenbits.xen.org/xen.git
Latest c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3c659044118e34603161457db9934a34f816d78b 83aebe33dc76760f911162f9e7a4b98a4929776b d239552ce7220e448ae81f41515138f7b9e3c4db 1e595d9c2b8608bcef48d6a69cc2f6135780bcc0
Basis pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 e1e7306b54147e65cb7347b060e94f336d4a82d2 3c659044118e34603161457db9934a34f816d78b d7d6a60e73ee21e82f0bac2036153ccccf996e6c 64f37cc530f144e53c190c9e8209a51b58fd5c43 9de3671772d5019dab2ba7be7ad1032ad3c9e0f2
Generating revisions with ./adhoc-revtuple-generator  git://xenbits.xen.org/linux-pvops.git#c3038e718a19fc596f7b1baba0f83d5146dc7784-c3038e718a19fc596f7b1baba0f83d5146dc7784 git://xenbits.xen.org/osstest/linux-firmware.git#c530a75c1e6a472b0eb9558310b518f0dfcd8860-c530a75c1e6a472b0eb9558310b518f0dfcd8860 git://xenbits.xen.org/osstest/ovmf.git#e1e7306b54147e65cb7347b060e94f336d4a82d2-b1b89f9009f2390652e0061bd7b24fc40732bc70 git://xenbits.xen.org/qemu-xen-traditional.git#3c659044118e34603161457db99\
 34a34f816d78b-3c659044118e34603161457db9934a34f816d78b git://xenbits.xen.org/qemu-xen.git#d7d6a60e73ee21e82f0bac2036153ccccf996e6c-83aebe33dc76760f911162f9e7a4b98a4929776b git://xenbits.xen.org/osstest/seabios.git#64f37cc530f144e53c190c9e8209a51b58fd5c43-d239552ce7220e448ae81f41515138f7b9e3c4db git://xenbits.xen.org/xen.git#9de3671772d5019dab2ba7be7ad1032ad3c9e0f2-1e595d9c2b8608bcef48d6a69cc2f6135780bcc0
Loaded 12651 nodes in revision graph
Searching for test results:
 167216 [host=godello1]
 166310 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 e1e7306b54147e65cb7347b060e94f336d4a82d2 3c659044118e34603161457db9934a34f816d78b d7d6a60e73ee21e82f0bac2036153ccccf996e6c 64f37cc530f144e53c190c9e8209a51b58fd5c43 9de3671772d5019dab2ba7be7ad1032ad3c9e0f2
 166348 [host=godello0]
 167415 [host=godello0]
 167629 [host=godello0]
 167812 []
 167822 []
 167864 []
 167908 [host=huxelrebe1]
 167964 [host=pinot1]
 168013 [host=fiano0]
 168061 [host=godello0]
 168493 [host=fiano1]
 168506 [host=godello0]
 168862 fail c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3c659044118e34603161457db9934a34f816d78b 83aebe33dc76760f911162f9e7a4b98a4929776b d239552ce7220e448ae81f41515138f7b9e3c4db 10b09aa2541de4c3c49b9343e9bc04e19f0ae4f8
 168986 fail c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3c659044118e34603161457db9934a34f816d78b 83aebe33dc76760f911162f9e7a4b98a4929776b d239552ce7220e448ae81f41515138f7b9e3c4db 1e595d9c2b8608bcef48d6a69cc2f6135780bcc0
 169026 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 e1e7306b54147e65cb7347b060e94f336d4a82d2 3c659044118e34603161457db9934a34f816d78b d7d6a60e73ee21e82f0bac2036153ccccf996e6c 64f37cc530f144e53c190c9e8209a51b58fd5c43 9de3671772d5019dab2ba7be7ad1032ad3c9e0f2
 169027 fail c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3c659044118e34603161457db9934a34f816d78b 83aebe33dc76760f911162f9e7a4b98a4929776b d239552ce7220e448ae81f41515138f7b9e3c4db 1e595d9c2b8608bcef48d6a69cc2f6135780bcc0
 169030 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b47575801e1903e8b316d01840572ce2681cf2c6 3c659044118e34603161457db9934a34f816d78b d7d6a60e73ee21e82f0bac2036153ccccf996e6c 2dd4b9b3f84019668719344b40dba79d681be41c cbadf67bcab4e29c883410db393f4f5ef34df04a
 169032 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 8cc5590eab974ab34e2bfa1c9d6a7ef94c70ffae 3c659044118e34603161457db9934a34f816d78b d7d6a60e73ee21e82f0bac2036153ccccf996e6c 4eff93e7b0d093fd9347f2d533dada49854290fe 689734d05d5ec6b52b9e84807806471141088d84
 169034 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 c09dbc92e9142ad46b3f73ac0eb5cc283cb81baf 3c659044118e34603161457db9934a34f816d78b d7d6a60e73ee21e82f0bac2036153ccccf996e6c 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd f2eaa786062970eee41df1ffba1475f4ab36c234
 169037 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3c659044118e34603161457db9934a34f816d78b d7d6a60e73ee21e82f0bac2036153ccccf996e6c 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 496fb0be938a30971af05ffe0e58bb65643a0971
 169039 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3c659044118e34603161457db9934a34f816d78b 83aebe33dc76760f911162f9e7a4b98a4929776b d239552ce7220e448ae81f41515138f7b9e3c4db 334120359d575b35ceeb261a1c854749e440217d
 169043 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3c659044118e34603161457db9934a34f816d78b 83aebe33dc76760f911162f9e7a4b98a4929776b d239552ce7220e448ae81f41515138f7b9e3c4db e56827aa689e57d485fe3b40c71c0061ce1ded3e
 169045 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3c659044118e34603161457db9934a34f816d78b 83aebe33dc76760f911162f9e7a4b98a4929776b d239552ce7220e448ae81f41515138f7b9e3c4db 37e594c58ff43aa2d65f49bfde106ecaffbbeeac
 169050 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3c659044118e34603161457db9934a34f816d78b 83aebe33dc76760f911162f9e7a4b98a4929776b d239552ce7220e448ae81f41515138f7b9e3c4db 6db64187700d6d1ce23f49e667c24f1c7ebe11f8
 169053 fail c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3c659044118e34603161457db9934a34f816d78b 83aebe33dc76760f911162f9e7a4b98a4929776b d239552ce7220e448ae81f41515138f7b9e3c4db 72a75b9c2ce36ed573a2eb201ac63ca22bedb889
 169056 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3c659044118e34603161457db9934a34f816d78b 83aebe33dc76760f911162f9e7a4b98a4929776b d239552ce7220e448ae81f41515138f7b9e3c4db 6db64187700d6d1ce23f49e667c24f1c7ebe11f8
 169057 fail c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3c659044118e34603161457db9934a34f816d78b 83aebe33dc76760f911162f9e7a4b98a4929776b d239552ce7220e448ae81f41515138f7b9e3c4db 72a75b9c2ce36ed573a2eb201ac63ca22bedb889
 169059 pass c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3c659044118e34603161457db9934a34f816d78b 83aebe33dc76760f911162f9e7a4b98a4929776b d239552ce7220e448ae81f41515138f7b9e3c4db 6db64187700d6d1ce23f49e667c24f1c7ebe11f8
 169060 fail c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3c659044118e34603161457db9934a34f816d78b 83aebe33dc76760f911162f9e7a4b98a4929776b d239552ce7220e448ae81f41515138f7b9e3c4db 72a75b9c2ce36ed573a2eb201ac63ca22bedb889
Searching for interesting versions
 Result found: flight 166310 (pass), for basis pass
 For basis failure, parent search stopping at c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3c659044118e34603161457db9934a34f816d78b 83aebe33dc76760f911162f9e7a4b98a4929776b d239552ce7220e448ae81f41515138f7b9e3c4db 6db64187700d6d1ce23f49e667c24f1c7ebe11f8, results HASH(0x555db9aa7460) HASH(0x555db9a743a0) HASH(0x555db9a6ba58) For basis failure, parent search stopping at c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1\
 e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3c659044118e34603161457db9934a34f816d78b 83aebe33dc76760f911162f9e7a4b98a4929776b d239552ce7220e448ae81f41515138f7b9e3c4db 37e594c58ff43aa2d65f49bfde106ecaffbbeeac, results HASH(0x555db9aa3450) For basis failure, parent search stopping at c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3c659044118e34603161457db9934a34f816d78b 83aebe33dc76760f911162f9\
 e7a4b98a4929776b d239552ce7220e448ae81f41515138f7b9e3c4db e56827aa689e57d485fe3b40c71c0061ce1ded3e, results HASH(0x555db9aa0220) For basis failure, parent search stopping at c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3c659044118e34603161457db9934a34f816d78b 83aebe33dc76760f911162f9e7a4b98a4929776b d239552ce7220e448ae81f41515138f7b9e3c4db 334120359d575b35ceeb261a1c854749e440217d, results HASH(0x555db9a90f98) For basis\
  failure, parent search stopping at c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3c659044118e34603161457db9934a34f816d78b d7d6a60e73ee21e82f0bac2036153ccccf996e6c 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd 496fb0be938a30971af05ffe0e58bb65643a0971, results HASH(0x555db9a81020) For basis failure, parent search stopping at c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 c09dbc92e9142ad46b3f\
 73ac0eb5cc283cb81baf 3c659044118e34603161457db9934a34f816d78b d7d6a60e73ee21e82f0bac2036153ccccf996e6c 829b0f1a7cda1bccdf44a379fb3a96e519a7e8cd f2eaa786062970eee41df1ffba1475f4ab36c234, results HASH(0x555db9a941c8) For basis failure, parent search stopping at c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 8cc5590eab974ab34e2bfa1c9d6a7ef94c70ffae 3c659044118e34603161457db9934a34f816d78b d7d6a60e73ee21e82f0bac2036153ccccf996e6c 4eff93e7b0d093fd9347f2d533dada49854\
 290fe 689734d05d5ec6b52b9e84807806471141088d84, results HASH(0x555db9a769d0) For basis failure, parent search stopping at c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b47575801e1903e8b316d01840572ce2681cf2c6 3c659044118e34603161457db9934a34f816d78b d7d6a60e73ee21e82f0bac2036153ccccf996e6c 2dd4b9b3f84019668719344b40dba79d681be41c cbadf67bcab4e29c883410db393f4f5ef34df04a, results HASH(0x555db9a78fd8) For basis failure, parent search stopping at c3038e718a19fc59\
 6f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 e1e7306b54147e65cb7347b060e94f336d4a82d2 3c659044118e34603161457db9934a34f816d78b d7d6a60e73ee21e82f0bac2036153ccccf996e6c 64f37cc530f144e53c190c9e8209a51b58fd5c43 9de3671772d5019dab2ba7be7ad1032ad3c9e0f2, results HASH(0x555db9a70990) HASH(0x555db9a70690) Result found: flight 168862 (fail), for basis failure (at ancestor ~800)
 Repro found: flight 169026 (pass), for basis pass
 Repro found: flight 169027 (fail), for basis failure
 0 revisions at c3038e718a19fc596f7b1baba0f83d5146dc7784 c530a75c1e6a472b0eb9558310b518f0dfcd8860 b1b89f9009f2390652e0061bd7b24fc40732bc70 3c659044118e34603161457db9934a34f816d78b 83aebe33dc76760f911162f9e7a4b98a4929776b d239552ce7220e448ae81f41515138f7b9e3c4db 6db64187700d6d1ce23f49e667c24f1c7ebe11f8
No revisions left to test, checking graph state.
 Result found: flight 169050 (pass), for last pass
 Result found: flight 169053 (fail), for first failure
 Repro found: flight 169056 (pass), for last pass
 Repro found: flight 169057 (fail), for first failure
 Repro found: flight 169059 (pass), for last pass
 Repro found: flight 169060 (fail), for first failure

*** Found and reproduced problem changeset ***

  Bug is in tree:  xen git://xenbits.xen.org/xen.git
  Bug introduced:  72a75b9c2ce36ed573a2eb201ac63ca22bedb889
  Bug not present: 6db64187700d6d1ce23f49e667c24f1c7ebe11f8
  Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/169060/


  commit 72a75b9c2ce36ed573a2eb201ac63ca22bedb889
  Author: Bjoern Doebel <doebel@amazon.de>
  Date:   Thu Mar 10 07:35:36 2022 +0000
  
      xen/x86: Livepatch: support patching CET-enhanced functions
      
      Xen enabled CET for supporting architectures. The control flow aspect of
      CET require functions that can be called indirectly (i.e., via function
      pointers) to start with an ENDBR64 instruction. Otherwise a control flow
      exception is raised.
      
      This expectation breaks livepatching flows because we patch functions by
      overwriting their first 5 bytes with a JMP + <offset>, thus breaking the
      ENDBR64. We fix this by checking the start of a patched function for
      being ENDBR64. In the positive case we move the livepatch JMP to start
      behind the ENDBR64 instruction.
      
      To avoid having to guess the ENDBR64 offset again on patch reversal
      (which might race with other mechanisms adding/removing ENDBR
      dynamically), use the livepatch metadata to store the computed offset
      along with the saved bytes of the overwritten function.
      
      Signed-off-by: Bjoern Doebel <doebel@amazon.de>
      Acked-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
      Reviewed-by: Ross Lagerwall <ross.lagerwall@citrix.com>
      Tested-by: Jiamei Xie <jiamei.xie@arm.com>
      (cherry picked from commit 6974c75180f1aad44e5428eabf2396b2b50fb0e4)
      
      Note: For backports to 4.14 thru 4.16, there is no endbr-clobbering, hence no
            is_endbr64_poison() logic.

pnmtopng: 123 colors found
Revision graph left in /home/logs/results/bisect/xen-4.14-testing/test-amd64-amd64-livepatch.livepatch-run.{dot,ps,png,html,svg}.
----------------------------------------
169060: tolerable ALL FAIL

flight 169060 xen-4.14-testing real-bisect [real]
http://logs.test-lab.xenproject.org/osstest/logs/169060/

Failures :-/ but no regressions.

Tests which did not succeed,
including tests which could not be run:
 test-amd64-amd64-livepatch   13 livepatch-run           fail baseline untested


jobs:
 test-amd64-amd64-livepatch                                   fail    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 06:41:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 06:41:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296668.505041 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZoUl-0003Aq-GJ; Thu, 31 Mar 2022 06:41:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296668.505041; Thu, 31 Mar 2022 06:41:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZoUl-0003Aj-DA; Thu, 31 Mar 2022 06:41:23 +0000
Received: by outflank-mailman (input) for mailman id 296668;
 Thu, 31 Mar 2022 06:41:22 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=8eLM=UK=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nZoUk-0003Ad-8o
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 06:41:22 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 9328ca12-b0bd-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 08:41:20 +0200 (CEST)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 32C2D1F869;
 Thu, 31 Mar 2022 06:41:20 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 1B33B13B4C;
 Thu, 31 Mar 2022 06:41:20 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id gDbvBBBNRWLESwAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 31 Mar 2022 06:41:20 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9328ca12-b0bd-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648708880; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=Q8vmQjSEtK9ARIdU7u1ijSRNMyJLYDkCAZuZG8rlBZw=;
	b=C6pe7EO3ptpY+jw/55LZ9IHTqB63NnbswczrU4QwW968RlsU2YkCs8GqsjWLBicR1IniPv
	f5QREXqoJ918Dx2C6RzjTB+RjI6qktbnob75ut3sgvDi70t+Z82JAAkCPmsomPMmeFg0MR
	/cpTVQCg2C6o2MX6uSkMlMvEfKe2+6k=
Message-ID: <2684376b-3ae6-a2b7-581f-2bd38ab6056b@suse.com>
Date: Thu, 31 Mar 2022 08:41:19 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?=
 <marmarek@invisiblethingslab.com>, xen-devel <xen-devel@lists.xenproject.org>
References: <YkUlLvnEDdc5hwN4@mail-itl>
From: Juergen Gross <jgross@suse.com>
Subject: Re: Increasing domain memory beyond initial maxmem
In-Reply-To: <YkUlLvnEDdc5hwN4@mail-itl>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------aHA9xQwN0otxJl5QNoo0XV3U"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------aHA9xQwN0otxJl5QNoo0XV3U
Content-Type: multipart/mixed; boundary="------------gy19HGlLc9rvtXgs52qRXoQb";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?=
 <marmarek@invisiblethingslab.com>, xen-devel <xen-devel@lists.xenproject.org>
Message-ID: <2684376b-3ae6-a2b7-581f-2bd38ab6056b@suse.com>
Subject: Re: Increasing domain memory beyond initial maxmem
References: <YkUlLvnEDdc5hwN4@mail-itl>
In-Reply-To: <YkUlLvnEDdc5hwN4@mail-itl>

--------------gy19HGlLc9rvtXgs52qRXoQb
Content-Type: multipart/mixed; boundary="------------z8UzPm1Weuz5SGSRPh900TvA"

--------------z8UzPm1Weuz5SGSRPh900TvA
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------z8UzPm1Weuz5SGSRPh900TvA
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----

xsBNBFOMcBYBCACgGjqjoGvbEouQZw/ToiBg9W98AlM2QHV+iNHsEs7kxWhKMjri
oyspZKOBycWxw3ie3j9uvg9EOB3aN4xiTv4qbnGiTr3oJhkB1gsb6ToJQZ8uxGq2
kaV2KL9650I1SJvedYm8Of8Zd621lSmoKOwlNClALZNew72NjJLEzTalU1OdT7/i
1TXkH09XSSI8mEQ/ouNcMvIJNwQpd369y9bfIhWUiVXEK7MlRgUG6MvIj6Y3Am/B
BLUVbDa4+gmzDC9ezlZkTZG2t14zWPvxXP3FAp2pkW0xqG7/377qptDmrk42GlSK
N4z76ELnLxussxc7I2hx18NUcbP8+uty4bMxABEBAAHNHEp1ZXJnZW4gR3Jvc3Mg
PGpnQHBmdXBmLm5ldD7CwHkEEwECACMFAlOMcBYCGwMHCwkIBwMCAQYVCAIJCgsE
FgIDAQIeAQIXgAAKCRCw3p3WKL8TL0KdB/93FcIZ3GCNwFU0u3EjNbNjmXBKDY4F
UGNQH2lvWAUy+dnyThpwdtF/jQ6j9RwE8VP0+NXcYpGJDWlNb9/JmYqLiX2Q3Tye
vpB0CA3dbBQp0OW0fgCetToGIQrg0MbD1C/sEOv8Mr4NAfbauXjZlvTj30H2jO0u
+6WGM6nHwbh2l5O8ZiHkH32iaSTfN7Eu5RnNVUJbvoPHZ8SlM4KWm8rG+lIkGurq
qu5gu8q8ZMKdsdGC4bBxdQKDKHEFExLJK/nRPFmAuGlId1E3fe10v5QL+qHI3EIP
tyfE7i9Hz6rVwi7lWKgh7pe0ZvatAudZ+JNIlBKptb64FaiIOAWDCx1SzR9KdWVy
Z2VuIEdyb3NzIDxqZ3Jvc3NAc3VzZS5jb20+wsB5BBMBAgAjBQJTjHCvAhsDBwsJ
CAcDAgEGFQgCCQoLBBYCAwECHgECF4AACgkQsN6d1ii/Ey/HmQf/RtI7kv5A2PS4
RF7HoZhPVPogNVbC4YA6lW7DrWf0teC0RR3MzXfy6pJ+7KLgkqMlrAbN/8Dvjoz7
8X+5vhH/rDLa9BuZQlhFmvcGtCF8eR0T1v0nC/nuAFVGy+67q2DH8As3KPu0344T
BDpAvr2uYM4tSqxK4DURx5INz4ZZ0WNFHcqsfvlGJALDeE0LhITTd9jLzdDad1pQ
SToCnLl6SBJZjDOX9QQcyUigZFtCXFst4dlsvddrxyqT1f17+2cFSdu7+ynLmXBK
7abQ3rwJY8SbRO2iRulogc5vr/RLMMlscDAiDkaFQWLoqHHOdfO9rURssHNN8WkM
nQfvUewRz80hSnVlcmdlbiBHcm9zcyA8amdyb3NzQG5vdmVsbC5jb20+wsB5BBMB
AgAjBQJTjHDXAhsDBwsJCAcDAgEGFQgCCQoLBBYCAwECHgECF4AACgkQsN6d1ii/
Ey8PUQf/ehmgCI9jB9hlgexLvgOtf7PJnFOXgMLdBQgBlVPO3/D9R8LtF9DBAFPN
hlrsfIG/SqICoRCqUcJ96Pn3P7UUinFG/I0ECGF4EvTE1jnDkfJZr6jrbjgyoZHi
w/4BNwSTL9rWASyLgqlA8u1mf+c2yUwcGhgkRAd1gOwungxcwzwqgljf0N51N5Jf
VRHRtyfwq/ge+YEkDGcTU6Y0sPOuj4Dyfm8fJzdfHNQsWq3PnczLVELStJNdapwP
OoE+lotufe3AM2vAEYJ9rTz3Cki4JFUsgLkHFqGZarrPGi1eyQcXeluldO3m91NK
/1xMI3/+8jbO0tsn1tqSEUGIJi7ox80eSnVlcmdlbiBHcm9zcyA8amdyb3NzQHN1
c2UuZGU+wsB5BBMBAgAjBQJTjHDrAhsDBwsJCAcDAgEGFQgCCQoLBBYCAwECHgEC
F4AACgkQsN6d1ii/Ey+LhQf9GL45eU5vOowA2u5N3g3OZUEBmDHVVbqMtzwlmNC4
k9Kx39r5s2vcFl4tXqW7g9/ViXYuiDXb0RfUpZiIUW89siKrkzmQ5dM7wRqzgJpJ
wK8Bn2MIxAKArekWpiCKvBOB/Cc+3EXE78XdlxLyOi/NrmSGRIov0karw2RzMNOu
5D+jLRZQd1Sv27AR+IP3I8U4aqnhLpwhK7MEy9oCILlgZ1QZe49kpcumcZKORmzB
TNh30FVKK1EvmV2xAKDoaEOgQB4iFQLhJCdP1I5aSgM5IVFdn7v5YgEYuJYx37Io
N1EblHI//x/e2AaIHpzK5h88NEawQsaNRpNSrcfbFmAg987ATQRTjHAWAQgAyzH6
AOODMBjgfWE9VeCgsrwH3exNAU32gLq2xvjpWnHIs98ndPUDpnoxWQugJ6MpMncr
0xSwFmHEgnSEjK/PAjppgmyc57BwKII3sV4on+gDVFJR6Y8ZRwgnBC5mVM6JjQ5x
Dk8WRXljExRfUX9pNhdE5eBOZJrDRoLUmmjDtKzWaDhIg/+1Hzz93X4fCQkNVbVF
LELU9bMaLPBG/x5q4iYZ2k2ex6d47YE1ZFdMm6YBYMOljGkZKwYde5ldM9mo45mm
we0icXKLkpEdIXKTZeKDO+Hdv1aqFuAcccTg9RXDQjmwhC3yEmrmcfl0+rPghO0I
v3OOImwTEe4co3c1mwARAQABwsBfBBgBAgAJBQJTjHAWAhsMAAoJELDendYovxMv
Q/gH/1ha96vm4P/L+bQpJwrZ/dneZcmEwTbe8YFsw2V/Buv6Z4Mysln3nQK5ZadD
534CF7TDVft7fC4tU4PONxF5D+/tvgkPfDAfF77zy2AH1vJzQ1fOU8lYFpZXTXIH
b+559UqvIB8AdgR3SAJGHHt4RKA0F7f5ipYBBrC6cyXJyyoprT10EMvU8VGiwXvT
yJz3fjoYsdFzpWPlJEBRMedCot60g5dmbdrZ5DWClAr0yau47zpWj3enf1tLWaqc
suylWsviuGjKGw7KHQd3bxALOknAp4dN3QwBYCKuZ7AddY9yjynVaD5X7nF9nO5B
jR/i1DG86lem3iBDXzXsZDn8R38=3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------z8UzPm1Weuz5SGSRPh900TvA--

--------------gy19HGlLc9rvtXgs52qRXoQb--

--------------aHA9xQwN0otxJl5QNoo0XV3U
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmJFTQ8FAwAAAAAACgkQsN6d1ii/Ey+2
mAf/X3ILRtyM3UwXJsaKwPnV5yGnGMm0GuK2wyHBTAnrDlTXH/SKjR5qY8IY2uab4XlEQcapzZqg
Ya6EOq2sBxm7V9YWkpG6bEcmbzInedqP8kMivdfHdKXS5RV37dE9QIVHJx2lFNUufTxcS489ERJN
WPrVwklO5H/IisJ3CMwACVGpQ+Mx5nEI77rlw2XnPVJezmv4XnufsEwfVPcceJTwLwbjhgMNCsOf
UUNqfiDCPxKgvVK9fy2RdzoyRNV5KCsvPGd5lXxt0VnVpcQejguTfZsgu9CfVnyr4mZ2/FG4RDKr
q97ER3Q0LdIJT5WR/OewTgy7YNAdQAdy9YxzmHpdAg==
=2JXV
-----END PGP SIGNATURE-----

--------------aHA9xQwN0otxJl5QNoo0XV3U--


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 06:42:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 06:42:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296672.505051 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZoWG-0003nr-1t; Thu, 31 Mar 2022 06:42:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296672.505051; Thu, 31 Mar 2022 06:42:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZoWF-0003nk-VF; Thu, 31 Mar 2022 06:42:55 +0000
Received: by outflank-mailman (input) for mailman id 296672;
 Thu, 31 Mar 2022 06:42:54 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=TTh1=UK=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZoWE-0003ne-Ma
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 06:42:54 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ca663692-b0bd-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 08:42:53 +0200 (CEST)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur03lp2051.outbound.protection.outlook.com [104.47.9.51]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-26-v-Pk8tb_NMqobvQv_lp0eA-1; Thu, 31 Mar 2022 08:42:51 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM0PR04MB5713.eurprd04.prod.outlook.com (2603:10a6:208:125::16)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.21; Thu, 31 Mar
 2022 06:42:49 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.021; Thu, 31 Mar 2022
 06:42:49 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ca663692-b0bd-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648708973;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=NYffX1l9B47BcT8gYjV+QSbpHHpUkfstJZFWbMO/bx0=;
	b=L9mgMBcL4c8OJVV6MjMD/iRzax6QgVx3g8uIS7H2lKRJFANjt0fgMwyrSLAUy/DS18tPJr
	SAdQVQPUBudXCKrWa/9zL6kNEtWtvKgQawedVx5AYbR4tfXg4zr/VnPc6/pYm/FsQUYgBA
	N44OsYpjJWXD7LNomO63cLy8CFXOhjQ=
X-MC-Unique: v-Pk8tb_NMqobvQv_lp0eA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=hd9t+0ibBe4Q49FiT/3EQ6X80V7m60zZmw+jWO1Wr+07Ff5dOQbnUshhXw5W2EiYBYdkvEzbLebA9dPVNzy9WAd3HeunmbxrtL/TVn8ssZJZ45StFK+IF7VWzdsl6piVXNHvCZcoOdeO8oiGD5ZZW1rt/Tdt6aN4CEyvndh5RcJU+3/IdGr7q1o6T4SUJpD7kdiBt74Ndnfwv4w4CSOHq/GMbYCjvcojG7YwO0FnQ5z3WQTYmoEyEo8pUM1W5iyXVOjiTyyH4TJaeIyRfXbGJtf7wO8wte16hnN+FXS405VCQXiHI3gMu23VXHA3PLDnK748+0D0p5m0zARuZHHbEQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=MfV2svkbKV4AHtxzQZYqSwB8DQ5JLjU1dH59H/lAJZc=;
 b=OWlnGFPOEdsDLVJNTpepTYg1qByZDZuL5jQxQsHsolMOVsIzwR5Rv7JGQp6vsXy29utzvMCDUCRYbnceIrQFE1IfT5y7hdspGbMLxl3ApiNjVbdiLycznENNhv8o6ozJJ7bAUcvLgsDtx93e2EkD4oRrYyF4Nhx9S4qjee1M1YUwL3zL91TCZbtYtO4dPWv4txveaGI/9a/0IdsacYXs6A5beGWKkh9VknpKW/2mgjVEro/QnBhnarGMwNLStaPYUs4qBXohHH+kP5NuhnzFVDQcV/5jewqm+xseC4QrFvJRfy2u9X9sBCfx227rYvS9cVA7wOXeyCZIHGeaPCcJcg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <a6f18801-7959-8fc8-f414-8086ed74ab3a@suse.com>
Date: Thu, 31 Mar 2022 08:42:47 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2] livepatch: account for patch offset when applying NOP
 patch
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Ross Lagerwall <ross.lagerwall@citrix.com>,
 Konrad Wilk <konrad.wilk@oracle.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 Bjoern Doebel <doebel@amazon.de>
References: <772f0afc-64db-6b98-af49-bd970ac78cbb@suse.com>
 <YkSNm0mb47Vc6nGr@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YkSNm0mb47Vc6nGr@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6PR02CA0018.eurprd02.prod.outlook.com
 (2603:10a6:20b:6e::31) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 16f1ed1b-bb13-44f3-cc90-08da12e1ac64
X-MS-TrafficTypeDiagnostic: AM0PR04MB5713:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB5713C227DD91E8995D0E7502B3E19@AM0PR04MB5713.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	ZYMuDjhMBC0I7iJDvcGZTmaBvK3ehhpmRnqBEOuXn4rEABu+aKVgnA4PARv8MzFtx27I9rNVyKN/L4xuKWMNBVsq8jCEe2eiKQ5Q+LQtx3fMNRGtP+0AZIiluAQ2CtBPlEuGRwdmhqJ4yGwOy4+8/MU1HxWkwg32/gwW3CqIMZfINU0oEOe5uFpfeyHi4r4bhOTkUZ8t9Lyer9qcLteweocaPgEfjq+okMgA82Yv0nwMbhCyoaa7LkCgBXCcRiAyHBBq2LyoRh0lBsNq2WeggZXhAnLKEqFYdnDR5WSh/zGPPpEvRDR1NKs11qP0RW080xXalBHYXcOdVWXX5uL2Hluu1qJJGffq//R7tpL9jIfVbKc28zBHgmh7hVkC3i8vfYBTV8HSDi8kX1icGKmWCzIQn41VqVHu1kDXr3bnL8dQ0XueavAMhToGtqAX5eG+fbjVikxDprBOODmuD0lii0aq7Kq7r9uiq1mk6GK9q5/KT4KD/WN6t55vNNVMM8cImGE3pw6MVAlwXOpjS+JHQbIG+F1CBrWUBBeYp8fixlPcPCzUzoCxXQcpEcngS2GppLPMqzhE0n6Qo1juh56ptmWXsnXJrEatUOw+Z5lzTqrGjEbJY2aOgeXgwY0N083QIm0jpVKKc1s9yujL0pzHOpmEBtOazp2eQef1lM5fpj/HJk2PH+xCKNRmbJFunb4GzsSid60f8guAu0KAgw5TbOhkUs3x7Cas5v018HevLkA=
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(38100700002)(8676002)(66556008)(83380400001)(66476007)(66946007)(54906003)(2616005)(4326008)(26005)(186003)(8936002)(6512007)(6916009)(86362001)(316002)(53546011)(31696002)(2906002)(5660300002)(6506007)(36756003)(31686004)(508600001)(6486002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?2tTp48xgupujnCY/tfGHNf1U2qHH3u4sVfdJYk0W6IUQ/9XlCHnbKEKxAMy6?=
 =?us-ascii?Q?kJwhhwhBDhwRJWzoxXcIGUd6h6Zm/hYOXJaSwvC5JeFJXsQmCooDu8XTVW8v?=
 =?us-ascii?Q?Ut5bcI9+KhBgA1L40sW7j3/4v4zBUCdqzRUkW0vD0yWVxTTawJ4wb4DSvDOS?=
 =?us-ascii?Q?KE6rhbz+yBa2VAz7IK8qj9XVubcdOqqZZXRR1slaU+ZEGG5a2zs7Wzi5lvTK?=
 =?us-ascii?Q?sBXvTdgnT9ihlhdddtk/eOWN3kJecP/ol/CRszCnWiQlLe0ASFdOUBTd0PBA?=
 =?us-ascii?Q?lv/amSkQgPZRjxoxTl0Ux5yyY+wGbzIYZfK3XNa3HU3RbwHR+Ugb1qoCQSxz?=
 =?us-ascii?Q?Cu8KyLxcLQvT475K+uEKO3OX14ambnSYCdIfqkmmhQDxdjt73Icsct3652/U?=
 =?us-ascii?Q?QuDVktNIzitqKGHC8xnOyGsA+QTlQgDaaayAs2g7cI5pNlfnFdiX7/fjJjJg?=
 =?us-ascii?Q?nB7H4QwYuLMv5aQt//csqEiTkI07l0ncIWhRVPhXYi8bm89rhcZAMM+YbJZh?=
 =?us-ascii?Q?MrH2n6UFzIilE/gW9Si6jw3Qe0ELydipagPsqYeA+bsglSt0x3Ec0AQdxAOY?=
 =?us-ascii?Q?SMKfI+sXPLWQbZeTJ+0Q6PGp6qccTNTCkmZQSaHI6BrYkhE03Qzp5LbzONUF?=
 =?us-ascii?Q?TOtm9cJkTKQBbVMxMkJYcwG2DG9h6sjmRZZXQihNfbXoA8KPto4ogqctcEYH?=
 =?us-ascii?Q?J/BOsUNc/LcLpHEB6ooJCJuYkvVUo9UOwJazwikVeZ5EemcypTIyKFFteYHo?=
 =?us-ascii?Q?8dG3qET6szytdmcg8L9ZCIHQLywrzofa+ISx6q3s57hW1Bvnqew5H2JE2ya8?=
 =?us-ascii?Q?uAPaF2Dz3hKocbWO2jGHE1RdBQCjDjiaomdhwTYPcrRpzk2Mpf7eHO3amRgb?=
 =?us-ascii?Q?UIPdy71U/udrkVPWKKPkBfAtq8nGOxrH6JBjXT8A+auYMXTPd/+OpinRic2C?=
 =?us-ascii?Q?D769uJH0+GjaGaDgGM6BPKTcJ/Noe87/25FlP4ywG9ghQbp4H8KhexogXZZV?=
 =?us-ascii?Q?XVfs6JE+8BZxwHkmMfs316iwTc6lFuEXqdjaxIQmeSJ82AD/gDKXfS/7cjc7?=
 =?us-ascii?Q?zvnRD3P+O3nvhRvURIbDZBjcnn1D+4+P9RV2cZI0lnk3EeBP3qZyz4pZq3+p?=
 =?us-ascii?Q?R7WfA3OyXxqtV8gilcEl9uPSQZ04PpDS15vnATBviCpYE7XF7lJvnueERcbA?=
 =?us-ascii?Q?dE2t1YEzQAXQ0G2D6SKwlPqkos6/dI7PUDEFTSJz8FmhiQIUJDssYz4tvqgt?=
 =?us-ascii?Q?mHJqxAF24cliMmnIIN9NVeSbAxWZSAmmPqvcQTn22a48PFIEjSpE7eqqasym?=
 =?us-ascii?Q?JFhuIuU87NSuGDDEwE9GkkngvlhSHkRHTcWJ+n7qFZqDuJRyKrdA4N6omWFn?=
 =?us-ascii?Q?jafAl20/mmB/CmKipKKtbHk37gHbUL9nDsAjdPFigXvjN4mKod1dxST+Q6qD?=
 =?us-ascii?Q?7Wr+gB7GvAJ0NYq2x0Y+49RuzhSl82axU8zoRLMvgGscuf2G5aWm0RIr2xtE?=
 =?us-ascii?Q?xU28aPQiSgwU+L/e8/i2dWa5rnG3xzmPoS+8Fspa8TUqloTrBWzRVbDAc1z3?=
 =?us-ascii?Q?wfvwZqBOVnTSiI5fkDgMmE2Vbj5v9iapr1TmRwAGBd7yFLhjswuyl1wedcWB?=
 =?us-ascii?Q?gqWstTG1UvroNIGWW8NUJsan9clgsRhHKnhX6alexEwTFcNAFukAp/yZrM/q?=
 =?us-ascii?Q?A8tTN0A8utPLJw2ECC2wsq5uBjWpUU95XbjhPla5NVRo7HPNEw1s49a8q93f?=
 =?us-ascii?Q?P3IhyL6Jsw=3D=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 16f1ed1b-bb13-44f3-cc90-08da12e1ac64
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 06:42:49.6981
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 9quUpY56JixxufH9LMARLtX7sY7L298AGiMqhrvPG0HzA4TPXnlUVSZB+jRF21GaSMOHPitHnhqEEmBkJX3zgg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB5713

On 30.03.2022 19:04, Roger Pau Monn=C3=A9 wrote:
> On Wed, Mar 30, 2022 at 01:05:31PM +0200,>> --- a/xen/arch/x86/livepatch.=
c
>> +++ b/xen/arch/x86/livepatch.c
>> @@ -157,9 +157,15 @@ void noinline arch_livepatch_apply(struc
>>       * loaded hotpatch (to avoid racing against other fixups adding/rem=
oving
>>       * ENDBR64 or similar instructions).
>>       */
>> -    if ( is_endbr64(old_ptr) || is_endbr64_poison(func->old_addr) )
>> +    if ( len >=3D ENDBR64_LEN &&
>=20
> Sorry, didn't realize before, but shouldn't this check be using
> old_size instead of len (which is based on new_size)?

Yes and no: In principle yes, but with len =3D=3D func->new_size in the NOP
case, and with arch_livepatch_verify_func() guaranteeing new_size <=3D
old_size, the check is still fine for that case. Plus: If new_size was
less than 4 _but_ there's an ENDBR64 at the start, what would we do? I
think there's more that needs fixing in this regard. So I guess I'll
make a v3 with this extra fix dropped and with the livepatch_insn_len()
invocation simply moved. After all the primary goal is to get the
stable trees unstuck.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 06:50:06 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 06:50:06 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296677.505063 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZod3-0004V3-Ra; Thu, 31 Mar 2022 06:49:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296677.505063; Thu, 31 Mar 2022 06:49:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZod3-0004Uw-MI; Thu, 31 Mar 2022 06:49:57 +0000
Received: by outflank-mailman (input) for mailman id 296677;
 Thu, 31 Mar 2022 06:49:56 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=TTh1=UK=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZod2-0004Uq-4P
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 06:49:56 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c5c99a2b-b0be-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 08:49:55 +0200 (CEST)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04lp2056.outbound.protection.outlook.com [104.47.13.56]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-3-mmaVZQTcN369o_P9nvhKTQ-1; Thu, 31 Mar 2022 08:49:51 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by HE1PR0401MB2411.eurprd04.prod.outlook.com (2603:10a6:3:25::20)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.21; Thu, 31 Mar
 2022 06:49:49 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.021; Thu, 31 Mar 2022
 06:49:49 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c5c99a2b-b0be-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648709394;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=YGmDYJFRqVoX7TqiRs6LvG2xNPugw+qDMYWQQY9WFIk=;
	b=mZHAce9eGHWx7uCKMgu9cSQ3wOAnPCWtjToIX92vsmh4wA6MeGsiroN+S07e7eX1YLctgO
	IJVbDmR8L28t7HpckA5ABDnngACRcmx/xohQLg9wYkVBRctq5Bk0C6+zfeNl6PlWy+RgAo
	3bM01O97a+9qnfGcGDKQ/RG1o63hy38=
X-MC-Unique: mmaVZQTcN369o_P9nvhKTQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=T0lNIi00SSD7KLAihSuPtC56hey3IHS9ybT56qvcjegUdhcEl0Xn2GBktLWYySVpmVkYoVfNQlXeGq/Hh4ZvnMrddF1ap+zS+Hg2DqkgS3pXZmzae9j5+9Fqwailm3gNFIkKDtArs66/S8tKE9eBQp0e8dUVGMDreRi8fdvNgmIyvcj+RN1xTxUlfIz9BAik26ZzwiA+W51KCBwJC6+3NRKYTAcmmewNrV8jTVRetL/+QDGu4RdsQTvayURNKmxB0u27k3YNLZIiTAVyKYjyhPG23GoDuZWcxrko8jZ7uDBCC0D98e1XXKM8UlD3msbXCjXJ1zwUkM8rLAet4Jju5Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=YGmDYJFRqVoX7TqiRs6LvG2xNPugw+qDMYWQQY9WFIk=;
 b=hmS8AgoHXHbxS//M+sAxLta4WMgdsxMCwCK0HEVIhWrj9uu/HPmu8qdrN5zaXpp9vfHQWFPXL3WFwyztgz6oFV1xEAxoSSgVO691hx1TER5W8UBQ6Lskac31o4Cky9hAf4aEwmFQXpTrOZGnqqXECGMassguk/mmYIKXF0vzdmVVZglqqoDKvgxAJozVabMyujX1Ttvpdfd+cO1kpWCbTpmR0/pQAufUxgs3/AgGvgOX+pl8s7bX9dCeONyc3DypUeL6DQzzZtQIEqzX2RKIM1MiuICHrwC/kLbWaZg0H0TCzbsByUNSclbpUSrZh229JLD/3hn2irQQ8gB6K+QuwQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <8db632ef-9d9c-d17a-54fd-49912d88d599@suse.com>
Date: Thu, 31 Mar 2022 08:49:46 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH v3] livepatch: account for patch offset when applying NOP
 patch
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Ross Lagerwall <ross.lagerwall@citrix.com>,
 Konrad Wilk <konrad.wilk@oracle.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Bjoern Doebel <doebel@amazon.de>
Content-Language: en-US
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM5PR0101CA0029.eurprd01.prod.exchangelabs.com
 (2603:10a6:206:16::42) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 19b7095c-e967-475d-4f93-08da12e2a688
X-MS-TrafficTypeDiagnostic: HE1PR0401MB2411:EE_
X-Microsoft-Antispam-PRVS:
	<HE1PR0401MB2411DF74D896816BA340B552B3E19@HE1PR0401MB2411.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(31696002)(6506007)(2906002)(5660300002)(86362001)(36756003)(6916009)(316002)(6486002)(508600001)(31686004)(66946007)(2616005)(8676002)(38100700002)(66476007)(66556008)(83380400001)(54906003)(15650500001)(6666004)(8936002)(6512007)(4326008)(186003)(26005)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?RVJUeU8yK3JCMThpRFBWbStma0MvTGpld09wV3VSNnJTRHE3Q2hzbXh1V0VV?=
 =?utf-8?B?UG1tRk1TSlU5bkNCNk9KWjZXQVUzUzUvd0V1UC80dCtVczZySEs3aklmRlE4?=
 =?utf-8?B?MGZrSFVRaXpNbHJNTURLcC9SeEdrZU1acjZQSUQ1RjN0azhVV0NLRkN4N2dN?=
 =?utf-8?B?NnJDVXZtbGZST1h6bUtPZHltWnNlQlB1akRMVVFncGxQaEhGRUZ2clpnWUlU?=
 =?utf-8?B?Q3Z4WTRKakt1TTJYcTdwSkw0dTNkRVZCSnRHSE9wTkVTdThpcEtoSnJobmQw?=
 =?utf-8?B?bDh0bzUwbHZhbTAwUmFrWHVZYzlWbFhBZzVlemlPS1d5Vis2eEVBbzdTZUdU?=
 =?utf-8?B?T3FzeW40bExpSHZIcnkwN2FDemE1TVBwMHc2OUJhR1Frc0V5WWc2RXQydHBJ?=
 =?utf-8?B?ZHdteXlXbk9uLzAvTDhveEJPVy9DMXNtWVZqZWZIQXJoT0RicjdXa0xYTFdF?=
 =?utf-8?B?REhpaVhGbmg3eHpmS3FoUjJFdExFWGV0RDVQQUx2dUFzS3M0QkZudE43Q3N3?=
 =?utf-8?B?VHBIbFJqK2VzcTRFc0k1T2RGZGN5VERGN1NTWlJBWVA2ZUl2VXZDNUMwY1NN?=
 =?utf-8?B?dlc5UzhWc1lZbFJRT1pONDlzelNnWGdtQlJ0dEc5SUpQY2I1M01TbFNuMkZm?=
 =?utf-8?B?a0JyM0g4SDIwSDhTOUR1dDhkRUt2cUowN3lYQVl3eGZrOWM5engrZ3hxNEpt?=
 =?utf-8?B?cW9RTVRzakFVbUhNb051cStwcE9zRm9lam9uc0tRODltc1I5YU5vUUFPWjNs?=
 =?utf-8?B?NjMzZEtBVFE4ZE1iWW1HQVEvaHNiU0d6cmx0cmEyQm8wNmdYNUxDM1JNKys3?=
 =?utf-8?B?emNpL2h5K2hQVEVOQXlIYndSUkZCN0MvbW9NMWNQVDJLZmx3NGYwaUtSTUs0?=
 =?utf-8?B?RmRWcENUUi9hWHNKMWJXZ0VEMy9nYTVlWmRFOXRsU250OTFQUStZam9OL1lV?=
 =?utf-8?B?bSswb0JmeUxSZkxGSGI0WTJEVnhJYkxoR0ZTVFV0eG5ycnNTSzlEa0hKNDRs?=
 =?utf-8?B?TlF3dkxtNDRaN2ZwWDlXMVdHeXJXTXd6M2dZbk91a01iRnJjMEgrZ2dMNlRP?=
 =?utf-8?B?UVR6NEVoaEVJclZPS0g1eEMxckxiYUcwWXlQcUhVWk11cHdKeVgxN0UyYTBG?=
 =?utf-8?B?cUwvaURxNFFBejNsYWtKZ29rOUtheXJtSUk1dTcrYTRPUTFpMEMrNFh0d01n?=
 =?utf-8?B?bXlNaDBEWGY4dUZlV3djR2VtRG14b1hMcDdKOXk1ZlVhdXkrSGtlUUxsdFJP?=
 =?utf-8?B?OVBzbHV2YlBldTRhSE0rLzJXYkFGeEZGODNIdnp1dUlYMVNOcks5bCs5a0pW?=
 =?utf-8?B?WFdQN296OGNISUpjQjIxZVVCc3pJa1poTUQxSDhORDAzM1lKbi82eGd3MWlX?=
 =?utf-8?B?eTduT1FXa0dBRGFNdnRaNzIrVFZqSUdaKzBlem0rdkhYUm9XQnVKdEYvaVZT?=
 =?utf-8?B?dm91VWYvNVJoaUxtck1jbGcwSG5ESEZGODlZdm1ic0QrUkJiQkxnZVZRVms2?=
 =?utf-8?B?MmlEUngrUmRISFNXYVlPTm9lbzhFbzRoMzFTMHBQNTVYcW9mQUhseEZtcWhL?=
 =?utf-8?B?azhjZFIyYXYvVmpVYTJzWENSNEFpUUhkN1ZTZEU4NU4xWkZwNUFIa2tFdUZQ?=
 =?utf-8?B?K0JUbDRiQlhNb1REb01hNmVtS296bE5TamRkRnNIS0R4UUwwS2JRVlNHbDhk?=
 =?utf-8?B?cFp5b3h0SGIxazM0RjBHNlhJdXcrbFRkTU4zV01WT094ckhORmJzaEp0Q29R?=
 =?utf-8?B?RHZoUUFDN29aZzVmMDJ4U3FMNlEzYjlIS3p4Y2hCYjl6dUsvNUNSYm13RlBP?=
 =?utf-8?B?em5ZNlpyWGhxelZma0FqcEV5dGVyZldDaEdCaWF5RUhTYVBNb3Zaa0xoYU9t?=
 =?utf-8?B?MXhJV2hQamZxWTMvS2R6c0xBWFFoN095SHpZUG5DcFVGWUtOMXo2a0JxL3Iy?=
 =?utf-8?B?NEVPOUl2TU5LSmpRMVQvSHhEelZQR2xwK1dRTmVsN3N5ZGFuRzYvQXpZVXNP?=
 =?utf-8?B?b3o5RVZ1RDdkVGM2TVdyYkxld1NkdVRTNzB6KzUrSlBkVHJEdG1YQlh2Uk53?=
 =?utf-8?B?ZTJaSTQrMTBmZTNqbGdTc3hEUHFxeEhSaGQ4OHhMdmJHaTcxbnVYMTFhc2hy?=
 =?utf-8?B?UkhRM1E2WFIybWFFNHlrMmZGdnFEL0R1a2Z2ZGlKbzZyeUFxQi9DV0RjSDFx?=
 =?utf-8?B?N05TMDhWd0tvMkxzazdDQjVrdXl2TDBvT3JGNVpMT1B2QzVJN09wWXNyeG1m?=
 =?utf-8?B?VENGSWxxeVF0R3RjTWpZRFhic1pPd0w0NTZuMUF3cEQveXdVWmFBUWRWYzdr?=
 =?utf-8?B?Q1ZzaDRRMGpHNFJZR3dZc2xscHM0eHNPZThUNHVmUHNPT1hCb2E5QT09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 19b7095c-e967-475d-4f93-08da12e2a688
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 06:49:49.3143
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Lp1hoIRdZxN1Tm72qcCmq2zY6gyZ1F0W74/Pmk5y7lzJcVARIA+T3lGCXLa7hTFWZdNMvujFMPR8yEk2tFRrkQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0401MB2411

While not triggered by the trivial xen_nop in-tree patch on
staging/master, that patch exposes a problem on the stable trees, where
all functions have ENDBR inserted. When NOP-ing out a range, we need to
account for this. Handle this right in livepatch_insn_len().

This requires livepatch_insn_len() to be called _after_ ->patch_offset
was set.

Fixes: 6974c75180f1 ("xen/x86: Livepatch: support patching CET-enhanced functions")
Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
v3: Drop 1st livepatch_insn_len(). Drop buffer overrun fix.
v2: Re-issue livepatch_insn_len(). Fix buffer overrun.
---
Only build tested, as I don't have a live patching environment available.

For Arm this assumes that the patch_offset field starts out as zero; I
think we can make such an assumption, yet otoh on x86 explicit
initialization was added by the cited commit.

I think there's more fallout from the cited commit, but that'll need to
wait.

--- a/xen/arch/x86/livepatch.c
+++ b/xen/arch/x86/livepatch.c
@@ -145,9 +145,6 @@ void noinline arch_livepatch_apply(struc
 
     func->patch_offset = 0;
     old_ptr = func->old_addr;
-    len = livepatch_insn_len(func);
-    if ( !len )
-        return;
 
     /*
      * CET hotpatching support: We may have functions starting with an ENDBR64
@@ -160,6 +157,11 @@ void noinline arch_livepatch_apply(struc
     if ( is_endbr64(old_ptr) || is_endbr64_poison(func->old_addr) )
         func->patch_offset += ENDBR64_LEN;
 
+    /* This call must be done with ->patch_offset already set. */
+    len = livepatch_insn_len(func);
+    if ( !len )
+        return;
+
     memcpy(func->opaque, old_ptr + func->patch_offset, len);
     if ( func->new_addr )
     {
--- a/xen/include/xen/livepatch.h
+++ b/xen/include/xen/livepatch.h
@@ -90,7 +90,7 @@ static inline
 unsigned int livepatch_insn_len(const struct livepatch_func *func)
 {
     if ( !func->new_addr )
-        return func->new_size;
+        return func->new_size - func->patch_offset;
 
     return ARCH_PATCH_INSN_SIZE;
 }



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 06:54:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 06:54:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296681.505074 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZohL-0005sm-BC; Thu, 31 Mar 2022 06:54:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296681.505074; Thu, 31 Mar 2022 06:54:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZohL-0005sf-7h; Thu, 31 Mar 2022 06:54:23 +0000
Received: by outflank-mailman (input) for mailman id 296681;
 Thu, 31 Mar 2022 06:54:21 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+Yrn=UK=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nZohJ-0005sX-JJ
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 06:54:21 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on2061d.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::61d])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 5c9dda3f-b0bf-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 08:54:16 +0200 (CEST)
Received: from DB7PR05CA0001.eurprd05.prod.outlook.com (2603:10a6:10:36::14)
 by DBBPR08MB5546.eurprd08.prod.outlook.com (2603:10a6:10:c3::10) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.19; Thu, 31 Mar
 2022 06:54:05 +0000
Received: from DB5EUR03FT039.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:36:cafe::2f) by DB7PR05CA0001.outlook.office365.com
 (2603:10a6:10:36::14) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.28 via Frontend
 Transport; Thu, 31 Mar 2022 06:54:04 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT039.mail.protection.outlook.com (10.152.21.120) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5123.19 via Frontend Transport; Thu, 31 Mar 2022 06:54:04 +0000
Received: ("Tessian outbound ac9bb5dd84f6:v118");
 Thu, 31 Mar 2022 06:54:04 +0000
Received: from 44494e867adb.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 610892D9-2D03-41E8-B291-A36F7F774343.1; 
 Thu, 31 Mar 2022 06:53:55 +0000
Received: from EUR01-VE1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 44494e867adb.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 31 Mar 2022 06:53:55 +0000
Received: from DU2PR08MB7325.eurprd08.prod.outlook.com (2603:10a6:10:2e4::7)
 by DB9PR08MB6620.eurprd08.prod.outlook.com (2603:10a6:10:256::6) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17; Thu, 31 Mar
 2022 06:53:50 +0000
Received: from DU2PR08MB7325.eurprd08.prod.outlook.com
 ([fe80::28c0:3e8d:dd75:80be]) by DU2PR08MB7325.eurprd08.prod.outlook.com
 ([fe80::28c0:3e8d:dd75:80be%8]) with mapi id 15.20.5102.023; Thu, 31 Mar 2022
 06:53:50 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5c9dda3f-b0bf-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=I4ZkCxr2WQEwf+40Jam3tGGGoq7rkDWV89deoVcU61w=;
 b=53hPUN64Bf3LWxCkLbp8ukdORf+E9u287CvRZTEErgpyYrhTfziQlNN5iUqA7JwxXCxavC7SM2/XOmQLBmgCGZmTbCBeoBdRztkj06NV+rwVz7Rx2LU92GXFtq0hOZPYJHGCfvJyxSylFKH9H9YttZkhWXCYG7D2ZAuBG0G87nA=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=YCkxOyCZDq+wvjFN2ykvEFiJaWoPqmQ5PIh2jBLXJjagCU5xojoJP3EuNA6I7mYAKWJh54yM0UvrWsvlj1/cIwyVDG9WjE2dGec7mELi9vbed9M1aTh1PkP+ng4ZNzf9aHxsplGA5+GEJbpozIeAQHtbXlNh7tUZKTACje1p/HkQudRtPFRAMXi4Vys+/P2Xj41dfTy5yzJiL+b4sKyL34IW4a0gNhnN7UzCljsV19vW+gq//kplXlM6BBteFMAE7xG2R14SWg4GOmfm+7Qh2QIN9L/G/RhsjOA02a1rc7KP2/WyIev8AiuktAcUwxuovgVbTTPlDJ5hpaEm4gCE2Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=I4ZkCxr2WQEwf+40Jam3tGGGoq7rkDWV89deoVcU61w=;
 b=h3y1lSfOolkDJ7iu3hSziYhya+PM+KVqUIlPFtf7pwIgDsetS8uuaYvqcy3bElpY84xUUiFfK+t5bekG8NzC/Ux1RlAOO7PYgNVc/5WU8PO5SNIFwbxoni34LgA7wVxpBUM2HMjnM1AOQ/MT/K/RqUdczqqC1sGPsghePhZ3KH0qdJcQ2RPypmLKWDOACcDonmQdzceFAqiLZgnv1zacfSAXS40738lFIeBECJxmw24vV+RTninnoLrhu1nR7SGlrDe7kIVz6C8mpVSAejlHH/LHN+33jzYCyG137hYR7FB/eYCiwb6gscQJnppBeiOHUK3hZX460IY0zzcNavJ2YA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=I4ZkCxr2WQEwf+40Jam3tGGGoq7rkDWV89deoVcU61w=;
 b=53hPUN64Bf3LWxCkLbp8ukdORf+E9u287CvRZTEErgpyYrhTfziQlNN5iUqA7JwxXCxavC7SM2/XOmQLBmgCGZmTbCBeoBdRztkj06NV+rwVz7Rx2LU92GXFtq0hOZPYJHGCfvJyxSylFKH9H9YttZkhWXCYG7D2ZAuBG0G87nA=
From: Penny Zheng <Penny.Zheng@arm.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Wei Chen <Wei.Chen@arm.com>, Henry Wang <Henry.Wang@arm.com>, Andrew
 Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
	Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
Subject: RE: [PATCH v1 4/5] xen/arm: retrieve reserved pages on
 populate_physmap
Thread-Topic: [PATCH v1 4/5] xen/arm: retrieve reserved pages on
 populate_physmap
Thread-Index: AQHYRBoGZuHI/fR8D0STTT8Q5XO5razXsUIAgAFYdpA=
Date: Thu, 31 Mar 2022 06:53:50 +0000
Message-ID:
 <DU2PR08MB73250905788FB3E6D9502962F7E19@DU2PR08MB7325.eurprd08.prod.outlook.com>
References: <20220330093617.3870589-1-Penny.Zheng@arm.com>
 <20220330093617.3870589-5-Penny.Zheng@arm.com>
 <570e0ca9-c07a-0fca-d146-82d655c792e6@suse.com>
In-Reply-To: <570e0ca9-c07a-0fca-d146-82d655c792e6@suse.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 4C42B63A9067644E83361D52FD471B1C.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: d58069a3-810e-4ebd-4055-08da12e33ecc
x-ms-traffictypediagnostic:
	DB9PR08MB6620:EE_|DB5EUR03FT039:EE_|DBBPR08MB5546:EE_
X-Microsoft-Antispam-PRVS:
	<DBBPR08MB5546DF914CF30E5795DF3A57F7E19@DBBPR08MB5546.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 lZXHdUIpwFFDcRSCjCz5xM7rAxCBb/V1AJ5AW9KvKuoAnYEh80oumsrd3k5ddZ/oLhEc1X7MFPmZmA8rQgvtYlBA5rOEiG5AlB3fXkHt+ikhPLEHLABcw6JQZVgfViTtvYPPvnSx/Byq0vuHowlafp9gX4TqbuNHznrnclpkdfBWeiK55CCNbG0MLF+9IiRUy3c1aUzOdT5wfi4kRgkutQDRWO1C+FtTGTdPT4AlxdCRQZAEYHbFZKFvkEWMpcg29CWjOK3dtaF3SfKobcwBc0fZc61KomQoO9gu3lSwKiaVCFPqGPIjM0SCzxAbtJDHn9C+uGacEIHNi00djgg3qJU95igAcYHDHnNH+WGrK3Bv414nVwcLMrnZT6d/LMNpybC+QXZJ2tlWaCmBFJutT+pEKsMf1U/qADT4ZAzskS+EaxtSSEAvpwJnGsre1/5JWZhnqOHtxhaA8x/rMUo/MXY+hahX7vSUNOX+TqMhcOMlKwrufO/TupjZEs0zuDfrfF6r4/byyZkDWbCGI8y2qsognryniANzeHx1GHyzb8o5fkPtuOBhQFUTwsxfotw8vpxSRwhenb3AWlUHRdf8dQa3CcDZADIpqagJTcso1VYamphoDppr3C4GXcQg0gMlRrshSLGzIhzHsIbr7InIt4hxTDtBHEsGgKRPaxq7wGjg76dB2HTPA0OfcpD47ovn8Gt7Wll5xHoGRtD0BXeAdQ==
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR08MB7325.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(55016003)(4326008)(71200400001)(508600001)(8676002)(66446008)(186003)(66556008)(66476007)(316002)(64756008)(66946007)(54906003)(76116006)(26005)(52536014)(2906002)(7696005)(8936002)(6506007)(6916009)(86362001)(38070700005)(38100700002)(5660300002)(53546011)(9686003)(122000001)(33656002)(83380400001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR08MB6620
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT039.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	92341cd0-c100-41e8-bae9-08da12e33631
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(316002)(356005)(54906003)(86362001)(53546011)(55016003)(70206006)(6862004)(70586007)(4326008)(81166007)(82310400004)(9686003)(8676002)(7696005)(6506007)(40460700003)(33656002)(47076005)(83380400001)(508600001)(36860700001)(8936002)(336012)(26005)(186003)(52536014)(2906002)(5660300002);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 06:54:04.6639
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: d58069a3-810e-4ebd-4055-08da12e33ecc
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT039.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB5546
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From xen-devel-bounces@lists.xenproject.org Thu Mar 31 07:05:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 07:05:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296686.505085 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZorh-0007So-Bt; Thu, 31 Mar 2022 07:05:05 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296686.505085; Thu, 31 Mar 2022 07:05:05 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZorh-0007Sh-8p; Thu, 31 Mar 2022 07:05:05 +0000
Received: by outflank-mailman (input) for mailman id 296686;
 Thu, 31 Mar 2022 07:05:04 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=IJRK=UK=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nZorg-0007Sb-Ko
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 07:05:04 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04on062c.outbound.protection.outlook.com
 [2a01:111:f400:fe0e::62c])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e2d55adf-b0c0-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 09:05:03 +0200 (CEST)
Received: from AM6PR10CA0015.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:209:89::28)
 by DB6PR08MB2661.eurprd08.prod.outlook.com (2603:10a6:6:17::28) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.19; Thu, 31 Mar
 2022 07:04:50 +0000
Received: from VE1EUR03FT006.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:209:89:cafe::29) by AM6PR10CA0015.outlook.office365.com
 (2603:10a6:209:89::28) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.22 via Frontend
 Transport; Thu, 31 Mar 2022 07:04:50 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT006.mail.protection.outlook.com (10.152.18.116) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5123.19 via Frontend Transport; Thu, 31 Mar 2022 07:04:49 +0000
Received: ("Tessian outbound ac9bb5dd84f6:v118");
 Thu, 31 Mar 2022 07:04:49 +0000
Received: from 0f6ca727c8a4.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 2DB46EC2-C0A1-45C4-BE72-824F6FBAC291.1; 
 Thu, 31 Mar 2022 07:04:42 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 0f6ca727c8a4.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 31 Mar 2022 07:04:42 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by AM0PR08MB5010.eurprd08.prod.outlook.com (2603:10a6:208:15c::12)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.16; Thu, 31 Mar
 2022 07:04:35 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::a4a1:ded3:2013:b310]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::a4a1:ded3:2013:b310%7]) with mapi id 15.20.5123.021; Thu, 31 Mar 2022
 07:04:34 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e2d55adf-b0c0-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=BEZ4+8lCiK5CCg08Xa/aYSvLUSMRRXoOkf5PVqzihkc=;
 b=xkhBkcwdUQarJkVm/gyRHPMnY7T4Vmo2A3XDBytyYsVvkurCr9ZA5ROW/C3TS2bSEHCi4x1tjUDDEs8KRC9KOpynPvK34/egl8HX2KvmxOEN30NQO0uewbAiZTM3OSjEKUWdncfelWn/9W1ulVHn1CzfMvdEJdN40E66i0L1dOs=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: 80fe3ccb8f89b375
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=b2O3cyACIkUzNCf7qLCeKoME031h0FgPGRzuT2crObo1iPZzToE1VCGbppc8iEhxJbhFm4x7UKB8b94HGOowgO5hD3gd6WjqiBrllbS9Li0eyzqMo0zFztiMHDbs/lsDJ7SYLN0PBwLE8ocPvW/XpNs84W4GaiVIHwm6VrjVidnShVxn1VdpjEG2yAFpAUxSMznqxdqmZsTmcVC8aeYEp0kSQexg+srBR0kopOw5Z5pJx/SMtJtEGOIw6fgio4rW7wF8aGFkMNHOnPzv6/54Vu16VNrEA5NPxk2InxpYfxr8Pyd4jJ812Q7Yuicefu0sFPTkGeldsAjVEuUzR6BrHw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=BEZ4+8lCiK5CCg08Xa/aYSvLUSMRRXoOkf5PVqzihkc=;
 b=mk+EtBYOLijj7jMEHy3HPhceLbUclls3IVwoBj8a91ZUoc5Uh0Tx5c/G0uTsYnS4rtB6fnudnpYFsJHsRKkT82Zbk0Zv7Jf71+WWe5jgnIP3c2VLJjxh0f8Q9oPYKWcJO+Q9G6qZEwd4X65QbF3hylKUmQnanNnasUCLZrFQQsagioCGFkuoPvInFGPg0B8DedzAEy2+LKWiLmYaK2UOZY299LOeyWRr+mFipNEqp2Z49DuPgZslVAit9zHbhPXHGNqqiAOomkvqtZ8tzVrWYv9NmdHvMr+8z0c92zROWLSPK796P8dQOEzn8fPVAhp+bNCL8Br1bSxEb84lc+nt4w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=BEZ4+8lCiK5CCg08Xa/aYSvLUSMRRXoOkf5PVqzihkc=;
 b=xkhBkcwdUQarJkVm/gyRHPMnY7T4Vmo2A3XDBytyYsVvkurCr9ZA5ROW/C3TS2bSEHCi4x1tjUDDEs8KRC9KOpynPvK34/egl8HX2KvmxOEN30NQO0uewbAiZTM3OSjEKUWdncfelWn/9W1ulVHn1CzfMvdEJdN40E66i0L1dOs=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Demi Marie Obenour <demi@invisiblethingslab.com>
CC: Xen developer discussion <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v2] Grab the EFI System Resource Table and check it
Thread-Topic: [PATCH v2] Grab the EFI System Resource Table and check it
Thread-Index: AQHYRHEH4zzX/uDlcEa4/lbFmRQ7HKzZEkOA
Date: Thu, 31 Mar 2022 07:04:34 +0000
Message-ID: <783D6789-9BC6-49BC-8345-478A862083E2@arm.com>
References: <YkS3FthpZU0xQ2Y7@itl-email>
In-Reply-To: <YkS3FthpZU0xQ2Y7@itl-email>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3696.80.82.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 0a587674-191e-4a07-a1dd-08da12e4bf55
x-ms-traffictypediagnostic:
	AM0PR08MB5010:EE_|VE1EUR03FT006:EE_|DB6PR08MB2661:EE_
X-Microsoft-Antispam-PRVS:
	<DB6PR08MB26613F7914EF5815E671C948E4E19@DB6PR08MB2661.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(66946007)(66556008)(66476007)(66446008)(76116006)(508600001)(2906002)(83380400001)(122000001)(36756003)(33656002)(6506007)(6486002)(38070700005)(91956017)(71200400001)(64756008)(6512007)(86362001)(5660300002)(8936002)(6916009)(316002)(26005)(2616005)(186003)(38100700002)(8676002)(4326008)(4744005)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="us-ascii"
Content-ID: <1BDF7C42EA496541BB3E961CF5A87FB0@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB5010
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT006.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	4edab304-4ad9-4cf5-9126-08da12e4b663
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(86362001)(4326008)(8676002)(6862004)(82310400004)(508600001)(6512007)(6506007)(2906002)(2616005)(47076005)(6486002)(36860700001)(5660300002)(40460700003)(4744005)(8936002)(33656002)(36756003)(81166007)(83380400001)(336012)(316002)(70586007)(26005)(70206006)(186003)(356005);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 07:04:49.7156
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 0a587674-191e-4a07-a1dd-08da12e4bf55
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT006.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR08MB2661

Hi,

>=20
> diff --git a/xen/arch/arm/efi/efi-boot.h b/xen/arch/arm/efi/efi-boot.h
> index 458cfbbed4..398a2411a1 100644
> --- a/xen/arch/arm/efi/efi-boot.h
> +++ b/xen/arch/arm/efi/efi-boot.h
> @@ -187,7 +187,8 @@ static bool __init meminfo_add_bank(struct meminfo *m=
em,
>=20
> static EFI_STATUS __init efi_process_memory_map_bootinfo(EFI_MEMORY_DESCR=
IPTOR *map,
>                                                 UINTN mmap_size,
> -                                                UINTN desc_size)
> +                                                UINTN desc_size,
> +                                                const EFI_MEMORY_DESCRIP=
TOR *const esrt_desc)
> {
>     int Index;
>     EFI_MEMORY_DESCRIPTOR *desc_ptr =3D map;
> @@ -199,6 +200,7 @@ static EFI_STATUS __init efi_process_memory_map_booti=
nfo(EFI_MEMORY_DESCRIPTOR *
>               desc_ptr->Type =3D=3D EfiLoaderCode ||
>               desc_ptr->Type =3D=3D EfiLoaderData ||
>               (!map_bs &&
> +               desc !=3D esrt_desc &&

I was going to test it but this line is breaking arm build.

>                (desc_ptr->Type =3D=3D EfiBootServicesCode ||
>                 desc_ptr->Type =3D=3D EfiBootServicesData))) )
>         {
>=20

I see CC list is pretty small, did you forget to add the maintainers?

Cheers,
Luca



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 07:05:55 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 07:05:55 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296689.505096 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZosU-00080x-MM; Thu, 31 Mar 2022 07:05:54 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296689.505096; Thu, 31 Mar 2022 07:05:54 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZosU-00080q-JD; Thu, 31 Mar 2022 07:05:54 +0000
Received: by outflank-mailman (input) for mailman id 296689;
 Thu, 31 Mar 2022 07:05:53 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=TTh1=UK=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZosT-0007Sb-4J
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 07:05:53 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 003ace48-b0c1-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 09:05:52 +0200 (CEST)
Received: from EUR02-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur02lp2055.outbound.protection.outlook.com [104.47.6.55]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-39-U7RqQfbvOmShN7mBTjwxwA-1; Thu, 31 Mar 2022 09:05:48 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by PA4PR04MB7869.eurprd04.prod.outlook.com (2603:10a6:102:c4::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.21; Thu, 31 Mar
 2022 07:05:47 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.021; Thu, 31 Mar 2022
 07:05:47 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 003ace48-b0c1-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648710352;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=VdrsWaLtmY2qMkmYlEuyZvgWuPbUEWDPCqkCJ5X+YuQ=;
	b=RGGfJyTSuq6onbxnMFKbFERVn9cUr6daSgaNVbSUiRB2Q9kiHoBpHyWqThHwtwsy73oRhn
	NauJ3d38iJn7p+klHCyjWNuWgpBaeWkiz0fHYKF0jjN5+q28KsKXBFPVzHSMYpRlNST3r3
	CdfVFDN7rIKlUg5Ysm+Zcm2eABleab8=
X-MC-Unique: U7RqQfbvOmShN7mBTjwxwA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=nYXUtWD/6TWdeRNbjl+K6gQN9JnmmTixy0cHIPUAii4wIlGK+Can7yXqkF2rEc8QJ2h4p8OFNT3BFwx2nIQrE7znWspy76Nt3xQ6Wx23lbySRpUnK5B2KFiwsyhOxF0Hbg0QEdQToFnUcAdcbdXwmRAOanS9DuJQIBiu8SM0yNn1dFnPJ1SApsQQgiukOsFf/naeptJvkJT6MNVB09n+OMAeX9GraaHU/nJX1/2/YhJHvlqkTeHbyb3zJUW+Pru68PgzshFrZdOtdEFM7kfvba4CH3gCupi3whjuqpE1w2BoSv1m2awWATDlaloiqv92heT18r74jmlg7VE7NKP64A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=VdrsWaLtmY2qMkmYlEuyZvgWuPbUEWDPCqkCJ5X+YuQ=;
 b=Ipml+zz4YIfc292yNnfkbAZZpW96Vy00Qw+53khJU5P8zdpx5/fq0YXf8CRcfJb4ORt/M/MSHLH6o73YPGxbT+JSQooUhAGnT1ADb0/MLaH9+g3o8nnsAQ6EN8SWblCzDUMlzIEbV3otvHt+4u8dn5kSv6JJ+uSBRDm4uYmPWGqh7V2Z8K9vRaqmbki5f+oN9uhRPCdUGwPuo/bW1FA0VThREczYhycc5lerpZTchOQ1wYpNWysEiw7HEVikUqWPqZfXU3v7IMCK/20JATbjOSwBx/+APlwXBYTvhSUlx3i94lK9eGluU73w0CjNq6EKtTCHnSrxhob0XOtv6qW+Xw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <eba664e6-4146-426b-5119-59fe02a96bb5@suse.com>
Date: Thu, 31 Mar 2022 09:05:44 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v1 3/5] xen/arm: unpopulate memory when domain on static
 allocation
Content-Language: en-US
To: Penny Zheng <Penny.Zheng@arm.com>
Cc: Wei Chen <Wei.Chen@arm.com>, Henry Wang <Henry.Wang@arm.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
References: <20220330093617.3870589-1-Penny.Zheng@arm.com>
 <20220330093617.3870589-4-Penny.Zheng@arm.com>
 <31c1ae2d-a4d6-5445-e819-5df5a0984cdd@suse.com>
 <DU2PR08MB73251B78F8EB19E334A70876F7E19@DU2PR08MB7325.eurprd08.prod.outlook.com>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <DU2PR08MB73251B78F8EB19E334A70876F7E19@DU2PR08MB7325.eurprd08.prod.outlook.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9P194CA0027.EURP194.PROD.OUTLOOK.COM
 (2603:10a6:20b:46d::22) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: a5ab47c6-9347-41f3-5752-08da12e4e16c
X-MS-TrafficTypeDiagnostic: PA4PR04MB7869:EE_
X-Microsoft-Antispam-PRVS:
	<PA4PR04MB78695B7538069E2E32ACAB2AB3E19@PA4PR04MB7869.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(31696002)(86362001)(2906002)(45080400002)(6512007)(26005)(186003)(53546011)(316002)(8676002)(66556008)(38100700002)(66946007)(83380400001)(66476007)(5660300002)(6486002)(4326008)(36756003)(508600001)(8936002)(31686004)(6506007)(2616005)(54906003)(6916009)(6666004)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?RGNucFlSMExkMmk3dlNHUmltUkJweEdlak12a0RsRU43OVVocGVoNGpJQ1lG?=
 =?utf-8?B?TTFnc2h6bGVaMlVwTXVDeWhISDRxdm5zdi84YitiS2k1VXVEQllZZElYN2ZC?=
 =?utf-8?B?c1R3Vk4yYk5iYTJkMmJ6KzhreHFVV3BRMUdEYzUrek5oamRVaXhrVW03MVZu?=
 =?utf-8?B?ZWNGQ2pnVG91NFpGM3lhWS9HSFpLcU9nVkljYXZ5WWJBNmg1TS9PT3BPdloy?=
 =?utf-8?B?bVk1cElOMzdlRDA2cFRKUVZHQVJwZmptOWxVdm4wdnNPK2Z4QVd4Y3hxUnlL?=
 =?utf-8?B?WGdGY2NoRzBtVjRBNW1xK21MOVl3NzRqSFdmWktEanYreG01ekZmc2dsOW5P?=
 =?utf-8?B?WFhIQzk0MkhsTWZTenFUcGVyNHJseWdUN2s2dVYxSlJrTkxQTjdubHV1cVhv?=
 =?utf-8?B?YmpSUlB4VlBLVjllNTFXaWVjMUtFY2tJQkMzZkh3SnBuVXMxUStLZTRaNnZI?=
 =?utf-8?B?NUZFbi9IbFQxc05tVnA1dmRST0NNNmM0cjBMc1Q2VElnM21xU2t6dThxTUQ4?=
 =?utf-8?B?MGJZdldWbWpGRWFTTCtoN3Z3V3lsTThmUHZ1NkVnREZZSGs3TldqeTFBa2lS?=
 =?utf-8?B?bXBRL01QWUlKdkxOVis3ZnBaTVRjaUdTV1FQY3huSGsvaE1hTkJaTjZaWmU3?=
 =?utf-8?B?ZUN2eW5HeGhFN0h4SlFza0JtV2NHVmdJajhlVXZjWG85dVlhYS9LVWZYQVFH?=
 =?utf-8?B?ZnpEZVlIcEpVb2QwSDlRZms1Qm9qejlma01tckVGNDR4Q3hIL2paSGRFUG9F?=
 =?utf-8?B?dnQ5MjNSSnJzQkU4Wk8xRDJsKzNZRWJsUDk5THJkdU51WkVGYk1RdVd3ZEQ3?=
 =?utf-8?B?TUFPQ1luTlhJMUtFaTJwelF3RkR5VGQvNzFNOVZJakNDNkFkckJaVEdIUVhz?=
 =?utf-8?B?bDZVc2ltTVI4SjFhQW1tM2E0QWNZa0lzY1Jpb0s5YjIralhScktHWVVKVGJO?=
 =?utf-8?B?ZStpWm5ZcDZuNmN6Rm05UzdUMFZpWEN5L3dnVmFkVnY3WUc0Q3ZBUE9aSW1j?=
 =?utf-8?B?WnFLVU9VazMvN2hJZUtNbHVBcGxkU0xHbTdhYjN2M0ZMMDJ1WVpkaGg4SDUy?=
 =?utf-8?B?dmlla1pSaUZ2MGx3bFZFUTVZZkVaaVJpY3U1UWF0MXNlK3JoRWowSm85NFpy?=
 =?utf-8?B?U2VNM0FLUnJ3aE5zaXNKdHhaU1VsK3JXMStKbUVHVDhlK1VIT0w0c1lNRmNZ?=
 =?utf-8?B?TkV1QmNjTFQ5aXJVcXRnZElFTXpqVjU0MWVpS2VBbEtBb0ppT1UwckxqeDFl?=
 =?utf-8?B?clZKWkRlNFRRbEwyckRLbVlPVGs2WmRtTmtzSTMveHN3d1dtRnhMcEk1SnBI?=
 =?utf-8?B?bXJDQ0JhVjlJRWtraXpuTVpZQkhkY2lKRVZiZWRtUENQakpPNHFUaFlpRlZY?=
 =?utf-8?B?Z2I2RkRLOGRzbFNiN2N6WnVwVjQyZUtQOElvQUQ0cFZWckxrbkJxUFI4TjVR?=
 =?utf-8?B?WTRqNzV3TmxwdDZUc2hIbFREbHNLZVpwV2NUcDQraE5ySCt1amdQc08rQ1Ay?=
 =?utf-8?B?ODlYaEhTWENpTmRTTWZNd0FoQ1IwVEIxV3MvdWtBR1NXRnVYSWxXbnVDOXhy?=
 =?utf-8?B?R2R3aHlOV2Z0ZVpleW1raytUUTlsZE9WaEhTWFFOQ2VnU0h0TXpJT1ZGTllM?=
 =?utf-8?B?dW44ZDFPU2g5SzJiSDQ4a1NCS0QxNUxyUFZIbXJUdXhYODBJVXBHdVNMdXZw?=
 =?utf-8?B?U24ydUtRdno1K1dBRmowWmZKVjJrbjBTQ2JiRmVYSnhCVTBzZ1RUd2VoeHhy?=
 =?utf-8?B?am12WlJ0eXl0dUs2S0FuWjNpUGN1THpZQi9IUm1uU2lCU21aaW81cjBsREEv?=
 =?utf-8?B?RFROQkN0TmRxYWkwZWdxTjZ3SHUxdU1iQy8zVW9kVGwwTzFEM0RRK042cFBS?=
 =?utf-8?B?c3daV3lramFUVnB6MWVncldNc3RIa2x1MjdxbG1TNkVMSGt6dm1POWd5bUNn?=
 =?utf-8?B?Y3laNU9tWG9Ha1I2Y20wMGVqclNSRGNZRktFQ0NJMWJUOGJTTGxXTTlHWjlS?=
 =?utf-8?B?cnRFTTNtOHBmZk11NW9rdUpTVHhyRTE0YjJCako3YkRRLzdJMVZFbnYwaFhx?=
 =?utf-8?B?WmhRakZETml6cm1NWVZ4dUNTUE5FRWlIOGY2d2dnWkdIRjBub05vVnk5a08v?=
 =?utf-8?B?cG1wOWVLWForUUpUVSszbGlGdXhMMnl2aWNVT3Z4ai9kV0hCcWphOERzVGRL?=
 =?utf-8?B?SGN3aDJaV1VzcGFUQ3o5VHcvNUdKem5TZXNVcERJbFVFOE9xOHFxS2F4dFpl?=
 =?utf-8?B?U3lWNlJMc1pMNGEyQWc4R1BQVXVjeHFjUER2S09kOWhnK3ovZU9LdUNjMEdh?=
 =?utf-8?B?MTBaSXdGNVhsRVBsTm5BTmM5VHdYak1naDJXeSt3VHlGNGF2WTA1UT09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a5ab47c6-9347-41f3-5752-08da12e4e16c
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 07:05:47.1569
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: K1f+Pvcshdr6jEfZJlq6GC1EoPw8uKZuf/gqmAsyJeM13Ixhmk5aKo75TFp8wQxMKlAb7SsHBbdHVXfwbAdFlQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA4PR04MB7869

On 31.03.2022 08:13, Penny Zheng wrote:
> Hi Jan
> 
>> -----Original Message-----
>> From: Jan Beulich <jbeulich@suse.com>
>> Sent: Wednesday, March 30, 2022 5:53 PM
>> To: Penny Zheng <Penny.Zheng@arm.com>
>> Cc: Wei Chen <Wei.Chen@arm.com>; Henry Wang <Henry.Wang@arm.com>;
>> Andrew Cooper <andrew.cooper3@citrix.com>; George Dunlap
>> <george.dunlap@citrix.com>; Julien Grall <julien@xen.org>; Stefano Stabellini
>> <sstabellini@kernel.org>; Wei Liu <wl@xen.org>; xen-
>> devel@lists.xenproject.org
>> Subject: Re: [PATCH v1 3/5] xen/arm: unpopulate memory when domain on
>> static allocation
>>
>> On 30.03.2022 11:36, Penny Zheng wrote:
>>> --- a/xen/common/memory.c
>>> +++ b/xen/common/memory.c
>>> @@ -35,6 +35,10 @@
>>>  #include <asm/guest.h>
>>>  #endif
>>>
>>> +#ifndef is_domain_on_static_allocation #define
>>> +is_domain_on_static_allocation(d) 0
>>
>> Nit: "false", not "0".
>>
>>> @@ -405,13 +409,29 @@ int guest_remove_page(struct domain *d,
>> unsigned long gmfn)
>>>       * device must retrieve the same pfn when the hypercall
>> populate_physmap
>>>       * is called.
>>>       *
>>> +     * When domain on static allocation, they should always get pages from
>> the
>>> +     * reserved static region when the hypercall populate_physmap is called.
>>> +     *
>>>       * For this purpose (and to match populate_physmap() behavior), the page
>>>       * is kept allocated.
>>>       */
>>> -    if ( !rc && !is_domain_direct_mapped(d) )
>>> +    if ( !rc && !(is_domain_direct_mapped(d) ||
>>> +                  is_domain_on_static_allocation(d)) )
>>>          put_page_alloc_ref(page);
>>>
>>>      put_page(page);
>>> +#ifdef CONFIG_STATIC_MEMORY
>>> +    /*
>>> +     * When domain on static allocation, we shall store pages to
>> resv_page_list,
>>> +     * so the hypercall populate_physmap could retrieve pages from it,
>>> +     * rather than allocating from heap.
>>> +     */
>>> +    if ( is_domain_on_static_allocation(d) )
>>> +    {
>>> +        page_list_add_tail(page, &d->resv_page_list);
>>> +        d->resv_pages++;
>>> +    }
>>> +#endif
>>
>> I think this is wrong, as a result of not integrating with put_page().
>> The page should only go on that list once its last ref was dropped. I don't recall
>> for sure, but iirc staticmem pages are put on the domain's page list just like
>> other pages would be. But then you also corrupt the list when this isn't the last
>> ref which is put.
> 
> Yes, staticmem pages are put on the domain's page list.
> Here, I tried to only destroy the P2M mapping, and keep the page still allocated
> to this domain.

Well, much depends on what you call "allocated". For populate_physmap
you then take pages from resv_page_list. So I'd like to distinguish
"allocated" from "reserved": The pages are allocated to the domain
when they're on the normal page list; they're reserved when they're
on the new list you introduce. And what you want to initiate here is
an "allocated" -> "reserved" transition.

> resv_page_list is just providing an easy way to track down the unpopulated memory. 
> '''
> But then you also corrupt the list when this isn't the last
> ref which is put.
> '''
> I'm sorry, would you like to be more specific on this comment?
> I want these pages to linked in the domain's page list, then it could be
> freed properly when domain get destroyed through relinquish_memory.

Clearly they can't be on both lists. Hence you can put them on the
new list only _after_ having taken them off the "normal" list. That
"taking off the normal list" should happen when the last ref is
dropped, not here - see free_domheap_pages()'s uses of
arch_free_heap_page(), recalling that free_domheap_page() is what
put_page() calls upon dropping the last ref.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 07:08:02 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 07:08:02 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296694.505107 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZouX-0000Eg-2X; Thu, 31 Mar 2022 07:08:01 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296694.505107; Thu, 31 Mar 2022 07:08:01 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZouW-0000EY-VR; Thu, 31 Mar 2022 07:08:00 +0000
Received: by outflank-mailman (input) for mailman id 296694;
 Thu, 31 Mar 2022 07:07:59 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=8eLM=UK=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nZouV-0000EQ-Fz
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 07:07:59 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 4b7b5499-b0c1-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 09:07:58 +0200 (CEST)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 2435D1F7AB;
 Thu, 31 Mar 2022 07:07:58 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id F1CC6139C2;
 Thu, 31 Mar 2022 07:07:57 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id roseOU1TRWKFWQAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 31 Mar 2022 07:07:57 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4b7b5499-b0c1-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648710478; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:  content-transfer-encoding:content-transfer-encoding;
	bh=CwodxS3v8TjpSSyOje93Qv45jgmGMLCbfJozxFKuEgM=;
	b=PA+bHPWIdk9nhXbhoq7yMEvGCAcB45g8Crb89kFO1mptexKHe4055co4IY5X61LgAjh1mO
	Ekght1o9/cJNr1QF+MivH01A2az8+5scxLxUd/IWCfX6LZzrP/QqISWbj2NA1OtgTBfgId
	7tfNv8kgCXvZAOUEssQHxEOIUrM/jKc=
From: Juergen Gross <jgross@suse.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
	Wei Liu <wl@xen.org>,
	Anthony PERARD <anthony.perard@citrix.com>
Subject: [PATCH] tools/libs/light: update xenstore entry when setting max domain memory
Date: Thu, 31 Mar 2022 09:07:55 +0200
Message-Id: <20220331070755.10894-1-jgross@suse.com>
X-Mailer: git-send-email 2.34.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

libxl_domain_setmaxmem() should update the domain's memory/static-max
Xenstore node, as otherwise "xl mem-set" won't be able to set the
memory size to the new maximum.

Signed-off-by: Juergen Gross <jgross@suse.com>
---
 tools/libs/light/libxl_mem.c | 9 +++++++++
 1 file changed, 9 insertions(+)

diff --git a/tools/libs/light/libxl_mem.c b/tools/libs/light/libxl_mem.c
index c739d00f39..2f4f9d4a4a 100644
--- a/tools/libs/light/libxl_mem.c
+++ b/tools/libs/light/libxl_mem.c
@@ -82,6 +82,15 @@ int libxl_domain_setmaxmem(libxl_ctx *ctx, uint32_t domid, uint64_t max_memkb)
         goto out;
     }
 
+    rc = libxl__xs_printf(gc, XBT_NULL,
+                          GCSPRINTF("%s/memory/static-max", dompath),
+                          "%"PRIu64, max_memkb);
+    if (rc != 0) {
+        LOGED(ERROR, domid, "Couldn't set %s/memory/static-max, rc=%d\n",
+              dompath, rc);
+        goto out;
+    }
+
     rc = 0;
 out:
     libxl_domain_config_dispose(&d_config);
-- 
2.34.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 07:14:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 07:14:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296706.505122 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZp14-0001nW-VV; Thu, 31 Mar 2022 07:14:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296706.505122; Thu, 31 Mar 2022 07:14:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZp14-0001nP-SK; Thu, 31 Mar 2022 07:14:46 +0000
Received: by outflank-mailman (input) for mailman id 296706;
 Thu, 31 Mar 2022 07:14:45 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=nUkb=UK=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nZp12-0001n6-Uo
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 07:14:44 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id 3ce4d396-b0c2-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 09:14:43 +0200 (CEST)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id DFA6123A;
 Thu, 31 Mar 2022 00:14:42 -0700 (PDT)
Received: from e129167.arm.com (unknown [10.57.7.5])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 7C1913F66F;
 Thu, 31 Mar 2022 00:14:40 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3ce4d396-b0c2-11ec-a405-831a346695d4
From: Michal Orzel <michal.orzel@arm.com>
To: xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>
Subject: [PATCH v3 0/2] xen: Linker scripts synchronization
Date: Thu, 31 Mar 2022 09:14:23 +0200
Message-Id: <20220331071425.49141-1-michal.orzel@arm.com>
X-Mailer: git-send-email 2.25.1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

This patch series aims to do the first step towards linker scripts
synchronization. Linker scripts for arm and x86 share a lot of common
sections and in order to make the process of changing/improving/syncing
them, these sections shall be defined in just one place.

The first patch creates an empty header file xen.lds.h to store the
constructs mutual to both x86 and arm linker scripts. It also includes
this header in the scripts.

The second patch populates xen.lds.h with the first portion of common
macros and replaces the original contructs with these helpers.

Michal Orzel (2):
  xen: Introduce a header to store common linker scripts content
  xen: Populate xen.lds.h and make use of its macros

 xen/arch/arm/xen.lds.S    |  45 +++----------
 xen/arch/x86/xen.lds.S    |  97 +++------------------------
 xen/include/xen/xen.lds.h | 137 ++++++++++++++++++++++++++++++++++++++
 3 files changed, 157 insertions(+), 122 deletions(-)
 create mode 100644 xen/include/xen/xen.lds.h

-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 07:14:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 07:14:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296707.505133 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZp16-00023A-6b; Thu, 31 Mar 2022 07:14:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296707.505133; Thu, 31 Mar 2022 07:14:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZp16-000231-3I; Thu, 31 Mar 2022 07:14:48 +0000
Received: by outflank-mailman (input) for mailman id 296707;
 Thu, 31 Mar 2022 07:14:47 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=nUkb=UK=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nZp15-0001n6-5K
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 07:14:47 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id 3e8d499e-b0c2-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 09:14:46 +0200 (CEST)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 9355423A;
 Thu, 31 Mar 2022 00:14:45 -0700 (PDT)
Received: from e129167.arm.com (unknown [10.57.7.5])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 440203F66F;
 Thu, 31 Mar 2022 00:14:43 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3e8d499e-b0c2-11ec-a405-831a346695d4
From: Michal Orzel <michal.orzel@arm.com>
To: xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>
Subject: [PATCH v3 1/2] xen: Introduce a header to store common linker scripts content
Date: Thu, 31 Mar 2022 09:14:24 +0200
Message-Id: <20220331071425.49141-2-michal.orzel@arm.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <20220331071425.49141-1-michal.orzel@arm.com>
References: <20220331071425.49141-1-michal.orzel@arm.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Both x86 and arm linker scripts share quite a lot of common content.
It is difficult to keep syncing them up, thus introduce a new header
in include/xen called xen.lds.h to store the internals mutual to all
the linker scripts.

Include this header in linker scripts for x86 and arm.
This patch serves as an intermediate step before populating xen.lds.h
and making use of its content in the linker scripts later on.

Signed-off-by: Michal Orzel <michal.orzel@arm.com>
Acked-by: Jan Beulich <jbeulich@suse.com>
---
Changes since v2:
-none
Changes since v1:
-rename header to xen.lds.h to be coherent with Linux kernel
-include empty header in linker scripts
---
 xen/arch/arm/xen.lds.S    | 1 +
 xen/arch/x86/xen.lds.S    | 1 +
 xen/include/xen/xen.lds.h | 8 ++++++++
 3 files changed, 10 insertions(+)
 create mode 100644 xen/include/xen/xen.lds.h

diff --git a/xen/arch/arm/xen.lds.S b/xen/arch/arm/xen.lds.S
index 7921d8fa28..c666fc3e69 100644
--- a/xen/arch/arm/xen.lds.S
+++ b/xen/arch/arm/xen.lds.S
@@ -3,6 +3,7 @@
 /* Modified for ARM Xen by Ian Campbell */
 
 #include <xen/cache.h>
+#include <xen/xen.lds.h>
 #include <asm/page.h>
 #undef ENTRY
 #undef ALIGN
diff --git a/xen/arch/x86/xen.lds.S b/xen/arch/x86/xen.lds.S
index 3f9f633f55..3e65c09bb3 100644
--- a/xen/arch/x86/xen.lds.S
+++ b/xen/arch/x86/xen.lds.S
@@ -2,6 +2,7 @@
 /* Modified for i386/x86-64 Xen by Keir Fraser */
 
 #include <xen/cache.h>
+#include <xen/xen.lds.h>
 #include <asm/page.h>
 #undef ENTRY
 #undef ALIGN
diff --git a/xen/include/xen/xen.lds.h b/xen/include/xen/xen.lds.h
new file mode 100644
index 0000000000..dd292fa7dc
--- /dev/null
+++ b/xen/include/xen/xen.lds.h
@@ -0,0 +1,8 @@
+#ifndef __XEN_LDS_H__
+#define __XEN_LDS_H__
+
+/*
+ * Common macros to be used in architecture specific linker scripts.
+ */
+
+#endif /* __XEN_LDS_H__ */
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 07:14:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 07:14:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296708.505144 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZp1A-0002M8-En; Thu, 31 Mar 2022 07:14:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296708.505144; Thu, 31 Mar 2022 07:14:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZp1A-0002Lv-BC; Thu, 31 Mar 2022 07:14:52 +0000
Received: by outflank-mailman (input) for mailman id 296708;
 Thu, 31 Mar 2022 07:14:50 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=nUkb=UK=arm.com=michal.orzel@srs-se1.protection.inumbo.net>)
 id 1nZp18-0001n6-Mf
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 07:14:50 +0000
Received: from foss.arm.com (foss.arm.com [217.140.110.172])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTP
 id 404edad2-b0c2-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 09:14:49 +0200 (CEST)
Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14])
 by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id A8F8813D5;
 Thu, 31 Mar 2022 00:14:48 -0700 (PDT)
Received: from e129167.arm.com (unknown [10.57.7.5])
 by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 09CB23F66F;
 Thu, 31 Mar 2022 00:14:45 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 404edad2-b0c2-11ec-a405-831a346695d4
From: Michal Orzel <michal.orzel@arm.com>
To: xen-devel@lists.xenproject.org
Cc: Stefano Stabellini <sstabellini@kernel.org>,
	Julien Grall <julien@xen.org>,
	Bertrand Marquis <bertrand.marquis@arm.com>,
	Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	George Dunlap <george.dunlap@citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	Wei Liu <wl@xen.org>,
	=?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= <roger.pau@citrix.com>
Subject: [PATCH v3 2/2] xen: Populate xen.lds.h and make use of its macros
Date: Thu, 31 Mar 2022 09:14:25 +0200
Message-Id: <20220331071425.49141-3-michal.orzel@arm.com>
X-Mailer: git-send-email 2.25.1
In-Reply-To: <20220331071425.49141-1-michal.orzel@arm.com>
References: <20220331071425.49141-1-michal.orzel@arm.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit

Populate header file xen.lds.h with the first portion of macros storing
constructs common to x86 and arm linker scripts. Replace the original
constructs with these helpers.

No functional improvements to x86 linker script.

Making use of common macros improves arm linker script with:
- explicit list of debug sections that otherwise are seen as "orphans"
  by the linker. This will allow to fix issues after enabling linker
  option --orphan-handling one day,
- extended list of discarded section to include: .discard, destructors
  related sections, .fini_array which can reference .text.exit,
- sections not related to debugging that are placed by ld.lld. Even
  though we do not support linking with LLD on Arm, these sections do
  not cause problem to GNU ld.

Please note that this patch does not aim to perform the full sync up
between the linker scripts. It creates a base for further work.

Signed-off-by: Michal Orzel <michal.orzel@arm.com>
---
Changes since v2:
-refactor commit msg
-move constructs together with surrounding ifdefery
-list constructs other than *_SECTIONS in alphabetical order
-add comment about EFI vs EFI support
Changes since v1:
-merge x86 and arm changes into single patch
-do not propagate issues by generalizing CTORS
-extract sections not related to debugging into separate macro
-get rid of _SECTION suffix in favor of using more meaningful suffixes
---
 xen/arch/arm/xen.lds.S    |  44 +++----------
 xen/arch/x86/xen.lds.S    |  96 +++-------------------------
 xen/include/xen/xen.lds.h | 129 ++++++++++++++++++++++++++++++++++++++
 3 files changed, 147 insertions(+), 122 deletions(-)

diff --git a/xen/arch/arm/xen.lds.S b/xen/arch/arm/xen.lds.S
index c666fc3e69..649aa04f7f 100644
--- a/xen/arch/arm/xen.lds.S
+++ b/xen/arch/arm/xen.lds.S
@@ -68,12 +68,7 @@ SECTIONS
        *(.proc.info)
        __proc_info_end = .;
 
-#ifdef CONFIG_HAS_VPCI
-       . = ALIGN(POINTER_ALIGN);
-       __start_vpci_array = .;
-       *(SORT(.data.vpci.*))
-       __end_vpci_array = .;
-#endif
+       VPCI_ARRAY
   } :text
 
 #if defined(BUILD_ID)
@@ -109,12 +104,7 @@ SECTIONS
        *(.data.schedulers)
        __end_schedulers_array = .;
 
-#ifdef CONFIG_HYPFS
-       . = ALIGN(8);
-       __paramhypfs_start = .;
-       *(.data.paramhypfs)
-       __paramhypfs_end = .;
-#endif
+       HYPFS_PARAM
 
        *(.data .data.*)
        CONSTRUCTORS
@@ -178,12 +168,7 @@ SECTIONS
        *(.altinstructions)
        __alt_instructions_end = .;
 
-#ifdef CONFIG_DEBUG_LOCK_PROFILE
-       . = ALIGN(POINTER_ALIGN);
-       __lock_profile_start = .;
-       *(.lockprofile.data)
-       __lock_profile_end = .;
-#endif
+       LOCK_PROFILE_DATA
 
        *(.init.data)
        *(.init.data.rel)
@@ -222,22 +207,13 @@ SECTIONS
   /* Section for the device tree blob (if any). */
   .dtb : { *(.dtb) } :text
 
-  /* Sections to be discarded */
-  /DISCARD/ : {
-       *(.exit.text)
-       *(.exit.data)
-       *(.exitcall.exit)
-       *(.eh_frame)
-  }
-
-  /* Stabs debugging sections.  */
-  .stab 0 : { *(.stab) }
-  .stabstr 0 : { *(.stabstr) }
-  .stab.excl 0 : { *(.stab.excl) }
-  .stab.exclstr 0 : { *(.stab.exclstr) }
-  .stab.index 0 : { *(.stab.index) }
-  .stab.indexstr 0 : { *(.stab.indexstr) }
-  .comment 0 : { *(.comment) }
+  DWARF2_DEBUG_SECTIONS
+
+  DISCARD_SECTIONS
+
+  STABS_DEBUG_SECTIONS
+
+  ELF_DETAILS_SECTIONS
 }
 
 /*
diff --git a/xen/arch/x86/xen.lds.S b/xen/arch/x86/xen.lds.S
index 3e65c09bb3..65cc4c9231 100644
--- a/xen/arch/x86/xen.lds.S
+++ b/xen/arch/x86/xen.lds.S
@@ -13,13 +13,6 @@
 #undef __XEN_VIRT_START
 #define __XEN_VIRT_START __image_base__
 #define DECL_SECTION(x) x :
-/*
- * Use the NOLOAD directive, despite currently ignored by (at least) GNU ld
- * for PE output, in order to record that we'd prefer these sections to not
- * be loaded into memory.
- */
-#define DECL_DEBUG(x, a) #x ALIGN(a) (NOLOAD) : { *(x) }
-#define DECL_DEBUG2(x, y, a) #x ALIGN(a) (NOLOAD) : { *(x) *(y) }
 
 ENTRY(efi_start)
 
@@ -27,8 +20,6 @@ ENTRY(efi_start)
 
 #define FORMAT "elf64-x86-64"
 #define DECL_SECTION(x) #x : AT(ADDR(#x) - __XEN_VIRT_START)
-#define DECL_DEBUG(x, a) #x 0 : { *(x) }
-#define DECL_DEBUG2(x, y, a) #x 0 : { *(x) *(y) }
 
 ENTRY(start_pa)
 
@@ -159,12 +150,7 @@ SECTIONS
        *(.note.gnu.build-id)
        __note_gnu_build_id_end = .;
 #endif
-#ifdef CONFIG_HAS_VPCI
-       . = ALIGN(POINTER_ALIGN);
-       __start_vpci_array = .;
-       *(SORT(.data.vpci.*))
-       __end_vpci_array = .;
-#endif
+       VPCI_ARRAY
   } PHDR(text)
 
 #if defined(CONFIG_PVH_GUEST) && !defined(EFI)
@@ -278,12 +264,7 @@ SECTIONS
         *(.altinstructions)
         __alt_instructions_end = .;
 
-#ifdef CONFIG_DEBUG_LOCK_PROFILE
-       . = ALIGN(POINTER_ALIGN);
-       __lock_profile_start = .;
-       *(.lockprofile.data)
-       __lock_profile_end = .;
-#endif
+       LOCK_PROFILE_DATA
 
        . = ALIGN(8);
        __ctors_start = .;
@@ -335,12 +316,7 @@ SECTIONS
        *(.data.schedulers)
        __end_schedulers_array = .;
 
-#ifdef CONFIG_HYPFS
-       . = ALIGN(8);
-       __paramhypfs_start = .;
-       *(.data.paramhypfs)
-       __paramhypfs_end = .;
-#endif
+       HYPFS_PARAM
   } PHDR(text)
 
   DECL_SECTION(.data) {
@@ -387,33 +363,7 @@ SECTIONS
   efi = .;
 #endif
 
-  /*
-   * Explicitly list debug sections, first of all to avoid these sections being
-   * viewed as "orphan" by the linker.
-   *
-   * For the PE output this is further necessary so that they don't end up at
-   * VA 0, which is below image base and thus invalid.  Note that we're past
-   * _end here, so if these sections get loaded they'll be discarded at runtime
-   * anyway.
-   */
-  DECL_DEBUG(.debug_abbrev, 1)
-  DECL_DEBUG2(.debug_info, .gnu.linkonce.wi.*, 1)
-  DECL_DEBUG(.debug_types, 1)
-  DECL_DEBUG(.debug_str, 1)
-  DECL_DEBUG2(.debug_line, .debug_line.*, 1)
-  DECL_DEBUG(.debug_line_str, 1)
-  DECL_DEBUG(.debug_names, 4)
-  DECL_DEBUG(.debug_frame, 4)
-  DECL_DEBUG(.debug_loc, 1)
-  DECL_DEBUG(.debug_loclists, 4)
-  DECL_DEBUG(.debug_macinfo, 1)
-  DECL_DEBUG(.debug_macro, 1)
-  DECL_DEBUG(.debug_ranges, 8)
-  DECL_DEBUG(.debug_rnglists, 4)
-  DECL_DEBUG(.debug_addr, 8)
-  DECL_DEBUG(.debug_aranges, 1)
-  DECL_DEBUG(.debug_pubnames, 1)
-  DECL_DEBUG(.debug_pubtypes, 1)
+  DWARF2_DEBUG_SECTIONS
 
 #ifdef EFI
   /* Trick the linker into setting the image size to no less than 16Mb. */
@@ -427,42 +377,12 @@ SECTIONS
   hv_hcall_page = ABSOLUTE(HV_HCALL_PAGE - XEN_VIRT_START + __XEN_VIRT_START);
 #endif
 
-  /* Sections to be discarded */
-  /DISCARD/ : {
-       *(.text.exit)
-       *(.exit.text)
-       *(.exit.data)
-       *(.exitcall.exit)
-       *(.discard)
-       *(.discard.*)
-       *(.eh_frame)
-       *(.dtors)
-       *(.dtors.*)
-       *(.fini_array)
-       *(.fini_array.*)
-#ifdef EFI
-       *(.comment)
-       *(.comment.*)
-       *(.note.*)
-#endif
-  }
+  DISCARD_SECTIONS
 
 #ifndef EFI
-  /* Stabs debugging sections.  */
-  .stab 0 : { *(.stab) }
-  .stabstr 0 : { *(.stabstr) }
-  .stab.excl 0 : { *(.stab.excl) }
-  .stab.exclstr 0 : { *(.stab.exclstr) }
-  .stab.index 0 : { *(.stab.index) }
-  .stab.indexstr 0 : { *(.stab.indexstr) }
-  .comment 0 : { *(.comment) *(.comment.*) }
-  /*
-   * LLVM ld also wants .symtab, .strtab, and .shstrtab placed. These look to
-   * be benign to GNU ld, so we can have them here unconditionally.
-   */
-  .symtab 0 : { *(.symtab) }
-  .strtab 0 : { *(.strtab) }
-  .shstrtab 0 : { *(.shstrtab) }
+  STABS_DEBUG_SECTIONS
+
+  ELF_DETAILS_SECTIONS
 #endif
 }
 
diff --git a/xen/include/xen/xen.lds.h b/xen/include/xen/xen.lds.h
index dd292fa7dc..7fe7c5ad44 100644
--- a/xen/include/xen/xen.lds.h
+++ b/xen/include/xen/xen.lds.h
@@ -5,4 +5,133 @@
  * Common macros to be used in architecture specific linker scripts.
  */
 
+/*
+ * To avoid any confusion, please note that the EFI macro does not correspond
+ * to EFI support and is used when linking a native EFI (i.e. PE/COFF) binary,
+ * hence its usage in this header.
+ */
+
+/* Macros to declare debug sections. */
+#ifdef EFI
+/*
+ * Use the NOLOAD directive, despite currently ignored by (at least) GNU ld
+ * for PE output, in order to record that we'd prefer these sections to not
+ * be loaded into memory.
+ */
+#define DECL_DEBUG(x, a) #x ALIGN(a) (NOLOAD) : { *(x) }
+#define DECL_DEBUG2(x, y, a) #x ALIGN(a) (NOLOAD) : { *(x) *(y) }
+#else
+#define DECL_DEBUG(x, a) #x 0 : { *(x) }
+#define DECL_DEBUG2(x, y, a) #x 0 : { *(x) *(y) }
+#endif
+
+/*
+ * DWARF2+ debug sections.
+ * Explicitly list debug sections, first of all to avoid these sections being
+ * viewed as "orphan" by the linker.
+ *
+ * For the PE output this is further necessary so that they don't end up at
+ * VA 0, which is below image base and thus invalid. Note that this macro is
+ * to be used after _end, so if these sections get loaded they'll be discarded
+ * at runtime anyway.
+ */
+#define DWARF2_DEBUG_SECTIONS                     \
+  DECL_DEBUG(.debug_abbrev, 1)                    \
+  DECL_DEBUG2(.debug_info, .gnu.linkonce.wi.*, 1) \
+  DECL_DEBUG(.debug_types, 1)                     \
+  DECL_DEBUG(.debug_str, 1)                       \
+  DECL_DEBUG2(.debug_line, .debug_line.*, 1)      \
+  DECL_DEBUG(.debug_line_str, 1)                  \
+  DECL_DEBUG(.debug_names, 4)                     \
+  DECL_DEBUG(.debug_frame, 4)                     \
+  DECL_DEBUG(.debug_loc, 1)                       \
+  DECL_DEBUG(.debug_loclists, 4)                  \
+  DECL_DEBUG(.debug_macinfo, 1)                   \
+  DECL_DEBUG(.debug_macro, 1)                     \
+  DECL_DEBUG(.debug_ranges, 8)                    \
+  DECL_DEBUG(.debug_rnglists, 4)                  \
+  DECL_DEBUG(.debug_addr, 8)                      \
+  DECL_DEBUG(.debug_aranges, 1)                   \
+  DECL_DEBUG(.debug_pubnames, 1)                  \
+  DECL_DEBUG(.debug_pubtypes, 1)
+
+/* Stabs debug sections. */
+#define STABS_DEBUG_SECTIONS                 \
+  .stab 0 : { *(.stab) }                     \
+  .stabstr 0 : { *(.stabstr) }               \
+  .stab.excl 0 : { *(.stab.excl) }           \
+  .stab.exclstr 0 : { *(.stab.exclstr) }     \
+  .stab.index 0 : { *(.stab.index) }         \
+  .stab.indexstr 0 : { *(.stab.indexstr) }
+
+/*
+ * Required sections not related to debugging.
+ *
+ * LLVM ld also wants .symtab, .strtab, and .shstrtab placed. These look to
+ * be benign to GNU ld, so we can have them here unconditionally.
+ */
+#define ELF_DETAILS_SECTIONS                 \
+  .comment 0 : { *(.comment) *(.comment.*) } \
+  .symtab 0 : { *(.symtab) }                 \
+  .strtab 0 : { *(.strtab) }                 \
+  .shstrtab 0 : { *(.shstrtab) }
+
+#ifdef EFI
+#define DISCARD_EFI_SECTIONS \
+       *(.comment)   \
+       *(.comment.*) \
+       *(.note.*)
+#else
+#define DISCARD_EFI_SECTIONS
+#endif
+
+/* Sections to be discarded. */
+#define DISCARD_SECTIONS     \
+  /DISCARD/ : {              \
+       *(.text.exit)         \
+       *(.exit.text)         \
+       *(.exit.data)         \
+       *(.exitcall.exit)     \
+       *(.discard)           \
+       *(.discard.*)         \
+       *(.eh_frame)          \
+       *(.dtors)             \
+       *(.dtors.*)           \
+       *(.fini_array)        \
+       *(.fini_array.*)      \
+       DISCARD_EFI_SECTIONS  \
+  }
+
+/* List of constructs other than *_SECTIONS in alphabetical order. */
+
+#ifdef CONFIG_HYPFS
+#define HYPFS_PARAM              \
+       . = ALIGN(POINTER_ALIGN); \
+       __paramhypfs_start = .;   \
+       *(.data.paramhypfs)       \
+       __paramhypfs_end = .;
+#else
+#define HYPFS_PARAM
+#endif
+
+#ifdef CONFIG_DEBUG_LOCK_PROFILE
+#define LOCK_PROFILE_DATA        \
+       . = ALIGN(POINTER_ALIGN); \
+       __lock_profile_start = .; \
+       *(.lockprofile.data)      \
+       __lock_profile_end = .;
+#else
+#define LOCK_PROFILE_DATA
+#endif
+
+#ifdef CONFIG_HAS_VPCI
+#define VPCI_ARRAY               \
+       . = ALIGN(POINTER_ALIGN); \
+       __start_vpci_array = .;   \
+       *(SORT(.data.vpci.*))     \
+       __end_vpci_array = .;
+#else
+#define VPCI_ARRAY
+#endif
+
 #endif /* __XEN_LDS_H__ */
-- 
2.25.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 08:01:23 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 08:01:23 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296730.505155 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZpk4-00009j-0e; Thu, 31 Mar 2022 08:01:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296730.505155; Thu, 31 Mar 2022 08:01:15 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZpk3-00009c-Tp; Thu, 31 Mar 2022 08:01:15 +0000
Received: by outflank-mailman (input) for mailman id 296730;
 Thu, 31 Mar 2022 08:01:14 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=lDhN=UK=citrix.com=prvs=08274bcc4=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nZpk2-00009V-Od
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 08:01:14 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id b93b4088-b0c8-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 10:01:10 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: b93b4088-b0c8-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648713672;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=cZ0wN+h63gmvpU+/aLQvrJz1HwwXX1Kpvu92wYQiQ7E=;
  b=RREQfJatgR8hynxpPkCS4ZFAzapeZzagRD+DoM8mXpUFTMGU/JOxHEs6
   v14aJnlSmOVZ9JhVKx7ijtXOGVrpw9n6ftWNofl1ZvJKZaEEe4pgppCKx
   9YPx3AmWLHIifreNLspuWJJeyCMZuRHDPLy0kBXp94/ZueShBTddAdklg
   0=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 68034510
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:rrRcBazT+JJLjlNeyUd6t+cOxirEfRIJ4+MujC+fZmUNrF6WrkVTn
 zEeWW/TOq3eMTPzKN9wPYyyoU1QuJbVyN9iQVNsrSAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2oHhWmthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 Npl5ZnrClYFNb/1nMc/eURkEy9SIrRM5+qSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DJoQQt2sm1TjEJf0nXYrCU+PB4towMDIY2JAWRqqDP
 pJxhTxHfBPCWiZoEW4rUpsjwfX1vkuuTztFtwfAzUYwyzeKl1EguFT3C/LKfvSaSMMTmVyXz
 krK+GnzDxUyPdmW2z2DtH6h7sfMmiXhUY5UC7y89dZtmlSYwmFVAxoTPXO5q/Skjk+1W/pEN
 lcZvCEpqMAa5EGtC9XwQRC8iHqFpQIHHcpdFfUg7wOAwbaS5ByWblXoVRYYNoZg7pVvA2V3i
 BnZxLsFGACDrpXFTCnep5ufvwq2Ggo/cFMCawMbVAEatoyLTJ4IsjrDSdNqEaiQh9LzGC3tz
 z3ikBXSl4n/nuZQifzloAmvbyaE48GQE1Vrvlm/sneNtFsRWWKzW2C/BbE3B95kJZ3RcFSOt
 WNsdyO2vLFXVsHleMBgrYww8FCVCxStbWW0bb1HRcBJG9GRF5iLJ9o4DNZWfhsBDyr8UWW1C
 HI/QCsIjHOpAFOkbLVsf6W6ANkwwK7rGLzND66IPoQQP8cvLlLYoUmCgHJ8OUi3yiDAdollZ
 P+mnTuEVy5GWcyLMhLoLwvi7VPb7n9nnj6CLXwK5x+mzaCfdBaopUQtazOzghQCxPrc+m39q
 o8HX+PTkkk3eLCuM0H/rN9IRXhXfCdTOHwDg5EOHgJ1ClE9Qz9J5j646e5JRrGJaIwOyL+Sp
 yvtCxIAoLc97FWeQTi3hrlYQOqHdb50rG4hPDxqOlCt2nM5Zp2o4rtZfJwyFYTLPsQ/pRKoZ
 5Hpo/m9P8k=
IronPort-HdrOrdr: A9a23:t/6CYKkJo2CLColDybi+6QPu2bTpDfPOimdD5ihNYBxZY6Wkfp
 +V88jzhCWZtN9OYhwdcLC7WZVpQRvnhPlICK0qTM2ftW7dyRaVxeBZnPDfKljbdREWmdQtt5
 uIH5IObeEYSGIK8foSgzPIYurIouP3iZxA7N22pxwGLXAIV0gj1XYANu/yKDwJeOAsP+teKH
 Pz3Lsim9L2Ek5nEfhTS0N1F9TrlpnurtbLcBQGDxko5E2nii6p0qfzF1y90g0FWz1C7L8++S
 yd+jaJrJmLgrWe8FvxxmXT55NZlJ/IzcZCPtWFjowwJi/3ggilSYx9U/mpvSwzosuo9FE2+e
 O86CsIDoBW0Tf8b2u1qRzi103J1ysv0WbrzRuijX7qsaXCNUUHIvsEobgcXgrS6kImst05+r
 lMxXilu51eCg6FtDjh5vDTPisa2XackD4Hq6o+nnZfWYwRZPt6tooE5n5YF58GAWbT9J0nKu
 9zF8vRjcwmPW9yV0qp/1WH/ebcHkjaRny9Mws/U42uonVrdUlCvgUlLJd1pAZDyHo/I6M0k9
 gsfJ4Y0Y2mdfVmHp6VNN1xMfdfNVa9My4kEFjiV2gPR5t3ck4klfbMkcAIDaeRCdg18Kc=
X-IronPort-AV: E=Sophos;i="5.90,224,1643691600"; 
   d="scan'208";a="68034510"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=U5EDw//RN36Z+L0+Kj7+918lssb3tinL3H6lcd+oqvwx1sYy7Z9HJLgAa1NoVVcMvCnXFDi28CQGEloqVX3BSxV/qbNU1Nu3fnrPOTc4y8s6kn7Djyz9U9Tk1BkXfChUYw9XYNoMdUvbBBVj5bBLdejSei1npJaiGhXxpfyMDZyK/DiH7bXh32uhI+UP7XzPP0iO2yOHyLn+vYtVCXRDds/UC78fUVvkaXa4iJZS0lQ7QVLTGpfdh/BjkXOfWye6/ZKvXNd4bhqBWxPxlHHhAfV7Bp0juyox7MFZHbv+fFxJ+tTjHNCTBdW8XcTlYhXxBkUgJCEGxzxrfwZbrRaW6A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=FXUm0VfgaPvBqvudQYhLxa+evzl/IKxgQ7j114KUJM8=;
 b=dBZjbMdeXDYj9IeBjd4Dkl7il/NF3XnxNScwl+R+/Hgsr15Z3uAlY6B1iyhgrllKKauiPBNC47YyLkvKogYZcd16EAOoCNzb5EPunakm5TRr4p8PWKoOhwq57C3J3dQmRn4Oq0NYuTrE+x9S1B6CWwOr+0q59Be3oebciW+zlesZAo5d/OqaJnnFTXldrcogcQwjtmkYbTZMUsNq0rEiCjXhC/AjSRo+4H+YotdW4yRMLtivI2GM/CLVQIGkJ0MPho4hpZ4akTVeAfj9qLtYGcOem181Jj3qLToQi2uVIRbyQD2Ex1FAfe8r2Urw6oA/egy6Blswe6jS4IAQw+CzUA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=FXUm0VfgaPvBqvudQYhLxa+evzl/IKxgQ7j114KUJM8=;
 b=RdpTynb1tlsd4gSooQMUPzqnRyhmeSX02W0K0Um+lpW9IHf3dI+rB2Y7keVEFXysAbYINpo6BFxQt6tUIPM19cpCyvk1Fj9jkjnp/lHNCM2XyzoFHPqxNfsKT7w96tsC5ei7OqaJP9zQ3fIQnAU7O2QNTOhtalufWK7IpWoyQ74=
Date: Thu, 31 Mar 2022 10:01:01 +0200
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Ross
 Lagerwall <ross.lagerwall@citrix.com>, Konrad Wilk <konrad.wilk@oracle.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>, Bjoern
 Doebel <doebel@amazon.de>
Subject: Re: [PATCH v2] livepatch: account for patch offset when applying NOP
 patch
Message-ID: <YkVfvW6HiST3fIgs@Air-de-Roger>
References: <772f0afc-64db-6b98-af49-bd970ac78cbb@suse.com>
 <YkSNm0mb47Vc6nGr@Air-de-Roger>
 <a6f18801-7959-8fc8-f414-8086ed74ab3a@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <a6f18801-7959-8fc8-f414-8086ed74ab3a@suse.com>
X-ClientProxiedBy: MR1P264CA0078.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:501:3f::24) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 15c9949d-761f-4b8d-1442-08da12ec9c65
X-MS-TrafficTypeDiagnostic: BN7PR03MB4306:EE_
X-Microsoft-Antispam-PRVS: <BN7PR03MB4306A847A4E7C7BE930C9A778FE19@BN7PR03MB4306.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(86362001)(186003)(83380400001)(38100700002)(6486002)(8676002)(508600001)(6916009)(26005)(66946007)(316002)(66476007)(82960400001)(66556008)(4326008)(6506007)(6512007)(33716001)(54906003)(6666004)(85182001)(53546011)(5660300002)(8936002)(9686003)(2906002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?VmZTMXpsMWl2TXVKaTArczlnbTB4U2loNW9yaE1aZkYzZ1ZQNnZFL0pIRVov?=
 =?utf-8?B?L3FESC93eGNURmUrOWZlOUZLRktKSjZ6ZCtpYnhSaWRJbGhHRUl2cW9IMDQ3?=
 =?utf-8?B?ZnRWZ3N3TGxvbXUvNWZsV2VwTG51QW1mRG05Q2FNQmgwbmFqSVJqeXdjV1px?=
 =?utf-8?B?UmdkUEhtN2Jsb0NWU3AzZ0ZQc0E5elJRWjltb01BMVVPcHJLUjJQN2ZlUHBO?=
 =?utf-8?B?K2JrbklLTE9vQXdUMkxkSWplZ2tLeityT25iNDAvYWVLYktOeWZHL0dHQkor?=
 =?utf-8?B?SXcrV21sYVdrS0RXYjNqS0E5OExoKzFtQkIzaGYrNmJlSUREV1lDZWxvQ0lD?=
 =?utf-8?B?VWV6SXI4RXdvWWtFdVNJZXNQb1Z4UkdiUFU1NzZibDlMeDNhQ2tETWJTNWNG?=
 =?utf-8?B?U2ZaSm5Ldm55TWM4eVNrVmY0V3NndkNxNUUydUtIYjhUeHU0dmJYT1VWTkJt?=
 =?utf-8?B?UDJkUUNPSzBMbVl2cFVYTU16Vm9yQXNqU0w2bVN0VTlsQ0FKa2JjT2VPRU1F?=
 =?utf-8?B?MUlUSXFGajBzUEk1cVhUS1VYaDlLeFNwSVNlYU9rd05PWERHQW5lWlNONCtV?=
 =?utf-8?B?SzFHa3lnTlNBVWxWRGZlbGhLVXNKcEUreHpBSXVJTjd3dXJVV3RmU0VXbjU4?=
 =?utf-8?B?NkpZdkx5bHYvUWQrNTNENDVHYU5Mdm5LSURQZkFoWlFvV0RTbkdTMnc1blM2?=
 =?utf-8?B?eFhxRlBXVWxNalVjSGVZdXJZVVQ5SUI5Mnd0dmE1SjREcVhTWjdEOFhDY2lW?=
 =?utf-8?B?WUp2QTNXdWFoTFE1MlVISVU5Uy9IMis2dlM5OTRVUHpud1h0S2plYTNlUjlD?=
 =?utf-8?B?VDJLQXdKcjlLd3pmSVBKQUJxcUZhbHdjalMxaW5xM0FQR3VVakJ5VWp2YUVV?=
 =?utf-8?B?dyt1UXhvb1NuQk1zYzJTUDg1T0pOMHBiZVVoQWg4VXptUzJqNEl4YmRWZkFB?=
 =?utf-8?B?WTZQUUdtU2NkeUVnQkZCQnlLWC94Zm1KUmpXeVlMYy9mQS93N3NpaUR2S1lM?=
 =?utf-8?B?ZUI4dDFQREI0S2RZazd4Tjg3d0YwQ2c4aDV1ZkZ1b2ZMTjNHQjl4L05veFNU?=
 =?utf-8?B?UHZsMXJsODJNVTA2QnkwWEdoS2YrNld1a2Q0czE4L2VMSWtCK0tScnprbUxx?=
 =?utf-8?B?bVVDSmlOdTVrQlJTd25BNEdRTkVjd3oyQlJWZDQ5RzlDdkVmUCtIRWxkUHJa?=
 =?utf-8?B?U2I0SzJRTzVEczZQNGIrWmk2NGJXbDgvUkMraktnaUNpNVdSak5aUW1ia0pK?=
 =?utf-8?B?MzVKMzZINVVJM3Zja1BvQWdaK2ZBU2lQRkVYUnNyQnJCeFh3TFNUdGQ5VUIz?=
 =?utf-8?B?RmZTekJHVzJubnRjSjRkQjVUUzQvR0NsSWdvN0Y2eTBRVUdKSThEb3ZtTXZR?=
 =?utf-8?B?K1hYOHVLUVcrRk1vdERZRUx2QlNGb2UxY2FscUhBeXFieFRGTGwvMGRiZUtH?=
 =?utf-8?B?aUROcHVwT0FkaityOFhJenNNMHM3QkxJY1FKTUx0b05Fakp2WXFHbzdJUmZq?=
 =?utf-8?B?VXJkdXNwai9TL2VXQ29rOXlLQVppYXp3YXBoRG9CM1dVWFhVbXJZK2dsdXph?=
 =?utf-8?B?QnZKQ1JOa0VqbGcxeFFHWTgvQ3F3alFIdFYyUjhtY3h0cVVFVmpwd2hyMGRz?=
 =?utf-8?B?OWpNaExmOHRnMnhzek84VmJMM2V1RnVZTy9xSFFLRFhYNXFNeWUrbXFYSy81?=
 =?utf-8?B?Z3IvbTVNcFVFSmt1V1pGVlUyK01MUjNVY2FEV2svMUlhRXk2TVJVZnh2bEdF?=
 =?utf-8?B?QlZ6cG5VcWNEZkNGQWVpK0lUSUlaSDhSM2pGUUpJRktMc051V3hIekorN2tj?=
 =?utf-8?B?NnJnZXI1VUdyenJEMWFMYnpTTS9sVTJDQ2VHaE5IWTcvcEVmcjhRZVRURDAr?=
 =?utf-8?B?ZzZNUUk0dFAzRk12cng3YlJLeDhDRmh6TnpBNnBBNStEMXBsajdBdlIzNWc3?=
 =?utf-8?B?UlZUS0JoWE8xYzhzOTNta2c5VGNqTmNlZ2ZTU1ZPZG5nelJNdEMwTUp1bFFF?=
 =?utf-8?B?bFRZSlFINi9HV1BrUVZEd002RlN0cWNEOEc5Sm8xN1hiYXI4SUVJbjJQSEoy?=
 =?utf-8?B?dllqVmhSWk5sakQzdnNtQ2JENXNpU0R5SWI4eXNFZzhvQkFORjk5QnZBeWcy?=
 =?utf-8?B?TWtpcUx3ZlFsczVEMEFNZVlDQkpuaE50dmZpWmF4SC8wUG8rV1ZudTBXM0xw?=
 =?utf-8?B?Ly9oM0VGZkRTdlU5RzhBb1Npakhuc05ka0JxTGU3THVQUzRnUEQ2aDF3dVA2?=
 =?utf-8?B?MkRNSVpnZGkrRW13R2ZzU3dmb3Ria1QvR3JHa2JiZGFCSEp4dG5nbXgrRUp2?=
 =?utf-8?B?dXBBNVI3SmZYTHVLTWUyKzBaWVJITzlucGpxOXNHenN3OXl4WklJWm1Wd2Ir?=
 =?utf-8?Q?H0Z2Lwg+FEp3HXl4=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 15c9949d-761f-4b8d-1442-08da12ec9c65
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 08:01:07.6016
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: q/c+bs5blMwjCreIkNvaLhn5yram8+iiVlqd9CNDNI1PYgFBw7XgUFcg821XuHilFoPnEVZs3+XHN8p5CDQm3Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN7PR03MB4306
X-OriginatorOrg: citrix.com

On Thu, Mar 31, 2022 at 08:42:47AM +0200, Jan Beulich wrote:
> On 30.03.2022 19:04, Roger Pau Monné wrote:
> > On Wed, Mar 30, 2022 at 01:05:31PM +0200,>> --- a/xen/arch/x86/livepatch.c
> >> +++ b/xen/arch/x86/livepatch.c
> >> @@ -157,9 +157,15 @@ void noinline arch_livepatch_apply(struc
> >>       * loaded hotpatch (to avoid racing against other fixups adding/removing
> >>       * ENDBR64 or similar instructions).
> >>       */
> >> -    if ( is_endbr64(old_ptr) || is_endbr64_poison(func->old_addr) )
> >> +    if ( len >= ENDBR64_LEN &&
> > 
> > Sorry, didn't realize before, but shouldn't this check be using
> > old_size instead of len (which is based on new_size)?
> 
> Yes and no: In principle yes, but with len == func->new_size in the NOP
> case, and with arch_livepatch_verify_func() guaranteeing new_size <=
> old_size, the check is still fine for that case. Plus: If new_size was
> less than 4 _but_ there's an ENDBR64 at the start, what would we do? I
> think there's more that needs fixing in this regard. So I guess I'll
> make a v3 with this extra fix dropped and with the livepatch_insn_len()
> invocation simply moved. After all the primary goal is to get the
> stable trees unstuck.

Right, I agree to try and get the stable trees unblocked ASAP.

I think the check for ENDBR is only relevant when we are patching the
function with a jump, otherwise the new replacement code should
contain the ENDBR instruction already?

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 08:13:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 08:13:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296738.505166 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZpvz-0001il-9b; Thu, 31 Mar 2022 08:13:35 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296738.505166; Thu, 31 Mar 2022 08:13:35 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZpvz-0001ie-6L; Thu, 31 Mar 2022 08:13:35 +0000
Received: by outflank-mailman (input) for mailman id 296738;
 Thu, 31 Mar 2022 08:13:33 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=TTh1=UK=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZpvx-0001iY-80
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 08:13:33 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 73d8cb9b-b0ca-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 10:13:31 +0200 (CEST)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2107.outbound.protection.outlook.com [104.47.17.107]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-24-MDLjFq_mNMWffRCOEszdQw-1; Thu, 31 Mar 2022 10:13:27 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by DB8PR04MB6985.eurprd04.prod.outlook.com (2603:10a6:10:11e::21)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.19; Thu, 31 Mar
 2022 08:13:26 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.021; Thu, 31 Mar 2022
 08:13:26 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 73d8cb9b-b0ca-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648714411;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=+5QfjTOw9NLkG6JfdpouDR5Dtgtyoh/WkbotPdfgzIU=;
	b=mXKP0bWIBw/qDxrfxjv/UA1KHsw+a6GubLB+J5LawRWh6stnjlMRa6bAM8D5rX9ucXnn1a
	i6l5gGyt4nOvWr3EWxGHFhCa0svXHrFf2d/3oYvz62yLPckgabnS1QbshkPwwBjM6oJ/cv
	UcloXT5PpEghLIMdGNsBiaapLVkPVaQ=
X-MC-Unique: MDLjFq_mNMWffRCOEszdQw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Gtz2jJD1b7bIzGcV2lBFDmqMYnrUcLAjSfGjSmyxZguRLVUts83jZhAgrPeY7AbmY/DbsuRHK7gKZ7qoNlqQ878OR4OKEP0kWpjCTtmKcv2vqEJozhiI7SFlbAQmoDKzZtu1mBlF+y0rBcDgM8318NViU5Pj7HLLrmbnRM+TCBuJGYIMfXfBtPSxGAlVB1tuYa1drpGkyIRQtMOU33RCh5nSHEYcZhoN2h91D/Jl2eb6/3IZZ2rI+GCo+2uwKlSOUGA8/Nm5c2eUzpiOCodeaE4PdKOXnIwI5sWqNVz5w6enMgqd9miMxVDTdJWcJG0Xr2fJWuVqOMemOSEiC7eZGw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=/zYxYLTnzn1V59BnPmiQzSwpnOVQR8kmt6PHQpu9ff4=;
 b=TSnm/9hANDxNu/6HvXidAhB6leHlSPIskJImMTu9DMhjjsVwmpMABc7Ez7XR1ddZSIcH13IXXaVxt9xLoUTzY/F7mFaY64NpiZjrjrbCwTWgOXbdsTP05PnXaxQpUoAQ3QayHJ/UgPuxT51xbbUzxGOb5xmbyq3BXhwXBf4Z1yHg8lYKGzgFRD6BA5NNPABDszof5+ox9Dy4F7U1ggC6aBnm0Mjc+3Ld9qoWDujvGG5hIlVfthhVJwRd9FkJqk8Swz64ygIJXuoeiI/wmJKbLggng0P2tKhWKyZfJ/IIa+QPFprm3cAANWGvk/Y+0NARtOgSMfAKyW2htamGWbjj+A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <66beaea7-eb6f-4cac-336b-4dd605bc614c@suse.com>
Date: Thu, 31 Mar 2022 10:13:06 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2] livepatch: account for patch offset when applying NOP
 patch
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Ross Lagerwall <ross.lagerwall@citrix.com>,
 Konrad Wilk <konrad.wilk@oracle.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 Bjoern Doebel <doebel@amazon.de>
References: <772f0afc-64db-6b98-af49-bd970ac78cbb@suse.com>
 <YkSNm0mb47Vc6nGr@Air-de-Roger>
 <a6f18801-7959-8fc8-f414-8086ed74ab3a@suse.com>
 <YkVfvW6HiST3fIgs@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YkVfvW6HiST3fIgs@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS9PR04CA0072.eurprd04.prod.outlook.com
 (2603:10a6:20b:48b::7) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 62e57608-5a94-4311-faf5-08da12ee54a5
X-MS-TrafficTypeDiagnostic: DB8PR04MB6985:EE_
X-Microsoft-Antispam-PRVS:
	<DB8PR04MB6985AE2C7A7DE38F33301378B3E19@DB8PR04MB6985.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6916009)(66556008)(66476007)(5660300002)(66946007)(8676002)(2906002)(316002)(6666004)(86362001)(31696002)(54906003)(38100700002)(8936002)(6506007)(53546011)(83380400001)(6512007)(4326008)(186003)(6486002)(36756003)(508600001)(2616005)(26005)(31686004)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?fdHkbTStyuLbADLtr74jQdYmPyZiZ8On2u3q8g1HoglfWTLZvBEOBzafQ5YM?=
 =?us-ascii?Q?KcopcHWWqvY5qP14TD6uIHKRauB0w7G3GBT4b9+lDtsgsnryHYY4C2dtyCnS?=
 =?us-ascii?Q?/1cMgP060SYAZyYEszXVqbrJAmG52cufzYdKnI+Fy4pUHZG94bUndCJpEhYw?=
 =?us-ascii?Q?ekk7x7nXF2v6C+OSgaDHsqLbBNDcQ6dukgMQ2o/sa+l4XC5Vo9cRIogJ/nJu?=
 =?us-ascii?Q?Lq229YbmAxnmQBU63Hhy4rW6iYjM5wEFazS04ZJDe/h+AUSe/cR53HE5lZ3m?=
 =?us-ascii?Q?779mDmcDEIG1J4SxAXBJxi0SSUUXx2l2qi+1sScTpj1pc0OLQT1pguddX81D?=
 =?us-ascii?Q?wXqThUhH6KtjPocL3d3izA2oiOlOdC0BR5ulLnHCULV2bCsDupSOBLTE5H2d?=
 =?us-ascii?Q?0xeD5cExkGMip2S4DKP0G38tuYJ6jYBIqGHq4Ez+AGztK5iTprOOGGpVeiZV?=
 =?us-ascii?Q?OBc0L08lkQZaPQkDwdTWa22JnTLYJIAepHX7yvaGuAoMDv/KMEp71Pp3RVtq?=
 =?us-ascii?Q?hYni1zPalfKZ6KmNdXsa2pxf15U9GMRmp3zTOP8rvOo/LwE2n96gQA9IicJD?=
 =?us-ascii?Q?MTEm3PXstutRdyHneIjAxLLsRJkNeQRaKVphVxhVgmJjkVgWfCTmSMbs64EN?=
 =?us-ascii?Q?hmJ0H61CURlePCl7PSAhdnjLguDeXDn2PmvdQNyIA56QDupFPI/+0Lv9dQlg?=
 =?us-ascii?Q?DheR7bbndwWv5Hg7cltH/mjVYOnFpzts4pmIFSnE7w+a7zFt9Hhzr87NveA7?=
 =?us-ascii?Q?GxC/1UHU2BKRochND5F2kvMc82zUPaH5cR+2GX86jpxEyR+Hdl+LREdaCLcI?=
 =?us-ascii?Q?iOaJF3PHJQYtX3enImuNQHXzUH/jH1nseD0gMKY1gjSgYqjAFOsWS7jJVFio?=
 =?us-ascii?Q?lCQzs2HWdLJvRPOafFZZhtPPgJk4kObX9bE0S+Lds4G094zvZXRPFa2Exb8T?=
 =?us-ascii?Q?74RWpJm73CAf5MSOaaCY9IciBg5FwivC8NpDKlFVKJ6KKv7odtNbCdutVvBe?=
 =?us-ascii?Q?kMcQoY62dsyD7CG5YhUthswdtdywgGiwwBc6CoI/Y9HerZwtDGq6323IT5CR?=
 =?us-ascii?Q?41ul5bVL1frhOqitRfBRu3I/dQL+0dBvucuk8eCdw6PiXi2TT2C9t/SIcTwl?=
 =?us-ascii?Q?nPyGZz37MDHYpfjFd9LDv3PPPxKJScOPjDB37gK7PwXwyaVwSarTWxaiMShQ?=
 =?us-ascii?Q?tVB5V5rmxk3EcDxiZMfGczFAIB29nbcxTat/2AmuFEif0hEHL75906XpXhNS?=
 =?us-ascii?Q?za+mgj4WoUq0HjXpLY8ZJGayfnk4Z605LRIGsusNRGjcXiQwCgG+DDgAK8qn?=
 =?us-ascii?Q?R3kqo7eafmtQOYGY46fmJl3Fn2K6NERz9n9MtPP8LxRQB6QWQon1cAssM8mr?=
 =?us-ascii?Q?OBrO85g371Q5awSPUTCBbj+4D3xEo2b/pPEQCBiXfecdOpxSiOA4sHU1tGlR?=
 =?us-ascii?Q?vVMDqpYUM3dRHUFqMHPVX5jxCI73JSf7Xt4aZjCZT0KY+g+W/A+bUnTJ9xqp?=
 =?us-ascii?Q?l2V/mkCYc5gPJ4Dkx4na/Jouw0smsyov0qPfoR7MeJz2k1V+S4BaxrnmxL9l?=
 =?us-ascii?Q?dN+8CqLQmtxvSYQoOklp3K491lduJ4dFwSDTzSZuUw6D4xDBkcyUVFYcYmHG?=
 =?us-ascii?Q?l3jPc/7p/BNVUXZr01E7a90yC3eytxNrWwwQNOw4y5NBa2DpYIejIOKL/9ml?=
 =?us-ascii?Q?AFZY1wSojmTas90UXS5SqJR9QO/2BPMctittmxDSDXrQS3yGKtxHUDr1H1W2?=
 =?us-ascii?Q?MErzpAQDQA=3D=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 62e57608-5a94-4311-faf5-08da12ee54a5
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 08:13:26.0213
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: scbq0Atl9ld5B+crObkLpxBrHTwn3EcSSy3hoBLMKwokCBNOQBlOY0z2jmHaJMNFCyTU9F0ejNIEyYrhfws5Yw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR04MB6985

On 31.03.2022 10:01, Roger Pau Monn=C3=A9 wrote:
> On Thu, Mar 31, 2022 at 08:42:47AM +0200, Jan Beulich wrote:
>> On 30.03.2022 19:04, Roger Pau Monn=C3=A9 wrote:
>>> On Wed, Mar 30, 2022 at 01:05:31PM +0200,>> --- a/xen/arch/x86/livepatc=
h.c
>>>> +++ b/xen/arch/x86/livepatch.c
>>>> @@ -157,9 +157,15 @@ void noinline arch_livepatch_apply(struc
>>>>       * loaded hotpatch (to avoid racing against other fixups adding/r=
emoving
>>>>       * ENDBR64 or similar instructions).
>>>>       */
>>>> -    if ( is_endbr64(old_ptr) || is_endbr64_poison(func->old_addr) )
>>>> +    if ( len >=3D ENDBR64_LEN &&
>>>
>>> Sorry, didn't realize before, but shouldn't this check be using
>>> old_size instead of len (which is based on new_size)?
>>
>> Yes and no: In principle yes, but with len =3D=3D func->new_size in the =
NOP
>> case, and with arch_livepatch_verify_func() guaranteeing new_size <=3D
>> old_size, the check is still fine for that case. Plus: If new_size was
>> less than 4 _but_ there's an ENDBR64 at the start, what would we do? I
>> think there's more that needs fixing in this regard. So I guess I'll
>> make a v3 with this extra fix dropped and with the livepatch_insn_len()
>> invocation simply moved. After all the primary goal is to get the
>> stable trees unstuck.
>=20
> Right, I agree to try and get the stable trees unblocked ASAP.
>=20
> I think the check for ENDBR is only relevant when we are patching the
> function with a jump, otherwise the new replacement code should
> contain the ENDBR instruction already?

No, the "otherwise" case is when we're NOP-ing out code, i.e. when
there's no replacement code at all. In this case we need to leave
intact the ENDBR, and new_size being less than 4 is bogus afaict in
case there actually is an ENDBR.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 08:22:24 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 08:22:24 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296742.505177 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZq4I-0003AZ-68; Thu, 31 Mar 2022 08:22:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296742.505177; Thu, 31 Mar 2022 08:22:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZq4I-0003AS-1T; Thu, 31 Mar 2022 08:22:10 +0000
Received: by outflank-mailman (input) for mailman id 296742;
 Thu, 31 Mar 2022 08:22:08 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=lDhN=UK=citrix.com=prvs=08274bcc4=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nZq4G-0003AM-AK
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 08:22:08 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id a5583be0-b0cb-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 10:22:05 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a5583be0-b0cb-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648714925;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=YacsaPmymek6FNIfUNv9niisnhYsjOBf8Zu2v/EHGGI=;
  b=R3+HTLEjohC6o8xeAoQp/FWDxzFd1hYM+6BVp0cr1j9JkTgDheVcceqn
   PjNt15cN5Czooog5VuW3kbgpDRDv2EENtRWOVo1NUxu8xoS9ZY4NsY3tw
   o/Bav0LEpNjNX0lMd0gk17EdMWlQsXM5pIkpgIyclo9sAotYQy7ZAnOsW
   Q=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67629059
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:MnPSs6DgwICD/BVW/xDjw5YqxClBgxIJ4kV8jS/XYbTApDMigjwDy
 DAXDzuCPK2DZGSmKt9+OY7i/U9QsMKAyt9iQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vi29Yx6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPh9w
 4xBuICudTwQEZLWweQzUAQbDA5XaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguw5K8bmJsUHs2xIxjDFF/c2B5vERs0m4PcGg2lq15gTTJ4yY
 eI9c2FNTCrCTyZ+M28RDcljwL/3n3TGJmgwRFW9+vNsvjm7IBZK+KfpGMrYfJqNX8o9tkqfq
 2jL+0zwBxgIM9rZxTft2nGrgPXGkWXkWYYRPLqi//VujRuYwWl7IB8cWEa/oPK5olWjQN8ZI
 EsRkgI+oK53+EG1Q93VWxyjvGXCrhMaQ8BXEeAx9EeK0KW83uqCLjFaFHgbMoVg7ZJoA2xxv
 rOUoz/3LTBk6bGYVWyhzY67kinrOQYWMCwdSgZRGGPp/OLfiI00ixvOSPNqH6i0ksD5FFnM/
 tyakMQtr+5N1JBWjs1X6XiC2mvx/caREmbZ8y2NBgqYAhVFiJlJjmBCwXzS9r5+IYmQVTFtV
 1BUypHFvIji4Xxg/RFhodnh/pn0v55p0xWG2DaD+qXNERz3oRZPmqgKvFlDyL9BaJpsRNMQS
 Ba7VfltzJFSJmC2SqR8fpi8Dc8npYC5S4i1CK6JMYQUP8csHONiwM2ITRTKt4wKuBJx+ZzTx
 L/BKZr8ZZrkIfoPIMWKqxc1juZwm3FWKZL7TpHn1RW3uYdyl1bOIYrpxGCmN7hjhIvd+V292
 48Ga6OilkUOOMWjM3K/2dNCcjg3wY0TWMmeRzp/LbXYfGKL2QgJVpfs/F/WU9c7x/4MzLeZo
 ynVt40x4AOXuEAr4D6iMxhLQLjuQYx+vTQ8OyktNkyvwH8tfcCk66J3Snf9VeBPGDBLpRKsc
 8Q4Rg==
IronPort-HdrOrdr: A9a23:fB8S+q9JGxTnGyUXYcFuk+E8db1zdoMgy1knxilNoENuHPBwxv
 rAoB1E73PJYVYqOE3Jmbi7Sc+9qFfnhONICO4qTMuftWjdyRGVxeRZjLcKrAeQfhEWmtQtsZ
 uINpIOd+EYbmIK/foSgjPIa+rIqePvmMvD6Ja8vhVQpENRGtpdBm9Ce3em+yZNNXB77PQCZf
 2hDp0tnUvfRZ1bVLXxOlA1G8z44/HbnpPvZhALQzYh9Qm1lDutrJr3CQKR0BsyWy5Ghe5Kyx
 mJryXJooGY992rwB7V0GHeq7xQhdva09NGQOiBkNIcJDnAghuhIK5hR7qBljYop/zH0idhrP
 D85zMbe+hj4XLYeW+45TPrxgnbyT4rr0TvzFeJ6EGT1/DRdXYfMY5slIhZehzW5w4Lp9dnyp
 9G2Gqfqt5+EQ7AtD6V3amHazha0m6P5VYym+8aiHJSFaEEbqVKkIAZ9ERJVL8dASPB7pw9Gu
 UGNrCS2B9vSyLbU5nlhBgt/DT1NU5DXCtuA3Jy9vB96gIm3UyQlCAjtYkidnRpzuNLd3AL3Z
 WBDk1SrsA9ciYnV9MPOA4/e7rDNoXse2OEDIvAGyWuKEk4U0i936Ifpo9Fo92XRA==
X-IronPort-AV: E=Sophos;i="5.90,224,1643691600"; 
   d="scan'208";a="67629059"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=kMFcXqU/jONp8ZWIuKtKoAJaS6BFKC8WbdOWqs/7JxwcLYTJ5PujyWnzlfMcHcdHOybT/V4ZHJPm2Q6dtAlmcOmtm4jdOYghDRdhFND+y6JV/rWp6O9xFMb+rH9Eqg5R9TywcN86IHtdj6LlMbWGpuMqqkJC3pktNuxIXKFZVD0M3MWQ/INj4Vqk7XJ4H3ahwVpjyn/8Aa6EoJIn9GjcCuadjAh9X9ibu4APhunssPNm4ZT34bAaTAMbQ0MHYI3j3HA45MNJ1ePS5XaaIZxDMENrIPiuyIlAR930uMh9gfCyUqJwhWOV2AiyfqapwWfRnz7jmurkdjy/HXAts0HO6w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=E7INZ2eQuq3ukCrCe0To8LZmNN4291FOUF3EXb4WdD4=;
 b=VUgWlw5BdMQBarRoq90O3jJh/P0434IZg/9nnrwqSJD2VngMfH7/JCqd6vd7p1NXzDElduDmk+x+ENl4hfwiHsXXHMsqPJNyyVHJrIVaBMBflYNR4972aunKNpTnryifrdMFivJ5Dvym5aDfX8qR2NggP+0Xh0k3BHb8fCYKrLL7JzLk6/7V8cAD12CH8cn/Cpu0NFQtlqhPeaLDsC7O+q9eVyIYC30KMyUvulauOayWemGW+uTglVoo1KxUQMswNrvaLuLN3Fqxll19RtcaNvgXxCnMm79I2guXswfpq1vxfEsqda4FHctxH7rrG7PUx9TVmp4tAh5z8tpnlKLOdg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=E7INZ2eQuq3ukCrCe0To8LZmNN4291FOUF3EXb4WdD4=;
 b=S2pJOInugcIiSdUQdsrQfJdksrhFDwQtndFSKlzujrYHd5bBw8d+2vFVqhrS4lGYKcbmmaeNHd0sBOih5EZ8NIu/o+VaWaCoL2rO+C+JhiGaxmsfdTl6lJCJY0LlnDrGE8P9EzlzWfS4DvvBgLXozl7cfcpJ06xwave9Gntzmjo=
Date: Thu, 31 Mar 2022 10:21:55 +0200
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, "Ross
 Lagerwall" <ross.lagerwall@citrix.com>, Konrad Wilk <konrad.wilk@oracle.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>, "Bjoern
 Doebel" <doebel@amazon.de>
Subject: Re: [PATCH v3] livepatch: account for patch offset when applying NOP
 patch
Message-ID: <YkVko/vqhfAfS5Jb@Air-de-Roger>
References: <8db632ef-9d9c-d17a-54fd-49912d88d599@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <8db632ef-9d9c-d17a-54fd-49912d88d599@suse.com>
X-ClientProxiedBy: PR0P264CA0277.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:100:1::25) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 31f3bd38-ea74-43a9-8891-08da12ef8709
X-MS-TrafficTypeDiagnostic: BN8PR03MB4756:EE_
X-Microsoft-Antispam-PRVS: <BN8PR03MB4756E3F12C82BF49423805018FE19@BN8PR03MB4756.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(508600001)(86362001)(4326008)(66476007)(5660300002)(6486002)(9686003)(2906002)(33716001)(6506007)(8936002)(8676002)(82960400001)(6666004)(6512007)(85182001)(15650500001)(6916009)(66556008)(54906003)(38100700002)(66946007)(186003)(26005)(83380400001)(316002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?U0UyenRuWHdQMmVXR2xTdXZLbU1PNUEwbjlnLy9LNmIvSHdCMVdUb2hnejk4?=
 =?utf-8?B?S3VocXJFajhmL2FMRUttUVRQUGZ0aERzSy9FbHR6TkJCVkdSUEhtWVN4YzZX?=
 =?utf-8?B?TFRtaFNkYS80NXFreTZNVUEwSUh5ZTUrV0J4bkZPbmxQYnhFVHZlTjJEUnB4?=
 =?utf-8?B?N3hXUEJqQWErYXR3QTdpeGdLdG8wVGFHSS9SOFM0K3pPOGVhUTBEaDFEZnlI?=
 =?utf-8?B?b09wVmZXT0lOcVNqMWQ0ZjJnODhncERaMHVLWHQrR21QYkRRTmVkZnVWaXIw?=
 =?utf-8?B?UGNScTVleENxdGw3TzdnOWl3QVlVSTRQZzJFb0dEaFlDQzAzRks4MXl2YmEv?=
 =?utf-8?B?enIwbEtHOHdDb000YVhORm12YUJ2VWVFZnQrelIvYzJyUmRUdXloNElWUWZN?=
 =?utf-8?B?U0VXL3M2RlZrTmxudVEzcGZ2MDgwUW16L000SFp4Yk9HZkRrdE1Wc1dmRjlK?=
 =?utf-8?B?TDQwOWpTSmdmMlE5d2xSSVhiVEZta1VVQTFEQisyV2svRm92aVZ1ODhwb1N1?=
 =?utf-8?B?SXVkME1hQThtZ1JXVXNBL05IbmE2OTl4R3ArV05zR1NzMlQ3QUxUbDdUanRr?=
 =?utf-8?B?a1NWVHFpQjFuRnJaQVUrRkdmcXY1U1BoZ3IrZEF2aVdjTTZRTDRRbytkKzJB?=
 =?utf-8?B?YzBXbk1XbGVicitRNUFQd3Y4SFdYOFNQWEFmN3BINWg2UlNyYWpSMlkyMnAy?=
 =?utf-8?B?NVFWTFB4MXFkUGFzQlpWRzBGN1htcjI4cHkrODhDMk55c0FDR0pCcStDVmg4?=
 =?utf-8?B?Ry9PblIxOC9iYkRTekROczhvY2FUck9sRkpHOXpETTBRSFExcnl6SlFDVjhY?=
 =?utf-8?B?S0oxdjJseEFhbkhkZE9WMm1kR0V3L2M1dEYzTUZCMVpFZUdJSi9tSGg5Mnd6?=
 =?utf-8?B?aTBiNXFrYUM2TFJCNlZtNzIrRWlnZU1qYTdSdVYzZ0doOG5pMG84aVU2V1g0?=
 =?utf-8?B?dU1Kd0ZpeWZJYVJzWGx3M3FSODljWnFTdVE3WUtwdVUxUllPVkp1VEE2WnpH?=
 =?utf-8?B?QzFxc05RVEZjcEs4U1lINk9IUU5DNkZZSTF3NkFBamwvckhFTlhjR0NPYTM1?=
 =?utf-8?B?OFlLL3A4WHNqTk91VkNBWG9BWFJ1ZnJKQmVvWVZmeTVTaExRa0JwLzdQRzF5?=
 =?utf-8?B?MTdsODdvZktvMFVFR0tpazQ0SmlmcXpyTTFLRTRRNW5sb01CamxiOEd4Z1J6?=
 =?utf-8?B?R01HSFZsSVp2QndLS2IxWVVHVUpVTTE4WDhwM09ZVk94NHJ2NXZ5dXJVWEtS?=
 =?utf-8?B?eFRDQTZ5eWNReVNOdlJraU9IWkhtTExKL0dJbE4vYUFpcHN2V0dvc2crVGhz?=
 =?utf-8?B?SnVqakVBNlkyUWlweUs5WXE4NUZEZFczbGJlUkFoVjdmaFBQeGZBQlVQQzdv?=
 =?utf-8?B?UGFvK2F5ZWJ0MkFnUkdTV1Bid3Fxd0hpMzBOcXNaWkxzcS81MjM3U29CWlVP?=
 =?utf-8?B?T21iVERpU2hkcUdCWkh6bk5pZnR6bWRQUFFrRW04d1d6U3F0eVVqQXNZWGZh?=
 =?utf-8?B?ejdtMC9ZdThJZkdPUWtkS2hQRkZpYW1xTktPQkRBRUhWNkpURytQT2w5Tmdq?=
 =?utf-8?B?N25vV2Zpb0cycTBJaHhidFNjdVM4cnVkanlEVkZSaVNJRE5zM29VL1JOR2dU?=
 =?utf-8?B?QWdHVnlYcEg0SGwyZ0xJTVVqdDk4RjAwZnRBZkVpT3FmbURmUmVLaDE1REVv?=
 =?utf-8?B?Wm9tODQ1ZWhxRlA0WWZoK0hZc3o4Z1VZVHVWRnRuQld6UWd4UFZhREpqV0x3?=
 =?utf-8?B?Y2tnOUZMV1hWZlNrTlc0VVduR3FZU3huSEcxbTVRTTk0MUxDTFJMQ1ZWVXdo?=
 =?utf-8?B?c0JHY3lBZGxPWldlRkhVUW1TV3NWTGlTRnc5NHJFV1MvYzJIU2k1bTBxL3o3?=
 =?utf-8?B?Tm9EdG9aNGNBWDdKZTRuM055bDJQSThtZ3doczREQ05oRXo1QThDS0J2VXd2?=
 =?utf-8?B?bHQrZis5K1VVK3d5eGFsR1RmekRtRytOVTcyNmUzRDI3RlpaTTN5UVNxd1pQ?=
 =?utf-8?B?RUtFZXdRTWRKY3JhUnBrbWN3MVZQTERJTC9QeSt2M25GT3B3NEQvWloxOHhG?=
 =?utf-8?B?cElNT2RDbVZwbEdVSVFYMGlCaTlZc2dNTTd4U1dRZDRQeXJrU0FDa1ZRNHZF?=
 =?utf-8?B?Q3BiS2ttSmFDaFBIVHdpTVhrWW9kZTE2ZElrdW5TWUlINXFyRjBJam1RSWNk?=
 =?utf-8?B?WkpyV0ZSbkx6dmxFUno5K0grT0ErUGc1c0lQYUg4RTBoSVNGRlEzNXpsOUdU?=
 =?utf-8?B?S082SERHQ1hPSTZJVjFwMk1JbEJmQTJWWXBVN0tOZjZMNS9CbE1tVWxLUlFG?=
 =?utf-8?B?Z2V3dkEzalFwSVBSZU54Q0RGWE1TUjBFc2I5MHc4TzI5RHpvQ05kN1B4RW1H?=
 =?utf-8?Q?FGyss+4LYdOREHNM=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 31f3bd38-ea74-43a9-8891-08da12ef8709
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 08:22:00.0410
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: eBjVNzNysa/ZPa0c5kNWNNTXdbsnugBDtXzV0xKX0ZaanZgRdYOR9mtlD4unpW1xOoEDQQV2vEo+GhORwHn4kg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN8PR03MB4756
X-OriginatorOrg: citrix.com

On Thu, Mar 31, 2022 at 08:49:46AM +0200, Jan Beulich wrote:
> While not triggered by the trivial xen_nop in-tree patch on
> staging/master, that patch exposes a problem on the stable trees, where
> all functions have ENDBR inserted. When NOP-ing out a range, we need to
> account for this. Handle this right in livepatch_insn_len().
> 
> This requires livepatch_insn_len() to be called _after_ ->patch_offset
> was set.
> 
> Fixes: 6974c75180f1 ("xen/x86: Livepatch: support patching CET-enhanced functions")
> Signed-off-by: Jan Beulich <jbeulich@suse.com>

Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>

Albeit I don't think I understand how the in-place patching is done. I
would expect the !func->new_addr branch of the if in
arch_livepatch_apply to fill the insn buffer with the in-place
replacement instructions, but I only see the buffer getting filled
with nops. I'm likely missing something (not that this patch changes
any of this).

I'm also having trouble figuring out how we assert that the len value
(which is derived from new_size if !new_addr) is not greater than
LIVEPATCH_OPAQUE_SIZE, which is the limit of the insn buffer. Maybe
that's already checked elsewhere.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 08:27:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 08:27:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296747.505188 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZq9j-0003pi-QV; Thu, 31 Mar 2022 08:27:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296747.505188; Thu, 31 Mar 2022 08:27:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZq9j-0003pb-MZ; Thu, 31 Mar 2022 08:27:47 +0000
Received: by outflank-mailman (input) for mailman id 296747;
 Thu, 31 Mar 2022 08:27:47 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=lDhN=UK=citrix.com=prvs=08274bcc4=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nZq9i-0003oZ-Sd
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 08:27:47 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6f509cce-b0cc-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 10:27:45 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6f509cce-b0cc-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648715264;
  h=date:from:to:cc:subject:message-id:references:
   content-transfer-encoding:in-reply-to:mime-version;
  bh=FsP17eF6yZSmyZUsSL2groiVZEb0raHym4ZoO/EC7TE=;
  b=SS0jRzRgisEG+cZUKyJQrft8H9GqLZW5jjzFQFGpNQGPeT19QK7yb3me
   WTutwOq7QCU7yOmrP6dqCc6Y6I5Jst/3Ba5xyfMFVcDKPPI1zea9gzW5N
   KEA1qBietZzT2vuGdgC/6E/kJOEsllpQqgUnnBazS6p3mQ6b/iWxylmvp
   Y=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 68036651
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:OhBCfaxyLwjlQvSkctV6t+cOxirEfRIJ4+MujC+fZmUNrF6WrkUEz
 mFJCj2GOveNYWOhLopyPoyy80xX7JOBn9cySVRtqSAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2oHhWmthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 NplqMW/EwYoMvD2oe0DTiVaIyYgHqBA9+qSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DJoQQt2sm1TjEJf0nXYrCU+PB4towMDIY2JAWRqiAO
 pNxhTxHYyv/ZgwfAFYuM5Msvdbv13TlKj16kQfAzUYwyzeKl1EguFT3C/LKfvSaSMMTmVyXz
 krK+GnzDxUyPdmW2z2DtH6h7sfMmiXhUY5UC7y89dZtmlSYwmFVAxoTPXO5q/Skjk+1W/pEN
 lcZvCEpqMAa5EGtC9XwQRC8iHqFpQIHHcpdFfUg7wOAwbaS5ByWblXoVRYYNoZg7pVvA2V3i
 BnZxLsFGACDrpWIEH3H97aY8AmLMDYIEW0yYnEnQA0KtoyLTJ4IsjrDSdNqEaiQh9LzGC3tz
 z3ikBXSl4n/nuZQifzloAmvbyaE48GQE1Vrvlm/sneNtFsRWWKzW2C/BbE3B95kJZ3RcFSOt
 WNsdyO2vLFXVsHleMBgrYww8FCVCxStbWW0bb1HRcBJG9GRF5iLJ9o4DNZWfhsBDyr8UWW1C
 HI/QCsIjHOpAFOkbLVsf6W6ANkwwK7rGLzND66IPoQQP8cvLlLYoUmCgHJ8OUi3yiDAdollZ
 P+mnTuEVy5GWcyLMhLoLwvi7VPb7n9nnj6CLXwK5x+mzaCfdBaopUQtazOzghQCxPrc+m39q
 o8HX+PTkkk3eLCuM0H/rN9IRXhXfCdTOHwDg5EOHgJ1ClE9Qz9J5j646e5JRrGJaIwOyL+Sp
 yvtCxIAoLc97FWeQTi3hrlYQOqHdb50rG4hPDxqOlCt2nM5Zp2o4rtZfJwyFYTLPsQ/pRKoZ
 5Hpo/m9P8k=
IronPort-HdrOrdr: A9a23:Qt5BpaPHGxzx+MBcTyP155DYdb4zR+YMi2TDiHofdfUFSKClfp
 6V8cjztSWUtN4QMEtQ/uxoHJPwO080kqQFnLX5XI3SJzUO3VHHEGgM1/qB/9SNIVyaygcZ79
 YdT0EcMqyAMbEZt7eC3ODQKb9Jq7PmgcOVbKXlvg9QpGlRGt9dBmxCe2Cm+yNNNW177c1TLu
 vi2iMLnUvpRV0nKuCAQlUVVenKoNPG0LrgfB49HhYirC2Dlymh5rLWGwWRmk52aUIE/Z4StU
 z+1yDp7KSqtP+2jjfaym/o9pxT3P/s0MFKCsCggtUcbh/slgGrToJ8XKDqhkF/nMifrHIR1P
 XcqRYpOMp+r1vXY2GOuBPonzLt1T4/gkWSvmOwsD/Gm4jUVTg6A81OicZyaR3C8Xctu9l6ze
 Ziw3+Zn4A/N2KOoA3No/zzEz16nEu9pnQv1cQJiWZEbIcYYLhN6aQC4UJuFosaFi6S0vFqLA
 BXNrCc2B9qSyLbU5iA1VMfg+BEH05DUytue3Jy9PB8iFNt7TJEJ0hx/r1qop5PzuN5d3B+3Z
 W2Dk1ZrsA/ciYoV9MOOA4ge7rANoWfe2OEDIqtSW6XYZ3vfUi976LK3A==
X-IronPort-AV: E=Sophos;i="5.90,224,1643691600"; 
   d="scan'208";a="68036651"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=hXu/PmjHwb3W9BRjZ50vAaycUozLHruMAxZdDpQPWK/CK2KnbOKrP/g8Zdh5+XZjNWFbweFNQLdGd7T0KakJSWLkhqqmwXVF0JYeQTBiaAo/VUJm5kAyHIacmkrgIYxqdg/k1y/nL1ash3kH58cuIrIQ09FxqCHNxPv4T5luCXI2nF8icbPl8D0ya4tbLKRdulH6Dm41FK7nAQlyzpjm7zbVtSD86mHoPKUdiqlfIjeru/zqr3bZBnI+JvjjwR8joc3LFICpVEls3dJfbR03aJCVuYGThzNEzq+ygwa0ERO9jrY9pjpY70wpCEWYyCckknvT6ePwELlJB374IOAnVQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=OL6mNXHh4DV6Xle+Fz712zXgPoopxZ6H7L3FKtSbzRg=;
 b=P6zl7j0O2qZ7hoQ+L3IDopbT2uuMrIshfd5gbRjCuIPvN++vLtHYSysAO+Gz1un/B9a+hashgDSw/nLYOec5mg3pumLVrGj71QIcbsIcSRyxwMU43O2YatlEA9hpv3tmvkBQjs7eAdj3QvO5+eAZY6qqVQlIj2CDv9qSBq3v0qc2VazuO9B6IzYDsEUyZdzFebdJhIDBBHDFr2CTZ6hPcZKM8vK+LURsz7KQp7ydywvXpmJbu8ESSlkx/qBvhl6KckyZRHpUaDk0OW+Mt8LVC0TD6prjJQ0vnumL18R+Q/9WtROJJZBKu5wORtGbMsRHxItzBetR4xoQEC1nekiXmQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=OL6mNXHh4DV6Xle+Fz712zXgPoopxZ6H7L3FKtSbzRg=;
 b=sU2jtE9lBHPmRs1I7ujlf2aJBgXpOGFDrDCiP3wcZqnUyoQG+HoM1orRgdce7sIx/MKRa24HsMOAePS0q6JRknepfI5alj6xpee203+EXtOkIYzAu5OsUuKEMtVSWltf74/nyMSTcVHI9E6RBSurnTenKuhb+5WMAkGDZ9jlS14=
Date: Thu, 31 Mar 2022 10:27:33 +0200
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>, Ross
 Lagerwall <ross.lagerwall@citrix.com>, Konrad Wilk <konrad.wilk@oracle.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>, Bjoern
 Doebel <doebel@amazon.de>
Subject: Re: [PATCH v2] livepatch: account for patch offset when applying NOP
 patch
Message-ID: <YkVl9bAEc1lo4jpK@Air-de-Roger>
References: <772f0afc-64db-6b98-af49-bd970ac78cbb@suse.com>
 <YkSNm0mb47Vc6nGr@Air-de-Roger>
 <a6f18801-7959-8fc8-f414-8086ed74ab3a@suse.com>
 <YkVfvW6HiST3fIgs@Air-de-Roger>
 <66beaea7-eb6f-4cac-336b-4dd605bc614c@suse.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <66beaea7-eb6f-4cac-336b-4dd605bc614c@suse.com>
X-ClientProxiedBy: PR2P264CA0025.FRAP264.PROD.OUTLOOK.COM
 (2603:10a6:101:1::13) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c09cf8c3-fcbe-48e8-f000-08da12f0511a
X-MS-TrafficTypeDiagnostic: MW4PR03MB6604:EE_
X-Microsoft-Antispam-PRVS: <MW4PR03MB6604410C9528B3B82449AB2E8FE19@MW4PR03MB6604.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(7916004)(366004)(316002)(38100700002)(54906003)(6916009)(6486002)(6512007)(6666004)(2906002)(53546011)(9686003)(33716001)(82960400001)(85182001)(66476007)(66946007)(83380400001)(5660300002)(8676002)(4326008)(508600001)(66556008)(86362001)(8936002)(6506007)(26005)(186003);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?K00yMEltZU5lZTlBcVY3L1NTVmhQRW0rRkFHSUhEYWwxU1YzNjZnbEpIckNQ?=
 =?utf-8?B?ZkdZS0dBRTRMUnVrb3owb0lOK0loV0oxbjB2MERkVVlhUk1LU3lJdlo0cXJu?=
 =?utf-8?B?THhWMnBSUjJ1dG1lQVlSRkNYQklqTS9iYTl1Z3NMY1MvSGROY0pXVmozVGtp?=
 =?utf-8?B?WmtGeUx3WWM0UzFib29KYmhFMnRPV2xVVHVQRVMzTG94UVJ0b0Z2dmVGVnZn?=
 =?utf-8?B?VEhXcFE2emUyd2pialRiWldWV3lHcGZIaEljWXBhWEV6NlVNNXJGZzd1ZVM2?=
 =?utf-8?B?RlV5VmFsdnM5MVpOSWtyRVpOMW9VMjl5ZXNMUStqNmhsalVZZ3VTNUhvZWNq?=
 =?utf-8?B?aHhvTHhwejJKcURTY1hRU1FGSDZ3Tkc5QjZpZzN3S1FhQXFLZEM2RHFtdnFE?=
 =?utf-8?B?dVVRVEFXL2xKalRGTDBGR2gzcys2ZkYvZy9EYUU1RkRFYXBKUm9jN08xdU43?=
 =?utf-8?B?VXFaWEhhRTgvMnRad1JRZURwSUNJcDhoOFVIcC9RaEQrR1l5R2tFVThaR3ow?=
 =?utf-8?B?bmJ2UnRDMEc5Skc0ZVhjSzgxQ3JBQ2FDQUxSVEJKRzZKOVI4eE1rTWN0NUJy?=
 =?utf-8?B?T0U2ZWl4TDVwSUtwQzZXMG8rbTV2RGNkdEI1dkNTeUt2NE96U2NXWjh4VSsw?=
 =?utf-8?B?eVZnbnlxRW5QTlZvSDBtMmZJS1N6SWdDbnIxc0xkWHVTOUV6cU92ZXptZWJt?=
 =?utf-8?B?Z1Q3dG14LzJsZTBWc3Rpck0yN1RwVkF0V2dBM0ZFUEwyOTJCelBlWHdxSVNk?=
 =?utf-8?B?dHBhcmJDYzJnbEpaOVkzMEhwWnYwbnVTcGlXY29ITGx3VnFDTXJuWWVmMGRn?=
 =?utf-8?B?YTZVTjV6aEozRFROZFFDQ1J1NG1ZLzR3Q1JWeWpycnZ0ZXNVRXZ0ZmJMaGFv?=
 =?utf-8?B?MHJvdlBYUldVMWIwS2xBS0tENGRheno0aCs4bEdNb1NWbmozaURaYkQ2UTRv?=
 =?utf-8?B?dXNKWVo3cDR0VWNxeFYxK0lMTWg4bm9icXJNV0lEUldTNFlmdkVFRThyRXAy?=
 =?utf-8?B?bFFXb2gvbkZ4NEFtT2E0TU5CVmdFTEJ2d0NxQ09NdnJDajFOazlpZ21hS2pF?=
 =?utf-8?B?WWpENVllakFKbTcvTTQ3TGpBc1dvRUZWMU0wRzAvdk01Q0lrczVTWXZpQWls?=
 =?utf-8?B?UDlIaU1WZXNjVHVIT0VPWXJvcnp4SGdidWZlenF2Uzl3WHBYNXFEaGZQdi9I?=
 =?utf-8?B?RWorR05YZ051cThWWm1OSGdzR1dFR1V0ME0xaHpmclhoUjBRYU9EZEdlQWxU?=
 =?utf-8?B?MXFEN3RacDNnd1RDQVJqbzJVemNWUU9iV2pYeGxtY2FqdVpxTThXenIrYSs2?=
 =?utf-8?B?ZTlCd082NkNjckllM1g2WDNqSXhIOU9ndS9OMmJRSVFhNXJlMjRIOWwrREZS?=
 =?utf-8?B?Y0QwS251TTQycm9aSGU1Mi9IZWowVmdmd09uNGdlZnRhNUloU1ZZUUpzMUtt?=
 =?utf-8?B?cWhSelFtMjFqRi9IR1NFamd1Q0NJbU8xSXplLzFheWZyVzFZNjN6Qys1UlJF?=
 =?utf-8?B?T3o0dEk4QXVZQnhQcGgwQzYwV254L0F0b1J1ZW9lUFRFUlh0QTVPMExUcFNR?=
 =?utf-8?B?dW52VkVQeUloMWMwNC80RHdiYkxRcVR3OHgxUGRwZy9RcldsVS9oT3ZkWmJY?=
 =?utf-8?B?a0YxVTlNT1RJMHhxd0N4MGNCRnhrKzdsa3FEVDBHTERBL1RqUlN0a3JYWmEr?=
 =?utf-8?B?bTlmV3MxdzFjMFF3d2xmYks3c21MbG5tUm1WWEV5Q1NKL2ZtSEpHb1pzU0JU?=
 =?utf-8?B?OTNzaDhZTitoUTBGT2sraWVUOWNhN1JSSWN3ZDlvY1hWcHBaZUVRV0N3Q0pZ?=
 =?utf-8?B?WXJ5Wm1ueHpSWEhER2tEbVJwb0VTbVROcWE4TUpPWEFCVGVvVFVib2RBa2t1?=
 =?utf-8?B?c0JpWTdKYU85WUF4N0JBMSswaHcwS1M2aEYxZVhMU1oxdFMycnZlcWYvMFov?=
 =?utf-8?B?RkhCRHljd2twejBmS1Mybm9Pc3ppZWRXVjZ4SEVFS1Ztbk9jUnFXdlRwZzBB?=
 =?utf-8?B?SSttMkxzQlNVNm4vNmRPOWgzTnlCeEhoZmJVRXVnSDZKRWl2dDVJdlJxWE1H?=
 =?utf-8?B?a252d3FLY2gvOVNMTHhXalArcFgwN2kvcGc5VXRtS2tOMlpELzdISnJZeXZN?=
 =?utf-8?B?SUxqaXJVYlBmeGxtNEo4QTdMMElhTDdVaHB6LzQ5S1F1cm4wTEFFVzNVWWZ1?=
 =?utf-8?B?QlVERjRvZkUzbitEbE9iMVE1YnZncUxNRDZKTUJTa3NIZjNSVHR1ckpqNURj?=
 =?utf-8?B?TEhuanVKSjIvdE4rMGxPbVc4SnNsTUswd0V5K21wMVhFMzhmM0taemtLTDlT?=
 =?utf-8?B?cTNBZnZCZC8zV21KdEdiQVB1ZVhIOVBHUmFKdnpnR3lvSWhZT0luaHVsSW9x?=
 =?utf-8?Q?TV69QmgSNUbFd2uU=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: c09cf8c3-fcbe-48e8-f000-08da12f0511a
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 08:27:39.0392
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: usQ2zvO6ST1heMgGmiJannBDEqZ/MipCOyJmbY9zB8cHqEOmrKEcaTewTbPlvGlSOFDZ9UegLTOyjA+g9vTUVA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW4PR03MB6604
X-OriginatorOrg: citrix.com

On Thu, Mar 31, 2022 at 10:13:06AM +0200, Jan Beulich wrote:
> On 31.03.2022 10:01, Roger Pau Monné wrote:
> > On Thu, Mar 31, 2022 at 08:42:47AM +0200, Jan Beulich wrote:
> >> On 30.03.2022 19:04, Roger Pau Monné wrote:
> >>> On Wed, Mar 30, 2022 at 01:05:31PM +0200,>> --- a/xen/arch/x86/livepatch.c
> >>>> +++ b/xen/arch/x86/livepatch.c
> >>>> @@ -157,9 +157,15 @@ void noinline arch_livepatch_apply(struc
> >>>>       * loaded hotpatch (to avoid racing against other fixups adding/removing
> >>>>       * ENDBR64 or similar instructions).
> >>>>       */
> >>>> -    if ( is_endbr64(old_ptr) || is_endbr64_poison(func->old_addr) )
> >>>> +    if ( len >= ENDBR64_LEN &&
> >>>
> >>> Sorry, didn't realize before, but shouldn't this check be using
> >>> old_size instead of len (which is based on new_size)?
> >>
> >> Yes and no: In principle yes, but with len == func->new_size in the NOP
> >> case, and with arch_livepatch_verify_func() guaranteeing new_size <=
> >> old_size, the check is still fine for that case. Plus: If new_size was
> >> less than 4 _but_ there's an ENDBR64 at the start, what would we do? I
> >> think there's more that needs fixing in this regard. So I guess I'll
> >> make a v3 with this extra fix dropped and with the livepatch_insn_len()
> >> invocation simply moved. After all the primary goal is to get the
> >> stable trees unstuck.
> > 
> > Right, I agree to try and get the stable trees unblocked ASAP.
> > 
> > I think the check for ENDBR is only relevant when we are patching the
> > function with a jump, otherwise the new replacement code should
> > contain the ENDBR instruction already?
> 
> No, the "otherwise" case is when we're NOP-ing out code, i.e. when
> there's no replacement code at all. In this case we need to leave
> intact the ENDBR, and new_size being less than 4 is bogus afaict in
> case there actually is an ENDBR.

Hm, so we never do in-place replacement of code, and we either
introduce a jump to the new code or otherwise the function is not to
be called anymore and hence we fill it with no-ops?

Shouldn't in the no-op filling case the call to add_nops be bounded by
old_size and salso the memcpy to old_addr?

I'm not sure I understand why we use new_size when memcpy'ing into
old_addr, or when filling the insn buffer.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 08:32:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 08:32:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296753.505199 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZqEP-0005HI-GO; Thu, 31 Mar 2022 08:32:37 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296753.505199; Thu, 31 Mar 2022 08:32:37 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZqEP-0005HB-Cx; Thu, 31 Mar 2022 08:32:37 +0000
Received: by outflank-mailman (input) for mailman id 296753;
 Thu, 31 Mar 2022 08:32:36 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZqEO-0005H1-8M; Thu, 31 Mar 2022 08:32:36 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZqEO-000110-4v; Thu, 31 Mar 2022 08:32:36 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZqEN-00045s-Ri; Thu, 31 Mar 2022 08:32:35 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZqEN-000148-Pc; Thu, 31 Mar 2022 08:32:35 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=GnNoIVduSpW4hazT2A/nfyXpjhjGX/0pzKFv9/OW0lg=; b=JFxUwvYn5fNFPPsEqHrXzZvbq3
	jHsEmfpHCFluunMo4YyzSDC9EHKMsa2m5tqYX0KauEHY28M3bCgmYPVJyOOlv55FKThPVWweqFjSx
	yekZ9mI0RbNFN+/M8/bNPZafbX1qRVRYt6mZ/bSHQ0+4tPct4nKIodQbHCsC23NxyJ7c=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-169003-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable test] 169003: tolerable FAIL - PUSHED
X-Osstest-Failures:
    xen-unstable:test-amd64-amd64-xl-qemut-debianhvm-amd64:xen-boot:fail:heisenbug
    xen-unstable:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:debian-hvm-install:fail:heisenbug
    xen-unstable:test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow:guest-start/debianhvm.repeat:fail:heisenbug
    xen-unstable:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-unstable:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-unstable:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-unstable:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-unstable:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=8eec96b7b8d937d40e2e7988edb8bbd08598c715
X-Osstest-Versions-That:
    xen=fc90d75c2b71ae15b75128e7d0d4dbe718164ecb
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 31 Mar 2022 08:32:35 +0000

flight 169003 xen-unstable real [real]
flight 169062 xen-unstable real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/169003/
http://logs.test-lab.xenproject.org/osstest/logs/169062/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-amd64-xl-qemut-debianhvm-amd64 8 xen-boot fail pass in 169062-retest
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm 12 debian-hvm-install fail pass in 169062-retest
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow 20 guest-start/debianhvm.repeat fail pass in 169062-retest

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168973
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168973
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168973
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168973
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168973
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168973
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168973
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168973
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168973
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168973
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168973
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168973
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  8eec96b7b8d937d40e2e7988edb8bbd08598c715
baseline version:
 xen                  fc90d75c2b71ae15b75128e7d0d4dbe718164ecb

Last test of basis   168973  2022-03-29 06:16:42 Z    2 days
Testing same since   169003  2022-03-30 01:54:38 Z    1 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Jan Beulich <jbeulich@suse.com>
  Juergen Gross <jgross@suse.com>
  Julien Grall <jgrall@amazon.com> # arm

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 fail    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    fail    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-examine-bios                                pass    
 test-amd64-i386-examine-bios                                 pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-amd64-examine                                     pass    
 test-arm64-arm64-examine                                     pass    
 test-armhf-armhf-examine                                     pass    
 test-amd64-i386-examine                                      pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   pass    
 test-amd64-i386-livepatch                                    pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              fail    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-examine-uefi                                pass    
 test-amd64-i386-examine-uefi                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   fc90d75c2b..8eec96b7b8  8eec96b7b8d937d40e2e7988edb8bbd08598c715 -> master


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 08:37:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 08:37:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296763.505218 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZqIl-00060U-5e; Thu, 31 Mar 2022 08:37:07 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296763.505218; Thu, 31 Mar 2022 08:37:07 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZqIl-00060N-2Z; Thu, 31 Mar 2022 08:37:07 +0000
Received: by outflank-mailman (input) for mailman id 296763;
 Thu, 31 Mar 2022 08:37:06 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=TTh1=UK=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZqIk-00060H-03
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 08:37:06 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id bdf17f85-b0cd-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 10:37:04 +0200 (CEST)
Received: from EUR01-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur01lp2057.outbound.protection.outlook.com [104.47.1.57]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-24-oiM6RiRdOJ28LRfF55EXaw-1; Thu, 31 Mar 2022 10:37:01 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM7PR04MB6983.eurprd04.prod.outlook.com (2603:10a6:20b:102::19)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.21; Thu, 31 Mar
 2022 08:37:00 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.021; Thu, 31 Mar 2022
 08:37:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: bdf17f85-b0cd-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648715824;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=KLA85lekRX135/Wtyxcgm0sHb8ym1qKY9s9jIJH3hsQ=;
	b=OVceWPkpkP+g2C1vYMBraOvHK/JNmSf4s++3LQ8lpgyQvdPw1C42uvZKd56e2OOT1cV7na
	s+J1ab0X3IkjHVOpaj49Xt2iJydAYdk/JQHYR1TjyoBbGZQ/J7CpUphVYLGSKAFzBDjjd/
	qipqpP16hzG0ZIsvDr89RR9rQLQNbiE=
X-MC-Unique: oiM6RiRdOJ28LRfF55EXaw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=j+GTSjRJ7TpwVfwo+/Ptov95SnHegv0gCGUd27z9kvXx+rM5YvATy2k+h9eJ5/lK9Pn7nHCY/QI9KT5j78PErOKwm1DE62EZLWuxcLH3uspimkDjiT9J7odjUgtVVYFunfNHr/XjkJ2UP7GXwNkJncE3VU8agNln8zLx0lZAtMhQRqntabCVH5KygGzZsPzemYJqfheQjqqDZJsfD9U1wFYpjYf2I48XsyTTiCdSgVlzf1nEJxwBWbS6pKP5Mb2axoJ9fr71DA+zyUBICpI+ogtYtZpFq7jhw9Hpuqs3V+CzUSrVeM0jj1eSoi6+s7EV3Km9DaGPuO4v6p/OfAdgJQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=vAdUUPg4fzOSX/Xe0jWn0k7lti2vs1FU2xej0K/ol9o=;
 b=jBbmXWC2NxOt8ooq6F40HgFfRTphLRJa74kLH9BIKqbNSdWoe3LMKOa3+Ev6YK7y6d28/fWtRIiSfdNNDTV5tm88NyeN4UZ+695/l5Pa995icD8EQCFYEq8TieMiSo9UQifOW0xdEP9n+V4vRjIl/DuKR0EKwSsbVo7rnhnauHMWqhipXmH+HzDPC0i80I7WJUsGF1IEqF3FcYUmAEJF3pNuUFG41sx6goQtbmMFDsLF5fTyJE3wYkQME37xQA7Oyzjez8UzzIuTdhcikBF0qv7NVryhraCY5Atc9tr+evIN/pZEUpn83pxtGPX7DUnGnVyfLriQ6G4lHT57NRI8yQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <76e059cc-d77e-7c40-82cc-ed5e855dcc58@suse.com>
Date: Thu, 31 Mar 2022 10:36:58 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v2] livepatch: account for patch offset when applying NOP
 patch
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Ross Lagerwall <ross.lagerwall@citrix.com>,
 Konrad Wilk <konrad.wilk@oracle.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 Bjoern Doebel <doebel@amazon.de>
References: <772f0afc-64db-6b98-af49-bd970ac78cbb@suse.com>
 <YkSNm0mb47Vc6nGr@Air-de-Roger>
 <a6f18801-7959-8fc8-f414-8086ed74ab3a@suse.com>
 <YkVfvW6HiST3fIgs@Air-de-Roger>
 <66beaea7-eb6f-4cac-336b-4dd605bc614c@suse.com>
 <YkVl9bAEc1lo4jpK@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YkVl9bAEc1lo4jpK@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: FR3P281CA0040.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:4a::8) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 32f2c17a-5fa5-4070-1f9a-08da12f19fd4
X-MS-TrafficTypeDiagnostic: AM7PR04MB6983:EE_
X-Microsoft-Antispam-PRVS:
	<AM7PR04MB698322592A6DD43C3723759AB3E19@AM7PR04MB6983.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(83380400001)(4326008)(31696002)(6916009)(31686004)(6486002)(66476007)(66946007)(8676002)(66556008)(8936002)(508600001)(186003)(26005)(86362001)(316002)(54906003)(38100700002)(6512007)(6506007)(53546011)(2616005)(5660300002)(36756003)(2906002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?wTPH8SAYn9uzM5/uczPAoIxoESMYaeaqwEvjS39ssEMym++o2Mu4lpPzDS04?=
 =?us-ascii?Q?mhMJ6yoJGw4vgASe9ySfhxzFQTWbsYFikXSZ36DH9Eqj9CNh3Nx15EGoSxLp?=
 =?us-ascii?Q?/vA7cB2OEILygYdeQCWflfBWp0u1gVoWog8Dnr5S2WKQoDV1pZBkQb8atKx1?=
 =?us-ascii?Q?MDo0R+wvIqbkq2mYtOa5qhnpUJlXG2ZOJHLRYCWXTs/69yH9zDaJxJCXq+Lx?=
 =?us-ascii?Q?cfFxv3J0t7HsUlfovK4vQtznnn8s3ZYRTk67ejZGNJp1XehqHo4nM1nZTtjf?=
 =?us-ascii?Q?z0iyKvMnKYKOmSMLhU7DCnZTxpVAGXai0KDU5NascNFEQ1ltZLek42UCusso?=
 =?us-ascii?Q?/0DYPQNiMCHMJfWDnFXnnh5GGDNYyI8qvxnIxpAgP9KmAucmZxJAJtiVlw8U?=
 =?us-ascii?Q?Mt5/n7T6rJkJsLhMZysaQIeMDPOwH28MfLwmGfbhzeVDOzgibPQeZ4RhwjKP?=
 =?us-ascii?Q?5ggPSxrosVP6PrsXq3gROH+bCVv99fQ4vLMl0z2BFtXqj6Z1DSHgSQ4D2+8k?=
 =?us-ascii?Q?1xLDTI8XQIYNW3qXpRKopiv2aKr2bAjpt8T21MaJ//890NfMlmtLY9DITlfT?=
 =?us-ascii?Q?SopMNhDXLp6rxQQCYTMesISEDfHdAK720sE8nNwppB9yQDrzek7Pxm/PtY0P?=
 =?us-ascii?Q?vGQmFhUoyu1CXOzcqxD1h9/SmBDknTb8UzaXxWi5kfNUC3mVzRkJuql+FxjK?=
 =?us-ascii?Q?U2bIvf36tOwFnkETqk/Qahny+efOXmQJ03aEeCTOkTmb6sngbLXP+fiayvvC?=
 =?us-ascii?Q?ToMN6rMbYETUXKV7nDx4jHPPEbEe6ZH8chcgkL65eRFdiwYtxcV83wI2T+c/?=
 =?us-ascii?Q?UyroTFpPaTPxcYgOX+fId50WvK9crixetMpb2aV3y/FXxUApyoLIsJH3W067?=
 =?us-ascii?Q?DhA3l+CXmpS47OVOWCltgIy0AzoeXyD1v3Z7TAqNdRPar4JyeVKT/RmA2NUD?=
 =?us-ascii?Q?R3f5UK7/6v4YnzLIi+sR/GUVOa9QFPyhafA+BvhrMh6J0KQtBcDYyTuNuSZJ?=
 =?us-ascii?Q?vOwnpvyVtZbOxZnQ2YgUVBwtIp1g/OC0qbnKB2D1rTGcXNz/bf3qryJq5flC?=
 =?us-ascii?Q?BCDl21WleMK8N+4uYfgFTarZk+3Vs0S5U4SHYQKh91r3pHGCzaD2XDU7mpN0?=
 =?us-ascii?Q?FlIbtZFBfhEO5X6KZJEj3PHKfXtOuQ9Tn9DcqZzOfrGsNipy0XpaKKjFn3kC?=
 =?us-ascii?Q?1RbuKT8LEQBs/SqFo+MFo1464Fs2s6OEA9HAhpUzY4+Ca5k+76SLdjmcr8mh?=
 =?us-ascii?Q?xtcKhUWU2unmAbVWIkH3dlq8Img4cHxfBJ1Y9iAoWfneloEuuIQE1dR9GyDa?=
 =?us-ascii?Q?qSAIKKLcOWYcsWgwJqKwZADGf1TDSp2CEBhAKBsmknUYW7ui4QgXhhzmd/S9?=
 =?us-ascii?Q?IRdwI3jIWyqBfnPxqXVI4OonEiWZFDWFETfmSqOfi7Ewx8/J8Hm+4iZorM9j?=
 =?us-ascii?Q?Sv8PeyEAhp2f+LoF2wS5iH7TQ8NwBueiozSgzxT/TwxZdlaEChxfRxeQzcYD?=
 =?us-ascii?Q?Mj0gYG4OyxcdY0sKW6IGH04HjXuBT3EB5FKK1K9T2xKRGhQYi7OfAnptVxtI?=
 =?us-ascii?Q?A5SqCpcvACwrmRuMw++NkQBAiOQNTbInxDY7DfVWEak+rtUTlRw+F4fO1/AK?=
 =?us-ascii?Q?h49z25nWmN1jwR34jwGYOjEg2VrR9zog+5GPPt5iaYIcW9K+fKIpPe6RYcNz?=
 =?us-ascii?Q?0hNvjFaYX82cAs3AUyfmyr9FivT8ckl78HUuY8kZ4PVfNk0jcqlZg+9Lw0l0?=
 =?us-ascii?Q?+vh2uPu6Jg=3D=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 32f2c17a-5fa5-4070-1f9a-08da12f19fd4
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 08:37:00.6430
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 1BbDx5I4uC3SJluTNSP9FDYU5rFsujciB/cBliQ9OuGRbz7n2gwLDPoPEsoqhy0Dc3UMWDzPxDa+EkZ8UtRsIg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM7PR04MB6983

On 31.03.2022 10:27, Roger Pau Monn=C3=A9 wrote:
> On Thu, Mar 31, 2022 at 10:13:06AM +0200, Jan Beulich wrote:
>> On 31.03.2022 10:01, Roger Pau Monn=C3=A9 wrote:
>>> On Thu, Mar 31, 2022 at 08:42:47AM +0200, Jan Beulich wrote:
>>>> On 30.03.2022 19:04, Roger Pau Monn=C3=A9 wrote:
>>>>> On Wed, Mar 30, 2022 at 01:05:31PM +0200,>> --- a/xen/arch/x86/livepa=
tch.c
>>>>>> +++ b/xen/arch/x86/livepatch.c
>>>>>> @@ -157,9 +157,15 @@ void noinline arch_livepatch_apply(struc
>>>>>>       * loaded hotpatch (to avoid racing against other fixups adding=
/removing
>>>>>>       * ENDBR64 or similar instructions).
>>>>>>       */
>>>>>> -    if ( is_endbr64(old_ptr) || is_endbr64_poison(func->old_addr) )
>>>>>> +    if ( len >=3D ENDBR64_LEN &&
>>>>>
>>>>> Sorry, didn't realize before, but shouldn't this check be using
>>>>> old_size instead of len (which is based on new_size)?
>>>>
>>>> Yes and no: In principle yes, but with len =3D=3D func->new_size in th=
e NOP
>>>> case, and with arch_livepatch_verify_func() guaranteeing new_size <=3D
>>>> old_size, the check is still fine for that case. Plus: If new_size was
>>>> less than 4 _but_ there's an ENDBR64 at the start, what would we do? I
>>>> think there's more that needs fixing in this regard. So I guess I'll
>>>> make a v3 with this extra fix dropped and with the livepatch_insn_len(=
)
>>>> invocation simply moved. After all the primary goal is to get the
>>>> stable trees unstuck.
>>>
>>> Right, I agree to try and get the stable trees unblocked ASAP.
>>>
>>> I think the check for ENDBR is only relevant when we are patching the
>>> function with a jump, otherwise the new replacement code should
>>> contain the ENDBR instruction already?
>>
>> No, the "otherwise" case is when we're NOP-ing out code, i.e. when
>> there's no replacement code at all. In this case we need to leave
>> intact the ENDBR, and new_size being less than 4 is bogus afaict in
>> case there actually is an ENDBR.
>=20
> Hm, so we never do in-place replacement of code, and we either
> introduce a jump to the new code or otherwise the function is not to
> be called anymore and hence we fill it with no-ops?

If it wasn't to be called anymore, it would be better to fill the
space with INT3, not NOP. I think the purpose isn't really to nop
out entire functions; it's just that the NOP testcase in the tree
does so.

> Shouldn't in the no-op filling case the call to add_nops be bounded by
> old_size and salso the memcpy to old_addr?
>=20
> I'm not sure I understand why we use new_size when memcpy'ing into
> old_addr, or when filling the insn buffer.

I was wondering too - it would have seemed more natural to either
require old_size =3D=3D new_size in this case, or to demand new_size =3D=3D=
 0
matching new_addr =3D=3D NULL. I'm afraid I have to rely on the livepatch
maintainers to answer your questions.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 08:42:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 08:42:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296768.505229 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZqNr-0007Tl-VB; Thu, 31 Mar 2022 08:42:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296768.505229; Thu, 31 Mar 2022 08:42:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZqNr-0007Te-Rq; Thu, 31 Mar 2022 08:42:23 +0000
Received: by outflank-mailman (input) for mailman id 296768;
 Thu, 31 Mar 2022 08:42:23 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=TTh1=UK=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZqNr-0007TY-AD
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 08:42:23 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 7b6f7961-b0ce-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 10:42:22 +0200 (CEST)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04lp2057.outbound.protection.outlook.com [104.47.13.57]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-38-y6XXvykpMPyCjqzkvfjpVQ-1; Thu, 31 Mar 2022 10:42:19 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by HE1PR0402MB3355.eurprd04.prod.outlook.com (2603:10a6:7:81::28)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.21; Thu, 31 Mar
 2022 08:42:17 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.021; Thu, 31 Mar 2022
 08:42:17 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 7b6f7961-b0ce-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648716142;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=odKDh0pUb8P5ckURyQZJnyR07ELjt2x593/DI3/G4I0=;
	b=X0Py6xWFQMt1jPsZMCmolbBjQuz9j1ntGGE0iusp3Px6GgURUh9GcPQWA9jUjsu/ZTd6g4
	g37iAZ6eUDy4uzfcG3AXiVhjljQep1MpabfWBUlxB8KxMKeKUlCNJqxlTFJD9Ixssot2lb
	LFsdUqePcAXl/w9HiPi+2iq/EoGAnq8=
X-MC-Unique: y6XXvykpMPyCjqzkvfjpVQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=BR0DaytymPK50G9woauW7o3WsYTe9Um2bz94bmTHnY0jYLyzhdki3TtIWNme0431RoHq4miJzOlIwXiuZRgURmpmbSnCtAOozWLSU5jDz9Lpu9TkoACCAHcOBqsGfI6ZEqF3eI6JHi8fdKjclXuRtx43YkhwCn8WWUNvVdwW95WRK/76L0oM6Q+LOfZ0H9o/fC0LEq38YCH6ZlkU/MUlDWvJq5XDAVoFOTfaXlv0s5pK95KqtTWvdzfV13ykaAEwS5rhAakqg3Tne3RMT04Hmg8Kx9Z94f4qFU3llRqgBJxV1y3FrcyLP2yYRq5zYwhwmeW7u25SZ7wFHQxbRThvaQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Hg+QikVvGA78nenuqUw7zHf6Ghwa8wX98L1tevmyRyE=;
 b=VbxG5vF3JGvAcgmihI18EedemxlJwm+AZk5T6H2TKUPUjGZSHHqOF4PiNabU5SpSkPC5L9me0YxJ6Wj0BGFf0mwO3b3iXSTQUcigN279MtCDhp/mAKYd+Hong28xTTMB+ZZDIwu+1D/veywPZd1Vd7jAHr/tWv3f74IyjIJyx10R/yvaUUqMsDVV1HmwkHrUtkPXjYMPTa/+PzPkbcgP1DMzBFYTNCnErWnoJrNWp0cUjH7dXrKy6C1qcFMG05oqOkr9GStrj6F09RgsRAYBSb2cgpWnsaC2dzBLxSMalmG3UxNF8GIxPyVl+Bs11aR7EQ8jDHFnAEts7tuYE/0trw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <ef884c3c-26b4-1bde-9344-aa9be30c1cbc@suse.com>
Date: Thu, 31 Mar 2022 10:42:15 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH v3] livepatch: account for patch offset when applying NOP
 patch
Content-Language: en-US
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
CC: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
 Ross Lagerwall <ross.lagerwall@citrix.com>,
 Konrad Wilk <konrad.wilk@oracle.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 Bjoern Doebel <doebel@amazon.de>
References: <8db632ef-9d9c-d17a-54fd-49912d88d599@suse.com>
 <YkVko/vqhfAfS5Jb@Air-de-Roger>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <YkVko/vqhfAfS5Jb@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AM6PR08CA0013.eurprd08.prod.outlook.com
 (2603:10a6:20b:b2::25) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 7d4b4068-e364-40b1-22b5-08da12f25cee
X-MS-TrafficTypeDiagnostic: HE1PR0402MB3355:EE_
X-Microsoft-Antispam-PRVS:
	<HE1PR0402MB33551F716A1BA7D534ACDAF9B3E19@HE1PR0402MB3355.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(66946007)(66556008)(5660300002)(31696002)(15650500001)(8936002)(8676002)(4326008)(86362001)(66476007)(36756003)(53546011)(6506007)(508600001)(6512007)(6486002)(6916009)(54906003)(316002)(83380400001)(2906002)(2616005)(38100700002)(26005)(31686004)(186003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?+OVOxVxCTsEsufwo20atroOuM5ASlCCkUssEuDqAHGOwclpzId73qGAT2CxS?=
 =?us-ascii?Q?/nIZ0z0Sb60piB8x+LK16wb7oZfrdnfBRDotsCt70UUGBBCF4/I4hFHR8XmD?=
 =?us-ascii?Q?W/zmLWDEaSMeeKpoiY35jlYUgmUZx4MFvE3uEY3+u+uk//6tq9i9FHDFbP4I?=
 =?us-ascii?Q?Q8fw7gAXfKan2AcQ0nib4QSgsSBRZr8jUEdz5Wz1Ilw7p5nEXt4/ZvALGa+T?=
 =?us-ascii?Q?2Br2W15qTAytenngee8bmu2aZeiO0wsgWf9RwD9EFZUkJfY1xdJF2LECe9pu?=
 =?us-ascii?Q?cgnrPmmtzfDFoAXMn6tbz8h+hCKImwqMHg0TGeDbxqMpBINB0U7onRcrewYZ?=
 =?us-ascii?Q?JSCZ/ohAK1azvjmllIu/LZBLlrWXnNfzxmYlG8VFLZkhffilopWgA9snKZFK?=
 =?us-ascii?Q?FiQAOUTDw5D9gTwBndqtZ5dWdajr0GN8DX/pSp+KGqg0frsSPip3EwZzZ+D6?=
 =?us-ascii?Q?DrvK0QKyqZ122vEsrt0m60M8MCKsuPkBrCj2IYCoMZB+bmO1WBO91Kgsgpzg?=
 =?us-ascii?Q?JbazzmPVJKWQ2t7f+x2gckbCDEL+JkrLFu5qpAk37ZCD0RBZ1BodJ4ew3Uri?=
 =?us-ascii?Q?yf3o1EEoLxIk1KkVHBGZmVyK9TTCYHJ+hYokeL7jUT7RCZr1C3B1Z8tK8MHh?=
 =?us-ascii?Q?UwX795s6LZsyAWPTo3HgPDPYQMTJQtbjpDPMrYYT3m99s7ZQouc+M3XgJVMj?=
 =?us-ascii?Q?p7jzDP5zmQMJMV/kI/qa8GnmGc/CNy+D1dVpY1urwFIRUgXnNjZkQIo+O7CD?=
 =?us-ascii?Q?bRCiFoHXTjrvUlj5G3I+szkafvo14nibaMrtWB9qCQcmbcuKjeVuZZkhfc0h?=
 =?us-ascii?Q?NCIORawRmjI1ZLCxRiryQCN8H89zrMTYxS8vp+LWnYFHgsAoH3StvWuOyVJN?=
 =?us-ascii?Q?hXIzFQc+nzGef9weJWLXqs7WpgSvYMnzs1v89jUbBmyohymFBPMDnRa7gxWG?=
 =?us-ascii?Q?qbsugryYfFFdnnpd0+XOJGY73T7XZE/WrUVzoG4pNoVwarnlO9nR7mUNWbR9?=
 =?us-ascii?Q?pMAIHLjzCu4GLZXZyNtUeNArTumXqEbtoVOsz1tGR72Ehc5p1pL2ZyhFn1ob?=
 =?us-ascii?Q?kz/wYwu0JSwN5BzY4zXNHifCweVcSZZwD3dDdaNH1GvSfbRpRTtw+1zyw9zC?=
 =?us-ascii?Q?K9VAzL46ZIEXGhaFWwxD55aXJoingIlJNfbpKwmfTOb6QxVV6FV0RG4cbkmq?=
 =?us-ascii?Q?Fxp4pbMGYSYXHAG60T4w9N6TVWcsO+jEggOXESkcax8Okwa/MRYuewTiwB4S?=
 =?us-ascii?Q?u7L1MufPijyDCWWVcq/yG9AfOLYOPbxkVq6M7DN5TdzCPCozt33CUEl+hCdY?=
 =?us-ascii?Q?kwTJbM7/CW5fj3UXCjJlvh5cqMS5QT0lNJLUH/cPyTxznpBTSvZXHq+8XWrr?=
 =?us-ascii?Q?/arOrzC7ZGh3Av8RNjFWVq3/sPpJp7afkizLMcRxALpM/KVgfMsqeZENFDPW?=
 =?us-ascii?Q?jGG0w/MGdyGbj56cdd6CsFssnoHq/wj9Cd6ctzdK28YBlA4Kz5Hj1FsBajSM?=
 =?us-ascii?Q?jeJQJHaxQy91wCC/EkcBBWxXKpP9DhIrlnnMZ/cniUrOtH0e8tt7M0Tp/TD4?=
 =?us-ascii?Q?xN+3MlluppgwPKU7YjNcjXcr5sgUA+fwHskE7AA/ZKrJdQWnf1iClwEmA32K?=
 =?us-ascii?Q?sD5lqnPwgB3tmD815A5m2fqyyhXL6uLoi+cOR/EpA7Czxih03cLur2Czg0Im?=
 =?us-ascii?Q?QaUimRWOFW0u/a/195LqLWEhaW0fOpo9YuADAlEpnssm+/12Keqm2ZKM+p5+?=
 =?us-ascii?Q?yYClYK7ONg=3D=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7d4b4068-e364-40b1-22b5-08da12f25cee
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 08:42:17.7779
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Gkpd72caY9dcv9qooJFxNN/8BSUv6ZONWjdXHEtf0HblcH8xacfeJEfN9x0vaOTdo/UHFBlvDnejXwG2bVNcYw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0402MB3355

On 31.03.2022 10:21, Roger Pau Monn=C3=A9 wrote:
> On Thu, Mar 31, 2022 at 08:49:46AM +0200, Jan Beulich wrote:
>> While not triggered by the trivial xen_nop in-tree patch on
>> staging/master, that patch exposes a problem on the stable trees, where
>> all functions have ENDBR inserted. When NOP-ing out a range, we need to
>> account for this. Handle this right in livepatch_insn_len().
>>
>> This requires livepatch_insn_len() to be called _after_ ->patch_offset
>> was set.
>>
>> Fixes: 6974c75180f1 ("xen/x86: Livepatch: support patching CET-enhanced =
functions")
>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>=20
> Reviewed-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>

Thanks.

As a note to the livepatch maintainers: I'm going to put this in
without further waiting for suitable acks. Just in case I'll put
it on the 4.16 branch only for starters, to see that it actually
helps there (it's unusual to put something on the stable
branches before it having passed the push gate to master).

> Albeit I don't think I understand how the in-place patching is done. I
> would expect the !func->new_addr branch of the if in
> arch_livepatch_apply to fill the insn buffer with the in-place
> replacement instructions, but I only see the buffer getting filled
> with nops. I'm likely missing something (not that this patch changes
> any of this).

Well, as per the v2 thread: There's no in-place patching except
to NOP out certain insns.

> I'm also having trouble figuring out how we assert that the len value
> (which is derived from new_size if !new_addr) is not greater than
> LIVEPATCH_OPAQUE_SIZE, which is the limit of the insn buffer. Maybe
> that's already checked elsewhere.

That's what my 3rd post-commit-message remark was (partly) about.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 08:44:12 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 08:44:12 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296771.505240 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZqPb-00081w-9i; Thu, 31 Mar 2022 08:44:11 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296771.505240; Thu, 31 Mar 2022 08:44:11 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZqPb-00081p-6k; Thu, 31 Mar 2022 08:44:11 +0000
Received: by outflank-mailman (input) for mailman id 296771;
 Thu, 31 Mar 2022 08:44:10 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nZqPZ-00081j-Vu
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 08:44:09 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nZqPY-0001Du-33; Thu, 31 Mar 2022 08:44:08 +0000
Received: from 54-240-197-234.amazon.com ([54.240.197.234]
 helo=[192.168.9.131]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nZqPX-0005kR-Ta; Thu, 31 Mar 2022 08:44:08 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=iQmujgYlZHSyV8CuNkb2ojGHZqIpLtcUzHdqiSwR7VE=; b=PMYC8zTyK2uWJzgfwrxKttKhP0
	ulVQDbAwjLz3+mcpSXZ+vQYcxumoMQVmo9h75ttxydW+8OMpzvQ0poZKRLLvpu0UYTiAbYEgNUfTn
	MrWHlhI/B1yDiIb6psI9JBZ1npybjRbFP92vu3CGftTy+7JgZl8CExO8fBstUUDY0mBk=;
Message-ID: <701a0bdc-a8d3-06c3-7e40-e741dfa45361@xen.org>
Date: Thu, 31 Mar 2022 09:44:06 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: OS Headers hypercall.h/hypervisor.h
To: Elliott Mitchell <ehem+xen@m5p.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 xen-devel@lists.xenproject.org, Jan Beulich <jbeulich@suse.com>
References: <Yj+ekdLdRa9U7dfa@mattapan.m5p.com>
 <alpine.DEB.2.22.394.2203281523230.2910984@ubuntu-linux-20-04-desktop>
 <c999faa3-ded7-64af-7bf1-f6b8e5620425@suse.com>
 <YkUAlWH6imVV9D00@mattapan.m5p.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <YkUAlWH6imVV9D00@mattapan.m5p.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Elliot,

On 31/03/2022 02:15, Elliott Mitchell wrote:
> On Tue, Mar 29, 2022 at 08:27:24AM +0200, Jan Beulich wrote:
>> On 29.03.2022 00:25, Stefano Stabellini wrote:
>>> On Sat, 26 Mar 2022, Elliott Mitchell wrote:
>>>> The hypercalls implementation for Linux and FreeBSD have two key headers,
>>>> hypercall.h and hypervisor.h.  I'm curious why the implementations for
>>>> x86 and ARM* are so distinct.
>>>>
>>>> I found it fairly straightforward to implement ARM* versions of the x86
>>>> _hypercall#() macros.  Once that is done, most of the wrappers in the x86
>>>> hypercall.h can be moved to a shared hypervisor.h header.
>>>>
>>>> Why does Xen/ARM on Linux still have hypercall.S when merging the
>>>> headers should reduce maintainance?
>>>>
>>>> Was GCC extended inline assembly language for ARM* thought too awful?
>>>>
>>>> I'm also curious why these headers are part of the Linux kernel, instead
>>>> of being maintained by the Xen Project?
>>>
>>> I would have to dig through ancient archives to give you a full answer
>>> but the reason was that the asm inline on ARM didn't provide enough
>>> guarantees on ordering and registers it would use and clobber.
>>
>> While there may be ordering issues (albeit most ought to be taken care
>> of by marking the asm() volatile and having it have a memory clobber),
>> registers used / clobbered ought to always be expressable by asm() -
>> if not by constraints covering just a single register (such frequently
>> simply don't exist), then by using register variables tied to a
>> particular register. Of course in all of this there's an assumption of
>> no bugs in this area in the compilers claimed as being supported ...
> 
> I'm merely been working with recent versions of Clang on FreeBSD, but
> I've got something which appears to work.
> 
> I would be somewhat hopeful GCC might have fewer bugs on ARM as
> registers aren't so precious.  Yet that could well be a minefield.

Linux and Xen have already some code heavily using inline assembly for 
the SMCCC v1.1 helpers. So, in theory, it should be possible to convert 
the hypercall to use inline assembly helpers.

Unlike SMCCC v1.1, the hypercalls are following the AAPCS. So by using 
the assembly wrapper we don't have to worry on what to save as the 
compiler will automatically know what to do. Looking at 
xen/include/public/arch-arm.h, we may be able to reduce the numbers of 
registers to preserve. So it would be more interesting to switch to 
inline assembly to reduce the number of instructions.

That said, we also need to be mindful of straigh-line speculation with 
HVC instruction. With the inline version, the speculation barrier (sb or 
dsb/isb) would need to be architecturally executed. With the assembly 
wrapper, I believe we could only speculatively execute it by adding 
after the ret.

Note that Linux doesn't have the speculation barrier yet. In in two mind 
whether it should be added. In one hand, it would be good to make the 
hypercalls safe by default (IOW the caller doesn't need to check for 
gadget after). On the other hand, AFAIK the path would only be reachable 
with root privileges.

That said, the security posture may be different on other OS. So if we 
intend to share the header with other OS, then the current approach 
might be better.

Cheers

[1] https://developer.arm.com/documentation/102825/latest

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 08:50:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 08:50:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296776.505251 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZqVh-00013t-WA; Thu, 31 Mar 2022 08:50:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296776.505251; Thu, 31 Mar 2022 08:50:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZqVh-00013m-Sd; Thu, 31 Mar 2022 08:50:29 +0000
Received: by outflank-mailman (input) for mailman id 296776;
 Thu, 31 Mar 2022 08:50:28 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=TTh1=UK=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZqVg-00013g-Kv
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 08:50:28 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 9ca28cfd-b0cf-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 10:50:27 +0200 (CEST)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 (mail-db3eur04lp2051.outbound.protection.outlook.com [104.47.12.51]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-28-ugKrotDOP5iCalwqYM6Fzg-1; Thu, 31 Mar 2022 10:50:24 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by HE1PR0402MB3627.eurprd04.prod.outlook.com (2603:10a6:7:84::25)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.22; Thu, 31 Mar
 2022 08:50:22 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.021; Thu, 31 Mar 2022
 08:50:22 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9ca28cfd-b0cf-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648716627;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=09wT7A4DsdGxUWO4vNRv3n6kZVUUopasuBCdY4PwJUg=;
	b=SK0DjWBlAgNJWogRzBAXAPn4P6YhYuIpKCUlvwkKxAGXyJpTmMuqFl3ajLf87bukMGGIVc
	CB04mfzXpdvt6GTqzijakt2fboSgA35TfooUocHWwGVU1ciM+2P3Cj6+bkGowjOZ7Zd/mK
	YFO9rStkZVNtm21oYTu3xzU3kKknurc=
X-MC-Unique: ugKrotDOP5iCalwqYM6Fzg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=oaPtsrJkjrFpf45z452owaQWnxHYuLQ9PBNrTgAH8zvdtKJ8d1wdLOoAJCOO4bxu4cTOAGx00ZB6G7f9cK0H6lU5qPkZ2071OocevzslvjYvQdgOja2yqdEZ5yEi+yRNaslJ/th7Dl133Z9F49u6zs0Pz5MzJB+OGH8cNUXseomCLt2q4o+U3Ng7o48DA8sjCTmz1ehipfv9koN5m+dAcpf+MqGwgSxDote9UmzWpelj3LVbDgMyPwsc+8fLTUSFxqjtktQ/eBPXi46jh4wa+oNWtKHqyX4pGWny0GJLCHbwv+DCMLPJUyfhvxe0HiDOb31AHJUGSiJSorzXsC20IA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=09wT7A4DsdGxUWO4vNRv3n6kZVUUopasuBCdY4PwJUg=;
 b=GsbsrOMcw89sJvtQkEpoTahL7zjw7aQubORmPca+AUktz0mjsqVfdlbVpawEN/MWXH5UWeNpmt+uFoT3uSTVlx84khSQn390aH0N7kl/4S2xUbcq6f8RLt6h6vwNjCYTaDwKqkMlhghSA7u5DVWdAHCfVaIsFGr4/IEIGubl44uf4OAnelgoaK6TL6lS6Dx0e68HyNM9o0ro5kocVeIJ+bHwLj6VrHeNxXN6WhhZVj5untl0snyA2XxzLj5n7U9QbCqax7/V4Ejowr1esqmWWRg4DC6z4fnN8K0yt75uN4eaBhgkoVa5WLpNUkrA+Hm8547O7ZAWHxulXrLOyMqTuQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <74571cb4-55ef-e2ae-3645-aa827472ae25@suse.com>
Date: Thu, 31 Mar 2022 10:50:19 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [PATCH] Livepatch: fix typos
Content-Language: en-US
To: Bjoern Doebel <doebel@amazon.de>
Cc: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
 Ross Lagerwall <ross.lagerwall@citrix.com>, xen-devel@lists.xenproject.org
References: <032faef0d56d1de17b9dd229b33bd755c402b978.1647025870.git.doebel@amazon.de>
From: Jan Beulich <jbeulich@suse.com>
In-Reply-To: <032faef0d56d1de17b9dd229b33bd755c402b978.1647025870.git.doebel@amazon.de>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: FR3P281CA0080.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:1f::15) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: dbd2e7c1-d9a2-47c4-5234-08da12f37d95
X-MS-TrafficTypeDiagnostic: HE1PR0402MB3627:EE_
X-Microsoft-Antispam-PRVS:
	<HE1PR0402MB36270089A57428E24C8503F3B3E19@HE1PR0402MB3627.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(4744005)(2906002)(6486002)(86362001)(31696002)(2616005)(8936002)(186003)(26005)(6666004)(508600001)(38100700002)(6512007)(53546011)(6506007)(4326008)(36756003)(66946007)(66476007)(8676002)(31686004)(316002)(5660300002)(54906003)(6916009)(66556008)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?M0lCNUNpK3RYTVZFb3N1U25EVysxR3Q4L01taG9wN2QyaVlEeXo5OUh4TzZF?=
 =?utf-8?B?MkFWUHN4RnJmcG9NUGZGd3U5R2doeUZnUldySG5CeG1Na3lrZDlYSWIzUUtC?=
 =?utf-8?B?QUQveTluNElYSHB1TlJScWpQeDJsZHpveFF2WEpmMFM1cjhLTEhiUlNYSmZL?=
 =?utf-8?B?WXNTam4wWXZ2OXRveld6dnZxUGtQd2YzaFVkakNEQVAyWlhnSzBKY3R2V0Jn?=
 =?utf-8?B?YnNYVUIzQWF3RWlSUjRVZEJER2JvTytEWXVpbk9OVzZGNUs2S29vSXJjTGcw?=
 =?utf-8?B?V1lUSzFJNFRjb3pHQm00TG5VNlhtandpRy9LSDJJeEdaK2pNRWpxN3J2YjZV?=
 =?utf-8?B?V0JRd3pnSlNSV0x2OUdja3htNzM3U2gwOGZUMkFBdjFOTWN1cVBoVGhBQVFR?=
 =?utf-8?B?TSs1TFU2RW8xZkJ1MllJWFZMN0labVNPWFZ4YUNjSDRpUGpkVEg3OVZXQXh2?=
 =?utf-8?B?eHVIempZdGxwc3F6Zy9zN1gyZEd3ZGdFN0orVHFVWXJOZzRtMVZxN1B0RlFy?=
 =?utf-8?B?M3ovTXFSU3ZaTExzRkl5WmsxSXAvYURmQTdMNkdBdjk4dGVnalFIZFlOQUtU?=
 =?utf-8?B?RCtHM09URlhXS05TZDRGaXFtLzNMTU9PdE54UUtsOUhacnlGaUVMZFhCVkFH?=
 =?utf-8?B?dVQyWXZUeUhyM3UvM2dYSjJ3aWQ4cVBaUHdqQVREU3R6VHViYVhGZkpMUE9x?=
 =?utf-8?B?ZWkxeHczenhCdklHOW1IQXQzeDlqQURqZ0tUdFN6SlFRc0d6WlFzNnA3ZXEv?=
 =?utf-8?B?N0UvMm9ocEg3OTFWUHR1QkEyaVM4NncrazdzUzdPVndYcHlOVFQveEdGT1Nh?=
 =?utf-8?B?RVdrS1VtdTUxNFQrN2dZbU9kZHQxaGtwR3dvNnhEMy84dS9pbVpCd0IwMXFr?=
 =?utf-8?B?cDhPZFZWOTZLSTc1ZlZnYzNTSU0xTCtGclcrbmVnM3Zld01IL1JJS1hsdWlD?=
 =?utf-8?B?VzdXN1NiUWxlR0hXTVMydmJFeVJBRnE5aVNsS0t2cXQxdVBxRmlXVlpPWUtB?=
 =?utf-8?B?aFc4V1kxSmc2SDNJNEtlK0RZY1pRQXMzdGx4R2VZVmtKSXpGZ3NYalcyZmpa?=
 =?utf-8?B?YVBEUUN3TjNhMmh6UHdhb2tyekQyT3Q3b1R4aUVRcGJGMTNkTERKU09Jc3NY?=
 =?utf-8?B?VU1Jbnh5YWxWd3RaR2VZMy9DbzBYMFN1U0xSZTNYVTdRS2hEaEl1YlJ4WE56?=
 =?utf-8?B?Yk9PdDVGem1xMXpXZ1VtRmg2RncrU3d4OUFmUlZRVFhWTWdMU2FUbUQzaWtX?=
 =?utf-8?B?U2RSUUZtYmhTcjZiZlhvcVNLQ3hrK3dKa3R4dnBKMlJMaGRvUTVMempDWFZN?=
 =?utf-8?B?ZU9pelVoTVFkRGppMU1SY3VQTHlNaGVsTU1mZFlKc21ITm1GWXFKRWRHSVBp?=
 =?utf-8?B?Q25oMzIyZG1HZ3kycHhpYzVaTm9wMTJjWW5NRzNPZTYrcHBEYk1lYlA1SDZI?=
 =?utf-8?B?eE5wcTNhS2VpWktrR3dFU2cvd2x4NVZjc0ZCdGR3TmQ0Qm1yRkUxVlFxakdm?=
 =?utf-8?B?MnQ5d2xtYlVqc3BoZE13ME5zeElTL09Dd09KUDd1ZTFrSkhDeGM3YTVxZndQ?=
 =?utf-8?B?UjNVSzlaSEhVMzJPOUhHQXhFUkJSQUNBejE5VGF2QUNsWXNVaXJlV3JZRW9B?=
 =?utf-8?B?MVkxOTd2L2RZZ1VxLzdnNzlWWXNwSWxOODdHbVBEdlNUZ3lwN0FGRXJtdHIy?=
 =?utf-8?B?ZVdwdlhlWURhMFY3UWNVakExcXNTa3N3TW4zbHVxWksySVQwMnFVbEpDcUEy?=
 =?utf-8?B?cHRtOGxRU2lxUDlrdklEUUdRVkFHTWhTUlNDN1IyNjc2Yjk0bEFtektoWklp?=
 =?utf-8?B?djZiYzdhQVVmVHpwbVh3VEtTMGpONFUrUnhaWkZScFlyOW9NTEo1RytCeGha?=
 =?utf-8?B?UHJSYm5FZHhTR3BzQkFVTHpsSm5yVE5aQllicUxLdGlVWFk2emFHVmw0Kyt4?=
 =?utf-8?B?OTJvenBoSDRRUS9pUldkS2JYK0s3UmhvRGp1amhvYzR4YVNFbU80ZnpObjRo?=
 =?utf-8?B?YzJDcUJzRDZ4SGdDM2s2L0pOWEtOQVlHSW9IVGc4eEJFUS9WcExScTR3MDd0?=
 =?utf-8?B?L04xL0t4SFpEMllJMFl5bmoyNDdPTkhqTHpRa1pDamxsSXJJOW5wa1UzYXVs?=
 =?utf-8?B?c2F6MEVkZ3RvazhVNVJrTUJLUHkveUhEeGh0Zk45UDN4NzkvblB1cXpwTGsx?=
 =?utf-8?B?ZVVRM1RsNnhsYVVvTEw1MU56eGErYU9ndjljdUtkbERYeGROQzV5V1BFN3B4?=
 =?utf-8?B?UmVLTHYzMVo0QnhzYXpkMC96aXR2RkhhRG5ybldvMGwxeDVUclIyY1RLOVVF?=
 =?utf-8?B?SWVhUEF1R3R4UjNTWlQ4OVk1MkJGbTZjbncwRWZ6RHIxWEZFaThZUT09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: dbd2e7c1-d9a2-47c4-5234-08da12f37d95
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 08:50:22.1980
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 7uAHkBXsbnIvmMyrPap+f2cDMQJRgWr2sF0lTCCMf55YyBDw+zpAYctDKNUBkCwgDIheJYuxM5svO2JlLPgU4g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0402MB3627

On 11.03.2022 20:11, Bjoern Doebel wrote:
> Fix a couple of typos in livepatch code.
> 
> Signed-off-by: Bjoern Doebel <doebel@amazon.de>
> CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
> CC: Ross Lagerwall <ross.lagerwall@citrix.com>

Acked-by: Jan Beulich <jbeulich@suse.com>
and committed in spite of a lack of a maintainer ack.

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 09:28:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 09:28:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296788.505292 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZr6O-0004nh-0T; Thu, 31 Mar 2022 09:28:24 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296788.505292; Thu, 31 Mar 2022 09:28:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZr6N-0004na-Tf; Thu, 31 Mar 2022 09:28:23 +0000
Received: by outflank-mailman (input) for mailman id 296788;
 Thu, 31 Mar 2022 09:28:22 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=TTh1=UK=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZr6M-0004nT-ML
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 09:28:22 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id e7292411-b0d4-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 11:28:20 +0200 (CEST)
Received: from EUR03-DB5-obe.outbound.protection.outlook.com
 (mail-db5eur03lp2056.outbound.protection.outlook.com [104.47.10.56]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-13-TiCOUE4PPRu8QctVnmqWFQ-1; Thu, 31 Mar 2022 11:28:16 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM9PR04MB8381.eurprd04.prod.outlook.com (2603:10a6:20b:3b5::17)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.22; Thu, 31 Mar
 2022 09:28:15 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.021; Thu, 31 Mar 2022
 09:28:15 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e7292411-b0d4-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648718899;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=bhcTZPk3ON66jS3JUnkpyJ9uYUPk4wx08SNsWwtQTYQ=;
	b=GDo529fQHjhYbZHSyYOGQi5vLqgKz/7RDupMNHnF+d9BQxXP1Vy7lIdd8O6nCzhdynpi/S
	RzFbgXJUcb3dx1lAEGAH+H2alXjCfPdcGBtnAYUU773QT+DwvldkL4JL3rnCCgi0LBlqj0
	i6vxsxzG6wNnujmPJwYjy2pCZPnWcAY=
X-MC-Unique: TiCOUE4PPRu8QctVnmqWFQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=nyqjTRz50wpSNCcMl3PpWmom3yYyNE+9q9jDLPUHxs0KKcB2jmD2gAAEHsmCuluvZcwWV72vrKFmVqrFCFdVEAvnbuGEGdpYKiVa17hgyZppBmlm30/h8wz3P7RpnRUW6na6qXf3fsRn1uWlqehLaOAA/BfCdXVs3jFGzAC3BmG62tsihTO2xGbEyONcDn+/y0/ALHOeY/BtyQUySBopGs+3v8peR0ioGkM/D8pXYcakYPPAQpxYDGpp4AKccvAKpW7rC3XoApyOInwLob58LuGJbT2YR71JFPNwNa6ZBtcYltoOGT/n9O6iEjl4mOMwQlMelpZ6S+1mvWNVidabww==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=bhcTZPk3ON66jS3JUnkpyJ9uYUPk4wx08SNsWwtQTYQ=;
 b=G0s5rcQnaYAdLaNHiUIVMYUw2xxtNCYqMIFGv8OHNC53HPh7kE8ZR3jo7qybhwY9km/xXIm4rK9TRVz7m8KaAEfVIqYNYxNZC/vYwsVgb3MYzaY+k765yu4pAS/tcc0oB+S4N3l8tREPHDYTiUqNwjRkQZJxs3nnkcvefKQ2MmLlrpwwpmO2QGj65XeqsQLrEkiKaLTMOfbAsPzfb3TBYZ8LgEwC2Ph2BJbnGH/nQK5GTfKGlyH388fmflrfZIFQHC/97OxKt7i7m7wA7uNdSujy0tYfLloE6liEjVWOA0+KFwBhdXGsVqMV2ezkgHcMgYp0T1JDn1+fCM2+HRG73w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <6e540bc9-c536-84ac-fb1c-8271e7731b3e@suse.com>
Date: Thu, 31 Mar 2022 11:28:12 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH v4 0/4] x86: further time/APIC improvements (and more)
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
Content-Language: en-US
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: FR3P281CA0033.DEUP281.PROD.OUTLOOK.COM
 (2603:10a6:d10:1c::12) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 6e08b399-dbe5-4ac0-18b9-08da12f8c842
X-MS-TrafficTypeDiagnostic: AM9PR04MB8381:EE_
X-Microsoft-Antispam-PRVS:
	<AM9PR04MB8381E06C41F5E3EF364B9387B3E19@AM9PR04MB8381.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6666004)(4744005)(8936002)(6916009)(31686004)(31696002)(316002)(4326008)(6506007)(54906003)(36756003)(38100700002)(2906002)(8676002)(66476007)(2616005)(86362001)(5660300002)(508600001)(6512007)(26005)(6486002)(66946007)(186003)(66556008)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?QXVPRExoZFU4MVFTUWtXYWtrOXg4bmFtVGgrdEZhTGhnOEJ3UTROL21MbWlH?=
 =?utf-8?B?Q2dLTUdJeHN6bUxyZXlyelhwYk1qZjJiMVpnRzRWMG5kWTNDVEFldHp3WlhN?=
 =?utf-8?B?U2Q0UEtHcjMyNk1jQk1XN0puM1ZoZzFGOGhEZmhnaWdSQ3k3NGZOcHJzV05n?=
 =?utf-8?B?R0FMd1A3L3JFQlFlalA0RGlJWHZCRnZwdzZLb1o2YWtFWHdmSXZoQStHRTIw?=
 =?utf-8?B?N2JZOUNCMFdlZUp4cHJSUmt6L0xOL05NV09vdHI3bmt4Mm03dUh5R3B4c3Vy?=
 =?utf-8?B?VnNNVlFrbU8wSkFLaW5YaTFrTWVGZW4xWGhJUU8yVTJoTTRtUE80NmtPcXph?=
 =?utf-8?B?MjRaMm5RV1lOUEdTai9JTkwyUkticG15VUY0dDJzWXZremhmanJORDZQeTRG?=
 =?utf-8?B?YktEL2ZUWnBINStrNS9XRXlnUmtWL3JJOVhhb1lYMVBlT29BcnFENHVVNERW?=
 =?utf-8?B?VFpWckVNZ1htUW5XM2lwOFZNUUN6blpOMHhrYnF5OXY1dk44SFlIVGVKNmlp?=
 =?utf-8?B?VVVNNlp4amk5aUtuMDM5d2FMMmxsOXF1VXZCMEZMaXNhQS91RzlVZmZWK0Rw?=
 =?utf-8?B?L1p1cGtWL05aV2doY3p0YzFGVmZFWUlTS1h6ZGcyQkRYbFRtRGQ2VDlXRmds?=
 =?utf-8?B?WGRtclhqQmtJWlk1bDhhcFBZcmhjb283S1ZSYU1mSjgweDhxcGJHVnlpakxt?=
 =?utf-8?B?VkcxeTlpemZkaEVCK0VQMnBIL0FKRWp5VUdpcFVNbjRCRG51VWttY1JMVHhi?=
 =?utf-8?B?Q2F1WE5jNkk1WGh4NmlJcGhlcDZ1b2JXOVA0ZllnTUx5TEJGajlvdUJpR1NB?=
 =?utf-8?B?VlJwUitOY1g4L1cvTFNVRkY3S2pjMmN3K0M3MDh1ZDBMZmRNWUV1QWZ2dUhX?=
 =?utf-8?B?cktzWVBHZ1M4amdJVnJ5UE5qcE5lZm1TV0NKTXpRTW9YeHltRStDaWRJMDUx?=
 =?utf-8?B?bitISDk5enFDcFhlSGU2Q3RGZi9ZWk94TlcxQWlxVUlHZlNLb1pMZjVzUldG?=
 =?utf-8?B?T3pqd2lZOUkvZ2tZMFNwcjRVVkRsd2ZmbUJiRFN2VzdrU0llM29DckhwdUdx?=
 =?utf-8?B?Y0hva0RrOVpqTTkyNzZtTjhNZVZQRVZxem5QYjJkYU5CQTFWVVE2WE8xNk51?=
 =?utf-8?B?TUFLa210djQxcHdOZVMxRFRwT3cyYW44KzNCdytGcE8za240bmhZZHovOVRH?=
 =?utf-8?B?czArL3dLcXp0UXBhNE8vOFlWSWpyYndiK1RtTmJvUXpQYmFydkptbmtYa0xi?=
 =?utf-8?B?WHNjR3ZQUmxNVGo0eGo5QlJGN0Z2bXFDaHlXb052L1VIbXZmMzVuak5XL3VY?=
 =?utf-8?B?ZzIrZjB4UnMzU3NUeHJRV0tsbnIzVHV1SVBGVWt6Yzd5ODBMZG5TTlUxV2ox?=
 =?utf-8?B?OFNkWjRiYlFJSmE0SURERHNpbXdtMW1XOEsvK2ptQXEwdzhRL0JqYm16ZGZ3?=
 =?utf-8?B?bzNWeVFEa055bjZEcHJ4Z3BBUk83WlNFMzUvakhGbmYzUmFGZUxkd3RkY0tB?=
 =?utf-8?B?dWh5blN6WlVUUzhwU3NlRWlMTkdJV3E0NHRCNnFKUCsxYmdHRjdYSThNWDRx?=
 =?utf-8?B?VUFzTHhGS3oxRzJDR1p6STFidnpGY0NZQzJIRUZCNjdiV290OUxjcHVPYjhu?=
 =?utf-8?B?YkdkNEh3cE5LaklaYzNuWmZFT0dmckk4VVZOQWNySkdHU0IxNklQWTBkR3Rw?=
 =?utf-8?B?K1JIdHBsSFcrdmdoMkFPNmtCSG9kOU1LT3psTG96L3dVR3dvcG9YNy9rNkkz?=
 =?utf-8?B?TDlPSUFKbHRIbmdxV0doTjRMK0JZaGxzVG9uYVRnSS9xNkJEa2d6bmhIRWIz?=
 =?utf-8?B?THg0YXhZS3hadVozTk00aWlSZHlmQmx2Sk5FVEpQSWx3RDVjampXcTZpUUhT?=
 =?utf-8?B?UnBXNW9FbFNYVWxsMjhHclF5eG5JdUdZTFEzNkRYS3U2Y21wdDZmbWxDbDZM?=
 =?utf-8?B?b0RGd2RxQUd1T3VxYVA1dGN1bkcxSGpWSTV0dVl4UDI4M0NsMHdnRWEwQi8y?=
 =?utf-8?B?VEVmUWZXcnl2S0JMcmRFK29Hb3ZuanZRZ1ZubHZsOEhZYlpBT3JQbmJaTTEx?=
 =?utf-8?B?TWhsWkVqT04zVmY1QnZCcGtxWTlMdDlvT3JOSndZdFNZeStKa0h4VlN3ZVQw?=
 =?utf-8?B?ZWYycjNyaitaSE85NGxFZzdIWmJSVnU3Zk5DNUlrMURYZlJBVUFSc2NFTTFQ?=
 =?utf-8?B?UUVJTGZ6T3RTbzZ4RmZEQlpzU0Fxd0x3Wks1dXk0b3hwSmcwK3N5YjJmSUM4?=
 =?utf-8?B?T0NjK2l2eU5OV2xMZytNb0hkOFpxb0Zzdm0vWlBlbmpucVJRUklnTjhlUVc0?=
 =?utf-8?B?a2kyM0dKaTh1dDJIL2dQYjRPOHp6ZVpxQXliQWZrL0JUbVNYUzllUT09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6e08b399-dbe5-4ac0-18b9-08da12f8c842
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 09:28:14.9497
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: m+84IaHnKB7GswU1iMrKN0ZNvJ1bfKplHXPcQ1l5YazgJzBWaUba0WSTXxmFP3QdwbX6eMF98FsMTJ2k4ZSIEg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR04MB8381

... plus some tidying (or so I hope).

While perhaps seemingly unrelated, the 3rd patch is actually a result
of my (successlessly) hunting for PASTE() or alike, as now being
introduced by patch 2.

1: APIC: calibrate against platform timer when possible
2: APIC: make connections between seemingly arbitrary numbers
3: include: move STR() and IS_ALIGNED()
4: time: use fake read_tsc()

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 09:29:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 09:29:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296791.505304 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZr6y-0005KO-Et; Thu, 31 Mar 2022 09:29:00 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296791.505304; Thu, 31 Mar 2022 09:29:00 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZr6y-0005KH-9y; Thu, 31 Mar 2022 09:29:00 +0000
Received: by outflank-mailman (input) for mailman id 296791;
 Thu, 31 Mar 2022 09:28:58 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=lDhN=UK=citrix.com=prvs=08274bcc4=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nZr6w-0005JJ-EX
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 09:28:58 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id fbec18e6-b0d4-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 11:28:56 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fbec18e6-b0d4-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648718936;
  h=from:to:cc:subject:date:message-id:
   content-transfer-encoding:mime-version;
  bh=PSnDu/bubIN91jpQ9kh6eaPJhgOuwH/MbDE3oeNaufE=;
  b=XWD2BCAV01DWQGpJuPzXZYiMEtjbH+iouTjZedNOwkV/4x0WOzYLWszX
   0OEigvqKxVw9G59hWuTFqTLr4FC7U6Uz+b05jaNNPFTVF3vM7OHWxv45V
   dAzzIsaW0QsVNuoPtB0fxqCqZwN+BYBbI3xZhX47PtF2Z8JcnPIFERYEM
   Q=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67633831
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:EUpPN6nfda7ECmF27l1q92Po5gyWJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xIZCDvVb/qLajejfN8nYdzi9BkO7JfQy9VhG1BtqXg1QyMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiWFrV4
 LsenuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYSFcMEJeLtc4nVkcBPCE5JPReypzpPi3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3oHZvwCufFf87aZvCX7/L9ZlT2zJYasVmQ6mAP
 JFJMmMHgBLofQFBZlpMK9EEvOqHvWf0LGRfsGq8nP9ii4TU5FMoi+W8WDbPQfSVQe1Fk0Deo
 XjJl0z7CBwHMN2UyRKe72mhwOTImEvTSI8UUbG16PNuqFmS3XAITg0bU0Ohpvu0gVL4XMhQQ
 3H44QJ38/J0rhbyCICgAVvo+xZooyLwRfJRQ8gU0kag4JDRvV+2Bi8dFyZzS/I54ZpeqSMR6
 neFmNbgBDpKubKTSG6A+rr8kQ5eKRT5PkdZO3ZaEFJtD83L5dhq00mRFooL/Lud1IWdJN3m/
 9ydQMHSbZ03hNVD6ai09Euvb9mE9smQFV5dCuk6swuYAuJFiGyNOtTABbvzt68owGOlor+p5
 iJsdy+2trxmMH11vHbRKNjh5Znwjxp/DBXSgER0A74q/Cm39niocOh4uW8idBk3b5laI2K2P
 Sc/XD+9ArcJZhNGioctPuqM5zkCl/C8RbwJqNiKBjaxXnSBXFDep3w/DaJh92vsjFItgckC1
 WSzKq6R4YIhIf0/llKeHr5FuZdyn3xW7T6DFPjTkkX8uZLDNSH9dFvwGAbXBgzPxPjf+1u9H
 hc2H5bi9iizp8WlPHGNqNRDfA1SRZX5bLivw/Fqmie4ClMOMEkqCuPLwKNnfIpgnq9PkfzP8
 G37UUhdoGcTT1WeQelWQhiPsI/SYKs=
IronPort-HdrOrdr: A9a23:QD5C+aM3QEWho8BcTsWjsMiBIKoaSvp037BN7TEXdfU1SL39qy
 nKpp8mPHDP5Ar5NEtOpTniAsm9qBHnm6KdiLN5Vd3OYOCMggqVBbAnwYz+wyDxXw3Sn9QtsJ
 uIqpIOa+EY22IK7/rH3A==
X-IronPort-AV: E=Sophos;i="5.90,224,1643691600"; 
   d="scan'208";a="67633831"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=X3Qr0r4aPWbzUuyOOLXDelQj5+l/Elky3KnQY6W/mJ0yytTX4ewajFiAn7hyQCPtKTVQSsTBf7U5gxuUj154TpF0Ws7gNKyTTIzx92i/bL/qlweQLeaFZSq2BvEY9Wq7jeMdtuGFygAh9g79mXnK8o4tlefU6HbRSUvCcW5nKRcF8ZMlP0Izfo0XZ+Xcl916Rjgx9W2HqBYx1O9ni5yRBKrGKqWrrtisgYJh4HX01GrMDiHHOTEkfckCvxQVXs2olxcMExVPcZL/CPS6DchskCQvV6MLtuX+hSySla3+XmSrLbfGlT8j7ZUeDLp10FKzorO7XusqjmEePdyTpQFFgA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=2mS2ShJkHIoRZHGPPQN0koP60ywG8SarWw/5svPvWms=;
 b=RftWA/xbCifd+DUsWYlituUlJ4qTF6VXSOKVlEZnRLqS7nxmLHt0c0eCGEgGMeQmTude9U+mCgodky97gw+6GAcPfVYu7A6EfeD9GiehJA2jUzLWjODorLrGroVoYHrp604qQhqRJNr+04MoJd9UxMN9a4QN3CYIbrcQouznoExX45APgHcetrIvdtTLl6oCIKnTtUaCg+EoCkpWBVe+Aq6W6vq0tv3KWYXNpDdU9MVEUttn3RtkhQlrRxY8qzbm7FpCgHb/mLSK4noED3VFvfaT6rz1k79mBZ7g8Rr46UGaQhwLKlWrkjkeQPhKZCcY00fjwluLS7grKQ4yU9l9Hg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=2mS2ShJkHIoRZHGPPQN0koP60ywG8SarWw/5svPvWms=;
 b=qngFVHWLe2Mu/n/rp0RoCMyHLhG7mmUeL6wYQr/3V3P3g8AvWDzCmr47k6NJ4Q3hb/m40QeB5ck61t8ZuieDuHz6NFAlsf9jAIFBB8+X+0ooIwxQBb0vNE/29SnVPEJVF/q+C5h3MgESwpCuVubUzNrOxhLkGasnE62bOQmmL8s=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: [PATCH v3 0/3] amd/msr: implement MSR_VIRT_SPEC_CTRL for HVM guests
Date: Thu, 31 Mar 2022 11:27:14 +0200
Message-ID: <20220331092717.9023-1-roger.pau@citrix.com>
X-Mailer: git-send-email 2.35.1
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO4P265CA0099.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:2bc::20) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 485e5fc1-6a0c-4235-1cda-08da12f8ddbe
X-MS-TrafficTypeDiagnostic: CY4PR03MB3112:EE_
X-Microsoft-Antispam-PRVS: <CY4PR03MB3112548AA766E4458AA6676B8FE19@CY4PR03MB3112.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(36756003)(186003)(1076003)(26005)(83380400001)(2906002)(6506007)(2616005)(6666004)(66556008)(5660300002)(54906003)(6512007)(82960400001)(8936002)(6486002)(66476007)(38100700002)(8676002)(6916009)(4326008)(86362001)(316002)(66946007)(508600001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?bWxUOGVTV1JwQlpiWlhJTVRSVkFId1FLRElxckNhcTRLdC9TL3hoR1M5OFcz?=
 =?utf-8?B?UTYyVjdVOGdIZXRyNENHZkRDbGw1WEpqSExHY3Rud2tpNXdwTEtpRFM1d2Rr?=
 =?utf-8?B?QTFmN0RLY3dyYUpmTXNvZGZHdEs4ZzJvWmswZXFodnlVdkNrRy9zQ09NTTBa?=
 =?utf-8?B?UTZMNUZheDhGSEx3MWlhWmRIRVRrell4NWZUT2YzYTVrYmx2ZmFCVVJUZDNQ?=
 =?utf-8?B?ZVF6aEg2VE14bDkyWnZGMUhIMk5RK2NkUXFkQUxJamk0eE10NGxzOURocWMz?=
 =?utf-8?B?T3NXcVhEbmFRQm1BYmNlTUUrK2JVZVVGb3VmTGludStnV3RWNUhUWEgwOHhC?=
 =?utf-8?B?eXRjZlZoMXpKcTlTeXYvZnZwd0dQWjcxZ3lGa0h1YVQyakNYZld6SDEwMUUx?=
 =?utf-8?B?OElnaHJCZkZaeXNhdW9YSjhmR2hRbW8rVi9mOVNoSUU1RE4wRFRoSms2NHE3?=
 =?utf-8?B?cXdPSXVSSWZQVmxWWnJzT1EvSFU0TjYwaWE2WVZucmNIOUJ1TzZWbFZSbitW?=
 =?utf-8?B?MHFuREIxcnlBeGR2YThtT1dhZHlyZG9JNE01TjVJZDVjZ1p5NHZ3N1oxMWtt?=
 =?utf-8?B?Q0Y4WUQ2cXc5NjAzYUxaRnlwNm1zOU0zdmgvK1lRZkI0UGtjZGt0Q0YwTDhU?=
 =?utf-8?B?dUw5RUpBREVueFhDUDBENmlrWS91UVpLZVAwRWZtb1hCMXFiYWkzSW5BT1Js?=
 =?utf-8?B?c0h1N0ZNTFBOelY4cHJPckFZcDhsUWoxK0dKdkR5dXNCMjBWbzVscjR1QW9C?=
 =?utf-8?B?QXh4MTlGYTZoSWRaUWk0NENrVXBkckdTbHpsL2Z2aHVDaGdvRXA3cGhEZm9q?=
 =?utf-8?B?ZlVCRjdWRWtvMVZwaXJkNWE4clBwTHVKYy9NQlM0UUd2U1RGc3hQdjlkbzZ2?=
 =?utf-8?B?SU9iUkNVWWtGTGs0anFZZnlUVnFrRjd0dC82TDZCVjNYTXNTSnp6SUUweWI4?=
 =?utf-8?B?bE9IUlpZODdzNjJUT1Z5SXJYZzdIV1ppTytkd3hkNG9sUGIwM2RmT3ZBNCtB?=
 =?utf-8?B?ck1sZkhXQU1nWit5NWdqVXFibTBNKzE2dzlFUDM0TkhMT0pWRysycmV3dzJy?=
 =?utf-8?B?dGh2S25sQlQ3RlZOVmp5b3o5MitUMVQyeFcxUzJHMHNQM1Q3Y3pkNUg0YVBP?=
 =?utf-8?B?U3IyTjRORkFwSk1zRUgycUxZa3loMVd4R1hpdkZBR0EyQU1YMjE5YitRU2Fj?=
 =?utf-8?B?UVBGZ1dINTZ5TS9meUgvV2E0UHc1M2FnQWcvSG04OUE4dm9VS1VtWStmM0Fx?=
 =?utf-8?B?RGd2bktUTjY4T1FvUk9FcGVPTGczVnFPL3hFaTZscHJLclRuQzJ5VmZhUUhX?=
 =?utf-8?B?VmRqZTBOTTZRWGkvdmxYWHFyRnNOOGpDN0k5OUt6QTU5VWVwN0ZTRGtPcnR2?=
 =?utf-8?B?UU1KWmkvOXRQWUVWSUdjV2RQWU9QOUVvamJKamk5eDZ4WFRyUHdCMjMyY0RW?=
 =?utf-8?B?NWY3ank2ZEdPTmpnc2hWVHVqRHpOSVpqYnZFemlkdUZxdnFnWWxMM2xjeXZE?=
 =?utf-8?B?ZDl2cDd2dW9TejA2Vk53Zm9nWjR6QUFmeDZSM0t3aHdDL3NCdFcwQnV4Y2Qy?=
 =?utf-8?B?Tjl3cjVrNGYyRHRiYUQyNGl1dWFCODhmaWZUcjE4cHE1QnhsQ3d1VWlWS2hv?=
 =?utf-8?B?NnRZRzZtTFUvaTJzaXp1MWg1RWxGbithOG02L0ViUGI3aVNUQ0FHSkRNOWMy?=
 =?utf-8?B?RTEwTk0rdVBEcHVVTlFuTVdscmRMbUlaZGdjVDg1S3hYd0FGM1lBNUVIWWlX?=
 =?utf-8?B?ZnBlcHdzdkZoMnE4cHBGdnRrRWhrS09wQ2lBMjRleHNWa1M3b1lVakNuWDg0?=
 =?utf-8?B?Vy93WjBRNFJJR3hFc01KT3ZENTZlaXAvaHBzb3BlamdkQkhWWTdodTdqMVV5?=
 =?utf-8?B?bnBVc3NQanBnVFdBNjRqSTVWTjdZcFV0a1VSb01FOGo1WHF1cWloRlBIakJo?=
 =?utf-8?B?VVpURzV3ZlRxSUl6WjBJWFRlSlFvUTBzcU1nUjcvcGhKTXRkMmQ4SEFpR0p4?=
 =?utf-8?B?cTlwUlZhK2xlT0l4YVphaWQydGxrRnVYNTUvUjFaa0o4aUFYbmVaSXdNTXRi?=
 =?utf-8?B?MDJYNzhJRDNCK1k1bjlXRm1QdEFzeEM3dUs2c0t5eGdqTjVhZ0pzTGlqc2xj?=
 =?utf-8?B?R0h2UW9EK0JQWHc5cm92S0twRUJFN3ZBRmRGVzRYMk4yODlHaCsxZ05ZVHNj?=
 =?utf-8?B?Z25pR1ZQY3ljWUhDSytiZ1ZUcWd3cThDdSttSldOc3lRY3VMdkVscUd6WG5N?=
 =?utf-8?B?QjBKVDhWeUR0NHhGU2l2Y3VrdFBHWTltK2RteVVpOGQxVHkyclEzOURydUcx?=
 =?utf-8?B?amdVeDVZd0dwWDFkaE8xL0drbHVuMm9vcUdZMVBNakxMUWFKSTgvOC83dDR3?=
 =?utf-8?Q?zGSubxICJqxI0tk0=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 485e5fc1-6a0c-4235-1cda-08da12f8ddbe
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 09:28:50.9478
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: fNzYp3IA6JDAQfNNgcW70x780FttpndhEVmM9qeZKKgI+pjqDQXocKhvVSeGoYsrm56G98j0I0tYafyuclhcRg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR03MB3112
X-OriginatorOrg: citrix.com

Hello,

The following series implements support for MSR_VIRT_SPEC_CTRL
(VIRT_SSBD) on different AMD CPU families.

Note that the support is added backwards, starting with the newer CPUs
that support MSR_SPEC_CTRL and moving to the older ones either using
MSR_VIRT_SPEC_CTRL or the SSBD bit in LS_CFG.

Xen is still free to use it's own SSBD setting, as the selection is
context switched on vm{entry,exit}.

On Zen2 and later, SPEC_CTRL.SSBD exists and should be used in
preference to VIRT_SPEC_CTRL.SSBD.  However, for migration
compatibility, Xen offers VIRT_SSBD to guests (in the max CPUID policy,
not default) implemented in terms of SPEC_CTRL.SSBD.

On Fam15h thru Zen1, Xen exposes VIRT_SSBD to guests by default to
abstract away the model and/or hypervisor specific differences in
MSR_LS_CFG/MSR_VIRT_SPEC_CTRL.

Note that if the hardware itself does offer VIRT_SSBD (ie: very likely
when running virtualized on < Zen2 hardware) and not AMD_SSBD Xen will
allow untrapped access to MSR_VIRT_SPEC_CTRL for HVM guests.

So the implementation of VIRT_SSBD exposed to HVM guests will use one of
the following underlying mechanisms, in the preference order listed
below:

 * SPEC_CTRL.SSBD. (patch 1)
 * VIRT_SPEC_CTRL.SSBD (untrapped). (patch 2).
 * Non-architectural way using LS_CFG. (patch 3)

This has survived a XenRT basic set of tests on AMD machines.

Roger Pau Monne (3):
  amd/msr: implement VIRT_SPEC_CTRL for HVM guests on top of SPEC_CTRL
  amd/msr: allow passthrough of VIRT_SPEC_CTRL for HVM guests
  amd/msr: implement VIRT_SPEC_CTRL for HVM guests using legacy SSBD

 xen/arch/x86/cpu/amd.c                      | 116 +++++++++++++++++---
 xen/arch/x86/cpuid.c                        |  28 +++++
 xen/arch/x86/hvm/hvm.c                      |   1 +
 xen/arch/x86/hvm/svm/entry.S                |   6 +
 xen/arch/x86/hvm/svm/svm.c                  |  50 +++++++++
 xen/arch/x86/include/asm/amd.h              |   4 +
 xen/arch/x86/include/asm/cpufeatures.h      |   1 +
 xen/arch/x86/include/asm/msr.h              |  14 +++
 xen/arch/x86/msr.c                          |  26 +++++
 xen/arch/x86/spec_ctrl.c                    |  12 +-
 xen/include/public/arch-x86/cpufeatureset.h |   2 +-
 11 files changed, 241 insertions(+), 19 deletions(-)

-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 09:29:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 09:29:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296792.505315 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZr71-0005bH-MJ; Thu, 31 Mar 2022 09:29:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296792.505315; Thu, 31 Mar 2022 09:29:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZr71-0005bA-Iq; Thu, 31 Mar 2022 09:29:03 +0000
Received: by outflank-mailman (input) for mailman id 296792;
 Thu, 31 Mar 2022 09:29:02 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=lDhN=UK=citrix.com=prvs=08274bcc4=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nZr6z-0005JJ-U7
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 09:29:02 +0000
Received: from esa3.hc3370-68.iphmx.com (esa3.hc3370-68.iphmx.com
 [216.71.145.155]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ff151923-b0d4-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 11:29:00 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ff151923-b0d4-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648718940;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:content-transfer-encoding:mime-version;
  bh=2Ob6Rz367wwRVHC+LJMyl5Oz1gR/d/o7lJUHswT1iF4=;
  b=ewp7ATgmremqOLBMOQ2XREv9eP4J9aPw9zjbw6xwDyILJ5tTVY1cnuA7
   vxA3VPewWLiK6u7ZKxhUSzPmc8/BwsaqCUTcaAT1m3oiNha/8BWHGh7Nr
   ebVsvUUh4Pb9EruQktmNTIj9+5AwEMwghdifdiahxEbqBknBFpHvBUl1P
   I=;
Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67633838
X-Ironport-Server: esa3.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:qt7wsaLzIXEvAJ7eFE+RxpUlxSXFcZb7ZxGr2PjKsXjdYENShTMCm
 2FOWm7QP/jcNzbyKNEgPt/n9RgDvZDVzd9nSAVlqX01Q3x08seUXt7xwmUcns+xwm8vaGo9s
 q3yv/GZdJhcokf0/0vrav67xZVF/fngqoDUUYYoAQgsA148IMsdoUg7wbRh2dUx2YHR7z6l4
 rseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3fMldG0DQUIhMdtNWc
 s6YpF2PEsE1yD92Yj+tuu6TnkTn2dc+NyDW4pZdc/DKbhSvOkXee0v0XRYRQR4/ttmHozx+4
 NNp6My1cSUWBfeWoPkGSDIHHCdOP6ITrdcrIVDn2SCS50jPcn+qyPRyFkAme4Yf/46bA0kXq
 6ZecmpUKEne2aTmm9pXScE17ignBNPsM44F/Glp0BnSDOo8QICFSKLPjTNd9Glv2JsVTa2OD
 yYfQRtxaUzMYjZIA3VUE74ahdiohFrnfwQN/Tp5ooJoujOOnWSdyoPFL979atGMA8JPkS6wp
 GjL4mD4CREyL8GExHyO9XfErv/Cm2b3VZwfEJW89+V2mxuDy2oLEhoUWFCn5/6jhSaDt8l3c
 hJOvHB09O5rqRLtHoKVswCETGCsuDpBC99oMdIBslu117HPyFmWAFgGQWsUADA5j/MeSTsv3
 16PutrmAz1zrbGYIU6gGqeoQSCaYnZMczJbDcMQZU5cuoS4/tlv5v7aZow7eJNZmOEZDt0ZL
 9qiiCElz4segscQv0lQ1QCW2mn8znQlo+Nc2+k2Yo5Hxl4hDGJGT9bxgbQ+0RqmBNzDJrVml
 CJY8/VyFMhUUfmweNWlGY3h5o2B6fefKyH7ilVyBZQn/DnF0yf9IdAOvmwheh00bZtsldrVj
 Kn741k5CHh7ZibCUEOKS9jpV5RCIVbIS7wJqcw4nvIRO8MsJWdrDQllZFKK3nCFraTfufpXB
 HtvSu71VSxyIf0+lFKeHr5BuZd2lnFW7T6CHvjTkkX4uYdykVbIEN/pxnPVNbtnhE5FyS2Im
 +ti2zyikEsHCrSkMniKqeb+7zkidBAGOHw/kOQOHsarKQt6AmAxTfjXxLIqYYt+mKpJ0OzP+
 xmAtoVwkTITWVWvxd22V01e
IronPort-HdrOrdr: A9a23:pMFkz6yRVEyAPOSPp0M2KrPwKL1zdoMgy1knxilNoHtuA6ulfq
 GV7ZAmPHrP4wr5N0tNpTntAsa9qBDnlaKdg7N+AV7KZmCP0gaVxepZjLfK8nnNHDD/6/4Y9Y
 oISdkaNDQoNykYsS8t2njbL+od
X-IronPort-AV: E=Sophos;i="5.90,224,1643691600"; 
   d="scan'208";a="67633838"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=klmzBhd9T1gU8RgFDkdRZrsVbVb2Bge91BowZBamhOkftkFm10HS1vgEXpK+jtWy6euxu3XFpdYKcDnemGMRxxzbte2YRzqR0NBptX92XW/3hObmmK/4CjEitQc93y5jPbuPZYtXRdrqt6U9G5zYxNZ8f6CwpRAqKyPBrAzpoag8Vxw0nte2B1yWqp0+vvi0+5aeUL0uQvqpon2CqAkLGTNnnrs/34jlhxhLVIY4O6cBBKHdrcBJnfWJWFdJsFz2gHYNq0TuzZNxTN67ikZrr/rZ3FHY5NHID9csoJN80Z6JYF3JayoQbDc/Zx6k6zrF84rc3RazZuolChh8LBaIvQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=rAw124Di0ueDnIBDAjnts+YHpoOqLIJr7FiTknmZajY=;
 b=B4RSzIuLkR071UPcdoMK3C2OvIncCTrcbqfkV6wDwnDtxV9Dc7iKs/ndMMSv3suWu/BLmCCNJSmcXx+cMUXd01zEksteGnZG/n4M9XKXVZDDlYb8arL5mowFMHFmQGWZ4gt/9E2NWz+S+p80FSPze6p3UpBQ8ia7d9X1gRavOdzHPnOMW3YpYPIqt3OgxchZSaI0ntz3Nfac6jK4fo7T/xYrhXL1J2CQ/CcYogzaa1CD/FAKGxEgEpTB+J+WBSAGhmpfQEDSXdjglYc5ohV6MqUttOClcBBbhTQ6/Q59bKM97jNFfTIW1CsctsD4ZdnJNSUAzFnFUpIlPnMEi/jvVQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=rAw124Di0ueDnIBDAjnts+YHpoOqLIJr7FiTknmZajY=;
 b=g66nZMAOx86LoUNa2fTd+cpe7chKwb3x8YzuRp0U85rt7zckZ/XCuwNLSNDcI0rqfeeRYZOp8prSwdlq62uzS+tvc5Ya4LbabgC0XEvb/jfAlVjydpdna/KQMHyJJmmTQJGPUXRnkL1bAWnfRNs8437WB6RPlwXC951zTqKNP9M=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: [PATCH v3 1/3] amd/msr: implement VIRT_SPEC_CTRL for HVM guests on top of SPEC_CTRL
Date: Thu, 31 Mar 2022 11:27:15 +0200
Message-ID: <20220331092717.9023-2-roger.pau@citrix.com>
X-Mailer: git-send-email 2.35.1
In-Reply-To: <20220331092717.9023-1-roger.pau@citrix.com>
References: <20220331092717.9023-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO2P265CA0036.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:61::24) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 9e04903d-2b98-4a66-fa54-08da12f8e0ca
X-MS-TrafficTypeDiagnostic: CY4PR03MB3112:EE_
X-Microsoft-Antispam-PRVS: <CY4PR03MB3112B490074BC66D68429EF28FE19@CY4PR03MB3112.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(36756003)(186003)(1076003)(26005)(83380400001)(2906002)(6506007)(2616005)(6666004)(66556008)(5660300002)(54906003)(6512007)(82960400001)(8936002)(6486002)(66476007)(38100700002)(8676002)(6916009)(4326008)(86362001)(316002)(66946007)(508600001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?aTNoNlhxRko2eCtBSkpMd2ZLK2hrSVlzU3dDZVhrTndGRTVXWE5lK3hBeXBB?=
 =?utf-8?B?ZTJlVE5QcGwwUWgrYXFYeUVuVjQzcDdXNDJsMHExR0JhdnJia1BFQmxEdGVz?=
 =?utf-8?B?VkJPalBOQXVMTnNpY1J6dGdCR1pLaVp0KzM2Zmd0T2cyQ2J1dUc2L2dESGhU?=
 =?utf-8?B?NlpsSXMxUUJLckNjcnkvdWI4ZjB4MWp6NUV5V1VjMlJtRkRHQ3BTR05NaVVn?=
 =?utf-8?B?d1FEWmhFdUVwaVZodjRHbFhJeFdWYjJiUUppakxpcWYyUCtvdmVqRFA1c0Fv?=
 =?utf-8?B?THZXZmhDR3NGZU1JVm04L3VRV3ZEcUc1a1dtVGN3aDBTcXlDWkw5UjN1Zm9C?=
 =?utf-8?B?OWJXbTJITnMrTzRsR2Z4R1IxTStSTWFSajZTVXkvaEdSRjZmYnh6OENYKzRI?=
 =?utf-8?B?eUFVWXlvalJHSWJnSFNoL2tMSWR0dGhxZUx5RmZoa1NYN2pSODg3ZTlDS01L?=
 =?utf-8?B?SlZrelhSb09PYnZpUWVsRm5NREhhTmQrczFhQVBrVk1HTDF0RkZ0WVNmTlY0?=
 =?utf-8?B?U1lqbkkwV0ZWYjM3aWU3NHF3aGZwNVl3SjMzckJGZTZ4MExzSXNldEhrRFM3?=
 =?utf-8?B?OVNjQWdCWTJCZDA2OU9ueHJMTWRvNVlrT3pUSjE3Uzl3SGNvSDFYSDA1UmxL?=
 =?utf-8?B?SnJyRDV6aHhnQ0pvK296eVI2S01oN3R3MnZLbTBKNGJBYUQrMjE2N21zL3FY?=
 =?utf-8?B?ajVCUXJTOEFLSXRCT1BiS3A0TVlNV21FMHRmWW52VEdpQmlOWHAxT2ZIZnlv?=
 =?utf-8?B?TXVpckNyVW5Xa01VVVkxYU1sN0dDZzZsaUc4N3ZpaWFJYmxxRnNvYk50V2pJ?=
 =?utf-8?B?dlAxZFNqRCsvYmZQQ0FSSkRRUnNEVnZXQ2cwci95eS82T1VyVi9IdWpDUUhX?=
 =?utf-8?B?Y0dIQWdNVTR5ZEtVUlJjZGsyRDd2NnppS0N4ZmE0Qi9wRWx6S1lxemVHNExl?=
 =?utf-8?B?NnZpdkVxc3M4eFdBcWFTTGgzVjZOMGdXb2w2bDN1RWQrODg5TDJTeVd0K25S?=
 =?utf-8?B?TEJIQmRhYzhUdHZmL3FPK0k3Q0NDa1NiUHlKb0dYVmcvYjRJdVdvMFhxSXpQ?=
 =?utf-8?B?T0k5eE5GM1NVMTRSTkVTL1VkQ2h2OHRHZ0UvT0hrSTE3YnVvdmExT0gxTE84?=
 =?utf-8?B?UFV6OThvYnMwZmkyamQ4Z3dIYzN1WFg0cXh6TENOT1ljcUxuOFZhTWlwVDEz?=
 =?utf-8?B?RUEwNDJJcTVZaDdTclh5WFB4eTRNeFFYQzhiRUpIR3FCamNuUEVNalRLTjd1?=
 =?utf-8?B?UmY3TXc5RUJvenMwN1ByTDZVRHdWdDFiRG5uVVlMbHYyb1Q0Ym5pMEdrK0Ns?=
 =?utf-8?B?QTBpWlJaSWdUbUduUnZzSFVhYnBMNldpTlRLQmNmalh0ZmhHL2FDR0RwV1ls?=
 =?utf-8?B?aGJFcG80Ym9KOVBTcFRuZ2FRNVFyUVRMTzZ0TmlhVFVDbVZQSjRwNUNkRlVy?=
 =?utf-8?B?RzJ1R1pXTk92czVudHhPbkc2bVRhbVZJSWs5dFd1ZXFiQURaL042OVRjUmtx?=
 =?utf-8?B?ZmpHN0taUVppcExaeEZnSCt4NjRkdVlwZGZsbTgwb2lPdHFJSE1LbFRDRzRO?=
 =?utf-8?B?QVFrL0R5akRZUURQaXpyMzVreHlRNDFNTkJhVnNlWlVvRktpdHV1U05mQ1ZZ?=
 =?utf-8?B?ZVgramgraU9GYUVZZHZCM1Z6OVladFFHdDk0OStnUE1vTWI4bnVOVVdnWUZ3?=
 =?utf-8?B?UEcraDNqWnhaMjdRTGpHY3dkdW5INkowQ29WSUtGSFJZTXF0Q2RER0xxZkJo?=
 =?utf-8?B?RE5qeGF0enl6aGtVcGo5U05RK2ZJa1IyclkrQ2V6VzZyckVFYnN2d20zV05n?=
 =?utf-8?B?bVRHdEZubXZDamh0aFI3Y2FnellDSzYyK21mTDF0emJRNnVVM1lFdVQzTjkx?=
 =?utf-8?B?YTFFTUszRTBhTzJtWEZla0NLNUs3QkE5WVVUeXNEejlmN01WamtubkpjbFJM?=
 =?utf-8?B?NXhVZ2JKZEZIR0I0N1Q0QWNneGgzMW04SmNNMUFPTldlM3dDbWYvS3lMdWdM?=
 =?utf-8?B?cVcrMFhHN2VSY0xIaXlFeWJ6RE41OFpYRTlxWER1OERPUE9LUHd0ZmdDZ0E4?=
 =?utf-8?B?NUU2THBxdG5NNFJLckgra2hJVnJYZGZUelU0a2U4RVphZCs5djRJQmpacUJs?=
 =?utf-8?B?dEIrVXo4cEtMZGUwQnd2U0F3YVI2SjNkVHZKRmVEbWZQV1JUVVB1TUZvQ1RV?=
 =?utf-8?B?YXhNMWVzNi93MnBLSmhXdEdIQTBwR01sdURwOHU3Rzk1cHhhbWRpaHhiQkd1?=
 =?utf-8?B?c0xSa3FabmhOUDNQUlNLOWRnV29aaHYvcFNvTEJBWkRlck1RbHBRajJYbit2?=
 =?utf-8?B?RHZTSGN5dmE3ZFRkVGwwWlpXK2d1MFo4di9yUGVpOFRNdzg2TU5NSjBjeEpU?=
 =?utf-8?Q?Ps8COybistSExaDo=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 9e04903d-2b98-4a66-fa54-08da12f8e0ca
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 09:28:56.0197
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: FrrJy8P635X6O4K59ArvK+qSizY8erekNUxDZ2glAvkIoUJptrWp86BKefLwFg+/MPTdrn1fHFgX+6NarH0qWg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR03MB3112
X-OriginatorOrg: citrix.com

Use the logic to set shadow SPEC_CTRL values in order to implement
support for VIRT_SPEC_CTRL (signaled by VIRT_SSBD CPUID flag) for HVM
guests. This includes using the spec_ctrl vCPU MSR variable to store
the guest set value of VIRT_SPEC_CTRL.SSBD, which will be OR'ed with
any SPEC_CTRL values being set by the guest.

On hardware having SPEC_CTRL VIRT_SPEC_CTRL will not be offered by
default to guests. VIRT_SPEC_CTRL will only be part of the max CPUID
policy so it can be enabled for compatibility purposes.

Some reasoning regarding why '!s' is used to annotate the feature:
 * '!': the feature might be exposed to guests even when not present
   on the host hardware.
 * 's': the feature won't be exposed by default.

Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
Changes since v2:
 - Reword reasoning for using '!s'.
 - Trim comment about only setting SSBD bit in spec_ctrl.raw.

Changes since v1:
 - Only expose VIRT_SSBD if AMD_SSBD is available on the host.
 - Revert change to msr-sc= command line option documentation.
 - Only set or clear the SSBD bit of spec_ctrl.
---
 xen/arch/x86/cpuid.c                        |  7 +++++++
 xen/arch/x86/hvm/hvm.c                      |  1 +
 xen/arch/x86/include/asm/msr.h              |  4 ++++
 xen/arch/x86/msr.c                          | 18 ++++++++++++++++++
 xen/arch/x86/spec_ctrl.c                    |  3 ++-
 xen/include/public/arch-x86/cpufeatureset.h |  2 +-
 6 files changed, 33 insertions(+), 2 deletions(-)

diff --git a/xen/arch/x86/cpuid.c b/xen/arch/x86/cpuid.c
index bb554b06a7..4ca77ea870 100644
--- a/xen/arch/x86/cpuid.c
+++ b/xen/arch/x86/cpuid.c
@@ -543,6 +543,13 @@ static void __init calculate_hvm_max_policy(void)
         __clear_bit(X86_FEATURE_IBRSB, hvm_featureset);
         __clear_bit(X86_FEATURE_IBRS, hvm_featureset);
     }
+    else if ( boot_cpu_has(X86_FEATURE_AMD_SSBD) )
+        /*
+         * If SPEC_CTRL.SSBD is available VIRT_SPEC_CTRL.SSBD can be exposed
+         * and implemented using the former. Expose in the max policy only as
+         * the preference is for guests to use SPEC_CTRL.SSBD if available.
+         */
+        __set_bit(X86_FEATURE_VIRT_SSBD, hvm_featureset);
 
     /*
      * With VT-x, some features are only supported by Xen if dedicated
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index 709a4191ef..595858f2a7 100644
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -1334,6 +1334,7 @@ static const uint32_t msrs_to_send[] = {
     MSR_INTEL_MISC_FEATURES_ENABLES,
     MSR_IA32_BNDCFGS,
     MSR_IA32_XSS,
+    MSR_VIRT_SPEC_CTRL,
     MSR_AMD64_DR0_ADDRESS_MASK,
     MSR_AMD64_DR1_ADDRESS_MASK,
     MSR_AMD64_DR2_ADDRESS_MASK,
diff --git a/xen/arch/x86/include/asm/msr.h b/xen/arch/x86/include/asm/msr.h
index ce4fe51afe..ab6fbb5051 100644
--- a/xen/arch/x86/include/asm/msr.h
+++ b/xen/arch/x86/include/asm/msr.h
@@ -291,6 +291,7 @@ struct vcpu_msrs
 {
     /*
      * 0x00000048 - MSR_SPEC_CTRL
+     * 0xc001011f - MSR_VIRT_SPEC_CTRL (if X86_FEATURE_AMD_SSBD)
      *
      * For PV guests, this holds the guest kernel value.  It is accessed on
      * every entry/exit path.
@@ -306,6 +307,9 @@ struct vcpu_msrs
      * We must clear/restore Xen's value before/after VMRUN to avoid unduly
      * influencing the guest.  In order to support "behind the guest's back"
      * protections, we load this value (commonly 0) before VMRUN.
+     *
+     * Once of such "behind the guest's back" usages is setting SPEC_CTRL.SSBD
+     * if the guest sets VIRT_SPEC_CTRL.SSBD.
      */
     struct {
         uint32_t raw;
diff --git a/xen/arch/x86/msr.c b/xen/arch/x86/msr.c
index 01a15857b7..72c175fd8b 100644
--- a/xen/arch/x86/msr.c
+++ b/xen/arch/x86/msr.c
@@ -381,6 +381,13 @@ int guest_rdmsr(struct vcpu *v, uint32_t msr, uint64_t *val)
                ? K8_HWCR_TSC_FREQ_SEL : 0;
         break;
 
+    case MSR_VIRT_SPEC_CTRL:
+        if ( !cp->extd.virt_ssbd )
+            goto gp_fault;
+
+        *val = msrs->spec_ctrl.raw & SPEC_CTRL_SSBD;
+        break;
+
     case MSR_AMD64_DE_CFG:
         if ( !(cp->x86_vendor & (X86_VENDOR_AMD | X86_VENDOR_HYGON)) )
             goto gp_fault;
@@ -666,6 +673,17 @@ int guest_wrmsr(struct vcpu *v, uint32_t msr, uint64_t val)
             wrmsr_tsc_aux(val);
         break;
 
+    case MSR_VIRT_SPEC_CTRL:
+        if ( !cp->extd.virt_ssbd )
+            goto gp_fault;
+
+        /* Only supports SSBD bit, the rest are ignored. */
+        if ( val & SPEC_CTRL_SSBD )
+            msrs->spec_ctrl.raw |= SPEC_CTRL_SSBD;
+        else
+            msrs->spec_ctrl.raw &= ~SPEC_CTRL_SSBD;
+        break;
+
     case MSR_AMD64_DE_CFG:
         /*
          * OpenBSD 6.7 will panic if writing to DE_CFG triggers a #GP:
diff --git a/xen/arch/x86/spec_ctrl.c b/xen/arch/x86/spec_ctrl.c
index 1408e4c7ab..f338bfe292 100644
--- a/xen/arch/x86/spec_ctrl.c
+++ b/xen/arch/x86/spec_ctrl.c
@@ -402,12 +402,13 @@ static void __init print_details(enum ind_thunk thunk, uint64_t caps)
      * mitigation support for guests.
      */
 #ifdef CONFIG_HVM
-    printk("  Support for HVM VMs:%s%s%s%s%s\n",
+    printk("  Support for HVM VMs:%s%s%s%s%s%s\n",
            (boot_cpu_has(X86_FEATURE_SC_MSR_HVM) ||
             boot_cpu_has(X86_FEATURE_SC_RSB_HVM) ||
             boot_cpu_has(X86_FEATURE_MD_CLEAR)   ||
             opt_eager_fpu)                           ? ""               : " None",
            boot_cpu_has(X86_FEATURE_SC_MSR_HVM)      ? " MSR_SPEC_CTRL" : "",
+           boot_cpu_has(X86_FEATURE_SC_MSR_HVM)      ? " MSR_VIRT_SPEC_CTRL" : "",
            boot_cpu_has(X86_FEATURE_SC_RSB_HVM)      ? " RSB"           : "",
            opt_eager_fpu                             ? " EAGER_FPU"     : "",
            boot_cpu_has(X86_FEATURE_MD_CLEAR)        ? " MD_CLEAR"      : "");
diff --git a/xen/include/public/arch-x86/cpufeatureset.h b/xen/include/public/arch-x86/cpufeatureset.h
index 9cee4b439e..b797c6bea1 100644
--- a/xen/include/public/arch-x86/cpufeatureset.h
+++ b/xen/include/public/arch-x86/cpufeatureset.h
@@ -265,7 +265,7 @@ XEN_CPUFEATURE(IBRS_SAME_MODE, 8*32+19) /*S  IBRS provides same-mode protection
 XEN_CPUFEATURE(NO_LMSL,       8*32+20) /*S  EFER.LMSLE no longer supported. */
 XEN_CPUFEATURE(AMD_PPIN,      8*32+23) /*   Protected Processor Inventory Number */
 XEN_CPUFEATURE(AMD_SSBD,      8*32+24) /*S  MSR_SPEC_CTRL.SSBD available */
-XEN_CPUFEATURE(VIRT_SSBD,     8*32+25) /*   MSR_VIRT_SPEC_CTRL.SSBD */
+XEN_CPUFEATURE(VIRT_SSBD,     8*32+25) /*!s MSR_VIRT_SPEC_CTRL.SSBD */
 XEN_CPUFEATURE(SSB_NO,        8*32+26) /*A  Hardware not vulnerable to SSB */
 XEN_CPUFEATURE(PSFD,          8*32+28) /*S  MSR_SPEC_CTRL.PSFD */
 
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 09:29:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 09:29:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296794.505326 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZr78-0005xi-43; Thu, 31 Mar 2022 09:29:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296794.505326; Thu, 31 Mar 2022 09:29:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZr78-0005xX-0H; Thu, 31 Mar 2022 09:29:10 +0000
Received: by outflank-mailman (input) for mailman id 296794;
 Thu, 31 Mar 2022 09:29:09 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=lDhN=UK=citrix.com=prvs=08274bcc4=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nZr76-00057w-U3
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 09:29:09 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 01d091a5-b0d5-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 11:29:06 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 01d091a5-b0d5-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648718946;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:content-transfer-encoding:mime-version;
  bh=Rs2MHh2ZJ+EDYLUADCFGhFUgZykTojljIizKD8oilmo=;
  b=P865HzZsFTh+D+AUwWh6OQtKzTpK+glYL10SBA/MSlP1QB2lIW0lQ7WC
   0IrqmJ4nBY1icx8KAnpLoYp1rNMz2KXYtOdaS7I8b/qXDiYs54SdJEksW
   OIRaVmLUxRJ+yp1rxcgIM/HvIfTFhtsBvUFZawHYRf1hjs53LHwXwLPAm
   4=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67073037
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:alCV8aB88sgFXBVW/z7jw5YqxClBgxIJ4kV8jS/XYbTApGshgjUCy
 2oWUDyCOqqJZWvwftkkb4+w9UIAvJ/WyIJiQQY4rX1jcSlH+JHPbTi7wuYcHM8wwunrFh8PA
 xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuOU5NXsZ2YgHWeIdA970Ug5w7Vi29Yx6TSEK1jlV
 e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH
 I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPgvx
 PR9noy+eDsQZPfPv9kiTiJqVAVHaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us
 6ZCcXZUM07F17neLLGTE4GAguw5K8bmJsUHs2xIxjDFF/c2B5vERs0m4PcGg29v3ZgVQp4yY
 eJIUhw2ZiXNTyZNO04cOYk8wf2uhnXwJmgwRFW9+vNsvjm7IBZK+KfpGMrYfJqNX8o9tkSSq
 3/C/m/5KgoHL9HZwj2Amlq8i+mKkS7lVYY6ELyj6uUskFCV3nYUChAdSR28u/bRt6Klc4sBc
 QpOoHNo9PVsshzwJjXgY/GmiCCIny43S9RhL9RgsgKq95XJ2DTeIlFRG1atd+canMMxQDUr0
 HqAkNXoGSFjvdWpdJ6NyluHhWjsYHZIdAfucQdBFFJYuIe7/OnfmzqVFr5e/LiJYsoZ8N0a6
 xSDt2AAiroalqbnPI3rrAmc01pASnUkJzPZBzk7vEr4tmuVh6b/PuREDGQ3C94adu51qXHb4
 BA5dzC2trxmMH10vHXlrB8xNL+o/e2ZFzbXnERiGZIsnxz0pSLzI94Nv28keRg0WirhRdMPS
 BWJ0e+2zMUOVEZGkIctO97hYyjU5faI+SvZugD8MYMVP8kZmP6v9yByf0+At10BY2B3+ZzTz
 ayzKJ72ZV5DUPwP5GPvG481jO96rghjlDi7bc2qkHyaPU+2OSf9pUEtawDVMIjULcqs/W3oz
 jqoH5DUk08GCr2vP3G/HEx6BQliEEXXzKve8qR/XuWCPhBnCCcmDfrQyqkmYItrg+JekeKgw
 513chMwJIbX7ZEfFTi3Vw==
IronPort-HdrOrdr: A9a23:4bptDqnCVk9wUS8ENArLh70soyrpDfPOimdD5ihNYBxZY6Wkfp
 +V88jzhCWZtN9OYhwdcLC7WZVpQRvnhPpICO4qTMuftWjdyRaVxeRZg7cKrAeQfREWmtQtt5
 uINpIOc+EYbmIK/PoSgjPIaurIqePvmMvD5Za8854ud3ARV0gJ1XYGNu/xKDwQeOApP+tdKH
 LKjfA32AZINE5nJviTNz0gZazuttfLnJXpbVovAAMm0hCHiXeN5KThGxaV8x8CW3cXqI1Su1
 Ttokjc3OGOovu7whjT2yv66IlXosLozp9mCNaXgsYYBz3wgkKDZZhnWZeFoDcpydvfo2oCoZ
 3pmVMNLs5z43TeciWcpgbs4RDp1HIU53rr2Taj8AzeiP28YAh/J9tKhIpffBecwVEnpstA3K
 VC2H/cn4ZLDDvb9R6NqOTgZlVPrA6ZsHAimekcgzh0So0FcoJcqoQZ4Qd8DIoAJiTn84oqed
 MeQP003MwmMG9yUkqp/lWGmLeXLzcO91a9MwU/U/WuonZrdCsT9Tpb+CQd9k1wgK7VBaM0ot
 gsCZ4Y542mfvVmHZ6VO91xM/dfcla9OS4kEFjiV2gPR5t3ck4klfbMkcAIDaeRCdg18Kc=
X-IronPort-AV: E=Sophos;i="5.90,224,1643691600"; 
   d="scan'208";a="67073037"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=LRg/V0qiiZOR+tfk8fShmtC6nni3ox9nIht/nl0hk32yMQNC+EpfXBwdGXPx/15IvlQ6ILLPMSx4CU0BQpwLLZZQHAGTvqvvOkpZRtxifu3sG64KeDHN6tJUeJhHoqKWlRR7JxXhMULQEB2B+ZSirihX3065cJVAiAnAznssa+eX0I2mulu1jNQMisQE8y3iHNqPmbtGT1o3bCaEEWWVtDmicW1QMKJGYq8Toj8ojiXfxgL8tJljIUM1sOAIItzf5uYLCIfIScYGXuAgIDVpbHBer7HtMkTn73RkV/2Q6nhjpEUQ6orq9xWzdrqsKIteoPCh2VanTlgyagsPLGwWMw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=8zOs9KQDLyMD6IlI88q5G+0E9Ex/JRqGOGtfaTxdMpA=;
 b=K22cu1rXxD0HzcBrC9I6RfFizDT5ofQAw00aThVMXX7RKtE2jaFIYTZKRru7z3XH6NOpgsRUom4y8FpLk0kZ/qumd/Hz3xoM/UEGIDlbseM9rogT+B/gTSYZdPwMEgAfsYOr6xdQgjmhIskQy/kFGDGsPQA/cSYxW+pj2G2Lio82lj9joliGvsVKXJdFV0OdfVkB8iN4hkjgdWzosG4YGcPJHIJPszPzg4D7nXkRCqAybSMtaH0ixXb7RSF8A3WiIF6TGleq4QytBCwRUkPG9VxaielE637x5RneEZz24c9aAf4oiYS4R3tofuDpT5KEmO7GHhkrZMJpCyYKcWtObA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=8zOs9KQDLyMD6IlI88q5G+0E9Ex/JRqGOGtfaTxdMpA=;
 b=u53t94ywhRXdl/bf3+JTLJ1Qc3oIzLwRXBa/QygV1dFYNq4RhhO5Cvxn8zfQjftp/nv2LKlU1sK5z3rarraKWvkxB7P0YmAfqEkCzejU8m8wHz+tvF3qX9fCNPxnQod8HeP19TYbG1FScyg2uKfhHnzoEzx+wiUZpnSsw688xz8=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: [PATCH v3 2/3] amd/msr: allow passthrough of VIRT_SPEC_CTRL for HVM guests
Date: Thu, 31 Mar 2022 11:27:16 +0200
Message-ID: <20220331092717.9023-3-roger.pau@citrix.com>
X-Mailer: git-send-email 2.35.1
In-Reply-To: <20220331092717.9023-1-roger.pau@citrix.com>
References: <20220331092717.9023-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO2P265CA0187.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:a::31) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 57b4bb55-1c43-445f-cf9f-08da12f8e391
X-MS-TrafficTypeDiagnostic: CY4PR03MB3112:EE_
X-Microsoft-Antispam-PRVS: <CY4PR03MB31122A633BCE5F0B59F9DB3C8FE19@CY4PR03MB3112.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(36756003)(186003)(1076003)(26005)(83380400001)(2906002)(6506007)(2616005)(6666004)(66556008)(5660300002)(54906003)(6512007)(82960400001)(8936002)(6486002)(66476007)(38100700002)(8676002)(6916009)(4326008)(86362001)(316002)(66946007)(508600001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?K1lobUpBaTJJQXcxVWU0ZkpZYW0vQkgzQWxkaHJzQzRZdVNUTm9ZRmNlNHBh?=
 =?utf-8?B?UmIxRWpGVUFhaWZLVE5rdFVIVEVjczQyTEsxLzVYeEptRkxzRXFNV3RCWGNx?=
 =?utf-8?B?K1g3UG9vRVVqODE0L3FPSDVwWE4rTHlkOFhUK3JHcUpoT0lYWTRFU0VwUnRQ?=
 =?utf-8?B?U3l5eExuZkdNcHR5d2U4L1AzUEtQa3lJQ3l2RDVnWmhYVFk4dzZHeUJRTUV6?=
 =?utf-8?B?Tkw5MjNvd3pSM1lDRCtGVG5HckNOY2txLzA3WWg4QjFSYVRQNGpSSVdPK3ZZ?=
 =?utf-8?B?YmVlWmNjcFB1czdVR1lGYmdkNVVzMmYzMElwaFc5ZVBORUI2RnFvaVJXWlZi?=
 =?utf-8?B?d1BIdnlEcnZrSlYzOEczVzVPNmZiVi81Q3Mzc3BJQVI5QnNCRVhBLy93dm55?=
 =?utf-8?B?NEp1Y1hHN1FsUTBYY2d0cmEvZkFEUVFaMExNVk9vR1RFcngrWkxHN051ZVNx?=
 =?utf-8?B?cmtJbkV0YlJKSkZJR2prOFR5QU9oNXhXQmFDTVFJL09mRlVYb2FiOWJMUzM3?=
 =?utf-8?B?VXBrcWpWREpzQ3Q1V1RsMXJNRHhQcE9LQUZ0MGYrY2RaMFNOT29QWHdNWDdw?=
 =?utf-8?B?TmNSdmsyREpqN2dqYkNZTDNqeTNKaXJCaTdmWWliSFNyT0d0UGppNTBtQzIy?=
 =?utf-8?B?d21YalBzbUJ4TXZFMWYvdmhLNTBWYkxVa2V4ZFFvM09CTXNYODFPUzhUOSty?=
 =?utf-8?B?SGlLVks3eEhTL1Y0V2pNOXc5SDlLVGRWM0dPd2dFaERjbWRBMjMvTXE5Rm8y?=
 =?utf-8?B?Y3pZdXA5ZkZxU0pleUwrMTVzOVRJa2htajkxd04rampWdGZ5L3Z2cm5JbGtZ?=
 =?utf-8?B?QWdQOW5vRTIwdGp0dEorRjJWKzErTFVQeS9BVExVYmlxdUttNnQ3MG96YlhX?=
 =?utf-8?B?YTliWURhMWZObWFMS214YS9yazRrUTF3L0lPYTBvRHVwRVVYNW5YMDllTFBz?=
 =?utf-8?B?V3J4WnlDR1hJcGdLWFhKRmUxbXJHWVVUZ3k2SFQ0cmVDekhOMkNWc0N4VTlT?=
 =?utf-8?B?Y3R5L1RyOU4xSDdkam1iNW1mSm1xbTV5TS9ieUhyTFdjTS81T1FndXRGYXpn?=
 =?utf-8?B?bjlOWWtWTmwvOXNBTmdkVStteXdCTys4ZmpWc1A5WS95T1gyWm8yNTQvK1Q0?=
 =?utf-8?B?MDF0TFZlcDQ0dEdGYWFscWQ1bnRmSGozS1BrcWVNbXZDM0JhV2NOT1FqMnI1?=
 =?utf-8?B?NVhoUmxyckQvL2ozYkxEcmUrZFhMamt5RzlBUmE4TW15bHlmbXFyVmF1bmts?=
 =?utf-8?B?RVdWWmRhanJrTnFTZlVFM0ErbnlXcXJuS0lKMHF6dUxwTGY4SWk3d25MUHN5?=
 =?utf-8?B?Wng3dkRyL0E1VFlpOTdDVUVmVS8vQUlDcWxvMzlpRkFrdkFBS1dNV0hsRm1x?=
 =?utf-8?B?QTNWOWdNZW1jZC84clVBZ0QrMGRRUzlnWEJPNWFLejM4QlJZbkVVWmhSVkMy?=
 =?utf-8?B?YlF1WHJ0UHRSRVg5bElLTytuSW9iUWRQck8rTUx4Z1YxMG9UOWtGS2JET083?=
 =?utf-8?B?K3FYaWg1UjNOTHVNeG03eVJUQStiRnVMdmg4emd3YzRwYzQ2cUpyVUFsak1Y?=
 =?utf-8?B?Z2pvWUxsV2hvbmFuOXZpc1ZHbmgrdzA0aVFaK29uSFM0bmUwOTNMTEFheUV2?=
 =?utf-8?B?MFpLVmtMN3pWUW9CandZTGs0aVpGdWtsQnlXcWsvcmlEcE5oRE1nbTlFWWtB?=
 =?utf-8?B?V1luVVd1TERPdXlxUGJvUkpXbE9XSVFDMHNDd21EWlh1NHprbnZKY2NFL3J0?=
 =?utf-8?B?QmF2QUhQM0hWL0NXRUFZWUlUSW51VTMvUXF3QkFtNGVzQUpFQ3gybkFEN2hr?=
 =?utf-8?B?RlByQ3ZvYzlxRE04WjZkbllZYUhtSmw5VkVHV01WTmxLbkxEbWROaTg4U2kx?=
 =?utf-8?B?YlJRK1VXTTZoeHVoWlliVFdhZXFlbzVhSEZCUUxtS3VIY3I1eHo2dTZpeU81?=
 =?utf-8?B?aWoycGtzR3JyQTRmT2JsTVFpZi9UWWJyWnRWb3JQdng3a2tVMWtNN1JrNGt6?=
 =?utf-8?B?b1pBZWhxZnovM1FhNDUzWUwyUnhLRnRSVHZBTEY4b1hQWUkyTjhPbVVFbm5r?=
 =?utf-8?B?UEppVlY5MG11bVNxbUNGbnVkL0lKZ3YzOW1oNDJXanhjbTZFa3hFMkhIdEhi?=
 =?utf-8?B?cTUzQ1NLc28rNFhmUTJIcmpZUWhiRnRkZmpPNVR4SlZuZ3dCek9YZGhyV2Nm?=
 =?utf-8?B?VnY1S2tHKzVsWC90NEhoRjR1OGxCRUp5RVI2ZGNmRGpQRVgwWDJaTTNjQ3JD?=
 =?utf-8?B?T09HaWlCWG1ROUJYQXRwZGhhb1ZlZzNwUlN2MzZhMnV5R2E3MEprckhPRko5?=
 =?utf-8?B?NmlvNmJ2QnFSTmdEa0QxeG5sbVo4cWdrb2taYzBDY2hnbE00TGxScldtdzAw?=
 =?utf-8?Q?NVfEiQp/gJzSORdg=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 57b4bb55-1c43-445f-cf9f-08da12f8e391
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 09:29:00.7550
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: CiSJ7dMPCEuxLz8UyRBj+W86aeSAXrFhrsZ9zN17P9fWlHCoQEiLr2DCIrAWZ3HT/mND/CSomaxH8LkPSUIxYw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR03MB3112
X-OriginatorOrg: citrix.com

Allow HVM guests untrapped access to MSR_VIRT_SPEC_CTRL if the
hardware has support for it. This requires adding logic in the
vm{entry,exit} paths for SVM in order to context switch between the
hypervisor value and the guest one. The added handlers for context
switch will also be used for the legacy SSBD support.

Introduce a new synthetic feature leaf (X86_FEATURE_VIRT_SC_MSR_HVM)
to signal whether VIRT_SPEC_CTRL needs to be handled on guest
vm{entry,exit}.

This patch changes the annotation 's' to 'S' because it introduces
support to expose VIRT_SSBD to guests by default when the host
(virtual) hardware also supports it.

Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
Changes since v2:
 - Reword part of the commit message regarding annotation change.
 - Fix MSR intercept.
 - Add handling of VIRT_SPEC_CTRL to guest_{rd,wr}msr when using
   VIRT_SSBD also.

Changes since v1:
 - Introduce virt_spec_ctrl vCPU field.
 - Context switch VIRT_SPEC_CTRL on vmentry/vmexit separately from
   SPEC_CTRL.
---
 xen/arch/x86/cpuid.c                        | 11 ++++++
 xen/arch/x86/hvm/svm/entry.S                |  6 ++++
 xen/arch/x86/hvm/svm/svm.c                  | 40 +++++++++++++++++++++
 xen/arch/x86/include/asm/cpufeatures.h      |  1 +
 xen/arch/x86/include/asm/msr.h              | 10 ++++++
 xen/arch/x86/msr.c                          | 16 ++++++---
 xen/arch/x86/spec_ctrl.c                    |  9 ++++-
 xen/include/public/arch-x86/cpufeatureset.h |  2 +-
 8 files changed, 89 insertions(+), 6 deletions(-)

diff --git a/xen/arch/x86/cpuid.c b/xen/arch/x86/cpuid.c
index 4ca77ea870..91e53284fc 100644
--- a/xen/arch/x86/cpuid.c
+++ b/xen/arch/x86/cpuid.c
@@ -534,6 +534,10 @@ static void __init calculate_hvm_max_policy(void)
          raw_cpuid_policy.basic.sep )
         __set_bit(X86_FEATURE_SEP, hvm_featureset);
 
+    if ( !boot_cpu_has(X86_FEATURE_VIRT_SC_MSR_HVM) )
+        /* Clear VIRT_SSBD if VIRT_SPEC_CTRL is not exposed to guests. */
+        __clear_bit(X86_FEATURE_VIRT_SSBD, hvm_featureset);
+
     /*
      * If Xen isn't virtualising MSR_SPEC_CTRL for HVM guests (functional
      * availability, or admin choice), hide the feature.
@@ -590,6 +594,13 @@ static void __init calculate_hvm_def_policy(void)
     guest_common_feature_adjustments(hvm_featureset);
     guest_common_default_feature_adjustments(hvm_featureset);
 
+    /*
+     * AMD_SSBD if preferred over VIRT_SSBD, so don't expose the later by
+     * default if the former is available.
+     */
+    if ( boot_cpu_has(X86_FEATURE_AMD_SSBD) )
+        __clear_bit(X86_FEATURE_VIRT_SSBD, hvm_featureset);
+
     sanitise_featureset(hvm_featureset);
     cpuid_featureset_to_policy(hvm_featureset, p);
     recalculate_xstate(p);
diff --git a/xen/arch/x86/hvm/svm/entry.S b/xen/arch/x86/hvm/svm/entry.S
index 4ae55a2ef6..e2c104bb1e 100644
--- a/xen/arch/x86/hvm/svm/entry.S
+++ b/xen/arch/x86/hvm/svm/entry.S
@@ -57,6 +57,9 @@ __UNLIKELY_END(nsvm_hap)
 
         clgi
 
+        ALTERNATIVE "", STR(call vmentry_virt_spec_ctrl), \
+                        X86_FEATURE_VIRT_SC_MSR_HVM
+
         /* WARNING! `ret`, `call *`, `jmp *` not safe beyond this point. */
         /* SPEC_CTRL_EXIT_TO_SVM       Req: b=curr %rsp=regs/cpuinfo, Clob: acd */
         .macro svm_vmentry_spec_ctrl
@@ -114,6 +117,9 @@ __UNLIKELY_END(nsvm_hap)
         ALTERNATIVE "", svm_vmexit_spec_ctrl, X86_FEATURE_SC_MSR_HVM
         /* WARNING! `ret`, `call *`, `jmp *` not safe before this point. */
 
+        ALTERNATIVE "", STR(call vmexit_virt_spec_ctrl), \
+                        X86_FEATURE_VIRT_SC_MSR_HVM
+
         stgi
 GLOBAL(svm_stgi_label)
         mov  %rsp,%rdi
diff --git a/xen/arch/x86/hvm/svm/svm.c b/xen/arch/x86/hvm/svm/svm.c
index 64a45045da..40ff28ecf1 100644
--- a/xen/arch/x86/hvm/svm/svm.c
+++ b/xen/arch/x86/hvm/svm/svm.c
@@ -52,6 +52,7 @@
 #include <asm/hvm/svm/svmdebug.h>
 #include <asm/hvm/svm/nestedsvm.h>
 #include <asm/hvm/nestedhvm.h>
+#include <asm/spec_ctrl.h>
 #include <asm/x86_emulate.h>
 #include <public/sched.h>
 #include <asm/hvm/vpt.h>
@@ -610,6 +611,15 @@ static void cf_check svm_cpuid_policy_changed(struct vcpu *v)
     svm_intercept_msr(v, MSR_SPEC_CTRL,
                       cp->extd.ibrs ? MSR_INTERCEPT_NONE : MSR_INTERCEPT_RW);
 
+    /*
+     * Give access to MSR_VIRT_SPEC_CTRL if the guest has been told about it
+     * and the hardware implements it.
+     */
+    svm_intercept_msr(v, MSR_VIRT_SPEC_CTRL,
+                      cp->extd.virt_ssbd && cpu_has_virt_ssbd &&
+                      !cpu_has_amd_ssbd ?
+                      MSR_INTERCEPT_NONE : MSR_INTERCEPT_RW);
+
     /* Give access to MSR_PRED_CMD if the guest has been told about it. */
     svm_intercept_msr(v, MSR_PRED_CMD,
                       cp->extd.ibpb ? MSR_INTERCEPT_NONE : MSR_INTERCEPT_RW);
@@ -3105,6 +3115,36 @@ void svm_vmexit_handler(struct cpu_user_regs *regs)
     vmcb_set_vintr(vmcb, intr);
 }
 
+/* Called with GIF=0. */
+void vmexit_virt_spec_ctrl(void)
+{
+    unsigned int val = opt_ssbd ? SPEC_CTRL_SSBD : 0;
+
+    if ( cpu_has_virt_ssbd )
+    {
+        unsigned int lo, hi;
+
+        /*
+         * Need to read from the hardware because VIRT_SPEC_CTRL is not context
+         * switched by the hardware, and we allow the guest untrapped access to
+         * the register.
+         */
+        rdmsr(MSR_VIRT_SPEC_CTRL, lo, hi);
+        if ( val != lo )
+            wrmsr(MSR_VIRT_SPEC_CTRL, val, 0);
+        current->arch.msrs->virt_spec_ctrl.raw = lo;
+    }
+}
+
+/* Called with GIF=0. */
+void vmentry_virt_spec_ctrl(void)
+{
+    unsigned int val = current->arch.msrs->virt_spec_ctrl.raw;
+
+    if ( val != (opt_ssbd ? SPEC_CTRL_SSBD : 0) )
+        wrmsr(MSR_VIRT_SPEC_CTRL, val, 0);
+}
+
 /*
  * Local variables:
  * mode: C
diff --git a/xen/arch/x86/include/asm/cpufeatures.h b/xen/arch/x86/include/asm/cpufeatures.h
index 7413febd7a..2240547b64 100644
--- a/xen/arch/x86/include/asm/cpufeatures.h
+++ b/xen/arch/x86/include/asm/cpufeatures.h
@@ -40,6 +40,7 @@ XEN_CPUFEATURE(SC_VERW_HVM,       X86_SYNTH(24)) /* VERW used by Xen for HVM */
 XEN_CPUFEATURE(SC_VERW_IDLE,      X86_SYNTH(25)) /* VERW used by Xen for idle */
 XEN_CPUFEATURE(XEN_SHSTK,         X86_SYNTH(26)) /* Xen uses CET Shadow Stacks */
 XEN_CPUFEATURE(XEN_IBT,           X86_SYNTH(27)) /* Xen uses CET Indirect Branch Tracking */
+XEN_CPUFEATURE(VIRT_SC_MSR_HVM,   X86_SYNTH(28)) /* MSR_VIRT_SPEC_CTRL exposed to HVM */
 
 /* Bug words follow the synthetic words. */
 #define X86_NR_BUG 1
diff --git a/xen/arch/x86/include/asm/msr.h b/xen/arch/x86/include/asm/msr.h
index ab6fbb5051..460aabe84f 100644
--- a/xen/arch/x86/include/asm/msr.h
+++ b/xen/arch/x86/include/asm/msr.h
@@ -375,6 +375,16 @@ struct vcpu_msrs
      */
     uint32_t tsc_aux;
 
+    /*
+     * 0xc001011f - MSR_VIRT_SPEC_CTRL (if !X86_FEATURE_AMD_SSBD)
+     *
+     * AMD only. Guest selected value, saved and restored on guest VM
+     * entry/exit.
+     */
+    struct {
+        uint32_t raw;
+    } virt_spec_ctrl;
+
     /*
      * 0xc00110{27,19-1b} MSR_AMD64_DR{0-3}_ADDRESS_MASK
      *
diff --git a/xen/arch/x86/msr.c b/xen/arch/x86/msr.c
index 72c175fd8b..a1e268eea9 100644
--- a/xen/arch/x86/msr.c
+++ b/xen/arch/x86/msr.c
@@ -385,7 +385,10 @@ int guest_rdmsr(struct vcpu *v, uint32_t msr, uint64_t *val)
         if ( !cp->extd.virt_ssbd )
             goto gp_fault;
 
-        *val = msrs->spec_ctrl.raw & SPEC_CTRL_SSBD;
+        if ( cpu_has_amd_ssbd )
+            *val = msrs->spec_ctrl.raw & SPEC_CTRL_SSBD;
+        else
+            *val = msrs->virt_spec_ctrl.raw;
         break;
 
     case MSR_AMD64_DE_CFG:
@@ -678,10 +681,15 @@ int guest_wrmsr(struct vcpu *v, uint32_t msr, uint64_t val)
             goto gp_fault;
 
         /* Only supports SSBD bit, the rest are ignored. */
-        if ( val & SPEC_CTRL_SSBD )
-            msrs->spec_ctrl.raw |= SPEC_CTRL_SSBD;
+        if ( cpu_has_amd_ssbd )
+        {
+            if ( val & SPEC_CTRL_SSBD )
+                msrs->spec_ctrl.raw |= SPEC_CTRL_SSBD;
+            else
+                msrs->spec_ctrl.raw &= ~SPEC_CTRL_SSBD;
+        }
         else
-            msrs->spec_ctrl.raw &= ~SPEC_CTRL_SSBD;
+            msrs->virt_spec_ctrl.raw = val & SPEC_CTRL_SSBD;
         break;
 
     case MSR_AMD64_DE_CFG:
diff --git a/xen/arch/x86/spec_ctrl.c b/xen/arch/x86/spec_ctrl.c
index f338bfe292..0d5ec877d1 100644
--- a/xen/arch/x86/spec_ctrl.c
+++ b/xen/arch/x86/spec_ctrl.c
@@ -406,9 +406,12 @@ static void __init print_details(enum ind_thunk thunk, uint64_t caps)
            (boot_cpu_has(X86_FEATURE_SC_MSR_HVM) ||
             boot_cpu_has(X86_FEATURE_SC_RSB_HVM) ||
             boot_cpu_has(X86_FEATURE_MD_CLEAR)   ||
+            boot_cpu_has(X86_FEATURE_VIRT_SC_MSR_HVM) ||
             opt_eager_fpu)                           ? ""               : " None",
            boot_cpu_has(X86_FEATURE_SC_MSR_HVM)      ? " MSR_SPEC_CTRL" : "",
-           boot_cpu_has(X86_FEATURE_SC_MSR_HVM)      ? " MSR_VIRT_SPEC_CTRL" : "",
+           (boot_cpu_has(X86_FEATURE_SC_MSR_HVM) ||
+            boot_cpu_has(X86_FEATURE_VIRT_SC_MSR_HVM)) ? " MSR_VIRT_SPEC_CTRL"
+                                                       : "",
            boot_cpu_has(X86_FEATURE_SC_RSB_HVM)      ? " RSB"           : "",
            opt_eager_fpu                             ? " EAGER_FPU"     : "",
            boot_cpu_has(X86_FEATURE_MD_CLEAR)        ? " MD_CLEAR"      : "");
@@ -1069,6 +1072,10 @@ void __init init_speculation_mitigations(void)
             setup_force_cpu_cap(X86_FEATURE_SC_MSR_HVM);
     }
 
+    /* Support VIRT_SPEC_CTRL.SSBD if AMD_SSBD is not available. */
+    if ( opt_msr_sc_hvm && !cpu_has_amd_ssbd && cpu_has_virt_ssbd )
+        setup_force_cpu_cap(X86_FEATURE_VIRT_SC_MSR_HVM);
+
     /* If we have IBRS available, see whether we should use it. */
     if ( has_spec_ctrl && ibrs )
         default_xen_spec_ctrl |= SPEC_CTRL_IBRS;
diff --git a/xen/include/public/arch-x86/cpufeatureset.h b/xen/include/public/arch-x86/cpufeatureset.h
index b797c6bea1..0639b9faf2 100644
--- a/xen/include/public/arch-x86/cpufeatureset.h
+++ b/xen/include/public/arch-x86/cpufeatureset.h
@@ -265,7 +265,7 @@ XEN_CPUFEATURE(IBRS_SAME_MODE, 8*32+19) /*S  IBRS provides same-mode protection
 XEN_CPUFEATURE(NO_LMSL,       8*32+20) /*S  EFER.LMSLE no longer supported. */
 XEN_CPUFEATURE(AMD_PPIN,      8*32+23) /*   Protected Processor Inventory Number */
 XEN_CPUFEATURE(AMD_SSBD,      8*32+24) /*S  MSR_SPEC_CTRL.SSBD available */
-XEN_CPUFEATURE(VIRT_SSBD,     8*32+25) /*!s MSR_VIRT_SPEC_CTRL.SSBD */
+XEN_CPUFEATURE(VIRT_SSBD,     8*32+25) /*!S MSR_VIRT_SPEC_CTRL.SSBD */
 XEN_CPUFEATURE(SSB_NO,        8*32+26) /*A  Hardware not vulnerable to SSB */
 XEN_CPUFEATURE(PSFD,          8*32+28) /*S  MSR_SPEC_CTRL.PSFD */
 
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 09:29:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 09:29:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296798.505337 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZr7H-0006W7-CA; Thu, 31 Mar 2022 09:29:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296798.505337; Thu, 31 Mar 2022 09:29:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZr7H-0006Vx-8w; Thu, 31 Mar 2022 09:29:19 +0000
Received: by outflank-mailman (input) for mailman id 296798;
 Thu, 31 Mar 2022 09:29:17 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=lDhN=UK=citrix.com=prvs=08274bcc4=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nZr7F-00057w-Kg
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 09:29:17 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 078302f6-b0d5-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 11:29:15 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 078302f6-b0d5-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648718955;
  h=from:to:cc:subject:date:message-id:in-reply-to:
   references:content-transfer-encoding:mime-version;
  bh=c5A7oIriEvC0cGBbEld53uU0PBaaj0rfbtF3sBKzgsc=;
  b=R0b4lnJSgvIRoDHzGad5BszSC2BSy7vicKHlecNvMXTYjv7IY8rOus+c
   zhkS1QLl1nenAnT8lOWum3FKDMYiYZB4/9OwXWqILFsrN7Cxa+AaMh1rV
   ADsFtbfzmje8/dBvAQD7ckpgNALlZJr53zi+z/hYpSMBw7C0I1jTye8GB
   c=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67539612
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:veW5h6gM68gxNXnct1mPywiqX161dhAKZh0ujC45NGQN5FlHY01je
 htvUGmDb/2CMzamedp2YN7goxlUvMCAzodgHQNsrC40RX8b9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFjU4
 YqaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YRwXYaOcm8A0aAJ3TBpMZKEa5pDrMXfq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bkmtnwjzDS+4vXLjIQrnQ5M8e1zA17ixLNaiBO
 pFIN2M1BPjGSyJLCEU0JooVoNn2vUvQcBwHmVOVh7VitgA/yyQuieOwYbI5YOeiWsF9jkue4
 GXc8AzRABsXKdiewjqt6W+3i6nEmiaTcJIfEvi0++BnhHWXx3cPE1sGWF2ju/67h0WiHdVFJ
 CQpFjEG9PZoshbxF5+kAkP+8CXsUgMgt8R4CNNl5lGO7oPv+CnGPVpdQmJfR/A2u5pjLdA17
 WOhk9TsDD1plbSaT3OB67uZxQ+P1TgpwXwqPnFdE1ZcizX3iMRq10+UEI4/eEKgpoetcQwc1
 Qxmu8TXa187qccQn5u28lnc695HjsiYF1Vljuk7s4/M0++YWGJHT9HwgbQ4xawZRGp8crVnl
 CJe8yR5xLpSZaxhbATXHI0w8EiBvp5pygH0j191BIUG/D+w4XOldo04yGggeBc3bJtbJ2W0P
 xK7VeZtCHl7ZiHCgUhfOd/ZNijX5fK4SYSNug78MLKinaSdhCfYpXozNCZ8LkjmkVQ2kLFXB
 HtoWZ3EMJruMow+lGDeb75EidcDn3lirUuOFcGT50n2itK2OS/KIYrpxXPTN4jVGovf+16Lm
 zueXuPXoyhivBrWOXePq9dJfQFXdRDWx/ne8qRqSwJKGSI/cEkJAP7N27IxPYtjmqVejODT+
 X+hHERfzTLCabfvcFzihqxLAF83YatCkA==
IronPort-HdrOrdr: A9a23:2dF9Y6trh1B0lQASU+QIUQco7skDctV00zEX/kB9WHVpm6uj5q
 eTdZUgpHvJYVMqM03I9urtBEDtexzhHP1OgbX5X43NYOCOggLBRuxfBODZogHIKmnT8fNcyL
 clU4UWMqyUMbGit7eY3OBvKadD/OW6
X-IronPort-AV: E=Sophos;i="5.90,224,1643691600"; 
   d="scan'208";a="67539612"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=HpLmc0/tjlz15C+5QsU5BPWMrreIlg87qk2h1hAwvKFMA4JSMnIiJ+bed7qbcz7O/3ibR6hod9CIpUb1++hxfFr+jdmhk/v2i7bJeAV/hgI5a+GclmOYWwh0xxR83Pq1c1s+rRkHhPzJhTi3LSAvTg8EFvcimvw4cVu2z0L2voxMBQzrg+6gsvEEAjkERwSVBSG31KrJf695EvBvSJQbAI8wJD5YFgRNhBSRPAr0gVuaDHMYs14e9Uu+RTimgvtTlUc90oh3eqsmQRp0WTP2N4JbDYV+ZA/4DdWRn8nSEVTY3CMX/Iwrx2+qJtzP5O2XzqzlLMPB52p/Thmnc691zw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=O5Fvyon9pP8jficILgXhOuMiNAjcLMUPifEHs+FbT5Q=;
 b=m00sqj2yWV4/MJH+wrIfSyPL0A3m0F/tcXHvOwnsnyJVuxUBhIm/PwkbFdItvM3R4qZSYv3Rc9U4GgZ1Zudxqi/E09PbYkFJT9ttUXlgzGfkHToEhM0GiU0H1RKi/gxqcJHMVJmUFVht6LpqcKMHUgbr1ecalahNPq1aO2yY6fNoeDcD0oHpXJZ6WqwwCwq78y2kWebFU4e4wsxd88WTLA/m3q4EkbDk/I5avgOi7OEdjp0JEZUNxvKyG7fJ9p+CDnRNSeMFLQRpDKRNYr0ldfjifUeyvDJKl1mFoy3GsefxnMk11Rz4lE51RLNyOFySDJ7iyUtimbbYq+/eLehcow==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=O5Fvyon9pP8jficILgXhOuMiNAjcLMUPifEHs+FbT5Q=;
 b=dsg/0MDuWbreaQ5P93GNc1j1Gm9WOp/mw+2G3FHE5SP+JsVg7eJBJHKI2DQS0SRdrD1rgGA0LCeJ7wuwY+w+tBm7uSwz8urziQAtEC47scdNRTuEHYwRhENCOwJ35my1AP+Z7v7zhLlqkBBLIEdiyK3wUHjodfQZKlERkglAn+E=
From: Roger Pau Monne <roger.pau@citrix.com>
To: <xen-devel@lists.xenproject.org>
CC: Roger Pau Monne <roger.pau@citrix.com>, Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>
Subject: [PATCH v3 3/3] amd/msr: implement VIRT_SPEC_CTRL for HVM guests using legacy SSBD
Date: Thu, 31 Mar 2022 11:27:17 +0200
Message-ID: <20220331092717.9023-4-roger.pau@citrix.com>
X-Mailer: git-send-email 2.35.1
In-Reply-To: <20220331092717.9023-1-roger.pau@citrix.com>
References: <20220331092717.9023-1-roger.pau@citrix.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO2P265CA0225.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:b::21) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: cd6ae490-2884-4e34-8165-08da12f8e6ff
X-MS-TrafficTypeDiagnostic: CY4PR03MB3112:EE_
X-Microsoft-Antispam-PRVS: <CY4PR03MB311245364FF410758064244A8FE19@CY4PR03MB3112.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(36756003)(186003)(1076003)(26005)(83380400001)(2906002)(6506007)(2616005)(6666004)(66556008)(5660300002)(54906003)(6512007)(82960400001)(8936002)(6486002)(966005)(66476007)(38100700002)(8676002)(6916009)(4326008)(86362001)(316002)(66946007)(508600001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?NTdLaXh1VWhzN1pMdjhrb1RYT3o1OFlmeGVmUVRqMDd2R004cWx6UlpYT1B3?=
 =?utf-8?B?dVl0QlJhNHd3RGM0M2VXVHl3L2dxdyswQ2dIKzJFNElubitOLy9GdEEvZExC?=
 =?utf-8?B?SFJjamE0N0Q4RjVGMVNzR2dUVVk0VldrZlFwZ09QN2R4Nm9LSFV0empTMno1?=
 =?utf-8?B?WGdhMUhUaGJlOXp3czdHd0Z0bCttTlBOamVYMGJML3JBZGRJUm5IbUVBTmVD?=
 =?utf-8?B?SHVxT2d3YVA2T2dobWJKaTJMY1hEbmlabjdYZW5Eb1JGMEVGUlBCOFI3QjMx?=
 =?utf-8?B?cW5vcXpvMzdKYW5TdmtnY2tXM3RtYTNVRWlIVEwyT1NIbnEwZUZYV1hWOGd3?=
 =?utf-8?B?SXN4Njh6a1hkL2dPUVZyTGxYUUczaDNZUGE4QThNQ3kzVXhYOUdLTUxJbmtN?=
 =?utf-8?B?Z0N5M1FKR1FHWFFLcVJDbzByWlRSU2poanR0ek4wRHhZY0Y2U3pQd3NDSTQv?=
 =?utf-8?B?VzBvSS9VaXZKaUVpamdBOEVLRGdOSEpVWjNYb0ZJSFU4RzFDZ3VvQ3JVUFBS?=
 =?utf-8?B?Q1hNc1pWT1hVVUZFZXVjajJLTnJ1ODNkWjA5M2pTWUtFMjhkdVBuN05zSElp?=
 =?utf-8?B?M3JyT3V1a3d6YXJRWDBYUWJWK3BGaWNNVktkQit2cWc3NGNLS0pSLzc4WGZn?=
 =?utf-8?B?UmVhd25UcElpOEJYbUdYa0t2OEF4bkE4dHhrY0piR3NjOVBoU3BMOUdoSk5l?=
 =?utf-8?B?YjBmbjR2ajZNTW5WNFVySHRxRldGbFA0aEowUGRXRVVvTTFPckNqdlVZV204?=
 =?utf-8?B?dExwK1grZnhSai9jQVZlSXRXTFlSVVZNeW5GY2hLWDRrWHRIZzlSNUZtZ0kr?=
 =?utf-8?B?bHRjSXpUd1VRMGZ6NHhKemU2eGsvUDYxZTk2UUVLbzBzQlNvOVN0eHpGVE5m?=
 =?utf-8?B?azR4TjZiVEo5RmFsNDgzRkNmQmNkWHVVZGYrV0U0NTBWMkk3b2R6bUl2VHY4?=
 =?utf-8?B?SVlHeWtNY1Z6R0RwTTdNanRPaXJyak1aNGkveGFpcmhzc3FiR2xtNnJtQmxr?=
 =?utf-8?B?TjgxamVVL1Q3ZlQ4a0ZwY3lSb3ZjcjE2TjA5VDlCaHN1YmhEUXl3ZWt1UHVJ?=
 =?utf-8?B?bWdpQjRrT05WeEtyc2xFZlBqV1V6bEp0YUpRSmlob2Rwa3NaR0hxeHo1WjZZ?=
 =?utf-8?B?a2lQY3hLQjFwV1IvNktKeG0rYktjQUY5NnNNYUwzTjQyMU92aU1GSkRZY2sr?=
 =?utf-8?B?ZXZPWHdHemw0bHVYbS9EQ2lkZUx6RG9jRVJEYVRXZU1xY0d0L1pCTXB4NUxS?=
 =?utf-8?B?TkdMNmVUUGt1L2FOQXRpaGovc1Iya0ZPTDZTaHlBR3dkWTI5cm5KeVpaWWZz?=
 =?utf-8?B?RjR1VFV2a1BESHpzTW1vTEtDYjhvaWtRL015WlpJdEdaQWR1TnBuU3lHWURu?=
 =?utf-8?B?dmNKeXAyeHZzb1UxclJWTWxrS0ZTbGt5dlE1QVlIMEJTbWFVMmQzT3E3ZTNR?=
 =?utf-8?B?VmZMbDMvVllvVzN5WDdhalRmLzNQZUFZQUFFTW5pTXR3ei9IN0dka2wrTzl2?=
 =?utf-8?B?ci83Mm02YmJZTUszdWgzckFHcGlodzRxM2drUi9hUURhV1RBYnJFVEJyQkU3?=
 =?utf-8?B?amJYd29XUlB2SjNyUFMySjZZY2lyVG9MbWRLUXl6eDJ0ekJxRWdOQ0czSTUx?=
 =?utf-8?B?N0p0Ymp3Nytrd1VBSjVXNXByZ3NOUVJhRGtaUnRJZFBhbkl2RURJYXAwQVg1?=
 =?utf-8?B?RENiaE4wcmRwdHdDTG40UncwaXlsMFBOdDhWYnZDaDFmaHdqWjNGZy9IYzBr?=
 =?utf-8?B?VFJpM0ZSY2NNWWtaWXV0Rmh3bUJ3MGZGbnRobEc4VTRpWW5JZ3MvRldZdzBv?=
 =?utf-8?B?WlVKRno5ckJQOFRSMzBTY1Y0UDFVajJaTWNZaXlTanZlV1lTUHpRYUs5a2Nt?=
 =?utf-8?B?Y1BEampPT01kNU9OdEJLZWZ2K3J6OXNFeTdxRCtUY1h3ZWJVaUd3UFhmbmg5?=
 =?utf-8?B?RTJJZm1GSWVpTGxPZ0VPRkNlSEFDZWM2SmlQTFQ3UGJ2SzZMVmFiRklab1FT?=
 =?utf-8?B?MmRicjM4SUJiNWZxWXNPTVRQZDRvZmt4WE40ZUo2MkJxN3dpRG5oSDJubWU1?=
 =?utf-8?B?T3VseUVDT29TOE80MlJ2eUFvMFBLUWtEdXhFb08vem1pWElnNGFnVEhEY1Zj?=
 =?utf-8?B?UFZxaFpmYmE5bXNabi90aXZHR1V6VUFzeXBNQ205SHovcC9TcGtCRUxqRmNN?=
 =?utf-8?B?ZGQ5ZnB2MS85ZGlEYVJqa01mSEFGSWdKWkhzYzI1RGxYUDN2ZmZyVGNnMHNi?=
 =?utf-8?B?alQ1blkwUExncEZVOFI0WVdIYkRYZGxTQjhxUFEyWW1NMWxmSHdtKytKMFRX?=
 =?utf-8?B?bjk5NHpRblBYbTkxVFArMmVZQ3FDZ3hNMTRZeWYrTWxEKzFTR0NFbng1ZGty?=
 =?utf-8?Q?GF+ruYJlm5K2B1fQ=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: cd6ae490-2884-4e34-8165-08da12f8e6ff
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 09:29:06.4758
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: eKLy/wCHLyW8HTqC4qb3GrGfBg2QQMNthzETkWl7URg1q334ui4ju5XpYHKS7RhdWge+ASShJPqYVEE1/1Gx0w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR03MB3112
X-OriginatorOrg: citrix.com

Expose VIRT_SSBD to guests if the hardware supports setting SSBD in
the LS_CFG MSR (a.k.a. non-architectural way). Different AMD CPU
families use different bits in LS_CFG, so exposing VIRT_SPEC_CTRL.SSBD
allows for an unified way of exposing SSBD support to guests on AMD
hardware that's compatible migration wise, regardless of what
underlying mechanism is used to set SSBD.

Note that on AMD Family 17h (Zen 1) the value of SSBD in LS_CFG is
shared between threads on the same core, so there's extra logic in
order to synchronize the value and have SSBD set as long as one of the
threads in the core requires it to be set. Such logic also requires
extra storage for each thread state, which is allocated at
initialization time.

Do the context switching of the SSBD selection in LS_CFG between
hypervisor and guest in the same handler that's already used to switch
the value of VIRT_SPEC_CTRL in the hardware when supported.

Suggested-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
---
Changes since v2:
 - Fix codding style issues.
 - Use AMD_ZEN1_MAX_SOCKETS to define the max number of possible
   sockets in Zen1 systems.

Changes since v1:
 - Report legacy SSBD support using a global variable.
 - Use ro_after_init for ssbd_max_cores.
 - Handle boot_cpu_data.x86_num_siblings < 1.
 - Add comment regarding _irqsave usage in amd_set_legacy_ssbd.
---
 xen/arch/x86/cpu/amd.c         | 116 ++++++++++++++++++++++++++++-----
 xen/arch/x86/cpuid.c           |  10 +++
 xen/arch/x86/hvm/svm/svm.c     |  12 +++-
 xen/arch/x86/include/asm/amd.h |   4 ++
 xen/arch/x86/spec_ctrl.c       |   4 +-
 5 files changed, 127 insertions(+), 19 deletions(-)

diff --git a/xen/arch/x86/cpu/amd.c b/xen/arch/x86/cpu/amd.c
index 4999f8be2b..a256a9d882 100644
--- a/xen/arch/x86/cpu/amd.c
+++ b/xen/arch/x86/cpu/amd.c
@@ -48,6 +48,7 @@ boolean_param("allow_unsafe", opt_allow_unsafe);
 
 /* Signal whether the ACPI C1E quirk is required. */
 bool __read_mostly amd_acpi_c1e_quirk;
+bool __ro_after_init amd_legacy_ssbd;
 
 static inline int rdmsr_amd_safe(unsigned int msr, unsigned int *lo,
 				 unsigned int *hi)
@@ -685,23 +686,10 @@ void amd_init_lfence(struct cpuinfo_x86 *c)
  * Refer to the AMD Speculative Store Bypass whitepaper:
  * https://developer.amd.com/wp-content/resources/124441_AMD64_SpeculativeStoreBypassDisable_Whitepaper_final.pdf
  */
-void amd_init_ssbd(const struct cpuinfo_x86 *c)
+static bool set_legacy_ssbd(const struct cpuinfo_x86 *c, bool enable)
 {
 	int bit = -1;
 
-	if (cpu_has_ssb_no)
-		return;
-
-	if (cpu_has_amd_ssbd) {
-		/* Handled by common MSR_SPEC_CTRL logic */
-		return;
-	}
-
-	if (cpu_has_virt_ssbd) {
-		wrmsrl(MSR_VIRT_SPEC_CTRL, opt_ssbd ? SPEC_CTRL_SSBD : 0);
-		return;
-	}
-
 	switch (c->x86) {
 	case 0x15: bit = 54; break;
 	case 0x16: bit = 33; break;
@@ -715,20 +703,114 @@ void amd_init_ssbd(const struct cpuinfo_x86 *c)
 		if (rdmsr_safe(MSR_AMD64_LS_CFG, val) ||
 		    ({
 			    val &= ~mask;
-			    if (opt_ssbd)
+			    if (enable)
 				    val |= mask;
 			    false;
 		    }) ||
 		    wrmsr_safe(MSR_AMD64_LS_CFG, val) ||
 		    ({
 			    rdmsrl(MSR_AMD64_LS_CFG, val);
-			    (val & mask) != (opt_ssbd * mask);
+			    (val & mask) != (enable * mask);
 		    }))
 			bit = -1;
 	}
 
-	if (bit < 0)
+	return bit >= 0;
+}
+
+void amd_init_ssbd(const struct cpuinfo_x86 *c)
+{
+	if (cpu_has_ssb_no)
+		return;
+
+	if (cpu_has_amd_ssbd) {
+		/* Handled by common MSR_SPEC_CTRL logic */
+		return;
+	}
+
+	if (cpu_has_virt_ssbd) {
+		wrmsrl(MSR_VIRT_SPEC_CTRL, opt_ssbd ? SPEC_CTRL_SSBD : 0);
+		return;
+	}
+
+	if (!set_legacy_ssbd(c, opt_ssbd)) {
 		printk_once(XENLOG_ERR "No SSBD controls available\n");
+		if (amd_legacy_ssbd)
+			panic("CPU feature mismatch: no legacy SSBD\n");
+	} else if (c == &boot_cpu_data)
+		amd_legacy_ssbd = true;
+}
+
+static struct ssbd_core {
+    spinlock_t lock;
+    unsigned int count;
+} *ssbd_core;
+static unsigned int __ro_after_init ssbd_max_cores;
+#define AMD_ZEN1_MAX_SOCKETS 2
+
+bool __init amd_setup_legacy_ssbd(void)
+{
+	unsigned int i;
+
+	if (boot_cpu_data.x86 != 0x17 || boot_cpu_data.x86_num_siblings <= 1)
+		return true;
+
+	/*
+	 * One could be forgiven for thinking that c->x86_max_cores is the
+	 * correct value to use here.
+	 *
+	 * However, that value is derived from the current configuration, and
+	 * c->cpu_core_id is sparse on all but the top end CPUs.  Derive
+	 * max_cpus from ApicIdCoreIdSize which will cover any sparseness.
+	 */
+	if (boot_cpu_data.extended_cpuid_level >= 0x80000008) {
+		ssbd_max_cores = 1u << MASK_EXTR(cpuid_ecx(0x80000008), 0xf000);
+		ssbd_max_cores /= boot_cpu_data.x86_num_siblings;
+	}
+	if (!ssbd_max_cores)
+		return false;
+
+	/* Max is two sockets for Fam17h hardware. */
+	ssbd_core = xzalloc_array(struct ssbd_core,
+	                          ssbd_max_cores * AMD_ZEN1_MAX_SOCKETS);
+	if (!ssbd_core)
+		return false;
+
+	for (i = 0; i < ssbd_max_cores * AMD_ZEN1_MAX_SOCKETS; i++) {
+		spin_lock_init(&ssbd_core[i].lock);
+		/* Record initial state, also applies to any hotplug CPU. */
+		if (opt_ssbd)
+			ssbd_core[i].count = boot_cpu_data.x86_num_siblings;
+	}
+
+	return true;
+}
+
+void amd_set_legacy_ssbd(bool enable)
+{
+	const struct cpuinfo_x86 *c = &current_cpu_data;
+	struct ssbd_core *core;
+	unsigned long flags;
+
+	if (c->x86 != 0x17 || c->x86_num_siblings <= 1) {
+		BUG_ON(!set_legacy_ssbd(c, enable));
+		return;
+	}
+
+	BUG_ON(c->phys_proc_id >= AMD_ZEN1_MAX_SOCKETS);
+	BUG_ON(c->cpu_core_id >= ssbd_max_cores);
+	core = &ssbd_core[c->phys_proc_id * ssbd_max_cores + c->cpu_core_id];
+	/*
+	 * Use irqsave variant to make check_lock() happy. When called from
+	 * vm{exit,entry}_virt_spec_ctrl GIF=0, but the state of IF could be 1,
+	 * thus fooling the spinlock check.
+	 */
+	spin_lock_irqsave(&core->lock, flags);
+	core->count += enable ? 1 : -1;
+	ASSERT(core->count <= c->x86_num_siblings);
+	if (enable ? core->count == 1 : !core->count)
+		BUG_ON(!set_legacy_ssbd(c, enable));
+	spin_unlock_irqrestore(&core->lock, flags);
 }
 
 void __init detect_zen2_null_seg_behaviour(void)
diff --git a/xen/arch/x86/cpuid.c b/xen/arch/x86/cpuid.c
index 91e53284fc..e278fee689 100644
--- a/xen/arch/x86/cpuid.c
+++ b/xen/arch/x86/cpuid.c
@@ -537,6 +537,16 @@ static void __init calculate_hvm_max_policy(void)
     if ( !boot_cpu_has(X86_FEATURE_VIRT_SC_MSR_HVM) )
         /* Clear VIRT_SSBD if VIRT_SPEC_CTRL is not exposed to guests. */
         __clear_bit(X86_FEATURE_VIRT_SSBD, hvm_featureset);
+    else
+        /*
+         * Expose VIRT_SSBD if VIRT_SPEC_CTRL is supported, as that implies the
+         * underlying hardware is capable of setting SSBD using
+         * non-architectural way or VIRT_SSBD is available.
+         *
+         * Note that if the hardware supports VIRT_SSBD natively this setting
+         * will just override an already set bit.
+         */
+        __set_bit(X86_FEATURE_VIRT_SSBD, hvm_featureset);
 
     /*
      * If Xen isn't virtualising MSR_SPEC_CTRL for HVM guests (functional
diff --git a/xen/arch/x86/hvm/svm/svm.c b/xen/arch/x86/hvm/svm/svm.c
index 40ff28ecf1..9b8f8d21bd 100644
--- a/xen/arch/x86/hvm/svm/svm.c
+++ b/xen/arch/x86/hvm/svm/svm.c
@@ -3133,7 +3133,12 @@ void vmexit_virt_spec_ctrl(void)
         if ( val != lo )
             wrmsr(MSR_VIRT_SPEC_CTRL, val, 0);
         current->arch.msrs->virt_spec_ctrl.raw = lo;
+
+        return;
     }
+
+    if ( val != current->arch.msrs->virt_spec_ctrl.raw )
+        amd_set_legacy_ssbd(val & SPEC_CTRL_SSBD);
 }
 
 /* Called with GIF=0. */
@@ -3142,7 +3147,12 @@ void vmentry_virt_spec_ctrl(void)
     unsigned int val = current->arch.msrs->virt_spec_ctrl.raw;
 
     if ( val != (opt_ssbd ? SPEC_CTRL_SSBD : 0) )
-        wrmsr(MSR_VIRT_SPEC_CTRL, val, 0);
+    {
+        if ( cpu_has_virt_ssbd )
+            wrmsr(MSR_VIRT_SPEC_CTRL, val, 0);
+        else
+            amd_set_legacy_ssbd(val & SPEC_CTRL_SSBD);
+    }
 }
 
 /*
diff --git a/xen/arch/x86/include/asm/amd.h b/xen/arch/x86/include/asm/amd.h
index a82382e6bf..6a42f68542 100644
--- a/xen/arch/x86/include/asm/amd.h
+++ b/xen/arch/x86/include/asm/amd.h
@@ -151,4 +151,8 @@ void check_enable_amd_mmconf_dmi(void);
 extern bool amd_acpi_c1e_quirk;
 void amd_check_disable_c1e(unsigned int port, u8 value);
 
+extern bool amd_legacy_ssbd;
+bool amd_setup_legacy_ssbd(void);
+void amd_set_legacy_ssbd(bool enable);
+
 #endif /* __AMD_H__ */
diff --git a/xen/arch/x86/spec_ctrl.c b/xen/arch/x86/spec_ctrl.c
index 0d5ec877d1..495e6f9405 100644
--- a/xen/arch/x86/spec_ctrl.c
+++ b/xen/arch/x86/spec_ctrl.c
@@ -22,6 +22,7 @@
 #include <xen/param.h>
 #include <xen/warning.h>
 
+#include <asm/amd.h>
 #include <asm/hvm/svm/svm.h>
 #include <asm/microcode.h>
 #include <asm/msr.h>
@@ -1073,7 +1074,8 @@ void __init init_speculation_mitigations(void)
     }
 
     /* Support VIRT_SPEC_CTRL.SSBD if AMD_SSBD is not available. */
-    if ( opt_msr_sc_hvm && !cpu_has_amd_ssbd && cpu_has_virt_ssbd )
+    if ( opt_msr_sc_hvm && !cpu_has_amd_ssbd &&
+         (cpu_has_virt_ssbd || (amd_legacy_ssbd && amd_setup_legacy_ssbd())) )
         setup_force_cpu_cap(X86_FEATURE_VIRT_SC_MSR_HVM);
 
     /* If we have IBRS available, see whether we should use it. */
-- 
2.35.1



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 09:29:53 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 09:29:53 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296805.505348 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZr7o-0007dX-Pn; Thu, 31 Mar 2022 09:29:52 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296805.505348; Thu, 31 Mar 2022 09:29:52 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZr7o-0007dQ-Mn; Thu, 31 Mar 2022 09:29:52 +0000
Received: by outflank-mailman (input) for mailman id 296805;
 Thu, 31 Mar 2022 09:29:51 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=TTh1=UK=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZr7n-0005JJ-8y
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 09:29:51 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 1cf5c3a4-b0d5-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 11:29:50 +0200 (CEST)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur02lp2058.outbound.protection.outlook.com [104.47.5.58]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-4-SGmMGXfgO_667l57DKBIug-1; Thu, 31 Mar 2022 11:29:47 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM0PR04MB6161.eurprd04.prod.outlook.com (2603:10a6:208:148::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.21; Thu, 31 Mar
 2022 09:29:46 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.021; Thu, 31 Mar 2022
 09:29:46 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 1cf5c3a4-b0d5-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648718990;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=izkM3/z4sPkt4zpxlsHGtY1fc5KRMyoYNoGbHZjH4Q0=;
	b=mYWhfAt4wjtQW5Cxn3zhirewX7CVQsGTnGi5PlKCL3WcRDOaBnw7RD3lxewT44z4yRdM+2
	R71SpBWA40/e/HshBctJFzJyCIP5+YjkCKuZ7cUVa2HgRGbv67nTuU95K1giuDFxKgrxjY
	R1SC6y5OmqElHynqPN5PehWSdHbumPI=
X-MC-Unique: SGmMGXfgO_667l57DKBIug-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=TCRIT5/BMJ3RHYIz3kjxkjPL8Nw8rd20IpoCeFWWKn2oIgMIe6FoIFmpYiNIjZVFp/1f/C33YROc6wsHcWYzubMEdBedVtZ/XsYsVeevq9/IOorDjwZuFjs5sDixuKw9bMcmIa4s9DV7N+3MxBtaAH71TLebn5MnNuxEQabydnjUbbKtNmD30QCFzIHuW7zTDMOssWsVLELiQIFKLGpDwYNB5o+uEYoNHd2KCuXVtVMVNNA+e1XxBS4zvQk9QLh8Y3pwaZd59BJecTqa+m+nYsz1buAM7iiqXuc/8kJjLZG/3VyK/gRLg7J+1k56QoGBnYL8lx5KDb9Q8yd3APWHAg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=izkM3/z4sPkt4zpxlsHGtY1fc5KRMyoYNoGbHZjH4Q0=;
 b=TS4TuKTtl+T7D+tlbqCyAA/F1RxlZTGihpOyzIzLxJdw7XKrMOZtj9TZU2hKh9fuiivrCV3Vh+0JK1M9Kj9IcDcQSlxy0RrtRqWfiNnZ0TFlP74tjBHF4NQTdyCaaFnjpkgzqfEucKWFTnzoQVeIdQodRXfDjuX6xN3DS+avOzaoCatTTRX5pz3K79Sw5HK2avZm7llaZ1LJFNFJX85Goj5M11Ti/6BcgicFqq9WjbKf+RbeDUbXzZHuQJ0ELjN+Gd8pDgheAvU/gUHXjpcxsiYVJJLRro6phoIjtuPTCzS90zwv0dMTUl+P4sqi2UoyM82uBhzn386pTYyHcQ3mLQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <37ee7fe7-1218-7fa3-bc29-0fb45389bf75@suse.com>
Date: Thu, 31 Mar 2022 11:29:44 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: [PATCH v4 1/4] x86/APIC: calibrate against platform timer when
 possible
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
References: <6e540bc9-c536-84ac-fb1c-8271e7731b3e@suse.com>
In-Reply-To: <6e540bc9-c536-84ac-fb1c-8271e7731b3e@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8PR07CA0007.eurprd07.prod.outlook.com
 (2603:10a6:20b:451::6) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 74fd2d73-fabe-4521-68f5-08da12f8febc
X-MS-TrafficTypeDiagnostic: AM0PR04MB6161:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB616136F3659C67DA9889C215B3E19@AM0PR04MB6161.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6916009)(54906003)(66946007)(38100700002)(2616005)(8936002)(6506007)(66556008)(5660300002)(8676002)(186003)(2906002)(4326008)(66476007)(26005)(316002)(86362001)(6486002)(83380400001)(6512007)(31696002)(31686004)(508600001)(36756003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?KzBac3dDclZQVGIzbkN0cHpyVk1iYk01bUdIdjdObDB0STNJMGxQMUU4c094?=
 =?utf-8?B?RTJ1L2tiemNYb2tOWHhZWnJKaHEzajBrWC80aE5mN0htYUlTUDhsN0ozZkxE?=
 =?utf-8?B?UnBhYWFZblY0TmRsZHc3ZlF5WFBFSGsrQ2xkZkFXdzdqRFU3dkRkNUU3U0Nz?=
 =?utf-8?B?bVdvZ0g5aFVMVHhXSFFVSVZIazRLbFlFUEJ0S2xFclRtd1JVNVRoOTFqSnhl?=
 =?utf-8?B?M3lBM3RNZDlvUERZUlpMdjZ3aEpQKzJSVllsMEQ5eld4M1dWRWhjYWJVbW9S?=
 =?utf-8?B?Mm14dlF0U3h6QnJ0TDB0QU80Uzd5L1Rsa0h6d052bUUvQitaakcwSmVROU9S?=
 =?utf-8?B?ZU9FS2ZENUgxYU1PZVdVM3huL0haSGNCaHhId05JLzJmazJqQWJBektCcjhO?=
 =?utf-8?B?S1VnL2E5Ky9sYzBUY0NoRlc0SmZ5ZDN1TlpkNHk2K2ZXMXgrYnJWMFNsbzND?=
 =?utf-8?B?Uy9DRDgwcStiYVBycG16VkF2YTAzMlFSQWw4b2hKZzc1YThWTG5ZNVllc3dt?=
 =?utf-8?B?TkdDVW1vbithRmo2QUt0UTJ5ZmR6QlJFUU84Y2V6bTROZVpHSHljb2JNMFlS?=
 =?utf-8?B?a2hPYTdZWm4wbVBQSm93UlFZRlc1cytQelpOeDk1a1N6VDdjNGliTXVqVGRR?=
 =?utf-8?B?NTVvMWxIbGRhWmJoNllSTkZlVEQweXJpdEpPajNPQnR2Zk5YYWwybXIvdjQ0?=
 =?utf-8?B?RHg4b2YyVUVFeVVaTWR1Uy9DTjY5YjlOOEQrMXhucm9OVC9TU2p4Z1JWdUF4?=
 =?utf-8?B?UUVkcFBDRzZLeGZhTGt0czZmT2NJK0t5NUNiais2bEx4QkRMNXFiWWVEd1Nn?=
 =?utf-8?B?bGdZMS84SlpwRVNqVlhLQzBvcmxKalI0Qm5WQ2FIRjVoLzk2K2ttZjFobnMx?=
 =?utf-8?B?TFF2MFRLQldzL2srZUJlbHdNREhzVHVFbDduaWhOZ1VzNjBTNE9YT0JXY1pj?=
 =?utf-8?B?bC96YXNCa1RNbE9kYmQxeWNiMDJORFhWVG93TDJ3NTZVK2c4eFd0TkY4NjJQ?=
 =?utf-8?B?RWNpMmFpdUVmaU1WaTY0UzRSVER6aWRydjdITUlrb1FSWm03RlFuMUxsZ2x6?=
 =?utf-8?B?clltNnJhSVBMWHhUVXh1TndoSXpXZGxHZkZGbjJnaDhSZ0d1aUxGWG1VY3h1?=
 =?utf-8?B?eWhYU29yMFk3Z3MvUW9UOFljY2pzelpRZFk0Nm0rRTA0c0RVVmdtK3ZYdEhn?=
 =?utf-8?B?MlVYYi8vQ3ZlbFY3OHNvZFBuSnFvQXF0UzAwVWdoV2N3N0dHcHZob0FIbVFv?=
 =?utf-8?B?VHhyYU82RzhscTZ5bWdCQ1A1OU9mR1ozRDdWSWo1UWh4TWJ2R2Y4YUw1OGIz?=
 =?utf-8?B?TDhFNWlPcnVwdk5icG9LMlFDZU92VDV3cFdNK3Mrb1hCeFV4YzZ0dlAwMlhU?=
 =?utf-8?B?dnZ1WW03ZGVZYnN6VjN1bkI0SDVWWnZNTS95WUpCVnpsVlgrRDNadW1TUFN5?=
 =?utf-8?B?MFE5d1V0K0JyMkJ1WlY0R09oY0s5Z0thWnROdmtDYWFyYkxvTVRXYlFEMlIv?=
 =?utf-8?B?M1RMRWJWaEY0Wm1rYlRYNU9Na1ZDejlYbDRHMDBpUnBkM3ppeU14aU5QMFV4?=
 =?utf-8?B?YWhUKys5Q09pa0ZCMmdoc3Y2RGEzcW5PbkdDTDNiYVpQK3JTY1ljU0YzcGg3?=
 =?utf-8?B?RWxKZ05SU2JUY0x6Q09CbVRPWjhzcWNNRVlXVm92c0dNTjhSZEVhN3FoTlRy?=
 =?utf-8?B?bDRrLzByOXZMalhHQ0dmUnR1d1F6bGk3RnJTT2UxQWNjTXhiZTFSMkZTS2Jr?=
 =?utf-8?B?RDRHU0ZFYzBoc2JpOXI2aUV5QU8yRE4xOEtrUE9LNWdMbTZWc3RFb0Y1cWEy?=
 =?utf-8?B?dEZwbXBVOXhTbzQreWhlc0NWa1UzZjRoWFh4WXNkYVV2K3dmcXN3WXlZOVdk?=
 =?utf-8?B?ZFFsOXJCSzlCMlMrS3lEVExnRTcyblBWTjl3dE1CajNvOE9vMVpMTXJuYkZP?=
 =?utf-8?B?cWVCdXpvR2ZsNUN3SDlTRVlDL1UyMG9XNmhaVmcxZGwrY0ptSnk3V1IwNm1t?=
 =?utf-8?B?UjZhTjR2NTB6aTdZRFdIaVkzN1dYcWllNjB3UXdMc01QbTNjV3ViZXJtbTdp?=
 =?utf-8?B?ZC9jQXNwSHFuaDJQU0RqU3RsMFJWMTE4ekNPYk11d3RvNGpOOC81cnp1c3VE?=
 =?utf-8?B?N1E0MDRxeTdYZ0hEYjN6a0lsMFlmVlo0MytqOHlTRnQ0TlVhcmNZMW94SUxM?=
 =?utf-8?B?UzA3T01JeXY4T0tDYVQrUVYrU0VRODZsY3RJY1hTZVh3TzJPNnJmM21FQTcx?=
 =?utf-8?B?NEhKaFpSQkJOdldWV08ybUFXZUl4MS92TjB5aFloK0VSWTEzQ2pOM0dqalZn?=
 =?utf-8?B?OE9DU0hDS0FrVEVkNUd2dVk4WTU3ZlNqMitLOEpsaXFub3JYVHlFZz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 74fd2d73-fabe-4521-68f5-08da12f8febc
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 09:29:46.2546
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 9mmIUx9VUgow94qic/LnAooyQrhZF66/Z1VoDKGqZU5LewpiXQu5xCC1pEZYjeQm0z9uUBNj1hg1/+YQWzqokg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB6161

Use the original calibration against PIT only when the platform timer
is PIT. This implicitly excludes the "xen_guest" case from using the PIT
logic (init_pit() fails there, and as of 5e73b2594c54 ["x86/time: minor
adjustments to init_pit()"] using_pit also isn't being set too early
anymore), so the respective hack there can be dropped at the same time.
This also reduces calibration time from 100ms to 50ms, albeit this step
is being skipped as of 0731a56c7c72 ("x86/APIC: no need for timer
calibration when using TDT") anyway.

While re-indenting the PIT logic in calibrate_APIC_clock(), besides
adjusting style also switch around the 2nd TSC/TMCCT read pair, to match
the order of the 1st one, yielding more consistent deltas.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
Open-coding apic_read() in apic_tmcct_read() isn't overly nice, but I
wanted to avoid x2apic_enabled being evaluated twice in close
succession. And I also wouldn't want to have the barrier there even for
the (uncached) MMIO read.

Unlike the CPU frequencies enumerated in CPUID leaf 0x16 (which aren't
precise), using CPUID[0x15].ECX - if populated - may be an option to
skip calibration altogether. Aiui the value there is precise, but using
the systems I have easy access to I cannot verify this: In the sample
of three I have, none have ECX populated.

I wonder whether the secondary CPU freq measurement (used for display
purposes only) wouldn't better be dropped at this occasion.
---
v3: Move (and rename) read_tmcct() as previously suggested.
v2: New.

--- a/xen/arch/x86/apic.c
+++ b/xen/arch/x86/apic.c
@@ -1183,18 +1183,20 @@ static void __init check_deadline_errata
            "please update microcode to version %#x (or later)\n", rev);
 }
 
-static void __init wait_tick_pvh(void)
+uint32_t __init apic_tmcct_read(void)
 {
-    u64 lapse_ns = 1000000000ULL / HZ;
-    s_time_t start, curr_time;
-
-    start = NOW();
+    if ( x2apic_enabled )
+    {
+        /*
+         * Have a barrier here just like in rdtsc_ordered() as it's
+         * unclear whether this non-serializing RDMSR also can be
+         * executed speculatively (like RDTSC can).
+         */
+        alternative("lfence", "mfence", X86_FEATURE_MFENCE_RDTSC);
+        return apic_rdmsr(APIC_TMCCT);
+    }
 
-    /* Won't wrap around */
-    do {
-        cpu_relax();
-        curr_time = NOW();
-    } while ( curr_time - start < lapse_ns );
+    return apic_mem_read(APIC_TMCCT);
 }
 
 /*
@@ -1212,9 +1214,6 @@ static void __init wait_tick_pvh(void)
 
 static void __init calibrate_APIC_clock(void)
 {
-    unsigned long long t1, t2;
-    unsigned long tt1, tt2;
-    unsigned int i;
     unsigned long bus_freq; /* KAF: pointer-size avoids compile warns. */
     unsigned int bus_cycle; /* length of one bus cycle in pico-seconds */
 #define LOOPS_FRAC 10U      /* measure for one tenth of a second */
@@ -1227,39 +1226,38 @@ static void __init calibrate_APIC_clock(
      */
     __setup_APIC_LVTT(0xffffffff);
 
-    if ( !xen_guest )
+    bus_freq = calibrate_apic_timer();
+    if ( !bus_freq )
+    {
+        unsigned int i, tt1, tt2;
+        unsigned long t1, t2;
+
+        ASSERT(!xen_guest);
+
         /*
-         * The timer chip counts down to zero. Let's wait
-         * for a wraparound to start exact measurement:
-         * (the current tick might have been already half done)
+         * The timer chip counts down to zero. Let's wait for a wraparound to
+         * start exact measurement (the current tick might have been already
+         * half done):
          */
         wait_8254_wraparound();
-    else
-        wait_tick_pvh();
 
-    /*
-     * We wrapped around just now. Let's start:
-     */
-    t1 = rdtsc_ordered();
-    tt1 = apic_read(APIC_TMCCT);
+        /* We wrapped around just now. Let's start: */
+        t1 = rdtsc_ordered();
+        tt1 = apic_read(APIC_TMCCT);
 
-    /*
-     * Let's wait HZ / LOOPS_FRAC ticks:
-     */
-    for (i = 0; i < HZ / LOOPS_FRAC; i++)
-        if ( !xen_guest )
+        /* Let's wait HZ / LOOPS_FRAC ticks: */
+        for ( i = 0; i < HZ / LOOPS_FRAC; ++i )
             wait_8254_wraparound();
-        else
-            wait_tick_pvh();
 
-    tt2 = apic_read(APIC_TMCCT);
-    t2 = rdtsc_ordered();
+        t2 = rdtsc_ordered();
+        tt2 = apic_read(APIC_TMCCT);
 
-    bus_freq = (tt1 - tt2) * APIC_DIVISOR * LOOPS_FRAC;
+        bus_freq = (tt1 - tt2) * APIC_DIVISOR * LOOPS_FRAC;
 
-    apic_printk(APIC_VERBOSE, "..... CPU clock speed is %lu.%04lu MHz.\n",
-                ((unsigned long)(t2 - t1) * LOOPS_FRAC) / 1000000,
-                (((unsigned long)(t2 - t1) * LOOPS_FRAC) / 100) % 10000);
+        apic_printk(APIC_VERBOSE, "..... CPU clock speed is %lu.%04lu MHz.\n",
+                    ((t2 - t1) * LOOPS_FRAC) / 1000000,
+                    (((t2 - t1) * LOOPS_FRAC) / 100) % 10000);
+    }
 
     apic_printk(APIC_VERBOSE, "..... host bus clock speed is %ld.%04ld MHz.\n",
                 bus_freq / 1000000, (bus_freq / 100) % 10000);
--- a/xen/arch/x86/include/asm/apic.h
+++ b/xen/arch/x86/include/asm/apic.h
@@ -192,6 +192,9 @@ extern void record_boot_APIC_mode(void);
 extern enum apic_mode current_local_apic_mode(void);
 extern void check_for_unexpected_msi(unsigned int vector);
 
+uint64_t calibrate_apic_timer(void);
+uint32_t apic_tmcct_read(void);
+
 extern void check_nmi_watchdog(void);
 
 extern unsigned int nmi_watchdog;
--- a/xen/arch/x86/time.c
+++ b/xen/arch/x86/time.c
@@ -26,6 +26,7 @@
 #include <xen/symbols.h>
 #include <xen/keyhandler.h>
 #include <xen/guest_access.h>
+#include <asm/apic.h>
 #include <asm/io.h>
 #include <asm/iocap.h>
 #include <asm/msr.h>
@@ -1018,6 +1019,67 @@ static u64 __init init_platform_timer(vo
     return rc;
 }
 
+static uint64_t __init read_pt_and_tmcct(uint32_t *tmcct)
+{
+    uint32_t tmcct_prev = *tmcct = apic_tmcct_read(), tmcct_min = ~0;
+    uint64_t best = best;
+    unsigned int i;
+
+    for ( i = 0; ; ++i )
+    {
+        uint64_t pt = plt_src.read_counter();
+        uint32_t tmcct_cur = apic_tmcct_read();
+        uint32_t tmcct_delta = tmcct_prev - tmcct_cur;
+
+        if ( tmcct_delta < tmcct_min )
+        {
+            tmcct_min = tmcct_delta;
+            *tmcct = tmcct_cur;
+            best = pt;
+        }
+        else if ( i > 2 )
+            break;
+
+        tmcct_prev = tmcct_cur;
+    }
+
+    return best;
+}
+
+uint64_t __init calibrate_apic_timer(void)
+{
+    uint32_t start, end;
+    uint64_t count = read_pt_and_tmcct(&start), elapsed;
+    uint64_t target = CALIBRATE_VALUE(plt_src.frequency), actual;
+    uint64_t mask = (uint64_t)~0 >> (64 - plt_src.counter_bits);
+
+    /*
+     * PIT cannot be used here as it requires the timer interrupt to maintain
+     * its 32-bit software counter, yet here we run with IRQs disabled.
+     */
+    if ( using_pit )
+        return 0;
+
+    while ( ((plt_src.read_counter() - count) & mask) < target )
+        continue;
+
+    actual = read_pt_and_tmcct(&end) - count;
+    elapsed = start - end;
+
+    if ( likely(actual > target) )
+    {
+        /* See the comment in calibrate_tsc(). */
+        while ( unlikely(actual > (uint32_t)actual) )
+        {
+            actual >>= 1;
+            target >>= 1;
+        }
+        elapsed = muldiv64(elapsed, target, actual);
+    }
+
+    return elapsed * CALIBRATE_FRAC;
+}
+
 u64 stime2tsc(s_time_t stime)
 {
     struct cpu_time *t;



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 09:31:19 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 09:31:19 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296811.505359 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZr9D-0000fM-6E; Thu, 31 Mar 2022 09:31:19 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296811.505359; Thu, 31 Mar 2022 09:31:19 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZr9D-0000fF-39; Thu, 31 Mar 2022 09:31:19 +0000
Received: by outflank-mailman (input) for mailman id 296811;
 Thu, 31 Mar 2022 09:31:18 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=TTh1=UK=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZr9C-0000f9-FY
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 09:31:18 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 50e03e4f-b0d5-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 11:31:17 +0200 (CEST)
Received: from EUR02-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur02lp2052.outbound.protection.outlook.com [104.47.6.52]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-2-gRSW_mqeP9yo4G6zBTyBgw-1; Thu, 31 Mar 2022 11:31:06 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM0PR04MB4785.eurprd04.prod.outlook.com (2603:10a6:208:c2::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.19; Thu, 31 Mar
 2022 09:31:05 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.021; Thu, 31 Mar 2022
 09:31:05 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 50e03e4f-b0d5-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648719077;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=6S1HpDENtJ7ubBweYtGrl5poiiLyhdsWba6MqBcEJhM=;
	b=QOn1Y0KXP5Ng5TnCmNJmGjITdOzhuA7NRwJcW61TIVGRleU4TdFOhN+ZWq38BVvITjD9oQ
	Tq3ajD/cG/9cYBaZMNpwojRBRHtiIgJABRqKrzobClXuGQX79Ug4UFFabHisyG27nIfZD0
	PORPYEB6X72ibnv2m5r4AXTNklPJNGU=
X-MC-Unique: gRSW_mqeP9yo4G6zBTyBgw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=UC0dpPWDisbFK77x9NKqkHvYBfBYBJC5/LqvKLpR/Ag6iCeOvoMYCAp6La3M8ivSqXZjgoXh9dIz0uoVKMgzltx7fOxL5Bvbm6774RO90kwIKibyfcid2ZGh9sdePSkhVurbUZMGzsyskLnH603NrUbUorJpSnmG4WQ8SkF904IluKnBVbO0ec68ERDbU3jCzDwfNJQDuRgMZfH6HpoHo1Hv70udwve94hLyn1cXIUOBpaLWQO1npjIuwGGtr6yqUdW5xSYwRVS6ONvE2LCFjz9BnMaV3o2+D29WO55kqkLGtv30VROx0ytcqBuTDVecRANtUEji9Y2RGOV62NxCoA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=6S1HpDENtJ7ubBweYtGrl5poiiLyhdsWba6MqBcEJhM=;
 b=G/CvAumSVmKG3+SKVSitG3KZ/o8Sug/S2l3Z3FUpLpEG6xTfL7aNn5/X/RgLkAWwrBXlyA7U1rkrjR5oudC3byxjrgl8GezSoa31CiTtK7z4P6yiyldicBEhX8E2V6xnYrhaKzLPzFz67P/ugVox4kF4uqzlYH190YTQyjwFtdB3EhUUtflzgZkte+od9kwuJMcogdbrhFynbw+P6l1D+aqxMg6hxNyx0WuIoW0x4G40htPRFxnmHNF+OWS15bNTvD8if6G+A8LlQMUvP0fg3qLWA83zvKv57K6eIr2GF+OYzJTFqBReUF1YyTGokRbw1ICvLliFCIcuMOolIU99zQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <9a0cf101-17fa-cad2-e791-15d8d8cc5b79@suse.com>
Date: Thu, 31 Mar 2022 11:31:02 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: [PATCH v4 3/4] include: move STR() and IS_ALIGNED()
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>
References: <6e540bc9-c536-84ac-fb1c-8271e7731b3e@suse.com>
In-Reply-To: <6e540bc9-c536-84ac-fb1c-8271e7731b3e@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P195CA0084.EURP195.PROD.OUTLOOK.COM
 (2603:10a6:209:86::25) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: cfe9777b-35ee-4364-9c30-08da12f92d99
X-MS-TrafficTypeDiagnostic: AM0PR04MB4785:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB47852E13FA722A30466C51FFB3E19@AM0PR04MB4785.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(86362001)(186003)(6512007)(6506007)(2616005)(31696002)(26005)(38100700002)(2906002)(4326008)(36756003)(8936002)(31686004)(66556008)(66946007)(66476007)(5660300002)(8676002)(6486002)(6916009)(54906003)(508600001)(316002)(6666004)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?QTMzb2hodDBNT08zMzBEcVlPclVDZnVodTU1ODFqRVNjUXlLTzR4Qm9lc2J2?=
 =?utf-8?B?ZEJ4WnhiRnowZGdMN1RlNXEzdUtIWm9mWld5MzJtRG1HS0RmNG5JUzVmK2h6?=
 =?utf-8?B?S1IzeDIzZnd0bUNFOU5Tc2ExVjBpRmVJUWJ3VlptWUJyME5rTHJjcjR1dER0?=
 =?utf-8?B?MzFmTzE5R090ak1LLzd1dG81UER0YWRhWlhZdFI2R1BJTjlpNldva1ZnbmVH?=
 =?utf-8?B?MGdJVUMwTW9tcnZsR2c5ZFpsZmx2eWZYeG1Fd1JGNzJuRzd6T2l4OStMRmhr?=
 =?utf-8?B?ckZ5VkUyWUhMaGNxc09FZi8rR0RlVk56M0daa1I5dlVqejlpTng0akUyZEhW?=
 =?utf-8?B?cHNaOEdiOERSMVpFU01McDd2OFNEU0xrOC9pU3JMMkdrajdKZUFGcGZnSHZ0?=
 =?utf-8?B?OVBnaXVuMEJLWFJTL0tKaTQ2b1RSVFkvSVdlakpVN1JCT3FvNTBtK1h1MHNs?=
 =?utf-8?B?THQvYWR0RytPelU3YmlkMzZWN21MMFd3RjlYWEJxaXNoRWRqV3dCVWM2djhZ?=
 =?utf-8?B?OUZiL0ZFM3kyOHJMMXBmbnRPUDdnWXdVZ1pSaENwVHV1WUZrSHRYNUtPcmJK?=
 =?utf-8?B?bWJkbHhVdDVPUFNDVWFvSDJqOTNUMG9WQVo5SWo5My81ZVBoc2kvT3FkOXd4?=
 =?utf-8?B?WlBhOXRETmJ0UTQ4cnpiY3h4c3FPUzhwaHlZN0luNFBiNmRNU1pCZVNSeFVv?=
 =?utf-8?B?WStwTGZXYnlhaTlZUGF1aXVrdVpCWnlKbW42Q2ZINXAyVEJTRE50WkZac1Vo?=
 =?utf-8?B?WFZ4U2hCdHVmcmQxc0o4d3BrcmpuZkVUR0E0TWlzOHdmUFRLVngwY1VMbTNu?=
 =?utf-8?B?WDVOUTZkSmc5b0pFK01ZZ2RobkdPTmZuTE5US3BIL01kellCQ2J0cXRFZktW?=
 =?utf-8?B?eisyb2hGc1dmTUQyU2pRZmdQNU9vTXdCMGd5MFBxaUhmRTN0U1R4UTJTNkRV?=
 =?utf-8?B?S08wK2pNN011ZzRLOFVxaUF6dkJ3WUp5ZG4vUS92ZDlZc2F3Q2FwRFNLMk13?=
 =?utf-8?B?dGlBUDJONllRSkFyUDVEelNvWFloZDFIVjZNZ1hsektFQ1NidmxjdDFqSWhL?=
 =?utf-8?B?MGN4b0NzbVZ0VlhqRU9ETnRnWmhoMEhNU2NEWURKdWFjbHc5OGF2blR5WHhm?=
 =?utf-8?B?V3ZqNG53UVlBVEdUZ2N2QWFDQzBqZDc0czRlbmFxMDQrZXFROC84MVRqQnJN?=
 =?utf-8?B?MTFvOHZMdlorM2s2WkhsdENyMnZIaXRsckJ4VmFIOFNxb0lWTzlUTnlnTnQx?=
 =?utf-8?B?S1FxdExMSlNsSElCQU9QSW1INzMxeEpNYVVaTnphcmZiOTdQdjJIaXM4clUx?=
 =?utf-8?B?UVVqU21qM0xLSWJyV0p0ZGZkaEdaTGFFNTI0U3JFQ1ArUE1SSVYxVGlWOHk2?=
 =?utf-8?B?bjJkd1R6bTI4bEdwT0o5WXlVeGN4WitRSm02MjZVWG1sMU9wM0JGcmhPSUZX?=
 =?utf-8?B?RVlyYUdmVGVtYW1OaVJCTTdxYjJKQWRDTnIvMzJGNGlQbWt5TTM1dEN1K0JL?=
 =?utf-8?B?Vm5YR2d3d1RvMXY3bmcrQkxQaVVKemVneVRYUENQRWNFb0ViZ0ZaMmREMGZM?=
 =?utf-8?B?U2VhbHRzNkhVUnE3dkdGRjlGUjBadmhabjc1TUM4WFovRUYwUnZhZmxXa3lE?=
 =?utf-8?B?bUxveHdRbFhtTGpjanNKN01BTk9UZ2FzcG5rUHZERVpjL2VaNk9KR0k0eEg2?=
 =?utf-8?B?eldad0RwNGJhQzBBb1liYUJRRUExT3hZb2ludVhXSG5nU1I3WVFpdGNTNVZC?=
 =?utf-8?B?M205WGpjV0N0dlRLd2gxQWo5NlBVT1FUQWkvR3pCRzRLZXpWdWNsSVU1eVdW?=
 =?utf-8?B?KzlPOHRRMnJVOHR3Uzl4NGNGWEhXekxBNUFKOTkzc3RYZFQzMjBuYzBoVGFZ?=
 =?utf-8?B?WEM4bHE2dHV2RXN4ZWN3NE5OZUUyalZwZDlQcXJ5d081VkhGV1l5N2xjNVNK?=
 =?utf-8?B?VWsvQVVCblB3Nk03MnQ1ak1HWDFGeDlDMEdqeUQwL1VncG50aVFWSFNqMmJr?=
 =?utf-8?B?d1A4ckNkWHFHU1A5ckdBL05iempQVkExaUJLUHJ1djYyR1dIVzNoQ0NkK0Iy?=
 =?utf-8?B?aWxOQ0tiNGtOVTZlNW1kck8rRzlGMnVnVmpxMzYzeWl2cDBsWktHc09XeFZo?=
 =?utf-8?B?aXlXRjRTRFFJMTJTWWpma1hHcHdGcVowSURoQTBnSFZNNmNRZzQ2T0VPOGg2?=
 =?utf-8?B?djFEbDY3Qjc5QWxuMk1BdEpFZDdmTWo0VVkxby9vUXphMzJCWWZvalE3NFEw?=
 =?utf-8?B?NDR4ZzloVzNzYXZ0dStidWZ6TXQzNnFkKzJpUlB0SnJPTVdYdGt6aUpvWkh1?=
 =?utf-8?B?L0ppMXUzcS96VUpFb2JiUHJXRERZaENuM1A3a3JzOG9aLzB1emNqUT09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: cfe9777b-35ee-4364-9c30-08da12f92d99
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 09:31:05.0513
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: iyQo+QIxmnywGGchhQ7FiWugKU5JHj7Q2YpbMLh9pjeJs7pXaiSNg6/dQm+imuItCIJoLYUReW/A3furLsg9iQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB4785

lib.h is imo a better fit for them than config.h.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
v4: New.
---
Originally I thought I'd also move KB() etc, but they're used in places
where yet further adjustments (adding of #include) would be necessary.

--- a/xen/arch/arm/xen.lds.S
+++ b/xen/arch/arm/xen.lds.S
@@ -3,6 +3,7 @@
 /* Modified for ARM Xen by Ian Campbell */
 
 #include <xen/cache.h>
+#include <xen/lib.h>
 #include <asm/page.h>
 #undef ENTRY
 #undef ALIGN
--- a/xen/arch/x86/xen.lds.S
+++ b/xen/arch/x86/xen.lds.S
@@ -2,6 +2,7 @@
 /* Modified for i386/x86-64 Xen by Keir Fraser */
 
 #include <xen/cache.h>
+#include <xen/lib.h>
 #include <asm/page.h>
 #undef ENTRY
 #undef ALIGN
--- a/xen/include/xen/config.h
+++ b/xen/include/xen/config.h
@@ -82,11 +82,6 @@
 #define MB(_mb)     (_AC(_mb, ULL) << 20)
 #define GB(_gb)     (_AC(_gb, ULL) << 30)
 
-#define IS_ALIGNED(val, align) (((val) & ((align) - 1)) == 0)
-
-#define __STR(...) #__VA_ARGS__
-#define STR(...) __STR(__VA_ARGS__)
-
 /* allow existing code to work with Kconfig variable */
 #define NR_CPUS CONFIG_NR_CPUS
 
--- a/xen/include/xen/lib.h
+++ b/xen/include/xen/lib.h
@@ -3,6 +3,8 @@
 
 #define ROUNDUP(x, a) (((x) + (a) - 1) & ~((a) - 1))
 
+#define IS_ALIGNED(val, align) (!((val) & ((align) - 1)))
+
 #define DIV_ROUND(n, d) (((n) + (d) / 2) / (d))
 #define DIV_ROUND_UP(n, d) (((n) + (d) - 1) / (d))
 
@@ -17,6 +19,9 @@
 #define PASTE_(a, b) a ## b
 #define PASTE(a, b) PASTE_(a, b)
 
+#define __STR(...) #__VA_ARGS__
+#define STR(...) __STR(__VA_ARGS__)
+
 #ifndef __ASSEMBLY__
 
 #include <xen/inttypes.h>



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 09:31:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 09:31:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296814.505370 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZr9e-0001B6-Ex; Thu, 31 Mar 2022 09:31:46 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296814.505370; Thu, 31 Mar 2022 09:31:46 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZr9e-0001Az-Bn; Thu, 31 Mar 2022 09:31:46 +0000
Received: by outflank-mailman (input) for mailman id 296814;
 Thu, 31 Mar 2022 09:31:45 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=TTh1=UK=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZr9c-00013U-SO
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 09:31:44 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 60d82a1f-b0d5-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 11:31:44 +0200 (CEST)
Received: from EUR02-VE1-obe.outbound.protection.outlook.com
 (mail-ve1eur02lp2051.outbound.protection.outlook.com [104.47.6.51]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-40-44fwi6iCPzqeDl45Hw4PAQ-1; Thu, 31 Mar 2022 11:31:41 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM0PR04MB4785.eurprd04.prod.outlook.com (2603:10a6:208:c2::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.19; Thu, 31 Mar
 2022 09:31:40 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.021; Thu, 31 Mar 2022
 09:31:40 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 60d82a1f-b0d5-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648719103;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=jBAjZm98iC0F+YOWTsR9A+UOqJAYXH4F89jCY3IBJtM=;
	b=kE3FC8q3m5VsNYu9ZPsK45C1XyC0i42v8vSGSyvz10mg0h0eS2PmhahRBt3baQqH5nfQzg
	gdN0wzpsGh1NOJOr/vVyE0EkuhL/KB/8A4NcDL///zwZTOv/GEC2nmumovwccEv9C4W4x0
	NIUtuF8RSOAg+1Rf7MaZjHhhe6JWSY0=
X-MC-Unique: 44fwi6iCPzqeDl45Hw4PAQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=eWSzYQcP5ZqG3Qi3jahptgK2O58ET3PmQl1yPJyoFoe+vleYXO34scJlHOaTGLnWXl6zAhLIbAVBMVvwB4ToGGYC8ImvLNxGcfqBFxe6RKjaPpKjtrmnibAK5V5AMW/bGVat3mASL8BLKaTqdUAR6r7uQi8oMwkJmUdIJVGxIypWsGwHbzkeYi+aopnQ3VmzxD+GhcDvh5WvXMWDLh1/NXxQ6tyy3UPZ2t6nDfzhfVnuTkXdHOOrrN7CPRvsEwOSWr7QdJOmK8EhWg4CEnwHrwaQ0fTFl0hs8ZosvqEoGUivEPiqCeQcwHeeXkRVpdfImV2EXwKFQUDnvnX57Sgw7Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=jBAjZm98iC0F+YOWTsR9A+UOqJAYXH4F89jCY3IBJtM=;
 b=bHjVanWlzBfP53Td+x0yDE0dnh1+aPixi3xC0EZxcWIFgzD7K6ZzgAWkZFECB8fsctseuzVavRXqil7gGvHhpvm0V4XXXPR6FnAhvjfzgIt9d9FT4Qh2Irgd0Vc6BcxozA9F3uEB71WAqLw55KM1ocV3GicQTCHbtvWXLxiGQjIsThwwrX21rrCCG0S9S0hwpjtXAlQ/Q8oxGsYklaBzxKiWGbZlTrr6bxHhooacrp9f3nwuTDnuf2qo0FxKppXPca6YwRl2/LFCsqpKxmJ/hbHZ3w0obtjbfcOQzTiB9syjsHn1pW1y7i4zaf6/LwPqHoppKBL++EMu/H6pPWbX4w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <bddbec0e-acc2-03f9-fe4c-167fa5ac0ea1@suse.com>
Date: Thu, 31 Mar 2022 11:31:38 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: [PATCH v4 4/4] x86/time: use fake read_tsc()
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
References: <6e540bc9-c536-84ac-fb1c-8271e7731b3e@suse.com>
In-Reply-To: <6e540bc9-c536-84ac-fb1c-8271e7731b3e@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P195CA0103.EURP195.PROD.OUTLOOK.COM
 (2603:10a6:209:86::44) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0446f779-4413-4d46-3a53-08da12f942b0
X-MS-TrafficTypeDiagnostic: AM0PR04MB4785:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB4785B6F642300EC5E06E4808B3E19@AM0PR04MB4785.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(86362001)(186003)(6512007)(6506007)(2616005)(31696002)(26005)(38100700002)(83380400001)(2906002)(4326008)(36756003)(8936002)(31686004)(66556008)(66946007)(66476007)(5660300002)(8676002)(6486002)(6916009)(54906003)(508600001)(316002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?R0l4bEZHSUlMQUUxbW83TlVxa0lXTFBkdjM3QThnOGJ4azBqUTQ0REdURG5W?=
 =?utf-8?B?dHIvZUVlV3JkSkxSSGZXTFF0R1FNMjRGOGNiSzNmTmNObVRnakNUZmlnMG9n?=
 =?utf-8?B?Ti8rU0JUdy94UnkycXBSTnVRN0IrSXM0R3NrRXA2ZlNnb1JrMTI4d1RxajlD?=
 =?utf-8?B?LzdqK04wQ3poemdKWElydTRBemRMclBjQ2V4OGhBVEhPNTVpZ1JKNXA3Qzht?=
 =?utf-8?B?cktpN0k0Sm1BZ0RoZWxwVUZRTGFBZ2VmcmlOYVovNG15OG50Q01KaFlLMU1H?=
 =?utf-8?B?Q052YkdPQkRWQmR2ekRvRnZPMFcwQ2FsRzhoWE5CMktLQk10Qkpxci9hdkkx?=
 =?utf-8?B?MkowQkNkaFV3cTlUSndFN05SUmdnNkZnQWNXNnpsSXQ1d1BvWEFSQlYwa0px?=
 =?utf-8?B?cU1lSU1hNFdZMXB2SFdxZTFTU3pNNTB5dVRITmcvYm00ei8zdDNMeFY4eVM2?=
 =?utf-8?B?Um14UkJOZzRnRHlya2lURVJtZmUyUGdzMU53UmViRG1KV3Y0aHlGaTZMdENN?=
 =?utf-8?B?NFgyeFRZSzl3eExxdHdyT1ZzRWw0OHhPdEw3aHY0Rkx1TGJ5U1FFcGdPbVYr?=
 =?utf-8?B?cTFhWllxc1BYYjVKdlpCM2d4cTZWcDNUZ2JwRTZOQUNZTVNSMXAvVGh2U0pV?=
 =?utf-8?B?bUFRcFg5NEF6Ly80OXJONmhqU1BTWHUrVXJIZmM1YkprRlBqV3Fpd01GaXZj?=
 =?utf-8?B?c21sOTRjSllQQlUxZ3JRLy81ZDN2ZGRWWUluQmdKUzA4SEJKMzRpemFqZ0x4?=
 =?utf-8?B?RmJ4MlFNS21LY3c5Q1N3aWlGU005REYyd2VHNUVvMVJtVkZ5TWxLbytyOHVV?=
 =?utf-8?B?aU4wZWoyS1ZHbjVpUWo3Z0pOVnBtY0dBWjhXM1V2a2dwa28zdnRpSm1IN21B?=
 =?utf-8?B?OXRYaGVFblF5Yk50S2VLaGlZS3NUS0FpdWZnU2NQV2I3SkpMdG96bU1vU2VJ?=
 =?utf-8?B?MHBkQzVCdmxsaG1GZ1NJa2RHdGhLc0M3dGdEUzk5R1BiN3V3ZGR3MEtuRVZq?=
 =?utf-8?B?RUdkSG5RTitCQm1tTk8vaFUwU294dUFVczVmU2FueG5VRXUwVFV4ZXhRTG50?=
 =?utf-8?B?MWZsenFwN3d1VjAvWkRlUTFtWEtSNFhaK3FFTjh2K2lTTjE4NUxYRmw5TE5l?=
 =?utf-8?B?SFBWUGZVTTNjelFZK0dnZ29LckoxdWprdmJEWURuU3JtY28vSmdqRzcvd1Bt?=
 =?utf-8?B?N3hrY1hqSThlNGRFdnFZVTVPQUdwSzYvTWRIZDdUbzgwTU5qWlB3R1JiUC9t?=
 =?utf-8?B?L3B5R0JPM1lSSURvK1J2S1R0Z04yWXk2eUg3NUJFTWZvRDVaVitXV3EvRkRE?=
 =?utf-8?B?RzJCQ0NTRTVpYU12V2JWSjVjNFFRQU5FeUtveS9weTVYZzBTQWlDdU8rQ1RJ?=
 =?utf-8?B?bWUvQVBnN2diMG9HSjdCZzFEd3o5NE9yZC9EMnJoMW5BWkNGNEQ4YlpidkRT?=
 =?utf-8?B?K1B1aEY3YmpUUnBTM1N5TDBOcFl2OHVKWTlOT1p6eWxpd0pSTnFFUTlLbjQx?=
 =?utf-8?B?VXYvWWdJSlNpZDFvVCt6U3NPNUNWUHFLN0tzMWd3NWZXUGRhbGtCZjY3YnBo?=
 =?utf-8?B?SlQ3bnpXNzdtcjVIVkZLVHppOC9zSWRxZVREUmY5UFVkeFNHd1dpd2QzaFJK?=
 =?utf-8?B?VVo4WkFSLzM5bHV6WU9lS1dJMFdiVlNCTjZYRGVtSWRMaEhiVEpHKzhjSUpw?=
 =?utf-8?B?RkVwcGxpMUpXVFlqNWR5OHJTYUJmcWVFYUFyRVdVcGlzcnFEeTA3ck5Wakdo?=
 =?utf-8?B?N0N2RFBEWk84MGlkRE9EQXBiRG5jaFVPZGxUYU93SU5TeHVIeEc2UW5vZUhG?=
 =?utf-8?B?UC94dXZuWFl3NVlZZUpWYUk1NU14Tlk0Rk1MemUyb0YzaTA2TEFNVHFQRzkr?=
 =?utf-8?B?SUZrc1FyRjFHRjNpM0ZsUnYyUmlUOHlEeFQyS2lKVHJId0l3cGd1L2hiaDl1?=
 =?utf-8?B?Y2Z2TFc5RU5XYmpOYzNVUjlXZFljSU9DZUxzaWZ5MU5wa25BRlpSaDdkWDho?=
 =?utf-8?B?NE9mS3dib2ZQMzdKV25wNkFZcm4rY24xWlFrNGdwYyt4MkU1c092MHFaZGQ0?=
 =?utf-8?B?R2d2VzhzYXY2QWx2MG5RR0RDOW9sYmhZQUZVTHVUZFVPMXNNbHZXYWJSeUZy?=
 =?utf-8?B?Tk1PbjZIenNLMDZLUmg0eHdvSnNiR25jOVd0WWU2RURzOFNJMXZpVTYvQWtQ?=
 =?utf-8?B?OEtDWldXRUtSNjRzN3dPSlRpVVJTc3puZDlmUlo4dmNFTEtURkJMTXJQZTJi?=
 =?utf-8?B?M1d3VmlaZlVYVlFNZWZXZk1lejB1aUhIQk9iNDRSaGQzV2EvcWQ0SGVvanUr?=
 =?utf-8?B?RklDa0tWTXNmSjA0ZUNUMnJHaXJQQVFjMi8rRkZaVDlqU3E4K3FIZz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0446f779-4413-4d46-3a53-08da12f942b0
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 09:31:40.6047
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 5pJUU8K1n3ZWoN9DYd9ZTpFlnnkdLXvGJ3md7w+6azy/wFkwuU5JwdxE71jXbr7KxcK51QDiT+a3EDJW5SSRhg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB4785

Go a step further than bed9ae54df44 ("x86/time: switch platform timer
hooks to altcall") did and eliminate the "real" read_tsc() altogether:
It's not used except in pointer comparisons, and hence it looks overall
more safe to simply poison plt_tsc's read_counter hook.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
I wasn't really sure whether it would be better to use simply void * for
the type of the expression, resulting in an undesirable data -> function
pointer conversion, but making it impossible to mistakenly try and call
the (fake) function directly.
---
v2: Comment wording.

--- a/xen/arch/x86/time.c
+++ b/xen/arch/x86/time.c
@@ -607,10 +607,12 @@ static s64 __init cf_check init_tsc(stru
     return ret;
 }
 
-static uint64_t __init cf_check read_tsc(void)
-{
-    return rdtsc_ordered();
-}
+/*
+ * plt_tsc's read_counter hook is not (and should not be) invoked via the
+ * struct field. To avoid carrying an unused, indirectly reachable function,
+ * poison the field with an easily identifiable non-canonical pointer.
+ */
+#define read_tsc ((uint64_t(*)(void))0x75C75C75C75C75C0ul)
 
 static struct platform_timesource __initdata_cf_clobber plt_tsc =
 {



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 09:37:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 09:37:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296826.505384 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZrFX-00028N-9V; Thu, 31 Mar 2022 09:37:51 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296826.505384; Thu, 31 Mar 2022 09:37:51 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZrFX-00028G-65; Thu, 31 Mar 2022 09:37:51 +0000
Received: by outflank-mailman (input) for mailman id 296826;
 Thu, 31 Mar 2022 09:37:49 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=TTh1=UK=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZr8B-00057w-QY
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 09:30:16 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2b92bb21-b0d5-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 11:30:15 +0200 (CEST)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur02lp2054.outbound.protection.outlook.com [104.47.5.54]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-23-U0TuF9ktOt-h5zTVKqsFpQ-1; Thu, 31 Mar 2022 11:30:05 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM0PR04MB4817.eurprd04.prod.outlook.com (2603:10a6:208:c2::26)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.21; Thu, 31 Mar
 2022 09:30:04 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.021; Thu, 31 Mar 2022
 09:30:04 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2b92bb21-b0d5-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648719014;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=3QN0fYa0oMl7IDnTsZt7IRjYRX2ba78F7K2wvp/PpMw=;
	b=ZCt6B91Oa7DiTlHVE5OnFiW0b8QX5JytE/Dya4+OoDRRw3bQMTRdI4NZvfo8HymdgKePwp
	q++0ThB+ZX/19nUHxd71NLVacsq27sFSK51emuo3zdhcfI+oeuomyk/pk0pckv4nzHZJky
	+X28gEoBu1JgBuFViEMoKd42vsxS4d0=
X-MC-Unique: U0TuF9ktOt-h5zTVKqsFpQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=mE/dgmmFpD1MHBeaiac2Qb1sN1o2XByB6vGhfD69zJYIXi6k+0wla+sTKN1RETZgxxhF6YfkYQLBK2mYqsL5vvO8fcSyWgdKRrUNKLtZKD8lHkyU0L6/jUJbzzfpuiIDg2D1BtnMZ74BN/M+S4V9KnGtrRI0QU9o7CP8CiSt9fcfq12K2NNXPYhM9iRuYRhTIutbppwmGb57PEZgmJnsN3fr+di0TAQWEMH3kd3p6/SFFxsVgB+NZp9bfrINIB0+gy2XWLhQUPcZZ/rXiuXKUEmBTYySzYSDaBYdy1cMtCa717Gugebxq16e0t1eICk+CSpJyEHv/hrJzAcSIsWrsw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=wcbWh8araaOsLGTP+eR3aRWtZQ9q+jMuD82Drem89xU=;
 b=mk1sNRcZYfCYDBJ/0WAGcQD8JLkqXjtNHcXILSwHdu7m7F15jz1e/ldE7UEVr3vNEHZ+hS7tN54cTo80RdYNsY8/pw5E3QR+NzJBX0HHcF50WIyArF0vS6y/OoJzW3Q4HYK1aiUaCySiG1gvnlK15HiTD5VUdYGBP4oJ+TfYb5U8RjjXK/CE6HnTF7vchfCYJkdm+SBVyMD2Med2JBTrzB6u2+XrXy6JA/D4/uHrXBxcuNlVLdM7jKrntweXUQVmEUVNS0TANVB2lWcj5bdFReOMoG2MROaYoodZND55/iFzqDPXdw3MgsKjDYt65gmgGHACKAS8aCU324b9vBSmKg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <a6401a97-4528-595a-4baa-d41ea42a198c@suse.com>
Date: Thu, 31 Mar 2022 11:30:02 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: [PATCH v4 2/4] x86/APIC: make connections between seemingly arbitrary
 numbers
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
CC: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
References: <6e540bc9-c536-84ac-fb1c-8271e7731b3e@suse.com>
In-Reply-To: <6e540bc9-c536-84ac-fb1c-8271e7731b3e@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
X-ClientProxiedBy: AS8PR07CA0022.eurprd07.prod.outlook.com
 (2603:10a6:20b:451::17) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 913e51fd-876e-41dc-fcf9-08da12f9099c
X-MS-TrafficTypeDiagnostic: AM0PR04MB4817:EE_
X-Microsoft-Antispam-PRVS:
	<AM0PR04MB48176915D0C42113336EE0E6B3E19@AM0PR04MB4817.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6486002)(38100700002)(31686004)(5660300002)(508600001)(186003)(83380400001)(8936002)(26005)(2906002)(316002)(8676002)(4326008)(66476007)(31696002)(54906003)(6916009)(66946007)(86362001)(66556008)(2616005)(6506007)(6512007)(36756003)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?us-ascii?Q?11HFNgP9te8TFcyFrr6mtsEjqwkLTfK7IKU1v0OUGdhPicbl60VRWuYNFH04?=
 =?us-ascii?Q?j8I/umHdU73pMY7VSub+bn2iriyQeern8fbHIJfLQ6xge58xGadetvRXOKJZ?=
 =?us-ascii?Q?5+QRUMjoX1NXZ9Ui0TeqlnQf75gDRmydV9Di7T53h66DHggQcOgs4Gz+G9+l?=
 =?us-ascii?Q?TLKDF3nIou97/fKLE1LiyeCKuEhTgA4bqI5FdiMaOsFXP+MGT+ELodhBdtcD?=
 =?us-ascii?Q?ELvb+DZHpGM1JtL0AhRxv8oOvGy27scoZ/pu1qzDvjRZcLhea3LSfdNY1Fz4?=
 =?us-ascii?Q?JuXjja8YVerWAj7DQUoSINzBo2kEOaOAH4NmR5QDjEqCmgX29VrYd29e1Kx+?=
 =?us-ascii?Q?TFtYg8qSGZ2RNq6JZl0bKEInZpYTd06akvt08x55W8pm+z1WstcQ7K2WG+9F?=
 =?us-ascii?Q?4r2jhCG/LUcbmae6jdfdwmESHgYPo5TOYRh6Ly4/fTvGeQDB9vWK8DXaZR0F?=
 =?us-ascii?Q?upii1thJCbJrJJk4RjvYOtWrPyiYE2+jWXDyMYScRWtRekmaf3ExlpRDYJVq?=
 =?us-ascii?Q?LgKx1AYgBkn9NEfJMCfkSoBiOen0ieIcG+ocpcldq7RkgUkrlMWq4H9nTgLv?=
 =?us-ascii?Q?/5gTBRI2Ym0AjlJwTrbL3b0tRjMqzOgja1e/nx1J/HOatXJcyl0Uhso2/Tve?=
 =?us-ascii?Q?gnBIe4fCG0H7LTeI53xaS6ixIjyfSQqkBjrca8oTVUlmCcpX03WebOzUN9AB?=
 =?us-ascii?Q?gSXRHS9UFR3Ga7d9oBNAtbHzdWnNZ3oKhANZvhubRGwREHiJpU4bTe1/ycP3?=
 =?us-ascii?Q?W9Vd2Nak5zoFI2I0/u5diIbsuzoV30T2gxw71ip1bkY2aRzOPnENTW/Yr81W?=
 =?us-ascii?Q?Pejo1A/omqL2vwYx2tWTdwr65mAUwC+GNp0acRwMXYa2z2x5nZdcIHps8BXu?=
 =?us-ascii?Q?906aDM8l4qc6BKfW8Ho7pUqZV3BUueTU/C5iMcv1knWn7Hj83nwPBM1sOKAM?=
 =?us-ascii?Q?Kz7Ece1Zkw6jZWFtaP0P/1FpwusdHzc0aZ7w2kRqY3LhCoAMeZEVT6P9UFKv?=
 =?us-ascii?Q?UEHwmyr9jPM6UFQ28AKia+oNMwSK/ZabiDHwiBjAyuB+r6wcou1ZNwb0Twud?=
 =?us-ascii?Q?pbkv3+pAFLDq+QD/Pf4Sg6BrxZUgdrwgqCveIsa342yzrhT7nEnBrvcNZT7N?=
 =?us-ascii?Q?puaHwzPjyxW2gb/1wYnyIap2xNuvASgOWurIR/ovta8tJgzXdEmSTEbd/mpM?=
 =?us-ascii?Q?1JjNCH8o/abaAsc/IKkCXqaNKoToQUmduuScChSJQGYgau6K0v5Uf0/cuV3p?=
 =?us-ascii?Q?DBZ8moBxYwQeM7d+QO7x49oynTPzWnGdSIb44aWhhefzMH4ge4NCNU7uLMlE?=
 =?us-ascii?Q?kXISa6pPJw9TiDa9+3ObqUW3mqi60oWWxSLOBfMxrgvJW646QKYMZRooB7U4?=
 =?us-ascii?Q?nlosd2lbLU0oX23nUE1920hVBduWWFBNN63+8hQ1XMUO2da3yDwf4XxJXV8a?=
 =?us-ascii?Q?gsKPCyNB3tYvmqxFVQurgJtTmcwCFsyJzv0CllqVryaFwT4UE9l8LWdBoLDY?=
 =?us-ascii?Q?WTL3Xm9nqsQRtvtKhL1gRRStNUkAVlBz4I/onszmpmc0SrmRL8YFeouPuWzo?=
 =?us-ascii?Q?ppc1rCS8nkK4Fj6dEazvT2OuIdBpQr1vhk6tB1YnyjFX6bxDyAgc8g1ZP4o6?=
 =?us-ascii?Q?zmfdE7lvTZaAGzKYsyad688PiMR4Ca9Mg/7uxPHucMSOh2y/WAfT3OVYkT9m?=
 =?us-ascii?Q?g1x9XO9SbFuXUFEWX2Brd4Va4c8inl1AsUMTjFHxU+w08uvz7u/6sH8FzW1n?=
 =?us-ascii?Q?ur0YfvN9Sw=3D=3D?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 913e51fd-876e-41dc-fcf9-08da12f9099c
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 09:30:04.4723
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: xjZ1aTJ7T1kf4pyTcCMMTUIc814PdL2n+rEIRPpVgZFjb9oMpSj4uV46orw/KIIXacs73BigcNPOPgBdeByPXg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR04MB4817

Making adjustments to arbitrarily chosen values shouldn't require
auditing the code for possible derived numbers - such a change should
be doable in a single place, having an effect on all code depending on
that choice.

For one make the TDCR write actually use APIC_DIVISOR. With the
necessary mask constant introduced, also use that in vLAPIC code. While
introducing the constant, drop APIC_TDR_DIV_TMBASE: The bit has been
undefined in halfway recent SDM and PM versions.

And then introduce a constant tying together the scale used when
converting nanoseconds to bus clocks.

No functional change intended.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Roger Pau Monn=C3=A9 <roger.pau@citrix.com>
---
v3: Introduce and use PASTE() instead of (ab)using _AC().
v2: New.

--- a/xen/arch/x86/apic.c
+++ b/xen/arch/x86/apic.c
@@ -1078,8 +1078,8 @@ static void __setup_APIC_LVTT(unsigned i
     lvtt_value =3D APIC_TIMER_MODE_ONESHOT | LOCAL_TIMER_VECTOR;
     apic_write(APIC_LVTT, lvtt_value);
=20
-    tmp_value =3D apic_read(APIC_TDCR);
-    apic_write(APIC_TDCR, tmp_value | APIC_TDR_DIV_1);
+    tmp_value =3D apic_read(APIC_TDCR) & ~APIC_TDR_DIV_MASK;
+    apic_write(APIC_TDCR, tmp_value | PASTE(APIC_TDR_DIV_, APIC_DIVISOR));
=20
     apic_write(APIC_TMICT, clocks / APIC_DIVISOR);
 }
@@ -1212,6 +1212,8 @@ uint32_t __init apic_tmcct_read(void)
  * APIC irq that way.
  */
=20
+#define BUS_SCALE_SHIFT 18
+
 static void __init calibrate_APIC_clock(void)
 {
     unsigned long bus_freq; /* KAF: pointer-size avoids compile warns. */
@@ -1265,8 +1267,8 @@ static void __init calibrate_APIC_clock(
     /* set up multipliers for accurate timer code */
     bus_cycle  =3D 1000000000000UL / bus_freq; /* in pico seconds */
     bus_cycle +=3D (1000000000000UL % bus_freq) * 2 > bus_freq;
-    bus_scale  =3D (1000*262144)/bus_cycle;
-    bus_scale +=3D ((1000 * 262144) % bus_cycle) * 2 > bus_cycle;
+    bus_scale  =3D (1000 << BUS_SCALE_SHIFT) / bus_cycle;
+    bus_scale +=3D ((1000 << BUS_SCALE_SHIFT) % bus_cycle) * 2 > bus_cycle=
;
=20
     apic_printk(APIC_VERBOSE, "..... bus_scale =3D %#x\n", bus_scale);
     /* reset APIC to zero timeout value */
@@ -1353,7 +1355,8 @@ int reprogram_timer(s_time_t timeout)
     }
=20
     if ( timeout && ((expire =3D timeout - NOW()) > 0) )
-        apic_tmict =3D min_t(u64, (bus_scale * expire) >> 18, UINT_MAX);
+        apic_tmict =3D min_t(uint64_t, (bus_scale * expire) >> BUS_SCALE_S=
HIFT,
+                           UINT32_MAX);
=20
     apic_write(APIC_TMICT, (unsigned long)apic_tmict);
=20
--- a/xen/arch/x86/hvm/vlapic.c
+++ b/xen/arch/x86/hvm/vlapic.c
@@ -580,7 +580,7 @@ static uint32_t vlapic_get_tmcct(const s
 static void vlapic_set_tdcr(struct vlapic *vlapic, unsigned int val)
 {
     /* Only bits 0, 1 and 3 are settable; others are MBZ. */
-    val &=3D 0xb;
+    val &=3D APIC_TDR_DIV_MASK;
     vlapic_set_reg(vlapic, APIC_TDCR, val);
=20
     /* Update the demangled hw.timer_divisor. */
@@ -888,7 +888,7 @@ void vlapic_reg_write(struct vcpu *v, un
     {
         uint32_t current_divisor =3D vlapic->hw.timer_divisor;
=20
-        vlapic_set_tdcr(vlapic, val & 0xb);
+        vlapic_set_tdcr(vlapic, val);
=20
         vlapic_update_timer(vlapic, vlapic_get_reg(vlapic, APIC_LVTT), fal=
se,
                             current_divisor);
@@ -1020,7 +1020,7 @@ int guest_wrmsr_x2apic(struct vcpu *v, u
         break;
=20
     case APIC_TDCR:
-        if ( msr_content & ~APIC_TDR_DIV_1 )
+        if ( msr_content & ~APIC_TDR_DIV_MASK )
             return X86EMUL_EXCEPTION;
         break;
=20
--- a/xen/arch/x86/include/asm/apicdef.h
+++ b/xen/arch/x86/include/asm/apicdef.h
@@ -106,7 +106,7 @@
 #define		APIC_TMICT	0x380
 #define		APIC_TMCCT	0x390
 #define		APIC_TDCR	0x3E0
-#define			APIC_TDR_DIV_TMBASE	(1<<2)
+#define			APIC_TDR_DIV_MASK	0xB
 #define			APIC_TDR_DIV_1		0xB
 #define			APIC_TDR_DIV_2		0x0
 #define			APIC_TDR_DIV_4		0x1
--- a/xen/include/xen/lib.h
+++ b/xen/include/xen/lib.h
@@ -13,6 +13,10 @@
 #define count_args(args...) \
     count_args_(., ## args, 8, 7, 6, 5, 4, 3, 2, 1, 0)
=20
+/* Indirect macros required for expanded argument pasting. */
+#define PASTE_(a, b) a ## b
+#define PASTE(a, b) PASTE_(a, b)
+
 #ifndef __ASSEMBLY__
=20
 #include <xen/inttypes.h>



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 09:42:41 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 09:42:41 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296833.505395 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZrKB-0003Wb-TV; Thu, 31 Mar 2022 09:42:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296833.505395; Thu, 31 Mar 2022 09:42:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZrKB-0003WU-Pj; Thu, 31 Mar 2022 09:42:39 +0000
Received: by outflank-mailman (input) for mailman id 296833;
 Thu, 31 Mar 2022 09:42:39 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=TTh1=UK=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZrKB-0003WO-Ci
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 09:42:39 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id e6a353c5-b0d6-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 11:42:38 +0200 (CEST)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2110.outbound.protection.outlook.com [104.47.17.110]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-12-zsqP0yAXNNS0xCdoxS-UfA-1; Thu, 31 Mar 2022 11:42:35 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM6PR0402MB3415.eurprd04.prod.outlook.com (2603:10a6:209:d::22)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.16; Thu, 31 Mar
 2022 09:42:34 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.021; Thu, 31 Mar 2022
 09:42:34 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e6a353c5-b0d6-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648719758;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding;
	bh=5Pc2vGAcBdNdvOMgm5cOr8HDjrJP6wj0L/4UaA6G/Ao=;
	b=RRsoEnOa3CqMhZ2KRXLoENOe66dCpwojIu5jWqlO0gjQ3fdmIn/FDF3jBMPUnoTxCjI1Z0
	95Q+QingvYHHTZBIUKVBd9kq9wQWiew4Elq9C5CQj1YzJewjBLdsiOELKjm9zp/NH5wU2u
	Z3SehiUMzD0EFRYuqkkcO93Y1PyjDJo=
X-MC-Unique: zsqP0yAXNNS0xCdoxS-UfA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=J6ACTviJfosqzr3fKCyf85Z9zk+L+g+qVw72VbB2NLCqtOCKdESkljJBy0xs7CR7sl32XnvPgm2D55wsSOGqiKue3bR8q3bxYG1ZwNvtohAc5CohUapiblyEaztHiGORjPQvo3Vj0+oRv21MDlSMLvxENoag4QnocppFYALesjf8m4Rhl5hr6Gs3x/gGGFeHZsGgDnHgHQyntwNlo/tFkoMgMjCgGa2UKErdJK0nm5hVWECV8TUU+dzOIYC7qWoC07LfNIblGWbsyMJKI/bM2qodZh8iJlY9M+cO3yoAWmInQsbQrmlzLXpz9263nlfEz7PnECZBYybzMXsC6V3ygQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=5Pc2vGAcBdNdvOMgm5cOr8HDjrJP6wj0L/4UaA6G/Ao=;
 b=G1v/DI3636MCFmgNYJBlnGy+YTeXC0zgzhYR31bC4P5J5NMGWIDUTDiXBysFGIF+7iAPELbEYSpXueawHOOuyAfuL9G5f4lqkHtf0SlRwr9QI4Kx2KiTZ9b+Rr8rZiD4+Tn5VftmDx65S3/fXjDeUcfBlMwTWrkcoU/6vCx8kvsUGzL6Sat1iMctg9IrZ0Ey/CObMcs6h10fJ6psLHvpDfcg1LVqxs6+pC85YcqABzO9nLW56KEgW+KReU67CVbRL9vEQCXw0ZO40kgWp2ItS0A4WbN1YeJFw/sCO3lfAxLCnF/bLZtQhPz+IzYlqtI1bsqmpogEizoLNFlB0fXSHQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <819eb552-d49d-e98a-9524-8d30c1b93908@suse.com>
Date: Thu, 31 Mar 2022 11:42:31 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
From: Jan Beulich <jbeulich@suse.com>
Subject: [PATCH v4 0/8] x86/boot: (mostly) video mode handling adjustments
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
Content-Language: en-US
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR06CA0006.eurprd06.prod.outlook.com
 (2603:10a6:20b:462::25) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f098096e-9b54-43b2-93da-08da12fac83f
X-MS-TrafficTypeDiagnostic: AM6PR0402MB3415:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR0402MB34159545975CB0DBA500759DB3E19@AM6PR0402MB3415.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(8936002)(8676002)(54906003)(4744005)(6916009)(316002)(66476007)(66946007)(66556008)(5660300002)(6512007)(6486002)(6666004)(31686004)(36756003)(4326008)(508600001)(6506007)(2906002)(26005)(31696002)(186003)(38100700002)(86362001)(2616005)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?S0JWTVpEOU02eERNRDNCZTVXUmNBUUVSYlFsUHJSN0pHQ0hHVVR3N0tlM0Fy?=
 =?utf-8?B?OWI2TWVmYkhrdXJIc1RLMU0rd0ZYbGNiZWpGTVhxMmszY3FwaDdHUHlnSGNW?=
 =?utf-8?B?Tkx1cytQTUdWSG9SQjYyNHZpLzN6QzNvcGt0SkIwY2FIMW1sSzZzd2hiT2JX?=
 =?utf-8?B?czdmT3hqb1VTQ001dUMzL25yL042bVNzMkxCQXNrUVZ1RkRwK1dtMjNXTHNw?=
 =?utf-8?B?YUhmUVVtK2k0VGxxcDJ0U2xpR2hDMEtGdFpDRUdacVUxWW0zRzV6WFozUExH?=
 =?utf-8?B?cnBvSFJMRnFTT2RydGdyazVGSHcxNWhGbmkzRHp3a2R1eUFOMDA5dEtGVkl1?=
 =?utf-8?B?aVdraFI0MjVyRU5WcGlWOFhOU2RibXRJemNoWnlOcjE4UXh1THdSTzFtczlV?=
 =?utf-8?B?K1pCRElCTm5VdlF4Y3J1WHhBYmovZmVtRXV2cDZEQ0tUbGZmdFRWeE5NV0hq?=
 =?utf-8?B?eWNwTTNFOXZEQkl5T0locGhML1ZGOWtua2t2OXYveUFka3c5MTE2ZlM5SzdH?=
 =?utf-8?B?KytJU1pVQ2pMajNtOGd3Tk5JWHVCMHhjNWJSNyttNmlzUGRtNDBJRGhzWG5j?=
 =?utf-8?B?dTgvaTZZdkt4Y3ZrSjRmNERXRm84WjRzUWZXUFIwL2k3ZFVCNnNIcEZjL1JZ?=
 =?utf-8?B?djJndWFnRzhNZURzNVhkNENpbS9UaUFseEo0WnMzeHduT3ZETW11enRpczN2?=
 =?utf-8?B?SithbUJST1lsZHc0b3c1SzlaQU1JQ3BZZ1A2dnBsc0crYlB3RHRaSTVkbXgx?=
 =?utf-8?B?Ti9scU5SdXZVaUhoUFRTby9QdEFXUHpwVVJRMkVEU1dQMUhyekg4S0psQlp0?=
 =?utf-8?B?SkdpdkdIRFZ1MmRuVTdOK1A1N1RoZGp0Yml6TkNPZXRUdURuMDEwQkhKYUFR?=
 =?utf-8?B?QURwRlpHYTd6MlUvLzRZNXA5NjFZWEFibGs4K3JGZTNxZkcwQVEyWnhGOElm?=
 =?utf-8?B?cnp0c2FpYjZlVkxhU0djSmExQTJjNWZJdFZwL3FuUGpPOTRGQlp2SmlnTDZ3?=
 =?utf-8?B?aVB2dkRFcjUxWjczV0pzeWdvZkxQVU5Gekd2SjNxa0E5SGhtdWVXeUVleUNh?=
 =?utf-8?B?RTBiZ0xrV2paZDhNNnNicUcxWXNyN2Z5VHRBNE1ub3ZqRkQ4TWRNQ1BkaFR2?=
 =?utf-8?B?Sm1CYnZtTGczR2tzSUZJSlplcnBLSEx3UExJOWJuR3hZRTBnamRxRXhRVGdr?=
 =?utf-8?B?NlJUZjd6RWtyY1psQXVxT0ZmdC9tdFJkaDkzanQ5VkFLMHg0bkFFOSsyMlk2?=
 =?utf-8?B?b1hMbmxWcnpvZzZleVA5c3JmV01pdTQ4aEdrcm1QVHlBUCs1WjJpT1lwV2V3?=
 =?utf-8?B?WjhjTmc0VlBjcnd1VjFpdDZibUZybUdrSFhpcFN6aVpra25sei9QNnRjTC91?=
 =?utf-8?B?RXJEOGpKdzBveEdJbXNrcmZSZjhXUW1McVV3Tm96T21wQWduM0N0dk5xbldX?=
 =?utf-8?B?K1Qwa3IwRHZvbEhQdVdxWVQwczIrQisvaVpydnpqRUtEYytFZEV6bFpQc2VF?=
 =?utf-8?B?YnJJQXhQYUdWOU9DeFF0N3dvY2E1eHdxSDFvQk1vN2t4b2NqUGlLN2NjZk8v?=
 =?utf-8?B?NkhkY1ZHYmRkTDlVUVRzZi81aDNrSFh1NC9OTWh2YUQ1Z1FrVE1aWHVyNzJM?=
 =?utf-8?B?OUFtbHFDRHRDOXBQODZORGdaWGVlNFpvcmFaK1lNUkdPZExmZkNHUEV3eGZZ?=
 =?utf-8?B?b3FzQkZtQkdVUGhIaUx1L3Y2bjNlbWNVU1JldFRONjVKM3g0bjhyUGwrdHhP?=
 =?utf-8?B?Y2UydHM3cVd4c2ZTTHd3RFJyK1Y5UHRyY3I0Y3VlVUhMYXEzckJXSTUvcmlJ?=
 =?utf-8?B?QnlZd0ZJNEFEaVhmc3I1K2FmQkRxUEZVU1dwT0pBNCt5b1RwanpDM3B0M3Ax?=
 =?utf-8?B?SkJDNHpsWlBPVzhXaGRrUGdidkUxVEtmQUhrblF6d1FBTVQxbXJsaXNTdVhj?=
 =?utf-8?B?ZmF3R05GYXZrSE1GaVFBNzJHSEFIVjhqT0twb2dRS0dsakMrZVAzR0JhZnlz?=
 =?utf-8?B?VjEzU1pmMGx6NjNmYi9xZXVoaFFuekRiWnJ6SkdvbTNVU0hJVG9VaWVpVGR2?=
 =?utf-8?B?Q2tiNGxOd1ducnRjV0RkR0VGako2azhQeXpDSXBUeENQY1hCeVdDL24zVSti?=
 =?utf-8?B?M2xIV2J1RG56L1REZS9MSHlRczVjcEZrVzhFS2xGenJ2YzQ1bTdXdDBqLzJ6?=
 =?utf-8?B?MW9iUXZTUmQ2eENnODBHekpMdEE4blhpcXB0dS9ZMmU3QnVZTE5JSy9lRlMw?=
 =?utf-8?B?UTZVUFJmTExlbXhxSGRxVWZ0VVI4YlFlOGlSSmN5ZWd2TWJ1cElWeDhBRFVD?=
 =?utf-8?B?UmFyRVZ1MHh4UFNpSWdGbHVIMzd5RXNBeVpjcFIzUDNWbW5nMGJjZz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f098096e-9b54-43b2-93da-08da12fac83f
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 09:42:33.8954
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: /ZMr3Y9DXc9gf+0Yrm+yuWXalIywFIZmGL3AimR8TWQJtqq6lj7S+G3E2QSGYCvihh1vZFs4nptQvwIMwVOHmQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR0402MB3415

v4 largely has some re-basing changes compared to v3, plus one new patch.
I have to admit that I find it particularly sad that the enhancement done
by patch 1 has not made 4.16. This series had been submitted well in time.

1: make "vga=current" work with graphics modes
2: obtain video info from boot loader
3: EFI: retrieve EDID
4: simplify mode_table
5: fold branches in video handling code
6: fold/replace moves in video handling code
7: LEA -> MOV in video handling code
8: fold two MOVs into an ADD

Jan



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 09:44:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 09:44:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296836.505406 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZrLm-000464-93; Thu, 31 Mar 2022 09:44:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296836.505406; Thu, 31 Mar 2022 09:44:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZrLm-00045x-4h; Thu, 31 Mar 2022 09:44:18 +0000
Received: by outflank-mailman (input) for mailman id 296836;
 Thu, 31 Mar 2022 09:44:17 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=TTh1=UK=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZrLk-00045p-Uw
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 09:44:16 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 20c3e33f-b0d7-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 11:44:15 +0200 (CEST)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur04lp2054.outbound.protection.outlook.com [104.47.13.54]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-29-_Zx8KvpfOFC4ipwVfs8MMg-1; Thu, 31 Mar 2022 11:44:14 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM6PR04MB4648.eurprd04.prod.outlook.com (2603:10a6:20b:1b::19)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.23; Thu, 31 Mar
 2022 09:44:12 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.021; Thu, 31 Mar 2022
 09:44:12 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 20c3e33f-b0d7-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648719855;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=voY3bdBFf59fNk/Uj9SHwXXjsrtdUHrNi408J4DKvGE=;
	b=PonIiyPJ8xi0RxPUAUFSHwbsdj9RaDI4hIYYidOa3l3PShAbfp7hf1HCAGTU7LsH+ONUQA
	WXL5Eh69gGSV32ap9qnBILC5ggQrtUcvSMaOFobtOvQndpHE34Trc4CAiJAM1aheZNSc2F
	/GAYLbfzxo4sVDtEk5Z/oGQ7MwF6KMg=
X-MC-Unique: _Zx8KvpfOFC4ipwVfs8MMg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=aGBB3IaIQaaAJTyc6pgLpim2uzkIORrZFszSuuPPQOKyCJKlyCr+rs+Kwvvaof6AYOMX0kR5xHk9ju685fxDoHVhPHAYVcr6sh46gJgpuRxc4UWHvFQjwekkXkTe9YbXPUb05f4le1m4RZToADDfvsgEJ3EXnFY+NnhWba2Tabj8JHXQKj0hv6kOb/212vFL9MzvGfI7RT6iLWG4tdC7ED5/t3kF/ugAe/aGIVf6y1E0iOKt4QmBHfmtqhpmeYSKBB8ngGA5pAY4wyu97BRVGczuvPwtdGjSuTBRLDzZLDQpmY+BtuzeCG+UsaimgxZEDVvFRfcL6rjPjM/Wt/1+WA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=voY3bdBFf59fNk/Uj9SHwXXjsrtdUHrNi408J4DKvGE=;
 b=XU0lJtzet8bNjEAwuuPC5HXgmkL7haDRzUJx3tnq9s1GYh2huYAbUTFSpIQzrZn+NyXqhqboTMncFJJpu1Sb+F2d6VrJkeHoekCbk1fVUtgNVr/2kxOc4OSgvdHhEueiRi4GxRI9pfJCOMp7tidf9ThvAYAyTFZ0myRIIfZZ1F8h9RoXztTEJQzGQfUE8Fg6w8xYWBVsJfTO8afIEOr8GU7uaE51fa97qBTeb//GURwYr4DtfPnw5nvcQiCudfkP0kJYZ7wFkph2BWsWncFY1cg2NdqJH09CxzoHR60Cbxc+3eUC3CXbEbaAugNc4TMLXYL5v5NvtBP1LNzNIkXV+A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <3fb7f3e9-a6cf-4f8e-1141-100848b1bdd0@suse.com>
Date: Thu, 31 Mar 2022 11:44:10 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: [PATCH v4 1/8] x86/boot: make "vga=current" work with graphics modes
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 "community.manager@xenproject.org" <community.manager@xenproject.org>,
 Henry Wang <Henry.Wang@arm.com>
References: <819eb552-d49d-e98a-9524-8d30c1b93908@suse.com>
In-Reply-To: <819eb552-d49d-e98a-9524-8d30c1b93908@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR0301CA0059.eurprd03.prod.outlook.com
 (2603:10a6:20b:469::21) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ece3c8bd-43bc-4a8d-222f-08da12fb02c6
X-MS-TrafficTypeDiagnostic: AM6PR04MB4648:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB46483CF4687AD3D89DA31396B3E19@AM6PR04MB4648.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6916009)(316002)(2616005)(86362001)(31696002)(4326008)(26005)(5660300002)(54906003)(38100700002)(8676002)(8936002)(186003)(2906002)(36756003)(83380400001)(6512007)(66946007)(66556008)(66476007)(508600001)(6506007)(31686004)(6486002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?dml1bnJJYVN1T0RkT1lKejFlanRUSWY2K3RQTG8zeThOWSs3cEZrVytJdWUz?=
 =?utf-8?B?WlY5dW5ybUFSL2dVMU9qQ0JUckFaVWprTUMzaUJjN3ZzRGJiUmMrRnQ5WjUz?=
 =?utf-8?B?VkhWNDlhUk1GWW4yWTdmU09kdVdCckNCV1I2cHR6ZjBMdWp3aFhwcDJxZ0dn?=
 =?utf-8?B?bFEwU1FWbXlIbGNybDF5MVVyMkM5L2NrS2cvYUVWbG9FR0c2U1VwV1Y1TXNa?=
 =?utf-8?B?OXdCWTdoMm5ub05qYUtmN2xrcUJEUFdJajJWVWRBWElleS9ENzlCM1JpTDhB?=
 =?utf-8?B?RkRsN1NqUk1DYWhGenJweGZsTSthNE1mRUFFQlIvOW5uY2dxb2FzUndRUmNB?=
 =?utf-8?B?dWg3QWpKcXhWQ0dKQjNrZitPOXhsa0R5dkdVU2tpT1Ixa1RLYnBZYUVCcEpa?=
 =?utf-8?B?NFZzMzZxODV0M0JSMWgrS1gvZlNNOEtzNDRIeCtqNkRaZGY0Z0hkcExYSGpm?=
 =?utf-8?B?bTNacWt6cC9Gd3B5ZmNYSXpHMUY5aCtPcDdibWRPNDZhcTNwc2s5SWlBMDVl?=
 =?utf-8?B?TnpLb1R6UkptSThGR0xtbFlMQ0t6aVZvVENIdmlVdHcwckFyRlRBWGl6eGpQ?=
 =?utf-8?B?bGFqdjkwWnoyTHFOdUQ2eVdoMlZ3K0FxanNKd0tlZ1dNTXEwTVBNcUppKzN6?=
 =?utf-8?B?SEhITmFNbkZCVVh3Rm5IRzljV01XdUNLUngzOEZydURsNFJ1enJ6c29ESGRN?=
 =?utf-8?B?VzRqOXVMVm9ZZVhrdjZzQmdCY1g5cnM4eGVKTzUxanB2a2gycWNEVWFpSmYz?=
 =?utf-8?B?aFdKcFNUT0pIYnZ3dDNZYlg0a0c4blBBY2p3ZXk4Y3FLQkpyOXJ2QmoxVnd5?=
 =?utf-8?B?WExoMWg5aWFxRytYZlVxZUJWaTJmdzdRNnVqbGc0TzFka2g1SzZTaFcyTVRy?=
 =?utf-8?B?by9qWTl4aFpxME5PUmVOUFJPU0tPQjV5Uno1T2VOSGpHTHI3VGJsWVB3eFZO?=
 =?utf-8?B?V28wR1cvVUw0S2x6ZVhXelBVOWUveDdSeXVXRVVTUE1aMXRlOUl0aGxoUHVp?=
 =?utf-8?B?MWNGUFhqdHVveEhZdjQ4N2oxcnRtc09KTUtPemdVeEp5aEtrZlRETEdMQ3d1?=
 =?utf-8?B?MjFnYzJqaTFwOEs3aHhPem5KR2haeHl3MGVxK0RmYVJZc2dKMkE1Wnc2TmR6?=
 =?utf-8?B?YU9EV0g5UW55dytqaU1WSzRQQzZxdTM3eVYzWmlDUnhHSlA4eHJ5R3Bac0p3?=
 =?utf-8?B?akl4VWJsMHlZMGFEVnVrSTJ1WXh0WG1UTUdFby9tbnhid0R1MExYTHYybzNL?=
 =?utf-8?B?K0srYmU0TzdQRlZhWWhEV1llYWFtam1LM2lidS9SbWZ5N29INElYOXdQYith?=
 =?utf-8?B?SjU1KzNSK0VvOURSaDV6UmVjWCtxcXBXakRZNTlYMStydTVjeHkyNzhnM0tL?=
 =?utf-8?B?T0drWDVnVUlNMlhNcmFaMTlEMVZRNWFnbGJ5VzdxQW1xR0FvQjZtU0RJVVFl?=
 =?utf-8?B?cWlzdkREZU9ENGh1VXg4c0VyV21HR3kvMWNGdUIrWkZ0OGgvblJpU1FoSlFZ?=
 =?utf-8?B?aEZGVVR5bDBFYU5rK3ZUb3h0dDlVUC9jMWVNWGhKTktiK0szcmVqZmhUTnZI?=
 =?utf-8?B?T1FDUlIweGRidkkvRklXS0NtVTk5TExDZEdEYTdiSmVhOVBrYVRWTFdzZ3Fa?=
 =?utf-8?B?YVdNTEpDRFVQRUg0dllJRUd0L0VrUlI0NE9yUkI2U1JKeGxHVTFxQ1YzM0VV?=
 =?utf-8?B?K09ESTZFYjdON0FDaEtPaTgvTlluWFlEMDdFOXFlbm1yMnVMZFdjcDE2bDdV?=
 =?utf-8?B?RGhnakRMdHdFWFFXY0RQZkM2SFgzcW85MWw1dDM0YWIxb0VJVVJxL0Zmbklk?=
 =?utf-8?B?ZmVvb2lpUkloa0RldXppd2tROUtyV0VRSzlzMnN2TGZoTmFvbDlxYjkwYUJu?=
 =?utf-8?B?ckFaNk5NZUV0VmFYbGpHbjR4Q3dtMXFvM3pFWVFIZHUrVmVxSzVqRER5bklC?=
 =?utf-8?B?THlhM1pkZmNPaWY3U1ZGdXlIcm9DaGlDMTdwckRkU3h3YWRoVFptbVpPZDNO?=
 =?utf-8?B?eGtXbUM0bHYzUUh4cnRUSlh5eXBaV0JiQTcrVFF1Ui91VWdoSkk5UGR5TmtM?=
 =?utf-8?B?Y3ptSWRleDVKQlR3WGRxc0Z4QTI5TlM0NHZ3Z2tzVXQvSGFJS09lQTFlR0l2?=
 =?utf-8?B?L3ZRZ0hnaFBMbG5ma0xzZkVZbmtKQXVYcTBSWEprclRNejNrT2FTOFJFVG9S?=
 =?utf-8?B?Rm5YakMvVFRTc0FPbHVRdGNyVVJ4QTZLeFhkSDdBV01kN0ptTzg2YWJ3NWtv?=
 =?utf-8?B?c1ZaRjNlNlZWWTkzYVRWbXRRc2FBYmNZa3pGT3cwWlVYTDdOLy9QZTVtWjQ4?=
 =?utf-8?B?OWxmOGZjWmRxcGM5TEJwQ3EwdkZEVSthY1JXVysxV1h1blphWEQ5Zz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ece3c8bd-43bc-4a8d-222f-08da12fb02c6
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 09:44:12.0539
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: EJqxkes8nz84/DSHiQjx0dY81P4ef8p15sbRNV4asNPyzpTS2UZeYxyv1f8HDLhJMdgUKdMPE9Tdw55OvOxBZw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB4648

GrUB2 can be told to leave the screen in the graphics mode it has been
using (or any other one), via "set gfxpayload=keep" (or suitable
variants thereof). In this case we can avoid doing another mode switch
ourselves. This in particular avoids possibly setting the screen to a
less desirable mode: On one of my test systems the set of modes
reported available by the VESA BIOS depends on whether the interposed
KVM switch has that machine set as the active one. If it's not active,
only modes up to 1024x768 get reported, while when active 1280x1024
modes are also included. For things to always work with an explicitly
specified mode (via the "vga=" option), that mode therefore needs be a
1024x768 one.

For some reason this only works for me with "multiboot2" (and
"module2"); "multiboot" (and "module") still forces the screen into text
mode, despite my reading of the sources suggesting otherwise.

For starters I'm limiting this to graphics modes; I do think this ought
to also work for text modes, but
- I can't tell whether GrUB2 can set any text mode other than 80x25
  (I've only found plain "text" to be valid as a "gfxpayload" setting),
- I'm uncertain whether supporting that is worth it, since I'm uncertain
  how many people would be running their systems/screens in text mode,
- I'd like to limit the amount of code added to the realmode trampoline.

For starters I'm also limiting mode information retrieval to raw BIOS
accesses. This will allow things to work (in principle) also with other
boot environments where a graphics mode can be left in place. The
downside is that this then still is dependent upon switching back to
real mode, so retrieving the needed information from multiboot info is
likely going to be desirable down the road.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
I'm not convinced boot_vid_mode really needs setting here; I'm doing so
mainly because setvesabysize also does.
---
v4: Add changelog entry.
v2: Use 0x9b instead of 0x99 for attributes check: I think the value
    used by check_vesa also wants to be converted, to match vesa2's.
    (Perhaps the value wants to become a #define, albeit before doing so
    I'd question the requirement of the mode to be a color one.)

--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -6,6 +6,10 @@ The format is based on [Keep a Changelog
 
 ## [unstable UNRELEASED](https://xenbits.xen.org/gitweb/?p=xen.git;a=shortlog;h=staging) - TBD
 
+### Changed
+ - On x86 "vga=current" can now be used together with GrUB2's gfxpayload setting. Note that
+   this requires use of "multiboot2" (and "module2") as the GrUB commands loading Xen.
+
 ### Removed / support downgraded
  - dropped support for the (x86-only) "vesa-mtrr" and "vesa-remap" command line options
 
--- a/xen/arch/x86/boot/video.S
+++ b/xen/arch/x86/boot/video.S
@@ -575,7 +575,6 @@ set14:  movw    $0x1111, %ax
         movb    $0x01, %ah              # Define cursor scan lines 11-12
         movw    $0x0b0c, %cx
         int     $0x10
-set_current:
         stc
         ret
 
@@ -693,6 +692,39 @@ vga_modes:
         .word   VIDEO_80x60, 0x50,0x3c,0        # 80x60
 vga_modes_end:
 
+# If the current mode is a VESA graphics one, obtain its parameters.
+set_current:
+        leaw    vesa_glob_info, %di
+        movw    $0x4f00, %ax
+        int     $0x10
+        cmpw    $0x004f, %ax
+        jne     .Lsetc_done
+
+        movw    $0x4f03, %ax
+        int     $0x10
+        cmpw    $0x004f, %ax
+        jne     .Lsetc_done
+
+        leaw    vesa_mode_info, %di     # Get mode information structure
+        movw    %bx, %cx
+        movw    $0x4f01, %ax
+        int     $0x10
+        cmpw    $0x004f, %ax
+        jne     .Lsetc_done
+
+        movb    (%di), %al              # Check mode attributes
+        andb    $0x9b, %al
+        cmpb    $0x9b, %al
+        jne     .Lsetc_done             # Doh! No linear frame buffer
+
+        movb    $1, bootsym(graphic_mode)
+        movw    %bx, bootsym(boot_vid_mode)
+        movw    %bx, bootsym(video_mode)
+
+.Lsetc_done:
+        stc
+        ret
+
 # Detect VESA modes.
 vesa_modes:
         movw    %di, %bp                # BP=original mode table end



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 09:45:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 09:45:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296841.505417 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZrMc-0004hN-M9; Thu, 31 Mar 2022 09:45:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296841.505417; Thu, 31 Mar 2022 09:45:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZrMc-0004hG-J0; Thu, 31 Mar 2022 09:45:10 +0000
Received: by outflank-mailman (input) for mailman id 296841;
 Thu, 31 Mar 2022 09:45:09 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=TTh1=UK=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZrMb-00045p-C0
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 09:45:09 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 3ffe2257-b0d7-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 11:45:08 +0200 (CEST)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur04lp2050.outbound.protection.outlook.com [104.47.14.50]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-34-cc--GB0mPdO8edoJe2G7cQ-1; Thu, 31 Mar 2022 11:45:05 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AM6PR04MB4872.eurprd04.prod.outlook.com (2603:10a6:20b:e::24) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.21; Thu, 31 Mar
 2022 09:45:04 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.021; Thu, 31 Mar 2022
 09:45:04 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3ffe2257-b0d7-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648719907;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=ETCbNIJzLPkDjltdqaHsnx3bgSxxGyhUZegn+m7VW7s=;
	b=DEV74t5ThA16n7UEV02wmHM2xTfvePy+n8i2QcmlxYU2ZR96urpIz1ZVdYBC/+FIxJiRxo
	8MFcFLpBSZOQQvCFNNW4svsc2i3Y9XT5uWKkxfs7Sl7XkoyOQYBcTnQOjoRyYieatGsJQQ
	k9KLWh2/CWQwER3atDkYC6Qyd3WzluA=
X-MC-Unique: cc--GB0mPdO8edoJe2G7cQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=nPSNShYPeNTBM70sgV242KuliwJZXFzDgjmCeTFOjdMkqCkJ+bVNqdlKP4NI4kc4IocJqFIyxo5CxRlrHS4AMy60KNm6MVXNdtYESf4Z/szAn1Rgw2Ip+ZoOIRoAF5H8WNrS+7XxQ9MR0f6WR8fqG0F1LellpsGm/q1zFDJaWdr9Mn9ZNin+efyvxmFBOGEpBjQZOyOEe70gNWpHfOYi4WEWRv8A3zYZQDkfQncozun/0fuxJen0pEj9kjAaYxaFzcpdns+VJk0yxQsLBjxKEEFyuf4IyqUqIdF13noSowbZnUKdF/I1Kqd2z05FlFjjXvW/HUz5S9EColab0FgGDQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ETCbNIJzLPkDjltdqaHsnx3bgSxxGyhUZegn+m7VW7s=;
 b=VQ2rId46MUo9qVGStwlcbx+W3VFT8i4oFkP3+dRbZkSVkd8xrenD4XLtYwcTHiSrpSUgMRRYdJFqEt4BOJzsDygPIWb+AgHnyt57Vt/nFW57XGeI6Oxk6jVdPYHHhwuZ24ppQOQFN8PcAjGlPvUQbLMFOUPcUzkOMqjKfdxaRaXLTOlv86n0HE9F+BtDzK3mf77EbBHOqoi4PEuFPcaiXEkf7/Y1nPFjiTxjGyAUk6y2mhn/JvygE5BpshqOYQ4/DeVQm67rD1O0GB94HIb/S9c5oLDCvgvTTzyxkYYqIukSffbQ+Kg/Ntyue6bah0QQ/WSzgHBLavszimdRa/sRcA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <6fc25224-7985-73a6-8877-bc209f64bf8c@suse.com>
Date: Thu, 31 Mar 2022 11:45:02 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: [PATCH v4 2/8] x86/boot: obtain video info from boot loader
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>, Julien Grall <julien@xen.org>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>
References: <819eb552-d49d-e98a-9524-8d30c1b93908@suse.com>
In-Reply-To: <819eb552-d49d-e98a-9524-8d30c1b93908@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR0301CA0035.eurprd03.prod.outlook.com
 (2603:10a6:20b:469::15) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 18c6fe6d-3178-46bf-5432-08da12fb21b7
X-MS-TrafficTypeDiagnostic: AM6PR04MB4872:EE_
X-Microsoft-Antispam-PRVS:
	<AM6PR04MB4872A66F459DE6EF68EC7AFBB3E19@AM6PR04MB4872.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6512007)(86362001)(8936002)(6506007)(31696002)(54906003)(8676002)(66946007)(4326008)(66556008)(6916009)(316002)(508600001)(6486002)(66476007)(38100700002)(5660300002)(26005)(186003)(36756003)(31686004)(2616005)(2906002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?dW1MUGRSMlZVTnlkYTNGNVd1Mkdza0MyNnMxREhwTStlUGNreWRBYVk3NTVU?=
 =?utf-8?B?ZlpROFNNU2RLOXFadUlEQU5sNDJWTzdjY2ZueStoOC9jSDFIbnNtMzdNRm9v?=
 =?utf-8?B?V2NGM0E3ZkpFbTRMdXJGR0tkUWp4SEx3MXUvYlJaVlRMaXFGMG03amkxdWh4?=
 =?utf-8?B?eWQyRXUreDZROGhTV1k4dmN4aHRwVmVrNlpoMjN3eGxaaE5vWk1XYzJ0dmxP?=
 =?utf-8?B?d3haUmxDNlNQdUFJTzhzTlhoL3ptOXhqU2VQVm1NREVLYmdMY2d0WUhrNVNQ?=
 =?utf-8?B?WFVERjJ0RUs3ZFdJSTR5ckJSZnpxUHRqekgrV3pKTFFHSHRkMnJQQWNSYWJj?=
 =?utf-8?B?ZGRLWEo3Y1VZdUJXM0hPNFJPaEFBZGdTOEJzcFdaeW5lbHl3TDA4NmNaSVdX?=
 =?utf-8?B?TW5OSHlzU2dlcXJkM3kweVlqTDhldmpKd3UzVFkweXF6czBKdmhQcE1tdjRC?=
 =?utf-8?B?YXJFOVU1UU9iemF0b0dOZUVJNlZaNS9uamRqWUNEOVFhU1ZwZHJjSlkwd05N?=
 =?utf-8?B?V3ZhTmZTVmNiWnVQTllGMC9QWlZaVDdqYUZkbk00VXBvOUh4UnI3eHlUSWZu?=
 =?utf-8?B?RnhKRXhaMTNtaitlc1hWbGk4TGh5UjE4L0RtVk1icGh5RE4rditxblFtdWU3?=
 =?utf-8?B?K0JnRW9aS05sNzVwVlJudWl3Y0RabysvaHpPZWZnV09xblJXZEx3NUpMaG1w?=
 =?utf-8?B?bXZBTlpNd3cxK0dFU2tjaEREays2dXMwZ3B1V0QzWXFLYmF6Smo3S2NFcFY0?=
 =?utf-8?B?WEQ4djB1L0ZPN1NRUjEzbFo0NlZ2Y1RFcTZmSDhmNHBndU5iZGVSTkVKTkE5?=
 =?utf-8?B?NUVzekcreW4xMmpFQ1FPRHM2V2cvV1ZqckVyZEFObTJrdzNqdFRNMzNOYVVo?=
 =?utf-8?B?UW1ZcTNSSlhWVnUvLzAzb3NRQk5FWkhaVkNsVXVhc3g1ZVRhNXZNWnlJTVhr?=
 =?utf-8?B?TTM1WkxJdGh5Z0pqenNCOW1IZ3hQUFJGSTc1YldpQy8yTm4rYVEvamNKSnR2?=
 =?utf-8?B?ckdXQlVUaXdoZlhwczd2ajJHY3d2cXlHaDZCeDJsYTBkTGpoQ2RtNloyMVdH?=
 =?utf-8?B?MFBNdFkzRThjdlkxWGkvcThmWnhXNXVvbUdIZlBLOTg4bDMxb3l4UitkSjEw?=
 =?utf-8?B?Z2JWYXhlbUxtNTd4VWJ0UG00V044VHlEcWlQMVo1UXMwcmFWZTRUaWRXcnR0?=
 =?utf-8?B?dk9NS3dpY0k5eUFlTWJUQUJwbml3bEgyb2o4MFFKc1oreGxGbnlVb2NibDJD?=
 =?utf-8?B?VGxxTHhYWTlmaFVJdUY4bkxtYnh4RGlyWlpuN0VvUWVVc2RpSWVUT29XRWZP?=
 =?utf-8?B?UTJtMFRod0R1aktNTmRkRWFmYTBaQmpBU2lRT1lyajJrTnFNajVoaEFjeVU2?=
 =?utf-8?B?SXIyY0s1RXQ3eUhueW55L3VzTERuSDVXck5vRlJwOGI1dk1JVVNLZnFyN1lv?=
 =?utf-8?B?Z01oTWFFYUdobU53YXBXTXZLTHZZa2JXY1ZnNTNwTmFscElyVHVhemNva2NY?=
 =?utf-8?B?UlZNZHU0MHFQTG9BekdsNkd4Q0xBbFF3Q01zTmRMM2x6TEhvRXZkV2xZYUt6?=
 =?utf-8?B?Tkh1bTh0a0lta2hPTnc5YnV5KzBnQ2pzU0xhM2Z6ZXkzMWpkRTdwakZaNHJn?=
 =?utf-8?B?NUw1eTRSelc4bm0yQ1FqRklyYTFxa3JIOGxBa1BQWWhYa2pWclZFM3FaUmpX?=
 =?utf-8?B?T295YUREelc2UDA4bVJ1S1E3ZlBFbDBENE9COXRYRmdPZXJZNm5SR2dRaFds?=
 =?utf-8?B?aURHZUFDRWZwU01hcnE0aFFoNlg4SEdNRktmK2xQdnZvWklORmdUam1nZmN4?=
 =?utf-8?B?TzhoZHFuNWhHT0loVVBGRVdnMWJyYUN0c0FGMFVHQ3cxaDFTSm5PN1dyQzVi?=
 =?utf-8?B?WGp5RENVaGc1cjNGRnlYZ1czMHFHTjFlMUJ0RmgxSVBLRzhOTVAwVDNoOGNp?=
 =?utf-8?B?K0VFcE9sdkJ3UmY4ZFB0NHp0ZFVBZDVEMmtKb2F2OTRjNHUxc25NSUlLWVky?=
 =?utf-8?B?dUJSMlZSR0JHV3ZlaGpvM1N1cEJQUE0rL3YyRVdjMjN0WEcrRE4zRTkrUEJl?=
 =?utf-8?B?T2ZtUXpFc2ZabEhFV0FaSnFub1NiZHNvMVNUQXdiN2QrbjJtSllMY2VMWWc1?=
 =?utf-8?B?aUk4eFFjaUNMdUgwcm9PWC9OMHRibGVtdm53VnhtTUlnM2hYeXVMTW9XYldM?=
 =?utf-8?B?SC9MMmFGMGpsL1hVNFQvbkJsMmgvWDd3OGVFY3J1Nm9kMVhKZ0ZtUHkvYUhz?=
 =?utf-8?B?S2NFK2tFNmczNzNmaW1GWmFYdkdGWURuNnZ1U0FwQXpndVlLR3RsajIwZmdP?=
 =?utf-8?B?eERFMS8vK1FFSkVrTzA5aUVvVXQzTkthSlZNR3IzdE9OdXJsOHlPQT09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 18c6fe6d-3178-46bf-5432-08da12fb21b7
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 09:45:04.0757
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: KPM9OuvAHC+/LoM1pmWItF+hZbocw1jr35vHw2/dJL1/vLjouZbz0i9jzltGskog/P5I+wvDtNwCcM93XqVPZw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR04MB4872

With MB2 the boot loader may provide this information, allowing us to
obtain it without needing to enter real mode (assuming we don't need to
set a new mode from "vga=", but can instead inherit the one the
bootloader may have established).

Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
v4: Re-base.
v3: Re-base.
v2: New.

--- a/xen/arch/x86/boot/defs.h
+++ b/xen/arch/x86/boot/defs.h
@@ -53,6 +53,7 @@ typedef unsigned int u32;
 typedef unsigned long long u64;
 typedef unsigned int size_t;
 typedef u8 uint8_t;
+typedef u16 uint16_t;
 typedef u32 uint32_t;
 typedef u64 uint64_t;
 
--- a/xen/arch/x86/boot/head.S
+++ b/xen/arch/x86/boot/head.S
@@ -562,12 +562,18 @@ trampoline_setup:
         mov     %esi, sym_esi(xen_phys_start)
         mov     %esi, sym_esi(trampoline_xen_phys_start)
 
-        mov     sym_esi(trampoline_phys), %ecx
-
         /* Get bottom-most low-memory stack address. */
+        mov     sym_esi(trampoline_phys), %ecx
         add     $TRAMPOLINE_SPACE,%ecx
 
+#ifdef CONFIG_VIDEO
+        lea     sym_esi(boot_vid_info), %edx
+#else
+        xor     %edx, %edx
+#endif
+
         /* Save Multiboot / PVH info struct (after relocation) for later use. */
+        push    %edx                /* Boot video info to be filled from MB2. */
         push    %ecx                /* Bottom-most low-memory stack address. */
         push    %ebx                /* Multiboot / PVH information address. */
         push    %eax                /* Magic number. */
--- a/xen/arch/x86/boot/reloc.c
+++ b/xen/arch/x86/boot/reloc.c
@@ -14,9 +14,10 @@
 
 /*
  * This entry point is entered from xen/arch/x86/boot/head.S with:
- *   - 0x4(%esp) = MAGIC,
- *   - 0x8(%esp) = INFORMATION_ADDRESS,
- *   - 0xc(%esp) = TOPMOST_LOW_MEMORY_STACK_ADDRESS.
+ *   - 0x04(%esp) = MAGIC,
+ *   - 0x08(%esp) = INFORMATION_ADDRESS,
+ *   - 0x0c(%esp) = TOPMOST_LOW_MEMORY_STACK_ADDRESS.
+ *   - 0x10(%esp) = BOOT_VIDEO_INFO_ADDRESS.
  */
 asm (
     "    .text                         \n"
@@ -32,6 +33,39 @@ asm (
 #include "../../../include/xen/kconfig.h"
 #include <public/arch-x86/hvm/start_info.h>
 
+#ifdef CONFIG_VIDEO
+# include "video.h"
+
+/* VESA control information */
+struct __packed vesa_ctrl_info {
+    uint8_t signature[4];
+    uint16_t version;
+    uint32_t oem_name;
+    uint32_t capabilities;
+    uint32_t mode_list;
+    uint16_t mem_size;
+    /* We don't use any further fields. */
+};
+
+/* VESA 2.0 mode information */
+struct vesa_mode_info {
+    uint16_t attrib;
+    uint8_t window[14]; /* We don't use the individual fields. */
+    uint16_t bytes_per_line;
+    uint16_t width;
+    uint16_t height;
+    uint8_t cell_width;
+    uint8_t cell_height;
+    uint8_t nr_planes;
+    uint8_t depth;
+    uint8_t memory[5]; /* We don't use the individual fields. */
+    struct boot_video_colors colors;
+    uint8_t direct_color;
+    uint32_t base;
+    /* We don't use any further fields. */
+};
+#endif /* CONFIG_VIDEO */
+
 #define get_mb2_data(tag, type, member)   (((multiboot2_tag_##type##_t *)(tag))->member)
 #define get_mb2_string(tag, type, member) ((u32)get_mb2_data(tag, type, member))
 
@@ -146,7 +180,7 @@ static multiboot_info_t *mbi_reloc(u32 m
     return mbi_out;
 }
 
-static multiboot_info_t *mbi2_reloc(u32 mbi_in)
+static multiboot_info_t *mbi2_reloc(uint32_t mbi_in, uint32_t video_out)
 {
     const multiboot2_fixed_t *mbi_fix = _p(mbi_in);
     const multiboot2_memory_map_t *mmap_src;
@@ -154,6 +188,9 @@ static multiboot_info_t *mbi2_reloc(u32
     module_t *mbi_out_mods = NULL;
     memory_map_t *mmap_dst;
     multiboot_info_t *mbi_out;
+#ifdef CONFIG_VIDEO
+    struct boot_video_info *video = NULL;
+#endif
     u32 ptr;
     unsigned int i, mod_idx = 0;
 
@@ -254,17 +291,64 @@ static multiboot_info_t *mbi2_reloc(u32
             ++mod_idx;
             break;
 
+#ifdef CONFIG_VIDEO
+        case MULTIBOOT2_TAG_TYPE_VBE:
+            if ( video_out )
+            {
+                const struct vesa_ctrl_info *ci;
+                const struct vesa_mode_info *mi;
+
+                video = _p(video_out);
+                ci = (void *)get_mb2_data(tag, vbe, vbe_control_info);
+                mi = (void *)get_mb2_data(tag, vbe, vbe_mode_info);
+
+                if ( ci->version >= 0x0200 && (mi->attrib & 0x9b) == 0x9b )
+                {
+                    video->capabilities = ci->capabilities;
+                    video->lfb_linelength = mi->bytes_per_line;
+                    video->lfb_width = mi->width;
+                    video->lfb_height = mi->height;
+                    video->lfb_depth = mi->depth;
+                    video->lfb_base = mi->base;
+                    video->lfb_size = ci->mem_size;
+                    video->colors = mi->colors;
+                    video->vesa_attrib = mi->attrib;
+                }
+
+                video->vesapm.seg = get_mb2_data(tag, vbe, vbe_interface_seg);
+                video->vesapm.off = get_mb2_data(tag, vbe, vbe_interface_off);
+            }
+            break;
+
+        case MULTIBOOT2_TAG_TYPE_FRAMEBUFFER:
+            if ( (get_mb2_data(tag, framebuffer, framebuffer_type) !=
+                  MULTIBOOT2_FRAMEBUFFER_TYPE_RGB) )
+            {
+                video_out = 0;
+                video = NULL;
+            }
+            break;
+#endif /* CONFIG_VIDEO */
+
         case MULTIBOOT2_TAG_TYPE_END:
-            return mbi_out;
+            goto end; /* Cannot "break;" here. */
 
         default:
             break;
         }
 
+ end:
+
+#ifdef CONFIG_VIDEO
+    if ( video )
+        video->orig_video_isVGA = 0x23;
+#endif
+
     return mbi_out;
 }
 
-void * __stdcall reloc(u32 magic, u32 in, u32 trampoline)
+void *__stdcall reloc(uint32_t magic, uint32_t in, uint32_t trampoline,
+                      uint32_t video_info)
 {
     alloc = trampoline;
 
@@ -274,7 +358,7 @@ void * __stdcall reloc(u32 magic, u32 in
         return mbi_reloc(in);
 
     case MULTIBOOT2_BOOTLOADER_MAGIC:
-        return mbi2_reloc(in);
+        return mbi2_reloc(in, video_info);
 
     case XEN_HVM_START_MAGIC_VALUE:
         if ( IS_ENABLED(CONFIG_PVH_GUEST) )
--- a/xen/arch/x86/boot/video.h
+++ b/xen/arch/x86/boot/video.h
@@ -28,4 +28,45 @@
 /* The "recalculate timings" flag */
 #define VIDEO_RECALC        0x8000
 
+#ifndef __ASSEMBLY__
+struct boot_video_info {
+    uint8_t  orig_x;             /* 0x00 */
+    uint8_t  orig_y;             /* 0x01 */
+    uint8_t  orig_video_mode;    /* 0x02 */
+    uint8_t  orig_video_cols;    /* 0x03 */
+    uint8_t  orig_video_lines;   /* 0x04 */
+    uint8_t  orig_video_isVGA;   /* 0x05 */
+    uint16_t orig_video_points;  /* 0x06 */
+
+    /* VESA graphic mode -- linear frame buffer */
+    uint32_t capabilities;       /* 0x08 */
+    uint16_t lfb_linelength;     /* 0x0c */
+    uint16_t lfb_width;          /* 0x0e */
+    uint16_t lfb_height;         /* 0x10 */
+    uint16_t lfb_depth;          /* 0x12 */
+    uint32_t lfb_base;           /* 0x14 */
+    uint32_t lfb_size;           /* 0x18 */
+    union {
+        struct {
+            uint8_t  red_size;   /* 0x1c */
+            uint8_t  red_pos;    /* 0x1d */
+            uint8_t  green_size; /* 0x1e */
+            uint8_t  green_pos;  /* 0x1f */
+            uint8_t  blue_size;  /* 0x20 */
+            uint8_t  blue_pos;   /* 0x21 */
+            uint8_t  rsvd_size;  /* 0x22 */
+            uint8_t  rsvd_pos;   /* 0x23 */
+        };
+        struct boot_video_colors {
+            uint8_t  rgbr[8];
+        } colors;
+    };
+    struct {
+        uint16_t seg;            /* 0x24 */
+        uint16_t off;            /* 0x26 */
+    } vesapm;
+    uint16_t vesa_attrib;        /* 0x28 */
+};
+#endif /* __ASSEMBLY__ */
+
 #endif /* __BOOT_VIDEO_H__ */
--- a/xen/arch/x86/setup.c
+++ b/xen/arch/x86/setup.c
@@ -532,35 +532,7 @@ static void __init setup_max_pdx(unsigne
 static struct e820map __initdata boot_e820;
 
 #ifdef CONFIG_VIDEO
-struct boot_video_info {
-    u8  orig_x;             /* 0x00 */
-    u8  orig_y;             /* 0x01 */
-    u8  orig_video_mode;    /* 0x02 */
-    u8  orig_video_cols;    /* 0x03 */
-    u8  orig_video_lines;   /* 0x04 */
-    u8  orig_video_isVGA;   /* 0x05 */
-    u16 orig_video_points;  /* 0x06 */
-
-    /* VESA graphic mode -- linear frame buffer */
-    u32 capabilities;       /* 0x08 */
-    u16 lfb_linelength;     /* 0x0c */
-    u16 lfb_width;          /* 0x0e */
-    u16 lfb_height;         /* 0x10 */
-    u16 lfb_depth;          /* 0x12 */
-    u32 lfb_base;           /* 0x14 */
-    u32 lfb_size;           /* 0x18 */
-    u8  red_size;           /* 0x1c */
-    u8  red_pos;            /* 0x1d */
-    u8  green_size;         /* 0x1e */
-    u8  green_pos;          /* 0x1f */
-    u8  blue_size;          /* 0x20 */
-    u8  blue_pos;           /* 0x21 */
-    u8  rsvd_size;          /* 0x22 */
-    u8  rsvd_pos;           /* 0x23 */
-    u16 vesapm_seg;         /* 0x24 */
-    u16 vesapm_off;         /* 0x26 */
-    u16 vesa_attrib;        /* 0x28 */
-};
+# include "boot/video.h"
 extern struct boot_video_info boot_vid_info;
 #endif
 
--- a/xen/include/xen/multiboot2.h
+++ b/xen/include/xen/multiboot2.h
@@ -158,6 +158,59 @@ typedef struct {
     multiboot2_memory_map_t entries[];
 } multiboot2_tag_mmap_t;
 
+typedef struct
+{
+    uint32_t type;
+    uint32_t size;
+    uint16_t vbe_mode;
+    uint16_t vbe_interface_seg;
+    uint16_t vbe_interface_off;
+    uint16_t vbe_interface_len;
+    uint8_t vbe_control_info[512];
+    uint8_t vbe_mode_info[256];
+} multiboot2_tag_vbe_t;
+
+typedef struct
+{
+    uint8_t red;
+    uint8_t green;
+    uint8_t blue;
+} multiboot2_color_t;
+
+typedef struct
+{
+    uint32_t type;
+    uint32_t size;
+    uint64_t framebuffer_addr;
+    uint32_t framebuffer_pitch;
+    uint32_t framebuffer_width;
+    uint32_t framebuffer_height;
+    uint8_t framebuffer_bpp;
+#define MULTIBOOT2_FRAMEBUFFER_TYPE_INDEXED  0
+#define MULTIBOOT2_FRAMEBUFFER_TYPE_RGB      1
+#define MULTIBOOT2_FRAMEBUFFER_TYPE_EGA_TEXT 2
+    uint8_t framebuffer_type;
+    uint16_t reserved;
+
+    union
+    {
+        struct
+        {
+            uint16_t framebuffer_palette_num_colors;
+            multiboot2_color_t framebuffer_palette[];
+        };
+        struct
+        {
+            uint8_t framebuffer_red_field_position;
+            uint8_t framebuffer_red_mask_size;
+            uint8_t framebuffer_green_field_position;
+            uint8_t framebuffer_green_mask_size;
+            uint8_t framebuffer_blue_field_position;
+            uint8_t framebuffer_blue_mask_size;
+        };
+    };
+} multiboot2_tag_framebuffer_t;
+
 typedef struct {
     u32 type;
     u32 size;



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 09:45:48 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 09:45:48 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296843.505427 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZrND-0005Gj-Vl; Thu, 31 Mar 2022 09:45:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296843.505427; Thu, 31 Mar 2022 09:45:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZrND-0005Gc-Sp; Thu, 31 Mar 2022 09:45:47 +0000
Received: by outflank-mailman (input) for mailman id 296843;
 Thu, 31 Mar 2022 09:45:46 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=TTh1=UK=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZrNB-0005Fx-TD
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 09:45:46 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 55da7f19-b0d7-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 11:45:44 +0200 (CEST)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com
 (mail-vi1eur05lp2169.outbound.protection.outlook.com [104.47.17.169]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-25--BRcJu6zMqa_lHsaJYM9qQ-1; Thu, 31 Mar 2022 11:45:41 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by HE1PR0402MB2828.eurprd04.prod.outlook.com (2603:10a6:3:da::15)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.21; Thu, 31 Mar
 2022 09:45:38 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.021; Thu, 31 Mar 2022
 09:45:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 55da7f19-b0d7-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648719944;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=m25bQHGvRlZ6OFGo8TfnVKsBCikksi3mWW9OB5EgvG4=;
	b=IdtEel9lxtzZo3Tr3XuOr/kQ9jpt9d8SciuWJ8l9eytaqUV1bVLkx0Q8abI4+YOJxjsc/d
	fAp2nXPebAWmCJ19HzWVH9HFfPFax2Yl3hdtanLgnLq2bzWYBTrE1sLCWsEt0JmU0DkCoa
	OdO2Bl4MnrzVQGmQ/qJGJgMdzMY5UpU=
X-MC-Unique: -BRcJu6zMqa_lHsaJYM9qQ-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Otxb3qpVgo1DpQ8T9p/IMyIl3QEWoRQ41nbycsk/XjZKqteODX+7MiKiKijsTObT3h/Ir5+bHp6+lhx1Pkg+HAUm1be/dBHobkZ2Bk4zfXgvDrJYz1GCZWanq4wGg8eI0hKea7dSwdCucFMFxeobSFaOZLPLiSUODqCItmPayHcs3brtUzLnDxrnqA5fhyI6GXHCJR0DlOmnraiOK9rjvdExHksLDwl4nuRszzVpeMJ+wKsZjoB4yQu6UEyS1Jf8tyq4u0d4qnK3tnI6mVhRgqsA9RYsYD3YUBdUM1TzGDxQlQWpHDHyo4qAQBguCGSJiCdrPxPXdSXZlEHC+XqJqg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=m25bQHGvRlZ6OFGo8TfnVKsBCikksi3mWW9OB5EgvG4=;
 b=bwSWXy4EPuTbO7Tysuv7vIPL7eSa+6oFiOrZ4S4FsV72g+tZRgp+JRr9k+0OOdGY3yazDcIw8Tgu7lQULslQ2lh7q/j2NCbXXxDWcShRV21fYFmDrkAMEtoGkJGkJFH+naa0vbRNvhEOmLGoVX+8LRzoyQW6ucHDkqtsPgvL5JiJ9nkuQ8Q4PC20TJ244s4awUxNcDaSyHyjPJ84vCGl9r8KwWEh1W4ukDG8Mm5ClVfSl8R2MopLwp5FOyUIqQhBjapxDJQ0etVsTlJtF11VYehF6tUWAsmAPvHVEBcasp2zitHuiYUXTzjy46+MljG63d7w7FevwClCWKn4RT38gQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <c11d267f-f6b7-558f-18ce-2b081ae12427@suse.com>
Date: Thu, 31 Mar 2022 11:45:36 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: [PATCH v4 3/8] x86/EFI: retrieve EDID
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
 Volodymyr Babchuk <volodymyr_babchuk@epam.com>,
 Bertrand Marquis <bertrand.marquis@arm.com>
References: <819eb552-d49d-e98a-9524-8d30c1b93908@suse.com>
In-Reply-To: <819eb552-d49d-e98a-9524-8d30c1b93908@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P191CA0033.EURP191.PROD.OUTLOOK.COM
 (2603:10a6:209:8b::46) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: b44cde77-0441-4ee7-db06-08da12fb3657
X-MS-TrafficTypeDiagnostic: HE1PR0402MB2828:EE_
X-Microsoft-Antispam-PRVS:
	<HE1PR0402MB2828AA74565E9CE18986D0B0B3E19@HE1PR0402MB2828.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(83380400001)(8676002)(66946007)(86362001)(66556008)(4326008)(36756003)(6506007)(31686004)(2906002)(8936002)(66476007)(5660300002)(31696002)(54906003)(6916009)(508600001)(38100700002)(6486002)(186003)(6512007)(26005)(316002)(2616005)(21314003)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?NndLTG9mSmszSVRQQ05GWVcvNFkvK1g1SCtFMTVCVlVvaTByVGo5UDdQUGl2?=
 =?utf-8?B?YkNBbTlDQUs3VXU3N3liWW9scUdhR3g0YWhYa0NZWStuanYxTHRFWCtxdWVH?=
 =?utf-8?B?MXdoZDlBT1E0R0R5VTZWYVhsa2Q3TXR4d09rVTZiYTVsWEdxenhmWVNSYTRL?=
 =?utf-8?B?ck50ODBvU3dITWtkc0d0NERSaFR2NUNHL1lEMENCd1hKd3pWMHk4NnpQZ1pI?=
 =?utf-8?B?ZGhKOHl0Z3F4cTRRdGxWNFl5Qk1DTEVuRlVXMkd5NFpWa3MxYnNZbFFZam1l?=
 =?utf-8?B?MVVYeFZYbm14SVFkSnRnSDNuc09abkM3d3V5WU5LMzcxZzhreVhDOTBWWkt5?=
 =?utf-8?B?bHRnSElqZEtOUm16dURwdlUzdFZRVzBSTzMySWUwVUhTWUZvdUdLNUVoN1pE?=
 =?utf-8?B?T2NVZjhhU0pMTXV2dlYvWEtlZ3B3emQ5SW5aK05sZTh0cVozZWQrM2lxV3lN?=
 =?utf-8?B?dFVLRUlFWlQrb1l3U1o3c2kwL3pDSFlyME9GWkFJM05iSkg0TUdTWnZOVnhF?=
 =?utf-8?B?OU5kMzB6ZzdNMHIzRmJiL2sweUpmSFdIOWRoUERENDM2a2E3VFBLT1NxM3hF?=
 =?utf-8?B?MjlGZ1dLYWtROFY4SnFianowWjlxbjVLOGRxczhHSm83bERSVk9ubjdIcTFQ?=
 =?utf-8?B?eDNEY1MzTEhHRUFDaWh6L0V2VU9LTXk1Zys4ZkxJaCsvaFNoY3ltRGlDSnIw?=
 =?utf-8?B?VWRTeTVHNzd0UTFKK0JRQ2srdnRYZm1tUTdDT3Z6QmszWk5wNWhoUkhpZVRh?=
 =?utf-8?B?bnJ6RC9tN1NGV2lia0FDTjZhVHE1NjFhRVJ3MHVTbjB0TFNhQitoSW5GTDlI?=
 =?utf-8?B?K0RVQUxJMlpTV1JDMktaU2h0cEltTXowWUhjWWJRYm1mQVpMbmVRQ0ZkL1VD?=
 =?utf-8?B?a1RDVDNkM0JENEFhekFLNTRIeENXNkQvTHZ6alVNMWxMUDFFUnpDU3pEY254?=
 =?utf-8?B?S2xCOGF1bXJqVUN0NTYvUEdadnVrYWRqVElKL0Q3eHVsWThjTFY2cG9oNzhn?=
 =?utf-8?B?am0vVG9uZURYZmxuQnVmNkpFSGV5SWhOUktUdVdWZGJ4NCsrRzNnZktaK2Jx?=
 =?utf-8?B?UzEwUnFPRUtEc3RpOHFmZWdISHJpVTI5SWZVL0pRb1NsbXU2RUxER2xTZGJn?=
 =?utf-8?B?VFlkSnN1SW9iRURYN2lBTFJKNjRXRHBtY2NwMzFXTkVpelF2azBvcGdldmtU?=
 =?utf-8?B?b0dYYTdSd3J3em0xbnEvZDNaMFdSazQ3OWtJVUpGNVY1ZXFQUEQzRld4RTZr?=
 =?utf-8?B?SDNBKzZyZVVTblN3OEtyZ1BwWVRDN2t4MVlkbFNsVzhCbjAyNUZlczBhVG5z?=
 =?utf-8?B?Tm5EMmh4NkhNNFdSRHlwVGdDbGVkVW9UaThiK0dvdFEyN0NNaE5oSnVzZ1pD?=
 =?utf-8?B?QzFBbTdTSUZNL0ZKUER3amxLQnZNczBINDZ4cFdsd3BxSnNDVkl5S09iL3U2?=
 =?utf-8?B?YlBtYUYyYk1uTWJsWHdpcjdLMWFkanFqeFBhdU9kdllRRHlYQXpob1FqSjk3?=
 =?utf-8?B?K0VySzJSd3h4TmZ1cUl3T210dG0zeUV0S0dFSXFNTGtZT1VZU0YrN1U2bDdY?=
 =?utf-8?B?ODdESHBDbDhiTGRuLyszNVVhcjBpZldDdk9Dakg5UzhCRnZBdlVJa1RLY04x?=
 =?utf-8?B?eTVkM3dLRG83Mi8ydlNEWkVVQjlkMHA5eHNEdWpKa1F6cTZzZ1BqOTZRcHdN?=
 =?utf-8?B?SWs2by9sSjZRZnNOcDNxcVdaSlJpMk04TmRCcWhKcUFLdVJrTzdScEx6WGxh?=
 =?utf-8?B?R09DdDQvd3JNZGlJUE1jM1NHengxVmhBc0xqbmNMVkNlS1JqUld5RDNLN3VH?=
 =?utf-8?B?YnRMUncrV1kva0RDeDFSYTRjcCs5NysxeHRkemk0SWRkVEZCNk5VZkZTWDZP?=
 =?utf-8?B?amdvYTNSNXpkMVVZZW42akl6VFFYbXFMb0JzTG83aUJsNk4zZWRUNnova0VH?=
 =?utf-8?B?TjJmYVZjWmpscTRJTUozWGpETVJyL0ZpMUpYNE10eHdBSWo1bGlud3RDK0Rw?=
 =?utf-8?B?ZU5Wd0dZNW8wRVVyWG5TWXkrOVdGWWM2cHNVTTgwVkVybWJSQ05SOGlLaytq?=
 =?utf-8?B?Y2ZIYStMV3hKZWFtNEdJb0ExVi8yRTVwZlNjUlZVRFdVRVpmVDUzdWRCLzVV?=
 =?utf-8?B?aUJjS0dhK3Q4ZUtiVUpyUHlOLy8rNTBHSmtvL0ZnblpkNmFGRUdzWUVxQVlO?=
 =?utf-8?B?cUVWVlY4MC9IaFFVeVJzemxaVG1jOWFicTFVWXBiczlsL2VHb3B0MVgzUVpN?=
 =?utf-8?B?OGh4UU9kN0ZDdWFFWm1VblpwdVMyc2xUNDA0bTBDY2tuMG16RDFIcXN2MGNR?=
 =?utf-8?B?OVJmMHQrZDhhS2wzQkFwK25vZ0xXNXJXYkd0K1l3Z3pRNllaTjFtQT09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b44cde77-0441-4ee7-db06-08da12fb3657
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 09:45:38.5571
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: w2SiAJFyLNHtoHm4FE1+i7FtICm1KO/9nMAKqUb9h4NPnZGpulkggZFloi3TC1Kl8lHck7Av/SCPSxpvZgwtYA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0402MB2828

When booting directly from EFI, obtaining this information from EFI is
the only possible way. And even when booting with a boot loader
interposed, it's more clean not to use legacy BIOS calls for this
purpose. (The downside being that there are no "capabilities" that we
can retrieve the EFI way.)

To achieve this we need to propagate the handle used to obtain the
EFI_GRAPHICS_OUTPUT_PROTOCOL instance for further obtaining an
EFI_EDID_*_PROTOCOL instance, which has been part of the spec since 2.5.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
Setting boot_edid_caps to zero isn't desirable, but arbitrarily setting
one or both of the two low bits also doesn't seem appropriate.

GrUB also checks an "agp-internal-edid" variable. As I haven't been able
to find any related documentation, and as GrUB being happy about the
variable being any size (rather than at least / precisely 128 bytes),
I didn't follow that route.
---
v3: Re-base.
v2: New.

--- a/xen/arch/arm/efi/efi-boot.h
+++ b/xen/arch/arm/efi/efi-boot.h
@@ -464,6 +464,10 @@ static void __init efi_arch_edd(void)
 {
 }
 
+static void __init efi_arch_edid(EFI_HANDLE gop_handle)
+{
+}
+
 static void __init efi_arch_memory_setup(void)
 {
 }
--- a/xen/arch/x86/boot/video.S
+++ b/xen/arch/x86/boot/video.S
@@ -922,7 +922,14 @@ store_edid:
         pushw   %dx
         pushw   %di
 
-        cmpb    $1, bootsym(opt_edid)   # EDID disabled on cmdline (edid=no)?
+        movb    bootsym(opt_edid), %al
+        cmpw    $0x1313, bootsym(boot_edid_caps) # Data already retrieved?
+        je      .Lcheck_edid
+        cmpb    $2, %al                 # EDID forced on cmdline (edid=force)?
+        jne     .Lno_edid
+
+.Lcheck_edid:
+        cmpb    $1, %al                 # EDID disabled on cmdline (edid=no)?
         je      .Lno_edid
 
         leaw    vesa_glob_info, %di
--- a/xen/arch/x86/efi/efi-boot.h
+++ b/xen/arch/x86/efi/efi-boot.h
@@ -568,6 +568,49 @@ static void __init efi_arch_video_init(E
 #endif
 }
 
+#ifdef CONFIG_VIDEO
+static bool __init copy_edid(const void *buf, unsigned int size)
+{
+    /*
+     * Be conservative - for both undersized and oversized blobs it is unclear
+     * what to actually do with them. The more that unlike the VESA BIOS
+     * interface we also have no associated "capabilities" value (which might
+     * carry a hint as to possible interpretation).
+     */
+    if ( size != ARRAY_SIZE(boot_edid_info) )
+        return false;
+
+    memcpy(boot_edid_info, buf, size);
+    boot_edid_caps = 0;
+
+    return true;
+}
+#endif
+
+static void __init efi_arch_edid(EFI_HANDLE gop_handle)
+{
+#ifdef CONFIG_VIDEO
+    static EFI_GUID __initdata active_guid = EFI_EDID_ACTIVE_PROTOCOL_GUID;
+    static EFI_GUID __initdata discovered_guid = EFI_EDID_DISCOVERED_PROTOCOL_GUID;
+    EFI_EDID_ACTIVE_PROTOCOL *active_edid;
+    EFI_EDID_DISCOVERED_PROTOCOL *discovered_edid;
+    EFI_STATUS status;
+
+    status = efi_bs->OpenProtocol(gop_handle, &active_guid,
+                                  (void **)&active_edid, efi_ih, NULL,
+                                  EFI_OPEN_PROTOCOL_GET_PROTOCOL);
+    if ( status == EFI_SUCCESS &&
+         copy_edid(active_edid->Edid, active_edid->SizeOfEdid) )
+        return;
+
+    status = efi_bs->OpenProtocol(gop_handle, &discovered_guid,
+                                  (void **)&discovered_edid, efi_ih, NULL,
+                                  EFI_OPEN_PROTOCOL_GET_PROTOCOL);
+    if ( status == EFI_SUCCESS )
+        copy_edid(discovered_edid->Edid, discovered_edid->SizeOfEdid);
+#endif
+}
+
 static void __init efi_arch_memory_setup(void)
 {
     unsigned int i;
@@ -729,6 +772,7 @@ static void __init efi_arch_flush_dcache
 void __init efi_multiboot2(EFI_HANDLE ImageHandle, EFI_SYSTEM_TABLE *SystemTable)
 {
     EFI_GRAPHICS_OUTPUT_PROTOCOL *gop;
+    EFI_HANDLE gop_handle;
     UINTN cols, gop_mode = ~0, rows;
 
     __set_bit(EFI_BOOT, &efi_flags);
@@ -742,11 +786,15 @@ void __init efi_multiboot2(EFI_HANDLE Im
                            &cols, &rows) == EFI_SUCCESS )
         efi_arch_console_init(cols, rows);
 
-    gop = efi_get_gop();
+    gop = efi_get_gop(&gop_handle);
 
     if ( gop )
+    {
         gop_mode = efi_find_gop_mode(gop, 0, 0, 0);
 
+        efi_arch_edid(gop_handle);
+    }
+
     efi_arch_edd();
     efi_arch_cpu();
 
--- a/xen/common/efi/boot.c
+++ b/xen/common/efi/boot.c
@@ -118,7 +118,7 @@ static bool read_section(const EFI_LOADE
 
 static void efi_init(EFI_HANDLE ImageHandle, EFI_SYSTEM_TABLE *SystemTable);
 static void efi_console_set_mode(void);
-static EFI_GRAPHICS_OUTPUT_PROTOCOL *efi_get_gop(void);
+static EFI_GRAPHICS_OUTPUT_PROTOCOL *efi_get_gop(EFI_HANDLE *gop_handle);
 static UINTN efi_find_gop_mode(EFI_GRAPHICS_OUTPUT_PROTOCOL *gop,
                                UINTN cols, UINTN rows, UINTN depth);
 static void efi_tables(void);
@@ -758,7 +758,7 @@ static void __init efi_console_set_mode(
         StdOut->SetMode(StdOut, best);
 }
 
-static EFI_GRAPHICS_OUTPUT_PROTOCOL __init *efi_get_gop(void)
+static EFI_GRAPHICS_OUTPUT_PROTOCOL __init *efi_get_gop(EFI_HANDLE *gop_handle)
 {
     EFI_GRAPHICS_OUTPUT_MODE_INFORMATION *mode_info;
     EFI_GRAPHICS_OUTPUT_PROTOCOL *gop = NULL;
@@ -783,7 +783,10 @@ static EFI_GRAPHICS_OUTPUT_PROTOCOL __in
             continue;
         status = gop->QueryMode(gop, gop->Mode->Mode, &info_size, &mode_info);
         if ( !EFI_ERROR(status) )
+        {
+            *gop_handle = handles[i];
             break;
+        }
     }
     if ( handles )
         efi_bs->FreePool(handles);
@@ -1222,6 +1225,7 @@ efi_start(EFI_HANDLE ImageHandle, EFI_SY
     if ( use_cfg_file )
     {
         EFI_FILE_HANDLE dir_handle;
+        EFI_HANDLE gop_handle;
         UINTN depth, cols, rows, size;
 
         size = cols = rows = depth = 0;
@@ -1230,7 +1234,7 @@ efi_start(EFI_HANDLE ImageHandle, EFI_SY
                                &cols, &rows) == EFI_SUCCESS )
             efi_arch_console_init(cols, rows);
 
-        gop = efi_get_gop();
+        gop = efi_get_gop(&gop_handle);
 
         /* Get the file system interface. */
         dir_handle = get_parent_handle(loaded_image, &file_name);
@@ -1360,7 +1364,11 @@ efi_start(EFI_HANDLE ImageHandle, EFI_SY
         dir_handle->Close(dir_handle);
 
         if ( gop && !base_video )
+        {
             gop_mode = efi_find_gop_mode(gop, cols, rows, depth);
+
+            efi_arch_edid(gop_handle);
+        }
     }
 
     /* Get the number of boot modules specified on the DT or an error (<0) */
@@ -1387,7 +1395,6 @@ efi_start(EFI_HANDLE ImageHandle, EFI_SY
 
     efi_arch_edd();
 
-    /* XXX Collect EDID info. */
     efi_arch_cpu();
 
     efi_tables();
--- a/xen/include/efi/efiprot.h
+++ b/xen/include/efi/efiprot.h
@@ -724,5 +724,52 @@ struct _EFI_GRAPHICS_OUTPUT_PROTOCOL {
   EFI_GRAPHICS_OUTPUT_PROTOCOL_BLT         Blt;
   EFI_GRAPHICS_OUTPUT_PROTOCOL_MODE        *Mode;
 };
+
+/*
+ * EFI EDID Discovered Protocol
+ * UEFI Specification Version 2.5 Section 11.9
+ */
+#define EFI_EDID_DISCOVERED_PROTOCOL_GUID \
+    { 0x1C0C34F6, 0xD380, 0x41FA, { 0xA0, 0x49, 0x8a, 0xD0, 0x6C, 0x1A, 0x66, 0xAA} }
+
+typedef struct _EFI_EDID_DISCOVERED_PROTOCOL {
+    UINT32   SizeOfEdid;
+    UINT8   *Edid;
+} EFI_EDID_DISCOVERED_PROTOCOL;
+
+/*
+ * EFI EDID Active Protocol
+ * UEFI Specification Version 2.5 Section 11.9
+ */
+#define EFI_EDID_ACTIVE_PROTOCOL_GUID \
+    { 0xBD8C1056, 0x9F36, 0x44EC, { 0x92, 0xA8, 0xA6, 0x33, 0x7F, 0x81, 0x79, 0x86} }
+
+typedef struct _EFI_EDID_ACTIVE_PROTOCOL {
+    UINT32   SizeOfEdid;
+    UINT8   *Edid;
+} EFI_EDID_ACTIVE_PROTOCOL;
+
+/*
+ * EFI EDID Override Protocol
+ * UEFI Specification Version 2.5 Section 11.9
+ */
+#define EFI_EDID_OVERRIDE_PROTOCOL_GUID \
+    { 0x48ECB431, 0xFB72, 0x45C0, { 0xA9, 0x22, 0xF4, 0x58, 0xFE, 0x04, 0x0B, 0xD5} }
+
+INTERFACE_DECL(_EFI_EDID_OVERRIDE_PROTOCOL);
+
+typedef
+EFI_STATUS
+(EFIAPI *EFI_EDID_OVERRIDE_PROTOCOL_GET_EDID) (
+  IN      struct _EFI_EDID_OVERRIDE_PROTOCOL   *This,
+  IN      EFI_HANDLE                           *ChildHandle,
+  OUT     UINT32                               *Attributes,
+  IN OUT  UINTN                                *EdidSize,
+  IN OUT  UINT8                               **Edid);
+
+typedef struct _EFI_EDID_OVERRIDE_PROTOCOL {
+    EFI_EDID_OVERRIDE_PROTOCOL_GET_EDID  GetEdid;
+} EFI_EDID_OVERRIDE_PROTOCOL;
+
 #endif
 



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 09:49:00 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 09:49:00 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296851.505438 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZrQJ-00061N-IE; Thu, 31 Mar 2022 09:48:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296851.505438; Thu, 31 Mar 2022 09:48:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZrQJ-00061G-FG; Thu, 31 Mar 2022 09:48:59 +0000
Received: by outflank-mailman (input) for mailman id 296851;
 Thu, 31 Mar 2022 09:48:58 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=TTh1=UK=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZrQI-00061A-Am
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 09:48:58 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.111.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id c8b1afa1-b0d7-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 11:48:57 +0200 (CEST)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2108.outbound.protection.outlook.com [104.47.18.108]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-22-vT_QhzW5OQ6fFsj6KKT39g-1; Thu, 31 Mar 2022 11:48:55 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by DB8PR04MB5658.eurprd04.prod.outlook.com (2603:10a6:10:b2::32) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.21; Thu, 31 Mar
 2022 09:48:53 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.021; Thu, 31 Mar 2022
 09:48:53 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: c8b1afa1-b0d7-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648720137;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=+iOZotKkLcJY4CXebIky0sg+x0ejVE7dgfMqo24AelE=;
	b=mSZ+pWlHMapCjOv8Z5jMUFOZ31LDjO8M+c1k1sGz5DM3c6l1URMMLAM4OaGm/lZYDXL/sx
	RlaVeNxrerz1JdNARauPanNZ6nGM73MD/0+Mxzz7iHepvnUeuyOUK8hhnRKkd0UQQ8PMB0
	k/paZDVLiuQIlGTax664qcdGw+BlYhs=
X-MC-Unique: vT_QhzW5OQ6fFsj6KKT39g-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=cqsBu+6ePMeKPUKtlK+T6vluiV064gyg20OE+23C8O/tqo2sMVI2JTaqiCxoLzZ7uZHHl0khz5kobi+VWWpJzZphHspnbXlhudXNLwltSa8wp4axIPSj3sgMaapjs2Tsvk9qxbwRX4VE/6AZGVaBYjAuM+lsWUDFTtvTdBkpinlUl6aJVl0YIiBYWhCVGyU0i1X1QleG1aX3LgqYT+7uY7iV3x5P2DDfMBs4d/1Zwm3UOVRzBG1612bVGtTDPBjfHrilA7kZ5hmIgk7yN5jaSUuvozkb/RFh8ZXA7aLIklwxbGdTwxm7ieBs+Zfd65WBIM8m2wFsCOrsAdrYoh/g/w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=+iOZotKkLcJY4CXebIky0sg+x0ejVE7dgfMqo24AelE=;
 b=M0BjXn32/8ZRyQH0wWtsIVi6N28EeS6yHYI32DM239fiGn0cXprZqge/BE/aufuRvaX3B0aGYDSIsz3rM/Ot5pgOk34n4l08scdq8bxOXzjkKrVKRLZsfFjgm7rl4q7fNA8l6SxYJiomSqkPnY/ZC9ji3oxbhISSHiFrjCSFz/Nul2YuCdoxGCi/SyOgLsNRM0iD9b5G4ObEEi54OulC9uEh/mCEo5S/yPviqHBtGYGfceDp/nJYlYe6Oepa7EGtG34SuQzjmanJ6MqgVgDg6/N2Om7mpbDLpbqD1p4tHxdo7Km0Ng/GzCLNulnNSotyk9sK67UbEa2ENbLfKwRckQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <b2ddf830-e507-9d1d-2638-cd34d3391596@suse.com>
Date: Thu, 31 Mar 2022 11:48:51 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: [PATCH v4 4/8] x86/boot: simplify mode_table
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
References: <819eb552-d49d-e98a-9524-8d30c1b93908@suse.com>
In-Reply-To: <819eb552-d49d-e98a-9524-8d30c1b93908@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR04CA0066.eurprd04.prod.outlook.com
 (2603:10a6:20b:48b::19) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: a3ebcdac-364f-435a-3742-08da12fbaa48
X-MS-TrafficTypeDiagnostic: DB8PR04MB5658:EE_
X-Microsoft-Antispam-PRVS:
	<DB8PR04MB56586FB658BD6F19EB145573B3E19@DB8PR04MB5658.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(6916009)(54906003)(316002)(66476007)(8676002)(6512007)(6506007)(66946007)(31696002)(86362001)(508600001)(6486002)(66556008)(38100700002)(2616005)(4326008)(5660300002)(26005)(186003)(8936002)(2906002)(36756003)(31686004)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?ZXB6bHQwdHZqaDFCSkVMNi9vZHB3SW8raGRaMkgwalhyNTJZUmIvdnBPa0k4?=
 =?utf-8?B?YlNzV1Jpbk5hL0hvSE1ycmhCY2dOV01mYktkRGFVQk5welZKM2I5WFJkOHo0?=
 =?utf-8?B?a1N0ZTV1dzJMckZ4RThqY082dm1kZm5zN3h3RmUvSFlXOWhmZFdjYThlRnMw?=
 =?utf-8?B?YXQ5TU0zVzNJdDd1Zkk4SE5Fa2pJSFdOMFFOdlRBME53S2JTNGlLMWJOZGFn?=
 =?utf-8?B?K3llS3lBQWVRK0Q2eUoySFVvWFgwelY4VTI5TjRpMnZPOEp4Zm5aU25zVUFn?=
 =?utf-8?B?L2wzR0ExcHRSQzREOHhGZmNXMS9hTS9BcERjWGloc3JTSkRqQ2x0NVcwd25V?=
 =?utf-8?B?OS95SXJSSVhxZjdQMTZlM082TlJWQVZCc1RwM2JQWEdnTUR2TzdWcHBXTFpv?=
 =?utf-8?B?bWZhRFFHOGJhYWRBMUphekIxNE4wVVJob3BwZU8rYTh1ZXNWNTl1eXRVVXZS?=
 =?utf-8?B?bngram9GdCtJQ3hyN09NQ1RuUzFjNXlUNTNTeEx5ekV2eWJKTmtXdlVUY2Vn?=
 =?utf-8?B?YjZnOWZjNEtLNWs2NGFiTFBBdzRyMjA4Y1Nwc1c2OWJjNExQV24rcExHeXNS?=
 =?utf-8?B?c05NWm04SGVtWVFYWFdRcll1ZHdXZzJhbThlVE05TTJMRmwwY2Z5Q0hyYUxa?=
 =?utf-8?B?MmV5MGVPc09iRFdDOXl5dkdSMWRWMC9nYjhnSGd5b2lwRjQya1JJWnpsVXZ5?=
 =?utf-8?B?ZUVKZjlFNnhEVWtYZkhHZXkwbGhJNHp1bnFCU0p1cGFSRmZhL245TGxMRFlx?=
 =?utf-8?B?RURsQWQwMDlISTUwWm5UNHBqTGExbFpUVEFrMm5Na3dXQ1cyRVRMVWdCS2tv?=
 =?utf-8?B?cmZXUDRmQWN1MEJGY0pXQ1pEQS9xUDNqREtCU3JyVVA2R1dwT1JtUXVlT3k2?=
 =?utf-8?B?TWJMbmUwakQxSEZ2UmlzSW9zZ3FOVDk2c3FZcGxLRm9JYWQ0ZlF0cXI5aTcr?=
 =?utf-8?B?SThsN1dqbFVQd25QZUZDK09pSk1jSmxrRVdkRU5zQ0xGRFRXS2FIS0NIcE1U?=
 =?utf-8?B?TEtCSzdTM2crWG91dlZKWm95V1k4ZTRBVzBtOGVGV3J3d01JdzA3UlFJNi9x?=
 =?utf-8?B?ZXRyKzJOUW5mOGlVV1ZLUlJvVS9CRmR5N0pnWldKZnB0clU3Mm51RVVkOS84?=
 =?utf-8?B?dEEwdm5Ka1RCNWpqRlVYaENMSFJxVllDUzFZbTNXRkVETmZKWXZIaVhkU21E?=
 =?utf-8?B?Q0lLNGsyVzJlc0ljVjRnMjAycVZ6TkNwRW1sNVVxVCsvUmlESmszWVorR3pj?=
 =?utf-8?B?a1I2Y2ZBYXdpTzJzOGd0ejcxREV4STNhSEhqR2hWVUVBUFdtemdhdWw2ZXAw?=
 =?utf-8?B?Z295VjNrc1huYVAyV2JxWFYxeFYvdHR5dnVnaDZuOEREUS8xOXM0SWpzRFo3?=
 =?utf-8?B?alJpUzNKSlVOTmlHRG1GZENFM3ZPQXZacFZqSDhaeVYra25VMVBIMnR6UkZp?=
 =?utf-8?B?MlpyQndCQ2k5eG5pY0JweUNjdlJEaVRUODhDdEpSNkM5WjhOUGRJeHBEeVYv?=
 =?utf-8?B?M0Rpc2hsMW9QbjBBRWJmYlpDaXBVQzJOVFdxRGJES1N5YmN6TlZHSzYzWit6?=
 =?utf-8?B?YWZrV3lzNVluU1lhUDVBdWFYQTRzNklZMDVRL1EwR0ZDYXJRYjR1TzQ5Tkp0?=
 =?utf-8?B?VkV0QmdheGdmbFFJV3A5TGdicVhLOEVQV2pPNCtyQzNvQjhubEFaSzdCakVp?=
 =?utf-8?B?Z2srSlNrTVJSR0ROd1NWdjVBQ3JYZkNYbEZweXFFVWkxNTlVUDZDWnJvM1Fz?=
 =?utf-8?B?K0Y1TEVwN2ovTDdLT2tXWW5kWUdBRzNiQ2JsK3J1ZzRSWi9FTTNRbzJJaGpC?=
 =?utf-8?B?U0t1UDUvbUJNb0hHZDNqdi9scHV2OGhKb0I2RTExRm5VZm1aN1RhaGpVWG1x?=
 =?utf-8?B?RmU1Q1p3NjJJZXRyUzJlQW0vZ3o1dXpyRXBFL3JsWXVwSGlDbnkvM01rcXJ0?=
 =?utf-8?B?bXRLSVkrODg1ZXpzYURzQzBTV21pVUdoeHB6RzM4dTdWb0JlYjUxbkdtRGl1?=
 =?utf-8?B?L05ORGFodlcxS0ozbk9EbXpEOG83Y1Q1SjAvNCsyZHV4aE1hOHFiancvRkhp?=
 =?utf-8?B?b3ZPNWpyZGY1T09BRi9Mc0hFcjBSZ0NLYnJCT3RtVFVjdlloQXVTZjZ3Zzkz?=
 =?utf-8?B?VFBrWnFTQ3JYOEJEYnRmWThleEw0SVQwRzNkZGRHOXNRZnVORTRTeHA2cWR1?=
 =?utf-8?B?ZEs3Vkk0Ri9DQ1dFZ3B0c2QzTFNydk5mQ3Jvd3JDR3ZTc2pmZFhsR1dZcWxT?=
 =?utf-8?B?WkZ2cjV2QnhUMTU2cEpKOVBncFo0Zldza0xuZks5YUwwR3ozeHIvTHRheEw3?=
 =?utf-8?B?L2F4clBtSEFKR3JrR2lHbGdqMFhBNURxV3VkT2xpcklwZXhZazFSZz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a3ebcdac-364f-435a-3742-08da12fbaa48
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 09:48:53.3840
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: zI9RqP+WY0dJJvIj1GogcqYMv9v7jimkfSPI8TNIF1/EU7r3de2T2f97UsYvPx8AtHOwcdHlLXBrI/TKFjRrGg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR04MB5658

There's no point in writing 80x25 text mode information via multiple
insns all storing immediate values. The data can simply be included
first thing in the vga_modes table, allowing the already present
REP MOVSB to take care of everything in one go.

While touching this also correct a related but stale comment.

Signed-off-by: Jan Beulich <jbeulich@suse.com>

--- a/xen/arch/x86/boot/video.S
+++ b/xen/arch/x86/boot/video.S
@@ -655,8 +655,9 @@ outidx: outb    %al, %dx
 # Build the table of video modes (stored after the setup.S code at the
 # `modelist' label. Each video mode record looks like:
 #        .word        MODE-ID             (our special mode ID (see above))
-#        .byte        rows                (number of rows)
-#        .byte        columns             (number of columns)
+#        .word        rows                (number of rows)
+#        .word        columns             (number of columns)
+#        .word        0                   (color depth; gfx modes only)
 # Returns address of the end of the table in DI, the end is marked
 # with a ASK_VGA ID.
 mode_table:
@@ -665,12 +666,6 @@ mode_table:
         jnz     mtab1
 
         leaw    modelist, %di           # Store standard modes:
-        movw    $VIDEO_80x25,(%di)      # The 80x25 mode (ALL)
-        movw    $0x50,2(%di)
-        movw    $0x19,4(%di)
-        movw    $0x00,6(%di)
-        addw    $8,%di
-
         leaw    bootsym(vga_modes), %si # All modes for std VGA
         movw    $vga_modes_end-vga_modes, %cx
         rep     movsb
@@ -684,6 +679,7 @@ ret0:   ret
 
 # Modes usable on all standard VGAs
 vga_modes:
+        .word   VIDEO_80x25, 0x50,0x19,0        # 80x25
         .word   VIDEO_80x50, 0x50,0x32,0        # 80x50
         .word   VIDEO_80x43, 0x50,0x2b,0        # 80x43
         .word   VIDEO_80x28, 0x50,0x1c,0        # 80x28



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 09:49:36 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 09:49:36 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296854.505449 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZrQq-0006Xp-Qr; Thu, 31 Mar 2022 09:49:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296854.505449; Thu, 31 Mar 2022 09:49:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZrQq-0006Xi-Nu; Thu, 31 Mar 2022 09:49:32 +0000
Received: by outflank-mailman (input) for mailman id 296854;
 Thu, 31 Mar 2022 09:49:31 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=TTh1=UK=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZrQp-00061A-5O
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 09:49:31 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id dc672d3a-b0d7-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 11:49:30 +0200 (CEST)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2112.outbound.protection.outlook.com [104.47.18.112]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-23-9cWyOcaZPTeJwQBJ-cg6Jw-1; Thu, 31 Mar 2022 11:49:27 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by VI1PR04MB3264.eurprd04.prod.outlook.com (2603:10a6:802:11::24)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.16; Thu, 31 Mar
 2022 09:49:26 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.021; Thu, 31 Mar 2022
 09:49:26 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: dc672d3a-b0d7-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648720170;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=GFSJGrEWRuZxL/lqFamJoez8zlHu39Sdg/lvj6ulEMc=;
	b=aoBnjt6+glCRqKYvhWRwLixJ4A9ZW7DQtJeH7/BPfeZhmwrvJ8M1bRFRctzJHFI+iiEdY3
	cSkryCGRxDc74iY0W/F1sQGrKQ9HJ/VJJLNWdbaEtU0N4VVBa5L12BgcQqxC7gSUEUAHDB
	Dywbaou16EJHj8ZVBcRNP+wWUQnDXDE=
X-MC-Unique: 9cWyOcaZPTeJwQBJ-cg6Jw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Q6HKUaI6hAPF/qfzmEeIG6ashHBUg+9ou4depZltvtzFff8xmu7AOs0dAW8+LNrsKJyYIt/hr0ZX4Karux+QwICWEPbNqBM53krR96bLxz2oM7UazJ+TxcQ4eKV0EI+A2vxVwODXYN/aM3EiE+iuNidAjCtuKQBhsdRh3/OGLDneFksRgyS2ndHY63zQli4RVed6j9m4Rqnj+ZnMm+14aOkLQo8as6xsa57AiFmlwEtqYGKOGCCE2NzYzomWBpTuM+AXR/ELNIsd3iJyXyBjBXXJwakF91KXWETcRJF+5s7peCvwqOf9S0eWqRdWHe9mV5SKzGldeJSF8EU7vEW0cQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=GFSJGrEWRuZxL/lqFamJoez8zlHu39Sdg/lvj6ulEMc=;
 b=PUNrxXtszns2zAt4EE89WeOv0ElhZIAfxDPx8qimtm9ciqTOsE9qlV/XI/EK3xA27v6aQ6FWiFOM+bJ+P27npkBc5BcQYcrwRSNtUE1HCZAcTC/SE+HkfDwyEgroHJY2CXCGsPZV4xYaCNqUfFjll0K1LAQWpju9pfHkMtgLpXvilnmpvrgN2ZSGciT0lVmShCTXHnVhAwniVUw2HiTKMf79Y/S31xx5Fi8iFpIr2eBLB3deWDY6Mekfe4AEkZh9LTtSMJwSwIHnhr7uNZLAh7VRW1wflZT80bBp04Y51a82k8+cr8gxFTExyAeTw/AluS9vXVyAVsEXoPNsvCNHVg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <5e4ee27b-4904-b2bc-1650-df148b47387f@suse.com>
Date: Thu, 31 Mar 2022 11:49:24 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: [PATCH v4 5/8] x86/boot: fold branches in video handling code
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
References: <819eb552-d49d-e98a-9524-8d30c1b93908@suse.com>
In-Reply-To: <819eb552-d49d-e98a-9524-8d30c1b93908@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS9PR04CA0065.eurprd04.prod.outlook.com
 (2603:10a6:20b:48b::21) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: a8ca1b11-0074-4c80-8d31-08da12fbbe17
X-MS-TrafficTypeDiagnostic: VI1PR04MB3264:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB3264FDAC9B56501DCCE220B8B3E19@VI1PR04MB3264.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	N0vAaVsYAgOpWwNgby88QHYSw08UBgReEVbBDMQwPp+5w5tj8020q1xSbOo0SjmDAfJDTig8OPZClLtwNNnuXBlVb15dWF5dhfC+1eK8yPaZsX+1fuWsxo16pLx+yqVJQ+5Mc/6wcNWojbWC6tJ8p/Zm5Ur9f8+WAsv58So1USCTP9ExQaoUftuJqR6ddF92nguBipfhGBFP4PrQM2LBrXsfkdllSHVgVD695xC7bshTCXoojqp33kbz7+Lgpd8pUt5UMTgZOqCFU3HiLr9d/CkGucjBi/pjszM//pHXf7Hv05gNmRTy8mYfuxvn39KbGBNW5ytLle0F6ot1lv6FaM5tNaHP44BRE8GqbmuyVvoAWI2mv2cD+XW1mCIwB7JPlUFkyXgrtu7G92T3pyMllE7IBFwpuUiB2g81yUhe8F9wrcAMwNVqML0rHvnY9SXasDvfulH5z5UxsjxWhyEdqAfrQKfZmcp/GpjYVnODqmT2S3Tj5GjvExzI3X4Vxhc44IH8BBndvyuY2ZyKClCKjc2+Yg8JzAElnO3Hk8BE5dS7u++7sYGiuFg78E6FDCwTNtJ0zO76kJ9GCUhwLOTah0FM/R6/Jk0Oj8sHi2bqrtewFNexl4I7rmhUUr6QOahIdDYXYJkM6bbeT/WtPN+hq1FUtMGqBVCGlAIllT+sAvSCw/MDL8AXDHU3yooL2AKIO3O9iyHeJhjL/ID+uQbSu5AFXR+I1NqqxT8MJz2o637mDJ8VegxCtuqvtmLY4qQ5
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(31696002)(54906003)(6506007)(2906002)(86362001)(4326008)(8676002)(66476007)(66556008)(66946007)(508600001)(6512007)(6916009)(31686004)(36756003)(316002)(6486002)(2616005)(38100700002)(186003)(26005)(4744005)(8936002)(5660300002)(83380400001)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?Q0N1NjVBNmpieEMvbkJYNEovSDFieWMyUERHV25pTStndVJZcGVPdXVUY1M0?=
 =?utf-8?B?RmMzMlZMOG1uM3VHdlhLSVE1LzkyN3l0UVFlUW9kK1hNS0pjMjFwaFNmbS9U?=
 =?utf-8?B?aXU2R0JicFdoTW9Za2JqdFBzY0lPN3IyendHTTV6MkJaL1hRTFM2VUR1MUdQ?=
 =?utf-8?B?eDA3bko0ZEkvd2k3QmE4Yis0cDF4L015T2JkRDc5Z3RHMEg5Q3E3ejFnYkw0?=
 =?utf-8?B?Y0J1aFQrSlppWURTRUpxZVp3U0ZudTVMWm1BVHdZbTRCR3ZsSTN2QnMwckN6?=
 =?utf-8?B?M2QvaDNBUzl4QjcrTEpHRklyY0RnTi92NXRWUEpVaFl3U0ZLQnpBZzZRcGtE?=
 =?utf-8?B?ZGlJK1lWendqMm9LamQrQmZNcXRhSlBuV1FiNEs1NWJtbFUrUmZBWWtEVHhS?=
 =?utf-8?B?Q3BmZkJ5T1V1TmtpTi9SVUxrMmVOcHN0dGoxdFg1NFZ0QlFFWDlHZDhTeVBW?=
 =?utf-8?B?RVpETFVpcDdheHF1ZUFCamNpMFdZbkE5ZWd0LzZNc2J4aDhEOGxmUjFLdElo?=
 =?utf-8?B?THl3U0NxQitSRTFJUjVYVGRleFBmWG05eElraFlhSml3azJiZy9aNEdwbmhD?=
 =?utf-8?B?SzNNMWVtckRtZDE5bk5Ga1lPVUlrb21FV0twUk1YeGZXK2p6VE9KdEx3d1lq?=
 =?utf-8?B?a1oya3R1ckxjam4yeWxPSTg2YjRpNzlSRjlpWENISXl3cVFsQjAyM0YwWlV2?=
 =?utf-8?B?ZzNnM0k3QW5kWXpLNGY0S2N4QVliMDdTd1M3VnlkT2ZmNTRHaEJ4d0traWk1?=
 =?utf-8?B?N05jU3J0TVNoWVNDVHhpLzgyWHBJZlhkanNhbFF2YUxVdTMrNzJuN21qLzAz?=
 =?utf-8?B?OWczYlNqZUwzRHVxZXBnWS9WcDZQNUYzY0R5WTJIZTV2bzg3akpxSTdCdCs5?=
 =?utf-8?B?MXlFdmREWVBFa1FGODljQnlUQkxSV0V5cjZPeFdQVzZrdEZmQjYraHFVa2VT?=
 =?utf-8?B?L1V0NENtNW5WdFh5TnFUZUZINTdjQlBhZ2ZKaTdYbGJBblVobjJ2SHFaMzFP?=
 =?utf-8?B?MVhHSjlVRFNPZEs1Vk1yY0E1N2xFOEZxazhUWFhGWXcwZ2c3a0I3OWtob2xD?=
 =?utf-8?B?NVF1Ui9XREgzZXNqQzJGejZTZDd6RDBtUm5SS3ZpU0ZsTENCU3JZNVJ2SG5H?=
 =?utf-8?B?MDh0eWUrOXVlbzg1YU1XQlZuSHNQc1FKRFJKT0pFclpzNjRRYkpTa0xZK3p6?=
 =?utf-8?B?eVl6Wm9nU2xvUmVkNUFMdU05WmZ1cE5DQmJSdWdUTEwyMUxNT29paDk0YWhH?=
 =?utf-8?B?N2JwWklIcGpjY0NGUFV3NG9za1NIUkwrYU9Yd1BVWnJDVkp2eWpuNU1aMTV5?=
 =?utf-8?B?c0pzN1pnbnVzaklnNXpFL3dVakdOcVpQV2lob3RLeHQrYWt3eVVqUjVKb1ZI?=
 =?utf-8?B?dlloZUE1b2xjZ08vb2J6elhOd3VlUkdSaFMrVGlWa0JLQXovWFp5VUVRZjR5?=
 =?utf-8?B?cVI2ZGFsYkk0TzNoRGNCUHhTS0o3Q1JIZDJDSWJZeHpaT2t4dEpyaXFYWnAx?=
 =?utf-8?B?QVVVRE1rTmp0WVkveFoyWUhCbWZ6N0ZGeHVSdE5IKy9FTDZlZlRRUzRzczI1?=
 =?utf-8?B?S04vV0JjUldHZyt4MkpvUTFLQWkxV2o2KzBGVEJuR3dRVTZYOHZiYXB0L3Rh?=
 =?utf-8?B?alprWCtzZGYvcS9kaDlqTDNNTUxIeWNHS0JZeUtLTkMvN1czbWI5N29aUjFX?=
 =?utf-8?B?OURmWUtQK0RyUXhaclcxOFRCaVFiOVErOUdHWDZxRjNmeFR5T05LYkoydGt0?=
 =?utf-8?B?MlI1cFlTM3JaNUpVc2ZNc1dnOGY0YllDR29vVUVjSkNZRElTbVdkbVVybzl5?=
 =?utf-8?B?eFZUSWZaWmtpczFTTklJMlFJckx1L1BiTHRrczh6QXYzNUhUZ1ExMTM3V2Rl?=
 =?utf-8?B?RDdQZkpFS0lhSkl2ZTNIcXo3TDM4THVpL1ZiQUJuQXJlNzUyb3pnLzllbThk?=
 =?utf-8?B?UksxNFV4Ri9QOVVvZFRpeXY0ODhzZmJjS2IyMTFrRjNsMGRjN2lGbDFIanpj?=
 =?utf-8?B?bnFza0pYVWRtTGFvbWMwZ1FhSzB0cTR2N3A1Ris2bC8vOGI2a0U5RVdOM2Zm?=
 =?utf-8?B?N1lydjRaOXlORURHWjIzVndSKzQvRjVEbE54ejY0VEliVzBGVk9WNHJtWmIy?=
 =?utf-8?B?VVhJNHJwdUZQUlQ4VEg0OE5va2tadkttODl2ZUpjVzVCRk9JcWhLaGFWd1kx?=
 =?utf-8?B?NFBsNFl5K2FpWFV5RC9CaXJBUkpXSkwvQWJ6aGdWMzRJdHZIUm1ma3I5V2Q2?=
 =?utf-8?B?MHI1YTl5R0xWRFNSQit3L3c5VXpLOWQvR2NEV21hMkwrUXRlMVFEVTlEcytH?=
 =?utf-8?B?VEFwajBwQWJWZjlKdjJQL2NFOFROcDFsQ3p5cG5EN202b2R6eCs5Zz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a8ca1b11-0074-4c80-8d31-08da12fbbe17
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 09:49:26.2902
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: J32NOlCrpnEaeGoxte9mf0E6ec6EiQnGqhRDXfbVS8bDRSDNZR6DC7Fo+G9AHhGhQlg17xcaNQ24rVJmFHhLoA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB3264

Using Jcc to branch around a JMP is necessary only in pre-386 code,
where Jcc is limited to disp8. Use the opposite Jcc directly in two
places. Since it's adjacent, also convert an ORB to TESTB.

Signed-off-by: Jan Beulich <jbeulich@suse.com>

--- a/xen/arch/x86/boot/video.S
+++ b/xen/arch/x86/boot/video.S
@@ -332,8 +332,7 @@ lment:  movb    $0, (%di)
         cmpw    $0x656d, (%si)          # 'me'
         jnz     lmhx
         cmpw    $0x756e, 2(%si)         # 'nu'
-        jnz     lmhx
-        jmp     listm
+        jz      listm
 
 lmhx:   xorw    %bx, %bx                # Else => mode ID in hex
 lmhex:  lodsb
@@ -401,10 +400,8 @@ mode_set:
         cmpb    $VIDEO_FIRST_VESA>>8, %ah
         jnc     check_vesa
 
-        orb     %ah, %ah
-        jnz     setbad
-
-        jmp     setmenu
+        testb   %ah, %ah
+        jz      setmenu
 
 setbad: clc
         ret



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 09:50:08 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 09:50:08 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296857.505461 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZrRQ-0007m4-65; Thu, 31 Mar 2022 09:50:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296857.505461; Thu, 31 Mar 2022 09:50:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZrRQ-0007lx-1R; Thu, 31 Mar 2022 09:50:08 +0000
Received: by outflank-mailman (input) for mailman id 296857;
 Thu, 31 Mar 2022 09:50:07 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=TTh1=UK=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZrRP-0007le-1H
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 09:50:07 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id f190cfb4-b0d7-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 11:50:06 +0200 (CEST)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2108.outbound.protection.outlook.com [104.47.17.108]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-19-Upvu56G9M9SPSt_Bp4NJDw-1; Thu, 31 Mar 2022 11:50:03 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AS4PR04MB9650.eurprd04.prod.outlook.com (2603:10a6:20b:4cd::6)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.22; Thu, 31 Mar
 2022 09:50:02 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.021; Thu, 31 Mar 2022
 09:50:02 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f190cfb4-b0d7-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648720205;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=juBJGq4ZapzX50bKGD151YensGcEVFSl2L4HTOV0500=;
	b=RClEyANyI7gWsL37BhRxyCrBl/h0O70WZ2eUoPmlLGxa+w8vC+gbclGy0SmLUss3Q03yag
	dtvCvQTku32+ab2u1f1zpjH1RbvHTR9L9IVUQjoY/eWSiEM4XS7tSmcDAkzYbIOjdS1b/5
	XPxJRx/yyufOpQ7uYmg/4mH/bFO/KzQ=
X-MC-Unique: Upvu56G9M9SPSt_Bp4NJDw-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=Xqd+qw58Q/VJExivereJhYcTpxmmB2iJa5o2xUKA46HvNbv9m69CxCqcWey9a2tqXjzGg8BsJxSqrXJRh4pwNo5ZJqeLwYI8f6ofATmcb8yqzIDXsxzq2m5101YfDW0/N8cutkYcrqhClzMjkAURgYNXeYswNx9lYwAwSGntG10hgXYJY4Usx/8HqmoVHZjUelL48xIWWFnX41UqaskwcNdZmOLc9CIdKwyoWOlobaUZ886KUd9XXmzTCGi+WCkpc8LAFVw3vyiQBcCxRteQYOx6HM4jIHTqOt/t09rxzA/HgKrXIk3k4R7fXuyQH6nQNjrPZGcujQ4CHPe9JnUN6w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=juBJGq4ZapzX50bKGD151YensGcEVFSl2L4HTOV0500=;
 b=eF7JoghCr9UiYn0FMVy7CXJFqXKq41aj/uW3Z0ev74gutwzg2krTD0V3VI/w9eJKNVC3ogqWbzaH5XIWFU9K3MWGwMT3trjigHiUqFcDQ+GteM2Z5OnUHuuQ1jVSkvdKOvMb+Alj9oFbgu3FpVMhLXrDKWQ8mAo+aMhx88DHCg+xK1i5BhPZIIibHir/V2athC6KqBacTgaVryUE7fiPW7EjZiiiZrEYixOezChx1w9nR8s43Om48SQ37Rd62IW8hKmyOqNmlrmUYpleB5/rcC7CcXM+hKtKOJMJ3P6jsEI6yZMwQxLz+jGOUyaU6ZBUu3+6S2ls7HiQWKFXIgbLcw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <8b66f631-18be-7819-7982-c56c03220595@suse.com>
Date: Thu, 31 Mar 2022 11:50:00 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: [PATCH v4 6/8] x86/boot: fold/replace moves in video handling code
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
References: <819eb552-d49d-e98a-9524-8d30c1b93908@suse.com>
In-Reply-To: <819eb552-d49d-e98a-9524-8d30c1b93908@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AS8PR04CA0002.eurprd04.prod.outlook.com
 (2603:10a6:20b:310::7) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: efc601af-a35c-4b40-466a-08da12fbd363
X-MS-TrafficTypeDiagnostic: AS4PR04MB9650:EE_
X-Microsoft-Antispam-PRVS:
	<AS4PR04MB965037A70F4036A949DDC9A6B3E19@AS4PR04MB9650.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(5660300002)(508600001)(66476007)(6916009)(26005)(36756003)(2616005)(66946007)(186003)(54906003)(316002)(8676002)(31696002)(86362001)(66556008)(8936002)(6486002)(4326008)(2906002)(6512007)(6506007)(31686004)(38100700002)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?MGJJWTVaaDZnSEYzTU0yMy9LZkQzd0ZPbG1QNzZsWWRkRkdsNG5XSkhiYlNh?=
 =?utf-8?B?YllKZlBkSEU2R0dnUUdqQkUwSFlIeEZ3Qlh4U2RXNUpvMDQvSndiZFdCV29E?=
 =?utf-8?B?Y2l0S2ZZbFVFRHZmS2drNUJEVUhXQ2pJVks3TzJCUTlJTFJqVWRnTnRRSVdl?=
 =?utf-8?B?Z0kxYjJNSmxCNXVLRTJodFBaNHhmSHdieDhzRFRESERiRlkrY0tHSmErOVlr?=
 =?utf-8?B?WERESmRDQ3c5UkxTV0tEdEN6cDNIR3kzZzdpVklsbG5KVFc0bnE0TXdRNmEv?=
 =?utf-8?B?RVQxMFBVbHdJb3NMWXk4RFl4OStBQjZqbDYwdGcraXRMZVZZMnJkNlA1V0NP?=
 =?utf-8?B?TWN1TTF4RDFoRTdJMnFrQmhpaXFlM0JTSHN0SVU3QUpCV1V3dkVBYTRVTHlx?=
 =?utf-8?B?N2JSSjZaUVpIaTFYUDFYYjYyL1ZFR2FLbllQalRoQXNlYWxieXA4bHBWSllY?=
 =?utf-8?B?YlFJV3B0L2VvZDZBemlGQ2N3Umt3b09EVFl4SjYyL21Ga2txaUlLbXo0NTQ3?=
 =?utf-8?B?QzVTVGJOVVhxOHZsSFh4aXAzbjZTMnZvOTNCMldyNFNxWnV3U1Bna1hneHMy?=
 =?utf-8?B?OXJWQk45TWdvaWpHSm8wSitsLzV3ekhOTktLWSszaS83THFIVHlyUHl2dEpK?=
 =?utf-8?B?ZFBPUlA3ejVQamxFUzlJMU1KNEpLZzQ3alhwMkVNeDJORWNmekZIUlpGb29l?=
 =?utf-8?B?ajJPU21ZbndYbUtSanNQajRQdjJEUHNMZ250MW9MSCsvZXVmNlRSQ2cwNEVx?=
 =?utf-8?B?Nkd4MXF2ZmdYb2JsQlpxTFRwdmFCTElyQ2RsNW5DQ2FWZWFTSzNQSnliMDMv?=
 =?utf-8?B?K0l4OU9EbkU3Szg1MmdYWjJaWTB5RW9KMzdLZzBRVFY5UUxOdERMM0hFWUtl?=
 =?utf-8?B?Zmx5eUJmU21NOWhjU3BmakgyT2VNdTB2MzI1elAzZG03cHBYbXRBb1NCM2Mw?=
 =?utf-8?B?aTkrWGZxN0pvT3lNVGtveGtKTnp6NnFmRmN3b0Qxb0NxUXd2V0IrRjhNcFg0?=
 =?utf-8?B?bk9FOFlJbWFlN21GdmpZNjNJdGNYV0dHYmsrRm5STk4yNy9EOWxRU0wxbHBa?=
 =?utf-8?B?NEZSUElqQ1dUYWNZRlR3dzIvVEtxRzVwOXJZTGlyL1hITnFlZGs1dFZLWHZQ?=
 =?utf-8?B?Y1VxUTJHb2pyNmo5YS95cVorOEIwdUNvd1pySG1JbEllYUtibGFzcUVVQlF4?=
 =?utf-8?B?NjNXcm50c3FxeDlrUm9sazI1Nml1R2tTTnh4c1dhZWk5eUE2SWJrQmhMbVhM?=
 =?utf-8?B?dEhuQ3hKN21BMGsyMWV4TFdvbWdqUkhjdm4rMnhwbEEwVG4xOVNTRGFxNlQ3?=
 =?utf-8?B?Y2RUSjVMbGxIcStUVDBJS3B6S1lSSlgvK2hVTjhXMUlJM0ZUQm1QS0xrcWc3?=
 =?utf-8?B?ZW1oalVLNnpNa3dFZzd5a21QZENVZzlHcDNhUWgzZ3lNK1lPam80dGh6byti?=
 =?utf-8?B?S2xMRTNHVUE4NFFyQ3VNQnlpekhiYWx2OGlMZU5MUVVGMFBSL2xxY2x5SzRZ?=
 =?utf-8?B?ZVFhNzFrRVJ2VSt1a0hhalV4U0FLZHo0R3FoM3d4ckVxc2dCM1Y5NXg2a0ZL?=
 =?utf-8?B?dDVKQ3pBc08wZzZHdHZCM1pLWTZLMVJicmJBcllwZzBqYlNtVE5pQzcvRUd3?=
 =?utf-8?B?SytPT0F6TzQvTHgycVhhTmpCd3dKdGJGUTlrVjBWc0dvRlNvV3d0VXFpanFW?=
 =?utf-8?B?YmQzZVIxU0xkcXBHZWcwUzc5UmRJb0hyNHR5eFZ5a2lGb1d2VnVyS3VnZWJY?=
 =?utf-8?B?RThKMHBPalJMeGsvMm1MZkMxUGFiakJBUDROMHJBS1l6Umh5bEdIY0k5bnBs?=
 =?utf-8?B?NTFHY2lQYUUyZUhKakw4L0RtcWFCNUJwbVNtRlBwRGV0R003ZUl1THo2R3dL?=
 =?utf-8?B?azVzRlkzM0hxb0htNmJsZXFZMUZVV3N1L3NFV1dreVVUVWZwaHZxeE4rSW55?=
 =?utf-8?B?bWlhL3plSVZSRUVjU25SdDdScE00YitYWVExQ3NyQ1lFZHN4UEZrZDJHTGJu?=
 =?utf-8?B?OGRQLzBiZG51QTd5NWhEa3RaVGxrdGpKNVJjYjczVGtqdXlBMEZjeXQwUmJU?=
 =?utf-8?B?anFITm04aFdKbCtoREFaWENxTnVNN3JkalNQM1VjQ1hGdDI3RjhjMy9WUTAv?=
 =?utf-8?B?c3ZhL2s3Y1NnTXVSK0puK2NjVnFYVDhhS3Q5QitaY254cFhTM3doTlgzQ0tN?=
 =?utf-8?B?alZZM0dQcEhzZ3hHK09wVXZCaW41TXJhVkZ0SWViYXN4R2QzQ1N0YTk2eFBS?=
 =?utf-8?B?ZW9tRG5SWkN6bythOVVsWFB0Q2JFbWYwRzdxZU1oRW9IYXJnQXJFWG5kTVVM?=
 =?utf-8?B?aThBWHh6STQ1VTh3UVM4UC9uS1I3L1luSFRJQXp1RDNwVkordGgvQT09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: efc601af-a35c-4b40-466a-08da12fbd363
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 09:50:02.1748
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: BKzQJXXLNLYMhdzrvC3bLnKcWKvUpeTDLHuAqcGV1MzaO4HPxIB3W1RsuzMHxWOYsQtJV/gMQa50nvqc/bn1QQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS4PR04MB9650

Replace (mainly) MOV forms with shorter insns (or sequences thereof).

Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
Of course there's more room for improvement. For example there look to
be a number of LEAs which really could be MOVs.

--- a/xen/arch/x86/boot/video.S
+++ b/xen/arch/x86/boot/video.S
@@ -121,8 +121,7 @@ mopar_gr:
         movw    %ax, _param(PARAM_LFB_WIDTH)
         movw    20(%di), %ax
         movw    %ax, _param(PARAM_LFB_HEIGHT)
-        movb    25(%di), %al
-        movb    $0, %ah
+        movzbw  25(%di), %ax
         movw    %ax, _param(PARAM_LFB_DEPTH)
         movl    40(%di), %eax
         movl    %eax, _param(PARAM_LFB_BASE)
@@ -135,8 +134,7 @@ mopar_gr:
 
 # get video mem size
         leaw    vesa_glob_info, %di
-        xorl    %eax, %eax
-        movw    18(%di), %ax
+        movzwl  18(%di), %eax
         movl    %eax, _param(PARAM_LFB_SIZE)
 
 # store mode capabilities
@@ -144,14 +142,11 @@ mopar_gr:
         movl    %eax, _param(PARAM_CAPABILITIES)
 
 # switching the DAC to 8-bit is for <= 8 bpp only
-        movw    _param(PARAM_LFB_DEPTH), %ax
-        cmpw    $8, %ax
+        cmpw    $8, _param(PARAM_LFB_DEPTH)
         jg      dac_done
 
 # get DAC switching capability
-        xorl    %eax, %eax
-        movb    10(%di), %al
-        testb   $1, %al
+        testb   $1, 10(%di)
         jz      dac_set
 
 # attempt to switch DAC to 8-bit
@@ -164,17 +159,17 @@ mopar_gr:
 
 dac_set:
 # set color size to DAC size
-        movb    bootsym(dac_size), %al
+        movzbw  bootsym(dac_size), %ax
         movb    %al, _param(PARAM_LFB_COLORS+0)
         movb    %al, _param(PARAM_LFB_COLORS+2)
         movb    %al, _param(PARAM_LFB_COLORS+4)
         movb    %al, _param(PARAM_LFB_COLORS+6)
 
 # set color offsets to 0
-        movb    $0, _param(PARAM_LFB_COLORS+1)
-        movb    $0, _param(PARAM_LFB_COLORS+3)
-        movb    $0, _param(PARAM_LFB_COLORS+5)
-        movb    $0, _param(PARAM_LFB_COLORS+7)
+        movb    %ah, _param(PARAM_LFB_COLORS+1)
+        movb    %ah, _param(PARAM_LFB_COLORS+3)
+        movb    %ah, _param(PARAM_LFB_COLORS+5)
+        movb    %ah, _param(PARAM_LFB_COLORS+7)
 
 dac_done:
 # get protected mode interface information
@@ -504,7 +499,8 @@ setvesabysize:
         call    mode_table
         leaw    modelist,%si
 1:      add     $8,%si
-        cmpw    $ASK_VGA,-8(%si)        # End?
+        movw    -8(%si),%bx
+        cmpw    $ASK_VGA,%bx            # End?
         je      setbad
         movw    -6(%si),%ax
         cmpw    %ax,bootsym(vesa_size)+0
@@ -515,9 +511,7 @@ setvesabysize:
         movw    -2(%si),%ax
         cmpw    %ax,bootsym(vesa_size)+4
         jne     1b
-        movw    -8(%si),%ax
-        movw    %ax,%bx
-        movw    %ax,bootsym(boot_vid_mode)
+        movw    %bx,bootsym(boot_vid_mode)
         jmp     check_vesa
 
 # Table of routines for setting of the special modes.
@@ -773,8 +767,7 @@ vesa2:  pushw   %cx
         movw    %bx, 2(%di)
         movw    0x14(%di), %bx          # Height
         movw    %bx, 4(%di)
-        xorw    %bx, %bx
-        movb    0x19(%di), %bl          # Depth
+        movzbw  0x19(%di), %bx          # Depth
         movw    %bx, 6(%di)
 
         addw    $8, %di                 # The mode is valid. Store it.
@@ -901,8 +894,7 @@ gettime:
         movb    %dh, %al                # %dh contains the seconds
         andb    $0x0f, %al
         movb    %dh, %ah
-        movb    $0x04, %cl
-        shrb    %cl, %ah
+        shrb    $4, %ah
         aad
         popw    %cx
         ret
@@ -959,8 +951,8 @@ store_edid:
 .Lforce_edid:
         movw    $0x4f15, %ax            # do VBE/DDC
         movw    $0x01, %bx
-        movw    $0x00, %cx
-        movw    $0x00, %dx
+        xorw    %cx, %cx
+        xorw    %dx, %dx
         movw    $bootsym(boot_edid_info), %di
         int     $0x10
 



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 09:50:30 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 09:50:30 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296860.505472 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZrRm-0008PP-HV; Thu, 31 Mar 2022 09:50:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296860.505472; Thu, 31 Mar 2022 09:50:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZrRm-0008PI-ET; Thu, 31 Mar 2022 09:50:30 +0000
Received: by outflank-mailman (input) for mailman id 296860;
 Thu, 31 Mar 2022 09:50:28 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=TTh1=UK=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZrRk-0006u5-Kp
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 09:50:28 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id fe6241e3-b0d7-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 11:50:27 +0200 (CEST)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com
 (mail-db8eur05lp2104.outbound.protection.outlook.com [104.47.17.104]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-9-JmfEzXE7Nzqk5lDZDet1DA-1; Thu, 31 Mar 2022 11:50:25 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by AS4PR04MB9650.eurprd04.prod.outlook.com (2603:10a6:20b:4cd::6)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.22; Thu, 31 Mar
 2022 09:50:23 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.021; Thu, 31 Mar 2022
 09:50:23 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fe6241e3-b0d7-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648720227;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=Fb7K4sY64D9J9sN6DhUdaWAIhUcQkX9yK1qzj7M9L8g=;
	b=Tfdlg0NRhiQKRxaNrdJu3fmKdo3DFNunPxHF+DXkmEZA3mqyT88CSZkmx+38KjaAtHLzIk
	4gEVv6CZQ4EO+ZmP4qrAp2eK8hqpKSw+FoGmtG1VAb5Cdelz9LfXqpYjJxu5WgCjLz5qJC
	5Si2ja8RG0zEo9vEZsuLHRvW5Jf8prU=
X-MC-Unique: JmfEzXE7Nzqk5lDZDet1DA-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=g39uerfTZViCOSLz6tP14DhRz5jlE+hdNkDMHBhcy2xDEcPB8KlnE/XzL8PseLGBkGpLv3Bg3Zqya2a3v+P29RqJcJBbQ5gNkfnlGM5ks4bmSU/Q27N2f9P/8NuB2394ItYeCRq5GnySBQstpel+z4xjoEHaXKvyuCgQCx/OO2Kz2mguB09zgD31CWIZbfFhoXnG0laf6jCvgXivum4Qj3MK5gKIkVpVUZfmkt+CnbhjqVJ89knpauLDiTqrCUU6DBuQAHVrAJtUy8Mka9YUcQ2VBvrOIHmQ9zBK2J9zKF8oGlLvshD1eqKLF/w62lLbPvTV/FFj/In9Knjk6SptPg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=Fb7K4sY64D9J9sN6DhUdaWAIhUcQkX9yK1qzj7M9L8g=;
 b=I8cWiW3JEmt2My8XkAJA4YPPxrN6+Du4gDpW7e/vQT1yUMJBNl8qQLjxs4Rja2KJLn6Grc/BIVHbHpo77roMGSB0llbxjsaEW0usn5PumubPJhk5xu/YXFWKqpp7wCIh6EEcCPwGlrAqAX2L3ly7Rb/j2Nyx3K7W1w87L1vAT7hnRANWMSe6iegl3EGODvLqICDVoLn9fNHTM42Smj9aH7T+gnYmfuiFfFfqGbHORGEsRh1JQ6EflzzXWZQUnuaHedtbb+eXLTDQGloRXaTTEIni1faW/LgdCzGZh202MSB5aLtxRXEdEDHIenTFO2vTa9THXOGh5e2hWJRdZPj1wA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <48666252-a448-9c17-cacf-2788fe1a3c17@suse.com>
Date: Thu, 31 Mar 2022 11:50:20 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: [PATCH v4 7/8] x86/boot: LEA -> MOV in video handling code
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
References: <819eb552-d49d-e98a-9524-8d30c1b93908@suse.com>
In-Reply-To: <819eb552-d49d-e98a-9524-8d30c1b93908@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM6P192CA0070.EURP192.PROD.OUTLOOK.COM
 (2603:10a6:209:82::47) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: f4a382e7-2e40-463a-81d4-08da12fbe067
X-MS-TrafficTypeDiagnostic: AS4PR04MB9650:EE_
X-Microsoft-Antispam-PRVS:
	<AS4PR04MB96503446F2955DC2C93D31C7B3E19@AS4PR04MB9650.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(5660300002)(508600001)(66476007)(6916009)(26005)(36756003)(2616005)(66946007)(186003)(54906003)(316002)(8676002)(31696002)(86362001)(66556008)(8936002)(6486002)(4326008)(2906002)(6512007)(6506007)(31686004)(38100700002)(83380400001)(43740500002)(45980500001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?RFBRQmpDZTdyQlZkZjVwK09Zaks5U20vYUFuUVhZbFhxcVpnZEI2SVlsUTg5?=
 =?utf-8?B?S2d0ZFpBd25jMXZrNTJ2b2lqUGtzallkV09BTmhhcTNXdUlIK2REMGtHS1Rk?=
 =?utf-8?B?M01VU0VHVnFmcjZjdTVCRk5uaXVOSVdqRzA5bFNETWJYODYzVU1CdEVyZUQw?=
 =?utf-8?B?dmk3SlVxNmNoTmlFKzhBTVAwZWxNSjYwb2p1c2dGR1ZMYVFjY0h0cGRCWWFZ?=
 =?utf-8?B?OFJQZzFjcDBlNEp0RXJXekpsUTBnL0M4eGg5WHV5VTYrdzEyamhpVEFkY1Y1?=
 =?utf-8?B?bWVKb2RnV3V3dlVZc0t2Umo4UG5mWDAySmZnRXdraVdJeVpEQ3YreHp3dUhM?=
 =?utf-8?B?QkJmSkdXUy9vbXhtZ01XdWNaa2NwWlQ1VFI5cUVpS2Q5THNMaTFpeU0vUEF1?=
 =?utf-8?B?am12TjZUOGZYejNMcHdFNUhCNHBxUXJjV3h2dE1PYlZjdnRJQStXb2lEOGhv?=
 =?utf-8?B?VDR2cXErUnBEdzNVcEJmL1A2d0lpRTB6VXJzOUg4Z1k2VlVHSE1hNnptQ2FU?=
 =?utf-8?B?Z01MS205VXMySUxOWFVCeDMxOGV3d1NsTXhwcUxISVhBRTVsTjNMZWY1OHBU?=
 =?utf-8?B?QjUwZkRVYTczdlRndlE2WlNHSkZnanlnMlFEbDk0YmoycW41dEtRWjB4bDVw?=
 =?utf-8?B?WUVPZ2NYV0tTbHh6NzhIZ201aUU5bmc0NFRGZVpyL1JkTFFhNTdBckFIZFFh?=
 =?utf-8?B?bEd0SlRyZ01ZMGprcFdENnhsNC9TV2ViMmtNa0xMcGxHcnpBWHRqOTNRWkNq?=
 =?utf-8?B?OTk3VVIwZjZmb3RPTWpVL29TZndkNjRCRlBnejAvMkhTL3RuZGFnRjV6WWM4?=
 =?utf-8?B?TU5FeGNCelNHcWZyM3RQUnQySXhza3lyR0F6TEYxSUhiZDdJdlF4VG1lbVBo?=
 =?utf-8?B?UGhnVEUzUW14Sk9WalFHS2tQSlFEM2x1SXJnamNRN0NscmlVaHRsODFmVmVD?=
 =?utf-8?B?dnZ0ZW9ORU5va0dnUzFLdmlyTzBBcS94TFZMR0Z4QzNSNFR3K2Z4RG02NTJY?=
 =?utf-8?B?QXR3YkVPcG9MNnhmMldFdTcwZzJ2eStCbXhFckI1TE9rc0swcm4wYzBXVFZZ?=
 =?utf-8?B?UWRjcEFLaTJ0b3hpWFVmclpnQ3FIbkhNM1JydDZhVWU3RHJLNTArQi9nTC9r?=
 =?utf-8?B?QXZwRUJBVTFvUGVKZ3lHVzhEa1BPanFKVml2a1M4YndEclBXN1JFK2EyMmh5?=
 =?utf-8?B?YStIbnZLQkcwTG9rdHBHWnNwN1VjNVNseEtCWkFFYVUwMmk1L2I3cUwrTmFm?=
 =?utf-8?B?R0Q2RVhNQVgvSUl2TXNHdUlNY2l1bVY3eU83ZTNnTjR0U05vQnlDWlAzak1m?=
 =?utf-8?B?bG53Wlp3djIyY3pxYnI3WWsvQWhPendZaUlWVitQdWJDVFJCR2JQTXFDMG9s?=
 =?utf-8?B?SFRoYmd1Z2FWMTNpaWpLc0FWczVXbXhRdUllMFBvT2NzVVJKdkJLRms4blB4?=
 =?utf-8?B?Uy9DQVpJemxNdE9vSk1JNHBUbUw0SHR5T0RreDRXcmsrajZxdllxbnR5NXdB?=
 =?utf-8?B?MTl0Y1B1VUhFZ0xxWWZIQ1JWblFuT2F2MDF1d1llY1RMWHYrSUY5Ym1pMVJ4?=
 =?utf-8?B?WXNqbGtNZlJKQmpLMnJmVUdhNW5uN2dpWFVVbGNOQ3ZIb1dGMU9tWUtlM1FT?=
 =?utf-8?B?aExNMzZGM3FqdS9UR2R5NHpXck5PVmFDZ21lS1lmbTh2VHJMdFVtK3RFbC96?=
 =?utf-8?B?dEpiUmxwMVZldFlIUlFTVXRZc2d0NUNCSFMrc3IxMm8wbEp5YlpqZWxkUmpI?=
 =?utf-8?B?Szc1Y2NjQzc3TlVJNzZNQVJUcy8rdU92WmQ5NWJaN3FCekZxZjdXdG1qWWdw?=
 =?utf-8?B?RmtmeGtFL0NVR0FYWk5LWmt3ZWFHd2R6V3BmVnUvUG8rQUJqdHh2OURWYWNL?=
 =?utf-8?B?YUdhQkFwbFlTMnlPSEE5ako2Y0tsWk1UNWRkZHVrUGtWbW5nR05WUHJhQ2Jp?=
 =?utf-8?B?Y0xJdllHNCtjdVpka1dqd1JyM25nM0dQZTRjUWJkd1FhMklKeEplanRqMzN1?=
 =?utf-8?B?cUUxbitPSi9yOTlBL1RoWXJrcU1PMHRsUld2cVowWEpBSitudmg1UnRmenhX?=
 =?utf-8?B?QjRJVWtVYVZxOEJNbEJGVzdCTzVOU3NYZXc2cjgvdk9LZFFSZ21hS29BWEtT?=
 =?utf-8?B?Y0s4QmhZNGRPKzlleUQ2OVdqZVFuQWF0UE9hYlZXckV5Vi9adkZFcVpSbm1J?=
 =?utf-8?B?UkQwN2ljZHlVVTk0T1RzalJkcjZBdFp3Z0dkY284RWYwa2FxVFR3WkgvSS9w?=
 =?utf-8?B?VjVnYVFrS0pCRUlyTGhzdDlqN0pSdXhiQ0MyMHorQ05qdjIwNGRvOUoyUk5y?=
 =?utf-8?B?eDNrb2VHL3hHZnRwUkNMZkxrOTNuUmtoYzJrVjNYdG93ZitIUmdxdz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f4a382e7-2e40-463a-81d4-08da12fbe067
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 09:50:23.8411
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: iBpu9gf0yvNU54SvTOiJRfWsZvFHcPeiQF36/CvmmGhWaGf/+B0jWOKtleyVf6bCRSc4CICPq8BclmkpGG7OpA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS4PR04MB9650

Replace most LEA instances with (one byte shorter) MOV.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
v4: New.

--- a/xen/arch/x86/boot/video.S
+++ b/xen/arch/x86/boot/video.S
@@ -60,7 +60,7 @@ video:  xorw    %ax, %ax
         call    mode_set                        # Set the mode
         jc      vid1
 
-        leaw    bootsym(badmdt), %si            # Invalid mode ID
+        movw    $bootsym(badmdt), %si           # Invalid mode ID
         call    prtstr
 vid2:   call    mode_menu
 vid1:   call    store_edid
@@ -113,7 +113,7 @@ mopar2: movb    %al, _param(PARAM_VIDEO_
 
 # Fetching of VESA frame buffer parameters
 mopar_gr:
-        leaw    vesa_mode_info, %di
+        movw    $vesa_mode_info, %di
         movb    $0x23, _param(PARAM_HAVE_VGA)
         movw    16(%di), %ax
         movw    %ax, _param(PARAM_LFB_LINELENGTH)
@@ -133,7 +133,7 @@ mopar_gr:
         movw    %ax, _param(PARAM_VESA_ATTRIB)
 
 # get video mem size
-        leaw    vesa_glob_info, %di
+        movw    $vesa_glob_info, %di
         movzwl  18(%di), %eax
         movl    %eax, _param(PARAM_LFB_SIZE)
 
@@ -189,7 +189,7 @@ no_pm:  pushw   %ds
 
 # The video mode menu
 mode_menu:
-        leaw    bootsym(keymsg), %si    # "Return/Space/Timeout" message
+        movw    $bootsym(keymsg), %si   # "Return/Space/Timeout" message
         call    prtstr
         call    flush
 nokey:  call    getkt
@@ -206,22 +206,22 @@ nokey:  call    getkt
 defmd1: ret                             # No mode chosen? Default 80x25
 
 listm:  call    mode_table              # List mode table
-listm0: leaw    bootsym(name_bann), %si # Print adapter name
+listm0: movw    $bootsym(name_bann), %si # Print adapter name
         call    prtstr
         movw    bootsym(card_name), %si
         orw     %si, %si
         jnz     an2
 
-        leaw    bootsym(vga_name), %si
+        movw    $bootsym(vga_name), %si
         jmp     an1
 
 an2:    call    prtstr
-        leaw    bootsym(svga_name), %si
+        movw    $bootsym(svga_name), %si
 an1:    call    prtstr
-        leaw    bootsym(listhdr), %si   # Table header
+        movw    $bootsym(listhdr), %si  # Table header
         call    prtstr
         movb    $0x30, %dl              # DL holds mode number
-        leaw    modelist, %si
+        movw    $modelist, %si
 lm1:    cmpw    $ASK_VGA, (%si)         # End?
         jz      lm2
 
@@ -240,7 +240,7 @@ lm1:    cmpw    $ASK_VGA, (%si)
         testb   $0xff,(%si)
         jnz     1f
         push    %si
-        leaw    bootsym(textmode), %si
+        movw    $bootsym(textmode), %si
         call    prtstr
         pop     %si
         lodsw
@@ -257,7 +257,7 @@ lm1:    cmpw    $ASK_VGA, (%si)
 
         cmpb    $'z'+1, %dl
         jnz     skip_bail
-        leaw    bootsym(menu_bail_msg), %si
+        movw    $bootsym(menu_bail_msg), %si
         call    prtstr
         jmp     lm2
 
@@ -266,13 +266,13 @@ skip_bail:
         jnz     skip_pause
         push    %si
         push    %dx
-        leaw    bootsym(menu_more_msg), %si  # '<press space>'
+        movw    $bootsym(menu_more_msg), %si # '<press space>'
         call    prtstr
         call    flush
 1:      call    getkey
         cmpb    $0x20, %al              # SPACE ?
         jne     1b                      # yes - manual mode selection
-        leaw    bootsym(crlft), %si
+        movw    $bootsym(crlft), %si
         call    prtstr
         pop     %dx
         pop     %si
@@ -283,9 +283,9 @@ skip_pause:
         movb    $'a', %dl
         jmp     lm1
 
-lm2:    leaw    bootsym(prompt), %si    # Mode prompt
+lm2:    movw    $bootsym(prompt), %si   # Mode prompt
         call    prtstr
-        leaw    bootsym(edit_buf), %di  # Editor buffer
+        movw    $bootsym(edit_buf), %di # Editor buffer
 lm3:    call    getkey
         cmpb    $0x0d, %al              # Enter?
         jz      lment
@@ -315,9 +315,9 @@ lmbs:   cmpw    $bootsym(edit_buf), %di
         jmp     lm3
         
 lment:  movb    $0, (%di)
-        leaw    bootsym(crlft), %si
+        movw    $bootsym(crlft), %si
         call    prtstr
-        leaw    bootsym(edit_buf), %si
+        movw    $bootsym(edit_buf), %si
         cmpb    $0, (%si)               # Empty string = default mode
         jz      lmdef
 
@@ -373,7 +373,7 @@ mnusel: lodsb
 lmuse:  call    mode_set
         jc      lmdef
 
-lmbad:  leaw    bootsym(unknt), %si
+lmbad:  movw    $bootsym(unknt), %si
         call    prtstr
         jmp     mode_menu
 lmdef:  ret
@@ -424,13 +424,13 @@ setmenu:
         jmp     mode_set
 
 check_vesa:
-        leaw    vesa_glob_info, %di
+        movw    $vesa_glob_info, %di
         movw    $0x4f00, %ax
         int     $0x10
         cmpw    $0x004f, %ax
         jnz     setbad
 
-        leaw    vesa_mode_info, %di     # Get mode information structure
+        movw    $vesa_mode_info, %di    # Get mode information structure
         leaw    -VIDEO_FIRST_VESA(%bx), %cx
         movw    $0x4f01, %ax
         int     $0x10
@@ -497,7 +497,7 @@ inidx:  outb    %al, %dx
 
 setvesabysize:
         call    mode_table
-        leaw    modelist,%si
+        movw    $modelist,%si
 1:      add     $8,%si
         movw    -8(%si),%bx
         cmpw    $ASK_VGA,%bx            # End?
@@ -656,8 +656,8 @@ mode_table:
         orw     %di, %di
         jnz     mtab1
 
-        leaw    modelist, %di           # Store standard modes:
-        leaw    bootsym(vga_modes), %si # All modes for std VGA
+        movw    $modelist, %di          # Store standard modes:
+        movw    $bootsym(vga_modes), %si # All modes for std VGA
         movw    $vga_modes_end-vga_modes, %cx
         rep     movsb
 
@@ -665,7 +665,7 @@ mode_table:
 
         movw    $ASK_VGA, (%di)         # End marker
         movw    %di, bootsym(mt_end)
-mtab1:  leaw    modelist, %si           # SI=mode list, DI=list end
+mtab1:  movw    $modelist, %si          # SI=mode list, DI=list end
 ret0:   ret
 
 # Modes usable on all standard VGAs
@@ -681,7 +681,7 @@ vga_modes_end:
 
 # If the current mode is a VESA graphics one, obtain its parameters.
 set_current:
-        leaw    vesa_glob_info, %di
+        movw    $vesa_glob_info, %di
         movw    $0x4f00, %ax
         int     $0x10
         cmpw    $0x004f, %ax
@@ -692,7 +692,7 @@ set_current:
         cmpw    $0x004f, %ax
         jne     .Lsetc_done
 
-        leaw    vesa_mode_info, %di     # Get mode information structure
+        movw    $vesa_mode_info, %di    # Get mode information structure
         movw    %bx, %cx
         movw    $0x4f01, %ax
         int     $0x10
@@ -715,7 +715,7 @@ set_current:
 # Detect VESA modes.
 vesa_modes:
         movw    %di, %bp                # BP=original mode table end
-        leaw    vesa_glob_info, %di
+        movw    $vesa_glob_info, %di
         movw    $0x4f00, %ax            # VESA Get card info call
         int     $0x10
         movw    %di, %si
@@ -772,7 +772,7 @@ vesa2:  pushw   %cx
 
         addw    $8, %di                 # The mode is valid. Store it.
 vesan:  loop    vesa1                   # Next mode. Limit exceeded => error
-vesae:  leaw    bootsym(vesaer), %si
+vesae:  movw    $bootsym(vesaer), %si
         call    prtstr
         movw    %bp, %di                # Discard already found modes.
 vesar:  popw    %gs
@@ -917,7 +917,7 @@ store_edid:
         cmpb    $1, %al                 # EDID disabled on cmdline (edid=no)?
         je      .Lno_edid
 
-        leaw    vesa_glob_info, %di
+        movw    $vesa_glob_info, %di
         movw    $0x4f00, %ax
         int     $0x10
         cmpw    $0x004f, %ax



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 09:51:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 09:51:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296865.505482 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZrSP-0000dw-S1; Thu, 31 Mar 2022 09:51:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296865.505482; Thu, 31 Mar 2022 09:51:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZrSP-0000dp-Oi; Thu, 31 Mar 2022 09:51:09 +0000
Received: by outflank-mailman (input) for mailman id 296865;
 Thu, 31 Mar 2022 09:51:09 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=TTh1=UK=suse.com=jbeulich@srs-se1.protection.inumbo.net>)
 id 1nZrSP-0007le-3q
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 09:51:09 +0000
Received: from de-smtp-delivery-102.mimecast.com
 (de-smtp-delivery-102.mimecast.com [194.104.109.102])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 16caed53-b0d8-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 11:51:08 +0200 (CEST)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05lp2106.outbound.protection.outlook.com [104.47.18.106]) by
 relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 de-mta-19-msc2Wdd7Oge5_8QbrcETMg-1; Thu, 31 Mar 2022 11:51:05 +0200
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com (2603:10a6:10:2db::16)
 by VI1PR04MB3264.eurprd04.prod.outlook.com (2603:10a6:802:11::24)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.16; Thu, 31 Mar
 2022 09:51:04 +0000
Received: from DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476]) by DU2PR04MB8616.eurprd04.prod.outlook.com
 ([fe80::914d:e08d:7798:8476%7]) with mapi id 15.20.5123.021; Thu, 31 Mar 2022
 09:51:04 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 16caed53-b0d8-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=mimecast20200619;
	t=1648720268;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:cc:mime-version:mime-version:content-type:content-type:
	 content-transfer-encoding:content-transfer-encoding:
	 in-reply-to:in-reply-to:references:references;
	bh=KNU533Nas71KGaxkrjt8Y4qhfH0SyWRPA/lY3YgjMd0=;
	b=KF6ZgxS+cdxy+UEJJ31sOomnvaqF12AcerVo364qI9ehwhuDq3CvdvfM9UYWK74Qc9Gd6g
	R5bxIcDl7hjm7+XTu2c2dk6GO5PLDpV+Lywow3WoQd7CBPTEp6IUiZDnPDHfFrEME0SD5O
	iyxTPraBbHSICrT86FI1kaEBTxX3hNA=
X-MC-Unique: msc2Wdd7Oge5_8QbrcETMg-1
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=iS4xA51Q/g66xdp9hQ9OYXU5ngFKeEzexBsTmf43SiSXGzW7SnmdmqKPz4ZwbY+ikTN64YWHw2B7jm2XkDSK+msXd9Ks9emlMD7BA3avfw7wG4CQdem8QQNcWGaSK9/eaborh0pevWUHUcyTUQ7rVRxmsEBTxipSSzw1Oy/+xg8YWoeEUubBgYMOP4fTmmkwsGuzfttKQPq8irV+8nZtVFRy+kHRAp1RfZ6uv8FzNEh4neWtaFB2YTMzVPSsTZgs80TxuMFUkCGUFseqN0DQTw0ELi9NYHQAI7iBcWhYcAOaXRVLNB3RbenQfH72p4gFMHFPVg+4W1V+W27RsEYucg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=KNU533Nas71KGaxkrjt8Y4qhfH0SyWRPA/lY3YgjMd0=;
 b=dgPc21xsJR4LFSzLJz7DVn/d+Ft+NR0sB8piw2DqABRaMB39ZSVw/ReQy5vCKoE/o0VTMAd5ZwSarQEccJaHbjs43X5PvClzKZ/grF9bIVuqqevEm4QDJacGwb5WODQJLM40FCxjsqae7tlyopPChJ/V+9fqkZ+Mrg4XsPmVHyTyrY3lLPnRUH7H2xdvKsN+kiEiX7ISdOvBUJ4KLc05NF+AJrNxX+LSGEH6+lYNWdSvhi3v2/Ym3zVcVcKyeNu8mBnRq0NTNT8/5Qvnf39uC3jaP8eEVFy+f9Iq5cmPnEfeFxCiXVUMJ5nAmGzslD90vrcyRh6TL6vG1KPLdDgJKQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com;
 dkim=pass header.d=suse.com; arc=none
Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=suse.com;
Message-ID: <294639f0-d959-59b4-b3db-78451d5acd9c@suse.com>
Date: Thu, 31 Mar 2022 11:51:02 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: [PATCH v4 8/8] x86/boot: fold two MOVs into an ADD
Content-Language: en-US
From: Jan Beulich <jbeulich@suse.com>
To: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
References: <819eb552-d49d-e98a-9524-8d30c1b93908@suse.com>
In-Reply-To: <819eb552-d49d-e98a-9524-8d30c1b93908@suse.com>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-ClientProxiedBy: AM5PR1001CA0033.EURPRD10.PROD.OUTLOOK.COM
 (2603:10a6:206:2::46) To DU2PR04MB8616.eurprd04.prod.outlook.com
 (2603:10a6:10:2db::16)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 582759d4-d117-4731-fac8-08da12fbf87b
X-MS-TrafficTypeDiagnostic: VI1PR04MB3264:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR04MB32642A785C3FB09B4DC89C7FB3E19@VI1PR04MB3264.eurprd04.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR04MB8616.eurprd04.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(31696002)(54906003)(6506007)(2906002)(86362001)(4326008)(8676002)(66476007)(66556008)(66946007)(508600001)(6512007)(6916009)(31686004)(36756003)(316002)(6486002)(2616005)(38100700002)(186003)(26005)(4744005)(8936002)(5660300002)(45980500001)(43740500002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0:
	=?utf-8?B?cGpqMzZ6eHQ4d0pUd2NVa04zcFhTaCtEbHFub0FRYTJGUjI5TUZGMVhDKzA0?=
 =?utf-8?B?WlJhV0tVRFRwSzdUS2hBK1hZeFV6ZzhqYzZOYmx5V0xzZzZ6N1hqa1hEOHcv?=
 =?utf-8?B?aXFpN1VxSkM0N2xXWGEwTnZJWExRUm91NXlXb0tNNDY5UUpsYXY0UWlwWnRY?=
 =?utf-8?B?MTI1WjNybmNIVy9TMURwV2ErdTdUc2dpNS9IMWFxdVFwQWw5RlBsVndKOEZj?=
 =?utf-8?B?WnlVQy9YQjZOUHJXT1prdEg4akI4eVl1VkM5UlY3Z2VmSExZbHlyTXNpRjRY?=
 =?utf-8?B?bUlQOGs4RHFNbHY5cWRmV2s0V0lhY1ZVTHd2dnNxSzhCcGt6OGZnc2FIajBz?=
 =?utf-8?B?V3VNa0RhMituUC9IRWdJc1JJSGNkTnRSVDlYTFk3YlZMRENPbW1tVHBSazBM?=
 =?utf-8?B?ZWs1RDAzWWU5YUpHd3BkSHc2Z2VUVFl1b0RZUmFETE1CZHVWdlBUY3lRZ0pl?=
 =?utf-8?B?YXA0UEEzS2ZHK3U4QS9ScW5XeVM2bW1iQmtHNnJNMitNWGFUYlc5dTM5cHJH?=
 =?utf-8?B?L3dpbWR4dlNML1Y2NVZtYThwV2FLdHVlSE45L0dvYlo0Mkt5OFExeHBVdHlZ?=
 =?utf-8?B?dC9Wa3F5R2lKTDFEbmxLNzBURG5kN2hCaWRWSTZzV0dEY2pLQUdlRFVtdDYz?=
 =?utf-8?B?VitLdXZxSkl3akF2VEFOQzY4ZzNiNEJJWGIxS3pRMUVKUE5QKzZvdUxKR056?=
 =?utf-8?B?ai9MNGd5akt0OUVJOElUL2hqR2Z3aGJkb3N6Rit1cndmYUR1TW9VYm03VkZL?=
 =?utf-8?B?eTlScWw5cnRoTXI0cHpKb2RuM2pSeDRMVFdTUG1FSWlkSWRtMklsREsrczF5?=
 =?utf-8?B?T3BmV0NtbVU0QmJsVVdWSUxzaGN5NTY3MHMxeENxaVZ0MlRjaS9tNEV2cUcw?=
 =?utf-8?B?cnVhNFJvdGlVNStySHNndnYzYVFpcVoxR3lHMWpvM2tWWk0zTFk3T0RRTjlj?=
 =?utf-8?B?a0w1cG5TL21RQWxjVTU3RHdqb1ZHYkhNZG8vUTdhYmJwWUc4bHV5WnlRS2Mv?=
 =?utf-8?B?bHF3VU1FRUVZNHFVTDd4bWZKWEZLSE9GR0JQbFNvNjBSSlR1L2YzYzZtbTVF?=
 =?utf-8?B?RWxXTThtdGFHQ3B2TjA4NS8wZnFKRVVvNC9DQ0pGMldIOEpkVUNRd0p0VVBU?=
 =?utf-8?B?TU5hK014ODVuUHJjVnFiVnpCUHN2ZjZGM1lTOFlRbzIvUEltMWJsdTE2SVpU?=
 =?utf-8?B?THV2cHovNldBUlJRTHFPYk5JdXkxUCtyazdFblVqT2VWbDBPd0l4VnRLaHdj?=
 =?utf-8?B?cjhadmlOQXRCVTFIelJjdkJ6VWZxKzdBeXM4d2Y1U0JrYm5ZaW13N1lRdUZo?=
 =?utf-8?B?bjdzUWhzajRMYndYdnhvK3ZQWnphaU5iaG41Q2hwTVVyS09MVUhjSmMvWUlj?=
 =?utf-8?B?SnVoWEN0TjV6RGZLZXFST01aRmRyODBua1owbkdCMU5LY2FUK2VoakFRNC9q?=
 =?utf-8?B?TUVaOXJwcDhwV0U4TmtGYktIMEFZOFU2eGJJazA0S1FPTWlzNDNqbFBzSWcr?=
 =?utf-8?B?eXdGQmMvNW9hV0NHTzgraFE2bGhkRmZuNTZtdWMvQzQ3amZHZ0FpdkoxNzFi?=
 =?utf-8?B?aVBEV1BlaGhhVDRiVHFHeXhPV21zcVJGMXlqdE9wNUx4RjJQSnBqVU0vRDgv?=
 =?utf-8?B?SUo0U2VCT2dYdzUyaHMxb3RscTFrT0xJWmppZXgrcUJBUkh2Z3BReFlmZmFt?=
 =?utf-8?B?ZSswU3dmQ3Y0Zkgva0FmT1hpY3FQTS9LSlV0ZHdSRzZyV3RKVzlmL3FUUEw2?=
 =?utf-8?B?bFF0c2RzQktqUk5xRDZuU0hzaFBxbzRXL0c4Q0pvWGhjY0l4ejVoSkpIdzFn?=
 =?utf-8?B?Z3YzREFhbWRvN1B4dXZETlNyM3hKMnlkbkMwMHM5S1NwR0RwMVQrTVl4TVBZ?=
 =?utf-8?B?cldzYmVja0hXQ2NTSUYyTDFEZmV0c1p1c25obEtDM1B2NzlzOGc3dTY2MjRZ?=
 =?utf-8?B?T3VoT2JockMrQmUzUS9Kc0pTR2NqZW9HZGg2UTRzbWRMZFhqU1lMT1FPQ29B?=
 =?utf-8?B?Z1g5V2NwNStnYTkwVjl5Wk05UG1naTdYUTY1OFVycGcyQ0gxaFNyZnJNK0J3?=
 =?utf-8?B?YVFic2ROVVFLb2s1SHdHMVJacm5iQ1FNM3hBMFcydGtuMHZlUUVzTTNtcVBI?=
 =?utf-8?B?bUxGVUc5NUtBdVlpOU5HZDkxckE3QUJTNTBuUGM2REdiNHZ4bHhIU1hOVVRT?=
 =?utf-8?B?R1ZrSlJVWXRTYW81bFlsVlgyV2I2ZnpvQndQbzdnMHNGODJMS3ppTlEydWJx?=
 =?utf-8?B?ZlBZbURib1JLNVVOTTU2Z1F1QTlsTld3eDh4V0crcEh2WUovbnUrMFlRVWdp?=
 =?utf-8?B?d3RXNzZUOTdtSUlFZTY5bUUzcFdWT1NVcVVjS0ZianZvVmI4SWxXZz09?=
X-OriginatorOrg: suse.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 582759d4-d117-4731-fac8-08da12fbf87b
X-MS-Exchange-CrossTenant-AuthSource: DU2PR04MB8616.eurprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 09:51:04.2874
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f7a17af6-1c5c-4a36-aa8b-f5be247aa4ba
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: LhdWRiJg/t8CgflyBBmlQYCIyLWamVcIYDP2ND/1obgX6MzbsbU7PrCakvrhfst8Ht2efA/D12YPxgGIiV+DxA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR04MB3264

There's no point going through %ax; the addition can be done directly in
%di.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
---
v2: New.

--- a/xen/arch/x86/boot/mem.S
+++ b/xen/arch/x86/boot/mem.S
@@ -24,9 +24,7 @@ get_memory_map:
         cmpw    $E820_BIOS_MAX, bootsym(bios_e820nr) # up to this many entries
         jae     .Ldone
 
-        movw    %di,%ax
-        addw    $20,%ax
-        movw    %ax,%di
+        addw    $20,%di
         testl   %ebx,%ebx                       # check to see if
         jnz     1b                              # %ebx is set to EOF
 



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 10:31:21 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 10:31:21 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296872.505494 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZs57-00050H-3m; Thu, 31 Mar 2022 10:31:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296872.505494; Thu, 31 Mar 2022 10:31:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZs57-00050A-0b; Thu, 31 Mar 2022 10:31:09 +0000
Received: by outflank-mailman (input) for mailman id 296872;
 Thu, 31 Mar 2022 10:31:07 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=+Yrn=UK=arm.com=Penny.Zheng@srs-se1.protection.inumbo.net>)
 id 1nZs55-000504-E7
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 10:31:07 +0000
Received: from EUR02-HE1-obe.outbound.protection.outlook.com
 (mail-he1eur02on0608.outbound.protection.outlook.com
 [2a01:111:f400:fe05::608])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id aa621ca1-b0dd-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 12:31:03 +0200 (CEST)
Received: from AM9P193CA0017.EURP193.PROD.OUTLOOK.COM (2603:10a6:20b:21e::22)
 by VI1PR0801MB2045.eurprd08.prod.outlook.com (2603:10a6:800:89::8)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.21; Thu, 31 Mar
 2022 10:30:54 +0000
Received: from VE1EUR03FT026.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:20b:21e:cafe::49) by AM9P193CA0017.outlook.office365.com
 (2603:10a6:20b:21e::22) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.13 via Frontend
 Transport; Thu, 31 Mar 2022 10:30:54 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 VE1EUR03FT026.mail.protection.outlook.com (10.152.18.148) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5123.19 via Frontend Transport; Thu, 31 Mar 2022 10:30:54 +0000
Received: ("Tessian outbound 78191104f1b7:v118");
 Thu, 31 Mar 2022 10:30:53 +0000
Received: from 051bd8fbb708.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 8906F5B6-75FC-488B-9CDB-F484AED63D58.1; 
 Thu, 31 Mar 2022 10:30:47 +0000
Received: from EUR04-VI1-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 051bd8fbb708.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 31 Mar 2022 10:30:47 +0000
Received: from DU2PR08MB7325.eurprd08.prod.outlook.com (2603:10a6:10:2e4::7)
 by AM4PR08MB2785.eurprd08.prod.outlook.com (2603:10a6:205:5::25) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.21; Thu, 31 Mar
 2022 10:30:38 +0000
Received: from DU2PR08MB7325.eurprd08.prod.outlook.com
 ([fe80::28c0:3e8d:dd75:80be]) by DU2PR08MB7325.eurprd08.prod.outlook.com
 ([fe80::28c0:3e8d:dd75:80be%8]) with mapi id 15.20.5102.023; Thu, 31 Mar 2022
 10:30:38 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: aa621ca1-b0dd-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=jvXueQ5frZ3Uaqgw39dvYeQnBHzyNckzPrAZSd2icmA=;
 b=x0mQAgGi4YedvOmp8h/5bUoJ0br4QcpyJ+F6RdtcP4usWOIoE6y1EWtm+tp7ftqlW9mW5ey+rNBkRkCKusM+bGR9OYvoQ+Vd4ZokRDtG58TycpfBaGF9el53F2ykiAES1fz84QcFaJEJuoylXRQc0KYxAN89EgV+LPhAV98uk4I=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=kTM1nJjsBIGTLVnmXsvweJP5nklOhh9EBwOoVf1Ig5qtEeRFSkV/xDF+XJhAfbzY4HYHjT1P83GM4G7fI/6Pl3s8m2mnG+MZ19HU0GqYtfv4qrHTyOFOgNpKGeMUHzGoNK/bY//nfGSZdRgL+T2XoACHq1xTf9BnFXNpONzRXaWPurJ5YQ3Tr36M3B0hQVvJG08l3SBASy/KfXLJMxndj/2GMow9bBVGUf0RlYgagG65HGstjVBWR8c80ybycmAmkVGtO0lae0Rh4di312h1HelHORS1wE7jbIHKJ0S1fiE0xb1+lkEkwN6WLy++zn+OZLzwWyZaHdGcXqXdvx7EAw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=jvXueQ5frZ3Uaqgw39dvYeQnBHzyNckzPrAZSd2icmA=;
 b=DT+muq0DbU13cAhQClzuFXlll0pSW+mfRPiWgEXB4lZ7zVCONodlxlO0FB3GniswxLk0W/V8gaw9mPSemlPWhNP6aS6LfZGYIoDNr3V9MP8GP4ksAU3hvUTKiOjWqZNAgMUNRkSMiq3W9mOG5rf/ELbCFnTpauokx9b+476EdFbcBq+WKXdNuShfBa6TfTjEtL6w5TMYPPKGazMnnUTWY02Ep1JUl7kYCAo1gSb+pHELvpMkCV5v4QpcEH3BQOjniH+yoEmeNWOM9ubpZpCFwN7NBYhoF8cBdo3EQ8T4lY2sAF5C7zFpbFiqJHRB0FV85Lw7xJEZ7dfzef8a4HZehg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=jvXueQ5frZ3Uaqgw39dvYeQnBHzyNckzPrAZSd2icmA=;
 b=x0mQAgGi4YedvOmp8h/5bUoJ0br4QcpyJ+F6RdtcP4usWOIoE6y1EWtm+tp7ftqlW9mW5ey+rNBkRkCKusM+bGR9OYvoQ+Vd4ZokRDtG58TycpfBaGF9el53F2ykiAES1fz84QcFaJEJuoylXRQc0KYxAN89EgV+LPhAV98uk4I=
From: Penny Zheng <Penny.Zheng@arm.com>
To: Jan Beulich <jbeulich@suse.com>
CC: Wei Chen <Wei.Chen@arm.com>, Henry Wang <Henry.Wang@arm.com>, Andrew
 Cooper <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
	Julien Grall <julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wl@xen.org>, "xen-devel@lists.xenproject.org"
	<xen-devel@lists.xenproject.org>
Subject: RE: [PATCH v1 3/5] xen/arm: unpopulate memory when domain on static
 allocation
Thread-Topic: [PATCH v1 3/5] xen/arm: unpopulate memory when domain on static
 allocation
Thread-Index: AQHYRBnkeXnYvoANH0WdfY8GUNrlN6zXr5KAgAEgZ0CAAENNAIAAARVQ
Date: Thu, 31 Mar 2022 10:30:38 +0000
Message-ID:
 <DU2PR08MB7325D94A0BFFC2A3BB0AFF08F7E19@DU2PR08MB7325.eurprd08.prod.outlook.com>
References: <20220330093617.3870589-1-Penny.Zheng@arm.com>
 <20220330093617.3870589-4-Penny.Zheng@arm.com>
 <31c1ae2d-a4d6-5445-e819-5df5a0984cdd@suse.com>
 <DU2PR08MB73251B78F8EB19E334A70876F7E19@DU2PR08MB7325.eurprd08.prod.outlook.com>
 <eba664e6-4146-426b-5119-59fe02a96bb5@suse.com>
In-Reply-To: <eba664e6-4146-426b-5119-59fe02a96bb5@suse.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 8726EBF7C6D9C842AF073370F5C6B767.0
x-checkrecipientchecked: true
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: bb10cd2f-03dc-42ec-66cb-08da1301891f
x-ms-traffictypediagnostic:
	AM4PR08MB2785:EE_|VE1EUR03FT026:EE_|VI1PR0801MB2045:EE_
X-Microsoft-Antispam-PRVS:
	<VI1PR0801MB2045395792D6C61AA969518BF7E19@VI1PR0801MB2045.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR08MB7325.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(55016003)(6916009)(33656002)(54906003)(316002)(83380400001)(86362001)(186003)(26005)(508600001)(53546011)(71200400001)(7696005)(6506007)(9686003)(45080400002)(122000001)(5660300002)(8936002)(52536014)(2906002)(38070700005)(66446008)(66476007)(66556008)(38100700002)(4326008)(8676002)(76116006)(64756008)(66946007);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR08MB2785
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 VE1EUR03FT026.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	31ea1f33-a3c0-4685-2f0e-08da13017fa5
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(2906002)(9686003)(54906003)(82310400004)(52536014)(8936002)(33656002)(5660300002)(316002)(53546011)(6506007)(7696005)(36860700001)(47076005)(81166007)(356005)(83380400001)(86362001)(55016003)(45080400002)(4326008)(40460700003)(186003)(26005)(6862004)(336012)(508600001)(8676002)(70206006)(70586007);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 10:30:54.1371
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: bb10cd2f-03dc-42ec-66cb-08da1301891f
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	VE1EUR03FT026.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB2045
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From xen-devel-bounces@lists.xenproject.org Thu Mar 31 10:34:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 10:34:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296877.505505 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZs8o-0005fL-O7; Thu, 31 Mar 2022 10:34:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296877.505505; Thu, 31 Mar 2022 10:34:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZs8o-0005fE-L1; Thu, 31 Mar 2022 10:34:58 +0000
Received: by outflank-mailman (input) for mailman id 296877;
 Thu, 31 Mar 2022 10:34:57 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nZs8m-0005f6-W1
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 10:34:56 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nZs8m-0003J3-1G; Thu, 31 Mar 2022 10:34:56 +0000
Received: from 54-240-197-228.amazon.com ([54.240.197.228] helo=[10.7.236.30])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nZs8l-0005pa-QD; Thu, 31 Mar 2022 10:34:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=At4KFQTq80hBpXxj+/tmnjXriuHD/1WNosfxyjpkoNs=; b=RC+7wU9bKlstm4sBDwDHF0INeY
	s+sEdBeyXnveauoFCw67aQU2Ss+ip4g1M8soEb+HWVAIAL5ru5f7s7wfjpdN/muYmQ0RxE9+btPbh
	FVYZemL8SKa7iF/cG5bGuRp57KfCUBC1QJciSOl9ra4EcSFIXgBdjp/m829+jCJaDudw=;
Message-ID: <5a5db691-4add-17fa-3cc6-1eda8d24753e@xen.org>
Date: Thu, 31 Mar 2022 11:34:53 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH v4 3/4] include: move STR() and IS_ALIGNED()
To: Jan Beulich <jbeulich@suse.com>,
 "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>
Cc: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Andrew Cooper <andrew.cooper3@citrix.com>,
 George Dunlap <george.dunlap@citrix.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>
References: <6e540bc9-c536-84ac-fb1c-8271e7731b3e@suse.com>
 <9a0cf101-17fa-cad2-e791-15d8d8cc5b79@suse.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <9a0cf101-17fa-cad2-e791-15d8d8cc5b79@suse.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Jan,

On 31/03/2022 10:31, Jan Beulich wrote:
> lib.h is imo a better fit for them than config.h.
> 
> Signed-off-by: Jan Beulich <jbeulich@suse.com>

Reviewed-by: Julien Grall <jgrall@amazon.com>

Cheers,

> ---
> v4: New.
> ---
> Originally I thought I'd also move KB() etc, but they're used in places
> where yet further adjustments (adding of #include) would be necessary.
> 
> --- a/xen/arch/arm/xen.lds.S
> +++ b/xen/arch/arm/xen.lds.S
> @@ -3,6 +3,7 @@
>   /* Modified for ARM Xen by Ian Campbell */
>   
>   #include <xen/cache.h>
> +#include <xen/lib.h>
>   #include <asm/page.h>
>   #undef ENTRY
>   #undef ALIGN
> --- a/xen/arch/x86/xen.lds.S
> +++ b/xen/arch/x86/xen.lds.S
> @@ -2,6 +2,7 @@
>   /* Modified for i386/x86-64 Xen by Keir Fraser */
>   
>   #include <xen/cache.h>
> +#include <xen/lib.h>
>   #include <asm/page.h>
>   #undef ENTRY
>   #undef ALIGN
> --- a/xen/include/xen/config.h
> +++ b/xen/include/xen/config.h
> @@ -82,11 +82,6 @@
>   #define MB(_mb)     (_AC(_mb, ULL) << 20)
>   #define GB(_gb)     (_AC(_gb, ULL) << 30)
>   
> -#define IS_ALIGNED(val, align) (((val) & ((align) - 1)) == 0)
> -
> -#define __STR(...) #__VA_ARGS__
> -#define STR(...) __STR(__VA_ARGS__)
> -
>   /* allow existing code to work with Kconfig variable */
>   #define NR_CPUS CONFIG_NR_CPUS
>   
> --- a/xen/include/xen/lib.h
> +++ b/xen/include/xen/lib.h
> @@ -3,6 +3,8 @@
>   
>   #define ROUNDUP(x, a) (((x) + (a) - 1) & ~((a) - 1))
>   
> +#define IS_ALIGNED(val, align) (!((val) & ((align) - 1)))
> +
>   #define DIV_ROUND(n, d) (((n) + (d) / 2) / (d))
>   #define DIV_ROUND_UP(n, d) (((n) + (d) - 1) / (d))
>   
> @@ -17,6 +19,9 @@
>   #define PASTE_(a, b) a ## b
>   #define PASTE(a, b) PASTE_(a, b)
>   
> +#define __STR(...) #__VA_ARGS__
> +#define STR(...) __STR(__VA_ARGS__)
> +
>   #ifndef __ASSEMBLY__
>   
>   #include <xen/inttypes.h>
> 

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 10:58:54 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 10:58:54 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296883.505518 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZsVs-00086c-Oz; Thu, 31 Mar 2022 10:58:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296883.505518; Thu, 31 Mar 2022 10:58:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZsVs-00086V-M5; Thu, 31 Mar 2022 10:58:48 +0000
Received: by outflank-mailman (input) for mailman id 296883;
 Thu, 31 Mar 2022 10:58:47 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=Yxtd=UK=citrix.com=prvs=0827c5e47=Jane.Malalane@srs-se1.protection.inumbo.net>)
 id 1nZsVr-00086P-NR
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 10:58:47 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 87f5eaeb-b0e1-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 12:58:45 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 87f5eaeb-b0e1-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648724325;
  h=from:to:cc:subject:date:message-id:references:
   in-reply-to:content-id:content-transfer-encoding:
   mime-version;
  bh=ax6YuIQ+H1vrl0gmBoICT37b/vsZoAfrOZoI50BgVEY=;
  b=DxOvF4n2x6uOyt+NerwEuiuGn/rK7BdCGOPIv6ppoR8uCxH/wTGWrKI4
   gENsQlGH55sWAGBzLnbjeIGYmIySzczLUIPGkzso9WAXNOO2H937PJWei
   lhXqJGNKY9yTHCEqs55fu6vJUpuzFsTeqk9iuglPvkV6Sztv+1dmR3nLj
   4=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 68047193
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:AGywR6yIIFpliTSK2jJ6t+eBxirEfRIJ4+MujC+fZmUNrF6WrkUAy
 msXCj2EaKyJMWb2L4xwa4rloExX75eHztYwTwBvrSAxQypGp/SeCIXCJC8cHc8zwu4v7q5Dx
 59DAjUVBJlsFhcwnj/0bv656yMUOZigHtIQMsadUsxKbVIiGX9JZS5LwbZj2NYz2oHhWWthh
 PupyyHhEA79s9JLGjp8B5Kr8HuDa9yr5Vv0FnRnDRx6lAe2e0s9VfrzFonoR5fMeaFGH/bSe
 gr25OrRElU1XfsaIojNfr7TKiXmS1NJVOSEoiI+t6OK2nCuqsGuu0qS2TV1hUp/0l20c95NJ
 Npl6LOcQyxuZbXwx+EBcxtDSwhzF7V00eqSSZS/mZT7I0zudnLtx7NlDV0sPJ1e8eFyaY1M3
 aVGcnZXNEnF3r/ohuLgIgVvrp1LwM3DHooZtzdFxDXQCf8gTLjIQrnQ5M8e1zA17ixLNaiOP
 5ZGMGs0BPjGSzdjZkUYGrgapduXq1mgWSd4hVu+urVitgA/yyQuieOwYbI5YOeie8JRmUqJo
 3PcyE7wCBoaKd+3xCKM9zSngeqntTjgRIsYGbm89/hrqF6e3GoeDFsRT1TTifO0kFKkUtRTb
 Ukd4DMzrLMa/VauCNL6WnWQo3OavxhaR9tZFcU77h2Azuzf5APxLmoZSHhHYd8vts4zTBQr0
 EOEm5XiAjkHmKKRYWKQ8PGTtzzaETgYKyoOaDEJSSMB4sL/u8cjgxTXVNFhHaWpyNrvFlnYw
 T+QqzMlr64OlsNN3KK+lXjFnjatq57hXgMzoALNUQqN7Al0eYqkbIyA8kXA4LBLK4Pxc7Wal
 CFawY7EtrlIVMzT0nzWKAkQIF23z6uqHDf3xgV3I8Yk6xSv4CaKcKpI0hgrcS+FLf04UTPuZ
 UbSvyZY65lSIGamYMdLXm6hNyg55fO+TIq4D5g4evILO8EsL1HfoEmCcGbKhwjQfF4QfbbT0
 HtxWeKlFj4kBKtu11JarM9NgOZwlkjSKY4+LK0XLihLM5LDPBZ5qp9faTNii9zVCove+m05F
 P4Fa6O3J+13CrGWX8Uu2dd7wao2BXY6H4vqjMdca/SOJAFrcEl4VaOBn+18JNI/wvsI/gstw
 p1bchUCoLYYrSeaQThml1g5MO+/NXqBhSxT0dMQ0aaAhCF4PNfHAFY3fJorZ7g3nNGPPtYvJ
 8Tpj/6oW6wVIhyeomx1RcCk8ORKKUT67SrTbnHNSGVuIPZdq/nhp4aMkv3Hr3JVUEJadKIW/
 tWd6+8sacFdH147VpaHNarHIpHYlSF1pd+elnDge7F7UE7t7JJrO2r2iPo2KNsLMhLN2n2R0
 AP+PPvSjbClT1MdmDURuZ25kg==
IronPort-HdrOrdr: A9a23:SG5gnahFgsFXXGRKSnk4gRYJNnBQXt4ji2hC6mlwRA09TyX+rb
 HIoB17726RtN91YhodcL+7VJVoLUmyyXcX2+ks1NWZMjUO0VHAROsO0WKI+VzdMhy72ulB1b
 pxN4hSYeeAaGSSVPyKgzVQxexQouW6zA==
X-IronPort-AV: E=Sophos;i="5.90,225,1643691600"; 
   d="scan'208";a="68047193"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=aNv9CtVd/Md1/3VA9Td9dQC+vr8XFjlMb7p5dDQRLGkskVZkcYQaWKMnkN8HeOlyH26s6JRifR28bPIEF2ZyrIvd1KSsQJ9e6YccLFJKjsUGDdM4aFJeWYKhsjPK4dTfsXAZWSEVry6LwQiYRUW0tPuYkafKY1VsC4Jt3NQmP+GsbIydZsqViQw5bS2rMgnaieEgM3r7gkKUbRaJv2ZoB+6ydPh7wzvO281i500A6EhvVlptHiMoyfFssUvjUwaOrLTVLeIhFCLpYXRnzq89RYjFyqnbuhfrCGXP+FRfh9a1zAQ92GuE42BiDzMRZwA8dbDj/GArUXud1JtBO79Gag==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ax6YuIQ+H1vrl0gmBoICT37b/vsZoAfrOZoI50BgVEY=;
 b=gVJjGsjHeWvVbwx/jJ56QJ16xmFsZOAqaK8QdrMcjyMLpqbyRVuy6kpEGf2AGrl/xrUk0ReSWuPkoy1hMMWFFZRqUFi/7xjpoRrwFS8TLlbG3PvPN7Gw2ShyqhQIJeDRPd9/bp1Icv9XYYZfSJPSZFjztL90GJFLcNbEjTnODw7Zf4H6/Hb8MQT89z9UUWCkXdqEUNayyRFWRh9CTUvDtpcs1drOKienJ33dRLgl0uzTUoSfjhPNQi/FTm1JecJzZ3fnbT2Kd3EoYsqMP93mR0BBZ/UCBXPmGEGoVAuIv3Pyb3y+RqP99bmFEAAESqZk0Dk60TaC7oZrWrjtVwhQVw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=ax6YuIQ+H1vrl0gmBoICT37b/vsZoAfrOZoI50BgVEY=;
 b=qo2SIIvYe3Xv7OjSajKkZM2kTAoayadYLiO8BYlI+BmDidC4Z4Kn61pGHimMT97i/cB5go16nh21EjzfeVZg4d6mwc7WpdUtchMJ36kDyrVt2A9d9JGSsaU7eXj+4MxbcNsgX8F1pmHCplgEaUj25qGdnzTQk5aUBLyGN7Esxo0=
From: Jane Malalane <Jane.Malalane@citrix.com>
To: Roger Pau Monne <roger.pau@citrix.com>
CC: Xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, "Anthony
 Perard" <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, "Andrew
 Cooper" <Andrew.Cooper3@citrix.com>, George Dunlap
	<George.Dunlap@citrix.com>, Jan Beulich <jbeulich@suse.com>, Julien Grall
	<julien@xen.org>, Stefano Stabellini <sstabellini@kernel.org>, "Volodymyr
 Babchuk" <Volodymyr_Babchuk@epam.com>, Bertrand Marquis
	<bertrand.marquis@arm.com>, Jun Nakajima <jun.nakajima@intel.com>, Kevin Tian
	<kevin.tian@intel.com>
Subject: Re: [PATCH v8 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Thread-Topic: [PATCH v8 1/2] xen+tools: Report Interrupt Controller
 Virtualization capabilities on x86
Thread-Index: AQHYORYstIW/2ErvFUCgC13K5YqhFqzM4H0AgAyJ4oA=
Date: Thu, 31 Mar 2022 10:58:39 +0000
Message-ID: <258e14f7-b00f-7131-c846-6eecf04d61f5@citrix.com>
References: <20220316091315.19281-1-jane.malalane@citrix.com>
 <20220316091315.19281-2-jane.malalane@citrix.com>
 <YjsEuMBKI4Kp7kDL@Air-de-Roger>
In-Reply-To: <YjsEuMBKI4Kp7kDL@Air-de-Roger>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: d48c06ce-91be-442e-89e0-08da1305699f
x-ms-traffictypediagnostic: SA2PR03MB5804:EE_
x-ld-processed: 335836de-42ef-43a2-b145-348c2ee9ca5b,ExtAddr
x-microsoft-antispam-prvs: <SA2PR03MB580415126A370870ECBCF41781E19@SA2PR03MB5804.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM5PR03MB3386.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(6636002)(55236004)(54906003)(316002)(37006003)(53546011)(38070700005)(6506007)(66946007)(76116006)(66476007)(64756008)(66446008)(66556008)(91956017)(86362001)(6512007)(83380400001)(8936002)(7416002)(31696002)(5660300002)(82960400001)(2906002)(26005)(6486002)(122000001)(6862004)(8676002)(4326008)(38100700002)(36756003)(71200400001)(508600001)(31686004)(186003)(2616005)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?YnFxbHQ5M08yWkEwekJtMVNFSlJNSzNiWjZPWis4VGkzcEtKN3JUUjBhSVI5?=
 =?utf-8?B?RlV4b2xhYVdabFhMUGtMcUU4UUxoS2txcEh1MWljYW5UNHhoL2VnVlNSU3gx?=
 =?utf-8?B?MmlvSlZCVlpzRzc4ejE0VFMrOVFNMWtQL2Fic3RnTldETnVrUElVVUdiSElK?=
 =?utf-8?B?Q1VIbSticFRFaVlpMVlDUlAvbGpXN1JHR2FuV2hOZW1iVVNlYWhGMDY0WG83?=
 =?utf-8?B?SExXTlpqRVpxWlJ3RE52WXRUbTd1U3F4Y2ZsWXROdk5vSG9YMGFvTUZxVXlI?=
 =?utf-8?B?WXczcEFtejVtU0pqcTJOVHRPWjkzQ2dpRVhwZko5MkRLZ2hIaTJhOFFLb0JK?=
 =?utf-8?B?UmcwcVpsZ2RmVkt4R0ZWV1E1Q1ZKR1VjTWI0d21pQ0w5eWN5RktweUhtaDFu?=
 =?utf-8?B?dVp3eHh3L2lSZEtCbzlyRVAwK0MwbDl3N0UrcVZEclJLTVIvS3dwVnQrV1Ry?=
 =?utf-8?B?N2IyUUtpOGhZSnhMYmtka21vMlRlUnh2MWFDMVRpdCthVlBXMjNSbERCc0tO?=
 =?utf-8?B?dWU5NFQwRHE5YjRPQWRXZFJRR3hmWHNudWlTWlQ4NktYUEtKU2JDRnVwWUdi?=
 =?utf-8?B?WTBicVg4bnR6cnpKUlZ4MWFHMTFnZzgzYmwrM0xyaGpGdExtSkV4dklsRXdS?=
 =?utf-8?B?c25Gd29xN0J1bmswWDBCbHZYWTJkbXU1cDVRODlZY0pUUWdmMmJxSHZZUUdP?=
 =?utf-8?B?SDVlVGpYNUZYdUF0ZUtoVHhPajdVL2FxUVFVOG9GRlh1QWUxLzUxbkFISDh3?=
 =?utf-8?B?akl6TmR3dnFMQmQ3eE9nbGR6Um43REFPTElqcWdrOG5IVElrMkdHMlNPNElG?=
 =?utf-8?B?QW9CSE14Zkg4bXlYK2Vxb3FwQXAvbldlUDU0Wis0R2E2OG5zQVJtU3U4dkhI?=
 =?utf-8?B?UkVnZVZXVHJRUXFxZUVBMFBCM2hlcDh0VDdPTFkveXBhVlhFampiS2lLa1F3?=
 =?utf-8?B?RkgyWnJPWlEzV3BMZ3dxM2NETXRPalJHUVBnZWVPWEpFa2dpcWEvSjYvdEtp?=
 =?utf-8?B?WFhhTUl6NC8xTjZVSlNQeVV4LzhxNzZJdkM5c1M2V00yUkZ3dy9vdkJkT2lG?=
 =?utf-8?B?YmZaeVJkWm16NVZXT1RNQXZTeWQweHNvQ1VrU1BNZzd4SXkzcTRmMi8xcW1W?=
 =?utf-8?B?b1JrMkRkUkx0b0NZT3FjRkQ5U1hUZFdMamlSZjZaNThveEdEYjJobFBFYndl?=
 =?utf-8?B?Tk1pdms2YzFwbURaaS9YMmkrMEx2TDg1d3drenhERUxsR2UvdUFybjloQUFN?=
 =?utf-8?B?dFpoVjNpRTJqYlIwNWJkaUtNVnczM2xxK3pJZnJHUEx3V1hkYSt2eStKTlNK?=
 =?utf-8?B?UDZiOTVzWll4cTJEWDZMUmpFR0NXYUFtcUJWSnRjaTAzQlpnc2Fkc0R5Rk92?=
 =?utf-8?B?QjNjQUJwL21GSFlyQks3UEs2d3o4bjJ4VURLMlY2UTF1Y2hsZ2dNN0RRRS9m?=
 =?utf-8?B?QVlsOWE5MTRvWXQrQ1B6dTNCMjNTVytvVFNpRTRYZ01Rb0tOSGdod1NVWnBj?=
 =?utf-8?B?Y211Tk9DU0FuOFdGbnVFYjJPeGE3ZWhNdEFOVlo1SHk0VVZVMmVWbGJON2hv?=
 =?utf-8?B?cVVoU2E4ZXBPd3crVG5Rbm9zbjZwYlNLMlFRbjY0empzejB0SUsvOC9qREN1?=
 =?utf-8?B?ems4ZHc4QWZWRGRVK1VhOVpyamc0cTZ4Y09NeFBsSFNqdWs5R0J1a3RWYk1n?=
 =?utf-8?B?VVdrMFhsNXBNaUtBR241MmNETXBQMlQvMWFETS8yVVNiSm9BTUZUTHA2dUhy?=
 =?utf-8?B?bTY5UjE0R1ZQYzNzUkxGQ25jdWRiam9vdnhRV3NKZGY2aUtUTC9icUxFVzcy?=
 =?utf-8?B?eHBSb21Wd2F2Z2p3bDBJM3kvK1NzTFBGN1Avb2kwWW52bjNoOTJORkc0d3Vp?=
 =?utf-8?B?bzJkalFEL2VKaGVJZy9naE5BbDh1UVdUVTB6a2dHSm9obEx1dnpFMGcyN3hG?=
 =?utf-8?B?ZmpOMXE1aFJqNXFJMkRVd3NLcFhER0tVVFlFSEVCY2FZN3owMUlsUnN3QnRO?=
 =?utf-8?B?dllna1I4RUxmNlBUK0FVZmZjTCtKSmNNYWU4ZHFydXR6Q2xWd25vdGJPSVhK?=
 =?utf-8?B?QWMzT0d2TDRQRk14N0VzVWZiUVZtSDkvRHY0eDBSb1g1NDd4ZEY0V0hyVXFy?=
 =?utf-8?B?cGh0djV2R1JudEFwT0Mra2kyM3YwYWx2Y2NXREN1a0VXRkVTc3MrRkg3Sjcz?=
 =?utf-8?B?UTRrdnIwODZvSWpvMkhCYUpUby9nR0xzVTcrMS9PbWtOa3Z0MTlEbm91SEZk?=
 =?utf-8?B?b1NHd295TVlncFhIWDVxbUFjM1hPRHZiVlRRZXc3VFpkaW93ZlRjU3lkdXVG?=
 =?utf-8?B?OTdIWUJydnZBa25POXRwTmFEYXN1L3VSam81dW5jRXF2VGUxSU1KRXFNbHBC?=
 =?utf-8?Q?6aVtDdzDfJF3pQJE=3D?=
Content-Type: text/plain; charset="utf-8"
Content-ID: <EF4DA95F3AF07C45A43618F606A7A4E7@namprd03.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM5PR03MB3386.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d48c06ce-91be-442e-89e0-08da1305699f
X-MS-Exchange-CrossTenant-originalarrivaltime: 31 Mar 2022 10:58:39.3236
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: HWXtBi122/a+fRRYjHwMVAowHn9xbdwoUJU1KMjvDCzDk5gPEccVefkhp7gQu+0xuzH8cIYxPNeRO4kWGDlbzkWn8CN8O33ttReoPfEnyl8=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA2PR03MB5804
X-OriginatorOrg: citrix.com
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From xen-devel-bounces@lists.xenproject.org Thu Mar 31 11:39:56 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 11:39:56 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296891.505533 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZt9R-0003qS-Vj; Thu, 31 Mar 2022 11:39:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296891.505533; Thu, 31 Mar 2022 11:39:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZt9R-0003qL-Sj; Thu, 31 Mar 2022 11:39:41 +0000
Received: by outflank-mailman (input) for mailman id 296891;
 Thu, 31 Mar 2022 11:39:40 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=jdXs=UK=citrix.com=prvs=082181b9c=George.Dunlap@srs-se1.protection.inumbo.net>)
 id 1nZt9Q-0003qF-Fh
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 11:39:40 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 3d609343-b0e7-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 13:39:37 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3d609343-b0e7-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648726778;
  h=from:to:subject:date:message-id:mime-version;
  bh=tgJ+nNkaRMmdBgpXKKRi4IiWolk3I4K0cHDH6RaUTn8=;
  b=AvTcTegXuoknbucX4Q+wuBs2fUVeo2lnaoFR8IyTd3X+83H8mez0dqk5
   MWrkP85eNNVhAGDoB4aOZy/1bpDDR8IYRetxBdLIQKl02+hDELYQnW1BN
   sel7sSM1edk43ldHl89RugSylKdxHAHpVbQXUWDtz1wPp1bBIQcluz8mp
   I=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=hardfail (body hash did not verify [final]) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 70033702
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:Gq7kea1vKjE6ECi+cfbD5fR1kn2cJEfYwER7XKvMYbSIYQITYwd3j
 TtIBzjCf73ffDO2KOnCW/2+9BkD7ZHVydcxQAJo/ik8RnlB8JfPWorIfh+uNS2cd8GYEB48v
 p1DZoSYdpFlQCTR/B2mY+Ww8HctifHRSrfyYAKo1lidYCc9IMt2oU4zy4bV+7JVvOVVIz9hm
 Pv5rsCGNlP00jN9a2xMu//Y9Uxi5v2u424VtAJhOqsX5A6CmyEZAqxEKPDqJRMUYGX18s1W5
 Qrn5Ovklo8M1051UrtJqp6iLgtSBOS60TGm0hK6YYD76vR5jnF0g/5T2MY0Mx8N0W3SxIkpk
 r2hiLTrIesXFvyU8Agie0Ew/xFWZcWqL5eefBBTGeTKp6H3WyOEL8dGVSnaDqVBkgpDOklc9
 ORwFdw4Rkvra9RaYl6MYrIEaswLdKEHNW6E051q5Wmx4f0OGfgvT0hWjDPxMfhZas1mRJ7ji
 8QlhTVHcC/SORRzG3QsGa0SvriZ33qnbhl/twfAzUY3yzC7IA1Z1bHsNJzee8CQRNUTlUGdz
 o7E1z2nWFdAboXZkGfbtCL37gPMtXqTtIY6O7C/7PFnxnGOwGgaEDUdVEehoOn/gUm7Mz5aA
 xNMonF18vBonKCtZufFUwSju1WihzIRAcdRMfMLwgaU4LWBtm51AUBbF2UcObTKrvQeRjE01
 1nPh97gHydotpWSU26Y/7GfqjWpJCwJLGkNIyQDSGMt+9T5u4gulDrAS99iFOi+ididMTP/2
 TeRtwAlmq4ey8UM0s2T/1fHhXSup7DISBI44kPcWWfNxht1eZS/boq0wVHe5ORHKsCSSVzpl
 GQNnsGFquNICZyLmz2ARM0CGbio47CONzi0qVxyG5gs8Ry99njleppfiBl/IltkNoMUdDnBY
 UnPtAcX75hWVFOhbbV2eJ62E8Qn1+7/U9/hX+rXRtVLa5l1MgSA+UlGaUeW3m3p1kstiawlE
 ZCBeM2oADARDqEP5Bi7Selb8qIhzzs1xGD7SZfhyRm9zr2EZ2XTQrAAWHOQaeQ+4LKBsR/i+
 d9VPMuXyD1SSOT7JCLQ9OY7NksWJHI2AZT3rc1/deOZJAdiXmY7BJf5xLIqe4Vh2aNPhOrM1
 ninXwlTz1+XrWfGIAOTd3FlbpvgWJ9+qTQwOilEFUyv0XklJ5ym6qsffoQ+VbA98apoyvscZ
 /QJdMyaRPVATjnc+j0GRYn8qI1kZFKgggfmFwO/fDU6SLtxSAXI98HMcxPm8W8FCS/fnfAir
 qKpzB+dYZsHSwloFs/QZNqjyEm3sGICn/hxRA3DJdw7UGDl7JQsEDT8iPQ6OekFMxCFzTyfv
 y6aGQwdpPXNi4Yt/cPVmLufqIO0D+p5GFEcFG7ehZ68MiPQ7yyu2o9EXeOBexjSUWr1/OOpY
 uA95+v7Orsbm0lMt4dtO7luxKM6odDootdyxQFlGmTCdViDD61hOWWPm8JIs8Vlz6RZ/wnwR
 UOL9thcNp2GPcrkFBgaIw9NRuOH1O8VlyOU6f0wKkjg+Adp9aaKSgNcJXGkhDNYM5N8NYo3x
 uFns8lQ9g/XogonNJOKgz5Z80yIL2ccSOM3u5cCGojphwE3jFZYbvT0Ayr3/LmObdtWO0UnK
 zPSg7DN75xW3EvLdTwsEn/BxsJNhJAPvgAMx1gHT3yXk8DMivA+wQFY9Bw4Sw1UylNM1OcbE
 mRmOlVpJaTI+h9smNRYGWurHmlpAxmU+Vf4zVcTo3HIVEmjVmHLL2oVNP6E+QYS9Gc0ViNQ+
 62E12rNXjPjfcW31Sw3MWZvpvrLQMx26gTEmd2iWcWCd7ExaCDphaKGbmMSpxzqR8g2gSXvv
 eht4Pw2arf8MQZLpqE2Ac+R0rF4YCqNJHFGB8pg+qwJNWjGfXe53j3mA0qrd8VBLvrJqhbgI
 8NrL8NLER+50U6mqTQWBrUFJbNuq/cv6MAfYbPgJWMAsLy3oyJgtdTb8S2WrG4tWMh0nsEVM
 ILKei+aVGqdmRNpd3Tl9ZcefDDiOJ9dOVO6jLvdHPg1+4wrrNp+K0gO85iPrkq5ElRWphHMo
 SfkePqDpwB98rhEk4zpG6RFIgy7L9LvSeiFmDyOX8RygcDnapmX6V5MwrXzF0EPZOZKBYwr/
 ViYmISvtH4pqoraRIwwd3OpM6BSrfu/U+NMWi4cBCkLxHDSMCMADvZqxoxZFXCruI4FjiVEb
 1HhACdVSTLzc40HrJGyQ3ICeyvx84ytMs/dSdqV9pxg8CQ13w3dN8+A/nT0d2xdfSJgE8SgV
 l+q5avxuIoF89kk6Po46xdOWcUQzLjLA/ZOSjEMnWPAUjnAbq2q5NMOaibMGRmUUyLZQa4WE
 LrORwTkdQTahU075IoxjmCGhTVOVCwVqbBpJio1oocq4xjnXD9uBblMav0uV8AL+hEeIbmlP
 VkhmkN5Un6jNdmFGD2hiOnesvC3XbJWYI6jdm10pyt5qU6eXeu9PVeozQ89i19ecTr/1uC3b
 9YY/3z7JB+qxZ91A+0U45SGbS1PnZs2GlpgFZjBrvHP
IronPort-HdrOrdr: A9a23:etxYlqFAuAA0wzCfpLqFaJHXdLJyesId70hD6qkvc3Jom52j+P
 xGws526fatskdrZJhSo6H7BEDgewKXyXcR2+gs1NiZLXDbUQeTXeNfBOjZsnDd8k/Fh5ZgPM
 5bGsAUYrCRfDtHZK7BkU6F+r0bsb26GdWT9IHjJgBWPGZXgs9bnmJEIzfeNnczaBhNBJI/Gp
 bZzNFAvSCcdXMeadn+LmUZXsDYzue72K7OUFojPVoK+QOOhTSn5PrRCB6DxCoTVDtJ3PML7X
 XFqQrk/a+u2svLhSM0llWjoai+quGRiuerN/b8yfT97Q+cyDpAUb4RGoFqegpF5d1Hpmxa1O
 Uk6C1QQvibo0mhAl1d5yGdnTUImQxelUPK2BuWh2Durtf+Qy9/A81dhZhBeh+c8EY4uspguZ
 g7ll5wJ/JsfGz9dQnGlq/1vitR5zyJSLsZ4Jwupm0aVZFbZK5arIQZ8k8QGJAcHDji4IRiFO
 V1FsnT6PtfbFvfNhnizyJS6c3pWm52EgaNQ0AEtMDQ2z9KnGphx09dwMAEhH8P+J80VpEB7e
 XZNaZjkq1IU6YtHOpALfZERdHyBn3GQBrKPm7XKVP7FLsfM3aIsJLz6KVd3pDfRHXJ9upGpH
 3saiIpiYdpQTOeNSSn5uw5zizw
X-IronPort-AV: E=Sophos;i="5.90,225,1643691600"; 
   d="asc'?scan'208";a="70033702"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=ibBakypQNPB5E73fvKa+Rqcgspmal73u1yCAuaNn9filSOyrsd8K11GrGsZA9ZJ/F2xYflgWCvWOzs2U9Y4QT6ztpjPQXXER8BIrlWfD0AXzV0oxZbNM2IDb7NUrRsUTBgOpsHAY9j0fLC6ikCH2T1bzNz0CSvvrnaZUJwNtkIODR/YRNYoMiHFaptepm3hADSzXpAug1z7gEIejnWOEhkVHmJw7PLNMiwjYMi+60an8YjzRDqq73rGgVNuPkLoXeExnsOru1k7z5w76cjruIjGajQ+6vfEjCWPlj94BkvgyDslx0vGH4wVf2yEZNBDqhOyCPZLP1wp0PWsApKm2TA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=ve7KOx61KXyOPV/iqoCIcA+DgWloZQoAQINkjlxJtk4=;
 b=VR7XPD1sDTPUSXBJAm1D0AsinqFfTj1ThEpqjLkKi+tPLRkj/130Lrf4FQ39apZZTYDDU0d1iL2U76lzHIJ90ColWyCKNRX9TnK7gX37QO2zTzTVS3RP4fwAnDWgh+mvrbj/sQXbvzGtlxmHNNcT40CTcgwoMaBNsabpyMboef6dFf9x1P1nYMSSqTD4ouegJgADYS+ngHfvTrKW14kd/TrfMfpde7lPlu2ovPF+UK97ndSnz6wiDkdhtRP24TfftX3W2Cqixoff0ugghXXUvQo0h4pxCFdFTl603aQ7VFhlc7V0y5V2ZzWeTvqhexkoQAEXXHOzcProbiG8vKvosQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=ve7KOx61KXyOPV/iqoCIcA+DgWloZQoAQINkjlxJtk4=;
 b=IrVCEufxWly4507Xf+Xouz7GKfh3WOXHHZSfzI+4TTu7E5Z5/9ddqkQlHgYpv46CqxyQhDokwPqnYHuM76/CW1DX4Ppym0g+km2DybgAIQeeCg4EFCWzIoOWSsbWSWmpZtAF3ZuPGViLoVYHILvF+tN/WyKb1aGiDJN9TZ9Mojs=
From: George Dunlap <George.Dunlap@citrix.com>
To: xen-devel <xen-devel@lists.xenproject.org>, Tamas K Lengyel
	<tamas.k.lengyel@gmail.com>, "intel-xen@intel.com" <intel-xen@intel.com>,
	"daniel.kiper@oracle.com" <daniel.kiper@oracle.com>, Roger Pau Monne
	<roger.pau@citrix.com>, Sergey Dyasli <sergey.dyasli@citrix.com>, Christopher
 Clark <christopher.w.clark@gmail.com>, Rich Persaud <persaur@gmail.com>,
	Kevin Pearson <kevin.pearson@ortmanconsulting.com>, Juergen Gross
	<jgross@suse.com>, =?utf-8?B?UGF1bCBEdXJyYW50wqA=?= <pdurrant@amazon.com>,
	"Ji, John" <john.ji@intel.com>, "edgar.iglesias@xilinx.com"
	<edgar.iglesias@xilinx.com>, "robin.randhawa@arm.com"
	<robin.randhawa@arm.com>, Artem Mygaiev <Artem_Mygaiev@epam.com>, Matt
 Spencer <Matt.Spencer@arm.com>, "Stewart Hildebrand"
	<Stewart.Hildebrand@dornerworks.com>, Volodymyr Babchuk
	<volodymyr_babchuk@epam.com>, Jeff Kubascik <Jeff.Kubascik@dornerworks.com>,
	Stefano Stabellini <sstabellini@kernel.org>, Julien Grall <julien@xen.org>,
	Rian Quinn <rianquinn@gmail.com>, "Daniel P. Smith"
	<dpsmith@apertussolutions.com>,
	=?utf-8?B?4oCL4oCL4oCL4oCL4oCL4oCL4oCLRG91ZyBHb2xkc3RlaW4=?=
	<cardoe@cardoe.com>, George Dunlap <George.Dunlap@citrix.com>, "David
 Woodhouse" <dwmw@amazon.co.uk>,
	=?utf-8?B?4oCL4oCL4oCL4oCL4oCL4oCL4oCLQW1pdCBTaGFo?= <amit@infradead.org>,
	=?utf-8?B?4oCL4oCL4oCL4oCL4oCL4oCL4oCLVmFyYWQgR2F1dGFt?=
	<varadgautam@gmail.com>, Brian Woods <brian.woods@xilinx.com>, Robert Townley
	<rob.townley@gmail.com>, Bobby Eshleman <bobby.eshleman@gmail.com>,
	=?utf-8?B?4oCL4oCL4oCL4oCL4oCL4oCL4oCLQ29yZXkgTWlueWFyZA==?=
	<cminyard@mvista.com>, Olivier Lambert <olivier.lambert@vates.fr>, "Andrew
 Cooper" <Andrew.Cooper3@citrix.com>, Ash Wilding <ash.j.wilding@gmail.com>,
	Rahul Singh <Rahul.Singh@arm.com>, =?utf-8?B?UGlvdHIgS3LDs2w=?=
	<piotr.krol@3mdeb.com>, Brendan Kerrigan <brendank310@gmail.com>, "Thierry
 Laurion (Insurgo)" <insurgo@riseup.net>, Oleksandr Andrushchenko
	<oleksandr_andrushchenko@epam.com>, Oleksandr Tyshchenko
	<oleksandr_tyshchenko@epam.com>, Deepthi <deepthi.m@ltts.com>, Scott Davis
	<scottwd@gmail.com>, Ben Boyd <ben@exotanium.io>, Anthony Perard
	<anthony.perard@citrix.com>, Michal Orzel <michal.orzel@arm.com>
Subject: [ANNOUNCE] Call for agenda items for 5 April Community Call @ 1500
 UTC
Thread-Topic: [ANNOUNCE] Call for agenda items for 5 April Community Call @
 1500 UTC
Thread-Index: AQHYRPPtp6N7a18DXEmosZ+du6qfkw==
Date: Thu, 31 Mar 2022 11:39:06 +0000
Message-ID: <142FFB61-B491-4B27-973B-6AD09345CAE6@citrix.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: eb3fab13-d3ff-4879-0697-08da130b103a
x-ms-traffictypediagnostic: DS7PR03MB5638:EE_
x-microsoft-antispam-prvs: <DS7PR03MB5638050676DF56F7DFD619DD99E19@DS7PR03MB5638.namprd03.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PH0PR03MB5669.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(921005)(6506007)(6512007)(82960400001)(508600001)(38070700005)(38100700002)(5660300002)(2616005)(8936002)(7406005)(26005)(186003)(7416002)(33656002)(2906002)(122000001)(36756003)(91956017)(8676002)(64756008)(99936003)(66946007)(76116006)(66556008)(71200400001)(66476007)(66446008)(316002)(86362001)(83380400001)(110136005)(6486002)(966005)(221023002)(45980500001);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?Sm5BWTQrdzZ3L3NkQkhxRmVXcUJRbDg5Ujl3MjRZeHoyTWV1YWhPM0szNGMw?=
 =?utf-8?B?REl4MFQ2THZUVExyZ0RVaUY5L3pMM1FUOUVQNXY5dUoxUkQvYXJCSFBtY1lV?=
 =?utf-8?B?YThiWHp6ekQxNm1CN2k4SEpHdS9HQVI4ckU4NHErd3BDV0ROQWh5OFpOWHh6?=
 =?utf-8?B?bHI3T3E1b1lxWi9jUHI2M2JqRGEzcS9vMlJ5SVlpQjZNaWxOY2tpVkZKY0dT?=
 =?utf-8?B?eEdFWVo0NndCSXA3NngzVSs3ZDh5K2NJdys3cy9tRHlON0RXRVY5aWk3MXdn?=
 =?utf-8?B?UnRaRVRUSzA2R1pHT1VkSGlxbDRBaUNraTJnVU5jbHZncTFXQ3pNdmZqNkVV?=
 =?utf-8?B?WVpldHZwUU81MnNQQ2hna05OUW1FS1lDdk1JSlBXckdzSE9MM0xoRHVLTHR3?=
 =?utf-8?B?U2Q3RFVIQTZObHgvMHB1T0VoT1pLdGpPWG9CMGpxUTFBT0gvNnZQWjBuZjFU?=
 =?utf-8?B?OW0vOUtaZDVCV2thQUxiajYvbWppWm11eHpxOFpUNzNGMUUrWU9QZVdIT1Vx?=
 =?utf-8?B?OGg1Z25HeEZveTJES0NQVnFVa2ZtMlpzSzFZaU1tVlBuUVJpVnBla3lsSGFL?=
 =?utf-8?B?OG41d1FLY1VVbFA5ZktUOVorc1BXSFdJWnJlbW1oMnRVTW81TTBQZFExRHpM?=
 =?utf-8?B?L0hhUnZhWTdmcml0U2lNcWFQcVhnQmhrR0J1VGFWcXU2ZDhvamw0WFpyazR0?=
 =?utf-8?B?eHJsSFUwTWlPbUNyWjJhK3VvSFJVc0E5ZWpsaFp1bkNrNjVYQXNYd01HWEdT?=
 =?utf-8?B?Ny8wWmEyeUcvd1k1aWJRcXZrTG16STVrSENaQ0NCOTZ1d0tjRTFQcGVPdUsr?=
 =?utf-8?B?NlVIRHE3NmN3NnZJcTVwS2t6a2c3VUhUc0pLbHJvOWx3YW1TblFvbFFLMkZi?=
 =?utf-8?B?NHlWMkNXeVpNaktiNHIzdm1BUC9vQnQ3V2RLelUrN1JoY1RZWXozVi9JNVJz?=
 =?utf-8?B?c00reHJiQVFIaVZRUzA1TkRVSDJ1UytNNXU4NDl3b21RWUdTVkJjN3hnTzlC?=
 =?utf-8?B?dWRTQytORXRhWi95bkhnbG9xZVUrSi9CWnp5MlJxUXFLSkoxN25WRE9mNXVS?=
 =?utf-8?B?THdmWTk4T3l4UVA4eWh5WGdLVy9LOFRQZUxpemhrTmNMNjBZeSsyc2pWcjVM?=
 =?utf-8?B?SkNpQm1mMlZrZFVSNTI3eHE4RUZrYnlIL2llVFNPd3hxR3RQZGJuWDlOeVR5?=
 =?utf-8?B?VmcvNUp1ZU9mQmZsUXoydVZPZTJxamR3UUg2SVdNSG1Xemw2ZXkrc2diejhD?=
 =?utf-8?B?aVhJZTh2NXdPVk9WUEJqa09BN1FLTkdNd0svMzFPZzF1R2FsY0VucDc0eDVY?=
 =?utf-8?B?Y2ZyTnZZL2hTNCtNa24xaHh6MnhKUDNLditLOEpmVDNBenlZT0k1MTd2YjEv?=
 =?utf-8?B?aWw5dzZvSE9TTEhPRVFIaVBsd3hiY2xTRmVaYjYrUlpLRW5OMW4zYjBmVWhJ?=
 =?utf-8?B?dmY0bnVxZXBCU3ZvNTV4UXljVDBFQ1VTZ0hDNHhjVkdyNGJpRENoa3RyMTNK?=
 =?utf-8?B?V0hWSE5aVkRkUmpPT0QrMk44WjJOd1JQSTV2bGk0ZGdEYzFCbTZ5ZU02RktO?=
 =?utf-8?B?eFpXMVRzdCtNQ2pEeHZBTkNOanlKNk9pS1FreVZXM2NyTW84Q1ZMVE5uMm5S?=
 =?utf-8?B?c1RXbngwYTBPTWQvQlo1N2REZ1AwUGNQTDlCTlMzeU1oTi8zNFFreldZbzBr?=
 =?utf-8?B?OFoxSCtiVFlPU3ZqQ3VZRjBnbU80cVpuT3RsOVJpOXdxbGZNVW5UQktPbW93?=
 =?utf-8?B?YXFIdVNORHZpVGV2bmNpQmF4aVg4YklnYklPekxCcDZOeFFDam1WRmo5eFBF?=
 =?utf-8?B?TmhNR0lFUkdKaDNPc21PZXZmdmUyMHBGSFBnakJ0TnU2TlhCSEE0U1pNTCtS?=
 =?utf-8?B?WDRhdWtqbjM0SGxHU0ZIWDZNNE9Qa1VBNEI5SjhvRkh5NW1YalZ1dFpNRXpZ?=
 =?utf-8?B?bEtIK0pmbU84dmJXNlR5KzJTOGNBaGgrWTd0eUFlTDMyYzYzUWFucnBGMld0?=
 =?utf-8?B?bHh4VUltb0U2UVRWak5oNnhpR2F1UEdVWmFxeFNYSVpoK0tHbHpjSzFuL28w?=
 =?utf-8?B?Rzl5b21WZW9mSzlrN0EvWnlkNWhieTVVczRJZXlXbDVKOURnbG5acWswWXU1?=
 =?utf-8?B?aW9QVURlVTIrNGptOFdOaCtIRS9PSjF0SktJVXR1WkNSOU1TUDNkK1dwWURk?=
 =?utf-8?B?dnB4emFXNzhjcytzc3pqeFZpMC9qcG91bnhUaTFiLzhDZjJNVW52WXlXZllF?=
 =?utf-8?B?K29CMzhkOXpRWkVHTlJjelYraUt6WHJqZUlLWnZzQW15QzdRY2hucjVna2xD?=
 =?utf-8?B?STU5Q0pwTXoxZ0VpMW5BTXlQVlhlWFV5M2FnbW1iVEFXQklYRGdGWFdNM3VW?=
 =?utf-8?Q?XW2sSV7HdTfsCyTo=3D?=
Content-Type: multipart/signed;
	boundary="Apple-Mail=_C219D192-E35E-48BC-BEB7-3EF0C8657064";
	protocol="application/pgp-signature";
	micalg=pgp-sha512
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR03MB5669.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: eb3fab13-d3ff-4879-0697-08da130b103a
X-MS-Exchange-CrossTenant-originalarrivaltime: 31 Mar 2022 11:39:06.1965
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: wFRguPyT6iKm2pEL8Dque7Zn9eDjy1i0oyM+sSwLHbVH5SgciScBYYSJNSUpiC3WRiL4vQ710Er1AYpxvD3XtyOMkDftiDFlQoL4j87AvOQ=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS7PR03MB5638
X-OriginatorOrg: citrix.com

--Apple-Mail=_C219D192-E35E-48BC-BEB7-3EF0C8657064
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii


Hi all,

The proposed agenda is in =
https://cryptpad.fr/pad/#/2/pad/edit/LX1iwUFsMmBkyttPZuN5SvRE/ and you =
can edit to add items.  Alternatively, you can reply to this mail =
directly.

Agenda items appreciated a few days before the call: please put your =
name besides items if you edit the document.

Note the following administrative conventions for the call:
* Unless, agreed in the pervious meeting otherwise, the call is on the =
1st Tuesday of each month at 1600 British Time (either GMT or BST)

* I usually send out a meeting reminder a few days before with a =
provisional agenda

* To allow time to switch between meetings, we'll plan on starting the =
agenda at 16:05 sharp.  Aim to join by 16:03 if possible to allocate =
time to sort out technical difficulties &c

* If you want to be CC'ed please add or remove yourself from the =
sign-up-sheet at =
https://cryptpad.fr/pad/#/2/pad/edit/D9vGzihPxxAOe6RFPz0sRCf+/

Best Regards
George



=3D=3D Dial-in Information =3D=3D
## Meeting time
15:00 - 16:00 UTC
Further International meeting times: =
https://www.timeanddate.com/worldclock/meetingdetails.html?year=3D2022&mon=
th=3D04&day=3D5&hour=3D15&min=3D0&sec=3D0&p1=3D1234&p2=3D37&p3=3D224&p4=3D=
179


## Dial in details
Web: https://meet.jit.si/XenProjectCommunityCall

Dial-in info and pin can be found here:

https://meet.jit.si/static/dialInInfo.html?room=3DXenProjectCommunityCall

--Apple-Mail=_C219D192-E35E-48BC-BEB7-3EF0C8657064
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="signature.asc"
Content-Type: application/pgp-signature;
	name=signature.asc
Content-Description: Message signed with OpenPGP

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEj3+7SZ4EDefWZFyCshXHp8eEG+0FAmJFksMACgkQshXHp8eE
G+1Q+Af/bLQjzdkzaKsD8zCe6eDtRBwyG6xhCWI1SUPiJYeZU/wkKjhBpVEh6esF
7GnhpYe9IPt/Q1RZxOhc9/UGL8DvEBz5YyjBMa7twszDveu3V3vWyUdqsrGfj8y+
7AHvaVPADMUDpDX8U4QHWjQAsx5z+urhwUT1LrgofmPoJOSyQBi60FR09lStrku0
7y+PmQEjfxtVYWCXxhgUqBvog646RcvUYSwcnJBydUKIrKPo/staFFkb/xUy1RiX
kW/x2C/F9uR6NLDnyH2S2UmDoH7OYBAqD9eL7RKKAMFT6QfwVjW/vcP22CM4Y1WP
GrSuSZt/PIwS9+eB4iBqY5uhcOgIpA==
=SvjH
-----END PGP SIGNATURE-----

--Apple-Mail=_C219D192-E35E-48BC-BEB7-3EF0C8657064--


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 12:00:01 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 12:00:01 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296897.505544 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZtT2-0006Fu-OO; Thu, 31 Mar 2022 11:59:56 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296897.505544; Thu, 31 Mar 2022 11:59:56 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZtT2-0006Fn-LP; Thu, 31 Mar 2022 11:59:56 +0000
Received: by outflank-mailman (input) for mailman id 296897;
 Thu, 31 Mar 2022 11:59:54 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=ZIho=UK=invisiblethingslab.com=demi@srs-se1.protection.inumbo.net>)
 id 1nZtT0-0006Fh-Ke
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 11:59:54 +0000
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com
 [66.111.4.25]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 11e52b6b-b0ea-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 13:59:52 +0200 (CEST)
Received: from compute4.internal (compute4.nyi.internal [10.202.2.44])
 by mailout.nyi.internal (Postfix) with ESMTP id AAAB65C0158;
 Thu, 31 Mar 2022 07:59:50 -0400 (EDT)
Received: from mailfrontend1 ([10.202.2.162])
 by compute4.internal (MEProxy); Thu, 31 Mar 2022 07:59:50 -0400
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Thu,
 31 Mar 2022 07:59:50 -0400 (EDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 11e52b6b-b0ea-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:cc:content-type:date:date:from:from
	:in-reply-to:in-reply-to:message-id:mime-version:references
	:reply-to:sender:subject:subject:to:to:x-me-proxy:x-me-proxy
	:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=lDbZgsxIIeNbo+B49
	jvK6OmafuHV6dWbW9wBQx5FHDA=; b=J4M4wHmeFD1KxqiBuzglrZ+lYMgSQPY9b
	YAxyTq/JhBzsQD+HqxQWhcpbdc5bFJRFc9CMbBUtzrYQwy1Q3IfDjmN2ftUbdLPO
	+Sb3NsUzKuToeeqwV/XiB+xwqT0MklAOYL3+QB4g98uBDC6h6X1LkmXItIloXihM
	U6DcAlwmLqChlG43FVn8be+QxoswIXpW5qU8Xca2bmmMBm7D6wUnBoyNPh6vlIDB
	AJIeMl6jC7UXvheDQd/Q6714QFItVueIZ205t+SayUDN/DTyhIYnfHq+61euVU0s
	DVh9Dz4KT/V+NJ7C+GgHDXL4XQPiLYvYiKawTPBfirkCvRZPpWbTg==
X-ME-Sender: <xms:tpdFYks3Z9KWxiW9_Qfi_EKBsEHi4MK66zndP9WjyisuHgO6tIvcxg>
    <xme:tpdFYhcJupzW912KAZ0XXzvsIVa1x0I2SdGB87y0qTLd8-BLcPCUUPDwfFRS0c90S
    oaIu31XFIAF65g>
X-ME-Received: <xmr:tpdFYvzg9Cn2WJ2a-TwvYZEa0-e48u-RvvQUDQ4-s-3ztsyA1mKslD7sJKp0>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddrudeigedggeejucetufdoteggodetrfdotf
    fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen
    uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne
    cujfgurhepfffhvffukfhfgggtuggjsehgtderredttdejnecuhfhrohhmpeffvghmihcu
    ofgrrhhivgcuqfgsvghnohhurhcuoeguvghmihesihhnvhhishhisghlvghthhhinhhgsh
    hlrggsrdgtohhmqeenucggtffrrghtthgvrhhnpedttedtueeivdefiedugfejtdeutdel
    fedvueekledtudegjedviedukeefhfeuteenucevlhhushhtvghrufhiiigvpedtnecurf
    grrhgrmhepmhgrihhlfhhrohhmpeguvghmihesihhnvhhishhisghlvghthhhinhhgshhl
    rggsrdgtohhm
X-ME-Proxy: <xmx:tpdFYnOfmRSpqg_3PzqDfSyJOHZpqJ2696jr76DUSvJTUSe-j6xomw>
    <xmx:tpdFYk_68b42UuLy4i_f3pfVtb7WFFeIofr9Abdfqq1ebV_wge5i8w>
    <xmx:tpdFYvUppXfVrkrpIae7ty_8fvIcSurRBf5En2vA6KbkBDkkipucow>
    <xmx:tpdFYtKnt8jgUSnWZB1P04d92nobeXFw0XYXvMLgqCBlulleaWDPsw>
Date: Thu, 31 Mar 2022 07:57:56 -0400
From: Demi Marie Obenour <demi@invisiblethingslab.com>
To: Luca Fancellu <Luca.Fancellu@arm.com>
Cc: Xen developer discussion <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v2] Grab the EFI System Resource Table and check it
Message-ID: <YkWXszMR0/b3BcZg@itl-email>
References: <YkS3FthpZU0xQ2Y7@itl-email>
 <783D6789-9BC6-49BC-8345-478A862083E2@arm.com>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="Wu1PtQnvB+OmM4YK"
Content-Disposition: inline
In-Reply-To: <783D6789-9BC6-49BC-8345-478A862083E2@arm.com>


--Wu1PtQnvB+OmM4YK
Content-Type: text/plain; protected-headers=v1; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Date: Thu, 31 Mar 2022 07:57:56 -0400
From: Demi Marie Obenour <demi@invisiblethingslab.com>
To: Luca Fancellu <Luca.Fancellu@arm.com>
Cc: Xen developer discussion <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v2] Grab the EFI System Resource Table and check it

On Thu, Mar 31, 2022 at 07:04:34AM +0000, Luca Fancellu wrote:
> Hi,
>=20
> >=20
> > diff --git a/xen/arch/arm/efi/efi-boot.h b/xen/arch/arm/efi/efi-boot.h
> > index 458cfbbed4..398a2411a1 100644
> > --- a/xen/arch/arm/efi/efi-boot.h
> > +++ b/xen/arch/arm/efi/efi-boot.h
> > @@ -187,7 +187,8 @@ static bool __init meminfo_add_bank(struct meminfo =
*mem,
> >=20
> > static EFI_STATUS __init efi_process_memory_map_bootinfo(EFI_MEMORY_DES=
CRIPTOR *map,
> >                                                 UINTN mmap_size,
> > -                                                UINTN desc_size)
> > +                                                UINTN desc_size,
> > +                                                const EFI_MEMORY_DESCR=
IPTOR *const esrt_desc)
> > {
> >     int Index;
> >     EFI_MEMORY_DESCRIPTOR *desc_ptr =3D map;
> > @@ -199,6 +200,7 @@ static EFI_STATUS __init efi_process_memory_map_boo=
tinfo(EFI_MEMORY_DESCRIPTOR *
> >               desc_ptr->Type =3D=3D EfiLoaderCode ||
> >               desc_ptr->Type =3D=3D EfiLoaderData ||
> >               (!map_bs &&
> > +               desc !=3D esrt_desc &&
>=20
> I was going to test it but this line is breaking arm build.

Not too surprising; I don=E2=80=99t think I actually built this for ARM.  C=
an
you post the error you get?  I=E2=80=99ll send a v3 once that is fixed.

> >                (desc_ptr->Type =3D=3D EfiBootServicesCode ||
> >                 desc_ptr->Type =3D=3D EfiBootServicesData))) )
> >         {
> >=20
>=20
> I see CC list is pretty small, did you forget to add the maintainers?

Yeah, I did indeed forget.

> Cheers,
> Luca
>=20

--=20
Sincerely,
Demi Marie Obenour (she/her/hers)
Invisible Things Lab

--Wu1PtQnvB+OmM4YK
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=YA3H
-----END PGP SIGNATURE-----

--Wu1PtQnvB+OmM4YK--


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 12:01:39 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 12:01:39 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296901.505555 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZtUh-0007hJ-8P; Thu, 31 Mar 2022 12:01:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296901.505555; Thu, 31 Mar 2022 12:01:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZtUh-0007hC-5M; Thu, 31 Mar 2022 12:01:39 +0000
Received: by outflank-mailman (input) for mailman id 296901;
 Thu, 31 Mar 2022 12:01:38 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=nuZR=UK=invisiblethingslab.com=marmarek@srs-se1.protection.inumbo.net>)
 id 1nZtUg-0007h4-4h
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 12:01:38 +0000
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com
 [66.111.4.25]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 4af6ea96-b0ea-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 14:01:27 +0200 (CEST)
Received: from compute2.internal (compute2.nyi.internal [10.202.2.46])
 by mailout.nyi.internal (Postfix) with ESMTP id AD1F65C00EE;
 Thu, 31 Mar 2022 08:01:32 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163])
 by compute2.internal (MEProxy); Thu, 31 Mar 2022 08:01:32 -0400
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Thu,
 31 Mar 2022 08:01:31 -0400 (EDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 4af6ea96-b0ea-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:cc:content-type:date:date:from:from
	:in-reply-to:in-reply-to:message-id:mime-version:references
	:reply-to:sender:subject:subject:to:to:x-me-proxy:x-me-proxy
	:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=Tx1mrRGfBWfU+0EvM
	EXhqZAK8HzQZbdRKM7Rc8ILzx0=; b=P8NLlaI32WzbDHdQxmKu4JM5tSE00ZfjE
	QSHC5TN+rE4CJPUV4GlttoexDCubRG+wgvhJ5eQ43vyFz30RfRupDp9IZF8oxh7v
	GRbUu4PKcPvASsoaCmqI5dCSv/gNFz+vYQptA9hNnPmybef+7Qg54CPAHPgmpWXJ
	TMjpPdNAJ3iDAmv44uTWPNSau8M8+5lRpwToeNFsa2tAVFXNtZ+PA32g4fJWaDjp
	2BNdXa6dyfnmrMineCPDe7mL/erbOwyTysi281YGIvr+RqBQO50AWAKY8sbMtNyO
	75DANWzXS/rBGBFIPEvaUgTcUy5wVQ7c/lyifA27BZnJrSCh8BLVA==
X-ME-Sender: <xms:HJhFYuCA_Fz0yxLh32WICUiaMnuq-Jgiq0UiDQdC3nlYSfl5Ccts5w>
    <xme:HJhFYog7wslneb6Upv5TpqL1uX_YD4eoXE26Uief41Z37MwDkeka5s-uPZXzxZZeL
    mUNL-ZzN7loaA>
X-ME-Received: <xmr:HJhFYhnh7zHtJpeq7Pg3oLm6We5jFOh-6Yfq9MyuBLnTnuUtQJnZ3ZyZhv6ArdEpKUefIJG0kj6HXlVuVYH156AhqJF_kKkoAQ>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddrudeigedggeejucetufdoteggodetrfdotf
    fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen
    uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne
    cujfgurhepfffhvffukfhfgggtuggjsehgtderredttdejnecuhfhrohhmpeforghrvghk
    ucforghrtgiihihkohifshhkihdqifpkrhgvtghkihcuoehmrghrmhgrrhgvkhesihhnvh
    hishhisghlvghthhhinhhgshhlrggsrdgtohhmqeenucggtffrrghtthgvrhhnpeekgedt
    gfdvieehhfehtddvleeiieeuteevheetffejjeejvdeijeevhfeufeefgeenucffohhmrg
    hinhepghhithhhuhgsrdgtohhmnecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghm
    pehmrghilhhfrhhomhepmhgrrhhmrghrvghksehinhhvihhsihgslhgvthhhihhnghhslh
    grsgdrtghomh
X-ME-Proxy: <xmx:HJhFYsy5Tj1NLcA7x8lwIySrG-SopqNwOqqttG7T1i3Vyd-2q-bK6A>
    <xmx:HJhFYjQoxkH9gNRKhEhZCbO25Ok2wWXFZoumL1QVOO9MMsI5S3q8qA>
    <xmx:HJhFYnZyVLI0C0tHhVl2qWwUGVpC6dzD37T4n3Fl3RIb5_sk7oC_dw>
    <xmx:HJhFYmNXbyfu8gNqCY3LA7WeTj0bfracd_wvlhDvmgkNVmvyPshnfQ>
Date: Thu, 31 Mar 2022 14:01:28 +0200
From: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: Juergen Gross <jgross@suse.com>
Cc: xen-devel <xen-devel@lists.xenproject.org>
Subject: Re: Increasing domain memory beyond initial maxmem
Message-ID: <YkWYGFJ/Cl+B2C37@mail-itl>
References: <YkUlLvnEDdc5hwN4@mail-itl>
 <2684376b-3ae6-a2b7-581f-2bd38ab6056b@suse.com>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="xoimVyVpapmBJn8n"
Content-Disposition: inline
In-Reply-To: <2684376b-3ae6-a2b7-581f-2bd38ab6056b@suse.com>


--xoimVyVpapmBJn8n
Content-Type: text/plain; protected-headers=v1; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Date: Thu, 31 Mar 2022 14:01:28 +0200
From: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: Juergen Gross <jgross@suse.com>
Cc: xen-devel <xen-devel@lists.xenproject.org>
Subject: Re: Increasing domain memory beyond initial maxmem

On Thu, Mar 31, 2022 at 08:41:19AM +0200, Juergen Gross wrote:
> On 31.03.22 05:51, Marek Marczykowski-G=C3=B3recki wrote:
> > Hi,
> >=20
> > I'm trying to make use of CONFIG_XEN_BALLOON_MEMORY_HOTPLUG=3Dy to incr=
ease
> > domain memory beyond initial maxmem, but I hit few issues.
> >=20
> > A little context: domains in Qubes OS start with rather little memory
> > (400MB by default) but maxmem set higher (4GB by default). Then, there =
is
> > qmemman daemon, that adjust balloon targets for domains, based on (among
> > other things) demand reported by the domains themselves. There is also a
> > little swap, to mitigate qmemman latency (few hundreds ms at worst).
> > This initial memory < maxmmem in case of PVH / HVM makes use of PoD
> > which I'm trying to get rid of. But also, IIUC Linux will waste some
> > memory for bookkeeping based on maxmem, not actually usable memory.
> >=20
> > First issue: after using `xl mem-max`, `xl mem-set` still refuses to
> > increase memory more than initial maxmem. That's because xl mem-max does
> > not update 'memory/static-max' xenstore node. This one is easy to work
> > around.
> >=20
> > Then, the actual hotplug fails on the domU side with:
> >=20
> > [   50.004734] xen-balloon: vmemmap alloc failure: order:9, mode:0x4cc0=
(GFP_KERNEL|__GFP_RETRY_MAYFAIL), nodemask=3D(null),cpuset=3D/,mems_allowed=
=3D0
> > [   50.004774] CPU: 1 PID: 34 Comm: xen-balloon Not tainted 5.16.15-1.3=
7.fc32.qubes.x86_64 #1
> > [   50.004792] Call Trace:
> > [   50.004799]  <TASK>
> > [   50.004808]  dump_stack_lvl+0x48/0x5e
> > [   50.004821]  warn_alloc+0x162/0x190
> > [   50.004832]  ? __alloc_pages+0x1fa/0x230
> > [   50.004842]  vmemmap_alloc_block+0x11c/0x1c5
> > [   50.004856]  vmemmap_populate_hugepages+0x185/0x519
> > [   50.004868]  vmemmap_populate+0x9e/0x16c
> > [   50.004878]  __populate_section_memmap+0x6a/0xb1
> > [   50.004890]  section_activate+0x20a/0x278
> > [   50.004901]  sparse_add_section+0x70/0x160
> > [   50.004911]  __add_pages+0xc3/0x150
> > [   50.004921]  add_pages+0x12/0x60
> > [   50.004931]  add_memory_resource+0x12b/0x320
> > [   50.004943]  reserve_additional_memory+0x10c/0x150
> > [   50.004958]  balloon_thread+0x206/0x360
> > [   50.004968]  ? do_wait_intr_irq+0xa0/0xa0
> > [   50.004978]  ? decrease_reservation.constprop.0+0x2e0/0x2e0
> > [   50.004991]  kthread+0x16b/0x190
> > [   50.005001]  ? set_kthread_struct+0x40/0x40
> > [   50.005011]  ret_from_fork+0x22/0x30
> > [   50.005022]  </TASK>
> >=20
> > Full dmesg: https://gist.github.com/marmarek/72dd1f9dbdd63cfe479c94a3f4=
392b45
> >=20
> > After the above, `free` reports correct size (1GB in this case), but
> > that memory seems to be unusable really. "used" is kept low, and soon
> > OOM-killer kicks in.
> >=20
> > I know the initial 400MB is not much for a full Linux, with X11 etc. But
> > I wouldn't expect it to fail this way when _adding_ memory.
> >=20
> > I've tried also with initial 800MB. In this case, I do not get "alloc
> > failure" any more, but monitoring `free`, the extra memory still doesn't
> > seem to be used.
> >=20
> > Any ideas?
> >=20
>=20
> I can't reproduce that.
>=20
> I started a guest with 8GB of memory, in the guest I'm seeing:
>=20
> # uname -a
> Linux linux-d1cy 5.17.0-rc5-default+ #406 SMP PREEMPT Mon Feb 21 09:31:12
> CET 2022 x86_64 x86_64 x86_64 GNU/Linux
> # free
>         total     used      free   shared  buff/cache   available
> Mem:  8178260    71628   8023300     8560       83332     8010196
> Swap: 2097132        0   2097132
>=20
> Then I'm raising the memory for the guest in dom0:
>=20
> # xl list
> Name                ID   Mem VCPUs      State   Time(s)
> Domain-0             0  2634     8     r-----    1016.5
> Xenstore             1    31     1     -b----       0.9
> sle15sp1             3  8190     6     -b----     184.6
> # xl mem-max 3 10000
> # xenstore-write /local/domain/3/memory/static-max 10240000
> # xl mem-set 3 10000
> # xl list
> Name                ID   Mem VCPUs      State   Time(s)
> Domain-0             0  2634     8     r-----    1018.5
> Xenstore             1    31     1     -b----       1.0
> sle15sp1             3 10000     6     -b----     186.7
>=20
> In the guest I get now:
>=20
> # free
>         total     used     free   shared  buff/cache   available
> Mem: 10031700   110904  9734172     8560      186624     9814344
> Swap: 2097132        0  2097132
>=20
> And after using lots of memory via a ramdisk:
>=20
> # free
>         total     used     free   shared  buff/cache   available
> Mem: 10031700   116660  1663840  7181776     8251200     2635372
> Swap: 2097132        0  2097132
>=20
> You can see buff/cache is now larger than the initial total memory
> and free is lower than the added memory amount.

Hmm, I have a different behavior:

I'm starting with 800M

# uname -a
Linux personal 5.16.15-1.37.fc32.qubes.x86_64 #1 SMP PREEMPT Tue Mar 22 12:=
59:53 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux
# free -m
              total        used        free      shared  buff/cache   avail=
able
Mem:            740         209         278           2         252        =
 415
Swap:          1023           0        1023

Then raising to ~2GB:

[root@dom0 ~]# xl list
Name                                        ID   Mem VCPUs	State	Time(s)
Domain-0                                     0  4082     6     r-----  1842=
71.3
(...)
personal                                    21   800     2     -b----      =
 4.8
[root@dom0 ~]# xl mem-max personal 2048
[root@dom0 ~]# xenstore-write /local/domain/$(xl domid personal)/memory/sta=
tic-max $((2048*1024))
[root@dom0 ~]# xl mem-set personal 2000
[root@dom0 ~]# xenstore-ls -fp /local/domain/$(xl domid personal)/memory
/local/domain/21/memory/static-max =3D "2097152"   (n0,r21)
/local/domain/21/memory/target =3D "2048001"   (n0,r21)
/local/domain/21/memory/videoram =3D "-1"   (n0,r21)

And then observe inside domU:
[root@personal ~]# free -m
              total        used        free      shared  buff/cache   avail=
able
Mem:           1940         235        1452           2         252        =
1585
Swap:          1023           0        1023

So far so good. But when trying to actually use it, it doesn't work:

[root@personal ~]# free -m
              total        used        free      shared  buff/cache   avail=
able
Mem:           1940         196        1240         454         503        =
1206
Swap:          1023         472         551

As you can see, all the new memory is still in "free", and swap is used
instead.


There is also /proc/meminfo (state before filling ramdisk), if that
would give some hints:
[root@personal ~]# cat /proc/meminfo
MemTotal:        1986800 kB
MemFree:         1487116 kB
MemAvailable:    1624060 kB
Buffers:           26236 kB
Cached:           207268 kB
SwapCached:            0 kB
Active:            74828 kB
Inactive:         258724 kB
Active(anon):       1008 kB
Inactive(anon):   101668 kB
Active(file):      73820 kB
Inactive(file):   157056 kB
Unevictable:           0 kB
Mlocked:               0 kB
SwapTotal:       1048572 kB
SwapFree:        1048572 kB
Dirty:               216 kB
Writeback:             0 kB
AnonPages:        100184 kB
Mapped:           117472 kB
Shmem:              2628 kB
KReclaimable:      24960 kB
Slab:              52136 kB
SReclaimable:      24960 kB
SUnreclaim:        27176 kB
KernelStack:        3120 kB
PageTables:         4364 kB
NFS_Unstable:          0 kB
Bounce:                0 kB
WritebackTmp:          0 kB
CommitLimit:     2041972 kB
Committed_AS:     825816 kB
VmallocTotal:   34359738367 kB
VmallocUsed:       10064 kB
VmallocChunk:          0 kB
Percpu:             1240 kB
HardwareCorrupted:     0 kB
AnonHugePages:         0 kB
ShmemHugePages:        0 kB
ShmemPmdMapped:        0 kB
FileHugePages:         0 kB
FilePmdMapped:         0 kB
CmaTotal:              0 kB
CmaFree:               0 kB
HugePages_Total:       0
HugePages_Free:        0
HugePages_Rsvd:        0
HugePages_Surp:        0
Hugepagesize:       2048 kB
Hugetlb:               0 kB
DirectMap4k:       79872 kB
DirectMap2M:     1132544 kB
DirectMap1G:     1048576 kB


--=20
Best Regards,
Marek Marczykowski-G=C3=B3recki
Invisible Things Lab

--xoimVyVpapmBJn8n
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAmJFmBkACgkQ24/THMrX
1yy4ZwgAiGCNQ7Q/hgojJHDYdzKarL5fGqdWsyi/Lo7HwGwxvzvoPs7h2ldxDB76
U6khXW26c3qw+3llChb68FtaQTsa48X7XU7f1V0SiiOJ+SuBed3EdbbzBo17dIlB
FXVH9aO8SXEJ6BeqaSiovd91fdV79gDAyKjmMzR0L9NLG7fzPUC32ImSHO2LT6fr
xK2kBUD+6GpjWko16A+LuPklhAt4CYlEAsbYhYMhV4J/3yvXgMcS+ZRef5Mwnqy9
PQZTYWRWUVRnkRAxltsEYCta59NXDNfDpYhG98Oqj+2YBbiTASyGTQWB2KZdkhrI
wiLYsb9orAXySLL2u5Wixaloq4gkeQ==
=O9jI
-----END PGP SIGNATURE-----

--xoimVyVpapmBJn8n--


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 12:06:16 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 12:06:16 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296906.505566 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZtZ7-0008Lo-QT; Thu, 31 Mar 2022 12:06:13 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296906.505566; Thu, 31 Mar 2022 12:06:13 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZtZ7-0008Lh-NP; Thu, 31 Mar 2022 12:06:13 +0000
Received: by outflank-mailman (input) for mailman id 296906;
 Thu, 31 Mar 2022 12:06:12 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=IJRK=UK=arm.com=Luca.Fancellu@srs-se1.protection.inumbo.net>)
 id 1nZtZ6-0008La-M8
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 12:06:12 +0000
Received: from EUR05-AM6-obe.outbound.protection.outlook.com
 (mail-am6eur05on20630.outbound.protection.outlook.com
 [2a01:111:f400:7e1b::630])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id f3f95211-b0ea-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 14:06:10 +0200 (CEST)
Received: from DB7PR03CA0107.eurprd03.prod.outlook.com (2603:10a6:10:72::48)
 by VE1PR08MB5007.eurprd08.prod.outlook.com (2603:10a6:803:10c::32) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.21; Thu, 31 Mar
 2022 12:06:08 +0000
Received: from DB5EUR03FT026.eop-EUR03.prod.protection.outlook.com
 (2603:10a6:10:72:cafe::ac) by DB7PR03CA0107.outlook.office365.com
 (2603:10a6:10:72::48) with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.22 via Frontend
 Transport; Thu, 31 Mar 2022 12:06:08 +0000
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by
 DB5EUR03FT026.mail.protection.outlook.com (10.152.20.159) with
 Microsoft SMTP
 Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
 15.20.5123.19 via Frontend Transport; Thu, 31 Mar 2022 12:06:07 +0000
Received: ("Tessian outbound ac9bb5dd84f6:v118");
 Thu, 31 Mar 2022 12:06:07 +0000
Received: from 097ad0b26c65.1
 by 64aa7808-outbound-1.mta.getcheckrecipient.com id
 49C330E5-7316-4249-9976-6D735336E5C1.1; 
 Thu, 31 Mar 2022 12:06:00 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com
 by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 097ad0b26c65.1
 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384);
 Thu, 31 Mar 2022 12:06:00 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com (2603:10a6:208:131::12)
 by AM9PR08MB7291.eurprd08.prod.outlook.com (2603:10a6:20b:436::18)
 with Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.16; Thu, 31 Mar
 2022 12:05:59 +0000
Received: from AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::a4a1:ded3:2013:b310]) by AM0PR08MB3956.eurprd08.prod.outlook.com
 ([fe80::a4a1:ded3:2013:b310%7]) with mapi id 15.20.5123.021; Thu, 31 Mar 2022
 12:05:58 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: f3f95211-b0ea-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=JjKb2H8J3NmCttTZe7q9rioXkJslGBgXsPhk+4Tacfw=;
 b=PlVYgFbuHFr/YMn+xvfuw1IF8n4fBVGmSm8oOlW4fRSoLoi71Lun/So4Y59yKQ1fa8wUIzpmy9o58IQF+MtXLCnNoAQaWWoGvfzRnTjjv6k54tssku784KiiL5dAjgZW1rUivliXE4Wvhk56Tm3I0nQ55BbxSMNyTHiTVUMekqw=
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123)
 smtp.mailfrom=arm.com; dkim=pass (signature was verified)
 header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates
 63.35.35.123 as permitted sender) receiver=protection.outlook.com;
 client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
X-CheckRecipientChecked: true
X-CR-MTA-CID: e3afbf11788d8c29
X-CR-MTA-TID: 64aa7808
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=JRLhS7Wcce7PhmQ5ki4EW/4p3flxyja9K/bI1ombBOsr/Hy7xB5VmEbI3ftwkgwAUTSvCdzEfP8SkdVZG18af3j1meELdmX5D955totcGhNvazxadbFzVwhsVkduni5U0nLM01GyIvPd7btink6v6ncBm/gK3o9LNK0AXECEEDGIRqFnX46sFU8r3OgmWFwOxVCdI1R/xQlujgVEgE5lh6VvzZfrxbncMHjZ3WYUDgldB1cnRiRbjQy9gahHquVz+T7pWRreBZSIyAgecE5YuO4dBBtLvS1o72gVE43C2Z2HVY7751iSWFe2Z0Uy3PnvuKKO7AyLKNGUm/w/s72yWg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=JjKb2H8J3NmCttTZe7q9rioXkJslGBgXsPhk+4Tacfw=;
 b=Wba7xWHEuU28KJJZ7GZDiEGkSEKweM2J7ygGmH48tNbiBRDK5fwgVGQwTvkQ9LGA69Tbv1n6TZB5I/Z1MlgQsQFZmc5ZdK1Lp5wMOYiChTu3wzudPerl5TT6fipSENUODsR/Qzaj6KIap1a5MQZ+6TsvFJJYMMY6X04/H/krLj1+m0IbsfwzSnh+SsQKHM/odbWD+B8VrcRyem8ex0biCqKYuxkjrm3TBlYsmrUA6f1s1q3+d4MgQzo3/cYE83gPQURfHi6rqbUd70eKdQX/XUxFfk3mt2Hk7iveAiHyAwR+WREhmExvfZbsiKv8MhAOaCvJH2DSNQlADsKIIfKhyg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass
 header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;
 s=selector2-armh-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=JjKb2H8J3NmCttTZe7q9rioXkJslGBgXsPhk+4Tacfw=;
 b=PlVYgFbuHFr/YMn+xvfuw1IF8n4fBVGmSm8oOlW4fRSoLoi71Lun/So4Y59yKQ1fa8wUIzpmy9o58IQF+MtXLCnNoAQaWWoGvfzRnTjjv6k54tssku784KiiL5dAjgZW1rUivliXE4Wvhk56Tm3I0nQ55BbxSMNyTHiTVUMekqw=
From: Luca Fancellu <Luca.Fancellu@arm.com>
To: Demi Marie Obenour <demi@invisiblethingslab.com>
CC: Xen developer discussion <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH v2] Grab the EFI System Resource Table and check it
Thread-Topic: [PATCH v2] Grab the EFI System Resource Table and check it
Thread-Index: AQHYRHEH4zzX/uDlcEa4/lbFmRQ7HKzZEkOAgABR+QCAAAI8AA==
Date: Thu, 31 Mar 2022 12:05:58 +0000
Message-ID: <C06993F9-42E5-4048-B698-2D4C825D8FA1@arm.com>
References: <YkS3FthpZU0xQ2Y7@itl-email>
 <783D6789-9BC6-49BC-8345-478A862083E2@arm.com> <YkWXszMR0/b3BcZg@itl-email>
In-Reply-To: <YkWXszMR0/b3BcZg@itl-email>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3696.80.82.1.1)
Authentication-Results-Original: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 1dea85af-20c6-48d3-5c31-08da130ed69b
x-ms-traffictypediagnostic:
	AM9PR08MB7291:EE_|DB5EUR03FT026:EE_|VE1PR08MB5007:EE_
X-Microsoft-Antispam-PRVS:
	<VE1PR08MB5007E73A92C290AFEA046559E4E19@VE1PR08MB5007.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original:
 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
X-Forefront-Antispam-Report-Untrusted:
 CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM0PR08MB3956.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(4636009)(366004)(316002)(6916009)(66556008)(83380400001)(64756008)(66446008)(66476007)(8676002)(38100700002)(91956017)(66946007)(4326008)(33656002)(38070700005)(186003)(76116006)(26005)(86362001)(2616005)(71200400001)(53546011)(6486002)(6512007)(6506007)(122000001)(508600001)(2906002)(5660300002)(36756003)(8936002)(45980500001);DIR:OUT;SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <4BFC0FF48C1F434F8E281E26672EBFBA@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR08MB7291
Original-Authentication-Results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped:
 DB5EUR03FT026.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs:
	f8920a3a-b4d9-4404-44c5-08da130ed162
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info:
	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
X-Forefront-Antispam-Report:
	CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(6486002)(5660300002)(83380400001)(33656002)(8936002)(47076005)(316002)(356005)(36860700001)(81166007)(508600001)(2616005)(70206006)(36756003)(82310400004)(6506007)(26005)(186003)(6512007)(70586007)(2906002)(336012)(53546011)(4326008)(40460700003)(86362001)(8676002)(6862004);DIR:OUT;SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 12:06:07.7166
 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 1dea85af-20c6-48d3-5c31-08da130ed69b
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource:
	DB5EUR03FT026.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR08MB5007
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From xen-devel-bounces@lists.xenproject.org Thu Mar 31 12:08:40 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 12:08:40 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296910.505577 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZtbT-0000WW-8e; Thu, 31 Mar 2022 12:08:39 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296910.505577; Thu, 31 Mar 2022 12:08:39 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZtbT-0000WP-56; Thu, 31 Mar 2022 12:08:39 +0000
Received: by outflank-mailman (input) for mailman id 296910;
 Thu, 31 Mar 2022 12:08:37 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZtbR-0000WF-TS; Thu, 31 Mar 2022 12:08:37 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZtbR-00052d-R2; Thu, 31 Mar 2022 12:08:37 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZtbR-0007HM-FA; Thu, 31 Mar 2022 12:08:37 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZtbR-0005v3-Eh; Thu, 31 Mar 2022 12:08:37 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=q+Sny8ic+ClU/7/EdTFeGePAGCpOuhC592otD9mwq8k=; b=cf6ksdaPCxsN5GUwV64v8XLgvm
	jmSciWCCqICZFKQyC5xNT//8eEzSGHHRhQhyy/qyxUYdv4eyUkAnjNM4f6P60GG2PkzB7+5DhmnWY
	7PMBXpWGK6xZVD4bITWaXypH9AcqjHH+/XwLQu1UMy5PZkKXAMvNVo7YRz+prAL5c0uk=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-169064-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-unstable-smoke test] 169064: tolerable all pass - PUSHED
X-Osstest-Failures:
    xen-unstable-smoke:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-unstable-smoke:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=8a87b9a0fb0564f9d68f0be0a0d1a17c34117b8b
X-Osstest-Versions-That:
    xen=8eec96b7b8d937d40e2e7988edb8bbd08598c715
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 31 Mar 2022 12:08:37 +0000

flight 169064 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/169064/

Failures :-/ but no regressions.

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  8a87b9a0fb0564f9d68f0be0a0d1a17c34117b8b
baseline version:
 xen                  8eec96b7b8d937d40e2e7988edb8bbd08598c715

Last test of basis   168984  2022-03-29 14:00:29 Z    1 days
Testing same since   169064  2022-03-31 09:00:34 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Bjoern Doebel <doebel@amazon.de>
  Jan Beulich <jbeulich@suse.com>

jobs:
 build-arm64-xsm                                              pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-amd64-libvirt                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-amd64-libvirt                                     pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/xen.git
   8eec96b7b8..8a87b9a0fb  8a87b9a0fb0564f9d68f0be0a0d1a17c34117b8b -> smoke


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 12:22:15 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 12:22:15 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296919.505588 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZtoW-0002rp-Ht; Thu, 31 Mar 2022 12:22:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296919.505588; Thu, 31 Mar 2022 12:22:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZtoW-0002ri-E6; Thu, 31 Mar 2022 12:22:08 +0000
Received: by outflank-mailman (input) for mailman id 296919;
 Thu, 31 Mar 2022 12:22:06 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=8eLM=UK=suse.com=jgross@srs-se1.protection.inumbo.net>)
 id 1nZtoU-0002rc-Ai
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 12:22:06 +0000
Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2cbdb38a-b0ed-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 14:22:04 +0200 (CEST)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by smtp-out2.suse.de (Postfix) with ESMTPS id 625C91FCFF;
 Thu, 31 Mar 2022 12:22:04 +0000 (UTC)
Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74])
 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
 key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512)
 (No client certificate requested)
 by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 45D35132DC;
 Thu, 31 Mar 2022 12:22:04 +0000 (UTC)
Received: from dovecot-director2.suse.de ([192.168.254.65])
 by imap2.suse-dmz.suse.de with ESMTPSA id zzfBD+ycRWKyEwAAMHmgww
 (envelope-from <jgross@suse.com>); Thu, 31 Mar 2022 12:22:04 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2cbdb38a-b0ed-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1;
	t=1648729324; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc:
	 mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=7BgP7H7Mhffm2QSROC7nRdvh2bT5gZydVV9mnBY2NcM=;
	b=rmiVA2T7D0m6PyjoCJGnMDXjsflRXjKWlIsfzwT4rqdw+OIHL59unxuVMIKMTRpgcz7bJB
	r4Li4dklyiEA2WrX1lAcPEddERvvBnKYk4g4Nkd2PQ/Lteln5RuhLWNrGTVUBAjay5cApk
	qKD2FAenIoRyKXjexnEWgooZ4VY2dl8=
Message-ID: <362b6115-e296-e01e-520f-31a0826426eb@suse.com>
Date: Thu, 31 Mar 2022 14:22:03 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Content-Language: en-US
To: =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?=
 <marmarek@invisiblethingslab.com>
Cc: xen-devel <xen-devel@lists.xenproject.org>
References: <YkUlLvnEDdc5hwN4@mail-itl>
 <2684376b-3ae6-a2b7-581f-2bd38ab6056b@suse.com> <YkWYGFJ/Cl+B2C37@mail-itl>
From: Juergen Gross <jgross@suse.com>
Subject: Re: Increasing domain memory beyond initial maxmem
In-Reply-To: <YkWYGFJ/Cl+B2C37@mail-itl>
Content-Type: multipart/signed; micalg=pgp-sha256;
 protocol="application/pgp-signature";
 boundary="------------A1mcLvniUIR5diIQWIRDDkcr"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------A1mcLvniUIR5diIQWIRDDkcr
Content-Type: multipart/mixed; boundary="------------8H3SWhgtmC0dzq0Je8v86Qoo";
 protected-headers="v1"
From: Juergen Gross <jgross@suse.com>
To: =?UTF-8?Q?Marek_Marczykowski-G=c3=b3recki?=
 <marmarek@invisiblethingslab.com>
Cc: xen-devel <xen-devel@lists.xenproject.org>
Message-ID: <362b6115-e296-e01e-520f-31a0826426eb@suse.com>
Subject: Re: Increasing domain memory beyond initial maxmem
References: <YkUlLvnEDdc5hwN4@mail-itl>
 <2684376b-3ae6-a2b7-581f-2bd38ab6056b@suse.com> <YkWYGFJ/Cl+B2C37@mail-itl>
In-Reply-To: <YkWYGFJ/Cl+B2C37@mail-itl>

--------------8H3SWhgtmC0dzq0Je8v86Qoo
Content-Type: multipart/mixed; boundary="------------jg4WplBDasQmt9JKnQcIJk9r"

--------------jg4WplBDasQmt9JKnQcIJk9r
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64
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--------------jg4WplBDasQmt9JKnQcIJk9r
Content-Type: application/pgp-keys; name="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Disposition: attachment; filename="OpenPGP_0xB0DE9DD628BF132F.asc"
Content-Description: OpenPGP public key
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP PUBLIC KEY BLOCK-----
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3D
=3D2wuH
-----END PGP PUBLIC KEY BLOCK-----

--------------jg4WplBDasQmt9JKnQcIJk9r--

--------------8H3SWhgtmC0dzq0Je8v86Qoo--

--------------A1mcLvniUIR5diIQWIRDDkcr
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEhRJncuj2BJSl0Jf3sN6d1ii/Ey8FAmJFnOsFAwAAAAAACgkQsN6d1ii/Ey/r
QAf/cbU/oVvBlPMfula3AY1exs5c4TS1XfgDIR+N6bme/Z8zj+MPUM6Pjt/2TgKKgkmXcP6enzhf
gXnUpXRrW9D+yD20rVzGRdKH7FXppzP3r1HNZ5x7TTpfMRlmWSqXHGXRzc7yUk85OZyYLb20GLEu
xfdH/uyJWVenCIV2bOVhGNKOWTUG5WsWXPy1MI39qT4OxWWU50fEsbn3gOPzzk+49AB6AS4/byoL
6dIzqZe8Gh/I1GeqDqCgpv0SQyt7j2kksGJ/izOvwGjhe5oKSXmEv+AVbVmmHR0NdsnN71i7NPBj
aAmuD0rQmgUR2GBOixYln23OIXypCqrGCyfWlVGJNw==
=PVqA
-----END PGP SIGNATURE-----

--------------A1mcLvniUIR5diIQWIRDDkcr--


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 12:23:59 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 12:23:59 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296923.505599 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZtqI-0003RR-Sr; Thu, 31 Mar 2022 12:23:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296923.505599; Thu, 31 Mar 2022 12:23:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZtqI-0003RK-Pe; Thu, 31 Mar 2022 12:23:58 +0000
Received: by outflank-mailman (input) for mailman id 296923;
 Thu, 31 Mar 2022 12:23:58 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=kR9h=UK=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nZtqI-0003RE-Ay
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 12:23:58 +0000
Received: from mail-lf1-x133.google.com (mail-lf1-x133.google.com
 [2a00:1450:4864:20::133])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 6fe17455-b0ed-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 14:23:57 +0200 (CEST)
Received: by mail-lf1-x133.google.com with SMTP id z12so27394835lfu.10
 for <xen-devel@lists.xenproject.org>; Thu, 31 Mar 2022 05:23:57 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 6fe17455-b0ed-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=Xh7d2xCBG8mMbyWdm3KuBhh059/iZ5OHo/vg30SxVLU=;
        b=c3rurIi6U1aeXz+MRwSaGX82gptRqxlL6v89NFsBJwELCXrTJXFkSGOeT+NJ5mGjh7
         CYnskRa4/rOjl8+93EW3kMUjGTFta/7zdTmUh0x6XgRfcwPRlcS0v8/2xbiZUTjY4I5G
         /zchInacJMYwgzS38zO2TFpifL2Qf1qyE8L9N3LE9tTVkEQycHWn78LTQaHe4oAbeBSH
         ZfGaFT+/+835hC/29dtetYdiQoROSLLcph5DLDezO48BG7tq4OYuTDnRladh8l5dhaLx
         hFcFu7toIZi7NVaIBLqSIcjllvl0cmr4g84PtXl/hwFuPk7rScQFFt4tg/hCdETTCT7b
         WfKA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=Xh7d2xCBG8mMbyWdm3KuBhh059/iZ5OHo/vg30SxVLU=;
        b=ar4rBczOcY6BIK45ZYjQMHaxX3W2jpTL+TcuG+NcC+wbrSFt9HsJd1lZM+h6gOdnY+
         Dn7oWMc1H+/L4eu+vTr4oCFCsqhwwhqzEnSCA5Xl44krQwxf/vegz4jFBJlUJPcv0b2K
         6oT66RwNpciSKAfElkWzeeXz+EvlAkX2jfMY8oOqrT3dnd9lkPvf5f0qEH+M+e6HtezA
         VjM/hz5OztAvcQLtLMT+OOuMwAkMSglPuknUSFMknWMuS6Lafp1bePerSDgPjWAG+v80
         ce9aP+0TjVNvhcSxJ/AJf0TuUPbLt/FjTpA0JhwPHaHeqSRHBv0WpMeaKwJQ9R0USdet
         qHbQ==
X-Gm-Message-State: AOAM532gB5baPP4UYAyxWvOdaSL98MyNE8oIp9S9ST1N5YUJAuTsUn5h
	ukk+p1MU7AkVDiKnr8r77t+0gXi+99BpP8mHgXY=
X-Google-Smtp-Source: ABdhPJzBv6KJa+6uIlQI7dRQSQ15t7dUAiWb3AEAOXGJlN1WP+Mh18Cn0SZOuxqiAmRPvNW1llO8Jx+WlnZGLS/QFAk=
X-Received: by 2002:a19:d61a:0:b0:43f:1a03:21ee with SMTP id
 n26-20020a19d61a000000b0043f1a0321eemr10807666lfg.152.1648729436794; Thu, 31
 Mar 2022 05:23:56 -0700 (PDT)
MIME-Version: 1.0
References: <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz.ref@netscape.net>
 <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz@netscape.net>
 <78ce5809-8df4-c94e-4313-fffb1b86b771@suse.com> <CAKf6xpsN+uJ=AyxtrnOrQrynFL=dwC=DdT7DHnK=wx9UFtdUDQ@mail.gmail.com>
 <59471dea-c379-59a3-9202-384a4ec54a07@netscape.net>
In-Reply-To: <59471dea-c379-59a3-9202-384a4ec54a07@netscape.net>
From: Jason Andryuk <jandryuk@gmail.com>
Date: Thu, 31 Mar 2022 08:23:45 -0400
Message-ID: <CAKf6xpsyxDJS36tNmXMrzusKMgi_gGvdvMwncSry_rWB-ZTjZg@mail.gmail.com>
Subject: Re: [XEN PATCH] tools/libs/light/libxl_pci.c: explicitly grant access
 to Intel IGD opregion
To: Chuck Zmudzinski <brchuckz@netscape.net>
Cc: Jan Beulich <jbeulich@suse.com>, Wei Liu <wl@xen.org>, 
	Anthony PERARD <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>, 
	xen-devel <xen-devel@lists.xenproject.org>
Content-Type: text/plain; charset="UTF-8"

On Thu, Mar 31, 2022 at 12:34 AM Chuck Zmudzinski <brchuckz@netscape.net> wrote:
>
> On 3/30/22 2:45 PM, Jason Andryuk wrote:
> > On Fri, Mar 18, 2022 at 4:13 AM Jan Beulich <jbeulich@suse.com> wrote:
> >> On 14.03.2022 04:41, Chuck Zmudzinski wrote:
> >>> When gfx_passthru is enabled for the Intel IGD, hvmloader maps the IGD
> >>> opregion to the guest but libxl does not grant the guest permission to
> >>> access the mapped memory region. This results in a crash of the i915.ko
> >>> kernel module in a Linux HVM guest when it needs to access the IGD
> >>> opregion:
> >>>
> >>> Oct 23 11:36:33 domU kernel: Call Trace:
> >>> Oct 23 11:36:33 domU kernel:  ? idr_alloc+0x39/0x70
> >>> Oct 23 11:36:33 domU kernel:  drm_get_last_vbltimestamp+0xaa/0xc0 [drm]
> >>> Oct 23 11:36:33 domU kernel:  drm_reset_vblank_timestamp+0x5b/0xd0 [drm]
> >>> Oct 23 11:36:33 domU kernel:  drm_crtc_vblank_on+0x7b/0x130 [drm]
> >>> Oct 23 11:36:33 domU kernel:  intel_modeset_setup_hw_state+0xbd4/0x1900 [i915]
> >>> Oct 23 11:36:33 domU kernel:  ? _cond_resched+0x16/0x40
> >>> Oct 23 11:36:33 domU kernel:  ? ww_mutex_lock+0x15/0x80
> >>> Oct 23 11:36:33 domU kernel:  intel_modeset_init_nogem+0x867/0x1d30 [i915]
> >>> Oct 23 11:36:33 domU kernel:  ? gen6_write32+0x4b/0x1c0 [i915]
> >>> Oct 23 11:36:33 domU kernel:  ? intel_irq_postinstall+0xb9/0x670 [i915]
> >>> Oct 23 11:36:33 domU kernel:  i915_driver_probe+0x5c2/0xc90 [i915]
> >>> Oct 23 11:36:33 domU kernel:  ? vga_switcheroo_client_probe_defer+0x1f/0x40
> >>> Oct 23 11:36:33 domU kernel:  ? i915_pci_probe+0x3f/0x150 [i915]
> >>> Oct 23 11:36:33 domU kernel:  local_pci_probe+0x42/0x80
> >>> Oct 23 11:36:33 domU kernel:  ? _cond_resched+0x16/0x40
> >>> Oct 23 11:36:33 domU kernel:  pci_device_probe+0xfd/0x1b0
> >>> Oct 23 11:36:33 domU kernel:  really_probe+0x222/0x480
> >>> Oct 23 11:36:33 domU kernel:  driver_probe_device+0xe1/0x150
> >>> Oct 23 11:36:33 domU kernel:  device_driver_attach+0xa1/0xb0
> >>> Oct 23 11:36:33 domU kernel:  __driver_attach+0x8a/0x150
> >>> Oct 23 11:36:33 domU kernel:  ? device_driver_attach+0xb0/0xb0
> >>> Oct 23 11:36:33 domU kernel:  ? device_driver_attach+0xb0/0xb0
> >>> Oct 23 11:36:33 domU kernel:  bus_for_each_dev+0x78/0xc0
> >>> Oct 23 11:36:33 domU kernel:  bus_add_driver+0x12b/0x1e0
> >>> Oct 23 11:36:33 domU kernel:  driver_register+0x8b/0xe0
> >>> Oct 23 11:36:33 domU kernel:  ? 0xffffffffc06b8000
> >>> Oct 23 11:36:33 domU kernel:  i915_init+0x5d/0x70 [i915]
> >>> Oct 23 11:36:33 domU kernel:  do_one_initcall+0x44/0x1d0
> >>> Oct 23 11:36:33 domU kernel:  ? do_init_module+0x23/0x260
> >>> Oct 23 11:36:33 domU kernel:  ? kmem_cache_alloc_trace+0xf5/0x200
> >>> Oct 23 11:36:33 domU kernel:  do_init_module+0x5c/0x260
> >>> Oct 23 11:36:33 domU kernel:  __do_sys_finit_module+0xb1/0x110
> >>> Oct 23 11:36:33 domU kernel:  do_syscall_64+0x33/0x80
> >>> Oct 23 11:36:33 domU kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9
> >> The call trace alone leaves open where exactly the crash occurred.
> >> Looking at 5.17 I notice that the first thing the driver does
> >> after mapping the range it to check the signature (both in
> >> intel_opregion_setup()). As the signature can't possibly match
> >> with no access granted to the underlying mappings, there shouldn't
> >> be any further attempts to use the region in the driver; if there
> >> are, I'd view this as a driver bug.
> > Yes.  i915_driver_hw_probe does not check the return value of
> > intel_opregion_setup(dev_priv) and just continues on.
> >
> > Chuck, the attached patch may help if you want to test it.
> >
> > Regards,
> > Jason
>
> Thanks for the patch, I will try it when I get a chance
> and report if it prevents the crash and enables video
> output to my screen. Has your patch been committed
> to Linux? I just checked on the gitlab Linux master
> branch and didn't see it there.

This patch should just make the i915 probe error out properly inside
the domU when the opregion cannot be mapped properly.  It would avoid
trigger the domU trace you posted above, but it wouldn't solve any other
issue.

I have not yet submitted upstream.

Regard,
Jason


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 12:29:50 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 12:29:50 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296927.505609 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZtvv-000477-FQ; Thu, 31 Mar 2022 12:29:47 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296927.505609; Thu, 31 Mar 2022 12:29:47 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZtvv-000470-Cb; Thu, 31 Mar 2022 12:29:47 +0000
Received: by outflank-mailman (input) for mailman id 296927;
 Thu, 31 Mar 2022 12:29:46 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=kR9h=UK=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nZtvu-00046u-8L
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 12:29:46 +0000
Received: from mail-lf1-x12f.google.com (mail-lf1-x12f.google.com
 [2a00:1450:4864:20::12f])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 3f48b1ec-b0ee-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 14:29:45 +0200 (CEST)
Received: by mail-lf1-x12f.google.com with SMTP id w7so41215965lfd.6
 for <xen-devel@lists.xenproject.org>; Thu, 31 Mar 2022 05:29:45 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 3f48b1ec-b0ee-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=qxuvaGq3+iBZe0xxrylfTY+iD67IJs3TfT41GrlrbmU=;
        b=KeDOsiw9bp1b6BQ/siwXjCYDqybFZTu4NN8IxvAQ4snztv517SzXXL23fQr+KIphij
         +of9N91YpZKu4oPBm454x+hpBrHsdm/hZA1EH86EGPj7BKU2oDqcka0aHh/IrmPiTzSj
         c8On5g/i040Ft4474rCZLLy7oxQqhC2n0zJCi+gAySO3dA/o0jufNmVX2y0X4zq8SiV8
         d7zkCtIXuVW3KO3rN0TkB/SBGr5urOLm4J+46VgM2N/Uhiilebh0w2Ab/T9M1YlaqTfa
         2iNNgikYidYxJ4CNNBn+dOb/7BVzbeEQpWqsty5L77kYdrCVapCGZ2i4cTS5PxHGf7mz
         OOkw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=qxuvaGq3+iBZe0xxrylfTY+iD67IJs3TfT41GrlrbmU=;
        b=f894X/jUuEZMhycTTbq7poxgFOQ2jNEsQPtnOwK2efYm1VAZyYslFL34+Wipq/FC3C
         2Wp/QA9HRvJPCr6kPq9wqAzqQcngekGbNuKMdVC1UDcaHurOTWostV8pVPl6t9DIdkWo
         6wvqGCRem4BXlUQvY/AcHJHnwCOuBk42ZM7vMBQi8OqJ1AHOvzM2nTYmro6T6lSa6YTD
         CMBAslceON8CWHvuQSm676L9tzvkN07yJqyHoxBoD4Ju3vZFpw+E8I26GORa1QiL6mcm
         XrcP+SoeOVx/i5gCnvyx1FBjxzm2VE/ZRRW/6RJBuPempD6LvJt4Vm288WrtAM8YvlzS
         7sNQ==
X-Gm-Message-State: AOAM5335Z+xZp12C2fWZxk5s0tgvhjq1Mh/YW0cSERqdQngEUsF3hiRq
	2MBR+UQH+Kwpf3hoko7XTawduqRUc/fsnJaIIuo=
X-Google-Smtp-Source: ABdhPJycSj2Y8xGAmmvUMnc1pxEgwP8kS84ETZul5dYZsEUGlG/Vi/rrAxw7TwI5z/8ckUutEsdo+T9qtS5R2bs6st4=
X-Received: by 2002:ac2:5504:0:b0:44a:2117:e6bb with SMTP id
 j4-20020ac25504000000b0044a2117e6bbmr10598930lfk.388.1648729784837; Thu, 31
 Mar 2022 05:29:44 -0700 (PDT)
MIME-Version: 1.0
References: <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz.ref@netscape.net>
 <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz@netscape.net>
 <YkSQIoYhomhNKpYR@perard.uk.xensource.com> <408e5e07-453c-f377-a5b0-c421d002aec5@srcf.net>
 <46a8585e-2a2a-4d12-f221-e57bd157dec6@netscape.net>
In-Reply-To: <46a8585e-2a2a-4d12-f221-e57bd157dec6@netscape.net>
From: Jason Andryuk <jandryuk@gmail.com>
Date: Thu, 31 Mar 2022 08:29:33 -0400
Message-ID: <CAKf6xpths4SX4wq-j4VhnXZnx0DW=468z3=9FYHso=Wy1i_Rsg@mail.gmail.com>
Subject: Re: [XEN PATCH] tools/libs/light/libxl_pci.c: explicitly grant access
 to Intel IGD opregion
To: Chuck Zmudzinski <brchuckz@netscape.net>
Cc: Andrew Cooper <amc96@srcf.net>, Anthony PERARD <anthony.perard@citrix.com>, 
	xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, 
	Juergen Gross <jgross@suse.com>, Jan Beulich <jbeulich@suse.com>
Content-Type: text/plain; charset="UTF-8"

On Wed, Mar 30, 2022 at 11:54 PM Chuck Zmudzinski <brchuckz@netscape.net> wrote:
>
> On 3/30/22 1:27 PM, Andrew Cooper wrote:
> > On 30/03/2022 18:15, Anthony PERARD wrote:
> >>
> >> Some more though on that, looking at QEMU, it seems that there's already
> >> a call to xc_domain_iomem_permission(), in igd_write_opregion().
> > This has been discussed before, but noone's done anything about it.
> > It's a massive layering violation for QEMU to issue
> > xc_domain_iomem_permission()/etc hypercalls.
> >
> > It should be the toolstack, and only the toolstack, which makes
> > permissions hypercalls, which in turn will fix a slew of "QEMU doesn't
> > work when it doesn't have dom0 superpowers" bugs with stubdomains.
>
> How much say does the Xen project have over the code
> in Qemu under hw/xen? I would not be against having libxl
> do the permissions hypercalls in this case instead of Qemu
> doing it. My test with Qemu traditional and this patch proves
> the permission can be granted by libxl instead of the device
> model.

Qubes patches libxl and QEMU, and they move the hypercalls to the
toolstack.  They are using linux stubdoms, and I think it works for
them.

QEMU:
https://github.com/QubesOS/qubes-vmm-xen-stubdom-linux/blob/master/qemu/patches/0015-IGD-fix-undefined-behaviour.patch
https://github.com/QubesOS/qubes-vmm-xen-stubdom-linux/blob/master/qemu/patches/0016-IGD-improve-legacy-vbios-handling.patch
https://github.com/QubesOS/qubes-vmm-xen-stubdom-linux/blob/master/qemu/patches/0017-IGD-move-enabling-opregion-access-to-libxl.patch
libxl:
https://github.com/QubesOS/qubes-vmm-xen/blob/xen-4.14/patch-fix-igd-passthrough-with-linux-stubdomain.patch
maybe this one, too:
https://github.com/QubesOS/qubes-vmm-xen/blob/xen-4.14/patch-libxl-automatically-enable-gfx_passthru-if-IGD-is-as.patch

Regards,
Jason


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 12:36:27 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 12:36:27 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296933.505621 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZu2J-0005bK-A3; Thu, 31 Mar 2022 12:36:23 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296933.505621; Thu, 31 Mar 2022 12:36:23 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZu2J-0005bD-6s; Thu, 31 Mar 2022 12:36:23 +0000
Received: by outflank-mailman (input) for mailman id 296933;
 Thu, 31 Mar 2022 12:36:21 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=nuZR=UK=invisiblethingslab.com=marmarek@srs-se1.protection.inumbo.net>)
 id 1nZu2H-0005b7-Mv
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 12:36:21 +0000
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com
 [66.111.4.25]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 2a90a039-b0ef-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 14:36:20 +0200 (CEST)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41])
 by mailout.nyi.internal (Postfix) with ESMTP id A13D75C01A7;
 Thu, 31 Mar 2022 08:36:19 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163])
 by compute1.internal (MEProxy); Thu, 31 Mar 2022 08:36:19 -0400
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Thu,
 31 Mar 2022 08:36:18 -0400 (EDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 2a90a039-b0ef-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=
	messagingengine.com; h=cc:cc:content-type:date:date:from:from
	:in-reply-to:in-reply-to:message-id:mime-version:references
	:reply-to:sender:subject:subject:to:to:x-me-proxy:x-me-proxy
	:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=lL3fG21Bf+IQhMNp2
	gwZWgcIcXYyRS4yRWBGEJPLa7M=; b=CO7QIHIjfgqgrUQd42gh7vl6ZXEZkmySO
	uNUdtClcs+CQRxYCLGnNKR2Y1sKEI2A5DySTmaWRIDjUqqOfPXq6lclWML40+472
	UvbBU31fgEuj2PR0s7HIgGaw2wT8Sw8AoUOo+w/SE75nb5IVMC/XOi6IMlG7GBXX
	qc3x3qOB3YmKyrgh7KZTKQ364kvuJGz0zwhVeTVgl14c7yCGgyp68S54T2KrW0tM
	j186SN39Vz8HuCqD5j50yqoPjQGpflmj7rT874HNYmroJnehplpnicDfJhpTwklJ
	b9OzMuDCbR8LA2csxP+nHQhkPRgCUX6wHdOJH9HtctKFQwApKv2cw==
X-ME-Sender: <xms:Q6BFYmYmbGfqaCTKrGlZDTJW-CA9wbpoWqhA3SDh79B5jodHIfVagg>
    <xme:Q6BFYpYZilV0i6No6b6Rv467ha3hQD6xNvQKahPtWiYGTF42SqdeChvVpOx2ZSeLW
    b3GbjRUiarnJw>
X-ME-Received: <xmr:Q6BFYg8BciBLno624YjvCrCLPGseSY7FofAf4gI1SDeBYaDqHX5KUquu12leUsNtgMZkpUDBlgxiT0PkH5nZizTXeYsCp5nGHg>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvvddrudeigedgheefucetufdoteggodetrfdotf
    fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen
    uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne
    cujfgurhepfffhvffukfhfgggtuggjsehgtderredttdejnecuhfhrohhmpeforghrvghk
    ucforghrtgiihihkohifshhkihdqifpkrhgvtghkihcuoehmrghrmhgrrhgvkhesihhnvh
    hishhisghlvghthhhinhhgshhlrggsrdgtohhmqeenucggtffrrghtthgvrhhnpeetveff
    iefghfekhffggeeffffhgeevieektedthfehveeiheeiiedtudegfeetffenucevlhhush
    htvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpehmrghrmhgrrhgvkhes
    ihhnvhhishhisghlvghthhhinhhgshhlrggsrdgtohhm
X-ME-Proxy: <xmx:Q6BFYopZNX6oWHFe_UNABOMxngvO--qFPtO6JpXoHvp71o9gAc_v9Q>
    <xmx:Q6BFYhrgpB5c1Uc42QXyxgJgnzWeaiqCpRPm_XkRnNbbCRNigjEN8A>
    <xmx:Q6BFYmRjadIoK-aEpSWSKb15pK3RB_XwWCjPT6ET2yNkEIEDW3dHBg>
    <xmx:Q6BFYjGpIxkkO4sSFy0sBZ8QnMcyRncCq-6wmB5drf7I_t1JDlE85Q>
Date: Thu, 31 Mar 2022 14:36:15 +0200
From: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: Juergen Gross <jgross@suse.com>
Cc: xen-devel <xen-devel@lists.xenproject.org>
Subject: Re: Increasing domain memory beyond initial maxmem
Message-ID: <YkWgQNKK7SarjKDN@mail-itl>
References: <YkUlLvnEDdc5hwN4@mail-itl>
 <2684376b-3ae6-a2b7-581f-2bd38ab6056b@suse.com>
 <YkWYGFJ/Cl+B2C37@mail-itl>
 <362b6115-e296-e01e-520f-31a0826426eb@suse.com>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="JyBv0FZkKPmuVRTm"
Content-Disposition: inline
In-Reply-To: <362b6115-e296-e01e-520f-31a0826426eb@suse.com>


--JyBv0FZkKPmuVRTm
Content-Type: text/plain; protected-headers=v1; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Date: Thu, 31 Mar 2022 14:36:15 +0200
From: Marek =?utf-8?Q?Marczykowski-G=C3=B3recki?= <marmarek@invisiblethingslab.com>
To: Juergen Gross <jgross@suse.com>
Cc: xen-devel <xen-devel@lists.xenproject.org>
Subject: Re: Increasing domain memory beyond initial maxmem

On Thu, Mar 31, 2022 at 02:22:03PM +0200, Juergen Gross wrote:
> Maybe some kernel config differences, or other udev rules (memory onlining
> is done via udev in my guest)?
>=20
> I'm seeing:
>=20
> # zgrep MEMORY_HOTPLUG /proc/config.gz
> CONFIG_ARCH_ENABLE_MEMORY_HOTPLUG=3Dy
> CONFIG_MEMORY_HOTPLUG=3Dy
> # CONFIG_MEMORY_HOTPLUG_DEFAULT_ONLINE is not set
> CONFIG_XEN_BALLOON_MEMORY_HOTPLUG=3Dy
> CONFIG_XEN_MEMORY_HOTPLUG_LIMIT=3D512

I have:
# zgrep MEMORY_HOTPLUG /proc/config.gz=20
CONFIG_ARCH_ENABLE_MEMORY_HOTPLUG=3Dy
CONFIG_MEMORY_HOTPLUG=3Dy
CONFIG_MEMORY_HOTPLUG_DEFAULT_ONLINE=3Dy
CONFIG_XEN_BALLOON_MEMORY_HOTPLUG=3Dy
CONFIG_XEN_MEMORY_HOTPLUG_LIMIT=3D512

Not sure if relevant, but I also have:
CONFIG_XEN_UNPOPULATED_ALLOC=3Dy

on top of that, I have a similar udev rule too:

SUBSYSTEM=3D=3D"memory", ACTION=3D=3D"add", ATTR{state}=3D=3D"offline", ATT=
R{state}=3D"online"

But I don't think they are conflicting.

> What type of guest are you using? Mine was a PVH guest.

PVH here too.

--=20
Best Regards,
Marek Marczykowski-G=C3=B3recki
Invisible Things Lab

--JyBv0FZkKPmuVRTm
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAmJFoEAACgkQ24/THMrX
1yycqQf7BK5jUyG4YSdhQTvYEB0asjxQfiMtQ5n5Rh5qRS3NZdIANwYlpFb0jRq9
+2ksM730Mr2sTfFVYDRemWR24rKXSS5RcRvQU0lqDzEQYy2PidwY093B4k5U1fQt
rhwvDz6fOhSwcNP4Ysl53+6JtiaTVJ8RuZuUmpifDzF9L/o4wVA5vSIwdhVXdjL8
09VZ1/kU17C71Zj7YuMJK0iu9SacdmRNrNHVI5Kw1G/NX0nY51i5PsQMrV1ZFO8P
FHLcRyg+wxg+7vbfpwY91P8cLQLqzxqxpfSFjNF59AWXddgb8zBM+b3ukY9o8+ef
VXykPTgXaNitxSXJpNuAqNxZDJXTkA==
=YezF
-----END PGP SIGNATURE-----

--JyBv0FZkKPmuVRTm--


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 12:37:03 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 12:37:03 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296936.505632 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZu2w-00067q-Iy; Thu, 31 Mar 2022 12:37:02 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296936.505632; Thu, 31 Mar 2022 12:37:02 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZu2w-00067j-Fk; Thu, 31 Mar 2022 12:37:02 +0000
Received: by outflank-mailman (input) for mailman id 296936;
 Thu, 31 Mar 2022 12:37:01 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=lDhN=UK=citrix.com=prvs=08274bcc4=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nZu2u-0005xJ-Rj
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 12:37:01 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 40e43981-b0ef-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 14:36:59 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 40e43981-b0ef-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648730219;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=NQUlK1k5EbMcsLiX5ijQEQwuStcTYf2gUDtmKdx0Dm0=;
  b=FHjmv1CSFm0jaARfPvBHdFKbP6VxQ+r9U1TE4uwtEUoyQWzpkAWMBi+H
   dVVbx1z0YXtlrrRW2Ue6hN63mQgAXmIMuvCyWZ4sGk7hhCqRkdWeWW5lx
   jF2UdC7Ty+aQsOim8TEG5zcX7xHdZSohdBEpcR7Sc/JH1nbA44DJHdBLi
   8=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 67553416
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:Wf9y8KohYQz29jQLmgfU4rdfQbBeBmLJZRIvgKrLsJaIsI4StFCzt
 garIBnXPvmNMWX0e4h+O4XjoUIA6JLRndQ1GQU/ryhgEH8W85uZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 oqq+aUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBeYvI38RabQJkCCBibf1hyOadE3+/vpnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVI1zbWAOxgWZnea67L+cVZzHE7gcUm8fP2O
 ZVENGEzNUqojxtnFFcIJowzvLaRj3CgKyRngg2rq5cr2j2GpOB2+Oe0a4eEEjCQfu1Xl0CUv
 HPb/Ez2BxgbMJqUzj/t2n6jiuLAhyrTRJMZFLr+8OVjxlKU2AQ7ExYRSUf9rfCni1WWQM5WM
 Ugd8GwvqsAa+FSwS9jhXzWxuHOeogMHQN1UDvE77weWjKHT5m6xFmUCCzJMdtEinMs3XiAxk
 E+EmcvzAj5iu6HTTmiSnop4thvrZ3JTdzVbI3ZZE01VuLEPvb3fkDqIaNIkMOmLleHuGC2gk
 xe69XIMgLUc2JtjO7qAwXjLhDelp57sRwEz5xnKUm/N0j6VdLJJdKTztwGFsK8owJKxCwDY4
 SNaw5T2APUmV8nlqcCbfAka8FhFDd6hOSaUv1NgFoJJG9+Fqy/6JtA4DN2TyS5U3ic4ld3BP
 Re7VeB5vsY70J6WgUlfOdjZ5yMCl/SIKDgdfqqIBueim7AoHON9wAlgZFSLw0fmm1U2nKc0N
 P+zKJjwXShEVPs5lmfpGo/xNIPHIAhknws/orihknyaPUe2PibJGd/pznPQBgzG0E90iFqMq
 IsOXyd74x5eTPf/ckHqHX07djg3wYwALcmu8aR/L7fbSiI/QT1JI6KBkNsJJt0+94wIx7igw
 51IchIBoLYJrSacclvih7EKQO6HYKuTWlpgY3R2ZAz4iiV7CWtthY9GH6YKkXAc3LUL5dZ/T
 uUfetXGBfJKSz/d/C8aY4W7p4tnHClHTyrXV8Z5SFDTp6JdejE=
IronPort-HdrOrdr: A9a23:7odmTaEV9PJjriczpLqFBpHXdLJyesId70hD6qkvc3Jom52j+P
 xGws526faVslYssHFJo6HnBEClewKgyXcV2/hqAV7GZmjbUQSTXeRfBOfZslnd8mjFh5JgPM
 RbAtlD4b/LfCBHZK/BiWHSebtQo6jkzEnrv5ak854Ed3AVV0gK1XYBNu/0KDwQeOEQbqBJa6
 Z0q/A37waISDAyVICWF3MFV+/Mq5nik4/nWwcPA1oC5BOVhT2lxbbmG1zAty1uGQ9n8PMHyy
 zoggb57qKsv7WSzQLd7Xba69BzlMH6wtVOKcSQgow+KynqiCyveIN9Mofy9wwdkaWK0hIHgd
 PMqxAvM4Ba7G7QRHi8pV/X1wzpwF8Vmgjf4G7dpUGmjd3yRTo8BcYEr5leaAHl500pu8w5+L
 5X3kqC3qAnQi/orWDY3ZzlRhtqnk27rT4JiugIlUFSVoMYdft4sZEfxkVIC50NdRiKpLzPKN
 MeTf002cwmMW9zNxvizypSKZ2XLzkO9y69MwY/Upf/6UkVoJh7p3FosPD30E1wsa7VcKM0lN
 gsAp4Y5I2mcfVmH56VJN1xN/dfWVa9CC4lDgqpUCHa/ec8Sjbwl6I=
X-IronPort-AV: E=Sophos;i="5.90,225,1643691600"; 
   d="scan'208";a="67553416"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=MW1bP/eBRnIX0yVT+M875lWK+MlUruiy9w0sflvJXVrFWQ+BtP/fKebv5EjmLaO8nMwlYIXaGlfNLRfAeljPFAA1B8VuAFZgjTNASj+7A3qMzqWB7VDOHdx3duLJH/4w/hNe8EAKU8hLFqSt0FW2hGZRGHljIQlAUSp+h0oFnnTW3PXNShQgvSbuMVOb1JSzM5HIBGvgdhvAJ7buZInde793howqyaLcb1NdGi8W37LfsZMoY3rymMqsPZ647hmRrfj5T9J1z5/nNzmYzS8jdw7yH9Aa/RAsPMxcechDlGC14YSwfPiR9AdwI1gucQYDM/MT55VR0O4NPZlhBX3oBQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=qUD+Aef2G2wBse57yFY1CeNDuTTiUsMk8fpA8sTCLuQ=;
 b=No7xCWSAB3wX3023MMlbOl16VHEjcbY/kZN2OY209gdD6W9hleqlR/PE1XQLOQ7S+8jUIjqGp7+WZln6Wwraq2w3LbDAGbvAoe7rf75pVwYf43yZhelNYF6uy7bkROl+NTF4SaQyuwKT6oGkqcahNYcPuS7ZotvsPhmfqtCPxpto6PjiLVC9RgbXXVQ9Dxv2O1/3VS8TvL6Jbmzr01O7/l+WQmcHGA8LxOM9zKQJNy73yZfgbsqz3bKT+X6q1GYf8gvacvPfI2PROC/zdg/NgbZZgU9ytiA4htGXsKOuz7vc+RO3Y6c/2bfZ6k9yHMCodpO2bPAaiqI2unSLOcXPhg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=qUD+Aef2G2wBse57yFY1CeNDuTTiUsMk8fpA8sTCLuQ=;
 b=LbynnO9fiwyKg2obMSefO0I4IBhf45BfqSG6CA8DJBmIunjkoUql9UK4+tEwA2AamdKQyt12S8lPCKGYJpZWAlnW8I/uBo/l5aHo0Z9iLJsPqvG1liE7BHg8hHtfwdTKQSKplb8Fg1hrEwlJlnAc0iUa2w5hbkMUszgzv93yC54=
Date: Thu, 31 Mar 2022 14:36:46 +0200
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: "Daniel P. Smith" <dpsmith@apertussolutions.com>
CC: <xen-devel@lists.xenproject.org>, <scott.davis@starlab.io>,
	<jandryuk@gmail.com>, Daniel De Graaf <dgdegra@tycho.nsa.gov>
Subject: Re: [PATCH 1/2] xsm: add ability to elevate a domain to privileged
Message-ID: <YkWgXhFVq/fD72CB@Air-de-Roger>
References: <20220330230549.26074-1-dpsmith@apertussolutions.com>
 <20220330230549.26074-2-dpsmith@apertussolutions.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <20220330230549.26074-2-dpsmith@apertussolutions.com>
X-ClientProxiedBy: LNXP265CA0051.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:5d::15) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 96d43e49-fcdb-4868-78b2-08da13132267
X-MS-TrafficTypeDiagnostic: CO1PR03MB5859:EE_
X-Microsoft-Antispam-PRVS: <CO1PR03MB58592111DEE3928E8985C8828FE19@CO1PR03MB5859.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(26005)(8936002)(86362001)(66556008)(66476007)(66946007)(6666004)(6512007)(6506007)(6916009)(33716001)(316002)(9686003)(186003)(8676002)(2906002)(83380400001)(85182001)(5660300002)(508600001)(38100700002)(4326008)(82960400001)(6486002);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?TzRGTFN0VEhWa0N6K21ZU3Y3WGh2NFRWcVRmMXorVnIxZ3FXSWk4QWZneHJ4?=
 =?utf-8?B?VEFTQTdSN0g0Zmh5ckZzT1EzRy91VkZaUVlZcU93bjRpVjZ5MTFWYnM5QzB6?=
 =?utf-8?B?V1B0Y1dRSXY3Q0o1UjJBM1ZBVnhVajd5R2FFeVFMOXNnWmltekwxdDVDUU1Q?=
 =?utf-8?B?dC9xWHZrajZ2TWxFRFphTDBwSzZOVHc0WDJDS1hyazBFN0ZsNHI5VnJaTGVJ?=
 =?utf-8?B?MHdnVGl6QnlaY0JobzFhcHgzWGlTWU5STm5meVVHL09IVnNnMmRoRHN5aU83?=
 =?utf-8?B?dFNQTGN3VXJ4Zk1VOUVGUjM5V2dyelA4RHFWRTNKdHdVb0puM3FZck96TzRy?=
 =?utf-8?B?YVVjOWxhWU54cWFWclVDREJsMzdaeWNkRmZWR3I3L2NQOFp0NEZOMmlFTXMr?=
 =?utf-8?B?Z2svOEhreFIvYnpRUktKdi83TFJaV0xsakVmeGxtUmxBSloyTHQwOEJIejJJ?=
 =?utf-8?B?TTRaN2dNdTkyRU1VQ1lSWUU3c1ZPc0lNK1U0ZWV1Qy90cFZnUlhVL2VpQWJt?=
 =?utf-8?B?MVhhYVA2bVlBN3NFd2VoZHdWR1ZUM2s5RzFicFI4VGlpRVhqZGRYNjlXV0Rh?=
 =?utf-8?B?VG51OVk5aEdxaWZUVUJiWHFCK29idml2a0NuczlUcDFrL2NrTy90M01OSE9s?=
 =?utf-8?B?UGs5OUhMNkd4NkJGOVJVWG9kRWZHOG0reUVmVmlsNFBDdUZZdDZ6cFlNVW9R?=
 =?utf-8?B?YlJrMk9veXhNYWVVSndmU0haVFlPZFluYktMSElhdXE2SXFGK0p0U2t3OGdD?=
 =?utf-8?B?OFlsUXh1TUxQNUZGdURpVXc5Wll4MXYwbmx6N3lMT1JFSU1MazM0Wm9tazRQ?=
 =?utf-8?B?dWRJbURDM0xFTVRZcDIrWENBUmpyWFZBbjdZYi85d3dpUHVRNTU3amNMc0VE?=
 =?utf-8?B?MllhSXdicDdYOGJaTzhlcWVDSllFOWRUd2pIeWl5bW5LZDY1Ni9kb3E1dzdW?=
 =?utf-8?B?M3JITlczNWNWWDBETmVmNkVoOG5KTjJueStwQTMrMEI4WlYreWZkSXhsejNi?=
 =?utf-8?B?MXFtem5mRFR0c3B0UU9NZVVHQ3J4WTlFVk82NHJlOUNIUmRjU0cwSStlMUNL?=
 =?utf-8?B?S3VmUURuQTdHajNsUmc2VHZNNUY4RTdoam4wWjB5T1ZaK2NsZFBpcWdBbUNn?=
 =?utf-8?B?TDZUR3AwZjRXbFNCSUxkQkV0WENYaGVlcWFWek1TWU5HZVhReU5hc3V5SE96?=
 =?utf-8?B?Ymp5VHUrdWFjS1BpOU5Vc0F4dkg5MXpBR1pYVWF4WnRMN2xXTzJiUFlReEJX?=
 =?utf-8?B?RS8rUEU2eVdheGp5MnRsKzdiYkpGbVg1QjluQ214dXp0emw3VFd5SEJwejJP?=
 =?utf-8?B?WmZDaGw1Tk03WTZzb1V0djhBTEFkR3daVWJFL2dwUkVVbkYrSUNFcVFObXUz?=
 =?utf-8?B?ckFDR0s5eG44YkNnMWZwcURJRThYamg2cFZ5MUJqZTBsWSs0eFdBSjZKU3NG?=
 =?utf-8?B?dExhcnZNSlk4eWNOWHhIQko0bHJsMEYxVTY5RUZJZnFNWnVtbVN2OWs3VVRV?=
 =?utf-8?B?bHg5NiswRFdWMnpYL3l6Mk9NTTYzQWFYS3FsSWFJS0R5dTBUQmdWdVNORWwr?=
 =?utf-8?B?aGhmcUpUOVpHU1R6bGJsYU5qQUJ5NEF4QzNONG1mSENRMCtRamdTQ2JWR1Bh?=
 =?utf-8?B?dzJtb2M0VkFtcUd2d0RJbCtUN3FvQ1lNOTdmSnNVTi92LzY0T1Y1VGJQemZD?=
 =?utf-8?B?bzIvMlFCdUdoZWJoTnZFbk5IQkxObU90N2ZCQnIrdXR5bzZ4a1JtY3d6bmxk?=
 =?utf-8?B?YkhqM2l2anJ5SU9taWdEUjNIbnJ4MkRub2RGWmVabkFFVXVreDBELzRycDNt?=
 =?utf-8?B?ZnBwWHRmUCtrbGFYRysrSHAwYU5XRXdYS0g4RXArWFZoL0RmU3ZHdG93R0ha?=
 =?utf-8?B?T1l2N0owWnI5QzNHK2pEd3Bhcm4wSkJBODlhL0k3NnpSR2Q4Zldva0NRTStB?=
 =?utf-8?B?VUpuRWJSU1JNNHZOOFNPdXE3RFFoUWFiR3JxUnNGTTdXY054Wm9QSmc0S1h2?=
 =?utf-8?B?bEM2VG5aUWRucVRKQmFzVFQ4RXZ5OVZhNEFVT0VlYzAzdXRzWUp3bEFxakI3?=
 =?utf-8?B?TjdDZ1VvaUdrZzVoa0pQWE1aYjJodGRGSDNxRUdyMTJ2MEJMZm5ZL3JJM0xN?=
 =?utf-8?B?bWpUWStOR2Fib1BmN2ZGSzNmUCtTVy9MTTRPOVdkSDNjbDVsRnMya0JHN2ZE?=
 =?utf-8?B?aStUSlJJV29ZdkVtbGhTYVRrVXoyOFFlYkdMQ1owSFRMZFVnY25KMFF2bDE4?=
 =?utf-8?B?Z2RObEtHU094S1c5WUdSd2Rva1Vjczk3SStjTW5LUGY1cEhsYjVIM085Mll2?=
 =?utf-8?B?V04yc2xFSnVnYUp0QnpmVklBeWcrMHRNbkpCa3A5L2t4ZE9DT2RIZkJ3VjVJ?=
 =?utf-8?Q?KJ3fmwoFLATAQCmM=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 96d43e49-fcdb-4868-78b2-08da13132267
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 12:36:53.1202
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: cIfqU5wzuo4R84Ecw40eOchmnRKzfGxIonlbe7E7vQWu9lSUwXir2yCbJ/gogqdRTaXgqapmUWSN5BM9lPMzhw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR03MB5859
X-OriginatorOrg: citrix.com

On Wed, Mar 30, 2022 at 07:05:48PM -0400, Daniel P. Smith wrote:
> There are now instances where internal hypervisor logic needs to make resource
> allocation calls that are protected by XSM checks. The internal hypervisor logic
> is represented a number of system domains which by designed are represented by
> non-privileged struct domain instances. To enable these logic blocks to
> function correctly but in a controlled manner, this commit introduces a pair
> of privilege escalation and demotion functions that will make a system domain
> privileged and then remove that privilege.
> 
> Signed-off-by: Daniel P. Smith <dpsmith@apertussolutions.com>
> ---
>  xen/include/xsm/xsm.h | 22 ++++++++++++++++++++++

I'm not sure this needs to be in xsm code, AFAICT it could live in a
more generic file.

>  1 file changed, 22 insertions(+)
> 
> diff --git a/xen/include/xsm/xsm.h b/xen/include/xsm/xsm.h
> index e22d6160b5..157e57151e 100644
> --- a/xen/include/xsm/xsm.h
> +++ b/xen/include/xsm/xsm.h
> @@ -189,6 +189,28 @@ struct xsm_operations {
>  #endif
>  };
>  
> +static always_inline int xsm_elevate_priv(struct domain *d)

I don't think it needs to be always_inline, using just inline would be
fine IMO.

Also this needs to be __init.

> +{
> +    if ( is_system_domain(d) )
> +    {
> +        d->is_privileged = true;
> +        return 0;
> +    }
> +

I would add an ASSERT_UNREACHABLE(); here, I don't think we have any
use case for trying to elevate the privileges of a non-system domain.

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 12:40:28 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 12:40:28 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296942.505642 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZu66-0007Xz-2K; Thu, 31 Mar 2022 12:40:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296942.505642; Thu, 31 Mar 2022 12:40:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZu65-0007Xs-VH; Thu, 31 Mar 2022 12:40:17 +0000
Received: by outflank-mailman (input) for mailman id 296942;
 Thu, 31 Mar 2022 12:40:16 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZu64-0007Xi-K2; Thu, 31 Mar 2022 12:40:16 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZu64-0005bh-Gn; Thu, 31 Mar 2022 12:40:16 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZu64-0000VQ-4F; Thu, 31 Mar 2022 12:40:16 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZu64-0003wA-3O; Thu, 31 Mar 2022 12:40:16 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=vzZshfxJyLryPHKu+w9f1oPxi3ZD71jQg4O707fA75M=; b=OUW4WBzTmI9t9Z+MjHjWXc3wO0
	EeC1FWH5j/FLe++nvM/ERD5Et+xsrwiCCh2j27TjjaXuDgWzRsxBHLhCmpkSUyyXG6HFjpXKceOCx
	fYzMCxvwP5Fdu7KO4wGB3Jbcors71X6D2fQfk9HmNYxx9kcT8yrSjC5CjXtLDWq7oTwU=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-169017-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [qemu-mainline test] 169017: tolerable FAIL - PUSHED
X-Osstest-Failures:
    qemu-mainline:test-amd64-i386-qemuu-rhel6hvm-amd:guest-start/redhat.repeat:fail:heisenbug
    qemu-mainline:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    qemu-mainline:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    qemu-mainline:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    qemu-mainline:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    qemuu=aea6e471085f39ada1ccd637043c3ee3dfd88750
X-Osstest-Versions-That:
    qemuu=bed1fa2fbe5f004ac4c152119029a8ce0810dc02
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 31 Mar 2022 12:40:16 +0000

flight 169017 qemu-mainline real [real]
flight 169067 qemu-mainline real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/169017/
http://logs.test-lab.xenproject.org/osstest/logs/169067/

Failures :-/ but no regressions.

Tests which are failing intermittently (not blocking):
 test-amd64-i386-qemuu-rhel6hvm-amd 14 guest-start/redhat.repeat fail pass in 169067-retest

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168985
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168985
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168985
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168985
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168985
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168985
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168985
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168985
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass

version targeted for testing:
 qemuu                aea6e471085f39ada1ccd637043c3ee3dfd88750
baseline version:
 qemuu                bed1fa2fbe5f004ac4c152119029a8ce0810dc02

Last test of basis   168985  2022-03-29 14:50:32 Z    1 days
Testing same since   169017  2022-03-30 08:14:57 Z    1 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Akihiko Odaki <akihiko.odaki@gmail.com>
  Eugenio Pérez <eperezma@redhat.com>
  Hanna Reitz <hreitz@redhat.com>
  Jason Wang <jasowang@redhat.com>
  John Snow <jsnow@redhat.com>
  Laurent Vivier <lvivier@redhat.com>
  Paolo Bonzini <pbonzini@redhat.com>
  Peter Maydell <peter.maydell@linaro.org>
  Philippe Mathieu-Daudé <f4bug@amsat.org>
  Thomas Huth <thuth@redhat.com>
  Vladimir Sementsov-Ogievskiy <v.sementsov-og@mail.ru>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           fail    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Pushing revision :

To xenbits.xen.org:/home/xen/git/qemu-xen.git
   bed1fa2fbe..aea6e47108  aea6e471085f39ada1ccd637043c3ee3dfd88750 -> upstream-tested


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 12:46:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 12:46:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296952.505656 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZuBu-0008IX-UW; Thu, 31 Mar 2022 12:46:18 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296952.505656; Thu, 31 Mar 2022 12:46:18 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZuBu-0008IQ-Rb; Thu, 31 Mar 2022 12:46:18 +0000
Received: by outflank-mailman (input) for mailman id 296952;
 Thu, 31 Mar 2022 12:46:17 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=lDhN=UK=citrix.com=prvs=08274bcc4=roger.pau@srs-se1.protection.inumbo.net>)
 id 1nZuBt-0008IK-Fc
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 12:46:17 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 8cb3c620-b0f0-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 14:46:15 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8cb3c620-b0f0-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648730775;
  h=date:from:to:cc:subject:message-id:references:
   in-reply-to:mime-version;
  bh=ZYlpn569WkXX4+JDJnC1Yq8ss753qGyDv8wWbYUlZM8=;
  b=gwYi3ykpF9OezbLjwWIrSfi58A0YHcAQAK5cp0gBgTZNI6HkMJT4p4Kj
   /TrklEd4D+XCjHZ1/dXkG/sLtfAbs9s8Dga7n0uXSGT0NondmjNjtZ0bt
   SLqY+IXdTCfSXmVi78BWk7gC35p98BAXaF2aKOtQDXAN3LbgTFC2Om/Y/
   Q=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
X-SBRS: 5.1
X-MesageID: 70039788
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:BYEBpq9tFHvpF8wlryNHDrUDJX6TJUtcMsCJ2f8bNWPcYEJGY0x3n
 GBMWz/XbvjZYTH8etl0bt6x/EMH7JfXy4AwQVQ5qHs8E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oPgW1nlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCna62VD4qJ7zRoegQC0leMDtbGaZo/JaSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFJkYtXx6iynQEN4tQIzZQrWM7thdtNs1rp8WRa2PO
 JpJAdZpRC7PRFpmMFoXMr4/gdmHjCK4cX5z9WvA8MLb5ECMlVcsgdABKuH9YceWTM9YmkKZo
 GPu/GnjBBwectuFxlKt8HuqivXegCDTV4cbFbn+/flv6HWRzGEODBwdVXOgvOK0zEW5Xrp3K
 VEQ+ycohbg/8gqsVNaVdwazp2KY+BIVRdtLO/Ym4RuJw6CS4gHxLlYDSjlNedk3rvgcTDYh1
 kKKt97xDDkpu7qQIVqR7qyRrC+yESENIHUeeDQfSg8Y/9jkppp1hRXKJv5zHajwgtDrFDXYx
 zGRsDN4l7gVldQM1aiw4RbAmT3EjofNZh444EPQRG3N0+9iTNf7PcryswGdtKseatbCJrWcg
 JQas/qY8dkNFICQrSCAGLULP6uMw/2rNBSJ1DaDAKId3ziq/neie6VZ7zd/OFplP644RNP5X
 KPAkVgPvcEOZRNGeYcyOtvsUJpykcAMAPy/Dpjpgsxyjo+dneNt1AVnfgau0m/kiyDAeolva
 M7AIa5A4Zv3YJmLLQZapc9AidfHJQhknAs/oKwXKTz9i9Jyg1bPFd843KOmNLxR0U99iFy9H
 yxjH8WL0Q5Dd+b1fzPa94UeRXhTcyRrW86r9JINK7HeSuaDJI3HI6WLqV/GU9Y495m5a8+Sp
 i3tMqOm4ASXaYL7xfWiNSk4NeKHsWdXpnMnJy08VWtEKFB4CbtDGJw3LsNtFZF+rbQL5actE
 5EtJpXRatwSG2+v02lMMvHAQHlKKU3DafSmZHH+PlDSvvdIGmT0xzMTVlCxrHNXVHrm6JNWT
 n/J/lqzfKfvjj9KVa7+QPmu00mwrT4anudzVFHPOd5dZAPn940CFsA7pqRfzx0kQfkb+gan6
 g==
IronPort-HdrOrdr: A9a23:/FyAdq8iiYsb0AL5yi1uk+DkI+orL9Y04lQ7vn2ZLiYlFvBw9v
 re+cjzuiWE6wr5NEtApTniAse9qBHnhPlICOAqVN/JMTUO0FHYSr2KhrGSoQEIdRefygd179
 YYT0AgY+eaMbEBt6nHCaODYq4dKaK8nJyVuQ==
X-IronPort-AV: E=Sophos;i="5.90,225,1643691600"; 
   d="scan'208";a="70039788"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
 b=cbP2cMhrdAgAlKAal6okduiqkEorbr65amlLQ2RUAwmuuVtDo9uGuaPJ5qnWFnDd9f1XrJLzB/vv1Pi0lFnteTAvLoAejpJlXPkijWaMGcqTStgkRRzPpq/sBttlSyPKIR85V4l3JnBqhtAs0uB2rOSDL/UdDvGdNBMK9ondZP1QOvB4ebeUpu51WJs23+FTD9rwmtHsUuaV2sjHw8cnQt4qy9XkL7ZI6K6uYi7SBq2wCAWHHPoeuDZaL3+BVjxMUhrL0PHkX+m920jBDq50w1GVpygC+ejOJEfBjtSC6jfChh00mXt8wIoBe0auKo/ivCcdQycjudRLJGqeL9DKGA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector9901;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=xZpd2z8XCYD0tvsIKMNxnojqkCSYeA76f3AC6XwkPYI=;
 b=Fnwsb+NzrpmRwh//PYbWmCfl1O7uyXlTmvIksACK45LImj27HdRxTFuC7EuJo/tQ4hlWB5GG+26NFCBPugx2fcP84HoH00jSoNHpf1cMYp2kVOSISu28ODweaG/NVd/OSu4+/E36ZeCMPkni6y5xbl89+GvAHhfFFUrnx4hc8VJRkDF57qLZxfqySuAXPlOo3fhN0RxeLij18HyxfPYP9HS+nBmTwUHc8dnKkyaITQNAlimSe4oiZe8dt1kqP/2XsE1piUVB+SEb0943afL0353OlEqc/6m/VUqrUrOU32oeZM/WwWIv1nXpThTQohVhu3BHSsxYDfnubGluTb12Bg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com;
 dkim=pass header.d=citrix.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=citrix.onmicrosoft.com; s=selector2-citrix-onmicrosoft-com;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=xZpd2z8XCYD0tvsIKMNxnojqkCSYeA76f3AC6XwkPYI=;
 b=iX0ancYgpem7KlWAPQ+n9NMin7p825Fumq7dp3b+7M3bvhQKaBcJfoHFCC6oB1v4iPn2G3CD594iGppKaSqPIoF7i7pFE+S+J6kZkASTrY0KfH21DlSaYkozcU0rPG5jyhHHYDldUMdf9MLAWHh9dmsD30maJyoSOFwB6QCnQLY=
Date: Thu, 31 Mar 2022 14:46:05 +0200
From: Roger Pau =?utf-8?B?TW9ubsOp?= <roger.pau@citrix.com>
To: "Daniel P. Smith" <dpsmith@apertussolutions.com>
CC: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, Wei Liu <wl@xen.org>,
	<xen-devel@lists.xenproject.org>, <scott.davis@starlab.io>,
	<jandryuk@gmail.com>, Stefano Stabellini <sstabellini@kernel.org>, "Julien
 Grall" <julien@xen.org>, Jan Beulich <jbeulich@suse.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>
Subject: Re: [PATCH 2/2] arch: ensure idle domain is not left privileged
Message-ID: <YkWijXX9P1FSs61W@Air-de-Roger>
References: <20220330230549.26074-1-dpsmith@apertussolutions.com>
 <20220330230549.26074-3-dpsmith@apertussolutions.com>
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
In-Reply-To: <20220330230549.26074-3-dpsmith@apertussolutions.com>
X-ClientProxiedBy: LO2P265CA0288.GBRP265.PROD.OUTLOOK.COM
 (2603:10a6:600:a1::36) To DS7PR03MB5608.namprd03.prod.outlook.com
 (2603:10b6:5:2c9::18)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: d8c2b612-3cc4-4e5a-7096-08da13146e2e
X-MS-TrafficTypeDiagnostic: BYAPR03MB3784:EE_
X-Microsoft-Antispam-PRVS: <BYAPR03MB37846C69664E135B1EB511368FE19@BYAPR03MB3784.namprd03.prod.outlook.com>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR03MB5608.namprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(4636009)(366004)(83380400001)(66556008)(33716001)(4326008)(8676002)(66476007)(5660300002)(66946007)(316002)(508600001)(6916009)(54906003)(8936002)(85182001)(6486002)(186003)(26005)(107886003)(9686003)(6512007)(86362001)(6666004)(6506007)(2906002)(38100700002)(82960400001);DIR:OUT;SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?Vjd3cjNIbVhNbjhqS05OOUowTUVDazlVTzNmZmk1MXJxdGgyZU4rRm8xTmNP?=
 =?utf-8?B?SlM4bUJhc1BXQ2x0dE5PNUFmWjhUdHNuS1k4QmdCR25kMUw5WWtUTDB1N1Rp?=
 =?utf-8?B?OVZHS1dpWWtwRWdkdE16a3dvbjk1RFp1SEVOOHplVkp6ZnBjUENSMEVyVTB3?=
 =?utf-8?B?djZXbGxmNHRPbWJYR0RWeHIwUjdlSFNKTXNXSlhFZ2JDSGFMbXBRMnBUVFdJ?=
 =?utf-8?B?bVl6RVlralV2azh2cytQTktzVEFFRXBROHlMSm5BeVVPUmo0UjJNSGRPUVNk?=
 =?utf-8?B?TTczQVZWc3NJTGxsTkZpVk81Slk3SytNWm1jUWRuZUJueVNnbWRKUkxQUEpq?=
 =?utf-8?B?SXhKVHR6QXNKcTJvUjJEdjRYeVlQVEhzNlEzQ3hVUWVFdU8vSzRPcXgwcEN2?=
 =?utf-8?B?VGJCYVh4Y0FLMG5RV1RNYXFGVXE4YkZPZm5sUEpLMkQ2TjVXWTd2Wjc3WE1X?=
 =?utf-8?B?NW45amNxNHpEK0ZpbzhENGZKT3NKSmNYZExpVVdGVnFETEduTVZ6cU55ck5H?=
 =?utf-8?B?NWxhZkVhY2ZNUzEvU1kxTmxkY3dDTTRBVkg0UHp1SksxbW5xd1A5cWJ1NkMx?=
 =?utf-8?B?WGpCYklyOE04OW5BN0xvRGk2M1NvWFNXSm9nbTI5QXZFR1lQSTNONGwvNTlh?=
 =?utf-8?B?ZWdSU2dpTHdaWCtKRUkzcHdKS2h6Ym5lWk9wVitZY05uUmVpNmlJWVVrSHBs?=
 =?utf-8?B?TGFTZXFKdkdqZmloLzlCaGRVWUNld3Z3NlM2amgzMkcxTVRuWmVDbjRMcVpq?=
 =?utf-8?B?Q1ZwZkxBTmRVY1JiN0RBTmp2VGJsa3IvWHFjWTl1ci9pZm91R0h3MjdpNGM2?=
 =?utf-8?B?QWVkTXBuMlplTWp0N2tZU0s0TzNFSzhZdDZwNnByOUNoM0pNTVE1ZmM4emJu?=
 =?utf-8?B?b1pCVU02blI2RVFIWk85d2wzU09NdkFtMUJWRVBibGpXa1J0V3czL1NtS3lx?=
 =?utf-8?B?dXZ1bWw2TEltcEpGZjFoNDR2SXdEZ2crN0kzdG5obEVOVitHODlzalZmZzh5?=
 =?utf-8?B?K1pYeERSdmtCYmhaZkZYbFN2TjZkR2kzVW9PaHVjTE84dVYwMSt2c2R1M2F4?=
 =?utf-8?B?aGNaQy9IMVA0ZkYwdkh6cTZvamszVG1DZ09CR3YzOXJic0s2VytwQVJ2YS9H?=
 =?utf-8?B?M1FGWmFTK1AvTEI0RnR4M1hSSS9kNHZFd090U2VmalBCZXJEcFY5WnBKWStC?=
 =?utf-8?B?NlR3VFJLdG82ZVpXSFVzd0JMbm1NQzdlcHlBb2hDbVZkZUs5alNJanVmbGpQ?=
 =?utf-8?B?QjlLeThLWXp4Y0lFQkdiWEJYRFJ4OHoyaXlLSEVzejE5ckxlU1NqaGQvODdz?=
 =?utf-8?B?a2IybXFnKzlUZGdKRzd5Wk5HS0xVVE93elloK1JKK0dCSThnQ0lTODFzQS9T?=
 =?utf-8?B?UEJUMWlTWTBkVEdNMThHY1BWUVRUVHFqb1JCN0hPeEF0SHBPQVRtTVdJMUI5?=
 =?utf-8?B?dHRLU0JLaUhQMkZ4UDJOakRhREl6QXFpQ245aWhBaDFML3dCT3lYM25mRVR2?=
 =?utf-8?B?SWZySDJCUkRvaStQWkFDOTJQRU16T2xnTyswZG5zcEMzU2sxVTVZMGp0WS9R?=
 =?utf-8?B?VmtWRzF5UjNUdm04eURHaGluWnNqVzRLamtmK0tIK2xvSGd3Wm43eHRVWHl2?=
 =?utf-8?B?dklEUDZsV2NDU2UyVHRRdEFqVXlDSm9wT3ZUaU1BVVZUd0JjUFV4L2JqRnBo?=
 =?utf-8?B?cERsaTNKTS9IRWVjZk1URXhXYkprVktObHJnbUVqdlpBYkpuTkd4SWVwdWJh?=
 =?utf-8?B?UTdXc0dqdjl0Yi94dGNrT3Y2emxnSnlTc0phMGJEWVQxWU5OcDBzUFhtbW9v?=
 =?utf-8?B?K2FWazB5Q1d6ZVZpaEpXaTQvdElwVzR0UDBVR29pcXQyNGNxcEpldkwwVThh?=
 =?utf-8?B?dmFzWGsxdzV1M280aXBxS2ZwbEdTNitCVU41dzlHSDFISWluQUkzWEJSeU8v?=
 =?utf-8?B?VnZSLzhsaW5BVWZTbVZEbTh3bGpzYmpWYTRsa0RnRjZXcGRSZ0xXdmN2NFpO?=
 =?utf-8?B?UjZGcm9Ub3U2d2R0YjBpRGlZTXpMVkMvYjBidlUxODlVUGVmekZhcVpjeUYv?=
 =?utf-8?B?VFhRMFkrbDJoVUpWTy96bUZTQm1Mc21DTHdkV0NXZSt4cm9valhOb3dzeFRx?=
 =?utf-8?B?UDk3d2RpZE1vdDVTUGhhd3pDRlVIZUJRcGk1QittaU9tWEU2WlViUW4zU05F?=
 =?utf-8?B?Qm43K2xob0RwcVc3Y3pnbWdtazhwQXU2S3QrNFZYdDNaWVlxTENUZVFNWGVK?=
 =?utf-8?B?OUpsY3hMZk9EQ0VWVHNiUUxLMUdJckcwRllRZWNody9aR2dWejF0NHdFM1dR?=
 =?utf-8?B?VkxwY0R5TFNuUnNuNktnbzVZVkpVVnVhWHo3dzdNYTFheTkrZ2gvbW5BakJQ?=
 =?utf-8?Q?xCFHQIbL914WWEic=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: d8c2b612-3cc4-4e5a-7096-08da13146e2e
X-MS-Exchange-CrossTenant-AuthSource: DS7PR03MB5608.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Mar 2022 12:46:09.6875
 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 335836de-42ef-43a2-b145-348c2ee9ca5b
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 8njgT+TG9lYvnD2Yub+ZMT4YKnRdovA8iFapG//DZ1xhjOstHPZJK2BJDOMcYZ5cTWLSJMf8f8qI7jR44pHHPg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR03MB3784
X-OriginatorOrg: citrix.com

On Wed, Mar 30, 2022 at 07:05:49PM -0400, Daniel P. Smith wrote:
> It is now possible to promote the idle domain to privileged during setup.  It
> is not desirable for the idle domain to still be privileged when moving into a
> running state. If the idle domain was elevated and not properly demoted, it is
> desirable to fail at this point. This commit adds an assert for both x86 and
> Arm just before transitioning to a running state that ensures the idle is not
> privileged.
> 
> Signed-off-by: Daniel P. Smith <dpsmith@apertussolutions.com>
> ---
>  xen/arch/arm/setup.c | 3 +++
>  xen/arch/x86/setup.c | 3 +++
>  2 files changed, 6 insertions(+)
> 
> diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c
> index 7968cee47d..3de394e946 100644
> --- a/xen/arch/arm/setup.c
> +++ b/xen/arch/arm/setup.c
> @@ -973,6 +973,9 @@ void __init start_xen(unsigned long boot_phys_offset,
>      /* Hide UART from DOM0 if we're using it */
>      serial_endboot();
>  
> +    /* Ensure idle domain was not left privileged */
> +    ASSERT(current->domain->is_privileged == false) ;
> +
>      system_state = SYS_STATE_active;
>  
>      create_domUs();

Hm, I think you want to use the permission promotion of the idle
domain in create_domUs() likely?

At which point the check should be after create_domUs, and it would
seem that logically SYS_STATE_active should be set after creating the
domUs.

Also, FWIW, I'm not seeing this create_domUs() call in my context,
maybe you have other patches on your queue?

> diff --git a/xen/arch/x86/setup.c b/xen/arch/x86/setup.c
> index 885919d5c3..b868463f83 100644
> --- a/xen/arch/x86/setup.c
> +++ b/xen/arch/x86/setup.c
> @@ -589,6 +589,9 @@ static void noinline init_done(void)
>      void *va;
>      unsigned long start, end;
>  
> +    /* Ensure idle domain was not left privileged */
> +    ASSERT(current->domain->is_privileged == false) ;
                                                      ^ extra space.

I think you could squash this patch with the previous one and also
squash it with a patch that actually makes use of the introduced
permission promotion functions (or at least in a patch series where
further patches make use the introduced functions).

Thanks, Roger.


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 12:54:46 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 12:54:46 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296958.505671 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZuK1-0001K6-Qe; Thu, 31 Mar 2022 12:54:41 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296958.505671; Thu, 31 Mar 2022 12:54:41 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZuK1-0001Jz-NG; Thu, 31 Mar 2022 12:54:41 +0000
Received: by outflank-mailman (input) for mailman id 296958;
 Thu, 31 Mar 2022 12:54:40 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1nZuK0-0001Jt-Qo
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 12:54:40 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nZuJz-0005or-8o; Thu, 31 Mar 2022 12:54:39 +0000
Received: from 54-240-197-228.amazon.com ([54.240.197.228] helo=[10.7.236.30])
 by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1nZuJz-0007bA-1n; Thu, 31 Mar 2022 12:54:39 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=XrUQi50OBIysnvci1CkzI038oEyD9Hwr7ltiR14Jv6A=; b=O+e9P1C0HhGYpzGW02dQOJz2AN
	bmei2wgNNnKJkris3phkYnoK79HqKpWpizm/ifWXEOrFIcfY+xqIAkN32yQFe7mkFk5pjWbLef6BC
	ifuVf8cdtt/2TzX06CxwRpIHlXZ+MtK6KNWrLHJSZe/lk0Q1EnfW+8E7G+c1B8pAoYoU=;
Message-ID: <bb93b930-8287-6e8f-98b5-4b3f3c8e6eaf@xen.org>
Date: Thu, 31 Mar 2022 13:54:36 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [PATCH 2/2] arch: ensure idle domain is not left privileged
To: =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 "Daniel P. Smith" <dpsmith@apertussolutions.com>
Cc: Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, Wei Liu <wl@xen.org>,
 xen-devel@lists.xenproject.org, scott.davis@starlab.io, jandryuk@gmail.com,
 Stefano Stabellini <sstabellini@kernel.org>, Jan Beulich
 <jbeulich@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>
References: <20220330230549.26074-1-dpsmith@apertussolutions.com>
 <20220330230549.26074-3-dpsmith@apertussolutions.com>
 <YkWijXX9P1FSs61W@Air-de-Roger>
From: Julien Grall <julien@xen.org>
In-Reply-To: <YkWijXX9P1FSs61W@Air-de-Roger>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit

Hi,

On 31/03/2022 13:46, Roger Pau Monné wrote:
> On Wed, Mar 30, 2022 at 07:05:49PM -0400, Daniel P. Smith wrote:
>> It is now possible to promote the idle domain to privileged during setup.  It
>> is not desirable for the idle domain to still be privileged when moving into a
>> running state. If the idle domain was elevated and not properly demoted, it is
>> desirable to fail at this point. This commit adds an assert for both x86 and
>> Arm just before transitioning to a running state that ensures the idle is not
>> privileged.
>>
>> Signed-off-by: Daniel P. Smith <dpsmith@apertussolutions.com>
>> ---
>>   xen/arch/arm/setup.c | 3 +++
>>   xen/arch/x86/setup.c | 3 +++
>>   2 files changed, 6 insertions(+)
>>
>> diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c
>> index 7968cee47d..3de394e946 100644
>> --- a/xen/arch/arm/setup.c
>> +++ b/xen/arch/arm/setup.c
>> @@ -973,6 +973,9 @@ void __init start_xen(unsigned long boot_phys_offset,
>>       /* Hide UART from DOM0 if we're using it */
>>       serial_endboot();
>>   
>> +    /* Ensure idle domain was not left privileged */
>> +    ASSERT(current->domain->is_privileged == false) ;
>> +
>>       system_state = SYS_STATE_active;
>>   
>>       create_domUs();
> 
> Hm, I think you want to use the permission promotion of the idle
> domain in create_domUs() likely?
> 
> At which point the check should be after create_domUs, and it would
> seem that logically SYS_STATE_active should be set after creating the
> domUs.
> 
> Also, FWIW, I'm not seeing this create_domUs() call in my context,
> maybe you have other patches on your queue?
I think the code is based on an old version of Xen (looks like 4.14). In 
newer version create_domUs() is called before just before 
discard_initial_modules() (see XSA-372 for the rationale).

Daniel, can you please rebase this series to the latest staging?

Cheer,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 13:17:17 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 13:17:17 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296962.505682 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZufk-0003lu-Kc; Thu, 31 Mar 2022 13:17:08 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296962.505682; Thu, 31 Mar 2022 13:17:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZufk-0003ln-HX; Thu, 31 Mar 2022 13:17:08 +0000
Received: by outflank-mailman (input) for mailman id 296962;
 Thu, 31 Mar 2022 13:17:06 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=kR9h=UK=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nZufi-0003lf-Iq
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 13:17:06 +0000
Received: from mail-lj1-x235.google.com (mail-lj1-x235.google.com
 [2a00:1450:4864:20::235])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id dc381614-b0f4-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 15:17:05 +0200 (CEST)
Received: by mail-lj1-x235.google.com with SMTP id 17so31940481ljw.8
 for <xen-devel@lists.xenproject.org>; Thu, 31 Mar 2022 06:17:05 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: dc381614-b0f4-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=mSzH78EoYEJXMQgWWHfg4gvtnQ9OmEXl5KNPypS1KlI=;
        b=pPOLwzk/Eb0+0gehavChpMhmFqTFI43cfCNJWfKuROQhhE8Z4PTnLxL1dmQ/FGVd2H
         VNvtjRFp0yPyPKUFHL+y9PT8JK86q8KRhM6a8LI5oZdGXnfqtotZONwlrhvUPmim+Zwr
         y6jw1aC9lffF+V5ylHrhFfA7D0UB9Wsotwvp3s9NbakItWsTIX0S7AwQmoawIWUthPQV
         PoHUWa/QwSh0v0jkgxKDYYYknUvvLyVPX88rey+PkN3igyI8wbSFz4G/0RYWngA1LUOa
         lXHuynfhnfB5daRSyuwsvozC/XmrmUQBwMzaanFyQM6bPmQe/NstgPNFEg78evJVOtzD
         6hDw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=mSzH78EoYEJXMQgWWHfg4gvtnQ9OmEXl5KNPypS1KlI=;
        b=vErG+88DqR4ebYAGkmI53botENeDqpA4nHBQch7J5F9wInkaygQw2l2viVDA7qzdmK
         nvf8GuSRbgfeZ/3dzVz644Izk6+5nq3MWPr4oqxxX/iR09UlpDgxDP+O9QeD03O95h/F
         xvJt8o5iYQyNLFE927J6gJ/xjN1B2ypJnUZKHQ2sqtw2n3d/HtgU90An25UzK/TeajKv
         iVSkI2KQRIuXikfyFw55c83iTlufySqvu00lG25OgDdWfvHy0hUxoXv9Cuvh/+gJR5EA
         IUI8s13egrd9wFOJlR2Q0/Gv/pZEhU+9nzMPVjwAoLKZPZ8YpC9uU39zDhDXE4zJyoVd
         bNKg==
X-Gm-Message-State: AOAM533jMr3xb0ygRfHjGWj6I5VhimtV2OOfahqbua39fBgfDLakmRD+
	W8Mm7KiFn0Sn406qrdepMY9LmIiihKyzGD2SqKU=
X-Google-Smtp-Source: ABdhPJycfvdk+/WkcXOIejueROTiaI5ylf2OqeZWp6vskG/a7kKcz5GTptEhCQDifPJfTLSpKrq6eBdk3SJ7qvN3Dz0=
X-Received: by 2002:a2e:bc22:0:b0:249:80b6:55fd with SMTP id
 b34-20020a2ebc22000000b0024980b655fdmr10744322ljf.135.1648732625001; Thu, 31
 Mar 2022 06:17:05 -0700 (PDT)
MIME-Version: 1.0
References: <20220330230549.26074-1-dpsmith@apertussolutions.com> <20220330230549.26074-2-dpsmith@apertussolutions.com>
In-Reply-To: <20220330230549.26074-2-dpsmith@apertussolutions.com>
From: Jason Andryuk <jandryuk@gmail.com>
Date: Thu, 31 Mar 2022 09:16:53 -0400
Message-ID: <CAKf6xpuA4hQmPdBtmog1UFcSQQkXL2=+e5bmqeocesgNxqD27w@mail.gmail.com>
Subject: Re: [PATCH 1/2] xsm: add ability to elevate a domain to privileged
To: "Daniel P. Smith" <dpsmith@apertussolutions.com>
Cc: xen-devel <xen-devel@lists.xenproject.org>, Scott Davis <scott.davis@starlab.io>, 
	Daniel De Graaf <dgdegra@tycho.nsa.gov>
Content-Type: text/plain; charset="UTF-8"

On Wed, Mar 30, 2022 at 3:05 PM Daniel P. Smith
<dpsmith@apertussolutions.com> wrote:
>
> There are now instances where internal hypervisor logic needs to make resource
> allocation calls that are protected by XSM checks. The internal hypervisor logic
> is represented a number of system domains which by designed are represented by
> non-privileged struct domain instances. To enable these logic blocks to
> function correctly but in a controlled manner, this commit introduces a pair
> of privilege escalation and demotion functions that will make a system domain
> privileged and then remove that privilege.
>
> Signed-off-by: Daniel P. Smith <dpsmith@apertussolutions.com>
> ---
>  xen/include/xsm/xsm.h | 22 ++++++++++++++++++++++
>  1 file changed, 22 insertions(+)
>
> diff --git a/xen/include/xsm/xsm.h b/xen/include/xsm/xsm.h
> index e22d6160b5..157e57151e 100644
> --- a/xen/include/xsm/xsm.h
> +++ b/xen/include/xsm/xsm.h
> @@ -189,6 +189,28 @@ struct xsm_operations {
>  #endif
>  };
>
> +static always_inline int xsm_elevate_priv(struct domain *d)
> +{
> +    if ( is_system_domain(d) )
> +    {
> +        d->is_privileged = true;
> +        return 0;
> +    }
> +
> +    return -EPERM;
> +}

These look sufficient for the default policy, but they don't seem
sufficient for Flask.  I think you need to create a new XSM hook.  For
Flask, you would want the demote hook to transition xen_boot_t ->
xen_t.  That would start xen_boot_t with privileges that are dropped
in a one-way transition.  Does that require all policies to then have
xen_boot_t and xen_t?  I guess it does unless the hook code has some
logic to skip the transition.

For the default policy, you could start by creating the system domains
as privileged and just have a single hook to drop privs.  Then you
don't have to worry about the "elevate" hook existing.  The patch 2
asserts could instead become the location of xsm_drop_privs calls to
have a clear demarcation point.  That expands the window with
privileges though.  It's a little simpler, but maybe you don't want
that.  However, it seems like you can only depriv once for the Flask
case since you want it to be one-way.

Regards,
Jason


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 13:17:33 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 13:17:33 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296963.505693 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZug8-0004CS-TF; Thu, 31 Mar 2022 13:17:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296963.505693; Thu, 31 Mar 2022 13:17:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZug8-0004CL-Q7; Thu, 31 Mar 2022 13:17:32 +0000
Received: by outflank-mailman (input) for mailman id 296963;
 Thu, 31 Mar 2022 13:17:31 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZug7-0004C3-Ph; Thu, 31 Mar 2022 13:17:31 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZug7-0006Eo-O0; Thu, 31 Mar 2022 13:17:31 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZug7-0002Od-7s; Thu, 31 Mar 2022 13:17:31 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZug7-0006cF-7O; Thu, 31 Mar 2022 13:17:31 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=2ib93PxUDmZKnbID3njmxxDo0yK2IaHAeJ31OcWs3CE=; b=MXz7mcZp4jXmUsI9fOdPn14qhq
	kb44r6Pb2Ec6ACqL0uZiRIjRHGzUvbvrymJKSn3xSBBJ86Celin63nZYdT8rxM9HxTL/DqRzCDP7o
	jrdGUqrEnxqg3NGHE3DNblgZTCV5WoBu0twpx2EAr4IUqYp8vIJzcwGg9GH5praHBB6E=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-169046-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [ovmf test] 169046: regressions - FAIL
X-Osstest-Failures:
    ovmf:build-amd64:xen-build:fail:regression
    ovmf:build-amd64-xsm:xen-build:fail:regression
    ovmf:build-i386:xen-build:fail:regression
    ovmf:build-i386-xsm:xen-build:fail:regression
    ovmf:build-amd64-libvirt:build-check(1):blocked:nonblocking
    ovmf:build-i386-libvirt:build-check(1):blocked:nonblocking
    ovmf:test-amd64-amd64-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
    ovmf:test-amd64-i386-xl-qemuu-ovmf-amd64:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    ovmf=55637a2894babca97945eeca1da0d431f74f8627
X-Osstest-Versions-That:
    ovmf=b1b89f9009f2390652e0061bd7b24fc40732bc70
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 31 Mar 2022 13:17:31 +0000

flight 169046 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/169046/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64                   6 xen-build                fail REGR. vs. 168254
 build-amd64-xsm               6 xen-build                fail REGR. vs. 168254
 build-i386                    6 xen-build                fail REGR. vs. 168254
 build-i386-xsm                6 xen-build                fail REGR. vs. 168254

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a

version targeted for testing:
 ovmf                 55637a2894babca97945eeca1da0d431f74f8627
baseline version:
 ovmf                 b1b89f9009f2390652e0061bd7b24fc40732bc70

Last test of basis   168254  2022-02-28 10:41:46 Z   31 days
Failing since        168258  2022-03-01 01:55:31 Z   30 days  264 attempts
Testing same since   169004  2022-03-30 02:24:42 Z    1 days    2 attempts

------------------------------------------------------------
People who touched revisions under test:
  Abdul Lateef Attar <abdattar@amd.com>
  Abdul Lateef Attar via groups.io <abdattar=amd.com@groups.io>
  Abner Chang <abner.chang@hpe.com>
  Akihiko Odaki <akihiko.odaki@gmail.com>
  Bandaru, Purna Chandra Rao <Purna.Chandra.Rao.Bandaru@intel.com>
  Bob Feng <bob.c.feng@intel.com>
  Gerd Hoffmann <kraxel@redhat.com>
  Guo Dong <guo.dong@intel.com>
  Guomin Jiang <guomin.jiang@intel.com>
  Hao A Wu <hao.a.wu@intel.com>
  Hua Ma <hua.ma@intel.com>
  Huang, Li-Xia <lisa.huang@intel.com>
  Jagadeesh Ujja <Jagadeesh.Ujja@arm.com>
  Jason <yun.lou@intel.com>
  Jason Lou <yun.lou@intel.com>
  Ken Lautner <kenlautner3@gmail.com>
  Kenneth Lautner <kenlautner3@gmail.com>
  Kuo, Ted <ted.kuo@intel.com>
  Li, Zhihao <zhihao.li@intel.com>
  Lixia Huang <lisa.huang@intel.com>
  Lou, Yun <Yun.Lou@intel.com>
  Ma, Hua <Hua.Ma@intel.com>
  Mara Sophie Grosch <littlefox@lf-net.org>
  Mara Sophie Grosch via groups.io <littlefox=lf-net.org@groups.io>
  Matt DeVillier <matt.devillier@gmail.com>
  Michael Kubacki <michael.kubacki@microsoft.com>
  Patrick Rudolph <patrick.rudolph@9elements.com>
  Purna Chandra Rao Bandaru <purna.chandra.rao.bandaru@intel.com>
  Ray Ni <ray.ni@intel.com>
  Sami Mujawar <sami.mujawar@arm.com>
  Sean Rhodes <sean@starlabs.systems>
  Sean Rhodes sean@starlabs.systems
  Sebastien Boeuf <sebastien.boeuf@intel.com>
  Sunny Wang <sunny.wang@arm.com>
  Ted Kuo <ted.kuo@intel.com>
  Wenyi Xie <xiewenyi2@huawei.com>
  wenyi,xie via groups.io <xiewenyi2=huawei.com@groups.io>
  Xiaolu.Jiang <xiaolu.jiang@intel.com>
  Yi Li <yi1.li@intel.com>
  Zhihao Li <zhihao.li@intel.com>

jobs:
 build-amd64-xsm                                              fail    
 build-i386-xsm                                               fail    
 build-amd64                                                  fail    
 build-i386                                                   fail    
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 1236 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 13:24:52 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 13:24:52 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296975.505703 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZunA-0005qN-Po; Thu, 31 Mar 2022 13:24:48 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296975.505703; Thu, 31 Mar 2022 13:24:48 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZunA-0005qG-Mr; Thu, 31 Mar 2022 13:24:48 +0000
Received: by outflank-mailman (input) for mailman id 296975;
 Thu, 31 Mar 2022 13:24:47 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=lCIW=UK=citrix.com=prvs=082fe6e5b=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nZun9-0005qA-9C
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 13:24:47 +0000
Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com
 [216.71.155.175]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ecf01376-b0f5-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 15:24:45 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ecf01376-b0f5-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648733085;
  h=date:from:to:cc:subject:message-id:references:
   mime-version:in-reply-to;
  bh=BQulKZTWMZELazLtrjVa3DwFfZYZqSsQ+MHJzvBmwrQ=;
  b=LHQT1yOWLvc4f5D60tviSbfoU04BguYTcdow6DO9KVreYfoA79TZ2haj
   J7E4UasVgSYDmCvbWp304BeZvy+lJ9+HU9T8pTuEcQ5y8pkUXYefo8RR/
   OVYYW23ry0kr8PP+FsqAoNbpkeCtAviaQEnLZCoGOLTU+pi/qwlXLBXnX
   M=;
Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 67558051
X-Ironport-Server: esa6.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:Q9PQiq+aMee80dONO17aDrUDln6TJUtcMsCJ2f8bNWPcYEJGY0x3n
 TZMWzjUPP+PZGKhKtBxOY/g8R9Uv5bVxtI2T1Nlri88E34SpcT7XtnIdU2Y0wF+jyHgoOCLy
 +1EN7Es+ehtFie0Si+Fa+Sn9T8mvU2xbuKU5NTsY0idfic5DnZ54f5fs7Rh2NQw2oPgW1nlV
 e7a+KUzBnf0g1aYDUpMg06zgEsHUCPa4W5wUvQWPJinjXeG/5UnJMt3yZKZdhMUdrJ8DO+iL
 9sv+Znilo/vE7XBPfv++lrzWhVirrc/pmFigFIOM0SpqkAqSiDfTs/XnRfTAKtao2zhojx/9
 DlCnd+TExUuZ7/dovxedihpFGZDAvB2+7CSdBBTseTLp6HHW37lwvEoB0AqJ4wIvO1wBAmi9
 9RBdmpLNErawbvrnvTrEYGAhex6RCXvFIoZpnFnyyCfFfs8SIrPa67L+cVZzHE7gcUm8fP2O
 ZVENGo3MU2ojxtnNAw8Bcs+ouKShELvSQRfmneo+ql02j2GpOB2+Oe0a4eEEjCQfu1Kmm6Iq
 2SA+H72ajkYO8aY0iGt6W+3i6nEmiaTcIAbErGi5+NpqFKWz20XThYRUDOTsfS/z0KzRd9bA
 0gV4TY167g/8lSxSdvwVAH+p2SL1iPwQPIJTbd8slvUjPOJvUDJXQDoUwKtdvRll5UkQmU4x
 2WR3PbYNDsojYLIeXGSo+L8QSyJBQAZKmoLZCkhRAQD4sX+rIxbsi8jXuqPA4bu0ISrRGiYL
 ySi6XFn2u5N1ZJjO7CTpwivvt66mnTeoufZDC3zV3nt0A52bZXNi2eAuQmCtqYowGp0ozC8U
 Jk4dyq2sbhm4XKlznXlrAAx8FeBvazt3Nr02wIHInXZ327xk0NPhKgJiN2EGG9nM9wfZRjia
 1LJtAVa6fd7ZSX2PfEpPt3vUZl1kMAM8OgJsNiONLKihbArKWe6ENxGPxbMjwgBbmBy+U3AB
 XtrWZn1VitLYUiW5DG3W/0cwdcWKtMWngvuqWTA503/i9K2PSfNIZ9caQfmRr1pvcus/VSOm
 /4CZpTi9vmqeLCnCsUh2dVIdg5iwLlSLc2elvG7gcbYfFI8QTtxWqKJqV7jEqQ895loei7z1
 inVcidlJJDX3yWvxdmiApy7VI7SYA==
IronPort-HdrOrdr: A9a23:7v3Pn68zyj8JP5m6glFuk+DaI+orL9Y04lQ7vn2YSXRuE/Bws/
 re+8jztCWE7Ar5N0tNpTntAsa9qDbnhPhICOoqTNKftWvdyQiVxehZhOOIqVDd8m/Fh4xgPM
 9bAtFD4bbLbWSS4/yV3DWF
X-IronPort-AV: E=Sophos;i="5.90,225,1643691600"; 
   d="scan'208";a="67558051"
Date: Thu, 31 Mar 2022 14:24:26 +0100
From: Anthony PERARD <anthony.perard@citrix.com>
To: Jason Andryuk <jandryuk@gmail.com>
CC: <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, Juergen Gross
	<jgross@suse.com>
Subject: Re: [PATCH] libxl: Always set ao for qmp_proxy_spawn_outcome
Message-ID: <YkWrim6+yw3LBzPn@perard.uk.xensource.com>
References: <20220330181658.30209-1-jandryuk@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <20220330181658.30209-1-jandryuk@gmail.com>

On Wed, Mar 30, 2022 at 02:16:58PM -0400, Jason Andryuk wrote:
> diff --git a/tools/libs/light/libxl_dm.c b/tools/libs/light/libxl_dm.c
> index 9a8ddbe188..59a8dcf3a9 100644
> --- a/tools/libs/light/libxl_dm.c
> +++ b/tools/libs/light/libxl_dm.c
> @@ -2468,6 +2468,9 @@ static void spawn_stub_launch_dm(libxl__egc *egc,
>      uint32_t dm_domid = sdss->pvqemu.guest_domid;
>      int need_qemu;
>  
> +    /* Set for out label through qmp_proxy_spawn_outcome(). */
> +    sdss->qmp_proxy_spawn.ao = ao;

I don't think that's correct. I feels like `sdss->qmp_proxy_spawn`
doesn't need to be initialised before calling spawn_qmp_proxy().

Also `qmp_proxy_spawn.ao` only need to be set before calling
libxl__spawn_spawn(), so at the same time as the rest of the
initialisation of `qmp_proxy_spawn` in spawn_qmp_proxy().


Next, about the uninitialized `ao` field:
- qmp_proxy_spawn_outcome() shouldn't use `qmp_proxy_spawn.ao`, but
  instead it should use the one available in `sdss`, that is
  `sdss->dm.spawn.ao` (The one that libxl__spawn_stub_dm() or
  spawn_stub_launch_dm() is using).
- And spawn_qmp_proxy() should also use `sdss->dm.spawn.ao` for
  STATE_AO_GC() as I don't think spawn_qmp_proxy() can expect
  `qmp_proxy_spawn` to be initialised as that's the function that
  initialise it.


Thanks,

-- 
Anthony PERARD


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 13:30:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 13:30:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296980.505716 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZusB-0006Ui-FK; Thu, 31 Mar 2022 13:29:59 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296980.505716; Thu, 31 Mar 2022 13:29:59 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZusB-0006Ub-AA; Thu, 31 Mar 2022 13:29:59 +0000
Received: by outflank-mailman (input) for mailman id 296980;
 Thu, 31 Mar 2022 13:29:57 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=lCIW=UK=citrix.com=prvs=082fe6e5b=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nZus9-0006UV-QN
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 13:29:57 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id a6719951-b0f6-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 15:29:56 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: a6719951-b0f6-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648733396;
  h=date:from:to:cc:subject:message-id:references:
   mime-version:in-reply-to;
  bh=StTlKPddtweVB8Ynd3dJ6GhX1brAZOyIbE879a+Gxdc=;
  b=SuAyJFWKT5uTe4wgsAiGslIvhLYliteOYdl58ubqBZr5f1HpUTH9gZxf
   S+tPSyFJ2bpTbSJo9xfxhcIi68awqxi/zrP484vMxx29xgFdC/qDNW3Ba
   Ac//+1o5o+iN4VEmCbd6Jaih6kGcnQkqkq3yLWdHKAAHDBBUOt3nJ+IET
   Y=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 67092132
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:Xgip5a7qIeW5e7utUQbMXAxRtC/HchMFZxGqfqrLsTDasY5as4F+v
 mMfD2uHbKqIYmX8co1ybYW19klXuJ/czoJlGVRq/300Hi5G8cbLO4+Ufxz6V8+wwmwvb67FA
 +E2MISowBUcFyeEzvuVGuG96yE6j8lkf5KkYAL+EnkZqTRMFWFw0XqPp8Zj2tQy2YPiWlvX0
 T/Pi5a31GGNimYc3l08s8pvmDs31BglkGpF1rCWTakjUG72zxH5PrpGTU2CByKQrr1vNvy7X
 47+IISRpQs1yfuP5uSNyd4XemVSKlLb0JPnZnB+A8BOiTAazsA+PzpS2FPxpi67hh3Q9+2dx
 umhurTsaC10LqHntt48QhhJDwR8Jodf+LDudC3XXcy7lyUqclPpyvRqSko3IZcZ6qB8BmQmG
 f4wcW5XKErZ3qTvnez9GrIEascLdaEHOKsWvG1gyjfIS+4rW5nZT43B5MNC3Sd2jcdLdRrbT
 5RGMWs1NU+aC/FJEkccFqtmzf7rumLAfyJZtW+Rh4Y86lGGmWSd15CyaYGIK7RmX/59gUKwt
 m/AuWPjDXkyNtOFziGe2mmxneKJliT+MKoQHbu07O93g3Wcw2USDFsdUl7Tiem0jAuyVsxSL
 2QQ+zEytu4i+UqzVN7/Uhak5nmesXYht8F4SrNgrlvXk+yNvljfVjNsoiN9hMIO6O4cGCwm/
 XGzvsLoFCBKsqa/UHKS3+LBxd+tAhQ9IWgHbC4CaAIK5dj/vY0+5i7yosZf/L2d1YOsR2ypq
 9yehG1n3uhI05ZXv0mu1Qqf6w9AsKQlWeLcCu//emu+pj10a4e+D2BDwQiKtK0QRGp1o7Tog
 ZTlpyR8xL1WZX1uvHbUKAnoIF1Pz6zfWNE7qQQzd6TNDxz3pxaekXl4uVmS3ntBPMceYiPOa
 0TOow5X75I7FCL0Mf8pPd/uVZ53kvWI+THZuhb8NIAmjn9ZLlLvwc2TTRTIgzCFfLYEz8nTx
 qt3ge7zVC1HWMyLPRK9RvsH0K9D+8zN7Ti7eHwP9Dz+ieD2TCfMEd8taQLSBshkvPLsiFiEq
 L53aprVoyizpcWjO0E7B6ZIdgtURZX6bLirw/FqmhmreVQ+Qjh7W66MmdvMueVNxsxoqwsBx
 VnlMmcw9bY1rSavxdmiApy7VI7SYA==
IronPort-HdrOrdr: A9a23:jxVuiKx4cH9sRI4NZC+YKrPwKL1zdoMgy1knxilNoHtuA6ulfq
 GV7ZAmPHrP4wr5N0tNpTntAsa9qBDnlaKdg7N+AV7KZmCP0gaVxepZjLfK8nnNHDD/6/4Y9Y
 oISdkaNDQoNykYsS8t2njbL+od
X-IronPort-AV: E=Sophos;i="5.90,225,1643691600"; 
   d="scan'208";a="67092132"
Date: Thu, 31 Mar 2022 14:29:50 +0100
From: Anthony PERARD <anthony.perard@citrix.com>
To: Jason Andryuk <jandryuk@gmail.com>
CC: <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, Juergen Gross
	<jgross@suse.com>
Subject: Re: [PATCH] libxl: constify libxl__stubdomain_is_linux
Message-ID: <YkWszkXKonywX/de@perard.uk.xensource.com>
References: <20220330181722.30280-1-jandryuk@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <20220330181722.30280-1-jandryuk@gmail.com>

On Wed, Mar 30, 2022 at 02:17:22PM -0400, Jason Andryuk wrote:
> libxl__stubdomain_is_linux can take a const pointer, so make the change.
> 
> This isn't an issue in-tree, but was found with an OpenXT patch where it
> was called with only const libxl_domain_build_info available.
> 
> Signed-off-by: Jason Andryuk <jandryuk@gmail.com>

Acked-by: Anthony PERARD <anthony.perard@citrix.com>

Thanks,

-- 
Anthony PERARD


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 13:58:04 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 13:58:04 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296985.505725 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZvJ8-0001Hx-LW; Thu, 31 Mar 2022 13:57:50 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296985.505725; Thu, 31 Mar 2022 13:57:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZvJ8-0001Hq-IW; Thu, 31 Mar 2022 13:57:50 +0000
Received: by outflank-mailman (input) for mailman id 296985;
 Thu, 31 Mar 2022 13:57:49 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=5BbJ=UK=aim.com=brchuckz@srs-se1.protection.inumbo.net>)
 id 1nZvJ6-0001Hk-Ug
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 13:57:49 +0000
Received: from sonic311-23.consmr.mail.gq1.yahoo.com
 (sonic311-23.consmr.mail.gq1.yahoo.com [98.137.65.204])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 8a9bf9b6-b0fa-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 15:57:46 +0200 (CEST)
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic311.consmr.mail.gq1.yahoo.com with HTTP; Thu, 31 Mar 2022 13:57:44 +0000
Received: by hermes--canary-production-bf1-665cdb9985-85ftg (VZM Hermes SMTP
 Server) with ESMTPA ID fa8513941d47aa2a9055d9a42576724a; 
 Thu, 31 Mar 2022 13:57:40 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 8a9bf9b6-b0fa-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netscape.net; s=a2048; t=1648735064; bh=ofnR0tQlTnjHYwxOCjkGIN3JFqVQGBGJeSM5FViJG8o=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From:Subject:Reply-To; b=eoPMAS6JeXyR76G0HPqxQ+2cShWYcN5Uv1wjS/6LvopbI21p0THi6JFVWeWi7rZM3muSNVLMTHTDzKZdKwMHLZI83ZLZf5S+c5317xGmGgYhmukqz8qgVsXNWePSUivid5I2Zluw+b0uAr+pLI8FSg7G8iJZyshCATdoRMO6/o1mqdlk2KRLAmhgIXonklFdTKcYhOQK1AHB5t8U9T4On+Y7JHFesgkvb2VeB1BC/4M0AdZDCVxiOlcadi09hN/EneHbmQEk8Y+ZTCAL43kpq/mmCLCxZxqgjrFefY1OsPPSUpVAkUM0OryJE7jTGIEp1sruuXufEW0NaREcrQYQCg==
X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1648735064; bh=xFA5Qbw1P9FHrcX9jGlxQSU3sHXaV9C0miQ4/Pq7afL=; h=X-Sonic-MF:Date:Subject:To:From:From:Subject; b=f8VuC8IF30vYSsEjzyhRDVO4i+Rb7Hc8GX6/o08O7i3hEVq1wYwGl4P2WHH5w2DnSdF1cg4i6YP5TpgMvzprANesWCUgKZib7XUTcJkGde55gxh5887ZNVWRE+KRPAaQaYm0vaaOoLt17ZooISmVyVxIKOuOvnBwc7ufpOP9duk64+pNh8OzRhGWhPjMXjc6wbaV+nVcv2RESchfNaPtKZ+Pe5wP8WEA7CfyW1UcUSSv7s2kDQKdbwceeSnhM+HKkolWNYc9QfHOk9C7dUQTuSz9W68oS3wPuH5VWgXlrA+T6HAV1zP2QvBycGPtWw8R7hz3kE2OvHFzKGkstk2Kgw==
X-YMail-OSG: KmtiWOoVM1nWHdSgIlAAQsJjoSH_iszUF8r7Hr8p3gpeMPw_4.oaT2Iei5XuC7E
 zevdEWhqQi.SK0.FuTIPaxi2GsN6iTnNgBHIx_cih7NGtk2iEor19c_Kwud9JD4njcsw89K7NjjH
 .sjp3ehBf_7fTu28awZhVu9XgxygDE8cJ8XbprmsH6pYbwK76fjIyo3Tx7pa_APbf95YP8hWSDId
 K.y72_kq4Wd1P5s0WX7aWLWXhwgFzcAJ2OpgIsfBufyrERMsFqSOdU857GAWyzWfF0ONw44thvPo
 YvwZe0uY.B7.W4MlN1CU2vgHRIBuu4PJI2Ozxv4UQJh946r3yU_BfB10IEqsIybdb5imNAHEwDjz
 45.WRlxYpp1z9NHqWYdHNMb_GqpdJEZ4XIIQtMF26KxmDSxVeg4qL1aun21K6dbMC86Tl81gSjrQ
 6OXUKcictYjT0MStVRo1hmrFPF7oPJP7egXUH13qp2w3nHlpmru2L.1Aed.Vs4RcFY5WjcwvYgIX
 Ku9CaYwZYnhQG3kD_wlyz7tKdAQ5TY.0EodQXxIuaaT9MzqN67pAht2w69LqJy..uJZXjhJBFdIX
 LlerC4ub4dOtf_jjNOvwbyCRq79JCDA6lIaGgI3UyoKxFOZ7CQZmn8.lISLk8e_CMnAP3Zd3j1xd
 ux3SAJBPsIXn_WroLz2xdc5B2Quqcv5gbpSOuJc6qFbwNXHXwFORVYxGP5J6PK8SGzYwJHCXoTKC
 i89JpmCwR4eeJf3_aqvBm0zwjBkuzxTKt9JMmXhQaqR39zmoGiDe.bAdydRWTzsxwqe9lp1VwdJe
 hez430wgj4T92pz04elLfL7.DqFsOtfc.fp.2iW3h9j6hAfNqJ1mGTCoj8w4ZP6dn2PMC48loIYU
 gBhBxttmiYU_QL9XGMYFz6kvRtaqWHjM8b7HxAf5J0.Sm4h0dCmt4EXyTvJoGRJXJSis.iUGus8E
 0jYU5GLJ7jKheqQfMovao.mQ63uT.oTjS8Ock2r_YcasOgVAqd47X6s9gprWv3hwlR2STTzN4ZAr
 ksI0lMe0WsrXp3RPpyBv0m_lcI26qyKYZlHrCNgx7UEgmJNzmjwH.Y_CmqQDolDuDAIEMDM4A2la
 FQXkRoZSyvwCQQfovZsN0Mm_mA7Qhb5NETA8zG7IfetUO1zZETyUwHwBIj.KDfLF.HjPBiWVcW.n
 Mx3INgedyvnorohxhyhayDOQp7b2mJRvVvT6ufKHZT9jg8RRqz57NFIY0lab8N9Y_ziFUJLg4qjk
 5hyC.brcQKIZJmWxiMH9odc2rvn9uwK1y8LWTCS74lWD2LVuniwFloV4rhOe5rO4d6Rhg0LMqUkM
 89MVgATjCLgVNn_O43yHb.5CwRqIMQdf5b0VEXXjqaFmkKVkEFLmg6.SMOud9Dy73WodpBn.rAS4
 cWk3a4dL4DlcfX_pJe0D458lyXgN3Q6FvcHhIbi7C46setwZv5XT1k28rHxndH4DW9STckOb_WMv
 ygHwB1VMPRHBQ9Moo52vI33oa9tRtBbUYXRTPhuUd6G6U10dCOznCBDxEVXeIZhHOmp6ixfLAggC
 W1magyDklHD3TLz7wMsS6ZijN_s2aMODB5.5jN2K9I1O0mSz4qY5HrfrTEVNyHXdvk7VFXGOwIiU
 cipsf.X_i9Y5oviSockLz3ni3cueufNGZf6LLAWc6gqVqWBUXsJHxhv10GNV1QUpJJ.BE_ElSYQS
 8W4C0FWYG9S4dEz2726zyPHwVjiUbfsgh606FcdeIHK_UI5OSXerZDxaJ.Km.zFg25BZGokQft83
 UXFlj9xEKjYyLMA4DjIKkh2ge_89Bufgn.r.R1a8P9UOjg1er0lBU2fJ_212vFNpFEAMSgvnbPEU
 8bN_IS46DRRy40jq1OuHQtz6O5PIEQan4wGrx9lH.srXOXf3m4uvZtCuZXE6vNqxyPD_D6jXriWZ
 a8do1.4sx2VEBQyLUjgdBfD2vllofGRpAjzyf91i2QOPMv2bXG7N4aWPynqwFRnKETyAHuV7DPEW
 US2uLHGOaEL_QndEXLfTGOZeT5l86LWo1ildBDfcAqPSugQ_umxbRh5IT5LLQaQi_rm0XeMGEYJQ
 Qk5krYRj05Msb1F64GGia0MFcjgg_9ATGVkamvQlAyftwWvtNBE.aILKRTN2yOaykVb8uOkVAsuW
 UBzOfkd.6o6vVYpnSrNx8cx2QDp3_CnY26Cg_8.91_OIr2pdYiO9x2VmgDzE3AegfwW6R5CMn5qe
 NwS3hfydlOnzvDdYcSkM1
X-Sonic-MF: <brchuckz@aim.com>
Message-ID: <ec7a9cf1-2504-9ee3-c9d9-060b8463a557@netscape.net>
Date: Thu, 31 Mar 2022 09:57:39 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [XEN PATCH] tools/libs/light/libxl_pci.c: explicitly grant access
 to Intel IGD opregion
Content-Language: en-US
To: Jason Andryuk <jandryuk@gmail.com>
Cc: Jan Beulich <jbeulich@suse.com>, Wei Liu <wl@xen.org>,
 Anthony PERARD <anthony.perard@citrix.com>, Juergen Gross <jgross@suse.com>,
 xen-devel <xen-devel@lists.xenproject.org>
References: <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz.ref@netscape.net>
 <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz@netscape.net>
 <78ce5809-8df4-c94e-4313-fffb1b86b771@suse.com>
 <CAKf6xpsN+uJ=AyxtrnOrQrynFL=dwC=DdT7DHnK=wx9UFtdUDQ@mail.gmail.com>
 <59471dea-c379-59a3-9202-384a4ec54a07@netscape.net>
 <CAKf6xpsyxDJS36tNmXMrzusKMgi_gGvdvMwncSry_rWB-ZTjZg@mail.gmail.com>
From: Chuck Zmudzinski <brchuckz@netscape.net>
In-Reply-To: <CAKf6xpsyxDJS36tNmXMrzusKMgi_gGvdvMwncSry_rWB-ZTjZg@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Mailer: WebService/1.1.20001 mail.backend.jedi.jws.acl:role.jedi.acl.token.atz.jws.hermes.aol
Content-Length: 4751

On 3/31/2022 8:23 AM, Jason Andryuk wrote:
> On Thu, Mar 31, 2022 at 12:34 AM Chuck Zmudzinski <brchuckz@netscape.net> wrote:
>> On 3/30/22 2:45 PM, Jason Andryuk wrote:
>>> On Fri, Mar 18, 2022 at 4:13 AM Jan Beulich <jbeulich@suse.com> wrote:
>>>> On 14.03.2022 04:41, Chuck Zmudzinski wrote:
>>>>> When gfx_passthru is enabled for the Intel IGD, hvmloader maps the IGD
>>>>> opregion to the guest but libxl does not grant the guest permission to
>>>>> access the mapped memory region. This results in a crash of the i915.ko
>>>>> kernel module in a Linux HVM guest when it needs to access the IGD
>>>>> opregion:
>>>>>
>>>>> Oct 23 11:36:33 domU kernel: Call Trace:
>>>>> Oct 23 11:36:33 domU kernel:  ? idr_alloc+0x39/0x70
>>>>> Oct 23 11:36:33 domU kernel:  drm_get_last_vbltimestamp+0xaa/0xc0 [drm]
>>>>> Oct 23 11:36:33 domU kernel:  drm_reset_vblank_timestamp+0x5b/0xd0 [drm]
>>>>> Oct 23 11:36:33 domU kernel:  drm_crtc_vblank_on+0x7b/0x130 [drm]
>>>>> Oct 23 11:36:33 domU kernel:  intel_modeset_setup_hw_state+0xbd4/0x1900 [i915]
>>>>> Oct 23 11:36:33 domU kernel:  ? _cond_resched+0x16/0x40
>>>>> Oct 23 11:36:33 domU kernel:  ? ww_mutex_lock+0x15/0x80
>>>>> Oct 23 11:36:33 domU kernel:  intel_modeset_init_nogem+0x867/0x1d30 [i915]
>>>>> Oct 23 11:36:33 domU kernel:  ? gen6_write32+0x4b/0x1c0 [i915]
>>>>> Oct 23 11:36:33 domU kernel:  ? intel_irq_postinstall+0xb9/0x670 [i915]
>>>>> Oct 23 11:36:33 domU kernel:  i915_driver_probe+0x5c2/0xc90 [i915]
>>>>> Oct 23 11:36:33 domU kernel:  ? vga_switcheroo_client_probe_defer+0x1f/0x40
>>>>> Oct 23 11:36:33 domU kernel:  ? i915_pci_probe+0x3f/0x150 [i915]
>>>>> Oct 23 11:36:33 domU kernel:  local_pci_probe+0x42/0x80
>>>>> Oct 23 11:36:33 domU kernel:  ? _cond_resched+0x16/0x40
>>>>> Oct 23 11:36:33 domU kernel:  pci_device_probe+0xfd/0x1b0
>>>>> Oct 23 11:36:33 domU kernel:  really_probe+0x222/0x480
>>>>> Oct 23 11:36:33 domU kernel:  driver_probe_device+0xe1/0x150
>>>>> Oct 23 11:36:33 domU kernel:  device_driver_attach+0xa1/0xb0
>>>>> Oct 23 11:36:33 domU kernel:  __driver_attach+0x8a/0x150
>>>>> Oct 23 11:36:33 domU kernel:  ? device_driver_attach+0xb0/0xb0
>>>>> Oct 23 11:36:33 domU kernel:  ? device_driver_attach+0xb0/0xb0
>>>>> Oct 23 11:36:33 domU kernel:  bus_for_each_dev+0x78/0xc0
>>>>> Oct 23 11:36:33 domU kernel:  bus_add_driver+0x12b/0x1e0
>>>>> Oct 23 11:36:33 domU kernel:  driver_register+0x8b/0xe0
>>>>> Oct 23 11:36:33 domU kernel:  ? 0xffffffffc06b8000
>>>>> Oct 23 11:36:33 domU kernel:  i915_init+0x5d/0x70 [i915]
>>>>> Oct 23 11:36:33 domU kernel:  do_one_initcall+0x44/0x1d0
>>>>> Oct 23 11:36:33 domU kernel:  ? do_init_module+0x23/0x260
>>>>> Oct 23 11:36:33 domU kernel:  ? kmem_cache_alloc_trace+0xf5/0x200
>>>>> Oct 23 11:36:33 domU kernel:  do_init_module+0x5c/0x260
>>>>> Oct 23 11:36:33 domU kernel:  __do_sys_finit_module+0xb1/0x110
>>>>> Oct 23 11:36:33 domU kernel:  do_syscall_64+0x33/0x80
>>>>> Oct 23 11:36:33 domU kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9
>>>> The call trace alone leaves open where exactly the crash occurred.
>>>> Looking at 5.17 I notice that the first thing the driver does
>>>> after mapping the range it to check the signature (both in
>>>> intel_opregion_setup()). As the signature can't possibly match
>>>> with no access granted to the underlying mappings, there shouldn't
>>>> be any further attempts to use the region in the driver; if there
>>>> are, I'd view this as a driver bug.
>>> Yes.  i915_driver_hw_probe does not check the return value of
>>> intel_opregion_setup(dev_priv) and just continues on.
>>>
>>> Chuck, the attached patch may help if you want to test it.
>>>
>>> Regards,
>>> Jason
>> Thanks for the patch, I will try it when I get a chance
>> and report if it prevents the crash and enables video
>> output to my screen. Has your patch been committed
>> to Linux? I just checked on the gitlab Linux master
>> branch and didn't see it there.
> This patch should just make the i915 probe error out properly inside
> the domU when the opregion cannot be mapped properly.  It would avoid
> trigger the domU trace you posted above, but it wouldn't solve any other
> issue.
>
> I have not yet submitted upstream.
>
> Regard,
> Jason

I understand the limitations of this patch, that the guest will still
not have access to the opregion. Still, I can test it - I do remember
some configurations when I could get output on the VGA port
but not the HDMI port, and maybe with this patch at least
the VGA port will work. In fact, I am not even sure the VGA port
does not currently work without your patch, but I know the HDMI
port does not work without your patch and an unpatched Xen
tool stack. So the patch might help some and if it does help it
probably is suitable for upstream.

Chuck


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 14:05:22 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 14:05:22 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296989.505736 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZvQK-0002la-EK; Thu, 31 Mar 2022 14:05:16 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296989.505736; Thu, 31 Mar 2022 14:05:16 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZvQK-0002lT-BO; Thu, 31 Mar 2022 14:05:16 +0000
Received: by outflank-mailman (input) for mailman id 296989;
 Thu, 31 Mar 2022 14:05:14 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=5BbJ=UK=aim.com=brchuckz@srs-se1.protection.inumbo.net>)
 id 1nZvQI-0002lN-PT
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 14:05:14 +0000
Received: from sonic313-19.consmr.mail.gq1.yahoo.com
 (sonic313-19.consmr.mail.gq1.yahoo.com [98.137.65.82])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 94d2ec0c-b0fb-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 16:05:13 +0200 (CEST)
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic313.consmr.mail.gq1.yahoo.com with HTTP; Thu, 31 Mar 2022 14:05:11 +0000
Received: by hermes--canary-production-bf1-665cdb9985-6hz22 (VZM Hermes SMTP
 Server) with ESMTPA ID 21c70eba28f79f7db0140419acc99ea1; 
 Thu, 31 Mar 2022 14:05:07 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 94d2ec0c-b0fb-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netscape.net; s=a2048; t=1648735511; bh=4vFHWQeclk89GLLGWFTNTvUoEp1u+aqIieD9ED9z78U=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From:Subject:Reply-To; b=q/fiaJ+4jdAC84frorA3lu1+tT6qGhtdzbLOyB0kgpmq3g+0QFlWwC4al1fFTth3IP2R/FYqgB1hn9n0jv1/YUZIvsBRtuOZ/0DdNw0CwvHKtYwBjX7mxxusoWOKHjA0mkz0hL8owN4aOyWBYsDeW3mfY8wKzAh1XwWQZR8gxz7mL+5t7Tm2hOociJoA23NdRwQCghLnHf+t59N7Na/rfpQTdQYQDVV8o7wdeGaP0v2R14K2Iy863cqWNxd/xWX5Op9RB8W7ITXMPTNG4/0vZBTlE0R7zyDr/BVhRw2S+dbBBHHbv5Oq9E1PIraky2XVxdSy5W9h3KhS+EX6phhzIQ==
X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1648735511; bh=0bGbSa7PQmeZx6DTyapQTD3lQLlIqpOdWRv72RS143/=; h=X-Sonic-MF:Date:Subject:To:From:From:Subject; b=RMmJSLT3+gg6TaFaGNYctJg6wd2Q/r9mBKd8NEdGV9IDvt7YGKO2VdGFOs1/XudWrWsUZdGjvum11eCipJdarUKCiAqX/qD1DNoxSMVYZnd1nuSOIqzN8ssCYQQcBxwG76nXJta0VYSYHBfkjzer1NbEj37V4QJjBeUHHgsL+KAXPbuiLySqFF80BA3zNooFc38dvuTepjLAPHXc0nF3CamjQo03bsMX2dtP7g0IKlXID/G1SZ4Mkh8+nL9adgKDHalw14ZCZ2O2ik1Lt2DrlnO8RC565EHKzsKFoMVrTPLSuIYmJZmuK+mu2FJ2tEYXc/l7vJOtEtue9Kt6V1Jh7A==
X-YMail-OSG: XMKe63AVM1mBjKZrfORCJie8UVOSxTNl6L7f7YE5_Haj2mamouQT7Tl1m4KF.FH
 wWRzjQWmlHrMKSo8aBlVvDYVP7nwSS3QNItiTOYFacOOYnO.LbxP08a4Z7.bjPZvRKzXffSbqTG_
 gHoreUSpDA20yJ7iAz_nRXoJpQ3ATzNEVGLRjVbU._AuQNbZrOM9eKfOdEiLPFHMm6iXuSxGw0D7
 JD43mVwagx7UFrNkysSaI0K9tEE9YfBOVXnMLw.uqizpSAPXAGRzBX3jPKeWVg2i_A.eThv6fKO.
 defZ3PNTGIwuyGgzkYSAQ4TZ7WOqAT4Qhu5ZOKARpSFObqJO6_CqVYIpiFIzbyfJhi50Q7tA6dYf
 eyBrI4xfr4bM4DDipfBzzcPcALI4r.0bQV00XPg4gOAsGFdxbrsc4HH8557Q8HuIwVFd5ehqrNgf
 PyckkbVCeVs7ivxgP437.VzvCjbt.Y7dHmcKERVH5lfCfSsg12dj_o7fw4yvLzIxlnmPtf9pm0aa
 DEJ5f1qNqlzoY3hFd.mU0t4DrGTMaLTFDQSTUDBVOuUMPEuXTUcrINsExPv8k3KC1RCnASpkiP6h
 .0zrD19MBc_Nqee2Ur0m0_wRvdlBRbPHU6c1zo.3b60ES5N9W58vdNa0vyBs0HcE1MvnBCgh9PBW
 rtBeI5TSEGQnR9j28Ru8FsSOvUHy27aNazkOHCWDnRqZVbnuS_oJNO2pPUt_b_KCyi4NRm1q.XYQ
 ug8uJna2yMxDNpB5qxY9bsxCZJK9B5npPa64Zs0XbndIRLM5__1m2tg1EaVNuVJHcUL8QtJJhe1A
 Lt8tWeOxWb4xdvDNcO7GcToOZq.6ffUKDQzAoTleSZ2ceBJWGCQrYSyjlF5BSkuPfeBPBulwhhdE
 DEPAPjbf4sIJBGXLV0ZGZMd075mGmraPZyNlhKWydq3_ibF4LqVoagL6sfz9N5ci_6gAoKtMkR_t
 gfzAVUE3RjI2KMLPFi8AQ4ukTttALRXKIyYO7Z7yRjPpGbfprOOSxVHWAVCkvp7R0XLCsOwlFWSX
 rJ1WbU8Rprul7szwlBi62aA6IraaMzwn.3dg5236QFCc.BmZXzYs3hB.u5BjBgjJXOoP72w4FOFp
 ElvCt8QCWSkhLHqlHdJHKymkm0m4YVRYKUSImWo3xBs3JrcQ7h.Ysjjjt5wELr5aVPSB9QmA7bkJ
 RlC1z9nEeFALwjKD4lYnxb.NgTdeQpoajc3WFOMsl2fxYqKblGFEaLltPKFMXJfCMqrQJaMZC45X
 7SGDXs_DJ_UX4jWca3TYcruUHvZ6SgSwbznxHWvJ0SPwWArsFdsL7jKq.UO.qwM0C2Duokhgyj3p
 vnOwti8qpJK4Cvet_aGBddLZQn2BZFOH0L9apAfLjXIV0xK1ZMb3FR4HaEfE2TIn3pwA9L3uc9K4
 wMJojgravH_V3O5pU6JmEKCa9oAKDNG61uWpZF3vhMzYubw5PzVX6F7Xumb7DxNopdbsp.X4vIZw
 jLQ3vnsk68K9el0zRzc56qiuA.tL4okVXotdgjiB.YwJFre.vXnxaEdBr9tP8Kdbq3Kg2aO00lei
 JkFQeDhk7F9_6.eHo6cSAX_xUVtDY5be4cRGcG9oD3nmn5M5jMsk1x22AHuRd.XcYTo0HAOl6nRA
 E_UPV4dX.FlFjkA8GX.3A9cpo7iWHX3Lie.wc0nNUeDh9a6wJY8I9xohkaEWUkcAZaI.WsnVhlU6
 sBWpEONY6oGpCYuk5o1bWhve_EkdeBqJrJfUZE5qYCtB87yOEhDF0aWE9SNnvTZyC.mMc3mi07xx
 k4.MqquUkIbnmd1e8bMNeCWlTMGNRZe4OBQwTRYtfrOUj1nw3Xst9v4klVUy7_nPPJS8jaxwhnvb
 nXzq_J_eLq3pcMwQ_pefHzybP11.oddYTDImrb4jRyvkjhpghQzy_3dtUpMUHCmxI8NX4I2pkCwg
 M86ktv110CB0egcjW2pvTTim9zwqS19cYyXffNHfoY_BVT.ZdAp6i.hJO8vFqA.2G6050OKJgl75
 emAIm7yDkZdhCWwDhQp3d4gBQT.8nEseCVu07jpqBQqxum6jUkBlNoQ5Dya9f5M7o8vdFTjceqsf
 aujK5o39Nt9bz7DNierQaUPb1F9A8lvXQ8FZZz76.LKm9p_.H.r9_923OkEcifYUNn835cqX5YSv
 DtC5oJdtrtDI4Jyjc2iAAHDpf_o949xzHgDeZto_.sbfVrpOGi5PvuV5shYYX_qqiOF2Qc6eXKes
 Tb3ZoGu03OxZ7GeRRUzw-
X-Sonic-MF: <brchuckz@aim.com>
Message-ID: <da62d06d-fd18-a313-9e69-2a4581e97c1a@netscape.net>
Date: Thu, 31 Mar 2022 10:05:05 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [XEN PATCH] tools/libs/light/libxl_pci.c: explicitly grant access
 to Intel IGD opregion
Content-Language: en-US
To: Jason Andryuk <jandryuk@gmail.com>
Cc: Andrew Cooper <amc96@srcf.net>, Anthony PERARD
 <anthony.perard@citrix.com>, xen-devel <xen-devel@lists.xenproject.org>,
 Wei Liu <wl@xen.org>, Juergen Gross <jgross@suse.com>,
 Jan Beulich <jbeulich@suse.com>
References: <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz.ref@netscape.net>
 <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz@netscape.net>
 <YkSQIoYhomhNKpYR@perard.uk.xensource.com>
 <408e5e07-453c-f377-a5b0-c421d002aec5@srcf.net>
 <46a8585e-2a2a-4d12-f221-e57bd157dec6@netscape.net>
 <CAKf6xpths4SX4wq-j4VhnXZnx0DW=468z3=9FYHso=Wy1i_Rsg@mail.gmail.com>
From: Chuck Zmudzinski <brchuckz@netscape.net>
In-Reply-To: <CAKf6xpths4SX4wq-j4VhnXZnx0DW=468z3=9FYHso=Wy1i_Rsg@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Mailer: WebService/1.1.20001 mail.backend.jedi.jws.acl:role.jedi.acl.token.atz.jws.hermes.aol
Content-Length: 1271

On 3/31/2022 8:29 AM, Jason Andryuk wrote:
> On Wed, Mar 30, 2022 at 11:54 PM Chuck Zmudzinski <brchuckz@netscape.net> wrote:
>> On 3/30/22 1:27 PM, Andrew Cooper wrote:
>>>
>>> This has been discussed before, but noone's done anything about it.
>>> It's a massive layering violation for QEMU to issue
>>> xc_domain_iomem_permission()/etc hypercalls.
>>>
>>> It should be the toolstack, and only the toolstack, which makes
>>> permissions hypercalls, which in turn will fix a slew of "QEMU doesn't
>>> work when it doesn't have dom0 superpowers" bugs with stubdomains.
>> How much say does the Xen project have over the code
>> in Qemu under hw/xen? I would not be against having libxl
>> do the permissions hypercalls in this case instead of Qemu
>> doing it. My test with Qemu traditional and this patch proves
>> the permission can be granted by libxl instead of the device
>> model.
> Qubes patches libxl and QEMU, and they move the hypercalls to the
> toolstack.  They are using linux stubdoms, and I think it works for
> them.

That still doesn't answer my question - will the Qemu upstream
accept the patches that move the hypercalls to the toolstack? If
not, we have to live with what we have now, which is that the
hypercalls are done in Qemu.

Regards,

Chuck


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 14:10:10 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 14:10:10 +0000
Received: from list by lists.xenproject.org with outflank-mailman.296994.505748 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZvV3-0004As-0w; Thu, 31 Mar 2022 14:10:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 296994.505748; Thu, 31 Mar 2022 14:10:08 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZvV2-0004Al-UD; Thu, 31 Mar 2022 14:10:08 +0000
Received: by outflank-mailman (input) for mailman id 296994;
 Thu, 31 Mar 2022 14:10:07 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=lCIW=UK=citrix.com=prvs=082fe6e5b=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nZvV1-00046P-QE
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 14:10:07 +0000
Received: from esa5.hc3370-68.iphmx.com (esa5.hc3370-68.iphmx.com
 [216.71.155.168]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id 42ae0267-b0fc-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 16:10:05 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 42ae0267-b0fc-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648735805;
  h=date:from:to:cc:subject:message-id:references:
   mime-version:in-reply-to;
  bh=1vWiFKuWCdwcit+SekdnZEsS+P2nCjXP2p2BwVRhN7U=;
  b=cIRLI0FBkqR0Erjl6r+9cGCe1qp3BGjaUkKYlaPBbbwmaaPM0m4YlJvd
   rl+uh0olVPD5LT3lTjyW18r/ZASsqprbrmhGC/W6xvY2phEJJnmiLmpYZ
   DK1YDmA6NEav+foZdBG7DvQenzpAQsWghYhmRF3+G/2aZpYATiHDQ+3GR
   U=;
Authentication-Results: esa5.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 67097998
X-Ironport-Server: esa5.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:J+py2KmgcmBg7tjyDec5Ob7o5gyWJkRdPkR7XQ2eYbSJt1+Wr1Gzt
 xIcWzyBMv2DZmP3f48nPti0p0lQv5PUnNJlTFRtrnozFSMWpZLJC+rCIxarNUt+DCFioGGLT
 Sk6QoOdRCzhZiaE/n9BCpC48T8kk/vgqoPUUIYoAAgoLeNfYHpn2EoLd9IR2NYy24DiWFrV4
 7senuWEULOb828sWo4rw/rrRCNH5JwebxtB4zTSzdgS1LPvvyF94KA3fMldHFOhKmVgJcaoR
 v6r8V2M1jixEyHBqD+Suu2TnkUiGtY+NOUV45Zcc/DKbhNq/kTe3kunXRa1hIg+ZzihxrhMJ
 NtxWZOYSDcRYKSdpf4hQlpSNyFAA715/oTtGC3q2SCT5xWun3rExvxvCAc9PJEC+/YxCmZLn
 RAaAGlTNFbZ3bvwme/lDLk37iggBJCD0Ic3s3d8zTbfHLA+TIrKWani7t5ExjYgwMtJGJ4yY
 uJHNmI+M0WRM3WjPH83S4gVn8P5tEWjWDdEs2+y/7Eo5FHcmVkZPL/Fb4OOJ43iqd9utlmcj
 nLL+SL+GB5yHN6Q0z2e6Vq3m/TC2yj8Xeo6FrS++uR7nV67yWkaCRlQXly+ydGph0j7V99BJ
 kg8/is1sbN05EGtVsP6XRCzvDiDpBF0ZjZLO7RkskfXkPOSulvHQDhfJtJcVDA4nM4GfWIjh
 2KTo8KqDxhvjoOFdnSm3I7B+FteJhMpBWMFYCYFSy4M7N/ivJw/g3rzczpzLEKmpoarQG+tm
 lhmuAB73uxO1pBTi81X6Hid21qRSo71ohnZD+k9dkas9UtHaYGsfOREAnCLvK8bfO51orRs1
 UXoevRyDshTVflhdwTXGY3h+Y1FAd7falUwZnY1Q/EcG8yFoSLLQGypyGgWyL1VGsgFYyT1R
 0TYpBlc4pReVFPzM/MnPdzsVJpwkPe9fTgAahwyRoAUCnSWXFXalByCmGbKhzy9+KTSuf9X1
 WinnTaEUi9BVPUPIMueTOYBy747rh3SNkuILa0XOy+PiOLEDFbMEO9tGALXMogRsfPVyC2Io
 o03H5bblH1ivBjWP3C/HXg7dgtRcxDWxPne9qRqSwJ0ClE4QDt4Ua+AnOtJlk4Mt/09q9okN
 0qVAidwoGcTT1WdQelWQhiPsI/SYKs=
IronPort-HdrOrdr: A9a23:Q7cbHagdoPNcZ3AE4gF5dCyaLnBQXrkji2hC6mlwRA09TyX4ra
 CTdZEgviMc5wx9ZJhNo7q90cq7IE80i6Qb3WB5B97LYOCMggeVxe9Zg7ff/w==
X-IronPort-AV: E=Sophos;i="5.90,225,1643691600"; 
   d="scan'208";a="67097998"
Date: Thu, 31 Mar 2022 15:10:00 +0100
From: Anthony PERARD <anthony.perard@citrix.com>
To: Jason Andryuk <jandryuk@gmail.com>
CC: <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, Juergen Gross
	<jgross@suse.com>
Subject: Re: [PATCH] libxl: Don't segfault on soft-reset failure
Message-ID: <YkW2OGC5T4pE7lGW@perard.uk.xensource.com>
References: <20220330181727.30303-1-jandryuk@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <20220330181727.30303-1-jandryuk@gmail.com>

On Wed, Mar 30, 2022 at 02:17:27PM -0400, Jason Andryuk wrote:
> diff --git a/tools/libs/light/libxl_create.c b/tools/libs/light/libxl_create.c
> index 15ed021f41..631caa416d 100644
> --- a/tools/libs/light/libxl_create.c
> +++ b/tools/libs/light/libxl_create.c
> @@ -1970,7 +1970,8 @@ static void domcreate_complete(libxl__egc *egc,
>      libxl_domain_config *const d_config = dcs->guest_config;
>      libxl_domain_config *d_config_saved = &dcs->guest_config_saved;
>  
> -    libxl__xswait_stop(gc, &dcs->console_xswait);
> +    if (dcs->console_xswait.path)
> +        libxl__xswait_stop(gc, &dcs->console_xswait);

libxl__xswait_stop() needs to be called here. It's a function that can
be called several time without ill effect, as long as `console_xswait`
is initialised properly (by calling libxl__xswait_init() like you did
below.

>      libxl__domain_build_state_dispose(&dcs->build_state);
>  
> @@ -2176,6 +2177,10 @@ static int do_domain_soft_reset(libxl_ctx *ctx,
>                                aop_console_how);
>      cdcs->domid_out = &domid_out;
>  
> +    /* Initialize in case we end up in domcreate_complete without calling
> +     * initiate_domain_create. */

That comment isn't needed. This is just part of the initialisation of
`cdcs->dcs`.

> +    libxl__xswait_init(&cdcs->dcs.console_xswait);
> +
>      dom_path = libxl__xs_get_dompath(gc, domid);
>      if (!dom_path) {
>          LOGD(ERROR, domid, "failed to read domain path");


As part of the patch, could you also move the libxl__xswait_init() call
in initiate_domain_create() to do_domain_create()? That would avoid
`console_xswait` been initialised twice, and do_domain_create() is the
function that initialise `dcs` before calling initiate_domain_create().

Thanks,

-- 
Anthony PERARD


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 14:19:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 14:19:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.297000.505759 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZve4-0004wq-1B; Thu, 31 Mar 2022 14:19:28 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 297000.505759; Thu, 31 Mar 2022 14:19:28 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZve3-0004wj-UT; Thu, 31 Mar 2022 14:19:27 +0000
Received: by outflank-mailman (input) for mailman id 297000;
 Thu, 31 Mar 2022 14:19:26 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=kR9h=UK=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nZve2-0004wd-IO
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 14:19:26 +0000
Received: from mail-lf1-x133.google.com (mail-lf1-x133.google.com
 [2a00:1450:4864:20::133])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 915ef5af-b0fd-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 16:19:25 +0200 (CEST)
Received: by mail-lf1-x133.google.com with SMTP id m3so41771483lfj.11
 for <xen-devel@lists.xenproject.org>; Thu, 31 Mar 2022 07:19:25 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 915ef5af-b0fd-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=HMSPM73FMTrJK/ya9lqUErQGcfG51bxLwARlbNHr9fY=;
        b=I6rBTWQ73cN/0cKPwHkFnGK3Eo0RUPTwjSRxsTWb0GHMDceN/jUdhRBrE77p6mLERO
         r7nObjDYU5V1P4Ij7i1AieIe9lDbLjk8EIgfpgl0kpbpiVMcVKR1QmV1v4rGnLTO8AV/
         aqEtvjLcfHG7xVWfqXBKFXHXz1uS3rAG0nFgReJCgkCpAARvZEgpZbyJNA2aXAz1XunC
         2ZvfEVfoFAV0UkB57jj4gfiCJg4ykAOSdbJjl8XNv/4Vg/HssCMJeBf7ZhCyHkapeblc
         HTOkMIP9K/9CgIGxPSrq8VsWMJ76YxyV+b5Iuj/ATASeIDiQVB7kjixXQzSOcpycdOji
         FtGQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=HMSPM73FMTrJK/ya9lqUErQGcfG51bxLwARlbNHr9fY=;
        b=EFi4sY67MgjlJRYArYnQJ7gRWz+Secbe7NKtIVHc490eVlfYRWYPbWBeNOxwVM3mW8
         WmdndEHzIILDrXv2U7kKYYzDM6LSMuBpcl0M14DHG8uk52I8EKLBmMRanq5phbLWny//
         xPAMQmmAADMrxqeR0lwtd9h+RDFtQ1Xw+t6yjPNc6gJjaN+4m8LMkD6BLdHBRbQQkpAi
         e/JUcfYzkqZdMCxGoVcnUJf77LCeElGI7kpcht7zviHXViqQ/19ho4/LzH+OSKDyx2pH
         JaY9UqYjqrH8FIFZsm1DlhYnnLHoCVs8mF6DO0ReCuLuwePHWLnu/3d0gR3bRJ/S/ozL
         /G7g==
X-Gm-Message-State: AOAM532vRVoz4BWHlf3zi5FvE42prSh3hTL1piMvJnlDDezZkeguO+eE
	jjQp14DjVdGT8hXrB6WcyQHHNTxU/cWc4/ILefI=
X-Google-Smtp-Source: ABdhPJzwIgYRIgaXFtongyXSQnAUh/nAeowNgQPw+EeiwSdTjKjHSTKz/UmXswsrs8aFy2xQ86iKJzWVnYStYn41Wx0=
X-Received: by 2002:a19:d61a:0:b0:43f:1a03:21ee with SMTP id
 n26-20020a19d61a000000b0043f1a0321eemr11110801lfg.152.1648736364380; Thu, 31
 Mar 2022 07:19:24 -0700 (PDT)
MIME-Version: 1.0
References: <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz.ref@netscape.net>
 <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz@netscape.net>
 <YkSQIoYhomhNKpYR@perard.uk.xensource.com> <408e5e07-453c-f377-a5b0-c421d002aec5@srcf.net>
 <46a8585e-2a2a-4d12-f221-e57bd157dec6@netscape.net> <CAKf6xpths4SX4wq-j4VhnXZnx0DW=468z3=9FYHso=Wy1i_Rsg@mail.gmail.com>
 <da62d06d-fd18-a313-9e69-2a4581e97c1a@netscape.net>
In-Reply-To: <da62d06d-fd18-a313-9e69-2a4581e97c1a@netscape.net>
From: Jason Andryuk <jandryuk@gmail.com>
Date: Thu, 31 Mar 2022 10:19:12 -0400
Message-ID: <CAKf6xptZ9g79MphwYPAGq6ATBtCrW+pCd5+NYJPdFniW+tFzPg@mail.gmail.com>
Subject: Re: [XEN PATCH] tools/libs/light/libxl_pci.c: explicitly grant access
 to Intel IGD opregion
To: Chuck Zmudzinski <brchuckz@netscape.net>
Cc: Andrew Cooper <amc96@srcf.net>, Anthony PERARD <anthony.perard@citrix.com>, 
	xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, 
	Juergen Gross <jgross@suse.com>, Jan Beulich <jbeulich@suse.com>
Content-Type: text/plain; charset="UTF-8"

On Thu, Mar 31, 2022 at 10:05 AM Chuck Zmudzinski <brchuckz@netscape.net> wrote:
>
> On 3/31/2022 8:29 AM, Jason Andryuk wrote:
> > On Wed, Mar 30, 2022 at 11:54 PM Chuck Zmudzinski <brchuckz@netscape.net> wrote:
> >> On 3/30/22 1:27 PM, Andrew Cooper wrote:
> >>>
> >>> This has been discussed before, but noone's done anything about it.
> >>> It's a massive layering violation for QEMU to issue
> >>> xc_domain_iomem_permission()/etc hypercalls.
> >>>
> >>> It should be the toolstack, and only the toolstack, which makes
> >>> permissions hypercalls, which in turn will fix a slew of "QEMU doesn't
> >>> work when it doesn't have dom0 superpowers" bugs with stubdomains.
> >> How much say does the Xen project have over the code
> >> in Qemu under hw/xen? I would not be against having libxl
> >> do the permissions hypercalls in this case instead of Qemu
> >> doing it. My test with Qemu traditional and this patch proves
> >> the permission can be granted by libxl instead of the device
> >> model.
> > Qubes patches libxl and QEMU, and they move the hypercalls to the
> > toolstack.  They are using linux stubdoms, and I think it works for
> > them.
>
> That still doesn't answer my question - will the Qemu upstream
> accept the patches that move the hypercalls to the toolstack? If
> not, we have to live with what we have now, which is that the
> hypercalls are done in Qemu.

Xen-associated people maintain hw/xen code in QEMU, so yes it could be accepted.

Maybe it would need to be backwards compatible to have libxl check the
QEMU version to decide who makes the hypercall?  Unless it is broken
today, in which case just make it work.

Regards,
Jason


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 14:20:11 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 14:20:11 +0000
Received: from list by lists.xenproject.org with outflank-mailman.297003.505769 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZvek-0006Dj-AG; Thu, 31 Mar 2022 14:20:10 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 297003.505769; Thu, 31 Mar 2022 14:20:10 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZvek-0006Da-6k; Thu, 31 Mar 2022 14:20:10 +0000
Received: by outflank-mailman (input) for mailman id 297003;
 Thu, 31 Mar 2022 14:20:08 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=kR9h=UK=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nZvei-00069S-TC
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 14:20:08 +0000
Received: from mail-lf1-x12f.google.com (mail-lf1-x12f.google.com
 [2a00:1450:4864:20::12f])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id aaad42d5-b0fd-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 16:20:08 +0200 (CEST)
Received: by mail-lf1-x12f.google.com with SMTP id p10so35910812lfa.12
 for <xen-devel@lists.xenproject.org>; Thu, 31 Mar 2022 07:20:07 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: aaad42d5-b0fd-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=p3bJsFQzV0nmaX1BNLZN1J7nl6h9FjtFUiXHa6u29nY=;
        b=a3zbjfN+I2ZT5SJAED3UP+s0WbtS7f0L4RH3CHrbES0kiCdc/uKv8VrZBcbhM6m8N+
         6uoMADXaZG4MBBxV+fqm8MQkz3lHAkhHpW7gFU66beyGMLCJMcV8Ex4zEXsfLfSwFdRs
         /NZjdXwI5mpqwlUP08g3m8Gj3P3+kdOimLRAZjfde4w6UyOmwvnLcgcdwhfDLYxLQKkh
         CAu2NepdtWKUhBjBiPSoUGEb54/MhAlnaTc/RNka19jlXgp6YoSTFk+AGy/n4LgQz9Dx
         1tt7mxrnjRgG3UpVG0yWhPG1aYF7TeiUoaw2pPC1iSvfRVRGWi+fqzNtM2NPkt7o6ESl
         t1Vg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=p3bJsFQzV0nmaX1BNLZN1J7nl6h9FjtFUiXHa6u29nY=;
        b=iIprTrNI231Rs67SUYPPf/V+eHuAKjuUX6453exQA9BPs/YYZ15QuPi3QbHRCQGnKm
         EBQ7MkeR3GhDQ0IKtWwwO0qLbOJASD1IlkYJ02kWltoKIAsGacUKe3cx9RvjMaDbI5cw
         pXU1TFrLZf+3WrVnRvMcpE4YudoWm8aS2XO0+Pintzrw43vudPdps1mr5ZQIcO9vnrSQ
         jT1UzI6+5K4Ptm2Qmwnk+hIKVhjRkUdgJm+qu+8DIRXryLuM9l5hGej2bmeDZE6ozj5n
         EIWObcZh3rjdQ94uFFzYYdb5enusjvNvEXyRbW5Edn0iOiSN52TmtulrYDIkFWek6GVT
         i+jA==
X-Gm-Message-State: AOAM532kq4N5woUNAPllIC0ZPVFrnnLqS1hH5MwwrVJgc2H7jvaJ8TMj
	feMTCKvEshWDfwnljZ/wBQ5gU2uhfXRAZlgvzao=
X-Google-Smtp-Source: ABdhPJwRWFbfHmzCFgAthzyK5ieGQdMPZqMifbgJFLIWHrnyWyZ5KmjzSR6ZT9rlFnGPd2cGKsEaVC7rwr0JPQzpD1k=
X-Received: by 2002:ac2:5504:0:b0:44a:2117:e6bb with SMTP id
 j4-20020ac25504000000b0044a2117e6bbmr10880850lfk.388.1648736407568; Thu, 31
 Mar 2022 07:20:07 -0700 (PDT)
MIME-Version: 1.0
References: <20220330181658.30209-1-jandryuk@gmail.com> <YkWrim6+yw3LBzPn@perard.uk.xensource.com>
In-Reply-To: <YkWrim6+yw3LBzPn@perard.uk.xensource.com>
From: Jason Andryuk <jandryuk@gmail.com>
Date: Thu, 31 Mar 2022 10:19:56 -0400
Message-ID: <CAKf6xpuGGX9TNV6s0UhCYXVcx-WNR7KL1DsOFruj=wUpNbigUA@mail.gmail.com>
Subject: Re: [PATCH] libxl: Always set ao for qmp_proxy_spawn_outcome
To: Anthony PERARD <anthony.perard@citrix.com>
Cc: xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, 
	Juergen Gross <jgross@suse.com>
Content-Type: text/plain; charset="UTF-8"

On Thu, Mar 31, 2022 at 9:24 AM Anthony PERARD
<anthony.perard@citrix.com> wrote:
>
> On Wed, Mar 30, 2022 at 02:16:58PM -0400, Jason Andryuk wrote:
> > diff --git a/tools/libs/light/libxl_dm.c b/tools/libs/light/libxl_dm.c
> > index 9a8ddbe188..59a8dcf3a9 100644
> > --- a/tools/libs/light/libxl_dm.c
> > +++ b/tools/libs/light/libxl_dm.c
> > @@ -2468,6 +2468,9 @@ static void spawn_stub_launch_dm(libxl__egc *egc,
> >      uint32_t dm_domid = sdss->pvqemu.guest_domid;
> >      int need_qemu;
> >
> > +    /* Set for out label through qmp_proxy_spawn_outcome(). */
> > +    sdss->qmp_proxy_spawn.ao = ao;
>
> I don't think that's correct. I feels like `sdss->qmp_proxy_spawn`
> doesn't need to be initialised before calling spawn_qmp_proxy().
>
> Also `qmp_proxy_spawn.ao` only need to be set before calling
> libxl__spawn_spawn(), so at the same time as the rest of the
> initialisation of `qmp_proxy_spawn` in spawn_qmp_proxy().
>
>
> Next, about the uninitialized `ao` field:
> - qmp_proxy_spawn_outcome() shouldn't use `qmp_proxy_spawn.ao`, but
>   instead it should use the one available in `sdss`, that is
>   `sdss->dm.spawn.ao` (The one that libxl__spawn_stub_dm() or
>   spawn_stub_launch_dm() is using).
> - And spawn_qmp_proxy() should also use `sdss->dm.spawn.ao` for
>   STATE_AO_GC() as I don't think spawn_qmp_proxy() can expect
>   `qmp_proxy_spawn` to be initialised as that's the function that
>   initialise it.

That all sounds good.  Thanks, Anthony.

-Jason


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 14:22:32 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 14:22:32 +0000
Received: from list by lists.xenproject.org with outflank-mailman.297008.505780 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZvh1-0006sn-Mf; Thu, 31 Mar 2022 14:22:31 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 297008.505780; Thu, 31 Mar 2022 14:22:31 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZvh1-0006sg-JL; Thu, 31 Mar 2022 14:22:31 +0000
Received: by outflank-mailman (input) for mailman id 297008;
 Thu, 31 Mar 2022 14:22:30 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=lCIW=UK=citrix.com=prvs=082fe6e5b=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nZvh0-0006sY-Gg
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 14:22:30 +0000
Received: from esa4.hc3370-68.iphmx.com (esa4.hc3370-68.iphmx.com
 [216.71.155.144]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id fdd800a4-b0fd-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 16:22:29 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: fdd800a4-b0fd-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648736549;
  h=date:from:to:cc:subject:message-id:references:
   mime-version:in-reply-to;
  bh=DxBidS46ZaAUMJQiyfYz3anhmK0oiE1u429KTk3QzfE=;
  b=L1nfoQaBtqo8gyTwD0rQ4d/TTm+6eqbwTBbarvWqqUBJj8MAXEWluUEU
   6LZ//niAo49uVmkMD7CJCIP6hrej56XXGebbT7CIkiVAVwPJFTY0DtsrE
   etO1LK5N7O3e5t22i2fU1ZC/yW/vcypfuQ+RPyB4ndDr4LDod3fE+PECv
   Q=;
Authentication-Results: esa4.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 70053304
X-Ironport-Server: esa4.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:s61phajQri2RpI5UR04JmWvpX161ZBAKZh0ujC45NGQN5FlHY01je
 htvX2nUPPqJYmb1eIhwadzlpBwP6MeBzoNnT1Y+ryoxFi8b9cadCdqndUqhZCn6wu8v7a5EA
 2fyTvGacajYm1eF/k/F3oDJ9CU6jefSLlbFILas1hpZHGeIcw98z0M78wIFqtQw24LhWFjU4
 YmaT/D3YzdJ5RYlagr41IrbwP9flKyaVOQw5wFWiVhj5TcyplFNZH4tDfjZw0jQG+G4KtWSV
 efbpIxVy0uCl/sb5nFJpZ6gGqECaua60QFjERO6UYD66vRJjnRaPqrWqJPwwKqY4tmEt4kZ9
 TlDiXC/YTsSPJHSybwBaTR7PnpMEaxc1pnIM3fq5KR/z2WeG5ft6/BnDUVwNowE4OdnR2pJ8
 JT0KhhUMErF3bjvhuvmFK883azPL+GyVG8bknhm0THeC+dgWZ3ZSr/GzdRZwC0xloZFGvO2i
 88xNmI3MU+bO0En1lE/I64Cn/v2uCbDUxJ4qHiUpqgepEfWw1kkuFTqGIWMIYHbLSlPpW6Ho
 krW8mK/BQsVXPSPxDzA/n+yi+vnmSLgRJlUBLC+7uRtglCY2ioUEhJ+fVmyp/Wjm1O9c91aI
 k0QvCEpqMAPGFeDF4enGUfi+Tjd40BaC4E4//AGBB+l9pHW3xjIXnQ+Yx1sM+4KtdUYYzM42
 Qrc9z/2PgBHvLqQQHOb076bqzKuJCQYRVM/iT84oRgtuIe6/txq5v7bZpM6SfPu0IWpcd3l6
 2rSxBXSkYn/miLiO0+T2VncywyhqZHSJuLezlWGBzn1hu+ViWPMWmBJ1bQ5xasYRGp6ZgPY1
 JThpyR4xLpUZX1qvHbRKNjh5Jnzu5643MT02DaD5aUJ+TW34GKEdotN+jx4L0oBGp9aJW+3P
 hKM51kMu8I70J6WgUlfOdjZ5yMCl/WIKDgYfqqMMoomjmZZKmdrAx2ClWbPhjuwwSDAYIk0O
 IuBcNbEMJrpIf8P8dZCfM9EieVD7nlnnQv7HMmnpzz6gev2TCPEEt8tbQrRBt3VGYvZ+W05B
 f4EbJDUo/ieOcWjChTqHXk7dg5SdyFhVcGr86S6tIere2JbJY3oMNeJqZtJRmCvt/o9ejvgl
 p1lZnJl9Q==
IronPort-HdrOrdr: A9a23:3FLT1alN8eJuDHhFwe0Nkgt3QmPpDfIs3DAbv31ZSRFFG/Fxl6
 iV8sjz8SWE7Ar5OUtQ/OxoV5PsfZqxz/JICMwqTNCftWrdyQmVxeNZjbcKqgeIc0aVygce79
 YCT0EXMqyXMbEQt6fHCWeDfOod/A==
X-IronPort-AV: E=Sophos;i="5.90,225,1643691600"; 
   d="scan'208";a="70053304"
Date: Thu, 31 Mar 2022 15:22:24 +0100
From: Anthony PERARD <anthony.perard@citrix.com>
To: Jason Andryuk <jandryuk@gmail.com>
CC: <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>
Subject: Re: [PATCH] xl: Fix global pci options
Message-ID: <YkW5IEbAyumopQsG@perard.uk.xensource.com>
References: <20220330181741.30334-1-jandryuk@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <20220330181741.30334-1-jandryuk@gmail.com>

On Wed, Mar 30, 2022 at 02:17:41PM -0400, Jason Andryuk wrote:
> commit babde47a3fed "introduce a 'passthrough' configuration option to
> xl.cfg..." moved the pci list parsing ahead of the global pci option
> parsing.  This broke the global pci configuration options since they
> need to be set first so that looping over the pci devices assigns their
> values.
> 
> Move the global pci options ahead of the pci list to restore their
> function.
> 
> Signed-off-by: Jason Andryuk <jandryuk@gmail.com>

Acked-by: Anthony PERARD <anthony.perard@citrix.com>

Thanks,

-- 
Anthony PERARD


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 14:36:18 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 14:36:18 +0000
Received: from list by lists.xenproject.org with outflank-mailman.297015.505797 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZvuD-0008Pz-U6; Thu, 31 Mar 2022 14:36:09 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 297015.505797; Thu, 31 Mar 2022 14:36:09 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZvuD-0008Ps-RE; Thu, 31 Mar 2022 14:36:09 +0000
Received: by outflank-mailman (input) for mailman id 297015;
 Thu, 31 Mar 2022 14:36:09 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=lCIW=UK=citrix.com=prvs=082fe6e5b=anthony.perard@srs-se1.protection.inumbo.net>)
 id 1nZvuD-0008Pl-Cn
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 14:36:09 +0000
Received: from esa1.hc3370-68.iphmx.com (esa1.hc3370-68.iphmx.com
 [216.71.145.142]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id e4b5ed1a-b0ff-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 16:36:06 +0200 (CEST)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e4b5ed1a-b0ff-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
  d=citrix.com; s=securemail; t=1648737366;
  h=date:from:to:cc:subject:message-id:references:
   mime-version:in-reply-to;
  bh=s21ZrJIYWGkZietPZDtcq5HY/HgyfJiljyr20umAk8Q=;
  b=WH5ciLwzDFs4tlUH7bsOMsQdwNRnXZUUi+E1ESCZUrk9Sif37OCu6htO
   LBImCUX/0GacP42PrrBohia5ctNRVffWzC8tsPLZfSvjZpQDMGzgQ19j+
   3U2EQbbeGltKnn3yRPdjxFG1Y/ariycq7O71GypOklC88igwfEq2Lvb42
   c=;
Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
X-SBRS: 5.1
X-MesageID: 68069126
X-Ironport-Server: esa1.hc3370-68.iphmx.com
X-Remote-IP: 162.221.156.83
X-Policy: $RELAYED
IronPort-Data: A9a23:8LVUI6o0xZVLYoofrgSeMLLS5h9eBmLCZRIvgKrLsJaIsI4StFCzt
 garIBnVOffZMDD9eIp0aNu/pE4O65XTxoQ2GgdrrHw3FHhE95uZCYyVIHmrMnLJJKUvbq7GA
 +byyDXkBJppJpMJjk71atANlVEliefQAOCU5NfsYkidfyc9IMsaoU8lyrZRbrJA24DjWVvW4
 oqq+aUzBXf+s9JKGjNMg068gEsHUMTa4Fv0aXRnOJinFHeH/5UkJMp3yZOZdhMUcaENdgKOf
 M7RzanRw4/s10xF5uVJMFrMWhZirrb6ZWBig5fNMkSoqkAqSicais7XOBeAAKv+Zvrgc91Zk
 b1wWZKMpQgBY/P9wfYsTwBkEg5GPa599/zVHGaBmJnGp6HGWyOEL/RGCUg3OcsT+/ptAHEI/
 vsdQNwPRknd3aTsmuv9E7QywJR4RCXoFNp3VnVIxDfFDfEgUNbbTr/D/9Nw1zYsnMFeW/3ZY
 qL1bBIxPEyeMkQVZD/7Dro33+eLt0HbSAZotV2P9YsbuknhyU9Yhe2F3N39JYXRGJQ9clyjj
 n3C13T0BFcdLtP34QSC9nWgl+rehxTRUYgZFKC73vNyiVjVzWsWYDUGWF3+rfSnh0qWX9NEN
 1dS6icotbI19kGgUp/6RRLQiHyOswMYWtFQO/Yn8wzLwa3Riy6bG2wFQzhpeNEg8sgsSlQCz
 USVltnkAThutry9Sn+H8LqQ6zSoNkA9J2IYeTUNSwdD5tD5uZwylTrGVNMlG6mw5uAZAhmpn
 WrM9nJnwexO04hbjM1X4GwrnRrx+KmQXD8p/znWcVql7Th2J5yYebKBvA2zAel7EK6VSVyIv
 X4hkseY7fwTAZzlqBFhUNnhD5nyua/bbWS0bUpHWsB4qm/zoyLLkZV4umkWGat/DioTldYFi
 mf3sBgZ2pJcNWDCgURfM9PoUJRCIUQN+L3YuhHogjhmP8AZmOyvpngGiausM4bFyhJEfUYXY
 8vzTCpUJSxGYZmLNRLvLwvn7Zclxzol2UTYTo3hwhKs3NK2PSDJGelbbQTQNL1msctoRTk5F
 f4FbaNmLD0FDYXDjtT/q9ZPfTjm01BlbXwJlyCnXrHaeVc3cI3QI/TQ3akga+RYc1d9zY/1E
 oWGchYAkjLX3CSfQS3TMywLQO6/DP5X8CNgVQRxbAnA5pTWSdv2hEvpX8BsJudPGS0K5aMcc
 sTpjO3bXKwVE26XqmlFBXQ/xaQ7HCmWacu1F3LNSFACk1RIHVahFgPMFuc3yBQzMw==
IronPort-HdrOrdr: A9a23:Xwtx+6D/yhXDK2XlHems55DYdb4zR+YMi2TC1yhKJyC9Vvbo8/
 xG/c5rsCMc5wx9ZJhNo7y90ey7MBThHP1OkOss1NWZPDUO0VHAROoJ0WKh+UyCJ8SXzJ866U
 4KSclD4bPLYmRHsQ==
X-IronPort-AV: E=Sophos;i="5.90,225,1643691600"; 
   d="scan'208";a="68069126"
Date: Thu, 31 Mar 2022 15:35:54 +0100
From: Anthony PERARD <anthony.perard@citrix.com>
To: Julien Grall <julien@xen.org>, Stefano Stabellini
	<sstabellini@kernel.org>, Bertrand Marquis <bertrand.marquis@arm.com>
CC: Jan Beulich <jbeulich@suse.com>, Andrew Cooper
	<andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>, "Wei
 Liu" <wl@xen.org>, Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, Roger Pau
 =?iso-8859-1?Q?Monn=E9?= <roger.pau@citrix.com>,
	<xen-devel@lists.xenproject.org>
Subject: Ping: [XEN PATCH v10 1/7] build: grab common EFI source files in
 arch specific dir
Message-ID: <YkW8SiT9X4yxFwUG@perard.uk.xensource.com>
References: <20220322112238.1117737-1-anthony.perard@citrix.com>
 <20220322112238.1117737-2-anthony.perard@citrix.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <20220322112238.1117737-2-anthony.perard@citrix.com>

Hi Julien, Stefano, Bertrand,

Could I get a ack on this patch and the next one
"[XEN PATCH v10 2/7] build: replace $(BASEDIR) by $(objtree)" for the
Arm part?

Cheers,

On Tue, Mar 22, 2022 at 11:22:32AM +0000, Anthony PERARD wrote:
> Rather than preparing the efi source file, we will make the symbolic
> link as needed from the build location.
> 
> The `ln` command is run every time to allow to update the link in case
> the source tree change location.
> 
> This patch also introduce "efi-common.mk" which allow to reuse the
> common make instructions without having to duplicate them into each
> arch.
> 
> And now that we have a list of common source file, we can start to
> remove the links to the source files on clean.
> 
> Signed-off-by: Anthony PERARD <anthony.perard@citrix.com>
> Acked-by: Jan Beulich <jbeulich@suse.com>

-- 
Anthony PERARD


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 15:18:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 15:18:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.297022.505809 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZwZ4-0004AY-54; Thu, 31 Mar 2022 15:18:22 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 297022.505809; Thu, 31 Mar 2022 15:18:22 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZwZ4-0004AR-0R; Thu, 31 Mar 2022 15:18:22 +0000
Received: by outflank-mailman (input) for mailman id 297022;
 Thu, 31 Mar 2022 15:18:21 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=Dd35=UK=m5p.com=ehem@srs-se1.protection.inumbo.net>)
 id 1nZwZ3-0004AL-7r
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 15:18:21 +0000
Received: from mailhost.m5p.com (mailhost.m5p.com [74.104.188.4])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id ca29af43-b105-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 17:18:17 +0200 (CEST)
Received: from m5p.com (mailhost.m5p.com [IPv6:2001:470:1f07:15ff:0:0:0:f7])
 by mailhost.m5p.com (8.16.1/8.15.2) with ESMTPS id 22VFI13M076536
 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO);
 Thu, 31 Mar 2022 11:18:07 -0400 (EDT) (envelope-from ehem@m5p.com)
Received: (from ehem@localhost)
 by m5p.com (8.16.1/8.15.2/Submit) id 22VFI1kM076535;
 Thu, 31 Mar 2022 08:18:01 -0700 (PDT) (envelope-from ehem)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ca29af43-b105-11ec-8fbc-03012f2f19d4
Date: Thu, 31 Mar 2022 08:18:01 -0700
From: Elliott Mitchell <ehem+xen@m5p.com>
To: Julien Grall <julien@xen.org>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
        xen-devel@lists.xenproject.org, Jan Beulich <jbeulich@suse.com>
Subject: Re: OS Headers hypercall.h/hypervisor.h
Message-ID: <YkXGKWj7p2rrkH9K@mattapan.m5p.com>
References: <Yj+ekdLdRa9U7dfa@mattapan.m5p.com>
 <alpine.DEB.2.22.394.2203281523230.2910984@ubuntu-linux-20-04-desktop>
 <c999faa3-ded7-64af-7bf1-f6b8e5620425@suse.com>
 <YkUAlWH6imVV9D00@mattapan.m5p.com>
 <701a0bdc-a8d3-06c3-7e40-e741dfa45361@xen.org>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="SJ7EfckpMTXlr9lj"
Content-Disposition: inline
In-Reply-To: <701a0bdc-a8d3-06c3-7e40-e741dfa45361@xen.org>
X-Spam-Status: No, score=0.4 required=10.0 tests=KHOP_HELO_FCRDNS autolearn=no
	autolearn_force=no version=3.4.5
X-Spam-Checker-Version: SpamAssassin 3.4.5 (2021-03-20) on mattapan.m5p.com


--SJ7EfckpMTXlr9lj
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

On Thu, Mar 31, 2022 at 09:44:06AM +0100, Julien Grall wrote:
> 
> On 31/03/2022 02:15, Elliott Mitchell wrote:
> > On Tue, Mar 29, 2022 at 08:27:24AM +0200, Jan Beulich wrote:
> >> On 29.03.2022 00:25, Stefano Stabellini wrote:
> >>> On Sat, 26 Mar 2022, Elliott Mitchell wrote:
> >>>> The hypercalls implementation for Linux and FreeBSD have two key headers,
> >>>> hypercall.h and hypervisor.h.  I'm curious why the implementations for
> >>>> x86 and ARM* are so distinct.
> >>>>
> >>>> I found it fairly straightforward to implement ARM* versions of the x86
> >>>> _hypercall#() macros.  Once that is done, most of the wrappers in the x86
> >>>> hypercall.h can be moved to a shared hypervisor.h header.
> >>>>
> >>>> Why does Xen/ARM on Linux still have hypercall.S when merging the
> >>>> headers should reduce maintainance?
> >>>>
> >>>> Was GCC extended inline assembly language for ARM* thought too awful?
> >>>>
> >>>> I'm also curious why these headers are part of the Linux kernel, instead
> >>>> of being maintained by the Xen Project?
> >>>
> >>> I would have to dig through ancient archives to give you a full answer
> >>> but the reason was that the asm inline on ARM didn't provide enough
> >>> guarantees on ordering and registers it would use and clobber.
> >>
> >> While there may be ordering issues (albeit most ought to be taken care
> >> of by marking the asm() volatile and having it have a memory clobber),
> >> registers used / clobbered ought to always be expressable by asm() -
> >> if not by constraints covering just a single register (such frequently
> >> simply don't exist), then by using register variables tied to a
> >> particular register. Of course in all of this there's an assumption of
> >> no bugs in this area in the compilers claimed as being supported ...
> > 
> > I'm merely been working with recent versions of Clang on FreeBSD, but
> > I've got something which appears to work.
> > 
> > I would be somewhat hopeful GCC might have fewer bugs on ARM as
> > registers aren't so precious.  Yet that could well be a minefield.
> 
> Linux and Xen have already some code heavily using inline assembly for 
> the SMCCC v1.1 helpers. So, in theory, it should be possible to convert 
> the hypercall to use inline assembly helpers.
> 
> Unlike SMCCC v1.1, the hypercalls are following the AAPCS. So by using 
> the assembly wrapper we don't have to worry on what to save as the 
> compiler will automatically know what to do. Looking at 
> xen/include/public/arch-arm.h, we may be able to reduce the numbers of 
> registers to preserve. So it would be more interesting to switch to 
> inline assembly to reduce the number of instructions.
> 
> That said, we also need to be mindful of straigh-line speculation with 
> HVC instruction. With the inline version, the speculation barrier (sb or 
> dsb/isb) would need to be architecturally executed. With the assembly 
> wrapper, I believe we could only speculatively execute it by adding 
> after the ret.
> 
> Note that Linux doesn't have the speculation barrier yet. In in two mind 
> whether it should be added. In one hand, it would be good to make the 
> hypercalls safe by default (IOW the caller doesn't need to check for 
> gadget after). On the other hand, AFAIK the path would only be reachable 
> with root privileges.
> 
> That said, the security posture may be different on other OS. So if we 
> intend to share the header with other OS, then the current approach 
> might be better.

Guess I should simply send out what I've got right now.

The idea is all the HYPERVISOR_*() wrappers which both Linux and FreeBSD
have in the architecture hypercall.h could be moved to hypervisor.h.
This generates _hypercall#() wrapper macros which match the x86
_hypercall#() inline functions.  The actual underlying inline functions
are __hypercall_xen_#().

The underlying inline functions place the arguments first and op code
last.  The reason is ARM places the arguments in r0-r4/x0-x4 and the
inline function could end up emitting a bunch of instructions shuffling
these.  With the op code last the compiler may emit a move instruction
for the op code, but the arguments will pass straight through.

The attached patch is marked as FreeBSD's license, because I've been
trying to get FreeBSD running on Xen/ARM.  I'm fine with it under Xen's
license or GPL 2.0+.  This has been tested and appears to work, but I
won't be surprised if it doesn't match what people want.


-- 
(\___(\___(\______          --=> 8-) EHM <=--          ______/)___/)___/)
 \BS (    |         ehem+sigmsg@m5p.com  PGP 87145445         |    )   /
  \_CS\   |  _____  -O #include <stddisclaimer.h> O-   _____  |   /  _/
8A19\___\_|_/58D2 7E3D DDF4 7BA6 <-PGP-> 41D1 B375 37D0 8714\_|_/___/5445



--SJ7EfckpMTXlr9lj
Content-Type: text/x-diff; charset=us-ascii
Content-Disposition: attachment;
	filename="0001-xen-arm64-implement-aarch64-Xen-hypercall-header.patch"

>From 8ad5602f26a0f7b9a04cbda33330ba8004d8fcc1 Mon Sep 17 00:00:00 2001
From: Elliott Mitchell <ehem+xen@m5p.com>
Date: Mon, 7 Mar 2022 18:26:31 -0800
Subject: [PATCH] xen/arm64: implement aarch64 Xen hypercall header
To: xen-devel@lists.xenproject.org

Match the i386/AMD64 headers in doing inline functions for the Xen
hypervisor calls.  This has been heavily inspired by work done by
Julien Grall and Stefano Stabellini.

---
 sys/arm64/include/xen/hypercall.h | 148 ++++++++++++++++++++++++++++++
 1 file changed, 148 insertions(+)
 create mode 100644 sys/arm64/include/xen/hypercall.h

diff --git a/sys/arm64/include/xen/hypercall.h b/sys/arm64/include/xen/hypercall.h
new file mode 100644
index 00000000000..b8e51611f26
--- /dev/null
+++ b/arm64/include/xen/hypercall.h
@@ -0,0 +1,148 @@
+/*
+ * SPDX-License-Identifier: GPL-2.0+ OR BSD-2-Clause-FreeBSD
+ *
+ * Copyright (c) 2022 Elliott Mitchell
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in the
+ *    documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ */
+
+#ifndef __MACHINE_ARM64_XEN_HYPERCALL_H__
+#define __MACHINE_ARM64_XEN_HYPERCALL_H__
+__FBSDID("$FreeBSD$");
+
+#ifndef __XEN_HYPERVISOR_H__
+# error "please don't include this file directly"
+#endif
+
+/*
+ * See the Xen contrib header: xen/arch-arm.h for details on Xen's
+ * hypercall calling conventions.
+ *
+ * The hypercall number is passed in r12/x16.
+ *
+ * Input parameters are in r0-r4/x0-x4 as appropriate to the number of
+ * arguments.  Input registers are clobbered.
+ *
+ * Return is in r0/x0.
+ *
+ * The hypercall tag for Xen is 0x0EA1.
+ */
+
+#define	hypercallf(NUM, ARGS, REGVAR, REGASM)	\
+	static inline long						\
+	__hypercall_xen_##NUM(ARGS long op)				\
+	{								\
+		register long _op __asm__(OPREG) = op;			\
+		REGVAR							\
+		__asm__ volatile (					\
+			"hvc #0x0EA1;\n"				\
+			: "+r" (_op)REGASM				\
+			: /* clobbered inputs, are outputs, really */	\
+			: "memory"					\
+		);							\
+		return (_arg0);						\
+	}
+
+#ifndef __ILP32__
+#define	OPREG	"x16"
+#define	REGPRE	"x"
+#else
+#define	OPREG	"r12"
+#define	REGPRE	"r"
+#endif
+
+#define	COMMAS(...)	__VA_ARGS__
+#define	ARG(n)	long arg##n,
+#define	VAR(n)	register long _arg##n __asm__(REGPRE __STRING(n)) = arg##n;
+#define	REG(n)	, "+r" (_arg##n)
+
+
+#define	hypercall0(NUM, ARGS, REGVAR, REGASM)	\
+	hypercallf(NUM,, register long _arg0 __asm__(REGPRE"0");,	\
+		COMMAS(, "=r" (_arg0)))
+
+#define	hypercall1(NUM, ARGS, REGVAR, REGASM)	\
+	hypercallf(NUM, COMMAS(ARG(0)ARGS), VAR(0)REGVAR, COMMAS(REG(0)REGASM))
+
+#define	hypercall2(NUM, ARGS, REGVAR, REGASM)	\
+	hypercall1(NUM, COMMAS(ARG(1)ARGS), VAR(1)REGVAR, COMMAS(REG(1)REGASM))
+
+#define	hypercall3(NUM, ARGS, REGVAR, REGASM)	\
+	hypercall2(NUM, COMMAS(ARG(2)ARGS), VAR(2)REGVAR, COMMAS(REG(2)REGASM))
+
+#define	hypercall4(NUM, ARGS, REGVAR, REGASM)	\
+	hypercall3(NUM, COMMAS(ARG(3)ARGS), VAR(3)REGVAR, COMMAS(REG(3)REGASM))
+
+#define	hypercall5(NUM, ARGS, REGVAR, REGASM)	\
+	hypercall4(NUM, COMMAS(ARG(4)ARGS), VAR(4)REGVAR, COMMAS(REG(4)REGASM))
+
+#define	hypercall(NUM)	hypercall##NUM(NUM,,,)
+
+/* the actual inline function definitions */
+
+hypercall(0)
+hypercall(1)
+hypercall(2)
+hypercall(3)
+hypercall(4)
+hypercall(5)
+
+/* cleanup */
+
+#undef	hypercallf
+#undef	OPREG
+#undef	REGPRE
+#undef	COMMAS
+#undef	ARG
+#undef	VAR
+#undef	REG
+
+#undef	hypercall0
+#undef	hypercall1
+#undef	hypercall2
+#undef	hypercall3
+#undef	hypercall4
+#undef	hypercall
+
+/* the wrappers expected by hypervisor.h */
+
+#define	_hypercall0(type, name)	\
+	(type)__hypercall_xen_0(__HYPERVISOR_##name)
+#define	_hypercall1(type, name, arg0)	\
+	(type)__hypercall_xen_1((long)(arg0), __HYPERVISOR_##name)
+#define	_hypercall2(type, name, arg0, arg1)	\
+	(type)__hypercall_xen_2((long)(arg0), (long)(arg1),	\
+		__HYPERVISOR_##name)
+#define	_hypercall3(type, name, arg0, arg1, arg2)	\
+	(type)__hypercall_xen_3((long)(arg0), (long)(arg1),	\
+		(long)(arg2), __HYPERVISOR_##name)
+#define	_hypercall4(type, name, arg0, arg1, arg2, arg3)	\
+	(type)__hypercall_xen_4((long)(arg0), (long)(arg1),	\
+		(long)(arg2), (long)(arg3), __HYPERVISOR_##name)
+#define	_hypercall5(type, name, arg0, arg1, arg2, arg3, arg4)	\
+	(type)__hypercall_xen_5((long)(arg0), (long)(arg1),	\
+		(long)(arg2), (long)(arg3), (long)(arg4), __HYPERVISOR_##name)
+
+#define	privcmd_hypercall(op, arg0, arg1, arg2, arg3, arg4)	\
+	(int)__hypercall_xen_5((arg0), (arg1), (arg2), (arg3), (arg4), (op))
+
+#endif /* __MACHINE_ARM64_XEN_HYPERCALL_H__ */
-- 
2.30.2


--SJ7EfckpMTXlr9lj--


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 16:11:38 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 16:11:38 +0000
Received: from list by lists.xenproject.org with outflank-mailman.297029.505826 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZxOW-00029c-9v; Thu, 31 Mar 2022 16:11:32 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 297029.505826; Thu, 31 Mar 2022 16:11:32 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZxOW-00029V-6e; Thu, 31 Mar 2022 16:11:32 +0000
Received: by outflank-mailman (input) for mailman id 297029;
 Thu, 31 Mar 2022 16:11:30 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZxOU-00029L-Ni; Thu, 31 Mar 2022 16:11:30 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZxOU-0001Qn-Jj; Thu, 31 Mar 2022 16:11:30 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1nZxOU-0003X2-6j; Thu, 31 Mar 2022 16:11:30 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1nZxOU-0006n8-6F; Thu, 31 Mar 2022 16:11:30 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=kJ7jd0LXsO5avzdWM2bCsJvoysKfIYhzdh2eBE/OSLU=; b=eRY04+bs+F5Ad50CrD5SWBJe8u
	vHJjCmRBfOb5qvCgnNkpJvJMtBqfpL21zjhGPgV0sRlU0uHBKpsnvKwwOqPIiuHzUuJ9NioVnXPtt
	2c+ci1CIRw4hmuzpVqll/SeqZ+5zbmTZSy2SKzdzWz1fmQD/P9oXoXaCZRZXcmZogDaQ=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-169028-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.14-testing test] 169028: regressions - FAIL
X-Osstest-Failures:
    xen-4.14-testing:test-amd64-amd64-livepatch:livepatch-run:fail:regression
    xen-4.14-testing:test-amd64-i386-livepatch:livepatch-run:fail:regression
    xen-4.14-testing:test-amd64-amd64-xl-qemut-debianhvm-i386-xsm:debian-hvm-install:fail:regression
    xen-4.14-testing:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.14-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=1e595d9c2b8608bcef48d6a69cc2f6135780bcc0
X-Osstest-Versions-That:
    xen=ca304edd3ba8c19211107fd2e898249987557ce5
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 31 Mar 2022 16:11:30 +0000

flight 169028 xen-4.14-testing real [real]
flight 169071 xen-4.14-testing real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/169028/
http://logs.test-lab.xenproject.org/osstest/logs/169071/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-livepatch   13 livepatch-run            fail REGR. vs. 168506
 test-amd64-i386-livepatch    13 livepatch-run            fail REGR. vs. 168506
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm 12 debian-hvm-install fail REGR. vs. 168506

Tests which did not succeed, but are not blocking:
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168506
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168506
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168506
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168506
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168506
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168506
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168506
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168506
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168506
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168506
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168506
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168506
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass

version targeted for testing:
 xen                  1e595d9c2b8608bcef48d6a69cc2f6135780bcc0
baseline version:
 xen                  ca304edd3ba8c19211107fd2e898249987557ce5

Last test of basis   168506  2022-03-10 14:16:31 Z   21 days
Failing since        168862  2022-03-25 17:36:39 Z    5 days    7 attempts
Testing same since   168957  2022-03-28 21:36:20 Z    2 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bjoern Doebel <doebel@amazon.de>
  Jan Beulich <jbeulich@suse.com>
  Jiamei Xie <jiamei.xie@arm.com>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Thiner Logoer <logoerthiner1@163.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 fail    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   fail    
 test-amd64-i386-livepatch                                    fail    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 410 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 16:36:29 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 16:36:29 +0000
Received: from list by lists.xenproject.org with outflank-mailman.297037.505837 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZxmQ-0004Yb-C1; Thu, 31 Mar 2022 16:36:14 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 297037.505837; Thu, 31 Mar 2022 16:36:14 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZxmQ-0004YU-8f; Thu, 31 Mar 2022 16:36:14 +0000
Received: by outflank-mailman (input) for mailman id 297037;
 Thu, 31 Mar 2022 16:36:13 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=kR9h=UK=gmail.com=jandryuk@srs-se1.protection.inumbo.net>)
 id 1nZxmP-0004YO-KF
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 16:36:13 +0000
Received: from mail-lj1-x235.google.com (mail-lj1-x235.google.com
 [2a00:1450:4864:20::235])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id acb7dc48-b110-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 18:36:11 +0200 (CEST)
Received: by mail-lj1-x235.google.com with SMTP id v12so528393ljd.3
 for <xen-devel@lists.xenproject.org>; Thu, 31 Mar 2022 09:36:11 -0700 (PDT)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: acb7dc48-b110-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20210112;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to
         :cc;
        bh=vz6V7NDzAK8ul9bNLxeg5qB1GRW45PBYLuRXsRjj4z8=;
        b=dmc9Qt5TPOUN4JdV6YeMZ6mQfLv0zDZMsa+F4CwBFIP2yS0AJVxaSuOsifdizXDq3M
         CxXpCDeDDCtOJ42Z0+I1SZcfSzArVQvMcd8NJQvvOM5iDjlw0IyY4KP1mvDiCvo4UwaD
         EVURdoe2K9rk5E4vscJFV6OpEhL+Qev5EY4btufQgKSXj0cu7fSdmQigQVoorGpPMkbk
         kCf8906JW9pFT6ze+gnmf2kRAcVmTOe4G7Kt99O9vDBMQcRz8uesH9dzjZqTCidntBp9
         A8jSwfLzZDaQB9u8Zu+CCWGl98N3HhtpnEJvwuvqMngqwjk4VPC62rIuHdANhjAw/fOT
         8LUw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20210112;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to:cc;
        bh=vz6V7NDzAK8ul9bNLxeg5qB1GRW45PBYLuRXsRjj4z8=;
        b=XXvAjz1m2zqy0yzrbgfiOVyStN9A0OWClWsEUGtLgLcqu5PoggA4btJLAOmwkIClC/
         19e5QD4AiqknOKOaRPH9e04vK0HpBHZVJTW9COifwX0S8s0p/vmZZKVE4wMheUM/Z6uG
         Xf/Dy8T1Dsr5+fdtuLMqq3HazQurB7vxCw/ATfiEgiUxK38d/tMcx1CHT6KXfg1wUW6S
         QqCSZG/BGnmn93pw5yGhwFulwHR5CSe7hPicitp/MH1LY4uLkW3jHb0J/zeY69J9Pbzv
         Eu/bqAqOzywTmQM78ui+pv6PA3BG6ciFo8mb4i5sLJ6gmXBHbBc03mRGivlY5/0OVeEo
         XzGA==
X-Gm-Message-State: AOAM532MiClH3vW+B0TpDbBSv4MdL4CIZ6VzvL62FyDqR6CmkilVlk0t
	3y1ElP6v+qOG4ApfBB4kQGEJQUxXkY5ZMs5i+10=
X-Google-Smtp-Source: ABdhPJxH1hkPaiirQ5EQuAdZ18zIALQvZrLsyF6/vhuvTdvPDq6iOgw+0acVS8UE4OSQhbowYq1nXM6D37sWXRuhD+E=
X-Received: by 2002:a2e:b0c9:0:b0:24a:fb55:8661 with SMTP id
 g9-20020a2eb0c9000000b0024afb558661mr1980993ljl.168.1648744571188; Thu, 31
 Mar 2022 09:36:11 -0700 (PDT)
MIME-Version: 1.0
References: <20220330181727.30303-1-jandryuk@gmail.com> <YkW2OGC5T4pE7lGW@perard.uk.xensource.com>
In-Reply-To: <YkW2OGC5T4pE7lGW@perard.uk.xensource.com>
From: Jason Andryuk <jandryuk@gmail.com>
Date: Thu, 31 Mar 2022 12:35:58 -0400
Message-ID: <CAKf6xptJ+1YPZ2wC9mECiPXfgq5siwPSx+cMO1-WQe=QRQRDow@mail.gmail.com>
Subject: Re: [PATCH] libxl: Don't segfault on soft-reset failure
To: Anthony PERARD <anthony.perard@citrix.com>
Cc: xen-devel <xen-devel@lists.xenproject.org>, Wei Liu <wl@xen.org>, 
	Juergen Gross <jgross@suse.com>
Content-Type: text/plain; charset="UTF-8"

On Thu, Mar 31, 2022 at 10:10 AM Anthony PERARD
<anthony.perard@citrix.com> wrote:
>
> On Wed, Mar 30, 2022 at 02:17:27PM -0400, Jason Andryuk wrote:
> > diff --git a/tools/libs/light/libxl_create.c b/tools/libs/light/libxl_create.c
> > index 15ed021f41..631caa416d 100644
> > --- a/tools/libs/light/libxl_create.c
> > +++ b/tools/libs/light/libxl_create.c
> > @@ -1970,7 +1970,8 @@ static void domcreate_complete(libxl__egc *egc,
> >      libxl_domain_config *const d_config = dcs->guest_config;
> >      libxl_domain_config *d_config_saved = &dcs->guest_config_saved;
> >
> > -    libxl__xswait_stop(gc, &dcs->console_xswait);
> > +    if (dcs->console_xswait.path)
> > +        libxl__xswait_stop(gc, &dcs->console_xswait);
>
> libxl__xswait_stop() needs to be called here. It's a function that can
> be called several time without ill effect, as long as `console_xswait`
> is initialised properly (by calling libxl__xswait_init() like you did
> below.
>
> >      libxl__domain_build_state_dispose(&dcs->build_state);
> >
> > @@ -2176,6 +2177,10 @@ static int do_domain_soft_reset(libxl_ctx *ctx,
> >                                aop_console_how);
> >      cdcs->domid_out = &domid_out;
> >
> > +    /* Initialize in case we end up in domcreate_complete without calling
> > +     * initiate_domain_create. */
>
> That comment isn't needed. This is just part of the initialisation of
> `cdcs->dcs`.
>
> > +    libxl__xswait_init(&cdcs->dcs.console_xswait);
> > +
> >      dom_path = libxl__xs_get_dompath(gc, domid);
> >      if (!dom_path) {
> >          LOGD(ERROR, domid, "failed to read domain path");
>
>
> As part of the patch, could you also move the libxl__xswait_init() call
> in initiate_domain_create() to do_domain_create()? That would avoid
> `console_xswait` been initialised twice, and do_domain_create() is the
> function that initialise `dcs` before calling initiate_domain_create().

Sure, that all sounds good.  Thanks!

Regards,
Jason


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 18:32:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 18:32:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.297050.505869 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZzat-0007cW-VK; Thu, 31 Mar 2022 18:32:27 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 297050.505869; Thu, 31 Mar 2022 18:32:27 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1nZzat-0007cP-RM; Thu, 31 Mar 2022 18:32:27 +0000
Received: by outflank-mailman (input) for mailman id 297050;
 Thu, 31 Mar 2022 18:32:27 +0000
Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50]
 helo=se1-gles-flk1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=5BbJ=UK=aim.com=brchuckz@srs-se1.protection.inumbo.net>)
 id 1nZzas-0007cE-3Z
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 18:32:26 +0000
Received: from sonic313-20.consmr.mail.gq1.yahoo.com
 (sonic313-20.consmr.mail.gq1.yahoo.com [98.137.65.83])
 by se1-gles-flk1.inumbo.com (Halon) with ESMTPS
 id e6b3576e-b120-11ec-8fbc-03012f2f19d4;
 Thu, 31 Mar 2022 20:32:22 +0200 (CEST)
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic313.consmr.mail.gq1.yahoo.com with HTTP; Thu, 31 Mar 2022 18:32:20 +0000
Received: by kubenode532.mail-prod1.omega.ne1.yahoo.com (VZM Hermes SMTP
 Server) with ESMTPA ID 9b5afb7763e4aaf9096236a465979bfd; 
 Thu, 31 Mar 2022 18:32:13 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: e6b3576e-b120-11ec-8fbc-03012f2f19d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netscape.net; s=a2048; t=1648751540; bh=0H9zgbxQBofOpYevtrbxkA2xkjIpendTdhuZjpBEIRc=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From:Subject:Reply-To; b=h7PAFhxXhn4FSFhTjNJCErju+oglIj5mDgjxgCYTRk7d574OC56JY1EhWGuACMg1zlqaWpvOsGTAf9pJDkJARcMOq7knACeaYwA+LLAE9aX86NddvHGZxc0ooY04FSR5ChAHsT43iNWuobkorzogpFXB+0Ialt4BTW4hfo/T/y5cd/j8HtdHa3jiPlKqZtQKPZ+RZhgskP2B/DwgAdArGVzQJhrOEIwr/9WZc8PpbmeJSoFA93VPXwJ+fwsJmx5Z7xQ6lYYeVyq0C2Ppv1HfFVXQzRo0yFdqgCcvG80sBHovqXmPy9PXCNXVw8S6Auxhl8p2FuTYAK4Hys9CmKHfuQ==
X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1648751540; bh=JrWjWS3Dy0ZJCoXh0qUql2NLNIi5cp6s0YHdBDzISvx=; h=X-Sonic-MF:Date:Subject:To:From:From:Subject; b=TfWruq2HVdJGEZ1peEzLLrQL2cnTMyX92pio5k4Kgy2WZyzcFHYg2u+RwPdtY3KMGZbaKx5WmHursXPlbwaeT0HzyrAtD3lNKo69qKhvNREBxtmQS8IAvvR8iqDTdYvAA8TauLeTY3/dT3okHALXuhIZG3tTPhWig5ygw+LPQ6c4/qlhrnKXxauVi2QyTB5YWX1VOwhzHv215aZSRIOWSft1OCxOkD55cSDKTgKTW6KQ+iX4qQvQpvEH/3WCAWM0zE4dj3iUcJ4cTFtzJO6Qkgbf0+ZmijpkmcPJ7C9CcYnU/us1WVpHHibduTGAYOr5Q947A8GmS/KRgwMWVML5cw==
X-YMail-OSG: MziJqJcVM1mhj8RrsikUBh4KT88M5waF9XCXH4Lmvg7m7zN_UknYmdkL4.rP_Sh
 MKjWAT5fFHBPpQjMUqOczqSqhTG9YxmP3g07z0UibNqZwVFeZ26NjoawXaUKqyLVZkZtBaLSms12
 HZ6ZuMyTvGglocSZQzPRjoZBbR3Rz6iL__J08zocQxyYBHt.hvm8UK41OGhPl0XeoSSLUkLtSuL0
 zyTNLQlp6nw30m8kZ4_Z_tz8vxONcGj02vtDzAjpi_oCjWAon5pHI8S0jzIDBUofDaNOYtvhsmbb
 MLTbZVBL_YQhF9jc5iqqk04g1f3IX1XNsCDS9CGV9AMPti3fXziWwN66brtSqJjkHgqNWZ6Eynl1
 cwB7Y._7vlOq3.rUOD4k2eY.APYzoQCgV1Jw3VerAl9_BbftigwaKCA9y_5dlZiY2m1cs_fADAnI
 1h.2uJsrp9JM5yzJDHYzBa3HhychYRUa04_kS_xshRE...r_D6g51k90ILopgLIBgAeqZs4ElTrh
 i541vVJGwoWTsolbx0bjw44FkVwe11LnAKNIe30SGMEb02lsBQDbIxgAAbVCRG6qhFggmzLbONkf
 upx1SsWGZfe7yr_buQW9XB8MDKFlBPpuDB4I8qErcSRMPwCGOaZPL96rC380qBqH.cV4ArxzWyRS
 xGDz_tec_IGf4qgj5Oq7WxjPhLvE98gBhGXbwpVSjdVmGj.p67wvTjgvZFF.ORnkn0usMKGX4vt8
 JVub1Yq2PZd7PEkTMeOYCagzus4eUQUHeFTNZWh_k78FLUtHKgNl1dhhXFavWTgHKNluPFj70ZIT
 xmnswMr8ksV8di1enBgmCgWd0aAXnq461kyxL_QuRMe7c0udQ7mdP7JFGFNRCKpNvwsDST0nvfS5
 jdR4Vj6HTZS9oAbjb44ucwVfsYP8tkMoYB7ab4W.ojrqmWClP5KJQGklB1IOxAZIIZFMfQ8I8B.9
 EBDhyrRb1f.OmEzpIRtJL8DdkusjdXOGUS4GzMun686V4PEY7gSTju973qZ9nOU7OAgvgnj2px00
 85GTh1UoJJl6LytRaXIijb8NPcpcdnL0ycbKVH77XnzjxxSoi2z3W3qaKzbocrPMgm7znTGpRbkT
 quJGUdIETyHUa646.hNc7f3Pu_GNt1ZtmJ.2FE3W13Dy1rx3rR_rg4Y4q_zkULkOUuhpJbiJuWfk
 5nPJE9gH6SPQSxtg.bk_WlUJG32u0pKRadR7QV5c4FJ8AkyZ8vXM830Wltx8u_WqBK7ughhye3Oh
 oLGlrDkpBdQw_c4JFqidgOCerl8cIzWHvD7fKwkUtTsL0HdzpRNiEAOqfOSHK6B4yKoOMsNwEP1Z
 AwMBCsS.AE9YyNr0ui3_jhnG_sjyrISfkC7AVfxoqiuYXLWbFPEG2lZCbAKNyk8.X8EtWe80CmtY
 N.OyUryg1ZHAo3u0iT0raeoTcqr6jOiAg28L1fHziV7O6bbhUbBWIfTtstDuW5EuRPshHo3qutWB
 eORF82o1fvVbqArI.PqMdGLyg0hopXDhAf1DCZ59voFk_Axrq1sHtpatWDI1cVZEyofMc9axhOMv
 pmL5_lJ_EjsU9aSnM27IdReJtYa2WNo_nAmS.cti6hh7R9WDP7CQIdyUqmdO1sBL.s2MVH0dZlnT
 nX9jW1qB08puJ3buAMjnDSqazDqb5YaEYeECbdxJMaPEfB_KfUpcnVETFr_KYh42KbM5yBgnqLXP
 ohX_yjuqILqLw_IcSi.HjKRLUsXbohp3A0j5u9Y2KQ_l_AdPDGzbt6BuTQaHtZmNla4770MH7iSl
 MBVQjOoo_bBB_Yqjq.uz_aJbCeISz79YgGrVHutxd.grrFPWf94MgvyaLG3ND0JWLlqLJJgYQjT7
 5xwwa1QzFmb4d_m8TpjtHqUnfnoh2EuzuFBp0r1XS9UrJ2AQkOCGA47KfOk0Mydgefc_cmmQOHXx
 OmTkzYhAj.Pd8goELxDJTswlRmEAlLYhqNfxEXa0rzmO0nT.PBNDHPnHsS9X5E.oJjuFURT09TzM
 sHdgLaogP2guMaQVW_YgdXR4Zhd.YrXC7wnUrskE45rdByhdqpSZYNcLebEKgd21C8SYvZ0Ad3Xj
 PiVNSVJ1uwhYyLcj_TSt1koDPWP8TscoyBjL8qEFke6GDDVmrf_4kW8tiR5wM2rf9wAyGbI.bodB
 1pGV9Iqz9pU5.3uJAEvaFmWd5ZixPkwih56JDB1b8twvjWowqhkmiGhmPwRcA5KHoibyMIfmQYo9
 AVmtdW2nN4kLJNQ--
X-Sonic-MF: <brchuckz@aim.com>
Message-ID: <4b40eb36-71b5-d3dc-8551-73a684bff2dc@netscape.net>
Date: Thu, 31 Mar 2022 14:32:12 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [XEN PATCH] tools/libs/light/libxl_pci.c: explicitly grant access
 to Intel IGD opregion
Content-Language: en-US
To: Anthony PERARD <anthony.perard@citrix.com>
Cc: xen-devel@lists.xenproject.org, Wei Liu <wl@xen.org>,
 Juergen Gross <jgross@suse.com>, Jan Beulich <jbeulich@suse.com>
References: <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz.ref@netscape.net>
 <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz@netscape.net>
 <YkSQIoYhomhNKpYR@perard.uk.xensource.com>
From: Chuck Zmudzinski <brchuckz@netscape.net>
In-Reply-To: <YkSQIoYhomhNKpYR@perard.uk.xensource.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-Mailer: WebService/1.1.20001 mail.backend.jedi.jws.acl:role.jedi.acl.token.atz.jws.hermes.aol
Content-Length: 7399

On 3/30/22 1:15 PM, Anthony PERARD wrote:
> Hi Chuck,
>
> On Sun, Mar 13, 2022 at 11:41:37PM -0400, Chuck Zmudzinski wrote:
>> When gfx_passthru is enabled for the Intel IGD, hvmloader maps the IGD
>> opregion to the guest but libxl does not grant the guest permission to
> I'm not reading the same thing when looking at code in hvmloader. It
> seems that hvmloader allocate some memory for the IGD opregion rather
> than mapping it.
>
>
> tools/firmware/hvmloader/pci.c:184
>      if ( vendor_id == 0x8086 )
>      {
>          igd_opregion_pgbase = mem_hole_alloc(IGD_OPREGION_PAGES);
>          /*
>           * Write the the OpRegion offset to give the opregion
>           * address to the device model. The device model will trap
>           * and map the OpRegion at the give address.
>           */
>          pci_writel(vga_devfn, PCI_INTEL_OPREGION,
>                     igd_opregion_pgbase << PAGE_SHIFT);
>      }
>
> I think this write would go through QEMU, does it do something with it?
> (I kind of replying to this question at the end of the mail.)
>
> Is this code in hvmloader actually run in your case?

Hi Anthony,

To test your theory that hvmloader is not called in my case and
does nothing, I did the following tests:

I wrote a little C program to read the mapped IGD opregion
address in the guest from the config attribute of the
IGD in sysfs:

#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <unistd.h>
#include <stdio.h>
#include <stdint.h>

int main()
{
     int fd = open("/sys/devices/pci0000:00/0000:00:02.0/config",
                    O_RDONLY);
     uint32_t buf;
     off_t offset = 0xfc;
     pread(fd, &buf, 4, offset);
     printf("opregion = %lx\n", buf);
     return close(fd);
}
------------------------ end of C program -----------------

Since the config attribute cannot be read by an ordinary user, it is
necessary to run the little C program as the super user to successfully
read the opregion address from sysfs with the little C program.

I also grabbed the BIOS-provided physical RAM map in the
guest which shows the 3 pages mapped by hvmloader for the
opregion (it is the second to last entry in the table):

Mar 31 13:20:16 kolbe kernel: BIOS-provided physical RAM map:
Mar 31 13:20:16 kolbe kernel: BIOS-e820: [mem 
0x0000000000000000-0x000000000009dfff] usable
Mar 31 13:20:16 kolbe kernel: BIOS-e820: [mem 
0x000000000009e000-0x000000000009ffff] reserved
Mar 31 13:20:16 kolbe kernel: BIOS-e820: [mem 
0x00000000000e0000-0x00000000000fffff] reserved
Mar 31 13:20:16 kolbe kernel: BIOS-e820: [mem 
0x0000000000100000-0x00000000bfbfffff] usable
Mar 31 13:20:16 kolbe kernel: BIOS-e820: [mem 
0x00000000cc346000-0x00000000cc352fff] reserved
Mar 31 13:20:16 kolbe kernel: BIOS-e820: [mem 
0x00000000cf800000-0x00000000df9fffff] reserved
Mar 31 13:20:16 kolbe kernel: BIOS-e820: [mem 
0x00000000fc000000-0x00000000fc009fff] ACPI NVS
Mar 31 13:20:16 kolbe kernel: BIOS-e820: [mem 
0x00000000fc00a000-0x00000000fdffbfff] reserved
Mar 31 13:20:16 kolbe kernel: BIOS-e820: [mem 
0x00000000fdffc000-0x00000000fdffefff] ACPI NVS
Mar 31 13:20:16 kolbe kernel: BIOS-e820: [mem 
0x00000000fdfff000-0x00000000ffffffff] reserved

Now with the current code and no patches, the output of the little C
program to print the opregion address from sysfs in the guest is wrong,
the opregion address in the guest is not displayed (it should be
fdffc018 because the offset of the opregion from the page boundary is
0x18 (24) bytes on my hardware) but it displays an error value
(ffffffff) instead:

opregion = ffffffff

I would expect it to be correct if nothing overwrites the value
hvmloader wrote. In fact, I think the value hvmloader wrote might be the
page aligned address of fdffc000 instead of fdffc018. I am not sure
where this error value comes from, so I do need to do some
investigations because I think you are correct that the value that
hvmloader wrote was overwritten somewhere.

Now when I apply my patch to libxl, I get the same physical RAM map
in the guest:

Mar 31 13:12:35 kolbe kernel: BIOS-provided physical RAM map:
Mar 31 13:12:35 kolbe kernel: BIOS-e820: [mem 
0x0000000000000000-0x000000000009dfff] usable
Mar 31 13:12:35 kolbe kernel: BIOS-e820: [mem 
0x000000000009e000-0x000000000009ffff] reserved
Mar 31 13:12:35 kolbe kernel: BIOS-e820: [mem 
0x00000000000e0000-0x00000000000fffff] reserved
Mar 31 13:12:35 kolbe kernel: BIOS-e820: [mem 
0x0000000000100000-0x00000000bfbfffff] usable
Mar 31 13:12:35 kolbe kernel: BIOS-e820: [mem 
0x00000000cc346000-0x00000000cc352fff] reserved
Mar 31 13:12:35 kolbe kernel: BIOS-e820: [mem 
0x00000000cf800000-0x00000000df9fffff] reserved
Mar 31 13:12:35 kolbe kernel: BIOS-e820: [mem 
0x00000000fc000000-0x00000000fc009fff] ACPI NVS
Mar 31 13:12:35 kolbe kernel: BIOS-e820: [mem 
0x00000000fc00a000-0x00000000fdffbfff] reserved
Mar 31 13:12:35 kolbe kernel: BIOS-e820: [mem 
0x00000000fdffc000-0x00000000fdffefff] ACPI NVS
Mar 31 13:12:35 kolbe kernel: BIOS-e820: [mem 
0x00000000fdfff000-0x00000000ffffffff] reserved

And now I get the correct opregion address from the little C program to
read the opregion address from sysfs in the guest, not even the
page-aligned address that hvmloader appears to have written:

opregion = fdffc018

Next I removed the code snippet from hvmloader that allocates three
pages in the guest for the opregion and writes the opregion address to
the pci config attribute, and now there is no memory hole allocated for
the opregion in the guest:

Mar 31 12:47:34 kolbe kernel: BIOS-provided physical RAM map:
Mar 31 12:47:34 kolbe kernel: BIOS-e820: [mem 
0x0000000000000000-0x000000000009dfff] usable
Mar 31 12:47:34 kolbe kernel: BIOS-e820: [mem 
0x000000000009e000-0x000000000009ffff] reserved
Mar 31 12:47:34 kolbe kernel: BIOS-e820: [mem 
0x00000000000e0000-0x00000000000fffff] reserved
Mar 31 12:47:34 kolbe kernel: BIOS-e820: [mem 
0x0000000000100000-0x00000000bfbfffff] usable
Mar 31 12:47:34 kolbe kernel: BIOS-e820: [mem 
0x00000000cc346000-0x00000000cc352fff] reserved
Mar 31 12:47:34 kolbe kernel: BIOS-e820: [mem 
0x00000000cf800000-0x00000000df9fffff] reserved
Mar 31 12:47:34 kolbe kernel: BIOS-e820: [mem 
0x00000000fc000000-0x00000000fc009fff] ACPI NVS
Mar 31 12:47:34 kolbe kernel: BIOS-e820: [mem 
0x00000000fc00a000-0x00000000ffffffff] reserved

I ran this case without my patch to libxl for safety reasons because the
opregion address in sysfs in the guest is wrong and I get the same
error address return value using the little C program to read the
opregion address from sysfs:

opregion = ffffffff

So the conclusion is that hvmloader does allocate the three pages in the
guest for the opregion and writes a value for the opregion address, but
it appears it is overwritten later with the error value when the guest
cannot access the opregion and with the correct value when the guest can
access the opregion.

So I agree that I should understand what is going on here better. I
tentatively think the call to pci_writel in hvmloader can be safely
removed because that value seems to be changed later on somewhere.
But we do need to keep the call to allocate the memory hole for the
opregion in hvmloader, or maybe move that call to the toolstack.

So I will need to have a better answer to your questions before I
propose the next version of the patch / patch series.

Regards,

Chuck


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 19:12:09 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 19:12:09 +0000
Received: from list by lists.xenproject.org with outflank-mailman.297059.505888 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1na0DD-0003TK-5T; Thu, 31 Mar 2022 19:12:03 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 297059.505888; Thu, 31 Mar 2022 19:12:03 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1na0DD-0003TD-27; Thu, 31 Mar 2022 19:12:03 +0000
Received: by outflank-mailman (input) for mailman id 297059;
 Thu, 31 Mar 2022 19:12:01 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1na0DB-0003T7-Hl
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 19:12:01 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1na0DA-0004W6-Vl; Thu, 31 Mar 2022 19:12:00 +0000
Received: from 54-240-197-233.amazon.com ([54.240.197.233]
 helo=[192.168.12.206]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1na0DA-0004Px-PO; Thu, 31 Mar 2022 19:12:00 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=OQ17IXjF+hvka1J9qmYi2WwZ27PyLydCIOm3bQpaVLg=; b=TeL7B7P25TWmjvwq+BUnIzdjDK
	73/tpVuZwSIekbDT0nqL50Gp6C+ZDuu0Zw3wZ0zBHthFTSFmfnZjdlNiM6jCoOiyASqQGrsakNIQh
	61UUNmX0CcG64b6NOdMw1YMJlc3ODgQ82PDFb9uHdJ6BJW8TKwN2a3CEwOfOPrVzup/o=;
Message-ID: <5be58cd7-50f4-5b5b-b4dc-6f6e378b7a11@xen.org>
Date: Thu, 31 Mar 2022 20:11:58 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [XEN PATCH v10 1/7] build: grab common EFI source files in arch
 specific dir
To: Anthony PERARD <anthony.perard@citrix.com>, xen-devel@lists.xenproject.org
Cc: Jan Beulich <jbeulich@suse.com>, Andrew Cooper
 <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>
References: <20220322112238.1117737-1-anthony.perard@citrix.com>
 <20220322112238.1117737-2-anthony.perard@citrix.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220322112238.1117737-2-anthony.perard@citrix.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Anthony,

On 22/03/2022 11:22, Anthony PERARD wrote:
> Rather than preparing the efi source file, we will make the symbolic
> link as needed from the build location.
> 
> The `ln` command is run every time to allow to update the link in case
> the source tree change location.
> 
> This patch also introduce "efi-common.mk" which allow to reuse the
> common make instructions without having to duplicate them into each
> arch.
> 
> And now that we have a list of common source file, we can start to
> remove the links to the source files on clean.
> 
> Signed-off-by: Anthony PERARD <anthony.perard@citrix.com>
> Acked-by: Jan Beulich <jbeulich@suse.com>

Acked-by: Julien Grall <jgrall@amazon.com>

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 19:13:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 19:13:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.297063.505899 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1na0F3-00042n-HB; Thu, 31 Mar 2022 19:13:57 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 297063.505899; Thu, 31 Mar 2022 19:13:57 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1na0F3-00042g-EM; Thu, 31 Mar 2022 19:13:57 +0000
Received: by outflank-mailman (input) for mailman id 297063;
 Thu, 31 Mar 2022 19:13:56 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1na0F2-00042Y-6m
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 19:13:56 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1na0F1-0004Xs-Gw; Thu, 31 Mar 2022 19:13:55 +0000
Received: from 54-240-197-233.amazon.com ([54.240.197.233]
 helo=[192.168.12.206]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1na0F1-0004Us-An; Thu, 31 Mar 2022 19:13:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:From:
	References:Cc:To:Subject:MIME-Version:Date:Message-ID;
	bh=UjH9LcFkiUve9nrMnme//2PhtzOIwRuuvslnnFr0prg=; b=PZ4/QWTdwt31NABU2TvkVMG8Ok
	+RtM84vZ6tpnLwfNWVhesPYfILsovX3zVvMxrjDosgRRxwmA7bTsSCk31ho7aRmHnjaG2XJV9LmPu
	YCOvHIS+OeXFDzksQB/7mKPBn8vg2x3OCVN++07+nwzTYAK47/vZnAEoAZLG+4BdTh78=;
Message-ID: <e6fc2c75-df0b-a6e8-80c0-cdc100946d4e@xen.org>
Date: Thu, 31 Mar 2022 20:13:52 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: [XEN PATCH v10 2/7] build: replace $(BASEDIR) by $(objtree)
To: Anthony PERARD <anthony.perard@citrix.com>, xen-devel@lists.xenproject.org
Cc: Jan Beulich <jbeulich@suse.com>, Andrew Cooper
 <andrew.cooper3@citrix.com>, George Dunlap <george.dunlap@citrix.com>,
 Stefano Stabellini <sstabellini@kernel.org>, Wei Liu <wl@xen.org>,
 Bertrand Marquis <bertrand.marquis@arm.com>,
 Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>,
 =?UTF-8?Q?Roger_Pau_Monn=c3=a9?= <roger.pau@citrix.com>,
 Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
 Ross Lagerwall <ross.lagerwall@citrix.com>
References: <20220322112238.1117737-1-anthony.perard@citrix.com>
 <20220322112238.1117737-3-anthony.perard@citrix.com>
From: Julien Grall <julien@xen.org>
In-Reply-To: <20220322112238.1117737-3-anthony.perard@citrix.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit

Hi Anthony,

On 22/03/2022 11:22, Anthony PERARD wrote:
> We need to differentiate between source files and generated/built
> files. We will be replacing $(BASEDIR) by $(objtree) for files that
> are generated.
> 
> Signed-off-by: Anthony PERARD <anthony.perard@citrix.com>
> Acked-by: Jan Beulich <jbeulich@suse.com>

Acked-by: Julien Grall <jgrall@amazon.com>

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 19:22:35 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 19:22:35 +0000
Received: from list by lists.xenproject.org with outflank-mailman.297067.505910 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1na0NK-0005Vb-Cy; Thu, 31 Mar 2022 19:22:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 297067.505910; Thu, 31 Mar 2022 19:22:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1na0NK-0005VU-9O; Thu, 31 Mar 2022 19:22:30 +0000
Received: by outflank-mailman (input) for mailman id 297067;
 Thu, 31 Mar 2022 19:22:29 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1na0NJ-0005VK-7j; Thu, 31 Mar 2022 19:22:29 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1na0NJ-0004h9-4S; Thu, 31 Mar 2022 19:22:29 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1na0NI-0004WE-L5; Thu, 31 Mar 2022 19:22:28 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1na0NI-0002kW-Kg; Thu, 31 Mar 2022 19:22:28 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=6j4UtNNtpfFTXlIo8ghLjrxQW9ZqEtTZoLYcSLSJWO0=; b=EFQ47Sp5YozOrILif9BLExhk3d
	3znZwq4kVRMN8ZyMt0B7vVZMk+pnWzyKZiK8qVYXlO/Yqf1lFxgfFDImHmPxOWAj+qC7LSq+wySDq
	8rzg/+ZsgQZatmM0JoJgk4ImPXbz4GWmhm7QELvBYvWcyadgfR7zXlMTUW2zY6ABaOVs=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-169040-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.15-testing test] 169040: regressions - FAIL
X-Osstest-Failures:
    xen-4.15-testing:test-amd64-i386-livepatch:livepatch-run:fail:regression
    xen-4.15-testing:test-amd64-amd64-livepatch:livepatch-run:fail:regression
    xen-4.15-testing:test-amd64-i386-xl-qemut-debianhvm-i386-xsm:debian-hvm-install:fail:heisenbug
    xen-4.15-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:guest-start/debianhvm.repeat:fail:heisenbug
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.15-testing:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=bb43e0e1ca20dff14536b7c90ff870f3f50bff8f
X-Osstest-Versions-That:
    xen=cd751c09a5bab9f3529901fbe4d867ad7d52e89d
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 31 Mar 2022 19:22:28 +0000

flight 169040 xen-4.15-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/169040/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-i386-livepatch    13 livepatch-run            fail REGR. vs. 168502
 test-amd64-amd64-livepatch   13 livepatch-run            fail REGR. vs. 168502

Tests which are failing intermittently (not blocking):
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm 12 debian-hvm-install fail pass in 168992
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 18 guest-start/debianhvm.repeat fail pass in 168992

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168502
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168502
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168502
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168502
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168502
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168502
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168502
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168502
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168502
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168502
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168502
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168502
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-rtds     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass

version targeted for testing:
 xen                  bb43e0e1ca20dff14536b7c90ff870f3f50bff8f
baseline version:
 xen                  cd751c09a5bab9f3529901fbe4d867ad7d52e89d

Last test of basis   168502  2022-03-10 09:07:57 Z   21 days
Failing since        168863  2022-03-25 17:36:55 Z    6 days    7 attempts
Testing same since   168970  2022-03-29 04:19:26 Z    2 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bjoern Doebel <doebel@amazon.de>
  Jan Beulich <jbeulich@suse.com>
  Jiamei Xie <jiamei.xie@arm.com>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Thiner Logoer <logoerthiner1@163.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            fail    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  fail    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   fail    
 test-amd64-i386-livepatch                                    fail    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 410 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 19:44:58 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 19:44:58 +0000
Received: from list by lists.xenproject.org with outflank-mailman.297078.505927 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1na0ir-0007u5-93; Thu, 31 Mar 2022 19:44:45 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 297078.505927; Thu, 31 Mar 2022 19:44:45 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1na0ir-0007ty-5m; Thu, 31 Mar 2022 19:44:45 +0000
Received: by outflank-mailman (input) for mailman id 297078;
 Thu, 31 Mar 2022 19:44:43 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=5BbJ=UK=aim.com=brchuckz@srs-se1.protection.inumbo.net>)
 id 1na0io-0007tr-KD
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 19:44:43 +0000
Received: from sonic309-21.consmr.mail.gq1.yahoo.com
 (sonic309-21.consmr.mail.gq1.yahoo.com [98.137.65.147])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id ff712409-b12a-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 21:44:39 +0200 (CEST)
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic309.consmr.mail.gq1.yahoo.com with HTTP; Thu, 31 Mar 2022 19:44:36 +0000
Received: by hermes--canary-production-bf1-665cdb9985-85ftg (VZM Hermes SMTP
 Server) with ESMTPA ID 23977df615c49108147ef4bb85ec5bd8; 
 Thu, 31 Mar 2022 19:44:35 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: ff712409-b12a-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netscape.net; s=a2048; t=1648755876; bh=rBDEYSNt8gUJ6y51oo238Cpzui22UUlruN7iTW0yM2c=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From:Subject:Reply-To; b=UmTCVpzU2tlYbNg1mXOf/p0t70suoTU3rwnKAohazb+M8uKm/HGcC3yySlIkXiM1ajZa/Vk9Rvzr3/iEbxL3k/VmRTV6zRtKW3xy+8pYxoypz8BlYF+x5tTENox6+s2NrdMmT7SPD7ELPckJRaHe7xtV7ib7X46NVgzUpWjBTFwsQpQeVYsFz60/yo2kDltl7qKny7Luc/kQmYRSul5T3EnxRncB3FWANsbGLJLXSBSIe03wjJr+25aG1nBYz5tmz3qMYfh7jHx1dk3pil/lY3Se5r3WhYW+QexlfByDvD3UMQfA3c+5uBaijjQWiiHpbKtQVmnTy+j2XvLs4XpT/Q==
X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1648755876; bh=vlwBOuNlTY6gR8PB4AbZr5pBHU54vjTI4tlpdPFE/wC=; h=X-Sonic-MF:Date:Subject:To:From:From:Subject; b=M7z465mdt/Ern75FgWXJ9KkLgw3R35RGvt/P0vjaWTWISLtWCQ+ddUz6fJpPjymD0Sqf+5fnCj04cEzc5jioIVNrAGDz0G6UGPSFQUNGRIzCXSrP2Cda+7jXWGXSRIclnhmtYPBfrd8GAB91toqyOpyU7LojFRRgzHCaDJRAMV2G8c3g+dz331MXZGxTzYuU0X4LVb+6eLffZKhWd1mFhvkmDuTrOKWlkbyBfvJBmhCXyJo5zmgIGbYMp2Ms7SnkIs2wjUoSckfAsdF8dMEIrl3GDVWDF7AGnknZyxH2lgsHyf8fGzhaoQok2C6skK08wwj6T2XfmAswmcWHIsLwOQ==
X-YMail-OSG: 4hiE6T4VM1kuWrRRl.PXKuNv50.e8dvQQbyfHqKO5bl69Z4yRpjbFNdGKLATjwM
 SFjvQI3.iz2PcCyGbHZWf5bZAKh8P4qaDWw3xgfyXT26b4KAe2j0tqs6xgwx.9FuvGA2yaBa5TVc
 v1y5cvxeCvTkNZXaOzZNMU_PBSYncAXB3rtUrbvzNzI6b.oXA_vsPHRiD176.fi2Rc84Uh4U0gSv
 KzqtdWc_ssIiUO5nFNqKWQpRrWieuzJY.gQM9K9Ad6KTM09CuHutNTYrokH_FziNoIr_SPxelJQX
 YwhMh_Fn3pB2Rt6xyyNhcID_IyhWJpJdp2mDI0WcvquBm43deavXJVbUshFtw5jAj29XZo.AgUIi
 lcs__g3CZ_SlHyANXhdJH.BsYI2HSvM3uHTIdd40hkBArRfxrpbc9IZVitlf94ZL0x.HosPEDLFA
 ps.TFaBlQijxSsco.TNejoasBGrUO9RT803sWDh9HhN7rEOYUp8Eej._dNPV0s4xELB8iTVkd3oQ
 13XnotpxzaK3iibFN0ISrsdRovrwp.GlSxPJ7zfQP8LeDltJ_2Eday_rKwbfpzdnvrxiwkXXeTlX
 1b2kkc.hfJVd4XONS6HUB3NCfE_l7iLEKG.YbveNQGJIYTcU7JouylIsx8dXTnubHgfwQw_jVm3K
 7BuCu2iYfJfbipmyp.9FjL50v6wjX1pp7VuDAuwBD6uEgef20Y9nXEdnAG8ACHvVmptKRqbmztka
 jmzmQfOu58ovrHcxFXjYv.MfgTKuWRCYIrGZmGWwrLDOsDGu1sRKzulMe55iqjkpwN8wWL1Vtm7F
 hDll4FvOYRDj8O_b8z1Wuaa2nftBh59S76ioJamOI8YgS.6kSRXnDmvk87LGkiJLXzSr.SdgO0r1
 vMGwxiRplMC7N.UMq8U8uvhB2w.n4lEoxq3hQZmh2zLQkvs0R7JvLrSDmKTLfrOwMy8jqJTKyLuc
 ouPbEd7nKoy6J5U.j89UfwnfwQoNS6v6x6ju2ZBgnOUXr4YFqePHfdbkR5Z0CP0ydcupFr9lP6Qg
 wT.WG744rrbhKQAaFBXB7r1UyDrJ8hgN8E7IbLOqeQhVZu4nlNGoYUTydPl0Hk8uxwqCdCOeFpPn
 1FjcagD9cRqJynY2gAv8k37UVcjenREQ81_r253U9KOOzRXJ1RkYtA9wPCc.u7vSIoteqezG9jDS
 1fkbey98NCfm4t0_Qj1.y0qhJVDq30s1J3WdtYcZPq4hNdcsgJBm9Mq1fGpRxHyfE4inPEIMpYwk
 XKpVlml4fpl7LRolQlagW3CnC9MZWRHhZ45pxe3g8dN5smU2Ed1287jDiYBedtxnf5oBa1YkO10K
 NguYM5Rt3Pf.suycGcGyxoISxxlIswXQl_SJYs7YGkBDz6TbJXhaFdlN4P6cLb8p7S9dKmsr7r_l
 hkgeyGWS0R886Io2Nmzx3en_Zf9sQhnuMcp91XQtJ04p5ujLp.JS3..kgsUShuoQ9vP6NDQQFEfd
 2_tYCM.IIPBOrWq0rJSTH_EOhx7RjHVzFMaj.cifjRJ8tFQPJ_YtZ6b1pwAEgYLdAxmNCqBqzOz0
 yK5AgXCmTxaQUlNgB1gwBsWLiW22rOUquVv5yIOgfZHUoeESLSI4Id31RraVKIWYMGK3Kpo_Ew_p
 eJLF8o8jaKYHqyUeJN_c_DsG1gbZPI_MpOflRURHKnHdiO7T88d9L4EUX19i783f8WsqAUpDPlXk
 VD2nZmtpSLBshg4xWh5.cbQ4NShq3dHIelQyI.oj88JnJehVo.3hMWpwp8xUN3ZvaXE3wKvRsjMg
 TjrhphBY1sY7q_A1z1AOcpOb9jBYbuDK9W8z3N4PmxOrMml8DrtOLqNziBzVolweQT_XORMfOMN8
 ntkk5eMbA05YGTEQuCLOGGd2c5cppkdRuSzU.lsJ.ssvIRldJLgLCsvHll7oDkCTLNPSC0KXn3.u
 DeiLogBMBVca7ZtLUAhDuUkddrh_1npDxEpWs2vjci8gCIJTmOctDcBhIFZrd8d4OdqJOrlxrBhT
 dkhd0GoOnMQKo.QugoNKKDGcC191K64VMPq0gLjMNfFYKAlslSoWJODGcc3Xe6h5KFQ_iFFRkuzK
 B25IV0N4LNNQoGCHmSn_5niILWoHZQ5v0N9uDo60_7AqrZQnQzaW5El3tDzfGiw9hQr27EqwoU7_
 3dj0ZV7fn3rkMANz_32yZK0r2uB5VC5BG7KylOKfYqiP8K6gmrDZUCpvx.TCAqCW.cszTPErKJGM
 WNzH6iJMyFfpaKPvx9VE-
X-Sonic-MF: <brchuckz@aim.com>
Message-ID: <ea5c1606-04d3-c847-643e-d242d8f6ba06@netscape.net>
Date: Thu, 31 Mar 2022 15:44:33 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [XEN PATCH] tools/libs/light/libxl_pci.c: explicitly grant access
 to Intel IGD opregion
Content-Language: en-US
To: Jason Andryuk <jandryuk@gmail.com>
Cc: Andrew Cooper <amc96@srcf.net>, Anthony PERARD
 <anthony.perard@citrix.com>, xen-devel <xen-devel@lists.xenproject.org>,
 Wei Liu <wl@xen.org>, Juergen Gross <jgross@suse.com>,
 Jan Beulich <jbeulich@suse.com>
References: <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz.ref@netscape.net>
 <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz@netscape.net>
 <YkSQIoYhomhNKpYR@perard.uk.xensource.com>
 <408e5e07-453c-f377-a5b0-c421d002aec5@srcf.net>
 <46a8585e-2a2a-4d12-f221-e57bd157dec6@netscape.net>
 <CAKf6xpths4SX4wq-j4VhnXZnx0DW=468z3=9FYHso=Wy1i_Rsg@mail.gmail.com>
 <da62d06d-fd18-a313-9e69-2a4581e97c1a@netscape.net>
 <CAKf6xptZ9g79MphwYPAGq6ATBtCrW+pCd5+NYJPdFniW+tFzPg@mail.gmail.com>
From: Chuck Zmudzinski <brchuckz@netscape.net>
In-Reply-To: <CAKf6xptZ9g79MphwYPAGq6ATBtCrW+pCd5+NYJPdFniW+tFzPg@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Mailer: WebService/1.1.20001 mail.backend.jedi.jws.acl:role.jedi.acl.token.atz.jws.hermes.aol
Content-Length: 1294

On 3/31/22 10:19 AM, Jason Andryuk wrote:
> On Thu, Mar 31, 2022 at 10:05 AM Chuck Zmudzinski <brchuckz@netscape.net> wrote:
>>
>> That still doesn't answer my question - will the Qemu upstream
>> accept the patches that move the hypercalls to the toolstack? If
>> not, we have to live with what we have now, which is that the
>> hypercalls are done in Qemu.
> Xen-associated people maintain hw/xen code in QEMU, so yes it could be accepted.
>
> Maybe it would need to be backwards compatible to have libxl check the
> QEMU version to decide who makes the hypercall?  Unless it is broken
> today, in which case just make it work.
>
> Regards,
> Jason

I know of another reason to check the Qemu upstream version,
and that is dealing with deprecated / removed device model
options that xl.cfg still uses. I looked at that a few years ago
with regard to the deprecated 'usbdevice tablet' Qemu option,
but I did not see anything in libxl to distinguish Qemu versions
except for upstream vs. traditional. AFAICT, detecting traditional
vs. upstream Qemu depends solely on the device_model_version
xl.cfg setting. So it might be useful for libxl to add the capability
to detect the upstream Qemu version or at least create an xl.cfg
setting to inform libxl about the Qemu version.

Regards,

Chuck



From xen-devel-bounces@lists.xenproject.org Thu Mar 31 20:13:05 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 20:13:05 +0000
Received: from list by lists.xenproject.org with outflank-mailman.297083.505938 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1na1AA-0002q5-MX; Thu, 31 Mar 2022 20:12:58 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 297083.505938; Thu, 31 Mar 2022 20:12:58 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1na1AA-0002py-Jf; Thu, 31 Mar 2022 20:12:58 +0000
Received: by outflank-mailman (input) for mailman id 297083;
 Thu, 31 Mar 2022 20:12:57 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>) id 1na1A9-0002ps-QM
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 20:12:57 +0000
Received: from xenbits.xenproject.org ([104.239.192.120])
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1na1A7-0005bc-SK; Thu, 31 Mar 2022 20:12:55 +0000
Received: from 54-240-197-233.amazon.com ([54.240.197.233]
 helo=[192.168.12.206]) by xenbits.xenproject.org with esmtpsa
 (TLS1.3:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.92)
 (envelope-from <julien@xen.org>)
 id 1na1A7-0000Ke-MU; Thu, 31 Mar 2022 20:12:55 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=xen.org;
	s=20200302mail; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:
	References:Cc:To:From:Subject:MIME-Version:Date:Message-ID;
	bh=OpFVtMJCSN1ezlKcJsL3rPmuR9lCtt19nHkG0KXRWM8=; b=TvsIJEwW9TPDIt2eKKUEaVxsqG
	Rol0+dBi8BHLZBthGyBAh8cJoE5aX/D7QMvZtu8YXA1N4TKbzrxybDvS5jXxd0bnOZa3LB/Xhf4dQ
	mb1KCUVNFIz3Lc1k4gAjRykLmSwcXvNXJebOcTmVUCEpuhfOZC7j9e99oUoiO6GO6iFI=;
Message-ID: <e4b554db-5adf-91c3-476f-05721e74c069@xen.org>
Date: Thu, 31 Mar 2022 21:12:53 +0100
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0)
 Gecko/20100101 Thunderbird/91.7.0
Subject: Re: OS Headers hypercall.h/hypervisor.h
From: Julien Grall <julien@xen.org>
To: Elliott Mitchell <ehem+xen@m5p.com>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
 xen-devel@lists.xenproject.org, Jan Beulich <jbeulich@suse.com>
References: <Yj+ekdLdRa9U7dfa@mattapan.m5p.com>
 <alpine.DEB.2.22.394.2203281523230.2910984@ubuntu-linux-20-04-desktop>
 <c999faa3-ded7-64af-7bf1-f6b8e5620425@suse.com>
 <YkUAlWH6imVV9D00@mattapan.m5p.com>
 <701a0bdc-a8d3-06c3-7e40-e741dfa45361@xen.org>
In-Reply-To: <701a0bdc-a8d3-06c3-7e40-e741dfa45361@xen.org>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit



On 31/03/2022 09:44, Julien Grall wrote:
> On 31/03/2022 02:15, Elliott Mitchell wrote:
>> On Tue, Mar 29, 2022 at 08:27:24AM +0200, Jan Beulich wrote:
>>> On 29.03.2022 00:25, Stefano Stabellini wrote:
>>>> On Sat, 26 Mar 2022, Elliott Mitchell wrote:
>>>>> The hypercalls implementation for Linux and FreeBSD have two key 
>>>>> headers,
>>>>> hypercall.h and hypervisor.h.  I'm curious why the implementations for
>>>>> x86 and ARM* are so distinct.
>>>>>
>>>>> I found it fairly straightforward to implement ARM* versions of the 
>>>>> x86
>>>>> _hypercall#() macros.  Once that is done, most of the wrappers in 
>>>>> the x86
>>>>> hypercall.h can be moved to a shared hypervisor.h header.
>>>>>
>>>>> Why does Xen/ARM on Linux still have hypercall.S when merging the
>>>>> headers should reduce maintainance?
>>>>>
>>>>> Was GCC extended inline assembly language for ARM* thought too awful?
>>>>>
>>>>> I'm also curious why these headers are part of the Linux kernel, 
>>>>> instead
>>>>> of being maintained by the Xen Project?
>>>>
>>>> I would have to dig through ancient archives to give you a full answer
>>>> but the reason was that the asm inline on ARM didn't provide enough
>>>> guarantees on ordering and registers it would use and clobber.
>>>
>>> While there may be ordering issues (albeit most ought to be taken care
>>> of by marking the asm() volatile and having it have a memory clobber),
>>> registers used / clobbered ought to always be expressable by asm() -
>>> if not by constraints covering just a single register (such frequently
>>> simply don't exist), then by using register variables tied to a
>>> particular register. Of course in all of this there's an assumption of
>>> no bugs in this area in the compilers claimed as being supported ...
>>
>> I'm merely been working with recent versions of Clang on FreeBSD, but
>> I've got something which appears to work.
>>
>> I would be somewhat hopeful GCC might have fewer bugs on ARM as
>> registers aren't so precious.  Yet that could well be a minefield.
> 
> Linux and Xen have already some code heavily using inline assembly for 
> the SMCCC v1.1 helpers. So, in theory, it should be possible to convert 
> the hypercall to use inline assembly helpers.
> 
> Unlike SMCCC v1.1, the hypercalls are following the AAPCS. So by using 
> the assembly wrapper we don't have to worry on what to save as the 
> compiler will automatically know what to do. Looking at 
> xen/include/public/arch-arm.h, we may be able to reduce the numbers of 
> registers to preserve. So it would be more interesting to switch to 
> inline assembly to reduce the number of instructions.
> 
> That said, we also need to be mindful of straigh-line speculation with 
> HVC instruction. With the inline version, the speculation barrier (sb or 
> dsb/isb) would need to be architecturally executed. With the assembly 
> wrapper, I believe we could only speculatively execute it by adding 
> after the ret.

Please ignore this bit. Digging through my e-mails, I found the private 
discussion regarding this mitigation. Below what I wrote back in 2020:

"The barrier-after-RET is only here to protect against straight-line
speculation of the RET instruction. Not the SMC.

If you have a processor that will always do straight-line speculation
for both the SMC and the RET, then yes the barrier afterwards will block
further speculation.

But let's imagine you have an hypothetical processor that only do
straight-line speculation for the SMC. For the RET instruction, it will
instead decide to speculatively fetch and execute the instructions
pointed out by LR.

This means that the barrier after the RET would never get fetched or
executed speculatively. In this case, there would be no barrier to
speculate even further and reach a potential reveal gadget."

So if we need to mitigate the straight-line-speculation, we would need a 
speculation barrier right after SMC/HVC regardless the approach.

I will have a look at the header Elliott shared.

Cheers,

-- 
Julien Grall


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 20:30:26 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 20:30:26 +0000
Received: from list by lists.xenproject.org with outflank-mailman.297088.505949 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1na1Qy-000587-7K; Thu, 31 Mar 2022 20:30:20 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 297088.505949; Thu, 31 Mar 2022 20:30:20 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1na1Qy-000580-4D; Thu, 31 Mar 2022 20:30:20 +0000
Received: by outflank-mailman (input) for mailman id 297088;
 Thu, 31 Mar 2022 20:30:18 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from
 <SRS0=3Cq/=UK=kernel.org=sstabellini@srs-se1.protection.inumbo.net>)
 id 1na1Qw-00057u-A2
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 20:30:18 +0000
Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 5f824fa5-b131-11ec-a405-831a346695d4;
 Thu, 31 Mar 2022 22:30:16 +0200 (CEST)
Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by dfw.source.kernel.org (Postfix) with ESMTPS id 02BDB61B14;
 Thu, 31 Mar 2022 20:30:15 +0000 (UTC)
Received: by smtp.kernel.org (Postfix) with ESMTPSA id 45FD1C340ED;
 Thu, 31 Mar 2022 20:30:14 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 5f824fa5-b131-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;
	s=k20201202; t=1648758614;
	bh=alLNeF+S4k4m2T49yVE8U4BLjfV7gBvIRvXGKneeoSA=;
	h=Date:From:To:cc:Subject:In-Reply-To:References:From;
	b=OPl5AdUGOYHYQq0gO6zixswHC5heDi5M8KoPV0J6NPX+Hze6JHD4/dR2tsbOj1kcm
	 UaZ436mc7+ncvZmfnf5maPpJpREJY8mzLbGo2aRH5fIH0IeYIn/AbQD4rUw5KnIdCM
	 MQL0gkwvHVO1lEE7nggsncHWy3AiqyOVI0S00D6ieDwCVHftRWGPFdLfXewGlizx0h
	 d1X/QpXXXzh9eNq16fXAwiMa7pR9rGOufG9GxRDX9U2xLrYAA/razqXYlYyM3br52V
	 vrrlgL/23kHsGE96l7U2EeY1xlhx40DO1Zhw4dYxCGTprKvFQ8Pz6trfsC1V6b4yBR
	 q5DnZCoHhHS6w==
Date: Thu, 31 Mar 2022 13:30:13 -0700 (PDT)
From: Stefano Stabellini <sstabellini@kernel.org>
X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop
To: Julien Grall <julien@xen.org>
cc: =?UTF-8?Q?Roger_Pau_Monn=C3=A9?= <roger.pau@citrix.com>, 
    "Daniel P. Smith" <dpsmith@apertussolutions.com>, 
    Volodymyr Babchuk <Volodymyr_Babchuk@epam.com>, Wei Liu <wl@xen.org>, 
    xen-devel@lists.xenproject.org, scott.davis@starlab.io, jandryuk@gmail.com, 
    Stefano Stabellini <sstabellini@kernel.org>, 
    Jan Beulich <jbeulich@suse.com>, Andrew Cooper <andrew.cooper3@citrix.com>
Subject: Re: [PATCH 2/2] arch: ensure idle domain is not left privileged
In-Reply-To: <bb93b930-8287-6e8f-98b5-4b3f3c8e6eaf@xen.org>
Message-ID: <alpine.DEB.2.22.394.2203311325420.2910984@ubuntu-linux-20-04-desktop>
References: <20220330230549.26074-1-dpsmith@apertussolutions.com> <20220330230549.26074-3-dpsmith@apertussolutions.com> <YkWijXX9P1FSs61W@Air-de-Roger> <bb93b930-8287-6e8f-98b5-4b3f3c8e6eaf@xen.org>
User-Agent: Alpine 2.22 (DEB 394 2020-01-19)
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="8323329-641972864-1648758615=:2910984"

  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--8323329-641972864-1648758615=:2910984
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8BIT

On Thu, 31 Mar 2022, Julien Grall wrote:
> On 31/03/2022 13:46, Roger Pau Monné wrote:
> > On Wed, Mar 30, 2022 at 07:05:49PM -0400, Daniel P. Smith wrote:
> > > It is now possible to promote the idle domain to privileged during setup.
> > > It
> > > is not desirable for the idle domain to still be privileged when moving
> > > into a
> > > running state. If the idle domain was elevated and not properly demoted,
> > > it is
> > > desirable to fail at this point. This commit adds an assert for both x86
> > > and
> > > Arm just before transitioning to a running state that ensures the idle is
> > > not
> > > privileged.
> > > 
> > > Signed-off-by: Daniel P. Smith <dpsmith@apertussolutions.com>
> > > ---
> > >   xen/arch/arm/setup.c | 3 +++
> > >   xen/arch/x86/setup.c | 3 +++
> > >   2 files changed, 6 insertions(+)
> > > 
> > > diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c
> > > index 7968cee47d..3de394e946 100644
> > > --- a/xen/arch/arm/setup.c
> > > +++ b/xen/arch/arm/setup.c
> > > @@ -973,6 +973,9 @@ void __init start_xen(unsigned long boot_phys_offset,
> > >       /* Hide UART from DOM0 if we're using it */
> > >       serial_endboot();
> > >   +    /* Ensure idle domain was not left privileged */
> > > +    ASSERT(current->domain->is_privileged == false) ;
> > > +
> > >       system_state = SYS_STATE_active;
> > >         create_domUs();
> > 
> > Hm, I think you want to use the permission promotion of the idle
> > domain in create_domUs() likely?
> > 
> > At which point the check should be after create_domUs, and it would
> > seem that logically SYS_STATE_active should be set after creating the
> > domUs.
> > 
> > Also, FWIW, I'm not seeing this create_domUs() call in my context,
> > maybe you have other patches on your queue?
> I think the code is based on an old version of Xen (looks like 4.14). In newer
> version create_domUs() is called before just before discard_initial_modules()
> (see XSA-372 for the rationale).
> 
> Daniel, can you please rebase this series to the latest staging?

Yeah they should be rebased. I have done it so that I could test this
approach as well, see attached.

I also added a patch that calls:

  xsm_elevate_priv(current->domain);

at the beginning of create_domUs, then calls:

  xsm_demote_priv(current->domain);

at the end of create_domUs.

With all that in place, dom0less+PV drivers works fine.

Note that I don't know if we want to do this within create_domUs of if
there is a better place, I was just trying to make sure everything works
as expected.
--8323329-641972864-1648758615=:2910984
Content-Type: text/x-diff; name=0001-xsm-add-ability-to-elevate-a-domain-to-privileged.patch
Content-Transfer-Encoding: BASE64
Content-ID: <alpine.DEB.2.22.394.2203311330130.2910984@ubuntu-linux-20-04-desktop>
Content-Description: 
Content-Disposition: attachment; filename=0001-xsm-add-ability-to-elevate-a-domain-to-privileged.patch
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--8323329-641972864-1648758615=:2910984
Content-Type: text/x-diff; name=0002-arch-ensure-idle-domain-is-not-left-privileged.patch
Content-Transfer-Encoding: BASE64
Content-ID: <alpine.DEB.2.22.394.2203311330131.2910984@ubuntu-linux-20-04-desktop>
Content-Description: 
Content-Disposition: attachment; filename=0002-arch-ensure-idle-domain-is-not-left-privileged.patch
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--8323329-641972864-1648758615=:2910984
Content-Type: text/x-diff; name=0003-xen-arm-temporarily-elevate-idle_domain-privileged-d.patch
Content-Transfer-Encoding: BASE64
Content-ID: <alpine.DEB.2.22.394.2203311330132.2910984@ubuntu-linux-20-04-desktop>
Content-Description: 
Content-Disposition: attachment; filename=0003-xen-arm-temporarily-elevate-idle_domain-privileged-d.patch
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--8323329-641972864-1648758615=:2910984--


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 22:05:37 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 22:05:37 +0000
Received: from list by lists.xenproject.org with outflank-mailman.297099.505977 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1na2uv-0005WC-8D; Thu, 31 Mar 2022 22:05:21 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 297099.505977; Thu, 31 Mar 2022 22:05:21 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1na2uv-0005W5-5A; Thu, 31 Mar 2022 22:05:21 +0000
Received: by outflank-mailman (input) for mailman id 297099;
 Thu, 31 Mar 2022 22:05:20 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1na2uu-0005Vv-7K; Thu, 31 Mar 2022 22:05:20 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1na2uu-0007T6-4W; Thu, 31 Mar 2022 22:05:20 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1na2ut-0007MU-OX; Thu, 31 Mar 2022 22:05:19 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1na2ut-0005IM-O3; Thu, 31 Mar 2022 22:05:19 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=f/FKn0ryTrQ0J6GAGn6YvS/nKpO3m7C4xGSR+0pBTzc=; b=G8Mar/yAtklozEu60I6Z2TpQI3
	TPuhEZphEgodsQwRFzy9yLAkMG4mHussx0ws58C4kAsRvEyXT3ftw/Fg6eVZWGnIJLmiQF5c/hH0q
	FNzR4gi1n0gBKl85BblhCwMZFyr3Al+DVP6+5wjd79zhcfa+MSQjitPjPVy9x3YVjMJQ=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-169058-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [libvirt test] 169058: regressions - FAIL
X-Osstest-Failures:
    libvirt:build-armhf-libvirt:libvirt-build:fail:regression
    libvirt:build-amd64-libvirt:libvirt-build:fail:regression
    libvirt:build-i386-libvirt:libvirt-build:fail:regression
    libvirt:build-arm64-libvirt:libvirt-build:fail:regression
    libvirt:test-amd64-amd64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-vhd:build-check(1):blocked:nonblocking
    libvirt:test-amd64-amd64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-pair:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-amd64-i386-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-qcow2:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-raw:build-check(1):blocked:nonblocking
    libvirt:test-arm64-arm64-libvirt-xsm:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt:build-check(1):blocked:nonblocking
    libvirt:test-armhf-armhf-libvirt-qcow2:build-check(1):blocked:nonblocking
X-Osstest-Versions-This:
    libvirt=3832db21084661d00438dfbb4bad865816157dd9
X-Osstest-Versions-That:
    libvirt=2c846fa6bcc11929c9fb857a22430fb9945654ad
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 31 Mar 2022 22:05:19 +0000

flight 169058 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/169058/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-armhf-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-amd64-libvirt           6 libvirt-build            fail REGR. vs. 151777
 build-i386-libvirt            6 libvirt-build            fail REGR. vs. 151777
 build-arm64-libvirt           6 libvirt-build            fail REGR. vs. 151777

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-libvirt      1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-amd64-libvirt-vhd  1 build-check(1)               blocked  n/a
 test-amd64-amd64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt       1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-pair  1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 1 build-check(1) blocked n/a
 test-amd64-i386-libvirt-raw   1 build-check(1)               blocked  n/a
 test-amd64-i386-libvirt-xsm   1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt      1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-qcow2  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-raw  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-raw  1 build-check(1)               blocked  n/a
 test-arm64-arm64-libvirt-xsm  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt      1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-qcow2  1 build-check(1)               blocked  n/a

version targeted for testing:
 libvirt              3832db21084661d00438dfbb4bad865816157dd9
baseline version:
 libvirt              2c846fa6bcc11929c9fb857a22430fb9945654ad

Last test of basis   151777  2020-07-10 04:19:19 Z  629 days
Failing since        151818  2020-07-11 04:18:52 Z  628 days  610 attempts
Testing same since   169058  2022-03-31 04:19:24 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
    Adolfo Jayme Barrientos <fitoschido@gmail.com>
  Aleksandr Alekseev <alexander.alekseev@virtuozzo.com>
  Aleksei Zakharov <zaharov@selectel.ru>
  Andika Triwidada <andika@gmail.com>
  Andrea Bolognani <abologna@redhat.com>
  Ani Sinha <ani@anisinha.ca>
  Balázs Meskó <meskobalazs@mailbox.org>
  Barrett Schonefeld <bschoney@utexas.edu>
  Bastian Germann <bastiangermann@fishpost.de>
  Bastien Orivel <bastien.orivel@diateam.net>
  BiaoXiang Ye <yebiaoxiang@huawei.com>
  Bihong Yu <yubihong@huawei.com>
  Binfeng Wu <wubinfeng@huawei.com>
  Bjoern Walk <bwalk@linux.ibm.com>
  Boris Fiuczynski <fiuczy@linux.ibm.com>
  Brad Laue <brad@brad-x.com>
  Brian Turek <brian.turek@gmail.com>
  Bruno Haible <bruno@clisp.org>
  Chris Mayo <aklhfex@gmail.com>
  Christian Borntraeger <borntraeger@de.ibm.com>
  Christian Ehrhardt <christian.ehrhardt@canonical.com>
  Christian Kirbach <christian.kirbach@gmail.com>
  Christian Schoenebeck <qemu_oss@crudebyte.com>
  Christophe Fergeau <cfergeau@redhat.com>
  Claudio Fontana <cfontana@suse.de>
  Cole Robinson <crobinso@redhat.com>
  Collin Walling <walling@linux.ibm.com>
  Cornelia Huck <cohuck@redhat.com>
  Cédric Bosdonnat <cbosdonnat@suse.com>
  Côme Borsoi <fedora@borsoi.fr>
  Daniel Henrique Barboza <danielhb413@gmail.com>
  Daniel Letai <dani@letai.org.il>
  Daniel P. Berrange <berrange@redhat.com>
  Daniel P. Berrangé <berrange@redhat.com>
  Didik Supriadi <didiksupriadi41@gmail.com>
  dinglimin <dinglimin@cmss.chinamobile.com>
  Divya Garg <divya.garg@nutanix.com>
  Dmitrii Shcherbakov <dmitrii.shcherbakov@canonical.com>
  Dmytro Linkin <dlinkin@nvidia.com>
  Eiichi Tsukata <eiichi.tsukata@nutanix.com>
  Emilio Herrera <ehespinosa57@gmail.com>
  Eric Farman <farman@linux.ibm.com>
  Erik Skultety <eskultet@redhat.com>
  Fabian Affolter <mail@fabian-affolter.ch>
  Fabian Freyer <fabian.freyer@physik.tu-berlin.de>
  Fabiano Fidêncio <fabiano@fidencio.org>
  Fangge Jin <fjin@redhat.com>
  Farhan Ali <alifm@linux.ibm.com>
  Fedora Weblate Translation <i18n@lists.fedoraproject.org>
  Franck Ridel <fridel@protonmail.com>
  Gavi Teitz <gavi@nvidia.com>
  gongwei <gongwei@smartx.com>
  Guoyi Tu<tu.guoyi@h3c.com>
  Göran Uddeborg <goeran@uddeborg.se>
  Halil Pasic <pasic@linux.ibm.com>
  Han Han <hhan@redhat.com>
  Hao Wang <wanghao232@huawei.com>
  Haonan Wang <hnwanga1@gmail.com>
  Hela Basa <r45xveza@pm.me>
  Helmut Grohne <helmut@subdivi.de>
  Hiroki Narukawa <hnarukaw@yahoo-corp.jp>
  Hyman Huang(黄勇) <huangy81@chinatelecom.cn>
  Ian Wienand <iwienand@redhat.com>
  Ioanna Alifieraki <ioanna-maria.alifieraki@canonical.com>
  Ivan Teterevkov <ivan.teterevkov@nutanix.com>
  Jakob Meng <jakobmeng@web.de>
  Jamie Strandboge <jamie@canonical.com>
  Jamie Strandboge <jamie@ubuntu.com>
  Jan Kuparinen <copper_fin@hotmail.com>
  jason lee <ppark5237@gmail.com>
  Jean-Baptiste Holcroft <jean-baptiste@holcroft.fr>
  Jia Zhou <zhou.jia2@zte.com.cn>
  Jianan Gao <jgao@redhat.com>
  Jim Fehlig <jfehlig@suse.com>
  Jin Yan <jinyan12@huawei.com>
  Jing Qi <jinqi@redhat.com>
  Jinsheng Zhang <zhangjl02@inspur.com>
  Jiri Denemark <jdenemar@redhat.com>
  Joachim Falk <joachim.falk@gmx.de>
  John Ferlan <jferlan@redhat.com>
  John Levon <john.levon@nutanix.com>
  John Levon <levon@movementarian.org>
  Jonathan Watt <jwatt@jwatt.org>
  Jonathon Jongsma <jjongsma@redhat.com>
  Julio Faracco <jcfaracco@gmail.com>
  Justin Gatzen <justin.gatzen@gmail.com>
  Ján Tomko <jtomko@redhat.com>
  Kashyap Chamarthy <kchamart@redhat.com>
  Kevin Locke <kevin@kevinlocke.name>
  Kim InSoo <simmon@nplob.com>
  Koichi Murase <myoga.murase@gmail.com>
  Kristina Hanicova <khanicov@redhat.com>
  Laine Stump <laine@redhat.com>
  Laszlo Ersek <lersek@redhat.com>
  Lee Yarwood <lyarwood@redhat.com>
  Lei Yang <yanglei209@huawei.com>
  Liao Pingfang <liao.pingfang@zte.com.cn>
  Lin Ma <lma@suse.com>
  Lin Ma <lma@suse.de>
  Lin Ma <morecache@gmail.com>
  Liu Yiding <liuyd.fnst@fujitsu.com>
  Lubomir Rintel <lkundrak@v3.sk>
  Luke Yue <lukedyue@gmail.com>
  Luyao Zhong <luyao.zhong@intel.com>
  Marc Hartmayer <mhartmay@linux.ibm.com>
  Marc-André Lureau <marcandre.lureau@redhat.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Markus Schade <markus.schade@hetzner.com>
  Martin Kletzander <mkletzan@redhat.com>
  Martin Pitt <mpitt@debian.org>
  Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
  Matej Cepl <mcepl@cepl.eu>
  Matt Coleman <matt@datto.com>
  Matt Coleman <mcoleman@datto.com>
  Mauro Matteo Cascella <mcascell@redhat.com>
  Meina Li <meili@redhat.com>
  Michal Privoznik <mprivozn@redhat.com>
  Michał Smyk <fedora@smyk.it>
  Milo Casagrande <milo@milo.name>
  Moshe Levi <moshele@nvidia.com>
  Muha Aliss <muhaaliss@gmail.com>
  Nathan <nathan95@live.it>
  Neal Gompa <ngompa13@gmail.com>
  Nick Chevsky <nchevsky@gmail.com>
  Nick Shyrokovskiy <nshyrokovskiy@gmail.com>
  Nickys Music Group <nickys.music.group@gmail.com>
  Nico Pache <npache@redhat.com>
  Nicolas Lécureuil <neoclust@mageia.org>
  Nicolas Lécureuil <nicolas.lecureuil@siveo.net>
  Nikolay Shirokovskiy <nshirokovskiy@virtuozzo.com>
  Olaf Hering <olaf@aepfle.de>
  Olesya Gerasimenko <gammaray@basealt.ru>
  Or Ozeri <oro@il.ibm.com>
  Orion Poplawski <orion@nwra.com>
  Pany <geekpany@gmail.com>
  Paolo Bonzini <pbonzini@redhat.com>
  Patrick Magauran <patmagauran.j@gmail.com>
  Paulo de Rezende Pinatti <ppinatti@linux.ibm.com>
  Pavel Hrdina <phrdina@redhat.com>
  Peng Liang <liangpeng10@huawei.com>
  Peter Krempa <pkrempa@redhat.com>
  Pino Toscano <ptoscano@redhat.com>
  Pino Toscano <toscano.pino@tiscali.it>
  Piotr Drąg <piotrdrag@gmail.com>
  Prathamesh Chavan <pc44800@gmail.com>
  Praveen K Paladugu <prapal@linux.microsoft.com>
  Richard W.M. Jones <rjones@redhat.com>
  Ricky Tigg <ricky.tigg@gmail.com>
  Robin Lee <cheeselee@fedoraproject.org>
  Rohit Kumar <rohit.kumar3@nutanix.com>
  Roman Bogorodskiy <bogorodskiy@gmail.com>
  Roman Bolshakov <r.bolshakov@yadro.com>
  Ryan Gahagan <rgahagan@cs.utexas.edu>
  Ryan Schmidt <git@ryandesign.com>
  Sam Hartman <hartmans@debian.org>
  Scott Shambarger <scott-libvirt@shambarger.net>
  Sebastian Mitterle <smitterl@redhat.com>
  SeongHyun Jo <caelus9536@gmail.com>
  Shalini Chellathurai Saroja <shalini@linux.ibm.com>
  Shaojun Yang <yangshaojun@phytium.com.cn>
  shenjiatong <yshxxsjt715@gmail.com>
  Shi Lei <shi_lei@massclouds.com>
  simmon <simmon@nplob.com>
  Simon Chopin <chopin.simon@gmail.com>
  Simon Gaiser <simon@invisiblethingslab.com>
  Simon Rowe <simon.rowe@nutanix.com>
  Stefan Bader <stefan.bader@canonical.com>
  Stefan Berger <stefanb@linux.ibm.com>
  Stefan Berger <stefanb@linux.vnet.ibm.com>
  Stefan Hajnoczi <stefanha@gmail.com>
  Stefan Hajnoczi <stefanha@redhat.com>
  Szymon Scholz <szymonscholz@gmail.com>
  Thomas Huth <thuth@redhat.com>
  Tim Wiederhake <twiederh@redhat.com>
  Tom Wieczorek <tom@bibbu.net>
  Tomáš Golembiovský <tgolembi@redhat.com>
  Tomáš Janoušek <tomi@nomi.cz>
  Tu Qiang <tu.qiang35@zte.com.cn>
  Tuguoyi <tu.guoyi@h3c.com>
  tuqiang <tu.qiang35@zte.com.cn>
  Vasiliy Ulyanov <vulyanov@suse.de>
  Victor Toso <victortoso@redhat.com>
  Ville Skyttä <ville.skytta@iki.fi>
  Vinayak Kale <vkale@nvidia.com>
  Vineeth Pillai <viremana@linux.microsoft.com>
  Wang Xin <wangxinxin.wang@huawei.com>
  WangJian <wangjian161@huawei.com>
  Weblate <noreply@weblate.org>
  Wei Liu <liuwe@microsoft.com>
  Wei Liu <wei.liu@kernel.org>
  Wei-Chen Chen <weicche@microsoft.com>
  William Douglas <william.douglas@intel.com>
  Xu Chao <xu.chao6@zte.com.cn>
  Yalei Li <274268859@qq.com>
  Yalei Li <liyl43@chinatelecom.cn>
  Yang Fei <yangfei85@huawei.com>
  Yang Hang <yanghang44@huawei.com>
  Yanqiu Zhang <yanqzhan@redhat.com>
  Yaroslav Kargin <ykargin@virtuozzo.com>
  Yasuhiko Kamata <belphegor@belbel.or.jp>
  Yi Li <yili@winhong.com>
  Yi Wang <wang.yi59@zte.com.cn>
  Yuri Chornoivan <yurchor@ukr.net>
  Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>
  zhangjl02 <zhangjl02@inspur.com>
  zhanglei <zhanglei@smartx.com>
  Zheng Chuan <zhengchuan@huawei.com>
  zhenwei pi <pizhenwei@bytedance.com>
  Zhenyu Ye <yezhenyu2@huawei.com>
  Zhenyu Zheng <zheng.zhenyu@outlook.com>
  Zhenzhong Duan <zhenzhong.duan@intel.com>
  Дамјан Георгиевски <gdamjan@gmail.com>
  김인수 <simmon@nplob.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          fail    
 build-arm64-libvirt                                          fail    
 build-armhf-libvirt                                          fail    
 build-i386-libvirt                                           fail    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           blocked 
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            blocked 
 test-amd64-amd64-libvirt-xsm                                 blocked 
 test-arm64-arm64-libvirt-xsm                                 blocked 
 test-amd64-i386-libvirt-xsm                                  blocked 
 test-amd64-amd64-libvirt                                     blocked 
 test-arm64-arm64-libvirt                                     blocked 
 test-armhf-armhf-libvirt                                     blocked 
 test-amd64-i386-libvirt                                      blocked 
 test-amd64-amd64-libvirt-pair                                blocked 
 test-amd64-i386-libvirt-pair                                 blocked 
 test-arm64-arm64-libvirt-qcow2                               blocked 
 test-armhf-armhf-libvirt-qcow2                               blocked 
 test-arm64-arm64-libvirt-raw                                 blocked 
 test-armhf-armhf-libvirt-raw                                 blocked 
 test-amd64-i386-libvirt-raw                                  blocked 
 test-amd64-amd64-libvirt-vhd                                 blocked 


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 102484 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 23:13:42 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 23:13:42 +0000
Received: from list by lists.xenproject.org with outflank-mailman.297110.505995 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1na3yr-0004At-L9; Thu, 31 Mar 2022 23:13:29 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 297110.505995; Thu, 31 Mar 2022 23:13:29 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1na3yr-0004Am-Hp; Thu, 31 Mar 2022 23:13:29 +0000
Received: by outflank-mailman (input) for mailman id 297110;
 Thu, 31 Mar 2022 23:13:27 +0000
Received: from mail.xenproject.org ([104.130.215.37])
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1na3yp-0004Ac-Tv; Thu, 31 Mar 2022 23:13:27 +0000
Received: from host146.205.237.98.conversent.net ([205.237.98.146]
 helo=infra.test-lab.xenproject.org)
 by mail.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1na3yp-00008j-P2; Thu, 31 Mar 2022 23:13:27 +0000
Received: from [172.16.148.1] (helo=osstest.test-lab.xenproject.org)
 by infra.test-lab.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <osstest-admin@xenproject.org>)
 id 1na3yp-0002Br-BF; Thu, 31 Mar 2022 23:13:27 +0000
Received: from osstest by osstest.test-lab.xenproject.org with local (Exim
 4.92) (envelope-from <osstest-admin@xenproject.org>)
 id 1na3yp-000261-Am; Thu, 31 Mar 2022 23:13:27 +0000
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;
	d=xenproject.org; s=20200302mail; h=Date:From:Subject:MIME-Version:
	Content-Transfer-Encoding:Content-Type:Message-ID:To;
	bh=3cno8OiThQMuOZztHFBnjM7vZblcH0QuG/jaykHZt9c=; b=Br+FktpWnWcD74CBgeE3u99phO
	pR3kUQy17uCFzC91Wdhs4geMz1hXsuqqZ9XPIb7FpFV/pdja9P7kgn8H37wynh3E+eWVqiAN3DWiy
	PNXT2zXZ6t8Eibm7GrAD6R01wL8QSJwBzsfq7dt2AN+59cIAyUu23KTvqPoHOvyDMB0o=;
To: xen-devel@lists.xenproject.org
Message-ID: <osstest-169048-mainreport@xen.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
MIME-Version: 1.0
Subject: [xen-4.16-testing test] 169048: regressions - FAIL
X-Osstest-Failures:
    xen-4.16-testing:test-amd64-amd64-livepatch:livepatch-run:fail:regression
    xen-4.16-testing:test-amd64-i386-livepatch:livepatch-run:fail:regression
    xen-4.16-testing:test-armhf-armhf-xl-rtds:guest-start:fail:heisenbug
    xen-4.16-testing:test-armhf-armhf-xl-rtds:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-rtds:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-qemuu-nested-amd:debian-hvm-install/l1/l2:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-qcow2:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-win7-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-win7-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemuu-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-qemut-ws16-amd64:guest-stop:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-xl-pvshim:guest-start:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-seattle:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-seattle:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-i386-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-thunderx:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-thunderx:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-xsm:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-xsm:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit1:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit1:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-arndale:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-multivcpu:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-arndale:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-multivcpu:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-amd64-amd64-libvirt-vhd:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-raw:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-libvirt-raw:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit2:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-credit2:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-cubietruck:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-cubietruck:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-arm64-arm64-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-qcow2:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-vhd:migrate-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-xl-vhd:saverestore-support-check:fail:nonblocking
    xen-4.16-testing:test-armhf-armhf-libvirt-raw:migrate-support-check:fail:nonblocking
X-Osstest-Versions-This:
    xen=4dcddbba664cc91e2c1952498e80d8025891b9ad
X-Osstest-Versions-That:
    xen=cfd29b83a26f35f49f074f06169ce4cadfdebf0d
From: osstest service owner <osstest-admin@xenproject.org>
Date: Thu, 31 Mar 2022 23:13:27 +0000

flight 169048 xen-4.16-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/169048/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-amd64-livepatch   13 livepatch-run            fail REGR. vs. 168513
 test-amd64-i386-livepatch    13 livepatch-run            fail REGR. vs. 168513

Tests which are failing intermittently (not blocking):
 test-armhf-armhf-xl-rtds     14 guest-start                fail pass in 168993

Tests which did not succeed, but are not blocking:
 test-armhf-armhf-xl-rtds    15 migrate-support-check fail in 168993 never pass
 test-armhf-armhf-xl-rtds 16 saverestore-support-check fail in 168993 never pass
 test-armhf-armhf-libvirt     16 saverestore-support-check    fail  like 168513
 test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stop            fail like 168513
 test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop            fail like 168513
 test-amd64-amd64-qemuu-nested-amd 20 debian-hvm-install/l1/l2 fail like 168513
 test-amd64-amd64-xl-qemuu-ws16-amd64 19 guest-stop            fail like 168513
 test-amd64-amd64-xl-qemut-ws16-amd64 19 guest-stop            fail like 168513
 test-armhf-armhf-libvirt-qcow2 15 saverestore-support-check   fail like 168513
 test-armhf-armhf-libvirt-raw 15 saverestore-support-check    fail  like 168513
 test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop             fail like 168513
 test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop             fail like 168513
 test-amd64-i386-xl-qemuu-ws16-amd64 19 guest-stop             fail like 168513
 test-amd64-i386-xl-qemut-ws16-amd64 19 guest-stop             fail like 168513
 test-amd64-i386-xl-pvshim    14 guest-start                  fail   never pass
 test-amd64-amd64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-xsm  15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-seattle  16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt     15 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-amd64-i386-libvirt-raw  14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl          16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit1  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit1  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-thunderx 15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-thunderx 16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-credit2  15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-credit2  16 saverestore-support-check    fail   never pass
 test-arm64-arm64-xl-xsm      15 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-xsm      16 saverestore-support-check    fail   never pass
 test-arm64-arm64-libvirt-xsm 15 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-xsm 16 saverestore-support-check    fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 13 migrate-support-check fail never pass
 test-armhf-armhf-libvirt     15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit1  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-arndale  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 15 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-arndale  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-multivcpu 16 saverestore-support-check    fail  never pass
 test-amd64-amd64-libvirt-vhd 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 14 migrate-support-check        fail   never pass
 test-arm64-arm64-libvirt-raw 15 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-credit2  16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl          15 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          16 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-cubietruck 15 migrate-support-check        fail never pass
 test-armhf-armhf-xl-cubietruck 16 saverestore-support-check    fail never pass
 test-arm64-arm64-xl-vhd      14 migrate-support-check        fail   never pass
 test-arm64-arm64-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-qcow2 14 migrate-support-check        fail never pass
 test-armhf-armhf-xl-vhd      14 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      15 saverestore-support-check    fail   never pass
 test-armhf-armhf-libvirt-raw 14 migrate-support-check        fail   never pass

version targeted for testing:
 xen                  4dcddbba664cc91e2c1952498e80d8025891b9ad
baseline version:
 xen                  cfd29b83a26f35f49f074f06169ce4cadfdebf0d

Last test of basis   168513  2022-03-11 05:13:34 Z   20 days
Failing since        168864  2022-03-25 17:37:01 Z    6 days    8 attempts
Testing same since   168966  2022-03-29 02:34:29 Z    2 days    3 attempts

------------------------------------------------------------
People who touched revisions under test:
  Andrew Cooper <andrew.cooper3@citrix.com>
  Bjoern Doebel <doebel@amazon.de>
  Jan Beulich <jbeulich@suse.com>
  Jiamei Xie <jiamei.xie@arm.com>
  Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
  Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
  Thiner Logoer <logoerthiner1@163.com>

jobs:
 build-amd64-xsm                                              pass    
 build-arm64-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64-xtf                                              pass    
 build-amd64                                                  pass    
 build-arm64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-arm64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-arm64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 test-xtf-amd64-amd64-1                                       pass    
 test-xtf-amd64-amd64-2                                       pass    
 test-xtf-amd64-amd64-3                                       pass    
 test-xtf-amd64-amd64-4                                       pass    
 test-xtf-amd64-amd64-5                                       pass    
 test-amd64-amd64-xl                                          pass    
 test-amd64-coresched-amd64-xl                                pass    
 test-arm64-arm64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-coresched-i386-xl                                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-xl-qemut-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemut-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-i386-xsm                 pass    
 test-amd64-i386-xl-qemuu-debianhvm-i386-xsm                  pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-arm64-arm64-libvirt-xsm                                 pass    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      pass    
 test-arm64-arm64-xl-xsm                                      pass    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvhv2-amd                                pass    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-dom0pvh-xl-amd                              pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-qemuu-freebsd11-amd64                       pass    
 test-amd64-amd64-qemuu-freebsd12-amd64                       pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-qemut-ws16-amd64                         fail    
 test-amd64-i386-xl-qemut-ws16-amd64                          fail    
 test-amd64-amd64-xl-qemuu-ws16-amd64                         fail    
 test-amd64-i386-xl-qemuu-ws16-amd64                          fail    
 test-armhf-armhf-xl-arndale                                  pass    
 test-amd64-amd64-xl-credit1                                  pass    
 test-arm64-arm64-xl-credit1                                  pass    
 test-armhf-armhf-xl-credit1                                  pass    
 test-amd64-amd64-xl-credit2                                  pass    
 test-arm64-arm64-xl-credit2                                  pass    
 test-armhf-armhf-xl-credit2                                  pass    
 test-armhf-armhf-xl-cubietruck                               pass    
 test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict        pass    
 test-amd64-i386-xl-qemuu-dmrestrict-amd64-dmrestrict         pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-amd64-qemuu-nested-intel                          pass    
 test-amd64-amd64-xl-pvhv2-intel                              pass    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-dom0pvh-xl-intel                            pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     pass    
 test-amd64-i386-libvirt                                      pass    
 test-amd64-amd64-livepatch                                   fail    
 test-amd64-i386-livepatch                                    fail    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-xl-pvshim                                   pass    
 test-amd64-i386-xl-pvshim                                    fail    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               pass    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-arm64-arm64-libvirt-raw                                 pass    
 test-armhf-armhf-libvirt-raw                                 pass    
 test-amd64-i386-libvirt-raw                                  pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     fail    
 test-arm64-arm64-xl-seattle                                  pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow             pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow              pass    
 test-amd64-amd64-xl-shadow                                   pass    
 test-amd64-i386-xl-shadow                                    pass    
 test-arm64-arm64-xl-thunderx                                 pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-arm64-arm64-xl-vhd                                      pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-i386-xl-vhd                                       pass    


------------------------------------------------------------
sg-report-flight on osstest.test-lab.xenproject.org
logs: /home/logs/logs
images: /home/logs/images

Logs, config files, etc. are available at
    http://logs.test-lab.xenproject.org/osstest/logs

Explanation of these reports, and of osstest in general, is at
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README.email;hb=master
    http://xenbits.xen.org/gitweb/?p=osstest.git;a=blob;f=README;hb=master

Test harness code can be found at
    http://xenbits.xen.org/gitweb?p=osstest.git;a=summary


Not pushing.

(No revision log; it would be 410 lines long.)


From xen-devel-bounces@lists.xenproject.org Thu Mar 31 23:23:34 2022
Return-path: <xen-devel-bounces@lists.xenproject.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Thu, 31 Mar 2022 23:23:34 +0000
Received: from list by lists.xenproject.org with outflank-mailman.297119.506009 (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1na48Y-0005fR-Kc; Thu, 31 Mar 2022 23:23:30 +0000
X-Outflank-Mailman: Message body and most headers restored to incoming version
Received: by outflank-mailman (output) from mailman id 297119.506009; Thu, 31 Mar 2022 23:23:30 +0000
Received: from localhost ([127.0.0.1] helo=lists.xenproject.org)
	by lists.xenproject.org with esmtp (Exim 4.92)
	(envelope-from <xen-devel-bounces@lists.xenproject.org>)
	id 1na48Y-0005fK-HL; Thu, 31 Mar 2022 23:23:30 +0000
Received: by outflank-mailman (input) for mailman id 297119;
 Thu, 31 Mar 2022 23:23:30 +0000
Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254]
 helo=se1-gles-sth1.inumbo.com)
 by lists.xenproject.org with esmtp (Exim 4.92)
 (envelope-from <SRS0=5BbJ=UK=aim.com=brchuckz@srs-se1.protection.inumbo.net>)
 id 1na48X-0005fD-Qk
 for xen-devel@lists.xenproject.org; Thu, 31 Mar 2022 23:23:30 +0000
Received: from sonic313-20.consmr.mail.gq1.yahoo.com
 (sonic313-20.consmr.mail.gq1.yahoo.com [98.137.65.83])
 by se1-gles-sth1.inumbo.com (Halon) with ESMTPS
 id 9015b096-b149-11ec-a405-831a346695d4;
 Fri, 01 Apr 2022 01:23:26 +0200 (CEST)
Received: from sonic.gate.mail.ne1.yahoo.com by
 sonic313.consmr.mail.gq1.yahoo.com with HTTP; Thu, 31 Mar 2022 23:23:24 +0000
Received: by kubenode534.mail-prod1.omega.ne1.yahoo.com (VZM Hermes SMTP
 Server) with ESMTPA ID 7634f0d611ddb9d48a7ac57619ed0f00; 
 Thu, 31 Mar 2022 23:23:22 +0000 (UTC)
X-BeenThere: xen-devel@lists.xenproject.org
List-Id: Xen developer discussion <xen-devel.lists.xenproject.org>
List-Unsubscribe: <https://lists.xenproject.org/mailman/options/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=unsubscribe>
List-Post: <mailto:xen-devel@lists.xenproject.org>
List-Help: <mailto:xen-devel-request@lists.xenproject.org?subject=help>
List-Subscribe: <https://lists.xenproject.org/mailman/listinfo/xen-devel>,
 <mailto:xen-devel-request@lists.xenproject.org?subject=subscribe>
Errors-To: xen-devel-bounces@lists.xenproject.org
Precedence: list
Sender: "Xen-devel" <xen-devel-bounces@lists.xenproject.org>
X-Inumbo-ID: 9015b096-b149-11ec-a405-831a346695d4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netscape.net; s=a2048; t=1648769004; bh=GZIXuqN8kcvSLIpsHl1AtKI5jMJ/M7yeBERtI9scRyY=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From:Subject:Reply-To; b=GDMWyPCW0jnV5+b0v84SePbVnyNt9NZB4eT8b5/Sd8G1H8xK4cMtLcuM8SEdG9OiEg+lfEyfZAa8U5NTvF5AmRs2lApo0vEEGFuvknu7E6oNsHuEq5uG5rv1kH6Xq3ZyS0NNDZCu6l96uttY++TIAj+4GRVQw87q8t46aRJuix/2/oMwAXLfWb/oNumn+NIEH5iOtTtj/3XvSESX2Ap4ECE1T2ZU2o8+gAOyUSH679qhkLcdfjJmXZu9PPDFbQtPDOMzj6IhNWhJ1ev6YuQ8kTA5SfGe6jAuUMk8MPMuMo47e6UZvJVSG1PTzrCF+BdFEXNaaqhAe9m/Bruyww8RqA==
X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1648769004; bh=q9W6vlyrZ8DuZD5LdYrpwvREmGxYGp2qeF08za7ygA4=; h=X-Sonic-MF:Date:Subject:To:From:From:Subject; b=RLxTNoEkakUfD5PfuUwvtv7+Hn4KQ8lv6k7Ng/E+l4F5X7O67giIfwij/E2/Ssn/UaMZ8WHrS5RyDPLXy0yjqEXHOyNXaTYXSCWmzHiOvPT+d2LacOdu7pZ4yOFiyAdeOCbTVLW3lawEB58S9kxCNWtIdfPp/2Q2AHimTcugPwtusng30ssD1wQ8Q2Ztc+LV1t4kwGUoPT/4D7n47iGqAH3RnCBeS2V/SYBZjcTPMClXlOAXdBwIDZD/CGC447V4CJzO57anf/n0fVJ5SsaoieoJ1xKcNm2GogisNnt9osV7bgGm9hjio6TvBdqzok5Dt0kxi+qw0FGTueEHUbpKfw==
X-YMail-OSG: lQpPR1UVM1kHJdQW2zIAmWft6UdlwhVtDZNeo8TKyBl1L7H4OvHDazypLFgKEjx
 0SgLJ9_JK5tVmCH5z.xU8sYV6KC8FQOPOJymfPIEwLZ1fNWES3Xtr6zatf5ZDbSqDXruNMgOJYBy
 ZsWZMChWPtR_oM_hjuMK4fyHOww_uRf5GYiirPhK7_9BI3zP.1pshCNj4NF_ADA8ytS20OTdIfg8
 O8SrM1toijWeCBr0H.zpyakaMZkEgGdtCbRuhe.akzjjZ9rqF0xEoCc.JODBfUizoMHBQVA2oU5A
 J0J6TN7ARQ7q.iMcBJ92Klb1YJ0HfrngCzlYQLl8.5Akyib8jIc76yxoPosl0_SSmYY37ISNOWwr
 tIcUdo5l8gdBFsueCgQwcS.TU.svUdrCXGPeLesTFDUDXzrTVqjO0dKbMp6aC9jdXUNUqLrsdL9N
 MKg8Nfbbm5jaaUeq5rLqjMlcgJTWTOU3cK2u0SKd6DT8AWRm4IxhBTagFFxLLS328SYbtzHYHlND
 1XW4Z4Dz1CHfu4mbnwimTiLT3mhsoUrV.gE1yI_n6T3W7HJEEGTqMuYkQRnB2cChzCceDhKLE7._
 c3KdFWVi3ynmlFc_XPI5kGUZpzT1YsJO8JhYp.Zhof.hHvGh8bEtGnBgu0BWKiHpBMTrelNXcrV8
 ..NErs2UAKFCjQncqdo_0sYFnH8ovqYIXyrcivIFeyFoDzrnxRi2zdgQokbogkUuDSrtoZqIJFev
 sQ8FDJrUa06PEjhDaBDBStRMYHxHNIk7ph6nSEJbwseZvhU7zsKOfRFrjFBVKVepgBHtv3Pyb1mN
 n5Tn.8gs_IstUcWKALK44fJjBzSpivgK44CqbIsMMl_UBfJCgCBxj1mMuQB_u1qbDjMDRGDaJvr9
 ra9bNEUqvQMNfIbdXplpt3jIPIICEiFkAk8w_iHgx4YDQ04ryZxAjTsvjjpn52kmj513rbbfYXW2
 aPUwwf8MjFEQulVIBwKVanscj9novwJOF_9PAX4960b3GG2G7XXCAteEiYUDB6cAxkmIlbbqRsQh
 bKLoqEfM5DfIssDEesoFzK2QkrjYoO8.vI7_C13YQVpKmthGeZwRdotJjzLK8sBVpr3pAaGl2XWG
 cMm0EvSo1mcx_COA2WjkqPjiWfvBgb.fQBA1tMZYY2yHNuDNJVTPmEnVl_LSjuftndbSyCPGsRtY
 GN2IUfD5JFT0A8CMyeEkvG9IFUa296UFNywGKxXW4Fc5O_BUrh7VAK_wtZpp8UoojDWhQFdJR2e8
 yLhPiXRa7qOxZOgFvYDjWct7gjG5tBfd3UaRIKInvim.I.wdyMrouugliKZR1OopRqfBTBnoF3tu
 WVXPvto99MQ8T9yUNzeCIJrPUGkrBMOViFLSqqiMLbllFPJOsIt9C3q2lKrD.U5qTjcHwN.vM9tV
 0PkHZ2MUHYCHLKER7T9MbrembLSQs9BOjZHTEgsCzjI73pDn5EGYGaO_kl2FKrr4djr5SPKRdeUp
 0JNeuQHrAADFiigv_w5Yt65zMDm8AMSQ_U6tKStBJC5TKSZsCHQAniAc4vGpG8YkrQodNKKm5kyc
 7SZv2Xjn5.upgKGubVSDIBbLDsfJ8R5TBqnIoTkFaBIajtLj5laqWJVlAumrpMrzc8LOf4qkspiW
 1_C9Os6GaHYGaGlsUpO4v7xuYHx.e1mdSBxnJUL7p07CNFLIVcRElgwW10r5cVlRverz6A3Dob0g
 ff.nE1FRWjFh_nHwXFSzjS1BWxFxQXpV4uWLGodobKTygHoI8eD7mfUNnW3JHHeohIV2DVjXkgKX
 iwo18ysLJsvR0LmBtHZ441cHi4NJnzFuAt_TFhpxjuqtBFg.86ll1MyNfDsAtALW5uB6jR5kKbAc
 ZBO1WTcTipnzoAFROwpSPDK7wYK4AXfjO80DjBxZY.UP0cWDIvF1TLrzIMHJ8qP9iJlLpKKre5Gj
 4yZLeMvFoiywMO79X3ZjJSA6OUml9AN8pknf_ztAD7OpH4xeiAA1t8imKzHp_.3hHOA7MfaoRfuv
 hC_0XPaizKyFJpXnmH3w6ngr6XWy7ITqBLgMicpxPT2n4q6hHtHy00IvZY1hFwc4HaAcif101xxi
 Jp6024iL.1z4SrN47ghsuvZv6gF6ZRM0hQxpPxVo3wrrlPZBK1sQzyqikGiu1mF4pQMYemaYzqDZ
 DR447mT1aoNu3mFsk6Nw3LVqzh9MhgeB8wT6N2BGBkp5G0cqq1WrbGgTA1aUzLP93W7zJtVQZ61M
 ch8TRtvBXL1o-
X-Sonic-MF: <brchuckz@aim.com>
Message-ID: <7ed89fbe-a8b6-de9b-9056-4800d6a6e145@netscape.net>
Date: Thu, 31 Mar 2022 19:23:20 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
 Thunderbird/91.7.0
Subject: Re: [XEN PATCH] tools/libs/light/libxl_pci.c: explicitly grant access
 to Intel IGD opregion
Content-Language: en-US
To: Anthony PERARD <anthony.perard@citrix.com>
Cc: xen-devel@lists.xenproject.org, Wei Liu <wl@xen.org>,
 Juergen Gross <jgross@suse.com>, Jan Beulich <jbeulich@suse.com>
References: <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz.ref@netscape.net>
 <b62fbc602a629941c1acaad3b93d250a3eba33c0.1647222184.git.brchuckz@netscape.net>
 <YkSQIoYhomhNKpYR@perard.uk.xensource.com>
From: Chuck Zmudzinski <brchuckz@netscape.net>
In-Reply-To: <YkSQIoYhomhNKpYR@perard.uk.xensource.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-Mailer: WebService/1.1.20001 mail.backend.jedi.jws.acl:role.jedi.acl.token.atz.jws.hermes.aol
Content-Length: 5173

On 3/30/22 1:15 PM, Anthony PERARD wrote:
> Hi Chuck,
>
> On Sun, Mar 13, 2022 at 11:41:37PM -0400, Chuck Zmudzinski wrote:
>> When gfx_passthru is enabled for the Intel IGD, hvmloader maps the IGD
>> opregion to the guest but libxl does not grant the guest permission to
> I'm not reading the same thing when looking at code in hvmloader. It
> seems that hvmloader allocate some memory for the IGD opregion rather
> than mapping it.
>
>
> tools/firmware/hvmloader/pci.c:184
>      if ( vendor_id == 0x8086 )
>      {
>          igd_opregion_pgbase = mem_hole_alloc(IGD_OPREGION_PAGES);
>          /*
>           * Write the the OpRegion offset to give the opregion
>           * address to the device model. The device model will trap
>           * and map the OpRegion at the give address.
>           */
>          pci_writel(vga_devfn, PCI_INTEL_OPREGION,
>                     igd_opregion_pgbase << PAGE_SHIFT);
>      }
>
> I think this write would go through QEMU, does it do something with it?
> (I kind of replying to this question at the end of the mail.)
>
> Is this code in hvmloader actually run in your case?

Hi Anthony,

Let me try to answer your question again. My tests indicate
that this code in hvmloader is actually run in my case. As I
mentioned in an earlier message, the allocation of the three
pages for the opregion is not done for the guest if I remove
this code from hvmloader. The only concern I had was about
the difference in what I was reading for the opregion address
in sysfs (fcffc018 in my case) and the address that hvmloader
wrote (fcffc000 in my case). The change is easily explained by
what the Qemu device model (both upstream and traditional)
does when the device model writes the opregion address into
the Intel IGD config attribute:

This is the traditional Qemu code in hw/pt_graphics.c:66

void igd_write_opregion(struct pt_dev *real_dev, uint32_t val)
{
     uint32_t host_opregion = 0;
     int ret;

     if ( igd_guest_opregion )
     {
         PT_LOG("opregion register already been set, ignoring %x\n", val);
         return;
     }

     host_opregion = pt_pci_host_read(real_dev->pci_dev, 
PCI_INTEL_OPREGION, 4);
     igd_guest_opregion = (val & ~0xfff) | (host_opregion & 0xfff);

------------------------ End of code snippet 
-----------------------------------

The offset of the opregion in the guest (0x18 in my case) is
recovered by that last statement. The upstream model does the
same thing using the constant XEN_PCI_INTEL_OPREGION_MASK
set to 0xfff to recover the offset.

So what we have in hvmloader is correct and necessary.

>
>> diff --git a/tools/libs/light/libxl_pci.c b/tools/libs/light/libxl_pci.c
>> index 4bbbfe9f16..a4fc473de9 100644
>> --- a/tools/libs/light/libxl_pci.c
>> +++ b/tools/libs/light/libxl_pci.c
>> @@ -2531,6 +2572,37 @@ int libxl__grant_vga_iomem_permission(libxl__gc *gc, const uint32_t domid,
>>                     domid, vga_iomem_start, (vga_iomem_start + 0x20 - 1));
>>               return ret;
>>           }
>> +
>> +        /* If this is an Intel IGD, allow access to the IGD opregion */
>> +        if (!libxl__is_igd_vga_passthru(gc, d_config)) return 0;
>> +
>> +        uint32_t igd_opregion = sysfs_dev_get_igd_opregion(gc, pci);
>> +        uint32_t error = 0xffffffff;
>> +        if (igd_opregion == error) break;
>> +
>> +        vga_iomem_start = ( (uint64_t) igd_opregion ) >> XC_PAGE_SHIFT;
>> +        ret = xc_domain_iomem_permission(CTX->xch, stubdom_domid,
>> +                                         vga_iomem_start,
>> +                                         IGD_OPREGION_PAGES, 1);
>> +        if (ret < 0) {
>> +            LOGED(ERROR, domid,
>> +                  "failed to give stubdom%d access to iomem range "
>> +                  "%"PRIx64"-%"PRIx64" for IGD passthru",
>> +                  stubdom_domid, vga_iomem_start, (vga_iomem_start +
>> +                                                IGD_OPREGION_PAGES - 1));
>> +            return ret;
>> +        }
>> +        ret = xc_domain_iomem_permission(CTX->xch, domid,
>> +                                         vga_iomem_start,
>> +                                         IGD_OPREGION_PAGES, 1);
> Here, you seems to add permission to an address that is read from the
> pci config space of the device, but as I've pointed above hvmloader
> seems to overwrite this address.

No, hvmloader wrote the mapped address and here we are
reading the opregion address of the host, not the mapped
address of the guest. There is no problem here.
> It this call to
> xc_domain_iomem_permission() does actually anything useful?
> Or is it by luck that the address returned by
> sysfs_dev_get_igd_opregion() happened to be the address that hvmloader
> is going to write?

No, it is not luck, we use the same constant in hvmloader,
Qemu, and here in this patch to properly map the opregion
to the guest, and the constant is PCI_INTEL_OPREGION, set
to 0xfc, the offset of where in the config attribute the
opregion address is stored.
>
> Or maybe hvmloader doesn't actually do anything?

It does do something, and what it does is necessary.

Regards,

Chuck


